Nick Mathewson 858618e7e0 Add new functions to extract {client,server}_random, master_key
Tor uses these values to implement a low-rent clone of RFC 5705 (which,
in our defense, we came up with before RFC 5705 existed).  But now that
ssl_st is opaque, we need another way to get at them.

Includes documentation, with suitable warnings about not actually
using these functions.

Signed-off-by: Nick Mathewson <nickm@torproject.org>
Signed-off-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-05-28 16:05:01 +01:00
..
2015-01-02 22:56:54 +00:00
2011-11-13 13:13:01 +00:00
2015-04-11 10:22:36 -04:00
2013-10-22 07:38:25 +01:00
2014-06-27 16:39:11 +01:00
2015-04-11 10:22:36 -04:00
2001-02-16 02:09:53 +00:00
2001-02-16 02:09:53 +00:00
2013-08-17 17:41:14 +01:00
2014-07-01 12:44:32 -04:00
2014-01-10 23:00:50 +00:00
2015-01-02 22:56:54 +00:00
2015-04-11 10:22:36 -04:00
2013-06-12 23:42:08 +01:00
2013-06-12 23:42:08 +01:00
2014-12-04 11:55:03 +01:00
2014-12-04 11:55:03 +01:00
2013-10-22 07:38:25 +01:00
2015-04-11 10:22:36 -04:00
2006-12-21 21:13:27 +00:00
2013-10-22 07:38:25 +01:00
2013-10-22 07:38:25 +01:00
2013-10-22 07:38:25 +01:00
2014-12-04 11:55:03 +01:00
2013-10-22 07:38:25 +01:00