1 /* $NetBSD: tftp.c,v 1.4 1997/09/17 16:57:07 drochner Exp $ */ 2 3 /* 4 * Copyright (c) 1996 5 * Matthias Drochner. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. All advertising materials mentioning features or use of this software 16 * must display the following acknowledgement: 17 * This product includes software developed for the NetBSD Project 18 * by Matthias Drochner. 19 * 4. The name of the author may not be used to endorse or promote products 20 * derived from this software without specific prior written permission. 21 * 22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 23 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 24 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 25 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 26 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 27 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 31 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 32 */ 33 34 #include <sys/cdefs.h> 35 36 /* 37 * Simple TFTP implementation for libsa. 38 * Assumes: 39 * - socket descriptor (int) at open_file->f_devdata 40 * - server host IP in global servip 41 * Restrictions: 42 * - read only 43 * - lseek only with SEEK_SET or SEEK_CUR 44 * - no big time differences between transfers (<tftp timeout) 45 */ 46 47 #include <sys/types.h> 48 #include <sys/stat.h> 49 #include <netinet/in.h> 50 #include <netinet/udp.h> 51 #include <netinet/in_systm.h> 52 #include <arpa/tftp.h> 53 54 #include <string.h> 55 56 #include "stand.h" 57 #include "net.h" 58 #include "netif.h" 59 60 #include "tftp.h" 61 62 struct tftp_handle; 63 64 static int tftp_open(const char *path, struct open_file *f); 65 static int tftp_close(struct open_file *f); 66 static int tftp_parse_oack(struct tftp_handle *h, char *buf, size_t len); 67 static int tftp_read(struct open_file *f, void *buf, size_t size, size_t *resid); 68 static int tftp_write(struct open_file *f, void *buf, size_t size, size_t *resid); 69 static off_t tftp_seek(struct open_file *f, off_t offset, int where); 70 static int tftp_set_blksize(struct tftp_handle *h, const char *str); 71 static int tftp_stat(struct open_file *f, struct stat *sb); 72 static ssize_t sendrecv_tftp(struct tftp_handle *h, 73 ssize_t (*sproc)(struct iodesc *, void *, size_t), 74 void *sbuf, size_t ssize, 75 ssize_t (*rproc)(struct tftp_handle *h, void **, void **, time_t, unsigned short *), 76 void **, void **, unsigned short *rtype); 77 78 struct fs_ops tftp_fsops = { 79 "tftp", 80 tftp_open, 81 tftp_close, 82 tftp_read, 83 tftp_write, 84 tftp_seek, 85 tftp_stat, 86 null_readdir 87 }; 88 89 extern struct in_addr servip; 90 91 static int tftpport = 2000; 92 static int is_open = 0; 93 94 /* 95 * The legacy TFTP_BLKSIZE value was SEGSIZE(512). 96 * TFTP_REQUESTED_BLKSIZE of 1428 is (Ethernet MTU, less the TFTP, UDP and 97 * IP header lengths). 98 */ 99 #define TFTP_REQUESTED_BLKSIZE 1428 100 101 /* 102 * Choose a blksize big enough so we can test with Ethernet 103 * Jumbo frames in the future. 104 */ 105 #define TFTP_MAX_BLKSIZE 9008 106 107 struct tftp_handle { 108 struct iodesc *iodesc; 109 int currblock; /* contents of lastdata */ 110 int islastblock; /* flag */ 111 int validsize; 112 int off; 113 char *path; /* saved for re-requests */ 114 unsigned int tftp_blksize; 115 unsigned long tftp_tsize; 116 void *pkt; 117 struct tftphdr *tftp_hdr; 118 }; 119 120 #define TFTP_MAX_ERRCODE EOPTNEG 121 static const int tftperrors[TFTP_MAX_ERRCODE + 1] = { 122 0, /* ??? */ 123 ENOENT, 124 EPERM, 125 ENOSPC, 126 EINVAL, /* ??? */ 127 EINVAL, /* ??? */ 128 EEXIST, 129 EINVAL, /* ??? */ 130 EINVAL, /* Option negotiation failed. */ 131 }; 132 133 static int tftp_getnextblock(struct tftp_handle *h); 134 135 /* send error message back. */ 136 static void 137 tftp_senderr(struct tftp_handle *h, u_short errcode, const char *msg) 138 { 139 struct { 140 u_char header[HEADER_SIZE]; 141 struct tftphdr t; 142 u_char space[63]; /* +1 from t */ 143 } __packed __aligned(4) wbuf; 144 char *wtail; 145 int len; 146 147 len = strlen(msg); 148 if (len > sizeof(wbuf.space)) 149 len = sizeof(wbuf.space); 150 151 wbuf.t.th_opcode = htons((u_short) ERROR); 152 wbuf.t.th_code = htons(errcode); 153 154 wtail = wbuf.t.th_msg; 155 bcopy(msg, wtail, len); 156 wtail[len] = '\0'; 157 wtail += len + 1; 158 159 sendudp(h->iodesc, &wbuf.t, wtail - (char *) &wbuf.t); 160 } 161 162 static void 163 tftp_sendack(struct tftp_handle *h) 164 { 165 struct { 166 u_char header[HEADER_SIZE]; 167 struct tftphdr t; 168 } __packed __aligned(4) wbuf; 169 char *wtail; 170 171 wbuf.t.th_opcode = htons((u_short) ACK); 172 wtail = (char *) &wbuf.t.th_block; 173 wbuf.t.th_block = htons((u_short) h->currblock); 174 wtail += 2; 175 176 sendudp(h->iodesc, &wbuf.t, wtail - (char *) &wbuf.t); 177 } 178 179 static ssize_t 180 recvtftp(struct tftp_handle *h, void **pkt, void **payload, time_t tleft, 181 unsigned short *rtype) 182 { 183 struct iodesc *d = h->iodesc; 184 struct tftphdr *t; 185 void *ptr = NULL; 186 ssize_t len; 187 188 errno = 0; 189 190 len = readudp(d, &ptr, (void **)&t, tleft); 191 192 if (len < 4) { 193 free(ptr); 194 return (-1); 195 } 196 197 *rtype = ntohs(t->th_opcode); 198 switch (ntohs(t->th_opcode)) { 199 case DATA: { 200 int got; 201 202 if (htons(t->th_block) != (u_short) d->xid) { 203 /* 204 * Expected block? 205 */ 206 free(ptr); 207 return (-1); 208 } 209 if (d->xid == 1) { 210 /* 211 * First data packet from new port. 212 */ 213 struct udphdr *uh; 214 uh = (struct udphdr *) t - 1; 215 d->destport = uh->uh_sport; 216 } /* else check uh_sport has not changed??? */ 217 got = len - (t->th_data - (char *)t); 218 *pkt = ptr; 219 *payload = t; 220 return (got); 221 } 222 case ERROR: 223 if ((unsigned) ntohs(t->th_code) > TFTP_MAX_ERRCODE) { 224 printf("illegal tftp error %d\n", ntohs(t->th_code)); 225 errno = EIO; 226 } else { 227 #ifdef TFTP_DEBUG 228 printf("tftp-error %d\n", ntohs(t->th_code)); 229 #endif 230 errno = tftperrors[ntohs(t->th_code)]; 231 } 232 free(ptr); 233 return (-1); 234 case OACK: { 235 struct udphdr *uh; 236 int tftp_oack_len; 237 238 /* 239 * Unexpected OACK. TFTP transfer already in progress. 240 * Drop the pkt. 241 */ 242 if (d->xid != 1) { 243 free(ptr); 244 return (-1); 245 } 246 247 /* 248 * Remember which port this OACK came from, because we need 249 * to send the ACK or errors back to it. 250 */ 251 uh = (struct udphdr *) t - 1; 252 d->destport = uh->uh_sport; 253 254 /* Parse options ACK-ed by the server. */ 255 tftp_oack_len = len - sizeof(t->th_opcode); 256 if (tftp_parse_oack(h, t->th_u.tu_stuff, tftp_oack_len) != 0) { 257 tftp_senderr(h, EOPTNEG, "Malformed OACK"); 258 errno = EIO; 259 free(ptr); 260 return (-1); 261 } 262 *pkt = ptr; 263 *payload = t; 264 return (0); 265 } 266 default: 267 #ifdef TFTP_DEBUG 268 printf("tftp type %d not handled\n", ntohs(t->th_opcode)); 269 #endif 270 free(ptr); 271 return (-1); 272 } 273 } 274 275 /* send request, expect first block (or error) */ 276 static int 277 tftp_makereq(struct tftp_handle *h) 278 { 279 struct { 280 u_char header[HEADER_SIZE]; 281 struct tftphdr t; 282 u_char space[FNAME_SIZE + 6]; 283 } __packed __aligned(4) wbuf; 284 char *wtail; 285 int l; 286 ssize_t res; 287 void *pkt; 288 struct tftphdr *t; 289 char *tftp_blksize = NULL; 290 int blksize_l; 291 unsigned short rtype = 0; 292 293 /* 294 * Allow overriding default TFTP block size by setting 295 * a tftp.blksize environment variable. 296 */ 297 if ((tftp_blksize = getenv("tftp.blksize")) != NULL) { 298 tftp_set_blksize(h, tftp_blksize); 299 } 300 301 wbuf.t.th_opcode = htons((u_short) RRQ); 302 wtail = wbuf.t.th_stuff; 303 l = strlen(h->path); 304 #ifdef TFTP_PREPEND_PATH 305 if (l > FNAME_SIZE - (sizeof(TFTP_PREPEND_PATH) - 1)) 306 return (ENAMETOOLONG); 307 bcopy(TFTP_PREPEND_PATH, wtail, sizeof(TFTP_PREPEND_PATH) - 1); 308 wtail += sizeof(TFTP_PREPEND_PATH) - 1; 309 #else 310 if (l > FNAME_SIZE) 311 return (ENAMETOOLONG); 312 #endif 313 bcopy(h->path, wtail, l + 1); 314 wtail += l + 1; 315 bcopy("octet", wtail, 6); 316 wtail += 6; 317 bcopy("blksize", wtail, 8); 318 wtail += 8; 319 blksize_l = sprintf(wtail, "%d", h->tftp_blksize); 320 wtail += blksize_l + 1; 321 bcopy("tsize", wtail, 6); 322 wtail += 6; 323 bcopy("0", wtail, 2); 324 wtail += 2; 325 326 /* h->iodesc->myport = htons(--tftpport); */ 327 h->iodesc->myport = htons(tftpport + (getsecs() & 0x3ff)); 328 h->iodesc->destport = htons(IPPORT_TFTP); 329 h->iodesc->xid = 1; /* expected block */ 330 331 h->currblock = 0; 332 h->islastblock = 0; 333 h->validsize = 0; 334 335 pkt = NULL; 336 res = sendrecv_tftp(h, &sendudp, &wbuf.t, wtail - (char *) &wbuf.t, 337 &recvtftp, &pkt, (void **)&t, &rtype); 338 if (res == -1) { 339 free(pkt); 340 return (errno); 341 } 342 343 free(h->pkt); 344 h->pkt = pkt; 345 h->tftp_hdr = t; 346 347 if (rtype == OACK) 348 return (tftp_getnextblock(h)); 349 350 /* Server ignored our blksize request, revert to TFTP default. */ 351 h->tftp_blksize = SEGSIZE; 352 353 switch (rtype) { 354 case DATA: { 355 h->currblock = 1; 356 h->validsize = res; 357 h->islastblock = 0; 358 if (res < h->tftp_blksize) { 359 h->islastblock = 1; /* very short file */ 360 tftp_sendack(h); 361 } 362 return (0); 363 } 364 case ERROR: 365 default: 366 return (errno); 367 } 368 369 } 370 371 /* ack block, expect next */ 372 static int 373 tftp_getnextblock(struct tftp_handle *h) 374 { 375 struct { 376 u_char header[HEADER_SIZE]; 377 struct tftphdr t; 378 } __packed __aligned(4) wbuf; 379 char *wtail; 380 int res; 381 void *pkt; 382 struct tftphdr *t; 383 unsigned short rtype = 0; 384 wbuf.t.th_opcode = htons((u_short) ACK); 385 wtail = (char *) &wbuf.t.th_block; 386 wbuf.t.th_block = htons((u_short) h->currblock); 387 wtail += 2; 388 389 h->iodesc->xid = h->currblock + 1; /* expected block */ 390 391 pkt = NULL; 392 res = sendrecv_tftp(h, &sendudp, &wbuf.t, wtail - (char *) &wbuf.t, 393 &recvtftp, &pkt, (void **)&t, &rtype); 394 395 if (res == -1) { /* 0 is OK! */ 396 free(pkt); 397 return (errno); 398 } 399 400 free(h->pkt); 401 h->pkt = pkt; 402 h->tftp_hdr = t; 403 h->currblock++; 404 h->validsize = res; 405 if (res < h->tftp_blksize) 406 h->islastblock = 1; /* EOF */ 407 408 if (h->islastblock == 1) { 409 /* Send an ACK for the last block */ 410 wbuf.t.th_block = htons((u_short) h->currblock); 411 sendudp(h->iodesc, &wbuf.t, wtail - (char *)&wbuf.t); 412 } 413 414 return (0); 415 } 416 417 static int 418 tftp_open(const char *path, struct open_file *f) 419 { 420 struct tftp_handle *tftpfile; 421 struct iodesc *io; 422 int res; 423 size_t pathsize; 424 const char *extraslash; 425 426 if (netproto != NET_TFTP) 427 return (EINVAL); 428 429 if (f->f_dev->dv_type != DEVT_NET) 430 return (EINVAL); 431 432 if (is_open) 433 return (EBUSY); 434 435 tftpfile = (struct tftp_handle *) malloc(sizeof(*tftpfile)); 436 if (!tftpfile) 437 return (ENOMEM); 438 439 memset(tftpfile, 0, sizeof(*tftpfile)); 440 tftpfile->tftp_blksize = TFTP_REQUESTED_BLKSIZE; 441 tftpfile->iodesc = io = socktodesc(*(int *) (f->f_devdata)); 442 if (io == NULL) 443 return (EINVAL); 444 445 io->destip = servip; 446 tftpfile->off = 0; 447 pathsize = (strlen(rootpath) + 1 + strlen(path) + 1) * sizeof(char); 448 tftpfile->path = malloc(pathsize); 449 if (tftpfile->path == NULL) { 450 free(tftpfile); 451 return(ENOMEM); 452 } 453 if (rootpath[strlen(rootpath) - 1] == '/' || path[0] == '/') 454 extraslash = ""; 455 else 456 extraslash = "/"; 457 res = snprintf(tftpfile->path, pathsize, "%s%s%s", 458 rootpath, extraslash, path); 459 if (res < 0 || res > pathsize) { 460 free(tftpfile->path); 461 free(tftpfile); 462 return(ENOMEM); 463 } 464 465 res = tftp_makereq(tftpfile); 466 467 if (res) { 468 free(tftpfile->path); 469 free(tftpfile->pkt); 470 free(tftpfile); 471 return (res); 472 } 473 f->f_fsdata = (void *) tftpfile; 474 is_open = 1; 475 return (0); 476 } 477 478 static int 479 tftp_read(struct open_file *f, void *addr, size_t size, 480 size_t *resid /* out */) 481 { 482 struct tftp_handle *tftpfile; 483 tftpfile = (struct tftp_handle *) f->f_fsdata; 484 485 while (size > 0) { 486 int needblock, count; 487 488 twiddle(32); 489 490 needblock = tftpfile->off / tftpfile->tftp_blksize + 1; 491 492 if (tftpfile->currblock > needblock) { /* seek backwards */ 493 tftp_senderr(tftpfile, 0, "No error: read aborted"); 494 tftp_makereq(tftpfile); /* no error check, it worked 495 * for open */ 496 } 497 498 while (tftpfile->currblock < needblock) { 499 int res; 500 501 res = tftp_getnextblock(tftpfile); 502 if (res) { /* no answer */ 503 #ifdef TFTP_DEBUG 504 printf("tftp: read error\n"); 505 #endif 506 return (res); 507 } 508 if (tftpfile->islastblock) 509 break; 510 } 511 512 if (tftpfile->currblock == needblock) { 513 int offinblock, inbuffer; 514 515 offinblock = tftpfile->off % tftpfile->tftp_blksize; 516 517 inbuffer = tftpfile->validsize - offinblock; 518 if (inbuffer < 0) { 519 #ifdef TFTP_DEBUG 520 printf("tftp: invalid offset %d\n", 521 tftpfile->off); 522 #endif 523 return (EINVAL); 524 } 525 count = (size < inbuffer ? size : inbuffer); 526 bcopy(tftpfile->tftp_hdr->th_data + offinblock, 527 addr, count); 528 529 addr = (char *)addr + count; 530 tftpfile->off += count; 531 size -= count; 532 533 if ((tftpfile->islastblock) && (count == inbuffer)) 534 break; /* EOF */ 535 } else { 536 #ifdef TFTP_DEBUG 537 printf("tftp: block %d not found\n", needblock); 538 #endif 539 return (EINVAL); 540 } 541 542 } 543 544 if (resid) 545 *resid = size; 546 return (0); 547 } 548 549 static int 550 tftp_close(struct open_file *f) 551 { 552 struct tftp_handle *tftpfile; 553 tftpfile = (struct tftp_handle *) f->f_fsdata; 554 555 /* let it time out ... */ 556 557 if (tftpfile) { 558 free(tftpfile->path); 559 free(tftpfile->pkt); 560 free(tftpfile); 561 } 562 is_open = 0; 563 return (0); 564 } 565 566 static int 567 tftp_write(struct open_file *f __unused, void *start __unused, size_t size __unused, 568 size_t *resid __unused /* out */) 569 { 570 return (EROFS); 571 } 572 573 static int 574 tftp_stat(struct open_file *f, struct stat *sb) 575 { 576 struct tftp_handle *tftpfile; 577 tftpfile = (struct tftp_handle *) f->f_fsdata; 578 579 sb->st_mode = 0444 | S_IFREG; 580 sb->st_nlink = 1; 581 sb->st_uid = 0; 582 sb->st_gid = 0; 583 sb->st_size = (off_t) tftpfile->tftp_tsize; 584 return (0); 585 } 586 587 static off_t 588 tftp_seek(struct open_file *f, off_t offset, int where) 589 { 590 struct tftp_handle *tftpfile; 591 tftpfile = (struct tftp_handle *) f->f_fsdata; 592 593 switch (where) { 594 case SEEK_SET: 595 tftpfile->off = offset; 596 break; 597 case SEEK_CUR: 598 tftpfile->off += offset; 599 break; 600 default: 601 errno = EOFFSET; 602 return (-1); 603 } 604 return (tftpfile->off); 605 } 606 607 static ssize_t 608 sendrecv_tftp(struct tftp_handle *h, 609 ssize_t (*sproc)(struct iodesc *, void *, size_t), 610 void *sbuf, size_t ssize, 611 ssize_t (*rproc)(struct tftp_handle *, void **, void **, time_t, 612 unsigned short *), 613 void **pkt, void **payload, unsigned short *rtype) 614 { 615 struct iodesc *d = h->iodesc; 616 ssize_t cc; 617 time_t t, t1, tleft; 618 619 #ifdef TFTP_DEBUG 620 if (debug) 621 printf("sendrecv: called\n"); 622 #endif 623 624 tleft = MINTMO; 625 t = t1 = getsecs(); 626 for (;;) { 627 if ((getsecs() - t) > MAXTMO) { 628 errno = ETIMEDOUT; 629 return -1; 630 } 631 632 cc = (*sproc)(d, sbuf, ssize); 633 if (cc != -1 && cc < ssize) 634 panic("sendrecv: short write! (%zd < %zu)", 635 cc, ssize); 636 637 if (cc == -1) { 638 /* Error on transmit; wait before retrying */ 639 while ((getsecs() - t1) < tleft); 640 t1 = getsecs(); 641 continue; 642 } 643 644 t = t1 = getsecs(); 645 recvnext: 646 if ((getsecs() - t) > MAXTMO) { 647 errno = ETIMEDOUT; 648 return (-1); 649 } 650 /* Try to get a packet and process it. */ 651 cc = (*rproc)(h, pkt, payload, tleft, rtype); 652 /* Return on data, EOF or real error. */ 653 if (cc != -1 || (errno != 0 && errno != ETIMEDOUT)) 654 return (cc); 655 if ((getsecs() - t1) < tleft) { 656 goto recvnext; 657 } 658 659 /* Timed out or didn't get the packet we're waiting for */ 660 tleft += MINTMO; 661 if (tleft > (2 * MINTMO)) { 662 tleft = (2 * MINTMO); 663 } 664 t1 = getsecs(); 665 } 666 } 667 668 static int 669 tftp_set_blksize(struct tftp_handle *h, const char *str) 670 { 671 char *endptr; 672 int new_blksize; 673 int ret = 0; 674 675 if (h == NULL || str == NULL) 676 return (ret); 677 678 new_blksize = 679 (unsigned int)strtol(str, &endptr, 0); 680 681 /* 682 * Only accept blksize value if it is numeric. 683 * RFC2348 specifies that acceptable values are 8-65464. 684 * Let's choose a limit less than MAXRSPACE. 685 */ 686 if (*endptr == '\0' && new_blksize >= 8 687 && new_blksize <= TFTP_MAX_BLKSIZE) { 688 h->tftp_blksize = new_blksize; 689 ret = 1; 690 } 691 692 return (ret); 693 } 694 695 /* 696 * In RFC2347, the TFTP Option Acknowledgement package (OACK) 697 * is used to acknowledge a client's option negotiation request. 698 * The format of an OACK packet is: 699 * +-------+---~~---+---+---~~---+---+---~~---+---+---~~---+---+ 700 * | opc | opt1 | 0 | value1 | 0 | optN | 0 | valueN | 0 | 701 * +-------+---~~---+---+---~~---+---+---~~---+---+---~~---+---+ 702 * 703 * opc 704 * The opcode field contains a 6, for Option Acknowledgment. 705 * 706 * opt1 707 * The first option acknowledgment, copied from the original 708 * request. 709 * 710 * value1 711 * The acknowledged value associated with the first option. If 712 * and how this value may differ from the original request is 713 * detailed in the specification for the option. 714 * 715 * optN, valueN 716 * The final option/value acknowledgment pair. 717 */ 718 static int 719 tftp_parse_oack(struct tftp_handle *h, char *buf, size_t len) 720 { 721 /* 722 * We parse the OACK strings into an array 723 * of name-value pairs. 724 */ 725 char *tftp_options[128] = { 0 }; 726 char *val = buf; 727 int i = 0; 728 int option_idx = 0; 729 int blksize_is_set = 0; 730 int tsize = 0; 731 732 unsigned int orig_blksize; 733 734 while (option_idx < 128 && i < len) { 735 if (buf[i] == '\0') { 736 if (&buf[i] > val) { 737 tftp_options[option_idx] = val; 738 val = &buf[i] + 1; 739 ++option_idx; 740 } 741 } 742 ++i; 743 } 744 745 /* Save the block size we requested for sanity check later. */ 746 orig_blksize = h->tftp_blksize; 747 748 /* 749 * Parse individual TFTP options. 750 * * "blksize" is specified in RFC2348. 751 * * "tsize" is specified in RFC2349. 752 */ 753 for (i = 0; i < option_idx; i += 2) { 754 if (strcasecmp(tftp_options[i], "blksize") == 0) { 755 if (i + 1 < option_idx) 756 blksize_is_set = 757 tftp_set_blksize(h, tftp_options[i + 1]); 758 } else if (strcasecmp(tftp_options[i], "tsize") == 0) { 759 if (i + 1 < option_idx) 760 tsize = strtol(tftp_options[i + 1], (char **)NULL, 10); 761 if (tsize != 0) 762 h->tftp_tsize = tsize; 763 } else { 764 /* Do not allow any options we did not expect to be ACKed. */ 765 printf("unexpected tftp option '%s'\n", tftp_options[i]); 766 return (-1); 767 } 768 } 769 770 if (!blksize_is_set) { 771 /* 772 * If TFTP blksize was not set, try defaulting 773 * to the legacy TFTP blksize of SEGSIZE(512) 774 */ 775 h->tftp_blksize = SEGSIZE; 776 } else if (h->tftp_blksize > orig_blksize) { 777 /* 778 * Server should not be proposing block sizes that 779 * exceed what we said we can handle. 780 */ 781 printf("unexpected blksize %u\n", h->tftp_blksize); 782 return (-1); 783 } 784 785 #ifdef TFTP_DEBUG 786 printf("tftp_blksize: %u\n", h->tftp_blksize); 787 printf("tftp_tsize: %lu\n", h->tftp_tsize); 788 #endif 789 return 0; 790 } 791