mirror of
https://github.com/acidanthera/audk.git
synced 2025-04-08 17:05:09 +02:00
Update UID drivers to align with latest UEFI spec 2.3.1.
Signed-off-by: gdong1 Reviewed-by: tye Reviewed-by: qianouyang git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12567 6f19259b-4bc3-4df7-8a09-765794883524
This commit is contained in:
parent
5f4ef94a55
commit
0c5b25f021
@ -745,7 +745,6 @@ CredentialEnroll (
|
||||
EFI_USER_INFO *UserInfo;
|
||||
CHAR8 Password[CREDENTIAL_LEN];
|
||||
EFI_INPUT_KEY Key;
|
||||
EFI_USER_MANAGER_PROTOCOL *UserManager;
|
||||
UINT8 *UserId;
|
||||
CHAR16 *QuestionStr;
|
||||
CHAR16 *PromptStr;
|
||||
@ -754,15 +753,6 @@ CredentialEnroll (
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
Status = gBS->LocateProtocol (
|
||||
&gEfiUserManagerProtocolGuid,
|
||||
NULL,
|
||||
(VOID **) &UserManager
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
||||
//
|
||||
// Get User Identifier.
|
||||
//
|
||||
@ -835,11 +825,6 @@ CredentialEnroll (
|
||||
return Status;
|
||||
}
|
||||
|
||||
//
|
||||
// Notify the user manager driver that credential information has changed.
|
||||
//
|
||||
UserManager->Notify (UserManager, mCallbackInfo->DriverHandle);
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
@ -674,7 +674,6 @@ CredentialEnroll (
|
||||
USB_INFO UsbInfo;
|
||||
EFI_USER_INFO *UserInfo;
|
||||
EFI_INPUT_KEY Key;
|
||||
EFI_USER_MANAGER_PROTOCOL *UserManager;
|
||||
UINT8 *UserId;
|
||||
CHAR16 *QuestionStr;
|
||||
CHAR16 *PromptStr;
|
||||
@ -683,15 +682,6 @@ CredentialEnroll (
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
Status = gBS->LocateProtocol (
|
||||
&gEfiUserManagerProtocolGuid,
|
||||
NULL,
|
||||
(VOID **) &UserManager
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
||||
//
|
||||
// Get User Identifier
|
||||
//
|
||||
@ -749,11 +739,6 @@ CredentialEnroll (
|
||||
return Status;
|
||||
}
|
||||
|
||||
//
|
||||
// Notify the user manager driver that credential information has changed.
|
||||
//
|
||||
UserManager->Notify (UserManager, mCallbackInfo->DriverHandle);
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
@ -400,43 +400,6 @@ FindUserProfileByInfo (
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
/**
|
||||
Find the credential provider in the specified identity policy.
|
||||
|
||||
@param[in] FindIdentity Point to the user identity policy.
|
||||
@param[in] IdentifyInfo Point to the user information to be searched.
|
||||
|
||||
@retval TRUE The credential provider was found in the identity policy.
|
||||
@retval FALSE The credential provider was not found.
|
||||
**/
|
||||
BOOLEAN
|
||||
FindProvider (
|
||||
IN EFI_USER_INFO_IDENTITY_POLICY *FindIdentity,
|
||||
IN CONST EFI_USER_INFO *IdentifyInfo
|
||||
)
|
||||
{
|
||||
UINTN TotalLen;
|
||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||
|
||||
//
|
||||
// Found the credential provider.
|
||||
//
|
||||
TotalLen = 0;
|
||||
while (TotalLen < IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO)) {
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (IdentifyInfo + 1) + TotalLen);
|
||||
if ((Identity->Type == FindIdentity->Type) &&
|
||||
(Identity->Length == FindIdentity->Length) &&
|
||||
CompareGuid ((EFI_GUID *) (Identity + 1), (EFI_GUID *) (FindIdentity + 1))
|
||||
) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
TotalLen += Identity->Length;
|
||||
}
|
||||
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Check whether the access policy is valid.
|
||||
@ -1009,119 +972,6 @@ ExpandUserProfile (
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Add or delete the user's credential record in the provider.
|
||||
|
||||
@param[in] ProviderGuid Point to credential provider guid or class guid.
|
||||
@param[in] ByType If TRUE, Provider is credential class guid.
|
||||
If FALSE, Provider is provider guid.
|
||||
@param[in] User Points to user profile.
|
||||
@param[in] Delete If TRUE, delete User from the provider; If FALSE, add
|
||||
User info from the provider.
|
||||
|
||||
@retval EFI_SUCCESS Add or delete record successfully.
|
||||
@retval Others Fail to add or delete record.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
ModifyProviderCredential (
|
||||
IN EFI_GUID *Provider,
|
||||
IN BOOLEAN ByType,
|
||||
IN USER_PROFILE_ENTRY *User,
|
||||
IN BOOLEAN Delete
|
||||
)
|
||||
{
|
||||
UINTN Index;
|
||||
EFI_USER_CREDENTIAL2_PROTOCOL *UserCredential;
|
||||
|
||||
if (Provider == NULL) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
//
|
||||
// Find the specified credential provider.
|
||||
//
|
||||
for (Index = 0; Index < mProviderDb->Count; Index++) {
|
||||
//
|
||||
// Check credential provider ID.
|
||||
//
|
||||
UserCredential = mProviderDb->Provider[Index];
|
||||
if (CompareGuid (&UserCredential->Identifier, Provider)) {
|
||||
if (Delete) {
|
||||
return UserCredential->Delete (UserCredential, User);
|
||||
} else {
|
||||
return UserCredential->Enroll (UserCredential, User);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Modify user's credential record in the providers.
|
||||
|
||||
Found the providers information in PolicyInfo, and then add or delete the user's credential
|
||||
record in the providers.
|
||||
|
||||
@param[in] User Points to user profile.
|
||||
@param[in] PolicyInfo Point to identification policy to be modified.
|
||||
@param[in] InfoLen The length of PolicyInfo.
|
||||
@param[in] Delete If TRUE, delete User from the provider; If FALSE, add
|
||||
User info from the provider.
|
||||
|
||||
@retval EFI_SUCCESS Modify PolicyInfo successfully.
|
||||
@retval Others Fail to modify PolicyInfo.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
ModifyCredentialInfo (
|
||||
IN USER_PROFILE_ENTRY *User,
|
||||
IN UINT8 *PolicyInfo,
|
||||
IN UINTN InfoLen,
|
||||
IN BOOLEAN Delete
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
UINTN TotalLen;
|
||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||
|
||||
//
|
||||
// Modify user's credential.
|
||||
//
|
||||
TotalLen = 0;
|
||||
while (TotalLen < InfoLen) {
|
||||
//
|
||||
// Check identification policy according to type.
|
||||
//
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (PolicyInfo + TotalLen);
|
||||
switch (Identity->Type) {
|
||||
case EFI_USER_INFO_IDENTITY_CREDENTIAL_TYPE:
|
||||
Status = ModifyProviderCredential ((EFI_GUID *) (Identity + 1), TRUE, User, Delete);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
break;
|
||||
|
||||
case EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER:
|
||||
Status = ModifyProviderCredential ((EFI_GUID *) (Identity + 1), FALSE, User, Delete);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
break;
|
||||
|
||||
default:
|
||||
break;
|
||||
}
|
||||
|
||||
TotalLen += Identity->Length;
|
||||
}
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Save the user profile to non-volatile memory, or delete it from non-volatile memory.
|
||||
|
||||
@ -1161,327 +1011,6 @@ SaveNvUserProfile (
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Replace the old identity info with NewInfo in NV Flash.
|
||||
|
||||
This function only replace the identity record in the user profile. Don't update
|
||||
the the information on the credential provider.
|
||||
|
||||
@param[in] User Point to the user profile.
|
||||
@param[in] NewInfo Point to the new identity policy info.
|
||||
@param[out] UserInfo Point to the new added identity info.
|
||||
|
||||
@retval EFI_SUCCESS Replace user identity successfully.
|
||||
@retval Others Fail to Replace user identity.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
SaveUserIpInfo (
|
||||
IN USER_PROFILE_ENTRY * User,
|
||||
IN CONST EFI_USER_INFO * NewInfo,
|
||||
OUT EFI_USER_INFO **UserInfo OPTIONAL
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_USER_INFO *OldIpInfo;
|
||||
UINTN Offset;
|
||||
UINTN NextOffset;
|
||||
|
||||
if ((NewInfo == NULL) || (User == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
//
|
||||
// Get user old identify policy information.
|
||||
//
|
||||
OldIpInfo = NULL;
|
||||
Status = FindUserInfoByType (User, &OldIpInfo, EFI_USER_INFO_IDENTITY_POLICY_RECORD);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
//
|
||||
// Get the old identity policy offset.
|
||||
//
|
||||
Status = FindUserInfo (User, &OldIpInfo, FALSE, &Offset);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
//
|
||||
// Delete the old identity policy information.
|
||||
//
|
||||
NextOffset = ALIGN_VARIABLE (OldIpInfo->InfoSize) + Offset;
|
||||
User->UserProfileSize -= ALIGN_VARIABLE (OldIpInfo->InfoSize);
|
||||
if (Offset < User->UserProfileSize) {
|
||||
CopyMem (User->ProfileInfo + Offset, User->ProfileInfo + NextOffset, User->UserProfileSize - Offset);
|
||||
}
|
||||
|
||||
//
|
||||
// Add new user information.
|
||||
//
|
||||
if (User->MaxProfileSize - User->UserProfileSize < ALIGN_VARIABLE (NewInfo->InfoSize)) {
|
||||
if (!ExpandUserProfile (User, ALIGN_VARIABLE (NewInfo->InfoSize))) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
}
|
||||
|
||||
CopyMem (User->ProfileInfo + User->UserProfileSize, (VOID *) NewInfo, NewInfo->InfoSize);
|
||||
if (UserInfo != NULL) {
|
||||
*UserInfo = (EFI_USER_INFO *) (User->ProfileInfo + User->UserProfileSize);
|
||||
}
|
||||
|
||||
User->UserProfileSize += ALIGN_VARIABLE (NewInfo->InfoSize);
|
||||
|
||||
//
|
||||
// Save user profile information.
|
||||
//
|
||||
Status = SaveNvUserProfile (User, FALSE);
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Remove the provider in FindIdentity from the user identification information record.
|
||||
|
||||
@param[in, out] NewInfo On entry, points to the user information to remove provider.
|
||||
On return, points to the user information the provider is removed.
|
||||
@param[in] FindIdentity Point to the user identity policy.
|
||||
|
||||
@retval TRUE The provider is removed successfully.
|
||||
@retval FALSE Fail to remove the provider.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
RemoveProvider (
|
||||
IN OUT EFI_USER_INFO **NewInfo,
|
||||
IN EFI_USER_INFO_IDENTITY_POLICY *FindIdentity
|
||||
)
|
||||
{
|
||||
UINTN TotalLen;
|
||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||
EFI_USER_INFO *IdentifyInfo;
|
||||
UINT8 *Buffer;
|
||||
|
||||
IdentifyInfo = *NewInfo;
|
||||
TotalLen = IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO);
|
||||
if (TotalLen == FindIdentity->Length) {
|
||||
//
|
||||
// Only one credential provider in the identification policy.
|
||||
// Set the new policy to be TRUE after removed the provider.
|
||||
//
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (IdentifyInfo + 1);
|
||||
Identity->Type = EFI_USER_INFO_IDENTITY_TRUE;
|
||||
Identity->Length = sizeof (EFI_USER_INFO_IDENTITY_POLICY);
|
||||
IdentifyInfo->InfoSize = sizeof (EFI_USER_INFO) + Identity->Length;
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
//
|
||||
// Found the credential provider.
|
||||
//
|
||||
TotalLen = 0;
|
||||
while (TotalLen < IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO)) {
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (IdentifyInfo + 1) + TotalLen);
|
||||
if ((Identity->Type == FindIdentity->Type) &&
|
||||
(Identity->Length == FindIdentity->Length) &&
|
||||
CompareGuid ((EFI_GUID *) (Identity + 1), (EFI_GUID *) (FindIdentity + 1))
|
||||
) {
|
||||
//
|
||||
// Found the credential provider to delete
|
||||
//
|
||||
if (Identity == (EFI_USER_INFO_IDENTITY_POLICY *)(IdentifyInfo + 1)) {
|
||||
//
|
||||
// It is the first item in the identification policy, delete it and the connector after it.
|
||||
//
|
||||
Buffer = (UINT8 *) Identity + Identity->Length + sizeof(EFI_USER_INFO_IDENTITY_POLICY);
|
||||
IdentifyInfo->InfoSize -= Identity->Length + sizeof(EFI_USER_INFO_IDENTITY_POLICY);
|
||||
TotalLen = IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO);
|
||||
CopyMem (Identity, Buffer, TotalLen);
|
||||
} else {
|
||||
//
|
||||
// It is not the first item in the identification policy, delete it and the connector before it.
|
||||
//
|
||||
Buffer = (UINT8 *) Identity + Identity->Length;
|
||||
TotalLen = IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO);
|
||||
TotalLen -= (Buffer - (UINT8 *)(IdentifyInfo + 1));
|
||||
IdentifyInfo->InfoSize -= Identity->Length + sizeof(EFI_USER_INFO_IDENTITY_POLICY);
|
||||
CopyMem ((UINT8 *) (Identity - 1), Buffer, TotalLen);
|
||||
}
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
TotalLen += Identity->Length;
|
||||
}
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
This function replaces the old identity policy with a new identity policy.
|
||||
|
||||
This function changes user identity policy information.
|
||||
If enroll new credential failed, recover the old identity policy.
|
||||
|
||||
For new policy:
|
||||
a. For each credential, if it is newly added, try to enroll it.
|
||||
If enroll failed, try to delete the newly added ones.
|
||||
|
||||
b. For each credential, if it exists in the old policy, delete old one,
|
||||
and enroll new one. If failed to enroll the new one, removed it from new
|
||||
identification policy.
|
||||
|
||||
For old policy:
|
||||
a. For each credential, if it does not exist in new one, delete it.
|
||||
|
||||
@param[in] User Point to the user profile.
|
||||
@param[in] Info Points to the user identity information.
|
||||
@param[in] InfoSize The size of Info (Not used in this function).
|
||||
@param[out] IpInfo The new identification info after modify.
|
||||
|
||||
@retval EFI_SUCCESS Modify user identity policy successfully.
|
||||
@retval Others Fail to modify user identity policy.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
ModifyUserIpInfo (
|
||||
IN USER_PROFILE_ENTRY *User,
|
||||
IN CONST EFI_USER_INFO *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT EFI_USER_INFO **IpInfo
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_USER_INFO *OldIpInfo;
|
||||
UINTN TotalLen;
|
||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||
UINT32 CredentialCount;
|
||||
EFI_USER_INFO *NewIpInfo;
|
||||
|
||||
//
|
||||
// Get user old identify policy information.
|
||||
//
|
||||
OldIpInfo = NULL;
|
||||
Status = FindUserInfoByType (User, &OldIpInfo, EFI_USER_INFO_IDENTITY_POLICY_RECORD);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
ASSERT (OldIpInfo != NULL);
|
||||
|
||||
//
|
||||
// Enroll new added credential provider.
|
||||
//
|
||||
CredentialCount = 0;
|
||||
TotalLen = 0;
|
||||
while (TotalLen < Info->InfoSize - sizeof (EFI_USER_INFO)) {
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (Info + 1) + TotalLen);
|
||||
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
||||
if (!FindProvider (Identity, OldIpInfo)) {
|
||||
//
|
||||
// The credential is NOT found in the old identity policy; add it.
|
||||
//
|
||||
Status = ModifyCredentialInfo (User, (UINT8 *) Identity, Identity->Length, FALSE);
|
||||
if (EFI_ERROR (Status)) {
|
||||
break;
|
||||
}
|
||||
CredentialCount++;
|
||||
}
|
||||
}
|
||||
|
||||
TotalLen += Identity->Length;
|
||||
}
|
||||
|
||||
if (EFI_ERROR (Status)) {
|
||||
//
|
||||
// Enroll new credential failed. Delete the newly enrolled credential, and return.
|
||||
//
|
||||
TotalLen = 0;
|
||||
while (TotalLen < Info->InfoSize - sizeof (EFI_USER_INFO)) {
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (Info + 1) + TotalLen);
|
||||
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
||||
if (!FindProvider (Identity, OldIpInfo)) {
|
||||
//
|
||||
// The credential is NOT found in the old identity policy. Delete it.
|
||||
//
|
||||
if (CredentialCount == 0) {
|
||||
break;
|
||||
}
|
||||
|
||||
ModifyCredentialInfo (User, (UINT8 *) Identity, Identity->Length, TRUE);
|
||||
CredentialCount--;
|
||||
}
|
||||
}
|
||||
TotalLen += Identity->Length;
|
||||
}
|
||||
|
||||
return EFI_DEVICE_ERROR;
|
||||
}
|
||||
|
||||
//
|
||||
// Backup new identification policy
|
||||
//
|
||||
NewIpInfo = AllocateCopyPool (Info->InfoSize, Info);
|
||||
ASSERT (NewIpInfo != NULL);
|
||||
|
||||
//
|
||||
// Enroll the credential that existed in the old identity policy.
|
||||
//
|
||||
TotalLen = 0;
|
||||
while (TotalLen < Info->InfoSize - sizeof (EFI_USER_INFO)) {
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (Info + 1) + TotalLen);
|
||||
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
||||
if (FindProvider (Identity, OldIpInfo)) {
|
||||
//
|
||||
// The credential is found in the old identity policy, so delete the old credential first.
|
||||
//
|
||||
Status = ModifyCredentialInfo (User, (UINT8 *) Identity, Identity->Length, TRUE);
|
||||
if (EFI_ERROR (Status)) {
|
||||
//
|
||||
// Failed to delete old credential.
|
||||
//
|
||||
FreePool (NewIpInfo);
|
||||
return EFI_DEVICE_ERROR;
|
||||
}
|
||||
|
||||
//
|
||||
// Add the new credential.
|
||||
//
|
||||
Status = ModifyCredentialInfo (User, (UINT8 *) Identity, Identity->Length, FALSE);
|
||||
if (EFI_ERROR (Status)) {
|
||||
//
|
||||
// Failed to enroll the user by new identification policy.
|
||||
// So removed the credential provider from the identification policy
|
||||
//
|
||||
RemoveProvider (&NewIpInfo, Identity);
|
||||
}
|
||||
}
|
||||
}
|
||||
TotalLen += Identity->Length;
|
||||
}
|
||||
|
||||
//
|
||||
// Delete old credential that didn't exist in the new identity policy.
|
||||
//
|
||||
TotalLen = 0;
|
||||
while (TotalLen < OldIpInfo->InfoSize - sizeof (EFI_USER_INFO)) {
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (OldIpInfo + 1) + TotalLen);
|
||||
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
||||
if (!FindProvider (Identity, Info)) {
|
||||
//
|
||||
// The credential is NOT found in the new identity policy. Delete the old credential.
|
||||
//
|
||||
ModifyCredentialInfo (User, (UINT8 *) Identity, Identity->Length, TRUE);
|
||||
}
|
||||
}
|
||||
TotalLen += Identity->Length;
|
||||
}
|
||||
|
||||
*IpInfo = NewIpInfo;
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Add one new user info into the user's profile.
|
||||
|
||||
@ -1528,21 +1057,6 @@ AddUserInfo (
|
||||
}
|
||||
}
|
||||
|
||||
//
|
||||
// Add credential.
|
||||
//
|
||||
if (((EFI_USER_INFO *) Info)->InfoType == EFI_USER_INFO_IDENTITY_POLICY_RECORD) {
|
||||
Status = ModifyCredentialInfo (
|
||||
User,
|
||||
(UINT8 *) ((EFI_USER_INFO *) Info + 1),
|
||||
InfoSize - sizeof (EFI_USER_INFO),
|
||||
FALSE
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
}
|
||||
|
||||
//
|
||||
// Add new user information.
|
||||
//
|
||||
@ -1681,11 +1195,6 @@ DelUserInfo (
|
||||
|
||||
if (Info->InfoType == EFI_USER_INFO_IDENTIFIER_RECORD) {
|
||||
return EFI_ACCESS_DENIED;
|
||||
} else if (Info->InfoType == EFI_USER_INFO_IDENTITY_POLICY_RECORD) {
|
||||
Status = ModifyCredentialInfo (User, (UINT8 *) (Info + 1), Info->InfoSize - sizeof (EFI_USER_INFO), TRUE);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
}
|
||||
|
||||
//
|
||||
@ -1731,7 +1240,6 @@ ModifyUserInfo (
|
||||
EFI_STATUS Status;
|
||||
UINTN PayloadLen;
|
||||
EFI_USER_INFO *OldInfo;
|
||||
EFI_USER_INFO *IpInfo;
|
||||
|
||||
if ((UserInfo == NULL) || (Info == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
@ -1833,25 +1341,6 @@ ModifyUserInfo (
|
||||
} while (TRUE);
|
||||
}
|
||||
|
||||
if (Info->InfoType == EFI_USER_INFO_IDENTITY_POLICY_RECORD) {
|
||||
//
|
||||
// For user identification policy, need to update the info in credential provider.
|
||||
//
|
||||
IpInfo = NULL;
|
||||
Status = ModifyUserIpInfo (User, Info, InfoSize, &IpInfo);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
ASSERT (IpInfo != NULL);
|
||||
Status = SaveUserIpInfo (User, IpInfo, UserInfo);
|
||||
if (IpInfo->InfoSize != Info->InfoSize) {
|
||||
Status = EFI_DEVICE_ERROR;
|
||||
}
|
||||
FreePool (IpInfo);
|
||||
return Status;
|
||||
}
|
||||
|
||||
Status = DelUserInfo (User, *UserInfo, FALSE);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
@ -1877,7 +1366,6 @@ DelUserProfile (
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
UINTN Index;
|
||||
EFI_USER_INFO *UserInfo;
|
||||
|
||||
//
|
||||
// Check whether it is in the user profile database.
|
||||
@ -1894,18 +1382,6 @@ DelUserProfile (
|
||||
return EFI_ACCESS_DENIED;
|
||||
}
|
||||
|
||||
//
|
||||
// Delete user credential information.
|
||||
//
|
||||
UserInfo = NULL;
|
||||
Status = FindUserInfoByType (User, &UserInfo, EFI_USER_INFO_IDENTITY_POLICY_RECORD);
|
||||
if (Status == EFI_SUCCESS) {
|
||||
Status = DelUserInfo (User, UserInfo, FALSE);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
}
|
||||
|
||||
//
|
||||
// Delete user profile from the non-volatile memory.
|
||||
//
|
||||
@ -4028,6 +3504,8 @@ UserProfileGetInfo (
|
||||
This function changes user information. If NULL is pointed to by UserInfo, then a new user
|
||||
information record is created and its handle is returned in UserInfo. Otherwise, the existing
|
||||
one is replaced.
|
||||
If EFI_USER_INFO_IDENITTY_POLICY_RECORD is changed, it is the caller's responsibility to keep
|
||||
it to be synced with the information on credential providers.
|
||||
If EFI_USER_INFO_EXCLUSIVE is specified in Info and a user information record of the same
|
||||
type already exists in the user profile, then EFI_ACCESS_DENIED will be returned and UserInfo
|
||||
will point to the handle of the existing record.
|
||||
@ -4116,12 +3594,15 @@ UserProfileSetInfo (
|
||||
Called by credential provider to notify of information change.
|
||||
|
||||
This function allows the credential provider to notify the User Identity Manager when user status
|
||||
has changed while deselected.
|
||||
has changed.
|
||||
If the User Identity Manager doesn't support asynchronous changes in credentials, then this function
|
||||
should return EFI_UNSUPPORTED.
|
||||
If the User Identity Manager supports this, it will call User() to get the user identifier and then
|
||||
GetNextInfo() and GetInfo() in the User Credential Protocol to get all of the information from the
|
||||
credential and add it.
|
||||
If current user does not exist, and the credential provider can identify a user, then make the user
|
||||
to be current user and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
|
||||
If current user already exists, and the credential provider can identify another user, then switch
|
||||
current user to the newly identified user, and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
|
||||
If current user was identified by this credential provider and now the credential provider cannot identify
|
||||
current user, then logout current user and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
|
||||
|
||||
@param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
|
||||
@param[in] Changed Handle on which is installed an instance of the EFI_USER_CREDENTIAL2_PROTOCOL
|
||||
@ -4138,102 +3619,8 @@ UserProfileNotify (
|
||||
IN CONST EFI_USER_MANAGER_PROTOCOL *This,
|
||||
IN EFI_HANDLE Changed
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_USER_CREDENTIAL2_PROTOCOL *Provider;
|
||||
EFI_USER_INFO_IDENTIFIER UserId;
|
||||
EFI_USER_INFO_HANDLE UserInfo;
|
||||
EFI_USER_INFO_HANDLE UserInfo2;
|
||||
UINTN InfoSize;
|
||||
EFI_USER_INFO *Info;
|
||||
USER_PROFILE_ENTRY *User;
|
||||
|
||||
if (This == NULL) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
Status = gBS->HandleProtocol (
|
||||
Changed,
|
||||
&gEfiUserCredential2ProtocolGuid,
|
||||
(VOID **) &Provider
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
Status = Provider->User (Provider, NULL, &UserId);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return EFI_NOT_READY;
|
||||
}
|
||||
|
||||
//
|
||||
// Find user with the UserId.
|
||||
//
|
||||
User = NULL;
|
||||
while (TRUE) {
|
||||
//
|
||||
// Find next user profile.
|
||||
//
|
||||
Status = FindUserProfile (&User, TRUE, NULL);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
//
|
||||
// Find the user information.
|
||||
//
|
||||
Info = NULL;
|
||||
FindUserInfoByType (User, &Info, EFI_USER_INFO_IDENTIFIER_RECORD);
|
||||
if (CompareMem ((UINT8 *) (Info + 1), UserId, sizeof (UserId)) == 0) {
|
||||
//
|
||||
// Found the infomation record.
|
||||
//
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
UserInfo = NULL;
|
||||
do {
|
||||
//
|
||||
// Get user info handle.
|
||||
//
|
||||
Status = Provider->GetNextInfo(Provider, &UserInfo);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
//
|
||||
// Get the user information from the user info handle.
|
||||
//
|
||||
InfoSize = 0;
|
||||
Status = Provider->GetInfo(Provider, UserInfo, NULL, &InfoSize);
|
||||
if (EFI_ERROR (Status)) {
|
||||
if (Status == EFI_BUFFER_TOO_SMALL) {
|
||||
Info = AllocateZeroPool (InfoSize);
|
||||
if (Info == NULL) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
Status = Provider->GetInfo(Provider, UserInfo, Info, &InfoSize);
|
||||
if (EFI_ERROR (Status)) {
|
||||
FreePool (Info);
|
||||
break;
|
||||
}
|
||||
}
|
||||
break;
|
||||
}
|
||||
|
||||
//
|
||||
// Save the user information.
|
||||
//
|
||||
UserInfo2 = NULL;
|
||||
Status = UserProfileSetInfo (&gUserIdentifyManager, (EFI_USER_PROFILE_HANDLE)User, &UserInfo2, Info, InfoSize);
|
||||
FreePool (Info);
|
||||
if (EFI_ERROR (Status)) {
|
||||
break;
|
||||
}
|
||||
} while (TRUE);
|
||||
|
||||
return Status;
|
||||
{
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
||||
|
||||
|
@ -0,0 +1,702 @@
|
||||
/** @file
|
||||
The functions for access policy modification.
|
||||
|
||||
Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#include "UserProfileManager.h"
|
||||
|
||||
/**
|
||||
Collect all the access policy data to mUserInfo.AccessPolicy,
|
||||
and save it to user profile.
|
||||
|
||||
**/
|
||||
VOID
|
||||
SaveAccessPolicy (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
UINTN OffSet;
|
||||
UINTN Size;
|
||||
EFI_USER_INFO_ACCESS_CONTROL Control;
|
||||
EFI_USER_INFO_HANDLE UserInfo;
|
||||
EFI_USER_INFO *Info;
|
||||
|
||||
if (mUserInfo.AccessPolicy != NULL) {
|
||||
FreePool (mUserInfo.AccessPolicy);
|
||||
}
|
||||
mUserInfo.AccessPolicy = NULL;
|
||||
mUserInfo.AccessPolicyLen = 0;
|
||||
mUserInfo.AccessPolicyModified = TRUE;
|
||||
OffSet = 0;
|
||||
|
||||
//
|
||||
// Save access right.
|
||||
//
|
||||
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL);
|
||||
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||
ExpandMemory (OffSet, Size);
|
||||
}
|
||||
|
||||
Control.Type = mAccessInfo.AccessRight;
|
||||
Control.Size = (UINT32) Size;
|
||||
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||
OffSet += sizeof (Control);
|
||||
|
||||
//
|
||||
// Save access setup.
|
||||
//
|
||||
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + sizeof (EFI_GUID);
|
||||
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||
ExpandMemory (OffSet, Size);
|
||||
}
|
||||
|
||||
Control.Type = EFI_USER_INFO_ACCESS_SETUP;
|
||||
Control.Size = (UINT32) Size;
|
||||
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||
OffSet += sizeof (Control);
|
||||
|
||||
if (mAccessInfo.AccessSetup == ACCESS_SETUP_NORMAL) {
|
||||
CopyGuid ((EFI_GUID *) (mUserInfo.AccessPolicy + OffSet), &gEfiUserInfoAccessSetupNormalGuid);
|
||||
} else if (mAccessInfo.AccessSetup == ACCESS_SETUP_RESTRICTED) {
|
||||
CopyGuid ((EFI_GUID *) (mUserInfo.AccessPolicy + OffSet), &gEfiUserInfoAccessSetupRestrictedGuid);
|
||||
} else if (mAccessInfo.AccessSetup == ACCESS_SETUP_ADMIN) {
|
||||
CopyGuid ((EFI_GUID *) (mUserInfo.AccessPolicy + OffSet), &gEfiUserInfoAccessSetupAdminGuid);
|
||||
}
|
||||
OffSet += sizeof (EFI_GUID);
|
||||
|
||||
//
|
||||
// Save access of boot order.
|
||||
//
|
||||
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + sizeof (UINT32);
|
||||
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||
ExpandMemory (OffSet, Size);
|
||||
}
|
||||
|
||||
Control.Type = EFI_USER_INFO_ACCESS_BOOT_ORDER;
|
||||
Control.Size = (UINT32) Size;
|
||||
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||
OffSet += sizeof (Control);
|
||||
|
||||
CopyMem ((UINT8 *) (mUserInfo.AccessPolicy + OffSet), &mAccessInfo.AccessBootOrder, sizeof (UINT32));
|
||||
OffSet += sizeof (UINT32);
|
||||
|
||||
//
|
||||
// Save permit load.
|
||||
//
|
||||
if (mAccessInfo.LoadPermitLen > 0) {
|
||||
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + mAccessInfo.LoadPermitLen;
|
||||
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||
ExpandMemory (OffSet, Size);
|
||||
}
|
||||
|
||||
Control.Type = EFI_USER_INFO_ACCESS_PERMIT_LOAD;
|
||||
Control.Size = (UINT32) Size;
|
||||
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||
OffSet += sizeof (Control);
|
||||
|
||||
CopyMem (mUserInfo.AccessPolicy + OffSet, mAccessInfo.LoadPermit, mAccessInfo.LoadPermitLen);
|
||||
OffSet += mAccessInfo.LoadPermitLen;
|
||||
}
|
||||
|
||||
//
|
||||
// Save forbid load.
|
||||
//
|
||||
if (mAccessInfo.LoadForbidLen > 0) {
|
||||
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + mAccessInfo.LoadForbidLen;
|
||||
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||
ExpandMemory (OffSet, Size);
|
||||
}
|
||||
|
||||
Control.Type = EFI_USER_INFO_ACCESS_FORBID_LOAD;
|
||||
Control.Size = (UINT32) Size;
|
||||
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||
OffSet += sizeof (Control);
|
||||
|
||||
CopyMem (mUserInfo.AccessPolicy + OffSet, mAccessInfo.LoadForbid, mAccessInfo.LoadForbidLen);
|
||||
OffSet += mAccessInfo.LoadForbidLen;
|
||||
}
|
||||
|
||||
//
|
||||
// Save permit connect.
|
||||
//
|
||||
if (mAccessInfo.ConnectPermitLen > 0) {
|
||||
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + mAccessInfo.ConnectPermitLen;
|
||||
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||
ExpandMemory (OffSet, Size);
|
||||
}
|
||||
|
||||
Control.Type = EFI_USER_INFO_ACCESS_PERMIT_CONNECT;
|
||||
Control.Size = (UINT32) Size;
|
||||
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||
OffSet += sizeof (Control);
|
||||
|
||||
CopyMem (mUserInfo.AccessPolicy + OffSet, mAccessInfo.ConnectPermit, mAccessInfo.ConnectPermitLen);
|
||||
OffSet += mAccessInfo.ConnectPermitLen;
|
||||
}
|
||||
|
||||
//
|
||||
// Save forbid connect.
|
||||
//
|
||||
if (mAccessInfo.ConnectForbidLen > 0) {
|
||||
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + mAccessInfo.ConnectForbidLen;
|
||||
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||
ExpandMemory (OffSet, Size);
|
||||
}
|
||||
|
||||
Control.Type = EFI_USER_INFO_ACCESS_FORBID_CONNECT;
|
||||
Control.Size = (UINT32) Size;
|
||||
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||
OffSet += sizeof (Control);
|
||||
|
||||
CopyMem (mUserInfo.AccessPolicy + OffSet, mAccessInfo.ConnectForbid, mAccessInfo.ConnectForbidLen);
|
||||
OffSet += mAccessInfo.ConnectForbidLen;
|
||||
}
|
||||
|
||||
mUserInfo.AccessPolicyLen = OffSet;
|
||||
|
||||
//
|
||||
// Save access policy.
|
||||
//
|
||||
if (mUserInfo.AccessPolicyModified && (mUserInfo.AccessPolicyLen > 0)) {
|
||||
Info = AllocateZeroPool (sizeof (EFI_USER_INFO) + mUserInfo.AccessPolicyLen);
|
||||
if (Info == NULL) {
|
||||
return ;
|
||||
}
|
||||
|
||||
Status = FindInfoByType (mModifyUser, EFI_USER_INFO_ACCESS_POLICY_RECORD, &UserInfo);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
Info->InfoType = EFI_USER_INFO_ACCESS_POLICY_RECORD;
|
||||
Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV |
|
||||
EFI_USER_INFO_PUBLIC |
|
||||
EFI_USER_INFO_EXCLUSIVE;
|
||||
Info->InfoSize = (UINT32) (sizeof (EFI_USER_INFO) + mUserInfo.AccessPolicyLen);
|
||||
CopyMem ((UINT8 *) (Info + 1), mUserInfo.AccessPolicy, mUserInfo.AccessPolicyLen);
|
||||
Status = mUserManager->SetInfo (
|
||||
mUserManager,
|
||||
mModifyUser,
|
||||
&UserInfo,
|
||||
Info,
|
||||
Info->InfoSize
|
||||
);
|
||||
mUserInfo.AccessPolicyModified = FALSE;
|
||||
}
|
||||
FreePool (Info);
|
||||
}
|
||||
|
||||
if (mAccessInfo.ConnectForbid != NULL) {
|
||||
FreePool (mAccessInfo.ConnectForbid);
|
||||
mAccessInfo.ConnectForbid = NULL;
|
||||
}
|
||||
|
||||
if (mAccessInfo.ConnectPermit != NULL) {
|
||||
FreePool (mAccessInfo.ConnectPermit);
|
||||
mAccessInfo.ConnectPermit = NULL;
|
||||
}
|
||||
|
||||
if (mAccessInfo.LoadForbid != NULL) {
|
||||
FreePool (mAccessInfo.LoadForbid);
|
||||
mAccessInfo.LoadForbid = NULL;
|
||||
}
|
||||
|
||||
if (mAccessInfo.LoadPermit != NULL) {
|
||||
FreePool (mAccessInfo.LoadPermit);
|
||||
mAccessInfo.LoadPermit = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
Create an action OpCode with QuestionID and DevicePath on a given OpCodeHandle.
|
||||
|
||||
@param[in] QuestionID The question ID.
|
||||
@param[in] DevicePath Points to device path.
|
||||
@param[in] OpCodeHandle Points to container for dynamic created opcodes.
|
||||
|
||||
**/
|
||||
VOID
|
||||
AddDevicePath (
|
||||
IN UINTN QuestionID,
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *DevicePath,
|
||||
IN VOID *OpCodeHandle
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_DEVICE_PATH_PROTOCOL *Next;
|
||||
EFI_STRING_ID NameID;
|
||||
EFI_STRING DriverName;
|
||||
EFI_DEVICE_PATH_TO_TEXT_PROTOCOL *DevicePathText;
|
||||
|
||||
//
|
||||
// Locate device path to text protocol.
|
||||
//
|
||||
Status = gBS->LocateProtocol (
|
||||
&gEfiDevicePathToTextProtocolGuid,
|
||||
NULL,
|
||||
(VOID **) &DevicePathText
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return ;
|
||||
}
|
||||
|
||||
//
|
||||
// Get driver file name node.
|
||||
//
|
||||
Next = DevicePath;
|
||||
while (!IsDevicePathEnd (Next)) {
|
||||
DevicePath = Next;
|
||||
Next = NextDevicePathNode (Next);
|
||||
}
|
||||
|
||||
//
|
||||
// Display the device path in form.
|
||||
//
|
||||
DriverName = DevicePathText->ConvertDevicePathToText (DevicePath, FALSE, FALSE);
|
||||
NameID = HiiSetString (mCallbackInfo->HiiHandle, 0, DriverName, NULL);
|
||||
FreePool (DriverName);
|
||||
if (NameID == 0) {
|
||||
return ;
|
||||
}
|
||||
|
||||
HiiCreateActionOpCode (
|
||||
OpCodeHandle, // Container for dynamic created opcodes
|
||||
(UINT16) QuestionID, // Question ID
|
||||
NameID, // Prompt text
|
||||
STRING_TOKEN (STR_NULL_STRING), // Help text
|
||||
EFI_IFR_FLAG_CALLBACK, // Question flag
|
||||
0 // Action String ID
|
||||
);
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Check whether the DevicePath is in the device path forbid list
|
||||
(mAccessInfo.LoadForbid).
|
||||
|
||||
@param[in] DevicePath Points to device path.
|
||||
|
||||
@retval TRUE The DevicePath is in the device path forbid list.
|
||||
@retval FALSE The DevicePath is not in the device path forbid list.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
IsLoadForbidden (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *DevicePath
|
||||
)
|
||||
{
|
||||
UINTN OffSet;
|
||||
UINTN DPSize;
|
||||
UINTN Size;
|
||||
EFI_DEVICE_PATH_PROTOCOL *Dp;
|
||||
|
||||
OffSet = 0;
|
||||
Size = GetDevicePathSize (DevicePath);
|
||||
//
|
||||
// Check each device path.
|
||||
//
|
||||
while (OffSet < mAccessInfo.LoadForbidLen) {
|
||||
Dp = (EFI_DEVICE_PATH_PROTOCOL *) (mAccessInfo.LoadForbid + OffSet);
|
||||
DPSize = GetDevicePathSize (Dp);
|
||||
//
|
||||
// Compare device path.
|
||||
//
|
||||
if ((DPSize == Size) && (CompareMem (DevicePath, Dp, Size) == 0)) {
|
||||
return TRUE;
|
||||
}
|
||||
OffSet += DPSize;
|
||||
}
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Display the permit load device path in the loadable device path list.
|
||||
|
||||
**/
|
||||
VOID
|
||||
DisplayLoadPermit(
|
||||
VOID
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
CHAR16 *Order;
|
||||
UINTN OrderSize;
|
||||
UINTN ListCount;
|
||||
UINTN Index;
|
||||
UINT8 *Var;
|
||||
UINT8 *VarPtr;
|
||||
CHAR16 VarName[12];
|
||||
VOID *StartOpCodeHandle;
|
||||
VOID *EndOpCodeHandle;
|
||||
EFI_IFR_GUID_LABEL *StartLabel;
|
||||
EFI_IFR_GUID_LABEL *EndLabel;
|
||||
|
||||
//
|
||||
// Get DriverOrder.
|
||||
//
|
||||
OrderSize = 0;
|
||||
Status = gRT->GetVariable (
|
||||
L"DriverOrder",
|
||||
&gEfiGlobalVariableGuid,
|
||||
NULL,
|
||||
&OrderSize,
|
||||
NULL
|
||||
);
|
||||
if (Status != EFI_BUFFER_TOO_SMALL) {
|
||||
return ;
|
||||
}
|
||||
|
||||
Order = AllocateZeroPool (OrderSize);
|
||||
if (Order == NULL) {
|
||||
return ;
|
||||
}
|
||||
|
||||
Status = gRT->GetVariable (
|
||||
L"DriverOrder",
|
||||
&gEfiGlobalVariableGuid,
|
||||
NULL,
|
||||
&OrderSize,
|
||||
Order
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return ;
|
||||
}
|
||||
|
||||
//
|
||||
// Initialize the container for dynamic opcodes.
|
||||
//
|
||||
StartOpCodeHandle = HiiAllocateOpCodeHandle ();
|
||||
ASSERT (StartOpCodeHandle != NULL);
|
||||
|
||||
EndOpCodeHandle = HiiAllocateOpCodeHandle ();
|
||||
ASSERT (EndOpCodeHandle != NULL);
|
||||
|
||||
//
|
||||
// Create Hii Extend Label OpCode.
|
||||
//
|
||||
StartLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
|
||||
StartOpCodeHandle,
|
||||
&gEfiIfrTianoGuid,
|
||||
NULL,
|
||||
sizeof (EFI_IFR_GUID_LABEL)
|
||||
);
|
||||
StartLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||
StartLabel->Number = LABEL_PERMIT_LOAD_FUNC;
|
||||
|
||||
EndLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
|
||||
EndOpCodeHandle,
|
||||
&gEfiIfrTianoGuid,
|
||||
NULL,
|
||||
sizeof (EFI_IFR_GUID_LABEL)
|
||||
);
|
||||
EndLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||
EndLabel->Number = LABEL_END;
|
||||
|
||||
//
|
||||
// Add each driver option.
|
||||
//
|
||||
Var = NULL;
|
||||
ListCount = OrderSize / sizeof (UINT16);
|
||||
for (Index = 0; Index < ListCount; Index++) {
|
||||
//
|
||||
// Get driver device path.
|
||||
//
|
||||
UnicodeSPrint (VarName, sizeof (VarName), L"Driver%04x", Order[Index]);
|
||||
Var = GetEfiGlobalVariable (VarName);
|
||||
if (Var == NULL) {
|
||||
continue;
|
||||
}
|
||||
|
||||
//
|
||||
// Check whether the driver is already forbidden.
|
||||
//
|
||||
|
||||
VarPtr = Var;
|
||||
//
|
||||
// Skip attribute.
|
||||
//
|
||||
VarPtr += sizeof (UINT32);
|
||||
|
||||
//
|
||||
// Skip device path lenth.
|
||||
//
|
||||
VarPtr += sizeof (UINT16);
|
||||
|
||||
//
|
||||
// Skip descript string.
|
||||
//
|
||||
VarPtr += StrSize ((UINT16 *) VarPtr);
|
||||
|
||||
if (IsLoadForbidden ((EFI_DEVICE_PATH_PROTOCOL *) VarPtr)) {
|
||||
FreePool (Var);
|
||||
Var = NULL;
|
||||
continue;
|
||||
}
|
||||
|
||||
AddDevicePath (
|
||||
KEY_MODIFY_USER | KEY_MODIFY_AP_DP | KEY_LOAD_PERMIT_MODIFY | Order[Index],
|
||||
(EFI_DEVICE_PATH_PROTOCOL *) VarPtr,
|
||||
StartOpCodeHandle
|
||||
);
|
||||
FreePool (Var);
|
||||
Var = NULL;
|
||||
}
|
||||
|
||||
HiiUpdateForm (
|
||||
mCallbackInfo->HiiHandle, // HII handle
|
||||
&gUserProfileManagerGuid, // Formset GUID
|
||||
FORMID_PERMIT_LOAD_DP, // Form ID
|
||||
StartOpCodeHandle, // Label for where to insert opcodes
|
||||
EndOpCodeHandle // Replace data
|
||||
);
|
||||
|
||||
HiiFreeOpCodeHandle (StartOpCodeHandle);
|
||||
HiiFreeOpCodeHandle (EndOpCodeHandle);
|
||||
|
||||
//
|
||||
// Clear Environment.
|
||||
//
|
||||
if (Var != NULL) {
|
||||
FreePool (Var);
|
||||
}
|
||||
FreePool (Order);
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Display the forbid load device path list (mAccessInfo.LoadForbid).
|
||||
|
||||
**/
|
||||
VOID
|
||||
DisplayLoadForbid (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
UINTN Offset;
|
||||
UINTN DPSize;
|
||||
UINTN Index;
|
||||
EFI_DEVICE_PATH_PROTOCOL *Dp;
|
||||
VOID *StartOpCodeHandle;
|
||||
VOID *EndOpCodeHandle;
|
||||
EFI_IFR_GUID_LABEL *StartLabel;
|
||||
EFI_IFR_GUID_LABEL *EndLabel;
|
||||
|
||||
//
|
||||
// Initialize the container for dynamic opcodes.
|
||||
//
|
||||
StartOpCodeHandle = HiiAllocateOpCodeHandle ();
|
||||
ASSERT (StartOpCodeHandle != NULL);
|
||||
|
||||
EndOpCodeHandle = HiiAllocateOpCodeHandle ();
|
||||
ASSERT (EndOpCodeHandle != NULL);
|
||||
|
||||
//
|
||||
// Create Hii Extend Label OpCode.
|
||||
//
|
||||
StartLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
|
||||
StartOpCodeHandle,
|
||||
&gEfiIfrTianoGuid,
|
||||
NULL,
|
||||
sizeof (EFI_IFR_GUID_LABEL)
|
||||
);
|
||||
StartLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||
StartLabel->Number = LABLE_FORBID_LOAD_FUNC;
|
||||
|
||||
EndLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
|
||||
EndOpCodeHandle,
|
||||
&gEfiIfrTianoGuid,
|
||||
NULL,
|
||||
sizeof (EFI_IFR_GUID_LABEL)
|
||||
);
|
||||
EndLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||
EndLabel->Number = LABEL_END;
|
||||
|
||||
//
|
||||
// Add each forbid load drivers.
|
||||
//
|
||||
Offset = 0;
|
||||
Index = 0;
|
||||
while (Offset < mAccessInfo.LoadForbidLen) {
|
||||
Dp = (EFI_DEVICE_PATH_PROTOCOL *) (mAccessInfo.LoadForbid + Offset);
|
||||
DPSize = GetDevicePathSize (Dp);
|
||||
AddDevicePath (
|
||||
KEY_MODIFY_USER | KEY_MODIFY_AP_DP | KEY_LOAD_FORBID_MODIFY | Index,
|
||||
Dp,
|
||||
StartOpCodeHandle
|
||||
);
|
||||
Index++;
|
||||
Offset += DPSize;
|
||||
}
|
||||
|
||||
HiiUpdateForm (
|
||||
mCallbackInfo->HiiHandle, // HII handle
|
||||
&gUserProfileManagerGuid, // Formset GUID
|
||||
FORMID_FORBID_LOAD_DP, // Form ID
|
||||
StartOpCodeHandle, // Label for where to insert opcodes
|
||||
EndOpCodeHandle // Replace data
|
||||
);
|
||||
|
||||
HiiFreeOpCodeHandle (StartOpCodeHandle);
|
||||
HiiFreeOpCodeHandle (EndOpCodeHandle);
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Display the permit connect device path.
|
||||
|
||||
**/
|
||||
VOID
|
||||
DisplayConnectPermit (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
//
|
||||
// Note:
|
||||
// As no architect protocol/interface to be called in ConnectController()
|
||||
// to verify the device path, just add a place holder for permitted connect
|
||||
// device path.
|
||||
//
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Display the forbid connect device path list.
|
||||
|
||||
**/
|
||||
VOID
|
||||
DisplayConnectForbid (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
//
|
||||
// Note:
|
||||
// As no architect protocol/interface to be called in ConnectController()
|
||||
// to verify the device path, just add a place holder for forbidden connect
|
||||
// device path.
|
||||
//
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Delete the specified device path by DriverIndex from the forbid device path
|
||||
list (mAccessInfo.LoadForbid).
|
||||
|
||||
@param[in] DriverIndex The index of driver in forbidden device path list.
|
||||
|
||||
**/
|
||||
VOID
|
||||
DeleteFromForbidLoad (
|
||||
IN UINT16 DriverIndex
|
||||
)
|
||||
{
|
||||
UINTN OffSet;
|
||||
UINTN DPSize;
|
||||
UINTN OffLen;
|
||||
EFI_DEVICE_PATH_PROTOCOL *Dp;
|
||||
|
||||
OffSet = 0;
|
||||
//
|
||||
// Find the specified device path.
|
||||
//
|
||||
while ((OffSet < mAccessInfo.LoadForbidLen) && (DriverIndex > 0)) {
|
||||
Dp = (EFI_DEVICE_PATH_PROTOCOL *) (mAccessInfo.LoadForbid + OffSet);
|
||||
DPSize = GetDevicePathSize (Dp);
|
||||
OffSet += DPSize;
|
||||
DriverIndex--;
|
||||
}
|
||||
|
||||
//
|
||||
// Specified device path found.
|
||||
//
|
||||
if (DriverIndex == 0) {
|
||||
Dp = (EFI_DEVICE_PATH_PROTOCOL *) (mAccessInfo.LoadForbid + OffSet);
|
||||
DPSize = GetDevicePathSize (Dp);
|
||||
OffLen = mAccessInfo.LoadForbidLen - OffSet - DPSize;
|
||||
if (OffLen > 0) {
|
||||
CopyMem (
|
||||
mAccessInfo.LoadForbid + OffSet,
|
||||
mAccessInfo.LoadForbid + OffSet + DPSize,
|
||||
OffLen
|
||||
);
|
||||
}
|
||||
mAccessInfo.LoadForbidLen -= DPSize;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Add the specified device path by DriverIndex to the forbid device path
|
||||
list (mAccessInfo.LoadForbid).
|
||||
|
||||
@param[in] DriverIndex The index of driver saved in driver options.
|
||||
|
||||
**/
|
||||
VOID
|
||||
AddToForbidLoad (
|
||||
IN UINT16 DriverIndex
|
||||
)
|
||||
{
|
||||
UINTN DevicePathLen;
|
||||
UINT8 *Var;
|
||||
UINT8 *VarPtr;
|
||||
UINTN NewLen;
|
||||
UINT8 *NewFL;
|
||||
CHAR16 VarName[13];
|
||||
|
||||
//
|
||||
// Get loadable driver device path.
|
||||
//
|
||||
UnicodeSPrint (VarName, sizeof (VarName), L"Driver%04x", DriverIndex);
|
||||
Var = GetEfiGlobalVariable (VarName);
|
||||
if (Var == NULL) {
|
||||
return;
|
||||
}
|
||||
|
||||
//
|
||||
// Save forbid load driver.
|
||||
//
|
||||
|
||||
VarPtr = Var;
|
||||
//
|
||||
// Skip attribute.
|
||||
//
|
||||
VarPtr += sizeof (UINT32);
|
||||
|
||||
DevicePathLen = *(UINT16 *) VarPtr;
|
||||
//
|
||||
// Skip device path length.
|
||||
//
|
||||
VarPtr += sizeof (UINT16);
|
||||
|
||||
//
|
||||
// Skip description string.
|
||||
//
|
||||
VarPtr += StrSize ((UINT16 *) VarPtr);
|
||||
|
||||
NewLen = mAccessInfo.LoadForbidLen + DevicePathLen;
|
||||
NewFL = AllocateZeroPool (NewLen);
|
||||
if (NewFL == NULL) {
|
||||
FreePool (Var);
|
||||
return ;
|
||||
}
|
||||
|
||||
if (mAccessInfo.LoadForbidLen > 0) {
|
||||
CopyMem (NewFL, mAccessInfo.LoadForbid, mAccessInfo.LoadForbidLen);
|
||||
FreePool (mAccessInfo.LoadForbid);
|
||||
}
|
||||
|
||||
CopyMem (NewFL + mAccessInfo.LoadForbidLen, VarPtr, DevicePathLen);
|
||||
mAccessInfo.LoadForbidLen = NewLen;
|
||||
mAccessInfo.LoadForbid = NewFL;
|
||||
FreePool (Var);
|
||||
}
|
||||
|
||||
|
@ -0,0 +1,518 @@
|
||||
/** @file
|
||||
The functions for identification policy modification.
|
||||
|
||||
Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#include "UserProfileManager.h"
|
||||
|
||||
|
||||
/**
|
||||
Verify the new identity policy in the current implementation. The same credential
|
||||
provider can't appear twice in one identity policy.
|
||||
|
||||
@param[in] NewGuid Points to the credential provider guid.
|
||||
|
||||
@retval TRUE The NewGuid was found in the identity policy.
|
||||
@retval FALSE The NewGuid was not found.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
ProviderAlreadyInPolicy (
|
||||
IN EFI_GUID *NewGuid
|
||||
)
|
||||
{
|
||||
UINTN Offset;
|
||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||
EFI_INPUT_KEY Key;
|
||||
|
||||
Offset = 0;
|
||||
while (Offset < mUserInfo.NewIdentityPolicyLen) {
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (mUserInfo.NewIdentityPolicy + Offset);
|
||||
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
||||
if (CompareGuid (NewGuid, (EFI_GUID *) (Identity + 1))) {
|
||||
CreatePopUp (
|
||||
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||
&Key,
|
||||
L"This Credential Provider Are Already Used!",
|
||||
L"",
|
||||
L"Press Any Key to Continue ...",
|
||||
NULL
|
||||
);
|
||||
return TRUE;
|
||||
}
|
||||
}
|
||||
Offset += Identity->Length;
|
||||
}
|
||||
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Add or delete the user's credential record in the provider.
|
||||
|
||||
@param[in] ProviderGuid Point to credential provider guid.
|
||||
@param[in] User Points to user profile.
|
||||
|
||||
@retval EFI_SUCCESS Add or delete record successfully.
|
||||
@retval Others Fail to add or delete record.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EnrollUserOnProvider (
|
||||
IN EFI_USER_INFO_IDENTITY_POLICY *Identity,
|
||||
IN EFI_USER_PROFILE_HANDLE User
|
||||
)
|
||||
{
|
||||
UINTN Index;
|
||||
EFI_USER_CREDENTIAL2_PROTOCOL *UserCredential;
|
||||
|
||||
//
|
||||
// Find the specified credential provider.
|
||||
//
|
||||
for (Index = 0; Index < mProviderInfo->Count; Index++) {
|
||||
UserCredential = mProviderInfo->Provider[Index];
|
||||
if (CompareGuid ((EFI_GUID *)(Identity + 1), &UserCredential->Identifier)) {
|
||||
return UserCredential->Enroll (UserCredential, User);
|
||||
}
|
||||
}
|
||||
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Delete the User's credential record on the provider.
|
||||
|
||||
@param[in] Identity Point to EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER user info.
|
||||
@param[in] User Points to user profile.
|
||||
|
||||
@retval EFI_SUCCESS Delete User's credential record successfully.
|
||||
@retval Others Fail to add or delete record.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
DeleteUserOnProvider (
|
||||
IN EFI_USER_INFO_IDENTITY_POLICY *Identity,
|
||||
IN EFI_USER_PROFILE_HANDLE User
|
||||
)
|
||||
{
|
||||
UINTN Index;
|
||||
EFI_USER_CREDENTIAL2_PROTOCOL *UserCredential;
|
||||
|
||||
//
|
||||
// Find the specified credential provider.
|
||||
//
|
||||
for (Index = 0; Index < mProviderInfo->Count; Index++) {
|
||||
UserCredential = mProviderInfo->Provider[Index];
|
||||
if (CompareGuid ((EFI_GUID *)(Identity + 1), &UserCredential->Identifier)) {
|
||||
return UserCredential->Delete (UserCredential, User);
|
||||
}
|
||||
}
|
||||
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Delete User's credental from all the providers that exist in User's identity policy.
|
||||
|
||||
@param[in] IdentityPolicy Point to User's identity policy.
|
||||
@param[in] IdentityPolicyLen The length of the identity policy.
|
||||
@param[in] User Points to user profile.
|
||||
|
||||
**/
|
||||
VOID
|
||||
DeleteCredentialFromProviders (
|
||||
IN UINT8 *IdentityPolicy,
|
||||
IN UINTN IdentityPolicyLen,
|
||||
IN EFI_USER_PROFILE_HANDLE User
|
||||
)
|
||||
{
|
||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||
UINTN Offset;
|
||||
|
||||
Offset = 0;
|
||||
while (Offset < IdentityPolicyLen) {
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (IdentityPolicy + Offset);
|
||||
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
||||
//
|
||||
// Delete the user on this provider.
|
||||
//
|
||||
DeleteUserOnProvider (Identity, User);
|
||||
}
|
||||
Offset += Identity->Length;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Remove the provider in FindIdentity from the user identification information record.
|
||||
|
||||
@param[in, out] NewInfo On entry, points to the user information to remove provider.
|
||||
On return, points to the user information the provider is removed.
|
||||
@param[in] FindIdentity Point to the user identity policy.
|
||||
|
||||
@retval TRUE The provider is removed successfully.
|
||||
@retval FALSE Fail to remove the provider.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
DeleteProviderFromPolicy (
|
||||
IN EFI_USER_INFO_IDENTITY_POLICY *IdentityPolicy,
|
||||
IN UINTN Offset
|
||||
)
|
||||
{
|
||||
UINTN RemainingLen;
|
||||
UINTN DeleteLen;
|
||||
|
||||
if (IdentityPolicy->Length == mUserInfo.NewIdentityPolicyLen) {
|
||||
//
|
||||
// Only one credential provider in the identification policy.
|
||||
// Set the new policy to be TRUE after removed the provider.
|
||||
//
|
||||
IdentityPolicy->Type = EFI_USER_INFO_IDENTITY_TRUE;
|
||||
IdentityPolicy->Length = sizeof (EFI_USER_INFO_IDENTITY_POLICY);
|
||||
mUserInfo.NewIdentityPolicyLen = IdentityPolicy->Length;
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
DeleteLen = IdentityPolicy->Length + sizeof(EFI_USER_INFO_IDENTITY_POLICY);
|
||||
if ((Offset + IdentityPolicy->Length) != mUserInfo.NewIdentityPolicyLen) {
|
||||
//
|
||||
// This provider is not the last item in the identification policy, delete it and the connector.
|
||||
//
|
||||
RemainingLen = mUserInfo.NewIdentityPolicyLen - Offset - DeleteLen;
|
||||
CopyMem ((UINT8 *) IdentityPolicy, (UINT8 *) IdentityPolicy + DeleteLen, RemainingLen);
|
||||
}
|
||||
mUserInfo.NewIdentityPolicyLen -= DeleteLen;
|
||||
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Update the mUserInfo.NewIdentityPolicy, and UI when 'add option' is pressed.
|
||||
|
||||
**/
|
||||
VOID
|
||||
AddProviderToPolicy (
|
||||
IN EFI_GUID *NewGuid
|
||||
)
|
||||
{
|
||||
UINT8 *NewPolicyInfo;
|
||||
UINTN NewPolicyInfoLen;
|
||||
EFI_USER_INFO_IDENTITY_POLICY *Policy;
|
||||
|
||||
//
|
||||
// Allocate memory for the new identity policy.
|
||||
//
|
||||
NewPolicyInfoLen = mUserInfo.NewIdentityPolicyLen + sizeof (EFI_USER_INFO_IDENTITY_POLICY) + sizeof (EFI_GUID);
|
||||
if (mUserInfo.NewIdentityPolicyLen > 0) {
|
||||
//
|
||||
// It is not the first provider in the policy. Add a connector before provider.
|
||||
//
|
||||
NewPolicyInfoLen += sizeof (EFI_USER_INFO_IDENTITY_POLICY);
|
||||
}
|
||||
NewPolicyInfo = AllocateZeroPool (NewPolicyInfoLen);
|
||||
if (NewPolicyInfo == NULL) {
|
||||
return ;
|
||||
}
|
||||
|
||||
NewPolicyInfoLen = 0;
|
||||
if (mUserInfo.NewIdentityPolicyLen > 0) {
|
||||
//
|
||||
// Save orginal policy.
|
||||
//
|
||||
CopyMem (NewPolicyInfo, mUserInfo.NewIdentityPolicy, mUserInfo.NewIdentityPolicyLen);
|
||||
|
||||
//
|
||||
// Save logical connector.
|
||||
//
|
||||
Policy = (EFI_USER_INFO_IDENTITY_POLICY *) (NewPolicyInfo + mUserInfo.NewIdentityPolicyLen);
|
||||
if (mConncetLogical == 0) {
|
||||
Policy->Type = EFI_USER_INFO_IDENTITY_AND;
|
||||
} else {
|
||||
Policy->Type = EFI_USER_INFO_IDENTITY_OR;
|
||||
}
|
||||
|
||||
Policy->Length = sizeof (EFI_USER_INFO_IDENTITY_POLICY);
|
||||
NewPolicyInfoLen = mUserInfo.NewIdentityPolicyLen + Policy->Length;
|
||||
FreePool (mUserInfo.NewIdentityPolicy);
|
||||
}
|
||||
|
||||
//
|
||||
// Save credential provider.
|
||||
//
|
||||
Policy = (EFI_USER_INFO_IDENTITY_POLICY *) (NewPolicyInfo + NewPolicyInfoLen);
|
||||
Policy->Length = sizeof (EFI_USER_INFO_IDENTITY_POLICY) + sizeof (EFI_GUID);
|
||||
Policy->Type = EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER;
|
||||
CopyGuid ((EFI_GUID *) (Policy + 1), NewGuid);
|
||||
NewPolicyInfoLen += Policy->Length;
|
||||
|
||||
//
|
||||
// Update identity policy choice.
|
||||
//
|
||||
mUserInfo.NewIdentityPolicy = NewPolicyInfo;
|
||||
mUserInfo.NewIdentityPolicyLen = NewPolicyInfoLen;
|
||||
mUserInfo.NewIdentityPolicyModified = TRUE;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
This function replaces the old identity policy with a new identity policy.
|
||||
|
||||
This function delete the user identity policy information.
|
||||
If enroll new credential failed, recover the old identity policy.
|
||||
|
||||
@retval EFI_SUCCESS Modify user identity policy successfully.
|
||||
@retval Others Fail to modify user identity policy.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
UpdateCredentialProvider (
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||
UINTN Offset;
|
||||
|
||||
//
|
||||
// Delete the old identification policy.
|
||||
//
|
||||
DeleteCredentialFromProviders (mUserInfo.IdentityPolicy, mUserInfo.IdentityPolicyLen, mModifyUser);
|
||||
|
||||
//
|
||||
// Add the new identification policy.
|
||||
//
|
||||
Offset = 0;
|
||||
while (Offset < mUserInfo.NewIdentityPolicyLen) {
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (mUserInfo.NewIdentityPolicy + Offset);
|
||||
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
||||
//
|
||||
// Enroll the user on this provider
|
||||
//
|
||||
Status = EnrollUserOnProvider (Identity, mModifyUser);
|
||||
if (EFI_ERROR (Status)) {
|
||||
//
|
||||
// Failed to enroll the user by new identification policy.
|
||||
// So removed the credential provider from the identification policy
|
||||
//
|
||||
DeleteProviderFromPolicy (Identity, Offset);
|
||||
continue;
|
||||
}
|
||||
}
|
||||
Offset += Identity->Length;
|
||||
}
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Check whether the identity policy is valid.
|
||||
|
||||
@param[in] PolicyInfo Point to the identity policy.
|
||||
@param[in] PolicyInfoLen The policy length.
|
||||
|
||||
@retval TRUE The policy is a valid identity policy.
|
||||
@retval FALSE The policy is not a valid identity policy.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
CheckNewIdentityPolicy (
|
||||
IN UINT8 *PolicyInfo,
|
||||
IN UINTN PolicyInfoLen
|
||||
)
|
||||
{
|
||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||
EFI_INPUT_KEY Key;
|
||||
UINTN Offset;
|
||||
UINT32 OpCode;
|
||||
|
||||
//
|
||||
// Check policy expression.
|
||||
//
|
||||
OpCode = EFI_USER_INFO_IDENTITY_FALSE;
|
||||
Offset = 0;
|
||||
while (Offset < PolicyInfoLen) {
|
||||
//
|
||||
// Check identification policy according to type
|
||||
//
|
||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (PolicyInfo + Offset);
|
||||
switch (Identity->Type) {
|
||||
|
||||
case EFI_USER_INFO_IDENTITY_TRUE:
|
||||
break;
|
||||
|
||||
case EFI_USER_INFO_IDENTITY_OR:
|
||||
if (OpCode == EFI_USER_INFO_IDENTITY_AND) {
|
||||
CreatePopUp (
|
||||
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||
&Key,
|
||||
L"Invalid Identity Policy, Mixed Connector Unsupport!",
|
||||
L"",
|
||||
L"Press Any Key to Continue ...",
|
||||
NULL
|
||||
);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
OpCode = EFI_USER_INFO_IDENTITY_OR;
|
||||
break;
|
||||
|
||||
case EFI_USER_INFO_IDENTITY_AND:
|
||||
if (OpCode == EFI_USER_INFO_IDENTITY_OR) {
|
||||
CreatePopUp (
|
||||
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||
&Key,
|
||||
L"Invalid Identity Policy, Mixed Connector Unsupport!",
|
||||
L"",
|
||||
L"Press Any Key to Continue ...",
|
||||
NULL
|
||||
);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
OpCode = EFI_USER_INFO_IDENTITY_AND;
|
||||
break;
|
||||
|
||||
case EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER:
|
||||
break;
|
||||
|
||||
default:
|
||||
CreatePopUp (
|
||||
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||
&Key,
|
||||
L"Unsupport parameter",
|
||||
L"",
|
||||
L"Press Any Key to Continue ...",
|
||||
NULL
|
||||
);
|
||||
return FALSE;
|
||||
}
|
||||
Offset += Identity->Length;
|
||||
}
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Save the identity policy and update UI with it.
|
||||
|
||||
This funciton will verify the new identity policy, in current implementation,
|
||||
the identity policy can be: T, P & P & P & ..., P | P | P | ...
|
||||
Here, "T" means "True", "P" means "Credential Provider", "&" means "and", "|" means "or".
|
||||
Other identity policies are not supported.
|
||||
|
||||
**/
|
||||
VOID
|
||||
SaveIdentityPolicy (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_USER_INFO_HANDLE UserInfo;
|
||||
EFI_USER_INFO *Info;
|
||||
|
||||
if (!mUserInfo.NewIdentityPolicyModified || (mUserInfo.NewIdentityPolicyLen == 0)) {
|
||||
return;
|
||||
}
|
||||
|
||||
//
|
||||
// Check policy expression.
|
||||
//
|
||||
if (!CheckNewIdentityPolicy (mUserInfo.NewIdentityPolicy, mUserInfo.NewIdentityPolicyLen)) {
|
||||
return;
|
||||
}
|
||||
|
||||
Status = FindInfoByType (mModifyUser, EFI_USER_INFO_IDENTITY_POLICY_RECORD, &UserInfo);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return ;
|
||||
}
|
||||
|
||||
//
|
||||
// Update the informantion on credential provider.
|
||||
//
|
||||
Status = UpdateCredentialProvider ();
|
||||
if (EFI_ERROR (Status)) {
|
||||
return ;
|
||||
}
|
||||
|
||||
//
|
||||
// Save new identification policy.
|
||||
//
|
||||
Info = AllocateZeroPool (sizeof (EFI_USER_INFO) + mUserInfo.NewIdentityPolicyLen);
|
||||
ASSERT (Info != NULL);
|
||||
|
||||
Info->InfoType = EFI_USER_INFO_IDENTITY_POLICY_RECORD;
|
||||
Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV | EFI_USER_INFO_PUBLIC | EFI_USER_INFO_EXCLUSIVE;
|
||||
Info->InfoSize = (UINT32) (sizeof (EFI_USER_INFO) + mUserInfo.NewIdentityPolicyLen);
|
||||
CopyMem ((UINT8 *) (Info + 1), mUserInfo.NewIdentityPolicy, mUserInfo.NewIdentityPolicyLen);
|
||||
|
||||
Status = mUserManager->SetInfo (mUserManager, mModifyUser, &UserInfo, Info, Info->InfoSize);
|
||||
FreePool (Info);
|
||||
|
||||
//
|
||||
// Update the mUserInfo.IdentityPolicy by mUserInfo.NewIdentityPolicy
|
||||
//
|
||||
if (mUserInfo.IdentityPolicy != NULL) {
|
||||
FreePool (mUserInfo.IdentityPolicy);
|
||||
}
|
||||
mUserInfo.IdentityPolicy = mUserInfo.NewIdentityPolicy;
|
||||
mUserInfo.IdentityPolicyLen = mUserInfo.NewIdentityPolicyLen;
|
||||
|
||||
mUserInfo.NewIdentityPolicy = NULL;
|
||||
mUserInfo.NewIdentityPolicyLen = 0;
|
||||
mUserInfo.NewIdentityPolicyModified = FALSE;
|
||||
|
||||
//
|
||||
// Update identity policy choice.
|
||||
//
|
||||
ResolveIdentityPolicy (mUserInfo.IdentityPolicy, mUserInfo.IdentityPolicyLen, STRING_TOKEN (STR_IDENTIFY_POLICY_VAL));
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Update the mUserInfo.NewIdentityPolicy, and UI when 'add option' is pressed.
|
||||
|
||||
**/
|
||||
VOID
|
||||
AddIdentityPolicyItem (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
if (mProviderInfo->Count == 0) {
|
||||
return ;
|
||||
}
|
||||
|
||||
//
|
||||
// Check the identity policy.
|
||||
//
|
||||
if (ProviderAlreadyInPolicy (&mProviderInfo->Provider[mProviderChoice]->Identifier)) {
|
||||
return;
|
||||
}
|
||||
|
||||
//
|
||||
// Add it to identification policy
|
||||
//
|
||||
AddProviderToPolicy (&mProviderInfo->Provider[mProviderChoice]->Identifier);
|
||||
|
||||
//
|
||||
// Update identity policy choice.
|
||||
//
|
||||
ResolveIdentityPolicy (mUserInfo.NewIdentityPolicy, mUserInfo.NewIdentityPolicyLen, STRING_TOKEN (STR_IDENTIFY_POLICY_VALUE));
|
||||
}
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
/** @file
|
||||
The functions to add a user profile.
|
||||
|
||||
Copyright (c) 2009 - 2010, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
@ -239,7 +239,7 @@ SetIdentityPolicy (
|
||||
|
||||
NewUserInfo->InfoType = EFI_USER_INFO_IDENTITY_POLICY_RECORD;
|
||||
NewUserInfo->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV |
|
||||
EFI_USER_INFO_PRIVATE |
|
||||
EFI_USER_INFO_PUBLIC |
|
||||
EFI_USER_INFO_EXCLUSIVE;
|
||||
NewUserInfo->InfoSize = sizeof (EFI_USER_INFO) + Policy->Length;
|
||||
UserInfo = NULL;
|
||||
|
@ -185,6 +185,9 @@ DeleteUser (
|
||||
EFI_STATUS Status;
|
||||
EFI_USER_PROFILE_HANDLE User;
|
||||
EFI_INPUT_KEY Key;
|
||||
EFI_USER_INFO_HANDLE UserInfo;
|
||||
EFI_USER_INFO *Info;
|
||||
UINTN InfoSize;
|
||||
|
||||
//
|
||||
// Find specified user profile and delete it.
|
||||
@ -204,6 +207,31 @@ DeleteUser (
|
||||
}
|
||||
|
||||
if (UserIndex == 1) {
|
||||
//
|
||||
// Get the identification policy.
|
||||
//
|
||||
Status = FindInfoByType (User, EFI_USER_INFO_IDENTITY_POLICY_RECORD, &UserInfo);
|
||||
if (EFI_ERROR (Status)) {
|
||||
goto Done;
|
||||
}
|
||||
|
||||
InfoSize = 0;
|
||||
Info = NULL;
|
||||
Status = mUserManager->GetInfo (mUserManager, User, UserInfo, Info, &InfoSize);
|
||||
if (Status == EFI_BUFFER_TOO_SMALL) {
|
||||
Info = AllocateZeroPool (InfoSize);
|
||||
if (Info == NULL) {
|
||||
goto Done;
|
||||
}
|
||||
Status = mUserManager->GetInfo (mUserManager, User, UserInfo, Info, &InfoSize);
|
||||
}
|
||||
|
||||
//
|
||||
// Delete the user on the credential providers by its identification policy.
|
||||
//
|
||||
DeleteCredentialFromProviders ((UINT8 *)(Info + 1), Info->InfoSize - sizeof (EFI_USER_INFO), User);
|
||||
FreePool (Info);
|
||||
|
||||
Status = mUserManager->Delete (mUserManager, User);
|
||||
if (EFI_ERROR (Status)) {
|
||||
goto Done;
|
||||
|
@ -140,6 +140,7 @@ extern USER_INFO mUserInfo;
|
||||
|
||||
extern USER_PROFILE_MANAGER_CALLBACK_INFO *mCallbackInfo;
|
||||
|
||||
extern EFI_USER_PROFILE_HANDLE mModifyUser;
|
||||
|
||||
/**
|
||||
Get string by string id from HII Interface.
|
||||
@ -378,5 +379,67 @@ GetUserNameInput (
|
||||
IN OUT UINTN *UserNameLen,
|
||||
OUT CHAR16 *UserName
|
||||
);
|
||||
|
||||
/**
|
||||
Find the specified info in User profile by the InfoType.
|
||||
|
||||
@param[in] User Handle of the user whose information will be searched.
|
||||
@param[in] InfoType The user information type to find.
|
||||
@param[out] UserInfo Points to user information handle found.
|
||||
|
||||
@retval EFI_SUCCESS Find the user information successfully.
|
||||
@retval Others Fail to find the user information.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
FindInfoByType (
|
||||
IN EFI_USER_PROFILE_HANDLE User,
|
||||
IN UINT8 InfoType,
|
||||
OUT EFI_USER_INFO_HANDLE *UserInfo
|
||||
);
|
||||
|
||||
/**
|
||||
Convert the identity policy to a unicode string and update the Hii database
|
||||
IpStringId string with it.
|
||||
|
||||
@param[in] Ip Points to identity policy.
|
||||
@param[in] IpLen The identity policy length.
|
||||
@param[in] IpStringId String ID in the HII database to be replaced.
|
||||
|
||||
**/
|
||||
VOID
|
||||
ResolveIdentityPolicy (
|
||||
IN UINT8 *Ip,
|
||||
IN UINTN IpLen,
|
||||
IN EFI_STRING_ID IpStringId
|
||||
);
|
||||
|
||||
/**
|
||||
Expand access policy memory size.
|
||||
|
||||
@param[in] ValidLen The valid access policy length.
|
||||
@param[in] ExpandLen The length that is needed to expand.
|
||||
|
||||
**/
|
||||
VOID
|
||||
ExpandMemory (
|
||||
IN UINTN ValidLen,
|
||||
IN UINTN ExpandLen
|
||||
);
|
||||
|
||||
/**
|
||||
Delete User's credental from all the providers that exist in User's identity policy.
|
||||
|
||||
@param[in] IdentityPolicy Point to User's identity policy.
|
||||
@param[in] IdentityPolicyLen The length of the identity policy.
|
||||
@param[in] User Points to user profile.
|
||||
|
||||
**/
|
||||
VOID
|
||||
DeleteCredentialFromProviders (
|
||||
IN UINT8 *IdentityPolicy,
|
||||
IN UINTN IdentityPolicyLen,
|
||||
IN EFI_USER_PROFILE_HANDLE User
|
||||
);
|
||||
|
||||
#endif
|
||||
|
@ -25,6 +25,8 @@
|
||||
UserProfileAdd.c
|
||||
UserProfileDelete.c
|
||||
UserProfileModify.c
|
||||
ModifyIdentityPolicy.c
|
||||
ModifyAccessPolicy.c
|
||||
UserProfileManagerData.h
|
||||
UserProfileManagerStrings.uni
|
||||
UserProfileManagerVfr.Vfr
|
||||
|
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user