|
@@ -1233,8 +1233,7 @@ connection_ap_handshake_rewrite_and_attach(entry_connection_t *conn,
|
|
|
{
|
|
{
|
|
|
tor_addr_t addr;
|
|
tor_addr_t addr;
|
|
|
/* XXX Duplicate call to tor_addr_parse. */
|
|
/* XXX Duplicate call to tor_addr_parse. */
|
|
|
- if (tor_addr_parse(&addr, socks->address) >= 0 &&
|
|
|
|
|
- !conn->is_socks_socket) {
|
|
|
|
|
|
|
+ if (tor_addr_parse(&addr, socks->address) >= 0) {
|
|
|
sa_family_t family = tor_addr_family(&addr);
|
|
sa_family_t family = tor_addr_family(&addr);
|
|
|
if ((family == AF_INET && ! conn->ipv4_traffic_ok) ||
|
|
if ((family == AF_INET && ! conn->ipv4_traffic_ok) ||
|
|
|
(family == AF_INET6 && ! conn->ipv4_traffic_ok)) {
|
|
(family == AF_INET6 && ! conn->ipv4_traffic_ok)) {
|
|
@@ -1837,9 +1836,6 @@ connection_ap_get_begincell_flags(entry_connection_t *ap_conn)
|
|
|
if (!ap_conn->ipv4_traffic_ok)
|
|
if (!ap_conn->ipv4_traffic_ok)
|
|
|
flags |= BEGIN_FLAG_IPV4_NOT_OK;
|
|
flags |= BEGIN_FLAG_IPV4_NOT_OK;
|
|
|
|
|
|
|
|
- if (ap_conn->is_socks_socket)
|
|
|
|
|
- return 0;
|
|
|
|
|
-
|
|
|
|
|
exitnode = node_get_by_id(cpath_layer->extend_info->identity_digest);
|
|
exitnode = node_get_by_id(cpath_layer->extend_info->identity_digest);
|
|
|
|
|
|
|
|
if (ap_conn->ipv6_traffic_ok && exitnode) {
|
|
if (ap_conn->ipv6_traffic_ok && exitnode) {
|