Age | Commit message (Collapse) | Author |
|
Fixed a mistake in commit 23885a.
|
|
* hans/ssh/defensics_errors:
ssh: fix error for data fields errors
ssh: fix error for bad packet lengths found by Defensics
|
|
* hans/ssh/cuddle_tests:
ssh: add econnaborted as correct tcp disconnect reason in testcase
ssh: add check for available ipv6 addr in test case
ssh: Add testcase precondition
|
|
* ia/public_key/upper_bounds/OTP-13132:
public_key: Add different upper bounds for diffrent string types
|
|
* dgud/observer/cdv-crash-truncbin/OTP-13163:
observer: Handle truncated binaries
|
|
* dgud/wx/add-toolbar-func:
wx: Add toolbar stretchablespace
|
|
|
|
|
|
* rlipscombe/rl-ssl-options:
Ensure single 'raw' option is handled correctly
Pass 'raw' options through
OTP-13166
|
|
* vladdu/jinterface_map_sortkeys:
Improve sorting order of keys in a map
|
|
* NicoK/jinterface-regression:
jinterface: fix writing small compressed values
OTP-13165
|
|
Conflicts:
OTP_VERSION
erts/doc/src/notes.xml
erts/vsn.mk
otp_versions.table
|
|
|
|
|
|
* ia/inets/windows-comp:
inets: Adjust makefile to new windows compiler
|
|
|
|
Available since 3.0
|
|
* ia/ssl/sslv3-completeness:
ssl: SSLv3 completeness
|
|
We are considering removing default support for DES cipher suites.
However this cipher suite is currently allowed in TLS and missing from
SSL.
|
|
* bjorn/stdlib/rand-export_seed/OTP-13162:
Correct rand:export_seed/0 when there is no prior seed
|
|
According to the documentation, rand:export_seed/0 should return
'undefined' if the seed has not been intialized. However, it will
create and return a seed. That means that the following code
will not work as expected:
case rand:export_seed() of
undefined -> rand:seen({1,2,3});
_ -> ok
end,
rand:uniform(Range)
|
|
* ia/ssl/max-sessions/OTP-12392:
ssl: Fix documentation mistakes
ssl: Add upper limit for session cache
ssl: Measure elapsed time with erlang:monotonic_time
|
|
|
|
* hans/ssh/pref_public_key_algs/OTP-13158:
ssh: tests skips if not supported crypto
ssh: ssh_auth checks support for user pubkey alg
ssh: client pub key opt implemented
ssh: client pub key testcase
ssh: client pub key documentation
|
|
* hb/stdlib/type_printing/OTP-13084:
doc: Fix some minor issues in Types and Function Specifications
erts: Remove CDATA from The Abstract Format document
erts: Correct the types section in The Abstract Format document
stdlib: Correct pretty-printing of map types
stdlib: Pretty-print constraints as 'V :: T'
|
|
|
|
|
|
The Types section is more consistent with Kostis' text in The
Reference Manual.
|
|
Add parentheses around annotated type union elements in map pair
types. The bug was introduced in Erlang/OTP 18.0.
|
|
Print constraints as 'V :: T' rather than 'is_subtype(V, T)'.
|
|
At the bottom of the file PKIX1Explicit88.asn1 there is a commenet
about upper bounds and diffrent types of strings. Adhere to this
so that we can accept all certificates that openSSL does.
For example: httpc:request("https://dl.sciencesocieties.org/").
|
|
|
|
|
|
|
|
|
|
* rickard/erts-print/17/OTP-13150:
Remove ERTS_PRINT_INVALID from erts_print()
|
|
Conflicts:
OTP_VERSION
erts/doc/src/notes.xml
erts/vsn.mk
lib/kernel/doc/src/notes.xml
lib/kernel/src/kernel.appup.src
lib/kernel/vsn.mk
lib/ssl/doc/src/notes.xml
lib/ssl/src/ssl.appup.src
lib/ssl/src/ssl_cipher.erl
lib/ssl/vsn.mk
otp_versions.table
|
|
Crashed when term was displayed
|
|
ERTS_PRINT_INVALID prevented file descriptor 0 to be used which
could cause an empty crash dump.
|
|
* lars/xmllint-incorrect-errors/OTP-13026:
[erl_docgen] Allow br in the tag of tagged lists
[erl_docgen] Add conversion of the i tag in the XSL specs
[erl_docgen] Correct DTD for tags anno, fsummary and add an tag i (italic).
[erl_docgen] Correct faults in the dtd
Change xmllint target
[erl_docgen] Update DTD for anno tag
|
|
* dgud/wx/rewrite-cmd-loop/OTP-13160:
wx: Fix some function specifications
wx: Remove call to disconnect_impl from server
wx: Add a command queue check after event sent to erlang
wx: Make wxPostScriptDC optional
wx: Add wxOverlay
wx: Use only one ring buffer for command queue
|
|
* bjorn/stdlib/fix-erl_lint-bugs/OTP-13157:
Extend erl_lint:format_error/1 to handle bittype mismatches
erl_lint_SUITE: Add smoke test of format_error/1
|
|
* zandra/rm-eunit-assertReceive:
rm assertReceive, due to a leftover of a conflict resolution
|
|
* mikpe/hipe_x86_signal-musl-support:
hipe_x86_signal: add support for musl libc
OTP-13159
|
|
The implementation sorted keys differently for different Java versions
(probably due to different hashing algorithms), so we switch it to use
LinkedHashMap where the order is deterministic.
|
|
|
|
|
|
|
|
|
|
If upper limit is reached invalidate the current cache entries, e.i the session
lifetime is the max time a session will be keept, but it may be invalidated
earlier if the max limit for the table is reached. This will keep the ssl
manager process well behaved, not exhusting memeory. Invalidating the entries
will incrementally empty the cache to make room for fresh sessions entries.
|