equal
deleted
inserted
replaced
805 |
805 |
806 shc.baseWriteSecret = writeSecret; |
806 shc.baseWriteSecret = writeSecret; |
807 shc.conContext.outputRecord.changeWriteCiphers( |
807 shc.conContext.outputRecord.changeWriteCiphers( |
808 writeCipher, false); |
808 writeCipher, false); |
809 |
809 |
810 // TODO: the exporter_master_secret |
|
811 |
|
812 // update the context for the following key derivation |
810 // update the context for the following key derivation |
813 shc.handshakeKeyDerivation = secretKD; |
811 shc.handshakeKeyDerivation = secretKD; |
814 } catch (GeneralSecurityException gse) { |
812 } catch (GeneralSecurityException gse) { |
815 shc.conContext.fatal(Alert.INTERNAL_ERROR, |
813 shc.conContext.fatal(Alert.INTERNAL_ERROR, |
816 "Failure to derive application secrets", gse); |
814 "Failure to derive application secrets", gse); |
943 chc.sslContext.getSecureRandom()); |
941 chc.sslContext.getSecureRandom()); |
944 |
942 |
945 chc.baseReadSecret = readSecret; |
943 chc.baseReadSecret = readSecret; |
946 chc.conContext.inputRecord.changeReadCiphers(readCipher); |
944 chc.conContext.inputRecord.changeReadCiphers(readCipher); |
947 |
945 |
948 // TODO: the exporter_master_secret |
|
949 |
|
950 // update the context for the following key derivation |
946 // update the context for the following key derivation |
951 chc.handshakeKeyDerivation = secretKD; |
947 chc.handshakeKeyDerivation = secretKD; |
952 } catch (GeneralSecurityException gse) { |
948 } catch (GeneralSecurityException gse) { |
953 chc.conContext.fatal(Alert.INTERNAL_ERROR, |
949 chc.conContext.fatal(Alert.INTERNAL_ERROR, |
954 "Failure to derive application secrets", gse); |
950 "Failure to derive application secrets", gse); |