2019-06-21 02:29:32 -04:00
|
|
|
set(srcs
|
|
|
|
"src/bootloader_clock.c"
|
|
|
|
"src/bootloader_common.c"
|
|
|
|
"src/bootloader_flash.c"
|
|
|
|
"src/bootloader_random.c"
|
|
|
|
"src/bootloader_utility.c"
|
|
|
|
"src/esp_image_format.c"
|
2019-01-21 09:14:56 -05:00
|
|
|
"src/flash_encrypt.c"
|
2019-06-21 02:29:32 -04:00
|
|
|
"src/flash_partitions.c"
|
|
|
|
"src/flash_qio_mode.c")
|
2018-01-11 21:49:13 -05:00
|
|
|
|
2019-05-09 22:53:08 -04:00
|
|
|
if(BOOTLOADER_BUILD)
|
2019-04-28 03:38:23 -04:00
|
|
|
set(include_dirs "include" "include_bootloader")
|
|
|
|
set(requires soc) #unfortunately the header directly uses SOC registers
|
|
|
|
set(priv_requires micro-ecc spi_flash efuse)
|
2019-06-21 02:29:32 -04:00
|
|
|
list(APPEND srcs
|
|
|
|
"src/bootloader_init.c"
|
|
|
|
"src/${IDF_TARGET}/bootloader_sha.c"
|
|
|
|
"src/${IDF_TARGET}/flash_encrypt.c"
|
|
|
|
"src/${IDF_TARGET}/secure_boot_signatures.c"
|
|
|
|
"src/${IDF_TARGET}/secure_boot.c")
|
2018-01-11 21:49:13 -05:00
|
|
|
else()
|
2019-06-21 02:29:32 -04:00
|
|
|
list(APPEND srcs
|
|
|
|
"src/idf/bootloader_sha.c"
|
|
|
|
"src/idf/secure_boot_signatures.c")
|
2019-04-28 03:38:23 -04:00
|
|
|
set(include_dirs "include")
|
|
|
|
set(priv_include_dirs "include_bootloader")
|
|
|
|
set(requires soc) #unfortunately the header directly uses SOC registers
|
|
|
|
set(priv_requires spi_flash mbedtls efuse)
|
2018-01-11 21:49:13 -05:00
|
|
|
endif()
|
|
|
|
|
2019-04-28 03:38:23 -04:00
|
|
|
idf_component_register(SRCS "${srcs}"
|
|
|
|
INCLUDE_DIRS "${include_dirs}"
|
|
|
|
PRIV_INCLUDE_DIRS "${priv_include_dirs}"
|
|
|
|
REQUIRES "${requires}"
|
2019-05-08 22:25:08 -04:00
|
|
|
PRIV_REQUIRES "${priv_requires}")
|
|
|
|
|
|
|
|
if(BOOTLOADER_BUILD AND CONFIG_SECURE_SIGNED_APPS)
|
2019-05-10 03:25:25 -04:00
|
|
|
# Whether CONFIG_SECURE_BOOT_BUILD_SIGNED_BINARIES or not, we need verification key to embed
|
|
|
|
# in the library.
|
2019-05-08 22:25:08 -04:00
|
|
|
if(CONFIG_SECURE_BOOT_BUILD_SIGNED_BINARIES)
|
2019-05-10 03:25:25 -04:00
|
|
|
# We generate the key from the signing key. The signing key is passed from the main project.
|
|
|
|
get_filename_component(secure_boot_signing_key
|
|
|
|
"${SECURE_BOOT_SIGNING_KEY}"
|
|
|
|
ABSOLUTE BASE_DIR "${project_dir}")
|
|
|
|
get_filename_component(secure_boot_verification_key
|
|
|
|
"signature_verification_key.bin"
|
|
|
|
ABSOLUTE BASE_DIR "${CMAKE_CURRENT_BINARY_DIR}")
|
2019-05-08 22:25:08 -04:00
|
|
|
add_custom_command(OUTPUT "${secure_boot_verification_key}"
|
|
|
|
COMMAND ${ESPSECUREPY}
|
|
|
|
extract_public_key --keyfile "${secure_boot_signing_key}"
|
|
|
|
"${secure_boot_verification_key}"
|
|
|
|
VERBATIM)
|
|
|
|
else()
|
2019-05-10 03:25:25 -04:00
|
|
|
# We expect to 'inherit' the verification key passed from main project.
|
|
|
|
get_filename_component(secure_boot_verification_key
|
|
|
|
${SECURE_BOOT_VERIFICATION_KEY}
|
|
|
|
ABSOLUTE BASE_DIR "${project_dir}")
|
2019-05-08 22:25:08 -04:00
|
|
|
endif()
|
2019-05-10 03:25:25 -04:00
|
|
|
|
2019-05-08 22:25:08 -04:00
|
|
|
target_add_binary_data(${COMPONENT_LIB} "${secure_boot_verification_key}" "BINARY")
|
|
|
|
set_property(DIRECTORY "${CMAKE_CURRENT_SOURCE_DIR}"
|
|
|
|
APPEND PROPERTY ADDITIONAL_MAKE_CLEAN_FILES
|
|
|
|
"${secure_boot_verification_key}")
|
|
|
|
endif()
|