Patch Package | OTP 28.1.1 |
Git Tag | OTP-28.1.1 |
Date | 2025-10-20 |
Issue Id | |
System | OTP |
Release | 28 |
Application |
diameter-2.5.2 #
The diameter-2.5.2 application can be applied independently of other applications on a full OTP 28 installation.
- OTP-19768
-
Added documentation about ‘proxy’ and ‘resend’ options in diameter:handle_request/3
Full runtime dependencies of diameter-2.5.2
erts-10.0, kernel-3.2, ssl-9.0, stdlib-5.0
erts-16.1.1 #
The erts-16.1.1 application can be applied independently of other applications on a full OTP 28 installation.
- OTP-19790
-
- Related Id(s):
Fixed the
erl
documentation of the default timewarp mode used. - OTP-19799
-
- Related Id(s):
The
erlang:suspend_process()
BIFs failed to suspend processes currently executing on dirty schedulers.
Full runtime dependencies of erts-16.1.1
kernel-9.0, sasl-3.3, stdlib-4.1
kernel-10.4.1 #
The kernel-10.4.1 application can be applied independently of other applications on a full OTP 28 installation.
- OTP-19796
-
- Related Id(s):
-
ERIERL-1264, PR-10248
With this change group.erl will not crash when receiving unknown message.
Full runtime dependencies of kernel-10.4.1
crypto-5.0, erts-15.2.5, sasl-3.0, stdlib-6.0
ssl-11.4.1 #
Note! The ssl-11.4.1 application cannot be applied independently of other applications on an arbitrary OTP 28 installation.
On a full OTP 28 installation, also the following runtime
dependencies have to be satisfied:
-- crypto-5.7 (first satisfied in OTP 28.1)
-- public_key-1.18.3 (first satisfied in OTP 28.1)
- OTP-19774
-
Fixed so that sending of application data will adhere to max_fragment_length. This was broken in OTP-27 release by an optimization.
- OTP-19780
-
PR-10046 put to hard requirements on key file content. Make sure same file can be used as keyfile and certfile
- OTP-19791
-
- Related Id(s):
Assert that hello extensions are unique and send an illegal parameter alert if they are not.
- OTP-19806
-
- Related Id(s):
Avoid sending an internal message to the user process in conjunction with handling a key update.
Full runtime dependencies of ssl-11.4.1
crypto-5.7, erts-16.0, inets-5.10.7, kernel-10.3, public_key-1.18.3, runtime_tools-1.15.1, stdlib-7.0
xmerl-2.1.7 #
The xmerl-2.1.7 application can be applied independently of other applications on a full OTP 28 installation.
- OTP-19792
-
- Related Id(s):
-
PR-10249, ERERL-1261
The XSD validation failed due to not handling the optional text blocks correctly in an XSD complex type with attribute
mixed=true
.
Full runtime dependencies of xmerl-2.1.7
erts-6.0, kernel-8.4, stdlib-2.5
Thanks To #
Daniel Gorin, Dmytro Lytovchenko, Jean-Philippe Jodoin