From 2dd69e1c05b0d914b692d32f6cf47eb1a4eea8db Mon Sep 17 00:00:00 2001 From: k-stachowiak Date: Tue, 30 Apr 2019 12:32:11 +0200 Subject: [PATCH] Backport a doxygen note from development for `mbedtls_ssl_conf_max_frag_len()` --- include/mbedtls/ssl.h | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/include/mbedtls/ssl.h b/include/mbedtls/ssl.h index 9f444133f..da0c5ca20 100644 --- a/include/mbedtls/ssl.h +++ b/include/mbedtls/ssl.h @@ -2115,6 +2115,10 @@ void mbedtls_ssl_conf_cert_req_ca_list( mbedtls_ssl_config *conf, * negotiate with the server during handshake) * (Default: #MBEDTLS_SSL_MAX_FRAG_LEN_NONE) * + * \note With TLS, this currently only affects ApplicationData (sent + * with \c mbedtls_ssl_read()), not handshake messages. + * With DTLS, this affects both ApplicationData and handshake. + * * \note On the client side, the maximum fragment length extension * *will not* be used, unless the maximum fragment length has * been set via this function to a value different than