Re: To Heikki Linnakangas 2016-09-15 
> > Can you elaborate? Are you saying that Debian 9 (strect) will not ship
> > OpenSSL 1.0.2 anymore, and will require using OpenSSL 1.1.0?
> I thought that was the plan, but upon asking on #debian-devel, it
> seems it's not set yet. I'll ask the maintainers directly and report
> back.

The plan is to ship only OpenSSL 1.1 in Stretch. (The list of packages
not yet ported is enormous, though, so I'm not yet sure it will really

Re: Tom Lane 2016-09-16 <>
> > Here is the result of backporting the sum of the two patches on top of 
> > REL9_4_STABLE. Not sure if we need this, but if we do we can apply this 
> > patch.
> If someone's done the legwork, I think we would be well advised to
> back-patch.  Maybe not bother with 9.1 though.

Thanks for the patch!

I just tried to apply it to 9.2. There was a conflict in which was
trivial to resolve.

Another conflict in contrib/pgcrypto/pgcrypto.c was not applicable
because the code doesn't seem to exist (didn't try very hard though).

Ignoring the contrib conflict, it still didn't compile:

 In function ‘secure_write’:
 error: dereferencing pointer to incomplete type ‘SSL {aka struct ssl_st}’
    if (port->ssl->state != SSL_ST_OK)
 error: ‘SSL_ST_OK’ undeclared (first use in this function)
    if (port->ssl->state != SSL_ST_OK)


Sent via pgsql-hackers mailing list (
To make changes to your subscription:

Reply via email to