2 * Copyright 1994, 1995, 2000 Neil Russell.
5 * Copyright 2011 Comelit Group SpA,
10 #include <display_options.h>
11 #include <efi_loader.h>
19 #include <asm/global_data.h>
23 DECLARE_GLOBAL_DATA_PTR;
25 /* Well known TFTP port # */
26 #define WELL_KNOWN_PORT 69
27 /* Millisecs to timeout for lost pkt */
28 #define TIMEOUT 5000UL
29 /* Number of "loading" hashes per line (for checking the image size) */
30 #define HASHES_PER_LINE 65
42 static ulong timeout_ms = TIMEOUT;
43 static int timeout_count_max = (CONFIG_NET_RETRY_COUNT * 2);
44 static ulong time_start; /* Record time we started tftp */
45 static struct in6_addr tftp_remote_ip6;
48 * These globals govern the timeout behavior when attempting a connection to a
49 * TFTP server. tftp_timeout_ms specifies the number of milliseconds to
50 * wait for the server to respond to initial connection. Second global,
51 * tftp_timeout_count_max, gives the number of such connection retries.
52 * tftp_timeout_count_max must be non-negative and tftp_timeout_ms must be
53 * positive. The globals are meant to be set (and restored) by code needing
54 * non-standard timeout behavior when initiating a TFTP transfer.
56 ulong tftp_timeout_ms = TIMEOUT;
57 int tftp_timeout_count_max = (CONFIG_NET_RETRY_COUNT * 2);
60 TFTP_ERR_UNDEFINED = 0,
61 TFTP_ERR_FILE_NOT_FOUND = 1,
62 TFTP_ERR_ACCESS_DENIED = 2,
63 TFTP_ERR_DISK_FULL = 3,
64 TFTP_ERR_UNEXPECTED_OPCODE = 4,
65 TFTP_ERR_UNKNOWN_TRANSFER_ID = 5,
66 TFTP_ERR_FILE_ALREADY_EXISTS = 6,
67 TFTP_ERR_OPTION_NEGOTIATION = 8,
70 static struct in_addr tftp_remote_ip;
71 /* The UDP port at their end */
72 static int tftp_remote_port;
73 /* The UDP port at our end */
74 static int tftp_our_port;
75 static int timeout_count;
76 /* packet sequence number */
77 static ulong tftp_cur_block;
78 /* last packet sequence number received */
79 static ulong tftp_prev_block;
80 /* count of sequence number wraparounds */
81 static ulong tftp_block_wrap;
82 /* memory offset due to wrapping */
83 static ulong tftp_block_wrap_offset;
84 static int tftp_state;
85 static ulong tftp_load_addr;
87 static ulong tftp_load_size;
89 #ifdef CONFIG_TFTP_TSIZE
90 /* The file size reported by the server */
91 static int tftp_tsize;
92 /* The number of hashes we printed */
93 static short tftp_tsize_num_hash;
95 /* The window size negotiated */
96 static ushort tftp_windowsize;
97 /* Next block to send ack to */
98 static ushort tftp_next_ack;
99 /* Last nack block we send */
100 static ushort tftp_last_nack;
101 #ifdef CONFIG_CMD_TFTPPUT
102 /* 1 if writing, else 0 */
103 static int tftp_put_active;
104 /* 1 if we have sent the last block */
105 static int tftp_put_final_block_sent;
107 #define tftp_put_active 0
110 #define STATE_SEND_RRQ 1
112 #define STATE_TOO_LARGE 3
113 #define STATE_BAD_MAGIC 4
115 #define STATE_RECV_WRQ 6
116 #define STATE_SEND_WRQ 7
117 #define STATE_INVALID_OPTION 8
119 /* default TFTP block size */
120 #define TFTP_BLOCK_SIZE 512
121 #define TFTP_MTU_BLOCKSIZE6 (CONFIG_TFTP_BLOCKSIZE - 20)
122 /* sequence number is 16 bit */
123 #define TFTP_SEQUENCE_SIZE ((ulong)(1<<16))
125 #define DEFAULT_NAME_LEN (8 + 4 + 1)
126 static char default_filename[DEFAULT_NAME_LEN];
128 #ifndef CONFIG_TFTP_FILE_NAME_MAX_LEN
131 #define MAX_LEN CONFIG_TFTP_FILE_NAME_MAX_LEN
134 static char tftp_filename[MAX_LEN];
136 /* 512 is poor choice for ethernet, MTU is typically 1500.
137 * Minus eth.hdrs thats 1468. Can get 2x better throughput with
138 * almost-MTU block sizes. At least try... fall back to 512 if need be.
139 * (but those using CONFIG_IP_DEFRAG may want to set a larger block in cfg file)
142 /* When windowsize is defined to 1,
143 * tftp behaves the same way as it was
146 #ifdef CONFIG_TFTP_WINDOWSIZE
147 #define TFTP_WINDOWSIZE CONFIG_TFTP_WINDOWSIZE
149 #define TFTP_WINDOWSIZE 1
152 static unsigned short tftp_block_size = TFTP_BLOCK_SIZE;
153 static unsigned short tftp_block_size_option = CONFIG_TFTP_BLOCKSIZE;
154 static unsigned short tftp_window_size_option = TFTP_WINDOWSIZE;
156 static inline int store_block(int block, uchar *src, unsigned int len)
158 ulong offset = block * tftp_block_size + tftp_block_wrap_offset -
160 ulong newsize = offset + len;
161 ulong store_addr = tftp_load_addr + offset;
165 ulong end_addr = tftp_load_addr + tftp_load_size;
168 end_addr = ULONG_MAX;
170 if (store_addr < tftp_load_addr ||
171 store_addr + len > end_addr) {
172 puts("\nTFTP error: ");
173 puts("trying to overwrite reserved memory...\n");
177 ptr = map_sysmem(store_addr, len);
178 memcpy(ptr, src, len);
181 if (net_boot_file_size < newsize)
182 net_boot_file_size = newsize;
187 /* Clear our state ready for a new transfer */
188 static void new_transfer(void)
192 tftp_block_wrap_offset = 0;
193 #ifdef CONFIG_CMD_TFTPPUT
194 tftp_put_final_block_sent = 0;
198 #ifdef CONFIG_CMD_TFTPPUT
200 * Load the next block from memory to be sent over tftp.
202 * @param block Block number to send
203 * @param dst Destination buffer for data
204 * @param len Number of bytes in block (this one and every other)
205 * Return: number of bytes loaded
207 static int load_block(unsigned block, uchar *dst, unsigned len)
209 /* We may want to get the final block from the previous set */
210 ulong offset = block * tftp_block_size + tftp_block_wrap_offset -
214 tosend = min(net_boot_file_size - offset, tosend);
215 (void)memcpy(dst, (void *)(image_save_addr + offset), tosend);
216 debug("%s: block=%u, offset=%lu, len=%u, tosend=%lu\n", __func__,
217 block, offset, len, tosend);
222 static void tftp_send(void);
223 static void tftp_timeout_handler(void);
225 /**********************************************************************/
227 static void show_block_marker(void)
231 #ifdef CONFIG_TFTP_TSIZE
233 pos = tftp_cur_block * tftp_block_size +
234 tftp_block_wrap_offset;
235 if (pos > tftp_tsize)
238 while (tftp_tsize_num_hash < pos * 50 / tftp_tsize) {
240 tftp_tsize_num_hash++;
245 pos = (tftp_cur_block - 1) +
246 (tftp_block_wrap * TFTP_SEQUENCE_SIZE);
249 else if (((pos + 1) % (10 * HASHES_PER_LINE)) == 0)
255 * restart the current transfer due to an error
257 * @param msg Message to print for user
259 static void restart(const char *msg)
261 printf("\n%s; starting again\n", msg);
266 * Check if the block number has wrapped, and update progress
268 * TODO: The egregious use of global variables in this file should be tidied.
270 static void update_block_number(void)
273 * RFC1350 specifies that the first data packet will
274 * have sequence number 1. If we receive a sequence
275 * number of 0 this means that there was a wrap
276 * around of the (16 bit) counter.
278 if (tftp_cur_block == 0 && tftp_prev_block != 0) {
280 tftp_block_wrap_offset += tftp_block_size * TFTP_SEQUENCE_SIZE;
281 timeout_count = 0; /* we've done well, reset the timeout */
286 /* The TFTP get or put is complete */
287 static void tftp_complete(void)
289 #ifdef CONFIG_TFTP_TSIZE
290 /* Print hash marks for the last packet received */
291 while (tftp_tsize && tftp_tsize_num_hash < 49) {
293 tftp_tsize_num_hash++;
296 print_size(tftp_tsize, "");
298 time_start = get_timer(time_start);
299 if (time_start > 0) {
300 puts("\n\t "); /* Line up with "Loading: " */
301 print_size(net_boot_file_size /
302 time_start * 1000, "/s");
305 if (IS_ENABLED(CONFIG_CMD_BOOTEFI)) {
306 if (!tftp_put_active)
307 efi_set_bootdev("Net", "", tftp_filename,
308 map_sysmem(tftp_load_addr, 0),
311 net_set_state(NETLOOP_SUCCESS);
314 static void tftp_send(void)
320 bool err_pkt = false;
323 * We will always be sending some sort of packet, so
324 * cobble together the packet headers now.
326 if (IS_ENABLED(CONFIG_IPV6) && use_ip6)
327 pkt = net_tx_packet + net_eth_hdr_size() +
328 IP6_HDR_SIZE + UDP_HDR_SIZE;
330 pkt = net_tx_packet + net_eth_hdr_size() + IP_UDP_HDR_SIZE;
332 switch (tftp_state) {
337 #ifdef CONFIG_CMD_TFTPPUT
338 *s++ = htons(tftp_state == STATE_SEND_RRQ ? TFTP_RRQ :
341 *s++ = htons(TFTP_RRQ);
344 strcpy((char *)pkt, tftp_filename);
345 pkt += strlen(tftp_filename) + 1;
346 strcpy((char *)pkt, "octet");
347 pkt += 5 /*strlen("octet")*/ + 1;
348 strcpy((char *)pkt, "timeout");
349 pkt += 7 /*strlen("timeout")*/ + 1;
350 sprintf((char *)pkt, "%lu", timeout_ms / 1000);
351 debug("send option \"timeout %s\"\n", (char *)pkt);
352 pkt += strlen((char *)pkt) + 1;
353 #ifdef CONFIG_TFTP_TSIZE
354 pkt += sprintf((char *)pkt, "tsize%c%u%c",
355 0, net_boot_file_size, 0);
357 /* try for more effic. blk size */
358 pkt += sprintf((char *)pkt, "blksize%c%d%c",
359 0, tftp_block_size_option, 0);
361 /* try for more effic. window size.
362 * Implemented only for tftp get.
363 * Don't bother sending if it's 1
365 if (tftp_state == STATE_SEND_RRQ && tftp_window_size_option > 1)
366 pkt += sprintf((char *)pkt, "windowsize%c%d%c",
367 0, tftp_window_size_option, 0);
377 s[0] = htons(TFTP_ACK);
378 s[1] = htons(tftp_cur_block);
379 pkt = (uchar *)(s + 2);
380 #ifdef CONFIG_CMD_TFTPPUT
381 if (tftp_put_active) {
382 int toload = tftp_block_size;
383 int loaded = load_block(tftp_cur_block, pkt, toload);
385 s[0] = htons(TFTP_DATA);
387 tftp_put_final_block_sent = (loaded < toload);
393 case STATE_TOO_LARGE:
396 *s++ = htons(TFTP_ERROR);
400 strcpy((char *)pkt, "File too large");
401 pkt += 14 /*strlen("File too large")*/ + 1;
406 case STATE_BAD_MAGIC:
409 *s++ = htons(TFTP_ERROR);
412 strcpy((char *)pkt, "File has bad magic");
413 pkt += 18 /*strlen("File has bad magic")*/ + 1;
418 case STATE_INVALID_OPTION:
421 *s++ = htons(TFTP_ERROR);
422 *s++ = htons(TFTP_ERR_OPTION_NEGOTIATION);
424 strcpy((char *)pkt, "Option Negotiation Failed");
425 /* strlen("Option Negotiation Failed") + NULL*/
432 if (IS_ENABLED(CONFIG_IPV6) && use_ip6)
433 net_send_udp_packet6(net_server_ethaddr,
438 net_send_udp_packet(net_server_ethaddr, tftp_remote_ip,
439 tftp_remote_port, tftp_our_port, len);
442 net_set_state(NETLOOP_FAIL);
445 #ifdef CONFIG_CMD_TFTPPUT
446 static void icmp_handler(unsigned type, unsigned code, unsigned dest,
447 struct in_addr sip, unsigned src, uchar *pkt,
450 if (type == ICMP_NOT_REACH && code == ICMP_NOT_REACH_PORT) {
451 /* Oh dear the other end has gone away */
452 restart("TFTP server died");
457 static void tftp_handler(uchar *pkt, unsigned dest, struct in_addr sip,
458 unsigned src, unsigned len)
463 u16 timeout_val_rcvd;
465 if (dest != tftp_our_port) {
468 if (tftp_state != STATE_SEND_RRQ && src != tftp_remote_port &&
469 tftp_state != STATE_RECV_WRQ && tftp_state != STATE_SEND_WRQ)
475 /* warning: don't use increment (++) in ntohs() macros!! */
479 switch (ntohs(proto)) {
484 #ifdef CONFIG_CMD_TFTPPUT
485 if (tftp_put_active) {
486 if (tftp_put_final_block_sent) {
490 * Move to the next block. We want our block
491 * count to wrap just like the other end!
493 int block = ntohs(*s);
494 int ack_ok = (tftp_cur_block == block);
496 tftp_prev_block = tftp_cur_block;
497 tftp_cur_block = (unsigned short)(block + 1);
498 update_block_number();
500 tftp_send(); /* Send next data block */
509 #ifdef CONFIG_CMD_TFTPSRV
512 tftp_remote_ip = sip;
513 tftp_remote_port = src;
514 tftp_our_port = 1024 + (get_timer(0) % 3072);
516 tftp_send(); /* Send ACK(0) */
522 for (i = 0; i < len; i++) {
529 tftp_state = STATE_OACK;
530 tftp_remote_port = src;
532 * Check for 'blksize' option.
533 * Careful: "i" is signed, "len" is unsigned, thus
534 * something like "len-8" may give a *huge* number
536 for (i = 0; i+8 < len; i++) {
537 if (strcasecmp((char *)pkt + i, "blksize") == 0) {
538 tftp_block_size = (unsigned short)
539 dectoul((char *)pkt + i + 8, NULL);
540 debug("Blocksize oack: %s, %d\n",
541 (char *)pkt + i + 8, tftp_block_size);
542 if (tftp_block_size > tftp_block_size_option) {
543 printf("Invalid blk size(=%d)\n",
545 tftp_state = STATE_INVALID_OPTION;
548 if (strcasecmp((char *)pkt + i, "timeout") == 0) {
549 timeout_val_rcvd = (unsigned short)
550 dectoul((char *)pkt + i + 8, NULL);
551 debug("Timeout oack: %s, %d\n",
552 (char *)pkt + i + 8, timeout_val_rcvd);
553 if (timeout_val_rcvd != (timeout_ms / 1000)) {
554 printf("Invalid timeout val(=%d s)\n",
556 tftp_state = STATE_INVALID_OPTION;
559 #ifdef CONFIG_TFTP_TSIZE
560 if (strcasecmp((char *)pkt + i, "tsize") == 0) {
561 tftp_tsize = dectoul((char *)pkt + i + 6,
563 debug("size = %s, %d\n",
564 (char *)pkt + i + 6, tftp_tsize);
567 if (strcasecmp((char *)pkt + i, "windowsize") == 0) {
569 dectoul((char *)pkt + i + 11, NULL);
570 debug("windowsize = %s, %d\n",
571 (char *)pkt + i + 11, tftp_windowsize);
575 tftp_next_ack = tftp_windowsize;
577 #ifdef CONFIG_CMD_TFTPPUT
578 if (tftp_put_active && tftp_state == STATE_OACK) {
579 /* Get ready to send the first block */
580 tftp_state = STATE_DATA;
584 tftp_send(); /* Send ACK or first data block */
591 if (ntohs(*(__be16 *)pkt) != (ushort)(tftp_cur_block + 1)) {
592 debug("Received unexpected block: %d, expected: %d\n",
593 ntohs(*(__be16 *)pkt),
594 (ushort)(tftp_cur_block + 1));
596 * Only ACK if the block count received is greater than
597 * the expected block count, otherwise skip ACK.
598 * (required to properly handle the server retransmitting
601 if ((ushort)(tftp_cur_block + 1) - (short)(ntohs(*(__be16 *)pkt)) > 0)
604 * If one packet is dropped most likely
605 * all other buffers in the window
606 * that will arrive will cause a sending NACK.
607 * This just overwellms the server, let's just send one.
609 if (tftp_last_nack != tftp_cur_block) {
611 tftp_last_nack = tftp_cur_block;
612 tftp_next_ack = (ushort)(tftp_cur_block +
619 tftp_cur_block %= TFTP_SEQUENCE_SIZE;
621 if (tftp_state == STATE_SEND_RRQ) {
622 debug("Server did not acknowledge any options!\n");
623 tftp_next_ack = tftp_windowsize;
626 if (tftp_state == STATE_SEND_RRQ || tftp_state == STATE_OACK ||
627 tftp_state == STATE_RECV_WRQ) {
628 /* first block received */
629 tftp_state = STATE_DATA;
630 tftp_remote_port = src;
633 if (tftp_cur_block != 1) { /* Assertion */
634 puts("\nTFTP error: ");
635 printf("First block is not block 1 (%ld)\n",
637 puts("Starting again\n\n");
643 if (tftp_cur_block == tftp_prev_block) {
644 /* Same block again; ignore it. */
648 update_block_number();
649 tftp_prev_block = tftp_cur_block;
650 timeout_count_max = tftp_timeout_count_max;
651 net_set_timeout_handler(timeout_ms, tftp_timeout_handler);
653 if (store_block(tftp_cur_block, pkt + 2, len)) {
655 net_set_state(NETLOOP_FAIL);
659 if (len < tftp_block_size) {
666 * Acknowledge the block just received, which will prompt
667 * the remote for the next one.
669 if (tftp_cur_block == tftp_next_ack) {
671 tftp_next_ack += tftp_windowsize;
676 printf("\nTFTP error: '%s' (%d)\n",
677 pkt + 2, ntohs(*(__be16 *)pkt));
679 switch (ntohs(*(__be16 *)pkt)) {
680 case TFTP_ERR_FILE_NOT_FOUND:
681 case TFTP_ERR_ACCESS_DENIED:
682 puts("Not retrying...\n");
684 net_set_state(NETLOOP_FAIL);
686 case TFTP_ERR_UNDEFINED:
687 case TFTP_ERR_DISK_FULL:
688 case TFTP_ERR_UNEXPECTED_OPCODE:
689 case TFTP_ERR_UNKNOWN_TRANSFER_ID:
690 case TFTP_ERR_FILE_ALREADY_EXISTS:
692 puts("Starting again\n\n");
701 static void tftp_timeout_handler(void)
703 if (++timeout_count > timeout_count_max) {
704 restart("Retry count exceeded");
707 net_set_timeout_handler(timeout_ms, tftp_timeout_handler);
708 if (tftp_state != STATE_RECV_WRQ)
713 /* Initialize tftp_load_addr and tftp_load_size from image_load_addr and lmb */
714 static int tftp_init_load_addr(void)
718 phys_size_t max_size;
720 lmb_init_and_reserve(&lmb, gd->bd, (void *)gd->fdt_blob);
722 max_size = lmb_get_free_size(&lmb, image_load_addr);
726 tftp_load_size = max_size;
728 tftp_load_addr = image_load_addr;
732 static int saved_tftp_block_size_option;
733 static void sanitize_tftp_block_size_option(enum proto_t protocol)
739 max_defrag = config_opt_enabled(CONFIG_IP_DEFRAG, CONFIG_NET_MAXDEFRAG, 0);
741 /* Account for IP, UDP and TFTP headers. */
742 cap = max_defrag - (20 + 8 + 4);
743 /* RFC2348 sets a hard upper limit. */
744 cap = min(cap, 65464);
748 * If not CONFIG_IP_DEFRAG, cap at the same value as
749 * for tftp put, namely normal MTU minus protocol
756 * U-Boot does not support IP fragmentation on TX, so
757 * this must be small enough that it fits normal MTU
758 * (and small enough that it fits net_tx_packet which
759 * has room for PKTSIZE_ALIGN bytes).
763 if (tftp_block_size_option > cap) {
764 printf("Capping tftp block size option to %d (was %d)\n",
765 cap, tftp_block_size_option);
766 saved_tftp_block_size_option = tftp_block_size_option;
767 tftp_block_size_option = cap;
771 void tftp_start(enum proto_t protocol)
773 __maybe_unused char *ep; /* Environment pointer */
775 if (saved_tftp_block_size_option) {
776 tftp_block_size_option = saved_tftp_block_size_option;
777 saved_tftp_block_size_option = 0;
780 if (IS_ENABLED(CONFIG_NET_TFTP_VARS)) {
783 * Allow the user to choose TFTP blocksize and timeout.
784 * TFTP protocol has a minimal timeout of 1 second.
787 ep = env_get("tftpblocksize");
789 tftp_block_size_option = simple_strtol(ep, NULL, 10);
791 ep = env_get("tftpwindowsize");
793 tftp_window_size_option = simple_strtol(ep, NULL, 10);
795 ep = env_get("tftptimeout");
797 timeout_ms = simple_strtol(ep, NULL, 10);
799 if (timeout_ms < 1000) {
800 printf("TFTP timeout (%ld ms) too low, set min = 1000 ms\n",
805 ep = env_get("tftptimeoutcountmax");
807 tftp_timeout_count_max = simple_strtol(ep, NULL, 10);
809 if (tftp_timeout_count_max < 0) {
810 printf("TFTP timeout count max (%d ms) negative, set to 0\n",
811 tftp_timeout_count_max);
812 tftp_timeout_count_max = 0;
816 sanitize_tftp_block_size_option(protocol);
818 debug("TFTP blocksize = %i, TFTP windowsize = %d timeout = %ld ms\n",
819 tftp_block_size_option, tftp_window_size_option, timeout_ms);
821 if (IS_ENABLED(CONFIG_IPV6))
822 tftp_remote_ip6 = net_server_ip6;
824 tftp_remote_ip = net_server_ip;
825 if (!net_parse_bootfile(&tftp_remote_ip, tftp_filename, MAX_LEN)) {
826 sprintf(default_filename, "%02X%02X%02X%02X.img",
827 net_ip.s_addr & 0xFF,
828 (net_ip.s_addr >> 8) & 0xFF,
829 (net_ip.s_addr >> 16) & 0xFF,
830 (net_ip.s_addr >> 24) & 0xFF);
832 strncpy(tftp_filename, default_filename, DEFAULT_NAME_LEN);
833 tftp_filename[DEFAULT_NAME_LEN - 1] = 0;
835 printf("*** Warning: no boot file name; using '%s'\n",
839 if (IS_ENABLED(CONFIG_IPV6)) {
844 s = strchr(net_boot_file_name, '[');
845 e = strchr(net_boot_file_name, ']');
848 string_to_ip6(s + 1, len - 1, &tftp_remote_ip6);
849 strlcpy(tftp_filename, e + 2, MAX_LEN);
851 strlcpy(tftp_filename, net_boot_file_name, MAX_LEN);
852 tftp_filename[MAX_LEN - 1] = 0;
857 printf("Using %s device\n", eth_get_name());
859 if (IS_ENABLED(CONFIG_IPV6) && use_ip6) {
860 printf("TFTP from server %pI6c; our IP address is %pI6c",
861 &tftp_remote_ip6, &net_ip6);
863 if (tftp_block_size_option > TFTP_MTU_BLOCKSIZE6)
864 tftp_block_size_option = TFTP_MTU_BLOCKSIZE6;
866 printf("TFTP %s server %pI4; our IP address is %pI4",
867 #ifdef CONFIG_CMD_TFTPPUT
868 protocol == TFTPPUT ? "to" : "from",
872 &tftp_remote_ip, &net_ip);
875 /* Check if we need to send across this subnet */
876 if (IS_ENABLED(CONFIG_IPV6) && use_ip6) {
877 if (!ip6_addr_in_subnet(&net_ip6, &tftp_remote_ip6,
879 printf("; sending through gateway %pI6c",
881 } else if (net_gateway.s_addr && net_netmask.s_addr) {
882 struct in_addr our_net;
883 struct in_addr remote_net;
885 our_net.s_addr = net_ip.s_addr & net_netmask.s_addr;
886 remote_net.s_addr = tftp_remote_ip.s_addr & net_netmask.s_addr;
887 if (our_net.s_addr != remote_net.s_addr)
888 printf("; sending through gateway %pI4", &net_gateway);
892 printf("Filename '%s'.", tftp_filename);
894 if (net_boot_file_expected_size_in_blocks) {
895 printf(" Size is 0x%x Bytes = ",
896 net_boot_file_expected_size_in_blocks << 9);
897 print_size(net_boot_file_expected_size_in_blocks << 9, "");
901 #ifdef CONFIG_CMD_TFTPPUT
902 tftp_put_active = (protocol == TFTPPUT);
903 if (tftp_put_active) {
904 printf("Save address: 0x%lx\n", image_save_addr);
905 printf("Save size: 0x%lx\n", image_save_size);
906 net_boot_file_size = image_save_size;
908 tftp_state = STATE_SEND_WRQ;
913 if (tftp_init_load_addr()) {
915 net_set_state(NETLOOP_FAIL);
916 puts("\nTFTP error: ");
917 puts("trying to overwrite reserved memory...\n");
920 printf("Load address: 0x%lx\n", tftp_load_addr);
921 puts("Loading: *\b");
922 tftp_state = STATE_SEND_RRQ;
925 time_start = get_timer(0);
926 timeout_count_max = tftp_timeout_count_max;
928 net_set_timeout_handler(timeout_ms, tftp_timeout_handler);
929 net_set_udp_handler(tftp_handler);
930 #ifdef CONFIG_CMD_TFTPPUT
931 net_set_icmp_handler(icmp_handler);
933 tftp_remote_port = WELL_KNOWN_PORT;
935 /* Use a pseudo-random port unless a specific port is set */
936 tftp_our_port = 1024 + (get_timer(0) % 3072);
938 #ifdef CONFIG_TFTP_PORT
939 ep = env_get("tftpdstp");
941 tftp_remote_port = simple_strtol(ep, NULL, 10);
942 ep = env_get("tftpsrcp");
944 tftp_our_port = simple_strtol(ep, NULL, 10);
949 /* zero out server ether in case the server ip has changed */
950 memset(net_server_ethaddr, 0, 6);
951 /* Revert tftp_block_size to dflt */
952 tftp_block_size = TFTP_BLOCK_SIZE;
953 #ifdef CONFIG_TFTP_TSIZE
955 tftp_tsize_num_hash = 0;
961 #ifdef CONFIG_CMD_TFTPSRV
962 void tftp_start_server(void)
964 tftp_filename[0] = 0;
966 if (tftp_init_load_addr()) {
968 net_set_state(NETLOOP_FAIL);
969 puts("\nTFTP error: trying to overwrite reserved memory...\n");
972 printf("Using %s device\n", eth_get_name());
973 printf("Listening for TFTP transfer on %pI4\n", &net_ip);
974 printf("Load address: 0x%lx\n", tftp_load_addr);
976 puts("Loading: *\b");
978 timeout_count_max = tftp_timeout_count_max;
980 timeout_ms = TIMEOUT;
981 net_set_timeout_handler(timeout_ms, tftp_timeout_handler);
983 /* Revert tftp_block_size to dflt */
984 tftp_block_size = TFTP_BLOCK_SIZE;
986 tftp_our_port = WELL_KNOWN_PORT;
988 tftp_next_ack = tftp_windowsize;
990 #ifdef CONFIG_TFTP_TSIZE
992 tftp_tsize_num_hash = 0;
995 tftp_state = STATE_RECV_WRQ;
996 net_set_udp_handler(tftp_handler);
998 /* zero out server ether in case the server ip has changed */
999 memset(net_server_ethaddr, 0, 6);
1001 #endif /* CONFIG_CMD_TFTPSRV */