otp-ssl

Code pulled with git from git://github.com/erlang/otp.git with the last commit being

These are Intersection warnings for otp-ssl.

(Only new warnings by Intersection-enabled analysis are listed. Current public version of Dialyzer reports no warnings for this application.)

dialyzer -n -q -Wno_improper_lists --apps ssl
ssl_connection.erl:1410: The call ssl_connection:encode_handshake(Msg::#server_key_exchange{params::#server_dh_params{dh_p::binary(),dh_g::binary(),dh_y::binary()},signed_params::binary()},Version::any(),ConnectionStates0::#connection_states{},Hashes0::any()) will never return since it differs in the 1st argument from the success typing arguments: (#server_hello_done{} | #certificate{asn1_certificates::[binary()]} | #certificate_verify{signature::binary()} | #client_key_exchange{exchange_keys::#client_diffie_hellman_public{dh_public::binary()} | #encrypted_premaster_secret{premaster_secret::binary()}} | #finished{verify_data::binary()} | #certificate_request{certificate_types::<<_:8,_:_*8>>,certificate_authorities::binary()} | #client_hello{client_version::{integer(),integer()},random::<<_:256>>,session_id::binary(),cipher_suites::maybe_improper_list(binary() | maybe_improper_list(any(),binary() | []) | byte(),binary() | []),compression_methods::[<<_:8>>,...],renegotiation_info::#renegotiation_info{}} | #server_hello{server_version::{integer(),integer()},random::<<_:256>>,session_id::binary(),cipher_suite::binary(),compression_method::integer(),renegotiation_info::#renegotiation_info{renegotiated_connection::'undefined' | binary()}},{integer(),integer()},#connection_states{current_write::#connection_state{security_parameters::#security_parameters{mac_algorithm::0 | 1 | 2,compression_algorithm::0},sequence_number::number()}},{{binary(),binary()},{binary(),binary()}})