Age | Commit message (Collapse) | Author |
|
|
|
Add ext to table/system information
Add add_backend_type
|
|
|
|
Should maybe be moved to mnesia.erl and inlined??
Or is it used elsewhere?
|
|
new protocol version to handle new schema fields
|
|
|
|
|
|
* raimo/polish-gen_statem/OTP-13065:
Fix all seealso and other minor changes
Editorial update
|
|
|
|
* kostis/hipe/add-bs_match-tests/PR-1044/OTP-13549:
Up the limit for the timetrap used in the HiPE testsuite
One more test suite for binary pattern matching
|
|
* kostis/os_mon/fix-compilation-sparc/PR-1046/OTP-13548:
Fix compilation on SUN/SPARC by including <stdlib.h>
|
|
* egil/et/fix-trace-tags/OTP-13545:
et: Update runtime dependencies
et: Update gc trace tags in selector
et: Remove unnecessary boilerplate in tests
|
|
* egil/runtime_tools/fix-runtime-deps:
runtime_tools: Update runtime deps
|
|
* ingela/inets/next-version:
inets: Prepare for release
Conflicts:
lib/inets/vsn.mk
|
|
|
|
* ingela/ssl/prepare-for-release:
ssl: Prepare for release
Conflicts:
lib/ssl/vsn.mk
|
|
* dgud/wx/compatible-with-wxW-3.1:
Test cuddle, increase sleep
wx: Fix warnings in example
Fix argv types
wx: Remove non implemented wxGauge functions
|
|
* dgud/observer/fixbugs:
Fix left column text width
observer: Remove ignored alignment flag
observer: Fix timing issue
Observer: do not create PaintDC outside of paint callbacks
observer: Reduce flicker in table info on windows
|
|
raimo/polish-gen_statem/OTP-13065
Conflicts:
lib/stdlib/doc/src/gen_statem.xml
|
|
* kennethlakin/tls-use-negotiated-prf/PR-1042/OTP-13546:
ssl: Use cipher suite's PRF in prf/5
|
|
* ingela/ssl/memory-foot-print:
ssl: Add reinitialization of handshake data lost in gen_statem refactorization
|
|
Missed in commit d6b3b84a.
|
|
The pretty-printing of `...' in map types is complex. The
representation of `...' can be changed before OTP 19.
|
|
|
|
Some wild attributes are no longer mentioned separately.
|
|
|
|
'callback' and 'optional_callbacks' are no longer wild attributes.
|
|
|
|
|
|
In particular, types and specs can be pretty-printed.
There are issues with macros (left behind by epp_dodger).
Typed record fields are handled. Fields are represented by triples
instead of two-tuples, which is an incompatible change.
Some attributes (-export_type, -spec, -type, &c) have been given
meaning in recent time, but the set of wild attributes (see Barklund's
spec) is not changed.
|
|
|
|
|
|
* bjorn/stdlib/warning-and-error/OTP-13476:
Add documentation
epp: Add the -error and -warning directives
epp: Refactor expansion of header path
|
|
In current deprecated warnings such as `crypto:rand_bytes/1 is deprecated
and will be removed in in a future release; use crypto:strong_rand_bytes/1`,
the word "in" is duplicated.
|
|
|
|
cpu_sup:util/0,1 works on OSX as well.
|
|
- use Sint for 'left' and Uint for 'pos'
- cost_to_proc(): adjust types, remove unused return value
- copy_utf8_bin(): return Uint
- characters_to_utf8_trap(): remove harmful cast
- unicode_characters_to_binary_2(): correct types in debug code
- erts_convert_filename_to_encoding(): remove useless cast
|
|
- struct erl_heap_fragment: use Uint for sizes
- erl_nif.c: use size_t for sizes
- erts_heap_frag_shrink(): remove now redundant cast
|
|
|
|
|
|
If underlying tcp connection is closed and LDAP operation returned tcp error,
then client applications tend to close ldap handle with eldap:close.
This will cause do_unbind to throw gen_tcp_error, which is unhandled
and will be sent to linked process as {nocatch, {gen_tcp_error, ...}}.
eldap should ignore gen_tcp_error during close, because it will be closing anyway.
|
|
|
|
Use the negotiated cipher suite's PRF algorithm in calls to
ssl:prf/5, rather than a hard-coded one.
For TLS 1.0 the PRF algorithm was hard-coded to MD5/SHA1. This
was correct 100% of the time.
For TLS 1.1 and 1.2 the PRF algorithm was hard-coded to SHA256.
This was correct only some of the time for TLS 1.2 and none of the
time for TLS 1.1. Because the TLS handshake code calls tls_v1:prf/5
through another path, the handshaking process used the negotiated
PRF and did not encounter this bug.
A new test (prf) has been added to ssl_basic_SUITE to guard against future
breakage.
|
|
To return a peer_fsm/transport pair given one of them.
|
|
To return information about a single peer_ref(), to avoid having to
retrieve more than is needed with service_info/2.
|
|
and do the following changes:
in erl_types: export the type and an appropriate constructor for it
in dialyzer_contracts: perform all necessary code modifications to
fix all dialyzer warnings
Although no warnings are reported by dialyzer, it's quite possible that
these are not the only places where the opacity of the var_table() data
structure is violated. But I decided to leave these places for a better
version of dialyzer to discover...
|
|
|
|
as an enum and replace _MAX with _END
|
|
i.e enable all send/receive trace.
|
|
|