boringssl/ssl
David Benjamin 0623bceb25 Fill in ssl->session->cipher when resumption is resolved.
Doing it at ChangeCipherSpec makes it be set twice and, more
importantly, causes us to touch SSL_SESSION objects on resumption. (With
a no-op change, but this still isn't a good idea.)

This should actually let us get rid of ssl->s3->tmp.new_cipher but some
of external code accesses that field directly.

Change-Id: Ia6b7e0964c1b430f963ad0b1a5417b339b7b19d3
Reviewed-on: https://boringssl-review.googlesource.com/6833
Reviewed-by: Adam Langley <alangley@gmail.com>
2016-01-15 20:46:45 +00:00
..
pqueue Add a run_tests target to run all tests. 2015-10-26 20:33:44 +00:00
test Consider session if the client supports tickets but offered a session ID. 2016-01-15 20:08:52 +00:00
CMakeLists.txt Implement draft-ietf-tls-curve25519-01 in C. 2015-12-22 21:51:30 +00:00
custom_extensions.c Align the SSL stack on #include style. 2015-09-15 23:32:07 +00:00
d1_both.c Switch s to ssl everywhere. 2015-12-22 23:28:22 +00:00
d1_clnt.c Fill in ssl->session->cipher when resumption is resolved. 2016-01-15 20:46:45 +00:00
d1_lib.c Switch s to ssl everywhere. 2015-12-22 23:28:22 +00:00
d1_meth.c Pull ChangeCipherSpec into the handshake state machine. 2015-12-16 18:36:57 +00:00
d1_pkt.c Switch s to ssl everywhere. 2015-12-22 23:28:22 +00:00
d1_srtp.c Add defines for SRTP profiles using GCM ciphers from RFC 7714. 2015-12-10 23:18:16 +00:00
d1_srvr.c Fill in ssl->session->cipher when resumption is resolved. 2016-01-15 20:46:45 +00:00
dtls_record.c Move ssl3_record_sequence_update with the other record-layer bits. 2016-01-15 20:15:55 +00:00
internal.h Tidy up keyblock and CCS logic slightly. 2016-01-15 20:40:44 +00:00
s3_both.c Tidy up keyblock and CCS logic slightly. 2016-01-15 20:40:44 +00:00
s3_clnt.c Fill in ssl->session->cipher when resumption is resolved. 2016-01-15 20:46:45 +00:00
s3_enc.c Move ssl3_record_sequence_update with the other record-layer bits. 2016-01-15 20:15:55 +00:00
s3_lib.c Switch s to ssl everywhere. 2015-12-22 23:28:22 +00:00
s3_meth.c Pull ChangeCipherSpec into the handshake state machine. 2015-12-16 18:36:57 +00:00
s3_pkt.c Fill in ssl->session->cipher when resumption is resolved. 2016-01-15 20:46:45 +00:00
s3_srvr.c Fill in ssl->session->cipher when resumption is resolved. 2016-01-15 20:46:45 +00:00
ssl_aead_ctx.c Implement draft-ietf-tls-chacha20-poly1305-04. 2015-12-16 23:34:56 +00:00
ssl_asn1.c Check for overflow when parsing a CBS with d2i_*. 2015-11-16 23:17:42 +00:00
ssl_buffer.c Remove SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER. 2015-12-15 19:14:00 +00:00
ssl_cert.c Remove unreachable code to duplicate DH keys. 2015-12-16 21:20:12 +00:00
ssl_cipher.c Make it possible to tell what curve was used on the server. 2015-12-22 23:12:25 +00:00
ssl_ecdh.c Route DHE through the SSL_ECDH abstraction as well. 2015-12-22 23:17:32 +00:00
ssl_file.c More SSL_SESSION serialization functions. 2015-10-26 17:57:50 +00:00
ssl_lib.c Add SSL_get_client_random and SSL_get_server_random. 2016-01-15 20:15:29 +00:00
ssl_rsa.c Add get0 getters for EVP_PKEY. 2015-11-20 23:34:12 +00:00
ssl_session.c Consider session if the client supports tickets but offered a session ID. 2016-01-15 20:08:52 +00:00
ssl_stat.c Document alert handling. 2015-10-20 19:03:24 +00:00
ssl_test.cc Implement draft-ietf-tls-chacha20-poly1305-04. 2015-12-16 23:34:56 +00:00
t1_enc.c Tidy up keyblock and CCS logic slightly. 2016-01-15 20:40:44 +00:00
t1_lib.c Consider session if the client supports tickets but offered a session ID. 2016-01-15 20:08:52 +00:00
tls_record.c Tidy up keyblock and CCS logic slightly. 2016-01-15 20:40:44 +00:00