Age | Commit message (Collapse) | Author |
|
Also fix DTLS call to supply its corresponding TLS version
|
|
Negotiated version is now always passed to ssl_handshake:select_hashsign
because ssl_handshake:select_cert_hashsign has different rsa defaults on
tlsv1.2 and older versions.
|
|
|
|
* ia/ssl/decrypt-alert/OTP-11880:
ssl: Correct decryption error handling
|
|
* ia/ssl/recv/OTP-11878:
ssl: recv shall ruturn {error, einval} on active socket
|
|
* ia/ssl/suites-match-negotiated-version/OTP-11875:
ssl: Select supported cipher suites for the negotiated SSL/TLS-version
|
|
* ia/ssl/warning-alert/OTP-11874:
ssl: Graceful handling of warning alerts
|
|
|
|
|
|
Generalize last warning alert function clause
|
|
Dialyzer sometimes output warnings like
Attempt to test for inequality between a term of type 'false' and a
term of opaque type 'false' | gb_set()
The reason was that erl_types:t_inf/3 when called from
erl_types:t_find_unknown_opaque() did not return 'false' but found the
mismatch. It should not return the mismatch unless the intersection is
empty ('none').
Thanks to Shayan Pooya [[email protected]] for pointing out the bug.
|
|
When selecting the available cipher suites for the server all cipher suites
for the highest supported SSL/TLS-version would be selected, and not
all supported for the negotiated SSL/TLS-version. This could lead
to that faulty clients could negotiate cipher suites that they
can not support. This change will enable the faulty client to negotiate
another cipher suite that it can support.
|
|
When redefining and exporting the type map() erl_lint erroneously
emitted an error. This bug has been fixed.
|
|
* kostis/dialyzer-warn_export_vars:
Correct the name of a compiler option and fix the corresponding warnings
|
|
|
|
The option `warn_export_vars` was erroneously written as `warn_exported_vars`
in Makefiles of dialyzer and typer. As a result, `erlc` was silent about such
warnings (why on earth doesn't it complain on unrecognized options??) which
were corrected as part of this change.
|
|
|
|
|
|
|
|
* github/pr/326:
Fix typo in authorized_keys filename
Fix typo in SSH docs
|
|
* anders/diameter/17.0_release/OTP-11605:
Fix diameter.hrl comment typos
|
|
A Diameter Header Command Code is 24 bits, not 8, and an Application-ID
is 32 bits, not 24.
Thanks to Austin Aigbe for pointing it out.
|
|
|
|
|
|
* egil/maps-fix-map-key-patterns:
stdlib: Fix erl_id_trans example
stdlib: Deny map keys defined as #{ .. := .. } in patterns
compiler: Fix compiling map keys in patterns from core
compiler,stdlib: Fix Map literals as keys for Maps in patterns
|
|
* vinoski/hash-update-arity:
Some more faulty deprecation warnings for crypto
|
|
|
|
* vinoski/hash-update-arity:
fix arity of crypto:hash_update/2 in deprecation warnings
|
|
|
|
|
|
|
|
|
|
* ia/public_key/doc-fix:
public_key: Fix typo
|
|
|
|
* siri/master-cuddle-with-tests:
Stop nodes after test cases in release_handler_SUITE
Add debug printouts in release_handler_SUITE:upgrade_gg
Improve printout of command when encoding is utf-8
Add debug printouts in crashdump_viewer_SUITE:load_file
|
|
* siri/deprecate-pg/OTP-11840:
Deprecate module pg
|
|
* siri/doc-upgrade/OTP-11717:
Add documentation about upgrade
Add info about upgrade of core applications
|
|
The example of how to create a first target system, which is located
in the System Principles document, is now extended to also include an
example of code upgrade.
A new chapter is added to System Principles explaining different
issues when upgrade includes new versions applications within
Erlang/OTP.
|
|
* anders/diameter/17.0_release/OTP-11605:
Bring diameter_dbg into the present
|
|
Test cases 'release_handler_which_releases' and 'upgrade_supervisor'
did not terminate the nodes they started. This might be the cause of
failing test cases further down the suite. This has been corrected.
|
|
|
|
In release_handler_SUITE, print command with ~ts instead of ~tp in
case it contains unicode characters.
|
|
|
|
* peppe/common_test/otp_17_doc:
Document the abort_if_missing_suites functionality
Document changes in the CT hooks API and the event message protocol
Document new ct_telnet logging features
|
|
* ia/public_key/doc:
public_key: Document issuer_fun option to pkix_crls_validate/3
public_key: Update outdated links
|
|
The module is just a collection of functions for retrieving or printing
information for the purpose of debugging. Various changes over several
releases had broken the table-listing functions diameter_peer/0 and
diameter_service/0. Add some minor tidying as well.
|
|
To be removed in Erlang/OTP 18
|
|
OTP-11769
|
|
OTP-11732
|
|
OTP-11440
|