2015-07-07 11:09:21 +02:00
|
|
|
/** @file
|
|
|
|
Implementation of EFI_HTTP_PROTOCOL protocol interfaces.
|
|
|
|
|
2017-01-06 04:53:57 +01:00
|
|
|
Copyright (c) 2015 - 2017, Intel Corporation. All rights reserved.<BR>
|
2016-03-04 23:07:50 +01:00
|
|
|
(C) Copyright 2015-2016 Hewlett Packard Enterprise Development LP<BR>
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
This program and the accompanying materials
|
|
|
|
are licensed and made available under the terms and conditions of the BSD License
|
|
|
|
which accompanies this distribution. The full text of the license may be found at
|
|
|
|
http://opensource.org/licenses/bsd-license.php.
|
|
|
|
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
|
|
|
|
**/
|
|
|
|
|
|
|
|
#include "HttpDriver.h"
|
|
|
|
|
|
|
|
EFI_HTTP_PROTOCOL mEfiHttpTemplate = {
|
|
|
|
EfiHttpGetModeData,
|
|
|
|
EfiHttpConfigure,
|
|
|
|
EfiHttpRequest,
|
|
|
|
EfiHttpCancel,
|
|
|
|
EfiHttpResponse,
|
|
|
|
EfiHttpPoll
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
Returns the operational parameters for the current HTTP child instance.
|
|
|
|
|
|
|
|
The GetModeData() function is used to read the current mode data (operational
|
|
|
|
parameters) for this HTTP protocol instance.
|
|
|
|
|
|
|
|
@param[in] This Pointer to EFI_HTTP_PROTOCOL instance.
|
|
|
|
@param[out] HttpConfigData Point to buffer for operational parameters of this
|
|
|
|
HTTP instance.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Operation succeeded.
|
|
|
|
@retval EFI_INVALID_PARAMETER One or more of the following conditions is TRUE:
|
|
|
|
This is NULL.
|
|
|
|
HttpConfigData is NULL.
|
2016-01-28 04:15:35 +01:00
|
|
|
HttpInstance->LocalAddressIsIPv6 is FALSE and
|
|
|
|
HttpConfigData->IPv4Node is NULL.
|
|
|
|
HttpInstance->LocalAddressIsIPv6 is TRUE and
|
|
|
|
HttpConfigData->IPv6Node is NULL.
|
|
|
|
@retval EFI_NOT_STARTED This EFI HTTP Protocol instance has not been started.
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
EfiHttpGetModeData (
|
|
|
|
IN EFI_HTTP_PROTOCOL *This,
|
|
|
|
OUT EFI_HTTP_CONFIG_DATA *HttpConfigData
|
|
|
|
)
|
|
|
|
{
|
|
|
|
HTTP_PROTOCOL *HttpInstance;
|
|
|
|
|
2016-01-28 04:15:35 +01:00
|
|
|
//
|
|
|
|
// Check input parameters.
|
|
|
|
//
|
2015-07-07 11:09:21 +02:00
|
|
|
if ((This == NULL) || (HttpConfigData == NULL)) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
2016-01-28 04:15:35 +01:00
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
HttpInstance = HTTP_INSTANCE_FROM_PROTOCOL (This);
|
|
|
|
ASSERT (HttpInstance != NULL);
|
2016-01-28 04:15:35 +01:00
|
|
|
|
|
|
|
if ((HttpInstance->LocalAddressIsIPv6 && HttpConfigData->AccessPoint.IPv6Node == NULL) ||
|
|
|
|
(!HttpInstance->LocalAddressIsIPv6 && HttpConfigData->AccessPoint.IPv4Node == NULL)) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
if (HttpInstance->State < HTTP_STATE_HTTP_CONFIGED) {
|
|
|
|
return EFI_NOT_STARTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpConfigData->HttpVersion = HttpInstance->HttpVersion;
|
|
|
|
HttpConfigData->TimeOutMillisec = HttpInstance->TimeOutMillisec;
|
|
|
|
HttpConfigData->LocalAddressIsIPv6 = HttpInstance->LocalAddressIsIPv6;
|
|
|
|
|
2015-11-09 04:30:42 +01:00
|
|
|
if (HttpInstance->LocalAddressIsIPv6) {
|
|
|
|
CopyMem (
|
2016-01-28 04:15:35 +01:00
|
|
|
HttpConfigData->AccessPoint.IPv6Node,
|
2015-11-09 04:30:42 +01:00
|
|
|
&HttpInstance->Ipv6Node,
|
|
|
|
sizeof (HttpInstance->Ipv6Node)
|
2015-07-07 11:09:21 +02:00
|
|
|
);
|
2015-11-09 04:30:42 +01:00
|
|
|
} else {
|
|
|
|
CopyMem (
|
2016-01-28 04:15:35 +01:00
|
|
|
HttpConfigData->AccessPoint.IPv4Node,
|
2015-11-09 04:30:42 +01:00
|
|
|
&HttpInstance->IPv4Node,
|
|
|
|
sizeof (HttpInstance->IPv4Node)
|
|
|
|
);
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Initialize or brutally reset the operational parameters for this EFI HTTP instance.
|
|
|
|
|
|
|
|
The Configure() function does the following:
|
|
|
|
When HttpConfigData is not NULL Initialize this EFI HTTP instance by configuring
|
|
|
|
timeout, local address, port, etc.
|
|
|
|
When HttpConfigData is NULL, reset this EFI HTTP instance by closing all active
|
|
|
|
connections with remote hosts, canceling all asynchronous tokens, and flush request
|
|
|
|
and response buffers without informing the appropriate hosts.
|
|
|
|
|
2016-01-28 04:15:35 +01:00
|
|
|
No other EFI HTTP function can be executed by this instance until the Configure()
|
|
|
|
function is executed and returns successfully.
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
@param[in] This Pointer to EFI_HTTP_PROTOCOL instance.
|
|
|
|
@param[in] HttpConfigData Pointer to the configure data to configure the instance.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Operation succeeded.
|
|
|
|
@retval EFI_INVALID_PARAMETER One or more of the following conditions is TRUE:
|
|
|
|
This is NULL.
|
|
|
|
HttpConfigData->LocalAddressIsIPv6 is FALSE and
|
|
|
|
HttpConfigData->IPv4Node is NULL.
|
|
|
|
HttpConfigData->LocalAddressIsIPv6 is TRUE and
|
|
|
|
HttpConfigData->IPv6Node is NULL.
|
|
|
|
@retval EFI_ALREADY_STARTED Reinitialize this HTTP instance without calling
|
|
|
|
Configure() with NULL to reset it.
|
|
|
|
@retval EFI_DEVICE_ERROR An unexpected system or network error occurred.
|
|
|
|
@retval EFI_OUT_OF_RESOURCES Could not allocate enough system resources when
|
|
|
|
executing Configure().
|
|
|
|
@retval EFI_UNSUPPORTED One or more options in HttpConfigData are not supported
|
|
|
|
in the implementation.
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
EfiHttpConfigure (
|
|
|
|
IN EFI_HTTP_PROTOCOL *This,
|
|
|
|
IN EFI_HTTP_CONFIG_DATA *HttpConfigData
|
|
|
|
)
|
|
|
|
{
|
|
|
|
HTTP_PROTOCOL *HttpInstance;
|
|
|
|
EFI_STATUS Status;
|
2015-11-09 04:30:42 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// Check input parameters.
|
|
|
|
//
|
2016-01-28 04:15:35 +01:00
|
|
|
if (This == NULL ||
|
2016-05-25 10:22:26 +02:00
|
|
|
(HttpConfigData != NULL &&
|
|
|
|
((HttpConfigData->LocalAddressIsIPv6 && HttpConfigData->AccessPoint.IPv6Node == NULL) ||
|
|
|
|
(!HttpConfigData->LocalAddressIsIPv6 && HttpConfigData->AccessPoint.IPv4Node == NULL)))) {
|
2015-07-07 11:09:21 +02:00
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpInstance = HTTP_INSTANCE_FROM_PROTOCOL (This);
|
|
|
|
ASSERT (HttpInstance != NULL && HttpInstance->Service != NULL);
|
|
|
|
|
|
|
|
if (HttpConfigData != NULL) {
|
2015-11-09 04:30:42 +01:00
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
|
|
|
// Now configure this HTTP instance.
|
|
|
|
//
|
|
|
|
if (HttpInstance->State != HTTP_STATE_UNCONFIGED) {
|
|
|
|
return EFI_ALREADY_STARTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpInstance->HttpVersion = HttpConfigData->HttpVersion;
|
|
|
|
HttpInstance->TimeOutMillisec = HttpConfigData->TimeOutMillisec;
|
|
|
|
HttpInstance->LocalAddressIsIPv6 = HttpConfigData->LocalAddressIsIPv6;
|
2015-11-09 04:30:42 +01:00
|
|
|
|
|
|
|
if (HttpConfigData->LocalAddressIsIPv6) {
|
|
|
|
CopyMem (
|
|
|
|
&HttpInstance->Ipv6Node,
|
|
|
|
HttpConfigData->AccessPoint.IPv6Node,
|
|
|
|
sizeof (HttpInstance->Ipv6Node)
|
|
|
|
);
|
2015-07-07 11:09:21 +02:00
|
|
|
} else {
|
|
|
|
CopyMem (
|
|
|
|
&HttpInstance->IPv4Node,
|
|
|
|
HttpConfigData->AccessPoint.IPv4Node,
|
|
|
|
sizeof (HttpInstance->IPv4Node)
|
|
|
|
);
|
|
|
|
}
|
2016-04-26 10:46:33 +02:00
|
|
|
|
2015-11-09 04:30:42 +01:00
|
|
|
//
|
|
|
|
// Creat Tcp child
|
|
|
|
//
|
|
|
|
Status = HttpInitProtocol (HttpInstance, HttpInstance->LocalAddressIsIPv6);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
return Status;
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpInstance->State = HTTP_STATE_HTTP_CONFIGED;
|
|
|
|
return EFI_SUCCESS;
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
} else {
|
2015-11-09 04:30:42 +01:00
|
|
|
//
|
|
|
|
// Reset all the resources related to HttpInsance.
|
|
|
|
//
|
|
|
|
HttpCleanProtocol (HttpInstance);
|
|
|
|
HttpInstance->State = HTTP_STATE_UNCONFIGED;
|
|
|
|
return EFI_SUCCESS;
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
The Request() function queues an HTTP request to this HTTP instance.
|
|
|
|
|
|
|
|
Similar to Transmit() function in the EFI TCP driver. When the HTTP request is sent
|
|
|
|
successfully, or if there is an error, Status in token will be updated and Event will
|
|
|
|
be signaled.
|
|
|
|
|
|
|
|
@param[in] This Pointer to EFI_HTTP_PROTOCOL instance.
|
|
|
|
@param[in] Token Pointer to storage containing HTTP request token.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Outgoing data was processed.
|
|
|
|
@retval EFI_NOT_STARTED This EFI HTTP Protocol instance has not been started.
|
|
|
|
@retval EFI_DEVICE_ERROR An unexpected system or network error occurred.
|
|
|
|
@retval EFI_TIMEOUT Data was dropped out of the transmit or receive queue.
|
|
|
|
@retval EFI_OUT_OF_RESOURCES Could not allocate enough system resources.
|
|
|
|
@retval EFI_UNSUPPORTED The HTTP method is not supported in current
|
|
|
|
implementation.
|
|
|
|
@retval EFI_INVALID_PARAMETER One or more of the following conditions is TRUE:
|
|
|
|
This is NULL.
|
2016-01-28 04:15:35 +01:00
|
|
|
Token is NULL.
|
2015-07-07 11:09:21 +02:00
|
|
|
Token->Message is NULL.
|
|
|
|
Token->Message->Body is not NULL,
|
|
|
|
Token->Message->BodyLength is non-zero, and
|
|
|
|
Token->Message->Data is NULL, but a previous call to
|
|
|
|
Request()has not been completed successfully.
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
EfiHttpRequest (
|
|
|
|
IN EFI_HTTP_PROTOCOL *This,
|
|
|
|
IN EFI_HTTP_TOKEN *Token
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_HTTP_MESSAGE *HttpMsg;
|
|
|
|
EFI_HTTP_REQUEST_DATA *Request;
|
|
|
|
VOID *UrlParser;
|
|
|
|
EFI_STATUS Status;
|
|
|
|
CHAR8 *HostName;
|
2016-06-15 07:38:03 +02:00
|
|
|
UINTN HostNameSize;
|
2015-07-07 11:09:21 +02:00
|
|
|
UINT16 RemotePort;
|
|
|
|
HTTP_PROTOCOL *HttpInstance;
|
|
|
|
BOOLEAN Configure;
|
|
|
|
BOOLEAN ReConfigure;
|
2016-12-14 03:57:41 +01:00
|
|
|
BOOLEAN TlsConfigure;
|
2016-04-04 12:09:28 +02:00
|
|
|
CHAR8 *RequestMsg;
|
2015-07-07 11:09:21 +02:00
|
|
|
CHAR8 *Url;
|
2015-09-14 11:05:49 +02:00
|
|
|
UINTN UrlLen;
|
2015-07-07 11:09:21 +02:00
|
|
|
CHAR16 *HostNameStr;
|
|
|
|
HTTP_TOKEN_WRAP *Wrap;
|
2015-08-22 14:35:19 +02:00
|
|
|
CHAR8 *FileUrl;
|
2016-04-04 12:09:28 +02:00
|
|
|
UINTN RequestMsgSize;
|
2017-01-22 02:40:30 +01:00
|
|
|
EFI_HANDLE ImageHandle;
|
2016-05-06 12:20:00 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// Initializations
|
|
|
|
//
|
|
|
|
Url = NULL;
|
2016-05-23 05:02:01 +02:00
|
|
|
UrlParser = NULL;
|
2016-05-25 10:22:26 +02:00
|
|
|
RemotePort = 0;
|
2016-05-06 12:20:00 +02:00
|
|
|
HostName = NULL;
|
|
|
|
RequestMsg = NULL;
|
|
|
|
HostNameStr = NULL;
|
|
|
|
Wrap = NULL;
|
|
|
|
FileUrl = NULL;
|
2016-12-14 03:57:41 +01:00
|
|
|
TlsConfigure = FALSE;
|
2016-05-06 12:20:00 +02:00
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
if ((This == NULL) || (Token == NULL)) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpMsg = Token->Message;
|
2016-05-06 12:20:00 +02:00
|
|
|
if (HttpMsg == NULL) {
|
2015-07-07 11:09:21 +02:00
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
Request = HttpMsg->Data.Request;
|
|
|
|
|
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
// Only support GET, HEAD, PUT and POST method in current implementation.
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
if ((Request != NULL) && (Request->Method != HttpMethodGet) &&
|
|
|
|
(Request->Method != HttpMethodHead) && (Request->Method != HttpMethodPut) && (Request->Method != HttpMethodPost)) {
|
2015-07-07 11:09:21 +02:00
|
|
|
return EFI_UNSUPPORTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpInstance = HTTP_INSTANCE_FROM_PROTOCOL (This);
|
|
|
|
ASSERT (HttpInstance != NULL);
|
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
//
|
|
|
|
// Capture the method into HttpInstance.
|
|
|
|
//
|
|
|
|
if (Request != NULL) {
|
|
|
|
HttpInstance->Method = Request->Method;
|
|
|
|
}
|
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
if (HttpInstance->State < HTTP_STATE_HTTP_CONFIGED) {
|
|
|
|
return EFI_NOT_STARTED;
|
|
|
|
}
|
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
if (Request == NULL) {
|
|
|
|
//
|
|
|
|
// Request would be NULL only for PUT/POST operation (in the current implementation)
|
|
|
|
//
|
|
|
|
if ((HttpInstance->Method != HttpMethodPut) && (HttpInstance->Method != HttpMethodPost)) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
//
|
|
|
|
// For PUT/POST, we need to have the TCP already configured. Bail out if it is not!
|
|
|
|
//
|
|
|
|
if (HttpInstance->State < HTTP_STATE_TCP_CONFIGED) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
//
|
|
|
|
// We need to have the Message Body for sending the HTTP message across in these cases.
|
|
|
|
//
|
|
|
|
if (HttpMsg->Body == NULL || HttpMsg->BodyLength == 0) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
2015-09-14 11:05:49 +02:00
|
|
|
}
|
2015-11-09 04:30:42 +01:00
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
//
|
|
|
|
// Use existing TCP instance to transmit the packet.
|
|
|
|
//
|
|
|
|
Configure = FALSE;
|
|
|
|
ReConfigure = FALSE;
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// Check whether the token already existed.
|
|
|
|
//
|
|
|
|
if (EFI_ERROR (NetMapIterate (&HttpInstance->TxTokens, HttpTokenExist, Token))) {
|
|
|
|
return EFI_ACCESS_DENIED;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
//
|
|
|
|
// Parse the URI of the remote host.
|
|
|
|
//
|
|
|
|
Url = HttpInstance->Url;
|
|
|
|
UrlLen = StrLen (Request->Url) + 1;
|
|
|
|
if (UrlLen > HTTP_URL_BUFFER_LEN) {
|
|
|
|
Url = AllocateZeroPool (UrlLen);
|
|
|
|
if (Url == NULL) {
|
|
|
|
return EFI_OUT_OF_RESOURCES;
|
|
|
|
}
|
|
|
|
FreePool (HttpInstance->Url);
|
|
|
|
HttpInstance->Url = Url;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
|
2016-06-15 07:38:03 +02:00
|
|
|
UnicodeStrToAsciiStrS (Request->Url, Url, UrlLen);
|
2016-12-14 03:57:41 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// From the information in Url, the HTTP instance will
|
|
|
|
// be able to determine whether to use http or https.
|
|
|
|
//
|
|
|
|
HttpInstance->UseHttps = IsHttpsUrl (Url);
|
|
|
|
|
2017-01-06 04:53:57 +01:00
|
|
|
//
|
|
|
|
// HTTP is disabled, return directly if the URI is not HTTPS.
|
|
|
|
//
|
|
|
|
if (!PcdGetBool (PcdAllowHttpConnections) && !(HttpInstance->UseHttps)) {
|
|
|
|
|
|
|
|
DEBUG ((EFI_D_ERROR, "EfiHttpRequest: HTTP is disabled.\n"));
|
|
|
|
|
|
|
|
return EFI_ACCESS_DENIED;
|
|
|
|
}
|
|
|
|
|
2016-12-14 03:57:41 +01:00
|
|
|
//
|
|
|
|
// Check whether we need to create Tls child and open the TLS protocol.
|
|
|
|
//
|
|
|
|
if (HttpInstance->UseHttps && HttpInstance->TlsChildHandle == NULL) {
|
|
|
|
//
|
|
|
|
// Use TlsSb to create Tls child and open the TLS protocol.
|
|
|
|
//
|
2017-01-22 02:40:30 +01:00
|
|
|
if (HttpInstance->LocalAddressIsIPv6) {
|
|
|
|
ImageHandle = HttpInstance->Service->Ip6DriverBindingHandle;
|
|
|
|
} else {
|
|
|
|
ImageHandle = HttpInstance->Service->Ip4DriverBindingHandle;
|
|
|
|
}
|
|
|
|
|
2016-12-14 03:57:41 +01:00
|
|
|
HttpInstance->TlsChildHandle = TlsCreateChild (
|
2017-01-22 02:40:30 +01:00
|
|
|
ImageHandle,
|
2016-12-14 03:57:41 +01:00
|
|
|
&(HttpInstance->Tls),
|
|
|
|
&(HttpInstance->TlsConfiguration)
|
|
|
|
);
|
|
|
|
if (HttpInstance->TlsChildHandle == NULL) {
|
|
|
|
return EFI_DEVICE_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
TlsConfigure = TRUE;
|
|
|
|
}
|
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
UrlParser = NULL;
|
|
|
|
Status = HttpParseUrl (Url, (UINT32) AsciiStrLen (Url), FALSE, &UrlParser);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error1;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
HostName = NULL;
|
|
|
|
Status = HttpUrlGetHostName (Url, UrlParser, &HostName);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error1;
|
|
|
|
}
|
|
|
|
|
|
|
|
Status = HttpUrlGetPort (Url, UrlParser, &RemotePort);
|
|
|
|
if (EFI_ERROR (Status)) {
|
2016-12-14 03:57:41 +01:00
|
|
|
if (HttpInstance->UseHttps) {
|
|
|
|
RemotePort = HTTPS_DEFAULT_PORT;
|
|
|
|
} else {
|
|
|
|
RemotePort = HTTP_DEFAULT_PORT;
|
|
|
|
}
|
2016-05-06 12:20:00 +02:00
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
// If Configure is TRUE, it indicates the first time to call Request();
|
|
|
|
// If ReConfigure is TRUE, it indicates the request URL is not same
|
|
|
|
// with the previous call to Request();
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
Configure = TRUE;
|
|
|
|
ReConfigure = TRUE;
|
|
|
|
|
|
|
|
if (HttpInstance->RemoteHost == NULL) {
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
// Request() is called the first time.
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
ReConfigure = FALSE;
|
|
|
|
} else {
|
|
|
|
if ((HttpInstance->RemotePort == RemotePort) &&
|
2016-12-14 03:57:41 +01:00
|
|
|
(AsciiStrCmp (HttpInstance->RemoteHost, HostName) == 0) &&
|
|
|
|
(!HttpInstance->UseHttps || (HttpInstance->UseHttps &&
|
|
|
|
!TlsConfigure &&
|
|
|
|
HttpInstance->TlsSessionState == EfiTlsSessionDataTransferring))) {
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
// Host Name and port number of the request URL are the same with previous call to Request().
|
2016-12-14 03:57:41 +01:00
|
|
|
// If Https protocol used, the corresponding SessionState is EfiTlsSessionDataTransferring.
|
2016-05-06 12:20:00 +02:00
|
|
|
// Check whether previous TCP packet sent out.
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
if (EFI_ERROR (NetMapIterate (&HttpInstance->TxTokens, HttpTcpNotReady, NULL))) {
|
|
|
|
//
|
|
|
|
// Wrap the HTTP token in HTTP_TOKEN_WRAP
|
|
|
|
//
|
|
|
|
Wrap = AllocateZeroPool (sizeof (HTTP_TOKEN_WRAP));
|
|
|
|
if (Wrap == NULL) {
|
|
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
|
|
goto Error1;
|
|
|
|
}
|
|
|
|
|
|
|
|
Wrap->HttpToken = Token;
|
|
|
|
Wrap->HttpInstance = HttpInstance;
|
|
|
|
|
|
|
|
Status = HttpCreateTcpTxEvent (Wrap);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error1;
|
|
|
|
}
|
|
|
|
|
|
|
|
Status = NetMapInsertTail (&HttpInstance->TxTokens, Token, Wrap);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error1;
|
|
|
|
}
|
|
|
|
|
|
|
|
Wrap->TcpWrap.Method = Request->Method;
|
|
|
|
|
|
|
|
FreePool (HostName);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Queue the HTTP token and return.
|
|
|
|
//
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// Use existing TCP instance to transmit the packet.
|
|
|
|
//
|
|
|
|
Configure = FALSE;
|
|
|
|
ReConfigure = FALSE;
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
// Need close existing TCP instance and create a new TCP instance for data transmit.
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
if (HttpInstance->RemoteHost != NULL) {
|
|
|
|
FreePool (HttpInstance->RemoteHost);
|
|
|
|
HttpInstance->RemoteHost = NULL;
|
|
|
|
HttpInstance->RemotePort = 0;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Configure) {
|
|
|
|
//
|
2015-11-09 04:30:42 +01:00
|
|
|
// Parse Url for IPv4 or IPv6 address, if failed, perform DNS resolution.
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
2015-11-09 04:30:42 +01:00
|
|
|
if (!HttpInstance->LocalAddressIsIPv6) {
|
|
|
|
Status = NetLibAsciiStrToIp4 (HostName, &HttpInstance->RemoteAddr);
|
|
|
|
} else {
|
2015-11-09 08:00:20 +01:00
|
|
|
Status = HttpUrlGetIp6 (Url, UrlParser, &HttpInstance->RemoteIpv6Addr);
|
2015-11-09 04:30:42 +01:00
|
|
|
}
|
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
if (EFI_ERROR (Status)) {
|
2016-06-15 07:38:03 +02:00
|
|
|
HostNameSize = AsciiStrSize (HostName);
|
|
|
|
HostNameStr = AllocateZeroPool (HostNameSize * sizeof (CHAR16));
|
2015-07-07 11:09:21 +02:00
|
|
|
if (HostNameStr == NULL) {
|
|
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
|
|
goto Error1;
|
|
|
|
}
|
2015-11-09 04:30:42 +01:00
|
|
|
|
2016-06-15 07:38:03 +02:00
|
|
|
AsciiStrToUnicodeStrS (HostName, HostNameStr, HostNameSize);
|
2015-11-09 04:30:42 +01:00
|
|
|
if (!HttpInstance->LocalAddressIsIPv6) {
|
|
|
|
Status = HttpDns4 (HttpInstance, HostNameStr, &HttpInstance->RemoteAddr);
|
|
|
|
} else {
|
|
|
|
Status = HttpDns6 (HttpInstance, HostNameStr, &HttpInstance->RemoteIpv6Addr);
|
|
|
|
}
|
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
FreePool (HostNameStr);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Save the RemotePort and RemoteHost.
|
|
|
|
//
|
|
|
|
ASSERT (HttpInstance->RemoteHost == NULL);
|
|
|
|
HttpInstance->RemotePort = RemotePort;
|
|
|
|
HttpInstance->RemoteHost = HostName;
|
|
|
|
HostName = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ReConfigure) {
|
|
|
|
//
|
|
|
|
// The request URL is different from previous calls to Request(), close existing TCP instance.
|
|
|
|
//
|
2015-11-13 10:35:54 +01:00
|
|
|
if (!HttpInstance->LocalAddressIsIPv6) {
|
|
|
|
ASSERT (HttpInstance->Tcp4 != NULL);
|
|
|
|
} else {
|
|
|
|
ASSERT (HttpInstance->Tcp6 != NULL);
|
|
|
|
}
|
2016-12-14 03:57:41 +01:00
|
|
|
|
|
|
|
if (HttpInstance->UseHttps && !TlsConfigure) {
|
|
|
|
Status = TlsCloseSession (HttpInstance);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error1;
|
|
|
|
}
|
|
|
|
|
|
|
|
TlsCloseTxRxEvent (HttpInstance);
|
|
|
|
}
|
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
HttpCloseConnection (HttpInstance);
|
|
|
|
EfiHttpCancel (This, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Wrap the HTTP token in HTTP_TOKEN_WRAP
|
|
|
|
//
|
|
|
|
Wrap = AllocateZeroPool (sizeof (HTTP_TOKEN_WRAP));
|
|
|
|
if (Wrap == NULL) {
|
|
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
|
|
goto Error1;
|
|
|
|
}
|
|
|
|
|
|
|
|
Wrap->HttpToken = Token;
|
|
|
|
Wrap->HttpInstance = HttpInstance;
|
2016-05-06 12:20:00 +02:00
|
|
|
if (Request != NULL) {
|
|
|
|
Wrap->TcpWrap.Method = Request->Method;
|
|
|
|
}
|
2016-12-14 03:57:41 +01:00
|
|
|
|
|
|
|
Status = HttpInitSession (
|
|
|
|
HttpInstance,
|
|
|
|
Wrap,
|
|
|
|
Configure || ReConfigure,
|
|
|
|
TlsConfigure
|
|
|
|
);
|
2015-11-13 10:35:54 +01:00
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error2;
|
2016-12-14 03:57:41 +01:00
|
|
|
}
|
2015-11-09 04:30:42 +01:00
|
|
|
|
2016-12-14 03:57:41 +01:00
|
|
|
if (!Configure && !ReConfigure && !TlsConfigure) {
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
|
|
|
// For the new HTTP token, create TX TCP token events.
|
|
|
|
//
|
2015-11-09 04:30:42 +01:00
|
|
|
Status = HttpCreateTcpTxEvent (Wrap);
|
2015-07-07 11:09:21 +02:00
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error1;
|
|
|
|
}
|
|
|
|
}
|
2015-11-13 10:35:54 +01:00
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
|
|
|
// Create request message.
|
|
|
|
//
|
2015-08-22 14:35:19 +02:00
|
|
|
FileUrl = Url;
|
2016-05-06 12:20:00 +02:00
|
|
|
if (Url != NULL && *FileUrl != '/') {
|
2015-08-22 14:35:19 +02:00
|
|
|
//
|
|
|
|
// Convert the absolute-URI to the absolute-path
|
|
|
|
//
|
|
|
|
while (*FileUrl != ':') {
|
|
|
|
FileUrl++;
|
|
|
|
}
|
|
|
|
if ((*(FileUrl+1) == '/') && (*(FileUrl+2) == '/')) {
|
|
|
|
FileUrl += 3;
|
|
|
|
while (*FileUrl != '/') {
|
|
|
|
FileUrl++;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
Status = EFI_INVALID_PARAMETER;
|
|
|
|
goto Error3;
|
|
|
|
}
|
|
|
|
}
|
2016-03-04 23:07:50 +01:00
|
|
|
|
2016-04-04 12:09:28 +02:00
|
|
|
Status = HttpGenRequestMessage (HttpMsg, FileUrl, &RequestMsg, &RequestMsgSize);
|
2016-03-04 23:07:50 +01:00
|
|
|
|
2016-12-23 04:13:21 +01:00
|
|
|
if (EFI_ERROR (Status) || NULL == RequestMsg) {
|
2015-07-07 11:09:21 +02:00
|
|
|
goto Error3;
|
|
|
|
}
|
|
|
|
|
2016-12-23 04:13:21 +01:00
|
|
|
ASSERT (RequestMsg != NULL);
|
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
//
|
|
|
|
// Every request we insert a TxToken and a response call would remove the TxToken.
|
|
|
|
// In cases of PUT/POST, after an initial request-response pair, we would do a
|
|
|
|
// continuous request without a response call. So, in such cases, where Request
|
|
|
|
// structure is NULL, we would not insert a TxToken.
|
|
|
|
//
|
|
|
|
if (Request != NULL) {
|
|
|
|
Status = NetMapInsertTail (&HttpInstance->TxTokens, Token, Wrap);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error4;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Transmit the request message.
|
|
|
|
//
|
2015-11-09 04:30:42 +01:00
|
|
|
Status = HttpTransmitTcp (
|
2015-07-07 11:09:21 +02:00
|
|
|
HttpInstance,
|
|
|
|
Wrap,
|
2016-04-04 12:09:28 +02:00
|
|
|
(UINT8*) RequestMsg,
|
|
|
|
RequestMsgSize
|
2015-07-07 11:09:21 +02:00
|
|
|
);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error5;
|
|
|
|
}
|
|
|
|
|
2015-09-14 11:06:26 +02:00
|
|
|
DispatchDpc ();
|
2015-11-09 04:30:42 +01:00
|
|
|
|
2015-10-30 07:47:54 +01:00
|
|
|
if (HostName != NULL) {
|
|
|
|
FreePool (HostName);
|
|
|
|
}
|
2015-11-09 04:30:42 +01:00
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
return EFI_SUCCESS;
|
|
|
|
|
|
|
|
Error5:
|
2016-05-31 16:17:27 +02:00
|
|
|
//
|
|
|
|
// We would have inserted a TxToken only if Request structure is not NULL.
|
|
|
|
// Hence check before we do a remove in this error case.
|
|
|
|
//
|
|
|
|
if (Request != NULL) {
|
|
|
|
NetMapRemoveTail (&HttpInstance->TxTokens, NULL);
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
Error4:
|
2016-04-04 12:09:28 +02:00
|
|
|
if (RequestMsg != NULL) {
|
|
|
|
FreePool (RequestMsg);
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
Error3:
|
2016-12-14 03:57:41 +01:00
|
|
|
if (HttpInstance->UseHttps) {
|
|
|
|
TlsCloseSession (HttpInstance);
|
|
|
|
TlsCloseTxRxEvent (HttpInstance);
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
Error2:
|
2016-12-14 03:57:41 +01:00
|
|
|
HttpCloseConnection (HttpInstance);
|
|
|
|
|
2015-11-09 04:30:42 +01:00
|
|
|
HttpCloseTcpConnCloseEvent (HttpInstance);
|
|
|
|
if (NULL != Wrap->TcpWrap.Tx4Token.CompletionToken.Event) {
|
|
|
|
gBS->CloseEvent (Wrap->TcpWrap.Tx4Token.CompletionToken.Event);
|
|
|
|
Wrap->TcpWrap.Tx4Token.CompletionToken.Event = NULL;
|
|
|
|
}
|
|
|
|
if (NULL != Wrap->TcpWrap.Tx6Token.CompletionToken.Event) {
|
|
|
|
gBS->CloseEvent (Wrap->TcpWrap.Tx6Token.CompletionToken.Event);
|
|
|
|
Wrap->TcpWrap.Tx6Token.CompletionToken.Event = NULL;
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
Error1:
|
|
|
|
if (HostName != NULL) {
|
|
|
|
FreePool (HostName);
|
|
|
|
}
|
|
|
|
if (Wrap != NULL) {
|
|
|
|
FreePool (Wrap);
|
|
|
|
}
|
|
|
|
if (UrlParser!= NULL) {
|
|
|
|
HttpUrlFreeParser (UrlParser);
|
|
|
|
}
|
|
|
|
|
|
|
|
return Status;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-11-09 04:30:42 +01:00
|
|
|
Cancel a user's Token.
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
@param[in] Map The HTTP instance's token queue.
|
|
|
|
@param[in] Item Object container for one HTTP token and token's wrap.
|
|
|
|
@param[in] Context The user's token to cancel.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Continue to check the next Item.
|
|
|
|
@retval EFI_ABORTED The user's Token (Token != NULL) is cancelled.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
HttpCancelTokens (
|
|
|
|
IN NET_MAP *Map,
|
|
|
|
IN NET_MAP_ITEM *Item,
|
|
|
|
IN VOID *Context
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_HTTP_TOKEN *Token;
|
|
|
|
HTTP_TOKEN_WRAP *Wrap;
|
2015-11-09 04:30:42 +01:00
|
|
|
HTTP_PROTOCOL *HttpInstance;
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
Token = (EFI_HTTP_TOKEN *) Context;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Return EFI_SUCCESS to check the next item in the map if
|
|
|
|
// this one doesn't match.
|
|
|
|
//
|
|
|
|
if ((Token != NULL) && (Token != Item->Key)) {
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
Wrap = (HTTP_TOKEN_WRAP *) Item->Value;
|
|
|
|
ASSERT (Wrap != NULL);
|
2015-11-09 04:30:42 +01:00
|
|
|
HttpInstance = Wrap->HttpInstance;
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2015-11-09 04:30:42 +01:00
|
|
|
if (!HttpInstance->LocalAddressIsIPv6) {
|
|
|
|
if (Wrap->TcpWrap.Rx4Token.CompletionToken.Event != NULL) {
|
2016-05-31 16:17:27 +02:00
|
|
|
//
|
|
|
|
// Cancle the Token before close its Event.
|
|
|
|
//
|
|
|
|
HttpInstance->Tcp4->Cancel (HttpInstance->Tcp4, &Wrap->TcpWrap.Rx4Token.CompletionToken);
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2016-05-31 16:17:27 +02:00
|
|
|
//
|
|
|
|
// Dispatch the DPC queued by the NotifyFunction of the canceled token's events.
|
|
|
|
//
|
|
|
|
DispatchDpc ();
|
2015-11-09 04:30:42 +01:00
|
|
|
}
|
2016-05-31 16:17:27 +02:00
|
|
|
} else {
|
2015-11-09 04:30:42 +01:00
|
|
|
if (Wrap->TcpWrap.Rx6Token.CompletionToken.Event != NULL) {
|
2016-05-31 16:17:27 +02:00
|
|
|
//
|
|
|
|
// Cancle the Token before close its Event.
|
|
|
|
//
|
|
|
|
HttpInstance->Tcp6->Cancel (HttpInstance->Tcp6, &Wrap->TcpWrap.Rx6Token.CompletionToken);
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2016-05-31 16:17:27 +02:00
|
|
|
//
|
|
|
|
// Dispatch the DPC queued by the NotifyFunction of the canceled token's events.
|
|
|
|
//
|
|
|
|
DispatchDpc ();
|
2015-11-09 04:30:42 +01:00
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// If only one item is to be cancel, return EFI_ABORTED to stop
|
|
|
|
// iterating the map any more.
|
|
|
|
//
|
|
|
|
if (Token != NULL) {
|
|
|
|
return EFI_ABORTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Cancel the user's receive/transmit request. It is the worker function of
|
|
|
|
EfiHttpCancel API. If a matching token is found, it will call HttpCancelTokens to cancel the
|
|
|
|
token.
|
|
|
|
|
|
|
|
@param[in] HttpInstance Pointer to HTTP_PROTOCOL structure.
|
|
|
|
@param[in] Token The token to cancel. If NULL, all token will be
|
|
|
|
cancelled.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS The token is cancelled.
|
|
|
|
@retval EFI_NOT_FOUND The asynchronous request or response token is not found.
|
|
|
|
@retval Others Other error as indicated.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
HttpCancel (
|
|
|
|
IN HTTP_PROTOCOL *HttpInstance,
|
|
|
|
IN EFI_HTTP_TOKEN *Token
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_STATUS Status;
|
|
|
|
|
|
|
|
//
|
|
|
|
// First check the tokens queued by EfiHttpRequest().
|
|
|
|
//
|
|
|
|
Status = NetMapIterate (&HttpInstance->TxTokens, HttpCancelTokens, Token);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
if (Token != NULL) {
|
|
|
|
if (Status == EFI_ABORTED) {
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return Status;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-14 03:57:41 +01:00
|
|
|
if (!HttpInstance->UseHttps) {
|
|
|
|
//
|
|
|
|
// Then check the tokens queued by EfiHttpResponse(), except for Https.
|
|
|
|
//
|
|
|
|
Status = NetMapIterate (&HttpInstance->RxTokens, HttpCancelTokens, Token);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
if (Token != NULL) {
|
|
|
|
if (Status == EFI_ABORTED) {
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
} else {
|
|
|
|
return EFI_NOT_FOUND;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
} else {
|
2016-12-14 03:57:41 +01:00
|
|
|
return Status;
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
2016-12-14 03:57:41 +01:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (!HttpInstance->LocalAddressIsIPv6) {
|
|
|
|
HttpInstance->Tcp4->Cancel (HttpInstance->Tcp4, &HttpInstance->Tcp4TlsRxToken.CompletionToken);
|
2015-07-07 11:09:21 +02:00
|
|
|
} else {
|
2016-12-14 03:57:41 +01:00
|
|
|
HttpInstance->Tcp6->Cancel (HttpInstance->Tcp6, &HttpInstance->Tcp6TlsRxToken.CompletionToken);
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
}
|
2016-12-14 03:57:41 +01:00
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
Abort an asynchronous HTTP request or response token.
|
|
|
|
|
|
|
|
The Cancel() function aborts a pending HTTP request or response transaction. If
|
|
|
|
Token is not NULL and the token is in transmit or receive queues when it is being
|
|
|
|
cancelled, its Token->Status will be set to EFI_ABORTED and then Token->Event will
|
|
|
|
be signaled. If the token is not in one of the queues, which usually means that the
|
|
|
|
asynchronous operation has completed, EFI_NOT_FOUND is returned. If Token is NULL,
|
|
|
|
all asynchronous tokens issued by Request() or Response() will be aborted.
|
|
|
|
|
|
|
|
@param[in] This Pointer to EFI_HTTP_PROTOCOL instance.
|
|
|
|
@param[in] Token Point to storage containing HTTP request or response
|
|
|
|
token.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Request and Response queues are successfully flushed.
|
|
|
|
@retval EFI_INVALID_PARAMETER This is NULL.
|
|
|
|
@retval EFI_NOT_STARTED This instance hasn't been configured.
|
|
|
|
@retval EFI_NOT_FOUND The asynchronous request or response token is not
|
|
|
|
found.
|
|
|
|
@retval EFI_UNSUPPORTED The implementation does not support this function.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
EfiHttpCancel (
|
|
|
|
IN EFI_HTTP_PROTOCOL *This,
|
|
|
|
IN EFI_HTTP_TOKEN *Token
|
|
|
|
)
|
|
|
|
{
|
|
|
|
HTTP_PROTOCOL *HttpInstance;
|
|
|
|
|
|
|
|
if (This == NULL) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpInstance = HTTP_INSTANCE_FROM_PROTOCOL (This);
|
|
|
|
ASSERT (HttpInstance != NULL);
|
|
|
|
|
|
|
|
if (HttpInstance->State != HTTP_STATE_TCP_CONNECTED) {
|
|
|
|
return EFI_NOT_STARTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
return HttpCancel (HttpInstance, Token);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
A callback function to intercept events during message parser.
|
|
|
|
|
|
|
|
This function will be invoked during HttpParseMessageBody() with various events type. An error
|
|
|
|
return status of the callback function will cause the HttpParseMessageBody() aborted.
|
|
|
|
|
|
|
|
@param[in] EventType Event type of this callback call.
|
|
|
|
@param[in] Data A pointer to data buffer.
|
|
|
|
@param[in] Length Length in bytes of the Data.
|
|
|
|
@param[in] Context Callback context set by HttpInitMsgParser().
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Continue to parser the message body.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
HttpBodyParserCallback (
|
|
|
|
IN HTTP_BODY_PARSE_EVENT EventType,
|
|
|
|
IN CHAR8 *Data,
|
|
|
|
IN UINTN Length,
|
|
|
|
IN VOID *Context
|
|
|
|
)
|
|
|
|
{
|
|
|
|
HTTP_TOKEN_WRAP *Wrap;
|
2015-12-21 02:36:08 +01:00
|
|
|
UINTN BodyLength;
|
|
|
|
CHAR8 *Body;
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
if (EventType != BodyParseEventOnComplete) {
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Data == NULL || Length != 0 || Context == NULL) {
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
Wrap = (HTTP_TOKEN_WRAP *) Context;
|
2015-12-21 02:36:08 +01:00
|
|
|
Body = Wrap->HttpToken->Message->Body;
|
|
|
|
BodyLength = Wrap->HttpToken->Message->BodyLength;
|
|
|
|
if (Data < Body + BodyLength) {
|
|
|
|
Wrap->HttpInstance->NextMsg = Data;
|
|
|
|
} else {
|
|
|
|
Wrap->HttpInstance->NextMsg = NULL;
|
|
|
|
}
|
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
//
|
2015-11-09 04:30:42 +01:00
|
|
|
// Free Tx4Token or Tx6Token since already received corrsponding HTTP response.
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
|
|
|
FreePool (Wrap);
|
|
|
|
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
The work function of EfiHttpResponse().
|
|
|
|
|
|
|
|
@param[in] Wrap Pointer to HTTP token's wrap data.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Allocation succeeded.
|
|
|
|
@retval EFI_OUT_OF_RESOURCES Failed to complete the opration due to lack of resources.
|
2015-11-09 04:30:42 +01:00
|
|
|
@retval EFI_NOT_READY Can't find a corresponding Tx4Token/Tx6Token or
|
2015-08-26 08:19:53 +02:00
|
|
|
the EFI_HTTP_UTILITIES_PROTOCOL is not available.
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
HttpResponseWorker (
|
|
|
|
IN HTTP_TOKEN_WRAP *Wrap
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_STATUS Status;
|
|
|
|
EFI_HTTP_MESSAGE *HttpMsg;
|
|
|
|
CHAR8 *EndofHeader;
|
|
|
|
CHAR8 *HttpHeaders;
|
|
|
|
UINTN SizeofHeaders;
|
|
|
|
UINTN BufferSize;
|
|
|
|
UINTN StatusCode;
|
|
|
|
CHAR8 *Tmp;
|
|
|
|
CHAR8 *HeaderTmp;
|
|
|
|
CHAR8 *StatusCodeStr;
|
|
|
|
UINTN BodyLen;
|
|
|
|
HTTP_PROTOCOL *HttpInstance;
|
|
|
|
EFI_HTTP_TOKEN *Token;
|
|
|
|
NET_MAP_ITEM *Item;
|
|
|
|
HTTP_TOKEN_WRAP *ValueInItem;
|
|
|
|
UINTN HdrLen;
|
2016-12-14 03:57:41 +01:00
|
|
|
NET_FRAGMENT Fragment;
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2015-07-10 11:00:33 +02:00
|
|
|
if (Wrap == NULL || Wrap->HttpInstance == NULL) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
HttpInstance = Wrap->HttpInstance;
|
|
|
|
Token = Wrap->HttpToken;
|
|
|
|
HttpMsg = Token->Message;
|
|
|
|
|
2015-11-09 04:30:42 +01:00
|
|
|
HttpInstance->EndofHeader = NULL;
|
|
|
|
HttpInstance->HttpHeaders = NULL;
|
|
|
|
HttpMsg->Headers = NULL;
|
|
|
|
HttpHeaders = NULL;
|
|
|
|
SizeofHeaders = 0;
|
|
|
|
BufferSize = 0;
|
|
|
|
EndofHeader = NULL;
|
2016-05-25 10:22:26 +02:00
|
|
|
ValueInItem = NULL;
|
2016-12-14 03:57:41 +01:00
|
|
|
Fragment.Len = 0;
|
|
|
|
Fragment.Bulk = NULL;
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
if (HttpMsg->Data.Response != NULL) {
|
|
|
|
//
|
|
|
|
// Check whether we have cached header from previous call.
|
|
|
|
//
|
|
|
|
if ((HttpInstance->CacheBody != NULL) && (HttpInstance->NextMsg != NULL)) {
|
|
|
|
//
|
|
|
|
// The data is stored at [NextMsg, CacheBody + CacheLen].
|
|
|
|
//
|
|
|
|
HdrLen = HttpInstance->CacheBody + HttpInstance->CacheLen - HttpInstance->NextMsg;
|
|
|
|
HttpHeaders = AllocateZeroPool (HdrLen);
|
|
|
|
if (HttpHeaders == NULL) {
|
|
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
|
|
goto Error;
|
|
|
|
}
|
|
|
|
|
|
|
|
CopyMem (HttpHeaders, HttpInstance->NextMsg, HdrLen);
|
|
|
|
FreePool (HttpInstance->CacheBody);
|
|
|
|
HttpInstance->CacheBody = NULL;
|
|
|
|
HttpInstance->NextMsg = NULL;
|
|
|
|
HttpInstance->CacheOffset = 0;
|
|
|
|
SizeofHeaders = HdrLen;
|
|
|
|
BufferSize = HttpInstance->CacheLen;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether we cached the whole HTTP headers.
|
|
|
|
//
|
|
|
|
EndofHeader = AsciiStrStr (HttpHeaders, HTTP_END_OF_HDR_STR);
|
2015-11-09 04:30:42 +01:00
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2015-11-09 04:30:42 +01:00
|
|
|
HttpInstance->EndofHeader = &EndofHeader;
|
|
|
|
HttpInstance->HttpHeaders = &HttpHeaders;
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2016-04-26 10:46:33 +02:00
|
|
|
|
|
|
|
if (HttpInstance->TimeoutEvent == NULL) {
|
|
|
|
//
|
|
|
|
// Create TimeoutEvent for response
|
|
|
|
//
|
|
|
|
Status = gBS->CreateEvent (
|
|
|
|
EVT_TIMER,
|
|
|
|
TPL_CALLBACK,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
&HttpInstance->TimeoutEvent
|
|
|
|
);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Start the timer, and wait Timeout seconds to receive the header packet.
|
|
|
|
//
|
|
|
|
Status = gBS->SetTimer (HttpInstance->TimeoutEvent, TimerRelative, HTTP_RESPONSE_TIMEOUT * TICKS_PER_SECOND);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error;
|
|
|
|
}
|
|
|
|
|
|
|
|
Status = HttpTcpReceiveHeader (HttpInstance, &SizeofHeaders, &BufferSize, HttpInstance->TimeoutEvent);
|
|
|
|
|
|
|
|
gBS->SetTimer (HttpInstance->TimeoutEvent, TimerCancel, 0);
|
|
|
|
|
2015-11-09 04:30:42 +01:00
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2015-11-26 09:17:46 +01:00
|
|
|
ASSERT (HttpHeaders != NULL);
|
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
|
|
|
// Cache the part of body.
|
|
|
|
//
|
|
|
|
BodyLen = BufferSize - (EndofHeader - HttpHeaders);
|
|
|
|
if (BodyLen > 0) {
|
|
|
|
if (HttpInstance->CacheBody != NULL) {
|
|
|
|
FreePool (HttpInstance->CacheBody);
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpInstance->CacheBody = AllocateZeroPool (BodyLen);
|
|
|
|
if (HttpInstance->CacheBody == NULL) {
|
|
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
|
|
goto Error;
|
|
|
|
}
|
|
|
|
|
|
|
|
CopyMem (HttpInstance->CacheBody, EndofHeader, BodyLen);
|
|
|
|
HttpInstance->CacheLen = BodyLen;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Search for Status Code.
|
|
|
|
//
|
|
|
|
StatusCodeStr = HttpHeaders + AsciiStrLen (HTTP_VERSION_STR) + 1;
|
|
|
|
if (StatusCodeStr == NULL) {
|
2016-05-31 16:17:27 +02:00
|
|
|
Status = EFI_NOT_READY;
|
2015-07-07 11:09:21 +02:00
|
|
|
goto Error;
|
|
|
|
}
|
|
|
|
|
|
|
|
StatusCode = AsciiStrDecimalToUintn (StatusCodeStr);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Remove the first line of HTTP message, e.g. "HTTP/1.1 200 OK\r\n".
|
|
|
|
//
|
|
|
|
Tmp = AsciiStrStr (HttpHeaders, HTTP_CRLF_STR);
|
|
|
|
if (Tmp == NULL) {
|
2016-05-31 16:17:27 +02:00
|
|
|
Status = EFI_NOT_READY;
|
2015-07-07 11:09:21 +02:00
|
|
|
goto Error;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
// We could have response with just a HTTP message and no headers. For Example,
|
|
|
|
// "100 Continue". In such cases, we would not want to unnecessarily call a Parse
|
|
|
|
// method. A "\r\n" following Tmp string again would indicate an end. Compare and
|
|
|
|
// set SizeofHeaders to 0.
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
Tmp = Tmp + AsciiStrLen (HTTP_CRLF_STR);
|
|
|
|
if (CompareMem (Tmp, HTTP_CRLF_STR, AsciiStrLen (HTTP_CRLF_STR)) == 0) {
|
|
|
|
SizeofHeaders = 0;
|
|
|
|
} else {
|
|
|
|
SizeofHeaders = SizeofHeaders - (Tmp - HttpHeaders);
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
HttpMsg->Data.Response->StatusCode = HttpMappingToStatusCode (StatusCode);
|
2016-01-29 04:17:34 +01:00
|
|
|
HttpInstance->StatusCode = StatusCode;
|
2016-05-06 12:20:00 +02:00
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
Status = EFI_NOT_READY;
|
|
|
|
ValueInItem = NULL;
|
|
|
|
|
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
// In cases of PUT/POST, after an initial request-response pair, we would do a
|
|
|
|
// continuous request without a response call. So, we would not do an insert of
|
|
|
|
// TxToken. After we have sent the complete file, we will call a response to get
|
|
|
|
// a final response from server. In such a case, we would not have any TxTokens.
|
|
|
|
// Hence, check that case before doing a NetMapRemoveHead.
|
2015-07-07 11:09:21 +02:00
|
|
|
//
|
2016-05-06 12:20:00 +02:00
|
|
|
if (!NetMapIsEmpty (&HttpInstance->TxTokens)) {
|
|
|
|
NetMapRemoveHead (&HttpInstance->TxTokens, (VOID**) &ValueInItem);
|
|
|
|
if (ValueInItem == NULL) {
|
|
|
|
goto Error;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
//
|
|
|
|
// The first Tx Token not transmitted yet, insert back and return error.
|
|
|
|
//
|
|
|
|
if (!ValueInItem->TcpWrap.IsTxDone) {
|
|
|
|
goto Error2;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
if (SizeofHeaders != 0) {
|
|
|
|
HeaderTmp = AllocateZeroPool (SizeofHeaders);
|
|
|
|
if (HeaderTmp == NULL) {
|
2016-05-31 16:17:27 +02:00
|
|
|
Status = EFI_OUT_OF_RESOURCES;
|
2016-05-23 05:02:01 +02:00
|
|
|
goto Error2;
|
2016-05-06 12:20:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
CopyMem (HeaderTmp, Tmp, SizeofHeaders);
|
|
|
|
FreePool (HttpHeaders);
|
|
|
|
HttpHeaders = HeaderTmp;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether the EFI_HTTP_UTILITIES_PROTOCOL is available.
|
|
|
|
//
|
|
|
|
if (mHttpUtilities == NULL) {
|
|
|
|
Status = EFI_NOT_READY;
|
2016-05-23 05:02:01 +02:00
|
|
|
goto Error2;
|
2016-05-06 12:20:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Parse the HTTP header into array of key/value pairs.
|
|
|
|
//
|
|
|
|
Status = mHttpUtilities->Parse (
|
|
|
|
mHttpUtilities,
|
|
|
|
HttpHeaders,
|
|
|
|
SizeofHeaders,
|
|
|
|
&HttpMsg->Headers,
|
|
|
|
&HttpMsg->HeaderCount
|
|
|
|
);
|
|
|
|
if (EFI_ERROR (Status)) {
|
2016-05-23 05:02:01 +02:00
|
|
|
goto Error2;
|
2016-05-06 12:20:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
FreePool (HttpHeaders);
|
|
|
|
HttpHeaders = NULL;
|
|
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
// Init message-body parser by header information.
|
|
|
|
//
|
|
|
|
Status = HttpInitMsgParser (
|
|
|
|
HttpInstance->Method,
|
|
|
|
HttpMsg->Data.Response->StatusCode,
|
|
|
|
HttpMsg->HeaderCount,
|
|
|
|
HttpMsg->Headers,
|
|
|
|
HttpBodyParserCallback,
|
|
|
|
(VOID *) ValueInItem,
|
|
|
|
&HttpInstance->MsgParser
|
|
|
|
);
|
2015-07-07 11:09:21 +02:00
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error2;
|
|
|
|
}
|
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
//
|
|
|
|
// Check whether we received a complete HTTP message.
|
|
|
|
//
|
|
|
|
if (HttpInstance->CacheBody != NULL) {
|
|
|
|
Status = HttpParseMessageBody (HttpInstance->MsgParser, HttpInstance->CacheLen, HttpInstance->CacheBody);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (HttpIsMessageComplete (HttpInstance->MsgParser)) {
|
|
|
|
//
|
|
|
|
// Free the MsgParse since we already have a full HTTP message.
|
|
|
|
//
|
|
|
|
HttpFreeMsgParser (HttpInstance->MsgParser);
|
|
|
|
HttpInstance->MsgParser = NULL;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-06 12:20:00 +02:00
|
|
|
if ((HttpMsg->Body == NULL) || (HttpMsg->BodyLength == 0)) {
|
2015-07-07 11:09:21 +02:00
|
|
|
Status = EFI_SUCCESS;
|
|
|
|
goto Exit;
|
|
|
|
}
|
2016-05-06 12:20:00 +02:00
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// Receive the response body.
|
|
|
|
//
|
|
|
|
BodyLen = 0;
|
|
|
|
|
|
|
|
//
|
|
|
|
// First check whether we cached some data.
|
|
|
|
//
|
|
|
|
if (HttpInstance->CacheBody != NULL) {
|
|
|
|
//
|
|
|
|
// Calculate the length of the cached data.
|
|
|
|
//
|
|
|
|
if (HttpInstance->NextMsg != NULL) {
|
|
|
|
//
|
|
|
|
// We have a cached HTTP message which includes a part of HTTP header of next message.
|
|
|
|
//
|
|
|
|
BodyLen = HttpInstance->NextMsg - (HttpInstance->CacheBody + HttpInstance->CacheOffset);
|
|
|
|
} else {
|
|
|
|
BodyLen = HttpInstance->CacheLen - HttpInstance->CacheOffset;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (BodyLen > 0) {
|
|
|
|
//
|
|
|
|
// We have some cached data. Just copy the data and return.
|
|
|
|
//
|
|
|
|
if (HttpMsg->BodyLength < BodyLen) {
|
|
|
|
CopyMem (HttpMsg->Body, HttpInstance->CacheBody + HttpInstance->CacheOffset, HttpMsg->BodyLength);
|
|
|
|
HttpInstance->CacheOffset = HttpInstance->CacheOffset + HttpMsg->BodyLength;
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// Copy all cached data out.
|
|
|
|
//
|
|
|
|
CopyMem (HttpMsg->Body, HttpInstance->CacheBody + HttpInstance->CacheOffset, BodyLen);
|
|
|
|
HttpInstance->CacheOffset = BodyLen + HttpInstance->CacheOffset;
|
|
|
|
HttpMsg->BodyLength = BodyLen;
|
|
|
|
|
|
|
|
if (HttpInstance->NextMsg == NULL) {
|
|
|
|
//
|
|
|
|
// There is no HTTP header of next message. Just free the cache buffer.
|
|
|
|
//
|
|
|
|
FreePool (HttpInstance->CacheBody);
|
|
|
|
HttpInstance->CacheBody = NULL;
|
|
|
|
HttpInstance->NextMsg = NULL;
|
|
|
|
HttpInstance->CacheOffset = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
//
|
|
|
|
// Return since we aready received required data.
|
|
|
|
//
|
|
|
|
Status = EFI_SUCCESS;
|
|
|
|
goto Exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (BodyLen == 0 && HttpInstance->MsgParser == NULL) {
|
|
|
|
//
|
|
|
|
// We received a complete HTTP message, and we don't have more data to return to caller.
|
|
|
|
//
|
|
|
|
HttpMsg->BodyLength = 0;
|
|
|
|
Status = EFI_SUCCESS;
|
|
|
|
goto Exit;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ASSERT (HttpInstance->MsgParser != NULL);
|
|
|
|
|
|
|
|
//
|
|
|
|
// We still need receive more data when there is no cache data and MsgParser is not NULL;
|
|
|
|
//
|
2016-12-14 03:57:41 +01:00
|
|
|
if (!HttpInstance->UseHttps) {
|
|
|
|
Status = HttpTcpReceiveBody (Wrap, HttpMsg);
|
|
|
|
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
} else {
|
|
|
|
if (HttpInstance->TimeoutEvent == NULL) {
|
|
|
|
//
|
|
|
|
// Create TimeoutEvent for response
|
|
|
|
//
|
|
|
|
Status = gBS->CreateEvent (
|
|
|
|
EVT_TIMER,
|
|
|
|
TPL_CALLBACK,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
&HttpInstance->TimeoutEvent
|
|
|
|
);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error2;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Start the timer, and wait Timeout seconds to receive the body packet.
|
|
|
|
//
|
|
|
|
Status = gBS->SetTimer (HttpInstance->TimeoutEvent, TimerRelative, HTTP_RESPONSE_TIMEOUT * TICKS_PER_SECOND);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
Status = HttpsReceive (HttpInstance, &Fragment, HttpInstance->TimeoutEvent);
|
|
|
|
|
|
|
|
gBS->SetTimer (HttpInstance->TimeoutEvent, TimerCancel, 0);
|
|
|
|
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether we receive a complete HTTP message.
|
|
|
|
//
|
|
|
|
Status = HttpParseMessageBody (
|
|
|
|
HttpInstance->MsgParser,
|
|
|
|
(UINTN) Fragment.Len,
|
|
|
|
(CHAR8 *) Fragment.Bulk
|
|
|
|
);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (HttpIsMessageComplete (HttpInstance->MsgParser)) {
|
|
|
|
//
|
|
|
|
// Free the MsgParse since we already have a full HTTP message.
|
|
|
|
//
|
|
|
|
HttpFreeMsgParser (HttpInstance->MsgParser);
|
|
|
|
HttpInstance->MsgParser = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// We receive part of header of next HTTP msg.
|
|
|
|
//
|
|
|
|
if (HttpInstance->NextMsg != NULL) {
|
NetworkPkg: Refine type cast for pointer subtraction
For pointer subtraction, the result is of type "ptrdiff_t". According to
the C11 standard (Committee Draft - April 12, 2011):
"When two pointers are subtracted, both shall point to elements of the
same array object, or one past the last element of the array object; the
result is the difference of the subscripts of the two array elements. The
size of the result is implementation-defined, and its type (a signed
integer type) is ptrdiff_t defined in the <stddef.h> header. If the result
is not representable in an object of that type, the behavior is
undefined."
In our codes, there are cases that the pointer subtraction is not
performed by pointers to elements of the same array object. This might
lead to potential issues, since the behavior is undefined according to C11
standard.
Also, since the size of type "ptrdiff_t" is implementation-defined. Some
static code checkers may warn that the pointer subtraction might underflow
first and then being cast to a bigger size. For example:
UINT8 *Ptr1, *Ptr2;
UINTN PtrDiff;
...
PtrDiff = (UINTN) (Ptr1 - Ptr2);
The commit will refine the pointer subtraction expressions by casting each
pointer to UINTN first and then perform the subtraction:
PtrDiff = (UINTN) Ptr1 - (UINTN) Ptr2;
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Hao Wu <hao.a.wu@intel.com>
Acked-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Fu Siyuan <siyuan.fu@intel.com>
Reviewed-by: Wu Jiaxin <jiaxin.wu@intel.com>
2017-01-23 06:55:42 +01:00
|
|
|
HttpMsg->BodyLength = MIN ((UINTN) HttpInstance->NextMsg - (UINTN) Fragment.Bulk, HttpMsg->BodyLength);
|
2016-12-14 03:57:41 +01:00
|
|
|
CopyMem (HttpMsg->Body, Fragment.Bulk, HttpMsg->BodyLength);
|
|
|
|
|
|
|
|
HttpInstance->CacheLen = Fragment.Len - HttpMsg->BodyLength;
|
|
|
|
if (HttpInstance->CacheLen != 0) {
|
|
|
|
if (HttpInstance->CacheBody != NULL) {
|
|
|
|
FreePool (HttpInstance->CacheBody);
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpInstance->CacheBody = AllocateZeroPool (HttpInstance->CacheLen);
|
|
|
|
if (HttpInstance->CacheBody == NULL) {
|
|
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
|
|
goto Error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
CopyMem (HttpInstance->CacheBody, Fragment.Bulk + HttpMsg->BodyLength, HttpInstance->CacheLen);
|
|
|
|
HttpInstance->CacheOffset = 0;
|
|
|
|
|
NetworkPkg: Refine type cast for pointer subtraction
For pointer subtraction, the result is of type "ptrdiff_t". According to
the C11 standard (Committee Draft - April 12, 2011):
"When two pointers are subtracted, both shall point to elements of the
same array object, or one past the last element of the array object; the
result is the difference of the subscripts of the two array elements. The
size of the result is implementation-defined, and its type (a signed
integer type) is ptrdiff_t defined in the <stddef.h> header. If the result
is not representable in an object of that type, the behavior is
undefined."
In our codes, there are cases that the pointer subtraction is not
performed by pointers to elements of the same array object. This might
lead to potential issues, since the behavior is undefined according to C11
standard.
Also, since the size of type "ptrdiff_t" is implementation-defined. Some
static code checkers may warn that the pointer subtraction might underflow
first and then being cast to a bigger size. For example:
UINT8 *Ptr1, *Ptr2;
UINTN PtrDiff;
...
PtrDiff = (UINTN) (Ptr1 - Ptr2);
The commit will refine the pointer subtraction expressions by casting each
pointer to UINTN first and then perform the subtraction:
PtrDiff = (UINTN) Ptr1 - (UINTN) Ptr2;
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Hao Wu <hao.a.wu@intel.com>
Acked-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Fu Siyuan <siyuan.fu@intel.com>
Reviewed-by: Wu Jiaxin <jiaxin.wu@intel.com>
2017-01-23 06:55:42 +01:00
|
|
|
HttpInstance->NextMsg = HttpInstance->CacheBody + ((UINTN) HttpInstance->NextMsg - (UINTN) (Fragment.Bulk + HttpMsg->BodyLength));
|
2016-12-14 03:57:41 +01:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
HttpMsg->BodyLength = MIN (Fragment.Len, (UINT32) HttpMsg->BodyLength);
|
|
|
|
CopyMem (HttpMsg->Body, Fragment.Bulk, HttpMsg->BodyLength);
|
|
|
|
HttpInstance->CacheLen = Fragment.Len - HttpMsg->BodyLength;
|
|
|
|
if (HttpInstance->CacheLen != 0) {
|
|
|
|
if (HttpInstance->CacheBody != NULL) {
|
|
|
|
FreePool (HttpInstance->CacheBody);
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpInstance->CacheBody = AllocateZeroPool (HttpInstance->CacheLen);
|
|
|
|
if (HttpInstance->CacheBody == NULL) {
|
|
|
|
Status = EFI_OUT_OF_RESOURCES;
|
|
|
|
goto Error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
CopyMem (HttpInstance->CacheBody, Fragment.Bulk + HttpMsg->BodyLength, HttpInstance->CacheLen);
|
|
|
|
HttpInstance->CacheOffset = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Fragment.Bulk != NULL) {
|
|
|
|
FreePool (Fragment.Bulk);
|
|
|
|
Fragment.Bulk = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
goto Exit;
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return Status;
|
|
|
|
|
|
|
|
Exit:
|
|
|
|
Item = NetMapFindKey (&Wrap->HttpInstance->RxTokens, Wrap->HttpToken);
|
|
|
|
if (Item != NULL) {
|
|
|
|
NetMapRemoveItem (&Wrap->HttpInstance->RxTokens, Item, NULL);
|
|
|
|
}
|
2016-01-29 04:17:34 +01:00
|
|
|
|
|
|
|
if (HttpInstance->StatusCode >= HTTP_ERROR_OR_NOT_SUPPORT_STATUS_CODE) {
|
|
|
|
Token->Status = EFI_HTTP_ERROR;
|
|
|
|
} else {
|
|
|
|
Token->Status = Status;
|
|
|
|
}
|
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
gBS->SignalEvent (Token->Event);
|
2015-11-09 04:30:42 +01:00
|
|
|
HttpCloseTcpRxEvent (Wrap);
|
2015-07-07 11:09:21 +02:00
|
|
|
FreePool (Wrap);
|
|
|
|
return Status;
|
|
|
|
|
|
|
|
Error2:
|
2016-05-23 05:02:01 +02:00
|
|
|
if (ValueInItem != NULL) {
|
|
|
|
NetMapInsertHead (&HttpInstance->TxTokens, ValueInItem->HttpToken, ValueInItem);
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
Error:
|
2016-05-31 16:17:27 +02:00
|
|
|
Item = NetMapFindKey (&Wrap->HttpInstance->RxTokens, Wrap->HttpToken);
|
|
|
|
if (Item != NULL) {
|
|
|
|
NetMapRemoveItem (&Wrap->HttpInstance->RxTokens, Item, NULL);
|
|
|
|
}
|
2016-12-14 03:57:41 +01:00
|
|
|
|
|
|
|
if (!HttpInstance->UseHttps) {
|
|
|
|
HttpTcpTokenCleanup (Wrap);
|
|
|
|
} else {
|
|
|
|
FreePool (Wrap);
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
if (HttpHeaders != NULL) {
|
|
|
|
FreePool (HttpHeaders);
|
2016-12-14 03:57:41 +01:00
|
|
|
HttpHeaders = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Fragment.Bulk != NULL) {
|
|
|
|
FreePool (Fragment.Bulk);
|
|
|
|
Fragment.Bulk = NULL;
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (HttpMsg->Headers != NULL) {
|
|
|
|
FreePool (HttpMsg->Headers);
|
2016-12-14 03:57:41 +01:00
|
|
|
HttpMsg->Headers = NULL;
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (HttpInstance->CacheBody != NULL) {
|
|
|
|
FreePool (HttpInstance->CacheBody);
|
|
|
|
HttpInstance->CacheBody = NULL;
|
|
|
|
}
|
|
|
|
|
2016-01-29 04:17:34 +01:00
|
|
|
if (HttpInstance->StatusCode >= HTTP_ERROR_OR_NOT_SUPPORT_STATUS_CODE) {
|
|
|
|
Token->Status = EFI_HTTP_ERROR;
|
|
|
|
} else {
|
|
|
|
Token->Status = Status;
|
|
|
|
}
|
|
|
|
|
2015-07-07 11:09:21 +02:00
|
|
|
gBS->SignalEvent (Token->Event);
|
|
|
|
|
|
|
|
return Status;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
The Response() function queues an HTTP response to this HTTP instance, similar to
|
2016-01-28 04:15:35 +01:00
|
|
|
Receive() function in the EFI TCP driver. When the HTTP response is received successfully,
|
2015-07-07 11:09:21 +02:00
|
|
|
or if there is an error, Status in token will be updated and Event will be signaled.
|
|
|
|
|
|
|
|
The HTTP driver will queue a receive token to the underlying TCP instance. When data
|
|
|
|
is received in the underlying TCP instance, the data will be parsed and Token will
|
|
|
|
be populated with the response data. If the data received from the remote host
|
|
|
|
contains an incomplete or invalid HTTP header, the HTTP driver will continue waiting
|
|
|
|
(asynchronously) for more data to be sent from the remote host before signaling
|
|
|
|
Event in Token.
|
|
|
|
|
|
|
|
It is the responsibility of the caller to allocate a buffer for Body and specify the
|
|
|
|
size in BodyLength. If the remote host provides a response that contains a content
|
|
|
|
body, up to BodyLength bytes will be copied from the receive buffer into Body and
|
|
|
|
BodyLength will be updated with the amount of bytes received and copied to Body. This
|
|
|
|
allows the client to download a large file in chunks instead of into one contiguous
|
|
|
|
block of memory. Similar to HTTP request, if Body is not NULL and BodyLength is
|
|
|
|
non-zero and all other fields are NULL or 0, the HTTP driver will queue a receive
|
|
|
|
token to underlying TCP instance. If data arrives in the receive buffer, up to
|
|
|
|
BodyLength bytes of data will be copied to Body. The HTTP driver will then update
|
|
|
|
BodyLength with the amount of bytes received and copied to Body.
|
|
|
|
|
|
|
|
If the HTTP driver does not have an open underlying TCP connection with the host
|
|
|
|
specified in the response URL, Request() will return EFI_ACCESS_DENIED. This is
|
|
|
|
consistent with RFC 2616 recommendation that HTTP clients should attempt to maintain
|
|
|
|
an open TCP connection between client and host.
|
|
|
|
|
|
|
|
@param[in] This Pointer to EFI_HTTP_PROTOCOL instance.
|
|
|
|
@param[in] Token Pointer to storage containing HTTP response token.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Allocation succeeded.
|
|
|
|
@retval EFI_NOT_STARTED This EFI HTTP Protocol instance has not been
|
|
|
|
initialized.
|
|
|
|
@retval EFI_INVALID_PARAMETER One or more of the following conditions is TRUE:
|
|
|
|
This is NULL.
|
|
|
|
Token is NULL.
|
|
|
|
Token->Message->Headers is NULL.
|
|
|
|
Token->Message is NULL.
|
|
|
|
Token->Message->Body is not NULL,
|
|
|
|
Token->Message->BodyLength is non-zero, and
|
|
|
|
Token->Message->Data is NULL, but a previous call to
|
|
|
|
Response() has not been completed successfully.
|
|
|
|
@retval EFI_OUT_OF_RESOURCES Could not allocate enough system resources.
|
|
|
|
@retval EFI_ACCESS_DENIED An open TCP connection is not present with the host
|
|
|
|
specified by response URL.
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
EfiHttpResponse (
|
|
|
|
IN EFI_HTTP_PROTOCOL *This,
|
|
|
|
IN EFI_HTTP_TOKEN *Token
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_STATUS Status;
|
|
|
|
EFI_HTTP_MESSAGE *HttpMsg;
|
|
|
|
HTTP_PROTOCOL *HttpInstance;
|
|
|
|
HTTP_TOKEN_WRAP *Wrap;
|
|
|
|
|
|
|
|
if ((This == NULL) || (Token == NULL)) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpMsg = Token->Message;
|
|
|
|
if (HttpMsg == NULL) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpInstance = HTTP_INSTANCE_FROM_PROTOCOL (This);
|
|
|
|
ASSERT (HttpInstance != NULL);
|
|
|
|
|
|
|
|
if (HttpInstance->State != HTTP_STATE_TCP_CONNECTED) {
|
|
|
|
return EFI_NOT_STARTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether the token already existed.
|
|
|
|
//
|
|
|
|
if (EFI_ERROR (NetMapIterate (&HttpInstance->RxTokens, HttpTokenExist, Token))) {
|
|
|
|
return EFI_ACCESS_DENIED;
|
|
|
|
}
|
|
|
|
|
|
|
|
Wrap = AllocateZeroPool (sizeof (HTTP_TOKEN_WRAP));
|
|
|
|
if (Wrap == NULL) {
|
|
|
|
return EFI_OUT_OF_RESOURCES;
|
|
|
|
}
|
|
|
|
|
|
|
|
Wrap->HttpInstance = HttpInstance;
|
|
|
|
Wrap->HttpToken = Token;
|
|
|
|
|
2016-12-14 03:57:41 +01:00
|
|
|
//
|
|
|
|
// Notes: For Https, receive token wrapped in HTTP_TOKEN_WRAP is not used to
|
|
|
|
// receive the https response. A special TlsRxToken is used for receiving TLS
|
|
|
|
// related messages. It should be a blocking response.
|
|
|
|
//
|
|
|
|
if (!HttpInstance->UseHttps) {
|
|
|
|
Status = HttpCreateTcpRxEvent (Wrap);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error;
|
|
|
|
}
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
Status = NetMapInsertTail (&HttpInstance->RxTokens, Token, Wrap);
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
|
|
goto Error;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// If already have pending RxTokens, return directly.
|
|
|
|
//
|
|
|
|
if (NetMapGetCount (&HttpInstance->RxTokens) > 1) {
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
return HttpResponseWorker (Wrap);
|
|
|
|
|
|
|
|
Error:
|
|
|
|
if (Wrap != NULL) {
|
2015-11-09 04:30:42 +01:00
|
|
|
if (Wrap->TcpWrap.Rx4Token.CompletionToken.Event != NULL) {
|
|
|
|
gBS->CloseEvent (Wrap->TcpWrap.Rx4Token.CompletionToken.Event);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Wrap->TcpWrap.Rx6Token.CompletionToken.Event != NULL) {
|
|
|
|
gBS->CloseEvent (Wrap->TcpWrap.Rx6Token.CompletionToken.Event);
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|
|
|
|
FreePool (Wrap);
|
|
|
|
}
|
|
|
|
|
|
|
|
return Status;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
The Poll() function can be used by network drivers and applications to increase the
|
|
|
|
rate that data packets are moved between the communication devices and the transmit
|
|
|
|
and receive queues.
|
|
|
|
|
|
|
|
In some systems, the periodic timer event in the managed network driver may not poll
|
|
|
|
the underlying communications device fast enough to transmit and/or receive all data
|
|
|
|
packets without missing incoming packets or dropping outgoing packets. Drivers and
|
|
|
|
applications that are experiencing packet loss should try calling the Poll() function
|
|
|
|
more often.
|
|
|
|
|
|
|
|
@param[in] This Pointer to EFI_HTTP_PROTOCOL instance.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Incoming or outgoing data was processed.
|
|
|
|
@retval EFI_DEVICE_ERROR An unexpected system or network error occurred.
|
|
|
|
@retval EFI_INVALID_PARAMETER This is NULL.
|
|
|
|
@retval EFI_NOT_READY No incoming or outgoing data is processed.
|
|
|
|
@retval EFI_NOT_STARTED This EFI HTTP Protocol instance has not been started.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
EfiHttpPoll (
|
|
|
|
IN EFI_HTTP_PROTOCOL *This
|
|
|
|
)
|
|
|
|
{
|
2015-09-14 11:06:26 +02:00
|
|
|
EFI_STATUS Status;
|
2015-11-09 04:30:42 +01:00
|
|
|
HTTP_PROTOCOL *HttpInstance;
|
2015-07-07 11:09:21 +02:00
|
|
|
|
|
|
|
if (This == NULL) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
HttpInstance = HTTP_INSTANCE_FROM_PROTOCOL (This);
|
|
|
|
ASSERT (HttpInstance != NULL);
|
|
|
|
|
2015-11-26 09:17:46 +01:00
|
|
|
if (HttpInstance->State != HTTP_STATE_TCP_CONNECTED) {
|
2015-07-07 11:09:21 +02:00
|
|
|
return EFI_NOT_STARTED;
|
|
|
|
}
|
2015-11-09 04:30:42 +01:00
|
|
|
|
|
|
|
if (HttpInstance->LocalAddressIsIPv6) {
|
2015-11-26 09:17:46 +01:00
|
|
|
if (HttpInstance->Tcp6 == NULL) {
|
|
|
|
return EFI_NOT_STARTED;
|
|
|
|
}
|
2015-11-09 04:30:42 +01:00
|
|
|
Status = HttpInstance->Tcp6->Poll (HttpInstance->Tcp6);
|
|
|
|
} else {
|
2015-11-26 09:17:46 +01:00
|
|
|
if (HttpInstance->Tcp4 == NULL) {
|
|
|
|
return EFI_NOT_STARTED;
|
|
|
|
}
|
2015-11-09 04:30:42 +01:00
|
|
|
Status = HttpInstance->Tcp4->Poll (HttpInstance->Tcp4);
|
|
|
|
}
|
|
|
|
|
2015-09-14 11:06:26 +02:00
|
|
|
DispatchDpc ();
|
2015-11-09 04:30:42 +01:00
|
|
|
|
2015-09-14 11:06:26 +02:00
|
|
|
return Status;
|
2015-07-07 11:09:21 +02:00
|
|
|
}
|