I didn't make any of the callers use this feature yet.
* holding that hostname. (If we didn't get our address by resolving a
* hostname, set *<b>hostname_out</b> to NULL.)
*
+ * If <b>use_cached_addr</b> is true, and we have a plausible answer,
+ * provide that answer and return.
+ *
* XXXX ipv6
*/
int
resolve_my_address(int warn_severity, const or_options_t *options,
uint32_t *addr_out,
- const char **method_out, char **hostname_out)
+ const char **method_out, char **hostname_out,
+ int use_cached_addr)
{
struct in_addr in;
uint32_t addr; /* host order */
tor_assert(addr_out);
+ /*
+ * Step zero: if used_cached_addr is true, and we have a cached answer,
+ * just return it and be done.
+ */
+
+ if (use_cached_addr && last_resolved_addr) {
+ *addr_out = last_resolved_addr;
+ if (method_out)
+ *method_out = "CACHED";
+ return 0;
+ }
+
/*
* Step one: Fill in 'hostname' to be our best guess.
*/
if (authdir_mode(options)) {
/* confirm that our address isn't broken, so we can complain now */
uint32_t tmp;
- if (resolve_my_address(LOG_WARN, options, &tmp, NULL, NULL) < 0)
+ if (resolve_my_address(LOG_WARN, options, &tmp, NULL, NULL, 0) < 0)
REJECT("Failed to resolve/guess local address. See logs for details.");
}
int resolve_my_address(int warn_severity, const or_options_t *options,
uint32_t *addr_out,
- const char **method_out, char **hostname_out);
+ const char **method_out, char **hostname_out,
+ int use_cached_addr);
int is_local_addr(const tor_addr_t *addr);
void options_init(or_options_t *options);
char *options_dump(const or_options_t *options, int minimal);
tor_assert(private_key);
tor_assert(cert);
- if (resolve_my_address(LOG_WARN, options, &addr, NULL, &hostname)<0) {
+ if (resolve_my_address(LOG_WARN, options, &addr, NULL, &hostname, 0)<0) {
log_warn(LD_NET, "Couldn't resolve my hostname");
return NULL;
}
private_key = get_server_identity_key();
- if (resolve_my_address(LOG_WARN, options, &addr, NULL, &hostname)<0) {
+ if (resolve_my_address(LOG_WARN, options, &addr, NULL, &hostname, 0)<0) {
log_warn(LD_NET, "Couldn't resolve my hostname");
goto done;
}
int
router_pick_published_address(const or_options_t *options, uint32_t *addr)
{
- if (resolve_my_address(LOG_INFO, options, addr, NULL, NULL) < 0) {
+ if (resolve_my_address(LOG_INFO, options, addr, NULL, NULL, 0) < 0) {
log_info(LD_CONFIG, "Could not determine our address locally. "
"Checking if directory headers provide any hints.");
if (router_guess_address_from_dir_headers(addr) < 0) {
/* XXXX ipv6 */
prev = desc_routerinfo->addr;
- if (resolve_my_address(LOG_INFO, options, &cur, &method, &hostname) < 0) {
+ if (resolve_my_address(LOG_INFO, options, &cur, &method, &hostname, 0) < 0) {
log_info(LD_CONFIG,"options->Address didn't resolve into an IP.");
return;
}
}
/* XXXX ipv6 */
- if (resolve_my_address(LOG_INFO, options, &cur, NULL, NULL) >= 0) {
+ if (resolve_my_address(LOG_INFO, options, &cur, NULL, NULL, 0) >= 0) {
/* We're all set -- we already know our address. Great. */
tor_addr_from_ipv4h(&last_guessed_ip, cur); /* store it in case we
need it later */
dir_server_t *result;
if (!address) { /* The address is us; we should guess. */
- if (resolve_my_address(LOG_WARN, get_options(), &a, NULL, &hostname) < 0) {
+ if (resolve_my_address(LOG_WARN, get_options(),
+ &a, NULL, &hostname, 0) < 0) {
log_warn(LD_CONFIG,
"Couldn't find a suitable address when adding ourself as a "
"trusted directory server.");