Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 1 | # CMakeLists.txt for building mcuboot as a Zephyr project |
| 2 | # |
| 3 | # Copyright (c) 2017 Open Source Foundries Limited |
| 4 | # |
| 5 | # SPDX-License-Identifier: Apache-2.0 |
| 6 | |
| 7 | cmake_minimum_required(VERSION 3.8.2) |
| 8 | |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 9 | # Board-specific CONF_FILES should get merged into the build as well. |
Sebastian Bøe | b94bda0 | 2019-01-22 12:33:18 +0100 | [diff] [blame] | 10 | # Default to qemu_x86 if no board has been specified. |
| 11 | set(BOARD qemu_x86) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 12 | |
Marti Bolivar | 58b321a | 2018-03-20 15:52:47 -0400 | [diff] [blame] | 13 | # Add a common dts overlay necessary to ensure mcuboot is linked into, |
| 14 | # and fits inside, the boot partition. (If the user specified a |
| 15 | # DTC_OVERLAY_FILE on the CMake command line, we need to append onto |
| 16 | # the list). |
| 17 | if(DTC_OVERLAY_FILE) |
| 18 | set(DTC_OVERLAY_FILE |
Sebastian Bøe | ea49cd0 | 2019-04-03 15:14:37 +0200 | [diff] [blame] | 19 | "${DTC_OVERLAY_FILE} ${CMAKE_CURRENT_LIST_DIR}/dts.overlay" |
| 20 | CACHE STRING "" FORCE |
| 21 | ) |
Marti Bolivar | 58b321a | 2018-03-20 15:52:47 -0400 | [diff] [blame] | 22 | else() |
| 23 | set(DTC_OVERLAY_FILE ${CMAKE_CURRENT_LIST_DIR}/dts.overlay) |
| 24 | endif() |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 25 | |
Rajavardhan Gundi | 40c28e3 | 2018-12-09 13:32:01 +0530 | [diff] [blame] | 26 | if (EXISTS ${CMAKE_CURRENT_LIST_DIR}/boards/${BOARD}.overlay) |
| 27 | set(DTC_OVERLAY_FILE |
Sebastian Bøe | ea49cd0 | 2019-04-03 15:14:37 +0200 | [diff] [blame] | 28 | "${DTC_OVERLAY_FILE} ${CMAKE_CURRENT_LIST_DIR}/boards/${BOARD}.overlay" |
| 29 | CACHE STRING "" FORCE |
| 30 | ) |
Rajavardhan Gundi | 40c28e3 | 2018-12-09 13:32:01 +0530 | [diff] [blame] | 31 | endif() |
| 32 | |
Marti Bolivar | aefbd46 | 2017-12-15 03:43:46 -0500 | [diff] [blame] | 33 | # Enable Zephyr runner options which request mass erase if so |
| 34 | # configured. |
| 35 | # |
| 36 | # Note that this also disables the default "leave" option when |
| 37 | # targeting STM32 DfuSe devices with dfu-util, making the chip stay in |
| 38 | # the bootloader after flashing. |
| 39 | # |
| 40 | # That's the right thing, because mcuboot has nothing to do since the |
| 41 | # chip was just erased. The next thing the user is going to want to do |
| 42 | # is flash the application. (Developers can reset DfuSE devices |
| 43 | # manually to test mcuboot behavior on an otherwise erased flash |
| 44 | # device.) |
| 45 | macro(app_set_runner_args) |
Marti Bolivar | 53e2c26 | 2018-04-12 14:13:28 -0400 | [diff] [blame] | 46 | if(CONFIG_ZEPHYR_TRY_MASS_ERASE) |
Marti Bolivar | aefbd46 | 2017-12-15 03:43:46 -0500 | [diff] [blame] | 47 | board_runner_args(dfu-util "--dfuse-modifiers=force:mass-erase") |
Maureen Helm | 4df602a | 2019-02-18 17:26:39 -0600 | [diff] [blame] | 48 | board_runner_args(pyocd "--flash-opt=-e=chip") |
Marti Bolivar | 23e3853 | 2018-03-26 13:14:22 -0400 | [diff] [blame] | 49 | board_runner_args(nrfjprog "--erase") |
Marti Bolivar | aefbd46 | 2017-12-15 03:43:46 -0500 | [diff] [blame] | 50 | endif() |
| 51 | endmacro() |
| 52 | |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 53 | # Standard Zephyr application boilerplate: |
| 54 | # http://docs.zephyrproject.org/application/application.html |
| 55 | include($ENV{ZEPHYR_BASE}/cmake/app/boilerplate.cmake NO_POLICY_SCOPE) |
| 56 | project(NONE) |
| 57 | |
| 58 | # Path to "boot" subdirectory of repository root. |
| 59 | get_filename_component(BOOT_DIR ${APPLICATION_SOURCE_DIR} DIRECTORY) |
| 60 | # Path to top-level repository root directory. |
| 61 | get_filename_component(MCUBOOT_DIR ${BOOT_DIR} DIRECTORY) |
| 62 | # Path to tinycrypt library source subdirectory of MCUBOOT_DIR. |
| 63 | set(TINYCRYPT_DIR "${MCUBOOT_DIR}/ext/tinycrypt/lib") |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 64 | assert_exists(TINYCRYPT_DIR) |
Fabio Utzig | 1171df9 | 2019-05-10 19:26:38 -0300 | [diff] [blame] | 65 | # Path to crypto-fiat |
| 66 | set(FIAT_DIR "${MCUBOOT_DIR}/ext/fiat") |
| 67 | assert_exists(FIAT_DIR) |
Fabio Utzig | 28ee5b0 | 2017-12-12 08:10:40 -0200 | [diff] [blame] | 68 | # Path to mbed-tls' asn1 parser library. |
David Brown | b748f6f | 2019-10-11 10:07:31 -0600 | [diff] [blame] | 69 | set(MBEDTLS_ASN1_DIR "${MCUBOOT_DIR}/ext/mbedtls-asn1") |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 70 | assert_exists(MBEDTLS_ASN1_DIR) |
| 71 | set(NRF_DIR "${MCUBOOT_DIR}/ext/nrf") |
| 72 | |
| 73 | if(CONFIG_BOOT_USE_NRF_CC310_BL) |
| 74 | set(NRFXLIB_DIR ${MCUBOOT_DIR}/../nrfxlib) |
| 75 | assert_exists(NRFXLIB_DIR) |
| 76 | # Don't include this if we are using west |
| 77 | add_subdirectory(${NRFXLIB_DIR} ${PROJECT_BINARY_DIR}/nrfxlib) |
| 78 | endif() |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 79 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 80 | zephyr_library_include_directories( |
| 81 | include |
| 82 | targets |
| 83 | ) |
| 84 | if(EXISTS targets/${BOARD}.h) |
| 85 | zephyr_library_compile_definitions(MCUBOOT_TARGET_CONFIG="${BOARD}.h") |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 86 | endif() |
| 87 | |
| 88 | # Zephyr port-specific sources. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 89 | zephyr_library_sources( |
| 90 | main.c |
| 91 | flash_map_extended.c |
| 92 | os.c |
| 93 | keys.c |
| 94 | ) |
| 95 | |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 96 | if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT) |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 97 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 98 | flash_map_legacy.c |
| 99 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 100 | endif() |
| 101 | |
| 102 | # Generic bootutil sources and includes. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 103 | zephyr_library_include_directories(${BOOT_DIR}/bootutil/include) |
| 104 | zephyr_library_sources( |
| 105 | ${BOOT_DIR}/bootutil/src/loader.c |
| 106 | ${BOOT_DIR}/bootutil/src/bootutil_misc.c |
| 107 | ${BOOT_DIR}/bootutil/src/image_validate.c |
| 108 | ${BOOT_DIR}/bootutil/src/encrypted.c |
| 109 | ${BOOT_DIR}/bootutil/src/image_rsa.c |
| 110 | ${BOOT_DIR}/bootutil/src/image_ec256.c |
Fabio Utzig | 1171df9 | 2019-05-10 19:26:38 -0300 | [diff] [blame] | 111 | ${BOOT_DIR}/bootutil/src/image_ed25519.c |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 112 | ${BOOT_DIR}/bootutil/src/caps.c |
Fabio Utzig | 61fd888 | 2019-09-14 20:00:20 -0300 | [diff] [blame] | 113 | ${BOOT_DIR}/bootutil/src/tlv.c |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 114 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 115 | |
Fabio Utzig | 42cc29a | 2019-11-05 07:54:41 -0300 | [diff] [blame] | 116 | if(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256 OR CONFIG_BOOT_ENCRYPT_EC256) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 117 | zephyr_library_include_directories( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 118 | ${MBEDTLS_ASN1_DIR}/include |
| 119 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 120 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 121 | # Additionally pull in just the ASN.1 parser from mbedTLS. |
| 122 | ${MBEDTLS_ASN1_DIR}/src/asn1parse.c |
| 123 | ${MBEDTLS_ASN1_DIR}/src/platform_util.c |
| 124 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 125 | if(CONFIG_BOOT_USE_TINYCRYPT) |
Marti Bolivar | a4818a5 | 2018-04-12 13:02:38 -0400 | [diff] [blame] | 126 | # When using ECDSA signatures, pull in our copy of the tinycrypt library. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 127 | zephyr_library_include_directories( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 128 | ${BOOT_DIR}/zephyr/include |
| 129 | ${TINYCRYPT_DIR}/include |
| 130 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 131 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 132 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 133 | ${TINYCRYPT_DIR}/source/ecc.c |
| 134 | ${TINYCRYPT_DIR}/source/ecc_dsa.c |
| 135 | ${TINYCRYPT_DIR}/source/sha256.c |
| 136 | ${TINYCRYPT_DIR}/source/utils.c |
| 137 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 138 | elseif(CONFIG_BOOT_USE_NRF_CC310_BL) |
| 139 | zephyr_library_sources(${NRF_DIR}/cc310_glue.c) |
| 140 | zephyr_library_include_directories(${NRF_DIR}) |
| 141 | zephyr_link_libraries(nrfxlib_crypto) |
| 142 | endif() |
Fabio Utzig | 28ee5b0 | 2017-12-12 08:10:40 -0200 | [diff] [blame] | 143 | |
Ding Tao | f97cb71 | 2018-06-08 14:37:13 +0000 | [diff] [blame] | 144 | # Since here we are not using Zephyr's mbedTLS but rather our own, we need |
Carles Cufi | 69c61d0 | 2018-06-05 15:56:08 +0200 | [diff] [blame] | 145 | # to set MBEDTLS_CONFIG_FILE ourselves. When using Zephyr's copy, this |
| 146 | # variable is set by its Kconfig in the Zephyr codebase. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 147 | zephyr_library_compile_definitions( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 148 | MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h" |
| 149 | ) |
Marti Bolivar | a4818a5 | 2018-04-12 13:02:38 -0400 | [diff] [blame] | 150 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_RSA) |
| 151 | # Use mbedTLS provided by Zephyr for RSA signatures. (Its config file |
| 152 | # is set using Kconfig.) |
| 153 | zephyr_include_directories(include) |
Fabio Utzig | 1171df9 | 2019-05-10 19:26:38 -0300 | [diff] [blame] | 154 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_ED25519) |
| 155 | # For ed25519, mbedTLS is used for ASN1 parsing and SHA512 |
| 156 | zephyr_include_directories(include) |
| 157 | |
| 158 | zephyr_library_include_directories( |
| 159 | ${BOOT_DIR}/zephyr/include |
| 160 | ${FIAT_DIR}/include/ |
| 161 | ) |
| 162 | |
| 163 | zephyr_library_sources( |
| 164 | ${FIAT_DIR}/src/curve25519.c |
| 165 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 166 | endif() |
Andrzej Puzdrowski | 8e96b83 | 2017-09-08 16:49:14 +0200 | [diff] [blame] | 167 | |
Fabio Utzig | 42cc29a | 2019-11-05 07:54:41 -0300 | [diff] [blame] | 168 | if(CONFIG_BOOT_ENCRYPT_EC256) |
| 169 | zephyr_library_sources( |
| 170 | ${TINYCRYPT_DIR}/source/aes_encrypt.c |
| 171 | ${TINYCRYPT_DIR}/source/aes_decrypt.c |
| 172 | ${TINYCRYPT_DIR}/source/ctr_mode.c |
| 173 | ${TINYCRYPT_DIR}/source/hmac.c |
| 174 | ${TINYCRYPT_DIR}/source/ecc_dh.c |
| 175 | ) |
| 176 | endif() |
| 177 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 178 | if(CONFIG_MCUBOOT_SERIAL) |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 179 | zephyr_sources(${BOOT_DIR}/zephyr/serial_adapter.c) |
| 180 | zephyr_sources(${BOOT_DIR}/boot_serial/src/boot_serial.c) |
Andrzej Puzdrowski | 8e96b83 | 2017-09-08 16:49:14 +0200 | [diff] [blame] | 181 | |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 182 | zephyr_include_directories(${BOOT_DIR}/bootutil/include) |
| 183 | zephyr_include_directories(${BOOT_DIR}/boot_serial/include) |
| 184 | zephyr_include_directories(include) |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 185 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 186 | zephyr_link_libraries_ifdef( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 187 | CONFIG_TINYCBOR |
| 188 | TINYCBOR |
| 189 | ) |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 190 | |
| 191 | zephyr_include_directories_ifdef( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 192 | CONFIG_BOOT_ERASE_PROGRESSIVELY |
| 193 | ${BOOT_DIR}/bootutil/src |
| 194 | ) |
Andrzej Puzdrowski | 8e96b83 | 2017-09-08 16:49:14 +0200 | [diff] [blame] | 195 | endif() |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 196 | |
| 197 | if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "") |
| 198 | if(IS_ABSOLUTE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| 199 | set(KEY_FILE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| 200 | else() |
| 201 | set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| 202 | endif() |
| 203 | set(GENERATED_PUBKEY ${ZEPHYR_BINARY_DIR}/autogen-pubkey.c) |
| 204 | add_custom_command( |
| 205 | OUTPUT ${GENERATED_PUBKEY} |
| 206 | COMMAND |
| 207 | ${PYTHON_EXECUTABLE} |
| 208 | ${MCUBOOT_DIR}/scripts/imgtool.py |
| 209 | getpub |
| 210 | -k |
| 211 | ${KEY_FILE} |
| 212 | > ${GENERATED_PUBKEY} |
| 213 | DEPENDS ${KEY_FILE} |
| 214 | ) |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 215 | zephyr_library_sources(${GENERATED_PUBKEY}) |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 216 | endif() |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 217 | |