static grub_err_t tftp_close (struct grub_file *file) { tftp_data_t data = file->data; if (data->sock) { grub_uint8_t nbdata[512]; grub_err_t err; struct grub_net_buff nb_err; struct tftphdr *tftph; nb_err.head = nbdata; nb_err.end = nbdata + sizeof (nbdata); grub_netbuff_clear (&nb_err); grub_netbuff_reserve (&nb_err, 512); err = grub_netbuff_push (&nb_err, sizeof (tftph->opcode) + sizeof (tftph->u.err.errcode) + sizeof ("closed")); if (!err) { tftph = (struct tftphdr *) nb_err.data; tftph->opcode = grub_cpu_to_be16_compile_time (TFTP_ERROR); tftph->u.err.errcode = grub_cpu_to_be16_compile_time (TFTP_EUNDEF); grub_memcpy (tftph->u.err.errmsg, "closed", sizeof ("closed")); err = grub_net_send_udp_packet (data->sock, &nb_err); } if (err) grub_print_error (); grub_net_udp_close (data->sock); } destroy_pq (data); grub_free (data); return GRUB_ERR_NONE; }
grub_err_t grub_net_dns_lookup (const char *name, const struct grub_net_network_level_address *servers, grub_size_t n_servers, grub_size_t *naddresses, struct grub_net_network_level_address **addresses, int cache) { grub_size_t send_servers = 0; grub_size_t i, j; struct grub_net_buff *nb; grub_net_udp_socket_t *sockets; grub_uint8_t *optr; const char *iptr; struct dns_header *head; static grub_uint16_t id = 1; grub_uint8_t *qtypeptr; grub_err_t err = GRUB_ERR_NONE; struct recv_data data = {naddresses, addresses, cache, grub_cpu_to_be16 (id++), 0, 0, name, 0}; grub_uint8_t *nbd; int have_server = 0; if (!servers) { servers = dns_servers; n_servers = dns_nservers; } if (!n_servers) return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("no DNS servers configured")); *naddresses = 0; if (cache) { int h; h = hash (name); if (dns_cache[h].name && grub_strcmp (dns_cache[h].name, name) == 0 && grub_get_time_ms () < dns_cache[h].limit_time) { grub_dprintf ("dns", "retrieved from cache\n"); *addresses = grub_malloc (dns_cache[h].naddresses * sizeof ((*addresses)[0])); if (!*addresses) return grub_errno; *naddresses = dns_cache[h].naddresses; grub_memcpy (*addresses, dns_cache[h].addresses, dns_cache[h].naddresses * sizeof ((*addresses)[0])); return GRUB_ERR_NONE; } } sockets = grub_malloc (sizeof (sockets[0]) * n_servers); if (!sockets) return grub_errno; data.name = grub_strdup (name); if (!data.name) { grub_free (sockets); return grub_errno; } nb = grub_netbuff_alloc (GRUB_NET_OUR_MAX_IP_HEADER_SIZE + GRUB_NET_MAX_LINK_HEADER_SIZE + GRUB_NET_UDP_HEADER_SIZE + sizeof (struct dns_header) + grub_strlen (name) + 2 + 4); if (!nb) { grub_free (sockets); grub_free (data.name); return grub_errno; } grub_netbuff_reserve (nb, GRUB_NET_OUR_MAX_IP_HEADER_SIZE + GRUB_NET_MAX_LINK_HEADER_SIZE + GRUB_NET_UDP_HEADER_SIZE); grub_netbuff_put (nb, sizeof (struct dns_header) + grub_strlen (name) + 2 + 4); head = (struct dns_header *) nb->data; optr = (grub_uint8_t *) (head + 1); for (iptr = name; *iptr; ) { const char *dot; dot = grub_strchr (iptr, '.'); if (!dot) dot = iptr + grub_strlen (iptr); if ((dot - iptr) >= 64) { grub_free (sockets); grub_free (data.name); return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("domain name component is too long")); } *optr = (dot - iptr); optr++; grub_memcpy (optr, iptr, dot - iptr); optr += dot - iptr; iptr = dot; if (*iptr) iptr++; } *optr++ = 0; /* Type. */ *optr++ = 0; qtypeptr = optr++; /* Class. */ *optr++ = 0; *optr++ = 1; head->id = data.id; head->flags = FLAGS_RD; head->ra_z_r_code = 0; head->qdcount = grub_cpu_to_be16_compile_time (1); head->ancount = grub_cpu_to_be16_compile_time (0); head->nscount = grub_cpu_to_be16_compile_time (0); head->arcount = grub_cpu_to_be16_compile_time (0); nbd = nb->data; for (i = 0; i < n_servers * 4; i++) { /* Connect to a next server. */ while (!(i & 1) && send_servers < n_servers) { sockets[send_servers] = grub_net_udp_open (servers[send_servers], DNS_PORT, recv_hook, &data); send_servers++; if (!sockets[send_servers - 1]) { err = grub_errno; grub_errno = GRUB_ERR_NONE; } else { have_server = 1; break; } } if (!have_server) goto out; if (*data.naddresses) goto out; for (j = 0; j < send_servers; j++) { grub_err_t err2; if (!sockets[j]) continue; nb->data = nbd; grub_size_t t = 0; do { if (servers[j].option == DNS_OPTION_IPV4 || ((servers[j].option == DNS_OPTION_PREFER_IPV4) && (t++ == 0)) || ((servers[j].option == DNS_OPTION_PREFER_IPV6) && (t++ == 1))) *qtypeptr = GRUB_DNS_QTYPE_A; else *qtypeptr = GRUB_DNS_QTYPE_AAAA; grub_dprintf ("dns", "QTYPE: %u QNAME: %s\n", *qtypeptr, name); err2 = grub_net_send_udp_packet (sockets[j], nb); if (err2) { grub_errno = GRUB_ERR_NONE; err = err2; } if (*data.naddresses) goto out; } while (t == 1); } grub_net_poll_cards (200, &data.stop); } out: grub_free (data.name); grub_netbuff_free (nb); for (j = 0; j < send_servers; j++) grub_net_udp_close (sockets[j]); grub_free (sockets); if (*data.naddresses) return GRUB_ERR_NONE; if (data.dns_err) return grub_error (GRUB_ERR_NET_NO_DOMAIN, N_("no DNS record found")); if (err) { grub_errno = err; return err; } return grub_error (GRUB_ERR_TIMEOUT, N_("no DNS reply received")); }
static grub_err_t tftp_open (struct grub_file *file, const char *filename) { struct tftphdr *tftph; char *rrq; int i; int rrqlen; int hdrlen; grub_uint8_t open_data[1500]; struct grub_net_buff nb; tftp_data_t data; grub_err_t err; grub_uint8_t *nbd; grub_net_network_level_address_t addr; data = grub_zalloc (sizeof (*data)); if (!data) return grub_errno; nb.head = open_data; nb.end = open_data + sizeof (open_data); grub_netbuff_clear (&nb); grub_netbuff_reserve (&nb, 1500); err = grub_netbuff_push (&nb, sizeof (*tftph)); if (err) return err; tftph = (struct tftphdr *) nb.data; rrq = (char *) tftph->u.rrq; rrqlen = 0; tftph->opcode = grub_cpu_to_be16_compile_time (TFTP_RRQ); grub_strcpy (rrq, filename); rrqlen += grub_strlen (filename) + 1; rrq += grub_strlen (filename) + 1; grub_strcpy (rrq, "octet"); rrqlen += grub_strlen ("octet") + 1; rrq += grub_strlen ("octet") + 1; grub_strcpy (rrq, "blksize"); rrqlen += grub_strlen ("blksize") + 1; rrq += grub_strlen ("blksize") + 1; grub_strcpy (rrq, "1024"); rrqlen += grub_strlen ("1024") + 1; rrq += grub_strlen ("1024") + 1; grub_strcpy (rrq, "tsize"); rrqlen += grub_strlen ("tsize") + 1; rrq += grub_strlen ("tsize") + 1; grub_strcpy (rrq, "0"); rrqlen += grub_strlen ("0") + 1; rrq += grub_strlen ("0") + 1; hdrlen = sizeof (tftph->opcode) + rrqlen; err = grub_netbuff_unput (&nb, nb.tail - (nb.data + hdrlen)); if (err) return err; file->not_easily_seekable = 1; file->data = data; data->pq = grub_priority_queue_new (sizeof (struct grub_net_buff *), cmp); if (!data->pq) return grub_errno; err = grub_net_resolve_address (file->device->net->server, &addr); if (err) { destroy_pq (data); return err; } data->sock = grub_net_udp_open (addr, TFTP_SERVER_PORT, tftp_receive, file); if (!data->sock) { destroy_pq (data); return grub_errno; } /* Receive OACK packet. */ nbd = nb.data; for (i = 0; i < GRUB_NET_TRIES; i++) { nb.data = nbd; err = grub_net_send_udp_packet (data->sock, &nb); if (err) { grub_net_udp_close (data->sock); destroy_pq (data); return err; } grub_net_poll_cards (GRUB_NET_INTERVAL + (i * GRUB_NET_INTERVAL_ADDITION), &data->have_oack); if (data->have_oack) break; } if (!data->have_oack) grub_error (GRUB_ERR_TIMEOUT, N_("time out opening `%s'"), filename); else grub_error_load (&data->save_err); if (grub_errno) { grub_net_udp_close (data->sock); destroy_pq (data); return grub_errno; } file->size = data->file_size; return GRUB_ERR_NONE; }
static grub_err_t tftp_receive (grub_net_udp_socket_t sock __attribute__ ((unused)), struct grub_net_buff *nb, void *f) { grub_file_t file = f; struct tftphdr *tftph = (void *) nb->data; tftp_data_t data = file->data; grub_err_t err; grub_uint8_t *ptr; if (nb->tail - nb->data < (grub_ssize_t) sizeof (tftph->opcode)) { grub_dprintf ("tftp", "TFTP packet too small\n"); return GRUB_ERR_NONE; } tftph = (struct tftphdr *) nb->data; switch (grub_be_to_cpu16 (tftph->opcode)) { case TFTP_OACK: data->block_size = TFTP_DEFAULTSIZE_PACKET; data->have_oack = 1; for (ptr = nb->data + sizeof (tftph->opcode); ptr < nb->tail;) { if (grub_memcmp (ptr, "tsize\0", sizeof ("tsize\0") - 1) == 0) data->file_size = grub_strtoul ((char *) ptr + sizeof ("tsize\0") - 1, 0, 0); if (grub_memcmp (ptr, "blksize\0", sizeof ("blksize\0") - 1) == 0) data->block_size = grub_strtoul ((char *) ptr + sizeof ("blksize\0") - 1, 0, 0); while (ptr < nb->tail && *ptr) ptr++; ptr++; } data->block = 0; grub_netbuff_free (nb); err = ack (data, 0); grub_error_save (&data->save_err); return GRUB_ERR_NONE; case TFTP_DATA: if (nb->tail - nb->data < (grub_ssize_t) (sizeof (tftph->opcode) + sizeof (tftph->u.data.block))) { grub_dprintf ("tftp", "TFTP packet too small\n"); return GRUB_ERR_NONE; } err = grub_priority_queue_push (data->pq, &nb); if (err) return err; { struct grub_net_buff **nb_top_p, *nb_top; while (1) { nb_top_p = grub_priority_queue_top (data->pq); if (!nb_top_p) return GRUB_ERR_NONE; nb_top = *nb_top_p; tftph = (struct tftphdr *) nb_top->data; if (cmp_block (grub_be_to_cpu16 (tftph->u.data.block), data->block + 1) >= 0) break; ack (data, grub_be_to_cpu16 (tftph->u.data.block)); grub_netbuff_free (nb_top); grub_priority_queue_pop (data->pq); } while (cmp_block (grub_be_to_cpu16 (tftph->u.data.block), data->block + 1) == 0) { unsigned size; grub_priority_queue_pop (data->pq); if (file->device->net->packs.count < 50) err = ack (data, data->block + 1); else { file->device->net->stall = 1; err = 0; } if (err) return err; err = grub_netbuff_pull (nb_top, sizeof (tftph->opcode) + sizeof (tftph->u.data.block)); if (err) return err; size = nb_top->tail - nb_top->data; data->block++; if (size < data->block_size) { if (data->ack_sent < data->block) ack (data, data->block); file->device->net->eof = 1; file->device->net->stall = 1; grub_net_udp_close (data->sock); data->sock = NULL; } /* Prevent garbage in broken cards. Is it still necessary given that IP implementation has been fixed? */ if (size > data->block_size) { err = grub_netbuff_unput (nb_top, size - data->block_size); if (err) return err; } /* If there is data, puts packet in socket list. */ if ((nb_top->tail - nb_top->data) > 0) grub_net_put_packet (&file->device->net->packs, nb_top); else grub_netbuff_free (nb_top); } } return GRUB_ERR_NONE; case TFTP_ERROR: data->have_oack = 1; grub_netbuff_free (nb); grub_error (GRUB_ERR_IO, (char *) tftph->u.err.errmsg); grub_error_save (&data->save_err); return GRUB_ERR_NONE; default: grub_netbuff_free (nb); return GRUB_ERR_NONE; } }