boringssl/ssl
David Benjamin 700631bdf0 Pack encrypted handshake messages together.
We have a successful TLS 1.3 deployment, in spite of non-compliant
middleboxes everywhere, so now let's get this optimization in. It would
have been nice to test with this from the beginning, but sadly we forgot
about it. Ah well. This shaves 63 bytes off the server's first flight,
and then another 21 bytes off the pair of NewSessionTickets.

So we'll more easily notice in case of anything catastrophic, tie this
behavior to draft 28.

Update-Note: This slightly tweaks our draft-28 behavior.

Change-Id: I4f176a919bf7181239d6ebb31e7870f12364e0f9
Reviewed-on: https://boringssl-review.googlesource.com/28744
Reviewed-by: Steven Valdez <svaldez@google.com>
Commit-Queue: Steven Valdez <svaldez@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2018-05-29 14:28:56 +00:00
..
test Pack encrypted handshake messages together. 2018-05-29 14:28:56 +00:00
bio_ssl.cc
CMakeLists.txt
custom_extensions.cc
d1_both.cc Fix build with GCC 4.9.2 and -Wtype-limits. 2018-05-08 22:21:45 +00:00
d1_lib.cc
d1_pkt.cc
d1_srtp.cc Move srtp_profiles to SSL_CONFIG. 2018-05-03 15:20:13 +00:00
dtls_method.cc
dtls_record.cc Use the actual record header, rather than reassembling it. 2018-04-10 19:52:33 +00:00
handoff.cc SSL_apply_handback: check session is where it's expected to be. 2018-05-05 02:25:24 +00:00
handshake_client.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
handshake_server.cc Implement legacy OCSP APIs for libssl. 2018-05-11 22:21:26 +00:00
handshake.cc The legacy client OCSP callback should run without server OCSP. 2018-05-15 22:57:41 +00:00
internal.h Pack encrypted handshake messages together. 2018-05-29 14:28:56 +00:00
s3_both.cc Pack encrypted handshake messages together. 2018-05-29 14:28:56 +00:00
s3_lib.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
s3_pkt.cc Pack encrypted handshake messages together. 2018-05-29 14:28:56 +00:00
span_test.cc
ssl_aead_ctx.cc Use the actual record header, rather than reassembling it. 2018-04-10 19:52:33 +00:00
ssl_asn1.cc
ssl_buffer.cc
ssl_cert.cc Const-correct some functions. 2018-05-11 15:10:35 +00:00
ssl_cipher.cc Temporarily restore SHA256 and SHA384 cipher suite aliases. 2018-05-03 15:48:50 +00:00
ssl_file.cc Avoid modifying stack in sk_find. 2018-04-12 21:02:12 +00:00
ssl_key_share.cc Check for nullptr result of SSLKeyShare::Create(). 2018-04-10 22:55:53 +00:00
ssl_lib.cc Implement legacy OCSP APIs for libssl. 2018-05-11 22:21:26 +00:00
ssl_privkey.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
ssl_session.cc Add APIs to query authentication properties of SSL_SESSIONs. 2018-05-14 19:10:48 +00:00
ssl_stat.cc
ssl_test.cc Const-correct some functions. 2018-05-11 15:10:35 +00:00
ssl_transcript.cc
ssl_versions.cc Allow enabling all TLS 1.3 variants by setting |tls13_default|. 2018-05-10 20:27:34 +00:00
ssl_x509.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
t1_enc.cc
t1_lib.cc Reject if the ALPN callback returned an empty protocol. 2018-05-15 23:02:39 +00:00
tls13_both.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
tls13_client.cc Enforce supported_versions in the second ServerHello. 2018-05-07 19:05:20 +00:00
tls13_enc.cc
tls13_server.cc Consistently use session_ctx for session caching. 2018-05-02 20:15:08 +00:00
tls_method.cc Pack encrypted handshake messages together. 2018-05-29 14:28:56 +00:00
tls_record.cc Use the actual record header, rather than reassembling it. 2018-04-10 19:52:33 +00:00