/** @file Support functions implementation for UEFI HTTP boot driver. Copyright (c) 2015 - 2018, Intel Corporation. All rights reserved.
(C) Copyright 2016 Hewlett Packard Enterprise Development LP
SPDX-License-Identifier: BSD-2-Clause-Patent **/ #include "HttpBootDxe.h" /** Get the Nic handle using any child handle in the IPv4 stack. @param[in] ControllerHandle Pointer to child handle over IPv4. @return NicHandle The pointer to the Nic handle. @return NULL Can't find the Nic handle. **/ EFI_HANDLE HttpBootGetNicByIp4Children ( IN EFI_HANDLE ControllerHandle ) { EFI_HANDLE NicHandle; NicHandle = NetLibGetNicHandle (ControllerHandle, &gEfiHttpProtocolGuid); if (NicHandle == NULL) { NicHandle = NetLibGetNicHandle (ControllerHandle, &gEfiDhcp4ProtocolGuid); if (NicHandle == NULL) { return NULL; } } return NicHandle; } /** Get the Nic handle using any child handle in the IPv6 stack. @param[in] ControllerHandle Pointer to child handle over IPv6. @return NicHandle The pointer to the Nic handle. @return NULL Can't find the Nic handle. **/ EFI_HANDLE HttpBootGetNicByIp6Children ( IN EFI_HANDLE ControllerHandle ) { EFI_HANDLE NicHandle; NicHandle = NetLibGetNicHandle (ControllerHandle, &gEfiHttpProtocolGuid); if (NicHandle == NULL) { NicHandle = NetLibGetNicHandle (ControllerHandle, &gEfiDhcp6ProtocolGuid); if (NicHandle == NULL) { return NULL; } } return NicHandle; } /** This function is to convert UINTN to ASCII string with the required formatting. @param[in] Number Numeric value to be converted. @param[in] Buffer The pointer to the buffer for ASCII string. @param[in] Length The length of the required format. **/ VOID HttpBootUintnToAscDecWithFormat ( IN UINTN Number, IN UINT8 *Buffer, IN INTN Length ) { UINTN Remainder; for (; Length > 0; Length--) { Remainder = Number % 10; Number /= 10; Buffer[Length - 1] = (UINT8) ('0' + Remainder); } } /** This function is to display the IPv4 address. @param[in] Ip The pointer to the IPv4 address. **/ VOID HttpBootShowIp4Addr ( IN EFI_IPv4_ADDRESS *Ip ) { UINTN Index; for (Index = 0; Index < 4; Index++) { AsciiPrint ("%d", Ip->Addr[Index]); if (Index < 3) { AsciiPrint ("."); } } } /** This function is to display the IPv6 address. @param[in] Ip The pointer to the IPv6 address. **/ VOID HttpBootShowIp6Addr ( IN EFI_IPv6_ADDRESS *Ip ) { UINTN Index; for (Index = 0; Index < 16; Index++) { if (Ip->Addr[Index] != 0) { AsciiPrint ("%x", Ip->Addr[Index]); } Index++; if (Index > 15) { return; } if (((Ip->Addr[Index] & 0xf0) == 0) && (Ip->Addr[Index - 1] != 0)) { AsciiPrint ("0"); } AsciiPrint ("%x", Ip->Addr[Index]); if (Index < 15) { AsciiPrint (":"); } } } /** This function is to display the HTTP error status. @param[in] StatusCode The status code value in HTTP message. **/ VOID HttpBootPrintErrorMessage ( EFI_HTTP_STATUS_CODE StatusCode ) { AsciiPrint ("\n"); switch (StatusCode) { case HTTP_STATUS_300_MULTIPLE_CHOICES: AsciiPrint ("\n Redirection: 300 Multiple Choices"); break; case HTTP_STATUS_301_MOVED_PERMANENTLY: AsciiPrint ("\n Redirection: 301 Moved Permanently"); break; case HTTP_STATUS_302_FOUND: AsciiPrint ("\n Redirection: 302 Found"); break; case HTTP_STATUS_303_SEE_OTHER: AsciiPrint ("\n Redirection: 303 See Other"); break; case HTTP_STATUS_304_NOT_MODIFIED: AsciiPrint ("\n Redirection: 304 Not Modified"); break; case HTTP_STATUS_305_USE_PROXY: AsciiPrint ("\n Redirection: 305 Use Proxy"); break; case HTTP_STATUS_307_TEMPORARY_REDIRECT: AsciiPrint ("\n Redirection: 307 Temporary Redirect"); break; case HTTP_STATUS_308_PERMANENT_REDIRECT: AsciiPrint ("\n Redirection: 308 Permanent Redirect"); break; case HTTP_STATUS_400_BAD_REQUEST: AsciiPrint ("\n Client Error: 400 Bad Request"); break; case HTTP_STATUS_401_UNAUTHORIZED: AsciiPrint ("\n Client Error: 401 Unauthorized"); break; case HTTP_STATUS_402_PAYMENT_REQUIRED: AsciiPrint ("\n Client Error: 402 Payment Required"); break; case HTTP_STATUS_403_FORBIDDEN: AsciiPrint ("\n Client Error: 403 Forbidden"); break; case HTTP_STATUS_404_NOT_FOUND: AsciiPrint ("\n Client Error: 404 Not Found"); break; case HTTP_STATUS_405_METHOD_NOT_ALLOWED: AsciiPrint ("\n Client Error: 405 Method Not Allowed"); break; case HTTP_STATUS_406_NOT_ACCEPTABLE: AsciiPrint ("\n Client Error: 406 Not Acceptable"); break; case HTTP_STATUS_407_PROXY_AUTHENTICATION_REQUIRED: AsciiPrint ("\n Client Error: 407 Proxy Authentication Required"); break; case HTTP_STATUS_408_REQUEST_TIME_OUT: AsciiPrint ("\n Client Error: 408 Request Timeout"); break; case HTTP_STATUS_409_CONFLICT: AsciiPrint ("\n Client Error: 409 Conflict"); break; case HTTP_STATUS_410_GONE: AsciiPrint ("\n Client Error: 410 Gone"); break; case HTTP_STATUS_411_LENGTH_REQUIRED: AsciiPrint ("\n Client Error: 411 Length Required"); break; case HTTP_STATUS_412_PRECONDITION_FAILED: AsciiPrint ("\n Client Error: 412 Precondition Failed"); break; case HTTP_STATUS_413_REQUEST_ENTITY_TOO_LARGE: AsciiPrint ("\n Client Error: 413 Request Entity Too Large"); break; case HTTP_STATUS_414_REQUEST_URI_TOO_LARGE: AsciiPrint ("\n Client Error: 414 Request URI Too Long"); break; case HTTP_STATUS_415_UNSUPPORTED_MEDIA_TYPE: AsciiPrint ("\n Client Error: 415 Unsupported Media Type"); break; case HTTP_STATUS_416_REQUESTED_RANGE_NOT_SATISFIED: AsciiPrint ("\n Client Error: 416 Requested Range Not Satisfiable"); break; case HTTP_STATUS_417_EXPECTATION_FAILED: AsciiPrint ("\n Client Error: 417 Expectation Failed"); break; case HTTP_STATUS_500_INTERNAL_SERVER_ERROR: AsciiPrint ("\n Server Error: 500 Internal Server Error"); break; case HTTP_STATUS_501_NOT_IMPLEMENTED: AsciiPrint ("\n Server Error: 501 Not Implemented"); break; case HTTP_STATUS_502_BAD_GATEWAY: AsciiPrint ("\n Server Error: 502 Bad Gateway"); break; case HTTP_STATUS_503_SERVICE_UNAVAILABLE: AsciiPrint ("\n Server Error: 503 Service Unavailable"); break; case HTTP_STATUS_504_GATEWAY_TIME_OUT: AsciiPrint ("\n Server Error: 504 Gateway Timeout"); break; case HTTP_STATUS_505_HTTP_VERSION_NOT_SUPPORTED: AsciiPrint ("\n Server Error: 505 HTTP Version Not Supported"); break; default: ; } } /** Notify the callback function when an event is triggered. @param[in] Event The triggered event. @param[in] Context The opaque parameter to the function. **/ VOID EFIAPI HttpBootCommonNotify ( IN EFI_EVENT Event, IN VOID *Context ) { *((BOOLEAN *) Context) = TRUE; } /** Retrieve the host address using the EFI_DNS6_PROTOCOL. @param[in] Private The pointer to the driver's private data. @param[in] HostName Pointer to buffer containing hostname. @param[out] IpAddress On output, pointer to buffer containing IPv6 address. @retval EFI_SUCCESS Operation succeeded. @retval EFI_DEVICE_ERROR An unexpected network error occurred. @retval Others Other errors as indicated. **/ EFI_STATUS HttpBootDns ( IN HTTP_BOOT_PRIVATE_DATA *Private, IN CHAR16 *HostName, OUT EFI_IPv6_ADDRESS *IpAddress ) { EFI_STATUS Status; EFI_DNS6_PROTOCOL *Dns6; EFI_DNS6_CONFIG_DATA Dns6ConfigData; EFI_DNS6_COMPLETION_TOKEN Token; EFI_HANDLE Dns6Handle; EFI_IP6_CONFIG_PROTOCOL *Ip6Config; EFI_IPv6_ADDRESS *DnsServerList; UINTN DnsServerListCount; UINTN DataSize; BOOLEAN IsDone; DnsServerList = NULL; DnsServerListCount = 0; Dns6 = NULL; Dns6Handle = NULL; ZeroMem (&Token, sizeof (EFI_DNS6_COMPLETION_TOKEN)); // // Get DNS server list from EFI IPv6 Configuration protocol. // Status = gBS->HandleProtocol (Private->Controller, &gEfiIp6ConfigProtocolGuid, (VOID **) &Ip6Config); if (!EFI_ERROR (Status)) { // // Get the required size. // DataSize = 0; Status = Ip6Config->GetData (Ip6Config, Ip6ConfigDataTypeDnsServer, &DataSize, NULL); if (Status == EFI_BUFFER_TOO_SMALL) { DnsServerList = AllocatePool (DataSize); if (DnsServerList == NULL) { return EFI_OUT_OF_RESOURCES; } Status = Ip6Config->GetData (Ip6Config, Ip6ConfigDataTypeDnsServer, &DataSize, DnsServerList); if (EFI_ERROR (Status)) { FreePool (DnsServerList); DnsServerList = NULL; } else { DnsServerListCount = DataSize / sizeof (EFI_IPv6_ADDRESS); } } } // // Create a DNSv6 child instance and get the protocol. // Status = NetLibCreateServiceChild ( Private->Controller, Private->Ip6Nic->ImageHandle, &gEfiDns6ServiceBindingProtocolGuid, &Dns6Handle ); if (EFI_ERROR (Status)) { goto Exit; } Status = gBS->OpenProtocol ( Dns6Handle, &gEfiDns6ProtocolGuid, (VOID **) &Dns6, Private->Ip6Nic->ImageHandle, Private->Controller, EFI_OPEN_PROTOCOL_BY_DRIVER ); if (EFI_ERROR (Status)) { goto Exit; } // // Configure DNS6 instance for the DNS server address and protocol. // ZeroMem (&Dns6ConfigData, sizeof (EFI_DNS6_CONFIG_DATA)); Dns6ConfigData.DnsServerCount = (UINT32)DnsServerListCount; Dns6ConfigData.DnsServerList = DnsServerList; Dns6ConfigData.EnableDnsCache = TRUE; Dns6ConfigData.Protocol = EFI_IP_PROTO_UDP; IP6_COPY_ADDRESS (&Dns6ConfigData.StationIp,&Private->StationIp.v6); Status = Dns6->Configure ( Dns6, &Dns6ConfigData ); if (EFI_ERROR (Status)) { goto Exit; } Token.Status = EFI_NOT_READY; IsDone = FALSE; // // Create event to set the IsDone flag when name resolution is finished. // Status = gBS->CreateEvent ( EVT_NOTIFY_SIGNAL, TPL_NOTIFY, HttpBootCommonNotify, &IsDone, &Token.Event ); if (EFI_ERROR (Status)) { goto Exit; } // // Start asynchronous name resolution. // Status = Dns6->HostNameToIp (Dns6, HostName, &Token); if (EFI_ERROR (Status)) { goto Exit; } while (!IsDone) { Dns6->Poll (Dns6); } // // Name resolution is done, check result. // Status = Token.Status; if (!EFI_ERROR (Status)) { if (Token.RspData.H2AData == NULL) { Status = EFI_DEVICE_ERROR; goto Exit; } if (Token.RspData.H2AData->IpCount == 0 || Token.RspData.H2AData->IpList == NULL) { Status = EFI_DEVICE_ERROR; goto Exit; } // // We just return the first IPv6 address from DNS protocol. // IP6_COPY_ADDRESS (IpAddress, Token.RspData.H2AData->IpList); Status = EFI_SUCCESS; } Exit: if (Token.Event != NULL) { gBS->CloseEvent (Token.Event); } if (Token.RspData.H2AData != NULL) { if (Token.RspData.H2AData->IpList != NULL) { FreePool (Token.RspData.H2AData->IpList); } FreePool (Token.RspData.H2AData); } if (Dns6 != NULL) { Dns6->Configure (Dns6, NULL); gBS->CloseProtocol ( Dns6Handle, &gEfiDns6ProtocolGuid, Private->Ip6Nic->ImageHandle, Private->Controller ); } if (Dns6Handle != NULL) { NetLibDestroyServiceChild ( Private->Controller, Private->Ip6Nic->ImageHandle, &gEfiDns6ServiceBindingProtocolGuid, Dns6Handle ); } if (DnsServerList != NULL) { FreePool (DnsServerList); } return Status; } /** Create a HTTP_IO_HEADER to hold the HTTP header items. @param[in] MaxHeaderCount The maximum number of HTTP header in this holder. @return A pointer of the HTTP header holder or NULL if failed. **/ HTTP_IO_HEADER * HttpBootCreateHeader ( UINTN MaxHeaderCount ) { HTTP_IO_HEADER *HttpIoHeader; if (MaxHeaderCount == 0) { return NULL; } HttpIoHeader = AllocateZeroPool (sizeof (HTTP_IO_HEADER) + MaxHeaderCount * sizeof (EFI_HTTP_HEADER)); if (HttpIoHeader == NULL) { return NULL; } HttpIoHeader->MaxHeaderCount = MaxHeaderCount; HttpIoHeader->Headers = (EFI_HTTP_HEADER *) (HttpIoHeader + 1); return HttpIoHeader; } /** Destroy the HTTP_IO_HEADER and release the resources. @param[in] HttpIoHeader Point to the HTTP header holder to be destroyed. **/ VOID HttpBootFreeHeader ( IN HTTP_IO_HEADER *HttpIoHeader ) { UINTN Index; if (HttpIoHeader != NULL) { if (HttpIoHeader->HeaderCount != 0) { for (Index = 0; Index < HttpIoHeader->HeaderCount; Index++) { FreePool (HttpIoHeader->Headers[Index].FieldName); FreePool (HttpIoHeader->Headers[Index].FieldValue); } } FreePool (HttpIoHeader); } } /** Set or update a HTTP header with the field name and corresponding value. @param[in] HttpIoHeader Point to the HTTP header holder. @param[in] FieldName Null terminated string which describes a field name. @param[in] FieldValue Null terminated string which describes the corresponding field value. @retval EFI_SUCCESS The HTTP header has been set or updated. @retval EFI_INVALID_PARAMETER Any input parameter is invalid. @retval EFI_OUT_OF_RESOURCES Insufficient resource to complete the operation. @retval Other Unexpected error happened. **/ EFI_STATUS HttpBootSetHeader ( IN HTTP_IO_HEADER *HttpIoHeader, IN CHAR8 *FieldName, IN CHAR8 *FieldValue ) { EFI_HTTP_HEADER *Header; UINTN StrSize; CHAR8 *NewFieldValue; if (HttpIoHeader == NULL || FieldName == NULL || FieldValue == NULL) { return EFI_INVALID_PARAMETER; } Header = HttpFindHeader (HttpIoHeader->HeaderCount, HttpIoHeader->Headers, FieldName); if (Header == NULL) { // // Add a new header. // if (HttpIoHeader->HeaderCount >= HttpIoHeader->MaxHeaderCount) { return EFI_OUT_OF_RESOURCES; } Header = &HttpIoHeader->Headers[HttpIoHeader->HeaderCount]; StrSize = AsciiStrSize (FieldName); Header->FieldName = AllocatePool (StrSize); if (Header->FieldName == NULL) { return EFI_OUT_OF_RESOURCES; } CopyMem (Header->FieldName, FieldName, StrSize); Header->FieldName[StrSize -1] = '\0'; StrSize = AsciiStrSize (FieldValue); Header->FieldValue = AllocatePool (StrSize); if (Header->FieldValue == NULL) { FreePool (Header->FieldName); return EFI_OUT_OF_RESOURCES; } CopyMem (Header->FieldValue, FieldValue, StrSize); Header->FieldValue[StrSize -1] = '\0'; HttpIoHeader->HeaderCount++; } else { // // Update an existing one. // StrSize = AsciiStrSize (FieldValue); NewFieldValue = AllocatePool (StrSize); if (NewFieldValue == NULL) { return EFI_OUT_OF_RESOURCES; } CopyMem (NewFieldValue, FieldValue, StrSize); NewFieldValue[StrSize -1] = '\0'; if (Header->FieldValue != NULL) { FreePool (Header->FieldValue); } Header->FieldValue = NewFieldValue; } return EFI_SUCCESS; } /** Notify the callback function when an event is triggered. @param[in] Context The opaque parameter to the function. **/ VOID EFIAPI HttpIoNotifyDpc ( IN VOID *Context ) { *((BOOLEAN *) Context) = TRUE; } /** Request HttpIoNotifyDpc as a DPC at TPL_CALLBACK. @param[in] Event The event signaled. @param[in] Context The opaque parameter to the function. **/ VOID EFIAPI HttpIoNotify ( IN EFI_EVENT Event, IN VOID *Context ) { // // Request HttpIoNotifyDpc as a DPC at TPL_CALLBACK // QueueDpc (TPL_CALLBACK, HttpIoNotifyDpc, Context); } /** Create a HTTP_IO to access the HTTP service. It will create and configure a HTTP child handle. @param[in] Image The handle of the driver image. @param[in] Controller The handle of the controller. @param[in] IpVersion IP_VERSION_4 or IP_VERSION_6. @param[in] ConfigData The HTTP_IO configuration data. @param[in] Callback Callback function which will be invoked when specified HTTP_IO_CALLBACK_EVENT happened. @param[in] Context The Context data which will be passed to the Callback function. @param[out] HttpIo The HTTP_IO. @retval EFI_SUCCESS The HTTP_IO is created and configured. @retval EFI_INVALID_PARAMETER One or more parameters are invalid. @retval EFI_UNSUPPORTED One or more of the control options are not supported in the implementation. @retval EFI_OUT_OF_RESOURCES Failed to allocate memory. @retval Others Failed to create the HTTP_IO or configure it. **/ EFI_STATUS HttpIoCreateIo ( IN EFI_HANDLE Image, IN EFI_HANDLE Controller, IN UINT8 IpVersion, IN HTTP_IO_CONFIG_DATA *ConfigData, IN HTTP_IO_CALLBACK Callback, IN VOID *Context, OUT HTTP_IO *HttpIo ) { EFI_STATUS Status; EFI_HTTP_CONFIG_DATA HttpConfigData; EFI_HTTPv4_ACCESS_POINT Http4AccessPoint; EFI_HTTPv6_ACCESS_POINT Http6AccessPoint; EFI_HTTP_PROTOCOL *Http; EFI_EVENT Event; if ((Image == NULL) || (Controller == NULL) || (ConfigData == NULL) || (HttpIo == NULL)) { return EFI_INVALID_PARAMETER; } if (IpVersion != IP_VERSION_4 && IpVersion != IP_VERSION_6) { return EFI_UNSUPPORTED; } ZeroMem (HttpIo, sizeof (HTTP_IO)); // // Create the HTTP child instance and get the HTTP protocol. // Status = NetLibCreateServiceChild ( Controller, Image, &gEfiHttpServiceBindingProtocolGuid, &HttpIo->Handle ); if (EFI_ERROR (Status)) { return Status; } Status = gBS->OpenProtocol ( HttpIo->Handle, &gEfiHttpProtocolGuid, (VOID **) &Http, Image, Controller, EFI_OPEN_PROTOCOL_BY_DRIVER ); if (EFI_ERROR (Status) || (Http == NULL)) { goto ON_ERROR; } // // Init the configuration data and configure the HTTP child. // HttpIo->Image = Image; HttpIo->Controller = Controller; HttpIo->IpVersion = IpVersion; HttpIo->Http = Http; HttpIo->Callback = Callback; HttpIo->Context = Context; ZeroMem (&HttpConfigData, sizeof (EFI_HTTP_CONFIG_DATA)); HttpConfigData.HttpVersion = HttpVersion11; HttpConfigData.TimeOutMillisec = ConfigData->Config4.RequestTimeOut; if (HttpIo->IpVersion == IP_VERSION_4) { HttpConfigData.LocalAddressIsIPv6 = FALSE; Http4AccessPoint.UseDefaultAddress = ConfigData->Config4.UseDefaultAddress; Http4AccessPoint.LocalPort = ConfigData->Config4.LocalPort; IP4_COPY_ADDRESS (&Http4AccessPoint.LocalAddress, &ConfigData->Config4.LocalIp); IP4_COPY_ADDRESS (&Http4AccessPoint.LocalSubnet, &ConfigData->Config4.SubnetMask); HttpConfigData.AccessPoint.IPv4Node = &Http4AccessPoint; } else { HttpConfigData.LocalAddressIsIPv6 = TRUE; Http6AccessPoint.LocalPort = ConfigData->Config6.LocalPort; IP6_COPY_ADDRESS (&Http6AccessPoint.LocalAddress, &ConfigData->Config6.LocalIp); HttpConfigData.AccessPoint.IPv6Node = &Http6AccessPoint; } Status = Http->Configure (Http, &HttpConfigData); if (EFI_ERROR (Status)) { goto ON_ERROR; } // // Create events for various asynchronous operations. // Status = gBS->CreateEvent ( EVT_NOTIFY_SIGNAL, TPL_NOTIFY, HttpIoNotify, &HttpIo->IsTxDone, &Event ); if (EFI_ERROR (Status)) { goto ON_ERROR; } HttpIo->ReqToken.Event = Event; HttpIo->ReqToken.Message = &HttpIo->ReqMessage; Status = gBS->CreateEvent ( EVT_NOTIFY_SIGNAL, TPL_NOTIFY, HttpIoNotify, &HttpIo->IsRxDone, &Event ); if (EFI_ERROR (Status)) { goto ON_ERROR; } HttpIo->RspToken.Event = Event; HttpIo->RspToken.Message = &HttpIo->RspMessage; // // Create TimeoutEvent for response // Status = gBS->CreateEvent ( EVT_TIMER, TPL_CALLBACK, NULL, NULL, &Event ); if (EFI_ERROR (Status)) { goto ON_ERROR; } HttpIo->TimeoutEvent = Event; return EFI_SUCCESS; ON_ERROR: HttpIoDestroyIo (HttpIo); return Status; } /** Destroy the HTTP_IO and release the resources. @param[in] HttpIo The HTTP_IO which wraps the HTTP service to be destroyed. **/ VOID HttpIoDestroyIo ( IN HTTP_IO *HttpIo ) { EFI_HTTP_PROTOCOL *Http; EFI_EVENT Event; if (HttpIo == NULL) { return; } Event = HttpIo->ReqToken.Event; if (Event != NULL) { gBS->CloseEvent (Event); } Event = HttpIo->RspToken.Event; if (Event != NULL) { gBS->CloseEvent (Event); } Event = HttpIo->TimeoutEvent; if (Event != NULL) { gBS->CloseEvent (Event); } Http = HttpIo->Http; if (Http != NULL) { Http->Configure (Http, NULL); gBS->CloseProtocol ( HttpIo->Handle, &gEfiHttpProtocolGuid, HttpIo->Image, HttpIo->Controller ); } NetLibDestroyServiceChild ( HttpIo->Controller, HttpIo->Image, &gEfiHttpServiceBindingProtocolGuid, HttpIo->Handle ); } /** Synchronously send a HTTP REQUEST message to the server. @param[in] HttpIo The HttpIo wrapping the HTTP service. @param[in] Request A pointer to storage such data as URL and HTTP method. @param[in] HeaderCount Number of HTTP header structures in Headers list. @param[in] Headers Array containing list of HTTP headers. @param[in] BodyLength Length in bytes of the HTTP body. @param[in] Body Body associated with the HTTP request. @retval EFI_SUCCESS The HTTP request is transmitted. @retval EFI_INVALID_PARAMETER One or more parameters are invalid. @retval EFI_OUT_OF_RESOURCES Failed to allocate memory. @retval EFI_DEVICE_ERROR An unexpected network or system error occurred. @retval Others Other errors as indicated. **/ EFI_STATUS HttpIoSendRequest ( IN HTTP_IO *HttpIo, IN EFI_HTTP_REQUEST_DATA *Request, IN UINTN HeaderCount, IN EFI_HTTP_HEADER *Headers, IN UINTN BodyLength, IN VOID *Body ) { EFI_STATUS Status; EFI_HTTP_PROTOCOL *Http; if (HttpIo == NULL || HttpIo->Http == NULL) { return EFI_INVALID_PARAMETER; } HttpIo->ReqToken.Status = EFI_NOT_READY; HttpIo->ReqToken.Message->Data.Request = Request; HttpIo->ReqToken.Message->HeaderCount = HeaderCount; HttpIo->ReqToken.Message->Headers = Headers; HttpIo->ReqToken.Message->BodyLength = BodyLength; HttpIo->ReqToken.Message->Body = Body; if (HttpIo->Callback != NULL) { Status = HttpIo->Callback ( HttpIoRequest, HttpIo->ReqToken.Message, HttpIo->Context ); if (EFI_ERROR (Status)) { return Status; } } // // Queue the request token to HTTP instances. // Http = HttpIo->Http; HttpIo->IsTxDone = FALSE; Status = Http->Request ( Http, &HttpIo->ReqToken ); if (EFI_ERROR (Status)) { return Status; } // // Poll the network until transmit finish. // while (!HttpIo->IsTxDone) { Http->Poll (Http); } return HttpIo->ReqToken.Status; } /** Synchronously receive a HTTP RESPONSE message from the server. @param[in] HttpIo The HttpIo wrapping the HTTP service. @param[in] RecvMsgHeader TRUE to receive a new HTTP response (from message header). FALSE to continue receive the previous response message. @param[out] ResponseData Point to a wrapper of the received response data. @retval EFI_SUCCESS The HTTP response is received. @retval EFI_INVALID_PARAMETER One or more parameters are invalid. @retval EFI_OUT_OF_RESOURCES Failed to allocate memory. @retval EFI_DEVICE_ERROR An unexpected network or system error occurred. @retval Others Other errors as indicated. **/ EFI_STATUS HttpIoRecvResponse ( IN HTTP_IO *HttpIo, IN BOOLEAN RecvMsgHeader, OUT HTTP_IO_RESPONSE_DATA *ResponseData ) { EFI_STATUS Status; EFI_HTTP_PROTOCOL *Http; if (HttpIo == NULL || HttpIo->Http == NULL || ResponseData == NULL) { return EFI_INVALID_PARAMETER; } // // Start the timer, and wait Timeout seconds to receive the header packet. // Status = gBS->SetTimer (HttpIo->TimeoutEvent, TimerRelative, HTTP_BOOT_RESPONSE_TIMEOUT * TICKS_PER_MS); if (EFI_ERROR (Status)) { return Status; } // // Queue the response token to HTTP instances. // HttpIo->RspToken.Status = EFI_NOT_READY; if (RecvMsgHeader) { HttpIo->RspToken.Message->Data.Response = &ResponseData->Response; } else { HttpIo->RspToken.Message->Data.Response = NULL; } HttpIo->RspToken.Message->HeaderCount = 0; HttpIo->RspToken.Message->Headers = NULL; HttpIo->RspToken.Message->BodyLength = ResponseData->BodyLength; HttpIo->RspToken.Message->Body = ResponseData->Body; Http = HttpIo->Http; HttpIo->IsRxDone = FALSE; Status = Http->Response ( Http, &HttpIo->RspToken ); if (EFI_ERROR (Status)) { gBS->SetTimer (HttpIo->TimeoutEvent, TimerCancel, 0); return Status; } // // Poll the network until receive finish. // while (!HttpIo->IsRxDone && ((HttpIo->TimeoutEvent == NULL) || EFI_ERROR (gBS->CheckEvent (HttpIo->TimeoutEvent)))) { Http->Poll (Http); } gBS->SetTimer (HttpIo->TimeoutEvent, TimerCancel, 0); if (!HttpIo->IsRxDone) { // // Timeout occurs, cancel the response token. // Http->Cancel (Http, &HttpIo->RspToken); Status = EFI_TIMEOUT; return Status; } else { HttpIo->IsRxDone = FALSE; } if ((HttpIo->Callback != NULL) && (HttpIo->RspToken.Status == EFI_SUCCESS || HttpIo->RspToken.Status == EFI_HTTP_ERROR)) { Status = HttpIo->Callback ( HttpIoResponse, HttpIo->RspToken.Message, HttpIo->Context ); if (EFI_ERROR (Status)) { return Status; } } // // Store the received data into the wrapper. // ResponseData->Status = HttpIo->RspToken.Status; ResponseData->HeaderCount = HttpIo->RspToken.Message->HeaderCount; ResponseData->Headers = HttpIo->RspToken.Message->Headers; ResponseData->BodyLength = HttpIo->RspToken.Message->BodyLength; return Status; } /** This function checks the HTTP(S) URI scheme. @param[in] Uri The pointer to the URI string. @retval EFI_SUCCESS The URI scheme is valid. @retval EFI_INVALID_PARAMETER The URI scheme is not HTTP or HTTPS. @retval EFI_ACCESS_DENIED HTTP is disabled and the URI is HTTP. **/ EFI_STATUS HttpBootCheckUriScheme ( IN CHAR8 *Uri ) { UINTN Index; EFI_STATUS Status; Status = EFI_SUCCESS; // // Convert the scheme to all lower case. // for (Index = 0; Index < AsciiStrLen (Uri); Index++) { if (Uri[Index] == ':') { break; } if (Uri[Index] >= 'A' && Uri[Index] <= 'Z') { Uri[Index] -= (CHAR8)('A' - 'a'); } } // // Return EFI_INVALID_PARAMETER if the URI is not HTTP or HTTPS. // if ((AsciiStrnCmp (Uri, "http://", 7) != 0) && (AsciiStrnCmp (Uri, "https://", 8) != 0)) { DEBUG ((EFI_D_ERROR, "HttpBootCheckUriScheme: Invalid Uri.\n")); return EFI_INVALID_PARAMETER; } // // HTTP is disabled, return EFI_ACCESS_DENIED if the URI is HTTP. // if (!PcdGetBool (PcdAllowHttpConnections) && (AsciiStrnCmp (Uri, "http://", 7) == 0)) { DEBUG ((EFI_D_ERROR, "HttpBootCheckUriScheme: HTTP is disabled.\n")); return EFI_ACCESS_DENIED; } return Status; } /** Get the URI address string from the input device path. Caller need to free the buffer in the UriAddress pointer. @param[in] FilePath Pointer to the device path which contains a URI device path node. @param[out] UriAddress The URI address string extract from the device path. @retval EFI_SUCCESS The URI string is returned. @retval EFI_OUT_OF_RESOURCES Failed to allocate memory. **/ EFI_STATUS HttpBootParseFilePath ( IN EFI_DEVICE_PATH_PROTOCOL *FilePath, OUT CHAR8 **UriAddress ) { EFI_DEVICE_PATH_PROTOCOL *TempDevicePath; URI_DEVICE_PATH *UriDevicePath; CHAR8 *Uri; UINTN UriStrLength; if (FilePath == NULL) { return EFI_INVALID_PARAMETER; } *UriAddress = NULL; // // Extract the URI address from the FilePath // TempDevicePath = FilePath; while (!IsDevicePathEnd (TempDevicePath)) { if ((DevicePathType (TempDevicePath) == MESSAGING_DEVICE_PATH) && (DevicePathSubType (TempDevicePath) == MSG_URI_DP)) { UriDevicePath = (URI_DEVICE_PATH*) TempDevicePath; // // UEFI Spec doesn't require the URI to be a NULL-terminated string // So we allocate a new buffer and always append a '\0' to it. // UriStrLength = DevicePathNodeLength (UriDevicePath) - sizeof(EFI_DEVICE_PATH_PROTOCOL); if (UriStrLength == 0) { // // return a NULL UriAddress if it's a empty URI device path node. // break; } Uri = AllocatePool (UriStrLength + 1); if (Uri == NULL) { return EFI_OUT_OF_RESOURCES; } CopyMem (Uri, UriDevicePath->Uri, DevicePathNodeLength (UriDevicePath) - sizeof(EFI_DEVICE_PATH_PROTOCOL)); Uri[DevicePathNodeLength (UriDevicePath) - sizeof(EFI_DEVICE_PATH_PROTOCOL)] = '\0'; *UriAddress = Uri; } TempDevicePath = NextDevicePathNode (TempDevicePath); } return EFI_SUCCESS; } /** This function returns the image type according to server replied HTTP message and also the image's URI info. @param[in] Uri The pointer to the image's URI string. @param[in] UriParser URI Parse result returned by NetHttpParseUrl(). @param[in] HeaderCount Number of HTTP header structures in Headers list. @param[in] Headers Array containing list of HTTP headers. @param[out] ImageType The image type of the downloaded file. @retval EFI_SUCCESS The image type is returned in ImageType. @retval EFI_INVALID_PARAMETER ImageType, Uri or UriParser is NULL. @retval EFI_INVALID_PARAMETER HeaderCount is not zero, and Headers is NULL. @retval EFI_NOT_FOUND Failed to identify the image type. @retval Others Unexpected error happened. **/ EFI_STATUS HttpBootCheckImageType ( IN CHAR8 *Uri, IN VOID *UriParser, IN UINTN HeaderCount, IN EFI_HTTP_HEADER *Headers, OUT HTTP_BOOT_IMAGE_TYPE *ImageType ) { EFI_STATUS Status; EFI_HTTP_HEADER *Header; CHAR8 *FilePath; CHAR8 *FilePost; if (Uri == NULL || UriParser == NULL || ImageType == NULL) { return EFI_INVALID_PARAMETER; } if (HeaderCount != 0 && Headers == NULL) { return EFI_INVALID_PARAMETER; } // // Determine the image type by the HTTP Content-Type header field first. // "application/efi" -> EFI Image // "application/vnd.efi-iso" -> CD/DVD Image // "application/vnd.efi-img" -> Virtual Disk Image // Header = HttpFindHeader (HeaderCount, Headers, HTTP_HEADER_CONTENT_TYPE); if (Header != NULL) { if (AsciiStriCmp (Header->FieldValue, HTTP_CONTENT_TYPE_APP_EFI) == 0) { *ImageType = ImageTypeEfi; return EFI_SUCCESS; } else if (AsciiStriCmp (Header->FieldValue, HTTP_CONTENT_TYPE_APP_ISO) == 0) { *ImageType = ImageTypeVirtualCd; return EFI_SUCCESS; } else if (AsciiStriCmp (Header->FieldValue, HTTP_CONTENT_TYPE_APP_IMG) == 0) { *ImageType = ImageTypeVirtualDisk; return EFI_SUCCESS; } } // // Determine the image type by file extension: // *.efi -> EFI Image // *.iso -> CD/DVD Image // *.img -> Virtual Disk Image // Status = HttpUrlGetPath ( Uri, UriParser, &FilePath ); if (EFI_ERROR (Status)) { return Status; } FilePost = FilePath + AsciiStrLen (FilePath) - 4; if (AsciiStrCmp (FilePost, ".efi") == 0) { *ImageType = ImageTypeEfi; } else if (AsciiStrCmp (FilePost, ".iso") == 0) { *ImageType = ImageTypeVirtualCd; } else if (AsciiStrCmp (FilePost, ".img") == 0) { *ImageType = ImageTypeVirtualDisk; } else { *ImageType = ImageTypeMax; } FreePool (FilePath); return (*ImageType < ImageTypeMax) ? EFI_SUCCESS : EFI_NOT_FOUND; } /** This function register the RAM disk info to the system. @param[in] Private The pointer to the driver's private data. @param[in] BufferSize The size of Buffer in bytes. @param[in] Buffer The base address of the RAM disk. @param[in] ImageType The image type of the file in Buffer. @retval EFI_SUCCESS The RAM disk has been registered. @retval EFI_NOT_FOUND No RAM disk protocol instances were found. @retval EFI_UNSUPPORTED The ImageType is not supported. @retval Others Unexpected error happened. **/ EFI_STATUS HttpBootRegisterRamDisk ( IN HTTP_BOOT_PRIVATE_DATA *Private, IN UINTN BufferSize, IN VOID *Buffer, IN HTTP_BOOT_IMAGE_TYPE ImageType ) { EFI_RAM_DISK_PROTOCOL *RamDisk; EFI_STATUS Status; EFI_DEVICE_PATH_PROTOCOL *DevicePath; EFI_GUID *RamDiskType; ASSERT (Private != NULL); ASSERT (Buffer != NULL); ASSERT (BufferSize != 0); Status = gBS->LocateProtocol (&gEfiRamDiskProtocolGuid, NULL, (VOID**) &RamDisk); if (EFI_ERROR (Status)) { DEBUG ((EFI_D_ERROR, "HTTP Boot: Couldn't find the RAM Disk protocol - %r\n", Status)); return Status; } if (ImageType == ImageTypeVirtualCd) { RamDiskType = &gEfiVirtualCdGuid; } else if (ImageType == ImageTypeVirtualDisk) { RamDiskType = &gEfiVirtualDiskGuid; } else { return EFI_UNSUPPORTED; } Status = RamDisk->Register ( (UINTN)Buffer, (UINT64)BufferSize, RamDiskType, Private->UsingIpv6 ? Private->Ip6Nic->DevicePath : Private->Ip4Nic->DevicePath, &DevicePath ); if (EFI_ERROR (Status)) { DEBUG ((EFI_D_ERROR, "HTTP Boot: Failed to register RAM Disk - %r\n", Status)); } return Status; } /** Indicate if the HTTP status code indicates a redirection. @param[in] StatusCode HTTP status code from server. @return TRUE if it's redirection. **/ BOOLEAN HttpBootIsHttpRedirectStatusCode ( IN EFI_HTTP_STATUS_CODE StatusCode ) { if (StatusCode == HTTP_STATUS_301_MOVED_PERMANENTLY || StatusCode == HTTP_STATUS_302_FOUND || StatusCode == HTTP_STATUS_307_TEMPORARY_REDIRECT || StatusCode == HTTP_STATUS_308_PERMANENT_REDIRECT) { return TRUE; } return FALSE; }