Tamas Ban | 581034a | 2017-12-19 19:54:37 +0000 | [diff] [blame] | 1 | #------------------------------------------------------------------------------ |
Raef Coles | 55e5e6b | 2021-01-19 11:41:08 +0000 | [diff] [blame] | 2 | # Copyright (c) 2020-2021, Arm Limited. All rights reserved. |
Tamas Ban | 581034a | 2017-12-19 19:54:37 +0000 | [diff] [blame] | 3 | # |
| 4 | # SPDX-License-Identifier: BSD-3-Clause |
| 5 | # |
| 6 | #------------------------------------------------------------------------------ |
| 7 | |
Raef Coles | 6981732 | 2020-10-19 14:14:14 +0100 | [diff] [blame] | 8 | cmake_minimum_required(VERSION 3.15) |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 9 | cmake_policy(SET CMP0079 NEW) |
Tamas Ban | 581034a | 2017-12-19 19:54:37 +0000 | [diff] [blame] | 10 | |
Raef Coles | 6d47fb7 | 2020-12-16 09:26:48 +0000 | [diff] [blame] | 11 | add_library(mcuboot_config INTERFACE) |
| 12 | |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 13 | set(MCUBOOT_KEY_ENC "${MCUBOOT_PATH}/enc-rsa2048-pub.pem" CACHE FILEPATH "Path to key with which to encrypt binary") |
| 14 | |
Raef Coles | 6d47fb7 | 2020-12-16 09:26:48 +0000 | [diff] [blame] | 15 | add_subdirectory("${MCUBOOT_PATH}/boot/bootutil" bootutil) |
| 16 | |
| 17 | target_include_directories(bootutil |
| 18 | PUBLIC |
| 19 | include |
Michel Jaouen | fd7164f | 2021-04-29 09:37:49 +0200 | [diff] [blame] | 20 | config |
Raef Coles | 6d47fb7 | 2020-12-16 09:26:48 +0000 | [diff] [blame] | 21 | ) |
| 22 | |
| 23 | target_link_libraries(bootutil |
| 24 | PUBLIC |
| 25 | mcuboot_config |
| 26 | platform_bl2 |
| 27 | bl2_mbedcrypto |
| 28 | ) |
| 29 | |
Mark Horvath | 8576e38 | 2021-03-12 10:24:55 +0100 | [diff] [blame^] | 30 | target_compile_definitions(bootutil |
| 31 | PRIVATE |
| 32 | $<$<BOOL:${DEFAULT_MCUBOOT_FLASH_MAP}>:DEFAULT_MCUBOOT_FLASH_MAP> |
| 33 | ) |
| 34 | |
Raef Coles | 6d47fb7 | 2020-12-16 09:26:48 +0000 | [diff] [blame] | 35 | target_include_directories(mcuboot_config |
| 36 | INTERFACE |
| 37 | $<BUILD_INTERFACE:${CMAKE_CURRENT_BINARY_DIR}> # for mcuboot_config.h only |
| 38 | ) |
| 39 | |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 40 | target_include_directories(bl2 |
| 41 | PUBLIC |
| 42 | $<BUILD_INTERFACE:${CMAKE_CURRENT_SOURCE_DIR}/include> |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 43 | ) |
| 44 | |
| 45 | target_sources(bl2 |
| 46 | PRIVATE |
| 47 | ${CMAKE_CURRENT_SOURCE_DIR}/bl2_main.c |
| 48 | ${CMAKE_CURRENT_SOURCE_DIR}/keys.c |
| 49 | ${CMAKE_CURRENT_SOURCE_DIR}/flash_map_extended.c |
| 50 | ${CMAKE_CURRENT_SOURCE_DIR}/flash_map_legacy.c |
Raef Coles | 6d47fb7 | 2020-12-16 09:26:48 +0000 | [diff] [blame] | 51 | ) |
| 52 | |
| 53 | target_link_libraries(bl2 |
| 54 | PUBLIC |
| 55 | bootutil |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 56 | ) |
| 57 | |
| 58 | set(MCUBOOT_ALLOWED_LOG_LEVELS OFF ERROR WARNING INFO DEBUG) |
| 59 | list(FIND MCUBOOT_ALLOWED_LOG_LEVELS ${MCUBOOT_LOG_LEVEL} LOG_LEVEL_ID) |
| 60 | |
| 61 | configure_file(include/mcuboot_config/mcuboot_config.h.in |
| 62 | ${CMAKE_CURRENT_BINARY_DIR}/mcuboot_config/mcuboot_config.h |
| 63 | @ONLY) |
| 64 | |
| 65 | ############################### IMAGE SIGNING ################################## |
| 66 | |
| 67 | find_package(Python3) |
| 68 | |
| 69 | set(FLASH_AREA_NUM 0) |
Sherry Zhang | ae25f05 | 2021-05-13 14:49:48 +0800 | [diff] [blame] | 70 | set(IMAGE_TYPE "S_IMAGE") |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 71 | if (MCUBOOT_IMAGE_NUMBER GREATER 1) |
| 72 | configure_file(signing_layout.c.in signing_layout_s.c @ONLY) |
| 73 | add_library(signing_layout_s OBJECT ${CMAKE_CURRENT_BINARY_DIR}/signing_layout_s.c) |
David Vincze | c3e313a | 2020-01-06 17:31:11 +0100 | [diff] [blame] | 74 | else() |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 75 | # Imgtool script requires the s_ns sufix. Since only one sigining layout is |
| 76 | # used in this mode the signing_layout_s target's source file is renamed. |
| 77 | configure_file(signing_layout.c.in signing_layout_s_ns.c @ONLY) |
| 78 | add_library(signing_layout_s OBJECT ${CMAKE_CURRENT_BINARY_DIR}/signing_layout_s_ns.c) |
David Vincze | c3e313a | 2020-01-06 17:31:11 +0100 | [diff] [blame] | 79 | endif() |
| 80 | |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 81 | target_compile_options(signing_layout_s |
| 82 | PRIVATE |
| 83 | $<$<C_COMPILER_ID:GNU>:-E\;-xc> |
| 84 | $<$<C_COMPILER_ID:ARMClang>:-E\;-xc> |
| 85 | $<$<C_COMPILER_ID:IAR>:--preprocess=ns\;$<TARGET_OBJECTS:signing_layout_s>> |
| 86 | ) |
| 87 | target_compile_definitions(signing_layout_s |
| 88 | PRIVATE |
| 89 | $<$<BOOL:${BL2}>:BL2> |
| 90 | $<$<BOOL:${MCUBOOT_IMAGE_NUMBER}>:MCUBOOT_IMAGE_NUMBER=${MCUBOOT_IMAGE_NUMBER}> |
Sherry Zhang | ae25f05 | 2021-05-13 14:49:48 +0800 | [diff] [blame] | 91 | $<$<STREQUAL:${MCUBOOT_UPGRADE_STRATEGY},DIRECT_XIP>:IMAGE_ROM_FIXED> |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 92 | ) |
| 93 | target_link_libraries(signing_layout_s |
| 94 | PRIVATE |
| 95 | platform_bl2 |
| 96 | ) |
| 97 | |
| 98 | if(NS) |
| 99 | add_custom_target(tfm_s_ns_bin |
| 100 | SOURCES tfm_s_ns.bin |
| 101 | ) |
| 102 | add_custom_command(OUTPUT tfm_s_ns.bin |
| 103 | DEPENDS $<TARGET_FILE_DIR:tfm_s>/tfm_s.bin |
| 104 | DEPENDS $<TARGET_FILE_DIR:tfm_ns>/tfm_ns.bin |
| 105 | DEPENDS tfm_s_bin tfm_ns_bin |
| 106 | DEPENDS signing_layout_s |
| 107 | |
| 108 | COMMAND ${PYTHON_EXECUTABLE} ${CMAKE_CURRENT_SOURCE_DIR}/scripts/assemble.py |
| 109 | --layout $<TARGET_OBJECTS:signing_layout_s> |
| 110 | -s $<TARGET_FILE_DIR:tfm_s>/tfm_s.bin |
| 111 | -n $<TARGET_FILE_DIR:tfm_ns>/tfm_ns.bin |
| 112 | -o tfm_s_ns.bin |
| 113 | COMMAND ${CMAKE_COMMAND} -E copy tfm_s_ns.bin $<TARGET_FILE_DIR:bl2> |
| 114 | ) |
Tamas Ban | 581034a | 2017-12-19 19:54:37 +0000 | [diff] [blame] | 115 | endif() |
| 116 | |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 117 | add_custom_target(tfm_s_signed_bin |
| 118 | SOURCES tfm_s_signed.bin |
| 119 | ) |
| 120 | add_custom_command(OUTPUT tfm_s_signed.bin |
| 121 | DEPENDS $<TARGET_FILE_DIR:tfm_s>/tfm_s.bin |
| 122 | DEPENDS tfm_s_bin signing_layout_s |
| 123 | WORKING_DIRECTORY ${MCUBOOT_PATH}/scripts |
Tamas Ban | d0f4e1d | 2019-07-11 09:39:03 +0100 | [diff] [blame] | 124 | |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 125 | #Sign secure binary image with provided secret key |
| 126 | COMMAND ${PYTHON_EXECUTABLE} ${CMAKE_CURRENT_SOURCE_DIR}/scripts/wrapper/wrapper.py |
| 127 | -v ${MCUBOOT_IMAGE_VERSION_S} |
| 128 | --layout $<TARGET_OBJECTS:signing_layout_s> |
| 129 | -k ${MCUBOOT_KEY_S} |
| 130 | --public-key-format $<IF:$<BOOL:${MCUBOOT_HW_KEY}>,full,hash> |
| 131 | --align 1 |
| 132 | --pad |
| 133 | --pad-header |
| 134 | -H 0x400 |
| 135 | -s ${MCUBOOT_SECURITY_COUNTER_S} |
Raef Coles | 55e5e6b | 2021-01-19 11:41:08 +0000 | [diff] [blame] | 136 | -d \"\(1,${MCUBOOT_NS_IMAGE_MIN_VER}\)\" |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 137 | $<$<STREQUAL:${MCUBOOT_UPGRADE_STRATEGY},OVERWRITE_ONLY>:--overwrite-only> |
| 138 | $<$<BOOL:${MCUBOOT_ENC_IMAGES}>:-E${MCUBOOT_KEY_ENC}> |
| 139 | $<TARGET_FILE_DIR:tfm_s>/tfm_s.bin |
| 140 | ${CMAKE_CURRENT_BINARY_DIR}/tfm_s_signed.bin |
| 141 | COMMAND ${CMAKE_COMMAND} -E copy ${CMAKE_CURRENT_BINARY_DIR}/tfm_s_signed.bin $<TARGET_FILE_DIR:bl2> |
| 142 | ) |
| 143 | |
Mark Horvath | 531fce8 | 2021-01-15 16:10:22 +0100 | [diff] [blame] | 144 | set(FLASH_AREA_NUM 1) |
Sherry Zhang | ae25f05 | 2021-05-13 14:49:48 +0800 | [diff] [blame] | 145 | set(IMAGE_TYPE "NS_IMAGE") |
Mark Horvath | 531fce8 | 2021-01-15 16:10:22 +0100 | [diff] [blame] | 146 | configure_file(signing_layout.c.in signing_layout_ns.c @ONLY) |
| 147 | |
| 148 | add_library(signing_layout_ns OBJECT ${CMAKE_CURRENT_BINARY_DIR}/signing_layout_ns.c) |
| 149 | target_compile_options(signing_layout_ns |
| 150 | PRIVATE |
| 151 | $<$<C_COMPILER_ID:GNU>:-E\;-xc> |
| 152 | $<$<C_COMPILER_ID:ARMClang>:-E\;-xc> |
| 153 | $<$<C_COMPILER_ID:IAR>:--preprocess=ns\;$<TARGET_OBJECTS:signing_layout_ns>> |
| 154 | ) |
| 155 | target_compile_definitions(signing_layout_ns |
| 156 | PRIVATE |
| 157 | $<$<BOOL:${BL2}>:BL2> |
| 158 | $<$<BOOL:${MCUBOOT_IMAGE_NUMBER}>:MCUBOOT_IMAGE_NUMBER=${MCUBOOT_IMAGE_NUMBER}> |
Sherry Zhang | ae25f05 | 2021-05-13 14:49:48 +0800 | [diff] [blame] | 159 | $<$<STREQUAL:${MCUBOOT_UPGRADE_STRATEGY},DIRECT_XIP>:IMAGE_ROM_FIXED> |
Mark Horvath | 531fce8 | 2021-01-15 16:10:22 +0100 | [diff] [blame] | 160 | ) |
| 161 | target_link_libraries(signing_layout_ns |
| 162 | PRIVATE |
| 163 | platform_bl2 |
| 164 | ) |
| 165 | |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 166 | if(NS) |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 167 | add_custom_target(tfm_ns_signed_bin |
| 168 | SOURCES tfm_ns_signed.bin |
| 169 | ) |
| 170 | add_custom_command(OUTPUT tfm_ns_signed.bin |
| 171 | DEPENDS $<TARGET_FILE_DIR:tfm_ns>/tfm_ns.bin |
| 172 | DEPENDS tfm_ns_bin signing_layout_ns |
| 173 | WORKING_DIRECTORY ${MCUBOOT_PATH}/scripts |
| 174 | |
| 175 | #Sign non-secure binary image with provided secret key |
| 176 | COMMAND ${PYTHON_EXECUTABLE} ${CMAKE_CURRENT_SOURCE_DIR}/scripts/wrapper/wrapper.py |
| 177 | -v ${MCUBOOT_IMAGE_VERSION_NS} |
| 178 | --layout $<TARGET_OBJECTS:signing_layout_ns> |
| 179 | -k ${MCUBOOT_KEY_NS} |
| 180 | --public-key-format $<IF:$<BOOL:${MCUBOOT_HW_KEY}>,full,hash> |
| 181 | --align 1 |
| 182 | --pad |
| 183 | --pad-header |
| 184 | -H 0x400 |
| 185 | -s ${MCUBOOT_SECURITY_COUNTER_NS} |
Raef Coles | 55e5e6b | 2021-01-19 11:41:08 +0000 | [diff] [blame] | 186 | -d \"\(0, ${MCUBOOT_S_IMAGE_MIN_VER}\)\" |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 187 | $<TARGET_FILE_DIR:tfm_ns>/tfm_ns.bin |
| 188 | $<$<STREQUAL:${MCUBOOT_UPGRADE_STRATEGY},OVERWRITE_ONLY>:--overwrite-only> |
| 189 | $<$<BOOL:${MCUBOOT_ENC_IMAGES}>:-E${MCUBOOT_KEY_ENC}> |
| 190 | ${CMAKE_CURRENT_BINARY_DIR}/tfm_ns_signed.bin |
| 191 | COMMAND ${CMAKE_COMMAND} -E copy ${CMAKE_CURRENT_BINARY_DIR}/tfm_ns_signed.bin $<TARGET_FILE_DIR:bl2> |
| 192 | ) |
Tamas Ban | d0f4e1d | 2019-07-11 09:39:03 +0100 | [diff] [blame] | 193 | endif() |
| 194 | |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 195 | if(NS) |
| 196 | add_custom_target(tfm_s_ns_signed_bin |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 197 | SOURCES tfm_s_ns_signed.bin |
| 198 | ) |
| 199 | if (MCUBOOT_IMAGE_NUMBER GREATER 1) |
| 200 | add_custom_command(OUTPUT tfm_s_ns_signed.bin |
| 201 | DEPENDS tfm_s_signed_bin $<TARGET_FILE_DIR:tfm_s>/tfm_s.bin |
| 202 | DEPENDS tfm_ns_signed_bin $<TARGET_FILE_DIR:tfm_ns>/tfm_ns.bin |
| 203 | DEPENDS signing_layout_s |
| 204 | |
| 205 | # Create concatenated binary image from the two independently signed |
| 206 | # binary file. This only uses the local assemble.py script (not from |
| 207 | # upstream mcuboot) because that script is geared towards zephyr |
| 208 | # support |
| 209 | COMMAND ${PYTHON_EXECUTABLE} ${CMAKE_CURRENT_SOURCE_DIR}/scripts/assemble.py |
| 210 | --layout $<TARGET_OBJECTS:signing_layout_s> |
| 211 | -s $<TARGET_FILE_DIR:bl2>/tfm_s_signed.bin |
| 212 | -n $<TARGET_FILE_DIR:bl2>/tfm_ns_signed.bin |
| 213 | -o tfm_s_ns_signed.bin |
| 214 | COMMAND ${CMAKE_COMMAND} -E copy tfm_s_ns_signed.bin $<TARGET_FILE_DIR:bl2> |
| 215 | ) |
| 216 | else() |
| 217 | add_custom_command(OUTPUT tfm_s_ns_signed.bin |
Sherry Zhang | 4c9b0ed | 2021-04-20 18:29:19 +0800 | [diff] [blame] | 218 | WORKING_DIRECTORY ${MCUBOOT_PATH}/scripts |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 219 | DEPENDS tfm_s_ns_bin tfm_s_ns.bin |
| 220 | DEPENDS signing_layout_s |
| 221 | |
Mark Horvath | b9ac0d5 | 2020-09-09 10:48:22 +0200 | [diff] [blame] | 222 | # Use the non-secure key to sign the combined image if FORWARD_PROT_MSG is set. |
| 223 | # In such a configuration there is a subsystem with higher privileges controlling the |
| 224 | # the boot process and current implementation requires to use the non-secure key here. |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 225 | COMMAND ${PYTHON_EXECUTABLE} ${CMAKE_CURRENT_SOURCE_DIR}/scripts/wrapper/wrapper.py |
| 226 | -v ${MCUBOOT_IMAGE_VERSION_S} |
| 227 | --layout $<TARGET_OBJECTS:signing_layout_s> |
Mark Horvath | b9ac0d5 | 2020-09-09 10:48:22 +0200 | [diff] [blame] | 228 | -k $<IF:$<BOOL:${FORWARD_PROT_MSG}>,${MCUBOOT_KEY_NS},${MCUBOOT_KEY_S}> |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 229 | --public-key-format $<IF:$<BOOL:${MCUBOOT_HW_KEY}>,full,hash> |
| 230 | --align 1 |
| 231 | --pad |
| 232 | --pad-header |
| 233 | -H 0x400 |
| 234 | -s ${MCUBOOT_SECURITY_COUNTER_S} |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 235 | $<$<STREQUAL:${MCUBOOT_UPGRADE_STRATEGY},OVERWRITE_ONLY>:--overwrite-only> |
| 236 | $<$<BOOL:${MCUBOOT_ENC_IMAGES}>:-E${MCUBOOT_KEY_ENC}> |
Sherry Zhang | 4c9b0ed | 2021-04-20 18:29:19 +0800 | [diff] [blame] | 237 | ${CMAKE_CURRENT_BINARY_DIR}/tfm_s_ns.bin |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 238 | ${CMAKE_CURRENT_BINARY_DIR}/tfm_s_ns_signed.bin |
| 239 | COMMAND ${CMAKE_COMMAND} -E copy ${CMAKE_CURRENT_BINARY_DIR}/tfm_s_ns_signed.bin $<TARGET_FILE_DIR:bl2> |
| 240 | ) |
| 241 | endif() |
Marc Moreno Berengue | a1f296f | 2018-01-25 15:21:22 +0000 | [diff] [blame] | 242 | endif() |
| 243 | |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 244 | add_custom_target(signed_images |
| 245 | ALL |
Mark Horvath | f056514 | 2020-11-19 18:52:44 +0100 | [diff] [blame] | 246 | DEPENDS $<IF:$<BOOL:${NS}>,tfm_s_ns_signed_bin,tfm_s_signed_bin> |
Raef Coles | 8efad88 | 2020-07-10 09:46:00 +0100 | [diff] [blame] | 247 | ) |