3 Copyright (c) 2005 - 2006, Intel Corporation
\r
4 All rights reserved. This program and the accompanying materials
\r
5 are licensed and made available under the terms and conditions of the BSD License
\r
6 which accompanies this distribution. The full text of the license may be found at
\r
7 http://opensource.org/licenses/bsd-license.php
\r
9 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
\r
10 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
\r
18 Misc support routines for tcp.
\r
24 #include "Tcp4Main.h"
\r
26 #include <Library/DevicePathLib.h>
\r
28 NET_LIST_ENTRY mTcpRunQue = {
\r
33 NET_LIST_ENTRY mTcpListenQue = {
\r
38 TCP_SEQNO mTcpGlobalIss = 0x4d7e980b;
\r
40 CHAR16 *mTcpStateName[] = {
\r
56 Initialize the Tcb local related members.
\r
58 @param Tcb Pointer to the TCP_CB of this TCP instance.
\r
69 // Compute the checksum of the fixed parts of pseudo header
\r
71 Tcb->HeadSum = NetPseudoHeadChecksum (
\r
78 Tcb->Iss = TcpGetIss ();
\r
79 Tcb->SndUna = Tcb->Iss;
\r
80 Tcb->SndNxt = Tcb->Iss;
\r
82 Tcb->SndWl2 = Tcb->Iss;
\r
85 Tcb->RcvWnd = GET_RCV_BUFFSIZE (Tcb->Sk);
\r
88 // Fisrt window size is never scaled
\r
90 Tcb->RcvWndScale = 0;
\r
95 Initialize the peer related members.
\r
97 @param Tcb Pointer to the TCP_CB of this TCP instance.
\r
98 @param Seg Pointer to the segment that contains the peer's
\r
100 @param Opt Pointer to the options announced by the peer.
\r
114 ASSERT (Tcb && Seg && Opt);
\r
115 ASSERT (TCP_FLG_ON (Seg->Flag, TCP_FLG_SYN));
\r
117 Tcb->SndWnd = Seg->Wnd;
\r
118 Tcb->SndWndMax = Tcb->SndWnd;
\r
119 Tcb->SndWl1 = Seg->Seq;
\r
121 if (TCP_FLG_ON (Seg->Flag, TCP_FLG_ACK)) {
\r
122 Tcb->SndWl2 = Seg->Ack;
\r
124 Tcb->SndWl2 = Tcb->Iss + 1;
\r
127 if (TCP_FLG_ON (Opt->Flag, TCP_OPTION_RCVD_MSS)) {
\r
128 Tcb->SndMss = (UINT16) NET_MAX (64, Opt->Mss);
\r
130 RcvMss = TcpGetRcvMss (Tcb->Sk);
\r
131 if (Tcb->SndMss > RcvMss) {
\r
132 Tcb->SndMss = RcvMss;
\r
137 // One end doesn't support MSS option, use default.
\r
142 Tcb->CWnd = Tcb->SndMss;
\r
144 Tcb->Irs = Seg->Seq;
\r
145 Tcb->RcvNxt = Tcb->Irs + 1;
\r
147 Tcb->RcvWl2 = Tcb->RcvNxt;
\r
149 if (TCP_FLG_ON (Opt->Flag, TCP_OPTION_RCVD_WS) &&
\r
150 !TCP_FLG_ON (Tcb->CtrlFlag, TCP_CTRL_NO_WS)) {
\r
152 Tcb->SndWndScale = Opt->WndScale;
\r
154 Tcb->RcvWndScale = TcpComputeScale (Tcb);
\r
155 TCP_SET_FLG (Tcb->CtrlFlag, TCP_CTRL_RCVD_WS);
\r
159 // One end doesn't support window scale option. use zero.
\r
161 Tcb->RcvWndScale = 0;
\r
164 if (TCP_FLG_ON (Opt->Flag, TCP_OPTION_RCVD_TS) &&
\r
165 !TCP_FLG_ON (Tcb->CtrlFlag, TCP_CTRL_NO_TS)) {
\r
167 TCP_SET_FLG (Tcb->CtrlFlag, TCP_CTRL_SND_TS);
\r
168 TCP_SET_FLG (Tcb->CtrlFlag, TCP_CTRL_RCVD_TS);
\r
171 // Compute the effective SndMss per RFC1122
\r
172 // section 4.2.2.6. If timestamp option is
\r
173 // enabled, it will always occupy 12 bytes.
\r
175 Tcb->SndMss -= TCP_OPTION_TS_ALIGNED_LEN;
\r
181 Locate a listen TCB that matchs the Local and Remote.
\r
183 @param Local Pointer to the local (IP, Port).
\r
184 @param Remote Pointer to the remote (IP, Port).
\r
186 @return Pointer to the TCP_CB with the least number of wildcard, if NULL no match is found.
\r
191 TcpLocateListenTcb (
\r
192 IN TCP_PEER *Local,
\r
193 IN TCP_PEER *Remote
\r
196 NET_LIST_ENTRY *Entry;
\r
205 NET_LIST_FOR_EACH (Entry, &mTcpListenQue) {
\r
206 Node = NET_LIST_USER_STRUCT (Entry, TCP_CB, List);
\r
208 if ((Local->Port != Node->LocalEnd.Port) ||
\r
209 !TCP_PEER_MATCH (Remote, &Node->RemoteEnd) ||
\r
210 !TCP_PEER_MATCH (Local, &Node->LocalEnd)
\r
217 // Compute the number of wildcard
\r
220 if (Node->RemoteEnd.Ip == 0) {
\r
224 if (Node->RemoteEnd.Port == 0) {
\r
228 if (Node->LocalEnd.Ip == 0) {
\r
247 Try to find one Tcb whose <Ip, Port> equals to <IN Addr, IN Port>.
\r
249 @param Addr Pointer to the IP address needs to match.
\r
250 @param Port The port number needs to match.
\r
252 @return The Tcb which matches the <Addr Port> paire exists or not.
\r
257 IN EFI_IPv4_ADDRESS *Addr,
\r
261 TCP_PORTNO LocalPort;
\r
262 NET_LIST_ENTRY *Entry;
\r
265 ASSERT ((Addr != NULL) && (Port != 0));
\r
267 LocalPort = HTONS (Port);
\r
269 NET_LIST_FOR_EACH (Entry, &mTcpListenQue) {
\r
270 Tcb = NET_LIST_USER_STRUCT (Entry, TCP_CB, List);
\r
272 if (EFI_IP4_EQUAL (Addr, &Tcb->LocalEnd.Ip) &&
\r
273 (LocalPort == Tcb->LocalEnd.Port)) {
\r
279 NET_LIST_FOR_EACH (Entry, &mTcpRunQue) {
\r
280 Tcb = NET_LIST_USER_STRUCT (Entry, TCP_CB, List);
\r
282 if (EFI_IP4_EQUAL (Addr, &Tcb->LocalEnd.Ip) &&
\r
283 (LocalPort == Tcb->LocalEnd.Port)) {
\r
294 Locate the TCP_CB related to the socket pair.
\r
296 @param LocalPort The local port number.
\r
297 @param LocalIp The local IP address.
\r
298 @param RemotePort The remote port number.
\r
299 @param RemoteIp The remote IP address.
\r
300 @param Syn Whether to search the listen sockets, if TRUE, the
\r
301 listen sockets are searched.
\r
303 @return Pointer to the related TCP_CB, if NULL no match is found.
\r
308 IN TCP_PORTNO LocalPort,
\r
310 IN TCP_PORTNO RemotePort,
\r
311 IN UINT32 RemoteIp,
\r
317 NET_LIST_ENTRY *Entry;
\r
320 Local.Port = LocalPort;
\r
321 Local.Ip = LocalIp;
\r
323 Remote.Port = RemotePort;
\r
324 Remote.Ip = RemoteIp;
\r
327 // First check for exact match.
\r
329 NET_LIST_FOR_EACH (Entry, &mTcpRunQue) {
\r
330 Tcb = NET_LIST_USER_STRUCT (Entry, TCP_CB, List);
\r
332 if (TCP_PEER_EQUAL (&Remote, &Tcb->RemoteEnd) &&
\r
333 TCP_PEER_EQUAL (&Local, &Tcb->LocalEnd)) {
\r
335 NetListRemoveEntry (&Tcb->List);
\r
336 NetListInsertHead (&mTcpRunQue, &Tcb->List);
\r
343 // Only check listen queue when SYN flag is on
\r
346 return TcpLocateListenTcb (&Local, &Remote);
\r
354 Insert a Tcb into the proper queue.
\r
356 @param Tcb Pointer to the TCP_CB to be inserted.
\r
358 @retval 0 The Tcb is inserted successfully.
\r
359 @retval -1 Error condition occurred.
\r
367 NET_LIST_ENTRY *Entry;
\r
368 NET_LIST_ENTRY *Head;
\r
370 TCP4_PROTO_DATA *TcpProto;
\r
375 (Tcb->State == TCP_LISTEN) ||
\r
376 (Tcb->State == TCP_SYN_SENT) ||
\r
377 (Tcb->State == TCP_SYN_RCVD) ||
\r
378 (Tcb->State == TCP_CLOSED)
\r
382 if (Tcb->LocalEnd.Port == 0) {
\r
386 Head = &mTcpRunQue;
\r
388 if (Tcb->State == TCP_LISTEN) {
\r
389 Head = &mTcpListenQue;
\r
393 // Check that Tcb isn't already on the list.
\r
395 NET_LIST_FOR_EACH (Entry, Head) {
\r
396 Node = NET_LIST_USER_STRUCT (Entry, TCP_CB, List);
\r
398 if (TCP_PEER_EQUAL (&Tcb->LocalEnd, &Node->LocalEnd) &&
\r
399 TCP_PEER_EQUAL (&Tcb->RemoteEnd, &Node->RemoteEnd)) {
\r
405 NetListInsertHead (Head, &Tcb->List);
\r
407 TcpProto = (TCP4_PROTO_DATA *) Tcb->Sk->ProtoReserved;
\r
408 TcpSetVariableData (TcpProto->TcpService);
\r
415 Clone a TCP_CB from Tcb.
\r
417 @param Tcb Pointer to the TCP_CB to be cloned.
\r
419 @return Pointer to the new cloned TCP_CB, if NULL error condition occurred.
\r
428 TCP4_SERVICE_DATA *TcpService;
\r
430 Clone = NetAllocatePool (sizeof (TCP_CB));
\r
432 if (Clone == NULL) {
\r
437 NetCopyMem (Clone, Tcb, sizeof (TCP_CB));
\r
440 // Increate the reference count of the shared IpInfo.
\r
442 NET_GET_REF (Tcb->IpInfo);
\r
444 NetListInit (&Clone->List);
\r
445 NetListInit (&Clone->SndQue);
\r
446 NetListInit (&Clone->RcvQue);
\r
448 Clone->Sk = SockClone (Tcb->Sk);
\r
449 if (Clone->Sk == NULL) {
\r
450 TCP4_DEBUG_ERROR (("TcpCloneTcb: failed to clone a sock\n"));
\r
451 NetFreePool (Clone);
\r
455 ((TCP4_PROTO_DATA *) (Clone->Sk->ProtoReserved))->TcpPcb = Clone;
\r
458 // Open the device path on the handle where service binding resides on.
\r
460 TcpService = ((TCP4_PROTO_DATA *) (Clone->Sk->ProtoReserved))->TcpService;
\r
461 gBS->OpenProtocol (
\r
462 TcpService->ControllerHandle,
\r
463 &gEfiDevicePathProtocolGuid,
\r
464 (VOID **) &Clone->Sk->ParentDevicePath,
\r
465 TcpService->DriverBindingHandle,
\r
466 Clone->Sk->SockHandle,
\r
467 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER
\r
475 Compute an ISS to be used by a new connection.
\r
479 @return The result ISS.
\r
487 mTcpGlobalIss += 2048;
\r
488 return mTcpGlobalIss;
\r
497 @return The mss size.
\r
505 EFI_SIMPLE_NETWORK_MODE SnpMode;
\r
506 TCP4_PROTO_DATA *TcpProto;
\r
507 EFI_IP4_PROTOCOL *Ip;
\r
511 TcpProto = (TCP4_PROTO_DATA *) Sock->ProtoReserved;
\r
512 Ip = TcpProto->TcpService->IpIo->Ip;
\r
515 Ip->GetModeData (Ip, NULL, NULL, &SnpMode);
\r
517 return (UINT16) (SnpMode.MaxPacketSize - 40);
\r
522 Set the Tcb's state.
\r
524 @param Tcb Pointer to the TCP_CB of this TCP instance.
\r
525 @param State The state to be set.
\r
537 ("Tcb (%x) state %s --> %s\n",
\r
539 mTcpStateName[Tcb->State],
\r
540 mTcpStateName[State])
\r
543 Tcb->State = State;
\r
546 case TCP_ESTABLISHED:
\r
548 SockConnEstablished (Tcb->Sk);
\r
550 if (Tcb->Parent != NULL) {
\r
552 // A new connection is accepted by a listening socket, install
\r
553 // the device path.
\r
555 TcpInstallDevicePath (Tcb->Sk);
\r
562 SockConnClosed (Tcb->Sk);
\r
570 Compute the TCP segment's checksum.
\r
572 @param Nbuf Pointer to the buffer that contains the TCP
\r
574 @param HeadSum The checksum value of the fixed part of pseudo
\r
577 @return The checksum value.
\r
588 Checksum = NetbufChecksum (Nbuf);
\r
589 Checksum = NetAddChecksum (Checksum, HeadSum);
\r
591 Checksum = NetAddChecksum (
\r
593 HTONS ((UINT16) Nbuf->TotalSize)
\r
596 return (UINT16) ~Checksum;
\r
601 Translate the information from the head of the received TCP
\r
602 segment Nbuf contains and fill it into a TCP_SEG structure.
\r
604 @param Tcb Pointer to the TCP_CB of this TCP instance.
\r
605 @param Nbuf Pointer to the buffer contains the TCP segment.
\r
607 @return Pointer to the TCP_SEG that contains the translated TCP head information.
\r
619 Seg = TCPSEG_NETBUF (Nbuf);
\r
620 Head = (TCP_HEAD *) NetbufGetByte (Nbuf, 0, NULL);
\r
623 Seg->Seq = NTOHL (Head->Seq);
\r
624 Seg->Ack = NTOHL (Head->Ack);
\r
625 Seg->End = Seg->Seq + (Nbuf->TotalSize - (Head->HeadLen << 2));
\r
627 Seg->Urg = NTOHS (Head->Urg);
\r
628 Seg->Wnd = (NTOHS (Head->Wnd) << Tcb->SndWndScale);
\r
629 Seg->Flag = Head->Flag;
\r
632 // SYN and FIN flag occupy one sequence space each.
\r
634 if (TCP_FLG_ON (Seg->Flag, TCP_FLG_SYN)) {
\r
636 // RFC requires that initial window not be scaled
\r
638 Seg->Wnd = NTOHS (Head->Wnd);
\r
642 if (TCP_FLG_ON (Seg->Flag, TCP_FLG_FIN)) {
\r
651 Reset the connection related with Tcb.
\r
653 @param Tcb Pointer to the TCP_CB of the connection to be
\r
660 TcpResetConnection (
\r
667 Nbuf = NetbufAlloc (TCP_MAX_HEAD);
\r
669 if (Nbuf == NULL) {
\r
673 Nhead = (TCP_HEAD *) NetbufAllocSpace (
\r
679 ASSERT (Nhead != NULL);
\r
683 Nhead->Flag = TCP_FLG_RST;
\r
684 Nhead->Seq = HTONL (Tcb->SndNxt);
\r
685 Nhead->Ack = HTONL (Tcb->RcvNxt);
\r
686 Nhead->SrcPort = Tcb->LocalEnd.Port;
\r
687 Nhead->DstPort = Tcb->RemoteEnd.Port;
\r
688 Nhead->HeadLen = (sizeof (TCP_HEAD) >> 2);
\r
690 Nhead->Wnd = HTONS (0xFFFF);
\r
691 Nhead->Checksum = 0;
\r
693 Nhead->Checksum = TcpChecksum (Nbuf, Tcb->HeadSum);
\r
695 TcpSendIpPacket (Tcb, Nbuf, Tcb->LocalEnd.Ip, Tcb->RemoteEnd.Ip);
\r
702 Initialize an active connection,
\r
704 @param Tcb Pointer to the TCP_CB that wants to initiate a
\r
715 TcpInitTcbLocal (Tcb);
\r
716 TcpSetState (Tcb, TCP_SYN_SENT);
\r
718 TcpSetTimer (Tcb, TCP_TIMER_CONNECT, Tcb->ConnectTimeout);
\r
719 TcpToSendData (Tcb, 1);
\r
724 Initiate the connection close procedure, called when
\r
725 applications want to close the connection.
\r
727 @param Tcb Pointer to the TCP_CB of this TCP instance.
\r
739 if (!NetListIsEmpty (&Tcb->RcvQue) || GET_RCV_DATASIZE (Tcb->Sk)) {
\r
741 TCP4_DEBUG_WARN (("TcpOnAppClose: connection reset "
\r
742 "because data is lost for TCB %x\n", Tcb));
\r
744 TcpResetConnection (Tcb);
\r
749 switch (Tcb->State) {
\r
753 TcpSetState (Tcb, TCP_CLOSED);
\r
757 case TCP_ESTABLISHED:
\r
758 TcpSetState (Tcb, TCP_FIN_WAIT_1);
\r
761 case TCP_CLOSE_WAIT:
\r
762 TcpSetState (Tcb, TCP_LAST_ACK);
\r
766 TcpToSendData (Tcb, 1);
\r
771 Check whether the application's newly delivered data
\r
774 @param Tcb Pointer to the TCP_CB of this TCP instance.
\r
776 @retval 0 Whether the data is sent out or is buffered for
\r
778 @retval -1 The Tcb is not in a state that data is permitted to
\r
788 switch (Tcb->State) {
\r
802 case TCP_ESTABLISHED:
\r
803 case TCP_CLOSE_WAIT:
\r
804 TcpToSendData (Tcb, 0);
\r
808 case TCP_FIN_WAIT_1:
\r
809 case TCP_FIN_WAIT_2:
\r
812 case TCP_TIME_WAIT:
\r
822 Application has consumed some data, check whether
\r
823 to send a window updata ack or a delayed ack.
\r
825 @param Tcb Pointer to the TCP_CB of this TCP instance.
\r
836 switch (Tcb->State) {
\r
850 case TCP_ESTABLISHED:
\r
851 TcpOld = TcpRcvWinOld (Tcb);
\r
852 if (TcpRcvWinNow (Tcb) > TcpOld) {
\r
854 if (TcpOld < Tcb->RcvMss) {
\r
856 TCP4_DEBUG_TRACE (("TcpOnAppConsume: send a window"
\r
857 " update for a window closed Tcb(%x)\n", Tcb));
\r
860 } else if (Tcb->DelayedAck == 0) {
\r
862 TCP4_DEBUG_TRACE (("TcpOnAppConsume: scheduled a delayed"
\r
863 " ACK to update window for Tcb(%x)\n", Tcb));
\r
865 Tcb->DelayedAck = 1;
\r
871 case TCP_CLOSE_WAIT:
\r
875 case TCP_FIN_WAIT_1:
\r
876 case TCP_FIN_WAIT_2:
\r
879 case TCP_TIME_WAIT:
\r
889 Abort the connection by sending a reset segment, called
\r
890 when the application wants to abort the connection.
\r
892 @param Tcb Pointer to the TCP_CB of the TCP instance.
\r
902 TCP4_DEBUG_WARN (("TcpOnAppAbort: connection reset "
\r
903 "issued by application for TCB %x\n", Tcb));
\r
905 switch (Tcb->State) {
\r
907 case TCP_ESTABLISHED:
\r
908 case TCP_FIN_WAIT_1:
\r
909 case TCP_FIN_WAIT_2:
\r
910 case TCP_CLOSE_WAIT:
\r
911 TcpResetConnection (Tcb);
\r
915 TcpSetState (Tcb, TCP_CLOSED);
\r
920 Set the Tdp4 variable data.
\r
922 @param Tcp4Service Tcp4 service data.
\r
924 @retval EFI_OUT_OF_RESOURCES There are not enough resources to set the variable.
\r
925 @retval other Set variable failed.
\r
929 TcpSetVariableData (
\r
930 IN TCP4_SERVICE_DATA *Tcp4Service
\r
933 UINT32 NumConfiguredInstance;
\r
934 NET_LIST_ENTRY *Entry;
\r
936 TCP4_PROTO_DATA *TcpProto;
\r
937 UINTN VariableDataSize;
\r
938 EFI_TCP4_VARIABLE_DATA *Tcp4VariableData;
\r
939 EFI_TCP4_SERVICE_POINT *Tcp4ServicePoint;
\r
940 CHAR16 *NewMacString;
\r
943 NumConfiguredInstance = 0;
\r
946 // Go through the running queue to count the instances.
\r
948 NET_LIST_FOR_EACH (Entry, &mTcpRunQue) {
\r
949 TcpPcb = NET_LIST_USER_STRUCT (Entry, TCP_CB, List);
\r
951 TcpProto = (TCP4_PROTO_DATA *) TcpPcb->Sk->ProtoReserved;
\r
953 if (TcpProto->TcpService == Tcp4Service) {
\r
955 // This tcp instance belongs to the Tcp4Service.
\r
957 NumConfiguredInstance++;
\r
962 // Go through the listening queue to count the instances.
\r
964 NET_LIST_FOR_EACH (Entry, &mTcpListenQue) {
\r
965 TcpPcb = NET_LIST_USER_STRUCT (Entry, TCP_CB, List);
\r
967 TcpProto = (TCP4_PROTO_DATA *) TcpPcb->Sk->ProtoReserved;
\r
969 if (TcpProto->TcpService == Tcp4Service) {
\r
971 // This tcp instance belongs to the Tcp4Service.
\r
973 NumConfiguredInstance++;
\r
978 // Calculate the size of the Tcp4VariableData. As there may be no Tcp4 child,
\r
979 // we should add extra buffer for the service points only if the number of configured
\r
980 // children is more than 1.
\r
982 VariableDataSize = sizeof (EFI_TCP4_VARIABLE_DATA);
\r
984 if (NumConfiguredInstance > 1) {
\r
985 VariableDataSize += sizeof (EFI_TCP4_SERVICE_POINT) * (NumConfiguredInstance - 1);
\r
988 Tcp4VariableData = NetAllocatePool (VariableDataSize);
\r
989 if (Tcp4VariableData == NULL) {
\r
990 return EFI_OUT_OF_RESOURCES;
\r
993 Tcp4VariableData->DriverHandle = Tcp4Service->DriverBindingHandle;
\r
994 Tcp4VariableData->ServiceCount = NumConfiguredInstance;
\r
996 Tcp4ServicePoint = &Tcp4VariableData->Services[0];
\r
999 // Go through the running queue to fill the service points.
\r
1001 NET_LIST_FOR_EACH (Entry, &mTcpRunQue) {
\r
1002 TcpPcb = NET_LIST_USER_STRUCT (Entry, TCP_CB, List);
\r
1004 TcpProto = (TCP4_PROTO_DATA *) TcpPcb->Sk->ProtoReserved;
\r
1006 if (TcpProto->TcpService == Tcp4Service) {
\r
1008 // This tcp instance belongs to the Tcp4Service.
\r
1010 Tcp4ServicePoint->InstanceHandle = TcpPcb->Sk->SockHandle;
\r
1011 NetCopyMem (&Tcp4ServicePoint->LocalAddress, &TcpPcb->LocalEnd.Ip, sizeof (EFI_IPv4_ADDRESS));
\r
1012 Tcp4ServicePoint->LocalPort = NTOHS (TcpPcb->LocalEnd.Port);
\r
1013 NetCopyMem (&Tcp4ServicePoint->RemoteAddress, &TcpPcb->RemoteEnd.Ip, sizeof (EFI_IPv4_ADDRESS));
\r
1014 Tcp4ServicePoint->RemotePort = NTOHS (TcpPcb->RemoteEnd.Port);
\r
1016 Tcp4ServicePoint++;
\r
1021 // Go through the listening queue to fill the service points.
\r
1023 NET_LIST_FOR_EACH (Entry, &mTcpListenQue) {
\r
1024 TcpPcb = NET_LIST_USER_STRUCT (Entry, TCP_CB, List);
\r
1026 TcpProto = (TCP4_PROTO_DATA *) TcpPcb->Sk->ProtoReserved;
\r
1028 if (TcpProto->TcpService == Tcp4Service) {
\r
1030 // This tcp instance belongs to the Tcp4Service.
\r
1032 Tcp4ServicePoint->InstanceHandle = TcpPcb->Sk->SockHandle;
\r
1033 NetCopyMem (&Tcp4ServicePoint->LocalAddress, &TcpPcb->LocalEnd.Ip, sizeof (EFI_IPv4_ADDRESS));
\r
1034 Tcp4ServicePoint->LocalPort = NTOHS (TcpPcb->LocalEnd.Port);
\r
1035 NetCopyMem (&Tcp4ServicePoint->RemoteAddress, &TcpPcb->RemoteEnd.Ip, sizeof (EFI_IPv4_ADDRESS));
\r
1036 Tcp4ServicePoint->RemotePort = NTOHS (TcpPcb->RemoteEnd.Port);
\r
1038 Tcp4ServicePoint++;
\r
1043 // Get the mac string.
\r
1045 Status = NetLibGetMacString (
\r
1046 Tcp4Service->ControllerHandle,
\r
1047 Tcp4Service->DriverBindingHandle,
\r
1050 if (EFI_ERROR (Status)) {
\r
1054 if (Tcp4Service->MacString != NULL) {
\r
1056 // The variable is set already, we're going to update it.
\r
1058 if (StrCmp (Tcp4Service->MacString, NewMacString) != 0) {
\r
1060 // The mac address is changed, delete the previous variable first.
\r
1062 gRT->SetVariable (
\r
1063 Tcp4Service->MacString,
\r
1064 &gEfiTcp4ServiceBindingProtocolGuid,
\r
1065 EFI_VARIABLE_BOOTSERVICE_ACCESS,
\r
1071 NetFreePool (Tcp4Service->MacString);
\r
1074 Tcp4Service->MacString = NewMacString;
\r
1076 Status = gRT->SetVariable (
\r
1077 Tcp4Service->MacString,
\r
1078 &gEfiTcp4ServiceBindingProtocolGuid,
\r
1079 EFI_VARIABLE_BOOTSERVICE_ACCESS,
\r
1081 (VOID *) Tcp4VariableData
\r
1086 NetFreePool (Tcp4VariableData);
\r
1093 Clear the variable and free the resource.
\r
1095 @param Tcp4Service Tcp4 service data.
\r
1101 TcpClearVariableData (
\r
1102 IN TCP4_SERVICE_DATA *Tcp4Service
\r
1105 ASSERT (Tcp4Service->MacString != NULL);
\r
1107 gRT->SetVariable (
\r
1108 Tcp4Service->MacString,
\r
1109 &gEfiTcp4ServiceBindingProtocolGuid,
\r
1110 EFI_VARIABLE_BOOTSERVICE_ACCESS,
\r
1115 NetFreePool (Tcp4Service->MacString);
\r
1116 Tcp4Service->MacString = NULL;
\r
1120 TcpInstallDevicePath (
\r
1125 Routine Description:
\r
1127 Install the device path protocol on the TCP instance.
\r
1131 Sock - Pointer to the socket representing the TCP instance.
\r
1135 EFI_SUCCESS - The device path protocol is installed.
\r
1136 other - Failed to install the device path protocol.
\r
1140 TCP4_PROTO_DATA *TcpProto;
\r
1141 TCP4_SERVICE_DATA *TcpService;
\r
1143 IPv4_DEVICE_PATH Ip4DPathNode;
\r
1144 EFI_STATUS Status;
\r
1146 TcpProto = (TCP4_PROTO_DATA *) Sock->ProtoReserved;
\r
1147 TcpService = TcpProto->TcpService;
\r
1148 Tcb = TcpProto->TcpPcb;
\r
1150 NetLibCreateIPv4DPathNode (
\r
1152 TcpService->ControllerHandle,
\r
1154 NTOHS (Tcb->LocalEnd.Port),
\r
1155 Tcb->RemoteEnd.Ip,
\r
1156 NTOHS (Tcb->RemoteEnd.Port),
\r
1158 Tcb->UseDefaultAddr
\r
1161 Sock->DevicePath = AppendDevicePathNode (
\r
1162 Sock->ParentDevicePath,
\r
1163 (EFI_DEVICE_PATH_PROTOCOL *) &Ip4DPathNode
\r
1165 if (Sock->DevicePath == NULL) {
\r
1166 return EFI_OUT_OF_RESOURCES;
\r
1169 Status = gBS->InstallProtocolInterface (
\r
1170 &Sock->SockHandle,
\r
1171 &gEfiDevicePathProtocolGuid,
\r
1172 EFI_NATIVE_INTERFACE,
\r
1175 if (EFI_ERROR (Status)) {
\r
1176 NetFreePool (Sock->DevicePath);
\r