-
Notifications
You must be signed in to change notification settings - Fork 269
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement Maximum Fragment Length TLS extension #214
Comments
Do you have an actual use case for this? If so, could you please provide further details. |
Yes instead of several call on a server i would like to receive one "big" json (around 8Ko) and parse it on the go. I am not able to allocate more than 2ko of RAM for TLS. |
In what application? On Tue, Aug 30, 2016 at 03:08:50AM -0700, Cl??ment Peron wrote:
|
IOT device (cortex M4, 128ko RAM) |
So this is not a public application. Do you know if OpenSSL is taking that patch? On Tue, Aug 30, 2016 at 04:15:08AM -0700, Cl??ment Peron wrote:
|
The patch is planned to be merged post 1.10 : openssl/openssl#1008 |
+1 on this. it is very important for IoT connectivity where 16K contiguous allocation requirement is a problem. OpenSSL already supports this. |
It seems that Libressl doesn't support maximum fragment length negotiation extension : https://tools.ietf.org/html/rfc6066#page-8
A patch has been posted on openssl group https://groups.google.com/d/msg/mailing.openssl.dev/fQxXvCg1uQY/_g09FmmhvgwJ
Could you review and integrate it for 2.5.X release ? This will be very usefull for embedded clients who can't allocate big buffer in RAM.
Thanks,
The text was updated successfully, but these errors were encountered: