Age | Commit message (Collapse) | Author |
|
|
|
Also: Compatibility functions for aes_ctr in historic crypto libs
|
|
Unnecessary, because the underlying crypto libraries handles this case.
Also:
- Relax the condition of binary Key and IV
-Fix bug for empty data on historic cryptolibs because tests fails for
empty data on at least aes_cfb8 on OpenSSL 0.9.8h. It does not fail
on OpenSSL 0.9.8zh.
|
|
Conflicts:
lib/ssl/src/ssl.erl
lib/ssl/src/tls_connection.erl
|
|
* ingela/ssl/transport-transparance/ERL-861/OTP-15679:
ssl: Fix transport transparancy
|
|
* john/compiler/fix-eq-type-infererence-in-validator/ERL-886:
beam_validator: Infer types on both sides of '=:='
|
|
Tracing would be left hanging if the test timed out, causing later
tests to fail.
|
|
|
|
maint-21
* ingela/ssl/recv-timeout-bug/ERL-884/ERL-883/OTP-14701:
ssl: Cancel recv timer in all places
|
|
* ingela/ssl/transport-transparance/ERL-861/OTP-15679:
ssl: Fix transport transparancy
|
|
|
|
|
|
|
|
Store cipher suite information in session record.
Test ssl:connection_information/1 in a TLS 1.3 connection.
Change-Id: I7193e6dd2544540e446b5777b5768806cecf2bd3
|
|
|
|
These functions were added in erl_interface-3.11
|
|
|
|
Allow list of chunks to be given to strip*()
OTP-15680
|
|
* ingela/ssl/public_key/verify_fun-doc-error/ERL-887:
public_key: Correct documentation of verify_fun
|
|
|
|
The script would hang if no local hex had been installed previously.
|
|
Previously erl_call relied on the implicit initialization made
of the ei-lib if no explicit initialization had been done. This
implicit initialization was utterly broken and was removed in
erl_interface-3.11 (OTP 21.3) since it has been documented for
a very long time that an explicit initialization is required.
|
|
Modules like 'merl' and 'erl_prettypr' could be loaded during the
actual test, causing them to be traced too.
|
|
* peterdmv/ssl/client-auth/OTP-15591:
ssl: Improve ssl logging
ssl: Test handling of signature algorithms
ssl: Handle unencrypted Alert (Illegal Parameter)
ssl: Improve verification of received Certificate
ssl: Fix Alert logging
ssl: Fix get_handshake_context/2
ssl: Test HelloRetryRequest with client auth
ssl: Verify signature algorithm in CV
ssl: Verify CertificateVerify
ssl: Test client authentication with certificate
ssl: Validate client certificates (TLS 1.3)
ssl: Test client authentication (empty cert)
ssl: Implement state 'wait_cert'
ssl: Add ssl logger support for CertificateRequest
ssl: Fix ssl alerts
Change-Id: Id4ba14d373f116038a7cb3ff9fc33faed23031c8
|
|
|
|
* hans/crypto/fix_chacha20_bug/OTP-15678:
crypto: Disable chacha20 if OpenSSL 1.1.0-1.1.0c
|
|
|
|
The parsing of the OTP doc seldom fails but in the rare cases it does
not find a function signature hide the error by default. If the user
wish to be notified they may customize `erldoc-no-signature-function'.
Sorry for breaking the "Let it crash!" rule ;)
|
|
Before this commit some function signatures were missed when parsing
the html doc of OTP 21.3. After this commit more are collected but
still two signatures are missed (erlang:statistics/1 and
filename:basedir/3).
|
|
Since Emacs 26 make-symbolic-link will by default not expand a leading
~ in the target. Let's do it ourselves then i guess.
|
|
Would cause connection to crash although all data was delivered to ssl:recv
|
|
due to a bug. The cipher first appeared in 1.1.0
|
|
Returned the atom notsup instead of the exception notsup.
|
|
* sverker/ets-select-fixation-owner-change-bug/OTP-15672:
erts: Fix ets:select table fixation leak at owner change
erts: Refactor common things into traverse_context_t
stdlib: Clarify docs for ets:info(_, safe_fixed)
|
|
Remove function ssl:set_log_level/1. Its functionality is already
implemented by logger:set_application_level/2.
Set log level for ssl modules to debug at application start.
Former implementation required an extra call to
logger:set_application_level/2 (beside setting ssl option
{log_level, debug}) to enable debug logging.
Change-Id: Id21be7fd58915e11124cc136bb92d8a7526b8a74
|
|
Change-Id: I433924f9c590efa94423db5df52dd3f5d53d9d20
|
|
Handle unencrypted 'Illegal Parameter' Alerts from openssl s_client
when the server's connection states are already stepped into
traffic encryption.
Change-Id: I10951a9061e6f4b13d8ddb8ab99f8a812a483113
|
|
Validate peer certificate against supported signature algorithms.
Send 'Hanshake Failure' Alert if signature algorithm is not
supported by the server.
Change-Id: Iad428aad337f0f9764d23404c203f966664c4555
|
|
Report the role of the peer when logging incoming Alerts.
Change-Id: I7eec46bc36f9080f5087b6a38e7f14ac628fe286
|
|
Optimize tail-recursive calls of BIFs
OTP-15674
|
|
* maint:
Updated OTP version
Prepare release
|
|
|
|
|
|
|
|
|
|
Symtom:
ETS table remains fixed after finished ets:select* call.
Problem:
The decision to unfix table after a yielding ets:select*
is based on table ownership, but ownership might have changed
while ets:select* was yielding.
Solution:
Remember and pass along whether table was fixed
when the traversal started.
|
|
It's about the *last* time the table went from unfixed to fixed,
not the first time it ever did.
|
|
* john/compiler/float-opt-guard-fix:
beam_ssa_opt: Fix crash in ssa_opt_float
|
|
|
|
|