<feed xmlns='http://www.w3.org/2005/Atom'>
<title>otp.git/lib, branch OTP-19.3.2</title>
<subtitle>Mirror of Erlang/OTP repository.
</subtitle>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/'/>
<entry>
<title>Update release notes</title>
<updated>2017-03-31T10:59:07+00:00</updated>
<author>
<name>Erlang/OTP</name>
<email>otp@erlang.org</email>
</author>
<published>2017-03-31T10:59:07+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=19427107ca9305a931dcaea8c2134017aa385fbd'/>
<id>19427107ca9305a931dcaea8c2134017aa385fbd</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Update version numbers</title>
<updated>2017-03-31T10:58:36+00:00</updated>
<author>
<name>Erlang/OTP</name>
<email>otp@erlang.org</email>
</author>
<published>2017-03-31T10:58:36+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=71f7e9155c4867f4e8036704337c21127f508dfb'/>
<id>71f7e9155c4867f4e8036704337c21127f508dfb</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'kellymclaughlin/crypto/aes_cfb_128/PR-1393/OTP-14313' into maint-19</title>
<updated>2017-03-31T10:58:35+00:00</updated>
<author>
<name>Erlang/OTP</name>
<email>otp@erlang.org</email>
</author>
<published>2017-03-31T10:58:35+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=b209cea8bd69aa71aef919e794988d3367f36891'/>
<id>b209cea8bd69aa71aef919e794988d3367f36891</id>
<content type='text'>
* kellymclaughlin/crypto/aes_cfb_128/PR-1393/OTP-14313:
  Fix bug with AES CFB 128
  Demonstrate the bug with AES CFB 128 encryption
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* kellymclaughlin/crypto/aes_cfb_128/PR-1393/OTP-14313:
  Fix bug with AES CFB 128
  Demonstrate the bug with AES CFB 128 encryption
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'voltone/inets/httpc_redirect_normalize_host/PR-1381/OTP-14301' into maint-19</title>
<updated>2017-03-31T10:58:34+00:00</updated>
<author>
<name>Erlang/OTP</name>
<email>otp@erlang.org</email>
</author>
<published>2017-03-31T10:58:34+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=cb1b5ecaf0fb8740e114b127efd0b86f279e9f7f'/>
<id>cb1b5ecaf0fb8740e114b127efd0b86f279e9f7f</id>
<content type='text'>
* voltone/inets/httpc_redirect_normalize_host/PR-1381/OTP-14301:
  Omit port from Host header on redirect to well-known port
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* voltone/inets/httpc_redirect_normalize_host/PR-1381/OTP-14301:
  Omit port from Host header on redirect to well-known port
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'ingela/maint-19/active-once/ERL-371/OTP-14300' into maint-19</title>
<updated>2017-03-31T10:58:33+00:00</updated>
<author>
<name>Erlang/OTP</name>
<email>otp@erlang.org</email>
</author>
<published>2017-03-31T10:58:33+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=42d3750f90f729b0aaa6e77a6e621e3d3798b76a'/>
<id>42d3750f90f729b0aaa6e77a6e621e3d3798b76a</id>
<content type='text'>
* ingela/maint-19/active-once/ERL-371/OTP-14300:
  ssl: Prepare for release
  ssl: Avoid data loss in active once
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* ingela/maint-19/active-once/ERL-371/OTP-14300:
  ssl: Prepare for release
  ssl: Avoid data loss in active once
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'hans/ssh/daemon_info_crash_ip/OTP-14298' into maint-19</title>
<updated>2017-03-31T10:58:33+00:00</updated>
<author>
<name>Erlang/OTP</name>
<email>otp@erlang.org</email>
</author>
<published>2017-03-31T10:58:33+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=d4a21ffc3300a779880eacebd857d6f03275ec90'/>
<id>d4a21ffc3300a779880eacebd857d6f03275ec90</id>
<content type='text'>
* hans/ssh/daemon_info_crash_ip/OTP-14298:
  ssh: fixed crash in ssh:daemon_info
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* hans/ssh/daemon_info_crash_ip/OTP-14298:
  ssh: fixed crash in ssh:daemon_info
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix bug with AES CFB 128</title>
<updated>2017-03-29T14:49:17+00:00</updated>
<author>
<name>Kelly McLaughlin</name>
<email>kelly@kelly-mclaughlin.com</email>
</author>
<published>2017-03-29T14:49:17+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=25b8f8119f5b64b5c07cb5ed4978f7df64d4799f'/>
<id>25b8f8119f5b64b5c07cb5ed4978f7df64d4799f</id>
<content type='text'>
Fix a bug with the use of the aes_cfb128 cipher by calling the correct
underlying openssl interface function when the cipher is specified.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix a bug with the use of the aes_cfb128 cipher by calling the correct
underlying openssl interface function when the cipher is specified.
</pre>
</div>
</content>
</entry>
<entry>
<title>Demonstrate the bug with AES CFB 128 encryption</title>
<updated>2017-03-29T13:24:46+00:00</updated>
<author>
<name>Kelly McLaughlin</name>
<email>kelly@kelly-mclaughlin.com</email>
</author>
<published>2017-03-29T13:24:46+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=59099922f53a478903da304cc591c4baae549dc5'/>
<id>59099922f53a478903da304cc591c4baae549dc5</id>
<content type='text'>
Demonstrate a bug with AES CFB 128 for certain key sizes introduced
with the Erlang 19.0 release. The code in the block_crypt_nif function
in the crypto.c source file incorrectly calls aes_cfb_8_crypt when the
specified cipher is aes_cfb8 or aes_cfb128 and the key size is 24 or
32. The aes_cfb_8_crypt function calls the AES_cfb8_encrypt function
from the openssl interface, but this is incorrect when the cipher is
aes_cfb128.

Unfortunately the test cases in the crypto test suite are insufficient
to detect an issue like this because it exercises the encryption and
decryption roundtrip using the same incorrect underlying function. The
problem was observed when trying to update an application to Erlang 19
that attempted to decrypt data that was encrypted using aes_cfb128 by
another source. In this commit I altered the crypto test suite to
provide a demonstration of this problem.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Demonstrate a bug with AES CFB 128 for certain key sizes introduced
with the Erlang 19.0 release. The code in the block_crypt_nif function
in the crypto.c source file incorrectly calls aes_cfb_8_crypt when the
specified cipher is aes_cfb8 or aes_cfb128 and the key size is 24 or
32. The aes_cfb_8_crypt function calls the AES_cfb8_encrypt function
from the openssl interface, but this is incorrect when the cipher is
aes_cfb128.

Unfortunately the test cases in the crypto test suite are insufficient
to detect an issue like this because it exercises the encryption and
decryption roundtrip using the same incorrect underlying function. The
problem was observed when trying to update an application to Erlang 19
that attempted to decrypt data that was encrypted using aes_cfb128 by
another source. In this commit I altered the crypto test suite to
provide a demonstration of this problem.
</pre>
</div>
</content>
</entry>
<entry>
<title>ssl: Prepare for release</title>
<updated>2017-03-27T13:21:02+00:00</updated>
<author>
<name>Ingela Anderton Andin</name>
<email>ingela@erlang.org</email>
</author>
<published>2017-03-27T13:21:02+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=d72eceee193f2c2e3be1214a19188bcc1b76c428'/>
<id>d72eceee193f2c2e3be1214a19188bcc1b76c428</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>ssl: Avoid data loss in active once</title>
<updated>2017-03-27T12:50:52+00:00</updated>
<author>
<name>Ingela Anderton Andin</name>
<email>ingela@erlang.org</email>
</author>
<published>2017-03-16T15:53:50+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=8b10920bd6b41cb2a3d12a23e3edd9457d0ab102'/>
<id>8b10920bd6b41cb2a3d12a23e3edd9457d0ab102</id>
<content type='text'>
Emulate active once in such a way that data recived by the TLS
connection process, but not fetch via active once option
by the user, can be delivered at next active once before final close.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Emulate active once in such a way that data recived by the TLS
connection process, but not fetch via active once option
by the user, can be delivered at next active once before final close.
</pre>
</div>
</content>
</entry>
</feed>
