CMakeLists.txt 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146
  1. set(srcs
  2. "src/bootloader_common.c"
  3. "src/bootloader_common_loader.c"
  4. "src/bootloader_clock_init.c"
  5. "src/bootloader_flash.c"
  6. "src/bootloader_mem.c"
  7. "src/bootloader_random.c"
  8. "src/bootloader_random_${IDF_TARGET}.c"
  9. "src/bootloader_utility.c"
  10. "src/esp_image_format.c"
  11. "src/flash_encrypt.c"
  12. "src/secure_boot.c"
  13. "src/flash_partitions.c"
  14. "src/flash_qio_mode.c"
  15. "src/bootloader_flash_config_${IDF_TARGET}.c"
  16. "src/bootloader_efuse_${IDF_TARGET}.c"
  17. )
  18. if(BOOTLOADER_BUILD)
  19. set(include_dirs "include" "include_bootloader")
  20. set(priv_requires micro-ecc spi_flash efuse)
  21. list(APPEND srcs
  22. "src/bootloader_init.c"
  23. "src/bootloader_clock_loader.c"
  24. "src/bootloader_console.c"
  25. "src/bootloader_console_loader.c"
  26. "src/bootloader_panic.c"
  27. "src/${IDF_TARGET}/bootloader_sha.c"
  28. "src/${IDF_TARGET}/bootloader_soc.c"
  29. "src/${IDF_TARGET}/bootloader_${IDF_TARGET}.c"
  30. )
  31. list(APPEND priv_requires hal)
  32. else()
  33. list(APPEND srcs
  34. "src/idf/bootloader_sha.c")
  35. set(include_dirs "include")
  36. set(priv_include_dirs "include_bootloader")
  37. # heap is required for `heap_memory_layout.h` header
  38. set(priv_requires spi_flash mbedtls efuse app_update heap)
  39. endif()
  40. if(BOOTLOADER_BUILD)
  41. if(CONFIG_SECURE_FLASH_ENC_ENABLED)
  42. list(APPEND srcs "src/flash_encryption/flash_encrypt.c"
  43. "src/${IDF_TARGET}/flash_encryption_secure_features.c")
  44. endif()
  45. if(CONFIG_SECURE_SIGNED_ON_BOOT)
  46. if(CONFIG_SECURE_SIGNED_APPS_ECDSA_SCHEME)
  47. list(APPEND srcs "src/secure_boot_v1/secure_boot_signatures_bootloader.c")
  48. endif()
  49. if(CONFIG_SECURE_BOOT_V1_ENABLED)
  50. list(APPEND srcs "src/secure_boot_v1/secure_boot.c"
  51. "src/${IDF_TARGET}/secure_boot_secure_features.c")
  52. endif()
  53. if(CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME)
  54. list(APPEND srcs "src/secure_boot_v2/secure_boot_signatures_bootloader.c")
  55. endif()
  56. if(CONFIG_SECURE_BOOT_V2_ENABLED)
  57. list(APPEND srcs "src/secure_boot_v2/secure_boot.c"
  58. "src/${IDF_TARGET}/secure_boot_secure_features.c")
  59. endif()
  60. endif()
  61. else()
  62. if(CONFIG_SECURE_SIGNED_ON_UPDATE)
  63. if(CONFIG_SECURE_SIGNED_APPS_ECDSA_SCHEME)
  64. list(APPEND srcs "src/secure_boot_v1/secure_boot_signatures_app.c")
  65. endif()
  66. if(CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME)
  67. list(APPEND srcs "src/secure_boot_v2/secure_boot_signatures_app.c")
  68. endif()
  69. endif()
  70. endif()
  71. set(requires soc) #unfortunately the header directly uses SOC registers
  72. idf_component_register(SRCS "${srcs}"
  73. INCLUDE_DIRS "${include_dirs}"
  74. PRIV_INCLUDE_DIRS "${priv_include_dirs}"
  75. REQUIRES "${requires}"
  76. PRIV_REQUIRES "${priv_requires}")
  77. if(CONFIG_SECURE_SIGNED_APPS AND (CONFIG_SECURE_BOOT_V1_ENABLED OR CONFIG_SECURE_SIGNED_APPS_ECDSA_SCHEME))
  78. if(BOOTLOADER_BUILD)
  79. # Whether CONFIG_SECURE_BOOT_BUILD_SIGNED_BINARIES or not, we need verification key to embed
  80. # in the library.
  81. if(CONFIG_SECURE_BOOT_BUILD_SIGNED_BINARIES)
  82. # We generate the key from the signing key. The signing key is passed from the main project.
  83. get_filename_component(secure_boot_signing_key
  84. "${SECURE_BOOT_SIGNING_KEY}"
  85. ABSOLUTE BASE_DIR "${project_dir}")
  86. get_filename_component(secure_boot_verification_key
  87. "signature_verification_key.bin"
  88. ABSOLUTE BASE_DIR "${CMAKE_CURRENT_BINARY_DIR}")
  89. add_custom_command(OUTPUT "${secure_boot_verification_key}"
  90. COMMAND ${ESPSECUREPY}
  91. extract_public_key --keyfile "${secure_boot_signing_key}"
  92. "${secure_boot_verification_key}"
  93. DEPENDS ${secure_boot_signing_key}
  94. VERBATIM)
  95. else()
  96. # We expect to 'inherit' the verification key passed from main project.
  97. get_filename_component(secure_boot_verification_key
  98. ${SECURE_BOOT_VERIFICATION_KEY}
  99. ABSOLUTE BASE_DIR "${project_dir}")
  100. endif()
  101. else() # normal app build
  102. idf_build_get_property(project_dir PROJECT_DIR)
  103. if(CONFIG_SECURE_BOOT_VERIFICATION_KEY)
  104. # verification-only build supplies verification key
  105. set(secure_boot_verification_key ${CONFIG_SECURE_BOOT_VERIFICATION_KEY})
  106. get_filename_component(secure_boot_verification_key
  107. ${secure_boot_verification_key}
  108. ABSOLUTE BASE_DIR "${project_dir}")
  109. else()
  110. # sign at build time, extracts key from signing key
  111. set(secure_boot_verification_key "${CMAKE_BINARY_DIR}/signature_verification_key.bin")
  112. get_filename_component(secure_boot_signing_key
  113. ${CONFIG_SECURE_BOOT_SIGNING_KEY}
  114. ABSOLUTE BASE_DIR "${project_dir}")
  115. add_custom_command(OUTPUT "${secure_boot_verification_key}"
  116. COMMAND ${ESPSECUREPY}
  117. extract_public_key --keyfile "${secure_boot_signing_key}"
  118. "${secure_boot_verification_key}"
  119. WORKING_DIRECTORY ${project_dir}
  120. DEPENDS ${secure_boot_signing_key}
  121. VERBATIM)
  122. endif()
  123. endif()
  124. # Embed the verification key in the binary (app & bootloader)
  125. #
  126. target_add_binary_data(${COMPONENT_LIB} "${secure_boot_verification_key}" "BINARY"
  127. RENAME_TO signature_verification_key_bin)
  128. set_property(DIRECTORY "${CMAKE_CURRENT_SOURCE_DIR}"
  129. APPEND PROPERTY ADDITIONAL_MAKE_CLEAN_FILES
  130. "${secure_boot_verification_key}")
  131. endif()
  132. if(BOOTLOADER_BUILD)
  133. target_link_libraries(${COMPONENT_LIB} INTERFACE "-u abort")
  134. endif()