mirror of
https://github.com/lwthiker/curl-impersonate.git
synced 2025-08-08 04:42:26 +00:00
Add missing BoringSSL include
This commit is contained in:
@@ -1759,24 +1759,25 @@ index f02e66541..d628112a0 100644
|
||||
|
||||
struct Names {
|
||||
diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c
|
||||
index 6543fb19a..6a3a78287 100644
|
||||
index 6543fb19a..da4882af8 100644
|
||||
--- a/lib/vtls/openssl.c
|
||||
+++ b/lib/vtls/openssl.c
|
||||
@@ -80,6 +80,13 @@
|
||||
@@ -79,6 +79,14 @@
|
||||
#include <openssl/bio.h>
|
||||
#include <openssl/buffer.h>
|
||||
#include <openssl/pkcs12.h>
|
||||
|
||||
+#include <openssl/pool.h>
|
||||
+
|
||||
+#ifdef HAVE_LIBZ
|
||||
+#include <zlib.h>
|
||||
+#endif
|
||||
+#ifdef HAVE_BROTLI
|
||||
+#include <brotli/decode.h>
|
||||
+#endif
|
||||
+
|
||||
|
||||
#if (OPENSSL_VERSION_NUMBER >= 0x0090808fL) && !defined(OPENSSL_NO_OCSP)
|
||||
#include <openssl/ocsp.h>
|
||||
#endif
|
||||
@@ -266,6 +273,113 @@
|
||||
@@ -266,6 +274,113 @@
|
||||
#define HAVE_OPENSSL_VERSION
|
||||
#endif
|
||||
|
||||
@@ -1890,7 +1891,7 @@ index 6543fb19a..6a3a78287 100644
|
||||
#ifdef OPENSSL_IS_BORINGSSL
|
||||
typedef uint32_t sslerr_t;
|
||||
#else
|
||||
@@ -2583,6 +2697,151 @@ static const char *tls_rt_type(int type)
|
||||
@@ -2583,6 +2698,151 @@ static const char *tls_rt_type(int type)
|
||||
}
|
||||
}
|
||||
|
||||
@@ -2042,7 +2043,7 @@ index 6543fb19a..6a3a78287 100644
|
||||
/*
|
||||
* Our callback from the SSL/TLS layers.
|
||||
*/
|
||||
@@ -3536,7 +3795,14 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf,
|
||||
@@ -3536,7 +3796,14 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf,
|
||||
ctx_options = SSL_OP_ALL;
|
||||
|
||||
#ifdef SSL_OP_NO_TICKET
|
||||
@@ -2058,7 +2059,7 @@ index 6543fb19a..6a3a78287 100644
|
||||
#endif
|
||||
|
||||
#ifdef SSL_OP_NO_COMPRESSION
|
||||
@@ -3603,6 +3869,16 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf,
|
||||
@@ -3603,6 +3870,16 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf,
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -2075,7 +2076,7 @@ index 6543fb19a..6a3a78287 100644
|
||||
if(ssl_cert || ssl_cert_blob || ssl_cert_type) {
|
||||
if(!result &&
|
||||
!cert_stuff(data, backend->ctx,
|
||||
@@ -3656,6 +3932,35 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf,
|
||||
@@ -3656,6 +3933,35 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf,
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -2111,7 +2112,7 @@ index 6543fb19a..6a3a78287 100644
|
||||
#ifdef USE_OPENSSL_SRP
|
||||
if(ssl_config->primary.username && Curl_auth_allowed_to_host(data)) {
|
||||
char * const ssl_username = ssl_config->primary.username;
|
||||
@@ -3681,6 +3986,30 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf,
|
||||
@@ -3681,6 +3987,30 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf,
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -2142,7 +2143,7 @@ index 6543fb19a..6a3a78287 100644
|
||||
/* OpenSSL always tries to verify the peer, this only says whether it should
|
||||
* fail to connect if the verification fails, or if it should continue
|
||||
* anyway. In the latter case the result of the verification is checked with
|
||||
@@ -3727,6 +4056,23 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf,
|
||||
@@ -3727,6 +4057,23 @@ static CURLcode ossl_connect_step1(struct Curl_cfilter *cf,
|
||||
|
||||
SSL_set_app_data(backend->handle, cf);
|
||||
|
||||
|
Reference in New Issue
Block a user