]> git.ipfire.org Git - people/ms/u-boot.git/blame - net/tftp.c
net: make IPaddr type big endian
[people/ms/u-boot.git] / net / tftp.c
CommitLineData
fe8c2806 1/*
2f09413f
LC
2 * Copyright 1994, 1995, 2000 Neil Russell.
3 * (See License)
4 * Copyright 2000, 2001 DENX Software Engineering, Wolfgang Denk, wd@denx.de
e59e3562
LC
5 * Copyright 2011 Comelit Group SpA,
6 * Luca Ceresoli <luca.ceresoli@comelit.it>
fe8c2806
WD
7 */
8
9#include <common.h>
10#include <command.h>
11#include <net.h>
12#include "tftp.h"
13#include "bootp.h"
13dfe943
JH
14#ifdef CONFIG_SYS_DIRECT_FLASH_TFTP
15#include <flash.h>
16#endif
fe8c2806 17
2f09413f
LC
18/* Well known TFTP port # */
19#define WELL_KNOWN_PORT 69
20/* Millisecs to timeout for lost pkt */
21#define TIMEOUT 5000UL
fe8c2806 22#ifndef CONFIG_NET_RETRY_COUNT
2f09413f
LC
23/* # of timeouts before giving up */
24# define TIMEOUT_COUNT 10
fe8c2806
WD
25#else
26# define TIMEOUT_COUNT (CONFIG_NET_RETRY_COUNT * 2)
27#endif
2f09413f
LC
28/* Number of "loading" hashes per line (for checking the image size) */
29#define HASHES_PER_LINE 65
fe8c2806
WD
30
31/*
32 * TFTP operations.
33 */
34#define TFTP_RRQ 1
35#define TFTP_WRQ 2
36#define TFTP_DATA 3
37#define TFTP_ACK 4
38#define TFTP_ERROR 5
fbe4b5cb 39#define TFTP_OACK 6
fe8c2806 40
e83cc063
BS
41static ulong TftpTimeoutMSecs = TIMEOUT;
42static int TftpTimeoutCountMax = TIMEOUT_COUNT;
85b19802 43static ulong time_start; /* Record time we started tftp */
e83cc063
BS
44
45/*
46 * These globals govern the timeout behavior when attempting a connection to a
47 * TFTP server. TftpRRQTimeoutMSecs specifies the number of milliseconds to
48 * wait for the server to respond to initial connection. Second global,
49 * TftpRRQTimeoutCountMax, gives the number of such connection retries.
50 * TftpRRQTimeoutCountMax must be non-negative and TftpRRQTimeoutMSecs must be
51 * positive. The globals are meant to be set (and restored) by code needing
52 * non-standard timeout behavior when initiating a TFTP transfer.
53 */
54ulong TftpRRQTimeoutMSecs = TIMEOUT;
55int TftpRRQTimeoutCountMax = TIMEOUT_COUNT;
56
aafda38f
RB
57enum {
58 TFTP_ERR_UNDEFINED = 0,
59 TFTP_ERR_FILE_NOT_FOUND = 1,
60 TFTP_ERR_ACCESS_DENIED = 2,
61 TFTP_ERR_DISK_FULL = 3,
62 TFTP_ERR_UNEXPECTED_OPCODE = 4,
63 TFTP_ERR_UNKNOWN_TRANSFER_ID = 5,
64 TFTP_ERR_FILE_ALREADY_EXISTS = 6,
65};
66
20478cea 67static IPaddr_t TftpRemoteIP;
2f09413f 68/* The UDP port at their end */
20478cea 69static int TftpRemotePort;
2f09413f
LC
70/* The UDP port at our end */
71static int TftpOurPort;
fe8c2806 72static int TftpTimeoutCount;
2f09413f
LC
73/* packet sequence number */
74static ulong TftpBlock;
75/* last packet sequence number received */
76static ulong TftpLastBlock;
77/* count of sequence number wraparounds */
78static ulong TftpBlockWrap;
79/* memory offset due to wrapping */
80static ulong TftpBlockWrapOffset;
fe8c2806 81static int TftpState;
4fccb818 82#ifdef CONFIG_TFTP_TSIZE
2f09413f
LC
83/* The file size reported by the server */
84static int TftpTsize;
85/* The number of hashes we printed */
86static short TftpNumchars;
4fccb818 87#endif
1fb7cd49
SG
88#ifdef CONFIG_CMD_TFTPPUT
89static int TftpWriting; /* 1 if writing, else 0 */
90static int TftpFinalBlock; /* 1 if we have sent the last block */
91#else
92#define TftpWriting 0
93#endif
3f85ce27 94
e3fb0abe 95#define STATE_SEND_RRQ 1
fe8c2806
WD
96#define STATE_DATA 2
97#define STATE_TOO_LARGE 3
98#define STATE_BAD_MAGIC 4
fbe4b5cb 99#define STATE_OACK 5
e59e3562 100#define STATE_RECV_WRQ 6
1fb7cd49 101#define STATE_SEND_WRQ 7
fe8c2806 102
2f09413f
LC
103/* default TFTP block size */
104#define TFTP_BLOCK_SIZE 512
105/* sequence number is 16 bit */
106#define TFTP_SEQUENCE_SIZE ((ulong)(1<<16))
3f85ce27 107
fe8c2806
WD
108#define DEFAULT_NAME_LEN (8 + 4 + 1)
109static char default_filename[DEFAULT_NAME_LEN];
a93907c4
JCPV
110
111#ifndef CONFIG_TFTP_FILE_NAME_MAX_LEN
112#define MAX_LEN 128
113#else
114#define MAX_LEN CONFIG_TFTP_FILE_NAME_MAX_LEN
115#endif
116
117static char tftp_filename[MAX_LEN];
fe8c2806 118
85eb5caf
WD
119/* 512 is poor choice for ethernet, MTU is typically 1500.
120 * Minus eth.hdrs thats 1468. Can get 2x better throughput with
53a5c424 121 * almost-MTU block sizes. At least try... fall back to 512 if need be.
89ba81d1 122 * (but those using CONFIG_IP_DEFRAG may want to set a larger block in cfg file)
53a5c424 123 */
89ba81d1
AR
124#ifdef CONFIG_TFTP_BLOCKSIZE
125#define TFTP_MTU_BLOCKSIZE CONFIG_TFTP_BLOCKSIZE
126#else
53a5c424 127#define TFTP_MTU_BLOCKSIZE 1468
89ba81d1
AR
128#endif
129
c718b143
LC
130static unsigned short TftpBlkSize = TFTP_BLOCK_SIZE;
131static unsigned short TftpBlkSizeOption = TFTP_MTU_BLOCKSIZE;
53a5c424
DU
132
133#ifdef CONFIG_MCAST_TFTP
134#include <malloc.h>
135#define MTFTP_BITMAPSIZE 0x1000
136static unsigned *Bitmap;
c718b143 137static int PrevBitmapHole, Mapsize = MTFTP_BITMAPSIZE;
9bb0a1bf
LC
138static uchar ProhibitMcast, MasterClient;
139static uchar Multicast;
53a5c424
DU
140static int Mcast_port;
141static ulong TftpEndingBlock; /* can get 'last' block before done..*/
142
c718b143 143static void parse_multicast_oack(char *pkt, int len);
53a5c424
DU
144
145static void
146mcast_cleanup(void)
147{
6d2231e8
LC
148 if (Mcast_addr)
149 eth_mcast_join(Mcast_addr, 0);
150 if (Bitmap)
151 free(Bitmap);
c718b143 152 Bitmap = NULL;
53a5c424
DU
153 Mcast_addr = Multicast = Mcast_port = 0;
154 TftpEndingBlock = -1;
155}
156
157#endif /* CONFIG_MCAST_TFTP */
158
13dfe943 159static inline void
bc46dfac 160store_block(int block, uchar *src, unsigned len)
fe8c2806 161{
53a5c424 162 ulong offset = block * TftpBlkSize + TftpBlockWrapOffset;
3f85ce27 163 ulong newsize = offset + len;
6d0f6bcf 164#ifdef CONFIG_SYS_DIRECT_FLASH_TFTP
fe8c2806
WD
165 int i, rc = 0;
166
c718b143 167 for (i = 0; i < CONFIG_SYS_MAX_FLASH_BANKS; i++) {
fe8c2806 168 /* start address in flash? */
be1b0d27
JF
169 if (flash_info[i].flash_id == FLASH_UNKNOWN)
170 continue;
fe8c2806
WD
171 if (load_addr + offset >= flash_info[i].start[0]) {
172 rc = 1;
173 break;
174 }
175 }
176
177 if (rc) { /* Flash is destination for this packet */
c718b143 178 rc = flash_write((char *)src, (ulong)(load_addr+offset), len);
fe8c2806 179 if (rc) {
c718b143 180 flash_perror(rc);
22f6e99d 181 net_set_state(NETLOOP_FAIL);
fe8c2806
WD
182 return;
183 }
13dfe943 184 } else
6d0f6bcf 185#endif /* CONFIG_SYS_DIRECT_FLASH_TFTP */
fe8c2806
WD
186 {
187 (void)memcpy((void *)(load_addr + offset), src, len);
188 }
53a5c424
DU
189#ifdef CONFIG_MCAST_TFTP
190 if (Multicast)
191 ext2_set_bit(block, Bitmap);
192#endif
fe8c2806
WD
193
194 if (NetBootFileXferSize < newsize)
195 NetBootFileXferSize = newsize;
196}
197
e4cde2f7 198/* Clear our state ready for a new transfer */
165099e7 199static void new_transfer(void)
e4cde2f7
SG
200{
201 TftpLastBlock = 0;
202 TftpBlockWrap = 0;
203 TftpBlockWrapOffset = 0;
204#ifdef CONFIG_CMD_TFTPPUT
205 TftpFinalBlock = 0;
206#endif
207}
208
1fb7cd49
SG
209#ifdef CONFIG_CMD_TFTPPUT
210/**
211 * Load the next block from memory to be sent over tftp.
212 *
213 * @param block Block number to send
214 * @param dst Destination buffer for data
215 * @param len Number of bytes in block (this one and every other)
216 * @return number of bytes loaded
217 */
218static int load_block(unsigned block, uchar *dst, unsigned len)
219{
220 /* We may want to get the final block from the previous set */
221 ulong offset = ((int)block - 1) * len + TftpBlockWrapOffset;
222 ulong tosend = len;
223
224 tosend = min(NetBootFileXferSize - offset, tosend);
225 (void)memcpy(dst, (void *)(save_addr + offset), tosend);
226 debug("%s: block=%d, offset=%ld, len=%d, tosend=%ld\n", __func__,
227 block, offset, len, tosend);
228 return tosend;
229}
230#endif
231
c718b143
LC
232static void TftpSend(void);
233static void TftpTimeout(void);
fe8c2806
WD
234
235/**********************************************************************/
236
f5329bbc
SG
237static void show_block_marker(void)
238{
239#ifdef CONFIG_TFTP_TSIZE
240 if (TftpTsize) {
241 ulong pos = TftpBlock * TftpBlkSize + TftpBlockWrapOffset;
242
243 while (TftpNumchars < pos * 50 / TftpTsize) {
244 putc('#');
245 TftpNumchars++;
246 }
1fb7cd49 247 } else
f5329bbc 248#endif
1fb7cd49 249 {
f5329bbc
SG
250 if (((TftpBlock - 1) % 10) == 0)
251 putc('#');
252 else if ((TftpBlock % (10 * HASHES_PER_LINE)) == 0)
253 puts("\n\t ");
254 }
255}
256
e4cde2f7
SG
257/**
258 * restart the current transfer due to an error
259 *
260 * @param msg Message to print for user
261 */
262static void restart(const char *msg)
263{
264 printf("\n%s; starting again\n", msg);
265#ifdef CONFIG_MCAST_TFTP
266 mcast_cleanup();
267#endif
268 NetStartAgain();
269}
270
271/*
272 * Check if the block number has wrapped, and update progress
273 *
274 * TODO: The egregious use of global variables in this file should be tidied.
275 */
276static void update_block_number(void)
277{
278 /*
279 * RFC1350 specifies that the first data packet will
280 * have sequence number 1. If we receive a sequence
281 * number of 0 this means that there was a wrap
282 * around of the (16 bit) counter.
283 */
284 if (TftpBlock == 0) {
285 TftpBlockWrap++;
286 TftpBlockWrapOffset += TftpBlkSize * TFTP_SEQUENCE_SIZE;
287 TftpTimeoutCount = 0; /* we've done well, reset thhe timeout */
288 } else {
289 show_block_marker();
290 }
291}
292
f5329bbc
SG
293/* The TFTP get or put is complete */
294static void tftp_complete(void)
295{
296#ifdef CONFIG_TFTP_TSIZE
297 /* Print hash marks for the last packet received */
298 while (TftpTsize && TftpNumchars < 49) {
299 putc('#');
300 TftpNumchars++;
301 }
302#endif
85b19802
SG
303 time_start = get_timer(time_start);
304 if (time_start > 0) {
305 puts("\n\t "); /* Line up with "Loading: " */
306 print_size(NetBootFileXferSize /
307 time_start * 1000, "/s");
308 }
f5329bbc 309 puts("\ndone\n");
22f6e99d 310 net_set_state(NETLOOP_SUCCESS);
f5329bbc
SG
311}
312
fe8c2806 313static void
c718b143 314TftpSend(void)
fe8c2806 315{
1fb7cd49 316 uchar *pkt;
db288a96
JH
317 uchar *xp;
318 int len = 0;
319 ushort *s;
fe8c2806 320
85eb5caf 321#ifdef CONFIG_MCAST_TFTP
53a5c424 322 /* Multicast TFTP.. non-MasterClients do not ACK data. */
85eb5caf
WD
323 if (Multicast
324 && (TftpState == STATE_DATA)
325 && (MasterClient == 0))
53a5c424
DU
326 return;
327#endif
fe8c2806
WD
328 /*
329 * We will always be sending some sort of packet, so
330 * cobble together the packet headers now.
331 */
594c26f8 332 pkt = NetTxPacket + NetEthHdrSize() + IP_UDP_HDR_SIZE;
fe8c2806
WD
333
334 switch (TftpState) {
e3fb0abe 335 case STATE_SEND_RRQ:
1fb7cd49 336 case STATE_SEND_WRQ:
fe8c2806 337 xp = pkt;
7bc5ee07 338 s = (ushort *)pkt;
8c6914f1 339#ifdef CONFIG_CMD_TFTPPUT
1fb7cd49
SG
340 *s++ = htons(TftpState == STATE_SEND_RRQ ? TFTP_RRQ :
341 TFTP_WRQ);
8c6914f1
SG
342#else
343 *s++ = htons(TFTP_RRQ);
344#endif
7bc5ee07 345 pkt = (uchar *)s;
c718b143 346 strcpy((char *)pkt, tftp_filename);
fe8c2806 347 pkt += strlen(tftp_filename) + 1;
c718b143 348 strcpy((char *)pkt, "octet");
fe8c2806 349 pkt += 5 /*strlen("octet")*/ + 1;
c718b143 350 strcpy((char *)pkt, "timeout");
fbe4b5cb 351 pkt += 7 /*strlen("timeout")*/ + 1;
c96f86ee 352 sprintf((char *)pkt, "%lu", TftpTimeoutMSecs / 1000);
0ebf04c6 353 debug("send option \"timeout %s\"\n", (char *)pkt);
fbe4b5cb 354 pkt += strlen((char *)pkt) + 1;
4fccb818 355#ifdef CONFIG_TFTP_TSIZE
1fb7cd49
SG
356 pkt += sprintf((char *)pkt, "tsize%c%lu%c",
357 0, NetBootFileXferSize, 0);
4fccb818 358#endif
53a5c424 359 /* try for more effic. blk size */
c718b143
LC
360 pkt += sprintf((char *)pkt, "blksize%c%d%c",
361 0, TftpBlkSizeOption, 0);
85eb5caf 362#ifdef CONFIG_MCAST_TFTP
53a5c424 363 /* Check all preconditions before even trying the option */
13dfe943
JH
364 if (!ProhibitMcast) {
365 Bitmap = malloc(Mapsize);
366 if (Bitmap && eth_get_dev()->mcast) {
367 free(Bitmap);
368 Bitmap = NULL;
369 pkt += sprintf((char *)pkt, "multicast%c%c",
370 0, 0);
371 }
53a5c424
DU
372 }
373#endif /* CONFIG_MCAST_TFTP */
fe8c2806
WD
374 len = pkt - xp;
375 break;
376
fbe4b5cb 377 case STATE_OACK:
53a5c424
DU
378#ifdef CONFIG_MCAST_TFTP
379 /* My turn! Start at where I need blocks I missed.*/
380 if (Multicast)
c718b143
LC
381 TftpBlock = ext2_find_next_zero_bit(Bitmap,
382 (Mapsize*8), 0);
53a5c424
DU
383 /*..falling..*/
384#endif
e59e3562
LC
385
386 case STATE_RECV_WRQ:
53a5c424 387 case STATE_DATA:
fe8c2806 388 xp = pkt;
7bc5ee07 389 s = (ushort *)pkt;
1fb7cd49
SG
390 s[0] = htons(TFTP_ACK);
391 s[1] = htons(TftpBlock);
392 pkt = (uchar *)(s + 2);
393#ifdef CONFIG_CMD_TFTPPUT
394 if (TftpWriting) {
395 int toload = TftpBlkSize;
396 int loaded = load_block(TftpBlock, pkt, toload);
397
398 s[0] = htons(TFTP_DATA);
399 pkt += loaded;
400 TftpFinalBlock = (loaded < toload);
401 }
402#endif
fe8c2806
WD
403 len = pkt - xp;
404 break;
405
406 case STATE_TOO_LARGE:
407 xp = pkt;
7bc5ee07
WD
408 s = (ushort *)pkt;
409 *s++ = htons(TFTP_ERROR);
1fb7cd49
SG
410 *s++ = htons(3);
411
7bc5ee07 412 pkt = (uchar *)s;
c718b143 413 strcpy((char *)pkt, "File too large");
fe8c2806
WD
414 pkt += 14 /*strlen("File too large")*/ + 1;
415 len = pkt - xp;
416 break;
417
418 case STATE_BAD_MAGIC:
419 xp = pkt;
7bc5ee07
WD
420 s = (ushort *)pkt;
421 *s++ = htons(TFTP_ERROR);
422 *s++ = htons(2);
423 pkt = (uchar *)s;
c718b143 424 strcpy((char *)pkt, "File has bad magic");
fe8c2806
WD
425 pkt += 18 /*strlen("File has bad magic")*/ + 1;
426 len = pkt - xp;
427 break;
428 }
429
20478cea 430 NetSendUDPPacket(NetServerEther, TftpRemoteIP, TftpRemotePort,
2f09413f 431 TftpOurPort, len);
fe8c2806
WD
432}
433
39bccd21 434#ifdef CONFIG_CMD_TFTPPUT
1fb7cd49
SG
435static void icmp_handler(unsigned type, unsigned code, unsigned dest,
436 IPaddr_t sip, unsigned src, uchar *pkt, unsigned len)
437{
438 if (type == ICMP_NOT_REACH && code == ICMP_NOT_REACH_PORT) {
439 /* Oh dear the other end has gone away */
440 restart("TFTP server died");
441 }
442}
39bccd21 443#endif
1fb7cd49 444
fe8c2806 445static void
03eb129f
LC
446TftpHandler(uchar *pkt, unsigned dest, IPaddr_t sip, unsigned src,
447 unsigned len)
fe8c2806
WD
448{
449 ushort proto;
7bc5ee07 450 ushort *s;
ff13ac8c 451 int i;
fe8c2806
WD
452
453 if (dest != TftpOurPort) {
53a5c424 454#ifdef CONFIG_MCAST_TFTP
85eb5caf 455 if (Multicast
53a5c424
DU
456 && (!Mcast_port || (dest != Mcast_port)))
457#endif
0bdd8acc 458 return;
fe8c2806 459 }
e59e3562 460 if (TftpState != STATE_SEND_RRQ && src != TftpRemotePort &&
1fb7cd49 461 TftpState != STATE_RECV_WRQ && TftpState != STATE_SEND_WRQ)
fe8c2806 462 return;
fe8c2806 463
7bc325a1 464 if (len < 2)
fe8c2806 465 return;
fe8c2806
WD
466 len -= 2;
467 /* warning: don't use increment (++) in ntohs() macros!! */
7bc5ee07
WD
468 s = (ushort *)pkt;
469 proto = *s++;
470 pkt = (uchar *)s;
fe8c2806
WD
471 switch (ntohs(proto)) {
472
473 case TFTP_RRQ:
1fb7cd49
SG
474 break;
475
fe8c2806 476 case TFTP_ACK:
1fb7cd49
SG
477#ifdef CONFIG_CMD_TFTPPUT
478 if (TftpWriting) {
479 if (TftpFinalBlock) {
480 tftp_complete();
481 } else {
482 /*
483 * Move to the next block. We want our block
484 * count to wrap just like the other end!
485 */
486 int block = ntohs(*s);
487 int ack_ok = (TftpBlock == block);
488
489 TftpBlock = (unsigned short)(block + 1);
490 update_block_number();
491 if (ack_ok)
492 TftpSend(); /* Send next data block */
493 }
494 }
495#endif
fe8c2806 496 break;
1fb7cd49 497
fe8c2806
WD
498 default:
499 break;
500
e59e3562
LC
501#ifdef CONFIG_CMD_TFTPSRV
502 case TFTP_WRQ:
503 debug("Got WRQ\n");
504 TftpRemoteIP = sip;
505 TftpRemotePort = src;
506 TftpOurPort = 1024 + (get_timer(0) % 3072);
e4cde2f7 507 new_transfer();
e59e3562
LC
508 TftpSend(); /* Send ACK(0) */
509 break;
510#endif
511
fbe4b5cb 512 case TFTP_OACK:
d371708a
WD
513 debug("Got OACK: %s %s\n",
514 pkt,
515 pkt + strlen((char *)pkt) + 1);
fbe4b5cb 516 TftpState = STATE_OACK;
20478cea 517 TftpRemotePort = src;
60174746
WD
518 /*
519 * Check for 'blksize' option.
520 * Careful: "i" is signed, "len" is unsigned, thus
521 * something like "len-8" may give a *huge* number
522 */
c718b143 523 for (i = 0; i+8 < len; i++) {
2e320257 524 if (strcmp((char *)pkt+i, "blksize") == 0) {
ff13ac8c 525 TftpBlkSize = (unsigned short)
2e320257 526 simple_strtoul((char *)pkt+i+8, NULL,
c718b143 527 10);
0ebf04c6 528 debug("Blocksize ack: %s, %d\n",
2e320257 529 (char *)pkt+i+8, TftpBlkSize);
ff13ac8c 530 }
4fccb818 531#ifdef CONFIG_TFTP_TSIZE
2e320257
LC
532 if (strcmp((char *)pkt+i, "tsize") == 0) {
533 TftpTsize = simple_strtoul((char *)pkt+i+6,
2f09413f 534 NULL, 10);
4fccb818 535 debug("size = %s, %d\n",
2e320257 536 (char *)pkt+i+6, TftpTsize);
4fccb818
RG
537 }
538#endif
53a5c424
DU
539 }
540#ifdef CONFIG_MCAST_TFTP
c718b143 541 parse_multicast_oack((char *)pkt, len-1);
85eb5caf 542 if ((Multicast) && (!MasterClient))
53a5c424
DU
543 TftpState = STATE_DATA; /* passive.. */
544 else
545#endif
1fb7cd49
SG
546#ifdef CONFIG_CMD_TFTPPUT
547 if (TftpWriting) {
548 /* Get ready to send the first block */
549 TftpState = STATE_DATA;
550 TftpBlock++;
551 }
552#endif
553 TftpSend(); /* Send ACK or first data block */
fbe4b5cb 554 break;
fe8c2806
WD
555 case TFTP_DATA:
556 if (len < 2)
557 return;
558 len -= 2;
559 TftpBlock = ntohs(*(ushort *)pkt);
3f85ce27 560
e4cde2f7 561 update_block_number();
fe8c2806 562
e3fb0abe 563 if (TftpState == STATE_SEND_RRQ)
0ebf04c6 564 debug("Server did not acknowledge timeout option!\n");
fbe4b5cb 565
e59e3562
LC
566 if (TftpState == STATE_SEND_RRQ || TftpState == STATE_OACK ||
567 TftpState == STATE_RECV_WRQ) {
3f85ce27 568 /* first block received */
fe8c2806 569 TftpState = STATE_DATA;
20478cea 570 TftpRemotePort = src;
e4cde2f7 571 new_transfer();
fe8c2806 572
53a5c424
DU
573#ifdef CONFIG_MCAST_TFTP
574 if (Multicast) { /* start!=1 common if mcast */
575 TftpLastBlock = TftpBlock - 1;
576 } else
577#endif
fe8c2806 578 if (TftpBlock != 1) { /* Assertion */
c718b143
LC
579 printf("\nTFTP error: "
580 "First block is not block 1 (%ld)\n"
581 "Starting again\n\n",
fe8c2806 582 TftpBlock);
c718b143 583 NetStartAgain();
fe8c2806
WD
584 break;
585 }
586 }
587
588 if (TftpBlock == TftpLastBlock) {
589 /*
590 * Same block again; ignore it.
591 */
592 break;
593 }
594
595 TftpLastBlock = TftpBlock;
e83cc063 596 TftpTimeoutCountMax = TIMEOUT_COUNT;
c718b143 597 NetSetTimeout(TftpTimeoutMSecs, TftpTimeout);
fe8c2806 598
c718b143 599 store_block(TftpBlock - 1, pkt + 2, len);
fe8c2806
WD
600
601 /*
4d69e98c 602 * Acknowledge the block just received, which will prompt
20478cea 603 * the remote for the next one.
fe8c2806 604 */
53a5c424 605#ifdef CONFIG_MCAST_TFTP
85eb5caf
WD
606 /* if I am the MasterClient, actively calculate what my next
607 * needed block is; else I'm passive; not ACKING
a93907c4 608 */
53a5c424
DU
609 if (Multicast) {
610 if (len < TftpBlkSize) {
611 TftpEndingBlock = TftpBlock;
612 } else if (MasterClient) {
85eb5caf 613 TftpBlock = PrevBitmapHole =
53a5c424
DU
614 ext2_find_next_zero_bit(
615 Bitmap,
616 (Mapsize*8),
617 PrevBitmapHole);
618 if (TftpBlock > ((Mapsize*8) - 1)) {
c718b143 619 printf("tftpfile too big\n");
53a5c424 620 /* try to double it and retry */
c718b143 621 Mapsize <<= 1;
53a5c424 622 mcast_cleanup();
c718b143 623 NetStartAgain();
53a5c424
DU
624 return;
625 }
626 TftpLastBlock = TftpBlock;
627 }
628 }
629#endif
c718b143 630 TftpSend();
fe8c2806 631
53a5c424
DU
632#ifdef CONFIG_MCAST_TFTP
633 if (Multicast) {
634 if (MasterClient && (TftpBlock >= TftpEndingBlock)) {
c718b143 635 puts("\nMulticast tftp done\n");
53a5c424 636 mcast_cleanup();
22f6e99d 637 net_set_state(NETLOOP_SUCCESS);
85eb5caf 638 }
13dfe943 639 } else
53a5c424 640#endif
f5329bbc
SG
641 if (len < TftpBlkSize)
642 tftp_complete();
fe8c2806
WD
643 break;
644
645 case TFTP_ERROR:
c718b143
LC
646 printf("\nTFTP error: '%s' (%d)\n",
647 pkt + 2, ntohs(*(ushort *)pkt));
aafda38f
RB
648
649 switch (ntohs(*(ushort *)pkt)) {
650 case TFTP_ERR_FILE_NOT_FOUND:
651 case TFTP_ERR_ACCESS_DENIED:
652 puts("Not retrying...\n");
653 eth_halt();
22f6e99d 654 net_set_state(NETLOOP_FAIL);
aafda38f
RB
655 break;
656 case TFTP_ERR_UNDEFINED:
657 case TFTP_ERR_DISK_FULL:
658 case TFTP_ERR_UNEXPECTED_OPCODE:
659 case TFTP_ERR_UNKNOWN_TRANSFER_ID:
660 case TFTP_ERR_FILE_ALREADY_EXISTS:
661 default:
662 puts("Starting again\n\n");
53a5c424 663#ifdef CONFIG_MCAST_TFTP
aafda38f 664 mcast_cleanup();
53a5c424 665#endif
aafda38f
RB
666 NetStartAgain();
667 break;
668 }
fe8c2806
WD
669 break;
670 }
671}
672
673
674static void
c718b143 675TftpTimeout(void)
fe8c2806 676{
e83cc063 677 if (++TftpTimeoutCount > TftpTimeoutCountMax) {
e4cde2f7 678 restart("Retry count exceeded");
fe8c2806 679 } else {
c718b143
LC
680 puts("T ");
681 NetSetTimeout(TftpTimeoutMSecs, TftpTimeout);
e59e3562
LC
682 if (TftpState != STATE_RECV_WRQ)
683 TftpSend();
fe8c2806
WD
684 }
685}
686
687
58f317d1 688void TftpStart(enum proto_t protocol)
fe8c2806 689{
ecb0ccd9 690 char *ep; /* Environment pointer */
89ba81d1 691
c96f86ee
WD
692 /*
693 * Allow the user to choose TFTP blocksize and timeout.
694 * TFTP protocol has a minimal timeout of 1 second.
695 */
2cb53608
LC
696 ep = getenv("tftpblocksize");
697 if (ep != NULL)
89ba81d1 698 TftpBlkSizeOption = simple_strtol(ep, NULL, 10);
c96f86ee 699
2cb53608
LC
700 ep = getenv("tftptimeout");
701 if (ep != NULL)
c96f86ee
WD
702 TftpTimeoutMSecs = simple_strtol(ep, NULL, 10);
703
704 if (TftpTimeoutMSecs < 1000) {
705 printf("TFTP timeout (%ld ms) too low, "
706 "set minimum = 1000 ms\n",
707 TftpTimeoutMSecs);
708 TftpTimeoutMSecs = 1000;
709 }
710
711 debug("TFTP blocksize = %i, timeout = %ld ms\n",
712 TftpBlkSizeOption, TftpTimeoutMSecs);
ecb0ccd9 713
20478cea 714 TftpRemoteIP = NetServerIP;
fe8c2806 715 if (BootFile[0] == '\0') {
ea45cb0a 716 sprintf(default_filename, "%02X%02X%02X%02X.img",
c43352cc
WD
717 NetOurIP & 0xFF,
718 (NetOurIP >> 8) & 0xFF,
719 (NetOurIP >> 16) & 0xFF,
c718b143 720 (NetOurIP >> 24) & 0xFF);
a93907c4
JCPV
721
722 strncpy(tftp_filename, default_filename, MAX_LEN);
723 tftp_filename[MAX_LEN-1] = 0;
fe8c2806 724
c718b143 725 printf("*** Warning: no boot file name; using '%s'\n",
fe8c2806
WD
726 tftp_filename);
727 } else {
c718b143 728 char *p = strchr(BootFile, ':');
a93907c4
JCPV
729
730 if (p == NULL) {
731 strncpy(tftp_filename, BootFile, MAX_LEN);
732 tftp_filename[MAX_LEN-1] = 0;
733 } else {
20478cea 734 TftpRemoteIP = string_to_ip(BootFile);
6a86bb6c 735 strncpy(tftp_filename, p + 1, MAX_LEN);
a93907c4
JCPV
736 tftp_filename[MAX_LEN-1] = 0;
737 }
fe8c2806
WD
738 }
739
c718b143 740 printf("Using %s device\n", eth_get_name());
1fb7cd49 741 printf("TFTP %s server %pI4; our IP address is %pI4",
8c6914f1
SG
742#ifdef CONFIG_CMD_TFTPPUT
743 protocol == TFTPPUT ? "to" : "from",
744#else
745 "from",
746#endif
747 &TftpRemoteIP, &NetOurIP);
fe8c2806
WD
748
749 /* Check if we need to send across this subnet */
750 if (NetOurGatewayIP && NetOurSubnetMask) {
0bdd8acc 751 IPaddr_t OurNet = NetOurIP & NetOurSubnetMask;
20478cea 752 IPaddr_t RemoteNet = TftpRemoteIP & NetOurSubnetMask;
fe8c2806 753
20478cea 754 if (OurNet != RemoteNet)
0bdd8acc
LC
755 printf("; sending through gateway %pI4",
756 &NetOurGatewayIP);
fe8c2806 757 }
c718b143 758 putc('\n');
fe8c2806 759
c718b143 760 printf("Filename '%s'.", tftp_filename);
fe8c2806
WD
761
762 if (NetBootFileSize) {
c718b143
LC
763 printf(" Size is 0x%x Bytes = ", NetBootFileSize<<9);
764 print_size(NetBootFileSize<<9, "");
fe8c2806
WD
765 }
766
c718b143 767 putc('\n');
1fb7cd49
SG
768#ifdef CONFIG_CMD_TFTPPUT
769 TftpWriting = (protocol == TFTPPUT);
770 if (TftpWriting) {
771 printf("Save address: 0x%lx\n", save_addr);
772 printf("Save size: 0x%lx\n", save_size);
773 NetBootFileXferSize = save_size;
774 puts("Saving: *\b");
775 TftpState = STATE_SEND_WRQ;
776 new_transfer();
777 } else
778#endif
779 {
780 printf("Load address: 0x%lx\n", load_addr);
781 puts("Loading: *\b");
782 TftpState = STATE_SEND_RRQ;
783 }
fe8c2806 784
85b19802 785 time_start = get_timer(0);
e83cc063
BS
786 TftpTimeoutCountMax = TftpRRQTimeoutCountMax;
787
c718b143 788 NetSetTimeout(TftpTimeoutMSecs, TftpTimeout);
ece223b5 789 net_set_udp_handler(TftpHandler);
39bccd21 790#ifdef CONFIG_CMD_TFTPPUT
1fb7cd49 791 net_set_icmp_handler(icmp_handler);
39bccd21 792#endif
20478cea 793 TftpRemotePort = WELL_KNOWN_PORT;
fe8c2806 794 TftpTimeoutCount = 0;
ecb0ccd9 795 /* Use a pseudo-random port unless a specific port is set */
fe8c2806 796 TftpOurPort = 1024 + (get_timer(0) % 3072);
53a5c424 797
ecb0ccd9 798#ifdef CONFIG_TFTP_PORT
2cb53608 799 ep = getenv("tftpdstp");
7bc325a1 800 if (ep != NULL)
20478cea 801 TftpRemotePort = simple_strtol(ep, NULL, 10);
2cb53608 802 ep = getenv("tftpsrcp");
7bc325a1 803 if (ep != NULL)
c718b143 804 TftpOurPort = simple_strtol(ep, NULL, 10);
ecb0ccd9 805#endif
fbe4b5cb 806 TftpBlock = 0;
fe8c2806 807
73a8b27c
WD
808 /* zero out server ether in case the server ip has changed */
809 memset(NetServerEther, 0, 6);
53a5c424
DU
810 /* Revert TftpBlkSize to dflt */
811 TftpBlkSize = TFTP_BLOCK_SIZE;
812#ifdef CONFIG_MCAST_TFTP
a93907c4 813 mcast_cleanup();
53a5c424 814#endif
4fccb818
RG
815#ifdef CONFIG_TFTP_TSIZE
816 TftpTsize = 0;
817 TftpNumchars = 0;
818#endif
73a8b27c 819
c718b143 820 TftpSend();
fe8c2806
WD
821}
822
e59e3562
LC
823#ifdef CONFIG_CMD_TFTPSRV
824void
825TftpStartServer(void)
826{
827 tftp_filename[0] = 0;
828
e59e3562 829 printf("Using %s device\n", eth_get_name());
e59e3562
LC
830 printf("Listening for TFTP transfer on %pI4\n", &NetOurIP);
831 printf("Load address: 0x%lx\n", load_addr);
832
833 puts("Loading: *\b");
834
835 TftpTimeoutCountMax = TIMEOUT_COUNT;
836 TftpTimeoutCount = 0;
837 TftpTimeoutMSecs = TIMEOUT;
838 NetSetTimeout(TftpTimeoutMSecs, TftpTimeout);
839
840 /* Revert TftpBlkSize to dflt */
841 TftpBlkSize = TFTP_BLOCK_SIZE;
842 TftpBlock = 0;
843 TftpOurPort = WELL_KNOWN_PORT;
844
845#ifdef CONFIG_TFTP_TSIZE
846 TftpTsize = 0;
847 TftpNumchars = 0;
848#endif
849
850 TftpState = STATE_RECV_WRQ;
ece223b5 851 net_set_udp_handler(TftpHandler);
e59e3562
LC
852}
853#endif /* CONFIG_CMD_TFTPSRV */
854
53a5c424
DU
855#ifdef CONFIG_MCAST_TFTP
856/* Credits: atftp project.
857 */
858
859/* pick up BcastAddr, Port, and whether I am [now] the master-client. *
860 * Frame:
861 * +-------+-----------+---+-------~~-------+---+
862 * | opc | multicast | 0 | addr, port, mc | 0 |
863 * +-------+-----------+---+-------~~-------+---+
864 * The multicast addr/port becomes what I listen to, and if 'mc' is '1' then
865 * I am the new master-client so must send ACKs to DataBlocks. If I am not
866 * master-client, I'm a passive client, gathering what DataBlocks I may and
867 * making note of which ones I got in my bitmask.
868 * In theory, I never go from master->passive..
869 * .. this comes in with pkt already pointing just past opc
870 */
871static void parse_multicast_oack(char *pkt, int len)
872{
c718b143
LC
873 int i;
874 IPaddr_t addr;
875 char *mc_adr, *port, *mc;
53a5c424 876
c718b143 877 mc_adr = port = mc = NULL;
53a5c424
DU
878 /* march along looking for 'multicast\0', which has to start at least
879 * 14 bytes back from the end.
880 */
c718b143
LC
881 for (i = 0; i < len-14; i++)
882 if (strcmp(pkt+i, "multicast") == 0)
53a5c424
DU
883 break;
884 if (i >= (len-14)) /* non-Multicast OACK, ign. */
885 return;
85eb5caf 886
c718b143 887 i += 10; /* strlen multicast */
53a5c424 888 mc_adr = pkt+i;
c718b143 889 for (; i < len; i++) {
53a5c424
DU
890 if (*(pkt+i) == ',') {
891 *(pkt+i) = '\0';
892 if (port) {
893 mc = pkt+i+1;
894 break;
895 } else {
896 port = pkt+i+1;
897 }
898 }
899 }
6d2231e8
LC
900 if (!port || !mc_adr || !mc)
901 return;
53a5c424 902 if (Multicast && MasterClient) {
c718b143 903 printf("I got a OACK as master Client, WRONG!\n");
53a5c424
DU
904 return;
905 }
906 /* ..I now accept packets destined for this MCAST addr, port */
907 if (!Multicast) {
908 if (Bitmap) {
c718b143 909 printf("Internal failure! no mcast.\n");
53a5c424 910 free(Bitmap);
c718b143
LC
911 Bitmap = NULL;
912 ProhibitMcast = 1;
53a5c424
DU
913 return ;
914 }
915 /* I malloc instead of pre-declare; so that if the file ends
85eb5caf
WD
916 * up being too big for this bitmap I can retry
917 */
2cb53608
LC
918 Bitmap = malloc(Mapsize);
919 if (!Bitmap) {
c718b143
LC
920 printf("No Bitmap, no multicast. Sorry.\n");
921 ProhibitMcast = 1;
53a5c424
DU
922 return;
923 }
c718b143 924 memset(Bitmap, 0, Mapsize);
53a5c424
DU
925 PrevBitmapHole = 0;
926 Multicast = 1;
927 }
928 addr = string_to_ip(mc_adr);
929 if (Mcast_addr != addr) {
930 if (Mcast_addr)
931 eth_mcast_join(Mcast_addr, 0);
2cb53608
LC
932 Mcast_addr = addr;
933 if (eth_mcast_join(Mcast_addr, 1)) {
c718b143
LC
934 printf("Fail to set mcast, revert to TFTP\n");
935 ProhibitMcast = 1;
53a5c424
DU
936 mcast_cleanup();
937 NetStartAgain();
938 }
939 }
c718b143
LC
940 MasterClient = (unsigned char)simple_strtoul((char *)mc, NULL, 10);
941 Mcast_port = (unsigned short)simple_strtoul(port, NULL, 10);
942 printf("Multicast: %s:%d [%d]\n", mc_adr, Mcast_port, MasterClient);
53a5c424
DU
943 return;
944}
945
946#endif /* Multicast TFTP */