Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 1 | # CMakeLists.txt for building mcuboot as a Zephyr project |
| 2 | # |
| 3 | # Copyright (c) 2017 Open Source Foundries Limited |
| 4 | # |
| 5 | # SPDX-License-Identifier: Apache-2.0 |
| 6 | |
Martí Bolívar | 0e3fa72 | 2019-10-22 14:39:33 -0600 | [diff] [blame] | 7 | cmake_minimum_required(VERSION 3.13.1) |
Rajavardhan Gundi | 40c28e3 | 2018-12-09 13:32:01 +0530 | [diff] [blame] | 8 | |
Sergey Koziakov | 24d1be0 | 2019-12-03 15:03:00 +0300 | [diff] [blame] | 9 | # Add a common dts overlay necessary to ensure mcuboot is linked into, |
| 10 | # and fits inside, the boot partition. (If the user specified a |
| 11 | # DTC_OVERLAY_FILE on the CMake command line, we need to append onto |
| 12 | # the list). |
| 13 | if(DTC_OVERLAY_FILE) |
| 14 | set(DTC_OVERLAY_FILE |
| 15 | "${DTC_OVERLAY_FILE} ${CMAKE_CURRENT_LIST_DIR}/dts.overlay" |
| 16 | CACHE STRING "" FORCE |
| 17 | ) |
| 18 | else() |
| 19 | set(DTC_OVERLAY_FILE ${CMAKE_CURRENT_LIST_DIR}/dts.overlay) |
| 20 | endif() |
| 21 | |
Marti Bolivar | aefbd46 | 2017-12-15 03:43:46 -0500 | [diff] [blame] | 22 | # Enable Zephyr runner options which request mass erase if so |
| 23 | # configured. |
| 24 | # |
| 25 | # Note that this also disables the default "leave" option when |
| 26 | # targeting STM32 DfuSe devices with dfu-util, making the chip stay in |
| 27 | # the bootloader after flashing. |
| 28 | # |
| 29 | # That's the right thing, because mcuboot has nothing to do since the |
| 30 | # chip was just erased. The next thing the user is going to want to do |
| 31 | # is flash the application. (Developers can reset DfuSE devices |
| 32 | # manually to test mcuboot behavior on an otherwise erased flash |
| 33 | # device.) |
| 34 | macro(app_set_runner_args) |
Marti Bolivar | 53e2c26 | 2018-04-12 14:13:28 -0400 | [diff] [blame] | 35 | if(CONFIG_ZEPHYR_TRY_MASS_ERASE) |
Marti Bolivar | aefbd46 | 2017-12-15 03:43:46 -0500 | [diff] [blame] | 36 | board_runner_args(dfu-util "--dfuse-modifiers=force:mass-erase") |
Maureen Helm | 4df602a | 2019-02-18 17:26:39 -0600 | [diff] [blame] | 37 | board_runner_args(pyocd "--flash-opt=-e=chip") |
Marti Bolivar | 23e3853 | 2018-03-26 13:14:22 -0400 | [diff] [blame] | 38 | board_runner_args(nrfjprog "--erase") |
Marti Bolivar | aefbd46 | 2017-12-15 03:43:46 -0500 | [diff] [blame] | 39 | endif() |
| 40 | endmacro() |
| 41 | |
Torsten Rasmussen | 43004b8 | 2020-05-28 12:34:15 +0200 | [diff] [blame] | 42 | # find_package(Zephyr) in order to load application boilerplate: |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 43 | # http://docs.zephyrproject.org/application/application.html |
Torsten Rasmussen | 43004b8 | 2020-05-28 12:34:15 +0200 | [diff] [blame] | 44 | find_package(Zephyr REQUIRED HINTS $ENV{ZEPHYR_BASE}) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 45 | project(NONE) |
| 46 | |
| 47 | # Path to "boot" subdirectory of repository root. |
| 48 | get_filename_component(BOOT_DIR ${APPLICATION_SOURCE_DIR} DIRECTORY) |
| 49 | # Path to top-level repository root directory. |
| 50 | get_filename_component(MCUBOOT_DIR ${BOOT_DIR} DIRECTORY) |
| 51 | # Path to tinycrypt library source subdirectory of MCUBOOT_DIR. |
| 52 | set(TINYCRYPT_DIR "${MCUBOOT_DIR}/ext/tinycrypt/lib") |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 53 | assert_exists(TINYCRYPT_DIR) |
Fabio Utzig | 34e93a5 | 2020-02-03 09:59:53 -0300 | [diff] [blame] | 54 | set(TINYCRYPT_SHA512_DIR "${MCUBOOT_DIR}/ext/tinycrypt-sha512/lib") |
| 55 | assert_exists(TINYCRYPT_SHA512_DIR) |
Fabio Utzig | 1171df9 | 2019-05-10 19:26:38 -0300 | [diff] [blame] | 56 | # Path to crypto-fiat |
| 57 | set(FIAT_DIR "${MCUBOOT_DIR}/ext/fiat") |
| 58 | assert_exists(FIAT_DIR) |
Fabio Utzig | 28ee5b0 | 2017-12-12 08:10:40 -0200 | [diff] [blame] | 59 | # Path to mbed-tls' asn1 parser library. |
David Brown | b748f6f | 2019-10-11 10:07:31 -0600 | [diff] [blame] | 60 | set(MBEDTLS_ASN1_DIR "${MCUBOOT_DIR}/ext/mbedtls-asn1") |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 61 | assert_exists(MBEDTLS_ASN1_DIR) |
| 62 | set(NRF_DIR "${MCUBOOT_DIR}/ext/nrf") |
| 63 | |
| 64 | if(CONFIG_BOOT_USE_NRF_CC310_BL) |
Torsten Rasmussen | 33fbef5 | 2020-06-03 20:21:13 +0200 | [diff] [blame] | 65 | set(NRFXLIB_DIR ${ZEPHYR_BASE}/../nrfxlib) |
Andrzej Puzdrowski | f0ef8b6 | 2020-10-01 13:51:48 +0200 | [diff] [blame] | 66 | if(NOT EXISTS ${NRFXLIB_DIR}) |
| 67 | message(FATAL_ERROR " |
| 68 | ------------------------------------------------------------------------ |
| 69 | No such file or directory: ${NRFXLIB_DIR} |
| 70 | The current configuration enables nRF CC310 crypto accelerator hardware |
| 71 | with the `CONFIG_BOOT_USE_NRF_CC310_BL` option. Please follow |
| 72 | `ext/nrf/README.md` guide to fix your setup or use tinycrypt instead of |
| 73 | the HW accelerator. |
| 74 | To use the tinycrypt set `CONFIG_BOOT_ECDSA_TINYCRYPT` to y. |
| 75 | ------------------------------------------------------------------------") |
| 76 | endif() |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 77 | # Don't include this if we are using west |
| 78 | add_subdirectory(${NRFXLIB_DIR} ${PROJECT_BINARY_DIR}/nrfxlib) |
| 79 | endif() |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 80 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 81 | zephyr_library_include_directories( |
| 82 | include |
| 83 | targets |
| 84 | ) |
| 85 | if(EXISTS targets/${BOARD}.h) |
| 86 | zephyr_library_compile_definitions(MCUBOOT_TARGET_CONFIG="${BOARD}.h") |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 87 | endif() |
| 88 | |
| 89 | # Zephyr port-specific sources. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 90 | zephyr_library_sources( |
| 91 | main.c |
| 92 | flash_map_extended.c |
| 93 | os.c |
| 94 | keys.c |
| 95 | ) |
| 96 | |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 97 | if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT) |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 98 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 99 | flash_map_legacy.c |
| 100 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 101 | endif() |
| 102 | |
| 103 | # Generic bootutil sources and includes. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 104 | zephyr_library_include_directories(${BOOT_DIR}/bootutil/include) |
| 105 | zephyr_library_sources( |
Dominik Ermel | 8101c0c | 2020-05-19 13:01:16 +0000 | [diff] [blame] | 106 | ${BOOT_DIR}/bootutil/src/image_validate.c |
| 107 | ${BOOT_DIR}/bootutil/src/tlv.c |
| 108 | ${BOOT_DIR}/bootutil/src/encrypted.c |
| 109 | ${BOOT_DIR}/bootutil/src/image_rsa.c |
| 110 | ${BOOT_DIR}/bootutil/src/image_ec256.c |
| 111 | ${BOOT_DIR}/bootutil/src/image_ed25519.c |
Dominik Ermel | 9b48d08 | 2020-06-08 12:40:06 +0000 | [diff] [blame] | 112 | ${BOOT_DIR}/bootutil/src/bootutil_misc.c |
Tamas Ban | fce8733 | 2020-07-10 12:40:11 +0100 | [diff] [blame] | 113 | ${BOOT_DIR}/bootutil/src/fault_injection_hardening.c |
Dominik Ermel | 8101c0c | 2020-05-19 13:01:16 +0000 | [diff] [blame] | 114 | ) |
| 115 | |
Andrzej Puzdrowski | f573b39 | 2020-11-10 14:35:15 +0100 | [diff] [blame] | 116 | # library which might be common source code for MCUBoot and an application |
| 117 | zephyr_link_libraries(MCUBOOT_BOOTUTIL) |
| 118 | |
Tamas Ban | fce8733 | 2020-07-10 12:40:11 +0100 | [diff] [blame] | 119 | if(CONFIG_BOOT_FIH_PROFILE_HIGH) |
| 120 | zephyr_library_sources( |
| 121 | ${BOOT_DIR}/bootutil/src/fault_injection_hardening_delay_rng_mbedtls.c |
| 122 | ) |
| 123 | endif() |
| 124 | |
Andrzej Puzdrowski | fdff3e1 | 2020-09-15 08:23:25 +0200 | [diff] [blame] | 125 | if(CONFIG_SINGLE_APPLICATION_SLOT) |
Dominik Ermel | 8101c0c | 2020-05-19 13:01:16 +0000 | [diff] [blame] | 126 | zephyr_library_sources( |
| 127 | ${BOOT_DIR}/zephyr/single_loader.c |
| 128 | ) |
| 129 | zephyr_library_include_directories(${BOOT_DIR}/bootutil/src) |
| 130 | else() |
| 131 | zephyr_library_sources( |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 132 | ${BOOT_DIR}/bootutil/src/loader.c |
Fabio Utzig | c58842e | 2019-11-28 10:30:01 -0300 | [diff] [blame] | 133 | ${BOOT_DIR}/bootutil/src/swap_misc.c |
| 134 | ${BOOT_DIR}/bootutil/src/swap_scratch.c |
| 135 | ${BOOT_DIR}/bootutil/src/swap_move.c |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 136 | ${BOOT_DIR}/bootutil/src/caps.c |
| 137 | ) |
Dominik Ermel | 8101c0c | 2020-05-19 13:01:16 +0000 | [diff] [blame] | 138 | endif() |
| 139 | |
Fabio Utzig | 42cc29a | 2019-11-05 07:54:41 -0300 | [diff] [blame] | 140 | if(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256 OR CONFIG_BOOT_ENCRYPT_EC256) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 141 | zephyr_library_include_directories( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 142 | ${MBEDTLS_ASN1_DIR}/include |
| 143 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 144 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 145 | # Additionally pull in just the ASN.1 parser from mbedTLS. |
| 146 | ${MBEDTLS_ASN1_DIR}/src/asn1parse.c |
| 147 | ${MBEDTLS_ASN1_DIR}/src/platform_util.c |
| 148 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 149 | if(CONFIG_BOOT_USE_TINYCRYPT) |
Marti Bolivar | a4818a5 | 2018-04-12 13:02:38 -0400 | [diff] [blame] | 150 | # When using ECDSA signatures, pull in our copy of the tinycrypt library. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 151 | zephyr_library_include_directories( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 152 | ${BOOT_DIR}/zephyr/include |
| 153 | ${TINYCRYPT_DIR}/include |
| 154 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 155 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 156 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 157 | ${TINYCRYPT_DIR}/source/ecc.c |
| 158 | ${TINYCRYPT_DIR}/source/ecc_dsa.c |
| 159 | ${TINYCRYPT_DIR}/source/sha256.c |
| 160 | ${TINYCRYPT_DIR}/source/utils.c |
| 161 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 162 | elseif(CONFIG_BOOT_USE_NRF_CC310_BL) |
| 163 | zephyr_library_sources(${NRF_DIR}/cc310_glue.c) |
| 164 | zephyr_library_include_directories(${NRF_DIR}) |
| 165 | zephyr_link_libraries(nrfxlib_crypto) |
| 166 | endif() |
Fabio Utzig | 28ee5b0 | 2017-12-12 08:10:40 -0200 | [diff] [blame] | 167 | |
Ding Tao | f97cb71 | 2018-06-08 14:37:13 +0000 | [diff] [blame] | 168 | # Since here we are not using Zephyr's mbedTLS but rather our own, we need |
Carles Cufi | 69c61d0 | 2018-06-05 15:56:08 +0200 | [diff] [blame] | 169 | # to set MBEDTLS_CONFIG_FILE ourselves. When using Zephyr's copy, this |
| 170 | # variable is set by its Kconfig in the Zephyr codebase. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 171 | zephyr_library_compile_definitions( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 172 | MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h" |
| 173 | ) |
Arvin Farahmand | fb5ec18 | 2020-05-05 11:44:12 -0400 | [diff] [blame] | 174 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_NONE) |
| 175 | zephyr_library_include_directories( |
| 176 | ${BOOT_DIR}/zephyr/include |
| 177 | ${TINYCRYPT_DIR}/include |
| 178 | ) |
| 179 | |
| 180 | zephyr_library_sources( |
| 181 | ${TINYCRYPT_DIR}/source/sha256.c |
| 182 | ${TINYCRYPT_DIR}/source/utils.c |
| 183 | ) |
Marti Bolivar | a4818a5 | 2018-04-12 13:02:38 -0400 | [diff] [blame] | 184 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_RSA) |
| 185 | # Use mbedTLS provided by Zephyr for RSA signatures. (Its config file |
| 186 | # is set using Kconfig.) |
| 187 | zephyr_include_directories(include) |
Fabio Utzig | b6f014c | 2020-04-02 13:25:01 -0300 | [diff] [blame] | 188 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_ED25519 OR CONFIG_BOOT_ENCRYPT_X25519) |
Fabio Utzig | 34e93a5 | 2020-02-03 09:59:53 -0300 | [diff] [blame] | 189 | if(CONFIG_BOOT_USE_TINYCRYPT) |
| 190 | zephyr_library_include_directories( |
| 191 | ${MBEDTLS_ASN1_DIR}/include |
| 192 | ${BOOT_DIR}/zephyr/include |
| 193 | ${TINYCRYPT_DIR}/include |
| 194 | ${TINYCRYPT_SHA512_DIR}/include |
| 195 | ) |
| 196 | zephyr_library_sources( |
| 197 | ${TINYCRYPT_DIR}/source/sha256.c |
| 198 | ${TINYCRYPT_DIR}/source/utils.c |
| 199 | ${TINYCRYPT_SHA512_DIR}/source/sha512.c |
| 200 | # Additionally pull in just the ASN.1 parser from mbedTLS. |
| 201 | ${MBEDTLS_ASN1_DIR}/src/asn1parse.c |
| 202 | ${MBEDTLS_ASN1_DIR}/src/platform_util.c |
| 203 | ) |
| 204 | zephyr_library_compile_definitions( |
| 205 | MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h" |
| 206 | ) |
| 207 | else() |
| 208 | zephyr_include_directories(include) |
| 209 | endif() |
Fabio Utzig | 1171df9 | 2019-05-10 19:26:38 -0300 | [diff] [blame] | 210 | |
| 211 | zephyr_library_include_directories( |
| 212 | ${BOOT_DIR}/zephyr/include |
| 213 | ${FIAT_DIR}/include/ |
| 214 | ) |
| 215 | |
| 216 | zephyr_library_sources( |
| 217 | ${FIAT_DIR}/src/curve25519.c |
| 218 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 219 | endif() |
Andrzej Puzdrowski | 8e96b83 | 2017-09-08 16:49:14 +0200 | [diff] [blame] | 220 | |
Fabio Utzig | b6f014c | 2020-04-02 13:25:01 -0300 | [diff] [blame] | 221 | if(CONFIG_BOOT_ENCRYPT_EC256 OR CONFIG_BOOT_ENCRYPT_X25519) |
Fabio Utzig | 42cc29a | 2019-11-05 07:54:41 -0300 | [diff] [blame] | 222 | zephyr_library_sources( |
| 223 | ${TINYCRYPT_DIR}/source/aes_encrypt.c |
| 224 | ${TINYCRYPT_DIR}/source/aes_decrypt.c |
| 225 | ${TINYCRYPT_DIR}/source/ctr_mode.c |
| 226 | ${TINYCRYPT_DIR}/source/hmac.c |
| 227 | ${TINYCRYPT_DIR}/source/ecc_dh.c |
| 228 | ) |
| 229 | endif() |
| 230 | |
Fabio Utzig | b6f014c | 2020-04-02 13:25:01 -0300 | [diff] [blame] | 231 | if(CONFIG_BOOT_ENCRYPT_EC256) |
| 232 | zephyr_library_sources( |
| 233 | ${TINYCRYPT_DIR}/source/ecc_dh.c |
| 234 | ) |
| 235 | endif() |
| 236 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 237 | if(CONFIG_MCUBOOT_SERIAL) |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 238 | zephyr_sources(${BOOT_DIR}/zephyr/serial_adapter.c) |
| 239 | zephyr_sources(${BOOT_DIR}/boot_serial/src/boot_serial.c) |
Øyvind Rønningstad | f42a820 | 2019-12-13 03:27:54 +0100 | [diff] [blame] | 240 | zephyr_sources(${BOOT_DIR}/boot_serial/src/serial_recovery_cbor.c) |
| 241 | zephyr_sources(${BOOT_DIR}/boot_serial/src/cbor_decode.c) |
Andrzej Puzdrowski | 8e96b83 | 2017-09-08 16:49:14 +0200 | [diff] [blame] | 242 | |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 243 | zephyr_include_directories(${BOOT_DIR}/bootutil/include) |
| 244 | zephyr_include_directories(${BOOT_DIR}/boot_serial/include) |
| 245 | zephyr_include_directories(include) |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 246 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 247 | zephyr_include_directories_ifdef( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 248 | CONFIG_BOOT_ERASE_PROGRESSIVELY |
| 249 | ${BOOT_DIR}/bootutil/src |
| 250 | ) |
Andrzej Puzdrowski | 8e96b83 | 2017-09-08 16:49:14 +0200 | [diff] [blame] | 251 | endif() |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 252 | |
| 253 | if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "") |
Nico Lastzka | e16f52c | 2021-04-13 16:04:00 +0200 | [diff] [blame] | 254 | # CONF_FILE points to the KConfig configuration files of the bootloader. |
| 255 | foreach (filepath ${CONF_FILE}) |
| 256 | file(READ ${filepath} temp_text) |
| 257 | string(FIND "${temp_text}" ${CONFIG_BOOT_SIGNATURE_KEY_FILE} match) |
| 258 | if (${match} GREATER_EQUAL 0) |
| 259 | if (NOT DEFINED CONF_DIR) |
| 260 | get_filename_component(CONF_DIR ${filepath} DIRECTORY) |
| 261 | else() |
| 262 | message(FATAL_ERROR "Signature key file defined in multiple conf files") |
| 263 | endif() |
| 264 | endif() |
| 265 | endforeach() |
| 266 | |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 267 | if(IS_ABSOLUTE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| 268 | set(KEY_FILE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
Marek Pieta | c1cdcae | 2020-08-12 04:29:12 -0700 | [diff] [blame] | 269 | elseif((DEFINED CONF_DIR) AND |
| 270 | (EXISTS ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE})) |
Marek Pieta | bdcfc85 | 2020-08-04 02:22:55 -0700 | [diff] [blame] | 271 | set(KEY_FILE ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 272 | else() |
| 273 | set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| 274 | endif() |
Marek Pieta | c1cdcae | 2020-08-12 04:29:12 -0700 | [diff] [blame] | 275 | message("MCUBoot bootloader key file: ${KEY_FILE}") |
| 276 | |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 277 | set(GENERATED_PUBKEY ${ZEPHYR_BINARY_DIR}/autogen-pubkey.c) |
| 278 | add_custom_command( |
| 279 | OUTPUT ${GENERATED_PUBKEY} |
| 280 | COMMAND |
| 281 | ${PYTHON_EXECUTABLE} |
| 282 | ${MCUBOOT_DIR}/scripts/imgtool.py |
| 283 | getpub |
| 284 | -k |
| 285 | ${KEY_FILE} |
| 286 | > ${GENERATED_PUBKEY} |
| 287 | DEPENDS ${KEY_FILE} |
| 288 | ) |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 289 | zephyr_library_sources(${GENERATED_PUBKEY}) |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 290 | endif() |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 291 | |
Andrzej Puzdrowski | 9a605b6 | 2020-03-16 13:34:30 +0100 | [diff] [blame] | 292 | if(CONFIG_MCUBOOT_CLEANUP_ARM_CORE) |
| 293 | zephyr_library_sources( |
| 294 | ${BOOT_DIR}/zephyr/arm_cleanup.c |
| 295 | ) |
| 296 | endif() |