Chromium Code Reviews| Index: third_party/tlslite/tlslite/tlsrecordlayer.py |
| diff --git a/third_party/tlslite/tlslite/tlsrecordlayer.py b/third_party/tlslite/tlslite/tlsrecordlayer.py |
| index c3bcd8c40ca64a12e426bc1f23ff3eff3d0305b4..8faea59eaa8c20c7ab163080a189f402dca61161 100644 |
| --- a/third_party/tlslite/tlslite/tlsrecordlayer.py |
| +++ b/third_party/tlslite/tlslite/tlsrecordlayer.py |
| @@ -115,6 +115,9 @@ class TLSRecordLayer(object): |
| self.clearReadBuffer() |
| self.clearWriteBuffer() |
| + #All handshake messages, for use in extended master secret |
| + self.handshakeMessages = [] |
|
davidben
2015/08/14 22:31:18
You should be able to just use the handshake diges
nharper
2015/08/15 00:37:43
Ah, I should have read the surrounding code and se
|
| + |
| #Handshake digests |
| self._handshake_md5 = hashlib.md5() |
| self._handshake_sha = hashlib.sha1() |
| @@ -558,6 +561,7 @@ class TLSRecordLayer(object): |
| yield result |
| b = msg.write() |
| + self.handshakeMessages.append(b) |
| # If a 1-byte message was passed in, and we "split" the |
| # first(only) byte off above, we may have a 0-length msg: |
| @@ -814,6 +818,7 @@ class TLSRecordLayer(object): |
| self._handshake_md5.update(compat26Str(p.bytes)) |
| self._handshake_sha.update(compat26Str(p.bytes)) |
| self._handshake_sha256.update(compat26Str(p.bytes)) |
| + self.handshakeMessages.append(p.bytes) |
| #Parse based on handshake type |
| if subType == HandshakeType.client_hello: |