CMakeLists.txt 9.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221
  1. cmake_minimum_required(VERSION 3.5)
  2. if(NOT SDKCONFIG)
  3. message(FATAL_ERROR "Bootloader subproject expects the SDKCONFIG variable to be passed "
  4. "in by the parent build process.")
  5. endif()
  6. if(NOT IDF_PATH)
  7. message(FATAL_ERROR "Bootloader subproject expects the IDF_PATH variable to be passed "
  8. "in by the parent build process.")
  9. endif()
  10. if(NOT IDF_TARGET)
  11. message(FATAL_ERROR "Bootloader subproject expects the IDF_TARGET variable to be passed "
  12. "in by the parent build process.")
  13. endif()
  14. set(COMPONENTS
  15. bootloader
  16. esptool_py
  17. esp_hw_support
  18. hal
  19. partition_table
  20. soc
  21. bootloader_support
  22. log
  23. spi_flash
  24. micro-ecc
  25. main
  26. efuse
  27. esp_system
  28. newlib)
  29. set(BOOTLOADER_BUILD 1)
  30. include("${IDF_PATH}/tools/cmake/project.cmake")
  31. set(common_req log esp_rom esp_common esp_hw_support hal newlib)
  32. if(LEGACY_INCLUDE_COMMON_HEADERS)
  33. list(APPEND common_req soc hal)
  34. endif()
  35. idf_build_set_property(__COMPONENT_REQUIRES_COMMON "${common_req}")
  36. idf_build_set_property(__OUTPUT_SDKCONFIG 0)
  37. project(bootloader)
  38. idf_build_set_property(COMPILE_DEFINITIONS "-DBOOTLOADER_BUILD=1" APPEND)
  39. idf_build_set_property(COMPILE_OPTIONS "-fno-stack-protector" APPEND)
  40. idf_component_get_property(main_args esptool_py FLASH_ARGS)
  41. idf_component_get_property(sub_args esptool_py FLASH_SUB_ARGS)
  42. # String for printing flash command
  43. string(REPLACE ";" " " esptoolpy_write_flash
  44. "${ESPTOOLPY} --port=(PORT) --baud=(BAUD) ${main_args} "
  45. "write_flash ${sub_args}")
  46. string(REPLACE ";" " " espsecurepy "${ESPSECUREPY}")
  47. string(REPLACE ";" " " espefusepy "${ESPEFUSEPY}")
  48. # Suppress warning: "Manually-specified variables were not used by the project: SECURE_BOOT_SIGNING_KEY"
  49. set(ignore_signing_key "${SECURE_BOOT_SIGNING_KEY}")
  50. if(CONFIG_SECURE_BOOTLOADER_REFLASHABLE)
  51. if(CONFIG_SECURE_BOOTLOADER_KEY_ENCODING_192BIT)
  52. set(key_digest_len 192)
  53. else()
  54. set(key_digest_len 256)
  55. endif()
  56. get_filename_component(bootloader_digest_bin
  57. "bootloader-reflash-digest.bin"
  58. ABSOLUTE BASE_DIR "${CMAKE_BINARY_DIR}")
  59. get_filename_component(secure_bootloader_key
  60. "secure-bootloader-key-${key_digest_len}.bin"
  61. ABSOLUTE BASE_DIR "${CMAKE_BINARY_DIR}")
  62. add_custom_command(OUTPUT "${secure_bootloader_key}"
  63. COMMAND ${ESPSECUREPY} digest_private_key
  64. --keylen "${key_digest_len}"
  65. --keyfile "${SECURE_BOOT_SIGNING_KEY}"
  66. "${secure_bootloader_key}"
  67. VERBATIM)
  68. if(CONFIG_SECURE_BOOT_BUILD_SIGNED_BINARIES)
  69. add_custom_target(gen_secure_bootloader_key ALL DEPENDS "${secure_bootloader_key}")
  70. else()
  71. if(NOT EXISTS "${secure_bootloader_key}")
  72. message(FATAL_ERROR
  73. "No pre-generated key for a reflashable secure bootloader is available, "
  74. "due to signing configuration."
  75. "\nTo generate one, you can use this command:"
  76. "\n\t${espsecurepy} generate_flash_encryption_key ${secure_bootloader_key}"
  77. "\nIf a signing key is present, then instead use:"
  78. "\n\t${espsecurepy} digest_private_key "
  79. "--keylen (192/256) --keyfile KEYFILE "
  80. "${secure_bootloader_key}")
  81. endif()
  82. add_custom_target(gen_secure_bootloader_key)
  83. endif()
  84. add_custom_command(OUTPUT "${bootloader_digest_bin}"
  85. COMMAND ${CMAKE_COMMAND} -E echo "DIGEST ${bootloader_digest_bin}"
  86. COMMAND ${ESPSECUREPY} digest_secure_bootloader --keyfile "${secure_bootloader_key}"
  87. -o "${bootloader_digest_bin}" "${CMAKE_BINARY_DIR}/bootloader.bin"
  88. MAIN_DEPENDENCY "${CMAKE_BINARY_DIR}/.bin_timestamp"
  89. DEPENDS gen_secure_bootloader_key gen_project_binary
  90. VERBATIM)
  91. add_custom_target(gen_bootloader_digest_bin ALL DEPENDS "${bootloader_digest_bin}")
  92. endif()
  93. if(CONFIG_SECURE_BOOT_V2_ENABLED)
  94. if(CONFIG_SECURE_BOOT_BUILD_SIGNED_BINARIES)
  95. get_filename_component(secure_boot_signing_key
  96. "${SECURE_BOOT_SIGNING_KEY}" ABSOLUTE BASE_DIR "${project_dir}")
  97. if(NOT EXISTS "${secure_boot_signing_key}")
  98. message(FATAL_ERROR
  99. "Secure Boot Signing Key Not found."
  100. "\nGenerate the Secure Boot V2 RSA-PSS 3072 Key."
  101. "\nTo generate one, you can use this command:"
  102. "\n\t${espsecurepy} generate_signing_key --version 2 ${SECURE_BOOT_SIGNING_KEY}")
  103. endif()
  104. set(bootloader_unsigned_bin "bootloader-unsigned.bin")
  105. add_custom_command(OUTPUT ".signed_bin_timestamp"
  106. COMMAND ${CMAKE_COMMAND} -E copy "${CMAKE_BINARY_DIR}/${PROJECT_BIN}"
  107. "${CMAKE_BINARY_DIR}/${bootloader_unsigned_bin}"
  108. COMMAND ${ESPSECUREPY} sign_data --version 2 --keyfile "${secure_boot_signing_key}"
  109. -o "${CMAKE_BINARY_DIR}/${PROJECT_BIN}" "${CMAKE_BINARY_DIR}/${bootloader_unsigned_bin}"
  110. COMMAND ${CMAKE_COMMAND} -E echo "Generated signed binary image ${build_dir}/${PROJECT_BIN}"
  111. "from ${CMAKE_BINARY_DIR}/${bootloader_unsigned_bin}"
  112. COMMAND ${CMAKE_COMMAND} -E md5sum "${CMAKE_BINARY_DIR}/${PROJECT_BIN}"
  113. > "${CMAKE_BINARY_DIR}/.signed_bin_timestamp"
  114. DEPENDS "${build_dir}/.bin_timestamp"
  115. VERBATIM
  116. COMMENT "Generated the signed Bootloader")
  117. else()
  118. add_custom_command(OUTPUT ".signed_bin_timestamp"
  119. VERBATIM
  120. COMMENT "Bootloader generated but not signed")
  121. endif()
  122. add_custom_target(gen_signed_bootloader ALL DEPENDS "${build_dir}/.signed_bin_timestamp")
  123. endif()
  124. if(CONFIG_SECURE_BOOTLOADER_ONE_TIME_FLASH)
  125. add_custom_command(TARGET bootloader.elf POST_BUILD
  126. COMMAND ${CMAKE_COMMAND} -E echo
  127. "=============================================================================="
  128. COMMAND ${CMAKE_COMMAND} -E echo
  129. "Bootloader built. Secure boot enabled, so bootloader not flashed automatically."
  130. COMMAND ${CMAKE_COMMAND} -E echo
  131. "One-time flash command is:"
  132. COMMAND ${CMAKE_COMMAND} -E echo
  133. "\t${esptoolpy_write_flash} ${BOOTLOADER_OFFSET} ${CMAKE_BINARY_DIR}/bootloader.bin"
  134. COMMAND ${CMAKE_COMMAND} -E echo
  135. "* IMPORTANT: After first boot, BOOTLOADER CANNOT BE RE-FLASHED on same device"
  136. VERBATIM)
  137. elseif(CONFIG_SECURE_BOOTLOADER_REFLASHABLE)
  138. add_custom_command(TARGET bootloader.elf POST_BUILD
  139. COMMAND ${CMAKE_COMMAND} -E echo
  140. "=============================================================================="
  141. COMMAND ${CMAKE_COMMAND} -E echo
  142. "Bootloader built and secure digest generated."
  143. COMMAND ${CMAKE_COMMAND} -E echo
  144. "Secure boot enabled, so bootloader not flashed automatically."
  145. COMMAND ${CMAKE_COMMAND} -E echo
  146. "Burn secure boot key to efuse using:"
  147. COMMAND ${CMAKE_COMMAND} -E echo
  148. "\t${espefusepy} burn_key secure_boot_v1 ${secure_bootloader_key}"
  149. COMMAND ${CMAKE_COMMAND} -E echo
  150. "First time flash command is:"
  151. COMMAND ${CMAKE_COMMAND} -E echo
  152. "\t${esptoolpy_write_flash} ${BOOTLOADER_OFFSET} ${CMAKE_BINARY_DIR}/bootloader.bin"
  153. COMMAND ${CMAKE_COMMAND} -E echo
  154. "=============================================================================="
  155. COMMAND ${CMAKE_COMMAND} -E echo
  156. "To reflash the bootloader after initial flash:"
  157. COMMAND ${CMAKE_COMMAND} -E echo
  158. "\t${esptoolpy_write_flash} 0x0 ${bootloader_digest_bin}"
  159. COMMAND ${CMAKE_COMMAND} -E echo
  160. "=============================================================================="
  161. COMMAND ${CMAKE_COMMAND} -E echo
  162. "* After first boot, only re-flashes of this kind (with same key) will be accepted."
  163. COMMAND ${CMAKE_COMMAND} -E echo
  164. "* Not recommended to re-use the same secure boot keyfile on multiple production devices."
  165. DEPENDS gen_secure_bootloader_key gen_bootloader_digest_bin
  166. VERBATIM)
  167. elseif(CONFIG_SECURE_BOOT_V2_ENABLED AND (CONFIG_IDF_TARGET_ESP32S2 OR CONFIG_IDF_TARGET_ESP32C3))
  168. add_custom_command(TARGET bootloader.elf POST_BUILD
  169. COMMAND ${CMAKE_COMMAND} -E echo
  170. "=============================================================================="
  171. COMMAND ${CMAKE_COMMAND} -E echo
  172. "Bootloader built. Secure boot enabled, so bootloader not flashed automatically."
  173. COMMAND ${CMAKE_COMMAND} -E echo
  174. "To sign the bootloader with additional private keys."
  175. COMMAND ${CMAKE_COMMAND} -E echo
  176. "\t${espsecurepy} sign_data -k secure_boot_signing_key2.pem -v 2 \
  177. --append_signatures -o signed_bootloader.bin build/bootloader/bootloader.bin"
  178. COMMAND ${CMAKE_COMMAND} -E echo
  179. "Secure boot enabled, so bootloader not flashed automatically."
  180. COMMAND ${CMAKE_COMMAND} -E echo
  181. "\t${esptoolpy_write_flash} ${BOOTLOADER_OFFSET} ${CMAKE_BINARY_DIR}/bootloader.bin"
  182. COMMAND ${CMAKE_COMMAND} -E echo
  183. "=============================================================================="
  184. DEPENDS gen_signed_bootloader
  185. VERBATIM)
  186. elseif(CONFIG_SECURE_BOOT_V2_ENABLED)
  187. add_custom_command(TARGET bootloader.elf POST_BUILD
  188. COMMAND ${CMAKE_COMMAND} -E echo
  189. "=============================================================================="
  190. COMMAND ${CMAKE_COMMAND} -E echo
  191. "Bootloader built. Secure boot enabled, so bootloader not flashed automatically."
  192. COMMAND ${CMAKE_COMMAND} -E echo
  193. "Secure boot enabled, so bootloader not flashed automatically."
  194. COMMAND ${CMAKE_COMMAND} -E echo
  195. "\t${esptoolpy_write_flash} ${BOOTLOADER_OFFSET} ${CMAKE_BINARY_DIR}/bootloader.bin"
  196. COMMAND ${CMAKE_COMMAND} -E echo
  197. "=============================================================================="
  198. DEPENDS gen_signed_bootloader
  199. VERBATIM)
  200. endif()