]> git.proxmox.com Git - mirror_edk2.git/blame - FmpDevicePkg/FmpDevicePkg.dsc
MdePkg: UEFI JSON Capsule Support
[mirror_edk2.git] / FmpDevicePkg / FmpDevicePkg.dsc
CommitLineData
262b7a31
KM
1## @file\r
2# Firmware Management Protocol Device Package\r
3#\r
4# This package provides an implementation of a Firmware Management Protocol\r
5# instance that supports the update of firmware storage devices using UEFI\r
6# Capsules. The behavior of the Firmware Management Protocol instance is\r
7# customized using libraries and PCDs.\r
8#\r
9# Copyright (c) 2016, Microsoft Corporation. All rights reserved.<BR>\r
c40f7cc7 10# Copyright (c) 2018 - 2019, Intel Corporation. All rights reserved.<BR>\r
9817d442 11# Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>\r
262b7a31 12#\r
bcef758c 13# SPDX-License-Identifier: BSD-2-Clause-Patent\r
262b7a31
KM
14#\r
15##\r
16\r
17[Defines]\r
18 PLATFORM_NAME = FmpDevicePkg\r
19 PLATFORM_GUID = 0af3d540-27c6-11e8-828b-f8597177a00a\r
20 PLATFORM_VERSION = 0.1\r
21 DSC_SPECIFICATION = 0x00010005\r
22 OUTPUT_DIRECTORY = Build/FmpDevicePkg\r
9817d442 23 SUPPORTED_ARCHITECTURES = IA32|X64|ARM|AARCH64|RISCV64\r
e23366d3 24 BUILD_TARGETS = DEBUG|RELEASE|NOOPT\r
262b7a31
KM
25 SKUID_IDENTIFIER = DEFAULT\r
26\r
27 #\r
28 # Define ESRT GUIDs for Firmware Management Protocol instances\r
29 #\r
ee48361c
SZ
30 DEFINE SYSTEM_FMP_ESRT_GUID = B461B3BD-E62A-4A71-841C-50BA4E500267\r
31 DEFINE DEVICE_FMP_ESRT_GUID = 226034C4-8B67-4536-8653-D6EE7CE5A316\r
262b7a31 32\r
11d35494
EJ
33 #\r
34 # TRUE - Build FmpDxe module for with storage access enabled\r
35 # FALSE - Build FmpDxe module for with storage access disabled\r
36 #\r
37 DEFINE DEVICE_FMP_STORAGE_ACCESS_ENABLE = TRUE\r
38\r
262b7a31
KM
39[LibraryClasses]\r
40 UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntryPoint.inf\r
262b7a31
KM
41 UefiBootServicesTableLib|MdePkg/Library/UefiBootServicesTableLib/UefiBootServicesTableLib.inf\r
42 UefiLib|MdePkg/Library/UefiLib/UefiLib.inf\r
43 UefiRuntimeServicesTableLib|MdePkg/Library/UefiRuntimeServicesTableLib/UefiRuntimeServicesTableLib.inf\r
262b7a31
KM
44 MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf\r
45 DevicePathLib|MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf\r
262b7a31
KM
46 BaseLib|MdePkg/Library/BaseLib/BaseLib.inf\r
47 BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf\r
262b7a31
KM
48 PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf\r
49 DebugLib|MdePkg/Library/UefiDebugLibStdErr/UefiDebugLibStdErr.inf\r
50 DebugPrintErrorLevelLib|MdePkg/Library/BaseDebugPrintErrorLevelLib/BaseDebugPrintErrorLevelLib.inf\r
262b7a31 51 PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf\r
8bc648fe
MK
52!ifdef CONTINUOUS_INTEGRATION\r
53 BaseCryptLib|CryptoPkg/Library/BaseCryptLibNull/BaseCryptLibNull.inf\r
54!else\r
262b7a31 55 IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf\r
8bc648fe 56 OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf\r
262b7a31 57 BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf\r
8bc648fe 58!endif\r
262b7a31 59 FmpAuthenticationLib|SecurityPkg/Library/FmpAuthenticationLibPkcs7/FmpAuthenticationLibPkcs7.inf\r
262b7a31
KM
60 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf\r
61 FmpPayloadHeaderLib|FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.inf\r
62 FmpDeviceLib|FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf\r
4ff8b6b1 63 TimerLib|MdePkg/Library/BaseTimerLibNullTemplate/BaseTimerLibNullTemplate.inf\r
262b7a31
KM
64\r
65[LibraryClasses.ARM, LibraryClasses.AARCH64]\r
66 #\r
67 # It is not possible to prevent the ARM compiler for generic intrinsic functions.\r
95d28836 68 # This library provides the intrinsic functions generate by a given compiler.\r
262b7a31
KM
69 # [LibraryClasses.ARM, LibraryClasses.AARCH64] and NULL mean link this library\r
70 # into all ARM and AARCH64 images.\r
71 #\r
72 NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf\r
73\r
74 # Add support for stack protector\r
75 NULL|MdePkg/Library/BaseStackCheckLib/BaseStackCheckLib.inf\r
76\r
77[LibraryClasses.ARM]\r
78 ArmSoftFloatLib|ArmPkg/Library/ArmSoftFloatLib/ArmSoftFloatLib.inf\r
79\r
278c3d48
EJ
80[PcdsPatchableInModule]\r
81 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageTypeIdGuid|{0}\r
82\r
262b7a31
KM
83[Components]\r
84 #\r
85 # Libraries\r
86 #\r
87 FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf\r
c40f7cc7 88 FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleUpdatePolicyLibOnProtocol.inf\r
262b7a31
KM
89 FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.inf\r
90 FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf\r
91 FmpDevicePkg/FmpDxe/FmpDxeLib.inf\r
92\r
93 #\r
94 # Modules\r
95 #\r
c40f7cc7
EJ
96 FmpDevicePkg/CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.inf {\r
97 <LibraryClasses>\r
98 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf\r
99 }\r
262b7a31
KM
100 FmpDevicePkg/FmpDxe/FmpDxe.inf {\r
101 <Defines>\r
102 #\r
ee48361c 103 # FILE_GUID is used as ESRT GUID\r
262b7a31 104 #\r
ee48361c 105 FILE_GUID = $(SYSTEM_FMP_ESRT_GUID)\r
278c3d48
EJ
106 <PcdsFixedAtBuild>\r
107 #\r
108 # Unicode name string that is used to populate FMP Image Descriptor for this capsule update module\r
109 #\r
110 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageIdName|L"Sample Firmware Device"\r
111 #\r
112 # Certificates used to authenticate capsule update image\r
113 #\r
114 !include BaseTools/Source/Python/Pkcs7Sign/TestRoot.cer.gFmpDevicePkgTokenSpaceGuid.PcdFmpDevicePkcs7CertBufferXdr.inc\r
115 <PcdsPatchableInModule>\r
116 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageTypeIdGuid|{GUID("$(SYSTEM_FMP_ESRT_GUID)")}\r
c40f7cc7
EJ
117 <LibraryClasses>\r
118 #\r
119 # Use CapsuleUpdatePolicyLib that calls the Capsule Update Policy Protocol.\r
120 # Depends on the CapsuleUpdatePolicyDxe module to produce the protocol.\r
121 # Required for FmpDxe modules that are intended to be platform independent.\r
122 #\r
123 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleUpdatePolicyLibOnProtocol.inf\r
262b7a31
KM
124 }\r
125\r
126 FmpDevicePkg/FmpDxe/FmpDxe.inf {\r
127 <Defines>\r
128 #\r
129 # FILE_GUID is used as ESRT GUID\r
130 #\r
ee48361c 131 FILE_GUID = $(DEVICE_FMP_ESRT_GUID)\r
11d35494
EJ
132 <PcdsFeatureFlag>\r
133 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceStorageAccessEnable|$(DEVICE_FMP_STORAGE_ACCESS_ENABLE)\r
278c3d48 134 <PcdsFixedAtBuild>\r
11d35494
EJ
135!if $(DEVICE_FMP_STORAGE_ACCESS_ENABLE) == FALSE\r
136 #\r
137 # Disable test key detection\r
138 #\r
139 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceTestKeySha256Digest|{0}\r
140!endif\r
278c3d48
EJ
141 #\r
142 # Unicode name string that is used to populate FMP Image Descriptor for this capsule update module\r
143 #\r
11d35494 144!if $(DEVICE_FMP_STORAGE_ACCESS_ENABLE) == TRUE\r
278c3d48 145 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageIdName|L"Sample Firmware Device"\r
11d35494
EJ
146!else\r
147 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageIdName|L"Sample Firmware Device No Storage Access"\r
148!endif\r
278c3d48
EJ
149 #\r
150 # Certificates used to authenticate capsule update image\r
151 #\r
152 !include BaseTools/Source/Python/Pkcs7Sign/TestRoot.cer.gFmpDevicePkgTokenSpaceGuid.PcdFmpDevicePkcs7CertBufferXdr.inc\r
153 <PcdsPatchableInModule>\r
154 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageTypeIdGuid|{GUID("$(DEVICE_FMP_ESRT_GUID)")}\r
c40f7cc7
EJ
155 <LibraryClasses>\r
156 #\r
157 # Directly use a platform specific CapsuleUpdatePolicyLib instance.\r
158 # Only works for FmpDxe modules that are build from sources and included\r
159 # in a system firmware image.\r
160 #\r
161 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf\r
262b7a31 162 }\r
4da45e20
SZ
163\r
164[BuildOptions]\r
165 *_*_*_CC_FLAGS = -D DISABLE_NEW_DEPRECATED_INTERFACES\r