]> git.proxmox.com Git - mirror_edk2.git/blob - FmpDevicePkg/FmpDevicePkg.dsc
dfb3c1a141f65f906d56fe94b951801f612fc801
[mirror_edk2.git] / FmpDevicePkg / FmpDevicePkg.dsc
1 ## @file
2 # Firmware Management Protocol Device Package
3 #
4 # This package provides an implementation of a Firmware Management Protocol
5 # instance that supports the update of firmware storage devices using UEFI
6 # Capsules. The behavior of the Firmware Management Protocol instance is
7 # customized using libraries and PCDs.
8 #
9 # Copyright (c) 2016, Microsoft Corporation. All rights reserved.<BR>
10 # Copyright (c) 2018 - 2020, Intel Corporation. All rights reserved.<BR>
11 # Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>
12 #
13 # SPDX-License-Identifier: BSD-2-Clause-Patent
14 #
15 ##
16
17 [Defines]
18 PLATFORM_NAME = FmpDevicePkg
19 PLATFORM_GUID = 0af3d540-27c6-11e8-828b-f8597177a00a
20 PLATFORM_VERSION = 0.1
21 DSC_SPECIFICATION = 0x00010005
22 OUTPUT_DIRECTORY = Build/FmpDevicePkg
23 SUPPORTED_ARCHITECTURES = IA32|X64|ARM|AARCH64|RISCV64
24 BUILD_TARGETS = DEBUG|RELEASE|NOOPT
25 SKUID_IDENTIFIER = DEFAULT
26
27 #
28 # Define ESRT GUIDs for Firmware Management Protocol instances
29 #
30 DEFINE SYSTEM_FMP_ESRT_GUID = B461B3BD-E62A-4A71-841C-50BA4E500267
31 DEFINE DEVICE_FMP_ESRT_GUID = 226034C4-8B67-4536-8653-D6EE7CE5A316
32
33 #
34 # TRUE - Build FmpDxe module for with storage access enabled
35 # FALSE - Build FmpDxe module for with storage access disabled
36 #
37 DEFINE DEVICE_FMP_STORAGE_ACCESS_ENABLE = TRUE
38
39 [LibraryClasses]
40 UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntryPoint.inf
41 UefiBootServicesTableLib|MdePkg/Library/UefiBootServicesTableLib/UefiBootServicesTableLib.inf
42 UefiLib|MdePkg/Library/UefiLib/UefiLib.inf
43 UefiRuntimeServicesTableLib|MdePkg/Library/UefiRuntimeServicesTableLib/UefiRuntimeServicesTableLib.inf
44 MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf
45 DevicePathLib|MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf
46 BaseLib|MdePkg/Library/BaseLib/BaseLib.inf
47 BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf
48 PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf
49 DebugLib|MdePkg/Library/UefiDebugLibStdErr/UefiDebugLibStdErr.inf
50 DebugPrintErrorLevelLib|MdePkg/Library/BaseDebugPrintErrorLevelLib/BaseDebugPrintErrorLevelLib.inf
51 PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf
52 !ifdef CONTINUOUS_INTEGRATION
53 BaseCryptLib|CryptoPkg/Library/BaseCryptLibNull/BaseCryptLibNull.inf
54 !else
55 IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf
56 OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf
57 BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
58 !endif
59 FmpAuthenticationLib|SecurityPkg/Library/FmpAuthenticationLibPkcs7/FmpAuthenticationLibPkcs7.inf
60 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf
61 FmpPayloadHeaderLib|FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.inf
62 FmpDeviceLib|FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf
63 FmpDependencyLib|FmpDevicePkg/Library/FmpDependencyLib/FmpDependencyLib.inf
64 TimerLib|MdePkg/Library/BaseTimerLibNullTemplate/BaseTimerLibNullTemplate.inf
65
66 [LibraryClasses.ARM, LibraryClasses.AARCH64]
67 #
68 # It is not possible to prevent the ARM compiler for generic intrinsic functions.
69 # This library provides the intrinsic functions generate by a given compiler.
70 # [LibraryClasses.ARM, LibraryClasses.AARCH64] and NULL mean link this library
71 # into all ARM and AARCH64 images.
72 #
73 NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf
74
75 # Add support for stack protector
76 NULL|MdePkg/Library/BaseStackCheckLib/BaseStackCheckLib.inf
77
78 [LibraryClasses.ARM]
79 ArmSoftFloatLib|ArmPkg/Library/ArmSoftFloatLib/ArmSoftFloatLib.inf
80
81 [PcdsPatchableInModule]
82 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageTypeIdGuid|{0}
83
84 [Components]
85 #
86 # Libraries
87 #
88 FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf
89 FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleUpdatePolicyLibOnProtocol.inf
90 FmpDevicePkg/Library/FmpPayloadHeaderLibV1/FmpPayloadHeaderLibV1.inf
91 FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLibNull.inf
92 FmpDevicePkg/Library/FmpDependencyLib/FmpDependencyLib.inf
93 FmpDevicePkg/FmpDxe/FmpDxeLib.inf
94
95 #
96 # Modules
97 #
98 FmpDevicePkg/CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.inf {
99 <LibraryClasses>
100 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf
101 }
102 FmpDevicePkg/FmpDxe/FmpDxe.inf {
103 <Defines>
104 #
105 # FILE_GUID is used as ESRT GUID
106 #
107 FILE_GUID = $(SYSTEM_FMP_ESRT_GUID)
108 <PcdsFixedAtBuild>
109 #
110 # Unicode name string that is used to populate FMP Image Descriptor for this capsule update module
111 #
112 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageIdName|L"Sample Firmware Device"
113 #
114 # Certificates used to authenticate capsule update image
115 #
116 !include BaseTools/Source/Python/Pkcs7Sign/TestRoot.cer.gFmpDevicePkgTokenSpaceGuid.PcdFmpDevicePkcs7CertBufferXdr.inc
117 <PcdsPatchableInModule>
118 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageTypeIdGuid|{GUID("$(SYSTEM_FMP_ESRT_GUID)")}
119 <LibraryClasses>
120 #
121 # Use CapsuleUpdatePolicyLib that calls the Capsule Update Policy Protocol.
122 # Depends on the CapsuleUpdatePolicyDxe module to produce the protocol.
123 # Required for FmpDxe modules that are intended to be platform independent.
124 #
125 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleUpdatePolicyLibOnProtocol.inf
126 }
127
128 FmpDevicePkg/FmpDxe/FmpDxe.inf {
129 <Defines>
130 #
131 # FILE_GUID is used as ESRT GUID
132 #
133 FILE_GUID = $(DEVICE_FMP_ESRT_GUID)
134 <PcdsFeatureFlag>
135 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceStorageAccessEnable|$(DEVICE_FMP_STORAGE_ACCESS_ENABLE)
136 <PcdsFixedAtBuild>
137 !if $(DEVICE_FMP_STORAGE_ACCESS_ENABLE) == FALSE
138 #
139 # Disable test key detection
140 #
141 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceTestKeySha256Digest|{0}
142 !endif
143 #
144 # Unicode name string that is used to populate FMP Image Descriptor for this capsule update module
145 #
146 !if $(DEVICE_FMP_STORAGE_ACCESS_ENABLE) == TRUE
147 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageIdName|L"Sample Firmware Device"
148 !else
149 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageIdName|L"Sample Firmware Device No Storage Access"
150 !endif
151 #
152 # Certificates used to authenticate capsule update image
153 #
154 !include BaseTools/Source/Python/Pkcs7Sign/TestRoot.cer.gFmpDevicePkgTokenSpaceGuid.PcdFmpDevicePkcs7CertBufferXdr.inc
155 <PcdsPatchableInModule>
156 gFmpDevicePkgTokenSpaceGuid.PcdFmpDeviceImageTypeIdGuid|{GUID("$(DEVICE_FMP_ESRT_GUID)")}
157 <LibraryClasses>
158 #
159 # Directly use a platform specific CapsuleUpdatePolicyLib instance.
160 # Only works for FmpDxe modules that are build from sources and included
161 # in a system firmware image.
162 #
163 CapsuleUpdatePolicyLib|FmpDevicePkg/Library/CapsuleUpdatePolicyLibNull/CapsuleUpdatePolicyLibNull.inf
164 }
165
166 [BuildOptions]
167 *_*_*_CC_FLAGS = -D DISABLE_NEW_DEPRECATED_INTERFACES