• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /** @file
2   UEFI User Manager Protocol definition.
3 
4   This protocol manages user profiles.
5 
6   Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
7   This program and the accompanying materials
8   are licensed and made available under the terms and conditions of the BSD License
9   which accompanies this distribution.  The full text of the license may be found at
10   http://opensource.org/licenses/bsd-license.php
11 
12   THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
13   WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
14 
15 **/
16 
17 #ifndef __USER_MANAGER_H__
18 #define __USER_MANAGER_H__
19 
20 ///
21 /// Global ID for the User Manager Protocol
22 ///
23 #define EFI_USER_MANAGER_PROTOCOL_GUID \
24   { \
25     0x6fd5b00c, 0xd426, 0x4283, { 0x98, 0x87, 0x6c, 0xf5, 0xcf, 0x1c, 0xb1, 0xfe } \
26   }
27 
28 #define EFI_EVENT_GROUP_USER_PROFILE_CHANGED \
29   { \
30     0xbaf1e6de, 0x209e, 0x4adb, { 0x8d, 0x96, 0xfd, 0x8b, 0x71, 0xf3, 0xf6, 0x83 } \
31   }
32 
33 typedef VOID *EFI_USER_PROFILE_HANDLE;
34 typedef VOID *EFI_USER_INFO_HANDLE;
35 
36 ///
37 /// The attributes of the user profile information.
38 ///
39 typedef UINT16 EFI_USER_INFO_ATTRIBS;
40 #define EFI_USER_INFO_STORAGE                   0x000F
41 #define EFI_USER_INFO_STORAGE_VOLATILE          0x0000
42 #define EFI_USER_INFO_STORAGE_CREDENTIAL_NV     0x0001
43 #define EFI_USER_INFO_STORAGE_PLATFORM_NV       0x0002
44 
45 #define EFI_USER_INFO_ACCESS                    0x0070
46 #define EFI_USER_INFO_PUBLIC                    0x0010
47 #define EFI_USER_INFO_PRIVATE                   0x0020
48 #define EFI_USER_INFO_PROTECTED                 0x0030
49 #define EFI_USER_INFO_EXCLUSIVE                 0x0080
50 
51 ///
52 /// User information structure
53 ///
54 typedef struct {
55   ///
56   /// The user credential identifier associated with this user information or else Nil if the
57   /// information is not associated with any specific credential.
58   ///
59   EFI_GUID               Credential;
60   ///
61   /// The type of user information.
62   ///
63   UINT8                  InfoType;
64   ///
65   /// Must be set to 0.
66   ///
67   UINT8                  Reserved1;
68   ///
69   /// The attributes of the user profile information.
70   ///
71   EFI_USER_INFO_ATTRIBS  InfoAttribs;
72   ///
73   /// The size of the user information, in bytes, including this header.
74   ///
75   UINT32                 InfoSize;
76 } EFI_USER_INFO;
77 
78 ///
79 /// User credential class GUIDs
80 ///
81 #define EFI_USER_CREDENTIAL_CLASS_UNKNOWN \
82   { 0x5cf32e68, 0x7660, 0x449b, { 0x80, 0xe6, 0x7e, 0xa3, 0x6e, 0x3, 0xf6, 0xa8 } }
83 #define EFI_USER_CREDENTIAL_CLASS_PASSWORD \
84   { 0xf8e5058c, 0xccb6, 0x4714, { 0xb2, 0x20, 0x3f, 0x7e, 0x3a, 0x64, 0xb, 0xd1 } }
85 #define EFI_USER_CREDENTIAL_CLASS_SMART_CARD \
86   { 0x5f03ba33, 0x8c6b, 0x4c24, { 0xaa, 0x2e, 0x14, 0xa2, 0x65, 0x7b, 0xd4, 0x54 } }
87 #define EFI_USER_CREDENTIAL_CLASS_FINGERPRINT \
88   { 0x32cba21f, 0xf308, 0x4cbc, { 0x9a, 0xb5, 0xf5, 0xa3, 0x69, 0x9f, 0x4, 0x4a } }
89 #define EFI_USER_CREDENTIAL_CLASS_HANDPRINT \
90   { 0x5917ef16, 0xf723, 0x4bb9, { 0xa6, 0x4b, 0xd8, 0xc5, 0x32, 0xf4, 0xd8, 0xb5 } }
91 #define EFI_USER_CREDENTIAL_CLASS_SECURE_CARD \
92   { 0x8a6b4a83, 0x42fe, 0x45d2, { 0xa2, 0xef, 0x46, 0xf0, 0x6c, 0x7d, 0x98, 0x52 } }
93 
94 typedef UINT64   EFI_CREDENTIAL_CAPABILITIES;
95 #define EFI_CREDENTIAL_CAPABILITIES_ENROLL  0x0000000000000001
96 
97 ///
98 /// Credential logon flags
99 ///
100 typedef UINT32 EFI_CREDENTIAL_LOGON_FLAGS;
101 #define EFI_CREDENTIAL_LOGON_FLAG_AUTO                0x00000001
102 #define EFI_CREDENTIAL_LOGON_FLAG_DEFAULT             0x00000002
103 
104 ///
105 /// User information record types
106 ///
107 
108 ///
109 /// No information.
110 ///
111 #define EFI_USER_INFO_EMPTY_RECORD                    0x00
112 ///
113 /// Provide the user's name for the enrolled user.
114 ///
115 #define EFI_USER_INFO_NAME_RECORD                     0x01
116 typedef CHAR16 *EFI_USER_INFO_NAME;
117 ///
118 /// Provides the date and time when the user profile was created.
119 ///
120 #define EFI_USER_INFO_CREATE_DATE_RECORD              0x02
121 typedef EFI_TIME EFI_USER_INFO_CREATE_DATE;
122 ///
123 /// Provides the date and time when the user profile was selected.
124 ///
125 #define EFI_USER_INFO_USAGE_DATE_RECORD               0x03
126 typedef EFI_TIME EFI_USER_INFO_USAGE_DATE;
127 ///
128 /// Provides the number of times that the user profile has been selected.
129 ///
130 #define EFI_USER_INFO_USAGE_COUNT_RECORD              0x04
131 typedef UINT64 EFI_USER_INFO_USAGE_COUNT;
132 ///
133 /// Provides a unique non-volatile user identifier for each enrolled user.
134 ///
135 #define EFI_USER_INFO_IDENTIFIER_RECORD               0x05
136 typedef UINT8 EFI_USER_INFO_IDENTIFIER[16];
137 ///
138 /// Specifies the type of a particular credential associated with the user profile.
139 ///
140 #define EFI_USER_INFO_CREDENTIAL_TYPE_RECORD          0x06
141 typedef EFI_GUID EFI_USER_INFO_CREDENTIAL_TYPE;
142 ///
143 /// Specifies the user-readable name of a particular credential type.
144 ///
145 #define EFI_USER_INFO_CREDENTIAL_TYPE_NAME_RECORD     0x07
146 typedef CHAR16 *EFI_USER_INFO_CREDENTIAL_TYPE_NAME;
147 ///
148 /// Specifies the credential provider.
149 ///
150 #define EFI_USER_INFO_CREDENTIAL_PROVIDER_RECORD      0x08
151 typedef EFI_GUID EFI_USER_INFO_CREDENTIAL_PROVIDER;
152 ///
153 /// Specifies the user-readable name of a particular credential's provider.
154 ///
155 #define EFI_USER_INFO_CREDENTIAL_PROVIDER_NAME_RECORD 0x09
156 typedef CHAR16 *EFI_USER_INFO_CREDENTIAL_PROVIDER_NAME;
157 ///
158 /// Provides PKCS#11 credential information from a smart card.
159 ///
160 #define EFI_USER_INFO_PKCS11_RECORD                   0x0A
161 ///
162 /// Provides standard biometric information in the format specified by the ISO 19785 (Common
163 /// Biometric Exchange Formats Framework) specification.
164 ///
165 #define EFI_USER_INFO_CBEFF_RECORD                    0x0B
166 typedef VOID *EFI_USER_INFO_CBEFF;
167 ///
168 /// Indicates how close of a match the fingerprint must be in order to be considered a match.
169 ///
170 #define EFI_USER_INFO_FAR_RECORD                      0x0C
171 typedef UINT8 EFI_USER_INFO_FAR;
172 ///
173 /// Indicates how many attempts the user has to with a particular credential before the system prevents
174 /// further attempts.
175 ///
176 #define EFI_USER_INFO_RETRY_RECORD                    0x0D
177 typedef UINT8 EFI_USER_INFO_RETRY;
178 ///
179 /// Provides the user's pre-OS access rights.
180 ///
181 #define EFI_USER_INFO_ACCESS_POLICY_RECORD            0x0E
182 
183 typedef struct {
184   UINT32  Type;  ///< Specifies the type of user access control.
185   UINT32  Size;  ///< Specifies the size of the user access control record, in bytes, including this header.
186 } EFI_USER_INFO_ACCESS_CONTROL;
187 
188 typedef EFI_USER_INFO_ACCESS_CONTROL EFI_USER_INFO_ACCESS_POLICY;
189 
190 ///
191 /// User Information access types
192 ///
193 
194 ///
195 /// Forbids the user from booting or loading executables from the specified device path or any child
196 /// device paths.
197 ///
198 #define EFI_USER_INFO_ACCESS_FORBID_LOAD              0x00000001
199 ///
200 /// Permits the user from booting or loading executables from the specified device path or any child
201 /// device paths.
202 /// Note: in-consistency between code and the UEFI 2.3 specification here.
203 /// The definition EFI_USER_INFO_ACCESS_PERMIT_BOOT in the specification should be typo and wait for
204 /// spec update.
205 ///
206 #define EFI_USER_INFO_ACCESS_PERMIT_LOAD              0x00000002
207 ///
208 /// Presence of this record indicates that a user can update enrollment information.
209 ///
210 #define EFI_USER_INFO_ACCESS_ENROLL_SELF              0x00000003
211 ///
212 /// Presence of this record indicates that a user can enroll new users.
213 ///
214 #define EFI_USER_INFO_ACCESS_ENROLL_OTHERS            0x00000004
215 ///
216 /// Presence of this record indicates that a user can update the user information of any user.
217 ///
218 #define EFI_USER_INFO_ACCESS_MANAGE                   0x00000005
219 ///
220 /// Describes permissions usable when configuring the platform.
221 ///
222 #define EFI_USER_INFO_ACCESS_SETUP                    0x00000006
223 ///
224 /// Standard GUIDs for access to configure the platform.
225 ///
226 #define EFI_USER_INFO_ACCESS_SETUP_ADMIN_GUID \
227   { 0x85b75607, 0xf7ce, 0x471e, { 0xb7, 0xe4, 0x2a, 0xea, 0x5f, 0x72, 0x32, 0xee } }
228 #define EFI_USER_INFO_ACCESS_SETUP_NORMAL_GUID \
229   { 0x1db29ae0, 0x9dcb, 0x43bc, { 0x8d, 0x87, 0x5d, 0xa1, 0x49, 0x64, 0xdd, 0xe2 } }
230 #define EFI_USER_INFO_ACCESS_SETUP_RESTRICTED_GUID \
231   { 0xbdb38125, 0x4d63, 0x49f4, { 0x82, 0x12, 0x61, 0xcf, 0x5a, 0x19, 0xa, 0xf8 } }
232 
233 ///
234 /// Forbids UEFI drivers from being started from the specified device path(s) or any child device paths.
235 ///
236 #define EFI_USER_INFO_ACCESS_FORBID_CONNECT           0x00000007
237 ///
238 /// Permits UEFI drivers to be started on the specified device path(s) or any child device paths.
239 ///
240 #define EFI_USER_INFO_ACCESS_PERMIT_CONNECT           0x00000008
241 ///
242 /// Modifies the boot order.
243 ///
244 #define EFI_USER_INFO_ACCESS_BOOT_ORDER               0x00000009
245 typedef UINT32 EFI_USER_INFO_ACCESS_BOOT_ORDER_HDR;
246 
247 #define EFI_USER_INFO_ACCESS_BOOT_ORDER_MASK          0x0000000F
248 ///
249 /// Insert new boot options at the beginning of the boot order.
250 ///
251 #define EFI_USER_INFO_ACCESS_BOOT_ORDER_INSERT        0x00000000
252 ///
253 /// Append new boot options to the end of the boot order.
254 ///
255 #define EFI_USER_INFO_ACCESS_BOOT_ORDER_APPEND        0x00000001
256 ///
257 /// Replace the entire boot order.
258 ///
259 #define EFI_USER_INFO_ACCESS_BOOT_ORDER_REPLACE       0x00000002
260 ///
261 /// The Boot Manager will not attempt find a default boot device
262 /// when the default boot order is does not lead to a bootable device.
263 ///
264 #define EFI_USER_INFO_ACCESS_BOOT_ORDER_NODEFAULT     0x00000010
265 
266 ///
267 /// Provides the expression which determines which credentials are required to assert user identity.
268 ///
269 #define EFI_USER_INFO_IDENTITY_POLICY_RECORD          0x0F
270 
271 typedef struct {
272   UINT32  Type;    ///< Specifies either an operator or a data item.
273   UINT32  Length;  ///< The length of this block, in bytes, including this header.
274 } EFI_USER_INFO_IDENTITY_POLICY;
275 
276 ///
277 /// User identity policy expression operators.
278 ///
279 #define EFI_USER_INFO_IDENTITY_FALSE                  0x00
280 #define EFI_USER_INFO_IDENTITY_TRUE                   0x01
281 #define EFI_USER_INFO_IDENTITY_CREDENTIAL_TYPE        0x02
282 #define EFI_USER_INFO_IDENTITY_CREDENTIAL_PROVIDER    0x03
283 #define EFI_USER_INFO_IDENTITY_NOT                    0x10
284 #define EFI_USER_INFO_IDENTITY_AND                    0x11
285 #define EFI_USER_INFO_IDENTITY_OR                     0x12
286 
287 ///
288 /// Provides placeholder for additional user profile information identified by a GUID.
289 ///
290 #define EFI_USER_INFO_GUID_RECORD                     0xFF
291 typedef EFI_GUID EFI_USER_INFO_GUID;
292 
293 ///
294 /// User information table
295 /// A collection of EFI_USER_INFO records, prefixed with this header.
296 ///
297 typedef struct {
298   UINT64   Size;  ///< Total size of the user information table, in bytes.
299 } EFI_USER_INFO_TABLE;
300 
301 typedef struct _EFI_USER_MANAGER_PROTOCOL  EFI_USER_MANAGER_PROTOCOL;
302 
303 /**
304   Create a new user profile.
305 
306   This function creates a new user profile with only a new user identifier attached and returns its
307   handle. The user profile is non-volatile, but the handle User can change across reboots.
308 
309   @param[in]  This               Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
310   @param[out] User               On return, points to the new user profile handle.
311                                  The user profile handle is unique only during this boot.
312 
313   @retval EFI_SUCCESS            User profile was successfully created.
314   @retval EFI_ACCESS_DENIED      Current user does not have sufficient permissions to create a user profile.
315   @retval EFI_UNSUPPORTED        Creation of new user profiles is not supported.
316   @retval EFI_INVALID_PARAMETER  The User parameter is NULL.
317 **/
318 typedef
319 EFI_STATUS
320 (EFIAPI *EFI_USER_PROFILE_CREATE)(
321   IN CONST EFI_USER_MANAGER_PROTOCOL  *This,
322   OUT      EFI_USER_PROFILE_HANDLE    *User
323   );
324 
325 /**
326   Delete an existing user profile.
327 
328   @param[in] This                Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
329   @param[in] User                User profile handle.
330 
331   @retval EFI_SUCCESS            User profile was successfully deleted.
332   @retval EFI_ACCESS_DENIED      Current user does not have sufficient permissions to delete a user
333                                  profile or there is only one user profile.
334   @retval EFI_UNSUPPORTED        Deletion of new user profiles is not supported.
335   @retval EFI_INVALID_PARAMETER  User does not refer to a valid user profile.
336 **/
337 typedef
338 EFI_STATUS
339 (EFIAPI *EFI_USER_PROFILE_DELETE)(
340   IN CONST EFI_USER_MANAGER_PROTOCOL  *This,
341   IN       EFI_USER_PROFILE_HANDLE    User
342   );
343 
344 /**
345   Enumerate all of the enrolled users on the platform.
346 
347   This function returns the next enrolled user profile. To retrieve the first user profile handle, point
348   User at a NULL. Each subsequent call will retrieve another user profile handle until there are no
349   more, at which point User will point to NULL.
350 
351   @param[in]     This            Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
352   @param[in,out] User            On entry, points to the previous user profile handle or NULL to
353                                  start enumeration. On exit, points to the next user profile handle
354                                  or NULL if there are no more user profiles.
355 
356   @retval EFI_SUCCESS            Next enrolled user profile successfully returned.
357   @retval EFI_ACCESS_DENIED      Next enrolled user profile was not successfully returned.
358   @retval EFI_INVALID_PARAMETER  The User parameter is NULL.
359 **/
360 typedef
361 EFI_STATUS
362 (EFIAPI *EFI_USER_PROFILE_GET_NEXT)(
363   IN CONST EFI_USER_MANAGER_PROTOCOL  *This,
364   IN OUT   EFI_USER_PROFILE_HANDLE    *User
365   );
366 
367 /**
368   Return the current user profile handle.
369 
370   @param[in]  This               Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
371   @param[out] CurrentUser        On return, points to the current user profile handle.
372 
373   @retval EFI_SUCCESS            Current user profile handle returned successfully.
374   @retval EFI_INVALID_PARAMETER  The CurrentUser parameter is NULL.
375 **/
376 typedef
377 EFI_STATUS
378 (EFIAPI *EFI_USER_PROFILE_CURRENT)(
379   IN CONST EFI_USER_MANAGER_PROTOCOL  *This,
380   OUT      EFI_USER_PROFILE_HANDLE    *CurrentUser
381   );
382 
383 /**
384   Identify a user.
385 
386   Identify the user and, if authenticated, returns the user handle and changes the current user profile.
387   All user information marked as private in a previously selected profile is no longer available for
388   inspection.
389   Whenever the current user profile is changed then the an event with the GUID
390   EFI_EVENT_GROUP_USER_PROFILE_CHANGED is signaled.
391 
392   @param[in]  This               Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
393   @param[out] User               On return, points to the user profile handle for the current user profile.
394 
395   @retval EFI_SUCCESS            User was successfully identified.
396   @retval EFI_ACCESS_DENIED      User was not successfully identified.
397   @retval EFI_INVALID_PARAMETER  The User parameter is NULL.
398 **/
399 typedef
400 EFI_STATUS
401 (EFIAPI *EFI_USER_PROFILE_IDENTIFY)(
402   IN CONST EFI_USER_MANAGER_PROTOCOL  *This,
403   OUT      EFI_USER_PROFILE_HANDLE    *User
404   );
405 
406 /**
407   Find a user using a user information record.
408 
409   This function searches all user profiles for the specified user information record. The search starts
410   with the user information record handle following UserInfo and continues until either the
411   information is found or there are no more user profiles.
412   A match occurs when the Info.InfoType field matches the user information record type and the
413   user information record data matches the portion of Info.
414 
415   @param[in]     This      Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
416   @param[in,out] User      On entry, points to the previously returned user profile handle or NULL to start
417                            searching with the first user profile. On return, points to the user profile handle or
418                            NULL if not found.
419   @param[in,out] UserInfo  On entry, points to the previously returned user information handle or NULL to start
420                            searching with the first. On return, points to the user information handle of the user
421                            information record or NULL if not found. Can be NULL, in which case only one user
422                            information record per user can be returned.
423   @param[in]     Info      Points to the buffer containing the user information to be compared to the user
424                            information record. If the user information record data is empty, then only the user
425                            information record type is compared.
426                            If InfoSize is 0, then the user information record must be empty.
427 
428   @param[in]     InfoSize  The size of Info, in bytes.
429 
430   @retval EFI_SUCCESS           User information was found. User points to the user profile handle and UserInfo
431                                 points to the user information handle.
432   @retval EFI_NOT_FOUND         User information was not found. User points to NULL and UserInfo points to NULL.
433   @retval EFI_INVALID_PARAMETER User is NULL. Or Info is NULL.
434 **/
435 typedef
436 EFI_STATUS
437 (EFIAPI *EFI_USER_PROFILE_FIND)(
438   IN CONST EFI_USER_MANAGER_PROTOCOL  *This,
439   IN OUT   EFI_USER_PROFILE_HANDLE    *User,
440   IN OUT   EFI_USER_INFO_HANDLE       *UserInfo OPTIONAL,
441   IN CONST EFI_USER_INFO              *Info,
442   IN       UINTN                      InfoSize
443   );
444 
445 /**
446   Called by credential provider to notify of information change.
447 
448   This function allows the credential provider to notify the User Identity Manager when user status
449   has changed.
450   If the User Identity Manager doesn't support asynchronous changes in credentials, then this function
451   should return EFI_UNSUPPORTED.
452   If current user does not exist, and the credential provider can identify a user, then make the user
453   to be current user and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
454   If current user already exists, and the credential provider can identify another user, then switch
455   current user to the newly identified user, and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
456   If current user was identified by this credential provider and now the credential provider cannot identify
457   current user, then logout current user and signal the EFI_EVENT_GROUP_USER_PROFILE_CHANGED event.
458 
459   @param[in] This          Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
460   @param[in] Changed       Handle on which is installed an instance of the
461                            EFI_USER_CREDENTIAL_PROTOCOL where the user has changed.
462 
463   @retval EFI_SUCCESS      The User Identity Manager has handled the notification.
464   @retval EFI_NOT_READY    The function was called while the specified credential provider was not selected.
465   @retval EFI_UNSUPPORTED  The User Identity Manager doesn't support asynchronous notifications.
466 **/
467 typedef
468 EFI_STATUS
469 (EFIAPI *EFI_USER_PROFILE_NOTIFY)(
470   IN CONST EFI_USER_MANAGER_PROTOCOL  *This,
471   IN       EFI_HANDLE                 Changed
472   );
473 
474 /**
475   Return information attached to the user.
476 
477   This function returns user information. The format of the information is described in User
478   Information. The function may return EFI_ACCESS_DENIED if the information is marked private
479   and the handle specified by User is not the current user profile. The function may return
480   EFI_ACCESS_DENIED if the information is marked protected and the information is associated
481   with a credential provider for which the user has not been authenticated.
482 
483   @param[in]     This           Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
484   @param[in]     User           Handle of the user whose profile will be retrieved.
485   @param[in]     UserInfo       Handle of the user information data record.
486   @param[out]    Info           On entry, points to a buffer of at least *InfoSize bytes. On exit, holds the user
487                                 information. If the buffer is too small to hold the information, then
488                                 EFI_BUFFER_TOO_SMALL is returned and InfoSize is updated to contain the
489                                 number of bytes actually required.
490   @param[in,out] InfoSize       On entry, points to the size of Info. On return, points to the size of the user
491                                 information.
492 
493   @retval EFI_SUCCESS           Information returned successfully.
494   @retval EFI_ACCESS_DENIED     The information about the specified user cannot be accessed by the current user.
495   @retval EFI_BUFFER_TOO_SMALL  The number of bytes specified by *InfoSize is too small to hold
496                                 the returned data. The actual size required is returned in *InfoSize.
497   @retval EFI_NOT_FOUND         User does not refer to a valid user profile or UserInfo does not refer to a valid
498                                 user info handle.
499   @retval EFI_INVALID_PARAMETER Info is NULL or InfoSize is NULL.
500 **/
501 typedef
502 EFI_STATUS
503 (EFIAPI *EFI_USER_PROFILE_GET_INFO)(
504   IN CONST EFI_USER_MANAGER_PROTOCOL  *This,
505   IN       EFI_USER_PROFILE_HANDLE    User,
506   IN       EFI_USER_INFO_HANDLE       UserInfo,
507   OUT      EFI_USER_INFO              *Info,
508   IN OUT   UINTN                      *InfoSize
509   );
510 
511 /**
512   Add or update user information.
513 
514   This function changes user information.  If NULL is pointed to by UserInfo, then a new user
515   information record is created and its handle is returned in UserInfo. Otherwise, the existing one is
516   replaced.
517   If EFI_USER_INFO_IDENTITY_POLICY_RECORD is changed, it is the caller's responsibility to keep it to
518   be synced with the information on credential providers.
519   If EFI_USER_INFO_EXCLUSIVE is specified in Info and a user information record of the same
520   type already exists in the user profile, then EFI_ACCESS_DENIED will be returned and
521   UserInfo will point to the handle of the existing record.
522 
523   @param[in]     This             Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
524   @param[in]     User             Handle of the user whose profile will be retrieved.
525   @param[in,out] UserInfo         Handle of the user information data record.
526   @param[in]     Info             On entry, points to a buffer of at least *InfoSize bytes. On exit, holds the user
527                                   information. If the buffer is too small to hold the information, then
528                                   EFI_BUFFER_TOO_SMALL is returned and InfoSize is updated to contain the
529                                   number of bytes actually required.
530   @param[in]     InfoSize         On entry, points to the size of Info. On return, points to the size of the user
531                                   information.
532 
533   @retval EFI_SUCCESS             Information returned successfully.
534   @retval EFI_ACCESS_DENIED       The record is exclusive.
535   @retval EFI_SECURITY_VIOLATION  The current user does not have permission to change the specified
536                                   user profile or user information record.
537   @retval EFI_NOT_FOUND           User does not refer to a valid user profile or UserInfo does not refer to a valid
538                                   user info handle.
539   @retval EFI_INVALID_PARAMETER   UserInfo is NULL or Info is NULL.
540 **/
541 typedef
542 EFI_STATUS
543 (EFIAPI *EFI_USER_PROFILE_SET_INFO)(
544   IN CONST EFI_USER_MANAGER_PROTOCOL  *This,
545   IN       EFI_USER_PROFILE_HANDLE    User,
546   IN OUT   EFI_USER_INFO_HANDLE       *UserInfo,
547   IN CONST EFI_USER_INFO              *Info,
548   IN       UINTN                      InfoSize
549   );
550 
551 /**
552   Delete user information.
553 
554   Delete the user information attached to the user profile specified by the UserInfo.
555 
556   @param[in] This            Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
557   @param[in] User            Handle of the user whose information will be deleted.
558   @param[in] UserInfo        Handle of the user information to remove.
559 
560   @retval EFI_SUCCESS        User information deleted successfully.
561   @retval EFI_NOT_FOUND      User information record UserInfo does not exist in the user profile.
562   @retval EFI_ACCESS_DENIED  The current user does not have permission to delete this user information.
563 **/
564 typedef
565 EFI_STATUS
566 (EFIAPI *EFI_USER_PROFILE_DELETE_INFO)(
567   IN CONST EFI_USER_MANAGER_PROTOCOL  *This,
568   IN       EFI_USER_PROFILE_HANDLE    User,
569   IN       EFI_USER_INFO_HANDLE       UserInfo
570   );
571 
572 /**
573   Enumerate user information of all the enrolled users on the platform.
574 
575   This function returns the next user information record. To retrieve the first user information record
576   handle, point UserInfo at a NULL. Each subsequent call will retrieve another user information
577   record handle until there are no more, at which point UserInfo will point to NULL.
578 
579   @param[in]     This           Points to this instance of the EFI_USER_MANAGER_PROTOCOL.
580   @param[in]     User           Handle of the user whose information will be deleted.
581   @param[in,out] UserInfo       Handle of the user information to remove.
582 
583   @retval EFI_SUCCESS           User information returned.
584   @retval EFI_NOT_FOUND         No more user information found.
585   @retval EFI_INVALID_PARAMETER UserInfo is NULL.
586 **/
587 typedef
588 EFI_STATUS
589 (EFIAPI *EFI_USER_PROFILE_GET_NEXT_INFO)(
590   IN CONST EFI_USER_MANAGER_PROTOCOL  *This,
591   IN       EFI_USER_PROFILE_HANDLE    User,
592   IN OUT   EFI_USER_INFO_HANDLE       *UserInfo
593   );
594 
595 ///
596 /// This protocol provides the services used to manage user profiles.
597 ///
598 struct _EFI_USER_MANAGER_PROTOCOL {
599   EFI_USER_PROFILE_CREATE         Create;
600   EFI_USER_PROFILE_DELETE         Delete;
601   EFI_USER_PROFILE_GET_NEXT       GetNext;
602   EFI_USER_PROFILE_CURRENT        Current;
603   EFI_USER_PROFILE_IDENTIFY       Identify;
604   EFI_USER_PROFILE_FIND           Find;
605   EFI_USER_PROFILE_NOTIFY         Notify;
606   EFI_USER_PROFILE_GET_INFO       GetInfo;
607   EFI_USER_PROFILE_SET_INFO       SetInfo;
608   EFI_USER_PROFILE_DELETE_INFO    DeleteInfo;
609   EFI_USER_PROFILE_GET_NEXT_INFO  GetNextInfo;
610 };
611 
612 extern EFI_GUID gEfiUserManagerProtocolGuid;
613 extern EFI_GUID gEfiEventUserProfileChangedGuid;
614 extern EFI_GUID gEfiUserCredentialClassUnknownGuid;
615 extern EFI_GUID gEfiUserCredentialClassPasswordGuid;
616 extern EFI_GUID gEfiUserCredentialClassSmartCardGuid;
617 extern EFI_GUID gEfiUserCredentialClassFingerprintGuid;
618 extern EFI_GUID gEfiUserCredentialClassHandprintGuid;
619 extern EFI_GUID gEfiUserCredentialClassSecureCardGuid;
620 extern EFI_GUID gEfiUserInfoAccessSetupAdminGuid;
621 extern EFI_GUID gEfiUserInfoAccessSetupNormalGuid;
622 extern EFI_GUID gEfiUserInfoAccessSetupRestrictedGuid;
623 
624 #endif
625