mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-30 00:04:14 +01:00
Merge remote-tracking branch 'origin/pr/2410' into development
* origin/pr/2410: Update change log Document the default value for the maximum fragment length Improve clarity of mbedtls_ssl_conf_max_frag_len documentation Reword ssl_conf_max_frag_len documentation Fix typos and miswording in the mbedtls_ssl_conf_max_frag_len documentation comment Reword ssl_conf_max_frag_len documentation to clarify its necessity
This commit is contained in:
commit
7525aa06c1
@ -66,6 +66,8 @@ Changes
|
|||||||
Found by Coverity, reported and fixed by Peter Kolbus (Garmin). Fixes #2309.
|
Found by Coverity, reported and fixed by Peter Kolbus (Garmin). Fixes #2309.
|
||||||
* Add test for minimal value of MBEDTLS_MPI_WINDOW_SIZE to all.sh.
|
* Add test for minimal value of MBEDTLS_MPI_WINDOW_SIZE to all.sh.
|
||||||
Contributed by Peter Kolbus (Garmin).
|
Contributed by Peter Kolbus (Garmin).
|
||||||
|
* Change wording in the `mbedtls_ssl_conf_max_frag_len()`'s documentation to
|
||||||
|
improve clarity. Fixes #2258.
|
||||||
|
|
||||||
= mbed TLS 2.17.0 branch released 2019-03-19
|
= mbed TLS 2.17.0 branch released 2019-03-19
|
||||||
|
|
||||||
|
@ -2820,13 +2820,19 @@ void mbedtls_ssl_conf_cert_req_ca_list( mbedtls_ssl_config *conf,
|
|||||||
|
|
||||||
#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
|
#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
|
||||||
/**
|
/**
|
||||||
* \brief Set the maximum fragment length to emit and/or negotiate
|
* \brief Set the maximum fragment length to emit and/or negotiate.
|
||||||
* (Default: the smaller of MBEDTLS_SSL_IN_CONTENT_LEN and
|
* (Typical: the smaller of #MBEDTLS_SSL_IN_CONTENT_LEN and
|
||||||
* MBEDTLS_SSL_OUT_CONTENT_LEN, usually 2^14 bytes)
|
* #MBEDTLS_SSL_OUT_CONTENT_LEN, usually `2^14` bytes)
|
||||||
* (Server: set maximum fragment length to emit,
|
* (Server: set maximum fragment length to emit,
|
||||||
* usually negotiated by the client during handshake
|
* usually negotiated by the client during handshake)
|
||||||
* (Client: set maximum fragment length to emit *and*
|
* (Client: set maximum fragment length to emit *and*
|
||||||
* negotiate with the server during handshake)
|
* negotiate with the server during handshake)
|
||||||
|
* (Default: #MBEDTLS_SSL_MAX_FRAG_LEN_NONE)
|
||||||
|
*
|
||||||
|
* \note On the client side, the maximum fragment length extension
|
||||||
|
* *will not* be used, unless the maximum fragment length has
|
||||||
|
* been set via this function to a value different than
|
||||||
|
* #MBEDTLS_SSL_MAX_FRAG_LEN_NONE.
|
||||||
*
|
*
|
||||||
* \note With TLS, this currently only affects ApplicationData (sent
|
* \note With TLS, this currently only affects ApplicationData (sent
|
||||||
* with \c mbedtls_ssl_read()), not handshake messages.
|
* with \c mbedtls_ssl_read()), not handshake messages.
|
||||||
|
Loading…
Reference in New Issue
Block a user