Re: Serverside SNI support in libpq
| От | Jacob Champion |
|---|---|
| Тема | Re: Serverside SNI support in libpq |
| Дата | |
| Msg-id | CAOYmi+m2Ks7D4obtXay3y-UNn6CkTNrmr_zWC25vKTdesatafA@mail.gmail.com обсуждение исходный текст |
| Ответ на | Re: Serverside SNI support in libpq (Daniel Gustafsson <daniel@yesql.se>) |
| Ответы |
Re: Serverside SNI support in libpq
|
| Список | pgsql-hackers |
On Mon, Nov 10, 2025 at 2:33 PM Daniel Gustafsson <daniel@yesql.se> wrote: > Attached is a cleaned up rebase with improved memory handling, additional code > documentation, removed passphrase test (sent as a separate thread), and some > general cleanup and additional testing. Thanks! Builds and passes back to OpenSSL 1.1.1 and LibreSSL 3.4 (except for the unrelated known issue with "depth 0"/"depth 1", which this patch did not introduce [1]). Did you have any thoughts on my earlier review [2]? The test patch attached there still fails on my machine with v9. Thanks, --Jacob [1] https://postgr.es/m/CA%2BhUKG%2BfLqyweHqFSBcErueUVT0vDuSNWui-ySz3%2Bd_APmq7dw%40mail.gmail.com [1] https://postgr.es/m/CAOYmi%2Bk%3DVF-2BCqfR49A92tx%3D_QNuL%3D3iT3w6FysOffKw9cxDQ%40mail.gmail.com
В списке pgsql-hackers по дате отправления: