boringssl/ssl
Steven Valdez 4cb8494d25 Splitting handshake traffic derivation from key change.
This is in preparation for implementing 0-RTT where, like
with client_traffic_secret_0, client_handshake_secret must
be derived slightly earlier than it is used. (The secret is
derived at ServerHello, but used at server Finished.)

Change-Id: I6a186b84829800704a62fda412992ac730422110
Reviewed-on: https://boringssl-review.googlesource.com/12920
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2016-12-16 20:29:23 +00:00
..
test Remove version-specific cipher lists. 2016-12-16 19:11:02 +00:00
CMakeLists.txt Add TLS 1.3 1-RTT. 2016-07-18 09:54:46 +00:00
custom_extensions.c Pass explicit hs parameters into custom_extensions.c. 2016-12-06 19:49:36 +00:00
d1_both.c Replace hash_current_message with get_current_message. 2016-11-15 06:52:10 +00:00
d1_lib.c Move a few more functions into *_method.c. 2016-12-08 16:29:19 +00:00
d1_pkt.c Expose SSL_max_seal_overhead. 2016-11-09 16:51:46 +00:00
d1_srtp.c Fix ssl_ctx_make_profiles error handling. 2016-09-27 13:27:06 +00:00
dtls_method.c Move a few more functions into *_method.c. 2016-12-08 16:29:19 +00:00
dtls_record.c Take the version parameter out of ssl_do_msg_callback. 2016-09-21 18:55:27 +00:00
handshake_client.c Don't use X.509 functions to check ECDSA keyUsage. 2016-12-14 17:51:03 +00:00
handshake_server.c Preserve the peer signature algorithm across resumes. 2016-12-14 01:12:40 +00:00
internal.h Splitting handshake traffic derivation from key change. 2016-12-16 20:29:23 +00:00
s3_both.c Splitting handshake traffic derivation from key change. 2016-12-16 20:29:23 +00:00
s3_enc.c Move key_block into SSL_HANDSHAKE. 2016-11-09 17:02:33 +00:00
s3_lib.c Remove version-specific cipher lists. 2016-12-16 19:11:02 +00:00
s3_pkt.c Expose SSL_max_seal_overhead. 2016-11-09 16:51:46 +00:00
ssl_aead_ctx.c Validate input iv/mac sizes in SSL_AEAD_CTX_new. 2016-10-28 21:25:35 +00:00
ssl_asn1.c Preserve the peer signature algorithm across resumes. 2016-12-14 01:12:40 +00:00
ssl_buffer.c Add SSL_is_dtls. 2016-08-02 20:43:58 +00:00
ssl_cert.c Don't use X.509 functions to check ECDSA keyUsage. 2016-12-14 17:51:03 +00:00
ssl_cipher.c Remove CECPQ1 (experimental post-quantum key agreement). 2016-12-09 19:16:56 +00:00
ssl_ecdh.c Remove New Hope key agreement. 2016-12-10 01:06:31 +00:00
ssl_file.c Check for sk_X509_NAME_push failures. 2016-09-27 13:18:37 +00:00
ssl_lib.c Remove version-specific cipher lists. 2016-12-16 19:11:02 +00:00
ssl_rsa.c Rename X.509 members in |SSL_SESSION| and |CERT|. 2016-11-09 20:07:57 +00:00
ssl_session.c Preserve the peer signature algorithm across resumes. 2016-12-14 01:12:40 +00:00
ssl_stat.c Move state and next_state to SSL_HANDSHAKE. 2016-12-12 22:09:01 +00:00
ssl_test.cc Push the difference in chain semantics to the edge. 2016-12-13 17:18:53 +00:00
t1_enc.c Pass explicit hs parameters into t1_enc.c. 2016-12-06 19:49:46 +00:00
t1_lib.c Remove the BORINGSSL_ANDROID_SYSTEM P-521 special-case. 2016-12-15 15:47:39 +00:00
tls13_both.c Make TLS 1.3 check ECDSA KeyUsage and add test. 2016-12-14 17:56:55 +00:00
tls13_client.c Splitting handshake traffic derivation from key change. 2016-12-16 20:29:23 +00:00
tls13_enc.c Splitting handshake traffic derivation from key change. 2016-12-16 20:29:23 +00:00
tls13_server.c Splitting handshake traffic derivation from key change. 2016-12-16 20:29:23 +00:00
tls_method.c Move a few more functions into *_method.c. 2016-12-08 16:29:19 +00:00
tls_record.c Skipping early data on 0RTT rejection. 2016-12-01 20:16:08 +00:00