Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 1 | # CMakeLists.txt for building mcuboot as a Zephyr project |
| 2 | # |
| 3 | # Copyright (c) 2017 Open Source Foundries Limited |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 4 | # Copyright (c) 2023 Nordic Semiconductor ASA |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 5 | # |
| 6 | # SPDX-License-Identifier: Apache-2.0 |
| 7 | |
Martí Bolívar | 0e3fa72 | 2019-10-22 14:39:33 -0600 | [diff] [blame] | 8 | cmake_minimum_required(VERSION 3.13.1) |
Rajavardhan Gundi | 40c28e3 | 2018-12-09 13:32:01 +0530 | [diff] [blame] | 9 | |
Torsten Rasmussen | 43004b8 | 2020-05-28 12:34:15 +0200 | [diff] [blame] | 10 | # find_package(Zephyr) in order to load application boilerplate: |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 11 | # http://docs.zephyrproject.org/application/application.html |
Torsten Rasmussen | 43004b8 | 2020-05-28 12:34:15 +0200 | [diff] [blame] | 12 | find_package(Zephyr REQUIRED HINTS $ENV{ZEPHYR_BASE}) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 13 | project(NONE) |
| 14 | |
| 15 | # Path to "boot" subdirectory of repository root. |
| 16 | get_filename_component(BOOT_DIR ${APPLICATION_SOURCE_DIR} DIRECTORY) |
| 17 | # Path to top-level repository root directory. |
| 18 | get_filename_component(MCUBOOT_DIR ${BOOT_DIR} DIRECTORY) |
| 19 | # Path to tinycrypt library source subdirectory of MCUBOOT_DIR. |
| 20 | set(TINYCRYPT_DIR "${MCUBOOT_DIR}/ext/tinycrypt/lib") |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 21 | assert_exists(TINYCRYPT_DIR) |
Fabio Utzig | 34e93a5 | 2020-02-03 09:59:53 -0300 | [diff] [blame] | 22 | set(TINYCRYPT_SHA512_DIR "${MCUBOOT_DIR}/ext/tinycrypt-sha512/lib") |
| 23 | assert_exists(TINYCRYPT_SHA512_DIR) |
Fabio Utzig | 1171df9 | 2019-05-10 19:26:38 -0300 | [diff] [blame] | 24 | # Path to crypto-fiat |
| 25 | set(FIAT_DIR "${MCUBOOT_DIR}/ext/fiat") |
| 26 | assert_exists(FIAT_DIR) |
Fabio Utzig | 28ee5b0 | 2017-12-12 08:10:40 -0200 | [diff] [blame] | 27 | # Path to mbed-tls' asn1 parser library. |
David Brown | b748f6f | 2019-10-11 10:07:31 -0600 | [diff] [blame] | 28 | set(MBEDTLS_ASN1_DIR "${MCUBOOT_DIR}/ext/mbedtls-asn1") |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 29 | assert_exists(MBEDTLS_ASN1_DIR) |
| 30 | set(NRF_DIR "${MCUBOOT_DIR}/ext/nrf") |
| 31 | |
| 32 | if(CONFIG_BOOT_USE_NRF_CC310_BL) |
Torsten Rasmussen | 33fbef5 | 2020-06-03 20:21:13 +0200 | [diff] [blame] | 33 | set(NRFXLIB_DIR ${ZEPHYR_BASE}/../nrfxlib) |
Andrzej Puzdrowski | f0ef8b6 | 2020-10-01 13:51:48 +0200 | [diff] [blame] | 34 | if(NOT EXISTS ${NRFXLIB_DIR}) |
| 35 | message(FATAL_ERROR " |
| 36 | ------------------------------------------------------------------------ |
| 37 | No such file or directory: ${NRFXLIB_DIR} |
| 38 | The current configuration enables nRF CC310 crypto accelerator hardware |
| 39 | with the `CONFIG_BOOT_USE_NRF_CC310_BL` option. Please follow |
| 40 | `ext/nrf/README.md` guide to fix your setup or use tinycrypt instead of |
| 41 | the HW accelerator. |
| 42 | To use the tinycrypt set `CONFIG_BOOT_ECDSA_TINYCRYPT` to y. |
| 43 | ------------------------------------------------------------------------") |
| 44 | endif() |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 45 | # Don't include this if we are using west |
| 46 | add_subdirectory(${NRFXLIB_DIR} ${PROJECT_BINARY_DIR}/nrfxlib) |
| 47 | endif() |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 48 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 49 | zephyr_library_include_directories( |
| 50 | include |
| 51 | targets |
| 52 | ) |
| 53 | if(EXISTS targets/${BOARD}.h) |
| 54 | zephyr_library_compile_definitions(MCUBOOT_TARGET_CONFIG="${BOARD}.h") |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 55 | endif() |
| 56 | |
| 57 | # Zephyr port-specific sources. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 58 | zephyr_library_sources( |
| 59 | main.c |
Jamie McCrae | 433b848 | 2023-08-16 07:33:24 +0100 | [diff] [blame] | 60 | io.c |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 61 | flash_map_extended.c |
| 62 | os.c |
| 63 | keys.c |
| 64 | ) |
| 65 | |
Dominik Ermel | 428d3ee | 2021-08-17 07:55:54 +0000 | [diff] [blame] | 66 | if(DEFINED CONFIG_ENABLE_MGMT_PERUSER) |
| 67 | zephyr_library_sources( |
| 68 | boot_serial_extensions.c |
| 69 | ) |
Jamie McCrae | 268433e | 2023-08-29 15:37:15 +0100 | [diff] [blame] | 70 | |
| 71 | zephyr_linker_sources_ifdef( |
| 72 | CONFIG_ENABLE_MGMT_PERUSER |
| 73 | SECTIONS include/boot_serial/boot_serial.ld |
| 74 | ) |
| 75 | |
| 76 | if(DEFINED CONFIG_BOOT_MGMT_CUSTOM_STORAGE_ERASE OR DEFINED CONFIG_BOOT_MGMT_CUSTOM_IMG_LIST) |
| 77 | zephyr_library_sources( |
| 78 | boot_serial_extension_zephyr_basic.c |
| 79 | ) |
| 80 | endif() |
Dominik Ermel | 428d3ee | 2021-08-17 07:55:54 +0000 | [diff] [blame] | 81 | endif() |
| 82 | |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 83 | if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT) |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 84 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 85 | flash_map_legacy.c |
| 86 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 87 | endif() |
| 88 | |
Jamie McCrae | 4da5101 | 2023-08-03 16:23:02 +0100 | [diff] [blame] | 89 | if(DEFINED CONFIG_BOOT_SHARE_BACKEND_RETENTION) |
| 90 | zephyr_library_sources( |
| 91 | shared_data.c |
| 92 | ) |
| 93 | endif() |
| 94 | |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 95 | # Generic bootutil sources and includes. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 96 | zephyr_library_include_directories(${BOOT_DIR}/bootutil/include) |
| 97 | zephyr_library_sources( |
Dominik Ermel | 8101c0c | 2020-05-19 13:01:16 +0000 | [diff] [blame] | 98 | ${BOOT_DIR}/bootutil/src/image_validate.c |
| 99 | ${BOOT_DIR}/bootutil/src/tlv.c |
| 100 | ${BOOT_DIR}/bootutil/src/encrypted.c |
| 101 | ${BOOT_DIR}/bootutil/src/image_rsa.c |
Antonio de Angelis | 10529d3 | 2023-04-21 21:43:14 +0100 | [diff] [blame] | 102 | ${BOOT_DIR}/bootutil/src/image_ecdsa.c |
Dominik Ermel | 8101c0c | 2020-05-19 13:01:16 +0000 | [diff] [blame] | 103 | ${BOOT_DIR}/bootutil/src/image_ed25519.c |
Dominik Ermel | 9b48d08 | 2020-06-08 12:40:06 +0000 | [diff] [blame] | 104 | ${BOOT_DIR}/bootutil/src/bootutil_misc.c |
Tamas Ban | fce8733 | 2020-07-10 12:40:11 +0100 | [diff] [blame] | 105 | ${BOOT_DIR}/bootutil/src/fault_injection_hardening.c |
Dominik Ermel | 8101c0c | 2020-05-19 13:01:16 +0000 | [diff] [blame] | 106 | ) |
| 107 | |
Jamie McCrae | 4da5101 | 2023-08-03 16:23:02 +0100 | [diff] [blame] | 108 | if(DEFINED CONFIG_MEASURED_BOOT OR DEFINED CONFIG_BOOT_SHARE_DATA) |
| 109 | zephyr_library_sources( |
| 110 | ${BOOT_DIR}/bootutil/src/boot_record.c |
| 111 | ) |
| 112 | |
| 113 | # Set a define for this file which will allow inclusion of the Zephyr version |
| 114 | # include file |
| 115 | set_source_files_properties( |
| 116 | ${BOOT_DIR}/bootutil/src/boot_record.c |
| 117 | PROPERTIES COMPILE_FLAGS -DZEPHYR_VER_INCLUDE=1 |
| 118 | ) |
| 119 | endif() |
| 120 | |
Andrzej Puzdrowski | f573b39 | 2020-11-10 14:35:15 +0100 | [diff] [blame] | 121 | # library which might be common source code for MCUBoot and an application |
| 122 | zephyr_link_libraries(MCUBOOT_BOOTUTIL) |
| 123 | |
Tamas Ban | fce8733 | 2020-07-10 12:40:11 +0100 | [diff] [blame] | 124 | if(CONFIG_BOOT_FIH_PROFILE_HIGH) |
| 125 | zephyr_library_sources( |
| 126 | ${BOOT_DIR}/bootutil/src/fault_injection_hardening_delay_rng_mbedtls.c |
| 127 | ) |
| 128 | endif() |
| 129 | |
Andrzej Puzdrowski | fdff3e1 | 2020-09-15 08:23:25 +0200 | [diff] [blame] | 130 | if(CONFIG_SINGLE_APPLICATION_SLOT) |
Dominik Ermel | 8101c0c | 2020-05-19 13:01:16 +0000 | [diff] [blame] | 131 | zephyr_library_sources( |
| 132 | ${BOOT_DIR}/zephyr/single_loader.c |
| 133 | ) |
| 134 | zephyr_library_include_directories(${BOOT_DIR}/bootutil/src) |
Jamie McCrae | 215345f | 2023-08-16 07:37:18 +0100 | [diff] [blame] | 135 | elseif(CONFIG_BOOT_FIRMWARE_LOADER) |
| 136 | zephyr_library_sources( |
| 137 | ${BOOT_DIR}/zephyr/firmware_loader.c |
| 138 | ) |
| 139 | zephyr_library_include_directories(${BOOT_DIR}/bootutil/src) |
Dominik Ermel | 8101c0c | 2020-05-19 13:01:16 +0000 | [diff] [blame] | 140 | else() |
| 141 | zephyr_library_sources( |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 142 | ${BOOT_DIR}/bootutil/src/loader.c |
Fabio Utzig | c58842e | 2019-11-28 10:30:01 -0300 | [diff] [blame] | 143 | ${BOOT_DIR}/bootutil/src/swap_misc.c |
| 144 | ${BOOT_DIR}/bootutil/src/swap_scratch.c |
| 145 | ${BOOT_DIR}/bootutil/src/swap_move.c |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 146 | ${BOOT_DIR}/bootutil/src/caps.c |
| 147 | ) |
Dominik Ermel | 8101c0c | 2020-05-19 13:01:16 +0000 | [diff] [blame] | 148 | endif() |
| 149 | |
Jamie McCrae | c9fa608 | 2023-07-21 10:23:17 +0100 | [diff] [blame] | 150 | if(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256 OR CONFIG_BOOT_ENCRYPT_EC256) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 151 | zephyr_library_include_directories( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 152 | ${MBEDTLS_ASN1_DIR}/include |
| 153 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 154 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 155 | # Additionally pull in just the ASN.1 parser from mbedTLS. |
| 156 | ${MBEDTLS_ASN1_DIR}/src/asn1parse.c |
| 157 | ${MBEDTLS_ASN1_DIR}/src/platform_util.c |
| 158 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 159 | if(CONFIG_BOOT_USE_TINYCRYPT) |
Marti Bolivar | a4818a5 | 2018-04-12 13:02:38 -0400 | [diff] [blame] | 160 | # When using ECDSA signatures, pull in our copy of the tinycrypt library. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 161 | zephyr_library_include_directories( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 162 | ${BOOT_DIR}/zephyr/include |
| 163 | ${TINYCRYPT_DIR}/include |
| 164 | ) |
Wouter Cappelle | 953a761 | 2021-05-03 16:53:05 +0200 | [diff] [blame] | 165 | zephyr_include_directories(${TINYCRYPT_DIR}/include) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 166 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 167 | zephyr_library_sources( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 168 | ${TINYCRYPT_DIR}/source/ecc.c |
| 169 | ${TINYCRYPT_DIR}/source/ecc_dsa.c |
| 170 | ${TINYCRYPT_DIR}/source/sha256.c |
| 171 | ${TINYCRYPT_DIR}/source/utils.c |
| 172 | ) |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 173 | elseif(CONFIG_BOOT_USE_NRF_CC310_BL) |
| 174 | zephyr_library_sources(${NRF_DIR}/cc310_glue.c) |
| 175 | zephyr_library_include_directories(${NRF_DIR}) |
| 176 | zephyr_link_libraries(nrfxlib_crypto) |
| 177 | endif() |
Fabio Utzig | 28ee5b0 | 2017-12-12 08:10:40 -0200 | [diff] [blame] | 178 | |
Ding Tao | f97cb71 | 2018-06-08 14:37:13 +0000 | [diff] [blame] | 179 | # Since here we are not using Zephyr's mbedTLS but rather our own, we need |
Carles Cufi | 69c61d0 | 2018-06-05 15:56:08 +0200 | [diff] [blame] | 180 | # to set MBEDTLS_CONFIG_FILE ourselves. When using Zephyr's copy, this |
| 181 | # variable is set by its Kconfig in the Zephyr codebase. |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 182 | zephyr_library_compile_definitions( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 183 | MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h" |
| 184 | ) |
Arvin Farahmand | fb5ec18 | 2020-05-05 11:44:12 -0400 | [diff] [blame] | 185 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_NONE) |
| 186 | zephyr_library_include_directories( |
| 187 | ${BOOT_DIR}/zephyr/include |
| 188 | ${TINYCRYPT_DIR}/include |
| 189 | ) |
| 190 | |
| 191 | zephyr_library_sources( |
| 192 | ${TINYCRYPT_DIR}/source/sha256.c |
| 193 | ${TINYCRYPT_DIR}/source/utils.c |
| 194 | ) |
Marti Bolivar | a4818a5 | 2018-04-12 13:02:38 -0400 | [diff] [blame] | 195 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_RSA) |
| 196 | # Use mbedTLS provided by Zephyr for RSA signatures. (Its config file |
| 197 | # is set using Kconfig.) |
| 198 | zephyr_include_directories(include) |
Andrzej Puzdrowski | 5a32592 | 2021-11-08 14:07:56 +0100 | [diff] [blame] | 199 | if(CONFIG_BOOT_ENCRYPT_RSA) |
| 200 | set_source_files_properties( |
| 201 | ${BOOT_DIR}/bootutil/src/encrypted.c |
| 202 | PROPERTIES |
| 203 | INCLUDE_DIRECTORIES ${ZEPHYR_MBEDTLS_MODULE_DIR}/library |
| 204 | ) |
| 205 | endif() |
Fabio Utzig | b6f014c | 2020-04-02 13:25:01 -0300 | [diff] [blame] | 206 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_ED25519 OR CONFIG_BOOT_ENCRYPT_X25519) |
Fabio Utzig | 34e93a5 | 2020-02-03 09:59:53 -0300 | [diff] [blame] | 207 | if(CONFIG_BOOT_USE_TINYCRYPT) |
| 208 | zephyr_library_include_directories( |
| 209 | ${MBEDTLS_ASN1_DIR}/include |
| 210 | ${BOOT_DIR}/zephyr/include |
| 211 | ${TINYCRYPT_DIR}/include |
| 212 | ${TINYCRYPT_SHA512_DIR}/include |
| 213 | ) |
| 214 | zephyr_library_sources( |
| 215 | ${TINYCRYPT_DIR}/source/sha256.c |
| 216 | ${TINYCRYPT_DIR}/source/utils.c |
| 217 | ${TINYCRYPT_SHA512_DIR}/source/sha512.c |
| 218 | # Additionally pull in just the ASN.1 parser from mbedTLS. |
| 219 | ${MBEDTLS_ASN1_DIR}/src/asn1parse.c |
| 220 | ${MBEDTLS_ASN1_DIR}/src/platform_util.c |
| 221 | ) |
| 222 | zephyr_library_compile_definitions( |
| 223 | MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h" |
| 224 | ) |
| 225 | else() |
| 226 | zephyr_include_directories(include) |
| 227 | endif() |
Fabio Utzig | 1171df9 | 2019-05-10 19:26:38 -0300 | [diff] [blame] | 228 | |
| 229 | zephyr_library_include_directories( |
| 230 | ${BOOT_DIR}/zephyr/include |
| 231 | ${FIAT_DIR}/include/ |
| 232 | ) |
| 233 | |
| 234 | zephyr_library_sources( |
| 235 | ${FIAT_DIR}/src/curve25519.c |
| 236 | ) |
Marti Bolivar | bf909a1 | 2017-11-13 19:43:46 -0500 | [diff] [blame] | 237 | endif() |
Andrzej Puzdrowski | 8e96b83 | 2017-09-08 16:49:14 +0200 | [diff] [blame] | 238 | |
Jamie McCrae | c9fa608 | 2023-07-21 10:23:17 +0100 | [diff] [blame] | 239 | if(CONFIG_BOOT_ENCRYPT_EC256 OR CONFIG_BOOT_ENCRYPT_X25519) |
Fabio Utzig | 42cc29a | 2019-11-05 07:54:41 -0300 | [diff] [blame] | 240 | zephyr_library_sources( |
| 241 | ${TINYCRYPT_DIR}/source/aes_encrypt.c |
| 242 | ${TINYCRYPT_DIR}/source/aes_decrypt.c |
| 243 | ${TINYCRYPT_DIR}/source/ctr_mode.c |
| 244 | ${TINYCRYPT_DIR}/source/hmac.c |
| 245 | ${TINYCRYPT_DIR}/source/ecc_dh.c |
| 246 | ) |
| 247 | endif() |
| 248 | |
Fabio Utzig | b6f014c | 2020-04-02 13:25:01 -0300 | [diff] [blame] | 249 | if(CONFIG_BOOT_ENCRYPT_EC256) |
| 250 | zephyr_library_sources( |
| 251 | ${TINYCRYPT_DIR}/source/ecc_dh.c |
| 252 | ) |
| 253 | endif() |
| 254 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 255 | if(CONFIG_MCUBOOT_SERIAL) |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 256 | zephyr_sources(${BOOT_DIR}/zephyr/serial_adapter.c) |
| 257 | zephyr_sources(${BOOT_DIR}/boot_serial/src/boot_serial.c) |
Jamie McCrae | cb07e88 | 2023-04-14 09:28:24 +0100 | [diff] [blame] | 258 | zephyr_sources(${BOOT_DIR}/boot_serial/src/zcbor_bulk.c) |
Dominik Ermel | 88bd567 | 2022-06-07 15:17:06 +0000 | [diff] [blame] | 259 | |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 260 | zephyr_include_directories(${BOOT_DIR}/bootutil/include) |
| 261 | zephyr_include_directories(${BOOT_DIR}/boot_serial/include) |
| 262 | zephyr_include_directories(include) |
Andrzej Puzdrowski | c2e30cf | 2018-07-20 16:19:09 +0200 | [diff] [blame] | 263 | |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 264 | zephyr_include_directories_ifdef( |
Fabio Utzig | ccc0280 | 2019-11-05 07:55:14 -0300 | [diff] [blame] | 265 | CONFIG_BOOT_ERASE_PROGRESSIVELY |
| 266 | ${BOOT_DIR}/bootutil/src |
| 267 | ) |
Jamie McCrae | c9fa608 | 2023-07-21 10:23:17 +0100 | [diff] [blame] | 268 | |
| 269 | if(CONFIG_BOOT_ENCRYPT_IMAGE) |
| 270 | zephyr_library_sources( |
| 271 | ${BOOT_DIR}/boot_serial/src/boot_serial_encryption.c |
| 272 | ) |
| 273 | endif() |
Andrzej Puzdrowski | 8e96b83 | 2017-09-08 16:49:14 +0200 | [diff] [blame] | 274 | endif() |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 275 | |
| 276 | if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "") |
Nico Lastzka | e16f52c | 2021-04-13 16:04:00 +0200 | [diff] [blame] | 277 | # CONF_FILE points to the KConfig configuration files of the bootloader. |
| 278 | foreach (filepath ${CONF_FILE}) |
| 279 | file(READ ${filepath} temp_text) |
| 280 | string(FIND "${temp_text}" ${CONFIG_BOOT_SIGNATURE_KEY_FILE} match) |
| 281 | if (${match} GREATER_EQUAL 0) |
| 282 | if (NOT DEFINED CONF_DIR) |
| 283 | get_filename_component(CONF_DIR ${filepath} DIRECTORY) |
| 284 | else() |
| 285 | message(FATAL_ERROR "Signature key file defined in multiple conf files") |
| 286 | endif() |
| 287 | endif() |
| 288 | endforeach() |
| 289 | |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 290 | if(IS_ABSOLUTE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| 291 | set(KEY_FILE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
Marek Pieta | c1cdcae | 2020-08-12 04:29:12 -0700 | [diff] [blame] | 292 | elseif((DEFINED CONF_DIR) AND |
| 293 | (EXISTS ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE})) |
Marek Pieta | bdcfc85 | 2020-08-04 02:22:55 -0700 | [diff] [blame] | 294 | set(KEY_FILE ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 295 | else() |
| 296 | set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}) |
| 297 | endif() |
Marek Pieta | c1cdcae | 2020-08-12 04:29:12 -0700 | [diff] [blame] | 298 | message("MCUBoot bootloader key file: ${KEY_FILE}") |
| 299 | |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 300 | set(GENERATED_PUBKEY ${ZEPHYR_BINARY_DIR}/autogen-pubkey.c) |
| 301 | add_custom_command( |
| 302 | OUTPUT ${GENERATED_PUBKEY} |
| 303 | COMMAND |
| 304 | ${PYTHON_EXECUTABLE} |
| 305 | ${MCUBOOT_DIR}/scripts/imgtool.py |
| 306 | getpub |
| 307 | -k |
| 308 | ${KEY_FILE} |
| 309 | > ${GENERATED_PUBKEY} |
| 310 | DEPENDS ${KEY_FILE} |
| 311 | ) |
Sebastian Bøe | be97217 | 2019-01-22 14:05:14 +0100 | [diff] [blame] | 312 | zephyr_library_sources(${GENERATED_PUBKEY}) |
Fabio Utzig | b1e0dc5 | 2018-04-26 10:53:19 -0300 | [diff] [blame] | 313 | endif() |
Sigvart Hovland | ebd0503 | 2019-03-21 10:47:32 +0100 | [diff] [blame] | 314 | |
Wouter Cappelle | 10a877c | 2022-01-28 08:40:28 +0100 | [diff] [blame] | 315 | if(CONFIG_BOOT_ENCRYPTION_KEY_FILE AND NOT CONFIG_BOOT_ENCRYPTION_KEY_FILE STREQUAL "") |
| 316 | # CONF_FILE points to the KConfig configuration files of the bootloader. |
| 317 | unset(CONF_DIR) |
| 318 | foreach(filepath ${CONF_FILE}) |
| 319 | file(READ ${filepath} temp_text) |
| 320 | string(FIND "${temp_text}" ${CONFIG_BOOT_ENCRYPTION_KEY_FILE} match) |
| 321 | if(${match} GREATER_EQUAL 0) |
| 322 | if(NOT DEFINED CONF_DIR) |
| 323 | get_filename_component(CONF_DIR ${filepath} DIRECTORY) |
| 324 | else() |
| 325 | message(FATAL_ERROR "Encryption key file defined in multiple conf files") |
| 326 | endif() |
Wouter Cappelle | 953a761 | 2021-05-03 16:53:05 +0200 | [diff] [blame] | 327 | endif() |
Wouter Cappelle | 10a877c | 2022-01-28 08:40:28 +0100 | [diff] [blame] | 328 | endforeach() |
Wouter Cappelle | 953a761 | 2021-05-03 16:53:05 +0200 | [diff] [blame] | 329 | |
Wouter Cappelle | 953a761 | 2021-05-03 16:53:05 +0200 | [diff] [blame] | 330 | if(IS_ABSOLUTE ${CONFIG_BOOT_ENCRYPTION_KEY_FILE}) |
| 331 | set(KEY_FILE ${CONFIG_BOOT_ENCRYPTION_KEY_FILE}) |
| 332 | elseif((DEFINED CONF_DIR) AND |
| 333 | (EXISTS ${CONF_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE})) |
| 334 | set(KEY_FILE ${CONF_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE}) |
| 335 | else() |
| 336 | set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE}) |
| 337 | endif() |
Wouter Cappelle | 10a877c | 2022-01-28 08:40:28 +0100 | [diff] [blame] | 338 | message("MCUBoot bootloader encryption key file: ${KEY_FILE}") |
Wouter Cappelle | 953a761 | 2021-05-03 16:53:05 +0200 | [diff] [blame] | 339 | |
| 340 | set(GENERATED_ENCKEY ${ZEPHYR_BINARY_DIR}/autogen-enckey.c) |
| 341 | add_custom_command( |
| 342 | OUTPUT ${GENERATED_ENCKEY} |
| 343 | COMMAND |
| 344 | ${PYTHON_EXECUTABLE} |
| 345 | ${MCUBOOT_DIR}/scripts/imgtool.py |
| 346 | getpriv |
| 347 | -k |
| 348 | ${KEY_FILE} |
| 349 | > ${GENERATED_ENCKEY} |
| 350 | DEPENDS ${KEY_FILE} |
| 351 | ) |
| 352 | zephyr_library_sources(${GENERATED_ENCKEY}) |
| 353 | endif() |
| 354 | |
Andrzej Puzdrowski | 9a605b6 | 2020-03-16 13:34:30 +0100 | [diff] [blame] | 355 | if(CONFIG_MCUBOOT_CLEANUP_ARM_CORE) |
| 356 | zephyr_library_sources( |
| 357 | ${BOOT_DIR}/zephyr/arm_cleanup.c |
| 358 | ) |
| 359 | endif() |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 360 | |
Jamie McCrae | 1496129 | 2024-04-18 09:12:09 +0100 | [diff] [blame] | 361 | if(CONFIG_MCUBOOT_BOOT_BANNER) |
| 362 | # Replace Zephyr's boot banner with the MCUboot one |
| 363 | zephyr_sources(kernel/banner.c) |
| 364 | endif() |
| 365 | |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 366 | if(SYSBUILD) |
| 367 | function(align_up num align result) |
| 368 | math(EXPR out "(((${num}) + ((${align}) - 1)) & ~((${align}) - 1))") |
| 369 | set(${result} "${out}" PARENT_SCOPE) |
| 370 | endfunction() |
| 371 | |
| 372 | function(dt_get_parent node) |
| 373 | string(FIND "${${node}}" "/" pos REVERSE) |
| 374 | |
| 375 | if(pos EQUAL -1) |
| 376 | message(ERROR "Unable to get parent of node: ${${node}}") |
| 377 | endif() |
| 378 | |
| 379 | string(SUBSTRING "${${node}}" 0 ${pos} ${node}) |
| 380 | set(${node} "${${node}}" PARENT_SCOPE) |
| 381 | endfunction() |
| 382 | |
| 383 | if(CONFIG_SINGLE_APPLICATION_SLOT OR CONFIG_BOOT_FIRMWARE_LOADER OR CONFIG_BOOT_SWAP_USING_SCRATCH OR CONFIG_BOOT_SWAP_USING_MOVE OR CONFIG_BOOT_UPGRADE_ONLY OR CONFIG_BOOT_DIRECT_XIP OR CONFIG_BOOT_RAM_LOAD) |
| 384 | # TODO: RAM LOAD support |
| 385 | dt_nodelabel(slot0_flash NODELABEL "slot0_partition") |
| 386 | dt_get_parent(slot0_flash) |
| 387 | dt_get_parent(slot0_flash) |
| 388 | |
| 389 | if(NOT CONFIG_SINGLE_APPLICATION_SLOT) |
| 390 | dt_nodelabel(slot1_flash NODELABEL "slot1_partition") |
| 391 | dt_get_parent(slot1_flash) |
| 392 | dt_get_parent(slot1_flash) |
| 393 | |
| 394 | if(NOT "${slot0_flash}" STREQUAL "${slot1_flash}") |
| 395 | # Check both slots for the one with the largest write/erase block size |
| 396 | dt_prop(erase_size_slot0 PATH "${slot0_flash}" PROPERTY "erase-block-size") |
| 397 | dt_prop(write_size_slot0 PATH "${slot0_flash}" PROPERTY "write-block-size") |
| 398 | dt_prop(erase_size_slot1 PATH "${slot1_flash}" PROPERTY "erase-block-size") |
| 399 | dt_prop(write_size_slot1 PATH "${slot1_flash}" PROPERTY "write-block-size") |
| 400 | |
Jamie McCrae | db9a7f5 | 2023-12-18 13:45:27 +0000 | [diff] [blame] | 401 | if(DEFINED erase_size_slot0 AND DEFINED erase_size_slot1) |
| 402 | if(${erase_size_slot0} GREATER ${erase_size_slot1}) |
| 403 | set(erase_size ${erase_size_slot0}) |
| 404 | else() |
| 405 | set(erase_size ${erase_size_slot1}) |
| 406 | endif() |
| 407 | elseif(DEFINED erase_size_slot0) |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 408 | set(erase_size ${erase_size_slot0}) |
Jamie McCrae | db9a7f5 | 2023-12-18 13:45:27 +0000 | [diff] [blame] | 409 | elseif(DEFINED erase_size_slot1) |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 410 | set(erase_size ${erase_size_slot1}) |
| 411 | endif() |
| 412 | |
Jamie McCrae | db9a7f5 | 2023-12-18 13:45:27 +0000 | [diff] [blame] | 413 | if(DEFINED write_size_slot0 AND DEFINED write_size_slot1) |
| 414 | if(${write_size_slot0} GREATER ${write_size_slot1}) |
| 415 | set(write_size ${write_size_slot0}) |
| 416 | else() |
| 417 | set(write_size ${write_size_slot1}) |
| 418 | endif() |
| 419 | elseif(DEFINED write_size_slot0) |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 420 | set(write_size ${write_size_slot0}) |
Jamie McCrae | db9a7f5 | 2023-12-18 13:45:27 +0000 | [diff] [blame] | 421 | elseif(DEFINED write_size_slot1) |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 422 | set(write_size ${write_size_slot1}) |
| 423 | endif() |
| 424 | else() |
| 425 | dt_prop(erase_size PATH "${slot0_flash}" PROPERTY "erase-block-size") |
| 426 | dt_prop(write_size PATH "${slot0_flash}" PROPERTY "write-block-size") |
| 427 | endif() |
| 428 | else() |
| 429 | dt_prop(erase_size PATH "${slot0_flash}" PROPERTY "erase-block-size") |
| 430 | dt_prop(write_size PATH "${slot0_flash}" PROPERTY "write-block-size") |
| 431 | endif() |
| 432 | |
Jamie McCrae | db9a7f5 | 2023-12-18 13:45:27 +0000 | [diff] [blame] | 433 | if(NOT DEFINED erase_size) |
| 434 | message(WARNING "Unable to determine erase size of slot0 or slot1 partition, setting to 1 (this is probably wrong)") |
| 435 | set(erase_size 1) |
| 436 | endif() |
| 437 | |
| 438 | if(NOT DEFINED write_size) |
| 439 | message(WARNING "Unable to determine write size of slot0 or slot1 partition, setting to 8 (this is probably wrong)") |
| 440 | set(write_size 8) |
Jamie McCrae | 9fb7ce5 | 2024-03-12 13:51:22 +0000 | [diff] [blame] | 441 | endif() |
| 442 | |
| 443 | if(${write_size} LESS 8) |
| 444 | set(max_align_size 8) |
| 445 | else() |
| 446 | set(max_align_size ${write_size}) |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 447 | endif() |
| 448 | |
| 449 | set(key_size 0) |
| 450 | |
| 451 | # Boot trailer magic size |
| 452 | set(boot_magic_size 16) |
| 453 | |
| 454 | # Estimates for trailer TLV data size, this was taken from hello world builds for nrf52840dk |
| 455 | if(CONFIG_BOOT_SIGNATURE_TYPE_RSA) |
| 456 | if(CONFIG_BOOT_SIGNATURE_TYPE_RSA_LEN EQUAL 3072) |
| 457 | set(boot_tlv_estimate 464) |
| 458 | else() |
| 459 | set(boot_tlv_estimate 336) |
| 460 | endif() |
| 461 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256) |
| 462 | set(boot_tlv_estimate 150) |
| 463 | elseif(CONFIG_BOOT_SIGNATURE_TYPE_ED25519) |
| 464 | set(boot_tlv_estimate 144) |
| 465 | else() |
| 466 | set(boot_tlv_estimate 40) |
| 467 | endif() |
| 468 | |
| 469 | if(CONFIG_BOOT_ENCRYPT_RSA OR CONFIG_BOOT_ENCRYPT_EC256 OR CONFIG_BOOT_ENCRYPT_X25519) |
| 470 | # 128-bit AES key size |
| 471 | set(boot_enc_key_size 16) |
| 472 | |
| 473 | if(CONFIG_BOOT_SWAP_SAVE_ENCTLV) |
| 474 | if(CONFIG_BOOT_ENCRYPT_RSA) |
| 475 | set(key_size 256) |
| 476 | elseif(CONFIG_BOOT_ENCRYPT_EC256) |
| 477 | math(EXPR key_size "65 + 32 + ${boot_enc_key_size}") |
| 478 | elseif(CONFIG_BOOT_ENCRYPT_X25519) |
| 479 | math(EXPR key_size "32 + 32 + ${boot_enc_key_size}") |
| 480 | endif() |
| 481 | else() |
| 482 | set(key_size "${boot_enc_key_size}") |
| 483 | endif() |
| 484 | |
Jamie McCrae | 9fb7ce5 | 2024-03-12 13:51:22 +0000 | [diff] [blame] | 485 | align_up(${key_size} ${max_align_size} key_size) |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 486 | math(EXPR key_size "${key_size} * 2") |
| 487 | endif() |
| 488 | |
| 489 | align_up(${boot_magic_size} ${write_size} boot_magic_size) |
| 490 | |
| 491 | if(CONFIG_SINGLE_APPLICATION_SLOT OR CONFIG_BOOT_FIRMWARE_LOADER) |
| 492 | set(boot_swap_data_size 0) |
| 493 | else() |
Jamie McCrae | 9fb7ce5 | 2024-03-12 13:51:22 +0000 | [diff] [blame] | 494 | math(EXPR boot_swap_data_size "${max_align_size} * 4") |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 495 | endif() |
| 496 | |
| 497 | if(CONFIG_BOOT_SWAP_USING_SCRATCH OR CONFIG_BOOT_SWAP_USING_MOVE) |
| 498 | math(EXPR boot_status_data_size "${CONFIG_BOOT_MAX_IMG_SECTORS} * (3 * ${write_size})") |
| 499 | else() |
| 500 | set(boot_status_data_size 0) |
| 501 | endif() |
| 502 | |
| 503 | math(EXPR required_size "${key_size} + ${boot_magic_size} + ${boot_swap_data_size} + ${boot_status_data_size} + ${boot_tlv_estimate}") |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 504 | align_up(${required_size} ${erase_size} required_size) |
| 505 | |
Jamie McCrae | a4eda30 | 2024-01-29 11:00:25 +0000 | [diff] [blame] | 506 | if(CONFIG_SINGLE_APPLICATION_SLOT OR CONFIG_BOOT_FIRMWARE_LOADER) |
| 507 | set(required_upgrade_size "0") |
| 508 | else() |
| 509 | math(EXPR required_upgrade_size "${boot_magic_size} + ${boot_swap_data_size} + ${boot_status_data_size}") |
| 510 | align_up(${required_upgrade_size} ${erase_size} required_upgrade_size) |
| 511 | endif() |
| 512 | |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 513 | if(CONFIG_BOOT_SWAP_USING_MOVE) |
| 514 | math(EXPR required_size "${required_size} + ${erase_size}") |
Jamie McCrae | a4eda30 | 2024-01-29 11:00:25 +0000 | [diff] [blame] | 515 | math(EXPR required_upgrade_size "${required_upgrade_size} + ${erase_size}") |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 516 | endif() |
| 517 | else() |
| 518 | set(required_size 0) |
Jamie McCrae | a4eda30 | 2024-01-29 11:00:25 +0000 | [diff] [blame] | 519 | set(required_upgrade_size 0) |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 520 | endif() |
| 521 | |
| 522 | set(mcuboot_image_footer_size ${required_size} CACHE INTERNAL "Estimated MCUboot image trailer size" FORCE) |
Jamie McCrae | a4eda30 | 2024-01-29 11:00:25 +0000 | [diff] [blame] | 523 | set(mcuboot_image_upgrade_footer_size ${required_upgrade_size} CACHE INTERNAL "Estimated MCUboot update image trailer size" FORCE) |
Jamie McCrae | 4c7942e | 2023-10-30 11:59:57 +0000 | [diff] [blame] | 524 | endif() |