Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
ssl/tls1.c: Hack: dump record size on hitting SSL_ERROR_RECORD_OVERFLOW.
This is MicroPython-specific hack to allow to easier understand why TLS conenction doesn't work with some sites on low-heap systems (where TLS record buffer size is set to far less than default 16K).
- Loading branch information
9b3092e
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@dpgeorge: FYI
9b3092e
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
TLS servers are always free to use packet sizes up to 16k, so it's no surprise that being a client with less than 16k buffer doesn't work.