connect: avoid skipping an IPv4 address
... in case the protocol versions are mixed in a DNS response (IPv6 -> IPv4 -> IPv6). Bug: https://bugzilla.redhat.com/show_bug.cgi?id=1187531#c3
This commit is contained in:
@@ -542,6 +542,7 @@ static CURLcode trynextip(struct connectdata *conn,
|
|||||||
int sockindex,
|
int sockindex,
|
||||||
int tempindex)
|
int tempindex)
|
||||||
{
|
{
|
||||||
|
const int other = tempindex ^ 1;
|
||||||
CURLcode result = CURLE_COULDNT_CONNECT;
|
CURLcode result = CURLE_COULDNT_CONNECT;
|
||||||
|
|
||||||
/* First clean up after the failed socket.
|
/* First clean up after the failed socket.
|
||||||
@@ -572,8 +573,11 @@ static CURLcode trynextip(struct connectdata *conn,
|
|||||||
}
|
}
|
||||||
|
|
||||||
while(ai) {
|
while(ai) {
|
||||||
|
if(conn->tempaddr[other]) {
|
||||||
|
/* we can safely skip addresses of the other protocol family */
|
||||||
while(ai && ai->ai_family != family)
|
while(ai && ai->ai_family != family)
|
||||||
ai = ai->ai_next;
|
ai = ai->ai_next;
|
||||||
|
}
|
||||||
|
|
||||||
if(ai) {
|
if(ai) {
|
||||||
result = singleipconnect(conn, ai, &conn->tempsock[tempindex]);
|
result = singleipconnect(conn, ai, &conn->tempsock[tempindex]);
|
||||||
|
|||||||
Reference in New Issue
Block a user