blob: f559844bd7590568004276511f99f8994178b62f [file] [log] [blame]
Marti Bolivarbf909a12017-11-13 19:43:46 -05001# CMakeLists.txt for building mcuboot as a Zephyr project
2#
3# Copyright (c) 2017 Open Source Foundries Limited
4#
5# SPDX-License-Identifier: Apache-2.0
6
Martí Bolívar0e3fa722019-10-22 14:39:33 -06007cmake_minimum_required(VERSION 3.13.1)
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +05308
Sergey Koziakov24d1be02019-12-03 15:03:00 +03009# Add a common dts overlay necessary to ensure mcuboot is linked into,
10# and fits inside, the boot partition. (If the user specified a
11# DTC_OVERLAY_FILE on the CMake command line, we need to append onto
12# the list).
13if(DTC_OVERLAY_FILE)
14 set(DTC_OVERLAY_FILE
15 "${DTC_OVERLAY_FILE} ${CMAKE_CURRENT_LIST_DIR}/dts.overlay"
16 CACHE STRING "" FORCE
17 )
18else()
19 set(DTC_OVERLAY_FILE ${CMAKE_CURRENT_LIST_DIR}/dts.overlay)
20endif()
21
Marti Bolivaraefbd462017-12-15 03:43:46 -050022# Enable Zephyr runner options which request mass erase if so
23# configured.
24#
25# Note that this also disables the default "leave" option when
26# targeting STM32 DfuSe devices with dfu-util, making the chip stay in
27# the bootloader after flashing.
28#
29# That's the right thing, because mcuboot has nothing to do since the
30# chip was just erased. The next thing the user is going to want to do
31# is flash the application. (Developers can reset DfuSE devices
32# manually to test mcuboot behavior on an otherwise erased flash
33# device.)
34macro(app_set_runner_args)
Marti Bolivar53e2c262018-04-12 14:13:28 -040035 if(CONFIG_ZEPHYR_TRY_MASS_ERASE)
Marti Bolivaraefbd462017-12-15 03:43:46 -050036 board_runner_args(dfu-util "--dfuse-modifiers=force:mass-erase")
Maureen Helm4df602a2019-02-18 17:26:39 -060037 board_runner_args(pyocd "--flash-opt=-e=chip")
Marti Bolivar23e38532018-03-26 13:14:22 -040038 board_runner_args(nrfjprog "--erase")
Marti Bolivaraefbd462017-12-15 03:43:46 -050039 endif()
40endmacro()
41
Marti Bolivarbf909a12017-11-13 19:43:46 -050042# Standard Zephyr application boilerplate:
43# http://docs.zephyrproject.org/application/application.html
44include($ENV{ZEPHYR_BASE}/cmake/app/boilerplate.cmake NO_POLICY_SCOPE)
45project(NONE)
46
47# Path to "boot" subdirectory of repository root.
48get_filename_component(BOOT_DIR ${APPLICATION_SOURCE_DIR} DIRECTORY)
49# Path to top-level repository root directory.
50get_filename_component(MCUBOOT_DIR ${BOOT_DIR} DIRECTORY)
51# Path to tinycrypt library source subdirectory of MCUBOOT_DIR.
52set(TINYCRYPT_DIR "${MCUBOOT_DIR}/ext/tinycrypt/lib")
Sigvart Hovlandebd05032019-03-21 10:47:32 +010053assert_exists(TINYCRYPT_DIR)
Fabio Utzig1171df92019-05-10 19:26:38 -030054# Path to crypto-fiat
55set(FIAT_DIR "${MCUBOOT_DIR}/ext/fiat")
56assert_exists(FIAT_DIR)
Fabio Utzig28ee5b02017-12-12 08:10:40 -020057# Path to mbed-tls' asn1 parser library.
David Brownb748f6f2019-10-11 10:07:31 -060058set(MBEDTLS_ASN1_DIR "${MCUBOOT_DIR}/ext/mbedtls-asn1")
Sigvart Hovlandebd05032019-03-21 10:47:32 +010059assert_exists(MBEDTLS_ASN1_DIR)
60set(NRF_DIR "${MCUBOOT_DIR}/ext/nrf")
61
62if(CONFIG_BOOT_USE_NRF_CC310_BL)
63set(NRFXLIB_DIR ${MCUBOOT_DIR}/../nrfxlib)
64assert_exists(NRFXLIB_DIR)
65# Don't include this if we are using west
66 add_subdirectory(${NRFXLIB_DIR} ${PROJECT_BINARY_DIR}/nrfxlib)
67endif()
Marti Bolivarbf909a12017-11-13 19:43:46 -050068
Sebastian Bøebe972172019-01-22 14:05:14 +010069zephyr_library_include_directories(
70 include
71 targets
72 )
73if(EXISTS targets/${BOARD}.h)
74 zephyr_library_compile_definitions(MCUBOOT_TARGET_CONFIG="${BOARD}.h")
Marti Bolivarbf909a12017-11-13 19:43:46 -050075endif()
76
77# Zephyr port-specific sources.
Sebastian Bøebe972172019-01-22 14:05:14 +010078zephyr_library_sources(
79 main.c
80 flash_map_extended.c
81 os.c
82 keys.c
83 )
84
Marti Bolivarbf909a12017-11-13 19:43:46 -050085if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT)
Sebastian Bøebe972172019-01-22 14:05:14 +010086 zephyr_library_sources(
Fabio Utzigccc02802019-11-05 07:55:14 -030087 flash_map_legacy.c
88 )
Marti Bolivarbf909a12017-11-13 19:43:46 -050089endif()
90
91# Generic bootutil sources and includes.
Sebastian Bøebe972172019-01-22 14:05:14 +010092zephyr_library_include_directories(${BOOT_DIR}/bootutil/include)
93zephyr_library_sources(
94 ${BOOT_DIR}/bootutil/src/loader.c
95 ${BOOT_DIR}/bootutil/src/bootutil_misc.c
96 ${BOOT_DIR}/bootutil/src/image_validate.c
97 ${BOOT_DIR}/bootutil/src/encrypted.c
98 ${BOOT_DIR}/bootutil/src/image_rsa.c
99 ${BOOT_DIR}/bootutil/src/image_ec256.c
Fabio Utzig1171df92019-05-10 19:26:38 -0300100 ${BOOT_DIR}/bootutil/src/image_ed25519.c
Sebastian Bøebe972172019-01-22 14:05:14 +0100101 ${BOOT_DIR}/bootutil/src/caps.c
Fabio Utzig61fd8882019-09-14 20:00:20 -0300102 ${BOOT_DIR}/bootutil/src/tlv.c
Sebastian Bøebe972172019-01-22 14:05:14 +0100103 )
Marti Bolivarbf909a12017-11-13 19:43:46 -0500104
Fabio Utzig42cc29a2019-11-05 07:54:41 -0300105if(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256 OR CONFIG_BOOT_ENCRYPT_EC256)
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100106 zephyr_library_include_directories(
Fabio Utzigccc02802019-11-05 07:55:14 -0300107 ${MBEDTLS_ASN1_DIR}/include
108 )
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100109 zephyr_library_sources(
Fabio Utzigccc02802019-11-05 07:55:14 -0300110 # Additionally pull in just the ASN.1 parser from mbedTLS.
111 ${MBEDTLS_ASN1_DIR}/src/asn1parse.c
112 ${MBEDTLS_ASN1_DIR}/src/platform_util.c
113 )
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100114 if(CONFIG_BOOT_USE_TINYCRYPT)
Marti Bolivara4818a52018-04-12 13:02:38 -0400115 # When using ECDSA signatures, pull in our copy of the tinycrypt library.
Sebastian Bøebe972172019-01-22 14:05:14 +0100116 zephyr_library_include_directories(
Fabio Utzigccc02802019-11-05 07:55:14 -0300117 ${BOOT_DIR}/zephyr/include
118 ${TINYCRYPT_DIR}/include
119 )
Marti Bolivarbf909a12017-11-13 19:43:46 -0500120
Sebastian Bøebe972172019-01-22 14:05:14 +0100121 zephyr_library_sources(
Fabio Utzigccc02802019-11-05 07:55:14 -0300122 ${TINYCRYPT_DIR}/source/ecc.c
123 ${TINYCRYPT_DIR}/source/ecc_dsa.c
124 ${TINYCRYPT_DIR}/source/sha256.c
125 ${TINYCRYPT_DIR}/source/utils.c
126 )
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100127 elseif(CONFIG_BOOT_USE_NRF_CC310_BL)
128 zephyr_library_sources(${NRF_DIR}/cc310_glue.c)
129 zephyr_library_include_directories(${NRF_DIR})
130 zephyr_link_libraries(nrfxlib_crypto)
131 endif()
Fabio Utzig28ee5b02017-12-12 08:10:40 -0200132
Ding Taof97cb712018-06-08 14:37:13 +0000133 # Since here we are not using Zephyr's mbedTLS but rather our own, we need
Carles Cufi69c61d02018-06-05 15:56:08 +0200134 # to set MBEDTLS_CONFIG_FILE ourselves. When using Zephyr's copy, this
135 # variable is set by its Kconfig in the Zephyr codebase.
Sebastian Bøebe972172019-01-22 14:05:14 +0100136 zephyr_library_compile_definitions(
Fabio Utzigccc02802019-11-05 07:55:14 -0300137 MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h"
138 )
Marti Bolivara4818a52018-04-12 13:02:38 -0400139elseif(CONFIG_BOOT_SIGNATURE_TYPE_RSA)
140 # Use mbedTLS provided by Zephyr for RSA signatures. (Its config file
141 # is set using Kconfig.)
142 zephyr_include_directories(include)
Fabio Utzig1171df92019-05-10 19:26:38 -0300143elseif(CONFIG_BOOT_SIGNATURE_TYPE_ED25519)
144 # For ed25519, mbedTLS is used for ASN1 parsing and SHA512
145 zephyr_include_directories(include)
146
147 zephyr_library_include_directories(
148 ${BOOT_DIR}/zephyr/include
149 ${FIAT_DIR}/include/
150 )
151
152 zephyr_library_sources(
153 ${FIAT_DIR}/src/curve25519.c
154 )
Marti Bolivarbf909a12017-11-13 19:43:46 -0500155endif()
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200156
Fabio Utzig42cc29a2019-11-05 07:54:41 -0300157if(CONFIG_BOOT_ENCRYPT_EC256)
158 zephyr_library_sources(
159 ${TINYCRYPT_DIR}/source/aes_encrypt.c
160 ${TINYCRYPT_DIR}/source/aes_decrypt.c
161 ${TINYCRYPT_DIR}/source/ctr_mode.c
162 ${TINYCRYPT_DIR}/source/hmac.c
163 ${TINYCRYPT_DIR}/source/ecc_dh.c
164 )
165endif()
166
Sebastian Bøebe972172019-01-22 14:05:14 +0100167if(CONFIG_MCUBOOT_SERIAL)
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200168 zephyr_sources(${BOOT_DIR}/zephyr/serial_adapter.c)
169 zephyr_sources(${BOOT_DIR}/boot_serial/src/boot_serial.c)
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200170
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200171 zephyr_include_directories(${BOOT_DIR}/bootutil/include)
172 zephyr_include_directories(${BOOT_DIR}/boot_serial/include)
173 zephyr_include_directories(include)
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200174
Sebastian Bøebe972172019-01-22 14:05:14 +0100175 zephyr_link_libraries_ifdef(
Fabio Utzigccc02802019-11-05 07:55:14 -0300176 CONFIG_TINYCBOR
177 TINYCBOR
178 )
Sebastian Bøebe972172019-01-22 14:05:14 +0100179
180 zephyr_include_directories_ifdef(
Fabio Utzigccc02802019-11-05 07:55:14 -0300181 CONFIG_BOOT_ERASE_PROGRESSIVELY
182 ${BOOT_DIR}/bootutil/src
183 )
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200184endif()
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300185
186if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "")
187 if(IS_ABSOLUTE ${CONFIG_BOOT_SIGNATURE_KEY_FILE})
188 set(KEY_FILE ${CONFIG_BOOT_SIGNATURE_KEY_FILE})
189 else()
190 set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE})
191 endif()
192 set(GENERATED_PUBKEY ${ZEPHYR_BINARY_DIR}/autogen-pubkey.c)
193 add_custom_command(
194 OUTPUT ${GENERATED_PUBKEY}
195 COMMAND
196 ${PYTHON_EXECUTABLE}
197 ${MCUBOOT_DIR}/scripts/imgtool.py
198 getpub
199 -k
200 ${KEY_FILE}
201 > ${GENERATED_PUBKEY}
202 DEPENDS ${KEY_FILE}
203 )
Sebastian Bøebe972172019-01-22 14:05:14 +0100204 zephyr_library_sources(${GENERATED_PUBKEY})
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300205endif()
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100206