xref: /nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/apps/mdns/mdns.c (revision 104654410c56c573564690304ae786df310c91fc)
1*10465441SEvalZero /**
2*10465441SEvalZero  * @file
3*10465441SEvalZero  * MDNS responder implementation
4*10465441SEvalZero  *
5*10465441SEvalZero  * @defgroup mdns MDNS
6*10465441SEvalZero  * @ingroup apps
7*10465441SEvalZero  *
8*10465441SEvalZero  * RFC 6762 - Multicast DNS\n
9*10465441SEvalZero  * RFC 6763 - DNS-Based Service Discovery\n
10*10465441SEvalZero  *
11*10465441SEvalZero  * @verbinclude mdns.txt
12*10465441SEvalZero  *
13*10465441SEvalZero  * Things left to implement:
14*10465441SEvalZero  * -------------------------
15*10465441SEvalZero  *
16*10465441SEvalZero  * - Probing/conflict resolution
17*10465441SEvalZero  * - Sending goodbye messages (zero ttl) - shutdown, DHCP lease about to expire, DHCP turned off...
18*10465441SEvalZero  * - Checking that source address of unicast requests are on the same network
19*10465441SEvalZero  * - Limiting multicast responses to 1 per second per resource record
20*10465441SEvalZero  * - Fragmenting replies if required
21*10465441SEvalZero  * - Subscribe to netif address/link change events and act on them (currently needs to be done manually)
22*10465441SEvalZero  * - Handling multi-packet known answers
23*10465441SEvalZero  * - Individual known answer detection for all local IPv6 addresses
24*10465441SEvalZero  * - Dynamic size of outgoing packet
25*10465441SEvalZero  */
26*10465441SEvalZero 
27*10465441SEvalZero /*
28*10465441SEvalZero  * Copyright (c) 2015 Verisure Innovation AB
29*10465441SEvalZero  * All rights reserved.
30*10465441SEvalZero  *
31*10465441SEvalZero  * Redistribution and use in source and binary forms, with or without modification,
32*10465441SEvalZero  * are permitted provided that the following conditions are met:
33*10465441SEvalZero  *
34*10465441SEvalZero  * 1. Redistributions of source code must retain the above copyright notice,
35*10465441SEvalZero  *    this list of conditions and the following disclaimer.
36*10465441SEvalZero  * 2. Redistributions in binary form must reproduce the above copyright notice,
37*10465441SEvalZero  *    this list of conditions and the following disclaimer in the documentation
38*10465441SEvalZero  *    and/or other materials provided with the distribution.
39*10465441SEvalZero  * 3. The name of the author may not be used to endorse or promote products
40*10465441SEvalZero  *    derived from this software without specific prior written permission.
41*10465441SEvalZero  *
42*10465441SEvalZero  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
43*10465441SEvalZero  * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
44*10465441SEvalZero  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
45*10465441SEvalZero  * SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
46*10465441SEvalZero  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
47*10465441SEvalZero  * OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
48*10465441SEvalZero  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
49*10465441SEvalZero  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
50*10465441SEvalZero  * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
51*10465441SEvalZero  * OF SUCH DAMAGE.
52*10465441SEvalZero  *
53*10465441SEvalZero  * This file is part of the lwIP TCP/IP stack.
54*10465441SEvalZero  *
55*10465441SEvalZero  * Author: Erik Ekman <[email protected]>
56*10465441SEvalZero  *
57*10465441SEvalZero  */
58*10465441SEvalZero 
59*10465441SEvalZero #include "lwip/apps/mdns.h"
60*10465441SEvalZero #include "lwip/apps/mdns_priv.h"
61*10465441SEvalZero #include "lwip/netif.h"
62*10465441SEvalZero #include "lwip/udp.h"
63*10465441SEvalZero #include "lwip/ip_addr.h"
64*10465441SEvalZero #include "lwip/mem.h"
65*10465441SEvalZero #include "lwip/prot/dns.h"
66*10465441SEvalZero 
67*10465441SEvalZero #include <string.h>
68*10465441SEvalZero 
69*10465441SEvalZero #if LWIP_MDNS_RESPONDER
70*10465441SEvalZero 
71*10465441SEvalZero #if (LWIP_IPV4 && !LWIP_IGMP)
72*10465441SEvalZero   #error "If you want to use MDNS with IPv4, you have to define LWIP_IGMP=1 in your lwipopts.h"
73*10465441SEvalZero #endif
74*10465441SEvalZero #if (LWIP_IPV6 && !LWIP_IPV6_MLD)
75*10465441SEvalZero #error "If you want to use MDNS with IPv6, you have to define LWIP_IPV6_MLD=1 in your lwipopts.h"
76*10465441SEvalZero #endif
77*10465441SEvalZero #if (!LWIP_UDP)
78*10465441SEvalZero   #error "If you want to use MDNS, you have to define LWIP_UDP=1 in your lwipopts.h"
79*10465441SEvalZero #endif
80*10465441SEvalZero 
81*10465441SEvalZero #if LWIP_IPV4
82*10465441SEvalZero #include "lwip/igmp.h"
83*10465441SEvalZero /* IPv4 multicast group 224.0.0.251 */
84*10465441SEvalZero static const ip_addr_t v4group = DNS_MQUERY_IPV4_GROUP_INIT;
85*10465441SEvalZero #endif
86*10465441SEvalZero 
87*10465441SEvalZero #if LWIP_IPV6
88*10465441SEvalZero #include "lwip/mld6.h"
89*10465441SEvalZero /* IPv6 multicast group FF02::FB */
90*10465441SEvalZero static const ip_addr_t v6group = DNS_MQUERY_IPV6_GROUP_INIT;
91*10465441SEvalZero #endif
92*10465441SEvalZero 
93*10465441SEvalZero #define MDNS_PORT 5353
94*10465441SEvalZero #define MDNS_TTL  255
95*10465441SEvalZero 
96*10465441SEvalZero /* Stored offsets to beginning of domain names
97*10465441SEvalZero  * Used for compression.
98*10465441SEvalZero  */
99*10465441SEvalZero #define NUM_DOMAIN_OFFSETS 10
100*10465441SEvalZero #define DOMAIN_JUMP_SIZE 2
101*10465441SEvalZero #define DOMAIN_JUMP 0xc000
102*10465441SEvalZero 
103*10465441SEvalZero static u8_t mdns_netif_client_id;
104*10465441SEvalZero static struct udp_pcb *mdns_pcb;
105*10465441SEvalZero 
106*10465441SEvalZero #define NETIF_TO_HOST(netif) (struct mdns_host*)(netif_get_client_data(netif, mdns_netif_client_id))
107*10465441SEvalZero 
108*10465441SEvalZero #define TOPDOMAIN_LOCAL "local"
109*10465441SEvalZero 
110*10465441SEvalZero #define REVERSE_PTR_TOPDOMAIN "arpa"
111*10465441SEvalZero #define REVERSE_PTR_V4_DOMAIN "in-addr"
112*10465441SEvalZero #define REVERSE_PTR_V6_DOMAIN "ip6"
113*10465441SEvalZero 
114*10465441SEvalZero #define SRV_PRIORITY 0
115*10465441SEvalZero #define SRV_WEIGHT   0
116*10465441SEvalZero 
117*10465441SEvalZero /* Payload size allocated for each outgoing UDP packet */
118*10465441SEvalZero #define OUTPACKET_SIZE 500
119*10465441SEvalZero 
120*10465441SEvalZero /* Lookup from hostname -> IPv4 */
121*10465441SEvalZero #define REPLY_HOST_A            0x01
122*10465441SEvalZero /* Lookup from IPv4/v6 -> hostname */
123*10465441SEvalZero #define REPLY_HOST_PTR_V4       0x02
124*10465441SEvalZero /* Lookup from hostname -> IPv6 */
125*10465441SEvalZero #define REPLY_HOST_AAAA         0x04
126*10465441SEvalZero /* Lookup from hostname -> IPv6 */
127*10465441SEvalZero #define REPLY_HOST_PTR_V6       0x08
128*10465441SEvalZero 
129*10465441SEvalZero /* Lookup for service types */
130*10465441SEvalZero #define REPLY_SERVICE_TYPE_PTR  0x10
131*10465441SEvalZero /* Lookup for instances of service */
132*10465441SEvalZero #define REPLY_SERVICE_NAME_PTR  0x20
133*10465441SEvalZero /* Lookup for location of service instance */
134*10465441SEvalZero #define REPLY_SERVICE_SRV       0x40
135*10465441SEvalZero /* Lookup for text info on service instance */
136*10465441SEvalZero #define REPLY_SERVICE_TXT       0x80
137*10465441SEvalZero 
138*10465441SEvalZero static const char *dnssd_protos[] = {
139*10465441SEvalZero     "_udp", /* DNSSD_PROTO_UDP */
140*10465441SEvalZero     "_tcp", /* DNSSD_PROTO_TCP */
141*10465441SEvalZero };
142*10465441SEvalZero 
143*10465441SEvalZero /** Description of a service */
144*10465441SEvalZero struct mdns_service {
145*10465441SEvalZero   /** TXT record to answer with */
146*10465441SEvalZero   struct mdns_domain txtdata;
147*10465441SEvalZero   /** Name of service, like 'myweb' */
148*10465441SEvalZero   char name[MDNS_LABEL_MAXLEN + 1];
149*10465441SEvalZero   /** Type of service, like '_http' */
150*10465441SEvalZero   char service[MDNS_LABEL_MAXLEN + 1];
151*10465441SEvalZero   /** Callback function and userdata
152*10465441SEvalZero    * to update txtdata buffer */
153*10465441SEvalZero   service_get_txt_fn_t txt_fn;
154*10465441SEvalZero   void *txt_userdata;
155*10465441SEvalZero   /** TTL in seconds of SRV/TXT replies */
156*10465441SEvalZero   u32_t dns_ttl;
157*10465441SEvalZero   /** Protocol, TCP or UDP */
158*10465441SEvalZero   u16_t proto;
159*10465441SEvalZero   /** Port of the service */
160*10465441SEvalZero   u16_t port;
161*10465441SEvalZero };
162*10465441SEvalZero 
163*10465441SEvalZero /** Description of a host/netif */
164*10465441SEvalZero struct mdns_host {
165*10465441SEvalZero   /** Hostname */
166*10465441SEvalZero   char name[MDNS_LABEL_MAXLEN + 1];
167*10465441SEvalZero   /** Pointer to services */
168*10465441SEvalZero   struct mdns_service *services[MDNS_MAX_SERVICES];
169*10465441SEvalZero   /** TTL in seconds of A/AAAA/PTR replies */
170*10465441SEvalZero   u32_t dns_ttl;
171*10465441SEvalZero };
172*10465441SEvalZero 
173*10465441SEvalZero /** Information about received packet */
174*10465441SEvalZero struct mdns_packet {
175*10465441SEvalZero   /** Sender IP/port */
176*10465441SEvalZero   ip_addr_t source_addr;
177*10465441SEvalZero   u16_t source_port;
178*10465441SEvalZero   /** If packet was received unicast */
179*10465441SEvalZero   u16_t recv_unicast;
180*10465441SEvalZero   /** Netif that received the packet */
181*10465441SEvalZero   struct netif *netif;
182*10465441SEvalZero   /** Packet data */
183*10465441SEvalZero   struct pbuf *pbuf;
184*10465441SEvalZero   /** Current parsing offset in packet */
185*10465441SEvalZero   u16_t parse_offset;
186*10465441SEvalZero   /** Identifier. Used in legacy queries */
187*10465441SEvalZero   u16_t tx_id;
188*10465441SEvalZero   /** Number of questions in packet,
189*10465441SEvalZero    *  read from packet header */
190*10465441SEvalZero   u16_t questions;
191*10465441SEvalZero   /** Number of unparsed questions */
192*10465441SEvalZero   u16_t questions_left;
193*10465441SEvalZero   /** Number of answers in packet,
194*10465441SEvalZero    *  (sum of normal, authorative and additional answers)
195*10465441SEvalZero    *  read from packet header */
196*10465441SEvalZero   u16_t answers;
197*10465441SEvalZero   /** Number of unparsed answers */
198*10465441SEvalZero   u16_t answers_left;
199*10465441SEvalZero };
200*10465441SEvalZero 
201*10465441SEvalZero /** Information about outgoing packet */
202*10465441SEvalZero struct mdns_outpacket {
203*10465441SEvalZero   /** Netif to send the packet on */
204*10465441SEvalZero   struct netif *netif;
205*10465441SEvalZero   /** Packet data */
206*10465441SEvalZero   struct pbuf *pbuf;
207*10465441SEvalZero   /** Current write offset in packet */
208*10465441SEvalZero   u16_t write_offset;
209*10465441SEvalZero   /** Identifier. Used in legacy queries */
210*10465441SEvalZero   u16_t tx_id;
211*10465441SEvalZero   /** Destination IP/port if sent unicast */
212*10465441SEvalZero   ip_addr_t dest_addr;
213*10465441SEvalZero   u16_t dest_port;
214*10465441SEvalZero   /** Number of questions written */
215*10465441SEvalZero   u16_t questions;
216*10465441SEvalZero   /** Number of normal answers written */
217*10465441SEvalZero   u16_t answers;
218*10465441SEvalZero   /** Number of additional answers written */
219*10465441SEvalZero   u16_t additional;
220*10465441SEvalZero   /** Offsets for written domain names in packet.
221*10465441SEvalZero    *  Used for compression */
222*10465441SEvalZero   u16_t domain_offsets[NUM_DOMAIN_OFFSETS];
223*10465441SEvalZero   /** If all answers in packet should set cache_flush bit */
224*10465441SEvalZero   u8_t cache_flush;
225*10465441SEvalZero   /** If reply should be sent unicast */
226*10465441SEvalZero   u8_t unicast_reply;
227*10465441SEvalZero   /** If legacy query. (tx_id needed, and write
228*10465441SEvalZero    *  question again in reply before answer) */
229*10465441SEvalZero   u8_t legacy_query;
230*10465441SEvalZero   /* Reply bitmask for host information */
231*10465441SEvalZero   u8_t host_replies;
232*10465441SEvalZero   /* Bitmask for which reverse IPv6 hosts to answer */
233*10465441SEvalZero   u8_t host_reverse_v6_replies;
234*10465441SEvalZero   /* Reply bitmask per service */
235*10465441SEvalZero   u8_t serv_replies[MDNS_MAX_SERVICES];
236*10465441SEvalZero };
237*10465441SEvalZero 
238*10465441SEvalZero /** Domain, type and class.
239*10465441SEvalZero  *  Shared between questions and answers */
240*10465441SEvalZero struct mdns_rr_info {
241*10465441SEvalZero   struct mdns_domain domain;
242*10465441SEvalZero   u16_t type;
243*10465441SEvalZero   u16_t klass;
244*10465441SEvalZero };
245*10465441SEvalZero 
246*10465441SEvalZero struct mdns_question {
247*10465441SEvalZero   struct mdns_rr_info info;
248*10465441SEvalZero   /** unicast reply requested */
249*10465441SEvalZero   u16_t unicast;
250*10465441SEvalZero };
251*10465441SEvalZero 
252*10465441SEvalZero struct mdns_answer {
253*10465441SEvalZero   struct mdns_rr_info info;
254*10465441SEvalZero   /** cache flush command bit */
255*10465441SEvalZero   u16_t cache_flush;
256*10465441SEvalZero   /* Validity time in seconds */
257*10465441SEvalZero   u32_t ttl;
258*10465441SEvalZero   /** Length of variable answer */
259*10465441SEvalZero   u16_t rd_length;
260*10465441SEvalZero   /** Offset of start of variable answer in packet */
261*10465441SEvalZero   u16_t rd_offset;
262*10465441SEvalZero };
263*10465441SEvalZero 
264*10465441SEvalZero /**
265*10465441SEvalZero  * Add a label part to a domain
266*10465441SEvalZero  * @param domain The domain to add a label to
267*10465441SEvalZero  * @param label The label to add, like &lt;hostname&gt;, 'local', 'com' or ''
268*10465441SEvalZero  * @param len The length of the label
269*10465441SEvalZero  * @return ERR_OK on success, an err_t otherwise if label too long
270*10465441SEvalZero  */
271*10465441SEvalZero err_t
mdns_domain_add_label(struct mdns_domain * domain,const char * label,u8_t len)272*10465441SEvalZero mdns_domain_add_label(struct mdns_domain *domain, const char *label, u8_t len)
273*10465441SEvalZero {
274*10465441SEvalZero   if (len > MDNS_LABEL_MAXLEN) {
275*10465441SEvalZero     return ERR_VAL;
276*10465441SEvalZero   }
277*10465441SEvalZero   if (len > 0 && (1 + len + domain->length >= MDNS_DOMAIN_MAXLEN)) {
278*10465441SEvalZero     return ERR_VAL;
279*10465441SEvalZero   }
280*10465441SEvalZero   /* Allow only zero marker on last byte */
281*10465441SEvalZero   if (len == 0 && (1 + domain->length > MDNS_DOMAIN_MAXLEN)) {
282*10465441SEvalZero     return ERR_VAL;
283*10465441SEvalZero   }
284*10465441SEvalZero   domain->name[domain->length] = len;
285*10465441SEvalZero   domain->length++;
286*10465441SEvalZero   if (len) {
287*10465441SEvalZero     MEMCPY(&domain->name[domain->length], label, len);
288*10465441SEvalZero     domain->length += len;
289*10465441SEvalZero   }
290*10465441SEvalZero   return ERR_OK;
291*10465441SEvalZero }
292*10465441SEvalZero 
293*10465441SEvalZero /**
294*10465441SEvalZero  * Internal readname function with max 6 levels of recursion following jumps
295*10465441SEvalZero  * while decompressing name
296*10465441SEvalZero  */
297*10465441SEvalZero static u16_t
mdns_readname_loop(struct pbuf * p,u16_t offset,struct mdns_domain * domain,unsigned depth)298*10465441SEvalZero mdns_readname_loop(struct pbuf *p, u16_t offset, struct mdns_domain *domain, unsigned depth)
299*10465441SEvalZero {
300*10465441SEvalZero   u8_t c;
301*10465441SEvalZero 
302*10465441SEvalZero   do {
303*10465441SEvalZero     if (depth > 5) {
304*10465441SEvalZero       /* Too many jumps */
305*10465441SEvalZero       return MDNS_READNAME_ERROR;
306*10465441SEvalZero     }
307*10465441SEvalZero 
308*10465441SEvalZero     c = pbuf_get_at(p, offset);
309*10465441SEvalZero     offset++;
310*10465441SEvalZero 
311*10465441SEvalZero     /* is this a compressed label? */
312*10465441SEvalZero     if((c & 0xc0) == 0xc0) {
313*10465441SEvalZero       u16_t jumpaddr;
314*10465441SEvalZero       if (offset >= p->tot_len) {
315*10465441SEvalZero         /* Make sure both jump bytes fit in the packet */
316*10465441SEvalZero         return MDNS_READNAME_ERROR;
317*10465441SEvalZero       }
318*10465441SEvalZero       jumpaddr = (((c & 0x3f) << 8) | (pbuf_get_at(p, offset) & 0xff));
319*10465441SEvalZero       offset++;
320*10465441SEvalZero       if (jumpaddr >= SIZEOF_DNS_HDR && jumpaddr < p->tot_len) {
321*10465441SEvalZero         u16_t res;
322*10465441SEvalZero       /* Recursive call, maximum depth will be checked */
323*10465441SEvalZero         res = mdns_readname_loop(p, jumpaddr, domain, depth + 1);
324*10465441SEvalZero         /* Dont return offset since new bytes were not read (jumped to somewhere in packet) */
325*10465441SEvalZero         if (res == MDNS_READNAME_ERROR) {
326*10465441SEvalZero           return res;
327*10465441SEvalZero         }
328*10465441SEvalZero       } else {
329*10465441SEvalZero         return MDNS_READNAME_ERROR;
330*10465441SEvalZero       }
331*10465441SEvalZero       break;
332*10465441SEvalZero     }
333*10465441SEvalZero 
334*10465441SEvalZero     /* normal label */
335*10465441SEvalZero     if (c <= MDNS_LABEL_MAXLEN) {
336*10465441SEvalZero       u8_t label[MDNS_LABEL_MAXLEN];
337*10465441SEvalZero       err_t res;
338*10465441SEvalZero 
339*10465441SEvalZero       if (c + domain->length >= MDNS_DOMAIN_MAXLEN) {
340*10465441SEvalZero         return MDNS_READNAME_ERROR;
341*10465441SEvalZero       }
342*10465441SEvalZero       if (c != 0) {
343*10465441SEvalZero         if (pbuf_copy_partial(p, label, c, offset) != c) {
344*10465441SEvalZero           return MDNS_READNAME_ERROR;
345*10465441SEvalZero         }
346*10465441SEvalZero         offset += c;
347*10465441SEvalZero       }
348*10465441SEvalZero       res = mdns_domain_add_label(domain, (char *) label, c);
349*10465441SEvalZero       if (res != ERR_OK) {
350*10465441SEvalZero         return MDNS_READNAME_ERROR;
351*10465441SEvalZero       }
352*10465441SEvalZero     } else {
353*10465441SEvalZero       /* bad length byte */
354*10465441SEvalZero       return MDNS_READNAME_ERROR;
355*10465441SEvalZero     }
356*10465441SEvalZero   } while (c != 0);
357*10465441SEvalZero 
358*10465441SEvalZero   return offset;
359*10465441SEvalZero }
360*10465441SEvalZero 
361*10465441SEvalZero /**
362*10465441SEvalZero  * Read possibly compressed domain name from packet buffer
363*10465441SEvalZero  * @param p The packet
364*10465441SEvalZero  * @param offset start position of domain name in packet
365*10465441SEvalZero  * @param domain The domain name destination
366*10465441SEvalZero  * @return The new offset after the domain, or MDNS_READNAME_ERROR
367*10465441SEvalZero  *         if reading failed
368*10465441SEvalZero  */
369*10465441SEvalZero u16_t
mdns_readname(struct pbuf * p,u16_t offset,struct mdns_domain * domain)370*10465441SEvalZero mdns_readname(struct pbuf *p, u16_t offset, struct mdns_domain *domain)
371*10465441SEvalZero {
372*10465441SEvalZero   memset(domain, 0, sizeof(struct mdns_domain));
373*10465441SEvalZero   return mdns_readname_loop(p, offset, domain, 0);
374*10465441SEvalZero }
375*10465441SEvalZero 
376*10465441SEvalZero /**
377*10465441SEvalZero  * Print domain name to debug output
378*10465441SEvalZero  * @param domain The domain name
379*10465441SEvalZero  */
380*10465441SEvalZero static void
mdns_domain_debug_print(struct mdns_domain * domain)381*10465441SEvalZero mdns_domain_debug_print(struct mdns_domain *domain)
382*10465441SEvalZero {
383*10465441SEvalZero   u8_t *src = domain->name;
384*10465441SEvalZero   u8_t i;
385*10465441SEvalZero 
386*10465441SEvalZero   while (*src) {
387*10465441SEvalZero     u8_t label_len = *src;
388*10465441SEvalZero     src++;
389*10465441SEvalZero     for (i = 0; i < label_len; i++) {
390*10465441SEvalZero       LWIP_DEBUGF(MDNS_DEBUG, ("%c", src[i]));
391*10465441SEvalZero     }
392*10465441SEvalZero     src += label_len;
393*10465441SEvalZero     LWIP_DEBUGF(MDNS_DEBUG, ("."));
394*10465441SEvalZero   }
395*10465441SEvalZero }
396*10465441SEvalZero 
397*10465441SEvalZero /**
398*10465441SEvalZero  * Return 1 if contents of domains match (case-insensitive)
399*10465441SEvalZero  * @param a Domain name to compare 1
400*10465441SEvalZero  * @param b Domain name to compare 2
401*10465441SEvalZero  * @return 1 if domains are equal ignoring case, 0 otherwise
402*10465441SEvalZero  */
403*10465441SEvalZero int
mdns_domain_eq(struct mdns_domain * a,struct mdns_domain * b)404*10465441SEvalZero mdns_domain_eq(struct mdns_domain *a, struct mdns_domain *b)
405*10465441SEvalZero {
406*10465441SEvalZero   u8_t *ptra, *ptrb;
407*10465441SEvalZero   u8_t len;
408*10465441SEvalZero   int res;
409*10465441SEvalZero 
410*10465441SEvalZero   if (a->length != b->length) {
411*10465441SEvalZero     return 0;
412*10465441SEvalZero   }
413*10465441SEvalZero 
414*10465441SEvalZero   ptra = a->name;
415*10465441SEvalZero   ptrb = b->name;
416*10465441SEvalZero   while (*ptra && *ptrb && ptra < &a->name[a->length]) {
417*10465441SEvalZero     if (*ptra != *ptrb) {
418*10465441SEvalZero       return 0;
419*10465441SEvalZero     }
420*10465441SEvalZero     len = *ptra;
421*10465441SEvalZero     ptra++;
422*10465441SEvalZero     ptrb++;
423*10465441SEvalZero     res = lwip_strnicmp((char *) ptra, (char *) ptrb, len);
424*10465441SEvalZero     if (res != 0) {
425*10465441SEvalZero       return 0;
426*10465441SEvalZero     }
427*10465441SEvalZero     ptra += len;
428*10465441SEvalZero     ptrb += len;
429*10465441SEvalZero   }
430*10465441SEvalZero   if (*ptra != *ptrb && ptra < &a->name[a->length]) {
431*10465441SEvalZero     return 0;
432*10465441SEvalZero   }
433*10465441SEvalZero   return 1;
434*10465441SEvalZero }
435*10465441SEvalZero 
436*10465441SEvalZero /**
437*10465441SEvalZero  * Call user supplied function to setup TXT data
438*10465441SEvalZero  * @param service The service to build TXT record for
439*10465441SEvalZero  */
440*10465441SEvalZero static void
mdns_prepare_txtdata(struct mdns_service * service)441*10465441SEvalZero mdns_prepare_txtdata(struct mdns_service *service)
442*10465441SEvalZero {
443*10465441SEvalZero   memset(&service->txtdata, 0, sizeof(struct mdns_domain));
444*10465441SEvalZero   if (service->txt_fn) {
445*10465441SEvalZero     service->txt_fn(service, service->txt_userdata);
446*10465441SEvalZero   }
447*10465441SEvalZero }
448*10465441SEvalZero 
449*10465441SEvalZero #if LWIP_IPV4
450*10465441SEvalZero /**
451*10465441SEvalZero  * Build domain for reverse lookup of IPv4 address
452*10465441SEvalZero  * like 12.0.168.192.in-addr.arpa. for 192.168.0.12
453*10465441SEvalZero  * @param domain Where to write the domain name
454*10465441SEvalZero  * @param addr Pointer to an IPv4 address to encode
455*10465441SEvalZero  * @return ERR_OK if domain was written, an err_t otherwise
456*10465441SEvalZero  */
457*10465441SEvalZero static err_t
mdns_build_reverse_v4_domain(struct mdns_domain * domain,const ip4_addr_t * addr)458*10465441SEvalZero mdns_build_reverse_v4_domain(struct mdns_domain *domain, const ip4_addr_t *addr)
459*10465441SEvalZero {
460*10465441SEvalZero   int i;
461*10465441SEvalZero   err_t res;
462*10465441SEvalZero   const u8_t *ptr;
463*10465441SEvalZero   if (!domain || !addr) {
464*10465441SEvalZero     return ERR_ARG;
465*10465441SEvalZero   }
466*10465441SEvalZero   memset(domain, 0, sizeof(struct mdns_domain));
467*10465441SEvalZero   ptr = (const u8_t *) addr;
468*10465441SEvalZero   for (i = sizeof(ip4_addr_t) - 1; i >= 0; i--) {
469*10465441SEvalZero     char buf[4];
470*10465441SEvalZero     u8_t val = ptr[i];
471*10465441SEvalZero 
472*10465441SEvalZero     lwip_itoa(buf, sizeof(buf), val);
473*10465441SEvalZero     res = mdns_domain_add_label(domain, buf, (u8_t)strlen(buf));
474*10465441SEvalZero     LWIP_ERROR("mdns_build_reverse_v4_domain: Failed to add label", (res == ERR_OK), return res);
475*10465441SEvalZero   }
476*10465441SEvalZero   res = mdns_domain_add_label(domain, REVERSE_PTR_V4_DOMAIN, (u8_t)(sizeof(REVERSE_PTR_V4_DOMAIN)-1));
477*10465441SEvalZero   LWIP_ERROR("mdns_build_reverse_v4_domain: Failed to add label", (res == ERR_OK), return res);
478*10465441SEvalZero   res = mdns_domain_add_label(domain, REVERSE_PTR_TOPDOMAIN, (u8_t)(sizeof(REVERSE_PTR_TOPDOMAIN)-1));
479*10465441SEvalZero   LWIP_ERROR("mdns_build_reverse_v4_domain: Failed to add label", (res == ERR_OK), return res);
480*10465441SEvalZero   res = mdns_domain_add_label(domain, NULL, 0);
481*10465441SEvalZero   LWIP_ERROR("mdns_build_reverse_v4_domain: Failed to add label", (res == ERR_OK), return res);
482*10465441SEvalZero 
483*10465441SEvalZero   return ERR_OK;
484*10465441SEvalZero }
485*10465441SEvalZero #endif
486*10465441SEvalZero 
487*10465441SEvalZero #if LWIP_IPV6
488*10465441SEvalZero /**
489*10465441SEvalZero  * Build domain for reverse lookup of IP address
490*10465441SEvalZero  * like b.a.9.8.7.6.5.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa. for 2001:db8::567:89ab
491*10465441SEvalZero  * @param domain Where to write the domain name
492*10465441SEvalZero  * @param addr Pointer to an IPv6 address to encode
493*10465441SEvalZero  * @return ERR_OK if domain was written, an err_t otherwise
494*10465441SEvalZero  */
495*10465441SEvalZero static err_t
mdns_build_reverse_v6_domain(struct mdns_domain * domain,const ip6_addr_t * addr)496*10465441SEvalZero mdns_build_reverse_v6_domain(struct mdns_domain *domain, const ip6_addr_t *addr)
497*10465441SEvalZero {
498*10465441SEvalZero   int i;
499*10465441SEvalZero   err_t res;
500*10465441SEvalZero   const u8_t *ptr;
501*10465441SEvalZero   if (!domain || !addr) {
502*10465441SEvalZero     return ERR_ARG;
503*10465441SEvalZero   }
504*10465441SEvalZero   memset(domain, 0, sizeof(struct mdns_domain));
505*10465441SEvalZero   ptr = (const u8_t *) addr;
506*10465441SEvalZero   for (i = sizeof(ip6_addr_t) - 1; i >= 0; i--) {
507*10465441SEvalZero     char buf;
508*10465441SEvalZero     u8_t byte = ptr[i];
509*10465441SEvalZero     int j;
510*10465441SEvalZero     for (j = 0; j < 2; j++) {
511*10465441SEvalZero       if ((byte & 0x0F) < 0xA) {
512*10465441SEvalZero         buf = '0' + (byte & 0x0F);
513*10465441SEvalZero       } else {
514*10465441SEvalZero         buf = 'a' + (byte & 0x0F) - 0xA;
515*10465441SEvalZero       }
516*10465441SEvalZero       res = mdns_domain_add_label(domain, &buf, sizeof(buf));
517*10465441SEvalZero       LWIP_ERROR("mdns_build_reverse_v6_domain: Failed to add label", (res == ERR_OK), return res);
518*10465441SEvalZero       byte >>= 4;
519*10465441SEvalZero     }
520*10465441SEvalZero   }
521*10465441SEvalZero   res = mdns_domain_add_label(domain, REVERSE_PTR_V6_DOMAIN, (u8_t)(sizeof(REVERSE_PTR_V6_DOMAIN)-1));
522*10465441SEvalZero   LWIP_ERROR("mdns_build_reverse_v6_domain: Failed to add label", (res == ERR_OK), return res);
523*10465441SEvalZero   res = mdns_domain_add_label(domain, REVERSE_PTR_TOPDOMAIN, (u8_t)(sizeof(REVERSE_PTR_TOPDOMAIN)-1));
524*10465441SEvalZero   LWIP_ERROR("mdns_build_reverse_v6_domain: Failed to add label", (res == ERR_OK), return res);
525*10465441SEvalZero   res = mdns_domain_add_label(domain, NULL, 0);
526*10465441SEvalZero   LWIP_ERROR("mdns_build_reverse_v6_domain: Failed to add label", (res == ERR_OK), return res);
527*10465441SEvalZero 
528*10465441SEvalZero   return ERR_OK;
529*10465441SEvalZero }
530*10465441SEvalZero #endif
531*10465441SEvalZero 
532*10465441SEvalZero /* Add .local. to domain */
533*10465441SEvalZero static err_t
mdns_add_dotlocal(struct mdns_domain * domain)534*10465441SEvalZero mdns_add_dotlocal(struct mdns_domain *domain)
535*10465441SEvalZero {
536*10465441SEvalZero   err_t res = mdns_domain_add_label(domain, TOPDOMAIN_LOCAL, (u8_t)(sizeof(TOPDOMAIN_LOCAL)-1));
537*10465441SEvalZero   LWIP_ERROR("mdns_add_dotlocal: Failed to add label", (res == ERR_OK), return res);
538*10465441SEvalZero   return mdns_domain_add_label(domain, NULL, 0);
539*10465441SEvalZero }
540*10465441SEvalZero 
541*10465441SEvalZero /**
542*10465441SEvalZero  * Build the <hostname>.local. domain name
543*10465441SEvalZero  * @param domain Where to write the domain name
544*10465441SEvalZero  * @param mdns TMDNS netif descriptor.
545*10465441SEvalZero  * @return ERR_OK if domain <hostname>.local. was written, an err_t otherwise
546*10465441SEvalZero  */
547*10465441SEvalZero static err_t
mdns_build_host_domain(struct mdns_domain * domain,struct mdns_host * mdns)548*10465441SEvalZero mdns_build_host_domain(struct mdns_domain *domain, struct mdns_host *mdns)
549*10465441SEvalZero {
550*10465441SEvalZero   err_t res;
551*10465441SEvalZero   memset(domain, 0, sizeof(struct mdns_domain));
552*10465441SEvalZero   LWIP_ERROR("mdns_build_host_domain: mdns != NULL", (mdns != NULL), return ERR_VAL);
553*10465441SEvalZero   res = mdns_domain_add_label(domain, mdns->name, (u8_t)strlen(mdns->name));
554*10465441SEvalZero   LWIP_ERROR("mdns_build_host_domain: Failed to add label", (res == ERR_OK), return res);
555*10465441SEvalZero   return mdns_add_dotlocal(domain);
556*10465441SEvalZero }
557*10465441SEvalZero 
558*10465441SEvalZero /**
559*10465441SEvalZero  * Build the lookup-all-services special DNS-SD domain name
560*10465441SEvalZero  * @param domain Where to write the domain name
561*10465441SEvalZero  * @return ERR_OK if domain _services._dns-sd._udp.local. was written, an err_t otherwise
562*10465441SEvalZero  */
563*10465441SEvalZero static err_t
mdns_build_dnssd_domain(struct mdns_domain * domain)564*10465441SEvalZero mdns_build_dnssd_domain(struct mdns_domain *domain)
565*10465441SEvalZero {
566*10465441SEvalZero   err_t res;
567*10465441SEvalZero   memset(domain, 0, sizeof(struct mdns_domain));
568*10465441SEvalZero   res = mdns_domain_add_label(domain, "_services", (u8_t)(sizeof("_services")-1));
569*10465441SEvalZero   LWIP_ERROR("mdns_build_dnssd_domain: Failed to add label", (res == ERR_OK), return res);
570*10465441SEvalZero   res = mdns_domain_add_label(domain, "_dns-sd", (u8_t)(sizeof("_dns-sd")-1));
571*10465441SEvalZero   LWIP_ERROR("mdns_build_dnssd_domain: Failed to add label", (res == ERR_OK), return res);
572*10465441SEvalZero   res = mdns_domain_add_label(domain, dnssd_protos[DNSSD_PROTO_UDP], (u8_t)strlen(dnssd_protos[DNSSD_PROTO_UDP]));
573*10465441SEvalZero   LWIP_ERROR("mdns_build_dnssd_domain: Failed to add label", (res == ERR_OK), return res);
574*10465441SEvalZero   return mdns_add_dotlocal(domain);
575*10465441SEvalZero }
576*10465441SEvalZero 
577*10465441SEvalZero /**
578*10465441SEvalZero  * Build domain name for a service
579*10465441SEvalZero  * @param domain Where to write the domain name
580*10465441SEvalZero  * @param service The service struct, containing service name, type and protocol
581*10465441SEvalZero  * @param include_name Whether to include the service name in the domain
582*10465441SEvalZero  * @return ERR_OK if domain was written. If service name is included,
583*10465441SEvalZero  *         <name>.<type>.<proto>.local. will be written, otherwise <type>.<proto>.local.
584*10465441SEvalZero  *         An err_t is returned on error.
585*10465441SEvalZero  */
586*10465441SEvalZero static err_t
mdns_build_service_domain(struct mdns_domain * domain,struct mdns_service * service,int include_name)587*10465441SEvalZero mdns_build_service_domain(struct mdns_domain *domain, struct mdns_service *service, int include_name)
588*10465441SEvalZero {
589*10465441SEvalZero   err_t res;
590*10465441SEvalZero   memset(domain, 0, sizeof(struct mdns_domain));
591*10465441SEvalZero   if (include_name) {
592*10465441SEvalZero     res = mdns_domain_add_label(domain, service->name, (u8_t)strlen(service->name));
593*10465441SEvalZero     LWIP_ERROR("mdns_build_service_domain: Failed to add label", (res == ERR_OK), return res);
594*10465441SEvalZero   }
595*10465441SEvalZero   res = mdns_domain_add_label(domain, service->service, (u8_t)strlen(service->service));
596*10465441SEvalZero   LWIP_ERROR("mdns_build_service_domain: Failed to add label", (res == ERR_OK), return res);
597*10465441SEvalZero   res = mdns_domain_add_label(domain, dnssd_protos[service->proto], (u8_t)strlen(dnssd_protos[service->proto]));
598*10465441SEvalZero   LWIP_ERROR("mdns_build_service_domain: Failed to add label", (res == ERR_OK), return res);
599*10465441SEvalZero   return mdns_add_dotlocal(domain);
600*10465441SEvalZero }
601*10465441SEvalZero 
602*10465441SEvalZero /**
603*10465441SEvalZero  * Check which replies we should send for a host/netif based on question
604*10465441SEvalZero  * @param netif The network interface that received the question
605*10465441SEvalZero  * @param rr Domain/type/class from a question
606*10465441SEvalZero  * @param reverse_v6_reply Bitmask of which IPv6 addresses to send reverse PTRs for
607*10465441SEvalZero  *                         if reply bit has REPLY_HOST_PTR_V6 set
608*10465441SEvalZero  * @return Bitmask of which replies to send
609*10465441SEvalZero  */
610*10465441SEvalZero static int
check_host(struct netif * netif,struct mdns_rr_info * rr,u8_t * reverse_v6_reply)611*10465441SEvalZero check_host(struct netif *netif, struct mdns_rr_info *rr, u8_t *reverse_v6_reply)
612*10465441SEvalZero {
613*10465441SEvalZero   err_t res;
614*10465441SEvalZero   int replies = 0;
615*10465441SEvalZero   struct mdns_domain mydomain;
616*10465441SEvalZero 
617*10465441SEvalZero   LWIP_UNUSED_ARG(reverse_v6_reply); /* if ipv6 is disabled */
618*10465441SEvalZero 
619*10465441SEvalZero   if (rr->klass != DNS_RRCLASS_IN && rr->klass != DNS_RRCLASS_ANY) {
620*10465441SEvalZero     /* Invalid class */
621*10465441SEvalZero     return replies;
622*10465441SEvalZero   }
623*10465441SEvalZero 
624*10465441SEvalZero   /* Handle PTR for our addresses */
625*10465441SEvalZero   if (rr->type == DNS_RRTYPE_PTR || rr->type == DNS_RRTYPE_ANY) {
626*10465441SEvalZero #if LWIP_IPV6
627*10465441SEvalZero     int i;
628*10465441SEvalZero     for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) {
629*10465441SEvalZero       if (ip6_addr_isvalid(netif_ip6_addr_state(netif, i))) {
630*10465441SEvalZero         res = mdns_build_reverse_v6_domain(&mydomain, netif_ip6_addr(netif, i));
631*10465441SEvalZero         if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain)) {
632*10465441SEvalZero           replies |= REPLY_HOST_PTR_V6;
633*10465441SEvalZero           /* Mark which addresses where requested */
634*10465441SEvalZero           if (reverse_v6_reply) {
635*10465441SEvalZero             *reverse_v6_reply |= (1 << i);
636*10465441SEvalZero           }
637*10465441SEvalZero         }
638*10465441SEvalZero       }
639*10465441SEvalZero     }
640*10465441SEvalZero #endif
641*10465441SEvalZero #if LWIP_IPV4
642*10465441SEvalZero     if (!ip4_addr_isany_val(*netif_ip4_addr(netif))) {
643*10465441SEvalZero       res = mdns_build_reverse_v4_domain(&mydomain, netif_ip4_addr(netif));
644*10465441SEvalZero       if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain)) {
645*10465441SEvalZero         replies |= REPLY_HOST_PTR_V4;
646*10465441SEvalZero       }
647*10465441SEvalZero     }
648*10465441SEvalZero #endif
649*10465441SEvalZero   }
650*10465441SEvalZero 
651*10465441SEvalZero   res = mdns_build_host_domain(&mydomain, NETIF_TO_HOST(netif));
652*10465441SEvalZero   /* Handle requests for our hostname */
653*10465441SEvalZero   if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain)) {
654*10465441SEvalZero     /* TODO return NSEC if unsupported protocol requested */
655*10465441SEvalZero #if LWIP_IPV4
656*10465441SEvalZero     if (!ip4_addr_isany_val(*netif_ip4_addr(netif))
657*10465441SEvalZero         && (rr->type == DNS_RRTYPE_A || rr->type == DNS_RRTYPE_ANY)) {
658*10465441SEvalZero       replies |= REPLY_HOST_A;
659*10465441SEvalZero     }
660*10465441SEvalZero #endif
661*10465441SEvalZero #if LWIP_IPV6
662*10465441SEvalZero     if (rr->type == DNS_RRTYPE_AAAA || rr->type == DNS_RRTYPE_ANY) {
663*10465441SEvalZero       replies |= REPLY_HOST_AAAA;
664*10465441SEvalZero     }
665*10465441SEvalZero #endif
666*10465441SEvalZero   }
667*10465441SEvalZero 
668*10465441SEvalZero   return replies;
669*10465441SEvalZero }
670*10465441SEvalZero 
671*10465441SEvalZero /**
672*10465441SEvalZero  * Check which replies we should send for a service based on question
673*10465441SEvalZero  * @param service A registered MDNS service
674*10465441SEvalZero  * @param rr Domain/type/class from a question
675*10465441SEvalZero  * @return Bitmask of which replies to send
676*10465441SEvalZero  */
677*10465441SEvalZero static int
check_service(struct mdns_service * service,struct mdns_rr_info * rr)678*10465441SEvalZero check_service(struct mdns_service *service, struct mdns_rr_info *rr)
679*10465441SEvalZero {
680*10465441SEvalZero   err_t res;
681*10465441SEvalZero   int replies = 0;
682*10465441SEvalZero   struct mdns_domain mydomain;
683*10465441SEvalZero 
684*10465441SEvalZero   if (rr->klass != DNS_RRCLASS_IN && rr->klass != DNS_RRCLASS_ANY) {
685*10465441SEvalZero     /* Invalid class */
686*10465441SEvalZero     return 0;
687*10465441SEvalZero   }
688*10465441SEvalZero 
689*10465441SEvalZero   res = mdns_build_dnssd_domain(&mydomain);
690*10465441SEvalZero   if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain) &&
691*10465441SEvalZero       (rr->type == DNS_RRTYPE_PTR || rr->type == DNS_RRTYPE_ANY)) {
692*10465441SEvalZero     /* Request for all service types */
693*10465441SEvalZero     replies |= REPLY_SERVICE_TYPE_PTR;
694*10465441SEvalZero   }
695*10465441SEvalZero 
696*10465441SEvalZero   res = mdns_build_service_domain(&mydomain, service, 0);
697*10465441SEvalZero   if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain) &&
698*10465441SEvalZero       (rr->type == DNS_RRTYPE_PTR || rr->type == DNS_RRTYPE_ANY)) {
699*10465441SEvalZero     /* Request for the instance of my service */
700*10465441SEvalZero     replies |= REPLY_SERVICE_NAME_PTR;
701*10465441SEvalZero   }
702*10465441SEvalZero 
703*10465441SEvalZero   res = mdns_build_service_domain(&mydomain, service, 1);
704*10465441SEvalZero   if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain)) {
705*10465441SEvalZero     /* Request for info about my service */
706*10465441SEvalZero     if (rr->type == DNS_RRTYPE_SRV || rr->type == DNS_RRTYPE_ANY) {
707*10465441SEvalZero       replies |= REPLY_SERVICE_SRV;
708*10465441SEvalZero     }
709*10465441SEvalZero     if (rr->type == DNS_RRTYPE_TXT || rr->type == DNS_RRTYPE_ANY) {
710*10465441SEvalZero       replies |= REPLY_SERVICE_TXT;
711*10465441SEvalZero     }
712*10465441SEvalZero   }
713*10465441SEvalZero 
714*10465441SEvalZero   return replies;
715*10465441SEvalZero }
716*10465441SEvalZero 
717*10465441SEvalZero /**
718*10465441SEvalZero  * Return bytes needed to write before jump for best result of compressing supplied domain
719*10465441SEvalZero  * against domain in outpacket starting at specified offset.
720*10465441SEvalZero  * If a match is found, offset is updated to where to jump to
721*10465441SEvalZero  * @param pbuf Pointer to pbuf with the partially constructed DNS packet
722*10465441SEvalZero  * @param offset Start position of a domain written earlier. If this location is suitable
723*10465441SEvalZero  *               for compression, the pointer is updated to where in the domain to jump to.
724*10465441SEvalZero  * @param domain The domain to write
725*10465441SEvalZero  * @return Number of bytes to write of the new domain before writing a jump to the offset.
726*10465441SEvalZero  *         If compression can not be done against this previous domain name, the full new
727*10465441SEvalZero  *         domain length is returned.
728*10465441SEvalZero  */
729*10465441SEvalZero u16_t
mdns_compress_domain(struct pbuf * pbuf,u16_t * offset,struct mdns_domain * domain)730*10465441SEvalZero mdns_compress_domain(struct pbuf *pbuf, u16_t *offset, struct mdns_domain *domain)
731*10465441SEvalZero {
732*10465441SEvalZero   struct mdns_domain target;
733*10465441SEvalZero   u16_t target_end;
734*10465441SEvalZero   u8_t target_len;
735*10465441SEvalZero   u8_t writelen = 0;
736*10465441SEvalZero   u8_t *ptr;
737*10465441SEvalZero   if (pbuf == NULL) {
738*10465441SEvalZero     return domain->length;
739*10465441SEvalZero   }
740*10465441SEvalZero   target_end = mdns_readname(pbuf, *offset, &target);
741*10465441SEvalZero   if (target_end == MDNS_READNAME_ERROR) {
742*10465441SEvalZero     return domain->length;
743*10465441SEvalZero   }
744*10465441SEvalZero   target_len = (u8_t)(target_end - *offset);
745*10465441SEvalZero   ptr = domain->name;
746*10465441SEvalZero   while (writelen < domain->length) {
747*10465441SEvalZero     u8_t domainlen = (u8_t)(domain->length - writelen);
748*10465441SEvalZero     u8_t labellen;
749*10465441SEvalZero     if (domainlen <= target.length && domainlen > DOMAIN_JUMP_SIZE) {
750*10465441SEvalZero       /* Compare domains if target is long enough, and we have enough left of the domain */
751*10465441SEvalZero       u8_t targetpos = (u8_t)(target.length - domainlen);
752*10465441SEvalZero       if ((targetpos + DOMAIN_JUMP_SIZE) >= target_len) {
753*10465441SEvalZero         /* We are checking at or beyond a jump in the original, stop looking */
754*10465441SEvalZero         break;
755*10465441SEvalZero       }
756*10465441SEvalZero       if (target.length >= domainlen &&
757*10465441SEvalZero           memcmp(&domain->name[writelen], &target.name[targetpos], domainlen) == 0) {
758*10465441SEvalZero         *offset += targetpos;
759*10465441SEvalZero         return writelen;
760*10465441SEvalZero       }
761*10465441SEvalZero     }
762*10465441SEvalZero     /* Skip to next label in domain */
763*10465441SEvalZero     labellen = *ptr;
764*10465441SEvalZero     writelen += 1 + labellen;
765*10465441SEvalZero     ptr += 1 + labellen;
766*10465441SEvalZero   }
767*10465441SEvalZero   /* Nothing found */
768*10465441SEvalZero   return domain->length;
769*10465441SEvalZero }
770*10465441SEvalZero 
771*10465441SEvalZero /**
772*10465441SEvalZero  * Write domain to outpacket. Compression will be attempted,
773*10465441SEvalZero  * unless domain->skip_compression is set.
774*10465441SEvalZero  * @param outpkt The outpacket to write to
775*10465441SEvalZero  * @param domain The domain name to write
776*10465441SEvalZero  * @return ERR_OK on success, an err_t otherwise
777*10465441SEvalZero  */
778*10465441SEvalZero static err_t
mdns_write_domain(struct mdns_outpacket * outpkt,struct mdns_domain * domain)779*10465441SEvalZero mdns_write_domain(struct mdns_outpacket *outpkt, struct mdns_domain *domain)
780*10465441SEvalZero {
781*10465441SEvalZero   int i;
782*10465441SEvalZero   err_t res;
783*10465441SEvalZero   u16_t writelen = domain->length;
784*10465441SEvalZero   u16_t jump_offset = 0;
785*10465441SEvalZero   u16_t jump;
786*10465441SEvalZero 
787*10465441SEvalZero   if (!domain->skip_compression) {
788*10465441SEvalZero     for (i = 0; i < NUM_DOMAIN_OFFSETS; ++i) {
789*10465441SEvalZero       u16_t offset = outpkt->domain_offsets[i];
790*10465441SEvalZero       if (offset) {
791*10465441SEvalZero         u16_t len = mdns_compress_domain(outpkt->pbuf, &offset, domain);
792*10465441SEvalZero         if (len < writelen) {
793*10465441SEvalZero           writelen = len;
794*10465441SEvalZero           jump_offset = offset;
795*10465441SEvalZero         }
796*10465441SEvalZero       }
797*10465441SEvalZero     }
798*10465441SEvalZero   }
799*10465441SEvalZero 
800*10465441SEvalZero   if (writelen) {
801*10465441SEvalZero     /* Write uncompressed part of name */
802*10465441SEvalZero     res = pbuf_take_at(outpkt->pbuf, domain->name, writelen, outpkt->write_offset);
803*10465441SEvalZero     if (res != ERR_OK) {
804*10465441SEvalZero       return res;
805*10465441SEvalZero     }
806*10465441SEvalZero 
807*10465441SEvalZero     /* Store offset of this new domain */
808*10465441SEvalZero     for (i = 0; i < NUM_DOMAIN_OFFSETS; ++i) {
809*10465441SEvalZero       if (outpkt->domain_offsets[i] == 0) {
810*10465441SEvalZero         outpkt->domain_offsets[i] = outpkt->write_offset;
811*10465441SEvalZero         break;
812*10465441SEvalZero       }
813*10465441SEvalZero     }
814*10465441SEvalZero 
815*10465441SEvalZero     outpkt->write_offset += writelen;
816*10465441SEvalZero   }
817*10465441SEvalZero   if (jump_offset) {
818*10465441SEvalZero     /* Write jump */
819*10465441SEvalZero     jump = lwip_htons(DOMAIN_JUMP | jump_offset);
820*10465441SEvalZero     res = pbuf_take_at(outpkt->pbuf, &jump, DOMAIN_JUMP_SIZE, outpkt->write_offset);
821*10465441SEvalZero     if (res != ERR_OK) {
822*10465441SEvalZero       return res;
823*10465441SEvalZero     }
824*10465441SEvalZero     outpkt->write_offset += DOMAIN_JUMP_SIZE;
825*10465441SEvalZero   }
826*10465441SEvalZero   return ERR_OK;
827*10465441SEvalZero }
828*10465441SEvalZero 
829*10465441SEvalZero /**
830*10465441SEvalZero  * Write a question to an outpacket
831*10465441SEvalZero  * A question contains domain, type and class. Since an answer also starts with these fields this function is also
832*10465441SEvalZero  * called from mdns_add_answer().
833*10465441SEvalZero  * @param outpkt The outpacket to write to
834*10465441SEvalZero  * @param domain The domain name the answer is for
835*10465441SEvalZero  * @param type The DNS type of the answer (like 'AAAA', 'SRV')
836*10465441SEvalZero  * @param klass The DNS type of the answer (like 'IN')
837*10465441SEvalZero  * @param unicast If highest bit in class should be set, to instruct the responder to
838*10465441SEvalZero  *                reply with a unicast packet
839*10465441SEvalZero  * @return ERR_OK on success, an err_t otherwise
840*10465441SEvalZero  */
841*10465441SEvalZero static err_t
mdns_add_question(struct mdns_outpacket * outpkt,struct mdns_domain * domain,u16_t type,u16_t klass,u16_t unicast)842*10465441SEvalZero mdns_add_question(struct mdns_outpacket *outpkt, struct mdns_domain *domain, u16_t type, u16_t klass, u16_t unicast)
843*10465441SEvalZero {
844*10465441SEvalZero   u16_t question_len;
845*10465441SEvalZero   u16_t field16;
846*10465441SEvalZero   err_t res;
847*10465441SEvalZero 
848*10465441SEvalZero   if (!outpkt->pbuf) {
849*10465441SEvalZero     /* If no pbuf is active, allocate one */
850*10465441SEvalZero     outpkt->pbuf = pbuf_alloc(PBUF_TRANSPORT, OUTPACKET_SIZE, PBUF_RAM);
851*10465441SEvalZero     if (!outpkt->pbuf) {
852*10465441SEvalZero       return ERR_MEM;
853*10465441SEvalZero     }
854*10465441SEvalZero     outpkt->write_offset = SIZEOF_DNS_HDR;
855*10465441SEvalZero   }
856*10465441SEvalZero 
857*10465441SEvalZero   /* Worst case calculation. Domain string might be compressed */
858*10465441SEvalZero   question_len = domain->length + sizeof(type) + sizeof(klass);
859*10465441SEvalZero   if (outpkt->write_offset + question_len > outpkt->pbuf->tot_len) {
860*10465441SEvalZero     /* No space */
861*10465441SEvalZero     return ERR_MEM;
862*10465441SEvalZero   }
863*10465441SEvalZero 
864*10465441SEvalZero   /* Write name */
865*10465441SEvalZero   res = mdns_write_domain(outpkt, domain);
866*10465441SEvalZero   if (res != ERR_OK) {
867*10465441SEvalZero     return res;
868*10465441SEvalZero   }
869*10465441SEvalZero 
870*10465441SEvalZero   /* Write type */
871*10465441SEvalZero   field16 = lwip_htons(type);
872*10465441SEvalZero   res = pbuf_take_at(outpkt->pbuf, &field16, sizeof(field16), outpkt->write_offset);
873*10465441SEvalZero   if (res != ERR_OK) {
874*10465441SEvalZero     return res;
875*10465441SEvalZero   }
876*10465441SEvalZero   outpkt->write_offset += sizeof(field16);
877*10465441SEvalZero 
878*10465441SEvalZero   /* Write class */
879*10465441SEvalZero   if (unicast) {
880*10465441SEvalZero     klass |= 0x8000;
881*10465441SEvalZero   }
882*10465441SEvalZero   field16 = lwip_htons(klass);
883*10465441SEvalZero   res = pbuf_take_at(outpkt->pbuf, &field16, sizeof(field16), outpkt->write_offset);
884*10465441SEvalZero   if (res != ERR_OK) {
885*10465441SEvalZero     return res;
886*10465441SEvalZero   }
887*10465441SEvalZero   outpkt->write_offset += sizeof(field16);
888*10465441SEvalZero 
889*10465441SEvalZero   return ERR_OK;
890*10465441SEvalZero }
891*10465441SEvalZero 
892*10465441SEvalZero /**
893*10465441SEvalZero  * Write answer to reply packet.
894*10465441SEvalZero  * buf or answer_domain can be null. The rd_length written will be buf_length +
895*10465441SEvalZero  * size of (compressed) domain. Most uses will need either buf or answer_domain,
896*10465441SEvalZero  * special case is SRV that starts with 3 u16 and then a domain name.
897*10465441SEvalZero  * @param reply The outpacket to write to
898*10465441SEvalZero  * @param domain The domain name the answer is for
899*10465441SEvalZero  * @param type The DNS type of the answer (like 'AAAA', 'SRV')
900*10465441SEvalZero  * @param klass The DNS type of the answer (like 'IN')
901*10465441SEvalZero  * @param cache_flush If highest bit in class should be set, to instruct receiver that
902*10465441SEvalZero  *                    this reply replaces any earlier answer for this domain/type/class
903*10465441SEvalZero  * @param ttl Validity time in seconds to send out for IP address data in DNS replies
904*10465441SEvalZero  * @param buf Pointer to buffer of answer data
905*10465441SEvalZero  * @param buf_length Length of variable data
906*10465441SEvalZero  * @param answer_domain A domain to write after any buffer data as answer
907*10465441SEvalZero  * @return ERR_OK on success, an err_t otherwise
908*10465441SEvalZero  */
909*10465441SEvalZero static err_t
mdns_add_answer(struct mdns_outpacket * reply,struct mdns_domain * domain,u16_t type,u16_t klass,u16_t cache_flush,u32_t ttl,const u8_t * buf,size_t buf_length,struct mdns_domain * answer_domain)910*10465441SEvalZero mdns_add_answer(struct mdns_outpacket *reply, struct mdns_domain *domain, u16_t type, u16_t klass, u16_t cache_flush,
911*10465441SEvalZero                 u32_t ttl, const u8_t *buf, size_t buf_length, struct mdns_domain *answer_domain)
912*10465441SEvalZero {
913*10465441SEvalZero   u16_t answer_len;
914*10465441SEvalZero   u16_t field16;
915*10465441SEvalZero   u16_t rdlen_offset;
916*10465441SEvalZero   u16_t answer_offset;
917*10465441SEvalZero   u32_t field32;
918*10465441SEvalZero   err_t res;
919*10465441SEvalZero 
920*10465441SEvalZero   if (!reply->pbuf) {
921*10465441SEvalZero     /* If no pbuf is active, allocate one */
922*10465441SEvalZero     reply->pbuf = pbuf_alloc(PBUF_TRANSPORT, OUTPACKET_SIZE, PBUF_RAM);
923*10465441SEvalZero     if (!reply->pbuf) {
924*10465441SEvalZero       return ERR_MEM;
925*10465441SEvalZero     }
926*10465441SEvalZero     reply->write_offset = SIZEOF_DNS_HDR;
927*10465441SEvalZero   }
928*10465441SEvalZero 
929*10465441SEvalZero   /* Worst case calculation. Domain strings might be compressed */
930*10465441SEvalZero   answer_len = domain->length + sizeof(type) + sizeof(klass) + sizeof(ttl) + sizeof(field16)/*rd_length*/;
931*10465441SEvalZero   if (buf) {
932*10465441SEvalZero     answer_len += (u16_t)buf_length;
933*10465441SEvalZero   }
934*10465441SEvalZero   if (answer_domain) {
935*10465441SEvalZero     answer_len += answer_domain->length;
936*10465441SEvalZero   }
937*10465441SEvalZero   if (reply->write_offset + answer_len > reply->pbuf->tot_len) {
938*10465441SEvalZero     /* No space */
939*10465441SEvalZero     return ERR_MEM;
940*10465441SEvalZero   }
941*10465441SEvalZero 
942*10465441SEvalZero   /* Answer starts with same data as question, then more fields */
943*10465441SEvalZero   mdns_add_question(reply, domain, type, klass, cache_flush);
944*10465441SEvalZero 
945*10465441SEvalZero   /* Write TTL */
946*10465441SEvalZero   field32 = lwip_htonl(ttl);
947*10465441SEvalZero   res = pbuf_take_at(reply->pbuf, &field32, sizeof(field32), reply->write_offset);
948*10465441SEvalZero   if (res != ERR_OK) {
949*10465441SEvalZero     return res;
950*10465441SEvalZero   }
951*10465441SEvalZero   reply->write_offset += sizeof(field32);
952*10465441SEvalZero 
953*10465441SEvalZero   /* Store offsets and skip forward to the data */
954*10465441SEvalZero   rdlen_offset = reply->write_offset;
955*10465441SEvalZero   reply->write_offset += sizeof(field16);
956*10465441SEvalZero   answer_offset = reply->write_offset;
957*10465441SEvalZero 
958*10465441SEvalZero   if (buf) {
959*10465441SEvalZero     /* Write static data */
960*10465441SEvalZero     res = pbuf_take_at(reply->pbuf, buf, (u16_t)buf_length, reply->write_offset);
961*10465441SEvalZero     if (res != ERR_OK) {
962*10465441SEvalZero       return res;
963*10465441SEvalZero     }
964*10465441SEvalZero     reply->write_offset += (u16_t)buf_length;
965*10465441SEvalZero   }
966*10465441SEvalZero 
967*10465441SEvalZero   if (answer_domain) {
968*10465441SEvalZero     /* Write name answer (compressed if possible) */
969*10465441SEvalZero     res = mdns_write_domain(reply, answer_domain);
970*10465441SEvalZero     if (res != ERR_OK) {
971*10465441SEvalZero       return res;
972*10465441SEvalZero     }
973*10465441SEvalZero   }
974*10465441SEvalZero 
975*10465441SEvalZero   /* Write rd_length after when we know the answer size */
976*10465441SEvalZero   field16 = lwip_htons(reply->write_offset - answer_offset);
977*10465441SEvalZero   res = pbuf_take_at(reply->pbuf, &field16, sizeof(field16), rdlen_offset);
978*10465441SEvalZero 
979*10465441SEvalZero   return res;
980*10465441SEvalZero }
981*10465441SEvalZero 
982*10465441SEvalZero /**
983*10465441SEvalZero  * Helper function for mdns_read_question/mdns_read_answer
984*10465441SEvalZero  * Reads a domain, type and class from the packet
985*10465441SEvalZero  * @param pkt The MDNS packet to read from. The parse_offset field will be
986*10465441SEvalZero  *            incremented to point to the next unparsed byte.
987*10465441SEvalZero  * @param info The struct to fill with domain, type and class
988*10465441SEvalZero  * @return ERR_OK on success, an err_t otherwise
989*10465441SEvalZero  */
990*10465441SEvalZero static err_t
mdns_read_rr_info(struct mdns_packet * pkt,struct mdns_rr_info * info)991*10465441SEvalZero mdns_read_rr_info(struct mdns_packet *pkt, struct mdns_rr_info *info)
992*10465441SEvalZero {
993*10465441SEvalZero   u16_t field16, copied;
994*10465441SEvalZero   pkt->parse_offset = mdns_readname(pkt->pbuf, pkt->parse_offset, &info->domain);
995*10465441SEvalZero   if (pkt->parse_offset == MDNS_READNAME_ERROR) {
996*10465441SEvalZero     return ERR_VAL;
997*10465441SEvalZero   }
998*10465441SEvalZero 
999*10465441SEvalZero   copied = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), pkt->parse_offset);
1000*10465441SEvalZero   if (copied != sizeof(field16)) {
1001*10465441SEvalZero     return ERR_VAL;
1002*10465441SEvalZero   }
1003*10465441SEvalZero   pkt->parse_offset += copied;
1004*10465441SEvalZero   info->type = lwip_ntohs(field16);
1005*10465441SEvalZero 
1006*10465441SEvalZero   copied = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), pkt->parse_offset);
1007*10465441SEvalZero   if (copied != sizeof(field16)) {
1008*10465441SEvalZero     return ERR_VAL;
1009*10465441SEvalZero   }
1010*10465441SEvalZero   pkt->parse_offset += copied;
1011*10465441SEvalZero   info->klass = lwip_ntohs(field16);
1012*10465441SEvalZero 
1013*10465441SEvalZero   return ERR_OK;
1014*10465441SEvalZero }
1015*10465441SEvalZero 
1016*10465441SEvalZero /**
1017*10465441SEvalZero  * Read a question from the packet.
1018*10465441SEvalZero  * All questions have to be read before the answers.
1019*10465441SEvalZero  * @param pkt The MDNS packet to read from. The questions_left field will be decremented
1020*10465441SEvalZero  *            and the parse_offset will be updated.
1021*10465441SEvalZero  * @param question The struct to fill with question data
1022*10465441SEvalZero  * @return ERR_OK on success, an err_t otherwise
1023*10465441SEvalZero  */
1024*10465441SEvalZero static err_t
mdns_read_question(struct mdns_packet * pkt,struct mdns_question * question)1025*10465441SEvalZero mdns_read_question(struct mdns_packet *pkt, struct mdns_question *question)
1026*10465441SEvalZero {
1027*10465441SEvalZero   /* Safety check */
1028*10465441SEvalZero   if (pkt->pbuf->tot_len < pkt->parse_offset) {
1029*10465441SEvalZero     return ERR_VAL;
1030*10465441SEvalZero   }
1031*10465441SEvalZero 
1032*10465441SEvalZero   if (pkt->questions_left) {
1033*10465441SEvalZero     err_t res;
1034*10465441SEvalZero     pkt->questions_left--;
1035*10465441SEvalZero 
1036*10465441SEvalZero     memset(question, 0, sizeof(struct mdns_question));
1037*10465441SEvalZero     res = mdns_read_rr_info(pkt, &question->info);
1038*10465441SEvalZero     if (res != ERR_OK) {
1039*10465441SEvalZero       return res;
1040*10465441SEvalZero     }
1041*10465441SEvalZero 
1042*10465441SEvalZero     /* Extract unicast flag from class field */
1043*10465441SEvalZero     question->unicast = question->info.klass & 0x8000;
1044*10465441SEvalZero     question->info.klass &= 0x7FFF;
1045*10465441SEvalZero 
1046*10465441SEvalZero     return ERR_OK;
1047*10465441SEvalZero   }
1048*10465441SEvalZero   return ERR_VAL;
1049*10465441SEvalZero }
1050*10465441SEvalZero 
1051*10465441SEvalZero /**
1052*10465441SEvalZero  * Read an answer from the packet
1053*10465441SEvalZero  * The variable length reply is not copied, its pbuf offset and length is stored instead.
1054*10465441SEvalZero  * @param pkt The MDNS packet to read. The answers_left field will be decremented and
1055*10465441SEvalZero  *            the parse_offset will be updated.
1056*10465441SEvalZero  * @param answer The struct to fill with answer data
1057*10465441SEvalZero  * @return ERR_OK on success, an err_t otherwise
1058*10465441SEvalZero  */
1059*10465441SEvalZero static err_t
mdns_read_answer(struct mdns_packet * pkt,struct mdns_answer * answer)1060*10465441SEvalZero mdns_read_answer(struct mdns_packet *pkt, struct mdns_answer *answer)
1061*10465441SEvalZero {
1062*10465441SEvalZero   /* Read questions first */
1063*10465441SEvalZero   if (pkt->questions_left) {
1064*10465441SEvalZero     return ERR_VAL;
1065*10465441SEvalZero   }
1066*10465441SEvalZero 
1067*10465441SEvalZero   /* Safety check */
1068*10465441SEvalZero   if (pkt->pbuf->tot_len < pkt->parse_offset) {
1069*10465441SEvalZero     return ERR_VAL;
1070*10465441SEvalZero   }
1071*10465441SEvalZero 
1072*10465441SEvalZero   if (pkt->answers_left) {
1073*10465441SEvalZero     u16_t copied, field16;
1074*10465441SEvalZero     u32_t ttl;
1075*10465441SEvalZero     err_t res;
1076*10465441SEvalZero     pkt->answers_left--;
1077*10465441SEvalZero 
1078*10465441SEvalZero     memset(answer, 0, sizeof(struct mdns_answer));
1079*10465441SEvalZero     res = mdns_read_rr_info(pkt, &answer->info);
1080*10465441SEvalZero     if (res != ERR_OK) {
1081*10465441SEvalZero       return res;
1082*10465441SEvalZero     }
1083*10465441SEvalZero 
1084*10465441SEvalZero     /* Extract cache_flush flag from class field */
1085*10465441SEvalZero     answer->cache_flush = answer->info.klass & 0x8000;
1086*10465441SEvalZero     answer->info.klass &= 0x7FFF;
1087*10465441SEvalZero 
1088*10465441SEvalZero     copied = pbuf_copy_partial(pkt->pbuf, &ttl, sizeof(ttl), pkt->parse_offset);
1089*10465441SEvalZero     if (copied != sizeof(ttl)) {
1090*10465441SEvalZero       return ERR_VAL;
1091*10465441SEvalZero     }
1092*10465441SEvalZero     pkt->parse_offset += copied;
1093*10465441SEvalZero     answer->ttl = lwip_ntohl(ttl);
1094*10465441SEvalZero 
1095*10465441SEvalZero     copied = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), pkt->parse_offset);
1096*10465441SEvalZero     if (copied != sizeof(field16)) {
1097*10465441SEvalZero       return ERR_VAL;
1098*10465441SEvalZero     }
1099*10465441SEvalZero     pkt->parse_offset += copied;
1100*10465441SEvalZero     answer->rd_length = lwip_ntohs(field16);
1101*10465441SEvalZero 
1102*10465441SEvalZero     answer->rd_offset = pkt->parse_offset;
1103*10465441SEvalZero     pkt->parse_offset += answer->rd_length;
1104*10465441SEvalZero 
1105*10465441SEvalZero     return ERR_OK;
1106*10465441SEvalZero   }
1107*10465441SEvalZero   return ERR_VAL;
1108*10465441SEvalZero }
1109*10465441SEvalZero 
1110*10465441SEvalZero #if LWIP_IPV4
1111*10465441SEvalZero /** Write an IPv4 address (A) RR to outpacket */
1112*10465441SEvalZero static err_t
mdns_add_a_answer(struct mdns_outpacket * reply,u16_t cache_flush,struct netif * netif)1113*10465441SEvalZero mdns_add_a_answer(struct mdns_outpacket *reply, u16_t cache_flush, struct netif *netif)
1114*10465441SEvalZero {
1115*10465441SEvalZero   struct mdns_domain host;
1116*10465441SEvalZero   mdns_build_host_domain(&host, NETIF_TO_HOST(netif));
1117*10465441SEvalZero   LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Responding with A record\n"));
1118*10465441SEvalZero   return mdns_add_answer(reply, &host, DNS_RRTYPE_A, DNS_RRCLASS_IN, cache_flush, (NETIF_TO_HOST(netif))->dns_ttl, (const u8_t *) netif_ip4_addr(netif), sizeof(ip4_addr_t), NULL);
1119*10465441SEvalZero }
1120*10465441SEvalZero 
1121*10465441SEvalZero /** Write a 4.3.2.1.in-addr.arpa -> hostname.local PTR RR to outpacket */
1122*10465441SEvalZero static err_t
mdns_add_hostv4_ptr_answer(struct mdns_outpacket * reply,u16_t cache_flush,struct netif * netif)1123*10465441SEvalZero mdns_add_hostv4_ptr_answer(struct mdns_outpacket *reply, u16_t cache_flush, struct netif *netif)
1124*10465441SEvalZero {
1125*10465441SEvalZero   struct mdns_domain host, revhost;
1126*10465441SEvalZero   mdns_build_host_domain(&host, NETIF_TO_HOST(netif));
1127*10465441SEvalZero   mdns_build_reverse_v4_domain(&revhost, netif_ip4_addr(netif));
1128*10465441SEvalZero   LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Responding with v4 PTR record\n"));
1129*10465441SEvalZero   return mdns_add_answer(reply, &revhost, DNS_RRTYPE_PTR, DNS_RRCLASS_IN, cache_flush, (NETIF_TO_HOST(netif))->dns_ttl, NULL, 0, &host);
1130*10465441SEvalZero }
1131*10465441SEvalZero #endif
1132*10465441SEvalZero 
1133*10465441SEvalZero #if LWIP_IPV6
1134*10465441SEvalZero /** Write an IPv6 address (AAAA) RR to outpacket */
1135*10465441SEvalZero static err_t
mdns_add_aaaa_answer(struct mdns_outpacket * reply,u16_t cache_flush,struct netif * netif,int addrindex)1136*10465441SEvalZero mdns_add_aaaa_answer(struct mdns_outpacket *reply, u16_t cache_flush, struct netif *netif, int addrindex)
1137*10465441SEvalZero {
1138*10465441SEvalZero   struct mdns_domain host;
1139*10465441SEvalZero   mdns_build_host_domain(&host, NETIF_TO_HOST(netif));
1140*10465441SEvalZero   LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Responding with AAAA record\n"));
1141*10465441SEvalZero   return mdns_add_answer(reply, &host, DNS_RRTYPE_AAAA, DNS_RRCLASS_IN, cache_flush, (NETIF_TO_HOST(netif))->dns_ttl, (const u8_t *) netif_ip6_addr(netif, addrindex), sizeof(ip6_addr_t), NULL);
1142*10465441SEvalZero }
1143*10465441SEvalZero 
1144*10465441SEvalZero /** Write a x.y.z.ip6.arpa -> hostname.local PTR RR to outpacket */
1145*10465441SEvalZero static err_t
mdns_add_hostv6_ptr_answer(struct mdns_outpacket * reply,u16_t cache_flush,struct netif * netif,int addrindex)1146*10465441SEvalZero mdns_add_hostv6_ptr_answer(struct mdns_outpacket *reply, u16_t cache_flush, struct netif *netif, int addrindex)
1147*10465441SEvalZero {
1148*10465441SEvalZero   struct mdns_domain host, revhost;
1149*10465441SEvalZero   mdns_build_host_domain(&host, NETIF_TO_HOST(netif));
1150*10465441SEvalZero   mdns_build_reverse_v6_domain(&revhost, netif_ip6_addr(netif, addrindex));
1151*10465441SEvalZero   LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Responding with v6 PTR record\n"));
1152*10465441SEvalZero   return mdns_add_answer(reply, &revhost, DNS_RRTYPE_PTR, DNS_RRCLASS_IN, cache_flush, (NETIF_TO_HOST(netif))->dns_ttl, NULL, 0, &host);
1153*10465441SEvalZero }
1154*10465441SEvalZero #endif
1155*10465441SEvalZero 
1156*10465441SEvalZero /** Write an all-services -> servicetype PTR RR to outpacket */
1157*10465441SEvalZero static err_t
mdns_add_servicetype_ptr_answer(struct mdns_outpacket * reply,struct mdns_service * service)1158*10465441SEvalZero mdns_add_servicetype_ptr_answer(struct mdns_outpacket *reply, struct mdns_service *service)
1159*10465441SEvalZero {
1160*10465441SEvalZero   struct mdns_domain service_type, service_dnssd;
1161*10465441SEvalZero   mdns_build_service_domain(&service_type, service, 0);
1162*10465441SEvalZero   mdns_build_dnssd_domain(&service_dnssd);
1163*10465441SEvalZero   LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Responding with service type PTR record\n"));
1164*10465441SEvalZero   return mdns_add_answer(reply, &service_dnssd, DNS_RRTYPE_PTR, DNS_RRCLASS_IN, 0, service->dns_ttl, NULL, 0, &service_type);
1165*10465441SEvalZero }
1166*10465441SEvalZero 
1167*10465441SEvalZero /** Write a servicetype -> servicename PTR RR to outpacket */
1168*10465441SEvalZero static err_t
mdns_add_servicename_ptr_answer(struct mdns_outpacket * reply,struct mdns_service * service)1169*10465441SEvalZero mdns_add_servicename_ptr_answer(struct mdns_outpacket *reply, struct mdns_service *service)
1170*10465441SEvalZero {
1171*10465441SEvalZero   struct mdns_domain service_type, service_instance;
1172*10465441SEvalZero   mdns_build_service_domain(&service_type, service, 0);
1173*10465441SEvalZero   mdns_build_service_domain(&service_instance, service, 1);
1174*10465441SEvalZero   LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Responding with service name PTR record\n"));
1175*10465441SEvalZero   return mdns_add_answer(reply, &service_type, DNS_RRTYPE_PTR, DNS_RRCLASS_IN, 0, service->dns_ttl, NULL, 0, &service_instance);
1176*10465441SEvalZero }
1177*10465441SEvalZero 
1178*10465441SEvalZero /** Write a SRV RR to outpacket */
1179*10465441SEvalZero static err_t
mdns_add_srv_answer(struct mdns_outpacket * reply,u16_t cache_flush,struct mdns_host * mdns,struct mdns_service * service)1180*10465441SEvalZero mdns_add_srv_answer(struct mdns_outpacket *reply, u16_t cache_flush, struct mdns_host *mdns, struct mdns_service *service)
1181*10465441SEvalZero {
1182*10465441SEvalZero   struct mdns_domain service_instance, srvhost;
1183*10465441SEvalZero   u16_t srvdata[3];
1184*10465441SEvalZero   mdns_build_service_domain(&service_instance, service, 1);
1185*10465441SEvalZero   mdns_build_host_domain(&srvhost, mdns);
1186*10465441SEvalZero   if (reply->legacy_query) {
1187*10465441SEvalZero     /* RFC 6762 section 18.14:
1188*10465441SEvalZero      * In legacy unicast responses generated to answer legacy queries,
1189*10465441SEvalZero      * name compression MUST NOT be performed on SRV records.
1190*10465441SEvalZero      */
1191*10465441SEvalZero     srvhost.skip_compression = 1;
1192*10465441SEvalZero   }
1193*10465441SEvalZero   srvdata[0] = lwip_htons(SRV_PRIORITY);
1194*10465441SEvalZero   srvdata[1] = lwip_htons(SRV_WEIGHT);
1195*10465441SEvalZero   srvdata[2] = lwip_htons(service->port);
1196*10465441SEvalZero   LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Responding with SRV record\n"));
1197*10465441SEvalZero   return mdns_add_answer(reply, &service_instance, DNS_RRTYPE_SRV, DNS_RRCLASS_IN, cache_flush, service->dns_ttl,
1198*10465441SEvalZero                          (const u8_t *) &srvdata, sizeof(srvdata), &srvhost);
1199*10465441SEvalZero }
1200*10465441SEvalZero 
1201*10465441SEvalZero /** Write a TXT RR to outpacket */
1202*10465441SEvalZero static err_t
mdns_add_txt_answer(struct mdns_outpacket * reply,u16_t cache_flush,struct mdns_service * service)1203*10465441SEvalZero mdns_add_txt_answer(struct mdns_outpacket *reply, u16_t cache_flush, struct mdns_service *service)
1204*10465441SEvalZero {
1205*10465441SEvalZero   struct mdns_domain service_instance;
1206*10465441SEvalZero   mdns_build_service_domain(&service_instance, service, 1);
1207*10465441SEvalZero   mdns_prepare_txtdata(service);
1208*10465441SEvalZero   LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Responding with TXT record\n"));
1209*10465441SEvalZero   return mdns_add_answer(reply, &service_instance, DNS_RRTYPE_TXT, DNS_RRCLASS_IN, cache_flush, service->dns_ttl,
1210*10465441SEvalZero                          (u8_t *) &service->txtdata.name, service->txtdata.length, NULL);
1211*10465441SEvalZero }
1212*10465441SEvalZero 
1213*10465441SEvalZero /**
1214*10465441SEvalZero  * Setup outpacket as a reply to the incoming packet
1215*10465441SEvalZero  */
1216*10465441SEvalZero static void
mdns_init_outpacket(struct mdns_outpacket * out,struct mdns_packet * in)1217*10465441SEvalZero mdns_init_outpacket(struct mdns_outpacket *out, struct mdns_packet *in)
1218*10465441SEvalZero {
1219*10465441SEvalZero   memset(out, 0, sizeof(struct mdns_outpacket));
1220*10465441SEvalZero   out->cache_flush = 1;
1221*10465441SEvalZero   out->netif = in->netif;
1222*10465441SEvalZero 
1223*10465441SEvalZero   /* Copy source IP/port to use when responding unicast, or to choose
1224*10465441SEvalZero    * which pcb to use for multicast (IPv4/IPv6)
1225*10465441SEvalZero    */
1226*10465441SEvalZero   SMEMCPY(&out->dest_addr, &in->source_addr, sizeof(ip_addr_t));
1227*10465441SEvalZero   out->dest_port = in->source_port;
1228*10465441SEvalZero 
1229*10465441SEvalZero   if (in->source_port != MDNS_PORT) {
1230*10465441SEvalZero     out->unicast_reply = 1;
1231*10465441SEvalZero     out->cache_flush = 0;
1232*10465441SEvalZero     if (in->questions == 1) {
1233*10465441SEvalZero       out->legacy_query = 1;
1234*10465441SEvalZero       out->tx_id = in->tx_id;
1235*10465441SEvalZero     }
1236*10465441SEvalZero   }
1237*10465441SEvalZero 
1238*10465441SEvalZero   if (in->recv_unicast) {
1239*10465441SEvalZero     out->unicast_reply = 1;
1240*10465441SEvalZero   }
1241*10465441SEvalZero }
1242*10465441SEvalZero 
1243*10465441SEvalZero /**
1244*10465441SEvalZero  * Send chosen answers as a reply
1245*10465441SEvalZero  *
1246*10465441SEvalZero  * Add all selected answers (first write will allocate pbuf)
1247*10465441SEvalZero  * Add additional answers based on the selected answers
1248*10465441SEvalZero  * Send the packet
1249*10465441SEvalZero  */
1250*10465441SEvalZero static void
mdns_send_outpacket(struct mdns_outpacket * outpkt)1251*10465441SEvalZero mdns_send_outpacket(struct mdns_outpacket *outpkt)
1252*10465441SEvalZero {
1253*10465441SEvalZero   struct mdns_service *service;
1254*10465441SEvalZero   err_t res;
1255*10465441SEvalZero   int i;
1256*10465441SEvalZero   struct mdns_host* mdns = NETIF_TO_HOST(outpkt->netif);
1257*10465441SEvalZero 
1258*10465441SEvalZero   /* Write answers to host questions */
1259*10465441SEvalZero #if LWIP_IPV4
1260*10465441SEvalZero   if (outpkt->host_replies & REPLY_HOST_A) {
1261*10465441SEvalZero     res = mdns_add_a_answer(outpkt, outpkt->cache_flush, outpkt->netif);
1262*10465441SEvalZero     if (res != ERR_OK) {
1263*10465441SEvalZero       goto cleanup;
1264*10465441SEvalZero     }
1265*10465441SEvalZero     outpkt->answers++;
1266*10465441SEvalZero   }
1267*10465441SEvalZero   if (outpkt->host_replies & REPLY_HOST_PTR_V4) {
1268*10465441SEvalZero     res = mdns_add_hostv4_ptr_answer(outpkt, outpkt->cache_flush, outpkt->netif);
1269*10465441SEvalZero     if (res != ERR_OK) {
1270*10465441SEvalZero       goto cleanup;
1271*10465441SEvalZero     }
1272*10465441SEvalZero     outpkt->answers++;
1273*10465441SEvalZero   }
1274*10465441SEvalZero #endif
1275*10465441SEvalZero #if LWIP_IPV6
1276*10465441SEvalZero   if (outpkt->host_replies & REPLY_HOST_AAAA) {
1277*10465441SEvalZero     int addrindex;
1278*10465441SEvalZero     for (addrindex = 0; addrindex < LWIP_IPV6_NUM_ADDRESSES; ++addrindex) {
1279*10465441SEvalZero       if (ip6_addr_isvalid(netif_ip6_addr_state(outpkt->netif, addrindex))) {
1280*10465441SEvalZero         res = mdns_add_aaaa_answer(outpkt, outpkt->cache_flush, outpkt->netif, addrindex);
1281*10465441SEvalZero         if (res != ERR_OK) {
1282*10465441SEvalZero           goto cleanup;
1283*10465441SEvalZero         }
1284*10465441SEvalZero         outpkt->answers++;
1285*10465441SEvalZero       }
1286*10465441SEvalZero     }
1287*10465441SEvalZero   }
1288*10465441SEvalZero   if (outpkt->host_replies & REPLY_HOST_PTR_V6) {
1289*10465441SEvalZero     u8_t rev_addrs = outpkt->host_reverse_v6_replies;
1290*10465441SEvalZero     int addrindex = 0;
1291*10465441SEvalZero     while (rev_addrs) {
1292*10465441SEvalZero       if (rev_addrs & 1) {
1293*10465441SEvalZero         res = mdns_add_hostv6_ptr_answer(outpkt, outpkt->cache_flush, outpkt->netif, addrindex);
1294*10465441SEvalZero         if (res != ERR_OK) {
1295*10465441SEvalZero           goto cleanup;
1296*10465441SEvalZero         }
1297*10465441SEvalZero         outpkt->answers++;
1298*10465441SEvalZero       }
1299*10465441SEvalZero       addrindex++;
1300*10465441SEvalZero       rev_addrs >>= 1;
1301*10465441SEvalZero     }
1302*10465441SEvalZero   }
1303*10465441SEvalZero #endif
1304*10465441SEvalZero 
1305*10465441SEvalZero   /* Write answers to service questions */
1306*10465441SEvalZero   for (i = 0; i < MDNS_MAX_SERVICES; ++i) {
1307*10465441SEvalZero     service = mdns->services[i];
1308*10465441SEvalZero     if (!service) {
1309*10465441SEvalZero       continue;
1310*10465441SEvalZero     }
1311*10465441SEvalZero 
1312*10465441SEvalZero     if (outpkt->serv_replies[i] & REPLY_SERVICE_TYPE_PTR) {
1313*10465441SEvalZero       res = mdns_add_servicetype_ptr_answer(outpkt, service);
1314*10465441SEvalZero       if (res != ERR_OK) {
1315*10465441SEvalZero         goto cleanup;
1316*10465441SEvalZero       }
1317*10465441SEvalZero       outpkt->answers++;
1318*10465441SEvalZero     }
1319*10465441SEvalZero 
1320*10465441SEvalZero     if (outpkt->serv_replies[i] & REPLY_SERVICE_NAME_PTR) {
1321*10465441SEvalZero       res = mdns_add_servicename_ptr_answer(outpkt, service);
1322*10465441SEvalZero       if (res != ERR_OK) {
1323*10465441SEvalZero         goto cleanup;
1324*10465441SEvalZero       }
1325*10465441SEvalZero       outpkt->answers++;
1326*10465441SEvalZero     }
1327*10465441SEvalZero 
1328*10465441SEvalZero     if (outpkt->serv_replies[i] & REPLY_SERVICE_SRV) {
1329*10465441SEvalZero       res = mdns_add_srv_answer(outpkt, outpkt->cache_flush, mdns, service);
1330*10465441SEvalZero       if (res != ERR_OK) {
1331*10465441SEvalZero         goto cleanup;
1332*10465441SEvalZero       }
1333*10465441SEvalZero       outpkt->answers++;
1334*10465441SEvalZero     }
1335*10465441SEvalZero 
1336*10465441SEvalZero     if (outpkt->serv_replies[i] & REPLY_SERVICE_TXT) {
1337*10465441SEvalZero       res = mdns_add_txt_answer(outpkt, outpkt->cache_flush, service);
1338*10465441SEvalZero       if (res != ERR_OK) {
1339*10465441SEvalZero         goto cleanup;
1340*10465441SEvalZero       }
1341*10465441SEvalZero       outpkt->answers++;
1342*10465441SEvalZero     }
1343*10465441SEvalZero   }
1344*10465441SEvalZero 
1345*10465441SEvalZero   /* All answers written, add additional RRs */
1346*10465441SEvalZero   for (i = 0; i < MDNS_MAX_SERVICES; ++i) {
1347*10465441SEvalZero     service = mdns->services[i];
1348*10465441SEvalZero     if (!service) {
1349*10465441SEvalZero       continue;
1350*10465441SEvalZero     }
1351*10465441SEvalZero 
1352*10465441SEvalZero     if (outpkt->serv_replies[i] & REPLY_SERVICE_NAME_PTR) {
1353*10465441SEvalZero       /* Our service instance requested, include SRV & TXT
1354*10465441SEvalZero        * if they are already not requested. */
1355*10465441SEvalZero       if (!(outpkt->serv_replies[i] & REPLY_SERVICE_SRV)) {
1356*10465441SEvalZero         res = mdns_add_srv_answer(outpkt, outpkt->cache_flush, mdns, service);
1357*10465441SEvalZero         if (res != ERR_OK) {
1358*10465441SEvalZero           goto cleanup;
1359*10465441SEvalZero         }
1360*10465441SEvalZero         outpkt->additional++;
1361*10465441SEvalZero       }
1362*10465441SEvalZero 
1363*10465441SEvalZero       if (!(outpkt->serv_replies[i] & REPLY_SERVICE_TXT)) {
1364*10465441SEvalZero         res = mdns_add_txt_answer(outpkt, outpkt->cache_flush, service);
1365*10465441SEvalZero         if (res != ERR_OK) {
1366*10465441SEvalZero           goto cleanup;
1367*10465441SEvalZero         }
1368*10465441SEvalZero         outpkt->additional++;
1369*10465441SEvalZero       }
1370*10465441SEvalZero     }
1371*10465441SEvalZero 
1372*10465441SEvalZero     /* If service instance, SRV, record or an IP address is requested,
1373*10465441SEvalZero      * supply all addresses for the host
1374*10465441SEvalZero      */
1375*10465441SEvalZero     if ((outpkt->serv_replies[i] & (REPLY_SERVICE_NAME_PTR | REPLY_SERVICE_SRV)) ||
1376*10465441SEvalZero         (outpkt->host_replies & (REPLY_HOST_A | REPLY_HOST_AAAA))) {
1377*10465441SEvalZero #if LWIP_IPV6
1378*10465441SEvalZero       if (!(outpkt->host_replies & REPLY_HOST_AAAA)) {
1379*10465441SEvalZero         int addrindex;
1380*10465441SEvalZero         for (addrindex = 0; addrindex < LWIP_IPV6_NUM_ADDRESSES; ++addrindex) {
1381*10465441SEvalZero           if (ip6_addr_isvalid(netif_ip6_addr_state(outpkt->netif, addrindex))) {
1382*10465441SEvalZero             res = mdns_add_aaaa_answer(outpkt, outpkt->cache_flush, outpkt->netif, addrindex);
1383*10465441SEvalZero             if (res != ERR_OK) {
1384*10465441SEvalZero               goto cleanup;
1385*10465441SEvalZero             }
1386*10465441SEvalZero             outpkt->additional++;
1387*10465441SEvalZero           }
1388*10465441SEvalZero         }
1389*10465441SEvalZero       }
1390*10465441SEvalZero #endif
1391*10465441SEvalZero #if LWIP_IPV4
1392*10465441SEvalZero       if (!(outpkt->host_replies & REPLY_HOST_A)) {
1393*10465441SEvalZero         res = mdns_add_a_answer(outpkt, outpkt->cache_flush, outpkt->netif);
1394*10465441SEvalZero         if (res != ERR_OK) {
1395*10465441SEvalZero           goto cleanup;
1396*10465441SEvalZero         }
1397*10465441SEvalZero         outpkt->additional++;
1398*10465441SEvalZero       }
1399*10465441SEvalZero #endif
1400*10465441SEvalZero     }
1401*10465441SEvalZero   }
1402*10465441SEvalZero 
1403*10465441SEvalZero   if (outpkt->pbuf) {
1404*10465441SEvalZero     const ip_addr_t *mcast_destaddr;
1405*10465441SEvalZero     struct dns_hdr hdr;
1406*10465441SEvalZero 
1407*10465441SEvalZero     /* Write header */
1408*10465441SEvalZero     memset(&hdr, 0, sizeof(hdr));
1409*10465441SEvalZero     hdr.flags1 = DNS_FLAG1_RESPONSE | DNS_FLAG1_AUTHORATIVE;
1410*10465441SEvalZero     hdr.numanswers = lwip_htons(outpkt->answers);
1411*10465441SEvalZero     hdr.numextrarr = lwip_htons(outpkt->additional);
1412*10465441SEvalZero     if (outpkt->legacy_query) {
1413*10465441SEvalZero       hdr.numquestions = lwip_htons(1);
1414*10465441SEvalZero       hdr.id = lwip_htons(outpkt->tx_id);
1415*10465441SEvalZero     }
1416*10465441SEvalZero     pbuf_take(outpkt->pbuf, &hdr, sizeof(hdr));
1417*10465441SEvalZero 
1418*10465441SEvalZero     /* Shrink packet */
1419*10465441SEvalZero     pbuf_realloc(outpkt->pbuf, outpkt->write_offset);
1420*10465441SEvalZero 
1421*10465441SEvalZero     if (IP_IS_V6_VAL(outpkt->dest_addr)) {
1422*10465441SEvalZero #if LWIP_IPV6
1423*10465441SEvalZero       mcast_destaddr = &v6group;
1424*10465441SEvalZero #endif
1425*10465441SEvalZero     } else {
1426*10465441SEvalZero #if LWIP_IPV4
1427*10465441SEvalZero       mcast_destaddr = &v4group;
1428*10465441SEvalZero #endif
1429*10465441SEvalZero     }
1430*10465441SEvalZero     /* Send created packet */
1431*10465441SEvalZero     LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Sending packet, len=%d, unicast=%d\n", outpkt->write_offset, outpkt->unicast_reply));
1432*10465441SEvalZero     if (outpkt->unicast_reply) {
1433*10465441SEvalZero       udp_sendto_if(mdns_pcb, outpkt->pbuf, &outpkt->dest_addr, outpkt->dest_port, outpkt->netif);
1434*10465441SEvalZero     } else {
1435*10465441SEvalZero       udp_sendto_if(mdns_pcb, outpkt->pbuf, mcast_destaddr, MDNS_PORT, outpkt->netif);
1436*10465441SEvalZero     }
1437*10465441SEvalZero   }
1438*10465441SEvalZero 
1439*10465441SEvalZero cleanup:
1440*10465441SEvalZero   if (outpkt->pbuf) {
1441*10465441SEvalZero     pbuf_free(outpkt->pbuf);
1442*10465441SEvalZero     outpkt->pbuf = NULL;
1443*10465441SEvalZero   }
1444*10465441SEvalZero }
1445*10465441SEvalZero 
1446*10465441SEvalZero /**
1447*10465441SEvalZero  * Send unsolicited answer containing all our known data
1448*10465441SEvalZero  * @param netif The network interface to send on
1449*10465441SEvalZero  * @param destination The target address to send to (usually multicast address)
1450*10465441SEvalZero  */
1451*10465441SEvalZero static void
mdns_announce(struct netif * netif,const ip_addr_t * destination)1452*10465441SEvalZero mdns_announce(struct netif *netif, const ip_addr_t *destination)
1453*10465441SEvalZero {
1454*10465441SEvalZero   struct mdns_outpacket announce;
1455*10465441SEvalZero   int i;
1456*10465441SEvalZero   struct mdns_host* mdns = NETIF_TO_HOST(netif);
1457*10465441SEvalZero 
1458*10465441SEvalZero   memset(&announce, 0, sizeof(announce));
1459*10465441SEvalZero   announce.netif = netif;
1460*10465441SEvalZero   announce.cache_flush = 1;
1461*10465441SEvalZero #if LWIP_IPV4
1462*10465441SEvalZero   if (!ip4_addr_isany_val(*netif_ip4_addr(netif)))
1463*10465441SEvalZero     announce.host_replies = REPLY_HOST_A | REPLY_HOST_PTR_V4;
1464*10465441SEvalZero #endif
1465*10465441SEvalZero #if LWIP_IPV6
1466*10465441SEvalZero   for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; ++i) {
1467*10465441SEvalZero     if (ip6_addr_isvalid(netif_ip6_addr_state(netif, i))) {
1468*10465441SEvalZero       announce.host_replies |= REPLY_HOST_AAAA | REPLY_HOST_PTR_V6;
1469*10465441SEvalZero       announce.host_reverse_v6_replies |= (1 << i);
1470*10465441SEvalZero     }
1471*10465441SEvalZero   }
1472*10465441SEvalZero #endif
1473*10465441SEvalZero 
1474*10465441SEvalZero   for (i = 0; i < MDNS_MAX_SERVICES; i++) {
1475*10465441SEvalZero     struct mdns_service *serv = mdns->services[i];
1476*10465441SEvalZero     if (serv) {
1477*10465441SEvalZero       announce.serv_replies[i] = REPLY_SERVICE_TYPE_PTR | REPLY_SERVICE_NAME_PTR |
1478*10465441SEvalZero           REPLY_SERVICE_SRV | REPLY_SERVICE_TXT;
1479*10465441SEvalZero     }
1480*10465441SEvalZero   }
1481*10465441SEvalZero 
1482*10465441SEvalZero   announce.dest_port = MDNS_PORT;
1483*10465441SEvalZero   SMEMCPY(&announce.dest_addr, destination, sizeof(announce.dest_addr));
1484*10465441SEvalZero   mdns_send_outpacket(&announce);
1485*10465441SEvalZero }
1486*10465441SEvalZero 
1487*10465441SEvalZero /**
1488*10465441SEvalZero  * Handle question MDNS packet
1489*10465441SEvalZero  * 1. Parse all questions and set bits what answers to send
1490*10465441SEvalZero  * 2. Clear pending answers if known answers are supplied
1491*10465441SEvalZero  * 3. Put chosen answers in new packet and send as reply
1492*10465441SEvalZero  */
1493*10465441SEvalZero static void
mdns_handle_question(struct mdns_packet * pkt)1494*10465441SEvalZero mdns_handle_question(struct mdns_packet *pkt)
1495*10465441SEvalZero {
1496*10465441SEvalZero   struct mdns_service *service;
1497*10465441SEvalZero   struct mdns_outpacket reply;
1498*10465441SEvalZero   int replies = 0;
1499*10465441SEvalZero   int i;
1500*10465441SEvalZero   err_t res;
1501*10465441SEvalZero   struct mdns_host* mdns = NETIF_TO_HOST(pkt->netif);
1502*10465441SEvalZero 
1503*10465441SEvalZero   mdns_init_outpacket(&reply, pkt);
1504*10465441SEvalZero 
1505*10465441SEvalZero   while (pkt->questions_left) {
1506*10465441SEvalZero     struct mdns_question q;
1507*10465441SEvalZero 
1508*10465441SEvalZero     res = mdns_read_question(pkt, &q);
1509*10465441SEvalZero     if (res != ERR_OK) {
1510*10465441SEvalZero       LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse question, skipping query packet\n"));
1511*10465441SEvalZero       return;
1512*10465441SEvalZero     }
1513*10465441SEvalZero 
1514*10465441SEvalZero     LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Query for domain "));
1515*10465441SEvalZero     mdns_domain_debug_print(&q.info.domain);
1516*10465441SEvalZero     LWIP_DEBUGF(MDNS_DEBUG, (" type %d class %d\n", q.info.type, q.info.klass));
1517*10465441SEvalZero 
1518*10465441SEvalZero     if (q.unicast) {
1519*10465441SEvalZero       /* Reply unicast if any question is unicast */
1520*10465441SEvalZero       reply.unicast_reply = 1;
1521*10465441SEvalZero     }
1522*10465441SEvalZero 
1523*10465441SEvalZero     reply.host_replies |= check_host(pkt->netif, &q.info, &reply.host_reverse_v6_replies);
1524*10465441SEvalZero     replies |= reply.host_replies;
1525*10465441SEvalZero 
1526*10465441SEvalZero     for (i = 0; i < MDNS_MAX_SERVICES; ++i) {
1527*10465441SEvalZero       service = mdns->services[i];
1528*10465441SEvalZero       if (!service) {
1529*10465441SEvalZero         continue;
1530*10465441SEvalZero       }
1531*10465441SEvalZero       reply.serv_replies[i] |= check_service(service, &q.info);
1532*10465441SEvalZero       replies |= reply.serv_replies[i];
1533*10465441SEvalZero     }
1534*10465441SEvalZero 
1535*10465441SEvalZero     if (replies && reply.legacy_query) {
1536*10465441SEvalZero       /* Add question to reply packet (legacy packet only has 1 question) */
1537*10465441SEvalZero       res = mdns_add_question(&reply, &q.info.domain, q.info.type, q.info.klass, 0);
1538*10465441SEvalZero       if (res != ERR_OK) {
1539*10465441SEvalZero         goto cleanup;
1540*10465441SEvalZero       }
1541*10465441SEvalZero     }
1542*10465441SEvalZero   }
1543*10465441SEvalZero 
1544*10465441SEvalZero   /* Handle known answers */
1545*10465441SEvalZero   while (pkt->answers_left) {
1546*10465441SEvalZero     struct mdns_answer ans;
1547*10465441SEvalZero     u8_t rev_v6;
1548*10465441SEvalZero     int match;
1549*10465441SEvalZero 
1550*10465441SEvalZero     res = mdns_read_answer(pkt, &ans);
1551*10465441SEvalZero     if (res != ERR_OK) {
1552*10465441SEvalZero       LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse answer, skipping query packet\n"));
1553*10465441SEvalZero       goto cleanup;
1554*10465441SEvalZero     }
1555*10465441SEvalZero 
1556*10465441SEvalZero     LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Known answer for domain "));
1557*10465441SEvalZero     mdns_domain_debug_print(&ans.info.domain);
1558*10465441SEvalZero     LWIP_DEBUGF(MDNS_DEBUG, (" type %d class %d\n", ans.info.type, ans.info.klass));
1559*10465441SEvalZero 
1560*10465441SEvalZero 
1561*10465441SEvalZero     if (ans.info.type == DNS_RRTYPE_ANY || ans.info.klass == DNS_RRCLASS_ANY) {
1562*10465441SEvalZero       /* Skip known answers for ANY type & class */
1563*10465441SEvalZero       continue;
1564*10465441SEvalZero     }
1565*10465441SEvalZero 
1566*10465441SEvalZero     rev_v6 = 0;
1567*10465441SEvalZero     match = reply.host_replies & check_host(pkt->netif, &ans.info, &rev_v6);
1568*10465441SEvalZero     if (match && (ans.ttl > (mdns->dns_ttl / 2))) {
1569*10465441SEvalZero       /* The RR in the known answer matches an RR we are planning to send,
1570*10465441SEvalZero        * and the TTL is less than half gone.
1571*10465441SEvalZero        * If the payload matches we should not send that answer.
1572*10465441SEvalZero        */
1573*10465441SEvalZero       if (ans.info.type == DNS_RRTYPE_PTR) {
1574*10465441SEvalZero         /* Read domain and compare */
1575*10465441SEvalZero         struct mdns_domain known_ans, my_ans;
1576*10465441SEvalZero         u16_t len;
1577*10465441SEvalZero         len = mdns_readname(pkt->pbuf, ans.rd_offset, &known_ans);
1578*10465441SEvalZero         res = mdns_build_host_domain(&my_ans, mdns);
1579*10465441SEvalZero         if (len != MDNS_READNAME_ERROR && res == ERR_OK && mdns_domain_eq(&known_ans, &my_ans)) {
1580*10465441SEvalZero #if LWIP_IPV4
1581*10465441SEvalZero           if (match & REPLY_HOST_PTR_V4) {
1582*10465441SEvalZero               LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: v4 PTR\n"));
1583*10465441SEvalZero               reply.host_replies &= ~REPLY_HOST_PTR_V4;
1584*10465441SEvalZero           }
1585*10465441SEvalZero #endif
1586*10465441SEvalZero #if LWIP_IPV6
1587*10465441SEvalZero           if (match & REPLY_HOST_PTR_V6) {
1588*10465441SEvalZero               LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: v6 PTR\n"));
1589*10465441SEvalZero               reply.host_reverse_v6_replies &= ~rev_v6;
1590*10465441SEvalZero               if (reply.host_reverse_v6_replies == 0) {
1591*10465441SEvalZero                 reply.host_replies &= ~REPLY_HOST_PTR_V6;
1592*10465441SEvalZero               }
1593*10465441SEvalZero           }
1594*10465441SEvalZero #endif
1595*10465441SEvalZero         }
1596*10465441SEvalZero       } else if (match & REPLY_HOST_A) {
1597*10465441SEvalZero #if LWIP_IPV4
1598*10465441SEvalZero         if (ans.rd_length == sizeof(ip4_addr_t) &&
1599*10465441SEvalZero             pbuf_memcmp(pkt->pbuf, ans.rd_offset, netif_ip4_addr(pkt->netif), ans.rd_length) == 0) {
1600*10465441SEvalZero           LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: A\n"));
1601*10465441SEvalZero           reply.host_replies &= ~REPLY_HOST_A;
1602*10465441SEvalZero         }
1603*10465441SEvalZero #endif
1604*10465441SEvalZero       } else if (match & REPLY_HOST_AAAA) {
1605*10465441SEvalZero #if LWIP_IPV6
1606*10465441SEvalZero         if (ans.rd_length == sizeof(ip6_addr_t) &&
1607*10465441SEvalZero             /* TODO this clears all AAAA responses if first addr is set as known */
1608*10465441SEvalZero             pbuf_memcmp(pkt->pbuf, ans.rd_offset, netif_ip6_addr(pkt->netif, 0), ans.rd_length) == 0) {
1609*10465441SEvalZero           LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: AAAA\n"));
1610*10465441SEvalZero           reply.host_replies &= ~REPLY_HOST_AAAA;
1611*10465441SEvalZero         }
1612*10465441SEvalZero #endif
1613*10465441SEvalZero       }
1614*10465441SEvalZero     }
1615*10465441SEvalZero 
1616*10465441SEvalZero     for (i = 0; i < MDNS_MAX_SERVICES; ++i) {
1617*10465441SEvalZero       service = mdns->services[i];
1618*10465441SEvalZero       if (!service) {
1619*10465441SEvalZero         continue;
1620*10465441SEvalZero       }
1621*10465441SEvalZero       match = reply.serv_replies[i] & check_service(service, &ans.info);
1622*10465441SEvalZero       if (match && (ans.ttl > (service->dns_ttl / 2))) {
1623*10465441SEvalZero         /* The RR in the known answer matches an RR we are planning to send,
1624*10465441SEvalZero          * and the TTL is less than half gone.
1625*10465441SEvalZero          * If the payload matches we should not send that answer.
1626*10465441SEvalZero          */
1627*10465441SEvalZero         if (ans.info.type == DNS_RRTYPE_PTR) {
1628*10465441SEvalZero           /* Read domain and compare */
1629*10465441SEvalZero           struct mdns_domain known_ans, my_ans;
1630*10465441SEvalZero           u16_t len;
1631*10465441SEvalZero           len = mdns_readname(pkt->pbuf, ans.rd_offset, &known_ans);
1632*10465441SEvalZero           if (len != MDNS_READNAME_ERROR) {
1633*10465441SEvalZero             if (match & REPLY_SERVICE_TYPE_PTR) {
1634*10465441SEvalZero               res = mdns_build_service_domain(&my_ans, service, 0);
1635*10465441SEvalZero               if (res == ERR_OK && mdns_domain_eq(&known_ans, &my_ans)) {
1636*10465441SEvalZero                 LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: service type PTR\n"));
1637*10465441SEvalZero                 reply.serv_replies[i] &= ~REPLY_SERVICE_TYPE_PTR;
1638*10465441SEvalZero               }
1639*10465441SEvalZero             }
1640*10465441SEvalZero             if (match & REPLY_SERVICE_NAME_PTR) {
1641*10465441SEvalZero               res = mdns_build_service_domain(&my_ans, service, 1);
1642*10465441SEvalZero               if (res == ERR_OK && mdns_domain_eq(&known_ans, &my_ans)) {
1643*10465441SEvalZero                 LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: service name PTR\n"));
1644*10465441SEvalZero                 reply.serv_replies[i] &= ~REPLY_SERVICE_NAME_PTR;
1645*10465441SEvalZero               }
1646*10465441SEvalZero             }
1647*10465441SEvalZero           }
1648*10465441SEvalZero         } else if (match & REPLY_SERVICE_SRV) {
1649*10465441SEvalZero           /* Read and compare to my SRV record */
1650*10465441SEvalZero           u16_t field16, len, read_pos;
1651*10465441SEvalZero           struct mdns_domain known_ans, my_ans;
1652*10465441SEvalZero           read_pos = ans.rd_offset;
1653*10465441SEvalZero           do {
1654*10465441SEvalZero             /* Check priority field */
1655*10465441SEvalZero             len = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), read_pos);
1656*10465441SEvalZero             if (len != sizeof(field16) || lwip_ntohs(field16) != SRV_PRIORITY) {
1657*10465441SEvalZero               break;
1658*10465441SEvalZero             }
1659*10465441SEvalZero             read_pos += len;
1660*10465441SEvalZero             /* Check weight field */
1661*10465441SEvalZero             len = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), read_pos);
1662*10465441SEvalZero             if (len != sizeof(field16) || lwip_ntohs(field16) != SRV_WEIGHT) {
1663*10465441SEvalZero               break;
1664*10465441SEvalZero             }
1665*10465441SEvalZero             read_pos += len;
1666*10465441SEvalZero             /* Check port field */
1667*10465441SEvalZero             len = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), read_pos);
1668*10465441SEvalZero             if (len != sizeof(field16) || lwip_ntohs(field16) != service->port) {
1669*10465441SEvalZero               break;
1670*10465441SEvalZero             }
1671*10465441SEvalZero             read_pos += len;
1672*10465441SEvalZero             /* Check host field */
1673*10465441SEvalZero             len = mdns_readname(pkt->pbuf, read_pos, &known_ans);
1674*10465441SEvalZero             mdns_build_host_domain(&my_ans, mdns);
1675*10465441SEvalZero             if (len == MDNS_READNAME_ERROR || !mdns_domain_eq(&known_ans, &my_ans)) {
1676*10465441SEvalZero               break;
1677*10465441SEvalZero             }
1678*10465441SEvalZero             LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: SRV\n"));
1679*10465441SEvalZero             reply.serv_replies[i] &= ~REPLY_SERVICE_SRV;
1680*10465441SEvalZero           } while (0);
1681*10465441SEvalZero         } else if (match & REPLY_SERVICE_TXT) {
1682*10465441SEvalZero           mdns_prepare_txtdata(service);
1683*10465441SEvalZero           if (service->txtdata.length == ans.rd_length &&
1684*10465441SEvalZero               pbuf_memcmp(pkt->pbuf, ans.rd_offset, service->txtdata.name, ans.rd_length) == 0) {
1685*10465441SEvalZero             LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: TXT\n"));
1686*10465441SEvalZero             reply.serv_replies[i] &= ~REPLY_SERVICE_TXT;
1687*10465441SEvalZero           }
1688*10465441SEvalZero         }
1689*10465441SEvalZero       }
1690*10465441SEvalZero     }
1691*10465441SEvalZero   }
1692*10465441SEvalZero 
1693*10465441SEvalZero   mdns_send_outpacket(&reply);
1694*10465441SEvalZero 
1695*10465441SEvalZero cleanup:
1696*10465441SEvalZero   if (reply.pbuf) {
1697*10465441SEvalZero     /* This should only happen if we fail to alloc/write question for legacy query */
1698*10465441SEvalZero     pbuf_free(reply.pbuf);
1699*10465441SEvalZero     reply.pbuf = NULL;
1700*10465441SEvalZero   }
1701*10465441SEvalZero }
1702*10465441SEvalZero 
1703*10465441SEvalZero /**
1704*10465441SEvalZero  * Handle response MDNS packet
1705*10465441SEvalZero  * Only prints debug for now. Will need more code to do conflict resolution.
1706*10465441SEvalZero  */
1707*10465441SEvalZero static void
mdns_handle_response(struct mdns_packet * pkt)1708*10465441SEvalZero mdns_handle_response(struct mdns_packet *pkt)
1709*10465441SEvalZero {
1710*10465441SEvalZero   /* Ignore all questions */
1711*10465441SEvalZero   while (pkt->questions_left) {
1712*10465441SEvalZero     struct mdns_question q;
1713*10465441SEvalZero     err_t res;
1714*10465441SEvalZero 
1715*10465441SEvalZero     res = mdns_read_question(pkt, &q);
1716*10465441SEvalZero     if (res != ERR_OK) {
1717*10465441SEvalZero       LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse question, skipping response packet\n"));
1718*10465441SEvalZero       return;
1719*10465441SEvalZero     }
1720*10465441SEvalZero   }
1721*10465441SEvalZero 
1722*10465441SEvalZero   while (pkt->answers_left) {
1723*10465441SEvalZero     struct mdns_answer ans;
1724*10465441SEvalZero     err_t res;
1725*10465441SEvalZero 
1726*10465441SEvalZero     res = mdns_read_answer(pkt, &ans);
1727*10465441SEvalZero     if (res != ERR_OK) {
1728*10465441SEvalZero       LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse answer, skipping response packet\n"));
1729*10465441SEvalZero       return;
1730*10465441SEvalZero     }
1731*10465441SEvalZero 
1732*10465441SEvalZero     LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Answer for domain "));
1733*10465441SEvalZero     mdns_domain_debug_print(&ans.info.domain);
1734*10465441SEvalZero     LWIP_DEBUGF(MDNS_DEBUG, (" type %d class %d\n", ans.info.type, ans.info.klass));
1735*10465441SEvalZero   }
1736*10465441SEvalZero }
1737*10465441SEvalZero 
1738*10465441SEvalZero /**
1739*10465441SEvalZero  * Receive input function for MDNS packets.
1740*10465441SEvalZero  * Handles both IPv4 and IPv6 UDP pcbs.
1741*10465441SEvalZero  */
1742*10465441SEvalZero static void
mdns_recv(void * arg,struct udp_pcb * pcb,struct pbuf * p,const ip_addr_t * addr,u16_t port)1743*10465441SEvalZero mdns_recv(void *arg, struct udp_pcb *pcb, struct pbuf *p, const ip_addr_t *addr, u16_t port)
1744*10465441SEvalZero {
1745*10465441SEvalZero   struct dns_hdr hdr;
1746*10465441SEvalZero   struct mdns_packet packet;
1747*10465441SEvalZero   struct netif *recv_netif = ip_current_input_netif();
1748*10465441SEvalZero   u16_t offset = 0;
1749*10465441SEvalZero 
1750*10465441SEvalZero   LWIP_UNUSED_ARG(arg);
1751*10465441SEvalZero   LWIP_UNUSED_ARG(pcb);
1752*10465441SEvalZero 
1753*10465441SEvalZero   LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Received IPv%d MDNS packet, len %d\n", IP_IS_V6(addr)? 6 : 4, p->tot_len));
1754*10465441SEvalZero 
1755*10465441SEvalZero   if (NETIF_TO_HOST(recv_netif) == NULL) {
1756*10465441SEvalZero     /* From netif not configured for MDNS */
1757*10465441SEvalZero     goto dealloc;
1758*10465441SEvalZero   }
1759*10465441SEvalZero 
1760*10465441SEvalZero   if (pbuf_copy_partial(p, &hdr, SIZEOF_DNS_HDR, offset) < SIZEOF_DNS_HDR) {
1761*10465441SEvalZero     /* Too small */
1762*10465441SEvalZero     goto dealloc;
1763*10465441SEvalZero   }
1764*10465441SEvalZero   offset += SIZEOF_DNS_HDR;
1765*10465441SEvalZero 
1766*10465441SEvalZero   if (DNS_HDR_GET_OPCODE(&hdr)) {
1767*10465441SEvalZero     /* Ignore non-standard queries in multicast packets (RFC 6762, section 18.3) */
1768*10465441SEvalZero     goto dealloc;
1769*10465441SEvalZero   }
1770*10465441SEvalZero 
1771*10465441SEvalZero   memset(&packet, 0, sizeof(packet));
1772*10465441SEvalZero   SMEMCPY(&packet.source_addr, addr, sizeof(packet.source_addr));
1773*10465441SEvalZero   packet.source_port = port;
1774*10465441SEvalZero   packet.netif = recv_netif;
1775*10465441SEvalZero   packet.pbuf = p;
1776*10465441SEvalZero   packet.parse_offset = offset;
1777*10465441SEvalZero   packet.tx_id = lwip_ntohs(hdr.id);
1778*10465441SEvalZero   packet.questions = packet.questions_left = lwip_ntohs(hdr.numquestions);
1779*10465441SEvalZero   packet.answers = packet.answers_left = lwip_ntohs(hdr.numanswers) + lwip_ntohs(hdr.numauthrr) + lwip_ntohs(hdr.numextrarr);
1780*10465441SEvalZero 
1781*10465441SEvalZero #if LWIP_IPV6
1782*10465441SEvalZero   if (IP_IS_V6(ip_current_dest_addr())) {
1783*10465441SEvalZero     if (!ip_addr_cmp(ip_current_dest_addr(), &v6group)) {
1784*10465441SEvalZero       packet.recv_unicast = 1;
1785*10465441SEvalZero     }
1786*10465441SEvalZero   }
1787*10465441SEvalZero #endif
1788*10465441SEvalZero #if LWIP_IPV4
1789*10465441SEvalZero   if (!IP_IS_V6(ip_current_dest_addr())) {
1790*10465441SEvalZero     if (!ip_addr_cmp(ip_current_dest_addr(), &v4group)) {
1791*10465441SEvalZero       packet.recv_unicast = 1;
1792*10465441SEvalZero     }
1793*10465441SEvalZero   }
1794*10465441SEvalZero #endif
1795*10465441SEvalZero 
1796*10465441SEvalZero   if (hdr.flags1 & DNS_FLAG1_RESPONSE) {
1797*10465441SEvalZero     mdns_handle_response(&packet);
1798*10465441SEvalZero   } else {
1799*10465441SEvalZero     mdns_handle_question(&packet);
1800*10465441SEvalZero   }
1801*10465441SEvalZero 
1802*10465441SEvalZero dealloc:
1803*10465441SEvalZero   pbuf_free(p);
1804*10465441SEvalZero }
1805*10465441SEvalZero 
1806*10465441SEvalZero /**
1807*10465441SEvalZero  * @ingroup mdns
1808*10465441SEvalZero  * Initiate MDNS responder. Will open UDP sockets on port 5353
1809*10465441SEvalZero  */
1810*10465441SEvalZero void
mdns_resp_init(void)1811*10465441SEvalZero mdns_resp_init(void)
1812*10465441SEvalZero {
1813*10465441SEvalZero   err_t res;
1814*10465441SEvalZero 
1815*10465441SEvalZero   mdns_pcb = udp_new_ip_type(IPADDR_TYPE_ANY);
1816*10465441SEvalZero   LWIP_ASSERT("Failed to allocate pcb", mdns_pcb != NULL);
1817*10465441SEvalZero #if LWIP_MULTICAST_TX_OPTIONS
1818*10465441SEvalZero   udp_set_multicast_ttl(mdns_pcb, MDNS_TTL);
1819*10465441SEvalZero #else
1820*10465441SEvalZero   mdns_pcb->ttl = MDNS_TTL;
1821*10465441SEvalZero #endif
1822*10465441SEvalZero   res = udp_bind(mdns_pcb, IP_ANY_TYPE, MDNS_PORT);
1823*10465441SEvalZero   LWIP_UNUSED_ARG(res); /* in case of LWIP_NOASSERT */
1824*10465441SEvalZero   LWIP_ASSERT("Failed to bind pcb", res == ERR_OK);
1825*10465441SEvalZero   udp_recv(mdns_pcb, mdns_recv, NULL);
1826*10465441SEvalZero 
1827*10465441SEvalZero   mdns_netif_client_id = netif_alloc_client_data_id();
1828*10465441SEvalZero }
1829*10465441SEvalZero 
1830*10465441SEvalZero /**
1831*10465441SEvalZero  * @ingroup mdns
1832*10465441SEvalZero  * Announce IP settings have changed on netif.
1833*10465441SEvalZero  * Call this in your callback registered by netif_set_status_callback().
1834*10465441SEvalZero  * This function may go away in the future when netif supports registering
1835*10465441SEvalZero  * multiple callback functions.
1836*10465441SEvalZero  * @param netif The network interface where settings have changed.
1837*10465441SEvalZero  */
1838*10465441SEvalZero void
mdns_resp_netif_settings_changed(struct netif * netif)1839*10465441SEvalZero mdns_resp_netif_settings_changed(struct netif *netif)
1840*10465441SEvalZero {
1841*10465441SEvalZero   LWIP_ERROR("mdns_resp_netif_ip_changed: netif != NULL", (netif != NULL), return);
1842*10465441SEvalZero 
1843*10465441SEvalZero   if (NETIF_TO_HOST(netif) == NULL) {
1844*10465441SEvalZero     return;
1845*10465441SEvalZero   }
1846*10465441SEvalZero 
1847*10465441SEvalZero   /* Announce on IPv6 and IPv4 */
1848*10465441SEvalZero #if LWIP_IPV6
1849*10465441SEvalZero    mdns_announce(netif, IP6_ADDR_ANY);
1850*10465441SEvalZero #endif
1851*10465441SEvalZero #if LWIP_IPV4
1852*10465441SEvalZero    mdns_announce(netif, IP4_ADDR_ANY);
1853*10465441SEvalZero #endif
1854*10465441SEvalZero }
1855*10465441SEvalZero 
1856*10465441SEvalZero /**
1857*10465441SEvalZero  * @ingroup mdns
1858*10465441SEvalZero  * Activate MDNS responder for a network interface and send announce packets.
1859*10465441SEvalZero  * @param netif The network interface to activate.
1860*10465441SEvalZero  * @param hostname Name to use. Queries for &lt;hostname&gt;.local will be answered
1861*10465441SEvalZero  *                 with the IP addresses of the netif. The hostname will be copied, the
1862*10465441SEvalZero  *                 given pointer can be on the stack.
1863*10465441SEvalZero  * @param dns_ttl Validity time in seconds to send out for IP address data in DNS replies
1864*10465441SEvalZero  * @return ERR_OK if netif was added, an err_t otherwise
1865*10465441SEvalZero  */
1866*10465441SEvalZero err_t
mdns_resp_add_netif(struct netif * netif,const char * hostname,u32_t dns_ttl)1867*10465441SEvalZero mdns_resp_add_netif(struct netif *netif, const char *hostname, u32_t dns_ttl)
1868*10465441SEvalZero {
1869*10465441SEvalZero   err_t res;
1870*10465441SEvalZero   struct mdns_host* mdns;
1871*10465441SEvalZero 
1872*10465441SEvalZero   LWIP_ERROR("mdns_resp_add_netif: netif != NULL", (netif != NULL), return ERR_VAL);
1873*10465441SEvalZero   LWIP_ERROR("mdns_resp_add_netif: Hostname too long", (strlen(hostname) <= MDNS_LABEL_MAXLEN), return ERR_VAL);
1874*10465441SEvalZero 
1875*10465441SEvalZero   LWIP_ASSERT("mdns_resp_add_netif: Double add", NETIF_TO_HOST(netif) == NULL);
1876*10465441SEvalZero   mdns = (struct mdns_host *) mem_malloc(sizeof(struct mdns_host));
1877*10465441SEvalZero   LWIP_ERROR("mdns_resp_add_netif: Alloc failed", (mdns != NULL), return ERR_MEM);
1878*10465441SEvalZero 
1879*10465441SEvalZero   netif_set_client_data(netif, mdns_netif_client_id, mdns);
1880*10465441SEvalZero 
1881*10465441SEvalZero   memset(mdns, 0, sizeof(struct mdns_host));
1882*10465441SEvalZero   MEMCPY(&mdns->name, hostname, LWIP_MIN(MDNS_LABEL_MAXLEN, strlen(hostname)));
1883*10465441SEvalZero   mdns->dns_ttl = dns_ttl;
1884*10465441SEvalZero 
1885*10465441SEvalZero   /* Join multicast groups */
1886*10465441SEvalZero #if LWIP_IPV4
1887*10465441SEvalZero   res = igmp_joingroup_netif(netif, ip_2_ip4(&v4group));
1888*10465441SEvalZero   if (res != ERR_OK) {
1889*10465441SEvalZero     goto cleanup;
1890*10465441SEvalZero   }
1891*10465441SEvalZero #endif
1892*10465441SEvalZero #if LWIP_IPV6
1893*10465441SEvalZero   res = mld6_joingroup_netif(netif, ip_2_ip6(&v6group));
1894*10465441SEvalZero   if (res != ERR_OK) {
1895*10465441SEvalZero     goto cleanup;
1896*10465441SEvalZero   }
1897*10465441SEvalZero #endif
1898*10465441SEvalZero 
1899*10465441SEvalZero   mdns_resp_netif_settings_changed(netif);
1900*10465441SEvalZero   return ERR_OK;
1901*10465441SEvalZero 
1902*10465441SEvalZero cleanup:
1903*10465441SEvalZero   mem_free(mdns);
1904*10465441SEvalZero   netif_set_client_data(netif, mdns_netif_client_id, NULL);
1905*10465441SEvalZero   return res;
1906*10465441SEvalZero }
1907*10465441SEvalZero 
1908*10465441SEvalZero /**
1909*10465441SEvalZero  * @ingroup mdns
1910*10465441SEvalZero  * Stop responding to MDNS queries on this interface, leave multicast groups,
1911*10465441SEvalZero  * and free the helper structure and any of its services.
1912*10465441SEvalZero  * @param netif The network interface to remove.
1913*10465441SEvalZero  * @return ERR_OK if netif was removed, an err_t otherwise
1914*10465441SEvalZero  */
1915*10465441SEvalZero err_t
mdns_resp_remove_netif(struct netif * netif)1916*10465441SEvalZero mdns_resp_remove_netif(struct netif *netif)
1917*10465441SEvalZero {
1918*10465441SEvalZero   int i;
1919*10465441SEvalZero   struct mdns_host* mdns;
1920*10465441SEvalZero 
1921*10465441SEvalZero   LWIP_ASSERT("mdns_resp_remove_netif: Null pointer", netif);
1922*10465441SEvalZero   mdns = NETIF_TO_HOST(netif);
1923*10465441SEvalZero   LWIP_ERROR("mdns_resp_remove_netif: Not an active netif", (mdns != NULL), return ERR_VAL);
1924*10465441SEvalZero 
1925*10465441SEvalZero   for (i = 0; i < MDNS_MAX_SERVICES; i++) {
1926*10465441SEvalZero     struct mdns_service *service = mdns->services[i];
1927*10465441SEvalZero     if (service) {
1928*10465441SEvalZero       mem_free(service);
1929*10465441SEvalZero     }
1930*10465441SEvalZero   }
1931*10465441SEvalZero 
1932*10465441SEvalZero   /* Leave multicast groups */
1933*10465441SEvalZero #if LWIP_IPV4
1934*10465441SEvalZero   igmp_leavegroup_netif(netif, ip_2_ip4(&v4group));
1935*10465441SEvalZero #endif
1936*10465441SEvalZero #if LWIP_IPV6
1937*10465441SEvalZero   mld6_leavegroup_netif(netif, ip_2_ip6(&v6group));
1938*10465441SEvalZero #endif
1939*10465441SEvalZero 
1940*10465441SEvalZero   mem_free(mdns);
1941*10465441SEvalZero   netif_set_client_data(netif, mdns_netif_client_id, NULL);
1942*10465441SEvalZero   return ERR_OK;
1943*10465441SEvalZero }
1944*10465441SEvalZero 
1945*10465441SEvalZero /**
1946*10465441SEvalZero  * @ingroup mdns
1947*10465441SEvalZero  * Add a service to the selected network interface.
1948*10465441SEvalZero  * @param netif The network interface to publish this service on
1949*10465441SEvalZero  * @param name The name of the service
1950*10465441SEvalZero  * @param service The service type, like "_http"
1951*10465441SEvalZero  * @param proto The service protocol, DNSSD_PROTO_TCP for TCP ("_tcp") and DNSSD_PROTO_UDP
1952*10465441SEvalZero  *              for others ("_udp")
1953*10465441SEvalZero  * @param port The port the service listens to
1954*10465441SEvalZero  * @param dns_ttl Validity time in seconds to send out for service data in DNS replies
1955*10465441SEvalZero  * @param txt_fn Callback to get TXT data. Will be called each time a TXT reply is created to
1956*10465441SEvalZero  *               allow dynamic replies.
1957*10465441SEvalZero  * @param txt_data Userdata pointer for txt_fn
1958*10465441SEvalZero  * @return ERR_OK if the service was added to the netif, an err_t otherwise
1959*10465441SEvalZero  */
1960*10465441SEvalZero err_t
mdns_resp_add_service(struct netif * netif,const char * name,const char * service,enum mdns_sd_proto proto,u16_t port,u32_t dns_ttl,service_get_txt_fn_t txt_fn,void * txt_data)1961*10465441SEvalZero mdns_resp_add_service(struct netif *netif, const char *name, const char *service, enum mdns_sd_proto proto, u16_t port, u32_t dns_ttl, service_get_txt_fn_t txt_fn, void *txt_data)
1962*10465441SEvalZero {
1963*10465441SEvalZero   int i;
1964*10465441SEvalZero   int slot = -1;
1965*10465441SEvalZero   struct mdns_service *srv;
1966*10465441SEvalZero   struct mdns_host* mdns;
1967*10465441SEvalZero 
1968*10465441SEvalZero   LWIP_ASSERT("mdns_resp_add_service: netif != NULL", netif);
1969*10465441SEvalZero   mdns = NETIF_TO_HOST(netif);
1970*10465441SEvalZero   LWIP_ERROR("mdns_resp_add_service: Not an mdns netif", (mdns != NULL), return ERR_VAL);
1971*10465441SEvalZero 
1972*10465441SEvalZero   LWIP_ERROR("mdns_resp_add_service: Name too long", (strlen(name) <= MDNS_LABEL_MAXLEN), return ERR_VAL);
1973*10465441SEvalZero   LWIP_ERROR("mdns_resp_add_service: Service too long", (strlen(service) <= MDNS_LABEL_MAXLEN), return ERR_VAL);
1974*10465441SEvalZero   LWIP_ERROR("mdns_resp_add_service: Bad proto (need TCP or UDP)", (proto == DNSSD_PROTO_TCP || proto == DNSSD_PROTO_UDP), return ERR_VAL);
1975*10465441SEvalZero 
1976*10465441SEvalZero   for (i = 0; i < MDNS_MAX_SERVICES; i++) {
1977*10465441SEvalZero     if (mdns->services[i] == NULL) {
1978*10465441SEvalZero       slot = i;
1979*10465441SEvalZero       break;
1980*10465441SEvalZero     }
1981*10465441SEvalZero   }
1982*10465441SEvalZero   LWIP_ERROR("mdns_resp_add_service: Service list full (increase MDNS_MAX_SERVICES)", (slot >= 0), return ERR_MEM);
1983*10465441SEvalZero 
1984*10465441SEvalZero   srv = (struct mdns_service*)mem_malloc(sizeof(struct mdns_service));
1985*10465441SEvalZero   LWIP_ERROR("mdns_resp_add_service: Alloc failed", (srv != NULL), return ERR_MEM);
1986*10465441SEvalZero 
1987*10465441SEvalZero   memset(srv, 0, sizeof(struct mdns_service));
1988*10465441SEvalZero 
1989*10465441SEvalZero   MEMCPY(&srv->name, name, LWIP_MIN(MDNS_LABEL_MAXLEN, strlen(name)));
1990*10465441SEvalZero   MEMCPY(&srv->service, service, LWIP_MIN(MDNS_LABEL_MAXLEN, strlen(service)));
1991*10465441SEvalZero   srv->txt_fn = txt_fn;
1992*10465441SEvalZero   srv->txt_userdata = txt_data;
1993*10465441SEvalZero   srv->proto = (u16_t)proto;
1994*10465441SEvalZero   srv->port = port;
1995*10465441SEvalZero   srv->dns_ttl = dns_ttl;
1996*10465441SEvalZero 
1997*10465441SEvalZero   mdns->services[slot] = srv;
1998*10465441SEvalZero 
1999*10465441SEvalZero   /* Announce on IPv6 and IPv4 */
2000*10465441SEvalZero #if LWIP_IPV6
2001*10465441SEvalZero   mdns_announce(netif, IP6_ADDR_ANY);
2002*10465441SEvalZero #endif
2003*10465441SEvalZero #if LWIP_IPV4
2004*10465441SEvalZero   mdns_announce(netif, IP4_ADDR_ANY);
2005*10465441SEvalZero #endif
2006*10465441SEvalZero 
2007*10465441SEvalZero   return ERR_OK;
2008*10465441SEvalZero }
2009*10465441SEvalZero 
2010*10465441SEvalZero /**
2011*10465441SEvalZero  * @ingroup mdns
2012*10465441SEvalZero  * Call this function from inside the service_get_txt_fn_t callback to add text data.
2013*10465441SEvalZero  * Buffer for TXT data is 256 bytes, and each field is prefixed with a length byte.
2014*10465441SEvalZero  * @param service The service provided to the get_txt callback
2015*10465441SEvalZero  * @param txt String to add to the TXT field.
2016*10465441SEvalZero  * @param txt_len Length of string
2017*10465441SEvalZero  * @return ERR_OK if the string was added to the reply, an err_t otherwise
2018*10465441SEvalZero  */
2019*10465441SEvalZero err_t
mdns_resp_add_service_txtitem(struct mdns_service * service,const char * txt,u8_t txt_len)2020*10465441SEvalZero mdns_resp_add_service_txtitem(struct mdns_service *service, const char *txt, u8_t txt_len)
2021*10465441SEvalZero {
2022*10465441SEvalZero   LWIP_ASSERT("mdns_resp_add_service_txtitem: service != NULL", service);
2023*10465441SEvalZero 
2024*10465441SEvalZero   /* Use a mdns_domain struct to store txt chunks since it is the same encoding */
2025*10465441SEvalZero   return mdns_domain_add_label(&service->txtdata, txt, txt_len);
2026*10465441SEvalZero }
2027*10465441SEvalZero 
2028*10465441SEvalZero #endif /* LWIP_MDNS_RESPONDER */
2029