]> git.proxmox.com Git - mirror_edk2.git/blob - ShellPkg/Library/UefiShellLib/UefiShellLib.c
ShellPkg/UefiShellLib.c: Execute: Return a Command status even in the old shell
[mirror_edk2.git] / ShellPkg / Library / UefiShellLib / UefiShellLib.c
1 /** @file
2 Provides interface to shell functionality for shell commands and applications.
3
4 Copyright (c) 2006 - 2014, Intel Corporation. All rights reserved.<BR>
5 This program and the accompanying materials
6 are licensed and made available under the terms and conditions of the BSD License
7 which accompanies this distribution. The full text of the license may be found at
8 http://opensource.org/licenses/bsd-license.php
9
10 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
11 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
12
13 **/
14
15 #include "UefiShellLib.h"
16 #include <ShellBase.h>
17 #include <Library/SortLib.h>
18
19 #define FIND_XXXXX_FILE_BUFFER_SIZE (SIZE_OF_EFI_FILE_INFO + MAX_FILE_NAME_LEN)
20
21 //
22 // globals...
23 //
24 SHELL_PARAM_ITEM EmptyParamList[] = {
25 {NULL, TypeMax}
26 };
27 SHELL_PARAM_ITEM SfoParamList[] = {
28 {L"-sfo", TypeFlag},
29 {NULL, TypeMax}
30 };
31 EFI_SHELL_ENVIRONMENT2 *mEfiShellEnvironment2;
32 EFI_SHELL_INTERFACE *mEfiShellInterface;
33 EFI_SHELL_PROTOCOL *gEfiShellProtocol;
34 EFI_SHELL_PARAMETERS_PROTOCOL *gEfiShellParametersProtocol;
35 EFI_HANDLE mEfiShellEnvironment2Handle;
36 FILE_HANDLE_FUNCTION_MAP FileFunctionMap;
37
38 /**
39 Check if a Unicode character is a hexadecimal character.
40
41 This internal function checks if a Unicode character is a
42 numeric character. The valid hexadecimal characters are
43 L'0' to L'9', L'a' to L'f', or L'A' to L'F'.
44
45 @param Char The character to check against.
46
47 @retval TRUE If the Char is a hexadecmial character.
48 @retval FALSE If the Char is not a hexadecmial character.
49
50 **/
51 BOOLEAN
52 EFIAPI
53 ShellIsHexaDecimalDigitCharacter (
54 IN CHAR16 Char
55 )
56 {
57 return (BOOLEAN) ((Char >= L'0' && Char <= L'9') || (Char >= L'A' && Char <= L'F') || (Char >= L'a' && Char <= L'f'));
58 }
59
60 /**
61 Check if a Unicode character is a decimal character.
62
63 This internal function checks if a Unicode character is a
64 decimal character. The valid characters are
65 L'0' to L'9'.
66
67
68 @param Char The character to check against.
69
70 @retval TRUE If the Char is a hexadecmial character.
71 @retval FALSE If the Char is not a hexadecmial character.
72
73 **/
74 BOOLEAN
75 EFIAPI
76 ShellIsDecimalDigitCharacter (
77 IN CHAR16 Char
78 )
79 {
80 return (BOOLEAN) (Char >= L'0' && Char <= L'9');
81 }
82
83 /**
84 Helper function to find ShellEnvironment2 for constructor.
85
86 @param[in] ImageHandle A copy of the calling image's handle.
87
88 @retval EFI_OUT_OF_RESOURCES Memory allocation failed.
89 **/
90 EFI_STATUS
91 EFIAPI
92 ShellFindSE2 (
93 IN EFI_HANDLE ImageHandle
94 )
95 {
96 EFI_STATUS Status;
97 EFI_HANDLE *Buffer;
98 UINTN BufferSize;
99 UINTN HandleIndex;
100
101 BufferSize = 0;
102 Buffer = NULL;
103 Status = gBS->OpenProtocol(ImageHandle,
104 &gEfiShellEnvironment2Guid,
105 (VOID **)&mEfiShellEnvironment2,
106 ImageHandle,
107 NULL,
108 EFI_OPEN_PROTOCOL_GET_PROTOCOL
109 );
110 //
111 // look for the mEfiShellEnvironment2 protocol at a higher level
112 //
113 if (EFI_ERROR (Status) || !(CompareGuid (&mEfiShellEnvironment2->SESGuid, &gEfiShellEnvironment2ExtGuid))){
114 //
115 // figure out how big of a buffer we need.
116 //
117 Status = gBS->LocateHandle (ByProtocol,
118 &gEfiShellEnvironment2Guid,
119 NULL, // ignored for ByProtocol
120 &BufferSize,
121 Buffer
122 );
123 //
124 // maybe it's not there???
125 //
126 if (Status == EFI_BUFFER_TOO_SMALL) {
127 Buffer = (EFI_HANDLE*)AllocateZeroPool(BufferSize);
128 if (Buffer == NULL) {
129 return (EFI_OUT_OF_RESOURCES);
130 }
131 Status = gBS->LocateHandle (ByProtocol,
132 &gEfiShellEnvironment2Guid,
133 NULL, // ignored for ByProtocol
134 &BufferSize,
135 Buffer
136 );
137 }
138 if (!EFI_ERROR (Status) && Buffer != NULL) {
139 //
140 // now parse the list of returned handles
141 //
142 Status = EFI_NOT_FOUND;
143 for (HandleIndex = 0; HandleIndex < (BufferSize/sizeof(Buffer[0])); HandleIndex++) {
144 Status = gBS->OpenProtocol(Buffer[HandleIndex],
145 &gEfiShellEnvironment2Guid,
146 (VOID **)&mEfiShellEnvironment2,
147 ImageHandle,
148 NULL,
149 EFI_OPEN_PROTOCOL_GET_PROTOCOL
150 );
151 if (CompareGuid (&mEfiShellEnvironment2->SESGuid, &gEfiShellEnvironment2ExtGuid)) {
152 mEfiShellEnvironment2Handle = Buffer[HandleIndex];
153 Status = EFI_SUCCESS;
154 break;
155 }
156 }
157 }
158 }
159 if (Buffer != NULL) {
160 FreePool (Buffer);
161 }
162 return (Status);
163 }
164
165 /**
166 Function to do most of the work of the constructor. Allows for calling
167 multiple times without complete re-initialization.
168
169 @param[in] ImageHandle A copy of the ImageHandle.
170 @param[in] SystemTable A pointer to the SystemTable for the application.
171
172 @retval EFI_SUCCESS The operationw as successful.
173 **/
174 EFI_STATUS
175 EFIAPI
176 ShellLibConstructorWorker (
177 IN EFI_HANDLE ImageHandle,
178 IN EFI_SYSTEM_TABLE *SystemTable
179 )
180 {
181 EFI_STATUS Status;
182
183 //
184 // UEFI 2.0 shell interfaces (used preferentially)
185 //
186 Status = gBS->OpenProtocol(
187 ImageHandle,
188 &gEfiShellProtocolGuid,
189 (VOID **)&gEfiShellProtocol,
190 ImageHandle,
191 NULL,
192 EFI_OPEN_PROTOCOL_GET_PROTOCOL
193 );
194 if (EFI_ERROR(Status)) {
195 //
196 // Search for the shell protocol
197 //
198 Status = gBS->LocateProtocol(
199 &gEfiShellProtocolGuid,
200 NULL,
201 (VOID **)&gEfiShellProtocol
202 );
203 if (EFI_ERROR(Status)) {
204 gEfiShellProtocol = NULL;
205 }
206 }
207 Status = gBS->OpenProtocol(
208 ImageHandle,
209 &gEfiShellParametersProtocolGuid,
210 (VOID **)&gEfiShellParametersProtocol,
211 ImageHandle,
212 NULL,
213 EFI_OPEN_PROTOCOL_GET_PROTOCOL
214 );
215 if (EFI_ERROR(Status)) {
216 gEfiShellParametersProtocol = NULL;
217 }
218
219 if (gEfiShellParametersProtocol == NULL || gEfiShellProtocol == NULL) {
220 //
221 // Moved to seperate function due to complexity
222 //
223 Status = ShellFindSE2(ImageHandle);
224
225 if (EFI_ERROR(Status)) {
226 DEBUG((DEBUG_ERROR, "Status: 0x%08x\r\n", Status));
227 mEfiShellEnvironment2 = NULL;
228 }
229 Status = gBS->OpenProtocol(ImageHandle,
230 &gEfiShellInterfaceGuid,
231 (VOID **)&mEfiShellInterface,
232 ImageHandle,
233 NULL,
234 EFI_OPEN_PROTOCOL_GET_PROTOCOL
235 );
236 if (EFI_ERROR(Status)) {
237 mEfiShellInterface = NULL;
238 }
239 }
240
241 //
242 // only success getting 2 of either the old or new, but no 1/2 and 1/2
243 //
244 if ((mEfiShellEnvironment2 != NULL && mEfiShellInterface != NULL) ||
245 (gEfiShellProtocol != NULL && gEfiShellParametersProtocol != NULL) ) {
246 if (gEfiShellProtocol != NULL) {
247 FileFunctionMap.GetFileInfo = gEfiShellProtocol->GetFileInfo;
248 FileFunctionMap.SetFileInfo = gEfiShellProtocol->SetFileInfo;
249 FileFunctionMap.ReadFile = gEfiShellProtocol->ReadFile;
250 FileFunctionMap.WriteFile = gEfiShellProtocol->WriteFile;
251 FileFunctionMap.CloseFile = gEfiShellProtocol->CloseFile;
252 FileFunctionMap.DeleteFile = gEfiShellProtocol->DeleteFile;
253 FileFunctionMap.GetFilePosition = gEfiShellProtocol->GetFilePosition;
254 FileFunctionMap.SetFilePosition = gEfiShellProtocol->SetFilePosition;
255 FileFunctionMap.FlushFile = gEfiShellProtocol->FlushFile;
256 FileFunctionMap.GetFileSize = gEfiShellProtocol->GetFileSize;
257 } else {
258 FileFunctionMap.GetFileInfo = (EFI_SHELL_GET_FILE_INFO)FileHandleGetInfo;
259 FileFunctionMap.SetFileInfo = (EFI_SHELL_SET_FILE_INFO)FileHandleSetInfo;
260 FileFunctionMap.ReadFile = (EFI_SHELL_READ_FILE)FileHandleRead;
261 FileFunctionMap.WriteFile = (EFI_SHELL_WRITE_FILE)FileHandleWrite;
262 FileFunctionMap.CloseFile = (EFI_SHELL_CLOSE_FILE)FileHandleClose;
263 FileFunctionMap.DeleteFile = (EFI_SHELL_DELETE_FILE)FileHandleDelete;
264 FileFunctionMap.GetFilePosition = (EFI_SHELL_GET_FILE_POSITION)FileHandleGetPosition;
265 FileFunctionMap.SetFilePosition = (EFI_SHELL_SET_FILE_POSITION)FileHandleSetPosition;
266 FileFunctionMap.FlushFile = (EFI_SHELL_FLUSH_FILE)FileHandleFlush;
267 FileFunctionMap.GetFileSize = (EFI_SHELL_GET_FILE_SIZE)FileHandleGetSize;
268 }
269 return (EFI_SUCCESS);
270 }
271 return (EFI_NOT_FOUND);
272 }
273 /**
274 Constructor for the Shell library.
275
276 Initialize the library and determine if the underlying is a UEFI Shell 2.0 or an EFI shell.
277
278 @param ImageHandle the image handle of the process
279 @param SystemTable the EFI System Table pointer
280
281 @retval EFI_SUCCESS the initialization was complete sucessfully
282 @return others an error ocurred during initialization
283 **/
284 EFI_STATUS
285 EFIAPI
286 ShellLibConstructor (
287 IN EFI_HANDLE ImageHandle,
288 IN EFI_SYSTEM_TABLE *SystemTable
289 )
290 {
291 mEfiShellEnvironment2 = NULL;
292 gEfiShellProtocol = NULL;
293 gEfiShellParametersProtocol = NULL;
294 mEfiShellInterface = NULL;
295 mEfiShellEnvironment2Handle = NULL;
296
297 //
298 // verify that auto initialize is not set false
299 //
300 if (PcdGetBool(PcdShellLibAutoInitialize) == 0) {
301 return (EFI_SUCCESS);
302 }
303
304 return (ShellLibConstructorWorker(ImageHandle, SystemTable));
305 }
306
307 /**
308 Destructor for the library. free any resources.
309
310 @param[in] ImageHandle A copy of the ImageHandle.
311 @param[in] SystemTable A pointer to the SystemTable for the application.
312
313 @retval EFI_SUCCESS The operation was successful.
314 @return An error from the CloseProtocol function.
315 **/
316 EFI_STATUS
317 EFIAPI
318 ShellLibDestructor (
319 IN EFI_HANDLE ImageHandle,
320 IN EFI_SYSTEM_TABLE *SystemTable
321 )
322 {
323 if (mEfiShellEnvironment2 != NULL) {
324 gBS->CloseProtocol(mEfiShellEnvironment2Handle==NULL?ImageHandle:mEfiShellEnvironment2Handle,
325 &gEfiShellEnvironment2Guid,
326 ImageHandle,
327 NULL);
328 mEfiShellEnvironment2 = NULL;
329 }
330 if (mEfiShellInterface != NULL) {
331 gBS->CloseProtocol(ImageHandle,
332 &gEfiShellInterfaceGuid,
333 ImageHandle,
334 NULL);
335 mEfiShellInterface = NULL;
336 }
337 if (gEfiShellProtocol != NULL) {
338 gBS->CloseProtocol(ImageHandle,
339 &gEfiShellProtocolGuid,
340 ImageHandle,
341 NULL);
342 gEfiShellProtocol = NULL;
343 }
344 if (gEfiShellParametersProtocol != NULL) {
345 gBS->CloseProtocol(ImageHandle,
346 &gEfiShellParametersProtocolGuid,
347 ImageHandle,
348 NULL);
349 gEfiShellParametersProtocol = NULL;
350 }
351 mEfiShellEnvironment2Handle = NULL;
352
353 return (EFI_SUCCESS);
354 }
355
356 /**
357 This function causes the shell library to initialize itself. If the shell library
358 is already initialized it will de-initialize all the current protocol poitners and
359 re-populate them again.
360
361 When the library is used with PcdShellLibAutoInitialize set to true this function
362 will return EFI_SUCCESS and perform no actions.
363
364 This function is intended for internal access for shell commands only.
365
366 @retval EFI_SUCCESS the initialization was complete sucessfully
367
368 **/
369 EFI_STATUS
370 EFIAPI
371 ShellInitialize (
372 )
373 {
374 //
375 // if auto initialize is not false then skip
376 //
377 if (PcdGetBool(PcdShellLibAutoInitialize) != 0) {
378 return (EFI_SUCCESS);
379 }
380
381 //
382 // deinit the current stuff
383 //
384 ASSERT_EFI_ERROR(ShellLibDestructor(gImageHandle, gST));
385
386 //
387 // init the new stuff
388 //
389 return (ShellLibConstructorWorker(gImageHandle, gST));
390 }
391
392 /**
393 This function will retrieve the information about the file for the handle
394 specified and store it in allocated pool memory.
395
396 This function allocates a buffer to store the file's information. It is the
397 caller's responsibility to free the buffer
398
399 @param FileHandle The file handle of the file for which information is
400 being requested.
401
402 @retval NULL information could not be retrieved.
403
404 @return the information about the file
405 **/
406 EFI_FILE_INFO*
407 EFIAPI
408 ShellGetFileInfo (
409 IN SHELL_FILE_HANDLE FileHandle
410 )
411 {
412 return (FileFunctionMap.GetFileInfo(FileHandle));
413 }
414
415 /**
416 This function sets the information about the file for the opened handle
417 specified.
418
419 @param[in] FileHandle The file handle of the file for which information
420 is being set.
421
422 @param[in] FileInfo The information to set.
423
424 @retval EFI_SUCCESS The information was set.
425 @retval EFI_INVALID_PARAMETER A parameter was out of range or invalid.
426 @retval EFI_UNSUPPORTED The FileHandle does not support FileInfo.
427 @retval EFI_NO_MEDIA The device has no medium.
428 @retval EFI_DEVICE_ERROR The device reported an error.
429 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
430 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
431 @retval EFI_ACCESS_DENIED The file was opened read only.
432 @retval EFI_VOLUME_FULL The volume is full.
433 **/
434 EFI_STATUS
435 EFIAPI
436 ShellSetFileInfo (
437 IN SHELL_FILE_HANDLE FileHandle,
438 IN EFI_FILE_INFO *FileInfo
439 )
440 {
441 return (FileFunctionMap.SetFileInfo(FileHandle, FileInfo));
442 }
443
444 /**
445 This function will open a file or directory referenced by DevicePath.
446
447 This function opens a file with the open mode according to the file path. The
448 Attributes is valid only for EFI_FILE_MODE_CREATE.
449
450 @param FilePath on input the device path to the file. On output
451 the remaining device path.
452 @param DeviceHandle pointer to the system device handle.
453 @param FileHandle pointer to the file handle.
454 @param OpenMode the mode to open the file with.
455 @param Attributes the file's file attributes.
456
457 @retval EFI_SUCCESS The information was set.
458 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
459 @retval EFI_UNSUPPORTED Could not open the file path.
460 @retval EFI_NOT_FOUND The specified file could not be found on the
461 device or the file system could not be found on
462 the device.
463 @retval EFI_NO_MEDIA The device has no medium.
464 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
465 medium is no longer supported.
466 @retval EFI_DEVICE_ERROR The device reported an error.
467 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
468 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
469 @retval EFI_ACCESS_DENIED The file was opened read only.
470 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
471 file.
472 @retval EFI_VOLUME_FULL The volume is full.
473 **/
474 EFI_STATUS
475 EFIAPI
476 ShellOpenFileByDevicePath(
477 IN OUT EFI_DEVICE_PATH_PROTOCOL **FilePath,
478 OUT EFI_HANDLE *DeviceHandle,
479 OUT SHELL_FILE_HANDLE *FileHandle,
480 IN UINT64 OpenMode,
481 IN UINT64 Attributes
482 )
483 {
484 CHAR16 *FileName;
485 EFI_STATUS Status;
486 EFI_SIMPLE_FILE_SYSTEM_PROTOCOL *EfiSimpleFileSystemProtocol;
487 EFI_FILE_PROTOCOL *Handle1;
488 EFI_FILE_PROTOCOL *Handle2;
489 CHAR16 *FnafPathName;
490 UINTN PathLen;
491
492 if (FilePath == NULL || FileHandle == NULL || DeviceHandle == NULL) {
493 return (EFI_INVALID_PARAMETER);
494 }
495
496 //
497 // which shell interface should we use
498 //
499 if (gEfiShellProtocol != NULL) {
500 //
501 // use UEFI Shell 2.0 method.
502 //
503 FileName = gEfiShellProtocol->GetFilePathFromDevicePath(*FilePath);
504 if (FileName == NULL) {
505 return (EFI_INVALID_PARAMETER);
506 }
507 Status = ShellOpenFileByName(FileName, FileHandle, OpenMode, Attributes);
508 FreePool(FileName);
509 return (Status);
510 }
511
512
513 //
514 // use old shell method.
515 //
516 Status = gBS->LocateDevicePath (&gEfiSimpleFileSystemProtocolGuid,
517 FilePath,
518 DeviceHandle);
519 if (EFI_ERROR (Status)) {
520 return Status;
521 }
522 Status = gBS->OpenProtocol(*DeviceHandle,
523 &gEfiSimpleFileSystemProtocolGuid,
524 (VOID**)&EfiSimpleFileSystemProtocol,
525 gImageHandle,
526 NULL,
527 EFI_OPEN_PROTOCOL_GET_PROTOCOL);
528 if (EFI_ERROR (Status)) {
529 return Status;
530 }
531 Status = EfiSimpleFileSystemProtocol->OpenVolume(EfiSimpleFileSystemProtocol, &Handle1);
532 if (EFI_ERROR (Status)) {
533 FileHandle = NULL;
534 return Status;
535 }
536
537 //
538 // go down directories one node at a time.
539 //
540 while (!IsDevicePathEnd (*FilePath)) {
541 //
542 // For file system access each node should be a file path component
543 //
544 if (DevicePathType (*FilePath) != MEDIA_DEVICE_PATH ||
545 DevicePathSubType (*FilePath) != MEDIA_FILEPATH_DP
546 ) {
547 FileHandle = NULL;
548 return (EFI_INVALID_PARAMETER);
549 }
550 //
551 // Open this file path node
552 //
553 Handle2 = Handle1;
554 Handle1 = NULL;
555
556 //
557 // File Name Alignment Fix (FNAF)
558 // Handle2->Open may be incapable of handling a unaligned CHAR16 data.
559 // The structure pointed to by FilePath may be not CHAR16 aligned.
560 // This code copies the potentially unaligned PathName data from the
561 // FilePath structure to the aligned FnafPathName for use in the
562 // calls to Handl2->Open.
563 //
564
565 //
566 // Determine length of PathName, in bytes.
567 //
568 PathLen = DevicePathNodeLength (*FilePath) - SIZE_OF_FILEPATH_DEVICE_PATH;
569
570 //
571 // Allocate memory for the aligned copy of the string Extra allocation is to allow for forced alignment
572 // Copy bytes from possibly unaligned location to aligned location
573 //
574 FnafPathName = AllocateCopyPool(PathLen, (UINT8 *)((FILEPATH_DEVICE_PATH*)*FilePath)->PathName);
575 if (FnafPathName == NULL) {
576 return EFI_OUT_OF_RESOURCES;
577 }
578
579 //
580 // Try to test opening an existing file
581 //
582 Status = Handle2->Open (
583 Handle2,
584 &Handle1,
585 FnafPathName,
586 OpenMode &~EFI_FILE_MODE_CREATE,
587 0
588 );
589
590 //
591 // see if the error was that it needs to be created
592 //
593 if ((EFI_ERROR (Status)) && (OpenMode != (OpenMode &~EFI_FILE_MODE_CREATE))) {
594 Status = Handle2->Open (
595 Handle2,
596 &Handle1,
597 FnafPathName,
598 OpenMode,
599 Attributes
600 );
601 }
602
603 //
604 // Free the alignment buffer
605 //
606 FreePool(FnafPathName);
607
608 //
609 // Close the last node
610 //
611 Handle2->Close (Handle2);
612
613 if (EFI_ERROR(Status)) {
614 return (Status);
615 }
616
617 //
618 // Get the next node
619 //
620 *FilePath = NextDevicePathNode (*FilePath);
621 }
622
623 //
624 // This is a weak spot since if the undefined SHELL_FILE_HANDLE format changes this must change also!
625 //
626 *FileHandle = (VOID*)Handle1;
627 return (EFI_SUCCESS);
628 }
629
630 /**
631 This function will open a file or directory referenced by filename.
632
633 If return is EFI_SUCCESS, the Filehandle is the opened file's handle;
634 otherwise, the Filehandle is NULL. The Attributes is valid only for
635 EFI_FILE_MODE_CREATE.
636
637 if FileName is NULL then ASSERT()
638
639 @param FileName pointer to file name
640 @param FileHandle pointer to the file handle.
641 @param OpenMode the mode to open the file with.
642 @param Attributes the file's file attributes.
643
644 @retval EFI_SUCCESS The information was set.
645 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
646 @retval EFI_UNSUPPORTED Could not open the file path.
647 @retval EFI_NOT_FOUND The specified file could not be found on the
648 device or the file system could not be found
649 on the device.
650 @retval EFI_NO_MEDIA The device has no medium.
651 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
652 medium is no longer supported.
653 @retval EFI_DEVICE_ERROR The device reported an error.
654 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
655 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
656 @retval EFI_ACCESS_DENIED The file was opened read only.
657 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
658 file.
659 @retval EFI_VOLUME_FULL The volume is full.
660 **/
661 EFI_STATUS
662 EFIAPI
663 ShellOpenFileByName(
664 IN CONST CHAR16 *FileName,
665 OUT SHELL_FILE_HANDLE *FileHandle,
666 IN UINT64 OpenMode,
667 IN UINT64 Attributes
668 )
669 {
670 EFI_HANDLE DeviceHandle;
671 EFI_DEVICE_PATH_PROTOCOL *FilePath;
672 EFI_STATUS Status;
673 EFI_FILE_INFO *FileInfo;
674
675 //
676 // ASSERT if FileName is NULL
677 //
678 ASSERT(FileName != NULL);
679
680 if (FileName == NULL) {
681 return (EFI_INVALID_PARAMETER);
682 }
683
684 if (gEfiShellProtocol != NULL) {
685 if ((OpenMode & EFI_FILE_MODE_CREATE) == EFI_FILE_MODE_CREATE && (Attributes & EFI_FILE_DIRECTORY) == EFI_FILE_DIRECTORY) {
686 return ShellCreateDirectory(FileName, FileHandle);
687 }
688 //
689 // Use UEFI Shell 2.0 method
690 //
691 Status = gEfiShellProtocol->OpenFileByName(FileName,
692 FileHandle,
693 OpenMode);
694 if (StrCmp(FileName, L"NUL") != 0 && !EFI_ERROR(Status) && ((OpenMode & EFI_FILE_MODE_CREATE) != 0)){
695 FileInfo = FileFunctionMap.GetFileInfo(*FileHandle);
696 ASSERT(FileInfo != NULL);
697 FileInfo->Attribute = Attributes;
698 Status = FileFunctionMap.SetFileInfo(*FileHandle, FileInfo);
699 FreePool(FileInfo);
700 }
701 return (Status);
702 }
703 //
704 // Using EFI Shell version
705 // this means convert name to path and call that function
706 // since this will use EFI method again that will open it.
707 //
708 ASSERT(mEfiShellEnvironment2 != NULL);
709 FilePath = mEfiShellEnvironment2->NameToPath ((CHAR16*)FileName);
710 if (FilePath != NULL) {
711 return (ShellOpenFileByDevicePath(&FilePath,
712 &DeviceHandle,
713 FileHandle,
714 OpenMode,
715 Attributes));
716 }
717 return (EFI_DEVICE_ERROR);
718 }
719 /**
720 This function create a directory
721
722 If return is EFI_SUCCESS, the Filehandle is the opened directory's handle;
723 otherwise, the Filehandle is NULL. If the directory already existed, this
724 function opens the existing directory.
725
726 @param DirectoryName pointer to directory name
727 @param FileHandle pointer to the file handle.
728
729 @retval EFI_SUCCESS The information was set.
730 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
731 @retval EFI_UNSUPPORTED Could not open the file path.
732 @retval EFI_NOT_FOUND The specified file could not be found on the
733 device or the file system could not be found
734 on the device.
735 @retval EFI_NO_MEDIA The device has no medium.
736 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
737 medium is no longer supported.
738 @retval EFI_DEVICE_ERROR The device reported an error.
739 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
740 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
741 @retval EFI_ACCESS_DENIED The file was opened read only.
742 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
743 file.
744 @retval EFI_VOLUME_FULL The volume is full.
745 @sa ShellOpenFileByName
746 **/
747 EFI_STATUS
748 EFIAPI
749 ShellCreateDirectory(
750 IN CONST CHAR16 *DirectoryName,
751 OUT SHELL_FILE_HANDLE *FileHandle
752 )
753 {
754 if (gEfiShellProtocol != NULL) {
755 //
756 // Use UEFI Shell 2.0 method
757 //
758 return (gEfiShellProtocol->CreateFile(DirectoryName,
759 EFI_FILE_DIRECTORY,
760 FileHandle
761 ));
762 } else {
763 return (ShellOpenFileByName(DirectoryName,
764 FileHandle,
765 EFI_FILE_MODE_READ | EFI_FILE_MODE_WRITE | EFI_FILE_MODE_CREATE,
766 EFI_FILE_DIRECTORY
767 ));
768 }
769 }
770
771 /**
772 This function reads information from an opened file.
773
774 If FileHandle is not a directory, the function reads the requested number of
775 bytes from the file at the file's current position and returns them in Buffer.
776 If the read goes beyond the end of the file, the read length is truncated to the
777 end of the file. The file's current position is increased by the number of bytes
778 returned. If FileHandle is a directory, the function reads the directory entry
779 at the file's current position and returns the entry in Buffer. If the Buffer
780 is not large enough to hold the current directory entry, then
781 EFI_BUFFER_TOO_SMALL is returned and the current file position is not updated.
782 BufferSize is set to be the size of the buffer needed to read the entry. On
783 success, the current position is updated to the next directory entry. If there
784 are no more directory entries, the read returns a zero-length buffer.
785 EFI_FILE_INFO is the structure returned as the directory entry.
786
787 @param FileHandle the opened file handle
788 @param BufferSize on input the size of buffer in bytes. on return
789 the number of bytes written.
790 @param Buffer the buffer to put read data into.
791
792 @retval EFI_SUCCESS Data was read.
793 @retval EFI_NO_MEDIA The device has no media.
794 @retval EFI_DEVICE_ERROR The device reported an error.
795 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
796 @retval EFI_BUFFER_TO_SMALL Buffer is too small. ReadSize contains required
797 size.
798
799 **/
800 EFI_STATUS
801 EFIAPI
802 ShellReadFile(
803 IN SHELL_FILE_HANDLE FileHandle,
804 IN OUT UINTN *BufferSize,
805 OUT VOID *Buffer
806 )
807 {
808 return (FileFunctionMap.ReadFile(FileHandle, BufferSize, Buffer));
809 }
810
811
812 /**
813 Write data to a file.
814
815 This function writes the specified number of bytes to the file at the current
816 file position. The current file position is advanced the actual number of bytes
817 written, which is returned in BufferSize. Partial writes only occur when there
818 has been a data error during the write attempt (such as "volume space full").
819 The file is automatically grown to hold the data if required. Direct writes to
820 opened directories are not supported.
821
822 @param FileHandle The opened file for writing
823 @param BufferSize on input the number of bytes in Buffer. On output
824 the number of bytes written.
825 @param Buffer the buffer containing data to write is stored.
826
827 @retval EFI_SUCCESS Data was written.
828 @retval EFI_UNSUPPORTED Writes to an open directory are not supported.
829 @retval EFI_NO_MEDIA The device has no media.
830 @retval EFI_DEVICE_ERROR The device reported an error.
831 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
832 @retval EFI_WRITE_PROTECTED The device is write-protected.
833 @retval EFI_ACCESS_DENIED The file was open for read only.
834 @retval EFI_VOLUME_FULL The volume is full.
835 **/
836 EFI_STATUS
837 EFIAPI
838 ShellWriteFile(
839 IN SHELL_FILE_HANDLE FileHandle,
840 IN OUT UINTN *BufferSize,
841 IN VOID *Buffer
842 )
843 {
844 return (FileFunctionMap.WriteFile(FileHandle, BufferSize, Buffer));
845 }
846
847 /**
848 Close an open file handle.
849
850 This function closes a specified file handle. All "dirty" cached file data is
851 flushed to the device, and the file is closed. In all cases the handle is
852 closed.
853
854 @param FileHandle the file handle to close.
855
856 @retval EFI_SUCCESS the file handle was closed sucessfully.
857 **/
858 EFI_STATUS
859 EFIAPI
860 ShellCloseFile (
861 IN SHELL_FILE_HANDLE *FileHandle
862 )
863 {
864 return (FileFunctionMap.CloseFile(*FileHandle));
865 }
866
867 /**
868 Delete a file and close the handle
869
870 This function closes and deletes a file. In all cases the file handle is closed.
871 If the file cannot be deleted, the warning code EFI_WARN_DELETE_FAILURE is
872 returned, but the handle is still closed.
873
874 @param FileHandle the file handle to delete
875
876 @retval EFI_SUCCESS the file was closed sucessfully
877 @retval EFI_WARN_DELETE_FAILURE the handle was closed, but the file was not
878 deleted
879 @retval INVALID_PARAMETER One of the parameters has an invalid value.
880 **/
881 EFI_STATUS
882 EFIAPI
883 ShellDeleteFile (
884 IN SHELL_FILE_HANDLE *FileHandle
885 )
886 {
887 return (FileFunctionMap.DeleteFile(*FileHandle));
888 }
889
890 /**
891 Set the current position in a file.
892
893 This function sets the current file position for the handle to the position
894 supplied. With the exception of seeking to position 0xFFFFFFFFFFFFFFFF, only
895 absolute positioning is supported, and seeking past the end of the file is
896 allowed (a subsequent write would grow the file). Seeking to position
897 0xFFFFFFFFFFFFFFFF causes the current position to be set to the end of the file.
898 If FileHandle is a directory, the only position that may be set is zero. This
899 has the effect of starting the read process of the directory entries over.
900
901 @param FileHandle The file handle on which the position is being set
902 @param Position Byte position from begining of file
903
904 @retval EFI_SUCCESS Operation completed sucessfully.
905 @retval EFI_UNSUPPORTED the seek request for non-zero is not valid on
906 directories.
907 @retval INVALID_PARAMETER One of the parameters has an invalid value.
908 **/
909 EFI_STATUS
910 EFIAPI
911 ShellSetFilePosition (
912 IN SHELL_FILE_HANDLE FileHandle,
913 IN UINT64 Position
914 )
915 {
916 return (FileFunctionMap.SetFilePosition(FileHandle, Position));
917 }
918
919 /**
920 Gets a file's current position
921
922 This function retrieves the current file position for the file handle. For
923 directories, the current file position has no meaning outside of the file
924 system driver and as such the operation is not supported. An error is returned
925 if FileHandle is a directory.
926
927 @param FileHandle The open file handle on which to get the position.
928 @param Position Byte position from begining of file.
929
930 @retval EFI_SUCCESS the operation completed sucessfully.
931 @retval INVALID_PARAMETER One of the parameters has an invalid value.
932 @retval EFI_UNSUPPORTED the request is not valid on directories.
933 **/
934 EFI_STATUS
935 EFIAPI
936 ShellGetFilePosition (
937 IN SHELL_FILE_HANDLE FileHandle,
938 OUT UINT64 *Position
939 )
940 {
941 return (FileFunctionMap.GetFilePosition(FileHandle, Position));
942 }
943 /**
944 Flushes data on a file
945
946 This function flushes all modified data associated with a file to a device.
947
948 @param FileHandle The file handle on which to flush data
949
950 @retval EFI_SUCCESS The data was flushed.
951 @retval EFI_NO_MEDIA The device has no media.
952 @retval EFI_DEVICE_ERROR The device reported an error.
953 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
954 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
955 @retval EFI_ACCESS_DENIED The file was opened for read only.
956 **/
957 EFI_STATUS
958 EFIAPI
959 ShellFlushFile (
960 IN SHELL_FILE_HANDLE FileHandle
961 )
962 {
963 return (FileFunctionMap.FlushFile(FileHandle));
964 }
965
966 /** Retrieve first entry from a directory.
967
968 This function takes an open directory handle and gets information from the
969 first entry in the directory. A buffer is allocated to contain
970 the information and a pointer to the buffer is returned in *Buffer. The
971 caller can use ShellFindNextFile() to get subsequent directory entries.
972
973 The buffer will be freed by ShellFindNextFile() when the last directory
974 entry is read. Otherwise, the caller must free the buffer, using FreePool,
975 when finished with it.
976
977 @param[in] DirHandle The file handle of the directory to search.
978 @param[out] Buffer The pointer to the buffer for the file's information.
979
980 @retval EFI_SUCCESS Found the first file.
981 @retval EFI_NOT_FOUND Cannot find the directory.
982 @retval EFI_NO_MEDIA The device has no media.
983 @retval EFI_DEVICE_ERROR The device reported an error.
984 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
985 @return Others status of ShellGetFileInfo, ShellSetFilePosition,
986 or ShellReadFile
987 **/
988 EFI_STATUS
989 EFIAPI
990 ShellFindFirstFile (
991 IN SHELL_FILE_HANDLE DirHandle,
992 OUT EFI_FILE_INFO **Buffer
993 )
994 {
995 //
996 // pass to file handle lib
997 //
998 return (FileHandleFindFirstFile(DirHandle, Buffer));
999 }
1000 /** Retrieve next entries from a directory.
1001
1002 To use this function, the caller must first call the ShellFindFirstFile()
1003 function to get the first directory entry. Subsequent directory entries are
1004 retrieved by using the ShellFindNextFile() function. This function can
1005 be called several times to get each entry from the directory. If the call of
1006 ShellFindNextFile() retrieved the last directory entry, the next call of
1007 this function will set *NoFile to TRUE and free the buffer.
1008
1009 @param[in] DirHandle The file handle of the directory.
1010 @param[out] Buffer The pointer to buffer for file's information.
1011 @param[out] NoFile The pointer to boolean when last file is found.
1012
1013 @retval EFI_SUCCESS Found the next file, or reached last file
1014 @retval EFI_NO_MEDIA The device has no media.
1015 @retval EFI_DEVICE_ERROR The device reported an error.
1016 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
1017 **/
1018 EFI_STATUS
1019 EFIAPI
1020 ShellFindNextFile(
1021 IN SHELL_FILE_HANDLE DirHandle,
1022 OUT EFI_FILE_INFO *Buffer,
1023 OUT BOOLEAN *NoFile
1024 )
1025 {
1026 //
1027 // pass to file handle lib
1028 //
1029 return (FileHandleFindNextFile(DirHandle, Buffer, NoFile));
1030 }
1031 /**
1032 Retrieve the size of a file.
1033
1034 if FileHandle is NULL then ASSERT()
1035 if Size is NULL then ASSERT()
1036
1037 This function extracts the file size info from the FileHandle's EFI_FILE_INFO
1038 data.
1039
1040 @param FileHandle file handle from which size is retrieved
1041 @param Size pointer to size
1042
1043 @retval EFI_SUCCESS operation was completed sucessfully
1044 @retval EFI_DEVICE_ERROR cannot access the file
1045 **/
1046 EFI_STATUS
1047 EFIAPI
1048 ShellGetFileSize (
1049 IN SHELL_FILE_HANDLE FileHandle,
1050 OUT UINT64 *Size
1051 )
1052 {
1053 return (FileFunctionMap.GetFileSize(FileHandle, Size));
1054 }
1055 /**
1056 Retrieves the status of the break execution flag
1057
1058 this function is useful to check whether the application is being asked to halt by the shell.
1059
1060 @retval TRUE the execution break is enabled
1061 @retval FALSE the execution break is not enabled
1062 **/
1063 BOOLEAN
1064 EFIAPI
1065 ShellGetExecutionBreakFlag(
1066 VOID
1067 )
1068 {
1069 //
1070 // Check for UEFI Shell 2.0 protocols
1071 //
1072 if (gEfiShellProtocol != NULL) {
1073
1074 //
1075 // We are using UEFI Shell 2.0; see if the event has been triggered
1076 //
1077 if (gBS->CheckEvent(gEfiShellProtocol->ExecutionBreak) != EFI_SUCCESS) {
1078 return (FALSE);
1079 }
1080 return (TRUE);
1081 }
1082
1083 //
1084 // using EFI Shell; call the function to check
1085 //
1086 if (mEfiShellEnvironment2 != NULL) {
1087 return (mEfiShellEnvironment2->GetExecutionBreak());
1088 }
1089
1090 return (FALSE);
1091 }
1092 /**
1093 return the value of an environment variable
1094
1095 this function gets the value of the environment variable set by the
1096 ShellSetEnvironmentVariable function
1097
1098 @param EnvKey The key name of the environment variable.
1099
1100 @retval NULL the named environment variable does not exist.
1101 @return != NULL pointer to the value of the environment variable
1102 **/
1103 CONST CHAR16*
1104 EFIAPI
1105 ShellGetEnvironmentVariable (
1106 IN CONST CHAR16 *EnvKey
1107 )
1108 {
1109 //
1110 // Check for UEFI Shell 2.0 protocols
1111 //
1112 if (gEfiShellProtocol != NULL) {
1113 return (gEfiShellProtocol->GetEnv(EnvKey));
1114 }
1115
1116 //
1117 // Check for EFI shell
1118 //
1119 if (mEfiShellEnvironment2 != NULL) {
1120 return (mEfiShellEnvironment2->GetEnv((CHAR16*)EnvKey));
1121 }
1122
1123 return NULL;
1124 }
1125 /**
1126 set the value of an environment variable
1127
1128 This function changes the current value of the specified environment variable. If the
1129 environment variable exists and the Value is an empty string, then the environment
1130 variable is deleted. If the environment variable exists and the Value is not an empty
1131 string, then the value of the environment variable is changed. If the environment
1132 variable does not exist and the Value is an empty string, there is no action. If the
1133 environment variable does not exist and the Value is a non-empty string, then the
1134 environment variable is created and assigned the specified value.
1135
1136 This is not supported pre-UEFI Shell 2.0.
1137
1138 @param EnvKey The key name of the environment variable.
1139 @param EnvVal The Value of the environment variable
1140 @param Volatile Indicates whether the variable is non-volatile (FALSE) or volatile (TRUE).
1141
1142 @retval EFI_SUCCESS the operation was completed sucessfully
1143 @retval EFI_UNSUPPORTED This operation is not allowed in pre UEFI 2.0 Shell environments
1144 **/
1145 EFI_STATUS
1146 EFIAPI
1147 ShellSetEnvironmentVariable (
1148 IN CONST CHAR16 *EnvKey,
1149 IN CONST CHAR16 *EnvVal,
1150 IN BOOLEAN Volatile
1151 )
1152 {
1153 //
1154 // Check for UEFI Shell 2.0 protocols
1155 //
1156 if (gEfiShellProtocol != NULL) {
1157 return (gEfiShellProtocol->SetEnv(EnvKey, EnvVal, Volatile));
1158 }
1159
1160 //
1161 // This feature does not exist under EFI shell
1162 //
1163 return (EFI_UNSUPPORTED);
1164 }
1165
1166 /**
1167 Cause the shell to parse and execute a command line.
1168
1169 This function creates a nested instance of the shell and executes the specified
1170 command (CommandLine) with the specified environment (Environment). Upon return,
1171 the status code returned by the specified command is placed in StatusCode.
1172 If Environment is NULL, then the current environment is used and all changes made
1173 by the commands executed will be reflected in the current environment. If the
1174 Environment is non-NULL, then the changes made will be discarded.
1175 The CommandLine is executed from the current working directory on the current
1176 device.
1177
1178 The EnvironmentVariables pararemeter is ignored in a pre-UEFI Shell 2.0
1179 environment. The values pointed to by the parameters will be unchanged by the
1180 ShellExecute() function. The Output parameter has no effect in a
1181 UEFI Shell 2.0 environment.
1182
1183 @param[in] ParentHandle The parent image starting the operation.
1184 @param[in] CommandLine The pointer to a NULL terminated command line.
1185 @param[in] Output True to display debug output. False to hide it.
1186 @param[in] EnvironmentVariables Optional pointer to array of environment variables
1187 in the form "x=y". If NULL, the current set is used.
1188 @param[out] Status The status of the run command line.
1189
1190 @retval EFI_SUCCESS The operation completed sucessfully. Status
1191 contains the status code returned.
1192 @retval EFI_INVALID_PARAMETER A parameter contains an invalid value.
1193 @retval EFI_OUT_OF_RESOURCES Out of resources.
1194 @retval EFI_UNSUPPORTED The operation is not allowed.
1195 **/
1196 EFI_STATUS
1197 EFIAPI
1198 ShellExecute (
1199 IN EFI_HANDLE *ParentHandle,
1200 IN CHAR16 *CommandLine OPTIONAL,
1201 IN BOOLEAN Output OPTIONAL,
1202 IN CHAR16 **EnvironmentVariables OPTIONAL,
1203 OUT EFI_STATUS *Status OPTIONAL
1204 )
1205 {
1206 EFI_STATUS CmdStatus;
1207 //
1208 // Check for UEFI Shell 2.0 protocols
1209 //
1210 if (gEfiShellProtocol != NULL) {
1211 //
1212 // Call UEFI Shell 2.0 version (not using Output parameter)
1213 //
1214 return (gEfiShellProtocol->Execute(ParentHandle,
1215 CommandLine,
1216 EnvironmentVariables,
1217 Status));
1218 }
1219
1220 //
1221 // Check for EFI shell
1222 //
1223 if (mEfiShellEnvironment2 != NULL) {
1224 //
1225 // Call EFI Shell version.
1226 // Due to oddity in the EFI shell we want to dereference the ParentHandle here
1227 //
1228 CmdStatus = (mEfiShellEnvironment2->Execute(*ParentHandle,
1229 CommandLine,
1230 Output));
1231 //
1232 // No Status output parameter so just use the returned status
1233 //
1234 if (Status != NULL) {
1235 *Status = CmdStatus;
1236 }
1237 //
1238 // If there was an error, we can't tell if it was from the command or from
1239 // the Execute() function, so we'll just assume the shell ran successfully
1240 // and the error came from the command.
1241 //
1242 return EFI_SUCCESS;
1243 }
1244
1245 return (EFI_UNSUPPORTED);
1246 }
1247
1248 /**
1249 Retreives the current directory path
1250
1251 If the DeviceName is NULL, it returns the current device's current directory
1252 name. If the DeviceName is not NULL, it returns the current directory name
1253 on specified drive.
1254
1255 @param DeviceName the name of the drive to get directory on
1256
1257 @retval NULL the directory does not exist
1258 @return != NULL the directory
1259 **/
1260 CONST CHAR16*
1261 EFIAPI
1262 ShellGetCurrentDir (
1263 IN CHAR16 * CONST DeviceName OPTIONAL
1264 )
1265 {
1266 //
1267 // Check for UEFI Shell 2.0 protocols
1268 //
1269 if (gEfiShellProtocol != NULL) {
1270 return (gEfiShellProtocol->GetCurDir(DeviceName));
1271 }
1272
1273 //
1274 // Check for EFI shell
1275 //
1276 if (mEfiShellEnvironment2 != NULL) {
1277 return (mEfiShellEnvironment2->CurDir(DeviceName));
1278 }
1279
1280 return (NULL);
1281 }
1282 /**
1283 sets (enabled or disabled) the page break mode
1284
1285 when page break mode is enabled the screen will stop scrolling
1286 and wait for operator input before scrolling a subsequent screen.
1287
1288 @param CurrentState TRUE to enable and FALSE to disable
1289 **/
1290 VOID
1291 EFIAPI
1292 ShellSetPageBreakMode (
1293 IN BOOLEAN CurrentState
1294 )
1295 {
1296 //
1297 // check for enabling
1298 //
1299 if (CurrentState != 0x00) {
1300 //
1301 // check for UEFI Shell 2.0
1302 //
1303 if (gEfiShellProtocol != NULL) {
1304 //
1305 // Enable with UEFI 2.0 Shell
1306 //
1307 gEfiShellProtocol->EnablePageBreak();
1308 return;
1309 } else {
1310 //
1311 // Check for EFI shell
1312 //
1313 if (mEfiShellEnvironment2 != NULL) {
1314 //
1315 // Enable with EFI Shell
1316 //
1317 mEfiShellEnvironment2->EnablePageBreak (DEFAULT_INIT_ROW, DEFAULT_AUTO_LF);
1318 return;
1319 }
1320 }
1321 } else {
1322 //
1323 // check for UEFI Shell 2.0
1324 //
1325 if (gEfiShellProtocol != NULL) {
1326 //
1327 // Disable with UEFI 2.0 Shell
1328 //
1329 gEfiShellProtocol->DisablePageBreak();
1330 return;
1331 } else {
1332 //
1333 // Check for EFI shell
1334 //
1335 if (mEfiShellEnvironment2 != NULL) {
1336 //
1337 // Disable with EFI Shell
1338 //
1339 mEfiShellEnvironment2->DisablePageBreak ();
1340 return;
1341 }
1342 }
1343 }
1344 }
1345
1346 ///
1347 /// version of EFI_SHELL_FILE_INFO struct, except has no CONST pointers.
1348 /// This allows for the struct to be populated.
1349 ///
1350 typedef struct {
1351 LIST_ENTRY Link;
1352 EFI_STATUS Status;
1353 CHAR16 *FullName;
1354 CHAR16 *FileName;
1355 SHELL_FILE_HANDLE Handle;
1356 EFI_FILE_INFO *Info;
1357 } EFI_SHELL_FILE_INFO_NO_CONST;
1358
1359 /**
1360 Converts a EFI shell list of structures to the coresponding UEFI Shell 2.0 type of list.
1361
1362 if OldStyleFileList is NULL then ASSERT()
1363
1364 this function will convert a SHELL_FILE_ARG based list into a callee allocated
1365 EFI_SHELL_FILE_INFO based list. it is up to the caller to free the memory via
1366 the ShellCloseFileMetaArg function.
1367
1368 @param[in] FileList the EFI shell list type
1369 @param[in, out] ListHead the list to add to
1370
1371 @retval the resultant head of the double linked new format list;
1372 **/
1373 LIST_ENTRY*
1374 EFIAPI
1375 InternalShellConvertFileListType (
1376 IN LIST_ENTRY *FileList,
1377 IN OUT LIST_ENTRY *ListHead
1378 )
1379 {
1380 SHELL_FILE_ARG *OldInfo;
1381 LIST_ENTRY *Link;
1382 EFI_SHELL_FILE_INFO_NO_CONST *NewInfo;
1383
1384 //
1385 // ASSERTs
1386 //
1387 ASSERT(FileList != NULL);
1388 ASSERT(ListHead != NULL);
1389
1390 //
1391 // enumerate through each member of the old list and copy
1392 //
1393 for (Link = FileList->ForwardLink; Link != FileList; Link = Link->ForwardLink) {
1394 OldInfo = CR (Link, SHELL_FILE_ARG, Link, SHELL_FILE_ARG_SIGNATURE);
1395 ASSERT(OldInfo != NULL);
1396
1397 //
1398 // Skip ones that failed to open...
1399 //
1400 if (OldInfo->Status != EFI_SUCCESS) {
1401 continue;
1402 }
1403
1404 //
1405 // make sure the old list was valid
1406 //
1407 ASSERT(OldInfo->Info != NULL);
1408 ASSERT(OldInfo->FullName != NULL);
1409 ASSERT(OldInfo->FileName != NULL);
1410
1411 //
1412 // allocate a new EFI_SHELL_FILE_INFO object
1413 //
1414 NewInfo = AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
1415 if (NewInfo == NULL) {
1416 ShellCloseFileMetaArg((EFI_SHELL_FILE_INFO**)(&ListHead));
1417 ListHead = NULL;
1418 break;
1419 }
1420
1421 //
1422 // copy the simple items
1423 //
1424 NewInfo->Handle = OldInfo->Handle;
1425 NewInfo->Status = OldInfo->Status;
1426
1427 // old shell checks for 0 not NULL
1428 OldInfo->Handle = 0;
1429
1430 //
1431 // allocate new space to copy strings and structure
1432 //
1433 NewInfo->FullName = AllocateZeroPool(StrSize(OldInfo->FullName));
1434 NewInfo->FileName = AllocateZeroPool(StrSize(OldInfo->FileName));
1435 NewInfo->Info = AllocateZeroPool((UINTN)OldInfo->Info->Size);
1436
1437 //
1438 // make sure all the memory allocations were sucessful
1439 //
1440 if (NULL == NewInfo->FullName || NewInfo->FileName == NULL || NewInfo->Info == NULL) {
1441 ShellCloseFileMetaArg((EFI_SHELL_FILE_INFO**)(&ListHead));
1442 ListHead = NULL;
1443 break;
1444 }
1445
1446 //
1447 // Copt the strings and structure
1448 //
1449 StrCpy(NewInfo->FullName, OldInfo->FullName);
1450 StrCpy(NewInfo->FileName, OldInfo->FileName);
1451 gBS->CopyMem (NewInfo->Info, OldInfo->Info, (UINTN)OldInfo->Info->Size);
1452
1453 //
1454 // add that to the list
1455 //
1456 InsertTailList(ListHead, &NewInfo->Link);
1457 }
1458 return (ListHead);
1459 }
1460 /**
1461 Opens a group of files based on a path.
1462
1463 This function uses the Arg to open all the matching files. Each matched
1464 file has a SHELL_FILE_INFO structure to record the file information. These
1465 structures are placed on the list ListHead. Users can get the SHELL_FILE_INFO
1466 structures from ListHead to access each file. This function supports wildcards
1467 and will process '?' and '*' as such. the list must be freed with a call to
1468 ShellCloseFileMetaArg().
1469
1470 If you are NOT appending to an existing list *ListHead must be NULL. If
1471 *ListHead is NULL then it must be callee freed.
1472
1473 @param Arg pointer to path string
1474 @param OpenMode mode to open files with
1475 @param ListHead head of linked list of results
1476
1477 @retval EFI_SUCCESS the operation was sucessful and the list head
1478 contains the list of opened files
1479 @return != EFI_SUCCESS the operation failed
1480
1481 @sa InternalShellConvertFileListType
1482 **/
1483 EFI_STATUS
1484 EFIAPI
1485 ShellOpenFileMetaArg (
1486 IN CHAR16 *Arg,
1487 IN UINT64 OpenMode,
1488 IN OUT EFI_SHELL_FILE_INFO **ListHead
1489 )
1490 {
1491 EFI_STATUS Status;
1492 LIST_ENTRY mOldStyleFileList;
1493
1494 //
1495 // ASSERT that Arg and ListHead are not NULL
1496 //
1497 ASSERT(Arg != NULL);
1498 ASSERT(ListHead != NULL);
1499
1500 //
1501 // Check for UEFI Shell 2.0 protocols
1502 //
1503 if (gEfiShellProtocol != NULL) {
1504 if (*ListHead == NULL) {
1505 *ListHead = (EFI_SHELL_FILE_INFO*)AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
1506 if (*ListHead == NULL) {
1507 return (EFI_OUT_OF_RESOURCES);
1508 }
1509 InitializeListHead(&((*ListHead)->Link));
1510 }
1511 Status = gEfiShellProtocol->OpenFileList(Arg,
1512 OpenMode,
1513 ListHead);
1514 if (EFI_ERROR(Status)) {
1515 gEfiShellProtocol->RemoveDupInFileList(ListHead);
1516 } else {
1517 Status = gEfiShellProtocol->RemoveDupInFileList(ListHead);
1518 }
1519 if (*ListHead != NULL && IsListEmpty(&(*ListHead)->Link)) {
1520 FreePool(*ListHead);
1521 *ListHead = NULL;
1522 return (EFI_NOT_FOUND);
1523 }
1524 return (Status);
1525 }
1526
1527 //
1528 // Check for EFI shell
1529 //
1530 if (mEfiShellEnvironment2 != NULL) {
1531 //
1532 // make sure the list head is initialized
1533 //
1534 InitializeListHead(&mOldStyleFileList);
1535
1536 //
1537 // Get the EFI Shell list of files
1538 //
1539 Status = mEfiShellEnvironment2->FileMetaArg(Arg, &mOldStyleFileList);
1540 if (EFI_ERROR(Status)) {
1541 *ListHead = NULL;
1542 return (Status);
1543 }
1544
1545 if (*ListHead == NULL) {
1546 *ListHead = (EFI_SHELL_FILE_INFO *)AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
1547 if (*ListHead == NULL) {
1548 return (EFI_OUT_OF_RESOURCES);
1549 }
1550 InitializeListHead(&((*ListHead)->Link));
1551 }
1552
1553 //
1554 // Convert that to equivalent of UEFI Shell 2.0 structure
1555 //
1556 InternalShellConvertFileListType(&mOldStyleFileList, &(*ListHead)->Link);
1557
1558 //
1559 // Free the EFI Shell version that was converted.
1560 //
1561 mEfiShellEnvironment2->FreeFileList(&mOldStyleFileList);
1562
1563 if ((*ListHead)->Link.ForwardLink == (*ListHead)->Link.BackLink && (*ListHead)->Link.BackLink == &((*ListHead)->Link)) {
1564 FreePool(*ListHead);
1565 *ListHead = NULL;
1566 Status = EFI_NOT_FOUND;
1567 }
1568 return (Status);
1569 }
1570
1571 return (EFI_UNSUPPORTED);
1572 }
1573 /**
1574 Free the linked list returned from ShellOpenFileMetaArg.
1575
1576 if ListHead is NULL then ASSERT().
1577
1578 @param ListHead the pointer to free.
1579
1580 @retval EFI_SUCCESS the operation was sucessful.
1581 **/
1582 EFI_STATUS
1583 EFIAPI
1584 ShellCloseFileMetaArg (
1585 IN OUT EFI_SHELL_FILE_INFO **ListHead
1586 )
1587 {
1588 LIST_ENTRY *Node;
1589
1590 //
1591 // ASSERT that ListHead is not NULL
1592 //
1593 ASSERT(ListHead != NULL);
1594
1595 //
1596 // Check for UEFI Shell 2.0 protocols
1597 //
1598 if (gEfiShellProtocol != NULL) {
1599 return (gEfiShellProtocol->FreeFileList(ListHead));
1600 } else if (mEfiShellEnvironment2 != NULL) {
1601 //
1602 // Since this is EFI Shell version we need to free our internally made copy
1603 // of the list
1604 //
1605 for ( Node = GetFirstNode(&(*ListHead)->Link)
1606 ; *ListHead != NULL && !IsListEmpty(&(*ListHead)->Link)
1607 ; Node = GetFirstNode(&(*ListHead)->Link)) {
1608 RemoveEntryList(Node);
1609 ((EFI_FILE_PROTOCOL*)((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Handle)->Close(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Handle);
1610 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->FullName);
1611 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->FileName);
1612 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Info);
1613 FreePool((EFI_SHELL_FILE_INFO_NO_CONST*)Node);
1614 }
1615 SHELL_FREE_NON_NULL(*ListHead);
1616 return EFI_SUCCESS;
1617 }
1618
1619 return (EFI_UNSUPPORTED);
1620 }
1621
1622 /**
1623 Find a file by searching the CWD and then the path.
1624
1625 If FileName is NULL then ASSERT.
1626
1627 If the return value is not NULL then the memory must be caller freed.
1628
1629 @param FileName Filename string.
1630
1631 @retval NULL the file was not found
1632 @return !NULL the full path to the file.
1633 **/
1634 CHAR16 *
1635 EFIAPI
1636 ShellFindFilePath (
1637 IN CONST CHAR16 *FileName
1638 )
1639 {
1640 CONST CHAR16 *Path;
1641 SHELL_FILE_HANDLE Handle;
1642 EFI_STATUS Status;
1643 CHAR16 *RetVal;
1644 CHAR16 *TestPath;
1645 CONST CHAR16 *Walker;
1646 UINTN Size;
1647 CHAR16 *TempChar;
1648
1649 RetVal = NULL;
1650
1651 //
1652 // First make sure its not an absolute path.
1653 //
1654 Status = ShellOpenFileByName(FileName, &Handle, EFI_FILE_MODE_READ, 0);
1655 if (!EFI_ERROR(Status)){
1656 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1657 ASSERT(RetVal == NULL);
1658 RetVal = StrnCatGrow(&RetVal, NULL, FileName, 0);
1659 ShellCloseFile(&Handle);
1660 return (RetVal);
1661 } else {
1662 ShellCloseFile(&Handle);
1663 }
1664 }
1665
1666 Path = ShellGetEnvironmentVariable(L"cwd");
1667 if (Path != NULL) {
1668 Size = StrSize(Path);
1669 Size += StrSize(FileName);
1670 TestPath = AllocateZeroPool(Size);
1671 if (TestPath == NULL) {
1672 return (NULL);
1673 }
1674 StrCpy(TestPath, Path);
1675 StrCat(TestPath, FileName);
1676 Status = ShellOpenFileByName(TestPath, &Handle, EFI_FILE_MODE_READ, 0);
1677 if (!EFI_ERROR(Status)){
1678 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1679 ASSERT(RetVal == NULL);
1680 RetVal = StrnCatGrow(&RetVal, NULL, TestPath, 0);
1681 ShellCloseFile(&Handle);
1682 FreePool(TestPath);
1683 return (RetVal);
1684 } else {
1685 ShellCloseFile(&Handle);
1686 }
1687 }
1688 FreePool(TestPath);
1689 }
1690 Path = ShellGetEnvironmentVariable(L"path");
1691 if (Path != NULL) {
1692 Size = StrSize(Path)+sizeof(CHAR16);
1693 Size += StrSize(FileName);
1694 TestPath = AllocateZeroPool(Size);
1695 if (TestPath == NULL) {
1696 return (NULL);
1697 }
1698 Walker = (CHAR16*)Path;
1699 do {
1700 CopyMem(TestPath, Walker, StrSize(Walker));
1701 if (TestPath != NULL) {
1702 TempChar = StrStr(TestPath, L";");
1703 if (TempChar != NULL) {
1704 *TempChar = CHAR_NULL;
1705 }
1706 if (TestPath[StrLen(TestPath)-1] != L'\\') {
1707 StrCat(TestPath, L"\\");
1708 }
1709 if (FileName[0] == L'\\') {
1710 FileName++;
1711 }
1712 StrCat(TestPath, FileName);
1713 if (StrStr(Walker, L";") != NULL) {
1714 Walker = StrStr(Walker, L";") + 1;
1715 } else {
1716 Walker = NULL;
1717 }
1718 Status = ShellOpenFileByName(TestPath, &Handle, EFI_FILE_MODE_READ, 0);
1719 if (!EFI_ERROR(Status)){
1720 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1721 ASSERT(RetVal == NULL);
1722 RetVal = StrnCatGrow(&RetVal, NULL, TestPath, 0);
1723 ShellCloseFile(&Handle);
1724 break;
1725 } else {
1726 ShellCloseFile(&Handle);
1727 }
1728 }
1729 }
1730 } while (Walker != NULL && Walker[0] != CHAR_NULL);
1731 FreePool(TestPath);
1732 }
1733 return (RetVal);
1734 }
1735
1736 /**
1737 Find a file by searching the CWD and then the path with a variable set of file
1738 extensions. If the file is not found it will append each extension in the list
1739 in the order provided and return the first one that is successful.
1740
1741 If FileName is NULL, then ASSERT.
1742 If FileExtension is NULL, then behavior is identical to ShellFindFilePath.
1743
1744 If the return value is not NULL then the memory must be caller freed.
1745
1746 @param[in] FileName Filename string.
1747 @param[in] FileExtension Semi-colon delimeted list of possible extensions.
1748
1749 @retval NULL The file was not found.
1750 @retval !NULL The path to the file.
1751 **/
1752 CHAR16 *
1753 EFIAPI
1754 ShellFindFilePathEx (
1755 IN CONST CHAR16 *FileName,
1756 IN CONST CHAR16 *FileExtension
1757 )
1758 {
1759 CHAR16 *TestPath;
1760 CHAR16 *RetVal;
1761 CONST CHAR16 *ExtensionWalker;
1762 UINTN Size;
1763 CHAR16 *TempChar;
1764 CHAR16 *TempChar2;
1765
1766 ASSERT(FileName != NULL);
1767 if (FileExtension == NULL) {
1768 return (ShellFindFilePath(FileName));
1769 }
1770 RetVal = ShellFindFilePath(FileName);
1771 if (RetVal != NULL) {
1772 return (RetVal);
1773 }
1774 Size = StrSize(FileName);
1775 Size += StrSize(FileExtension);
1776 TestPath = AllocateZeroPool(Size);
1777 if (TestPath == NULL) {
1778 return (NULL);
1779 }
1780 for (ExtensionWalker = FileExtension, TempChar2 = (CHAR16*)FileExtension; TempChar2 != NULL ; ExtensionWalker = TempChar2 + 1){
1781 StrCpy(TestPath, FileName);
1782 if (ExtensionWalker != NULL) {
1783 StrCat(TestPath, ExtensionWalker);
1784 }
1785 TempChar = StrStr(TestPath, L";");
1786 if (TempChar != NULL) {
1787 *TempChar = CHAR_NULL;
1788 }
1789 RetVal = ShellFindFilePath(TestPath);
1790 if (RetVal != NULL) {
1791 break;
1792 }
1793 ASSERT(ExtensionWalker != NULL);
1794 TempChar2 = StrStr(ExtensionWalker, L";");
1795 }
1796 FreePool(TestPath);
1797 return (RetVal);
1798 }
1799
1800 typedef struct {
1801 LIST_ENTRY Link;
1802 CHAR16 *Name;
1803 SHELL_PARAM_TYPE Type;
1804 CHAR16 *Value;
1805 UINTN OriginalPosition;
1806 } SHELL_PARAM_PACKAGE;
1807
1808 /**
1809 Checks the list of valid arguments and returns TRUE if the item was found. If the
1810 return value is TRUE then the type parameter is set also.
1811
1812 if CheckList is NULL then ASSERT();
1813 if Name is NULL then ASSERT();
1814 if Type is NULL then ASSERT();
1815
1816 @param Name pointer to Name of parameter found
1817 @param CheckList List to check against
1818 @param Type pointer to type of parameter if it was found
1819
1820 @retval TRUE the Parameter was found. Type is valid.
1821 @retval FALSE the Parameter was not found. Type is not valid.
1822 **/
1823 BOOLEAN
1824 EFIAPI
1825 InternalIsOnCheckList (
1826 IN CONST CHAR16 *Name,
1827 IN CONST SHELL_PARAM_ITEM *CheckList,
1828 OUT SHELL_PARAM_TYPE *Type
1829 )
1830 {
1831 SHELL_PARAM_ITEM *TempListItem;
1832 CHAR16 *TempString;
1833
1834 //
1835 // ASSERT that all 3 pointer parameters aren't NULL
1836 //
1837 ASSERT(CheckList != NULL);
1838 ASSERT(Type != NULL);
1839 ASSERT(Name != NULL);
1840
1841 //
1842 // question mark and page break mode are always supported
1843 //
1844 if ((StrCmp(Name, L"-?") == 0) ||
1845 (StrCmp(Name, L"-b") == 0)
1846 ) {
1847 *Type = TypeFlag;
1848 return (TRUE);
1849 }
1850
1851 //
1852 // Enumerate through the list
1853 //
1854 for (TempListItem = (SHELL_PARAM_ITEM*)CheckList ; TempListItem->Name != NULL ; TempListItem++) {
1855 //
1856 // If the Type is TypeStart only check the first characters of the passed in param
1857 // If it matches set the type and return TRUE
1858 //
1859 if (TempListItem->Type == TypeStart) {
1860 if (StrnCmp(Name, TempListItem->Name, StrLen(TempListItem->Name)) == 0) {
1861 *Type = TempListItem->Type;
1862 return (TRUE);
1863 }
1864 TempString = NULL;
1865 TempString = StrnCatGrow(&TempString, NULL, Name, StrLen(TempListItem->Name));
1866 if (TempString != NULL) {
1867 if (StringNoCaseCompare(&TempString, &TempListItem->Name) == 0) {
1868 *Type = TempListItem->Type;
1869 FreePool(TempString);
1870 return (TRUE);
1871 }
1872 FreePool(TempString);
1873 }
1874 } else if (StringNoCaseCompare(&Name, &TempListItem->Name) == 0) {
1875 *Type = TempListItem->Type;
1876 return (TRUE);
1877 }
1878 }
1879
1880 return (FALSE);
1881 }
1882 /**
1883 Checks the string for indicators of "flag" status. this is a leading '/', '-', or '+'
1884
1885 @param[in] Name pointer to Name of parameter found
1886 @param[in] AlwaysAllowNumbers TRUE to allow numbers, FALSE to not.
1887
1888 @retval TRUE the Parameter is a flag.
1889 @retval FALSE the Parameter not a flag.
1890 **/
1891 BOOLEAN
1892 EFIAPI
1893 InternalIsFlag (
1894 IN CONST CHAR16 *Name,
1895 IN BOOLEAN AlwaysAllowNumbers
1896 )
1897 {
1898 //
1899 // ASSERT that Name isn't NULL
1900 //
1901 ASSERT(Name != NULL);
1902
1903 //
1904 // If we accept numbers then dont return TRUE. (they will be values)
1905 //
1906 if (((Name[0] == L'-' || Name[0] == L'+') && ShellIsHexaDecimalDigitCharacter(Name[1])) && AlwaysAllowNumbers) {
1907 return (FALSE);
1908 }
1909
1910 //
1911 // If the Name has a /, +, or - as the first character return TRUE
1912 //
1913 if ((Name[0] == L'/') ||
1914 (Name[0] == L'-') ||
1915 (Name[0] == L'+')
1916 ) {
1917 return (TRUE);
1918 }
1919 return (FALSE);
1920 }
1921
1922 /**
1923 Checks the command line arguments passed against the list of valid ones.
1924
1925 If no initialization is required, then return RETURN_SUCCESS.
1926
1927 @param[in] CheckList pointer to list of parameters to check
1928 @param[out] CheckPackage pointer to pointer to list checked values
1929 @param[out] ProblemParam optional pointer to pointer to unicode string for
1930 the paramater that caused failure. If used then the
1931 caller is responsible for freeing the memory.
1932 @param[in] AutoPageBreak will automatically set PageBreakEnabled for "b" parameter
1933 @param[in] Argv pointer to array of parameters
1934 @param[in] Argc Count of parameters in Argv
1935 @param[in] AlwaysAllowNumbers TRUE to allow numbers always, FALSE otherwise.
1936
1937 @retval EFI_SUCCESS The operation completed sucessfully.
1938 @retval EFI_OUT_OF_RESOURCES A memory allocation failed
1939 @retval EFI_INVALID_PARAMETER A parameter was invalid
1940 @retval EFI_VOLUME_CORRUPTED the command line was corrupt. an argument was
1941 duplicated. the duplicated command line argument
1942 was returned in ProblemParam if provided.
1943 @retval EFI_NOT_FOUND a argument required a value that was missing.
1944 the invalid command line argument was returned in
1945 ProblemParam if provided.
1946 **/
1947 EFI_STATUS
1948 EFIAPI
1949 InternalCommandLineParse (
1950 IN CONST SHELL_PARAM_ITEM *CheckList,
1951 OUT LIST_ENTRY **CheckPackage,
1952 OUT CHAR16 **ProblemParam OPTIONAL,
1953 IN BOOLEAN AutoPageBreak,
1954 IN CONST CHAR16 **Argv,
1955 IN UINTN Argc,
1956 IN BOOLEAN AlwaysAllowNumbers
1957 )
1958 {
1959 UINTN LoopCounter;
1960 SHELL_PARAM_TYPE CurrentItemType;
1961 SHELL_PARAM_PACKAGE *CurrentItemPackage;
1962 UINTN GetItemValue;
1963 UINTN ValueSize;
1964 UINTN Count;
1965 CONST CHAR16 *TempPointer;
1966
1967 CurrentItemPackage = NULL;
1968 GetItemValue = 0;
1969 ValueSize = 0;
1970 Count = 0;
1971
1972 //
1973 // If there is only 1 item we dont need to do anything
1974 //
1975 if (Argc < 1) {
1976 *CheckPackage = NULL;
1977 return (EFI_SUCCESS);
1978 }
1979
1980 //
1981 // ASSERTs
1982 //
1983 ASSERT(CheckList != NULL);
1984 ASSERT(Argv != NULL);
1985
1986 //
1987 // initialize the linked list
1988 //
1989 *CheckPackage = (LIST_ENTRY*)AllocateZeroPool(sizeof(LIST_ENTRY));
1990 if (*CheckPackage == NULL) {
1991 return (EFI_OUT_OF_RESOURCES);
1992 }
1993
1994 InitializeListHead(*CheckPackage);
1995
1996 //
1997 // loop through each of the arguments
1998 //
1999 for (LoopCounter = 0 ; LoopCounter < Argc ; ++LoopCounter) {
2000 if (Argv[LoopCounter] == NULL) {
2001 //
2002 // do nothing for NULL argv
2003 //
2004 } else if (InternalIsOnCheckList(Argv[LoopCounter], CheckList, &CurrentItemType)) {
2005 //
2006 // We might have leftover if last parameter didnt have optional value
2007 //
2008 if (GetItemValue != 0) {
2009 GetItemValue = 0;
2010 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2011 }
2012 //
2013 // this is a flag
2014 //
2015 CurrentItemPackage = AllocateZeroPool(sizeof(SHELL_PARAM_PACKAGE));
2016 if (CurrentItemPackage == NULL) {
2017 ShellCommandLineFreeVarList(*CheckPackage);
2018 *CheckPackage = NULL;
2019 return (EFI_OUT_OF_RESOURCES);
2020 }
2021 CurrentItemPackage->Name = AllocateZeroPool(StrSize(Argv[LoopCounter]));
2022 if (CurrentItemPackage->Name == NULL) {
2023 ShellCommandLineFreeVarList(*CheckPackage);
2024 *CheckPackage = NULL;
2025 return (EFI_OUT_OF_RESOURCES);
2026 }
2027 StrCpy(CurrentItemPackage->Name, Argv[LoopCounter]);
2028 CurrentItemPackage->Type = CurrentItemType;
2029 CurrentItemPackage->OriginalPosition = (UINTN)(-1);
2030 CurrentItemPackage->Value = NULL;
2031
2032 //
2033 // Does this flag require a value
2034 //
2035 switch (CurrentItemPackage->Type) {
2036 //
2037 // possibly trigger the next loop(s) to populate the value of this item
2038 //
2039 case TypeValue:
2040 GetItemValue = 1;
2041 ValueSize = 0;
2042 break;
2043 case TypeDoubleValue:
2044 GetItemValue = 2;
2045 ValueSize = 0;
2046 break;
2047 case TypeMaxValue:
2048 GetItemValue = (UINTN)(-1);
2049 ValueSize = 0;
2050 break;
2051 default:
2052 //
2053 // this item has no value expected; we are done
2054 //
2055 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2056 ASSERT(GetItemValue == 0);
2057 break;
2058 }
2059 } else if (GetItemValue != 0 && !InternalIsFlag(Argv[LoopCounter], AlwaysAllowNumbers)) {
2060 ASSERT(CurrentItemPackage != NULL);
2061 //
2062 // get the item VALUE for a previous flag
2063 //
2064 if (StrStr(Argv[LoopCounter], L" ") == NULL) {
2065 CurrentItemPackage->Value = ReallocatePool(ValueSize, ValueSize + StrSize(Argv[LoopCounter]) + sizeof(CHAR16), CurrentItemPackage->Value);
2066 ASSERT(CurrentItemPackage->Value != NULL);
2067 if (ValueSize == 0) {
2068 StrCpy(CurrentItemPackage->Value, Argv[LoopCounter]);
2069 } else {
2070 StrCat(CurrentItemPackage->Value, L" ");
2071 StrCat(CurrentItemPackage->Value, Argv[LoopCounter]);
2072 }
2073 ValueSize += StrSize(Argv[LoopCounter]) + sizeof(CHAR16);
2074 } else {
2075 //
2076 // the parameter has spaces. must be quoted.
2077 //
2078 CurrentItemPackage->Value = ReallocatePool(ValueSize, ValueSize + StrSize(Argv[LoopCounter]) + sizeof(CHAR16) + sizeof(CHAR16) + sizeof(CHAR16), CurrentItemPackage->Value);
2079 ASSERT(CurrentItemPackage->Value != NULL);
2080 if (ValueSize == 0) {
2081 StrCpy(CurrentItemPackage->Value, L"\"");
2082 StrCat(CurrentItemPackage->Value, Argv[LoopCounter]);
2083 StrCat(CurrentItemPackage->Value, L"\"");
2084 } else {
2085 StrCat(CurrentItemPackage->Value, L" ");
2086 StrCat(CurrentItemPackage->Value, L"\"");
2087 StrCat(CurrentItemPackage->Value, Argv[LoopCounter]);
2088 StrCat(CurrentItemPackage->Value, L"\"");
2089 }
2090 ValueSize += StrSize(Argv[LoopCounter]) + sizeof(CHAR16);
2091 }
2092 GetItemValue--;
2093 if (GetItemValue == 0) {
2094 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2095 }
2096 } else if (!InternalIsFlag(Argv[LoopCounter], AlwaysAllowNumbers) ){ //|| ProblemParam == NULL) {
2097 //
2098 // add this one as a non-flag
2099 //
2100
2101 TempPointer = Argv[LoopCounter];
2102 if ((*TempPointer == L'^' && *(TempPointer+1) == L'-')
2103 || (*TempPointer == L'^' && *(TempPointer+1) == L'/')
2104 || (*TempPointer == L'^' && *(TempPointer+1) == L'+')
2105 ){
2106 TempPointer++;
2107 }
2108 CurrentItemPackage = AllocateZeroPool(sizeof(SHELL_PARAM_PACKAGE));
2109 if (CurrentItemPackage == NULL) {
2110 ShellCommandLineFreeVarList(*CheckPackage);
2111 *CheckPackage = NULL;
2112 return (EFI_OUT_OF_RESOURCES);
2113 }
2114 CurrentItemPackage->Name = NULL;
2115 CurrentItemPackage->Type = TypePosition;
2116 CurrentItemPackage->Value = AllocateZeroPool(StrSize(TempPointer));
2117 if (CurrentItemPackage->Value == NULL) {
2118 ShellCommandLineFreeVarList(*CheckPackage);
2119 *CheckPackage = NULL;
2120 return (EFI_OUT_OF_RESOURCES);
2121 }
2122 StrCpy(CurrentItemPackage->Value, TempPointer);
2123 CurrentItemPackage->OriginalPosition = Count++;
2124 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2125 } else {
2126 //
2127 // this was a non-recognised flag... error!
2128 //
2129 if (ProblemParam != NULL) {
2130 *ProblemParam = AllocateZeroPool(StrSize(Argv[LoopCounter]));
2131 if (*ProblemParam != NULL) {
2132 StrCpy(*ProblemParam, Argv[LoopCounter]);
2133 }
2134 }
2135 ShellCommandLineFreeVarList(*CheckPackage);
2136 *CheckPackage = NULL;
2137 return (EFI_VOLUME_CORRUPTED);
2138 }
2139 }
2140 if (GetItemValue != 0) {
2141 GetItemValue = 0;
2142 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2143 }
2144 //
2145 // support for AutoPageBreak
2146 //
2147 if (AutoPageBreak && ShellCommandLineGetFlag(*CheckPackage, L"-b")) {
2148 ShellSetPageBreakMode(TRUE);
2149 }
2150 return (EFI_SUCCESS);
2151 }
2152
2153 /**
2154 Checks the command line arguments passed against the list of valid ones.
2155 Optionally removes NULL values first.
2156
2157 If no initialization is required, then return RETURN_SUCCESS.
2158
2159 @param[in] CheckList The pointer to list of parameters to check.
2160 @param[out] CheckPackage The package of checked values.
2161 @param[out] ProblemParam Optional pointer to pointer to unicode string for
2162 the paramater that caused failure.
2163 @param[in] AutoPageBreak Will automatically set PageBreakEnabled.
2164 @param[in] AlwaysAllowNumbers Will never fail for number based flags.
2165
2166 @retval EFI_SUCCESS The operation completed sucessfully.
2167 @retval EFI_OUT_OF_RESOURCES A memory allocation failed.
2168 @retval EFI_INVALID_PARAMETER A parameter was invalid.
2169 @retval EFI_VOLUME_CORRUPTED The command line was corrupt.
2170 @retval EFI_DEVICE_ERROR The commands contained 2 opposing arguments. One
2171 of the command line arguments was returned in
2172 ProblemParam if provided.
2173 @retval EFI_NOT_FOUND A argument required a value that was missing.
2174 The invalid command line argument was returned in
2175 ProblemParam if provided.
2176 **/
2177 EFI_STATUS
2178 EFIAPI
2179 ShellCommandLineParseEx (
2180 IN CONST SHELL_PARAM_ITEM *CheckList,
2181 OUT LIST_ENTRY **CheckPackage,
2182 OUT CHAR16 **ProblemParam OPTIONAL,
2183 IN BOOLEAN AutoPageBreak,
2184 IN BOOLEAN AlwaysAllowNumbers
2185 )
2186 {
2187 //
2188 // ASSERT that CheckList and CheckPackage aren't NULL
2189 //
2190 ASSERT(CheckList != NULL);
2191 ASSERT(CheckPackage != NULL);
2192
2193 //
2194 // Check for UEFI Shell 2.0 protocols
2195 //
2196 if (gEfiShellParametersProtocol != NULL) {
2197 return (InternalCommandLineParse(CheckList,
2198 CheckPackage,
2199 ProblemParam,
2200 AutoPageBreak,
2201 (CONST CHAR16**) gEfiShellParametersProtocol->Argv,
2202 gEfiShellParametersProtocol->Argc,
2203 AlwaysAllowNumbers));
2204 }
2205
2206 //
2207 // ASSERT That EFI Shell is not required
2208 //
2209 ASSERT (mEfiShellInterface != NULL);
2210 return (InternalCommandLineParse(CheckList,
2211 CheckPackage,
2212 ProblemParam,
2213 AutoPageBreak,
2214 (CONST CHAR16**) mEfiShellInterface->Argv,
2215 mEfiShellInterface->Argc,
2216 AlwaysAllowNumbers));
2217 }
2218
2219 /**
2220 Frees shell variable list that was returned from ShellCommandLineParse.
2221
2222 This function will free all the memory that was used for the CheckPackage
2223 list of postprocessed shell arguments.
2224
2225 this function has no return value.
2226
2227 if CheckPackage is NULL, then return
2228
2229 @param CheckPackage the list to de-allocate
2230 **/
2231 VOID
2232 EFIAPI
2233 ShellCommandLineFreeVarList (
2234 IN LIST_ENTRY *CheckPackage
2235 )
2236 {
2237 LIST_ENTRY *Node;
2238
2239 //
2240 // check for CheckPackage == NULL
2241 //
2242 if (CheckPackage == NULL) {
2243 return;
2244 }
2245
2246 //
2247 // for each node in the list
2248 //
2249 for ( Node = GetFirstNode(CheckPackage)
2250 ; !IsListEmpty(CheckPackage)
2251 ; Node = GetFirstNode(CheckPackage)
2252 ){
2253 //
2254 // Remove it from the list
2255 //
2256 RemoveEntryList(Node);
2257
2258 //
2259 // if it has a name free the name
2260 //
2261 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
2262 FreePool(((SHELL_PARAM_PACKAGE*)Node)->Name);
2263 }
2264
2265 //
2266 // if it has a value free the value
2267 //
2268 if (((SHELL_PARAM_PACKAGE*)Node)->Value != NULL) {
2269 FreePool(((SHELL_PARAM_PACKAGE*)Node)->Value);
2270 }
2271
2272 //
2273 // free the node structure
2274 //
2275 FreePool((SHELL_PARAM_PACKAGE*)Node);
2276 }
2277 //
2278 // free the list head node
2279 //
2280 FreePool(CheckPackage);
2281 }
2282 /**
2283 Checks for presence of a flag parameter
2284
2285 flag arguments are in the form of "-<Key>" or "/<Key>", but do not have a value following the key
2286
2287 if CheckPackage is NULL then return FALSE.
2288 if KeyString is NULL then ASSERT()
2289
2290 @param CheckPackage The package of parsed command line arguments
2291 @param KeyString the Key of the command line argument to check for
2292
2293 @retval TRUE the flag is on the command line
2294 @retval FALSE the flag is not on the command line
2295 **/
2296 BOOLEAN
2297 EFIAPI
2298 ShellCommandLineGetFlag (
2299 IN CONST LIST_ENTRY * CONST CheckPackage,
2300 IN CONST CHAR16 * CONST KeyString
2301 )
2302 {
2303 LIST_ENTRY *Node;
2304 CHAR16 *TempString;
2305
2306 //
2307 // return FALSE for no package or KeyString is NULL
2308 //
2309 if (CheckPackage == NULL || KeyString == NULL) {
2310 return (FALSE);
2311 }
2312
2313 //
2314 // enumerate through the list of parametrs
2315 //
2316 for ( Node = GetFirstNode(CheckPackage)
2317 ; !IsNull (CheckPackage, Node)
2318 ; Node = GetNextNode(CheckPackage, Node)
2319 ){
2320 //
2321 // If the Name matches, return TRUE (and there may be NULL name)
2322 //
2323 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
2324 //
2325 // If Type is TypeStart then only compare the begining of the strings
2326 //
2327 if (((SHELL_PARAM_PACKAGE*)Node)->Type == TypeStart) {
2328 if (StrnCmp(KeyString, ((SHELL_PARAM_PACKAGE*)Node)->Name, StrLen(KeyString)) == 0) {
2329 return (TRUE);
2330 }
2331 TempString = NULL;
2332 TempString = StrnCatGrow(&TempString, NULL, KeyString, StrLen(((SHELL_PARAM_PACKAGE*)Node)->Name));
2333 if (TempString != NULL) {
2334 if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2335 FreePool(TempString);
2336 return (TRUE);
2337 }
2338 FreePool(TempString);
2339 }
2340 } else if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2341 return (TRUE);
2342 }
2343 }
2344 }
2345 return (FALSE);
2346 }
2347 /**
2348 Returns value from command line argument.
2349
2350 Value parameters are in the form of "-<Key> value" or "/<Key> value".
2351
2352 If CheckPackage is NULL, then return NULL.
2353
2354 @param[in] CheckPackage The package of parsed command line arguments.
2355 @param[in] KeyString The Key of the command line argument to check for.
2356
2357 @retval NULL The flag is not on the command line.
2358 @retval !=NULL The pointer to unicode string of the value.
2359 **/
2360 CONST CHAR16*
2361 EFIAPI
2362 ShellCommandLineGetValue (
2363 IN CONST LIST_ENTRY *CheckPackage,
2364 IN CHAR16 *KeyString
2365 )
2366 {
2367 LIST_ENTRY *Node;
2368 CHAR16 *TempString;
2369
2370 //
2371 // return NULL for no package or KeyString is NULL
2372 //
2373 if (CheckPackage == NULL || KeyString == NULL) {
2374 return (NULL);
2375 }
2376
2377 //
2378 // enumerate through the list of parametrs
2379 //
2380 for ( Node = GetFirstNode(CheckPackage)
2381 ; !IsNull (CheckPackage, Node)
2382 ; Node = GetNextNode(CheckPackage, Node)
2383 ){
2384 //
2385 // If the Name matches, return TRUE (and there may be NULL name)
2386 //
2387 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
2388 //
2389 // If Type is TypeStart then only compare the begining of the strings
2390 //
2391 if (((SHELL_PARAM_PACKAGE*)Node)->Type == TypeStart) {
2392 if (StrnCmp(KeyString, ((SHELL_PARAM_PACKAGE*)Node)->Name, StrLen(KeyString)) == 0) {
2393 return (((SHELL_PARAM_PACKAGE*)Node)->Name + StrLen(KeyString));
2394 }
2395 TempString = NULL;
2396 TempString = StrnCatGrow(&TempString, NULL, KeyString, StrLen(((SHELL_PARAM_PACKAGE*)Node)->Name));
2397 if (TempString != NULL) {
2398 if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2399 FreePool(TempString);
2400 return (((SHELL_PARAM_PACKAGE*)Node)->Name + StrLen(KeyString));
2401 }
2402 FreePool(TempString);
2403 }
2404 } else if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2405 return (((SHELL_PARAM_PACKAGE*)Node)->Value);
2406 }
2407 }
2408 }
2409 return (NULL);
2410 }
2411
2412 /**
2413 Returns raw value from command line argument.
2414
2415 Raw value parameters are in the form of "value" in a specific position in the list.
2416
2417 If CheckPackage is NULL, then return NULL.
2418
2419 @param[in] CheckPackage The package of parsed command line arguments.
2420 @param[in] Position The position of the value.
2421
2422 @retval NULL The flag is not on the command line.
2423 @retval !=NULL The pointer to unicode string of the value.
2424 **/
2425 CONST CHAR16*
2426 EFIAPI
2427 ShellCommandLineGetRawValue (
2428 IN CONST LIST_ENTRY * CONST CheckPackage,
2429 IN UINTN Position
2430 )
2431 {
2432 LIST_ENTRY *Node;
2433
2434 //
2435 // check for CheckPackage == NULL
2436 //
2437 if (CheckPackage == NULL) {
2438 return (NULL);
2439 }
2440
2441 //
2442 // enumerate through the list of parametrs
2443 //
2444 for ( Node = GetFirstNode(CheckPackage)
2445 ; !IsNull (CheckPackage, Node)
2446 ; Node = GetNextNode(CheckPackage, Node)
2447 ){
2448 //
2449 // If the position matches, return the value
2450 //
2451 if (((SHELL_PARAM_PACKAGE*)Node)->OriginalPosition == Position) {
2452 return (((SHELL_PARAM_PACKAGE*)Node)->Value);
2453 }
2454 }
2455 return (NULL);
2456 }
2457
2458 /**
2459 returns the number of command line value parameters that were parsed.
2460
2461 this will not include flags.
2462
2463 @param[in] CheckPackage The package of parsed command line arguments.
2464
2465 @retval (UINTN)-1 No parsing has ocurred
2466 @return other The number of value parameters found
2467 **/
2468 UINTN
2469 EFIAPI
2470 ShellCommandLineGetCount(
2471 IN CONST LIST_ENTRY *CheckPackage
2472 )
2473 {
2474 LIST_ENTRY *Node1;
2475 UINTN Count;
2476
2477 if (CheckPackage == NULL) {
2478 return (0);
2479 }
2480 for ( Node1 = GetFirstNode(CheckPackage), Count = 0
2481 ; !IsNull (CheckPackage, Node1)
2482 ; Node1 = GetNextNode(CheckPackage, Node1)
2483 ){
2484 if (((SHELL_PARAM_PACKAGE*)Node1)->Name == NULL) {
2485 Count++;
2486 }
2487 }
2488 return (Count);
2489 }
2490
2491 /**
2492 Determins if a parameter is duplicated.
2493
2494 If Param is not NULL then it will point to a callee allocated string buffer
2495 with the parameter value if a duplicate is found.
2496
2497 If CheckPackage is NULL, then ASSERT.
2498
2499 @param[in] CheckPackage The package of parsed command line arguments.
2500 @param[out] Param Upon finding one, a pointer to the duplicated parameter.
2501
2502 @retval EFI_SUCCESS No parameters were duplicated.
2503 @retval EFI_DEVICE_ERROR A duplicate was found.
2504 **/
2505 EFI_STATUS
2506 EFIAPI
2507 ShellCommandLineCheckDuplicate (
2508 IN CONST LIST_ENTRY *CheckPackage,
2509 OUT CHAR16 **Param
2510 )
2511 {
2512 LIST_ENTRY *Node1;
2513 LIST_ENTRY *Node2;
2514
2515 ASSERT(CheckPackage != NULL);
2516
2517 for ( Node1 = GetFirstNode(CheckPackage)
2518 ; !IsNull (CheckPackage, Node1)
2519 ; Node1 = GetNextNode(CheckPackage, Node1)
2520 ){
2521 for ( Node2 = GetNextNode(CheckPackage, Node1)
2522 ; !IsNull (CheckPackage, Node2)
2523 ; Node2 = GetNextNode(CheckPackage, Node2)
2524 ){
2525 if ((((SHELL_PARAM_PACKAGE*)Node1)->Name != NULL) && (((SHELL_PARAM_PACKAGE*)Node2)->Name != NULL) && StrCmp(((SHELL_PARAM_PACKAGE*)Node1)->Name, ((SHELL_PARAM_PACKAGE*)Node2)->Name) == 0) {
2526 if (Param != NULL) {
2527 *Param = NULL;
2528 *Param = StrnCatGrow(Param, NULL, ((SHELL_PARAM_PACKAGE*)Node1)->Name, 0);
2529 }
2530 return (EFI_DEVICE_ERROR);
2531 }
2532 }
2533 }
2534 return (EFI_SUCCESS);
2535 }
2536
2537 /**
2538 This is a find and replace function. Upon successful return the NewString is a copy of
2539 SourceString with each instance of FindTarget replaced with ReplaceWith.
2540
2541 If SourceString and NewString overlap the behavior is undefined.
2542
2543 If the string would grow bigger than NewSize it will halt and return error.
2544
2545 @param[in] SourceString The string with source buffer.
2546 @param[in, out] NewString The string with resultant buffer.
2547 @param[in] NewSize The size in bytes of NewString.
2548 @param[in] FindTarget The string to look for.
2549 @param[in] ReplaceWith The string to replace FindTarget with.
2550 @param[in] SkipPreCarrot If TRUE will skip a FindTarget that has a '^'
2551 immediately before it.
2552 @param[in] ParameterReplacing If TRUE will add "" around items with spaces.
2553
2554 @retval EFI_INVALID_PARAMETER SourceString was NULL.
2555 @retval EFI_INVALID_PARAMETER NewString was NULL.
2556 @retval EFI_INVALID_PARAMETER FindTarget was NULL.
2557 @retval EFI_INVALID_PARAMETER ReplaceWith was NULL.
2558 @retval EFI_INVALID_PARAMETER FindTarget had length < 1.
2559 @retval EFI_INVALID_PARAMETER SourceString had length < 1.
2560 @retval EFI_BUFFER_TOO_SMALL NewSize was less than the minimum size to hold
2561 the new string (truncation occurred).
2562 @retval EFI_SUCCESS The string was successfully copied with replacement.
2563 **/
2564 EFI_STATUS
2565 EFIAPI
2566 ShellCopySearchAndReplace(
2567 IN CHAR16 CONST *SourceString,
2568 IN OUT CHAR16 *NewString,
2569 IN UINTN NewSize,
2570 IN CONST CHAR16 *FindTarget,
2571 IN CONST CHAR16 *ReplaceWith,
2572 IN CONST BOOLEAN SkipPreCarrot,
2573 IN CONST BOOLEAN ParameterReplacing
2574 )
2575 {
2576 UINTN Size;
2577 CHAR16 *Replace;
2578
2579 if ( (SourceString == NULL)
2580 || (NewString == NULL)
2581 || (FindTarget == NULL)
2582 || (ReplaceWith == NULL)
2583 || (StrLen(FindTarget) < 1)
2584 || (StrLen(SourceString) < 1)
2585 ){
2586 return (EFI_INVALID_PARAMETER);
2587 }
2588 Replace = NULL;
2589 if (StrStr(ReplaceWith, L" ") == NULL || !ParameterReplacing) {
2590 Replace = StrnCatGrow(&Replace, NULL, ReplaceWith, 0);
2591 } else {
2592 Replace = AllocateZeroPool(StrSize(ReplaceWith) + 2*sizeof(CHAR16));
2593 if (Replace != NULL) {
2594 UnicodeSPrint(Replace, StrSize(ReplaceWith) + 2*sizeof(CHAR16), L"\"%s\"", ReplaceWith);
2595 }
2596 }
2597 if (Replace == NULL) {
2598 return (EFI_OUT_OF_RESOURCES);
2599 }
2600 NewString = SetMem16(NewString, NewSize, CHAR_NULL);
2601 while (*SourceString != CHAR_NULL) {
2602 //
2603 // if we find the FindTarget and either Skip == FALSE or Skip and we
2604 // dont have a carrot do a replace...
2605 //
2606 if (StrnCmp(SourceString, FindTarget, StrLen(FindTarget)) == 0
2607 && ((SkipPreCarrot && *(SourceString-1) != L'^') || !SkipPreCarrot)
2608 ){
2609 SourceString += StrLen(FindTarget);
2610 Size = StrSize(NewString);
2611 if ((Size + (StrLen(Replace)*sizeof(CHAR16))) > NewSize) {
2612 FreePool(Replace);
2613 return (EFI_BUFFER_TOO_SMALL);
2614 }
2615 StrCat(NewString, Replace);
2616 } else {
2617 Size = StrSize(NewString);
2618 if (Size + sizeof(CHAR16) > NewSize) {
2619 FreePool(Replace);
2620 return (EFI_BUFFER_TOO_SMALL);
2621 }
2622 StrnCat(NewString, SourceString, 1);
2623 SourceString++;
2624 }
2625 }
2626 FreePool(Replace);
2627 return (EFI_SUCCESS);
2628 }
2629
2630 /**
2631 Internal worker function to output a string.
2632
2633 This function will output a string to the correct StdOut.
2634
2635 @param[in] String The string to print out.
2636
2637 @retval EFI_SUCCESS The operation was sucessful.
2638 @retval !EFI_SUCCESS The operation failed.
2639 **/
2640 EFI_STATUS
2641 EFIAPI
2642 InternalPrintTo (
2643 IN CONST CHAR16 *String
2644 )
2645 {
2646 UINTN Size;
2647 Size = StrSize(String) - sizeof(CHAR16);
2648 if (Size == 0) {
2649 return (EFI_SUCCESS);
2650 }
2651 if (gEfiShellParametersProtocol != NULL) {
2652 return (gEfiShellProtocol->WriteFile(gEfiShellParametersProtocol->StdOut, &Size, (VOID*)String));
2653 }
2654 if (mEfiShellInterface != NULL) {
2655 if (mEfiShellInterface->RedirArgc == 0) {
2656 //
2657 // Divide in half for old shell. Must be string length not size.
2658 //
2659 Size /=2; // Divide in half only when no redirection.
2660 }
2661 return (mEfiShellInterface->StdOut->Write(mEfiShellInterface->StdOut, &Size, (VOID*)String));
2662 }
2663 ASSERT(FALSE);
2664 return (EFI_UNSUPPORTED);
2665 }
2666
2667 /**
2668 Print at a specific location on the screen.
2669
2670 This function will move the cursor to a given screen location and print the specified string
2671
2672 If -1 is specified for either the Row or Col the current screen location for BOTH
2673 will be used.
2674
2675 if either Row or Col is out of range for the current console, then ASSERT
2676 if Format is NULL, then ASSERT
2677
2678 In addition to the standard %-based flags as supported by UefiLib Print() this supports
2679 the following additional flags:
2680 %N - Set output attribute to normal
2681 %H - Set output attribute to highlight
2682 %E - Set output attribute to error
2683 %B - Set output attribute to blue color
2684 %V - Set output attribute to green color
2685
2686 Note: The background color is controlled by the shell command cls.
2687
2688 @param[in] Col the column to print at
2689 @param[in] Row the row to print at
2690 @param[in] Format the format string
2691 @param[in] Marker the marker for the variable argument list
2692
2693 @return EFI_SUCCESS The operation was successful.
2694 @return EFI_DEVICE_ERROR The console device reported an error.
2695 **/
2696 EFI_STATUS
2697 EFIAPI
2698 InternalShellPrintWorker(
2699 IN INT32 Col OPTIONAL,
2700 IN INT32 Row OPTIONAL,
2701 IN CONST CHAR16 *Format,
2702 IN VA_LIST Marker
2703 )
2704 {
2705 EFI_STATUS Status;
2706 CHAR16 *ResumeLocation;
2707 CHAR16 *FormatWalker;
2708 UINTN OriginalAttribute;
2709 CHAR16 *mPostReplaceFormat;
2710 CHAR16 *mPostReplaceFormat2;
2711
2712 mPostReplaceFormat = AllocateZeroPool (PcdGet16 (PcdShellPrintBufferSize));
2713 mPostReplaceFormat2 = AllocateZeroPool (PcdGet16 (PcdShellPrintBufferSize));
2714
2715 if (mPostReplaceFormat == NULL || mPostReplaceFormat2 == NULL) {
2716 SHELL_FREE_NON_NULL(mPostReplaceFormat);
2717 SHELL_FREE_NON_NULL(mPostReplaceFormat2);
2718 return (EFI_OUT_OF_RESOURCES);
2719 }
2720
2721 Status = EFI_SUCCESS;
2722 OriginalAttribute = gST->ConOut->Mode->Attribute;
2723
2724 //
2725 // Back and forth each time fixing up 1 of our flags...
2726 //
2727 Status = ShellCopySearchAndReplace(Format, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%N", L"%%N", FALSE, FALSE);
2728 ASSERT_EFI_ERROR(Status);
2729 Status = ShellCopySearchAndReplace(mPostReplaceFormat, mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), L"%E", L"%%E", FALSE, FALSE);
2730 ASSERT_EFI_ERROR(Status);
2731 Status = ShellCopySearchAndReplace(mPostReplaceFormat2, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%H", L"%%H", FALSE, FALSE);
2732 ASSERT_EFI_ERROR(Status);
2733 Status = ShellCopySearchAndReplace(mPostReplaceFormat, mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), L"%B", L"%%B", FALSE, FALSE);
2734 ASSERT_EFI_ERROR(Status);
2735 Status = ShellCopySearchAndReplace(mPostReplaceFormat2, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%V", L"%%V", FALSE, FALSE);
2736 ASSERT_EFI_ERROR(Status);
2737
2738 //
2739 // Use the last buffer from replacing to print from...
2740 //
2741 UnicodeVSPrint (mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), mPostReplaceFormat, Marker);
2742
2743 if (Col != -1 && Row != -1) {
2744 Status = gST->ConOut->SetCursorPosition(gST->ConOut, Col, Row);
2745 }
2746
2747 FormatWalker = mPostReplaceFormat2;
2748 while (*FormatWalker != CHAR_NULL) {
2749 //
2750 // Find the next attribute change request
2751 //
2752 ResumeLocation = StrStr(FormatWalker, L"%");
2753 if (ResumeLocation != NULL) {
2754 *ResumeLocation = CHAR_NULL;
2755 }
2756 //
2757 // print the current FormatWalker string
2758 //
2759 if (StrLen(FormatWalker)>0) {
2760 Status = InternalPrintTo(FormatWalker);
2761 if (EFI_ERROR(Status)) {
2762 break;
2763 }
2764 }
2765
2766 //
2767 // update the attribute
2768 //
2769 if (ResumeLocation != NULL) {
2770 if (*(ResumeLocation-1) == L'^') {
2771 //
2772 // Move cursor back 1 position to overwrite the ^
2773 //
2774 gST->ConOut->SetCursorPosition(gST->ConOut, gST->ConOut->Mode->CursorColumn - 1, gST->ConOut->Mode->CursorRow);
2775
2776 //
2777 // Print a simple '%' symbol
2778 //
2779 Status = InternalPrintTo(L"%");
2780 ResumeLocation = ResumeLocation - 1;
2781 } else {
2782 switch (*(ResumeLocation+1)) {
2783 case (L'N'):
2784 gST->ConOut->SetAttribute(gST->ConOut, OriginalAttribute);
2785 break;
2786 case (L'E'):
2787 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_YELLOW, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2788 break;
2789 case (L'H'):
2790 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_WHITE, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2791 break;
2792 case (L'B'):
2793 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_BLUE, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2794 break;
2795 case (L'V'):
2796 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_GREEN, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2797 break;
2798 default:
2799 //
2800 // Print a simple '%' symbol
2801 //
2802 Status = InternalPrintTo(L"%");
2803 if (EFI_ERROR(Status)) {
2804 break;
2805 }
2806 ResumeLocation = ResumeLocation - 1;
2807 break;
2808 }
2809 }
2810 } else {
2811 //
2812 // reset to normal now...
2813 //
2814 break;
2815 }
2816
2817 //
2818 // update FormatWalker to Resume + 2 (skip the % and the indicator)
2819 //
2820 FormatWalker = ResumeLocation + 2;
2821 }
2822
2823 gST->ConOut->SetAttribute(gST->ConOut, OriginalAttribute);
2824
2825 SHELL_FREE_NON_NULL(mPostReplaceFormat);
2826 SHELL_FREE_NON_NULL(mPostReplaceFormat2);
2827 return (Status);
2828 }
2829
2830 /**
2831 Print at a specific location on the screen.
2832
2833 This function will move the cursor to a given screen location and print the specified string.
2834
2835 If -1 is specified for either the Row or Col the current screen location for BOTH
2836 will be used.
2837
2838 If either Row or Col is out of range for the current console, then ASSERT.
2839 If Format is NULL, then ASSERT.
2840
2841 In addition to the standard %-based flags as supported by UefiLib Print() this supports
2842 the following additional flags:
2843 %N - Set output attribute to normal
2844 %H - Set output attribute to highlight
2845 %E - Set output attribute to error
2846 %B - Set output attribute to blue color
2847 %V - Set output attribute to green color
2848
2849 Note: The background color is controlled by the shell command cls.
2850
2851 @param[in] Col the column to print at
2852 @param[in] Row the row to print at
2853 @param[in] Format the format string
2854 @param[in] ... The variable argument list.
2855
2856 @return EFI_SUCCESS The printing was successful.
2857 @return EFI_DEVICE_ERROR The console device reported an error.
2858 **/
2859 EFI_STATUS
2860 EFIAPI
2861 ShellPrintEx(
2862 IN INT32 Col OPTIONAL,
2863 IN INT32 Row OPTIONAL,
2864 IN CONST CHAR16 *Format,
2865 ...
2866 )
2867 {
2868 VA_LIST Marker;
2869 EFI_STATUS RetVal;
2870 if (Format == NULL) {
2871 return (EFI_INVALID_PARAMETER);
2872 }
2873 VA_START (Marker, Format);
2874 RetVal = InternalShellPrintWorker(Col, Row, Format, Marker);
2875 VA_END(Marker);
2876 return(RetVal);
2877 }
2878
2879 /**
2880 Print at a specific location on the screen.
2881
2882 This function will move the cursor to a given screen location and print the specified string.
2883
2884 If -1 is specified for either the Row or Col the current screen location for BOTH
2885 will be used.
2886
2887 If either Row or Col is out of range for the current console, then ASSERT.
2888 If Format is NULL, then ASSERT.
2889
2890 In addition to the standard %-based flags as supported by UefiLib Print() this supports
2891 the following additional flags:
2892 %N - Set output attribute to normal.
2893 %H - Set output attribute to highlight.
2894 %E - Set output attribute to error.
2895 %B - Set output attribute to blue color.
2896 %V - Set output attribute to green color.
2897
2898 Note: The background color is controlled by the shell command cls.
2899
2900 @param[in] Col The column to print at.
2901 @param[in] Row The row to print at.
2902 @param[in] Language The language of the string to retrieve. If this parameter
2903 is NULL, then the current platform language is used.
2904 @param[in] HiiFormatStringId The format string Id for getting from Hii.
2905 @param[in] HiiFormatHandle The format string Handle for getting from Hii.
2906 @param[in] ... The variable argument list.
2907
2908 @return EFI_SUCCESS The printing was successful.
2909 @return EFI_DEVICE_ERROR The console device reported an error.
2910 **/
2911 EFI_STATUS
2912 EFIAPI
2913 ShellPrintHiiEx(
2914 IN INT32 Col OPTIONAL,
2915 IN INT32 Row OPTIONAL,
2916 IN CONST CHAR8 *Language OPTIONAL,
2917 IN CONST EFI_STRING_ID HiiFormatStringId,
2918 IN CONST EFI_HANDLE HiiFormatHandle,
2919 ...
2920 )
2921 {
2922 VA_LIST Marker;
2923 CHAR16 *HiiFormatString;
2924 EFI_STATUS RetVal;
2925
2926 VA_START (Marker, HiiFormatHandle);
2927 HiiFormatString = HiiGetString(HiiFormatHandle, HiiFormatStringId, Language);
2928 ASSERT(HiiFormatString != NULL);
2929
2930 RetVal = InternalShellPrintWorker(Col, Row, HiiFormatString, Marker);
2931
2932 SHELL_FREE_NON_NULL(HiiFormatString);
2933 VA_END(Marker);
2934
2935 return (RetVal);
2936 }
2937
2938 /**
2939 Function to determine if a given filename represents a file or a directory.
2940
2941 @param[in] DirName Path to directory to test.
2942
2943 @retval EFI_SUCCESS The Path represents a directory
2944 @retval EFI_NOT_FOUND The Path does not represent a directory
2945 @retval EFI_OUT_OF_RESOURCES A memory allocation failed.
2946 @return The path failed to open
2947 **/
2948 EFI_STATUS
2949 EFIAPI
2950 ShellIsDirectory(
2951 IN CONST CHAR16 *DirName
2952 )
2953 {
2954 EFI_STATUS Status;
2955 SHELL_FILE_HANDLE Handle;
2956 CHAR16 *TempLocation;
2957 CHAR16 *TempLocation2;
2958
2959 ASSERT(DirName != NULL);
2960
2961 Handle = NULL;
2962 TempLocation = NULL;
2963
2964 Status = ShellOpenFileByName(DirName, &Handle, EFI_FILE_MODE_READ, 0);
2965 if (EFI_ERROR(Status)) {
2966 //
2967 // try good logic first.
2968 //
2969 if (gEfiShellProtocol != NULL) {
2970 TempLocation = StrnCatGrow(&TempLocation, NULL, DirName, 0);
2971 if (TempLocation == NULL) {
2972 ShellCloseFile(&Handle);
2973 return (EFI_OUT_OF_RESOURCES);
2974 }
2975 TempLocation2 = StrStr(TempLocation, L":");
2976 if (TempLocation2 != NULL && StrLen(StrStr(TempLocation, L":")) == 2) {
2977 *(TempLocation2+1) = CHAR_NULL;
2978 }
2979 if (gEfiShellProtocol->GetDevicePathFromMap(TempLocation) != NULL) {
2980 FreePool(TempLocation);
2981 return (EFI_SUCCESS);
2982 }
2983 FreePool(TempLocation);
2984 } else {
2985 //
2986 // probably a map name?!?!!?
2987 //
2988 TempLocation = StrStr(DirName, L"\\");
2989 if (TempLocation != NULL && *(TempLocation+1) == CHAR_NULL) {
2990 return (EFI_SUCCESS);
2991 }
2992 }
2993 return (Status);
2994 }
2995
2996 if (FileHandleIsDirectory(Handle) == EFI_SUCCESS) {
2997 ShellCloseFile(&Handle);
2998 return (EFI_SUCCESS);
2999 }
3000 ShellCloseFile(&Handle);
3001 return (EFI_NOT_FOUND);
3002 }
3003
3004 /**
3005 Function to determine if a given filename represents a file.
3006
3007 @param[in] Name Path to file to test.
3008
3009 @retval EFI_SUCCESS The Path represents a file.
3010 @retval EFI_NOT_FOUND The Path does not represent a file.
3011 @retval other The path failed to open.
3012 **/
3013 EFI_STATUS
3014 EFIAPI
3015 ShellIsFile(
3016 IN CONST CHAR16 *Name
3017 )
3018 {
3019 EFI_STATUS Status;
3020 SHELL_FILE_HANDLE Handle;
3021
3022 ASSERT(Name != NULL);
3023
3024 Handle = NULL;
3025
3026 Status = ShellOpenFileByName(Name, &Handle, EFI_FILE_MODE_READ, 0);
3027 if (EFI_ERROR(Status)) {
3028 return (Status);
3029 }
3030
3031 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
3032 ShellCloseFile(&Handle);
3033 return (EFI_SUCCESS);
3034 }
3035 ShellCloseFile(&Handle);
3036 return (EFI_NOT_FOUND);
3037 }
3038
3039 /**
3040 Function to determine if a given filename represents a file.
3041
3042 This will search the CWD and then the Path.
3043
3044 If Name is NULL, then ASSERT.
3045
3046 @param[in] Name Path to file to test.
3047
3048 @retval EFI_SUCCESS The Path represents a file.
3049 @retval EFI_NOT_FOUND The Path does not represent a file.
3050 @retval other The path failed to open.
3051 **/
3052 EFI_STATUS
3053 EFIAPI
3054 ShellIsFileInPath(
3055 IN CONST CHAR16 *Name
3056 )
3057 {
3058 CHAR16 *NewName;
3059 EFI_STATUS Status;
3060
3061 if (!EFI_ERROR(ShellIsFile(Name))) {
3062 return (EFI_SUCCESS);
3063 }
3064
3065 NewName = ShellFindFilePath(Name);
3066 if (NewName == NULL) {
3067 return (EFI_NOT_FOUND);
3068 }
3069 Status = ShellIsFile(NewName);
3070 FreePool(NewName);
3071 return (Status);
3072 }
3073
3074 /**
3075 Function return the number converted from a hex representation of a number.
3076
3077 Note: this function cannot be used when (UINTN)(-1), (0xFFFFFFFF) may be a valid
3078 result. Use ShellConvertStringToUint64 instead.
3079
3080 @param[in] String String representation of a number.
3081
3082 @return The unsigned integer result of the conversion.
3083 @retval (UINTN)(-1) An error occured.
3084 **/
3085 UINTN
3086 EFIAPI
3087 ShellHexStrToUintn(
3088 IN CONST CHAR16 *String
3089 )
3090 {
3091 UINT64 RetVal;
3092
3093 if (!EFI_ERROR(ShellConvertStringToUint64(String, &RetVal, TRUE, TRUE))) {
3094 return ((UINTN)RetVal);
3095 }
3096
3097 return ((UINTN)(-1));
3098 }
3099
3100 /**
3101 Function to determine whether a string is decimal or hex representation of a number
3102 and return the number converted from the string. Spaces are always skipped.
3103
3104 @param[in] String String representation of a number
3105
3106 @return the number
3107 @retval (UINTN)(-1) An error ocurred.
3108 **/
3109 UINTN
3110 EFIAPI
3111 ShellStrToUintn(
3112 IN CONST CHAR16 *String
3113 )
3114 {
3115 UINT64 RetVal;
3116 BOOLEAN Hex;
3117
3118 Hex = FALSE;
3119
3120 if (!InternalShellIsHexOrDecimalNumber(String, Hex, TRUE)) {
3121 Hex = TRUE;
3122 }
3123
3124 if (!EFI_ERROR(ShellConvertStringToUint64(String, &RetVal, Hex, TRUE))) {
3125 return ((UINTN)RetVal);
3126 }
3127 return ((UINTN)(-1));
3128 }
3129
3130 /**
3131 Safely append with automatic string resizing given length of Destination and
3132 desired length of copy from Source.
3133
3134 append the first D characters of Source to the end of Destination, where D is
3135 the lesser of Count and the StrLen() of Source. If appending those D characters
3136 will fit within Destination (whose Size is given as CurrentSize) and
3137 still leave room for a NULL terminator, then those characters are appended,
3138 starting at the original terminating NULL of Destination, and a new terminating
3139 NULL is appended.
3140
3141 If appending D characters onto Destination will result in a overflow of the size
3142 given in CurrentSize the string will be grown such that the copy can be performed
3143 and CurrentSize will be updated to the new size.
3144
3145 If Source is NULL, there is nothing to append, just return the current buffer in
3146 Destination.
3147
3148 if Destination is NULL, then ASSERT()
3149 if Destination's current length (including NULL terminator) is already more then
3150 CurrentSize, then ASSERT()
3151
3152 @param[in, out] Destination The String to append onto
3153 @param[in, out] CurrentSize on call the number of bytes in Destination. On
3154 return possibly the new size (still in bytes). if NULL
3155 then allocate whatever is needed.
3156 @param[in] Source The String to append from
3157 @param[in] Count Maximum number of characters to append. if 0 then
3158 all are appended.
3159
3160 @return Destination return the resultant string.
3161 **/
3162 CHAR16*
3163 EFIAPI
3164 StrnCatGrow (
3165 IN OUT CHAR16 **Destination,
3166 IN OUT UINTN *CurrentSize,
3167 IN CONST CHAR16 *Source,
3168 IN UINTN Count
3169 )
3170 {
3171 UINTN DestinationStartSize;
3172 UINTN NewSize;
3173
3174 //
3175 // ASSERTs
3176 //
3177 ASSERT(Destination != NULL);
3178
3179 //
3180 // If there's nothing to do then just return Destination
3181 //
3182 if (Source == NULL) {
3183 return (*Destination);
3184 }
3185
3186 //
3187 // allow for un-initialized pointers, based on size being 0
3188 //
3189 if (CurrentSize != NULL && *CurrentSize == 0) {
3190 *Destination = NULL;
3191 }
3192
3193 //
3194 // allow for NULL pointers address as Destination
3195 //
3196 if (*Destination != NULL) {
3197 ASSERT(CurrentSize != 0);
3198 DestinationStartSize = StrSize(*Destination);
3199 ASSERT(DestinationStartSize <= *CurrentSize);
3200 } else {
3201 DestinationStartSize = 0;
3202 // ASSERT(*CurrentSize == 0);
3203 }
3204
3205 //
3206 // Append all of Source?
3207 //
3208 if (Count == 0) {
3209 Count = StrLen(Source);
3210 }
3211
3212 //
3213 // Test and grow if required
3214 //
3215 if (CurrentSize != NULL) {
3216 NewSize = *CurrentSize;
3217 if (NewSize < DestinationStartSize + (Count * sizeof(CHAR16))) {
3218 while (NewSize < (DestinationStartSize + (Count*sizeof(CHAR16)))) {
3219 NewSize += 2 * Count * sizeof(CHAR16);
3220 }
3221 *Destination = ReallocatePool(*CurrentSize, NewSize, *Destination);
3222 *CurrentSize = NewSize;
3223 }
3224 } else {
3225 *Destination = AllocateZeroPool((Count+1)*sizeof(CHAR16));
3226 }
3227
3228 //
3229 // Now use standard StrnCat on a big enough buffer
3230 //
3231 if (*Destination == NULL) {
3232 return (NULL);
3233 }
3234 return StrnCat(*Destination, Source, Count);
3235 }
3236
3237 /**
3238 Prompt the user and return the resultant answer to the requestor.
3239
3240 This function will display the requested question on the shell prompt and then
3241 wait for an apropriate answer to be input from the console.
3242
3243 if the SHELL_PROMPT_REQUEST_TYPE is SHELL_PROMPT_REQUEST_TYPE_YESNO, ShellPromptResponseTypeQuitContinue
3244 or SHELL_PROMPT_REQUEST_TYPE_YESNOCANCEL then *Response is of type SHELL_PROMPT_RESPONSE.
3245
3246 if the SHELL_PROMPT_REQUEST_TYPE is ShellPromptResponseTypeFreeform then *Response is of type
3247 CHAR16*.
3248
3249 In either case *Response must be callee freed if Response was not NULL;
3250
3251 @param Type What type of question is asked. This is used to filter the input
3252 to prevent invalid answers to question.
3253 @param Prompt Pointer to string prompt to use to request input.
3254 @param Response Pointer to Response which will be populated upon return.
3255
3256 @retval EFI_SUCCESS The operation was sucessful.
3257 @retval EFI_UNSUPPORTED The operation is not supported as requested.
3258 @retval EFI_INVALID_PARAMETER A parameter was invalid.
3259 @return other The operation failed.
3260 **/
3261 EFI_STATUS
3262 EFIAPI
3263 ShellPromptForResponse (
3264 IN SHELL_PROMPT_REQUEST_TYPE Type,
3265 IN CHAR16 *Prompt OPTIONAL,
3266 IN OUT VOID **Response OPTIONAL
3267 )
3268 {
3269 EFI_STATUS Status;
3270 EFI_INPUT_KEY Key;
3271 UINTN EventIndex;
3272 SHELL_PROMPT_RESPONSE *Resp;
3273 UINTN Size;
3274 CHAR16 *Buffer;
3275
3276 Status = EFI_UNSUPPORTED;
3277 Resp = NULL;
3278 Buffer = NULL;
3279 Size = 0;
3280 if (Type != ShellPromptResponseTypeFreeform) {
3281 Resp = (SHELL_PROMPT_RESPONSE*)AllocateZeroPool(sizeof(SHELL_PROMPT_RESPONSE));
3282 if (Resp == NULL) {
3283 return (EFI_OUT_OF_RESOURCES);
3284 }
3285 }
3286
3287 switch(Type) {
3288 case ShellPromptResponseTypeQuitContinue:
3289 if (Prompt != NULL) {
3290 ShellPrintEx(-1, -1, L"%s", Prompt);
3291 }
3292 //
3293 // wait for valid response
3294 //
3295 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3296 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3297 if (EFI_ERROR(Status)) {
3298 break;
3299 }
3300 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3301 if (Key.UnicodeChar == L'Q' || Key.UnicodeChar ==L'q') {
3302 *Resp = ShellPromptResponseQuit;
3303 } else {
3304 *Resp = ShellPromptResponseContinue;
3305 }
3306 break;
3307 case ShellPromptResponseTypeYesNoCancel:
3308 if (Prompt != NULL) {
3309 ShellPrintEx(-1, -1, L"%s", Prompt);
3310 }
3311 //
3312 // wait for valid response
3313 //
3314 *Resp = ShellPromptResponseMax;
3315 while (*Resp == ShellPromptResponseMax) {
3316 if (ShellGetExecutionBreakFlag()) {
3317 Status = EFI_ABORTED;
3318 break;
3319 }
3320 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3321 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3322 if (EFI_ERROR(Status)) {
3323 break;
3324 }
3325 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3326 switch (Key.UnicodeChar) {
3327 case L'Y':
3328 case L'y':
3329 *Resp = ShellPromptResponseYes;
3330 break;
3331 case L'N':
3332 case L'n':
3333 *Resp = ShellPromptResponseNo;
3334 break;
3335 case L'C':
3336 case L'c':
3337 *Resp = ShellPromptResponseCancel;
3338 break;
3339 }
3340 }
3341 break; case ShellPromptResponseTypeYesNoAllCancel:
3342 if (Prompt != NULL) {
3343 ShellPrintEx(-1, -1, L"%s", Prompt);
3344 }
3345 //
3346 // wait for valid response
3347 //
3348 *Resp = ShellPromptResponseMax;
3349 while (*Resp == ShellPromptResponseMax) {
3350 if (ShellGetExecutionBreakFlag()) {
3351 Status = EFI_ABORTED;
3352 break;
3353 }
3354 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3355 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3356 if (EFI_ERROR(Status)) {
3357 break;
3358 }
3359 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3360 switch (Key.UnicodeChar) {
3361 case L'Y':
3362 case L'y':
3363 *Resp = ShellPromptResponseYes;
3364 break;
3365 case L'N':
3366 case L'n':
3367 *Resp = ShellPromptResponseNo;
3368 break;
3369 case L'A':
3370 case L'a':
3371 *Resp = ShellPromptResponseAll;
3372 break;
3373 case L'C':
3374 case L'c':
3375 *Resp = ShellPromptResponseCancel;
3376 break;
3377 }
3378 }
3379 break;
3380 case ShellPromptResponseTypeEnterContinue:
3381 case ShellPromptResponseTypeAnyKeyContinue:
3382 if (Prompt != NULL) {
3383 ShellPrintEx(-1, -1, L"%s", Prompt);
3384 }
3385 //
3386 // wait for valid response
3387 //
3388 *Resp = ShellPromptResponseMax;
3389 while (*Resp == ShellPromptResponseMax) {
3390 if (ShellGetExecutionBreakFlag()) {
3391 Status = EFI_ABORTED;
3392 break;
3393 }
3394 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3395 if (Type == ShellPromptResponseTypeEnterContinue) {
3396 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3397 if (EFI_ERROR(Status)) {
3398 break;
3399 }
3400 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3401 if (Key.UnicodeChar == CHAR_CARRIAGE_RETURN) {
3402 *Resp = ShellPromptResponseContinue;
3403 break;
3404 }
3405 }
3406 if (Type == ShellPromptResponseTypeAnyKeyContinue) {
3407 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3408 ASSERT_EFI_ERROR(Status);
3409 *Resp = ShellPromptResponseContinue;
3410 break;
3411 }
3412 }
3413 break;
3414 case ShellPromptResponseTypeYesNo:
3415 if (Prompt != NULL) {
3416 ShellPrintEx(-1, -1, L"%s", Prompt);
3417 }
3418 //
3419 // wait for valid response
3420 //
3421 *Resp = ShellPromptResponseMax;
3422 while (*Resp == ShellPromptResponseMax) {
3423 if (ShellGetExecutionBreakFlag()) {
3424 Status = EFI_ABORTED;
3425 break;
3426 }
3427 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3428 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3429 if (EFI_ERROR(Status)) {
3430 break;
3431 }
3432 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3433 switch (Key.UnicodeChar) {
3434 case L'Y':
3435 case L'y':
3436 *Resp = ShellPromptResponseYes;
3437 break;
3438 case L'N':
3439 case L'n':
3440 *Resp = ShellPromptResponseNo;
3441 break;
3442 }
3443 }
3444 break;
3445 case ShellPromptResponseTypeFreeform:
3446 if (Prompt != NULL) {
3447 ShellPrintEx(-1, -1, L"%s", Prompt);
3448 }
3449 while(1) {
3450 if (ShellGetExecutionBreakFlag()) {
3451 Status = EFI_ABORTED;
3452 break;
3453 }
3454 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3455 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3456 if (EFI_ERROR(Status)) {
3457 break;
3458 }
3459 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3460 if (Key.UnicodeChar == CHAR_CARRIAGE_RETURN) {
3461 break;
3462 }
3463 ASSERT((Buffer == NULL && Size == 0) || (Buffer != NULL));
3464 StrnCatGrow(&Buffer, &Size, &Key.UnicodeChar, 1);
3465 }
3466 break;
3467 //
3468 // This is the location to add new prompt types.
3469 // If your new type loops remember to add ExecutionBreak support.
3470 //
3471 default:
3472 ASSERT(FALSE);
3473 }
3474
3475 if (Response != NULL) {
3476 if (Resp != NULL) {
3477 *Response = Resp;
3478 } else if (Buffer != NULL) {
3479 *Response = Buffer;
3480 }
3481 } else {
3482 if (Resp != NULL) {
3483 FreePool(Resp);
3484 }
3485 if (Buffer != NULL) {
3486 FreePool(Buffer);
3487 }
3488 }
3489
3490 ShellPrintEx(-1, -1, L"\r\n");
3491 return (Status);
3492 }
3493
3494 /**
3495 Prompt the user and return the resultant answer to the requestor.
3496
3497 This function is the same as ShellPromptForResponse, except that the prompt is
3498 automatically pulled from HII.
3499
3500 @param Type What type of question is asked. This is used to filter the input
3501 to prevent invalid answers to question.
3502 @param[in] HiiFormatStringId The format string Id for getting from Hii.
3503 @param[in] HiiFormatHandle The format string Handle for getting from Hii.
3504 @param Response Pointer to Response which will be populated upon return.
3505
3506 @retval EFI_SUCCESS the operation was sucessful.
3507 @return other the operation failed.
3508
3509 @sa ShellPromptForResponse
3510 **/
3511 EFI_STATUS
3512 EFIAPI
3513 ShellPromptForResponseHii (
3514 IN SHELL_PROMPT_REQUEST_TYPE Type,
3515 IN CONST EFI_STRING_ID HiiFormatStringId,
3516 IN CONST EFI_HANDLE HiiFormatHandle,
3517 IN OUT VOID **Response
3518 )
3519 {
3520 CHAR16 *Prompt;
3521 EFI_STATUS Status;
3522
3523 Prompt = HiiGetString(HiiFormatHandle, HiiFormatStringId, NULL);
3524 Status = ShellPromptForResponse(Type, Prompt, Response);
3525 FreePool(Prompt);
3526 return (Status);
3527 }
3528
3529 /**
3530 Function to determin if an entire string is a valid number.
3531
3532 If Hex it must be preceeded with a 0x or has ForceHex, set TRUE.
3533
3534 @param[in] String The string to evaluate.
3535 @param[in] ForceHex TRUE - always assume hex.
3536 @param[in] StopAtSpace TRUE to halt upon finding a space, FALSE to keep going.
3537
3538 @retval TRUE It is all numeric (dec/hex) characters.
3539 @retval FALSE There is a non-numeric character.
3540 **/
3541 BOOLEAN
3542 EFIAPI
3543 InternalShellIsHexOrDecimalNumber (
3544 IN CONST CHAR16 *String,
3545 IN CONST BOOLEAN ForceHex,
3546 IN CONST BOOLEAN StopAtSpace
3547 )
3548 {
3549 BOOLEAN Hex;
3550
3551 //
3552 // chop off a single negative sign
3553 //
3554 if (String != NULL && *String == L'-') {
3555 String++;
3556 }
3557
3558 if (String == NULL) {
3559 return (FALSE);
3560 }
3561
3562 //
3563 // chop leading zeroes
3564 //
3565 while(String != NULL && *String == L'0'){
3566 String++;
3567 }
3568 //
3569 // allow '0x' or '0X', but not 'x' or 'X'
3570 //
3571 if (String != NULL && (*String == L'x' || *String == L'X')) {
3572 if (*(String-1) != L'0') {
3573 //
3574 // we got an x without a preceeding 0
3575 //
3576 return (FALSE);
3577 }
3578 String++;
3579 Hex = TRUE;
3580 } else if (ForceHex) {
3581 Hex = TRUE;
3582 } else {
3583 Hex = FALSE;
3584 }
3585
3586 //
3587 // loop through the remaining characters and use the lib function
3588 //
3589 for ( ; String != NULL && *String != CHAR_NULL && !(StopAtSpace && *String == L' ') ; String++){
3590 if (Hex) {
3591 if (!ShellIsHexaDecimalDigitCharacter(*String)) {
3592 return (FALSE);
3593 }
3594 } else {
3595 if (!ShellIsDecimalDigitCharacter(*String)) {
3596 return (FALSE);
3597 }
3598 }
3599 }
3600
3601 return (TRUE);
3602 }
3603
3604 /**
3605 Function to determine if a given filename exists.
3606
3607 @param[in] Name Path to test.
3608
3609 @retval EFI_SUCCESS The Path represents a file.
3610 @retval EFI_NOT_FOUND The Path does not represent a file.
3611 @retval other The path failed to open.
3612 **/
3613 EFI_STATUS
3614 EFIAPI
3615 ShellFileExists(
3616 IN CONST CHAR16 *Name
3617 )
3618 {
3619 EFI_STATUS Status;
3620 EFI_SHELL_FILE_INFO *List;
3621
3622 ASSERT(Name != NULL);
3623
3624 List = NULL;
3625 Status = ShellOpenFileMetaArg((CHAR16*)Name, EFI_FILE_MODE_READ, &List);
3626 if (EFI_ERROR(Status)) {
3627 return (Status);
3628 }
3629
3630 ShellCloseFileMetaArg(&List);
3631
3632 return (EFI_SUCCESS);
3633 }
3634
3635 /**
3636 Convert a Unicode character to upper case only if
3637 it maps to a valid small-case ASCII character.
3638
3639 This internal function only deal with Unicode character
3640 which maps to a valid small-case ASCII character, i.e.
3641 L'a' to L'z'. For other Unicode character, the input character
3642 is returned directly.
3643
3644 @param Char The character to convert.
3645
3646 @retval LowerCharacter If the Char is with range L'a' to L'z'.
3647 @retval Unchanged Otherwise.
3648
3649 **/
3650 CHAR16
3651 EFIAPI
3652 InternalShellCharToUpper (
3653 IN CHAR16 Char
3654 )
3655 {
3656 if (Char >= L'a' && Char <= L'z') {
3657 return (CHAR16) (Char - (L'a' - L'A'));
3658 }
3659
3660 return Char;
3661 }
3662
3663 /**
3664 Convert a Unicode character to numerical value.
3665
3666 This internal function only deal with Unicode character
3667 which maps to a valid hexadecimal ASII character, i.e.
3668 L'0' to L'9', L'a' to L'f' or L'A' to L'F'. For other
3669 Unicode character, the value returned does not make sense.
3670
3671 @param Char The character to convert.
3672
3673 @return The numerical value converted.
3674
3675 **/
3676 UINTN
3677 EFIAPI
3678 InternalShellHexCharToUintn (
3679 IN CHAR16 Char
3680 )
3681 {
3682 if (ShellIsDecimalDigitCharacter (Char)) {
3683 return Char - L'0';
3684 }
3685
3686 return (UINTN) (10 + InternalShellCharToUpper (Char) - L'A');
3687 }
3688
3689 /**
3690 Convert a Null-terminated Unicode hexadecimal string to a value of type UINT64.
3691
3692 This function returns a value of type UINTN by interpreting the contents
3693 of the Unicode string specified by String as a hexadecimal number.
3694 The format of the input Unicode string String is:
3695
3696 [spaces][zeros][x][hexadecimal digits].
3697
3698 The valid hexadecimal digit character is in the range [0-9], [a-f] and [A-F].
3699 The prefix "0x" is optional. Both "x" and "X" is allowed in "0x" prefix.
3700 If "x" appears in the input string, it must be prefixed with at least one 0.
3701 The function will ignore the pad space, which includes spaces or tab characters,
3702 before [zeros], [x] or [hexadecimal digit]. The running zero before [x] or
3703 [hexadecimal digit] will be ignored. Then, the decoding starts after [x] or the
3704 first valid hexadecimal digit. Then, the function stops at the first character that is
3705 a not a valid hexadecimal character or NULL, whichever one comes first.
3706
3707 If String has only pad spaces, then zero is returned.
3708 If String has no leading pad spaces, leading zeros or valid hexadecimal digits,
3709 then zero is returned.
3710
3711 @param[in] String A pointer to a Null-terminated Unicode string.
3712 @param[out] Value Upon a successful return the value of the conversion.
3713 @param[in] StopAtSpace FALSE to skip spaces.
3714
3715 @retval EFI_SUCCESS The conversion was successful.
3716 @retval EFI_INVALID_PARAMETER A parameter was NULL or invalid.
3717 @retval EFI_DEVICE_ERROR An overflow occured.
3718 **/
3719 EFI_STATUS
3720 EFIAPI
3721 InternalShellStrHexToUint64 (
3722 IN CONST CHAR16 *String,
3723 OUT UINT64 *Value,
3724 IN CONST BOOLEAN StopAtSpace
3725 )
3726 {
3727 UINT64 Result;
3728
3729 if (String == NULL || StrSize(String) == 0 || Value == NULL) {
3730 return (EFI_INVALID_PARAMETER);
3731 }
3732
3733 //
3734 // Ignore the pad spaces (space or tab)
3735 //
3736 while ((*String == L' ') || (*String == L'\t')) {
3737 String++;
3738 }
3739
3740 //
3741 // Ignore leading Zeros after the spaces
3742 //
3743 while (*String == L'0') {
3744 String++;
3745 }
3746
3747 if (InternalShellCharToUpper (*String) == L'X') {
3748 if (*(String - 1) != L'0') {
3749 return 0;
3750 }
3751 //
3752 // Skip the 'X'
3753 //
3754 String++;
3755 }
3756
3757 Result = 0;
3758
3759 //
3760 // Skip spaces if requested
3761 //
3762 while (StopAtSpace && *String == L' ') {
3763 String++;
3764 }
3765
3766 while (ShellIsHexaDecimalDigitCharacter (*String)) {
3767 //
3768 // If the Hex Number represented by String overflows according
3769 // to the range defined by UINTN, then ASSERT().
3770 //
3771 if (!(Result <= (RShiftU64((((UINT64) ~0) - InternalShellHexCharToUintn (*String)), 4)))) {
3772 // if (!(Result <= ((((UINT64) ~0) - InternalShellHexCharToUintn (*String)) >> 4))) {
3773 return (EFI_DEVICE_ERROR);
3774 }
3775
3776 Result = (LShiftU64(Result, 4));
3777 Result += InternalShellHexCharToUintn (*String);
3778 String++;
3779
3780 //
3781 // stop at spaces if requested
3782 //
3783 if (StopAtSpace && *String == L' ') {
3784 break;
3785 }
3786 }
3787
3788 *Value = Result;
3789 return (EFI_SUCCESS);
3790 }
3791
3792 /**
3793 Convert a Null-terminated Unicode decimal string to a value of
3794 type UINT64.
3795
3796 This function returns a value of type UINT64 by interpreting the contents
3797 of the Unicode string specified by String as a decimal number. The format
3798 of the input Unicode string String is:
3799
3800 [spaces] [decimal digits].
3801
3802 The valid decimal digit character is in the range [0-9]. The
3803 function will ignore the pad space, which includes spaces or
3804 tab characters, before [decimal digits]. The running zero in the
3805 beginning of [decimal digits] will be ignored. Then, the function
3806 stops at the first character that is a not a valid decimal character
3807 or a Null-terminator, whichever one comes first.
3808
3809 If String has only pad spaces, then 0 is returned.
3810 If String has no pad spaces or valid decimal digits,
3811 then 0 is returned.
3812
3813 @param[in] String A pointer to a Null-terminated Unicode string.
3814 @param[out] Value Upon a successful return the value of the conversion.
3815 @param[in] StopAtSpace FALSE to skip spaces.
3816
3817 @retval EFI_SUCCESS The conversion was successful.
3818 @retval EFI_INVALID_PARAMETER A parameter was NULL or invalid.
3819 @retval EFI_DEVICE_ERROR An overflow occured.
3820 **/
3821 EFI_STATUS
3822 EFIAPI
3823 InternalShellStrDecimalToUint64 (
3824 IN CONST CHAR16 *String,
3825 OUT UINT64 *Value,
3826 IN CONST BOOLEAN StopAtSpace
3827 )
3828 {
3829 UINT64 Result;
3830
3831 if (String == NULL || StrSize (String) == 0 || Value == NULL) {
3832 return (EFI_INVALID_PARAMETER);
3833 }
3834
3835 //
3836 // Ignore the pad spaces (space or tab)
3837 //
3838 while ((*String == L' ') || (*String == L'\t')) {
3839 String++;
3840 }
3841
3842 //
3843 // Ignore leading Zeros after the spaces
3844 //
3845 while (*String == L'0') {
3846 String++;
3847 }
3848
3849 Result = 0;
3850
3851 //
3852 // Skip spaces if requested
3853 //
3854 while (StopAtSpace && *String == L' ') {
3855 String++;
3856 }
3857 while (ShellIsDecimalDigitCharacter (*String)) {
3858 //
3859 // If the number represented by String overflows according
3860 // to the range defined by UINT64, then ASSERT().
3861 //
3862
3863 if (!(Result <= (DivU64x32((((UINT64) ~0) - (*String - L'0')),10)))) {
3864 return (EFI_DEVICE_ERROR);
3865 }
3866
3867 Result = MultU64x32(Result, 10) + (*String - L'0');
3868 String++;
3869
3870 //
3871 // Stop at spaces if requested
3872 //
3873 if (StopAtSpace && *String == L' ') {
3874 break;
3875 }
3876 }
3877
3878 *Value = Result;
3879
3880 return (EFI_SUCCESS);
3881 }
3882
3883 /**
3884 Function to verify and convert a string to its numerical value.
3885
3886 If Hex it must be preceeded with a 0x, 0X, or has ForceHex set TRUE.
3887
3888 @param[in] String The string to evaluate.
3889 @param[out] Value Upon a successful return the value of the conversion.
3890 @param[in] ForceHex TRUE - always assume hex.
3891 @param[in] StopAtSpace FALSE to skip spaces.
3892
3893 @retval EFI_SUCCESS The conversion was successful.
3894 @retval EFI_INVALID_PARAMETER String contained an invalid character.
3895 @retval EFI_NOT_FOUND String was a number, but Value was NULL.
3896 **/
3897 EFI_STATUS
3898 EFIAPI
3899 ShellConvertStringToUint64(
3900 IN CONST CHAR16 *String,
3901 OUT UINT64 *Value,
3902 IN CONST BOOLEAN ForceHex,
3903 IN CONST BOOLEAN StopAtSpace
3904 )
3905 {
3906 UINT64 RetVal;
3907 CONST CHAR16 *Walker;
3908 EFI_STATUS Status;
3909 BOOLEAN Hex;
3910
3911 Hex = ForceHex;
3912
3913 if (!InternalShellIsHexOrDecimalNumber(String, Hex, StopAtSpace)) {
3914 if (!Hex) {
3915 Hex = TRUE;
3916 if (!InternalShellIsHexOrDecimalNumber(String, Hex, StopAtSpace)) {
3917 return (EFI_INVALID_PARAMETER);
3918 }
3919 } else {
3920 return (EFI_INVALID_PARAMETER);
3921 }
3922 }
3923
3924 //
3925 // Chop off leading spaces
3926 //
3927 for (Walker = String; Walker != NULL && *Walker != CHAR_NULL && *Walker == L' '; Walker++);
3928
3929 //
3930 // make sure we have something left that is numeric.
3931 //
3932 if (Walker == NULL || *Walker == CHAR_NULL || !InternalShellIsHexOrDecimalNumber(Walker, Hex, StopAtSpace)) {
3933 return (EFI_INVALID_PARAMETER);
3934 }
3935
3936 //
3937 // do the conversion.
3938 //
3939 if (Hex || StrnCmp(Walker, L"0x", 2) == 0 || StrnCmp(Walker, L"0X", 2) == 0){
3940 Status = InternalShellStrHexToUint64(Walker, &RetVal, StopAtSpace);
3941 } else {
3942 Status = InternalShellStrDecimalToUint64(Walker, &RetVal, StopAtSpace);
3943 }
3944
3945 if (Value == NULL && !EFI_ERROR(Status)) {
3946 return (EFI_NOT_FOUND);
3947 }
3948
3949 if (Value != NULL) {
3950 *Value = RetVal;
3951 }
3952
3953 return (Status);
3954 }
3955
3956 /**
3957 Function to determin if an entire string is a valid number.
3958
3959 If Hex it must be preceeded with a 0x or has ForceHex, set TRUE.
3960
3961 @param[in] String The string to evaluate.
3962 @param[in] ForceHex TRUE - always assume hex.
3963 @param[in] StopAtSpace TRUE to halt upon finding a space, FALSE to keep going.
3964
3965 @retval TRUE It is all numeric (dec/hex) characters.
3966 @retval FALSE There is a non-numeric character.
3967 **/
3968 BOOLEAN
3969 EFIAPI
3970 ShellIsHexOrDecimalNumber (
3971 IN CONST CHAR16 *String,
3972 IN CONST BOOLEAN ForceHex,
3973 IN CONST BOOLEAN StopAtSpace
3974 )
3975 {
3976 if (ShellConvertStringToUint64(String, NULL, ForceHex, StopAtSpace) == EFI_NOT_FOUND) {
3977 return (TRUE);
3978 }
3979 return (FALSE);
3980 }
3981
3982 /**
3983 Function to read a single line from a SHELL_FILE_HANDLE. The \n is not included in the returned
3984 buffer. The returned buffer must be callee freed.
3985
3986 If the position upon start is 0, then the Ascii Boolean will be set. This should be
3987 maintained and not changed for all operations with the same file.
3988
3989 @param[in] Handle SHELL_FILE_HANDLE to read from.
3990 @param[in, out] Ascii Boolean value for indicating whether the file is
3991 Ascii (TRUE) or UCS2 (FALSE).
3992
3993 @return The line of text from the file.
3994 @retval NULL There was not enough memory available.
3995
3996 @sa ShellFileHandleReadLine
3997 **/
3998 CHAR16*
3999 EFIAPI
4000 ShellFileHandleReturnLine(
4001 IN SHELL_FILE_HANDLE Handle,
4002 IN OUT BOOLEAN *Ascii
4003 )
4004 {
4005 CHAR16 *RetVal;
4006 UINTN Size;
4007 EFI_STATUS Status;
4008
4009 Size = 0;
4010 RetVal = NULL;
4011
4012 Status = ShellFileHandleReadLine(Handle, RetVal, &Size, FALSE, Ascii);
4013 if (Status == EFI_BUFFER_TOO_SMALL) {
4014 RetVal = AllocateZeroPool(Size);
4015 if (RetVal == NULL) {
4016 return (NULL);
4017 }
4018 Status = ShellFileHandleReadLine(Handle, RetVal, &Size, FALSE, Ascii);
4019
4020 }
4021 if (EFI_ERROR(Status) && (RetVal != NULL)) {
4022 FreePool(RetVal);
4023 RetVal = NULL;
4024 }
4025 return (RetVal);
4026 }
4027
4028 /**
4029 Function to read a single line (up to but not including the \n) from a SHELL_FILE_HANDLE.
4030
4031 If the position upon start is 0, then the Ascii Boolean will be set. This should be
4032 maintained and not changed for all operations with the same file.
4033
4034 @param[in] Handle SHELL_FILE_HANDLE to read from.
4035 @param[in, out] Buffer The pointer to buffer to read into.
4036 @param[in, out] Size The pointer to number of bytes in Buffer.
4037 @param[in] Truncate If the buffer is large enough, this has no effect.
4038 If the buffer is is too small and Truncate is TRUE,
4039 the line will be truncated.
4040 If the buffer is is too small and Truncate is FALSE,
4041 then no read will occur.
4042
4043 @param[in, out] Ascii Boolean value for indicating whether the file is
4044 Ascii (TRUE) or UCS2 (FALSE).
4045
4046 @retval EFI_SUCCESS The operation was successful. The line is stored in
4047 Buffer.
4048 @retval EFI_INVALID_PARAMETER Handle was NULL.
4049 @retval EFI_INVALID_PARAMETER Size was NULL.
4050 @retval EFI_BUFFER_TOO_SMALL Size was not large enough to store the line.
4051 Size was updated to the minimum space required.
4052 **/
4053 EFI_STATUS
4054 EFIAPI
4055 ShellFileHandleReadLine(
4056 IN SHELL_FILE_HANDLE Handle,
4057 IN OUT CHAR16 *Buffer,
4058 IN OUT UINTN *Size,
4059 IN BOOLEAN Truncate,
4060 IN OUT BOOLEAN *Ascii
4061 )
4062 {
4063 EFI_STATUS Status;
4064 CHAR16 CharBuffer;
4065 UINTN CharSize;
4066 UINTN CountSoFar;
4067 UINT64 OriginalFilePosition;
4068
4069
4070 if (Handle == NULL
4071 ||Size == NULL
4072 ){
4073 return (EFI_INVALID_PARAMETER);
4074 }
4075 if (Buffer == NULL) {
4076 ASSERT(*Size == 0);
4077 } else {
4078 *Buffer = CHAR_NULL;
4079 }
4080 gEfiShellProtocol->GetFilePosition(Handle, &OriginalFilePosition);
4081 if (OriginalFilePosition == 0) {
4082 CharSize = sizeof(CHAR16);
4083 Status = gEfiShellProtocol->ReadFile(Handle, &CharSize, &CharBuffer);
4084 ASSERT_EFI_ERROR(Status);
4085 if (CharBuffer == gUnicodeFileTag) {
4086 *Ascii = FALSE;
4087 } else {
4088 *Ascii = TRUE;
4089 gEfiShellProtocol->SetFilePosition(Handle, OriginalFilePosition);
4090 }
4091 }
4092
4093 for (CountSoFar = 0;;CountSoFar++){
4094 CharBuffer = 0;
4095 if (*Ascii) {
4096 CharSize = sizeof(CHAR8);
4097 } else {
4098 CharSize = sizeof(CHAR16);
4099 }
4100 Status = gEfiShellProtocol->ReadFile(Handle, &CharSize, &CharBuffer);
4101 if ( EFI_ERROR(Status)
4102 || CharSize == 0
4103 || (CharBuffer == L'\n' && !(*Ascii))
4104 || (CharBuffer == '\n' && *Ascii)
4105 ){
4106 break;
4107 }
4108 //
4109 // if we have space save it...
4110 //
4111 if ((CountSoFar+1)*sizeof(CHAR16) < *Size){
4112 ASSERT(Buffer != NULL);
4113 ((CHAR16*)Buffer)[CountSoFar] = CharBuffer;
4114 ((CHAR16*)Buffer)[CountSoFar+1] = CHAR_NULL;
4115 }
4116 }
4117
4118 //
4119 // if we ran out of space tell when...
4120 //
4121 if ((CountSoFar+1)*sizeof(CHAR16) > *Size){
4122 *Size = (CountSoFar+1)*sizeof(CHAR16);
4123 if (!Truncate) {
4124 gEfiShellProtocol->SetFilePosition(Handle, OriginalFilePosition);
4125 } else {
4126 DEBUG((DEBUG_WARN, "The line was truncated in ShellFileHandleReadLine"));
4127 }
4128 return (EFI_BUFFER_TOO_SMALL);
4129 }
4130 while(Buffer[StrLen(Buffer)-1] == L'\r') {
4131 Buffer[StrLen(Buffer)-1] = CHAR_NULL;
4132 }
4133
4134 return (Status);
4135 }
4136
4137 /**
4138 Function to print help file / man page content in the spec from the UEFI Shell protocol GetHelpText function.
4139
4140 @param[in] CommandToGetHelpOn Pointer to a string containing the command name of help file to be printed.
4141 @param[in] SectionToGetHelpOn Pointer to the section specifier(s).
4142 @param[in] PrintCommandText If TRUE, prints the command followed by the help content, otherwise prints
4143 the help content only.
4144 @retval EFI_DEVICE_ERROR The help data format was incorrect.
4145 @retval EFI_NOT_FOUND The help data could not be found.
4146 @retval EFI_SUCCESS The operation was successful.
4147 **/
4148 EFI_STATUS
4149 EFIAPI
4150 ShellPrintHelp (
4151 IN CONST CHAR16 *CommandToGetHelpOn,
4152 IN CONST CHAR16 *SectionToGetHelpOn,
4153 IN BOOLEAN PrintCommandText
4154 )
4155 {
4156 EFI_STATUS Status;
4157 CHAR16 *OutText;
4158
4159 OutText = NULL;
4160
4161 //
4162 // Get the string to print based
4163 //
4164 Status = gEfiShellProtocol->GetHelpText (CommandToGetHelpOn, SectionToGetHelpOn, &OutText);
4165
4166 //
4167 // make sure we got a valid string
4168 //
4169 if (EFI_ERROR(Status)){
4170 return Status;
4171 }
4172 if (OutText == NULL || StrLen(OutText) == 0) {
4173 return EFI_NOT_FOUND;
4174 }
4175
4176 //
4177 // Chop off trailing stuff we dont need
4178 //
4179 while (OutText[StrLen(OutText)-1] == L'\r' || OutText[StrLen(OutText)-1] == L'\n' || OutText[StrLen(OutText)-1] == L' ') {
4180 OutText[StrLen(OutText)-1] = CHAR_NULL;
4181 }
4182
4183 //
4184 // Print this out to the console
4185 //
4186 if (PrintCommandText) {
4187 ShellPrintEx(-1, -1, L"%H%-14s%N- %s\r\n", CommandToGetHelpOn, OutText);
4188 } else {
4189 ShellPrintEx(-1, -1, L"%N%s\r\n", OutText);
4190 }
4191
4192 SHELL_FREE_NON_NULL(OutText);
4193
4194 return EFI_SUCCESS;
4195 }
4196
4197 /**
4198 Function to delete a file by name
4199
4200 @param[in] FileName Pointer to file name to delete.
4201
4202 @retval EFI_SUCCESS the file was deleted sucessfully
4203 @retval EFI_WARN_DELETE_FAILURE the handle was closed, but the file was not
4204 deleted
4205 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
4206 @retval EFI_NOT_FOUND The specified file could not be found on the
4207 device or the file system could not be found
4208 on the device.
4209 @retval EFI_NO_MEDIA The device has no medium.
4210 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
4211 medium is no longer supported.
4212 @retval EFI_DEVICE_ERROR The device reported an error.
4213 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
4214 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
4215 @retval EFI_ACCESS_DENIED The file was opened read only.
4216 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
4217 file.
4218 @retval other The file failed to open
4219 **/
4220 EFI_STATUS
4221 EFIAPI
4222 ShellDeleteFileByName(
4223 IN CONST CHAR16 *FileName
4224 )
4225 {
4226 EFI_STATUS Status;
4227 SHELL_FILE_HANDLE FileHandle;
4228
4229 Status = ShellFileExists(FileName);
4230
4231 if (Status == EFI_SUCCESS){
4232 Status = ShellOpenFileByName(FileName, &FileHandle, EFI_FILE_MODE_READ | EFI_FILE_MODE_WRITE | EFI_FILE_MODE_CREATE, 0x0);
4233 if (Status == EFI_SUCCESS){
4234 Status = ShellDeleteFile(&FileHandle);
4235 }
4236 }
4237
4238 return(Status);
4239
4240 }