public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: zwei4 <david.wei@intel.com>
To: edk2-devel@lists.01.org
Subject: [Patch][edk2-platforms/devel-MinnowBoard3 1/2] Add BPDT library.
Date: Fri, 10 Mar 2017 16:05:12 +0800	[thread overview]
Message-ID: <20170310080513.4660-1-david.wei@intel.com> (raw)

Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: zwei4 <david.wei@intel.com>
---
 Silicon/BroxtonSoC/BroxtonSiPkg/BroxtonSiPkg.dec   |   4 +-
 .../BroxtonSiPkg/Include/Library/BpdtLib.h         | 240 +++++++
 .../BroxtonSiPkg/Library/BpdtLib/BpdtLib.c         | 798 +++++++++++++++++++++
 .../BroxtonSiPkg/Library/BpdtLib/BpdtLib.inf       |  49 ++
 4 files changed, 1090 insertions(+), 1 deletion(-)
 create mode 100644 Silicon/BroxtonSoC/BroxtonSiPkg/Include/Library/BpdtLib.h
 create mode 100644 Silicon/BroxtonSoC/BroxtonSiPkg/Library/BpdtLib/BpdtLib.c
 create mode 100644 Silicon/BroxtonSoC/BroxtonSiPkg/Library/BpdtLib/BpdtLib.inf

diff --git a/Silicon/BroxtonSoC/BroxtonSiPkg/BroxtonSiPkg.dec b/Silicon/BroxtonSoC/BroxtonSiPkg/BroxtonSiPkg.dec
index 2ee4008c6..da728e888 100644
--- a/Silicon/BroxtonSoC/BroxtonSiPkg/BroxtonSiPkg.dec
+++ b/Silicon/BroxtonSoC/BroxtonSiPkg/BroxtonSiPkg.dec
@@ -238,7 +238,9 @@
   gDciConfigGuid                        = { 0x9af1e14a, 0xe6b7, 0x4b64, { 0xbb, 0x33, 0x9b, 0x1, 0x33, 0x4c, 0x24, 0xfe } }
   gP2sbConfigGuid                       = { 0x11354a0c, 0x781e, 0x44a1, { 0xa7, 0x87, 0xc0, 0x17, 0x8c, 0x8d, 0x57, 0xf } }
   gInterruptConfigGuid                  = { 0x097dccd0, 0xf570, 0x41f6, { 0x9d, 0xf0, 0x72, 0xe2, 0x5a, 0xbe, 0xd3, 0x98 } }
-
+  gEfiBpdtLibBp1DataGuid                = { 0x7a4ecf02, 0xa1cf, 0x4e42, { 0xb6, 0x33, 0xfe, 0x95, 0x54, 0xbb, 0x60, 0xf8 } }
+  gEfiBpdtLibBp2DataGuid                = { 0x75b0886e, 0xcd6a, 0x469f, { 0xae, 0x0b, 0x8c, 0xed, 0x90, 0x33, 0xd1, 0x99 } }
+  
 [Includes.common]
   Include
   Library
diff --git a/Silicon/BroxtonSoC/BroxtonSiPkg/Include/Library/BpdtLib.h b/Silicon/BroxtonSoC/BroxtonSiPkg/Include/Library/BpdtLib.h
new file mode 100644
index 000000000..87683ab90
--- /dev/null
+++ b/Silicon/BroxtonSoC/BroxtonSiPkg/Include/Library/BpdtLib.h
@@ -0,0 +1,240 @@
+/** @file
+  Interface definitons of BPDT(Boot Partition Description Table) library.
+
+  Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
+
+  This program and the accompanying materials
+  are licensed and made available under the terms and conditions of the BSD License
+  which accompanies this distribution.  The full text of the license may be found at
+  http://opensource.org/licenses/bsd-license.php.
+
+  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+
+**/
+
+#ifndef __BPDT_HEADER_H__
+#define __BPDT_HEADER_H__
+
+extern EFI_GUID gEfiBpdtLibBp1DataGuid;
+extern EFI_GUID gEfiBpdtLibBp2DataGuid;
+
+#define BPDT_SIGN_GREEN       0x000055AA    //Normal Boot
+#define BPDT_SIGN_YELLOW      0x00AA55AA    //Recovery Boot
+
+typedef enum {
+  BootPart1,
+  BootPart2,
+  BootPartMax
+} BOOT_PARITION_SELECT;
+
+typedef struct {
+  VOID   *DataPtr;
+  UINT32  Size;
+} BPDT_PAYLOAD_DATA;
+
+typedef enum {
+  BpdtOemSmip,      // 0
+  BpdtCseRbe,       // 1
+  BpdtCseBup,       // 2
+  BpdtUcode,        // 3
+  BpdtIbb,          // 4
+  BpdtSbpdt,        // 5 - Secondary BPDT within a BPDT Entry
+  BpdtObb,          // 6
+  BpdtCseMain,      // 7
+  BpdtIsh,          // 8
+  BpdtCseIdlm,      // 9
+  BpdtIfpOverride,  //10
+  BpdtDebugTokens,  //11
+  BpdtUfsPhyConfig, //12
+  BpdtUfsGppLunId,  //13
+  BpdtPmc,          //14
+  BpdtIunit,        //15
+  BpdtMaxType
+} BPDT_ENTRY_TYPES;
+
+typedef struct {
+  UINT32  Signature;
+  UINT16  DscCount;
+  UINT16  BpdtVer;
+  UINT32  RedundantBlockXorSum;
+  UINT32  IfwiVer;
+  UINT64  FitToolVer;
+} BPDT_HEADER;
+
+
+typedef struct {
+  UINT16  Type;
+  UINT16  Flags;
+  UINT32  LbpOffset;  // Offset of Sub-Partition starting from base of LBP
+  UINT32  Size;       // Size of the Sub-Partition
+} BPDT_ENTRY;
+
+
+typedef struct {
+  UINT32  HeaderMarker;
+  UINT32  NumOfEntries;
+  UINT8   HeaderVersion;
+  UINT8   EntryVersion;
+  UINT8   HeaderLength;
+  UINT8   Checksum;
+  UINT32  SubPartName;
+} SUBPART_DIR_HEADER;
+
+
+typedef struct {
+  CHAR8   EntryName[12];
+  UINT32  EntryOffset:25;
+  UINT32  Huffman:1;
+  UINT32  Reserved1:6;
+  UINT32  EntrySize;
+  UINT32  Reserved2;
+} SUBPART_DIR_ENTRY;
+
+typedef enum {
+  HashIbbl = 0,
+  HashIbbm,
+  HashObb
+} BPM_HASH_SELECT;
+
+///
+/// Boot Policy Manifest (BPM) data structure
+///
+typedef struct {
+  UINT32                    ExtType;       ///< 0x00000013  (Little-Endian)
+  UINT32                    ExtLength;
+  UINT32                    NemData;
+  UINT32                    IbblHashAlgo;  ///< 0x00000002
+  UINT32                    IbblHashSize;  ///< 0x00000020
+  UINT8                     IbblHash[0x20];
+  UINT32                    IbbmHashAlgo;
+  UINT32                    IbbmHashSize;
+  UINT8                     IbbmHash[0x20];
+  UINT32                    ObbHashAlgo;
+  UINT32                    ObbHashSize;
+  UINT8                     ObbHash[0x20];
+  UINT8                     Reserved[124]; ///< Others data
+} BPM_DATA_FILE;
+
+
+/**
+  Locate and return a pointer to the selected Logical Boot Partition.
+
+  For block devices, the address will be the location in memory that the BP was copied to.
+  For memory mapped device (eg SPI), the address will be the location on the device.
+
+  @param[in]    LbpSel         Which BP to locate on the boot device
+  @param[out]   Address        The address of the selected BP on the boot device
+
+  @retval       EFI_SUCCESS    The operation completed successfully.
+  @retval       other          The selected BP could not be found.
+**/
+EFI_STATUS
+EFIAPI
+GetBootPartitionPointer (
+  IN  BOOT_PARITION_SELECT  LbpSel,
+  OUT VOID                  **LbpPointer
+  );
+
+/**
+  Parse the Boot Partition Descriptor Table of the provided Logical Boot Partition.
+  Note: "payload" is the Sub-Partition pointed to by the BDPT Entry of the given type.
+
+  @param[in]   LbpPointer      Pointer to the start of the BootPartition to be parsed
+  @param[in]   EntryType       The entry type of the subparition(payload) to look for
+  @param[out]  BpdtPayloadPtr  Address of the Struct to put the results into (MUST be allocated by caller)
+
+  @retval      EFI_SUCCESS     The operation completed successfully.
+**/
+EFI_STATUS
+EFIAPI
+GetBpdtPayloadDataRaw (
+  IN  VOID                *LbpPointer,
+  IN  BPDT_ENTRY_TYPES    EntryType,
+  OUT BPDT_PAYLOAD_DATA   *BpdtPayloadPtr
+  );
+
+/**
+  Parse the Boot Partition Descriptor Table on the selected Logical Boot Partition.
+  Takes the BP as input since some BPDT entry types can exist in both locations.
+  Note: "payload" is the Sub-Partition pointed to by the BDPT Entry of the given type.
+  
+  @param[in]   BpSel           Boot partition index
+  @param[in]   EntryType       The entry type of the subparition(payload) to look for
+  @param[out]   BpdtPayloadPtr Pointer to a Struct (in a HOB) containing the Size and Absolute address
+                               in memory(or spi) of the BPDT payload(subpart) of EntryType.
+                               If the caller shadows the Payload for performance, it should update this value
+
+  @retval  EFI_SUCCESS         The operation completed successfully.
+**/
+EFI_STATUS
+EFIAPI
+GetBpdtPayloadData (
+  IN  BOOT_PARITION_SELECT  BpSel,
+  IN  BPDT_ENTRY_TYPES      EntryType,
+  OUT BPDT_PAYLOAD_DATA     **BpdtPayloadPtr
+  );
+
+
+/**
+  Search the Subpartition pointed to by BpdtPayloadPtr for a Directory entry with "EntryName",
+  then fill in the Struct pointed to by SubPartPayloadPtr with the Addres and Size of the Dir Entry.
+  Note: "payload" is the Data pointed to by the Directory Entry with the given name.
+
+  @param[in]   BpdtPayloadPtr     Location and Size of the Payload to search
+  @param[in]   EntryName          the String name of the Directory entry to look for
+  @param[out]  SubPartPayloadPtr  Address of the Struct to put the results into (MUST be allocated by caller)
+
+  @retval      EFI_SUCCESS        The operation completed successfully.
+**/
+EFI_STATUS
+EFIAPI
+GetSubPartitionPayloadData (
+  IN  BPDT_PAYLOAD_DATA     *BpdtPayloadPtr,
+  IN  CONST CHAR8           *EntryName,
+  OUT BPDT_PAYLOAD_DATA     *SubPartPayloadPtr
+  );
+
+
+/**
+  This is a wrapper function for using VerifyHashBpm that will only
+  check the hash for the payloads used during normal boot.
+
+  If you want to check other payloads (ie during recovery flow), then the
+  calling code should locate and pass in the payload directly to VerifyHashBpm().
+
+  @param[in]   PayloadSel   Which hash in BPM to compare with.
+
+  @retval      EFI_SUCCESS  The function completed successfully and the Hash matched.
+  @retval      other        An error occured when locating and computing the Hash.
+**/
+EFI_STATUS
+EFIAPI
+LocateAndVerifyHashBpm (
+  IN BPM_HASH_SELECT   PayloadSel
+  );
+
+
+/**
+  Computes the Hash of a given data block and compares to the one in the Boot Policy Metadata.
+
+  @param[in]  PayloadSel   Which hash in BPM to compare with.
+  @param[in]  PayloadPtr   Pointer to the begining of the data to be hashed.
+  @param[in]  DataSize     Size of the data to be hashed.
+  @param[in]  BpmPtr       Pointer to the BPM structure.
+
+  @retval     EFI_SUCCESS             If the function completed successfully.
+  @retval     EFI_ABORTED             If the attempt to compute the hash fails.
+  @retval     EFI_INVALID_PARAMETER   If the hash type or size in BPM is unsupported.
+  @retval     EFI_SECURITY_VIOLATION  If the has does not match the one in BPM.
+**/
+EFI_STATUS
+EFIAPI
+VerifyHashBpm (
+  IN BPM_HASH_SELECT   PayloadSel,
+  IN BPM_DATA_FILE     *BpmPtr,
+  IN VOID              *PayloadPtr,
+  IN UINT32            DataSize
+  );
+
+#endif
diff --git a/Silicon/BroxtonSoC/BroxtonSiPkg/Library/BpdtLib/BpdtLib.c b/Silicon/BroxtonSoC/BroxtonSiPkg/Library/BpdtLib/BpdtLib.c
new file mode 100644
index 000000000..b65e8ae83
--- /dev/null
+++ b/Silicon/BroxtonSoC/BroxtonSiPkg/Library/BpdtLib/BpdtLib.c
@@ -0,0 +1,798 @@
+/** @file
+  This file contains the implementation of BpdtLib library.
+
+  The library exposes an abstract interface for accessing boot data
+  stored in the BPDT format on the Logical Boot Partition of the boot device.
+
+  Copyright (c) 2016 - 2017, Intel Corporation. All rights reserved.<BR>
+
+  This program and the accompanying materials
+  are licensed and made available under the terms and conditions of the BSD License
+  which accompanies this distribution.  The full text of the license may be found at
+  http://opensource.org/licenses/bsd-license.php.
+
+  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+
+**/
+
+#include <Uefi.h>
+#include <SeCAccess.h>
+#include <PiPei.h>
+#include <Ppi/BlockIoPei.h>
+#include <Ppi/Spi.h>
+#include <Guid/FirmwareFileSystem2.h>
+#include <Library/BaseLib.h>
+#include <Library/DebugLib.h>
+#include <Library/HobLib.h>
+#include <Library/BaseMemoryLib.h>
+#include <Library/MemoryAllocationLib.h>
+#include <Library/PeiServicesTablePointerLib.h>
+#include <Library/ScPlatformLib.h>
+#include <Library/BpdtLib.h>
+#include <Library/PeiSpiInitLib.h>
+#include <Library/BaseCryptLib.h>
+
+#define DIR_HDR_SIGNATURE     SIGNATURE_32('$', 'C', 'P', 'D')
+#define DIR_ENTRY_NAME_SIZE   12   //This is spec defined to be bytes
+#define SPLIT_ENTRY_PART_1    BIT0
+#define SPLIT_ENTRY_PART_2    BIT1
+#define SPLIT_ENTRY_FLAGS     (BIT1 | BIT0)
+#define BPDT_HOB_DATA_SIZE    (sizeof(BPDT_PAYLOAD_DATA) * BpdtMaxType)
+#define SpiMmioBoundary       0xFFFC0000
+
+/**
+  Calculate the Address in SPI of the selected Boot Partition
+
+  @param[in]     BpSel                 Which BP to locate on the SPI
+  @param[out]    BpFlashLinearAddress  The linear flash address of selected BP
+  @param[out]    LbpPointer            A pointer to the selected Boot partition on this media
+
+  @retval        EFI_SUCCESS           The operation completed successfully.
+**/
+EFI_STATUS
+EFIAPI
+InternalGetBpSpi (
+  IN  BOOT_PARITION_SELECT  BpSel,
+  OUT UINT32                *BpFlashLinearAddress,
+  OUT VOID                  **LbpPointer
+  )
+{
+  UINT32  BiosAddr;
+
+  //
+  // Compute BP FlashLinearAddress.
+  //
+  switch (BpSel) {
+    case BootPart1:
+      *BpFlashLinearAddress = 0x1000;
+      break;
+    case BootPart2:
+      if (HeciPciRead16(R_SEC_DevID_VID) != 0xFFFF) {
+        //
+        // BP2 linear address is the midpoint between BIOS base and expansion data base.
+        //
+        *BpFlashLinearAddress = (GetSpiFlashRegionBase(BIOS) + GetSpiFlashRegionBase(DeviceExpansion1)) / 2;
+      } else {
+
+        *BpFlashLinearAddress = 0x00800000>>1; 
+      }
+      break;
+    default:
+      return EFI_NOT_FOUND;
+      break;
+  }
+  DEBUG ((DEBUG_INFO, "BpFlashLinearAddress = %X\n", *BpFlashLinearAddress));
+  
+  //
+  // Calculate Boot partition physical address.
+  // FLA[26:0] <= (Flash_Region_Limit) - (FFFF_FFFCh - bios_address)
+  //
+  BiosAddr = GetSpiFlashRegionLimit(BIOS) + 0xFFC - *BpFlashLinearAddress;
+  *LbpPointer = (VOID *)((UINTN)0xFFFFFFFC - BiosAddr);
+  DEBUG ((DEBUG_INFO, "Flash address of BP%d = %X\n", BpSel+1, *LbpPointer));
+
+  return EFI_SUCCESS;
+}
+
+/**
+  SPI CMD read w/a. Because the upper 256k of address space is mapped to CSE SRAM,
+  it cannot be directly accessed via MMIO from host.
+
+  @param[in]         BpSel                 Which BP to locate on the SPI
+  @param[in out]     CombinedSpiObb        Combined OBB data.       
+  
+  @retval            EFI_SUCCESS           The operation completed successfully.
+**/
+EFI_STATUS
+EFIAPI
+InternalCheckAndJoinUpperSpi (
+  IN      BOOT_PARITION_SELECT  BpSel,
+  IN OUT  BPDT_PAYLOAD_DATA     *CombinedSpiObb
+  )
+{
+  VOID                      *UpperSpiObb;
+  VOID                      *LbpPointer;
+  UINT32                    Bp2LinearAddr;
+  UINT32                    SpiPart1Size;
+  UINT32                    SpiPart2Size;
+  EFI_STATUS                Status;
+  SC_SPI_PROTOCOL           *SpiPpi;
+  CONST EFI_PEI_SERVICES    **PeiServices;
+
+  //
+  // Check if Obb part is in upper spi address space.
+  // If the entry is from emmc this will be false, it can only be true for SPI.
+  //
+  if ((UINT32)CombinedSpiObb->DataPtr + CombinedSpiObb->Size >= SpiMmioBoundary) {
+
+    //Get Linear Addr of BpSel (on BXT this will be BP2, since it is)
+    InternalGetBpSpi (BpSel, &Bp2LinearAddr, &LbpPointer);
+
+    SpiPart1Size = SpiMmioBoundary - (UINT32)CombinedSpiObb->DataPtr;
+    SpiPart2Size = CombinedSpiObb->Size - SpiPart1Size;
+
+    UpperSpiObb = AllocatePages (EFI_SIZE_TO_PAGES (CombinedSpiObb->Size));
+
+    CopyMem (UpperSpiObb, CombinedSpiObb->DataPtr, SpiPart1Size);  //Copy MemMapped part of Spi.
+
+    //
+    // Install ScSpi Ppi.
+    //
+    InstallScSpi ();
+    PeiServices = GetPeiServicesTablePointer ();
+    Status = (*PeiServices)->LocatePpi (
+                               PeiServices,
+                               &gScSpiPpiGuid,
+                               0,
+                               NULL,
+                               (VOID **) &SpiPpi
+                               );
+    if (EFI_ERROR (Status)) {
+      DEBUG ((DEBUG_ERROR, "Cannot Locate gScSpiPpiGuid: %r. Halting system.\n", Status));
+      CpuDeadLoop ();
+    }
+
+    //
+    // Use SPI cmd to read entry into memory.
+    //
+    Status = SpiPpi->FlashRead (
+                       SpiPpi,
+                       FlashRegionBios,
+                       Bp2LinearAddr + SpiPart1Size,
+                       SpiPart2Size,
+                       (UINT8 *)((UINTN)UpperSpiObb + SpiPart1Size)
+                       );
+    if (EFI_ERROR (Status)) {
+      DEBUG ((DEBUG_ERROR, "Read SPI fail: %r. Halting system.\n", Status));
+      CpuDeadLoop ();
+    }
+
+    CombinedSpiObb->DataPtr = UpperSpiObb;
+  }
+  return EFI_SUCCESS;
+}
+
+
+/**
+  This function will handle locating and combining both parts of Split Obb,
+  regardless of which BootPartition that part1 or part2 is located on.
+
+  @param[in]     BpSel            Which BP to locate on the SPI
+  @param[out]    ObbPayloadPtr    Pointer to other part of Obb (hopefully on Bp1).
+                                  It does not matter if this ptr is actual memory or mmio,
+                                  since it needs to be combined anyway.
+                                  
+  @retval        EFI_SUCCESS      The operation completed successfully.
+  @retval        other            The selected BP could not be found.
+**/
+EFI_STATUS
+EFIAPI
+InternalLocateSplitObb (
+  IN   BOOT_PARITION_SELECT  BpSel,
+  OUT  BPDT_PAYLOAD_DATA     *ObbPayloadPtr
+  )
+{
+  UINT8               index;
+  VOID                *LbpPointer;
+  VOID                *LbpOffset;
+  BPDT_HEADER         *BpdtHeaderPtr;
+  BPDT_HEADER         *sBpdtHeader;
+  BPDT_ENTRY          *BpdtEntryPtr;
+  EFI_STATUS          Status;
+
+  Status = GetBootPartitionPointer (BpSel, &LbpPointer);
+  ASSERT_EFI_ERROR (Status);
+
+  BpdtHeaderPtr = (BPDT_HEADER *)LbpPointer;
+  Status = EFI_NOT_FOUND;
+  do {
+    //
+    //Reset secondary header each time to ensure proper exit.
+    //
+    sBpdtHeader = NULL;
+    BpdtEntryPtr = (BPDT_ENTRY *)((UINTN)BpdtHeaderPtr + sizeof(BPDT_HEADER));
+
+    if (BpdtHeaderPtr->Signature != BPDT_SIGN_GREEN) {
+      DEBUG ((EFI_D_INFO, "Signature of BPDT Header is invalid - Stop Parsing BP%d.\n", BpSel));
+      break;
+    }
+    for (index=0; index < BpdtHeaderPtr->DscCount; index++, BpdtEntryPtr++) {
+      if (BpdtEntryPtr->LbpOffset == 0) {
+        DEBUG ((EFI_D_INFO, "Skipping Stub-entry for Bpdt type: 0x%x \n", BpdtEntryPtr->Type));
+        continue;
+      }
+      LbpOffset = (VOID *)((UINTN)LbpPointer + BpdtEntryPtr->LbpOffset);
+
+      if (BpdtEntryPtr->Type == BpdtSbpdt) {
+        sBpdtHeader = (BPDT_HEADER *)LbpOffset;
+        continue;
+      }
+      if (BpdtEntryPtr->Type == BpdtObb) {
+        ObbPayloadPtr->DataPtr = LbpOffset;
+        ObbPayloadPtr->Size    = BpdtEntryPtr->Size;
+        Status = EFI_SUCCESS;
+        break;
+      }
+    }
+    if (sBpdtHeader != NULL) {
+      BpdtHeaderPtr = sBpdtHeader;
+    }
+  } while (sBpdtHeader != NULL);
+
+  if (EFI_ERROR (Status)) {
+    DEBUG ((EFI_D_ERROR, "Unable to locate part of Split Obb: %r. Halting system.\n", Status));
+    CpuDeadLoop ();
+  }
+  return Status;
+}
+
+
+/**
+  Locate and return a pointer to the selected Logical Boot Partition.
+
+  For block devices, the address will be the location in memory that the BP was copied to.
+  For memory mapped device (eg SPI), the address will be the location on the device.
+
+  @param[in]     LbpSel         Which BP to locate on the boot device
+  @param[out]    Address        The address of the selected BP on the boot device
+
+  @retval        EFI_SUCCESS    The operation completed successfully.
+  @retval        other          The selected BP could not be found.
+**/
+EFI_STATUS
+EFIAPI
+GetBootPartitionPointer (
+  IN  BOOT_PARITION_SELECT  LbpSel,
+  OUT VOID                  **LbpPointer
+  )
+{
+  UINT32                    BpLinearAddr;
+  EFI_STATUS                Status;
+
+  DEBUG ((EFI_D_INFO, "CSE Boot Device is SPI.\n"));
+  Status = InternalGetBpSpi (LbpSel, &BpLinearAddr, LbpPointer);
+
+  return Status;
+}
+
+/**
+  Parse the Boot Partition Descriptor Table of the provided Logical Boot Partition.
+  Note: "payload" is the Sub-Partition pointed to by the BDPT Entry of the given type.
+
+  @param[in]    LbpPointer      Pointer to the start of the BootPartition to be parsed
+  @param[in]    EntryType       The entry type of the subparition(payload) to look for
+  @param[out]   BpdtPayloadPtr  Address of the Struct to put the results into (MUST be allocated by caller)
+
+  @retval       EFI_SUCCESS     The operation completed successfully.
+**/
+EFI_STATUS
+EFIAPI
+GetBpdtPayloadDataRaw (
+  IN  VOID                *LbpPointer,
+  IN  BPDT_ENTRY_TYPES    EntryType,
+  OUT BPDT_PAYLOAD_DATA   *BpdtPayloadPtr
+  )
+{
+  UINT8                   Index;
+  VOID                    *LbpOffset;
+  BPDT_HEADER             *BpdtHeaderPtr;
+  BPDT_HEADER             *sBpdtHeader;
+  BPDT_ENTRY              *BpdtEntryPtr;
+
+
+  BpdtHeaderPtr = (BPDT_HEADER *)LbpPointer;
+  do {
+  	//
+    //Reset secondary header each time to ensure proper exit.
+    //
+    sBpdtHeader = NULL;
+    BpdtEntryPtr = (BPDT_ENTRY *)((UINTN)BpdtHeaderPtr + sizeof(BPDT_HEADER));
+
+    DEBUG ((DEBUG_INFO, "BpdtHeaderPtr->Signature = %x\n", BpdtHeaderPtr->Signature));
+    if ((BpdtHeaderPtr->Signature != BPDT_SIGN_GREEN) && (BpdtHeaderPtr->Signature != BPDT_SIGN_YELLOW)) {
+      DEBUG ((EFI_D_ERROR, "Signature of BPDT Header is invalid - Stop Parsing RawBP.\n"));
+      return EFI_NOT_FOUND;
+    }
+    for (Index=0; Index < BpdtHeaderPtr->DscCount; Index++, BpdtEntryPtr++) {
+      if (BpdtEntryPtr->LbpOffset == 0) {
+        DEBUG ((EFI_D_INFO, "Skipping Stub-entry for Bpdt type: %d\n", BpdtEntryPtr->Type));
+        continue;
+      }
+      LbpOffset = (VOID *)((UINTN)LbpPointer + BpdtEntryPtr->LbpOffset);
+
+      if (BpdtEntryPtr->Type == BpdtSbpdt) {
+        sBpdtHeader = (BPDT_HEADER *)LbpOffset;
+      }
+      if (BpdtEntryPtr->Type == EntryType) {
+        DEBUG ((EFI_D_INFO, "Found BPDT Entry. Type: %d, Addr: 0x%x\n", BpdtEntryPtr->Type, LbpOffset));
+        BpdtPayloadPtr->DataPtr = LbpOffset;
+        BpdtPayloadPtr->Size = BpdtEntryPtr->Size;
+        return EFI_SUCCESS;
+      }
+    }
+    if (sBpdtHeader != NULL) {
+      BpdtHeaderPtr = sBpdtHeader;
+    }
+  } while (sBpdtHeader != NULL);
+
+  BpdtPayloadPtr->DataPtr = NULL;
+  BpdtPayloadPtr->Size = 0;
+  return EFI_NOT_FOUND;
+}
+
+/**
+  Parse the Boot Partition Descriptor Table on the selected Logical Boot Partition.
+  Takes the BP as input since some BPDT entry types can exist in both locations.
+  Note: "payload" is the Sub-Partition pointed to by the BDPT Entry of the given type.
+
+  @param[in]     LbpSel         Which BP to locate on the boot device
+  @param[in]    EntryType       The entry type of the subparition(payload) to look for
+  @param[out]   BpdtPayloadPtr  Pointer to a Struct (in a HOB) containing the Size and Absolute address
+                                in memory(or spi) of the BPDT payload(subpart) of EntryType.
+                                If the caller shadows the Payload for performance, it should update this value
+
+  @retval       EFI_SUCCESS     The operation completed successfully.
+**/
+EFI_STATUS
+EFIAPI
+GetBpdtPayloadData (
+  IN  BOOT_PARITION_SELECT  BpSel,
+  IN  BPDT_ENTRY_TYPES      EntryType,
+  OUT BPDT_PAYLOAD_DATA     **BpdtPayloadPtr
+  )
+{
+  UINT8                 Index;
+  VOID                  *LbpOffset;
+  VOID                  *LbpBuffer = NULL;
+  VOID                  *CombinedObb;
+  BPDT_PAYLOAD_DATA     *BpdtPayloadList = NULL;
+  BPDT_PAYLOAD_DATA     *AdditionalPayloadList = NULL;
+  BPDT_PAYLOAD_DATA     AdditionalObbInfo;
+  BPDT_PAYLOAD_DATA     *ObbInfoPart1Ptr;
+  BPDT_PAYLOAD_DATA     *ObbInfoPart2Ptr;
+  BPDT_HEADER           *BpdtHeaderPtr;
+  BPDT_HEADER           *sBpdtHeader;
+  BPDT_ENTRY            *BpdtEntryPtr;
+  BPDT_ENTRY            *ObbEntryPtr = NULL;
+  EFI_HOB_GUID_TYPE     *GuidHobPtr;
+  EFI_STATUS            Status;
+  EFI_GUID              CurrentBpdtDataGuid;
+  EFI_GUID              AdditionalDataGuid;
+  BOOT_PARITION_SELECT  AdditionalObbBp;
+
+  //
+  // Set the data guid's to the correct HOB's based on the selected BP.
+  // If Current contains Split OBB, then Additional needs to be the BP with the other SplitObb.
+  //
+  switch (BpSel) {
+    case BootPart1:
+      CurrentBpdtDataGuid = gEfiBpdtLibBp1DataGuid;
+      AdditionalDataGuid  = gEfiBpdtLibBp2DataGuid;
+      AdditionalObbBp     = BootPart2;
+      break;
+    case BootPart2:
+      CurrentBpdtDataGuid = gEfiBpdtLibBp2DataGuid;
+      AdditionalDataGuid  = gEfiBpdtLibBp1DataGuid;
+      AdditionalObbBp     = BootPart1;
+      break;
+    default:
+      DEBUG ((EFI_D_ERROR, "Invalid BootPartion parameter: %d\n", BpSel));
+      return EFI_NOT_FOUND;
+      break;
+  }
+
+  *BpdtPayloadPtr = NULL;
+  GuidHobPtr = GetFirstGuidHob (&CurrentBpdtDataGuid);
+  if (GuidHobPtr != NULL) {
+    DEBUG ((EFI_D_INFO, "BPDT %d already parsed. Getting Payload info from HOB\n", BpSel+1));
+    BpdtPayloadList = GET_GUID_HOB_DATA (GuidHobPtr);
+    *BpdtPayloadPtr = &BpdtPayloadList[EntryType];
+    if (*BpdtPayloadPtr == NULL) {
+      DEBUG ((EFI_D_WARN, "Requested Payload info in NULL: %d\n", EntryType));
+      return EFI_NOT_FOUND;
+    } else {
+      return EFI_SUCCESS;
+    }
+  }
+
+  //
+  //Must use ZeroPool here to ensure correct error handling of missing entries.
+  //
+  BpdtPayloadList = AllocateZeroPool (BPDT_HOB_DATA_SIZE);
+  if (BpdtPayloadList == NULL) {
+    ASSERT (BpdtPayloadList != NULL);
+    return EFI_OUT_OF_RESOURCES;
+  }
+
+  Status = GetBootPartitionPointer (BpSel, &LbpBuffer);
+  ASSERT_EFI_ERROR (Status);
+
+  //
+  // Parse the BPDT and store the Entry offsets into the array.
+  //
+  BpdtHeaderPtr = (BPDT_HEADER *)LbpBuffer;
+  do {
+  	//
+    //reset secondary header each time to ensure proper exit.
+    //
+    sBpdtHeader = NULL;
+    BpdtEntryPtr = (BPDT_ENTRY *)((UINTN)BpdtHeaderPtr + sizeof(BPDT_HEADER));
+
+    if (BpdtHeaderPtr->Signature != BPDT_SIGN_GREEN) {
+      DEBUG ((EFI_D_ERROR, "Signature of BPDT Header is invalid - Stop Parsing BP%d.\n", BpSel+1));
+      return EFI_NOT_FOUND;
+    }
+    for (Index=0; Index < BpdtHeaderPtr->DscCount; Index++, BpdtEntryPtr++) {
+      if (BpdtEntryPtr->LbpOffset == 0) {
+        DEBUG ((EFI_D_INFO, "Skipping Stub-entry for Bpdt type: %d\n", BpdtEntryPtr->Type));
+        continue;
+      }
+      LbpOffset = (VOID *)((UINTN)LbpBuffer + BpdtEntryPtr->LbpOffset);
+
+      if (BpdtEntryPtr->Type == BpdtSbpdt) {
+        sBpdtHeader = (BPDT_HEADER *)LbpOffset;
+      }
+      if (BpdtEntryPtr->Type < BpdtMaxType) {
+        DEBUG ((EFI_D_INFO, "Saving Info of BPDT Entry. Type: %d, Addr: 0x%x\n", BpdtEntryPtr->Type, LbpOffset));
+        BpdtPayloadList[BpdtEntryPtr->Type].DataPtr = LbpOffset;
+        BpdtPayloadList[BpdtEntryPtr->Type].Size = BpdtEntryPtr->Size;
+      }
+      if (BpdtEntryPtr->Type == BpdtObb) {
+        ObbEntryPtr = BpdtEntryPtr;
+      }
+    }
+    if (sBpdtHeader != NULL) {
+      BpdtHeaderPtr = sBpdtHeader;
+    }
+  } while (sBpdtHeader != NULL);
+
+
+  //
+  // If the additional data HOB contains the address of Obb, then the special cases for
+  // Obb were already handled by a previous call to this function (no need to recombine =).
+  //
+  GuidHobPtr = GetFirstGuidHob (&AdditionalDataGuid);
+  if (GuidHobPtr != NULL) {
+    AdditionalPayloadList = GET_GUID_HOB_DATA (GuidHobPtr);
+  }
+  if (AdditionalPayloadList != NULL && AdditionalPayloadList[BpdtObb].DataPtr != NULL) {
+    //
+    // using copymem will auto scale if the struct defintion changes.
+    //
+    CopyMem (&BpdtPayloadList[BpdtObb], &AdditionalPayloadList[BpdtObb], sizeof (BPDT_PAYLOAD_DATA));
+  } else {
+    //
+    // Check for Payload overlap with non-MMIO SPI region.
+    //
+    InternalCheckAndJoinUpperSpi (BpSel, &BpdtPayloadList[BpdtObb]);
+
+    //
+    // look for and handle the Split OBB case.
+    //
+    if (ObbEntryPtr != NULL && (ObbEntryPtr->Flags & SPLIT_ENTRY_FLAGS)) {
+
+      DEBUG ((EFI_D_INFO, "Attempting to resolve Split Obb..\n"));
+      InternalLocateSplitObb (AdditionalObbBp, &AdditionalObbInfo);
+      
+      //
+      // Since each Obb part could be on either BP, then we also need to check
+      // it for overlap into the non-MMIO accessible SPI region.
+      //
+      InternalCheckAndJoinUpperSpi (AdditionalObbBp, &AdditionalObbInfo);
+
+      if (ObbEntryPtr->Flags & SPLIT_ENTRY_PART_1) {
+        ObbInfoPart1Ptr = &BpdtPayloadList[BpdtObb];
+        ObbInfoPart2Ptr = &AdditionalObbInfo;
+      } else {
+        ObbInfoPart1Ptr = &AdditionalObbInfo;
+        ObbInfoPart2Ptr = &BpdtPayloadList[BpdtObb];
+      }
+      
+      //
+      // Combine the final parts together and set the output address to the result.
+      //
+      CombinedObb = AllocatePages (EFI_SIZE_TO_PAGES ((UINTN)ObbInfoPart1Ptr->Size + ObbInfoPart2Ptr->Size));
+      CopyMem (CombinedObb, ObbInfoPart1Ptr->DataPtr, ObbInfoPart1Ptr->Size);
+      CopyMem ((VOID *)((UINTN)CombinedObb+ObbInfoPart1Ptr->Size), ObbInfoPart2Ptr->DataPtr, ObbInfoPart2Ptr->Size);
+      BpdtPayloadList[BpdtObb].DataPtr = CombinedObb;
+      BpdtPayloadList[BpdtObb].Size = ObbInfoPart1Ptr->Size + ObbInfoPart2Ptr->Size;
+    }
+  }
+
+  //
+  // Build HOB for BPDT data.
+  // Need to use a HOB (or local PPI) instead of a module global since the library will be called in PreMem,
+  // and PreMem globals will not work if executing in place (ie SPI boot with no code in CAR).
+  //
+  GuidHobPtr = BuildGuidDataHob (
+    &gEfiBpdtLibBp2DataGuid,
+    BpdtPayloadList,
+    BPDT_HOB_DATA_SIZE
+  );
+  *BpdtPayloadPtr = &BpdtPayloadList[EntryType];
+  FreePool(BpdtPayloadList);
+
+  if (GuidHobPtr == NULL || *BpdtPayloadPtr == NULL) {
+   DEBUG ((EFI_D_ERROR, "Unable to create BPDT HOB.\n"));
+   return EFI_NOT_FOUND;
+  }
+  return EFI_SUCCESS;
+}
+
+
+/**
+  Search the Subpartition pointed to by BpdtPayloadPtr for a Directory entry with "EntryName",
+  then fill in the Struct pointed to by SubPartPayloadPtr with the Addres and Size of the Dir Entry.
+  Note: "payload" is the Data pointed to by the Directory Entry with the given name.
+
+  @param[in]   BpdtPayloadPtr     Location and Size of the Payload to search
+  @param[in]   EntryName          the String name of the Directory entry to look for
+  @param[out]  SubPartPayloadPtr  Address of the Struct to put the results into (MUST be allocated by caller)
+
+  @retval      EFI_SUCCESS        The operation completed successfully.
+**/
+EFI_STATUS
+EFIAPI
+GetSubPartitionPayloadData (
+  IN  BPDT_PAYLOAD_DATA     *BpdtPayloadPtr,
+  IN  CONST CHAR8           *EntryName,
+  OUT BPDT_PAYLOAD_DATA     *SubPartPayloadPtr
+  )
+{
+  UINT8                   Index;
+  CHAR8                   SearchName[DIR_ENTRY_NAME_SIZE];
+  UINTN                   SearchNameSize;
+  SUBPART_DIR_HEADER      *DirectoryHeader;
+  SUBPART_DIR_ENTRY       *DirectoryEntry;
+
+  //
+  // Pad Name with zeros (per spec) to ensure correct match.
+  //
+  ZeroMem(SearchName, DIR_ENTRY_NAME_SIZE);
+  
+  //
+  // Safely handle the input string to ensure we dont copy garbage when EntryName is less than 12.
+  //
+  SearchNameSize = AsciiStrnLenS (EntryName, DIR_ENTRY_NAME_SIZE);
+  CopyMem(SearchName, EntryName, SearchNameSize);
+
+  DEBUG ((EFI_D_INFO, "Looking for Directory Entry with Name: %a\n", SearchName));
+  DirectoryHeader = (SUBPART_DIR_HEADER *)BpdtPayloadPtr->DataPtr;
+  DirectoryEntry = (SUBPART_DIR_ENTRY *)((UINTN)DirectoryHeader + sizeof(SUBPART_DIR_HEADER));
+
+  if (DirectoryHeader->HeaderMarker != DIR_HDR_SIGNATURE) {
+    DEBUG ((EFI_D_ERROR, "Directory Header is invalid - return Not_Found.\n"));
+    return EFI_NOT_FOUND;
+  }
+  
+  for (Index = 0; Index < DirectoryHeader->NumOfEntries; Index++, DirectoryEntry++) {
+    DEBUG ((EFI_D_INFO, " %a Entry is located at %x\n",
+      DirectoryEntry->EntryName, (UINTN)DirectoryHeader+DirectoryEntry->EntryOffset));
+    if (!CompareMem(DirectoryEntry->EntryName, SearchName, DIR_ENTRY_NAME_SIZE)) {
+      SubPartPayloadPtr->DataPtr = (VOID *)((UINTN)DirectoryHeader + DirectoryEntry->EntryOffset);
+      SubPartPayloadPtr->Size = DirectoryEntry->EntrySize;
+      return EFI_SUCCESS;
+    }
+  }
+
+  DEBUG ((EFI_D_WARN, "Entry not found.\n"));
+  return EFI_NOT_FOUND;
+}
+
+
+/**
+  This is a wrapper function for using VerifyHashBpm that will only
+  check the hash for the payloads used during normal boot.
+
+  If you want to check other payloads (ie during recovery flow), then the
+  calling code should locate and pass in the payload directly to VerifyHashBpm().
+
+  @param[in]  PayloadSel   Which hash in BPM to compare with.
+
+  @retval     EFI_SUCCESS  The function completed successfully and the Hash matched.
+  @retval     other        An error occured when locating and computing the Hash.
+**/
+EFI_STATUS
+EFIAPI
+LocateAndVerifyHashBpm (
+  IN  BPM_HASH_SELECT    PayloadSel
+  )
+{
+
+  UINT8                  Index;
+  EFI_STATUS             Status;
+  VOID                   *HashDataPtr;
+  UINT32                 HashDataSize;
+  UINT32                 FvTailAddr;
+  BPM_DATA_FILE          *BpmPtr;
+  BPDT_PAYLOAD_DATA      *IbbPayloadPtr;
+  BPDT_PAYLOAD_DATA      *ObbPayloadPtr;
+  BPDT_PAYLOAD_DATA      SubPartPayload;
+  SUBPART_DIR_HEADER     *DirectoryHeader;
+  SUBPART_DIR_ENTRY      *DirectoryEntry;
+
+  DEBUG ((EFI_D_INFO, "Searching IBB for BPM..\n" ));
+  GetBpdtPayloadData (BootPart1, BpdtIbb, &IbbPayloadPtr);
+  if (IbbPayloadPtr == NULL) {
+    return EFI_NOT_FOUND;
+  }
+  Status = GetSubPartitionPayloadData (IbbPayloadPtr, "BPM.met", &SubPartPayload);
+  if (EFI_ERROR (Status)) {
+    return Status;
+  }
+  BpmPtr = (BPM_DATA_FILE *)SubPartPayload.DataPtr;
+
+  switch (PayloadSel) {
+    case HashIbbl:
+      Status = GetSubPartitionPayloadData (IbbPayloadPtr, "IBBL", &SubPartPayload);
+      HashDataPtr  = SubPartPayload.DataPtr;
+      HashDataSize = SubPartPayload.Size;
+      break;
+
+    case HashIbbm:
+      Status = GetSubPartitionPayloadData (IbbPayloadPtr, "IBB", &SubPartPayload);
+      HashDataPtr  = SubPartPayload.DataPtr;
+      HashDataSize = SubPartPayload.Size;
+      break;
+
+    case HashObb:
+      Status = GetBpdtPayloadData (BootPart2, BpdtObb, &ObbPayloadPtr);
+      if (ObbPayloadPtr == NULL) {
+        return EFI_NOT_FOUND;
+      }
+      DirectoryHeader = (SUBPART_DIR_HEADER *)ObbPayloadPtr->DataPtr;
+      DirectoryEntry = (SUBPART_DIR_ENTRY *)((UINTN)DirectoryHeader + sizeof(SUBPART_DIR_HEADER));
+      HashDataPtr = (VOID *)((UINTN)DirectoryHeader + DirectoryEntry->EntryOffset);
+
+      for (Index = 1; Index < DirectoryHeader->NumOfEntries; Index++) {
+        DirectoryEntry++;
+      }
+
+      FvTailAddr = (UINT32)DirectoryHeader + DirectoryEntry->EntryOffset + DirectoryEntry->EntrySize;
+      HashDataSize = FvTailAddr - (UINT32)HashDataPtr;
+      break;
+
+    default:
+
+      return EFI_INVALID_PARAMETER;
+      break;
+  }
+  if (EFI_ERROR (Status)) {
+    return Status;
+  }
+
+  Status = VerifyHashBpm(PayloadSel, BpmPtr, HashDataPtr, HashDataSize);
+  return Status;
+}
+
+
+
+/**
+  Computes the Hash of a given data block and compares to the one in the Boot Policy Metadata.
+
+  @param[in]  PayloadSel   Which hash in BPM to compare with.
+  @param[in]  PayloadPtr   Pointer to the begining of the data to be hashed.
+  @param[in]  DataSize     Size of the data to be hashed.
+  @param[in]  BpmPtr       Pointer to the BPM structure.
+
+  @retval EFI_SUCCESS             If the function completed successfully.
+  @retval EFI_ABORTED             If the attempt to compute the hash fails.
+  @retval EFI_INVALID_PARAMETER   If the hash type or size in BPM is unsupported.
+  @retval EFI_SECURITY_VIOLATION  If the has does not match the one in BPM.
+**/
+EFI_STATUS
+EFIAPI
+VerifyHashBpm (
+  IN BPM_HASH_SELECT   PayloadSel,
+  IN BPM_DATA_FILE     *BpmPtr,
+  IN VOID              *PayloadPtr,
+  IN UINT32            DataSize
+  )
+{
+  UINT8                Index;
+  UINT32               BpmHashAlgo;
+  UINT32               BpmHashSize;
+  UINT8                *BpmHash;
+  UINTN                ContextSize;
+  VOID                 *HashContext;
+  BOOLEAN              HashResult;
+  UINT8                Digest[SHA256_DIGEST_SIZE];
+
+
+  ZeroMem (Digest, SHA256_DIGEST_SIZE);
+  ContextSize = Sha256GetContextSize ();
+  HashContext = AllocatePool (ContextSize);
+
+  DEBUG((EFI_D_INFO, "VerifyFV: PayloadPtr = %x, DataSize = %x\n", PayloadPtr, DataSize));
+
+  switch (PayloadSel) {
+    case HashIbbl:
+      BpmHashAlgo = BpmPtr->IbblHashAlgo;
+      BpmHashSize = BpmPtr->IbblHashSize;
+      BpmHash     = BpmPtr->IbblHash;
+      break;
+
+    case HashIbbm:
+      BpmHashAlgo = BpmPtr->IbbmHashAlgo;
+      BpmHashSize = BpmPtr->IbbmHashSize;
+      BpmHash     = BpmPtr->IbbmHash;
+      break;
+
+    case HashObb:
+    default:
+      BpmHashAlgo = BpmPtr->ObbHashAlgo;
+      BpmHashSize = BpmPtr->ObbHashSize;
+      BpmHash     = BpmPtr->ObbHash;
+      break;
+  }
+  
+  if (BpmHashAlgo != 2 || BpmHashSize != SHA256_DIGEST_SIZE) {
+    DEBUG((EFI_D_ERROR, "Hash length NOT correct for SHA256.\n"));
+    return EFI_INVALID_PARAMETER;
+  }
+  
+  //
+  //If hash entry in BPM is empty (all 0s), skip the OBB verification.
+  //
+  if (!CompareMem(BpmHash, Digest, SHA256_DIGEST_SIZE)) {
+    return EFI_SUCCESS;
+  }
+
+  DEBUG((EFI_D_INFO, "BPM Info:\n" ));
+  DEBUG((EFI_D_INFO, " Payload = %d, HashAlgo = %d, HashSize = %d\n", PayloadSel, BpmHashAlgo, BpmHashSize));
+  DEBUG((EFI_D_INFO, " Hash ="));
+  for (Index = 0; Index < BpmHashSize; Index++) {
+    DEBUG((EFI_D_INFO, " %02x", BpmHash[Index]));
+  }
+  DEBUG((EFI_D_INFO, "\n"));
+
+  HashResult = Sha256Init (HashContext);
+  if (!HashResult) {
+    DEBUG((EFI_D_ERROR, "Sha256Init Failed!\n"));
+    return EFI_ABORTED;
+  }
+  HashResult = Sha256Update (HashContext, PayloadPtr, DataSize);
+  if (!HashResult) {
+    DEBUG((EFI_D_ERROR, "Sha256Update Failed!\n"));
+    return EFI_ABORTED;
+  }
+  HashResult = Sha256Final (HashContext, Digest);
+  if (!HashResult) {
+    DEBUG((EFI_D_ERROR, "Sha256Final Failed!\n"));
+    return EFI_ABORTED;
+  }
+
+  DEBUG((EFI_D_INFO, " Hash ="));
+  for (Index = 0; Index < BpmHashSize; Index ++) {
+    DEBUG((EFI_D_INFO, " %02x", Digest[Index]));
+  }
+  DEBUG((EFI_D_INFO, "\n"));
+
+  if (CompareMem(BpmHash, Digest, BpmHashSize)) {
+    DEBUG((EFI_D_ERROR, "\nHash Mis-Match. Return Security Violation\n"));
+    return EFI_SECURITY_VIOLATION;
+  }
+
+  return EFI_SUCCESS;
+}
diff --git a/Silicon/BroxtonSoC/BroxtonSiPkg/Library/BpdtLib/BpdtLib.inf b/Silicon/BroxtonSoC/BroxtonSiPkg/Library/BpdtLib/BpdtLib.inf
new file mode 100644
index 000000000..c07ecb05c
--- /dev/null
+++ b/Silicon/BroxtonSoC/BroxtonSiPkg/Library/BpdtLib/BpdtLib.inf
@@ -0,0 +1,49 @@
+## @file
+#  Boot Partition Descriptor Table library.
+#
+#  Copyright (c) 2016 - 2017, Intel Corporation. All rights reserved.<BR>
+#
+#  This program and the accompanying materials
+#  are licensed and made available under the terms and conditions of the BSD License
+#  which accompanies this distribution. The full text of the license may be found at
+#  http://opensource.org/licenses/bsd-license.php.
+#
+#  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+#  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+#
+##
+
+[Defines]
+  INF_VERSION          = 0x00010005
+  BASE_NAME            = BpdtLib
+  FILE_GUID            = ec12d034-0ab8-4e9c-87f9-01a2d284ea6c
+  MODULE_TYPE          = PEIM
+  VERSION_STRING       = 1.0
+  LIBRARY_CLASS        = BpdtLib
+
+[Sources]
+  BpdtLib.c
+
+[Packages]
+  MdePkg/MdePkg.dec
+  CryptoPkg/CryptoPkg.dec
+  BroxtonSiPkg/BroxtonSiPkg.dec
+
+[LibraryClasses]
+  BaseLib
+  DebugLib
+  HobLib
+  BaseMemoryLib
+  MemoryAllocationLib
+  PeiServicesTablePointerLib
+  ScPlatformLib
+  PeiSpiInitLib
+  BaseCryptLib
+
+[Guids]
+  gEfiBpdtLibBp1DataGuid
+  gEfiBpdtLibBp2DataGuid
+
+[Ppis]
+  gScSpiPpiGuid
+  gEfiPeiVirtualBlockIoPpiGuid
-- 
2.11.0.windows.1



             reply	other threads:[~2017-03-10  8:06 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-03-10  8:05 zwei4 [this message]
2017-03-10  8:05 ` [Patch][edk2-platforms/devel-MinnowBoard3 2/2] Add PEI SPI library zwei4

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170310080513.4660-1-david.wei@intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox