--- /dev/null
+diff --git a/src/node_crypto.cc b/src/node_crypto.cc
+index c3779c0..611fb43 100644
+--- a/src/node_crypto.cc
++++ b/src/node_crypto.cc
+@@ -43,6 +43,11 @@
+ #include <string.h>
+ #include <vector>
+
++#if OPENSSL_VERSION_NUMBER < 0x10100000L
++#define X509_get0_notBefore X509_get_notBefore
++#define X509_get0_notAfter X509_get_notAfter
++#endif
++
+ #define THROW_AND_RETURN_IF_NOT_STRING_OR_BUFFER(val, prefix) \
+ do { \
+ if (!Buffer::HasInstance(val) && !val->IsString()) { \
+@@ -536,6 +541,7 @@ void SecureContext::Init(const FunctionCallbackInfo<Value>& args) {
+ method = SSLv23_server_method();
+ } else if (strcmp(*sslmethod, "SSLv23_client_method") == 0) {
+ method = SSLv23_client_method();
++#if OPENSSL_VERSION_NUMBER < 0x10100000L
+ } else if (strcmp(*sslmethod, "TLSv1_method") == 0) {
+ method = TLSv1_method();
+ } else if (strcmp(*sslmethod, "TLSv1_server_method") == 0) {
+@@ -554,6 +560,14 @@ void SecureContext::Init(const FunctionCallbackInfo<Value>& args) {
+ method = TLSv1_2_server_method();
+ } else if (strcmp(*sslmethod, "TLSv1_2_client_method") == 0) {
+ method = TLSv1_2_client_method();
++#else
++ } else if (strcmp(*sslmethod, "TLS_method") == 0) {
++ method = TLS_method();
++ } else if (strcmp(*sslmethod, "TLS_server_method") == 0) {
++ method = TLS_server_method();
++ } else if (strcmp(*sslmethod, "TLS_client_method") == 0) {
++ method = TLS_client_method();
++#endif
+ } else {
+ return env->ThrowError("Unknown method");
+ }
+@@ -1799,7 +1813,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
+ rsa = nullptr;
+ }
+
+- ASN1_TIME_print(bio, X509_get_notBefore(cert));
++ ASN1_TIME_print(bio, X509_get0_notBefore(cert));
+ BIO_get_mem_ptr(bio, &mem);
+ info->Set(context, env->valid_from_string(),
+ String::NewFromUtf8(env->isolate(), mem->data,
+@@ -1807,7 +1821,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
+ mem->length)).FromJust();
+ (void) BIO_reset(bio);
+
+- ASN1_TIME_print(bio, X509_get_notAfter(cert));
++ ASN1_TIME_print(bio, X509_get0_notAfter(cert));
+ BIO_get_mem_ptr(bio, &mem);
+ info->Set(context, env->valid_to_string(),
+ String::NewFromUtf8(env->isolate(), mem->data,
+@@ -6194,8 +6208,12 @@ void TimingSafeEqual(const FunctionCallbackInfo<Value>& args) {
+ }
+
+ void InitCryptoOnce() {
++#if OPENSSL_VERSION_NUMBER < 0x10100000L
+ SSL_load_error_strings();
+ OPENSSL_no_config();
++#else
++ OPENSSL_init_crypto(OPENSSL_INIT_NO_LOAD_CONFIG, NULL);
++#endif
+
+ // --openssl-config=...
+ if (!openssl_config.empty()) {
+@@ -6217,10 +6235,10 @@ void InitCryptoOnce() {
+ }
+ }
+
++#if OPENSSL_VERSION_NUMBER < 0x10100000L
+ SSL_library_init();
+ OpenSSL_add_all_algorithms();
+
+-#if OPENSSL_VERSION_NUMBER < 0x10100000L
+ crypto_lock_init();
+ CRYPTO_set_locking_callback(crypto_lock_cb);
+ CRYPTO_THREADID_set_callback(crypto_threadid_cb);
+diff --git a/src/node_crypto.h b/src/node_crypto.h
+index 58f5b72..875a787 100644
+--- a/src/node_crypto.h
++++ b/src/node_crypto.h
+@@ -37,6 +37,9 @@
+ #include "v8.h"
+
+ #include <openssl/ssl.h>
++#include <openssl/bn.h>
++#include <openssl/rsa.h>
++#include <openssl/dh.h>
+ #include <openssl/ec.h>
+ #include <openssl/ecdh.h>
+ #ifndef OPENSSL_NO_ENGINE