Re: OpenSSL 3.0.0 compatibility - Mailing list pgsql-hackers

From Daniel Gustafsson
Subject Re: OpenSSL 3.0.0 compatibility
Date
Msg-id 0C1D15A3-F27A-46AD-972E-53BC5C8986A3@yesql.se
Whole thread Raw
In response to Re: OpenSSL 3.0.0 compatibility  (Daniel Gustafsson <daniel@yesql.se>)
Responses Re: OpenSSL 3.0.0 compatibility  (Robert Haas <robertmhaas@gmail.com>)
Re: OpenSSL 3.0.0 compatibility  (Peter Eisentraut <peter.eisentraut@enterprisedb.com>)
List pgsql-hackers
> On 22 Sep 2021, at 10:06, Daniel Gustafsson <daniel@yesql.se> wrote:

> Agreed, I will go ahead and prep backpatches for 318df8 and 72bbff4cd.

These commits are enough to keep 14 happy, and I intend to apply them tomorrow
after another round of testing and caffeine.

For the 13- backbranches we also need to backport 22e1943f1 ("pgcrypto: Check
for error return of px_cipher_decrypt()" by Peter E) in order to avoid
incorrect results for decrypt tests on disallowed ciphers.  Does anyone have
any concerns about applying this to backbranches?

13 and older will, when compiled against OpenSSL 3.0.0, produce a fair amount
of compiler warnings on usage of depreceted functionality but there is really
anything we can do as suppressing that is beyond the scope of a backpatchable
fix IMHO.

--
Daniel Gustafsson        https://vmware.com/




pgsql-hackers by date:

Previous
From: Tom Lane
Date:
Subject: Recent cpluspluscheck failures
Next
From: Robert Haas
Date:
Subject: Re: preserving db/ts/relfilenode OIDs across pg_upgrade (was Re: storing an explicit nonce)