]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/SecureBootConfigDxe/SecureBootConfigDxe.inf
Update all the code to consume the ConvertDevicePathToText, ConvertDevicePathNodeToTe...
[mirror_edk2.git] / OvmfPkg / SecureBootConfigDxe / SecureBootConfigDxe.inf
CommitLineData
8c71ec8f 1## @file\r
2# Component name for SecureBoot configuration module for OVMF.\r
3#\r
4# Need custom SecureBootConfigDxe for OVMF that does not force\r
5# resets after PK changes since OVMF doesn't have persistent variables\r
6#\r
863986b3 7# Copyright (c) 2011 - 2013, Intel Corporation. All rights reserved.<BR>\r
8c71ec8f 8# This program and the accompanying materials\r
9# are licensed and made available under the terms and conditions of the BSD License\r
10# which accompanies this distribution. The full text of the license may be found at\r
11# http://opensource.org/licenses/bsd-license.php\r
12# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
13# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
14#\r
15##\r
16\r
17[Defines]\r
18 INF_VERSION = 0x00010005\r
19 BASE_NAME = SecureBootConfigDxe\r
db1126d2 20 FILE_GUID = 68E2BC17-198D-41f1-8213-065E3A2A7C12\r
8c71ec8f 21 MODULE_TYPE = DXE_DRIVER\r
22 VERSION_STRING = 1.0\r
23 ENTRY_POINT = SecureBootConfigDriverEntryPoint\r
24 UNLOAD_IMAGE = SecureBootConfigDriverUnload\r
25\r
26#\r
27# VALID_ARCHITECTURES = IA32 X64 IPF EBC\r
28#\r
29\r
30[Sources]\r
31 SecureBootConfigDriver.c\r
32 SecureBootConfigImpl.c\r
33 SecureBootConfigFileExplorer.c\r
34 SecureBootConfigDevicePath.c\r
35 SecureBootConfigMisc.c\r
36 SecureBootConfigImpl.h\r
37 SecureBootConfig.vfr\r
38 SecureBootConfigStrings.uni\r
39 SecureBootConfigNvData.h\r
40\r
41[Packages]\r
42 MdePkg/MdePkg.dec\r
43 MdeModulePkg/MdeModulePkg.dec\r
44 SecurityPkg/SecurityPkg.dec\r
45 CryptoPkg/CryptoPkg.dec\r
46\r
47[LibraryClasses]\r
48 BaseLib\r
49 BaseMemoryLib\r
50 BaseCryptLib\r
51 MemoryAllocationLib\r
52 UefiLib\r
53 UefiBootServicesTableLib\r
54 UefiRuntimeServicesTableLib\r
55 UefiDriverEntryPoint\r
56 UefiHiiServicesLib\r
57 DebugLib\r
58 HiiLib\r
863986b3
RN
59 PlatformSecureLib\r
60 DevicePathLib\r
8c71ec8f 61\r
62[Guids]\r
63 gEfiIfrTianoGuid\r
64 gEfiCustomModeEnableGuid\r
65 gEfiSecureBootEnableDisableGuid\r
66 gSecureBootConfigFormSetGuid\r
67 gEfiCertPkcs7Guid\r
68 gEfiCertRsa2048Guid ## CONSUMES\r
69 gEfiCertX509Guid ## CONSUMES\r
70 gEfiCertSha1Guid ## CONSUMES\r
71 gEfiCertSha256Guid ## CONSUMES\r
72 gEfiCertTypeRsa2048Sha256Guid ## CONSUMES\r
73 gEfiImageSecurityDatabaseGuid ## CONSUMES\r
74 gEfiFileSystemVolumeLabelInfoIdGuid ## CONSUMES\r
75 gEfiGlobalVariableGuid ## PRODUCES ## Variable Guid\r
8c71ec8f 76 gEfiFileInfoGuid ## CONSUMES ## GUID\r
8c71ec8f 77\r
78[Protocols]\r
79 gEfiHiiConfigAccessProtocolGuid ## PRODUCES\r
80 gEfiHiiConfigRoutingProtocolGuid ## CONSUMES\r
81 gEfiSimpleFileSystemProtocolGuid ## PROTOCOL CONSUMES\r
82 gEfiLoadFileProtocolGuid ## PROTOCOL CONSUMES\r
83 gEfiBlockIoProtocolGuid ## PROTOCOL CONSUMES\r
84 gEfiDevicePathProtocolGuid ## PROTOCOL CONSUMES\r
8c71ec8f 85\r
86[Depex]\r
87 gEfiHiiConfigRoutingProtocolGuid AND\r
88 gEfiHiiDatabaseProtocolGuid AND\r
89 gEfiVariableArchProtocolGuid AND\r
90 gEfiVariableWriteArchProtocolGuid\r