diff options
author | Daniel Stenberg <daniel@haxx.se> | 2010-03-01 22:14:47 +0000 |
---|---|---|
committer | Daniel Stenberg <daniel@haxx.se> | 2010-03-01 22:14:47 +0000 |
commit | 53aa6b21feed648e6572d75e4fb31a7dc2505c12 (patch) | |
tree | b69b811f79c0287757ff984926f3c27f789578a1 /lib | |
parent | 7842704ee7ebbc48728986c11d4bc91f534d6bd7 (diff) |
- Ben Greear provided an update for TFTP that fixes upload.
Diffstat (limited to 'lib')
-rw-r--r-- | lib/tftp.c | 72 |
1 files changed, 39 insertions, 33 deletions
diff --git a/lib/tftp.c b/lib/tftp.c index cbf6dc842..2c6da5a9a 100644 --- a/lib/tftp.c +++ b/lib/tftp.c @@ -399,7 +399,7 @@ static CURLcode tftp_parse_option_ack(tftp_state_data_t *state, tsize = strtol( value, NULL, 10 ); if(!tsize) { - failf(data, "invalid tsize value in OACK packet"); + failf(data, "invalid tsize -:%s:- value in OACK packet", value); return CURLE_TFTP_ILLEGAL; } Curl_pgrsSetDownloadSize(data, tsize); @@ -701,38 +701,44 @@ static CURLcode tftp_tx(tftp_state_data_t *state, tftp_event_t event) switch(event) { case TFTP_EVENT_ACK: - /* Ack the packet */ - rblock = getrpacketblock(&state->rpacket); - - if(rblock != state->block) { - /* This isn't the expected block. Log it and up the retry counter */ - infof(data, "Received ACK for block %d, expecting %d\n", - rblock, state->block); - state->retries++; - /* Bail out if over the maximum */ - if(state->retries>state->retry_max) { - failf(data, "tftp_tx: giving up waiting for block %d ack", - state->block); - res = CURLE_SEND_ERROR; - } - else { - /* Re-send the data packet */ - sbytes = sendto(state->sockfd, (void *)&state->spacket, - 4+state->sbytes, SEND_4TH_ARG, - (struct sockaddr *)&state->remote_addr, - state->remote_addrlen); - /* Check all sbytes were sent */ - if(sbytes<0) { - failf(data, "%s", Curl_strerror(state->conn, SOCKERRNO)); - res = CURLE_SEND_ERROR; - } - } - return res; + case TFTP_EVENT_OACK: + if (event == TFTP_EVENT_ACK) { + /* Ack the packet */ + rblock = getrpacketblock(&state->rpacket); + + if(rblock != state->block) { + /* This isn't the expected block. Log it and up the retry counter */ + infof(data, "Received ACK for block %d, expecting %d\n", + rblock, state->block); + state->retries++; + /* Bail out if over the maximum */ + if(state->retries>state->retry_max) { + failf(data, "tftp_tx: giving up waiting for block %d ack", + state->block); + res = CURLE_SEND_ERROR; + } + else { + /* Re-send the data packet */ + sbytes = sendto(state->sockfd, (void *)&state->spacket, + 4+state->sbytes, SEND_4TH_ARG, + (struct sockaddr *)&state->remote_addr, + state->remote_addrlen); + /* Check all sbytes were sent */ + if(sbytes<0) { + failf(data, "%s", Curl_strerror(state->conn, SOCKERRNO)); + res = CURLE_SEND_ERROR; + } + } + return res; + } + /* This is the expected packet. Reset the counters and send the next + block */ + time(&state->rx_time); + state->block++; + } + else { + state->block = 1; /* first data block is 1 when using OACK */ } - /* This is the expected packet. Reset the counters and send the next - block */ - time(&state->rx_time); - state->block++; state->retries = 0; setpacketevent(&state->spacket, TFTP_EVENT_DATA); setpacketblock(&state->spacket, state->block); @@ -798,7 +804,7 @@ static CURLcode tftp_tx(tftp_state_data_t *state, tftp_event_t event) break; default: - failf(data, "%s", "tftp_tx: internal error"); + failf(data, "tftp_tx: internal error, event: %i", (int)(event)); break; } |