2016-11-01 23:41:58 +00:00
|
|
|
COMPONENT_ADD_INCLUDEDIRS := include
|
|
|
|
|
|
|
|
ifdef IS_BOOTLOADER_BUILD
|
2018-07-03 02:18:20 +00:00
|
|
|
# share "include_bootloader" headers with bootloader main component
|
|
|
|
COMPONENT_ADD_INCLUDEDIRS += include_bootloader
|
|
|
|
else
|
|
|
|
COMPONENT_PRIV_INCLUDEDIRS := include_bootloader
|
2016-11-01 23:41:58 +00:00
|
|
|
endif
|
|
|
|
|
|
|
|
COMPONENT_SRCDIRS := src
|
|
|
|
|
2019-04-16 09:01:31 +00:00
|
|
|
ifndef IS_BOOTLOADER_BUILD
|
|
|
|
COMPONENT_SRCDIRS += src/idf # idf sub-directory contains platform agnostic IDF versions
|
|
|
|
else
|
|
|
|
COMPONENT_SRCDIRS += src/$(IDF_TARGET) # one sub-dir per chip
|
|
|
|
endif
|
|
|
|
|
2018-09-30 04:27:06 +00:00
|
|
|
ifndef IS_BOOTLOADER_BUILD
|
|
|
|
COMPONENT_OBJEXCLUDE := src/bootloader_init.o
|
|
|
|
endif
|
|
|
|
|
2020-01-17 03:47:08 +00:00
|
|
|
COMPONENT_OBJEXCLUDE += src/bootloader_flash_config_esp32s2.o \
|
|
|
|
src/bootloader_efuse_esp32s2.o
|
2019-08-09 05:26:49 +00:00
|
|
|
|
2020-02-24 19:51:41 +00:00
|
|
|
ifndef CONFIG_SECURE_SIGNED_APPS_ECDSA_SCHEME
|
|
|
|
ifndef CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME
|
|
|
|
COMPONENT_OBJEXCLUDE += src/$(IDF_TARGET)/secure_boot_signatures.o \
|
|
|
|
src/idf/secure_boot_signatures.o
|
|
|
|
endif
|
|
|
|
endif
|
|
|
|
|
|
|
|
ifndef CONFIG_SECURE_BOOT
|
|
|
|
COMPONENT_OBJEXCLUDE += src/$(IDF_TARGET)/secure_boot.o
|
|
|
|
endif
|
|
|
|
|
2016-11-03 06:33:30 +00:00
|
|
|
#
|
|
|
|
# Secure boot signing key support
|
|
|
|
#
|
2018-07-19 05:15:37 +00:00
|
|
|
ifdef CONFIG_SECURE_SIGNED_APPS
|
2016-11-03 06:33:30 +00:00
|
|
|
|
2020-02-24 19:51:41 +00:00
|
|
|
ifdef CONFIG_SECURE_SIGNED_APPS_ECDSA_SCHEME
|
2016-11-04 05:05:00 +00:00
|
|
|
# this path is created relative to the component build directory
|
2016-11-03 06:33:30 +00:00
|
|
|
SECURE_BOOT_VERIFICATION_KEY := $(abspath signature_verification_key.bin)
|
|
|
|
|
2016-12-19 02:06:21 +00:00
|
|
|
ifdef CONFIG_SECURE_BOOT_BUILD_SIGNED_BINARIES
|
|
|
|
# verification key derived from signing key.
|
|
|
|
$(SECURE_BOOT_VERIFICATION_KEY): $(SECURE_BOOT_SIGNING_KEY) $(SDKCONFIG_MAKEFILE)
|
2016-11-03 06:33:30 +00:00
|
|
|
$(ESPSECUREPY) extract_public_key --keyfile $< $@
|
2016-12-19 02:06:21 +00:00
|
|
|
else
|
|
|
|
# find the configured public key file
|
|
|
|
ORIG_SECURE_BOOT_VERIFICATION_KEY := $(call resolvepath,$(call dequote,$(CONFIG_SECURE_BOOT_VERIFICATION_KEY)),$(PROJECT_PATH))
|
|
|
|
|
|
|
|
$(ORIG_SECURE_BOOT_VERIFICATION_KEY):
|
|
|
|
@echo "Secure boot verification public key '$@' missing."
|
|
|
|
@echo "This can be extracted from the private signing key, see"
|
2020-02-24 19:51:41 +00:00
|
|
|
@echo "docs/security/secure-boot-v1.rst for details."
|
2016-12-19 02:06:21 +00:00
|
|
|
exit 1
|
|
|
|
|
|
|
|
# copy it into the build dir, so the secure boot verification key has
|
|
|
|
# a predictable file name
|
|
|
|
$(SECURE_BOOT_VERIFICATION_KEY): $(ORIG_SECURE_BOOT_VERIFICATION_KEY) $(SDKCONFIG_MAKEFILE)
|
|
|
|
$(summary) CP $< $@
|
|
|
|
cp $< $@
|
2019-05-27 06:29:43 +00:00
|
|
|
endif #CONFIG_SECURE_BOOT_BUILD_SIGNED_BINARIES
|
2016-11-04 05:05:00 +00:00
|
|
|
|
|
|
|
COMPONENT_EXTRA_CLEAN += $(SECURE_BOOT_VERIFICATION_KEY)
|
|
|
|
|
|
|
|
COMPONENT_EMBED_FILES := $(SECURE_BOOT_VERIFICATION_KEY)
|
|
|
|
|
2020-02-24 19:51:41 +00:00
|
|
|
endif #CONFIG_SECURE_SIGNED_APPS_ECDSA_SCHEME
|
2019-05-27 06:29:43 +00:00
|
|
|
endif #CONFIG_SECURE_SIGNED_APPS
|