Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 1 | # CMakeLists.txt for building mcuboot as a Zephyr project |
| 2 | # |
| 3 | # Copyright (c) 2017 Open Source Foundries Limited |
| 4 | # |
| 5 | # SPDX-License-Identifier: Apache-2.0 |
| 6 | |
Martí Bolívar | 0e3fa72 | 2019-10-22 14:39:33 -0600 | [diff] [blame^] | 7 | cmake_minimum_required(VERSION 3.13.1) |
Rajavardhan Gundi | 40c28e3 | 2018-12-09 13:32:01 +0530 | [diff] [blame] | 8 | |
Marti Bolivar | aefbd46 | 2017-12-15 03:43:46 -0500 | [diff] [blame] | 9 | # Enable Zephyr runner options which request mass erase if so |
| 10 | # configured. |
| 11 | # |
| 12 | # Note that this also disables the default "leave" option when |
| 13 | # targeting STM32 DfuSe devices with dfu-util, making the chip stay in |
| 14 | # the bootloader after flashing. |
| 15 | # |
| 16 | # That's the right thing, because mcuboot has nothing to do since the |
| 17 | # chip was just erased. The next thing the user is going to want to do |
| 18 | # is flash the application. (Developers can reset DfuSE devices |
| 19 | # manually to test mcuboot behavior on an otherwise erased flash |
| 20 | # device.) |
| 21 | macro(app_set_runner_args) |
Marti Bolivar | 53e2c26 | 2018-04-12 14:13:28 -0400 | [diff] [blame] | 22 | if(CONFIG_ZEPHYR_TRY_MASS_ERASE) |
Marti Bolivar | aefbd46 | 2017-12-15 03:43:46 -0500 | [diff] [blame] | 23 | board_runner_args(dfu-util "--dfuse-modifiers=force:mass-erase") |
Maureen Helm | 4df602a | 2019-02-18 17:26:39 -0600 | [diff] [blame] | 24 | board_runner_args(pyocd "--flash-opt=-e=chip") |
Marti Bolivar | 23e3853 | 2018-03-26 13:14:22 -0400 | [diff] [blame] | 25 | board_runner_args(nrfjprog "--erase") |
Marti Bolivar | aefbd46 | 2017-12-15 03:43:46 -0500 | [diff] [blame] | 26 | endif() |
| 27 | endmacro() |
| 28 | |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 29 | # Standard Zephyr application boilerplate: |
| 30 | # http://docs.zephyrproject.org/application/application.html |
| 31 | include($ENV{ZEPHYR_BASE}/cmake/app/boilerplate.cmake NO_POLICY_SCOPE) |
| 32 | project(NONE) |
| 33 | |
| 34 | # Path to "boot" subdirectory of repository root. |
| 35 | get_filename_component(BOOT_DIR ${APPLICATION_SOURCE_DIR} DIRECTORY) |
| 36 | # Path to top-level repository root directory. |
| 37 | get_filename_component(MCUBOOT_DIR ${BOOT_DIR} DIRECTORY) |
| 38 | # Path to tinycrypt library source subdirectory of MCUBOOT_DIR. |
| 39 | set(TINYCRYPT_DIR "${MCUBOOT_DIR}/ext/tinycrypt/lib") |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 40 | assert_exists(TINYCRYPT_DIR) |
Fabio Utzig | 1171df9 | 2019-05-10 19:26:38 -0300 | [diff] [blame] | 41 | # Path to crypto-fiat |
| 42 | set(FIAT_DIR "${MCUBOOT_DIR}/ext/fiat") |
| 43 | assert_exists(FIAT_DIR) |
Fabio Utzig | 28ee5b0 | 2017-12-12 08:10:40 -0200 | [diff] [blame] | 44 | # Path to mbed-tls' asn1 parser library. |
David Brown | b748f6f | 2019-10-11 10:07:31 -0600 | [diff] [blame] | 45 | set(MBEDTLS_ASN1_DIR "${MCUBOOT_DIR}/ext/mbedtls-asn1") |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 46 | assert_exists(MBEDTLS_ASN1_DIR) |
| 47 | set(NRF_DIR "${MCUBOOT_DIR}/ext/nrf") |
| 48 | |
| 49 | if(CONFIG_BOOT_USE_NRF_CC310_BL) |
| 50 | set(NRFXLIB_DIR ${MCUBOOT_DIR}/../nrfxlib) |
| 51 | assert_exists(NRFXLIB_DIR) |
| 52 | # Don't include this if we are using west |
| 53 | add_subdirectory(${NRFXLIB_DIR} ${PROJECT_BINARY_DIR}/nrfxlib) |
| 54 | endif() |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 55 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 56 | zephyr_library_include_directories( |
| 57 | include |
| 58 | targets |
| 59 | ) |
| 60 | if(EXISTS targets/${BOARD}.h) |
| 61 | zephyr_library_compile_definitions(MCUBOOT_TARGET_CONFIG="${BOARD}.h") |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 62 | endif() |
| 63 | |
| 64 | # Zephyr port-specific sources. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 65 | zephyr_library_sources( |
| 66 | main.c |
| 67 | flash_map_extended.c |
| 68 | os.c |
| 69 | keys.c |
| 70 | ) |
| 71 | |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 72 | if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT) |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 73 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 74 | flash_map_legacy.c |
| 75 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 76 | endif() |
| 77 | |
| 78 | # Generic bootutil sources and includes. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 79 | zephyr_library_include_directories(${BOOT_DIR}/bootutil/include) |
| 80 | zephyr_library_sources( |
| 81 | ${BOOT_DIR}/bootutil/src/loader.c |
| 82 | ${BOOT_DIR}/bootutil/src/bootutil_misc.c |
| 83 | ${BOOT_DIR}/bootutil/src/image_validate.c |
| 84 | ${BOOT_DIR}/bootutil/src/encrypted.c |
| 85 | ${BOOT_DIR}/bootutil/src/image_rsa.c |
| 86 | ${BOOT_DIR}/bootutil/src/image_ec256.c |
Fabio Utzig | 1171df9 | 2019-05-10 19:26:38 -0300 | [diff] [blame] | 87 | ${BOOT_DIR}/bootutil/src/image_ed25519.c |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 88 | ${BOOT_DIR}/bootutil/src/caps.c |
Fabio Utzig | 61fd888 | 2019-09-14 20:00:20 -0300 | [diff] [blame] | 89 | ${BOOT_DIR}/bootutil/src/tlv.c |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 90 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 91 | |
Fabio Utzig | 42cc29a | 2019-11-05 07:54:41 -0300 | [diff] [blame] | 92 | if(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256 OR CONFIG_BOOT_ENCRYPT_EC256) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 93 | zephyr_library_include_directories( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 94 | ${MBEDTLS_ASN1_DIR}/include |
| 95 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 96 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 97 | # Additionally pull in just the ASN.1 parser from mbedTLS. |
| 98 | ${MBEDTLS_ASN1_DIR}/src/asn1parse.c |
| 99 | ${MBEDTLS_ASN1_DIR}/src/platform_util.c |
| 100 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 101 | if(CONFIG_BOOT_USE_TINYCRYPT) |
Marti Bolivar | a4818a5 | 2018-04-12 13:02:38 -0400 | [diff] [blame] | 102 | # When using ECDSA signatures, pull in our copy of the tinycrypt library. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 103 | zephyr_library_include_directories( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 104 | ${BOOT_DIR}/zephyr/include |
| 105 | ${TINYCRYPT_DIR}/include |
| 106 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 107 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 108 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 109 | ${TINYCRYPT_DIR}/source/ecc.c |
| 110 | ${TINYCRYPT_DIR}/source/ecc_dsa.c |
| 111 | ${TINYCRYPT_DIR}/source/sha256.c |
| 112 | ${TINYCRYPT_DIR}/source/utils.c |
| 113 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 114 | elseif(CONFIG_BOOT_USE_NRF_CC310_BL) |
| 115 | zephyr_library_sources(${NRF_DIR}/cc310_glue.c) |
| 116 | zephyr_library_include_directories(${NRF_DIR}) |
| 117 | zephyr_link_libraries(nrfxlib_crypto) |
| 118 | endif() |
Fabio Utzig | 28ee5b0 | 2017-12-12 08:10:40 -0200 | [diff] [blame] | 119 | |
Ding Tao | f97cb71 | 2018-06-08 14:37:13 +0000 | [diff] [blame] | 120 | # Since here we are not using Zephyr's mbedTLS but rather our own, we need |
Carles Cufi | 69c61d0 | 2018-06-05 15:56:08 +0200 | [diff] [blame] | 121 | # to set MBEDTLS_CONFIG_FILE ourselves. When using Zephyr's copy, this |
| 122 | # variable is set by its Kconfig in the Zephyr codebase. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 123 | zephyr_library_compile_definitions( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 124 | MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h" |
| 125 | ) |
Marti Bolivar | a4818a5 | 2018-04-12 13:02:38 -0400 | [diff] [blame] | 126 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_RSA) |
| 127 | # Use mbedTLS provided by Zephyr for RSA signatures. (Its config file |
| 128 | # is set using Kconfig.) |
| 129 | zephyr_include_directories(include) |
Fabio Utzig | 1171df9 | 2019-05-10 19:26:38 -0300 | [diff] [blame] | 130 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_ED25519) |
| 131 | # For ed25519, mbedTLS is used for ASN1 parsing and SHA512 |
| 132 | zephyr_include_directories(include) |
| 133 | |
| 134 | zephyr_library_include_directories( |
| 135 | ${BOOT_DIR}/zephyr/include |
| 136 | ${FIAT_DIR}/include/ |
| 137 | ) |
| 138 | |
| 139 | zephyr_library_sources( |
| 140 | ${FIAT_DIR}/src/curve25519.c |
| 141 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 142 | endif() |
Andrzej Puzdrowski | 8e96b83 | 2017-09-08 16:49:14 +0200 | [diff] [blame] | 143 | |
Fabio Utzig | 42cc29a | 2019-11-05 07:54:41 -0300 | [diff] [blame] | 144 | if(CONFIG_BOOT_ENCRYPT_EC256) |
| 145 | zephyr_library_sources( |
| 146 | ${TINYCRYPT_DIR}/source/aes_encrypt.c |
| 147 | ${TINYCRYPT_DIR}/source/aes_decrypt.c |
| 148 | ${TINYCRYPT_DIR}/source/ctr_mode.c |
| 149 | ${TINYCRYPT_DIR}/source/hmac.c |
| 150 | ${TINYCRYPT_DIR}/source/ecc_dh.c |
| 151 | ) |
| 152 | endif() |
| 153 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 154 | if(CONFIG_MCUBOOT_SERIAL) |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 155 | zephyr_sources(${BOOT_DIR}/zephyr/serial_adapter.c) |
| 156 | zephyr_sources(${BOOT_DIR}/boot_serial/src/boot_serial.c) |
Andrzej Puzdrowski | 8e96b83 | 2017-09-08 16:49:14 +0200 | [diff] [blame] | 157 | |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 158 | zephyr_include_directories(${BOOT_DIR}/bootutil/include) |
| 159 | zephyr_include_directories(${BOOT_DIR}/boot_serial/include) |
| 160 | zephyr_include_directories(include) |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 161 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 162 | zephyr_link_libraries_ifdef( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 163 | CONFIG_TINYCBOR |
| 164 | TINYCBOR |
| 165 | ) |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 166 | |
| 167 | zephyr_include_directories_ifdef( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 168 | CONFIG_BOOT_ERASE_PROGRESSIVELY |
| 169 | ${BOOT_DIR}/bootutil/src |
| 170 | ) |
Andrzej Puzdrowski | 8e96b83 | 2017-09-08 16:49:14 +0200 | [diff] [blame] | 171 | endif() |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 172 | |
| 173 | if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "") |
| 174 | if(IS_ABSOLUTE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| 175 | set(KEY_FILE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| 176 | else() |
| 177 | set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| 178 | endif() |
| 179 | set(GENERATED_PUBKEY ${ZEPHYR_BINARY_DIR}/autogen-pubkey.c) |
| 180 | add_custom_command( |
| 181 | OUTPUT ${GENERATED_PUBKEY} |
| 182 | COMMAND |
| 183 | ${PYTHON_EXECUTABLE} |
| 184 | ${MCUBOOT_DIR}/scripts/imgtool.py |
| 185 | getpub |
| 186 | -k |
| 187 | ${KEY_FILE} |
| 188 | > ${GENERATED_PUBKEY} |
| 189 | DEPENDS ${KEY_FILE} |
| 190 | ) |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 191 | zephyr_library_sources(${GENERATED_PUBKEY}) |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 192 | endif() |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 193 | |