diff --git a/chrome/patches/curl-impersonate.patch b/chrome/patches/curl-impersonate.patch index 6a0f468..2132b0f 100644 --- a/chrome/patches/curl-impersonate.patch +++ b/chrome/patches/curl-impersonate.patch @@ -1759,24 +1759,25 @@ index f02e66541..d628112a0 100644 struct Names { diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c -index 6543fb19a..6a3a78287 100644 +index 6543fb19a..da4882af8 100644 --- a/lib/vtls/openssl.c +++ b/lib/vtls/openssl.c -@@ -80,6 +80,13 @@ +@@ -79,6 +79,14 @@ + #include #include #include - ++#include ++ +#ifdef HAVE_LIBZ +#include +#endif +#ifdef HAVE_BROTLI +#include +#endif -+ + #if (OPENSSL_VERSION_NUMBER >= 0x0090808fL) && !defined(OPENSSL_NO_OCSP) #include - #endif -@@ -266,6 +273,113 @@ +@@ -266,6 +274,113 @@ #define HAVE_OPENSSL_VERSION #endif @@ -1890,7 +1891,7 @@ index 6543fb19a..6a3a78287 100644 #ifdef OPENSSL_IS_BORINGSSL typedef uint32_t sslerr_t; #else -@@ -2583,6 +2697,151 @@ static const char *tls_rt_type(int type) +@@ -2583,6 +2698,151 @@ static const char *tls_rt_type(int type) } } @@ -2042,7 +2043,7 @@ index 6543fb19a..6a3a78287 100644 /* * Our callback from the SSL/TLS layers. */ -@@ -3536,7 +3795,14 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf, +@@ -3536,7 +3796,14 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf, ctx_options = SSL_OP_ALL; #ifdef SSL_OP_NO_TICKET @@ -2058,7 +2059,7 @@ index 6543fb19a..6a3a78287 100644 #endif #ifdef SSL_OP_NO_COMPRESSION -@@ -3603,6 +3869,16 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf, +@@ -3603,6 +3870,16 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf, } #endif @@ -2075,7 +2076,7 @@ index 6543fb19a..6a3a78287 100644 if(ssl_cert || ssl_cert_blob || ssl_cert_type) { if(!result && !cert_stuff(data, backend->ctx, -@@ -3656,6 +3932,35 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf, +@@ -3656,6 +3933,35 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf, } #endif @@ -2111,7 +2112,7 @@ index 6543fb19a..6a3a78287 100644 #ifdef USE_OPENSSL_SRP if(ssl_config->primary.username && Curl_auth_allowed_to_host(data)) { char * const ssl_username = ssl_config->primary.username; -@@ -3681,6 +3986,30 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf, +@@ -3681,6 +3987,30 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf, } #endif @@ -2142,7 +2143,7 @@ index 6543fb19a..6a3a78287 100644 /* OpenSSL always tries to verify the peer, this only says whether it should * fail to connect if the verification fails, or if it should continue * anyway. In the latter case the result of the verification is checked with -@@ -3727,6 +4056,23 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf, +@@ -3727,6 +4057,23 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf, SSL_set_app_data(backend->handle, cf);