]>
Commit | Line | Data |
---|---|---|
8c71ec8f | 1 | ## @file\r |
2 | # Component name for SecureBoot configuration module for OVMF.\r | |
3 | #\r | |
4 | # Need custom SecureBootConfigDxe for OVMF that does not force\r | |
5 | # resets after PK changes since OVMF doesn't have persistent variables\r | |
6 | #\r | |
863986b3 | 7 | # Copyright (c) 2011 - 2013, Intel Corporation. All rights reserved.<BR>\r |
8c71ec8f | 8 | # This program and the accompanying materials\r |
9 | # are licensed and made available under the terms and conditions of the BSD License\r | |
10 | # which accompanies this distribution. The full text of the license may be found at\r | |
11 | # http://opensource.org/licenses/bsd-license.php\r | |
12 | # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r | |
13 | # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r | |
14 | #\r | |
15 | ##\r | |
16 | \r | |
17 | [Defines]\r | |
18 | INF_VERSION = 0x00010005\r | |
19 | BASE_NAME = SecureBootConfigDxe\r | |
db1126d2 | 20 | FILE_GUID = 68E2BC17-198D-41f1-8213-065E3A2A7C12\r |
8c71ec8f | 21 | MODULE_TYPE = DXE_DRIVER\r |
22 | VERSION_STRING = 1.0\r | |
23 | ENTRY_POINT = SecureBootConfigDriverEntryPoint\r | |
24 | UNLOAD_IMAGE = SecureBootConfigDriverUnload\r | |
25 | \r | |
26 | #\r | |
27 | # VALID_ARCHITECTURES = IA32 X64 IPF EBC\r | |
28 | #\r | |
29 | \r | |
30 | [Sources]\r | |
31 | SecureBootConfigDriver.c\r | |
32 | SecureBootConfigImpl.c\r | |
33 | SecureBootConfigFileExplorer.c\r | |
34 | SecureBootConfigDevicePath.c\r | |
35 | SecureBootConfigMisc.c\r | |
36 | SecureBootConfigImpl.h\r | |
37 | SecureBootConfig.vfr\r | |
38 | SecureBootConfigStrings.uni\r | |
39 | SecureBootConfigNvData.h\r | |
40 | \r | |
41 | [Packages]\r | |
42 | MdePkg/MdePkg.dec\r | |
43 | MdeModulePkg/MdeModulePkg.dec\r | |
44 | SecurityPkg/SecurityPkg.dec\r | |
45 | CryptoPkg/CryptoPkg.dec\r | |
46 | \r | |
47 | [LibraryClasses]\r | |
48 | BaseLib\r | |
49 | BaseMemoryLib\r | |
50 | BaseCryptLib\r | |
51 | MemoryAllocationLib\r | |
52 | UefiLib\r | |
53 | UefiBootServicesTableLib\r | |
54 | UefiRuntimeServicesTableLib\r | |
55 | UefiDriverEntryPoint\r | |
56 | UefiHiiServicesLib\r | |
57 | DebugLib\r | |
58 | HiiLib\r | |
863986b3 RN |
59 | PlatformSecureLib\r |
60 | DevicePathLib\r | |
8c71ec8f | 61 | \r |
62 | [Guids]\r | |
63 | gEfiIfrTianoGuid\r | |
64 | gEfiCustomModeEnableGuid\r | |
65 | gEfiSecureBootEnableDisableGuid\r | |
66 | gSecureBootConfigFormSetGuid\r | |
67 | gEfiCertPkcs7Guid\r | |
68 | gEfiCertRsa2048Guid ## CONSUMES\r | |
69 | gEfiCertX509Guid ## CONSUMES\r | |
70 | gEfiCertSha1Guid ## CONSUMES\r | |
71 | gEfiCertSha256Guid ## CONSUMES\r | |
72 | gEfiCertTypeRsa2048Sha256Guid ## CONSUMES\r | |
73 | gEfiImageSecurityDatabaseGuid ## CONSUMES\r | |
74 | gEfiFileSystemVolumeLabelInfoIdGuid ## CONSUMES\r | |
75 | gEfiGlobalVariableGuid ## PRODUCES ## Variable Guid\r | |
8c71ec8f | 76 | gEfiFileInfoGuid ## CONSUMES ## GUID\r |
8c71ec8f | 77 | \r |
78 | [Protocols]\r | |
79 | gEfiHiiConfigAccessProtocolGuid ## PRODUCES\r | |
80 | gEfiHiiConfigRoutingProtocolGuid ## CONSUMES\r | |
81 | gEfiSimpleFileSystemProtocolGuid ## PROTOCOL CONSUMES\r | |
82 | gEfiLoadFileProtocolGuid ## PROTOCOL CONSUMES\r | |
83 | gEfiBlockIoProtocolGuid ## PROTOCOL CONSUMES\r | |
84 | gEfiDevicePathProtocolGuid ## PROTOCOL CONSUMES\r | |
8c71ec8f | 85 | \r |
86 | [Depex]\r | |
87 | gEfiHiiConfigRoutingProtocolGuid AND\r | |
88 | gEfiHiiDatabaseProtocolGuid AND\r | |
89 | gEfiVariableArchProtocolGuid AND\r | |
90 | gEfiVariableWriteArchProtocolGuid\r |