]> git.proxmox.com Git - mirror_edk2.git/blob - ShellPkg/Library/UefiShellLib/UefiShellLib.c
ShellPkg: Add type cast to avoid build failure in VS2005.
[mirror_edk2.git] / ShellPkg / Library / UefiShellLib / UefiShellLib.c
1 /** @file
2 Provides interface to shell functionality for shell commands and applications.
3
4 Copyright (c) 2006 - 2014, Intel Corporation. All rights reserved.<BR>
5 This program and the accompanying materials
6 are licensed and made available under the terms and conditions of the BSD License
7 which accompanies this distribution. The full text of the license may be found at
8 http://opensource.org/licenses/bsd-license.php
9
10 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
11 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
12
13 **/
14
15 #include "UefiShellLib.h"
16 #include <ShellBase.h>
17 #include <Library/SortLib.h>
18
19 #define FIND_XXXXX_FILE_BUFFER_SIZE (SIZE_OF_EFI_FILE_INFO + MAX_FILE_NAME_LEN)
20
21 //
22 // globals...
23 //
24 SHELL_PARAM_ITEM EmptyParamList[] = {
25 {NULL, TypeMax}
26 };
27 SHELL_PARAM_ITEM SfoParamList[] = {
28 {L"-sfo", TypeFlag},
29 {NULL, TypeMax}
30 };
31 EFI_SHELL_ENVIRONMENT2 *mEfiShellEnvironment2;
32 EFI_SHELL_INTERFACE *mEfiShellInterface;
33 EFI_SHELL_PROTOCOL *gEfiShellProtocol;
34 EFI_SHELL_PARAMETERS_PROTOCOL *gEfiShellParametersProtocol;
35 EFI_HANDLE mEfiShellEnvironment2Handle;
36 FILE_HANDLE_FUNCTION_MAP FileFunctionMap;
37
38 /**
39 Check if a Unicode character is a hexadecimal character.
40
41 This internal function checks if a Unicode character is a
42 numeric character. The valid hexadecimal characters are
43 L'0' to L'9', L'a' to L'f', or L'A' to L'F'.
44
45 @param Char The character to check against.
46
47 @retval TRUE If the Char is a hexadecmial character.
48 @retval FALSE If the Char is not a hexadecmial character.
49
50 **/
51 BOOLEAN
52 EFIAPI
53 ShellIsHexaDecimalDigitCharacter (
54 IN CHAR16 Char
55 )
56 {
57 return (BOOLEAN) ((Char >= L'0' && Char <= L'9') || (Char >= L'A' && Char <= L'F') || (Char >= L'a' && Char <= L'f'));
58 }
59
60 /**
61 Check if a Unicode character is a decimal character.
62
63 This internal function checks if a Unicode character is a
64 decimal character. The valid characters are
65 L'0' to L'9'.
66
67
68 @param Char The character to check against.
69
70 @retval TRUE If the Char is a hexadecmial character.
71 @retval FALSE If the Char is not a hexadecmial character.
72
73 **/
74 BOOLEAN
75 EFIAPI
76 ShellIsDecimalDigitCharacter (
77 IN CHAR16 Char
78 )
79 {
80 return (BOOLEAN) (Char >= L'0' && Char <= L'9');
81 }
82
83 /**
84 Helper function to find ShellEnvironment2 for constructor.
85
86 @param[in] ImageHandle A copy of the calling image's handle.
87
88 @retval EFI_OUT_OF_RESOURCES Memory allocation failed.
89 **/
90 EFI_STATUS
91 EFIAPI
92 ShellFindSE2 (
93 IN EFI_HANDLE ImageHandle
94 )
95 {
96 EFI_STATUS Status;
97 EFI_HANDLE *Buffer;
98 UINTN BufferSize;
99 UINTN HandleIndex;
100
101 BufferSize = 0;
102 Buffer = NULL;
103 Status = gBS->OpenProtocol(ImageHandle,
104 &gEfiShellEnvironment2Guid,
105 (VOID **)&mEfiShellEnvironment2,
106 ImageHandle,
107 NULL,
108 EFI_OPEN_PROTOCOL_GET_PROTOCOL
109 );
110 //
111 // look for the mEfiShellEnvironment2 protocol at a higher level
112 //
113 if (EFI_ERROR (Status) || !(CompareGuid (&mEfiShellEnvironment2->SESGuid, &gEfiShellEnvironment2ExtGuid))){
114 //
115 // figure out how big of a buffer we need.
116 //
117 Status = gBS->LocateHandle (ByProtocol,
118 &gEfiShellEnvironment2Guid,
119 NULL, // ignored for ByProtocol
120 &BufferSize,
121 Buffer
122 );
123 //
124 // maybe it's not there???
125 //
126 if (Status == EFI_BUFFER_TOO_SMALL) {
127 Buffer = (EFI_HANDLE*)AllocateZeroPool(BufferSize);
128 if (Buffer == NULL) {
129 return (EFI_OUT_OF_RESOURCES);
130 }
131 Status = gBS->LocateHandle (ByProtocol,
132 &gEfiShellEnvironment2Guid,
133 NULL, // ignored for ByProtocol
134 &BufferSize,
135 Buffer
136 );
137 }
138 if (!EFI_ERROR (Status) && Buffer != NULL) {
139 //
140 // now parse the list of returned handles
141 //
142 Status = EFI_NOT_FOUND;
143 for (HandleIndex = 0; HandleIndex < (BufferSize/sizeof(Buffer[0])); HandleIndex++) {
144 Status = gBS->OpenProtocol(Buffer[HandleIndex],
145 &gEfiShellEnvironment2Guid,
146 (VOID **)&mEfiShellEnvironment2,
147 ImageHandle,
148 NULL,
149 EFI_OPEN_PROTOCOL_GET_PROTOCOL
150 );
151 if (CompareGuid (&mEfiShellEnvironment2->SESGuid, &gEfiShellEnvironment2ExtGuid)) {
152 mEfiShellEnvironment2Handle = Buffer[HandleIndex];
153 Status = EFI_SUCCESS;
154 break;
155 }
156 }
157 }
158 }
159 if (Buffer != NULL) {
160 FreePool (Buffer);
161 }
162 return (Status);
163 }
164
165 /**
166 Function to do most of the work of the constructor. Allows for calling
167 multiple times without complete re-initialization.
168
169 @param[in] ImageHandle A copy of the ImageHandle.
170 @param[in] SystemTable A pointer to the SystemTable for the application.
171
172 @retval EFI_SUCCESS The operationw as successful.
173 **/
174 EFI_STATUS
175 EFIAPI
176 ShellLibConstructorWorker (
177 IN EFI_HANDLE ImageHandle,
178 IN EFI_SYSTEM_TABLE *SystemTable
179 )
180 {
181 EFI_STATUS Status;
182
183 //
184 // UEFI 2.0 shell interfaces (used preferentially)
185 //
186 Status = gBS->OpenProtocol(
187 ImageHandle,
188 &gEfiShellProtocolGuid,
189 (VOID **)&gEfiShellProtocol,
190 ImageHandle,
191 NULL,
192 EFI_OPEN_PROTOCOL_GET_PROTOCOL
193 );
194 if (EFI_ERROR(Status)) {
195 //
196 // Search for the shell protocol
197 //
198 Status = gBS->LocateProtocol(
199 &gEfiShellProtocolGuid,
200 NULL,
201 (VOID **)&gEfiShellProtocol
202 );
203 if (EFI_ERROR(Status)) {
204 gEfiShellProtocol = NULL;
205 }
206 }
207 Status = gBS->OpenProtocol(
208 ImageHandle,
209 &gEfiShellParametersProtocolGuid,
210 (VOID **)&gEfiShellParametersProtocol,
211 ImageHandle,
212 NULL,
213 EFI_OPEN_PROTOCOL_GET_PROTOCOL
214 );
215 if (EFI_ERROR(Status)) {
216 gEfiShellParametersProtocol = NULL;
217 }
218
219 if (gEfiShellParametersProtocol == NULL || gEfiShellProtocol == NULL) {
220 //
221 // Moved to seperate function due to complexity
222 //
223 Status = ShellFindSE2(ImageHandle);
224
225 if (EFI_ERROR(Status)) {
226 DEBUG((DEBUG_ERROR, "Status: 0x%08x\r\n", Status));
227 mEfiShellEnvironment2 = NULL;
228 }
229 Status = gBS->OpenProtocol(ImageHandle,
230 &gEfiShellInterfaceGuid,
231 (VOID **)&mEfiShellInterface,
232 ImageHandle,
233 NULL,
234 EFI_OPEN_PROTOCOL_GET_PROTOCOL
235 );
236 if (EFI_ERROR(Status)) {
237 mEfiShellInterface = NULL;
238 }
239 }
240
241 //
242 // only success getting 2 of either the old or new, but no 1/2 and 1/2
243 //
244 if ((mEfiShellEnvironment2 != NULL && mEfiShellInterface != NULL) ||
245 (gEfiShellProtocol != NULL && gEfiShellParametersProtocol != NULL) ) {
246 if (gEfiShellProtocol != NULL) {
247 FileFunctionMap.GetFileInfo = gEfiShellProtocol->GetFileInfo;
248 FileFunctionMap.SetFileInfo = gEfiShellProtocol->SetFileInfo;
249 FileFunctionMap.ReadFile = gEfiShellProtocol->ReadFile;
250 FileFunctionMap.WriteFile = gEfiShellProtocol->WriteFile;
251 FileFunctionMap.CloseFile = gEfiShellProtocol->CloseFile;
252 FileFunctionMap.DeleteFile = gEfiShellProtocol->DeleteFile;
253 FileFunctionMap.GetFilePosition = gEfiShellProtocol->GetFilePosition;
254 FileFunctionMap.SetFilePosition = gEfiShellProtocol->SetFilePosition;
255 FileFunctionMap.FlushFile = gEfiShellProtocol->FlushFile;
256 FileFunctionMap.GetFileSize = gEfiShellProtocol->GetFileSize;
257 } else {
258 FileFunctionMap.GetFileInfo = (EFI_SHELL_GET_FILE_INFO)FileHandleGetInfo;
259 FileFunctionMap.SetFileInfo = (EFI_SHELL_SET_FILE_INFO)FileHandleSetInfo;
260 FileFunctionMap.ReadFile = (EFI_SHELL_READ_FILE)FileHandleRead;
261 FileFunctionMap.WriteFile = (EFI_SHELL_WRITE_FILE)FileHandleWrite;
262 FileFunctionMap.CloseFile = (EFI_SHELL_CLOSE_FILE)FileHandleClose;
263 FileFunctionMap.DeleteFile = (EFI_SHELL_DELETE_FILE)FileHandleDelete;
264 FileFunctionMap.GetFilePosition = (EFI_SHELL_GET_FILE_POSITION)FileHandleGetPosition;
265 FileFunctionMap.SetFilePosition = (EFI_SHELL_SET_FILE_POSITION)FileHandleSetPosition;
266 FileFunctionMap.FlushFile = (EFI_SHELL_FLUSH_FILE)FileHandleFlush;
267 FileFunctionMap.GetFileSize = (EFI_SHELL_GET_FILE_SIZE)FileHandleGetSize;
268 }
269 return (EFI_SUCCESS);
270 }
271 return (EFI_NOT_FOUND);
272 }
273 /**
274 Constructor for the Shell library.
275
276 Initialize the library and determine if the underlying is a UEFI Shell 2.0 or an EFI shell.
277
278 @param ImageHandle the image handle of the process
279 @param SystemTable the EFI System Table pointer
280
281 @retval EFI_SUCCESS the initialization was complete sucessfully
282 @return others an error ocurred during initialization
283 **/
284 EFI_STATUS
285 EFIAPI
286 ShellLibConstructor (
287 IN EFI_HANDLE ImageHandle,
288 IN EFI_SYSTEM_TABLE *SystemTable
289 )
290 {
291 mEfiShellEnvironment2 = NULL;
292 gEfiShellProtocol = NULL;
293 gEfiShellParametersProtocol = NULL;
294 mEfiShellInterface = NULL;
295 mEfiShellEnvironment2Handle = NULL;
296
297 //
298 // verify that auto initialize is not set false
299 //
300 if (PcdGetBool(PcdShellLibAutoInitialize) == 0) {
301 return (EFI_SUCCESS);
302 }
303
304 return (ShellLibConstructorWorker(ImageHandle, SystemTable));
305 }
306
307 /**
308 Destructor for the library. free any resources.
309
310 @param[in] ImageHandle A copy of the ImageHandle.
311 @param[in] SystemTable A pointer to the SystemTable for the application.
312
313 @retval EFI_SUCCESS The operation was successful.
314 @return An error from the CloseProtocol function.
315 **/
316 EFI_STATUS
317 EFIAPI
318 ShellLibDestructor (
319 IN EFI_HANDLE ImageHandle,
320 IN EFI_SYSTEM_TABLE *SystemTable
321 )
322 {
323 if (mEfiShellEnvironment2 != NULL) {
324 gBS->CloseProtocol(mEfiShellEnvironment2Handle==NULL?ImageHandle:mEfiShellEnvironment2Handle,
325 &gEfiShellEnvironment2Guid,
326 ImageHandle,
327 NULL);
328 mEfiShellEnvironment2 = NULL;
329 }
330 if (mEfiShellInterface != NULL) {
331 gBS->CloseProtocol(ImageHandle,
332 &gEfiShellInterfaceGuid,
333 ImageHandle,
334 NULL);
335 mEfiShellInterface = NULL;
336 }
337 if (gEfiShellProtocol != NULL) {
338 gBS->CloseProtocol(ImageHandle,
339 &gEfiShellProtocolGuid,
340 ImageHandle,
341 NULL);
342 gEfiShellProtocol = NULL;
343 }
344 if (gEfiShellParametersProtocol != NULL) {
345 gBS->CloseProtocol(ImageHandle,
346 &gEfiShellParametersProtocolGuid,
347 ImageHandle,
348 NULL);
349 gEfiShellParametersProtocol = NULL;
350 }
351 mEfiShellEnvironment2Handle = NULL;
352
353 return (EFI_SUCCESS);
354 }
355
356 /**
357 This function causes the shell library to initialize itself. If the shell library
358 is already initialized it will de-initialize all the current protocol poitners and
359 re-populate them again.
360
361 When the library is used with PcdShellLibAutoInitialize set to true this function
362 will return EFI_SUCCESS and perform no actions.
363
364 This function is intended for internal access for shell commands only.
365
366 @retval EFI_SUCCESS the initialization was complete sucessfully
367
368 **/
369 EFI_STATUS
370 EFIAPI
371 ShellInitialize (
372 )
373 {
374 //
375 // if auto initialize is not false then skip
376 //
377 if (PcdGetBool(PcdShellLibAutoInitialize) != 0) {
378 return (EFI_SUCCESS);
379 }
380
381 //
382 // deinit the current stuff
383 //
384 ASSERT_EFI_ERROR(ShellLibDestructor(gImageHandle, gST));
385
386 //
387 // init the new stuff
388 //
389 return (ShellLibConstructorWorker(gImageHandle, gST));
390 }
391
392 /**
393 This function will retrieve the information about the file for the handle
394 specified and store it in allocated pool memory.
395
396 This function allocates a buffer to store the file's information. It is the
397 caller's responsibility to free the buffer
398
399 @param FileHandle The file handle of the file for which information is
400 being requested.
401
402 @retval NULL information could not be retrieved.
403
404 @return the information about the file
405 **/
406 EFI_FILE_INFO*
407 EFIAPI
408 ShellGetFileInfo (
409 IN SHELL_FILE_HANDLE FileHandle
410 )
411 {
412 return (FileFunctionMap.GetFileInfo(FileHandle));
413 }
414
415 /**
416 This function sets the information about the file for the opened handle
417 specified.
418
419 @param[in] FileHandle The file handle of the file for which information
420 is being set.
421
422 @param[in] FileInfo The information to set.
423
424 @retval EFI_SUCCESS The information was set.
425 @retval EFI_INVALID_PARAMETER A parameter was out of range or invalid.
426 @retval EFI_UNSUPPORTED The FileHandle does not support FileInfo.
427 @retval EFI_NO_MEDIA The device has no medium.
428 @retval EFI_DEVICE_ERROR The device reported an error.
429 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
430 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
431 @retval EFI_ACCESS_DENIED The file was opened read only.
432 @retval EFI_VOLUME_FULL The volume is full.
433 **/
434 EFI_STATUS
435 EFIAPI
436 ShellSetFileInfo (
437 IN SHELL_FILE_HANDLE FileHandle,
438 IN EFI_FILE_INFO *FileInfo
439 )
440 {
441 return (FileFunctionMap.SetFileInfo(FileHandle, FileInfo));
442 }
443
444 /**
445 This function will open a file or directory referenced by DevicePath.
446
447 This function opens a file with the open mode according to the file path. The
448 Attributes is valid only for EFI_FILE_MODE_CREATE.
449
450 @param FilePath on input the device path to the file. On output
451 the remaining device path.
452 @param DeviceHandle pointer to the system device handle.
453 @param FileHandle pointer to the file handle.
454 @param OpenMode the mode to open the file with.
455 @param Attributes the file's file attributes.
456
457 @retval EFI_SUCCESS The information was set.
458 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
459 @retval EFI_UNSUPPORTED Could not open the file path.
460 @retval EFI_NOT_FOUND The specified file could not be found on the
461 device or the file system could not be found on
462 the device.
463 @retval EFI_NO_MEDIA The device has no medium.
464 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
465 medium is no longer supported.
466 @retval EFI_DEVICE_ERROR The device reported an error.
467 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
468 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
469 @retval EFI_ACCESS_DENIED The file was opened read only.
470 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
471 file.
472 @retval EFI_VOLUME_FULL The volume is full.
473 **/
474 EFI_STATUS
475 EFIAPI
476 ShellOpenFileByDevicePath(
477 IN OUT EFI_DEVICE_PATH_PROTOCOL **FilePath,
478 OUT EFI_HANDLE *DeviceHandle,
479 OUT SHELL_FILE_HANDLE *FileHandle,
480 IN UINT64 OpenMode,
481 IN UINT64 Attributes
482 )
483 {
484 CHAR16 *FileName;
485 EFI_STATUS Status;
486 EFI_SIMPLE_FILE_SYSTEM_PROTOCOL *EfiSimpleFileSystemProtocol;
487 EFI_FILE_PROTOCOL *Handle1;
488 EFI_FILE_PROTOCOL *Handle2;
489 CHAR16 *FnafPathName;
490 UINTN PathLen;
491
492 if (FilePath == NULL || FileHandle == NULL || DeviceHandle == NULL) {
493 return (EFI_INVALID_PARAMETER);
494 }
495
496 //
497 // which shell interface should we use
498 //
499 if (gEfiShellProtocol != NULL) {
500 //
501 // use UEFI Shell 2.0 method.
502 //
503 FileName = gEfiShellProtocol->GetFilePathFromDevicePath(*FilePath);
504 if (FileName == NULL) {
505 return (EFI_INVALID_PARAMETER);
506 }
507 Status = ShellOpenFileByName(FileName, FileHandle, OpenMode, Attributes);
508 FreePool(FileName);
509 return (Status);
510 }
511
512
513 //
514 // use old shell method.
515 //
516 Status = gBS->LocateDevicePath (&gEfiSimpleFileSystemProtocolGuid,
517 FilePath,
518 DeviceHandle);
519 if (EFI_ERROR (Status)) {
520 return Status;
521 }
522 Status = gBS->OpenProtocol(*DeviceHandle,
523 &gEfiSimpleFileSystemProtocolGuid,
524 (VOID**)&EfiSimpleFileSystemProtocol,
525 gImageHandle,
526 NULL,
527 EFI_OPEN_PROTOCOL_GET_PROTOCOL);
528 if (EFI_ERROR (Status)) {
529 return Status;
530 }
531 Status = EfiSimpleFileSystemProtocol->OpenVolume(EfiSimpleFileSystemProtocol, &Handle1);
532 if (EFI_ERROR (Status)) {
533 FileHandle = NULL;
534 return Status;
535 }
536
537 //
538 // go down directories one node at a time.
539 //
540 while (!IsDevicePathEnd (*FilePath)) {
541 //
542 // For file system access each node should be a file path component
543 //
544 if (DevicePathType (*FilePath) != MEDIA_DEVICE_PATH ||
545 DevicePathSubType (*FilePath) != MEDIA_FILEPATH_DP
546 ) {
547 FileHandle = NULL;
548 return (EFI_INVALID_PARAMETER);
549 }
550 //
551 // Open this file path node
552 //
553 Handle2 = Handle1;
554 Handle1 = NULL;
555
556 //
557 // File Name Alignment Fix (FNAF)
558 // Handle2->Open may be incapable of handling a unaligned CHAR16 data.
559 // The structure pointed to by FilePath may be not CHAR16 aligned.
560 // This code copies the potentially unaligned PathName data from the
561 // FilePath structure to the aligned FnafPathName for use in the
562 // calls to Handl2->Open.
563 //
564
565 //
566 // Determine length of PathName, in bytes.
567 //
568 PathLen = DevicePathNodeLength (*FilePath) - SIZE_OF_FILEPATH_DEVICE_PATH;
569
570 //
571 // Allocate memory for the aligned copy of the string Extra allocation is to allow for forced alignment
572 // Copy bytes from possibly unaligned location to aligned location
573 //
574 FnafPathName = AllocateCopyPool(PathLen, (UINT8 *)((FILEPATH_DEVICE_PATH*)*FilePath)->PathName);
575 if (FnafPathName == NULL) {
576 return EFI_OUT_OF_RESOURCES;
577 }
578
579 //
580 // Try to test opening an existing file
581 //
582 Status = Handle2->Open (
583 Handle2,
584 &Handle1,
585 FnafPathName,
586 OpenMode &~EFI_FILE_MODE_CREATE,
587 0
588 );
589
590 //
591 // see if the error was that it needs to be created
592 //
593 if ((EFI_ERROR (Status)) && (OpenMode != (OpenMode &~EFI_FILE_MODE_CREATE))) {
594 Status = Handle2->Open (
595 Handle2,
596 &Handle1,
597 FnafPathName,
598 OpenMode,
599 Attributes
600 );
601 }
602
603 //
604 // Free the alignment buffer
605 //
606 FreePool(FnafPathName);
607
608 //
609 // Close the last node
610 //
611 Handle2->Close (Handle2);
612
613 if (EFI_ERROR(Status)) {
614 return (Status);
615 }
616
617 //
618 // Get the next node
619 //
620 *FilePath = NextDevicePathNode (*FilePath);
621 }
622
623 //
624 // This is a weak spot since if the undefined SHELL_FILE_HANDLE format changes this must change also!
625 //
626 *FileHandle = (VOID*)Handle1;
627 return (EFI_SUCCESS);
628 }
629
630 /**
631 This function will open a file or directory referenced by filename.
632
633 If return is EFI_SUCCESS, the Filehandle is the opened file's handle;
634 otherwise, the Filehandle is NULL. The Attributes is valid only for
635 EFI_FILE_MODE_CREATE.
636
637 if FileName is NULL then ASSERT()
638
639 @param FileName pointer to file name
640 @param FileHandle pointer to the file handle.
641 @param OpenMode the mode to open the file with.
642 @param Attributes the file's file attributes.
643
644 @retval EFI_SUCCESS The information was set.
645 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
646 @retval EFI_UNSUPPORTED Could not open the file path.
647 @retval EFI_NOT_FOUND The specified file could not be found on the
648 device or the file system could not be found
649 on the device.
650 @retval EFI_NO_MEDIA The device has no medium.
651 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
652 medium is no longer supported.
653 @retval EFI_DEVICE_ERROR The device reported an error.
654 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
655 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
656 @retval EFI_ACCESS_DENIED The file was opened read only.
657 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
658 file.
659 @retval EFI_VOLUME_FULL The volume is full.
660 **/
661 EFI_STATUS
662 EFIAPI
663 ShellOpenFileByName(
664 IN CONST CHAR16 *FileName,
665 OUT SHELL_FILE_HANDLE *FileHandle,
666 IN UINT64 OpenMode,
667 IN UINT64 Attributes
668 )
669 {
670 EFI_HANDLE DeviceHandle;
671 EFI_DEVICE_PATH_PROTOCOL *FilePath;
672 EFI_STATUS Status;
673 EFI_FILE_INFO *FileInfo;
674
675 //
676 // ASSERT if FileName is NULL
677 //
678 ASSERT(FileName != NULL);
679
680 if (FileName == NULL) {
681 return (EFI_INVALID_PARAMETER);
682 }
683
684 if (gEfiShellProtocol != NULL) {
685 if ((OpenMode & EFI_FILE_MODE_CREATE) == EFI_FILE_MODE_CREATE && (Attributes & EFI_FILE_DIRECTORY) == EFI_FILE_DIRECTORY) {
686 return ShellCreateDirectory(FileName, FileHandle);
687 }
688 //
689 // Use UEFI Shell 2.0 method
690 //
691 Status = gEfiShellProtocol->OpenFileByName(FileName,
692 FileHandle,
693 OpenMode);
694 if (StrCmp(FileName, L"NUL") != 0 && !EFI_ERROR(Status) && ((OpenMode & EFI_FILE_MODE_CREATE) != 0)){
695 FileInfo = FileFunctionMap.GetFileInfo(*FileHandle);
696 ASSERT(FileInfo != NULL);
697 FileInfo->Attribute = Attributes;
698 Status = FileFunctionMap.SetFileInfo(*FileHandle, FileInfo);
699 FreePool(FileInfo);
700 }
701 return (Status);
702 }
703 //
704 // Using EFI Shell version
705 // this means convert name to path and call that function
706 // since this will use EFI method again that will open it.
707 //
708 ASSERT(mEfiShellEnvironment2 != NULL);
709 FilePath = mEfiShellEnvironment2->NameToPath ((CHAR16*)FileName);
710 if (FilePath != NULL) {
711 return (ShellOpenFileByDevicePath(&FilePath,
712 &DeviceHandle,
713 FileHandle,
714 OpenMode,
715 Attributes));
716 }
717 return (EFI_DEVICE_ERROR);
718 }
719 /**
720 This function create a directory
721
722 If return is EFI_SUCCESS, the Filehandle is the opened directory's handle;
723 otherwise, the Filehandle is NULL. If the directory already existed, this
724 function opens the existing directory.
725
726 @param DirectoryName pointer to directory name
727 @param FileHandle pointer to the file handle.
728
729 @retval EFI_SUCCESS The information was set.
730 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
731 @retval EFI_UNSUPPORTED Could not open the file path.
732 @retval EFI_NOT_FOUND The specified file could not be found on the
733 device or the file system could not be found
734 on the device.
735 @retval EFI_NO_MEDIA The device has no medium.
736 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
737 medium is no longer supported.
738 @retval EFI_DEVICE_ERROR The device reported an error.
739 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
740 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
741 @retval EFI_ACCESS_DENIED The file was opened read only.
742 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
743 file.
744 @retval EFI_VOLUME_FULL The volume is full.
745 @sa ShellOpenFileByName
746 **/
747 EFI_STATUS
748 EFIAPI
749 ShellCreateDirectory(
750 IN CONST CHAR16 *DirectoryName,
751 OUT SHELL_FILE_HANDLE *FileHandle
752 )
753 {
754 if (gEfiShellProtocol != NULL) {
755 //
756 // Use UEFI Shell 2.0 method
757 //
758 return (gEfiShellProtocol->CreateFile(DirectoryName,
759 EFI_FILE_DIRECTORY,
760 FileHandle
761 ));
762 } else {
763 return (ShellOpenFileByName(DirectoryName,
764 FileHandle,
765 EFI_FILE_MODE_READ | EFI_FILE_MODE_WRITE | EFI_FILE_MODE_CREATE,
766 EFI_FILE_DIRECTORY
767 ));
768 }
769 }
770
771 /**
772 This function reads information from an opened file.
773
774 If FileHandle is not a directory, the function reads the requested number of
775 bytes from the file at the file's current position and returns them in Buffer.
776 If the read goes beyond the end of the file, the read length is truncated to the
777 end of the file. The file's current position is increased by the number of bytes
778 returned. If FileHandle is a directory, the function reads the directory entry
779 at the file's current position and returns the entry in Buffer. If the Buffer
780 is not large enough to hold the current directory entry, then
781 EFI_BUFFER_TOO_SMALL is returned and the current file position is not updated.
782 BufferSize is set to be the size of the buffer needed to read the entry. On
783 success, the current position is updated to the next directory entry. If there
784 are no more directory entries, the read returns a zero-length buffer.
785 EFI_FILE_INFO is the structure returned as the directory entry.
786
787 @param FileHandle the opened file handle
788 @param BufferSize on input the size of buffer in bytes. on return
789 the number of bytes written.
790 @param Buffer the buffer to put read data into.
791
792 @retval EFI_SUCCESS Data was read.
793 @retval EFI_NO_MEDIA The device has no media.
794 @retval EFI_DEVICE_ERROR The device reported an error.
795 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
796 @retval EFI_BUFFER_TO_SMALL Buffer is too small. ReadSize contains required
797 size.
798
799 **/
800 EFI_STATUS
801 EFIAPI
802 ShellReadFile(
803 IN SHELL_FILE_HANDLE FileHandle,
804 IN OUT UINTN *BufferSize,
805 OUT VOID *Buffer
806 )
807 {
808 return (FileFunctionMap.ReadFile(FileHandle, BufferSize, Buffer));
809 }
810
811
812 /**
813 Write data to a file.
814
815 This function writes the specified number of bytes to the file at the current
816 file position. The current file position is advanced the actual number of bytes
817 written, which is returned in BufferSize. Partial writes only occur when there
818 has been a data error during the write attempt (such as "volume space full").
819 The file is automatically grown to hold the data if required. Direct writes to
820 opened directories are not supported.
821
822 @param FileHandle The opened file for writing
823 @param BufferSize on input the number of bytes in Buffer. On output
824 the number of bytes written.
825 @param Buffer the buffer containing data to write is stored.
826
827 @retval EFI_SUCCESS Data was written.
828 @retval EFI_UNSUPPORTED Writes to an open directory are not supported.
829 @retval EFI_NO_MEDIA The device has no media.
830 @retval EFI_DEVICE_ERROR The device reported an error.
831 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
832 @retval EFI_WRITE_PROTECTED The device is write-protected.
833 @retval EFI_ACCESS_DENIED The file was open for read only.
834 @retval EFI_VOLUME_FULL The volume is full.
835 **/
836 EFI_STATUS
837 EFIAPI
838 ShellWriteFile(
839 IN SHELL_FILE_HANDLE FileHandle,
840 IN OUT UINTN *BufferSize,
841 IN VOID *Buffer
842 )
843 {
844 return (FileFunctionMap.WriteFile(FileHandle, BufferSize, Buffer));
845 }
846
847 /**
848 Close an open file handle.
849
850 This function closes a specified file handle. All "dirty" cached file data is
851 flushed to the device, and the file is closed. In all cases the handle is
852 closed.
853
854 @param FileHandle the file handle to close.
855
856 @retval EFI_SUCCESS the file handle was closed sucessfully.
857 **/
858 EFI_STATUS
859 EFIAPI
860 ShellCloseFile (
861 IN SHELL_FILE_HANDLE *FileHandle
862 )
863 {
864 return (FileFunctionMap.CloseFile(*FileHandle));
865 }
866
867 /**
868 Delete a file and close the handle
869
870 This function closes and deletes a file. In all cases the file handle is closed.
871 If the file cannot be deleted, the warning code EFI_WARN_DELETE_FAILURE is
872 returned, but the handle is still closed.
873
874 @param FileHandle the file handle to delete
875
876 @retval EFI_SUCCESS the file was closed sucessfully
877 @retval EFI_WARN_DELETE_FAILURE the handle was closed, but the file was not
878 deleted
879 @retval INVALID_PARAMETER One of the parameters has an invalid value.
880 **/
881 EFI_STATUS
882 EFIAPI
883 ShellDeleteFile (
884 IN SHELL_FILE_HANDLE *FileHandle
885 )
886 {
887 return (FileFunctionMap.DeleteFile(*FileHandle));
888 }
889
890 /**
891 Set the current position in a file.
892
893 This function sets the current file position for the handle to the position
894 supplied. With the exception of seeking to position 0xFFFFFFFFFFFFFFFF, only
895 absolute positioning is supported, and seeking past the end of the file is
896 allowed (a subsequent write would grow the file). Seeking to position
897 0xFFFFFFFFFFFFFFFF causes the current position to be set to the end of the file.
898 If FileHandle is a directory, the only position that may be set is zero. This
899 has the effect of starting the read process of the directory entries over.
900
901 @param FileHandle The file handle on which the position is being set
902 @param Position Byte position from begining of file
903
904 @retval EFI_SUCCESS Operation completed sucessfully.
905 @retval EFI_UNSUPPORTED the seek request for non-zero is not valid on
906 directories.
907 @retval INVALID_PARAMETER One of the parameters has an invalid value.
908 **/
909 EFI_STATUS
910 EFIAPI
911 ShellSetFilePosition (
912 IN SHELL_FILE_HANDLE FileHandle,
913 IN UINT64 Position
914 )
915 {
916 return (FileFunctionMap.SetFilePosition(FileHandle, Position));
917 }
918
919 /**
920 Gets a file's current position
921
922 This function retrieves the current file position for the file handle. For
923 directories, the current file position has no meaning outside of the file
924 system driver and as such the operation is not supported. An error is returned
925 if FileHandle is a directory.
926
927 @param FileHandle The open file handle on which to get the position.
928 @param Position Byte position from begining of file.
929
930 @retval EFI_SUCCESS the operation completed sucessfully.
931 @retval INVALID_PARAMETER One of the parameters has an invalid value.
932 @retval EFI_UNSUPPORTED the request is not valid on directories.
933 **/
934 EFI_STATUS
935 EFIAPI
936 ShellGetFilePosition (
937 IN SHELL_FILE_HANDLE FileHandle,
938 OUT UINT64 *Position
939 )
940 {
941 return (FileFunctionMap.GetFilePosition(FileHandle, Position));
942 }
943 /**
944 Flushes data on a file
945
946 This function flushes all modified data associated with a file to a device.
947
948 @param FileHandle The file handle on which to flush data
949
950 @retval EFI_SUCCESS The data was flushed.
951 @retval EFI_NO_MEDIA The device has no media.
952 @retval EFI_DEVICE_ERROR The device reported an error.
953 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
954 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
955 @retval EFI_ACCESS_DENIED The file was opened for read only.
956 **/
957 EFI_STATUS
958 EFIAPI
959 ShellFlushFile (
960 IN SHELL_FILE_HANDLE FileHandle
961 )
962 {
963 return (FileFunctionMap.FlushFile(FileHandle));
964 }
965
966 /** Retrieve first entry from a directory.
967
968 This function takes an open directory handle and gets information from the
969 first entry in the directory. A buffer is allocated to contain
970 the information and a pointer to the buffer is returned in *Buffer. The
971 caller can use ShellFindNextFile() to get subsequent directory entries.
972
973 The buffer will be freed by ShellFindNextFile() when the last directory
974 entry is read. Otherwise, the caller must free the buffer, using FreePool,
975 when finished with it.
976
977 @param[in] DirHandle The file handle of the directory to search.
978 @param[out] Buffer The pointer to the buffer for the file's information.
979
980 @retval EFI_SUCCESS Found the first file.
981 @retval EFI_NOT_FOUND Cannot find the directory.
982 @retval EFI_NO_MEDIA The device has no media.
983 @retval EFI_DEVICE_ERROR The device reported an error.
984 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
985 @return Others status of ShellGetFileInfo, ShellSetFilePosition,
986 or ShellReadFile
987 **/
988 EFI_STATUS
989 EFIAPI
990 ShellFindFirstFile (
991 IN SHELL_FILE_HANDLE DirHandle,
992 OUT EFI_FILE_INFO **Buffer
993 )
994 {
995 //
996 // pass to file handle lib
997 //
998 return (FileHandleFindFirstFile(DirHandle, Buffer));
999 }
1000 /** Retrieve next entries from a directory.
1001
1002 To use this function, the caller must first call the ShellFindFirstFile()
1003 function to get the first directory entry. Subsequent directory entries are
1004 retrieved by using the ShellFindNextFile() function. This function can
1005 be called several times to get each entry from the directory. If the call of
1006 ShellFindNextFile() retrieved the last directory entry, the next call of
1007 this function will set *NoFile to TRUE and free the buffer.
1008
1009 @param[in] DirHandle The file handle of the directory.
1010 @param[out] Buffer The pointer to buffer for file's information.
1011 @param[out] NoFile The pointer to boolean when last file is found.
1012
1013 @retval EFI_SUCCESS Found the next file, or reached last file
1014 @retval EFI_NO_MEDIA The device has no media.
1015 @retval EFI_DEVICE_ERROR The device reported an error.
1016 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
1017 **/
1018 EFI_STATUS
1019 EFIAPI
1020 ShellFindNextFile(
1021 IN SHELL_FILE_HANDLE DirHandle,
1022 OUT EFI_FILE_INFO *Buffer,
1023 OUT BOOLEAN *NoFile
1024 )
1025 {
1026 //
1027 // pass to file handle lib
1028 //
1029 return (FileHandleFindNextFile(DirHandle, Buffer, NoFile));
1030 }
1031 /**
1032 Retrieve the size of a file.
1033
1034 if FileHandle is NULL then ASSERT()
1035 if Size is NULL then ASSERT()
1036
1037 This function extracts the file size info from the FileHandle's EFI_FILE_INFO
1038 data.
1039
1040 @param FileHandle file handle from which size is retrieved
1041 @param Size pointer to size
1042
1043 @retval EFI_SUCCESS operation was completed sucessfully
1044 @retval EFI_DEVICE_ERROR cannot access the file
1045 **/
1046 EFI_STATUS
1047 EFIAPI
1048 ShellGetFileSize (
1049 IN SHELL_FILE_HANDLE FileHandle,
1050 OUT UINT64 *Size
1051 )
1052 {
1053 return (FileFunctionMap.GetFileSize(FileHandle, Size));
1054 }
1055 /**
1056 Retrieves the status of the break execution flag
1057
1058 this function is useful to check whether the application is being asked to halt by the shell.
1059
1060 @retval TRUE the execution break is enabled
1061 @retval FALSE the execution break is not enabled
1062 **/
1063 BOOLEAN
1064 EFIAPI
1065 ShellGetExecutionBreakFlag(
1066 VOID
1067 )
1068 {
1069 //
1070 // Check for UEFI Shell 2.0 protocols
1071 //
1072 if (gEfiShellProtocol != NULL) {
1073
1074 //
1075 // We are using UEFI Shell 2.0; see if the event has been triggered
1076 //
1077 if (gBS->CheckEvent(gEfiShellProtocol->ExecutionBreak) != EFI_SUCCESS) {
1078 return (FALSE);
1079 }
1080 return (TRUE);
1081 }
1082
1083 //
1084 // using EFI Shell; call the function to check
1085 //
1086 if (mEfiShellEnvironment2 != NULL) {
1087 return (mEfiShellEnvironment2->GetExecutionBreak());
1088 }
1089
1090 return (FALSE);
1091 }
1092 /**
1093 return the value of an environment variable
1094
1095 this function gets the value of the environment variable set by the
1096 ShellSetEnvironmentVariable function
1097
1098 @param EnvKey The key name of the environment variable.
1099
1100 @retval NULL the named environment variable does not exist.
1101 @return != NULL pointer to the value of the environment variable
1102 **/
1103 CONST CHAR16*
1104 EFIAPI
1105 ShellGetEnvironmentVariable (
1106 IN CONST CHAR16 *EnvKey
1107 )
1108 {
1109 //
1110 // Check for UEFI Shell 2.0 protocols
1111 //
1112 if (gEfiShellProtocol != NULL) {
1113 return (gEfiShellProtocol->GetEnv(EnvKey));
1114 }
1115
1116 //
1117 // Check for EFI shell
1118 //
1119 if (mEfiShellEnvironment2 != NULL) {
1120 return (mEfiShellEnvironment2->GetEnv((CHAR16*)EnvKey));
1121 }
1122
1123 return NULL;
1124 }
1125 /**
1126 set the value of an environment variable
1127
1128 This function changes the current value of the specified environment variable. If the
1129 environment variable exists and the Value is an empty string, then the environment
1130 variable is deleted. If the environment variable exists and the Value is not an empty
1131 string, then the value of the environment variable is changed. If the environment
1132 variable does not exist and the Value is an empty string, there is no action. If the
1133 environment variable does not exist and the Value is a non-empty string, then the
1134 environment variable is created and assigned the specified value.
1135
1136 This is not supported pre-UEFI Shell 2.0.
1137
1138 @param EnvKey The key name of the environment variable.
1139 @param EnvVal The Value of the environment variable
1140 @param Volatile Indicates whether the variable is non-volatile (FALSE) or volatile (TRUE).
1141
1142 @retval EFI_SUCCESS the operation was completed sucessfully
1143 @retval EFI_UNSUPPORTED This operation is not allowed in pre UEFI 2.0 Shell environments
1144 **/
1145 EFI_STATUS
1146 EFIAPI
1147 ShellSetEnvironmentVariable (
1148 IN CONST CHAR16 *EnvKey,
1149 IN CONST CHAR16 *EnvVal,
1150 IN BOOLEAN Volatile
1151 )
1152 {
1153 //
1154 // Check for UEFI Shell 2.0 protocols
1155 //
1156 if (gEfiShellProtocol != NULL) {
1157 return (gEfiShellProtocol->SetEnv(EnvKey, EnvVal, Volatile));
1158 }
1159
1160 //
1161 // This feature does not exist under EFI shell
1162 //
1163 return (EFI_UNSUPPORTED);
1164 }
1165
1166 /**
1167 Cause the shell to parse and execute a command line.
1168
1169 This function creates a nested instance of the shell and executes the specified
1170 command (CommandLine) with the specified environment (Environment). Upon return,
1171 the status code returned by the specified command is placed in StatusCode.
1172 If Environment is NULL, then the current environment is used and all changes made
1173 by the commands executed will be reflected in the current environment. If the
1174 Environment is non-NULL, then the changes made will be discarded.
1175 The CommandLine is executed from the current working directory on the current
1176 device.
1177
1178 The EnvironmentVariables pararemeter is ignored in a pre-UEFI Shell 2.0
1179 environment. The values pointed to by the parameters will be unchanged by the
1180 ShellExecute() function. The Output parameter has no effect in a
1181 UEFI Shell 2.0 environment.
1182
1183 @param[in] ParentHandle The parent image starting the operation.
1184 @param[in] CommandLine The pointer to a NULL terminated command line.
1185 @param[in] Output True to display debug output. False to hide it.
1186 @param[in] EnvironmentVariables Optional pointer to array of environment variables
1187 in the form "x=y". If NULL, the current set is used.
1188 @param[out] Status The status of the run command line.
1189
1190 @retval EFI_SUCCESS The operation completed sucessfully. Status
1191 contains the status code returned.
1192 @retval EFI_INVALID_PARAMETER A parameter contains an invalid value.
1193 @retval EFI_OUT_OF_RESOURCES Out of resources.
1194 @retval EFI_UNSUPPORTED The operation is not allowed.
1195 **/
1196 EFI_STATUS
1197 EFIAPI
1198 ShellExecute (
1199 IN EFI_HANDLE *ParentHandle,
1200 IN CHAR16 *CommandLine OPTIONAL,
1201 IN BOOLEAN Output OPTIONAL,
1202 IN CHAR16 **EnvironmentVariables OPTIONAL,
1203 OUT EFI_STATUS *Status OPTIONAL
1204 )
1205 {
1206 EFI_STATUS CmdStatus;
1207 //
1208 // Check for UEFI Shell 2.0 protocols
1209 //
1210 if (gEfiShellProtocol != NULL) {
1211 //
1212 // Call UEFI Shell 2.0 version (not using Output parameter)
1213 //
1214 return (gEfiShellProtocol->Execute(ParentHandle,
1215 CommandLine,
1216 EnvironmentVariables,
1217 Status));
1218 }
1219
1220 //
1221 // Check for EFI shell
1222 //
1223 if (mEfiShellEnvironment2 != NULL) {
1224 //
1225 // Call EFI Shell version.
1226 // Due to oddity in the EFI shell we want to dereference the ParentHandle here
1227 //
1228 CmdStatus = (mEfiShellEnvironment2->Execute(*ParentHandle,
1229 CommandLine,
1230 Output));
1231 //
1232 // No Status output parameter so just use the returned status
1233 //
1234 if (Status != NULL) {
1235 *Status = CmdStatus;
1236 }
1237 //
1238 // If there was an error, we can't tell if it was from the command or from
1239 // the Execute() function, so we'll just assume the shell ran successfully
1240 // and the error came from the command.
1241 //
1242 return EFI_SUCCESS;
1243 }
1244
1245 return (EFI_UNSUPPORTED);
1246 }
1247
1248 /**
1249 Retreives the current directory path
1250
1251 If the DeviceName is NULL, it returns the current device's current directory
1252 name. If the DeviceName is not NULL, it returns the current directory name
1253 on specified drive.
1254
1255 @param DeviceName the name of the drive to get directory on
1256
1257 @retval NULL the directory does not exist
1258 @return != NULL the directory
1259 **/
1260 CONST CHAR16*
1261 EFIAPI
1262 ShellGetCurrentDir (
1263 IN CHAR16 * CONST DeviceName OPTIONAL
1264 )
1265 {
1266 //
1267 // Check for UEFI Shell 2.0 protocols
1268 //
1269 if (gEfiShellProtocol != NULL) {
1270 return (gEfiShellProtocol->GetCurDir(DeviceName));
1271 }
1272
1273 //
1274 // Check for EFI shell
1275 //
1276 if (mEfiShellEnvironment2 != NULL) {
1277 return (mEfiShellEnvironment2->CurDir(DeviceName));
1278 }
1279
1280 return (NULL);
1281 }
1282 /**
1283 sets (enabled or disabled) the page break mode
1284
1285 when page break mode is enabled the screen will stop scrolling
1286 and wait for operator input before scrolling a subsequent screen.
1287
1288 @param CurrentState TRUE to enable and FALSE to disable
1289 **/
1290 VOID
1291 EFIAPI
1292 ShellSetPageBreakMode (
1293 IN BOOLEAN CurrentState
1294 )
1295 {
1296 //
1297 // check for enabling
1298 //
1299 if (CurrentState != 0x00) {
1300 //
1301 // check for UEFI Shell 2.0
1302 //
1303 if (gEfiShellProtocol != NULL) {
1304 //
1305 // Enable with UEFI 2.0 Shell
1306 //
1307 gEfiShellProtocol->EnablePageBreak();
1308 return;
1309 } else {
1310 //
1311 // Check for EFI shell
1312 //
1313 if (mEfiShellEnvironment2 != NULL) {
1314 //
1315 // Enable with EFI Shell
1316 //
1317 mEfiShellEnvironment2->EnablePageBreak (DEFAULT_INIT_ROW, DEFAULT_AUTO_LF);
1318 return;
1319 }
1320 }
1321 } else {
1322 //
1323 // check for UEFI Shell 2.0
1324 //
1325 if (gEfiShellProtocol != NULL) {
1326 //
1327 // Disable with UEFI 2.0 Shell
1328 //
1329 gEfiShellProtocol->DisablePageBreak();
1330 return;
1331 } else {
1332 //
1333 // Check for EFI shell
1334 //
1335 if (mEfiShellEnvironment2 != NULL) {
1336 //
1337 // Disable with EFI Shell
1338 //
1339 mEfiShellEnvironment2->DisablePageBreak ();
1340 return;
1341 }
1342 }
1343 }
1344 }
1345
1346 ///
1347 /// version of EFI_SHELL_FILE_INFO struct, except has no CONST pointers.
1348 /// This allows for the struct to be populated.
1349 ///
1350 typedef struct {
1351 LIST_ENTRY Link;
1352 EFI_STATUS Status;
1353 CHAR16 *FullName;
1354 CHAR16 *FileName;
1355 SHELL_FILE_HANDLE Handle;
1356 EFI_FILE_INFO *Info;
1357 } EFI_SHELL_FILE_INFO_NO_CONST;
1358
1359 /**
1360 Converts a EFI shell list of structures to the coresponding UEFI Shell 2.0 type of list.
1361
1362 if OldStyleFileList is NULL then ASSERT()
1363
1364 this function will convert a SHELL_FILE_ARG based list into a callee allocated
1365 EFI_SHELL_FILE_INFO based list. it is up to the caller to free the memory via
1366 the ShellCloseFileMetaArg function.
1367
1368 @param[in] FileList the EFI shell list type
1369 @param[in, out] ListHead the list to add to
1370
1371 @retval the resultant head of the double linked new format list;
1372 **/
1373 LIST_ENTRY*
1374 EFIAPI
1375 InternalShellConvertFileListType (
1376 IN LIST_ENTRY *FileList,
1377 IN OUT LIST_ENTRY *ListHead
1378 )
1379 {
1380 SHELL_FILE_ARG *OldInfo;
1381 LIST_ENTRY *Link;
1382 EFI_SHELL_FILE_INFO_NO_CONST *NewInfo;
1383
1384 //
1385 // ASSERTs
1386 //
1387 ASSERT(FileList != NULL);
1388 ASSERT(ListHead != NULL);
1389
1390 //
1391 // enumerate through each member of the old list and copy
1392 //
1393 for (Link = FileList->ForwardLink; Link != FileList; Link = Link->ForwardLink) {
1394 OldInfo = CR (Link, SHELL_FILE_ARG, Link, SHELL_FILE_ARG_SIGNATURE);
1395 ASSERT(OldInfo != NULL);
1396
1397 //
1398 // Skip ones that failed to open...
1399 //
1400 if (OldInfo->Status != EFI_SUCCESS) {
1401 continue;
1402 }
1403
1404 //
1405 // make sure the old list was valid
1406 //
1407 ASSERT(OldInfo->Info != NULL);
1408 ASSERT(OldInfo->FullName != NULL);
1409 ASSERT(OldInfo->FileName != NULL);
1410
1411 //
1412 // allocate a new EFI_SHELL_FILE_INFO object
1413 //
1414 NewInfo = AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
1415 if (NewInfo == NULL) {
1416 ShellCloseFileMetaArg((EFI_SHELL_FILE_INFO**)(&ListHead));
1417 ListHead = NULL;
1418 break;
1419 }
1420
1421 //
1422 // copy the simple items
1423 //
1424 NewInfo->Handle = OldInfo->Handle;
1425 NewInfo->Status = OldInfo->Status;
1426
1427 // old shell checks for 0 not NULL
1428 OldInfo->Handle = 0;
1429
1430 //
1431 // allocate new space to copy strings and structure
1432 //
1433 NewInfo->FullName = AllocateCopyPool(StrSize(OldInfo->FullName), OldInfo->FullName);
1434 NewInfo->FileName = AllocateCopyPool(StrSize(OldInfo->FileName), OldInfo->FileName);
1435 NewInfo->Info = AllocateCopyPool((UINTN)OldInfo->Info->Size, OldInfo->Info);
1436
1437 //
1438 // make sure all the memory allocations were sucessful
1439 //
1440 if (NULL == NewInfo->FullName || NewInfo->FileName == NULL || NewInfo->Info == NULL) {
1441 //
1442 // Free the partially allocated new node
1443 //
1444 SHELL_FREE_NON_NULL(NewInfo->FullName);
1445 SHELL_FREE_NON_NULL(NewInfo->FileName);
1446 SHELL_FREE_NON_NULL(NewInfo->Info);
1447 SHELL_FREE_NON_NULL(NewInfo);
1448
1449 //
1450 // Free the previously converted stuff
1451 //
1452 ShellCloseFileMetaArg((EFI_SHELL_FILE_INFO**)(&ListHead));
1453 ListHead = NULL;
1454 break;
1455 }
1456
1457 //
1458 // add that to the list
1459 //
1460 InsertTailList(ListHead, &NewInfo->Link);
1461 }
1462 return (ListHead);
1463 }
1464 /**
1465 Opens a group of files based on a path.
1466
1467 This function uses the Arg to open all the matching files. Each matched
1468 file has a SHELL_FILE_INFO structure to record the file information. These
1469 structures are placed on the list ListHead. Users can get the SHELL_FILE_INFO
1470 structures from ListHead to access each file. This function supports wildcards
1471 and will process '?' and '*' as such. the list must be freed with a call to
1472 ShellCloseFileMetaArg().
1473
1474 If you are NOT appending to an existing list *ListHead must be NULL. If
1475 *ListHead is NULL then it must be callee freed.
1476
1477 @param Arg pointer to path string
1478 @param OpenMode mode to open files with
1479 @param ListHead head of linked list of results
1480
1481 @retval EFI_SUCCESS the operation was sucessful and the list head
1482 contains the list of opened files
1483 @return != EFI_SUCCESS the operation failed
1484
1485 @sa InternalShellConvertFileListType
1486 **/
1487 EFI_STATUS
1488 EFIAPI
1489 ShellOpenFileMetaArg (
1490 IN CHAR16 *Arg,
1491 IN UINT64 OpenMode,
1492 IN OUT EFI_SHELL_FILE_INFO **ListHead
1493 )
1494 {
1495 EFI_STATUS Status;
1496 LIST_ENTRY mOldStyleFileList;
1497 CHAR16 *CleanFilePathStr;
1498
1499 //
1500 // ASSERT that Arg and ListHead are not NULL
1501 //
1502 ASSERT(Arg != NULL);
1503 ASSERT(ListHead != NULL);
1504
1505 CleanFilePathStr = NULL;
1506
1507 Status = InternalShellStripQuotes (Arg, &CleanFilePathStr);
1508 if (EFI_ERROR (Status)) {
1509 return Status;
1510 }
1511
1512 //
1513 // Check for UEFI Shell 2.0 protocols
1514 //
1515 if (gEfiShellProtocol != NULL) {
1516 if (*ListHead == NULL) {
1517 *ListHead = (EFI_SHELL_FILE_INFO*)AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
1518 if (*ListHead == NULL) {
1519 FreePool(CleanFilePathStr);
1520 return (EFI_OUT_OF_RESOURCES);
1521 }
1522 InitializeListHead(&((*ListHead)->Link));
1523 }
1524 Status = gEfiShellProtocol->OpenFileList(CleanFilePathStr,
1525 OpenMode,
1526 ListHead);
1527 if (EFI_ERROR(Status)) {
1528 gEfiShellProtocol->RemoveDupInFileList(ListHead);
1529 } else {
1530 Status = gEfiShellProtocol->RemoveDupInFileList(ListHead);
1531 }
1532 if (*ListHead != NULL && IsListEmpty(&(*ListHead)->Link)) {
1533 FreePool(*ListHead);
1534 FreePool(CleanFilePathStr);
1535 *ListHead = NULL;
1536 return (EFI_NOT_FOUND);
1537 }
1538 FreePool(CleanFilePathStr);
1539 return (Status);
1540 }
1541
1542 //
1543 // Check for EFI shell
1544 //
1545 if (mEfiShellEnvironment2 != NULL) {
1546 //
1547 // make sure the list head is initialized
1548 //
1549 InitializeListHead(&mOldStyleFileList);
1550
1551 //
1552 // Get the EFI Shell list of files
1553 //
1554 Status = mEfiShellEnvironment2->FileMetaArg(CleanFilePathStr, &mOldStyleFileList);
1555 if (EFI_ERROR(Status)) {
1556 *ListHead = NULL;
1557 FreePool(CleanFilePathStr);
1558 return (Status);
1559 }
1560
1561 if (*ListHead == NULL) {
1562 *ListHead = (EFI_SHELL_FILE_INFO *)AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
1563 if (*ListHead == NULL) {
1564 FreePool(CleanFilePathStr);
1565 return (EFI_OUT_OF_RESOURCES);
1566 }
1567 InitializeListHead(&((*ListHead)->Link));
1568 }
1569
1570 //
1571 // Convert that to equivalent of UEFI Shell 2.0 structure
1572 //
1573 InternalShellConvertFileListType(&mOldStyleFileList, &(*ListHead)->Link);
1574
1575 //
1576 // Free the EFI Shell version that was converted.
1577 //
1578 mEfiShellEnvironment2->FreeFileList(&mOldStyleFileList);
1579
1580 if ((*ListHead)->Link.ForwardLink == (*ListHead)->Link.BackLink && (*ListHead)->Link.BackLink == &((*ListHead)->Link)) {
1581 FreePool(*ListHead);
1582 *ListHead = NULL;
1583 Status = EFI_NOT_FOUND;
1584 }
1585 FreePool(CleanFilePathStr);
1586 return (Status);
1587 }
1588
1589 FreePool(CleanFilePathStr);
1590 return (EFI_UNSUPPORTED);
1591 }
1592 /**
1593 Free the linked list returned from ShellOpenFileMetaArg.
1594
1595 if ListHead is NULL then ASSERT().
1596
1597 @param ListHead the pointer to free.
1598
1599 @retval EFI_SUCCESS the operation was sucessful.
1600 **/
1601 EFI_STATUS
1602 EFIAPI
1603 ShellCloseFileMetaArg (
1604 IN OUT EFI_SHELL_FILE_INFO **ListHead
1605 )
1606 {
1607 LIST_ENTRY *Node;
1608
1609 //
1610 // ASSERT that ListHead is not NULL
1611 //
1612 ASSERT(ListHead != NULL);
1613
1614 //
1615 // Check for UEFI Shell 2.0 protocols
1616 //
1617 if (gEfiShellProtocol != NULL) {
1618 return (gEfiShellProtocol->FreeFileList(ListHead));
1619 } else if (mEfiShellEnvironment2 != NULL) {
1620 //
1621 // Since this is EFI Shell version we need to free our internally made copy
1622 // of the list
1623 //
1624 for ( Node = GetFirstNode(&(*ListHead)->Link)
1625 ; *ListHead != NULL && !IsListEmpty(&(*ListHead)->Link)
1626 ; Node = GetFirstNode(&(*ListHead)->Link)) {
1627 RemoveEntryList(Node);
1628 ((EFI_FILE_PROTOCOL*)((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Handle)->Close(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Handle);
1629 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->FullName);
1630 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->FileName);
1631 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Info);
1632 FreePool((EFI_SHELL_FILE_INFO_NO_CONST*)Node);
1633 }
1634 SHELL_FREE_NON_NULL(*ListHead);
1635 return EFI_SUCCESS;
1636 }
1637
1638 return (EFI_UNSUPPORTED);
1639 }
1640
1641 /**
1642 Find a file by searching the CWD and then the path.
1643
1644 If FileName is NULL then ASSERT.
1645
1646 If the return value is not NULL then the memory must be caller freed.
1647
1648 @param FileName Filename string.
1649
1650 @retval NULL the file was not found
1651 @return !NULL the full path to the file.
1652 **/
1653 CHAR16 *
1654 EFIAPI
1655 ShellFindFilePath (
1656 IN CONST CHAR16 *FileName
1657 )
1658 {
1659 CONST CHAR16 *Path;
1660 SHELL_FILE_HANDLE Handle;
1661 EFI_STATUS Status;
1662 CHAR16 *RetVal;
1663 CHAR16 *TestPath;
1664 CONST CHAR16 *Walker;
1665 UINTN Size;
1666 CHAR16 *TempChar;
1667
1668 RetVal = NULL;
1669
1670 //
1671 // First make sure its not an absolute path.
1672 //
1673 Status = ShellOpenFileByName(FileName, &Handle, EFI_FILE_MODE_READ, 0);
1674 if (!EFI_ERROR(Status)){
1675 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1676 ASSERT(RetVal == NULL);
1677 RetVal = StrnCatGrow(&RetVal, NULL, FileName, 0);
1678 ShellCloseFile(&Handle);
1679 return (RetVal);
1680 } else {
1681 ShellCloseFile(&Handle);
1682 }
1683 }
1684
1685 Path = ShellGetEnvironmentVariable(L"cwd");
1686 if (Path != NULL) {
1687 Size = StrSize(Path);
1688 Size += StrSize(FileName);
1689 TestPath = AllocateZeroPool(Size);
1690 if (TestPath == NULL) {
1691 return (NULL);
1692 }
1693 StrnCpy(TestPath, Path, Size/sizeof(CHAR16) - 1);
1694 StrnCat(TestPath, FileName, Size/sizeof(CHAR16) - 1 - StrLen(TestPath));
1695 Status = ShellOpenFileByName(TestPath, &Handle, EFI_FILE_MODE_READ, 0);
1696 if (!EFI_ERROR(Status)){
1697 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1698 ASSERT(RetVal == NULL);
1699 RetVal = StrnCatGrow(&RetVal, NULL, TestPath, 0);
1700 ShellCloseFile(&Handle);
1701 FreePool(TestPath);
1702 return (RetVal);
1703 } else {
1704 ShellCloseFile(&Handle);
1705 }
1706 }
1707 FreePool(TestPath);
1708 }
1709 Path = ShellGetEnvironmentVariable(L"path");
1710 if (Path != NULL) {
1711 Size = StrSize(Path)+sizeof(CHAR16);
1712 Size += StrSize(FileName);
1713 TestPath = AllocateZeroPool(Size);
1714 if (TestPath == NULL) {
1715 return (NULL);
1716 }
1717 Walker = (CHAR16*)Path;
1718 do {
1719 CopyMem(TestPath, Walker, StrSize(Walker));
1720 if (TestPath != NULL) {
1721 TempChar = StrStr(TestPath, L";");
1722 if (TempChar != NULL) {
1723 *TempChar = CHAR_NULL;
1724 }
1725 if (TestPath[StrLen(TestPath)-1] != L'\\') {
1726 StrnCat(TestPath, L"\\", Size/sizeof(CHAR16) - 1 - StrLen(TestPath));
1727 }
1728 if (FileName[0] == L'\\') {
1729 FileName++;
1730 }
1731 StrnCat(TestPath, FileName, Size/sizeof(CHAR16) - 1 - StrLen(TestPath));
1732 if (StrStr(Walker, L";") != NULL) {
1733 Walker = StrStr(Walker, L";") + 1;
1734 } else {
1735 Walker = NULL;
1736 }
1737 Status = ShellOpenFileByName(TestPath, &Handle, EFI_FILE_MODE_READ, 0);
1738 if (!EFI_ERROR(Status)){
1739 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1740 ASSERT(RetVal == NULL);
1741 RetVal = StrnCatGrow(&RetVal, NULL, TestPath, 0);
1742 ShellCloseFile(&Handle);
1743 break;
1744 } else {
1745 ShellCloseFile(&Handle);
1746 }
1747 }
1748 }
1749 } while (Walker != NULL && Walker[0] != CHAR_NULL);
1750 FreePool(TestPath);
1751 }
1752 return (RetVal);
1753 }
1754
1755 /**
1756 Find a file by searching the CWD and then the path with a variable set of file
1757 extensions. If the file is not found it will append each extension in the list
1758 in the order provided and return the first one that is successful.
1759
1760 If FileName is NULL, then ASSERT.
1761 If FileExtension is NULL, then behavior is identical to ShellFindFilePath.
1762
1763 If the return value is not NULL then the memory must be caller freed.
1764
1765 @param[in] FileName Filename string.
1766 @param[in] FileExtension Semi-colon delimeted list of possible extensions.
1767
1768 @retval NULL The file was not found.
1769 @retval !NULL The path to the file.
1770 **/
1771 CHAR16 *
1772 EFIAPI
1773 ShellFindFilePathEx (
1774 IN CONST CHAR16 *FileName,
1775 IN CONST CHAR16 *FileExtension
1776 )
1777 {
1778 CHAR16 *TestPath;
1779 CHAR16 *RetVal;
1780 CONST CHAR16 *ExtensionWalker;
1781 UINTN Size;
1782 CHAR16 *TempChar;
1783 CHAR16 *TempChar2;
1784
1785 ASSERT(FileName != NULL);
1786 if (FileExtension == NULL) {
1787 return (ShellFindFilePath(FileName));
1788 }
1789 RetVal = ShellFindFilePath(FileName);
1790 if (RetVal != NULL) {
1791 return (RetVal);
1792 }
1793 Size = StrSize(FileName);
1794 Size += StrSize(FileExtension);
1795 TestPath = AllocateZeroPool(Size);
1796 if (TestPath == NULL) {
1797 return (NULL);
1798 }
1799 for (ExtensionWalker = FileExtension, TempChar2 = (CHAR16*)FileExtension; TempChar2 != NULL ; ExtensionWalker = TempChar2 + 1){
1800 StrnCpy(TestPath, FileName, Size/sizeof(CHAR16) - 1);
1801 if (ExtensionWalker != NULL) {
1802 StrnCat(TestPath, ExtensionWalker, Size/sizeof(CHAR16) - 1 - StrLen(TestPath));
1803 }
1804 TempChar = StrStr(TestPath, L";");
1805 if (TempChar != NULL) {
1806 *TempChar = CHAR_NULL;
1807 }
1808 RetVal = ShellFindFilePath(TestPath);
1809 if (RetVal != NULL) {
1810 break;
1811 }
1812 ASSERT(ExtensionWalker != NULL);
1813 TempChar2 = StrStr(ExtensionWalker, L";");
1814 }
1815 FreePool(TestPath);
1816 return (RetVal);
1817 }
1818
1819 typedef struct {
1820 LIST_ENTRY Link;
1821 CHAR16 *Name;
1822 SHELL_PARAM_TYPE Type;
1823 CHAR16 *Value;
1824 UINTN OriginalPosition;
1825 } SHELL_PARAM_PACKAGE;
1826
1827 /**
1828 Checks the list of valid arguments and returns TRUE if the item was found. If the
1829 return value is TRUE then the type parameter is set also.
1830
1831 if CheckList is NULL then ASSERT();
1832 if Name is NULL then ASSERT();
1833 if Type is NULL then ASSERT();
1834
1835 @param Name pointer to Name of parameter found
1836 @param CheckList List to check against
1837 @param Type pointer to type of parameter if it was found
1838
1839 @retval TRUE the Parameter was found. Type is valid.
1840 @retval FALSE the Parameter was not found. Type is not valid.
1841 **/
1842 BOOLEAN
1843 EFIAPI
1844 InternalIsOnCheckList (
1845 IN CONST CHAR16 *Name,
1846 IN CONST SHELL_PARAM_ITEM *CheckList,
1847 OUT SHELL_PARAM_TYPE *Type
1848 )
1849 {
1850 SHELL_PARAM_ITEM *TempListItem;
1851 CHAR16 *TempString;
1852
1853 //
1854 // ASSERT that all 3 pointer parameters aren't NULL
1855 //
1856 ASSERT(CheckList != NULL);
1857 ASSERT(Type != NULL);
1858 ASSERT(Name != NULL);
1859
1860 //
1861 // question mark and page break mode are always supported
1862 //
1863 if ((StrCmp(Name, L"-?") == 0) ||
1864 (StrCmp(Name, L"-b") == 0)
1865 ) {
1866 *Type = TypeFlag;
1867 return (TRUE);
1868 }
1869
1870 //
1871 // Enumerate through the list
1872 //
1873 for (TempListItem = (SHELL_PARAM_ITEM*)CheckList ; TempListItem->Name != NULL ; TempListItem++) {
1874 //
1875 // If the Type is TypeStart only check the first characters of the passed in param
1876 // If it matches set the type and return TRUE
1877 //
1878 if (TempListItem->Type == TypeStart) {
1879 if (StrnCmp(Name, TempListItem->Name, StrLen(TempListItem->Name)) == 0) {
1880 *Type = TempListItem->Type;
1881 return (TRUE);
1882 }
1883 TempString = NULL;
1884 TempString = StrnCatGrow(&TempString, NULL, Name, StrLen(TempListItem->Name));
1885 if (TempString != NULL) {
1886 if (StringNoCaseCompare(&TempString, &TempListItem->Name) == 0) {
1887 *Type = TempListItem->Type;
1888 FreePool(TempString);
1889 return (TRUE);
1890 }
1891 FreePool(TempString);
1892 }
1893 } else if (StringNoCaseCompare(&Name, &TempListItem->Name) == 0) {
1894 *Type = TempListItem->Type;
1895 return (TRUE);
1896 }
1897 }
1898
1899 return (FALSE);
1900 }
1901 /**
1902 Checks the string for indicators of "flag" status. this is a leading '/', '-', or '+'
1903
1904 @param[in] Name pointer to Name of parameter found
1905 @param[in] AlwaysAllowNumbers TRUE to allow numbers, FALSE to not.
1906 @param[in] TimeNumbers TRUE to allow numbers with ":", FALSE otherwise.
1907
1908 @retval TRUE the Parameter is a flag.
1909 @retval FALSE the Parameter not a flag.
1910 **/
1911 BOOLEAN
1912 EFIAPI
1913 InternalIsFlag (
1914 IN CONST CHAR16 *Name,
1915 IN CONST BOOLEAN AlwaysAllowNumbers,
1916 IN CONST BOOLEAN TimeNumbers
1917 )
1918 {
1919 //
1920 // ASSERT that Name isn't NULL
1921 //
1922 ASSERT(Name != NULL);
1923
1924 //
1925 // If we accept numbers then dont return TRUE. (they will be values)
1926 //
1927 if (((Name[0] == L'-' || Name[0] == L'+') && InternalShellIsHexOrDecimalNumber(Name+1, FALSE, FALSE, TimeNumbers)) && AlwaysAllowNumbers) {
1928 return (FALSE);
1929 }
1930
1931 //
1932 // If the Name has a /, +, or - as the first character return TRUE
1933 //
1934 if ((Name[0] == L'/') ||
1935 (Name[0] == L'-') ||
1936 (Name[0] == L'+')
1937 ) {
1938 return (TRUE);
1939 }
1940 return (FALSE);
1941 }
1942
1943 /**
1944 Checks the command line arguments passed against the list of valid ones.
1945
1946 If no initialization is required, then return RETURN_SUCCESS.
1947
1948 @param[in] CheckList pointer to list of parameters to check
1949 @param[out] CheckPackage pointer to pointer to list checked values
1950 @param[out] ProblemParam optional pointer to pointer to unicode string for
1951 the paramater that caused failure. If used then the
1952 caller is responsible for freeing the memory.
1953 @param[in] AutoPageBreak will automatically set PageBreakEnabled for "b" parameter
1954 @param[in] Argv pointer to array of parameters
1955 @param[in] Argc Count of parameters in Argv
1956 @param[in] AlwaysAllowNumbers TRUE to allow numbers always, FALSE otherwise.
1957
1958 @retval EFI_SUCCESS The operation completed sucessfully.
1959 @retval EFI_OUT_OF_RESOURCES A memory allocation failed
1960 @retval EFI_INVALID_PARAMETER A parameter was invalid
1961 @retval EFI_VOLUME_CORRUPTED the command line was corrupt. an argument was
1962 duplicated. the duplicated command line argument
1963 was returned in ProblemParam if provided.
1964 @retval EFI_NOT_FOUND a argument required a value that was missing.
1965 the invalid command line argument was returned in
1966 ProblemParam if provided.
1967 **/
1968 EFI_STATUS
1969 EFIAPI
1970 InternalCommandLineParse (
1971 IN CONST SHELL_PARAM_ITEM *CheckList,
1972 OUT LIST_ENTRY **CheckPackage,
1973 OUT CHAR16 **ProblemParam OPTIONAL,
1974 IN BOOLEAN AutoPageBreak,
1975 IN CONST CHAR16 **Argv,
1976 IN UINTN Argc,
1977 IN BOOLEAN AlwaysAllowNumbers
1978 )
1979 {
1980 UINTN LoopCounter;
1981 SHELL_PARAM_TYPE CurrentItemType;
1982 SHELL_PARAM_PACKAGE *CurrentItemPackage;
1983 UINTN GetItemValue;
1984 UINTN ValueSize;
1985 UINTN Count;
1986 CONST CHAR16 *TempPointer;
1987 UINTN CurrentValueSize;
1988
1989 CurrentItemPackage = NULL;
1990 GetItemValue = 0;
1991 ValueSize = 0;
1992 Count = 0;
1993
1994 //
1995 // If there is only 1 item we dont need to do anything
1996 //
1997 if (Argc < 1) {
1998 *CheckPackage = NULL;
1999 return (EFI_SUCCESS);
2000 }
2001
2002 //
2003 // ASSERTs
2004 //
2005 ASSERT(CheckList != NULL);
2006 ASSERT(Argv != NULL);
2007
2008 //
2009 // initialize the linked list
2010 //
2011 *CheckPackage = (LIST_ENTRY*)AllocateZeroPool(sizeof(LIST_ENTRY));
2012 if (*CheckPackage == NULL) {
2013 return (EFI_OUT_OF_RESOURCES);
2014 }
2015
2016 InitializeListHead(*CheckPackage);
2017
2018 //
2019 // loop through each of the arguments
2020 //
2021 for (LoopCounter = 0 ; LoopCounter < Argc ; ++LoopCounter) {
2022 if (Argv[LoopCounter] == NULL) {
2023 //
2024 // do nothing for NULL argv
2025 //
2026 } else if (InternalIsOnCheckList(Argv[LoopCounter], CheckList, &CurrentItemType)) {
2027 //
2028 // We might have leftover if last parameter didnt have optional value
2029 //
2030 if (GetItemValue != 0) {
2031 GetItemValue = 0;
2032 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2033 }
2034 //
2035 // this is a flag
2036 //
2037 CurrentItemPackage = AllocateZeroPool(sizeof(SHELL_PARAM_PACKAGE));
2038 if (CurrentItemPackage == NULL) {
2039 ShellCommandLineFreeVarList(*CheckPackage);
2040 *CheckPackage = NULL;
2041 return (EFI_OUT_OF_RESOURCES);
2042 }
2043 CurrentItemPackage->Name = AllocateCopyPool(StrSize(Argv[LoopCounter]), Argv[LoopCounter]);
2044 if (CurrentItemPackage->Name == NULL) {
2045 ShellCommandLineFreeVarList(*CheckPackage);
2046 *CheckPackage = NULL;
2047 return (EFI_OUT_OF_RESOURCES);
2048 }
2049 CurrentItemPackage->Type = CurrentItemType;
2050 CurrentItemPackage->OriginalPosition = (UINTN)(-1);
2051 CurrentItemPackage->Value = NULL;
2052
2053 //
2054 // Does this flag require a value
2055 //
2056 switch (CurrentItemPackage->Type) {
2057 //
2058 // possibly trigger the next loop(s) to populate the value of this item
2059 //
2060 case TypeValue:
2061 case TypeTimeValue:
2062 GetItemValue = 1;
2063 ValueSize = 0;
2064 break;
2065 case TypeDoubleValue:
2066 GetItemValue = 2;
2067 ValueSize = 0;
2068 break;
2069 case TypeMaxValue:
2070 GetItemValue = (UINTN)(-1);
2071 ValueSize = 0;
2072 break;
2073 default:
2074 //
2075 // this item has no value expected; we are done
2076 //
2077 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2078 ASSERT(GetItemValue == 0);
2079 break;
2080 }
2081 } else if (GetItemValue != 0 && !InternalIsFlag(Argv[LoopCounter], AlwaysAllowNumbers, (CONST BOOLEAN)(CurrentItemPackage->Type == TypeTimeValue))) {
2082 ASSERT(CurrentItemPackage != NULL);
2083 //
2084 // get the item VALUE for a previous flag
2085 //
2086 if (StrStr(Argv[LoopCounter], L" ") == NULL) {
2087 CurrentValueSize = ValueSize + StrSize(Argv[LoopCounter]) + sizeof(CHAR16);
2088 CurrentItemPackage->Value = ReallocatePool(ValueSize, CurrentValueSize, CurrentItemPackage->Value);
2089 ASSERT(CurrentItemPackage->Value != NULL);
2090 if (ValueSize == 0) {
2091 StrnCpy(CurrentItemPackage->Value, Argv[LoopCounter], CurrentValueSize/sizeof(CHAR16) - 1);
2092 } else {
2093 StrnCat(CurrentItemPackage->Value, L" ", CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2094 StrnCat(CurrentItemPackage->Value, Argv[LoopCounter], CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2095 }
2096 ValueSize += StrSize(Argv[LoopCounter]) + sizeof(CHAR16);
2097 } else {
2098 //
2099 // the parameter has spaces. must be quoted.
2100 //
2101 CurrentValueSize = ValueSize + StrSize(Argv[LoopCounter]) + sizeof(CHAR16) + sizeof(CHAR16) + sizeof(CHAR16);
2102 CurrentItemPackage->Value = ReallocatePool(ValueSize, CurrentValueSize, CurrentItemPackage->Value);
2103 ASSERT(CurrentItemPackage->Value != NULL);
2104 if (ValueSize == 0) {
2105 StrnCpy(CurrentItemPackage->Value, L"\"", CurrentValueSize/sizeof(CHAR16) - 1);
2106 StrnCat(CurrentItemPackage->Value, Argv[LoopCounter], CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2107 StrnCat(CurrentItemPackage->Value, L"\"", CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2108 } else {
2109 StrnCat(CurrentItemPackage->Value, L" ", CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2110 StrnCat(CurrentItemPackage->Value, L"\"", CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2111 StrnCat(CurrentItemPackage->Value, Argv[LoopCounter], CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2112 StrnCat(CurrentItemPackage->Value, L"\"", CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2113 }
2114 ValueSize += StrSize(Argv[LoopCounter]) + sizeof(CHAR16);
2115 }
2116 GetItemValue--;
2117 if (GetItemValue == 0) {
2118 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2119 }
2120 } else if (!InternalIsFlag(Argv[LoopCounter], AlwaysAllowNumbers, FALSE)){
2121 //
2122 // add this one as a non-flag
2123 //
2124
2125 TempPointer = Argv[LoopCounter];
2126 if ((*TempPointer == L'^' && *(TempPointer+1) == L'-')
2127 || (*TempPointer == L'^' && *(TempPointer+1) == L'/')
2128 || (*TempPointer == L'^' && *(TempPointer+1) == L'+')
2129 ){
2130 TempPointer++;
2131 }
2132 CurrentItemPackage = AllocateZeroPool(sizeof(SHELL_PARAM_PACKAGE));
2133 if (CurrentItemPackage == NULL) {
2134 ShellCommandLineFreeVarList(*CheckPackage);
2135 *CheckPackage = NULL;
2136 return (EFI_OUT_OF_RESOURCES);
2137 }
2138 CurrentItemPackage->Name = NULL;
2139 CurrentItemPackage->Type = TypePosition;
2140 CurrentItemPackage->Value = AllocateCopyPool(StrSize(TempPointer), TempPointer);
2141 if (CurrentItemPackage->Value == NULL) {
2142 ShellCommandLineFreeVarList(*CheckPackage);
2143 *CheckPackage = NULL;
2144 return (EFI_OUT_OF_RESOURCES);
2145 }
2146 CurrentItemPackage->OriginalPosition = Count++;
2147 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2148 } else {
2149 //
2150 // this was a non-recognised flag... error!
2151 //
2152 if (ProblemParam != NULL) {
2153 *ProblemParam = AllocateCopyPool(StrSize(Argv[LoopCounter]), Argv[LoopCounter]);
2154 }
2155 ShellCommandLineFreeVarList(*CheckPackage);
2156 *CheckPackage = NULL;
2157 return (EFI_VOLUME_CORRUPTED);
2158 }
2159 }
2160 if (GetItemValue != 0) {
2161 GetItemValue = 0;
2162 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2163 }
2164 //
2165 // support for AutoPageBreak
2166 //
2167 if (AutoPageBreak && ShellCommandLineGetFlag(*CheckPackage, L"-b")) {
2168 ShellSetPageBreakMode(TRUE);
2169 }
2170 return (EFI_SUCCESS);
2171 }
2172
2173 /**
2174 Checks the command line arguments passed against the list of valid ones.
2175 Optionally removes NULL values first.
2176
2177 If no initialization is required, then return RETURN_SUCCESS.
2178
2179 @param[in] CheckList The pointer to list of parameters to check.
2180 @param[out] CheckPackage The package of checked values.
2181 @param[out] ProblemParam Optional pointer to pointer to unicode string for
2182 the paramater that caused failure.
2183 @param[in] AutoPageBreak Will automatically set PageBreakEnabled.
2184 @param[in] AlwaysAllowNumbers Will never fail for number based flags.
2185
2186 @retval EFI_SUCCESS The operation completed sucessfully.
2187 @retval EFI_OUT_OF_RESOURCES A memory allocation failed.
2188 @retval EFI_INVALID_PARAMETER A parameter was invalid.
2189 @retval EFI_VOLUME_CORRUPTED The command line was corrupt.
2190 @retval EFI_DEVICE_ERROR The commands contained 2 opposing arguments. One
2191 of the command line arguments was returned in
2192 ProblemParam if provided.
2193 @retval EFI_NOT_FOUND A argument required a value that was missing.
2194 The invalid command line argument was returned in
2195 ProblemParam if provided.
2196 **/
2197 EFI_STATUS
2198 EFIAPI
2199 ShellCommandLineParseEx (
2200 IN CONST SHELL_PARAM_ITEM *CheckList,
2201 OUT LIST_ENTRY **CheckPackage,
2202 OUT CHAR16 **ProblemParam OPTIONAL,
2203 IN BOOLEAN AutoPageBreak,
2204 IN BOOLEAN AlwaysAllowNumbers
2205 )
2206 {
2207 //
2208 // ASSERT that CheckList and CheckPackage aren't NULL
2209 //
2210 ASSERT(CheckList != NULL);
2211 ASSERT(CheckPackage != NULL);
2212
2213 //
2214 // Check for UEFI Shell 2.0 protocols
2215 //
2216 if (gEfiShellParametersProtocol != NULL) {
2217 return (InternalCommandLineParse(CheckList,
2218 CheckPackage,
2219 ProblemParam,
2220 AutoPageBreak,
2221 (CONST CHAR16**) gEfiShellParametersProtocol->Argv,
2222 gEfiShellParametersProtocol->Argc,
2223 AlwaysAllowNumbers));
2224 }
2225
2226 //
2227 // ASSERT That EFI Shell is not required
2228 //
2229 ASSERT (mEfiShellInterface != NULL);
2230 return (InternalCommandLineParse(CheckList,
2231 CheckPackage,
2232 ProblemParam,
2233 AutoPageBreak,
2234 (CONST CHAR16**) mEfiShellInterface->Argv,
2235 mEfiShellInterface->Argc,
2236 AlwaysAllowNumbers));
2237 }
2238
2239 /**
2240 Frees shell variable list that was returned from ShellCommandLineParse.
2241
2242 This function will free all the memory that was used for the CheckPackage
2243 list of postprocessed shell arguments.
2244
2245 this function has no return value.
2246
2247 if CheckPackage is NULL, then return
2248
2249 @param CheckPackage the list to de-allocate
2250 **/
2251 VOID
2252 EFIAPI
2253 ShellCommandLineFreeVarList (
2254 IN LIST_ENTRY *CheckPackage
2255 )
2256 {
2257 LIST_ENTRY *Node;
2258
2259 //
2260 // check for CheckPackage == NULL
2261 //
2262 if (CheckPackage == NULL) {
2263 return;
2264 }
2265
2266 //
2267 // for each node in the list
2268 //
2269 for ( Node = GetFirstNode(CheckPackage)
2270 ; !IsListEmpty(CheckPackage)
2271 ; Node = GetFirstNode(CheckPackage)
2272 ){
2273 //
2274 // Remove it from the list
2275 //
2276 RemoveEntryList(Node);
2277
2278 //
2279 // if it has a name free the name
2280 //
2281 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
2282 FreePool(((SHELL_PARAM_PACKAGE*)Node)->Name);
2283 }
2284
2285 //
2286 // if it has a value free the value
2287 //
2288 if (((SHELL_PARAM_PACKAGE*)Node)->Value != NULL) {
2289 FreePool(((SHELL_PARAM_PACKAGE*)Node)->Value);
2290 }
2291
2292 //
2293 // free the node structure
2294 //
2295 FreePool((SHELL_PARAM_PACKAGE*)Node);
2296 }
2297 //
2298 // free the list head node
2299 //
2300 FreePool(CheckPackage);
2301 }
2302 /**
2303 Checks for presence of a flag parameter
2304
2305 flag arguments are in the form of "-<Key>" or "/<Key>", but do not have a value following the key
2306
2307 if CheckPackage is NULL then return FALSE.
2308 if KeyString is NULL then ASSERT()
2309
2310 @param CheckPackage The package of parsed command line arguments
2311 @param KeyString the Key of the command line argument to check for
2312
2313 @retval TRUE the flag is on the command line
2314 @retval FALSE the flag is not on the command line
2315 **/
2316 BOOLEAN
2317 EFIAPI
2318 ShellCommandLineGetFlag (
2319 IN CONST LIST_ENTRY * CONST CheckPackage,
2320 IN CONST CHAR16 * CONST KeyString
2321 )
2322 {
2323 LIST_ENTRY *Node;
2324 CHAR16 *TempString;
2325
2326 //
2327 // return FALSE for no package or KeyString is NULL
2328 //
2329 if (CheckPackage == NULL || KeyString == NULL) {
2330 return (FALSE);
2331 }
2332
2333 //
2334 // enumerate through the list of parametrs
2335 //
2336 for ( Node = GetFirstNode(CheckPackage)
2337 ; !IsNull (CheckPackage, Node)
2338 ; Node = GetNextNode(CheckPackage, Node)
2339 ){
2340 //
2341 // If the Name matches, return TRUE (and there may be NULL name)
2342 //
2343 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
2344 //
2345 // If Type is TypeStart then only compare the begining of the strings
2346 //
2347 if (((SHELL_PARAM_PACKAGE*)Node)->Type == TypeStart) {
2348 if (StrnCmp(KeyString, ((SHELL_PARAM_PACKAGE*)Node)->Name, StrLen(KeyString)) == 0) {
2349 return (TRUE);
2350 }
2351 TempString = NULL;
2352 TempString = StrnCatGrow(&TempString, NULL, KeyString, StrLen(((SHELL_PARAM_PACKAGE*)Node)->Name));
2353 if (TempString != NULL) {
2354 if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2355 FreePool(TempString);
2356 return (TRUE);
2357 }
2358 FreePool(TempString);
2359 }
2360 } else if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2361 return (TRUE);
2362 }
2363 }
2364 }
2365 return (FALSE);
2366 }
2367 /**
2368 Returns value from command line argument.
2369
2370 Value parameters are in the form of "-<Key> value" or "/<Key> value".
2371
2372 If CheckPackage is NULL, then return NULL.
2373
2374 @param[in] CheckPackage The package of parsed command line arguments.
2375 @param[in] KeyString The Key of the command line argument to check for.
2376
2377 @retval NULL The flag is not on the command line.
2378 @retval !=NULL The pointer to unicode string of the value.
2379 **/
2380 CONST CHAR16*
2381 EFIAPI
2382 ShellCommandLineGetValue (
2383 IN CONST LIST_ENTRY *CheckPackage,
2384 IN CHAR16 *KeyString
2385 )
2386 {
2387 LIST_ENTRY *Node;
2388 CHAR16 *TempString;
2389
2390 //
2391 // return NULL for no package or KeyString is NULL
2392 //
2393 if (CheckPackage == NULL || KeyString == NULL) {
2394 return (NULL);
2395 }
2396
2397 //
2398 // enumerate through the list of parametrs
2399 //
2400 for ( Node = GetFirstNode(CheckPackage)
2401 ; !IsNull (CheckPackage, Node)
2402 ; Node = GetNextNode(CheckPackage, Node)
2403 ){
2404 //
2405 // If the Name matches, return TRUE (and there may be NULL name)
2406 //
2407 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
2408 //
2409 // If Type is TypeStart then only compare the begining of the strings
2410 //
2411 if (((SHELL_PARAM_PACKAGE*)Node)->Type == TypeStart) {
2412 if (StrnCmp(KeyString, ((SHELL_PARAM_PACKAGE*)Node)->Name, StrLen(KeyString)) == 0) {
2413 return (((SHELL_PARAM_PACKAGE*)Node)->Name + StrLen(KeyString));
2414 }
2415 TempString = NULL;
2416 TempString = StrnCatGrow(&TempString, NULL, KeyString, StrLen(((SHELL_PARAM_PACKAGE*)Node)->Name));
2417 if (TempString != NULL) {
2418 if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2419 FreePool(TempString);
2420 return (((SHELL_PARAM_PACKAGE*)Node)->Name + StrLen(KeyString));
2421 }
2422 FreePool(TempString);
2423 }
2424 } else if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2425 return (((SHELL_PARAM_PACKAGE*)Node)->Value);
2426 }
2427 }
2428 }
2429 return (NULL);
2430 }
2431
2432 /**
2433 Returns raw value from command line argument.
2434
2435 Raw value parameters are in the form of "value" in a specific position in the list.
2436
2437 If CheckPackage is NULL, then return NULL.
2438
2439 @param[in] CheckPackage The package of parsed command line arguments.
2440 @param[in] Position The position of the value.
2441
2442 @retval NULL The flag is not on the command line.
2443 @retval !=NULL The pointer to unicode string of the value.
2444 **/
2445 CONST CHAR16*
2446 EFIAPI
2447 ShellCommandLineGetRawValue (
2448 IN CONST LIST_ENTRY * CONST CheckPackage,
2449 IN UINTN Position
2450 )
2451 {
2452 LIST_ENTRY *Node;
2453
2454 //
2455 // check for CheckPackage == NULL
2456 //
2457 if (CheckPackage == NULL) {
2458 return (NULL);
2459 }
2460
2461 //
2462 // enumerate through the list of parametrs
2463 //
2464 for ( Node = GetFirstNode(CheckPackage)
2465 ; !IsNull (CheckPackage, Node)
2466 ; Node = GetNextNode(CheckPackage, Node)
2467 ){
2468 //
2469 // If the position matches, return the value
2470 //
2471 if (((SHELL_PARAM_PACKAGE*)Node)->OriginalPosition == Position) {
2472 return (((SHELL_PARAM_PACKAGE*)Node)->Value);
2473 }
2474 }
2475 return (NULL);
2476 }
2477
2478 /**
2479 returns the number of command line value parameters that were parsed.
2480
2481 this will not include flags.
2482
2483 @param[in] CheckPackage The package of parsed command line arguments.
2484
2485 @retval (UINTN)-1 No parsing has ocurred
2486 @return other The number of value parameters found
2487 **/
2488 UINTN
2489 EFIAPI
2490 ShellCommandLineGetCount(
2491 IN CONST LIST_ENTRY *CheckPackage
2492 )
2493 {
2494 LIST_ENTRY *Node1;
2495 UINTN Count;
2496
2497 if (CheckPackage == NULL) {
2498 return (0);
2499 }
2500 for ( Node1 = GetFirstNode(CheckPackage), Count = 0
2501 ; !IsNull (CheckPackage, Node1)
2502 ; Node1 = GetNextNode(CheckPackage, Node1)
2503 ){
2504 if (((SHELL_PARAM_PACKAGE*)Node1)->Name == NULL) {
2505 Count++;
2506 }
2507 }
2508 return (Count);
2509 }
2510
2511 /**
2512 Determins if a parameter is duplicated.
2513
2514 If Param is not NULL then it will point to a callee allocated string buffer
2515 with the parameter value if a duplicate is found.
2516
2517 If CheckPackage is NULL, then ASSERT.
2518
2519 @param[in] CheckPackage The package of parsed command line arguments.
2520 @param[out] Param Upon finding one, a pointer to the duplicated parameter.
2521
2522 @retval EFI_SUCCESS No parameters were duplicated.
2523 @retval EFI_DEVICE_ERROR A duplicate was found.
2524 **/
2525 EFI_STATUS
2526 EFIAPI
2527 ShellCommandLineCheckDuplicate (
2528 IN CONST LIST_ENTRY *CheckPackage,
2529 OUT CHAR16 **Param
2530 )
2531 {
2532 LIST_ENTRY *Node1;
2533 LIST_ENTRY *Node2;
2534
2535 ASSERT(CheckPackage != NULL);
2536
2537 for ( Node1 = GetFirstNode(CheckPackage)
2538 ; !IsNull (CheckPackage, Node1)
2539 ; Node1 = GetNextNode(CheckPackage, Node1)
2540 ){
2541 for ( Node2 = GetNextNode(CheckPackage, Node1)
2542 ; !IsNull (CheckPackage, Node2)
2543 ; Node2 = GetNextNode(CheckPackage, Node2)
2544 ){
2545 if ((((SHELL_PARAM_PACKAGE*)Node1)->Name != NULL) && (((SHELL_PARAM_PACKAGE*)Node2)->Name != NULL) && StrCmp(((SHELL_PARAM_PACKAGE*)Node1)->Name, ((SHELL_PARAM_PACKAGE*)Node2)->Name) == 0) {
2546 if (Param != NULL) {
2547 *Param = NULL;
2548 *Param = StrnCatGrow(Param, NULL, ((SHELL_PARAM_PACKAGE*)Node1)->Name, 0);
2549 }
2550 return (EFI_DEVICE_ERROR);
2551 }
2552 }
2553 }
2554 return (EFI_SUCCESS);
2555 }
2556
2557 /**
2558 This is a find and replace function. Upon successful return the NewString is a copy of
2559 SourceString with each instance of FindTarget replaced with ReplaceWith.
2560
2561 If SourceString and NewString overlap the behavior is undefined.
2562
2563 If the string would grow bigger than NewSize it will halt and return error.
2564
2565 @param[in] SourceString The string with source buffer.
2566 @param[in, out] NewString The string with resultant buffer.
2567 @param[in] NewSize The size in bytes of NewString.
2568 @param[in] FindTarget The string to look for.
2569 @param[in] ReplaceWith The string to replace FindTarget with.
2570 @param[in] SkipPreCarrot If TRUE will skip a FindTarget that has a '^'
2571 immediately before it.
2572 @param[in] ParameterReplacing If TRUE will add "" around items with spaces.
2573
2574 @retval EFI_INVALID_PARAMETER SourceString was NULL.
2575 @retval EFI_INVALID_PARAMETER NewString was NULL.
2576 @retval EFI_INVALID_PARAMETER FindTarget was NULL.
2577 @retval EFI_INVALID_PARAMETER ReplaceWith was NULL.
2578 @retval EFI_INVALID_PARAMETER FindTarget had length < 1.
2579 @retval EFI_INVALID_PARAMETER SourceString had length < 1.
2580 @retval EFI_BUFFER_TOO_SMALL NewSize was less than the minimum size to hold
2581 the new string (truncation occurred).
2582 @retval EFI_SUCCESS The string was successfully copied with replacement.
2583 **/
2584 EFI_STATUS
2585 EFIAPI
2586 ShellCopySearchAndReplace(
2587 IN CHAR16 CONST *SourceString,
2588 IN OUT CHAR16 *NewString,
2589 IN UINTN NewSize,
2590 IN CONST CHAR16 *FindTarget,
2591 IN CONST CHAR16 *ReplaceWith,
2592 IN CONST BOOLEAN SkipPreCarrot,
2593 IN CONST BOOLEAN ParameterReplacing
2594 )
2595 {
2596 UINTN Size;
2597 CHAR16 *Replace;
2598
2599 if ( (SourceString == NULL)
2600 || (NewString == NULL)
2601 || (FindTarget == NULL)
2602 || (ReplaceWith == NULL)
2603 || (StrLen(FindTarget) < 1)
2604 || (StrLen(SourceString) < 1)
2605 ){
2606 return (EFI_INVALID_PARAMETER);
2607 }
2608 Replace = NULL;
2609 if (StrStr(ReplaceWith, L" ") == NULL || !ParameterReplacing) {
2610 Replace = StrnCatGrow(&Replace, NULL, ReplaceWith, 0);
2611 } else {
2612 Replace = AllocateZeroPool(StrSize(ReplaceWith) + 2*sizeof(CHAR16));
2613 if (Replace != NULL) {
2614 UnicodeSPrint(Replace, StrSize(ReplaceWith) + 2*sizeof(CHAR16), L"\"%s\"", ReplaceWith);
2615 }
2616 }
2617 if (Replace == NULL) {
2618 return (EFI_OUT_OF_RESOURCES);
2619 }
2620 NewString = ZeroMem(NewString, NewSize);
2621 while (*SourceString != CHAR_NULL) {
2622 //
2623 // if we find the FindTarget and either Skip == FALSE or Skip and we
2624 // dont have a carrot do a replace...
2625 //
2626 if (StrnCmp(SourceString, FindTarget, StrLen(FindTarget)) == 0
2627 && ((SkipPreCarrot && *(SourceString-1) != L'^') || !SkipPreCarrot)
2628 ){
2629 SourceString += StrLen(FindTarget);
2630 Size = StrSize(NewString);
2631 if ((Size + (StrLen(Replace)*sizeof(CHAR16))) > NewSize) {
2632 FreePool(Replace);
2633 return (EFI_BUFFER_TOO_SMALL);
2634 }
2635 StrnCat(NewString, Replace, NewSize/sizeof(CHAR16) - 1 - StrLen(NewString));
2636 } else {
2637 Size = StrSize(NewString);
2638 if (Size + sizeof(CHAR16) > NewSize) {
2639 FreePool(Replace);
2640 return (EFI_BUFFER_TOO_SMALL);
2641 }
2642 StrnCat(NewString, SourceString, 1);
2643 SourceString++;
2644 }
2645 }
2646 FreePool(Replace);
2647 return (EFI_SUCCESS);
2648 }
2649
2650 /**
2651 Internal worker function to output a string.
2652
2653 This function will output a string to the correct StdOut.
2654
2655 @param[in] String The string to print out.
2656
2657 @retval EFI_SUCCESS The operation was sucessful.
2658 @retval !EFI_SUCCESS The operation failed.
2659 **/
2660 EFI_STATUS
2661 EFIAPI
2662 InternalPrintTo (
2663 IN CONST CHAR16 *String
2664 )
2665 {
2666 UINTN Size;
2667 Size = StrSize(String) - sizeof(CHAR16);
2668 if (Size == 0) {
2669 return (EFI_SUCCESS);
2670 }
2671 if (gEfiShellParametersProtocol != NULL) {
2672 return (gEfiShellProtocol->WriteFile(gEfiShellParametersProtocol->StdOut, &Size, (VOID*)String));
2673 }
2674 if (mEfiShellInterface != NULL) {
2675 if (mEfiShellInterface->RedirArgc == 0) {
2676 //
2677 // Divide in half for old shell. Must be string length not size.
2678 //
2679 Size /=2; // Divide in half only when no redirection.
2680 }
2681 return (mEfiShellInterface->StdOut->Write(mEfiShellInterface->StdOut, &Size, (VOID*)String));
2682 }
2683 ASSERT(FALSE);
2684 return (EFI_UNSUPPORTED);
2685 }
2686
2687 /**
2688 Print at a specific location on the screen.
2689
2690 This function will move the cursor to a given screen location and print the specified string
2691
2692 If -1 is specified for either the Row or Col the current screen location for BOTH
2693 will be used.
2694
2695 if either Row or Col is out of range for the current console, then ASSERT
2696 if Format is NULL, then ASSERT
2697
2698 In addition to the standard %-based flags as supported by UefiLib Print() this supports
2699 the following additional flags:
2700 %N - Set output attribute to normal
2701 %H - Set output attribute to highlight
2702 %E - Set output attribute to error
2703 %B - Set output attribute to blue color
2704 %V - Set output attribute to green color
2705
2706 Note: The background color is controlled by the shell command cls.
2707
2708 @param[in] Col the column to print at
2709 @param[in] Row the row to print at
2710 @param[in] Format the format string
2711 @param[in] Marker the marker for the variable argument list
2712
2713 @return EFI_SUCCESS The operation was successful.
2714 @return EFI_DEVICE_ERROR The console device reported an error.
2715 **/
2716 EFI_STATUS
2717 EFIAPI
2718 InternalShellPrintWorker(
2719 IN INT32 Col OPTIONAL,
2720 IN INT32 Row OPTIONAL,
2721 IN CONST CHAR16 *Format,
2722 IN VA_LIST Marker
2723 )
2724 {
2725 EFI_STATUS Status;
2726 CHAR16 *ResumeLocation;
2727 CHAR16 *FormatWalker;
2728 UINTN OriginalAttribute;
2729 CHAR16 *mPostReplaceFormat;
2730 CHAR16 *mPostReplaceFormat2;
2731
2732 mPostReplaceFormat = AllocateZeroPool (PcdGet16 (PcdShellPrintBufferSize));
2733 mPostReplaceFormat2 = AllocateZeroPool (PcdGet16 (PcdShellPrintBufferSize));
2734
2735 if (mPostReplaceFormat == NULL || mPostReplaceFormat2 == NULL) {
2736 SHELL_FREE_NON_NULL(mPostReplaceFormat);
2737 SHELL_FREE_NON_NULL(mPostReplaceFormat2);
2738 return (EFI_OUT_OF_RESOURCES);
2739 }
2740
2741 Status = EFI_SUCCESS;
2742 OriginalAttribute = gST->ConOut->Mode->Attribute;
2743
2744 //
2745 // Back and forth each time fixing up 1 of our flags...
2746 //
2747 Status = ShellCopySearchAndReplace(Format, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%N", L"%%N", FALSE, FALSE);
2748 ASSERT_EFI_ERROR(Status);
2749 Status = ShellCopySearchAndReplace(mPostReplaceFormat, mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), L"%E", L"%%E", FALSE, FALSE);
2750 ASSERT_EFI_ERROR(Status);
2751 Status = ShellCopySearchAndReplace(mPostReplaceFormat2, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%H", L"%%H", FALSE, FALSE);
2752 ASSERT_EFI_ERROR(Status);
2753 Status = ShellCopySearchAndReplace(mPostReplaceFormat, mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), L"%B", L"%%B", FALSE, FALSE);
2754 ASSERT_EFI_ERROR(Status);
2755 Status = ShellCopySearchAndReplace(mPostReplaceFormat2, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%V", L"%%V", FALSE, FALSE);
2756 ASSERT_EFI_ERROR(Status);
2757
2758 //
2759 // Use the last buffer from replacing to print from...
2760 //
2761 UnicodeVSPrint (mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), mPostReplaceFormat, Marker);
2762
2763 if (Col != -1 && Row != -1) {
2764 Status = gST->ConOut->SetCursorPosition(gST->ConOut, Col, Row);
2765 }
2766
2767 FormatWalker = mPostReplaceFormat2;
2768 while (*FormatWalker != CHAR_NULL) {
2769 //
2770 // Find the next attribute change request
2771 //
2772 ResumeLocation = StrStr(FormatWalker, L"%");
2773 if (ResumeLocation != NULL) {
2774 *ResumeLocation = CHAR_NULL;
2775 }
2776 //
2777 // print the current FormatWalker string
2778 //
2779 if (StrLen(FormatWalker)>0) {
2780 Status = InternalPrintTo(FormatWalker);
2781 if (EFI_ERROR(Status)) {
2782 break;
2783 }
2784 }
2785
2786 //
2787 // update the attribute
2788 //
2789 if (ResumeLocation != NULL) {
2790 if (*(ResumeLocation-1) == L'^') {
2791 //
2792 // Move cursor back 1 position to overwrite the ^
2793 //
2794 gST->ConOut->SetCursorPosition(gST->ConOut, gST->ConOut->Mode->CursorColumn - 1, gST->ConOut->Mode->CursorRow);
2795
2796 //
2797 // Print a simple '%' symbol
2798 //
2799 Status = InternalPrintTo(L"%");
2800 ResumeLocation = ResumeLocation - 1;
2801 } else {
2802 switch (*(ResumeLocation+1)) {
2803 case (L'N'):
2804 gST->ConOut->SetAttribute(gST->ConOut, OriginalAttribute);
2805 break;
2806 case (L'E'):
2807 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_YELLOW, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2808 break;
2809 case (L'H'):
2810 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_WHITE, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2811 break;
2812 case (L'B'):
2813 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_BLUE, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2814 break;
2815 case (L'V'):
2816 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_GREEN, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2817 break;
2818 default:
2819 //
2820 // Print a simple '%' symbol
2821 //
2822 Status = InternalPrintTo(L"%");
2823 if (EFI_ERROR(Status)) {
2824 break;
2825 }
2826 ResumeLocation = ResumeLocation - 1;
2827 break;
2828 }
2829 }
2830 } else {
2831 //
2832 // reset to normal now...
2833 //
2834 break;
2835 }
2836
2837 //
2838 // update FormatWalker to Resume + 2 (skip the % and the indicator)
2839 //
2840 FormatWalker = ResumeLocation + 2;
2841 }
2842
2843 gST->ConOut->SetAttribute(gST->ConOut, OriginalAttribute);
2844
2845 SHELL_FREE_NON_NULL(mPostReplaceFormat);
2846 SHELL_FREE_NON_NULL(mPostReplaceFormat2);
2847 return (Status);
2848 }
2849
2850 /**
2851 Print at a specific location on the screen.
2852
2853 This function will move the cursor to a given screen location and print the specified string.
2854
2855 If -1 is specified for either the Row or Col the current screen location for BOTH
2856 will be used.
2857
2858 If either Row or Col is out of range for the current console, then ASSERT.
2859 If Format is NULL, then ASSERT.
2860
2861 In addition to the standard %-based flags as supported by UefiLib Print() this supports
2862 the following additional flags:
2863 %N - Set output attribute to normal
2864 %H - Set output attribute to highlight
2865 %E - Set output attribute to error
2866 %B - Set output attribute to blue color
2867 %V - Set output attribute to green color
2868
2869 Note: The background color is controlled by the shell command cls.
2870
2871 @param[in] Col the column to print at
2872 @param[in] Row the row to print at
2873 @param[in] Format the format string
2874 @param[in] ... The variable argument list.
2875
2876 @return EFI_SUCCESS The printing was successful.
2877 @return EFI_DEVICE_ERROR The console device reported an error.
2878 **/
2879 EFI_STATUS
2880 EFIAPI
2881 ShellPrintEx(
2882 IN INT32 Col OPTIONAL,
2883 IN INT32 Row OPTIONAL,
2884 IN CONST CHAR16 *Format,
2885 ...
2886 )
2887 {
2888 VA_LIST Marker;
2889 EFI_STATUS RetVal;
2890 if (Format == NULL) {
2891 return (EFI_INVALID_PARAMETER);
2892 }
2893 VA_START (Marker, Format);
2894 RetVal = InternalShellPrintWorker(Col, Row, Format, Marker);
2895 VA_END(Marker);
2896 return(RetVal);
2897 }
2898
2899 /**
2900 Print at a specific location on the screen.
2901
2902 This function will move the cursor to a given screen location and print the specified string.
2903
2904 If -1 is specified for either the Row or Col the current screen location for BOTH
2905 will be used.
2906
2907 If either Row or Col is out of range for the current console, then ASSERT.
2908 If Format is NULL, then ASSERT.
2909
2910 In addition to the standard %-based flags as supported by UefiLib Print() this supports
2911 the following additional flags:
2912 %N - Set output attribute to normal.
2913 %H - Set output attribute to highlight.
2914 %E - Set output attribute to error.
2915 %B - Set output attribute to blue color.
2916 %V - Set output attribute to green color.
2917
2918 Note: The background color is controlled by the shell command cls.
2919
2920 @param[in] Col The column to print at.
2921 @param[in] Row The row to print at.
2922 @param[in] Language The language of the string to retrieve. If this parameter
2923 is NULL, then the current platform language is used.
2924 @param[in] HiiFormatStringId The format string Id for getting from Hii.
2925 @param[in] HiiFormatHandle The format string Handle for getting from Hii.
2926 @param[in] ... The variable argument list.
2927
2928 @return EFI_SUCCESS The printing was successful.
2929 @return EFI_DEVICE_ERROR The console device reported an error.
2930 **/
2931 EFI_STATUS
2932 EFIAPI
2933 ShellPrintHiiEx(
2934 IN INT32 Col OPTIONAL,
2935 IN INT32 Row OPTIONAL,
2936 IN CONST CHAR8 *Language OPTIONAL,
2937 IN CONST EFI_STRING_ID HiiFormatStringId,
2938 IN CONST EFI_HANDLE HiiFormatHandle,
2939 ...
2940 )
2941 {
2942 VA_LIST Marker;
2943 CHAR16 *HiiFormatString;
2944 EFI_STATUS RetVal;
2945
2946 VA_START (Marker, HiiFormatHandle);
2947 HiiFormatString = HiiGetString(HiiFormatHandle, HiiFormatStringId, Language);
2948 ASSERT(HiiFormatString != NULL);
2949
2950 RetVal = InternalShellPrintWorker(Col, Row, HiiFormatString, Marker);
2951
2952 SHELL_FREE_NON_NULL(HiiFormatString);
2953 VA_END(Marker);
2954
2955 return (RetVal);
2956 }
2957
2958 /**
2959 Function to determine if a given filename represents a file or a directory.
2960
2961 @param[in] DirName Path to directory to test.
2962
2963 @retval EFI_SUCCESS The Path represents a directory
2964 @retval EFI_NOT_FOUND The Path does not represent a directory
2965 @retval EFI_OUT_OF_RESOURCES A memory allocation failed.
2966 @return The path failed to open
2967 **/
2968 EFI_STATUS
2969 EFIAPI
2970 ShellIsDirectory(
2971 IN CONST CHAR16 *DirName
2972 )
2973 {
2974 EFI_STATUS Status;
2975 SHELL_FILE_HANDLE Handle;
2976 CHAR16 *TempLocation;
2977 CHAR16 *TempLocation2;
2978
2979 ASSERT(DirName != NULL);
2980
2981 Handle = NULL;
2982 TempLocation = NULL;
2983
2984 Status = ShellOpenFileByName(DirName, &Handle, EFI_FILE_MODE_READ, 0);
2985 if (EFI_ERROR(Status)) {
2986 //
2987 // try good logic first.
2988 //
2989 if (gEfiShellProtocol != NULL) {
2990 TempLocation = StrnCatGrow(&TempLocation, NULL, DirName, 0);
2991 if (TempLocation == NULL) {
2992 ShellCloseFile(&Handle);
2993 return (EFI_OUT_OF_RESOURCES);
2994 }
2995 TempLocation2 = StrStr(TempLocation, L":");
2996 if (TempLocation2 != NULL && StrLen(StrStr(TempLocation, L":")) == 2) {
2997 *(TempLocation2+1) = CHAR_NULL;
2998 }
2999 if (gEfiShellProtocol->GetDevicePathFromMap(TempLocation) != NULL) {
3000 FreePool(TempLocation);
3001 return (EFI_SUCCESS);
3002 }
3003 FreePool(TempLocation);
3004 } else {
3005 //
3006 // probably a map name?!?!!?
3007 //
3008 TempLocation = StrStr(DirName, L"\\");
3009 if (TempLocation != NULL && *(TempLocation+1) == CHAR_NULL) {
3010 return (EFI_SUCCESS);
3011 }
3012 }
3013 return (Status);
3014 }
3015
3016 if (FileHandleIsDirectory(Handle) == EFI_SUCCESS) {
3017 ShellCloseFile(&Handle);
3018 return (EFI_SUCCESS);
3019 }
3020 ShellCloseFile(&Handle);
3021 return (EFI_NOT_FOUND);
3022 }
3023
3024 /**
3025 Function to determine if a given filename represents a file.
3026
3027 @param[in] Name Path to file to test.
3028
3029 @retval EFI_SUCCESS The Path represents a file.
3030 @retval EFI_NOT_FOUND The Path does not represent a file.
3031 @retval other The path failed to open.
3032 **/
3033 EFI_STATUS
3034 EFIAPI
3035 ShellIsFile(
3036 IN CONST CHAR16 *Name
3037 )
3038 {
3039 EFI_STATUS Status;
3040 SHELL_FILE_HANDLE Handle;
3041
3042 ASSERT(Name != NULL);
3043
3044 Handle = NULL;
3045
3046 Status = ShellOpenFileByName(Name, &Handle, EFI_FILE_MODE_READ, 0);
3047 if (EFI_ERROR(Status)) {
3048 return (Status);
3049 }
3050
3051 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
3052 ShellCloseFile(&Handle);
3053 return (EFI_SUCCESS);
3054 }
3055 ShellCloseFile(&Handle);
3056 return (EFI_NOT_FOUND);
3057 }
3058
3059 /**
3060 Function to determine if a given filename represents a file.
3061
3062 This will search the CWD and then the Path.
3063
3064 If Name is NULL, then ASSERT.
3065
3066 @param[in] Name Path to file to test.
3067
3068 @retval EFI_SUCCESS The Path represents a file.
3069 @retval EFI_NOT_FOUND The Path does not represent a file.
3070 @retval other The path failed to open.
3071 **/
3072 EFI_STATUS
3073 EFIAPI
3074 ShellIsFileInPath(
3075 IN CONST CHAR16 *Name
3076 )
3077 {
3078 CHAR16 *NewName;
3079 EFI_STATUS Status;
3080
3081 if (!EFI_ERROR(ShellIsFile(Name))) {
3082 return (EFI_SUCCESS);
3083 }
3084
3085 NewName = ShellFindFilePath(Name);
3086 if (NewName == NULL) {
3087 return (EFI_NOT_FOUND);
3088 }
3089 Status = ShellIsFile(NewName);
3090 FreePool(NewName);
3091 return (Status);
3092 }
3093
3094 /**
3095 Function return the number converted from a hex representation of a number.
3096
3097 Note: this function cannot be used when (UINTN)(-1), (0xFFFFFFFF) may be a valid
3098 result. Use ShellConvertStringToUint64 instead.
3099
3100 @param[in] String String representation of a number.
3101
3102 @return The unsigned integer result of the conversion.
3103 @retval (UINTN)(-1) An error occured.
3104 **/
3105 UINTN
3106 EFIAPI
3107 ShellHexStrToUintn(
3108 IN CONST CHAR16 *String
3109 )
3110 {
3111 UINT64 RetVal;
3112
3113 if (!EFI_ERROR(ShellConvertStringToUint64(String, &RetVal, TRUE, TRUE))) {
3114 return ((UINTN)RetVal);
3115 }
3116
3117 return ((UINTN)(-1));
3118 }
3119
3120 /**
3121 Function to determine whether a string is decimal or hex representation of a number
3122 and return the number converted from the string. Spaces are always skipped.
3123
3124 @param[in] String String representation of a number
3125
3126 @return the number
3127 @retval (UINTN)(-1) An error ocurred.
3128 **/
3129 UINTN
3130 EFIAPI
3131 ShellStrToUintn(
3132 IN CONST CHAR16 *String
3133 )
3134 {
3135 UINT64 RetVal;
3136 BOOLEAN Hex;
3137
3138 Hex = FALSE;
3139
3140 if (!InternalShellIsHexOrDecimalNumber(String, Hex, TRUE, FALSE)) {
3141 Hex = TRUE;
3142 }
3143
3144 if (!EFI_ERROR(ShellConvertStringToUint64(String, &RetVal, Hex, TRUE))) {
3145 return ((UINTN)RetVal);
3146 }
3147 return ((UINTN)(-1));
3148 }
3149
3150 /**
3151 Safely append with automatic string resizing given length of Destination and
3152 desired length of copy from Source.
3153
3154 append the first D characters of Source to the end of Destination, where D is
3155 the lesser of Count and the StrLen() of Source. If appending those D characters
3156 will fit within Destination (whose Size is given as CurrentSize) and
3157 still leave room for a NULL terminator, then those characters are appended,
3158 starting at the original terminating NULL of Destination, and a new terminating
3159 NULL is appended.
3160
3161 If appending D characters onto Destination will result in a overflow of the size
3162 given in CurrentSize the string will be grown such that the copy can be performed
3163 and CurrentSize will be updated to the new size.
3164
3165 If Source is NULL, there is nothing to append, just return the current buffer in
3166 Destination.
3167
3168 if Destination is NULL, then ASSERT()
3169 if Destination's current length (including NULL terminator) is already more then
3170 CurrentSize, then ASSERT()
3171
3172 @param[in, out] Destination The String to append onto
3173 @param[in, out] CurrentSize on call the number of bytes in Destination. On
3174 return possibly the new size (still in bytes). if NULL
3175 then allocate whatever is needed.
3176 @param[in] Source The String to append from
3177 @param[in] Count Maximum number of characters to append. if 0 then
3178 all are appended.
3179
3180 @return Destination return the resultant string.
3181 **/
3182 CHAR16*
3183 EFIAPI
3184 StrnCatGrow (
3185 IN OUT CHAR16 **Destination,
3186 IN OUT UINTN *CurrentSize,
3187 IN CONST CHAR16 *Source,
3188 IN UINTN Count
3189 )
3190 {
3191 UINTN DestinationStartSize;
3192 UINTN NewSize;
3193
3194 //
3195 // ASSERTs
3196 //
3197 ASSERT(Destination != NULL);
3198
3199 //
3200 // If there's nothing to do then just return Destination
3201 //
3202 if (Source == NULL) {
3203 return (*Destination);
3204 }
3205
3206 //
3207 // allow for un-initialized pointers, based on size being 0
3208 //
3209 if (CurrentSize != NULL && *CurrentSize == 0) {
3210 *Destination = NULL;
3211 }
3212
3213 //
3214 // allow for NULL pointers address as Destination
3215 //
3216 if (*Destination != NULL) {
3217 ASSERT(CurrentSize != 0);
3218 DestinationStartSize = StrSize(*Destination);
3219 ASSERT(DestinationStartSize <= *CurrentSize);
3220 } else {
3221 DestinationStartSize = 0;
3222 // ASSERT(*CurrentSize == 0);
3223 }
3224
3225 //
3226 // Append all of Source?
3227 //
3228 if (Count == 0) {
3229 Count = StrLen(Source);
3230 }
3231
3232 //
3233 // Test and grow if required
3234 //
3235 if (CurrentSize != NULL) {
3236 NewSize = *CurrentSize;
3237 if (NewSize < DestinationStartSize + (Count * sizeof(CHAR16))) {
3238 while (NewSize < (DestinationStartSize + (Count*sizeof(CHAR16)))) {
3239 NewSize += 2 * Count * sizeof(CHAR16);
3240 }
3241 *Destination = ReallocatePool(*CurrentSize, NewSize, *Destination);
3242 *CurrentSize = NewSize;
3243 }
3244 } else {
3245 *Destination = AllocateZeroPool((Count+1)*sizeof(CHAR16));
3246 }
3247
3248 //
3249 // Now use standard StrnCat on a big enough buffer
3250 //
3251 if (*Destination == NULL) {
3252 return (NULL);
3253 }
3254 return StrnCat(*Destination, Source, Count);
3255 }
3256
3257 /**
3258 Prompt the user and return the resultant answer to the requestor.
3259
3260 This function will display the requested question on the shell prompt and then
3261 wait for an apropriate answer to be input from the console.
3262
3263 if the SHELL_PROMPT_REQUEST_TYPE is SHELL_PROMPT_REQUEST_TYPE_YESNO, ShellPromptResponseTypeQuitContinue
3264 or SHELL_PROMPT_REQUEST_TYPE_YESNOCANCEL then *Response is of type SHELL_PROMPT_RESPONSE.
3265
3266 if the SHELL_PROMPT_REQUEST_TYPE is ShellPromptResponseTypeFreeform then *Response is of type
3267 CHAR16*.
3268
3269 In either case *Response must be callee freed if Response was not NULL;
3270
3271 @param Type What type of question is asked. This is used to filter the input
3272 to prevent invalid answers to question.
3273 @param Prompt Pointer to string prompt to use to request input.
3274 @param Response Pointer to Response which will be populated upon return.
3275
3276 @retval EFI_SUCCESS The operation was sucessful.
3277 @retval EFI_UNSUPPORTED The operation is not supported as requested.
3278 @retval EFI_INVALID_PARAMETER A parameter was invalid.
3279 @return other The operation failed.
3280 **/
3281 EFI_STATUS
3282 EFIAPI
3283 ShellPromptForResponse (
3284 IN SHELL_PROMPT_REQUEST_TYPE Type,
3285 IN CHAR16 *Prompt OPTIONAL,
3286 IN OUT VOID **Response OPTIONAL
3287 )
3288 {
3289 EFI_STATUS Status;
3290 EFI_INPUT_KEY Key;
3291 UINTN EventIndex;
3292 SHELL_PROMPT_RESPONSE *Resp;
3293 UINTN Size;
3294 CHAR16 *Buffer;
3295
3296 Status = EFI_UNSUPPORTED;
3297 Resp = NULL;
3298 Buffer = NULL;
3299 Size = 0;
3300 if (Type != ShellPromptResponseTypeFreeform) {
3301 Resp = (SHELL_PROMPT_RESPONSE*)AllocateZeroPool(sizeof(SHELL_PROMPT_RESPONSE));
3302 if (Resp == NULL) {
3303 return (EFI_OUT_OF_RESOURCES);
3304 }
3305 }
3306
3307 switch(Type) {
3308 case ShellPromptResponseTypeQuitContinue:
3309 if (Prompt != NULL) {
3310 ShellPrintEx(-1, -1, L"%s", Prompt);
3311 }
3312 //
3313 // wait for valid response
3314 //
3315 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3316 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3317 if (EFI_ERROR(Status)) {
3318 break;
3319 }
3320 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3321 if (Key.UnicodeChar == L'Q' || Key.UnicodeChar ==L'q') {
3322 *Resp = ShellPromptResponseQuit;
3323 } else {
3324 *Resp = ShellPromptResponseContinue;
3325 }
3326 break;
3327 case ShellPromptResponseTypeYesNoCancel:
3328 if (Prompt != NULL) {
3329 ShellPrintEx(-1, -1, L"%s", Prompt);
3330 }
3331 //
3332 // wait for valid response
3333 //
3334 *Resp = ShellPromptResponseMax;
3335 while (*Resp == ShellPromptResponseMax) {
3336 if (ShellGetExecutionBreakFlag()) {
3337 Status = EFI_ABORTED;
3338 break;
3339 }
3340 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3341 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3342 if (EFI_ERROR(Status)) {
3343 break;
3344 }
3345 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3346 switch (Key.UnicodeChar) {
3347 case L'Y':
3348 case L'y':
3349 *Resp = ShellPromptResponseYes;
3350 break;
3351 case L'N':
3352 case L'n':
3353 *Resp = ShellPromptResponseNo;
3354 break;
3355 case L'C':
3356 case L'c':
3357 *Resp = ShellPromptResponseCancel;
3358 break;
3359 }
3360 }
3361 break; case ShellPromptResponseTypeYesNoAllCancel:
3362 if (Prompt != NULL) {
3363 ShellPrintEx(-1, -1, L"%s", Prompt);
3364 }
3365 //
3366 // wait for valid response
3367 //
3368 *Resp = ShellPromptResponseMax;
3369 while (*Resp == ShellPromptResponseMax) {
3370 if (ShellGetExecutionBreakFlag()) {
3371 Status = EFI_ABORTED;
3372 break;
3373 }
3374 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3375 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3376 if (EFI_ERROR(Status)) {
3377 break;
3378 }
3379 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3380 switch (Key.UnicodeChar) {
3381 case L'Y':
3382 case L'y':
3383 *Resp = ShellPromptResponseYes;
3384 break;
3385 case L'N':
3386 case L'n':
3387 *Resp = ShellPromptResponseNo;
3388 break;
3389 case L'A':
3390 case L'a':
3391 *Resp = ShellPromptResponseAll;
3392 break;
3393 case L'C':
3394 case L'c':
3395 *Resp = ShellPromptResponseCancel;
3396 break;
3397 }
3398 }
3399 break;
3400 case ShellPromptResponseTypeEnterContinue:
3401 case ShellPromptResponseTypeAnyKeyContinue:
3402 if (Prompt != NULL) {
3403 ShellPrintEx(-1, -1, L"%s", Prompt);
3404 }
3405 //
3406 // wait for valid response
3407 //
3408 *Resp = ShellPromptResponseMax;
3409 while (*Resp == ShellPromptResponseMax) {
3410 if (ShellGetExecutionBreakFlag()) {
3411 Status = EFI_ABORTED;
3412 break;
3413 }
3414 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3415 if (Type == ShellPromptResponseTypeEnterContinue) {
3416 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3417 if (EFI_ERROR(Status)) {
3418 break;
3419 }
3420 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3421 if (Key.UnicodeChar == CHAR_CARRIAGE_RETURN) {
3422 *Resp = ShellPromptResponseContinue;
3423 break;
3424 }
3425 }
3426 if (Type == ShellPromptResponseTypeAnyKeyContinue) {
3427 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3428 ASSERT_EFI_ERROR(Status);
3429 *Resp = ShellPromptResponseContinue;
3430 break;
3431 }
3432 }
3433 break;
3434 case ShellPromptResponseTypeYesNo:
3435 if (Prompt != NULL) {
3436 ShellPrintEx(-1, -1, L"%s", Prompt);
3437 }
3438 //
3439 // wait for valid response
3440 //
3441 *Resp = ShellPromptResponseMax;
3442 while (*Resp == ShellPromptResponseMax) {
3443 if (ShellGetExecutionBreakFlag()) {
3444 Status = EFI_ABORTED;
3445 break;
3446 }
3447 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3448 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3449 if (EFI_ERROR(Status)) {
3450 break;
3451 }
3452 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3453 switch (Key.UnicodeChar) {
3454 case L'Y':
3455 case L'y':
3456 *Resp = ShellPromptResponseYes;
3457 break;
3458 case L'N':
3459 case L'n':
3460 *Resp = ShellPromptResponseNo;
3461 break;
3462 }
3463 }
3464 break;
3465 case ShellPromptResponseTypeFreeform:
3466 if (Prompt != NULL) {
3467 ShellPrintEx(-1, -1, L"%s", Prompt);
3468 }
3469 while(1) {
3470 if (ShellGetExecutionBreakFlag()) {
3471 Status = EFI_ABORTED;
3472 break;
3473 }
3474 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3475 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3476 if (EFI_ERROR(Status)) {
3477 break;
3478 }
3479 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3480 if (Key.UnicodeChar == CHAR_CARRIAGE_RETURN) {
3481 break;
3482 }
3483 ASSERT((Buffer == NULL && Size == 0) || (Buffer != NULL));
3484 StrnCatGrow(&Buffer, &Size, &Key.UnicodeChar, 1);
3485 }
3486 break;
3487 //
3488 // This is the location to add new prompt types.
3489 // If your new type loops remember to add ExecutionBreak support.
3490 //
3491 default:
3492 ASSERT(FALSE);
3493 }
3494
3495 if (Response != NULL) {
3496 if (Resp != NULL) {
3497 *Response = Resp;
3498 } else if (Buffer != NULL) {
3499 *Response = Buffer;
3500 }
3501 } else {
3502 if (Resp != NULL) {
3503 FreePool(Resp);
3504 }
3505 if (Buffer != NULL) {
3506 FreePool(Buffer);
3507 }
3508 }
3509
3510 ShellPrintEx(-1, -1, L"\r\n");
3511 return (Status);
3512 }
3513
3514 /**
3515 Prompt the user and return the resultant answer to the requestor.
3516
3517 This function is the same as ShellPromptForResponse, except that the prompt is
3518 automatically pulled from HII.
3519
3520 @param Type What type of question is asked. This is used to filter the input
3521 to prevent invalid answers to question.
3522 @param[in] HiiFormatStringId The format string Id for getting from Hii.
3523 @param[in] HiiFormatHandle The format string Handle for getting from Hii.
3524 @param Response Pointer to Response which will be populated upon return.
3525
3526 @retval EFI_SUCCESS the operation was sucessful.
3527 @return other the operation failed.
3528
3529 @sa ShellPromptForResponse
3530 **/
3531 EFI_STATUS
3532 EFIAPI
3533 ShellPromptForResponseHii (
3534 IN SHELL_PROMPT_REQUEST_TYPE Type,
3535 IN CONST EFI_STRING_ID HiiFormatStringId,
3536 IN CONST EFI_HANDLE HiiFormatHandle,
3537 IN OUT VOID **Response
3538 )
3539 {
3540 CHAR16 *Prompt;
3541 EFI_STATUS Status;
3542
3543 Prompt = HiiGetString(HiiFormatHandle, HiiFormatStringId, NULL);
3544 Status = ShellPromptForResponse(Type, Prompt, Response);
3545 FreePool(Prompt);
3546 return (Status);
3547 }
3548
3549 /**
3550 Function to determin if an entire string is a valid number.
3551
3552 If Hex it must be preceeded with a 0x or has ForceHex, set TRUE.
3553
3554 @param[in] String The string to evaluate.
3555 @param[in] ForceHex TRUE - always assume hex.
3556 @param[in] StopAtSpace TRUE to halt upon finding a space, FALSE to keep going.
3557 @param[in] TimeNumbers TRUE to allow numbers with ":", FALSE otherwise.
3558
3559 @retval TRUE It is all numeric (dec/hex) characters.
3560 @retval FALSE There is a non-numeric character.
3561 **/
3562 BOOLEAN
3563 EFIAPI
3564 InternalShellIsHexOrDecimalNumber (
3565 IN CONST CHAR16 *String,
3566 IN CONST BOOLEAN ForceHex,
3567 IN CONST BOOLEAN StopAtSpace,
3568 IN CONST BOOLEAN TimeNumbers
3569 )
3570 {
3571 BOOLEAN Hex;
3572
3573 //
3574 // chop off a single negative sign
3575 //
3576 if (String != NULL && *String == L'-') {
3577 String++;
3578 }
3579
3580 if (String == NULL) {
3581 return (FALSE);
3582 }
3583
3584 //
3585 // chop leading zeroes
3586 //
3587 while(String != NULL && *String == L'0'){
3588 String++;
3589 }
3590 //
3591 // allow '0x' or '0X', but not 'x' or 'X'
3592 //
3593 if (String != NULL && (*String == L'x' || *String == L'X')) {
3594 if (*(String-1) != L'0') {
3595 //
3596 // we got an x without a preceeding 0
3597 //
3598 return (FALSE);
3599 }
3600 String++;
3601 Hex = TRUE;
3602 } else if (ForceHex) {
3603 Hex = TRUE;
3604 } else {
3605 Hex = FALSE;
3606 }
3607
3608 //
3609 // loop through the remaining characters and use the lib function
3610 //
3611 for ( ; String != NULL && *String != CHAR_NULL && !(StopAtSpace && *String == L' ') ; String++){
3612 if (TimeNumbers && (String[0] == L':')) {
3613 continue;
3614 }
3615 if (Hex) {
3616 if (!ShellIsHexaDecimalDigitCharacter(*String)) {
3617 return (FALSE);
3618 }
3619 } else {
3620 if (!ShellIsDecimalDigitCharacter(*String)) {
3621 return (FALSE);
3622 }
3623 }
3624 }
3625
3626 return (TRUE);
3627 }
3628
3629 /**
3630 Function to determine if a given filename exists.
3631
3632 @param[in] Name Path to test.
3633
3634 @retval EFI_SUCCESS The Path represents a file.
3635 @retval EFI_NOT_FOUND The Path does not represent a file.
3636 @retval other The path failed to open.
3637 **/
3638 EFI_STATUS
3639 EFIAPI
3640 ShellFileExists(
3641 IN CONST CHAR16 *Name
3642 )
3643 {
3644 EFI_STATUS Status;
3645 EFI_SHELL_FILE_INFO *List;
3646
3647 ASSERT(Name != NULL);
3648
3649 List = NULL;
3650 Status = ShellOpenFileMetaArg((CHAR16*)Name, EFI_FILE_MODE_READ, &List);
3651 if (EFI_ERROR(Status)) {
3652 return (Status);
3653 }
3654
3655 ShellCloseFileMetaArg(&List);
3656
3657 return (EFI_SUCCESS);
3658 }
3659
3660 /**
3661 Convert a Unicode character to upper case only if
3662 it maps to a valid small-case ASCII character.
3663
3664 This internal function only deal with Unicode character
3665 which maps to a valid small-case ASCII character, i.e.
3666 L'a' to L'z'. For other Unicode character, the input character
3667 is returned directly.
3668
3669 @param Char The character to convert.
3670
3671 @retval LowerCharacter If the Char is with range L'a' to L'z'.
3672 @retval Unchanged Otherwise.
3673
3674 **/
3675 CHAR16
3676 EFIAPI
3677 InternalShellCharToUpper (
3678 IN CHAR16 Char
3679 )
3680 {
3681 if (Char >= L'a' && Char <= L'z') {
3682 return (CHAR16) (Char - (L'a' - L'A'));
3683 }
3684
3685 return Char;
3686 }
3687
3688 /**
3689 Convert a Unicode character to numerical value.
3690
3691 This internal function only deal with Unicode character
3692 which maps to a valid hexadecimal ASII character, i.e.
3693 L'0' to L'9', L'a' to L'f' or L'A' to L'F'. For other
3694 Unicode character, the value returned does not make sense.
3695
3696 @param Char The character to convert.
3697
3698 @return The numerical value converted.
3699
3700 **/
3701 UINTN
3702 EFIAPI
3703 InternalShellHexCharToUintn (
3704 IN CHAR16 Char
3705 )
3706 {
3707 if (ShellIsDecimalDigitCharacter (Char)) {
3708 return Char - L'0';
3709 }
3710
3711 return (UINTN) (10 + InternalShellCharToUpper (Char) - L'A');
3712 }
3713
3714 /**
3715 Convert a Null-terminated Unicode hexadecimal string to a value of type UINT64.
3716
3717 This function returns a value of type UINTN by interpreting the contents
3718 of the Unicode string specified by String as a hexadecimal number.
3719 The format of the input Unicode string String is:
3720
3721 [spaces][zeros][x][hexadecimal digits].
3722
3723 The valid hexadecimal digit character is in the range [0-9], [a-f] and [A-F].
3724 The prefix "0x" is optional. Both "x" and "X" is allowed in "0x" prefix.
3725 If "x" appears in the input string, it must be prefixed with at least one 0.
3726 The function will ignore the pad space, which includes spaces or tab characters,
3727 before [zeros], [x] or [hexadecimal digit]. The running zero before [x] or
3728 [hexadecimal digit] will be ignored. Then, the decoding starts after [x] or the
3729 first valid hexadecimal digit. Then, the function stops at the first character that is
3730 a not a valid hexadecimal character or NULL, whichever one comes first.
3731
3732 If String has only pad spaces, then zero is returned.
3733 If String has no leading pad spaces, leading zeros or valid hexadecimal digits,
3734 then zero is returned.
3735
3736 @param[in] String A pointer to a Null-terminated Unicode string.
3737 @param[out] Value Upon a successful return the value of the conversion.
3738 @param[in] StopAtSpace FALSE to skip spaces.
3739
3740 @retval EFI_SUCCESS The conversion was successful.
3741 @retval EFI_INVALID_PARAMETER A parameter was NULL or invalid.
3742 @retval EFI_DEVICE_ERROR An overflow occured.
3743 **/
3744 EFI_STATUS
3745 EFIAPI
3746 InternalShellStrHexToUint64 (
3747 IN CONST CHAR16 *String,
3748 OUT UINT64 *Value,
3749 IN CONST BOOLEAN StopAtSpace
3750 )
3751 {
3752 UINT64 Result;
3753
3754 if (String == NULL || StrSize(String) == 0 || Value == NULL) {
3755 return (EFI_INVALID_PARAMETER);
3756 }
3757
3758 //
3759 // Ignore the pad spaces (space or tab)
3760 //
3761 while ((*String == L' ') || (*String == L'\t')) {
3762 String++;
3763 }
3764
3765 //
3766 // Ignore leading Zeros after the spaces
3767 //
3768 while (*String == L'0') {
3769 String++;
3770 }
3771
3772 if (InternalShellCharToUpper (*String) == L'X') {
3773 if (*(String - 1) != L'0') {
3774 return 0;
3775 }
3776 //
3777 // Skip the 'X'
3778 //
3779 String++;
3780 }
3781
3782 Result = 0;
3783
3784 //
3785 // Skip spaces if requested
3786 //
3787 while (StopAtSpace && *String == L' ') {
3788 String++;
3789 }
3790
3791 while (ShellIsHexaDecimalDigitCharacter (*String)) {
3792 //
3793 // If the Hex Number represented by String overflows according
3794 // to the range defined by UINTN, then ASSERT().
3795 //
3796 if (!(Result <= (RShiftU64((((UINT64) ~0) - InternalShellHexCharToUintn (*String)), 4)))) {
3797 // if (!(Result <= ((((UINT64) ~0) - InternalShellHexCharToUintn (*String)) >> 4))) {
3798 return (EFI_DEVICE_ERROR);
3799 }
3800
3801 Result = (LShiftU64(Result, 4));
3802 Result += InternalShellHexCharToUintn (*String);
3803 String++;
3804
3805 //
3806 // stop at spaces if requested
3807 //
3808 if (StopAtSpace && *String == L' ') {
3809 break;
3810 }
3811 }
3812
3813 *Value = Result;
3814 return (EFI_SUCCESS);
3815 }
3816
3817 /**
3818 Convert a Null-terminated Unicode decimal string to a value of
3819 type UINT64.
3820
3821 This function returns a value of type UINT64 by interpreting the contents
3822 of the Unicode string specified by String as a decimal number. The format
3823 of the input Unicode string String is:
3824
3825 [spaces] [decimal digits].
3826
3827 The valid decimal digit character is in the range [0-9]. The
3828 function will ignore the pad space, which includes spaces or
3829 tab characters, before [decimal digits]. The running zero in the
3830 beginning of [decimal digits] will be ignored. Then, the function
3831 stops at the first character that is a not a valid decimal character
3832 or a Null-terminator, whichever one comes first.
3833
3834 If String has only pad spaces, then 0 is returned.
3835 If String has no pad spaces or valid decimal digits,
3836 then 0 is returned.
3837
3838 @param[in] String A pointer to a Null-terminated Unicode string.
3839 @param[out] Value Upon a successful return the value of the conversion.
3840 @param[in] StopAtSpace FALSE to skip spaces.
3841
3842 @retval EFI_SUCCESS The conversion was successful.
3843 @retval EFI_INVALID_PARAMETER A parameter was NULL or invalid.
3844 @retval EFI_DEVICE_ERROR An overflow occured.
3845 **/
3846 EFI_STATUS
3847 EFIAPI
3848 InternalShellStrDecimalToUint64 (
3849 IN CONST CHAR16 *String,
3850 OUT UINT64 *Value,
3851 IN CONST BOOLEAN StopAtSpace
3852 )
3853 {
3854 UINT64 Result;
3855
3856 if (String == NULL || StrSize (String) == 0 || Value == NULL) {
3857 return (EFI_INVALID_PARAMETER);
3858 }
3859
3860 //
3861 // Ignore the pad spaces (space or tab)
3862 //
3863 while ((*String == L' ') || (*String == L'\t')) {
3864 String++;
3865 }
3866
3867 //
3868 // Ignore leading Zeros after the spaces
3869 //
3870 while (*String == L'0') {
3871 String++;
3872 }
3873
3874 Result = 0;
3875
3876 //
3877 // Skip spaces if requested
3878 //
3879 while (StopAtSpace && *String == L' ') {
3880 String++;
3881 }
3882 while (ShellIsDecimalDigitCharacter (*String)) {
3883 //
3884 // If the number represented by String overflows according
3885 // to the range defined by UINT64, then ASSERT().
3886 //
3887
3888 if (!(Result <= (DivU64x32((((UINT64) ~0) - (*String - L'0')),10)))) {
3889 return (EFI_DEVICE_ERROR);
3890 }
3891
3892 Result = MultU64x32(Result, 10) + (*String - L'0');
3893 String++;
3894
3895 //
3896 // Stop at spaces if requested
3897 //
3898 if (StopAtSpace && *String == L' ') {
3899 break;
3900 }
3901 }
3902
3903 *Value = Result;
3904
3905 return (EFI_SUCCESS);
3906 }
3907
3908 /**
3909 Function to verify and convert a string to its numerical value.
3910
3911 If Hex it must be preceeded with a 0x, 0X, or has ForceHex set TRUE.
3912
3913 @param[in] String The string to evaluate.
3914 @param[out] Value Upon a successful return the value of the conversion.
3915 @param[in] ForceHex TRUE - always assume hex.
3916 @param[in] StopAtSpace FALSE to skip spaces.
3917
3918 @retval EFI_SUCCESS The conversion was successful.
3919 @retval EFI_INVALID_PARAMETER String contained an invalid character.
3920 @retval EFI_NOT_FOUND String was a number, but Value was NULL.
3921 **/
3922 EFI_STATUS
3923 EFIAPI
3924 ShellConvertStringToUint64(
3925 IN CONST CHAR16 *String,
3926 OUT UINT64 *Value,
3927 IN CONST BOOLEAN ForceHex,
3928 IN CONST BOOLEAN StopAtSpace
3929 )
3930 {
3931 UINT64 RetVal;
3932 CONST CHAR16 *Walker;
3933 EFI_STATUS Status;
3934 BOOLEAN Hex;
3935
3936 Hex = ForceHex;
3937
3938 if (!InternalShellIsHexOrDecimalNumber(String, Hex, StopAtSpace, FALSE)) {
3939 if (!Hex) {
3940 Hex = TRUE;
3941 if (!InternalShellIsHexOrDecimalNumber(String, Hex, StopAtSpace, FALSE)) {
3942 return (EFI_INVALID_PARAMETER);
3943 }
3944 } else {
3945 return (EFI_INVALID_PARAMETER);
3946 }
3947 }
3948
3949 //
3950 // Chop off leading spaces
3951 //
3952 for (Walker = String; Walker != NULL && *Walker != CHAR_NULL && *Walker == L' '; Walker++);
3953
3954 //
3955 // make sure we have something left that is numeric.
3956 //
3957 if (Walker == NULL || *Walker == CHAR_NULL || !InternalShellIsHexOrDecimalNumber(Walker, Hex, StopAtSpace, FALSE)) {
3958 return (EFI_INVALID_PARAMETER);
3959 }
3960
3961 //
3962 // do the conversion.
3963 //
3964 if (Hex || StrnCmp(Walker, L"0x", 2) == 0 || StrnCmp(Walker, L"0X", 2) == 0){
3965 Status = InternalShellStrHexToUint64(Walker, &RetVal, StopAtSpace);
3966 } else {
3967 Status = InternalShellStrDecimalToUint64(Walker, &RetVal, StopAtSpace);
3968 }
3969
3970 if (Value == NULL && !EFI_ERROR(Status)) {
3971 return (EFI_NOT_FOUND);
3972 }
3973
3974 if (Value != NULL) {
3975 *Value = RetVal;
3976 }
3977
3978 return (Status);
3979 }
3980
3981 /**
3982 Function to determin if an entire string is a valid number.
3983
3984 If Hex it must be preceeded with a 0x or has ForceHex, set TRUE.
3985
3986 @param[in] String The string to evaluate.
3987 @param[in] ForceHex TRUE - always assume hex.
3988 @param[in] StopAtSpace TRUE to halt upon finding a space, FALSE to keep going.
3989
3990 @retval TRUE It is all numeric (dec/hex) characters.
3991 @retval FALSE There is a non-numeric character.
3992 **/
3993 BOOLEAN
3994 EFIAPI
3995 ShellIsHexOrDecimalNumber (
3996 IN CONST CHAR16 *String,
3997 IN CONST BOOLEAN ForceHex,
3998 IN CONST BOOLEAN StopAtSpace
3999 )
4000 {
4001 if (ShellConvertStringToUint64(String, NULL, ForceHex, StopAtSpace) == EFI_NOT_FOUND) {
4002 return (TRUE);
4003 }
4004 return (FALSE);
4005 }
4006
4007 /**
4008 Function to read a single line from a SHELL_FILE_HANDLE. The \n is not included in the returned
4009 buffer. The returned buffer must be callee freed.
4010
4011 If the position upon start is 0, then the Ascii Boolean will be set. This should be
4012 maintained and not changed for all operations with the same file.
4013
4014 @param[in] Handle SHELL_FILE_HANDLE to read from.
4015 @param[in, out] Ascii Boolean value for indicating whether the file is
4016 Ascii (TRUE) or UCS2 (FALSE).
4017
4018 @return The line of text from the file.
4019 @retval NULL There was not enough memory available.
4020
4021 @sa ShellFileHandleReadLine
4022 **/
4023 CHAR16*
4024 EFIAPI
4025 ShellFileHandleReturnLine(
4026 IN SHELL_FILE_HANDLE Handle,
4027 IN OUT BOOLEAN *Ascii
4028 )
4029 {
4030 CHAR16 *RetVal;
4031 UINTN Size;
4032 EFI_STATUS Status;
4033
4034 Size = 0;
4035 RetVal = NULL;
4036
4037 Status = ShellFileHandleReadLine(Handle, RetVal, &Size, FALSE, Ascii);
4038 if (Status == EFI_BUFFER_TOO_SMALL) {
4039 RetVal = AllocateZeroPool(Size);
4040 if (RetVal == NULL) {
4041 return (NULL);
4042 }
4043 Status = ShellFileHandleReadLine(Handle, RetVal, &Size, FALSE, Ascii);
4044
4045 }
4046 if (EFI_ERROR(Status) && (RetVal != NULL)) {
4047 FreePool(RetVal);
4048 RetVal = NULL;
4049 }
4050 return (RetVal);
4051 }
4052
4053 /**
4054 Function to read a single line (up to but not including the \n) from a SHELL_FILE_HANDLE.
4055
4056 If the position upon start is 0, then the Ascii Boolean will be set. This should be
4057 maintained and not changed for all operations with the same file.
4058
4059 @param[in] Handle SHELL_FILE_HANDLE to read from.
4060 @param[in, out] Buffer The pointer to buffer to read into.
4061 @param[in, out] Size The pointer to number of bytes in Buffer.
4062 @param[in] Truncate If the buffer is large enough, this has no effect.
4063 If the buffer is is too small and Truncate is TRUE,
4064 the line will be truncated.
4065 If the buffer is is too small and Truncate is FALSE,
4066 then no read will occur.
4067
4068 @param[in, out] Ascii Boolean value for indicating whether the file is
4069 Ascii (TRUE) or UCS2 (FALSE).
4070
4071 @retval EFI_SUCCESS The operation was successful. The line is stored in
4072 Buffer.
4073 @retval EFI_INVALID_PARAMETER Handle was NULL.
4074 @retval EFI_INVALID_PARAMETER Size was NULL.
4075 @retval EFI_BUFFER_TOO_SMALL Size was not large enough to store the line.
4076 Size was updated to the minimum space required.
4077 **/
4078 EFI_STATUS
4079 EFIAPI
4080 ShellFileHandleReadLine(
4081 IN SHELL_FILE_HANDLE Handle,
4082 IN OUT CHAR16 *Buffer,
4083 IN OUT UINTN *Size,
4084 IN BOOLEAN Truncate,
4085 IN OUT BOOLEAN *Ascii
4086 )
4087 {
4088 EFI_STATUS Status;
4089 CHAR16 CharBuffer;
4090 UINTN CharSize;
4091 UINTN CountSoFar;
4092 UINT64 OriginalFilePosition;
4093
4094
4095 if (Handle == NULL
4096 ||Size == NULL
4097 ){
4098 return (EFI_INVALID_PARAMETER);
4099 }
4100 if (Buffer == NULL) {
4101 ASSERT(*Size == 0);
4102 } else {
4103 *Buffer = CHAR_NULL;
4104 }
4105 gEfiShellProtocol->GetFilePosition(Handle, &OriginalFilePosition);
4106 if (OriginalFilePosition == 0) {
4107 CharSize = sizeof(CHAR16);
4108 Status = gEfiShellProtocol->ReadFile(Handle, &CharSize, &CharBuffer);
4109 ASSERT_EFI_ERROR(Status);
4110 if (CharBuffer == gUnicodeFileTag) {
4111 *Ascii = FALSE;
4112 } else {
4113 *Ascii = TRUE;
4114 gEfiShellProtocol->SetFilePosition(Handle, OriginalFilePosition);
4115 }
4116 }
4117
4118 for (CountSoFar = 0;;CountSoFar++){
4119 CharBuffer = 0;
4120 if (*Ascii) {
4121 CharSize = sizeof(CHAR8);
4122 } else {
4123 CharSize = sizeof(CHAR16);
4124 }
4125 Status = gEfiShellProtocol->ReadFile(Handle, &CharSize, &CharBuffer);
4126 if ( EFI_ERROR(Status)
4127 || CharSize == 0
4128 || (CharBuffer == L'\n' && !(*Ascii))
4129 || (CharBuffer == '\n' && *Ascii)
4130 ){
4131 break;
4132 }
4133 //
4134 // if we have space save it...
4135 //
4136 if ((CountSoFar+1)*sizeof(CHAR16) < *Size){
4137 ASSERT(Buffer != NULL);
4138 ((CHAR16*)Buffer)[CountSoFar] = CharBuffer;
4139 ((CHAR16*)Buffer)[CountSoFar+1] = CHAR_NULL;
4140 }
4141 }
4142
4143 //
4144 // if we ran out of space tell when...
4145 //
4146 if ((CountSoFar+1)*sizeof(CHAR16) > *Size){
4147 *Size = (CountSoFar+1)*sizeof(CHAR16);
4148 if (!Truncate) {
4149 gEfiShellProtocol->SetFilePosition(Handle, OriginalFilePosition);
4150 } else {
4151 DEBUG((DEBUG_WARN, "The line was truncated in ShellFileHandleReadLine"));
4152 }
4153 return (EFI_BUFFER_TOO_SMALL);
4154 }
4155 while(Buffer[StrLen(Buffer)-1] == L'\r') {
4156 Buffer[StrLen(Buffer)-1] = CHAR_NULL;
4157 }
4158
4159 return (Status);
4160 }
4161
4162 /**
4163 Function to print help file / man page content in the spec from the UEFI Shell protocol GetHelpText function.
4164
4165 @param[in] CommandToGetHelpOn Pointer to a string containing the command name of help file to be printed.
4166 @param[in] SectionToGetHelpOn Pointer to the section specifier(s).
4167 @param[in] PrintCommandText If TRUE, prints the command followed by the help content, otherwise prints
4168 the help content only.
4169 @retval EFI_DEVICE_ERROR The help data format was incorrect.
4170 @retval EFI_NOT_FOUND The help data could not be found.
4171 @retval EFI_SUCCESS The operation was successful.
4172 **/
4173 EFI_STATUS
4174 EFIAPI
4175 ShellPrintHelp (
4176 IN CONST CHAR16 *CommandToGetHelpOn,
4177 IN CONST CHAR16 *SectionToGetHelpOn,
4178 IN BOOLEAN PrintCommandText
4179 )
4180 {
4181 EFI_STATUS Status;
4182 CHAR16 *OutText;
4183
4184 OutText = NULL;
4185
4186 //
4187 // Get the string to print based
4188 //
4189 Status = gEfiShellProtocol->GetHelpText (CommandToGetHelpOn, SectionToGetHelpOn, &OutText);
4190
4191 //
4192 // make sure we got a valid string
4193 //
4194 if (EFI_ERROR(Status)){
4195 return Status;
4196 }
4197 if (OutText == NULL || StrLen(OutText) == 0) {
4198 return EFI_NOT_FOUND;
4199 }
4200
4201 //
4202 // Chop off trailing stuff we dont need
4203 //
4204 while (OutText[StrLen(OutText)-1] == L'\r' || OutText[StrLen(OutText)-1] == L'\n' || OutText[StrLen(OutText)-1] == L' ') {
4205 OutText[StrLen(OutText)-1] = CHAR_NULL;
4206 }
4207
4208 //
4209 // Print this out to the console
4210 //
4211 if (PrintCommandText) {
4212 ShellPrintEx(-1, -1, L"%H%-14s%N- %s\r\n", CommandToGetHelpOn, OutText);
4213 } else {
4214 ShellPrintEx(-1, -1, L"%N%s\r\n", OutText);
4215 }
4216
4217 SHELL_FREE_NON_NULL(OutText);
4218
4219 return EFI_SUCCESS;
4220 }
4221
4222 /**
4223 Function to delete a file by name
4224
4225 @param[in] FileName Pointer to file name to delete.
4226
4227 @retval EFI_SUCCESS the file was deleted sucessfully
4228 @retval EFI_WARN_DELETE_FAILURE the handle was closed, but the file was not
4229 deleted
4230 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
4231 @retval EFI_NOT_FOUND The specified file could not be found on the
4232 device or the file system could not be found
4233 on the device.
4234 @retval EFI_NO_MEDIA The device has no medium.
4235 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
4236 medium is no longer supported.
4237 @retval EFI_DEVICE_ERROR The device reported an error.
4238 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
4239 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
4240 @retval EFI_ACCESS_DENIED The file was opened read only.
4241 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
4242 file.
4243 @retval other The file failed to open
4244 **/
4245 EFI_STATUS
4246 EFIAPI
4247 ShellDeleteFileByName(
4248 IN CONST CHAR16 *FileName
4249 )
4250 {
4251 EFI_STATUS Status;
4252 SHELL_FILE_HANDLE FileHandle;
4253
4254 Status = ShellFileExists(FileName);
4255
4256 if (Status == EFI_SUCCESS){
4257 Status = ShellOpenFileByName(FileName, &FileHandle, EFI_FILE_MODE_READ | EFI_FILE_MODE_WRITE | EFI_FILE_MODE_CREATE, 0x0);
4258 if (Status == EFI_SUCCESS){
4259 Status = ShellDeleteFile(&FileHandle);
4260 }
4261 }
4262
4263 return(Status);
4264
4265 }
4266
4267 /**
4268 Cleans off all the quotes in the string.
4269
4270 @param[in] OriginalString pointer to the string to be cleaned.
4271 @param[out] CleanString The new string with all quotes removed.
4272 Memory allocated in the function and free
4273 by caller.
4274
4275 @retval EFI_SUCCESS The operation was successful.
4276 **/
4277 EFI_STATUS
4278 EFIAPI
4279 InternalShellStripQuotes (
4280 IN CONST CHAR16 *OriginalString,
4281 OUT CHAR16 **CleanString
4282 )
4283 {
4284 CHAR16 *Walker;
4285
4286 if (OriginalString == NULL || CleanString == NULL) {
4287 return EFI_INVALID_PARAMETER;
4288 }
4289
4290 *CleanString = AllocateCopyPool (StrSize (OriginalString), OriginalString);
4291 if (*CleanString == NULL) {
4292 return EFI_OUT_OF_RESOURCES;
4293 }
4294
4295 for (Walker = *CleanString; Walker != NULL && *Walker != CHAR_NULL ; Walker++) {
4296 if (*Walker == L'\"') {
4297 CopyMem(Walker, Walker+1, StrSize(Walker) - sizeof(Walker[0]));
4298 }
4299 }
4300
4301 return EFI_SUCCESS;
4302 }
4303