1 /* $NetBSD: tftp.c,v 1.4 1997/09/17 16:57:07 drochner Exp $ */ 2 3 /* 4 * Copyright (c) 1996 5 * Matthias Drochner. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. All advertising materials mentioning features or use of this software 16 * must display the following acknowledgement: 17 * This product includes software developed for the NetBSD Project 18 * by Matthias Drochner. 19 * 4. The name of the author may not be used to endorse or promote products 20 * derived from this software without specific prior written permission. 21 * 22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 23 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 24 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 25 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 26 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 27 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 31 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 32 */ 33 34 #include <sys/cdefs.h> 35 __FBSDID("$FreeBSD$"); 36 37 /* 38 * Simple TFTP implementation for libsa. 39 * Assumes: 40 * - socket descriptor (int) at open_file->f_devdata 41 * - server host IP in global servip 42 * Restrictions: 43 * - read only 44 * - lseek only with SEEK_SET or SEEK_CUR 45 * - no big time differences between transfers (<tftp timeout) 46 */ 47 48 #include <sys/types.h> 49 #include <sys/stat.h> 50 #include <netinet/in.h> 51 #include <netinet/udp.h> 52 #include <netinet/in_systm.h> 53 #include <arpa/tftp.h> 54 55 #include <string.h> 56 57 #include "stand.h" 58 #include "net.h" 59 #include "netif.h" 60 61 #include "tftp.h" 62 63 struct tftp_handle; 64 struct tftprecv_extra; 65 66 static ssize_t recvtftp(struct iodesc *d, void **pkt, void **payload, 67 time_t tleft, void *recv_extra); 68 static int tftp_open(const char *path, struct open_file *f); 69 static int tftp_close(struct open_file *f); 70 static int tftp_parse_oack(struct tftp_handle *h, char *buf, size_t len); 71 static int tftp_read(struct open_file *f, void *buf, size_t size, size_t *resid); 72 static off_t tftp_seek(struct open_file *f, off_t offset, int where); 73 static int tftp_set_blksize(struct tftp_handle *h, const char *str); 74 static int tftp_stat(struct open_file *f, struct stat *sb); 75 76 struct fs_ops tftp_fsops = { 77 "tftp", 78 tftp_open, 79 tftp_close, 80 tftp_read, 81 null_write, 82 tftp_seek, 83 tftp_stat, 84 null_readdir 85 }; 86 87 extern struct in_addr servip; 88 89 static int tftpport = 2000; 90 static int is_open = 0; 91 92 /* 93 * The legacy TFTP_BLKSIZE value was SEGSIZE(512). 94 * TFTP_REQUESTED_BLKSIZE of 1428 is (Ethernet MTU, less the TFTP, UDP and 95 * IP header lengths). 96 */ 97 #define TFTP_REQUESTED_BLKSIZE 1428 98 99 /* 100 * Choose a blksize big enough so we can test with Ethernet 101 * Jumbo frames in the future. 102 */ 103 #define TFTP_MAX_BLKSIZE 9008 104 105 struct tftp_handle { 106 struct iodesc *iodesc; 107 int currblock; /* contents of lastdata */ 108 int islastblock; /* flag */ 109 int validsize; 110 int off; 111 char *path; /* saved for re-requests */ 112 unsigned int tftp_blksize; 113 unsigned long tftp_tsize; 114 void *pkt; 115 struct tftphdr *tftp_hdr; 116 }; 117 118 struct tftprecv_extra { 119 struct tftp_handle *tftp_handle; 120 unsigned short rtype; /* Received type */ 121 }; 122 123 #define TFTP_MAX_ERRCODE EOPTNEG 124 static const int tftperrors[TFTP_MAX_ERRCODE + 1] = { 125 0, /* ??? */ 126 ENOENT, 127 EPERM, 128 ENOSPC, 129 EINVAL, /* ??? */ 130 EINVAL, /* ??? */ 131 EEXIST, 132 EINVAL, /* ??? */ 133 EINVAL, /* Option negotiation failed. */ 134 }; 135 136 static int tftp_getnextblock(struct tftp_handle *h); 137 138 /* send error message back. */ 139 static void 140 tftp_senderr(struct tftp_handle *h, u_short errcode, const char *msg) 141 { 142 struct { 143 u_char header[HEADER_SIZE]; 144 struct tftphdr t; 145 u_char space[63]; /* +1 from t */ 146 } __packed __aligned(4) wbuf; 147 char *wtail; 148 int len; 149 150 len = strlen(msg); 151 if (len > sizeof(wbuf.space)) 152 len = sizeof(wbuf.space); 153 154 wbuf.t.th_opcode = htons((u_short) ERROR); 155 wbuf.t.th_code = htons(errcode); 156 157 wtail = wbuf.t.th_msg; 158 bcopy(msg, wtail, len); 159 wtail[len] = '\0'; 160 wtail += len + 1; 161 162 sendudp(h->iodesc, &wbuf.t, wtail - (char *) &wbuf.t); 163 } 164 165 static void 166 tftp_sendack(struct tftp_handle *h) 167 { 168 struct { 169 u_char header[HEADER_SIZE]; 170 struct tftphdr t; 171 } __packed __aligned(4) wbuf; 172 char *wtail; 173 174 wbuf.t.th_opcode = htons((u_short) ACK); 175 wtail = (char *) &wbuf.t.th_block; 176 wbuf.t.th_block = htons((u_short) h->currblock); 177 wtail += 2; 178 179 sendudp(h->iodesc, &wbuf.t, wtail - (char *) &wbuf.t); 180 } 181 182 static ssize_t 183 recvtftp(struct iodesc *d, void **pkt, void **payload, time_t tleft, 184 void *recv_extra) 185 { 186 struct tftprecv_extra *extra; 187 struct tftp_handle *h; 188 struct tftphdr *t; 189 void *ptr = NULL; 190 ssize_t len; 191 192 errno = 0; 193 extra = (struct tftprecv_extra *)recv_extra; 194 h = extra->tftp_handle; 195 196 len = readudp(d, &ptr, (void **)&t, tleft); 197 198 if (len < 4) { 199 free(ptr); 200 return (-1); 201 } 202 203 extra->rtype = ntohs(t->th_opcode); 204 switch (ntohs(t->th_opcode)) { 205 case DATA: { 206 int got; 207 208 if (htons(t->th_block) != (u_short) d->xid) { 209 /* 210 * Expected block? 211 */ 212 free(ptr); 213 return (-1); 214 } 215 if (d->xid == 1) { 216 /* 217 * First data packet from new port. 218 */ 219 struct udphdr *uh; 220 uh = (struct udphdr *) t - 1; 221 d->destport = uh->uh_sport; 222 } /* else check uh_sport has not changed??? */ 223 got = len - (t->th_data - (char *)t); 224 *pkt = ptr; 225 *payload = t; 226 return (got); 227 } 228 case ERROR: 229 if ((unsigned) ntohs(t->th_code) > TFTP_MAX_ERRCODE) { 230 printf("illegal tftp error %d\n", ntohs(t->th_code)); 231 errno = EIO; 232 } else { 233 #ifdef TFTP_DEBUG 234 printf("tftp-error %d\n", ntohs(t->th_code)); 235 #endif 236 errno = tftperrors[ntohs(t->th_code)]; 237 } 238 free(ptr); 239 return (-1); 240 case OACK: { 241 struct udphdr *uh; 242 int tftp_oack_len; 243 244 /* 245 * Unexpected OACK. TFTP transfer already in progress. 246 * Drop the pkt. 247 */ 248 if (d->xid != 1) { 249 free(ptr); 250 return (-1); 251 } 252 253 /* 254 * Remember which port this OACK came from, because we need 255 * to send the ACK or errors back to it. 256 */ 257 uh = (struct udphdr *) t - 1; 258 d->destport = uh->uh_sport; 259 260 /* Parse options ACK-ed by the server. */ 261 tftp_oack_len = len - sizeof(t->th_opcode); 262 if (tftp_parse_oack(h, t->th_u.tu_stuff, tftp_oack_len) != 0) { 263 tftp_senderr(h, EOPTNEG, "Malformed OACK"); 264 errno = EIO; 265 free(ptr); 266 return (-1); 267 } 268 *pkt = ptr; 269 *payload = t; 270 return (0); 271 } 272 default: 273 #ifdef TFTP_DEBUG 274 printf("tftp type %d not handled\n", ntohs(t->th_opcode)); 275 #endif 276 free(ptr); 277 return (-1); 278 } 279 } 280 281 /* send request, expect first block (or error) */ 282 static int 283 tftp_makereq(struct tftp_handle *h) 284 { 285 struct { 286 u_char header[HEADER_SIZE]; 287 struct tftphdr t; 288 u_char space[FNAME_SIZE + 6]; 289 } __packed __aligned(4) wbuf; 290 struct tftprecv_extra recv_extra; 291 char *wtail; 292 int l; 293 ssize_t res; 294 void *pkt; 295 struct tftphdr *t; 296 char *tftp_blksize = NULL; 297 int blksize_l; 298 299 /* 300 * Allow overriding default TFTP block size by setting 301 * a tftp.blksize environment variable. 302 */ 303 if ((tftp_blksize = getenv("tftp.blksize")) != NULL) { 304 tftp_set_blksize(h, tftp_blksize); 305 } 306 307 wbuf.t.th_opcode = htons((u_short) RRQ); 308 wtail = wbuf.t.th_stuff; 309 l = strlen(h->path); 310 #ifdef TFTP_PREPEND_PATH 311 if (l > FNAME_SIZE - (sizeof(TFTP_PREPEND_PATH) - 1)) 312 return (ENAMETOOLONG); 313 bcopy(TFTP_PREPEND_PATH, wtail, sizeof(TFTP_PREPEND_PATH) - 1); 314 wtail += sizeof(TFTP_PREPEND_PATH) - 1; 315 #else 316 if (l > FNAME_SIZE) 317 return (ENAMETOOLONG); 318 #endif 319 bcopy(h->path, wtail, l + 1); 320 wtail += l + 1; 321 bcopy("octet", wtail, 6); 322 wtail += 6; 323 bcopy("blksize", wtail, 8); 324 wtail += 8; 325 blksize_l = sprintf(wtail, "%d", h->tftp_blksize); 326 wtail += blksize_l + 1; 327 bcopy("tsize", wtail, 6); 328 wtail += 6; 329 bcopy("0", wtail, 2); 330 wtail += 2; 331 332 /* h->iodesc->myport = htons(--tftpport); */ 333 h->iodesc->myport = htons(tftpport + (getsecs() & 0x3ff)); 334 h->iodesc->destport = htons(IPPORT_TFTP); 335 h->iodesc->xid = 1; /* expected block */ 336 337 h->currblock = 0; 338 h->islastblock = 0; 339 h->validsize = 0; 340 341 pkt = NULL; 342 recv_extra.tftp_handle = h; 343 res = sendrecv(h->iodesc, &sendudp, &wbuf.t, wtail - (char *) &wbuf.t, 344 (void *)&recvtftp, &pkt, (void **)&t, &recv_extra); 345 if (res == -1) { 346 free(pkt); 347 return (errno); 348 } 349 350 free(h->pkt); 351 h->pkt = pkt; 352 h->tftp_hdr = t; 353 354 if (recv_extra.rtype == OACK) 355 return (tftp_getnextblock(h)); 356 357 /* Server ignored our blksize request, revert to TFTP default. */ 358 h->tftp_blksize = SEGSIZE; 359 360 switch (recv_extra.rtype) { 361 case DATA: { 362 h->currblock = 1; 363 h->validsize = res; 364 h->islastblock = 0; 365 if (res < h->tftp_blksize) { 366 h->islastblock = 1; /* very short file */ 367 tftp_sendack(h); 368 } 369 return (0); 370 } 371 case ERROR: 372 default: 373 return (errno); 374 } 375 376 } 377 378 /* ack block, expect next */ 379 static int 380 tftp_getnextblock(struct tftp_handle *h) 381 { 382 struct { 383 u_char header[HEADER_SIZE]; 384 struct tftphdr t; 385 } __packed __aligned(4) wbuf; 386 struct tftprecv_extra recv_extra; 387 char *wtail; 388 int res; 389 void *pkt; 390 struct tftphdr *t; 391 wbuf.t.th_opcode = htons((u_short) ACK); 392 wtail = (char *) &wbuf.t.th_block; 393 wbuf.t.th_block = htons((u_short) h->currblock); 394 wtail += 2; 395 396 h->iodesc->xid = h->currblock + 1; /* expected block */ 397 398 pkt = NULL; 399 recv_extra.tftp_handle = h; 400 res = sendrecv(h->iodesc, &sendudp, &wbuf.t, wtail - (char *) &wbuf.t, 401 (void *)&recvtftp, &pkt, (void **)&t, &recv_extra); 402 403 if (res == -1) { /* 0 is OK! */ 404 free(pkt); 405 return (errno); 406 } 407 408 free(h->pkt); 409 h->pkt = pkt; 410 h->tftp_hdr = t; 411 h->currblock++; 412 h->validsize = res; 413 if (res < h->tftp_blksize) 414 h->islastblock = 1; /* EOF */ 415 416 if (h->islastblock == 1) { 417 /* Send an ACK for the last block */ 418 wbuf.t.th_block = htons((u_short) h->currblock); 419 sendudp(h->iodesc, &wbuf.t, wtail - (char *)&wbuf.t); 420 } 421 422 return (0); 423 } 424 425 static int 426 tftp_open(const char *path, struct open_file *f) 427 { 428 struct tftp_handle *tftpfile; 429 struct iodesc *io; 430 int res; 431 size_t pathsize; 432 const char *extraslash; 433 434 if (netproto != NET_TFTP) 435 return (EINVAL); 436 437 if (f->f_dev->dv_type != DEVT_NET) 438 return (EINVAL); 439 440 if (is_open) 441 return (EBUSY); 442 443 tftpfile = (struct tftp_handle *) malloc(sizeof(*tftpfile)); 444 if (!tftpfile) 445 return (ENOMEM); 446 447 memset(tftpfile, 0, sizeof(*tftpfile)); 448 tftpfile->tftp_blksize = TFTP_REQUESTED_BLKSIZE; 449 tftpfile->iodesc = io = socktodesc(*(int *) (f->f_devdata)); 450 if (io == NULL) { 451 free(tftpfile); 452 return (EINVAL); 453 } 454 455 io->destip = servip; 456 tftpfile->off = 0; 457 pathsize = (strlen(rootpath) + 1 + strlen(path) + 1) * sizeof(char); 458 tftpfile->path = malloc(pathsize); 459 if (tftpfile->path == NULL) { 460 free(tftpfile); 461 return(ENOMEM); 462 } 463 if (rootpath[strlen(rootpath) - 1] == '/' || path[0] == '/') 464 extraslash = ""; 465 else 466 extraslash = "/"; 467 res = snprintf(tftpfile->path, pathsize, "%s%s%s", 468 rootpath, extraslash, path); 469 if (res < 0 || res > pathsize) { 470 free(tftpfile->path); 471 free(tftpfile); 472 return(ENOMEM); 473 } 474 475 res = tftp_makereq(tftpfile); 476 477 if (res) { 478 free(tftpfile->path); 479 free(tftpfile->pkt); 480 free(tftpfile); 481 return (res); 482 } 483 f->f_fsdata = (void *) tftpfile; 484 is_open = 1; 485 return (0); 486 } 487 488 static int 489 tftp_read(struct open_file *f, void *addr, size_t size, 490 size_t *resid /* out */) 491 { 492 struct tftp_handle *tftpfile; 493 int rc; 494 495 rc = 0; 496 tftpfile = (struct tftp_handle *) f->f_fsdata; 497 498 while (size > 0) { 499 int needblock, count; 500 501 twiddle(32); 502 503 needblock = tftpfile->off / tftpfile->tftp_blksize + 1; 504 505 if (tftpfile->currblock > needblock) { /* seek backwards */ 506 tftp_senderr(tftpfile, 0, "No error: read aborted"); 507 rc = tftp_makereq(tftpfile); 508 if (rc != 0) 509 break; 510 } 511 512 while (tftpfile->currblock < needblock) { 513 514 rc = tftp_getnextblock(tftpfile); 515 if (rc) { /* no answer */ 516 #ifdef TFTP_DEBUG 517 printf("tftp: read error\n"); 518 #endif 519 return (rc); 520 } 521 if (tftpfile->islastblock) 522 break; 523 } 524 525 if (tftpfile->currblock == needblock) { 526 int offinblock, inbuffer; 527 528 offinblock = tftpfile->off % tftpfile->tftp_blksize; 529 530 inbuffer = tftpfile->validsize - offinblock; 531 if (inbuffer < 0) { 532 #ifdef TFTP_DEBUG 533 printf("tftp: invalid offset %d\n", 534 tftpfile->off); 535 #endif 536 return (EINVAL); 537 } 538 count = (size < inbuffer ? size : inbuffer); 539 bcopy(tftpfile->tftp_hdr->th_data + offinblock, 540 addr, count); 541 542 addr = (char *)addr + count; 543 tftpfile->off += count; 544 size -= count; 545 546 if ((tftpfile->islastblock) && (count == inbuffer)) 547 break; /* EOF */ 548 } else { 549 #ifdef TFTP_DEBUG 550 printf("tftp: block %d not found\n", needblock); 551 #endif 552 return (EINVAL); 553 } 554 555 } 556 557 if (resid) 558 *resid = size; 559 return (rc); 560 } 561 562 static int 563 tftp_close(struct open_file *f) 564 { 565 struct tftp_handle *tftpfile; 566 tftpfile = (struct tftp_handle *) f->f_fsdata; 567 568 /* let it time out ... */ 569 570 if (tftpfile) { 571 free(tftpfile->path); 572 free(tftpfile->pkt); 573 free(tftpfile); 574 } 575 is_open = 0; 576 return (0); 577 } 578 579 static int 580 tftp_stat(struct open_file *f, struct stat *sb) 581 { 582 struct tftp_handle *tftpfile; 583 tftpfile = (struct tftp_handle *) f->f_fsdata; 584 585 sb->st_mode = 0444 | S_IFREG; 586 sb->st_nlink = 1; 587 sb->st_uid = 0; 588 sb->st_gid = 0; 589 sb->st_size = (off_t) tftpfile->tftp_tsize; 590 return (0); 591 } 592 593 static off_t 594 tftp_seek(struct open_file *f, off_t offset, int where) 595 { 596 struct tftp_handle *tftpfile; 597 tftpfile = (struct tftp_handle *) f->f_fsdata; 598 599 switch (where) { 600 case SEEK_SET: 601 tftpfile->off = offset; 602 break; 603 case SEEK_CUR: 604 tftpfile->off += offset; 605 break; 606 default: 607 errno = EOFFSET; 608 return (-1); 609 } 610 return (tftpfile->off); 611 } 612 613 static int 614 tftp_set_blksize(struct tftp_handle *h, const char *str) 615 { 616 char *endptr; 617 int new_blksize; 618 int ret = 0; 619 620 if (h == NULL || str == NULL) 621 return (ret); 622 623 new_blksize = 624 (unsigned int)strtol(str, &endptr, 0); 625 626 /* 627 * Only accept blksize value if it is numeric. 628 * RFC2348 specifies that acceptable values are 8-65464. 629 * Let's choose a limit less than MAXRSPACE. 630 */ 631 if (*endptr == '\0' && new_blksize >= 8 632 && new_blksize <= TFTP_MAX_BLKSIZE) { 633 h->tftp_blksize = new_blksize; 634 ret = 1; 635 } 636 637 return (ret); 638 } 639 640 /* 641 * In RFC2347, the TFTP Option Acknowledgement package (OACK) 642 * is used to acknowledge a client's option negotiation request. 643 * The format of an OACK packet is: 644 * +-------+---~~---+---+---~~---+---+---~~---+---+---~~---+---+ 645 * | opc | opt1 | 0 | value1 | 0 | optN | 0 | valueN | 0 | 646 * +-------+---~~---+---+---~~---+---+---~~---+---+---~~---+---+ 647 * 648 * opc 649 * The opcode field contains a 6, for Option Acknowledgment. 650 * 651 * opt1 652 * The first option acknowledgment, copied from the original 653 * request. 654 * 655 * value1 656 * The acknowledged value associated with the first option. If 657 * and how this value may differ from the original request is 658 * detailed in the specification for the option. 659 * 660 * optN, valueN 661 * The final option/value acknowledgment pair. 662 */ 663 static int 664 tftp_parse_oack(struct tftp_handle *h, char *buf, size_t len) 665 { 666 /* 667 * We parse the OACK strings into an array 668 * of name-value pairs. 669 */ 670 char *tftp_options[128] = { 0 }; 671 char *val = buf; 672 int i = 0; 673 int option_idx = 0; 674 int blksize_is_set = 0; 675 int tsize = 0; 676 677 unsigned int orig_blksize; 678 679 while (option_idx < 128 && i < len) { 680 if (buf[i] == '\0') { 681 if (&buf[i] > val) { 682 tftp_options[option_idx] = val; 683 val = &buf[i] + 1; 684 ++option_idx; 685 } 686 } 687 ++i; 688 } 689 690 /* Save the block size we requested for sanity check later. */ 691 orig_blksize = h->tftp_blksize; 692 693 /* 694 * Parse individual TFTP options. 695 * * "blksize" is specified in RFC2348. 696 * * "tsize" is specified in RFC2349. 697 */ 698 for (i = 0; i < option_idx; i += 2) { 699 if (strcasecmp(tftp_options[i], "blksize") == 0) { 700 if (i + 1 < option_idx) 701 blksize_is_set = 702 tftp_set_blksize(h, tftp_options[i + 1]); 703 } else if (strcasecmp(tftp_options[i], "tsize") == 0) { 704 if (i + 1 < option_idx) 705 tsize = strtol(tftp_options[i + 1], (char **)NULL, 10); 706 if (tsize != 0) 707 h->tftp_tsize = tsize; 708 } else { 709 /* Do not allow any options we did not expect to be ACKed. */ 710 printf("unexpected tftp option '%s'\n", tftp_options[i]); 711 return (-1); 712 } 713 } 714 715 if (!blksize_is_set) { 716 /* 717 * If TFTP blksize was not set, try defaulting 718 * to the legacy TFTP blksize of SEGSIZE(512) 719 */ 720 h->tftp_blksize = SEGSIZE; 721 } else if (h->tftp_blksize > orig_blksize) { 722 /* 723 * Server should not be proposing block sizes that 724 * exceed what we said we can handle. 725 */ 726 printf("unexpected blksize %u\n", h->tftp_blksize); 727 return (-1); 728 } 729 730 #ifdef TFTP_DEBUG 731 printf("tftp_blksize: %u\n", h->tftp_blksize); 732 printf("tftp_tsize: %lu\n", h->tftp_tsize); 733 #endif 734 return 0; 735 } 736