mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-01 19:54:40 +02:00
Adds new WOLFSSL_ALLOW_MAX_FRAGMENT_ADJUST
macro around non-standard feature. This allows for adjustment of the maximum fragment size post handshake.
This commit is contained in:
@@ -1954,6 +1954,7 @@ int wolfSSL_UseMaxFragment(WOLFSSL* ssl, byte mfl)
|
||||
if (ssl == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
#ifdef WOLFSSL_ALLOW_MAX_FRAGMENT_ADJUST
|
||||
/* The following is a non-standard way to reconfigure the max packet size
|
||||
post-handshake for wolfSSL_write/woflSSL_read */
|
||||
if (ssl->options.handShakeState == HANDSHAKE_DONE) {
|
||||
@@ -1968,6 +1969,7 @@ int wolfSSL_UseMaxFragment(WOLFSSL* ssl, byte mfl)
|
||||
}
|
||||
return WOLFSSL_SUCCESS;
|
||||
}
|
||||
#endif /* WOLFSSL_MAX_FRAGMENT_ADJUST */
|
||||
|
||||
/* This call sets the max fragment TLS extension, which gets sent to server.
|
||||
The server_hello response is what sets the `ssl->max_fragment` in
|
||||
|
Reference in New Issue
Block a user