Age | Commit message (Collapse) | Author |
|
"... when _ :: ..." used to compile, but Dialyzer crashed.
|
|
sys_pre_expand used to crash. There is no known reason to
allow -callback attributes with explicit module.
|
|
product/_, union/_, range/2 as well as tuple/N (N > 0), map/N (N > 0),
atom/1, integer/1, binary/2, record/_, and 'fun'/_ can now be used as
type names.
|
|
|
|
* hb/optional_callbacks/OTP-11861:
[edoc] Handle optional behaviour callbacks
[syntax_tools] Let erl_syntax:concrete() accept the F/A syntax
Introduce the attribute -optional_callbacks in the context of behaviours
|
|
|
|
Note: `arity_qualifier` nodes are recognized. This is to follow The
Erlang Parser when it comes to wild attributes: both {F, A} and F/A
are recognized, which makes it possible to turn wild attributes into
recognized attributes without at the same time making it impossible to
compile files using the new syntax with the old version of the Erlang
Compiler.
|
|
|
|
* maint:
ssh: Doc change on max_session param
ssh: Add max_session parameter to ssh:daemon
ssh: remove confusing info in some reports
|
|
* hans/ssh/max_sessions/OTP-11885:
ssh: Doc change on max_session param
ssh: Add max_session parameter to ssh:daemon
|
|
* hans/ssh/error_msg/OTP-11883:
ssh: remove confusing info in some reports
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
* ia/ssl/remove-otdated-doc:
ssl: Remove outdated documentation
|
|
|
|
|
|
* ia/pr/339:
ssl: Fix crash on garbage during handshake
|
|
* ia/pr/340:
ssl: Refactor so that there is only one source for the default hashsign values
ssl: always pass negotiated version when selecting hashsign
ssl: TLSv1.2: proper default sign algo for RSA
|
|
* hans/ssl/ssl_crl_SUITE/win_connect_failure:
ssl: Fixes ssl_crl_SUITE errors on mixed ipv6-v4 interfaces
|
|
If a client sends some garbage in ssl record instead of
valid fragment, server crashes with function_clause while
receiving next record from client.
This patch makes server raise handshake failure instead of
crashing and exposing internal state to user code.
|
|
Also fix DTLS call to supply its corresponding TLS version
|
|
|
|
Negotiated version is now always passed to ssl_handshake:select_hashsign
because ssl_handshake:select_cert_hashsign has different rsa defaults on
tlsv1.2 and older versions.
|
|
|
|
|
|
* siri/ac-change_app_data/OTP-11864:
Store expanded config in application_controller:change_application_data
|
|
* siri/kernel_app-doc-links/OTP-11862:
Add hyperlinks to modules in reference manual for kernel application
|
|
|
|
* siri/cuddle-with-tests:
[reltool] Adapt tests to better quoting of paths on windows
[reltool] Increase timetrap timeout to handle slow test machines
Skip test when needed applications are missing
Don't allow slave nodes to survive their test case
|
|
|
|
* ia/ssl/decrypt-alert/OTP-11880:
ssl: Correct decryption error handling
|
|
|
|
* ia/ssl/recv/OTP-11878:
ssl: recv shall ruturn {error, einval} on active socket
|
|
* ia/ssl/suites-match-negotiated-version/OTP-11875:
ssl: Select supported cipher suites for the negotiated SSL/TLS-version
|
|
* ia/ssl/warning-alert/OTP-11874:
ssl: Graceful handling of warning alerts
|
|
|
|
|
|
Generalize last warning alert function clause
|
|
* maint:
hipe, dialyzer: Fix a bug concerning opaque types
|
|
* hb/dialyzer/bugfix_opaque/OTP-11869:
hipe, dialyzer: Fix a bug concerning opaque types
|
|
Dialyzer sometimes output warnings like
Attempt to test for inequality between a term of type 'false' and a
term of opaque type 'false' | gb_set()
The reason was that erl_types:t_inf/3 when called from
erl_types:t_find_unknown_opaque() did not return 'false' but found the
mismatch. It should not return the mismatch unless the intersection is
empty ('none').
Thanks to Shayan Pooya [[email protected]] for pointing out the bug.
|
|
* maint:
stdlib: Fix error message when exporting (redefined) map() type
|
|
* hb/stdlib/map_type_fix/OTP-11872:
stdlib: Fix error message when exporting (redefined) map() type
|
|
When selecting the available cipher suites for the server all cipher suites
for the highest supported SSL/TLS-version would be selected, and not
all supported for the negotiated SSL/TLS-version. This could lead
to that faulty clients could negotiate cipher suites that they
can not support. This change will enable the faulty client to negotiate
another cipher suite that it can support.
|
|
When redefining and exporting the type map() erl_lint erroneously
emitted an error. This bug has been fixed.
|