Package: libanyevent-perl Version: 7.130-1 Severity: serious Forwarded: https://rt.cpan.org/Public/Bug/Display.html?id=118584 Tags: patch fixed-upstream
This package fails to build on current sid/amd64: t/80_ssltest.t ............. 1..415 ok 1 - mode 1 ok 2 - client_connect 1 ok 3 - server_connect 1 Failed 412/415 subtests This seems to have regressed with libnet-ssleay-perl_1.78-1+b1, which was a rebuild against libssl1.1. The issue is known upstream, and should be fixed with http://cvs.schmorp.de/AnyEvent/lib/AnyEvent/Handle.pm?r1=1.248&r2=1.249 Attaching the relevant parts for convenience; probably best not to touch upstream's disparaging remarks in any way. -- Niko
--- AnyEvent/lib/AnyEvent/Handle.pm +++ AnyEvent/lib/AnyEvent/Handle.pm @@ -2220,12 +2220,12 @@ # note that we do not try to keep the length constant between writes as we are required to do. # we assume that most (but not all) of this insanity only applies to non-blocking cases, # and we drive openssl fully in blocking mode here. Or maybe we don't - openssl seems to # have identity issues in that area. -# Net::SSLeay::CTX_set_mode ($ssl, +# Net::SSLeay::set_mode ($ssl, # (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ENABLE_PARTIAL_WRITE () } || 1) # | (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ACCEPT_MOVING_WRITE_BUFFER () } || 2)); - Net::SSLeay::CTX_set_mode ($tls, 1|2); + Net::SSLeay::set_mode ($tls, 1|2); $self->{_rbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ()); $self->{_wbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ());