]> git.ipfire.org Git - thirdparty/curl.git/commitdiff
doh: httpsrr fix
authorsftcd <stephen.farrell@cs.tcd.ie>
Fri, 18 Apr 2025 16:12:23 +0000 (17:12 +0100)
committerDaniel Stenberg <daniel@haxx.se>
Fri, 18 Apr 2025 21:03:31 +0000 (23:03 +0200)
Closes #17099

lib/doh.c
tests/ech_tests.sh

index 3f4747a155a05ca9fc93cb6cc984a9c22acfbc20..b2406e5865f847b73a6eda413935b43656fb9d5b 100644 (file)
--- a/lib/doh.c
+++ b/lib/doh.c
@@ -1295,7 +1295,7 @@ CURLcode Curl_doh_is_resolved(struct Curl_easy *data,
       if(dns) {
         /* Now add and HTTPSRR information if we have */
 #ifdef USE_HTTPSRR
-        if(de.numhttps_rrs > 0 && result == CURLE_OK && *dnsp) {
+        if(de.numhttps_rrs > 0 && result == CURLE_OK) {
           struct Curl_https_rrinfo *hrr = NULL;
           result = doh_resp_decode_httpsrr(data, de.https_rrs->val,
                                            de.https_rrs->len, &hrr);
index b83a82d644e36eb3bf16846a36b723360ef2b592..a0512e0305a022e8a644f670b143100dc499096c 100755 (executable)
@@ -66,7 +66,7 @@ declare -A ech_targets=(
     [draft-13.esni.defo.ie:11413]=""
     [draft-13.esni.defo.ie:12413]=""
     [draft-13.esni.defo.ie:12414]=""
-    [crypto.cloudflare.com]="cdn-cgi/trace"
+    [cloudflare-ech.com]="cdn-cgi/trace"
     [tls-ech.dev]=""
     # this one's gone away for now (possibly temporarily)
     # [epochbelt.com]=""
@@ -361,7 +361,7 @@ do
     then
         case $targ in
             "draft-13.esni.defo.ie:8414" | "tls-ech.dev" | \
-            "crypto.cloudflare.com" | "epochbelt.com")
+            "cloudflare-ech.com" | "epochbelt.com")
                 echo "Skipping $targ 'cause wolf"; continue;;
             *)
                 ;;
@@ -413,7 +413,7 @@ then
             echo "Skipping $targ as ports != 443 seem blocked"
             continue
         fi
-        if [[ "$host" == "crypto.cloudflare.com" ]]
+        if [[ "$host" == "cloudflare-ech.com" ]]
         then
             echo "Skipping $host as they've blocked PN override"
             continue