]> git.proxmox.com Git - mirror_edk2.git/blame - FmpDevicePkg/FmpDevicePkg.dsc
FmpDevicePkg/FmpDxe: Use new Variable Lock interface
[mirror_edk2.git] / FmpDevicePkg / FmpDevicePkg.dsc
CommitLineData
262b7a31
KM
1## @file\r
2# Firmware Management Protocol Device Package\r
3#\r
4# This package provides an implementation of a Firmware Management Protocol\r
5# instance that supports the update of firmware storage devices using UEFI\r
6# Capsules. The behavior of the Firmware Management Protocol instance is\r
7# customized using libraries and PCDs.\r
8#\r
92e9c44f 9# Copyright (c) Microsoft Corporation.<BR>\r
8e03191d 10# Copyright (c) 2018 - 2021, Intel Corporation. All rights reserved.<BR>\r
9817d442 11# Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>\r
262b7a31 12#\r
bcef758c 13# SPDX-License-Identifier: BSD-2-Clause-Patent\r
262b7a31
KM
14#\r
15##\r
16\r
17[Defines]\r
18 PLATFORM_NAME = FmpDevicePkg\r
19 PLATFORM_GUID = 0af3d540-27c6-11e8-828b-f8597177a00a\r
20 PLATFORM_VERSION = 0.1\r
21 DSC_SPECIFICATION = 0x00010005\r
22 OUTPUT_DIRECTORY = Build/FmpDevicePkg\r
9817d442 23 SUPPORTED_ARCHITECTURES = IA32|X64|ARM|AARCH64|RISCV64\r
e23366d3 24 BUILD_TARGETS = DEBUG|RELEASE|NOOPT\r
262b7a31
KM
25 SKUID_IDENTIFIER = DEFAULT\r
26\r
27 #\r
28 # Define ESRT GUIDs for Firmware Management Protocol instances\r
29 #\r
ee48361c
SZ
30 DEFINE SYSTEM_FMP_ESRT_GUID = B461B3BD-E62A-4A71-841C-50BA4E500267\r
31 DEFINE DEVICE_FMP_ESRT_GUID = 226034C4-8B67-4536-8653-D6EE7CE5A316\r
262b7a31 32\r
11d35494
EJ
33 #\r
34 # TRUE - Build FmpDxe module for with storage access enabled\r
35 # FALSE - Build FmpDxe module for with storage access disabled\r
36 #\r
37 DEFINE DEVICE_FMP_STORAGE_ACCESS_ENABLE = TRUE\r
38\r
ff306cfd
WX
39!include UnitTestFrameworkPkg/UnitTestFrameworkPkgTarget.dsc.inc\r
40\r
8e03191d
DB
41!include MdePkg/MdeLibs.dsc.inc\r
42\r
262b7a31
KM
43[LibraryClasses]\r
44 UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntryPoint.inf\r
262b7a31
KM
45 UefiBootServicesTableLib|MdePkg/Library/UefiBootServicesTableLib/UefiBootServicesTableLib.inf\r
46 UefiLib|MdePkg/Library/UefiLib/UefiLib.inf\r
47 UefiRuntimeServicesTableLib|MdePkg/Library/UefiRuntimeServicesTableLib/UefiRuntimeServicesTableLib.inf\r
262b7a31
KM
48 MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf\r
49 DevicePathLib|MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf\r
262b7a31
KM
50 BaseLib|MdePkg/Library/BaseLib/BaseLib.inf\r
51 BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf\r
262b7a31
KM
52 PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf\r
53 DebugLib|MdePkg/Library/UefiDebugLibStdErr/UefiDebugLibStdErr.inf\r
54 DebugPrintErrorLevelLib|MdePkg/Library/BaseDebugPrintErrorLevelLib/BaseDebugPrintErrorLevelLib.inf\r
262b7a31 55 PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf\r
2f6f3329 56 VariablePolicyHelperLib|MdeModulePkg/Library/VariablePolicyHelperLib/VariablePolicyHelperLib.inf\r
8bc648fe
MK
57!ifdef CONTINUOUS_INTEGRATION\r
58 BaseCryptLib|CryptoPkg/Library/BaseCryptLibNull/BaseCryptLibNull.inf\r
59!else\r
262b7a31 60 IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf\r
8bc648fe 61 OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf\r
262b7a31 62 BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf\r
92e9c44f 63 RngLib|MdePkg/Library/BaseRngLibNull/BaseRngLibNull.inf\r
8bc648fe 64!endif\r
262b7a31 65 FmpAuthenticationLib|SecurityPkg/Library/FmpAuthenticationLibPkcs7/FmpAuthenticationLibPkcs7.inf\r
262b7a31
KM
66 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf\r
67 FmpPayloadHeaderLib|FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.inf\r
68 FmpDeviceLib|FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf\r
a93bf06b 69 FmpDependencyLib|FmpDevicePkg/Library/FmpDependencyLib/FmpDependencyLib.inf\r
6c496642 70 FmpDependencyCheckLib|FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependencyCheckLibNull.inf\r
ba86bb2c 71 FmpDependencyDeviceLib|FmpDevicePkg/Library/FmpDependencyDeviceLibNull/FmpDependencyDeviceLibNull.inf\r
4ff8b6b1 72 TimerLib|MdePkg/Library/BaseTimerLibNullTemplate/BaseTimerLibNullTemplate.inf\r
262b7a31
KM
73\r
74[LibraryClasses.ARM, LibraryClasses.AARCH64]\r
75 #\r
76 # It is not possible to prevent the ARM compiler for generic intrinsic functions.\r
95d28836 77 # This library provides the intrinsic functions generate by a given compiler.\r
262b7a31
KM
78 # [LibraryClasses.ARM, LibraryClasses.AARCH64] and NULL mean link this library\r
79 # into all ARM and AARCH64 images.\r
80 #\r
81 NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf\r
82\r
83 # Add support for stack protector\r
84 NULL|MdePkg/Library/BaseStackCheckLib/BaseStackCheckLib.inf\r
85\r
86[LibraryClasses.ARM]\r
87 ArmSoftFloatLib|ArmPkg/Library/ArmSoftFloatLib/ArmSoftFloatLib.inf\r
88\r
278c3d48
EJ
89[PcdsPatchableInModule]\r
90 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageTypeIdGuid|{0}\r
91\r
262b7a31
KM
92[Components]\r
93 #\r
94 # Libraries\r
95 #\r
96 FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf\r
c40f7cc7 97 FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleUpdatePolicyLibOnProtocol.inf\r
262b7a31
KM
98 FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.inf\r
99 FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf\r
a93bf06b 100 FmpDevicePkg/Library/FmpDependencyLib/FmpDependencyLib.inf\r
6c496642
WX
101 FmpDevicePkg/Library/FmpDependencyCheckLib/FmpDependencyCheckLib.inf\r
102 FmpDevicePkg/Library/FmpDependencyCheckLibNull/FmpDependencyCheckLibNull.inf\r
ba86bb2c 103 FmpDevicePkg/Library/FmpDependencyDeviceLibNull/FmpDependencyDeviceLibNull.inf\r
262b7a31
KM
104 FmpDevicePkg/FmpDxe/FmpDxeLib.inf\r
105\r
106 #\r
107 # Modules\r
108 #\r
c40f7cc7
EJ
109 FmpDevicePkg/CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.inf {\r
110 <LibraryClasses>\r
111 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf\r
112 }\r
262b7a31
KM
113 FmpDevicePkg/FmpDxe/FmpDxe.inf {\r
114 <Defines>\r
115 #\r
ee48361c 116 # FILE_GUID is used as ESRT GUID\r
262b7a31 117 #\r
ee48361c 118 FILE_GUID = $(SYSTEM_FMP_ESRT_GUID)\r
278c3d48
EJ
119 <PcdsFixedAtBuild>\r
120 #\r
121 # Unicode name string that is used to populate FMP Image Descriptor for this capsule update module\r
122 #\r
123 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageIdName|L"Sample Firmware Device"\r
124 #\r
125 # Certificates used to authenticate capsule update image\r
126 #\r
127 !include BaseTools/Source/Python/Pkcs7Sign/TestRoot.cer.gFmpDevicePkgTokenSpaceGuid.PcdFmpDevicePkcs7CertBufferXdr.inc\r
128 <PcdsPatchableInModule>\r
129 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageTypeIdGuid|{GUID("$(SYSTEM_FMP_ESRT_GUID)")}\r
c40f7cc7
EJ
130 <LibraryClasses>\r
131 #\r
132 # Use CapsuleUpdatePolicyLib that calls the Capsule Update Policy Protocol.\r
133 # Depends on the CapsuleUpdatePolicyDxe module to produce the protocol.\r
134 # Required for FmpDxe modules that are intended to be platform independent.\r
135 #\r
136 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleUpdatePolicyLibOnProtocol.inf\r
262b7a31
KM
137 }\r
138\r
139 FmpDevicePkg/FmpDxe/FmpDxe.inf {\r
140 <Defines>\r
141 #\r
142 # FILE_GUID is used as ESRT GUID\r
143 #\r
ee48361c 144 FILE_GUID = $(DEVICE_FMP_ESRT_GUID)\r
11d35494
EJ
145 <PcdsFeatureFlag>\r
146 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceStorageAccessEnable|$(DEVICE_FMP_STORAGE_ACCESS_ENABLE)\r
278c3d48 147 <PcdsFixedAtBuild>\r
11d35494
EJ
148!if $(DEVICE_FMP_STORAGE_ACCESS_ENABLE) == FALSE\r
149 #\r
150 # Disable test key detection\r
151 #\r
152 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceTestKeySha256Digest|{0}\r
153!endif\r
278c3d48
EJ
154 #\r
155 # Unicode name string that is used to populate FMP Image Descriptor for this capsule update module\r
156 #\r
11d35494 157!if $(DEVICE_FMP_STORAGE_ACCESS_ENABLE) == TRUE\r
278c3d48 158 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageIdName|L"Sample Firmware Device"\r
11d35494
EJ
159!else\r
160 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageIdName|L"Sample Firmware Device No Storage Access"\r
161!endif\r
278c3d48
EJ
162 #\r
163 # Certificates used to authenticate capsule update image\r
164 #\r
165 !include BaseTools/Source/Python/Pkcs7Sign/TestRoot.cer.gFmpDevicePkgTokenSpaceGuid.PcdFmpDevicePkcs7CertBufferXdr.inc\r
166 <PcdsPatchableInModule>\r
167 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageTypeIdGuid|{GUID("$(DEVICE_FMP_ESRT_GUID)")}\r
c40f7cc7
EJ
168 <LibraryClasses>\r
169 #\r
170 # Directly use a platform specific CapsuleUpdatePolicyLib instance.\r
171 # Only works for FmpDxe modules that are build from sources and included\r
172 # in a system firmware image.\r
173 #\r
174 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf\r
262b7a31 175 }\r
4da45e20 176\r
ff306cfd
WX
177 #\r
178 # Add UEFI Target Based Unit Tests\r
179 #\r
180 FmpDevicePkg/Test/UnitTest/Library/FmpDependencyLib/FmpDependencyLibUnitTestsUefi.inf\r
181\r
4da45e20
SZ
182[BuildOptions]\r
183 *_*_*_CC_FLAGS = -D DISABLE_NEW_DEPRECATED_INTERFACES\r