]> git.proxmox.com Git - mirror_edk2.git/blob - ShellPkg/Library/UefiShellLib/UefiShellLib.c
ShellPkg: Refine code style to avoid potential uninitialized local variable.
[mirror_edk2.git] / ShellPkg / Library / UefiShellLib / UefiShellLib.c
1 /** @file
2 Provides interface to shell functionality for shell commands and applications.
3
4 Copyright (c) 2006 - 2014, Intel Corporation. All rights reserved.<BR>
5 This program and the accompanying materials
6 are licensed and made available under the terms and conditions of the BSD License
7 which accompanies this distribution. The full text of the license may be found at
8 http://opensource.org/licenses/bsd-license.php
9
10 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
11 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
12
13 **/
14
15 #include "UefiShellLib.h"
16 #include <ShellBase.h>
17 #include <Library/SortLib.h>
18
19 #define FIND_XXXXX_FILE_BUFFER_SIZE (SIZE_OF_EFI_FILE_INFO + MAX_FILE_NAME_LEN)
20
21 //
22 // globals...
23 //
24 SHELL_PARAM_ITEM EmptyParamList[] = {
25 {NULL, TypeMax}
26 };
27 SHELL_PARAM_ITEM SfoParamList[] = {
28 {L"-sfo", TypeFlag},
29 {NULL, TypeMax}
30 };
31 EFI_SHELL_ENVIRONMENT2 *mEfiShellEnvironment2;
32 EFI_SHELL_INTERFACE *mEfiShellInterface;
33 EFI_SHELL_PROTOCOL *gEfiShellProtocol;
34 EFI_SHELL_PARAMETERS_PROTOCOL *gEfiShellParametersProtocol;
35 EFI_HANDLE mEfiShellEnvironment2Handle;
36 FILE_HANDLE_FUNCTION_MAP FileFunctionMap;
37
38 /**
39 Check if a Unicode character is a hexadecimal character.
40
41 This internal function checks if a Unicode character is a
42 numeric character. The valid hexadecimal characters are
43 L'0' to L'9', L'a' to L'f', or L'A' to L'F'.
44
45 @param Char The character to check against.
46
47 @retval TRUE If the Char is a hexadecmial character.
48 @retval FALSE If the Char is not a hexadecmial character.
49
50 **/
51 BOOLEAN
52 EFIAPI
53 ShellIsHexaDecimalDigitCharacter (
54 IN CHAR16 Char
55 )
56 {
57 return (BOOLEAN) ((Char >= L'0' && Char <= L'9') || (Char >= L'A' && Char <= L'F') || (Char >= L'a' && Char <= L'f'));
58 }
59
60 /**
61 Check if a Unicode character is a decimal character.
62
63 This internal function checks if a Unicode character is a
64 decimal character. The valid characters are
65 L'0' to L'9'.
66
67
68 @param Char The character to check against.
69
70 @retval TRUE If the Char is a hexadecmial character.
71 @retval FALSE If the Char is not a hexadecmial character.
72
73 **/
74 BOOLEAN
75 EFIAPI
76 ShellIsDecimalDigitCharacter (
77 IN CHAR16 Char
78 )
79 {
80 return (BOOLEAN) (Char >= L'0' && Char <= L'9');
81 }
82
83 /**
84 Helper function to find ShellEnvironment2 for constructor.
85
86 @param[in] ImageHandle A copy of the calling image's handle.
87
88 @retval EFI_OUT_OF_RESOURCES Memory allocation failed.
89 **/
90 EFI_STATUS
91 EFIAPI
92 ShellFindSE2 (
93 IN EFI_HANDLE ImageHandle
94 )
95 {
96 EFI_STATUS Status;
97 EFI_HANDLE *Buffer;
98 UINTN BufferSize;
99 UINTN HandleIndex;
100
101 BufferSize = 0;
102 Buffer = NULL;
103 Status = gBS->OpenProtocol(ImageHandle,
104 &gEfiShellEnvironment2Guid,
105 (VOID **)&mEfiShellEnvironment2,
106 ImageHandle,
107 NULL,
108 EFI_OPEN_PROTOCOL_GET_PROTOCOL
109 );
110 //
111 // look for the mEfiShellEnvironment2 protocol at a higher level
112 //
113 if (EFI_ERROR (Status) || !(CompareGuid (&mEfiShellEnvironment2->SESGuid, &gEfiShellEnvironment2ExtGuid))){
114 //
115 // figure out how big of a buffer we need.
116 //
117 Status = gBS->LocateHandle (ByProtocol,
118 &gEfiShellEnvironment2Guid,
119 NULL, // ignored for ByProtocol
120 &BufferSize,
121 Buffer
122 );
123 //
124 // maybe it's not there???
125 //
126 if (Status == EFI_BUFFER_TOO_SMALL) {
127 Buffer = (EFI_HANDLE*)AllocateZeroPool(BufferSize);
128 if (Buffer == NULL) {
129 return (EFI_OUT_OF_RESOURCES);
130 }
131 Status = gBS->LocateHandle (ByProtocol,
132 &gEfiShellEnvironment2Guid,
133 NULL, // ignored for ByProtocol
134 &BufferSize,
135 Buffer
136 );
137 }
138 if (!EFI_ERROR (Status) && Buffer != NULL) {
139 //
140 // now parse the list of returned handles
141 //
142 Status = EFI_NOT_FOUND;
143 for (HandleIndex = 0; HandleIndex < (BufferSize/sizeof(Buffer[0])); HandleIndex++) {
144 Status = gBS->OpenProtocol(Buffer[HandleIndex],
145 &gEfiShellEnvironment2Guid,
146 (VOID **)&mEfiShellEnvironment2,
147 ImageHandle,
148 NULL,
149 EFI_OPEN_PROTOCOL_GET_PROTOCOL
150 );
151 if (CompareGuid (&mEfiShellEnvironment2->SESGuid, &gEfiShellEnvironment2ExtGuid)) {
152 mEfiShellEnvironment2Handle = Buffer[HandleIndex];
153 Status = EFI_SUCCESS;
154 break;
155 }
156 }
157 }
158 }
159 if (Buffer != NULL) {
160 FreePool (Buffer);
161 }
162 return (Status);
163 }
164
165 /**
166 Function to do most of the work of the constructor. Allows for calling
167 multiple times without complete re-initialization.
168
169 @param[in] ImageHandle A copy of the ImageHandle.
170 @param[in] SystemTable A pointer to the SystemTable for the application.
171
172 @retval EFI_SUCCESS The operationw as successful.
173 **/
174 EFI_STATUS
175 EFIAPI
176 ShellLibConstructorWorker (
177 IN EFI_HANDLE ImageHandle,
178 IN EFI_SYSTEM_TABLE *SystemTable
179 )
180 {
181 EFI_STATUS Status;
182
183 //
184 // UEFI 2.0 shell interfaces (used preferentially)
185 //
186 Status = gBS->OpenProtocol(
187 ImageHandle,
188 &gEfiShellProtocolGuid,
189 (VOID **)&gEfiShellProtocol,
190 ImageHandle,
191 NULL,
192 EFI_OPEN_PROTOCOL_GET_PROTOCOL
193 );
194 if (EFI_ERROR(Status)) {
195 //
196 // Search for the shell protocol
197 //
198 Status = gBS->LocateProtocol(
199 &gEfiShellProtocolGuid,
200 NULL,
201 (VOID **)&gEfiShellProtocol
202 );
203 if (EFI_ERROR(Status)) {
204 gEfiShellProtocol = NULL;
205 }
206 }
207 Status = gBS->OpenProtocol(
208 ImageHandle,
209 &gEfiShellParametersProtocolGuid,
210 (VOID **)&gEfiShellParametersProtocol,
211 ImageHandle,
212 NULL,
213 EFI_OPEN_PROTOCOL_GET_PROTOCOL
214 );
215 if (EFI_ERROR(Status)) {
216 gEfiShellParametersProtocol = NULL;
217 }
218
219 if (gEfiShellParametersProtocol == NULL || gEfiShellProtocol == NULL) {
220 //
221 // Moved to seperate function due to complexity
222 //
223 Status = ShellFindSE2(ImageHandle);
224
225 if (EFI_ERROR(Status)) {
226 DEBUG((DEBUG_ERROR, "Status: 0x%08x\r\n", Status));
227 mEfiShellEnvironment2 = NULL;
228 }
229 Status = gBS->OpenProtocol(ImageHandle,
230 &gEfiShellInterfaceGuid,
231 (VOID **)&mEfiShellInterface,
232 ImageHandle,
233 NULL,
234 EFI_OPEN_PROTOCOL_GET_PROTOCOL
235 );
236 if (EFI_ERROR(Status)) {
237 mEfiShellInterface = NULL;
238 }
239 }
240
241 //
242 // only success getting 2 of either the old or new, but no 1/2 and 1/2
243 //
244 if ((mEfiShellEnvironment2 != NULL && mEfiShellInterface != NULL) ||
245 (gEfiShellProtocol != NULL && gEfiShellParametersProtocol != NULL) ) {
246 if (gEfiShellProtocol != NULL) {
247 FileFunctionMap.GetFileInfo = gEfiShellProtocol->GetFileInfo;
248 FileFunctionMap.SetFileInfo = gEfiShellProtocol->SetFileInfo;
249 FileFunctionMap.ReadFile = gEfiShellProtocol->ReadFile;
250 FileFunctionMap.WriteFile = gEfiShellProtocol->WriteFile;
251 FileFunctionMap.CloseFile = gEfiShellProtocol->CloseFile;
252 FileFunctionMap.DeleteFile = gEfiShellProtocol->DeleteFile;
253 FileFunctionMap.GetFilePosition = gEfiShellProtocol->GetFilePosition;
254 FileFunctionMap.SetFilePosition = gEfiShellProtocol->SetFilePosition;
255 FileFunctionMap.FlushFile = gEfiShellProtocol->FlushFile;
256 FileFunctionMap.GetFileSize = gEfiShellProtocol->GetFileSize;
257 } else {
258 FileFunctionMap.GetFileInfo = (EFI_SHELL_GET_FILE_INFO)FileHandleGetInfo;
259 FileFunctionMap.SetFileInfo = (EFI_SHELL_SET_FILE_INFO)FileHandleSetInfo;
260 FileFunctionMap.ReadFile = (EFI_SHELL_READ_FILE)FileHandleRead;
261 FileFunctionMap.WriteFile = (EFI_SHELL_WRITE_FILE)FileHandleWrite;
262 FileFunctionMap.CloseFile = (EFI_SHELL_CLOSE_FILE)FileHandleClose;
263 FileFunctionMap.DeleteFile = (EFI_SHELL_DELETE_FILE)FileHandleDelete;
264 FileFunctionMap.GetFilePosition = (EFI_SHELL_GET_FILE_POSITION)FileHandleGetPosition;
265 FileFunctionMap.SetFilePosition = (EFI_SHELL_SET_FILE_POSITION)FileHandleSetPosition;
266 FileFunctionMap.FlushFile = (EFI_SHELL_FLUSH_FILE)FileHandleFlush;
267 FileFunctionMap.GetFileSize = (EFI_SHELL_GET_FILE_SIZE)FileHandleGetSize;
268 }
269 return (EFI_SUCCESS);
270 }
271 return (EFI_NOT_FOUND);
272 }
273 /**
274 Constructor for the Shell library.
275
276 Initialize the library and determine if the underlying is a UEFI Shell 2.0 or an EFI shell.
277
278 @param ImageHandle the image handle of the process
279 @param SystemTable the EFI System Table pointer
280
281 @retval EFI_SUCCESS the initialization was complete sucessfully
282 @return others an error ocurred during initialization
283 **/
284 EFI_STATUS
285 EFIAPI
286 ShellLibConstructor (
287 IN EFI_HANDLE ImageHandle,
288 IN EFI_SYSTEM_TABLE *SystemTable
289 )
290 {
291 mEfiShellEnvironment2 = NULL;
292 gEfiShellProtocol = NULL;
293 gEfiShellParametersProtocol = NULL;
294 mEfiShellInterface = NULL;
295 mEfiShellEnvironment2Handle = NULL;
296
297 //
298 // verify that auto initialize is not set false
299 //
300 if (PcdGetBool(PcdShellLibAutoInitialize) == 0) {
301 return (EFI_SUCCESS);
302 }
303
304 return (ShellLibConstructorWorker(ImageHandle, SystemTable));
305 }
306
307 /**
308 Destructor for the library. free any resources.
309
310 @param[in] ImageHandle A copy of the ImageHandle.
311 @param[in] SystemTable A pointer to the SystemTable for the application.
312
313 @retval EFI_SUCCESS The operation was successful.
314 @return An error from the CloseProtocol function.
315 **/
316 EFI_STATUS
317 EFIAPI
318 ShellLibDestructor (
319 IN EFI_HANDLE ImageHandle,
320 IN EFI_SYSTEM_TABLE *SystemTable
321 )
322 {
323 if (mEfiShellEnvironment2 != NULL) {
324 gBS->CloseProtocol(mEfiShellEnvironment2Handle==NULL?ImageHandle:mEfiShellEnvironment2Handle,
325 &gEfiShellEnvironment2Guid,
326 ImageHandle,
327 NULL);
328 mEfiShellEnvironment2 = NULL;
329 }
330 if (mEfiShellInterface != NULL) {
331 gBS->CloseProtocol(ImageHandle,
332 &gEfiShellInterfaceGuid,
333 ImageHandle,
334 NULL);
335 mEfiShellInterface = NULL;
336 }
337 if (gEfiShellProtocol != NULL) {
338 gBS->CloseProtocol(ImageHandle,
339 &gEfiShellProtocolGuid,
340 ImageHandle,
341 NULL);
342 gEfiShellProtocol = NULL;
343 }
344 if (gEfiShellParametersProtocol != NULL) {
345 gBS->CloseProtocol(ImageHandle,
346 &gEfiShellParametersProtocolGuid,
347 ImageHandle,
348 NULL);
349 gEfiShellParametersProtocol = NULL;
350 }
351 mEfiShellEnvironment2Handle = NULL;
352
353 return (EFI_SUCCESS);
354 }
355
356 /**
357 This function causes the shell library to initialize itself. If the shell library
358 is already initialized it will de-initialize all the current protocol poitners and
359 re-populate them again.
360
361 When the library is used with PcdShellLibAutoInitialize set to true this function
362 will return EFI_SUCCESS and perform no actions.
363
364 This function is intended for internal access for shell commands only.
365
366 @retval EFI_SUCCESS the initialization was complete sucessfully
367
368 **/
369 EFI_STATUS
370 EFIAPI
371 ShellInitialize (
372 )
373 {
374 //
375 // if auto initialize is not false then skip
376 //
377 if (PcdGetBool(PcdShellLibAutoInitialize) != 0) {
378 return (EFI_SUCCESS);
379 }
380
381 //
382 // deinit the current stuff
383 //
384 ASSERT_EFI_ERROR(ShellLibDestructor(gImageHandle, gST));
385
386 //
387 // init the new stuff
388 //
389 return (ShellLibConstructorWorker(gImageHandle, gST));
390 }
391
392 /**
393 This function will retrieve the information about the file for the handle
394 specified and store it in allocated pool memory.
395
396 This function allocates a buffer to store the file's information. It is the
397 caller's responsibility to free the buffer
398
399 @param FileHandle The file handle of the file for which information is
400 being requested.
401
402 @retval NULL information could not be retrieved.
403
404 @return the information about the file
405 **/
406 EFI_FILE_INFO*
407 EFIAPI
408 ShellGetFileInfo (
409 IN SHELL_FILE_HANDLE FileHandle
410 )
411 {
412 return (FileFunctionMap.GetFileInfo(FileHandle));
413 }
414
415 /**
416 This function sets the information about the file for the opened handle
417 specified.
418
419 @param[in] FileHandle The file handle of the file for which information
420 is being set.
421
422 @param[in] FileInfo The information to set.
423
424 @retval EFI_SUCCESS The information was set.
425 @retval EFI_INVALID_PARAMETER A parameter was out of range or invalid.
426 @retval EFI_UNSUPPORTED The FileHandle does not support FileInfo.
427 @retval EFI_NO_MEDIA The device has no medium.
428 @retval EFI_DEVICE_ERROR The device reported an error.
429 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
430 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
431 @retval EFI_ACCESS_DENIED The file was opened read only.
432 @retval EFI_VOLUME_FULL The volume is full.
433 **/
434 EFI_STATUS
435 EFIAPI
436 ShellSetFileInfo (
437 IN SHELL_FILE_HANDLE FileHandle,
438 IN EFI_FILE_INFO *FileInfo
439 )
440 {
441 return (FileFunctionMap.SetFileInfo(FileHandle, FileInfo));
442 }
443
444 /**
445 This function will open a file or directory referenced by DevicePath.
446
447 This function opens a file with the open mode according to the file path. The
448 Attributes is valid only for EFI_FILE_MODE_CREATE.
449
450 @param FilePath on input the device path to the file. On output
451 the remaining device path.
452 @param DeviceHandle pointer to the system device handle.
453 @param FileHandle pointer to the file handle.
454 @param OpenMode the mode to open the file with.
455 @param Attributes the file's file attributes.
456
457 @retval EFI_SUCCESS The information was set.
458 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
459 @retval EFI_UNSUPPORTED Could not open the file path.
460 @retval EFI_NOT_FOUND The specified file could not be found on the
461 device or the file system could not be found on
462 the device.
463 @retval EFI_NO_MEDIA The device has no medium.
464 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
465 medium is no longer supported.
466 @retval EFI_DEVICE_ERROR The device reported an error.
467 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
468 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
469 @retval EFI_ACCESS_DENIED The file was opened read only.
470 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
471 file.
472 @retval EFI_VOLUME_FULL The volume is full.
473 **/
474 EFI_STATUS
475 EFIAPI
476 ShellOpenFileByDevicePath(
477 IN OUT EFI_DEVICE_PATH_PROTOCOL **FilePath,
478 OUT EFI_HANDLE *DeviceHandle,
479 OUT SHELL_FILE_HANDLE *FileHandle,
480 IN UINT64 OpenMode,
481 IN UINT64 Attributes
482 )
483 {
484 CHAR16 *FileName;
485 EFI_STATUS Status;
486 EFI_SIMPLE_FILE_SYSTEM_PROTOCOL *EfiSimpleFileSystemProtocol;
487 EFI_FILE_PROTOCOL *Handle1;
488 EFI_FILE_PROTOCOL *Handle2;
489 CHAR16 *FnafPathName;
490 UINTN PathLen;
491
492 if (FilePath == NULL || FileHandle == NULL || DeviceHandle == NULL) {
493 return (EFI_INVALID_PARAMETER);
494 }
495
496 //
497 // which shell interface should we use
498 //
499 if (gEfiShellProtocol != NULL) {
500 //
501 // use UEFI Shell 2.0 method.
502 //
503 FileName = gEfiShellProtocol->GetFilePathFromDevicePath(*FilePath);
504 if (FileName == NULL) {
505 return (EFI_INVALID_PARAMETER);
506 }
507 Status = ShellOpenFileByName(FileName, FileHandle, OpenMode, Attributes);
508 FreePool(FileName);
509 return (Status);
510 }
511
512
513 //
514 // use old shell method.
515 //
516 Status = gBS->LocateDevicePath (&gEfiSimpleFileSystemProtocolGuid,
517 FilePath,
518 DeviceHandle);
519 if (EFI_ERROR (Status)) {
520 return Status;
521 }
522 Status = gBS->OpenProtocol(*DeviceHandle,
523 &gEfiSimpleFileSystemProtocolGuid,
524 (VOID**)&EfiSimpleFileSystemProtocol,
525 gImageHandle,
526 NULL,
527 EFI_OPEN_PROTOCOL_GET_PROTOCOL);
528 if (EFI_ERROR (Status)) {
529 return Status;
530 }
531 Status = EfiSimpleFileSystemProtocol->OpenVolume(EfiSimpleFileSystemProtocol, &Handle1);
532 if (EFI_ERROR (Status)) {
533 FileHandle = NULL;
534 return Status;
535 }
536
537 //
538 // go down directories one node at a time.
539 //
540 while (!IsDevicePathEnd (*FilePath)) {
541 //
542 // For file system access each node should be a file path component
543 //
544 if (DevicePathType (*FilePath) != MEDIA_DEVICE_PATH ||
545 DevicePathSubType (*FilePath) != MEDIA_FILEPATH_DP
546 ) {
547 FileHandle = NULL;
548 return (EFI_INVALID_PARAMETER);
549 }
550 //
551 // Open this file path node
552 //
553 Handle2 = Handle1;
554 Handle1 = NULL;
555
556 //
557 // File Name Alignment Fix (FNAF)
558 // Handle2->Open may be incapable of handling a unaligned CHAR16 data.
559 // The structure pointed to by FilePath may be not CHAR16 aligned.
560 // This code copies the potentially unaligned PathName data from the
561 // FilePath structure to the aligned FnafPathName for use in the
562 // calls to Handl2->Open.
563 //
564
565 //
566 // Determine length of PathName, in bytes.
567 //
568 PathLen = DevicePathNodeLength (*FilePath) - SIZE_OF_FILEPATH_DEVICE_PATH;
569
570 //
571 // Allocate memory for the aligned copy of the string Extra allocation is to allow for forced alignment
572 // Copy bytes from possibly unaligned location to aligned location
573 //
574 FnafPathName = AllocateCopyPool(PathLen, (UINT8 *)((FILEPATH_DEVICE_PATH*)*FilePath)->PathName);
575 if (FnafPathName == NULL) {
576 return EFI_OUT_OF_RESOURCES;
577 }
578
579 //
580 // Try to test opening an existing file
581 //
582 Status = Handle2->Open (
583 Handle2,
584 &Handle1,
585 FnafPathName,
586 OpenMode &~EFI_FILE_MODE_CREATE,
587 0
588 );
589
590 //
591 // see if the error was that it needs to be created
592 //
593 if ((EFI_ERROR (Status)) && (OpenMode != (OpenMode &~EFI_FILE_MODE_CREATE))) {
594 Status = Handle2->Open (
595 Handle2,
596 &Handle1,
597 FnafPathName,
598 OpenMode,
599 Attributes
600 );
601 }
602
603 //
604 // Free the alignment buffer
605 //
606 FreePool(FnafPathName);
607
608 //
609 // Close the last node
610 //
611 Handle2->Close (Handle2);
612
613 if (EFI_ERROR(Status)) {
614 return (Status);
615 }
616
617 //
618 // Get the next node
619 //
620 *FilePath = NextDevicePathNode (*FilePath);
621 }
622
623 //
624 // This is a weak spot since if the undefined SHELL_FILE_HANDLE format changes this must change also!
625 //
626 *FileHandle = (VOID*)Handle1;
627 return (EFI_SUCCESS);
628 }
629
630 /**
631 This function will open a file or directory referenced by filename.
632
633 If return is EFI_SUCCESS, the Filehandle is the opened file's handle;
634 otherwise, the Filehandle is NULL. The Attributes is valid only for
635 EFI_FILE_MODE_CREATE.
636
637 if FileName is NULL then ASSERT()
638
639 @param FileName pointer to file name
640 @param FileHandle pointer to the file handle.
641 @param OpenMode the mode to open the file with.
642 @param Attributes the file's file attributes.
643
644 @retval EFI_SUCCESS The information was set.
645 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
646 @retval EFI_UNSUPPORTED Could not open the file path.
647 @retval EFI_NOT_FOUND The specified file could not be found on the
648 device or the file system could not be found
649 on the device.
650 @retval EFI_NO_MEDIA The device has no medium.
651 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
652 medium is no longer supported.
653 @retval EFI_DEVICE_ERROR The device reported an error.
654 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
655 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
656 @retval EFI_ACCESS_DENIED The file was opened read only.
657 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
658 file.
659 @retval EFI_VOLUME_FULL The volume is full.
660 **/
661 EFI_STATUS
662 EFIAPI
663 ShellOpenFileByName(
664 IN CONST CHAR16 *FileName,
665 OUT SHELL_FILE_HANDLE *FileHandle,
666 IN UINT64 OpenMode,
667 IN UINT64 Attributes
668 )
669 {
670 EFI_HANDLE DeviceHandle;
671 EFI_DEVICE_PATH_PROTOCOL *FilePath;
672 EFI_STATUS Status;
673 EFI_FILE_INFO *FileInfo;
674
675 //
676 // ASSERT if FileName is NULL
677 //
678 ASSERT(FileName != NULL);
679
680 if (FileName == NULL) {
681 return (EFI_INVALID_PARAMETER);
682 }
683
684 if (gEfiShellProtocol != NULL) {
685 if ((OpenMode & EFI_FILE_MODE_CREATE) == EFI_FILE_MODE_CREATE && (Attributes & EFI_FILE_DIRECTORY) == EFI_FILE_DIRECTORY) {
686 return ShellCreateDirectory(FileName, FileHandle);
687 }
688 //
689 // Use UEFI Shell 2.0 method
690 //
691 Status = gEfiShellProtocol->OpenFileByName(FileName,
692 FileHandle,
693 OpenMode);
694 if (StrCmp(FileName, L"NUL") != 0 && !EFI_ERROR(Status) && ((OpenMode & EFI_FILE_MODE_CREATE) != 0)){
695 FileInfo = FileFunctionMap.GetFileInfo(*FileHandle);
696 ASSERT(FileInfo != NULL);
697 FileInfo->Attribute = Attributes;
698 Status = FileFunctionMap.SetFileInfo(*FileHandle, FileInfo);
699 FreePool(FileInfo);
700 }
701 return (Status);
702 }
703 //
704 // Using EFI Shell version
705 // this means convert name to path and call that function
706 // since this will use EFI method again that will open it.
707 //
708 ASSERT(mEfiShellEnvironment2 != NULL);
709 FilePath = mEfiShellEnvironment2->NameToPath ((CHAR16*)FileName);
710 if (FilePath != NULL) {
711 return (ShellOpenFileByDevicePath(&FilePath,
712 &DeviceHandle,
713 FileHandle,
714 OpenMode,
715 Attributes));
716 }
717 return (EFI_DEVICE_ERROR);
718 }
719 /**
720 This function create a directory
721
722 If return is EFI_SUCCESS, the Filehandle is the opened directory's handle;
723 otherwise, the Filehandle is NULL. If the directory already existed, this
724 function opens the existing directory.
725
726 @param DirectoryName pointer to directory name
727 @param FileHandle pointer to the file handle.
728
729 @retval EFI_SUCCESS The information was set.
730 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
731 @retval EFI_UNSUPPORTED Could not open the file path.
732 @retval EFI_NOT_FOUND The specified file could not be found on the
733 device or the file system could not be found
734 on the device.
735 @retval EFI_NO_MEDIA The device has no medium.
736 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
737 medium is no longer supported.
738 @retval EFI_DEVICE_ERROR The device reported an error.
739 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
740 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
741 @retval EFI_ACCESS_DENIED The file was opened read only.
742 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
743 file.
744 @retval EFI_VOLUME_FULL The volume is full.
745 @sa ShellOpenFileByName
746 **/
747 EFI_STATUS
748 EFIAPI
749 ShellCreateDirectory(
750 IN CONST CHAR16 *DirectoryName,
751 OUT SHELL_FILE_HANDLE *FileHandle
752 )
753 {
754 if (gEfiShellProtocol != NULL) {
755 //
756 // Use UEFI Shell 2.0 method
757 //
758 return (gEfiShellProtocol->CreateFile(DirectoryName,
759 EFI_FILE_DIRECTORY,
760 FileHandle
761 ));
762 } else {
763 return (ShellOpenFileByName(DirectoryName,
764 FileHandle,
765 EFI_FILE_MODE_READ | EFI_FILE_MODE_WRITE | EFI_FILE_MODE_CREATE,
766 EFI_FILE_DIRECTORY
767 ));
768 }
769 }
770
771 /**
772 This function reads information from an opened file.
773
774 If FileHandle is not a directory, the function reads the requested number of
775 bytes from the file at the file's current position and returns them in Buffer.
776 If the read goes beyond the end of the file, the read length is truncated to the
777 end of the file. The file's current position is increased by the number of bytes
778 returned. If FileHandle is a directory, the function reads the directory entry
779 at the file's current position and returns the entry in Buffer. If the Buffer
780 is not large enough to hold the current directory entry, then
781 EFI_BUFFER_TOO_SMALL is returned and the current file position is not updated.
782 BufferSize is set to be the size of the buffer needed to read the entry. On
783 success, the current position is updated to the next directory entry. If there
784 are no more directory entries, the read returns a zero-length buffer.
785 EFI_FILE_INFO is the structure returned as the directory entry.
786
787 @param FileHandle the opened file handle
788 @param BufferSize on input the size of buffer in bytes. on return
789 the number of bytes written.
790 @param Buffer the buffer to put read data into.
791
792 @retval EFI_SUCCESS Data was read.
793 @retval EFI_NO_MEDIA The device has no media.
794 @retval EFI_DEVICE_ERROR The device reported an error.
795 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
796 @retval EFI_BUFFER_TO_SMALL Buffer is too small. ReadSize contains required
797 size.
798
799 **/
800 EFI_STATUS
801 EFIAPI
802 ShellReadFile(
803 IN SHELL_FILE_HANDLE FileHandle,
804 IN OUT UINTN *BufferSize,
805 OUT VOID *Buffer
806 )
807 {
808 return (FileFunctionMap.ReadFile(FileHandle, BufferSize, Buffer));
809 }
810
811
812 /**
813 Write data to a file.
814
815 This function writes the specified number of bytes to the file at the current
816 file position. The current file position is advanced the actual number of bytes
817 written, which is returned in BufferSize. Partial writes only occur when there
818 has been a data error during the write attempt (such as "volume space full").
819 The file is automatically grown to hold the data if required. Direct writes to
820 opened directories are not supported.
821
822 @param FileHandle The opened file for writing
823 @param BufferSize on input the number of bytes in Buffer. On output
824 the number of bytes written.
825 @param Buffer the buffer containing data to write is stored.
826
827 @retval EFI_SUCCESS Data was written.
828 @retval EFI_UNSUPPORTED Writes to an open directory are not supported.
829 @retval EFI_NO_MEDIA The device has no media.
830 @retval EFI_DEVICE_ERROR The device reported an error.
831 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
832 @retval EFI_WRITE_PROTECTED The device is write-protected.
833 @retval EFI_ACCESS_DENIED The file was open for read only.
834 @retval EFI_VOLUME_FULL The volume is full.
835 **/
836 EFI_STATUS
837 EFIAPI
838 ShellWriteFile(
839 IN SHELL_FILE_HANDLE FileHandle,
840 IN OUT UINTN *BufferSize,
841 IN VOID *Buffer
842 )
843 {
844 return (FileFunctionMap.WriteFile(FileHandle, BufferSize, Buffer));
845 }
846
847 /**
848 Close an open file handle.
849
850 This function closes a specified file handle. All "dirty" cached file data is
851 flushed to the device, and the file is closed. In all cases the handle is
852 closed.
853
854 @param FileHandle the file handle to close.
855
856 @retval EFI_SUCCESS the file handle was closed sucessfully.
857 **/
858 EFI_STATUS
859 EFIAPI
860 ShellCloseFile (
861 IN SHELL_FILE_HANDLE *FileHandle
862 )
863 {
864 return (FileFunctionMap.CloseFile(*FileHandle));
865 }
866
867 /**
868 Delete a file and close the handle
869
870 This function closes and deletes a file. In all cases the file handle is closed.
871 If the file cannot be deleted, the warning code EFI_WARN_DELETE_FAILURE is
872 returned, but the handle is still closed.
873
874 @param FileHandle the file handle to delete
875
876 @retval EFI_SUCCESS the file was closed sucessfully
877 @retval EFI_WARN_DELETE_FAILURE the handle was closed, but the file was not
878 deleted
879 @retval INVALID_PARAMETER One of the parameters has an invalid value.
880 **/
881 EFI_STATUS
882 EFIAPI
883 ShellDeleteFile (
884 IN SHELL_FILE_HANDLE *FileHandle
885 )
886 {
887 return (FileFunctionMap.DeleteFile(*FileHandle));
888 }
889
890 /**
891 Set the current position in a file.
892
893 This function sets the current file position for the handle to the position
894 supplied. With the exception of seeking to position 0xFFFFFFFFFFFFFFFF, only
895 absolute positioning is supported, and seeking past the end of the file is
896 allowed (a subsequent write would grow the file). Seeking to position
897 0xFFFFFFFFFFFFFFFF causes the current position to be set to the end of the file.
898 If FileHandle is a directory, the only position that may be set is zero. This
899 has the effect of starting the read process of the directory entries over.
900
901 @param FileHandle The file handle on which the position is being set
902 @param Position Byte position from begining of file
903
904 @retval EFI_SUCCESS Operation completed sucessfully.
905 @retval EFI_UNSUPPORTED the seek request for non-zero is not valid on
906 directories.
907 @retval INVALID_PARAMETER One of the parameters has an invalid value.
908 **/
909 EFI_STATUS
910 EFIAPI
911 ShellSetFilePosition (
912 IN SHELL_FILE_HANDLE FileHandle,
913 IN UINT64 Position
914 )
915 {
916 return (FileFunctionMap.SetFilePosition(FileHandle, Position));
917 }
918
919 /**
920 Gets a file's current position
921
922 This function retrieves the current file position for the file handle. For
923 directories, the current file position has no meaning outside of the file
924 system driver and as such the operation is not supported. An error is returned
925 if FileHandle is a directory.
926
927 @param FileHandle The open file handle on which to get the position.
928 @param Position Byte position from begining of file.
929
930 @retval EFI_SUCCESS the operation completed sucessfully.
931 @retval INVALID_PARAMETER One of the parameters has an invalid value.
932 @retval EFI_UNSUPPORTED the request is not valid on directories.
933 **/
934 EFI_STATUS
935 EFIAPI
936 ShellGetFilePosition (
937 IN SHELL_FILE_HANDLE FileHandle,
938 OUT UINT64 *Position
939 )
940 {
941 return (FileFunctionMap.GetFilePosition(FileHandle, Position));
942 }
943 /**
944 Flushes data on a file
945
946 This function flushes all modified data associated with a file to a device.
947
948 @param FileHandle The file handle on which to flush data
949
950 @retval EFI_SUCCESS The data was flushed.
951 @retval EFI_NO_MEDIA The device has no media.
952 @retval EFI_DEVICE_ERROR The device reported an error.
953 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
954 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
955 @retval EFI_ACCESS_DENIED The file was opened for read only.
956 **/
957 EFI_STATUS
958 EFIAPI
959 ShellFlushFile (
960 IN SHELL_FILE_HANDLE FileHandle
961 )
962 {
963 return (FileFunctionMap.FlushFile(FileHandle));
964 }
965
966 /** Retrieve first entry from a directory.
967
968 This function takes an open directory handle and gets information from the
969 first entry in the directory. A buffer is allocated to contain
970 the information and a pointer to the buffer is returned in *Buffer. The
971 caller can use ShellFindNextFile() to get subsequent directory entries.
972
973 The buffer will be freed by ShellFindNextFile() when the last directory
974 entry is read. Otherwise, the caller must free the buffer, using FreePool,
975 when finished with it.
976
977 @param[in] DirHandle The file handle of the directory to search.
978 @param[out] Buffer The pointer to the buffer for the file's information.
979
980 @retval EFI_SUCCESS Found the first file.
981 @retval EFI_NOT_FOUND Cannot find the directory.
982 @retval EFI_NO_MEDIA The device has no media.
983 @retval EFI_DEVICE_ERROR The device reported an error.
984 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
985 @return Others status of ShellGetFileInfo, ShellSetFilePosition,
986 or ShellReadFile
987 **/
988 EFI_STATUS
989 EFIAPI
990 ShellFindFirstFile (
991 IN SHELL_FILE_HANDLE DirHandle,
992 OUT EFI_FILE_INFO **Buffer
993 )
994 {
995 //
996 // pass to file handle lib
997 //
998 return (FileHandleFindFirstFile(DirHandle, Buffer));
999 }
1000 /** Retrieve next entries from a directory.
1001
1002 To use this function, the caller must first call the ShellFindFirstFile()
1003 function to get the first directory entry. Subsequent directory entries are
1004 retrieved by using the ShellFindNextFile() function. This function can
1005 be called several times to get each entry from the directory. If the call of
1006 ShellFindNextFile() retrieved the last directory entry, the next call of
1007 this function will set *NoFile to TRUE and free the buffer.
1008
1009 @param[in] DirHandle The file handle of the directory.
1010 @param[out] Buffer The pointer to buffer for file's information.
1011 @param[out] NoFile The pointer to boolean when last file is found.
1012
1013 @retval EFI_SUCCESS Found the next file, or reached last file
1014 @retval EFI_NO_MEDIA The device has no media.
1015 @retval EFI_DEVICE_ERROR The device reported an error.
1016 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
1017 **/
1018 EFI_STATUS
1019 EFIAPI
1020 ShellFindNextFile(
1021 IN SHELL_FILE_HANDLE DirHandle,
1022 OUT EFI_FILE_INFO *Buffer,
1023 OUT BOOLEAN *NoFile
1024 )
1025 {
1026 //
1027 // pass to file handle lib
1028 //
1029 return (FileHandleFindNextFile(DirHandle, Buffer, NoFile));
1030 }
1031 /**
1032 Retrieve the size of a file.
1033
1034 if FileHandle is NULL then ASSERT()
1035 if Size is NULL then ASSERT()
1036
1037 This function extracts the file size info from the FileHandle's EFI_FILE_INFO
1038 data.
1039
1040 @param FileHandle file handle from which size is retrieved
1041 @param Size pointer to size
1042
1043 @retval EFI_SUCCESS operation was completed sucessfully
1044 @retval EFI_DEVICE_ERROR cannot access the file
1045 **/
1046 EFI_STATUS
1047 EFIAPI
1048 ShellGetFileSize (
1049 IN SHELL_FILE_HANDLE FileHandle,
1050 OUT UINT64 *Size
1051 )
1052 {
1053 return (FileFunctionMap.GetFileSize(FileHandle, Size));
1054 }
1055 /**
1056 Retrieves the status of the break execution flag
1057
1058 this function is useful to check whether the application is being asked to halt by the shell.
1059
1060 @retval TRUE the execution break is enabled
1061 @retval FALSE the execution break is not enabled
1062 **/
1063 BOOLEAN
1064 EFIAPI
1065 ShellGetExecutionBreakFlag(
1066 VOID
1067 )
1068 {
1069 //
1070 // Check for UEFI Shell 2.0 protocols
1071 //
1072 if (gEfiShellProtocol != NULL) {
1073
1074 //
1075 // We are using UEFI Shell 2.0; see if the event has been triggered
1076 //
1077 if (gBS->CheckEvent(gEfiShellProtocol->ExecutionBreak) != EFI_SUCCESS) {
1078 return (FALSE);
1079 }
1080 return (TRUE);
1081 }
1082
1083 //
1084 // using EFI Shell; call the function to check
1085 //
1086 if (mEfiShellEnvironment2 != NULL) {
1087 return (mEfiShellEnvironment2->GetExecutionBreak());
1088 }
1089
1090 return (FALSE);
1091 }
1092 /**
1093 return the value of an environment variable
1094
1095 this function gets the value of the environment variable set by the
1096 ShellSetEnvironmentVariable function
1097
1098 @param EnvKey The key name of the environment variable.
1099
1100 @retval NULL the named environment variable does not exist.
1101 @return != NULL pointer to the value of the environment variable
1102 **/
1103 CONST CHAR16*
1104 EFIAPI
1105 ShellGetEnvironmentVariable (
1106 IN CONST CHAR16 *EnvKey
1107 )
1108 {
1109 //
1110 // Check for UEFI Shell 2.0 protocols
1111 //
1112 if (gEfiShellProtocol != NULL) {
1113 return (gEfiShellProtocol->GetEnv(EnvKey));
1114 }
1115
1116 //
1117 // Check for EFI shell
1118 //
1119 if (mEfiShellEnvironment2 != NULL) {
1120 return (mEfiShellEnvironment2->GetEnv((CHAR16*)EnvKey));
1121 }
1122
1123 return NULL;
1124 }
1125 /**
1126 set the value of an environment variable
1127
1128 This function changes the current value of the specified environment variable. If the
1129 environment variable exists and the Value is an empty string, then the environment
1130 variable is deleted. If the environment variable exists and the Value is not an empty
1131 string, then the value of the environment variable is changed. If the environment
1132 variable does not exist and the Value is an empty string, there is no action. If the
1133 environment variable does not exist and the Value is a non-empty string, then the
1134 environment variable is created and assigned the specified value.
1135
1136 This is not supported pre-UEFI Shell 2.0.
1137
1138 @param EnvKey The key name of the environment variable.
1139 @param EnvVal The Value of the environment variable
1140 @param Volatile Indicates whether the variable is non-volatile (FALSE) or volatile (TRUE).
1141
1142 @retval EFI_SUCCESS the operation was completed sucessfully
1143 @retval EFI_UNSUPPORTED This operation is not allowed in pre UEFI 2.0 Shell environments
1144 **/
1145 EFI_STATUS
1146 EFIAPI
1147 ShellSetEnvironmentVariable (
1148 IN CONST CHAR16 *EnvKey,
1149 IN CONST CHAR16 *EnvVal,
1150 IN BOOLEAN Volatile
1151 )
1152 {
1153 //
1154 // Check for UEFI Shell 2.0 protocols
1155 //
1156 if (gEfiShellProtocol != NULL) {
1157 return (gEfiShellProtocol->SetEnv(EnvKey, EnvVal, Volatile));
1158 }
1159
1160 //
1161 // This feature does not exist under EFI shell
1162 //
1163 return (EFI_UNSUPPORTED);
1164 }
1165
1166 /**
1167 Cause the shell to parse and execute a command line.
1168
1169 This function creates a nested instance of the shell and executes the specified
1170 command (CommandLine) with the specified environment (Environment). Upon return,
1171 the status code returned by the specified command is placed in StatusCode.
1172 If Environment is NULL, then the current environment is used and all changes made
1173 by the commands executed will be reflected in the current environment. If the
1174 Environment is non-NULL, then the changes made will be discarded.
1175 The CommandLine is executed from the current working directory on the current
1176 device.
1177
1178 The EnvironmentVariables pararemeter is ignored in a pre-UEFI Shell 2.0
1179 environment. The values pointed to by the parameters will be unchanged by the
1180 ShellExecute() function. The Output parameter has no effect in a
1181 UEFI Shell 2.0 environment.
1182
1183 @param[in] ParentHandle The parent image starting the operation.
1184 @param[in] CommandLine The pointer to a NULL terminated command line.
1185 @param[in] Output True to display debug output. False to hide it.
1186 @param[in] EnvironmentVariables Optional pointer to array of environment variables
1187 in the form "x=y". If NULL, the current set is used.
1188 @param[out] Status The status of the run command line.
1189
1190 @retval EFI_SUCCESS The operation completed sucessfully. Status
1191 contains the status code returned.
1192 @retval EFI_INVALID_PARAMETER A parameter contains an invalid value.
1193 @retval EFI_OUT_OF_RESOURCES Out of resources.
1194 @retval EFI_UNSUPPORTED The operation is not allowed.
1195 **/
1196 EFI_STATUS
1197 EFIAPI
1198 ShellExecute (
1199 IN EFI_HANDLE *ParentHandle,
1200 IN CHAR16 *CommandLine OPTIONAL,
1201 IN BOOLEAN Output OPTIONAL,
1202 IN CHAR16 **EnvironmentVariables OPTIONAL,
1203 OUT EFI_STATUS *Status OPTIONAL
1204 )
1205 {
1206 EFI_STATUS CmdStatus;
1207 //
1208 // Check for UEFI Shell 2.0 protocols
1209 //
1210 if (gEfiShellProtocol != NULL) {
1211 //
1212 // Call UEFI Shell 2.0 version (not using Output parameter)
1213 //
1214 return (gEfiShellProtocol->Execute(ParentHandle,
1215 CommandLine,
1216 EnvironmentVariables,
1217 Status));
1218 }
1219
1220 //
1221 // Check for EFI shell
1222 //
1223 if (mEfiShellEnvironment2 != NULL) {
1224 //
1225 // Call EFI Shell version.
1226 // Due to oddity in the EFI shell we want to dereference the ParentHandle here
1227 //
1228 CmdStatus = (mEfiShellEnvironment2->Execute(*ParentHandle,
1229 CommandLine,
1230 Output));
1231 //
1232 // No Status output parameter so just use the returned status
1233 //
1234 if (Status != NULL) {
1235 *Status = CmdStatus;
1236 }
1237 //
1238 // If there was an error, we can't tell if it was from the command or from
1239 // the Execute() function, so we'll just assume the shell ran successfully
1240 // and the error came from the command.
1241 //
1242 return EFI_SUCCESS;
1243 }
1244
1245 return (EFI_UNSUPPORTED);
1246 }
1247
1248 /**
1249 Retreives the current directory path
1250
1251 If the DeviceName is NULL, it returns the current device's current directory
1252 name. If the DeviceName is not NULL, it returns the current directory name
1253 on specified drive.
1254
1255 @param DeviceName the name of the drive to get directory on
1256
1257 @retval NULL the directory does not exist
1258 @return != NULL the directory
1259 **/
1260 CONST CHAR16*
1261 EFIAPI
1262 ShellGetCurrentDir (
1263 IN CHAR16 * CONST DeviceName OPTIONAL
1264 )
1265 {
1266 //
1267 // Check for UEFI Shell 2.0 protocols
1268 //
1269 if (gEfiShellProtocol != NULL) {
1270 return (gEfiShellProtocol->GetCurDir(DeviceName));
1271 }
1272
1273 //
1274 // Check for EFI shell
1275 //
1276 if (mEfiShellEnvironment2 != NULL) {
1277 return (mEfiShellEnvironment2->CurDir(DeviceName));
1278 }
1279
1280 return (NULL);
1281 }
1282 /**
1283 sets (enabled or disabled) the page break mode
1284
1285 when page break mode is enabled the screen will stop scrolling
1286 and wait for operator input before scrolling a subsequent screen.
1287
1288 @param CurrentState TRUE to enable and FALSE to disable
1289 **/
1290 VOID
1291 EFIAPI
1292 ShellSetPageBreakMode (
1293 IN BOOLEAN CurrentState
1294 )
1295 {
1296 //
1297 // check for enabling
1298 //
1299 if (CurrentState != 0x00) {
1300 //
1301 // check for UEFI Shell 2.0
1302 //
1303 if (gEfiShellProtocol != NULL) {
1304 //
1305 // Enable with UEFI 2.0 Shell
1306 //
1307 gEfiShellProtocol->EnablePageBreak();
1308 return;
1309 } else {
1310 //
1311 // Check for EFI shell
1312 //
1313 if (mEfiShellEnvironment2 != NULL) {
1314 //
1315 // Enable with EFI Shell
1316 //
1317 mEfiShellEnvironment2->EnablePageBreak (DEFAULT_INIT_ROW, DEFAULT_AUTO_LF);
1318 return;
1319 }
1320 }
1321 } else {
1322 //
1323 // check for UEFI Shell 2.0
1324 //
1325 if (gEfiShellProtocol != NULL) {
1326 //
1327 // Disable with UEFI 2.0 Shell
1328 //
1329 gEfiShellProtocol->DisablePageBreak();
1330 return;
1331 } else {
1332 //
1333 // Check for EFI shell
1334 //
1335 if (mEfiShellEnvironment2 != NULL) {
1336 //
1337 // Disable with EFI Shell
1338 //
1339 mEfiShellEnvironment2->DisablePageBreak ();
1340 return;
1341 }
1342 }
1343 }
1344 }
1345
1346 ///
1347 /// version of EFI_SHELL_FILE_INFO struct, except has no CONST pointers.
1348 /// This allows for the struct to be populated.
1349 ///
1350 typedef struct {
1351 LIST_ENTRY Link;
1352 EFI_STATUS Status;
1353 CHAR16 *FullName;
1354 CHAR16 *FileName;
1355 SHELL_FILE_HANDLE Handle;
1356 EFI_FILE_INFO *Info;
1357 } EFI_SHELL_FILE_INFO_NO_CONST;
1358
1359 /**
1360 Converts a EFI shell list of structures to the coresponding UEFI Shell 2.0 type of list.
1361
1362 if OldStyleFileList is NULL then ASSERT()
1363
1364 this function will convert a SHELL_FILE_ARG based list into a callee allocated
1365 EFI_SHELL_FILE_INFO based list. it is up to the caller to free the memory via
1366 the ShellCloseFileMetaArg function.
1367
1368 @param[in] FileList the EFI shell list type
1369 @param[in, out] ListHead the list to add to
1370
1371 @retval the resultant head of the double linked new format list;
1372 **/
1373 LIST_ENTRY*
1374 EFIAPI
1375 InternalShellConvertFileListType (
1376 IN LIST_ENTRY *FileList,
1377 IN OUT LIST_ENTRY *ListHead
1378 )
1379 {
1380 SHELL_FILE_ARG *OldInfo;
1381 LIST_ENTRY *Link;
1382 EFI_SHELL_FILE_INFO_NO_CONST *NewInfo;
1383
1384 //
1385 // ASSERTs
1386 //
1387 ASSERT(FileList != NULL);
1388 ASSERT(ListHead != NULL);
1389
1390 //
1391 // enumerate through each member of the old list and copy
1392 //
1393 for (Link = FileList->ForwardLink; Link != FileList; Link = Link->ForwardLink) {
1394 OldInfo = CR (Link, SHELL_FILE_ARG, Link, SHELL_FILE_ARG_SIGNATURE);
1395 ASSERT(OldInfo != NULL);
1396
1397 //
1398 // Skip ones that failed to open...
1399 //
1400 if (OldInfo->Status != EFI_SUCCESS) {
1401 continue;
1402 }
1403
1404 //
1405 // make sure the old list was valid
1406 //
1407 ASSERT(OldInfo->Info != NULL);
1408 ASSERT(OldInfo->FullName != NULL);
1409 ASSERT(OldInfo->FileName != NULL);
1410
1411 //
1412 // allocate a new EFI_SHELL_FILE_INFO object
1413 //
1414 NewInfo = AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
1415 if (NewInfo == NULL) {
1416 ShellCloseFileMetaArg((EFI_SHELL_FILE_INFO**)(&ListHead));
1417 ListHead = NULL;
1418 break;
1419 }
1420
1421 //
1422 // copy the simple items
1423 //
1424 NewInfo->Handle = OldInfo->Handle;
1425 NewInfo->Status = OldInfo->Status;
1426
1427 // old shell checks for 0 not NULL
1428 OldInfo->Handle = 0;
1429
1430 //
1431 // allocate new space to copy strings and structure
1432 //
1433 NewInfo->FullName = AllocateCopyPool(StrSize(OldInfo->FullName), OldInfo->FullName);
1434 NewInfo->FileName = AllocateCopyPool(StrSize(OldInfo->FileName), OldInfo->FileName);
1435 NewInfo->Info = AllocateCopyPool((UINTN)OldInfo->Info->Size, OldInfo->Info);
1436
1437 //
1438 // make sure all the memory allocations were sucessful
1439 //
1440 if (NULL == NewInfo->FullName || NewInfo->FileName == NULL || NewInfo->Info == NULL) {
1441 //
1442 // Free the partially allocated new node
1443 //
1444 SHELL_FREE_NON_NULL(NewInfo->FullName);
1445 SHELL_FREE_NON_NULL(NewInfo->FileName);
1446 SHELL_FREE_NON_NULL(NewInfo->Info);
1447 SHELL_FREE_NON_NULL(NewInfo);
1448
1449 //
1450 // Free the previously converted stuff
1451 //
1452 ShellCloseFileMetaArg((EFI_SHELL_FILE_INFO**)(&ListHead));
1453 ListHead = NULL;
1454 break;
1455 }
1456
1457 //
1458 // add that to the list
1459 //
1460 InsertTailList(ListHead, &NewInfo->Link);
1461 }
1462 return (ListHead);
1463 }
1464 /**
1465 Opens a group of files based on a path.
1466
1467 This function uses the Arg to open all the matching files. Each matched
1468 file has a SHELL_FILE_INFO structure to record the file information. These
1469 structures are placed on the list ListHead. Users can get the SHELL_FILE_INFO
1470 structures from ListHead to access each file. This function supports wildcards
1471 and will process '?' and '*' as such. the list must be freed with a call to
1472 ShellCloseFileMetaArg().
1473
1474 If you are NOT appending to an existing list *ListHead must be NULL. If
1475 *ListHead is NULL then it must be callee freed.
1476
1477 @param Arg pointer to path string
1478 @param OpenMode mode to open files with
1479 @param ListHead head of linked list of results
1480
1481 @retval EFI_SUCCESS the operation was sucessful and the list head
1482 contains the list of opened files
1483 @return != EFI_SUCCESS the operation failed
1484
1485 @sa InternalShellConvertFileListType
1486 **/
1487 EFI_STATUS
1488 EFIAPI
1489 ShellOpenFileMetaArg (
1490 IN CHAR16 *Arg,
1491 IN UINT64 OpenMode,
1492 IN OUT EFI_SHELL_FILE_INFO **ListHead
1493 )
1494 {
1495 EFI_STATUS Status;
1496 LIST_ENTRY mOldStyleFileList;
1497 CHAR16 *CleanFilePathStr;
1498
1499 //
1500 // ASSERT that Arg and ListHead are not NULL
1501 //
1502 ASSERT(Arg != NULL);
1503 ASSERT(ListHead != NULL);
1504
1505 CleanFilePathStr = NULL;
1506
1507 Status = InternalShellStripQuotes (Arg, &CleanFilePathStr);
1508 if (EFI_ERROR (Status)) {
1509 return Status;
1510 }
1511
1512 //
1513 // Check for UEFI Shell 2.0 protocols
1514 //
1515 if (gEfiShellProtocol != NULL) {
1516 if (*ListHead == NULL) {
1517 *ListHead = (EFI_SHELL_FILE_INFO*)AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
1518 if (*ListHead == NULL) {
1519 FreePool(CleanFilePathStr);
1520 return (EFI_OUT_OF_RESOURCES);
1521 }
1522 InitializeListHead(&((*ListHead)->Link));
1523 }
1524 Status = gEfiShellProtocol->OpenFileList(CleanFilePathStr,
1525 OpenMode,
1526 ListHead);
1527 if (EFI_ERROR(Status)) {
1528 gEfiShellProtocol->RemoveDupInFileList(ListHead);
1529 } else {
1530 Status = gEfiShellProtocol->RemoveDupInFileList(ListHead);
1531 }
1532 if (*ListHead != NULL && IsListEmpty(&(*ListHead)->Link)) {
1533 FreePool(*ListHead);
1534 FreePool(CleanFilePathStr);
1535 *ListHead = NULL;
1536 return (EFI_NOT_FOUND);
1537 }
1538 FreePool(CleanFilePathStr);
1539 return (Status);
1540 }
1541
1542 //
1543 // Check for EFI shell
1544 //
1545 if (mEfiShellEnvironment2 != NULL) {
1546 //
1547 // make sure the list head is initialized
1548 //
1549 InitializeListHead(&mOldStyleFileList);
1550
1551 //
1552 // Get the EFI Shell list of files
1553 //
1554 Status = mEfiShellEnvironment2->FileMetaArg(CleanFilePathStr, &mOldStyleFileList);
1555 if (EFI_ERROR(Status)) {
1556 *ListHead = NULL;
1557 FreePool(CleanFilePathStr);
1558 return (Status);
1559 }
1560
1561 if (*ListHead == NULL) {
1562 *ListHead = (EFI_SHELL_FILE_INFO *)AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
1563 if (*ListHead == NULL) {
1564 FreePool(CleanFilePathStr);
1565 return (EFI_OUT_OF_RESOURCES);
1566 }
1567 InitializeListHead(&((*ListHead)->Link));
1568 }
1569
1570 //
1571 // Convert that to equivalent of UEFI Shell 2.0 structure
1572 //
1573 InternalShellConvertFileListType(&mOldStyleFileList, &(*ListHead)->Link);
1574
1575 //
1576 // Free the EFI Shell version that was converted.
1577 //
1578 mEfiShellEnvironment2->FreeFileList(&mOldStyleFileList);
1579
1580 if ((*ListHead)->Link.ForwardLink == (*ListHead)->Link.BackLink && (*ListHead)->Link.BackLink == &((*ListHead)->Link)) {
1581 FreePool(*ListHead);
1582 *ListHead = NULL;
1583 Status = EFI_NOT_FOUND;
1584 }
1585 FreePool(CleanFilePathStr);
1586 return (Status);
1587 }
1588
1589 FreePool(CleanFilePathStr);
1590 return (EFI_UNSUPPORTED);
1591 }
1592 /**
1593 Free the linked list returned from ShellOpenFileMetaArg.
1594
1595 if ListHead is NULL then ASSERT().
1596
1597 @param ListHead the pointer to free.
1598
1599 @retval EFI_SUCCESS the operation was sucessful.
1600 **/
1601 EFI_STATUS
1602 EFIAPI
1603 ShellCloseFileMetaArg (
1604 IN OUT EFI_SHELL_FILE_INFO **ListHead
1605 )
1606 {
1607 LIST_ENTRY *Node;
1608
1609 //
1610 // ASSERT that ListHead is not NULL
1611 //
1612 ASSERT(ListHead != NULL);
1613
1614 //
1615 // Check for UEFI Shell 2.0 protocols
1616 //
1617 if (gEfiShellProtocol != NULL) {
1618 return (gEfiShellProtocol->FreeFileList(ListHead));
1619 } else if (mEfiShellEnvironment2 != NULL) {
1620 //
1621 // Since this is EFI Shell version we need to free our internally made copy
1622 // of the list
1623 //
1624 for ( Node = GetFirstNode(&(*ListHead)->Link)
1625 ; *ListHead != NULL && !IsListEmpty(&(*ListHead)->Link)
1626 ; Node = GetFirstNode(&(*ListHead)->Link)) {
1627 RemoveEntryList(Node);
1628 ((EFI_FILE_PROTOCOL*)((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Handle)->Close(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Handle);
1629 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->FullName);
1630 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->FileName);
1631 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Info);
1632 FreePool((EFI_SHELL_FILE_INFO_NO_CONST*)Node);
1633 }
1634 SHELL_FREE_NON_NULL(*ListHead);
1635 return EFI_SUCCESS;
1636 }
1637
1638 return (EFI_UNSUPPORTED);
1639 }
1640
1641 /**
1642 Find a file by searching the CWD and then the path.
1643
1644 If FileName is NULL then ASSERT.
1645
1646 If the return value is not NULL then the memory must be caller freed.
1647
1648 @param FileName Filename string.
1649
1650 @retval NULL the file was not found
1651 @return !NULL the full path to the file.
1652 **/
1653 CHAR16 *
1654 EFIAPI
1655 ShellFindFilePath (
1656 IN CONST CHAR16 *FileName
1657 )
1658 {
1659 CONST CHAR16 *Path;
1660 SHELL_FILE_HANDLE Handle;
1661 EFI_STATUS Status;
1662 CHAR16 *RetVal;
1663 CHAR16 *TestPath;
1664 CONST CHAR16 *Walker;
1665 UINTN Size;
1666 CHAR16 *TempChar;
1667
1668 RetVal = NULL;
1669
1670 //
1671 // First make sure its not an absolute path.
1672 //
1673 Status = ShellOpenFileByName(FileName, &Handle, EFI_FILE_MODE_READ, 0);
1674 if (!EFI_ERROR(Status)){
1675 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1676 ASSERT(RetVal == NULL);
1677 RetVal = StrnCatGrow(&RetVal, NULL, FileName, 0);
1678 ShellCloseFile(&Handle);
1679 return (RetVal);
1680 } else {
1681 ShellCloseFile(&Handle);
1682 }
1683 }
1684
1685 Path = ShellGetEnvironmentVariable(L"cwd");
1686 if (Path != NULL) {
1687 Size = StrSize(Path);
1688 Size += StrSize(FileName);
1689 TestPath = AllocateZeroPool(Size);
1690 if (TestPath == NULL) {
1691 return (NULL);
1692 }
1693 StrnCpy(TestPath, Path, Size/sizeof(CHAR16) - 1);
1694 StrnCat(TestPath, FileName, Size/sizeof(CHAR16) - 1 - StrLen(TestPath));
1695 Status = ShellOpenFileByName(TestPath, &Handle, EFI_FILE_MODE_READ, 0);
1696 if (!EFI_ERROR(Status)){
1697 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1698 ASSERT(RetVal == NULL);
1699 RetVal = StrnCatGrow(&RetVal, NULL, TestPath, 0);
1700 ShellCloseFile(&Handle);
1701 FreePool(TestPath);
1702 return (RetVal);
1703 } else {
1704 ShellCloseFile(&Handle);
1705 }
1706 }
1707 FreePool(TestPath);
1708 }
1709 Path = ShellGetEnvironmentVariable(L"path");
1710 if (Path != NULL) {
1711 Size = StrSize(Path)+sizeof(CHAR16);
1712 Size += StrSize(FileName);
1713 TestPath = AllocateZeroPool(Size);
1714 if (TestPath == NULL) {
1715 return (NULL);
1716 }
1717 Walker = (CHAR16*)Path;
1718 do {
1719 CopyMem(TestPath, Walker, StrSize(Walker));
1720 if (TestPath != NULL) {
1721 TempChar = StrStr(TestPath, L";");
1722 if (TempChar != NULL) {
1723 *TempChar = CHAR_NULL;
1724 }
1725 if (TestPath[StrLen(TestPath)-1] != L'\\') {
1726 StrnCat(TestPath, L"\\", Size/sizeof(CHAR16) - 1 - StrLen(TestPath));
1727 }
1728 if (FileName[0] == L'\\') {
1729 FileName++;
1730 }
1731 StrnCat(TestPath, FileName, Size/sizeof(CHAR16) - 1 - StrLen(TestPath));
1732 if (StrStr(Walker, L";") != NULL) {
1733 Walker = StrStr(Walker, L";") + 1;
1734 } else {
1735 Walker = NULL;
1736 }
1737 Status = ShellOpenFileByName(TestPath, &Handle, EFI_FILE_MODE_READ, 0);
1738 if (!EFI_ERROR(Status)){
1739 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1740 ASSERT(RetVal == NULL);
1741 RetVal = StrnCatGrow(&RetVal, NULL, TestPath, 0);
1742 ShellCloseFile(&Handle);
1743 break;
1744 } else {
1745 ShellCloseFile(&Handle);
1746 }
1747 }
1748 }
1749 } while (Walker != NULL && Walker[0] != CHAR_NULL);
1750 FreePool(TestPath);
1751 }
1752 return (RetVal);
1753 }
1754
1755 /**
1756 Find a file by searching the CWD and then the path with a variable set of file
1757 extensions. If the file is not found it will append each extension in the list
1758 in the order provided and return the first one that is successful.
1759
1760 If FileName is NULL, then ASSERT.
1761 If FileExtension is NULL, then behavior is identical to ShellFindFilePath.
1762
1763 If the return value is not NULL then the memory must be caller freed.
1764
1765 @param[in] FileName Filename string.
1766 @param[in] FileExtension Semi-colon delimeted list of possible extensions.
1767
1768 @retval NULL The file was not found.
1769 @retval !NULL The path to the file.
1770 **/
1771 CHAR16 *
1772 EFIAPI
1773 ShellFindFilePathEx (
1774 IN CONST CHAR16 *FileName,
1775 IN CONST CHAR16 *FileExtension
1776 )
1777 {
1778 CHAR16 *TestPath;
1779 CHAR16 *RetVal;
1780 CONST CHAR16 *ExtensionWalker;
1781 UINTN Size;
1782 CHAR16 *TempChar;
1783 CHAR16 *TempChar2;
1784
1785 ASSERT(FileName != NULL);
1786 if (FileExtension == NULL) {
1787 return (ShellFindFilePath(FileName));
1788 }
1789 RetVal = ShellFindFilePath(FileName);
1790 if (RetVal != NULL) {
1791 return (RetVal);
1792 }
1793 Size = StrSize(FileName);
1794 Size += StrSize(FileExtension);
1795 TestPath = AllocateZeroPool(Size);
1796 if (TestPath == NULL) {
1797 return (NULL);
1798 }
1799 for (ExtensionWalker = FileExtension, TempChar2 = (CHAR16*)FileExtension; TempChar2 != NULL ; ExtensionWalker = TempChar2 + 1){
1800 StrnCpy(TestPath, FileName, Size/sizeof(CHAR16) - 1);
1801 if (ExtensionWalker != NULL) {
1802 StrnCat(TestPath, ExtensionWalker, Size/sizeof(CHAR16) - 1 - StrLen(TestPath));
1803 }
1804 TempChar = StrStr(TestPath, L";");
1805 if (TempChar != NULL) {
1806 *TempChar = CHAR_NULL;
1807 }
1808 RetVal = ShellFindFilePath(TestPath);
1809 if (RetVal != NULL) {
1810 break;
1811 }
1812 ASSERT(ExtensionWalker != NULL);
1813 TempChar2 = StrStr(ExtensionWalker, L";");
1814 }
1815 FreePool(TestPath);
1816 return (RetVal);
1817 }
1818
1819 typedef struct {
1820 LIST_ENTRY Link;
1821 CHAR16 *Name;
1822 SHELL_PARAM_TYPE Type;
1823 CHAR16 *Value;
1824 UINTN OriginalPosition;
1825 } SHELL_PARAM_PACKAGE;
1826
1827 /**
1828 Checks the list of valid arguments and returns TRUE if the item was found. If the
1829 return value is TRUE then the type parameter is set also.
1830
1831 if CheckList is NULL then ASSERT();
1832 if Name is NULL then ASSERT();
1833 if Type is NULL then ASSERT();
1834
1835 @param Name pointer to Name of parameter found
1836 @param CheckList List to check against
1837 @param Type pointer to type of parameter if it was found
1838
1839 @retval TRUE the Parameter was found. Type is valid.
1840 @retval FALSE the Parameter was not found. Type is not valid.
1841 **/
1842 BOOLEAN
1843 EFIAPI
1844 InternalIsOnCheckList (
1845 IN CONST CHAR16 *Name,
1846 IN CONST SHELL_PARAM_ITEM *CheckList,
1847 OUT SHELL_PARAM_TYPE *Type
1848 )
1849 {
1850 SHELL_PARAM_ITEM *TempListItem;
1851 CHAR16 *TempString;
1852
1853 //
1854 // ASSERT that all 3 pointer parameters aren't NULL
1855 //
1856 ASSERT(CheckList != NULL);
1857 ASSERT(Type != NULL);
1858 ASSERT(Name != NULL);
1859
1860 //
1861 // question mark and page break mode are always supported
1862 //
1863 if ((StrCmp(Name, L"-?") == 0) ||
1864 (StrCmp(Name, L"-b") == 0)
1865 ) {
1866 *Type = TypeFlag;
1867 return (TRUE);
1868 }
1869
1870 //
1871 // Enumerate through the list
1872 //
1873 for (TempListItem = (SHELL_PARAM_ITEM*)CheckList ; TempListItem->Name != NULL ; TempListItem++) {
1874 //
1875 // If the Type is TypeStart only check the first characters of the passed in param
1876 // If it matches set the type and return TRUE
1877 //
1878 if (TempListItem->Type == TypeStart) {
1879 if (StrnCmp(Name, TempListItem->Name, StrLen(TempListItem->Name)) == 0) {
1880 *Type = TempListItem->Type;
1881 return (TRUE);
1882 }
1883 TempString = NULL;
1884 TempString = StrnCatGrow(&TempString, NULL, Name, StrLen(TempListItem->Name));
1885 if (TempString != NULL) {
1886 if (StringNoCaseCompare(&TempString, &TempListItem->Name) == 0) {
1887 *Type = TempListItem->Type;
1888 FreePool(TempString);
1889 return (TRUE);
1890 }
1891 FreePool(TempString);
1892 }
1893 } else if (StringNoCaseCompare(&Name, &TempListItem->Name) == 0) {
1894 *Type = TempListItem->Type;
1895 return (TRUE);
1896 }
1897 }
1898
1899 return (FALSE);
1900 }
1901 /**
1902 Checks the string for indicators of "flag" status. this is a leading '/', '-', or '+'
1903
1904 @param[in] Name pointer to Name of parameter found
1905 @param[in] AlwaysAllowNumbers TRUE to allow numbers, FALSE to not.
1906
1907 @retval TRUE the Parameter is a flag.
1908 @retval FALSE the Parameter not a flag.
1909 **/
1910 BOOLEAN
1911 EFIAPI
1912 InternalIsFlag (
1913 IN CONST CHAR16 *Name,
1914 IN BOOLEAN AlwaysAllowNumbers
1915 )
1916 {
1917 //
1918 // ASSERT that Name isn't NULL
1919 //
1920 ASSERT(Name != NULL);
1921
1922 //
1923 // If we accept numbers then dont return TRUE. (they will be values)
1924 //
1925 if (((Name[0] == L'-' || Name[0] == L'+') && InternalShellIsHexOrDecimalNumber(Name+1, FALSE, FALSE)) && AlwaysAllowNumbers) {
1926 return (FALSE);
1927 }
1928
1929 //
1930 // If the Name has a /, +, or - as the first character return TRUE
1931 //
1932 if ((Name[0] == L'/') ||
1933 (Name[0] == L'-') ||
1934 (Name[0] == L'+')
1935 ) {
1936 return (TRUE);
1937 }
1938 return (FALSE);
1939 }
1940
1941 /**
1942 Checks the command line arguments passed against the list of valid ones.
1943
1944 If no initialization is required, then return RETURN_SUCCESS.
1945
1946 @param[in] CheckList pointer to list of parameters to check
1947 @param[out] CheckPackage pointer to pointer to list checked values
1948 @param[out] ProblemParam optional pointer to pointer to unicode string for
1949 the paramater that caused failure. If used then the
1950 caller is responsible for freeing the memory.
1951 @param[in] AutoPageBreak will automatically set PageBreakEnabled for "b" parameter
1952 @param[in] Argv pointer to array of parameters
1953 @param[in] Argc Count of parameters in Argv
1954 @param[in] AlwaysAllowNumbers TRUE to allow numbers always, FALSE otherwise.
1955
1956 @retval EFI_SUCCESS The operation completed sucessfully.
1957 @retval EFI_OUT_OF_RESOURCES A memory allocation failed
1958 @retval EFI_INVALID_PARAMETER A parameter was invalid
1959 @retval EFI_VOLUME_CORRUPTED the command line was corrupt. an argument was
1960 duplicated. the duplicated command line argument
1961 was returned in ProblemParam if provided.
1962 @retval EFI_NOT_FOUND a argument required a value that was missing.
1963 the invalid command line argument was returned in
1964 ProblemParam if provided.
1965 **/
1966 EFI_STATUS
1967 EFIAPI
1968 InternalCommandLineParse (
1969 IN CONST SHELL_PARAM_ITEM *CheckList,
1970 OUT LIST_ENTRY **CheckPackage,
1971 OUT CHAR16 **ProblemParam OPTIONAL,
1972 IN BOOLEAN AutoPageBreak,
1973 IN CONST CHAR16 **Argv,
1974 IN UINTN Argc,
1975 IN BOOLEAN AlwaysAllowNumbers
1976 )
1977 {
1978 UINTN LoopCounter;
1979 SHELL_PARAM_TYPE CurrentItemType;
1980 SHELL_PARAM_PACKAGE *CurrentItemPackage;
1981 UINTN GetItemValue;
1982 UINTN ValueSize;
1983 UINTN Count;
1984 CONST CHAR16 *TempPointer;
1985 UINTN CurrentValueSize;
1986
1987 CurrentItemPackage = NULL;
1988 GetItemValue = 0;
1989 ValueSize = 0;
1990 Count = 0;
1991
1992 //
1993 // If there is only 1 item we dont need to do anything
1994 //
1995 if (Argc < 1) {
1996 *CheckPackage = NULL;
1997 return (EFI_SUCCESS);
1998 }
1999
2000 //
2001 // ASSERTs
2002 //
2003 ASSERT(CheckList != NULL);
2004 ASSERT(Argv != NULL);
2005
2006 //
2007 // initialize the linked list
2008 //
2009 *CheckPackage = (LIST_ENTRY*)AllocateZeroPool(sizeof(LIST_ENTRY));
2010 if (*CheckPackage == NULL) {
2011 return (EFI_OUT_OF_RESOURCES);
2012 }
2013
2014 InitializeListHead(*CheckPackage);
2015
2016 //
2017 // loop through each of the arguments
2018 //
2019 for (LoopCounter = 0 ; LoopCounter < Argc ; ++LoopCounter) {
2020 if (Argv[LoopCounter] == NULL) {
2021 //
2022 // do nothing for NULL argv
2023 //
2024 } else if (InternalIsOnCheckList(Argv[LoopCounter], CheckList, &CurrentItemType)) {
2025 //
2026 // We might have leftover if last parameter didnt have optional value
2027 //
2028 if (GetItemValue != 0) {
2029 GetItemValue = 0;
2030 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2031 }
2032 //
2033 // this is a flag
2034 //
2035 CurrentItemPackage = AllocateZeroPool(sizeof(SHELL_PARAM_PACKAGE));
2036 if (CurrentItemPackage == NULL) {
2037 ShellCommandLineFreeVarList(*CheckPackage);
2038 *CheckPackage = NULL;
2039 return (EFI_OUT_OF_RESOURCES);
2040 }
2041 CurrentItemPackage->Name = AllocateCopyPool(StrSize(Argv[LoopCounter]), Argv[LoopCounter]);
2042 if (CurrentItemPackage->Name == NULL) {
2043 ShellCommandLineFreeVarList(*CheckPackage);
2044 *CheckPackage = NULL;
2045 return (EFI_OUT_OF_RESOURCES);
2046 }
2047 CurrentItemPackage->Type = CurrentItemType;
2048 CurrentItemPackage->OriginalPosition = (UINTN)(-1);
2049 CurrentItemPackage->Value = NULL;
2050
2051 //
2052 // Does this flag require a value
2053 //
2054 switch (CurrentItemPackage->Type) {
2055 //
2056 // possibly trigger the next loop(s) to populate the value of this item
2057 //
2058 case TypeValue:
2059 GetItemValue = 1;
2060 ValueSize = 0;
2061 break;
2062 case TypeDoubleValue:
2063 GetItemValue = 2;
2064 ValueSize = 0;
2065 break;
2066 case TypeMaxValue:
2067 GetItemValue = (UINTN)(-1);
2068 ValueSize = 0;
2069 break;
2070 default:
2071 //
2072 // this item has no value expected; we are done
2073 //
2074 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2075 ASSERT(GetItemValue == 0);
2076 break;
2077 }
2078 } else if (GetItemValue != 0 && !InternalIsFlag(Argv[LoopCounter], AlwaysAllowNumbers)) {
2079 ASSERT(CurrentItemPackage != NULL);
2080 //
2081 // get the item VALUE for a previous flag
2082 //
2083 if (StrStr(Argv[LoopCounter], L" ") == NULL) {
2084 CurrentValueSize = ValueSize + StrSize(Argv[LoopCounter]) + sizeof(CHAR16);
2085 CurrentItemPackage->Value = ReallocatePool(ValueSize, CurrentValueSize, CurrentItemPackage->Value);
2086 ASSERT(CurrentItemPackage->Value != NULL);
2087 if (ValueSize == 0) {
2088 StrnCpy(CurrentItemPackage->Value, Argv[LoopCounter], CurrentValueSize/sizeof(CHAR16) - 1);
2089 } else {
2090 StrnCat(CurrentItemPackage->Value, L" ", CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2091 StrnCat(CurrentItemPackage->Value, Argv[LoopCounter], CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2092 }
2093 ValueSize += StrSize(Argv[LoopCounter]) + sizeof(CHAR16);
2094 } else {
2095 //
2096 // the parameter has spaces. must be quoted.
2097 //
2098 CurrentValueSize = ValueSize + StrSize(Argv[LoopCounter]) + sizeof(CHAR16) + sizeof(CHAR16) + sizeof(CHAR16);
2099 CurrentItemPackage->Value = ReallocatePool(ValueSize, CurrentValueSize, CurrentItemPackage->Value);
2100 ASSERT(CurrentItemPackage->Value != NULL);
2101 if (ValueSize == 0) {
2102 StrnCpy(CurrentItemPackage->Value, L"\"", CurrentValueSize/sizeof(CHAR16) - 1);
2103 StrnCat(CurrentItemPackage->Value, Argv[LoopCounter], CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2104 StrnCat(CurrentItemPackage->Value, L"\"", CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2105 } else {
2106 StrnCat(CurrentItemPackage->Value, L" ", CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2107 StrnCat(CurrentItemPackage->Value, L"\"", CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2108 StrnCat(CurrentItemPackage->Value, Argv[LoopCounter], CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2109 StrnCat(CurrentItemPackage->Value, L"\"", CurrentValueSize/sizeof(CHAR16) - 1 - StrLen(CurrentItemPackage->Value));
2110 }
2111 ValueSize += StrSize(Argv[LoopCounter]) + sizeof(CHAR16);
2112 }
2113 GetItemValue--;
2114 if (GetItemValue == 0) {
2115 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2116 }
2117 } else if (!InternalIsFlag(Argv[LoopCounter], AlwaysAllowNumbers) ){ //|| ProblemParam == NULL) {
2118 //
2119 // add this one as a non-flag
2120 //
2121
2122 TempPointer = Argv[LoopCounter];
2123 if ((*TempPointer == L'^' && *(TempPointer+1) == L'-')
2124 || (*TempPointer == L'^' && *(TempPointer+1) == L'/')
2125 || (*TempPointer == L'^' && *(TempPointer+1) == L'+')
2126 ){
2127 TempPointer++;
2128 }
2129 CurrentItemPackage = AllocateZeroPool(sizeof(SHELL_PARAM_PACKAGE));
2130 if (CurrentItemPackage == NULL) {
2131 ShellCommandLineFreeVarList(*CheckPackage);
2132 *CheckPackage = NULL;
2133 return (EFI_OUT_OF_RESOURCES);
2134 }
2135 CurrentItemPackage->Name = NULL;
2136 CurrentItemPackage->Type = TypePosition;
2137 CurrentItemPackage->Value = AllocateCopyPool(StrSize(TempPointer), TempPointer);
2138 if (CurrentItemPackage->Value == NULL) {
2139 ShellCommandLineFreeVarList(*CheckPackage);
2140 *CheckPackage = NULL;
2141 return (EFI_OUT_OF_RESOURCES);
2142 }
2143 CurrentItemPackage->OriginalPosition = Count++;
2144 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2145 } else {
2146 //
2147 // this was a non-recognised flag... error!
2148 //
2149 if (ProblemParam != NULL) {
2150 *ProblemParam = AllocateCopyPool(StrSize(Argv[LoopCounter]), Argv[LoopCounter]);
2151 }
2152 ShellCommandLineFreeVarList(*CheckPackage);
2153 *CheckPackage = NULL;
2154 return (EFI_VOLUME_CORRUPTED);
2155 }
2156 }
2157 if (GetItemValue != 0) {
2158 GetItemValue = 0;
2159 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2160 }
2161 //
2162 // support for AutoPageBreak
2163 //
2164 if (AutoPageBreak && ShellCommandLineGetFlag(*CheckPackage, L"-b")) {
2165 ShellSetPageBreakMode(TRUE);
2166 }
2167 return (EFI_SUCCESS);
2168 }
2169
2170 /**
2171 Checks the command line arguments passed against the list of valid ones.
2172 Optionally removes NULL values first.
2173
2174 If no initialization is required, then return RETURN_SUCCESS.
2175
2176 @param[in] CheckList The pointer to list of parameters to check.
2177 @param[out] CheckPackage The package of checked values.
2178 @param[out] ProblemParam Optional pointer to pointer to unicode string for
2179 the paramater that caused failure.
2180 @param[in] AutoPageBreak Will automatically set PageBreakEnabled.
2181 @param[in] AlwaysAllowNumbers Will never fail for number based flags.
2182
2183 @retval EFI_SUCCESS The operation completed sucessfully.
2184 @retval EFI_OUT_OF_RESOURCES A memory allocation failed.
2185 @retval EFI_INVALID_PARAMETER A parameter was invalid.
2186 @retval EFI_VOLUME_CORRUPTED The command line was corrupt.
2187 @retval EFI_DEVICE_ERROR The commands contained 2 opposing arguments. One
2188 of the command line arguments was returned in
2189 ProblemParam if provided.
2190 @retval EFI_NOT_FOUND A argument required a value that was missing.
2191 The invalid command line argument was returned in
2192 ProblemParam if provided.
2193 **/
2194 EFI_STATUS
2195 EFIAPI
2196 ShellCommandLineParseEx (
2197 IN CONST SHELL_PARAM_ITEM *CheckList,
2198 OUT LIST_ENTRY **CheckPackage,
2199 OUT CHAR16 **ProblemParam OPTIONAL,
2200 IN BOOLEAN AutoPageBreak,
2201 IN BOOLEAN AlwaysAllowNumbers
2202 )
2203 {
2204 //
2205 // ASSERT that CheckList and CheckPackage aren't NULL
2206 //
2207 ASSERT(CheckList != NULL);
2208 ASSERT(CheckPackage != NULL);
2209
2210 //
2211 // Check for UEFI Shell 2.0 protocols
2212 //
2213 if (gEfiShellParametersProtocol != NULL) {
2214 return (InternalCommandLineParse(CheckList,
2215 CheckPackage,
2216 ProblemParam,
2217 AutoPageBreak,
2218 (CONST CHAR16**) gEfiShellParametersProtocol->Argv,
2219 gEfiShellParametersProtocol->Argc,
2220 AlwaysAllowNumbers));
2221 }
2222
2223 //
2224 // ASSERT That EFI Shell is not required
2225 //
2226 ASSERT (mEfiShellInterface != NULL);
2227 return (InternalCommandLineParse(CheckList,
2228 CheckPackage,
2229 ProblemParam,
2230 AutoPageBreak,
2231 (CONST CHAR16**) mEfiShellInterface->Argv,
2232 mEfiShellInterface->Argc,
2233 AlwaysAllowNumbers));
2234 }
2235
2236 /**
2237 Frees shell variable list that was returned from ShellCommandLineParse.
2238
2239 This function will free all the memory that was used for the CheckPackage
2240 list of postprocessed shell arguments.
2241
2242 this function has no return value.
2243
2244 if CheckPackage is NULL, then return
2245
2246 @param CheckPackage the list to de-allocate
2247 **/
2248 VOID
2249 EFIAPI
2250 ShellCommandLineFreeVarList (
2251 IN LIST_ENTRY *CheckPackage
2252 )
2253 {
2254 LIST_ENTRY *Node;
2255
2256 //
2257 // check for CheckPackage == NULL
2258 //
2259 if (CheckPackage == NULL) {
2260 return;
2261 }
2262
2263 //
2264 // for each node in the list
2265 //
2266 for ( Node = GetFirstNode(CheckPackage)
2267 ; !IsListEmpty(CheckPackage)
2268 ; Node = GetFirstNode(CheckPackage)
2269 ){
2270 //
2271 // Remove it from the list
2272 //
2273 RemoveEntryList(Node);
2274
2275 //
2276 // if it has a name free the name
2277 //
2278 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
2279 FreePool(((SHELL_PARAM_PACKAGE*)Node)->Name);
2280 }
2281
2282 //
2283 // if it has a value free the value
2284 //
2285 if (((SHELL_PARAM_PACKAGE*)Node)->Value != NULL) {
2286 FreePool(((SHELL_PARAM_PACKAGE*)Node)->Value);
2287 }
2288
2289 //
2290 // free the node structure
2291 //
2292 FreePool((SHELL_PARAM_PACKAGE*)Node);
2293 }
2294 //
2295 // free the list head node
2296 //
2297 FreePool(CheckPackage);
2298 }
2299 /**
2300 Checks for presence of a flag parameter
2301
2302 flag arguments are in the form of "-<Key>" or "/<Key>", but do not have a value following the key
2303
2304 if CheckPackage is NULL then return FALSE.
2305 if KeyString is NULL then ASSERT()
2306
2307 @param CheckPackage The package of parsed command line arguments
2308 @param KeyString the Key of the command line argument to check for
2309
2310 @retval TRUE the flag is on the command line
2311 @retval FALSE the flag is not on the command line
2312 **/
2313 BOOLEAN
2314 EFIAPI
2315 ShellCommandLineGetFlag (
2316 IN CONST LIST_ENTRY * CONST CheckPackage,
2317 IN CONST CHAR16 * CONST KeyString
2318 )
2319 {
2320 LIST_ENTRY *Node;
2321 CHAR16 *TempString;
2322
2323 //
2324 // return FALSE for no package or KeyString is NULL
2325 //
2326 if (CheckPackage == NULL || KeyString == NULL) {
2327 return (FALSE);
2328 }
2329
2330 //
2331 // enumerate through the list of parametrs
2332 //
2333 for ( Node = GetFirstNode(CheckPackage)
2334 ; !IsNull (CheckPackage, Node)
2335 ; Node = GetNextNode(CheckPackage, Node)
2336 ){
2337 //
2338 // If the Name matches, return TRUE (and there may be NULL name)
2339 //
2340 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
2341 //
2342 // If Type is TypeStart then only compare the begining of the strings
2343 //
2344 if (((SHELL_PARAM_PACKAGE*)Node)->Type == TypeStart) {
2345 if (StrnCmp(KeyString, ((SHELL_PARAM_PACKAGE*)Node)->Name, StrLen(KeyString)) == 0) {
2346 return (TRUE);
2347 }
2348 TempString = NULL;
2349 TempString = StrnCatGrow(&TempString, NULL, KeyString, StrLen(((SHELL_PARAM_PACKAGE*)Node)->Name));
2350 if (TempString != NULL) {
2351 if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2352 FreePool(TempString);
2353 return (TRUE);
2354 }
2355 FreePool(TempString);
2356 }
2357 } else if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2358 return (TRUE);
2359 }
2360 }
2361 }
2362 return (FALSE);
2363 }
2364 /**
2365 Returns value from command line argument.
2366
2367 Value parameters are in the form of "-<Key> value" or "/<Key> value".
2368
2369 If CheckPackage is NULL, then return NULL.
2370
2371 @param[in] CheckPackage The package of parsed command line arguments.
2372 @param[in] KeyString The Key of the command line argument to check for.
2373
2374 @retval NULL The flag is not on the command line.
2375 @retval !=NULL The pointer to unicode string of the value.
2376 **/
2377 CONST CHAR16*
2378 EFIAPI
2379 ShellCommandLineGetValue (
2380 IN CONST LIST_ENTRY *CheckPackage,
2381 IN CHAR16 *KeyString
2382 )
2383 {
2384 LIST_ENTRY *Node;
2385 CHAR16 *TempString;
2386
2387 //
2388 // return NULL for no package or KeyString is NULL
2389 //
2390 if (CheckPackage == NULL || KeyString == NULL) {
2391 return (NULL);
2392 }
2393
2394 //
2395 // enumerate through the list of parametrs
2396 //
2397 for ( Node = GetFirstNode(CheckPackage)
2398 ; !IsNull (CheckPackage, Node)
2399 ; Node = GetNextNode(CheckPackage, Node)
2400 ){
2401 //
2402 // If the Name matches, return TRUE (and there may be NULL name)
2403 //
2404 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
2405 //
2406 // If Type is TypeStart then only compare the begining of the strings
2407 //
2408 if (((SHELL_PARAM_PACKAGE*)Node)->Type == TypeStart) {
2409 if (StrnCmp(KeyString, ((SHELL_PARAM_PACKAGE*)Node)->Name, StrLen(KeyString)) == 0) {
2410 return (((SHELL_PARAM_PACKAGE*)Node)->Name + StrLen(KeyString));
2411 }
2412 TempString = NULL;
2413 TempString = StrnCatGrow(&TempString, NULL, KeyString, StrLen(((SHELL_PARAM_PACKAGE*)Node)->Name));
2414 if (TempString != NULL) {
2415 if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2416 FreePool(TempString);
2417 return (((SHELL_PARAM_PACKAGE*)Node)->Name + StrLen(KeyString));
2418 }
2419 FreePool(TempString);
2420 }
2421 } else if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2422 return (((SHELL_PARAM_PACKAGE*)Node)->Value);
2423 }
2424 }
2425 }
2426 return (NULL);
2427 }
2428
2429 /**
2430 Returns raw value from command line argument.
2431
2432 Raw value parameters are in the form of "value" in a specific position in the list.
2433
2434 If CheckPackage is NULL, then return NULL.
2435
2436 @param[in] CheckPackage The package of parsed command line arguments.
2437 @param[in] Position The position of the value.
2438
2439 @retval NULL The flag is not on the command line.
2440 @retval !=NULL The pointer to unicode string of the value.
2441 **/
2442 CONST CHAR16*
2443 EFIAPI
2444 ShellCommandLineGetRawValue (
2445 IN CONST LIST_ENTRY * CONST CheckPackage,
2446 IN UINTN Position
2447 )
2448 {
2449 LIST_ENTRY *Node;
2450
2451 //
2452 // check for CheckPackage == NULL
2453 //
2454 if (CheckPackage == NULL) {
2455 return (NULL);
2456 }
2457
2458 //
2459 // enumerate through the list of parametrs
2460 //
2461 for ( Node = GetFirstNode(CheckPackage)
2462 ; !IsNull (CheckPackage, Node)
2463 ; Node = GetNextNode(CheckPackage, Node)
2464 ){
2465 //
2466 // If the position matches, return the value
2467 //
2468 if (((SHELL_PARAM_PACKAGE*)Node)->OriginalPosition == Position) {
2469 return (((SHELL_PARAM_PACKAGE*)Node)->Value);
2470 }
2471 }
2472 return (NULL);
2473 }
2474
2475 /**
2476 returns the number of command line value parameters that were parsed.
2477
2478 this will not include flags.
2479
2480 @param[in] CheckPackage The package of parsed command line arguments.
2481
2482 @retval (UINTN)-1 No parsing has ocurred
2483 @return other The number of value parameters found
2484 **/
2485 UINTN
2486 EFIAPI
2487 ShellCommandLineGetCount(
2488 IN CONST LIST_ENTRY *CheckPackage
2489 )
2490 {
2491 LIST_ENTRY *Node1;
2492 UINTN Count;
2493
2494 if (CheckPackage == NULL) {
2495 return (0);
2496 }
2497 for ( Node1 = GetFirstNode(CheckPackage), Count = 0
2498 ; !IsNull (CheckPackage, Node1)
2499 ; Node1 = GetNextNode(CheckPackage, Node1)
2500 ){
2501 if (((SHELL_PARAM_PACKAGE*)Node1)->Name == NULL) {
2502 Count++;
2503 }
2504 }
2505 return (Count);
2506 }
2507
2508 /**
2509 Determins if a parameter is duplicated.
2510
2511 If Param is not NULL then it will point to a callee allocated string buffer
2512 with the parameter value if a duplicate is found.
2513
2514 If CheckPackage is NULL, then ASSERT.
2515
2516 @param[in] CheckPackage The package of parsed command line arguments.
2517 @param[out] Param Upon finding one, a pointer to the duplicated parameter.
2518
2519 @retval EFI_SUCCESS No parameters were duplicated.
2520 @retval EFI_DEVICE_ERROR A duplicate was found.
2521 **/
2522 EFI_STATUS
2523 EFIAPI
2524 ShellCommandLineCheckDuplicate (
2525 IN CONST LIST_ENTRY *CheckPackage,
2526 OUT CHAR16 **Param
2527 )
2528 {
2529 LIST_ENTRY *Node1;
2530 LIST_ENTRY *Node2;
2531
2532 ASSERT(CheckPackage != NULL);
2533
2534 for ( Node1 = GetFirstNode(CheckPackage)
2535 ; !IsNull (CheckPackage, Node1)
2536 ; Node1 = GetNextNode(CheckPackage, Node1)
2537 ){
2538 for ( Node2 = GetNextNode(CheckPackage, Node1)
2539 ; !IsNull (CheckPackage, Node2)
2540 ; Node2 = GetNextNode(CheckPackage, Node2)
2541 ){
2542 if ((((SHELL_PARAM_PACKAGE*)Node1)->Name != NULL) && (((SHELL_PARAM_PACKAGE*)Node2)->Name != NULL) && StrCmp(((SHELL_PARAM_PACKAGE*)Node1)->Name, ((SHELL_PARAM_PACKAGE*)Node2)->Name) == 0) {
2543 if (Param != NULL) {
2544 *Param = NULL;
2545 *Param = StrnCatGrow(Param, NULL, ((SHELL_PARAM_PACKAGE*)Node1)->Name, 0);
2546 }
2547 return (EFI_DEVICE_ERROR);
2548 }
2549 }
2550 }
2551 return (EFI_SUCCESS);
2552 }
2553
2554 /**
2555 This is a find and replace function. Upon successful return the NewString is a copy of
2556 SourceString with each instance of FindTarget replaced with ReplaceWith.
2557
2558 If SourceString and NewString overlap the behavior is undefined.
2559
2560 If the string would grow bigger than NewSize it will halt and return error.
2561
2562 @param[in] SourceString The string with source buffer.
2563 @param[in, out] NewString The string with resultant buffer.
2564 @param[in] NewSize The size in bytes of NewString.
2565 @param[in] FindTarget The string to look for.
2566 @param[in] ReplaceWith The string to replace FindTarget with.
2567 @param[in] SkipPreCarrot If TRUE will skip a FindTarget that has a '^'
2568 immediately before it.
2569 @param[in] ParameterReplacing If TRUE will add "" around items with spaces.
2570
2571 @retval EFI_INVALID_PARAMETER SourceString was NULL.
2572 @retval EFI_INVALID_PARAMETER NewString was NULL.
2573 @retval EFI_INVALID_PARAMETER FindTarget was NULL.
2574 @retval EFI_INVALID_PARAMETER ReplaceWith was NULL.
2575 @retval EFI_INVALID_PARAMETER FindTarget had length < 1.
2576 @retval EFI_INVALID_PARAMETER SourceString had length < 1.
2577 @retval EFI_BUFFER_TOO_SMALL NewSize was less than the minimum size to hold
2578 the new string (truncation occurred).
2579 @retval EFI_SUCCESS The string was successfully copied with replacement.
2580 **/
2581 EFI_STATUS
2582 EFIAPI
2583 ShellCopySearchAndReplace(
2584 IN CHAR16 CONST *SourceString,
2585 IN OUT CHAR16 *NewString,
2586 IN UINTN NewSize,
2587 IN CONST CHAR16 *FindTarget,
2588 IN CONST CHAR16 *ReplaceWith,
2589 IN CONST BOOLEAN SkipPreCarrot,
2590 IN CONST BOOLEAN ParameterReplacing
2591 )
2592 {
2593 UINTN Size;
2594 CHAR16 *Replace;
2595
2596 if ( (SourceString == NULL)
2597 || (NewString == NULL)
2598 || (FindTarget == NULL)
2599 || (ReplaceWith == NULL)
2600 || (StrLen(FindTarget) < 1)
2601 || (StrLen(SourceString) < 1)
2602 ){
2603 return (EFI_INVALID_PARAMETER);
2604 }
2605 Replace = NULL;
2606 if (StrStr(ReplaceWith, L" ") == NULL || !ParameterReplacing) {
2607 Replace = StrnCatGrow(&Replace, NULL, ReplaceWith, 0);
2608 } else {
2609 Replace = AllocateZeroPool(StrSize(ReplaceWith) + 2*sizeof(CHAR16));
2610 if (Replace != NULL) {
2611 UnicodeSPrint(Replace, StrSize(ReplaceWith) + 2*sizeof(CHAR16), L"\"%s\"", ReplaceWith);
2612 }
2613 }
2614 if (Replace == NULL) {
2615 return (EFI_OUT_OF_RESOURCES);
2616 }
2617 NewString = ZeroMem(NewString, NewSize);
2618 while (*SourceString != CHAR_NULL) {
2619 //
2620 // if we find the FindTarget and either Skip == FALSE or Skip and we
2621 // dont have a carrot do a replace...
2622 //
2623 if (StrnCmp(SourceString, FindTarget, StrLen(FindTarget)) == 0
2624 && ((SkipPreCarrot && *(SourceString-1) != L'^') || !SkipPreCarrot)
2625 ){
2626 SourceString += StrLen(FindTarget);
2627 Size = StrSize(NewString);
2628 if ((Size + (StrLen(Replace)*sizeof(CHAR16))) > NewSize) {
2629 FreePool(Replace);
2630 return (EFI_BUFFER_TOO_SMALL);
2631 }
2632 StrnCat(NewString, Replace, NewSize/sizeof(CHAR16) - 1 - StrLen(NewString));
2633 } else {
2634 Size = StrSize(NewString);
2635 if (Size + sizeof(CHAR16) > NewSize) {
2636 FreePool(Replace);
2637 return (EFI_BUFFER_TOO_SMALL);
2638 }
2639 StrnCat(NewString, SourceString, 1);
2640 SourceString++;
2641 }
2642 }
2643 FreePool(Replace);
2644 return (EFI_SUCCESS);
2645 }
2646
2647 /**
2648 Internal worker function to output a string.
2649
2650 This function will output a string to the correct StdOut.
2651
2652 @param[in] String The string to print out.
2653
2654 @retval EFI_SUCCESS The operation was sucessful.
2655 @retval !EFI_SUCCESS The operation failed.
2656 **/
2657 EFI_STATUS
2658 EFIAPI
2659 InternalPrintTo (
2660 IN CONST CHAR16 *String
2661 )
2662 {
2663 UINTN Size;
2664 Size = StrSize(String) - sizeof(CHAR16);
2665 if (Size == 0) {
2666 return (EFI_SUCCESS);
2667 }
2668 if (gEfiShellParametersProtocol != NULL) {
2669 return (gEfiShellProtocol->WriteFile(gEfiShellParametersProtocol->StdOut, &Size, (VOID*)String));
2670 }
2671 if (mEfiShellInterface != NULL) {
2672 if (mEfiShellInterface->RedirArgc == 0) {
2673 //
2674 // Divide in half for old shell. Must be string length not size.
2675 //
2676 Size /=2; // Divide in half only when no redirection.
2677 }
2678 return (mEfiShellInterface->StdOut->Write(mEfiShellInterface->StdOut, &Size, (VOID*)String));
2679 }
2680 ASSERT(FALSE);
2681 return (EFI_UNSUPPORTED);
2682 }
2683
2684 /**
2685 Print at a specific location on the screen.
2686
2687 This function will move the cursor to a given screen location and print the specified string
2688
2689 If -1 is specified for either the Row or Col the current screen location for BOTH
2690 will be used.
2691
2692 if either Row or Col is out of range for the current console, then ASSERT
2693 if Format is NULL, then ASSERT
2694
2695 In addition to the standard %-based flags as supported by UefiLib Print() this supports
2696 the following additional flags:
2697 %N - Set output attribute to normal
2698 %H - Set output attribute to highlight
2699 %E - Set output attribute to error
2700 %B - Set output attribute to blue color
2701 %V - Set output attribute to green color
2702
2703 Note: The background color is controlled by the shell command cls.
2704
2705 @param[in] Col the column to print at
2706 @param[in] Row the row to print at
2707 @param[in] Format the format string
2708 @param[in] Marker the marker for the variable argument list
2709
2710 @return EFI_SUCCESS The operation was successful.
2711 @return EFI_DEVICE_ERROR The console device reported an error.
2712 **/
2713 EFI_STATUS
2714 EFIAPI
2715 InternalShellPrintWorker(
2716 IN INT32 Col OPTIONAL,
2717 IN INT32 Row OPTIONAL,
2718 IN CONST CHAR16 *Format,
2719 IN VA_LIST Marker
2720 )
2721 {
2722 EFI_STATUS Status;
2723 CHAR16 *ResumeLocation;
2724 CHAR16 *FormatWalker;
2725 UINTN OriginalAttribute;
2726 CHAR16 *mPostReplaceFormat;
2727 CHAR16 *mPostReplaceFormat2;
2728
2729 mPostReplaceFormat = AllocateZeroPool (PcdGet16 (PcdShellPrintBufferSize));
2730 mPostReplaceFormat2 = AllocateZeroPool (PcdGet16 (PcdShellPrintBufferSize));
2731
2732 if (mPostReplaceFormat == NULL || mPostReplaceFormat2 == NULL) {
2733 SHELL_FREE_NON_NULL(mPostReplaceFormat);
2734 SHELL_FREE_NON_NULL(mPostReplaceFormat2);
2735 return (EFI_OUT_OF_RESOURCES);
2736 }
2737
2738 Status = EFI_SUCCESS;
2739 OriginalAttribute = gST->ConOut->Mode->Attribute;
2740
2741 //
2742 // Back and forth each time fixing up 1 of our flags...
2743 //
2744 Status = ShellCopySearchAndReplace(Format, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%N", L"%%N", FALSE, FALSE);
2745 ASSERT_EFI_ERROR(Status);
2746 Status = ShellCopySearchAndReplace(mPostReplaceFormat, mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), L"%E", L"%%E", FALSE, FALSE);
2747 ASSERT_EFI_ERROR(Status);
2748 Status = ShellCopySearchAndReplace(mPostReplaceFormat2, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%H", L"%%H", FALSE, FALSE);
2749 ASSERT_EFI_ERROR(Status);
2750 Status = ShellCopySearchAndReplace(mPostReplaceFormat, mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), L"%B", L"%%B", FALSE, FALSE);
2751 ASSERT_EFI_ERROR(Status);
2752 Status = ShellCopySearchAndReplace(mPostReplaceFormat2, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%V", L"%%V", FALSE, FALSE);
2753 ASSERT_EFI_ERROR(Status);
2754
2755 //
2756 // Use the last buffer from replacing to print from...
2757 //
2758 UnicodeVSPrint (mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), mPostReplaceFormat, Marker);
2759
2760 if (Col != -1 && Row != -1) {
2761 Status = gST->ConOut->SetCursorPosition(gST->ConOut, Col, Row);
2762 }
2763
2764 FormatWalker = mPostReplaceFormat2;
2765 while (*FormatWalker != CHAR_NULL) {
2766 //
2767 // Find the next attribute change request
2768 //
2769 ResumeLocation = StrStr(FormatWalker, L"%");
2770 if (ResumeLocation != NULL) {
2771 *ResumeLocation = CHAR_NULL;
2772 }
2773 //
2774 // print the current FormatWalker string
2775 //
2776 if (StrLen(FormatWalker)>0) {
2777 Status = InternalPrintTo(FormatWalker);
2778 if (EFI_ERROR(Status)) {
2779 break;
2780 }
2781 }
2782
2783 //
2784 // update the attribute
2785 //
2786 if (ResumeLocation != NULL) {
2787 if (*(ResumeLocation-1) == L'^') {
2788 //
2789 // Move cursor back 1 position to overwrite the ^
2790 //
2791 gST->ConOut->SetCursorPosition(gST->ConOut, gST->ConOut->Mode->CursorColumn - 1, gST->ConOut->Mode->CursorRow);
2792
2793 //
2794 // Print a simple '%' symbol
2795 //
2796 Status = InternalPrintTo(L"%");
2797 ResumeLocation = ResumeLocation - 1;
2798 } else {
2799 switch (*(ResumeLocation+1)) {
2800 case (L'N'):
2801 gST->ConOut->SetAttribute(gST->ConOut, OriginalAttribute);
2802 break;
2803 case (L'E'):
2804 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_YELLOW, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2805 break;
2806 case (L'H'):
2807 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_WHITE, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2808 break;
2809 case (L'B'):
2810 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_BLUE, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2811 break;
2812 case (L'V'):
2813 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_GREEN, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2814 break;
2815 default:
2816 //
2817 // Print a simple '%' symbol
2818 //
2819 Status = InternalPrintTo(L"%");
2820 if (EFI_ERROR(Status)) {
2821 break;
2822 }
2823 ResumeLocation = ResumeLocation - 1;
2824 break;
2825 }
2826 }
2827 } else {
2828 //
2829 // reset to normal now...
2830 //
2831 break;
2832 }
2833
2834 //
2835 // update FormatWalker to Resume + 2 (skip the % and the indicator)
2836 //
2837 FormatWalker = ResumeLocation + 2;
2838 }
2839
2840 gST->ConOut->SetAttribute(gST->ConOut, OriginalAttribute);
2841
2842 SHELL_FREE_NON_NULL(mPostReplaceFormat);
2843 SHELL_FREE_NON_NULL(mPostReplaceFormat2);
2844 return (Status);
2845 }
2846
2847 /**
2848 Print at a specific location on the screen.
2849
2850 This function will move the cursor to a given screen location and print the specified string.
2851
2852 If -1 is specified for either the Row or Col the current screen location for BOTH
2853 will be used.
2854
2855 If either Row or Col is out of range for the current console, then ASSERT.
2856 If Format is NULL, then ASSERT.
2857
2858 In addition to the standard %-based flags as supported by UefiLib Print() this supports
2859 the following additional flags:
2860 %N - Set output attribute to normal
2861 %H - Set output attribute to highlight
2862 %E - Set output attribute to error
2863 %B - Set output attribute to blue color
2864 %V - Set output attribute to green color
2865
2866 Note: The background color is controlled by the shell command cls.
2867
2868 @param[in] Col the column to print at
2869 @param[in] Row the row to print at
2870 @param[in] Format the format string
2871 @param[in] ... The variable argument list.
2872
2873 @return EFI_SUCCESS The printing was successful.
2874 @return EFI_DEVICE_ERROR The console device reported an error.
2875 **/
2876 EFI_STATUS
2877 EFIAPI
2878 ShellPrintEx(
2879 IN INT32 Col OPTIONAL,
2880 IN INT32 Row OPTIONAL,
2881 IN CONST CHAR16 *Format,
2882 ...
2883 )
2884 {
2885 VA_LIST Marker;
2886 EFI_STATUS RetVal;
2887 if (Format == NULL) {
2888 return (EFI_INVALID_PARAMETER);
2889 }
2890 VA_START (Marker, Format);
2891 RetVal = InternalShellPrintWorker(Col, Row, Format, Marker);
2892 VA_END(Marker);
2893 return(RetVal);
2894 }
2895
2896 /**
2897 Print at a specific location on the screen.
2898
2899 This function will move the cursor to a given screen location and print the specified string.
2900
2901 If -1 is specified for either the Row or Col the current screen location for BOTH
2902 will be used.
2903
2904 If either Row or Col is out of range for the current console, then ASSERT.
2905 If Format is NULL, then ASSERT.
2906
2907 In addition to the standard %-based flags as supported by UefiLib Print() this supports
2908 the following additional flags:
2909 %N - Set output attribute to normal.
2910 %H - Set output attribute to highlight.
2911 %E - Set output attribute to error.
2912 %B - Set output attribute to blue color.
2913 %V - Set output attribute to green color.
2914
2915 Note: The background color is controlled by the shell command cls.
2916
2917 @param[in] Col The column to print at.
2918 @param[in] Row The row to print at.
2919 @param[in] Language The language of the string to retrieve. If this parameter
2920 is NULL, then the current platform language is used.
2921 @param[in] HiiFormatStringId The format string Id for getting from Hii.
2922 @param[in] HiiFormatHandle The format string Handle for getting from Hii.
2923 @param[in] ... The variable argument list.
2924
2925 @return EFI_SUCCESS The printing was successful.
2926 @return EFI_DEVICE_ERROR The console device reported an error.
2927 **/
2928 EFI_STATUS
2929 EFIAPI
2930 ShellPrintHiiEx(
2931 IN INT32 Col OPTIONAL,
2932 IN INT32 Row OPTIONAL,
2933 IN CONST CHAR8 *Language OPTIONAL,
2934 IN CONST EFI_STRING_ID HiiFormatStringId,
2935 IN CONST EFI_HANDLE HiiFormatHandle,
2936 ...
2937 )
2938 {
2939 VA_LIST Marker;
2940 CHAR16 *HiiFormatString;
2941 EFI_STATUS RetVal;
2942
2943 VA_START (Marker, HiiFormatHandle);
2944 HiiFormatString = HiiGetString(HiiFormatHandle, HiiFormatStringId, Language);
2945 ASSERT(HiiFormatString != NULL);
2946
2947 RetVal = InternalShellPrintWorker(Col, Row, HiiFormatString, Marker);
2948
2949 SHELL_FREE_NON_NULL(HiiFormatString);
2950 VA_END(Marker);
2951
2952 return (RetVal);
2953 }
2954
2955 /**
2956 Function to determine if a given filename represents a file or a directory.
2957
2958 @param[in] DirName Path to directory to test.
2959
2960 @retval EFI_SUCCESS The Path represents a directory
2961 @retval EFI_NOT_FOUND The Path does not represent a directory
2962 @retval EFI_OUT_OF_RESOURCES A memory allocation failed.
2963 @return The path failed to open
2964 **/
2965 EFI_STATUS
2966 EFIAPI
2967 ShellIsDirectory(
2968 IN CONST CHAR16 *DirName
2969 )
2970 {
2971 EFI_STATUS Status;
2972 SHELL_FILE_HANDLE Handle;
2973 CHAR16 *TempLocation;
2974 CHAR16 *TempLocation2;
2975
2976 ASSERT(DirName != NULL);
2977
2978 Handle = NULL;
2979 TempLocation = NULL;
2980
2981 Status = ShellOpenFileByName(DirName, &Handle, EFI_FILE_MODE_READ, 0);
2982 if (EFI_ERROR(Status)) {
2983 //
2984 // try good logic first.
2985 //
2986 if (gEfiShellProtocol != NULL) {
2987 TempLocation = StrnCatGrow(&TempLocation, NULL, DirName, 0);
2988 if (TempLocation == NULL) {
2989 ShellCloseFile(&Handle);
2990 return (EFI_OUT_OF_RESOURCES);
2991 }
2992 TempLocation2 = StrStr(TempLocation, L":");
2993 if (TempLocation2 != NULL && StrLen(StrStr(TempLocation, L":")) == 2) {
2994 *(TempLocation2+1) = CHAR_NULL;
2995 }
2996 if (gEfiShellProtocol->GetDevicePathFromMap(TempLocation) != NULL) {
2997 FreePool(TempLocation);
2998 return (EFI_SUCCESS);
2999 }
3000 FreePool(TempLocation);
3001 } else {
3002 //
3003 // probably a map name?!?!!?
3004 //
3005 TempLocation = StrStr(DirName, L"\\");
3006 if (TempLocation != NULL && *(TempLocation+1) == CHAR_NULL) {
3007 return (EFI_SUCCESS);
3008 }
3009 }
3010 return (Status);
3011 }
3012
3013 if (FileHandleIsDirectory(Handle) == EFI_SUCCESS) {
3014 ShellCloseFile(&Handle);
3015 return (EFI_SUCCESS);
3016 }
3017 ShellCloseFile(&Handle);
3018 return (EFI_NOT_FOUND);
3019 }
3020
3021 /**
3022 Function to determine if a given filename represents a file.
3023
3024 @param[in] Name Path to file to test.
3025
3026 @retval EFI_SUCCESS The Path represents a file.
3027 @retval EFI_NOT_FOUND The Path does not represent a file.
3028 @retval other The path failed to open.
3029 **/
3030 EFI_STATUS
3031 EFIAPI
3032 ShellIsFile(
3033 IN CONST CHAR16 *Name
3034 )
3035 {
3036 EFI_STATUS Status;
3037 SHELL_FILE_HANDLE Handle;
3038
3039 ASSERT(Name != NULL);
3040
3041 Handle = NULL;
3042
3043 Status = ShellOpenFileByName(Name, &Handle, EFI_FILE_MODE_READ, 0);
3044 if (EFI_ERROR(Status)) {
3045 return (Status);
3046 }
3047
3048 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
3049 ShellCloseFile(&Handle);
3050 return (EFI_SUCCESS);
3051 }
3052 ShellCloseFile(&Handle);
3053 return (EFI_NOT_FOUND);
3054 }
3055
3056 /**
3057 Function to determine if a given filename represents a file.
3058
3059 This will search the CWD and then the Path.
3060
3061 If Name is NULL, then ASSERT.
3062
3063 @param[in] Name Path to file to test.
3064
3065 @retval EFI_SUCCESS The Path represents a file.
3066 @retval EFI_NOT_FOUND The Path does not represent a file.
3067 @retval other The path failed to open.
3068 **/
3069 EFI_STATUS
3070 EFIAPI
3071 ShellIsFileInPath(
3072 IN CONST CHAR16 *Name
3073 )
3074 {
3075 CHAR16 *NewName;
3076 EFI_STATUS Status;
3077
3078 if (!EFI_ERROR(ShellIsFile(Name))) {
3079 return (EFI_SUCCESS);
3080 }
3081
3082 NewName = ShellFindFilePath(Name);
3083 if (NewName == NULL) {
3084 return (EFI_NOT_FOUND);
3085 }
3086 Status = ShellIsFile(NewName);
3087 FreePool(NewName);
3088 return (Status);
3089 }
3090
3091 /**
3092 Function return the number converted from a hex representation of a number.
3093
3094 Note: this function cannot be used when (UINTN)(-1), (0xFFFFFFFF) may be a valid
3095 result. Use ShellConvertStringToUint64 instead.
3096
3097 @param[in] String String representation of a number.
3098
3099 @return The unsigned integer result of the conversion.
3100 @retval (UINTN)(-1) An error occured.
3101 **/
3102 UINTN
3103 EFIAPI
3104 ShellHexStrToUintn(
3105 IN CONST CHAR16 *String
3106 )
3107 {
3108 UINT64 RetVal;
3109
3110 if (!EFI_ERROR(ShellConvertStringToUint64(String, &RetVal, TRUE, TRUE))) {
3111 return ((UINTN)RetVal);
3112 }
3113
3114 return ((UINTN)(-1));
3115 }
3116
3117 /**
3118 Function to determine whether a string is decimal or hex representation of a number
3119 and return the number converted from the string. Spaces are always skipped.
3120
3121 @param[in] String String representation of a number
3122
3123 @return the number
3124 @retval (UINTN)(-1) An error ocurred.
3125 **/
3126 UINTN
3127 EFIAPI
3128 ShellStrToUintn(
3129 IN CONST CHAR16 *String
3130 )
3131 {
3132 UINT64 RetVal;
3133 BOOLEAN Hex;
3134
3135 Hex = FALSE;
3136
3137 if (!InternalShellIsHexOrDecimalNumber(String, Hex, TRUE)) {
3138 Hex = TRUE;
3139 }
3140
3141 if (!EFI_ERROR(ShellConvertStringToUint64(String, &RetVal, Hex, TRUE))) {
3142 return ((UINTN)RetVal);
3143 }
3144 return ((UINTN)(-1));
3145 }
3146
3147 /**
3148 Safely append with automatic string resizing given length of Destination and
3149 desired length of copy from Source.
3150
3151 append the first D characters of Source to the end of Destination, where D is
3152 the lesser of Count and the StrLen() of Source. If appending those D characters
3153 will fit within Destination (whose Size is given as CurrentSize) and
3154 still leave room for a NULL terminator, then those characters are appended,
3155 starting at the original terminating NULL of Destination, and a new terminating
3156 NULL is appended.
3157
3158 If appending D characters onto Destination will result in a overflow of the size
3159 given in CurrentSize the string will be grown such that the copy can be performed
3160 and CurrentSize will be updated to the new size.
3161
3162 If Source is NULL, there is nothing to append, just return the current buffer in
3163 Destination.
3164
3165 if Destination is NULL, then ASSERT()
3166 if Destination's current length (including NULL terminator) is already more then
3167 CurrentSize, then ASSERT()
3168
3169 @param[in, out] Destination The String to append onto
3170 @param[in, out] CurrentSize on call the number of bytes in Destination. On
3171 return possibly the new size (still in bytes). if NULL
3172 then allocate whatever is needed.
3173 @param[in] Source The String to append from
3174 @param[in] Count Maximum number of characters to append. if 0 then
3175 all are appended.
3176
3177 @return Destination return the resultant string.
3178 **/
3179 CHAR16*
3180 EFIAPI
3181 StrnCatGrow (
3182 IN OUT CHAR16 **Destination,
3183 IN OUT UINTN *CurrentSize,
3184 IN CONST CHAR16 *Source,
3185 IN UINTN Count
3186 )
3187 {
3188 UINTN DestinationStartSize;
3189 UINTN NewSize;
3190
3191 //
3192 // ASSERTs
3193 //
3194 ASSERT(Destination != NULL);
3195
3196 //
3197 // If there's nothing to do then just return Destination
3198 //
3199 if (Source == NULL) {
3200 return (*Destination);
3201 }
3202
3203 //
3204 // allow for un-initialized pointers, based on size being 0
3205 //
3206 if (CurrentSize != NULL && *CurrentSize == 0) {
3207 *Destination = NULL;
3208 }
3209
3210 //
3211 // allow for NULL pointers address as Destination
3212 //
3213 if (*Destination != NULL) {
3214 ASSERT(CurrentSize != 0);
3215 DestinationStartSize = StrSize(*Destination);
3216 ASSERT(DestinationStartSize <= *CurrentSize);
3217 } else {
3218 DestinationStartSize = 0;
3219 // ASSERT(*CurrentSize == 0);
3220 }
3221
3222 //
3223 // Append all of Source?
3224 //
3225 if (Count == 0) {
3226 Count = StrLen(Source);
3227 }
3228
3229 //
3230 // Test and grow if required
3231 //
3232 if (CurrentSize != NULL) {
3233 NewSize = *CurrentSize;
3234 if (NewSize < DestinationStartSize + (Count * sizeof(CHAR16))) {
3235 while (NewSize < (DestinationStartSize + (Count*sizeof(CHAR16)))) {
3236 NewSize += 2 * Count * sizeof(CHAR16);
3237 }
3238 *Destination = ReallocatePool(*CurrentSize, NewSize, *Destination);
3239 *CurrentSize = NewSize;
3240 }
3241 } else {
3242 *Destination = AllocateZeroPool((Count+1)*sizeof(CHAR16));
3243 }
3244
3245 //
3246 // Now use standard StrnCat on a big enough buffer
3247 //
3248 if (*Destination == NULL) {
3249 return (NULL);
3250 }
3251 return StrnCat(*Destination, Source, Count);
3252 }
3253
3254 /**
3255 Prompt the user and return the resultant answer to the requestor.
3256
3257 This function will display the requested question on the shell prompt and then
3258 wait for an apropriate answer to be input from the console.
3259
3260 if the SHELL_PROMPT_REQUEST_TYPE is SHELL_PROMPT_REQUEST_TYPE_YESNO, ShellPromptResponseTypeQuitContinue
3261 or SHELL_PROMPT_REQUEST_TYPE_YESNOCANCEL then *Response is of type SHELL_PROMPT_RESPONSE.
3262
3263 if the SHELL_PROMPT_REQUEST_TYPE is ShellPromptResponseTypeFreeform then *Response is of type
3264 CHAR16*.
3265
3266 In either case *Response must be callee freed if Response was not NULL;
3267
3268 @param Type What type of question is asked. This is used to filter the input
3269 to prevent invalid answers to question.
3270 @param Prompt Pointer to string prompt to use to request input.
3271 @param Response Pointer to Response which will be populated upon return.
3272
3273 @retval EFI_SUCCESS The operation was sucessful.
3274 @retval EFI_UNSUPPORTED The operation is not supported as requested.
3275 @retval EFI_INVALID_PARAMETER A parameter was invalid.
3276 @return other The operation failed.
3277 **/
3278 EFI_STATUS
3279 EFIAPI
3280 ShellPromptForResponse (
3281 IN SHELL_PROMPT_REQUEST_TYPE Type,
3282 IN CHAR16 *Prompt OPTIONAL,
3283 IN OUT VOID **Response OPTIONAL
3284 )
3285 {
3286 EFI_STATUS Status;
3287 EFI_INPUT_KEY Key;
3288 UINTN EventIndex;
3289 SHELL_PROMPT_RESPONSE *Resp;
3290 UINTN Size;
3291 CHAR16 *Buffer;
3292
3293 Status = EFI_UNSUPPORTED;
3294 Resp = NULL;
3295 Buffer = NULL;
3296 Size = 0;
3297 if (Type != ShellPromptResponseTypeFreeform) {
3298 Resp = (SHELL_PROMPT_RESPONSE*)AllocateZeroPool(sizeof(SHELL_PROMPT_RESPONSE));
3299 if (Resp == NULL) {
3300 return (EFI_OUT_OF_RESOURCES);
3301 }
3302 }
3303
3304 switch(Type) {
3305 case ShellPromptResponseTypeQuitContinue:
3306 if (Prompt != NULL) {
3307 ShellPrintEx(-1, -1, L"%s", Prompt);
3308 }
3309 //
3310 // wait for valid response
3311 //
3312 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3313 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3314 if (EFI_ERROR(Status)) {
3315 break;
3316 }
3317 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3318 if (Key.UnicodeChar == L'Q' || Key.UnicodeChar ==L'q') {
3319 *Resp = ShellPromptResponseQuit;
3320 } else {
3321 *Resp = ShellPromptResponseContinue;
3322 }
3323 break;
3324 case ShellPromptResponseTypeYesNoCancel:
3325 if (Prompt != NULL) {
3326 ShellPrintEx(-1, -1, L"%s", Prompt);
3327 }
3328 //
3329 // wait for valid response
3330 //
3331 *Resp = ShellPromptResponseMax;
3332 while (*Resp == ShellPromptResponseMax) {
3333 if (ShellGetExecutionBreakFlag()) {
3334 Status = EFI_ABORTED;
3335 break;
3336 }
3337 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3338 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3339 if (EFI_ERROR(Status)) {
3340 break;
3341 }
3342 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3343 switch (Key.UnicodeChar) {
3344 case L'Y':
3345 case L'y':
3346 *Resp = ShellPromptResponseYes;
3347 break;
3348 case L'N':
3349 case L'n':
3350 *Resp = ShellPromptResponseNo;
3351 break;
3352 case L'C':
3353 case L'c':
3354 *Resp = ShellPromptResponseCancel;
3355 break;
3356 }
3357 }
3358 break; case ShellPromptResponseTypeYesNoAllCancel:
3359 if (Prompt != NULL) {
3360 ShellPrintEx(-1, -1, L"%s", Prompt);
3361 }
3362 //
3363 // wait for valid response
3364 //
3365 *Resp = ShellPromptResponseMax;
3366 while (*Resp == ShellPromptResponseMax) {
3367 if (ShellGetExecutionBreakFlag()) {
3368 Status = EFI_ABORTED;
3369 break;
3370 }
3371 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3372 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3373 if (EFI_ERROR(Status)) {
3374 break;
3375 }
3376 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3377 switch (Key.UnicodeChar) {
3378 case L'Y':
3379 case L'y':
3380 *Resp = ShellPromptResponseYes;
3381 break;
3382 case L'N':
3383 case L'n':
3384 *Resp = ShellPromptResponseNo;
3385 break;
3386 case L'A':
3387 case L'a':
3388 *Resp = ShellPromptResponseAll;
3389 break;
3390 case L'C':
3391 case L'c':
3392 *Resp = ShellPromptResponseCancel;
3393 break;
3394 }
3395 }
3396 break;
3397 case ShellPromptResponseTypeEnterContinue:
3398 case ShellPromptResponseTypeAnyKeyContinue:
3399 if (Prompt != NULL) {
3400 ShellPrintEx(-1, -1, L"%s", Prompt);
3401 }
3402 //
3403 // wait for valid response
3404 //
3405 *Resp = ShellPromptResponseMax;
3406 while (*Resp == ShellPromptResponseMax) {
3407 if (ShellGetExecutionBreakFlag()) {
3408 Status = EFI_ABORTED;
3409 break;
3410 }
3411 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3412 if (Type == ShellPromptResponseTypeEnterContinue) {
3413 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3414 if (EFI_ERROR(Status)) {
3415 break;
3416 }
3417 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3418 if (Key.UnicodeChar == CHAR_CARRIAGE_RETURN) {
3419 *Resp = ShellPromptResponseContinue;
3420 break;
3421 }
3422 }
3423 if (Type == ShellPromptResponseTypeAnyKeyContinue) {
3424 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3425 ASSERT_EFI_ERROR(Status);
3426 *Resp = ShellPromptResponseContinue;
3427 break;
3428 }
3429 }
3430 break;
3431 case ShellPromptResponseTypeYesNo:
3432 if (Prompt != NULL) {
3433 ShellPrintEx(-1, -1, L"%s", Prompt);
3434 }
3435 //
3436 // wait for valid response
3437 //
3438 *Resp = ShellPromptResponseMax;
3439 while (*Resp == ShellPromptResponseMax) {
3440 if (ShellGetExecutionBreakFlag()) {
3441 Status = EFI_ABORTED;
3442 break;
3443 }
3444 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3445 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3446 if (EFI_ERROR(Status)) {
3447 break;
3448 }
3449 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3450 switch (Key.UnicodeChar) {
3451 case L'Y':
3452 case L'y':
3453 *Resp = ShellPromptResponseYes;
3454 break;
3455 case L'N':
3456 case L'n':
3457 *Resp = ShellPromptResponseNo;
3458 break;
3459 }
3460 }
3461 break;
3462 case ShellPromptResponseTypeFreeform:
3463 if (Prompt != NULL) {
3464 ShellPrintEx(-1, -1, L"%s", Prompt);
3465 }
3466 while(1) {
3467 if (ShellGetExecutionBreakFlag()) {
3468 Status = EFI_ABORTED;
3469 break;
3470 }
3471 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3472 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3473 if (EFI_ERROR(Status)) {
3474 break;
3475 }
3476 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3477 if (Key.UnicodeChar == CHAR_CARRIAGE_RETURN) {
3478 break;
3479 }
3480 ASSERT((Buffer == NULL && Size == 0) || (Buffer != NULL));
3481 StrnCatGrow(&Buffer, &Size, &Key.UnicodeChar, 1);
3482 }
3483 break;
3484 //
3485 // This is the location to add new prompt types.
3486 // If your new type loops remember to add ExecutionBreak support.
3487 //
3488 default:
3489 ASSERT(FALSE);
3490 }
3491
3492 if (Response != NULL) {
3493 if (Resp != NULL) {
3494 *Response = Resp;
3495 } else if (Buffer != NULL) {
3496 *Response = Buffer;
3497 }
3498 } else {
3499 if (Resp != NULL) {
3500 FreePool(Resp);
3501 }
3502 if (Buffer != NULL) {
3503 FreePool(Buffer);
3504 }
3505 }
3506
3507 ShellPrintEx(-1, -1, L"\r\n");
3508 return (Status);
3509 }
3510
3511 /**
3512 Prompt the user and return the resultant answer to the requestor.
3513
3514 This function is the same as ShellPromptForResponse, except that the prompt is
3515 automatically pulled from HII.
3516
3517 @param Type What type of question is asked. This is used to filter the input
3518 to prevent invalid answers to question.
3519 @param[in] HiiFormatStringId The format string Id for getting from Hii.
3520 @param[in] HiiFormatHandle The format string Handle for getting from Hii.
3521 @param Response Pointer to Response which will be populated upon return.
3522
3523 @retval EFI_SUCCESS the operation was sucessful.
3524 @return other the operation failed.
3525
3526 @sa ShellPromptForResponse
3527 **/
3528 EFI_STATUS
3529 EFIAPI
3530 ShellPromptForResponseHii (
3531 IN SHELL_PROMPT_REQUEST_TYPE Type,
3532 IN CONST EFI_STRING_ID HiiFormatStringId,
3533 IN CONST EFI_HANDLE HiiFormatHandle,
3534 IN OUT VOID **Response
3535 )
3536 {
3537 CHAR16 *Prompt;
3538 EFI_STATUS Status;
3539
3540 Prompt = HiiGetString(HiiFormatHandle, HiiFormatStringId, NULL);
3541 Status = ShellPromptForResponse(Type, Prompt, Response);
3542 FreePool(Prompt);
3543 return (Status);
3544 }
3545
3546 /**
3547 Function to determin if an entire string is a valid number.
3548
3549 If Hex it must be preceeded with a 0x or has ForceHex, set TRUE.
3550
3551 @param[in] String The string to evaluate.
3552 @param[in] ForceHex TRUE - always assume hex.
3553 @param[in] StopAtSpace TRUE to halt upon finding a space, FALSE to keep going.
3554
3555 @retval TRUE It is all numeric (dec/hex) characters.
3556 @retval FALSE There is a non-numeric character.
3557 **/
3558 BOOLEAN
3559 EFIAPI
3560 InternalShellIsHexOrDecimalNumber (
3561 IN CONST CHAR16 *String,
3562 IN CONST BOOLEAN ForceHex,
3563 IN CONST BOOLEAN StopAtSpace
3564 )
3565 {
3566 BOOLEAN Hex;
3567
3568 //
3569 // chop off a single negative sign
3570 //
3571 if (String != NULL && *String == L'-') {
3572 String++;
3573 }
3574
3575 if (String == NULL) {
3576 return (FALSE);
3577 }
3578
3579 //
3580 // chop leading zeroes
3581 //
3582 while(String != NULL && *String == L'0'){
3583 String++;
3584 }
3585 //
3586 // allow '0x' or '0X', but not 'x' or 'X'
3587 //
3588 if (String != NULL && (*String == L'x' || *String == L'X')) {
3589 if (*(String-1) != L'0') {
3590 //
3591 // we got an x without a preceeding 0
3592 //
3593 return (FALSE);
3594 }
3595 String++;
3596 Hex = TRUE;
3597 } else if (ForceHex) {
3598 Hex = TRUE;
3599 } else {
3600 Hex = FALSE;
3601 }
3602
3603 //
3604 // loop through the remaining characters and use the lib function
3605 //
3606 for ( ; String != NULL && *String != CHAR_NULL && !(StopAtSpace && *String == L' ') ; String++){
3607 if (Hex) {
3608 if (!ShellIsHexaDecimalDigitCharacter(*String)) {
3609 return (FALSE);
3610 }
3611 } else {
3612 if (!ShellIsDecimalDigitCharacter(*String)) {
3613 return (FALSE);
3614 }
3615 }
3616 }
3617
3618 return (TRUE);
3619 }
3620
3621 /**
3622 Function to determine if a given filename exists.
3623
3624 @param[in] Name Path to test.
3625
3626 @retval EFI_SUCCESS The Path represents a file.
3627 @retval EFI_NOT_FOUND The Path does not represent a file.
3628 @retval other The path failed to open.
3629 **/
3630 EFI_STATUS
3631 EFIAPI
3632 ShellFileExists(
3633 IN CONST CHAR16 *Name
3634 )
3635 {
3636 EFI_STATUS Status;
3637 EFI_SHELL_FILE_INFO *List;
3638
3639 ASSERT(Name != NULL);
3640
3641 List = NULL;
3642 Status = ShellOpenFileMetaArg((CHAR16*)Name, EFI_FILE_MODE_READ, &List);
3643 if (EFI_ERROR(Status)) {
3644 return (Status);
3645 }
3646
3647 ShellCloseFileMetaArg(&List);
3648
3649 return (EFI_SUCCESS);
3650 }
3651
3652 /**
3653 Convert a Unicode character to upper case only if
3654 it maps to a valid small-case ASCII character.
3655
3656 This internal function only deal with Unicode character
3657 which maps to a valid small-case ASCII character, i.e.
3658 L'a' to L'z'. For other Unicode character, the input character
3659 is returned directly.
3660
3661 @param Char The character to convert.
3662
3663 @retval LowerCharacter If the Char is with range L'a' to L'z'.
3664 @retval Unchanged Otherwise.
3665
3666 **/
3667 CHAR16
3668 EFIAPI
3669 InternalShellCharToUpper (
3670 IN CHAR16 Char
3671 )
3672 {
3673 if (Char >= L'a' && Char <= L'z') {
3674 return (CHAR16) (Char - (L'a' - L'A'));
3675 }
3676
3677 return Char;
3678 }
3679
3680 /**
3681 Convert a Unicode character to numerical value.
3682
3683 This internal function only deal with Unicode character
3684 which maps to a valid hexadecimal ASII character, i.e.
3685 L'0' to L'9', L'a' to L'f' or L'A' to L'F'. For other
3686 Unicode character, the value returned does not make sense.
3687
3688 @param Char The character to convert.
3689
3690 @return The numerical value converted.
3691
3692 **/
3693 UINTN
3694 EFIAPI
3695 InternalShellHexCharToUintn (
3696 IN CHAR16 Char
3697 )
3698 {
3699 if (ShellIsDecimalDigitCharacter (Char)) {
3700 return Char - L'0';
3701 }
3702
3703 return (UINTN) (10 + InternalShellCharToUpper (Char) - L'A');
3704 }
3705
3706 /**
3707 Convert a Null-terminated Unicode hexadecimal string to a value of type UINT64.
3708
3709 This function returns a value of type UINTN by interpreting the contents
3710 of the Unicode string specified by String as a hexadecimal number.
3711 The format of the input Unicode string String is:
3712
3713 [spaces][zeros][x][hexadecimal digits].
3714
3715 The valid hexadecimal digit character is in the range [0-9], [a-f] and [A-F].
3716 The prefix "0x" is optional. Both "x" and "X" is allowed in "0x" prefix.
3717 If "x" appears in the input string, it must be prefixed with at least one 0.
3718 The function will ignore the pad space, which includes spaces or tab characters,
3719 before [zeros], [x] or [hexadecimal digit]. The running zero before [x] or
3720 [hexadecimal digit] will be ignored. Then, the decoding starts after [x] or the
3721 first valid hexadecimal digit. Then, the function stops at the first character that is
3722 a not a valid hexadecimal character or NULL, whichever one comes first.
3723
3724 If String has only pad spaces, then zero is returned.
3725 If String has no leading pad spaces, leading zeros or valid hexadecimal digits,
3726 then zero is returned.
3727
3728 @param[in] String A pointer to a Null-terminated Unicode string.
3729 @param[out] Value Upon a successful return the value of the conversion.
3730 @param[in] StopAtSpace FALSE to skip spaces.
3731
3732 @retval EFI_SUCCESS The conversion was successful.
3733 @retval EFI_INVALID_PARAMETER A parameter was NULL or invalid.
3734 @retval EFI_DEVICE_ERROR An overflow occured.
3735 **/
3736 EFI_STATUS
3737 EFIAPI
3738 InternalShellStrHexToUint64 (
3739 IN CONST CHAR16 *String,
3740 OUT UINT64 *Value,
3741 IN CONST BOOLEAN StopAtSpace
3742 )
3743 {
3744 UINT64 Result;
3745
3746 if (String == NULL || StrSize(String) == 0 || Value == NULL) {
3747 return (EFI_INVALID_PARAMETER);
3748 }
3749
3750 //
3751 // Ignore the pad spaces (space or tab)
3752 //
3753 while ((*String == L' ') || (*String == L'\t')) {
3754 String++;
3755 }
3756
3757 //
3758 // Ignore leading Zeros after the spaces
3759 //
3760 while (*String == L'0') {
3761 String++;
3762 }
3763
3764 if (InternalShellCharToUpper (*String) == L'X') {
3765 if (*(String - 1) != L'0') {
3766 return 0;
3767 }
3768 //
3769 // Skip the 'X'
3770 //
3771 String++;
3772 }
3773
3774 Result = 0;
3775
3776 //
3777 // Skip spaces if requested
3778 //
3779 while (StopAtSpace && *String == L' ') {
3780 String++;
3781 }
3782
3783 while (ShellIsHexaDecimalDigitCharacter (*String)) {
3784 //
3785 // If the Hex Number represented by String overflows according
3786 // to the range defined by UINTN, then ASSERT().
3787 //
3788 if (!(Result <= (RShiftU64((((UINT64) ~0) - InternalShellHexCharToUintn (*String)), 4)))) {
3789 // if (!(Result <= ((((UINT64) ~0) - InternalShellHexCharToUintn (*String)) >> 4))) {
3790 return (EFI_DEVICE_ERROR);
3791 }
3792
3793 Result = (LShiftU64(Result, 4));
3794 Result += InternalShellHexCharToUintn (*String);
3795 String++;
3796
3797 //
3798 // stop at spaces if requested
3799 //
3800 if (StopAtSpace && *String == L' ') {
3801 break;
3802 }
3803 }
3804
3805 *Value = Result;
3806 return (EFI_SUCCESS);
3807 }
3808
3809 /**
3810 Convert a Null-terminated Unicode decimal string to a value of
3811 type UINT64.
3812
3813 This function returns a value of type UINT64 by interpreting the contents
3814 of the Unicode string specified by String as a decimal number. The format
3815 of the input Unicode string String is:
3816
3817 [spaces] [decimal digits].
3818
3819 The valid decimal digit character is in the range [0-9]. The
3820 function will ignore the pad space, which includes spaces or
3821 tab characters, before [decimal digits]. The running zero in the
3822 beginning of [decimal digits] will be ignored. Then, the function
3823 stops at the first character that is a not a valid decimal character
3824 or a Null-terminator, whichever one comes first.
3825
3826 If String has only pad spaces, then 0 is returned.
3827 If String has no pad spaces or valid decimal digits,
3828 then 0 is returned.
3829
3830 @param[in] String A pointer to a Null-terminated Unicode string.
3831 @param[out] Value Upon a successful return the value of the conversion.
3832 @param[in] StopAtSpace FALSE to skip spaces.
3833
3834 @retval EFI_SUCCESS The conversion was successful.
3835 @retval EFI_INVALID_PARAMETER A parameter was NULL or invalid.
3836 @retval EFI_DEVICE_ERROR An overflow occured.
3837 **/
3838 EFI_STATUS
3839 EFIAPI
3840 InternalShellStrDecimalToUint64 (
3841 IN CONST CHAR16 *String,
3842 OUT UINT64 *Value,
3843 IN CONST BOOLEAN StopAtSpace
3844 )
3845 {
3846 UINT64 Result;
3847
3848 if (String == NULL || StrSize (String) == 0 || Value == NULL) {
3849 return (EFI_INVALID_PARAMETER);
3850 }
3851
3852 //
3853 // Ignore the pad spaces (space or tab)
3854 //
3855 while ((*String == L' ') || (*String == L'\t')) {
3856 String++;
3857 }
3858
3859 //
3860 // Ignore leading Zeros after the spaces
3861 //
3862 while (*String == L'0') {
3863 String++;
3864 }
3865
3866 Result = 0;
3867
3868 //
3869 // Skip spaces if requested
3870 //
3871 while (StopAtSpace && *String == L' ') {
3872 String++;
3873 }
3874 while (ShellIsDecimalDigitCharacter (*String)) {
3875 //
3876 // If the number represented by String overflows according
3877 // to the range defined by UINT64, then ASSERT().
3878 //
3879
3880 if (!(Result <= (DivU64x32((((UINT64) ~0) - (*String - L'0')),10)))) {
3881 return (EFI_DEVICE_ERROR);
3882 }
3883
3884 Result = MultU64x32(Result, 10) + (*String - L'0');
3885 String++;
3886
3887 //
3888 // Stop at spaces if requested
3889 //
3890 if (StopAtSpace && *String == L' ') {
3891 break;
3892 }
3893 }
3894
3895 *Value = Result;
3896
3897 return (EFI_SUCCESS);
3898 }
3899
3900 /**
3901 Function to verify and convert a string to its numerical value.
3902
3903 If Hex it must be preceeded with a 0x, 0X, or has ForceHex set TRUE.
3904
3905 @param[in] String The string to evaluate.
3906 @param[out] Value Upon a successful return the value of the conversion.
3907 @param[in] ForceHex TRUE - always assume hex.
3908 @param[in] StopAtSpace FALSE to skip spaces.
3909
3910 @retval EFI_SUCCESS The conversion was successful.
3911 @retval EFI_INVALID_PARAMETER String contained an invalid character.
3912 @retval EFI_NOT_FOUND String was a number, but Value was NULL.
3913 **/
3914 EFI_STATUS
3915 EFIAPI
3916 ShellConvertStringToUint64(
3917 IN CONST CHAR16 *String,
3918 OUT UINT64 *Value,
3919 IN CONST BOOLEAN ForceHex,
3920 IN CONST BOOLEAN StopAtSpace
3921 )
3922 {
3923 UINT64 RetVal;
3924 CONST CHAR16 *Walker;
3925 EFI_STATUS Status;
3926 BOOLEAN Hex;
3927
3928 Hex = ForceHex;
3929
3930 if (!InternalShellIsHexOrDecimalNumber(String, Hex, StopAtSpace)) {
3931 if (!Hex) {
3932 Hex = TRUE;
3933 if (!InternalShellIsHexOrDecimalNumber(String, Hex, StopAtSpace)) {
3934 return (EFI_INVALID_PARAMETER);
3935 }
3936 } else {
3937 return (EFI_INVALID_PARAMETER);
3938 }
3939 }
3940
3941 //
3942 // Chop off leading spaces
3943 //
3944 for (Walker = String; Walker != NULL && *Walker != CHAR_NULL && *Walker == L' '; Walker++);
3945
3946 //
3947 // make sure we have something left that is numeric.
3948 //
3949 if (Walker == NULL || *Walker == CHAR_NULL || !InternalShellIsHexOrDecimalNumber(Walker, Hex, StopAtSpace)) {
3950 return (EFI_INVALID_PARAMETER);
3951 }
3952
3953 //
3954 // do the conversion.
3955 //
3956 if (Hex || StrnCmp(Walker, L"0x", 2) == 0 || StrnCmp(Walker, L"0X", 2) == 0){
3957 Status = InternalShellStrHexToUint64(Walker, &RetVal, StopAtSpace);
3958 } else {
3959 Status = InternalShellStrDecimalToUint64(Walker, &RetVal, StopAtSpace);
3960 }
3961
3962 if (Value == NULL && !EFI_ERROR(Status)) {
3963 return (EFI_NOT_FOUND);
3964 }
3965
3966 if (Value != NULL) {
3967 *Value = RetVal;
3968 }
3969
3970 return (Status);
3971 }
3972
3973 /**
3974 Function to determin if an entire string is a valid number.
3975
3976 If Hex it must be preceeded with a 0x or has ForceHex, set TRUE.
3977
3978 @param[in] String The string to evaluate.
3979 @param[in] ForceHex TRUE - always assume hex.
3980 @param[in] StopAtSpace TRUE to halt upon finding a space, FALSE to keep going.
3981
3982 @retval TRUE It is all numeric (dec/hex) characters.
3983 @retval FALSE There is a non-numeric character.
3984 **/
3985 BOOLEAN
3986 EFIAPI
3987 ShellIsHexOrDecimalNumber (
3988 IN CONST CHAR16 *String,
3989 IN CONST BOOLEAN ForceHex,
3990 IN CONST BOOLEAN StopAtSpace
3991 )
3992 {
3993 if (ShellConvertStringToUint64(String, NULL, ForceHex, StopAtSpace) == EFI_NOT_FOUND) {
3994 return (TRUE);
3995 }
3996 return (FALSE);
3997 }
3998
3999 /**
4000 Function to read a single line from a SHELL_FILE_HANDLE. The \n is not included in the returned
4001 buffer. The returned buffer must be callee freed.
4002
4003 If the position upon start is 0, then the Ascii Boolean will be set. This should be
4004 maintained and not changed for all operations with the same file.
4005
4006 @param[in] Handle SHELL_FILE_HANDLE to read from.
4007 @param[in, out] Ascii Boolean value for indicating whether the file is
4008 Ascii (TRUE) or UCS2 (FALSE).
4009
4010 @return The line of text from the file.
4011 @retval NULL There was not enough memory available.
4012
4013 @sa ShellFileHandleReadLine
4014 **/
4015 CHAR16*
4016 EFIAPI
4017 ShellFileHandleReturnLine(
4018 IN SHELL_FILE_HANDLE Handle,
4019 IN OUT BOOLEAN *Ascii
4020 )
4021 {
4022 CHAR16 *RetVal;
4023 UINTN Size;
4024 EFI_STATUS Status;
4025
4026 Size = 0;
4027 RetVal = NULL;
4028
4029 Status = ShellFileHandleReadLine(Handle, RetVal, &Size, FALSE, Ascii);
4030 if (Status == EFI_BUFFER_TOO_SMALL) {
4031 RetVal = AllocateZeroPool(Size);
4032 if (RetVal == NULL) {
4033 return (NULL);
4034 }
4035 Status = ShellFileHandleReadLine(Handle, RetVal, &Size, FALSE, Ascii);
4036
4037 }
4038 if (EFI_ERROR(Status) && (RetVal != NULL)) {
4039 FreePool(RetVal);
4040 RetVal = NULL;
4041 }
4042 return (RetVal);
4043 }
4044
4045 /**
4046 Function to read a single line (up to but not including the \n) from a SHELL_FILE_HANDLE.
4047
4048 If the position upon start is 0, then the Ascii Boolean will be set. This should be
4049 maintained and not changed for all operations with the same file.
4050
4051 @param[in] Handle SHELL_FILE_HANDLE to read from.
4052 @param[in, out] Buffer The pointer to buffer to read into.
4053 @param[in, out] Size The pointer to number of bytes in Buffer.
4054 @param[in] Truncate If the buffer is large enough, this has no effect.
4055 If the buffer is is too small and Truncate is TRUE,
4056 the line will be truncated.
4057 If the buffer is is too small and Truncate is FALSE,
4058 then no read will occur.
4059
4060 @param[in, out] Ascii Boolean value for indicating whether the file is
4061 Ascii (TRUE) or UCS2 (FALSE).
4062
4063 @retval EFI_SUCCESS The operation was successful. The line is stored in
4064 Buffer.
4065 @retval EFI_INVALID_PARAMETER Handle was NULL.
4066 @retval EFI_INVALID_PARAMETER Size was NULL.
4067 @retval EFI_BUFFER_TOO_SMALL Size was not large enough to store the line.
4068 Size was updated to the minimum space required.
4069 **/
4070 EFI_STATUS
4071 EFIAPI
4072 ShellFileHandleReadLine(
4073 IN SHELL_FILE_HANDLE Handle,
4074 IN OUT CHAR16 *Buffer,
4075 IN OUT UINTN *Size,
4076 IN BOOLEAN Truncate,
4077 IN OUT BOOLEAN *Ascii
4078 )
4079 {
4080 EFI_STATUS Status;
4081 CHAR16 CharBuffer;
4082 UINTN CharSize;
4083 UINTN CountSoFar;
4084 UINT64 OriginalFilePosition;
4085
4086
4087 if (Handle == NULL
4088 ||Size == NULL
4089 ){
4090 return (EFI_INVALID_PARAMETER);
4091 }
4092 if (Buffer == NULL) {
4093 ASSERT(*Size == 0);
4094 } else {
4095 *Buffer = CHAR_NULL;
4096 }
4097 gEfiShellProtocol->GetFilePosition(Handle, &OriginalFilePosition);
4098 if (OriginalFilePosition == 0) {
4099 CharSize = sizeof(CHAR16);
4100 Status = gEfiShellProtocol->ReadFile(Handle, &CharSize, &CharBuffer);
4101 ASSERT_EFI_ERROR(Status);
4102 if (CharBuffer == gUnicodeFileTag) {
4103 *Ascii = FALSE;
4104 } else {
4105 *Ascii = TRUE;
4106 gEfiShellProtocol->SetFilePosition(Handle, OriginalFilePosition);
4107 }
4108 }
4109
4110 for (CountSoFar = 0;;CountSoFar++){
4111 CharBuffer = 0;
4112 if (*Ascii) {
4113 CharSize = sizeof(CHAR8);
4114 } else {
4115 CharSize = sizeof(CHAR16);
4116 }
4117 Status = gEfiShellProtocol->ReadFile(Handle, &CharSize, &CharBuffer);
4118 if ( EFI_ERROR(Status)
4119 || CharSize == 0
4120 || (CharBuffer == L'\n' && !(*Ascii))
4121 || (CharBuffer == '\n' && *Ascii)
4122 ){
4123 break;
4124 }
4125 //
4126 // if we have space save it...
4127 //
4128 if ((CountSoFar+1)*sizeof(CHAR16) < *Size){
4129 ASSERT(Buffer != NULL);
4130 ((CHAR16*)Buffer)[CountSoFar] = CharBuffer;
4131 ((CHAR16*)Buffer)[CountSoFar+1] = CHAR_NULL;
4132 }
4133 }
4134
4135 //
4136 // if we ran out of space tell when...
4137 //
4138 if ((CountSoFar+1)*sizeof(CHAR16) > *Size){
4139 *Size = (CountSoFar+1)*sizeof(CHAR16);
4140 if (!Truncate) {
4141 gEfiShellProtocol->SetFilePosition(Handle, OriginalFilePosition);
4142 } else {
4143 DEBUG((DEBUG_WARN, "The line was truncated in ShellFileHandleReadLine"));
4144 }
4145 return (EFI_BUFFER_TOO_SMALL);
4146 }
4147 while(Buffer[StrLen(Buffer)-1] == L'\r') {
4148 Buffer[StrLen(Buffer)-1] = CHAR_NULL;
4149 }
4150
4151 return (Status);
4152 }
4153
4154 /**
4155 Function to print help file / man page content in the spec from the UEFI Shell protocol GetHelpText function.
4156
4157 @param[in] CommandToGetHelpOn Pointer to a string containing the command name of help file to be printed.
4158 @param[in] SectionToGetHelpOn Pointer to the section specifier(s).
4159 @param[in] PrintCommandText If TRUE, prints the command followed by the help content, otherwise prints
4160 the help content only.
4161 @retval EFI_DEVICE_ERROR The help data format was incorrect.
4162 @retval EFI_NOT_FOUND The help data could not be found.
4163 @retval EFI_SUCCESS The operation was successful.
4164 **/
4165 EFI_STATUS
4166 EFIAPI
4167 ShellPrintHelp (
4168 IN CONST CHAR16 *CommandToGetHelpOn,
4169 IN CONST CHAR16 *SectionToGetHelpOn,
4170 IN BOOLEAN PrintCommandText
4171 )
4172 {
4173 EFI_STATUS Status;
4174 CHAR16 *OutText;
4175
4176 OutText = NULL;
4177
4178 //
4179 // Get the string to print based
4180 //
4181 Status = gEfiShellProtocol->GetHelpText (CommandToGetHelpOn, SectionToGetHelpOn, &OutText);
4182
4183 //
4184 // make sure we got a valid string
4185 //
4186 if (EFI_ERROR(Status)){
4187 return Status;
4188 }
4189 if (OutText == NULL || StrLen(OutText) == 0) {
4190 return EFI_NOT_FOUND;
4191 }
4192
4193 //
4194 // Chop off trailing stuff we dont need
4195 //
4196 while (OutText[StrLen(OutText)-1] == L'\r' || OutText[StrLen(OutText)-1] == L'\n' || OutText[StrLen(OutText)-1] == L' ') {
4197 OutText[StrLen(OutText)-1] = CHAR_NULL;
4198 }
4199
4200 //
4201 // Print this out to the console
4202 //
4203 if (PrintCommandText) {
4204 ShellPrintEx(-1, -1, L"%H%-14s%N- %s\r\n", CommandToGetHelpOn, OutText);
4205 } else {
4206 ShellPrintEx(-1, -1, L"%N%s\r\n", OutText);
4207 }
4208
4209 SHELL_FREE_NON_NULL(OutText);
4210
4211 return EFI_SUCCESS;
4212 }
4213
4214 /**
4215 Function to delete a file by name
4216
4217 @param[in] FileName Pointer to file name to delete.
4218
4219 @retval EFI_SUCCESS the file was deleted sucessfully
4220 @retval EFI_WARN_DELETE_FAILURE the handle was closed, but the file was not
4221 deleted
4222 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
4223 @retval EFI_NOT_FOUND The specified file could not be found on the
4224 device or the file system could not be found
4225 on the device.
4226 @retval EFI_NO_MEDIA The device has no medium.
4227 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
4228 medium is no longer supported.
4229 @retval EFI_DEVICE_ERROR The device reported an error.
4230 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
4231 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
4232 @retval EFI_ACCESS_DENIED The file was opened read only.
4233 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
4234 file.
4235 @retval other The file failed to open
4236 **/
4237 EFI_STATUS
4238 EFIAPI
4239 ShellDeleteFileByName(
4240 IN CONST CHAR16 *FileName
4241 )
4242 {
4243 EFI_STATUS Status;
4244 SHELL_FILE_HANDLE FileHandle;
4245
4246 Status = ShellFileExists(FileName);
4247
4248 if (Status == EFI_SUCCESS){
4249 Status = ShellOpenFileByName(FileName, &FileHandle, EFI_FILE_MODE_READ | EFI_FILE_MODE_WRITE | EFI_FILE_MODE_CREATE, 0x0);
4250 if (Status == EFI_SUCCESS){
4251 Status = ShellDeleteFile(&FileHandle);
4252 }
4253 }
4254
4255 return(Status);
4256
4257 }
4258
4259 /**
4260 Cleans off all the quotes in the string.
4261
4262 @param[in] OriginalString pointer to the string to be cleaned.
4263 @param[out] CleanString The new string with all quotes removed.
4264 Memory allocated in the function and free
4265 by caller.
4266
4267 @retval EFI_SUCCESS The operation was successful.
4268 **/
4269 EFI_STATUS
4270 EFIAPI
4271 InternalShellStripQuotes (
4272 IN CONST CHAR16 *OriginalString,
4273 OUT CHAR16 **CleanString
4274 )
4275 {
4276 CHAR16 *Walker;
4277
4278 if (OriginalString == NULL || CleanString == NULL) {
4279 return EFI_INVALID_PARAMETER;
4280 }
4281
4282 *CleanString = AllocateCopyPool (StrSize (OriginalString), OriginalString);
4283 if (*CleanString == NULL) {
4284 return EFI_OUT_OF_RESOURCES;
4285 }
4286
4287 for (Walker = *CleanString; Walker != NULL && *Walker != CHAR_NULL ; Walker++) {
4288 if (*Walker == L'\"') {
4289 CopyMem(Walker, Walker+1, StrSize(Walker) - sizeof(Walker[0]));
4290 }
4291 }
4292
4293 return EFI_SUCCESS;
4294 }
4295