]> git.proxmox.com Git - mirror_edk2.git/blame - NetworkPkg/DnsDxe/DnsImpl.c
MdeModulePkg:Change the type of BootNext
[mirror_edk2.git] / NetworkPkg / DnsDxe / DnsImpl.c
CommitLineData
99c048ef 1/** @file\r
2DnsDxe support functions implementation.\r
3 \r
4Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>\r
5This program and the accompanying materials\r
6are licensed and made available under the terms and conditions of the BSD License\r
7which accompanies this distribution. The full text of the license may be found at\r
8http://opensource.org/licenses/bsd-license.php\r
9\r
10THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
11WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
12\r
13**/\r
14\r
15#include "DnsImpl.h"\r
16\r
17/**\r
18 Remove TokenEntry from TokenMap.\r
19\r
20 @param[in] TokenMap All DNSv4 Token entrys.\r
21 @param[in] TokenEntry TokenEntry need to be removed.\r
22\r
23 @retval EFI_SUCCESS Remove TokenEntry from TokenMap sucessfully.\r
24 @retval EFI_NOT_FOUND TokenEntry is not found in TokenMap.\r
25\r
26**/\r
27EFI_STATUS\r
28Dns4RemoveTokenEntry (\r
29 IN NET_MAP *TokenMap,\r
30 IN DNS4_TOKEN_ENTRY *TokenEntry\r
31 )\r
32{\r
33 NET_MAP_ITEM *Item;\r
34\r
35 //\r
36 // Find the TokenEntry first.\r
37 //\r
38 Item = NetMapFindKey (TokenMap, (VOID *) TokenEntry);\r
39\r
40 if (Item != NULL) {\r
41 //\r
42 // Remove the TokenEntry if it's found in the map.\r
43 //\r
44 NetMapRemoveItem (TokenMap, Item, NULL);\r
45\r
46 return EFI_SUCCESS;\r
47 }\r
48 \r
49 return EFI_NOT_FOUND;\r
50}\r
51\r
52/**\r
53 Remove TokenEntry from TokenMap.\r
54\r
55 @param[in] TokenMap All DNSv6 Token entrys.\r
56 @param[in] TokenEntry TokenEntry need to be removed.\r
57\r
58 @retval EFI_SUCCESS Remove TokenEntry from TokenMap sucessfully.\r
59 @retval EFI_NOT_FOUND TokenEntry is not found in TokenMap.\r
60 \r
61**/\r
62EFI_STATUS\r
63Dns6RemoveTokenEntry (\r
64 IN NET_MAP *TokenMap,\r
65 IN DNS6_TOKEN_ENTRY *TokenEntry\r
66 )\r
67{\r
68 NET_MAP_ITEM *Item;\r
69\r
70 //\r
71 // Find the TokenEntry first.\r
72 //\r
73 Item = NetMapFindKey (TokenMap, (VOID *) TokenEntry);\r
74\r
75 if (Item != NULL) {\r
76 //\r
77 // Remove the TokenEntry if it's found in the map.\r
78 //\r
79 NetMapRemoveItem (TokenMap, Item, NULL);\r
80\r
81 return EFI_SUCCESS;\r
82 }\r
83 \r
84 return EFI_NOT_FOUND;\r
85}\r
86\r
87/**\r
88 This function cancle the token specified by Arg in the Map.\r
89\r
90 @param[in] Map Pointer to the NET_MAP.\r
91 @param[in] Item Pointer to the NET_MAP_ITEM.\r
92 @param[in] Arg Pointer to the token to be cancelled. If NULL, all\r
93 the tokens in this Map will be cancelled.\r
94 This parameter is optional and may be NULL.\r
95\r
96 @retval EFI_SUCCESS The token is cancelled if Arg is NULL, or the token\r
97 is not the same as that in the Item, if Arg is not\r
98 NULL.\r
99 @retval EFI_ABORTED Arg is not NULL, and the token specified by Arg is\r
100 cancelled.\r
101\r
102**/\r
103EFI_STATUS\r
104EFIAPI\r
105Dns4CancelTokens (\r
106 IN NET_MAP *Map,\r
107 IN NET_MAP_ITEM *Item,\r
108 IN VOID *Arg OPTIONAL\r
109 )\r
110{\r
111 DNS4_TOKEN_ENTRY *TokenEntry;\r
112 NET_BUF *Packet;\r
113 UDP_IO *UdpIo;\r
114\r
115 if ((Arg != NULL) && (Item->Key != Arg)) {\r
116 return EFI_SUCCESS;\r
117 }\r
118\r
119 if (Item->Value != NULL) {\r
120 //\r
121 // If the TokenEntry is a transmit TokenEntry, the corresponding Packet is recorded in\r
122 // Item->Value.\r
123 //\r
124 Packet = (NET_BUF *) (Item->Value);\r
125 UdpIo = (UDP_IO *) (*((UINTN *) &Packet->ProtoData[0]));\r
126\r
127 UdpIoCancelSentDatagram (UdpIo, Packet);\r
128 }\r
129\r
130 //\r
131 // Remove TokenEntry from Dns4TxTokens.\r
132 //\r
133 TokenEntry = (DNS4_TOKEN_ENTRY *) Item->Key;\r
134 if (Dns4RemoveTokenEntry (Map, TokenEntry) == EFI_SUCCESS) {\r
135 TokenEntry->Token->Status = EFI_ABORTED;\r
136 gBS->SignalEvent (TokenEntry->Token->Event);\r
137 DispatchDpc ();\r
138 }\r
139\r
140 if (Arg != NULL) {\r
141 return EFI_ABORTED;\r
142 }\r
143\r
144 return EFI_SUCCESS;\r
145}\r
146\r
147/**\r
148 This function cancle the token specified by Arg in the Map.\r
149\r
150 @param[in] Map Pointer to the NET_MAP.\r
151 @param[in] Item Pointer to the NET_MAP_ITEM.\r
152 @param[in] Arg Pointer to the token to be cancelled. If NULL, all\r
153 the tokens in this Map will be cancelled.\r
154 This parameter is optional and may be NULL.\r
155\r
156 @retval EFI_SUCCESS The token is cancelled if Arg is NULL, or the token\r
157 is not the same as that in the Item, if Arg is not\r
158 NULL.\r
159 @retval EFI_ABORTED Arg is not NULL, and the token specified by Arg is\r
160 cancelled.\r
161\r
162**/\r
163EFI_STATUS\r
164EFIAPI\r
165Dns6CancelTokens (\r
166 IN NET_MAP *Map,\r
167 IN NET_MAP_ITEM *Item,\r
168 IN VOID *Arg OPTIONAL\r
169 )\r
170{\r
171 DNS6_TOKEN_ENTRY *TokenEntry;\r
172 NET_BUF *Packet;\r
173 UDP_IO *UdpIo;\r
174\r
175 if ((Arg != NULL) && (Item->Key != Arg)) {\r
176 return EFI_SUCCESS;\r
177 }\r
178\r
179 if (Item->Value != NULL) {\r
180 //\r
181 // If the TokenEntry is a transmit TokenEntry, the corresponding Packet is recorded in\r
182 // Item->Value.\r
183 //\r
184 Packet = (NET_BUF *) (Item->Value);\r
185 UdpIo = (UDP_IO *) (*((UINTN *) &Packet->ProtoData[0]));\r
186\r
187 UdpIoCancelSentDatagram (UdpIo, Packet);\r
188 }\r
189\r
190 //\r
191 // Remove TokenEntry from Dns6TxTokens.\r
192 //\r
193 TokenEntry = (DNS6_TOKEN_ENTRY *) Item->Key;\r
194 if (Dns6RemoveTokenEntry (Map, TokenEntry) == EFI_SUCCESS) {\r
195 TokenEntry->Token->Status = EFI_ABORTED;\r
196 gBS->SignalEvent (TokenEntry->Token->Event);\r
197 DispatchDpc ();\r
198 }\r
199\r
200 if (Arg != NULL) {\r
201 return EFI_ABORTED;\r
202 }\r
203\r
204 return EFI_SUCCESS;\r
205}\r
206\r
207/**\r
208 Get the TokenEntry from the TokensMap.\r
209\r
210 @param[in] TokensMap All DNSv4 Token entrys\r
211 @param[in] Token Pointer to the token to be get.\r
212 @param[out] TokenEntry Pointer to TokenEntry corresponding Token.\r
213\r
214 @retval EFI_SUCCESS Get the TokenEntry from the TokensMap sucessfully.\r
215 @retval EFI_NOT_FOUND TokenEntry is not found in TokenMap.\r
216\r
217**/\r
218EFI_STATUS\r
219EFIAPI\r
220GetDns4TokenEntry (\r
221 IN NET_MAP *TokensMap,\r
222 IN EFI_DNS4_COMPLETION_TOKEN *Token, \r
223 OUT DNS4_TOKEN_ENTRY **TokenEntry\r
224 )\r
225{\r
226 LIST_ENTRY *Entry;\r
227 \r
228 NET_MAP_ITEM *Item;\r
229 \r
230 NET_LIST_FOR_EACH (Entry, &TokensMap->Used) {\r
231 Item = NET_LIST_USER_STRUCT (Entry, NET_MAP_ITEM, Link);\r
232 *TokenEntry = (DNS4_TOKEN_ENTRY *) (Item->Key); \r
233 if ((*TokenEntry)->Token == Token) {\r
234 return EFI_SUCCESS;\r
235 }\r
236 }\r
237 \r
238 *TokenEntry = NULL;\r
239 \r
240 return EFI_NOT_FOUND;\r
241}\r
242\r
243/**\r
244 Get the TokenEntry from the TokensMap.\r
245\r
246 @param[in] TokensMap All DNSv6 Token entrys\r
247 @param[in] Token Pointer to the token to be get.\r
248 @param[out] TokenEntry Pointer to TokenEntry corresponding Token.\r
249\r
250 @retval EFI_SUCCESS Get the TokenEntry from the TokensMap sucessfully.\r
251 @retval EFI_NOT_FOUND TokenEntry is not found in TokenMap.\r
252\r
253**/\r
254EFI_STATUS\r
255EFIAPI\r
256GetDns6TokenEntry (\r
257 IN NET_MAP *TokensMap,\r
258 IN EFI_DNS6_COMPLETION_TOKEN *Token, \r
259 OUT DNS6_TOKEN_ENTRY **TokenEntry\r
260 )\r
261{\r
262 LIST_ENTRY *Entry;\r
263 \r
264 NET_MAP_ITEM *Item;\r
265 \r
266 NET_LIST_FOR_EACH (Entry, &TokensMap->Used) {\r
267 Item = NET_LIST_USER_STRUCT (Entry, NET_MAP_ITEM, Link);\r
268 *TokenEntry = (DNS6_TOKEN_ENTRY *) (Item->Key); \r
269 if ((*TokenEntry)->Token == Token) {\r
270 return EFI_SUCCESS;\r
271 }\r
272 }\r
273 \r
274 *TokenEntry =NULL;\r
275 \r
276 return EFI_NOT_FOUND;\r
277}\r
278\r
279/**\r
280 Cancel DNS4 tokens from the DNS4 instance.\r
281\r
282 @param[in] Instance Pointer to the DNS instance context data.\r
283 @param[in] Token Pointer to the token to be canceled. If NULL, all\r
284 tokens in this instance will be cancelled.\r
285 This parameter is optional and may be NULL.\r
286\r
287 @retval EFI_SUCCESS The Token is cancelled.\r
288 @retval EFI_NOT_FOUND The Token is not found.\r
289\r
290**/\r
291EFI_STATUS\r
292Dns4InstanceCancelToken (\r
293 IN DNS_INSTANCE *Instance,\r
294 IN EFI_DNS4_COMPLETION_TOKEN *Token\r
295 )\r
296{\r
297 EFI_STATUS Status;\r
298 DNS4_TOKEN_ENTRY *TokenEntry;\r
299\r
300 TokenEntry = NULL;\r
301\r
302 if(Token != NULL ) {\r
303 Status = GetDns4TokenEntry (&Instance->Dns4TxTokens, Token, &TokenEntry);\r
304 if (EFI_ERROR (Status)) {\r
305 return Status;\r
306 }\r
307 } else {\r
308 TokenEntry = NULL;\r
309 }\r
310\r
311 //\r
312 // Cancel this TokenEntry from the Dns4TxTokens map.\r
313 //\r
314 Status = NetMapIterate (&Instance->Dns4TxTokens, Dns4CancelTokens, TokenEntry);\r
315\r
316 if ((TokenEntry != NULL) && (Status == EFI_ABORTED)) {\r
317 //\r
318 // If Token isn't NULL and Status is EFI_ABORTED, the token is cancelled from\r
319 // the Dns4TxTokens and returns success.\r
320 //\r
321 if (NetMapIsEmpty (&Instance->Dns4TxTokens)) {\r
322 Instance->UdpIo->Protocol.Udp4->Cancel (Instance->UdpIo->Protocol.Udp4, &Instance->UdpIo->RecvRequest->Token.Udp4);\r
323 }\r
324 return EFI_SUCCESS;\r
325 }\r
326\r
327 ASSERT ((TokenEntry != NULL) || (0 == NetMapGetCount (&Instance->Dns4TxTokens)));\r
328 \r
329 if (NetMapIsEmpty (&Instance->Dns4TxTokens)) {\r
330 Instance->UdpIo->Protocol.Udp4->Cancel (Instance->UdpIo->Protocol.Udp4, &Instance->UdpIo->RecvRequest->Token.Udp4);\r
331 }\r
332\r
333 return EFI_SUCCESS;\r
334}\r
335\r
336/**\r
337 Cancel DNS6 tokens from the DNS6 instance.\r
338\r
339 @param[in] Instance Pointer to the DNS instance context data.\r
340 @param[in] Token Pointer to the token to be canceled. If NULL, all\r
341 tokens in this instance will be cancelled.\r
342 This parameter is optional and may be NULL.\r
343\r
344 @retval EFI_SUCCESS The Token is cancelled.\r
345 @retval EFI_NOT_FOUND The Token is not found.\r
346\r
347**/\r
348EFI_STATUS\r
349Dns6InstanceCancelToken (\r
350 IN DNS_INSTANCE *Instance,\r
351 IN EFI_DNS6_COMPLETION_TOKEN *Token\r
352 )\r
353{\r
354 EFI_STATUS Status;\r
355 DNS6_TOKEN_ENTRY *TokenEntry;\r
356\r
357 TokenEntry = NULL;\r
358\r
359 if(Token != NULL ) {\r
360 Status = GetDns6TokenEntry (&Instance->Dns6TxTokens, Token, &TokenEntry);\r
361 if (EFI_ERROR (Status)) {\r
362 return Status;\r
363 }\r
364 } else {\r
365 TokenEntry = NULL;\r
366 }\r
367\r
368 //\r
369 // Cancel this TokenEntry from the Dns6TxTokens map.\r
370 //\r
371 Status = NetMapIterate (&Instance->Dns6TxTokens, Dns6CancelTokens, TokenEntry);\r
372\r
373 if ((TokenEntry != NULL) && (Status == EFI_ABORTED)) {\r
374 //\r
375 // If Token isn't NULL and Status is EFI_ABORTED, the token is cancelled from\r
376 // the Dns6TxTokens and returns success.\r
377 //\r
378 if (NetMapIsEmpty (&Instance->Dns6TxTokens)) {\r
379 Instance->UdpIo->Protocol.Udp6->Cancel (Instance->UdpIo->Protocol.Udp6, &Instance->UdpIo->RecvRequest->Token.Udp6);\r
380 }\r
381 return EFI_SUCCESS;\r
382 }\r
383\r
384 ASSERT ((TokenEntry != NULL) || (0 == NetMapGetCount (&Instance->Dns6TxTokens)));\r
385 \r
386 if (NetMapIsEmpty (&Instance->Dns6TxTokens)) {\r
387 Instance->UdpIo->Protocol.Udp6->Cancel (Instance->UdpIo->Protocol.Udp6, &Instance->UdpIo->RecvRequest->Token.Udp6);\r
388 }\r
389\r
390 return EFI_SUCCESS;\r
391}\r
392\r
393/**\r
394 Free the resource related to the configure parameters.\r
395\r
396 @param Config The DNS configure data\r
397\r
398**/\r
399VOID\r
400Dns4CleanConfigure (\r
401 IN OUT EFI_DNS4_CONFIG_DATA *Config\r
402 )\r
403{\r
404 if (Config->DnsServerList != NULL) {\r
405 FreePool (Config->DnsServerList);\r
406 }\r
407\r
408 ZeroMem (Config, sizeof (EFI_DNS4_CONFIG_DATA));\r
409}\r
410\r
411/**\r
412 Free the resource related to the configure parameters.\r
413\r
414 @param Config The DNS configure data\r
415\r
416**/\r
417VOID\r
418Dns6CleanConfigure (\r
419 IN OUT EFI_DNS6_CONFIG_DATA *Config\r
420 )\r
421{\r
422 if (Config->DnsServerList != NULL) {\r
423 FreePool (Config->DnsServerList);\r
424 }\r
425\r
426 ZeroMem (Config, sizeof (EFI_DNS6_CONFIG_DATA));\r
427}\r
428\r
429/**\r
430 Allocate memory for configure parameter such as timeout value for Dst,\r
431 then copy the configure parameter from Src to Dst.\r
432\r
433 @param[out] Dst The destination DHCP configure data.\r
434 @param[in] Src The source DHCP configure data.\r
435\r
436 @retval EFI_OUT_OF_RESOURCES Failed to allocate memory.\r
437 @retval EFI_SUCCESS The configure is copied.\r
438\r
439**/\r
440EFI_STATUS\r
441Dns4CopyConfigure (\r
442 OUT EFI_DNS4_CONFIG_DATA *Dst,\r
443 IN EFI_DNS4_CONFIG_DATA *Src\r
444 )\r
445{\r
446 UINTN Len;\r
447 UINT32 Index;\r
448\r
449 CopyMem (Dst, Src, sizeof (*Dst));\r
450 Dst->DnsServerList = NULL;\r
451\r
452 //\r
453 // Allocate a memory then copy DnsServerList to it\r
454 //\r
455 if (Src->DnsServerList != NULL) {\r
456 Len = Src->DnsServerListCount * sizeof (EFI_IPv4_ADDRESS);\r
457 Dst->DnsServerList = AllocatePool (Len);\r
458 if (Dst->DnsServerList == NULL) {\r
459 Dns4CleanConfigure (Dst);\r
460 return EFI_OUT_OF_RESOURCES;\r
461 }\r
462\r
463 for (Index = 0; Index < Src->DnsServerListCount; Index++) {\r
464 CopyMem (&Dst->DnsServerList[Index], &Src->DnsServerList[Index], sizeof (EFI_IPv4_ADDRESS));\r
465 }\r
466 }\r
467\r
468 return EFI_SUCCESS;\r
469}\r
470\r
471/**\r
472 Allocate memory for configure parameter such as timeout value for Dst,\r
473 then copy the configure parameter from Src to Dst.\r
474\r
475 @param[out] Dst The destination DHCP configure data.\r
476 @param[in] Src The source DHCP configure data.\r
477\r
478 @retval EFI_OUT_OF_RESOURCES Failed to allocate memory.\r
479 @retval EFI_SUCCESS The configure is copied.\r
480\r
481**/\r
482EFI_STATUS\r
483Dns6CopyConfigure (\r
484 OUT EFI_DNS6_CONFIG_DATA *Dst,\r
485 IN EFI_DNS6_CONFIG_DATA *Src\r
486 )\r
487{\r
488 UINTN Len;\r
489 UINT32 Index;\r
490\r
491 CopyMem (Dst, Src, sizeof (*Dst));\r
492 Dst->DnsServerList = NULL;\r
493\r
494 //\r
495 // Allocate a memory then copy DnsServerList to it\r
496 //\r
497 if (Src->DnsServerList != NULL) {\r
498 Len = Src->DnsServerCount * sizeof (EFI_IPv6_ADDRESS);\r
499 Dst->DnsServerList = AllocatePool (Len);\r
500 if (Dst->DnsServerList == NULL) {\r
501 Dns6CleanConfigure (Dst);\r
502 return EFI_OUT_OF_RESOURCES;\r
503 }\r
504\r
505 for (Index = 0; Index < Src->DnsServerCount; Index++) {\r
506 CopyMem (&Dst->DnsServerList[Index], &Src->DnsServerList[Index], sizeof (EFI_IPv6_ADDRESS));\r
507 }\r
508 }\r
509\r
510 return EFI_SUCCESS;\r
511}\r
512\r
513/**\r
514 Callback of Dns packet. Does nothing.\r
515\r
516 @param Arg The context.\r
517\r
518**/\r
519VOID\r
520EFIAPI\r
521DnsDummyExtFree (\r
522 IN VOID *Arg\r
523 )\r
524{\r
525}\r
526\r
527/**\r
528 Poll the UDP to get the IP4 default address, which may be retrieved\r
529 by DHCP. \r
530 \r
531 The default time out value is 5 seconds. If IP has retrieved the default address, \r
532 the UDP is reconfigured.\r
533\r
534 @param Instance The DNS instance\r
535 @param UdpIo The UDP_IO to poll\r
536 @param UdpCfgData The UDP configure data to reconfigure the UDP_IO\r
537\r
538 @retval TRUE The default address is retrieved and UDP is reconfigured.\r
539 @retval FALSE Some error occured.\r
540\r
541**/\r
542BOOLEAN\r
543Dns4GetMapping (\r
544 IN DNS_INSTANCE *Instance,\r
545 IN UDP_IO *UdpIo,\r
546 IN EFI_UDP4_CONFIG_DATA *UdpCfgData\r
547 )\r
548{\r
549 DNS_SERVICE *Service;\r
550 EFI_IP4_MODE_DATA Ip4Mode;\r
551 EFI_UDP4_PROTOCOL *Udp;\r
552 EFI_STATUS Status;\r
553\r
554 ASSERT (Instance->Dns4CfgData.UseDefaultSetting);\r
555\r
556 Service = Instance->Service;\r
557 Udp = UdpIo->Protocol.Udp4;\r
558\r
559 Status = gBS->SetTimer (\r
560 Service->TimerToGetMap,\r
561 TimerRelative,\r
562 DNS_TIME_TO_GETMAP * TICKS_PER_SECOND\r
563 );\r
564 if (EFI_ERROR (Status)) {\r
565 return FALSE;\r
566 }\r
567\r
568 while (!EFI_ERROR (gBS->CheckEvent (Service->TimerToGetMap))) {\r
569 Udp->Poll (Udp);\r
570\r
571 if (!EFI_ERROR (Udp->GetModeData (Udp, NULL, &Ip4Mode, NULL, NULL)) &&\r
572 Ip4Mode.IsConfigured) {\r
573\r
574 Udp->Configure (Udp, NULL);\r
575 return (BOOLEAN) (Udp->Configure (Udp, UdpCfgData) == EFI_SUCCESS);\r
576 }\r
577 }\r
578\r
579 return FALSE;\r
580}\r
581\r
582/**\r
583 Configure the opened Udp6 instance until the corresponding Ip6 instance\r
584 has been configured.\r
585\r
586 @param Instance The DNS instance\r
587 @param UdpIo The UDP_IO to poll\r
588 @param UdpCfgData The UDP configure data to reconfigure the UDP_IO\r
589\r
590 @retval TRUE Configure the Udp6 instance successfully.\r
591 @retval FALSE Some error occured.\r
592\r
593**/\r
594BOOLEAN\r
595Dns6GetMapping (\r
596 IN DNS_INSTANCE *Instance,\r
597 IN UDP_IO *UdpIo,\r
598 IN EFI_UDP6_CONFIG_DATA *UdpCfgData\r
599 )\r
600{\r
601 DNS_SERVICE *Service;\r
602 EFI_IP6_MODE_DATA Ip6Mode;\r
603 EFI_UDP6_PROTOCOL *Udp;\r
604 EFI_STATUS Status;\r
605\r
606 Service = Instance->Service;\r
607 Udp = UdpIo->Protocol.Udp6;\r
608\r
609 Status = gBS->SetTimer (\r
610 Service->TimerToGetMap,\r
611 TimerRelative,\r
612 DNS_TIME_TO_GETMAP * TICKS_PER_SECOND\r
613 );\r
614 if (EFI_ERROR (Status)) {\r
615 return FALSE;\r
616 }\r
617\r
618 while (!EFI_ERROR (gBS->CheckEvent (Service->TimerToGetMap))) {\r
619 Udp->Poll (Udp);\r
620\r
621 if (!EFI_ERROR (Udp->GetModeData (Udp, NULL, &Ip6Mode, NULL, NULL)) &&\r
622 Ip6Mode.IsConfigured) {\r
623\r
624 Udp->Configure (Udp, NULL);\r
625 return (BOOLEAN) (Udp->Configure (Udp, UdpCfgData) == EFI_SUCCESS);\r
626 }\r
627 }\r
628\r
629 return FALSE;\r
630}\r
631\r
632/**\r
633 Configure the UDP.\r
634 \r
635 @param Instance The DNS session\r
636 @param UdpIo The UDP_IO instance\r
637 \r
638 @retval EFI_SUCCESS The UDP is successfully configured for the\r
639 session.\r
640\r
641**/\r
642EFI_STATUS\r
643Dns4ConfigUdp (\r
644 IN DNS_INSTANCE *Instance,\r
645 IN UDP_IO *UdpIo\r
646 )\r
647{\r
648 EFI_DNS4_CONFIG_DATA *Config;\r
649 EFI_UDP4_CONFIG_DATA UdpConfig;\r
650 EFI_STATUS Status;\r
651\r
652 Config = &Instance->Dns4CfgData;\r
653\r
654 UdpConfig.AcceptBroadcast = FALSE;\r
655 UdpConfig.AcceptPromiscuous = FALSE;\r
656 UdpConfig.AcceptAnyPort = FALSE;\r
657 UdpConfig.AllowDuplicatePort = FALSE;\r
658 UdpConfig.TypeOfService = 0;\r
659 UdpConfig.TimeToLive = 128;\r
660 UdpConfig.DoNotFragment = FALSE;\r
661 UdpConfig.ReceiveTimeout = 0;\r
662 UdpConfig.TransmitTimeout = 0;\r
663 UdpConfig.UseDefaultAddress = Config->UseDefaultSetting;\r
664 UdpConfig.SubnetMask = Config->SubnetMask;\r
665 UdpConfig.StationPort = Config->LocalPort;\r
666 UdpConfig.RemotePort = DNS_SERVER_PORT;\r
667\r
668 CopyMem (&UdpConfig.StationAddress, &Config->StationIp, sizeof (EFI_IPv4_ADDRESS));\r
669 CopyMem (&UdpConfig.RemoteAddress, &Instance->SessionDnsServer.v4, sizeof (EFI_IPv4_ADDRESS));\r
670\r
671 Status = UdpIo->Protocol.Udp4->Configure (UdpIo->Protocol.Udp4, &UdpConfig);\r
672\r
673 if ((Status == EFI_NO_MAPPING) && Dns4GetMapping (Instance, UdpIo, &UdpConfig)) {\r
674 return EFI_SUCCESS;\r
675 }\r
676 \r
677 return Status;\r
678}\r
679\r
680/**\r
681 Configure the UDP.\r
682 \r
683 @param Instance The DNS session\r
684 @param UdpIo The UDP_IO instance\r
685\r
686 @retval EFI_SUCCESS The UDP is successfully configured for the\r
687 session.\r
688\r
689**/\r
690EFI_STATUS\r
691Dns6ConfigUdp (\r
692 IN DNS_INSTANCE *Instance,\r
693 IN UDP_IO *UdpIo\r
694 )\r
695{\r
696 EFI_DNS6_CONFIG_DATA *Config;\r
697 EFI_UDP6_CONFIG_DATA UdpConfig;\r
698 EFI_STATUS Status;\r
699\r
700 Config = &Instance->Dns6CfgData;\r
701\r
702 UdpConfig.AcceptPromiscuous = FALSE;\r
703 UdpConfig.AcceptAnyPort = FALSE;\r
704 UdpConfig.AllowDuplicatePort = FALSE;\r
705 UdpConfig.TrafficClass = 0;\r
706 UdpConfig.HopLimit = 128;\r
707 UdpConfig.ReceiveTimeout = 0;\r
708 UdpConfig.TransmitTimeout = 0;\r
709 UdpConfig.StationPort = Config->LocalPort;\r
710 UdpConfig.RemotePort = DNS_SERVER_PORT;\r
711 CopyMem (&UdpConfig.StationAddress, &Config->StationIp, sizeof (EFI_IPv6_ADDRESS));\r
712 CopyMem (&UdpConfig.RemoteAddress, &Instance->SessionDnsServer.v6, sizeof (EFI_IPv6_ADDRESS));\r
713\r
714 Status = UdpIo->Protocol.Udp6->Configure (UdpIo->Protocol.Udp6, &UdpConfig);\r
715\r
716 if ((Status == EFI_NO_MAPPING) && Dns6GetMapping (Instance, UdpIo, &UdpConfig)) {\r
717 return EFI_SUCCESS;\r
718 }\r
719 \r
720 return Status;\r
721}\r
722\r
723/**\r
724 Update Dns4 cache to shared list of caches of all DNSv4 instances.\r
725 \r
726 @param Dns4CacheList All Dns4 cache list.\r
727 @param DeleteFlag If FALSE, this function is to add one entry to the DNS Cache. \r
728 If TRUE, this function will delete matching DNS Cache entry. \r
729 @param Override If TRUE, the matching DNS cache entry will be overwritten with the supplied parameter. \r
730 If FALSE, EFI_ACCESS_DENIED will be returned if the entry to be added is already exists.\r
731 @param DnsCacheEntry Entry Pointer to DNS Cache entry.\r
732\r
733 @retval EFI_SUCCESS Update Dns4 cache successfully.\r
734 @retval Others Failed to update Dns4 cache. \r
735 \r
736**/ \r
737EFI_STATUS\r
738EFIAPI\r
739UpdateDns4Cache (\r
740 IN LIST_ENTRY *Dns4CacheList,\r
741 IN BOOLEAN DeleteFlag,\r
742 IN BOOLEAN Override,\r
743 IN EFI_DNS4_CACHE_ENTRY DnsCacheEntry\r
744 )\r
745{\r
746 DNS4_CACHE *NewDnsCache; \r
747 DNS4_CACHE *Item;\r
748 LIST_ENTRY *Entry;\r
749 LIST_ENTRY *Next;\r
750\r
751 NewDnsCache = NULL;\r
752 Item = NULL;\r
753 \r
754 //\r
755 // Search the database for the matching EFI_DNS_CACHE_ENTRY\r
756 //\r
757 NET_LIST_FOR_EACH_SAFE (Entry, Next, Dns4CacheList) {\r
758 Item = NET_LIST_USER_STRUCT (Entry, DNS4_CACHE, AllCacheLink);\r
759 if (StrCmp (DnsCacheEntry.HostName, Item->DnsCache.HostName) == 0 && \\r
760 CompareMem (DnsCacheEntry.IpAddress, Item->DnsCache.IpAddress, sizeof (EFI_IPv4_ADDRESS)) == 0) {\r
761 //\r
762 // This is the Dns cache entry\r
763 //\r
764 if (DeleteFlag) {\r
765 //\r
766 // Delete matching DNS Cache entry\r
767 //\r
768 RemoveEntryList (&Item->AllCacheLink);\r
769 \r
770 return EFI_SUCCESS;\r
771 } else if (Override) {\r
772 //\r
773 // Update this one\r
774 //\r
775 Item->DnsCache.Timeout = DnsCacheEntry.Timeout;\r
776 \r
777 return EFI_SUCCESS;\r
778 }else {\r
779 return EFI_ACCESS_DENIED;\r
780 }\r
781 }\r
782 }\r
783\r
784 //\r
785 // Add new one\r
786 //\r
787 NewDnsCache = AllocatePool (sizeof (DNS4_CACHE));\r
788 if (NewDnsCache == NULL) { \r
789 return EFI_OUT_OF_RESOURCES;\r
790 }\r
791 \r
792 InitializeListHead (&NewDnsCache->AllCacheLink);\r
793 \r
794 NewDnsCache->DnsCache.HostName = AllocatePool (StrSize (DnsCacheEntry.HostName));\r
795 if (NewDnsCache->DnsCache.HostName == NULL) { \r
796 return EFI_OUT_OF_RESOURCES;\r
797 }\r
798 \r
799 CopyMem (NewDnsCache->DnsCache.HostName, DnsCacheEntry.HostName, StrSize (DnsCacheEntry.HostName));\r
800\r
801 NewDnsCache->DnsCache.IpAddress = AllocatePool (sizeof (EFI_IPv4_ADDRESS));\r
802 if (NewDnsCache->DnsCache.IpAddress == NULL) { \r
803 return EFI_OUT_OF_RESOURCES;\r
804 }\r
805\r
806 CopyMem (NewDnsCache->DnsCache.IpAddress, DnsCacheEntry.IpAddress, sizeof (EFI_IPv4_ADDRESS));\r
807\r
808 NewDnsCache->DnsCache.Timeout = DnsCacheEntry.Timeout;\r
809 \r
810 InsertTailList (Dns4CacheList, &NewDnsCache->AllCacheLink);\r
811 \r
812 return EFI_SUCCESS;\r
813}\r
814\r
815/**\r
816 Update Dns6 cache to shared list of caches of all DNSv6 instances. \r
817\r
818 @param Dns6CacheList All Dns6 cache list.\r
819 @param DeleteFlag If FALSE, this function is to add one entry to the DNS Cache. \r
820 If TRUE, this function will delete matching DNS Cache entry. \r
821 @param Override If TRUE, the matching DNS cache entry will be overwritten with the supplied parameter. \r
822 If FALSE, EFI_ACCESS_DENIED will be returned if the entry to be added is already exists.\r
823 @param DnsCacheEntry Entry Pointer to DNS Cache entry.\r
824 \r
825 @retval EFI_SUCCESS Update Dns6 cache successfully.\r
826 @retval Others Failed to update Dns6 cache.\r
827**/ \r
828EFI_STATUS\r
829EFIAPI\r
830UpdateDns6Cache (\r
831 IN LIST_ENTRY *Dns6CacheList,\r
832 IN BOOLEAN DeleteFlag,\r
833 IN BOOLEAN Override,\r
834 IN EFI_DNS6_CACHE_ENTRY DnsCacheEntry\r
835 )\r
836{\r
837 DNS6_CACHE *NewDnsCache; \r
838 DNS6_CACHE *Item;\r
839 LIST_ENTRY *Entry;\r
840 LIST_ENTRY *Next;\r
841\r
842 NewDnsCache = NULL;\r
843 Item = NULL;\r
844 \r
845 //\r
846 // Search the database for the matching EFI_DNS_CACHE_ENTRY\r
847 //\r
848 NET_LIST_FOR_EACH_SAFE (Entry, Next, Dns6CacheList) {\r
849 Item = NET_LIST_USER_STRUCT (Entry, DNS6_CACHE, AllCacheLink);\r
850 if (StrCmp (DnsCacheEntry.HostName, Item->DnsCache.HostName) == 0 && \\r
851 CompareMem (DnsCacheEntry.IpAddress, Item->DnsCache.IpAddress, sizeof (EFI_IPv6_ADDRESS)) == 0) {\r
852 //\r
853 // This is the Dns cache entry\r
854 //\r
855 if (DeleteFlag) {\r
856 //\r
857 // Delete matching DNS Cache entry\r
858 //\r
859 RemoveEntryList (&Item->AllCacheLink);\r
860 \r
861 return EFI_SUCCESS;\r
862 } else if (Override) {\r
863 //\r
864 // Update this one\r
865 //\r
866 Item->DnsCache.Timeout = DnsCacheEntry.Timeout;\r
867 \r
868 return EFI_SUCCESS;\r
869 }else {\r
870 return EFI_ACCESS_DENIED;\r
871 }\r
872 }\r
873 }\r
874\r
875 //\r
876 // Add new one\r
877 //\r
878 NewDnsCache = AllocatePool (sizeof (DNS6_CACHE));\r
879 if (NewDnsCache == NULL) { \r
880 return EFI_OUT_OF_RESOURCES;\r
881 }\r
882 \r
883 InitializeListHead (&NewDnsCache->AllCacheLink);\r
884 \r
885 NewDnsCache->DnsCache.HostName = AllocatePool (StrSize (DnsCacheEntry.HostName));\r
886 if (NewDnsCache->DnsCache.HostName == NULL) { \r
887 return EFI_OUT_OF_RESOURCES;\r
888 }\r
889 \r
890 CopyMem (NewDnsCache->DnsCache.HostName, DnsCacheEntry.HostName, StrSize (DnsCacheEntry.HostName));\r
891\r
892 NewDnsCache->DnsCache.IpAddress = AllocatePool (sizeof (EFI_IPv6_ADDRESS));\r
893 if (NewDnsCache->DnsCache.IpAddress == NULL) { \r
894 return EFI_OUT_OF_RESOURCES;\r
895 }\r
896 \r
897 CopyMem (NewDnsCache->DnsCache.IpAddress, DnsCacheEntry.IpAddress, sizeof (EFI_IPv6_ADDRESS));\r
898\r
899 NewDnsCache->DnsCache.Timeout = DnsCacheEntry.Timeout;\r
900 \r
901 InsertTailList (Dns6CacheList, &NewDnsCache->AllCacheLink);\r
902 \r
903 return EFI_SUCCESS;\r
904}\r
905\r
906/**\r
907 Add Dns4 ServerIp to common list of addresses of all configured DNSv4 server. \r
908\r
909 @param Dns4ServerList Common list of addresses of all configured DNSv4 server. \r
910 @param ServerIp DNS server Ip. \r
911\r
912 @retval EFI_SUCCESS Add Dns4 ServerIp to common list successfully.\r
913 @retval Others Failed to add Dns4 ServerIp to common list.\r
914 \r
915**/ \r
916EFI_STATUS\r
917EFIAPI\r
918AddDns4ServerIp (\r
919 IN LIST_ENTRY *Dns4ServerList,\r
920 IN EFI_IPv4_ADDRESS ServerIp\r
921 )\r
922{\r
923 DNS4_SERVER_IP *NewServerIp; \r
924 DNS4_SERVER_IP *Item;\r
925 LIST_ENTRY *Entry;\r
926 LIST_ENTRY *Next;\r
927\r
928 NewServerIp = NULL;\r
929 Item = NULL;\r
930 \r
931 //\r
932 // Search the database for the matching ServerIp\r
933 //\r
934 NET_LIST_FOR_EACH_SAFE (Entry, Next, Dns4ServerList) {\r
935 Item = NET_LIST_USER_STRUCT (Entry, DNS4_SERVER_IP, AllServerLink);\r
936 if (CompareMem (&Item->Dns4ServerIp, &ServerIp, sizeof (EFI_IPv4_ADDRESS)) == 0) {\r
937 //\r
938 // Already done.\r
939 // \r
940 return EFI_SUCCESS;\r
941 }\r
942 }\r
943\r
944 //\r
945 // Add new one\r
946 //\r
947 NewServerIp = AllocatePool (sizeof (DNS4_SERVER_IP));\r
948 if (NewServerIp == NULL) { \r
949 return EFI_OUT_OF_RESOURCES;\r
950 }\r
951 \r
952 InitializeListHead (&NewServerIp->AllServerLink);\r
953 \r
954 CopyMem (&NewServerIp->Dns4ServerIp, &ServerIp, sizeof (EFI_IPv4_ADDRESS));\r
955 \r
956 InsertTailList (Dns4ServerList, &NewServerIp->AllServerLink);\r
957 \r
958 return EFI_SUCCESS;\r
959}\r
960\r
961/**\r
962 Add Dns6 ServerIp to common list of addresses of all configured DNSv6 server. \r
963\r
964 @param Dns6ServerList Common list of addresses of all configured DNSv6 server. \r
965 @param ServerIp DNS server Ip. \r
966\r
967 @retval EFI_SUCCESS Add Dns6 ServerIp to common list successfully.\r
968 @retval Others Failed to add Dns6 ServerIp to common list.\r
969 \r
970**/ \r
971EFI_STATUS\r
972EFIAPI\r
973AddDns6ServerIp (\r
974 IN LIST_ENTRY *Dns6ServerList,\r
975 IN EFI_IPv6_ADDRESS ServerIp\r
976 )\r
977{\r
978 DNS6_SERVER_IP *NewServerIp; \r
979 DNS6_SERVER_IP *Item;\r
980 LIST_ENTRY *Entry;\r
981 LIST_ENTRY *Next;\r
982\r
983 NewServerIp = NULL;\r
984 Item = NULL;\r
985 \r
986 //\r
987 // Search the database for the matching ServerIp\r
988 //\r
989 NET_LIST_FOR_EACH_SAFE (Entry, Next, Dns6ServerList) {\r
990 Item = NET_LIST_USER_STRUCT (Entry, DNS6_SERVER_IP, AllServerLink);\r
991 if (CompareMem (&Item->Dns6ServerIp, &ServerIp, sizeof (EFI_IPv6_ADDRESS)) == 0) {\r
992 //\r
993 // Already done.\r
994 // \r
995 return EFI_SUCCESS;\r
996 }\r
997 }\r
998\r
999 //\r
1000 // Add new one\r
1001 //\r
1002 NewServerIp = AllocatePool (sizeof (DNS6_SERVER_IP));\r
1003 if (NewServerIp == NULL) { \r
1004 return EFI_OUT_OF_RESOURCES;\r
1005 }\r
1006 \r
1007 InitializeListHead (&NewServerIp->AllServerLink);\r
1008 \r
1009 CopyMem (&NewServerIp->Dns6ServerIp, &ServerIp, sizeof (EFI_IPv6_ADDRESS));\r
1010 \r
1011 InsertTailList (Dns6ServerList, &NewServerIp->AllServerLink);\r
1012 \r
1013 return EFI_SUCCESS;\r
1014}\r
1015\r
fcae1a99
JW
1016/**\r
1017 Fill QName for IP querying. QName is a domain name represented as \r
1018 a sequence of labels, where each label consists of a length octet \r
1019 followed by that number of octets. The domain name terminates with \r
1020 the zero length octet for the null label of the root. Caller should \r
1021 take responsibility to the buffer in QName.\r
1022\r
1023 @param HostName Queried HostName \r
1024\r
1025 @retval NULL Failed to fill QName.\r
1026 @return QName filled successfully.\r
1027 \r
1028**/ \r
1029UINT8 *\r
1030EFIAPI\r
1031DnsFillinQNameForQueryIp (\r
1032 IN CHAR16 *HostName\r
1033 )\r
1034{\r
1035 CHAR8 *QueryName;\r
1036 CHAR8 *Header;\r
1037 CHAR8 *Tail;\r
1038 UINTN Len;\r
1039 UINTN Index;\r
1040\r
1041 QueryName = NULL;\r
1042 Header = NULL;\r
1043 Tail = NULL;\r
1044\r
1045 QueryName = AllocateZeroPool (DNS_DEFAULT_BLKSIZE);\r
1046 if (QueryName == NULL) {\r
1047 return NULL;\r
1048 }\r
1049 \r
1050 Header = QueryName;\r
1051 Tail = Header + 1;\r
1052 Len = 0;\r
1053 for (Index = 0; HostName[Index] != 0; Index++) {\r
1054 *Tail = (CHAR8) HostName[Index];\r
1055 if (*Tail == '.') {\r
1056 *Header = (CHAR8) Len;\r
1057 Header = Tail;\r
1058 Tail ++;\r
1059 Len = 0;\r
1060 } else {\r
1061 Tail++;\r
1062 Len++;\r
1063 }\r
1064 }\r
1065 *Header = (CHAR8) Len;\r
1066 *Tail = 0;\r
1067\r
1068 return QueryName;\r
1069}\r
1070\r
99c048ef 1071/**\r
1072 Find out whether the response is valid or invalid.\r
1073\r
1074 @param TokensMap All DNS transmittal Tokens entry. \r
1075 @param Identification Identification for queried packet. \r
1076 @param Type Type for queried packet.\r
1077 @param Item Return corresponding Token entry.\r
1078\r
1079 @retval TRUE The response is valid.\r
1080 @retval FALSE The response is invalid.\r
1081 \r
1082**/ \r
1083BOOLEAN\r
1084IsValidDnsResponse (\r
1085 IN NET_MAP *TokensMap,\r
1086 IN UINT16 Identification,\r
1087 IN UINT16 Type,\r
1088 OUT NET_MAP_ITEM **Item\r
1089 )\r
1090{\r
1091 LIST_ENTRY *Entry;\r
1092\r
1093 NET_BUF *Packet;\r
1094 UINT8 *TxString;\r
1095 DNS_HEADER *DnsHeader;\r
1096 CHAR8 *QueryName;\r
1097 DNS_QUERY_SECTION *QuerySection;\r
1098\r
1099 NET_LIST_FOR_EACH (Entry, &TokensMap->Used) {\r
1100 *Item = NET_LIST_USER_STRUCT (Entry, NET_MAP_ITEM, Link);\r
1101 Packet = (NET_BUF *) ((*Item)->Value);\r
1102 if (Packet == NULL){\r
1103 \r
1104 continue;\r
1105 } else {\r
1106 TxString = NetbufGetByte (Packet, 0, NULL);\r
3fd7bd08 1107 ASSERT (TxString != NULL);\r
99c048ef 1108 DnsHeader = (DNS_HEADER *) TxString;\r
1109 QueryName = (CHAR8 *) (TxString + sizeof (*DnsHeader));\r
1110 QuerySection = (DNS_QUERY_SECTION *) (QueryName + AsciiStrLen (QueryName) + 1);\r
1111\r
1112 DnsHeader->Identification = NTOHS (DnsHeader->Identification);\r
1113 QuerySection->Type = NTOHS (QuerySection->Type);\r
1114 \r
1115 if (DnsHeader->Identification == Identification && QuerySection->Type == Type) {\r
1116 return TRUE;\r
1117 }\r
1118 } \r
1119 }\r
1120 \r
1121 *Item =NULL;\r
1122 \r
1123 return FALSE;\r
1124}\r
1125\r
1126/**\r
1127 Parse Dns Response.\r
1128\r
1129 @param Instance The DNS instance\r
1130 @param RxString Received buffer.\r
1131 @param Completed Flag to indicate that Dns response is valid. \r
1132 \r
1133 @retval EFI_SUCCESS Parse Dns Response successfully.\r
1134 @retval Others Failed to parse Dns Response.\r
1135 \r
1136**/ \r
1137EFI_STATUS\r
1138ParseDnsResponse (\r
1139 IN OUT DNS_INSTANCE *Instance,\r
1140 IN UINT8 *RxString,\r
1141 OUT BOOLEAN *Completed\r
1142 )\r
1143{\r
1144 DNS_HEADER *DnsHeader;\r
1145 \r
1146 CHAR8 *QueryName;\r
1147 DNS_QUERY_SECTION *QuerySection;\r
1148 \r
1149 CHAR8 *AnswerName;\r
1150 DNS_ANSWER_SECTION *AnswerSection;\r
1151 UINT8 *AnswerData;\r
1152\r
1153 NET_MAP_ITEM *Item;\r
1154 DNS4_TOKEN_ENTRY *Dns4TokenEntry;\r
1155 DNS6_TOKEN_ENTRY *Dns6TokenEntry;\r
1156 \r
1157 UINT32 IpCount;\r
fcae1a99 1158 UINT32 RRCount;\r
99c048ef 1159 UINT32 AnswerSectionNum;\r
1160 \r
1161 EFI_IPv4_ADDRESS *HostAddr4;\r
1162 EFI_IPv6_ADDRESS *HostAddr6;\r
1163\r
1164 EFI_DNS4_CACHE_ENTRY *Dns4CacheEntry;\r
1165 EFI_DNS6_CACHE_ENTRY *Dns6CacheEntry;\r
1166\r
fcae1a99
JW
1167 DNS_RESOURCE_RECORD *Dns4RR;\r
1168 DNS6_RESOURCE_RECORD *Dns6RR;\r
1169\r
99c048ef 1170 EFI_STATUS Status;\r
1171\r
1172 EFI_TPL OldTpl;\r
1173 \r
1174 Item = NULL;\r
1175 Dns4TokenEntry = NULL;\r
1176 Dns6TokenEntry = NULL;\r
1177 \r
1178 IpCount = 0;\r
fcae1a99 1179 RRCount = 0;\r
99c048ef 1180 AnswerSectionNum = 0;\r
1181 \r
1182 HostAddr4 = NULL;\r
1183 HostAddr6 = NULL;\r
1184 \r
1185 Dns4CacheEntry = NULL;\r
1186 Dns6CacheEntry = NULL;\r
fcae1a99
JW
1187 \r
1188 Dns4RR = NULL;\r
1189 Dns6RR = NULL;\r
99c048ef 1190\r
1191 *Completed = TRUE;\r
1192 Status = EFI_SUCCESS;\r
1193 \r
1194 //\r
1195 // Get header\r
1196 //\r
1197 DnsHeader = (DNS_HEADER *) RxString;\r
1198 \r
1199 DnsHeader->Identification = NTOHS (DnsHeader->Identification);\r
1200 DnsHeader->Flags.Uint16 = NTOHS (DnsHeader->Flags.Uint16);\r
1201 DnsHeader->QuestionsNum = NTOHS (DnsHeader->QuestionsNum);\r
1202 DnsHeader->AnswersNum = NTOHS (DnsHeader->AnswersNum);\r
1203 DnsHeader->AuthorityNum = NTOHS (DnsHeader->AuthorityNum);\r
1204 DnsHeader->AditionalNum = NTOHS (DnsHeader->AditionalNum);\r
1205\r
1206 //\r
1207 // Get Query name\r
1208 //\r
1209 QueryName = (CHAR8 *) (RxString + sizeof (*DnsHeader));\r
1210\r
1211 //\r
1212 // Get query section\r
1213 //\r
1214 QuerySection = (DNS_QUERY_SECTION *) (QueryName + AsciiStrLen (QueryName) + 1);\r
1215 QuerySection->Type = NTOHS (QuerySection->Type);\r
1216 QuerySection->Class = NTOHS (QuerySection->Class);\r
1217\r
1218 //\r
1219 // Get Answer name\r
1220 //\r
1221 AnswerName = (CHAR8 *) QuerySection + sizeof (*QuerySection);\r
1222\r
1223 OldTpl = gBS->RaiseTPL (TPL_CALLBACK);\r
1224\r
1225 //\r
1226 // Check DnsResponse Validity, if so, also get a valid NET_MAP_ITEM.\r
1227 //\r
1228 if (Instance->Service->IpVersion == IP_VERSION_4) {\r
1229 if (!IsValidDnsResponse (&Instance->Dns4TxTokens, DnsHeader->Identification, QuerySection->Type, &Item)) {\r
1230 *Completed = FALSE;\r
1231 Status = EFI_ABORTED;\r
1232 goto ON_EXIT;\r
1233 }\r
1234 ASSERT (Item != NULL);\r
1235 Dns4TokenEntry = (DNS4_TOKEN_ENTRY *) (Item->Key);\r
1236 } else {\r
1237 if (!IsValidDnsResponse (&Instance->Dns6TxTokens, DnsHeader->Identification, QuerySection->Type, &Item)) {\r
1238 *Completed = FALSE;\r
1239 Status = EFI_ABORTED;\r
1240 goto ON_EXIT;\r
1241 }\r
1242 ASSERT (Item != NULL);\r
1243 Dns6TokenEntry = (DNS6_TOKEN_ENTRY *) (Item->Key);\r
1244 }\r
1245 \r
1246 //\r
1247 // Continue Check Some Errors.\r
1248 //\r
1249 if (DnsHeader->Flags.Bits.RCode != DNS_FLAGS_RCODE_NO_ERROR || DnsHeader->AnswersNum < 1 || \\r
1250 DnsHeader->Flags.Bits.QR != DNS_FLAGS_QR_RESPONSE || QuerySection->Class != DNS_CLASS_INET) {\r
1251 Status = EFI_ABORTED;\r
1252 goto ON_EXIT;\r
1253 }\r
1254\r
1255 //\r
1256 // Free the sending packet.\r
1257 //\r
1258 if (Item->Value != NULL) {\r
1259 NetbufFree ((NET_BUF *) (Item->Value));\r
1260 }\r
1261 \r
1262 //\r
fcae1a99 1263 // Do some buffer allocations.\r
99c048ef 1264 //\r
00c0c3f2
JW
1265 if (Instance->Service->IpVersion == IP_VERSION_4) {\r
1266 ASSERT (Dns4TokenEntry != NULL);\r
fcae1a99
JW
1267\r
1268 if (Dns4TokenEntry->GeneralLookUp) {\r
1269 //\r
1270 // It's the GeneralLookUp querying.\r
1271 //\r
1272 Dns4TokenEntry->Token->RspData.GLookupData = AllocatePool (sizeof (DNS_RESOURCE_RECORD));\r
1273 if (Dns4TokenEntry->Token->RspData.GLookupData == NULL) {\r
1274 Status = EFI_OUT_OF_RESOURCES;\r
1275 goto ON_EXIT;\r
1276 }\r
1277 Dns4TokenEntry->Token->RspData.GLookupData->RRList = AllocatePool (DnsHeader->AnswersNum * sizeof (DNS_RESOURCE_RECORD));\r
1278 if (Dns4TokenEntry->Token->RspData.GLookupData->RRList == NULL) {\r
1279 Status = EFI_OUT_OF_RESOURCES;\r
1280 goto ON_EXIT;\r
1281 }\r
00c0c3f2 1282 } else {\r
fcae1a99
JW
1283 //\r
1284 // It's not the GeneralLookUp querying. Check the Query type.\r
1285 //\r
1286 if (QuerySection->Type == DNS_TYPE_A) {\r
1287 Dns4TokenEntry->Token->RspData.H2AData = AllocatePool (sizeof (DNS_HOST_TO_ADDR_DATA));\r
1288 if (Dns4TokenEntry->Token->RspData.H2AData == NULL) {\r
1289 Status = EFI_OUT_OF_RESOURCES;\r
1290 goto ON_EXIT;\r
1291 }\r
1292 Dns4TokenEntry->Token->RspData.H2AData->IpList = AllocatePool (DnsHeader->AnswersNum * sizeof (EFI_IPv4_ADDRESS));\r
1293 if (Dns4TokenEntry->Token->RspData.H2AData->IpList == NULL) {\r
1294 Status = EFI_OUT_OF_RESOURCES;\r
1295 goto ON_EXIT;\r
1296 }\r
1297 } else {\r
1298 Status = EFI_UNSUPPORTED;\r
1299 goto ON_EXIT;\r
1300 }\r
00c0c3f2 1301 }\r
99c048ef 1302 } else {\r
00c0c3f2 1303 ASSERT (Dns6TokenEntry != NULL);\r
fcae1a99
JW
1304\r
1305 if (Dns6TokenEntry->GeneralLookUp) {\r
1306 //\r
1307 // It's the GeneralLookUp querying.\r
1308 //\r
1309 Dns6TokenEntry->Token->RspData.GLookupData = AllocatePool (sizeof (DNS_RESOURCE_RECORD));\r
1310 if (Dns6TokenEntry->Token->RspData.GLookupData == NULL) {\r
1311 Status = EFI_UNSUPPORTED;\r
1312 goto ON_EXIT;\r
1313 }\r
1314 Dns6TokenEntry->Token->RspData.GLookupData->RRList = AllocatePool (DnsHeader->AnswersNum * sizeof (DNS_RESOURCE_RECORD));\r
1315 if (Dns6TokenEntry->Token->RspData.GLookupData->RRList == NULL) {\r
1316 Status = EFI_UNSUPPORTED;\r
1317 goto ON_EXIT;\r
1318 }\r
00c0c3f2 1319 } else {\r
fcae1a99
JW
1320 //\r
1321 // It's not the GeneralLookUp querying. Check the Query type.\r
1322 //\r
1323 if (QuerySection->Type == DNS_TYPE_AAAA) {\r
1324 Dns6TokenEntry->Token->RspData.H2AData = AllocatePool (sizeof (DNS6_HOST_TO_ADDR_DATA));\r
1325 if (Dns6TokenEntry->Token->RspData.H2AData == NULL) {\r
1326 Status = EFI_UNSUPPORTED;\r
1327 goto ON_EXIT;\r
1328 }\r
1329 Dns6TokenEntry->Token->RspData.H2AData->IpList = AllocatePool (DnsHeader->AnswersNum * sizeof (EFI_IPv6_ADDRESS));\r
1330 if (Dns6TokenEntry->Token->RspData.H2AData->IpList == NULL) {\r
1331 Status = EFI_UNSUPPORTED;\r
1332 goto ON_EXIT;\r
1333 }\r
1334 } else {\r
1335 Status = EFI_UNSUPPORTED;\r
1336 goto ON_EXIT;\r
1337 }\r
00c0c3f2 1338 }\r
99c048ef 1339 }\r
1340\r
1341 //\r
1342 // Processing AnswerSection.\r
1343 //\r
1344 while (AnswerSectionNum < DnsHeader->AnswersNum) {\r
1345 //\r
1346 // Answer name should be PTR.\r
1347 //\r
1348 ASSERT ((*(UINT8 *) AnswerName & 0xC0) == 0xC0);\r
1349 \r
1350 //\r
1351 // Get Answer section.\r
1352 //\r
1353 AnswerSection = (DNS_ANSWER_SECTION *) (AnswerName + sizeof (UINT16));\r
1354 AnswerSection->Type = NTOHS (AnswerSection->Type);\r
1355 AnswerSection->Class = NTOHS (AnswerSection->Class);\r
1356 AnswerSection->Ttl = NTOHL (AnswerSection->Ttl);\r
1357 AnswerSection->DataLength = NTOHS (AnswerSection->DataLength);\r
1358\r
fcae1a99
JW
1359 //\r
1360 // Check whether it's the GeneralLookUp querying.\r
1361 //\r
1362 if (Instance->Service->IpVersion == IP_VERSION_4 && Dns4TokenEntry->GeneralLookUp) {\r
1363 ASSERT (Dns4TokenEntry != NULL);\r
1364 \r
1365 Dns4RR = Dns4TokenEntry->Token->RspData.GLookupData->RRList;\r
1366 AnswerData = (UINT8 *) AnswerSection + sizeof (*AnswerSection);\r
1367\r
1368 //\r
1369 // Fill the ResourceRecord.\r
1370 //\r
1371 Dns4RR[RRCount].QName = AllocateZeroPool (AsciiStrLen (QueryName) + 1);\r
1372 if (Dns4RR[RRCount].QName == NULL) {\r
1373 Status = EFI_UNSUPPORTED;\r
1374 goto ON_EXIT;\r
1375 }\r
1376 CopyMem (Dns4RR[RRCount].QName, QueryName, AsciiStrLen (QueryName));\r
1377 Dns4RR[RRCount].QType = AnswerSection->Type;\r
1378 Dns4RR[RRCount].QClass = AnswerSection->Class;\r
1379 Dns4RR[RRCount].TTL = AnswerSection->Ttl;\r
1380 Dns4RR[RRCount].DataLength = AnswerSection->DataLength;\r
1381 Dns4RR[RRCount].RData = AllocateZeroPool (Dns4RR[RRCount].DataLength);\r
1382 if (Dns4RR[RRCount].RData == NULL) {\r
1383 Status = EFI_UNSUPPORTED;\r
1384 goto ON_EXIT;\r
1385 }\r
1386 CopyMem (Dns4RR[RRCount].RData, AnswerData, Dns4RR[RRCount].DataLength);\r
1387 \r
1388 RRCount ++;\r
1389 } else if (Instance->Service->IpVersion == IP_VERSION_6 && Dns6TokenEntry->GeneralLookUp) {\r
1390 ASSERT (Dns6TokenEntry != NULL);\r
1391 \r
1392 Dns6RR = Dns6TokenEntry->Token->RspData.GLookupData->RRList;\r
1393 AnswerData = (UINT8 *) AnswerSection + sizeof (*AnswerSection);\r
99c048ef 1394\r
fcae1a99
JW
1395 //\r
1396 // Fill the ResourceRecord.\r
1397 //\r
1398 Dns6RR[RRCount].QName = AllocateZeroPool (AsciiStrLen (QueryName) + 1);\r
1399 if (Dns6RR[RRCount].QName == NULL) {\r
1400 Status = EFI_UNSUPPORTED;\r
1401 goto ON_EXIT;\r
1402 }\r
1403 CopyMem (Dns6RR[RRCount].QName, QueryName, AsciiStrLen (QueryName));\r
1404 Dns6RR[RRCount].QType = AnswerSection->Type;\r
1405 Dns6RR[RRCount].QClass = AnswerSection->Class;\r
1406 Dns6RR[RRCount].TTL = AnswerSection->Ttl;\r
1407 Dns6RR[RRCount].DataLength = AnswerSection->DataLength;\r
1408 Dns6RR[RRCount].RData = AllocateZeroPool (Dns6RR[RRCount].DataLength);\r
1409 if (Dns6RR[RRCount].RData == NULL) {\r
1410 Status = EFI_UNSUPPORTED;\r
1411 goto ON_EXIT;\r
1412 }\r
1413 CopyMem (Dns6RR[RRCount].RData, AnswerData, Dns6RR[RRCount].DataLength);\r
1414 \r
1415 RRCount ++;\r
1416 } else {\r
1417 //\r
1418 // It's not the GeneralLookUp querying. \r
1419 // Check the Query type, parse the response packet.\r
1420 //\r
99c048ef 1421 switch (AnswerSection->Type) {\r
1422 case DNS_TYPE_A:\r
1423 //\r
1424 // This is address entry, get Data.\r
1425 //\r
00c0c3f2 1426 ASSERT (Dns4TokenEntry != NULL && AnswerSection->DataLength == 4);\r
99c048ef 1427 \r
1428 HostAddr4 = Dns4TokenEntry->Token->RspData.H2AData->IpList;\r
1429 AnswerData = (UINT8 *) AnswerSection + sizeof (*AnswerSection);\r
1430 CopyMem (&HostAddr4[IpCount], AnswerData, sizeof (EFI_IPv4_ADDRESS));\r
1431\r
1432 //\r
1433 // Update DNS cache dynamically.\r
1434 //\r
1435 if (Dns4CacheEntry != NULL) {\r
1436 if (Dns4CacheEntry->HostName != NULL) {\r
1437 FreePool (Dns4CacheEntry->HostName);\r
1438 }\r
1439\r
1440 if (Dns4CacheEntry->IpAddress != NULL) {\r
1441 FreePool (Dns4CacheEntry->IpAddress);\r
1442 }\r
1443 \r
1444 FreePool (Dns4CacheEntry);\r
1445 }\r
1446\r
1447 // \r
1448 // Allocate new CacheEntry pool.\r
1449 //\r
1450 Dns4CacheEntry = AllocateZeroPool (sizeof (EFI_DNS4_CACHE_ENTRY));\r
fcae1a99
JW
1451 if (Dns4CacheEntry == NULL) {\r
1452 Status = EFI_UNSUPPORTED;\r
1453 goto ON_EXIT;\r
1454 }\r
99c048ef 1455 Dns4CacheEntry->HostName = AllocateZeroPool (2 * (StrLen(Dns4TokenEntry->QueryHostName) + 1));\r
fcae1a99
JW
1456 if (Dns4CacheEntry->HostName == NULL) {\r
1457 Status = EFI_UNSUPPORTED;\r
1458 goto ON_EXIT;\r
1459 }\r
99c048ef 1460 CopyMem (Dns4CacheEntry->HostName, Dns4TokenEntry->QueryHostName, 2 * (StrLen(Dns4TokenEntry->QueryHostName) + 1));\r
1461 Dns4CacheEntry->IpAddress = AllocateZeroPool (sizeof (EFI_IPv4_ADDRESS));\r
fcae1a99
JW
1462 if (Dns4CacheEntry->IpAddress == NULL) {\r
1463 Status = EFI_UNSUPPORTED;\r
1464 goto ON_EXIT;\r
1465 }\r
99c048ef 1466 CopyMem (Dns4CacheEntry->IpAddress, AnswerData, sizeof (EFI_IPv4_ADDRESS));\r
1467 Dns4CacheEntry->Timeout = AnswerSection->Ttl;\r
1468 \r
1469 UpdateDns4Cache (&mDriverData->Dns4CacheList, FALSE, TRUE, *Dns4CacheEntry); \r
1470\r
1471 IpCount ++; \r
1472 break;\r
1473 case DNS_TYPE_AAAA:\r
1474 //\r
1475 // This is address entry, get Data.\r
1476 //\r
00c0c3f2 1477 ASSERT (Dns6TokenEntry != NULL && AnswerSection->DataLength == 16);\r
99c048ef 1478 \r
1479 HostAddr6 = Dns6TokenEntry->Token->RspData.H2AData->IpList;\r
1480 AnswerData = (UINT8 *) AnswerSection + sizeof (*AnswerSection);\r
1481 CopyMem (&HostAddr6[IpCount], AnswerData, sizeof (EFI_IPv6_ADDRESS));\r
1482\r
1483 //\r
1484 // Update DNS cache dynamically.\r
1485 //\r
1486 if (Dns6CacheEntry != NULL) {\r
1487 if (Dns6CacheEntry->HostName != NULL) {\r
1488 FreePool (Dns6CacheEntry->HostName);\r
1489 }\r
1490\r
1491 if (Dns6CacheEntry->IpAddress != NULL) {\r
1492 FreePool (Dns6CacheEntry->IpAddress);\r
1493 }\r
1494 \r
1495 FreePool (Dns6CacheEntry);\r
1496 }\r
1497\r
1498 // \r
1499 // Allocate new CacheEntry pool.\r
1500 //\r
1501 Dns6CacheEntry = AllocateZeroPool (sizeof (EFI_DNS6_CACHE_ENTRY));\r
fcae1a99
JW
1502 if (Dns6CacheEntry == NULL) {\r
1503 Status = EFI_UNSUPPORTED;\r
1504 goto ON_EXIT;\r
1505 }\r
99c048ef 1506 Dns6CacheEntry->HostName = AllocateZeroPool (2 * (StrLen(Dns6TokenEntry->QueryHostName) + 1));\r
fcae1a99
JW
1507 if (Dns6CacheEntry->HostName == NULL) {\r
1508 Status = EFI_UNSUPPORTED;\r
1509 goto ON_EXIT;\r
1510 }\r
99c048ef 1511 CopyMem (Dns6CacheEntry->HostName, Dns6TokenEntry->QueryHostName, 2 * (StrLen(Dns6TokenEntry->QueryHostName) + 1));\r
1512 Dns6CacheEntry->IpAddress = AllocateZeroPool (sizeof (EFI_IPv6_ADDRESS));\r
fcae1a99
JW
1513 if (Dns6CacheEntry->IpAddress == NULL) {\r
1514 Status = EFI_UNSUPPORTED;\r
1515 goto ON_EXIT;\r
1516 }\r
99c048ef 1517 CopyMem (Dns6CacheEntry->IpAddress, AnswerData, sizeof (EFI_IPv6_ADDRESS));\r
1518 Dns6CacheEntry->Timeout = AnswerSection->Ttl;\r
1519 \r
1520 UpdateDns6Cache (&mDriverData->Dns6CacheList, FALSE, TRUE, *Dns6CacheEntry); \r
1521 \r
1522 IpCount ++;\r
1523 break;\r
1524 default:\r
1525 Status = EFI_UNSUPPORTED;\r
1526 goto ON_EXIT;\r
1527 }\r
1528 }\r
1529 \r
1530 //\r
1531 // Find next one\r
1532 //\r
1533 AnswerName = (CHAR8 *) AnswerSection + sizeof (*AnswerSection) + AnswerSection->DataLength;\r
1534 AnswerSectionNum ++;\r
1535 }\r
1536\r
00c0c3f2
JW
1537 if (Instance->Service->IpVersion == IP_VERSION_4) {\r
1538 ASSERT (Dns4TokenEntry != NULL);\r
fcae1a99
JW
1539 \r
1540 if (Dns4TokenEntry->GeneralLookUp) {\r
1541 Dns4TokenEntry->Token->RspData.GLookupData->RRCount = RRCount;\r
00c0c3f2 1542 } else {\r
fcae1a99
JW
1543 if (QuerySection->Type == DNS_TYPE_A) {\r
1544 Dns4TokenEntry->Token->RspData.H2AData->IpCount = IpCount;\r
1545 } else {\r
1546 Status = EFI_UNSUPPORTED;\r
1547 goto ON_EXIT;\r
1548 }\r
00c0c3f2
JW
1549 }\r
1550 } else {\r
1551 ASSERT (Dns6TokenEntry != NULL);\r
fcae1a99
JW
1552\r
1553 if (Dns6TokenEntry->GeneralLookUp) {\r
1554 Dns6TokenEntry->Token->RspData.GLookupData->RRCount = RRCount;\r
00c0c3f2 1555 } else {\r
fcae1a99
JW
1556 if (QuerySection->Type == DNS_TYPE_AAAA) {\r
1557 Dns6TokenEntry->Token->RspData.H2AData->IpCount = IpCount;\r
1558 } else {\r
1559 Status = EFI_UNSUPPORTED;\r
1560 goto ON_EXIT;\r
1561 }\r
00c0c3f2 1562 }\r
99c048ef 1563 }\r
1564\r
1565 //\r
1566 // Parsing is complete, SignalEvent here.\r
1567 //\r
1568 if (Instance->Service->IpVersion == IP_VERSION_4) {\r
00c0c3f2 1569 ASSERT (Dns4TokenEntry != NULL);\r
99c048ef 1570 Dns4RemoveTokenEntry (&Instance->Dns4TxTokens, Dns4TokenEntry);\r
1571 Dns4TokenEntry->Token->Status = EFI_SUCCESS;\r
1572 if (Dns4TokenEntry->Token->Event != NULL) {\r
1573 gBS->SignalEvent (Dns4TokenEntry->Token->Event);\r
1574 DispatchDpc ();\r
1575 }\r
1576 } else {\r
00c0c3f2 1577 ASSERT (Dns6TokenEntry != NULL);\r
99c048ef 1578 Dns6RemoveTokenEntry (&Instance->Dns6TxTokens, Dns6TokenEntry);\r
1579 Dns6TokenEntry->Token->Status = EFI_SUCCESS;\r
1580 if (Dns6TokenEntry->Token->Event != NULL) {\r
1581 gBS->SignalEvent (Dns6TokenEntry->Token->Event);\r
1582 DispatchDpc ();\r
1583 }\r
1584 }\r
1585\r
1586 // \r
1587 // Free allocated CacheEntry pool.\r
1588 //\r
1589 if (Dns4CacheEntry != NULL) {\r
1590 if (Dns4CacheEntry->HostName != NULL) {\r
1591 FreePool (Dns4CacheEntry->HostName);\r
1592 }\r
1593\r
1594 if (Dns4CacheEntry->IpAddress != NULL) {\r
1595 FreePool (Dns4CacheEntry->IpAddress);\r
1596 }\r
1597\r
1598 FreePool (Dns4CacheEntry);\r
1599 }\r
1600 \r
1601 if (Dns6CacheEntry != NULL) {\r
1602 if (Dns6CacheEntry->HostName != NULL) {\r
1603 FreePool (Dns6CacheEntry->HostName);\r
1604 }\r
1605\r
1606 if (Dns6CacheEntry->IpAddress != NULL) {\r
1607 FreePool (Dns6CacheEntry->IpAddress);\r
1608 }\r
1609 \r
1610 FreePool (Dns6CacheEntry);\r
1611 }\r
1612\r
1613ON_EXIT:\r
1614 gBS->RestoreTPL (OldTpl);\r
1615 return Status;\r
1616}\r
1617\r
1618/**\r
1619 Parse response packet.\r
1620\r
1621 @param Packet The packets received.\r
1622 @param EndPoint The local/remote UDP access point\r
1623 @param IoStatus The status of the UDP receive\r
1624 @param Context The opaque parameter to the function.\r
1625\r
1626**/ \r
1627VOID\r
1628EFIAPI\r
1629DnsOnPacketReceived (\r
1630 NET_BUF *Packet,\r
1631 UDP_END_POINT *EndPoint,\r
1632 EFI_STATUS IoStatus,\r
1633 VOID *Context\r
1634 )\r
1635{\r
1636 DNS_INSTANCE *Instance;\r
1637\r
1638 UINT8 *RcvString;\r
1639\r
1640 BOOLEAN Completed;\r
1641 \r
1642 Instance = (DNS_INSTANCE *) Context;\r
1643 NET_CHECK_SIGNATURE (Instance, DNS_INSTANCE_SIGNATURE);\r
1644\r
1645 RcvString = NULL;\r
1646 Completed = FALSE;\r
1647\r
1648 if (EFI_ERROR (IoStatus)) {\r
1649 goto ON_EXIT;\r
1650 }\r
1651\r
1652 ASSERT (Packet != NULL);\r
1653 \r
1654 RcvString = NetbufGetByte (Packet, 0, NULL);\r
3fd7bd08 1655 ASSERT (RcvString != NULL);\r
1656 \r
99c048ef 1657 //\r
1658 // Parse Dns Response\r
1659 //\r
1660 ParseDnsResponse (Instance, RcvString, &Completed);\r
1661\r
1662 ON_EXIT:\r
1663\r
1664 if (Packet != NULL) {\r
1665 NetbufFree (Packet);\r
1666 }\r
1667\r
1668 if (!Completed) {\r
1669 UdpIoRecvDatagram (Instance->UdpIo, DnsOnPacketReceived, Instance, 0);\r
1670 }\r
1671}\r
1672\r
1673/**\r
1674 Release the net buffer when packet is sent.\r
1675\r
1676 @param Packet The packets received.\r
1677 @param EndPoint The local/remote UDP access point\r
1678 @param IoStatus The status of the UDP receive\r
1679 @param Context The opaque parameter to the function.\r
1680\r
1681**/\r
1682VOID\r
1683EFIAPI\r
1684DnsOnPacketSent (\r
1685 NET_BUF *Packet,\r
1686 UDP_END_POINT *EndPoint,\r
1687 EFI_STATUS IoStatus,\r
1688 VOID *Context\r
1689 )\r
1690{\r
1691 DNS_INSTANCE *Instance;\r
1692 LIST_ENTRY *Entry;\r
1693 NET_MAP_ITEM *Item;\r
1694 DNS4_TOKEN_ENTRY *Dns4TokenEntry;\r
1695 DNS6_TOKEN_ENTRY *Dns6TokenEntry;\r
1696\r
1697 Dns4TokenEntry = NULL;\r
1698 Dns6TokenEntry = NULL;\r
1699\r
1700 Instance = (DNS_INSTANCE *) Context;\r
1701 NET_CHECK_SIGNATURE (Instance, DNS_INSTANCE_SIGNATURE);\r
1702\r
1703 if (Instance->Service->IpVersion == IP_VERSION_4) {\r
1704 NET_LIST_FOR_EACH (Entry, &Instance->Dns4TxTokens.Used) {\r
1705 Item = NET_LIST_USER_STRUCT (Entry, NET_MAP_ITEM, Link);\r
1706 if (Packet == (NET_BUF *)(Item->Value)) {\r
1707 Dns4TokenEntry = ((DNS4_TOKEN_ENTRY *)Item->Key);\r
1708 Dns4TokenEntry->PacketToLive = Dns4TokenEntry->Token->RetryInterval;\r
1709 break;\r
1710 }\r
1711 }\r
1712 } else {\r
1713 NET_LIST_FOR_EACH (Entry, &Instance->Dns6TxTokens.Used) {\r
1714 Item = NET_LIST_USER_STRUCT (Entry, NET_MAP_ITEM, Link);\r
1715 if (Packet == (NET_BUF *)(Item->Value)) {\r
1716 Dns6TokenEntry = ((DNS6_TOKEN_ENTRY *)Item->Key);\r
1717 Dns6TokenEntry->PacketToLive = Dns6TokenEntry->Token->RetryInterval;\r
1718 break;\r
1719 }\r
1720 }\r
1721 }\r
1722 \r
1723 NetbufFree (Packet);\r
1724}\r
1725\r
1726/**\r
1727 Query request information.\r
1728\r
1729 @param Instance The DNS instance\r
1730 @param Packet The packet for querying request information.\r
1731\r
1732 @retval EFI_SUCCESS Query request information successfully.\r
1733 @retval Others Failed to query request information.\r
1734\r
1735**/\r
1736EFI_STATUS\r
1737DoDnsQuery (\r
1738 IN DNS_INSTANCE *Instance,\r
1739 IN NET_BUF *Packet\r
1740 )\r
1741{\r
1742 EFI_STATUS Status;\r
1743\r
1744 //\r
1745 // Ready to receive the DNS response.\r
1746 //\r
1747 if (Instance->UdpIo->RecvRequest == NULL) {\r
1748 Status = UdpIoRecvDatagram (Instance->UdpIo, DnsOnPacketReceived, Instance, 0);\r
1749 if (EFI_ERROR (Status)) {\r
1750 return Status;\r
1751 }\r
1752 }\r
1753 \r
1754 //\r
1755 // Transmit the DNS packet.\r
1756 //\r
1757 NET_GET_REF (Packet);\r
1758\r
1759 Status = UdpIoSendDatagram (Instance->UdpIo, Packet, NULL, NULL, DnsOnPacketSent, Instance);\r
1760 \r
1761 return Status;\r
1762}\r
1763\r
1764/**\r
fcae1a99 1765 Construct the Packet according query section.\r
99c048ef 1766\r
1767 @param Instance The DNS instance\r
fcae1a99
JW
1768 @param QueryName Queried Name \r
1769 @param Type Queried Type \r
1770 @param Class Queried Class \r
1771 @param Packet The packet for query\r
99c048ef 1772\r
1773 @retval EFI_SUCCESS The packet is constructed.\r
1774 @retval Others Failed to construct the Packet.\r
1775\r
1776**/\r
1777EFI_STATUS\r
fcae1a99 1778ConstructDNSQuery (\r
99c048ef 1779 IN DNS_INSTANCE *Instance,\r
fcae1a99 1780 IN CHAR8 *QueryName,\r
99c048ef 1781 IN UINT16 Type,\r
fcae1a99 1782 IN UINT16 Class,\r
99c048ef 1783 OUT NET_BUF **Packet\r
1784 )\r
1785{\r
1786 NET_FRAGMENT Frag;\r
1787 DNS_HEADER *DnsHeader;\r
fcae1a99 1788 DNS_QUERY_SECTION *DnsQuery;\r
99c048ef 1789 \r
99c048ef 1790 Frag.Bulk = AllocatePool (DNS_DEFAULT_BLKSIZE * sizeof (UINT8));\r
1791 if (Frag.Bulk == NULL) {\r
1792 return EFI_OUT_OF_RESOURCES;\r
1793 }\r
1794\r
1795 //\r
1796 // Fill header\r
1797 //\r
5e0cdec1
ZL
1798 DnsHeader = (DNS_HEADER *) Frag.Bulk; \r
1799 DnsHeader->Identification = (UINT16)NET_RANDOM (NetRandomInitSeed());\r
99c048ef 1800 DnsHeader->Flags.Uint16 = 0x0000;\r
1801 DnsHeader->Flags.Bits.RD = 1;\r
1802 DnsHeader->Flags.Bits.OpCode = DNS_FLAGS_OPCODE_STANDARD;\r
1803 DnsHeader->Flags.Bits.QR = DNS_FLAGS_QR_QUERY;\r
1804 DnsHeader->QuestionsNum = 1;\r
1805 DnsHeader->AnswersNum = 0;\r
1806 DnsHeader->AuthorityNum = 0;\r
1807 DnsHeader->AditionalNum = 0;\r
1808\r
5e0cdec1
ZL
1809 DnsHeader->Identification = HTONS (DnsHeader->Identification);\r
1810 DnsHeader->Flags.Uint16 = HTONS (DnsHeader->Flags.Uint16);\r
1811 DnsHeader->QuestionsNum = HTONS (DnsHeader->QuestionsNum);\r
1812 DnsHeader->AnswersNum = HTONS (DnsHeader->AnswersNum);\r
1813 DnsHeader->AuthorityNum = HTONS (DnsHeader->AuthorityNum);\r
1814 DnsHeader->AditionalNum = HTONS (DnsHeader->AditionalNum);\r
99c048ef 1815\r
1816 Frag.Len = sizeof (*DnsHeader);\r
1817\r
1818 //\r
1819 // Fill Query name\r
1820 //\r
fcae1a99
JW
1821 CopyMem (Frag.Bulk + Frag.Len, QueryName, AsciiStrLen (QueryName));\r
1822 Frag.Len = (UINT32) (Frag.Len + AsciiStrLen (QueryName));\r
1823 *(Frag.Bulk + Frag.Len) = 0;\r
1824 Frag.Len ++;\r
1825 \r
99c048ef 1826 //\r
1827 // Rest query section\r
1828 //\r
fcae1a99 1829 DnsQuery = (DNS_QUERY_SECTION *) (Frag.Bulk + Frag.Len);\r
99c048ef 1830\r
fcae1a99
JW
1831 DnsQuery->Type = HTONS (Type);\r
1832 DnsQuery->Class = HTONS (Class);\r
99c048ef 1833\r
fcae1a99 1834 Frag.Len += sizeof (*DnsQuery);\r
99c048ef 1835\r
1836 //\r
1837 // Wrap the Frag in a net buffer.\r
1838 //\r
1839 *Packet = NetbufFromExt (&Frag, 1, 0, 0, DnsDummyExtFree, NULL);\r
1840 if (*Packet == NULL) {\r
1841 FreePool (Frag.Bulk);\r
1842 return EFI_OUT_OF_RESOURCES;\r
1843 }\r
1844 \r
1845 //\r
1846 // Store the UdpIo in ProtoData.\r
1847 //\r
1848 *((UINTN *) &((*Packet)->ProtoData[0])) = (UINTN) (Instance->UdpIo);\r
1849\r
1850 return EFI_SUCCESS;\r
1851}\r
1852\r
1853/**\r
1854 Retransmit the packet.\r
1855\r
1856 @param Instance The DNS instance\r
1857 @param Packet Retransmit the packet \r
1858\r
1859 @retval EFI_SUCCESS The packet is retransmitted.\r
1860 @retval Others Failed to retransmit.\r
1861\r
1862**/\r
1863EFI_STATUS\r
1864DnsRetransmit (\r
1865 IN DNS_INSTANCE *Instance,\r
1866 IN NET_BUF *Packet\r
1867 )\r
1868{\r
1869 EFI_STATUS Status;\r
1870 \r
1871 UINT8 *Buffer;\r
1872\r
1873 ASSERT (Packet != NULL);\r
1874\r
1875 //\r
1876 // Set the requests to the listening port, other packets to the connected port\r
1877 //\r
1878 Buffer = NetbufGetByte (Packet, 0, NULL);\r
1879 ASSERT (Buffer != NULL);\r
1880\r
1881 NET_GET_REF (Packet);\r
1882\r
1883 Status = UdpIoSendDatagram (\r
1884 Instance->UdpIo,\r
1885 Packet,\r
1886 NULL,\r
1887 NULL,\r
1888 DnsOnPacketSent,\r
1889 Instance\r
1890 );\r
1891\r
1892 if (EFI_ERROR (Status)) {\r
1893 NET_PUT_REF (Packet);\r
1894 }\r
1895\r
1896 return Status;\r
1897}\r
1898\r
1899/**\r
1900 The timer ticking function for the DNS services.\r
1901\r
1902 @param Event The ticking event\r
1903 @param Context The DNS service instance\r
1904\r
1905**/\r
1906VOID\r
1907EFIAPI\r
1908DnsOnTimerRetransmit (\r
1909 IN EFI_EVENT Event,\r
1910 IN VOID *Context\r
1911 )\r
1912{\r
1913 DNS_SERVICE *Service;\r
1914\r
1915 LIST_ENTRY *Entry;\r
1916 LIST_ENTRY *Next;\r
1917\r
1918 DNS_INSTANCE *Instance;\r
1919 LIST_ENTRY *EntryNetMap;\r
1920 NET_MAP_ITEM *ItemNetMap;\r
1921 DNS4_TOKEN_ENTRY *Dns4TokenEntry;\r
1922 DNS6_TOKEN_ENTRY *Dns6TokenEntry;\r
1923\r
1924 Dns4TokenEntry = NULL;\r
1925 Dns6TokenEntry = NULL;\r
1926\r
1927 Service = (DNS_SERVICE *) Context;\r
1928\r
1929\r
1930 if (Service->IpVersion == IP_VERSION_4) {\r
1931 //\r
1932 // Iterate through all the children of the DNS service instance. Time\r
1933 // out the packet. If maximum retries reached, clean the Token up.\r
1934 //\r
1935 NET_LIST_FOR_EACH_SAFE (Entry, Next, &Service->Dns4ChildrenList) {\r
1936 Instance = NET_LIST_USER_STRUCT (Entry, DNS_INSTANCE, Link);\r
1937\r
1938 EntryNetMap = Instance->Dns4TxTokens.Used.ForwardLink;\r
1939 while (EntryNetMap != &Instance->Dns4TxTokens.Used) {\r
1940 ItemNetMap = NET_LIST_USER_STRUCT (EntryNetMap, NET_MAP_ITEM, Link);\r
1941 Dns4TokenEntry = (DNS4_TOKEN_ENTRY *)(ItemNetMap->Key);\r
1942 if (Dns4TokenEntry->PacketToLive == 0 || (--Dns4TokenEntry->PacketToLive > 0)) {\r
1943 EntryNetMap = EntryNetMap->ForwardLink;\r
1944 continue;\r
1945 }\r
1946\r
1947 //\r
1948 // Retransmit the packet if haven't reach the maxmium retry count,\r
1949 // otherwise exit the transfer.\r
1950 //\r
1951 if (++Dns4TokenEntry->Token->RetryCount < Instance->MaxRetry) {\r
1952 DnsRetransmit (Instance, (NET_BUF *)ItemNetMap->Value);\r
1953 EntryNetMap = EntryNetMap->ForwardLink;\r
1954 } else {\r
1955 //\r
1956 // Maximum retries reached, clean the Token up.\r
1957 //\r
1958 Dns4RemoveTokenEntry (&Instance->Dns4TxTokens, Dns4TokenEntry);\r
1959 Dns4TokenEntry->Token->Status = EFI_TIMEOUT;\r
1960 gBS->SignalEvent (Dns4TokenEntry->Token->Event);\r
1961 DispatchDpc ();\r
1962 \r
1963 //\r
1964 // Free the sending packet.\r
1965 //\r
1966 if (ItemNetMap->Value != NULL) {\r
1967 NetbufFree ((NET_BUF *)(ItemNetMap->Value));\r
1968 }\r
1969\r
1970 EntryNetMap = Instance->Dns4TxTokens.Used.ForwardLink;\r
1971 }\r
1972 }\r
1973 } \r
1974 }else {\r
1975 //\r
1976 // Iterate through all the children of the DNS service instance. Time\r
1977 // out the packet. If maximum retries reached, clean the Token up.\r
1978 //\r
1979 NET_LIST_FOR_EACH_SAFE (Entry, Next, &Service->Dns6ChildrenList) {\r
1980 Instance = NET_LIST_USER_STRUCT (Entry, DNS_INSTANCE, Link);\r
1981 \r
1982 EntryNetMap = Instance->Dns6TxTokens.Used.ForwardLink;\r
1983 while (EntryNetMap != &Instance->Dns6TxTokens.Used) {\r
1984 ItemNetMap = NET_LIST_USER_STRUCT (EntryNetMap, NET_MAP_ITEM, Link);\r
1985 Dns6TokenEntry = (DNS6_TOKEN_ENTRY *) (ItemNetMap->Key);\r
1986 if (Dns6TokenEntry->PacketToLive == 0 || (--Dns6TokenEntry->PacketToLive > 0)) {\r
1987 EntryNetMap = EntryNetMap->ForwardLink;\r
1988 continue;\r
1989 }\r
1990\r
1991 //\r
1992 // Retransmit the packet if haven't reach the maxmium retry count,\r
1993 // otherwise exit the transfer.\r
1994 //\r
1995 if (++Dns6TokenEntry->Token->RetryCount < Instance->MaxRetry) {\r
1996 DnsRetransmit (Instance, (NET_BUF *) ItemNetMap->Value);\r
1997 EntryNetMap = EntryNetMap->ForwardLink;\r
1998 } else {\r
1999 //\r
2000 // Maximum retries reached, clean the Token up.\r
2001 //\r
2002 Dns6RemoveTokenEntry (&Instance->Dns6TxTokens, Dns6TokenEntry);\r
2003 Dns6TokenEntry->Token->Status = EFI_TIMEOUT;\r
2004 gBS->SignalEvent (Dns6TokenEntry->Token->Event);\r
2005 DispatchDpc ();\r
2006 \r
2007 //\r
2008 // Free the sending packet.\r
2009 //\r
2010 if (ItemNetMap->Value != NULL) {\r
2011 NetbufFree ((NET_BUF *) (ItemNetMap->Value));\r
2012 }\r
2013\r
2014 EntryNetMap = Instance->Dns6TxTokens.Used.ForwardLink;\r
2015 } \r
2016 }\r
2017 }\r
2018 } \r
2019}\r
2020\r
2021/**\r
2022 The timer ticking function for the DNS driver.\r
2023\r
2024 @param Event The ticking event\r
2025 @param Context NULL\r
2026\r
2027**/\r
2028VOID\r
2029EFIAPI\r
2030DnsOnTimerUpdate (\r
2031 IN EFI_EVENT Event,\r
2032 IN VOID *Context\r
2033 )\r
2034{\r
2035 LIST_ENTRY *Entry;\r
2036 LIST_ENTRY *Next;\r
2037 DNS4_CACHE *Item4;\r
2038 DNS6_CACHE *Item6;\r
2039\r
2040 Item4 = NULL;\r
2041 Item6 = NULL;\r
2042\r
2043 //\r
2044 // Iterate through all the DNS4 cache list.\r
2045 //\r
2046 NET_LIST_FOR_EACH_SAFE (Entry, Next, &mDriverData->Dns4CacheList) {\r
2047 Item4 = NET_LIST_USER_STRUCT (Entry, DNS4_CACHE, AllCacheLink);\r
2048 Item4->DnsCache.Timeout--;\r
2049 }\r
2050 \r
2051 Entry = mDriverData->Dns4CacheList.ForwardLink;\r
2052 while (Entry != &mDriverData->Dns4CacheList) {\r
2053 Item4 = NET_LIST_USER_STRUCT (Entry, DNS4_CACHE, AllCacheLink);\r
2054 if (Item4->DnsCache.Timeout<=0) {\r
2055 RemoveEntryList (&Item4->AllCacheLink);\r
2056 Entry = mDriverData->Dns4CacheList.ForwardLink;\r
2057 } else {\r
2058 Entry = Entry->ForwardLink;\r
2059 }\r
2060 }\r
2061 \r
2062 //\r
2063 // Iterate through all the DNS6 cache list.\r
2064 //\r
2065 NET_LIST_FOR_EACH_SAFE (Entry, Next, &mDriverData->Dns6CacheList) {\r
2066 Item6 = NET_LIST_USER_STRUCT (Entry, DNS6_CACHE, AllCacheLink);\r
2067 Item6->DnsCache.Timeout--;\r
2068 }\r
2069 \r
2070 Entry = mDriverData->Dns6CacheList.ForwardLink;\r
2071 while (Entry != &mDriverData->Dns6CacheList) {\r
2072 Item6 = NET_LIST_USER_STRUCT (Entry, DNS6_CACHE, AllCacheLink);\r
2073 if (Item6->DnsCache.Timeout<=0) {\r
2074 RemoveEntryList (&Item6->AllCacheLink);\r
2075 Entry = mDriverData->Dns6CacheList.ForwardLink;\r
2076 } else {\r
2077 Entry = Entry->ForwardLink;\r
2078 }\r
2079 }\r
2080}\r
2081\r