| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866 | /* * tinysvcmdns - a tiny MDNS implementation for publishing services * Copyright (C) 2011 Darell Tan * All rights reserved. *  * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products *    derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */#ifdef _WIN32#include <winsock2.h>#include <ws2tcpip.h>#define LOG_ERR		3#else#include <sys/select.h>#include <sys/socket.h>#include <sys/ioctl.h>#include <netinet/in.h>#include <arpa/inet.h>#include <net/if.h>#include <syslog.h>#endif#include <sys/types.h>#include <sys/stat.h>#include <fcntl.h>#include <signal.h>#include <string.h>#include <stdio.h>#include <stdlib.h>#include <stdarg.h>#ifndef _WIN32#include <unistd.h>#endif#include <assert.h>#if __has_include(<pthread.h>)#include <pthread.h>#define mutex_lock(m) pthread_mutex_lock(&m);#define mutex_unlock(m) pthread_mutex_unlock(&m);#elif _WIN32#define USE_WIN32_THREAD#define mutex_lock(m) WaitForSingleObject(m, INFINITE);#define mutex_unlock(m) ReleaseMutex(m);#else#error missing pthread#endif#include "mdns.h"#include "mdnssvc.h"#if _MSC_VER#define ssize_t SSIZE_T#endif#define MDNS_ADDR "224.0.0.251"#define MDNS_PORT 5353#define PACKET_SIZE 65536#define SERVICES_DNS_SD_NLABEL \		((uint8_t *) "\x09_services\x07_dns-sd\x04_udp\x05local")#define log_message(l,f,...) mdnsd_log(true, f, ##__VA_ARGS__)struct mdnsd {#ifdef USE_WIN32_THREAD	HANDLE data_lock;#else	pthread_mutex_t data_lock;#endif	int sockfd;	int notify_pipe[2];	int stop_flag;	struct rr_group *group;	struct rr_list *announce;	struct rr_list *services;	struct rr_list *leave;	uint8_t *hostname;};struct mdns_service {	struct rr_list *entries;};static bool log_verbose;/////////////////////////////////void mdnsd_log(bool force, char* fmt, ...) {	if (force || log_verbose) {		va_list ap;		va_start(ap, fmt);			int size = vsnprintf(NULL, 0, fmt, ap);		if (size > 0) {			char* buf = malloc(size + 1);			vsprintf(buf, fmt, ap);			fprintf(stderr, "%s", buf);			free(buf);		}		va_end(ap);	}}static int create_recv_sock(uint32_t host) {	int sd = socket(AF_INET, SOCK_DGRAM, 0);	int r = -1;	int on = 1;	char onChar = 1;	struct sockaddr_in serveraddr;	struct ip_mreq mreq;	unsigned char ttl = 255;	if (sd < 0) {		log_message(LOG_ERR, "recv socket(): %m\n");		return sd;	}	if ((r = setsockopt(sd, SOL_SOCKET, SO_REUSEADDR, (char *) &on, sizeof(on))) < 0) {		log_message(LOG_ERR, "recv setsockopt(SO_REUSEADDR): %m\n");		return r;	}#if !defined(_WIN32)  on = sizeof(on);  socklen_t len;  if (!getsockopt(sd, SOL_SOCKET, SO_REUSEPORT,(char*) &on, &len)) {    on = 1;	if ((r = setsockopt(sd, SOL_SOCKET, SO_REUSEPORT,(char*) &on, sizeof(on))) < 0) {		log_message(LOG_ERR, "recv setsockopt(SO_REUSEPORT): %m\n", r);	}  }#endif	/* bind to an address */	memset(&serveraddr, 0, sizeof(serveraddr));	serveraddr.sin_family = AF_INET;	serveraddr.sin_port = htons(MDNS_PORT);	serveraddr.sin_addr.s_addr = htonl(INADDR_ANY);	/* receive multicast */	if ((r = bind(sd, (struct sockaddr *)&serveraddr, sizeof(serveraddr))) < 0) {		log_message(LOG_ERR, "recv bind(): %m\n");		return r;	}	memset(&mreq, 0, sizeof(struct ip_mreq));	mreq.imr_interface.s_addr = host;	if ((r = setsockopt(sd, IPPROTO_IP, IP_MULTICAST_IF, (char*) &mreq.imr_interface.s_addr, sizeof(mreq.imr_interface.s_addr))) < 0)  {		log_message(LOG_ERR, "recv setsockopt(IP_PROTO_IP): %m\n");		return r;	}	if ((r = setsockopt(sd, IPPROTO_IP, IP_MULTICAST_TTL, (void*) &ttl, sizeof(ttl))) < 0) {		log_message(LOG_ERR, "recv setsockopt(IP_MULTICAST_IP): %m\n");		return r;	}	// add membership to receiving socket	mreq.imr_multiaddr.s_addr = inet_addr(MDNS_ADDR);	if ((r = setsockopt(sd, IPPROTO_IP, IP_ADD_MEMBERSHIP, (char *) &mreq, sizeof(mreq))) < 0) {		log_message(LOG_ERR, "recv setsockopt(IP_ADD_MEMBERSHIP): %m\n");		return r;	}	// enable loopback in case someone else needs the data	if ((r = setsockopt(sd, IPPROTO_IP, IP_MULTICAST_LOOP, (char *) &onChar, sizeof(onChar))) < 0) {		log_message(LOG_ERR, "recv setsockopt(IP_MULTICAST_LOOP): %m\n");		return r;	}#ifdef IP_PKTINFO	on = 1;	if ((r = setsockopt(sd, IPPROTO_IP, IP_PKTINFO, (char *) &on, sizeof(on))) < 0) {		log_message(LOG_ERR, "recv setsockopt(IP_PKTINFO): %m\n");		return r;	}#endif	return sd;}static ssize_t send_packet(int fd, const void *data, size_t len) {	static struct sockaddr_in toaddr;	if (toaddr.sin_family != AF_INET) {		memset(&toaddr, 0, sizeof(struct sockaddr_in));		toaddr.sin_family = AF_INET;		toaddr.sin_port = htons(MDNS_PORT);		toaddr.sin_addr.s_addr = inet_addr(MDNS_ADDR);	}	return sendto(fd, data, len, 0, (struct sockaddr *) &toaddr, sizeof(struct sockaddr_in));}// populate the specified list which matches the RR name and type// type can be RR_ANY, which populates all entries EXCEPT RR_NSECstatic int populate_answers(struct mdnsd *svr, struct rr_list **rr_head, uint8_t *name, enum rr_type type) {	int num_ans = 0;	struct rr_group *ans_grp;	struct rr_list *n;	// check if we have the records	mutex_lock(svr->data_lock);	ans_grp = rr_group_find(svr->group, name);	if (ans_grp == NULL) {		mutex_unlock(svr->data_lock);		return num_ans;	}	// decide which records should go into answers    n = ans_grp->rr;	for (; n; n = n->next) {		// exclude NSEC for RR_ANY		if (type == RR_ANY && n->e->type == RR_NSEC)			continue;		if ((type == n->e->type || type == RR_ANY) && cmp_nlabel(name, n->e->name) == 0) {			num_ans += rr_list_append(rr_head, n->e);		}	}	mutex_unlock(svr->data_lock);	return num_ans;}// given a list of RRs, look up related records and add themstatic void add_related_rr(struct mdnsd *svr, struct rr_list *list, struct mdns_pkt *reply) {	for (; list; list = list->next) {		struct rr_entry *ans = list->e;		switch (ans->type) {			case RR_PTR:				// target host A, AAAA records				reply->num_add_rr += populate_answers(svr, &reply->rr_add,										MDNS_RR_GET_PTR_NAME(ans), RR_ANY);				break;			case RR_SRV:				// target host A, AAAA records				reply->num_add_rr += populate_answers(svr, &reply->rr_add, 										ans->data.SRV.target, RR_ANY);				// perhaps TXT records of the same name?				// if we use RR_ANY, we risk pulling in the same RR_SRV				reply->num_add_rr += populate_answers(svr, &reply->rr_add, 										ans->name, RR_TXT);				break;			case RR_A:			case RR_AAAA:				reply->num_add_rr += populate_answers(svr, &reply->rr_add, 										ans->name, RR_NSEC);				break;			default:				// nothing to add				break;		}	}}// creates an announce packet given the type name PTR static void announce_srv(struct mdnsd *svr, struct mdns_pkt *reply, uint8_t *name) {	mdns_init_reply(reply, 0);	reply->num_ans_rr += populate_answers(svr, &reply->rr_ans, name, RR_PTR);		// remember to add the services dns-sd PTR too	reply->num_ans_rr += populate_answers(svr, &reply->rr_ans, 								SERVICES_DNS_SD_NLABEL, RR_PTR);	// see if we can match additional records for answers	add_related_rr(svr, reply->rr_ans, reply);	// additional records for additional records	add_related_rr(svr, reply->rr_add, reply);}// processes the incoming MDNS packet// returns >0 if processed, 0 otherwisestatic int process_mdns_pkt(struct mdnsd *svr, struct mdns_pkt *pkt, struct mdns_pkt *reply) {	int i;	struct rr_list *qnl;	struct rr_list *ans, *prev_ans;	assert(pkt != NULL);	// is it standard query?	if ((pkt->flags & MDNS_FLAG_RESP) == 0 &&			MDNS_FLAG_GET_OPCODE(pkt->flags) == 0) {		mdns_init_reply(reply, pkt->id);		DEBUG_PRINTF("flags = %04x, qn = %d, ans = %d, add = %d\n",						pkt->flags,						pkt->num_qn,						pkt->num_ans_rr,						pkt->num_add_rr);		// loop through questions		qnl = pkt->rr_qn;		for (i = 0; i < pkt->num_qn; i++, qnl = qnl->next) {			struct rr_entry *qn = qnl->e;			int num_ans_added = 0;			char *namestr = nlabel_to_str(qn->name);			DEBUG_PRINTF("qn #%d: type %s (%02x) %s - ", i, rr_get_type_name(qn->type), qn->type, namestr);			free(namestr);			// mark that a unicast response is desired			reply->unicast |= qn->unicast_query;			num_ans_added = populate_answers(svr, &reply->rr_ans, qn->name, qn->type);			reply->num_ans_rr += num_ans_added;			DEBUG_PRINTF("added %d answers\n", num_ans_added);		}		// remove our replies if they were already in their answers		ans = NULL; prev_ans = NULL;		for (ans = reply->rr_ans; ans; ) {			struct rr_list *next_ans = ans->next;			struct rr_entry *known_ans = rr_entry_match(pkt->rr_ans, ans->e);			// discard answers that have at least half of the actual TTL			if (known_ans != NULL && known_ans->ttl >= ans->e->ttl / 2) {				char *namestr = nlabel_to_str(ans->e->name);				DEBUG_PRINTF("removing answer for %s\n", namestr);				free(namestr);				// check if list item is head				if (prev_ans == NULL)					reply->rr_ans = ans->next;				else					prev_ans->next = ans->next;				free(ans);				ans = prev_ans;				// adjust answer count				reply->num_ans_rr--;			}			prev_ans = ans;			ans = next_ans;		}		// see if we can match additional records for answers		add_related_rr(svr, reply->rr_ans, reply);		// additional records for additional records		add_related_rr(svr, reply->rr_add, reply);		DEBUG_PRINTF("\n");		return reply->num_ans_rr;	}	return 0;}int create_pipe(int handles[2]) {#ifdef _WIN32	SOCKET sock = socket(AF_INET, SOCK_STREAM, 0);	struct sockaddr_in serv_addr;	int len;	if (sock == INVALID_SOCKET) {		return -1;	}	memset(&serv_addr, 0, sizeof(serv_addr));	serv_addr.sin_family = AF_INET;	serv_addr.sin_port = htons(0);	serv_addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);	if (bind(sock, (struct sockaddr*)&serv_addr, sizeof(serv_addr)) == SOCKET_ERROR) {		closesocket(sock);		return -1;	}	if (listen(sock, 1) == SOCKET_ERROR) {		closesocket(sock);		return -1;	}	len = sizeof(serv_addr);	if (getsockname(sock, (SOCKADDR*)&serv_addr, &len) == SOCKET_ERROR) {		closesocket(sock);		return -1;	}	if ((handles[1] = socket(PF_INET, SOCK_STREAM, 0)) == INVALID_SOCKET) {		closesocket(sock);		return -1;	}	if (connect(handles[1], (struct sockaddr*)&serv_addr, len) == SOCKET_ERROR) {		closesocket(sock);		return -1;	}	if ((handles[0] = accept(sock, (struct sockaddr*)&serv_addr, &len)) == INVALID_SOCKET) {		closesocket((SOCKET)handles[1]);		handles[1] = INVALID_SOCKET;		closesocket(sock);		return -1;	}	closesocket(sock);	return 0;#else	return pipe(handles);#endif}int read_pipe(int s, char* buf, int len) {#ifdef _WIN32	int ret = recv(s, buf, len, 0);	if (ret < 0 && WSAGetLastError() == WSAECONNRESET) {		ret = 0;	}	return ret;#else	return read(s, buf, len);#endif}int write_pipe(int s, char* buf, int len) {#ifdef _WIN32	return send(s, buf, len, 0);#else	return write(s, buf, len);#endif}int close_pipe(int s) {#ifdef _WIN32	return closesocket(s);#else	return close(s);#endif}// main loop to receive, process and send out MDNS replies// also handles MDNS service announcesstatic void main_loop(struct mdnsd *svr) {	fd_set sockfd_set;	int max_fd = svr->sockfd;	char notify_buf[2];	// buffer for reading of notify_pipe	struct mdns_pkt *mdns_reply;	struct mdns_pkt *mdns;	struct rr_list *svc_le;	void *pkt_buffer = malloc(PACKET_SIZE);	if (svr->notify_pipe[0] > max_fd)		max_fd = svr->notify_pipe[0];	mdns_reply = malloc(sizeof(struct mdns_pkt));	memset(mdns_reply, 0, sizeof(struct mdns_pkt));	while (! svr->stop_flag) {		FD_ZERO(&sockfd_set);		FD_SET(svr->sockfd, &sockfd_set);		FD_SET(svr->notify_pipe[0], &sockfd_set);		select(max_fd + 1, &sockfd_set, NULL, NULL, NULL);		if (FD_ISSET(svr->notify_pipe[0], &sockfd_set)) {			// flush the notify_pipe			read_pipe(svr->notify_pipe[0], (char*)¬ify_buf, 1);		} else if (FD_ISSET(svr->sockfd, &sockfd_set)) {			struct sockaddr_in fromaddr;			socklen_t sockaddr_size = sizeof(struct sockaddr_in);			ssize_t recvsize = recvfrom(svr->sockfd, pkt_buffer, PACKET_SIZE, 0,				(struct sockaddr *) &fromaddr, &sockaddr_size);			if (recvsize < 0) {				log_message(LOG_ERR, "recv(): %m\n");			}			DEBUG_PRINTF("data from=%s size=%ld\n", inet_ntoa(fromaddr.sin_addr), (long) recvsize);			mdns = mdns_parse_pkt(pkt_buffer, recvsize);			if (mdns != NULL) {				if (process_mdns_pkt(svr, mdns, mdns_reply)) {					size_t replylen = mdns_encode_pkt(mdns_reply, pkt_buffer, PACKET_SIZE);					if (mdns_reply->unicast) {						int sock = socket(fromaddr.sin_family, SOCK_DGRAM, 0);						sendto(sock, pkt_buffer, replylen, 0, (void*) &fromaddr, sizeof(struct sockaddr_in));						DEBUG_PRINTF("unicast answer\n");#ifdef _WIN32						closesocket(sock);#else						close(sock);#endif					} else {						send_packet(svr->sockfd, pkt_buffer, replylen);					}				} else if (mdns->num_qn == 0) {					DEBUG_PRINTF("(no questions in packet)\n\n");				}				mdns_pkt_destroy(mdns);			}		}		// send out announces		while (1) {			struct rr_entry *ann_e = NULL;			char *namestr;			// extract from head of list			mutex_lock(svr->data_lock);			if (svr->announce)				ann_e = rr_list_remove(&svr->announce, svr->announce->e);			mutex_unlock(svr->data_lock);			if (! ann_e)				break;			namestr = nlabel_to_str(ann_e->name);			DEBUG_PRINTF("sending announce for %s\n", namestr);			free(namestr);			announce_srv(svr, mdns_reply, ann_e->name);			if (mdns_reply->num_ans_rr > 0) {				size_t replylen = mdns_encode_pkt(mdns_reply, pkt_buffer, PACKET_SIZE);				send_packet(svr->sockfd, pkt_buffer, replylen);			}		}		// send out bye-bye for terminating services		while (1) {			struct rr_entry *leave_e = NULL;			char *namestr;			mutex_lock(svr->data_lock);			if (svr->leave)				leave_e = rr_list_remove(&svr->leave, svr->leave->e);			mutex_unlock(svr->data_lock);			if (!leave_e)				break;			mdns_init_reply(mdns_reply, 0);			namestr = nlabel_to_str(leave_e->name);			DEBUG_PRINTF("sending bye-bye for %s\n", namestr);			free(namestr);			leave_e->ttl = 0;			mdns_reply->num_ans_rr += rr_list_append(&mdns_reply->rr_ans, leave_e);			// send out packet			if (mdns_reply->num_ans_rr > 0) {				size_t replylen = mdns_encode_pkt(mdns_reply, pkt_buffer, PACKET_SIZE);				send_packet(svr->sockfd, pkt_buffer, replylen);			}			rr_entry_destroy(leave_e->data.PTR.entry);			rr_entry_destroy(leave_e);		}	}	// main thread terminating. send out "goodbye packets" for services	mdns_init_reply(mdns_reply, 0);	mutex_lock(svr->data_lock);	svc_le = svr->services;	for (; svc_le; svc_le = svc_le->next) {		// set TTL to zero		svc_le->e->ttl = 0;		mdns_reply->num_ans_rr += rr_list_append(&mdns_reply->rr_ans, svc_le->e);	}	mutex_unlock(svr->data_lock);	// send out packet	if (mdns_reply->num_ans_rr > 0) {		size_t replylen = mdns_encode_pkt(mdns_reply, pkt_buffer, PACKET_SIZE);		send_packet(svr->sockfd, pkt_buffer, replylen);	}	// destroy packet	mdns_init_reply(mdns_reply, 0);	free(mdns_reply);	free(pkt_buffer);	close_pipe(svr->sockfd);	svr->stop_flag = 2;}/////////////////////////////////////////////////////void mdnsd_set_hostname(struct mdnsd *svr, const char *hostname, struct in_addr addr) {	struct rr_entry *a_e = NULL,					*nsec_e = NULL;	// currently can't be called twice	// dont ask me what happens if the IP changes	assert(svr->hostname == NULL);	a_e = rr_create_a(create_nlabel(hostname), addr);	nsec_e = rr_create(create_nlabel(hostname), RR_NSEC);	nsec_e->ttl = DEFAULT_TTL_FOR_RECORD_WITH_HOSTNAME;	rr_set_nsec(nsec_e, RR_A);		mutex_lock(svr->data_lock);	svr->hostname = create_nlabel(hostname);	rr_group_add(&svr->group, a_e);	rr_group_add(&svr->group, nsec_e);	mutex_unlock(svr->data_lock);}void mdnsd_set_hostname_v6(struct mdnsd *svr, const char *hostname, struct in6_addr *addr) {  struct rr_entry *aaaa_e = NULL, *nsec_e = NULL;  // currently can't be called twice  // dont ask me what happens if the IP changes  assert(svr->hostname == NULL);  aaaa_e = rr_create_aaaa(create_nlabel(hostname), addr); // 120 seconds automatically  nsec_e = rr_create(create_nlabel(hostname), RR_NSEC);  nsec_e->ttl = DEFAULT_TTL_FOR_RECORD_WITH_HOSTNAME; // set to 120 seconds (default is 4500)  rr_set_nsec(nsec_e, RR_AAAA);  mutex_lock(svr->data_lock);  svr->hostname = create_nlabel(hostname);  rr_group_add(&svr->group, aaaa_e);  rr_group_add(&svr->group, nsec_e);  mutex_unlock(svr->data_lock);}void mdnsd_add_rr(struct mdnsd *svr, struct rr_entry *rr) {	mutex_lock(svr->data_lock);	rr_group_add(&svr->group, rr);	mutex_unlock(svr->data_lock);}struct mdns_service *mdnsd_register_svc(struct mdnsd *svr, const char *instance_name,		const char *type, uint16_t port, const char *hostname, const char *txt[]) {	struct rr_entry *txt_e = NULL, 					*srv_e = NULL, 					*ptr_e = NULL,					*bptr_e = NULL;	uint8_t *target;	uint8_t *inst_nlabel, *type_nlabel, *nlabel;	struct mdns_service *service = malloc(sizeof(struct mdns_service));	memset(service, 0, sizeof(struct mdns_service));	// combine service name	type_nlabel = create_nlabel(type);	inst_nlabel = create_label(instance_name);	nlabel = join_nlabel(inst_nlabel, type_nlabel);	// create TXT record	if (txt && *txt) {		txt_e = rr_create(dup_nlabel(nlabel), RR_TXT);		rr_list_append(&service->entries, txt_e);		// add TXTs		for (; *txt; txt++) 			rr_add_txt(txt_e, *txt);	}	// create SRV record	assert(hostname || svr->hostname);	// either one as target	target = hostname ? 				create_nlabel(hostname) : 				dup_nlabel(svr->hostname);	srv_e = rr_create_srv(dup_nlabel(nlabel), port, target);	rr_list_append(&service->entries, srv_e);	// create PTR record for type	ptr_e = rr_create_ptr(type_nlabel, srv_e);	// create services PTR record for type	// this enables the type to show up as a "service"	bptr_e = rr_create_ptr(dup_nlabel(SERVICES_DNS_SD_NLABEL), ptr_e);	// modify lists here	mutex_lock(svr->data_lock);	if (txt_e)		rr_group_add(&svr->group, txt_e);	rr_group_add(&svr->group, srv_e);	rr_group_add(&svr->group, ptr_e);	rr_group_add(&svr->group, bptr_e);	// append PTR entry to announce list	rr_list_append(&svr->announce, ptr_e);	rr_list_append(&svr->services, ptr_e);	mutex_unlock(svr->data_lock);	// don't free type_nlabel - it's with the PTR record	free(nlabel);	free(inst_nlabel);	// notify server	write_pipe(svr->notify_pipe[1], ".", 1);	return service;}void mdns_service_remove(struct mdnsd *svr, struct mdns_service *svc) {	struct rr_list *rr;	assert(svr != NULL && svc != NULL);	// modify lists here	mutex_lock(svr->data_lock);	for (rr = svc->entries; rr; rr = rr->next) {		struct rr_group *g;		struct rr_entry *ptr_e;		// remove entry from groups and destroy entries that are not PTR		if ((g = rr_group_find(svr->group, rr->e->name)) != NULL) {			rr_list_remove(&g->rr, rr->e);		}		// remove PTR and BPTR related to this SVC		if ((ptr_e = rr_entry_remove(svr->group, rr->e, RR_PTR)) != NULL) {			struct rr_entry *bptr_e;			// remove PTR from announce and services			rr_list_remove(&svr->announce, ptr_e);			rr_list_remove(&svr->services, ptr_e);			// find BPTR and remove it from groups			bptr_e = rr_entry_remove(svr->group, ptr_e, RR_PTR);			rr_entry_destroy(bptr_e);			// add PTR to list of announces for leaving			rr_list_append(&svr->leave, ptr_e);		} else {			// destroy entries not needed for sending "leave" packet			rr_entry_destroy(rr->e);		}	}	// remove all empty groups	rr_group_clean(&svr->group);	// destroy this service entries	rr_list_destroy(svc->entries, 0);	free(svc);	mutex_unlock(svr->data_lock);}void mdns_service_destroy(struct mdns_service *srv) {	assert(srv != NULL);	rr_list_destroy(srv->entries, 0);	free(srv);}struct mdnsd *mdnsd_start(struct in_addr host, bool verbose) {#ifndef USE_WIN32_THREAD	pthread_t tid;	pthread_attr_t attr;#endif	log_verbose = verbose;	struct mdnsd *server = malloc(sizeof(struct mdnsd));	memset(server, 0, sizeof(struct mdnsd));	if (create_pipe(server->notify_pipe) != 0) {		log_message(LOG_ERR, "pipe(): %m\n");		free(server);		return NULL;	}	server->sockfd = create_recv_sock(host.s_addr);	if (server->sockfd < 0) {		log_message(LOG_ERR, "unable to create recv socket\n");		free(server);		return NULL;	}#ifdef USE_WIN32_THREAD	server->data_lock = CreateMutex(NULL, FALSE, NULL);#else	pthread_mutex_init(&server->data_lock, NULL);#endif#ifdef USE_WIN32_THREAD	if (CreateThread(NULL, 0, (LPTHREAD_START_ROUTINE) main_loop, (void*) server, 0, NULL) == NULL) {		CloseHandle(server->data_lock);#else	// init thread	pthread_attr_init(&attr);	pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);	if (pthread_create(&tid, &attr, (void *(*)(void *)) main_loop, (void *) server) != 0) {		pthread_mutex_destroy(&server->data_lock);#endif		free(server);		return NULL;	}	return server;}void mdnsd_stop(struct mdnsd *s) {	struct timeval tv;	if (!s) return;	tv.tv_sec = 0;	tv.tv_usec = 500*1000;	assert(s != NULL);	s->stop_flag = 1;	write_pipe(s->notify_pipe[1], ".", 1);	while (s->stop_flag != 2)		select(0, NULL, NULL, NULL, &tv);	close_pipe(s->notify_pipe[0]);	close_pipe(s->notify_pipe[1]);#ifdef USE_WIN32_THREAD	CloseHandle(s->data_lock);#else	pthread_mutex_destroy(&s->data_lock);#endif	rr_group_destroy(s->group);	rr_list_destroy(s->announce, 0);	rr_list_destroy(s->services, 0);	rr_list_destroy(s->leave, 0);	if (s->hostname)		free(s->hostname);	free(s);}
 |