-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
tls_sendmsg should send partial data for TCP #29
Comments
Sounds reasonable to transparently assemble records from kvec (simply by iterating over scatter/gather array passed) so user space does not have to care about it. I don't like the buffer approach, is it really needed here? Nevertheless, I would consider to send payload based on MTU set by
Return values have to be reviewed. To be honest, I did not give any special care to return values at all (https://github.com/fridex/af_ktls/issues/3). |
OpenSSL[1] segments data into record buffers if size overflows. [1] https://www.ibm.com/support/knowledgecenter/ssw_i5_54/apis/sslwrite.htm |
fixed by #62 |
Why is this closed? #62 fixes recv partial data. It hasn't changed send. |
Reopening... |
implemented in #84 |
Currently tls_sendmsg does a size check:
if (size > KTLS_MAX_PAYLOAD_SIZE) { ret = -E2BIG; goto send_end; }
For tcp, we should be sending KTLS_MAX_PAYLOAD_SIZE bytes, and returning the number of bytes sent, or providing a socket buffer somehow.
I think this is probably OK for UDP/DTLS though.
The man page says it should be EMSGSIZE:
The text was updated successfully, but these errors were encountered: