]> git.karo-electronics.de Git - karo-tx-redboot.git/blobdiff - packages/redboot/v2_0/src/net/tftp_client.c
TX51 pre-release
[karo-tx-redboot.git] / packages / redboot / v2_0 / src / net / tftp_client.c
index 7f471f608b3d9613065f0316e1832bd379b941e6..49333dba1c113db3054ebf7df511d1567788ab50 100644 (file)
@@ -44,9 +44,9 @@
 // Author(s):    gthomas
 // Contributors: gthomas
 // Date:         2000-07-14
-// Purpose:      
-// Description:  
-//              
+// Purpose:
+// Description:
+//
 // This code is part of RedBoot (tm).
 //
 //####DESCRIPTIONEND####
@@ -55,7 +55,7 @@
 
 // TFTP client support
 
-#include <redboot.h>     // have_net
+#include <redboot.h>    // have_net
 #include <net/net.h>
 #include <net/tftp.h>
 #include <net/tftp_support.h>
 static int get_port = 7700;
 
 static struct {
-    bool open;
-    int  total_timeouts, packets_received;
-    unsigned long last_good_block;
-    int  avail, actual_len;
-    struct sockaddr_in local_addr, from_addr;
-    char data[SEGSIZE+sizeof(struct tftphdr)];
-    char *bufp;
+       bool open;
+       int      total_timeouts, packets_received;
+       unsigned long last_good_block;
+       int      avail, actual_len;
+       struct sockaddr_in local_addr, from_addr;
+       union {
+               char buf[SEGSIZE + sizeof(struct tftphdr)];
+               struct tftphdr hdr;
+       } data;
+       char *bufp;
 } tftp_stream;
 
 int
 tftp_stream_open(connection_info_t *info,
-                 int *err)
+                                int *err)
 {
-    struct tftphdr *hdr = (struct tftphdr *)tftp_stream.data;
-    char *cp, *fp;
-    char test_buf;
+       struct tftphdr *hdr = &tftp_stream.data.hdr;
+       char *cp, *fp;
+       char test_buf;
 
-    if (!have_net || tftp_stream.open) {
-        *err = TFTP_INVALID;  // Already open
-        return -1;
-    }
+       if (!have_net || tftp_stream.open) {
+               *err = TFTP_INVALID;  // Already open
+               return -1;
+       }
 
-    // Create initial request
-    hdr->th_opcode = htons(RRQ);  // Read file
-    cp = (char *)&hdr->th_stuff;
-    fp = info->filename;
-    while (*fp) *cp++ = *fp++;
-    *cp++ = '\0';
-    // Since this is used for downloading data, OCTET (binary) is the
-    // only mode that makes sense.
-    fp = "OCTET";
-    while (*fp) *cp++ = *fp++;
-    *cp++ = '\0';
+       // Create initial request
+       hdr->th_opcode = htons(RRQ);  // Read file
+       cp = (char *)&hdr->th_stuff;
+       fp = info->filename;
+       while (*fp) *cp++ = *fp++;
+       *cp++ = '\0';
+       // Since this is used for downloading data, OCTET (binary) is the
+       // only mode that makes sense.
+       fp = "OCTET";
+       while (*fp) *cp++ = *fp++;
+       *cp++ = '\0';
 
-    memset(&tftp_stream.local_addr, 0, sizeof(tftp_stream.local_addr));
-    tftp_stream.local_addr.sin_family = AF_INET;
-    tftp_stream.local_addr.sin_addr.s_addr = htonl(INADDR_ANY);
-    tftp_stream.local_addr.sin_port = htons(get_port++);
+       memset(&tftp_stream.local_addr, 0, sizeof(tftp_stream.local_addr));
+       tftp_stream.local_addr.sin_family = AF_INET;
+       tftp_stream.local_addr.sin_addr.s_addr = htonl(INADDR_ANY);
+       tftp_stream.local_addr.sin_port = htons(get_port++);
 
-    if (info->server->sin_port == 0) {
-        info->server->sin_port = htons(TFTP_PORT);
-    } else {
-        info->server->sin_port = htons(info->server->sin_port);
-    }
+       if (info->server->sin_port == 0) {
+               info->server->sin_port = htons(TFTP_PORT);
+       } else {
+               info->server->sin_port = htons(info->server->sin_port);
+       }
 
-    // Send request - note: RFC 1350 (TFTP rev 2) indicates that this should be
-    // only as long as required to hold the request, with the nul terminator.
-    // Some servers silently go to lunch if the request is not the correct size.
-    if (__udp_sendto(tftp_stream.data, cp-(char *)hdr, 
-                     info->server, &tftp_stream.local_addr) < 0) {
-        // Problem sending request
-        *err = TFTP_NETERR;
-        return -1;
-    }
+       // Send request - note: RFC 1350 (TFTP rev 2) indicates that this should be
+       // only as long as required to hold the request, with the nul terminator.
+       // Some servers silently go to lunch if the request is not the correct size.
+       if (__udp_sendto(tftp_stream.data.buf, cp-(char *)hdr,
+                                        info->server, &tftp_stream.local_addr) < 0) {
+               // Problem sending request
+               *err = TFTP_NETERR;
+               return -1;
+       }
 
-    tftp_stream.open = true;
-    tftp_stream.avail = 0;
-    tftp_stream.actual_len = -1;
-    tftp_stream.last_good_block = 0;
-    tftp_stream.total_timeouts = 0;
-    tftp_stream.from_addr.sin_port = 0;
-    tftp_stream.packets_received = 0;
+       tftp_stream.open = true;
+       tftp_stream.avail = 0;
+       tftp_stream.actual_len = -1;
+       tftp_stream.last_good_block = 0;
+       tftp_stream.total_timeouts = 0;
+       tftp_stream.from_addr.sin_port = 0;
+       tftp_stream.packets_received = 0;
 
-    // Try and read the first byte [block] since no errors are
-    // reported until then.
-    if (tftp_stream_read(&test_buf, 1, err) == 1) {
-        // Back up [rewind] over this datum
-        tftp_stream.bufp--;
-        tftp_stream.avail++;
-        return 0;  // Open and first read successful
-    } else {
-        tftp_stream.open = false;
-        return -1; // Couldn't read
-    }
+       // Try and read the first byte [block] since no errors are
+       // reported until then.
+       if (tftp_stream_read(&test_buf, 1, err) == 1) {
+               // Back up [rewind] over this datum
+               tftp_stream.bufp--;
+               tftp_stream.avail++;
+               return 0;  // Open and first read successful
+       } else {
+               tftp_stream.open = false;
+               return -1; // Couldn't read
+       }
 }
 
 static int
 tftp_ack(int *err)
 {
-    struct tftphdr *hdr = (struct tftphdr *)tftp_stream.data;
-    // ACK last packet so server can shut down
-    if (tftp_stream.packets_received > 0) {
-        hdr->th_opcode = htons(ACK);
-        hdr->th_block = htons((cyg_uint16)tftp_stream.last_good_block & 0xFFFF);
-        if (__udp_sendto(tftp_stream.data, 4 /* FIXME */, 
-                         &tftp_stream.from_addr, &tftp_stream.local_addr) < 0) {
-            // Problem sending ACK
-            *err = TFTP_NETERR;
-            return -1;
-        }
-    }
-    return 0;
+       struct tftphdr *hdr = &tftp_stream.data.hdr;
+       // ACK last packet so server can shut down
+       if (tftp_stream.packets_received > 0) {
+               hdr->th_opcode = htons(ACK);
+               hdr->th_block = htons((cyg_uint16)tftp_stream.last_good_block & 0xFFFF);
+               if (__udp_sendto(tftp_stream.data.buf, 4 /* FIXME */,
+                                                       &tftp_stream.from_addr, &tftp_stream.local_addr) < 0) {
+                       // Problem sending ACK
+                       *err = TFTP_NETERR;
+                       return -1;
+               }
+       }
+       return 0;
 }
 
 static int
 tftp_error_ack(int *err, short code, char *msg)
 {
-    struct tftphdr *hdr = (struct tftphdr *)tftp_stream.data;
+       struct tftphdr *hdr = &tftp_stream.data.hdr;
 
-    if (strlen(msg) > (SEGSIZE-1)) {
-      *(msg + SEGSIZE) = 0;
-    }
+       if (strlen(msg) > (SEGSIZE - 1)) {
+               *(msg + SEGSIZE) = '\0';
+       }
 
-    if (tftp_stream.packets_received > 0) {
-        hdr->th_opcode = htons(ERROR);
-        hdr->th_code = code;
-        strcpy((char *)&hdr->th_data, msg);
-        if (__udp_sendto(tftp_stream.data, (5 + strlen(msg)), 
-                         &tftp_stream.from_addr, &tftp_stream.local_addr) < 0) {
-            // Problem sending ACK
-            *err = TFTP_NETERR;
-            return -1;
-        }
-    }
-    return 0;
+       if (tftp_stream.packets_received > 0) {
+               hdr->th_opcode = htons(ERROR);
+               hdr->th_code = code;
+               strcpy((char *)&hdr->th_data, msg);
+               if (__udp_sendto(tftp_stream.data.buf, (5 + strlen(msg)),
+                                                       &tftp_stream.from_addr, &tftp_stream.local_addr) < 0) {
+                       // Problem sending ACK
+                       *err = TFTP_NETERR;
+                       return -1;
+               }
+       }
+       return 0;
 }
 
 void
 tftp_stream_close(int *err)
 {
-    if (tftp_stream.open == true) {
-        tftp_ack(err);
-        tftp_stream.open = false;
-    }
+       if (tftp_stream.open == true) {
+               tftp_ack(err);
+               tftp_stream.open = false;
+       }
 }
 
 void
 tftp_stream_terminate(bool abort,
-                      int (*getc)(void))
+                                       int (*getc)(void))
 {
-    int err;
+       int err;
 
-    if (abort)
-        tftp_error_ack(&err, EUNDEF, "redboot tftp_stream_terminate");
-    else
-        tftp_ack(&err);
+       if (abort)
+               tftp_error_ack(&err, EUNDEF, "redboot tftp_stream_terminate");
+       else
+               tftp_ack(&err);
 
-    tftp_stream.open = false;
+       tftp_stream.open = false;
 }
 
 int
 tftp_stream_read(void *buf,
-                 int len,
-                 int *err)
+                               int len,
+                               int *err)
 {
-    int total_bytes = 0;
-    int size, recv_len, data_len;
-    struct timeval timeout;
-    struct tftphdr *hdr = (struct tftphdr *)tftp_stream.data;
+       int total_bytes = 0;
+       int size, recv_len, data_len;
+       struct timeval timeout;
+       struct tftphdr *hdr = &tftp_stream.data.hdr;
 
-    while (total_bytes < len) {
-        // Move any bytes which we've already read/buffered
-        if (tftp_stream.avail > 0) {
-            size = tftp_stream.avail;
-            if (size > (len - total_bytes)) size = len - total_bytes;
-            memcpy(buf, tftp_stream.bufp, size);
-            buf = (char *)buf + size;
-            tftp_stream.bufp += size;
-            tftp_stream.avail -= size;
-            total_bytes += size;
-        } else {
-            if (tftp_ack(err) < 0) {
-                return -1;
-            }
-            if ((tftp_stream.actual_len >= 0) && (tftp_stream.actual_len < SEGSIZE)) {
-                // Out of data
-                break;
-            }
-            timeout.tv_sec = (tftp_stream.last_good_block == 0) ? 10*TFTP_TIMEOUT_PERIOD : TFTP_TIMEOUT_PERIOD;
-            timeout.tv_usec = 0;
-            recv_len = sizeof(tftp_stream.data);
-            if ((data_len = __udp_recvfrom(&tftp_stream.data[0], recv_len, &tftp_stream.from_addr, 
-                                           &tftp_stream.local_addr,  &timeout)) < 0) {
-                // No data, try again
-                diag_printf("TFTP timed out %d/%d\n", tftp_stream.total_timeouts+1, TFTP_TIMEOUT_MAX);
-                if ((++tftp_stream.total_timeouts > TFTP_TIMEOUT_MAX) || 
-                    (tftp_stream.last_good_block == 0)) {
-                    // Timeout - no data received
-                    *err = TFTP_TIMEOUT;
-                    return -1;
-                }
-                // Send out the ACK for the last block - maybe server will retry
-                if (tftp_ack(err) < 0) {
-                    return -1;
-                }
-            } else {
-                tftp_stream.packets_received++;
-                if (ntohs(hdr->th_opcode) == DATA) {
-                    if (ntohs(hdr->th_block) == (cyg_uint16)((tftp_stream.last_good_block+1) & 0xFFFF)) {
-                        // Consume this data
-                        data_len -= 4;  /* Sizeof TFTP header */
-                        tftp_stream.avail = tftp_stream.actual_len = data_len;
-                        tftp_stream.bufp = hdr->th_data;
-                        tftp_stream.last_good_block++;
-                    }
-                } else {
-                    if (ntohs(hdr->th_opcode) == ERROR) {
-                        *err = ntohs(hdr->th_code);
-                        return -1;
-                    } else {
-                        // What kind of packet is this?
-                        *err = TFTP_PROTOCOL;
-                        return -1;
-                    }
-                }
-            }
-        }
-    }
-    return total_bytes;
+       while (total_bytes < len) {
+               // Move any bytes which we've already read/buffered
+               if (tftp_stream.avail > 0) {
+                       size = tftp_stream.avail;
+                       if (size > (len - total_bytes)) size = len - total_bytes;
+                       memcpy(buf, tftp_stream.bufp, size);
+                       buf = (char *)buf + size;
+                       tftp_stream.bufp += size;
+                       tftp_stream.avail -= size;
+                       total_bytes += size;
+               } else {
+                       if (tftp_ack(err) < 0) {
+                               return -1;
+                       }
+                       if ((tftp_stream.actual_len >= 0) && (tftp_stream.actual_len < SEGSIZE)) {
+                               // Out of data
+                               break;
+                       }
+                       timeout.tv_sec = (tftp_stream.last_good_block == 0) ? 10*TFTP_TIMEOUT_PERIOD : TFTP_TIMEOUT_PERIOD;
+                       timeout.tv_usec = 0;
+                       recv_len = sizeof(tftp_stream.data.buf);
+                       if ((data_len = __udp_recvfrom(&tftp_stream.data.buf[0], recv_len, &tftp_stream.from_addr,
+                                                                                               &tftp_stream.local_addr,  &timeout)) < 0) {
+                               // No data, try again
+                               diag_printf("TFTP timed out %d/%d\n", tftp_stream.total_timeouts+1, TFTP_TIMEOUT_MAX);
+                               if ((++tftp_stream.total_timeouts > TFTP_TIMEOUT_MAX) ||
+                                       (tftp_stream.last_good_block == 0)) {
+                                       // Timeout - no data received
+                                       *err = TFTP_TIMEOUT;
+                                       return -1;
+                               }
+                               // Send out the ACK for the last block - maybe server will retry
+                               if (tftp_ack(err) < 0) {
+                                       return -1;
+                               }
+                       } else {
+                               tftp_stream.packets_received++;
+                               if (ntohs(hdr->th_opcode) == DATA) {
+                                       if (ntohs(hdr->th_block) == (cyg_uint16)((tftp_stream.last_good_block+1) & 0xFFFF)) {
+                                               // Consume this data
+                                               data_len -= 4;  /* Sizeof TFTP header */
+                                               tftp_stream.avail = tftp_stream.actual_len = data_len;
+                                               tftp_stream.bufp = hdr->th_data;
+                                               tftp_stream.last_good_block++;
+                                       }
+                               } else {
+                                       if (ntohs(hdr->th_opcode) == ERROR) {
+                                               *err = ntohs(hdr->th_code);
+                                               return -1;
+                                       } else {
+                                               // What kind of packet is this?
+                                               *err = TFTP_PROTOCOL;
+                                               return -1;
+                                       }
+                               }
+                       }
+               }
+       }
+       return total_bytes;
 }
 
 char *
 tftp_error(int err)
 {
-    char *errmsg = "Unknown error";
+       char *errmsg = "Unknown error";
 
-    switch (err) {
-    case TFTP_ENOTFOUND:
-        return "file not found";
-    case TFTP_EACCESS:
-        return "access violation";
-    case TFTP_ENOSPACE:
-        return "disk full or allocation exceeded";
-    case TFTP_EBADOP:
-        return "illegal TFTP operation";
-    case TFTP_EBADID:
-        return "unknown transfer ID";
-    case TFTP_EEXISTS:
-        return "file already exists";
-    case TFTP_ENOUSER:
-        return "no such user";
-    case TFTP_TIMEOUT:
-        return "operation timed out";
-    case TFTP_NETERR:
-        return "some sort of network error";
-    case TFTP_INVALID:
-        return "invalid parameter";
-    case TFTP_PROTOCOL:
-        return "protocol violation";
-    case TFTP_TOOLARGE:
-        return "file is larger than buffer";
-    }
-    return errmsg;
+       switch (err) {
+       case TFTP_ENOTFOUND:
+               return "file not found";
+       case TFTP_EACCESS:
+               return "access violation";
+       case TFTP_ENOSPACE:
+               return "disk full or allocation exceeded";
+       case TFTP_EBADOP:
+               return "illegal TFTP operation";
+       case TFTP_EBADID:
+               return "unknown transfer ID";
+       case TFTP_EEXISTS:
+               return "file already exists";
+       case TFTP_ENOUSER:
+               return "no such user";
+       case TFTP_TIMEOUT:
+               return "operation timed out";
+       case TFTP_NETERR:
+               return "some sort of network error";
+       case TFTP_INVALID:
+               return "invalid parameter";
+       case TFTP_PROTOCOL:
+               return "protocol violation";
+       case TFTP_TOOLARGE:
+               return "file is larger than buffer";
+       }
+       return errmsg;
 }
 
 //