Skip to content

Commit f57c6a7

Browse files
Jianliang-ShenKevin Peng
authored and
Kevin Peng
committedApr 3, 2023
Kconfig: Add BL1 and BL2 Kconfig configs
bl1/Kconfig and bl2/ext/mcuboot/Kconfig are based on related CMAKE config files. As these two modules join into the Kconfig menu, CMAKE include process in kconfig.cmake can be dropped. Signed-off-by: Jianliang Shen <[email protected]> Change-Id: I288fabab9adb66028125fa0b7065e2e39e2420a5
1 parent 12e21a2 commit f57c6a7

File tree

10 files changed

+410
-19
lines changed

10 files changed

+410
-19
lines changed
 

‎Kconfig

+5-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
#-------------------------------------------------------------------------------
2-
# Copyright (c) 2022, Arm Limited. All rights reserved.
2+
# Copyright (c) 2022-2023, Arm Limited. All rights reserved.
33
#
44
# SPDX-License-Identifier: BSD-3-Clause
55
#
@@ -10,6 +10,10 @@ mainmenu "TF-M Configuration"
1010
# Load platform Kconfig file if exists
1111
osource "$(PLATFORM_PATH)/Kconfig"
1212

13+
################################# Bootloader ###################################
14+
15+
rsource "Kconfig.bl"
16+
1317
################################# SPM ##########################################
1418

1519
rsource "secure_fw/spm/Kconfig"

‎Kconfig.bl

+33
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
2+
#-------------------------------------------------------------------------------
3+
# Copyright (c) 2023, Arm Limited. All rights reserved.
4+
#
5+
# SPDX-License-Identifier: BSD-3-Clause
6+
#
7+
#-------------------------------------------------------------------------------
8+
9+
rsource "bl1/Kconfig"
10+
rsource "bl2/ext/mcuboot/Kconfig"
11+
12+
menu "BL options"
13+
14+
config CONFIG_TFM_BOOT_STORE_MEASUREMENTS
15+
bool "Store measurement values from all the boot stages"
16+
default y
17+
help
18+
Used for initial attestation token.
19+
20+
config CONFIG_TFM_BOOT_STORE_ENCODED_MEASUREMENTS
21+
bool "Enable storing of encoded measurements in boot"
22+
default y
23+
24+
config MCUBOOT_DATA_SHARING
25+
bool
26+
default y if TFM_PARTITION_FIRMWARE_UPDATE || \
27+
(BL2 && CONFIG_TFM_BOOT_STORE_MEASUREMENTS && \
28+
!CONFIG_TFM_BOOT_STORE_ENCODED_MEASUREMENTS)
29+
default n
30+
help
31+
Add sharing of application specific data using the same shared data area
32+
as for the measured boot
33+
endmenu

‎bl1/Kconfig

+99
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
#-------------------------------------------------------------------------------
2+
# Copyright (c) 2023, Arm Limited. All rights reserved.
3+
#
4+
# SPDX-License-Identifier: BSD-3-Clause
5+
#
6+
#-------------------------------------------------------------------------------
7+
8+
menuconfig BL1
9+
bool "BL1"
10+
default n
11+
12+
if BL1 && PLATFORM_DEFAULT_BL1
13+
14+
config TFM_BL2_ENCRYPTION_KEY_PATH
15+
string
16+
default "$(TFM_SOURCE_DIR)/bl1/bl1_2/bl2_dummy_encryption_key.bin"
17+
help
18+
Path to binary key to use for encrypting BL2
19+
20+
config TFM_GUK_PATH
21+
string
22+
default "$(TFM_SOURCE_DIR)/bl1/bl1_1/dummy_guk.bin"
23+
help
24+
Path to binary GUK key file to provision
25+
26+
config TFM_BL2_IMAGE_FLASH_AREA_NUM
27+
int "Which flash area BL2 is stored in"
28+
default 0
29+
30+
config TFM_BL2_SIGNING_KEY_PATH
31+
string
32+
default "$(TFM_SOURCE_DIR)/bl1/bl1_2/bl1_dummy_rotpk"
33+
help
34+
Path to binary BL2 signing private key
35+
36+
config TFM_BL1_MEMORY_MAPPED_FLASH
37+
bool "BL1 Access flash content"
38+
default y
39+
40+
config TFM_BL1_LOGGING
41+
bool "BL1 log to uart"
42+
default y
43+
44+
config TFM_BL1_DEFAULT_OTP
45+
bool
46+
default y
47+
help
48+
Whether BL1_1 will use default OTP memory
49+
50+
config TFM_BL1_DEFAULT_PROVISIONING
51+
bool
52+
default y
53+
help
54+
Whether BL1_1 will use default provisioning
55+
56+
config TFM_BL1_SOFTWARE_CRYPTO
57+
bool
58+
default y
59+
help
60+
Whether BL1_1 will use software crypto
61+
62+
config TFM_BL1_DUMMY_TRNG
63+
bool
64+
default y
65+
help
66+
Whether BL1_1 will use dummy TRNG
67+
68+
config TFM_BL1_PQ_CRYPTO
69+
bool "Enable LMS PQ crypto for BL2 verification."
70+
default n
71+
help
72+
Enable LMS PQ crypto for BL2 verification. This is experimental and should
73+
not yet be used in production
74+
75+
config TFM_BL1_IMAGE_VERSION_BL2
76+
string "Image version of BL2 image"
77+
default "1.9.0+0"
78+
79+
config TFM_BL1_IMAGE_SECURITY_COUNTER_BL2
80+
int "Security counter value to include with BL2 image"
81+
default 1
82+
83+
config TFM_BL1_2_IN_OTP
84+
bool "Whether BL1_2 is stored in OTP"
85+
default y
86+
87+
config BL1_HEADER_SIZE
88+
hex "BL1 Header size"
89+
default 0x800
90+
91+
config BL1_TRAILER_SIZE
92+
hex "BL1 Trailer size"
93+
default 0x000
94+
95+
config TFM_BL1_LOGGING
96+
bool "Enable BL1 Logging"
97+
default y
98+
99+
endif

‎bl2/ext/mcuboot/Kconfig

+247
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,247 @@
1+
#-------------------------------------------------------------------------------
2+
# Copyright (c) 2023, Arm Limited. All rights reserved.
3+
#
4+
# SPDX-License-Identifier: BSD-3-Clause
5+
#
6+
#-------------------------------------------------------------------------------
7+
8+
menuconfig BL2
9+
bool "BL2"
10+
default y
11+
12+
if BL2
13+
14+
config DEFAULT_MCUBOOT_SECURITY_COUNTERS
15+
bool "Use the default security counter configuration"
16+
default y
17+
help
18+
Use the default security counter configuration defined by TF-M project
19+
20+
config DEFAULT_MCUBOOT_FLASH_MAP
21+
bool "Use the default flash map"
22+
default y
23+
help
24+
Whether to use the default flash map defined by TF-M project
25+
26+
config MCUBOOT_S_IMAGE_FLASH_AREA_NUM
27+
int "ID of the flash area containing the primary Secure image"
28+
default 0
29+
help
30+
ID of the flash area containing the primary Secure image
31+
32+
config MCUBOOT_NS_IMAGE_FLASH_AREA_NUM
33+
int "ID of the flash area containing the primary Non-Secure image"
34+
default 1
35+
36+
config MCUBOOT_IMAGE_NUMBER
37+
int "Whether to combine S and NS into either 1 image, or sign each seperately"
38+
default 2
39+
range 1 4
40+
41+
config MCUBOOT_EXECUTION_SLOT
42+
int "Slot from which to execute the image, used for XIP mode"
43+
default 1
44+
45+
config MCUBOOT_HW_KEY
46+
bool "Embed the entire public key"
47+
default y
48+
help
49+
Whether to embed the entire public key in the image metadata instead of
50+
the hash only
51+
52+
choice
53+
prompt "Upgrade strategy for images"
54+
default MCUBOOT_UPGRADE_STRATEGY_OVERWRITE_ONLY
55+
56+
config MCUBOOT_UPGRADE_STRATEGY_OVERWRITE_ONLY
57+
bool "Overwrite only"
58+
59+
config MCUBOOT_UPGRADE_STRATEGY_SWAP_USING_SCRATCH
60+
bool "Swap using scratch"
61+
62+
config MCUBOOT_UPGRADE_STRATEGY_SWAP_USING_MOVE
63+
bool "Swap using move"
64+
65+
config MCUBOOT_UPGRADE_STRATEGY_DIRECT_XIP
66+
bool "Direct xip"
67+
depends on !TFM_PARTITION_FIRMWARE_UPDATE
68+
69+
config MCUBOOT_UPGRADE_STRATEGY_RAM_LOAD
70+
bool "Ram load"
71+
depends on !TFM_PARTITION_FIRMWARE_UPDATE
72+
endchoice
73+
74+
config MCUBOOT_UPGRADE_STRATEGY
75+
string "Upgrade strategy for images"
76+
default "OVERWRITE_ONLY" if MCUBOOT_UPGRADE_STRATEGY_OVERWRITE_ONLY
77+
default "SWAP_USING_SCRATCH" if MCUBOOT_UPGRADE_STRATEGY_SWAP_USING_SCRATCH
78+
default "SWAP_USING_MOVE" if MCUBOOT_UPGRADE_STRATEGY_SWAP_USING_MOVE
79+
default "DIRECT_XIP" if MCUBOOT_UPGRADE_STRATEGY_DIRECT_XIP
80+
default "RAM_LOAD" if MCUBOOT_UPGRADE_STRATEGY_RAM_LOAD
81+
82+
config BL2_HEADER_SIZE
83+
hex "BL2 Header size"
84+
default 0x400
85+
86+
config BL2_TRAILER_SIZE
87+
hex "BL2 Trailer size"
88+
default 0x400
89+
90+
choice
91+
prompt "Align option for mcuboot and build image with imgtool"
92+
config MCUBOOT_ALIGN_VAL_1
93+
bool "1"
94+
config MCUBOOT_ALIGN_VAL_2
95+
bool "2"
96+
config MCUBOOT_ALIGN_VAL_4
97+
bool "4"
98+
config MCUBOOT_ALIGN_VAL_8
99+
bool "8"
100+
config MCUBOOT_ALIGN_VAL_16
101+
bool "16"
102+
config MCUBOOT_ALIGN_VAL_32
103+
bool "32"
104+
endchoice
105+
106+
config MCUBOOT_ALIGN_VAL
107+
int
108+
default 1 if MCUBOOT_ALIGN_VAL_1
109+
default 2 if MCUBOOT_ALIGN_VAL_2
110+
default 4 if MCUBOOT_ALIGN_VAL_4
111+
default 8 if MCUBOOT_ALIGN_VAL_8
112+
default 16 if MCUBOOT_ALIGN_VAL_16
113+
default 32 if MCUBOOT_ALIGN_VAL_32
114+
115+
config MCUBOOT_CONFIRM_IMAGE
116+
bool "Whether to confirm the image if REVERT is supported in MCUboot"
117+
default n
118+
119+
config MCUBOOT_DIRECT_XIP_REVERT
120+
bool "Enable the revert mechanism in direct-xip mode"
121+
default y
122+
123+
config MCUBOOT_HW_ROLLBACK_PROT
124+
bool "Enable security counter validation against non-volatile HW counters"
125+
default y
126+
127+
config MCUBOOT_ENC_IMAGES
128+
bool "Enable encrypted image upgrade support"
129+
default n
130+
131+
config MCUBOOT_BOOTSTRAP
132+
bool "Support initial state with empty primary slot and images installed from secondary slots"
133+
default n
134+
135+
config MCUBOOT_ENCRYPT_RSA
136+
bool "Use RSA for encrypted image upgrade support"
137+
default n
138+
139+
choice
140+
prompt "Fault injection hardening profile"
141+
default MCUBOOT_FIH_PROFILE_OFF
142+
143+
config MCUBOOT_FIH_PROFILE_OFF
144+
bool "OFF"
145+
146+
config MCUBOOT_FIH_PROFILE_LOW
147+
bool "LOW"
148+
149+
config MCUBOOT_FIH_PROFILE_MEDIUM
150+
bool "MEDIUM"
151+
152+
config MCUBOOT_FIH_PROFILE_HIGH
153+
bool "HIGH"
154+
endchoice
155+
156+
config MCUBOOT_FIH_PROFILE
157+
string
158+
default "OFF" if MCUBOOT_FIH_PROFILE_OFF
159+
default "LOW" if MCUBOOT_FIH_PROFILE_LOW
160+
default "MEDIUM" if MCUBOOT_FIH_PROFILE_MEDIUM
161+
default "HIGH" if MCUBOOT_FIH_PROFILE_HIGH
162+
163+
config MCUBOOT_SIGNATURE_TYPE
164+
string "Algorithm to use for signature validation"
165+
default "RSA"
166+
help
167+
Note - If either SIGNATURE_TYPE or KEY_LEN are changed, the entries for KEY_S
168+
and KEY_NS will either have to be updated manually or removed from the cache.
169+
`cmake .. -UMCUBOOT_KEY_S -UMCUBOOT_KEY_NS`. Once removed from the cache it
170+
will be set to default again.
171+
172+
config MCUBOOT_SIGNATURE_KEY_LEN
173+
int "Key length to use for signature validation"
174+
default 3072
175+
176+
config MCUBOOT_KEY_S
177+
string "Path to key with which to sign secure binary"
178+
default "$(TFM_SOURCE_DIR)/bl2/ext/mcuboot/root-${MCUBOOT_SIGNATURE_TYPE}-${MCUBOOT_SIGNATURE_KEY_LEN}.pem"
179+
180+
config MCUBOOT_KEY_NS
181+
string "Path to key with which to sign non-secure binary"
182+
default "$(TFM_SOURCE_DIR)/bl2/ext/mcuboot/root-${MCUBOOT_SIGNATURE_TYPE}-${MCUBOOT_SIGNATURE_KEY_LEN}_1.pem"
183+
184+
config MCUBOOT_IMAGE_VERSION_S
185+
string "Version number of S image"
186+
default "$(TFM_VERSION)"
187+
188+
config MCUBOOT_IMAGE_VERSION_NS
189+
string "Version number of NS image"
190+
default "0.0.0"
191+
192+
config MCUBOOT_SECURITY_COUNTER_S
193+
int "Security counter for S image. auto sets it to IMAGE_VERSION_S"
194+
default 1
195+
196+
config MCUBOOT_SECURITY_COUNTER_NS
197+
int "Security counter for NS image. auto sets it to IMAGE_VERSION_NS"
198+
default 1
199+
200+
config MCUBOOT_S_IMAGE_MIN_VER
201+
string "Minimum version of secure image"
202+
default "0.0.0+0"
203+
help
204+
Minimum version of secure image required by the non-secure image for
205+
upgrade to this non-secure image. If MCUBOOT_IMAGE_NUMBER == 1 this
206+
option has no effect
207+
208+
config MCUBOOT_NS_IMAGE_MIN_VER
209+
string "Minimum version of non-secure image"
210+
default "0.0.0+0"
211+
help
212+
Minimum version of non-secure image required by the secure image for
213+
upgrade to this secure image. If MCUBOOT_IMAGE_NUMBER == 1 this option
214+
has no effect
215+
216+
config MCUBOOT_ENC_KEY_LEN
217+
int "Length of the AES key for encrypting images"
218+
default 128
219+
220+
config MCUBOOT_MBEDCRYPTO_CONFIG_FILEPATH
221+
string "Mbedtls config file to use with MCUboot"
222+
default "$(TFM_SOURCE_DIR)/bl2/ext/mcuboot/config/mcuboot-mbedtls-cfg.h"
223+
224+
choice
225+
prompt "MCUBoot Log Level"
226+
default MCUBOOT_LOG_LEVEL_INFO
227+
228+
config MCUBOOT_LOG_LEVEL_DEBUG
229+
bool "Debug"
230+
config MCUBOOT_LOG_LEVEL_INFO
231+
bool "Info"
232+
config MCUBOOT_LOG_LEVEL_WARNING
233+
bool "Warning"
234+
config MCUBOOT_LOG_LEVEL_ERROR
235+
bool "Error"
236+
config MCUBOOT_LOG_LEVEL_OFF
237+
bool "Off"
238+
endchoice
239+
240+
config MCUBOOT_LOG_LEVEL
241+
string
242+
default "DEBUG" if MCUBOOT_LOG_LEVEL_DEBUG
243+
default "INFO" if MCUBOOT_LOG_LEVEL_INFO
244+
default "WARNING" if MCUBOOT_LOG_LEVEL_WARNING
245+
default "ERROR" if MCUBOOT_LOG_LEVEL_ERROR
246+
default "OFF" if MCUBOOT_LOG_LEVEL_OFF
247+
endif

‎config/check_config.cmake

+2-2
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ tfm_invalid_config((BL1 AND PLATFORM_DEFAULT_BL1 AND CONFIG_TFM_BOOT_STORE_MEASU
5252
########################## BL2 #################################################
5353

5454
get_property(MCUBOOT_STRATEGY_LIST CACHE MCUBOOT_UPGRADE_STRATEGY PROPERTY STRINGS)
55-
tfm_invalid_config(BL2 AND (NOT MCUBOOT_UPGRADE_STRATEGY IN_LIST MCUBOOT_STRATEGY_LIST))
55+
tfm_invalid_config(BL2 AND (NOT MCUBOOT_UPGRADE_STRATEGY IN_LIST MCUBOOT_STRATEGY_LIST) AND NOT USE_KCONFIG_TOOL)
5656

5757
# Maximum number of MCUBoot images supported by TF-M NV counters and ROTPKs
5858
tfm_invalid_config(MCUBOOT_IMAGE_NUMBER GREATER 4)
@@ -61,7 +61,7 @@ tfm_invalid_config((BL2 AND CONFIG_TFM_BOOT_STORE_MEASUREMENTS AND NOT CONFIG_TF
6161
tfm_invalid_config((NOT (TFM_PARTITION_FIRMWARE_UPDATE OR CONFIG_TFM_BOOT_STORE_MEASUREMENTS)) AND MCUBOOT_DATA_SHARING)
6262

6363
get_property(MCUBOOT_ALIGN_VAL_LIST CACHE MCUBOOT_ALIGN_VAL PROPERTY STRINGS)
64-
tfm_invalid_config(BL2 AND (NOT MCUBOOT_ALIGN_VAL IN_LIST MCUBOOT_ALIGN_VAL_LIST))
64+
tfm_invalid_config(BL2 AND (NOT MCUBOOT_ALIGN_VAL IN_LIST MCUBOOT_ALIGN_VAL_LIST) AND NOT USE_KCONFIG_TOOL)
6565

6666
####################### Code sharing ###########################################
6767

‎config/kconfig.cmake

-10
Original file line numberDiff line numberDiff line change
@@ -278,16 +278,6 @@ if(EXISTS ${CMAKE_SOURCE_DIR}/config/build_type/${CMAKE_BUILD_TYPE_LOWERCASE}.cm
278278
include(${CMAKE_SOURCE_DIR}/config/build_type/${CMAKE_BUILD_TYPE_LOWERCASE}.cmake)
279279
endif()
280280

281-
# Load bl1 config
282-
if(BL1 AND PLATFORM_DEFAULT_BL1)
283-
include(${CMAKE_SOURCE_DIR}/bl1/config/bl1_config_default.cmake)
284-
endif()
285-
286-
# Load MCUboot specific default.cmake
287-
if(NOT DEFINED BL2 OR BL2)
288-
include(${CMAKE_SOURCE_DIR}/bl2/ext/mcuboot/mcuboot_default_config.cmake)
289-
endif()
290-
291281
# Include FWU partition configs.
292282
include(config/tfm_fwu_config.cmake)
293283

‎lib/ext/tf-m-tests/Kconfig

+20-1
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,31 @@
11
#-------------------------------------------------------------------------------
2-
# Copyright (c) 2022, Arm Limited. All rights reserved.
2+
# Copyright (c) 2022-2023, Arm Limited. All rights reserved.
33
#
44
# SPDX-License-Identifier: BSD-3-Clause
55
#
66
#-------------------------------------------------------------------------------
77

88
menu "TF-M regression tests"
99

10+
################################# Bootloader test ##############################
11+
12+
config TEST_BL1_1
13+
bool "BL1_1 tests"
14+
default n
15+
depends on BL1
16+
17+
config TEST_BL1_2
18+
bool "BL1_2 tests"
19+
default n
20+
depends on BL1
21+
22+
config TEST_BL2
23+
bool "BL2 tests"
24+
default n
25+
depends on BL2
26+
27+
################################# Regression test ##############################
28+
1029
config TEST_S
1130
bool "Enable default secure test cases"
1231
default n

‎platform/ext/target/arm/musca_b1/config.cmake

+1-2
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@
1010
set(TFM_CRYPTO_TEST_ALG_CFB OFF CACHE BOOL "Test CFB cryptography mode")
1111
set(PLATFORM_GPLED_ENABLED OFF CACHE BOOL "Use the general purpose LEDs on the platform board")
1212

13-
set(MCUBOOT_DATA_SHARING ON CACHE BOOL "Add sharing of application specific data using the same shared data area as for the measured boot")
14-
1513
set(CRYPTO_HW_ACCELERATOR ON CACHE BOOL "Whether to enable the crypto hardware accelerator on supported platforms")
1614

1715
set(TFM_EXTRA_GENERATED_FILE_LIST_PATH ${CMAKE_SOURCE_DIR}/platform/ext/target/arm/musca_b1/generated_file_list.yaml CACHE PATH "Path to extra generated file list. Appended to stardard TFM generated file list." FORCE)
@@ -35,3 +33,4 @@ set(PLATFORM_HAS_ISOLATION_L3_SUPPORT ON)
3533
set(PLATFORM_SLIH_IRQ_TEST_SUPPORT ON)
3634

3735
set(PLATFORM_HAS_FIRMWARE_UPDATE_SUPPORT ON)
36+
set(MCUBOOT_DATA_SHARING ON)

‎platform/ext/target/arm/rss/common/config.cmake

+2-2
Original file line numberDiff line numberDiff line change
@@ -38,14 +38,12 @@ set(MCUBOOT_IMAGE_NUMBER 4 CACHE STRING "Number of ima
3838
set(DEFAULT_MCUBOOT_FLASH_MAP OFF CACHE BOOL "Whether to use the default flash map defined by TF-M project")
3939
set(MCUBOOT_S_IMAGE_FLASH_AREA_NUM 2 CACHE STRING "ID of the flash area containing the primary Secure image")
4040
set(MCUBOOT_NS_IMAGE_FLASH_AREA_NUM 3 CACHE STRING "ID of the flash area containing the primary Non-Secure image")
41-
set(MCUBOOT_DATA_SHARING ON CACHE BOOL "Add sharing of application specific data using the same shared data area as for the measured boot")
4241
set(CONFIG_TFM_BOOT_STORE_ENCODED_MEASUREMENTS OFF CACHE BOOL "Enable storing of encoded measurements in boot.")
4342

4443
set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
4544
set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
4645
set(TFM_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition")
4746
set(TFM_PARTITION_INTERNAL_TRUSTED_STORAGE OFF CACHE BOOL "Enable Internal Trusted Storage partition")
48-
set(TFM_PARTITION_MEASURED_BOOT ON CACHE BOOL "Enable Measured boot partition")
4947
set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable Platform partition")
5048
set(MEASURED_BOOT_HASH_ALG PSA_ALG_SHA_256 CACHE STRING "Hash algorithm used by Measured boot services")
5149
set(TFM_MBEDCRYPTO_PLATFORM_EXTRA_CONFIG_PATH ${CMAKE_CURRENT_LIST_DIR}/mbedtls_extra_config.h CACHE PATH "Config to append to standard Mbed Crypto config, used by platforms to cnfigure feature support")
@@ -71,3 +69,5 @@ set(TFM_MANIFEST_LIST ${CMAKE_BINARY_DIR}/tools/tfm_manifest_l
7169
# Platform-specific configurations
7270
set(CONFIG_TFM_USE_TRUSTZONE OFF)
7371
set(TFM_MULTI_CORE_TOPOLOGY ON)
72+
set(MCUBOOT_DATA_SHARING ON)
73+
set(TFM_PARTITION_MEASURED_BOOT ON)

‎platform/ext/target/stm/b_u585i_iot02a/config.cmake

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,6 @@ set(MCUBOOT_IMAGE_NUMBER 2 CACHE STRING "Whether to
1414
set(BL2_TRAILER_SIZE 0x2000 CACHE STRING "Trailer size")
1515
set(MCUBOOT_ALIGN_VAL 16 CACHE STRING "Align option to build image with imgtool")
1616
set(MCUBOOT_UPGRADE_STRATEGY "SWAP_USING_SCRATCH" CACHE STRING "Upgrade strategy for images")
17-
set(MCUBOOT_DATA_SHARING ON CACHE BOOL "Enable Data Sharing")
1817
set(MCUBOOT_BOOTSTRAP ON CACHE BOOL "Allow initial state with images in secondary slots(empty primary slots)")
1918
set(MCUBOOT_ENC_IMAGES ON CACHE BOOL "Enable encrypted image upgrade support")
2019
set(MCUBOOT_ENCRYPT_RSA ON CACHE BOOL "Use RSA for encrypted image upgrade support")
@@ -34,3 +33,4 @@ set(CONFIG_TFM_USE_TRUSTZONE ON)
3433
set(TFM_MULTI_CORE_TOPOLOGY OFF)
3534
set(PLATFORM_HAS_FIRMWARE_UPDATE_SUPPORT ON)
3635
set(STSAFEA ON CACHE BOOL "Activate ST SAFE SUPPORT")
36+
set(MCUBOOT_DATA_SHARING ON)

0 commit comments

Comments
 (0)
Please sign in to comment.