]>
Commit | Line | Data |
---|---|---|
4684b66f | 1 | /*++ |
2 | This file contains an 'Intel UEFI Application' and is | |
3 | licensed for Intel CPUs and chipsets under the terms of your | |
4 | license agreement with Intel or your vendor. This file may | |
5 | be modified by the user, subject to additional terms of the | |
6 | license agreement | |
7 | --*/ | |
8 | /*++ | |
9 | ||
10 | Copyright (c) 2011 Intel Corporation. All rights reserved | |
11 | This software and associated documentation (if any) is furnished | |
12 | under a license and may only be used or copied in accordance | |
13 | with the terms of the license. Except as permitted by such | |
14 | license, no part of this software or documentation may be | |
15 | reproduced, stored in a retrieval system, or transmitted in any | |
16 | form or by any means without the express written consent of | |
17 | Intel Corporation. | |
18 | ||
19 | --*/ | |
20 | ||
21 | /** @file | |
22 | This is a simple TFTP server application | |
23 | ||
24 | **/ | |
25 | ||
26 | #include <TftpServer.h> | |
27 | ||
28 | TSDT_TFTP_SERVER mTftpServer; ///< TFTP server's control structure | |
29 | ||
30 | ||
31 | /** | |
32 | Add a connection context to the list of connection contexts. | |
33 | ||
34 | @param [in] pTftpServer The TFTP server control structure address. | |
35 | ||
36 | @retval Context structure address, NULL if allocation fails | |
37 | ||
38 | **/ | |
39 | TSDT_CONNECTION_CONTEXT * | |
40 | ContextAdd ( | |
41 | IN TSDT_TFTP_SERVER * pTftpServer | |
42 | ) | |
43 | { | |
44 | size_t LengthInBytes; | |
45 | TSDT_CONNECTION_CONTEXT * pContext; | |
46 | EFI_STATUS Status; | |
47 | ||
48 | DBG_ENTER ( ); | |
49 | ||
50 | // | |
51 | // Use for/break instead of goto | |
52 | // | |
53 | for ( ; ; ) { | |
54 | // | |
55 | // Allocate a new context | |
56 | // | |
57 | LengthInBytes = sizeof ( *pContext ); | |
58 | Status = gBS->AllocatePool ( EfiRuntimeServicesData, | |
59 | LengthInBytes, | |
60 | (VOID **)&pContext ); | |
61 | if ( EFI_ERROR ( Status )) { | |
62 | DEBUG (( DEBUG_ERROR | DEBUG_POOL, | |
63 | "ERROR - Failed to allocate the context, Status: %r\r\n", | |
64 | Status )); | |
65 | pContext = NULL; | |
66 | break; | |
67 | } | |
68 | ||
69 | // | |
70 | // Initialize the context | |
71 | // | |
72 | ZeroMem ( pContext, LengthInBytes ); | |
73 | CopyMem ( &pContext->RemoteAddress, | |
74 | &pTftpServer->RemoteAddress, | |
75 | sizeof ( pContext->RemoteAddress )); | |
76 | pContext->BlockSize = TFTP_MAX_BLOCK_SIZE; | |
77 | pContext->pBuffer = &pContext->FileData[0]; | |
78 | pContext->pEnd = &pContext->pBuffer[sizeof ( pContext->pBuffer )]; | |
79 | pContext->MaxTransferSize = 0; | |
80 | pContext->MaxTransferSize -= 1; | |
81 | ||
82 | // | |
83 | // Display the new context | |
84 | // | |
85 | DEBUG (( DEBUG_PORT_WORK | DEBUG_INFO, | |
86 | "0x%08x: Context for %d.%d.%d.%d:%d\r\n", | |
87 | pContext, | |
88 | (UINT8)pContext->RemoteAddress.sin_addr.s_addr, | |
89 | (UINT8)( pContext->RemoteAddress.sin_addr.s_addr >> 8 ), | |
90 | (UINT8)( pContext->RemoteAddress.sin_addr.s_addr >> 16 ), | |
91 | (UINT8)( pContext->RemoteAddress.sin_addr.s_addr >> 24 ), | |
92 | htons ( pContext->RemoteAddress.sin_port ))); | |
93 | ||
94 | // | |
95 | // Add the context to the context list | |
96 | // | |
97 | pContext->pNext = pTftpServer->pContextList; | |
98 | pTftpServer->pContextList = pContext; | |
99 | ||
100 | // | |
101 | // All done | |
102 | // | |
103 | break; | |
104 | } | |
105 | ||
106 | // | |
107 | // Return the connection context | |
108 | // | |
109 | DBG_EXIT_STATUS ( pContext ); | |
110 | return pContext; | |
111 | } | |
112 | ||
113 | ||
114 | /** | |
115 | Locate a remote connection context. | |
116 | ||
117 | @param [in] pTftpServer The TFTP server control structure address. | |
118 | ||
119 | @param [in] pIpAddress The start of the remote IP address in network order | |
120 | ||
121 | @param [in] Port The remote port number | |
122 | ||
123 | @retval Context structure address, NULL if not found | |
124 | ||
125 | **/ | |
126 | TSDT_CONNECTION_CONTEXT * | |
127 | ContextFind ( | |
128 | IN TSDT_TFTP_SERVER * pTftpServer | |
129 | ) | |
130 | { | |
131 | TSDT_CONNECTION_CONTEXT * pContext; | |
132 | ||
133 | DBG_ENTER ( ); | |
134 | ||
135 | // | |
136 | // Walk the list of connection contexts | |
137 | // | |
138 | pContext = pTftpServer->pContextList; | |
139 | while ( NULL != pContext ) { | |
140 | // | |
141 | // Attempt to locate the remote network connection | |
142 | // | |
143 | if (( pTftpServer->RemoteAddress.sin_addr.s_addr == pContext->RemoteAddress.sin_addr.s_addr ) | |
144 | && ( pTftpServer->RemoteAddress.sin_port == pContext->RemoteAddress.sin_port )) { | |
145 | // | |
146 | // The connection was found | |
147 | // | |
148 | DEBUG (( DEBUG_TFTP_REQUEST, | |
149 | "0x%08x: pContext found\r\n", | |
150 | pContext )); | |
151 | break; | |
152 | } | |
153 | ||
154 | // | |
155 | // Set the next context | |
156 | // | |
157 | pContext = pContext->pNext; | |
158 | } | |
159 | ||
160 | // | |
161 | // Return the connection context structure address | |
162 | // | |
163 | DBG_EXIT_HEX ( pContext ); | |
164 | return pContext; | |
165 | } | |
166 | ||
167 | ||
168 | /** | |
169 | Remove a context from the list. | |
170 | ||
171 | @param [in] pTftpServer The TFTP server control structure address. | |
172 | ||
173 | @param [in] pContext The context structure address. | |
174 | ||
175 | **/ | |
176 | VOID | |
177 | ContextRemove ( | |
178 | IN TSDT_TFTP_SERVER * pTftpServer, | |
179 | IN TSDT_CONNECTION_CONTEXT * pContext | |
180 | ) | |
181 | { | |
182 | TSDT_CONNECTION_CONTEXT * pNextContext; | |
183 | TSDT_CONNECTION_CONTEXT * pPreviousContext; | |
184 | ||
185 | DBG_ENTER ( ); | |
186 | ||
187 | // | |
188 | // Attempt to locate the context in the list | |
189 | // | |
190 | pPreviousContext = NULL; | |
191 | pNextContext = pTftpServer->pContextList; | |
192 | while ( NULL != pNextContext ) { | |
193 | // | |
194 | // Determine if the context was found | |
195 | // | |
196 | if ( pNextContext == pContext ) { | |
197 | // | |
198 | // Remove the context from the list | |
199 | // | |
200 | if ( NULL == pPreviousContext ) { | |
201 | pTftpServer->pContextList = pContext->pNext; | |
202 | } | |
203 | else { | |
204 | pPreviousContext->pNext = pContext->pNext; | |
205 | } | |
206 | break; | |
207 | } | |
208 | ||
209 | // | |
210 | // Set the next context | |
211 | // | |
212 | pPreviousContext = pNextContext; | |
213 | pNextContext = pNextContext->pNext; | |
214 | } | |
215 | ||
216 | // | |
217 | // Determine if the context was found | |
218 | // | |
219 | if ( NULL != pContext ) { | |
220 | // | |
221 | // Return the resources | |
222 | // | |
223 | gBS->FreePool ( pContext ); | |
224 | } | |
225 | ||
226 | DBG_EXIT ( ); | |
227 | } | |
228 | ||
229 | ||
230 | /** | |
231 | Process the work for the sockets. | |
232 | ||
233 | @param [in] pTftpServer The TFTP server control structure address. | |
234 | ||
235 | **/ | |
236 | VOID | |
237 | PortWork ( | |
238 | IN TSDT_TFTP_SERVER * pTftpServer | |
239 | ) | |
240 | { | |
241 | TSDT_CONNECTION_CONTEXT * pContext; | |
242 | socklen_t RemoteAddressLength; | |
243 | ||
244 | DBG_ENTER ( ); | |
245 | ||
246 | // | |
247 | // Handle input events | |
248 | // | |
249 | if ( 0 != ( pTftpServer->TftpPort.revents & POLLRDNORM )) { | |
250 | // | |
251 | // Receive the message from the remote system | |
252 | // | |
253 | RemoteAddressLength = sizeof ( pTftpServer->RemoteAddress ); | |
254 | pTftpServer->RxBytes = recvfrom ( pTftpServer->TftpPort.fd, | |
255 | &pTftpServer->RxBuffer[0], | |
256 | sizeof ( pTftpServer->RxBuffer ), | |
257 | 0, | |
258 | (struct sockaddr *) &pTftpServer->RemoteAddress, | |
259 | &RemoteAddressLength ); | |
260 | if ( -1 != pTftpServer->RxBytes ) { | |
261 | pTftpServer->RemoteAddress.sin_len = (UINT8) RemoteAddressLength; | |
262 | DEBUG (( DEBUG_TFTP_PORT, | |
263 | "Received %d bytes from %d.%d.%d.%d:%d\r\n", | |
264 | pTftpServer->RxBytes, | |
265 | pTftpServer->RemoteAddress.sin_addr.s_addr & 0xff, | |
266 | ( pTftpServer->RemoteAddress.sin_addr.s_addr >> 8 ) & 0xff, | |
267 | ( pTftpServer->RemoteAddress.sin_addr.s_addr >> 16 ) & 0xff, | |
268 | ( pTftpServer->RemoteAddress.sin_addr.s_addr >> 24 ) & 0xff, | |
269 | htons ( pTftpServer->RemoteAddress.sin_port ))); | |
270 | ||
271 | // | |
272 | // Lookup connection context using the remote system address and port | |
273 | // to determine if an existing connection to this remote | |
274 | // system exists | |
275 | // | |
276 | pContext = ContextFind ( pTftpServer ); | |
277 | ||
278 | // | |
279 | // Process the received message | |
280 | // | |
281 | TftpProcessRequest ( pTftpServer, pContext ); | |
282 | } | |
283 | else { | |
284 | // | |
285 | // Receive error on the TFTP server port | |
286 | // Close the server socket | |
287 | // | |
288 | DEBUG (( DEBUG_ERROR, | |
289 | "ERROR - Failed receive on TFTP server port, errno: 0x%08x\r\n", | |
290 | errno )); | |
291 | pTftpServer->TftpPort.revents |= POLLHUP; | |
292 | } | |
293 | } | |
294 | ||
295 | // | |
296 | // Handle the close event | |
297 | // | |
298 | if ( 0 != ( pTftpServer->TftpPort.revents & POLLHUP )) { | |
299 | // | |
300 | // Close the port | |
301 | // | |
302 | close ( pTftpServer->TftpPort.fd ); | |
303 | pTftpServer->TftpPort.fd = -1; | |
304 | } | |
305 | ||
306 | DBG_EXIT ( ); | |
307 | } | |
308 | ||
309 | ||
310 | /** | |
311 | Scan the list of sockets and process any pending work | |
312 | ||
313 | @param [in] pTftpServer The TFTP server control structure address. | |
314 | ||
315 | **/ | |
316 | VOID | |
317 | SocketPoll ( | |
318 | IN TSDT_TFTP_SERVER * pTftpServer | |
319 | ) | |
320 | { | |
321 | int FDCount; | |
322 | ||
323 | DEBUG (( DEBUG_SOCKET_POLL, "Entering SocketPoll\r\n" )); | |
324 | ||
325 | // | |
326 | // Determine if any ports are active | |
327 | // | |
328 | FDCount = poll ( &pTftpServer->TftpPort, | |
329 | 1, | |
330 | CLIENT_POLL_DELAY ); | |
331 | if ( -1 == FDCount ) { | |
332 | DEBUG (( DEBUG_ERROR | DEBUG_SOCKET_POLL, | |
333 | "ERROR - errno: %d\r\n", | |
334 | errno )); | |
335 | } | |
336 | ||
337 | if ( 0 < FDCount ) { | |
338 | // | |
339 | // Process this port | |
340 | // | |
341 | PortWork ( pTftpServer ); | |
342 | pTftpServer->TftpPort.revents = 0; | |
343 | } | |
344 | ||
345 | DEBUG (( DEBUG_SOCKET_POLL, "Exiting SocketPoll\r\n" )); | |
346 | } | |
347 | ||
348 | ||
349 | /** | |
350 | Convert a character to lower case | |
351 | ||
352 | @param [in] Character The character to convert | |
353 | ||
354 | @returns The lower case equivalent of the character | |
355 | ||
356 | **/ | |
357 | int | |
358 | tolower ( | |
359 | int Character | |
360 | ) | |
361 | { | |
362 | // | |
363 | // Determine if the character is upper case | |
364 | // | |
365 | if (( 'A' <= Character ) && ( 'Z' >= Character )) { | |
366 | // | |
367 | // Convert the character to lower caes | |
368 | // | |
369 | Character += 'a' - 'A'; | |
370 | } | |
371 | ||
372 | // | |
373 | // Return the converted character | |
374 | // | |
375 | return Character; | |
376 | } | |
377 | ||
378 | ||
379 | /** | |
380 | Case independent string comparison | |
381 | ||
382 | @param [in] pString1 Zero terminated string address | |
383 | @param [in] pString2 Zero terminated string address | |
384 | ||
385 | @returns Returns the first character difference between string 1 | |
386 | and string 2. | |
387 | ||
388 | **/ | |
389 | int | |
390 | stricmp ( | |
391 | char * pString1, | |
392 | char * pString2 | |
393 | ) | |
394 | { | |
395 | int Char1; | |
396 | int Char2; | |
397 | int Difference; | |
398 | ||
399 | // | |
400 | // Walk the length of the strings | |
401 | // | |
402 | do { | |
403 | // | |
404 | // Get the next characters | |
405 | // | |
406 | Char1 = (UINT8)*pString1++; | |
407 | Char2 = (UINT8)*pString2++; | |
408 | ||
409 | // | |
410 | // Convert them to lower case | |
411 | // | |
412 | Char1 = tolower ( Char1 ); | |
413 | Char2 = tolower ( Char2 ); | |
414 | ||
415 | // | |
416 | // Done when the characters differ | |
417 | // | |
418 | Difference = Char1 - Char2; | |
419 | if ( 0 != Difference ) { | |
420 | break; | |
421 | } | |
422 | ||
423 | // | |
424 | // Done at the end of the string | |
425 | // | |
426 | } while ( 0 != Char1 ); | |
427 | ||
428 | // | |
429 | // Return the difference | |
430 | // | |
431 | return Difference; | |
432 | } | |
433 | ||
434 | ||
435 | /** | |
436 | Get the next TFTP option | |
437 | ||
438 | @param [in] pOption Address of a zero terminated option string | |
439 | @param [in] pEnd End of buffer address | |
440 | @param [in] ppNextOption Address to receive the address of the next | |
441 | zero terminated option string | |
442 | ||
443 | @retval EFI_SUCCESS Message processed successfully | |
444 | ||
445 | **/ | |
446 | EFI_STATUS | |
447 | TftpOptionGet ( | |
448 | IN UINT8 * pOption, | |
449 | IN UINT8 * pEnd, | |
450 | IN UINT8 ** ppNextOption | |
451 | ) | |
452 | { | |
453 | UINT8 * pNextOption; | |
454 | EFI_STATUS Status; | |
455 | ||
456 | // | |
457 | // Locate the end of the option | |
458 | // | |
459 | pNextOption = pOption; | |
460 | while (( pEnd > pNextOption ) && ( 0 != *pNextOption )) { | |
461 | pNextOption += 1; | |
462 | } | |
463 | if ( pEnd <= pNextOption ) { | |
464 | // | |
465 | // Error - end of buffer reached | |
466 | // | |
467 | DEBUG (( DEBUG_ERROR | DEBUG_TFTP_REQUEST, | |
468 | "ERROR - Option without zero termination received!\r\n" )); | |
469 | Status = EFI_INVALID_PARAMETER; | |
470 | } | |
471 | else { | |
472 | // | |
473 | // Zero terminated option found | |
474 | // | |
475 | pNextOption += 1; | |
476 | ||
477 | // | |
478 | // Display the zero terminated ASCII option string | |
479 | // | |
480 | DEBUG (( DEBUG_TFTP_REQUEST, | |
481 | "Option: %a\r\n", | |
482 | pOption )); | |
483 | Status = EFI_SUCCESS; | |
484 | } | |
485 | ||
486 | // | |
487 | // Return the next option address | |
488 | // | |
489 | *ppNextOption = pNextOption; | |
490 | ||
491 | // | |
492 | // Return the operation status | |
493 | // | |
494 | return Status; | |
495 | } | |
496 | ||
497 | ||
498 | /** | |
499 | Place an option value into the option acknowledgement | |
500 | ||
501 | @param [in] pOack Option acknowledgement address | |
502 | @param [in] Value Value to translate into ASCII decimal | |
503 | ||
504 | @returns Option acknowledgement address | |
505 | ||
506 | **/ | |
507 | UINT8 * | |
508 | TftpOptionSet ( | |
509 | IN UINT8 * pOack, | |
510 | IN UINT64 Value | |
511 | ) | |
512 | { | |
513 | UINT64 NextValue; | |
514 | ||
515 | // | |
516 | // Determine the next value | |
517 | // | |
518 | NextValue = Value / 10; | |
519 | ||
520 | // | |
521 | // Supress leading zeros | |
522 | // | |
523 | if ( 0 != NextValue ) { | |
524 | pOack = TftpOptionSet ( pOack, NextValue ); | |
525 | } | |
526 | ||
527 | // | |
528 | // Output this digit | |
529 | // | |
530 | *pOack++ = (UINT8)( Value - ( NextValue * 10 ) + '0' ); | |
531 | ||
532 | // | |
533 | // Return the next option acknowledgement location | |
534 | // | |
535 | return pOack; | |
536 | } | |
537 | ||
538 | ||
539 | /** | |
540 | Process the TFTP request | |
541 | ||
542 | @param [in] pContext The context structure address. | |
543 | @param [in] pOption Address of the first zero terminated option string | |
544 | @param [in] pEnd End of buffer address | |
545 | ||
546 | **/ | |
547 | VOID | |
548 | TftpOptions ( | |
549 | IN TSDT_CONNECTION_CONTEXT * pContext, | |
550 | IN UINT8 * pOption, | |
551 | IN UINT8 * pEnd | |
552 | ) | |
553 | { | |
554 | UINT8 * pNextOption; | |
555 | UINT8 * pOack; | |
556 | UINT8 * pTemp; | |
557 | UINT8 * pValue; | |
558 | EFI_STATUS Status; | |
559 | INT32 Value; | |
560 | ||
561 | // | |
562 | // Start the OACK packet | |
563 | // Let the OACK handle the parsing errors | |
564 | // See http://tools.ietf.org/html/rfc2347 | |
565 | // | |
566 | pOack = &pContext->TxBuffer[0]; | |
567 | *pOack++ = 0; | |
568 | *pOack++ = TFTP_OP_OACK; | |
569 | pContext->TxBytes = 2; | |
570 | ||
571 | // | |
572 | // Walk the list of options | |
573 | // | |
574 | do { | |
575 | // | |
576 | // Get the next option, skip junk at end of message | |
577 | // | |
578 | Status = TftpOptionGet ( pOption, pEnd, &pNextOption ); | |
579 | if ( !EFI_ERROR ( Status )) { | |
580 | // | |
581 | // Process the option | |
582 | // | |
583 | ||
584 | // | |
585 | // blksize - See http://tools.ietf.org/html/rfc2348 | |
586 | // | |
587 | pValue = pNextOption; | |
588 | if ( 0 == stricmp ((char *)pOption, "blksize" )) { | |
589 | // | |
590 | // Get the value | |
591 | // | |
592 | Status = TftpOptionGet ( pValue, pEnd, &pNextOption ); | |
593 | if ( !EFI_ERROR ( Status )) { | |
594 | // | |
595 | // Validate the block size, skip non-numeric block sizes | |
596 | // | |
597 | Status = TftpOptionValue ( pValue, &Value ); | |
598 | if ( !EFI_ERROR ( Status )) { | |
599 | // | |
600 | // Propose a smaller block size if necessary | |
601 | // | |
602 | if ( Value > TFTP_MAX_BLOCK_SIZE ) { | |
603 | Value = TFTP_MAX_BLOCK_SIZE; | |
604 | } | |
605 | ||
606 | // | |
607 | // Set the new block size | |
608 | // | |
609 | pContext->BlockSize = Value; | |
610 | DEBUG (( DEBUG_TFTP_REQUEST, | |
611 | "Using block size of %d bytes\r\n", | |
612 | pContext->BlockSize )); | |
613 | ||
614 | // | |
615 | // Update the OACK | |
616 | // | |
617 | pTemp = pOack; | |
618 | *pOack++ = 'b'; | |
619 | *pOack++ = 'l'; | |
620 | *pOack++ = 'k'; | |
621 | *pOack++ = 's'; | |
622 | *pOack++ = 'i'; | |
623 | *pOack++ = 'z'; | |
624 | *pOack++ = 'e'; | |
625 | *pOack++ = 0; | |
626 | pOack = TftpOptionSet ( pOack, pContext->BlockSize ); | |
627 | *pOack++ = 0; | |
628 | pContext->TxBytes += pOack - pTemp; | |
629 | } | |
630 | } | |
631 | } | |
632 | ||
633 | // | |
634 | // timeout - See http://tools.ietf.org/html/rfc2349 | |
635 | // | |
636 | else if ( 0 == stricmp ((char *)pOption, "timeout" )) { | |
637 | // | |
638 | // Get the value | |
639 | // | |
640 | Status = TftpOptionGet ( pValue, pEnd, &pNextOption ); | |
641 | if ( !EFI_ERROR ( Status )) { | |
642 | Status = TftpOptionValue ( pValue, &Value ); | |
643 | if ( !EFI_ERROR ( Status )) { | |
644 | // | |
645 | // Set the timeout value | |
646 | // | |
647 | pContext->Timeout = Value; | |
648 | DEBUG (( DEBUG_TFTP_REQUEST, | |
649 | "Using timeout of %d seconds\r\n", | |
650 | pContext->Timeout )); | |
651 | ||
652 | // | |
653 | // Update the OACK | |
654 | // | |
655 | pTemp = pOack; | |
656 | *pOack++ = 't'; | |
657 | *pOack++ = 'i'; | |
658 | *pOack++ = 'm'; | |
659 | *pOack++ = 'e'; | |
660 | *pOack++ = 'o'; | |
661 | *pOack++ = 'u'; | |
662 | *pOack++ = 't'; | |
663 | *pOack++ = 0; | |
664 | pOack = TftpOptionSet ( pOack, pContext->Timeout ); | |
665 | *pOack++ = 0; | |
666 | pContext->TxBytes += pOack - pTemp; | |
667 | } | |
668 | } | |
669 | } | |
670 | ||
671 | // | |
672 | // tsize - See http://tools.ietf.org/html/rfc2349 | |
673 | // | |
674 | else if ( 0 == stricmp ((char *)pOption, "tsize" )) { | |
675 | // | |
676 | // Get the value | |
677 | // | |
678 | Status = TftpOptionGet ( pValue, pEnd, &pNextOption ); | |
679 | if ( !EFI_ERROR ( Status )) { | |
680 | Status = TftpOptionValue ( pValue, &Value ); | |
681 | if ( !EFI_ERROR ( Status )) { | |
682 | // | |
683 | // Return the file size | |
684 | // | |
685 | DEBUG (( DEBUG_TFTP_REQUEST, | |
686 | "Returning file size of %Ld bytes\r\n", | |
687 | pContext->LengthInBytes )); | |
688 | ||
689 | // | |
690 | // Update the OACK | |
691 | // | |
692 | pTemp = pOack; | |
693 | *pOack++ = 't'; | |
694 | *pOack++ = 's'; | |
695 | *pOack++ = 'i'; | |
696 | *pOack++ = 'z'; | |
697 | *pOack++ = 'e'; | |
698 | *pOack++ = 0; | |
699 | pOack = TftpOptionSet ( pOack, pContext->LengthInBytes ); | |
700 | *pOack++ = 0; | |
701 | pContext->TxBytes += pOack - pTemp; | |
702 | } | |
703 | } | |
704 | } | |
705 | else { | |
706 | // | |
707 | // Unknown option - Ignore it | |
708 | // | |
709 | DEBUG (( DEBUG_WARN | DEBUG_TFTP_REQUEST, | |
710 | "WARNING - Skipping unknown option: %a\r\n", | |
711 | pOption )); | |
712 | } | |
713 | } | |
714 | ||
715 | // | |
716 | // Set the next option | |
717 | // | |
718 | pOption = pNextOption; | |
719 | } while ( pEnd > pOption ); | |
720 | } | |
721 | ||
722 | ||
723 | /** | |
724 | Process the TFTP request | |
725 | ||
726 | @param [in] pOption Address of the first zero terminated option string | |
727 | @param [in] pValue Address to receive the value | |
728 | ||
729 | @retval EFI_SUCCESS Option translated into a value | |
730 | ||
731 | **/ | |
732 | EFI_STATUS | |
733 | TftpOptionValue ( | |
734 | IN UINT8 * pOption, | |
735 | IN INT32 * pValue | |
736 | ) | |
737 | { | |
738 | UINT8 Digit; | |
739 | EFI_STATUS Status; | |
740 | INT32 Value; | |
741 | ||
742 | // | |
743 | // Assume success | |
744 | // | |
745 | Status = EFI_SUCCESS; | |
746 | ||
747 | // | |
748 | // Walk the characters in the option | |
749 | // | |
750 | Value = 0; | |
751 | while ( 0 != *pOption ) { | |
752 | // | |
753 | // Convert the next digit to binary | |
754 | // | |
755 | Digit = *pOption++; | |
756 | if (( '0' <= Digit ) && ( '9' >= Digit )) { | |
757 | Value *= 10; | |
758 | Value += Digit - '0'; | |
759 | } | |
760 | else { | |
761 | DEBUG (( DEBUG_ERROR | DEBUG_TFTP_REQUEST, | |
762 | "ERROR - Invalid character '0x%02x' in the value\r\n", | |
763 | Digit )); | |
764 | Status = EFI_INVALID_PARAMETER; | |
765 | break; | |
766 | } | |
767 | } | |
768 | ||
769 | // | |
770 | // Return the value | |
771 | // | |
772 | *pValue = Value; | |
773 | ||
774 | // | |
775 | // Return the conversion status | |
776 | // | |
777 | return Status; | |
778 | } | |
779 | ||
780 | ||
781 | /** | |
782 | Process the TFTP request | |
783 | ||
784 | @param [in] pTftpServer The TFTP server control structure address. | |
785 | @param [in] pContext Connection context structure address | |
786 | ||
787 | **/ | |
788 | VOID | |
789 | TftpProcessRequest ( | |
790 | IN TSDT_TFTP_SERVER * pTftpServer, | |
791 | IN TSDT_CONNECTION_CONTEXT * pContext | |
792 | ) | |
793 | { | |
794 | BOOLEAN bCloseContext; | |
795 | BOOLEAN bIgnorePacket; | |
796 | UINT16 BlockNumber; | |
797 | UINT16 Opcode; | |
798 | UINT8 * pBuffer; | |
799 | UINT8 * pEnd; | |
800 | UINT8 * pFileName; | |
801 | UINT8 * pMode; | |
802 | UINT8 * pOption; | |
803 | EFI_STATUS Status; | |
804 | ||
805 | DBG_ENTER ( ); | |
806 | ||
807 | // | |
808 | // Get the opcode | |
809 | // | |
810 | pBuffer = &pTftpServer->RxBuffer[0]; | |
811 | Opcode = HTONS ( *(UINT16 *)&pBuffer[0]); | |
812 | Print ( L"TFTP Opcode: 0x%08x\r\n", Opcode ); | |
813 | ||
814 | // | |
815 | // Validate the parameters | |
816 | // | |
817 | bCloseContext = FALSE; | |
818 | bIgnorePacket = FALSE; | |
819 | switch ( Opcode ) { | |
820 | default: | |
821 | DEBUG (( DEBUG_TFTP_REQUEST, | |
822 | "ERROR - Unknown TFTP opcode: %d\r\n", | |
823 | Opcode )); | |
824 | bIgnorePacket = TRUE; | |
825 | break; | |
826 | ||
827 | case TFTP_OP_READ_REQUEST: | |
828 | break; | |
829 | ||
830 | case TFTP_OP_DATA: | |
831 | if ( NULL == pContext ) { | |
832 | DEBUG (( DEBUG_ERROR, | |
833 | "ERROR - File not open for %d.%d.%d.%d:%d\r\n", | |
834 | (UINT8)pTftpServer->RemoteAddress.sin_addr.s_addr, | |
835 | (UINT8)( pTftpServer->RemoteAddress.sin_addr.s_addr >> 8 ), | |
836 | (UINT8)( pTftpServer->RemoteAddress.sin_addr.s_addr >> 16 ), | |
837 | (UINT8)( pTftpServer->RemoteAddress.sin_addr.s_addr >> 24 ), | |
838 | htons ( pTftpServer->RemoteAddress.sin_port ))); | |
839 | bIgnorePacket = TRUE; | |
840 | break; | |
841 | } | |
842 | if ( pContext->bExpectAck ) { | |
843 | DEBUG (( DEBUG_ERROR, | |
844 | "ERROR - Expecting ACKs not data for pContext 0x%08x\r\n", | |
845 | pContext )); | |
846 | bIgnorePacket = TRUE; | |
847 | break; | |
848 | } | |
849 | if ( pTftpServer->RxBytes > (ssize_t)( pContext->BlockSize + 2 + 2 )) | |
850 | { | |
851 | DEBUG (( DEBUG_ERROR, | |
852 | "ERROR - Receive data length of %d > %d bytes (maximum block size) for pContext 0x%08x\r\n", | |
853 | pTftpServer->RxBytes - 2 - 2, | |
854 | pContext->BlockSize, | |
855 | pContext )); | |
856 | bIgnorePacket = TRUE; | |
857 | break; | |
858 | } | |
859 | break; | |
860 | ||
861 | case TFTP_OP_ACK: | |
862 | if ( NULL == pContext ) { | |
863 | DEBUG (( DEBUG_ERROR, | |
864 | "ERROR - File not open for %d.%d.%d.%d:%d\r\n", | |
865 | (UINT8)pTftpServer->RemoteAddress.sin_addr.s_addr, | |
866 | (UINT8)( pTftpServer->RemoteAddress.sin_addr.s_addr >> 8 ), | |
867 | (UINT8)( pTftpServer->RemoteAddress.sin_addr.s_addr >> 16 ), | |
868 | (UINT8)( pTftpServer->RemoteAddress.sin_addr.s_addr >> 24 ), | |
869 | htons ( pTftpServer->RemoteAddress.sin_port ))); | |
870 | bIgnorePacket = TRUE; | |
871 | } | |
872 | if ( !pContext->bExpectAck ) { | |
873 | DEBUG (( DEBUG_ERROR, | |
874 | "ERROR - Expecting data not ACKs for pContext 0x%08x\r\n", | |
875 | pContext )); | |
876 | bIgnorePacket = TRUE; | |
877 | break; | |
878 | } | |
879 | break; | |
880 | ||
881 | case TFTP_OP_ERROR: | |
882 | if ( NULL == pContext ) { | |
883 | DEBUG (( DEBUG_ERROR, | |
884 | "ERROR - File not open for %d.%d.%d.%d:%d\r\n", | |
885 | (UINT8)pTftpServer->RemoteAddress.sin_addr.s_addr, | |
886 | (UINT8)( pTftpServer->RemoteAddress.sin_addr.s_addr >> 8 ), | |
887 | (UINT8)( pTftpServer->RemoteAddress.sin_addr.s_addr >> 16 ), | |
888 | (UINT8)( pTftpServer->RemoteAddress.sin_addr.s_addr >> 24 ), | |
889 | htons ( pTftpServer->RemoteAddress.sin_port ))); | |
890 | bIgnorePacket = TRUE; | |
891 | } | |
892 | break; | |
893 | } | |
894 | if ( !bIgnorePacket ) { | |
895 | // | |
896 | // Process the request | |
897 | // | |
898 | switch ( Opcode ) { | |
899 | default: | |
900 | DEBUG (( DEBUG_TFTP_REQUEST, | |
901 | "ERROR - Unable to process TFTP opcode: %d\r\n", | |
902 | Opcode )); | |
903 | break; | |
904 | ||
905 | case TFTP_OP_READ_REQUEST: | |
906 | ||
907 | // | |
908 | // Close the context if necessary | |
909 | // | |
910 | if ( NULL != pContext ) { | |
911 | ContextRemove ( pTftpServer, pContext ); | |
912 | } | |
913 | ||
914 | // | |
915 | // Create the connection context | |
916 | // | |
917 | pContext = ContextAdd ( pTftpServer ); | |
918 | if ( NULL == pContext ) { | |
919 | break; | |
920 | } | |
921 | ||
922 | // | |
923 | // Locate the mode | |
924 | // | |
925 | pFileName = &pBuffer[2]; | |
926 | pEnd = &pBuffer[pTftpServer->RxBytes]; | |
927 | pMode = pFileName; | |
928 | while (( pEnd > pMode ) && ( 0 != *pMode )) { | |
929 | pMode += 1; | |
930 | } | |
931 | if ( pEnd <= pMode ) { | |
932 | // | |
933 | // Mode not found | |
934 | // | |
935 | DEBUG (( DEBUG_ERROR | DEBUG_RX, | |
936 | "ERROR - File mode not found\r\n" )); | |
937 | // | |
938 | // Tell the client of the error | |
939 | // | |
940 | TftpSendError ( pTftpServer, | |
941 | pContext, | |
942 | 0, | |
943 | (UINT8 *)"File open mode not found" ); | |
944 | break; | |
945 | } | |
946 | pMode += 1; | |
947 | DEBUG (( DEBUG_TFTP_REQUEST, | |
948 | "TFTP - FileName: %a\n", | |
949 | pFileName )); | |
950 | ||
951 | // | |
952 | // Locate the options | |
953 | // | |
954 | pOption = pMode; | |
955 | while (( pEnd > pOption ) && ( 0 != *pOption )) { | |
956 | pOption += 1; | |
957 | } | |
958 | if ( pEnd <= pOption ) { | |
959 | // | |
960 | // End of mode not found | |
961 | // | |
962 | DEBUG (( DEBUG_ERROR | DEBUG_RX, | |
963 | "ERROR - File mode not valid\r\n" )); | |
964 | // | |
965 | // Tell the client of the error | |
966 | // | |
967 | TftpSendError ( pTftpServer, | |
968 | pContext, | |
969 | 0, | |
970 | (UINT8 *)"File open mode not valid" ); | |
971 | break; | |
972 | } | |
973 | pOption += 1; | |
974 | DEBUG (( DEBUG_TFTP_REQUEST, | |
975 | "TFTP - Mode: %a\r\n", | |
976 | pMode )); | |
977 | ||
978 | // | |
979 | // Verify the mode is supported | |
980 | // | |
981 | if ( 0 != stricmp ((char *)pMode, "octet" )) { | |
982 | // | |
983 | // File access mode not supported | |
984 | // | |
985 | DEBUG (( DEBUG_ERROR | DEBUG_TFTP_REQUEST, | |
986 | "ERROR - File mode %a not supported\r\n", | |
987 | pMode )); | |
988 | ||
989 | // | |
990 | // Tell the client of the error | |
991 | // | |
992 | TftpSendError ( pTftpServer, | |
993 | pContext, | |
994 | 0, | |
995 | (UINT8 *)"File open mode not supported" ); | |
996 | break; | |
997 | } | |
998 | ||
999 | // | |
1000 | // Open the file, close the context on error | |
1001 | // | |
1002 | // TODO: Remove the following line | |
1003 | pContext->File = (EFI_HANDLE)1; | |
1004 | ||
1005 | // | |
1006 | // Determine the file length | |
1007 | // | |
1008 | //fstat | |
1009 | ||
1010 | // | |
1011 | // Process the options | |
1012 | // | |
1013 | TftpOptions ( pContext, pOption, pEnd ); | |
1014 | ||
1015 | // | |
1016 | // Read in the first portion of the file | |
1017 | // | |
1018 | ||
1019 | // | |
1020 | // Send the first block | |
1021 | // | |
1022 | pContext->bExpectAck = TRUE; | |
1023 | if ( 2 < pContext->TxBytes ) { | |
1024 | // | |
1025 | // Send the OACK | |
1026 | // | |
1027 | Status = TftpTxPacket ( pTftpServer, pContext ); | |
1028 | } | |
1029 | else { | |
1030 | // | |
1031 | // Send the first block of data | |
1032 | // | |
1033 | Status = TftpSendNextBlock ( pTftpServer, pContext ); | |
1034 | } | |
1035 | break; | |
1036 | ||
1037 | case TFTP_OP_ACK: | |
1038 | // | |
1039 | // Get the block number that is being ACKed | |
1040 | // | |
1041 | BlockNumber = pTftpServer->RxBuffer[2]; | |
1042 | BlockNumber <<= 8; | |
1043 | BlockNumber |= pTftpServer->RxBuffer[3]; | |
1044 | ||
1045 | // | |
1046 | // Determine if this is the correct ACK | |
1047 | // | |
1048 | DEBUG (( DEBUG_TFTP_ACK, | |
1049 | "ACK for block 0x%04x received\r\n", | |
1050 | BlockNumber )); | |
1051 | if (( !pContext->bExpectAck ) | |
1052 | || ( BlockNumber != pContext->AckNext )) | |
1053 | { | |
1054 | DEBUG (( DEBUG_WARN | DEBUG_TFTP_ACK, | |
1055 | "WARNING - Expecting ACK 0x%0x4 not received ACK 0x%08x\r\n", | |
1056 | pContext->AckNext, | |
1057 | BlockNumber )); | |
1058 | } | |
1059 | else { | |
1060 | // | |
1061 | // Process the expected ACK | |
1062 | // | |
1063 | if ( pContext->bEofSent ) { | |
1064 | bCloseContext = TRUE; | |
1065 | } | |
1066 | else { | |
1067 | // | |
1068 | // Set the next expected ACK | |
1069 | // | |
1070 | pContext->AckNext += 1; | |
1071 | ||
1072 | // | |
1073 | // Send the next packet of data | |
1074 | // | |
1075 | Status = TftpSendNextBlock ( pTftpServer, pContext ); | |
1076 | } | |
1077 | } | |
1078 | break; | |
1079 | } | |
1080 | } | |
1081 | ||
1082 | // | |
1083 | // Determine if the context should be closed | |
1084 | // | |
1085 | if ( bCloseContext ) { | |
1086 | ContextRemove ( pTftpServer, pContext ); | |
1087 | } | |
1088 | ||
1089 | DBG_EXIT ( ); | |
1090 | } | |
1091 | ||
1092 | ||
1093 | /** | |
1094 | Build and send an error packet | |
1095 | ||
1096 | @param [in] pTftpServer The TFTP server control structure address. | |
1097 | @param [in] pContext The context structure address. | |
1098 | @param [in] Error Error number for the packet | |
1099 | @param [in] pError Zero terminated error string address | |
1100 | ||
1101 | @retval EFI_SUCCESS Message processed successfully | |
1102 | ||
1103 | **/ | |
1104 | EFI_STATUS | |
1105 | TftpSendError ( | |
1106 | IN TSDT_TFTP_SERVER * pTftpServer, | |
1107 | IN TSDT_CONNECTION_CONTEXT * pContext, | |
1108 | IN UINT16 Error, | |
1109 | IN UINT8 * pError | |
1110 | ) | |
1111 | { | |
1112 | UINT8 Character; | |
1113 | UINT8 * pBuffer; | |
1114 | EFI_STATUS Status; | |
1115 | ||
1116 | DBG_ENTER ( ); | |
1117 | ||
1118 | // | |
1119 | // Build the error packet | |
1120 | // | |
1121 | pBuffer = &pContext->TxBuffer[0]; | |
1122 | pBuffer[0] = 0; | |
1123 | pBuffer[1] = TFTP_OP_ERROR; | |
1124 | pBuffer[2] = (UINT8)( Error >> 8 ); | |
1125 | pBuffer[3] = (UINT8)Error; | |
1126 | ||
1127 | // | |
1128 | // Copy the zero terminated string into the buffer | |
1129 | // | |
1130 | pBuffer += 4; | |
1131 | do { | |
1132 | Character = *pError++; | |
1133 | *pBuffer++ = Character; | |
1134 | } while ( 0 != Character ); | |
1135 | ||
1136 | // | |
1137 | // Send the error message | |
1138 | // | |
1139 | pContext->TxBytes = pBuffer - &pContext->TxBuffer[0]; | |
1140 | Status = TftpTxPacket ( pTftpServer, pContext ); | |
1141 | ||
1142 | // | |
1143 | // Return the operation status | |
1144 | // | |
1145 | DBG_EXIT_STATUS ( Status ); | |
1146 | return Status; | |
1147 | } | |
1148 | ||
1149 | ||
1150 | /** | |
1151 | Send the next block of file system data | |
1152 | ||
1153 | @param [in] pTftpServer The TFTP server control structure address. | |
1154 | @param [in] pContext The context structure address. | |
1155 | ||
1156 | @retval EFI_SUCCESS Message processed successfully | |
1157 | ||
1158 | **/ | |
1159 | EFI_STATUS | |
1160 | TftpSendNextBlock ( | |
1161 | IN TSDT_TFTP_SERVER * pTftpServer, | |
1162 | IN TSDT_CONNECTION_CONTEXT * pContext | |
1163 | ) | |
1164 | { | |
1165 | ssize_t LengthInBytes; | |
1166 | UINT8 * pBuffer; | |
1167 | EFI_STATUS Status; | |
1168 | ||
1169 | // | |
1170 | // Determine how much data needs to be sent | |
1171 | // | |
1172 | LengthInBytes = pContext->BlockSize; | |
1173 | if (( pContext->LengthInBytes < TFTP_MAX_BLOCK_SIZE ) | |
1174 | || ( LengthInBytes > (ssize_t)pContext->LengthInBytes )) { | |
1175 | LengthInBytes = (ssize_t)pContext->LengthInBytes; | |
1176 | pContext->bEofSent = TRUE; | |
1177 | } | |
1178 | ||
1179 | // | |
1180 | // Set the TFTP opcode and block number | |
1181 | // | |
1182 | pBuffer = &pContext->TxBuffer[0]; | |
1183 | *pBuffer++ = 0; | |
1184 | *pBuffer++ = TFTP_OP_DATA; | |
1185 | *pBuffer++ = (UINT8)( pContext->AckNext >> 8 ); | |
1186 | *pBuffer++ = (UINT8)pContext->AckNext; | |
1187 | ||
1188 | // | |
1189 | // Copy the file data into the transmit buffer | |
1190 | // | |
1191 | pContext->TxBytes = 2 + 2 + LengthInBytes; | |
1192 | if ( 0 < LengthInBytes ) { | |
1193 | CopyMem ( &pBuffer, | |
1194 | pContext->pBuffer, | |
1195 | LengthInBytes ); | |
1196 | } | |
1197 | ||
1198 | // | |
1199 | // Send the next block | |
1200 | // | |
1201 | Status = TftpTxPacket ( pTftpServer, pContext ); | |
1202 | ||
1203 | // | |
1204 | // Return the operation status | |
1205 | // | |
1206 | return Status; | |
1207 | } | |
1208 | ||
1209 | ||
1210 | /** | |
1211 | Create the port for the TFTP server | |
1212 | ||
1213 | This routine polls the network layer to create the TFTP port for the | |
1214 | TFTP server. More than one attempt may be necessary since it may take | |
1215 | some time to get the IP address and initialize the upper layers of | |
1216 | the network stack. | |
1217 | ||
1218 | @param [in] pTftpServer The TFTP server control structure address. | |
1219 | ||
1220 | **/ | |
1221 | VOID | |
1222 | TftpServerTimer ( | |
1223 | IN TSDT_TFTP_SERVER * pTftpServer | |
1224 | ) | |
1225 | { | |
1226 | UINT16 TftpPort; | |
1227 | int SocketStatus; | |
1228 | EFI_STATUS Status; | |
1229 | ||
1230 | DEBUG (( DEBUG_SERVER_TIMER, "Entering TftpServerTimer\r\n" )); | |
1231 | ||
1232 | // | |
1233 | // Open the TFTP port on the server | |
1234 | // | |
1235 | do { | |
1236 | do { | |
1237 | // | |
1238 | // Wait for a while | |
1239 | // | |
1240 | Status = gBS->CheckEvent ( pTftpServer->TimerEvent ); | |
1241 | } while ( EFI_SUCCESS != Status ); | |
1242 | ||
1243 | // | |
1244 | // Attempt to create the socket for the TFTP server | |
1245 | // | |
1246 | pTftpServer->TftpPort.events = POLLRDNORM | POLLHUP; | |
1247 | pTftpServer->TftpPort.revents = 0; | |
1248 | pTftpServer->TftpPort.fd = socket ( AF_INET, | |
1249 | SOCK_DGRAM, | |
1250 | IPPROTO_UDP ); | |
1251 | if ( -1 != pTftpServer->TftpPort.fd ) | |
1252 | { | |
1253 | // | |
1254 | // Set the socket address | |
1255 | // | |
1256 | ZeroMem ( &pTftpServer->TftpServerAddress, | |
1257 | sizeof ( pTftpServer->TftpServerAddress )); | |
1258 | TftpPort = 69; | |
1259 | DEBUG (( DEBUG_TFTP_PORT, | |
1260 | "TFTP Port: %d\r\n", | |
1261 | TftpPort )); | |
1262 | pTftpServer->TftpServerAddress.sin_len = sizeof ( pTftpServer->TftpServerAddress ); | |
1263 | pTftpServer->TftpServerAddress.sin_family = AF_INET; | |
1264 | pTftpServer->TftpServerAddress.sin_addr.s_addr = INADDR_ANY; | |
1265 | pTftpServer->TftpServerAddress.sin_port = htons ( TftpPort ); | |
1266 | ||
1267 | // | |
1268 | // Bind the socket to the TFTP port | |
1269 | // | |
1270 | SocketStatus = bind ( pTftpServer->TftpPort.fd, | |
1271 | (struct sockaddr *) &pTftpServer->TftpServerAddress, | |
1272 | pTftpServer->TftpServerAddress.sin_len ); | |
1273 | if ( -1 != SocketStatus ) { | |
1274 | DEBUG (( DEBUG_TFTP_PORT, | |
1275 | "0x%08x: Socket bound to port %d\r\n", | |
1276 | pTftpServer->TftpPort.fd, | |
1277 | TftpPort )); | |
1278 | } | |
1279 | ||
1280 | // | |
1281 | // Release the socket if necessary | |
1282 | // | |
1283 | if ( -1 == SocketStatus ) { | |
1284 | close ( pTftpServer->TftpPort.fd ); | |
1285 | pTftpServer->TftpPort.fd = -1; | |
1286 | } | |
1287 | } | |
1288 | ||
1289 | // | |
1290 | // Wait until the socket is open | |
1291 | // | |
1292 | }while ( -1 == pTftpServer->TftpPort.fd ); | |
1293 | ||
1294 | DEBUG (( DEBUG_SERVER_TIMER, "Exiting TftpServerTimer\r\n" )); | |
1295 | } | |
1296 | ||
1297 | ||
1298 | /** | |
1299 | Start the TFTP server port creation timer | |
1300 | ||
1301 | @param [in] pTftpServer The TFTP server control structure address. | |
1302 | ||
1303 | @retval EFI_SUCCESS The timer was successfully started. | |
1304 | @retval EFI_ALREADY_STARTED The timer is already running. | |
1305 | @retval Other The timer failed to start. | |
1306 | ||
1307 | **/ | |
1308 | EFI_STATUS | |
1309 | TftpServerTimerStart ( | |
1310 | IN TSDT_TFTP_SERVER * pTftpServer | |
1311 | ) | |
1312 | { | |
1313 | EFI_STATUS Status; | |
1314 | UINT64 TriggerTime; | |
1315 | ||
1316 | DBG_ENTER ( ); | |
1317 | ||
1318 | // | |
1319 | // Assume the timer is already running | |
1320 | // | |
1321 | Status = EFI_ALREADY_STARTED; | |
1322 | if ( !pTftpServer->bTimerRunning ) { | |
1323 | // | |
1324 | // Compute the poll interval | |
1325 | // | |
1326 | TriggerTime = TFTP_PORT_POLL_DELAY * ( 1000 * 10 ); | |
1327 | Status = gBS->SetTimer ( pTftpServer->TimerEvent, | |
1328 | TimerPeriodic, | |
1329 | TriggerTime ); | |
1330 | if ( !EFI_ERROR ( Status )) { | |
1331 | DEBUG (( DEBUG_TFTP_PORT, "TFTP port timer started\r\n" )); | |
1332 | ||
1333 | // | |
1334 | // Mark the timer running | |
1335 | // | |
1336 | pTftpServer->bTimerRunning = TRUE; | |
1337 | } | |
1338 | else { | |
1339 | DEBUG (( DEBUG_ERROR | DEBUG_TFTP_PORT, | |
1340 | "ERROR - Failed to start TFTP port timer, Status: %r\r\n", | |
1341 | Status )); | |
1342 | } | |
1343 | } | |
1344 | ||
1345 | // | |
1346 | // Return the operation status | |
1347 | // | |
1348 | DBG_EXIT_STATUS ( Status ); | |
1349 | return Status; | |
1350 | } | |
1351 | ||
1352 | ||
1353 | /** | |
1354 | Stop the TFTP server port creation timer | |
1355 | ||
1356 | @param [in] pTftpServer The TFTP server control structure address. | |
1357 | ||
1358 | @retval EFI_SUCCESS The TFTP port timer is stopped | |
1359 | @retval Other Failed to stop the TFTP port timer | |
1360 | ||
1361 | **/ | |
1362 | EFI_STATUS | |
1363 | TftpServerTimerStop ( | |
1364 | IN TSDT_TFTP_SERVER * pTftpServer | |
1365 | ) | |
1366 | { | |
1367 | EFI_STATUS Status; | |
1368 | ||
1369 | DBG_ENTER ( ); | |
1370 | ||
1371 | // | |
1372 | // Assume the timer is stopped | |
1373 | // | |
1374 | Status = EFI_SUCCESS; | |
1375 | if ( pTftpServer->bTimerRunning ) { | |
1376 | // | |
1377 | // Stop the port creation polling | |
1378 | // | |
1379 | Status = gBS->SetTimer ( pTftpServer->TimerEvent, | |
1380 | TimerCancel, | |
1381 | 0 ); | |
1382 | if ( !EFI_ERROR ( Status )) { | |
1383 | DEBUG (( DEBUG_TFTP_PORT, "TFT[ port timer stopped\r\n" )); | |
1384 | ||
1385 | // | |
1386 | // Mark the timer stopped | |
1387 | // | |
1388 | pTftpServer->bTimerRunning = FALSE; | |
1389 | } | |
1390 | else { | |
1391 | DEBUG (( DEBUG_ERROR | DEBUG_TFTP_PORT, | |
1392 | "ERROR - Failed to stop TFT[ port timer, Status: %r\r\n", | |
1393 | Status )); | |
1394 | } | |
1395 | } | |
1396 | ||
1397 | // | |
1398 | // Return the operation status | |
1399 | // | |
1400 | DBG_EXIT_STATUS ( Status ); | |
1401 | return Status; | |
1402 | } | |
1403 | ||
1404 | /** | |
1405 | Send the next TFTP packet | |
1406 | ||
1407 | @param [in] pTftpServer The TFTP server control structure address. | |
1408 | @param [in] pContext The context structure address. | |
1409 | ||
1410 | @retval EFI_SUCCESS Message processed successfully | |
1411 | ||
1412 | **/ | |
1413 | EFI_STATUS | |
1414 | TftpTxPacket ( | |
1415 | IN TSDT_TFTP_SERVER * pTftpServer, | |
1416 | IN TSDT_CONNECTION_CONTEXT * pContext | |
1417 | ) | |
1418 | { | |
1419 | ssize_t LengthInBytes; | |
1420 | EFI_STATUS Status; | |
1421 | ||
1422 | DBG_ENTER ( ); | |
1423 | ||
1424 | // | |
1425 | // Assume success | |
1426 | // | |
1427 | Status = EFI_SUCCESS; | |
1428 | ||
1429 | // | |
1430 | // Send the TFTP packet | |
1431 | // | |
1432 | DEBUG (( DEBUG_TX, | |
1433 | "0x%08x: pContext sending 0x%08x bytes\r\n", | |
1434 | pContext, | |
1435 | pContext->TxBytes )); | |
1436 | LengthInBytes = sendto ( pTftpServer->TftpPort.fd, | |
1437 | &pContext->TxBuffer[0], | |
1438 | pContext->TxBytes, | |
1439 | 0, | |
1440 | (struct sockaddr *)&pContext->RemoteAddress, | |
1441 | pContext->RemoteAddress.sin_len ); | |
1442 | if ( -1 == LengthInBytes ) { | |
1443 | DEBUG (( DEBUG_ERROR | DEBUG_TX, | |
1444 | "ERROR - Transmit failure, errno: 0x%08x\r\n", | |
1445 | errno )); | |
1446 | Status = EFI_DEVICE_ERROR; | |
1447 | } | |
1448 | ||
1449 | // | |
1450 | // Return the operation status | |
1451 | // | |
1452 | DBG_EXIT_STATUS ( Status ); | |
1453 | return Status; | |
1454 | } | |
1455 | ||
1456 | ||
1457 | /** | |
1458 | Entry point for the TFTP server application. | |
1459 | ||
1460 | @param [in] Argc The number of arguments | |
1461 | @param [in] Argv The argument value array | |
1462 | ||
1463 | @retval 0 The application exited normally. | |
1464 | @retval Other An error occurred. | |
1465 | **/ | |
1466 | int | |
1467 | main ( | |
1468 | IN int Argc, | |
1469 | IN char **Argv | |
1470 | ) | |
1471 | { | |
1472 | TSDT_TFTP_SERVER * pTftpServer; | |
1473 | EFI_STATUS Status; | |
1474 | ||
1475 | // | |
1476 | // Create a timer event to start TFTP port | |
1477 | // | |
1478 | pTftpServer = &mTftpServer; | |
1479 | Status = gBS->CreateEvent ( EVT_TIMER, | |
1480 | TPL_TFTP_SERVER, | |
1481 | NULL, | |
1482 | NULL, | |
1483 | &pTftpServer->TimerEvent ); | |
1484 | if ( !EFI_ERROR ( Status )) { | |
1485 | Status = TftpServerTimerStart ( pTftpServer ); | |
1486 | if ( !EFI_ERROR ( Status )) { | |
1487 | // | |
1488 | // Run the TFTP server forever | |
1489 | // | |
1490 | for ( ; ; ) { | |
1491 | // | |
1492 | // Poll the network layer to create the TFTP port | |
1493 | // for the tftp server. More than one attempt may | |
1494 | // be necessary since it may take some time to get | |
1495 | // the IP address and initialize the upper layers | |
1496 | // of the network stack. | |
1497 | // | |
1498 | TftpServerTimer ( pTftpServer ); | |
1499 | ||
1500 | // | |
1501 | // Poll the socket for activity | |
1502 | // | |
1503 | do { | |
1504 | SocketPoll ( pTftpServer ); | |
1505 | } while ( -1 != pTftpServer->TftpPort.fd ); | |
1506 | ||
1507 | // | |
1508 | // TODO: Remove the following test code | |
1509 | // Exit when the network connection is broken | |
1510 | // | |
1511 | break; | |
1512 | } | |
1513 | ||
1514 | // | |
1515 | // Done with the timer event | |
1516 | // | |
1517 | TftpServerTimerStop ( pTftpServer ); | |
1518 | Status = gBS->CloseEvent ( pTftpServer->TimerEvent ); | |
1519 | } | |
1520 | } | |
1521 | ||
1522 | // | |
1523 | // Return the final status | |
1524 | // | |
1525 | DBG_EXIT_STATUS ( Status ); | |
1526 | return Status; | |
1527 | } |