/** The Request() function queues an HTTP request to this HTTP instance. Similar to Transmit() function in the EFI TCP driver. When the HTTP request is sent successfully, or if there is an error, Status in token will be updated and Event will be signaled. @param[in] This Pointer to EFI_HTTP_PROTOCOL instance. @param[in] Token Pointer to storage containing HTTP request token. @retval EFI_SUCCESS Outgoing data was processed. @retval EFI_NOT_STARTED This EFI HTTP Protocol instance has not been started. @retval EFI_DEVICE_ERROR An unexpected system or network error occurred. @retval EFI_TIMEOUT Data was dropped out of the transmit or receive queue. @retval EFI_OUT_OF_RESOURCES Could not allocate enough system resources. @retval EFI_UNSUPPORTED The HTTP method is not supported in current implementation. @retval EFI_INVALID_PARAMETER One or more of the following conditions is TRUE: This is NULL. Token is NULL. Token->Message is NULL. Token->Message->Body is not NULL, Token->Message->BodyLength is non-zero, and Token->Message->Data is NULL, but a previous call to Request()has not been completed successfully. **/ EFI_STATUS EFIAPI EfiHttpRequest ( IN EFI_HTTP_PROTOCOL *This, IN EFI_HTTP_TOKEN *Token ) { EFI_HTTP_MESSAGE *HttpMsg; EFI_HTTP_REQUEST_DATA *Request; VOID *UrlParser; EFI_STATUS Status; CHAR8 *HostName; UINT16 RemotePort; HTTP_PROTOCOL *HttpInstance; BOOLEAN Configure; BOOLEAN ReConfigure; CHAR8 *RequestMsg; CHAR8 *Url; UINTN UrlLen; CHAR16 *HostNameStr; HTTP_TOKEN_WRAP *Wrap; CHAR8 *FileUrl; UINTN RequestMsgSize; if ((This == NULL) || (Token == NULL)) { return EFI_INVALID_PARAMETER; } HttpMsg = Token->Message; if ((HttpMsg == NULL) || (HttpMsg->Headers == NULL)) { return EFI_INVALID_PARAMETER; } // // Current implementation does not support POST/PUT method. // If future version supports these two methods, Request could be NULL for a special case that to send large amounts // of data. For this case, the implementation need check whether previous call to Request() has been completed or not. // // Request = HttpMsg->Data.Request; if ((Request == NULL) || (Request->Url == NULL)) { return EFI_INVALID_PARAMETER; } // // Only support GET and HEAD method in current implementation. // if ((Request->Method != HttpMethodGet) && (Request->Method != HttpMethodHead)) { return EFI_UNSUPPORTED; } HttpInstance = HTTP_INSTANCE_FROM_PROTOCOL (This); ASSERT (HttpInstance != NULL); if (HttpInstance->State < HTTP_STATE_HTTP_CONFIGED) { return EFI_NOT_STARTED; } // // Check whether the token already existed. // if (EFI_ERROR (NetMapIterate (&HttpInstance->TxTokens, HttpTokenExist, Token))) { return EFI_ACCESS_DENIED; } HostName = NULL; Wrap = NULL; HostNameStr = NULL; // // Parse the URI of the remote host. // Url = HttpInstance->Url; UrlLen = StrLen (Request->Url) + 1; if (UrlLen > HTTP_URL_BUFFER_LEN) { Url = AllocateZeroPool (UrlLen); if (Url == NULL) { return EFI_OUT_OF_RESOURCES; } FreePool (HttpInstance->Url); HttpInstance->Url = Url; } UnicodeStrToAsciiStr (Request->Url, Url); UrlParser = NULL; Status = HttpParseUrl (Url, (UINT32) AsciiStrLen (Url), FALSE, &UrlParser); if (EFI_ERROR (Status)) { goto Error1; } RequestMsg = NULL; HostName = NULL; Status = HttpUrlGetHostName (Url, UrlParser, &HostName); if (EFI_ERROR (Status)) { goto Error1; } Status = HttpUrlGetPort (Url, UrlParser, &RemotePort); if (EFI_ERROR (Status)) { RemotePort = HTTP_DEFAULT_PORT; } // // If Configure is TRUE, it indicates the first time to call Request(); // If ReConfigure is TRUE, it indicates the request URL is not same // with the previous call to Request(); // Configure = TRUE; ReConfigure = TRUE; if (HttpInstance->RemoteHost == NULL) { // // Request() is called the first time. // ReConfigure = FALSE; } else { if ((HttpInstance->RemotePort == RemotePort) && (AsciiStrCmp (HttpInstance->RemoteHost, HostName) == 0)) { // // Host Name and port number of the request URL are the same with previous call to Request(). // Check whether previous TCP packet sent out. // if (EFI_ERROR (NetMapIterate (&HttpInstance->TxTokens, HttpTcpNotReady, NULL))) { // // Wrap the HTTP token in HTTP_TOKEN_WRAP // Wrap = AllocateZeroPool (sizeof (HTTP_TOKEN_WRAP)); if (Wrap == NULL) { Status = EFI_OUT_OF_RESOURCES; goto Error1; } Wrap->HttpToken = Token; Wrap->HttpInstance = HttpInstance; Status = HttpCreateTcpTxEvent (Wrap); if (EFI_ERROR (Status)) { goto Error1; } Status = NetMapInsertTail (&HttpInstance->TxTokens, Token, Wrap); if (EFI_ERROR (Status)) { goto Error1; } Wrap->TcpWrap.Method = Request->Method; FreePool (HostName); // // Queue the HTTP token and return. // return EFI_SUCCESS; } else { // // Use existing TCP instance to transmit the packet. // Configure = FALSE; ReConfigure = FALSE; } } else { // // Need close existing TCP instance and create a new TCP instance for data transmit. // if (HttpInstance->RemoteHost != NULL) { FreePool (HttpInstance->RemoteHost); HttpInstance->RemoteHost = NULL; HttpInstance->RemotePort = 0; } } } if (Configure) { // // Parse Url for IPv4 or IPv6 address, if failed, perform DNS resolution. // if (!HttpInstance->LocalAddressIsIPv6) { Status = NetLibAsciiStrToIp4 (HostName, &HttpInstance->RemoteAddr); } else { Status = HttpUrlGetIp6 (Url, UrlParser, &HttpInstance->RemoteIpv6Addr); } if (EFI_ERROR (Status)) { HostNameStr = AllocateZeroPool ((AsciiStrLen (HostName) + 1) * sizeof (CHAR16)); if (HostNameStr == NULL) { Status = EFI_OUT_OF_RESOURCES; goto Error1; } AsciiStrToUnicodeStr (HostName, HostNameStr); if (!HttpInstance->LocalAddressIsIPv6) { Status = HttpDns4 (HttpInstance, HostNameStr, &HttpInstance->RemoteAddr); } else { Status = HttpDns6 (HttpInstance, HostNameStr, &HttpInstance->RemoteIpv6Addr); } FreePool (HostNameStr); if (EFI_ERROR (Status)) { goto Error1; } } // // Save the RemotePort and RemoteHost. // ASSERT (HttpInstance->RemoteHost == NULL); HttpInstance->RemotePort = RemotePort; HttpInstance->RemoteHost = HostName; HostName = NULL; } if (ReConfigure) { // // The request URL is different from previous calls to Request(), close existing TCP instance. // if (!HttpInstance->LocalAddressIsIPv6) { ASSERT (HttpInstance->Tcp4 != NULL); } else { ASSERT (HttpInstance->Tcp6 != NULL); } HttpCloseConnection (HttpInstance); EfiHttpCancel (This, NULL); } // // Wrap the HTTP token in HTTP_TOKEN_WRAP // Wrap = AllocateZeroPool (sizeof (HTTP_TOKEN_WRAP)); if (Wrap == NULL) { Status = EFI_OUT_OF_RESOURCES; goto Error1; } Wrap->HttpToken = Token; Wrap->HttpInstance = HttpInstance; Wrap->TcpWrap.Method = Request->Method; Status = HttpInitTcp (HttpInstance, Wrap, Configure); if (EFI_ERROR (Status)) { goto Error2; } if (!Configure) { // // For the new HTTP token, create TX TCP token events. // Status = HttpCreateTcpTxEvent (Wrap); if (EFI_ERROR (Status)) { goto Error1; } } // // Create request message. // FileUrl = Url; if (*FileUrl != '/') { // // Convert the absolute-URI to the absolute-path // while (*FileUrl != ':') { FileUrl++; } if ((*(FileUrl+1) == '/') && (*(FileUrl+2) == '/')) { FileUrl += 3; while (*FileUrl != '/') { FileUrl++; } } else { Status = EFI_INVALID_PARAMETER; goto Error3; } } Status = HttpGenRequestMessage (HttpMsg, FileUrl, &RequestMsg, &RequestMsgSize); if (EFI_ERROR (Status)) { goto Error3; } Status = NetMapInsertTail (&HttpInstance->TxTokens, Token, Wrap); if (EFI_ERROR (Status)) { goto Error4; } // // Transmit the request message. // Status = HttpTransmitTcp ( HttpInstance, Wrap, (UINT8*) RequestMsg, RequestMsgSize ); if (EFI_ERROR (Status)) { goto Error5; } DispatchDpc (); if (HostName != NULL) { FreePool (HostName); } return EFI_SUCCESS; Error5: NetMapRemoveTail (&HttpInstance->TxTokens, NULL); Error4: if (RequestMsg != NULL) { FreePool (RequestMsg); } Error3: HttpCloseConnection (HttpInstance); Error2: HttpCloseTcpConnCloseEvent (HttpInstance); if (NULL != Wrap->TcpWrap.Tx4Token.CompletionToken.Event) { gBS->CloseEvent (Wrap->TcpWrap.Tx4Token.CompletionToken.Event); Wrap->TcpWrap.Tx4Token.CompletionToken.Event = NULL; } if (NULL != Wrap->TcpWrap.Tx6Token.CompletionToken.Event) { gBS->CloseEvent (Wrap->TcpWrap.Tx6Token.CompletionToken.Event); Wrap->TcpWrap.Tx6Token.CompletionToken.Event = NULL; } Error1: if (HostName != NULL) { FreePool (HostName); } if (Wrap != NULL) { FreePool (Wrap); } if (UrlParser!= NULL) { HttpUrlFreeParser (UrlParser); } return Status; }
/** Parse the cached DHCPv6 packet, including all the options. @param[in] Cache6 The pointer to a cached DHCPv6 packet. @retval EFI_SUCCESS Parsed the DHCPv6 packet successfully. @retval EFI_DEVICE_ERROR Failed to parse and invalid the packet. **/ EFI_STATUS HttpBootParseDhcp6Packet ( IN HTTP_BOOT_DHCP6_PACKET_CACHE *Cache6 ) { EFI_DHCP6_PACKET *Offer; EFI_DHCP6_PACKET_OPTION **Options; EFI_DHCP6_PACKET_OPTION *Option; HTTP_BOOT_OFFER_TYPE OfferType; EFI_IPv6_ADDRESS IpAddr; BOOLEAN IsProxyOffer; BOOLEAN IsHttpOffer; BOOLEAN IsDnsOffer; BOOLEAN IpExpressedUri; EFI_STATUS Status; UINT32 Offset; UINT32 Length; IsDnsOffer = FALSE; IpExpressedUri = FALSE; IsProxyOffer = TRUE; IsHttpOffer = FALSE; Offer = &Cache6->Packet.Offer; Options = Cache6->OptList; ZeroMem (Cache6->OptList, sizeof (Cache6->OptList)); Option = (EFI_DHCP6_PACKET_OPTION *) (Offer->Dhcp6.Option); Offset = 0; Length = GET_DHCP6_OPTION_SIZE (Offer); // // OpLen and OpCode here are both stored in network order, since they are from original packet. // while (Offset < Length) { if (NTOHS (Option->OpCode) == DHCP6_OPT_IA_NA) { Options[HTTP_BOOT_DHCP6_IDX_IA_NA] = Option; } else if (NTOHS (Option->OpCode) == DHCP6_OPT_BOOT_FILE_URL) { // // The server sends this option to inform the client about an URL to a boot file. // Options[HTTP_BOOT_DHCP6_IDX_BOOT_FILE_URL] = Option; } else if (NTOHS (Option->OpCode) == DHCP6_OPT_BOOT_FILE_PARAM) { Options[HTTP_BOOT_DHCP6_IDX_BOOT_FILE_PARAM] = Option; } else if (NTOHS (Option->OpCode) == DHCP6_OPT_VENDOR_CLASS) { Options[HTTP_BOOT_DHCP6_IDX_VENDOR_CLASS] = Option; } else if (NTOHS (Option->OpCode) == DHCP6_OPT_DNS_SERVERS) { Options[HTTP_BOOT_DHCP6_IDX_DNS_SERVER] = Option; } Offset += (NTOHS (Option->OpLen) + 4); Option = (EFI_DHCP6_PACKET_OPTION *) (Offer->Dhcp6.Option + Offset); } // // The offer with assigned client address is NOT a proxy offer. // An ia_na option, embeded with valid ia_addr option and a status_code of success. // Option = Options[HTTP_BOOT_DHCP6_IDX_IA_NA]; if (Option != NULL) { Option = HttpBootParseDhcp6Options ( Option->Data + 12, NTOHS (Option->OpLen), DHCP6_OPT_STATUS_CODE ); if ((Option != NULL && Option->Data[0] == 0) || (Option == NULL)) { IsProxyOffer = FALSE; } } // // The offer with "HTTPClient" is a Http offer. // Option = Options[HTTP_BOOT_DHCP6_IDX_VENDOR_CLASS]; if (Option != NULL && NTOHS(Option->OpLen) >= 16 && CompareMem ((Option->Data + 6), DEFAULT_CLASS_ID_DATA, 10) == 0) { IsHttpOffer = TRUE; } // // The offer with Domain Server is a DNS offer. // Option = Options[HTTP_BOOT_DHCP6_IDX_DNS_SERVER]; if (Option != NULL) { IsDnsOffer = TRUE; } // // Http offer must have a boot URI. // if (IsHttpOffer && Options[HTTP_BOOT_DHCP6_IDX_BOOT_FILE_URL] == NULL) { return EFI_DEVICE_ERROR; } // // Try to retrieve the IP of HTTP server from URI. // if (IsHttpOffer) { Status = HttpParseUrl ( (CHAR8*) Options[HTTP_BOOT_DHCP6_IDX_BOOT_FILE_URL]->Data, (UINT32) AsciiStrLen ((CHAR8*) Options[HTTP_BOOT_DHCP6_IDX_BOOT_FILE_URL]->Data), FALSE, &Cache6->UriParser ); if (EFI_ERROR (Status)) { return EFI_DEVICE_ERROR; } Status = HttpUrlGetIp6 ( (CHAR8*) Options[HTTP_BOOT_DHCP6_IDX_BOOT_FILE_URL]->Data, Cache6->UriParser, &IpAddr ); IpExpressedUri = !EFI_ERROR (Status); } // // Determine offer type of the DHCPv6 packet. // if (IsHttpOffer) { if (IpExpressedUri) { if (IsProxyOffer) { OfferType = HttpOfferTypeProxyIpUri; } else { OfferType = IsDnsOffer ? HttpOfferTypeDhcpIpUriDns : HttpOfferTypeDhcpIpUri; } } else { if (!IsProxyOffer) { OfferType = IsDnsOffer ? HttpOfferTypeDhcpNameUriDns : HttpOfferTypeDhcpNameUri; } else { OfferType = HttpOfferTypeProxyNameUri; } } } else { if (!IsProxyOffer) { OfferType = IsDnsOffer ? HttpOfferTypeDhcpDns : HttpOfferTypeDhcpOnly; } else { return EFI_DEVICE_ERROR; } } Cache6->OfferType = OfferType; return EFI_SUCCESS; }