**/\r
CHAR8 *\r
AsciiStrCaseStr (\r
- IN CONST CHAR8 *String,\r
- IN CONST CHAR8 *SearchString\r
+ IN CONST CHAR8 *String,\r
+ IN CONST CHAR8 *SearchString\r
)\r
{\r
- CONST CHAR8 *FirstMatch;\r
- CONST CHAR8 *SearchStringTmp;\r
+ CONST CHAR8 *FirstMatch;\r
+ CONST CHAR8 *SearchStringTmp;\r
\r
- CHAR8 Src;\r
- CHAR8 Dst;\r
+ CHAR8 Src;\r
+ CHAR8 Dst;\r
\r
//\r
// ASSERT both strings are less long than PcdMaximumAsciiStringLength\r
ASSERT (AsciiStrSize (SearchString) != 0);\r
\r
if (*SearchString == '\0') {\r
- return (CHAR8 *) String;\r
+ return (CHAR8 *)String;\r
}\r
\r
while (*String != '\0') {\r
SearchStringTmp = SearchString;\r
- FirstMatch = String;\r
+ FirstMatch = String;\r
\r
- while ((*SearchStringTmp != '\0')\r
- && (*String != '\0')) {\r
+ while ( (*SearchStringTmp != '\0')\r
+ && (*String != '\0'))\r
+ {\r
Src = *String;\r
Dst = *SearchStringTmp;\r
\r
}\r
\r
if (*SearchStringTmp == '\0') {\r
- return (CHAR8 *) FirstMatch;\r
+ return (CHAR8 *)FirstMatch;\r
}\r
\r
String = FirstMatch + 1;\r
VOID\r
EFIAPI\r
FreeNbufList (\r
- IN VOID *Arg\r
+ IN VOID *Arg\r
)\r
{\r
ASSERT (Arg != NULL);\r
\r
- NetbufFreeList ((LIST_ENTRY *) Arg);\r
+ NetbufFreeList ((LIST_ENTRY *)Arg);\r
FreePool (Arg);\r
}\r
\r
**/\r
BOOLEAN\r
IsHttpsUrl (\r
- IN CHAR8 *Url\r
+ IN CHAR8 *Url\r
)\r
{\r
CHAR8 *Tmp;\r
Tmp = NULL;\r
\r
Tmp = AsciiStrCaseStr (Url, HTTPS_FLAG);\r
- if (Tmp != NULL && Tmp == Url) {\r
+ if ((Tmp != NULL) && (Tmp == Url)) {\r
return TRUE;\r
}\r
\r
EFI_HANDLE\r
EFIAPI\r
TlsCreateChild (\r
- IN EFI_HANDLE ImageHandle,\r
- OUT EFI_SERVICE_BINDING_PROTOCOL **TlsSb,\r
- OUT EFI_TLS_PROTOCOL **TlsProto,\r
- OUT EFI_TLS_CONFIGURATION_PROTOCOL **TlsConfiguration\r
+ IN EFI_HANDLE ImageHandle,\r
+ OUT EFI_SERVICE_BINDING_PROTOCOL **TlsSb,\r
+ OUT EFI_TLS_PROTOCOL **TlsProto,\r
+ OUT EFI_TLS_CONFIGURATION_PROTOCOL **TlsConfiguration\r
)\r
{\r
- EFI_STATUS Status;\r
- EFI_HANDLE TlsChildHandle;\r
+ EFI_STATUS Status;\r
+ EFI_HANDLE TlsChildHandle;\r
\r
TlsChildHandle = 0;\r
\r
// Locate TlsServiceBinding protocol.\r
//\r
gBS->LocateProtocol (\r
- &gEfiTlsServiceBindingProtocolGuid,\r
- NULL,\r
- (VOID **) TlsSb\r
- );\r
+ &gEfiTlsServiceBindingProtocolGuid,\r
+ NULL,\r
+ (VOID **)TlsSb\r
+ );\r
if (*TlsSb == NULL) {\r
return NULL;\r
}\r
Status = gBS->OpenProtocol (\r
TlsChildHandle,\r
&gEfiTlsProtocolGuid,\r
- (VOID **) TlsProto,\r
+ (VOID **)TlsProto,\r
ImageHandle,\r
TlsChildHandle,\r
EFI_OPEN_PROTOCOL_GET_PROTOCOL\r
Status = gBS->OpenProtocol (\r
TlsChildHandle,\r
&gEfiTlsConfigurationProtocolGuid,\r
- (VOID **) TlsConfiguration,\r
+ (VOID **)TlsConfiguration,\r
ImageHandle,\r
TlsChildHandle,\r
EFI_OPEN_PROTOCOL_GET_PROTOCOL\r
EFI_STATUS\r
EFIAPI\r
TlsCreateTxRxEvent (\r
- IN OUT HTTP_PROTOCOL *HttpInstance\r
+ IN OUT HTTP_PROTOCOL *HttpInstance\r
)\r
{\r
- EFI_STATUS Status;\r
+ EFI_STATUS Status;\r
\r
if (!HttpInstance->LocalAddressIsIPv6) {\r
//\r
goto ERROR;\r
}\r
\r
- HttpInstance->Tcp4TlsTxData.Push = TRUE;\r
- HttpInstance->Tcp4TlsTxData.Urgent = FALSE;\r
- HttpInstance->Tcp4TlsTxData.DataLength = 0;\r
- HttpInstance->Tcp4TlsTxData.FragmentCount = 1;\r
+ HttpInstance->Tcp4TlsTxData.Push = TRUE;\r
+ HttpInstance->Tcp4TlsTxData.Urgent = FALSE;\r
+ HttpInstance->Tcp4TlsTxData.DataLength = 0;\r
+ HttpInstance->Tcp4TlsTxData.FragmentCount = 1;\r
HttpInstance->Tcp4TlsTxData.FragmentTable[0].FragmentLength = HttpInstance->Tcp4TlsTxData.DataLength;\r
HttpInstance->Tcp4TlsTxData.FragmentTable[0].FragmentBuffer = NULL;\r
- HttpInstance->Tcp4TlsTxToken.Packet.TxData = &HttpInstance->Tcp4TlsTxData;\r
- HttpInstance->Tcp4TlsTxToken.CompletionToken.Status = EFI_NOT_READY;\r
+ HttpInstance->Tcp4TlsTxToken.Packet.TxData = &HttpInstance->Tcp4TlsTxData;\r
+ HttpInstance->Tcp4TlsTxToken.CompletionToken.Status = EFI_NOT_READY;\r
\r
//\r
// For Tcp4TlsRxToken.\r
goto ERROR;\r
}\r
\r
- HttpInstance->Tcp4TlsRxData.DataLength = 0;\r
- HttpInstance->Tcp4TlsRxData.FragmentCount = 1;\r
- HttpInstance->Tcp4TlsRxData.FragmentTable[0].FragmentLength = HttpInstance->Tcp4TlsRxData.DataLength ;\r
- HttpInstance->Tcp4TlsRxData.FragmentTable[0].FragmentBuffer = NULL;\r
- HttpInstance->Tcp4TlsRxToken.Packet.RxData = &HttpInstance->Tcp4TlsRxData;\r
- HttpInstance->Tcp4TlsRxToken.CompletionToken.Status = EFI_NOT_READY;\r
+ HttpInstance->Tcp4TlsRxData.DataLength = 0;\r
+ HttpInstance->Tcp4TlsRxData.FragmentCount = 1;\r
+ HttpInstance->Tcp4TlsRxData.FragmentTable[0].FragmentLength = HttpInstance->Tcp4TlsRxData.DataLength;\r
+ HttpInstance->Tcp4TlsRxData.FragmentTable[0].FragmentBuffer = NULL;\r
+ HttpInstance->Tcp4TlsRxToken.Packet.RxData = &HttpInstance->Tcp4TlsRxData;\r
+ HttpInstance->Tcp4TlsRxToken.CompletionToken.Status = EFI_NOT_READY;\r
} else {\r
//\r
// For Tcp6TlsTxToken.\r
goto ERROR;\r
}\r
\r
- HttpInstance->Tcp6TlsTxData.Push = TRUE;\r
- HttpInstance->Tcp6TlsTxData.Urgent = FALSE;\r
- HttpInstance->Tcp6TlsTxData.DataLength = 0;\r
- HttpInstance->Tcp6TlsTxData.FragmentCount = 1;\r
+ HttpInstance->Tcp6TlsTxData.Push = TRUE;\r
+ HttpInstance->Tcp6TlsTxData.Urgent = FALSE;\r
+ HttpInstance->Tcp6TlsTxData.DataLength = 0;\r
+ HttpInstance->Tcp6TlsTxData.FragmentCount = 1;\r
HttpInstance->Tcp6TlsTxData.FragmentTable[0].FragmentLength = HttpInstance->Tcp6TlsTxData.DataLength;\r
HttpInstance->Tcp6TlsTxData.FragmentTable[0].FragmentBuffer = NULL;\r
- HttpInstance->Tcp6TlsTxToken.Packet.TxData = &HttpInstance->Tcp6TlsTxData;\r
- HttpInstance->Tcp6TlsTxToken.CompletionToken.Status = EFI_NOT_READY;\r
+ HttpInstance->Tcp6TlsTxToken.Packet.TxData = &HttpInstance->Tcp6TlsTxData;\r
+ HttpInstance->Tcp6TlsTxToken.CompletionToken.Status = EFI_NOT_READY;\r
\r
//\r
// For Tcp6TlsRxToken.\r
goto ERROR;\r
}\r
\r
- HttpInstance->Tcp6TlsRxData.DataLength = 0;\r
- HttpInstance->Tcp6TlsRxData.FragmentCount = 1;\r
- HttpInstance->Tcp6TlsRxData.FragmentTable[0].FragmentLength = HttpInstance->Tcp6TlsRxData.DataLength ;\r
- HttpInstance->Tcp6TlsRxData.FragmentTable[0].FragmentBuffer = NULL;\r
- HttpInstance->Tcp6TlsRxToken.Packet.RxData = &HttpInstance->Tcp6TlsRxData;\r
- HttpInstance->Tcp6TlsRxToken.CompletionToken.Status = EFI_NOT_READY;\r
+ HttpInstance->Tcp6TlsRxData.DataLength = 0;\r
+ HttpInstance->Tcp6TlsRxData.FragmentCount = 1;\r
+ HttpInstance->Tcp6TlsRxData.FragmentTable[0].FragmentLength = HttpInstance->Tcp6TlsRxData.DataLength;\r
+ HttpInstance->Tcp6TlsRxData.FragmentTable[0].FragmentBuffer = NULL;\r
+ HttpInstance->Tcp6TlsRxToken.Packet.RxData = &HttpInstance->Tcp6TlsRxData;\r
+ HttpInstance->Tcp6TlsRxToken.CompletionToken.Status = EFI_NOT_READY;\r
}\r
\r
return Status;\r
VOID\r
EFIAPI\r
TlsCloseTxRxEvent (\r
- IN HTTP_PROTOCOL *HttpInstance\r
+ IN HTTP_PROTOCOL *HttpInstance\r
)\r
{\r
ASSERT (HttpInstance != NULL);\r
if (!HttpInstance->LocalAddressIsIPv6) {\r
if (NULL != HttpInstance->Tcp4TlsTxToken.CompletionToken.Event) {\r
- gBS->CloseEvent(HttpInstance->Tcp4TlsTxToken.CompletionToken.Event);\r
+ gBS->CloseEvent (HttpInstance->Tcp4TlsTxToken.CompletionToken.Event);\r
HttpInstance->Tcp4TlsTxToken.CompletionToken.Event = NULL;\r
}\r
\r
}\r
} else {\r
if (NULL != HttpInstance->Tcp6TlsTxToken.CompletionToken.Event) {\r
- gBS->CloseEvent(HttpInstance->Tcp6TlsTxToken.CompletionToken.Event);\r
+ gBS->CloseEvent (HttpInstance->Tcp6TlsTxToken.CompletionToken.Event);\r
HttpInstance->Tcp6TlsTxToken.CompletionToken.Event = NULL;\r
}\r
\r
**/\r
EFI_STATUS\r
TlsConfigCertificate (\r
- IN OUT HTTP_PROTOCOL *HttpInstance\r
+ IN OUT HTTP_PROTOCOL *HttpInstance\r
)\r
{\r
EFI_STATUS Status;\r
//\r
// Try to read the TlsCaCertificate variable.\r
//\r
- Status = gRT->GetVariable (\r
- EFI_TLS_CA_CERTIFICATE_VARIABLE,\r
- &gEfiTlsCaCertificateGuid,\r
- NULL,\r
- &CACertSize,\r
- NULL\r
- );\r
+ Status = gRT->GetVariable (\r
+ EFI_TLS_CA_CERTIFICATE_VARIABLE,\r
+ &gEfiTlsCaCertificateGuid,\r
+ NULL,\r
+ &CACertSize,\r
+ NULL\r
+ );\r
\r
- if (EFI_ERROR (Status) && Status != EFI_BUFFER_TOO_SMALL) {\r
+ if (EFI_ERROR (Status) && (Status != EFI_BUFFER_TOO_SMALL)) {\r
return Status;\r
}\r
\r
//\r
// Sanity check\r
//\r
- Status = EFI_INVALID_PARAMETER;\r
- CertCount = 0;\r
- ItemDataSize = (UINT32) CACertSize;\r
+ Status = EFI_INVALID_PARAMETER;\r
+ CertCount = 0;\r
+ ItemDataSize = (UINT32)CACertSize;\r
while (ItemDataSize > 0) {\r
if (ItemDataSize < sizeof (EFI_SIGNATURE_LIST)) {\r
- DEBUG ((DEBUG_ERROR, "%a: truncated EFI_SIGNATURE_LIST header\n",\r
- __FUNCTION__));\r
+ DEBUG ((\r
+ DEBUG_ERROR,\r
+ "%a: truncated EFI_SIGNATURE_LIST header\n",\r
+ __FUNCTION__\r
+ ));\r
goto FreeCACert;\r
}\r
\r
- CertList = (EFI_SIGNATURE_LIST *) (CACert + (CACertSize - ItemDataSize));\r
+ CertList = (EFI_SIGNATURE_LIST *)(CACert + (CACertSize - ItemDataSize));\r
\r
if (CertList->SignatureListSize < sizeof (EFI_SIGNATURE_LIST)) {\r
- DEBUG ((DEBUG_ERROR,\r
+ DEBUG ((\r
+ DEBUG_ERROR,\r
"%a: SignatureListSize too small for EFI_SIGNATURE_LIST\n",\r
- __FUNCTION__));\r
+ __FUNCTION__\r
+ ));\r
goto FreeCACert;\r
}\r
\r
if (CertList->SignatureListSize > ItemDataSize) {\r
- DEBUG ((DEBUG_ERROR, "%a: truncated EFI_SIGNATURE_LIST body\n",\r
- __FUNCTION__));\r
+ DEBUG ((\r
+ DEBUG_ERROR,\r
+ "%a: truncated EFI_SIGNATURE_LIST body\n",\r
+ __FUNCTION__\r
+ ));\r
goto FreeCACert;\r
}\r
\r
if (!CompareGuid (&CertList->SignatureType, &gEfiCertX509Guid)) {\r
- DEBUG ((DEBUG_ERROR, "%a: only X509 certificates are supported\n",\r
- __FUNCTION__));\r
+ DEBUG ((\r
+ DEBUG_ERROR,\r
+ "%a: only X509 certificates are supported\n",\r
+ __FUNCTION__\r
+ ));\r
Status = EFI_UNSUPPORTED;\r
goto FreeCACert;\r
}\r
\r
if (CertList->SignatureHeaderSize != 0) {\r
- DEBUG ((DEBUG_ERROR, "%a: SignatureHeaderSize must be 0 for X509\n",\r
- __FUNCTION__));\r
+ DEBUG ((\r
+ DEBUG_ERROR,\r
+ "%a: SignatureHeaderSize must be 0 for X509\n",\r
+ __FUNCTION__\r
+ ));\r
goto FreeCACert;\r
}\r
\r
if (CertList->SignatureSize < sizeof (EFI_SIGNATURE_DATA)) {\r
- DEBUG ((DEBUG_ERROR,\r
- "%a: SignatureSize too small for EFI_SIGNATURE_DATA\n", __FUNCTION__));\r
+ DEBUG ((\r
+ DEBUG_ERROR,\r
+ "%a: SignatureSize too small for EFI_SIGNATURE_DATA\n",\r
+ __FUNCTION__\r
+ ));\r
goto FreeCACert;\r
}\r
\r
CertArraySizeInBytes = (CertList->SignatureListSize -\r
sizeof (EFI_SIGNATURE_LIST));\r
if (CertArraySizeInBytes % CertList->SignatureSize != 0) {\r
- DEBUG ((DEBUG_ERROR,\r
+ DEBUG ((\r
+ DEBUG_ERROR,\r
"%a: EFI_SIGNATURE_DATA array not a multiple of SignatureSize\n",\r
- __FUNCTION__));\r
+ __FUNCTION__\r
+ ));\r
goto FreeCACert;\r
}\r
\r
- CertCount += CertArraySizeInBytes / CertList->SignatureSize;\r
+ CertCount += CertArraySizeInBytes / CertList->SignatureSize;\r
ItemDataSize -= CertList->SignatureListSize;\r
}\r
+\r
if (CertCount == 0) {\r
DEBUG ((DEBUG_ERROR, "%a: no X509 certificates provided\n", __FUNCTION__));\r
goto FreeCACert;\r
//\r
// Enumerate all data and erasing the target item.\r
//\r
- ItemDataSize = (UINT32) CACertSize;\r
- CertList = (EFI_SIGNATURE_LIST *) CACert;\r
+ ItemDataSize = (UINT32)CACertSize;\r
+ CertList = (EFI_SIGNATURE_LIST *)CACert;\r
while ((ItemDataSize > 0) && (ItemDataSize >= CertList->SignatureListSize)) {\r
- Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize);\r
- CertCount = (CertList->SignatureListSize - sizeof (EFI_SIGNATURE_LIST) - CertList->SignatureHeaderSize) / CertList->SignatureSize;\r
+ Cert = (EFI_SIGNATURE_DATA *)((UINT8 *)CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize);\r
+ CertCount = (CertList->SignatureListSize - sizeof (EFI_SIGNATURE_LIST) - CertList->SignatureHeaderSize) / CertList->SignatureSize;\r
for (Index = 0; Index < CertCount; Index++) {\r
//\r
// EfiTlsConfigDataTypeCACertificate\r
goto FreeCACert;\r
}\r
\r
- Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) Cert + CertList->SignatureSize);\r
+ Cert = (EFI_SIGNATURE_DATA *)((UINT8 *)Cert + CertList->SignatureSize);\r
}\r
\r
ItemDataSize -= CertList->SignatureListSize;\r
- CertList = (EFI_SIGNATURE_LIST *) ((UINT8 *) CertList + CertList->SignatureListSize);\r
+ CertList = (EFI_SIGNATURE_LIST *)((UINT8 *)CertList + CertList->SignatureListSize);\r
}\r
\r
FreeCACert:\r
**/\r
EFI_STATUS\r
TlsConfigCipherList (\r
- IN OUT HTTP_PROTOCOL *HttpInstance\r
+ IN OUT HTTP_PROTOCOL *HttpInstance\r
)\r
{\r
- EFI_STATUS Status;\r
- UINT8 *CipherList;\r
- UINTN CipherListSize;\r
+ EFI_STATUS Status;\r
+ UINT8 *CipherList;\r
+ UINTN CipherListSize;\r
\r
CipherList = NULL;\r
CipherListSize = 0;\r
//\r
// Try to read the HttpTlsCipherList variable.\r
//\r
- Status = gRT->GetVariable (\r
- EDKII_HTTP_TLS_CIPHER_LIST_VARIABLE,\r
- &gEdkiiHttpTlsCipherListGuid,\r
- NULL,\r
- &CipherListSize,\r
- NULL\r
- );\r
+ Status = gRT->GetVariable (\r
+ EDKII_HTTP_TLS_CIPHER_LIST_VARIABLE,\r
+ &gEdkiiHttpTlsCipherListGuid,\r
+ NULL,\r
+ &CipherListSize,\r
+ NULL\r
+ );\r
ASSERT (EFI_ERROR (Status));\r
if (Status != EFI_BUFFER_TOO_SMALL) {\r
return Status;\r
EFI_STATUS\r
EFIAPI\r
TlsConfigureSession (\r
- IN OUT HTTP_PROTOCOL *HttpInstance\r
+ IN OUT HTTP_PROTOCOL *HttpInstance\r
)\r
{\r
- EFI_STATUS Status;\r
+ EFI_STATUS Status;\r
\r
//\r
// TlsConfigData initialization\r
// Tls Cipher List\r
//\r
Status = TlsConfigCipherList (HttpInstance);\r
- if (EFI_ERROR (Status) && Status != EFI_NOT_FOUND) {\r
+ if (EFI_ERROR (Status) && (Status != EFI_NOT_FOUND)) {\r
DEBUG ((DEBUG_ERROR, "TlsConfigCipherList: return %r error.\n", Status));\r
return Status;\r
}\r
EFI_STATUS\r
EFIAPI\r
TlsCommonTransmit (\r
- IN OUT HTTP_PROTOCOL *HttpInstance,\r
- IN NET_BUF *Packet\r
+ IN OUT HTTP_PROTOCOL *HttpInstance,\r
+ IN NET_BUF *Packet\r
)\r
{\r
- EFI_STATUS Status;\r
- VOID *Data;\r
- UINTN Size;\r
+ EFI_STATUS Status;\r
+ VOID *Data;\r
+ UINTN Size;\r
\r
if ((HttpInstance == NULL) || (Packet == NULL)) {\r
return EFI_INVALID_PARAMETER;\r
}\r
\r
if (!HttpInstance->LocalAddressIsIPv6) {\r
- ((EFI_TCP4_TRANSMIT_DATA *) Data)->Push = TRUE;\r
- ((EFI_TCP4_TRANSMIT_DATA *) Data)->Urgent = FALSE;\r
- ((EFI_TCP4_TRANSMIT_DATA *) Data)->DataLength = Packet->TotalSize;\r
+ ((EFI_TCP4_TRANSMIT_DATA *)Data)->Push = TRUE;\r
+ ((EFI_TCP4_TRANSMIT_DATA *)Data)->Urgent = FALSE;\r
+ ((EFI_TCP4_TRANSMIT_DATA *)Data)->DataLength = Packet->TotalSize;\r
\r
//\r
// Build the fragment table.\r
//\r
- ((EFI_TCP4_TRANSMIT_DATA *) Data)->FragmentCount = Packet->BlockOpNum;\r
+ ((EFI_TCP4_TRANSMIT_DATA *)Data)->FragmentCount = Packet->BlockOpNum;\r
\r
NetbufBuildExt (\r
Packet,\r
- (NET_FRAGMENT *) &((EFI_TCP4_TRANSMIT_DATA *) Data)->FragmentTable[0],\r
- &((EFI_TCP4_TRANSMIT_DATA *) Data)->FragmentCount\r
+ (NET_FRAGMENT *)&((EFI_TCP4_TRANSMIT_DATA *)Data)->FragmentTable[0],\r
+ &((EFI_TCP4_TRANSMIT_DATA *)Data)->FragmentCount\r
);\r
\r
- HttpInstance->Tcp4TlsTxToken.Packet.TxData = (EFI_TCP4_TRANSMIT_DATA *) Data;\r
+ HttpInstance->Tcp4TlsTxToken.Packet.TxData = (EFI_TCP4_TRANSMIT_DATA *)Data;\r
\r
Status = EFI_DEVICE_ERROR;\r
\r
//\r
// Transmit the packet.\r
//\r
- Status = HttpInstance->Tcp4->Transmit (HttpInstance->Tcp4, &HttpInstance->Tcp4TlsTxToken);\r
+ Status = HttpInstance->Tcp4->Transmit (HttpInstance->Tcp4, &HttpInstance->Tcp4TlsTxToken);\r
if (EFI_ERROR (Status)) {\r
goto ON_EXIT;\r
}\r
}\r
\r
HttpInstance->TlsIsTxDone = FALSE;\r
- Status = HttpInstance->Tcp4TlsTxToken.CompletionToken.Status;\r
+ Status = HttpInstance->Tcp4TlsTxToken.CompletionToken.Status;\r
} else {\r
- ((EFI_TCP6_TRANSMIT_DATA *) Data)->Push = TRUE;\r
- ((EFI_TCP6_TRANSMIT_DATA *) Data)->Urgent = FALSE;\r
- ((EFI_TCP6_TRANSMIT_DATA *) Data)->DataLength = Packet->TotalSize;\r
+ ((EFI_TCP6_TRANSMIT_DATA *)Data)->Push = TRUE;\r
+ ((EFI_TCP6_TRANSMIT_DATA *)Data)->Urgent = FALSE;\r
+ ((EFI_TCP6_TRANSMIT_DATA *)Data)->DataLength = Packet->TotalSize;\r
\r
//\r
// Build the fragment table.\r
//\r
- ((EFI_TCP6_TRANSMIT_DATA *) Data)->FragmentCount = Packet->BlockOpNum;\r
+ ((EFI_TCP6_TRANSMIT_DATA *)Data)->FragmentCount = Packet->BlockOpNum;\r
\r
NetbufBuildExt (\r
Packet,\r
- (NET_FRAGMENT *) &((EFI_TCP6_TRANSMIT_DATA *) Data)->FragmentTable[0],\r
- &((EFI_TCP6_TRANSMIT_DATA *) Data)->FragmentCount\r
+ (NET_FRAGMENT *)&((EFI_TCP6_TRANSMIT_DATA *)Data)->FragmentTable[0],\r
+ &((EFI_TCP6_TRANSMIT_DATA *)Data)->FragmentCount\r
);\r
\r
- HttpInstance->Tcp6TlsTxToken.Packet.TxData = (EFI_TCP6_TRANSMIT_DATA *) Data;\r
+ HttpInstance->Tcp6TlsTxToken.Packet.TxData = (EFI_TCP6_TRANSMIT_DATA *)Data;\r
\r
Status = EFI_DEVICE_ERROR;\r
\r
//\r
// Transmit the packet.\r
//\r
- Status = HttpInstance->Tcp6->Transmit (HttpInstance->Tcp6, &HttpInstance->Tcp6TlsTxToken);\r
+ Status = HttpInstance->Tcp6->Transmit (HttpInstance->Tcp6, &HttpInstance->Tcp6TlsTxToken);\r
if (EFI_ERROR (Status)) {\r
goto ON_EXIT;\r
}\r
}\r
\r
HttpInstance->TlsIsTxDone = FALSE;\r
- Status = HttpInstance->Tcp6TlsTxToken.CompletionToken.Status;\r
+ Status = HttpInstance->Tcp6TlsTxToken.CompletionToken.Status;\r
}\r
\r
ON_EXIT:\r
EFI_STATUS\r
EFIAPI\r
TlsCommonReceive (\r
- IN OUT HTTP_PROTOCOL *HttpInstance,\r
- IN NET_BUF *Packet,\r
- IN EFI_EVENT Timeout\r
+ IN OUT HTTP_PROTOCOL *HttpInstance,\r
+ IN NET_BUF *Packet,\r
+ IN EFI_EVENT Timeout\r
)\r
{\r
- EFI_TCP4_RECEIVE_DATA *Tcp4RxData;\r
- EFI_TCP6_RECEIVE_DATA *Tcp6RxData;\r
- EFI_STATUS Status;\r
- NET_FRAGMENT *Fragment;\r
- UINT32 FragmentCount;\r
- UINT32 CurrentFragment;\r
+ EFI_TCP4_RECEIVE_DATA *Tcp4RxData;\r
+ EFI_TCP6_RECEIVE_DATA *Tcp6RxData;\r
+ EFI_STATUS Status;\r
+ NET_FRAGMENT *Fragment;\r
+ UINT32 FragmentCount;\r
+ UINT32 CurrentFragment;\r
\r
Tcp4RxData = NULL;\r
Tcp6RxData = NULL;\r
if (Tcp4RxData == NULL) {\r
return EFI_INVALID_PARAMETER;\r
}\r
- Tcp4RxData->FragmentCount = 1;\r
+\r
+ Tcp4RxData->FragmentCount = 1;\r
} else {\r
Tcp6RxData = HttpInstance->Tcp6TlsRxToken.Packet.RxData;\r
if (Tcp6RxData == NULL) {\r
return EFI_INVALID_PARAMETER;\r
}\r
- Tcp6RxData->FragmentCount = 1;\r
+\r
+ Tcp6RxData->FragmentCount = 1;\r
}\r
\r
- CurrentFragment = 0;\r
- Status = EFI_SUCCESS;\r
+ CurrentFragment = 0;\r
+ Status = EFI_SUCCESS;\r
\r
while (CurrentFragment < FragmentCount) {\r
if (!HttpInstance->LocalAddressIsIPv6) {\r
- Tcp4RxData->DataLength = Fragment[CurrentFragment].Len;\r
- Tcp4RxData->FragmentTable[0].FragmentLength = Fragment[CurrentFragment].Len;\r
- Tcp4RxData->FragmentTable[0].FragmentBuffer = Fragment[CurrentFragment].Bulk;\r
- Status = HttpInstance->Tcp4->Receive (HttpInstance->Tcp4, &HttpInstance->Tcp4TlsRxToken);\r
+ Tcp4RxData->DataLength = Fragment[CurrentFragment].Len;\r
+ Tcp4RxData->FragmentTable[0].FragmentLength = Fragment[CurrentFragment].Len;\r
+ Tcp4RxData->FragmentTable[0].FragmentBuffer = Fragment[CurrentFragment].Bulk;\r
+ Status = HttpInstance->Tcp4->Receive (HttpInstance->Tcp4, &HttpInstance->Tcp4TlsRxToken);\r
} else {\r
- Tcp6RxData->DataLength = Fragment[CurrentFragment].Len;\r
- Tcp6RxData->FragmentTable[0].FragmentLength = Fragment[CurrentFragment].Len;\r
- Tcp6RxData->FragmentTable[0].FragmentBuffer = Fragment[CurrentFragment].Bulk;\r
- Status = HttpInstance->Tcp6->Receive (HttpInstance->Tcp6, &HttpInstance->Tcp6TlsRxToken);\r
+ Tcp6RxData->DataLength = Fragment[CurrentFragment].Len;\r
+ Tcp6RxData->FragmentTable[0].FragmentLength = Fragment[CurrentFragment].Len;\r
+ Tcp6RxData->FragmentTable[0].FragmentBuffer = Fragment[CurrentFragment].Bulk;\r
+ Status = HttpInstance->Tcp6->Receive (HttpInstance->Tcp6, &HttpInstance->Tcp6TlsRxToken);\r
}\r
+\r
if (EFI_ERROR (Status)) {\r
goto ON_EXIT;\r
}\r
EFI_STATUS\r
EFIAPI\r
TlsReceiveOnePdu (\r
- IN OUT HTTP_PROTOCOL *HttpInstance,\r
- OUT NET_BUF **Pdu,\r
- IN EFI_EVENT Timeout\r
+ IN OUT HTTP_PROTOCOL *HttpInstance,\r
+ OUT NET_BUF **Pdu,\r
+ IN EFI_EVENT Timeout\r
)\r
{\r
- EFI_STATUS Status;\r
+ EFI_STATUS Status;\r
\r
- LIST_ENTRY *NbufList;\r
+ LIST_ENTRY *NbufList;\r
\r
- UINT32 Len;\r
+ UINT32 Len;\r
\r
- NET_BUF *PduHdr;\r
- UINT8 *Header;\r
- TLS_RECORD_HEADER RecordHeader;\r
+ NET_BUF *PduHdr;\r
+ UINT8 *Header;\r
+ TLS_RECORD_HEADER RecordHeader;\r
\r
- NET_BUF *DataSeg;\r
+ NET_BUF *DataSeg;\r
\r
NbufList = NULL;\r
PduHdr = NULL;\r
//\r
// Allocate buffer to receive one TLS header.\r
//\r
- Len = TLS_RECORD_HEADER_LENGTH;\r
- PduHdr = NetbufAlloc (Len);\r
+ Len = TLS_RECORD_HEADER_LENGTH;\r
+ PduHdr = NetbufAlloc (Len);\r
if (PduHdr == NULL) {\r
Status = EFI_OUT_OF_RESOURCES;\r
goto ON_EXIT;\r
goto ON_EXIT;\r
}\r
\r
- RecordHeader = *(TLS_RECORD_HEADER *) Header;\r
- if ((RecordHeader.ContentType == TlsContentTypeHandshake ||\r
- RecordHeader.ContentType == TlsContentTypeAlert ||\r
- RecordHeader.ContentType == TlsContentTypeChangeCipherSpec ||\r
- RecordHeader.ContentType == TlsContentTypeApplicationData) &&\r
- (RecordHeader.Version.Major == 0x03) && /// Major versions are same.\r
- (RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR ||\r
- RecordHeader.Version.Minor ==TLS11_PROTOCOL_VERSION_MINOR ||\r
- RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR)\r
- ) {\r
+ RecordHeader = *(TLS_RECORD_HEADER *)Header;\r
+ if (((RecordHeader.ContentType == TlsContentTypeHandshake) ||\r
+ (RecordHeader.ContentType == TlsContentTypeAlert) ||\r
+ (RecordHeader.ContentType == TlsContentTypeChangeCipherSpec) ||\r
+ (RecordHeader.ContentType == TlsContentTypeApplicationData)) &&\r
+ (RecordHeader.Version.Major == 0x03) && /// Major versions are same.\r
+ ((RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR) ||\r
+ (RecordHeader.Version.Minor == TLS11_PROTOCOL_VERSION_MINOR) ||\r
+ (RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR))\r
+ )\r
+ {\r
InsertTailList (NbufList, &PduHdr->List);\r
} else {\r
Status = EFI_PROTOCOL_ERROR;\r
goto ON_EXIT;\r
}\r
\r
- Len = SwapBytes16(RecordHeader.Length);\r
+ Len = SwapBytes16 (RecordHeader.Length);\r
if (Len == 0) {\r
//\r
// No TLS payload.\r
EFI_STATUS\r
EFIAPI\r
TlsConnectSession (\r
- IN HTTP_PROTOCOL *HttpInstance,\r
- IN EFI_EVENT Timeout\r
+ IN HTTP_PROTOCOL *HttpInstance,\r
+ IN EFI_EVENT Timeout\r
)\r
{\r
- EFI_STATUS Status;\r
- UINT8 *BufferOut;\r
- UINTN BufferOutSize;\r
- NET_BUF *PacketOut;\r
- UINT8 *DataOut;\r
- NET_BUF *Pdu;\r
- UINT8 *BufferIn;\r
- UINTN BufferInSize;\r
- UINT8 *GetSessionDataBuffer;\r
- UINTN GetSessionDataBufferSize;\r
-\r
- BufferOut = NULL;\r
- PacketOut = NULL;\r
- DataOut = NULL;\r
- Pdu = NULL;\r
- BufferIn = NULL;\r
+ EFI_STATUS Status;\r
+ UINT8 *BufferOut;\r
+ UINTN BufferOutSize;\r
+ NET_BUF *PacketOut;\r
+ UINT8 *DataOut;\r
+ NET_BUF *Pdu;\r
+ UINT8 *BufferIn;\r
+ UINTN BufferInSize;\r
+ UINT8 *GetSessionDataBuffer;\r
+ UINTN GetSessionDataBufferSize;\r
+\r
+ BufferOut = NULL;\r
+ PacketOut = NULL;\r
+ DataOut = NULL;\r
+ Pdu = NULL;\r
+ BufferIn = NULL;\r
\r
//\r
// Initialize TLS state.\r
//\r
HttpInstance->TlsSessionState = EfiTlsSessionNotStarted;\r
- Status = HttpInstance->Tls->SetSessionData (\r
- HttpInstance->Tls,\r
- EfiTlsSessionState,\r
- &(HttpInstance->TlsSessionState),\r
- sizeof (EFI_TLS_SESSION_STATE)\r
- );\r
+ Status = HttpInstance->Tls->SetSessionData (\r
+ HttpInstance->Tls,\r
+ EfiTlsSessionState,\r
+ &(HttpInstance->TlsSessionState),\r
+ sizeof (EFI_TLS_SESSION_STATE)\r
+ );\r
if (EFI_ERROR (Status)) {\r
return Status;\r
}\r
// Create ClientHello\r
//\r
BufferOutSize = DEF_BUF_LEN;\r
- BufferOut = AllocateZeroPool (BufferOutSize);\r
+ BufferOut = AllocateZeroPool (BufferOutSize);\r
if (BufferOut == NULL) {\r
Status = EFI_OUT_OF_RESOURCES;\r
return Status;\r
&BufferOutSize\r
);\r
}\r
+\r
if (EFI_ERROR (Status)) {\r
FreePool (BufferOut);\r
return Status;\r
//\r
// Transmit ClientHello\r
//\r
- PacketOut = NetbufAlloc ((UINT32) BufferOutSize);\r
- DataOut = NetbufAllocSpace (PacketOut, (UINT32) BufferOutSize, NET_BUF_TAIL);\r
+ PacketOut = NetbufAlloc ((UINT32)BufferOutSize);\r
+ DataOut = NetbufAllocSpace (PacketOut, (UINT32)BufferOutSize, NET_BUF_TAIL);\r
if (DataOut == NULL) {\r
FreePool (BufferOut);\r
return EFI_OUT_OF_RESOURCES;\r
return Status;\r
}\r
\r
- while(HttpInstance->TlsSessionState != EfiTlsSessionDataTransferring && \\r
- ((Timeout == NULL) || EFI_ERROR (gBS->CheckEvent (Timeout)))) {\r
+ while (HttpInstance->TlsSessionState != EfiTlsSessionDataTransferring && \\r
+ ((Timeout == NULL) || EFI_ERROR (gBS->CheckEvent (Timeout))))\r
+ {\r
//\r
// Receive one TLS record.\r
//\r
}\r
\r
BufferInSize = Pdu->TotalSize;\r
- BufferIn = AllocateZeroPool (BufferInSize);\r
+ BufferIn = AllocateZeroPool (BufferInSize);\r
if (BufferIn == NULL) {\r
NetbufFree (Pdu);\r
Status = EFI_OUT_OF_RESOURCES;\r
// Handle Receive data.\r
//\r
BufferOutSize = DEF_BUF_LEN;\r
- BufferOut = AllocateZeroPool (BufferOutSize);\r
+ BufferOut = AllocateZeroPool (BufferOutSize);\r
if (BufferOut == NULL) {\r
Status = EFI_OUT_OF_RESOURCES;\r
return Status;\r
&BufferOutSize\r
);\r
if (Status == EFI_BUFFER_TOO_SMALL) {\r
- FreePool (BufferOut);\r
- BufferOut = AllocateZeroPool (BufferOutSize);\r
- if (BufferOut == NULL) {\r
- FreePool (BufferIn);\r
- Status = EFI_OUT_OF_RESOURCES;\r
- return Status;\r
- }\r
-\r
- Status = HttpInstance->Tls->BuildResponsePacket (\r
- HttpInstance->Tls,\r
- BufferIn,\r
- BufferInSize,\r
- BufferOut,\r
- &BufferOutSize\r
- );\r
+ FreePool (BufferOut);\r
+ BufferOut = AllocateZeroPool (BufferOutSize);\r
+ if (BufferOut == NULL) {\r
+ FreePool (BufferIn);\r
+ Status = EFI_OUT_OF_RESOURCES;\r
+ return Status;\r
+ }\r
+\r
+ Status = HttpInstance->Tls->BuildResponsePacket (\r
+ HttpInstance->Tls,\r
+ BufferIn,\r
+ BufferInSize,\r
+ BufferOut,\r
+ &BufferOutSize\r
+ );\r
}\r
\r
FreePool (BufferIn);\r
//\r
// Transmit the response packet.\r
//\r
- PacketOut = NetbufAlloc ((UINT32) BufferOutSize);\r
- DataOut = NetbufAllocSpace (PacketOut, (UINT32) BufferOutSize, NET_BUF_TAIL);\r
+ PacketOut = NetbufAlloc ((UINT32)BufferOutSize);\r
+ DataOut = NetbufAllocSpace (PacketOut, (UINT32)BufferOutSize, NET_BUF_TAIL);\r
if (DataOut == NULL) {\r
FreePool (BufferOut);\r
return EFI_OUT_OF_RESOURCES;\r
// Get the session state, then decide whether need to continue handle received packet.\r
//\r
GetSessionDataBufferSize = DEF_BUF_LEN;\r
- GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);\r
+ GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);\r
if (GetSessionDataBuffer == NULL) {\r
Status = EFI_OUT_OF_RESOURCES;\r
return Status;\r
&GetSessionDataBufferSize\r
);\r
if (Status == EFI_BUFFER_TOO_SMALL) {\r
- FreePool (GetSessionDataBuffer);\r
- GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);\r
- if (GetSessionDataBuffer == NULL) {\r
- Status = EFI_OUT_OF_RESOURCES;\r
- return Status;\r
- }\r
-\r
- Status = HttpInstance->Tls->GetSessionData (\r
- HttpInstance->Tls,\r
- EfiTlsSessionState,\r
- GetSessionDataBuffer,\r
- &GetSessionDataBufferSize\r
- );\r
+ FreePool (GetSessionDataBuffer);\r
+ GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);\r
+ if (GetSessionDataBuffer == NULL) {\r
+ Status = EFI_OUT_OF_RESOURCES;\r
+ return Status;\r
+ }\r
+\r
+ Status = HttpInstance->Tls->GetSessionData (\r
+ HttpInstance->Tls,\r
+ EfiTlsSessionState,\r
+ GetSessionDataBuffer,\r
+ &GetSessionDataBufferSize\r
+ );\r
}\r
+\r
if (EFI_ERROR (Status)) {\r
- FreePool(GetSessionDataBuffer);\r
+ FreePool (GetSessionDataBuffer);\r
return Status;\r
}\r
\r
- ASSERT(GetSessionDataBufferSize == sizeof (EFI_TLS_SESSION_STATE));\r
- HttpInstance->TlsSessionState = *(EFI_TLS_SESSION_STATE *) GetSessionDataBuffer;\r
+ ASSERT (GetSessionDataBufferSize == sizeof (EFI_TLS_SESSION_STATE));\r
+ HttpInstance->TlsSessionState = *(EFI_TLS_SESSION_STATE *)GetSessionDataBuffer;\r
\r
FreePool (GetSessionDataBuffer);\r
\r
- if(HttpInstance->TlsSessionState == EfiTlsSessionError) {\r
+ if (HttpInstance->TlsSessionState == EfiTlsSessionError) {\r
return EFI_ABORTED;\r
}\r
}\r
EFI_STATUS\r
EFIAPI\r
TlsCloseSession (\r
- IN HTTP_PROTOCOL *HttpInstance\r
+ IN HTTP_PROTOCOL *HttpInstance\r
)\r
{\r
- EFI_STATUS Status;\r
+ EFI_STATUS Status;\r
\r
- UINT8 *BufferOut;\r
- UINTN BufferOutSize;\r
+ UINT8 *BufferOut;\r
+ UINTN BufferOutSize;\r
\r
- NET_BUF *PacketOut;\r
- UINT8 *DataOut;\r
+ NET_BUF *PacketOut;\r
+ UINT8 *DataOut;\r
\r
Status = EFI_SUCCESS;\r
BufferOut = NULL;\r
}\r
\r
BufferOutSize = DEF_BUF_LEN;\r
- BufferOut = AllocateZeroPool (BufferOutSize);\r
+ BufferOut = AllocateZeroPool (BufferOutSize);\r
if (BufferOut == NULL) {\r
Status = EFI_OUT_OF_RESOURCES;\r
return Status;\r
return Status;\r
}\r
\r
- PacketOut = NetbufAlloc ((UINT32) BufferOutSize);\r
- DataOut = NetbufAllocSpace (PacketOut, (UINT32) BufferOutSize, NET_BUF_TAIL);\r
+ PacketOut = NetbufAlloc ((UINT32)BufferOutSize);\r
+ DataOut = NetbufAllocSpace (PacketOut, (UINT32)BufferOutSize, NET_BUF_TAIL);\r
if (DataOut == NULL) {\r
FreePool (BufferOut);\r
return EFI_OUT_OF_RESOURCES;\r
EFI_STATUS\r
EFIAPI\r
TlsProcessMessage (\r
- IN HTTP_PROTOCOL *HttpInstance,\r
- IN UINT8 *Message,\r
- IN UINTN MessageSize,\r
- IN EFI_TLS_CRYPT_MODE ProcessMode,\r
- IN OUT NET_FRAGMENT *Fragment\r
+ IN HTTP_PROTOCOL *HttpInstance,\r
+ IN UINT8 *Message,\r
+ IN UINTN MessageSize,\r
+ IN EFI_TLS_CRYPT_MODE ProcessMode,\r
+ IN OUT NET_FRAGMENT *Fragment\r
)\r
{\r
- EFI_STATUS Status;\r
- UINT8 *Buffer;\r
- UINT32 BufferSize;\r
- UINT32 BytesCopied;\r
- EFI_TLS_FRAGMENT_DATA *FragmentTable;\r
- UINT32 FragmentCount;\r
- EFI_TLS_FRAGMENT_DATA *OriginalFragmentTable;\r
- UINTN Index;\r
-\r
- Status = EFI_SUCCESS;\r
- Buffer = NULL;\r
- BufferSize = 0;\r
- BytesCopied = 0;\r
- FragmentTable = NULL;\r
- OriginalFragmentTable = NULL;\r
+ EFI_STATUS Status;\r
+ UINT8 *Buffer;\r
+ UINT32 BufferSize;\r
+ UINT32 BytesCopied;\r
+ EFI_TLS_FRAGMENT_DATA *FragmentTable;\r
+ UINT32 FragmentCount;\r
+ EFI_TLS_FRAGMENT_DATA *OriginalFragmentTable;\r
+ UINTN Index;\r
+\r
+ Status = EFI_SUCCESS;\r
+ Buffer = NULL;\r
+ BufferSize = 0;\r
+ BytesCopied = 0;\r
+ FragmentTable = NULL;\r
+ OriginalFragmentTable = NULL;\r
\r
//\r
// Rebuild fragment table from BufferIn.\r
goto ON_EXIT;\r
}\r
\r
- FragmentTable->FragmentLength = (UINT32) MessageSize;\r
+ FragmentTable->FragmentLength = (UINT32)MessageSize;\r
FragmentTable->FragmentBuffer = Message;\r
\r
//\r
ON_EXIT:\r
\r
if (OriginalFragmentTable != NULL) {\r
- if( FragmentTable == OriginalFragmentTable) {\r
+ if ( FragmentTable == OriginalFragmentTable) {\r
FragmentTable = NULL;\r
}\r
+\r
FreePool (OriginalFragmentTable);\r
OriginalFragmentTable = NULL;\r
}\r
EFI_STATUS\r
EFIAPI\r
HttpsReceive (\r
- IN HTTP_PROTOCOL *HttpInstance,\r
- IN OUT NET_FRAGMENT *Fragment,\r
- IN EFI_EVENT Timeout\r
+ IN HTTP_PROTOCOL *HttpInstance,\r
+ IN OUT NET_FRAGMENT *Fragment,\r
+ IN EFI_EVENT Timeout\r
)\r
{\r
- EFI_STATUS Status;\r
- NET_BUF *Pdu;\r
- TLS_RECORD_HEADER RecordHeader;\r
- UINT8 *BufferIn;\r
- UINTN BufferInSize;\r
- NET_FRAGMENT TempFragment;\r
- UINT8 *BufferOut;\r
- UINTN BufferOutSize;\r
- NET_BUF *PacketOut;\r
- UINT8 *DataOut;\r
- UINT8 *GetSessionDataBuffer;\r
- UINTN GetSessionDataBufferSize;\r
+ EFI_STATUS Status;\r
+ NET_BUF *Pdu;\r
+ TLS_RECORD_HEADER RecordHeader;\r
+ UINT8 *BufferIn;\r
+ UINTN BufferInSize;\r
+ NET_FRAGMENT TempFragment;\r
+ UINT8 *BufferOut;\r
+ UINTN BufferOutSize;\r
+ NET_BUF *PacketOut;\r
+ UINT8 *DataOut;\r
+ UINT8 *GetSessionDataBuffer;\r
+ UINTN GetSessionDataBufferSize;\r
\r
Status = EFI_SUCCESS;\r
Pdu = NULL;\r
}\r
\r
BufferInSize = Pdu->TotalSize;\r
- BufferIn = AllocateZeroPool (BufferInSize);\r
+ BufferIn = AllocateZeroPool (BufferInSize);\r
if (BufferIn == NULL) {\r
Status = EFI_OUT_OF_RESOURCES;\r
NetbufFree (Pdu);\r
return Status;\r
}\r
\r
- NetbufCopy (Pdu, 0, (UINT32) BufferInSize, BufferIn);\r
+ NetbufCopy (Pdu, 0, (UINT32)BufferInSize, BufferIn);\r
\r
NetbufFree (Pdu);\r
\r
//\r
// Handle Receive data.\r
//\r
- RecordHeader = *(TLS_RECORD_HEADER *) BufferIn;\r
+ RecordHeader = *(TLS_RECORD_HEADER *)BufferIn;\r
\r
if ((RecordHeader.ContentType == TlsContentTypeApplicationData) &&\r
- (RecordHeader.Version.Major == 0x03) &&\r
- (RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR ||\r
- RecordHeader.Version.Minor == TLS11_PROTOCOL_VERSION_MINOR ||\r
- RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR)\r
- ) {\r
+ (RecordHeader.Version.Major == 0x03) &&\r
+ ((RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR) ||\r
+ (RecordHeader.Version.Minor == TLS11_PROTOCOL_VERSION_MINOR) ||\r
+ (RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR))\r
+ )\r
+ {\r
//\r
// Decrypt Packet.\r
//\r
// BuildResponsePacket() will be called to generate Error Alert message and send it out.\r
//\r
BufferOutSize = DEF_BUF_LEN;\r
- BufferOut = AllocateZeroPool (BufferOutSize);\r
+ BufferOut = AllocateZeroPool (BufferOutSize);\r
if (BufferOut == NULL) {\r
Status = EFI_OUT_OF_RESOURCES;\r
return Status;\r
&BufferOutSize\r
);\r
}\r
+\r
if (EFI_ERROR (Status)) {\r
- FreePool(BufferOut);\r
+ FreePool (BufferOut);\r
return Status;\r
}\r
\r
if (BufferOutSize != 0) {\r
PacketOut = NetbufAlloc ((UINT32)BufferOutSize);\r
- DataOut = NetbufAllocSpace (PacketOut, (UINT32) BufferOutSize, NET_BUF_TAIL);\r
+ DataOut = NetbufAllocSpace (PacketOut, (UINT32)BufferOutSize, NET_BUF_TAIL);\r
if (DataOut == NULL) {\r
FreePool (BufferOut);\r
return EFI_OUT_OF_RESOURCES;\r
NetbufFree (PacketOut);\r
}\r
\r
- FreePool(BufferOut);\r
+ FreePool (BufferOut);\r
\r
if (EFI_ERROR (Status)) {\r
return Status;\r
//\r
// Parsing buffer.\r
//\r
- ASSERT (((TLS_RECORD_HEADER *) (TempFragment.Bulk))->ContentType == TlsContentTypeApplicationData);\r
+ ASSERT (((TLS_RECORD_HEADER *)(TempFragment.Bulk))->ContentType == TlsContentTypeApplicationData);\r
\r
- BufferInSize = ((TLS_RECORD_HEADER *) (TempFragment.Bulk))->Length;\r
- BufferIn = AllocateZeroPool (BufferInSize);\r
+ BufferInSize = ((TLS_RECORD_HEADER *)(TempFragment.Bulk))->Length;\r
+ BufferIn = AllocateZeroPool (BufferInSize);\r
if (BufferIn == NULL) {\r
Status = EFI_OUT_OF_RESOURCES;\r
return Status;\r
// Free the buffer in TempFragment.\r
//\r
FreePool (TempFragment.Bulk);\r
-\r
} else if ((RecordHeader.ContentType == TlsContentTypeAlert) &&\r
- (RecordHeader.Version.Major == 0x03) &&\r
- (RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR ||\r
- RecordHeader.Version.Minor == TLS11_PROTOCOL_VERSION_MINOR ||\r
- RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR)\r
- ) {\r
+ (RecordHeader.Version.Major == 0x03) &&\r
+ ((RecordHeader.Version.Minor == TLS10_PROTOCOL_VERSION_MINOR) ||\r
+ (RecordHeader.Version.Minor == TLS11_PROTOCOL_VERSION_MINOR) ||\r
+ (RecordHeader.Version.Minor == TLS12_PROTOCOL_VERSION_MINOR))\r
+ )\r
+ {\r
BufferOutSize = DEF_BUF_LEN;\r
- BufferOut = AllocateZeroPool (BufferOutSize);\r
+ BufferOut = AllocateZeroPool (BufferOutSize);\r
if (BufferOut == NULL) {\r
FreePool (BufferIn);\r
Status = EFI_OUT_OF_RESOURCES;\r
}\r
\r
if (BufferOutSize != 0) {\r
- PacketOut = NetbufAlloc ((UINT32) BufferOutSize);\r
- DataOut = NetbufAllocSpace (PacketOut, (UINT32) BufferOutSize, NET_BUF_TAIL);\r
+ PacketOut = NetbufAlloc ((UINT32)BufferOutSize);\r
+ DataOut = NetbufAllocSpace (PacketOut, (UINT32)BufferOutSize, NET_BUF_TAIL);\r
if (DataOut == NULL) {\r
FreePool (BufferOut);\r
return EFI_OUT_OF_RESOURCES;\r
// Get the session state.\r
//\r
GetSessionDataBufferSize = DEF_BUF_LEN;\r
- GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);\r
+ GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);\r
if (GetSessionDataBuffer == NULL) {\r
Status = EFI_OUT_OF_RESOURCES;\r
return Status;\r
&GetSessionDataBufferSize\r
);\r
if (Status == EFI_BUFFER_TOO_SMALL) {\r
- FreePool (GetSessionDataBuffer);\r
- GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);\r
- if (GetSessionDataBuffer == NULL) {\r
- Status = EFI_OUT_OF_RESOURCES;\r
- return Status;\r
- }\r
-\r
- Status = HttpInstance->Tls->GetSessionData (\r
- HttpInstance->Tls,\r
- EfiTlsSessionState,\r
- GetSessionDataBuffer,\r
- &GetSessionDataBufferSize\r
- );\r
+ FreePool (GetSessionDataBuffer);\r
+ GetSessionDataBuffer = AllocateZeroPool (GetSessionDataBufferSize);\r
+ if (GetSessionDataBuffer == NULL) {\r
+ Status = EFI_OUT_OF_RESOURCES;\r
+ return Status;\r
+ }\r
+\r
+ Status = HttpInstance->Tls->GetSessionData (\r
+ HttpInstance->Tls,\r
+ EfiTlsSessionState,\r
+ GetSessionDataBuffer,\r
+ &GetSessionDataBufferSize\r
+ );\r
}\r
+\r
if (EFI_ERROR (Status)) {\r
FreePool (GetSessionDataBuffer);\r
return Status;\r
}\r
\r
- ASSERT(GetSessionDataBufferSize == sizeof (EFI_TLS_SESSION_STATE));\r
- HttpInstance->TlsSessionState = *(EFI_TLS_SESSION_STATE *) GetSessionDataBuffer;\r
+ ASSERT (GetSessionDataBufferSize == sizeof (EFI_TLS_SESSION_STATE));\r
+ HttpInstance->TlsSessionState = *(EFI_TLS_SESSION_STATE *)GetSessionDataBuffer;\r
\r
FreePool (GetSessionDataBuffer);\r
\r
- if(HttpInstance->TlsSessionState == EfiTlsSessionError) {\r
+ if (HttpInstance->TlsSessionState == EfiTlsSessionError) {\r
DEBUG ((DEBUG_ERROR, "TLS Session State Error!\n"));\r
return EFI_ABORTED;\r
}\r
\r
- BufferIn = NULL;\r
+ BufferIn = NULL;\r
BufferInSize = 0;\r
}\r
\r
Fragment->Bulk = BufferIn;\r
- Fragment->Len = (UINT32) BufferInSize;\r
+ Fragment->Len = (UINT32)BufferInSize;\r
\r
return Status;\r
}\r