microcom: read more than 1 byte from device, if possible
[oweals/busybox.git] / networking / tftp.c
index 9aa87d57e6d3ce8ef4c12328274159febd9072bc..737ae789363fcc51269996aef84c2a23f8355d2f 100644 (file)
  * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
  * ------------------------------------------------------------------------- */
 
-#include "busybox.h"
+#include "libbb.h"
 
+#if ENABLE_FEATURE_TFTP_GET || ENABLE_FEATURE_TFTP_PUT
 
-#define TFTP_BLOCKSIZE_DEFAULT 512     /* according to RFC 1350, don't change */
-#define TFTP_TIMEOUT 5 /* seconds */
-#define TFTP_NUM_RETRIES 5 /* number of retries */
+#define TFTP_BLOCKSIZE_DEFAULT 512      /* according to RFC 1350, don't change */
+#define TFTP_TIMEOUT_MS         50
+#define TFTP_MAXTIMEOUT_MS    2000
+#define TFTP_NUM_RETRIES        12      /* number of backed-off retries */
 
 /* opcodes we support */
 #define TFTP_RRQ   1
 #define TFTP_ERROR 5
 #define TFTP_OACK  6
 
-static const char *const tftp_bb_error_msg[] = {
-       "Undefined error",
-       "File not found",
-       "Access violation",
-       "Disk full or allocation error",
-       "Illegal TFTP operation",
-       "Unknown transfer ID",
-       "File already exists",
-       "No such user"
-};
-
 #if ENABLE_FEATURE_TFTP_GET && !ENABLE_FEATURE_TFTP_PUT
-#define USE_GETPUT(a)
+#define USE_GETPUT(...)
 #define CMD_GET(cmd) 1
 #define CMD_PUT(cmd) 0
 #elif !ENABLE_FEATURE_TFTP_GET && ENABLE_FEATURE_TFTP_PUT
-#define USE_GETPUT(a)
+#define USE_GETPUT(...)
 #define CMD_GET(cmd) 0
 #define CMD_PUT(cmd) 1
 #else
-#define USE_GETPUT(a) a
+#define USE_GETPUT(...) __VA_ARGS__
 /* masks coming from getpot32 */
-#define CMD_GET(cmd) (cmd & 1)
-#define CMD_PUT(cmd) (cmd & 2)
+#define CMD_GET(cmd) ((cmd) & 1)
+#define CMD_PUT(cmd) ((cmd) & 2)
 #endif
 /* NB: in the code below
- * CMD_GET(cmd) and CMD_GET(cmd) are mutually exclusive
+ * CMD_GET(cmd) and CMD_PUT(cmd) are mutually exclusive
  */
 
 
@@ -84,7 +75,7 @@ static int tftp_blocksize_check(int blocksize, int bufsize)
        return blocksize;
 }
 
-static char *tftp_option_get(char *buf, int len, const char * const option)
+static char *tftp_option_get(char *buf, int len, const char *option)
 {
        int opt_val = 0;
        int opt_found = 0;
@@ -92,32 +83,24 @@ static char *tftp_option_get(char *buf, int len, const char * const option)
 
        while (len > 0) {
                /* Make sure the options are terminated correctly */
-
                for (k = 0; k < len; k++) {
                        if (buf[k] == '\0') {
-                               break;
+                               goto nul_found;
                        }
                }
-
-               if (k >= len) {
-                       break;
-               }
-
+               return NULL;
+ nul_found:
                if (opt_val == 0) {
                        if (strcasecmp(buf, option) == 0) {
                                opt_found = 1;
                        }
-               } else {
-                       if (opt_found) {
-                               return buf;
-                       }
+               } else if (opt_found) {
+                       return buf;
                }
 
                k++;
-
                buf += k;
                len -= k;
-
                opt_val ^= 1;
        }
 
@@ -126,26 +109,25 @@ static char *tftp_option_get(char *buf, int len, const char * const option)
 
 #endif
 
-static int tftp(
-#if ENABLE_FEATURE_TFTP_GET && ENABLE_FEATURE_TFTP_PUT
-               const int cmd,
-#endif
-               const len_and_sockaddr *peer_lsa,
+static int tftp( USE_GETPUT(const int cmd,)
+               len_and_sockaddr *peer_lsa,
                const char *remotefile, const int localfd,
                unsigned port, int tftp_bufsize)
 {
-       struct timeval tv;
-       fd_set rfds;
-       int socketfd;
+       struct pollfd pfd[1];
+#define socketfd (pfd[0].fd)
        int len;
-       int opcode = 0;
-       int finished = 0;
-       int timeout = TFTP_NUM_RETRIES;
+       int send_len;
+       USE_FEATURE_TFTP_BLOCKSIZE(smallint want_option_ack = 0;)
+       smallint finished = 0;
+       uint16_t opcode;
        uint16_t block_nr = 1;
-       uint16_t tmp;
+       uint16_t recv_blk;
+       int retries, waittime_ms;
        char *cp;
 
-       USE_FEATURE_TFTP_BLOCKSIZE(int want_option_ack = 0;)
+       unsigned org_port;
+       len_and_sockaddr *const from = alloca(offsetof(len_and_sockaddr, u.sa) + peer_lsa->len);
 
        /* Can't use RESERVE_CONFIG_BUFFER here since the allocation
         * size varies meaning BUFFERS_GO_ON_STACK would fail */
@@ -154,195 +136,171 @@ static int tftp(
        char *xbuf = xmalloc(tftp_bufsize += 4);
        char *rbuf = xmalloc(tftp_bufsize);
 
-       port = htons(port);
+       port = org_port = htons(port);
 
-       socketfd = xsocket(peer_lsa->sa.sa_family, SOCK_DGRAM, 0);
+       socketfd = xsocket(peer_lsa->u.sa.sa_family, SOCK_DGRAM, 0);
 
        /* build opcode */
        opcode = TFTP_WRQ;
        if (CMD_GET(cmd)) {
                opcode = TFTP_RRQ;
        }
-
-       while (1) {
-
-               cp = xbuf;
-
-               /* first create the opcode part */
-               *((uint16_t*)cp) = htons(opcode);
-               cp += 2;
-
-               /* add filename and mode */
-               if (CMD_GET(cmd) ? (opcode == TFTP_RRQ) : (opcode == TFTP_WRQ)) {
-                       int too_long = 0;
-
-                       /* see if the filename fits into xbuf
-                        * and fill in packet.  */
-                       len = strlen(remotefile) + 1;
-
-                       if ((cp + len) >= &xbuf[tftp_bufsize - 1]) {
-                               too_long = 1;
-                       } else {
-                               safe_strncpy(cp, remotefile, len);
-                               cp += len;
-                       }
-
-                       if (too_long || (&xbuf[tftp_bufsize - 1] - cp) < sizeof("octet")) {
-                               bb_error_msg("remote filename too long");
-                               break;
-                       }
-
-                       /* add "mode" part of the package */
-                       memcpy(cp, "octet", sizeof("octet"));
-                       cp += sizeof("octet");
+       cp = xbuf + 2;
+       /* add filename and mode */
+       /* fill in packet if the filename fits into xbuf */
+       len = strlen(remotefile) + 1;
+       if (2 + len + sizeof("octet") >= tftp_bufsize) {
+               bb_error_msg("remote filename is too long");
+               goto ret;
+       }
+       strcpy(cp, remotefile);
+       cp += len;
+       /* add "mode" part of the package */
+       strcpy(cp, "octet");
+       cp += sizeof("octet");
 
 #if ENABLE_FEATURE_TFTP_BLOCKSIZE
-
-                       len = tftp_bufsize - 4; /* data block size */
-
-                       if (len != TFTP_BLOCKSIZE_DEFAULT) {
-
-                               if ((&xbuf[tftp_bufsize - 1] - cp) < 15) {
-                                       bb_error_msg("remote filename too long");
-                                       break;
-                               }
-
-                               /* add "blksize" + number of blocks  */
-                               memcpy(cp, "blksize", sizeof("blksize"));
-                               cp += sizeof("blksize");
-                               cp += snprintf(cp, 6, "%d", len) + 1;
-
-                               want_option_ack = 1;
-                       }
-#endif
+       len = tftp_bufsize - 4; /* data block size */
+       if (len != TFTP_BLOCKSIZE_DEFAULT) {
+               /* rfc2348 says that 65464 is a max allowed value */
+               if ((&xbuf[tftp_bufsize - 1] - cp) < sizeof("blksize NNNNN")) {
+                       bb_error_msg("remote filename is too long");
+                       goto ret;
                }
+               /* add "blksize", <nul>, blocksize */
+               strcpy(cp, "blksize");
+               cp += sizeof("blksize");
+               cp += snprintf(cp, 6, "%d", len) + 1;
+               want_option_ack = 1;
+       }
+#endif
+       /* First packet is built, so skip packet generation */
+       goto send_pkt;
 
-               /* add ack and data */
-
-               if (CMD_GET(cmd) ? (opcode == TFTP_ACK) : (opcode == TFTP_DATA)) {
-                       *((uint16_t*)cp) = htons(block_nr);
-                       cp += 2;
-                       block_nr++;
-
-                       if (CMD_PUT(cmd) && (opcode == TFTP_DATA)) {
-                               len = full_read(localfd, cp, tftp_bufsize - 4);
-
-                               if (len < 0) {
-                                       bb_perror_msg(bb_msg_read_error);
-                                       break;
-                               }
-
-                               if (len != (tftp_bufsize - 4)) {
-                                       finished++;
-                               }
+       /* Using mostly goto's - continue/break will be less clear
+        * in where we actually jump to */
 
-                               cp += len;
+       while (1) {
+               /* Build ACK or DATA */
+               cp = xbuf + 2;
+               *((uint16_t*)cp) = htons(block_nr);
+               cp += 2;
+               block_nr++;
+               opcode = TFTP_ACK;
+               if (CMD_PUT(cmd)) {
+                       opcode = TFTP_DATA;
+                       len = full_read(localfd, cp, tftp_bufsize - 4);
+                       if (len < 0) {
+                               bb_perror_msg(bb_msg_read_error);
+                               goto ret;
+                       }
+                       if (len != (tftp_bufsize - 4)) {
+                               finished = 1;
                        }
+                       cp += len;
                }
+ send_pkt:
+               /* Send packet */
+               *((uint16_t*)xbuf) = htons(opcode); /* fill in opcode part */
+               send_len = cp - xbuf;
+               /* NB: send_len value is preserved in code below
+                * for potential resend */
 
-               /* send packet */
+               retries = TFTP_NUM_RETRIES;     /* re-initialize */
+               waittime_ms = TFTP_TIMEOUT_MS;
 
-               timeout = TFTP_NUM_RETRIES;     /* re-initialize */
-               do {
-                       len = cp - xbuf;
+ send_again:
 #if ENABLE_DEBUG_TFTP
-                       fprintf(stderr, "sending %u bytes\n", len);
-                       for (cp = xbuf; cp < &xbuf[len]; cp++)
-                               fprintf(stderr, "%02x ", (unsigned char) *cp);
-                       fprintf(stderr, "\n");
+               fprintf(stderr, "sending %u bytes\n", send_len);
+               for (cp = xbuf; cp < &xbuf[send_len]; cp++)
+                       fprintf(stderr, "%02x ", (unsigned char) *cp);
+               fprintf(stderr, "\n");
 #endif
-                       if (sendto(socketfd, xbuf, len, 0,
-                                       &peer_lsa->sa, peer_lsa->len) < 0) {
-                               bb_perror_msg("send");
-                               len = -1;
-                               break;
-                       }
-
-                       if (finished && (opcode == TFTP_ACK)) {
-                               break;
-                       }
+               xsendto(socketfd, xbuf, send_len, &peer_lsa->u.sa, peer_lsa->len);
+               /* Was it final ACK? then exit */
+               if (finished && (opcode == TFTP_ACK))
+                       goto ret;
 
-                       /* receive packet */
  recv_again:
-                       tv.tv_sec = TFTP_TIMEOUT;
-                       tv.tv_usec = 0;
-
-                       FD_ZERO(&rfds);
-                       FD_SET(socketfd, &rfds);
-
-                       switch (select(socketfd + 1, &rfds, NULL, NULL, &tv)) {
-                               struct sockaddr *from;
-                               socklen_t fromlen;
-
-                       case 1:
-                               fromlen = peer_lsa->len;
-                               from = alloca(fromlen);
-                               memset(from, 0, fromlen);
-
-                               len = recvfrom(socketfd, rbuf, tftp_bufsize, 0,
-                                                       from, &fromlen);
-                               if (len < 0) {
-                                       bb_perror_msg("recvfrom");
-                                       break;
-                               }
-#if ENABLE_FEATURE_IPV6
-                               if (from->sa_family == AF_INET6)
-                                       if (((struct sockaddr_in6*)from)->sin6_port != port)
-                                               goto recv_again;
-#endif
-                               if (from->sa_family == AF_INET)
-                                       if (((struct sockaddr_in*)from)->sin_port != port)
-                                               goto recv_again;
-                               timeout = 0;
-                               break;
-                       case 0:
+               /* Receive packet */
+               /*pfd[0].fd = socketfd;*/
+               pfd[0].events = POLLIN;
+               switch (safe_poll(pfd, 1, waittime_ms)) {
+                       unsigned from_port;
+               case 1:
+                       from->len = peer_lsa->len;
+                       memset(&from->u.sa, 0, peer_lsa->len);
+                       len = recvfrom(socketfd, rbuf, tftp_bufsize, 0,
+                                               &from->u.sa, &from->len);
+                       if (len < 0) {
+                               bb_perror_msg("recvfrom");
+                               goto ret;
+                       }
+                       from_port = get_nport(&from->u.sa);
+                       if (port == org_port) {
+                               /* Our first query went to port 69
+                                * but reply will come from different one.
+                                * Remember and use this new port */
+                               port = from_port;
+                               set_nport(peer_lsa, from_port);
+                       }
+                       if (port != from_port)
+                               goto recv_again;
+                       goto process_pkt;
+               case 0:
+                       retries--;
+                       if (retries == 0) {
                                bb_error_msg("timeout");
-                               timeout--;
-                               if (timeout == 0) {
-                                       len = -1;
-                                       bb_error_msg("last timeout");
-                               }
-                               break;
-                       default:
-                               bb_perror_msg("select");
-                               len = -1;
+                               goto ret;
                        }
 
-               } while (timeout && (len >= 0));
+                       /* exponential backoff with limit */
+                       waittime_ms += waittime_ms/2;
+                       if (waittime_ms > TFTP_MAXTIMEOUT_MS) {
+                               waittime_ms = TFTP_MAXTIMEOUT_MS;
+                       }
 
-               if (finished || (len < 0)) {
-                       break;
+                       goto send_again; /* resend last sent pkt */
+               default:
+                       /*bb_perror_msg("poll"); - done in safe_poll */
+                       goto ret;
                }
-
-               /* process received packet */
-
+ process_pkt:
+               /* Process recv'ed packet */
                opcode = ntohs( ((uint16_t*)rbuf)[0] );
-               tmp = ntohs( ((uint16_t*)rbuf)[1] );
+               recv_blk = ntohs( ((uint16_t*)rbuf)[1] );
 
 #if ENABLE_DEBUG_TFTP
-               fprintf(stderr, "received %d bytes: %04x %04x\n", len, opcode, tmp);
+               fprintf(stderr, "received %d bytes: %04x %04x\n", len, opcode, recv_blk);
 #endif
 
                if (opcode == TFTP_ERROR) {
-                       const char *msg = NULL;
+                       static const char *const errcode_str[] = {
+                               "",
+                               "file not found",
+                               "access violation",
+                               "disk full",
+                               "illegal TFTP operation",
+                               "unknown transfer id",
+                               "file already exists",
+                               "no such user",
+                               "bad option"
+                       };
+
+                       const char *msg = "";
 
                        if (rbuf[4] != '\0') {
                                msg = &rbuf[4];
                                rbuf[tftp_bufsize - 1] = '\0';
-                       } else if (tmp < (sizeof(tftp_bb_error_msg)
-                                                         / sizeof(char *))) {
-                               msg = tftp_bb_error_msg[tmp];
-                       }
-
-                       if (msg) {
-                               bb_error_msg("server says: %s", msg);
+                       } else if (recv_blk < ARRAY_SIZE(errcode_str)) {
+                               msg = errcode_str[recv_blk];
                        }
-
-                       break;
+                       bb_error_msg("server error: (%u) %s", recv_blk, msg);
+                       goto ret;
                }
+
 #if ENABLE_FEATURE_TFTP_BLOCKSIZE
                if (want_option_ack) {
-
                        want_option_ack = 0;
 
                        if (opcode == TFTP_OACK) {
@@ -350,89 +308,90 @@ static int tftp(
                                char *res;
 
                                res = tftp_option_get(&rbuf[2], len - 2, "blksize");
-
                                if (res) {
                                        int blksize = xatoi_u(res);
-
-                                       if (tftp_blocksize_check(blksize, tftp_bufsize - 4)) {
-                                               if (CMD_PUT(cmd)) {
-                                                       opcode = TFTP_DATA;
-                                               } else {
-                                                       opcode = TFTP_ACK;
-                                               }
+                                       if (!tftp_blocksize_check(blksize, tftp_bufsize - 4)) {
+                                               /* send ERROR 8 to server... */
+                                               /* htons can be impossible to use in const initializer: */
+                                               /*static const uint16_t error_8[2] = { htons(TFTP_ERROR), htons(8) };*/
+                                               /* thus we open-code big-endian layout */
+                                               static const uint8_t error_8[4] = { 0,TFTP_ERROR, 0,8 };
+                                               xsendto(socketfd, error_8, 4, &peer_lsa->u.sa, peer_lsa->len);
+                                               bb_error_msg("server proposes bad blksize %d, exiting", blksize);
+                                               goto ret;
+                                       }
 #if ENABLE_DEBUG_TFTP
-                                               fprintf(stderr, "using blksize %u\n",
-                                                               blksize);
+                                       fprintf(stderr, "using blksize %u\n",
+                                                       blksize);
 #endif
-                                               tftp_bufsize = blksize + 4;
-                                               block_nr = 0;
-                                               continue;
-                                       }
+                                       tftp_bufsize = blksize + 4;
+                                       /* Send ACK for OACK ("block" no: 0) */
+                                       block_nr = 0;
+                                       continue;
                                }
-                               /* FIXME:
-                                * we should send ERROR 8 */
-                               bb_error_msg("bad server option");
-                               break;
+                               /* rfc2347:
+                                * "An option not acknowledged by the server
+                                *  must be ignored by the client and server
+                                *  as if it were never requested." */
                        }
 
-                       bb_error_msg("warning: blksize not supported by server"
-                                                " - reverting to 512");
-
+                       bb_error_msg("blksize is not supported by server"
+                                               " - reverting to 512");
                        tftp_bufsize = TFTP_BLOCKSIZE_DEFAULT + 4;
                }
 #endif
+               /* block_nr is already advanced to next block# we expect
+                * to get / block# we are about to send next time */
 
                if (CMD_GET(cmd) && (opcode == TFTP_DATA)) {
-                       if (tmp == block_nr) {
+                       if (recv_blk == block_nr) {
                                len = full_write(localfd, &rbuf[4], len - 4);
-
                                if (len < 0) {
                                        bb_perror_msg(bb_msg_write_error);
-                                       break;
+                                       goto ret;
                                }
-
                                if (len != (tftp_bufsize - 4)) {
-                                       finished++;
+                                       finished = 1;
                                }
-
-                               opcode = TFTP_ACK;
-                               continue;
+                               continue; /* send ACK */
                        }
-                       /* in case the last ack disappeared into the ether */
-                       if (tmp == (block_nr - 1)) {
-                               --block_nr;
-                               opcode = TFTP_ACK;
-                               continue;
-// tmp==(block_nr-1) and (tmp+1)==block_nr is always same, I think. wtf?
-                       } else if (tmp + 1 == block_nr) {
+                       if (recv_blk == (block_nr - 1)) {
                                /* Server lost our TFTP_ACK.  Resend it */
-                               block_nr = tmp;
-                               opcode = TFTP_ACK;
+                               block_nr = recv_blk;
                                continue;
                        }
                }
 
                if (CMD_PUT(cmd) && (opcode == TFTP_ACK)) {
-                       if (tmp == (uint16_t) (block_nr - 1)) {
-                               if (finished) {
-                                       break;
-                               }
-
-                               opcode = TFTP_DATA;
-                               continue;
+                       /* did server ACK our last DATA pkt? */
+                       if (recv_blk == (uint16_t) (block_nr - 1)) {
+                               if (finished)
+                                       goto ret;
+                               continue; /* send next block */
                        }
                }
+               /* Awww... recv'd packet is not recognized! */
+               goto recv_again;
+               /* why recv_again? - rfc1123 says:
+                * "The sender (i.e., the side originating the DATA packets)
+                *  must never resend the current DATA packet on receipt
+                *  of a duplicate ACK".
+                * DATA pkts are resent ONLY on timeout.
+                * Thus "goto send_again" will ba a bad mistake above.
+                * See:
+                * http://en.wikipedia.org/wiki/Sorcerer's_Apprentice_Syndrome
+                */
        }
-
+ ret:
        if (ENABLE_FEATURE_CLEAN_UP) {
                close(socketfd);
                free(xbuf);
                free(rbuf);
        }
-
-       return finished ? EXIT_SUCCESS : EXIT_FAILURE;
+       return finished == 0; /* returns 1 on failure */
 }
 
+int tftp_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
 int tftp_main(int argc, char **argv)
 {
        len_and_sockaddr *peer_lsa;
@@ -452,11 +411,12 @@ int tftp_main(int argc, char **argv)
        opt_complementary = "" USE_FEATURE_TFTP_GET("g:") USE_FEATURE_TFTP_PUT("p:")
                        USE_GETPUT("?g--p:p--g");
 
-       USE_GETPUT(cmd =) getopt32(argc, argv,
+       USE_GETPUT(cmd =) getopt32(argv,
                        USE_FEATURE_TFTP_GET("g") USE_FEATURE_TFTP_PUT("p")
                                "l:r:" USE_FEATURE_TFTP_BLOCKSIZE("b:"),
                        &localfile, &remotefile
                        USE_FEATURE_TFTP_BLOCKSIZE(, &sblocksize));
+       argv += optind;
 
        flags = O_RDONLY;
        if (CMD_GET(cmd))
@@ -471,40 +431,36 @@ int tftp_main(int argc, char **argv)
        }
 #endif
 
-       if (localfile == NULL)
+       if (!localfile)
                localfile = remotefile;
-       if (remotefile == NULL)
+       if (!remotefile)
                remotefile = localfile;
-       if ((localfile == NULL && remotefile == NULL) || (argv[optind] == NULL))
+       /* Error if filename or host is not known */
+       if (!remotefile || !argv[0])
                bb_show_usage();
 
-       if (localfile == NULL || LONE_DASH(localfile)) {
-               fd = CMD_GET(cmd) ? STDOUT_FILENO : STDIN_FILENO;
-       } else {
-               fd = xopen3(localfile, flags, 0644);
+       fd = CMD_GET(cmd) ? STDOUT_FILENO : STDIN_FILENO;
+       if (!LONE_DASH(localfile)) {
+               fd = xopen(localfile, flags);
        }
 
-       port = bb_lookup_port(argv[optind + 1], "udp", 69);
-       peer_lsa = host2sockaddr(argv[optind], port);
+       port = bb_lookup_port(argv[1], "udp", 69);
+       peer_lsa = xhost2sockaddr(argv[0], port);
 
 #if ENABLE_DEBUG_TFTP
-       fprintf(stderr, "using server \"%s\", "
-                       "remotefile \"%s\", localfile \"%s\".\n",
-                       xmalloc_sockaddr2dotted(&peer_lsa->sa, peer_lsa->len),
+       fprintf(stderr, "using server '%s', remotefile '%s', localfile '%s'\n",
+                       xmalloc_sockaddr2dotted(&peer_lsa->u.sa),
                        remotefile, localfile);
 #endif
 
-       result = tftp(
-#if ENABLE_FEATURE_TFTP_GET && ENABLE_FEATURE_TFTP_PUT
-               cmd,
-#endif
-               peer_lsa, remotefile, fd, port, blocksize);
+       result = tftp( USE_GETPUT(cmd,) peer_lsa, remotefile, fd, port, blocksize);
 
-       if (fd > 1) {
-               if (ENABLE_FEATURE_CLEAN_UP)
-                       close(fd);
-               if (CMD_GET(cmd) && result != EXIT_SUCCESS)
-                       unlink(localfile);
+       if (ENABLE_FEATURE_CLEAN_UP)
+               close(fd);
+       if (result != EXIT_SUCCESS && !LONE_DASH(localfile) && CMD_GET(cmd)) {
+               unlink(localfile);
        }
        return result;
 }
+
+#endif /* ENABLE_FEATURE_TFTP_GET || ENABLE_FEATURE_TFTP_PUT */