if(dns) {
/* Now add and HTTPSRR information if we have */
#ifdef USE_HTTPSRR
- if(de.numhttps_rrs > 0 && result == CURLE_OK && *dnsp) {
+ if(de.numhttps_rrs > 0 && result == CURLE_OK) {
struct Curl_https_rrinfo *hrr = NULL;
result = doh_resp_decode_httpsrr(data, de.https_rrs->val,
de.https_rrs->len, &hrr);
[draft-13.esni.defo.ie:11413]=""
[draft-13.esni.defo.ie:12413]=""
[draft-13.esni.defo.ie:12414]=""
- [crypto.cloudflare.com]="cdn-cgi/trace"
+ [cloudflare-ech.com]="cdn-cgi/trace"
[tls-ech.dev]=""
# this one's gone away for now (possibly temporarily)
# [epochbelt.com]=""
then
case $targ in
"draft-13.esni.defo.ie:8414" | "tls-ech.dev" | \
- "crypto.cloudflare.com" | "epochbelt.com")
+ "cloudflare-ech.com" | "epochbelt.com")
echo "Skipping $targ 'cause wolf"; continue;;
*)
;;
echo "Skipping $targ as ports != 443 seem blocked"
continue
fi
- if [[ "$host" == "crypto.cloudflare.com" ]]
+ if [[ "$host" == "cloudflare-ech.com" ]]
then
echo "Skipping $host as they've blocked PN override"
continue