Package: libanyevent-perl
Version: 7.130-1
Severity: serious
Forwarded: https://rt.cpan.org/Public/Bug/Display.html?id=118584
Tags: patch fixed-upstream

This package fails to build on current sid/amd64:

  t/80_ssltest.t ............. 
  1..415
  ok 1 - mode 1
  ok 2 - client_connect 1
  ok 3 - server_connect 1
  Failed 412/415 subtests 
  
This seems to have regressed with libnet-ssleay-perl_1.78-1+b1, which
was a rebuild against libssl1.1.

The issue is known upstream, and should be fixed with
 http://cvs.schmorp.de/AnyEvent/lib/AnyEvent/Handle.pm?r1=1.248&r2=1.249

Attaching the relevant parts for convenience; probably best not to touch
upstream's disparaging remarks in any way.
-- 
Niko 
--- AnyEvent/lib/AnyEvent/Handle.pm
+++ AnyEvent/lib/AnyEvent/Handle.pm
@@ -2220,12 +2220,12 @@
    # note that we do not try to keep the length constant between writes as we are required to do.
    # we assume that most (but not all) of this insanity only applies to non-blocking cases,
    # and we drive openssl fully in blocking mode here. Or maybe we don't - openssl seems to
    # have identity issues in that area.
-#   Net::SSLeay::CTX_set_mode ($ssl,
+#   Net::SSLeay::set_mode ($ssl,
 #      (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ENABLE_PARTIAL_WRITE () } || 1)
 #      | (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ACCEPT_MOVING_WRITE_BUFFER () } || 2));
-   Net::SSLeay::CTX_set_mode ($tls, 1|2);
+   Net::SSLeay::set_mode ($tls, 1|2);
 
    $self->{_rbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ());
    $self->{_wbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ());

Reply via email to