summaryrefslogtreecommitdiff
blob: 72febbfff7e9ee072b2200d1b3a4b40f917e4923 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
--- a/SSLeay.xs	2014-04-24 07:36:24.000000000 +0000
+++ b/SSLeay.xs	2015-12-27 13:39:05.695422091 +0000
@@ -45,13 +45,6 @@
 }
 #endif
 
-
-#if SSLEAY_VERSION_NUMBER >= 0x0900
-#define CRYPT_SSL_CLIENT_METHOD SSLv3_client_method()
-#else
-#define CRYPT_SSL_CLIENT_METHOD SSLv2_client_method()
-#endif
-
 static void InfoCallback(const SSL *s,int where,int ret)
     {
     const char *str;
@@ -145,22 +138,7 @@
             RAND_seed(buf, CRYPT_SSLEAY_RAND_BUFSIZE);
         }
 
-        if(ssl_version == 23) {
-            ctx = SSL_CTX_new(SSLv23_client_method());
-        }
-        else if(ssl_version == 3) {
-            ctx = SSL_CTX_new(SSLv3_client_method());
-        }
-        else {
-#ifndef OPENSSL_NO_SSL2
-            /* v2 is the default */
-            ctx = SSL_CTX_new(SSLv2_client_method());
-#else
-            /* v3 is the default */
-            ctx = SSL_CTX_new(SSLv3_client_method());
-#endif
-        }
-
+        ctx = SSL_CTX_new(SSLv23_client_method());
         SSL_CTX_set_options(ctx,SSL_OP_ALL|0);
         SSL_CTX_set_default_verify_paths(ctx);
         SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL);