Once key confirmation is complete, applications MAY use K_enc as an authenticated shared secret as needed. For example, applications MAY derive one or more AEAD keys and nonces from K_enc for subsequent application data encryption.
But the document does not explicit says how to produce K_enc.
The document says:
But the document does not explicit says how to produce
K_enc
.