Age | Commit message (Collapse) | Author |
|
* bjorn/compiler/fix-beam_except/ERL-954/OTP-15839:
Fix compiler crash in beam_except
|
|
* bjorn/compiler/fix-unsafe-type-inference/OTP-15838:
Fix unsafe negative type inference
# Conflicts:
# lib/compiler/src/beam_ssa_type.erl
|
|
* john/compiler/list_append_type/OTP-15841:
compiler: Fix broken type for erlang:'++'/2
|
|
* bjorn/erts/fix-wrong-class/ERIERL-367/OTP-15834:
Fix sticky class in exception
|
|
* bjorn/compiler/fix-receive-patch/ERL-950/OTP-15832:
Eliminate compiler crash when compiling complex receive statements
|
|
* bjorn/compiler/fix-freeze/ERL-948/OTP-15828:
Fix non-terminating compilation
|
|
* hans/crypto/enable_aes_ctr/OTP-15829:
crypto: Re-enable aes_ctr for openssl cryptolib < 1.0.1
|
|
The compiler would crash in `beam_except` while compiling this
function:
bar(Req) ->
ok = case Req of
"POST" -> {error, <<"BAD METHOD ", Req/binary>>, Req};
_ -> ok
end.
https://bugs.erlang.org/browse/ERL-954
|
|
|
|
The type optimizer pass (`beam_ssa_type`) could make unsafe
negative inferences. That is, incorrectly infer that a variable
could *not* have a particular type.
This bug was found when adding another optimization. It is not
clear how write a failing test case without that added optimization.
|
|
When catching an exception re-throwing with a changed
class, the class could be changed to the original class
if the exception got caught and rethrown in (for example)
an after block:
sticky_class() ->
try
try
throw(reason)
catch
throw:Reason:Stack ->
erlang:raise(error, Reason, Stack)
end
after
ok
end.
|
|
It was accidently disabled in the crypto:supports/0 and /1. It
worked however in the encrypt/decrypt functions.
|
|
Certain complex receive statements would result in an internal
compiler failure. That would happen when the compiler would fail
to find the common exit block following a receive. See the added
test case for an example.
https://bugs.erlang.org/browse/ERL-950
|
|
The compiler would not terminate while compiling the following code:
foo(<<N:32>>, Tuple, NewValue) ->
_ = element(N, Tuple),
setelement(N, Tuple, NewValue).
The type analysis pass would attempt to construct a huge list when
attempting analyse the type of `Tuple` after the call to
`setelement/3`.
https://bugs.erlang.org/browse/ERL-948
|
|
|
|
|
|
* ingela/ssl-flow-ctrl/ERL-934/OTP-15825:
ssl: Refactor of OTP 22 code due to patch OTP-15823
ssl: Avoid dialyzer warning
ssl: Add test cases for issue reported in ERL-938
ssl: Internal active n must back off when user does not read data
ssl: Remove legacy calls to next_record
|
|
|
|
Maybe we should only have specs for external APIs?!
This is a how to write spec problem that we have to address later.
|
|
|
|
TLS connections should not buffer too much application data if they
want to benefit from TCP flow control. Certain applications may want to
customize the value of internal_active_n as there is a tradeoff between
buffering memory and throughput.
Conflicts:
lib/ssl/src/tls_connection.erl
|
|
Conflicts:
lib/ssl/src/dtls_connection.erl
lib/ssl/src/ssl_connection.erl
|
|
|
|
|
|
After calculating the length of a list, length/1 would accidentally
bump all remaining reductions, forcing the process to yield. Correct
the calculation.
|
|
* maint:
Updated OTP version
Prepare release
|
|
=== OTP-21.3.7.1 ===
Changed Applications:
- erl_interface-3.11.2.1
Unchanged Applications:
- asn1-5.0.8
- common_test-1.17.1
- compiler-7.3.2
- crypto-4.4.2
- debugger-4.2.6
- dialyzer-3.3.2
- diameter-2.2.1
- edoc-0.10
- eldap-1.2.6
- erl_docgen-0.9
- erts-10.3.4
- et-1.6.4
- eunit-2.3.7
- ftp-1.0.2
- hipe-3.18.3
- inets-7.0.7
- jinterface-1.9.1
- kernel-6.3.1
- megaco-3.18.4
- mnesia-4.15.6
- observer-2.9
- odbc-2.12.3
- os_mon-2.4.7
- otp_mibs-1.2.1
- parsetools-2.1.8
- public_key-1.6.5
- reltool-0.7.8
- runtime_tools-1.13.2
- sasl-3.3
- snmp-5.2.12
- ssh-4.7.6
- ssl-9.2.2
- stdlib-3.8.1
- syntax_tools-2.1.7
- tftp-1.0.1
- tools-3.1
- wx-1.8.7
- xmerl-1.3.20
* tag 'OTP-21.3.7.1':
Updated OTP version
Prepare release
# Conflicts:
# OTP_VERSION
# lib/erl_interface/doc/src/notes.xml
# lib/erl_interface/vsn.mk
# make/otp_version_tickets
# otp_versions.table
|
|
|
|
|
|
* rickard/ei-nodename/OTP-15781:
Increase max number of node name characters to 256
|
|
* lukas/fix-run-dialyzer:
otp: Don't error dialyzer script if WARNINGS fail
|
|
* ingela/ssl/revert-ctrl-flow:
Revert "ssl: Add check when to toggle internal active N"
|
|
* maint:
Bump forward merge script version
|
|
|
|
* raimo/inet_crypto_dist:
Rekey also the shared secret
Use shared secret to rekey
Cycle the keypair by time and count
Set socket buffer sizes to avoid handshake deadlock
Keep the keypair for the node's lifetime
Implement some kind of PEKE to get forward secrecy
Use incrementing IV
Use Erlang cookie as shared secret
|
|
|
|
* maint:
Fix bad merge from maint-21
Fix bad merge from maint-21
Updated OTP version
Prepare release
# Conflicts:
# OTP_VERSION
# make/otp_version_tickets_in_merge
|
|
|
|
|
|
The WARNINGS set of application are know to produce warnings, so
don't fail when they do. Instead we just print them to let the
user know that they are there.
|
|
This reverts commit 6e190b012dd5a304fc42a5f3bb58ff173a23eb66.
|
|
* ingela/ssl/openssl-test-cuddle:
ssl: Add necessary compliance check
|
|
* ingela/ssl/dialyzer-fix:
ssl: Fix dialyzer spec
|
|
|
|
* sverker/ei_set_compal_rel-doc:
erl_interface: Document ei_set_compat_rel
|
|
* hasse/stdlib/optimize_io_format/OTP-15705:
stdlib: Optimize pretty printing of strings with chars_limit
stdlib: Optimize printing of maps a bit
stdlib: Optimize pretty printing of lists slightly
|
|
* ingela/ssl/cipher-suite-conversion/ERL-924/OTP-15483:
ssl: Add cipher suite convertion functions
|
|
* lukas/kernel/inet_db_fix_set_of_non-existing_file/OTP-15806:
kernel: Fix setting of non-existing file as inet_db resolv_conf
|
|
* maint-21:
Updated OTP version
Prepare release
|
|
* dgud/mnesia/pr-2216/OTP-15084:
Report stacktrace in non-transactions activity function errors.
|