SecurityPkg: Clean up source files
1. Do not use tab characters 2. No trailing white space in one line 3. All files must end with CRLF Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Liming Gao <liming.gao@intel.com>
This commit is contained in:
@@ -1,14 +1,14 @@
|
||||
/** @file
|
||||
Password Credential Provider driver implementation.
|
||||
|
||||
Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.<BR>
|
||||
|
||||
Copyright (c) 2009 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
(C) Copyright 2018 Hewlett Packard Enterprise Development LP<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
@@ -98,10 +98,10 @@ ExpandTableSize (
|
||||
// Create new credential table.
|
||||
//
|
||||
NewTable = (CREDENTIAL_TABLE *) AllocateZeroPool (
|
||||
sizeof (CREDENTIAL_TABLE) +
|
||||
sizeof (CREDENTIAL_TABLE) +
|
||||
(Count - 1) * sizeof (PASSWORD_INFO)
|
||||
);
|
||||
ASSERT (NewTable != NULL);
|
||||
ASSERT (NewTable != NULL);
|
||||
|
||||
NewTable->MaxCount = Count;
|
||||
NewTable->Count = mPwdTable->Count;
|
||||
@@ -110,8 +110,8 @@ ExpandTableSize (
|
||||
// Copy old entries
|
||||
//
|
||||
CopyMem (
|
||||
&NewTable->UserInfo,
|
||||
&mPwdTable->UserInfo,
|
||||
&NewTable->UserInfo,
|
||||
&mPwdTable->UserInfo,
|
||||
mPwdTable->Count * sizeof (PASSWORD_INFO)
|
||||
);
|
||||
FreePool (mPwdTable);
|
||||
@@ -123,8 +123,8 @@ ExpandTableSize (
|
||||
Add, update or delete info in table, and sync with NV variable.
|
||||
|
||||
@param[in] Index The index of the password in table. If index is found in
|
||||
table, update the info, else add the into to table.
|
||||
@param[in] Info The new password info to add into table.If Info is NULL,
|
||||
table, update the info, else add the into to table.
|
||||
@param[in] Info The new password info to add into table.If Info is NULL,
|
||||
delete the info by Index.
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Info is NULL when save the info.
|
||||
@@ -151,7 +151,7 @@ ModifyTable (
|
||||
mPwdTable->Count--;
|
||||
if (Index != mPwdTable->Count) {
|
||||
NewPasswordInfo = &mPwdTable->UserInfo[mPwdTable->Count];
|
||||
}
|
||||
}
|
||||
} else {
|
||||
//
|
||||
// Update the specified entry.
|
||||
@@ -214,9 +214,9 @@ InitCredentialTable (
|
||||
VarSize = 0;
|
||||
Var = NULL;
|
||||
Status = gRT->GetVariable (
|
||||
L"PwdCredential",
|
||||
&gPwdCredentialProviderGuid,
|
||||
NULL,
|
||||
L"PwdCredential",
|
||||
&gPwdCredentialProviderGuid,
|
||||
NULL,
|
||||
&VarSize,
|
||||
Var
|
||||
);
|
||||
@@ -226,9 +226,9 @@ InitCredentialTable (
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
Status = gRT->GetVariable (
|
||||
L"PwdCredential",
|
||||
&gPwdCredentialProviderGuid,
|
||||
NULL,
|
||||
L"PwdCredential",
|
||||
&gPwdCredentialProviderGuid,
|
||||
NULL,
|
||||
&VarSize,
|
||||
Var
|
||||
);
|
||||
@@ -236,13 +236,13 @@ InitCredentialTable (
|
||||
if (EFI_ERROR (Status) && (Status != EFI_NOT_FOUND)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Create the password credential table.
|
||||
//
|
||||
mPwdTable = AllocateZeroPool (
|
||||
sizeof (CREDENTIAL_TABLE) - sizeof (PASSWORD_INFO) +
|
||||
PASSWORD_TABLE_INC * sizeof (PASSWORD_INFO) +
|
||||
PASSWORD_TABLE_INC * sizeof (PASSWORD_INFO) +
|
||||
VarSize
|
||||
);
|
||||
if (mPwdTable == NULL) {
|
||||
@@ -270,7 +270,7 @@ InitCredentialTable (
|
||||
|
||||
@retval TRUE Hash the password successfully.
|
||||
@retval FALSE Failed to hash the password.
|
||||
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
GenerateCredential (
|
||||
@@ -282,23 +282,23 @@ GenerateCredential (
|
||||
BOOLEAN Status;
|
||||
UINTN HashSize;
|
||||
VOID *Hash;
|
||||
|
||||
|
||||
HashSize = Sha1GetContextSize ();
|
||||
Hash = AllocatePool (HashSize);
|
||||
ASSERT (Hash != NULL);
|
||||
|
||||
|
||||
Status = Sha1Init (Hash);
|
||||
if (!Status) {
|
||||
goto Done;
|
||||
}
|
||||
|
||||
|
||||
Status = Sha1Update (Hash, Password, PasswordSize);
|
||||
if (!Status) {
|
||||
goto Done;
|
||||
}
|
||||
|
||||
|
||||
Status = Sha1Final (Hash, Credential);
|
||||
|
||||
|
||||
Done:
|
||||
FreePool (Hash);
|
||||
return Status;
|
||||
@@ -325,7 +325,7 @@ GetPassword (
|
||||
UINTN PasswordLen;
|
||||
CHAR16 *QuestionStr;
|
||||
CHAR16 *LineStr;
|
||||
|
||||
|
||||
PasswordLen = 0;
|
||||
while (TRUE) {
|
||||
PasswordMask[PasswordLen] = L'_';
|
||||
@@ -346,7 +346,7 @@ GetPassword (
|
||||
);
|
||||
FreePool (QuestionStr);
|
||||
FreePool (LineStr);
|
||||
|
||||
|
||||
//
|
||||
// Check key stroke
|
||||
//
|
||||
@@ -357,8 +357,8 @@ GetPassword (
|
||||
if (PasswordLen > 0) {
|
||||
PasswordLen--;
|
||||
}
|
||||
} else if ((Key.UnicodeChar == CHAR_NULL) ||
|
||||
(Key.UnicodeChar == CHAR_TAB) ||
|
||||
} else if ((Key.UnicodeChar == CHAR_NULL) ||
|
||||
(Key.UnicodeChar == CHAR_TAB) ||
|
||||
(Key.UnicodeChar == CHAR_LINEFEED)) {
|
||||
continue;
|
||||
} else {
|
||||
@@ -371,7 +371,7 @@ GetPassword (
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
PasswordLen = PasswordLen * sizeof (CHAR16);
|
||||
GenerateCredential (Password, PasswordLen, (UINT8 *)Credential);
|
||||
}
|
||||
@@ -392,7 +392,7 @@ CheckPassword (
|
||||
{
|
||||
UINTN Index;
|
||||
CHAR8 *Pwd;
|
||||
|
||||
|
||||
//
|
||||
// Check password credential.
|
||||
//
|
||||
@@ -412,16 +412,16 @@ CheckPassword (
|
||||
/**
|
||||
Find a user infomation record by the information record type.
|
||||
|
||||
This function searches all user information records of User from beginning
|
||||
This function searches all user information records of User from beginning
|
||||
until either the information is found, or there are no more user infomation
|
||||
records. A match occurs when a Info.InfoType field matches the user information
|
||||
record type.
|
||||
|
||||
@param[in] User Points to the user profile record to search.
|
||||
@param[in] User Points to the user profile record to search.
|
||||
@param[in] InfoType The infomation type to be searched.
|
||||
@param[out] Info Points to the user info found, the caller is responsible
|
||||
to free.
|
||||
|
||||
|
||||
@retval EFI_SUCCESS Find the user information successfully.
|
||||
@retval Others Fail to find the user information.
|
||||
|
||||
@@ -438,7 +438,7 @@ FindUserInfoByType (
|
||||
UINTN UserInfoSize;
|
||||
EFI_USER_INFO_HANDLE UserInfoHandle;
|
||||
EFI_USER_MANAGER_PROTOCOL *UserManager;
|
||||
|
||||
|
||||
//
|
||||
// Find user information by information type.
|
||||
//
|
||||
@@ -501,7 +501,7 @@ FindUserInfoByType (
|
||||
if (UserInfo->InfoType == InfoType) {
|
||||
*Info = UserInfo;
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (UserInfo != NULL) {
|
||||
@@ -570,7 +570,7 @@ CredentialDriverCallback (
|
||||
return Status;
|
||||
}
|
||||
*ActionRequest = EFI_BROWSER_ACTION_REQUEST_EXIT;
|
||||
}
|
||||
}
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
@@ -716,24 +716,24 @@ InitFormBrowser (
|
||||
/**
|
||||
Enroll a user on a credential provider.
|
||||
|
||||
This function enrolls a user on this credential provider. If the user exists on
|
||||
this credential provider, update the user information on this credential provider;
|
||||
This function enrolls a user on this credential provider. If the user exists on
|
||||
this credential provider, update the user information on this credential provider;
|
||||
otherwise add the user information on credential provider.
|
||||
|
||||
|
||||
@param[in] This Points to this instance of EFI_USER_CREDENTIAL2_PROTOCOL.
|
||||
@param[in] User The user profile to enroll.
|
||||
|
||||
|
||||
@retval EFI_SUCCESS User profile was successfully enrolled.
|
||||
@retval EFI_ACCESS_DENIED Current user profile does not permit enrollment on the
|
||||
user profile handle. Either the user profile cannot enroll
|
||||
on any user profile or cannot enroll on a user profile
|
||||
on any user profile or cannot enroll on a user profile
|
||||
other than the current user profile.
|
||||
@retval EFI_UNSUPPORTED This credential provider does not support enrollment in
|
||||
the pre-OS.
|
||||
@retval EFI_DEVICE_ERROR The new credential could not be created because of a device
|
||||
error.
|
||||
@retval EFI_INVALID_PARAMETER User does not refer to a valid user profile handle.
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
@@ -769,12 +769,12 @@ CredentialEnroll (
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
CopyMem (PwdInfo.UserId, (UINT8 *) (UserInfo + 1), sizeof (EFI_USER_INFO_IDENTIFIER));
|
||||
CopyMem (PwdInfo.UserId, (UINT8 *) (UserInfo + 1), sizeof (EFI_USER_INFO_IDENTIFIER));
|
||||
FreePool (UserInfo);
|
||||
|
||||
//
|
||||
// Get password from user.
|
||||
//
|
||||
//
|
||||
while (TRUE) {
|
||||
//
|
||||
// Input password.
|
||||
@@ -791,10 +791,10 @@ CredentialEnroll (
|
||||
//
|
||||
if (CompareMem (PwdInfo.Password, Password, CREDENTIAL_LEN) == 0) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
QuestionStr = GetStringById (STRING_TOKEN (STR_PASSWORD_MISMATCH));
|
||||
PromptStr = GetStringById (STRING_TOKEN (STR_INPUT_PASSWORD_AGAIN));
|
||||
PromptStr = GetStringById (STRING_TOKEN (STR_INPUT_PASSWORD_AGAIN));
|
||||
CreatePopUp (
|
||||
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||
&Key,
|
||||
@@ -809,17 +809,17 @@ CredentialEnroll (
|
||||
|
||||
//
|
||||
// Check whether User is ever enrolled in the provider.
|
||||
//
|
||||
//
|
||||
for (Index = 0; Index < mPwdTable->Count; Index++) {
|
||||
UserId = (UINT8 *) &mPwdTable->UserInfo[Index].UserId;
|
||||
if (CompareMem (UserId, (UINT8 *) &PwdInfo.UserId, sizeof (EFI_USER_INFO_IDENTIFIER)) == 0) {
|
||||
//
|
||||
// User already exists, update the password.
|
||||
//
|
||||
//
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Enroll the User to the provider.
|
||||
//
|
||||
@@ -837,7 +837,7 @@ CredentialEnroll (
|
||||
|
||||
This function returns information about the form used when interacting with the
|
||||
user during user identification. The form is the first enabled form in the form-set
|
||||
class EFI_HII_USER_CREDENTIAL_FORMSET_GUID installed on the HII handle HiiHandle. If
|
||||
class EFI_HII_USER_CREDENTIAL_FORMSET_GUID installed on the HII handle HiiHandle. If
|
||||
the user credential provider does not require a form to identify the user, then this
|
||||
function should return EFI_NOT_FOUND.
|
||||
|
||||
@@ -845,13 +845,13 @@ CredentialEnroll (
|
||||
@param[out] Hii On return, holds the HII database handle.
|
||||
@param[out] FormSetId On return, holds the identifier of the form set which contains
|
||||
the form used during user identification.
|
||||
@param[out] FormId On return, holds the identifier of the form used during user
|
||||
@param[out] FormId On return, holds the identifier of the form used during user
|
||||
identification.
|
||||
|
||||
|
||||
@retval EFI_SUCCESS Form returned successfully.
|
||||
@retval EFI_NOT_FOUND Form not returned.
|
||||
@retval EFI_INVALID_PARAMETER Hii is NULL or FormSetId is NULL or FormId is NULL.
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
@@ -862,7 +862,7 @@ CredentialForm (
|
||||
OUT EFI_FORM_ID *FormId
|
||||
)
|
||||
{
|
||||
if ((This == NULL) || (Hii == NULL) ||
|
||||
if ((This == NULL) || (Hii == NULL) ||
|
||||
(FormSetId == NULL) || (FormId == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
@@ -870,7 +870,7 @@ CredentialForm (
|
||||
*Hii = mCallbackInfo->HiiHandle;
|
||||
*FormId = FORMID_GET_PASSWORD_FORM;
|
||||
CopyGuid (FormSetId, &gPwdCredentialProviderGuid);
|
||||
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
@@ -880,22 +880,22 @@ CredentialForm (
|
||||
|
||||
This optional function returns a bitmap that is less than or equal to the number
|
||||
of pixels specified by Width and Height. If no such bitmap exists, then EFI_NOT_FOUND
|
||||
is returned.
|
||||
is returned.
|
||||
|
||||
@param[in] This Points to this instance of the EFI_USER_CREDENTIAL2_PROTOCOL.
|
||||
@param[in, out] Width On entry, points to the desired bitmap width. If NULL then no
|
||||
bitmap information will be returned. On exit, points to the
|
||||
@param[in, out] Width On entry, points to the desired bitmap width. If NULL then no
|
||||
bitmap information will be returned. On exit, points to the
|
||||
width of the bitmap returned.
|
||||
@param[in, out] Height On entry, points to the desired bitmap height. If NULL then no
|
||||
bitmap information will be returned. On exit, points to the
|
||||
bitmap information will be returned. On exit, points to the
|
||||
height of the bitmap returned
|
||||
@param[out] Hii On return, holds the HII database handle.
|
||||
@param[out] Image On return, holds the HII image identifier.
|
||||
|
||||
@param[out] Hii On return, holds the HII database handle.
|
||||
@param[out] Image On return, holds the HII image identifier.
|
||||
|
||||
@retval EFI_SUCCESS Image identifier returned successfully.
|
||||
@retval EFI_NOT_FOUND Image identifier not returned.
|
||||
@retval EFI_INVALID_PARAMETER Hii is NULL or Image is NULL.
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
@@ -906,7 +906,7 @@ CredentialTile (
|
||||
OUT EFI_HII_HANDLE *Hii,
|
||||
OUT EFI_IMAGE_ID *Image
|
||||
)
|
||||
{
|
||||
{
|
||||
if ((This == NULL) || (Hii == NULL) || (Image == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
@@ -918,16 +918,16 @@ CredentialTile (
|
||||
Returns string used to describe the credential provider type.
|
||||
|
||||
This function returns a string which describes the credential provider. If no
|
||||
such string exists, then EFI_NOT_FOUND is returned.
|
||||
such string exists, then EFI_NOT_FOUND is returned.
|
||||
|
||||
@param[in] This Points to this instance of the EFI_USER_CREDENTIAL2_PROTOCOL.
|
||||
@param[out] Hii On return, holds the HII database handle.
|
||||
@param[out] String On return, holds the HII string identifier.
|
||||
|
||||
|
||||
@retval EFI_SUCCESS String identifier returned successfully.
|
||||
@retval EFI_NOT_FOUND String identifier not returned.
|
||||
@retval EFI_INVALID_PARAMETER Hii is NULL or String is NULL.
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
@@ -940,7 +940,7 @@ CredentialTitle (
|
||||
if ((This == NULL) || (Hii == NULL) || (String == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Set Hii handle and String ID.
|
||||
//
|
||||
@@ -955,23 +955,23 @@ CredentialTitle (
|
||||
Return the user identifier associated with the currently authenticated user.
|
||||
|
||||
This function returns the user identifier of the user authenticated by this credential
|
||||
provider. This function is called after the credential-related information has been
|
||||
provider. This function is called after the credential-related information has been
|
||||
submitted on a form, OR after a call to Default() has returned that this credential is
|
||||
ready to log on.
|
||||
|
||||
@param[in] This Points to this instance of the EFI_USER_CREDENTIAL2_PROTOCOL.
|
||||
@param[in] User The user profile handle of the user profile currently being
|
||||
@param[in] User The user profile handle of the user profile currently being
|
||||
considered by the user identity manager. If NULL, then no user
|
||||
profile is currently under consideration.
|
||||
@param[out] Identifier On return, points to the user identifier.
|
||||
|
||||
@param[out] Identifier On return, points to the user identifier.
|
||||
|
||||
@retval EFI_SUCCESS User identifier returned successfully.
|
||||
@retval EFI_NOT_READY No user identifier can be returned.
|
||||
@retval EFI_ACCESS_DENIED The user has been locked out of this user credential.
|
||||
@retval EFI_INVALID_PARAMETER This is NULL, or Identifier is NULL.
|
||||
@retval EFI_NOT_FOUND User is not NULL, and the specified user handle can't be
|
||||
found in user profile database
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
@@ -1000,19 +1000,19 @@ CredentialUser (
|
||||
//
|
||||
return EFI_NOT_READY;
|
||||
}
|
||||
|
||||
|
||||
if (User == NULL) {
|
||||
//
|
||||
// Return the user ID whose password matches the input password.
|
||||
//
|
||||
//
|
||||
CopyMem (
|
||||
Identifier,
|
||||
&mPwdTable->UserInfo[mPwdTable->ValidIndex - 1].UserId,
|
||||
Identifier,
|
||||
&mPwdTable->UserInfo[mPwdTable->ValidIndex - 1].UserId,
|
||||
sizeof (EFI_USER_INFO_IDENTIFIER)
|
||||
);
|
||||
);
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Get the User's ID.
|
||||
//
|
||||
@@ -1024,7 +1024,7 @@ CredentialUser (
|
||||
if (EFI_ERROR (Status)) {
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Check whether the input password matches one in PwdTable.
|
||||
//
|
||||
@@ -1038,11 +1038,11 @@ CredentialUser (
|
||||
CopyMem (Identifier, UserId, sizeof (EFI_USER_INFO_IDENTIFIER));
|
||||
FreePool (UserInfo);
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
FreePool (UserInfo);
|
||||
FreePool (UserInfo);
|
||||
return EFI_NOT_READY;
|
||||
}
|
||||
|
||||
@@ -1050,17 +1050,17 @@ CredentialUser (
|
||||
/**
|
||||
Indicate that user interface interaction has begun for the specified credential.
|
||||
|
||||
This function is called when a credential provider is selected by the user. If
|
||||
This function is called when a credential provider is selected by the user. If
|
||||
AutoLogon returns FALSE, then the user interface will be constructed by the User
|
||||
Identity Manager.
|
||||
Identity Manager.
|
||||
|
||||
@param[in] This Points to this instance of the EFI_USER_CREDENTIAL2_PROTOCOL.
|
||||
@param[out] AutoLogon On return, points to the credential provider's capabilities
|
||||
after the credential provider has been selected by the user.
|
||||
|
||||
@param[out] AutoLogon On return, points to the credential provider's capabilities
|
||||
after the credential provider has been selected by the user.
|
||||
|
||||
@retval EFI_SUCCESS Credential provider successfully selected.
|
||||
@retval EFI_INVALID_PARAMETER AutoLogon is NULL.
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
@@ -1084,9 +1084,9 @@ CredentialSelect (
|
||||
This function is called when a credential provider is deselected by the user.
|
||||
|
||||
@param[in] This Points to this instance of the EFI_USER_CREDENTIAL2_PROTOCOL.
|
||||
|
||||
|
||||
@retval EFI_SUCCESS Credential provider successfully deselected.
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
@@ -1104,15 +1104,15 @@ CredentialDeselect (
|
||||
/**
|
||||
Return the default logon behavior for this user credential.
|
||||
|
||||
This function reports the default login behavior regarding this credential provider.
|
||||
This function reports the default login behavior regarding this credential provider.
|
||||
|
||||
@param[in] This Points to this instance of the EFI_USER_CREDENTIAL2_PROTOCOL.
|
||||
@param[out] AutoLogon On return, holds whether the credential provider should be used
|
||||
by default to automatically log on the user.
|
||||
|
||||
by default to automatically log on the user.
|
||||
|
||||
@retval EFI_SUCCESS Default information successfully returned.
|
||||
@retval EFI_INVALID_PARAMETER AutoLogon is NULL.
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
@@ -1125,7 +1125,7 @@ CredentialDefault (
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
*AutoLogon = 0;
|
||||
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
@@ -1133,24 +1133,24 @@ CredentialDefault (
|
||||
/**
|
||||
Return information attached to the credential provider.
|
||||
|
||||
This function returns user information.
|
||||
This function returns user information.
|
||||
|
||||
@param[in] This Points to this instance of the EFI_USER_CREDENTIAL2_PROTOCOL.
|
||||
@param[in] UserInfo Handle of the user information data record.
|
||||
@param[in] UserInfo Handle of the user information data record.
|
||||
@param[out] Info On entry, points to a buffer of at least *InfoSize bytes. On
|
||||
exit, holds the user information. If the buffer is too small
|
||||
to hold the information, then EFI_BUFFER_TOO_SMALL is returned
|
||||
and InfoSize is updated to contain the number of bytes actually
|
||||
required.
|
||||
@param[in, out] InfoSize On entry, points to the size of Info. On return, points to the
|
||||
size of the user information.
|
||||
|
||||
@param[in, out] InfoSize On entry, points to the size of Info. On return, points to the
|
||||
size of the user information.
|
||||
|
||||
@retval EFI_SUCCESS Information returned successfully.
|
||||
@retval EFI_BUFFER_TOO_SMALL The size specified by InfoSize is too small to hold all of the
|
||||
user information. The size required is returned in *InfoSize.
|
||||
@retval EFI_INVALID_PARAMETER Info is NULL or InfoSize is NULL.
|
||||
@retval EFI_NOT_FOUND The specified UserInfo does not refer to a valid user info handle.
|
||||
|
||||
@retval EFI_NOT_FOUND The specified UserInfo does not refer to a valid user info handle.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
@@ -1163,7 +1163,7 @@ CredentialGetInfo (
|
||||
{
|
||||
EFI_USER_INFO *CredentialInfo;
|
||||
UINTN Index;
|
||||
|
||||
|
||||
if ((This == NULL) || (InfoSize == NULL) || (Info == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
@@ -1171,7 +1171,7 @@ CredentialGetInfo (
|
||||
if ((UserInfo == NULL) || (mPwdInfoHandle == NULL)) {
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Find information handle in credential info table.
|
||||
//
|
||||
@@ -1185,11 +1185,11 @@ CredentialGetInfo (
|
||||
*InfoSize = CredentialInfo->InfoSize;
|
||||
return EFI_BUFFER_TOO_SMALL;
|
||||
}
|
||||
CopyMem (Info, CredentialInfo, CredentialInfo->InfoSize);
|
||||
return EFI_SUCCESS;
|
||||
CopyMem (Info, CredentialInfo, CredentialInfo->InfoSize);
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
@@ -1200,17 +1200,17 @@ CredentialGetInfo (
|
||||
This function returns the next user information record. To retrieve the first user
|
||||
information record handle, point UserInfo at a NULL. Each subsequent call will retrieve
|
||||
another user information record handle until there are no more, at which point UserInfo
|
||||
will point to NULL.
|
||||
will point to NULL.
|
||||
|
||||
@param[in] This Points to this instance of the EFI_USER_CREDENTIAL2_PROTOCOL.
|
||||
@param[in, out] UserInfo On entry, points to the previous user information handle or NULL
|
||||
to start enumeration. On exit, points to the next user information
|
||||
handle or NULL if there is no more user information.
|
||||
|
||||
|
||||
@retval EFI_SUCCESS User information returned.
|
||||
@retval EFI_NOT_FOUND No more user information found.
|
||||
@retval EFI_INVALID_PARAMETER UserInfo is NULL.
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
@@ -1224,7 +1224,7 @@ CredentialGetNextInfo (
|
||||
UINTN InfoLen;
|
||||
UINTN Index;
|
||||
UINTN ProvStrLen;
|
||||
|
||||
|
||||
if ((This == NULL) || (UserInfo == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
@@ -1246,13 +1246,13 @@ CredentialGetNextInfo (
|
||||
InfoLen = sizeof (EFI_USER_INFO) + sizeof (EFI_GUID);
|
||||
Info = AllocateZeroPool (InfoLen);
|
||||
ASSERT (Info != NULL);
|
||||
|
||||
|
||||
Info->InfoType = EFI_USER_INFO_CREDENTIAL_PROVIDER_RECORD;
|
||||
Info->InfoSize = (UINT32) InfoLen;
|
||||
Info->InfoAttribs = EFI_USER_INFO_PROTECTED;
|
||||
CopyGuid (&Info->Credential, &gPwdCredentialProviderGuid);
|
||||
CopyGuid ((EFI_GUID *)(Info + 1), &gPwdCredentialProviderGuid);
|
||||
|
||||
|
||||
mPwdInfoHandle->Info[0] = Info;
|
||||
mPwdInfoHandle->Count++;
|
||||
|
||||
@@ -1264,7 +1264,7 @@ CredentialGetNextInfo (
|
||||
InfoLen = sizeof (EFI_USER_INFO) + ProvStrLen;
|
||||
Info = AllocateZeroPool (InfoLen);
|
||||
ASSERT (Info != NULL);
|
||||
|
||||
|
||||
Info->InfoType = EFI_USER_INFO_CREDENTIAL_PROVIDER_NAME_RECORD;
|
||||
Info->InfoSize = (UINT32) InfoLen;
|
||||
Info->InfoAttribs = EFI_USER_INFO_PROTECTED;
|
||||
@@ -1281,16 +1281,16 @@ CredentialGetNextInfo (
|
||||
InfoLen = sizeof (EFI_USER_INFO) + sizeof (EFI_GUID);
|
||||
Info = AllocateZeroPool (InfoLen);
|
||||
ASSERT (Info != NULL);
|
||||
|
||||
|
||||
Info->InfoType = EFI_USER_INFO_CREDENTIAL_TYPE_RECORD;
|
||||
Info->InfoSize = (UINT32) InfoLen;
|
||||
Info->InfoAttribs = EFI_USER_INFO_PROTECTED;
|
||||
CopyGuid (&Info->Credential, &gPwdCredentialProviderGuid);
|
||||
CopyGuid ((EFI_GUID *)(Info + 1), &gEfiUserCredentialClassPasswordGuid);
|
||||
|
||||
|
||||
mPwdInfoHandle->Info[2] = Info;
|
||||
mPwdInfoHandle->Count++;
|
||||
|
||||
|
||||
//
|
||||
// The fourth information, Credential Provider type name info.
|
||||
//
|
||||
@@ -1299,18 +1299,18 @@ CredentialGetNextInfo (
|
||||
InfoLen = sizeof (EFI_USER_INFO) + ProvStrLen;
|
||||
Info = AllocateZeroPool (InfoLen);
|
||||
ASSERT (Info != NULL);
|
||||
|
||||
|
||||
Info->InfoType = EFI_USER_INFO_CREDENTIAL_PROVIDER_NAME_RECORD;
|
||||
Info->InfoSize = (UINT32) InfoLen;
|
||||
Info->InfoAttribs = EFI_USER_INFO_PROTECTED;
|
||||
CopyGuid (&Info->Credential, &gPwdCredentialProviderGuid);
|
||||
CopyMem ((UINT8*)(Info + 1), ProvNameStr, ProvStrLen);
|
||||
FreePool (ProvNameStr);
|
||||
|
||||
|
||||
mPwdInfoHandle->Info[3] = Info;
|
||||
mPwdInfoHandle->Count++;
|
||||
}
|
||||
|
||||
|
||||
if (*UserInfo == NULL) {
|
||||
//
|
||||
// Return the first info handle.
|
||||
@@ -1318,7 +1318,7 @@ CredentialGetNextInfo (
|
||||
*UserInfo = (EFI_USER_INFO_HANDLE) mPwdInfoHandle->Info[0];
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Find information handle in credential info table.
|
||||
//
|
||||
@@ -1335,10 +1335,10 @@ CredentialGetNextInfo (
|
||||
*UserInfo = NULL;
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
|
||||
Index++;
|
||||
*UserInfo = (EFI_USER_INFO_HANDLE)mPwdInfoHandle->Info[Index];
|
||||
return EFI_SUCCESS;
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1349,15 +1349,15 @@ CredentialGetNextInfo (
|
||||
/**
|
||||
Delete a user on this credential provider.
|
||||
|
||||
This function deletes a user on this credential provider.
|
||||
This function deletes a user on this credential provider.
|
||||
|
||||
@param[in] This Points to this instance of the EFI_USER_CREDENTIAL2_PROTOCOL.
|
||||
@param[in] User The user profile handle to delete.
|
||||
|
||||
@retval EFI_SUCCESS User profile was successfully deleted.
|
||||
@retval EFI_ACCESS_DENIED Current user profile does not permit deletion on the user profile handle.
|
||||
Either the user profile cannot delete on any user profile or cannot delete
|
||||
on a user profile other than the current user profile.
|
||||
@retval EFI_ACCESS_DENIED Current user profile does not permit deletion on the user profile handle.
|
||||
Either the user profile cannot delete on any user profile or cannot delete
|
||||
on a user profile other than the current user profile.
|
||||
@retval EFI_UNSUPPORTED This credential provider does not support deletion in the pre-OS.
|
||||
@retval EFI_DEVICE_ERROR The new credential could not be deleted because of a device error.
|
||||
@retval EFI_INVALID_PARAMETER User does not refer to a valid user profile handle.
|
||||
@@ -1374,7 +1374,7 @@ CredentialDelete (
|
||||
UINT8 *UserId;
|
||||
UINT8 *NewUserId;
|
||||
UINTN Index;
|
||||
|
||||
|
||||
if ((This == NULL) || (User == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
@@ -1394,7 +1394,7 @@ CredentialDelete (
|
||||
|
||||
//
|
||||
// Find the user by user identifier in mPwdTable.
|
||||
//
|
||||
//
|
||||
for (Index = 0; Index < mPwdTable->Count; Index++) {
|
||||
UserId = (UINT8 *) &mPwdTable->UserInfo[Index].UserId;
|
||||
NewUserId = (UINT8 *) (UserInfo + 1);
|
||||
@@ -1442,7 +1442,7 @@ PasswordProviderInit (
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Init Form Browser.
|
||||
//
|
||||
@@ -1450,7 +1450,7 @@ PasswordProviderInit (
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Install protocol interfaces for the password credential provider.
|
||||
//
|
||||
|
Reference in New Issue
Block a user