From a4915ec3bd095ec42c71ad56c31ee611daf8fc46 Mon Sep 17 00:00:00 2001 From: tb Date: Thu, 14 Jul 2022 08:35:15 +0000 Subject: [PATCH] Switch to using TLS_client_method() Apparently, TLSv1_client_method() is used for historical reasons. This behavior is no longer helpful if we want to know what ciphers a TLS connection could use. This could change again after further investigation of what the behavior should be... ok beck jsing --- usr.bin/openssl/ciphers.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/usr.bin/openssl/ciphers.c b/usr.bin/openssl/ciphers.c index 6a96dfcc923..b60145c2a8e 100644 --- a/usr.bin/openssl/ciphers.c +++ b/usr.bin/openssl/ciphers.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ciphers.c,v 1.11 2022/07/14 08:07:54 tb Exp $ */ +/* $OpenBSD: ciphers.c,v 1.12 2022/07/14 08:35:15 tb Exp $ */ /* * Copyright (c) 2014 Joel Sing * @@ -109,7 +109,7 @@ ciphers_main(int argc, char **argv) return (1); } - if ((ssl_ctx = SSL_CTX_new(TLSv1_client_method())) == NULL) + if ((ssl_ctx = SSL_CTX_new(TLS_client_method())) == NULL) goto err; if (cipherlist != NULL) { -- 2.20.1