blob: 026ce2b30d47b830aebb914a8cf4a0f45b33a145 [file] [log] [blame]
Marti Bolivarbf909a12017-11-13 19:43:46 -05001# CMakeLists.txt for building mcuboot as a Zephyr project
2#
3# Copyright (c) 2017 Open Source Foundries Limited
4#
5# SPDX-License-Identifier: Apache-2.0
6
Martí Bolívar0e3fa722019-10-22 14:39:33 -06007cmake_minimum_required(VERSION 3.13.1)
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +05308
Sergey Koziakov24d1be02019-12-03 15:03:00 +03009# Add a common dts overlay necessary to ensure mcuboot is linked into,
10# and fits inside, the boot partition. (If the user specified a
11# DTC_OVERLAY_FILE on the CMake command line, we need to append onto
12# the list).
13if(DTC_OVERLAY_FILE)
14 set(DTC_OVERLAY_FILE
15 "${DTC_OVERLAY_FILE} ${CMAKE_CURRENT_LIST_DIR}/dts.overlay"
16 CACHE STRING "" FORCE
17 )
18else()
19 set(DTC_OVERLAY_FILE ${CMAKE_CURRENT_LIST_DIR}/dts.overlay)
20endif()
21
Marti Bolivaraefbd462017-12-15 03:43:46 -050022# Enable Zephyr runner options which request mass erase if so
23# configured.
24#
25# Note that this also disables the default "leave" option when
26# targeting STM32 DfuSe devices with dfu-util, making the chip stay in
27# the bootloader after flashing.
28#
29# That's the right thing, because mcuboot has nothing to do since the
30# chip was just erased. The next thing the user is going to want to do
31# is flash the application. (Developers can reset DfuSE devices
32# manually to test mcuboot behavior on an otherwise erased flash
33# device.)
34macro(app_set_runner_args)
Marti Bolivar53e2c262018-04-12 14:13:28 -040035 if(CONFIG_ZEPHYR_TRY_MASS_ERASE)
Marti Bolivaraefbd462017-12-15 03:43:46 -050036 board_runner_args(dfu-util "--dfuse-modifiers=force:mass-erase")
Maureen Helm4df602a2019-02-18 17:26:39 -060037 board_runner_args(pyocd "--flash-opt=-e=chip")
Marti Bolivar23e38532018-03-26 13:14:22 -040038 board_runner_args(nrfjprog "--erase")
Marti Bolivaraefbd462017-12-15 03:43:46 -050039 endif()
40endmacro()
41
Torsten Rasmussen43004b82020-05-28 12:34:15 +020042# find_package(Zephyr) in order to load application boilerplate:
Marti Bolivarbf909a12017-11-13 19:43:46 -050043# http://docs.zephyrproject.org/application/application.html
Torsten Rasmussen43004b82020-05-28 12:34:15 +020044find_package(Zephyr REQUIRED HINTS $ENV{ZEPHYR_BASE})
Marti Bolivarbf909a12017-11-13 19:43:46 -050045project(NONE)
46
47# Path to "boot" subdirectory of repository root.
48get_filename_component(BOOT_DIR ${APPLICATION_SOURCE_DIR} DIRECTORY)
49# Path to top-level repository root directory.
50get_filename_component(MCUBOOT_DIR ${BOOT_DIR} DIRECTORY)
51# Path to tinycrypt library source subdirectory of MCUBOOT_DIR.
52set(TINYCRYPT_DIR "${MCUBOOT_DIR}/ext/tinycrypt/lib")
Sigvart Hovlandebd05032019-03-21 10:47:32 +010053assert_exists(TINYCRYPT_DIR)
Fabio Utzig34e93a52020-02-03 09:59:53 -030054set(TINYCRYPT_SHA512_DIR "${MCUBOOT_DIR}/ext/tinycrypt-sha512/lib")
55assert_exists(TINYCRYPT_SHA512_DIR)
Fabio Utzig1171df92019-05-10 19:26:38 -030056# Path to crypto-fiat
57set(FIAT_DIR "${MCUBOOT_DIR}/ext/fiat")
58assert_exists(FIAT_DIR)
Fabio Utzig28ee5b02017-12-12 08:10:40 -020059# Path to mbed-tls' asn1 parser library.
David Brownb748f6f2019-10-11 10:07:31 -060060set(MBEDTLS_ASN1_DIR "${MCUBOOT_DIR}/ext/mbedtls-asn1")
Sigvart Hovlandebd05032019-03-21 10:47:32 +010061assert_exists(MBEDTLS_ASN1_DIR)
62set(NRF_DIR "${MCUBOOT_DIR}/ext/nrf")
63
64if(CONFIG_BOOT_USE_NRF_CC310_BL)
Torsten Rasmussen33fbef52020-06-03 20:21:13 +020065set(NRFXLIB_DIR ${ZEPHYR_BASE}/../nrfxlib)
Andrzej Puzdrowskif0ef8b62020-10-01 13:51:48 +020066if(NOT EXISTS ${NRFXLIB_DIR})
67 message(FATAL_ERROR "
68 ------------------------------------------------------------------------
69 No such file or directory: ${NRFXLIB_DIR}
70 The current configuration enables nRF CC310 crypto accelerator hardware
71 with the `CONFIG_BOOT_USE_NRF_CC310_BL` option. Please follow
72 `ext/nrf/README.md` guide to fix your setup or use tinycrypt instead of
73 the HW accelerator.
74 To use the tinycrypt set `CONFIG_BOOT_ECDSA_TINYCRYPT` to y.
75 ------------------------------------------------------------------------")
76endif()
Sigvart Hovlandebd05032019-03-21 10:47:32 +010077# Don't include this if we are using west
78 add_subdirectory(${NRFXLIB_DIR} ${PROJECT_BINARY_DIR}/nrfxlib)
79endif()
Marti Bolivarbf909a12017-11-13 19:43:46 -050080
Sebastian Bøebe972172019-01-22 14:05:14 +010081zephyr_library_include_directories(
82 include
83 targets
84 )
85if(EXISTS targets/${BOARD}.h)
86 zephyr_library_compile_definitions(MCUBOOT_TARGET_CONFIG="${BOARD}.h")
Marti Bolivarbf909a12017-11-13 19:43:46 -050087endif()
88
89# Zephyr port-specific sources.
Sebastian Bøebe972172019-01-22 14:05:14 +010090zephyr_library_sources(
91 main.c
92 flash_map_extended.c
93 os.c
94 keys.c
95 )
96
Roman Okhrimenko977b3752022-03-31 14:40:48 +030097if(DEFINED CONFIG_ENABLE_MGMT_PERUSER)
98 zephyr_library_sources(
99 boot_serial_extensions.c
100 )
101endif()
102
Marti Bolivarbf909a12017-11-13 19:43:46 -0500103if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT)
Sebastian Bøebe972172019-01-22 14:05:14 +0100104 zephyr_library_sources(
Fabio Utzigccc02802019-11-05 07:55:14 -0300105 flash_map_legacy.c
106 )
Marti Bolivarbf909a12017-11-13 19:43:46 -0500107endif()
108
109# Generic bootutil sources and includes.
Sebastian Bøebe972172019-01-22 14:05:14 +0100110zephyr_library_include_directories(${BOOT_DIR}/bootutil/include)
111zephyr_library_sources(
Dominik Ermel8101c0c2020-05-19 13:01:16 +0000112 ${BOOT_DIR}/bootutil/src/image_validate.c
113 ${BOOT_DIR}/bootutil/src/tlv.c
114 ${BOOT_DIR}/bootutil/src/encrypted.c
115 ${BOOT_DIR}/bootutil/src/image_rsa.c
116 ${BOOT_DIR}/bootutil/src/image_ec256.c
117 ${BOOT_DIR}/bootutil/src/image_ed25519.c
Dominik Ermel9b48d082020-06-08 12:40:06 +0000118 ${BOOT_DIR}/bootutil/src/bootutil_misc.c
Tamas Banfce87332020-07-10 12:40:11 +0100119 ${BOOT_DIR}/bootutil/src/fault_injection_hardening.c
Dominik Ermel8101c0c2020-05-19 13:01:16 +0000120 )
121
Andrzej Puzdrowskif573b392020-11-10 14:35:15 +0100122# library which might be common source code for MCUBoot and an application
123zephyr_link_libraries(MCUBOOT_BOOTUTIL)
124
Tamas Banfce87332020-07-10 12:40:11 +0100125if(CONFIG_BOOT_FIH_PROFILE_HIGH)
126zephyr_library_sources(
127 ${BOOT_DIR}/bootutil/src/fault_injection_hardening_delay_rng_mbedtls.c
128 )
129endif()
130
Andrzej Puzdrowskifdff3e12020-09-15 08:23:25 +0200131if(CONFIG_SINGLE_APPLICATION_SLOT)
Dominik Ermel8101c0c2020-05-19 13:01:16 +0000132zephyr_library_sources(
133 ${BOOT_DIR}/zephyr/single_loader.c
134 )
135zephyr_library_include_directories(${BOOT_DIR}/bootutil/src)
136else()
137zephyr_library_sources(
Sebastian Bøebe972172019-01-22 14:05:14 +0100138 ${BOOT_DIR}/bootutil/src/loader.c
Fabio Utzigc58842e2019-11-28 10:30:01 -0300139 ${BOOT_DIR}/bootutil/src/swap_misc.c
140 ${BOOT_DIR}/bootutil/src/swap_scratch.c
141 ${BOOT_DIR}/bootutil/src/swap_move.c
Sebastian Bøebe972172019-01-22 14:05:14 +0100142 ${BOOT_DIR}/bootutil/src/caps.c
143 )
Dominik Ermel8101c0c2020-05-19 13:01:16 +0000144endif()
145
Roman Okhrimenkodc0ca082023-06-21 20:49:51 +0300146if(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256 OR CONFIG_BOOT_ENCRYPT_EC256 OR CONFIG_BOOT_SERIAL_ENCRYPT_EC256)
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100147 zephyr_library_include_directories(
Fabio Utzigccc02802019-11-05 07:55:14 -0300148 ${MBEDTLS_ASN1_DIR}/include
149 )
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100150 zephyr_library_sources(
Fabio Utzigccc02802019-11-05 07:55:14 -0300151 # Additionally pull in just the ASN.1 parser from mbedTLS.
152 ${MBEDTLS_ASN1_DIR}/src/asn1parse.c
153 ${MBEDTLS_ASN1_DIR}/src/platform_util.c
154 )
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100155 if(CONFIG_BOOT_USE_TINYCRYPT)
Marti Bolivara4818a52018-04-12 13:02:38 -0400156 # When using ECDSA signatures, pull in our copy of the tinycrypt library.
Sebastian Bøebe972172019-01-22 14:05:14 +0100157 zephyr_library_include_directories(
Fabio Utzigccc02802019-11-05 07:55:14 -0300158 ${BOOT_DIR}/zephyr/include
159 ${TINYCRYPT_DIR}/include
160 )
Roman Okhrimenkodc0ca082023-06-21 20:49:51 +0300161 zephyr_include_directories(${TINYCRYPT_DIR}/include)
Marti Bolivarbf909a12017-11-13 19:43:46 -0500162
Sebastian Bøebe972172019-01-22 14:05:14 +0100163 zephyr_library_sources(
Fabio Utzigccc02802019-11-05 07:55:14 -0300164 ${TINYCRYPT_DIR}/source/ecc.c
165 ${TINYCRYPT_DIR}/source/ecc_dsa.c
166 ${TINYCRYPT_DIR}/source/sha256.c
167 ${TINYCRYPT_DIR}/source/utils.c
168 )
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100169 elseif(CONFIG_BOOT_USE_NRF_CC310_BL)
170 zephyr_library_sources(${NRF_DIR}/cc310_glue.c)
171 zephyr_library_include_directories(${NRF_DIR})
172 zephyr_link_libraries(nrfxlib_crypto)
173 endif()
Fabio Utzig28ee5b02017-12-12 08:10:40 -0200174
Ding Taof97cb712018-06-08 14:37:13 +0000175 # Since here we are not using Zephyr's mbedTLS but rather our own, we need
Carles Cufi69c61d02018-06-05 15:56:08 +0200176 # to set MBEDTLS_CONFIG_FILE ourselves. When using Zephyr's copy, this
177 # variable is set by its Kconfig in the Zephyr codebase.
Sebastian Bøebe972172019-01-22 14:05:14 +0100178 zephyr_library_compile_definitions(
Fabio Utzigccc02802019-11-05 07:55:14 -0300179 MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h"
180 )
Arvin Farahmandfb5ec182020-05-05 11:44:12 -0400181elseif(CONFIG_BOOT_SIGNATURE_TYPE_NONE)
182 zephyr_library_include_directories(
183 ${BOOT_DIR}/zephyr/include
184 ${TINYCRYPT_DIR}/include
185 )
186
187 zephyr_library_sources(
188 ${TINYCRYPT_DIR}/source/sha256.c
189 ${TINYCRYPT_DIR}/source/utils.c
190 )
Marti Bolivara4818a52018-04-12 13:02:38 -0400191elseif(CONFIG_BOOT_SIGNATURE_TYPE_RSA)
192 # Use mbedTLS provided by Zephyr for RSA signatures. (Its config file
193 # is set using Kconfig.)
194 zephyr_include_directories(include)
Roman Okhrimenkodc0ca082023-06-21 20:49:51 +0300195 if(CONFIG_BOOT_ENCRYPT_RSA)
196 set_source_files_properties(
197 ${BOOT_DIR}/bootutil/src/encrypted.c
198 PROPERTIES
199 INCLUDE_DIRECTORIES ${ZEPHYR_MBEDTLS_MODULE_DIR}/library
200 )
201 endif()
Fabio Utzigb6f014c2020-04-02 13:25:01 -0300202elseif(CONFIG_BOOT_SIGNATURE_TYPE_ED25519 OR CONFIG_BOOT_ENCRYPT_X25519)
Fabio Utzig34e93a52020-02-03 09:59:53 -0300203 if(CONFIG_BOOT_USE_TINYCRYPT)
204 zephyr_library_include_directories(
205 ${MBEDTLS_ASN1_DIR}/include
206 ${BOOT_DIR}/zephyr/include
207 ${TINYCRYPT_DIR}/include
208 ${TINYCRYPT_SHA512_DIR}/include
209 )
210 zephyr_library_sources(
211 ${TINYCRYPT_DIR}/source/sha256.c
212 ${TINYCRYPT_DIR}/source/utils.c
213 ${TINYCRYPT_SHA512_DIR}/source/sha512.c
214 # Additionally pull in just the ASN.1 parser from mbedTLS.
215 ${MBEDTLS_ASN1_DIR}/src/asn1parse.c
216 ${MBEDTLS_ASN1_DIR}/src/platform_util.c
217 )
218 zephyr_library_compile_definitions(
219 MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h"
220 )
221 else()
222 zephyr_include_directories(include)
223 endif()
Fabio Utzig1171df92019-05-10 19:26:38 -0300224
225 zephyr_library_include_directories(
226 ${BOOT_DIR}/zephyr/include
227 ${FIAT_DIR}/include/
228 )
229
230 zephyr_library_sources(
231 ${FIAT_DIR}/src/curve25519.c
232 )
Marti Bolivarbf909a12017-11-13 19:43:46 -0500233endif()
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200234
Roman Okhrimenkodc0ca082023-06-21 20:49:51 +0300235if(CONFIG_BOOT_ENCRYPT_EC256 OR CONFIG_BOOT_ENCRYPT_X25519 OR CONFIG_BOOT_SERIAL_ENCRYPT_EC256)
Fabio Utzig42cc29a2019-11-05 07:54:41 -0300236 zephyr_library_sources(
237 ${TINYCRYPT_DIR}/source/aes_encrypt.c
238 ${TINYCRYPT_DIR}/source/aes_decrypt.c
239 ${TINYCRYPT_DIR}/source/ctr_mode.c
240 ${TINYCRYPT_DIR}/source/hmac.c
241 ${TINYCRYPT_DIR}/source/ecc_dh.c
242 )
243endif()
244
Fabio Utzigb6f014c2020-04-02 13:25:01 -0300245if(CONFIG_BOOT_ENCRYPT_EC256)
246 zephyr_library_sources(
247 ${TINYCRYPT_DIR}/source/ecc_dh.c
248 )
249endif()
250
Sebastian Bøebe972172019-01-22 14:05:14 +0100251if(CONFIG_MCUBOOT_SERIAL)
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200252 zephyr_sources(${BOOT_DIR}/zephyr/serial_adapter.c)
253 zephyr_sources(${BOOT_DIR}/boot_serial/src/boot_serial.c)
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100254 zephyr_sources(${BOOT_DIR}/boot_serial/src/serial_recovery_cbor.c)
255 zephyr_sources(${BOOT_DIR}/boot_serial/src/cbor_decode.c)
Roman Okhrimenko977b3752022-03-31 14:40:48 +0300256 zephyr_sources(${BOOT_DIR}/boot_serial/src/cbor_encode.c)
257 zephyr_sources(${BOOT_DIR}/boot_serial/src/cbor_common.c)
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200258
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200259 zephyr_include_directories(${BOOT_DIR}/bootutil/include)
260 zephyr_include_directories(${BOOT_DIR}/boot_serial/include)
261 zephyr_include_directories(include)
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200262
Sebastian Bøebe972172019-01-22 14:05:14 +0100263 zephyr_include_directories_ifdef(
Fabio Utzigccc02802019-11-05 07:55:14 -0300264 CONFIG_BOOT_ERASE_PROGRESSIVELY
265 ${BOOT_DIR}/bootutil/src
266 )
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200267endif()
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300268
269if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "")
Roman Okhrimenko977b3752022-03-31 14:40:48 +0300270 # CONF_FILE points to the KConfig configuration files of the bootloader.
271 foreach (filepath ${CONF_FILE})
272 file(READ ${filepath} temp_text)
273 string(FIND "${temp_text}" ${CONFIG_BOOT_SIGNATURE_KEY_FILE} match)
274 if (${match} GREATER_EQUAL 0)
275 if (NOT DEFINED CONF_DIR)
276 get_filename_component(CONF_DIR ${filepath} DIRECTORY)
277 else()
278 message(FATAL_ERROR "Signature key file defined in multiple conf files")
279 endif()
280 endif()
281 endforeach()
282
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300283 if(IS_ABSOLUTE ${CONFIG_BOOT_SIGNATURE_KEY_FILE})
284 set(KEY_FILE ${CONFIG_BOOT_SIGNATURE_KEY_FILE})
Marek Pietac1cdcae2020-08-12 04:29:12 -0700285 elseif((DEFINED CONF_DIR) AND
286 (EXISTS ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}))
Marek Pietabdcfc852020-08-04 02:22:55 -0700287 set(KEY_FILE ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE})
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300288 else()
289 set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE})
290 endif()
Marek Pietac1cdcae2020-08-12 04:29:12 -0700291 message("MCUBoot bootloader key file: ${KEY_FILE}")
292
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300293 set(GENERATED_PUBKEY ${ZEPHYR_BINARY_DIR}/autogen-pubkey.c)
294 add_custom_command(
295 OUTPUT ${GENERATED_PUBKEY}
296 COMMAND
297 ${PYTHON_EXECUTABLE}
298 ${MCUBOOT_DIR}/scripts/imgtool.py
299 getpub
300 -k
301 ${KEY_FILE}
302 > ${GENERATED_PUBKEY}
303 DEPENDS ${KEY_FILE}
304 )
Sebastian Bøebe972172019-01-22 14:05:14 +0100305 zephyr_library_sources(${GENERATED_PUBKEY})
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300306endif()
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100307
Roman Okhrimenkodc0ca082023-06-21 20:49:51 +0300308if(CONFIG_BOOT_ENCRYPTION_KEY_FILE AND NOT CONFIG_BOOT_ENCRYPTION_KEY_FILE STREQUAL "")
309 # CONF_FILE points to the KConfig configuration files of the bootloader.
310 unset(CONF_DIR)
311 foreach(filepath ${CONF_FILE})
312 file(READ ${filepath} temp_text)
313 string(FIND "${temp_text}" ${CONFIG_BOOT_ENCRYPTION_KEY_FILE} match)
314 if(${match} GREATER_EQUAL 0)
315 if(NOT DEFINED CONF_DIR)
316 get_filename_component(CONF_DIR ${filepath} DIRECTORY)
317 else()
318 message(FATAL_ERROR "Encryption key file defined in multiple conf files")
319 endif()
320 endif()
321 endforeach()
322
323 if(IS_ABSOLUTE ${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
324 set(KEY_FILE ${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
325 elseif((DEFINED CONF_DIR) AND
326 (EXISTS ${CONF_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE}))
327 set(KEY_FILE ${CONF_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
328 else()
329 set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
330 endif()
331 message("MCUBoot bootloader encryption key file: ${KEY_FILE}")
332
333 set(GENERATED_ENCKEY ${ZEPHYR_BINARY_DIR}/autogen-enckey.c)
334 add_custom_command(
335 OUTPUT ${GENERATED_ENCKEY}
336 COMMAND
337 ${PYTHON_EXECUTABLE}
338 ${MCUBOOT_DIR}/scripts/imgtool.py
339 getpriv
340 -k
341 ${KEY_FILE}
342 > ${GENERATED_ENCKEY}
343 DEPENDS ${KEY_FILE}
344 )
345 zephyr_library_sources(${GENERATED_ENCKEY})
346endif()
347
Andrzej Puzdrowski9a605b62020-03-16 13:34:30 +0100348if(CONFIG_MCUBOOT_CLEANUP_ARM_CORE)
349zephyr_library_sources(
350 ${BOOT_DIR}/zephyr/arm_cleanup.c
351)
352endif()