| # CMakeLists.txt for building mcuboot as a Zephyr project |
| # |
| # Copyright (c) 2017 Open Source Foundries Limited |
| # |
| # SPDX-License-Identifier: Apache-2.0 |
| |
| cmake_minimum_required(VERSION 3.13.1) |
| |
| # Add a common dts overlay necessary to ensure mcuboot is linked into, |
| # and fits inside, the boot partition. (If the user specified a |
| # DTC_OVERLAY_FILE on the CMake command line, we need to append onto |
| # the list). |
| if(DTC_OVERLAY_FILE) |
| set(DTC_OVERLAY_FILE |
| "${DTC_OVERLAY_FILE} ${CMAKE_CURRENT_LIST_DIR}/dts.overlay" |
| CACHE STRING "" FORCE |
| ) |
| else() |
| set(DTC_OVERLAY_FILE ${CMAKE_CURRENT_LIST_DIR}/dts.overlay) |
| endif() |
| |
| # Enable Zephyr runner options which request mass erase if so |
| # configured. |
| # |
| # Note that this also disables the default "leave" option when |
| # targeting STM32 DfuSe devices with dfu-util, making the chip stay in |
| # the bootloader after flashing. |
| # |
| # That's the right thing, because mcuboot has nothing to do since the |
| # chip was just erased. The next thing the user is going to want to do |
| # is flash the application. (Developers can reset DfuSE devices |
| # manually to test mcuboot behavior on an otherwise erased flash |
| # device.) |
| macro(app_set_runner_args) |
| if(CONFIG_ZEPHYR_TRY_MASS_ERASE) |
| board_runner_args(dfu-util "--dfuse-modifiers=force:mass-erase") |
| board_runner_args(pyocd "--flash-opt=-e=chip") |
| board_runner_args(nrfjprog "--erase") |
| endif() |
| endmacro() |
| |
| # find_package(Zephyr) in order to load application boilerplate: |
| # http://docs.zephyrproject.org/application/application.html |
| find_package(Zephyr REQUIRED HINTS $ENV{ZEPHYR_BASE}) |
| project(NONE) |
| |
| # Path to "boot" subdirectory of repository root. |
| get_filename_component(BOOT_DIR ${APPLICATION_SOURCE_DIR} DIRECTORY) |
| # Path to top-level repository root directory. |
| get_filename_component(MCUBOOT_DIR ${BOOT_DIR} DIRECTORY) |
| # Path to tinycrypt library source subdirectory of MCUBOOT_DIR. |
| set(TINYCRYPT_DIR "${MCUBOOT_DIR}/ext/tinycrypt/lib") |
| assert_exists(TINYCRYPT_DIR) |
| set(TINYCRYPT_SHA512_DIR "${MCUBOOT_DIR}/ext/tinycrypt-sha512/lib") |
| assert_exists(TINYCRYPT_SHA512_DIR) |
| # Path to crypto-fiat |
| set(FIAT_DIR "${MCUBOOT_DIR}/ext/fiat") |
| assert_exists(FIAT_DIR) |
| # Path to mbed-tls' asn1 parser library. |
| set(MBEDTLS_ASN1_DIR "${MCUBOOT_DIR}/ext/mbedtls-asn1") |
| assert_exists(MBEDTLS_ASN1_DIR) |
| set(NRF_DIR "${MCUBOOT_DIR}/ext/nrf") |
| |
| if(CONFIG_BOOT_USE_NRF_CC310_BL) |
| set(NRFXLIB_DIR ${ZEPHYR_BASE}/../nrfxlib) |
| if(NOT EXISTS ${NRFXLIB_DIR}) |
| message(FATAL_ERROR " |
| ------------------------------------------------------------------------ |
| No such file or directory: ${NRFXLIB_DIR} |
| The current configuration enables nRF CC310 crypto accelerator hardware |
| with the `CONFIG_BOOT_USE_NRF_CC310_BL` option. Please follow |
| `ext/nrf/README.md` guide to fix your setup or use tinycrypt instead of |
| the HW accelerator. |
| To use the tinycrypt set `CONFIG_BOOT_ECDSA_TINYCRYPT` to y. |
| ------------------------------------------------------------------------") |
| endif() |
| # Don't include this if we are using west |
| add_subdirectory(${NRFXLIB_DIR} ${PROJECT_BINARY_DIR}/nrfxlib) |
| endif() |
| |
| zephyr_library_include_directories( |
| include |
| targets |
| ) |
| if(EXISTS targets/${BOARD}.h) |
| zephyr_library_compile_definitions(MCUBOOT_TARGET_CONFIG="${BOARD}.h") |
| endif() |
| |
| # Zephyr port-specific sources. |
| zephyr_library_sources( |
| main.c |
| flash_map_extended.c |
| os.c |
| keys.c |
| ) |
| |
| if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT) |
| zephyr_library_sources( |
| flash_map_legacy.c |
| ) |
| endif() |
| |
| # Generic bootutil sources and includes. |
| zephyr_library_include_directories(${BOOT_DIR}/bootutil/include) |
| zephyr_library_sources( |
| ${BOOT_DIR}/bootutil/src/image_validate.c |
| ${BOOT_DIR}/bootutil/src/tlv.c |
| ${BOOT_DIR}/bootutil/src/encrypted.c |
| ${BOOT_DIR}/bootutil/src/image_rsa.c |
| ${BOOT_DIR}/bootutil/src/image_ec256.c |
| ${BOOT_DIR}/bootutil/src/image_ed25519.c |
| ${BOOT_DIR}/bootutil/src/bootutil_misc.c |
| ${BOOT_DIR}/bootutil/src/fault_injection_hardening.c |
| ) |
| |
| # library which might be common source code for MCUBoot and an application |
| zephyr_link_libraries(MCUBOOT_BOOTUTIL) |
| |
| if(CONFIG_BOOT_FIH_PROFILE_HIGH) |
| zephyr_library_sources( |
| ${BOOT_DIR}/bootutil/src/fault_injection_hardening_delay_rng_mbedtls.c |
| ) |
| endif() |
| |
| if(CONFIG_SINGLE_APPLICATION_SLOT) |
| zephyr_library_sources( |
| ${BOOT_DIR}/zephyr/single_loader.c |
| ) |
| zephyr_library_include_directories(${BOOT_DIR}/bootutil/src) |
| else() |
| zephyr_library_sources( |
| ${BOOT_DIR}/bootutil/src/loader.c |
| ${BOOT_DIR}/bootutil/src/swap_misc.c |
| ${BOOT_DIR}/bootutil/src/swap_scratch.c |
| ${BOOT_DIR}/bootutil/src/swap_move.c |
| ${BOOT_DIR}/bootutil/src/caps.c |
| ) |
| endif() |
| |
| if(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256 OR CONFIG_BOOT_ENCRYPT_EC256) |
| zephyr_library_include_directories( |
| ${MBEDTLS_ASN1_DIR}/include |
| ) |
| zephyr_library_sources( |
| # Additionally pull in just the ASN.1 parser from mbedTLS. |
| ${MBEDTLS_ASN1_DIR}/src/asn1parse.c |
| ${MBEDTLS_ASN1_DIR}/src/platform_util.c |
| ) |
| if(CONFIG_BOOT_USE_TINYCRYPT) |
| # When using ECDSA signatures, pull in our copy of the tinycrypt library. |
| zephyr_library_include_directories( |
| ${BOOT_DIR}/zephyr/include |
| ${TINYCRYPT_DIR}/include |
| ) |
| |
| zephyr_library_sources( |
| ${TINYCRYPT_DIR}/source/ecc.c |
| ${TINYCRYPT_DIR}/source/ecc_dsa.c |
| ${TINYCRYPT_DIR}/source/sha256.c |
| ${TINYCRYPT_DIR}/source/utils.c |
| ) |
| elseif(CONFIG_BOOT_USE_NRF_CC310_BL) |
| zephyr_library_sources(${NRF_DIR}/cc310_glue.c) |
| zephyr_library_include_directories(${NRF_DIR}) |
| zephyr_link_libraries(nrfxlib_crypto) |
| endif() |
| |
| # Since here we are not using Zephyr's mbedTLS but rather our own, we need |
| # to set MBEDTLS_CONFIG_FILE ourselves. When using Zephyr's copy, this |
| # variable is set by its Kconfig in the Zephyr codebase. |
| zephyr_library_compile_definitions( |
| MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h" |
| ) |
| elseif(CONFIG_BOOT_SIGNATURE_TYPE_NONE) |
| zephyr_library_include_directories( |
| ${BOOT_DIR}/zephyr/include |
| ${TINYCRYPT_DIR}/include |
| ) |
| |
| zephyr_library_sources( |
| ${TINYCRYPT_DIR}/source/sha256.c |
| ${TINYCRYPT_DIR}/source/utils.c |
| ) |
| elseif(CONFIG_BOOT_SIGNATURE_TYPE_RSA) |
| # Use mbedTLS provided by Zephyr for RSA signatures. (Its config file |
| # is set using Kconfig.) |
| zephyr_include_directories(include) |
| elseif(CONFIG_BOOT_SIGNATURE_TYPE_ED25519 OR CONFIG_BOOT_ENCRYPT_X25519) |
| if(CONFIG_BOOT_USE_TINYCRYPT) |
| zephyr_library_include_directories( |
| ${MBEDTLS_ASN1_DIR}/include |
| ${BOOT_DIR}/zephyr/include |
| ${TINYCRYPT_DIR}/include |
| ${TINYCRYPT_SHA512_DIR}/include |
| ) |
| zephyr_library_sources( |
| ${TINYCRYPT_DIR}/source/sha256.c |
| ${TINYCRYPT_DIR}/source/utils.c |
| ${TINYCRYPT_SHA512_DIR}/source/sha512.c |
| # Additionally pull in just the ASN.1 parser from mbedTLS. |
| ${MBEDTLS_ASN1_DIR}/src/asn1parse.c |
| ${MBEDTLS_ASN1_DIR}/src/platform_util.c |
| ) |
| zephyr_library_compile_definitions( |
| MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h" |
| ) |
| else() |
| zephyr_include_directories(include) |
| endif() |
| |
| zephyr_library_include_directories( |
| ${BOOT_DIR}/zephyr/include |
| ${FIAT_DIR}/include/ |
| ) |
| |
| zephyr_library_sources( |
| ${FIAT_DIR}/src/curve25519.c |
| ) |
| endif() |
| |
| if(CONFIG_BOOT_ENCRYPT_EC256 OR CONFIG_BOOT_ENCRYPT_X25519) |
| zephyr_library_sources( |
| ${TINYCRYPT_DIR}/source/aes_encrypt.c |
| ${TINYCRYPT_DIR}/source/aes_decrypt.c |
| ${TINYCRYPT_DIR}/source/ctr_mode.c |
| ${TINYCRYPT_DIR}/source/hmac.c |
| ${TINYCRYPT_DIR}/source/ecc_dh.c |
| ) |
| endif() |
| |
| if(CONFIG_BOOT_ENCRYPT_EC256) |
| zephyr_library_sources( |
| ${TINYCRYPT_DIR}/source/ecc_dh.c |
| ) |
| endif() |
| |
| if(CONFIG_MCUBOOT_SERIAL) |
| zephyr_sources(${BOOT_DIR}/zephyr/serial_adapter.c) |
| zephyr_sources(${BOOT_DIR}/boot_serial/src/boot_serial.c) |
| zephyr_sources(${BOOT_DIR}/boot_serial/src/serial_recovery_cbor.c) |
| zephyr_sources(${BOOT_DIR}/boot_serial/src/cbor_decode.c) |
| |
| zephyr_include_directories(${BOOT_DIR}/bootutil/include) |
| zephyr_include_directories(${BOOT_DIR}/boot_serial/include) |
| zephyr_include_directories(include) |
| |
| zephyr_include_directories_ifdef( |
| CONFIG_BOOT_ERASE_PROGRESSIVELY |
| ${BOOT_DIR}/bootutil/src |
| ) |
| endif() |
| |
| if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "") |
| # CONF_FILE points to the KConfig configuration files of the bootloader. |
| foreach (filepath ${CONF_FILE}) |
| file(READ ${filepath} temp_text) |
| string(FIND "${temp_text}" ${CONFIG_BOOT_SIGNATURE_KEY_FILE} match) |
| if (${match} GREATER_EQUAL 0) |
| if (NOT DEFINED CONF_DIR) |
| get_filename_component(CONF_DIR ${filepath} DIRECTORY) |
| else() |
| message(FATAL_ERROR "Signature key file defined in multiple conf files") |
| endif() |
| endif() |
| endforeach() |
| |
| if(IS_ABSOLUTE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| set(KEY_FILE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| elseif((DEFINED CONF_DIR) AND |
| (EXISTS ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE})) |
| set(KEY_FILE ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| else() |
| set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| endif() |
| message("MCUBoot bootloader key file: ${KEY_FILE}") |
| |
| set(GENERATED_PUBKEY ${ZEPHYR_BINARY_DIR}/autogen-pubkey.c) |
| add_custom_command( |
| OUTPUT ${GENERATED_PUBKEY} |
| COMMAND |
| ${PYTHON_EXECUTABLE} |
| ${MCUBOOT_DIR}/scripts/imgtool.py |
| getpub |
| -k |
| ${KEY_FILE} |
| > ${GENERATED_PUBKEY} |
| DEPENDS ${KEY_FILE} |
| ) |
| zephyr_library_sources(${GENERATED_PUBKEY}) |
| endif() |
| |
| if(CONFIG_MCUBOOT_CLEANUP_ARM_CORE) |
| zephyr_library_sources( |
| ${BOOT_DIR}/zephyr/arm_cleanup.c |
| ) |
| endif() |