Description: OpenSSL 1.1 compatibility
Origin: upstream vcs, http://cvs.schmorp.de/AnyEvent/lib/AnyEvent/Handle.pm?r1=1.248&r2=1.249
Bug: https://rt.cpan.org/Public/Bug/Display.html?id=118584
Bug-Debian: https://bugs.debian.org/848427
Author: Marc Lehmann <schmorp@schmorp.de>
Last-Update: 2016-12-17
Applied-Upstream: yes

--- a/lib/AnyEvent/Handle.pm
+++ b/lib/AnyEvent/Handle.pm
@@ -2221,10 +2221,10 @@
    # we assume that most (but not all) of this insanity only applies to non-blocking cases,
    # and we drive openssl fully in blocking mode here. Or maybe we don't - openssl seems to
    # have identity issues in that area.
-#   Net::SSLeay::CTX_set_mode ($ssl,
+#   Net::SSLeay::set_mode ($ssl,
 #      (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ENABLE_PARTIAL_WRITE () } || 1)
 #      | (eval { local $SIG{__DIE__}; Net::SSLeay::MODE_ACCEPT_MOVING_WRITE_BUFFER () } || 2));
-   Net::SSLeay::CTX_set_mode ($tls, 1|2);
+   Net::SSLeay::set_mode ($tls, 1|2);
 
    $self->{_rbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ());
    $self->{_wbio} = Net::SSLeay::BIO_new (Net::SSLeay::BIO_s_mem ());