Dan F pointed out that we don't need to scan IPv6 addresses for '%'-letters
in the parse_remote_port() function as the scope id has already been stripped from the string.
This commit is contained in:
Родитель
1b4af1f8d8
Коммит
c0dfe6e51d
|
@ -3724,7 +3724,10 @@ static CURLcode parse_remote_port(struct SessionHandle *data,
|
|||
char *portptr;
|
||||
char endbracket;
|
||||
|
||||
if((1 == sscanf(conn->host.name, "[%*45[0123456789abcdefABCDEF:.%]%c",
|
||||
/* Note that at this point, the IPv6 address cannot contain any scope
|
||||
suffix as that has already been removed in the ParseURLAndFillConnection()
|
||||
function */
|
||||
if((1 == sscanf(conn->host.name, "[%*45[0123456789abcdefABCDEF:.]%c",
|
||||
&endbracket)) &&
|
||||
(']' == endbracket)) {
|
||||
/* this is a RFC2732-style specified IP-address */
|
||||
|
|
Загрузка…
Ссылка в новой задаче