File: anyevent-ssl1.1.patch

package info (click to toggle)
libanyevent-perl 7.130-2
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 2,004 kB
  • ctags: 758
  • sloc: perl: 6,610; sh: 112; makefile: 10
file content (23 lines) | stat: -rw-r--r-- 1,115 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Description: OpenSSL 1.1 compatibility
Origin: upstream vcs, http://cvs.schmorp.de/AnyEvent/lib/AnyEvent/Handle.pm?r1=1.248&r2=1.249
Bug: https://rt.cpan.org/Public/Bug/Display.html?id=118584
Bug-Debian: https://bugs.debian.org/848427
Author: Marc Lehmann <schmorp@schmorp.de>
Last-Update: 2016-12-17
Applied-Upstream: yes

--- a/lib/AnyEvent/Handle.pm
+++ b/lib/AnyEvent/Handle.pm
@@ -2221,10 +2221,10 @@
    # we assume that most (but not all) of this insanity only applies to non-blocking cases,
    # and we drive openssl fully in blocking mode here. Or maybe we don't - openssl seems to
    # have identity issues in that area.
-#   Net::SSLeay::CTX_set_mode ($ssl,
+#   Net::SSLeay::set_mode ($ssl,
 #      (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ENABLE_PARTIAL_WRITE () } || 1)
 #      | (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ACCEPT_MOVING_WRITE_BUFFER () } || 2));
-   Net::SSLeay::CTX_set_mode ($tls, 1|2);
+   Net::SSLeay::set_mode ($tls, 1|2);
 
    $self->{_rbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ());
    $self->{_wbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ());