}
void
-dns_send_question(struct interface *iface, const char *question, int type, int multicast)
+dns_send_question(struct interface *iface, struct sockaddr *to,
+ const char *question, int type, int multicast)
{
static struct dns_header h;
static struct dns_question q;
iov[1].iov_len = len;
DBG(1, "Q <- %s %s\n", dns_type_string(type), question);
- if (interface_send_packet(iface, NULL, iov, ARRAY_SIZE(iov)) < 0)
- perror("failed to send question :");
+ if (interface_send_packet(iface, to, iov, ARRAY_SIZE(iov)) < 0)
+ perror("failed to send question");
}
}
if (interface_send_packet(iface, to, iov, n_iov) < 0)
- fprintf(stderr, "failed to send question\n");
+ perror("failed to send answer");
}
void
return name_buffer;
}
-static int
-parse_answer(struct interface *iface, uint8_t *buffer, int len, uint8_t **b, int *rlen, int cache)
+static int parse_answer(struct interface *iface, struct sockaddr *from,
+ uint8_t *buffer, int len, uint8_t **b, int *rlen,
+ int cache)
{
char *name = dns_consume_name(buffer, len, b, rlen);
struct dns_answer *a;
*b += a->rdlength;
if (cache)
- cache_answer(iface, buffer, len, name, a, rdata, a->class & CLASS_FLUSH);
+ cache_answer(iface, from, buffer, len, name, a, rdata, a->class & CLASS_FLUSH);
return 0;
}
static void
parse_question(struct interface *iface, struct sockaddr *from, char *name, struct dns_question *q)
{
- struct sockaddr *to;
+ struct sockaddr *to = NULL;
char *host;
/* TODO: Multicast if more than one quarter of TTL has passed */
- if ((q->class & CLASS_UNICAST) && iface->multicast) {
- iface = iface->peer;
+ if (q->class & CLASS_UNICAST) {
to = from;
- } else {
- to = NULL;
+ if (iface->multicast)
+ iface = iface->peer;
}
DBG(1, "Q -> %s %s\n", dns_type_string(q->type), name);
case TYPE_ANY:
if (!strcmp(name, mdns_hostname_local)) {
dns_reply_a(iface, to, announce_ttl);
- service_reply(iface, to, NULL, announce_ttl);
+ service_reply(iface, to, NULL, NULL, announce_ttl);
}
break;
case TYPE_PTR:
- if (!strcmp(name, sdudp)) {
+ if (!strcmp(name, C_DNS_SD)) {
dns_reply_a(iface, to, announce_ttl);
service_announce_services(iface, to, announce_ttl);
} else {
- /* First dot separates instance name from the rest */
- char *dot = strchr(name, '.');
- /* Length of queried instance */
- size_t len = dot ? dot - name : 0;
-
- /* Make sure it's query for the instance name we use */
- if (len && len == strlen(mdns_hostname) &&
- !strncmp(name, mdns_hostname, len))
- service_reply(iface, to, dot + 1, announce_ttl);
+ if (name[0] == '_') {
+ service_reply(iface, to, NULL, name, announce_ttl);
+ } else {
+ /* First dot separates instance name from the rest */
+ char *dot = strchr(name, '.');
+
+ if (dot) {
+ *dot = '\0';
+ service_reply(iface, to, name, dot + 1, announce_ttl);
+ *dot = '.';
+ }
+ }
}
break;
host = strstr(name, ".local");
if (host)
*host = '\0';
- if (!strcmp(mdns_hostname, name))
+ if (!strcmp(umdns_host_label, name))
dns_reply_a(iface, to, announce_ttl);
break;
};
}
void
-dns_handle_packet(struct interface *iface, struct sockaddr *s, uint16_t port, uint8_t *buffer, int len)
+dns_handle_packet(struct interface *iface, struct sockaddr *from, uint16_t port, uint8_t *buffer, int len)
{
struct dns_header *h;
uint8_t *b = buffer;
return;
}
- if (h->questions && !iface->multicast && port != 5353)
+ if (h->questions && !iface->multicast && port != MCAST_PORT)
/* silently drop unicast questions that dont originate from port 5353 */
return;
}
if (!(h->flags & FLAG_RESPONSE))
- parse_question(iface, s, name, q);
+ parse_question(iface, from, name, q);
}
if (!(h->flags & FLAG_RESPONSE))
return;
while (h->answers-- > 0)
- if (parse_answer(iface, buffer, len, &b, &rlen, 1))
+ if (parse_answer(iface, from, buffer, len, &b, &rlen, 1))
return;
while (h->authority-- > 0)
- if (parse_answer(iface, buffer, len, &b, &rlen, 1))
+ if (parse_answer(iface, from, buffer, len, &b, &rlen, 1))
return;
while (h->additional-- > 0)
- if (parse_answer(iface, buffer, len, &b, &rlen, 1))
+ if (parse_answer(iface, from, buffer, len, &b, &rlen, 1))
return;
}