xref: /nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/apps/tftp/tftp_server.c (revision 104654410c56c573564690304ae786df310c91fc)
1*10465441SEvalZero /****************************************************************//**
2*10465441SEvalZero  *
3*10465441SEvalZero  * @file tftp_server.c
4*10465441SEvalZero  *
5*10465441SEvalZero  * @author   Logan Gunthorpe <[email protected]>
6*10465441SEvalZero  *           Dirk Ziegelmeier <[email protected]>
7*10465441SEvalZero  *
8*10465441SEvalZero  * @brief    Trivial File Transfer Protocol (RFC 1350)
9*10465441SEvalZero  *
10*10465441SEvalZero  * Copyright (c) Deltatee Enterprises Ltd. 2013
11*10465441SEvalZero  * All rights reserved.
12*10465441SEvalZero  *
13*10465441SEvalZero  ********************************************************************/
14*10465441SEvalZero 
15*10465441SEvalZero /*
16*10465441SEvalZero  * Redistribution and use in source and binary forms, with or without
17*10465441SEvalZero  * modification,are permitted provided that the following conditions are met:
18*10465441SEvalZero  *
19*10465441SEvalZero  * 1. Redistributions of source code must retain the above copyright notice,
20*10465441SEvalZero  *    this list of conditions and the following disclaimer.
21*10465441SEvalZero  * 2. Redistributions in binary form must reproduce the above copyright notice,
22*10465441SEvalZero  *    this list of conditions and the following disclaimer in the documentation
23*10465441SEvalZero  *    and/or other materials provided with the distribution.
24*10465441SEvalZero  * 3. The name of the author may not be used to endorse or promote products
25*10465441SEvalZero  *    derived from this software without specific prior written permission.
26*10465441SEvalZero  *
27*10465441SEvalZero  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
28*10465441SEvalZero  * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
29*10465441SEvalZero  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
30*10465441SEvalZero  * EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
31*10465441SEvalZero  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
32*10465441SEvalZero  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
33*10465441SEvalZero  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
34*10465441SEvalZero  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
35*10465441SEvalZero  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
36*10465441SEvalZero  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
37*10465441SEvalZero  *
38*10465441SEvalZero  * Author: Logan Gunthorpe <[email protected]>
39*10465441SEvalZero  *         Dirk Ziegelmeier <[email protected]>
40*10465441SEvalZero  *
41*10465441SEvalZero  */
42*10465441SEvalZero 
43*10465441SEvalZero /**
44*10465441SEvalZero  * @defgroup tftp TFTP server
45*10465441SEvalZero  * @ingroup apps
46*10465441SEvalZero  *
47*10465441SEvalZero  * This is simple TFTP server for the lwIP raw API.
48*10465441SEvalZero  */
49*10465441SEvalZero 
50*10465441SEvalZero #include "lwip/apps/tftp_server.h"
51*10465441SEvalZero 
52*10465441SEvalZero #if LWIP_UDP
53*10465441SEvalZero 
54*10465441SEvalZero #include "lwip/udp.h"
55*10465441SEvalZero #include "lwip/timeouts.h"
56*10465441SEvalZero #include "lwip/debug.h"
57*10465441SEvalZero 
58*10465441SEvalZero #define TFTP_MAX_PAYLOAD_SIZE 512
59*10465441SEvalZero #define TFTP_HEADER_LENGTH    4
60*10465441SEvalZero 
61*10465441SEvalZero #define TFTP_RRQ   1
62*10465441SEvalZero #define TFTP_WRQ   2
63*10465441SEvalZero #define TFTP_DATA  3
64*10465441SEvalZero #define TFTP_ACK   4
65*10465441SEvalZero #define TFTP_ERROR 5
66*10465441SEvalZero 
67*10465441SEvalZero enum tftp_error {
68*10465441SEvalZero   TFTP_ERROR_FILE_NOT_FOUND    = 1,
69*10465441SEvalZero   TFTP_ERROR_ACCESS_VIOLATION  = 2,
70*10465441SEvalZero   TFTP_ERROR_DISK_FULL         = 3,
71*10465441SEvalZero   TFTP_ERROR_ILLEGAL_OPERATION = 4,
72*10465441SEvalZero   TFTP_ERROR_UNKNOWN_TRFR_ID   = 5,
73*10465441SEvalZero   TFTP_ERROR_FILE_EXISTS       = 6,
74*10465441SEvalZero   TFTP_ERROR_NO_SUCH_USER      = 7
75*10465441SEvalZero };
76*10465441SEvalZero 
77*10465441SEvalZero #include <string.h>
78*10465441SEvalZero 
79*10465441SEvalZero struct tftp_state {
80*10465441SEvalZero   const struct tftp_context *ctx;
81*10465441SEvalZero   void *handle;
82*10465441SEvalZero   struct pbuf *last_data;
83*10465441SEvalZero   struct udp_pcb *upcb;
84*10465441SEvalZero   ip_addr_t addr;
85*10465441SEvalZero   u16_t port;
86*10465441SEvalZero   int timer;
87*10465441SEvalZero   int last_pkt;
88*10465441SEvalZero   u16_t blknum;
89*10465441SEvalZero   u8_t retries;
90*10465441SEvalZero   u8_t mode_write;
91*10465441SEvalZero };
92*10465441SEvalZero 
93*10465441SEvalZero static struct tftp_state tftp_state;
94*10465441SEvalZero 
95*10465441SEvalZero static void tftp_tmr(void* arg);
96*10465441SEvalZero 
97*10465441SEvalZero static void
close_handle(void)98*10465441SEvalZero close_handle(void)
99*10465441SEvalZero {
100*10465441SEvalZero   tftp_state.port = 0;
101*10465441SEvalZero   ip_addr_set_any(0, &tftp_state.addr);
102*10465441SEvalZero 
103*10465441SEvalZero   if(tftp_state.last_data != NULL) {
104*10465441SEvalZero     pbuf_free(tftp_state.last_data);
105*10465441SEvalZero     tftp_state.last_data = NULL;
106*10465441SEvalZero   }
107*10465441SEvalZero 
108*10465441SEvalZero   sys_untimeout(tftp_tmr, NULL);
109*10465441SEvalZero 
110*10465441SEvalZero   if (tftp_state.handle) {
111*10465441SEvalZero     tftp_state.ctx->close(tftp_state.handle);
112*10465441SEvalZero     tftp_state.handle = NULL;
113*10465441SEvalZero     LWIP_DEBUGF(TFTP_DEBUG | LWIP_DBG_STATE, ("tftp: closing\n"));
114*10465441SEvalZero   }
115*10465441SEvalZero }
116*10465441SEvalZero 
117*10465441SEvalZero static void
send_error(const ip_addr_t * addr,u16_t port,enum tftp_error code,const char * str)118*10465441SEvalZero send_error(const ip_addr_t *addr, u16_t port, enum tftp_error code, const char *str)
119*10465441SEvalZero {
120*10465441SEvalZero   int str_length = strlen(str);
121*10465441SEvalZero   struct pbuf* p;
122*10465441SEvalZero   u16_t* payload;
123*10465441SEvalZero 
124*10465441SEvalZero   p = pbuf_alloc(PBUF_TRANSPORT, (u16_t)(TFTP_HEADER_LENGTH + str_length + 1), PBUF_RAM);
125*10465441SEvalZero   if(p == NULL) {
126*10465441SEvalZero     return;
127*10465441SEvalZero   }
128*10465441SEvalZero 
129*10465441SEvalZero   payload = (u16_t*) p->payload;
130*10465441SEvalZero   payload[0] = PP_HTONS(TFTP_ERROR);
131*10465441SEvalZero   payload[1] = lwip_htons(code);
132*10465441SEvalZero   MEMCPY(&payload[2], str, str_length + 1);
133*10465441SEvalZero 
134*10465441SEvalZero   udp_sendto(tftp_state.upcb, p, addr, port);
135*10465441SEvalZero   pbuf_free(p);
136*10465441SEvalZero }
137*10465441SEvalZero 
138*10465441SEvalZero static void
send_ack(u16_t blknum)139*10465441SEvalZero send_ack(u16_t blknum)
140*10465441SEvalZero {
141*10465441SEvalZero   struct pbuf* p;
142*10465441SEvalZero   u16_t* payload;
143*10465441SEvalZero 
144*10465441SEvalZero   p = pbuf_alloc(PBUF_TRANSPORT, TFTP_HEADER_LENGTH, PBUF_RAM);
145*10465441SEvalZero   if(p == NULL) {
146*10465441SEvalZero     return;
147*10465441SEvalZero   }
148*10465441SEvalZero   payload = (u16_t*) p->payload;
149*10465441SEvalZero 
150*10465441SEvalZero   payload[0] = PP_HTONS(TFTP_ACK);
151*10465441SEvalZero   payload[1] = lwip_htons(blknum);
152*10465441SEvalZero   udp_sendto(tftp_state.upcb, p, &tftp_state.addr, tftp_state.port);
153*10465441SEvalZero   pbuf_free(p);
154*10465441SEvalZero }
155*10465441SEvalZero 
156*10465441SEvalZero static void
resend_data(void)157*10465441SEvalZero resend_data(void)
158*10465441SEvalZero {
159*10465441SEvalZero   struct pbuf *p = pbuf_alloc(PBUF_TRANSPORT, tftp_state.last_data->len, PBUF_RAM);
160*10465441SEvalZero   if(p == NULL) {
161*10465441SEvalZero     return;
162*10465441SEvalZero   }
163*10465441SEvalZero 
164*10465441SEvalZero   if(pbuf_copy(p, tftp_state.last_data) != ERR_OK) {
165*10465441SEvalZero     pbuf_free(p);
166*10465441SEvalZero     return;
167*10465441SEvalZero   }
168*10465441SEvalZero 
169*10465441SEvalZero   udp_sendto(tftp_state.upcb, p, &tftp_state.addr, tftp_state.port);
170*10465441SEvalZero   pbuf_free(p);
171*10465441SEvalZero }
172*10465441SEvalZero 
173*10465441SEvalZero static void
send_data(void)174*10465441SEvalZero send_data(void)
175*10465441SEvalZero {
176*10465441SEvalZero   u16_t *payload;
177*10465441SEvalZero   int ret;
178*10465441SEvalZero 
179*10465441SEvalZero   if(tftp_state.last_data != NULL) {
180*10465441SEvalZero     pbuf_free(tftp_state.last_data);
181*10465441SEvalZero   }
182*10465441SEvalZero 
183*10465441SEvalZero   tftp_state.last_data = pbuf_alloc(PBUF_TRANSPORT, TFTP_HEADER_LENGTH + TFTP_MAX_PAYLOAD_SIZE, PBUF_RAM);
184*10465441SEvalZero   if(tftp_state.last_data == NULL) {
185*10465441SEvalZero     return;
186*10465441SEvalZero   }
187*10465441SEvalZero 
188*10465441SEvalZero   payload = (u16_t *) tftp_state.last_data->payload;
189*10465441SEvalZero   payload[0] = PP_HTONS(TFTP_DATA);
190*10465441SEvalZero   payload[1] = lwip_htons(tftp_state.blknum);
191*10465441SEvalZero 
192*10465441SEvalZero   ret = tftp_state.ctx->read(tftp_state.handle, &payload[2], TFTP_MAX_PAYLOAD_SIZE);
193*10465441SEvalZero   if (ret < 0) {
194*10465441SEvalZero     send_error(&tftp_state.addr, tftp_state.port, TFTP_ERROR_ACCESS_VIOLATION, "Error occured while reading the file.");
195*10465441SEvalZero     close_handle();
196*10465441SEvalZero     return;
197*10465441SEvalZero   }
198*10465441SEvalZero 
199*10465441SEvalZero   pbuf_realloc(tftp_state.last_data, (u16_t)(TFTP_HEADER_LENGTH + ret));
200*10465441SEvalZero   resend_data();
201*10465441SEvalZero }
202*10465441SEvalZero 
203*10465441SEvalZero static void
recv(void * arg,struct udp_pcb * upcb,struct pbuf * p,const ip_addr_t * addr,u16_t port)204*10465441SEvalZero recv(void *arg, struct udp_pcb *upcb, struct pbuf *p, const ip_addr_t *addr, u16_t port)
205*10465441SEvalZero {
206*10465441SEvalZero   u16_t *sbuf = (u16_t *) p->payload;
207*10465441SEvalZero   int opcode;
208*10465441SEvalZero 
209*10465441SEvalZero   LWIP_UNUSED_ARG(arg);
210*10465441SEvalZero   LWIP_UNUSED_ARG(upcb);
211*10465441SEvalZero 
212*10465441SEvalZero   if (((tftp_state.port != 0) && (port != tftp_state.port)) ||
213*10465441SEvalZero       (!ip_addr_isany_val(tftp_state.addr) && !ip_addr_cmp(&tftp_state.addr, addr))) {
214*10465441SEvalZero     send_error(addr, port, TFTP_ERROR_ACCESS_VIOLATION, "Only one connection at a time is supported");
215*10465441SEvalZero     pbuf_free(p);
216*10465441SEvalZero     return;
217*10465441SEvalZero   }
218*10465441SEvalZero 
219*10465441SEvalZero   opcode = sbuf[0];
220*10465441SEvalZero 
221*10465441SEvalZero   tftp_state.last_pkt = tftp_state.timer;
222*10465441SEvalZero   tftp_state.retries = 0;
223*10465441SEvalZero 
224*10465441SEvalZero   switch (opcode) {
225*10465441SEvalZero     case PP_HTONS(TFTP_RRQ): /* fall through */
226*10465441SEvalZero     case PP_HTONS(TFTP_WRQ):
227*10465441SEvalZero     {
228*10465441SEvalZero       const char tftp_null = 0;
229*10465441SEvalZero       char filename[TFTP_MAX_FILENAME_LEN + 1] = { 0 };
230*10465441SEvalZero       char mode[TFTP_MAX_MODE_LEN] = { 0 };
231*10465441SEvalZero       u16_t filename_end_offset;
232*10465441SEvalZero       u16_t mode_end_offset;
233*10465441SEvalZero 
234*10465441SEvalZero       if(tftp_state.handle != NULL) {
235*10465441SEvalZero         send_error(addr, port, TFTP_ERROR_ACCESS_VIOLATION, "Only one connection at a time is supported");
236*10465441SEvalZero         break;
237*10465441SEvalZero       }
238*10465441SEvalZero 
239*10465441SEvalZero       sys_timeout(TFTP_TIMER_MSECS, tftp_tmr, NULL);
240*10465441SEvalZero 
241*10465441SEvalZero       /* find \0 in pbuf -> end of filename string */
242*10465441SEvalZero       filename_end_offset = pbuf_memfind(p, &tftp_null, sizeof(tftp_null), 2);
243*10465441SEvalZero       if((u16_t)(filename_end_offset-2) > sizeof(filename)) {
244*10465441SEvalZero         send_error(addr, port, TFTP_ERROR_ACCESS_VIOLATION, "Filename too long/not NULL terminated");
245*10465441SEvalZero         break;
246*10465441SEvalZero       }
247*10465441SEvalZero       pbuf_copy_partial(p, filename, filename_end_offset-2, 2);
248*10465441SEvalZero 
249*10465441SEvalZero       /* find \0 in pbuf -> end of mode string */
250*10465441SEvalZero       mode_end_offset = pbuf_memfind(p, &tftp_null, sizeof(tftp_null), filename_end_offset+1);
251*10465441SEvalZero       if((u16_t)(mode_end_offset-filename_end_offset) > sizeof(mode)) {
252*10465441SEvalZero         send_error(addr, port, TFTP_ERROR_ACCESS_VIOLATION, "Mode too long/not NULL terminated");
253*10465441SEvalZero         break;
254*10465441SEvalZero       }
255*10465441SEvalZero       pbuf_copy_partial(p, mode, mode_end_offset-filename_end_offset, filename_end_offset+1);
256*10465441SEvalZero 
257*10465441SEvalZero       tftp_state.handle = tftp_state.ctx->open(filename, mode, opcode == PP_HTONS(TFTP_WRQ));
258*10465441SEvalZero       tftp_state.blknum = 1;
259*10465441SEvalZero 
260*10465441SEvalZero       if (!tftp_state.handle) {
261*10465441SEvalZero         send_error(addr, port, TFTP_ERROR_FILE_NOT_FOUND, "Unable to open requested file.");
262*10465441SEvalZero         break;
263*10465441SEvalZero       }
264*10465441SEvalZero 
265*10465441SEvalZero       LWIP_DEBUGF(TFTP_DEBUG | LWIP_DBG_STATE, ("tftp: %s request from ", (opcode == PP_HTONS(TFTP_WRQ)) ? "write" : "read"));
266*10465441SEvalZero       ip_addr_debug_print(TFTP_DEBUG | LWIP_DBG_STATE, addr);
267*10465441SEvalZero       LWIP_DEBUGF(TFTP_DEBUG | LWIP_DBG_STATE, (" for '%s' mode '%s'\n", filename, mode));
268*10465441SEvalZero 
269*10465441SEvalZero       ip_addr_copy(tftp_state.addr, *addr);
270*10465441SEvalZero       tftp_state.port = port;
271*10465441SEvalZero 
272*10465441SEvalZero       if (opcode == PP_HTONS(TFTP_WRQ)) {
273*10465441SEvalZero         tftp_state.mode_write = 1;
274*10465441SEvalZero         send_ack(0);
275*10465441SEvalZero       } else {
276*10465441SEvalZero         tftp_state.mode_write = 0;
277*10465441SEvalZero         send_data();
278*10465441SEvalZero       }
279*10465441SEvalZero 
280*10465441SEvalZero       break;
281*10465441SEvalZero     }
282*10465441SEvalZero 
283*10465441SEvalZero     case PP_HTONS(TFTP_DATA):
284*10465441SEvalZero     {
285*10465441SEvalZero       int ret;
286*10465441SEvalZero       u16_t blknum;
287*10465441SEvalZero 
288*10465441SEvalZero       if (tftp_state.handle == NULL) {
289*10465441SEvalZero         send_error(addr, port, TFTP_ERROR_ACCESS_VIOLATION, "No connection");
290*10465441SEvalZero         break;
291*10465441SEvalZero       }
292*10465441SEvalZero 
293*10465441SEvalZero       if (tftp_state.mode_write != 1) {
294*10465441SEvalZero         send_error(addr, port, TFTP_ERROR_ACCESS_VIOLATION, "Not a write connection");
295*10465441SEvalZero         break;
296*10465441SEvalZero       }
297*10465441SEvalZero 
298*10465441SEvalZero       blknum = lwip_ntohs(sbuf[1]);
299*10465441SEvalZero       pbuf_header(p, -TFTP_HEADER_LENGTH);
300*10465441SEvalZero 
301*10465441SEvalZero       ret = tftp_state.ctx->write(tftp_state.handle, p);
302*10465441SEvalZero       if (ret < 0) {
303*10465441SEvalZero         send_error(addr, port, TFTP_ERROR_ACCESS_VIOLATION, "error writing file");
304*10465441SEvalZero         close_handle();
305*10465441SEvalZero       } else {
306*10465441SEvalZero         send_ack(blknum);
307*10465441SEvalZero       }
308*10465441SEvalZero 
309*10465441SEvalZero       if (p->tot_len < TFTP_MAX_PAYLOAD_SIZE) {
310*10465441SEvalZero         close_handle();
311*10465441SEvalZero       }
312*10465441SEvalZero       break;
313*10465441SEvalZero     }
314*10465441SEvalZero 
315*10465441SEvalZero     case PP_HTONS(TFTP_ACK):
316*10465441SEvalZero     {
317*10465441SEvalZero       u16_t blknum;
318*10465441SEvalZero       int lastpkt;
319*10465441SEvalZero 
320*10465441SEvalZero       if (tftp_state.handle == NULL) {
321*10465441SEvalZero         send_error(addr, port, TFTP_ERROR_ACCESS_VIOLATION, "No connection");
322*10465441SEvalZero         break;
323*10465441SEvalZero       }
324*10465441SEvalZero 
325*10465441SEvalZero       if (tftp_state.mode_write != 0) {
326*10465441SEvalZero         send_error(addr, port, TFTP_ERROR_ACCESS_VIOLATION, "Not a read connection");
327*10465441SEvalZero         break;
328*10465441SEvalZero       }
329*10465441SEvalZero 
330*10465441SEvalZero       blknum = lwip_ntohs(sbuf[1]);
331*10465441SEvalZero       if (blknum != tftp_state.blknum) {
332*10465441SEvalZero         send_error(addr, port, TFTP_ERROR_UNKNOWN_TRFR_ID, "Wrong block number");
333*10465441SEvalZero         break;
334*10465441SEvalZero       }
335*10465441SEvalZero 
336*10465441SEvalZero       lastpkt = 0;
337*10465441SEvalZero 
338*10465441SEvalZero       if (tftp_state.last_data != NULL) {
339*10465441SEvalZero         lastpkt = tftp_state.last_data->tot_len != (TFTP_MAX_PAYLOAD_SIZE + TFTP_HEADER_LENGTH);
340*10465441SEvalZero       }
341*10465441SEvalZero 
342*10465441SEvalZero       if (!lastpkt) {
343*10465441SEvalZero         tftp_state.blknum++;
344*10465441SEvalZero         send_data();
345*10465441SEvalZero       } else {
346*10465441SEvalZero         close_handle();
347*10465441SEvalZero       }
348*10465441SEvalZero 
349*10465441SEvalZero       break;
350*10465441SEvalZero     }
351*10465441SEvalZero 
352*10465441SEvalZero     default:
353*10465441SEvalZero       send_error(addr, port, TFTP_ERROR_ILLEGAL_OPERATION, "Unknown operation");
354*10465441SEvalZero       break;
355*10465441SEvalZero   }
356*10465441SEvalZero 
357*10465441SEvalZero   pbuf_free(p);
358*10465441SEvalZero }
359*10465441SEvalZero 
360*10465441SEvalZero static void
tftp_tmr(void * arg)361*10465441SEvalZero tftp_tmr(void* arg)
362*10465441SEvalZero {
363*10465441SEvalZero   LWIP_UNUSED_ARG(arg);
364*10465441SEvalZero 
365*10465441SEvalZero   tftp_state.timer++;
366*10465441SEvalZero 
367*10465441SEvalZero   if (tftp_state.handle == NULL) {
368*10465441SEvalZero     return;
369*10465441SEvalZero   }
370*10465441SEvalZero 
371*10465441SEvalZero   sys_timeout(TFTP_TIMER_MSECS, tftp_tmr, NULL);
372*10465441SEvalZero 
373*10465441SEvalZero   if ((tftp_state.timer - tftp_state.last_pkt) > (TFTP_TIMEOUT_MSECS / TFTP_TIMER_MSECS)) {
374*10465441SEvalZero     if ((tftp_state.last_data != NULL) && (tftp_state.retries < TFTP_MAX_RETRIES)) {
375*10465441SEvalZero       LWIP_DEBUGF(TFTP_DEBUG | LWIP_DBG_STATE, ("tftp: timeout, retrying\n"));
376*10465441SEvalZero       resend_data();
377*10465441SEvalZero       tftp_state.retries++;
378*10465441SEvalZero     } else {
379*10465441SEvalZero       LWIP_DEBUGF(TFTP_DEBUG | LWIP_DBG_STATE, ("tftp: timeout\n"));
380*10465441SEvalZero       close_handle();
381*10465441SEvalZero     }
382*10465441SEvalZero   }
383*10465441SEvalZero }
384*10465441SEvalZero 
385*10465441SEvalZero /** @ingroup tftp
386*10465441SEvalZero  * Initialize TFTP server.
387*10465441SEvalZero  * @param ctx TFTP callback struct
388*10465441SEvalZero  */
389*10465441SEvalZero err_t
tftp_init(const struct tftp_context * ctx)390*10465441SEvalZero tftp_init(const struct tftp_context *ctx)
391*10465441SEvalZero {
392*10465441SEvalZero   err_t ret;
393*10465441SEvalZero 
394*10465441SEvalZero   struct udp_pcb *pcb = udp_new_ip_type(IPADDR_TYPE_ANY);
395*10465441SEvalZero   if (pcb == NULL) {
396*10465441SEvalZero     return ERR_MEM;
397*10465441SEvalZero   }
398*10465441SEvalZero 
399*10465441SEvalZero   ret = udp_bind(pcb, IP_ANY_TYPE, TFTP_PORT);
400*10465441SEvalZero   if (ret != ERR_OK) {
401*10465441SEvalZero     udp_remove(pcb);
402*10465441SEvalZero     return ret;
403*10465441SEvalZero   }
404*10465441SEvalZero 
405*10465441SEvalZero   tftp_state.handle    = NULL;
406*10465441SEvalZero   tftp_state.port      = 0;
407*10465441SEvalZero   tftp_state.ctx       = ctx;
408*10465441SEvalZero   tftp_state.timer     = 0;
409*10465441SEvalZero   tftp_state.last_data = NULL;
410*10465441SEvalZero   tftp_state.upcb      = pcb;
411*10465441SEvalZero 
412*10465441SEvalZero   udp_recv(pcb, recv, NULL);
413*10465441SEvalZero 
414*10465441SEvalZero   return ERR_OK;
415*10465441SEvalZero }
416*10465441SEvalZero 
417*10465441SEvalZero #endif /* LWIP_UDP */
418