Age | Commit message (Collapse) | Author |
|
|
|
|
|
* dgud/wx/fix-livelock/OTP-14289:
Avoid livelock in driver when batching commands
|
|
* tsloughter/ct_slave-nodename-inconsistency/PR-1095/OTP-13806:
handle ct_slave nodename in the same way as net_kernel
|
|
|
|
It was erroneously stated in 2e25e7890af04d9001fa777d848ebce6d059edf2 that it was retired
|
|
|
|
With a bad timing in wx:batch() the driver could get stuck
handling commands without ever checking for gui events.
Avoid that by exiting loop after the driver have done cond_wait a
couple of times.
|
|
causes a case-clause error, as the calender:local_time_to_universal_time_dst/1
can return an empty list, which is not currently handled.
When called with an invalid DST time:
1> httpd_util:rfc1123_date({{2017, 03, 26},{1, 0, 0}}).
** exception error: no case clause matching []
in function httpd_util:rfc1123_date/1 (httpd_util.erl, line 334)
To alleviate this, simply add a clause to handle the empty list and return the
original time in the expected rfc1123 format. This is the approach of other
modules which make use of the calender:local_time_to_universal_time_dst/1
function. The formatted date is then returned without error:
2> httpd_util:rfc1123_date({{2017, 03, 26},{1, 0, 0}}).
"Sun, 26 Mar 2017 01:00:00 GMT"
|
|
deleted a <c> tag which was is not allowed inside the <pre> tag
|
|
which serves no purpose after all the
hipe load&purge fixes merged at
32729cab75325de58bf127e6e8836348071b8682
|
|
|
|
|
|
|
|
|
|
|
|
* ingela/ssl/dtls-cookie/OTP-14076:
dtls: Implement DTLS cookie secret generation
|
|
fix docs typo: details
|
|
|
|
|
|
|
|
Conflicts:
OTP_VERSION
erts/vsn.mk
lib/crypto/c_src/crypto.c
lib/crypto/src/crypto.erl
lib/ssh/src/ssh.erl
|
|
to run 3*3 seconds to avoid timeout on slow machines.
|
|
* g-andrade/strong-random-numbers/PR-1367/OTP-14317:
Clean up documentation and test cases
Attempt faster approach to strong random floats
Allow for crypto upgrades when using rand plugin
fixup! Support cryptographically strong rand plugin
fixup! Support cryptographically strong rand plugin
fixup! Support cryptographically strong rand plugin
fixup! Support cryptographically strong rand plugin
No longer expose strong_rand_(range|float)
Support cryptographically strong rand plugin
Restyle crypto strong numeric generators for usage in rand
Support generation of strong random numbers
|
|
* ingela/inets/tests-cuddle:
inets: Do not test https/ftps if crypto can not start
|
|
* hasse/debugger/fix_edit_variable/OTP-14318:
debugger: Enable editing of bit strings in the bindings area
debugger: Remove a debug printout
|
|
|
|
|
|
run_workers/* -> run_smp_workers/*
run_workers_do/4 -> run_sched_workers/4
|
|
ETS: Allow for conditional insertions
|
|
The evaluated string looked like "V=<<1>>", which cannot be scanned
correctly. A space after "=" fixes the bug.
|
|
|
|
Commit d2be06f introduced xmllint warnings.
|
|
* dgud/observer/keep-selection/OTP-14270:
observer: (re)store config
observer: Use event info to get active tab
observer: Keep sel after column change tv
observer: Keep port selection after refresh
observer: Keep tv selection after refresh
|
|
|
|
Signed-off-by: Stephan Renatus <[email protected]>
|
|
Add a no_native option to modules with an on_load
|
|
* egil/kernel/refactor-supervisor/OTP-14315:
Update primary bootstrap
kernel: Refactor supervision tree
|
|
|
|
|
|
maint-19
* kellymclaughlin/crypto/aes_cfb_128/PR-1393/OTP-14313:
Fix bug with AES CFB 128
Demonstrate the bug with AES CFB 128 encryption
|
|
into maint-19
* voltone/inets/httpc_redirect_normalize_host/PR-1381/OTP-14301:
Omit port from Host header on redirect to well-known port
|
|
* ingela/maint-19/active-once/ERL-371/OTP-14300:
ssl: Prepare for release
ssl: Avoid data loss in active once
|
|
* hans/ssh/daemon_info_crash_ip/OTP-14298:
ssh: fixed crash in ssh:daemon_info
|
|
|
|
By having ErLLVM explicitly tell LLVM which architecture we're expecting
it to compile for we remove the risk of having LLVM generate amd64 code
for a x86 VM.
|
|
Use maps in definitions to make them more readable.
|
|
|
|
* goeldeepak/erts/fix_inet_gethost_long/ERL-61/PR-1345/OTP-14310:
This patch fixes the issue in which erlang fails to start if the hostname is 64 characters on a linux system.
|
|
Fix a bug with the use of the aes_cfb128 cipher by calling the correct
underlying openssl interface function when the cipher is specified.
|