blob: aea576a703ed3bbb7f2608cbffb8cd5e90db4ac1 [file] [log] [blame]
Mate Toth-Pal65c935e2018-01-17 18:42:13 +01001#-------------------------------------------------------------------------------
Tamas Banabea89d2020-01-15 13:29:25 +00002# Copyright (c) 2018-2020, Arm Limited. All rights reserved.
Mate Toth-Pal65c935e2018-01-17 18:42:13 +01003#
4# SPDX-License-Identifier: BSD-3-Clause
5#
6#-------------------------------------------------------------------------------
7
8if(NOT DEFINED REGRESSION)
9 message(FATAL_ERROR "ERROR: Incomplete Configuration: REGRESSION not defined, Include this file from a Config*.cmake")
10elseif(NOT DEFINED CORE_TEST)
11 message(FATAL_ERROR "ERROR: Incomplete Configuration: CORE_TEST not defined, Include this file from a Config*.cmake")
Tamas Band90c81b2018-08-15 15:03:42 +010012elseif(NOT DEFINED TFM_LVL)
13 message(FATAL_ERROR "ERROR: Incomplete Configuration: TFM_LVL not defined, Include this file from a Config*.cmake")
David Huf2cfa122019-08-27 15:32:38 +080014elseif(NOT DEFINED CORE_IPC)
Tamas Banabea89d2020-01-15 13:29:25 +000015 message(FATAL_ERROR "ERROR: Incomplete Configuration: CORE_IPC not defined. Include this file from a Config*.cmake")
Mate Toth-Pal65c935e2018-01-17 18:42:13 +010016endif()
17
Mate Toth-Palee551bc2018-06-12 16:40:45 +020018if(NOT DEFINED COMPILER)
19 message(FATAL_ERROR "ERROR: COMPILER is not set in command line")
20elseif((NOT ${COMPILER} STREQUAL "ARMCLANG") AND (NOT ${COMPILER} STREQUAL "GNUARM"))
21 message(FATAL_ERROR "ERROR: Compiler \"${COMPILER}\" is not supported.")
22endif()
23
Tamas Bandd10fe52019-09-18 11:52:32 +010024#Configure the default build type
25set(CMAKE_BUILD_TYPE "Debug" CACHE STRING "Build type (i.e. Debug)")
26
Raef Colesb321c0b2019-10-15 08:49:17 +010027#Ignore case on the cmake build types
28string(TOLOWER ${CMAKE_BUILD_TYPE} CMAKE_BUILD_TYPE)
29
Edison Aicb0ecf62019-07-10 18:43:51 +080030if(CORE_IPC)
31 if (TFM_LVL EQUAL 3)
32 message(FATAL_ERROR "ERROR: Invalid isolation level!")
33 endif()
34else()
35 if(NOT TFM_LVL EQUAL 1)
36 message(FATAL_ERROR "ERROR: Invalid isolation level!")
37 endif()
38endif()
39
David Vincze4638b2a2019-05-24 10:14:23 +020040#BL2 bootloader (MCUBoot) related settings
David Vincze54d05552019-08-05 12:58:47 +020041include(${CMAKE_CURRENT_LIST_DIR}/bl2/ext/mcuboot/MCUBootConfig.cmake)
David Vincze4638b2a2019-05-24 10:14:23 +020042
Mate Toth-Pal48fc6a02018-01-24 09:50:14 +010043set(BUILD_CMSIS_CORE Off)
44set(BUILD_RETARGET Off)
45set(BUILD_NATIVE_DRIVERS Off)
46set(BUILD_TIME Off)
47set(BUILD_STARTUP Off)
48set(BUILD_TARGET_CFG Off)
49set(BUILD_TARGET_HARDWARE_KEYS Off)
Marc Moreno Berengue4cc81fc2018-08-10 14:32:01 +010050set(BUILD_TARGET_NV_COUNTERS Off)
Mate Toth-Pal48fc6a02018-01-24 09:50:14 +010051set(BUILD_CMSIS_DRIVERS Off)
52set(BUILD_UART_STDOUT Off)
53set(BUILD_FLASH Off)
Mate Toth-Pald3c77662019-02-20 16:23:00 +010054set(BUILD_PLAT_TEST Off)
Tamas Band4bf3472019-09-06 12:59:56 +010055set(BUILD_BOOT_HAL Off)
Mate Toth-Pal48fc6a02018-01-24 09:50:14 +010056if(NOT DEFINED PLATFORM_CMAKE_FILE)
57 message (FATAL_ERROR "Platform specific CMake is not defined. Please set PLATFORM_CMAKE_FILE.")
58elseif(NOT EXISTS ${PLATFORM_CMAKE_FILE})
59 message (FATAL_ERROR "Platform specific CMake \"${PLATFORM_CMAKE_FILE}\" file does not exist. Please fix value of PLATFORM_CMAKE_FILE.")
60else()
61 include(${PLATFORM_CMAKE_FILE})
62endif()
63
David Hu857bfa52019-05-21 13:54:50 +080064# Select the corresponding CPU type and configuration according to current
65# building status in multi-core scenario.
66# The updated configuration will be used in following compiler setting.
67if (DEFINED TFM_MULTI_CORE_TOPOLOGY AND TFM_MULTI_CORE_TOPOLOGY)
David Hu104388f2019-11-18 14:37:32 +080068 if (NOT CORE_IPC)
69 message(FATAL_ERROR "CORE_IPC is OFF. Multi-core topology should work in IPC model.")
70 endif()
71
David Hu857bfa52019-05-21 13:54:50 +080072 include("Common/MultiCore")
73
74 if (NOT DEFINED TFM_BUILD_IN_SPE)
75 message(FATAL_ERROR "Flag of building in SPE is not specified. Please set TFM_BUILD_IN_SPE.")
76 else()
77 select_arm_cpu_type(${TFM_BUILD_IN_SPE})
78 endif()
David Hu857bfa52019-05-21 13:54:50 +080079
David Hufeae0f92019-06-17 13:42:20 +080080 # CMSE is unnecessary in multi-core scenarios.
81 # TODO: Need further discussion about if CMSE is required when an Armv8-M
82 # core acts as secure core in multi-core scenario.
Mate Toth-Pal8f17a712020-03-02 16:22:19 +010083 # leave CMSE_FLAGS undefined
David Hufeae0f92019-06-17 13:42:20 +080084else()
85 set (CMSE_FLAGS "-mcmse")
David Huaeaf2732019-10-10 14:32:53 +080086
87 # Clear multi-core test setting
88 set (TFM_MULTI_CORE_TEST OFF)
David Hufeae0f92019-06-17 13:42:20 +080089endif()
90
Mate Toth-Palee551bc2018-06-12 16:40:45 +020091if(${COMPILER} STREQUAL "ARMCLANG")
Mate Toth-Pal76867262018-03-09 13:15:36 +010092 #Use any ARMCLANG version found on PATH. Note: Only versions supported by the
93 #build system will work. A file cmake/Common/CompilerArmClangXY.cmake
94 #must be present with a matching version.
95 include("Common/FindArmClang")
96 include("Common/${ARMCLANG_MODULE}")
Mate Toth-Pal48fc6a02018-01-24 09:50:14 +010097
Mate Toth-Pal8f17a712020-03-02 16:22:19 +010098 set (COMMON_COMPILE_FLAGS -fshort-enums -fshort-wchar -funsigned-char -mfpu=none -ffunction-sections -fdata-sections)
Tamas Bandb69d522018-03-01 10:04:41 +000099 ##Shared compiler settings.
100 function(config_setting_shared_compiler_flags tgt)
Mate Toth-Pal8f17a712020-03-02 16:22:19 +0100101 embedded_set_target_compile_flags(TARGET ${tgt} LANGUAGE C APPEND FLAGS -xc -std=c99 ${COMMON_COMPILE_FLAGS} -Wall -Werror)
Tamas Bandb69d522018-03-01 10:04:41 +0000102 endfunction()
103
104 ##Shared linker settings.
105 function(config_setting_shared_linker_flags tgt)
Antonio de Angelis3302f452019-07-19 10:36:33 +0100106 embedded_set_target_link_flags(TARGET ${tgt} FLAGS --strict --map --symbols --xref --entry=Reset_Handler --remove --info=summarysizes,sizes,totals,unused,veneers)
Mate Toth-Pal76867262018-03-09 13:15:36 +0100107 endfunction()
108elseif(${COMPILER} STREQUAL "GNUARM")
109 #Use any GNUARM version found on PATH. Note: Only versions supported by the
110 #build system will work. A file cmake/Common/CompilerGNUARMXY.cmake
111 #must be present with a matching version.
112 include("Common/FindGNUARM")
113 include("Common/${GNUARM_MODULE}")
Mate Toth-Pal48fc6a02018-01-24 09:50:14 +0100114
Mate Toth-Pal8f17a712020-03-02 16:22:19 +0100115 set (COMMON_COMPILE_FLAGS -fshort-enums -fshort-wchar -funsigned-char -msoft-float -ffunction-sections -fdata-sections --specs=nano.specs)
Mate Toth-Pal76867262018-03-09 13:15:36 +0100116 ##Shared compiler and linker settings.
Tamas Bandb69d522018-03-01 10:04:41 +0000117 function(config_setting_shared_compiler_flags tgt)
Mate Toth-Pal8f17a712020-03-02 16:22:19 +0100118 embedded_set_target_compile_flags(TARGET ${tgt} LANGUAGE C APPEND FLAGS -xc -std=c99 ${COMMON_COMPILE_FLAGS} -Wall -Werror -Wno-format -Wno-return-type -Wno-unused-but-set-variable)
Tamas Bandb69d522018-03-01 10:04:41 +0000119 endfunction()
120
121 ##Shared linker settings.
122 function(config_setting_shared_linker_flags tgt)
Mate Toth-Pal76867262018-03-09 13:15:36 +0100123 #--no-wchar-size-warning flag is added because TF-M sources are compiled
124 #with short wchars, however the standard library is compiled with normal
125 #wchar, and this generates linker time warnings. TF-M code does not use
126 #wchar, so the warning can be suppressed.
Antonio de Angelis3302f452019-07-19 10:36:33 +0100127 embedded_set_target_link_flags(TARGET ${tgt} FLAGS -Wl,-check-sections,-fatal-warnings,--gc-sections,--no-wchar-size-warning,--print-memory-usage --entry=Reset_Handler --specs=nano.specs)
Mate Toth-Pal76867262018-03-09 13:15:36 +0100128 endfunction()
Mate Toth-Pal76867262018-03-09 13:15:36 +0100129endif()
130
131#Create a string from the compile flags list, so that it can be used later
132#in this file to set mbedtls and BL2 flags
Tamas Bandb69d522018-03-01 10:04:41 +0000133list_to_string(COMMON_COMPILE_FLAGS_STR ${COMMON_COMPILE_FLAGS})
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100134
135#Settings which shall be set for all projects the same way based
136# on the variables above.
Mate Toth-Pal349714a2018-02-23 15:30:24 +0100137set (TFM_PARTITION_TEST_CORE OFF)
Jamie Foxadf02552019-05-16 17:44:52 +0100138set (TFM_PARTITION_TEST_CORE_IPC OFF)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100139set (CORE_TEST_POSITIVE OFF)
140set (CORE_TEST_INTERACTIVE OFF)
Miklos Balintf13ec022018-04-06 17:21:22 +0200141set (REFERENCE_PLATFORM OFF)
Ben Davis6d7256b2018-04-18 14:16:53 +0100142set (TFM_PARTITION_TEST_SECURE_SERVICES OFF)
Jamie Fox0e823a02019-10-28 17:28:19 +0000143set (TFM_PARTITION_TEST_SST OFF)
Tamas Band90c81b2018-08-15 15:03:42 +0100144set (SERVICES_TEST_ENABLED OFF)
Marc Moreno Berenguecae2c532018-10-09 12:58:46 +0100145set (TEST_FRAMEWORK_S OFF)
146set (TEST_FRAMEWORK_NS OFF)
Edison Aiec109cd2018-07-17 16:04:14 +0800147set (TFM_PSA_API OFF)
Miklos Balintf13ec022018-04-06 17:21:22 +0200148
Jamie Foxc78c62c2019-05-23 13:42:17 +0100149option(TFM_PARTITION_AUDIT_LOG "Enable the TF-M Audit Log partition" ON)
Mingyang Sun9511e5e2019-05-29 18:18:44 +0800150option(TFM_PARTITION_PLATFORM "Enable the TF-M Platform partition" ON)
Kevin Pengc73130f2019-10-22 17:27:18 +0800151option(TFM_PARTITION_SECURE_STORAGE "Enable the TF-M secure storage partition" ON)
152option(TFM_PARTITION_INTERNAL_TRUSTED_STORAGE "Enable the TF-M internal trusted storage partition" ON)
153option(TFM_PARTITION_CRYPTO "Enable the TF-M crypto partition" ON)
154option(TFM_PARTITION_INITIAL_ATTESTATION "Enable the TF-M initial attestation partition" ON)
155
Edison Ai1dfd7b12020-02-23 14:16:08 +0800156if (NOT TFM_LVL EQUAL 1 AND NOT DEFINED CONFIG_TFM_ENABLE_MEMORY_PROTECT)
157 set (CONFIG_TFM_ENABLE_MEMORY_PROTECT ON)
158endif()
159
Kevin Pengc73130f2019-10-22 17:27:18 +0800160if (TFM_PARTITION_INITIAL_ATTESTATION OR TFM_PARTITION_SECURE_STORAGE)
161 #PSA Initial Attestation and Protected storage rely on Cryptography API
162 set(TFM_PARTITION_CRYPTO ON)
163endif()
Jamie Foxc78c62c2019-05-23 13:42:17 +0100164
Kevin Peng0b5acd32020-03-03 15:17:58 +0800165if (TFM_PARTITION_SECURE_STORAGE)
166 set(TFM_PARTITION_INTERNAL_TRUSTED_STORAGE ON)
167endif()
168
Marton Berke6fd21f12019-07-02 13:43:07 +0200169if(${TARGET_PLATFORM} STREQUAL "AN521" OR ${TARGET_PLATFORM} STREQUAL "AN519" OR ${TARGET_PLATFORM} STREQUAL "AN539")
Miklos Balintf13ec022018-04-06 17:21:22 +0200170 set (REFERENCE_PLATFORM ON)
171endif()
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100172
Miklos Balint6cbeba62018-04-12 17:31:34 +0200173# Option to demonstrate usage of secure-only peripheral
174set (SECURE_UART1 OFF)
175
Alan DeMars61844692019-10-22 08:23:29 -0700176if (PLATFORM_SVC_HANDLERS)
177 add_definitions(-DPLATFORM_SVC_HANDLERS)
178endif()
179
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100180if (REGRESSION)
181 set(SERVICES_TEST_ENABLED ON)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100182endif()
183
Edison Aiec109cd2018-07-17 16:04:14 +0800184if (CORE_IPC)
185 set(TFM_PSA_API ON)
David Huf2cfa122019-08-27 15:32:38 +0800186
187 # Disable IPC Test by default if the config or platform doesn't explicitly
188 # require it
189 if (NOT DEFINED IPC_TEST)
190 set(IPC_TEST OFF)
191 endif()
192else()
193 set(IPC_TEST OFF)
Edison Aiec109cd2018-07-17 16:04:14 +0800194endif()
195
Miklos Balint87da2512018-04-19 13:45:50 +0200196if (TFM_PSA_API)
197 add_definitions(-DTFM_PSA_API)
198endif()
199
David Hu104388f2019-11-18 14:37:32 +0800200if (DEFINED TFM_MULTI_CORE_TOPOLOGY AND TFM_MULTI_CORE_TOPOLOGY)
201 add_definitions(-DTFM_MULTI_CORE_TOPOLOGY)
David Huaeaf2732019-10-10 14:32:53 +0800202
203 # Skip multi-core test cases if regression test is disabled
204 if (NOT REGRESSION)
205 set(TFM_MULTI_CORE_TEST OFF)
206 endif()
David Hu104388f2019-11-18 14:37:32 +0800207endif()
208
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100209if (SERVICES_TEST_ENABLED)
210 set(SERVICE_TEST_S ON)
211 set(SERVICE_TEST_NS ON)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100212endif()
213
214if (CORE_TEST)
Kevin Peng726ad7a2020-01-22 15:49:29 +0800215 if (NOT CORE_IPC OR TFM_LVL EQUAL 1)
216 set(CORE_TEST_POSITIVE ON)
217 endif()
Mate Toth-Pal6569a592019-06-07 12:09:50 +0200218 set(CORE_TEST_INTERACTIVE OFF)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100219endif()
220
Ben Davis6d7256b2018-04-18 14:16:53 +0100221if (CORE_TEST_INTERACTIVE)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100222 add_definitions(-DCORE_TEST_INTERACTIVE)
223 set(TEST_FRAMEWORK_NS ON)
Mate Toth-Pal349714a2018-02-23 15:30:24 +0100224 set(TFM_PARTITION_TEST_CORE ON)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100225endif()
226
Ben Davis6d7256b2018-04-18 14:16:53 +0100227if (CORE_TEST_POSITIVE)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100228 add_definitions(-DCORE_TEST_POSITIVE)
229 set(TEST_FRAMEWORK_NS ON)
Mate Toth-Pal349714a2018-02-23 15:30:24 +0100230 set(TFM_PARTITION_TEST_CORE ON)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100231endif()
232
David Hu33f2fd22019-08-16 15:32:39 +0800233if (TFM_PARTITION_TEST_CORE)
234 # If the platform or the topology doesn't specify whether IRQ test is
235 # supported, enable it by default.
236 if (NOT DEFINED TFM_ENABLE_IRQ_TEST)
237 set(TFM_ENABLE_IRQ_TEST ON)
238 endif()
239
240 if (TFM_ENABLE_IRQ_TEST)
241 add_definitions(-DTFM_ENABLE_IRQ_TEST)
242 endif()
243else()
244 set(TFM_ENABLE_IRQ_TEST OFF)
245endif()
246
David Huf2cfa122019-08-27 15:32:38 +0800247if (IPC_TEST)
248 add_definitions(-DENABLE_IPC_TEST)
Jamie Foxadf02552019-05-16 17:44:52 +0100249 set(TEST_FRAMEWORK_NS ON)
250 set(TFM_PARTITION_TEST_CORE_IPC ON)
Edison Aiec109cd2018-07-17 16:04:14 +0800251endif()
252
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100253if (SERVICE_TEST_S)
254 add_definitions(-DSERVICES_TEST_S)
255 set(TEST_FRAMEWORK_S ON)
256endif()
257
258if (SERVICE_TEST_NS)
259 add_definitions(-DSERVICES_TEST_NS)
260 set(TEST_FRAMEWORK_NS ON)
261endif()
262
Ben Davis6d7256b2018-04-18 14:16:53 +0100263if (TEST_FRAMEWORK_S)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100264 add_definitions(-DTEST_FRAMEWORK_S)
Jamie Fox56da0992019-05-28 14:35:06 +0100265 # The secure client partition is required to run secure tests
266 set(TFM_PARTITION_TEST_SECURE_SERVICES ON)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100267endif()
268
Ben Davis6d7256b2018-04-18 14:16:53 +0100269if (TEST_FRAMEWORK_NS)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100270 add_definitions(-DTEST_FRAMEWORK_NS)
271endif()
272
Jamie Foxc78c62c2019-05-23 13:42:17 +0100273if (CORE_IPC)
274 set(TFM_PARTITION_AUDIT_LOG OFF)
275endif()
276
Kevin Pengedde1de2019-10-25 17:12:45 +0800277include(${CMAKE_CURRENT_LIST_DIR}/test/TestConfig.cmake)
278
Jamie Foxc78c62c2019-05-23 13:42:17 +0100279if (TFM_PARTITION_AUDIT_LOG)
280 add_definitions(-DTFM_PARTITION_AUDIT_LOG)
281endif()
282
Mingyang Sun9511e5e2019-05-29 18:18:44 +0800283if (TFM_PARTITION_PLATFORM)
284 add_definitions(-DTFM_PARTITION_PLATFORM)
285endif()
286
Kevin Pengc73130f2019-10-22 17:27:18 +0800287if (TFM_PARTITION_SECURE_STORAGE)
288 add_definitions(-DTFM_PARTITION_SECURE_STORAGE)
289endif()
290
291if (TFM_PARTITION_INTERNAL_TRUSTED_STORAGE)
292 add_definitions(-DTFM_PARTITION_INTERNAL_TRUSTED_STORAGE)
293endif()
294
295if (TFM_PARTITION_CRYPTO)
296 add_definitions(-DTFM_PARTITION_CRYPTO)
297endif()
298
299if (TFM_PARTITION_INITIAL_ATTESTATION)
300 add_definitions(-DTFM_PARTITION_INITIAL_ATTESTATION)
301endif()
302
Mate Toth-Pal349714a2018-02-23 15:30:24 +0100303if (TFM_PARTITION_TEST_CORE)
304 add_definitions(-DTFM_PARTITION_TEST_CORE)
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100305endif()
306
Jamie Foxadf02552019-05-16 17:44:52 +0100307if (TFM_PARTITION_TEST_CORE_IPC)
308 add_definitions(-DTFM_PARTITION_TEST_CORE_IPC)
309endif()
310
Jamie Foxc78c62c2019-05-23 13:42:17 +0100311if (TFM_PARTITION_TEST_SECURE_SERVICES)
312 add_definitions(-DTFM_PARTITION_TEST_SECURE_SERVICES)
313endif()
314
Edison Ai1dfd7b12020-02-23 14:16:08 +0800315if (CONFIG_TFM_ENABLE_MEMORY_PROTECT)
316 add_definitions(-DCONFIG_TFM_ENABLE_MEMORY_PROTECT)
317endif()
318
Jamie Fox17c30bb2019-01-10 13:39:33 +0000319if (PSA_API_TEST)
320 add_definitions(-DPSA_API_TEST_NS)
321 set(PSA_API_TEST_NS ON)
322 if (NOT DEFINED PSA_API_TEST_CRYPTO)
323 set(PSA_API_TEST_CRYPTO OFF)
324 endif()
Jamie Fox6b6a19b2019-09-30 16:54:17 +0100325 if (NOT DEFINED PSA_API_TEST_INTERNAL_TRUSTED_STORAGE)
326 set(PSA_API_TEST_INTERNAL_TRUSTED_STORAGE OFF)
327 endif()
Karl Zhang1895a2c2020-03-08 18:27:32 +0800328 if (NOT DEFINED PSA_API_TEST_PROTECTED_STORAGE)
329 set(PSA_API_TEST_PROTECTED_STORAGE OFF)
Jamie Fox17c30bb2019-01-10 13:39:33 +0000330 endif()
Karl Zhang1895a2c2020-03-08 18:27:32 +0800331 if (NOT DEFINED PSA_API_TEST_INITIAL_ATTESTATION)
332 set(PSA_API_TEST_INITIAL_ATTESTATION OFF)
Jamie Fox17c30bb2019-01-10 13:39:33 +0000333 endif()
Jaykumar Pitambarbhai Patel38e6db52020-01-09 16:35:41 +0530334 if (NOT DEFINED PSA_API_TEST_IPC)
335 set(PSA_API_TEST_IPC OFF)
336 endif()
337
338 #Set PSA API compliance test build path
339 if(NOT DEFINED PSA_API_TEST_BUILD_PATH)
340 #If not specified, assume it's the default build folder checked out at the same level of TFM root dir
341 set(PSA_API_TEST_BUILD_PATH "${TFM_ROOT_DIR}/../psa-arch-tests/api-tests/BUILD")
342 endif()
Jamie Fox17c30bb2019-01-10 13:39:33 +0000343endif()
344
Kevin Penge9b61a72020-01-06 17:01:44 +0800345# The config for enable secure context management in TF-M
346if (NOT DEFINED CONFIG_TFM_ENABLE_CTX_MGMT)
347 set(CONFIG_TFM_ENABLE_CTX_MGMT ON)
348endif()
349
350if (CONFIG_TFM_ENABLE_CTX_MGMT)
351 add_definitions(-DCONFIG_TFM_ENABLE_CTX_MGMT)
352endif()
353
Marc Moreno Berenguec2e4db82018-09-14 16:32:24 +0100354# This flag indicates if the non-secure OS is capable of identify the non-secure clients
Mingyang Sun9ac02372019-08-26 15:59:14 +0800355# which call the secure services. It is diabled in IPC model.
Marc Moreno Berenguec2e4db82018-09-14 16:32:24 +0100356if (NOT DEFINED TFM_NS_CLIENT_IDENTIFICATION)
Mingyang Sun9ac02372019-08-26 15:59:14 +0800357 if (TFM_PSA_API)
358 set(TFM_NS_CLIENT_IDENTIFICATION OFF)
359 else()
Kevin Penge9b61a72020-01-06 17:01:44 +0800360 if (CONFIG_TFM_ENABLE_CTX_MGMT)
361 set(TFM_NS_CLIENT_IDENTIFICATION ON)
362 else()
363 set(TFM_NS_CLIENT_IDENTIFICATION OFF)
364 endif()
Mingyang Sun9ac02372019-08-26 15:59:14 +0800365 endif()
Marc Moreno Berenguec2e4db82018-09-14 16:32:24 +0100366endif()
367
Kevin Penge9b61a72020-01-06 17:01:44 +0800368if (NOT CONFIG_TFM_ENABLE_CTX_MGMT AND TFM_NS_CLIENT_IDENTIFICATION)
369 # NS client ID is part of context management.
370 message(FATAL_ERROR "TFM_NS_CLIENT_IDENTIFICATION cannot be ON when CONFIG_TFM_ENABLE_CTX_MGMT is OFF")
371endif()
372
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100373if (BL2)
David Vincze63eda7a2019-08-09 17:42:51 +0200374 # Add MCUBOOT_IMAGE_NUMBER definition to the compiler command line.
375 add_definitions(-DMCUBOOT_IMAGE_NUMBER=${MCUBOOT_IMAGE_NUMBER})
376
David Vincze4638b2a2019-05-24 10:14:23 +0200377 if (${MCUBOOT_UPGRADE_STRATEGY} STREQUAL "NO_SWAP")
Tamas Bandb69d522018-03-01 10:04:41 +0000378 set(LINK_TO_BOTH_MEMORY_REGION ON)
379 endif()
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100380endif()
381
Raef Coles1bb168e2019-10-17 09:04:55 +0100382##Set Mbed Crypto compiler flags and variables for crypto service
Mate Toth-Pal8f17a712020-03-02 16:22:19 +0100383set(MBEDCRYPTO_C_FLAGS_SERVICES "${CMSE_FLAGS} -D__thumb2__ ${COMMON_COMPILE_FLAGS_STR} -I${CMAKE_CURRENT_LIST_DIR}/platform/ext/common")
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100384
Marc Moreno Berengue6ffb22f2018-02-20 13:46:30 +0000385#Default TF-M secure storage flags.
386#These flags values can be overwritten by setting them in platform/ext/<TARGET_NAME>.cmake
Tamas Ban01f64c52019-08-26 13:46:21 +0100387#Documentation about these flags can be found in docs/user_guides/services/tfm_sst_integration_guide.rst
Marc Moreno Berengue8385e8e2019-01-21 11:49:50 +0000388if (NOT DEFINED SST_ENCRYPTION)
389 set (SST_ENCRYPTION ON)
390endif()
Marc Moreno Berengue6ffb22f2018-02-20 13:46:30 +0000391
Marc Moreno Berengue8385e8e2019-01-21 11:49:50 +0000392if (NOT DEFINED SST_ROLLBACK_PROTECTION)
393 set (SST_ROLLBACK_PROTECTION OFF)
394endif()
Marc Moreno Berengue6ffb22f2018-02-20 13:46:30 +0000395
Marc Moreno Berengue8385e8e2019-01-21 11:49:50 +0000396if (NOT DEFINED SST_CREATE_FLASH_LAYOUT)
397 set (SST_CREATE_FLASH_LAYOUT OFF)
398endif()
Marc Moreno Berengue184d2032018-08-14 12:51:43 +0100399
Marc Moreno Berengue8385e8e2019-01-21 11:49:50 +0000400if (NOT DEFINED SST_VALIDATE_METADATA_FROM_FLASH)
401 set (SST_VALIDATE_METADATA_FROM_FLASH ON)
402endif()
Marc Moreno Berengue6ffb22f2018-02-20 13:46:30 +0000403
Marc Moreno Berengue8385e8e2019-01-21 11:49:50 +0000404if (NOT DEFINED SST_RAM_FS)
405 if (REGRESSION)
406 set (SST_RAM_FS ON)
407 else()
408 set (SST_RAM_FS OFF)
Marc Moreno Berengue02a23442018-08-15 14:28:45 +0100409 endif()
Marc Moreno Berengue792fc682018-02-20 11:53:30 +0000410endif()
Marc Moreno Berengue6ffb22f2018-02-20 13:46:30 +0000411
Jamie Fox95bacd42019-03-21 18:14:15 +0000412if (NOT DEFINED SST_TEST_NV_COUNTERS)
Kevin Pengedde1de2019-10-25 17:12:45 +0800413 if (REGRESSION AND ENABLE_SECURE_STORAGE_SERVICE_TESTS)
Jamie Fox95bacd42019-03-21 18:14:15 +0000414 set(SST_TEST_NV_COUNTERS ON)
415 else()
416 set(SST_TEST_NV_COUNTERS OFF)
417 endif()
418endif()
419
Jamie Fox0e823a02019-10-28 17:28:19 +0000420# The SST NV counter tests depend on the SST test partition to call
421# sst_system_prepare().
422if (SST_TEST_NV_COUNTERS)
423 set(TFM_PARTITION_TEST_SST ON)
424 add_definitions(-DTFM_PARTITION_TEST_SST)
425endif()
426
TudorCretufb182bc2019-07-05 17:34:12 +0100427#Default TF-M internal trusted storage flags.
428#These flags values can be overwritten by setting them in platform/ext/<TARGET_NAME>.cmake
429#Documentation about these flags can be found in the TF-M ITS integration guide
430option(ITS_CREATE_FLASH_LAYOUT "Create an empty ITS Flash Layout" OFF)
431
432if (NOT DEFINED ITS_VALIDATE_METADATA_FROM_FLASH)
433 set (ITS_VALIDATE_METADATA_FROM_FLASH ON)
434endif()
435
436if (NOT DEFINED ITS_RAM_FS)
437 if (REGRESSION)
438 set (ITS_RAM_FS ON)
439 else()
440 set (ITS_RAM_FS OFF)
441 endif()
442endif()
443
Raef Coles1bb168e2019-10-17 09:04:55 +0100444if (NOT DEFINED MBEDCRYPTO_DEBUG)
445 set(MBEDCRYPTO_DEBUG OFF)
Marc Moreno Berengue6ffb22f2018-02-20 13:46:30 +0000446endif()
Mate Toth-Pal65c935e2018-01-17 18:42:13 +0100447
Tamas Ban01f64c52019-08-26 13:46:21 +0100448#Default TF-M initial-attestation service flags.
449#Documentation about these flags can be found in docs/user_guides/services/tfm_attestation_integration_guide.rst
450if (NOT DEFINED ATTEST_INCLUDE_OPTIONAL_CLAIMS)
451 set(ATTEST_INCLUDE_OPTIONAL_CLAIMS ON)
452endif()
453
Tamas Banabea89d2020-01-15 13:29:25 +0000454if (NOT DEFINED ATTEST_INCLUDE_COSE_KEY_ID)
455 set(ATTEST_INCLUDE_COSE_KEY_ID OFF)
456endif()
457
458if (NOT DEFINED ATTEST_INCLUDE_TEST_CODE)
459 if (CMAKE_BUILD_TYPE STREQUAL "debug")
460 set(ATTEST_INCLUDE_TEST_CODE ON)
461 else()
462 set(ATTEST_INCLUDE_TEST_CODE OFF)
463 endif()
Tamas Ban303dd082019-08-27 10:43:03 +0100464endif()
465
David Vincze00dceb12019-09-17 17:34:03 +0200466set(ATTEST_BOOT_INTERFACE "CBOR_ENCODED_CLAIMS" CACHE STRING "Set the format in which to pass the claims to the initial-attestation service.")
David Vincze219a1752019-10-14 11:35:09 +0200467set_property(CACHE ATTEST_BOOT_INTERFACE PROPERTY STRINGS "INDIVIDUAL_CLAIMS;CBOR_ENCODED_CLAIMS")
468validate_cache_value(ATTEST_BOOT_INTERFACE)
469
David Vinczee13a48b2020-01-08 17:42:30 +0100470if (NOT DEFINED BOOT_DATA_AVAILABLE)
David Vinczec3e313a2020-01-06 17:31:11 +0100471 if (BL2 AND (NOT MCUBOOT_REPO STREQUAL "UPSTREAM"))
David Vinczee13a48b2020-01-08 17:42:30 +0100472 set(BOOT_DATA_AVAILABLE ON)
473 else()
474 set(BOOT_DATA_AVAILABLE OFF)
475 endif()
476endif()
477
Tamas Bandb69d522018-03-01 10:04:41 +0000478##Set mbedTLS compiler flags for BL2 bootloader
Mate Toth-Pal8f17a712020-03-02 16:22:19 +0100479set(MBEDCRYPTO_C_FLAGS_BL2 "${CMSE_FLAGS} -D__thumb2__ ${COMMON_COMPILE_FLAGS_STR} -DMBEDTLS_CONFIG_FILE=\\\\\\\"config-rsa.h\\\\\\\" -I${CMAKE_CURRENT_LIST_DIR}/bl2/ext/mcuboot/include")
Tamas Ban7801ed42019-05-20 13:21:53 +0100480if (MCUBOOT_SIGNATURE_TYPE STREQUAL "RSA-3072")
Raef Coles1bb168e2019-10-17 09:04:55 +0100481 string(APPEND MBEDCRYPTO_C_FLAGS_BL2 " -DMCUBOOT_SIGN_RSA_LEN=3072")
Jamie Foxc78c62c2019-05-23 13:42:17 +0100482endif()