HttpsSupport.c 56 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921
  1. /** @file
  2. Miscellaneous routines specific to Https for HttpDxe driver.
  3. Copyright (c) 2016 - 2018, Intel Corporation. All rights reserved.<BR>
  4. (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
  5. SPDX-License-Identifier: BSD-2-Clause-Patent
  6. **/
  7. #include "HttpDriver.h"
  8. /**
  9. Returns the first occurrence of a Null-terminated ASCII sub-string in a Null-terminated
  10. ASCII string and ignore case during the search process.
  11. This function scans the contents of the ASCII string specified by String
  12. and returns the first occurrence of SearchString and ignore case during the search process.
  13. If SearchString is not found in String, then NULL is returned. If the length of SearchString
  14. is zero, then String is returned.
  15. If String is NULL, then ASSERT().
  16. If SearchString is NULL, then ASSERT().
  17. @param[in] String A pointer to a Null-terminated ASCII string.
  18. @param[in] SearchString A pointer to a Null-terminated ASCII string to search for.
  19. @retval NULL If the SearchString does not appear in String.
  20. @retval others If there is a match return the first occurrence of SearchingString.
  21. If the length of SearchString is zero,return String.
  22. **/
  23. CHAR8 *
  24. AsciiStrCaseStr (
  25. IN CONST CHAR8 *String,
  26. IN CONST CHAR8 *SearchString
  27. )
  28. {
  29. CONST CHAR8 *FirstMatch;
  30. CONST CHAR8 *SearchStringTmp;
  31. CHAR8 Src;
  32. CHAR8 Dst;
  33. //
  34. // ASSERT both strings are less long than PcdMaximumAsciiStringLength
  35. //
  36. ASSERT (AsciiStrSize (String) != 0);
  37. ASSERT (AsciiStrSize (SearchString) != 0);
  38. if (*SearchString == '\0') {
  39. return (CHAR8 *)String;
  40. }
  41. while (*String != '\0') {
  42. SearchStringTmp = SearchString;
  43. FirstMatch = String;
  44. while ( (*SearchStringTmp != '\0')
  45. && (*String != '\0'))
  46. {
  47. Src = *String;
  48. Dst = *SearchStringTmp;
  49. if ((Src >= 'A') && (Src <= 'Z')) {
  50. Src += ('a' - 'A');
  51. }
  52. if ((Dst >= 'A') && (Dst <= 'Z')) {
  53. Dst += ('a' - 'A');
  54. }
  55. if (Src != Dst) {
  56. break;
  57. }
  58. String++;
  59. SearchStringTmp++;
  60. }
  61. if (*SearchStringTmp == '\0') {
  62. return (CHAR8 *)FirstMatch;
  63. }
  64. String = FirstMatch + 1;
  65. }
  66. return NULL;
  67. }
  68. /**
  69. The callback function to free the net buffer list.
  70. @param[in] Arg The opaque parameter.
  71. **/
  72. VOID
  73. EFIAPI
  74. FreeNbufList (
  75. IN VOID *Arg
  76. )
  77. {
  78. ASSERT (Arg != NULL);
  79. NetbufFreeList ((LIST_ENTRY *)Arg);
  80. FreePool (Arg);
  81. }
  82. /**
  83. Check whether the Url is from Https.
  84. @param[in] Url The pointer to a HTTP or HTTPS URL string.
  85. @retval TRUE The Url is from HTTPS.
  86. @retval FALSE The Url is from HTTP.
  87. **/
  88. BOOLEAN
  89. IsHttpsUrl (
  90. IN CHAR8 *Url
  91. )
  92. {
  93. CHAR8 *Tmp;
  94. Tmp = NULL;
  95. Tmp = AsciiStrCaseStr (Url, HTTPS_FLAG);
  96. if ((Tmp != NULL) && (Tmp == Url)) {
  97. return TRUE;
  98. }
  99. return FALSE;
  100. }
  101. /**
  102. Creates a Tls child handle, open EFI_TLS_PROTOCOL and EFI_TLS_CONFIGURATION_PROTOCOL.
  103. @param[in] ImageHandle The firmware allocated handle for the UEFI image.
  104. @param[out] TlsSb Pointer to the TLS SERVICE_BINDING_PROTOCOL.
  105. @param[out] TlsProto Pointer to the EFI_TLS_PROTOCOL instance.
  106. @param[out] TlsConfiguration Pointer to the EFI_TLS_CONFIGURATION_PROTOCOL instance.
  107. @return The child handle with opened EFI_TLS_PROTOCOL and EFI_TLS_CONFIGURATION_PROTOCOL.
  108. **/
  109. EFI_HANDLE
  110. EFIAPI
  111. TlsCreateChild (
  112. IN EFI_HANDLE ImageHandle,
  113. OUT EFI_SERVICE_BINDING_PROTOCOL **TlsSb,
  114. OUT EFI_TLS_PROTOCOL **TlsProto,
  115. OUT EFI_TLS_CONFIGURATION_PROTOCOL **TlsConfiguration
  116. )
  117. {
  118. EFI_STATUS Status;
  119. EFI_HANDLE TlsChildHandle;
  120. TlsChildHandle = 0;
  121. //
  122. // Locate TlsServiceBinding protocol.
  123. //
  124. gBS->LocateProtocol (
  125. &gEfiTlsServiceBindingProtocolGuid,
  126. NULL,
  127. (VOID **)TlsSb
  128. );
  129. if (*TlsSb == NULL) {
  130. return NULL;
  131. }
  132. Status = (*TlsSb)->CreateChild (*TlsSb, &TlsChildHandle);
  133. if (EFI_ERROR (Status)) {
  134. return NULL;
  135. }
  136. Status = gBS->OpenProtocol (
  137. TlsChildHandle,
  138. &gEfiTlsProtocolGuid,
  139. (VOID **)TlsProto,
  140. ImageHandle,
  141. TlsChildHandle,
  142. EFI_OPEN_PROTOCOL_GET_PROTOCOL
  143. );
  144. if (EFI_ERROR (Status)) {
  145. (*TlsSb)->DestroyChild (*TlsSb, TlsChildHandle);
  146. return NULL;
  147. }
  148. Status = gBS->OpenProtocol (
  149. TlsChildHandle,
  150. &gEfiTlsConfigurationProtocolGuid,
  151. (VOID **)TlsConfiguration,
  152. ImageHandle,
  153. TlsChildHandle,
  154. EFI_OPEN_PROTOCOL_GET_PROTOCOL
  155. );
  156. if (EFI_ERROR (Status)) {
  157. (*TlsSb)->DestroyChild (*TlsSb, TlsChildHandle);
  158. return NULL;
  159. }
  160. return TlsChildHandle;
  161. }
  162. /**
  163. Create event for the TLS receive and transmit tokens which are used to receive and
  164. transmit TLS related messages.
  165. @param[in, out] HttpInstance Pointer to HTTP_PROTOCOL structure.
  166. @retval EFI_SUCCESS The events are created successfully.
  167. @retval others Other error as indicated.
  168. **/
  169. EFI_STATUS
  170. EFIAPI
  171. TlsCreateTxRxEvent (
  172. IN OUT HTTP_PROTOCOL *HttpInstance
  173. )
  174. {
  175. EFI_STATUS Status;
  176. if (!HttpInstance->LocalAddressIsIPv6) {
  177. //
  178. // For Tcp4TlsTxToken.
  179. //
  180. Status = gBS->CreateEvent (
  181. EVT_NOTIFY_SIGNAL,
  182. TPL_NOTIFY,
  183. HttpCommonNotify,
  184. &HttpInstance->TlsIsTxDone,
  185. &HttpInstance->Tcp4TlsTxToken.CompletionToken.Event
  186. );
  187. if (EFI_ERROR (Status)) {
  188. goto ERROR;
  189. }
  190. HttpInstance->Tcp4TlsTxData.Push = TRUE;
  191. HttpInstance->Tcp4TlsTxData.Urgent = FALSE;
  192. HttpInstance->Tcp4TlsTxData.DataLength = 0;
  193. HttpInstance->Tcp4TlsTxData.FragmentCount = 1;
  194. HttpInstance->Tcp4TlsTxData.FragmentTable[0].FragmentLength = HttpInstance->Tcp4TlsTxData.DataLength;
  195. HttpInstance->Tcp4TlsTxData.FragmentTable[0].FragmentBuffer = NULL;
  196. HttpInstance->Tcp4TlsTxToken.Packet.TxData = &HttpInstance->Tcp4TlsTxData;
  197. HttpInstance->Tcp4TlsTxToken.CompletionToken.Status = EFI_NOT_READY;
  198. //
  199. // For Tcp4TlsRxToken.
  200. //
  201. Status = gBS->CreateEvent (
  202. EVT_NOTIFY_SIGNAL,
  203. TPL_NOTIFY,
  204. HttpCommonNotify,
  205. &HttpInstance->TlsIsRxDone,
  206. &HttpInstance->Tcp4TlsRxToken.CompletionToken.Event
  207. );
  208. if (EFI_ERROR (Status)) {
  209. goto ERROR;
  210. }
  211. HttpInstance->Tcp4TlsRxData.DataLength = 0;
  212. HttpInstance->Tcp4TlsRxData.FragmentCount = 1;
  213. HttpInstance->Tcp4TlsRxData.FragmentTable[0].FragmentLength = HttpInstance->Tcp4TlsRxData.DataLength;
  214. HttpInstance->Tcp4TlsRxData.FragmentTable[0].FragmentBuffer = NULL;
  215. HttpInstance->Tcp4TlsRxToken.Packet.RxData = &HttpInstance->Tcp4TlsRxData;
  216. HttpInstance->Tcp4TlsRxToken.CompletionToken.Status = EFI_NOT_READY;
  217. } else {
  218. //
  219. // For Tcp6TlsTxToken.
  220. //
  221. Status = gBS->CreateEvent (
  222. EVT_NOTIFY_SIGNAL,
  223. TPL_NOTIFY,
  224. HttpCommonNotify,
  225. &HttpInstance->TlsIsTxDone,
  226. &HttpInstance->Tcp6TlsTxToken.CompletionToken.Event
  227. );
  228. if (EFI_ERROR (Status)) {
  229. goto ERROR;
  230. }
  231. HttpInstance->Tcp6TlsTxData.Push = TRUE;
  232. HttpInstance->Tcp6TlsTxData.Urgent = FALSE;
  233. HttpInstance->Tcp6TlsTxData.DataLength = 0;
  234. HttpInstance->Tcp6TlsTxData.FragmentCount = 1;
  235. HttpInstance->Tcp6TlsTxData.FragmentTable[0].FragmentLength = HttpInstance->Tcp6TlsTxData.DataLength;
  236. HttpInstance->Tcp6TlsTxData.FragmentTable[0].FragmentBuffer = NULL;
  237. HttpInstance->Tcp6TlsTxToken.Packet.TxData = &HttpInstance->Tcp6TlsTxData;
  238. HttpInstance->Tcp6TlsTxToken.CompletionToken.Status = EFI_NOT_READY;
  239. //
  240. // For Tcp6TlsRxToken.
  241. //
  242. Status = gBS->CreateEvent (
  243. EVT_NOTIFY_SIGNAL,
  244. TPL_NOTIFY,
  245. HttpCommonNotify,
  246. &HttpInstance->TlsIsRxDone,
  247. &HttpInstance->Tcp6TlsRxToken.CompletionToken.Event
  248. );
  249. if (EFI_ERROR (Status)) {
  250. goto ERROR;
  251. }
  252. HttpInstance->Tcp6TlsRxData.DataLength = 0;
  253. HttpInstance->Tcp6TlsRxData.FragmentCount = 1;
  254. HttpInstance->Tcp6TlsRxData.FragmentTable[0].FragmentLength = HttpInstance->Tcp6TlsRxData.DataLength;
  255. HttpInstance->Tcp6TlsRxData.FragmentTable[0].FragmentBuffer = NULL;
  256. HttpInstance->Tcp6TlsRxToken.Packet.RxData = &HttpInstance->Tcp6TlsRxData;
  257. HttpInstance->Tcp6TlsRxToken.CompletionToken.Status = EFI_NOT_READY;
  258. }
  259. return Status;
  260. ERROR:
  261. //
  262. // Error handling
  263. //
  264. TlsCloseTxRxEvent (HttpInstance);
  265. return Status;
  266. }
  267. /**
  268. Close events in the TlsTxToken and TlsRxToken.
  269. @param[in] HttpInstance Pointer to HTTP_PROTOCOL structure.
  270. **/
  271. VOID
  272. EFIAPI
  273. TlsCloseTxRxEvent (
  274. IN HTTP_PROTOCOL *HttpInstance
  275. )
  276. {
  277. ASSERT (HttpInstance != NULL);
  278. if (!HttpInstance->LocalAddressIsIPv6) {
  279. if (NULL != HttpInstance->Tcp4TlsTxToken.CompletionToken.Event) {
  280. gBS->CloseEvent (HttpInstance->Tcp4TlsTxToken.CompletionToken.Event);
  281. HttpInstance->Tcp4TlsTxToken.CompletionToken.Event = NULL;
  282. }
  283. if (NULL != HttpInstance->Tcp4TlsRxToken.CompletionToken.Event) {
  284. gBS->CloseEvent (HttpInstance->Tcp4TlsRxToken.CompletionToken.Event);
  285. HttpInstance->Tcp4TlsRxToken.CompletionToken.Event = NULL;
  286. }
  287. } else {
  288. if (NULL != HttpInstance->Tcp6TlsTxToken.CompletionToken.Event) {
  289. gBS->CloseEvent (HttpInstance->Tcp6TlsTxToken.CompletionToken.Event);
  290. HttpInstance->Tcp6TlsTxToken.CompletionToken.Event = NULL;
  291. }
  292. if (NULL != HttpInstance->Tcp6TlsRxToken.CompletionToken.Event) {
  293. gBS->CloseEvent (HttpInstance->Tcp6TlsRxToken.CompletionToken.Event);
  294. HttpInstance->Tcp6TlsRxToken.CompletionToken.Event = NULL;
  295. }
  296. }
  297. }
  298. /**
  299. Read the TlsCaCertificate variable and configure it.
  300. @param[in, out] HttpInstance The HTTP instance private data.
  301. @retval EFI_SUCCESS TlsCaCertificate is configured.
  302. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources.
  303. @retval EFI_NOT_FOUND Fail to get 'TlsCaCertificate' variable.
  304. @retval Others Other error as indicated.
  305. **/
  306. EFI_STATUS
  307. TlsConfigCertificate (
  308. IN OUT HTTP_PROTOCOL *HttpInstance
  309. )
  310. {
  311. EFI_STATUS Status;
  312. UINT8 *CACert;
  313. UINTN CACertSize;
  314. UINT32 Index;
  315. EFI_SIGNATURE_LIST *CertList;
  316. EFI_SIGNATURE_DATA *Cert;
  317. UINTN CertArraySizeInBytes;
  318. UINTN CertCount;
  319. UINT32 ItemDataSize;
  320. CACert = NULL;
  321. CACertSize = 0;
  322. //
  323. // Try to read the TlsCaCertificate variable.
  324. //
  325. Status = gRT->GetVariable (
  326. EFI_TLS_CA_CERTIFICATE_VARIABLE,
  327. &gEfiTlsCaCertificateGuid,
  328. NULL,
  329. &CACertSize,
  330. NULL
  331. );
  332. if (EFI_ERROR (Status) && (Status != EFI_BUFFER_TOO_SMALL)) {
  333. return Status;
  334. }
  335. //
  336. // Allocate buffer and read the config variable.
  337. //
  338. CACert = AllocatePool (CACertSize);
  339. if (CACert == NULL) {
  340. return EFI_OUT_OF_RESOURCES;
  341. }
  342. Status = gRT->GetVariable (
  343. EFI_TLS_CA_CERTIFICATE_VARIABLE,
  344. &gEfiTlsCaCertificateGuid,
  345. NULL,
  346. &CACertSize,
  347. CACert
  348. );
  349. if (EFI_ERROR (Status)) {
  350. //
  351. // GetVariable still error or the variable is corrupted.
  352. //
  353. goto FreeCACert;
  354. }
  355. ASSERT (CACert != NULL);
  356. //
  357. // Sanity check
  358. //
  359. Status = EFI_INVALID_PARAMETER;
  360. CertCount = 0;
  361. ItemDataSize = (UINT32)CACertSize;
  362. while (ItemDataSize > 0) {
  363. if (ItemDataSize < sizeof (EFI_SIGNATURE_LIST)) {
  364. DEBUG ((
  365. DEBUG_ERROR,
  366. "%a: truncated EFI_SIGNATURE_LIST header\n",
  367. __FUNCTION__
  368. ));
  369. goto FreeCACert;
  370. }
  371. CertList = (EFI_SIGNATURE_LIST *)(CACert + (CACertSize - ItemDataSize));
  372. if (CertList->SignatureListSize < sizeof (EFI_SIGNATURE_LIST)) {
  373. DEBUG ((
  374. DEBUG_ERROR,
  375. "%a: SignatureListSize too small for EFI_SIGNATURE_LIST\n",
  376. __FUNCTION__
  377. ));
  378. goto FreeCACert;
  379. }
  380. if (CertList->SignatureListSize > ItemDataSize) {
  381. DEBUG ((
  382. DEBUG_ERROR,
  383. "%a: truncated EFI_SIGNATURE_LIST body\n",
  384. __FUNCTION__
  385. ));
  386. goto FreeCACert;
  387. }
  388. if (!CompareGuid (&CertList->SignatureType, &gEfiCertX509Guid)) {
  389. DEBUG ((
  390. DEBUG_ERROR,
  391. "%a: only X509 certificates are supported\n",
  392. __FUNCTION__
  393. ));
  394. Status = EFI_UNSUPPORTED;
  395. goto FreeCACert;
  396. }
  397. if (CertList->SignatureHeaderSize != 0) {
  398. DEBUG ((
  399. DEBUG_ERROR,
  400. "%a: SignatureHeaderSize must be 0 for X509\n",
  401. __FUNCTION__
  402. ));
  403. goto FreeCACert;
  404. }
  405. if (CertList->SignatureSize < sizeof (EFI_SIGNATURE_DATA)) {
  406. DEBUG ((
  407. DEBUG_ERROR,
  408. "%a: SignatureSize too small for EFI_SIGNATURE_DATA\n",
  409. __FUNCTION__
  410. ));
  411. goto FreeCACert;
  412. }
  413. CertArraySizeInBytes = (CertList->SignatureListSize -
  414. sizeof (EFI_SIGNATURE_LIST));
  415. if (CertArraySizeInBytes % CertList->SignatureSize != 0) {
  416. DEBUG ((
  417. DEBUG_ERROR,
  418. "%a: EFI_SIGNATURE_DATA array not a multiple of SignatureSize\n",
  419. __FUNCTION__
  420. ));
  421. goto FreeCACert;
  422. }
  423. CertCount += CertArraySizeInBytes / CertList->SignatureSize;
  424. ItemDataSize -= CertList->SignatureListSize;
  425. }
  426. if (CertCount == 0) {
  427. DEBUG ((DEBUG_ERROR, "%a: no X509 certificates provided\n", __FUNCTION__));
  428. goto FreeCACert;
  429. }
  430. //
  431. // Enumerate all data and erasing the target item.
  432. //
  433. ItemDataSize = (UINT32)CACertSize;
  434. CertList = (EFI_SIGNATURE_LIST *)CACert;
  435. while ((ItemDataSize > 0) && (ItemDataSize >= CertList->SignatureListSize)) {
  436. Cert = (EFI_SIGNATURE_DATA *)((UINT8 *)CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize);
  437. CertCount = (CertList->SignatureListSize - sizeof (EFI_SIGNATURE_LIST) - CertList->SignatureHeaderSize) / CertList->SignatureSize;
  438. for (Index = 0; Index < CertCount; Index++) {
  439. //
  440. // EfiTlsConfigDataTypeCACertificate
  441. //
  442. Status = HttpInstance->TlsConfiguration->SetData (
  443. HttpInstance->TlsConfiguration,
  444. EfiTlsConfigDataTypeCACertificate,
  445. Cert->SignatureData,
  446. CertList->SignatureSize - sizeof (Cert->SignatureOwner)
  447. );
  448. if (EFI_ERROR (Status)) {
  449. goto FreeCACert;
  450. }
  451. Cert = (EFI_SIGNATURE_DATA *)((UINT8 *)Cert + CertList->SignatureSize);
  452. }
  453. ItemDataSize -= CertList->SignatureListSize;
  454. CertList = (EFI_SIGNATURE_LIST *)((UINT8 *)CertList + CertList->SignatureListSize);
  455. }
  456. FreeCACert:
  457. FreePool (CACert);
  458. return Status;
  459. }
  460. /**
  461. Read the HttpTlsCipherList variable and configure it for HTTPS session.
  462. @param[in, out] HttpInstance The HTTP instance private data.
  463. @retval EFI_SUCCESS The prefered HTTP TLS CipherList is configured.
  464. @retval EFI_NOT_FOUND Fail to get 'HttpTlsCipherList' variable.
  465. @retval EFI_INVALID_PARAMETER The contents of variable are invalid.
  466. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources.
  467. @retval Others Other error as indicated.
  468. **/
  469. EFI_STATUS
  470. TlsConfigCipherList (
  471. IN OUT HTTP_PROTOCOL *HttpInstance
  472. )
  473. {
  474. EFI_STATUS Status;
  475. UINT8 *CipherList;
  476. UINTN CipherListSize;
  477. CipherList = NULL;
  478. CipherListSize = 0;
  479. //
  480. // Try to read the HttpTlsCipherList variable.
  481. //
  482. Status = gRT->GetVariable (
  483. EDKII_HTTP_TLS_CIPHER_LIST_VARIABLE,
  484. &gEdkiiHttpTlsCipherListGuid,
  485. NULL,
  486. &CipherListSize,
  487. NULL
  488. );
  489. ASSERT (EFI_ERROR (Status));
  490. if (Status != EFI_BUFFER_TOO_SMALL) {
  491. return Status;
  492. }
  493. if (CipherListSize % sizeof (EFI_TLS_CIPHER) != 0) {
  494. return EFI_INVALID_PARAMETER;
  495. }
  496. //
  497. // Allocate buffer and read the config variable.
  498. //
  499. CipherList = AllocatePool (CipherListSize);
  500. if (CipherList == NULL) {
  501. return EFI_OUT_OF_RESOURCES;
  502. }
  503. Status = gRT->GetVariable (
  504. EDKII_HTTP_TLS_CIPHER_LIST_VARIABLE,
  505. &gEdkiiHttpTlsCipherListGuid,
  506. NULL,
  507. &CipherListSize,
  508. CipherList
  509. );
  510. if (EFI_ERROR (Status)) {
  511. //
  512. // GetVariable still error or the variable is corrupted.
  513. //
  514. goto ON_EXIT;
  515. }
  516. ASSERT (CipherList != NULL);
  517. Status = HttpInstance->Tls->SetSessionData (
  518. HttpInstance->Tls,
  519. EfiTlsCipherList,
  520. CipherList,
  521. CipherListSize
  522. );
  523. ON_EXIT:
  524. FreePool (CipherList);
  525. return Status;
  526. }
  527. /**
  528. Configure TLS session data.
  529. @param[in, out] HttpInstance The HTTP instance private data.
  530. @retval EFI_SUCCESS TLS session data is configured.
  531. @retval Others Other error as indicated.
  532. **/
  533. EFI_STATUS
  534. EFIAPI
  535. TlsConfigureSession (
  536. IN OUT HTTP_PROTOCOL *HttpInstance
  537. )
  538. {
  539. EFI_STATUS Status;
  540. //
  541. // TlsConfigData initialization
  542. //
  543. HttpInstance->TlsConfigData.ConnectionEnd = EfiTlsClient;
  544. HttpInstance->TlsConfigData.VerifyMethod = EFI_TLS_VERIFY_PEER;
  545. HttpInstance->TlsConfigData.VerifyHost.Flags = EFI_TLS_VERIFY_FLAG_NONE;
  546. HttpInstance->TlsConfigData.VerifyHost.HostName = HttpInstance->RemoteHost;
  547. HttpInstance->TlsConfigData.SessionState = EfiTlsSessionNotStarted;
  548. //
  549. // EfiTlsConnectionEnd,
  550. // EfiTlsVerifyMethod,
  551. // EfiTlsVerifyHost,
  552. // EfiTlsSessionState
  553. //
  554. Status = HttpInstance->Tls->SetSessionData (
  555. HttpInstance->Tls,
  556. EfiTlsConnectionEnd,
  557. &(HttpInstance->TlsConfigData.ConnectionEnd),
  558. sizeof (EFI_TLS_CONNECTION_END)
  559. );
  560. if (EFI_ERROR (Status)) {
  561. return Status;
  562. }
  563. Status = HttpInstance->Tls->SetSessionData (
  564. HttpInstance->Tls,
  565. EfiTlsVerifyMethod,
  566. &HttpInstance->TlsConfigData.VerifyMethod,
  567. sizeof (EFI_TLS_VERIFY)
  568. );
  569. if (EFI_ERROR (Status)) {
  570. return Status;
  571. }
  572. Status = HttpInstance->Tls->SetSessionData (
  573. HttpInstance->Tls,
  574. EfiTlsVerifyHost,
  575. &HttpInstance->TlsConfigData.VerifyHost,
  576. sizeof (EFI_TLS_VERIFY_HOST)
  577. );
  578. if (EFI_ERROR (Status)) {
  579. return Status;
  580. }
  581. Status = HttpInstance->Tls->SetSessionData (
  582. HttpInstance->Tls,
  583. EfiTlsSessionState,
  584. &(HttpInstance->TlsConfigData.SessionState),
  585. sizeof (EFI_TLS_SESSION_STATE)
  586. );
  587. if (EFI_ERROR (Status)) {
  588. return Status;
  589. }
  590. //
  591. // Tls Cipher List
  592. //
  593. Status = TlsConfigCipherList (HttpInstance);
  594. if (EFI_ERROR (Status) && (Status != EFI_NOT_FOUND)) {
  595. DEBUG ((DEBUG_ERROR, "TlsConfigCipherList: return %r error.\n", Status));
  596. return Status;
  597. }
  598. //
  599. // Tls Config Certificate
  600. //
  601. Status = TlsConfigCertificate (HttpInstance);
  602. if (EFI_ERROR (Status)) {
  603. DEBUG ((DEBUG_ERROR, "TLS Certificate Config Error!\n"));
  604. return Status;
  605. }
  606. //
  607. // TlsCreateTxRxEvent
  608. //
  609. Status = TlsCreateTxRxEvent (HttpInstance);
  610. if (EFI_ERROR (Status)) {
  611. goto ERROR;
  612. }
  613. return Status;
  614. ERROR:
  615. TlsCloseTxRxEvent (HttpInstance);
  616. return Status;
  617. }
  618. /**
  619. Transmit the Packet by processing the associated HTTPS token.
  620. @param[in, out] HttpInstance Pointer to HTTP_PROTOCOL structure.
  621. @param[in] Packet The packet to transmit.
  622. @retval EFI_SUCCESS The packet is transmitted.
  623. @retval EFI_INVALID_PARAMETER HttpInstance is NULL or Packet is NULL.
  624. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources.
  625. @retval EFI_DEVICE_ERROR An unexpected system or network error occurred.
  626. @retval Others Other errors as indicated.
  627. **/
  628. EFI_STATUS
  629. EFIAPI
  630. TlsCommonTransmit (
  631. IN OUT HTTP_PROTOCOL *HttpInstance,
  632. IN NET_BUF *Packet
  633. )
  634. {
  635. EFI_STATUS Status;
  636. VOID *Data;
  637. UINTN Size;
  638. if ((HttpInstance == NULL) || (Packet == NULL)) {
  639. return EFI_INVALID_PARAMETER;
  640. }
  641. if (!HttpInstance->LocalAddressIsIPv6) {
  642. Size = sizeof (EFI_TCP4_TRANSMIT_DATA) +
  643. (Packet->BlockOpNum - 1) * sizeof (EFI_TCP4_FRAGMENT_DATA);
  644. } else {
  645. Size = sizeof (EFI_TCP6_TRANSMIT_DATA) +
  646. (Packet->BlockOpNum - 1) * sizeof (EFI_TCP6_FRAGMENT_DATA);
  647. }
  648. Data = AllocatePool (Size);
  649. if (Data == NULL) {
  650. return EFI_OUT_OF_RESOURCES;
  651. }
  652. if (!HttpInstance->LocalAddressIsIPv6) {
  653. ((EFI_TCP4_TRANSMIT_DATA *)Data)->Push = TRUE;
  654. ((EFI_TCP4_TRANSMIT_DATA *)Data)->Urgent = FALSE;
  655. ((EFI_TCP4_TRANSMIT_DATA *)Data)->DataLength = Packet->TotalSize;
  656. //
  657. // Build the fragment table.
  658. //
  659. ((EFI_TCP4_TRANSMIT_DATA *)Data)->FragmentCount = Packet->BlockOpNum;
  660. NetbufBuildExt (
  661. Packet,
  662. (NET_FRAGMENT *)&((EFI_TCP4_TRANSMIT_DATA *)Data)->FragmentTable[0],
  663. &((EFI_TCP4_TRANSMIT_DATA *)Data)->FragmentCount
  664. );
  665. HttpInstance->Tcp4TlsTxToken.Packet.TxData = (EFI_TCP4_TRANSMIT_DATA *)Data;
  666. Status = EFI_DEVICE_ERROR;
  667. //
  668. // Transmit the packet.
  669. //
  670. Status = HttpInstance->Tcp4->Transmit (HttpInstance->Tcp4, &HttpInstance->Tcp4TlsTxToken);
  671. if (EFI_ERROR (Status)) {
  672. goto ON_EXIT;
  673. }
  674. while (!HttpInstance->TlsIsTxDone) {
  675. HttpInstance->Tcp4->Poll (HttpInstance->Tcp4);
  676. }
  677. HttpInstance->TlsIsTxDone = FALSE;
  678. Status = HttpInstance->Tcp4TlsTxToken.CompletionToken.Status;
  679. } else {
  680. ((EFI_TCP6_TRANSMIT_DATA *)Data)->Push = TRUE;
  681. ((EFI_TCP6_TRANSMIT_DATA *)Data)->Urgent = FALSE;
  682. ((EFI_TCP6_TRANSMIT_DATA *)Data)->DataLength = Packet->TotalSize;
  683. //
  684. // Build the fragment table.
  685. //
  686. ((EFI_TCP6_TRANSMIT_DATA *)Data)->FragmentCount = Packet->BlockOpNum;
  687. NetbufBuildExt (
  688. Packet,
  689. (NET_FRAGMENT *)&((EFI_TCP6_TRANSMIT_DATA *)Data)->FragmentTable[0],
  690. &((EFI_TCP6_TRANSMIT_DATA *)Data)->FragmentCount
  691. );
  692. HttpInstance->Tcp6TlsTxToken.Packet.TxData = (EFI_TCP6_TRANSMIT_DATA *)Data;
  693. Status = EFI_DEVICE_ERROR;
  694. //
  695. // Transmit the packet.
  696. //
  697. Status = HttpInstance->Tcp6->Transmit (HttpInstance->Tcp6, &HttpInstance->Tcp6TlsTxToken);
  698. if (EFI_ERROR (Status)) {
  699. goto ON_EXIT;
  700. }
  701. while (!HttpInstance->TlsIsTxDone) {
  702. HttpInstance->Tcp6->Poll (HttpInstance->Tcp6);
  703. }
  704. HttpInstance->TlsIsTxDone = FALSE;
  705. Status = HttpInstance->Tcp6TlsTxToken.CompletionToken.Status;
  706. }
  707. ON_EXIT:
  708. FreePool (Data);
  709. return Status;
  710. }
  711. /**
  712. Receive the Packet by processing the associated HTTPS token.
  713. @param[in, out] HttpInstance Pointer to HTTP_PROTOCOL structure.
  714. @param[in] Packet The packet to transmit.
  715. @param[in] Timeout The time to wait for connection done.
  716. @retval EFI_SUCCESS The Packet is received.
  717. @retval EFI_INVALID_PARAMETER HttpInstance is NULL or Packet is NULL.
  718. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources.
  719. @retval EFI_TIMEOUT The operation is time out.
  720. @retval Others Other error as indicated.
  721. **/
  722. EFI_STATUS
  723. EFIAPI
  724. TlsCommonReceive (
  725. IN OUT HTTP_PROTOCOL *HttpInstance,
  726. IN NET_BUF *Packet,
  727. IN EFI_EVENT Timeout
  728. )
  729. {
  730. EFI_TCP4_RECEIVE_DATA *Tcp4RxData;
  731. EFI_TCP6_RECEIVE_DATA *Tcp6RxData;
  732. EFI_STATUS Status;
  733. NET_FRAGMENT *Fragment;
  734. UINT32 FragmentCount;
  735. UINT32 CurrentFragment;
  736. Tcp4RxData = NULL;
  737. Tcp6RxData = NULL;
  738. if ((HttpInstance == NULL) || (Packet == NULL)) {
  739. return EFI_INVALID_PARAMETER;
  740. }
  741. FragmentCount = Packet->BlockOpNum;
  742. Fragment = AllocatePool (FragmentCount * sizeof (NET_FRAGMENT));
  743. if (Fragment == NULL) {
  744. Status = EFI_OUT_OF_RESOURCES;
  745. goto ON_EXIT;
  746. }
  747. //
  748. // Build the fragment table.
  749. //
  750. NetbufBuildExt (Packet, Fragment, &FragmentCount);
  751. if (!HttpInstance->LocalAddressIsIPv6) {
  752. Tcp4RxData = HttpInstance->Tcp4TlsRxToken.Packet.RxData;
  753. if (Tcp4RxData == NULL) {
  754. return EFI_INVALID_PARAMETER;
  755. }
  756. Tcp4RxData->FragmentCount = 1;
  757. } else {
  758. Tcp6RxData = HttpInstance->Tcp6TlsRxToken.Packet.RxData;
  759. if (Tcp6RxData == NULL) {
  760. return EFI_INVALID_PARAMETER;
  761. }
  762. Tcp6RxData->FragmentCount = 1;
  763. }
  764. CurrentFragment = 0;
  765. Status = EFI_SUCCESS;
  766. while (CurrentFragment < FragmentCount) {
  767. if (!HttpInstance->LocalAddressIsIPv6) {
  768. Tcp4RxData->DataLength = Fragment[CurrentFragment].Len;
  769. Tcp4RxData->FragmentTable[0].FragmentLength = Fragment[CurrentFragment].Len;
  770. Tcp4RxData->FragmentTable[0].FragmentBuffer = Fragment[CurrentFragment].Bulk;
  771. Status = HttpInstance->Tcp4->Receive (HttpInstance->Tcp4, &HttpInstance->Tcp4TlsRxToken);
  772. } else {
  773. Tcp6RxData->DataLength = Fragment[CurrentFragment].Len;
  774. Tcp6RxData->FragmentTable[0].FragmentLength = Fragment[CurrentFragment].Len;
  775. Tcp6RxData->FragmentTable[0].FragmentBuffer = Fragment[CurrentFragment].Bulk;
  776. Status = HttpInstance->Tcp6->Receive (HttpInstance->Tcp6, &HttpInstance->Tcp6TlsRxToken);
  777. }
  778. if (EFI_ERROR (Status)) {
  779. goto ON_EXIT;
  780. }
  781. while (!HttpInstance->TlsIsRxDone && ((Timeout == NULL) || EFI_ERROR (gBS->CheckEvent (Timeout)))) {
  782. //
  783. // Poll until some data is received or an error occurs.
  784. //
  785. if (!HttpInstance->LocalAddressIsIPv6) {
  786. HttpInstance->Tcp4->Poll (HttpInstance->Tcp4);
  787. } else {
  788. HttpInstance->Tcp6->Poll (HttpInstance->Tcp6);
  789. }
  790. }
  791. if (!HttpInstance->TlsIsRxDone) {
  792. //
  793. // Timeout occurs, cancel the receive request.
  794. //
  795. if (!HttpInstance->LocalAddressIsIPv6) {
  796. HttpInstance->Tcp4->Cancel (HttpInstance->Tcp4, &HttpInstance->Tcp4TlsRxToken.CompletionToken);
  797. } else {
  798. HttpInstance->Tcp6->Cancel (HttpInstance->Tcp6, &HttpInstance->Tcp6TlsRxToken.CompletionToken);
  799. }
  800. Status = EFI_TIMEOUT;
  801. goto ON_EXIT;
  802. } else {
  803. HttpInstance->TlsIsRxDone = FALSE;
  804. }
  805. if (!HttpInstance->LocalAddressIsIPv6) {
  806. Status = HttpInstance->Tcp4TlsRxToken.CompletionToken.Status;
  807. if (EFI_ERROR (Status)) {
  808. goto ON_EXIT;
  809. }
  810. Fragment[CurrentFragment].Len -= Tcp4RxData->FragmentTable[0].FragmentLength;
  811. if (Fragment[CurrentFragment].Len == 0) {
  812. CurrentFragment++;
  813. } else {
  814. Fragment[CurrentFragment].Bulk += Tcp4RxData->FragmentTable[0].FragmentLength;
  815. }
  816. } else {
  817. Status = HttpInstance->Tcp6TlsRxToken.CompletionToken.Status;
  818. if (EFI_ERROR (Status)) {
  819. goto ON_EXIT;
  820. }
  821. Fragment[CurrentFragment].Len -= Tcp6RxData->FragmentTable[0].FragmentLength;
  822. if (Fragment[CurrentFragment].Len == 0) {
  823. CurrentFragment++;
  824. } else {
  825. Fragment[CurrentFragment].Bulk += Tcp6RxData->FragmentTable[0].FragmentLength;
  826. }
  827. }
  828. }
  829. ON_EXIT:
  830. if (Fragment != NULL) {
  831. FreePool (Fragment);
  832. }
  833. return Status;
  834. }
  835. /**
  836. Receive one TLS PDU. An TLS PDU contains an TLS record header and its
  837. corresponding record data. These two parts will be put into two blocks of buffers in the
  838. net buffer.
  839. @param[in, out] HttpInstance Pointer to HTTP_PROTOCOL structure.
  840. @param[out] Pdu The received TLS PDU.
  841. @param[in] Timeout The time to wait for connection done.
  842. @retval EFI_SUCCESS An TLS PDU is received.
  843. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources.
  844. @retval EFI_PROTOCOL_ERROR An unexpected TLS packet was received.
  845. @retval Others Other errors as indicated.
  846. **/
  847. EFI_STATUS
  848. EFIAPI
  849. TlsReceiveOnePdu (
  850. IN OUT HTTP_PROTOCOL *HttpInstance,
  851. OUT NET_BUF **Pdu,
  852. IN EFI_EVENT Timeout
  853. )
  854. {
  855. EFI_STATUS Status;
  856. LIST_ENTRY *NbufList;
  857. UINT32 Len;
  858. NET_BUF *PduHdr;
  859. UINT8 *Header;
  860. TLS_RECORD_HEADER RecordHeader;
  861. NET_BUF *DataSeg;
  862. NbufList = NULL;
  863. PduHdr = NULL;
  864. Header = NULL;
  865. DataSeg = NULL;
  866. NbufList = AllocatePool (sizeof (LIST_ENTRY));
  867. if (NbufList == NULL) {
  868. return EFI_OUT_OF_RESOURCES;
  869. }
  870. InitializeListHead (NbufList);
  871. //
  872. // Allocate buffer to receive one TLS header.
  873. //
  874. Len = TLS_RECORD_HEADER_LENGTH;
  875. PduHdr = NetbufAlloc (Len);
  876. if (PduHdr == NULL) {
  877. Status = EFI_OUT_OF_RESOURCES;
  878. goto ON_EXIT;
  879. }
  880. Header = NetbufAllocSpace (PduHdr, Len, NET_BUF_TAIL);
  881. if (Header == NULL) {
  882. Status = EFI_OUT_OF_RESOURCES;
  883. goto ON_EXIT;
  884. }
  885. //
  886. // First step, receive one TLS header.
  887. //
  888. Status = TlsCommonReceive (HttpInstance, PduHdr, Timeout);
  889. if (EFI_ERROR (Status)) {
  890. goto ON_EXIT;
  891. }
  892. RecordHeader = *(TLS_RECORD_HEADER *)Header;
  893. if (((RecordHeader.ContentType == TlsContentTypeHandshake) ||
  894. (RecordHeader.ContentType == TlsContentTypeAlert) ||
  895. (RecordHeader.ContentType == TlsContentTypeChangeCipherSpec) ||
  896. (RecordHeader.ContentType == TlsContentTypeApplicationData)) &&
  897. (RecordHeader.Version.Major == 0x03) && /// Major versions are same.
  898. ((RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR) ||
  899. (RecordHeader.Version.Minor == TLS11_PROTOCOL_VERSION_MINOR) ||
  900. (RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR))
  901. )
  902. {
  903. InsertTailList (NbufList, &PduHdr->List);
  904. } else {
  905. Status = EFI_PROTOCOL_ERROR;
  906. goto ON_EXIT;
  907. }
  908. Len = SwapBytes16 (RecordHeader.Length);
  909. if (Len == 0) {
  910. //
  911. // No TLS payload.
  912. //
  913. goto FORM_PDU;
  914. }
  915. //
  916. // Allocate buffer to receive one TLS payload.
  917. //
  918. DataSeg = NetbufAlloc (Len);
  919. if (DataSeg == NULL) {
  920. Status = EFI_OUT_OF_RESOURCES;
  921. goto ON_EXIT;
  922. }
  923. NetbufAllocSpace (DataSeg, Len, NET_BUF_TAIL);
  924. //
  925. // Second step, receive one TLS payload.
  926. //
  927. Status = TlsCommonReceive (HttpInstance, DataSeg, Timeout);
  928. if (EFI_ERROR (Status)) {
  929. goto ON_EXIT;
  930. }
  931. InsertTailList (NbufList, &DataSeg->List);
  932. FORM_PDU:
  933. //
  934. // Form the PDU from a list of PDU.
  935. //
  936. *Pdu = NetbufFromBufList (NbufList, 0, 0, FreeNbufList, NbufList);
  937. if (*Pdu == NULL) {
  938. Status = EFI_OUT_OF_RESOURCES;
  939. }
  940. ON_EXIT:
  941. if (EFI_ERROR (Status)) {
  942. //
  943. // Free the Nbufs in this NbufList and the NbufList itself.
  944. //
  945. FreeNbufList (NbufList);
  946. }
  947. return Status;
  948. }
  949. /**
  950. Connect one TLS session by finishing the TLS handshake process.
  951. @param[in] HttpInstance The HTTP instance private data.
  952. @param[in] Timeout The time to wait for connection done.
  953. @retval EFI_SUCCESS The TLS session is established.
  954. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources.
  955. @retval EFI_ABORTED TLS session state is incorrect.
  956. @retval Others Other error as indicated.
  957. **/
  958. EFI_STATUS
  959. EFIAPI
  960. TlsConnectSession (
  961. IN HTTP_PROTOCOL *HttpInstance,
  962. IN EFI_EVENT Timeout
  963. )
  964. {
  965. EFI_STATUS Status;
  966. UINT8 *BufferOut;
  967. UINTN BufferOutSize;
  968. NET_BUF *PacketOut;
  969. UINT8 *DataOut;
  970. NET_BUF *Pdu;
  971. UINT8 *BufferIn;
  972. UINTN BufferInSize;
  973. UINT8 *GetSessionDataBuffer;
  974. UINTN GetSessionDataBufferSize;
  975. BufferOut = NULL;
  976. PacketOut = NULL;
  977. DataOut = NULL;
  978. Pdu = NULL;
  979. BufferIn = NULL;
  980. //
  981. // Initialize TLS state.
  982. //
  983. HttpInstance->TlsSessionState = EfiTlsSessionNotStarted;
  984. Status = HttpInstance->Tls->SetSessionData (
  985. HttpInstance->Tls,
  986. EfiTlsSessionState,
  987. &(HttpInstance->TlsSessionState),
  988. sizeof (EFI_TLS_SESSION_STATE)
  989. );
  990. if (EFI_ERROR (Status)) {
  991. return Status;
  992. }
  993. //
  994. // Create ClientHello
  995. //
  996. BufferOutSize = DEF_BUF_LEN;
  997. BufferOut = AllocateZeroPool (BufferOutSize);
  998. if (BufferOut == NULL) {
  999. Status = EFI_OUT_OF_RESOURCES;
  1000. return Status;
  1001. }
  1002. Status = HttpInstance->Tls->BuildResponsePacket (
  1003. HttpInstance->Tls,
  1004. NULL,
  1005. 0,
  1006. BufferOut,
  1007. &BufferOutSize
  1008. );
  1009. if (Status == EFI_BUFFER_TOO_SMALL) {
  1010. FreePool (BufferOut);
  1011. BufferOut = AllocateZeroPool (BufferOutSize);
  1012. if (BufferOut == NULL) {
  1013. Status = EFI_OUT_OF_RESOURCES;
  1014. return Status;
  1015. }
  1016. Status = HttpInstance->Tls->BuildResponsePacket (
  1017. HttpInstance->Tls,
  1018. NULL,
  1019. 0,
  1020. BufferOut,
  1021. &BufferOutSize
  1022. );
  1023. }
  1024. if (EFI_ERROR (Status)) {
  1025. FreePool (BufferOut);
  1026. return Status;
  1027. }
  1028. //
  1029. // Transmit ClientHello
  1030. //
  1031. PacketOut = NetbufAlloc ((UINT32)BufferOutSize);
  1032. DataOut = NetbufAllocSpace (PacketOut, (UINT32)BufferOutSize, NET_BUF_TAIL);
  1033. if (DataOut == NULL) {
  1034. FreePool (BufferOut);
  1035. return EFI_OUT_OF_RESOURCES;
  1036. }
  1037. CopyMem (DataOut, BufferOut, BufferOutSize);
  1038. Status = TlsCommonTransmit (HttpInstance, PacketOut);
  1039. FreePool (BufferOut);
  1040. NetbufFree (PacketOut);
  1041. if (EFI_ERROR (Status)) {
  1042. return Status;
  1043. }
  1044. while (HttpInstance->TlsSessionState != EfiTlsSessionDataTransferring && \
  1045. ((Timeout == NULL) || EFI_ERROR (gBS->CheckEvent (Timeout))))
  1046. {
  1047. //
  1048. // Receive one TLS record.
  1049. //
  1050. Status = TlsReceiveOnePdu (HttpInstance, &Pdu, Timeout);
  1051. if (EFI_ERROR (Status)) {
  1052. return Status;
  1053. }
  1054. BufferInSize = Pdu->TotalSize;
  1055. BufferIn = AllocateZeroPool (BufferInSize);
  1056. if (BufferIn == NULL) {
  1057. NetbufFree (Pdu);
  1058. Status = EFI_OUT_OF_RESOURCES;
  1059. return Status;
  1060. }
  1061. NetbufCopy (Pdu, 0, (UINT32)BufferInSize, BufferIn);
  1062. NetbufFree (Pdu);
  1063. //
  1064. // Handle Receive data.
  1065. //
  1066. BufferOutSize = DEF_BUF_LEN;
  1067. BufferOut = AllocateZeroPool (BufferOutSize);
  1068. if (BufferOut == NULL) {
  1069. Status = EFI_OUT_OF_RESOURCES;
  1070. return Status;
  1071. }
  1072. Status = HttpInstance->Tls->BuildResponsePacket (
  1073. HttpInstance->Tls,
  1074. BufferIn,
  1075. BufferInSize,
  1076. BufferOut,
  1077. &BufferOutSize
  1078. );
  1079. if (Status == EFI_BUFFER_TOO_SMALL) {
  1080. FreePool (BufferOut);
  1081. BufferOut = AllocateZeroPool (BufferOutSize);
  1082. if (BufferOut == NULL) {
  1083. FreePool (BufferIn);
  1084. Status = EFI_OUT_OF_RESOURCES;
  1085. return Status;
  1086. }
  1087. Status = HttpInstance->Tls->BuildResponsePacket (
  1088. HttpInstance->Tls,
  1089. BufferIn,
  1090. BufferInSize,
  1091. BufferOut,
  1092. &BufferOutSize
  1093. );
  1094. }
  1095. FreePool (BufferIn);
  1096. if (EFI_ERROR (Status)) {
  1097. FreePool (BufferOut);
  1098. return Status;
  1099. }
  1100. if (BufferOutSize != 0) {
  1101. //
  1102. // Transmit the response packet.
  1103. //
  1104. PacketOut = NetbufAlloc ((UINT32)BufferOutSize);
  1105. DataOut = NetbufAllocSpace (PacketOut, (UINT32)BufferOutSize, NET_BUF_TAIL);
  1106. if (DataOut == NULL) {
  1107. FreePool (BufferOut);
  1108. return EFI_OUT_OF_RESOURCES;
  1109. }
  1110. CopyMem (DataOut, BufferOut, BufferOutSize);
  1111. Status = TlsCommonTransmit (HttpInstance, PacketOut);
  1112. NetbufFree (PacketOut);
  1113. if (EFI_ERROR (Status)) {
  1114. FreePool (BufferOut);
  1115. return Status;
  1116. }
  1117. }
  1118. FreePool (BufferOut);
  1119. //
  1120. // Get the session state, then decide whether need to continue handle received packet.
  1121. //
  1122. GetSessionDataBufferSize = DEF_BUF_LEN;
  1123. GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);
  1124. if (GetSessionDataBuffer == NULL) {
  1125. Status = EFI_OUT_OF_RESOURCES;
  1126. return Status;
  1127. }
  1128. Status = HttpInstance->Tls->GetSessionData (
  1129. HttpInstance->Tls,
  1130. EfiTlsSessionState,
  1131. GetSessionDataBuffer,
  1132. &GetSessionDataBufferSize
  1133. );
  1134. if (Status == EFI_BUFFER_TOO_SMALL) {
  1135. FreePool (GetSessionDataBuffer);
  1136. GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);
  1137. if (GetSessionDataBuffer == NULL) {
  1138. Status = EFI_OUT_OF_RESOURCES;
  1139. return Status;
  1140. }
  1141. Status = HttpInstance->Tls->GetSessionData (
  1142. HttpInstance->Tls,
  1143. EfiTlsSessionState,
  1144. GetSessionDataBuffer,
  1145. &GetSessionDataBufferSize
  1146. );
  1147. }
  1148. if (EFI_ERROR (Status)) {
  1149. FreePool (GetSessionDataBuffer);
  1150. return Status;
  1151. }
  1152. ASSERT (GetSessionDataBufferSize == sizeof (EFI_TLS_SESSION_STATE));
  1153. HttpInstance->TlsSessionState = *(EFI_TLS_SESSION_STATE *)GetSessionDataBuffer;
  1154. FreePool (GetSessionDataBuffer);
  1155. if (HttpInstance->TlsSessionState == EfiTlsSessionError) {
  1156. return EFI_ABORTED;
  1157. }
  1158. }
  1159. if (HttpInstance->TlsSessionState != EfiTlsSessionDataTransferring) {
  1160. Status = EFI_ABORTED;
  1161. }
  1162. return Status;
  1163. }
  1164. /**
  1165. Close the TLS session and send out the close notification message.
  1166. @param[in] HttpInstance The HTTP instance private data.
  1167. @retval EFI_SUCCESS The TLS session is closed.
  1168. @retval EFI_INVALID_PARAMETER HttpInstance is NULL.
  1169. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources.
  1170. @retval Others Other error as indicated.
  1171. **/
  1172. EFI_STATUS
  1173. EFIAPI
  1174. TlsCloseSession (
  1175. IN HTTP_PROTOCOL *HttpInstance
  1176. )
  1177. {
  1178. EFI_STATUS Status;
  1179. UINT8 *BufferOut;
  1180. UINTN BufferOutSize;
  1181. NET_BUF *PacketOut;
  1182. UINT8 *DataOut;
  1183. Status = EFI_SUCCESS;
  1184. BufferOut = NULL;
  1185. PacketOut = NULL;
  1186. DataOut = NULL;
  1187. if (HttpInstance == NULL) {
  1188. return EFI_INVALID_PARAMETER;
  1189. }
  1190. HttpInstance->TlsSessionState = EfiTlsSessionClosing;
  1191. Status = HttpInstance->Tls->SetSessionData (
  1192. HttpInstance->Tls,
  1193. EfiTlsSessionState,
  1194. &(HttpInstance->TlsSessionState),
  1195. sizeof (EFI_TLS_SESSION_STATE)
  1196. );
  1197. if (EFI_ERROR (Status)) {
  1198. return Status;
  1199. }
  1200. BufferOutSize = DEF_BUF_LEN;
  1201. BufferOut = AllocateZeroPool (BufferOutSize);
  1202. if (BufferOut == NULL) {
  1203. Status = EFI_OUT_OF_RESOURCES;
  1204. return Status;
  1205. }
  1206. Status = HttpInstance->Tls->BuildResponsePacket (
  1207. HttpInstance->Tls,
  1208. NULL,
  1209. 0,
  1210. BufferOut,
  1211. &BufferOutSize
  1212. );
  1213. if (Status == EFI_BUFFER_TOO_SMALL) {
  1214. FreePool (BufferOut);
  1215. BufferOut = AllocateZeroPool (BufferOutSize);
  1216. if (BufferOut == NULL) {
  1217. Status = EFI_OUT_OF_RESOURCES;
  1218. return Status;
  1219. }
  1220. Status = HttpInstance->Tls->BuildResponsePacket (
  1221. HttpInstance->Tls,
  1222. NULL,
  1223. 0,
  1224. BufferOut,
  1225. &BufferOutSize
  1226. );
  1227. }
  1228. if (EFI_ERROR (Status)) {
  1229. FreePool (BufferOut);
  1230. return Status;
  1231. }
  1232. PacketOut = NetbufAlloc ((UINT32)BufferOutSize);
  1233. DataOut = NetbufAllocSpace (PacketOut, (UINT32)BufferOutSize, NET_BUF_TAIL);
  1234. if (DataOut == NULL) {
  1235. FreePool (BufferOut);
  1236. return EFI_OUT_OF_RESOURCES;
  1237. }
  1238. CopyMem (DataOut, BufferOut, BufferOutSize);
  1239. Status = TlsCommonTransmit (HttpInstance, PacketOut);
  1240. FreePool (BufferOut);
  1241. NetbufFree (PacketOut);
  1242. return Status;
  1243. }
  1244. /**
  1245. Process one message according to the CryptMode.
  1246. @param[in] HttpInstance Pointer to HTTP_PROTOCOL structure.
  1247. @param[in] Message Pointer to the message buffer needed to processed.
  1248. If ProcessMode is EfiTlsEncrypt, the message contain the TLS
  1249. header and plain text TLS APP payload.
  1250. If ProcessMode is EfiTlsDecrypt, the message contain the TLS
  1251. header and cipher text TLS APP payload.
  1252. @param[in] MessageSize Pointer to the message buffer size.
  1253. @param[in] ProcessMode Process mode.
  1254. @param[in, out] Fragment Only one Fragment returned after the Message is
  1255. processed successfully.
  1256. If ProcessMode is EfiTlsEncrypt, the fragment contain the TLS
  1257. header and cipher text TLS APP payload.
  1258. If ProcessMode is EfiTlsDecrypt, the fragment contain the TLS
  1259. header and plain text TLS APP payload.
  1260. @retval EFI_SUCCESS Message is processed successfully.
  1261. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources.
  1262. @retval Others Other errors as indicated.
  1263. **/
  1264. EFI_STATUS
  1265. EFIAPI
  1266. TlsProcessMessage (
  1267. IN HTTP_PROTOCOL *HttpInstance,
  1268. IN UINT8 *Message,
  1269. IN UINTN MessageSize,
  1270. IN EFI_TLS_CRYPT_MODE ProcessMode,
  1271. IN OUT NET_FRAGMENT *Fragment
  1272. )
  1273. {
  1274. EFI_STATUS Status;
  1275. UINT8 *Buffer;
  1276. UINT32 BufferSize;
  1277. UINT32 BytesCopied;
  1278. EFI_TLS_FRAGMENT_DATA *FragmentTable;
  1279. UINT32 FragmentCount;
  1280. EFI_TLS_FRAGMENT_DATA *OriginalFragmentTable;
  1281. UINTN Index;
  1282. Status = EFI_SUCCESS;
  1283. Buffer = NULL;
  1284. BufferSize = 0;
  1285. BytesCopied = 0;
  1286. FragmentTable = NULL;
  1287. OriginalFragmentTable = NULL;
  1288. //
  1289. // Rebuild fragment table from BufferIn.
  1290. //
  1291. FragmentCount = 1;
  1292. FragmentTable = AllocateZeroPool (FragmentCount * sizeof (EFI_TLS_FRAGMENT_DATA));
  1293. if (FragmentTable == NULL) {
  1294. Status = EFI_OUT_OF_RESOURCES;
  1295. goto ON_EXIT;
  1296. }
  1297. FragmentTable->FragmentLength = (UINT32)MessageSize;
  1298. FragmentTable->FragmentBuffer = Message;
  1299. //
  1300. // Record the original FragmentTable.
  1301. //
  1302. OriginalFragmentTable = FragmentTable;
  1303. //
  1304. // Process the Message.
  1305. //
  1306. Status = HttpInstance->Tls->ProcessPacket (
  1307. HttpInstance->Tls,
  1308. &FragmentTable,
  1309. &FragmentCount,
  1310. ProcessMode
  1311. );
  1312. if (EFI_ERROR (Status)) {
  1313. goto ON_EXIT;
  1314. }
  1315. //
  1316. // Calculate the size according to FragmentTable.
  1317. //
  1318. for (Index = 0; Index < FragmentCount; Index++) {
  1319. BufferSize += FragmentTable[Index].FragmentLength;
  1320. }
  1321. //
  1322. // Allocate buffer for processed data.
  1323. //
  1324. Buffer = AllocateZeroPool (BufferSize);
  1325. if (Buffer == NULL) {
  1326. Status = EFI_OUT_OF_RESOURCES;
  1327. goto ON_EXIT;
  1328. }
  1329. //
  1330. // Copy the new FragmentTable buffer into Buffer.
  1331. //
  1332. for (Index = 0; Index < FragmentCount; Index++) {
  1333. CopyMem (
  1334. (Buffer + BytesCopied),
  1335. FragmentTable[Index].FragmentBuffer,
  1336. FragmentTable[Index].FragmentLength
  1337. );
  1338. BytesCopied += FragmentTable[Index].FragmentLength;
  1339. //
  1340. // Free the FragmentBuffer since it has been copied.
  1341. //
  1342. FreePool (FragmentTable[Index].FragmentBuffer);
  1343. }
  1344. Fragment->Len = BufferSize;
  1345. Fragment->Bulk = Buffer;
  1346. ON_EXIT:
  1347. if (OriginalFragmentTable != NULL) {
  1348. if ( FragmentTable == OriginalFragmentTable) {
  1349. FragmentTable = NULL;
  1350. }
  1351. FreePool (OriginalFragmentTable);
  1352. OriginalFragmentTable = NULL;
  1353. }
  1354. //
  1355. // Caller has the responsibility to free the FragmentTable.
  1356. //
  1357. if (FragmentTable != NULL) {
  1358. FreePool (FragmentTable);
  1359. FragmentTable = NULL;
  1360. }
  1361. return Status;
  1362. }
  1363. /**
  1364. Receive one fragment decrypted from one TLS record.
  1365. @param[in] HttpInstance Pointer to HTTP_PROTOCOL structure.
  1366. @param[in, out] Fragment The received Fragment.
  1367. @param[in] Timeout The time to wait for connection done.
  1368. @retval EFI_SUCCESS One fragment is received.
  1369. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources.
  1370. @retval EFI_ABORTED Something wrong decryption the message.
  1371. @retval Others Other errors as indicated.
  1372. **/
  1373. EFI_STATUS
  1374. EFIAPI
  1375. HttpsReceive (
  1376. IN HTTP_PROTOCOL *HttpInstance,
  1377. IN OUT NET_FRAGMENT *Fragment,
  1378. IN EFI_EVENT Timeout
  1379. )
  1380. {
  1381. EFI_STATUS Status;
  1382. NET_BUF *Pdu;
  1383. TLS_RECORD_HEADER RecordHeader;
  1384. UINT8 *BufferIn;
  1385. UINTN BufferInSize;
  1386. NET_FRAGMENT TempFragment;
  1387. UINT8 *BufferOut;
  1388. UINTN BufferOutSize;
  1389. NET_BUF *PacketOut;
  1390. UINT8 *DataOut;
  1391. UINT8 *GetSessionDataBuffer;
  1392. UINTN GetSessionDataBufferSize;
  1393. Status = EFI_SUCCESS;
  1394. Pdu = NULL;
  1395. BufferIn = NULL;
  1396. BufferInSize = 0;
  1397. BufferOut = NULL;
  1398. BufferOutSize = 0;
  1399. PacketOut = NULL;
  1400. DataOut = NULL;
  1401. GetSessionDataBuffer = NULL;
  1402. GetSessionDataBufferSize = 0;
  1403. //
  1404. // Receive only one TLS record
  1405. //
  1406. Status = TlsReceiveOnePdu (HttpInstance, &Pdu, Timeout);
  1407. if (EFI_ERROR (Status)) {
  1408. return Status;
  1409. }
  1410. BufferInSize = Pdu->TotalSize;
  1411. BufferIn = AllocateZeroPool (BufferInSize);
  1412. if (BufferIn == NULL) {
  1413. Status = EFI_OUT_OF_RESOURCES;
  1414. NetbufFree (Pdu);
  1415. return Status;
  1416. }
  1417. NetbufCopy (Pdu, 0, (UINT32)BufferInSize, BufferIn);
  1418. NetbufFree (Pdu);
  1419. //
  1420. // Handle Receive data.
  1421. //
  1422. RecordHeader = *(TLS_RECORD_HEADER *)BufferIn;
  1423. if ((RecordHeader.ContentType == TlsContentTypeApplicationData) &&
  1424. (RecordHeader.Version.Major == 0x03) &&
  1425. ((RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR) ||
  1426. (RecordHeader.Version.Minor == TLS11_PROTOCOL_VERSION_MINOR) ||
  1427. (RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR))
  1428. )
  1429. {
  1430. //
  1431. // Decrypt Packet.
  1432. //
  1433. Status = TlsProcessMessage (
  1434. HttpInstance,
  1435. BufferIn,
  1436. BufferInSize,
  1437. EfiTlsDecrypt,
  1438. &TempFragment
  1439. );
  1440. FreePool (BufferIn);
  1441. if (EFI_ERROR (Status)) {
  1442. if (Status == EFI_ABORTED) {
  1443. //
  1444. // Something wrong decryption the message.
  1445. // BuildResponsePacket() will be called to generate Error Alert message and send it out.
  1446. //
  1447. BufferOutSize = DEF_BUF_LEN;
  1448. BufferOut = AllocateZeroPool (BufferOutSize);
  1449. if (BufferOut == NULL) {
  1450. Status = EFI_OUT_OF_RESOURCES;
  1451. return Status;
  1452. }
  1453. Status = HttpInstance->Tls->BuildResponsePacket (
  1454. HttpInstance->Tls,
  1455. NULL,
  1456. 0,
  1457. BufferOut,
  1458. &BufferOutSize
  1459. );
  1460. if (Status == EFI_BUFFER_TOO_SMALL) {
  1461. FreePool (BufferOut);
  1462. BufferOut = AllocateZeroPool (BufferOutSize);
  1463. if (BufferOut == NULL) {
  1464. Status = EFI_OUT_OF_RESOURCES;
  1465. return Status;
  1466. }
  1467. Status = HttpInstance->Tls->BuildResponsePacket (
  1468. HttpInstance->Tls,
  1469. NULL,
  1470. 0,
  1471. BufferOut,
  1472. &BufferOutSize
  1473. );
  1474. }
  1475. if (EFI_ERROR (Status)) {
  1476. FreePool (BufferOut);
  1477. return Status;
  1478. }
  1479. if (BufferOutSize != 0) {
  1480. PacketOut = NetbufAlloc ((UINT32)BufferOutSize);
  1481. DataOut = NetbufAllocSpace (PacketOut, (UINT32)BufferOutSize, NET_BUF_TAIL);
  1482. if (DataOut == NULL) {
  1483. FreePool (BufferOut);
  1484. return EFI_OUT_OF_RESOURCES;
  1485. }
  1486. CopyMem (DataOut, BufferOut, BufferOutSize);
  1487. Status = TlsCommonTransmit (HttpInstance, PacketOut);
  1488. NetbufFree (PacketOut);
  1489. }
  1490. FreePool (BufferOut);
  1491. if (EFI_ERROR (Status)) {
  1492. return Status;
  1493. }
  1494. return EFI_ABORTED;
  1495. }
  1496. return Status;
  1497. }
  1498. //
  1499. // Parsing buffer.
  1500. //
  1501. ASSERT (((TLS_RECORD_HEADER *)(TempFragment.Bulk))->ContentType == TlsContentTypeApplicationData);
  1502. BufferInSize = ((TLS_RECORD_HEADER *)(TempFragment.Bulk))->Length;
  1503. BufferIn = AllocateZeroPool (BufferInSize);
  1504. if (BufferIn == NULL) {
  1505. Status = EFI_OUT_OF_RESOURCES;
  1506. return Status;
  1507. }
  1508. CopyMem (BufferIn, TempFragment.Bulk + TLS_RECORD_HEADER_LENGTH, BufferInSize);
  1509. //
  1510. // Free the buffer in TempFragment.
  1511. //
  1512. FreePool (TempFragment.Bulk);
  1513. } else if ((RecordHeader.ContentType == TlsContentTypeAlert) &&
  1514. (RecordHeader.Version.Major == 0x03) &&
  1515. ((RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR) ||
  1516. (RecordHeader.Version.Minor == TLS11_PROTOCOL_VERSION_MINOR) ||
  1517. (RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR))
  1518. )
  1519. {
  1520. BufferOutSize = DEF_BUF_LEN;
  1521. BufferOut = AllocateZeroPool (BufferOutSize);
  1522. if (BufferOut == NULL) {
  1523. FreePool (BufferIn);
  1524. Status = EFI_OUT_OF_RESOURCES;
  1525. return Status;
  1526. }
  1527. Status = HttpInstance->Tls->BuildResponsePacket (
  1528. HttpInstance->Tls,
  1529. BufferIn,
  1530. BufferInSize,
  1531. BufferOut,
  1532. &BufferOutSize
  1533. );
  1534. if (Status == EFI_BUFFER_TOO_SMALL) {
  1535. FreePool (BufferOut);
  1536. BufferOut = AllocateZeroPool (BufferOutSize);
  1537. if (BufferOut == NULL) {
  1538. FreePool (BufferIn);
  1539. Status = EFI_OUT_OF_RESOURCES;
  1540. return Status;
  1541. }
  1542. Status = HttpInstance->Tls->BuildResponsePacket (
  1543. HttpInstance->Tls,
  1544. BufferIn,
  1545. BufferInSize,
  1546. BufferOut,
  1547. &BufferOutSize
  1548. );
  1549. }
  1550. FreePool (BufferIn);
  1551. if (EFI_ERROR (Status)) {
  1552. FreePool (BufferOut);
  1553. return Status;
  1554. }
  1555. if (BufferOutSize != 0) {
  1556. PacketOut = NetbufAlloc ((UINT32)BufferOutSize);
  1557. DataOut = NetbufAllocSpace (PacketOut, (UINT32)BufferOutSize, NET_BUF_TAIL);
  1558. if (DataOut == NULL) {
  1559. FreePool (BufferOut);
  1560. return EFI_OUT_OF_RESOURCES;
  1561. }
  1562. CopyMem (DataOut, BufferOut, BufferOutSize);
  1563. Status = TlsCommonTransmit (HttpInstance, PacketOut);
  1564. NetbufFree (PacketOut);
  1565. }
  1566. FreePool (BufferOut);
  1567. //
  1568. // Get the session state.
  1569. //
  1570. GetSessionDataBufferSize = DEF_BUF_LEN;
  1571. GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);
  1572. if (GetSessionDataBuffer == NULL) {
  1573. Status = EFI_OUT_OF_RESOURCES;
  1574. return Status;
  1575. }
  1576. Status = HttpInstance->Tls->GetSessionData (
  1577. HttpInstance->Tls,
  1578. EfiTlsSessionState,
  1579. GetSessionDataBuffer,
  1580. &GetSessionDataBufferSize
  1581. );
  1582. if (Status == EFI_BUFFER_TOO_SMALL) {
  1583. FreePool (GetSessionDataBuffer);
  1584. GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);
  1585. if (GetSessionDataBuffer == NULL) {
  1586. Status = EFI_OUT_OF_RESOURCES;
  1587. return Status;
  1588. }
  1589. Status = HttpInstance->Tls->GetSessionData (
  1590. HttpInstance->Tls,
  1591. EfiTlsSessionState,
  1592. GetSessionDataBuffer,
  1593. &GetSessionDataBufferSize
  1594. );
  1595. }
  1596. if (EFI_ERROR (Status)) {
  1597. FreePool (GetSessionDataBuffer);
  1598. return Status;
  1599. }
  1600. ASSERT (GetSessionDataBufferSize == sizeof (EFI_TLS_SESSION_STATE));
  1601. HttpInstance->TlsSessionState = *(EFI_TLS_SESSION_STATE *)GetSessionDataBuffer;
  1602. FreePool (GetSessionDataBuffer);
  1603. if (HttpInstance->TlsSessionState == EfiTlsSessionError) {
  1604. DEBUG ((DEBUG_ERROR, "TLS Session State Error!\n"));
  1605. return EFI_ABORTED;
  1606. }
  1607. BufferIn = NULL;
  1608. BufferInSize = 0;
  1609. }
  1610. Fragment->Bulk = BufferIn;
  1611. Fragment->Len = (UINT32)BufferInSize;
  1612. return Status;
  1613. }