mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-02 12:14:38 +02:00
Adds new WOLFSSL_ALLOW_MAX_FRAGMENT_ADJUST
macro around non-standard feature. This allows for adjustment of the maximum fragment size post handshake.
This commit is contained in:
@@ -1954,6 +1954,7 @@ int wolfSSL_UseMaxFragment(WOLFSSL* ssl, byte mfl)
|
|||||||
if (ssl == NULL)
|
if (ssl == NULL)
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
|
|
||||||
|
#ifdef WOLFSSL_ALLOW_MAX_FRAGMENT_ADJUST
|
||||||
/* The following is a non-standard way to reconfigure the max packet size
|
/* The following is a non-standard way to reconfigure the max packet size
|
||||||
post-handshake for wolfSSL_write/woflSSL_read */
|
post-handshake for wolfSSL_write/woflSSL_read */
|
||||||
if (ssl->options.handShakeState == HANDSHAKE_DONE) {
|
if (ssl->options.handShakeState == HANDSHAKE_DONE) {
|
||||||
@@ -1968,6 +1969,7 @@ int wolfSSL_UseMaxFragment(WOLFSSL* ssl, byte mfl)
|
|||||||
}
|
}
|
||||||
return WOLFSSL_SUCCESS;
|
return WOLFSSL_SUCCESS;
|
||||||
}
|
}
|
||||||
|
#endif /* WOLFSSL_MAX_FRAGMENT_ADJUST */
|
||||||
|
|
||||||
/* This call sets the max fragment TLS extension, which gets sent to server.
|
/* This call sets the max fragment TLS extension, which gets sent to server.
|
||||||
The server_hello response is what sets the `ssl->max_fragment` in
|
The server_hello response is what sets the `ssl->max_fragment` in
|
||||||
|
Reference in New Issue
Block a user