boringssl/ssl
Matthew Braithwaite 56986f905f Hand back ECDHE split handshakes after the first server message.
This changes the contract for split handshakes such that on the
receiving side, the connection is to be driven until it returns
|SSL_ERROR_HANDBACK|, rather than until SSL_do_handshake() returns
success.

Change-Id: Idd1ebfbd943d88474d7c934f4c0ae757ff3c0f37
Reviewed-on: https://boringssl-review.googlesource.com/26864
Commit-Queue: Matt Braithwaite <mab@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
Reviewed-by: Adam Langley <agl@google.com>
2018-04-04 17:58:15 +00:00
..
test Hand back ECDHE split handshakes after the first server message. 2018-04-04 17:58:15 +00:00
bio_ssl.cc
CMakeLists.txt Add initial, experimental support for split handshakes. 2018-01-31 22:24:17 +00:00
custom_extensions.cc Rename ssl3_send_alert and ssl3_protocol_version. 2017-10-12 16:24:35 +00:00
d1_both.cc Remove trailing whitespace from ssl/. 2018-02-26 22:05:13 +00:00
d1_lib.cc Give DTLS1_STATE a destructor. 2017-10-25 03:23:26 +00:00
d1_pkt.cc Make SSL3_BUFFER a proper C++ class. 2017-10-24 17:32:45 +00:00
d1_srtp.cc
dtls_method.cc Remove trailing whitespace from ssl/. 2018-02-26 22:05:13 +00:00
dtls_record.cc Give DTLS1_STATE a destructor. 2017-10-25 03:23:26 +00:00
handoff.cc Hand back ECDHE split handshakes after the first server message. 2018-04-04 17:58:15 +00:00
handshake_client.cc Remove remnants of the HRR message. 2018-03-13 21:10:03 +00:00
handshake_server.cc Hand back ECDHE split handshakes after the first server message. 2018-04-04 17:58:15 +00:00
handshake.cc Hand back ECDHE split handshakes after the first server message. 2018-04-04 17:58:15 +00:00
internal.h Hand back ECDHE split handshakes after the first server message. 2018-04-04 17:58:15 +00:00
s3_both.cc Revert "Pack encrypted handshake messages together." 2017-10-27 14:36:37 +00:00
s3_lib.cc Add a draft TLS 1.3 anti-downgrade signal. 2017-12-21 01:50:33 +00:00
s3_pkt.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00
span_test.cc
ssl_aead_ctx.cc Remove deprecated TLS 1.3 variants. 2017-12-18 21:20:32 +00:00
ssl_asn1.cc Expose ssl_session_serialize to libssl. 2018-01-26 22:31:47 +00:00
ssl_buffer.cc Move init_buf and rwstate into SSL3_STATE. 2017-10-24 18:55:05 +00:00
ssl_cert.cc Adding support for draft 21 as a TLS 1.3 variant. 2017-11-01 21:32:36 +00:00
ssl_cipher.cc Add |SSL_COMP_get[0_name|_id]|. 2018-03-15 17:34:33 +00:00
ssl_file.cc Switch OPENSSL_VERSION_NUMBER to 1.1.0. 2017-09-29 04:51:27 +00:00
ssl_key_share.cc Hand back ECDHE split handshakes after the first server message. 2018-04-04 17:58:15 +00:00
ssl_lib.cc Hand back ECDHE split handshakes after the first server message. 2018-04-04 17:58:15 +00:00
ssl_privkey.cc Push an error if custom private keys fail. 2018-02-01 21:43:42 +00:00
ssl_session.cc Use more scopers. 2017-10-24 17:50:05 +00:00
ssl_stat.cc Remove trailing whitespace from ssl/. 2018-02-26 22:05:13 +00:00
ssl_test.cc Hand back ECDHE split handshakes after the first server message. 2018-04-04 17:58:15 +00:00
ssl_transcript.cc Hand back ECDHE split handshakes after the first server message. 2018-04-04 17:58:15 +00:00
ssl_versions.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00
ssl_x509.cc Map NOT_YET_VALID errors to |certificate_expired|. 2018-01-05 23:40:40 +00:00
t1_enc.cc Add initial, experimental support for split handshakes. 2018-01-31 22:24:17 +00:00
t1_lib.cc Record whether dummy PQ padding was used. 2018-02-28 23:38:53 +00:00
tls13_both.cc Add a draft TLS 1.3 anti-downgrade signal. 2017-12-21 01:50:33 +00:00
tls13_client.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00
tls13_enc.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00
tls13_server.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00
tls_method.cc Remove SSLv3_method and friends. 2018-02-15 15:29:18 +00:00
tls_record.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00