summaryrefslogtreecommitdiff
path: root/src/apps/mdns/mdns.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/apps/mdns/mdns.c')
-rw-r--r--src/apps/mdns/mdns.c2855
1 files changed, 2855 insertions, 0 deletions
diff --git a/src/apps/mdns/mdns.c b/src/apps/mdns/mdns.c
new file mode 100644
index 00000000000..394d9d1c713
--- /dev/null
+++ b/src/apps/mdns/mdns.c
@@ -0,0 +1,2855 @@
+/**
+ * @file
+ * MDNS responder implementation
+ *
+ * @defgroup mdns MDNS
+ * @ingroup apps
+ *
+ * RFC 6762 - Multicast DNS<br>
+ * RFC 6763 - DNS-Based Service Discovery
+ *
+ * You need to increase MEMP_NUM_SYS_TIMEOUT by one if you use MDNS!
+ *
+ * @verbinclude mdns.txt
+ *
+ * Things left to implement:
+ * -------------------------
+ *
+ * - Sending goodbye messages (zero ttl) - shutdown, DHCP lease about to expire, DHCP turned off...
+ * - Sending negative responses NSEC
+ * - Fragmenting replies if required
+ * - Individual known answer detection for all local IPv6 addresses
+ * - Dynamic size of outgoing packet
+ */
+
+/*
+ * Copyright (c) 2015 Verisure Innovation AB
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without modification,
+ * are permitted provided that the following conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ * 3. The name of the author may not be used to endorse or promote products
+ * derived from this software without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
+ * SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
+ * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
+ * OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
+ * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
+ * OF SUCH DAMAGE.
+ *
+ * This file is part of the lwIP TCP/IP stack.
+ *
+ * Author: Erik Ekman <erik@kryo.se>
+ * Author: Jasper Verschueren <jasper.verschueren@apart-audio.com>
+ *
+ */
+
+#include "lwip/apps/mdns.h"
+#include "lwip/apps/mdns_priv.h"
+#include "lwip/apps/mdns_domain.h"
+#include "lwip/apps/mdns_out.h"
+#include "lwip/netif.h"
+#include "lwip/udp.h"
+#include "lwip/ip_addr.h"
+#include "lwip/mem.h"
+#include "lwip/memp.h"
+#include "lwip/prot/dns.h"
+#include "lwip/prot/iana.h"
+#include "lwip/timeouts.h"
+#include "lwip/sys.h"
+
+#include <string.h> /* memset */
+#include <stdio.h> /* snprintf */
+
+#if LWIP_MDNS_RESPONDER
+
+#if (LWIP_IPV4 && !LWIP_IGMP)
+#error "If you want to use MDNS with IPv4, you have to define LWIP_IGMP=1 in your lwipopts.h"
+#endif
+#if (LWIP_IPV6 && !LWIP_IPV6_MLD)
+#error "If you want to use MDNS with IPv6, you have to define LWIP_IPV6_MLD=1 in your lwipopts.h"
+#endif
+#if (!LWIP_UDP)
+#error "If you want to use MDNS, you have to define LWIP_UDP=1 in your lwipopts.h"
+#endif
+#ifndef LWIP_RAND
+#error "If you want to use MDNS, you have to define LWIP_RAND=(random function) in your lwipopts.h"
+#endif
+
+#if LWIP_IPV4
+#include "lwip/igmp.h"
+/* IPv4 multicast group 224.0.0.251 */
+static const ip_addr_t v4group = DNS_MQUERY_IPV4_GROUP_INIT;
+#endif
+
+#if LWIP_IPV6
+#include "lwip/mld6.h"
+/* IPv6 multicast group FF02::FB */
+static const ip_addr_t v6group = DNS_MQUERY_IPV6_GROUP_INIT;
+#endif
+
+#define MDNS_IP_TTL 255
+
+#if LWIP_MDNS_SEARCH
+static struct mdns_request mdns_requests[MDNS_MAX_REQUESTS];
+#endif
+
+static u8_t mdns_netif_client_id;
+static struct udp_pcb *mdns_pcb;
+#if MDNS_RESP_USENETIF_EXTCALLBACK
+NETIF_DECLARE_EXT_CALLBACK(netif_callback)
+#endif
+static mdns_name_result_cb_t mdns_name_result_cb;
+
+#define NETIF_TO_HOST(netif) (struct mdns_host*)(netif_get_client_data(netif, mdns_netif_client_id))
+
+/** Delayed response defines */
+#define MDNS_RESPONSE_DELAY_MAX 120
+#define MDNS_RESPONSE_DELAY_MIN 20
+#define MDNS_RESPONSE_DELAY (LWIP_RAND() %(MDNS_RESPONSE_DELAY_MAX - \
+ MDNS_RESPONSE_DELAY_MIN) + MDNS_RESPONSE_DELAY_MIN)
+/* Delayed response for truncated question defines */
+#define MDNS_RESPONSE_TC_DELAY_MAX 500
+#define MDNS_RESPONSE_TC_DELAY_MIN 400
+#define MDNS_RESPONSE_TC_DELAY_MS (LWIP_RAND() % (MDNS_RESPONSE_TC_DELAY_MAX - \
+ MDNS_RESPONSE_TC_DELAY_MIN) + MDNS_RESPONSE_TC_DELAY_MIN)
+
+/** Probing & announcing defines */
+#define MDNS_PROBE_COUNT 3
+#ifdef LWIP_RAND
+/* first probe timeout SHOULD be random 0-250 ms*/
+#define MDNS_INITIAL_PROBE_DELAY_MS (LWIP_RAND() % MDNS_PROBE_DELAY_MS)
+#else
+#define MDNS_INITIAL_PROBE_DELAY_MS MDNS_PROBE_DELAY_MS
+#endif
+
+#define MDNS_PROBE_TIEBREAK_CONFLICT_DELAY_MS 1000
+#define MDNS_PROBE_TIEBREAK_MAX_ANSWERS 5
+
+#define MDNS_LEXICOGRAPHICAL_EQUAL 0
+#define MDNS_LEXICOGRAPHICAL_EARLIER 1
+#define MDNS_LEXICOGRAPHICAL_LATER 2
+
+/* Delay between successive announcements (RFC6762 section 8.3)
+ * -> increase by a factor 2 with every response sent.
+ */
+#define MDNS_ANNOUNCE_DELAY_MS 1000
+/* Minimum 2 announces, may send up to 8 (RFC6762 section 8.3) */
+#define MDNS_ANNOUNCE_COUNT 2
+
+/** Information about received packet */
+struct mdns_packet {
+ /** Sender IP/port */
+ ip_addr_t source_addr;
+ u16_t source_port;
+ /** If packet was received unicast */
+ u16_t recv_unicast;
+ /** Packet data */
+ struct pbuf *pbuf;
+ /** Current parsing offset in packet */
+ u16_t parse_offset;
+ /** Identifier. Used in legacy queries */
+ u16_t tx_id;
+ /** Number of questions in packet,
+ * read from packet header */
+ u16_t questions;
+ /** Number of unparsed questions */
+ u16_t questions_left;
+ /** Number of answers in packet */
+ u16_t answers;
+ /** Number of unparsed answers */
+ u16_t answers_left;
+ /** Number of authoritative answers in packet */
+ u16_t authoritative;
+ /** Number of unparsed authoritative answers */
+ u16_t authoritative_left;
+ /** Number of additional answers in packet */
+ u16_t additional;
+ /** Number of unparsed additional answers */
+ u16_t additional_left;
+ /** Chained list of known answer received after a truncated question */
+ struct mdns_packet *next_answer;
+ /** Chained list of truncated question that are waiting */
+ struct mdns_packet *next_tc_question;
+};
+
+/* list of received questions with TC flags set, waiting for known answers */
+static struct mdns_packet *pending_tc_questions;
+
+/* pool of received packets */
+LWIP_MEMPOOL_DECLARE(MDNS_PKTS, MDNS_MAX_STORED_PKTS, sizeof (struct mdns_packet), "Stored mDNS packets")
+
+struct mdns_question {
+ struct mdns_rr_info info;
+ /** unicast reply requested */
+ u16_t unicast;
+};
+
+struct mdns_answer_list {
+ u16_t offset[MDNS_PROBE_TIEBREAK_MAX_ANSWERS];
+ u16_t size;
+};
+
+static err_t mdns_parse_pkt_questions(struct netif *netif,
+ struct mdns_packet *pkt,
+ struct mdns_outmsg *reply);
+static void mdns_define_probe_rrs_to_send(struct netif *netif,
+ struct mdns_outmsg *outmsg);
+static void mdns_probe_and_announce(void* arg);
+static void mdns_conflict_save_time(struct netif *netif);
+
+/**
+ * Construction to make mdns struct accessible from mdns_out.c
+ * TODO:
+ * can we add the mdns struct to the netif like we do for dhcp, autoip,...?
+ * Then this is not needed any more.
+ *
+ * @param netif The network interface
+ * @return mdns struct
+ */
+struct mdns_host*
+netif_mdns_data(struct netif *netif) {
+ return NETIF_TO_HOST(netif);
+}
+
+/**
+ * Construction to access the mdns udp pcb.
+ *
+ * @return udp_pcb struct of mdns
+ */
+struct udp_pcb*
+get_mdns_pcb(void)
+{
+ return mdns_pcb;
+}
+
+/**
+ * Check which replies we should send for a host/netif based on question
+ * @param netif The network interface that received the question
+ * @param rr Domain/type/class from a question
+ * @param reverse_v6_reply Bitmask of which IPv6 addresses to send reverse PTRs for
+ * if reply bit has REPLY_HOST_PTR_V6 set
+ * @return Bitmask of which replies to send
+ */
+static int
+check_host(struct netif *netif, struct mdns_rr_info *rr, u8_t *reverse_v6_reply)
+{
+ err_t res;
+ int replies = 0;
+ struct mdns_domain mydomain;
+
+ LWIP_UNUSED_ARG(reverse_v6_reply); /* if ipv6 is disabled */
+
+ if (rr->klass != DNS_RRCLASS_IN && rr->klass != DNS_RRCLASS_ANY) {
+ /* Invalid class */
+ return replies;
+ }
+
+ /* Handle PTR for our addresses */
+ if (rr->type == DNS_RRTYPE_PTR || rr->type == DNS_RRTYPE_ANY) {
+#if LWIP_IPV6
+ int i;
+ for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) {
+ if (ip6_addr_isvalid(netif_ip6_addr_state(netif, i))) {
+ res = mdns_build_reverse_v6_domain(&mydomain, netif_ip6_addr(netif, i));
+ if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain)) {
+ replies |= REPLY_HOST_PTR_V6;
+ /* Mark which addresses where requested */
+ if (reverse_v6_reply) {
+ *reverse_v6_reply |= (1 << i);
+ }
+ }
+ }
+ }
+#endif
+#if LWIP_IPV4
+ if (!ip4_addr_isany_val(*netif_ip4_addr(netif))) {
+ res = mdns_build_reverse_v4_domain(&mydomain, netif_ip4_addr(netif));
+ if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain)) {
+ replies |= REPLY_HOST_PTR_V4;
+ }
+ }
+#endif
+ }
+
+ res = mdns_build_host_domain(&mydomain, NETIF_TO_HOST(netif));
+ /* Handle requests for our hostname */
+ if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain)) {
+ /* TODO return NSEC if unsupported protocol requested */
+#if LWIP_IPV4
+ if (!ip4_addr_isany_val(*netif_ip4_addr(netif))
+ && (rr->type == DNS_RRTYPE_A || rr->type == DNS_RRTYPE_ANY)) {
+ replies |= REPLY_HOST_A;
+ }
+#endif
+#if LWIP_IPV6
+ if (rr->type == DNS_RRTYPE_AAAA || rr->type == DNS_RRTYPE_ANY) {
+ replies |= REPLY_HOST_AAAA;
+ }
+#endif
+ }
+
+ return replies;
+}
+
+/**
+ * Check which replies we should send for a service based on question
+ * @param service A registered MDNS service
+ * @param rr Domain/type/class from a question
+ * @return Bitmask of which replies to send
+ */
+static int
+check_service(struct mdns_service *service, struct mdns_rr_info *rr)
+{
+ err_t res;
+ int replies = 0;
+ struct mdns_domain mydomain;
+
+ if (rr->klass != DNS_RRCLASS_IN && rr->klass != DNS_RRCLASS_ANY) {
+ /* Invalid class */
+ return 0;
+ }
+
+ res = mdns_build_dnssd_domain(&mydomain);
+ if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain) &&
+ (rr->type == DNS_RRTYPE_PTR || rr->type == DNS_RRTYPE_ANY)) {
+ /* Request for all service types */
+ replies |= REPLY_SERVICE_TYPE_PTR;
+ }
+
+ res = mdns_build_service_domain(&mydomain, service, 0);
+ if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain) &&
+ (rr->type == DNS_RRTYPE_PTR || rr->type == DNS_RRTYPE_ANY)) {
+ /* Request for the instance of my service */
+ replies |= REPLY_SERVICE_NAME_PTR;
+ }
+
+ res = mdns_build_service_domain(&mydomain, service, 1);
+ if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain)) {
+ /* Request for info about my service */
+ if (rr->type == DNS_RRTYPE_SRV || rr->type == DNS_RRTYPE_ANY) {
+ replies |= REPLY_SERVICE_SRV;
+ }
+ if (rr->type == DNS_RRTYPE_TXT || rr->type == DNS_RRTYPE_ANY) {
+ replies |= REPLY_SERVICE_TXT;
+ }
+ }
+
+ return replies;
+}
+
+#if LWIP_MDNS_SEARCH
+/**
+ * Check if question belong to a specified request
+ * @param request A ongoing MDNS request
+ * @param rr Domain/type/class from an answer
+ * @return Bitmask of which matching replies
+ */
+static int
+check_request(struct mdns_request *request, struct mdns_rr_info *rr)
+{
+ err_t res;
+ int replies = 0;
+ struct mdns_domain mydomain;
+
+ if (rr->klass != DNS_RRCLASS_IN && rr->klass != DNS_RRCLASS_ANY) {
+ /* Invalid class */
+ return 0;
+ }
+
+ res = mdns_build_request_domain(&mydomain, request, 0);
+ if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain) &&
+ (rr->type == DNS_RRTYPE_PTR || rr->type == DNS_RRTYPE_ANY)) {
+ /* Request for the instance of my service */
+ replies |= REPLY_SERVICE_TYPE_PTR;
+ }
+ res = mdns_build_request_domain(&mydomain, request, 1);
+ if (res == ERR_OK && mdns_domain_eq(&rr->domain, &mydomain)) {
+ /* Request for info about my service */
+ if (rr->type == DNS_RRTYPE_SRV || rr->type == DNS_RRTYPE_ANY) {
+ replies |= REPLY_SERVICE_SRV;
+ }
+ if (rr->type == DNS_RRTYPE_TXT || rr->type == DNS_RRTYPE_ANY) {
+ replies |= REPLY_SERVICE_TXT;
+ }
+ }
+ return replies;
+}
+#endif
+
+/**
+ * Helper function for mdns_read_question/mdns_read_answer
+ * Reads a domain, type and class from the packet
+ * @param pkt The MDNS packet to read from. The parse_offset field will be
+ * incremented to point to the next unparsed byte.
+ * @param info The struct to fill with domain, type and class
+ * @return ERR_OK on success, an err_t otherwise
+ */
+static err_t
+mdns_read_rr_info(struct mdns_packet *pkt, struct mdns_rr_info *info)
+{
+ u16_t field16, copied;
+ pkt->parse_offset = mdns_readname(pkt->pbuf, pkt->parse_offset, &info->domain);
+ if (pkt->parse_offset == MDNS_READNAME_ERROR) {
+ return ERR_VAL;
+ }
+
+ copied = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), pkt->parse_offset);
+ if (copied != sizeof(field16)) {
+ return ERR_VAL;
+ }
+ pkt->parse_offset += copied;
+ info->type = lwip_ntohs(field16);
+
+ copied = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), pkt->parse_offset);
+ if (copied != sizeof(field16)) {
+ return ERR_VAL;
+ }
+ pkt->parse_offset += copied;
+ info->klass = lwip_ntohs(field16);
+
+ return ERR_OK;
+}
+
+/**
+ * Read a question from the packet.
+ * All questions have to be read before the answers.
+ * @param pkt The MDNS packet to read from. The questions_left field will be decremented
+ * and the parse_offset will be updated.
+ * @param question The struct to fill with question data
+ * @return ERR_OK on success, an err_t otherwise
+ */
+static err_t
+mdns_read_question(struct mdns_packet *pkt, struct mdns_question *question)
+{
+ /* Safety check */
+ if (pkt->pbuf->tot_len < pkt->parse_offset) {
+ return ERR_VAL;
+ }
+
+ if (pkt->questions_left) {
+ err_t res;
+ pkt->questions_left--;
+
+ memset(question, 0, sizeof(struct mdns_question));
+ res = mdns_read_rr_info(pkt, &question->info);
+ if (res != ERR_OK) {
+ return res;
+ }
+
+ /* Extract unicast flag from class field */
+ question->unicast = question->info.klass & 0x8000;
+ question->info.klass &= 0x7FFF;
+
+ return ERR_OK;
+ }
+ return ERR_VAL;
+}
+
+/**
+ * Read an answer from the packet
+ * The variable length reply is not copied, its pbuf offset and length is stored instead.
+ * @param pkt The MDNS packet to read. The num_left field will be decremented and
+ * the parse_offset will be updated.
+ * @param answer The struct to fill with answer data
+ * @param num_left number of answers left -> answers, authoritative or additional
+ * @return ERR_OK on success, an err_t otherwise
+ */
+static err_t
+mdns_read_answer(struct mdns_packet *pkt, struct mdns_answer *answer, u16_t *num_left)
+{
+ /* Read questions first */
+ if (pkt->questions_left) {
+ return ERR_VAL;
+ }
+
+ /* Safety check */
+ if (pkt->pbuf->tot_len < pkt->parse_offset) {
+ return ERR_VAL;
+ }
+
+ if (*num_left) {
+ u16_t copied, field16;
+ u32_t ttl;
+ err_t res;
+ (*num_left)--;
+
+ memset(answer, 0, sizeof(struct mdns_answer));
+ res = mdns_read_rr_info(pkt, &answer->info);
+ if (res != ERR_OK) {
+ return res;
+ }
+
+ /* Extract cache_flush flag from class field */
+ answer->cache_flush = answer->info.klass & 0x8000;
+ answer->info.klass &= 0x7FFF;
+
+ copied = pbuf_copy_partial(pkt->pbuf, &ttl, sizeof(ttl), pkt->parse_offset);
+ if (copied != sizeof(ttl)) {
+ return ERR_VAL;
+ }
+ pkt->parse_offset += copied;
+ answer->ttl = lwip_ntohl(ttl);
+
+ copied = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), pkt->parse_offset);
+ if (copied != sizeof(field16)) {
+ return ERR_VAL;
+ }
+ pkt->parse_offset += copied;
+ answer->rd_length = lwip_ntohs(field16);
+
+ answer->rd_offset = pkt->parse_offset;
+ pkt->parse_offset += answer->rd_length;
+
+ return ERR_OK;
+ }
+ return ERR_VAL;
+}
+
+/**
+ * Send unsolicited answer containing all our known data
+ * @param netif The network interface to send on
+ * @param destination The target address to send to (usually multicast address)
+ */
+static void
+mdns_announce(struct netif *netif, const ip_addr_t *destination)
+{
+ struct mdns_outmsg announce;
+ int i;
+ struct mdns_host *mdns = NETIF_TO_HOST(netif);
+
+ memset(&announce, 0, sizeof(announce));
+ announce.cache_flush = 1;
+#if LWIP_IPV4
+ if (!ip4_addr_isany_val(*netif_ip4_addr(netif))) {
+ announce.host_replies = REPLY_HOST_A | REPLY_HOST_PTR_V4;
+ }
+#endif
+#if LWIP_IPV6
+ for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) {
+ if (ip6_addr_isvalid(netif_ip6_addr_state(netif, i))) {
+ announce.host_replies |= REPLY_HOST_AAAA | REPLY_HOST_PTR_V6;
+ announce.host_reverse_v6_replies |= (1 << i);
+ }
+ }
+#endif
+
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ struct mdns_service *serv = mdns->services[i];
+ if (serv) {
+ announce.serv_replies[i] = REPLY_SERVICE_TYPE_PTR | REPLY_SERVICE_NAME_PTR |
+ REPLY_SERVICE_SRV | REPLY_SERVICE_TXT;
+ }
+ }
+
+ announce.dest_port = LWIP_IANA_PORT_MDNS;
+ SMEMCPY(&announce.dest_addr, destination, sizeof(announce.dest_addr));
+ announce.flags = DNS_FLAG1_RESPONSE | DNS_FLAG1_AUTHORATIVE;
+ mdns_send_outpacket(&announce, netif);
+}
+
+/**
+ * Perform lexicographical comparison to define the lexicographical order of the
+ * records.
+ *
+ * @param pkt_a first packet (needed for rr data)
+ * @param pkt_b second packet (needed for rr data)
+ * @param ans_a first rr
+ * @param ans_b second rr
+ * @param result pointer to save result in -> MDNS_LEXICOGRAPHICAL_EQUAL,
+ * MDNS_LEXICOGRAPHICAL_LATER or MDNS_LEXICOGRAPHICAL_EARLIER.
+ * @return err_t ERR_OK if result is good, ERR_VAL if domain decompression failed.
+ */
+static err_t
+mdns_lexicographical_comparison(struct mdns_packet *pkt_a, struct mdns_packet *pkt_b,
+ struct mdns_answer *ans_a, struct mdns_answer *ans_b,
+ u8_t *result)
+{
+ int len, i;
+ u8_t a_rd, b_rd;
+ u16_t res;
+ struct mdns_domain domain_a, domain_b;
+
+ /* Compare classes */
+ if (ans_a->info.klass != ans_b->info.klass) {
+ if (ans_a->info.klass > ans_b->info.klass) {
+ *result = MDNS_LEXICOGRAPHICAL_LATER;
+ return ERR_OK;
+ }
+ else {
+ *result = MDNS_LEXICOGRAPHICAL_EARLIER;
+ return ERR_OK;
+ }
+ }
+ /* Compare types */
+ if (ans_a->info.type != ans_b->info.type) {
+ if (ans_a->info.type > ans_b->info.type) {
+ *result = MDNS_LEXICOGRAPHICAL_LATER;
+ return ERR_OK;
+ }
+ else {
+ *result = MDNS_LEXICOGRAPHICAL_EARLIER;
+ return ERR_OK;
+ }
+ }
+
+ /* Compare rr data section
+ * Name compression:
+ * We have 4 different RR types in our authoritative section (if IPv4 and IPv6 is enabled): A,
+ * AAAA, SRV and TXT. Only one of the 4 can be subject to name compression in the rdata, the SRV
+ * record. As stated in the RFC6762 section 8.2: the names must be uncompressed before comparison.
+ * We only need to take the SRV record into account. It's the only one that in a comparison with
+ * compressed data could lead to rdata comparison. Others will already stop after the type
+ * comparison. So if we get passed the class and type comparison we need to check if the
+ * comparison contains an SRV record. If so, we need a different comparison method.
+ */
+
+ /* The answers do not contain an SRV record */
+ if (ans_a->info.type != DNS_RRTYPE_SRV && ans_b->info.type != DNS_RRTYPE_SRV) {
+ len = LWIP_MIN(ans_a->rd_length, ans_b->rd_length);
+ for (i = 0; i < len; i++) {
+ a_rd = pbuf_get_at(pkt_a->pbuf, (u16_t)(ans_a->rd_offset + i));
+ b_rd = pbuf_get_at(pkt_b->pbuf, (u16_t)(ans_b->rd_offset + i));
+ if (a_rd != b_rd) {
+ if (a_rd > b_rd) {
+ *result = MDNS_LEXICOGRAPHICAL_LATER;
+ return ERR_OK;
+ }
+ else {
+ *result = MDNS_LEXICOGRAPHICAL_EARLIER;
+ return ERR_OK;
+ }
+ }
+ }
+ /* If the overlapping data is the same, compare the length */
+ if (ans_a->rd_length != ans_b->rd_length) {
+ if (ans_a->rd_length > ans_b->rd_length) {
+ *result = MDNS_LEXICOGRAPHICAL_LATER;
+ return ERR_OK;
+ }
+ else {
+ *result = MDNS_LEXICOGRAPHICAL_EARLIER;
+ return ERR_OK;
+ }
+ }
+ }
+ /* Because the types are guaranteed equal here, we know they are both SRV RRs */
+ else {
+ /* We will first compare the priority, weight and port */
+ for (i = 0; i < 6; i++) {
+ a_rd = pbuf_get_at(pkt_a->pbuf, (u16_t)(ans_a->rd_offset + i));
+ b_rd = pbuf_get_at(pkt_b->pbuf, (u16_t)(ans_b->rd_offset + i));
+ if (a_rd != b_rd) {
+ if (a_rd > b_rd) {
+ *result = MDNS_LEXICOGRAPHICAL_LATER;
+ return ERR_OK;
+ }
+ else {
+ *result = MDNS_LEXICOGRAPHICAL_EARLIER;
+ return ERR_OK;
+ }
+ }
+ }
+ /* Decompress names if compressed and save in domain_a or domain_b */
+ res = mdns_readname(pkt_a->pbuf, ans_a->rd_offset + 6, &domain_a);
+ if (res == MDNS_READNAME_ERROR) {
+ return ERR_VAL;
+ }
+ res = mdns_readname(pkt_b->pbuf, ans_b->rd_offset + 6, &domain_b);
+ if (res == MDNS_READNAME_ERROR) {
+ return ERR_VAL;
+ }
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: domain a: len = %d, name = ", domain_a.name[0]));
+ mdns_domain_debug_print(&domain_a);
+ LWIP_DEBUGF(MDNS_DEBUG, ("\n"));
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: domain b: len = %d, name = ", domain_b.name[0]));
+ mdns_domain_debug_print(&domain_b);
+ LWIP_DEBUGF(MDNS_DEBUG, ("\n"));
+ /* Compare names pairwise */
+ len = LWIP_MIN(domain_a.length, domain_b.length);
+ for (i = 0; i < len; i++) {
+ if (domain_a.name[i] != domain_b.name[i]) {
+ if (domain_a.name[i] > domain_b.name[i]) {
+ *result = MDNS_LEXICOGRAPHICAL_LATER;
+ return ERR_OK;
+ }
+ else {
+ *result = MDNS_LEXICOGRAPHICAL_EARLIER;
+ return ERR_OK;
+ }
+ }
+ }
+ /* If the overlapping data is the same, compare the length */
+ if (domain_a.length != domain_b.length) {
+ if (domain_a.length > domain_b.length) {
+ *result = MDNS_LEXICOGRAPHICAL_LATER;
+ return ERR_OK;
+ }
+ else {
+ *result = MDNS_LEXICOGRAPHICAL_EARLIER;
+ return ERR_OK;
+ }
+ }
+ }
+ /* They are exactly the same */
+ *result = MDNS_LEXICOGRAPHICAL_EQUAL;
+ return ERR_OK;
+}
+
+/**
+ * Clear authoritative answer list
+ *
+ * @param a_list answer list to clear
+ */
+static void
+mdns_init_answer_list(struct mdns_answer_list *a_list)
+{
+ int i;
+ a_list->size = 0;
+ for(i = 0; i < MDNS_PROBE_TIEBREAK_MAX_ANSWERS; i++) {
+ a_list->offset[i] = 0;
+ }
+}
+
+/**
+ * Pushes the offset of the answer on a lexicographically later sorted list.
+ * We use a simple insertion sort because most of the time we are only sorting
+ * two items. The answers are sorted from the smallest to the largest.
+ *
+ * @param a_list Answer list to which to add the answer
+ * @param pkt Packet where answer originated
+ * @param new_offset Offset of the new answer in the packet
+ * @param new_answer The new answer
+ * @return err_t ERR_MEM if list is full
+ */
+static err_t
+mdns_push_answer_to_sorted_list(struct mdns_answer_list *a_list,
+ struct mdns_packet *pkt,
+ u16_t new_offset,
+ struct mdns_answer *new_answer)
+{
+ int i;
+ struct mdns_answer a;
+ int pos = a_list->size;
+ err_t res = ERR_OK;
+ u8_t result;
+ u16_t num_left = pkt->authoritative;
+ u16_t parse_offset = pkt->parse_offset;
+
+ /* Check size */
+ if ((a_list->size + 1) >= MDNS_PROBE_TIEBREAK_MAX_ANSWERS) {
+ return ERR_MEM;
+ }
+ /* Search location and open a location */
+ for (i = 0; i < a_list->size; i++) {
+ /* Read answers already in the list from pkt */
+ pkt->parse_offset = a_list->offset[i];
+ res = mdns_read_answer(pkt, &a, &num_left);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse answer, skipping probe packet\n"));
+ return res;
+ }
+ /* Compare them with the new answer to find it's place */
+ res = mdns_lexicographical_comparison(pkt, pkt, &a, new_answer, &result);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to compare answers, skipping probe packet\n"));
+ return res;
+ }
+ if (result == MDNS_LEXICOGRAPHICAL_LATER) {
+ int j;
+ pos = i;
+ for (j = (a_list->size + 1); j>i; j--) {
+ a_list->offset[j] = a_list->offset[j-1];
+ }
+ break;
+ }
+ }
+ /* Insert new value */
+ a_list->offset[pos] = new_offset;
+ a_list->size++;
+ /* Reset parse offset for further evaluation */
+ pkt->parse_offset = parse_offset;
+ return res;
+}
+
+/**
+ * Check if the given answer answers the give question
+ *
+ * @param q query to find answer for
+ * @param a answer to given query
+ * @return 1 it a answers q, 0 if not
+ */
+static u8_t
+mdns_is_answer_to_question(struct mdns_question *q, struct mdns_answer *a)
+{
+ if (q->info.type == DNS_RRTYPE_ANY || q->info.type == a->info.type) {
+ /* The types match or question type is any */
+ if (mdns_domain_eq(&q->info.domain, &a->info.domain)) {
+ return 1;
+ }
+ }
+ return 0;
+}
+
+/**
+ * Converts the output packet to the input packet format for probe tiebreaking
+ *
+ * @param inpkt destination packet for conversion
+ * @param outpkt source packet for conversion
+ */
+static void
+mdns_convert_out_to_in_pkt(struct mdns_packet *inpkt, struct mdns_outpacket *outpkt)
+{
+ inpkt->pbuf = outpkt->pbuf;
+ inpkt->parse_offset = SIZEOF_DNS_HDR;
+
+ inpkt->questions = inpkt->questions_left = outpkt->questions;
+ inpkt->answers = inpkt->answers_left = outpkt->answers;
+ inpkt->authoritative = inpkt->authoritative_left = outpkt->authoritative;
+ inpkt->additional = inpkt->additional_left = outpkt->additional;
+}
+
+/**
+ * Debug print to print the answer part that is lexicographically compared
+ *
+ * @param pkt Packet where answer originated
+ * @param a The answer to print
+ */
+static void
+mdns_debug_print_answer(struct mdns_packet *pkt, struct mdns_answer *a)
+{
+#ifdef LWIP_DEBUG
+ /* Arbitrarily chose 200 -> don't want to see more then that. It's only
+ * for debug so not that important. */
+ char string[200];
+ int i;
+ int pos;
+
+ pos = snprintf(string, sizeof(string), "Type = %2d, class = %1d, rdata = ", a->info.type, a->info.klass);
+ for (i = 0; ((i < a->rd_length) && ((pos + 4*i) < 195)) ; i++) {
+ snprintf(&string[pos + 4*i], 5, "%3d ", (u8_t)pbuf_get_at(pkt->pbuf, (u16_t)(a->rd_offset + i)));
+ }
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: %s\n", string));
+#else
+ LWIP_UNUSED_ARG(pkt);
+ LWIP_UNUSED_ARG(a);
+#endif
+}
+
+/**
+ * Perform probe tiebreaking according to RFC6762 section 8.2
+ *
+ * @param netif network interface of incoming packet
+ * @param pkt incoming packet
+ */
+static void
+mdns_handle_probe_tiebreaking(struct netif *netif, struct mdns_packet *pkt)
+{
+ struct mdns_question pkt_q, my_q, q_dummy;
+ struct mdns_answer pkt_a, my_a;
+ struct mdns_outmsg myprobe_msg;
+ struct mdns_outpacket myprobe_outpkt;
+ struct mdns_packet myprobe_inpkt;
+ struct mdns_answer_list pkt_a_list, my_a_list;
+ u16_t save_parse_offset;
+ u16_t pkt_parse_offset, myprobe_parse_offset, myprobe_questions_left;
+ err_t res;
+ u8_t match, result;
+ int min, i;
+
+ /* Generate probe packet to perform comparison.
+ * This is a lot of calculation at this stage without any pre calculation
+ * needed. It should be evaluated if this is the best approach.
+ */
+ mdns_define_probe_rrs_to_send(netif, &myprobe_msg);
+ memset(&myprobe_outpkt, 0, sizeof(myprobe_outpkt));
+ memset(&myprobe_inpkt, 0, sizeof(myprobe_inpkt));
+ res = mdns_create_outpacket(netif, &myprobe_msg, &myprobe_outpkt);
+ if (res != ERR_OK) {
+ goto cleanup;
+ }
+ mdns_convert_out_to_in_pkt(&myprobe_inpkt, &myprobe_outpkt);
+
+ /* Loop over all our probes to search for matches */
+ while (myprobe_inpkt.questions_left) {
+ /* Read one of our probe questions to check if pkt contains same question */
+ res = mdns_read_question(&myprobe_inpkt, &my_q);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse question, skipping probe packet\n"));
+ goto cleanup;
+ }
+ /* Remember parse offsets so we can restart the search for the next question */
+ pkt_parse_offset = pkt->parse_offset;
+ myprobe_parse_offset = myprobe_inpkt.parse_offset;
+ /* Remember questions left of our probe packet */
+ myprobe_questions_left = myprobe_inpkt.questions_left;
+ /* Reset match flag */
+ match = 0;
+ /* Search for a matching probe in the incoming packet */
+ while (pkt->questions_left) {
+ /* Read probe questions one by one */
+ res = mdns_read_question(pkt, &pkt_q);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse question, skipping probe packet\n"));
+ goto cleanup;
+ }
+ /* Stop evaluating if the class is not supported */
+ if (pkt_q.info.klass != DNS_RRCLASS_IN && pkt_q.info.klass != DNS_RRCLASS_ANY) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: question class not supported, skipping probe packet\n"));
+ goto cleanup;
+ }
+ /* We probe for type any, so we do not have to compare types */
+ /* Compare if we are probing for the same domain */
+ if (mdns_domain_eq(&pkt_q.info.domain, &my_q.info.domain)) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: We are probing for the same rr\n"));
+ match = 1;
+ break;
+ }
+ }
+ /* When matched start evaluating the authoritative section */
+ if (match) {
+ /* Ignore all following questions to be able to get to the authoritative answers */
+ while (pkt->questions_left) {
+ res = mdns_read_question(pkt, &q_dummy);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse question, skipping probe packet\n"));
+ goto cleanup;
+ }
+ }
+ while (myprobe_inpkt.questions_left) {
+ res = mdns_read_question(&myprobe_inpkt, &q_dummy);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse question, skipping probe packet\n"));
+ goto cleanup;
+ }
+ }
+
+ /* Extract and sort our authoritative answers that answer our question */
+ mdns_init_answer_list(&my_a_list);
+ while(myprobe_inpkt.authoritative_left) {
+ save_parse_offset = myprobe_inpkt.parse_offset;
+ res = mdns_read_answer(&myprobe_inpkt, &my_a, &myprobe_inpkt.authoritative_left);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse answer, skipping probe packet\n"));
+ goto cleanup;
+ }
+ if (mdns_is_answer_to_question(&my_q, &my_a)) {
+ /* Add to list */
+ res = mdns_push_answer_to_sorted_list(&my_a_list, &myprobe_inpkt, save_parse_offset, &my_a);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to add answer, skipping probe packet\n"));
+ goto cleanup;
+ }
+ }
+ }
+ /* Extract and sort the packets authoritative answers that answer the
+ question */
+ mdns_init_answer_list(&pkt_a_list);
+ while(pkt->authoritative_left) {
+ save_parse_offset = pkt->parse_offset;
+ res = mdns_read_answer(pkt, &pkt_a, &pkt->authoritative_left);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse answer, skipping probe packet\n"));
+ goto cleanup;
+ }
+ if (mdns_is_answer_to_question(&my_q, &pkt_a)) {
+ /* Add to list */
+ res = mdns_push_answer_to_sorted_list(&pkt_a_list, pkt, save_parse_offset, &pkt_a);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to add answer, skipping probe packet\n"));
+ goto cleanup;
+ }
+ }
+ }
+
+ /* Reinitiate authoritative left */
+ myprobe_inpkt.authoritative_left = myprobe_inpkt.authoritative;
+ pkt->authoritative_left = pkt->authoritative;
+
+ /* Compare pairwise.
+ * - lexicographically later? -> we win, ignore the packet.
+ * - lexicographically earlier? -> we loose, wait one second and retry.
+ * - lexicographically equal? -> no conflict, check other probes.
+ */
+ min = LWIP_MIN(my_a_list.size, pkt_a_list.size);
+ for (i = 0; i < min; i++) {
+ /* Get answer of our own list */
+ myprobe_inpkt.parse_offset = my_a_list.offset[i];
+ res = mdns_read_answer(&myprobe_inpkt, &my_a, &myprobe_inpkt.authoritative_left);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse answer, skipping probe packet\n"));
+ goto cleanup;
+ }
+ /* Get answer of the packets list */
+ pkt->parse_offset = pkt_a_list.offset[i];
+ res = mdns_read_answer(pkt, &pkt_a, &pkt->authoritative_left);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse answer, skipping probe packet\n"));
+ goto cleanup;
+ }
+ /* Print both answers for debugging */
+ mdns_debug_print_answer(pkt, &pkt_a);
+ mdns_debug_print_answer(&myprobe_inpkt, &my_a);
+ /* Define the winner */
+ res = mdns_lexicographical_comparison(&myprobe_inpkt, pkt, &my_a, &pkt_a, &result);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to compare answers, skipping probe packet\n"));
+ goto cleanup;
+ }
+ if (result == MDNS_LEXICOGRAPHICAL_LATER) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: we win, we are lexicographically later\n"));
+ goto cleanup;
+ }
+ else if (result == MDNS_LEXICOGRAPHICAL_EARLIER) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: we loose, we are lexicographically earlier. 1s timeout started\n"));
+ /* Increase the number of conflicts occurred */
+ mdns_conflict_save_time(netif);
+ /* then restart with 1s delay */
+ mdns_resp_restart_delay(netif, MDNS_PROBE_TIEBREAK_CONFLICT_DELAY_MS);
+ goto cleanup;
+ }
+ else {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: lexicographically equal, so no conclusion\n"));
+ }
+ }
+ /* All compared RR were equal, otherwise we would not be here
+ * -> check if one of both have more answers to the question */
+ if (my_a_list.size != pkt_a_list.size) {
+ if (my_a_list.size > pkt_a_list.size) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: we win, we have more records answering the probe\n"));
+ goto cleanup;
+ }
+ else {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: we loose, we have less records. 1s timeout started\n"));
+ /* Increase the number of conflicts occurred */
+ mdns_conflict_save_time(netif);
+ /* then restart with 1s delay */
+ mdns_resp_restart_delay(netif, MDNS_PROBE_TIEBREAK_CONFLICT_DELAY_MS);
+ goto cleanup;
+ }
+ }
+ else {
+ /* There is no conflict on this probe, both devices have the same data
+ * in the authoritative section. We should still check the other probes
+ * for conflicts. */
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: no conflict, all records answering the probe are equal\n"));
+ }
+ }
+ /* Evaluate other probes if any. */
+ /* Reinitiate parse offsets */
+ pkt->parse_offset = pkt_parse_offset;
+ myprobe_inpkt.parse_offset = myprobe_parse_offset;
+ /* Reinitiate questions_left and authoritative_left */
+ pkt->questions_left = pkt->questions;
+ pkt->authoritative_left = pkt->authoritative;
+ myprobe_inpkt.questions_left = myprobe_questions_left;
+ myprobe_inpkt.authoritative_left = myprobe_inpkt.authoritative;
+ }
+
+cleanup:
+ if (myprobe_inpkt.pbuf != NULL) {
+ pbuf_free(myprobe_inpkt.pbuf);
+ }
+}
+
+/**
+ * Check the incoming packet and parse all questions
+ *
+ * @param netif network interface of incoming packet
+ * @param pkt incoming packet
+ * @param reply outgoing message
+ * @return err_t
+ */
+static err_t
+mdns_parse_pkt_questions(struct netif *netif, struct mdns_packet *pkt,
+ struct mdns_outmsg *reply)
+{
+ struct mdns_host *mdns = NETIF_TO_HOST(netif);
+ struct mdns_service *service;
+ int i;
+ err_t res;
+
+ while (pkt->questions_left) {
+ struct mdns_question q;
+
+ res = mdns_read_question(pkt, &q);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse question, skipping query packet\n"));
+ return res;
+ }
+
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Query for domain "));
+ mdns_domain_debug_print(&q.info.domain);
+ LWIP_DEBUGF(MDNS_DEBUG, (" type %d class %d\n", q.info.type, q.info.klass));
+
+ if (q.unicast) {
+ /* Reply unicast if it is requested in the question */
+ reply->unicast_reply_requested = 1;
+ }
+
+ reply->host_replies |= check_host(netif, &q.info, &reply->host_reverse_v6_replies);
+
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ service = mdns->services[i];
+ if (!service) {
+ continue;
+ }
+ reply->serv_replies[i] |= check_service(service, &q.info);
+ }
+ }
+
+ return ERR_OK;
+}
+
+/**
+ * Check the incoming packet and parse all (known) answers
+ *
+ * @param netif network interface of incoming packet
+ * @param pkt incoming packet
+ * @param reply outgoing message
+ * @return err_t
+ */
+static err_t
+mdns_parse_pkt_known_answers(struct netif *netif, struct mdns_packet *pkt,
+ struct mdns_outmsg *reply)
+{
+ struct mdns_host *mdns = NETIF_TO_HOST(netif);
+ struct mdns_service *service;
+ int i;
+ err_t res;
+
+ while (pkt->answers_left) {
+ struct mdns_answer ans;
+ u8_t rev_v6;
+ int match;
+ u32_t rr_ttl = MDNS_TTL_120;
+
+ res = mdns_read_answer(pkt, &ans, &pkt->answers_left);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse answer, skipping query packet\n"));
+ return res;
+ }
+
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Known answer for domain "));
+ mdns_domain_debug_print(&ans.info.domain);
+ LWIP_DEBUGF(MDNS_DEBUG, (" type %d class %d\n", ans.info.type, ans.info.klass));
+
+
+ if (ans.info.type == DNS_RRTYPE_ANY || ans.info.klass == DNS_RRCLASS_ANY) {
+ /* Skip known answers for ANY type & class */
+ continue;
+ }
+
+ rev_v6 = 0;
+ match = reply->host_replies & check_host(netif, &ans.info, &rev_v6);
+ if (match && (ans.ttl > (rr_ttl / 2))) {
+ /* The RR in the known answer matches an RR we are planning to send,
+ * and the TTL is less than half gone.
+ * If the payload matches we should not send that answer.
+ */
+ if (ans.info.type == DNS_RRTYPE_PTR) {
+ /* Read domain and compare */
+ struct mdns_domain known_ans, my_ans;
+ u16_t len;
+ len = mdns_readname(pkt->pbuf, ans.rd_offset, &known_ans);
+ res = mdns_build_host_domain(&my_ans, mdns);
+ if (len != MDNS_READNAME_ERROR && res == ERR_OK && mdns_domain_eq(&known_ans, &my_ans)) {
+#if LWIP_IPV4
+ if (match & REPLY_HOST_PTR_V4) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: v4 PTR\n"));
+ reply->host_replies &= ~REPLY_HOST_PTR_V4;
+ }
+#endif
+#if LWIP_IPV6
+ if (match & REPLY_HOST_PTR_V6) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: v6 PTR\n"));
+ reply->host_reverse_v6_replies &= ~rev_v6;
+ if (reply->host_reverse_v6_replies == 0) {
+ reply->host_replies &= ~REPLY_HOST_PTR_V6;
+ }
+ }
+#endif
+ }
+ } else if (match & REPLY_HOST_A) {
+#if LWIP_IPV4
+ if (ans.rd_length == sizeof(ip4_addr_t) &&
+ pbuf_memcmp(pkt->pbuf, ans.rd_offset, netif_ip4_addr(netif), ans.rd_length) == 0) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: A\n"));
+ reply->host_replies &= ~REPLY_HOST_A;
+ }
+#endif
+ } else if (match & REPLY_HOST_AAAA) {
+#if LWIP_IPV6
+ if (ans.rd_length == sizeof(ip6_addr_p_t) &&
+ /* TODO this clears all AAAA responses if first addr is set as known */
+ pbuf_memcmp(pkt->pbuf, ans.rd_offset, netif_ip6_addr(netif, 0), ans.rd_length) == 0) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: AAAA\n"));
+ reply->host_replies &= ~REPLY_HOST_AAAA;
+ }
+#endif
+ }
+ }
+
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ service = mdns->services[i];
+ if (!service) {
+ continue;
+ }
+ match = reply->serv_replies[i] & check_service(service, &ans.info);
+ if (match & REPLY_SERVICE_TYPE_PTR) {
+ rr_ttl = MDNS_TTL_4500;
+ }
+ if (match && (ans.ttl > (rr_ttl / 2))) {
+ /* The RR in the known answer matches an RR we are planning to send,
+ * and the TTL is less than half gone.
+ * If the payload matches we should not send that answer.
+ */
+ if (ans.info.type == DNS_RRTYPE_PTR) {
+ /* Read domain and compare */
+ struct mdns_domain known_ans, my_ans;
+ u16_t len;
+ len = mdns_readname(pkt->pbuf, ans.rd_offset, &known_ans);
+ if (len != MDNS_READNAME_ERROR) {
+ if (match & REPLY_SERVICE_TYPE_PTR) {
+ res = mdns_build_service_domain(&my_ans, service, 0);
+ if (res == ERR_OK && mdns_domain_eq(&known_ans, &my_ans)) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: service type PTR\n"));
+ reply->serv_replies[i] &= ~REPLY_SERVICE_TYPE_PTR;
+ }
+ }
+ if (match & REPLY_SERVICE_NAME_PTR) {
+ res = mdns_build_service_domain(&my_ans, service, 1);
+ if (res == ERR_OK && mdns_domain_eq(&known_ans, &my_ans)) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: service name PTR\n"));
+ reply->serv_replies[i] &= ~REPLY_SERVICE_NAME_PTR;
+ }
+ }
+ }
+ } else if (match & REPLY_SERVICE_SRV) {
+ /* Read and compare to my SRV record */
+ u16_t field16, len, read_pos;
+ struct mdns_domain known_ans, my_ans;
+ read_pos = ans.rd_offset;
+ do {
+ /* Check priority field */
+ len = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), read_pos);
+ if (len != sizeof(field16) || lwip_ntohs(field16) != SRV_PRIORITY) {
+ break;
+ }
+ read_pos += len;
+ /* Check weight field */
+ len = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), read_pos);
+ if (len != sizeof(field16) || lwip_ntohs(field16) != SRV_WEIGHT) {
+ break;
+ }
+ read_pos += len;
+ /* Check port field */
+ len = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), read_pos);
+ if (len != sizeof(field16) || lwip_ntohs(field16) != service->port) {
+ break;
+ }
+ read_pos += len;
+ /* Check host field */
+ len = mdns_readname(pkt->pbuf, read_pos, &known_ans);
+ mdns_build_host_domain(&my_ans, mdns);
+ if (len == MDNS_READNAME_ERROR || !mdns_domain_eq(&known_ans, &my_ans)) {
+ break;
+ }
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: SRV\n"));
+ reply->serv_replies[i] &= ~REPLY_SERVICE_SRV;
+ } while (0);
+ } else if (match & REPLY_SERVICE_TXT) {
+ mdns_prepare_txtdata(service);
+ if (service->txtdata.length == ans.rd_length &&
+ pbuf_memcmp(pkt->pbuf, ans.rd_offset, service->txtdata.name, ans.rd_length) == 0) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Skipping known answer: TXT\n"));
+ reply->serv_replies[i] &= ~REPLY_SERVICE_TXT;
+ }
+ }
+ }
+ }
+ }
+
+ return ERR_OK;
+}
+
+/**
+ * Check the incoming packet and parse all authoritative answers to see if the
+ * query is a probe query.
+ *
+ * @param netif network interface of incoming packet
+ * @param pkt incoming packet
+ * @param reply outgoing message
+ * @return err_t
+ */
+static err_t
+mdns_parse_pkt_authoritative_answers(struct netif *netif, struct mdns_packet *pkt,
+ struct mdns_outmsg *reply)
+{
+ struct mdns_host *mdns = NETIF_TO_HOST(netif);
+ struct mdns_service *service;
+ int i;
+ err_t res;
+
+ while (pkt->authoritative_left) {
+ struct mdns_answer ans;
+ u8_t rev_v6;
+ int match;
+
+ res = mdns_read_answer(pkt, &ans, &pkt->authoritative_left);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse answer, skipping query packet\n"));
+ return res;
+ }
+
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Authoritative answer for domain "));
+ mdns_domain_debug_print(&ans.info.domain);
+ LWIP_DEBUGF(MDNS_DEBUG, (" type %d class %d\n", ans.info.type, ans.info.klass));
+
+
+ if (ans.info.type == DNS_RRTYPE_ANY || ans.info.klass == DNS_RRCLASS_ANY) {
+ /* Skip known answers for ANY type & class */
+ continue;
+ }
+
+ rev_v6 = 0;
+ match = reply->host_replies & check_host(netif, &ans.info, &rev_v6);
+ if (match) {
+ reply->probe_query_recv = 1;
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Probe for own host info received\n"));
+ }
+
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ service = mdns->services[i];
+ if (!service) {
+ continue;
+ }
+ match = reply->serv_replies[i] & check_service(service, &ans.info);
+
+ if (match) {
+ reply->probe_query_recv = 1;
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Probe for own service info received\n"));
+ }
+ }
+ }
+
+ return ERR_OK;
+}
+
+/**
+ * Add / copy message to delaying message buffer.
+ *
+ * @param dest destination msg struct
+ * @param src source msg struct
+ */
+static void
+mdns_add_msg_to_delayed(struct mdns_outmsg *dest, struct mdns_outmsg *src)
+{
+ int i;
+
+ dest->host_questions |= src->host_questions;
+ dest->host_replies |= src->host_replies;
+ dest->host_reverse_v6_replies |= src->host_reverse_v6_replies;
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ dest->serv_questions[i] |= src->serv_questions[i];
+ dest->serv_replies[i] |= src->serv_replies[i];
+ }
+
+ dest->flags = src->flags;
+ dest->cache_flush = src->cache_flush;
+ dest->tx_id = src->tx_id;
+ dest->legacy_query = src->legacy_query;
+}
+
+/**
+ * Handle question MDNS packet
+ * - Perform probe tiebreaking when in probing state
+ * - Parse all questions and set bits what answers to send
+ * - Clear pending answers if known answers are supplied
+ * - Define which type of answer is requested
+ * - Send out packet or put it on hold until after random time
+ *
+ * @param pkt incoming packet (in stack)
+ * @param netif network interface of incoming packet
+ */
+static void
+mdns_handle_question(struct mdns_packet *pkt, struct netif *netif)
+{
+ struct mdns_host *mdns = NETIF_TO_HOST(netif);
+ struct mdns_outmsg reply;
+ u8_t rrs_to_send;
+ u8_t shared_answer = 0;
+ u8_t delay_response = 1;
+ u8_t send_unicast = 0;
+ u8_t listen_to_QU_bit = 0;
+ int i;
+ err_t res;
+
+ if ((mdns->state == MDNS_STATE_PROBING) ||
+ (mdns->state == MDNS_STATE_ANNOUNCE_WAIT)) {
+ /* Probe Tiebreaking */
+ /* Check if packet is a probe message */
+ if ((pkt->questions > 0) && (pkt->answers == 0) &&
+ (pkt->authoritative > 0) && (pkt->additional == 0)) {
+ /* This should be a probe message -> call probe handler */
+ mdns_handle_probe_tiebreaking(netif, pkt);
+ }
+ }
+
+ if ((mdns->state != MDNS_STATE_COMPLETE) &&
+ (mdns->state != MDNS_STATE_ANNOUNCING)) {
+ /* Don't answer questions until we've verified our domains via probing */
+ /* @todo we should check incoming questions during probing for tiebreaking */
+ return;
+ }
+
+ memset(&reply, 0, sizeof(struct mdns_outmsg));
+
+ /* Parse question */
+ res = mdns_parse_pkt_questions(netif, pkt, &reply);
+ if (res != ERR_OK) {
+ return;
+ }
+ /* Parse answers -> count as known answers because it's a question */
+ res = mdns_parse_pkt_known_answers(netif, pkt, &reply);
+ if (res != ERR_OK) {
+ return;
+ }
+ if (pkt->next_answer) {
+ /* Also parse known-answers from additional packets */
+ struct mdns_packet *pkta = pkt->next_answer;
+ while (pkta) {
+ res = mdns_parse_pkt_known_answers(netif, pkta, &reply);
+ if (res != ERR_OK) {
+ return;
+ }
+ pkta = pkta->next_answer;
+ }
+ }
+ /* Parse authoritative answers -> probing */
+ /* If it's a probe query, we need to directly answer via unicast. */
+ res = mdns_parse_pkt_authoritative_answers(netif, pkt, &reply);
+ if (res != ERR_OK) {
+ return;
+ }
+ /* Ignore additional answers -> do not have any need for them at the moment */
+ if(pkt->additional) {
+ LWIP_DEBUGF(MDNS_DEBUG,
+ ("MDNS: Query contains additional answers -> they are discarded\n"));
+ }
+
+ /* Any replies on question? */
+ rrs_to_send = reply.host_replies | reply.host_questions;
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ rrs_to_send |= reply.serv_replies[i] | reply.serv_questions[i];
+ }
+
+ if (!rrs_to_send) {
+ /* This case is most common */
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Nothing to answer\n"));
+ return;
+ }
+
+ reply.flags = DNS_FLAG1_RESPONSE | DNS_FLAG1_AUTHORATIVE;
+
+ /* Detect if it's a legacy querier asking the question
+ * How to detect legacy DNS query? (RFC6762 section 6.7)
+ * - source port != 5353
+ * - a legacy query can only contain 1 question
+ */
+ if (pkt->source_port != LWIP_IANA_PORT_MDNS) {
+ if (pkt->questions == 1) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: request from legacy querier\n"));
+ reply.legacy_query = 1;
+ reply.tx_id = pkt->tx_id;
+ reply.cache_flush = 0;
+ }
+ else {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: ignore query if (src UDP port != 5353) && (!= legacy query)\n"));
+ return;
+ }
+ }
+ else {
+ reply.cache_flush = 1;
+ }
+
+ /* Delaying response. (RFC6762 section 6)
+ * Always delay the response, unicast or multicast, except when:
+ * - Answering to a single question with a unique answer (not a probe).
+ * - Answering to a probe query via unicast.
+ * - Answering to a probe query via multicast if not multicasted within 250ms.
+ *
+ * unique answer? -> not if it includes service type or name ptr's
+ */
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ shared_answer |= (reply.serv_replies[i] &
+ (REPLY_SERVICE_TYPE_PTR | REPLY_SERVICE_NAME_PTR));
+ }
+ if ( ((pkt->questions == 1) && (!shared_answer) && !reply.probe_query_recv)
+ || (reply.probe_query_recv && reply.unicast_reply_requested)) {
+ delay_response = 0;
+ }
+#if LWIP_IPV6
+ if (IP_IS_V6_VAL(pkt->source_addr) && reply.probe_query_recv
+ && !reply.unicast_reply_requested && !mdns->ipv6.multicast_probe_timeout) {
+ delay_response = 0;
+ }
+#endif
+#if LWIP_IPV4
+ if (IP_IS_V4_VAL(pkt->source_addr) && reply.probe_query_recv
+ && !reply.unicast_reply_requested && !mdns->ipv4.multicast_probe_timeout) {
+ delay_response = 0;
+ }
+#endif
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: response %s delayed\n", (delay_response ? "randomly" : "not")));
+
+ /* Unicast / multicast response:
+ * Answering to (m)DNS querier via unicast response.
+ * When:
+ * a) Unicast reply requested && recently multicasted 1/4ttl (RFC6762 section 5.4)
+ * b) Direct unicast query to port 5353 (RFC6762 section 5.5)
+ * c) Reply to Legacy DNS querier (RFC6762 section 6.7)
+ * d) A probe message is received requesting unicast (RFC6762 section 6)
+ */
+
+#if LWIP_IPV6
+ if ((IP_IS_V6_VAL(pkt->source_addr) && mdns->ipv6.multicast_timeout_25TTL)) {
+ listen_to_QU_bit = 1;
+ }
+#endif
+#if LWIP_IPV4
+ if ((IP_IS_V4_VAL(pkt->source_addr) && mdns->ipv4.multicast_timeout_25TTL)) {
+ listen_to_QU_bit = 1;
+ }
+#endif
+ if ( (reply.unicast_reply_requested && listen_to_QU_bit)
+ || pkt->recv_unicast
+ || reply.legacy_query
+ || (reply.probe_query_recv && reply.unicast_reply_requested)) {
+ send_unicast = 1;
+ }
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: send response via %s\n", (send_unicast ? "unicast" : "multicast")));
+
+ /* Send out or put on waiting list */
+ if (delay_response) {
+ if (send_unicast) {
+#if LWIP_IPV6
+ /* Add answers to IPv6 waiting list if:
+ * - it's a IPv6 incoming packet
+ * - no message is in it yet
+ */
+ if (IP_IS_V6_VAL(pkt->source_addr) && !mdns->ipv6.unicast_msg_in_use) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: add answers to unicast IPv6 waiting list\n"));
+ SMEMCPY(&mdns->ipv6.delayed_msg_unicast.dest_addr, &pkt->source_addr, sizeof(ip_addr_t));
+ mdns->ipv6.delayed_msg_unicast.dest_port = pkt->source_port;
+
+ mdns_add_msg_to_delayed(&mdns->ipv6.delayed_msg_unicast, &reply);
+
+ mdns_set_timeout(netif, MDNS_RESPONSE_DELAY, mdns_send_unicast_msg_delayed_ipv6,
+ &mdns->ipv6.unicast_msg_in_use);
+ }
+#endif
+#if LWIP_IPV4
+ /* Add answers to IPv4 waiting list if:
+ * - it's a IPv4 incoming packet
+ * - no message is in it yet
+ */
+ if (IP_IS_V4_VAL(pkt->source_addr) && !mdns->ipv4.unicast_msg_in_use) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: add answers to unicast IPv4 waiting list\n"));
+ SMEMCPY(&mdns->ipv4.delayed_msg_unicast.dest_addr, &pkt->source_addr, sizeof(ip_addr_t));
+ mdns->ipv4.delayed_msg_unicast.dest_port = pkt->source_port;
+
+ mdns_add_msg_to_delayed(&mdns->ipv4.delayed_msg_unicast, &reply);
+
+ mdns_set_timeout(netif, MDNS_RESPONSE_DELAY, mdns_send_unicast_msg_delayed_ipv4,
+ &mdns->ipv4.unicast_msg_in_use);
+ }
+#endif
+ }
+ else {
+#if LWIP_IPV6
+ /* Add answers to IPv6 waiting list if:
+ * - it's a IPv6 incoming packet
+ * - the 1 second timeout is passed (RFC6762 section 6)
+ * - and it's not a probe packet
+ * Or if:
+ * - it's a IPv6 incoming packet
+ * - and it's a probe packet
+ */
+ if (IP_IS_V6_VAL(pkt->source_addr) && !mdns->ipv6.multicast_timeout
+ && !reply.probe_query_recv) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: add answers to multicast IPv6 waiting list\n"));
+
+ mdns_add_msg_to_delayed(&mdns->ipv6.delayed_msg_multicast, &reply);
+
+ mdns_set_timeout(netif, MDNS_RESPONSE_DELAY, mdns_send_multicast_msg_delayed_ipv6,
+ &mdns->ipv6.multicast_msg_waiting);
+ }
+ else if (IP_IS_V6_VAL(pkt->source_addr) && reply.probe_query_recv) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: add answers to probe multicast IPv6 waiting list\n"));
+
+ mdns_add_msg_to_delayed(&mdns->ipv6.delayed_msg_multicast, &reply);
+
+ mdns->ipv6.multicast_msg_waiting = 1;
+ }
+#endif
+#if LWIP_IPV4
+ /* Add answers to IPv4 waiting list if:
+ * - it's a IPv4 incoming packet
+ * - the 1 second timeout is passed (RFC6762 section 6)
+ * - and it's not a probe packet
+ * Or if:
+ * - it's a IPv4 incoming packet
+ * - and it's a probe packet
+ */
+ if (IP_IS_V4_VAL(pkt->source_addr) && !mdns->ipv4.multicast_timeout
+ && !reply.probe_query_recv) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: add answers to multicast IPv4 waiting list\n"));
+
+ mdns_add_msg_to_delayed(&mdns->ipv4.delayed_msg_multicast, &reply);
+
+ mdns_set_timeout(netif, MDNS_RESPONSE_DELAY, mdns_send_multicast_msg_delayed_ipv4,
+ &mdns->ipv4.multicast_msg_waiting);
+ }
+ else if (IP_IS_V4_VAL(pkt->source_addr) && reply.probe_query_recv) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: add answers to probe multicast IPv4 waiting list\n"));
+
+ mdns_add_msg_to_delayed(&mdns->ipv4.delayed_msg_multicast, &reply);
+
+ mdns->ipv4.multicast_msg_waiting = 1;
+ }
+#endif
+ }
+ }
+ else {
+ if (send_unicast) {
+ /* Copy source IP/port to use when responding unicast */
+ SMEMCPY(&reply.dest_addr, &pkt->source_addr, sizeof(ip_addr_t));
+ reply.dest_port = pkt->source_port;
+ /* send answer directly via unicast */
+ res = mdns_send_outpacket(&reply, netif);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Unicast answer could not be send\n"));
+ }
+ else {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Unicast answer send successfully\n"));
+ }
+ return;
+ }
+ else {
+ /* Set IP/port to use when responding multicast */
+#if LWIP_IPV6
+ if (IP_IS_V6_VAL(pkt->source_addr)) {
+ if (mdns->ipv6.multicast_timeout && !reply.probe_query_recv) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: we just multicasted, ignore question\n"));
+ return;
+ }
+ SMEMCPY(&reply.dest_addr, &v6group, sizeof(ip_addr_t));
+ }
+#endif
+#if LWIP_IPV4
+ if (IP_IS_V4_VAL(pkt->source_addr)) {
+ if (mdns->ipv4.multicast_timeout && !reply.probe_query_recv) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: we just multicasted, ignore question\n"));
+ return;
+ }
+ SMEMCPY(&reply.dest_addr, &v4group, sizeof(ip_addr_t));
+ }
+#endif
+ reply.dest_port = LWIP_IANA_PORT_MDNS;
+ /* send answer directly via multicast */
+ res = mdns_send_outpacket(&reply, netif);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Multicast answer could not be send\n"));
+ }
+ else {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Multicast answer send successfully\n"));
+#if LWIP_IPV6
+ if (IP_IS_V6_VAL(pkt->source_addr)) {
+ mdns_start_multicast_timeouts_ipv6(netif);
+ }
+#endif
+#if LWIP_IPV4
+ if (IP_IS_V4_VAL(pkt->source_addr)) {
+ mdns_start_multicast_timeouts_ipv4(netif);
+ }
+#endif
+ }
+ return;
+ }
+ }
+}
+
+/**
+ * Handle truncated question MDNS packet
+ * - Called by timer
+ * - Call mdns_handle_question
+ * - Do cleanup
+ *
+ * @param arg incoming packet (in pool)
+ */
+static void
+mdns_handle_tc_question(void *arg)
+{
+ struct mdns_packet *pkt = (struct mdns_packet *)arg;
+ struct netif *from = netif_get_by_index(pkt->pbuf->if_idx);
+ /* timer as elapsed, now handle this question */
+ mdns_handle_question(pkt, from);
+ /* remove from pending list */
+ if (pending_tc_questions == pkt) {
+ pending_tc_questions = pkt->next_tc_question;
+ }
+ else {
+ struct mdns_packet *prev = pending_tc_questions;
+ while (prev && prev->next_tc_question != pkt) {
+ prev = prev->next_tc_question;
+ }
+ LWIP_ASSERT("pkt not found in pending_tc_questions list", prev != NULL);
+ prev->next_tc_question = pkt->next_tc_question;
+ }
+ /* free linked answers and this question */
+ while (pkt->next_answer) {
+ struct mdns_packet *ans = pkt->next_answer;
+ pkt->next_answer = ans->next_answer;
+ pbuf_free(ans->pbuf);
+ LWIP_MEMPOOL_FREE(MDNS_PKTS, ans);
+ }
+ pbuf_free(pkt->pbuf);
+ LWIP_MEMPOOL_FREE(MDNS_PKTS, pkt);
+}
+
+/**
+ * Save time when a probe conflict occurs:
+ * - Check if we exceeded the maximum of 15 conflicts in 10seconds.
+ *
+ * @param netif network interface on which the conflict occurred.
+ */
+static void
+mdns_conflict_save_time(struct netif *netif)
+{
+ struct mdns_host* mdns = NETIF_TO_HOST(netif);
+ int i;
+ u32_t diff;
+ u8_t index2;
+
+ /* Increase the number of conflicts occurred */
+ mdns->num_conflicts++;
+ mdns->conflict_time[mdns->index] = sys_now();
+ /* Print timestamp list */
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: conflict timestamp list, insert index = %d\n", mdns->index));
+ for(i = 0; i < MDNS_PROBE_MAX_CONFLICTS_BEFORE_RATE_LIMIT; i++) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: time no. %d = %"U32_F"\n", i, mdns->conflict_time[i]));
+ }
+ /* Check if we had enough conflicts, minimum 15 */
+ if (mdns->num_conflicts >= MDNS_PROBE_MAX_CONFLICTS_BEFORE_RATE_LIMIT) {
+ /* Get the index to the oldest timestamp */
+ index2 = (mdns->index + 1) % MDNS_PROBE_MAX_CONFLICTS_BEFORE_RATE_LIMIT;
+ /* Compare the oldest vs newest time stamp */
+ diff = mdns->conflict_time[mdns->index] - mdns->conflict_time[index2];
+ /* If they are less then 10 seconds apart, initiate rate limit */
+ if (diff < MDNS_PROBE_MAX_CONFLICTS_TIME_WINDOW) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: probe rate limit enabled\n"));
+ mdns->rate_limit_activated = 1;
+ }
+ }
+ /* Increase index */
+ mdns->index = (mdns->index + 1) % MDNS_PROBE_MAX_CONFLICTS_BEFORE_RATE_LIMIT;
+}
+
+/**
+ * Handle a probe conflict:
+ * - Check if we exceeded the maximum of 15 conflicts in 10seconds.
+ * - Let the user know there is a conflict.
+ *
+ * @param netif network interface on which the conflict occurred.
+ * @param slot service index +1 on which the conflict occurred (0 indicate hostname conflict).
+ */
+static void
+mdns_probe_conflict(struct netif *netif, s8_t slot)
+{
+ /* Increase the number of conflicts occurred and check rate limiting */
+ mdns_conflict_save_time(netif);
+
+ /* Disable currently running probe / announce timer */
+ sys_untimeout(mdns_probe_and_announce, netif);
+
+ /* Inform the host on the conflict, if a callback is set */
+ if (mdns_name_result_cb != NULL) {
+ mdns_name_result_cb(netif, MDNS_PROBING_CONFLICT, slot);
+ }
+ /* TODO: rename and call restart if no mdns_name_result_cb was set? */
+}
+
+/**
+ * Loockup matching request for response MDNS packet
+ */
+#if LWIP_MDNS_SEARCH
+static struct mdns_request *
+mdns_lookup_request(struct mdns_rr_info *rr)
+{
+ int i;
+ /* search originating request */
+ for (i = 0; i < MDNS_MAX_REQUESTS; i++) {
+ if ((mdns_requests[i].result_fn != NULL) &&
+ (check_request(&mdns_requests[i], rr) != 0)) {
+ return &mdns_requests[i];
+ }
+ }
+ return NULL;
+}
+#endif
+
+/**
+ * Handle response MDNS packet:
+ * - Handle responses on probe query
+ * - Perform conflict resolution on every packet (RFC6762 section 9)
+ *
+ * @param pkt incoming packet
+ * @param netif network interface on which packet was received
+ */
+static void
+mdns_handle_response(struct mdns_packet *pkt, struct netif *netif)
+{
+ struct mdns_host* mdns = NETIF_TO_HOST(netif);
+ u16_t total_answers_left;
+#if LWIP_MDNS_SEARCH
+ struct mdns_request *req = NULL;
+ s8_t first = 1;
+#endif
+
+ /* Ignore responses with a source port different from 5353
+ * (LWIP_IANA_PORT_MDNS) -> RFC6762 section 6 */
+ if (pkt->source_port != LWIP_IANA_PORT_MDNS) {
+ return;
+ }
+
+ /* Ignore all questions */
+ while (pkt->questions_left) {
+ struct mdns_question q;
+ err_t res;
+ res = mdns_read_question(pkt, &q);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse question, skipping response packet\n"));
+ return;
+ }
+#if LWIP_MDNS_SEARCH
+ else {
+ req = mdns_lookup_request(&q.info);
+ }
+#endif
+ }
+ /* We need to check all resource record sections: answers, authoritative and additional */
+ total_answers_left = pkt->answers_left + pkt->authoritative_left + pkt->additional_left;
+ while (total_answers_left) {
+ struct mdns_answer ans;
+ err_t res;
+
+ res = mdns_read_answer(pkt, &ans, &total_answers_left);
+ if (res != ERR_OK) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Failed to parse answer, skipping response packet\n"));
+ return;
+ }
+
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Answer for domain "));
+ mdns_domain_debug_print(&ans.info.domain);
+ LWIP_DEBUGF(MDNS_DEBUG, (" type %d class %d\n", ans.info.type, ans.info.klass));
+
+ if (ans.info.type == DNS_RRTYPE_ANY || ans.info.klass != DNS_RRCLASS_IN) {
+ /* Skip answers for ANY type or if class != IN */
+ continue;
+ }
+
+#if LWIP_MDNS_SEARCH
+ if (req && req->only_ptr) {
+ /* Need to recheck that this answer match request that match previous answer */
+ if (memcmp (req->service.name, ans.info.domain.name, req->service.length) != 0)
+ req = NULL;
+ }
+ if (!req) {
+ /* Try hard to search matching request */
+ req = mdns_lookup_request(&ans.info);
+ }
+ if (req && req->result_fn) {
+ u16_t offset;
+ struct pbuf *p;
+ int flags = (first ? MDNS_SEARCH_RESULT_FIRST : 0) |
+ (!total_answers_left ? MDNS_SEARCH_RESULT_LAST : 0);
+ if (req->only_ptr) {
+ if (ans.info.type != DNS_RRTYPE_PTR)
+ continue; /* Ignore non matching answer type */
+ flags = MDNS_SEARCH_RESULT_FIRST | MDNS_SEARCH_RESULT_LAST;
+ }
+ p = pbuf_skip(pkt->pbuf, ans.rd_offset, &offset);
+ if (p == NULL) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Malformed response packet, aborting\n"));
+ return;
+ }
+ if (ans.info.type == DNS_RRTYPE_PTR || ans.info.type == DNS_RRTYPE_SRV) {
+ /* Those RR types have compressed domain name. Must uncompress here,
+ since cannot be done without pbuf. */
+ struct {
+ u16_t values[3]; /* SRV: Prio, Weight, Port */
+ struct mdns_domain dom; /* PTR & SRV: Domain (uncompressed) */
+ } data;
+ u16_t off = (ans.info.type == DNS_RRTYPE_SRV ? 6 : 0);
+ u16_t len = mdns_readname(pkt->pbuf, ans.rd_offset + off, &data.dom);
+ if (len == MDNS_READNAME_ERROR) {
+ /* Ensure result_fn is called anyway, just copy failed domain as is */
+ data.dom.length = ans.rd_length - off;
+ memcpy(&data.dom, (const char *)p->payload + offset + off, data.dom.length);
+ }
+ /* Adjust len/off according RR type */
+ if (ans.info.type == DNS_RRTYPE_SRV) {
+ memcpy(&data, (const char *)p->payload + offset, 6);
+ len = data.dom.length + 6;
+ off = 0;
+ } else {
+ len = data.dom.length;
+ off = 6;
+ }
+ req->result_fn(&ans, (const char *)&data + off, len, flags, req->arg);
+ } else {
+ /* Direct call result_fn with varpart pointing in pbuf payload */
+ req->result_fn(&ans, (const char *)p->payload + offset, ans.rd_length, flags, req->arg);
+ }
+ first = 0;
+ }
+#endif
+
+ /* "Conflicting Multicast DNS responses received *before* the first probe
+ * packet is sent MUST be silently ignored" so drop answer if we haven't
+ * started probing yet. */
+ if ((mdns->state == MDNS_STATE_PROBING) ||
+ (mdns->state == MDNS_STATE_ANNOUNCE_WAIT)) {
+ struct mdns_domain domain;
+ u8_t i;
+
+ res = mdns_build_host_domain(&domain, mdns);
+ if (res == ERR_OK && mdns_domain_eq(&ans.info.domain, &domain)) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Probe response matches host domain!\n"));
+ mdns_probe_conflict(netif, 0);
+ break;
+ }
+
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ struct mdns_service* service = mdns->services[i];
+ if (!service) {
+ continue;
+ }
+ res = mdns_build_service_domain(&domain, service, 1);
+ if ((res == ERR_OK) && mdns_domain_eq(&ans.info.domain, &domain)) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Probe response matches service domain!\n"));
+ mdns_probe_conflict(netif, i + 1);
+ break;
+ }
+ }
+ if (i < MDNS_MAX_SERVICES)
+ break;
+ }
+ /* Perform conflict resolution (RFC6762 section 9):
+ * We assume a conflict if the hostname or service name matches the answers
+ * domain. Only if the rdata matches exactly we reset our assumption to no
+ * conflict. As stated in the RFC:
+ * What may be considered inconsistent is context sensitive, except that
+ * resource records with identical rdata are never considered inconsistent,
+ * even if they originate from different hosts.
+ */
+ else if ((mdns->state == MDNS_STATE_ANNOUNCING) ||
+ (mdns->state == MDNS_STATE_COMPLETE)) {
+ struct mdns_domain domain;
+ u8_t i;
+ u8_t conflict = 0;
+
+ /* Evaluate unique hostname records -> A and AAAA */
+ res = mdns_build_host_domain(&domain, mdns);
+ if (res == ERR_OK && mdns_domain_eq(&ans.info.domain, &domain)) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: response matches host domain, assuming conflict\n"));
+ /* This means a conflict has taken place, except when the packet contains
+ * exactly the same rdata. */
+ conflict = 1;
+ /* Evaluate rdata -> to see if it's a copy of our own data */
+ if (ans.info.type == DNS_RRTYPE_A) {
+#if LWIP_IPV4
+ if (ans.rd_length == sizeof(ip4_addr_t) &&
+ pbuf_memcmp(pkt->pbuf, ans.rd_offset, netif_ip4_addr(netif), ans.rd_length) == 0) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: response equals our own IPv4 address record -> no conflict\n"));
+ conflict = 0;
+ }
+#endif
+ }
+ else if (ans.info.type == DNS_RRTYPE_AAAA) {
+#if LWIP_IPV6
+ if (ans.rd_length == sizeof(ip6_addr_p_t)) {
+ for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) {
+ if (pbuf_memcmp(pkt->pbuf, ans.rd_offset, netif_ip6_addr(netif, i), ans.rd_length) == 0) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: response equals our own iPv6 address record, num = %d -> no conflict\n",i));
+ conflict = 0;
+ }
+ }
+ }
+#endif
+ }
+ }
+ /* Evaluate unique service name records -> SRV and TXT */
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ struct mdns_service* service = mdns->services[i];
+ if (!service) {
+ continue;
+ }
+ res = mdns_build_service_domain(&domain, service, 1);
+ if ((res == ERR_OK) && mdns_domain_eq(&ans.info.domain, &domain)) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: response matches service domain, assuming conflict\n"));
+ /* This means a conflict has taken place, except when the packet contains
+ * exactly the same rdata. */
+ conflict = 1;
+ /* Evaluate rdata -> to see if it's a copy of our own data */
+ if (ans.info.type == DNS_RRTYPE_SRV) {
+ /* Read and compare to with our SRV record */
+ u16_t field16, len, read_pos;
+ struct mdns_domain srv_ans, my_ans;
+ read_pos = ans.rd_offset;
+ do {
+ /* Check priority field */
+ len = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), read_pos);
+ if (len != sizeof(field16) || lwip_ntohs(field16) != SRV_PRIORITY) {
+ break;
+ }
+ read_pos += len;
+ /* Check weight field */
+ len = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), read_pos);
+ if (len != sizeof(field16) || lwip_ntohs(field16) != SRV_WEIGHT) {
+ break;
+ }
+ read_pos += len;
+ /* Check port field */
+ len = pbuf_copy_partial(pkt->pbuf, &field16, sizeof(field16), read_pos);
+ if (len != sizeof(field16) || lwip_ntohs(field16) != service->port) {
+ break;
+ }
+ read_pos += len;
+ /* Check host field */
+ len = mdns_readname(pkt->pbuf, read_pos, &srv_ans);
+ mdns_build_host_domain(&my_ans, mdns);
+ if (len == MDNS_READNAME_ERROR || !mdns_domain_eq(&srv_ans, &my_ans)) {
+ break;
+ }
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: response equals our own SRV record -> no conflict\n"));
+ conflict = 0;
+ } while (0);
+ } else if (ans.info.type == DNS_RRTYPE_TXT) {
+ mdns_prepare_txtdata(service);
+ if (service->txtdata.length == ans.rd_length &&
+ pbuf_memcmp(pkt->pbuf, ans.rd_offset, service->txtdata.name, ans.rd_length) == 0) {
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: response equals our own TXT record -> no conflict\n"));
+ conflict = 0;
+ }
+ }
+ }
+ }
+ if (conflict != 0) {
+ /* Reset host to probing to reconfirm uniqueness */
+ LWIP_DEBUGF(MDNS_DEBUG, ("mDNS: Conflict resolution -> reset to probing state\n"));
+ mdns_resp_restart(netif);
+ break;
+ }
+ }
+ }
+ /* Clear all xxx_left variables because we parsed all answers */
+ pkt->answers_left = 0;
+ pkt->authoritative_left = 0;
+ pkt->additional_left = 0;
+}
+
+/**
+ * Receive input function for MDNS packets.
+ * Handles both IPv4 and IPv6 UDP pcbs.
+ */
+static void
+mdns_recv(void *arg, struct udp_pcb *pcb, struct pbuf *p, const ip_addr_t *addr, u16_t port)
+{
+ struct dns_hdr hdr;
+ struct mdns_packet packet;
+ struct netif *recv_netif = ip_current_input_netif();
+ u16_t offset = 0;
+
+ LWIP_UNUSED_ARG(arg);
+ LWIP_UNUSED_ARG(pcb);
+
+ LWIP_DEBUGF(MDNS_DEBUG, ("MDNS: Received IPv%d MDNS packet, len %d\n", IP_IS_V6(addr) ? 6 : 4, p->tot_len));
+
+ if (NETIF_TO_HOST(recv_netif) == NULL) {
+ /* From netif not configured for MDNS */
+ goto dealloc;
+ }
+
+ if (pbuf_copy_partial(p, &hdr, SIZEOF_DNS_HDR, offset) < SIZEOF_DNS_HDR) {
+ /* Too small */
+ goto dealloc;
+ }
+ offset += SIZEOF_DNS_HDR;
+
+ if (DNS_HDR_GET_OPCODE(&hdr)) {
+ /* Ignore non-standard queries in multicast packets (RFC 6762, section 18.3) */
+ goto dealloc;
+ }
+
+ memset(&packet, 0, sizeof(packet));
+ SMEMCPY(&packet.source_addr, addr, sizeof(packet.source_addr));
+ packet.source_port = port;
+ packet.pbuf = p;
+ packet.parse_offset = offset;
+ packet.tx_id = lwip_ntohs(hdr.id);
+ packet.questions = packet.questions_left = lwip_ntohs(hdr.numquestions);
+ packet.answers = packet.answers_left = lwip_ntohs(hdr.numanswers);
+ packet.authoritative = packet.authoritative_left = lwip_ntohs(hdr.numauthrr);
+ packet.additional = packet.additional_left = lwip_ntohs(hdr.numextrarr);
+
+ /* Source address check (RFC6762 section 11) -> for responses.
+ * Source address check (RFC6762 section 5.5) -> for queries.
+ * When the dest addr == multicast addr we know the packet originated on that
+ * link. If not, we need to check the source address. We only accept queries
+ * that originated on the link. Others are discarded.
+ */
+#if LWIP_IPV6
+ if (IP_IS_V6(ip_current_dest_addr())) {
+ /* instead of having one 'v6group' per netif, just compare zoneless here */
+ if (!ip_addr_zoneless_eq(ip_current_dest_addr(), &v6group)) {
+ packet.recv_unicast = 1;
+
+ if (ip6_addr_ismulticast_global(ip_2_ip6(ip_current_src_addr()))
+ || ip6_addr_isglobal(ip_2_ip6(ip_current_src_addr()))) {
+ goto dealloc;
+ }
+ }
+ }
+#endif
+#if LWIP_IPV4
+ if (!IP_IS_V6(ip_current_dest_addr())) {
+ if (!ip_addr_eq(ip_current_dest_addr(), &v4group)) {
+ packet.recv_unicast = 1;
+
+ if (!ip4_addr_net_eq(ip_2_ip4(ip_current_src_addr()),
+ netif_ip4_addr(recv_netif),
+ netif_ip4_netmask(recv_netif))){
+ goto dealloc;
+ }
+ }
+ }
+#endif
+
+ if (hdr.flags1 & DNS_FLAG1_RESPONSE) {
+ mdns_handle_response(&packet, recv_netif);
+ } else {
+ if (packet.questions && hdr.flags1 & DNS_FLAG1_TRUNC) {
+ /* this is a new truncated question */
+ struct mdns_packet *pkt = (struct mdns_packet *)LWIP_MEMPOOL_ALLOC(MDNS_PKTS);
+ if (!pkt)
+ goto dealloc; /* don't reply truncated question if alloc error */
+ SMEMCPY(pkt, &packet, sizeof(packet));
+ /* insert this question in pending list */
+ pkt->next_tc_question = pending_tc_questions;
+ pending_tc_questions = pkt;
+ /* question with truncated flags, need to wait 400-500ms before replying */
+ sys_timeout(MDNS_RESPONSE_TC_DELAY_MS, mdns_handle_tc_question, pkt);
+ /* return without dealloc pbuf */
+ return;
+ }
+ else if (!packet.questions && packet.answers && pending_tc_questions) {
+ /* this packet is a known-answer packet for a truncated question previously received */
+ struct mdns_packet *q = pending_tc_questions;
+ while (q) {
+ if ((packet.source_port == q->source_port) &&
+ ip_addr_eq(&packet.source_addr, &q->source_addr))
+ break;
+ q = q->next_tc_question;
+ }
+ if (q) {
+ /* found question from the same source */
+ struct mdns_packet *pkt = (struct mdns_packet *)LWIP_MEMPOOL_ALLOC(MDNS_PKTS);
+ if (!pkt)
+ goto dealloc; /* don't reply truncated question if alloc error */
+ SMEMCPY(pkt, &packet, sizeof(packet));
+ /* insert this known-ansert in question */
+ pkt->next_answer = q->next_answer;
+ q->next_answer = pkt;
+ /* nothing more to do */
+ return;
+ }
+ }
+ /* if previous tests fail, handle this question normally */
+ mdns_handle_question(&packet, recv_netif);
+ }
+
+dealloc:
+ pbuf_free(p);
+}
+
+#if LWIP_NETIF_EXT_STATUS_CALLBACK && MDNS_RESP_USENETIF_EXTCALLBACK
+static void
+mdns_netif_ext_status_callback(struct netif *netif, netif_nsc_reason_t reason, const netif_ext_callback_args_t *args)
+{
+ LWIP_UNUSED_ARG(args);
+
+ /* MDNS enabled on netif? */
+ if (NETIF_TO_HOST(netif) == NULL) {
+ return;
+ }
+
+ if (reason & LWIP_NSC_STATUS_CHANGED) {
+ if (args->status_changed.state != 0) {
+ mdns_resp_restart(netif);
+ }
+ /* TODO: send goodbye message */
+ }
+ if (reason & LWIP_NSC_LINK_CHANGED) {
+ if (args->link_changed.state != 0) {
+ mdns_resp_restart(netif);
+ }
+ }
+ if (reason & (LWIP_NSC_IPV4_ADDRESS_CHANGED | LWIP_NSC_IPV4_GATEWAY_CHANGED |
+ LWIP_NSC_IPV4_NETMASK_CHANGED | LWIP_NSC_IPV4_SETTINGS_CHANGED |
+ LWIP_NSC_IPV6_SET | LWIP_NSC_IPV6_ADDR_STATE_CHANGED)) {
+ mdns_resp_restart(netif);
+ }
+}
+#endif /* LWIP_NETIF_EXT_STATUS_CALLBACK && MDNS_RESP_USENETIF_EXTCALLBACK */
+
+static void
+mdns_define_probe_rrs_to_send(struct netif *netif, struct mdns_outmsg *outmsg)
+{
+ struct mdns_host *mdns = NETIF_TO_HOST(netif);
+ int i;
+
+ memset(outmsg, 0, sizeof(struct mdns_outmsg));
+
+ /* Add unicast questions with rtype ANY for all our desired records */
+ outmsg->host_questions = QUESTION_PROBE_HOST_ANY;
+
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ struct mdns_service* service = mdns->services[i];
+ if (!service) {
+ continue;
+ }
+ outmsg->serv_questions[i] = QUESTION_PROBE_SERVICE_NAME_ANY;
+ }
+
+ /* Add answers to the questions above into the authority section for tiebreaking */
+#if LWIP_IPV4
+ if (!ip4_addr_isany_val(*netif_ip4_addr(netif))) {
+ outmsg->host_replies = REPLY_HOST_A;
+ }
+#endif
+#if LWIP_IPV6
+ for (i = 0; i < LWIP_IPV6_NUM_ADDRESSES; i++) {
+ if (ip6_addr_isvalid(netif_ip6_addr_state(netif, i))) {
+ outmsg->host_replies |= REPLY_HOST_AAAA;
+ }
+ }
+#endif
+
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ struct mdns_service *serv = mdns->services[i];
+ if (serv) {
+ outmsg->serv_replies[i] = REPLY_SERVICE_SRV;
+ }
+ }
+}
+
+static err_t
+mdns_send_probe(struct netif* netif, const ip_addr_t *destination)
+{
+ struct mdns_outmsg outmsg;
+
+ mdns_define_probe_rrs_to_send(netif, &outmsg);
+
+ outmsg.tx_id = 0;
+ outmsg.dest_port = LWIP_IANA_PORT_MDNS;
+ SMEMCPY(&outmsg.dest_addr, destination, sizeof(outmsg.dest_addr));
+ return mdns_send_outpacket(&outmsg, netif);
+}
+
+/**
+ * Timer callback for probing and announcing on the network.
+ */
+static void
+mdns_probe_and_announce(void* arg)
+{
+ struct netif *netif = (struct netif *)arg;
+ struct mdns_host* mdns = NETIF_TO_HOST(netif);
+ u32_t announce_delay;
+
+
+ switch (mdns->state) {
+ case MDNS_STATE_OFF:
+ case MDNS_STATE_PROBE_WAIT:
+ case MDNS_STATE_PROBING:
+#if LWIP_IPV4
+ /*if ipv4 wait with probing until address is set*/
+ if (!ip4_addr_isany_val(*netif_ip4_addr(netif)) &&
+ mdns_send_probe(netif, &v4group) == ERR_OK)
+#endif
+ {
+#if LWIP_IPV6
+ if (mdns_send_probe(netif, &v6group) == ERR_OK)
+#endif
+ {
+ mdns->state = MDNS_STATE_PROBING;
+ mdns->sent_num++;
+ }
+ }
+
+ if (mdns->sent_num >= MDNS_PROBE_COUNT) {
+ mdns->state = MDNS_STATE_ANNOUNCE_WAIT;
+ mdns->sent_num = 0;
+ }
+
+ if (mdns->sent_num && mdns->rate_limit_activated == 1) {
+ /* delay second probe if rate limiting activated */
+ sys_timeout(MDNS_PROBE_MAX_CONFLICTS_TIMEOUT, mdns_probe_and_announce, netif);
+ }
+ else {
+ sys_timeout(MDNS_PROBE_DELAY_MS, mdns_probe_and_announce, netif);
+ }
+ break;
+ case MDNS_STATE_ANNOUNCE_WAIT:
+ case MDNS_STATE_ANNOUNCING:
+ if (mdns->sent_num == 0) {
+ /* probing was successful, announce all records */
+ mdns->state = MDNS_STATE_ANNOUNCING;
+ /* Reset rate limit max probe conflict timeout flag */
+ mdns->rate_limit_activated = 0;
+ /* Let the client know probing was successful */
+ if (mdns_name_result_cb != NULL) {
+ mdns_name_result_cb(netif, MDNS_PROBING_SUCCESSFUL, 0);
+ }
+ }
+
+ mdns_resp_announce(netif);
+ mdns->sent_num++;
+
+ if (mdns->sent_num >= MDNS_ANNOUNCE_COUNT) {
+ /* Announcing and probing complete */
+ mdns->state = MDNS_STATE_COMPLETE;
+ mdns->sent_num = 0;
+ }
+ else {
+ announce_delay = MDNS_ANNOUNCE_DELAY_MS * (1 << (mdns->sent_num - 1));
+ sys_timeout(announce_delay, mdns_probe_and_announce, netif);
+ }
+ break;
+ case MDNS_STATE_COMPLETE:
+ default:
+ /* Do nothing */
+ break;
+ }
+}
+
+/**
+ * @ingroup mdns
+ * Activate MDNS responder for a network interface.
+ * @param netif The network interface to activate.
+ * @param hostname Name to use. Queries for &lt;hostname&gt;.local will be answered
+ * with the IP addresses of the netif. The hostname will be copied, the
+ * given pointer can be on the stack.
+ * @return ERR_OK if netif was added, an err_t otherwise
+ */
+err_t
+mdns_resp_add_netif(struct netif *netif, const char *hostname)
+{
+ err_t res;
+ struct mdns_host *mdns;
+
+ LWIP_ASSERT_CORE_LOCKED();
+ LWIP_ERROR("mdns_resp_add_netif: netif != NULL", (netif != NULL), return ERR_VAL);
+ LWIP_ERROR("mdns_resp_add_netif: Hostname too long", (strlen(hostname) <= MDNS_LABEL_MAXLEN), return ERR_VAL);
+
+ LWIP_ASSERT("mdns_resp_add_netif: Double add", NETIF_TO_HOST(netif) == NULL);
+ mdns = (struct mdns_host *) mem_calloc(1, sizeof(struct mdns_host));
+ LWIP_ERROR("mdns_resp_add_netif: Alloc failed", (mdns != NULL), return ERR_MEM);
+
+ netif_set_client_data(netif, mdns_netif_client_id, mdns);
+
+ MEMCPY(&mdns->name, hostname, LWIP_MIN(MDNS_LABEL_MAXLEN, strlen(hostname)));
+
+ /* Init delayed message structs with address and port */
+#if LWIP_IPV4
+ mdns->ipv4.delayed_msg_multicast.dest_port = LWIP_IANA_PORT_MDNS;
+ SMEMCPY(&mdns->ipv4.delayed_msg_multicast.dest_addr, &v4group,
+ sizeof(ip_addr_t));
+#endif
+
+#if LWIP_IPV6
+ mdns->ipv6.delayed_msg_multicast.dest_port = LWIP_IANA_PORT_MDNS;
+ SMEMCPY(&mdns->ipv6.delayed_msg_multicast.dest_addr, &v6group,
+ sizeof(ip_addr_t));
+#endif
+
+ /* Join multicast groups */
+#if LWIP_IPV4
+ res = igmp_joingroup_netif(netif, ip_2_ip4(&v4group));
+ if (res != ERR_OK) {
+ goto cleanup;
+ }
+#endif
+#if LWIP_IPV6
+ res = mld6_joingroup_netif(netif, ip_2_ip6(&v6group));
+ if (res != ERR_OK) {
+ goto cleanup;
+ }
+#endif
+
+ mdns_resp_restart(netif);
+
+ return ERR_OK;
+
+cleanup:
+ mem_free(mdns);
+ netif_set_client_data(netif, mdns_netif_client_id, NULL);
+ return res;
+}
+
+/**
+ * @ingroup mdns
+ * Stop responding to MDNS queries on this interface, leave multicast groups,
+ * and free the helper structure and any of its services.
+ * @param netif The network interface to remove.
+ * @return ERR_OK if netif was removed, an err_t otherwise
+ */
+err_t
+mdns_resp_remove_netif(struct netif *netif)
+{
+ int i;
+ struct mdns_host *mdns;
+
+ LWIP_ASSERT_CORE_LOCKED();
+ LWIP_ASSERT("mdns_resp_remove_netif: Null pointer", netif);
+ mdns = NETIF_TO_HOST(netif);
+ LWIP_ERROR("mdns_resp_remove_netif: Not an active netif", (mdns != NULL), return ERR_VAL);
+
+ sys_untimeout(mdns_probe_and_announce, netif);
+
+ for (i = 0; i < MDNS_MAX_SERVICES; i++) {
+ struct mdns_service *service = mdns->services[i];
+ if (service) {
+ mem_free(service);
+ }
+ }
+
+ /* Leave multicast groups */
+#if LWIP_IPV4
+ igmp_leavegroup_netif(netif, ip_2_ip4(&v4group));
+#endif
+#if LWIP_IPV6
+ mld6_leavegroup_netif(netif, ip_2_ip6(&v6group));
+#endif
+
+ mem_free(mdns);
+ netif_set_client_data(netif, mdns_netif_client_id, NULL);
+ return ERR_OK;
+}
+
+/**
+ * @ingroup mdns
+ * Update MDNS hostname for a network interface.
+ * @param netif The network interface to activate.
+ * @param hostname Name to use. Queries for &lt;hostname&gt;.local will be answered
+ * with the IP addresses of the netif. The hostname will be copied, the
+ * given pointer can be on the stack.
+ * @return ERR_OK if name could be set on netif, an err_t otherwise
+ */
+err_t
+mdns_resp_rename_netif(struct netif *netif, const char *hostname)
+{
+ struct mdns_host *mdns;
+ size_t len;
+
+ LWIP_ASSERT_CORE_LOCKED();
+ len = strlen(hostname);
+ LWIP_ERROR("mdns_resp_rename_netif: netif != NULL", (netif != NULL), return ERR_VAL);
+ LWIP_ERROR("mdns_resp_rename_netif: Hostname too long", (len <= MDNS_LABEL_MAXLEN), return ERR_VAL);
+ mdns = NETIF_TO_HOST(netif);
+ LWIP_ERROR("mdns_resp_rename_netif: Not an mdns netif", (mdns != NULL), return ERR_VAL);
+
+ MEMCPY(&mdns->name, hostname, LWIP_MIN(MDNS_LABEL_MAXLEN, len));
+ mdns->name[len] = '\0'; /* null termination in case new name is shorter than previous */
+
+ mdns_resp_restart_delay(netif, MDNS_PROBE_DELAY_MS);
+
+ return ERR_OK;
+}
+
+/**
+ * @ingroup mdns
+ * Checks if an MDNS responder is active for a given network interface.
+ * @param netif The network interface to test.
+ * @return nonzero if responder active, zero otherwise.
+ */
+int
+mdns_resp_netif_active(struct netif *netif)
+{
+ return NETIF_TO_HOST(netif) != NULL;
+}
+
+/**
+ * @ingroup mdns
+ * Add a service to the selected network interface.
+ * @param netif The network interface to publish this service on
+ * @param name The name of the service
+ * @param service The service type, like "_http"
+ * @param proto The service protocol, DNSSD_PROTO_TCP for TCP ("_tcp") and DNSSD_PROTO_UDP
+ * for others ("_udp")
+ * @param port The port the service listens to
+ * @param txt_fn Callback to get TXT data. Will be called each time a TXT reply is created to
+ * allow dynamic replies.
+ * @param txt_data Userdata pointer for txt_fn
+ * @return service_id if the service was added to the netif, an err_t otherwise
+ */
+s8_t
+mdns_resp_add_service(struct netif *netif, const char *name, const char *service, enum mdns_sd_proto proto, u16_t port, service_get_txt_fn_t txt_fn, void *txt_data)
+{
+ u8_t slot;
+ struct mdns_service *srv;
+ struct mdns_host *mdns;
+
+ LWIP_ASSERT_CORE_LOCKED();
+ LWIP_ASSERT("mdns_resp_add_service: netif != NULL", netif);
+ mdns = NETIF_TO_HOST(netif);
+ LWIP_ERROR("mdns_resp_add_service: Not an mdns netif", (mdns != NULL), return ERR_VAL);
+
+ LWIP_ERROR("mdns_resp_add_service: Name too long", (strlen(name) <= MDNS_LABEL_MAXLEN), return ERR_VAL);
+ LWIP_ERROR("mdns_resp_add_service: Service too long", (strlen(service) <= MDNS_LABEL_MAXLEN), return ERR_VAL);
+ LWIP_ERROR("mdns_resp_add_service: Bad proto (need TCP or UDP)", (proto == DNSSD_PROTO_TCP || proto == DNSSD_PROTO_UDP), return ERR_VAL);
+
+ for (slot = 0; slot < MDNS_MAX_SERVICES; slot++) {
+ if (mdns->services[slot] == NULL) {
+ break;
+ }
+ }
+ LWIP_ERROR("mdns_resp_add_service: Service list full (increase MDNS_MAX_SERVICES)", (slot < MDNS_MAX_SERVICES), return ERR_MEM);
+
+ srv = (struct mdns_service *)mem_calloc(1, sizeof(struct mdns_service));
+ LWIP_ERROR("mdns_resp_add_service: Alloc failed", (srv != NULL), return ERR_MEM);
+
+ MEMCPY(&srv->name, name, LWIP_MIN(MDNS_LABEL_MAXLEN, strlen(name)));
+ MEMCPY(&srv->service, service, LWIP_MIN(MDNS_LABEL_MAXLEN, strlen(service)));
+ srv->txt_fn = txt_fn;
+ srv->txt_userdata = txt_data;
+ srv->proto = (u16_t)proto;
+ srv->port = port;
+
+ mdns->services[slot] = srv;
+
+ mdns_resp_restart(netif);
+
+ return slot;
+}
+
+/**
+ * @ingroup mdns
+ * Delete a service on the selected network interface.
+ * @param netif The network interface on which service should be removed
+ * @param slot The service slot number returned by mdns_resp_add_service
+ * @return ERR_OK if the service was removed from the netif, an err_t otherwise
+ */
+err_t
+mdns_resp_del_service(struct netif *netif, u8_t slot)
+{
+ struct mdns_host *mdns;
+ struct mdns_service *srv;
+ LWIP_ASSERT("mdns_resp_del_service: netif != NULL", netif);
+ mdns = NETIF_TO_HOST(netif);
+ LWIP_ERROR("mdns_resp_del_service: Not an mdns netif", (mdns != NULL), return ERR_VAL);
+ LWIP_ERROR("mdns_resp_del_service: Invalid Service ID", slot < MDNS_MAX_SERVICES, return ERR_VAL);
+ LWIP_ERROR("mdns_resp_del_service: Invalid Service ID", (mdns->services[slot] != NULL), return ERR_VAL);
+
+ srv = mdns->services[slot];
+ mdns->services[slot] = NULL;
+ mem_free(srv);
+ return ERR_OK;
+}
+
+/**
+ * @ingroup mdns
+ * Update name for an MDNS service.
+ * @param netif The network interface to activate.
+ * @param slot The service slot number returned by mdns_resp_add_service
+ * @param name The new name for the service
+ * @return ERR_OK if name could be set on service, an err_t otherwise
+ */
+err_t
+mdns_resp_rename_service(struct netif *netif, u8_t slot, const char *name)
+{
+ struct mdns_service *srv;
+ struct mdns_host *mdns;
+ size_t len;
+
+ LWIP_ASSERT_CORE_LOCKED();
+ len = strlen(name);
+ LWIP_ASSERT("mdns_resp_rename_service: netif != NULL", netif);
+ mdns = NETIF_TO_HOST(netif);
+ LWIP_ERROR("mdns_resp_rename_service: Not an mdns netif", (mdns != NULL), return ERR_VAL);
+ LWIP_ERROR("mdns_resp_rename_service: Name too long", (len <= MDNS_LABEL_MAXLEN), return ERR_VAL);
+ LWIP_ERROR("mdns_resp_rename_service: Invalid Service ID", slot < MDNS_MAX_SERVICES, return ERR_VAL);
+ LWIP_ERROR("mdns_resp_rename_service: Invalid Service ID", (mdns->services[slot] != NULL), return ERR_VAL);
+
+ srv = mdns->services[slot];
+
+ MEMCPY(&srv->name, name, LWIP_MIN(MDNS_LABEL_MAXLEN, len));
+ srv->name[len] = '\0'; /* null termination in case new name is shorter than previous */
+
+ mdns_resp_restart_delay(netif, MDNS_PROBE_DELAY_MS);
+
+ return ERR_OK;
+}
+
+/**
+ * @ingroup mdns
+ * Call this function from inside the service_get_txt_fn_t callback to add text data.
+ * Buffer for TXT data is 256 bytes, and each field is prefixed with a length byte.
+ * @param service The service provided to the get_txt callback
+ * @param txt String to add to the TXT field.
+ * @param txt_len Length of string
+ * @return ERR_OK if the string was added to the reply, an err_t otherwise
+ */
+err_t
+mdns_resp_add_service_txtitem(struct mdns_service *service, const char *txt, u8_t txt_len)
+{
+ LWIP_ASSERT_CORE_LOCKED();
+ LWIP_ASSERT("mdns_resp_add_service_txtitem: service != NULL", service);
+
+ /* Use a mdns_domain struct to store txt chunks since it is the same encoding */
+ return mdns_domain_add_label(&service->txtdata, txt, txt_len);
+}
+
+#if LWIP_MDNS_SEARCH
+/**
+ * @ingroup mdns
+ * Stop a search request.
+ * @param request_id The search request to stop
+ */
+void
+mdns_search_stop(u8_t request_id)
+{
+ struct mdns_request *req;
+ LWIP_ASSERT("mdns_search_stop: bad request_id", request_id < MDNS_MAX_REQUESTS);
+ req = &mdns_requests[request_id];
+ if (req && req->result_fn) {
+ req->result_fn = NULL;
+ }
+}
+
+/**
+ * @ingroup mdns
+ * Search a specific service on the network.
+ * @param name The name of the service
+ * @param service The service type, like "_http"
+ * @param proto The service protocol, DNSSD_PROTO_TCP for TCP ("_tcp") and DNSSD_PROTO_UDP
+ * for others ("_udp")
+ * @param netif The network interface where to send search request
+ * @param result_fn Callback to send answer received. Will be called for each answer of a
+ * response frame matching request sent.
+ * @param arg Userdata pointer for result_fn
+ * @param request_id Returned request identifier to allow stop it.
+ * @return ERR_OK if the search request was created and sent, an err_t otherwise
+ */
+err_t
+mdns_search_service(const char *name, const char *service, enum mdns_sd_proto proto,
+ struct netif *netif, search_result_fn_t result_fn, void *arg,
+ u8_t *request_id)
+{
+ u8_t slot;
+ struct mdns_request *req;
+ if (name) {
+ LWIP_ERROR("mdns_search_service: Name too long", (strlen(name) <= MDNS_LABEL_MAXLEN), return ERR_VAL);
+ }
+ LWIP_ERROR("mdns_search_service: Service too long", (strlen(service) < MDNS_DOMAIN_MAXLEN), return ERR_VAL);
+ LWIP_ERROR("mdns_search_service: Bad reqid pointer", request_id, return ERR_VAL);
+ LWIP_ERROR("mdns_search_service: Bad proto (need TCP or UDP)", (proto == DNSSD_PROTO_TCP || proto == DNSSD_PROTO_UDP), return ERR_VAL);
+ for (slot = 0; slot < MDNS_MAX_REQUESTS; slot++) {
+ if (mdns_requests[slot].result_fn == NULL) {
+ break;
+ }
+ }
+ if (slot >= MDNS_MAX_REQUESTS) {
+ /* Don't assert if no more space in mdns_request table. Just return an error. */
+ return ERR_MEM;
+ }
+
+ req = &mdns_requests[slot];
+ memset(req, 0, sizeof(struct mdns_request));
+ req->result_fn = result_fn;
+ req->arg = arg;
+ req->proto = (u16_t)proto;
+ req->qtype = DNS_RRTYPE_PTR;
+ if (proto == DNSSD_PROTO_UDP && strcmp(service, "_services._dns-sd") == 0) {
+ req->only_ptr = 1; /* don't check other answers */
+ }
+ mdns_domain_add_string(&req->service, service);
+ if (name) {
+ MEMCPY(&req->name, name, LWIP_MIN(MDNS_LABEL_MAXLEN, strlen(name)));
+ }
+ /* save request id (slot) in pointer provided by caller */
+ *request_id = slot;
+ /* now prepare a MDNS request and send it (on specified interface) */
+#if LWIP_IPV6
+ mdns_send_request(req, netif, &v6group);
+#endif
+#if LWIP_IPV4
+ mdns_send_request(req, netif, &v4group);
+#endif
+ return ERR_OK;
+}
+#endif
+
+/**
+ * @ingroup mdns
+ * Send unsolicited answer containing all our known data
+ * @param netif The network interface to send on
+ */
+void
+mdns_resp_announce(struct netif *netif)
+{
+ struct mdns_host* mdns;
+ LWIP_ASSERT_CORE_LOCKED();
+ LWIP_ERROR("mdns_resp_announce: netif != NULL", (netif != NULL), return);
+
+ mdns = NETIF_TO_HOST(netif);
+ if (mdns == NULL) {
+ return;
+ }
+
+ /* Do not announce if the mdns responder is off, waiting to probe, probing or
+ * waiting to announce. */
+ if (mdns->state >= MDNS_STATE_ANNOUNCING) {
+ /* Announce on IPv6 and IPv4 */
+#if LWIP_IPV6
+ mdns_announce(netif, &v6group);
+ mdns_start_multicast_timeouts_ipv6(netif);
+#endif
+#if LWIP_IPV4
+ if (!ip4_addr_isany_val(*netif_ip4_addr(netif))) {
+ mdns_announce(netif, &v4group);
+ mdns_start_multicast_timeouts_ipv4(netif);
+ }
+#endif
+ } /* else: ip address changed while probing was ongoing? @todo reset counter to restart? */
+}
+
+/** Register a callback function that is called if probing is completed successfully
+ * or with a conflict. */
+void
+mdns_resp_register_name_result_cb(mdns_name_result_cb_t cb)
+{
+ mdns_name_result_cb = cb;
+}
+
+/**
+ * @ingroup mdns
+ * Restart mdns responder after a specified delay. Call this when cable is connected
+ * after being disconnected or administrative interface is set up after being down
+ * @param netif The network interface to send on
+ * @param delay The delay to use before sending probe
+ */
+void
+mdns_resp_restart_delay(struct netif *netif, uint32_t delay)
+{
+ struct mdns_host* mdns;
+ LWIP_ASSERT_CORE_LOCKED();
+ LWIP_ERROR("mdns_resp_restart: netif != NULL", (netif != NULL), return);
+
+ mdns = NETIF_TO_HOST(netif);
+ if (mdns == NULL) {
+ return;
+ }
+ /* Make sure timer is not running */
+ sys_untimeout(mdns_probe_and_announce, netif);
+
+ mdns->sent_num = 0;
+ mdns->state = MDNS_STATE_PROBE_WAIT;
+
+ /* RFC6762 section 8.1: If fifteen conflicts occur within any ten-second period,
+ * then the host MUST wait at least five seconds before each successive
+ * additional probe attempt.
+ */
+ if (mdns->rate_limit_activated == 1) {
+ sys_timeout(MDNS_PROBE_MAX_CONFLICTS_TIMEOUT, mdns_probe_and_announce, netif);
+ }
+ else {
+ /* Adjust probe delay according sent probe count. */
+ sys_timeout(delay, mdns_probe_and_announce, netif);
+ }
+}
+
+/**
+ * @ingroup mdns
+ * Restart mdns responder. Call this when cable is connected after being disconnected or
+ * administrative interface is set up after being down
+ * @param netif The network interface to send on
+ */
+void
+mdns_resp_restart(struct netif *netif)
+{
+ mdns_resp_restart_delay(netif, MDNS_INITIAL_PROBE_DELAY_MS);
+}
+
+/**
+ * @ingroup mdns
+ * Initiate MDNS responder. Will open UDP sockets on port 5353
+ */
+void
+mdns_resp_init(void)
+{
+ err_t res;
+
+ /* LWIP_ASSERT_CORE_LOCKED(); is checked by udp_new() */
+#if LWIP_MDNS_SEARCH
+ memset(mdns_requests, 0, sizeof(mdns_requests));
+#endif
+ LWIP_MEMPOOL_INIT(MDNS_PKTS);
+ mdns_pcb = udp_new_ip_type(IPADDR_TYPE_ANY);
+ LWIP_ASSERT("Failed to allocate pcb", mdns_pcb != NULL);
+#if LWIP_MULTICAST_TX_OPTIONS
+ udp_set_multicast_ttl(mdns_pcb, MDNS_IP_TTL);
+#else
+ mdns_pcb->ttl = MDNS_IP_TTL;
+#endif
+ res = udp_bind(mdns_pcb, IP_ANY_TYPE, LWIP_IANA_PORT_MDNS);
+ LWIP_UNUSED_ARG(res); /* in case of LWIP_NOASSERT */
+ LWIP_ASSERT("Failed to bind pcb", res == ERR_OK);
+ udp_recv(mdns_pcb, mdns_recv, NULL);
+
+ mdns_netif_client_id = netif_alloc_client_data_id();
+
+#if MDNS_RESP_USENETIF_EXTCALLBACK
+ /* register for netif events when started on first netif */
+ netif_add_ext_callback(&netif_callback, mdns_netif_ext_status_callback);
+#endif
+}
+
+/**
+ * @ingroup mdns
+ * Return TXT userdata of a specific service on a network interface.
+ * @param netif Network interface.
+ * @param slot Service index.
+ */
+void *mdns_get_service_txt_userdata(struct netif *netif, s8_t slot)
+{
+ struct mdns_host *mdns = NETIF_TO_HOST(netif);
+ struct mdns_service *s;
+ LWIP_ASSERT("mdns_get_service_txt_userdata: index out of range", slot < MDNS_MAX_SERVICES);
+ s = mdns->services[slot];
+ return s ? s->txt_userdata : NULL;
+}
+
+#endif /* LWIP_MDNS_RESPONDER */