-----Original Message-----
The cause is the maximum record size in the specifications, any
compliant client or server might send a record of maximum size which
would then reach the requirements stated.

If the maximum record length is used an implementation can't do much
about that because it has to check the entire record integrity before
returning any data to the application. Doing anything else would be a
security hole.

There are some TLS extensions which allow the max record size to be
specified at handshake time *but* these aren't widely supported. OpenSSL
doesn't currently support TLS extensions though.

Steve.
--

I understand that when an implementation sends a maximum-length record,
my implementation must 
have a contiguous buffer large enough to hold it.  But since my
application will rarely receive
records of the maximum length, I am looking into doing some dynamic
growth of the Rx buffer.  I
would like to start it small (2K or 4K), then grow it only if the other
end sends me a larger
record.

On the transmit side, OpenSSL currently has the ability to send
arbitrarily large messages,
one 16K record at a time.  Is there any harm in me deciding to send
large messages one 4K record
at a time?

Thanks.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to