/** Build and send a ACK packet for the download session. @param Instance The Mtftp session @param BlkNo The BlkNo to ack. @retval EFI_OUT_OF_RESOURCES Failed to allocate memory for the packet @retval EFI_SUCCESS The ACK has been sent @retval Others Failed to send the ACK. **/ EFI_STATUS Mtftp4RrqSendAck ( IN MTFTP4_PROTOCOL *Instance, IN UINT16 BlkNo ) { EFI_MTFTP4_PACKET *Ack; NET_BUF *Packet; Packet = NetbufAlloc (sizeof (EFI_MTFTP4_ACK_HEADER)); if (Packet == NULL) { return EFI_OUT_OF_RESOURCES; } Ack = (EFI_MTFTP4_PACKET *) NetbufAllocSpace ( Packet, sizeof (EFI_MTFTP4_ACK_HEADER), FALSE ); ASSERT (Ack != NULL); Ack->Ack.OpCode = HTONS (EFI_MTFTP4_OPCODE_ACK); Ack->Ack.Block[0] = HTONS (BlkNo); return Mtftp4SendPacket (Instance, Packet); }
/** Build and send a ACK packet for download. @param[in] Instance The pointer to the Mtftp6 instance. @param[in] BlockNum The block number to be acked. @retval EFI_OUT_OF_RESOURCES Failed to allocate memory for the packet. @retval EFI_SUCCESS The ACK has been sent. @retval Others Failed to send the ACK. **/ EFI_STATUS Mtftp6RrqSendAck ( IN MTFTP6_INSTANCE *Instance, IN UINT16 BlockNum ) { EFI_MTFTP6_PACKET *Ack; NET_BUF *Packet; // // Allocate net buffer to create ack packet. // Packet = NetbufAlloc (sizeof (EFI_MTFTP6_ACK_HEADER)); if (Packet == NULL) { return EFI_OUT_OF_RESOURCES; } Ack = (EFI_MTFTP6_PACKET *) NetbufAllocSpace ( Packet, sizeof (EFI_MTFTP6_ACK_HEADER), FALSE ); ASSERT (Ack != NULL); Ack->Ack.OpCode = HTONS (EFI_MTFTP6_OPCODE_ACK); Ack->Ack.Block[0] = HTONS (BlockNum); // // Reset current retry count of the instance. // Instance->CurRetry = 0; return Mtftp6TransmitPacket (Instance, Packet); }
/** Build then send a MTFTP data packet for the MTFTP upload session. @param Instance The MTFTP upload session. @param BlockNum The block number to send. @retval EFI_OUT_OF_RESOURCES Failed to build the packet. @retval EFI_ABORTED The consumer of this child directs to abort the transmission by return an error through PacketNeeded. @retval EFI_SUCCESS The data is sent. **/ EFI_STATUS Mtftp4WrqSendBlock ( IN OUT MTFTP4_PROTOCOL *Instance, IN UINT16 BlockNum ) { EFI_MTFTP4_PACKET *Packet; EFI_MTFTP4_TOKEN *Token; NET_BUF *UdpPacket; EFI_STATUS Status; UINT16 DataLen; UINT8 *DataBuf; UINT64 Start; // // Allocate a buffer to hold the user data // UdpPacket = NetbufAlloc (Instance->BlkSize + MTFTP4_DATA_HEAD_LEN); if (UdpPacket == NULL) { return EFI_OUT_OF_RESOURCES; } Packet = (EFI_MTFTP4_PACKET *) NetbufAllocSpace (UdpPacket, MTFTP4_DATA_HEAD_LEN, FALSE); ASSERT (Packet != NULL); Packet->Data.OpCode = HTONS (EFI_MTFTP4_OPCODE_DATA); Packet->Data.Block = HTONS (BlockNum); // // Read the block from either the buffer or PacketNeeded callback // Token = Instance->Token; DataLen = Instance->BlkSize; if (Token->Buffer != NULL) { Start = MultU64x32 (BlockNum - 1, Instance->BlkSize); if (Token->BufferSize < Start + Instance->BlkSize) { DataLen = (UINT16) (Token->BufferSize - Start); Instance->LastBlock = BlockNum; Mtftp4SetLastBlockNum (&Instance->Blocks, BlockNum); } if (DataLen > 0) { NetbufAllocSpace (UdpPacket, DataLen, FALSE); CopyMem (Packet->Data.Data, (UINT8 *) Token->Buffer + Start, DataLen); } } else { // // Get data from PacketNeeded // DataBuf = NULL; Status = Token->PacketNeeded ( &Instance->Mtftp4, Token, &DataLen, (VOID **) &DataBuf ); if (EFI_ERROR (Status) || (DataLen > Instance->BlkSize)) { if (DataBuf != NULL) { FreePool (DataBuf); } if (UdpPacket != NULL) { NetbufFree (UdpPacket); } Mtftp4SendError ( Instance, EFI_MTFTP4_ERRORCODE_REQUEST_DENIED, (UINT8 *) "User aborted the transfer" ); return EFI_ABORTED; } if (DataLen < Instance->BlkSize) { Instance->LastBlock = BlockNum; Mtftp4SetLastBlockNum (&Instance->Blocks, BlockNum); } if (DataLen > 0) { NetbufAllocSpace (UdpPacket, DataLen, FALSE); CopyMem (Packet->Data.Data, DataBuf, DataLen); FreePool (DataBuf); } } return Mtftp4SendPacket (Instance, UdpPacket); }
/** Connect one TLS session by finishing the TLS handshake process. @param[in] HttpInstance The HTTP instance private data. @param[in] Timeout The time to wait for connection done. @retval EFI_SUCCESS The TLS session is established. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources. @retval EFI_ABORTED TLS session state is incorrect. @retval Others Other error as indicated. **/ EFI_STATUS EFIAPI TlsConnectSession ( IN HTTP_PROTOCOL *HttpInstance, IN EFI_EVENT Timeout ) { EFI_STATUS Status; UINT8 *BufferOut; UINTN BufferOutSize; NET_BUF *PacketOut; UINT8 *DataOut; NET_BUF *Pdu; UINT8 *BufferIn; UINTN BufferInSize; UINT8 *GetSessionDataBuffer; UINTN GetSessionDataBufferSize; BufferOut = NULL; PacketOut = NULL; DataOut = NULL; Pdu = NULL; BufferIn = NULL; // // Initialize TLS state. // HttpInstance->TlsSessionState = EfiTlsSessionNotStarted; Status = HttpInstance->Tls->SetSessionData ( HttpInstance->Tls, EfiTlsSessionState, &(HttpInstance->TlsSessionState), sizeof (EFI_TLS_SESSION_STATE) ); if (EFI_ERROR (Status)) { return Status; } // // Create ClientHello // BufferOutSize = DEF_BUF_LEN; BufferOut = AllocateZeroPool (BufferOutSize); if (BufferOut == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->BuildResponsePacket ( HttpInstance->Tls, NULL, 0, BufferOut, &BufferOutSize ); if (Status == EFI_BUFFER_TOO_SMALL) { FreePool (BufferOut); BufferOut = AllocateZeroPool (BufferOutSize); if (BufferOut == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->BuildResponsePacket ( HttpInstance->Tls, NULL, 0, BufferOut, &BufferOutSize ); } if (EFI_ERROR (Status)) { FreePool (BufferOut); return Status; } // // Transmit ClientHello // PacketOut = NetbufAlloc ((UINT32) BufferOutSize); DataOut = NetbufAllocSpace (PacketOut, (UINT32) BufferOutSize, NET_BUF_TAIL); if (DataOut == NULL) { FreePool (BufferOut); return EFI_OUT_OF_RESOURCES; } CopyMem (DataOut, BufferOut, BufferOutSize); Status = TlsCommonTransmit (HttpInstance, PacketOut); FreePool (BufferOut); NetbufFree (PacketOut); if (EFI_ERROR (Status)) { return Status; } while(HttpInstance->TlsSessionState != EfiTlsSessionDataTransferring && \ ((Timeout == NULL) || EFI_ERROR (gBS->CheckEvent (Timeout)))) { // // Receive one TLS record. // Status = TlsReceiveOnePdu (HttpInstance, &Pdu, Timeout); if (EFI_ERROR (Status)) { return Status; } BufferInSize = Pdu->TotalSize; BufferIn = AllocateZeroPool (BufferInSize); if (BufferIn == NULL) { NetbufFree (Pdu); Status = EFI_OUT_OF_RESOURCES; return Status; } NetbufCopy (Pdu, 0, (UINT32)BufferInSize, BufferIn); NetbufFree (Pdu); // // Handle Receive data. // BufferOutSize = DEF_BUF_LEN; BufferOut = AllocateZeroPool (BufferOutSize); if (BufferOut == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->BuildResponsePacket ( HttpInstance->Tls, BufferIn, BufferInSize, BufferOut, &BufferOutSize ); if (Status == EFI_BUFFER_TOO_SMALL) { FreePool (BufferOut); BufferOut = AllocateZeroPool (BufferOutSize); if (BufferOut == NULL) { FreePool (BufferIn); Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->BuildResponsePacket ( HttpInstance->Tls, BufferIn, BufferInSize, BufferOut, &BufferOutSize ); } FreePool (BufferIn); if (EFI_ERROR (Status)) { FreePool (BufferOut); return Status; } if (BufferOutSize != 0) { // // Transmit the response packet. // PacketOut = NetbufAlloc ((UINT32) BufferOutSize); DataOut = NetbufAllocSpace (PacketOut, (UINT32) BufferOutSize, NET_BUF_TAIL); if (DataOut == NULL) { FreePool (BufferOut); return EFI_OUT_OF_RESOURCES; } CopyMem (DataOut, BufferOut, BufferOutSize); Status = TlsCommonTransmit (HttpInstance, PacketOut); NetbufFree (PacketOut); if (EFI_ERROR (Status)) { FreePool (BufferOut); return Status; } } FreePool (BufferOut); // // Get the session state, then decide whether need to continue handle received packet. // GetSessionDataBufferSize = DEF_BUF_LEN; GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize); if (GetSessionDataBuffer == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->GetSessionData ( HttpInstance->Tls, EfiTlsSessionState, GetSessionDataBuffer, &GetSessionDataBufferSize ); if (Status == EFI_BUFFER_TOO_SMALL) { FreePool (GetSessionDataBuffer); GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize); if (GetSessionDataBuffer == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->GetSessionData ( HttpInstance->Tls, EfiTlsSessionState, GetSessionDataBuffer, &GetSessionDataBufferSize ); } if (EFI_ERROR (Status)) { FreePool(GetSessionDataBuffer); return Status; } ASSERT(GetSessionDataBufferSize == sizeof (EFI_TLS_SESSION_STATE)); HttpInstance->TlsSessionState = *(EFI_TLS_SESSION_STATE *) GetSessionDataBuffer; FreePool (GetSessionDataBuffer); if(HttpInstance->TlsSessionState == EfiTlsSessionError) { return EFI_ABORTED; } } if (HttpInstance->TlsSessionState != EfiTlsSessionDataTransferring) { Status = EFI_ABORTED; } return Status; }
/** Receive one TLS PDU. An TLS PDU contains an TLS record header and it's corresponding record data. These two parts will be put into two blocks of buffers in the net buffer. @param[in, out] HttpInstance Pointer to HTTP_PROTOCOL structure. @param[out] Pdu The received TLS PDU. @param[in] Timeout The time to wait for connection done. @retval EFI_SUCCESS An TLS PDU is received. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources. @retval EFI_PROTOCOL_ERROR An unexpected TLS packet was received. @retval Others Other errors as indicated. **/ EFI_STATUS EFIAPI TlsReceiveOnePdu ( IN OUT HTTP_PROTOCOL *HttpInstance, OUT NET_BUF **Pdu, IN EFI_EVENT Timeout ) { EFI_STATUS Status; LIST_ENTRY *NbufList; UINT32 Len; NET_BUF *PduHdr; UINT8 *Header; TLS_RECORD_HEADER RecordHeader; NET_BUF *DataSeg; NbufList = NULL; PduHdr = NULL; Header = NULL; DataSeg = NULL; NbufList = AllocatePool (sizeof (LIST_ENTRY)); if (NbufList == NULL) { return EFI_OUT_OF_RESOURCES; } InitializeListHead (NbufList); // // Allocate buffer to receive one TLS header. // Len = sizeof (TLS_RECORD_HEADER); PduHdr = NetbufAlloc (Len); if (PduHdr == NULL) { Status = EFI_OUT_OF_RESOURCES; goto ON_EXIT; } Header = NetbufAllocSpace (PduHdr, Len, NET_BUF_TAIL); if (Header == NULL) { Status = EFI_OUT_OF_RESOURCES; goto ON_EXIT; } // // First step, receive one TLS header. // Status = TlsCommonReceive (HttpInstance, PduHdr, Timeout); if (EFI_ERROR (Status)) { goto ON_EXIT; } RecordHeader = *(TLS_RECORD_HEADER *) Header; if ((RecordHeader.ContentType == TlsContentTypeHandshake || RecordHeader.ContentType == TlsContentTypeAlert || RecordHeader.ContentType == TlsContentTypeChangeCipherSpec || RecordHeader.ContentType == TlsContentTypeApplicationData) && (RecordHeader.Version.Major == 0x03) && /// Major versions are same. (RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR || RecordHeader.Version.Minor ==TLS11_PROTOCOL_VERSION_MINOR || RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR) ) { InsertTailList (NbufList, &PduHdr->List); } else { Status = EFI_PROTOCOL_ERROR; goto ON_EXIT; } Len = SwapBytes16(RecordHeader.Length); if (Len == 0) { // // No TLS payload. // goto FORM_PDU; } // // Allocate buffer to receive one TLS payload. // DataSeg = NetbufAlloc (Len); if (DataSeg == NULL) { Status = EFI_OUT_OF_RESOURCES; goto ON_EXIT; } NetbufAllocSpace (DataSeg, Len, NET_BUF_TAIL); // // Second step, receive one TLS payload. // Status = TlsCommonReceive (HttpInstance, DataSeg, Timeout); if (EFI_ERROR (Status)) { goto ON_EXIT; } InsertTailList (NbufList, &DataSeg->List); FORM_PDU: // // Form the PDU from a list of PDU. // *Pdu = NetbufFromBufList (NbufList, 0, 0, FreeNbufList, NbufList); if (*Pdu == NULL) { Status = EFI_OUT_OF_RESOURCES; } ON_EXIT: if (EFI_ERROR (Status)) { // // Free the Nbufs in this NbufList and the NbufList itself. // FreeNbufList (NbufList); } return Status; }
/** Receive one fragment decrypted from one TLS record. @param[in] HttpInstance Pointer to HTTP_PROTOCOL structure. @param[in, out] Fragment The received Fragment. @param[in] Timeout The time to wait for connection done. @retval EFI_SUCCESS One fragment is received. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources. @retval EFI_ABORTED Something wrong decryption the message. @retval Others Other errors as indicated. **/ EFI_STATUS EFIAPI HttpsReceive ( IN HTTP_PROTOCOL *HttpInstance, IN OUT NET_FRAGMENT *Fragment, IN EFI_EVENT Timeout ) { EFI_STATUS Status; NET_BUF *Pdu; TLS_RECORD_HEADER RecordHeader; UINT8 *BufferIn; UINTN BufferInSize; NET_FRAGMENT TempFragment; UINT8 *BufferOut; UINTN BufferOutSize; NET_BUF *PacketOut; UINT8 *DataOut; UINT8 *GetSessionDataBuffer; UINTN GetSessionDataBufferSize; Status = EFI_SUCCESS; Pdu = NULL; BufferIn = NULL; BufferInSize = 0; BufferOut = NULL; BufferOutSize = 0; PacketOut = NULL; DataOut = NULL; GetSessionDataBuffer = NULL; GetSessionDataBufferSize = 0; // // Receive only one TLS record // Status = TlsReceiveOnePdu (HttpInstance, &Pdu, Timeout); if (EFI_ERROR (Status)) { return Status; } BufferInSize = Pdu->TotalSize; BufferIn = AllocateZeroPool (BufferInSize); if (BufferIn == NULL) { Status = EFI_OUT_OF_RESOURCES; NetbufFree (Pdu); return Status; } NetbufCopy (Pdu, 0, (UINT32) BufferInSize, BufferIn); NetbufFree (Pdu); // // Handle Receive data. // RecordHeader = *(TLS_RECORD_HEADER *) BufferIn; if ((RecordHeader.ContentType == TlsContentTypeApplicationData) && (RecordHeader.Version.Major == 0x03) && (RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR || RecordHeader.Version.Minor == TLS11_PROTOCOL_VERSION_MINOR || RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR) ) { // // Decrypt Packet. // Status = TlsProcessMessage ( HttpInstance, BufferIn, BufferInSize, EfiTlsDecrypt, &TempFragment ); FreePool (BufferIn); if (EFI_ERROR (Status)) { if (Status == EFI_ABORTED) { // // Something wrong decryption the message. // BuildResponsePacket() will be called to generate Error Alert message and send it out. // BufferOutSize = DEF_BUF_LEN; BufferOut = AllocateZeroPool (BufferOutSize); if (BufferOut == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->BuildResponsePacket ( HttpInstance->Tls, NULL, 0, BufferOut, &BufferOutSize ); if (Status == EFI_BUFFER_TOO_SMALL) { FreePool (BufferOut); BufferOut = AllocateZeroPool (BufferOutSize); if (BufferOut == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->BuildResponsePacket ( HttpInstance->Tls, NULL, 0, BufferOut, &BufferOutSize ); } if (EFI_ERROR (Status)) { FreePool(BufferOut); return Status; } if (BufferOutSize != 0) { PacketOut = NetbufAlloc ((UINT32)BufferOutSize); DataOut = NetbufAllocSpace (PacketOut, (UINT32) BufferOutSize, NET_BUF_TAIL); if (DataOut == NULL) { FreePool (BufferOut); return EFI_OUT_OF_RESOURCES; } CopyMem (DataOut, BufferOut, BufferOutSize); Status = TlsCommonTransmit (HttpInstance, PacketOut); NetbufFree (PacketOut); } FreePool(BufferOut); if (EFI_ERROR (Status)) { return Status; } return EFI_ABORTED; } return Status; } // // Parsing buffer. // ASSERT (((TLS_RECORD_HEADER *) (TempFragment.Bulk))->ContentType == TlsContentTypeApplicationData); BufferInSize = ((TLS_RECORD_HEADER *) (TempFragment.Bulk))->Length; BufferIn = AllocateZeroPool (BufferInSize); if (BufferIn == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } CopyMem (BufferIn, TempFragment.Bulk + sizeof (TLS_RECORD_HEADER), BufferInSize); // // Free the buffer in TempFragment. // FreePool (TempFragment.Bulk); } else if ((RecordHeader.ContentType == TlsContentTypeAlert) && (RecordHeader.Version.Major == 0x03) && (RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR || RecordHeader.Version.Minor == TLS11_PROTOCOL_VERSION_MINOR || RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR) ) { BufferOutSize = DEF_BUF_LEN; BufferOut = AllocateZeroPool (BufferOutSize); if (BufferOut == NULL) { FreePool (BufferIn); Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->BuildResponsePacket ( HttpInstance->Tls, BufferIn, BufferInSize, BufferOut, &BufferOutSize ); if (Status == EFI_BUFFER_TOO_SMALL) { FreePool (BufferOut); BufferOut = AllocateZeroPool (BufferOutSize); if (BufferOut == NULL) { FreePool (BufferIn); Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->BuildResponsePacket ( HttpInstance->Tls, BufferIn, BufferInSize, BufferOut, &BufferOutSize ); } FreePool (BufferIn); if (EFI_ERROR (Status)) { FreePool (BufferOut); return Status; } if (BufferOutSize != 0) { PacketOut = NetbufAlloc ((UINT32) BufferOutSize); DataOut = NetbufAllocSpace (PacketOut, (UINT32) BufferOutSize, NET_BUF_TAIL); if (DataOut == NULL) { FreePool (BufferOut); return EFI_OUT_OF_RESOURCES; } CopyMem (DataOut, BufferOut, BufferOutSize); Status = TlsCommonTransmit (HttpInstance, PacketOut); NetbufFree (PacketOut); } FreePool (BufferOut); // // Get the session state. // GetSessionDataBufferSize = DEF_BUF_LEN; GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize); if (GetSessionDataBuffer == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->GetSessionData ( HttpInstance->Tls, EfiTlsSessionState, GetSessionDataBuffer, &GetSessionDataBufferSize ); if (Status == EFI_BUFFER_TOO_SMALL) { FreePool (GetSessionDataBuffer); GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize); if (GetSessionDataBuffer == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->GetSessionData ( HttpInstance->Tls, EfiTlsSessionState, GetSessionDataBuffer, &GetSessionDataBufferSize ); } if (EFI_ERROR (Status)) { FreePool (GetSessionDataBuffer); return Status; } ASSERT(GetSessionDataBufferSize == sizeof (EFI_TLS_SESSION_STATE)); HttpInstance->TlsSessionState = *(EFI_TLS_SESSION_STATE *) GetSessionDataBuffer; FreePool (GetSessionDataBuffer); if(HttpInstance->TlsSessionState == EfiTlsSessionError) { DEBUG ((EFI_D_ERROR, "TLS Session State Error!\n")); return EFI_ABORTED; } BufferIn = NULL; BufferInSize = 0; } Fragment->Bulk = BufferIn; Fragment->Len = (UINT32) BufferInSize; return Status; }
/** Close the TLS session and send out the close notification message. @param[in] HttpInstance The HTTP instance private data. @retval EFI_SUCCESS The TLS session is closed. @retval EFI_INVALID_PARAMETER HttpInstance is NULL. @retval EFI_OUT_OF_RESOURCES Can't allocate memory resources. @retval Others Other error as indicated. **/ EFI_STATUS EFIAPI TlsCloseSession ( IN HTTP_PROTOCOL *HttpInstance ) { EFI_STATUS Status; UINT8 *BufferOut; UINTN BufferOutSize; NET_BUF *PacketOut; UINT8 *DataOut; Status = EFI_SUCCESS; BufferOut = NULL; PacketOut = NULL; DataOut = NULL; if (HttpInstance == NULL) { return EFI_INVALID_PARAMETER; } HttpInstance->TlsSessionState = EfiTlsSessionClosing; Status = HttpInstance->Tls->SetSessionData ( HttpInstance->Tls, EfiTlsSessionState, &(HttpInstance->TlsSessionState), sizeof (EFI_TLS_SESSION_STATE) ); if (EFI_ERROR (Status)) { return Status; } BufferOutSize = DEF_BUF_LEN; BufferOut = AllocateZeroPool (BufferOutSize); if (BufferOut == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->BuildResponsePacket ( HttpInstance->Tls, NULL, 0, BufferOut, &BufferOutSize ); if (Status == EFI_BUFFER_TOO_SMALL) { FreePool (BufferOut); BufferOut = AllocateZeroPool (BufferOutSize); if (BufferOut == NULL) { Status = EFI_OUT_OF_RESOURCES; return Status; } Status = HttpInstance->Tls->BuildResponsePacket ( HttpInstance->Tls, NULL, 0, BufferOut, &BufferOutSize ); } if (EFI_ERROR (Status)) { FreePool (BufferOut); return Status; } PacketOut = NetbufAlloc ((UINT32) BufferOutSize); DataOut = NetbufAllocSpace (PacketOut, (UINT32) BufferOutSize, NET_BUF_TAIL); if (DataOut == NULL) { FreePool (BufferOut); return EFI_OUT_OF_RESOURCES; } CopyMem (DataOut, BufferOut, BufferOutSize); Status = TlsCommonTransmit (HttpInstance, PacketOut); FreePool (BufferOut); NetbufFree (PacketOut); return Status; }