]> git.proxmox.com Git - mirror_edk2.git/blob - SecurityPkg/UserIdentification/UserIdentifyManagerDxe/UserIdentifyManager.c
Add new interface GetVariable2 and GetEfiGlobalVariable2 to return more info. Also...
[mirror_edk2.git] / SecurityPkg / UserIdentification / UserIdentifyManagerDxe / UserIdentifyManager.c
1 /** @file
2 This driver manages user information and produces user manager protocol.
3
4 Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
5 This program and the accompanying materials
6 are licensed and made available under the terms and conditions of the BSD License
7 which accompanies this distribution. The full text of the license may be found at
8 http://opensource.org/licenses/bsd-license.php
9
10 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
11 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
12
13 **/
14
15 #include "UserIdentifyManager.h"
16
17 //
18 // Default user name.
19 //
20 CHAR16 mUserName[] = L"Administrator";
21
22 //
23 // Points to the user profile database.
24 //
25 USER_PROFILE_DB *mUserProfileDb = NULL;
26
27 //
28 // Points to the credential providers found in system.
29 //
30 CREDENTIAL_PROVIDER_INFO *mProviderDb = NULL;
31
32 //
33 // Current user shared in multi function.
34 //
35 EFI_USER_PROFILE_HANDLE mCurrentUser = NULL;
36
37 //
38 // Flag indicates a user is identified.
39 //
40 BOOLEAN mIdentified = FALSE;
41 USER_MANAGER_CALLBACK_INFO *mCallbackInfo = NULL;
42 HII_VENDOR_DEVICE_PATH mHiiVendorDevicePath = {
43 {
44 {
45 HARDWARE_DEVICE_PATH,
46 HW_VENDOR_DP,
47 {
48 (UINT8) (sizeof (VENDOR_DEVICE_PATH)),
49 (UINT8) ((sizeof (VENDOR_DEVICE_PATH)) >> 8)
50 }
51 },
52 USER_IDENTIFY_MANAGER_GUID
53 },
54 {
55 END_DEVICE_PATH_TYPE,
56 END_ENTIRE_DEVICE_PATH_SUBTYPE,
57 {
58 (UINT8) (END_DEVICE_PATH_LENGTH),
59 (UINT8) ((END_DEVICE_PATH_LENGTH) >> 8)
60 }
61 }
62 };
63
64
65 EFI_USER_MANAGER_PROTOCOL gUserIdentifyManager = {
66 UserProfileCreate,
67 UserProfileDelete,
68 UserProfileGetNext,
69 UserProfileCurrent,
70 UserProfileIdentify,
71 UserProfileFind,
72 UserProfileNotify,
73 UserProfileGetInfo,
74 UserProfileSetInfo,
75 UserProfileDeleteInfo,
76 UserProfileGetNextInfo,
77 };
78
79
80 /**
81 Find the specified user in the user database.
82
83 This function searches the specified user from the beginning of the user database.
84 And if NextUser is TRUE, return the next User in the user database.
85
86 @param[in, out] User On entry, points to the user profile entry to search.
87 On return, points to the user profile entry or NULL if not found.
88 @param[in] NextUser If FALSE, find the user in user profile database specifyed by User
89 If TRUE, find the next user in user profile database specifyed
90 by User.
91 @param[out] ProfileIndex A pointer to the index of user profile database that matches the
92 user specifyed by User.
93
94 @retval EFI_NOT_FOUND User was NULL, or User was not found, or the next user was not found.
95 @retval EFI_SUCCESS User or the next user are found in user profile database
96
97 **/
98 EFI_STATUS
99 FindUserProfile (
100 IN OUT USER_PROFILE_ENTRY **User,
101 IN BOOLEAN NextUser,
102 OUT UINTN *ProfileIndex OPTIONAL
103 )
104 {
105 UINTN Index;
106
107 //
108 // Check parameters
109 //
110 if ((mUserProfileDb == NULL) || (User == NULL)) {
111 return EFI_NOT_FOUND;
112 }
113
114 //
115 // Check whether the user profile is in the user profile database.
116 //
117 for (Index = 0; Index < mUserProfileDb->UserProfileNum; Index++) {
118 if (mUserProfileDb->UserProfile[Index] == *User) {
119 if (ProfileIndex != NULL) {
120 *ProfileIndex = Index;
121 }
122 break;
123 }
124 }
125
126 if (NextUser) {
127 //
128 // Find the next user profile.
129 //
130 Index++;
131 if (Index < mUserProfileDb->UserProfileNum) {
132 *User = mUserProfileDb->UserProfile[Index];
133 } else if (Index == mUserProfileDb->UserProfileNum) {
134 *User = NULL;
135 return EFI_NOT_FOUND;
136 } else {
137 if ((mUserProfileDb->UserProfileNum > 0) && (*User == NULL)) {
138 *User = mUserProfileDb->UserProfile[0];
139 } else {
140 *User = NULL;
141 return EFI_NOT_FOUND;
142 }
143 }
144 } else if (Index == mUserProfileDb->UserProfileNum) {
145 return EFI_NOT_FOUND;
146 }
147
148 return EFI_SUCCESS;
149 }
150
151 /**
152 Find the specified user information record in the specified User profile.
153
154 This function searches the specified user information record from the beginning of the user
155 profile. And if NextInfo is TRUE, return the next info in the user profile.
156
157 @param[in] User Points to the user profile entry.
158 @param[in, out] Info On entry, points to the user information record or NULL to start
159 searching with the first user information record.
160 On return, points to the user information record or NULL if not found.
161 @param[in] NextInfo If FALSE, find the user information record in profile specifyed by User.
162 If TRUE, find the next user information record in profile specifyed
163 by User.
164 @param[out] Offset A pointer to the offset of the information record in the user profile.
165
166 @retval EFI_INVALID_PARAMETER Info is NULL
167 @retval EFI_NOT_FOUND Info was not found, or the next Info was not found.
168 @retval EFI_SUCCESS Info or the next info are found in user profile.
169
170 **/
171 EFI_STATUS
172 FindUserInfo (
173 IN USER_PROFILE_ENTRY * User,
174 IN OUT EFI_USER_INFO **Info,
175 IN BOOLEAN NextInfo,
176 OUT UINTN *Offset OPTIONAL
177 )
178 {
179 EFI_STATUS Status;
180 EFI_USER_INFO *UserInfo;
181 UINTN InfoLen;
182
183 if (Info == NULL) {
184 return EFI_INVALID_PARAMETER;
185 }
186
187 //
188 // Check user profile entry
189 //
190 Status = FindUserProfile (&User, FALSE, NULL);
191 if (EFI_ERROR (Status)) {
192 return Status;
193 }
194
195 //
196 // Find user information in the specified user record.
197 //
198 InfoLen = 0;
199 while (InfoLen < User->UserProfileSize) {
200 UserInfo = (EFI_USER_INFO *) (User->ProfileInfo + InfoLen);
201 if (UserInfo == *Info) {
202 if (Offset != NULL) {
203 *Offset = InfoLen;
204 }
205 break;
206 }
207 InfoLen += ALIGN_VARIABLE (UserInfo->InfoSize);
208 }
209
210 //
211 // Check whether to find the next user information.
212 //
213 if (NextInfo) {
214 if (InfoLen < User->UserProfileSize) {
215 UserInfo = (EFI_USER_INFO *) (User->ProfileInfo + InfoLen);
216 InfoLen += ALIGN_VARIABLE (UserInfo->InfoSize);
217 if (InfoLen < User->UserProfileSize) {
218 *Info = (EFI_USER_INFO *) (User->ProfileInfo + InfoLen);
219 if (Offset != NULL) {
220 *Offset = InfoLen;
221 }
222 } else if (InfoLen == User->UserProfileSize) {
223 *Info = NULL;
224 return EFI_NOT_FOUND;
225 }
226 } else {
227 if (*Info == NULL) {
228 *Info = (EFI_USER_INFO *) User->ProfileInfo;
229 if (Offset != NULL) {
230 *Offset = 0;
231 }
232 } else {
233 *Info = NULL;
234 return EFI_NOT_FOUND;
235 }
236 }
237 } else if (InfoLen == User->UserProfileSize) {
238 return EFI_NOT_FOUND;
239 }
240
241 return EFI_SUCCESS;
242 }
243
244 /**
245 Find a user infomation record by the information record type.
246
247 This function searches all user information records of User. The search starts with the
248 user information record following Info and continues until either the information is found
249 or there are no more user infomation record.
250 A match occurs when a Info.InfoType field matches the user information record type.
251
252 @param[in] User Points to the user profile record to search.
253 @param[in, out] Info On entry, points to the user information record or NULL to start
254 searching with the first user information record.
255 On return, points to the user information record or NULL if not found.
256 @param[in] InfoType The infomation type to be searched.
257
258 @retval EFI_SUCCESS User information was found. Info points to the user information record.
259 @retval EFI_NOT_FOUND User information was not found.
260 @retval EFI_INVALID_PARAMETER User is NULL or Info is NULL.
261
262 **/
263 EFI_STATUS
264 FindUserInfoByType (
265 IN USER_PROFILE_ENTRY *User,
266 IN OUT EFI_USER_INFO **Info,
267 IN UINT8 InfoType
268 )
269 {
270 EFI_STATUS Status;
271 EFI_USER_INFO *UserInfo;
272 UINTN InfoLen;
273
274 if (Info == NULL) {
275 return EFI_INVALID_PARAMETER;
276 }
277
278 //
279 // Check whether the user has the specified user information.
280 //
281 InfoLen = 0;
282 if (*Info == NULL) {
283 Status = FindUserProfile (&User, FALSE, NULL);
284 } else {
285 Status = FindUserInfo (User, Info, TRUE, &InfoLen);
286 }
287
288 if (EFI_ERROR (Status)) {
289 return EFI_NOT_FOUND;
290 }
291
292 while (InfoLen < User->UserProfileSize) {
293 UserInfo = (EFI_USER_INFO *) (User->ProfileInfo + InfoLen);
294 if (UserInfo->InfoType == InfoType) {
295 if (UserInfo != *Info) {
296 *Info = UserInfo;
297 return EFI_SUCCESS;
298 }
299 }
300
301 InfoLen += ALIGN_VARIABLE (UserInfo->InfoSize);
302 }
303
304 *Info = NULL;
305 return EFI_NOT_FOUND;
306 }
307
308 /**
309 Find a user using a user information record.
310
311 This function searches all user profiles for the specified user information record. The
312 search starts with the user information record handle following UserInfo and continues
313 until either the information is found or there are no more user profiles.
314 A match occurs when the Info.InfoType field matches the user information record type and the
315 user information record data matches the portion of Info passed the EFI_USER_INFO header.
316
317 @param[in, out] User On entry, points to the previously returned user profile record,
318 or NULL to start searching with the first user profile.
319 On return, points to the user profile entry, or NULL if not found.
320 @param[in, out] UserInfo On entry, points to the previously returned user information record,
321 or NULL to start searching with the first.
322 On return, points to the user information record, or NULL if not found.
323 @param[in] Info Points to the buffer containing the user information to be compared
324 to the user information record.
325 @param[in] InfoSize The size of Info, in bytes. Same as Info->InfoSize.
326
327 @retval EFI_SUCCESS User information was found. User points to the user profile record,
328 and UserInfo points to the user information record.
329 @retval EFI_NOT_FOUND User information was not found.
330 @retval EFI_INVALID_PARAMETER User is NULL; Info is NULL; or, InfoSize is too small.
331
332 **/
333 EFI_STATUS
334 FindUserProfileByInfo (
335 IN OUT USER_PROFILE_ENTRY **User,
336 IN OUT EFI_USER_INFO **UserInfo, OPTIONAL
337 IN EFI_USER_INFO *Info,
338 IN UINTN InfoSize
339 )
340 {
341 EFI_STATUS Status;
342 EFI_USER_INFO *InfoEntry;
343
344
345 if ((User == NULL) || (Info == NULL)) {
346 return EFI_INVALID_PARAMETER;
347 }
348
349 if (InfoSize < sizeof (EFI_USER_INFO)) {
350 return EFI_INVALID_PARAMETER;
351 }
352
353 if (UserInfo != NULL) {
354 InfoEntry = *UserInfo;
355 } else {
356 InfoEntry = NULL;
357 }
358 //
359 // Find user profile according to information.
360 //
361 if (*User == NULL) {
362 *User = mUserProfileDb->UserProfile[0];
363 }
364
365 //
366 // Check user profile handle.
367 //
368 Status = FindUserProfile (User, FALSE, NULL);
369
370 while (!EFI_ERROR (Status)) {
371 //
372 // Find the user information in a user profile.
373 //
374 while (TRUE) {
375 Status = FindUserInfoByType (*User, &InfoEntry, Info->InfoType);
376 if (EFI_ERROR (Status)) {
377 break;
378 }
379
380 if (InfoSize == Info->InfoSize) {
381 if (CompareMem ((UINT8 *) (InfoEntry + 1), (UINT8 *) (Info + 1), InfoSize - sizeof (EFI_USER_INFO)) == 0) {
382 //
383 // Found the infomation record.
384 //
385 if (UserInfo != NULL) {
386 *UserInfo = InfoEntry;
387 }
388 return EFI_SUCCESS;
389 }
390 }
391 }
392
393 //
394 // Get next user profile.
395 //
396 InfoEntry = NULL;
397 Status = FindUserProfile (User, TRUE, NULL);
398 }
399
400 return EFI_NOT_FOUND;
401 }
402
403
404 /**
405 Check whether the access policy is valid.
406
407 @param[in] PolicyInfo Point to the access policy.
408 @param[in] InfoLen The policy length.
409
410 @retval TRUE The policy is a valid access policy.
411 @retval FALSE The access policy is not a valid access policy.
412
413 **/
414 BOOLEAN
415 CheckAccessPolicy (
416 IN UINT8 *PolicyInfo,
417 IN UINTN InfoLen
418 )
419 {
420 UINTN TotalLen;
421 UINTN ValueLen;
422 UINTN OffSet;
423 EFI_USER_INFO_ACCESS_CONTROL Access;
424 EFI_DEVICE_PATH_PROTOCOL *Path;
425 UINTN PathSize;
426
427 TotalLen = 0;
428 while (TotalLen < InfoLen) {
429 //
430 // Check access policy according to type.
431 //
432 CopyMem (&Access, PolicyInfo + TotalLen, sizeof (Access));
433 ValueLen = Access.Size - sizeof (EFI_USER_INFO_ACCESS_CONTROL);
434 switch (Access.Type) {
435 case EFI_USER_INFO_ACCESS_FORBID_LOAD:
436 case EFI_USER_INFO_ACCESS_PERMIT_LOAD:
437 case EFI_USER_INFO_ACCESS_FORBID_CONNECT:
438 case EFI_USER_INFO_ACCESS_PERMIT_CONNECT:
439 OffSet = 0;
440 while (OffSet < ValueLen) {
441 Path = (EFI_DEVICE_PATH_PROTOCOL *) (PolicyInfo + TotalLen + sizeof (Access) + OffSet);
442 PathSize = GetDevicePathSize (Path);
443 OffSet += PathSize;
444 }
445 if (OffSet != ValueLen) {
446 return FALSE;
447 }
448 break;
449
450 case EFI_USER_INFO_ACCESS_SETUP:
451 if (ValueLen % sizeof (EFI_GUID) != 0) {
452 return FALSE;
453 }
454 break;
455
456 case EFI_USER_INFO_ACCESS_BOOT_ORDER:
457 if (ValueLen % sizeof (EFI_USER_INFO_ACCESS_BOOT_ORDER_HDR) != 0) {
458 return FALSE;
459 }
460 break;
461
462 case EFI_USER_INFO_ACCESS_ENROLL_SELF:
463 case EFI_USER_INFO_ACCESS_ENROLL_OTHERS:
464 case EFI_USER_INFO_ACCESS_MANAGE:
465 if (ValueLen != 0) {
466 return FALSE;
467 }
468 break;
469
470 default:
471 return FALSE;
472 break;
473 }
474
475 TotalLen += Access.Size;
476 }
477
478 if (TotalLen != InfoLen) {
479 return FALSE;
480 }
481
482 return TRUE;
483 }
484
485
486 /**
487 Check whether the identity policy is valid.
488
489 @param[in] PolicyInfo Point to the identity policy.
490 @param[in] InfoLen The policy length.
491
492 @retval TRUE The policy is a valid identity policy.
493 @retval FALSE The access policy is not a valid identity policy.
494
495 **/
496 BOOLEAN
497 CheckIdentityPolicy (
498 IN UINT8 *PolicyInfo,
499 IN UINTN InfoLen
500 )
501 {
502 UINTN TotalLen;
503 UINTN ValueLen;
504 EFI_USER_INFO_IDENTITY_POLICY *Identity;
505
506 TotalLen = 0;
507
508 //
509 // Check each part of policy expression.
510 //
511 while (TotalLen < InfoLen) {
512 //
513 // Check access polisy according to type.
514 //
515 Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (PolicyInfo + TotalLen);
516 ValueLen = Identity->Length - sizeof (EFI_USER_INFO_IDENTITY_POLICY);
517 switch (Identity->Type) {
518 //
519 // Check False option.
520 //
521 case EFI_USER_INFO_IDENTITY_FALSE:
522 if (ValueLen != 0) {
523 return FALSE;
524 }
525 break;
526
527 //
528 // Check True option.
529 //
530 case EFI_USER_INFO_IDENTITY_TRUE:
531 if (ValueLen != 0) {
532 return FALSE;
533 }
534 break;
535
536 //
537 // Check negative operation.
538 //
539 case EFI_USER_INFO_IDENTITY_NOT:
540 if (ValueLen != 0) {
541 return FALSE;
542 }
543 break;
544
545 //
546 // Check and operation.
547 //
548 case EFI_USER_INFO_IDENTITY_AND:
549 if (ValueLen != 0) {
550 return FALSE;
551 }
552 break;
553
554 //
555 // Check or operation.
556 //
557 case EFI_USER_INFO_IDENTITY_OR:
558 if (ValueLen != 0) {
559 return FALSE;
560 }
561 break;
562
563 //
564 // Check credential provider by type.
565 //
566 case EFI_USER_INFO_IDENTITY_CREDENTIAL_TYPE:
567 if (ValueLen != sizeof (EFI_GUID)) {
568 return FALSE;
569 }
570 break;
571
572 //
573 // Check credential provider by ID.
574 //
575 case EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER:
576 if (ValueLen != sizeof (EFI_GUID)) {
577 return FALSE;
578 }
579 break;
580
581 default:
582 return FALSE;
583 break;
584 }
585
586 TotalLen += Identity->Length;
587 }
588
589 if (TotalLen != InfoLen) {
590 return FALSE;
591 }
592
593 return TRUE;
594 }
595
596
597 /**
598 Check whether the user information is a valid user information record.
599
600 @param[in] Info points to the user information.
601
602 @retval TRUE The info is a valid user information record.
603 @retval FALSE The info is not a valid user information record.
604
605 **/
606 BOOLEAN
607 CheckUserInfo (
608 IN CONST EFI_USER_INFO *Info
609 )
610 {
611 UINTN InfoLen;
612
613 if (Info == NULL) {
614 return FALSE;
615 }
616 //
617 // Check user information according to information type.
618 //
619 InfoLen = Info->InfoSize - sizeof (EFI_USER_INFO);
620 switch (Info->InfoType) {
621 case EFI_USER_INFO_EMPTY_RECORD:
622 if (InfoLen != 0) {
623 return FALSE;
624 }
625 break;
626
627 case EFI_USER_INFO_NAME_RECORD:
628 case EFI_USER_INFO_CREDENTIAL_TYPE_NAME_RECORD:
629 case EFI_USER_INFO_CREDENTIAL_PROVIDER_NAME_RECORD:
630 break;
631
632 case EFI_USER_INFO_CREATE_DATE_RECORD:
633 case EFI_USER_INFO_USAGE_DATE_RECORD:
634 if (InfoLen != sizeof (EFI_TIME)) {
635 return FALSE;
636 }
637 break;
638
639 case EFI_USER_INFO_USAGE_COUNT_RECORD:
640 if (InfoLen != sizeof (UINT64)) {
641 return FALSE;
642 }
643 break;
644
645 case EFI_USER_INFO_IDENTIFIER_RECORD:
646 if (InfoLen != 16) {
647 return FALSE;
648 }
649 break;
650
651 case EFI_USER_INFO_CREDENTIAL_TYPE_RECORD:
652 case EFI_USER_INFO_CREDENTIAL_PROVIDER_RECORD:
653 case EFI_USER_INFO_GUID_RECORD:
654 if (InfoLen != sizeof (EFI_GUID)) {
655 return FALSE;
656 }
657 break;
658
659 case EFI_USER_INFO_PKCS11_RECORD:
660 case EFI_USER_INFO_CBEFF_RECORD:
661 break;
662
663 case EFI_USER_INFO_FAR_RECORD:
664 case EFI_USER_INFO_RETRY_RECORD:
665 if (InfoLen != 1) {
666 return FALSE;
667 }
668 break;
669
670 case EFI_USER_INFO_ACCESS_POLICY_RECORD:
671 if(!CheckAccessPolicy ((UINT8 *) (Info + 1), InfoLen)) {
672 return FALSE;
673 }
674 break;
675
676 case EFI_USER_INFO_IDENTITY_POLICY_RECORD:
677 if (!CheckIdentityPolicy ((UINT8 *) (Info + 1), InfoLen)) {
678 return FALSE;
679 }
680 break;
681
682 default:
683 return FALSE;
684 break;
685 }
686
687 return TRUE;
688 }
689
690
691 /**
692 Check the user profile data format to be added.
693
694 @param[in] UserProfileInfo Points to the user profile data.
695 @param[in] UserProfileSize The length of user profile data.
696
697 @retval TRUE It is a valid user profile.
698 @retval FALSE It is not a valid user profile.
699
700 **/
701 BOOLEAN
702 CheckProfileInfo (
703 IN UINT8 *UserProfileInfo,
704 IN UINTN UserProfileSize
705 )
706 {
707 UINTN ChkLen;
708 EFI_USER_INFO *Info;
709
710 if (UserProfileInfo == NULL) {
711 return FALSE;
712 }
713
714 //
715 // Check user profile information length.
716 //
717 ChkLen = 0;
718 while (ChkLen < UserProfileSize) {
719 Info = (EFI_USER_INFO *) (UserProfileInfo + ChkLen);
720 //
721 // Check user information format.
722 //
723 if (!CheckUserInfo (Info)) {
724 return FALSE;
725 }
726
727 ChkLen += ALIGN_VARIABLE (Info->InfoSize);
728 }
729
730 if (ChkLen != UserProfileSize) {
731 return FALSE;
732 }
733
734 return TRUE;
735 }
736
737
738 /**
739 Find the specified RightType in current user profile.
740
741 @param[in] RightType Could be EFI_USER_INFO_ACCESS_MANAGE,
742 EFI_USER_INFO_ACCESS_ENROLL_OTHERS or
743 EFI_USER_INFO_ACCESS_ENROLL_SELF.
744
745 @retval TRUE Find the specified RightType in current user profile.
746 @retval FALSE Can't find the right in the profile.
747
748 **/
749 BOOLEAN
750 CheckCurrentUserAccessRight (
751 IN UINT32 RightType
752 )
753 {
754 EFI_STATUS Status;
755 EFI_USER_INFO *Info;
756 UINTN TotalLen;
757 UINTN CheckLen;
758 EFI_USER_INFO_ACCESS_CONTROL Access;
759
760 //
761 // Get user access right information.
762 //
763 Info = NULL;
764 Status = FindUserInfoByType (
765 (USER_PROFILE_ENTRY *) mCurrentUser,
766 &Info,
767 EFI_USER_INFO_ACCESS_POLICY_RECORD
768 );
769 if (EFI_ERROR (Status)) {
770 return FALSE;
771 }
772
773 ASSERT (Info != NULL);
774 TotalLen = Info->InfoSize - sizeof (EFI_USER_INFO);
775 CheckLen = 0;
776 while (CheckLen < TotalLen) {
777 //
778 // Check right according to access type.
779 //
780 CopyMem (&Access, (UINT8 *) (Info + 1) + CheckLen, sizeof (Access));
781 if (Access.Type == RightType) {
782 return TRUE;;
783 }
784
785 CheckLen += Access.Size;
786 }
787
788 return FALSE;
789 }
790
791
792 /**
793 Create a unique user identifier.
794
795 @param[out] Identifier This points to the identifier.
796
797 **/
798 VOID
799 GenerateIdentifier (
800 OUT UINT8 *Identifier
801 )
802 {
803 EFI_TIME Time;
804 UINT64 MonotonicCount;
805 UINT32 *MonotonicPointer;
806 UINTN Index;
807
808 //
809 // Create a unique user identifier.
810 //
811 gRT->GetTime (&Time, NULL);
812 CopyMem (Identifier, &Time, sizeof (EFI_TIME));
813 //
814 // Remove zeros.
815 //
816 for (Index = 0; Index < sizeof (EFI_TIME); Index++) {
817 if (Identifier[Index] == 0) {
818 Identifier[Index] = 0x5a;
819 }
820 }
821
822 MonotonicPointer = (UINT32 *) Identifier;
823 gBS->GetNextMonotonicCount (&MonotonicCount);
824 MonotonicPointer[0] += (UINT32) MonotonicCount;
825 MonotonicPointer[1] += (UINT32) MonotonicCount;
826 MonotonicPointer[2] += (UINT32) MonotonicCount;
827 MonotonicPointer[3] += (UINT32) MonotonicCount;
828 }
829
830
831 /**
832 Generate unique user ID.
833
834 @param[out] UserId Points to the user identifer.
835
836 **/
837 VOID
838 GenerateUserId (
839 OUT UINT8 *UserId
840 )
841 {
842 EFI_STATUS Status;
843 USER_PROFILE_ENTRY *UserProfile;
844 EFI_USER_INFO *UserInfo;
845 UINTN Index;
846
847 //
848 // Generate unique user ID
849 //
850 while (TRUE) {
851 GenerateIdentifier (UserId);
852 //
853 // Check whether it's unique in user profile database.
854 //
855 if (mUserProfileDb == NULL) {
856 return ;
857 }
858
859 for (Index = 0; Index < mUserProfileDb->UserProfileNum; Index++) {
860 UserProfile = (USER_PROFILE_ENTRY *) (mUserProfileDb->UserProfile[Index]);
861 UserInfo = NULL;
862 Status = FindUserInfoByType (UserProfile, &UserInfo, EFI_USER_INFO_IDENTIFIER_RECORD);
863 if (EFI_ERROR (Status)) {
864 continue;
865 }
866
867 if (CompareMem ((UINT8 *) (UserInfo + 1), UserId, sizeof (EFI_USER_INFO_IDENTIFIER)) == 0) {
868 break;
869 }
870 }
871
872 if (Index == mUserProfileDb->UserProfileNum) {
873 return ;
874 }
875 }
876 }
877
878
879 /**
880 Expand user profile database.
881
882 @retval TRUE Success to expand user profile database.
883 @retval FALSE Fail to expand user profile database.
884
885 **/
886 BOOLEAN
887 ExpandUsermUserProfileDb (
888 VOID
889 )
890 {
891 UINTN MaxNum;
892 USER_PROFILE_DB *NewDataBase;
893
894 //
895 // Create new user profile database.
896 //
897 if (mUserProfileDb == NULL) {
898 MaxNum = USER_NUMBER_INC;
899 } else {
900 MaxNum = mUserProfileDb->MaxProfileNum + USER_NUMBER_INC;
901 }
902
903 NewDataBase = AllocateZeroPool (
904 sizeof (USER_PROFILE_DB) - sizeof (EFI_USER_PROFILE_HANDLE) +
905 MaxNum * sizeof (EFI_USER_PROFILE_HANDLE)
906 );
907 if (NewDataBase == NULL) {
908 return FALSE;
909 }
910
911 NewDataBase->MaxProfileNum = MaxNum;
912
913 //
914 // Copy old user profile database value
915 //
916 if (mUserProfileDb == NULL) {
917 NewDataBase->UserProfileNum = 0;
918 } else {
919 NewDataBase->UserProfileNum = mUserProfileDb->UserProfileNum;
920 CopyMem (
921 NewDataBase->UserProfile,
922 mUserProfileDb->UserProfile,
923 NewDataBase->UserProfileNum * sizeof (EFI_USER_PROFILE_HANDLE)
924 );
925 FreePool (mUserProfileDb);
926 }
927
928 mUserProfileDb = NewDataBase;
929 return TRUE;
930 }
931
932
933 /**
934 Expand user profile
935
936 @param[in] User Points to user profile.
937 @param[in] ExpandSize The size of user profile.
938
939 @retval TRUE Success to expand user profile size.
940 @retval FALSE Fail to expand user profile size.
941
942 **/
943 BOOLEAN
944 ExpandUserProfile (
945 IN USER_PROFILE_ENTRY *User,
946 IN UINTN ExpandSize
947 )
948 {
949 UINT8 *Info;
950 UINTN InfoSizeInc;
951
952 //
953 // Allocate new memory.
954 //
955 InfoSizeInc = 128;
956 User->MaxProfileSize += ((ExpandSize + InfoSizeInc - 1) / InfoSizeInc) * InfoSizeInc;
957 Info = AllocateZeroPool (User->MaxProfileSize);
958 if (Info == NULL) {
959 return FALSE;
960 }
961
962 //
963 // Copy exist information.
964 //
965 if (User->UserProfileSize > 0) {
966 CopyMem (Info, User->ProfileInfo, User->UserProfileSize);
967 FreePool (User->ProfileInfo);
968 }
969
970 User->ProfileInfo = Info;
971 return TRUE;
972 }
973
974
975 /**
976 Save the user profile to non-volatile memory, or delete it from non-volatile memory.
977
978 @param[in] User Point to the user profile
979 @param[in] Delete If TRUE, delete the found user profile.
980 If FALSE, save the user profile.
981 @retval EFI_SUCCESS Save or delete user profile successfully.
982 @retval Others Fail to change the profile.
983
984 **/
985 EFI_STATUS
986 SaveNvUserProfile (
987 IN USER_PROFILE_ENTRY *User,
988 IN BOOLEAN Delete
989 )
990 {
991 EFI_STATUS Status;
992
993 //
994 // Check user profile entry.
995 //
996 Status = FindUserProfile (&User, FALSE, NULL);
997 if (EFI_ERROR (Status)) {
998 return Status;
999 }
1000
1001 //
1002 // Save the user profile to non-volatile memory.
1003 //
1004 Status = gRT->SetVariable (
1005 User->UserVarName,
1006 &gUserIdentifyManagerGuid,
1007 EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS,
1008 Delete ? 0 : User->UserProfileSize,
1009 User->ProfileInfo
1010 );
1011 return Status;
1012 }
1013
1014 /**
1015 Add one new user info into the user's profile.
1016
1017 @param[in] User point to the user profile
1018 @param[in] Info Points to the user information payload.
1019 @param[in] InfoSize The size of the user information payload, in bytes.
1020 @param[out] UserInfo Point to the new info in user profile
1021 @param[in] Save If TRUE, save the profile to NV flash.
1022 If FALSE, don't need to save the profile to NV flash.
1023
1024 @retval EFI_SUCCESS Add user info to user profile successfully.
1025 @retval Others Fail to add user info to user profile.
1026
1027 **/
1028 EFI_STATUS
1029 AddUserInfo (
1030 IN USER_PROFILE_ENTRY *User,
1031 IN UINT8 *Info,
1032 IN UINTN InfoSize,
1033 OUT EFI_USER_INFO **UserInfo, OPTIONAL
1034 IN BOOLEAN Save
1035 )
1036 {
1037 EFI_STATUS Status;
1038
1039 if ((Info == NULL) || (User == NULL)) {
1040 return EFI_INVALID_PARAMETER;
1041 }
1042
1043 //
1044 // Check user profile handle.
1045 //
1046 Status = FindUserProfile (&User, FALSE, NULL);
1047 if (EFI_ERROR (Status)) {
1048 return Status;
1049 }
1050
1051 //
1052 // Check user information memory size.
1053 //
1054 if (User->MaxProfileSize - User->UserProfileSize < ALIGN_VARIABLE (InfoSize)) {
1055 if (!ExpandUserProfile (User, ALIGN_VARIABLE (InfoSize))) {
1056 return EFI_OUT_OF_RESOURCES;
1057 }
1058 }
1059
1060 //
1061 // Add new user information.
1062 //
1063 CopyMem (User->ProfileInfo + User->UserProfileSize, Info, InfoSize);
1064 if (UserInfo != NULL) {
1065 *UserInfo = (EFI_USER_INFO *) (User->ProfileInfo + User->UserProfileSize);
1066 }
1067 User->UserProfileSize += ALIGN_VARIABLE (InfoSize);
1068
1069 //
1070 // Save user profile information.
1071 //
1072 if (Save) {
1073 Status = SaveNvUserProfile (User, FALSE);
1074 }
1075
1076 return Status;
1077 }
1078
1079
1080 /**
1081 Get the user info from the specified user info handle.
1082
1083 @param[in] User Point to the user profile.
1084 @param[in] UserInfo Point to the user information record to get.
1085 @param[out] Info On entry, points to a buffer of at least *InfoSize bytes.
1086 On exit, holds the user information.
1087 @param[in, out] InfoSize On entry, points to the size of Info.
1088 On return, points to the size of the user information.
1089 @param[in] ChkRight If TRUE, check the user info attribute.
1090 If FALSE, don't check the user info attribute.
1091
1092
1093 @retval EFI_ACCESS_DENIED The information cannot be accessed by the current user.
1094 @retval EFI_INVALID_PARAMETER InfoSize is NULL or UserInfo is NULL.
1095 @retval EFI_BUFFER_TOO_SMALL The number of bytes specified by *InfoSize is too small to hold the
1096 returned data. The actual size required is returned in *InfoSize.
1097 @retval EFI_SUCCESS Information returned successfully.
1098
1099 **/
1100 EFI_STATUS
1101 GetUserInfo (
1102 IN USER_PROFILE_ENTRY *User,
1103 IN EFI_USER_INFO *UserInfo,
1104 OUT EFI_USER_INFO *Info,
1105 IN OUT UINTN *InfoSize,
1106 IN BOOLEAN ChkRight
1107 )
1108 {
1109 EFI_STATUS Status;
1110
1111 if ((InfoSize == NULL) || (UserInfo == NULL)) {
1112 return EFI_INVALID_PARAMETER;
1113 }
1114
1115 if ((*InfoSize != 0) && (Info == NULL)) {
1116 return EFI_INVALID_PARAMETER;
1117 }
1118
1119 //
1120 // Find the user information to get.
1121 //
1122 Status = FindUserInfo (User, &UserInfo, FALSE, NULL);
1123 if (EFI_ERROR (Status)) {
1124 return Status;
1125 }
1126
1127 //
1128 // Check information attributes.
1129 //
1130 if (ChkRight) {
1131 switch (UserInfo->InfoAttribs & EFI_USER_INFO_ACCESS) {
1132 case EFI_USER_INFO_PRIVATE:
1133 case EFI_USER_INFO_PROTECTED:
1134 if (User != mCurrentUser) {
1135 return EFI_ACCESS_DENIED;
1136 }
1137 break;
1138
1139 case EFI_USER_INFO_PUBLIC:
1140 break;
1141
1142 default:
1143 return EFI_INVALID_PARAMETER;
1144 break;
1145 }
1146 }
1147
1148 //
1149 // Get user information.
1150 //
1151 if (UserInfo->InfoSize > *InfoSize) {
1152 *InfoSize = UserInfo->InfoSize;
1153 return EFI_BUFFER_TOO_SMALL;
1154 }
1155
1156 *InfoSize = UserInfo->InfoSize;
1157 if (Info != NULL) {
1158 CopyMem (Info, UserInfo, *InfoSize);
1159 }
1160
1161 return EFI_SUCCESS;
1162 }
1163
1164
1165 /**
1166 Delete the specified user information from user profile.
1167
1168 @param[in] User Point to the user profile.
1169 @param[in] Info Point to the user information record to delete.
1170 @param[in] Save If TRUE, save the profile to NV flash.
1171 If FALSE, don't need to save the profile to NV flash.
1172
1173 @retval EFI_SUCCESS Delete user info from user profile successfully.
1174 @retval Others Fail to delete user info from user profile.
1175
1176 **/
1177 EFI_STATUS
1178 DelUserInfo (
1179 IN USER_PROFILE_ENTRY *User,
1180 IN EFI_USER_INFO *Info,
1181 IN BOOLEAN Save
1182 )
1183 {
1184 EFI_STATUS Status;
1185 UINTN Offset;
1186 UINTN NextOffset;
1187
1188 //
1189 // Check user information handle.
1190 //
1191 Status = FindUserInfo (User, &Info, FALSE, &Offset);
1192 if (EFI_ERROR (Status)) {
1193 return Status;
1194 }
1195
1196 if (Info->InfoType == EFI_USER_INFO_IDENTIFIER_RECORD) {
1197 return EFI_ACCESS_DENIED;
1198 }
1199
1200 //
1201 // Delete the specified user information.
1202 //
1203 NextOffset = Offset + ALIGN_VARIABLE (Info->InfoSize);
1204 User->UserProfileSize -= ALIGN_VARIABLE (Info->InfoSize);
1205 if (Offset < User->UserProfileSize) {
1206 CopyMem (User->ProfileInfo + Offset, User->ProfileInfo + NextOffset, User->UserProfileSize - Offset);
1207 }
1208
1209 if (Save) {
1210 Status = SaveNvUserProfile (User, FALSE);
1211 }
1212
1213 return Status;
1214 }
1215
1216
1217 /**
1218 Add or update user information.
1219
1220 @param[in] User Point to the user profile.
1221 @param[in, out] UserInfo On entry, points to the user information to modify,
1222 or NULL to add a new UserInfo.
1223 On return, points to the modified user information.
1224 @param[in] Info Points to the new user information.
1225 @param[in] InfoSize The size of Info,in bytes.
1226
1227 @retval EFI_INVALID_PARAMETER UserInfo is NULL or Info is NULL.
1228 @retval EFI_ACCESS_DENIED The record is exclusive.
1229 @retval EFI_SUCCESS User information was successfully changed/added.
1230
1231 **/
1232 EFI_STATUS
1233 ModifyUserInfo (
1234 IN USER_PROFILE_ENTRY *User,
1235 IN OUT EFI_USER_INFO **UserInfo,
1236 IN CONST EFI_USER_INFO *Info,
1237 IN UINTN InfoSize
1238 )
1239 {
1240 EFI_STATUS Status;
1241 UINTN PayloadLen;
1242 EFI_USER_INFO *OldInfo;
1243
1244 if ((UserInfo == NULL) || (Info == NULL)) {
1245 return EFI_INVALID_PARAMETER;
1246 }
1247
1248 if (InfoSize < sizeof (EFI_USER_INFO) || InfoSize != Info->InfoSize) {
1249 return EFI_INVALID_PARAMETER;
1250 }
1251
1252 //
1253 // Check user information.
1254 //
1255 if (Info->InfoType == EFI_USER_INFO_IDENTIFIER_RECORD) {
1256 return EFI_ACCESS_DENIED;
1257 }
1258
1259 if (!CheckUserInfo (Info)) {
1260 return EFI_INVALID_PARAMETER;
1261 }
1262
1263
1264 if (*UserInfo == NULL) {
1265 //
1266 // Add new user information.
1267 //
1268 OldInfo = NULL;
1269 do {
1270 Status = FindUserInfoByType (User, &OldInfo, Info->InfoType);
1271 if (EFI_ERROR (Status)) {
1272 break;
1273 }
1274 ASSERT (OldInfo != NULL);
1275
1276 if (((OldInfo->InfoAttribs & EFI_USER_INFO_EXCLUSIVE) != 0) ||
1277 ((Info->InfoAttribs & EFI_USER_INFO_EXCLUSIVE) != 0)) {
1278 //
1279 // Same type can not co-exist for exclusive information.
1280 //
1281 return EFI_ACCESS_DENIED;
1282 }
1283
1284 //
1285 // Check whether it exists in DB.
1286 //
1287 if (Info->InfoSize != OldInfo->InfoSize) {
1288 continue;
1289 }
1290
1291 if (!CompareGuid (&OldInfo->Credential, &Info->Credential)) {
1292 continue;
1293 }
1294
1295 PayloadLen = Info->InfoSize - sizeof (EFI_USER_INFO);
1296 if (PayloadLen == 0) {
1297 continue;
1298 }
1299
1300 if (CompareMem ((UINT8 *)(OldInfo + 1), (UINT8 *)(Info + 1), PayloadLen) != 0) {
1301 continue;
1302 }
1303
1304 //
1305 // Yes. The new info is as same as the one in profile.
1306 //
1307 return EFI_SUCCESS;
1308 } while (!EFI_ERROR (Status));
1309
1310 Status = AddUserInfo (User, (UINT8 *) Info, InfoSize, UserInfo, TRUE);
1311 return Status;
1312 }
1313
1314 //
1315 // Modify existing user information.
1316 //
1317 OldInfo = *UserInfo;
1318 if (OldInfo->InfoType != Info->InfoType) {
1319 return EFI_INVALID_PARAMETER;
1320 }
1321
1322 if (((Info->InfoAttribs & EFI_USER_INFO_EXCLUSIVE) != 0) &&
1323 (OldInfo->InfoAttribs & EFI_USER_INFO_EXCLUSIVE) == 0) {
1324 //
1325 // Try to add exclusive attrib in new info.
1326 // Check whether there is another information with the same type in profile.
1327 //
1328 OldInfo = NULL;
1329 do {
1330 Status = FindUserInfoByType (User, &OldInfo, Info->InfoType);
1331 if (EFI_ERROR (Status)) {
1332 break;
1333 }
1334 if (OldInfo != *UserInfo) {
1335 //
1336 // There is another information with the same type in profile.
1337 // Therefore, can't modify existing user information to add exclusive attribute.
1338 //
1339 return EFI_ACCESS_DENIED;
1340 }
1341 } while (TRUE);
1342 }
1343
1344 Status = DelUserInfo (User, *UserInfo, FALSE);
1345 if (EFI_ERROR (Status)) {
1346 return Status;
1347 }
1348
1349 return AddUserInfo (User, (UINT8 *) Info, InfoSize, UserInfo, TRUE);
1350 }
1351
1352
1353 /**
1354 Delete the user profile from non-volatile memory and database.
1355
1356 @param[in] User Points to the user profile.
1357
1358 @retval EFI_SUCCESS Delete user from the user profile successfully.
1359 @retval Others Fail to delete user from user profile
1360
1361 **/
1362 EFI_STATUS
1363 DelUserProfile (
1364 IN USER_PROFILE_ENTRY *User
1365 )
1366 {
1367 EFI_STATUS Status;
1368 UINTN Index;
1369
1370 //
1371 // Check whether it is in the user profile database.
1372 //
1373 Status = FindUserProfile (&User, FALSE, &Index);
1374 if (EFI_ERROR (Status)) {
1375 return EFI_INVALID_PARAMETER;
1376 }
1377
1378 //
1379 // Check whether it is the current user.
1380 //
1381 if (User == mCurrentUser) {
1382 return EFI_ACCESS_DENIED;
1383 }
1384
1385 //
1386 // Delete user profile from the non-volatile memory.
1387 //
1388 Status = SaveNvUserProfile (mUserProfileDb->UserProfile[mUserProfileDb->UserProfileNum - 1], TRUE);
1389 if (EFI_ERROR (Status)) {
1390 return Status;
1391 }
1392 mUserProfileDb->UserProfileNum--;
1393
1394 //
1395 // Modify user profile database.
1396 //
1397 if (Index != mUserProfileDb->UserProfileNum) {
1398 mUserProfileDb->UserProfile[Index] = mUserProfileDb->UserProfile[mUserProfileDb->UserProfileNum];
1399 CopyMem (
1400 ((USER_PROFILE_ENTRY *) mUserProfileDb->UserProfile[Index])->UserVarName,
1401 User->UserVarName,
1402 sizeof (User->UserVarName)
1403 );
1404 Status = SaveNvUserProfile (mUserProfileDb->UserProfile[Index], FALSE);
1405 if (EFI_ERROR (Status)) {
1406 return Status;
1407 }
1408 }
1409 //
1410 // Delete user profile information.
1411 //
1412 if (User->ProfileInfo != NULL) {
1413 FreePool (User->ProfileInfo);
1414 }
1415
1416 FreePool (User);
1417 return EFI_SUCCESS;
1418 }
1419
1420
1421 /**
1422 Add user profile to user profile database.
1423
1424 @param[out] UserProfile Point to the newly added user profile.
1425 @param[in] ProfileSize The size of the user profile.
1426 @param[in] ProfileInfo Point to the user profie data.
1427 @param[in] Save If TRUE, save the new added profile to NV flash.
1428 If FALSE, don't save the profile to NV flash.
1429
1430 @retval EFI_SUCCESS Add user profile to user profile database successfully.
1431 @retval Others Fail to add user profile to user profile database.
1432
1433 **/
1434 EFI_STATUS
1435 AddUserProfile (
1436 OUT USER_PROFILE_ENTRY **UserProfile, OPTIONAL
1437 IN UINTN ProfileSize,
1438 IN UINT8 *ProfileInfo,
1439 IN BOOLEAN Save
1440 )
1441 {
1442 EFI_STATUS Status;
1443 USER_PROFILE_ENTRY *User;
1444
1445 //
1446 // Check the data format to be added.
1447 //
1448 if (!CheckProfileInfo (ProfileInfo, ProfileSize)) {
1449 return EFI_SECURITY_VIOLATION;
1450 }
1451
1452 //
1453 // Create user profile entry.
1454 //
1455 User = AllocateZeroPool (sizeof (USER_PROFILE_ENTRY));
1456 if (User == NULL) {
1457 return EFI_OUT_OF_RESOURCES;
1458 }
1459 //
1460 // Add the entry to the user profile database.
1461 //
1462 if (mUserProfileDb->UserProfileNum == mUserProfileDb->MaxProfileNum) {
1463 if (!ExpandUsermUserProfileDb ()) {
1464 FreePool (User);
1465 return EFI_OUT_OF_RESOURCES;
1466 }
1467 }
1468
1469 UnicodeSPrint (
1470 User->UserVarName,
1471 sizeof (User->UserVarName),
1472 L"User%04x",
1473 mUserProfileDb->UserProfileNum
1474 );
1475 User->UserProfileSize = 0;
1476 User->MaxProfileSize = 0;
1477 User->ProfileInfo = NULL;
1478 mUserProfileDb->UserProfile[mUserProfileDb->UserProfileNum] = (EFI_USER_PROFILE_HANDLE) User;
1479 mUserProfileDb->UserProfileNum++;
1480
1481 //
1482 // Add user profile information.
1483 //
1484 Status = AddUserInfo (User, ProfileInfo, ProfileSize, NULL, Save);
1485 if (EFI_ERROR (Status)) {
1486 DelUserProfile (User);
1487 return Status;
1488 }
1489 //
1490 // Set new user profile handle.
1491 //
1492 if (UserProfile != NULL) {
1493 *UserProfile = User;
1494 }
1495
1496 return EFI_SUCCESS;
1497 }
1498
1499
1500 /**
1501 This function creates a new user profile with only a new user identifier
1502 attached and returns its handle. The user profile is non-volatile, but the
1503 handle User can change across reboots.
1504
1505 @param[out] User Handle of a new user profile.
1506
1507 @retval EFI_SUCCESS User profile was successfully created.
1508 @retval Others Fail to create user profile
1509
1510 **/
1511 EFI_STATUS
1512 CreateUserProfile (
1513 OUT USER_PROFILE_ENTRY **User
1514 )
1515 {
1516 EFI_STATUS Status;
1517 EFI_USER_INFO *UserInfo;
1518
1519 if (User == NULL) {
1520 return EFI_INVALID_PARAMETER;
1521 }
1522 //
1523 // Generate user id information.
1524 //
1525 UserInfo = AllocateZeroPool (sizeof (EFI_USER_INFO) + sizeof (EFI_USER_INFO_IDENTIFIER));
1526 if (UserInfo == NULL) {
1527 return EFI_OUT_OF_RESOURCES;
1528 }
1529
1530 UserInfo->InfoType = EFI_USER_INFO_IDENTIFIER_RECORD;
1531 UserInfo->InfoSize = sizeof (EFI_USER_INFO) + sizeof (EFI_USER_INFO_IDENTIFIER);
1532 UserInfo->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV | EFI_USER_INFO_PUBLIC | EFI_USER_INFO_EXCLUSIVE;
1533 GenerateUserId ((UINT8 *) (UserInfo + 1));
1534
1535 //
1536 // Add user profile to the user profile database.
1537 //
1538 Status = AddUserProfile (User, UserInfo->InfoSize, (UINT8 *) UserInfo, TRUE);
1539 FreePool (UserInfo);
1540 return Status;
1541 }
1542
1543
1544 /**
1545 Add a default user profile to user profile database.
1546
1547 @retval EFI_SUCCESS A default user profile is added successfully.
1548 @retval Others Fail to add a default user profile
1549
1550 **/
1551 EFI_STATUS
1552 AddDefaultUserProfile (
1553 VOID
1554 )
1555 {
1556 EFI_STATUS Status;
1557 USER_PROFILE_ENTRY *User;
1558 EFI_USER_INFO *Info;
1559 EFI_USER_INFO *NewInfo;
1560 EFI_USER_INFO_CREATE_DATE CreateDate;
1561 EFI_USER_INFO_USAGE_COUNT UsageCount;
1562 EFI_USER_INFO_ACCESS_CONTROL *Access;
1563 EFI_USER_INFO_IDENTITY_POLICY *Policy;
1564
1565 //
1566 // Create a user profile.
1567 //
1568 Status = CreateUserProfile (&User);
1569 if (EFI_ERROR (Status)) {
1570 return Status;
1571 }
1572
1573 //
1574 // Allocate a buffer to add all default user information.
1575 //
1576 Info = AllocateZeroPool (sizeof (EFI_USER_INFO) + INFO_PAYLOAD_SIZE);
1577 if (Info == NULL) {
1578 return EFI_OUT_OF_RESOURCES;
1579 }
1580
1581 //
1582 // Add user name.
1583 //
1584 Info->InfoType = EFI_USER_INFO_NAME_RECORD;
1585 Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV | EFI_USER_INFO_PUBLIC | EFI_USER_INFO_EXCLUSIVE;
1586 Info->InfoSize = sizeof (EFI_USER_INFO) + sizeof (mUserName);
1587 CopyMem ((UINT8 *) (Info + 1), mUserName, sizeof (mUserName));
1588 NewInfo = NULL;
1589 Status = ModifyUserInfo (User, &NewInfo, Info, Info->InfoSize);
1590 if (EFI_ERROR (Status)) {
1591 goto Done;
1592 }
1593
1594 //
1595 // Add user profile create date record.
1596 //
1597 Info->InfoType = EFI_USER_INFO_CREATE_DATE_RECORD;
1598 Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV | EFI_USER_INFO_PUBLIC | EFI_USER_INFO_EXCLUSIVE;
1599 Info->InfoSize = sizeof (EFI_USER_INFO) + sizeof (EFI_USER_INFO_CREATE_DATE);
1600 Status = gRT->GetTime (&CreateDate, NULL);
1601 if (EFI_ERROR (Status)) {
1602 goto Done;
1603 }
1604
1605 CopyMem ((UINT8 *) (Info + 1), &CreateDate, sizeof (EFI_USER_INFO_CREATE_DATE));
1606 NewInfo = NULL;
1607 Status = ModifyUserInfo (User, &NewInfo, Info, Info->InfoSize);
1608 if (EFI_ERROR (Status)) {
1609 goto Done;
1610 }
1611
1612 //
1613 // Add user profile usage count record.
1614 //
1615 Info->InfoType = EFI_USER_INFO_USAGE_COUNT_RECORD;
1616 Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV | EFI_USER_INFO_PUBLIC | EFI_USER_INFO_EXCLUSIVE;
1617 Info->InfoSize = sizeof (EFI_USER_INFO) + sizeof (EFI_USER_INFO_USAGE_COUNT);
1618 UsageCount = 0;
1619 CopyMem ((UINT8 *) (Info + 1), &UsageCount, sizeof (EFI_USER_INFO_USAGE_COUNT));
1620 NewInfo = NULL;
1621 Status = ModifyUserInfo (User, &NewInfo, Info, Info->InfoSize);
1622 if (EFI_ERROR (Status)) {
1623 goto Done;
1624 }
1625
1626 //
1627 // Add user access right.
1628 //
1629 Info->InfoType = EFI_USER_INFO_ACCESS_POLICY_RECORD;
1630 Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV | EFI_USER_INFO_PUBLIC | EFI_USER_INFO_EXCLUSIVE;
1631 Access = (EFI_USER_INFO_ACCESS_CONTROL *) (Info + 1);
1632 Access->Type = EFI_USER_INFO_ACCESS_MANAGE;
1633 Access->Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL);
1634 Info->InfoSize = sizeof (EFI_USER_INFO) + Access->Size;
1635 NewInfo = NULL;
1636 Status = ModifyUserInfo (User, &NewInfo, Info, Info->InfoSize);
1637 if (EFI_ERROR (Status)) {
1638 goto Done;
1639 }
1640
1641 //
1642 // Add user identity policy.
1643 //
1644 Info->InfoType = EFI_USER_INFO_IDENTITY_POLICY_RECORD;
1645 Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV | EFI_USER_INFO_PRIVATE | EFI_USER_INFO_EXCLUSIVE;
1646 Policy = (EFI_USER_INFO_IDENTITY_POLICY *) (Info + 1);
1647 Policy->Type = EFI_USER_INFO_IDENTITY_TRUE;
1648 Policy->Length = sizeof (EFI_USER_INFO_IDENTITY_POLICY);
1649 Info->InfoSize = sizeof (EFI_USER_INFO) + Policy->Length;
1650 NewInfo = NULL;
1651 Status = ModifyUserInfo (User, &NewInfo, Info, Info->InfoSize);
1652
1653 Done:
1654 FreePool (Info);
1655 return Status;
1656 }
1657
1658
1659 /**
1660 Publish current user information into EFI System Configuration Table.
1661
1662 By UEFI spec, the User Identity Manager will publish the current user profile
1663 into the EFI System Configuration Table. Currently, only the user identifier and user
1664 name are published.
1665
1666 @retval EFI_SUCCESS Current user information is published successfully.
1667 @retval Others Fail to publish current user information
1668
1669 **/
1670 EFI_STATUS
1671 PublishUserTable (
1672 VOID
1673 )
1674 {
1675 EFI_STATUS Status;
1676 EFI_CONFIGURATION_TABLE *EfiConfigurationTable;
1677 EFI_USER_INFO_TABLE *UserInfoTable;
1678 EFI_USER_INFO *IdInfo;
1679 EFI_USER_INFO *NameInfo;
1680
1681 Status = EfiGetSystemConfigurationTable (
1682 &gEfiUserManagerProtocolGuid,
1683 (VOID **) &EfiConfigurationTable
1684 );
1685 if (!EFI_ERROR (Status)) {
1686 //
1687 // The table existed!
1688 //
1689 return EFI_SUCCESS;
1690 }
1691
1692 //
1693 // Get user ID information.
1694 //
1695 IdInfo = NULL;
1696 Status = FindUserInfoByType (mCurrentUser, &IdInfo, EFI_USER_INFO_IDENTIFIER_RECORD);
1697 if (EFI_ERROR (Status)) {
1698 return Status;
1699
1700 }
1701 //
1702 // Get user name information.
1703 //
1704 NameInfo = NULL;
1705 Status = FindUserInfoByType (mCurrentUser, &NameInfo, EFI_USER_INFO_NAME_RECORD);
1706 if (EFI_ERROR (Status)) {
1707 return Status;
1708 }
1709
1710 //
1711 // Allocate a buffer for user information table.
1712 //
1713 UserInfoTable = (EFI_USER_INFO_TABLE *) AllocateRuntimePool (
1714 sizeof (EFI_USER_INFO_TABLE) +
1715 IdInfo->InfoSize +
1716 NameInfo->InfoSize
1717 );
1718 if (UserInfoTable == NULL) {
1719 Status = EFI_OUT_OF_RESOURCES;
1720 return Status;
1721 }
1722
1723 UserInfoTable->Size = sizeof (EFI_USER_INFO_TABLE);
1724
1725 //
1726 // Append the user information to the user info table
1727 //
1728 CopyMem ((UINT8 *) UserInfoTable + UserInfoTable->Size, (UINT8 *) IdInfo, IdInfo->InfoSize);
1729 UserInfoTable->Size += IdInfo->InfoSize;
1730
1731 CopyMem ((UINT8 *) UserInfoTable + UserInfoTable->Size, (UINT8 *) NameInfo, NameInfo->InfoSize);
1732 UserInfoTable->Size += NameInfo->InfoSize;
1733
1734 Status = gBS->InstallConfigurationTable (&gEfiUserManagerProtocolGuid, (VOID *) UserInfoTable);
1735 return Status;
1736 }
1737
1738
1739 /**
1740 Get the user's identity type.
1741
1742 The identify manager only supports the identity policy in which the credential
1743 provider handles are connected by the operator 'AND' or 'OR'.
1744
1745
1746 @param[in] User Handle of a user profile.
1747 @param[out] PolicyType Point to the identity type.
1748
1749 @retval EFI_SUCCESS Get user's identity type successfully.
1750 @retval Others Fail to get user's identity type.
1751
1752 **/
1753 EFI_STATUS
1754 GetIdentifyType (
1755 IN EFI_USER_PROFILE_HANDLE User,
1756 OUT UINT8 *PolicyType
1757 )
1758 {
1759 EFI_STATUS Status;
1760 EFI_USER_INFO *IdentifyInfo;
1761 UINTN TotalLen;
1762 EFI_USER_INFO_IDENTITY_POLICY *Identity;
1763
1764 //
1765 // Get user identify policy information.
1766 //
1767 IdentifyInfo = NULL;
1768 Status = FindUserInfoByType (User, &IdentifyInfo, EFI_USER_INFO_IDENTITY_POLICY_RECORD);
1769 if (EFI_ERROR (Status)) {
1770 return Status;
1771 }
1772 ASSERT (IdentifyInfo != NULL);
1773
1774 //
1775 // Search the user identify policy according to type.
1776 //
1777 TotalLen = 0;
1778 *PolicyType = EFI_USER_INFO_IDENTITY_FALSE;
1779 while (TotalLen < IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO)) {
1780 Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (IdentifyInfo + 1) + TotalLen);
1781 if (Identity->Type == EFI_USER_INFO_IDENTITY_AND) {
1782 *PolicyType = EFI_USER_INFO_IDENTITY_AND;
1783 break;
1784 }
1785
1786 if (Identity->Type == EFI_USER_INFO_IDENTITY_OR) {
1787 *PolicyType = EFI_USER_INFO_IDENTITY_OR;
1788 break;
1789 }
1790 TotalLen += Identity->Length;
1791 }
1792 return EFI_SUCCESS;
1793 }
1794
1795
1796 /**
1797 Identify the User by the specfied provider.
1798
1799 @param[in] User Handle of a user profile.
1800 @param[in] Provider Points to the identifier of credential provider.
1801
1802 @retval EFI_INVALID_PARAMETER Provider is NULL.
1803 @retval EFI_NOT_FOUND Fail to identify the specified user.
1804 @retval EFI_SUCCESS User is identified successfully.
1805
1806 **/
1807 EFI_STATUS
1808 IdentifyByProviderId (
1809 IN EFI_USER_PROFILE_HANDLE User,
1810 IN EFI_GUID *Provider
1811 )
1812 {
1813 EFI_STATUS Status;
1814 EFI_USER_INFO_IDENTIFIER UserId;
1815 UINTN Index;
1816 EFI_CREDENTIAL_LOGON_FLAGS AutoLogon;
1817 EFI_HII_HANDLE HiiHandle;
1818 EFI_GUID FormSetId;
1819 EFI_FORM_ID FormId;
1820 EFI_USER_CREDENTIAL2_PROTOCOL *UserCredential;
1821
1822 if (Provider == NULL) {
1823 return EFI_INVALID_PARAMETER;
1824 }
1825
1826 //
1827 // Check the user ID identified by the specified credential provider.
1828 //
1829 for (Index = 0; Index < mProviderDb->Count; Index++) {
1830 //
1831 // Check credential provider class.
1832 //
1833 UserCredential = mProviderDb->Provider[Index];
1834 if (CompareGuid (&UserCredential->Identifier, Provider)) {
1835 Status = UserCredential->Select (UserCredential, &AutoLogon);
1836 if (EFI_ERROR (Status)) {
1837 return Status;
1838 }
1839
1840 if ((AutoLogon & EFI_CREDENTIAL_LOGON_FLAG_AUTO) == 0) {
1841 //
1842 // Get credential provider form.
1843 //
1844 Status = UserCredential->Form (
1845 UserCredential,
1846 &HiiHandle,
1847 &FormSetId,
1848 &FormId
1849 );
1850 if (!EFI_ERROR (Status)) {
1851 //
1852 // Send form to get user input.
1853 //
1854 Status = mCallbackInfo->FormBrowser2->SendForm (
1855 mCallbackInfo->FormBrowser2,
1856 &HiiHandle,
1857 1,
1858 &FormSetId,
1859 FormId,
1860 NULL,
1861 NULL
1862 );
1863 if (EFI_ERROR (Status)) {
1864 return Status;
1865 }
1866 }
1867 }
1868
1869 Status = UserCredential->User (UserCredential, User, &UserId);
1870 if (EFI_ERROR (Status)) {
1871 return Status;
1872 }
1873
1874 Status = UserCredential->Deselect (UserCredential);
1875 if (EFI_ERROR (Status)) {
1876 return Status;
1877 }
1878
1879 return EFI_SUCCESS;
1880 }
1881 }
1882
1883 return EFI_NOT_FOUND;
1884 }
1885
1886
1887 /**
1888 Update user information when user is logon on successfully.
1889
1890 @param[in] User Points to user profile.
1891
1892 @retval EFI_SUCCESS Update user information successfully.
1893 @retval Others Fail to update user information.
1894
1895 **/
1896 EFI_STATUS
1897 UpdateUserInfo (
1898 IN USER_PROFILE_ENTRY *User
1899 )
1900 {
1901 EFI_STATUS Status;
1902 EFI_USER_INFO *Info;
1903 EFI_USER_INFO *NewInfo;
1904 EFI_USER_INFO_CREATE_DATE Date;
1905 EFI_USER_INFO_USAGE_COUNT UsageCount;
1906 UINTN InfoLen;
1907
1908 //
1909 // Allocate a buffer to update user's date record and usage record.
1910 //
1911 InfoLen = MAX (sizeof (EFI_USER_INFO_CREATE_DATE), sizeof (EFI_USER_INFO_USAGE_COUNT));
1912 Info = AllocateZeroPool (sizeof (EFI_USER_INFO) + InfoLen);
1913 if (Info == NULL) {
1914 return EFI_OUT_OF_RESOURCES;
1915 }
1916
1917 //
1918 // Check create date record.
1919 //
1920 NewInfo = NULL;
1921 Status = FindUserInfoByType (User, &NewInfo, EFI_USER_INFO_CREATE_DATE_RECORD);
1922 if (Status == EFI_NOT_FOUND) {
1923 Info->InfoType = EFI_USER_INFO_CREATE_DATE_RECORD;
1924 Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV | EFI_USER_INFO_PUBLIC | EFI_USER_INFO_EXCLUSIVE;
1925 Info->InfoSize = sizeof (EFI_USER_INFO) + sizeof (EFI_USER_INFO_CREATE_DATE);
1926 Status = gRT->GetTime (&Date, NULL);
1927 if (EFI_ERROR (Status)) {
1928 FreePool (Info);
1929 return Status;
1930 }
1931
1932 CopyMem ((UINT8 *) (Info + 1), &Date, sizeof (EFI_USER_INFO_CREATE_DATE));
1933 NewInfo = NULL;
1934 Status = ModifyUserInfo (User, &NewInfo, Info, Info->InfoSize);
1935 if (EFI_ERROR (Status)) {
1936 FreePool (Info);
1937 return Status;
1938 }
1939 }
1940
1941 //
1942 // Update usage date record.
1943 //
1944 NewInfo = NULL;
1945 Status = FindUserInfoByType (User, &NewInfo, EFI_USER_INFO_USAGE_DATE_RECORD);
1946 if ((Status == EFI_SUCCESS) || (Status == EFI_NOT_FOUND)) {
1947 Info->InfoType = EFI_USER_INFO_USAGE_DATE_RECORD;
1948 Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV | EFI_USER_INFO_PUBLIC | EFI_USER_INFO_EXCLUSIVE;
1949 Info->InfoSize = sizeof (EFI_USER_INFO) + sizeof (EFI_USER_INFO_USAGE_DATE);
1950 Status = gRT->GetTime (&Date, NULL);
1951 if (EFI_ERROR (Status)) {
1952 FreePool (Info);
1953 return Status;
1954 }
1955
1956 CopyMem ((UINT8 *) (Info + 1), &Date, sizeof (EFI_USER_INFO_USAGE_DATE));
1957 Status = ModifyUserInfo (User, &NewInfo, Info, Info->InfoSize);
1958 if (EFI_ERROR (Status)) {
1959 FreePool (Info);
1960 return Status;
1961 }
1962 }
1963
1964 //
1965 // Update usage count record.
1966 //
1967 UsageCount = 0;
1968 NewInfo = NULL;
1969 Status = FindUserInfoByType (User, &NewInfo, EFI_USER_INFO_USAGE_COUNT_RECORD);
1970 //
1971 // Get usage count.
1972 //
1973 if (Status == EFI_SUCCESS) {
1974 CopyMem (&UsageCount, (UINT8 *) (NewInfo + 1), sizeof (EFI_USER_INFO_USAGE_COUNT));
1975 }
1976
1977 UsageCount++;
1978 if ((Status == EFI_SUCCESS) || (Status == EFI_NOT_FOUND)) {
1979 Info->InfoType = EFI_USER_INFO_USAGE_COUNT_RECORD;
1980 Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV | EFI_USER_INFO_PUBLIC | EFI_USER_INFO_EXCLUSIVE;
1981 Info->InfoSize = sizeof (EFI_USER_INFO) + sizeof (EFI_USER_INFO_USAGE_COUNT);
1982 CopyMem ((UINT8 *) (Info + 1), &UsageCount, sizeof (EFI_USER_INFO_USAGE_COUNT));
1983 Status = ModifyUserInfo (User, &NewInfo, Info, Info->InfoSize);
1984 if (EFI_ERROR (Status)) {
1985 FreePool (Info);
1986 return Status;
1987 }
1988 }
1989
1990 FreePool (Info);
1991 return EFI_SUCCESS;
1992 }
1993
1994
1995 /**
1996 Add a credenetial provider item in form.
1997
1998 @param[in] ProviderGuid Points to the identifir of credential provider.
1999 @param[in] OpCodeHandle Points to container for dynamic created opcodes.
2000
2001 **/
2002 VOID
2003 AddProviderSelection (
2004 IN EFI_GUID *ProviderGuid,
2005 IN VOID *OpCodeHandle
2006 )
2007 {
2008 EFI_HII_HANDLE HiiHandle;
2009 EFI_STRING_ID ProvID;
2010 CHAR16 *ProvStr;
2011 UINTN Index;
2012 EFI_USER_CREDENTIAL2_PROTOCOL *UserCredential;
2013
2014 for (Index = 0; Index < mProviderDb->Count; Index++) {
2015 UserCredential = mProviderDb->Provider[Index];
2016 if (CompareGuid (&UserCredential->Identifier, ProviderGuid)) {
2017 //
2018 // Add credential provider selection.
2019 //
2020 UserCredential->Title (UserCredential, &HiiHandle, &ProvID);
2021 ProvStr = HiiGetString (HiiHandle, ProvID, NULL);
2022 if (ProvStr == NULL) {
2023 continue ;
2024 }
2025 ProvID = HiiSetString (mCallbackInfo->HiiHandle, 0, ProvStr, NULL);
2026 FreePool (ProvStr);
2027 HiiCreateActionOpCode (
2028 OpCodeHandle, // Container for dynamic created opcodes
2029 (EFI_QUESTION_ID)(LABEL_PROVIDER_NAME + Index), // Question ID
2030 ProvID, // Prompt text
2031 STRING_TOKEN (STR_NULL_STRING), // Help text
2032 EFI_IFR_FLAG_CALLBACK, // Question flag
2033 0 // Action String ID
2034 );
2035 break;
2036 }
2037 }
2038 }
2039
2040
2041 /**
2042 Add a username item in form.
2043
2044 @param[in] Index The index of the user in the user name list.
2045 @param[in] User Points to the user profile whose username is added.
2046 @param[in] OpCodeHandle Points to container for dynamic created opcodes.
2047
2048 @retval EFI_SUCCESS Add a username successfully.
2049 @retval Others Fail to add a username.
2050
2051 **/
2052 EFI_STATUS
2053 AddUserSelection (
2054 IN UINT16 Index,
2055 IN USER_PROFILE_ENTRY *User,
2056 IN VOID *OpCodeHandle
2057 )
2058 {
2059 EFI_STRING_ID UserName;
2060 EFI_STATUS Status;
2061 EFI_USER_INFO *UserInfo;
2062
2063 UserInfo = NULL;
2064 Status = FindUserInfoByType (User, &UserInfo, EFI_USER_INFO_NAME_RECORD);
2065 if (EFI_ERROR (Status)) {
2066 return Status;
2067 }
2068
2069 //
2070 // Add user name selection.
2071 //
2072 UserName = HiiSetString (mCallbackInfo->HiiHandle, 0, (EFI_STRING) (UserInfo + 1), NULL);
2073 if (UserName == 0) {
2074 return EFI_OUT_OF_RESOURCES;
2075 }
2076
2077 HiiCreateGotoOpCode (
2078 OpCodeHandle, // Container for dynamic created opcodes
2079 FORMID_PROVIDER_FORM, // Target Form ID
2080 UserName, // Prompt text
2081 STRING_TOKEN (STR_NULL_STRING), // Help text
2082 EFI_IFR_FLAG_CALLBACK, // Question flag
2083 (UINT16) Index // Question ID
2084 );
2085
2086 return EFI_SUCCESS;
2087 }
2088
2089
2090 /**
2091 Identify the user whose identity policy does not contain the operator 'OR'.
2092
2093 @param[in] User Points to the user profile.
2094
2095 @retval EFI_SUCCESS The specified user is identified successfully.
2096 @retval Others Fail to identify the user.
2097
2098 **/
2099 EFI_STATUS
2100 IdentifyAndTypeUser (
2101 IN USER_PROFILE_ENTRY *User
2102 )
2103 {
2104 EFI_STATUS Status;
2105 EFI_USER_INFO *IdentifyInfo;
2106 BOOLEAN Success;
2107 UINTN TotalLen;
2108 UINTN ValueLen;
2109 EFI_USER_INFO_IDENTITY_POLICY *Identity;
2110
2111 //
2112 // Get user identify policy information.
2113 //
2114 IdentifyInfo = NULL;
2115 Status = FindUserInfoByType (User, &IdentifyInfo, EFI_USER_INFO_IDENTITY_POLICY_RECORD);
2116 if (EFI_ERROR (Status)) {
2117 return Status;
2118 }
2119 ASSERT (IdentifyInfo != NULL);
2120
2121 //
2122 // Check each part of identification policy expression.
2123 //
2124 Success = FALSE;
2125 TotalLen = 0;
2126 while (TotalLen < IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO)) {
2127 Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (IdentifyInfo + 1) + TotalLen);
2128 ValueLen = Identity->Length - sizeof (EFI_USER_INFO_IDENTITY_POLICY);
2129 switch (Identity->Type) {
2130
2131 case EFI_USER_INFO_IDENTITY_FALSE:
2132 //
2133 // Check False option.
2134 //
2135 Success = FALSE;
2136 break;
2137
2138 case EFI_USER_INFO_IDENTITY_TRUE:
2139 //
2140 // Check True option.
2141 //
2142 Success = TRUE;
2143 break;
2144
2145 case EFI_USER_INFO_IDENTITY_NOT:
2146 //
2147 // Check negative operation.
2148 //
2149 break;
2150
2151 case EFI_USER_INFO_IDENTITY_AND:
2152 //
2153 // Check and operation.
2154 //
2155 if (!Success) {
2156 return EFI_NOT_READY;
2157 }
2158
2159 Success = FALSE;
2160 break;
2161
2162 case EFI_USER_INFO_IDENTITY_OR:
2163 //
2164 // Check or operation.
2165 //
2166 if (Success) {
2167 return EFI_SUCCESS;
2168 }
2169 break;
2170
2171 case EFI_USER_INFO_IDENTITY_CREDENTIAL_TYPE:
2172 //
2173 // Check credential provider by type.
2174 //
2175 break;
2176
2177 case EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER:
2178 //
2179 // Check credential provider by ID.
2180 //
2181 if (ValueLen != sizeof (EFI_GUID)) {
2182 return EFI_INVALID_PARAMETER;
2183 }
2184
2185 Status = IdentifyByProviderId (User, (EFI_GUID *) (Identity + 1));
2186 if (EFI_ERROR (Status)) {
2187 return Status;
2188 }
2189
2190 Success = TRUE;
2191 break;
2192
2193 default:
2194 return EFI_INVALID_PARAMETER;
2195 break;
2196 }
2197
2198 TotalLen += Identity->Length;
2199 }
2200
2201 if (TotalLen != IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO)) {
2202 return EFI_INVALID_PARAMETER;
2203 }
2204
2205 if (!Success) {
2206 return EFI_NOT_READY;
2207 }
2208
2209 return EFI_SUCCESS;
2210 }
2211
2212
2213 /**
2214 Identify the user whose identity policy does not contain the operator 'AND'.
2215
2216 @param[in] User Points to the user profile.
2217
2218 @retval EFI_SUCCESS The specified user is identified successfully.
2219 @retval Others Fail to identify the user.
2220
2221 **/
2222 EFI_STATUS
2223 IdentifyOrTypeUser (
2224 IN USER_PROFILE_ENTRY *User
2225 )
2226 {
2227 EFI_STATUS Status;
2228 EFI_USER_INFO *IdentifyInfo;
2229 UINTN TotalLen;
2230 UINTN ValueLen;
2231 EFI_USER_INFO_IDENTITY_POLICY *Identity;
2232 VOID *StartOpCodeHandle;
2233 VOID *EndOpCodeHandle;
2234 EFI_IFR_GUID_LABEL *StartLabel;
2235 EFI_IFR_GUID_LABEL *EndLabel;
2236
2237 //
2238 // Get user identify policy information.
2239 //
2240 IdentifyInfo = NULL;
2241 Status = FindUserInfoByType (User, &IdentifyInfo, EFI_USER_INFO_IDENTITY_POLICY_RECORD);
2242 if (EFI_ERROR (Status)) {
2243 return Status;
2244 }
2245 ASSERT (IdentifyInfo != NULL);
2246
2247 //
2248 // Initialize the container for dynamic opcodes.
2249 //
2250 StartOpCodeHandle = HiiAllocateOpCodeHandle ();
2251 ASSERT (StartOpCodeHandle != NULL);
2252
2253 EndOpCodeHandle = HiiAllocateOpCodeHandle ();
2254 ASSERT (EndOpCodeHandle != NULL);
2255
2256 //
2257 // Create Hii Extend Label OpCode.
2258 //
2259 StartLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
2260 StartOpCodeHandle,
2261 &gEfiIfrTianoGuid,
2262 NULL,
2263 sizeof (EFI_IFR_GUID_LABEL)
2264 );
2265 StartLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
2266 StartLabel->Number = LABEL_PROVIDER_NAME;
2267
2268 EndLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
2269 EndOpCodeHandle,
2270 &gEfiIfrTianoGuid,
2271 NULL,
2272 sizeof (EFI_IFR_GUID_LABEL)
2273 );
2274 EndLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
2275 EndLabel->Number = LABEL_END;
2276
2277 //
2278 // Add the providers that exists in the user's policy.
2279 //
2280 TotalLen = 0;
2281 while (TotalLen < IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO)) {
2282 Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (IdentifyInfo + 1) + TotalLen);
2283 ValueLen = Identity->Length - sizeof (EFI_USER_INFO_IDENTITY_POLICY);
2284 if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
2285 AddProviderSelection ((EFI_GUID *) (Identity + 1), StartOpCodeHandle);
2286 }
2287
2288 TotalLen += Identity->Length;
2289 }
2290
2291 HiiUpdateForm (
2292 mCallbackInfo->HiiHandle, // HII handle
2293 &gUserIdentifyManagerGuid,// Formset GUID
2294 FORMID_PROVIDER_FORM, // Form ID
2295 StartOpCodeHandle, // Label for where to insert opcodes
2296 EndOpCodeHandle // Replace data
2297 );
2298
2299 HiiFreeOpCodeHandle (StartOpCodeHandle);
2300 HiiFreeOpCodeHandle (EndOpCodeHandle);
2301
2302 return EFI_SUCCESS;
2303 }
2304
2305
2306 /**
2307 This function processes the results of changes in configuration.
2308
2309 @param This Points to the EFI_HII_CONFIG_ACCESS_PROTOCOL.
2310 @param Action Specifies the type of action taken by the browser.
2311 @param QuestionId A unique value which is sent to the original
2312 exporting driver so that it can identify the type
2313 of data to expect.
2314 @param Type The type of value for the question.
2315 @param Value A pointer to the data being sent to the original
2316 exporting driver.
2317 @param ActionRequest On return, points to the action requested by the
2318 callback function.
2319
2320 @retval EFI_SUCCESS The callback successfully handled the action.
2321 @retval Others Fail to handle the action.
2322
2323 **/
2324 EFI_STATUS
2325 EFIAPI
2326 UserIdentifyManagerCallback (
2327 IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,
2328 IN EFI_BROWSER_ACTION Action,
2329 IN EFI_QUESTION_ID QuestionId,
2330 IN UINT8 Type,
2331 IN EFI_IFR_TYPE_VALUE *Value,
2332 OUT EFI_BROWSER_ACTION_REQUEST *ActionRequest
2333 )
2334 {
2335 EFI_STATUS Status;
2336 USER_PROFILE_ENTRY *User;
2337 UINT8 PolicyType;
2338 UINT16 Index;
2339 VOID *StartOpCodeHandle;
2340 VOID *EndOpCodeHandle;
2341 EFI_IFR_GUID_LABEL *StartLabel;
2342 EFI_IFR_GUID_LABEL *EndLabel;
2343
2344 Status = EFI_SUCCESS;
2345
2346 switch (Action) {
2347 case EFI_BROWSER_ACTION_FORM_OPEN:
2348 {
2349 //
2350 // Update user Form when user Form is opened.
2351 // This will be done only in FORM_OPEN CallBack of question with FORM_OPEN_QUESTION_ID from user Form.
2352 //
2353 if (QuestionId != FORM_OPEN_QUESTION_ID) {
2354 return EFI_SUCCESS;
2355 }
2356
2357 //
2358 // Initialize the container for dynamic opcodes.
2359 //
2360 StartOpCodeHandle = HiiAllocateOpCodeHandle ();
2361 ASSERT (StartOpCodeHandle != NULL);
2362
2363 EndOpCodeHandle = HiiAllocateOpCodeHandle ();
2364 ASSERT (EndOpCodeHandle != NULL);
2365
2366 //
2367 // Create Hii Extend Label OpCode.
2368 //
2369 StartLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
2370 StartOpCodeHandle,
2371 &gEfiIfrTianoGuid,
2372 NULL,
2373 sizeof (EFI_IFR_GUID_LABEL)
2374 );
2375 StartLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
2376 StartLabel->Number = LABEL_USER_NAME;
2377
2378 EndLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
2379 EndOpCodeHandle,
2380 &gEfiIfrTianoGuid,
2381 NULL,
2382 sizeof (EFI_IFR_GUID_LABEL)
2383 );
2384 EndLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
2385 EndLabel->Number = LABEL_END;
2386
2387 //
2388 // Add all the user profile in the user profile database.
2389 //
2390 for (Index = 0; Index < mUserProfileDb->UserProfileNum; Index++) {
2391 User = (USER_PROFILE_ENTRY *) mUserProfileDb->UserProfile[Index];
2392 AddUserSelection ((UINT16)(LABEL_USER_NAME + Index), User, StartOpCodeHandle);
2393 }
2394
2395 HiiUpdateForm (
2396 mCallbackInfo->HiiHandle, // HII handle
2397 &gUserIdentifyManagerGuid,// Formset GUID
2398 FORMID_USER_FORM, // Form ID
2399 StartOpCodeHandle, // Label for where to insert opcodes
2400 EndOpCodeHandle // Replace data
2401 );
2402
2403 HiiFreeOpCodeHandle (StartOpCodeHandle);
2404 HiiFreeOpCodeHandle (EndOpCodeHandle);
2405
2406 return EFI_SUCCESS;
2407 }
2408 break;
2409
2410 case EFI_BROWSER_ACTION_FORM_CLOSE:
2411 Status = EFI_SUCCESS;
2412 break;
2413
2414 case EFI_BROWSER_ACTION_CHANGED:
2415 if (QuestionId >= LABEL_PROVIDER_NAME) {
2416 //
2417 // QuestionId comes from the second Form (Select a Credential Provider if identity
2418 // policy is OR type). Identify the user by the selected provider.
2419 //
2420 Status = IdentifyByProviderId (mCurrentUser, &mProviderDb->Provider[QuestionId & 0xFFF]->Identifier);
2421 if (Status == EFI_SUCCESS) {
2422 mIdentified = TRUE;
2423 *ActionRequest = EFI_BROWSER_ACTION_REQUEST_EXIT;
2424 }
2425 return EFI_SUCCESS;
2426 }
2427 break;
2428
2429 case EFI_BROWSER_ACTION_CHANGING:
2430 //
2431 // QuestionId comes from the first Form (Select a user to identify).
2432 //
2433 if (QuestionId >= LABEL_PROVIDER_NAME) {
2434 return EFI_SUCCESS;
2435 }
2436
2437 User = (USER_PROFILE_ENTRY *) mUserProfileDb->UserProfile[QuestionId & 0xFFF];
2438 Status = GetIdentifyType (User, &PolicyType);
2439 if (EFI_ERROR (Status)) {
2440 return Status;
2441 }
2442
2443 if (PolicyType == EFI_USER_INFO_IDENTITY_OR) {
2444 //
2445 // Identify the user by "OR" logical.
2446 //
2447 Status = IdentifyOrTypeUser (User);
2448 if (EFI_ERROR (Status)) {
2449 return Status;
2450 }
2451
2452 mCurrentUser = (EFI_USER_PROFILE_HANDLE) User;
2453 } else {
2454 //
2455 // Identify the user by "AND" logical.
2456 //
2457 Status = IdentifyAndTypeUser (User);
2458 if (EFI_ERROR (Status)) {
2459 return Status;
2460 }
2461
2462 mCurrentUser = (EFI_USER_PROFILE_HANDLE) User;
2463 mIdentified = TRUE;
2464 if (Type == EFI_IFR_TYPE_REF) {
2465 Value->ref.FormId = FORMID_INVALID_FORM;
2466 }
2467 }
2468 break;
2469
2470 default:
2471 //
2472 // All other action return unsupported.
2473 //
2474 Status = EFI_UNSUPPORTED;
2475 break;
2476 }
2477
2478
2479 return Status;
2480 }
2481
2482
2483 /**
2484 This function construct user profile database from user data saved in the Flash.
2485 If no user is found in Flash, add one default user "administrator" in the user
2486 profile database.
2487
2488 @retval EFI_SUCCESS Init user profile database successfully.
2489 @retval Others Fail to init user profile database.
2490
2491 **/
2492 EFI_STATUS
2493 InitUserProfileDb (
2494 VOID
2495 )
2496 {
2497 EFI_STATUS Status;
2498 UINT8 *VarData;
2499 UINTN VarSize;
2500 UINTN CurVarSize;
2501 CHAR16 VarName[10];
2502 UINTN Index;
2503 UINT32 VarAttr;
2504
2505 if (mUserProfileDb != NULL) {
2506 //
2507 // The user profiles had been already initialized.
2508 //
2509 return EFI_SUCCESS;
2510 }
2511
2512 //
2513 // Init user profile database structure.
2514 //
2515 if (!ExpandUsermUserProfileDb ()) {
2516 return EFI_OUT_OF_RESOURCES;
2517 }
2518
2519 CurVarSize = DEFAULT_PROFILE_SIZE;
2520 VarData = AllocateZeroPool (CurVarSize);
2521 if (VarData == NULL) {
2522 return EFI_OUT_OF_RESOURCES;
2523 }
2524
2525 //
2526 // Get all user proifle entries.
2527 //
2528 Index = 0;
2529 while (TRUE) {
2530 //
2531 // Get variable name.
2532 //
2533 UnicodeSPrint (
2534 VarName,
2535 sizeof (VarName),
2536 L"User%04x",
2537 Index
2538 );
2539 Index++;
2540
2541 //
2542 // Get variable value.
2543 //
2544 VarSize = CurVarSize;
2545 Status = gRT->GetVariable (VarName, &gUserIdentifyManagerGuid, &VarAttr, &VarSize, VarData);
2546 if (Status == EFI_BUFFER_TOO_SMALL) {
2547 FreePool (VarData);
2548 VarData = AllocatePool (VarSize);
2549 if (VarData == NULL) {
2550 Status = EFI_OUT_OF_RESOURCES;
2551 break;
2552 }
2553
2554 CurVarSize = VarSize;
2555 Status = gRT->GetVariable (VarName, &gUserIdentifyManagerGuid, &VarAttr, &VarSize, VarData);
2556 }
2557
2558 if (EFI_ERROR (Status)) {
2559 if (Status == EFI_NOT_FOUND) {
2560 Status = EFI_SUCCESS;
2561 }
2562 break;
2563 }
2564
2565 //
2566 // Check variable attributes.
2567 //
2568 if (VarAttr != (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS)) {
2569 Status = gRT->SetVariable (VarName, &gUserIdentifyManagerGuid, VarAttr, 0, NULL);
2570 continue;
2571 }
2572
2573 //
2574 // Add user profile to the user profile database.
2575 //
2576 Status = AddUserProfile (NULL, VarSize, VarData, FALSE);
2577 if (EFI_ERROR (Status)) {
2578 if (Status == EFI_SECURITY_VIOLATION) {
2579 //
2580 // Delete invalid user profile
2581 //
2582 gRT->SetVariable (VarName, &gUserIdentifyManagerGuid, VarAttr, 0, NULL);
2583 } else if (Status == EFI_OUT_OF_RESOURCES) {
2584 break;
2585 }
2586 } else {
2587 //
2588 // Delete and save the profile again if some invalid profiles are deleted.
2589 //
2590 if (mUserProfileDb->UserProfileNum < Index) {
2591 gRT->SetVariable (VarName, &gUserIdentifyManagerGuid, VarAttr, 0, NULL);
2592 SaveNvUserProfile (mUserProfileDb->UserProfile[mUserProfileDb->UserProfileNum - 1], FALSE);
2593 }
2594 }
2595 }
2596
2597 if (VarData != NULL) {
2598 FreePool (VarData);
2599 }
2600
2601 if (EFI_ERROR (Status)) {
2602 return Status;
2603 }
2604
2605 //
2606 // Check whether the user profile database is empty.
2607 //
2608 if (mUserProfileDb->UserProfileNum == 0) {
2609 Status = AddDefaultUserProfile ();
2610 }
2611
2612 return Status;
2613 }
2614
2615
2616 /**
2617 This function collects all the credential providers and saves to mProviderDb.
2618
2619 @retval EFI_SUCCESS Collect credential providers successfully.
2620 @retval Others Fail to collect credential providers.
2621
2622 **/
2623 EFI_STATUS
2624 InitProviderInfo (
2625 VOID
2626 )
2627 {
2628 EFI_STATUS Status;
2629 UINTN HandleCount;
2630 EFI_HANDLE *HandleBuf;
2631 UINTN Index;
2632
2633 if (mProviderDb != NULL) {
2634 //
2635 // The credential providers had been collected before.
2636 //
2637 return EFI_SUCCESS;
2638 }
2639
2640 //
2641 // Try to find all the user credential provider driver.
2642 //
2643 HandleCount = 0;
2644 HandleBuf = NULL;
2645 Status = gBS->LocateHandleBuffer (
2646 ByProtocol,
2647 &gEfiUserCredential2ProtocolGuid,
2648 NULL,
2649 &HandleCount,
2650 &HandleBuf
2651 );
2652 if (EFI_ERROR (Status)) {
2653 return Status;
2654 }
2655
2656 //
2657 // Get provider infomation.
2658 //
2659 mProviderDb = AllocateZeroPool (
2660 sizeof (CREDENTIAL_PROVIDER_INFO) -
2661 sizeof (EFI_USER_CREDENTIAL2_PROTOCOL *) +
2662 HandleCount * sizeof (EFI_USER_CREDENTIAL2_PROTOCOL *)
2663 );
2664 if (mProviderDb == NULL) {
2665 FreePool (HandleBuf);
2666 return EFI_OUT_OF_RESOURCES;
2667 }
2668
2669 mProviderDb->Count = HandleCount;
2670 for (Index = 0; Index < HandleCount; Index++) {
2671 Status = gBS->HandleProtocol (
2672 HandleBuf[Index],
2673 &gEfiUserCredential2ProtocolGuid,
2674 (VOID **) &mProviderDb->Provider[Index]
2675 );
2676 if (EFI_ERROR (Status)) {
2677 FreePool (HandleBuf);
2678 FreePool (mProviderDb);
2679 mProviderDb = NULL;
2680 return Status;
2681 }
2682 }
2683
2684 FreePool (HandleBuf);
2685 return EFI_SUCCESS;
2686 }
2687
2688
2689 /**
2690 This function allows a caller to extract the current configuration for one
2691 or more named elements from the target driver.
2692
2693
2694 @param This Points to the EFI_HII_CONFIG_ACCESS_PROTOCOL.
2695 @param Request A null-terminated Unicode string in <ConfigRequest> format.
2696 @param Progress On return, points to a character in the Request string.
2697 Points to the string's null terminator if request was successful.
2698 Points to the most recent '&' before the first failing name/value
2699 pair (or the beginning of the string if the failure is in the
2700 first name/value pair) if the request was not successful.
2701 @param Results A null-terminated Unicode string in <ConfigAltResp> format which
2702 has all values filled in for the names in the Request string.
2703 String to be allocated by the called function.
2704
2705 @retval EFI_SUCCESS The Results is filled with the requested values.
2706 @retval EFI_OUT_OF_RESOURCES Not enough memory to store the results.
2707 @retval EFI_INVALID_PARAMETER Request is illegal syntax, or unknown name.
2708 @retval EFI_NOT_FOUND Routing data doesn't match any storage in this driver.
2709
2710 **/
2711 EFI_STATUS
2712 EFIAPI
2713 FakeExtractConfig (
2714 IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,
2715 IN CONST EFI_STRING Request,
2716 OUT EFI_STRING *Progress,
2717 OUT EFI_STRING *Results
2718 )
2719 {
2720 if (Progress == NULL || Results == NULL) {
2721 return EFI_INVALID_PARAMETER;
2722 }
2723 *Progress = Request;
2724 return EFI_NOT_FOUND;
2725 }
2726
2727 /**
2728 This function processes the results of changes in configuration.
2729
2730
2731 @param This Points to the EFI_HII_CONFIG_ACCESS_PROTOCOL.
2732 @param Configuration A null-terminated Unicode string in <ConfigResp> format.
2733 @param Progress A pointer to a string filled in with the offset of the most
2734 recent '&' before the first failing name/value pair (or the
2735 beginning of the string if the failure is in the first
2736 name/value pair) or the terminating NULL if all was successful.
2737
2738 @retval EFI_SUCCESS The Results is processed successfully.
2739 @retval EFI_INVALID_PARAMETER Configuration is NULL.
2740 @retval EFI_NOT_FOUND Routing data doesn't match any storage in this driver.
2741
2742 **/
2743 EFI_STATUS
2744 EFIAPI
2745 FakeRouteConfig (
2746 IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,
2747 IN CONST EFI_STRING Configuration,
2748 OUT EFI_STRING *Progress
2749 )
2750 {
2751 if (Configuration == NULL || Progress == NULL) {
2752 return EFI_INVALID_PARAMETER;
2753 }
2754
2755 return EFI_NOT_FOUND;
2756 }
2757
2758
2759 /**
2760 This function initialize the data mainly used in form browser.
2761
2762 @retval EFI_SUCCESS Initialize form data successfully.
2763 @retval Others Fail to Initialize form data.
2764
2765 **/
2766 EFI_STATUS
2767 InitFormBrowser (
2768 VOID
2769 )
2770 {
2771 EFI_STATUS Status;
2772 USER_MANAGER_CALLBACK_INFO *CallbackInfo;
2773 EFI_HII_DATABASE_PROTOCOL *HiiDatabase;
2774 EFI_HII_STRING_PROTOCOL *HiiString;
2775 EFI_FORM_BROWSER2_PROTOCOL *FormBrowser2;
2776
2777 //
2778 // Initialize driver private data.
2779 //
2780 CallbackInfo = AllocateZeroPool (sizeof (USER_MANAGER_CALLBACK_INFO));
2781 if (CallbackInfo == NULL) {
2782 return EFI_OUT_OF_RESOURCES;
2783 }
2784
2785 CallbackInfo->Signature = USER_MANAGER_SIGNATURE;
2786 CallbackInfo->ConfigAccess.ExtractConfig = FakeExtractConfig;
2787 CallbackInfo->ConfigAccess.RouteConfig = FakeRouteConfig;
2788 CallbackInfo->ConfigAccess.Callback = UserIdentifyManagerCallback;
2789
2790 //
2791 // Locate Hii Database protocol.
2792 //
2793 Status = gBS->LocateProtocol (&gEfiHiiDatabaseProtocolGuid, NULL, (VOID **) &HiiDatabase);
2794 if (EFI_ERROR (Status)) {
2795 return Status;
2796 }
2797 CallbackInfo->HiiDatabase = HiiDatabase;
2798
2799 //
2800 // Locate HiiString protocol.
2801 //
2802 Status = gBS->LocateProtocol (&gEfiHiiStringProtocolGuid, NULL, (VOID **) &HiiString);
2803 if (EFI_ERROR (Status)) {
2804 return Status;
2805 }
2806 CallbackInfo->HiiString = HiiString;
2807
2808 //
2809 // Locate Formbrowser2 protocol.
2810 //
2811 Status = gBS->LocateProtocol (&gEfiFormBrowser2ProtocolGuid, NULL, (VOID **) &FormBrowser2);
2812 if (EFI_ERROR (Status)) {
2813 return Status;
2814 }
2815
2816 CallbackInfo->FormBrowser2 = FormBrowser2;
2817 CallbackInfo->DriverHandle = NULL;
2818
2819 //
2820 // Install Device Path Protocol and Config Access protocol to driver handle.
2821 //
2822 Status = gBS->InstallMultipleProtocolInterfaces (
2823 &CallbackInfo->DriverHandle,
2824 &gEfiDevicePathProtocolGuid,
2825 &mHiiVendorDevicePath,
2826 &gEfiHiiConfigAccessProtocolGuid,
2827 &CallbackInfo->ConfigAccess,
2828 NULL
2829 );
2830 ASSERT_EFI_ERROR (Status);
2831
2832 //
2833 // Publish HII data.
2834 //
2835 CallbackInfo->HiiHandle = HiiAddPackages (
2836 &gUserIdentifyManagerGuid,
2837 CallbackInfo->DriverHandle,
2838 UserIdentifyManagerStrings,
2839 UserIdentifyManagerVfrBin,
2840 NULL
2841 );
2842 if (CallbackInfo->HiiHandle == NULL) {
2843 return EFI_OUT_OF_RESOURCES;
2844 }
2845
2846 mCallbackInfo = CallbackInfo;
2847
2848 return EFI_SUCCESS;
2849 }
2850
2851
2852 /**
2853 Identify the user whose identification policy supports auto logon.
2854
2855 @param[in] ProviderIndex The provider index in the provider list.
2856 @param[out] User Points to user user profile if a user is identified successfully.
2857
2858 @retval EFI_SUCCESS Identify a user with the specified provider successfully.
2859 @retval Others Fail to identify a user.
2860
2861 **/
2862 EFI_STATUS
2863 IdentifyAutoLogonUser (
2864 IN UINTN ProviderIndex,
2865 OUT USER_PROFILE_ENTRY **User
2866 )
2867 {
2868 EFI_STATUS Status;
2869 EFI_USER_INFO *Info;
2870 UINT8 PolicyType;
2871
2872 Info = AllocateZeroPool (sizeof (EFI_USER_INFO) + sizeof (EFI_USER_INFO_IDENTIFIER));
2873 if (Info == NULL) {
2874 return EFI_OUT_OF_RESOURCES;
2875 }
2876
2877 Info->InfoType = EFI_USER_INFO_IDENTIFIER_RECORD;
2878 Info->InfoSize = sizeof (EFI_USER_INFO) + sizeof (EFI_USER_INFO_IDENTIFIER);
2879
2880 //
2881 // Identify the specified credential provider's auto logon user.
2882 //
2883 Status = mProviderDb->Provider[ProviderIndex]->User (
2884 mProviderDb->Provider[ProviderIndex],
2885 NULL,
2886 (EFI_USER_INFO_IDENTIFIER *) (Info + 1)
2887 );
2888 if (EFI_ERROR (Status)) {
2889 FreePool (Info);
2890 return Status;
2891 }
2892
2893 //
2894 // Find user with the specified user ID.
2895 //
2896 *User = NULL;
2897 Status = FindUserProfileByInfo (User, NULL, Info, Info->InfoSize);
2898 FreePool (Info);
2899 if (EFI_ERROR (Status)) {
2900 return Status;
2901 }
2902
2903 Status = GetIdentifyType ((EFI_USER_PROFILE_HANDLE) * User, &PolicyType);
2904 if (PolicyType == EFI_USER_INFO_IDENTITY_AND) {
2905 //
2906 // The identified user need also identified by other credential provider.
2907 // This can handle through select user.
2908 //
2909 return EFI_NOT_READY;
2910 }
2911
2912 return Status;
2913 }
2914
2915
2916 /**
2917 Check whether the given console is ready.
2918
2919 @param[in] ProtocolGuid Points to the protocol guid of sonsole .
2920
2921 @retval TRUE The given console is ready.
2922 @retval FALSE The given console is not ready.
2923
2924 **/
2925 BOOLEAN
2926 CheckConsole (
2927 EFI_GUID *ProtocolGuid
2928 )
2929 {
2930 EFI_STATUS Status;
2931 UINTN HandleCount;
2932 EFI_HANDLE *HandleBuf;
2933 UINTN Index;
2934 EFI_DEVICE_PATH_PROTOCOL *DevicePath;
2935
2936 //
2937 // Try to find all the handle driver.
2938 //
2939 HandleCount = 0;
2940 HandleBuf = NULL;
2941 Status = gBS->LocateHandleBuffer (
2942 ByProtocol,
2943 ProtocolGuid,
2944 NULL,
2945 &HandleCount,
2946 &HandleBuf
2947 );
2948 if (EFI_ERROR (Status)) {
2949 return FALSE;
2950 }
2951
2952 for (Index = 0; Index < HandleCount; Index++) {
2953 DevicePath = DevicePathFromHandle (HandleBuf[Index]);
2954 if (DevicePath != NULL) {
2955 FreePool (HandleBuf);
2956 return TRUE;
2957 }
2958 }
2959 FreePool (HandleBuf);
2960 return FALSE;
2961 }
2962
2963
2964 /**
2965 Check whether the console is ready.
2966
2967 @retval TRUE The console is ready.
2968 @retval FALSE The console is not ready.
2969
2970 **/
2971 BOOLEAN
2972 IsConsoleReady (
2973 VOID
2974 )
2975 {
2976 if (!CheckConsole (&gEfiSimpleTextOutProtocolGuid)) {
2977 return FALSE;
2978 }
2979
2980 if (!CheckConsole (&gEfiSimpleTextInProtocolGuid)) {
2981 if (!CheckConsole (&gEfiSimpleTextInputExProtocolGuid)) {
2982 return FALSE;
2983 }
2984 }
2985
2986 return TRUE;
2987 }
2988
2989
2990 /**
2991 Identify a user to logon.
2992
2993 @param[out] User Points to user user profile if a user is identified successfully.
2994
2995 @retval EFI_SUCCESS Identify a user successfully.
2996
2997 **/
2998 EFI_STATUS
2999 IdentifyUser (
3000 OUT USER_PROFILE_ENTRY **User
3001 )
3002 {
3003 EFI_STATUS Status;
3004 UINTN Index;
3005 EFI_CREDENTIAL_LOGON_FLAGS AutoLogon;
3006 EFI_USER_INFO *IdentifyInfo;
3007 EFI_USER_INFO_IDENTITY_POLICY *Identity;
3008 EFI_USER_CREDENTIAL2_PROTOCOL *UserCredential;
3009 USER_PROFILE_ENTRY *UserEntry;
3010
3011 //
3012 // Initialize credential providers.
3013 //
3014 InitProviderInfo ();
3015
3016 //
3017 // Initialize user profile database.
3018 //
3019 InitUserProfileDb ();
3020
3021 //
3022 // If only one user in system, and its identify policy is TRUE, then auto logon.
3023 //
3024 if (mUserProfileDb->UserProfileNum == 1) {
3025 UserEntry = (USER_PROFILE_ENTRY *) mUserProfileDb->UserProfile[0];
3026 IdentifyInfo = NULL;
3027 Status = FindUserInfoByType (UserEntry, &IdentifyInfo, EFI_USER_INFO_IDENTITY_POLICY_RECORD);
3028 if (EFI_ERROR (Status)) {
3029 return Status;
3030 }
3031 ASSERT (IdentifyInfo != NULL);
3032
3033 Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (IdentifyInfo + 1));
3034 if (Identity->Type == EFI_USER_INFO_IDENTITY_TRUE) {
3035 mCurrentUser = (EFI_USER_PROFILE_HANDLE) UserEntry;
3036 UpdateUserInfo (UserEntry);
3037 *User = UserEntry;
3038 return EFI_SUCCESS;
3039 }
3040 }
3041
3042 //
3043 // Find and login the default & AutoLogon user.
3044 //
3045 for (Index = 0; Index < mProviderDb->Count; Index++) {
3046 UserCredential = mProviderDb->Provider[Index];
3047 Status = UserCredential->Default (UserCredential, &AutoLogon);
3048 if (EFI_ERROR (Status)) {
3049 continue;
3050 }
3051
3052 if ((AutoLogon & (EFI_CREDENTIAL_LOGON_FLAG_DEFAULT | EFI_CREDENTIAL_LOGON_FLAG_AUTO)) != 0) {
3053 Status = IdentifyAutoLogonUser (Index, &UserEntry);
3054 if (Status == EFI_SUCCESS) {
3055 mCurrentUser = (EFI_USER_PROFILE_HANDLE) UserEntry;
3056 UpdateUserInfo (UserEntry);
3057 *User = UserEntry;
3058 return EFI_SUCCESS;
3059 }
3060 }
3061 }
3062
3063 if (!IsConsoleReady ()) {
3064 //
3065 // The console is still not ready for user selection.
3066 //
3067 return EFI_ACCESS_DENIED;
3068 }
3069
3070 //
3071 // Select a user and identify it.
3072 //
3073 mCallbackInfo->FormBrowser2->SendForm (
3074 mCallbackInfo->FormBrowser2,
3075 &mCallbackInfo->HiiHandle,
3076 1,
3077 &gUserIdentifyManagerGuid,
3078 0,
3079 NULL,
3080 NULL
3081 );
3082
3083 if (mIdentified) {
3084 *User = (USER_PROFILE_ENTRY *) mCurrentUser;
3085 UpdateUserInfo (*User);
3086 return EFI_SUCCESS;
3087 }
3088
3089 return EFI_ACCESS_DENIED;
3090 }
3091
3092
3093 /**
3094 An empty function to pass error checking of CreateEventEx ().
3095
3096 @param Event Event whose notification function is being invoked.
3097 @param Context Pointer to the notification function's context,
3098 which is implementation-dependent.
3099
3100 **/
3101 VOID
3102 EFIAPI
3103 InternalEmptyFuntion (
3104 IN EFI_EVENT Event,
3105 IN VOID *Context
3106 )
3107 {
3108 }
3109
3110
3111 /**
3112 Create, Signal, and Close the User Profile Changed event.
3113
3114 **/
3115 VOID
3116 SignalEventUserProfileChanged (
3117 VOID
3118 )
3119 {
3120 EFI_STATUS Status;
3121 EFI_EVENT Event;
3122
3123 Status = gBS->CreateEventEx (
3124 EVT_NOTIFY_SIGNAL,
3125 TPL_CALLBACK,
3126 InternalEmptyFuntion,
3127 NULL,
3128 &gEfiEventUserProfileChangedGuid,
3129 &Event
3130 );
3131 ASSERT_EFI_ERROR (Status);
3132 gBS->SignalEvent (Event);
3133 gBS->CloseEvent (Event);
3134 }
3135
3136
3137 /**
3138 Create a new user profile.
3139
3140 This function creates a new user profile with only a new user identifier attached and returns
3141 its handle. The user profile is non-volatile, but the handle User can change across reboots.
3142
3143 @param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
3144 @param[out] User On return, points to the new user profile handle.
3145 The user profile handle is unique only during this boot.
3146
3147 @retval EFI_SUCCESS User profile was successfully created.
3148 @retval EFI_ACCESS_DENIED Current user does not have sufficient permissions to create a
3149 user profile.
3150 @retval EFI_UNSUPPORTED Creation of new user profiles is not supported.
3151 @retval EFI_INVALID_PARAMETER The User parameter is NULL.
3152
3153 **/
3154 EFI_STATUS
3155 EFIAPI
3156 UserProfileCreate (
3157 IN CONST EFI_USER_MANAGER_PROTOCOL *This,
3158 OUT EFI_USER_PROFILE_HANDLE *User
3159 )
3160 {
3161 EFI_STATUS Status;
3162
3163 if ((This == NULL) || (User == NULL)) {
3164 return EFI_INVALID_PARAMETER;
3165 }
3166
3167 //
3168 // Check the right of the current user.
3169 //
3170 if (!CheckCurrentUserAccessRight (EFI_USER_INFO_ACCESS_MANAGE)) {
3171 if (!CheckCurrentUserAccessRight (EFI_USER_INFO_ACCESS_ENROLL_OTHERS)) {
3172 return EFI_ACCESS_DENIED;
3173 }
3174 }
3175
3176 //
3177 // Create new user profile
3178 //
3179 Status = CreateUserProfile ((USER_PROFILE_ENTRY **) User);
3180 if (EFI_ERROR (Status)) {
3181 return EFI_ACCESS_DENIED;
3182 }
3183 return EFI_SUCCESS;
3184 }
3185
3186
3187 /**
3188 Delete an existing user profile.
3189
3190 @param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
3191 @param[in] User User profile handle.
3192
3193 @retval EFI_SUCCESS User profile was successfully deleted.
3194 @retval EFI_ACCESS_DENIED Current user does not have sufficient permissions to delete a user
3195 profile or there is only one user profile.
3196 @retval EFI_UNSUPPORTED Deletion of new user profiles is not supported.
3197 @retval EFI_INVALID_PARAMETER User does not refer to a valid user profile.
3198
3199 **/
3200 EFI_STATUS
3201 EFIAPI
3202 UserProfileDelete (
3203 IN CONST EFI_USER_MANAGER_PROTOCOL *This,
3204 IN EFI_USER_PROFILE_HANDLE User
3205 )
3206 {
3207 EFI_STATUS Status;
3208
3209 if (This == NULL) {
3210 return EFI_INVALID_PARAMETER;
3211 }
3212
3213 //
3214 // Check the right of the current user.
3215 //
3216 if (!CheckCurrentUserAccessRight (EFI_USER_INFO_ACCESS_MANAGE)) {
3217 return EFI_ACCESS_DENIED;
3218 }
3219
3220 //
3221 // Delete user profile.
3222 //
3223 Status = DelUserProfile (User);
3224 if (EFI_ERROR (Status)) {
3225 if (Status != EFI_INVALID_PARAMETER) {
3226 return EFI_ACCESS_DENIED;
3227 }
3228 return EFI_INVALID_PARAMETER;
3229 }
3230
3231 return EFI_SUCCESS;
3232 }
3233
3234
3235 /**
3236 Enumerate all of the enrolled users on the platform.
3237
3238 This function returns the next enrolled user profile. To retrieve the first user profile handle,
3239 point User at a NULL. Each subsequent call will retrieve another user profile handle until there
3240 are no more, at which point User will point to NULL.
3241
3242 @param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
3243 @param[in, out] User On entry, points to the previous user profile handle or NULL to
3244 start enumeration. On exit, points to the next user profile handle
3245 or NULL if there are no more user profiles.
3246
3247 @retval EFI_SUCCESS Next enrolled user profile successfully returned.
3248 @retval EFI_ACCESS_DENIED Next enrolled user profile was not successfully returned.
3249 @retval EFI_INVALID_PARAMETER The User parameter is NULL.
3250 **/
3251 EFI_STATUS
3252 EFIAPI
3253 UserProfileGetNext (
3254 IN CONST EFI_USER_MANAGER_PROTOCOL *This,
3255 IN OUT EFI_USER_PROFILE_HANDLE *User
3256 )
3257 {
3258 EFI_STATUS Status;
3259
3260 if ((This == NULL) || (User == NULL)) {
3261 return EFI_INVALID_PARAMETER;
3262 }
3263
3264 Status = FindUserProfile ((USER_PROFILE_ENTRY **) User, TRUE, NULL);
3265 if (EFI_ERROR (Status)) {
3266 return EFI_ACCESS_DENIED;
3267 }
3268 return EFI_SUCCESS;
3269 }
3270
3271
3272 /**
3273 Return the current user profile handle.
3274
3275 @param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
3276 @param[out] CurrentUser On return, points to the current user profile handle.
3277
3278 @retval EFI_SUCCESS Current user profile handle returned successfully.
3279 @retval EFI_INVALID_PARAMETER The CurrentUser parameter is NULL.
3280
3281 **/
3282 EFI_STATUS
3283 EFIAPI
3284 UserProfileCurrent (
3285 IN CONST EFI_USER_MANAGER_PROTOCOL *This,
3286 OUT EFI_USER_PROFILE_HANDLE *CurrentUser
3287 )
3288 {
3289 //
3290 // Get current user profile.
3291 //
3292 if ((This == NULL) || (CurrentUser == NULL)) {
3293 return EFI_INVALID_PARAMETER;
3294 }
3295
3296 *CurrentUser = mCurrentUser;
3297 return EFI_SUCCESS;
3298 }
3299
3300
3301 /**
3302 Identify a user.
3303
3304 Identify the user and, if authenticated, returns the user handle and changes the current
3305 user profile. All user information marked as private in a previously selected profile
3306 is no longer available for inspection.
3307 Whenever the current user profile is changed then the an event with the GUID
3308 EFI_EVENT_GROUP_USER_PROFILE_CHANGED is signaled.
3309
3310 @param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
3311 @param[out] User On return, points to the user profile handle for the current
3312 user profile.
3313
3314 @retval EFI_SUCCESS User was successfully identified.
3315 @retval EFI_ACCESS_DENIED User was not successfully identified.
3316 @retval EFI_INVALID_PARAMETER The User parameter is NULL.
3317
3318 **/
3319 EFI_STATUS
3320 EFIAPI
3321 UserProfileIdentify (
3322 IN CONST EFI_USER_MANAGER_PROTOCOL *This,
3323 OUT EFI_USER_PROFILE_HANDLE *User
3324 )
3325 {
3326 EFI_STATUS Status;
3327
3328 if ((This == NULL) || (User == NULL)) {
3329 return EFI_INVALID_PARAMETER;
3330 }
3331
3332 if (mCurrentUser != NULL) {
3333 *User = mCurrentUser;
3334 return EFI_SUCCESS;
3335 }
3336
3337 //
3338 // Identify user
3339 //
3340 Status = IdentifyUser ((USER_PROFILE_ENTRY **) User);
3341 if (EFI_ERROR (Status)) {
3342 return EFI_ACCESS_DENIED;
3343 }
3344
3345 //
3346 // Publish the user info into the EFI system configuration table.
3347 //
3348 PublishUserTable ();
3349
3350 //
3351 // Signal User Profile Changed event.
3352 //
3353 SignalEventUserProfileChanged ();
3354 return EFI_SUCCESS;
3355 }
3356
3357 /**
3358 Find a user using a user information record.
3359
3360 This function searches all user profiles for the specified user information record.
3361 The search starts with the user information record handle following UserInfo and
3362 continues until either the information is found or there are no more user profiles.
3363 A match occurs when the Info.InfoType field matches the user information record
3364 type and the user information record data matches the portion of Info.
3365
3366 @param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
3367 @param[in, out] User On entry, points to the previously returned user profile
3368 handle, or NULL to start searching with the first user profile.
3369 On return, points to the user profile handle, or NULL if not
3370 found.
3371 @param[in, out] UserInfo On entry, points to the previously returned user information
3372 handle, or NULL to start searching with the first. On return,
3373 points to the user information handle of the user information
3374 record, or NULL if not found. Can be NULL, in which case only
3375 one user information record per user can be returned.
3376 @param[in] Info Points to the buffer containing the user information to be
3377 compared to the user information record. If the user information
3378 record data is empty, then only the user information record type
3379 is compared. If InfoSize is 0, then the user information record
3380 must be empty.
3381
3382 @param[in] InfoSize The size of Info, in bytes.
3383
3384 @retval EFI_SUCCESS User information was found. User points to the user profile
3385 handle, and UserInfo points to the user information handle.
3386 @retval EFI_NOT_FOUND User information was not found. User points to NULL, and
3387 UserInfo points to NULL.
3388 @retval EFI_INVALID_PARAMETER User is NULL. Or Info is NULL.
3389
3390 **/
3391 EFI_STATUS
3392 EFIAPI
3393 UserProfileFind (
3394 IN CONST EFI_USER_MANAGER_PROTOCOL *This,
3395 IN OUT EFI_USER_PROFILE_HANDLE *User,
3396 IN OUT EFI_USER_INFO_HANDLE *UserInfo OPTIONAL,
3397 IN CONST EFI_USER_INFO *Info,
3398 IN UINTN InfoSize
3399 )
3400 {
3401 EFI_STATUS Status;
3402 UINTN Size;
3403
3404 if ((This == NULL) || (User == NULL) || (Info == NULL)) {
3405 return EFI_INVALID_PARAMETER;
3406 }
3407
3408 if (InfoSize == 0) {
3409 //
3410 // If InfoSize is 0, then the user information record must be empty.
3411 //
3412 if (Info->InfoSize != sizeof (EFI_USER_INFO)) {
3413 return EFI_INVALID_PARAMETER;
3414 }
3415 } else {
3416 if (InfoSize != Info->InfoSize) {
3417 return EFI_INVALID_PARAMETER;
3418 }
3419 }
3420 Size = Info->InfoSize;
3421
3422 //
3423 // Find user profile accdoring to user information.
3424 //
3425 Status = FindUserProfileByInfo (
3426 (USER_PROFILE_ENTRY **) User,
3427 (EFI_USER_INFO **) UserInfo,
3428 (EFI_USER_INFO *) Info,
3429 Size
3430 );
3431 if (EFI_ERROR (Status)) {
3432 *User = NULL;
3433 if (UserInfo != NULL) {
3434 *UserInfo = NULL;
3435 }
3436 return EFI_NOT_FOUND;
3437 }
3438
3439 return EFI_SUCCESS;
3440 }
3441
3442
3443 /**
3444 Return information attached to the user.
3445
3446 This function returns user information. The format of the information is described in User
3447 Information. The function may return EFI_ACCESS_DENIED if the information is marked private
3448 and the handle specified by User is not the current user profile. The function may return
3449 EFI_ACCESS_DENIED if the information is marked protected and the information is associated
3450 with a credential provider for which the user has not been authenticated.
3451
3452 @param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
3453 @param[in] User Handle of the user whose profile will be retrieved.
3454 @param[in] UserInfo Handle of the user information data record.
3455 @param[out] Info On entry, points to a buffer of at least *InfoSize bytes. On exit,
3456 holds the user information. If the buffer is too small to hold the
3457 information, then EFI_BUFFER_TOO_SMALL is returned and InfoSize is
3458 updated to contain the number of bytes actually required.
3459 @param[in, out] InfoSize On entry, points to the size of Info. On return, points to the size
3460 of the user information.
3461
3462 @retval EFI_SUCCESS Information returned successfully.
3463 @retval EFI_ACCESS_DENIED The information about the specified user cannot be accessed by the
3464 current user.
3465 @retval EFI_BUFFER_TOO_SMALL The number of bytes specified by *InfoSize is too small to hold the
3466 returned data. The actual size required is returned in *InfoSize.
3467 @retval EFI_NOT_FOUND User does not refer to a valid user profile or UserInfo does not refer
3468 to a valid user info handle.
3469 @retval EFI_INVALID_PARAMETER Info is NULL or InfoSize is NULL.
3470
3471 **/
3472 EFI_STATUS
3473 EFIAPI
3474 UserProfileGetInfo (
3475 IN CONST EFI_USER_MANAGER_PROTOCOL *This,
3476 IN EFI_USER_PROFILE_HANDLE User,
3477 IN EFI_USER_INFO_HANDLE UserInfo,
3478 OUT EFI_USER_INFO *Info,
3479 IN OUT UINTN *InfoSize
3480 )
3481 {
3482 EFI_STATUS Status;
3483
3484 if ((This == NULL) || (InfoSize == NULL)) {
3485 return EFI_INVALID_PARAMETER;
3486 }
3487
3488 if ((*InfoSize != 0) && (Info == NULL)) {
3489 return EFI_INVALID_PARAMETER;
3490 }
3491
3492 if ((User == NULL) || (UserInfo == NULL)) {
3493 return EFI_NOT_FOUND;
3494 }
3495
3496 Status = GetUserInfo (User, UserInfo, Info, InfoSize, TRUE);
3497 if (EFI_ERROR (Status)) {
3498 if (Status == EFI_BUFFER_TOO_SMALL) {
3499 return EFI_BUFFER_TOO_SMALL;
3500 }
3501 return EFI_ACCESS_DENIED;
3502 }
3503 return EFI_SUCCESS;
3504 }
3505
3506
3507 /**
3508 Add or update user information.
3509
3510 This function changes user information. If NULL is pointed to by UserInfo, then a new user
3511 information record is created and its handle is returned in UserInfo. Otherwise, the existing
3512 one is replaced.
3513 If EFI_USER_INFO_IDENITTY_POLICY_RECORD is changed, it is the caller's responsibility to keep
3514 it to be synced with the information on credential providers.
3515 If EFI_USER_INFO_EXCLUSIVE is specified in Info and a user information record of the same
3516 type already exists in the user profile, then EFI_ACCESS_DENIED will be returned and UserInfo
3517 will point to the handle of the existing record.
3518
3519 @param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
3520 @param[in] User Handle of the user whose profile will be retrieved.
3521 @param[in, out] UserInfo Handle of the user information data record.
3522 @param[in] Info On entry, points to a buffer of at least *InfoSize bytes. On exit,
3523 holds the user information. If the buffer is too small to hold the
3524 information, then EFI_BUFFER_TOO_SMALL is returned and InfoSize is
3525 updated to contain the number of bytes actually required.
3526 @param[in] InfoSize On entry, points to the size of Info. On return, points to the size
3527 of the user information.
3528
3529 @retval EFI_SUCCESS Information returned successfully.
3530 @retval EFI_ACCESS_DENIED The record is exclusive.
3531 @retval EFI_SECURITY_VIOLATION The current user does not have permission to change the specified
3532 user profile or user information record.
3533 @retval EFI_NOT_FOUND User does not refer to a valid user profile or UserInfo does not
3534 refer to a valid user info handle.
3535 @retval EFI_INVALID_PARAMETER UserInfo is NULL or Info is NULL.
3536 **/
3537 EFI_STATUS
3538 EFIAPI
3539 UserProfileSetInfo (
3540 IN CONST EFI_USER_MANAGER_PROTOCOL *This,
3541 IN EFI_USER_PROFILE_HANDLE User,
3542 IN OUT EFI_USER_INFO_HANDLE *UserInfo,
3543 IN CONST EFI_USER_INFO *Info,
3544 IN UINTN InfoSize
3545 )
3546 {
3547 EFI_STATUS Status;
3548
3549 if ((This == NULL) || (User == NULL) || (UserInfo == NULL) || (Info == NULL)) {
3550 return EFI_INVALID_PARAMETER;
3551 }
3552
3553 //
3554 // Check the right of the current user.
3555 //
3556 if (User != mCurrentUser) {
3557 if (!CheckCurrentUserAccessRight (EFI_USER_INFO_ACCESS_MANAGE)) {
3558 if (*UserInfo != NULL) {
3559 //
3560 // Can't update info in other profiles without MANAGE right.
3561 //
3562 return EFI_SECURITY_VIOLATION;
3563 }
3564
3565 if (!CheckCurrentUserAccessRight (EFI_USER_INFO_ACCESS_ENROLL_OTHERS)) {
3566 //
3567 // Can't add info into other profiles.
3568 //
3569 return EFI_SECURITY_VIOLATION;
3570 }
3571 }
3572 }
3573
3574 if (User == mCurrentUser) {
3575 if (CheckCurrentUserAccessRight (EFI_USER_INFO_ACCESS_ENROLL_SELF)) {
3576 //
3577 // Only identify policy can be added/updated.
3578 //
3579 if (Info->InfoType != EFI_USER_INFO_IDENTITY_POLICY_RECORD) {
3580 return EFI_SECURITY_VIOLATION;
3581 }
3582 }
3583 }
3584
3585 //
3586 // Modify user information.
3587 //
3588 Status = ModifyUserInfo (User, (EFI_USER_INFO **) UserInfo, Info, InfoSize);
3589 if (EFI_ERROR (Status)) {
3590 if (Status == EFI_ACCESS_DENIED) {
3591 return EFI_ACCESS_DENIED;
3592 }
3593 return EFI_SECURITY_VIOLATION;
3594 }
3595 return EFI_SUCCESS;
3596 }
3597
3598
3599 /**
3600 Called by credential provider to notify of information change.
3601
3602 This function allows the credential provider to notify the User Identity Manager when user status
3603 has changed.
3604 If the User Identity Manager doesn't support asynchronous changes in credentials, then this function
3605 should return EFI_UNSUPPORTED.
3606 If current user does not exist, and the credential provider can identify a user, then make the user
3607 to be current user and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
3608 If current user already exists, and the credential provider can identify another user, then switch
3609 current user to the newly identified user, and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
3610 If current user was identified by this credential provider and now the credential provider cannot identify
3611 current user, then logout current user and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
3612
3613 @param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
3614 @param[in] Changed Handle on which is installed an instance of the EFI_USER_CREDENTIAL2_PROTOCOL
3615 where the user has changed.
3616
3617 @retval EFI_SUCCESS The User Identity Manager has handled the notification.
3618 @retval EFI_NOT_READY The function was called while the specified credential provider was not selected.
3619 @retval EFI_UNSUPPORTED The User Identity Manager doesn't support asynchronous notifications.
3620
3621 **/
3622 EFI_STATUS
3623 EFIAPI
3624 UserProfileNotify (
3625 IN CONST EFI_USER_MANAGER_PROTOCOL *This,
3626 IN EFI_HANDLE Changed
3627 )
3628 {
3629 return EFI_UNSUPPORTED;
3630 }
3631
3632
3633 /**
3634 Delete user information.
3635
3636 Delete the user information attached to the user profile specified by the UserInfo.
3637
3638 @param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
3639 @param[in] User Handle of the user whose information will be deleted.
3640 @param[in] UserInfo Handle of the user information to remove.
3641
3642 @retval EFI_SUCCESS User information deleted successfully.
3643 @retval EFI_NOT_FOUND User information record UserInfo does not exist in the user profile.
3644 @retval EFI_ACCESS_DENIED The current user does not have permission to delete this user information.
3645
3646 **/
3647 EFI_STATUS
3648 EFIAPI
3649 UserProfileDeleteInfo (
3650 IN CONST EFI_USER_MANAGER_PROTOCOL *This,
3651 IN EFI_USER_PROFILE_HANDLE User,
3652 IN EFI_USER_INFO_HANDLE UserInfo
3653 )
3654 {
3655 EFI_STATUS Status;
3656
3657 if (This == NULL) {
3658 return EFI_INVALID_PARAMETER;
3659 }
3660
3661 //
3662 // Check the right of the current user.
3663 //
3664 if (User != mCurrentUser) {
3665 if (!CheckCurrentUserAccessRight (EFI_USER_INFO_ACCESS_MANAGE)) {
3666 return EFI_ACCESS_DENIED;
3667 }
3668 }
3669
3670 //
3671 // Delete user information.
3672 //
3673 Status = DelUserInfo (User, UserInfo, TRUE);
3674 if (EFI_ERROR (Status)) {
3675 if (Status == EFI_NOT_FOUND) {
3676 return EFI_NOT_FOUND;
3677 }
3678 return EFI_ACCESS_DENIED;
3679 }
3680 return EFI_SUCCESS;
3681 }
3682
3683
3684 /**
3685 Enumerate user information of all the enrolled users on the platform.
3686
3687 This function returns the next user information record. To retrieve the first user
3688 information record handle, point UserInfo at a NULL. Each subsequent call will retrieve
3689 another user information record handle until there are no more, at which point UserInfo
3690 will point to NULL.
3691
3692 @param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
3693 @param[in] User Handle of the user whose information will be deleted.
3694 @param[in, out] UserInfo Handle of the user information to remove.
3695
3696 @retval EFI_SUCCESS User information returned.
3697 @retval EFI_NOT_FOUND No more user information found.
3698 @retval EFI_INVALID_PARAMETER UserInfo is NULL.
3699
3700 **/
3701 EFI_STATUS
3702 EFIAPI
3703 UserProfileGetNextInfo (
3704 IN CONST EFI_USER_MANAGER_PROTOCOL *This,
3705 IN EFI_USER_PROFILE_HANDLE User,
3706 IN OUT EFI_USER_INFO_HANDLE *UserInfo
3707 )
3708 {
3709 if ((This == NULL) || (UserInfo == NULL)) {
3710 return EFI_INVALID_PARAMETER;
3711 }
3712 //
3713 // Get next user information entry.
3714 //
3715 return FindUserInfo (User, (EFI_USER_INFO **) UserInfo, TRUE, NULL);
3716 }
3717
3718
3719 /**
3720 Main entry for this driver.
3721
3722 @param[in] ImageHandle Image handle this driver.
3723 @param[in] SystemTable Pointer to SystemTable.
3724
3725 @retval EFI_SUCESS This function always complete successfully.
3726
3727 **/
3728 EFI_STATUS
3729 EFIAPI
3730 UserIdentifyManagerInit (
3731 IN EFI_HANDLE ImageHandle,
3732 IN EFI_SYSTEM_TABLE *SystemTable
3733 )
3734 {
3735
3736 EFI_STATUS Status;
3737
3738 //
3739 // Initiate form browser.
3740 //
3741 InitFormBrowser ();
3742
3743 //
3744 // Install protocol interfaces for the User Identity Manager.
3745 //
3746 Status = gBS->InstallProtocolInterface (
3747 &mCallbackInfo->DriverHandle,
3748 &gEfiUserManagerProtocolGuid,
3749 EFI_NATIVE_INTERFACE,
3750 &gUserIdentifyManager
3751 );
3752 ASSERT_EFI_ERROR (Status);
3753
3754 LoadDeferredImageInit (ImageHandle);
3755 return EFI_SUCCESS;
3756 }
3757
3758