Age | Commit message (Collapse) | Author |
|
|
|
The ASN-1 compiler could not handle these IMPORTS properly causing
compilation errors.
|
|
First attempt to add PKCS-7 does not compile
|
|
* ia/ssl/terminate-handling/OTP-10574:
ssl: Make sure that the ssl connection process will not hang in terminate function.
ssl: Add default values to emulated socket options in internal record
|
|
* sverk/hipe-solaris-m4-bug/OTP-10577:
erts: Change assembler comment for hipe on x86 and amd64
erts: Fix compile error on solaris in generated hipe_amd64_bifs.S
|
|
Previously done for ppc in c469d8ce14e9544a297d9af48c9da43137122d9a
|
|
|
|
function.
Avoid doing gen_tcp/inet socket operations in terminate if socket
is already closed. Call gen_tcp:recv/3 in the "data delivery workaround"
to avoid hanging.
|
|
The absence of the active default values could cause a process leak
|
|
* sverk/halfword-valgrind-suppressions:
crypto: Add valgrind suppression for AES_cbc_encrypt
erts: Expand valgrind suppression for zlib
Add extra valgrind suppression file for halfword emulator
|
|
* bjorn/compiler/binary-matching/OTP-10567:
Fix compiler crash for binary matching and a complicated guard
|
|
* rickard/port-sched-bug/OTP-10556:
Fix bug in erts_port_task_schedule()
|
|
* rickard/sched-wakeup/OTP-10476:
Use reduction limit in order to determine when to do wakeup
|
|
|
|
* fredrik/ssh-password-conf/OTP-10511:
Ssh appup modifications
Updated appup for ssh
Bumped revision
Removed some testing variables
ssh_opts is now a proper list
After auth rsa and dsa passwords is set to undefined
Removing the password after auth
|
|
|
|
* lukas/common_test/multi_require_bug/OTP-10572:
Fix bug where require of same name at same config would return name in use
|
|
|
|
* ia/ssl/gen-fsm-timout/OTP-10569:
ssl: Do not use gen_fsm:sync_send_all_state_event/3 timeout
|
|
The gen_fsm:sync_send_all_state_event/3 timout is a client side timeout.
If timeouts are needed we want them to be server side timeouts.
|
|
* fredrik/ssh-quiet-mode/OTP-10429:
Doc for quiet_mode
SSH quiet mode
|
|
|
|
* bjorn/erts/binary-append/OTP-10524:
Fix binary append exceptions
|
|
|
|
|
|
* anders/diameter/upgrade/OTP-10550:
Allow for no diameter on remote node in connection guard
|
|
* anders/diameter/peer_mapping/OTP-10470:
Document peer_ref() service_info
Use peer_ref() service_info in traffic suite
Add service_info for a peer_ref()
|
|
* anders/diameter/shared_transport/OTP-10443:
Use multiple connections in traffic suite
Implement service_opt() restrict_connections
Document service_opt() restrict_connections
|
|
* anders/diameter/sequence_masks/OTP-10445:
Redo watchdog test suite
Update/clarify some comments
Add reopen message from watchdog
Add options service_info
Add diameter_reg:wait/1
Clarify diameter_transport doc
Remove pre-OTP configure support
Remove obsolete make target
Use sequence masks in test suites
Implement sequence masks
Document sequence masks
|
|
|
|
The compiler would crash when attempting to compile a function
head that did binary matching and had a complex expression using
'andalso' and 'not'.
Noticed-by: José Valim
|
|
|
|
* anders/diameter/patch/R15B02/OTP-10555:
vsn -> 1.2.1
Update appup for OTP-10461/10550
Allow for no diameter on remote node in connection guard
Add missing clause for peer failover
|
|
|
|
|
|
anders/diameter/patch/R15B02/OTP-10555
* anders/diameter/patch/R15B02/upgrade/OTP-10550:
Allow for no diameter on remote node in connection guard
|
|
anders/diameter/patch/R15B02/OTP-10555
* anders/diameter/patch/R15B02/failover_error/OTP-10461:
Add missing clause for peer failover
|
|
|
|
The guard is against a connection to a given peer already existing but
fails if diameter is not running on a remote node.
Note that the guard itself is to be made configurable in R15B03
(OTP-10493) to allow multiple connections per peer.
|
|
|
|
|
|
|
|
|
|
* fredrik/ssh-use-options-alg/OTP-10498:
Option to ssh:connect {pref_public_key_algs, list()} where you can give the algorithms you want to use
|
|
Code such as the following should cause an exception:
Bin = <<0:1>>,
<<Bin/binary,...>>
(Because the "binary" type implies that the binary must have a
size in bits that is a multiple of 8.)
Depending on the binary, either no exception was thrown or the
wrong exception was thrown (because c_p->freason was not set).
Noticed-by: Adam Rutkowski
|
|
The guard is against a connection to a given peer already existing but
fails if diameter is not running on a remote node.
Note that the guard itself is to be made configurable in R15B03
(OTP-10493) to allow multiple connections per peer.
|
|
|
|
|
|
This allows a diameter_app callback to retrieve the corresponding
configuration as passed to diameter:add_transport/2.
|
|
|