blob: 159ef5d3de250204706a39ceda5ddb2c3b5d0428 [file] [log] [blame]
Marti Bolivarbf909a12017-11-13 19:43:46 -05001# CMakeLists.txt for building mcuboot as a Zephyr project
2#
3# Copyright (c) 2017 Open Source Foundries Limited
4#
5# SPDX-License-Identifier: Apache-2.0
6
Martí Bolívar0e3fa722019-10-22 14:39:33 -06007cmake_minimum_required(VERSION 3.13.1)
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +05308
Marti Bolivaraefbd462017-12-15 03:43:46 -05009# Enable Zephyr runner options which request mass erase if so
10# configured.
11#
12# Note that this also disables the default "leave" option when
13# targeting STM32 DfuSe devices with dfu-util, making the chip stay in
14# the bootloader after flashing.
15#
16# That's the right thing, because mcuboot has nothing to do since the
17# chip was just erased. The next thing the user is going to want to do
18# is flash the application. (Developers can reset DfuSE devices
19# manually to test mcuboot behavior on an otherwise erased flash
20# device.)
21macro(app_set_runner_args)
Marti Bolivar53e2c262018-04-12 14:13:28 -040022 if(CONFIG_ZEPHYR_TRY_MASS_ERASE)
Marti Bolivaraefbd462017-12-15 03:43:46 -050023 board_runner_args(dfu-util "--dfuse-modifiers=force:mass-erase")
Maureen Helm4df602a2019-02-18 17:26:39 -060024 board_runner_args(pyocd "--flash-opt=-e=chip")
Marti Bolivar23e38532018-03-26 13:14:22 -040025 board_runner_args(nrfjprog "--erase")
Marti Bolivaraefbd462017-12-15 03:43:46 -050026 endif()
27endmacro()
28
Torsten Rasmussen43004b82020-05-28 12:34:15 +020029# find_package(Zephyr) in order to load application boilerplate:
Marti Bolivarbf909a12017-11-13 19:43:46 -050030# http://docs.zephyrproject.org/application/application.html
Torsten Rasmussen43004b82020-05-28 12:34:15 +020031find_package(Zephyr REQUIRED HINTS $ENV{ZEPHYR_BASE})
Marti Bolivarbf909a12017-11-13 19:43:46 -050032project(NONE)
33
34# Path to "boot" subdirectory of repository root.
35get_filename_component(BOOT_DIR ${APPLICATION_SOURCE_DIR} DIRECTORY)
36# Path to top-level repository root directory.
37get_filename_component(MCUBOOT_DIR ${BOOT_DIR} DIRECTORY)
38# Path to tinycrypt library source subdirectory of MCUBOOT_DIR.
39set(TINYCRYPT_DIR "${MCUBOOT_DIR}/ext/tinycrypt/lib")
Sigvart Hovlandebd05032019-03-21 10:47:32 +010040assert_exists(TINYCRYPT_DIR)
Fabio Utzig34e93a52020-02-03 09:59:53 -030041set(TINYCRYPT_SHA512_DIR "${MCUBOOT_DIR}/ext/tinycrypt-sha512/lib")
42assert_exists(TINYCRYPT_SHA512_DIR)
Fabio Utzig1171df92019-05-10 19:26:38 -030043# Path to crypto-fiat
44set(FIAT_DIR "${MCUBOOT_DIR}/ext/fiat")
45assert_exists(FIAT_DIR)
Fabio Utzig28ee5b02017-12-12 08:10:40 -020046# Path to mbed-tls' asn1 parser library.
David Brownb748f6f2019-10-11 10:07:31 -060047set(MBEDTLS_ASN1_DIR "${MCUBOOT_DIR}/ext/mbedtls-asn1")
Sigvart Hovlandebd05032019-03-21 10:47:32 +010048assert_exists(MBEDTLS_ASN1_DIR)
49set(NRF_DIR "${MCUBOOT_DIR}/ext/nrf")
50
51if(CONFIG_BOOT_USE_NRF_CC310_BL)
Torsten Rasmussen33fbef52020-06-03 20:21:13 +020052set(NRFXLIB_DIR ${ZEPHYR_BASE}/../nrfxlib)
Andrzej Puzdrowskif0ef8b62020-10-01 13:51:48 +020053if(NOT EXISTS ${NRFXLIB_DIR})
54 message(FATAL_ERROR "
55 ------------------------------------------------------------------------
56 No such file or directory: ${NRFXLIB_DIR}
57 The current configuration enables nRF CC310 crypto accelerator hardware
58 with the `CONFIG_BOOT_USE_NRF_CC310_BL` option. Please follow
59 `ext/nrf/README.md` guide to fix your setup or use tinycrypt instead of
60 the HW accelerator.
61 To use the tinycrypt set `CONFIG_BOOT_ECDSA_TINYCRYPT` to y.
62 ------------------------------------------------------------------------")
63endif()
Sigvart Hovlandebd05032019-03-21 10:47:32 +010064# Don't include this if we are using west
65 add_subdirectory(${NRFXLIB_DIR} ${PROJECT_BINARY_DIR}/nrfxlib)
66endif()
Marti Bolivarbf909a12017-11-13 19:43:46 -050067
Sebastian Bøebe972172019-01-22 14:05:14 +010068zephyr_library_include_directories(
69 include
70 targets
71 )
72if(EXISTS targets/${BOARD}.h)
73 zephyr_library_compile_definitions(MCUBOOT_TARGET_CONFIG="${BOARD}.h")
Marti Bolivarbf909a12017-11-13 19:43:46 -050074endif()
75
76# Zephyr port-specific sources.
Sebastian Bøebe972172019-01-22 14:05:14 +010077zephyr_library_sources(
78 main.c
79 flash_map_extended.c
80 os.c
81 keys.c
82 )
83
Dominik Ermel428d3ee2021-08-17 07:55:54 +000084if(DEFINED CONFIG_ENABLE_MGMT_PERUSER)
85 zephyr_library_sources(
86 boot_serial_extensions.c
87 )
Jamie McCrae268433e2023-08-29 15:37:15 +010088
89 zephyr_linker_sources_ifdef(
90 CONFIG_ENABLE_MGMT_PERUSER
91 SECTIONS include/boot_serial/boot_serial.ld
92 )
93
94 if(DEFINED CONFIG_BOOT_MGMT_CUSTOM_STORAGE_ERASE OR DEFINED CONFIG_BOOT_MGMT_CUSTOM_IMG_LIST)
95 zephyr_library_sources(
96 boot_serial_extension_zephyr_basic.c
97 )
98 endif()
Dominik Ermel428d3ee2021-08-17 07:55:54 +000099endif()
100
Marti Bolivarbf909a12017-11-13 19:43:46 -0500101if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT)
Sebastian Bøebe972172019-01-22 14:05:14 +0100102 zephyr_library_sources(
Fabio Utzigccc02802019-11-05 07:55:14 -0300103 flash_map_legacy.c
104 )
Marti Bolivarbf909a12017-11-13 19:43:46 -0500105endif()
106
Jamie McCrae4da51012023-08-03 16:23:02 +0100107if(DEFINED CONFIG_BOOT_SHARE_BACKEND_RETENTION)
108 zephyr_library_sources(
109 shared_data.c
110 )
111endif()
112
Marti Bolivarbf909a12017-11-13 19:43:46 -0500113# Generic bootutil sources and includes.
Sebastian Bøebe972172019-01-22 14:05:14 +0100114zephyr_library_include_directories(${BOOT_DIR}/bootutil/include)
115zephyr_library_sources(
Dominik Ermel8101c0c2020-05-19 13:01:16 +0000116 ${BOOT_DIR}/bootutil/src/image_validate.c
117 ${BOOT_DIR}/bootutil/src/tlv.c
118 ${BOOT_DIR}/bootutil/src/encrypted.c
119 ${BOOT_DIR}/bootutil/src/image_rsa.c
Antonio de Angelis10529d32023-04-21 21:43:14 +0100120 ${BOOT_DIR}/bootutil/src/image_ecdsa.c
Dominik Ermel8101c0c2020-05-19 13:01:16 +0000121 ${BOOT_DIR}/bootutil/src/image_ed25519.c
Dominik Ermel9b48d082020-06-08 12:40:06 +0000122 ${BOOT_DIR}/bootutil/src/bootutil_misc.c
Tamas Banfce87332020-07-10 12:40:11 +0100123 ${BOOT_DIR}/bootutil/src/fault_injection_hardening.c
Dominik Ermel8101c0c2020-05-19 13:01:16 +0000124 )
125
Jamie McCrae4da51012023-08-03 16:23:02 +0100126if(DEFINED CONFIG_MEASURED_BOOT OR DEFINED CONFIG_BOOT_SHARE_DATA)
127 zephyr_library_sources(
128 ${BOOT_DIR}/bootutil/src/boot_record.c
129 )
130
131 # Set a define for this file which will allow inclusion of the Zephyr version
132 # include file
133 set_source_files_properties(
134 ${BOOT_DIR}/bootutil/src/boot_record.c
135 PROPERTIES COMPILE_FLAGS -DZEPHYR_VER_INCLUDE=1
136 )
137endif()
138
Andrzej Puzdrowskif573b392020-11-10 14:35:15 +0100139# library which might be common source code for MCUBoot and an application
140zephyr_link_libraries(MCUBOOT_BOOTUTIL)
141
Tamas Banfce87332020-07-10 12:40:11 +0100142if(CONFIG_BOOT_FIH_PROFILE_HIGH)
143zephyr_library_sources(
144 ${BOOT_DIR}/bootutil/src/fault_injection_hardening_delay_rng_mbedtls.c
145 )
146endif()
147
Andrzej Puzdrowskifdff3e12020-09-15 08:23:25 +0200148if(CONFIG_SINGLE_APPLICATION_SLOT)
Dominik Ermel8101c0c2020-05-19 13:01:16 +0000149zephyr_library_sources(
150 ${BOOT_DIR}/zephyr/single_loader.c
151 )
152zephyr_library_include_directories(${BOOT_DIR}/bootutil/src)
153else()
154zephyr_library_sources(
Sebastian Bøebe972172019-01-22 14:05:14 +0100155 ${BOOT_DIR}/bootutil/src/loader.c
Fabio Utzigc58842e2019-11-28 10:30:01 -0300156 ${BOOT_DIR}/bootutil/src/swap_misc.c
157 ${BOOT_DIR}/bootutil/src/swap_scratch.c
158 ${BOOT_DIR}/bootutil/src/swap_move.c
Sebastian Bøebe972172019-01-22 14:05:14 +0100159 ${BOOT_DIR}/bootutil/src/caps.c
160 )
Dominik Ermel8101c0c2020-05-19 13:01:16 +0000161endif()
162
Jamie McCraec9fa6082023-07-21 10:23:17 +0100163if(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256 OR CONFIG_BOOT_ENCRYPT_EC256)
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100164 zephyr_library_include_directories(
Fabio Utzigccc02802019-11-05 07:55:14 -0300165 ${MBEDTLS_ASN1_DIR}/include
166 )
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100167 zephyr_library_sources(
Fabio Utzigccc02802019-11-05 07:55:14 -0300168 # Additionally pull in just the ASN.1 parser from mbedTLS.
169 ${MBEDTLS_ASN1_DIR}/src/asn1parse.c
170 ${MBEDTLS_ASN1_DIR}/src/platform_util.c
171 )
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100172 if(CONFIG_BOOT_USE_TINYCRYPT)
Marti Bolivara4818a52018-04-12 13:02:38 -0400173 # When using ECDSA signatures, pull in our copy of the tinycrypt library.
Sebastian Bøebe972172019-01-22 14:05:14 +0100174 zephyr_library_include_directories(
Fabio Utzigccc02802019-11-05 07:55:14 -0300175 ${BOOT_DIR}/zephyr/include
176 ${TINYCRYPT_DIR}/include
177 )
Wouter Cappelle953a7612021-05-03 16:53:05 +0200178 zephyr_include_directories(${TINYCRYPT_DIR}/include)
Marti Bolivarbf909a12017-11-13 19:43:46 -0500179
Sebastian Bøebe972172019-01-22 14:05:14 +0100180 zephyr_library_sources(
Fabio Utzigccc02802019-11-05 07:55:14 -0300181 ${TINYCRYPT_DIR}/source/ecc.c
182 ${TINYCRYPT_DIR}/source/ecc_dsa.c
183 ${TINYCRYPT_DIR}/source/sha256.c
184 ${TINYCRYPT_DIR}/source/utils.c
185 )
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100186 elseif(CONFIG_BOOT_USE_NRF_CC310_BL)
187 zephyr_library_sources(${NRF_DIR}/cc310_glue.c)
188 zephyr_library_include_directories(${NRF_DIR})
189 zephyr_link_libraries(nrfxlib_crypto)
190 endif()
Fabio Utzig28ee5b02017-12-12 08:10:40 -0200191
Ding Taof97cb712018-06-08 14:37:13 +0000192 # Since here we are not using Zephyr's mbedTLS but rather our own, we need
Carles Cufi69c61d02018-06-05 15:56:08 +0200193 # to set MBEDTLS_CONFIG_FILE ourselves. When using Zephyr's copy, this
194 # variable is set by its Kconfig in the Zephyr codebase.
Sebastian Bøebe972172019-01-22 14:05:14 +0100195 zephyr_library_compile_definitions(
Fabio Utzigccc02802019-11-05 07:55:14 -0300196 MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h"
197 )
Arvin Farahmandfb5ec182020-05-05 11:44:12 -0400198elseif(CONFIG_BOOT_SIGNATURE_TYPE_NONE)
199 zephyr_library_include_directories(
200 ${BOOT_DIR}/zephyr/include
201 ${TINYCRYPT_DIR}/include
202 )
203
204 zephyr_library_sources(
205 ${TINYCRYPT_DIR}/source/sha256.c
206 ${TINYCRYPT_DIR}/source/utils.c
207 )
Marti Bolivara4818a52018-04-12 13:02:38 -0400208elseif(CONFIG_BOOT_SIGNATURE_TYPE_RSA)
209 # Use mbedTLS provided by Zephyr for RSA signatures. (Its config file
210 # is set using Kconfig.)
211 zephyr_include_directories(include)
Andrzej Puzdrowski5a325922021-11-08 14:07:56 +0100212 if(CONFIG_BOOT_ENCRYPT_RSA)
213 set_source_files_properties(
214 ${BOOT_DIR}/bootutil/src/encrypted.c
215 PROPERTIES
216 INCLUDE_DIRECTORIES ${ZEPHYR_MBEDTLS_MODULE_DIR}/library
217 )
218 endif()
Fabio Utzigb6f014c2020-04-02 13:25:01 -0300219elseif(CONFIG_BOOT_SIGNATURE_TYPE_ED25519 OR CONFIG_BOOT_ENCRYPT_X25519)
Fabio Utzig34e93a52020-02-03 09:59:53 -0300220 if(CONFIG_BOOT_USE_TINYCRYPT)
221 zephyr_library_include_directories(
222 ${MBEDTLS_ASN1_DIR}/include
223 ${BOOT_DIR}/zephyr/include
224 ${TINYCRYPT_DIR}/include
225 ${TINYCRYPT_SHA512_DIR}/include
226 )
227 zephyr_library_sources(
228 ${TINYCRYPT_DIR}/source/sha256.c
229 ${TINYCRYPT_DIR}/source/utils.c
230 ${TINYCRYPT_SHA512_DIR}/source/sha512.c
231 # Additionally pull in just the ASN.1 parser from mbedTLS.
232 ${MBEDTLS_ASN1_DIR}/src/asn1parse.c
233 ${MBEDTLS_ASN1_DIR}/src/platform_util.c
234 )
235 zephyr_library_compile_definitions(
236 MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h"
237 )
238 else()
239 zephyr_include_directories(include)
240 endif()
Fabio Utzig1171df92019-05-10 19:26:38 -0300241
242 zephyr_library_include_directories(
243 ${BOOT_DIR}/zephyr/include
244 ${FIAT_DIR}/include/
245 )
246
247 zephyr_library_sources(
248 ${FIAT_DIR}/src/curve25519.c
249 )
Marti Bolivarbf909a12017-11-13 19:43:46 -0500250endif()
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200251
Jamie McCraec9fa6082023-07-21 10:23:17 +0100252if(CONFIG_BOOT_ENCRYPT_EC256 OR CONFIG_BOOT_ENCRYPT_X25519)
Fabio Utzig42cc29a2019-11-05 07:54:41 -0300253 zephyr_library_sources(
254 ${TINYCRYPT_DIR}/source/aes_encrypt.c
255 ${TINYCRYPT_DIR}/source/aes_decrypt.c
256 ${TINYCRYPT_DIR}/source/ctr_mode.c
257 ${TINYCRYPT_DIR}/source/hmac.c
258 ${TINYCRYPT_DIR}/source/ecc_dh.c
259 )
260endif()
261
Fabio Utzigb6f014c2020-04-02 13:25:01 -0300262if(CONFIG_BOOT_ENCRYPT_EC256)
263 zephyr_library_sources(
264 ${TINYCRYPT_DIR}/source/ecc_dh.c
265 )
266endif()
267
Sebastian Bøebe972172019-01-22 14:05:14 +0100268if(CONFIG_MCUBOOT_SERIAL)
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200269 zephyr_sources(${BOOT_DIR}/zephyr/serial_adapter.c)
270 zephyr_sources(${BOOT_DIR}/boot_serial/src/boot_serial.c)
Jamie McCraecb07e882023-04-14 09:28:24 +0100271 zephyr_sources(${BOOT_DIR}/boot_serial/src/zcbor_bulk.c)
Dominik Ermel88bd5672022-06-07 15:17:06 +0000272
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200273 zephyr_include_directories(${BOOT_DIR}/bootutil/include)
274 zephyr_include_directories(${BOOT_DIR}/boot_serial/include)
275 zephyr_include_directories(include)
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200276
Sebastian Bøebe972172019-01-22 14:05:14 +0100277 zephyr_include_directories_ifdef(
Fabio Utzigccc02802019-11-05 07:55:14 -0300278 CONFIG_BOOT_ERASE_PROGRESSIVELY
279 ${BOOT_DIR}/bootutil/src
280 )
Jamie McCraec9fa6082023-07-21 10:23:17 +0100281
282 if(CONFIG_BOOT_ENCRYPT_IMAGE)
283 zephyr_library_sources(
284 ${BOOT_DIR}/boot_serial/src/boot_serial_encryption.c
285 )
286 endif()
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200287endif()
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300288
289if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "")
Nico Lastzkae16f52c2021-04-13 16:04:00 +0200290 # CONF_FILE points to the KConfig configuration files of the bootloader.
291 foreach (filepath ${CONF_FILE})
292 file(READ ${filepath} temp_text)
293 string(FIND "${temp_text}" ${CONFIG_BOOT_SIGNATURE_KEY_FILE} match)
294 if (${match} GREATER_EQUAL 0)
295 if (NOT DEFINED CONF_DIR)
296 get_filename_component(CONF_DIR ${filepath} DIRECTORY)
297 else()
298 message(FATAL_ERROR "Signature key file defined in multiple conf files")
299 endif()
300 endif()
301 endforeach()
302
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300303 if(IS_ABSOLUTE ${CONFIG_BOOT_SIGNATURE_KEY_FILE})
304 set(KEY_FILE ${CONFIG_BOOT_SIGNATURE_KEY_FILE})
Marek Pietac1cdcae2020-08-12 04:29:12 -0700305 elseif((DEFINED CONF_DIR) AND
306 (EXISTS ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}))
Marek Pietabdcfc852020-08-04 02:22:55 -0700307 set(KEY_FILE ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE})
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300308 else()
309 set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE})
310 endif()
Marek Pietac1cdcae2020-08-12 04:29:12 -0700311 message("MCUBoot bootloader key file: ${KEY_FILE}")
312
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300313 set(GENERATED_PUBKEY ${ZEPHYR_BINARY_DIR}/autogen-pubkey.c)
314 add_custom_command(
315 OUTPUT ${GENERATED_PUBKEY}
316 COMMAND
317 ${PYTHON_EXECUTABLE}
318 ${MCUBOOT_DIR}/scripts/imgtool.py
319 getpub
320 -k
321 ${KEY_FILE}
322 > ${GENERATED_PUBKEY}
323 DEPENDS ${KEY_FILE}
324 )
Sebastian Bøebe972172019-01-22 14:05:14 +0100325 zephyr_library_sources(${GENERATED_PUBKEY})
Fabio Utzigb1e0dc52018-04-26 10:53:19 -0300326endif()
Sigvart Hovlandebd05032019-03-21 10:47:32 +0100327
Wouter Cappelle10a877c2022-01-28 08:40:28 +0100328if(CONFIG_BOOT_ENCRYPTION_KEY_FILE AND NOT CONFIG_BOOT_ENCRYPTION_KEY_FILE STREQUAL "")
329 # CONF_FILE points to the KConfig configuration files of the bootloader.
330 unset(CONF_DIR)
331 foreach(filepath ${CONF_FILE})
332 file(READ ${filepath} temp_text)
333 string(FIND "${temp_text}" ${CONFIG_BOOT_ENCRYPTION_KEY_FILE} match)
334 if(${match} GREATER_EQUAL 0)
335 if(NOT DEFINED CONF_DIR)
336 get_filename_component(CONF_DIR ${filepath} DIRECTORY)
337 else()
338 message(FATAL_ERROR "Encryption key file defined in multiple conf files")
339 endif()
Wouter Cappelle953a7612021-05-03 16:53:05 +0200340 endif()
Wouter Cappelle10a877c2022-01-28 08:40:28 +0100341 endforeach()
Wouter Cappelle953a7612021-05-03 16:53:05 +0200342
Wouter Cappelle953a7612021-05-03 16:53:05 +0200343 if(IS_ABSOLUTE ${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
344 set(KEY_FILE ${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
345 elseif((DEFINED CONF_DIR) AND
346 (EXISTS ${CONF_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE}))
347 set(KEY_FILE ${CONF_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
348 else()
349 set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
350 endif()
Wouter Cappelle10a877c2022-01-28 08:40:28 +0100351 message("MCUBoot bootloader encryption key file: ${KEY_FILE}")
Wouter Cappelle953a7612021-05-03 16:53:05 +0200352
353 set(GENERATED_ENCKEY ${ZEPHYR_BINARY_DIR}/autogen-enckey.c)
354 add_custom_command(
355 OUTPUT ${GENERATED_ENCKEY}
356 COMMAND
357 ${PYTHON_EXECUTABLE}
358 ${MCUBOOT_DIR}/scripts/imgtool.py
359 getpriv
360 -k
361 ${KEY_FILE}
362 > ${GENERATED_ENCKEY}
363 DEPENDS ${KEY_FILE}
364 )
365 zephyr_library_sources(${GENERATED_ENCKEY})
366endif()
367
Andrzej Puzdrowski9a605b62020-03-16 13:34:30 +0100368if(CONFIG_MCUBOOT_CLEANUP_ARM_CORE)
369zephyr_library_sources(
370 ${BOOT_DIR}/zephyr/arm_cleanup.c
371)
372endif()