Update UID drivers to align with latest UEFI spec 2.3.1.
Signed-off-by: gdong1 Reviewed-by: tye Reviewed-by: qianouyang git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12567 6f19259b-4bc3-4df7-8a09-765794883524
This commit is contained in:
@ -745,7 +745,6 @@ CredentialEnroll (
|
|||||||
EFI_USER_INFO *UserInfo;
|
EFI_USER_INFO *UserInfo;
|
||||||
CHAR8 Password[CREDENTIAL_LEN];
|
CHAR8 Password[CREDENTIAL_LEN];
|
||||||
EFI_INPUT_KEY Key;
|
EFI_INPUT_KEY Key;
|
||||||
EFI_USER_MANAGER_PROTOCOL *UserManager;
|
|
||||||
UINT8 *UserId;
|
UINT8 *UserId;
|
||||||
CHAR16 *QuestionStr;
|
CHAR16 *QuestionStr;
|
||||||
CHAR16 *PromptStr;
|
CHAR16 *PromptStr;
|
||||||
@ -754,15 +753,6 @@ CredentialEnroll (
|
|||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
}
|
}
|
||||||
|
|
||||||
Status = gBS->LocateProtocol (
|
|
||||||
&gEfiUserManagerProtocolGuid,
|
|
||||||
NULL,
|
|
||||||
(VOID **) &UserManager
|
|
||||||
);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return EFI_UNSUPPORTED;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
//
|
||||||
// Get User Identifier.
|
// Get User Identifier.
|
||||||
//
|
//
|
||||||
@ -835,11 +825,6 @@ CredentialEnroll (
|
|||||||
return Status;
|
return Status;
|
||||||
}
|
}
|
||||||
|
|
||||||
//
|
|
||||||
// Notify the user manager driver that credential information has changed.
|
|
||||||
//
|
|
||||||
UserManager->Notify (UserManager, mCallbackInfo->DriverHandle);
|
|
||||||
|
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -674,7 +674,6 @@ CredentialEnroll (
|
|||||||
USB_INFO UsbInfo;
|
USB_INFO UsbInfo;
|
||||||
EFI_USER_INFO *UserInfo;
|
EFI_USER_INFO *UserInfo;
|
||||||
EFI_INPUT_KEY Key;
|
EFI_INPUT_KEY Key;
|
||||||
EFI_USER_MANAGER_PROTOCOL *UserManager;
|
|
||||||
UINT8 *UserId;
|
UINT8 *UserId;
|
||||||
CHAR16 *QuestionStr;
|
CHAR16 *QuestionStr;
|
||||||
CHAR16 *PromptStr;
|
CHAR16 *PromptStr;
|
||||||
@ -683,15 +682,6 @@ CredentialEnroll (
|
|||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
}
|
}
|
||||||
|
|
||||||
Status = gBS->LocateProtocol (
|
|
||||||
&gEfiUserManagerProtocolGuid,
|
|
||||||
NULL,
|
|
||||||
(VOID **) &UserManager
|
|
||||||
);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return EFI_UNSUPPORTED;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
//
|
||||||
// Get User Identifier
|
// Get User Identifier
|
||||||
//
|
//
|
||||||
@ -749,11 +739,6 @@ CredentialEnroll (
|
|||||||
return Status;
|
return Status;
|
||||||
}
|
}
|
||||||
|
|
||||||
//
|
|
||||||
// Notify the user manager driver that credential information has changed.
|
|
||||||
//
|
|
||||||
UserManager->Notify (UserManager, mCallbackInfo->DriverHandle);
|
|
||||||
|
|
||||||
return EFI_SUCCESS;
|
return EFI_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -400,43 +400,6 @@ FindUserProfileByInfo (
|
|||||||
return EFI_NOT_FOUND;
|
return EFI_NOT_FOUND;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
Find the credential provider in the specified identity policy.
|
|
||||||
|
|
||||||
@param[in] FindIdentity Point to the user identity policy.
|
|
||||||
@param[in] IdentifyInfo Point to the user information to be searched.
|
|
||||||
|
|
||||||
@retval TRUE The credential provider was found in the identity policy.
|
|
||||||
@retval FALSE The credential provider was not found.
|
|
||||||
**/
|
|
||||||
BOOLEAN
|
|
||||||
FindProvider (
|
|
||||||
IN EFI_USER_INFO_IDENTITY_POLICY *FindIdentity,
|
|
||||||
IN CONST EFI_USER_INFO *IdentifyInfo
|
|
||||||
)
|
|
||||||
{
|
|
||||||
UINTN TotalLen;
|
|
||||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
|
||||||
|
|
||||||
//
|
|
||||||
// Found the credential provider.
|
|
||||||
//
|
|
||||||
TotalLen = 0;
|
|
||||||
while (TotalLen < IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO)) {
|
|
||||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (IdentifyInfo + 1) + TotalLen);
|
|
||||||
if ((Identity->Type == FindIdentity->Type) &&
|
|
||||||
(Identity->Length == FindIdentity->Length) &&
|
|
||||||
CompareGuid ((EFI_GUID *) (Identity + 1), (EFI_GUID *) (FindIdentity + 1))
|
|
||||||
) {
|
|
||||||
return TRUE;
|
|
||||||
}
|
|
||||||
|
|
||||||
TotalLen += Identity->Length;
|
|
||||||
}
|
|
||||||
|
|
||||||
return FALSE;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Check whether the access policy is valid.
|
Check whether the access policy is valid.
|
||||||
@ -1009,119 +972,6 @@ ExpandUserProfile (
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
Add or delete the user's credential record in the provider.
|
|
||||||
|
|
||||||
@param[in] ProviderGuid Point to credential provider guid or class guid.
|
|
||||||
@param[in] ByType If TRUE, Provider is credential class guid.
|
|
||||||
If FALSE, Provider is provider guid.
|
|
||||||
@param[in] User Points to user profile.
|
|
||||||
@param[in] Delete If TRUE, delete User from the provider; If FALSE, add
|
|
||||||
User info from the provider.
|
|
||||||
|
|
||||||
@retval EFI_SUCCESS Add or delete record successfully.
|
|
||||||
@retval Others Fail to add or delete record.
|
|
||||||
|
|
||||||
**/
|
|
||||||
EFI_STATUS
|
|
||||||
ModifyProviderCredential (
|
|
||||||
IN EFI_GUID *Provider,
|
|
||||||
IN BOOLEAN ByType,
|
|
||||||
IN USER_PROFILE_ENTRY *User,
|
|
||||||
IN BOOLEAN Delete
|
|
||||||
)
|
|
||||||
{
|
|
||||||
UINTN Index;
|
|
||||||
EFI_USER_CREDENTIAL2_PROTOCOL *UserCredential;
|
|
||||||
|
|
||||||
if (Provider == NULL) {
|
|
||||||
return EFI_INVALID_PARAMETER;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Find the specified credential provider.
|
|
||||||
//
|
|
||||||
for (Index = 0; Index < mProviderDb->Count; Index++) {
|
|
||||||
//
|
|
||||||
// Check credential provider ID.
|
|
||||||
//
|
|
||||||
UserCredential = mProviderDb->Provider[Index];
|
|
||||||
if (CompareGuid (&UserCredential->Identifier, Provider)) {
|
|
||||||
if (Delete) {
|
|
||||||
return UserCredential->Delete (UserCredential, User);
|
|
||||||
} else {
|
|
||||||
return UserCredential->Enroll (UserCredential, User);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return EFI_NOT_FOUND;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
Modify user's credential record in the providers.
|
|
||||||
|
|
||||||
Found the providers information in PolicyInfo, and then add or delete the user's credential
|
|
||||||
record in the providers.
|
|
||||||
|
|
||||||
@param[in] User Points to user profile.
|
|
||||||
@param[in] PolicyInfo Point to identification policy to be modified.
|
|
||||||
@param[in] InfoLen The length of PolicyInfo.
|
|
||||||
@param[in] Delete If TRUE, delete User from the provider; If FALSE, add
|
|
||||||
User info from the provider.
|
|
||||||
|
|
||||||
@retval EFI_SUCCESS Modify PolicyInfo successfully.
|
|
||||||
@retval Others Fail to modify PolicyInfo.
|
|
||||||
|
|
||||||
**/
|
|
||||||
EFI_STATUS
|
|
||||||
ModifyCredentialInfo (
|
|
||||||
IN USER_PROFILE_ENTRY *User,
|
|
||||||
IN UINT8 *PolicyInfo,
|
|
||||||
IN UINTN InfoLen,
|
|
||||||
IN BOOLEAN Delete
|
|
||||||
)
|
|
||||||
{
|
|
||||||
EFI_STATUS Status;
|
|
||||||
UINTN TotalLen;
|
|
||||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
|
||||||
|
|
||||||
//
|
|
||||||
// Modify user's credential.
|
|
||||||
//
|
|
||||||
TotalLen = 0;
|
|
||||||
while (TotalLen < InfoLen) {
|
|
||||||
//
|
|
||||||
// Check identification policy according to type.
|
|
||||||
//
|
|
||||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (PolicyInfo + TotalLen);
|
|
||||||
switch (Identity->Type) {
|
|
||||||
case EFI_USER_INFO_IDENTITY_CREDENTIAL_TYPE:
|
|
||||||
Status = ModifyProviderCredential ((EFI_GUID *) (Identity + 1), TRUE, User, Delete);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
|
|
||||||
case EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER:
|
|
||||||
Status = ModifyProviderCredential ((EFI_GUID *) (Identity + 1), FALSE, User, Delete);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
|
|
||||||
default:
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
TotalLen += Identity->Length;
|
|
||||||
}
|
|
||||||
|
|
||||||
return EFI_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Save the user profile to non-volatile memory, or delete it from non-volatile memory.
|
Save the user profile to non-volatile memory, or delete it from non-volatile memory.
|
||||||
|
|
||||||
@ -1161,327 +1011,6 @@ SaveNvUserProfile (
|
|||||||
return Status;
|
return Status;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
Replace the old identity info with NewInfo in NV Flash.
|
|
||||||
|
|
||||||
This function only replace the identity record in the user profile. Don't update
|
|
||||||
the the information on the credential provider.
|
|
||||||
|
|
||||||
@param[in] User Point to the user profile.
|
|
||||||
@param[in] NewInfo Point to the new identity policy info.
|
|
||||||
@param[out] UserInfo Point to the new added identity info.
|
|
||||||
|
|
||||||
@retval EFI_SUCCESS Replace user identity successfully.
|
|
||||||
@retval Others Fail to Replace user identity.
|
|
||||||
|
|
||||||
**/
|
|
||||||
EFI_STATUS
|
|
||||||
SaveUserIpInfo (
|
|
||||||
IN USER_PROFILE_ENTRY * User,
|
|
||||||
IN CONST EFI_USER_INFO * NewInfo,
|
|
||||||
OUT EFI_USER_INFO **UserInfo OPTIONAL
|
|
||||||
)
|
|
||||||
{
|
|
||||||
EFI_STATUS Status;
|
|
||||||
EFI_USER_INFO *OldIpInfo;
|
|
||||||
UINTN Offset;
|
|
||||||
UINTN NextOffset;
|
|
||||||
|
|
||||||
if ((NewInfo == NULL) || (User == NULL)) {
|
|
||||||
return EFI_INVALID_PARAMETER;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Get user old identify policy information.
|
|
||||||
//
|
|
||||||
OldIpInfo = NULL;
|
|
||||||
Status = FindUserInfoByType (User, &OldIpInfo, EFI_USER_INFO_IDENTITY_POLICY_RECORD);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Get the old identity policy offset.
|
|
||||||
//
|
|
||||||
Status = FindUserInfo (User, &OldIpInfo, FALSE, &Offset);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Delete the old identity policy information.
|
|
||||||
//
|
|
||||||
NextOffset = ALIGN_VARIABLE (OldIpInfo->InfoSize) + Offset;
|
|
||||||
User->UserProfileSize -= ALIGN_VARIABLE (OldIpInfo->InfoSize);
|
|
||||||
if (Offset < User->UserProfileSize) {
|
|
||||||
CopyMem (User->ProfileInfo + Offset, User->ProfileInfo + NextOffset, User->UserProfileSize - Offset);
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Add new user information.
|
|
||||||
//
|
|
||||||
if (User->MaxProfileSize - User->UserProfileSize < ALIGN_VARIABLE (NewInfo->InfoSize)) {
|
|
||||||
if (!ExpandUserProfile (User, ALIGN_VARIABLE (NewInfo->InfoSize))) {
|
|
||||||
return EFI_OUT_OF_RESOURCES;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
CopyMem (User->ProfileInfo + User->UserProfileSize, (VOID *) NewInfo, NewInfo->InfoSize);
|
|
||||||
if (UserInfo != NULL) {
|
|
||||||
*UserInfo = (EFI_USER_INFO *) (User->ProfileInfo + User->UserProfileSize);
|
|
||||||
}
|
|
||||||
|
|
||||||
User->UserProfileSize += ALIGN_VARIABLE (NewInfo->InfoSize);
|
|
||||||
|
|
||||||
//
|
|
||||||
// Save user profile information.
|
|
||||||
//
|
|
||||||
Status = SaveNvUserProfile (User, FALSE);
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
Remove the provider in FindIdentity from the user identification information record.
|
|
||||||
|
|
||||||
@param[in, out] NewInfo On entry, points to the user information to remove provider.
|
|
||||||
On return, points to the user information the provider is removed.
|
|
||||||
@param[in] FindIdentity Point to the user identity policy.
|
|
||||||
|
|
||||||
@retval TRUE The provider is removed successfully.
|
|
||||||
@retval FALSE Fail to remove the provider.
|
|
||||||
|
|
||||||
**/
|
|
||||||
BOOLEAN
|
|
||||||
RemoveProvider (
|
|
||||||
IN OUT EFI_USER_INFO **NewInfo,
|
|
||||||
IN EFI_USER_INFO_IDENTITY_POLICY *FindIdentity
|
|
||||||
)
|
|
||||||
{
|
|
||||||
UINTN TotalLen;
|
|
||||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
|
||||||
EFI_USER_INFO *IdentifyInfo;
|
|
||||||
UINT8 *Buffer;
|
|
||||||
|
|
||||||
IdentifyInfo = *NewInfo;
|
|
||||||
TotalLen = IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO);
|
|
||||||
if (TotalLen == FindIdentity->Length) {
|
|
||||||
//
|
|
||||||
// Only one credential provider in the identification policy.
|
|
||||||
// Set the new policy to be TRUE after removed the provider.
|
|
||||||
//
|
|
||||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (IdentifyInfo + 1);
|
|
||||||
Identity->Type = EFI_USER_INFO_IDENTITY_TRUE;
|
|
||||||
Identity->Length = sizeof (EFI_USER_INFO_IDENTITY_POLICY);
|
|
||||||
IdentifyInfo->InfoSize = sizeof (EFI_USER_INFO) + Identity->Length;
|
|
||||||
return TRUE;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Found the credential provider.
|
|
||||||
//
|
|
||||||
TotalLen = 0;
|
|
||||||
while (TotalLen < IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO)) {
|
|
||||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (IdentifyInfo + 1) + TotalLen);
|
|
||||||
if ((Identity->Type == FindIdentity->Type) &&
|
|
||||||
(Identity->Length == FindIdentity->Length) &&
|
|
||||||
CompareGuid ((EFI_GUID *) (Identity + 1), (EFI_GUID *) (FindIdentity + 1))
|
|
||||||
) {
|
|
||||||
//
|
|
||||||
// Found the credential provider to delete
|
|
||||||
//
|
|
||||||
if (Identity == (EFI_USER_INFO_IDENTITY_POLICY *)(IdentifyInfo + 1)) {
|
|
||||||
//
|
|
||||||
// It is the first item in the identification policy, delete it and the connector after it.
|
|
||||||
//
|
|
||||||
Buffer = (UINT8 *) Identity + Identity->Length + sizeof(EFI_USER_INFO_IDENTITY_POLICY);
|
|
||||||
IdentifyInfo->InfoSize -= Identity->Length + sizeof(EFI_USER_INFO_IDENTITY_POLICY);
|
|
||||||
TotalLen = IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO);
|
|
||||||
CopyMem (Identity, Buffer, TotalLen);
|
|
||||||
} else {
|
|
||||||
//
|
|
||||||
// It is not the first item in the identification policy, delete it and the connector before it.
|
|
||||||
//
|
|
||||||
Buffer = (UINT8 *) Identity + Identity->Length;
|
|
||||||
TotalLen = IdentifyInfo->InfoSize - sizeof (EFI_USER_INFO);
|
|
||||||
TotalLen -= (Buffer - (UINT8 *)(IdentifyInfo + 1));
|
|
||||||
IdentifyInfo->InfoSize -= Identity->Length + sizeof(EFI_USER_INFO_IDENTITY_POLICY);
|
|
||||||
CopyMem ((UINT8 *) (Identity - 1), Buffer, TotalLen);
|
|
||||||
}
|
|
||||||
return TRUE;
|
|
||||||
}
|
|
||||||
|
|
||||||
TotalLen += Identity->Length;
|
|
||||||
}
|
|
||||||
return FALSE;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
This function replaces the old identity policy with a new identity policy.
|
|
||||||
|
|
||||||
This function changes user identity policy information.
|
|
||||||
If enroll new credential failed, recover the old identity policy.
|
|
||||||
|
|
||||||
For new policy:
|
|
||||||
a. For each credential, if it is newly added, try to enroll it.
|
|
||||||
If enroll failed, try to delete the newly added ones.
|
|
||||||
|
|
||||||
b. For each credential, if it exists in the old policy, delete old one,
|
|
||||||
and enroll new one. If failed to enroll the new one, removed it from new
|
|
||||||
identification policy.
|
|
||||||
|
|
||||||
For old policy:
|
|
||||||
a. For each credential, if it does not exist in new one, delete it.
|
|
||||||
|
|
||||||
@param[in] User Point to the user profile.
|
|
||||||
@param[in] Info Points to the user identity information.
|
|
||||||
@param[in] InfoSize The size of Info (Not used in this function).
|
|
||||||
@param[out] IpInfo The new identification info after modify.
|
|
||||||
|
|
||||||
@retval EFI_SUCCESS Modify user identity policy successfully.
|
|
||||||
@retval Others Fail to modify user identity policy.
|
|
||||||
|
|
||||||
**/
|
|
||||||
EFI_STATUS
|
|
||||||
ModifyUserIpInfo (
|
|
||||||
IN USER_PROFILE_ENTRY *User,
|
|
||||||
IN CONST EFI_USER_INFO *Info,
|
|
||||||
IN UINTN InfoSize,
|
|
||||||
OUT EFI_USER_INFO **IpInfo
|
|
||||||
)
|
|
||||||
{
|
|
||||||
EFI_STATUS Status;
|
|
||||||
EFI_USER_INFO *OldIpInfo;
|
|
||||||
UINTN TotalLen;
|
|
||||||
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
|
||||||
UINT32 CredentialCount;
|
|
||||||
EFI_USER_INFO *NewIpInfo;
|
|
||||||
|
|
||||||
//
|
|
||||||
// Get user old identify policy information.
|
|
||||||
//
|
|
||||||
OldIpInfo = NULL;
|
|
||||||
Status = FindUserInfoByType (User, &OldIpInfo, EFI_USER_INFO_IDENTITY_POLICY_RECORD);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
ASSERT (OldIpInfo != NULL);
|
|
||||||
|
|
||||||
//
|
|
||||||
// Enroll new added credential provider.
|
|
||||||
//
|
|
||||||
CredentialCount = 0;
|
|
||||||
TotalLen = 0;
|
|
||||||
while (TotalLen < Info->InfoSize - sizeof (EFI_USER_INFO)) {
|
|
||||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (Info + 1) + TotalLen);
|
|
||||||
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
|
||||||
if (!FindProvider (Identity, OldIpInfo)) {
|
|
||||||
//
|
|
||||||
// The credential is NOT found in the old identity policy; add it.
|
|
||||||
//
|
|
||||||
Status = ModifyCredentialInfo (User, (UINT8 *) Identity, Identity->Length, FALSE);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
CredentialCount++;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
TotalLen += Identity->Length;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
//
|
|
||||||
// Enroll new credential failed. Delete the newly enrolled credential, and return.
|
|
||||||
//
|
|
||||||
TotalLen = 0;
|
|
||||||
while (TotalLen < Info->InfoSize - sizeof (EFI_USER_INFO)) {
|
|
||||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (Info + 1) + TotalLen);
|
|
||||||
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
|
||||||
if (!FindProvider (Identity, OldIpInfo)) {
|
|
||||||
//
|
|
||||||
// The credential is NOT found in the old identity policy. Delete it.
|
|
||||||
//
|
|
||||||
if (CredentialCount == 0) {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
ModifyCredentialInfo (User, (UINT8 *) Identity, Identity->Length, TRUE);
|
|
||||||
CredentialCount--;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
TotalLen += Identity->Length;
|
|
||||||
}
|
|
||||||
|
|
||||||
return EFI_DEVICE_ERROR;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Backup new identification policy
|
|
||||||
//
|
|
||||||
NewIpInfo = AllocateCopyPool (Info->InfoSize, Info);
|
|
||||||
ASSERT (NewIpInfo != NULL);
|
|
||||||
|
|
||||||
//
|
|
||||||
// Enroll the credential that existed in the old identity policy.
|
|
||||||
//
|
|
||||||
TotalLen = 0;
|
|
||||||
while (TotalLen < Info->InfoSize - sizeof (EFI_USER_INFO)) {
|
|
||||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (Info + 1) + TotalLen);
|
|
||||||
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
|
||||||
if (FindProvider (Identity, OldIpInfo)) {
|
|
||||||
//
|
|
||||||
// The credential is found in the old identity policy, so delete the old credential first.
|
|
||||||
//
|
|
||||||
Status = ModifyCredentialInfo (User, (UINT8 *) Identity, Identity->Length, TRUE);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
//
|
|
||||||
// Failed to delete old credential.
|
|
||||||
//
|
|
||||||
FreePool (NewIpInfo);
|
|
||||||
return EFI_DEVICE_ERROR;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Add the new credential.
|
|
||||||
//
|
|
||||||
Status = ModifyCredentialInfo (User, (UINT8 *) Identity, Identity->Length, FALSE);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
//
|
|
||||||
// Failed to enroll the user by new identification policy.
|
|
||||||
// So removed the credential provider from the identification policy
|
|
||||||
//
|
|
||||||
RemoveProvider (&NewIpInfo, Identity);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
TotalLen += Identity->Length;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Delete old credential that didn't exist in the new identity policy.
|
|
||||||
//
|
|
||||||
TotalLen = 0;
|
|
||||||
while (TotalLen < OldIpInfo->InfoSize - sizeof (EFI_USER_INFO)) {
|
|
||||||
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) ((UINT8 *) (OldIpInfo + 1) + TotalLen);
|
|
||||||
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
|
||||||
if (!FindProvider (Identity, Info)) {
|
|
||||||
//
|
|
||||||
// The credential is NOT found in the new identity policy. Delete the old credential.
|
|
||||||
//
|
|
||||||
ModifyCredentialInfo (User, (UINT8 *) Identity, Identity->Length, TRUE);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
TotalLen += Identity->Length;
|
|
||||||
}
|
|
||||||
|
|
||||||
*IpInfo = NewIpInfo;
|
|
||||||
return EFI_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Add one new user info into the user's profile.
|
Add one new user info into the user's profile.
|
||||||
|
|
||||||
@ -1528,21 +1057,6 @@ AddUserInfo (
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
//
|
|
||||||
// Add credential.
|
|
||||||
//
|
|
||||||
if (((EFI_USER_INFO *) Info)->InfoType == EFI_USER_INFO_IDENTITY_POLICY_RECORD) {
|
|
||||||
Status = ModifyCredentialInfo (
|
|
||||||
User,
|
|
||||||
(UINT8 *) ((EFI_USER_INFO *) Info + 1),
|
|
||||||
InfoSize - sizeof (EFI_USER_INFO),
|
|
||||||
FALSE
|
|
||||||
);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
//
|
||||||
// Add new user information.
|
// Add new user information.
|
||||||
//
|
//
|
||||||
@ -1681,11 +1195,6 @@ DelUserInfo (
|
|||||||
|
|
||||||
if (Info->InfoType == EFI_USER_INFO_IDENTIFIER_RECORD) {
|
if (Info->InfoType == EFI_USER_INFO_IDENTIFIER_RECORD) {
|
||||||
return EFI_ACCESS_DENIED;
|
return EFI_ACCESS_DENIED;
|
||||||
} else if (Info->InfoType == EFI_USER_INFO_IDENTITY_POLICY_RECORD) {
|
|
||||||
Status = ModifyCredentialInfo (User, (UINT8 *) (Info + 1), Info->InfoSize - sizeof (EFI_USER_INFO), TRUE);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
//
|
//
|
||||||
@ -1731,7 +1240,6 @@ ModifyUserInfo (
|
|||||||
EFI_STATUS Status;
|
EFI_STATUS Status;
|
||||||
UINTN PayloadLen;
|
UINTN PayloadLen;
|
||||||
EFI_USER_INFO *OldInfo;
|
EFI_USER_INFO *OldInfo;
|
||||||
EFI_USER_INFO *IpInfo;
|
|
||||||
|
|
||||||
if ((UserInfo == NULL) || (Info == NULL)) {
|
if ((UserInfo == NULL) || (Info == NULL)) {
|
||||||
return EFI_INVALID_PARAMETER;
|
return EFI_INVALID_PARAMETER;
|
||||||
@ -1833,25 +1341,6 @@ ModifyUserInfo (
|
|||||||
} while (TRUE);
|
} while (TRUE);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (Info->InfoType == EFI_USER_INFO_IDENTITY_POLICY_RECORD) {
|
|
||||||
//
|
|
||||||
// For user identification policy, need to update the info in credential provider.
|
|
||||||
//
|
|
||||||
IpInfo = NULL;
|
|
||||||
Status = ModifyUserIpInfo (User, Info, InfoSize, &IpInfo);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
|
|
||||||
ASSERT (IpInfo != NULL);
|
|
||||||
Status = SaveUserIpInfo (User, IpInfo, UserInfo);
|
|
||||||
if (IpInfo->InfoSize != Info->InfoSize) {
|
|
||||||
Status = EFI_DEVICE_ERROR;
|
|
||||||
}
|
|
||||||
FreePool (IpInfo);
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
|
|
||||||
Status = DelUserInfo (User, *UserInfo, FALSE);
|
Status = DelUserInfo (User, *UserInfo, FALSE);
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
return Status;
|
return Status;
|
||||||
@ -1877,7 +1366,6 @@ DelUserProfile (
|
|||||||
{
|
{
|
||||||
EFI_STATUS Status;
|
EFI_STATUS Status;
|
||||||
UINTN Index;
|
UINTN Index;
|
||||||
EFI_USER_INFO *UserInfo;
|
|
||||||
|
|
||||||
//
|
//
|
||||||
// Check whether it is in the user profile database.
|
// Check whether it is in the user profile database.
|
||||||
@ -1894,18 +1382,6 @@ DelUserProfile (
|
|||||||
return EFI_ACCESS_DENIED;
|
return EFI_ACCESS_DENIED;
|
||||||
}
|
}
|
||||||
|
|
||||||
//
|
|
||||||
// Delete user credential information.
|
|
||||||
//
|
|
||||||
UserInfo = NULL;
|
|
||||||
Status = FindUserInfoByType (User, &UserInfo, EFI_USER_INFO_IDENTITY_POLICY_RECORD);
|
|
||||||
if (Status == EFI_SUCCESS) {
|
|
||||||
Status = DelUserInfo (User, UserInfo, FALSE);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
//
|
||||||
// Delete user profile from the non-volatile memory.
|
// Delete user profile from the non-volatile memory.
|
||||||
//
|
//
|
||||||
@ -4028,6 +3504,8 @@ UserProfileGetInfo (
|
|||||||
This function changes user information. If NULL is pointed to by UserInfo, then a new user
|
This function changes user information. If NULL is pointed to by UserInfo, then a new user
|
||||||
information record is created and its handle is returned in UserInfo. Otherwise, the existing
|
information record is created and its handle is returned in UserInfo. Otherwise, the existing
|
||||||
one is replaced.
|
one is replaced.
|
||||||
|
If EFI_USER_INFO_IDENITTY_POLICY_RECORD is changed, it is the caller's responsibility to keep
|
||||||
|
it to be synced with the information on credential providers.
|
||||||
If EFI_USER_INFO_EXCLUSIVE is specified in Info and a user information record of the same
|
If EFI_USER_INFO_EXCLUSIVE is specified in Info and a user information record of the same
|
||||||
type already exists in the user profile, then EFI_ACCESS_DENIED will be returned and UserInfo
|
type already exists in the user profile, then EFI_ACCESS_DENIED will be returned and UserInfo
|
||||||
will point to the handle of the existing record.
|
will point to the handle of the existing record.
|
||||||
@ -4116,12 +3594,15 @@ UserProfileSetInfo (
|
|||||||
Called by credential provider to notify of information change.
|
Called by credential provider to notify of information change.
|
||||||
|
|
||||||
This function allows the credential provider to notify the User Identity Manager when user status
|
This function allows the credential provider to notify the User Identity Manager when user status
|
||||||
has changed while deselected.
|
has changed.
|
||||||
If the User Identity Manager doesn't support asynchronous changes in credentials, then this function
|
If the User Identity Manager doesn't support asynchronous changes in credentials, then this function
|
||||||
should return EFI_UNSUPPORTED.
|
should return EFI_UNSUPPORTED.
|
||||||
If the User Identity Manager supports this, it will call User() to get the user identifier and then
|
If current user does not exist, and the credential provider can identify a user, then make the user
|
||||||
GetNextInfo() and GetInfo() in the User Credential Protocol to get all of the information from the
|
to be current user and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
|
||||||
credential and add it.
|
If current user already exists, and the credential provider can identify another user, then switch
|
||||||
|
current user to the newly identified user, and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
|
||||||
|
If current user was identified by this credential provider and now the credential provider cannot identify
|
||||||
|
current user, then logout current user and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
|
||||||
|
|
||||||
@param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
|
@param[in] This Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
|
||||||
@param[in] Changed Handle on which is installed an instance of the EFI_USER_CREDENTIAL2_PROTOCOL
|
@param[in] Changed Handle on which is installed an instance of the EFI_USER_CREDENTIAL2_PROTOCOL
|
||||||
@ -4138,102 +3619,8 @@ UserProfileNotify (
|
|||||||
IN CONST EFI_USER_MANAGER_PROTOCOL *This,
|
IN CONST EFI_USER_MANAGER_PROTOCOL *This,
|
||||||
IN EFI_HANDLE Changed
|
IN EFI_HANDLE Changed
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
EFI_STATUS Status;
|
return EFI_UNSUPPORTED;
|
||||||
EFI_USER_CREDENTIAL2_PROTOCOL *Provider;
|
|
||||||
EFI_USER_INFO_IDENTIFIER UserId;
|
|
||||||
EFI_USER_INFO_HANDLE UserInfo;
|
|
||||||
EFI_USER_INFO_HANDLE UserInfo2;
|
|
||||||
UINTN InfoSize;
|
|
||||||
EFI_USER_INFO *Info;
|
|
||||||
USER_PROFILE_ENTRY *User;
|
|
||||||
|
|
||||||
if (This == NULL) {
|
|
||||||
return EFI_INVALID_PARAMETER;
|
|
||||||
}
|
|
||||||
|
|
||||||
Status = gBS->HandleProtocol (
|
|
||||||
Changed,
|
|
||||||
&gEfiUserCredential2ProtocolGuid,
|
|
||||||
(VOID **) &Provider
|
|
||||||
);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
|
|
||||||
Status = Provider->User (Provider, NULL, &UserId);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return EFI_NOT_READY;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Find user with the UserId.
|
|
||||||
//
|
|
||||||
User = NULL;
|
|
||||||
while (TRUE) {
|
|
||||||
//
|
|
||||||
// Find next user profile.
|
|
||||||
//
|
|
||||||
Status = FindUserProfile (&User, TRUE, NULL);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return Status;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Find the user information.
|
|
||||||
//
|
|
||||||
Info = NULL;
|
|
||||||
FindUserInfoByType (User, &Info, EFI_USER_INFO_IDENTIFIER_RECORD);
|
|
||||||
if (CompareMem ((UINT8 *) (Info + 1), UserId, sizeof (UserId)) == 0) {
|
|
||||||
//
|
|
||||||
// Found the infomation record.
|
|
||||||
//
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
UserInfo = NULL;
|
|
||||||
do {
|
|
||||||
//
|
|
||||||
// Get user info handle.
|
|
||||||
//
|
|
||||||
Status = Provider->GetNextInfo(Provider, &UserInfo);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
return EFI_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Get the user information from the user info handle.
|
|
||||||
//
|
|
||||||
InfoSize = 0;
|
|
||||||
Status = Provider->GetInfo(Provider, UserInfo, NULL, &InfoSize);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
if (Status == EFI_BUFFER_TOO_SMALL) {
|
|
||||||
Info = AllocateZeroPool (InfoSize);
|
|
||||||
if (Info == NULL) {
|
|
||||||
return EFI_OUT_OF_RESOURCES;
|
|
||||||
}
|
|
||||||
Status = Provider->GetInfo(Provider, UserInfo, Info, &InfoSize);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
FreePool (Info);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
//
|
|
||||||
// Save the user information.
|
|
||||||
//
|
|
||||||
UserInfo2 = NULL;
|
|
||||||
Status = UserProfileSetInfo (&gUserIdentifyManager, (EFI_USER_PROFILE_HANDLE)User, &UserInfo2, Info, InfoSize);
|
|
||||||
FreePool (Info);
|
|
||||||
if (EFI_ERROR (Status)) {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
} while (TRUE);
|
|
||||||
|
|
||||||
return Status;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -0,0 +1,702 @@
|
|||||||
|
/** @file
|
||||||
|
The functions for access policy modification.
|
||||||
|
|
||||||
|
Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
|
||||||
|
This program and the accompanying materials
|
||||||
|
are licensed and made available under the terms and conditions of the BSD License
|
||||||
|
which accompanies this distribution. The full text of the license may be found at
|
||||||
|
http://opensource.org/licenses/bsd-license.php
|
||||||
|
|
||||||
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||||
|
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include "UserProfileManager.h"
|
||||||
|
|
||||||
|
/**
|
||||||
|
Collect all the access policy data to mUserInfo.AccessPolicy,
|
||||||
|
and save it to user profile.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
SaveAccessPolicy (
|
||||||
|
VOID
|
||||||
|
)
|
||||||
|
{
|
||||||
|
EFI_STATUS Status;
|
||||||
|
UINTN OffSet;
|
||||||
|
UINTN Size;
|
||||||
|
EFI_USER_INFO_ACCESS_CONTROL Control;
|
||||||
|
EFI_USER_INFO_HANDLE UserInfo;
|
||||||
|
EFI_USER_INFO *Info;
|
||||||
|
|
||||||
|
if (mUserInfo.AccessPolicy != NULL) {
|
||||||
|
FreePool (mUserInfo.AccessPolicy);
|
||||||
|
}
|
||||||
|
mUserInfo.AccessPolicy = NULL;
|
||||||
|
mUserInfo.AccessPolicyLen = 0;
|
||||||
|
mUserInfo.AccessPolicyModified = TRUE;
|
||||||
|
OffSet = 0;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save access right.
|
||||||
|
//
|
||||||
|
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL);
|
||||||
|
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||||
|
ExpandMemory (OffSet, Size);
|
||||||
|
}
|
||||||
|
|
||||||
|
Control.Type = mAccessInfo.AccessRight;
|
||||||
|
Control.Size = (UINT32) Size;
|
||||||
|
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||||
|
OffSet += sizeof (Control);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save access setup.
|
||||||
|
//
|
||||||
|
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + sizeof (EFI_GUID);
|
||||||
|
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||||
|
ExpandMemory (OffSet, Size);
|
||||||
|
}
|
||||||
|
|
||||||
|
Control.Type = EFI_USER_INFO_ACCESS_SETUP;
|
||||||
|
Control.Size = (UINT32) Size;
|
||||||
|
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||||
|
OffSet += sizeof (Control);
|
||||||
|
|
||||||
|
if (mAccessInfo.AccessSetup == ACCESS_SETUP_NORMAL) {
|
||||||
|
CopyGuid ((EFI_GUID *) (mUserInfo.AccessPolicy + OffSet), &gEfiUserInfoAccessSetupNormalGuid);
|
||||||
|
} else if (mAccessInfo.AccessSetup == ACCESS_SETUP_RESTRICTED) {
|
||||||
|
CopyGuid ((EFI_GUID *) (mUserInfo.AccessPolicy + OffSet), &gEfiUserInfoAccessSetupRestrictedGuid);
|
||||||
|
} else if (mAccessInfo.AccessSetup == ACCESS_SETUP_ADMIN) {
|
||||||
|
CopyGuid ((EFI_GUID *) (mUserInfo.AccessPolicy + OffSet), &gEfiUserInfoAccessSetupAdminGuid);
|
||||||
|
}
|
||||||
|
OffSet += sizeof (EFI_GUID);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save access of boot order.
|
||||||
|
//
|
||||||
|
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + sizeof (UINT32);
|
||||||
|
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||||
|
ExpandMemory (OffSet, Size);
|
||||||
|
}
|
||||||
|
|
||||||
|
Control.Type = EFI_USER_INFO_ACCESS_BOOT_ORDER;
|
||||||
|
Control.Size = (UINT32) Size;
|
||||||
|
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||||
|
OffSet += sizeof (Control);
|
||||||
|
|
||||||
|
CopyMem ((UINT8 *) (mUserInfo.AccessPolicy + OffSet), &mAccessInfo.AccessBootOrder, sizeof (UINT32));
|
||||||
|
OffSet += sizeof (UINT32);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save permit load.
|
||||||
|
//
|
||||||
|
if (mAccessInfo.LoadPermitLen > 0) {
|
||||||
|
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + mAccessInfo.LoadPermitLen;
|
||||||
|
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||||
|
ExpandMemory (OffSet, Size);
|
||||||
|
}
|
||||||
|
|
||||||
|
Control.Type = EFI_USER_INFO_ACCESS_PERMIT_LOAD;
|
||||||
|
Control.Size = (UINT32) Size;
|
||||||
|
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||||
|
OffSet += sizeof (Control);
|
||||||
|
|
||||||
|
CopyMem (mUserInfo.AccessPolicy + OffSet, mAccessInfo.LoadPermit, mAccessInfo.LoadPermitLen);
|
||||||
|
OffSet += mAccessInfo.LoadPermitLen;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save forbid load.
|
||||||
|
//
|
||||||
|
if (mAccessInfo.LoadForbidLen > 0) {
|
||||||
|
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + mAccessInfo.LoadForbidLen;
|
||||||
|
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||||
|
ExpandMemory (OffSet, Size);
|
||||||
|
}
|
||||||
|
|
||||||
|
Control.Type = EFI_USER_INFO_ACCESS_FORBID_LOAD;
|
||||||
|
Control.Size = (UINT32) Size;
|
||||||
|
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||||
|
OffSet += sizeof (Control);
|
||||||
|
|
||||||
|
CopyMem (mUserInfo.AccessPolicy + OffSet, mAccessInfo.LoadForbid, mAccessInfo.LoadForbidLen);
|
||||||
|
OffSet += mAccessInfo.LoadForbidLen;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save permit connect.
|
||||||
|
//
|
||||||
|
if (mAccessInfo.ConnectPermitLen > 0) {
|
||||||
|
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + mAccessInfo.ConnectPermitLen;
|
||||||
|
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||||
|
ExpandMemory (OffSet, Size);
|
||||||
|
}
|
||||||
|
|
||||||
|
Control.Type = EFI_USER_INFO_ACCESS_PERMIT_CONNECT;
|
||||||
|
Control.Size = (UINT32) Size;
|
||||||
|
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||||
|
OffSet += sizeof (Control);
|
||||||
|
|
||||||
|
CopyMem (mUserInfo.AccessPolicy + OffSet, mAccessInfo.ConnectPermit, mAccessInfo.ConnectPermitLen);
|
||||||
|
OffSet += mAccessInfo.ConnectPermitLen;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save forbid connect.
|
||||||
|
//
|
||||||
|
if (mAccessInfo.ConnectForbidLen > 0) {
|
||||||
|
Size = sizeof (EFI_USER_INFO_ACCESS_CONTROL) + mAccessInfo.ConnectForbidLen;
|
||||||
|
if (mUserInfo.AccessPolicyLen - OffSet < Size) {
|
||||||
|
ExpandMemory (OffSet, Size);
|
||||||
|
}
|
||||||
|
|
||||||
|
Control.Type = EFI_USER_INFO_ACCESS_FORBID_CONNECT;
|
||||||
|
Control.Size = (UINT32) Size;
|
||||||
|
CopyMem (mUserInfo.AccessPolicy + OffSet, &Control, sizeof (Control));
|
||||||
|
OffSet += sizeof (Control);
|
||||||
|
|
||||||
|
CopyMem (mUserInfo.AccessPolicy + OffSet, mAccessInfo.ConnectForbid, mAccessInfo.ConnectForbidLen);
|
||||||
|
OffSet += mAccessInfo.ConnectForbidLen;
|
||||||
|
}
|
||||||
|
|
||||||
|
mUserInfo.AccessPolicyLen = OffSet;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save access policy.
|
||||||
|
//
|
||||||
|
if (mUserInfo.AccessPolicyModified && (mUserInfo.AccessPolicyLen > 0)) {
|
||||||
|
Info = AllocateZeroPool (sizeof (EFI_USER_INFO) + mUserInfo.AccessPolicyLen);
|
||||||
|
if (Info == NULL) {
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
Status = FindInfoByType (mModifyUser, EFI_USER_INFO_ACCESS_POLICY_RECORD, &UserInfo);
|
||||||
|
if (!EFI_ERROR (Status)) {
|
||||||
|
Info->InfoType = EFI_USER_INFO_ACCESS_POLICY_RECORD;
|
||||||
|
Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV |
|
||||||
|
EFI_USER_INFO_PUBLIC |
|
||||||
|
EFI_USER_INFO_EXCLUSIVE;
|
||||||
|
Info->InfoSize = (UINT32) (sizeof (EFI_USER_INFO) + mUserInfo.AccessPolicyLen);
|
||||||
|
CopyMem ((UINT8 *) (Info + 1), mUserInfo.AccessPolicy, mUserInfo.AccessPolicyLen);
|
||||||
|
Status = mUserManager->SetInfo (
|
||||||
|
mUserManager,
|
||||||
|
mModifyUser,
|
||||||
|
&UserInfo,
|
||||||
|
Info,
|
||||||
|
Info->InfoSize
|
||||||
|
);
|
||||||
|
mUserInfo.AccessPolicyModified = FALSE;
|
||||||
|
}
|
||||||
|
FreePool (Info);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (mAccessInfo.ConnectForbid != NULL) {
|
||||||
|
FreePool (mAccessInfo.ConnectForbid);
|
||||||
|
mAccessInfo.ConnectForbid = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (mAccessInfo.ConnectPermit != NULL) {
|
||||||
|
FreePool (mAccessInfo.ConnectPermit);
|
||||||
|
mAccessInfo.ConnectPermit = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (mAccessInfo.LoadForbid != NULL) {
|
||||||
|
FreePool (mAccessInfo.LoadForbid);
|
||||||
|
mAccessInfo.LoadForbid = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (mAccessInfo.LoadPermit != NULL) {
|
||||||
|
FreePool (mAccessInfo.LoadPermit);
|
||||||
|
mAccessInfo.LoadPermit = NULL;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Create an action OpCode with QuestionID and DevicePath on a given OpCodeHandle.
|
||||||
|
|
||||||
|
@param[in] QuestionID The question ID.
|
||||||
|
@param[in] DevicePath Points to device path.
|
||||||
|
@param[in] OpCodeHandle Points to container for dynamic created opcodes.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
AddDevicePath (
|
||||||
|
IN UINTN QuestionID,
|
||||||
|
IN EFI_DEVICE_PATH_PROTOCOL *DevicePath,
|
||||||
|
IN VOID *OpCodeHandle
|
||||||
|
)
|
||||||
|
{
|
||||||
|
EFI_STATUS Status;
|
||||||
|
EFI_DEVICE_PATH_PROTOCOL *Next;
|
||||||
|
EFI_STRING_ID NameID;
|
||||||
|
EFI_STRING DriverName;
|
||||||
|
EFI_DEVICE_PATH_TO_TEXT_PROTOCOL *DevicePathText;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Locate device path to text protocol.
|
||||||
|
//
|
||||||
|
Status = gBS->LocateProtocol (
|
||||||
|
&gEfiDevicePathToTextProtocolGuid,
|
||||||
|
NULL,
|
||||||
|
(VOID **) &DevicePathText
|
||||||
|
);
|
||||||
|
if (EFI_ERROR (Status)) {
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Get driver file name node.
|
||||||
|
//
|
||||||
|
Next = DevicePath;
|
||||||
|
while (!IsDevicePathEnd (Next)) {
|
||||||
|
DevicePath = Next;
|
||||||
|
Next = NextDevicePathNode (Next);
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Display the device path in form.
|
||||||
|
//
|
||||||
|
DriverName = DevicePathText->ConvertDevicePathToText (DevicePath, FALSE, FALSE);
|
||||||
|
NameID = HiiSetString (mCallbackInfo->HiiHandle, 0, DriverName, NULL);
|
||||||
|
FreePool (DriverName);
|
||||||
|
if (NameID == 0) {
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
HiiCreateActionOpCode (
|
||||||
|
OpCodeHandle, // Container for dynamic created opcodes
|
||||||
|
(UINT16) QuestionID, // Question ID
|
||||||
|
NameID, // Prompt text
|
||||||
|
STRING_TOKEN (STR_NULL_STRING), // Help text
|
||||||
|
EFI_IFR_FLAG_CALLBACK, // Question flag
|
||||||
|
0 // Action String ID
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Check whether the DevicePath is in the device path forbid list
|
||||||
|
(mAccessInfo.LoadForbid).
|
||||||
|
|
||||||
|
@param[in] DevicePath Points to device path.
|
||||||
|
|
||||||
|
@retval TRUE The DevicePath is in the device path forbid list.
|
||||||
|
@retval FALSE The DevicePath is not in the device path forbid list.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
IsLoadForbidden (
|
||||||
|
IN EFI_DEVICE_PATH_PROTOCOL *DevicePath
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN OffSet;
|
||||||
|
UINTN DPSize;
|
||||||
|
UINTN Size;
|
||||||
|
EFI_DEVICE_PATH_PROTOCOL *Dp;
|
||||||
|
|
||||||
|
OffSet = 0;
|
||||||
|
Size = GetDevicePathSize (DevicePath);
|
||||||
|
//
|
||||||
|
// Check each device path.
|
||||||
|
//
|
||||||
|
while (OffSet < mAccessInfo.LoadForbidLen) {
|
||||||
|
Dp = (EFI_DEVICE_PATH_PROTOCOL *) (mAccessInfo.LoadForbid + OffSet);
|
||||||
|
DPSize = GetDevicePathSize (Dp);
|
||||||
|
//
|
||||||
|
// Compare device path.
|
||||||
|
//
|
||||||
|
if ((DPSize == Size) && (CompareMem (DevicePath, Dp, Size) == 0)) {
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
OffSet += DPSize;
|
||||||
|
}
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Display the permit load device path in the loadable device path list.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
DisplayLoadPermit(
|
||||||
|
VOID
|
||||||
|
)
|
||||||
|
{
|
||||||
|
EFI_STATUS Status;
|
||||||
|
CHAR16 *Order;
|
||||||
|
UINTN OrderSize;
|
||||||
|
UINTN ListCount;
|
||||||
|
UINTN Index;
|
||||||
|
UINT8 *Var;
|
||||||
|
UINT8 *VarPtr;
|
||||||
|
CHAR16 VarName[12];
|
||||||
|
VOID *StartOpCodeHandle;
|
||||||
|
VOID *EndOpCodeHandle;
|
||||||
|
EFI_IFR_GUID_LABEL *StartLabel;
|
||||||
|
EFI_IFR_GUID_LABEL *EndLabel;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Get DriverOrder.
|
||||||
|
//
|
||||||
|
OrderSize = 0;
|
||||||
|
Status = gRT->GetVariable (
|
||||||
|
L"DriverOrder",
|
||||||
|
&gEfiGlobalVariableGuid,
|
||||||
|
NULL,
|
||||||
|
&OrderSize,
|
||||||
|
NULL
|
||||||
|
);
|
||||||
|
if (Status != EFI_BUFFER_TOO_SMALL) {
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
Order = AllocateZeroPool (OrderSize);
|
||||||
|
if (Order == NULL) {
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
Status = gRT->GetVariable (
|
||||||
|
L"DriverOrder",
|
||||||
|
&gEfiGlobalVariableGuid,
|
||||||
|
NULL,
|
||||||
|
&OrderSize,
|
||||||
|
Order
|
||||||
|
);
|
||||||
|
if (EFI_ERROR (Status)) {
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Initialize the container for dynamic opcodes.
|
||||||
|
//
|
||||||
|
StartOpCodeHandle = HiiAllocateOpCodeHandle ();
|
||||||
|
ASSERT (StartOpCodeHandle != NULL);
|
||||||
|
|
||||||
|
EndOpCodeHandle = HiiAllocateOpCodeHandle ();
|
||||||
|
ASSERT (EndOpCodeHandle != NULL);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Create Hii Extend Label OpCode.
|
||||||
|
//
|
||||||
|
StartLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
|
||||||
|
StartOpCodeHandle,
|
||||||
|
&gEfiIfrTianoGuid,
|
||||||
|
NULL,
|
||||||
|
sizeof (EFI_IFR_GUID_LABEL)
|
||||||
|
);
|
||||||
|
StartLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||||
|
StartLabel->Number = LABEL_PERMIT_LOAD_FUNC;
|
||||||
|
|
||||||
|
EndLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
|
||||||
|
EndOpCodeHandle,
|
||||||
|
&gEfiIfrTianoGuid,
|
||||||
|
NULL,
|
||||||
|
sizeof (EFI_IFR_GUID_LABEL)
|
||||||
|
);
|
||||||
|
EndLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||||
|
EndLabel->Number = LABEL_END;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Add each driver option.
|
||||||
|
//
|
||||||
|
Var = NULL;
|
||||||
|
ListCount = OrderSize / sizeof (UINT16);
|
||||||
|
for (Index = 0; Index < ListCount; Index++) {
|
||||||
|
//
|
||||||
|
// Get driver device path.
|
||||||
|
//
|
||||||
|
UnicodeSPrint (VarName, sizeof (VarName), L"Driver%04x", Order[Index]);
|
||||||
|
Var = GetEfiGlobalVariable (VarName);
|
||||||
|
if (Var == NULL) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Check whether the driver is already forbidden.
|
||||||
|
//
|
||||||
|
|
||||||
|
VarPtr = Var;
|
||||||
|
//
|
||||||
|
// Skip attribute.
|
||||||
|
//
|
||||||
|
VarPtr += sizeof (UINT32);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Skip device path lenth.
|
||||||
|
//
|
||||||
|
VarPtr += sizeof (UINT16);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Skip descript string.
|
||||||
|
//
|
||||||
|
VarPtr += StrSize ((UINT16 *) VarPtr);
|
||||||
|
|
||||||
|
if (IsLoadForbidden ((EFI_DEVICE_PATH_PROTOCOL *) VarPtr)) {
|
||||||
|
FreePool (Var);
|
||||||
|
Var = NULL;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
AddDevicePath (
|
||||||
|
KEY_MODIFY_USER | KEY_MODIFY_AP_DP | KEY_LOAD_PERMIT_MODIFY | Order[Index],
|
||||||
|
(EFI_DEVICE_PATH_PROTOCOL *) VarPtr,
|
||||||
|
StartOpCodeHandle
|
||||||
|
);
|
||||||
|
FreePool (Var);
|
||||||
|
Var = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
HiiUpdateForm (
|
||||||
|
mCallbackInfo->HiiHandle, // HII handle
|
||||||
|
&gUserProfileManagerGuid, // Formset GUID
|
||||||
|
FORMID_PERMIT_LOAD_DP, // Form ID
|
||||||
|
StartOpCodeHandle, // Label for where to insert opcodes
|
||||||
|
EndOpCodeHandle // Replace data
|
||||||
|
);
|
||||||
|
|
||||||
|
HiiFreeOpCodeHandle (StartOpCodeHandle);
|
||||||
|
HiiFreeOpCodeHandle (EndOpCodeHandle);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Clear Environment.
|
||||||
|
//
|
||||||
|
if (Var != NULL) {
|
||||||
|
FreePool (Var);
|
||||||
|
}
|
||||||
|
FreePool (Order);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Display the forbid load device path list (mAccessInfo.LoadForbid).
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
DisplayLoadForbid (
|
||||||
|
VOID
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN Offset;
|
||||||
|
UINTN DPSize;
|
||||||
|
UINTN Index;
|
||||||
|
EFI_DEVICE_PATH_PROTOCOL *Dp;
|
||||||
|
VOID *StartOpCodeHandle;
|
||||||
|
VOID *EndOpCodeHandle;
|
||||||
|
EFI_IFR_GUID_LABEL *StartLabel;
|
||||||
|
EFI_IFR_GUID_LABEL *EndLabel;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Initialize the container for dynamic opcodes.
|
||||||
|
//
|
||||||
|
StartOpCodeHandle = HiiAllocateOpCodeHandle ();
|
||||||
|
ASSERT (StartOpCodeHandle != NULL);
|
||||||
|
|
||||||
|
EndOpCodeHandle = HiiAllocateOpCodeHandle ();
|
||||||
|
ASSERT (EndOpCodeHandle != NULL);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Create Hii Extend Label OpCode.
|
||||||
|
//
|
||||||
|
StartLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
|
||||||
|
StartOpCodeHandle,
|
||||||
|
&gEfiIfrTianoGuid,
|
||||||
|
NULL,
|
||||||
|
sizeof (EFI_IFR_GUID_LABEL)
|
||||||
|
);
|
||||||
|
StartLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||||
|
StartLabel->Number = LABLE_FORBID_LOAD_FUNC;
|
||||||
|
|
||||||
|
EndLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
|
||||||
|
EndOpCodeHandle,
|
||||||
|
&gEfiIfrTianoGuid,
|
||||||
|
NULL,
|
||||||
|
sizeof (EFI_IFR_GUID_LABEL)
|
||||||
|
);
|
||||||
|
EndLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||||
|
EndLabel->Number = LABEL_END;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Add each forbid load drivers.
|
||||||
|
//
|
||||||
|
Offset = 0;
|
||||||
|
Index = 0;
|
||||||
|
while (Offset < mAccessInfo.LoadForbidLen) {
|
||||||
|
Dp = (EFI_DEVICE_PATH_PROTOCOL *) (mAccessInfo.LoadForbid + Offset);
|
||||||
|
DPSize = GetDevicePathSize (Dp);
|
||||||
|
AddDevicePath (
|
||||||
|
KEY_MODIFY_USER | KEY_MODIFY_AP_DP | KEY_LOAD_FORBID_MODIFY | Index,
|
||||||
|
Dp,
|
||||||
|
StartOpCodeHandle
|
||||||
|
);
|
||||||
|
Index++;
|
||||||
|
Offset += DPSize;
|
||||||
|
}
|
||||||
|
|
||||||
|
HiiUpdateForm (
|
||||||
|
mCallbackInfo->HiiHandle, // HII handle
|
||||||
|
&gUserProfileManagerGuid, // Formset GUID
|
||||||
|
FORMID_FORBID_LOAD_DP, // Form ID
|
||||||
|
StartOpCodeHandle, // Label for where to insert opcodes
|
||||||
|
EndOpCodeHandle // Replace data
|
||||||
|
);
|
||||||
|
|
||||||
|
HiiFreeOpCodeHandle (StartOpCodeHandle);
|
||||||
|
HiiFreeOpCodeHandle (EndOpCodeHandle);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Display the permit connect device path.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
DisplayConnectPermit (
|
||||||
|
VOID
|
||||||
|
)
|
||||||
|
{
|
||||||
|
//
|
||||||
|
// Note:
|
||||||
|
// As no architect protocol/interface to be called in ConnectController()
|
||||||
|
// to verify the device path, just add a place holder for permitted connect
|
||||||
|
// device path.
|
||||||
|
//
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Display the forbid connect device path list.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
DisplayConnectForbid (
|
||||||
|
VOID
|
||||||
|
)
|
||||||
|
{
|
||||||
|
//
|
||||||
|
// Note:
|
||||||
|
// As no architect protocol/interface to be called in ConnectController()
|
||||||
|
// to verify the device path, just add a place holder for forbidden connect
|
||||||
|
// device path.
|
||||||
|
//
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Delete the specified device path by DriverIndex from the forbid device path
|
||||||
|
list (mAccessInfo.LoadForbid).
|
||||||
|
|
||||||
|
@param[in] DriverIndex The index of driver in forbidden device path list.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
DeleteFromForbidLoad (
|
||||||
|
IN UINT16 DriverIndex
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN OffSet;
|
||||||
|
UINTN DPSize;
|
||||||
|
UINTN OffLen;
|
||||||
|
EFI_DEVICE_PATH_PROTOCOL *Dp;
|
||||||
|
|
||||||
|
OffSet = 0;
|
||||||
|
//
|
||||||
|
// Find the specified device path.
|
||||||
|
//
|
||||||
|
while ((OffSet < mAccessInfo.LoadForbidLen) && (DriverIndex > 0)) {
|
||||||
|
Dp = (EFI_DEVICE_PATH_PROTOCOL *) (mAccessInfo.LoadForbid + OffSet);
|
||||||
|
DPSize = GetDevicePathSize (Dp);
|
||||||
|
OffSet += DPSize;
|
||||||
|
DriverIndex--;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Specified device path found.
|
||||||
|
//
|
||||||
|
if (DriverIndex == 0) {
|
||||||
|
Dp = (EFI_DEVICE_PATH_PROTOCOL *) (mAccessInfo.LoadForbid + OffSet);
|
||||||
|
DPSize = GetDevicePathSize (Dp);
|
||||||
|
OffLen = mAccessInfo.LoadForbidLen - OffSet - DPSize;
|
||||||
|
if (OffLen > 0) {
|
||||||
|
CopyMem (
|
||||||
|
mAccessInfo.LoadForbid + OffSet,
|
||||||
|
mAccessInfo.LoadForbid + OffSet + DPSize,
|
||||||
|
OffLen
|
||||||
|
);
|
||||||
|
}
|
||||||
|
mAccessInfo.LoadForbidLen -= DPSize;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Add the specified device path by DriverIndex to the forbid device path
|
||||||
|
list (mAccessInfo.LoadForbid).
|
||||||
|
|
||||||
|
@param[in] DriverIndex The index of driver saved in driver options.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
AddToForbidLoad (
|
||||||
|
IN UINT16 DriverIndex
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN DevicePathLen;
|
||||||
|
UINT8 *Var;
|
||||||
|
UINT8 *VarPtr;
|
||||||
|
UINTN NewLen;
|
||||||
|
UINT8 *NewFL;
|
||||||
|
CHAR16 VarName[13];
|
||||||
|
|
||||||
|
//
|
||||||
|
// Get loadable driver device path.
|
||||||
|
//
|
||||||
|
UnicodeSPrint (VarName, sizeof (VarName), L"Driver%04x", DriverIndex);
|
||||||
|
Var = GetEfiGlobalVariable (VarName);
|
||||||
|
if (Var == NULL) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save forbid load driver.
|
||||||
|
//
|
||||||
|
|
||||||
|
VarPtr = Var;
|
||||||
|
//
|
||||||
|
// Skip attribute.
|
||||||
|
//
|
||||||
|
VarPtr += sizeof (UINT32);
|
||||||
|
|
||||||
|
DevicePathLen = *(UINT16 *) VarPtr;
|
||||||
|
//
|
||||||
|
// Skip device path length.
|
||||||
|
//
|
||||||
|
VarPtr += sizeof (UINT16);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Skip description string.
|
||||||
|
//
|
||||||
|
VarPtr += StrSize ((UINT16 *) VarPtr);
|
||||||
|
|
||||||
|
NewLen = mAccessInfo.LoadForbidLen + DevicePathLen;
|
||||||
|
NewFL = AllocateZeroPool (NewLen);
|
||||||
|
if (NewFL == NULL) {
|
||||||
|
FreePool (Var);
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (mAccessInfo.LoadForbidLen > 0) {
|
||||||
|
CopyMem (NewFL, mAccessInfo.LoadForbid, mAccessInfo.LoadForbidLen);
|
||||||
|
FreePool (mAccessInfo.LoadForbid);
|
||||||
|
}
|
||||||
|
|
||||||
|
CopyMem (NewFL + mAccessInfo.LoadForbidLen, VarPtr, DevicePathLen);
|
||||||
|
mAccessInfo.LoadForbidLen = NewLen;
|
||||||
|
mAccessInfo.LoadForbid = NewFL;
|
||||||
|
FreePool (Var);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
@ -0,0 +1,518 @@
|
|||||||
|
/** @file
|
||||||
|
The functions for identification policy modification.
|
||||||
|
|
||||||
|
Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
|
||||||
|
This program and the accompanying materials
|
||||||
|
are licensed and made available under the terms and conditions of the BSD License
|
||||||
|
which accompanies this distribution. The full text of the license may be found at
|
||||||
|
http://opensource.org/licenses/bsd-license.php
|
||||||
|
|
||||||
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||||
|
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include "UserProfileManager.h"
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Verify the new identity policy in the current implementation. The same credential
|
||||||
|
provider can't appear twice in one identity policy.
|
||||||
|
|
||||||
|
@param[in] NewGuid Points to the credential provider guid.
|
||||||
|
|
||||||
|
@retval TRUE The NewGuid was found in the identity policy.
|
||||||
|
@retval FALSE The NewGuid was not found.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
ProviderAlreadyInPolicy (
|
||||||
|
IN EFI_GUID *NewGuid
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN Offset;
|
||||||
|
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||||
|
EFI_INPUT_KEY Key;
|
||||||
|
|
||||||
|
Offset = 0;
|
||||||
|
while (Offset < mUserInfo.NewIdentityPolicyLen) {
|
||||||
|
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (mUserInfo.NewIdentityPolicy + Offset);
|
||||||
|
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
||||||
|
if (CompareGuid (NewGuid, (EFI_GUID *) (Identity + 1))) {
|
||||||
|
CreatePopUp (
|
||||||
|
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||||
|
&Key,
|
||||||
|
L"This Credential Provider Are Already Used!",
|
||||||
|
L"",
|
||||||
|
L"Press Any Key to Continue ...",
|
||||||
|
NULL
|
||||||
|
);
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Offset += Identity->Length;
|
||||||
|
}
|
||||||
|
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Add or delete the user's credential record in the provider.
|
||||||
|
|
||||||
|
@param[in] ProviderGuid Point to credential provider guid.
|
||||||
|
@param[in] User Points to user profile.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS Add or delete record successfully.
|
||||||
|
@retval Others Fail to add or delete record.
|
||||||
|
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
EnrollUserOnProvider (
|
||||||
|
IN EFI_USER_INFO_IDENTITY_POLICY *Identity,
|
||||||
|
IN EFI_USER_PROFILE_HANDLE User
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN Index;
|
||||||
|
EFI_USER_CREDENTIAL2_PROTOCOL *UserCredential;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Find the specified credential provider.
|
||||||
|
//
|
||||||
|
for (Index = 0; Index < mProviderInfo->Count; Index++) {
|
||||||
|
UserCredential = mProviderInfo->Provider[Index];
|
||||||
|
if (CompareGuid ((EFI_GUID *)(Identity + 1), &UserCredential->Identifier)) {
|
||||||
|
return UserCredential->Enroll (UserCredential, User);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return EFI_NOT_FOUND;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Delete the User's credential record on the provider.
|
||||||
|
|
||||||
|
@param[in] Identity Point to EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER user info.
|
||||||
|
@param[in] User Points to user profile.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS Delete User's credential record successfully.
|
||||||
|
@retval Others Fail to add or delete record.
|
||||||
|
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
DeleteUserOnProvider (
|
||||||
|
IN EFI_USER_INFO_IDENTITY_POLICY *Identity,
|
||||||
|
IN EFI_USER_PROFILE_HANDLE User
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN Index;
|
||||||
|
EFI_USER_CREDENTIAL2_PROTOCOL *UserCredential;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Find the specified credential provider.
|
||||||
|
//
|
||||||
|
for (Index = 0; Index < mProviderInfo->Count; Index++) {
|
||||||
|
UserCredential = mProviderInfo->Provider[Index];
|
||||||
|
if (CompareGuid ((EFI_GUID *)(Identity + 1), &UserCredential->Identifier)) {
|
||||||
|
return UserCredential->Delete (UserCredential, User);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return EFI_NOT_FOUND;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Delete User's credental from all the providers that exist in User's identity policy.
|
||||||
|
|
||||||
|
@param[in] IdentityPolicy Point to User's identity policy.
|
||||||
|
@param[in] IdentityPolicyLen The length of the identity policy.
|
||||||
|
@param[in] User Points to user profile.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
DeleteCredentialFromProviders (
|
||||||
|
IN UINT8 *IdentityPolicy,
|
||||||
|
IN UINTN IdentityPolicyLen,
|
||||||
|
IN EFI_USER_PROFILE_HANDLE User
|
||||||
|
)
|
||||||
|
{
|
||||||
|
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||||
|
UINTN Offset;
|
||||||
|
|
||||||
|
Offset = 0;
|
||||||
|
while (Offset < IdentityPolicyLen) {
|
||||||
|
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (IdentityPolicy + Offset);
|
||||||
|
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
||||||
|
//
|
||||||
|
// Delete the user on this provider.
|
||||||
|
//
|
||||||
|
DeleteUserOnProvider (Identity, User);
|
||||||
|
}
|
||||||
|
Offset += Identity->Length;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Remove the provider in FindIdentity from the user identification information record.
|
||||||
|
|
||||||
|
@param[in, out] NewInfo On entry, points to the user information to remove provider.
|
||||||
|
On return, points to the user information the provider is removed.
|
||||||
|
@param[in] FindIdentity Point to the user identity policy.
|
||||||
|
|
||||||
|
@retval TRUE The provider is removed successfully.
|
||||||
|
@retval FALSE Fail to remove the provider.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
DeleteProviderFromPolicy (
|
||||||
|
IN EFI_USER_INFO_IDENTITY_POLICY *IdentityPolicy,
|
||||||
|
IN UINTN Offset
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN RemainingLen;
|
||||||
|
UINTN DeleteLen;
|
||||||
|
|
||||||
|
if (IdentityPolicy->Length == mUserInfo.NewIdentityPolicyLen) {
|
||||||
|
//
|
||||||
|
// Only one credential provider in the identification policy.
|
||||||
|
// Set the new policy to be TRUE after removed the provider.
|
||||||
|
//
|
||||||
|
IdentityPolicy->Type = EFI_USER_INFO_IDENTITY_TRUE;
|
||||||
|
IdentityPolicy->Length = sizeof (EFI_USER_INFO_IDENTITY_POLICY);
|
||||||
|
mUserInfo.NewIdentityPolicyLen = IdentityPolicy->Length;
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
DeleteLen = IdentityPolicy->Length + sizeof(EFI_USER_INFO_IDENTITY_POLICY);
|
||||||
|
if ((Offset + IdentityPolicy->Length) != mUserInfo.NewIdentityPolicyLen) {
|
||||||
|
//
|
||||||
|
// This provider is not the last item in the identification policy, delete it and the connector.
|
||||||
|
//
|
||||||
|
RemainingLen = mUserInfo.NewIdentityPolicyLen - Offset - DeleteLen;
|
||||||
|
CopyMem ((UINT8 *) IdentityPolicy, (UINT8 *) IdentityPolicy + DeleteLen, RemainingLen);
|
||||||
|
}
|
||||||
|
mUserInfo.NewIdentityPolicyLen -= DeleteLen;
|
||||||
|
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Update the mUserInfo.NewIdentityPolicy, and UI when 'add option' is pressed.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
AddProviderToPolicy (
|
||||||
|
IN EFI_GUID *NewGuid
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINT8 *NewPolicyInfo;
|
||||||
|
UINTN NewPolicyInfoLen;
|
||||||
|
EFI_USER_INFO_IDENTITY_POLICY *Policy;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Allocate memory for the new identity policy.
|
||||||
|
//
|
||||||
|
NewPolicyInfoLen = mUserInfo.NewIdentityPolicyLen + sizeof (EFI_USER_INFO_IDENTITY_POLICY) + sizeof (EFI_GUID);
|
||||||
|
if (mUserInfo.NewIdentityPolicyLen > 0) {
|
||||||
|
//
|
||||||
|
// It is not the first provider in the policy. Add a connector before provider.
|
||||||
|
//
|
||||||
|
NewPolicyInfoLen += sizeof (EFI_USER_INFO_IDENTITY_POLICY);
|
||||||
|
}
|
||||||
|
NewPolicyInfo = AllocateZeroPool (NewPolicyInfoLen);
|
||||||
|
if (NewPolicyInfo == NULL) {
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
NewPolicyInfoLen = 0;
|
||||||
|
if (mUserInfo.NewIdentityPolicyLen > 0) {
|
||||||
|
//
|
||||||
|
// Save orginal policy.
|
||||||
|
//
|
||||||
|
CopyMem (NewPolicyInfo, mUserInfo.NewIdentityPolicy, mUserInfo.NewIdentityPolicyLen);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save logical connector.
|
||||||
|
//
|
||||||
|
Policy = (EFI_USER_INFO_IDENTITY_POLICY *) (NewPolicyInfo + mUserInfo.NewIdentityPolicyLen);
|
||||||
|
if (mConncetLogical == 0) {
|
||||||
|
Policy->Type = EFI_USER_INFO_IDENTITY_AND;
|
||||||
|
} else {
|
||||||
|
Policy->Type = EFI_USER_INFO_IDENTITY_OR;
|
||||||
|
}
|
||||||
|
|
||||||
|
Policy->Length = sizeof (EFI_USER_INFO_IDENTITY_POLICY);
|
||||||
|
NewPolicyInfoLen = mUserInfo.NewIdentityPolicyLen + Policy->Length;
|
||||||
|
FreePool (mUserInfo.NewIdentityPolicy);
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save credential provider.
|
||||||
|
//
|
||||||
|
Policy = (EFI_USER_INFO_IDENTITY_POLICY *) (NewPolicyInfo + NewPolicyInfoLen);
|
||||||
|
Policy->Length = sizeof (EFI_USER_INFO_IDENTITY_POLICY) + sizeof (EFI_GUID);
|
||||||
|
Policy->Type = EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER;
|
||||||
|
CopyGuid ((EFI_GUID *) (Policy + 1), NewGuid);
|
||||||
|
NewPolicyInfoLen += Policy->Length;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Update identity policy choice.
|
||||||
|
//
|
||||||
|
mUserInfo.NewIdentityPolicy = NewPolicyInfo;
|
||||||
|
mUserInfo.NewIdentityPolicyLen = NewPolicyInfoLen;
|
||||||
|
mUserInfo.NewIdentityPolicyModified = TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
This function replaces the old identity policy with a new identity policy.
|
||||||
|
|
||||||
|
This function delete the user identity policy information.
|
||||||
|
If enroll new credential failed, recover the old identity policy.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS Modify user identity policy successfully.
|
||||||
|
@retval Others Fail to modify user identity policy.
|
||||||
|
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
UpdateCredentialProvider (
|
||||||
|
)
|
||||||
|
{
|
||||||
|
EFI_STATUS Status;
|
||||||
|
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||||
|
UINTN Offset;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Delete the old identification policy.
|
||||||
|
//
|
||||||
|
DeleteCredentialFromProviders (mUserInfo.IdentityPolicy, mUserInfo.IdentityPolicyLen, mModifyUser);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Add the new identification policy.
|
||||||
|
//
|
||||||
|
Offset = 0;
|
||||||
|
while (Offset < mUserInfo.NewIdentityPolicyLen) {
|
||||||
|
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (mUserInfo.NewIdentityPolicy + Offset);
|
||||||
|
if (Identity->Type == EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER) {
|
||||||
|
//
|
||||||
|
// Enroll the user on this provider
|
||||||
|
//
|
||||||
|
Status = EnrollUserOnProvider (Identity, mModifyUser);
|
||||||
|
if (EFI_ERROR (Status)) {
|
||||||
|
//
|
||||||
|
// Failed to enroll the user by new identification policy.
|
||||||
|
// So removed the credential provider from the identification policy
|
||||||
|
//
|
||||||
|
DeleteProviderFromPolicy (Identity, Offset);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Offset += Identity->Length;
|
||||||
|
}
|
||||||
|
|
||||||
|
return EFI_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Check whether the identity policy is valid.
|
||||||
|
|
||||||
|
@param[in] PolicyInfo Point to the identity policy.
|
||||||
|
@param[in] PolicyInfoLen The policy length.
|
||||||
|
|
||||||
|
@retval TRUE The policy is a valid identity policy.
|
||||||
|
@retval FALSE The policy is not a valid identity policy.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
CheckNewIdentityPolicy (
|
||||||
|
IN UINT8 *PolicyInfo,
|
||||||
|
IN UINTN PolicyInfoLen
|
||||||
|
)
|
||||||
|
{
|
||||||
|
EFI_USER_INFO_IDENTITY_POLICY *Identity;
|
||||||
|
EFI_INPUT_KEY Key;
|
||||||
|
UINTN Offset;
|
||||||
|
UINT32 OpCode;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Check policy expression.
|
||||||
|
//
|
||||||
|
OpCode = EFI_USER_INFO_IDENTITY_FALSE;
|
||||||
|
Offset = 0;
|
||||||
|
while (Offset < PolicyInfoLen) {
|
||||||
|
//
|
||||||
|
// Check identification policy according to type
|
||||||
|
//
|
||||||
|
Identity = (EFI_USER_INFO_IDENTITY_POLICY *) (PolicyInfo + Offset);
|
||||||
|
switch (Identity->Type) {
|
||||||
|
|
||||||
|
case EFI_USER_INFO_IDENTITY_TRUE:
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EFI_USER_INFO_IDENTITY_OR:
|
||||||
|
if (OpCode == EFI_USER_INFO_IDENTITY_AND) {
|
||||||
|
CreatePopUp (
|
||||||
|
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||||
|
&Key,
|
||||||
|
L"Invalid Identity Policy, Mixed Connector Unsupport!",
|
||||||
|
L"",
|
||||||
|
L"Press Any Key to Continue ...",
|
||||||
|
NULL
|
||||||
|
);
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
OpCode = EFI_USER_INFO_IDENTITY_OR;
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EFI_USER_INFO_IDENTITY_AND:
|
||||||
|
if (OpCode == EFI_USER_INFO_IDENTITY_OR) {
|
||||||
|
CreatePopUp (
|
||||||
|
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||||
|
&Key,
|
||||||
|
L"Invalid Identity Policy, Mixed Connector Unsupport!",
|
||||||
|
L"",
|
||||||
|
L"Press Any Key to Continue ...",
|
||||||
|
NULL
|
||||||
|
);
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
OpCode = EFI_USER_INFO_IDENTITY_AND;
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER:
|
||||||
|
break;
|
||||||
|
|
||||||
|
default:
|
||||||
|
CreatePopUp (
|
||||||
|
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||||
|
&Key,
|
||||||
|
L"Unsupport parameter",
|
||||||
|
L"",
|
||||||
|
L"Press Any Key to Continue ...",
|
||||||
|
NULL
|
||||||
|
);
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
Offset += Identity->Length;
|
||||||
|
}
|
||||||
|
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Save the identity policy and update UI with it.
|
||||||
|
|
||||||
|
This funciton will verify the new identity policy, in current implementation,
|
||||||
|
the identity policy can be: T, P & P & P & ..., P | P | P | ...
|
||||||
|
Here, "T" means "True", "P" means "Credential Provider", "&" means "and", "|" means "or".
|
||||||
|
Other identity policies are not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
SaveIdentityPolicy (
|
||||||
|
VOID
|
||||||
|
)
|
||||||
|
{
|
||||||
|
EFI_STATUS Status;
|
||||||
|
EFI_USER_INFO_HANDLE UserInfo;
|
||||||
|
EFI_USER_INFO *Info;
|
||||||
|
|
||||||
|
if (!mUserInfo.NewIdentityPolicyModified || (mUserInfo.NewIdentityPolicyLen == 0)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Check policy expression.
|
||||||
|
//
|
||||||
|
if (!CheckNewIdentityPolicy (mUserInfo.NewIdentityPolicy, mUserInfo.NewIdentityPolicyLen)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
Status = FindInfoByType (mModifyUser, EFI_USER_INFO_IDENTITY_POLICY_RECORD, &UserInfo);
|
||||||
|
if (EFI_ERROR (Status)) {
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Update the informantion on credential provider.
|
||||||
|
//
|
||||||
|
Status = UpdateCredentialProvider ();
|
||||||
|
if (EFI_ERROR (Status)) {
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Save new identification policy.
|
||||||
|
//
|
||||||
|
Info = AllocateZeroPool (sizeof (EFI_USER_INFO) + mUserInfo.NewIdentityPolicyLen);
|
||||||
|
ASSERT (Info != NULL);
|
||||||
|
|
||||||
|
Info->InfoType = EFI_USER_INFO_IDENTITY_POLICY_RECORD;
|
||||||
|
Info->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV | EFI_USER_INFO_PUBLIC | EFI_USER_INFO_EXCLUSIVE;
|
||||||
|
Info->InfoSize = (UINT32) (sizeof (EFI_USER_INFO) + mUserInfo.NewIdentityPolicyLen);
|
||||||
|
CopyMem ((UINT8 *) (Info + 1), mUserInfo.NewIdentityPolicy, mUserInfo.NewIdentityPolicyLen);
|
||||||
|
|
||||||
|
Status = mUserManager->SetInfo (mUserManager, mModifyUser, &UserInfo, Info, Info->InfoSize);
|
||||||
|
FreePool (Info);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Update the mUserInfo.IdentityPolicy by mUserInfo.NewIdentityPolicy
|
||||||
|
//
|
||||||
|
if (mUserInfo.IdentityPolicy != NULL) {
|
||||||
|
FreePool (mUserInfo.IdentityPolicy);
|
||||||
|
}
|
||||||
|
mUserInfo.IdentityPolicy = mUserInfo.NewIdentityPolicy;
|
||||||
|
mUserInfo.IdentityPolicyLen = mUserInfo.NewIdentityPolicyLen;
|
||||||
|
|
||||||
|
mUserInfo.NewIdentityPolicy = NULL;
|
||||||
|
mUserInfo.NewIdentityPolicyLen = 0;
|
||||||
|
mUserInfo.NewIdentityPolicyModified = FALSE;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Update identity policy choice.
|
||||||
|
//
|
||||||
|
ResolveIdentityPolicy (mUserInfo.IdentityPolicy, mUserInfo.IdentityPolicyLen, STRING_TOKEN (STR_IDENTIFY_POLICY_VAL));
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Update the mUserInfo.NewIdentityPolicy, and UI when 'add option' is pressed.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
AddIdentityPolicyItem (
|
||||||
|
VOID
|
||||||
|
)
|
||||||
|
{
|
||||||
|
if (mProviderInfo->Count == 0) {
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Check the identity policy.
|
||||||
|
//
|
||||||
|
if (ProviderAlreadyInPolicy (&mProviderInfo->Provider[mProviderChoice]->Identifier)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Add it to identification policy
|
||||||
|
//
|
||||||
|
AddProviderToPolicy (&mProviderInfo->Provider[mProviderChoice]->Identifier);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Update identity policy choice.
|
||||||
|
//
|
||||||
|
ResolveIdentityPolicy (mUserInfo.NewIdentityPolicy, mUserInfo.NewIdentityPolicyLen, STRING_TOKEN (STR_IDENTIFY_POLICY_VALUE));
|
||||||
|
}
|
||||||
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
|||||||
/** @file
|
/** @file
|
||||||
The functions to add a user profile.
|
The functions to add a user profile.
|
||||||
|
|
||||||
Copyright (c) 2009 - 2010, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
|
||||||
This program and the accompanying materials
|
This program and the accompanying materials
|
||||||
are licensed and made available under the terms and conditions of the BSD License
|
are licensed and made available under the terms and conditions of the BSD License
|
||||||
which accompanies this distribution. The full text of the license may be found at
|
which accompanies this distribution. The full text of the license may be found at
|
||||||
@ -239,7 +239,7 @@ SetIdentityPolicy (
|
|||||||
|
|
||||||
NewUserInfo->InfoType = EFI_USER_INFO_IDENTITY_POLICY_RECORD;
|
NewUserInfo->InfoType = EFI_USER_INFO_IDENTITY_POLICY_RECORD;
|
||||||
NewUserInfo->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV |
|
NewUserInfo->InfoAttribs = EFI_USER_INFO_STORAGE_PLATFORM_NV |
|
||||||
EFI_USER_INFO_PRIVATE |
|
EFI_USER_INFO_PUBLIC |
|
||||||
EFI_USER_INFO_EXCLUSIVE;
|
EFI_USER_INFO_EXCLUSIVE;
|
||||||
NewUserInfo->InfoSize = sizeof (EFI_USER_INFO) + Policy->Length;
|
NewUserInfo->InfoSize = sizeof (EFI_USER_INFO) + Policy->Length;
|
||||||
UserInfo = NULL;
|
UserInfo = NULL;
|
||||||
|
@ -185,6 +185,9 @@ DeleteUser (
|
|||||||
EFI_STATUS Status;
|
EFI_STATUS Status;
|
||||||
EFI_USER_PROFILE_HANDLE User;
|
EFI_USER_PROFILE_HANDLE User;
|
||||||
EFI_INPUT_KEY Key;
|
EFI_INPUT_KEY Key;
|
||||||
|
EFI_USER_INFO_HANDLE UserInfo;
|
||||||
|
EFI_USER_INFO *Info;
|
||||||
|
UINTN InfoSize;
|
||||||
|
|
||||||
//
|
//
|
||||||
// Find specified user profile and delete it.
|
// Find specified user profile and delete it.
|
||||||
@ -204,6 +207,31 @@ DeleteUser (
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (UserIndex == 1) {
|
if (UserIndex == 1) {
|
||||||
|
//
|
||||||
|
// Get the identification policy.
|
||||||
|
//
|
||||||
|
Status = FindInfoByType (User, EFI_USER_INFO_IDENTITY_POLICY_RECORD, &UserInfo);
|
||||||
|
if (EFI_ERROR (Status)) {
|
||||||
|
goto Done;
|
||||||
|
}
|
||||||
|
|
||||||
|
InfoSize = 0;
|
||||||
|
Info = NULL;
|
||||||
|
Status = mUserManager->GetInfo (mUserManager, User, UserInfo, Info, &InfoSize);
|
||||||
|
if (Status == EFI_BUFFER_TOO_SMALL) {
|
||||||
|
Info = AllocateZeroPool (InfoSize);
|
||||||
|
if (Info == NULL) {
|
||||||
|
goto Done;
|
||||||
|
}
|
||||||
|
Status = mUserManager->GetInfo (mUserManager, User, UserInfo, Info, &InfoSize);
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Delete the user on the credential providers by its identification policy.
|
||||||
|
//
|
||||||
|
DeleteCredentialFromProviders ((UINT8 *)(Info + 1), Info->InfoSize - sizeof (EFI_USER_INFO), User);
|
||||||
|
FreePool (Info);
|
||||||
|
|
||||||
Status = mUserManager->Delete (mUserManager, User);
|
Status = mUserManager->Delete (mUserManager, User);
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
goto Done;
|
goto Done;
|
||||||
|
@ -140,6 +140,7 @@ extern USER_INFO mUserInfo;
|
|||||||
|
|
||||||
extern USER_PROFILE_MANAGER_CALLBACK_INFO *mCallbackInfo;
|
extern USER_PROFILE_MANAGER_CALLBACK_INFO *mCallbackInfo;
|
||||||
|
|
||||||
|
extern EFI_USER_PROFILE_HANDLE mModifyUser;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Get string by string id from HII Interface.
|
Get string by string id from HII Interface.
|
||||||
@ -378,5 +379,67 @@ GetUserNameInput (
|
|||||||
IN OUT UINTN *UserNameLen,
|
IN OUT UINTN *UserNameLen,
|
||||||
OUT CHAR16 *UserName
|
OUT CHAR16 *UserName
|
||||||
);
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Find the specified info in User profile by the InfoType.
|
||||||
|
|
||||||
|
@param[in] User Handle of the user whose information will be searched.
|
||||||
|
@param[in] InfoType The user information type to find.
|
||||||
|
@param[out] UserInfo Points to user information handle found.
|
||||||
|
|
||||||
|
@retval EFI_SUCCESS Find the user information successfully.
|
||||||
|
@retval Others Fail to find the user information.
|
||||||
|
|
||||||
|
**/
|
||||||
|
EFI_STATUS
|
||||||
|
FindInfoByType (
|
||||||
|
IN EFI_USER_PROFILE_HANDLE User,
|
||||||
|
IN UINT8 InfoType,
|
||||||
|
OUT EFI_USER_INFO_HANDLE *UserInfo
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Convert the identity policy to a unicode string and update the Hii database
|
||||||
|
IpStringId string with it.
|
||||||
|
|
||||||
|
@param[in] Ip Points to identity policy.
|
||||||
|
@param[in] IpLen The identity policy length.
|
||||||
|
@param[in] IpStringId String ID in the HII database to be replaced.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
ResolveIdentityPolicy (
|
||||||
|
IN UINT8 *Ip,
|
||||||
|
IN UINTN IpLen,
|
||||||
|
IN EFI_STRING_ID IpStringId
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Expand access policy memory size.
|
||||||
|
|
||||||
|
@param[in] ValidLen The valid access policy length.
|
||||||
|
@param[in] ExpandLen The length that is needed to expand.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
ExpandMemory (
|
||||||
|
IN UINTN ValidLen,
|
||||||
|
IN UINTN ExpandLen
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Delete User's credental from all the providers that exist in User's identity policy.
|
||||||
|
|
||||||
|
@param[in] IdentityPolicy Point to User's identity policy.
|
||||||
|
@param[in] IdentityPolicyLen The length of the identity policy.
|
||||||
|
@param[in] User Points to user profile.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
DeleteCredentialFromProviders (
|
||||||
|
IN UINT8 *IdentityPolicy,
|
||||||
|
IN UINTN IdentityPolicyLen,
|
||||||
|
IN EFI_USER_PROFILE_HANDLE User
|
||||||
|
);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
@ -25,6 +25,8 @@
|
|||||||
UserProfileAdd.c
|
UserProfileAdd.c
|
||||||
UserProfileDelete.c
|
UserProfileDelete.c
|
||||||
UserProfileModify.c
|
UserProfileModify.c
|
||||||
|
ModifyIdentityPolicy.c
|
||||||
|
ModifyAccessPolicy.c
|
||||||
UserProfileManagerData.h
|
UserProfileManagerData.h
|
||||||
UserProfileManagerStrings.uni
|
UserProfileManagerStrings.uni
|
||||||
UserProfileManagerVfr.Vfr
|
UserProfileManagerVfr.Vfr
|
||||||
|
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user