blob: 508e9e0ec0dc56e709d14977ee507bd31b1edb65 [file] [log] [blame]
jcarsey94b17fa2009-05-07 18:46:18 +00001/** @file
2 Provides interface to shell functionality for shell commands and applications.
3
jcarsey252d9452011-03-25 20:49:53 +00004 Copyright (c) 2006 - 2011, Intel Corporation. All rights reserved.<BR>
jcarsey1e6e84c2010-01-25 20:05:08 +00005 This program and the accompanying materials
jcarseyb3011f42010-01-11 21:49:04 +00006 are licensed and made available under the terms and conditions of the BSD License
7 which accompanies this distribution. The full text of the license may be found at
8 http://opensource.org/licenses/bsd-license.php
jcarsey94b17fa2009-05-07 18:46:18 +00009
jcarseyb3011f42010-01-11 21:49:04 +000010 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
11 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
jcarsey94b17fa2009-05-07 18:46:18 +000012
13**/
14
jcarseyb1f95a02009-06-16 00:23:19 +000015#include "UefiShellLib.h"
jcarseya405b862010-09-14 05:18:09 +000016#include <ShellBase.h>
jcarsey252d9452011-03-25 20:49:53 +000017#include <Library/SortLib.h>
jcarseyd2b45642009-05-11 18:02:16 +000018
jcarsey94b17fa2009-05-07 18:46:18 +000019#define FIND_XXXXX_FILE_BUFFER_SIZE (SIZE_OF_EFI_FILE_INFO + MAX_FILE_NAME_LEN)
20
jcarseyd2b45642009-05-11 18:02:16 +000021//
jcarseya405b862010-09-14 05:18:09 +000022// globals...
jcarseyd2b45642009-05-11 18:02:16 +000023//
24SHELL_PARAM_ITEM EmptyParamList[] = {
25 {NULL, TypeMax}
26 };
jcarseya405b862010-09-14 05:18:09 +000027SHELL_PARAM_ITEM SfoParamList[] = {
28 {L"-sfo", TypeFlag},
29 {NULL, TypeMax}
30 };
31EFI_SHELL_ENVIRONMENT2 *mEfiShellEnvironment2;
32EFI_SHELL_INTERFACE *mEfiShellInterface;
jcarsey366f81a2011-06-27 21:04:22 +000033EFI_SHELL_PROTOCOL *gEfiShellProtocol;
34EFI_SHELL_PARAMETERS_PROTOCOL *gEfiShellParametersProtocol;
jcarseya405b862010-09-14 05:18:09 +000035EFI_HANDLE mEfiShellEnvironment2Handle;
36FILE_HANDLE_FUNCTION_MAP FileFunctionMap;
jcarseyb3011f42010-01-11 21:49:04 +000037
jcarsey2247dde2009-11-09 18:08:58 +000038/**
39 Check if a Unicode character is a hexadecimal character.
40
jcarsey1e6e84c2010-01-25 20:05:08 +000041 This internal function checks if a Unicode character is a
jcarseya405b862010-09-14 05:18:09 +000042 numeric character. The valid hexadecimal characters are
jcarsey2247dde2009-11-09 18:08:58 +000043 L'0' to L'9', L'a' to L'f', or L'A' to L'F'.
44
jcarsey2247dde2009-11-09 18:08:58 +000045 @param Char The character to check against.
46
47 @retval TRUE If the Char is a hexadecmial character.
48 @retval FALSE If the Char is not a hexadecmial character.
49
50**/
51BOOLEAN
52EFIAPI
jcarsey969c7832010-01-13 16:46:33 +000053ShellIsHexaDecimalDigitCharacter (
jcarsey2247dde2009-11-09 18:08:58 +000054 IN CHAR16 Char
jcarseya405b862010-09-14 05:18:09 +000055 )
56{
jcarsey2247dde2009-11-09 18:08:58 +000057 return (BOOLEAN) ((Char >= L'0' && Char <= L'9') || (Char >= L'A' && Char <= L'F') || (Char >= L'a' && Char <= L'f'));
58}
jcarsey94b17fa2009-05-07 18:46:18 +000059
60/**
jcarseya405b862010-09-14 05:18:09 +000061 Check if a Unicode character is a decimal character.
62
63 This internal function checks if a Unicode character is a
64 decimal character. The valid characters are
65 L'0' to L'9'.
66
67
68 @param Char The character to check against.
69
70 @retval TRUE If the Char is a hexadecmial character.
71 @retval FALSE If the Char is not a hexadecmial character.
72
73**/
74BOOLEAN
75EFIAPI
76ShellIsDecimalDigitCharacter (
77 IN CHAR16 Char
78 )
79{
80 return (BOOLEAN) (Char >= L'0' && Char <= L'9');
81}
82
83/**
84 Helper function to find ShellEnvironment2 for constructor.
85
86 @param[in] ImageHandle A copy of the calling image's handle.
jcarseybeab0fc2011-10-10 17:26:25 +000087
88 @retval EFI_OUT_OF_RESOURCES Memory allocation failed.
jcarsey94b17fa2009-05-07 18:46:18 +000089**/
90EFI_STATUS
91EFIAPI
92ShellFindSE2 (
93 IN EFI_HANDLE ImageHandle
jcarseya405b862010-09-14 05:18:09 +000094 )
95{
jcarsey94b17fa2009-05-07 18:46:18 +000096 EFI_STATUS Status;
97 EFI_HANDLE *Buffer;
98 UINTN BufferSize;
99 UINTN HandleIndex;
100
101 BufferSize = 0;
102 Buffer = NULL;
jcarsey1e6e84c2010-01-25 20:05:08 +0000103 Status = gBS->OpenProtocol(ImageHandle,
jcarsey94b17fa2009-05-07 18:46:18 +0000104 &gEfiShellEnvironment2Guid,
105 (VOID **)&mEfiShellEnvironment2,
106 ImageHandle,
107 NULL,
108 EFI_OPEN_PROTOCOL_GET_PROTOCOL
jcarseya405b862010-09-14 05:18:09 +0000109 );
jcarsey94b17fa2009-05-07 18:46:18 +0000110 //
111 // look for the mEfiShellEnvironment2 protocol at a higher level
112 //
jcarseya405b862010-09-14 05:18:09 +0000113 if (EFI_ERROR (Status) || !(CompareGuid (&mEfiShellEnvironment2->SESGuid, &gEfiShellEnvironment2ExtGuid))){
jcarsey94b17fa2009-05-07 18:46:18 +0000114 //
115 // figure out how big of a buffer we need.
116 //
117 Status = gBS->LocateHandle (ByProtocol,
118 &gEfiShellEnvironment2Guid,
119 NULL, // ignored for ByProtocol
120 &BufferSize,
121 Buffer
jcarseya405b862010-09-14 05:18:09 +0000122 );
jcarsey2247dde2009-11-09 18:08:58 +0000123 //
124 // maybe it's not there???
125 //
126 if (Status == EFI_BUFFER_TOO_SMALL) {
jcarsey252d9452011-03-25 20:49:53 +0000127 Buffer = (EFI_HANDLE*)AllocateZeroPool(BufferSize);
jcarseybeab0fc2011-10-10 17:26:25 +0000128 if (Buffer == NULL) {
129 return (EFI_OUT_OF_RESOURCES);
130 }
jcarsey2247dde2009-11-09 18:08:58 +0000131 Status = gBS->LocateHandle (ByProtocol,
132 &gEfiShellEnvironment2Guid,
133 NULL, // ignored for ByProtocol
134 &BufferSize,
135 Buffer
jcarseya405b862010-09-14 05:18:09 +0000136 );
jcarsey2247dde2009-11-09 18:08:58 +0000137 }
jcarsey1cd45e72010-01-29 15:07:44 +0000138 if (!EFI_ERROR (Status) && Buffer != NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +0000139 //
140 // now parse the list of returned handles
141 //
142 Status = EFI_NOT_FOUND;
143 for (HandleIndex = 0; HandleIndex < (BufferSize/sizeof(Buffer[0])); HandleIndex++) {
jcarsey1e6e84c2010-01-25 20:05:08 +0000144 Status = gBS->OpenProtocol(Buffer[HandleIndex],
jcarsey94b17fa2009-05-07 18:46:18 +0000145 &gEfiShellEnvironment2Guid,
146 (VOID **)&mEfiShellEnvironment2,
147 ImageHandle,
148 NULL,
149 EFI_OPEN_PROTOCOL_GET_PROTOCOL
jcarseya405b862010-09-14 05:18:09 +0000150 );
151 if (CompareGuid (&mEfiShellEnvironment2->SESGuid, &gEfiShellEnvironment2ExtGuid)) {
jcarsey94b17fa2009-05-07 18:46:18 +0000152 mEfiShellEnvironment2Handle = Buffer[HandleIndex];
153 Status = EFI_SUCCESS;
154 break;
155 }
156 }
157 }
158 }
159 if (Buffer != NULL) {
160 FreePool (Buffer);
161 }
162 return (Status);
163}
164
jcarsey252d9452011-03-25 20:49:53 +0000165/**
jcarseya405b862010-09-14 05:18:09 +0000166 Function to do most of the work of the constructor. Allows for calling
167 multiple times without complete re-initialization.
168
169 @param[in] ImageHandle A copy of the ImageHandle.
170 @param[in] SystemTable A pointer to the SystemTable for the application.
jcarsey252d9452011-03-25 20:49:53 +0000171
172 @retval EFI_SUCCESS The operationw as successful.
jcarseya405b862010-09-14 05:18:09 +0000173**/
jcarsey94b17fa2009-05-07 18:46:18 +0000174EFI_STATUS
175EFIAPI
jcarseyd2b45642009-05-11 18:02:16 +0000176ShellLibConstructorWorker (
jcarsey94b17fa2009-05-07 18:46:18 +0000177 IN EFI_HANDLE ImageHandle,
178 IN EFI_SYSTEM_TABLE *SystemTable
jcarseya405b862010-09-14 05:18:09 +0000179 )
180{
181 EFI_STATUS Status;
jcarseyecd3d592009-12-07 18:05:00 +0000182
jcarsey94b17fa2009-05-07 18:46:18 +0000183 //
184 // UEFI 2.0 shell interfaces (used preferentially)
185 //
jcarseya405b862010-09-14 05:18:09 +0000186 Status = gBS->OpenProtocol(
187 ImageHandle,
188 &gEfiShellProtocolGuid,
jcarsey366f81a2011-06-27 21:04:22 +0000189 (VOID **)&gEfiShellProtocol,
jcarseya405b862010-09-14 05:18:09 +0000190 ImageHandle,
191 NULL,
192 EFI_OPEN_PROTOCOL_GET_PROTOCOL
193 );
jcarsey94b17fa2009-05-07 18:46:18 +0000194 if (EFI_ERROR(Status)) {
jcarseya405b862010-09-14 05:18:09 +0000195 //
196 // Search for the shell protocol
197 //
198 Status = gBS->LocateProtocol(
199 &gEfiShellProtocolGuid,
200 NULL,
jcarsey366f81a2011-06-27 21:04:22 +0000201 (VOID **)&gEfiShellProtocol
jcarseya405b862010-09-14 05:18:09 +0000202 );
203 if (EFI_ERROR(Status)) {
jcarsey366f81a2011-06-27 21:04:22 +0000204 gEfiShellProtocol = NULL;
jcarseya405b862010-09-14 05:18:09 +0000205 }
jcarsey94b17fa2009-05-07 18:46:18 +0000206 }
jcarseya405b862010-09-14 05:18:09 +0000207 Status = gBS->OpenProtocol(
208 ImageHandle,
209 &gEfiShellParametersProtocolGuid,
jcarsey366f81a2011-06-27 21:04:22 +0000210 (VOID **)&gEfiShellParametersProtocol,
jcarseya405b862010-09-14 05:18:09 +0000211 ImageHandle,
212 NULL,
213 EFI_OPEN_PROTOCOL_GET_PROTOCOL
214 );
jcarsey94b17fa2009-05-07 18:46:18 +0000215 if (EFI_ERROR(Status)) {
jcarsey366f81a2011-06-27 21:04:22 +0000216 gEfiShellParametersProtocol = NULL;
jcarsey94b17fa2009-05-07 18:46:18 +0000217 }
218
jcarsey366f81a2011-06-27 21:04:22 +0000219 if (gEfiShellParametersProtocol == NULL || gEfiShellProtocol == NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +0000220 //
221 // Moved to seperate function due to complexity
222 //
223 Status = ShellFindSE2(ImageHandle);
224
225 if (EFI_ERROR(Status)) {
226 DEBUG((DEBUG_ERROR, "Status: 0x%08x\r\n", Status));
227 mEfiShellEnvironment2 = NULL;
228 }
jcarsey1e6e84c2010-01-25 20:05:08 +0000229 Status = gBS->OpenProtocol(ImageHandle,
jcarsey94b17fa2009-05-07 18:46:18 +0000230 &gEfiShellInterfaceGuid,
231 (VOID **)&mEfiShellInterface,
232 ImageHandle,
233 NULL,
234 EFI_OPEN_PROTOCOL_GET_PROTOCOL
jcarseya405b862010-09-14 05:18:09 +0000235 );
jcarsey94b17fa2009-05-07 18:46:18 +0000236 if (EFI_ERROR(Status)) {
237 mEfiShellInterface = NULL;
238 }
239 }
jcarseyc9d92df2010-02-03 15:37:54 +0000240
jcarsey94b17fa2009-05-07 18:46:18 +0000241 //
242 // only success getting 2 of either the old or new, but no 1/2 and 1/2
243 //
jcarsey1e6e84c2010-01-25 20:05:08 +0000244 if ((mEfiShellEnvironment2 != NULL && mEfiShellInterface != NULL) ||
jcarsey366f81a2011-06-27 21:04:22 +0000245 (gEfiShellProtocol != NULL && gEfiShellParametersProtocol != NULL) ) {
246 if (gEfiShellProtocol != NULL) {
247 FileFunctionMap.GetFileInfo = gEfiShellProtocol->GetFileInfo;
248 FileFunctionMap.SetFileInfo = gEfiShellProtocol->SetFileInfo;
249 FileFunctionMap.ReadFile = gEfiShellProtocol->ReadFile;
250 FileFunctionMap.WriteFile = gEfiShellProtocol->WriteFile;
251 FileFunctionMap.CloseFile = gEfiShellProtocol->CloseFile;
252 FileFunctionMap.DeleteFile = gEfiShellProtocol->DeleteFile;
253 FileFunctionMap.GetFilePosition = gEfiShellProtocol->GetFilePosition;
254 FileFunctionMap.SetFilePosition = gEfiShellProtocol->SetFilePosition;
255 FileFunctionMap.FlushFile = gEfiShellProtocol->FlushFile;
256 FileFunctionMap.GetFileSize = gEfiShellProtocol->GetFileSize;
jcarseyd2b45642009-05-11 18:02:16 +0000257 } else {
jcarseya405b862010-09-14 05:18:09 +0000258 FileFunctionMap.GetFileInfo = (EFI_SHELL_GET_FILE_INFO)FileHandleGetInfo;
259 FileFunctionMap.SetFileInfo = (EFI_SHELL_SET_FILE_INFO)FileHandleSetInfo;
260 FileFunctionMap.ReadFile = (EFI_SHELL_READ_FILE)FileHandleRead;
261 FileFunctionMap.WriteFile = (EFI_SHELL_WRITE_FILE)FileHandleWrite;
262 FileFunctionMap.CloseFile = (EFI_SHELL_CLOSE_FILE)FileHandleClose;
263 FileFunctionMap.DeleteFile = (EFI_SHELL_DELETE_FILE)FileHandleDelete;
264 FileFunctionMap.GetFilePosition = (EFI_SHELL_GET_FILE_POSITION)FileHandleGetPosition;
265 FileFunctionMap.SetFilePosition = (EFI_SHELL_SET_FILE_POSITION)FileHandleSetPosition;
266 FileFunctionMap.FlushFile = (EFI_SHELL_FLUSH_FILE)FileHandleFlush;
267 FileFunctionMap.GetFileSize = (EFI_SHELL_GET_FILE_SIZE)FileHandleGetSize;
jcarseyd2b45642009-05-11 18:02:16 +0000268 }
jcarsey94b17fa2009-05-07 18:46:18 +0000269 return (EFI_SUCCESS);
270 }
271 return (EFI_NOT_FOUND);
272}
jcarseyd2b45642009-05-11 18:02:16 +0000273/**
274 Constructor for the Shell library.
275
276 Initialize the library and determine if the underlying is a UEFI Shell 2.0 or an EFI shell.
277
278 @param ImageHandle the image handle of the process
279 @param SystemTable the EFI System Table pointer
280
281 @retval EFI_SUCCESS the initialization was complete sucessfully
282 @return others an error ocurred during initialization
283**/
284EFI_STATUS
285EFIAPI
286ShellLibConstructor (
287 IN EFI_HANDLE ImageHandle,
288 IN EFI_SYSTEM_TABLE *SystemTable
jcarseya405b862010-09-14 05:18:09 +0000289 )
290{
jcarseyd2b45642009-05-11 18:02:16 +0000291 mEfiShellEnvironment2 = NULL;
jcarsey366f81a2011-06-27 21:04:22 +0000292 gEfiShellProtocol = NULL;
293 gEfiShellParametersProtocol = NULL;
jcarseyd2b45642009-05-11 18:02:16 +0000294 mEfiShellInterface = NULL;
295 mEfiShellEnvironment2Handle = NULL;
296
jcarseyd2b45642009-05-11 18:02:16 +0000297 //
298 // verify that auto initialize is not set false
jcarsey1e6e84c2010-01-25 20:05:08 +0000299 //
jcarseyd2b45642009-05-11 18:02:16 +0000300 if (PcdGetBool(PcdShellLibAutoInitialize) == 0) {
301 return (EFI_SUCCESS);
302 }
jcarsey1e6e84c2010-01-25 20:05:08 +0000303
jcarseyd2b45642009-05-11 18:02:16 +0000304 return (ShellLibConstructorWorker(ImageHandle, SystemTable));
305}
jcarsey94b17fa2009-05-07 18:46:18 +0000306
307/**
jcarseya405b862010-09-14 05:18:09 +0000308 Destructor for the library. free any resources.
309
310 @param[in] ImageHandle A copy of the ImageHandle.
311 @param[in] SystemTable A pointer to the SystemTable for the application.
312
313 @retval EFI_SUCCESS The operation was successful.
314 @return An error from the CloseProtocol function.
jcarsey94b17fa2009-05-07 18:46:18 +0000315**/
316EFI_STATUS
317EFIAPI
318ShellLibDestructor (
319 IN EFI_HANDLE ImageHandle,
320 IN EFI_SYSTEM_TABLE *SystemTable
jcarseya405b862010-09-14 05:18:09 +0000321 )
322{
jcarsey94b17fa2009-05-07 18:46:18 +0000323 if (mEfiShellEnvironment2 != NULL) {
324 gBS->CloseProtocol(mEfiShellEnvironment2Handle==NULL?ImageHandle:mEfiShellEnvironment2Handle,
325 &gEfiShellEnvironment2Guid,
326 ImageHandle,
327 NULL);
jcarseyd2b45642009-05-11 18:02:16 +0000328 mEfiShellEnvironment2 = NULL;
jcarsey94b17fa2009-05-07 18:46:18 +0000329 }
330 if (mEfiShellInterface != NULL) {
331 gBS->CloseProtocol(ImageHandle,
332 &gEfiShellInterfaceGuid,
333 ImageHandle,
jcarsey1e6e84c2010-01-25 20:05:08 +0000334 NULL);
jcarseyd2b45642009-05-11 18:02:16 +0000335 mEfiShellInterface = NULL;
jcarsey94b17fa2009-05-07 18:46:18 +0000336 }
jcarsey366f81a2011-06-27 21:04:22 +0000337 if (gEfiShellProtocol != NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +0000338 gBS->CloseProtocol(ImageHandle,
339 &gEfiShellProtocolGuid,
340 ImageHandle,
jcarsey1e6e84c2010-01-25 20:05:08 +0000341 NULL);
jcarsey366f81a2011-06-27 21:04:22 +0000342 gEfiShellProtocol = NULL;
jcarsey94b17fa2009-05-07 18:46:18 +0000343 }
jcarsey366f81a2011-06-27 21:04:22 +0000344 if (gEfiShellParametersProtocol != NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +0000345 gBS->CloseProtocol(ImageHandle,
346 &gEfiShellParametersProtocolGuid,
347 ImageHandle,
jcarsey1e6e84c2010-01-25 20:05:08 +0000348 NULL);
jcarsey366f81a2011-06-27 21:04:22 +0000349 gEfiShellParametersProtocol = NULL;
jcarsey94b17fa2009-05-07 18:46:18 +0000350 }
jcarseyd2b45642009-05-11 18:02:16 +0000351 mEfiShellEnvironment2Handle = NULL;
jcarseyecd3d592009-12-07 18:05:00 +0000352
jcarsey94b17fa2009-05-07 18:46:18 +0000353 return (EFI_SUCCESS);
354}
jcarseyd2b45642009-05-11 18:02:16 +0000355
356/**
357 This function causes the shell library to initialize itself. If the shell library
358 is already initialized it will de-initialize all the current protocol poitners and
359 re-populate them again.
360
361 When the library is used with PcdShellLibAutoInitialize set to true this function
362 will return EFI_SUCCESS and perform no actions.
363
364 This function is intended for internal access for shell commands only.
365
366 @retval EFI_SUCCESS the initialization was complete sucessfully
367
368**/
369EFI_STATUS
370EFIAPI
371ShellInitialize (
jcarseya405b862010-09-14 05:18:09 +0000372 )
373{
jcarseyd2b45642009-05-11 18:02:16 +0000374 //
375 // if auto initialize is not false then skip
376 //
377 if (PcdGetBool(PcdShellLibAutoInitialize) != 0) {
378 return (EFI_SUCCESS);
379 }
380
381 //
382 // deinit the current stuff
383 //
384 ASSERT_EFI_ERROR(ShellLibDestructor(gImageHandle, gST));
385
386 //
387 // init the new stuff
388 //
389 return (ShellLibConstructorWorker(gImageHandle, gST));
390}
391
jcarsey94b17fa2009-05-07 18:46:18 +0000392/**
jcarsey1e6e84c2010-01-25 20:05:08 +0000393 This function will retrieve the information about the file for the handle
jcarsey94b17fa2009-05-07 18:46:18 +0000394 specified and store it in allocated pool memory.
395
jcarsey1e6e84c2010-01-25 20:05:08 +0000396 This function allocates a buffer to store the file's information. It is the
qhuang869817bf2009-05-20 14:42:48 +0000397 caller's responsibility to free the buffer
jcarsey94b17fa2009-05-07 18:46:18 +0000398
jcarsey1e6e84c2010-01-25 20:05:08 +0000399 @param FileHandle The file handle of the file for which information is
jcarsey94b17fa2009-05-07 18:46:18 +0000400 being requested.
401
402 @retval NULL information could not be retrieved.
403
404 @return the information about the file
405**/
406EFI_FILE_INFO*
407EFIAPI
408ShellGetFileInfo (
jcarseya405b862010-09-14 05:18:09 +0000409 IN SHELL_FILE_HANDLE FileHandle
410 )
411{
jcarseyd2b45642009-05-11 18:02:16 +0000412 return (FileFunctionMap.GetFileInfo(FileHandle));
jcarsey94b17fa2009-05-07 18:46:18 +0000413}
414
415/**
jcarseya405b862010-09-14 05:18:09 +0000416 This function sets the information about the file for the opened handle
jcarsey94b17fa2009-05-07 18:46:18 +0000417 specified.
418
jcarseya405b862010-09-14 05:18:09 +0000419 @param[in] FileHandle The file handle of the file for which information
420 is being set.
jcarsey94b17fa2009-05-07 18:46:18 +0000421
jcarseya405b862010-09-14 05:18:09 +0000422 @param[in] FileInfo The information to set.
jcarsey94b17fa2009-05-07 18:46:18 +0000423
jcarseya405b862010-09-14 05:18:09 +0000424 @retval EFI_SUCCESS The information was set.
425 @retval EFI_INVALID_PARAMETER A parameter was out of range or invalid.
426 @retval EFI_UNSUPPORTED The FileHandle does not support FileInfo.
427 @retval EFI_NO_MEDIA The device has no medium.
428 @retval EFI_DEVICE_ERROR The device reported an error.
jcarsey94b17fa2009-05-07 18:46:18 +0000429 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
jcarseya405b862010-09-14 05:18:09 +0000430 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
431 @retval EFI_ACCESS_DENIED The file was opened read only.
432 @retval EFI_VOLUME_FULL The volume is full.
jcarsey94b17fa2009-05-07 18:46:18 +0000433**/
434EFI_STATUS
435EFIAPI
436ShellSetFileInfo (
jcarseya405b862010-09-14 05:18:09 +0000437 IN SHELL_FILE_HANDLE FileHandle,
jcarsey94b17fa2009-05-07 18:46:18 +0000438 IN EFI_FILE_INFO *FileInfo
jcarseya405b862010-09-14 05:18:09 +0000439 )
440{
jcarseyd2b45642009-05-11 18:02:16 +0000441 return (FileFunctionMap.SetFileInfo(FileHandle, FileInfo));
jcarsey1e6e84c2010-01-25 20:05:08 +0000442}
443
jcarsey94b17fa2009-05-07 18:46:18 +0000444 /**
445 This function will open a file or directory referenced by DevicePath.
446
jcarsey1e6e84c2010-01-25 20:05:08 +0000447 This function opens a file with the open mode according to the file path. The
jcarsey94b17fa2009-05-07 18:46:18 +0000448 Attributes is valid only for EFI_FILE_MODE_CREATE.
449
jcarsey1e6e84c2010-01-25 20:05:08 +0000450 @param FilePath on input the device path to the file. On output
jcarsey94b17fa2009-05-07 18:46:18 +0000451 the remaining device path.
452 @param DeviceHandle pointer to the system device handle.
453 @param FileHandle pointer to the file handle.
454 @param OpenMode the mode to open the file with.
455 @param Attributes the file's file attributes.
456
457 @retval EFI_SUCCESS The information was set.
458 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
jcarsey1e6e84c2010-01-25 20:05:08 +0000459 @retval EFI_UNSUPPORTED Could not open the file path.
460 @retval EFI_NOT_FOUND The specified file could not be found on the
461 device or the file system could not be found on
jcarsey94b17fa2009-05-07 18:46:18 +0000462 the device.
463 @retval EFI_NO_MEDIA The device has no medium.
jcarsey1e6e84c2010-01-25 20:05:08 +0000464 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
jcarsey94b17fa2009-05-07 18:46:18 +0000465 medium is no longer supported.
466 @retval EFI_DEVICE_ERROR The device reported an error.
467 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
468 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
jcarseya405b862010-09-14 05:18:09 +0000469 @retval EFI_ACCESS_DENIED The file was opened read only.
jcarsey1e6e84c2010-01-25 20:05:08 +0000470 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
jcarsey94b17fa2009-05-07 18:46:18 +0000471 file.
472 @retval EFI_VOLUME_FULL The volume is full.
473**/
474EFI_STATUS
475EFIAPI
476ShellOpenFileByDevicePath(
477 IN OUT EFI_DEVICE_PATH_PROTOCOL **FilePath,
478 OUT EFI_HANDLE *DeviceHandle,
jcarseya405b862010-09-14 05:18:09 +0000479 OUT SHELL_FILE_HANDLE *FileHandle,
jcarsey94b17fa2009-05-07 18:46:18 +0000480 IN UINT64 OpenMode,
481 IN UINT64 Attributes
jcarseya405b862010-09-14 05:18:09 +0000482 )
483{
484 CHAR16 *FileName;
485 EFI_STATUS Status;
jcarsey94b17fa2009-05-07 18:46:18 +0000486 EFI_SIMPLE_FILE_SYSTEM_PROTOCOL *EfiSimpleFileSystemProtocol;
jcarseya405b862010-09-14 05:18:09 +0000487 EFI_FILE_PROTOCOL *Handle1;
488 EFI_FILE_PROTOCOL *Handle2;
jcarsey94b17fa2009-05-07 18:46:18 +0000489
jcarsey92a54472011-06-27 20:33:13 +0000490 if (FilePath == NULL || FileHandle == NULL || DeviceHandle == NULL) {
491 return (EFI_INVALID_PARAMETER);
492 }
493
jcarsey1e6e84c2010-01-25 20:05:08 +0000494 //
jcarsey94b17fa2009-05-07 18:46:18 +0000495 // which shell interface should we use
496 //
jcarsey366f81a2011-06-27 21:04:22 +0000497 if (gEfiShellProtocol != NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +0000498 //
499 // use UEFI Shell 2.0 method.
500 //
jcarsey366f81a2011-06-27 21:04:22 +0000501 FileName = gEfiShellProtocol->GetFilePathFromDevicePath(*FilePath);
jcarsey94b17fa2009-05-07 18:46:18 +0000502 if (FileName == NULL) {
503 return (EFI_INVALID_PARAMETER);
504 }
505 Status = ShellOpenFileByName(FileName, FileHandle, OpenMode, Attributes);
506 FreePool(FileName);
507 return (Status);
jcarsey1e6e84c2010-01-25 20:05:08 +0000508 }
jcarseyd2b45642009-05-11 18:02:16 +0000509
510
511 //
512 // use old shell method.
513 //
jcarsey1e6e84c2010-01-25 20:05:08 +0000514 Status = gBS->LocateDevicePath (&gEfiSimpleFileSystemProtocolGuid,
515 FilePath,
jcarseyd2b45642009-05-11 18:02:16 +0000516 DeviceHandle);
517 if (EFI_ERROR (Status)) {
518 return Status;
519 }
520 Status = gBS->OpenProtocol(*DeviceHandle,
521 &gEfiSimpleFileSystemProtocolGuid,
jcarseyb1f95a02009-06-16 00:23:19 +0000522 (VOID**)&EfiSimpleFileSystemProtocol,
jcarseyd2b45642009-05-11 18:02:16 +0000523 gImageHandle,
524 NULL,
525 EFI_OPEN_PROTOCOL_GET_PROTOCOL);
526 if (EFI_ERROR (Status)) {
527 return Status;
528 }
jcarseya405b862010-09-14 05:18:09 +0000529 Status = EfiSimpleFileSystemProtocol->OpenVolume(EfiSimpleFileSystemProtocol, &Handle1);
jcarseyd2b45642009-05-11 18:02:16 +0000530 if (EFI_ERROR (Status)) {
531 FileHandle = NULL;
532 return Status;
533 }
534
535 //
536 // go down directories one node at a time.
537 //
538 while (!IsDevicePathEnd (*FilePath)) {
jcarsey94b17fa2009-05-07 18:46:18 +0000539 //
jcarseyd2b45642009-05-11 18:02:16 +0000540 // For file system access each node should be a file path component
jcarsey94b17fa2009-05-07 18:46:18 +0000541 //
jcarseyd2b45642009-05-11 18:02:16 +0000542 if (DevicePathType (*FilePath) != MEDIA_DEVICE_PATH ||
543 DevicePathSubType (*FilePath) != MEDIA_FILEPATH_DP
jcarseya405b862010-09-14 05:18:09 +0000544 ) {
jcarsey94b17fa2009-05-07 18:46:18 +0000545 FileHandle = NULL;
jcarseyd2b45642009-05-11 18:02:16 +0000546 return (EFI_INVALID_PARAMETER);
jcarsey94b17fa2009-05-07 18:46:18 +0000547 }
jcarseyd2b45642009-05-11 18:02:16 +0000548 //
549 // Open this file path node
550 //
jcarseya405b862010-09-14 05:18:09 +0000551 Handle2 = Handle1;
552 Handle1 = NULL;
jcarsey94b17fa2009-05-07 18:46:18 +0000553
554 //
jcarseyd2b45642009-05-11 18:02:16 +0000555 // Try to test opening an existing file
jcarsey94b17fa2009-05-07 18:46:18 +0000556 //
jcarseya405b862010-09-14 05:18:09 +0000557 Status = Handle2->Open (
558 Handle2,
559 &Handle1,
jcarseyd2b45642009-05-11 18:02:16 +0000560 ((FILEPATH_DEVICE_PATH*)*FilePath)->PathName,
561 OpenMode &~EFI_FILE_MODE_CREATE,
562 0
jcarseya405b862010-09-14 05:18:09 +0000563 );
jcarsey94b17fa2009-05-07 18:46:18 +0000564
jcarseyd2b45642009-05-11 18:02:16 +0000565 //
566 // see if the error was that it needs to be created
567 //
568 if ((EFI_ERROR (Status)) && (OpenMode != (OpenMode &~EFI_FILE_MODE_CREATE))) {
jcarseya405b862010-09-14 05:18:09 +0000569 Status = Handle2->Open (
570 Handle2,
571 &Handle1,
jcarsey94b17fa2009-05-07 18:46:18 +0000572 ((FILEPATH_DEVICE_PATH*)*FilePath)->PathName,
jcarseyd2b45642009-05-11 18:02:16 +0000573 OpenMode,
574 Attributes
jcarseya405b862010-09-14 05:18:09 +0000575 );
jcarsey94b17fa2009-05-07 18:46:18 +0000576 }
jcarseyd2b45642009-05-11 18:02:16 +0000577 //
578 // Close the last node
579 //
jcarseya405b862010-09-14 05:18:09 +0000580 Handle2->Close (Handle2);
jcarseyd2b45642009-05-11 18:02:16 +0000581
582 if (EFI_ERROR(Status)) {
583 return (Status);
584 }
585
586 //
587 // Get the next node
588 //
589 *FilePath = NextDevicePathNode (*FilePath);
jcarsey94b17fa2009-05-07 18:46:18 +0000590 }
jcarseya405b862010-09-14 05:18:09 +0000591
592 //
593 // This is a weak spot since if the undefined SHELL_FILE_HANDLE format changes this must change also!
594 //
595 *FileHandle = (VOID*)Handle1;
jcarseyd2b45642009-05-11 18:02:16 +0000596 return (EFI_SUCCESS);
jcarsey94b17fa2009-05-07 18:46:18 +0000597}
598
599/**
600 This function will open a file or directory referenced by filename.
601
jcarsey1e6e84c2010-01-25 20:05:08 +0000602 If return is EFI_SUCCESS, the Filehandle is the opened file's handle;
603 otherwise, the Filehandle is NULL. The Attributes is valid only for
jcarsey94b17fa2009-05-07 18:46:18 +0000604 EFI_FILE_MODE_CREATE.
605
jcarsey92a54472011-06-27 20:33:13 +0000606 if FileName is NULL then ASSERT()
jcarsey94b17fa2009-05-07 18:46:18 +0000607
608 @param FileName pointer to file name
609 @param FileHandle pointer to the file handle.
610 @param OpenMode the mode to open the file with.
611 @param Attributes the file's file attributes.
612
613 @retval EFI_SUCCESS The information was set.
614 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
jcarsey1e6e84c2010-01-25 20:05:08 +0000615 @retval EFI_UNSUPPORTED Could not open the file path.
616 @retval EFI_NOT_FOUND The specified file could not be found on the
617 device or the file system could not be found
jcarsey94b17fa2009-05-07 18:46:18 +0000618 on the device.
619 @retval EFI_NO_MEDIA The device has no medium.
jcarsey1e6e84c2010-01-25 20:05:08 +0000620 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
jcarsey94b17fa2009-05-07 18:46:18 +0000621 medium is no longer supported.
622 @retval EFI_DEVICE_ERROR The device reported an error.
623 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
624 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
625 @retval EFI_ACCESS_DENIED The file was opened read only.
jcarsey1e6e84c2010-01-25 20:05:08 +0000626 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
jcarsey94b17fa2009-05-07 18:46:18 +0000627 file.
628 @retval EFI_VOLUME_FULL The volume is full.
629**/
630EFI_STATUS
631EFIAPI
632ShellOpenFileByName(
jcarseyb82bfcc2009-06-29 16:28:23 +0000633 IN CONST CHAR16 *FileName,
jcarseya405b862010-09-14 05:18:09 +0000634 OUT SHELL_FILE_HANDLE *FileHandle,
jcarsey94b17fa2009-05-07 18:46:18 +0000635 IN UINT64 OpenMode,
636 IN UINT64 Attributes
jcarseya405b862010-09-14 05:18:09 +0000637 )
638{
jcarsey94b17fa2009-05-07 18:46:18 +0000639 EFI_HANDLE DeviceHandle;
640 EFI_DEVICE_PATH_PROTOCOL *FilePath;
jcarseyb1f95a02009-06-16 00:23:19 +0000641 EFI_STATUS Status;
642 EFI_FILE_INFO *FileInfo;
jcarsey94b17fa2009-05-07 18:46:18 +0000643
644 //
645 // ASSERT if FileName is NULL
646 //
647 ASSERT(FileName != NULL);
648
jcarseya405b862010-09-14 05:18:09 +0000649 if (FileName == NULL) {
650 return (EFI_INVALID_PARAMETER);
651 }
652
jcarsey366f81a2011-06-27 21:04:22 +0000653 if (gEfiShellProtocol != NULL) {
jcarseya405b862010-09-14 05:18:09 +0000654 if ((OpenMode & EFI_FILE_MODE_CREATE) == EFI_FILE_MODE_CREATE && (Attributes & EFI_FILE_DIRECTORY) == EFI_FILE_DIRECTORY) {
655 return ShellCreateDirectory(FileName, FileHandle);
656 }
jcarsey94b17fa2009-05-07 18:46:18 +0000657 //
658 // Use UEFI Shell 2.0 method
659 //
jcarsey366f81a2011-06-27 21:04:22 +0000660 Status = gEfiShellProtocol->OpenFileByName(FileName,
jcarseyb1f95a02009-06-16 00:23:19 +0000661 FileHandle,
662 OpenMode);
jcarseya405b862010-09-14 05:18:09 +0000663 if (StrCmp(FileName, L"NUL") != 0 && !EFI_ERROR(Status) && ((OpenMode & EFI_FILE_MODE_CREATE) != 0)){
jcarsey2247dde2009-11-09 18:08:58 +0000664 FileInfo = FileFunctionMap.GetFileInfo(*FileHandle);
jcarseyb1f95a02009-06-16 00:23:19 +0000665 ASSERT(FileInfo != NULL);
666 FileInfo->Attribute = Attributes;
jcarsey2247dde2009-11-09 18:08:58 +0000667 Status = FileFunctionMap.SetFileInfo(*FileHandle, FileInfo);
668 FreePool(FileInfo);
jcarseyb1f95a02009-06-16 00:23:19 +0000669 }
670 return (Status);
jcarsey1e6e84c2010-01-25 20:05:08 +0000671 }
jcarsey94b17fa2009-05-07 18:46:18 +0000672 //
673 // Using EFI Shell version
674 // this means convert name to path and call that function
675 // since this will use EFI method again that will open it.
676 //
677 ASSERT(mEfiShellEnvironment2 != NULL);
jcarseyb82bfcc2009-06-29 16:28:23 +0000678 FilePath = mEfiShellEnvironment2->NameToPath ((CHAR16*)FileName);
xdu290bfa222010-07-19 05:21:27 +0000679 if (FilePath != NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +0000680 return (ShellOpenFileByDevicePath(&FilePath,
681 &DeviceHandle,
682 FileHandle,
683 OpenMode,
jcarseya405b862010-09-14 05:18:09 +0000684 Attributes));
jcarsey94b17fa2009-05-07 18:46:18 +0000685 }
686 return (EFI_DEVICE_ERROR);
687}
688/**
689 This function create a directory
690
jcarsey1e6e84c2010-01-25 20:05:08 +0000691 If return is EFI_SUCCESS, the Filehandle is the opened directory's handle;
692 otherwise, the Filehandle is NULL. If the directory already existed, this
jcarsey94b17fa2009-05-07 18:46:18 +0000693 function opens the existing directory.
694
695 @param DirectoryName pointer to directory name
696 @param FileHandle pointer to the file handle.
697
698 @retval EFI_SUCCESS The information was set.
699 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
jcarsey1e6e84c2010-01-25 20:05:08 +0000700 @retval EFI_UNSUPPORTED Could not open the file path.
701 @retval EFI_NOT_FOUND The specified file could not be found on the
702 device or the file system could not be found
jcarsey94b17fa2009-05-07 18:46:18 +0000703 on the device.
704 @retval EFI_NO_MEDIA The device has no medium.
jcarsey1e6e84c2010-01-25 20:05:08 +0000705 @retval EFI_MEDIA_CHANGED The device has a different medium in it or the
jcarsey94b17fa2009-05-07 18:46:18 +0000706 medium is no longer supported.
707 @retval EFI_DEVICE_ERROR The device reported an error.
708 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
709 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
710 @retval EFI_ACCESS_DENIED The file was opened read only.
jcarsey1e6e84c2010-01-25 20:05:08 +0000711 @retval EFI_OUT_OF_RESOURCES Not enough resources were available to open the
jcarsey94b17fa2009-05-07 18:46:18 +0000712 file.
713 @retval EFI_VOLUME_FULL The volume is full.
714 @sa ShellOpenFileByName
715**/
716EFI_STATUS
717EFIAPI
718ShellCreateDirectory(
jcarseyb82bfcc2009-06-29 16:28:23 +0000719 IN CONST CHAR16 *DirectoryName,
jcarseya405b862010-09-14 05:18:09 +0000720 OUT SHELL_FILE_HANDLE *FileHandle
721 )
722{
jcarsey366f81a2011-06-27 21:04:22 +0000723 if (gEfiShellProtocol != NULL) {
jcarsey2247dde2009-11-09 18:08:58 +0000724 //
725 // Use UEFI Shell 2.0 method
726 //
jcarsey366f81a2011-06-27 21:04:22 +0000727 return (gEfiShellProtocol->CreateFile(DirectoryName,
jcarsey2247dde2009-11-09 18:08:58 +0000728 EFI_FILE_DIRECTORY,
729 FileHandle
jcarseya405b862010-09-14 05:18:09 +0000730 ));
jcarsey2247dde2009-11-09 18:08:58 +0000731 } else {
732 return (ShellOpenFileByName(DirectoryName,
733 FileHandle,
734 EFI_FILE_MODE_READ | EFI_FILE_MODE_WRITE | EFI_FILE_MODE_CREATE,
735 EFI_FILE_DIRECTORY
jcarseya405b862010-09-14 05:18:09 +0000736 ));
jcarsey2247dde2009-11-09 18:08:58 +0000737 }
jcarsey94b17fa2009-05-07 18:46:18 +0000738}
739
740/**
741 This function reads information from an opened file.
742
jcarsey1e6e84c2010-01-25 20:05:08 +0000743 If FileHandle is not a directory, the function reads the requested number of
744 bytes from the file at the file's current position and returns them in Buffer.
jcarsey94b17fa2009-05-07 18:46:18 +0000745 If the read goes beyond the end of the file, the read length is truncated to the
jcarsey1e6e84c2010-01-25 20:05:08 +0000746 end of the file. The file's current position is increased by the number of bytes
747 returned. If FileHandle is a directory, the function reads the directory entry
748 at the file's current position and returns the entry in Buffer. If the Buffer
749 is not large enough to hold the current directory entry, then
750 EFI_BUFFER_TOO_SMALL is returned and the current file position is not updated.
751 BufferSize is set to be the size of the buffer needed to read the entry. On
752 success, the current position is updated to the next directory entry. If there
753 are no more directory entries, the read returns a zero-length buffer.
jcarsey94b17fa2009-05-07 18:46:18 +0000754 EFI_FILE_INFO is the structure returned as the directory entry.
755
756 @param FileHandle the opened file handle
jcarsey1e6e84c2010-01-25 20:05:08 +0000757 @param BufferSize on input the size of buffer in bytes. on return
jcarsey94b17fa2009-05-07 18:46:18 +0000758 the number of bytes written.
759 @param Buffer the buffer to put read data into.
760
761 @retval EFI_SUCCESS Data was read.
762 @retval EFI_NO_MEDIA The device has no media.
763 @retval EFI_DEVICE_ERROR The device reported an error.
764 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
jcarsey1e6e84c2010-01-25 20:05:08 +0000765 @retval EFI_BUFFER_TO_SMALL Buffer is too small. ReadSize contains required
jcarsey94b17fa2009-05-07 18:46:18 +0000766 size.
767
768**/
769EFI_STATUS
770EFIAPI
771ShellReadFile(
jcarseya405b862010-09-14 05:18:09 +0000772 IN SHELL_FILE_HANDLE FileHandle,
jcarsey94b17fa2009-05-07 18:46:18 +0000773 IN OUT UINTN *BufferSize,
774 OUT VOID *Buffer
jcarseya405b862010-09-14 05:18:09 +0000775 )
776{
jcarseyd2b45642009-05-11 18:02:16 +0000777 return (FileFunctionMap.ReadFile(FileHandle, BufferSize, Buffer));
jcarsey94b17fa2009-05-07 18:46:18 +0000778}
779
780
781/**
782 Write data to a file.
783
jcarsey1e6e84c2010-01-25 20:05:08 +0000784 This function writes the specified number of bytes to the file at the current
785 file position. The current file position is advanced the actual number of bytes
786 written, which is returned in BufferSize. Partial writes only occur when there
787 has been a data error during the write attempt (such as "volume space full").
788 The file is automatically grown to hold the data if required. Direct writes to
jcarsey94b17fa2009-05-07 18:46:18 +0000789 opened directories are not supported.
790
791 @param FileHandle The opened file for writing
792 @param BufferSize on input the number of bytes in Buffer. On output
793 the number of bytes written.
794 @param Buffer the buffer containing data to write is stored.
795
796 @retval EFI_SUCCESS Data was written.
797 @retval EFI_UNSUPPORTED Writes to an open directory are not supported.
798 @retval EFI_NO_MEDIA The device has no media.
799 @retval EFI_DEVICE_ERROR The device reported an error.
800 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
801 @retval EFI_WRITE_PROTECTED The device is write-protected.
802 @retval EFI_ACCESS_DENIED The file was open for read only.
803 @retval EFI_VOLUME_FULL The volume is full.
804**/
805EFI_STATUS
806EFIAPI
807ShellWriteFile(
jcarsey252d9452011-03-25 20:49:53 +0000808 IN SHELL_FILE_HANDLE FileHandle,
jcarsey94b17fa2009-05-07 18:46:18 +0000809 IN OUT UINTN *BufferSize,
810 IN VOID *Buffer
jcarseya405b862010-09-14 05:18:09 +0000811 )
812{
jcarseyd2b45642009-05-11 18:02:16 +0000813 return (FileFunctionMap.WriteFile(FileHandle, BufferSize, Buffer));
jcarsey94b17fa2009-05-07 18:46:18 +0000814}
815
jcarsey1e6e84c2010-01-25 20:05:08 +0000816/**
jcarsey94b17fa2009-05-07 18:46:18 +0000817 Close an open file handle.
818
jcarsey1e6e84c2010-01-25 20:05:08 +0000819 This function closes a specified file handle. All "dirty" cached file data is
820 flushed to the device, and the file is closed. In all cases the handle is
jcarsey94b17fa2009-05-07 18:46:18 +0000821 closed.
822
823@param FileHandle the file handle to close.
824
825@retval EFI_SUCCESS the file handle was closed sucessfully.
826**/
827EFI_STATUS
828EFIAPI
829ShellCloseFile (
jcarseya405b862010-09-14 05:18:09 +0000830 IN SHELL_FILE_HANDLE *FileHandle
831 )
832{
jcarseyd2b45642009-05-11 18:02:16 +0000833 return (FileFunctionMap.CloseFile(*FileHandle));
jcarsey94b17fa2009-05-07 18:46:18 +0000834}
835
836/**
837 Delete a file and close the handle
838
839 This function closes and deletes a file. In all cases the file handle is closed.
jcarsey1e6e84c2010-01-25 20:05:08 +0000840 If the file cannot be deleted, the warning code EFI_WARN_DELETE_FAILURE is
jcarsey94b17fa2009-05-07 18:46:18 +0000841 returned, but the handle is still closed.
842
843 @param FileHandle the file handle to delete
844
845 @retval EFI_SUCCESS the file was closed sucessfully
jcarsey1e6e84c2010-01-25 20:05:08 +0000846 @retval EFI_WARN_DELETE_FAILURE the handle was closed, but the file was not
jcarsey94b17fa2009-05-07 18:46:18 +0000847 deleted
848 @retval INVALID_PARAMETER One of the parameters has an invalid value.
849**/
850EFI_STATUS
851EFIAPI
852ShellDeleteFile (
jcarseya405b862010-09-14 05:18:09 +0000853 IN SHELL_FILE_HANDLE *FileHandle
854 )
855{
jcarseyd2b45642009-05-11 18:02:16 +0000856 return (FileFunctionMap.DeleteFile(*FileHandle));
jcarsey94b17fa2009-05-07 18:46:18 +0000857}
858
859/**
860 Set the current position in a file.
861
jcarsey1e6e84c2010-01-25 20:05:08 +0000862 This function sets the current file position for the handle to the position
jcarsey94b17fa2009-05-07 18:46:18 +0000863 supplied. With the exception of seeking to position 0xFFFFFFFFFFFFFFFF, only
jcarsey1e6e84c2010-01-25 20:05:08 +0000864 absolute positioning is supported, and seeking past the end of the file is
865 allowed (a subsequent write would grow the file). Seeking to position
jcarsey94b17fa2009-05-07 18:46:18 +0000866 0xFFFFFFFFFFFFFFFF causes the current position to be set to the end of the file.
jcarsey1e6e84c2010-01-25 20:05:08 +0000867 If FileHandle is a directory, the only position that may be set is zero. This
jcarsey94b17fa2009-05-07 18:46:18 +0000868 has the effect of starting the read process of the directory entries over.
869
870 @param FileHandle The file handle on which the position is being set
871 @param Position Byte position from begining of file
872
873 @retval EFI_SUCCESS Operation completed sucessfully.
jcarsey1e6e84c2010-01-25 20:05:08 +0000874 @retval EFI_UNSUPPORTED the seek request for non-zero is not valid on
jcarsey94b17fa2009-05-07 18:46:18 +0000875 directories.
876 @retval INVALID_PARAMETER One of the parameters has an invalid value.
877**/
878EFI_STATUS
879EFIAPI
880ShellSetFilePosition (
jcarseya405b862010-09-14 05:18:09 +0000881 IN SHELL_FILE_HANDLE FileHandle,
jcarsey94b17fa2009-05-07 18:46:18 +0000882 IN UINT64 Position
jcarseya405b862010-09-14 05:18:09 +0000883 )
884{
jcarseyd2b45642009-05-11 18:02:16 +0000885 return (FileFunctionMap.SetFilePosition(FileHandle, Position));
jcarsey94b17fa2009-05-07 18:46:18 +0000886}
887
jcarsey1e6e84c2010-01-25 20:05:08 +0000888/**
jcarsey94b17fa2009-05-07 18:46:18 +0000889 Gets a file's current position
890
jcarsey1e6e84c2010-01-25 20:05:08 +0000891 This function retrieves the current file position for the file handle. For
892 directories, the current file position has no meaning outside of the file
jcarsey94b17fa2009-05-07 18:46:18 +0000893 system driver and as such the operation is not supported. An error is returned
894 if FileHandle is a directory.
895
896 @param FileHandle The open file handle on which to get the position.
897 @param Position Byte position from begining of file.
898
899 @retval EFI_SUCCESS the operation completed sucessfully.
900 @retval INVALID_PARAMETER One of the parameters has an invalid value.
901 @retval EFI_UNSUPPORTED the request is not valid on directories.
902**/
903EFI_STATUS
904EFIAPI
905ShellGetFilePosition (
jcarseya405b862010-09-14 05:18:09 +0000906 IN SHELL_FILE_HANDLE FileHandle,
jcarsey94b17fa2009-05-07 18:46:18 +0000907 OUT UINT64 *Position
jcarseya405b862010-09-14 05:18:09 +0000908 )
909{
jcarseyd2b45642009-05-11 18:02:16 +0000910 return (FileFunctionMap.GetFilePosition(FileHandle, Position));
jcarsey94b17fa2009-05-07 18:46:18 +0000911}
912/**
913 Flushes data on a file
jcarsey1e6e84c2010-01-25 20:05:08 +0000914
jcarsey94b17fa2009-05-07 18:46:18 +0000915 This function flushes all modified data associated with a file to a device.
916
917 @param FileHandle The file handle on which to flush data
918
919 @retval EFI_SUCCESS The data was flushed.
920 @retval EFI_NO_MEDIA The device has no media.
921 @retval EFI_DEVICE_ERROR The device reported an error.
922 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
923 @retval EFI_WRITE_PROTECTED The file or medium is write protected.
924 @retval EFI_ACCESS_DENIED The file was opened for read only.
925**/
926EFI_STATUS
927EFIAPI
928ShellFlushFile (
jcarseya405b862010-09-14 05:18:09 +0000929 IN SHELL_FILE_HANDLE FileHandle
930 )
931{
jcarseyd2b45642009-05-11 18:02:16 +0000932 return (FileFunctionMap.FlushFile(FileHandle));
jcarsey94b17fa2009-05-07 18:46:18 +0000933}
934
935/**
936 Retrieves the first file from a directory
937
jcarsey1e6e84c2010-01-25 20:05:08 +0000938 This function opens a directory and gets the first file's info in the
939 directory. Caller can use ShellFindNextFile() to get other files. When
jcarsey94b17fa2009-05-07 18:46:18 +0000940 complete the caller is responsible for calling FreePool() on Buffer.
941
942 @param DirHandle The file handle of the directory to search
943 @param Buffer Pointer to buffer for file's information
944
945 @retval EFI_SUCCESS Found the first file.
946 @retval EFI_NOT_FOUND Cannot find the directory.
947 @retval EFI_NO_MEDIA The device has no media.
948 @retval EFI_DEVICE_ERROR The device reported an error.
949 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
950 @return Others status of ShellGetFileInfo, ShellSetFilePosition,
951 or ShellReadFile
952**/
953EFI_STATUS
954EFIAPI
955ShellFindFirstFile (
jcarseya405b862010-09-14 05:18:09 +0000956 IN SHELL_FILE_HANDLE DirHandle,
jcarseyd2b45642009-05-11 18:02:16 +0000957 OUT EFI_FILE_INFO **Buffer
jcarseya405b862010-09-14 05:18:09 +0000958 )
959{
jcarsey94b17fa2009-05-07 18:46:18 +0000960 //
jcarseyd2b45642009-05-11 18:02:16 +0000961 // pass to file handle lib
jcarsey94b17fa2009-05-07 18:46:18 +0000962 //
jcarseyd2b45642009-05-11 18:02:16 +0000963 return (FileHandleFindFirstFile(DirHandle, Buffer));
jcarsey94b17fa2009-05-07 18:46:18 +0000964}
965/**
966 Retrieves the next file in a directory.
967
jcarseya405b862010-09-14 05:18:09 +0000968 To use this function, caller must call the ShellFindFirstFile() to get the
jcarsey1e6e84c2010-01-25 20:05:08 +0000969 first file, and then use this function get other files. This function can be
970 called for several times to get each file's information in the directory. If
971 the call of ShellFindNextFile() got the last file in the directory, the next
972 call of this function has no file to get. *NoFile will be set to TRUE and the
973 Buffer memory will be automatically freed.
jcarsey94b17fa2009-05-07 18:46:18 +0000974
975 @param DirHandle the file handle of the directory
976 @param Buffer pointer to buffer for file's information
977 @param NoFile pointer to boolean when last file is found
978
979 @retval EFI_SUCCESS Found the next file, or reached last file
980 @retval EFI_NO_MEDIA The device has no media.
981 @retval EFI_DEVICE_ERROR The device reported an error.
982 @retval EFI_VOLUME_CORRUPTED The file system structures are corrupted.
983**/
984EFI_STATUS
985EFIAPI
986ShellFindNextFile(
jcarseya405b862010-09-14 05:18:09 +0000987 IN SHELL_FILE_HANDLE DirHandle,
jcarsey94b17fa2009-05-07 18:46:18 +0000988 OUT EFI_FILE_INFO *Buffer,
989 OUT BOOLEAN *NoFile
jcarseya405b862010-09-14 05:18:09 +0000990 )
991{
jcarsey94b17fa2009-05-07 18:46:18 +0000992 //
jcarseyd2b45642009-05-11 18:02:16 +0000993 // pass to file handle lib
jcarsey94b17fa2009-05-07 18:46:18 +0000994 //
jcarseyd2b45642009-05-11 18:02:16 +0000995 return (FileHandleFindNextFile(DirHandle, Buffer, NoFile));
jcarsey94b17fa2009-05-07 18:46:18 +0000996}
997/**
998 Retrieve the size of a file.
999
1000 if FileHandle is NULL then ASSERT()
1001 if Size is NULL then ASSERT()
1002
jcarsey1e6e84c2010-01-25 20:05:08 +00001003 This function extracts the file size info from the FileHandle's EFI_FILE_INFO
jcarsey94b17fa2009-05-07 18:46:18 +00001004 data.
1005
1006 @param FileHandle file handle from which size is retrieved
1007 @param Size pointer to size
1008
1009 @retval EFI_SUCCESS operation was completed sucessfully
1010 @retval EFI_DEVICE_ERROR cannot access the file
1011**/
1012EFI_STATUS
1013EFIAPI
1014ShellGetFileSize (
jcarseya405b862010-09-14 05:18:09 +00001015 IN SHELL_FILE_HANDLE FileHandle,
jcarsey94b17fa2009-05-07 18:46:18 +00001016 OUT UINT64 *Size
jcarseya405b862010-09-14 05:18:09 +00001017 )
1018{
jcarseyd2b45642009-05-11 18:02:16 +00001019 return (FileFunctionMap.GetFileSize(FileHandle, Size));
jcarsey94b17fa2009-05-07 18:46:18 +00001020}
1021/**
1022 Retrieves the status of the break execution flag
1023
1024 this function is useful to check whether the application is being asked to halt by the shell.
1025
1026 @retval TRUE the execution break is enabled
1027 @retval FALSE the execution break is not enabled
1028**/
1029BOOLEAN
1030EFIAPI
1031ShellGetExecutionBreakFlag(
1032 VOID
1033 )
1034{
jcarsey1e6e84c2010-01-25 20:05:08 +00001035 //
jcarsey94b17fa2009-05-07 18:46:18 +00001036 // Check for UEFI Shell 2.0 protocols
1037 //
jcarsey366f81a2011-06-27 21:04:22 +00001038 if (gEfiShellProtocol != NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +00001039
1040 //
1041 // We are using UEFI Shell 2.0; see if the event has been triggered
1042 //
jcarsey366f81a2011-06-27 21:04:22 +00001043 if (gBS->CheckEvent(gEfiShellProtocol->ExecutionBreak) != EFI_SUCCESS) {
jcarsey94b17fa2009-05-07 18:46:18 +00001044 return (FALSE);
1045 }
1046 return (TRUE);
jcarsey1e6e84c2010-01-25 20:05:08 +00001047 }
jcarsey94b17fa2009-05-07 18:46:18 +00001048
1049 //
1050 // using EFI Shell; call the function to check
1051 //
jcarsey92a54472011-06-27 20:33:13 +00001052 if (mEfiShellEnvironment2 != NULL) {
1053 return (mEfiShellEnvironment2->GetExecutionBreak());
1054 }
1055
1056 return (FALSE);
jcarsey94b17fa2009-05-07 18:46:18 +00001057}
1058/**
1059 return the value of an environment variable
1060
jcarsey1e6e84c2010-01-25 20:05:08 +00001061 this function gets the value of the environment variable set by the
jcarsey94b17fa2009-05-07 18:46:18 +00001062 ShellSetEnvironmentVariable function
1063
1064 @param EnvKey The key name of the environment variable.
1065
1066 @retval NULL the named environment variable does not exist.
1067 @return != NULL pointer to the value of the environment variable
1068**/
1069CONST CHAR16*
1070EFIAPI
1071ShellGetEnvironmentVariable (
jcarsey9b3bf082009-06-23 21:15:07 +00001072 IN CONST CHAR16 *EnvKey
jcarsey94b17fa2009-05-07 18:46:18 +00001073 )
1074{
jcarsey1e6e84c2010-01-25 20:05:08 +00001075 //
jcarsey94b17fa2009-05-07 18:46:18 +00001076 // Check for UEFI Shell 2.0 protocols
1077 //
jcarsey366f81a2011-06-27 21:04:22 +00001078 if (gEfiShellProtocol != NULL) {
1079 return (gEfiShellProtocol->GetEnv(EnvKey));
jcarsey94b17fa2009-05-07 18:46:18 +00001080 }
1081
1082 //
jcarsey92a54472011-06-27 20:33:13 +00001083 // Check for EFI shell
jcarsey94b17fa2009-05-07 18:46:18 +00001084 //
jcarsey92a54472011-06-27 20:33:13 +00001085 if (mEfiShellEnvironment2 != NULL) {
1086 return (mEfiShellEnvironment2->GetEnv((CHAR16*)EnvKey));
1087 }
jcarsey94b17fa2009-05-07 18:46:18 +00001088
jcarsey92a54472011-06-27 20:33:13 +00001089 return NULL;
jcarsey94b17fa2009-05-07 18:46:18 +00001090}
1091/**
1092 set the value of an environment variable
1093
1094This function changes the current value of the specified environment variable. If the
1095environment variable exists and the Value is an empty string, then the environment
1096variable is deleted. If the environment variable exists and the Value is not an empty
1097string, then the value of the environment variable is changed. If the environment
1098variable does not exist and the Value is an empty string, there is no action. If the
1099environment variable does not exist and the Value is a non-empty string, then the
1100environment variable is created and assigned the specified value.
1101
1102 This is not supported pre-UEFI Shell 2.0.
1103
1104 @param EnvKey The key name of the environment variable.
1105 @param EnvVal The Value of the environment variable
1106 @param Volatile Indicates whether the variable is non-volatile (FALSE) or volatile (TRUE).
1107
1108 @retval EFI_SUCCESS the operation was completed sucessfully
1109 @retval EFI_UNSUPPORTED This operation is not allowed in pre UEFI 2.0 Shell environments
1110**/
1111EFI_STATUS
1112EFIAPI
1113ShellSetEnvironmentVariable (
1114 IN CONST CHAR16 *EnvKey,
1115 IN CONST CHAR16 *EnvVal,
1116 IN BOOLEAN Volatile
1117 )
1118{
jcarsey1e6e84c2010-01-25 20:05:08 +00001119 //
jcarsey94b17fa2009-05-07 18:46:18 +00001120 // Check for UEFI Shell 2.0 protocols
1121 //
jcarsey366f81a2011-06-27 21:04:22 +00001122 if (gEfiShellProtocol != NULL) {
1123 return (gEfiShellProtocol->SetEnv(EnvKey, EnvVal, Volatile));
jcarsey1e6e84c2010-01-25 20:05:08 +00001124 }
jcarsey94b17fa2009-05-07 18:46:18 +00001125
1126 //
1127 // This feature does not exist under EFI shell
1128 //
1129 return (EFI_UNSUPPORTED);
1130}
jcarseya405b862010-09-14 05:18:09 +00001131
jcarsey94b17fa2009-05-07 18:46:18 +00001132/**
jcarseya405b862010-09-14 05:18:09 +00001133 Cause the shell to parse and execute a command line.
jcarsey94b17fa2009-05-07 18:46:18 +00001134
1135 This function creates a nested instance of the shell and executes the specified
jcarseya405b862010-09-14 05:18:09 +00001136 command (CommandLine) with the specified environment (Environment). Upon return,
1137 the status code returned by the specified command is placed in StatusCode.
1138 If Environment is NULL, then the current environment is used and all changes made
1139 by the commands executed will be reflected in the current environment. If the
1140 Environment is non-NULL, then the changes made will be discarded.
1141 The CommandLine is executed from the current working directory on the current
1142 device.
jcarsey94b17fa2009-05-07 18:46:18 +00001143
jcarseya405b862010-09-14 05:18:09 +00001144 The EnvironmentVariables and Status parameters are ignored in a pre-UEFI Shell 2.0
1145 environment. The values pointed to by the parameters will be unchanged by the
1146 ShellExecute() function. The Output parameter has no effect in a
1147 UEFI Shell 2.0 environment.
jcarsey94b17fa2009-05-07 18:46:18 +00001148
jcarseya405b862010-09-14 05:18:09 +00001149 @param[in] ParentHandle The parent image starting the operation.
1150 @param[in] CommandLine The pointer to a NULL terminated command line.
1151 @param[in] Output True to display debug output. False to hide it.
1152 @param[in] EnvironmentVariables Optional pointer to array of environment variables
1153 in the form "x=y". If NULL, the current set is used.
1154 @param[out] Status The status of the run command line.
jcarsey94b17fa2009-05-07 18:46:18 +00001155
jcarseya405b862010-09-14 05:18:09 +00001156 @retval EFI_SUCCESS The operation completed sucessfully. Status
1157 contains the status code returned.
1158 @retval EFI_INVALID_PARAMETER A parameter contains an invalid value.
1159 @retval EFI_OUT_OF_RESOURCES Out of resources.
1160 @retval EFI_UNSUPPORTED The operation is not allowed.
jcarsey94b17fa2009-05-07 18:46:18 +00001161**/
1162EFI_STATUS
1163EFIAPI
1164ShellExecute (
1165 IN EFI_HANDLE *ParentHandle,
1166 IN CHAR16 *CommandLine OPTIONAL,
1167 IN BOOLEAN Output OPTIONAL,
1168 IN CHAR16 **EnvironmentVariables OPTIONAL,
1169 OUT EFI_STATUS *Status OPTIONAL
1170 )
1171{
jcarsey1e6e84c2010-01-25 20:05:08 +00001172 //
jcarsey94b17fa2009-05-07 18:46:18 +00001173 // Check for UEFI Shell 2.0 protocols
1174 //
jcarsey366f81a2011-06-27 21:04:22 +00001175 if (gEfiShellProtocol != NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +00001176 //
1177 // Call UEFI Shell 2.0 version (not using Output parameter)
1178 //
jcarsey366f81a2011-06-27 21:04:22 +00001179 return (gEfiShellProtocol->Execute(ParentHandle,
jcarsey94b17fa2009-05-07 18:46:18 +00001180 CommandLine,
1181 EnvironmentVariables,
1182 Status));
jcarsey1e6e84c2010-01-25 20:05:08 +00001183 }
jcarsey92a54472011-06-27 20:33:13 +00001184
jcarsey94b17fa2009-05-07 18:46:18 +00001185 //
jcarsey92a54472011-06-27 20:33:13 +00001186 // Check for EFI shell
jcarsey94b17fa2009-05-07 18:46:18 +00001187 //
jcarsey92a54472011-06-27 20:33:13 +00001188 if (mEfiShellEnvironment2 != NULL) {
1189 //
1190 // Call EFI Shell version (not using EnvironmentVariables or Status parameters)
1191 // Due to oddity in the EFI shell we want to dereference the ParentHandle here
1192 //
1193 return (mEfiShellEnvironment2->Execute(*ParentHandle,
1194 CommandLine,
1195 Output));
1196 }
1197
1198 return (EFI_UNSUPPORTED);
jcarsey94b17fa2009-05-07 18:46:18 +00001199}
1200/**
1201 Retreives the current directory path
1202
jcarsey1e6e84c2010-01-25 20:05:08 +00001203 If the DeviceName is NULL, it returns the current device's current directory
1204 name. If the DeviceName is not NULL, it returns the current directory name
jcarsey94b17fa2009-05-07 18:46:18 +00001205 on specified drive.
1206
1207 @param DeviceName the name of the drive to get directory on
1208
1209 @retval NULL the directory does not exist
1210 @return != NULL the directory
1211**/
1212CONST CHAR16*
1213EFIAPI
1214ShellGetCurrentDir (
jcarseya405b862010-09-14 05:18:09 +00001215 IN CHAR16 * CONST DeviceName OPTIONAL
jcarsey94b17fa2009-05-07 18:46:18 +00001216 )
1217{
jcarsey1e6e84c2010-01-25 20:05:08 +00001218 //
jcarsey94b17fa2009-05-07 18:46:18 +00001219 // Check for UEFI Shell 2.0 protocols
1220 //
jcarsey366f81a2011-06-27 21:04:22 +00001221 if (gEfiShellProtocol != NULL) {
1222 return (gEfiShellProtocol->GetCurDir(DeviceName));
jcarsey1e6e84c2010-01-25 20:05:08 +00001223 }
jcarsey92a54472011-06-27 20:33:13 +00001224
jcarsey94b17fa2009-05-07 18:46:18 +00001225 //
jcarsey8bd282b2011-06-27 16:45:41 +00001226 // Check for EFI shell
jcarsey94b17fa2009-05-07 18:46:18 +00001227 //
jcarsey8bd282b2011-06-27 16:45:41 +00001228 if (mEfiShellEnvironment2 != NULL) {
1229 return (mEfiShellEnvironment2->CurDir(DeviceName));
1230 }
1231
1232 return (NULL);
jcarsey94b17fa2009-05-07 18:46:18 +00001233}
1234/**
1235 sets (enabled or disabled) the page break mode
1236
jcarsey1e6e84c2010-01-25 20:05:08 +00001237 when page break mode is enabled the screen will stop scrolling
jcarsey94b17fa2009-05-07 18:46:18 +00001238 and wait for operator input before scrolling a subsequent screen.
1239
1240 @param CurrentState TRUE to enable and FALSE to disable
1241**/
jcarsey1e6e84c2010-01-25 20:05:08 +00001242VOID
jcarsey94b17fa2009-05-07 18:46:18 +00001243EFIAPI
1244ShellSetPageBreakMode (
1245 IN BOOLEAN CurrentState
1246 )
1247{
1248 //
1249 // check for enabling
1250 //
1251 if (CurrentState != 0x00) {
jcarsey1e6e84c2010-01-25 20:05:08 +00001252 //
jcarsey94b17fa2009-05-07 18:46:18 +00001253 // check for UEFI Shell 2.0
1254 //
jcarsey366f81a2011-06-27 21:04:22 +00001255 if (gEfiShellProtocol != NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +00001256 //
1257 // Enable with UEFI 2.0 Shell
1258 //
jcarsey366f81a2011-06-27 21:04:22 +00001259 gEfiShellProtocol->EnablePageBreak();
jcarsey94b17fa2009-05-07 18:46:18 +00001260 return;
1261 } else {
jcarsey1e6e84c2010-01-25 20:05:08 +00001262 //
jcarsey92a54472011-06-27 20:33:13 +00001263 // Check for EFI shell
jcarsey94b17fa2009-05-07 18:46:18 +00001264 //
jcarsey92a54472011-06-27 20:33:13 +00001265 if (mEfiShellEnvironment2 != NULL) {
1266 //
1267 // Enable with EFI Shell
1268 //
1269 mEfiShellEnvironment2->EnablePageBreak (DEFAULT_INIT_ROW, DEFAULT_AUTO_LF);
1270 return;
1271 }
jcarsey94b17fa2009-05-07 18:46:18 +00001272 }
1273 } else {
jcarsey1e6e84c2010-01-25 20:05:08 +00001274 //
jcarsey94b17fa2009-05-07 18:46:18 +00001275 // check for UEFI Shell 2.0
1276 //
jcarsey366f81a2011-06-27 21:04:22 +00001277 if (gEfiShellProtocol != NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +00001278 //
1279 // Disable with UEFI 2.0 Shell
1280 //
jcarsey366f81a2011-06-27 21:04:22 +00001281 gEfiShellProtocol->DisablePageBreak();
jcarsey94b17fa2009-05-07 18:46:18 +00001282 return;
1283 } else {
jcarsey1e6e84c2010-01-25 20:05:08 +00001284 //
jcarsey92a54472011-06-27 20:33:13 +00001285 // Check for EFI shell
jcarsey94b17fa2009-05-07 18:46:18 +00001286 //
jcarsey92a54472011-06-27 20:33:13 +00001287 if (mEfiShellEnvironment2 != NULL) {
1288 //
1289 // Disable with EFI Shell
1290 //
1291 mEfiShellEnvironment2->DisablePageBreak ();
1292 return;
1293 }
jcarsey94b17fa2009-05-07 18:46:18 +00001294 }
1295 }
1296}
1297
1298///
1299/// version of EFI_SHELL_FILE_INFO struct, except has no CONST pointers.
1300/// This allows for the struct to be populated.
1301///
1302typedef struct {
jcarseyd2b45642009-05-11 18:02:16 +00001303 LIST_ENTRY Link;
jcarsey94b17fa2009-05-07 18:46:18 +00001304 EFI_STATUS Status;
1305 CHAR16 *FullName;
1306 CHAR16 *FileName;
jcarseya405b862010-09-14 05:18:09 +00001307 SHELL_FILE_HANDLE Handle;
jcarsey94b17fa2009-05-07 18:46:18 +00001308 EFI_FILE_INFO *Info;
1309} EFI_SHELL_FILE_INFO_NO_CONST;
1310
1311/**
1312 Converts a EFI shell list of structures to the coresponding UEFI Shell 2.0 type of list.
1313
1314 if OldStyleFileList is NULL then ASSERT()
1315
jcarsey1e6e84c2010-01-25 20:05:08 +00001316 this function will convert a SHELL_FILE_ARG based list into a callee allocated
jcarsey94b17fa2009-05-07 18:46:18 +00001317 EFI_SHELL_FILE_INFO based list. it is up to the caller to free the memory via
1318 the ShellCloseFileMetaArg function.
1319
ydong104ff7e372011-09-02 08:05:34 +00001320 @param[in] FileList the EFI shell list type
1321 @param[in, out] ListHead the list to add to
jcarsey94b17fa2009-05-07 18:46:18 +00001322
1323 @retval the resultant head of the double linked new format list;
1324**/
1325LIST_ENTRY*
1326EFIAPI
1327InternalShellConvertFileListType (
jcarsey9b3bf082009-06-23 21:15:07 +00001328 IN LIST_ENTRY *FileList,
1329 IN OUT LIST_ENTRY *ListHead
jcarsey125c2cf2009-11-18 21:36:50 +00001330 )
1331{
jcarsey94b17fa2009-05-07 18:46:18 +00001332 SHELL_FILE_ARG *OldInfo;
jcarsey9b3bf082009-06-23 21:15:07 +00001333 LIST_ENTRY *Link;
jcarsey94b17fa2009-05-07 18:46:18 +00001334 EFI_SHELL_FILE_INFO_NO_CONST *NewInfo;
1335
1336 //
jcarsey9b3bf082009-06-23 21:15:07 +00001337 // ASSERTs
jcarsey94b17fa2009-05-07 18:46:18 +00001338 //
jcarsey9b3bf082009-06-23 21:15:07 +00001339 ASSERT(FileList != NULL);
1340 ASSERT(ListHead != NULL);
jcarsey94b17fa2009-05-07 18:46:18 +00001341
1342 //
1343 // enumerate through each member of the old list and copy
1344 //
jcarseyd2b45642009-05-11 18:02:16 +00001345 for (Link = FileList->ForwardLink; Link != FileList; Link = Link->ForwardLink) {
jcarsey94b17fa2009-05-07 18:46:18 +00001346 OldInfo = CR (Link, SHELL_FILE_ARG, Link, SHELL_FILE_ARG_SIGNATURE);
jcarseya405b862010-09-14 05:18:09 +00001347 ASSERT(OldInfo != NULL);
1348
1349 //
1350 // Skip ones that failed to open...
1351 //
1352 if (OldInfo->Status != EFI_SUCCESS) {
1353 continue;
1354 }
jcarsey94b17fa2009-05-07 18:46:18 +00001355
1356 //
1357 // make sure the old list was valid
1358 //
jcarsey94b17fa2009-05-07 18:46:18 +00001359 ASSERT(OldInfo->Info != NULL);
1360 ASSERT(OldInfo->FullName != NULL);
1361 ASSERT(OldInfo->FileName != NULL);
1362
1363 //
1364 // allocate a new EFI_SHELL_FILE_INFO object
1365 //
1366 NewInfo = AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
jcarseyc9d92df2010-02-03 15:37:54 +00001367 if (NewInfo == NULL) {
jcarsey7a95efd2011-10-13 16:08:18 +00001368 ShellCloseFileMetaArg((EFI_SHELL_FILE_INFO**)(&ListHead));
jcarseybeab0fc2011-10-10 17:26:25 +00001369 ListHead = NULL;
jcarseyc9d92df2010-02-03 15:37:54 +00001370 break;
1371 }
jcarsey1e6e84c2010-01-25 20:05:08 +00001372
1373 //
jcarsey94b17fa2009-05-07 18:46:18 +00001374 // copy the simple items
1375 //
1376 NewInfo->Handle = OldInfo->Handle;
1377 NewInfo->Status = OldInfo->Status;
1378
jcarseyd2b45642009-05-11 18:02:16 +00001379 // old shell checks for 0 not NULL
1380 OldInfo->Handle = 0;
1381
jcarsey94b17fa2009-05-07 18:46:18 +00001382 //
1383 // allocate new space to copy strings and structure
1384 //
1385 NewInfo->FullName = AllocateZeroPool(StrSize(OldInfo->FullName));
1386 NewInfo->FileName = AllocateZeroPool(StrSize(OldInfo->FileName));
1387 NewInfo->Info = AllocateZeroPool((UINTN)OldInfo->Info->Size);
jcarsey1e6e84c2010-01-25 20:05:08 +00001388
jcarsey94b17fa2009-05-07 18:46:18 +00001389 //
1390 // make sure all the memory allocations were sucessful
1391 //
jcarseybeab0fc2011-10-10 17:26:25 +00001392 if (NULL == NewInfo->FullName || NewInfo->FileName == NULL || NewInfo->Info == NULL) {
jcarsey7a95efd2011-10-13 16:08:18 +00001393 ShellCloseFileMetaArg((EFI_SHELL_FILE_INFO**)(&ListHead));
jcarseybeab0fc2011-10-10 17:26:25 +00001394 ListHead = NULL;
1395 break;
1396 }
jcarsey94b17fa2009-05-07 18:46:18 +00001397
1398 //
1399 // Copt the strings and structure
1400 //
1401 StrCpy(NewInfo->FullName, OldInfo->FullName);
1402 StrCpy(NewInfo->FileName, OldInfo->FileName);
1403 gBS->CopyMem (NewInfo->Info, OldInfo->Info, (UINTN)OldInfo->Info->Size);
1404
1405 //
1406 // add that to the list
1407 //
jcarsey9b3bf082009-06-23 21:15:07 +00001408 InsertTailList(ListHead, &NewInfo->Link);
jcarsey94b17fa2009-05-07 18:46:18 +00001409 }
1410 return (ListHead);
1411}
1412/**
1413 Opens a group of files based on a path.
1414
jcarsey1e6e84c2010-01-25 20:05:08 +00001415 This function uses the Arg to open all the matching files. Each matched
1416 file has a SHELL_FILE_ARG structure to record the file information. These
1417 structures are placed on the list ListHead. Users can get the SHELL_FILE_ARG
jcarsey94b17fa2009-05-07 18:46:18 +00001418 structures from ListHead to access each file. This function supports wildcards
jcarsey1e6e84c2010-01-25 20:05:08 +00001419 and will process '?' and '*' as such. the list must be freed with a call to
jcarsey94b17fa2009-05-07 18:46:18 +00001420 ShellCloseFileMetaArg().
1421
jcarsey1e6e84c2010-01-25 20:05:08 +00001422 If you are NOT appending to an existing list *ListHead must be NULL. If
jcarsey5f7431d2009-07-10 18:06:01 +00001423 *ListHead is NULL then it must be callee freed.
jcarsey94b17fa2009-05-07 18:46:18 +00001424
1425 @param Arg pointer to path string
1426 @param OpenMode mode to open files with
1427 @param ListHead head of linked list of results
1428
jcarsey1e6e84c2010-01-25 20:05:08 +00001429 @retval EFI_SUCCESS the operation was sucessful and the list head
jcarsey94b17fa2009-05-07 18:46:18 +00001430 contains the list of opened files
jcarsey94b17fa2009-05-07 18:46:18 +00001431 @return != EFI_SUCCESS the operation failed
1432
1433 @sa InternalShellConvertFileListType
1434**/
1435EFI_STATUS
1436EFIAPI
1437ShellOpenFileMetaArg (
1438 IN CHAR16 *Arg,
1439 IN UINT64 OpenMode,
1440 IN OUT EFI_SHELL_FILE_INFO **ListHead
1441 )
1442{
1443 EFI_STATUS Status;
jcarsey9b3bf082009-06-23 21:15:07 +00001444 LIST_ENTRY mOldStyleFileList;
jcarsey1e6e84c2010-01-25 20:05:08 +00001445
jcarsey94b17fa2009-05-07 18:46:18 +00001446 //
1447 // ASSERT that Arg and ListHead are not NULL
1448 //
1449 ASSERT(Arg != NULL);
1450 ASSERT(ListHead != NULL);
1451
jcarsey1e6e84c2010-01-25 20:05:08 +00001452 //
jcarsey94b17fa2009-05-07 18:46:18 +00001453 // Check for UEFI Shell 2.0 protocols
1454 //
jcarsey366f81a2011-06-27 21:04:22 +00001455 if (gEfiShellProtocol != NULL) {
jcarsey5f7431d2009-07-10 18:06:01 +00001456 if (*ListHead == NULL) {
1457 *ListHead = (EFI_SHELL_FILE_INFO*)AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
1458 if (*ListHead == NULL) {
1459 return (EFI_OUT_OF_RESOURCES);
1460 }
1461 InitializeListHead(&((*ListHead)->Link));
jcarsey1e6e84c2010-01-25 20:05:08 +00001462 }
jcarsey366f81a2011-06-27 21:04:22 +00001463 Status = gEfiShellProtocol->OpenFileList(Arg,
jcarsey1e6e84c2010-01-25 20:05:08 +00001464 OpenMode,
jcarsey2247dde2009-11-09 18:08:58 +00001465 ListHead);
1466 if (EFI_ERROR(Status)) {
jcarsey366f81a2011-06-27 21:04:22 +00001467 gEfiShellProtocol->RemoveDupInFileList(ListHead);
jcarsey2247dde2009-11-09 18:08:58 +00001468 } else {
jcarsey366f81a2011-06-27 21:04:22 +00001469 Status = gEfiShellProtocol->RemoveDupInFileList(ListHead);
jcarsey2247dde2009-11-09 18:08:58 +00001470 }
jcarseya405b862010-09-14 05:18:09 +00001471 if (*ListHead != NULL && IsListEmpty(&(*ListHead)->Link)) {
1472 FreePool(*ListHead);
1473 *ListHead = NULL;
1474 return (EFI_NOT_FOUND);
1475 }
jcarsey2247dde2009-11-09 18:08:58 +00001476 return (Status);
jcarsey1e6e84c2010-01-25 20:05:08 +00001477 }
jcarsey94b17fa2009-05-07 18:46:18 +00001478
1479 //
jcarsey92a54472011-06-27 20:33:13 +00001480 // Check for EFI shell
jcarsey94b17fa2009-05-07 18:46:18 +00001481 //
jcarsey92a54472011-06-27 20:33:13 +00001482 if (mEfiShellEnvironment2 != NULL) {
1483 //
1484 // make sure the list head is initialized
1485 //
1486 InitializeListHead(&mOldStyleFileList);
jcarsey94b17fa2009-05-07 18:46:18 +00001487
jcarsey92a54472011-06-27 20:33:13 +00001488 //
1489 // Get the EFI Shell list of files
1490 //
1491 Status = mEfiShellEnvironment2->FileMetaArg(Arg, &mOldStyleFileList);
1492 if (EFI_ERROR(Status)) {
1493 *ListHead = NULL;
1494 return (Status);
1495 }
jcarsey94b17fa2009-05-07 18:46:18 +00001496
jcarsey92a54472011-06-27 20:33:13 +00001497 if (*ListHead == NULL) {
1498 *ListHead = (EFI_SHELL_FILE_INFO *)AllocateZeroPool(sizeof(EFI_SHELL_FILE_INFO));
1499 if (*ListHead == NULL) {
1500 return (EFI_OUT_OF_RESOURCES);
1501 }
1502 InitializeListHead(&((*ListHead)->Link));
1503 }
1504
1505 //
1506 // Convert that to equivalent of UEFI Shell 2.0 structure
1507 //
1508 InternalShellConvertFileListType(&mOldStyleFileList, &(*ListHead)->Link);
1509
1510 //
1511 // Free the EFI Shell version that was converted.
1512 //
1513 mEfiShellEnvironment2->FreeFileList(&mOldStyleFileList);
1514
1515 if ((*ListHead)->Link.ForwardLink == (*ListHead)->Link.BackLink && (*ListHead)->Link.BackLink == &((*ListHead)->Link)) {
1516 FreePool(*ListHead);
1517 *ListHead = NULL;
1518 Status = EFI_NOT_FOUND;
1519 }
jcarsey94b17fa2009-05-07 18:46:18 +00001520 return (Status);
1521 }
1522
jcarsey92a54472011-06-27 20:33:13 +00001523 return (EFI_UNSUPPORTED);
jcarsey94b17fa2009-05-07 18:46:18 +00001524}
1525/**
jcarseya405b862010-09-14 05:18:09 +00001526 Free the linked list returned from ShellOpenFileMetaArg.
jcarsey94b17fa2009-05-07 18:46:18 +00001527
jcarseya405b862010-09-14 05:18:09 +00001528 if ListHead is NULL then ASSERT().
jcarsey94b17fa2009-05-07 18:46:18 +00001529
jcarseya405b862010-09-14 05:18:09 +00001530 @param ListHead the pointer to free.
jcarsey94b17fa2009-05-07 18:46:18 +00001531
jcarseya405b862010-09-14 05:18:09 +00001532 @retval EFI_SUCCESS the operation was sucessful.
jcarsey94b17fa2009-05-07 18:46:18 +00001533**/
1534EFI_STATUS
1535EFIAPI
1536ShellCloseFileMetaArg (
1537 IN OUT EFI_SHELL_FILE_INFO **ListHead
1538 )
1539{
1540 LIST_ENTRY *Node;
1541
1542 //
1543 // ASSERT that ListHead is not NULL
1544 //
1545 ASSERT(ListHead != NULL);
1546
jcarsey1e6e84c2010-01-25 20:05:08 +00001547 //
jcarsey94b17fa2009-05-07 18:46:18 +00001548 // Check for UEFI Shell 2.0 protocols
1549 //
jcarsey366f81a2011-06-27 21:04:22 +00001550 if (gEfiShellProtocol != NULL) {
1551 return (gEfiShellProtocol->FreeFileList(ListHead));
jcarsey92a54472011-06-27 20:33:13 +00001552 } else if (mEfiShellEnvironment2 != NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +00001553 //
jcarsey1e6e84c2010-01-25 20:05:08 +00001554 // Since this is EFI Shell version we need to free our internally made copy
jcarsey94b17fa2009-05-07 18:46:18 +00001555 // of the list
1556 //
jcarsey1e6e84c2010-01-25 20:05:08 +00001557 for ( Node = GetFirstNode(&(*ListHead)->Link)
jcarseya405b862010-09-14 05:18:09 +00001558 ; *ListHead != NULL && !IsListEmpty(&(*ListHead)->Link)
jcarsey9b3bf082009-06-23 21:15:07 +00001559 ; Node = GetFirstNode(&(*ListHead)->Link)) {
jcarsey94b17fa2009-05-07 18:46:18 +00001560 RemoveEntryList(Node);
jcarseya405b862010-09-14 05:18:09 +00001561 ((EFI_FILE_PROTOCOL*)((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Handle)->Close(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Handle);
jcarsey94b17fa2009-05-07 18:46:18 +00001562 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->FullName);
1563 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->FileName);
1564 FreePool(((EFI_SHELL_FILE_INFO_NO_CONST*)Node)->Info);
1565 FreePool((EFI_SHELL_FILE_INFO_NO_CONST*)Node);
1566 }
1567 return EFI_SUCCESS;
1568 }
jcarsey92a54472011-06-27 20:33:13 +00001569
1570 return (EFI_UNSUPPORTED);
jcarsey94b17fa2009-05-07 18:46:18 +00001571}
1572
jcarsey125c2cf2009-11-18 21:36:50 +00001573/**
1574 Find a file by searching the CWD and then the path.
1575
jcarseyb3011f42010-01-11 21:49:04 +00001576 If FileName is NULL then ASSERT.
jcarsey125c2cf2009-11-18 21:36:50 +00001577
jcarseyb3011f42010-01-11 21:49:04 +00001578 If the return value is not NULL then the memory must be caller freed.
jcarsey125c2cf2009-11-18 21:36:50 +00001579
1580 @param FileName Filename string.
1581
1582 @retval NULL the file was not found
1583 @return !NULL the full path to the file.
1584**/
1585CHAR16 *
1586EFIAPI
1587ShellFindFilePath (
1588 IN CONST CHAR16 *FileName
1589 )
1590{
1591 CONST CHAR16 *Path;
jcarseya405b862010-09-14 05:18:09 +00001592 SHELL_FILE_HANDLE Handle;
jcarsey125c2cf2009-11-18 21:36:50 +00001593 EFI_STATUS Status;
1594 CHAR16 *RetVal;
1595 CHAR16 *TestPath;
1596 CONST CHAR16 *Walker;
jcarsey36a9d672009-11-20 21:13:41 +00001597 UINTN Size;
jcarsey1cd45e72010-01-29 15:07:44 +00001598 CHAR16 *TempChar;
jcarsey125c2cf2009-11-18 21:36:50 +00001599
1600 RetVal = NULL;
1601
jcarseya405b862010-09-14 05:18:09 +00001602 //
1603 // First make sure its not an absolute path.
1604 //
1605 Status = ShellOpenFileByName(FileName, &Handle, EFI_FILE_MODE_READ, 0);
1606 if (!EFI_ERROR(Status)){
1607 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1608 ASSERT(RetVal == NULL);
1609 RetVal = StrnCatGrow(&RetVal, NULL, FileName, 0);
1610 ShellCloseFile(&Handle);
1611 return (RetVal);
1612 } else {
1613 ShellCloseFile(&Handle);
1614 }
1615 }
1616
jcarsey125c2cf2009-11-18 21:36:50 +00001617 Path = ShellGetEnvironmentVariable(L"cwd");
1618 if (Path != NULL) {
jcarsey36a9d672009-11-20 21:13:41 +00001619 Size = StrSize(Path);
1620 Size += StrSize(FileName);
1621 TestPath = AllocateZeroPool(Size);
jcarseyc9d92df2010-02-03 15:37:54 +00001622 if (TestPath == NULL) {
1623 return (NULL);
1624 }
jcarsey125c2cf2009-11-18 21:36:50 +00001625 StrCpy(TestPath, Path);
1626 StrCat(TestPath, FileName);
1627 Status = ShellOpenFileByName(TestPath, &Handle, EFI_FILE_MODE_READ, 0);
1628 if (!EFI_ERROR(Status)){
jcarseya405b862010-09-14 05:18:09 +00001629 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1630 ASSERT(RetVal == NULL);
1631 RetVal = StrnCatGrow(&RetVal, NULL, TestPath, 0);
1632 ShellCloseFile(&Handle);
1633 FreePool(TestPath);
1634 return (RetVal);
1635 } else {
1636 ShellCloseFile(&Handle);
1637 }
jcarsey125c2cf2009-11-18 21:36:50 +00001638 }
1639 FreePool(TestPath);
1640 }
1641 Path = ShellGetEnvironmentVariable(L"path");
1642 if (Path != NULL) {
jcarseya405b862010-09-14 05:18:09 +00001643 Size = StrSize(Path)+sizeof(CHAR16);
jcarsey36a9d672009-11-20 21:13:41 +00001644 Size += StrSize(FileName);
1645 TestPath = AllocateZeroPool(Size);
jcarsey3e082d52010-10-04 16:44:57 +00001646 if (TestPath == NULL) {
1647 return (NULL);
1648 }
jcarsey1e6e84c2010-01-25 20:05:08 +00001649 Walker = (CHAR16*)Path;
jcarsey125c2cf2009-11-18 21:36:50 +00001650 do {
1651 CopyMem(TestPath, Walker, StrSize(Walker));
jcarsey3e082d52010-10-04 16:44:57 +00001652 if (TestPath != NULL) {
1653 TempChar = StrStr(TestPath, L";");
1654 if (TempChar != NULL) {
1655 *TempChar = CHAR_NULL;
1656 }
1657 if (TestPath[StrLen(TestPath)-1] != L'\\') {
1658 StrCat(TestPath, L"\\");
1659 }
jcarsey89e85372011-04-13 23:37:50 +00001660 if (FileName[0] == L'\\') {
1661 FileName++;
1662 }
jcarsey3e082d52010-10-04 16:44:57 +00001663 StrCat(TestPath, FileName);
1664 if (StrStr(Walker, L";") != NULL) {
1665 Walker = StrStr(Walker, L";") + 1;
jcarseya405b862010-09-14 05:18:09 +00001666 } else {
jcarsey3e082d52010-10-04 16:44:57 +00001667 Walker = NULL;
1668 }
1669 Status = ShellOpenFileByName(TestPath, &Handle, EFI_FILE_MODE_READ, 0);
1670 if (!EFI_ERROR(Status)){
1671 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
1672 ASSERT(RetVal == NULL);
1673 RetVal = StrnCatGrow(&RetVal, NULL, TestPath, 0);
1674 ShellCloseFile(&Handle);
1675 break;
1676 } else {
1677 ShellCloseFile(&Handle);
1678 }
jcarseya405b862010-09-14 05:18:09 +00001679 }
jcarsey125c2cf2009-11-18 21:36:50 +00001680 }
1681 } while (Walker != NULL && Walker[0] != CHAR_NULL);
1682 FreePool(TestPath);
1683 }
1684 return (RetVal);
1685}
1686
jcarseyb3011f42010-01-11 21:49:04 +00001687/**
jcarsey1e6e84c2010-01-25 20:05:08 +00001688 Find a file by searching the CWD and then the path with a variable set of file
1689 extensions. If the file is not found it will append each extension in the list
jcarseyb3011f42010-01-11 21:49:04 +00001690 in the order provided and return the first one that is successful.
1691
1692 If FileName is NULL, then ASSERT.
1693 If FileExtension is NULL, then behavior is identical to ShellFindFilePath.
1694
1695 If the return value is not NULL then the memory must be caller freed.
1696
1697 @param[in] FileName Filename string.
1698 @param[in] FileExtension Semi-colon delimeted list of possible extensions.
1699
1700 @retval NULL The file was not found.
1701 @retval !NULL The path to the file.
1702**/
1703CHAR16 *
1704EFIAPI
1705ShellFindFilePathEx (
1706 IN CONST CHAR16 *FileName,
1707 IN CONST CHAR16 *FileExtension
1708 )
1709{
1710 CHAR16 *TestPath;
1711 CHAR16 *RetVal;
1712 CONST CHAR16 *ExtensionWalker;
jcarsey9e926b62010-01-14 20:26:39 +00001713 UINTN Size;
jcarsey1cd45e72010-01-29 15:07:44 +00001714 CHAR16 *TempChar;
jcarseyc9d92df2010-02-03 15:37:54 +00001715 CHAR16 *TempChar2;
jcarsey1cd45e72010-01-29 15:07:44 +00001716
jcarseyb3011f42010-01-11 21:49:04 +00001717 ASSERT(FileName != NULL);
1718 if (FileExtension == NULL) {
1719 return (ShellFindFilePath(FileName));
1720 }
1721 RetVal = ShellFindFilePath(FileName);
1722 if (RetVal != NULL) {
1723 return (RetVal);
1724 }
jcarsey9e926b62010-01-14 20:26:39 +00001725 Size = StrSize(FileName);
1726 Size += StrSize(FileExtension);
1727 TestPath = AllocateZeroPool(Size);
jcarseyc9d92df2010-02-03 15:37:54 +00001728 if (TestPath == NULL) {
1729 return (NULL);
1730 }
jcarseya405b862010-09-14 05:18:09 +00001731 for (ExtensionWalker = FileExtension, TempChar2 = (CHAR16*)FileExtension; TempChar2 != NULL ; ExtensionWalker = TempChar2 + 1){
jcarseyb3011f42010-01-11 21:49:04 +00001732 StrCpy(TestPath, FileName);
jcarseya405b862010-09-14 05:18:09 +00001733 if (ExtensionWalker != NULL) {
1734 StrCat(TestPath, ExtensionWalker);
1735 }
jcarsey1cd45e72010-01-29 15:07:44 +00001736 TempChar = StrStr(TestPath, L";");
1737 if (TempChar != NULL) {
1738 *TempChar = CHAR_NULL;
jcarseyb3011f42010-01-11 21:49:04 +00001739 }
1740 RetVal = ShellFindFilePath(TestPath);
1741 if (RetVal != NULL) {
1742 break;
1743 }
jcarseya405b862010-09-14 05:18:09 +00001744 ASSERT(ExtensionWalker != NULL);
jcarseyc9d92df2010-02-03 15:37:54 +00001745 TempChar2 = StrStr(ExtensionWalker, L";");
jcarseyb3011f42010-01-11 21:49:04 +00001746 }
1747 FreePool(TestPath);
1748 return (RetVal);
1749}
1750
jcarsey94b17fa2009-05-07 18:46:18 +00001751typedef struct {
jcarsey9b3bf082009-06-23 21:15:07 +00001752 LIST_ENTRY Link;
jcarsey94b17fa2009-05-07 18:46:18 +00001753 CHAR16 *Name;
jcarseya405b862010-09-14 05:18:09 +00001754 SHELL_PARAM_TYPE Type;
jcarsey94b17fa2009-05-07 18:46:18 +00001755 CHAR16 *Value;
1756 UINTN OriginalPosition;
1757} SHELL_PARAM_PACKAGE;
1758
1759/**
jcarsey1e6e84c2010-01-25 20:05:08 +00001760 Checks the list of valid arguments and returns TRUE if the item was found. If the
jcarsey94b17fa2009-05-07 18:46:18 +00001761 return value is TRUE then the type parameter is set also.
jcarsey1e6e84c2010-01-25 20:05:08 +00001762
jcarsey94b17fa2009-05-07 18:46:18 +00001763 if CheckList is NULL then ASSERT();
1764 if Name is NULL then ASSERT();
1765 if Type is NULL then ASSERT();
1766
jcarsey94b17fa2009-05-07 18:46:18 +00001767 @param Name pointer to Name of parameter found
1768 @param CheckList List to check against
jcarseya405b862010-09-14 05:18:09 +00001769 @param Type pointer to type of parameter if it was found
jcarsey94b17fa2009-05-07 18:46:18 +00001770
1771 @retval TRUE the Parameter was found. Type is valid.
1772 @retval FALSE the Parameter was not found. Type is not valid.
1773**/
1774BOOLEAN
1775EFIAPI
jcarseyd2b45642009-05-11 18:02:16 +00001776InternalIsOnCheckList (
jcarsey94b17fa2009-05-07 18:46:18 +00001777 IN CONST CHAR16 *Name,
1778 IN CONST SHELL_PARAM_ITEM *CheckList,
jcarsey252d9452011-03-25 20:49:53 +00001779 OUT SHELL_PARAM_TYPE *Type
jcarseya405b862010-09-14 05:18:09 +00001780 )
1781{
jcarsey94b17fa2009-05-07 18:46:18 +00001782 SHELL_PARAM_ITEM *TempListItem;
jcarsey252d9452011-03-25 20:49:53 +00001783 CHAR16 *TempString;
jcarsey94b17fa2009-05-07 18:46:18 +00001784
1785 //
1786 // ASSERT that all 3 pointer parameters aren't NULL
1787 //
1788 ASSERT(CheckList != NULL);
1789 ASSERT(Type != NULL);
1790 ASSERT(Name != NULL);
1791
1792 //
jcarseyd2b45642009-05-11 18:02:16 +00001793 // question mark and page break mode are always supported
1794 //
1795 if ((StrCmp(Name, L"-?") == 0) ||
1796 (StrCmp(Name, L"-b") == 0)
jcarseya405b862010-09-14 05:18:09 +00001797 ) {
jcarsey252d9452011-03-25 20:49:53 +00001798 *Type = TypeFlag;
jcarseyd2b45642009-05-11 18:02:16 +00001799 return (TRUE);
1800 }
1801
1802 //
jcarsey94b17fa2009-05-07 18:46:18 +00001803 // Enumerate through the list
1804 //
1805 for (TempListItem = (SHELL_PARAM_ITEM*)CheckList ; TempListItem->Name != NULL ; TempListItem++) {
1806 //
jcarsey9eb53ac2009-07-08 17:26:58 +00001807 // If the Type is TypeStart only check the first characters of the passed in param
1808 // If it matches set the type and return TRUE
jcarsey94b17fa2009-05-07 18:46:18 +00001809 //
jcarsey252d9452011-03-25 20:49:53 +00001810 if (TempListItem->Type == TypeStart) {
1811 if (StrnCmp(Name, TempListItem->Name, StrLen(TempListItem->Name)) == 0) {
1812 *Type = TempListItem->Type;
1813 return (TRUE);
1814 }
1815 TempString = NULL;
1816 TempString = StrnCatGrow(&TempString, NULL, Name, StrLen(TempListItem->Name));
1817 if (TempString != NULL) {
1818 if (StringNoCaseCompare(&TempString, &TempListItem->Name) == 0) {
1819 *Type = TempListItem->Type;
1820 FreePool(TempString);
1821 return (TRUE);
1822 }
1823 FreePool(TempString);
1824 }
1825 } else if (StringNoCaseCompare(&Name, &TempListItem->Name) == 0) {
jcarsey94b17fa2009-05-07 18:46:18 +00001826 *Type = TempListItem->Type;
1827 return (TRUE);
1828 }
1829 }
jcarsey2247dde2009-11-09 18:08:58 +00001830
jcarsey94b17fa2009-05-07 18:46:18 +00001831 return (FALSE);
1832}
1833/**
jcarseyd2b45642009-05-11 18:02:16 +00001834 Checks the string for indicators of "flag" status. this is a leading '/', '-', or '+'
jcarsey94b17fa2009-05-07 18:46:18 +00001835
jcarseya405b862010-09-14 05:18:09 +00001836 @param[in] Name pointer to Name of parameter found
1837 @param[in] AlwaysAllowNumbers TRUE to allow numbers, FALSE to not.
jcarsey94b17fa2009-05-07 18:46:18 +00001838
1839 @retval TRUE the Parameter is a flag.
jcarseya405b862010-09-14 05:18:09 +00001840 @retval FALSE the Parameter not a flag.
jcarsey94b17fa2009-05-07 18:46:18 +00001841**/
1842BOOLEAN
1843EFIAPI
jcarseyd2b45642009-05-11 18:02:16 +00001844InternalIsFlag (
jcarsey2247dde2009-11-09 18:08:58 +00001845 IN CONST CHAR16 *Name,
1846 IN BOOLEAN AlwaysAllowNumbers
jcarsey94b17fa2009-05-07 18:46:18 +00001847 )
1848{
1849 //
1850 // ASSERT that Name isn't NULL
1851 //
1852 ASSERT(Name != NULL);
1853
1854 //
jcarsey2247dde2009-11-09 18:08:58 +00001855 // If we accept numbers then dont return TRUE. (they will be values)
1856 //
jcarseya405b862010-09-14 05:18:09 +00001857 if (((Name[0] == L'-' || Name[0] == L'+') && ShellIsHexaDecimalDigitCharacter(Name[1])) && AlwaysAllowNumbers) {
jcarsey2247dde2009-11-09 18:08:58 +00001858 return (FALSE);
1859 }
1860
1861 //
jcarseya405b862010-09-14 05:18:09 +00001862 // If the Name has a /, +, or - as the first character return TRUE
jcarsey94b17fa2009-05-07 18:46:18 +00001863 //
jcarsey1e6e84c2010-01-25 20:05:08 +00001864 if ((Name[0] == L'/') ||
jcarseyd2b45642009-05-11 18:02:16 +00001865 (Name[0] == L'-') ||
1866 (Name[0] == L'+')
jcarseya405b862010-09-14 05:18:09 +00001867 ) {
jcarsey94b17fa2009-05-07 18:46:18 +00001868 return (TRUE);
1869 }
1870 return (FALSE);
1871}
1872
1873/**
jcarsey1e6e84c2010-01-25 20:05:08 +00001874 Checks the command line arguments passed against the list of valid ones.
jcarsey94b17fa2009-05-07 18:46:18 +00001875
1876 If no initialization is required, then return RETURN_SUCCESS.
jcarsey1e6e84c2010-01-25 20:05:08 +00001877
jcarseya405b862010-09-14 05:18:09 +00001878 @param[in] CheckList pointer to list of parameters to check
1879 @param[out] CheckPackage pointer to pointer to list checked values
1880 @param[out] ProblemParam optional pointer to pointer to unicode string for
jcarseyd2b45642009-05-11 18:02:16 +00001881 the paramater that caused failure. If used then the
1882 caller is responsible for freeing the memory.
jcarseya405b862010-09-14 05:18:09 +00001883 @param[in] AutoPageBreak will automatically set PageBreakEnabled for "b" parameter
1884 @param[in] Argv pointer to array of parameters
1885 @param[in] Argc Count of parameters in Argv
1886 @param[in] AlwaysAllowNumbers TRUE to allow numbers always, FALSE otherwise.
jcarsey94b17fa2009-05-07 18:46:18 +00001887
1888 @retval EFI_SUCCESS The operation completed sucessfully.
1889 @retval EFI_OUT_OF_RESOURCES A memory allocation failed
1890 @retval EFI_INVALID_PARAMETER A parameter was invalid
jcarsey1e6e84c2010-01-25 20:05:08 +00001891 @retval EFI_VOLUME_CORRUPTED the command line was corrupt. an argument was
1892 duplicated. the duplicated command line argument
jcarsey94b17fa2009-05-07 18:46:18 +00001893 was returned in ProblemParam if provided.
jcarsey1e6e84c2010-01-25 20:05:08 +00001894 @retval EFI_NOT_FOUND a argument required a value that was missing.
jcarsey94b17fa2009-05-07 18:46:18 +00001895 the invalid command line argument was returned in
1896 ProblemParam if provided.
1897**/
1898EFI_STATUS
1899EFIAPI
1900InternalCommandLineParse (
1901 IN CONST SHELL_PARAM_ITEM *CheckList,
1902 OUT LIST_ENTRY **CheckPackage,
1903 OUT CHAR16 **ProblemParam OPTIONAL,
1904 IN BOOLEAN AutoPageBreak,
1905 IN CONST CHAR16 **Argv,
jcarsey2247dde2009-11-09 18:08:58 +00001906 IN UINTN Argc,
1907 IN BOOLEAN AlwaysAllowNumbers
jcarseya405b862010-09-14 05:18:09 +00001908 )
1909{
jcarsey94b17fa2009-05-07 18:46:18 +00001910 UINTN LoopCounter;
jcarsey252d9452011-03-25 20:49:53 +00001911 SHELL_PARAM_TYPE CurrentItemType;
jcarsey94b17fa2009-05-07 18:46:18 +00001912 SHELL_PARAM_PACKAGE *CurrentItemPackage;
jcarsey125c2cf2009-11-18 21:36:50 +00001913 UINTN GetItemValue;
1914 UINTN ValueSize;
jcarseya405b862010-09-14 05:18:09 +00001915 UINTN Count;
jcarsey252d9452011-03-25 20:49:53 +00001916 CONST CHAR16 *TempPointer;
jcarsey94b17fa2009-05-07 18:46:18 +00001917
1918 CurrentItemPackage = NULL;
jcarsey125c2cf2009-11-18 21:36:50 +00001919 GetItemValue = 0;
1920 ValueSize = 0;
jcarseya405b862010-09-14 05:18:09 +00001921 Count = 0;
jcarsey94b17fa2009-05-07 18:46:18 +00001922
1923 //
1924 // If there is only 1 item we dont need to do anything
1925 //
jcarseya405b862010-09-14 05:18:09 +00001926 if (Argc < 1) {
jcarsey94b17fa2009-05-07 18:46:18 +00001927 *CheckPackage = NULL;
1928 return (EFI_SUCCESS);
1929 }
1930
1931 //
jcarsey2247dde2009-11-09 18:08:58 +00001932 // ASSERTs
1933 //
1934 ASSERT(CheckList != NULL);
1935 ASSERT(Argv != NULL);
1936
1937 //
jcarsey94b17fa2009-05-07 18:46:18 +00001938 // initialize the linked list
1939 //
1940 *CheckPackage = (LIST_ENTRY*)AllocateZeroPool(sizeof(LIST_ENTRY));
sfu502a758c2011-10-08 02:55:30 +00001941 if (*CheckPackage == NULL) {
jcarseybeab0fc2011-10-10 17:26:25 +00001942 return (EFI_OUT_OF_RESOURCES);
sfu502a758c2011-10-08 02:55:30 +00001943 }
jcarseybeab0fc2011-10-10 17:26:25 +00001944
jcarsey94b17fa2009-05-07 18:46:18 +00001945 InitializeListHead(*CheckPackage);
1946
1947 //
1948 // loop through each of the arguments
1949 //
1950 for (LoopCounter = 0 ; LoopCounter < Argc ; ++LoopCounter) {
1951 if (Argv[LoopCounter] == NULL) {
1952 //
1953 // do nothing for NULL argv
1954 //
jcarseya405b862010-09-14 05:18:09 +00001955 } else if (InternalIsOnCheckList(Argv[LoopCounter], CheckList, &CurrentItemType)) {
jcarsey94b17fa2009-05-07 18:46:18 +00001956 //
jcarsey2247dde2009-11-09 18:08:58 +00001957 // We might have leftover if last parameter didnt have optional value
1958 //
jcarsey125c2cf2009-11-18 21:36:50 +00001959 if (GetItemValue != 0) {
1960 GetItemValue = 0;
jcarsey2247dde2009-11-09 18:08:58 +00001961 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
1962 }
1963 //
jcarsey94b17fa2009-05-07 18:46:18 +00001964 // this is a flag
1965 //
jcarsey252d9452011-03-25 20:49:53 +00001966 CurrentItemPackage = AllocateZeroPool(sizeof(SHELL_PARAM_PACKAGE));
jcarseybeab0fc2011-10-10 17:26:25 +00001967 if (CurrentItemPackage == NULL) {
1968 ShellCommandLineFreeVarList(*CheckPackage);
1969 *CheckPackage = NULL;
1970 return (EFI_OUT_OF_RESOURCES);
1971 }
jcarsey252d9452011-03-25 20:49:53 +00001972 CurrentItemPackage->Name = AllocateZeroPool(StrSize(Argv[LoopCounter]));
jcarseybeab0fc2011-10-10 17:26:25 +00001973 if (CurrentItemPackage->Name == NULL) {
1974 ShellCommandLineFreeVarList(*CheckPackage);
1975 *CheckPackage = NULL;
1976 return (EFI_OUT_OF_RESOURCES);
1977 }
jcarsey94b17fa2009-05-07 18:46:18 +00001978 StrCpy(CurrentItemPackage->Name, Argv[LoopCounter]);
1979 CurrentItemPackage->Type = CurrentItemType;
1980 CurrentItemPackage->OriginalPosition = (UINTN)(-1);
jcarseyb1f95a02009-06-16 00:23:19 +00001981 CurrentItemPackage->Value = NULL;
jcarsey94b17fa2009-05-07 18:46:18 +00001982
1983 //
1984 // Does this flag require a value
1985 //
jcarsey125c2cf2009-11-18 21:36:50 +00001986 switch (CurrentItemPackage->Type) {
jcarsey94b17fa2009-05-07 18:46:18 +00001987 //
jcarsey125c2cf2009-11-18 21:36:50 +00001988 // possibly trigger the next loop(s) to populate the value of this item
jcarsey1e6e84c2010-01-25 20:05:08 +00001989 //
jcarsey125c2cf2009-11-18 21:36:50 +00001990 case TypeValue:
jcarsey1e6e84c2010-01-25 20:05:08 +00001991 GetItemValue = 1;
jcarsey125c2cf2009-11-18 21:36:50 +00001992 ValueSize = 0;
1993 break;
1994 case TypeDoubleValue:
1995 GetItemValue = 2;
1996 ValueSize = 0;
1997 break;
1998 case TypeMaxValue:
1999 GetItemValue = (UINTN)(-1);
2000 ValueSize = 0;
2001 break;
2002 default:
2003 //
2004 // this item has no value expected; we are done
2005 //
2006 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2007 ASSERT(GetItemValue == 0);
2008 break;
jcarsey94b17fa2009-05-07 18:46:18 +00002009 }
jcarseya405b862010-09-14 05:18:09 +00002010 } else if (GetItemValue != 0 && !InternalIsFlag(Argv[LoopCounter], AlwaysAllowNumbers)) {
jcarseyb1f95a02009-06-16 00:23:19 +00002011 ASSERT(CurrentItemPackage != NULL);
2012 //
jcarsey125c2cf2009-11-18 21:36:50 +00002013 // get the item VALUE for a previous flag
jcarseyb1f95a02009-06-16 00:23:19 +00002014 //
jcarsey125c2cf2009-11-18 21:36:50 +00002015 CurrentItemPackage->Value = ReallocatePool(ValueSize, ValueSize + StrSize(Argv[LoopCounter]) + sizeof(CHAR16), CurrentItemPackage->Value);
jcarseyb1f95a02009-06-16 00:23:19 +00002016 ASSERT(CurrentItemPackage->Value != NULL);
jcarsey125c2cf2009-11-18 21:36:50 +00002017 if (ValueSize == 0) {
2018 StrCpy(CurrentItemPackage->Value, Argv[LoopCounter]);
2019 } else {
2020 StrCat(CurrentItemPackage->Value, L" ");
2021 StrCat(CurrentItemPackage->Value, Argv[LoopCounter]);
2022 }
2023 ValueSize += StrSize(Argv[LoopCounter]) + sizeof(CHAR16);
2024 GetItemValue--;
2025 if (GetItemValue == 0) {
2026 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2027 }
jcarseya405b862010-09-14 05:18:09 +00002028 } else if (!InternalIsFlag(Argv[LoopCounter], AlwaysAllowNumbers) ){ //|| ProblemParam == NULL) {
jcarseyb1f95a02009-06-16 00:23:19 +00002029 //
2030 // add this one as a non-flag
2031 //
jcarsey252d9452011-03-25 20:49:53 +00002032
2033 TempPointer = Argv[LoopCounter];
2034 if ((*TempPointer == L'^' && *(TempPointer+1) == L'-')
2035 || (*TempPointer == L'^' && *(TempPointer+1) == L'/')
2036 || (*TempPointer == L'^' && *(TempPointer+1) == L'+')
2037 ){
2038 TempPointer++;
2039 }
2040 CurrentItemPackage = AllocateZeroPool(sizeof(SHELL_PARAM_PACKAGE));
jcarseybeab0fc2011-10-10 17:26:25 +00002041 if (CurrentItemPackage == NULL) {
2042 ShellCommandLineFreeVarList(*CheckPackage);
2043 *CheckPackage = NULL;
2044 return (EFI_OUT_OF_RESOURCES);
2045 }
jcarseyb1f95a02009-06-16 00:23:19 +00002046 CurrentItemPackage->Name = NULL;
2047 CurrentItemPackage->Type = TypePosition;
jcarsey252d9452011-03-25 20:49:53 +00002048 CurrentItemPackage->Value = AllocateZeroPool(StrSize(TempPointer));
jcarseybeab0fc2011-10-10 17:26:25 +00002049 if (CurrentItemPackage->Value == NULL) {
2050 ShellCommandLineFreeVarList(*CheckPackage);
2051 *CheckPackage = NULL;
2052 return (EFI_OUT_OF_RESOURCES);
2053 }
jcarsey252d9452011-03-25 20:49:53 +00002054 StrCpy(CurrentItemPackage->Value, TempPointer);
jcarseya405b862010-09-14 05:18:09 +00002055 CurrentItemPackage->OriginalPosition = Count++;
jcarsey9b3bf082009-06-23 21:15:07 +00002056 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
jcarsey252d9452011-03-25 20:49:53 +00002057 } else {
jcarsey94b17fa2009-05-07 18:46:18 +00002058 //
2059 // this was a non-recognised flag... error!
2060 //
jcarsey252d9452011-03-25 20:49:53 +00002061 if (ProblemParam != NULL) {
2062 *ProblemParam = AllocateZeroPool(StrSize(Argv[LoopCounter]));
jcarseybeab0fc2011-10-10 17:26:25 +00002063 if (*ProblemParam != NULL) {
2064 StrCpy(*ProblemParam, Argv[LoopCounter]);
2065 }
jcarsey252d9452011-03-25 20:49:53 +00002066 }
jcarsey94b17fa2009-05-07 18:46:18 +00002067 ShellCommandLineFreeVarList(*CheckPackage);
2068 *CheckPackage = NULL;
2069 return (EFI_VOLUME_CORRUPTED);
jcarsey94b17fa2009-05-07 18:46:18 +00002070 }
2071 }
jcarsey125c2cf2009-11-18 21:36:50 +00002072 if (GetItemValue != 0) {
2073 GetItemValue = 0;
2074 InsertHeadList(*CheckPackage, &CurrentItemPackage->Link);
2075 }
jcarsey94b17fa2009-05-07 18:46:18 +00002076 //
2077 // support for AutoPageBreak
2078 //
2079 if (AutoPageBreak && ShellCommandLineGetFlag(*CheckPackage, L"-b")) {
2080 ShellSetPageBreakMode(TRUE);
2081 }
2082 return (EFI_SUCCESS);
2083}
2084
2085/**
jcarsey1e6e84c2010-01-25 20:05:08 +00002086 Checks the command line arguments passed against the list of valid ones.
jcarsey94b17fa2009-05-07 18:46:18 +00002087 Optionally removes NULL values first.
jcarsey1e6e84c2010-01-25 20:05:08 +00002088
jcarsey94b17fa2009-05-07 18:46:18 +00002089 If no initialization is required, then return RETURN_SUCCESS.
jcarsey1e6e84c2010-01-25 20:05:08 +00002090
jcarseya405b862010-09-14 05:18:09 +00002091 @param[in] CheckList The pointer to list of parameters to check.
2092 @param[out] CheckPackage The package of checked values.
2093 @param[out] ProblemParam Optional pointer to pointer to unicode string for
jcarsey94b17fa2009-05-07 18:46:18 +00002094 the paramater that caused failure.
jcarseya405b862010-09-14 05:18:09 +00002095 @param[in] AutoPageBreak Will automatically set PageBreakEnabled.
2096 @param[in] AlwaysAllowNumbers Will never fail for number based flags.
jcarsey94b17fa2009-05-07 18:46:18 +00002097
2098 @retval EFI_SUCCESS The operation completed sucessfully.
jcarseya405b862010-09-14 05:18:09 +00002099 @retval EFI_OUT_OF_RESOURCES A memory allocation failed.
2100 @retval EFI_INVALID_PARAMETER A parameter was invalid.
2101 @retval EFI_VOLUME_CORRUPTED The command line was corrupt.
2102 @retval EFI_DEVICE_ERROR The commands contained 2 opposing arguments. One
jcarsey1e6e84c2010-01-25 20:05:08 +00002103 of the command line arguments was returned in
jcarsey94b17fa2009-05-07 18:46:18 +00002104 ProblemParam if provided.
jcarseya405b862010-09-14 05:18:09 +00002105 @retval EFI_NOT_FOUND A argument required a value that was missing.
2106 The invalid command line argument was returned in
jcarsey94b17fa2009-05-07 18:46:18 +00002107 ProblemParam if provided.
2108**/
2109EFI_STATUS
2110EFIAPI
jcarsey2247dde2009-11-09 18:08:58 +00002111ShellCommandLineParseEx (
jcarsey94b17fa2009-05-07 18:46:18 +00002112 IN CONST SHELL_PARAM_ITEM *CheckList,
2113 OUT LIST_ENTRY **CheckPackage,
2114 OUT CHAR16 **ProblemParam OPTIONAL,
jcarsey2247dde2009-11-09 18:08:58 +00002115 IN BOOLEAN AutoPageBreak,
2116 IN BOOLEAN AlwaysAllowNumbers
jcarseya405b862010-09-14 05:18:09 +00002117 )
2118{
jcarsey1e6e84c2010-01-25 20:05:08 +00002119 //
jcarsey94b17fa2009-05-07 18:46:18 +00002120 // ASSERT that CheckList and CheckPackage aren't NULL
2121 //
2122 ASSERT(CheckList != NULL);
2123 ASSERT(CheckPackage != NULL);
2124
jcarsey1e6e84c2010-01-25 20:05:08 +00002125 //
jcarsey94b17fa2009-05-07 18:46:18 +00002126 // Check for UEFI Shell 2.0 protocols
2127 //
jcarsey366f81a2011-06-27 21:04:22 +00002128 if (gEfiShellParametersProtocol != NULL) {
jcarsey1e6e84c2010-01-25 20:05:08 +00002129 return (InternalCommandLineParse(CheckList,
2130 CheckPackage,
2131 ProblemParam,
2132 AutoPageBreak,
jcarsey366f81a2011-06-27 21:04:22 +00002133 (CONST CHAR16**) gEfiShellParametersProtocol->Argv,
2134 gEfiShellParametersProtocol->Argc,
jcarsey2247dde2009-11-09 18:08:58 +00002135 AlwaysAllowNumbers));
jcarsey94b17fa2009-05-07 18:46:18 +00002136 }
2137
jcarsey1e6e84c2010-01-25 20:05:08 +00002138 //
jcarsey94b17fa2009-05-07 18:46:18 +00002139 // ASSERT That EFI Shell is not required
2140 //
2141 ASSERT (mEfiShellInterface != NULL);
jcarsey1e6e84c2010-01-25 20:05:08 +00002142 return (InternalCommandLineParse(CheckList,
2143 CheckPackage,
2144 ProblemParam,
2145 AutoPageBreak,
jljusten08d7f8e2009-06-15 18:42:13 +00002146 (CONST CHAR16**) mEfiShellInterface->Argv,
jcarsey2247dde2009-11-09 18:08:58 +00002147 mEfiShellInterface->Argc,
2148 AlwaysAllowNumbers));
jcarsey94b17fa2009-05-07 18:46:18 +00002149}
2150
2151/**
2152 Frees shell variable list that was returned from ShellCommandLineParse.
2153
2154 This function will free all the memory that was used for the CheckPackage
2155 list of postprocessed shell arguments.
2156
2157 this function has no return value.
2158
2159 if CheckPackage is NULL, then return
2160
2161 @param CheckPackage the list to de-allocate
2162 **/
2163VOID
2164EFIAPI
2165ShellCommandLineFreeVarList (
2166 IN LIST_ENTRY *CheckPackage
jcarseya405b862010-09-14 05:18:09 +00002167 )
2168{
jcarsey94b17fa2009-05-07 18:46:18 +00002169 LIST_ENTRY *Node;
2170
2171 //
2172 // check for CheckPackage == NULL
2173 //
2174 if (CheckPackage == NULL) {
2175 return;
2176 }
2177
2178 //
2179 // for each node in the list
2180 //
jcarsey9eb53ac2009-07-08 17:26:58 +00002181 for ( Node = GetFirstNode(CheckPackage)
jcarseya405b862010-09-14 05:18:09 +00002182 ; !IsListEmpty(CheckPackage)
jcarsey9eb53ac2009-07-08 17:26:58 +00002183 ; Node = GetFirstNode(CheckPackage)
jcarseya405b862010-09-14 05:18:09 +00002184 ){
jcarsey94b17fa2009-05-07 18:46:18 +00002185 //
2186 // Remove it from the list
2187 //
2188 RemoveEntryList(Node);
2189
2190 //
2191 // if it has a name free the name
2192 //
2193 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
2194 FreePool(((SHELL_PARAM_PACKAGE*)Node)->Name);
2195 }
2196
2197 //
2198 // if it has a value free the value
2199 //
2200 if (((SHELL_PARAM_PACKAGE*)Node)->Value != NULL) {
2201 FreePool(((SHELL_PARAM_PACKAGE*)Node)->Value);
2202 }
jcarsey1e6e84c2010-01-25 20:05:08 +00002203
jcarsey94b17fa2009-05-07 18:46:18 +00002204 //
2205 // free the node structure
2206 //
2207 FreePool((SHELL_PARAM_PACKAGE*)Node);
2208 }
2209 //
2210 // free the list head node
2211 //
2212 FreePool(CheckPackage);
2213}
2214/**
2215 Checks for presence of a flag parameter
2216
2217 flag arguments are in the form of "-<Key>" or "/<Key>", but do not have a value following the key
2218
2219 if CheckPackage is NULL then return FALSE.
2220 if KeyString is NULL then ASSERT()
jcarsey1e6e84c2010-01-25 20:05:08 +00002221
jcarsey94b17fa2009-05-07 18:46:18 +00002222 @param CheckPackage The package of parsed command line arguments
2223 @param KeyString the Key of the command line argument to check for
2224
2225 @retval TRUE the flag is on the command line
2226 @retval FALSE the flag is not on the command line
2227 **/
2228BOOLEAN
2229EFIAPI
2230ShellCommandLineGetFlag (
jcarseya405b862010-09-14 05:18:09 +00002231 IN CONST LIST_ENTRY * CONST CheckPackage,
2232 IN CONST CHAR16 * CONST KeyString
2233 )
2234{
jcarsey94b17fa2009-05-07 18:46:18 +00002235 LIST_ENTRY *Node;
jcarsey252d9452011-03-25 20:49:53 +00002236 CHAR16 *TempString;
jcarsey94b17fa2009-05-07 18:46:18 +00002237
2238 //
ydong100c1950b2011-10-13 02:37:35 +00002239 // return FALSE for no package or KeyString is NULL
jcarsey94b17fa2009-05-07 18:46:18 +00002240 //
ydong100c1950b2011-10-13 02:37:35 +00002241 if (CheckPackage == NULL || KeyString == NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +00002242 return (FALSE);
2243 }
2244
2245 //
2246 // enumerate through the list of parametrs
2247 //
jcarsey1e6e84c2010-01-25 20:05:08 +00002248 for ( Node = GetFirstNode(CheckPackage)
2249 ; !IsNull (CheckPackage, Node)
2250 ; Node = GetNextNode(CheckPackage, Node)
jcarsey252d9452011-03-25 20:49:53 +00002251 ){
jcarsey94b17fa2009-05-07 18:46:18 +00002252 //
2253 // If the Name matches, return TRUE (and there may be NULL name)
2254 //
2255 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
jcarsey9eb53ac2009-07-08 17:26:58 +00002256 //
2257 // If Type is TypeStart then only compare the begining of the strings
2258 //
jcarsey252d9452011-03-25 20:49:53 +00002259 if (((SHELL_PARAM_PACKAGE*)Node)->Type == TypeStart) {
2260 if (StrnCmp(KeyString, ((SHELL_PARAM_PACKAGE*)Node)->Name, StrLen(KeyString)) == 0) {
2261 return (TRUE);
2262 }
2263 TempString = NULL;
2264 TempString = StrnCatGrow(&TempString, NULL, KeyString, StrLen(((SHELL_PARAM_PACKAGE*)Node)->Name));
2265 if (TempString != NULL) {
2266 if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2267 FreePool(TempString);
2268 return (TRUE);
2269 }
2270 FreePool(TempString);
2271 }
2272 } else if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
jcarsey94b17fa2009-05-07 18:46:18 +00002273 return (TRUE);
2274 }
2275 }
2276 }
2277 return (FALSE);
2278}
2279/**
jcarseya405b862010-09-14 05:18:09 +00002280 Returns value from command line argument.
jcarsey94b17fa2009-05-07 18:46:18 +00002281
jcarseya405b862010-09-14 05:18:09 +00002282 Value parameters are in the form of "-<Key> value" or "/<Key> value".
jcarsey1e6e84c2010-01-25 20:05:08 +00002283
jcarseya405b862010-09-14 05:18:09 +00002284 If CheckPackage is NULL, then return NULL.
jcarsey94b17fa2009-05-07 18:46:18 +00002285
jcarseya405b862010-09-14 05:18:09 +00002286 @param[in] CheckPackage The package of parsed command line arguments.
2287 @param[in] KeyString The Key of the command line argument to check for.
jcarsey94b17fa2009-05-07 18:46:18 +00002288
jcarseya405b862010-09-14 05:18:09 +00002289 @retval NULL The flag is not on the command line.
2290 @retval !=NULL The pointer to unicode string of the value.
2291**/
jcarsey94b17fa2009-05-07 18:46:18 +00002292CONST CHAR16*
2293EFIAPI
2294ShellCommandLineGetValue (
2295 IN CONST LIST_ENTRY *CheckPackage,
2296 IN CHAR16 *KeyString
jcarseya405b862010-09-14 05:18:09 +00002297 )
2298{
jcarsey94b17fa2009-05-07 18:46:18 +00002299 LIST_ENTRY *Node;
jcarsey252d9452011-03-25 20:49:53 +00002300 CHAR16 *TempString;
jcarsey94b17fa2009-05-07 18:46:18 +00002301
2302 //
ydong100c1950b2011-10-13 02:37:35 +00002303 // return NULL for no package or KeyString is NULL
jcarsey94b17fa2009-05-07 18:46:18 +00002304 //
ydong100c1950b2011-10-13 02:37:35 +00002305 if (CheckPackage == NULL || KeyString == NULL) {
jcarsey94b17fa2009-05-07 18:46:18 +00002306 return (NULL);
2307 }
2308
2309 //
2310 // enumerate through the list of parametrs
2311 //
jcarsey1e6e84c2010-01-25 20:05:08 +00002312 for ( Node = GetFirstNode(CheckPackage)
2313 ; !IsNull (CheckPackage, Node)
2314 ; Node = GetNextNode(CheckPackage, Node)
jcarsey252d9452011-03-25 20:49:53 +00002315 ){
jcarsey94b17fa2009-05-07 18:46:18 +00002316 //
jcarsey252d9452011-03-25 20:49:53 +00002317 // If the Name matches, return TRUE (and there may be NULL name)
jcarsey94b17fa2009-05-07 18:46:18 +00002318 //
2319 if (((SHELL_PARAM_PACKAGE*)Node)->Name != NULL) {
jcarsey9eb53ac2009-07-08 17:26:58 +00002320 //
2321 // If Type is TypeStart then only compare the begining of the strings
2322 //
jcarsey252d9452011-03-25 20:49:53 +00002323 if (((SHELL_PARAM_PACKAGE*)Node)->Type == TypeStart) {
2324 if (StrnCmp(KeyString, ((SHELL_PARAM_PACKAGE*)Node)->Name, StrLen(KeyString)) == 0) {
2325 return (((SHELL_PARAM_PACKAGE*)Node)->Name + StrLen(KeyString));
2326 }
2327 TempString = NULL;
2328 TempString = StrnCatGrow(&TempString, NULL, KeyString, StrLen(((SHELL_PARAM_PACKAGE*)Node)->Name));
2329 if (TempString != NULL) {
2330 if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
2331 FreePool(TempString);
2332 return (((SHELL_PARAM_PACKAGE*)Node)->Name + StrLen(KeyString));
2333 }
2334 FreePool(TempString);
2335 }
2336 } else if (StringNoCaseCompare(&KeyString, &((SHELL_PARAM_PACKAGE*)Node)->Name) == 0) {
jcarsey94b17fa2009-05-07 18:46:18 +00002337 return (((SHELL_PARAM_PACKAGE*)Node)->Value);
2338 }
2339 }
2340 }
2341 return (NULL);
2342}
jcarseya405b862010-09-14 05:18:09 +00002343
jcarsey94b17fa2009-05-07 18:46:18 +00002344/**
jcarseya405b862010-09-14 05:18:09 +00002345 Returns raw value from command line argument.
jcarsey94b17fa2009-05-07 18:46:18 +00002346
jcarseya405b862010-09-14 05:18:09 +00002347 Raw value parameters are in the form of "value" in a specific position in the list.
jcarsey1e6e84c2010-01-25 20:05:08 +00002348
jcarseya405b862010-09-14 05:18:09 +00002349 If CheckPackage is NULL, then return NULL.
jcarsey94b17fa2009-05-07 18:46:18 +00002350
jcarseya405b862010-09-14 05:18:09 +00002351 @param[in] CheckPackage The package of parsed command line arguments.
2352 @param[in] Position The position of the value.
jcarsey94b17fa2009-05-07 18:46:18 +00002353
jcarseya405b862010-09-14 05:18:09 +00002354 @retval NULL The flag is not on the command line.
2355 @retval !=NULL The pointer to unicode string of the value.
jcarsey94b17fa2009-05-07 18:46:18 +00002356 **/
2357CONST CHAR16*
2358EFIAPI
2359ShellCommandLineGetRawValue (
jcarseya405b862010-09-14 05:18:09 +00002360 IN CONST LIST_ENTRY * CONST CheckPackage,
2361 IN UINTN Position
2362 )
2363{
jcarsey94b17fa2009-05-07 18:46:18 +00002364 LIST_ENTRY *Node;
2365
2366 //
2367 // check for CheckPackage == NULL
2368 //
2369 if (CheckPackage == NULL) {
2370 return (NULL);
2371 }
2372
2373 //
2374 // enumerate through the list of parametrs
2375 //
jcarsey1e6e84c2010-01-25 20:05:08 +00002376 for ( Node = GetFirstNode(CheckPackage)
2377 ; !IsNull (CheckPackage, Node)
2378 ; Node = GetNextNode(CheckPackage, Node)
jcarseya405b862010-09-14 05:18:09 +00002379 ){
jcarsey94b17fa2009-05-07 18:46:18 +00002380 //
2381 // If the position matches, return the value
2382 //
2383 if (((SHELL_PARAM_PACKAGE*)Node)->OriginalPosition == Position) {
2384 return (((SHELL_PARAM_PACKAGE*)Node)->Value);
2385 }
2386 }
2387 return (NULL);
jcarseyb1f95a02009-06-16 00:23:19 +00002388}
jcarsey2247dde2009-11-09 18:08:58 +00002389
2390/**
jcarsey1e6e84c2010-01-25 20:05:08 +00002391 returns the number of command line value parameters that were parsed.
2392
jcarsey2247dde2009-11-09 18:08:58 +00002393 this will not include flags.
2394
jcarseya405b862010-09-14 05:18:09 +00002395 @param[in] CheckPackage The package of parsed command line arguments.
2396
jcarsey2247dde2009-11-09 18:08:58 +00002397 @retval (UINTN)-1 No parsing has ocurred
2398 @return other The number of value parameters found
2399**/
2400UINTN
2401EFIAPI
2402ShellCommandLineGetCount(
jcarseya405b862010-09-14 05:18:09 +00002403 IN CONST LIST_ENTRY *CheckPackage
jcarsey125c2cf2009-11-18 21:36:50 +00002404 )
2405{
jcarseya405b862010-09-14 05:18:09 +00002406 LIST_ENTRY *Node1;
2407 UINTN Count;
2408
2409 if (CheckPackage == NULL) {
2410 return (0);
2411 }
2412 for ( Node1 = GetFirstNode(CheckPackage), Count = 0
2413 ; !IsNull (CheckPackage, Node1)
2414 ; Node1 = GetNextNode(CheckPackage, Node1)
2415 ){
2416 if (((SHELL_PARAM_PACKAGE*)Node1)->Name == NULL) {
2417 Count++;
2418 }
2419 }
2420 return (Count);
jcarsey2247dde2009-11-09 18:08:58 +00002421}
2422
jcarsey975136a2009-06-16 19:03:54 +00002423/**
jcarsey36a9d672009-11-20 21:13:41 +00002424 Determins if a parameter is duplicated.
2425
jcarsey1e6e84c2010-01-25 20:05:08 +00002426 If Param is not NULL then it will point to a callee allocated string buffer
jcarsey36a9d672009-11-20 21:13:41 +00002427 with the parameter value if a duplicate is found.
2428
2429 If CheckPackage is NULL, then ASSERT.
2430
2431 @param[in] CheckPackage The package of parsed command line arguments.
2432 @param[out] Param Upon finding one, a pointer to the duplicated parameter.
2433
2434 @retval EFI_SUCCESS No parameters were duplicated.
2435 @retval EFI_DEVICE_ERROR A duplicate was found.
2436 **/
2437EFI_STATUS
2438EFIAPI
2439ShellCommandLineCheckDuplicate (
2440 IN CONST LIST_ENTRY *CheckPackage,
2441 OUT CHAR16 **Param
2442 )
2443{
2444 LIST_ENTRY *Node1;
2445 LIST_ENTRY *Node2;
jcarsey1e6e84c2010-01-25 20:05:08 +00002446
jcarsey36a9d672009-11-20 21:13:41 +00002447 ASSERT(CheckPackage != NULL);
2448
jcarsey1e6e84c2010-01-25 20:05:08 +00002449 for ( Node1 = GetFirstNode(CheckPackage)
2450 ; !IsNull (CheckPackage, Node1)
2451 ; Node1 = GetNextNode(CheckPackage, Node1)
jcarseya405b862010-09-14 05:18:09 +00002452 ){
jcarsey1e6e84c2010-01-25 20:05:08 +00002453 for ( Node2 = GetNextNode(CheckPackage, Node1)
2454 ; !IsNull (CheckPackage, Node2)
2455 ; Node2 = GetNextNode(CheckPackage, Node2)
jcarseya405b862010-09-14 05:18:09 +00002456 ){
2457 if ((((SHELL_PARAM_PACKAGE*)Node1)->Name != NULL) && (((SHELL_PARAM_PACKAGE*)Node2)->Name != NULL) && StrCmp(((SHELL_PARAM_PACKAGE*)Node1)->Name, ((SHELL_PARAM_PACKAGE*)Node2)->Name) == 0) {
jcarsey36a9d672009-11-20 21:13:41 +00002458 if (Param != NULL) {
2459 *Param = NULL;
2460 *Param = StrnCatGrow(Param, NULL, ((SHELL_PARAM_PACKAGE*)Node1)->Name, 0);
2461 }
2462 return (EFI_DEVICE_ERROR);
2463 }
2464 }
2465 }
2466 return (EFI_SUCCESS);
2467}
2468
2469/**
jcarsey1e6e84c2010-01-25 20:05:08 +00002470 This is a find and replace function. Upon successful return the NewString is a copy of
jcarsey975136a2009-06-16 19:03:54 +00002471 SourceString with each instance of FindTarget replaced with ReplaceWith.
2472
jcarseyb3011f42010-01-11 21:49:04 +00002473 If SourceString and NewString overlap the behavior is undefined.
2474
jcarsey975136a2009-06-16 19:03:54 +00002475 If the string would grow bigger than NewSize it will halt and return error.
2476
ydong104ff7e372011-09-02 08:05:34 +00002477 @param[in] SourceString The string with source buffer.
2478 @param[in, out] NewString The string with resultant buffer.
2479 @param[in] NewSize The size in bytes of NewString.
2480 @param[in] FindTarget The string to look for.
2481 @param[in] ReplaceWith The string to replace FindTarget with.
2482 @param[in] SkipPreCarrot If TRUE will skip a FindTarget that has a '^'
2483 immediately before it.
2484 @param[in] ParameterReplacing If TRUE will add "" around items with spaces.
jcarsey975136a2009-06-16 19:03:54 +00002485
jcarsey969c7832010-01-13 16:46:33 +00002486 @retval EFI_INVALID_PARAMETER SourceString was NULL.
2487 @retval EFI_INVALID_PARAMETER NewString was NULL.
2488 @retval EFI_INVALID_PARAMETER FindTarget was NULL.
2489 @retval EFI_INVALID_PARAMETER ReplaceWith was NULL.
2490 @retval EFI_INVALID_PARAMETER FindTarget had length < 1.
2491 @retval EFI_INVALID_PARAMETER SourceString had length < 1.
jcarsey1e6e84c2010-01-25 20:05:08 +00002492 @retval EFI_BUFFER_TOO_SMALL NewSize was less than the minimum size to hold
jcarsey969c7832010-01-13 16:46:33 +00002493 the new string (truncation occurred).
jcarseya405b862010-09-14 05:18:09 +00002494 @retval EFI_SUCCESS The string was successfully copied with replacement.
jcarsey975136a2009-06-16 19:03:54 +00002495**/
jcarsey975136a2009-06-16 19:03:54 +00002496EFI_STATUS
2497EFIAPI
jcarseya405b862010-09-14 05:18:09 +00002498ShellCopySearchAndReplace(
jcarsey975136a2009-06-16 19:03:54 +00002499 IN CHAR16 CONST *SourceString,
jcarseya405b862010-09-14 05:18:09 +00002500 IN OUT CHAR16 *NewString,
jcarsey975136a2009-06-16 19:03:54 +00002501 IN UINTN NewSize,
2502 IN CONST CHAR16 *FindTarget,
jcarsey969c7832010-01-13 16:46:33 +00002503 IN CONST CHAR16 *ReplaceWith,
jcarseya405b862010-09-14 05:18:09 +00002504 IN CONST BOOLEAN SkipPreCarrot,
2505 IN CONST BOOLEAN ParameterReplacing
jcarsey1e6e84c2010-01-25 20:05:08 +00002506 )
jcarsey2247dde2009-11-09 18:08:58 +00002507{
jcarsey01582942009-07-10 19:46:17 +00002508 UINTN Size;
jcarseya405b862010-09-14 05:18:09 +00002509 CHAR16 *Replace;
2510
jcarsey975136a2009-06-16 19:03:54 +00002511 if ( (SourceString == NULL)
2512 || (NewString == NULL)
2513 || (FindTarget == NULL)
2514 || (ReplaceWith == NULL)
2515 || (StrLen(FindTarget) < 1)
2516 || (StrLen(SourceString) < 1)
jcarseya405b862010-09-14 05:18:09 +00002517 ){
jcarsey975136a2009-06-16 19:03:54 +00002518 return (EFI_INVALID_PARAMETER);
2519 }
jcarseya405b862010-09-14 05:18:09 +00002520 Replace = NULL;
2521 if (StrStr(ReplaceWith, L" ") == NULL || !ParameterReplacing) {
2522 Replace = StrnCatGrow(&Replace, NULL, ReplaceWith, 0);
2523 } else {
2524 Replace = AllocateZeroPool(StrSize(ReplaceWith) + 2*sizeof(CHAR16));
jcarseybeab0fc2011-10-10 17:26:25 +00002525 if (Replace != NULL) {
2526 UnicodeSPrint(Replace, StrSize(ReplaceWith) + 2*sizeof(CHAR16), L"\"%s\"", ReplaceWith);
2527 }
jcarseya405b862010-09-14 05:18:09 +00002528 }
jcarsey3e082d52010-10-04 16:44:57 +00002529 if (Replace == NULL) {
2530 return (EFI_OUT_OF_RESOURCES);
2531 }
jcarsey2247dde2009-11-09 18:08:58 +00002532 NewString = SetMem16(NewString, NewSize, CHAR_NULL);
2533 while (*SourceString != CHAR_NULL) {
jcarsey969c7832010-01-13 16:46:33 +00002534 //
jcarseya405b862010-09-14 05:18:09 +00002535 // if we find the FindTarget and either Skip == FALSE or Skip and we
jcarsey969c7832010-01-13 16:46:33 +00002536 // dont have a carrot do a replace...
2537 //
jcarsey1e6e84c2010-01-25 20:05:08 +00002538 if (StrnCmp(SourceString, FindTarget, StrLen(FindTarget)) == 0
jcarseya405b862010-09-14 05:18:09 +00002539 && ((SkipPreCarrot && *(SourceString-1) != L'^') || !SkipPreCarrot)
2540 ){
jcarsey975136a2009-06-16 19:03:54 +00002541 SourceString += StrLen(FindTarget);
jcarsey01582942009-07-10 19:46:17 +00002542 Size = StrSize(NewString);
jcarseya405b862010-09-14 05:18:09 +00002543 if ((Size + (StrLen(Replace)*sizeof(CHAR16))) > NewSize) {
2544 FreePool(Replace);
jcarsey975136a2009-06-16 19:03:54 +00002545 return (EFI_BUFFER_TOO_SMALL);
2546 }
jcarseya405b862010-09-14 05:18:09 +00002547 StrCat(NewString, Replace);
jcarsey975136a2009-06-16 19:03:54 +00002548 } else {
jcarsey01582942009-07-10 19:46:17 +00002549 Size = StrSize(NewString);
2550 if (Size + sizeof(CHAR16) > NewSize) {
jcarseya405b862010-09-14 05:18:09 +00002551 FreePool(Replace);
jcarsey975136a2009-06-16 19:03:54 +00002552 return (EFI_BUFFER_TOO_SMALL);
2553 }
2554 StrnCat(NewString, SourceString, 1);
2555 SourceString++;
2556 }
2557 }
jcarseya405b862010-09-14 05:18:09 +00002558 FreePool(Replace);
jcarsey975136a2009-06-16 19:03:54 +00002559 return (EFI_SUCCESS);
2560}
jcarseyb1f95a02009-06-16 00:23:19 +00002561
2562/**
jcarseye2f82972009-12-01 05:40:24 +00002563 Internal worker function to output a string.
2564
2565 This function will output a string to the correct StdOut.
2566
2567 @param[in] String The string to print out.
2568
2569 @retval EFI_SUCCESS The operation was sucessful.
2570 @retval !EFI_SUCCESS The operation failed.
2571**/
2572EFI_STATUS
2573EFIAPI
2574InternalPrintTo (
2575 IN CONST CHAR16 *String
2576 )
2577{
2578 UINTN Size;
2579 Size = StrSize(String) - sizeof(CHAR16);
jcarseya405b862010-09-14 05:18:09 +00002580 if (Size == 0) {
2581 return (EFI_SUCCESS);
2582 }
jcarsey366f81a2011-06-27 21:04:22 +00002583 if (gEfiShellParametersProtocol != NULL) {
2584 return (gEfiShellProtocol->WriteFile(gEfiShellParametersProtocol->StdOut, &Size, (VOID*)String));
jcarseye2f82972009-12-01 05:40:24 +00002585 }
2586 if (mEfiShellInterface != NULL) {
jcarseyecd3d592009-12-07 18:05:00 +00002587 //
2588 // Divide in half for old shell. Must be string length not size.
2589 //
2590 Size /= 2;
jcarseya405b862010-09-14 05:18:09 +00002591 return (mEfiShellInterface->StdOut->Write(mEfiShellInterface->StdOut, &Size, (VOID*)String));
jcarseye2f82972009-12-01 05:40:24 +00002592 }
2593 ASSERT(FALSE);
2594 return (EFI_UNSUPPORTED);
2595}
2596
2597/**
jcarseyb1f95a02009-06-16 00:23:19 +00002598 Print at a specific location on the screen.
2599
jcarseyf1b87e72009-06-17 00:52:11 +00002600 This function will move the cursor to a given screen location and print the specified string
jcarsey1e6e84c2010-01-25 20:05:08 +00002601
2602 If -1 is specified for either the Row or Col the current screen location for BOTH
jcarseyf1b87e72009-06-17 00:52:11 +00002603 will be used.
jcarseyb1f95a02009-06-16 00:23:19 +00002604
2605 if either Row or Col is out of range for the current console, then ASSERT
2606 if Format is NULL, then ASSERT
2607
jcarsey1e6e84c2010-01-25 20:05:08 +00002608 In addition to the standard %-based flags as supported by UefiLib Print() this supports
jcarseyb1f95a02009-06-16 00:23:19 +00002609 the following additional flags:
2610 %N - Set output attribute to normal
2611 %H - Set output attribute to highlight
2612 %E - Set output attribute to error
2613 %B - Set output attribute to blue color
2614 %V - Set output attribute to green color
2615
2616 Note: The background color is controlled by the shell command cls.
2617
jcarseyb1f95a02009-06-16 00:23:19 +00002618 @param[in] Col the column to print at
jcarsey252d9452011-03-25 20:49:53 +00002619 @param[in] Row the row to print at
jcarseyb1f95a02009-06-16 00:23:19 +00002620 @param[in] Format the format string
jcarsey2247dde2009-11-09 18:08:58 +00002621 @param[in] Marker the marker for the variable argument list
jcarseyb1f95a02009-06-16 00:23:19 +00002622
jcarseya405b862010-09-14 05:18:09 +00002623 @return EFI_SUCCESS The operation was successful.
2624 @return EFI_DEVICE_ERROR The console device reported an error.
jcarseyb1f95a02009-06-16 00:23:19 +00002625**/
jcarseya405b862010-09-14 05:18:09 +00002626EFI_STATUS
jcarseyb1f95a02009-06-16 00:23:19 +00002627EFIAPI
jcarsey2247dde2009-11-09 18:08:58 +00002628InternalShellPrintWorker(
jcarseyb1f95a02009-06-16 00:23:19 +00002629 IN INT32 Col OPTIONAL,
2630 IN INT32 Row OPTIONAL,
2631 IN CONST CHAR16 *Format,
jcarsey252d9452011-03-25 20:49:53 +00002632 IN VA_LIST Marker
jcarsey1e6e84c2010-01-25 20:05:08 +00002633 )
jcarsey2247dde2009-11-09 18:08:58 +00002634{
jcarseyb1f95a02009-06-16 00:23:19 +00002635 EFI_STATUS Status;
jcarsey975136a2009-06-16 19:03:54 +00002636 CHAR16 *ResumeLocation;
2637 CHAR16 *FormatWalker;
jcarseya405b862010-09-14 05:18:09 +00002638 UINTN OriginalAttribute;
jcarsey89e85372011-04-13 23:37:50 +00002639 CHAR16 *mPostReplaceFormat;
2640 CHAR16 *mPostReplaceFormat2;
2641
2642 mPostReplaceFormat = AllocateZeroPool (PcdGet16 (PcdShellPrintBufferSize));
2643 mPostReplaceFormat2 = AllocateZeroPool (PcdGet16 (PcdShellPrintBufferSize));
jcarseya405b862010-09-14 05:18:09 +00002644
jcarseyf8d3e682011-04-19 17:54:42 +00002645 if (mPostReplaceFormat == NULL || mPostReplaceFormat2 == NULL) {
2646 SHELL_FREE_NON_NULL(mPostReplaceFormat);
2647 SHELL_FREE_NON_NULL(mPostReplaceFormat2);
2648 return (EFI_OUT_OF_RESOURCES);
2649 }
2650
jcarseya405b862010-09-14 05:18:09 +00002651 Status = EFI_SUCCESS;
2652 OriginalAttribute = gST->ConOut->Mode->Attribute;
jcarsey1e6e84c2010-01-25 20:05:08 +00002653
jcarsey975136a2009-06-16 19:03:54 +00002654 //
2655 // Back and forth each time fixing up 1 of our flags...
2656 //
jcarseya405b862010-09-14 05:18:09 +00002657 Status = ShellCopySearchAndReplace(Format, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%N", L"%%N", FALSE, FALSE);
jcarsey975136a2009-06-16 19:03:54 +00002658 ASSERT_EFI_ERROR(Status);
jcarseya405b862010-09-14 05:18:09 +00002659 Status = ShellCopySearchAndReplace(mPostReplaceFormat, mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), L"%E", L"%%E", FALSE, FALSE);
jcarsey975136a2009-06-16 19:03:54 +00002660 ASSERT_EFI_ERROR(Status);
jcarseya405b862010-09-14 05:18:09 +00002661 Status = ShellCopySearchAndReplace(mPostReplaceFormat2, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%H", L"%%H", FALSE, FALSE);
jcarsey975136a2009-06-16 19:03:54 +00002662 ASSERT_EFI_ERROR(Status);
jcarseya405b862010-09-14 05:18:09 +00002663 Status = ShellCopySearchAndReplace(mPostReplaceFormat, mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), L"%B", L"%%B", FALSE, FALSE);
jcarsey975136a2009-06-16 19:03:54 +00002664 ASSERT_EFI_ERROR(Status);
jcarseya405b862010-09-14 05:18:09 +00002665 Status = ShellCopySearchAndReplace(mPostReplaceFormat2, mPostReplaceFormat, PcdGet16 (PcdShellPrintBufferSize), L"%V", L"%%V", FALSE, FALSE);
jcarsey975136a2009-06-16 19:03:54 +00002666 ASSERT_EFI_ERROR(Status);
2667
2668 //
2669 // Use the last buffer from replacing to print from...
2670 //
jcarseya405b862010-09-14 05:18:09 +00002671 UnicodeVSPrint (mPostReplaceFormat2, PcdGet16 (PcdShellPrintBufferSize), mPostReplaceFormat, Marker);
jcarseyb1f95a02009-06-16 00:23:19 +00002672
2673 if (Col != -1 && Row != -1) {
jcarseyb1f95a02009-06-16 00:23:19 +00002674 Status = gST->ConOut->SetCursorPosition(gST->ConOut, Col, Row);
jcarsey975136a2009-06-16 19:03:54 +00002675 }
2676
jcarseyecd3d592009-12-07 18:05:00 +00002677 FormatWalker = mPostReplaceFormat2;
jcarsey2247dde2009-11-09 18:08:58 +00002678 while (*FormatWalker != CHAR_NULL) {
jcarsey975136a2009-06-16 19:03:54 +00002679 //
2680 // Find the next attribute change request
2681 //
2682 ResumeLocation = StrStr(FormatWalker, L"%");
2683 if (ResumeLocation != NULL) {
jcarsey2247dde2009-11-09 18:08:58 +00002684 *ResumeLocation = CHAR_NULL;
jcarsey975136a2009-06-16 19:03:54 +00002685 }
2686 //
2687 // print the current FormatWalker string
2688 //
jcarseya405b862010-09-14 05:18:09 +00002689 if (StrLen(FormatWalker)>0) {
2690 Status = InternalPrintTo(FormatWalker);
2691 if (EFI_ERROR(Status)) {
2692 break;
2693 }
2694 }
2695
jcarsey975136a2009-06-16 19:03:54 +00002696 //
2697 // update the attribute
2698 //
2699 if (ResumeLocation != NULL) {
jcarsey5d46f172011-08-23 15:34:23 +00002700 if (*(ResumeLocation-1) == L'^') {
2701 //
2702 // Print a simple '%' symbol
2703 //
2704 Status = InternalPrintTo(L"%");
2705 ResumeLocation = ResumeLocation - 1;
2706 } else {
2707 switch (*(ResumeLocation+1)) {
2708 case (L'N'):
2709 gST->ConOut->SetAttribute(gST->ConOut, OriginalAttribute);
jcarseya405b862010-09-14 05:18:09 +00002710 break;
jcarsey5d46f172011-08-23 15:34:23 +00002711 case (L'E'):
2712 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_YELLOW, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2713 break;
2714 case (L'H'):
2715 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_WHITE, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2716 break;
2717 case (L'B'):
2718 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_BLUE, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2719 break;
2720 case (L'V'):
2721 gST->ConOut->SetAttribute(gST->ConOut, EFI_TEXT_ATTR(EFI_GREEN, ((OriginalAttribute&(BIT4|BIT5|BIT6))>>4)));
2722 break;
2723 default:
2724 //
2725 // Print a simple '%' symbol
2726 //
2727 Status = InternalPrintTo(L"%");
2728 if (EFI_ERROR(Status)) {
2729 break;
2730 }
2731 ResumeLocation = ResumeLocation - 1;
2732 break;
2733 }
jcarsey975136a2009-06-16 19:03:54 +00002734 }
2735 } else {
2736 //
2737 // reset to normal now...
2738 //
jcarsey975136a2009-06-16 19:03:54 +00002739 break;
2740 }
2741
2742 //
2743 // update FormatWalker to Resume + 2 (skip the % and the indicator)
2744 //
2745 FormatWalker = ResumeLocation + 2;
2746 }
jcarseyb1f95a02009-06-16 00:23:19 +00002747
jcarseya405b862010-09-14 05:18:09 +00002748 gST->ConOut->SetAttribute(gST->ConOut, OriginalAttribute);
jcarsey89e85372011-04-13 23:37:50 +00002749
2750 SHELL_FREE_NON_NULL(mPostReplaceFormat);
2751 SHELL_FREE_NON_NULL(mPostReplaceFormat2);
jcarseya405b862010-09-14 05:18:09 +00002752 return (Status);
jcarsey5f7431d2009-07-10 18:06:01 +00002753}
jcarsey2247dde2009-11-09 18:08:58 +00002754
2755/**
2756 Print at a specific location on the screen.
2757
jcarseye2f82972009-12-01 05:40:24 +00002758 This function will move the cursor to a given screen location and print the specified string.
jcarsey1e6e84c2010-01-25 20:05:08 +00002759
2760 If -1 is specified for either the Row or Col the current screen location for BOTH
jcarsey2247dde2009-11-09 18:08:58 +00002761 will be used.
2762
jcarseye2f82972009-12-01 05:40:24 +00002763 If either Row or Col is out of range for the current console, then ASSERT.
2764 If Format is NULL, then ASSERT.
jcarsey2247dde2009-11-09 18:08:58 +00002765
jcarsey1e6e84c2010-01-25 20:05:08 +00002766 In addition to the standard %-based flags as supported by UefiLib Print() this supports
jcarsey2247dde2009-11-09 18:08:58 +00002767 the following additional flags:
2768 %N - Set output attribute to normal
2769 %H - Set output attribute to highlight
2770 %E - Set output attribute to error
2771 %B - Set output attribute to blue color
2772 %V - Set output attribute to green color
2773
2774 Note: The background color is controlled by the shell command cls.
2775
jcarsey2247dde2009-11-09 18:08:58 +00002776 @param[in] Col the column to print at
jcarseya405b862010-09-14 05:18:09 +00002777 @param[in] Row the row to print at
jcarsey2247dde2009-11-09 18:08:58 +00002778 @param[in] Format the format string
jcarseya405b862010-09-14 05:18:09 +00002779 @param[in] ... The variable argument list.
jcarsey2247dde2009-11-09 18:08:58 +00002780
jcarseya405b862010-09-14 05:18:09 +00002781 @return EFI_SUCCESS The printing was successful.
2782 @return EFI_DEVICE_ERROR The console device reported an error.
jcarsey2247dde2009-11-09 18:08:58 +00002783**/
jcarseya405b862010-09-14 05:18:09 +00002784EFI_STATUS
jcarsey2247dde2009-11-09 18:08:58 +00002785EFIAPI
2786ShellPrintEx(
2787 IN INT32 Col OPTIONAL,
2788 IN INT32 Row OPTIONAL,
2789 IN CONST CHAR16 *Format,
2790 ...
jcarsey1e6e84c2010-01-25 20:05:08 +00002791 )
jcarsey2247dde2009-11-09 18:08:58 +00002792{
2793 VA_LIST Marker;
jcarseya405b862010-09-14 05:18:09 +00002794 EFI_STATUS RetVal;
jcarsey3e082d52010-10-04 16:44:57 +00002795 if (Format == NULL) {
2796 return (EFI_INVALID_PARAMETER);
2797 }
jcarsey2247dde2009-11-09 18:08:58 +00002798 VA_START (Marker, Format);
jcarseya405b862010-09-14 05:18:09 +00002799 RetVal = InternalShellPrintWorker(Col, Row, Format, Marker);
jcarseye2f82972009-12-01 05:40:24 +00002800 VA_END(Marker);
jcarseya405b862010-09-14 05:18:09 +00002801 return(RetVal);
jcarsey2247dde2009-11-09 18:08:58 +00002802}
2803
2804/**
2805 Print at a specific location on the screen.
2806
jcarseye2f82972009-12-01 05:40:24 +00002807 This function will move the cursor to a given screen location and print the specified string.
jcarsey1e6e84c2010-01-25 20:05:08 +00002808
2809 If -1 is specified for either the Row or Col the current screen location for BOTH
jcarseye2f82972009-12-01 05:40:24 +00002810 will be used.
jcarsey2247dde2009-11-09 18:08:58 +00002811
jcarseye2f82972009-12-01 05:40:24 +00002812 If either Row or Col is out of range for the current console, then ASSERT.
2813 If Format is NULL, then ASSERT.
jcarsey2247dde2009-11-09 18:08:58 +00002814
jcarsey1e6e84c2010-01-25 20:05:08 +00002815 In addition to the standard %-based flags as supported by UefiLib Print() this supports
jcarsey2247dde2009-11-09 18:08:58 +00002816 the following additional flags:
jcarsey1e6e84c2010-01-25 20:05:08 +00002817 %N - Set output attribute to normal.
2818 %H - Set output attribute to highlight.
2819 %E - Set output attribute to error.
2820 %B - Set output attribute to blue color.
2821 %V - Set output attribute to green color.
jcarsey2247dde2009-11-09 18:08:58 +00002822
2823 Note: The background color is controlled by the shell command cls.
2824
jcarsey1e6e84c2010-01-25 20:05:08 +00002825 @param[in] Col The column to print at.
jcarseya405b862010-09-14 05:18:09 +00002826 @param[in] Row The row to print at.
jcarsey1e6e84c2010-01-25 20:05:08 +00002827 @param[in] Language The language of the string to retrieve. If this parameter
2828 is NULL, then the current platform language is used.
2829 @param[in] HiiFormatStringId The format string Id for getting from Hii.
2830 @param[in] HiiFormatHandle The format string Handle for getting from Hii.
jcarseya405b862010-09-14 05:18:09 +00002831 @param[in] ... The variable argument list.
jcarsey2247dde2009-11-09 18:08:58 +00002832
jcarseya405b862010-09-14 05:18:09 +00002833 @return EFI_SUCCESS The printing was successful.
2834 @return EFI_DEVICE_ERROR The console device reported an error.
jcarsey2247dde2009-11-09 18:08:58 +00002835**/
jcarseya405b862010-09-14 05:18:09 +00002836EFI_STATUS
jcarsey2247dde2009-11-09 18:08:58 +00002837EFIAPI
2838ShellPrintHiiEx(
2839 IN INT32 Col OPTIONAL,
2840 IN INT32 Row OPTIONAL,
jcarsey1e6e84c2010-01-25 20:05:08 +00002841 IN CONST CHAR8 *Language OPTIONAL,
jcarsey2247dde2009-11-09 18:08:58 +00002842 IN CONST EFI_STRING_ID HiiFormatStringId,
2843 IN CONST EFI_HANDLE HiiFormatHandle,
2844 ...
2845 )
2846{
2847 VA_LIST Marker;
2848 CHAR16 *HiiFormatString;
jcarseya405b862010-09-14 05:18:09 +00002849 EFI_STATUS RetVal;
jcarsey2247dde2009-11-09 18:08:58 +00002850
2851 VA_START (Marker, HiiFormatHandle);
jcarsey1e6e84c2010-01-25 20:05:08 +00002852 HiiFormatString = HiiGetString(HiiFormatHandle, HiiFormatStringId, Language);
jcarsey2247dde2009-11-09 18:08:58 +00002853 ASSERT(HiiFormatString != NULL);
2854
2855 RetVal = InternalShellPrintWorker(Col, Row, HiiFormatString, Marker);
2856
jcarseya405b862010-09-14 05:18:09 +00002857 SHELL_FREE_NON_NULL(HiiFormatString);
jcarseye2f82972009-12-01 05:40:24 +00002858 VA_END(Marker);
jcarsey2247dde2009-11-09 18:08:58 +00002859
2860 return (RetVal);
2861}
2862
2863/**
2864 Function to determine if a given filename represents a file or a directory.
2865
2866 @param[in] DirName Path to directory to test.
2867
2868 @retval EFI_SUCCESS The Path represents a directory
2869 @retval EFI_NOT_FOUND The Path does not represent a directory
2870 @return other The path failed to open
2871**/
2872EFI_STATUS
2873EFIAPI
2874ShellIsDirectory(
2875 IN CONST CHAR16 *DirName
2876 )
2877{
2878 EFI_STATUS Status;
jcarseya405b862010-09-14 05:18:09 +00002879 SHELL_FILE_HANDLE Handle;
jcarsey3e082d52010-10-04 16:44:57 +00002880 CHAR16 *TempLocation;
2881 CHAR16 *TempLocation2;
jcarsey2247dde2009-11-09 18:08:58 +00002882
jcarseyecd3d592009-12-07 18:05:00 +00002883 ASSERT(DirName != NULL);
2884
jcarseya405b862010-09-14 05:18:09 +00002885 Handle = NULL;
2886 TempLocation = NULL;
jcarsey2247dde2009-11-09 18:08:58 +00002887
2888 Status = ShellOpenFileByName(DirName, &Handle, EFI_FILE_MODE_READ, 0);
2889 if (EFI_ERROR(Status)) {
jcarseya405b862010-09-14 05:18:09 +00002890 //
2891 // try good logic first.
2892 //
jcarsey366f81a2011-06-27 21:04:22 +00002893 if (gEfiShellProtocol != NULL) {
jcarsey3e082d52010-10-04 16:44:57 +00002894 TempLocation = StrnCatGrow(&TempLocation, NULL, DirName, 0);
2895 TempLocation2 = StrStr(TempLocation, L":");
2896 if (TempLocation2 != NULL && StrLen(StrStr(TempLocation, L":")) == 2) {
2897 *(TempLocation2+1) = CHAR_NULL;
jcarseya405b862010-09-14 05:18:09 +00002898 }
jcarsey366f81a2011-06-27 21:04:22 +00002899 if (gEfiShellProtocol->GetDevicePathFromMap(TempLocation) != NULL) {
jcarseya405b862010-09-14 05:18:09 +00002900 FreePool(TempLocation);
2901 return (EFI_SUCCESS);
2902 }
2903 FreePool(TempLocation);
2904 } else {
2905 //
2906 // probably a map name?!?!!?
2907 //
2908 TempLocation = StrStr(DirName, L"\\");
2909 if (TempLocation != NULL && *(TempLocation+1) == CHAR_NULL) {
2910 return (EFI_SUCCESS);
2911 }
2912 }
jcarsey2247dde2009-11-09 18:08:58 +00002913 return (Status);
2914 }
2915
2916 if (FileHandleIsDirectory(Handle) == EFI_SUCCESS) {
2917 ShellCloseFile(&Handle);
2918 return (EFI_SUCCESS);
2919 }
2920 ShellCloseFile(&Handle);
2921 return (EFI_NOT_FOUND);
2922}
2923
jcarsey125c2cf2009-11-18 21:36:50 +00002924/**
jcarsey36a9d672009-11-20 21:13:41 +00002925 Function to determine if a given filename represents a file.
2926
2927 @param[in] Name Path to file to test.
2928
2929 @retval EFI_SUCCESS The Path represents a file.
2930 @retval EFI_NOT_FOUND The Path does not represent a file.
2931 @retval other The path failed to open.
2932**/
2933EFI_STATUS
2934EFIAPI
2935ShellIsFile(
2936 IN CONST CHAR16 *Name
2937 )
2938{
2939 EFI_STATUS Status;
jcarseya405b862010-09-14 05:18:09 +00002940 SHELL_FILE_HANDLE Handle;
jcarsey36a9d672009-11-20 21:13:41 +00002941
jcarseyecd3d592009-12-07 18:05:00 +00002942 ASSERT(Name != NULL);
2943
jcarsey36a9d672009-11-20 21:13:41 +00002944 Handle = NULL;
2945
2946 Status = ShellOpenFileByName(Name, &Handle, EFI_FILE_MODE_READ, 0);
2947 if (EFI_ERROR(Status)) {
2948 return (Status);
2949 }
2950
2951 if (FileHandleIsDirectory(Handle) != EFI_SUCCESS) {
2952 ShellCloseFile(&Handle);
2953 return (EFI_SUCCESS);
2954 }
2955 ShellCloseFile(&Handle);
2956 return (EFI_NOT_FOUND);
2957}
2958
2959/**
jcarseyb3011f42010-01-11 21:49:04 +00002960 Function to determine if a given filename represents a file.
2961
2962 This will search the CWD and then the Path.
2963
2964 If Name is NULL, then ASSERT.
2965
2966 @param[in] Name Path to file to test.
2967
2968 @retval EFI_SUCCESS The Path represents a file.
2969 @retval EFI_NOT_FOUND The Path does not represent a file.
2970 @retval other The path failed to open.
2971**/
2972EFI_STATUS
2973EFIAPI
2974ShellIsFileInPath(
2975 IN CONST CHAR16 *Name
jcarseya405b862010-09-14 05:18:09 +00002976 )
2977{
jcarseyb3011f42010-01-11 21:49:04 +00002978 CHAR16 *NewName;
2979 EFI_STATUS Status;
2980
2981 if (!EFI_ERROR(ShellIsFile(Name))) {
jcarseya405b862010-09-14 05:18:09 +00002982 return (EFI_SUCCESS);
jcarseyb3011f42010-01-11 21:49:04 +00002983 }
2984
2985 NewName = ShellFindFilePath(Name);
2986 if (NewName == NULL) {
2987 return (EFI_NOT_FOUND);
2988 }
2989 Status = ShellIsFile(NewName);
2990 FreePool(NewName);
2991 return (Status);
2992}
jcarsey252d9452011-03-25 20:49:53 +00002993
jcarseyb3011f42010-01-11 21:49:04 +00002994/**
jcarsey1e6e84c2010-01-25 20:05:08 +00002995 Function to determine whether a string is decimal or hex representation of a number
jcarsey125c2cf2009-11-18 21:36:50 +00002996 and return the number converted from the string.
2997
2998 @param[in] String String representation of a number
2999
jcarsey252d9452011-03-25 20:49:53 +00003000 @return the number
3001 @retval (UINTN)(-1) An error ocurred.
jcarsey125c2cf2009-11-18 21:36:50 +00003002**/
3003UINTN
3004EFIAPI
3005ShellStrToUintn(
3006 IN CONST CHAR16 *String
3007 )
3008{
jcarsey252d9452011-03-25 20:49:53 +00003009 UINT64 RetVal;
3010 BOOLEAN Hex;
3011
3012 Hex = FALSE;
3013
3014 if (!InternalShellIsHexOrDecimalNumber(String, Hex, TRUE)) {
3015 Hex = TRUE;
jcarsey125c2cf2009-11-18 21:36:50 +00003016 }
jcarsey252d9452011-03-25 20:49:53 +00003017
3018 if (!EFI_ERROR(ShellConvertStringToUint64(String, &RetVal, Hex, TRUE))) {
3019 return ((UINTN)RetVal);
3020 }
3021 return ((UINTN)(-1));
jcarsey125c2cf2009-11-18 21:36:50 +00003022}
3023
3024/**
3025 Safely append with automatic string resizing given length of Destination and
3026 desired length of copy from Source.
3027
3028 append the first D characters of Source to the end of Destination, where D is
3029 the lesser of Count and the StrLen() of Source. If appending those D characters
3030 will fit within Destination (whose Size is given as CurrentSize) and
jcarsey1e6e84c2010-01-25 20:05:08 +00003031 still leave room for a NULL terminator, then those characters are appended,
3032 starting at the original terminating NULL of Destination, and a new terminating
3033 NULL is appended.
jcarsey125c2cf2009-11-18 21:36:50 +00003034
3035 If appending D characters onto Destination will result in a overflow of the size
3036 given in CurrentSize the string will be grown such that the copy can be performed
3037 and CurrentSize will be updated to the new size.
3038
3039 If Source is NULL, there is nothing to append, just return the current buffer in
3040 Destination.
3041
3042 if Destination is NULL, then ASSERT()
3043 if Destination's current length (including NULL terminator) is already more then
3044 CurrentSize, then ASSERT()
3045
ydong104ff7e372011-09-02 08:05:34 +00003046 @param[in, out] Destination The String to append onto
3047 @param[in, out] CurrentSize on call the number of bytes in Destination. On
jcarsey125c2cf2009-11-18 21:36:50 +00003048 return possibly the new size (still in bytes). if NULL
3049 then allocate whatever is needed.
3050 @param[in] Source The String to append from
3051 @param[in] Count Maximum number of characters to append. if 0 then
3052 all are appended.
3053
3054 @return Destination return the resultant string.
3055**/
3056CHAR16*
3057EFIAPI
3058StrnCatGrow (
3059 IN OUT CHAR16 **Destination,
3060 IN OUT UINTN *CurrentSize,
3061 IN CONST CHAR16 *Source,
3062 IN UINTN Count
3063 )
3064{
3065 UINTN DestinationStartSize;
3066 UINTN NewSize;
3067
3068 //
3069 // ASSERTs
3070 //
3071 ASSERT(Destination != NULL);
3072
3073 //
3074 // If there's nothing to do then just return Destination
3075 //
3076 if (Source == NULL) {
3077 return (*Destination);
3078 }
3079
3080 //
3081 // allow for un-initialized pointers, based on size being 0
3082 //
3083 if (CurrentSize != NULL && *CurrentSize == 0) {
3084 *Destination = NULL;
3085 }
3086
3087 //
3088 // allow for NULL pointers address as Destination
3089 //
3090 if (*Destination != NULL) {
3091 ASSERT(CurrentSize != 0);
3092 DestinationStartSize = StrSize(*Destination);
3093 ASSERT(DestinationStartSize <= *CurrentSize);
3094 } else {
3095 DestinationStartSize = 0;
3096// ASSERT(*CurrentSize == 0);
3097 }
3098
3099 //
3100 // Append all of Source?
3101 //
3102 if (Count == 0) {
3103 Count = StrLen(Source);
3104 }
3105
3106 //
3107 // Test and grow if required
3108 //
3109 if (CurrentSize != NULL) {
3110 NewSize = *CurrentSize;
3111 while (NewSize < (DestinationStartSize + (Count*sizeof(CHAR16)))) {
3112 NewSize += 2 * Count * sizeof(CHAR16);
3113 }
3114 *Destination = ReallocatePool(*CurrentSize, NewSize, *Destination);
3115 *CurrentSize = NewSize;
3116 } else {
3117 *Destination = AllocateZeroPool((Count+1)*sizeof(CHAR16));
3118 }
3119
3120 //
3121 // Now use standard StrnCat on a big enough buffer
3122 //
jcarseyc9d92df2010-02-03 15:37:54 +00003123 if (*Destination == NULL) {
3124 return (NULL);
3125 }
jcarsey125c2cf2009-11-18 21:36:50 +00003126 return StrnCat(*Destination, Source, Count);
3127}
jcarseyc9d92df2010-02-03 15:37:54 +00003128
3129/**
3130 Prompt the user and return the resultant answer to the requestor.
3131
3132 This function will display the requested question on the shell prompt and then
3133 wait for an apropriate answer to be input from the console.
3134
jcarseya405b862010-09-14 05:18:09 +00003135 if the SHELL_PROMPT_REQUEST_TYPE is SHELL_PROMPT_REQUEST_TYPE_YESNO, ShellPromptResponseTypeQuitContinue
jcarseyc9d92df2010-02-03 15:37:54 +00003136 or SHELL_PROMPT_REQUEST_TYPE_YESNOCANCEL then *Response is of type SHELL_PROMPT_RESPONSE.
3137
jcarseya405b862010-09-14 05:18:09 +00003138 if the SHELL_PROMPT_REQUEST_TYPE is ShellPromptResponseTypeFreeform then *Response is of type
jcarseyc9d92df2010-02-03 15:37:54 +00003139 CHAR16*.
3140
3141 In either case *Response must be callee freed if Response was not NULL;
3142
3143 @param Type What type of question is asked. This is used to filter the input
3144 to prevent invalid answers to question.
3145 @param Prompt Pointer to string prompt to use to request input.
3146 @param Response Pointer to Response which will be populated upon return.
3147
3148 @retval EFI_SUCCESS The operation was sucessful.
3149 @retval EFI_UNSUPPORTED The operation is not supported as requested.
3150 @retval EFI_INVALID_PARAMETER A parameter was invalid.
3151 @return other The operation failed.
3152**/
3153EFI_STATUS
3154EFIAPI
3155ShellPromptForResponse (
3156 IN SHELL_PROMPT_REQUEST_TYPE Type,
3157 IN CHAR16 *Prompt OPTIONAL,
3158 IN OUT VOID **Response OPTIONAL
3159 )
3160{
3161 EFI_STATUS Status;
3162 EFI_INPUT_KEY Key;
3163 UINTN EventIndex;
3164 SHELL_PROMPT_RESPONSE *Resp;
jcarseya405b862010-09-14 05:18:09 +00003165 UINTN Size;
3166 CHAR16 *Buffer;
jcarseyc9d92df2010-02-03 15:37:54 +00003167
jcarseya405b862010-09-14 05:18:09 +00003168 Status = EFI_UNSUPPORTED;
3169 Resp = NULL;
3170 Buffer = NULL;
3171 Size = 0;
3172 if (Type != ShellPromptResponseTypeFreeform) {
jcarsey252d9452011-03-25 20:49:53 +00003173 Resp = (SHELL_PROMPT_RESPONSE*)AllocateZeroPool(sizeof(SHELL_PROMPT_RESPONSE));
jcarsey3e082d52010-10-04 16:44:57 +00003174 if (Resp == NULL) {
3175 return (EFI_OUT_OF_RESOURCES);
3176 }
xdu290bfa222010-07-19 05:21:27 +00003177 }
jcarseyc9d92df2010-02-03 15:37:54 +00003178
3179 switch(Type) {
jcarseya405b862010-09-14 05:18:09 +00003180 case ShellPromptResponseTypeQuitContinue:
jcarseyc9d92df2010-02-03 15:37:54 +00003181 if (Prompt != NULL) {
3182 ShellPrintEx(-1, -1, L"%s", Prompt);
3183 }
3184 //
3185 // wait for valid response
3186 //
3187 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3188 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3189 ASSERT_EFI_ERROR(Status);
3190 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3191 if (Key.UnicodeChar == L'Q' || Key.UnicodeChar ==L'q') {
jcarseya405b862010-09-14 05:18:09 +00003192 *Resp = ShellPromptResponseQuit;
jcarseyc9d92df2010-02-03 15:37:54 +00003193 } else {
jcarseya405b862010-09-14 05:18:09 +00003194 *Resp = ShellPromptResponseContinue;
jcarseyc9d92df2010-02-03 15:37:54 +00003195 }
3196 break;
jcarseya405b862010-09-14 05:18:09 +00003197 case ShellPromptResponseTypeYesNoCancel:
jcarseyc9d92df2010-02-03 15:37:54 +00003198 if (Prompt != NULL) {
3199 ShellPrintEx(-1, -1, L"%s", Prompt);
3200 }
3201 //
3202 // wait for valid response
3203 //
jcarseya405b862010-09-14 05:18:09 +00003204 *Resp = ShellPromptResponseMax;
3205 while (*Resp == ShellPromptResponseMax) {
jcarseyc9d92df2010-02-03 15:37:54 +00003206 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3207 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3208 ASSERT_EFI_ERROR(Status);
3209 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3210 switch (Key.UnicodeChar) {
3211 case L'Y':
3212 case L'y':
jcarseya405b862010-09-14 05:18:09 +00003213 *Resp = ShellPromptResponseYes;
jcarseyc9d92df2010-02-03 15:37:54 +00003214 break;
3215 case L'N':
3216 case L'n':
jcarseya405b862010-09-14 05:18:09 +00003217 *Resp = ShellPromptResponseNo;
jcarseyc9d92df2010-02-03 15:37:54 +00003218 break;
3219 case L'C':
3220 case L'c':
jcarseya405b862010-09-14 05:18:09 +00003221 *Resp = ShellPromptResponseCancel;
3222 break;
3223 }
3224 }
3225 break; case ShellPromptResponseTypeYesNoAllCancel:
3226 if (Prompt != NULL) {
3227 ShellPrintEx(-1, -1, L"%s", Prompt);
3228 }
3229 //
3230 // wait for valid response
3231 //
3232 *Resp = ShellPromptResponseMax;
3233 while (*Resp == ShellPromptResponseMax) {
3234 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3235 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3236 ASSERT_EFI_ERROR(Status);
3237 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3238 switch (Key.UnicodeChar) {
3239 case L'Y':
3240 case L'y':
3241 *Resp = ShellPromptResponseYes;
3242 break;
3243 case L'N':
3244 case L'n':
3245 *Resp = ShellPromptResponseNo;
3246 break;
3247 case L'A':
3248 case L'a':
3249 *Resp = ShellPromptResponseAll;
3250 break;
3251 case L'C':
3252 case L'c':
3253 *Resp = ShellPromptResponseCancel;
jcarseyc9d92df2010-02-03 15:37:54 +00003254 break;
3255 }
3256 }
3257 break;
jcarseya405b862010-09-14 05:18:09 +00003258 case ShellPromptResponseTypeEnterContinue:
3259 case ShellPromptResponseTypeAnyKeyContinue:
jcarseyc9d92df2010-02-03 15:37:54 +00003260 if (Prompt != NULL) {
3261 ShellPrintEx(-1, -1, L"%s", Prompt);
3262 }
3263 //
3264 // wait for valid response
3265 //
jcarseya405b862010-09-14 05:18:09 +00003266 *Resp = ShellPromptResponseMax;
3267 while (*Resp == ShellPromptResponseMax) {
jcarseyc9d92df2010-02-03 15:37:54 +00003268 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
jcarseya405b862010-09-14 05:18:09 +00003269 if (Type == ShellPromptResponseTypeEnterContinue) {
jcarseyc9d92df2010-02-03 15:37:54 +00003270 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3271 ASSERT_EFI_ERROR(Status);
3272 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3273 if (Key.UnicodeChar == CHAR_CARRIAGE_RETURN) {
jcarseya405b862010-09-14 05:18:09 +00003274 *Resp = ShellPromptResponseContinue;
jcarseyc9d92df2010-02-03 15:37:54 +00003275 break;
3276 }
3277 }
jcarseya405b862010-09-14 05:18:09 +00003278 if (Type == ShellPromptResponseTypeAnyKeyContinue) {
3279 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3280 ASSERT_EFI_ERROR(Status);
3281 *Resp = ShellPromptResponseContinue;
jcarseyc9d92df2010-02-03 15:37:54 +00003282 break;
3283 }
3284 }
3285 break;
jcarseya405b862010-09-14 05:18:09 +00003286 case ShellPromptResponseTypeYesNo:
3287 if (Prompt != NULL) {
3288 ShellPrintEx(-1, -1, L"%s", Prompt);
3289 }
3290 //
3291 // wait for valid response
3292 //
3293 *Resp = ShellPromptResponseMax;
3294 while (*Resp == ShellPromptResponseMax) {
3295 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3296 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3297 ASSERT_EFI_ERROR(Status);
3298 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3299 switch (Key.UnicodeChar) {
3300 case L'Y':
3301 case L'y':
3302 *Resp = ShellPromptResponseYes;
3303 break;
3304 case L'N':
3305 case L'n':
3306 *Resp = ShellPromptResponseNo;
3307 break;
3308 }
3309 }
3310 break;
3311 case ShellPromptResponseTypeFreeform:
3312 if (Prompt != NULL) {
3313 ShellPrintEx(-1, -1, L"%s", Prompt);
3314 }
3315 while(1) {
3316 gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &EventIndex);
3317 Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
3318 ASSERT_EFI_ERROR(Status);
3319 ShellPrintEx(-1, -1, L"%c", Key.UnicodeChar);
3320 if (Key.UnicodeChar == CHAR_CARRIAGE_RETURN) {
3321 break;
3322 }
3323 ASSERT((Buffer == NULL && Size == 0) || (Buffer != NULL));
3324 StrnCatGrow(&Buffer, &Size, &Key.UnicodeChar, 1);
3325 }
3326 break;
3327 //
3328 // This is the location to add new prompt types.
3329 //
jcarseyc9d92df2010-02-03 15:37:54 +00003330 default:
jcarseya405b862010-09-14 05:18:09 +00003331 ASSERT(FALSE);
jcarseyc9d92df2010-02-03 15:37:54 +00003332 }
3333
3334 if (Response != NULL) {
jcarseya405b862010-09-14 05:18:09 +00003335 if (Resp != NULL) {
3336 *Response = Resp;
3337 } else if (Buffer != NULL) {
3338 *Response = Buffer;
3339 }
jcarseyc9d92df2010-02-03 15:37:54 +00003340 } else {
jcarseya405b862010-09-14 05:18:09 +00003341 if (Resp != NULL) {
3342 FreePool(Resp);
3343 }
3344 if (Buffer != NULL) {
3345 FreePool(Buffer);
3346 }
jcarseyc9d92df2010-02-03 15:37:54 +00003347 }
3348
jcarseya405b862010-09-14 05:18:09 +00003349 ShellPrintEx(-1, -1, L"\r\n");
jcarseyc9d92df2010-02-03 15:37:54 +00003350 return (Status);
3351}
3352
3353/**
3354 Prompt the user and return the resultant answer to the requestor.
3355
3356 This function is the same as ShellPromptForResponse, except that the prompt is
3357 automatically pulled from HII.
3358
3359 @param Type What type of question is asked. This is used to filter the input
3360 to prevent invalid answers to question.
jcarseya405b862010-09-14 05:18:09 +00003361 @param[in] HiiFormatStringId The format string Id for getting from Hii.
3362 @param[in] HiiFormatHandle The format string Handle for getting from Hii.
3363 @param Response Pointer to Response which will be populated upon return.
jcarseyc9d92df2010-02-03 15:37:54 +00003364
3365 @retval EFI_SUCCESS the operation was sucessful.
3366 @return other the operation failed.
3367
3368 @sa ShellPromptForResponse
3369**/
3370EFI_STATUS
3371EFIAPI
3372ShellPromptForResponseHii (
3373 IN SHELL_PROMPT_REQUEST_TYPE Type,
3374 IN CONST EFI_STRING_ID HiiFormatStringId,
3375 IN CONST EFI_HANDLE HiiFormatHandle,
3376 IN OUT VOID **Response
3377 )
3378{
3379 CHAR16 *Prompt;
3380 EFI_STATUS Status;
3381
3382 Prompt = HiiGetString(HiiFormatHandle, HiiFormatStringId, NULL);
3383 Status = ShellPromptForResponse(Type, Prompt, Response);
3384 FreePool(Prompt);
3385 return (Status);
3386}
3387
jcarseya405b862010-09-14 05:18:09 +00003388/**
3389 Function to determin if an entire string is a valid number.
jcarseyc9d92df2010-02-03 15:37:54 +00003390
jcarseya405b862010-09-14 05:18:09 +00003391 If Hex it must be preceeded with a 0x or has ForceHex, set TRUE.
3392
3393 @param[in] String The string to evaluate.
3394 @param[in] ForceHex TRUE - always assume hex.
3395 @param[in] StopAtSpace TRUE to halt upon finding a space, FALSE to keep going.
3396
3397 @retval TRUE It is all numeric (dec/hex) characters.
3398 @retval FALSE There is a non-numeric character.
3399**/
3400BOOLEAN
3401EFIAPI
jcarsey252d9452011-03-25 20:49:53 +00003402InternalShellIsHexOrDecimalNumber (
jcarseya405b862010-09-14 05:18:09 +00003403 IN CONST CHAR16 *String,
3404 IN CONST BOOLEAN ForceHex,
3405 IN CONST BOOLEAN StopAtSpace
3406 )
3407{
3408 BOOLEAN Hex;
3409
3410 //
3411 // chop off a single negative sign
3412 //
3413 if (String != NULL && *String == L'-') {
3414 String++;
3415 }
3416
3417 if (String == NULL) {
3418 return (FALSE);
3419 }
3420
3421 //
3422 // chop leading zeroes
3423 //
3424 while(String != NULL && *String == L'0'){
3425 String++;
3426 }
3427 //
3428 // allow '0x' or '0X', but not 'x' or 'X'
3429 //
3430 if (String != NULL && (*String == L'x' || *String == L'X')) {
3431 if (*(String-1) != L'0') {
3432 //
3433 // we got an x without a preceeding 0
3434 //
3435 return (FALSE);
3436 }
3437 String++;
3438 Hex = TRUE;
3439 } else if (ForceHex) {
3440 Hex = TRUE;
3441 } else {
3442 Hex = FALSE;
3443 }
3444
3445 //
3446 // loop through the remaining characters and use the lib function
3447 //
3448 for ( ; String != NULL && *String != CHAR_NULL && !(StopAtSpace && *String == L' ') ; String++){
3449 if (Hex) {
3450 if (!ShellIsHexaDecimalDigitCharacter(*String)) {
3451 return (FALSE);
3452 }
3453 } else {
3454 if (!ShellIsDecimalDigitCharacter(*String)) {
3455 return (FALSE);
3456 }
3457 }
3458 }
jcarsey252d9452011-03-25 20:49:53 +00003459
jcarseya405b862010-09-14 05:18:09 +00003460 return (TRUE);
3461}
3462
3463/**
3464 Function to determine if a given filename exists.
3465
3466 @param[in] Name Path to test.
3467
3468 @retval EFI_SUCCESS The Path represents a file.
3469 @retval EFI_NOT_FOUND The Path does not represent a file.
3470 @retval other The path failed to open.
3471**/
3472EFI_STATUS
3473EFIAPI
3474ShellFileExists(
3475 IN CONST CHAR16 *Name
3476 )
3477{
3478 EFI_STATUS Status;
3479 EFI_SHELL_FILE_INFO *List;
3480
3481 ASSERT(Name != NULL);
3482
3483 List = NULL;
3484 Status = ShellOpenFileMetaArg((CHAR16*)Name, EFI_FILE_MODE_READ, &List);
3485 if (EFI_ERROR(Status)) {
3486 return (Status);
3487 }
3488
3489 ShellCloseFileMetaArg(&List);
3490
3491 return (EFI_SUCCESS);
3492}
jcarsey252d9452011-03-25 20:49:53 +00003493
3494/**
3495 Convert a Unicode character to upper case only if
3496 it maps to a valid small-case ASCII character.
3497
3498 This internal function only deal with Unicode character
3499 which maps to a valid small-case ASCII character, i.e.
3500 L'a' to L'z'. For other Unicode character, the input character
3501 is returned directly.
3502
3503 @param Char The character to convert.
3504
3505 @retval LowerCharacter If the Char is with range L'a' to L'z'.
3506 @retval Unchanged Otherwise.
3507
3508**/
3509CHAR16
3510EFIAPI
3511InternalShellCharToUpper (
3512 IN CHAR16 Char
3513 )
3514{
3515 if (Char >= L'a' && Char <= L'z') {
3516 return (CHAR16) (Char - (L'a' - L'A'));
3517 }
3518
3519 return Char;
3520}
3521
3522/**
3523 Convert a Unicode character to numerical value.
3524
3525 This internal function only deal with Unicode character
3526 which maps to a valid hexadecimal ASII character, i.e.
3527 L'0' to L'9', L'a' to L'f' or L'A' to L'F'. For other
3528 Unicode character, the value returned does not make sense.
3529
3530 @param Char The character to convert.
3531
3532 @return The numerical value converted.
3533
3534**/
3535UINTN
3536EFIAPI
3537InternalShellHexCharToUintn (
3538 IN CHAR16 Char
3539 )
3540{
3541 if (ShellIsDecimalDigitCharacter (Char)) {
3542 return Char - L'0';
3543 }
3544
3545 return (UINTN) (10 + InternalShellCharToUpper (Char) - L'A');
3546}
3547
3548/**
3549 Convert a Null-terminated Unicode hexadecimal string to a value of type UINT64.
3550
3551 This function returns a value of type UINTN by interpreting the contents
3552 of the Unicode string specified by String as a hexadecimal number.
3553 The format of the input Unicode string String is:
3554
3555 [spaces][zeros][x][hexadecimal digits].
3556
3557 The valid hexadecimal digit character is in the range [0-9], [a-f] and [A-F].
3558 The prefix "0x" is optional. Both "x" and "X" is allowed in "0x" prefix.
3559 If "x" appears in the input string, it must be prefixed with at least one 0.
3560 The function will ignore the pad space, which includes spaces or tab characters,
3561 before [zeros], [x] or [hexadecimal digit]. The running zero before [x] or
3562 [hexadecimal digit] will be ignored. Then, the decoding starts after [x] or the
3563 first valid hexadecimal digit. Then, the function stops at the first character that is
3564 a not a valid hexadecimal character or NULL, whichever one comes first.
3565
3566 If String has only pad spaces, then zero is returned.
3567 If String has no leading pad spaces, leading zeros or valid hexadecimal digits,
3568 then zero is returned.
3569
3570 @param[in] String A pointer to a Null-terminated Unicode string.
3571 @param[out] Value Upon a successful return the value of the conversion.
3572 @param[in] StopAtSpace FALSE to skip spaces.
3573
3574 @retval EFI_SUCCESS The conversion was successful.
3575 @retval EFI_INVALID_PARAMETER A parameter was NULL or invalid.
3576 @retval EFI_DEVICE_ERROR An overflow occured.
3577**/
3578EFI_STATUS
3579EFIAPI
3580InternalShellStrHexToUint64 (
3581 IN CONST CHAR16 *String,
3582 OUT UINT64 *Value,
3583 IN CONST BOOLEAN StopAtSpace
3584 )
3585{
3586 UINT64 Result;
3587
3588 if (String == NULL || StrSize(String) == 0 || Value == NULL) {
3589 return (EFI_INVALID_PARAMETER);
3590 }
3591
3592 //
3593 // Ignore the pad spaces (space or tab)
3594 //
3595 while ((*String == L' ') || (*String == L'\t')) {
3596 String++;
3597 }
3598
3599 //
3600 // Ignore leading Zeros after the spaces
3601 //
3602 while (*String == L'0') {
3603 String++;
3604 }
3605
3606 if (InternalShellCharToUpper (*String) == L'X') {
3607 if (*(String - 1) != L'0') {
3608 return 0;
3609 }
3610 //
3611 // Skip the 'X'
3612 //
3613 String++;
3614 }
3615
3616 Result = 0;
3617
3618 //
3619 // Skip spaces if requested
3620 //
3621 while (StopAtSpace && *String == L' ') {
3622 String++;
3623 }
3624
3625 while (ShellIsHexaDecimalDigitCharacter (*String)) {
3626 //
3627 // If the Hex Number represented by String overflows according
3628 // to the range defined by UINTN, then ASSERT().
3629 //
3630 if (!(Result <= (RShiftU64((((UINT64) ~0) - InternalShellHexCharToUintn (*String)), 4)))) {
3631// if (!(Result <= ((((UINT64) ~0) - InternalShellHexCharToUintn (*String)) >> 4))) {
3632 return (EFI_DEVICE_ERROR);
3633 }
3634
3635 Result = (LShiftU64(Result, 4));
3636 Result += InternalShellHexCharToUintn (*String);
3637 String++;
3638
3639 //
3640 // Skip spaces if requested
3641 //
3642 while (StopAtSpace && *String == L' ') {
3643 String++;
3644 }
3645 }
3646
3647 *Value = Result;
3648 return (EFI_SUCCESS);
3649}
3650
3651/**
3652 Convert a Null-terminated Unicode decimal string to a value of
3653 type UINT64.
3654
3655 This function returns a value of type UINT64 by interpreting the contents
3656 of the Unicode string specified by String as a decimal number. The format
3657 of the input Unicode string String is:
3658
3659 [spaces] [decimal digits].
3660
3661 The valid decimal digit character is in the range [0-9]. The
3662 function will ignore the pad space, which includes spaces or
3663 tab characters, before [decimal digits]. The running zero in the
3664 beginning of [decimal digits] will be ignored. Then, the function
3665 stops at the first character that is a not a valid decimal character
3666 or a Null-terminator, whichever one comes first.
3667
3668 If String has only pad spaces, then 0 is returned.
3669 If String has no pad spaces or valid decimal digits,
3670 then 0 is returned.
3671
3672 @param[in] String A pointer to a Null-terminated Unicode string.
3673 @param[out] Value Upon a successful return the value of the conversion.
3674 @param[in] StopAtSpace FALSE to skip spaces.
3675
3676 @retval EFI_SUCCESS The conversion was successful.
3677 @retval EFI_INVALID_PARAMETER A parameter was NULL or invalid.
3678 @retval EFI_DEVICE_ERROR An overflow occured.
3679**/
3680EFI_STATUS
3681EFIAPI
3682InternalShellStrDecimalToUint64 (
3683 IN CONST CHAR16 *String,
3684 OUT UINT64 *Value,
3685 IN CONST BOOLEAN StopAtSpace
3686 )
3687{
3688 UINT64 Result;
3689
3690 if (String == NULL || StrSize (String) == 0 || Value == NULL) {
3691 return (EFI_INVALID_PARAMETER);
3692 }
3693
3694 //
3695 // Ignore the pad spaces (space or tab)
3696 //
3697 while ((*String == L' ') || (*String == L'\t')) {
3698 String++;
3699 }
3700
3701 //
3702 // Ignore leading Zeros after the spaces
3703 //
3704 while (*String == L'0') {
3705 String++;
3706 }
3707
3708 Result = 0;
3709
3710 //
3711 // Skip spaces if requested
3712 //
3713 while (StopAtSpace && *String == L' ') {
3714 String++;
3715 }
3716 while (ShellIsDecimalDigitCharacter (*String)) {
3717 //
3718 // If the number represented by String overflows according
3719 // to the range defined by UINT64, then ASSERT().
3720 //
3721
3722 if (!(Result <= (DivU64x32((((UINT64) ~0) - (*String - L'0')),10)))) {
3723 return (EFI_DEVICE_ERROR);
3724 }
3725
3726 Result = MultU64x32(Result, 10) + (*String - L'0');
3727 String++;
3728
3729 //
3730 // Stop at spaces if requested
3731 //
3732 if (StopAtSpace && *String == L' ') {
3733 break;
3734 }
3735 }
3736
3737 *Value = Result;
3738
3739 return (EFI_SUCCESS);
3740}
3741
3742/**
3743 Function to verify and convert a string to its numerical value.
3744
3745 If Hex it must be preceeded with a 0x, 0X, or has ForceHex set TRUE.
3746
3747 @param[in] String The string to evaluate.
3748 @param[out] Value Upon a successful return the value of the conversion.
3749 @param[in] ForceHex TRUE - always assume hex.
3750 @param[in] StopAtSpace FALSE to skip spaces.
3751
3752 @retval EFI_SUCCESS The conversion was successful.
3753 @retval EFI_INVALID_PARAMETER String contained an invalid character.
3754 @retval EFI_NOT_FOUND String was a number, but Value was NULL.
3755**/
3756EFI_STATUS
3757EFIAPI
3758ShellConvertStringToUint64(
3759 IN CONST CHAR16 *String,
3760 OUT UINT64 *Value,
3761 IN CONST BOOLEAN ForceHex,
3762 IN CONST BOOLEAN StopAtSpace
3763 )
3764{
3765 UINT64 RetVal;
3766 CONST CHAR16 *Walker;
3767 EFI_STATUS Status;
3768 BOOLEAN Hex;
3769
3770 Hex = ForceHex;
3771
3772 if (!InternalShellIsHexOrDecimalNumber(String, Hex, StopAtSpace)) {
3773 if (!Hex) {
3774 Hex = TRUE;
3775 if (!InternalShellIsHexOrDecimalNumber(String, Hex, StopAtSpace)) {
3776 return (EFI_INVALID_PARAMETER);
3777 }
3778 } else {
3779 return (EFI_INVALID_PARAMETER);
3780 }
3781 }
3782
3783 //
3784 // Chop off leading spaces
3785 //
3786 for (Walker = String; Walker != NULL && *Walker != CHAR_NULL && *Walker == L' '; Walker++);
3787
3788 //
3789 // make sure we have something left that is numeric.
3790 //
3791 if (Walker == NULL || *Walker == CHAR_NULL || !InternalShellIsHexOrDecimalNumber(Walker, Hex, StopAtSpace)) {
3792 return (EFI_INVALID_PARAMETER);
3793 }
3794
3795 //
3796 // do the conversion.
3797 //
3798 if (Hex || StrnCmp(Walker, L"0x", 2) == 0 || StrnCmp(Walker, L"0X", 2) == 0){
3799 Status = InternalShellStrHexToUint64(Walker, &RetVal, StopAtSpace);
3800 } else {
3801 Status = InternalShellStrDecimalToUint64(Walker, &RetVal, StopAtSpace);
3802 }
3803
3804 if (Value == NULL && !EFI_ERROR(Status)) {
3805 return (EFI_NOT_FOUND);
3806 }
3807
3808 if (Value != NULL) {
3809 *Value = RetVal;
3810 }
3811
3812 return (Status);
3813}
3814
3815/**
3816 Function to determin if an entire string is a valid number.
3817
3818 If Hex it must be preceeded with a 0x or has ForceHex, set TRUE.
3819
3820 @param[in] String The string to evaluate.
3821 @param[in] ForceHex TRUE - always assume hex.
3822 @param[in] StopAtSpace TRUE to halt upon finding a space, FALSE to keep going.
3823
3824 @retval TRUE It is all numeric (dec/hex) characters.
3825 @retval FALSE There is a non-numeric character.
3826**/
3827BOOLEAN
3828EFIAPI
3829ShellIsHexOrDecimalNumber (
3830 IN CONST CHAR16 *String,
3831 IN CONST BOOLEAN ForceHex,
3832 IN CONST BOOLEAN StopAtSpace
3833 )
3834{
3835 if (ShellConvertStringToUint64(String, NULL, ForceHex, StopAtSpace) == EFI_NOT_FOUND) {
3836 return (TRUE);
3837 }
3838 return (FALSE);
3839}
jcarsey4d0a4fc2011-07-06 22:28:36 +00003840
3841/**
3842 Function to read a single line from a SHELL_FILE_HANDLE. The \n is not included in the returned
3843 buffer. The returned buffer must be callee freed.
3844
3845 If the position upon start is 0, then the Ascii Boolean will be set. This should be
3846 maintained and not changed for all operations with the same file.
3847
ydong104ff7e372011-09-02 08:05:34 +00003848 @param[in] Handle SHELL_FILE_HANDLE to read from.
3849 @param[in, out] Ascii Boolean value for indicating whether the file is
3850 Ascii (TRUE) or UCS2 (FALSE).
jcarsey4d0a4fc2011-07-06 22:28:36 +00003851
jcarseybeab0fc2011-10-10 17:26:25 +00003852 @return The line of text from the file.
3853 @retval NULL There was not enough memory available.
jcarsey4d0a4fc2011-07-06 22:28:36 +00003854
3855 @sa ShellFileHandleReadLine
3856**/
3857CHAR16*
3858EFIAPI
3859ShellFileHandleReturnLine(
3860 IN SHELL_FILE_HANDLE Handle,
3861 IN OUT BOOLEAN *Ascii
3862 )
3863{
3864 CHAR16 *RetVal;
3865 UINTN Size;
3866 EFI_STATUS Status;
3867
3868 Size = 0;
3869 RetVal = NULL;
3870
3871 Status = ShellFileHandleReadLine(Handle, RetVal, &Size, FALSE, Ascii);
3872 if (Status == EFI_BUFFER_TOO_SMALL) {
3873 RetVal = AllocateZeroPool(Size);
jcarseybeab0fc2011-10-10 17:26:25 +00003874 if (RetVal == NULL) {
3875 return (NULL);
3876 }
jcarsey4d0a4fc2011-07-06 22:28:36 +00003877 Status = ShellFileHandleReadLine(Handle, RetVal, &Size, FALSE, Ascii);
jcarseybeab0fc2011-10-10 17:26:25 +00003878
jcarsey4d0a4fc2011-07-06 22:28:36 +00003879 }
jcarsey4d0a4fc2011-07-06 22:28:36 +00003880 if (EFI_ERROR(Status) && (RetVal != NULL)) {
3881 FreePool(RetVal);
3882 RetVal = NULL;
3883 }
3884 return (RetVal);
3885}
3886
3887/**
3888 Function to read a single line (up to but not including the \n) from a SHELL_FILE_HANDLE.
3889
3890 If the position upon start is 0, then the Ascii Boolean will be set. This should be
3891 maintained and not changed for all operations with the same file.
3892
ydong104ff7e372011-09-02 08:05:34 +00003893 @param[in] Handle SHELL_FILE_HANDLE to read from.
3894 @param[in, out] Buffer The pointer to buffer to read into.
3895 @param[in, out] Size The pointer to number of bytes in Buffer.
3896 @param[in] Truncate If the buffer is large enough, this has no effect.
3897 If the buffer is is too small and Truncate is TRUE,
3898 the line will be truncated.
3899 If the buffer is is too small and Truncate is FALSE,
3900 then no read will occur.
jcarsey4d0a4fc2011-07-06 22:28:36 +00003901
ydong104ff7e372011-09-02 08:05:34 +00003902 @param[in, out] Ascii Boolean value for indicating whether the file is
3903 Ascii (TRUE) or UCS2 (FALSE).
jcarsey4d0a4fc2011-07-06 22:28:36 +00003904
3905 @retval EFI_SUCCESS The operation was successful. The line is stored in
3906 Buffer.
3907 @retval EFI_INVALID_PARAMETER Handle was NULL.
3908 @retval EFI_INVALID_PARAMETER Size was NULL.
3909 @retval EFI_BUFFER_TOO_SMALL Size was not large enough to store the line.
3910 Size was updated to the minimum space required.
3911**/
3912EFI_STATUS
3913EFIAPI
3914ShellFileHandleReadLine(
3915 IN SHELL_FILE_HANDLE Handle,
3916 IN OUT CHAR16 *Buffer,
3917 IN OUT UINTN *Size,
3918 IN BOOLEAN Truncate,
3919 IN OUT BOOLEAN *Ascii
3920 )
3921{
3922 EFI_STATUS Status;
3923 CHAR16 CharBuffer;
3924 UINTN CharSize;
3925 UINTN CountSoFar;
3926 UINT64 OriginalFilePosition;
3927
3928
3929 if (Handle == NULL
3930 ||Size == NULL
3931 ){
3932 return (EFI_INVALID_PARAMETER);
3933 }
3934 if (Buffer == NULL) {
3935 ASSERT(*Size == 0);
3936 } else {
3937 *Buffer = CHAR_NULL;
3938 }
3939 gEfiShellProtocol->GetFilePosition(Handle, &OriginalFilePosition);
3940 if (OriginalFilePosition == 0) {
3941 CharSize = sizeof(CHAR16);
3942 Status = gEfiShellProtocol->ReadFile(Handle, &CharSize, &CharBuffer);
3943 ASSERT_EFI_ERROR(Status);
3944 if (CharBuffer == gUnicodeFileTag) {
3945 *Ascii = FALSE;
3946 } else {
3947 *Ascii = TRUE;
3948 gEfiShellProtocol->SetFilePosition(Handle, OriginalFilePosition);
3949 }
3950 }
3951
3952 for (CountSoFar = 0;;CountSoFar++){
3953 CharBuffer = 0;
3954 if (*Ascii) {
3955 CharSize = sizeof(CHAR8);
3956 } else {
3957 CharSize = sizeof(CHAR16);
3958 }
3959 Status = gEfiShellProtocol->ReadFile(Handle, &CharSize, &CharBuffer);
3960 if ( EFI_ERROR(Status)
3961 || CharSize == 0
3962 || (CharBuffer == L'\n' && !(*Ascii))
3963 || (CharBuffer == '\n' && *Ascii)
3964 ){
3965 break;
3966 }
3967 //
3968 // if we have space save it...
3969 //
3970 if ((CountSoFar+1)*sizeof(CHAR16) < *Size){
3971 ASSERT(Buffer != NULL);
3972 ((CHAR16*)Buffer)[CountSoFar] = CharBuffer;
3973 ((CHAR16*)Buffer)[CountSoFar+1] = CHAR_NULL;
3974 }
3975 }
3976
3977 //
3978 // if we ran out of space tell when...
3979 //
3980 if ((CountSoFar+1)*sizeof(CHAR16) > *Size){
3981 *Size = (CountSoFar+1)*sizeof(CHAR16);
3982 if (!Truncate) {
3983 gEfiShellProtocol->SetFilePosition(Handle, OriginalFilePosition);
3984 } else {
3985 DEBUG((DEBUG_WARN, "The line was truncated in ShellFileHandleReadLine"));
3986 }
3987 return (EFI_BUFFER_TOO_SMALL);
3988 }
3989 while(Buffer[StrLen(Buffer)-1] == L'\r') {
3990 Buffer[StrLen(Buffer)-1] = CHAR_NULL;
3991 }
3992
3993 return (Status);
3994}