2 * Copyright 1994, 1995, 2000 Neil Russell.
4 * Copyright 2000, 2001 DENX Software Engineering, Wolfgang Denk, wd@denx.de
5 * Copyright 2011 Comelit Group SpA,
6 * Luca Ceresoli <luca.ceresoli@comelit.it>
10 #include <display_options.h>
11 #include <efi_loader.h>
18 #include <asm/global_data.h>
22 DECLARE_GLOBAL_DATA_PTR;
24 /* Well known TFTP port # */
25 #define WELL_KNOWN_PORT 69
26 /* Millisecs to timeout for lost pkt */
27 #define TIMEOUT 5000UL
28 /* Number of "loading" hashes per line (for checking the image size) */
29 #define HASHES_PER_LINE 65
41 static ulong timeout_ms = TIMEOUT;
42 static int timeout_count_max = (CONFIG_NET_RETRY_COUNT * 2);
43 static ulong time_start; /* Record time we started tftp */
46 * These globals govern the timeout behavior when attempting a connection to a
47 * TFTP server. tftp_timeout_ms specifies the number of milliseconds to
48 * wait for the server to respond to initial connection. Second global,
49 * tftp_timeout_count_max, gives the number of such connection retries.
50 * tftp_timeout_count_max must be non-negative and tftp_timeout_ms must be
51 * positive. The globals are meant to be set (and restored) by code needing
52 * non-standard timeout behavior when initiating a TFTP transfer.
54 ulong tftp_timeout_ms = TIMEOUT;
55 int tftp_timeout_count_max = (CONFIG_NET_RETRY_COUNT * 2);
58 TFTP_ERR_UNDEFINED = 0,
59 TFTP_ERR_FILE_NOT_FOUND = 1,
60 TFTP_ERR_ACCESS_DENIED = 2,
61 TFTP_ERR_DISK_FULL = 3,
62 TFTP_ERR_UNEXPECTED_OPCODE = 4,
63 TFTP_ERR_UNKNOWN_TRANSFER_ID = 5,
64 TFTP_ERR_FILE_ALREADY_EXISTS = 6,
65 TFTP_ERR_OPTION_NEGOTIATION = 8,
68 static struct in_addr tftp_remote_ip;
69 /* The UDP port at their end */
70 static int tftp_remote_port;
71 /* The UDP port at our end */
72 static int tftp_our_port;
73 static int timeout_count;
74 /* packet sequence number */
75 static ulong tftp_cur_block;
76 /* last packet sequence number received */
77 static ulong tftp_prev_block;
78 /* count of sequence number wraparounds */
79 static ulong tftp_block_wrap;
80 /* memory offset due to wrapping */
81 static ulong tftp_block_wrap_offset;
82 static int tftp_state;
83 static ulong tftp_load_addr;
85 static ulong tftp_load_size;
87 #ifdef CONFIG_TFTP_TSIZE
88 /* The file size reported by the server */
89 static int tftp_tsize;
90 /* The number of hashes we printed */
91 static short tftp_tsize_num_hash;
93 /* The window size negotiated */
94 static ushort tftp_windowsize;
95 /* Next block to send ack to */
96 static ushort tftp_next_ack;
97 /* Last nack block we send */
98 static ushort tftp_last_nack;
99 #ifdef CONFIG_CMD_TFTPPUT
100 /* 1 if writing, else 0 */
101 static int tftp_put_active;
102 /* 1 if we have sent the last block */
103 static int tftp_put_final_block_sent;
105 #define tftp_put_active 0
108 #define STATE_SEND_RRQ 1
110 #define STATE_TOO_LARGE 3
111 #define STATE_BAD_MAGIC 4
113 #define STATE_RECV_WRQ 6
114 #define STATE_SEND_WRQ 7
115 #define STATE_INVALID_OPTION 8
117 /* default TFTP block size */
118 #define TFTP_BLOCK_SIZE 512
119 /* sequence number is 16 bit */
120 #define TFTP_SEQUENCE_SIZE ((ulong)(1<<16))
122 #define DEFAULT_NAME_LEN (8 + 4 + 1)
123 static char default_filename[DEFAULT_NAME_LEN];
125 #ifndef CONFIG_TFTP_FILE_NAME_MAX_LEN
128 #define MAX_LEN CONFIG_TFTP_FILE_NAME_MAX_LEN
131 static char tftp_filename[MAX_LEN];
133 /* 512 is poor choice for ethernet, MTU is typically 1500.
134 * Minus eth.hdrs thats 1468. Can get 2x better throughput with
135 * almost-MTU block sizes. At least try... fall back to 512 if need be.
136 * (but those using CONFIG_IP_DEFRAG may want to set a larger block in cfg file)
139 /* When windowsize is defined to 1,
140 * tftp behaves the same way as it was
143 #ifdef CONFIG_TFTP_WINDOWSIZE
144 #define TFTP_WINDOWSIZE CONFIG_TFTP_WINDOWSIZE
146 #define TFTP_WINDOWSIZE 1
149 static unsigned short tftp_block_size = TFTP_BLOCK_SIZE;
150 static unsigned short tftp_block_size_option = CONFIG_TFTP_BLOCKSIZE;
151 static unsigned short tftp_window_size_option = TFTP_WINDOWSIZE;
153 static inline int store_block(int block, uchar *src, unsigned int len)
155 ulong offset = block * tftp_block_size + tftp_block_wrap_offset -
157 ulong newsize = offset + len;
158 ulong store_addr = tftp_load_addr + offset;
162 ulong end_addr = tftp_load_addr + tftp_load_size;
165 end_addr = ULONG_MAX;
167 if (store_addr < tftp_load_addr ||
168 store_addr + len > end_addr) {
169 puts("\nTFTP error: ");
170 puts("trying to overwrite reserved memory...\n");
174 ptr = map_sysmem(store_addr, len);
175 memcpy(ptr, src, len);
178 if (net_boot_file_size < newsize)
179 net_boot_file_size = newsize;
184 /* Clear our state ready for a new transfer */
185 static void new_transfer(void)
189 tftp_block_wrap_offset = 0;
190 #ifdef CONFIG_CMD_TFTPPUT
191 tftp_put_final_block_sent = 0;
195 #ifdef CONFIG_CMD_TFTPPUT
197 * Load the next block from memory to be sent over tftp.
199 * @param block Block number to send
200 * @param dst Destination buffer for data
201 * @param len Number of bytes in block (this one and every other)
202 * Return: number of bytes loaded
204 static int load_block(unsigned block, uchar *dst, unsigned len)
206 /* We may want to get the final block from the previous set */
207 ulong offset = block * tftp_block_size + tftp_block_wrap_offset -
211 tosend = min(net_boot_file_size - offset, tosend);
212 (void)memcpy(dst, (void *)(image_save_addr + offset), tosend);
213 debug("%s: block=%u, offset=%lu, len=%u, tosend=%lu\n", __func__,
214 block, offset, len, tosend);
219 static void tftp_send(void);
220 static void tftp_timeout_handler(void);
222 /**********************************************************************/
224 static void show_block_marker(void)
228 #ifdef CONFIG_TFTP_TSIZE
230 pos = tftp_cur_block * tftp_block_size +
231 tftp_block_wrap_offset;
232 if (pos > tftp_tsize)
235 while (tftp_tsize_num_hash < pos * 50 / tftp_tsize) {
237 tftp_tsize_num_hash++;
242 pos = (tftp_cur_block - 1) +
243 (tftp_block_wrap * TFTP_SEQUENCE_SIZE);
246 else if (((pos + 1) % (10 * HASHES_PER_LINE)) == 0)
252 * restart the current transfer due to an error
254 * @param msg Message to print for user
256 static void restart(const char *msg)
258 printf("\n%s; starting again\n", msg);
263 * Check if the block number has wrapped, and update progress
265 * TODO: The egregious use of global variables in this file should be tidied.
267 static void update_block_number(void)
270 * RFC1350 specifies that the first data packet will
271 * have sequence number 1. If we receive a sequence
272 * number of 0 this means that there was a wrap
273 * around of the (16 bit) counter.
275 if (tftp_cur_block == 0 && tftp_prev_block != 0) {
277 tftp_block_wrap_offset += tftp_block_size * TFTP_SEQUENCE_SIZE;
278 timeout_count = 0; /* we've done well, reset the timeout */
283 /* The TFTP get or put is complete */
284 static void tftp_complete(void)
286 #ifdef CONFIG_TFTP_TSIZE
287 /* Print hash marks for the last packet received */
288 while (tftp_tsize && tftp_tsize_num_hash < 49) {
290 tftp_tsize_num_hash++;
293 print_size(tftp_tsize, "");
295 time_start = get_timer(time_start);
296 if (time_start > 0) {
297 puts("\n\t "); /* Line up with "Loading: " */
298 print_size(net_boot_file_size /
299 time_start * 1000, "/s");
302 if (IS_ENABLED(CONFIG_CMD_BOOTEFI)) {
303 if (!tftp_put_active)
304 efi_set_bootdev("Net", "", tftp_filename,
305 map_sysmem(tftp_load_addr, 0),
308 net_set_state(NETLOOP_SUCCESS);
311 static void tftp_send(void)
317 bool err_pkt = false;
320 * We will always be sending some sort of packet, so
321 * cobble together the packet headers now.
323 pkt = net_tx_packet + net_eth_hdr_size() + IP_UDP_HDR_SIZE;
325 switch (tftp_state) {
330 #ifdef CONFIG_CMD_TFTPPUT
331 *s++ = htons(tftp_state == STATE_SEND_RRQ ? TFTP_RRQ :
334 *s++ = htons(TFTP_RRQ);
337 strcpy((char *)pkt, tftp_filename);
338 pkt += strlen(tftp_filename) + 1;
339 strcpy((char *)pkt, "octet");
340 pkt += 5 /*strlen("octet")*/ + 1;
341 strcpy((char *)pkt, "timeout");
342 pkt += 7 /*strlen("timeout")*/ + 1;
343 sprintf((char *)pkt, "%lu", timeout_ms / 1000);
344 debug("send option \"timeout %s\"\n", (char *)pkt);
345 pkt += strlen((char *)pkt) + 1;
346 #ifdef CONFIG_TFTP_TSIZE
347 pkt += sprintf((char *)pkt, "tsize%c%u%c",
348 0, net_boot_file_size, 0);
350 /* try for more effic. blk size */
351 pkt += sprintf((char *)pkt, "blksize%c%d%c",
352 0, tftp_block_size_option, 0);
354 /* try for more effic. window size.
355 * Implemented only for tftp get.
356 * Don't bother sending if it's 1
358 if (tftp_state == STATE_SEND_RRQ && tftp_window_size_option > 1)
359 pkt += sprintf((char *)pkt, "windowsize%c%d%c",
360 0, tftp_window_size_option, 0);
370 s[0] = htons(TFTP_ACK);
371 s[1] = htons(tftp_cur_block);
372 pkt = (uchar *)(s + 2);
373 #ifdef CONFIG_CMD_TFTPPUT
374 if (tftp_put_active) {
375 int toload = tftp_block_size;
376 int loaded = load_block(tftp_cur_block, pkt, toload);
378 s[0] = htons(TFTP_DATA);
380 tftp_put_final_block_sent = (loaded < toload);
386 case STATE_TOO_LARGE:
389 *s++ = htons(TFTP_ERROR);
393 strcpy((char *)pkt, "File too large");
394 pkt += 14 /*strlen("File too large")*/ + 1;
399 case STATE_BAD_MAGIC:
402 *s++ = htons(TFTP_ERROR);
405 strcpy((char *)pkt, "File has bad magic");
406 pkt += 18 /*strlen("File has bad magic")*/ + 1;
411 case STATE_INVALID_OPTION:
414 *s++ = htons(TFTP_ERROR);
415 *s++ = htons(TFTP_ERR_OPTION_NEGOTIATION);
417 strcpy((char *)pkt, "Option Negotiation Failed");
418 /* strlen("Option Negotiation Failed") + NULL*/
425 net_send_udp_packet(net_server_ethaddr, tftp_remote_ip,
426 tftp_remote_port, tftp_our_port, len);
429 net_set_state(NETLOOP_FAIL);
432 #ifdef CONFIG_CMD_TFTPPUT
433 static void icmp_handler(unsigned type, unsigned code, unsigned dest,
434 struct in_addr sip, unsigned src, uchar *pkt,
437 if (type == ICMP_NOT_REACH && code == ICMP_NOT_REACH_PORT) {
438 /* Oh dear the other end has gone away */
439 restart("TFTP server died");
444 static void tftp_handler(uchar *pkt, unsigned dest, struct in_addr sip,
445 unsigned src, unsigned len)
450 u16 timeout_val_rcvd;
452 if (dest != tftp_our_port) {
455 if (tftp_state != STATE_SEND_RRQ && src != tftp_remote_port &&
456 tftp_state != STATE_RECV_WRQ && tftp_state != STATE_SEND_WRQ)
462 /* warning: don't use increment (++) in ntohs() macros!! */
466 switch (ntohs(proto)) {
471 #ifdef CONFIG_CMD_TFTPPUT
472 if (tftp_put_active) {
473 if (tftp_put_final_block_sent) {
477 * Move to the next block. We want our block
478 * count to wrap just like the other end!
480 int block = ntohs(*s);
481 int ack_ok = (tftp_cur_block == block);
483 tftp_prev_block = tftp_cur_block;
484 tftp_cur_block = (unsigned short)(block + 1);
485 update_block_number();
487 tftp_send(); /* Send next data block */
496 #ifdef CONFIG_CMD_TFTPSRV
499 tftp_remote_ip = sip;
500 tftp_remote_port = src;
501 tftp_our_port = 1024 + (get_timer(0) % 3072);
503 tftp_send(); /* Send ACK(0) */
509 for (i = 0; i < len; i++) {
516 tftp_state = STATE_OACK;
517 tftp_remote_port = src;
519 * Check for 'blksize' option.
520 * Careful: "i" is signed, "len" is unsigned, thus
521 * something like "len-8" may give a *huge* number
523 for (i = 0; i+8 < len; i++) {
524 if (strcasecmp((char *)pkt + i, "blksize") == 0) {
525 tftp_block_size = (unsigned short)
526 dectoul((char *)pkt + i + 8, NULL);
527 debug("Blocksize oack: %s, %d\n",
528 (char *)pkt + i + 8, tftp_block_size);
529 if (tftp_block_size > tftp_block_size_option) {
530 printf("Invalid blk size(=%d)\n",
532 tftp_state = STATE_INVALID_OPTION;
535 if (strcasecmp((char *)pkt + i, "timeout") == 0) {
536 timeout_val_rcvd = (unsigned short)
537 dectoul((char *)pkt + i + 8, NULL);
538 debug("Timeout oack: %s, %d\n",
539 (char *)pkt + i + 8, timeout_val_rcvd);
540 if (timeout_val_rcvd != (timeout_ms / 1000)) {
541 printf("Invalid timeout val(=%d s)\n",
543 tftp_state = STATE_INVALID_OPTION;
546 #ifdef CONFIG_TFTP_TSIZE
547 if (strcasecmp((char *)pkt + i, "tsize") == 0) {
548 tftp_tsize = dectoul((char *)pkt + i + 6,
550 debug("size = %s, %d\n",
551 (char *)pkt + i + 6, tftp_tsize);
554 if (strcasecmp((char *)pkt + i, "windowsize") == 0) {
556 dectoul((char *)pkt + i + 11, NULL);
557 debug("windowsize = %s, %d\n",
558 (char *)pkt + i + 11, tftp_windowsize);
562 tftp_next_ack = tftp_windowsize;
564 #ifdef CONFIG_CMD_TFTPPUT
565 if (tftp_put_active && tftp_state == STATE_OACK) {
566 /* Get ready to send the first block */
567 tftp_state = STATE_DATA;
571 tftp_send(); /* Send ACK or first data block */
578 if (ntohs(*(__be16 *)pkt) != (ushort)(tftp_cur_block + 1)) {
579 debug("Received unexpected block: %d, expected: %d\n",
580 ntohs(*(__be16 *)pkt),
581 (ushort)(tftp_cur_block + 1));
583 * If one packet is dropped most likely
584 * all other buffers in the window
585 * that will arrive will cause a sending NACK.
586 * This just overwellms the server, let's just send one.
588 if (tftp_last_nack != tftp_cur_block) {
590 tftp_last_nack = tftp_cur_block;
591 tftp_next_ack = (ushort)(tftp_cur_block +
598 tftp_cur_block %= TFTP_SEQUENCE_SIZE;
600 if (tftp_state == STATE_SEND_RRQ) {
601 debug("Server did not acknowledge any options!\n");
602 tftp_next_ack = tftp_windowsize;
605 if (tftp_state == STATE_SEND_RRQ || tftp_state == STATE_OACK ||
606 tftp_state == STATE_RECV_WRQ) {
607 /* first block received */
608 tftp_state = STATE_DATA;
609 tftp_remote_port = src;
612 if (tftp_cur_block != 1) { /* Assertion */
613 puts("\nTFTP error: ");
614 printf("First block is not block 1 (%ld)\n",
616 puts("Starting again\n\n");
622 if (tftp_cur_block == tftp_prev_block) {
623 /* Same block again; ignore it. */
627 update_block_number();
628 tftp_prev_block = tftp_cur_block;
629 timeout_count_max = tftp_timeout_count_max;
630 net_set_timeout_handler(timeout_ms, tftp_timeout_handler);
632 if (store_block(tftp_cur_block, pkt + 2, len)) {
634 net_set_state(NETLOOP_FAIL);
638 if (len < tftp_block_size) {
645 * Acknowledge the block just received, which will prompt
646 * the remote for the next one.
648 if (tftp_cur_block == tftp_next_ack) {
650 tftp_next_ack += tftp_windowsize;
655 printf("\nTFTP error: '%s' (%d)\n",
656 pkt + 2, ntohs(*(__be16 *)pkt));
658 switch (ntohs(*(__be16 *)pkt)) {
659 case TFTP_ERR_FILE_NOT_FOUND:
660 case TFTP_ERR_ACCESS_DENIED:
661 puts("Not retrying...\n");
663 net_set_state(NETLOOP_FAIL);
665 case TFTP_ERR_UNDEFINED:
666 case TFTP_ERR_DISK_FULL:
667 case TFTP_ERR_UNEXPECTED_OPCODE:
668 case TFTP_ERR_UNKNOWN_TRANSFER_ID:
669 case TFTP_ERR_FILE_ALREADY_EXISTS:
671 puts("Starting again\n\n");
680 static void tftp_timeout_handler(void)
682 if (++timeout_count > timeout_count_max) {
683 restart("Retry count exceeded");
686 net_set_timeout_handler(timeout_ms, tftp_timeout_handler);
687 if (tftp_state != STATE_RECV_WRQ)
692 /* Initialize tftp_load_addr and tftp_load_size from image_load_addr and lmb */
693 static int tftp_init_load_addr(void)
697 phys_size_t max_size;
699 lmb_init_and_reserve(&lmb, gd->bd, (void *)gd->fdt_blob);
701 max_size = lmb_get_free_size(&lmb, image_load_addr);
705 tftp_load_size = max_size;
707 tftp_load_addr = image_load_addr;
711 void tftp_start(enum proto_t protocol)
713 #if CONFIG_NET_TFTP_VARS
714 char *ep; /* Environment pointer */
717 * Allow the user to choose TFTP blocksize and timeout.
718 * TFTP protocol has a minimal timeout of 1 second.
721 ep = env_get("tftpblocksize");
723 tftp_block_size_option = simple_strtol(ep, NULL, 10);
725 ep = env_get("tftpwindowsize");
727 tftp_window_size_option = simple_strtol(ep, NULL, 10);
729 ep = env_get("tftptimeout");
731 timeout_ms = simple_strtol(ep, NULL, 10);
733 if (timeout_ms < 1000) {
734 printf("TFTP timeout (%ld ms) too low, set min = 1000 ms\n",
739 ep = env_get("tftptimeoutcountmax");
741 tftp_timeout_count_max = simple_strtol(ep, NULL, 10);
743 if (tftp_timeout_count_max < 0) {
744 printf("TFTP timeout count max (%d ms) negative, set to 0\n",
745 tftp_timeout_count_max);
746 tftp_timeout_count_max = 0;
750 debug("TFTP blocksize = %i, TFTP windowsize = %d timeout = %ld ms\n",
751 tftp_block_size_option, tftp_window_size_option, timeout_ms);
753 tftp_remote_ip = net_server_ip;
754 if (!net_parse_bootfile(&tftp_remote_ip, tftp_filename, MAX_LEN)) {
755 sprintf(default_filename, "%02X%02X%02X%02X.img",
756 net_ip.s_addr & 0xFF,
757 (net_ip.s_addr >> 8) & 0xFF,
758 (net_ip.s_addr >> 16) & 0xFF,
759 (net_ip.s_addr >> 24) & 0xFF);
761 strncpy(tftp_filename, default_filename, DEFAULT_NAME_LEN);
762 tftp_filename[DEFAULT_NAME_LEN - 1] = 0;
764 printf("*** Warning: no boot file name; using '%s'\n",
768 printf("Using %s device\n", eth_get_name());
769 printf("TFTP %s server %pI4; our IP address is %pI4",
770 #ifdef CONFIG_CMD_TFTPPUT
771 protocol == TFTPPUT ? "to" : "from",
775 &tftp_remote_ip, &net_ip);
777 /* Check if we need to send across this subnet */
778 if (net_gateway.s_addr && net_netmask.s_addr) {
779 struct in_addr our_net;
780 struct in_addr remote_net;
782 our_net.s_addr = net_ip.s_addr & net_netmask.s_addr;
783 remote_net.s_addr = tftp_remote_ip.s_addr & net_netmask.s_addr;
784 if (our_net.s_addr != remote_net.s_addr)
785 printf("; sending through gateway %pI4", &net_gateway);
789 printf("Filename '%s'.", tftp_filename);
791 if (net_boot_file_expected_size_in_blocks) {
792 printf(" Size is 0x%x Bytes = ",
793 net_boot_file_expected_size_in_blocks << 9);
794 print_size(net_boot_file_expected_size_in_blocks << 9, "");
798 #ifdef CONFIG_CMD_TFTPPUT
799 tftp_put_active = (protocol == TFTPPUT);
800 if (tftp_put_active) {
801 printf("Save address: 0x%lx\n", image_save_addr);
802 printf("Save size: 0x%lx\n", image_save_size);
803 net_boot_file_size = image_save_size;
805 tftp_state = STATE_SEND_WRQ;
810 if (tftp_init_load_addr()) {
812 net_set_state(NETLOOP_FAIL);
813 puts("\nTFTP error: ");
814 puts("trying to overwrite reserved memory...\n");
817 printf("Load address: 0x%lx\n", tftp_load_addr);
818 puts("Loading: *\b");
819 tftp_state = STATE_SEND_RRQ;
822 time_start = get_timer(0);
823 timeout_count_max = tftp_timeout_count_max;
825 net_set_timeout_handler(timeout_ms, tftp_timeout_handler);
826 net_set_udp_handler(tftp_handler);
827 #ifdef CONFIG_CMD_TFTPPUT
828 net_set_icmp_handler(icmp_handler);
830 tftp_remote_port = WELL_KNOWN_PORT;
832 /* Use a pseudo-random port unless a specific port is set */
833 tftp_our_port = 1024 + (get_timer(0) % 3072);
835 #ifdef CONFIG_TFTP_PORT
836 ep = env_get("tftpdstp");
838 tftp_remote_port = simple_strtol(ep, NULL, 10);
839 ep = env_get("tftpsrcp");
841 tftp_our_port = simple_strtol(ep, NULL, 10);
846 /* zero out server ether in case the server ip has changed */
847 memset(net_server_ethaddr, 0, 6);
848 /* Revert tftp_block_size to dflt */
849 tftp_block_size = TFTP_BLOCK_SIZE;
850 #ifdef CONFIG_TFTP_TSIZE
852 tftp_tsize_num_hash = 0;
858 #ifdef CONFIG_CMD_TFTPSRV
859 void tftp_start_server(void)
861 tftp_filename[0] = 0;
863 if (tftp_init_load_addr()) {
865 net_set_state(NETLOOP_FAIL);
866 puts("\nTFTP error: trying to overwrite reserved memory...\n");
869 printf("Using %s device\n", eth_get_name());
870 printf("Listening for TFTP transfer on %pI4\n", &net_ip);
871 printf("Load address: 0x%lx\n", tftp_load_addr);
873 puts("Loading: *\b");
875 timeout_count_max = tftp_timeout_count_max;
877 timeout_ms = TIMEOUT;
878 net_set_timeout_handler(timeout_ms, tftp_timeout_handler);
880 /* Revert tftp_block_size to dflt */
881 tftp_block_size = TFTP_BLOCK_SIZE;
883 tftp_our_port = WELL_KNOWN_PORT;
885 tftp_next_ack = tftp_windowsize;
887 #ifdef CONFIG_TFTP_TSIZE
889 tftp_tsize_num_hash = 0;
892 tftp_state = STATE_RECV_WRQ;
893 net_set_udp_handler(tftp_handler);
895 /* zero out server ether in case the server ip has changed */
896 memset(net_server_ethaddr, 0, 6);
898 #endif /* CONFIG_CMD_TFTPSRV */