# CMakeLists.txt for building mcuboot as a Zephyr project # # Copyright (c) 2017 Open Source Foundries Limited # # SPDX-License-Identifier: Apache-2.0 cmake_minimum_required(VERSION 3.8.2) set(KCONFIG_ROOT ${CMAKE_CURRENT_SOURCE_DIR}/Kconfig) # Board-specific CONF_FILES should get merged into the build as well. # # Do this by defining the set_conf_file macro: # http://docs.zephyrproject.org/application/application.html#application-configuration macro(set_conf_file) if (EXISTS ${APPLICATION_SOURCE_DIR}/boards/${BOARD}.conf) set(CONF_FILE "prj.conf ${APPLICATION_SOURCE_DIR}/boards/${BOARD}.conf") else() set(CONF_FILE prj.conf) endif() endmacro() # The board should be set to a supported target. if (NOT DEFINED BOARD) set(BOARD qemu_x86) endif() # Add a common dts overlay necessary to ensure mcuboot is linked into, # and fits inside, the boot partition. (If the user specified a # DTC_OVERLAY_FILE on the CMake command line, we need to append onto # the list). if(DTC_OVERLAY_FILE) set(DTC_OVERLAY_FILE "${DTC_OVERLAY_FILE} ${CMAKE_CURRENT_LIST_DIR}/dts.overlay") else() set(DTC_OVERLAY_FILE ${CMAKE_CURRENT_LIST_DIR}/dts.overlay) endif() # Enable Zephyr runner options which request mass erase if so # configured. # # Note that this also disables the default "leave" option when # targeting STM32 DfuSe devices with dfu-util, making the chip stay in # the bootloader after flashing. # # That's the right thing, because mcuboot has nothing to do since the # chip was just erased. The next thing the user is going to want to do # is flash the application. (Developers can reset DfuSE devices # manually to test mcuboot behavior on an otherwise erased flash # device.) macro(app_set_runner_args) if(CONFIG_ZEPHYR_TRY_MASS_ERASE) board_runner_args(dfu-util "--dfuse-modifiers=force:mass-erase") board_runner_args(pyocd "--flashtool-opt=-ce") endif() endmacro() # Standard Zephyr application boilerplate: # http://docs.zephyrproject.org/application/application.html include($ENV{ZEPHYR_BASE}/cmake/app/boilerplate.cmake NO_POLICY_SCOPE) project(NONE) # Path to "boot" subdirectory of repository root. get_filename_component(BOOT_DIR ${APPLICATION_SOURCE_DIR} DIRECTORY) # Path to top-level repository root directory. get_filename_component(MCUBOOT_DIR ${BOOT_DIR} DIRECTORY) # Path to tinycrypt library source subdirectory of MCUBOOT_DIR. set(TINYCRYPT_DIR "${MCUBOOT_DIR}/ext/tinycrypt/lib") # Path to mbed-tls' asn1 parser library. set(MBEDTLS_ASN1_DIR "${MCUBOOT_DIR}/ext/mbedtls") target_include_directories(app PRIVATE include) target_include_directories(app PRIVATE targets) if(EXISTS "${APPLICATION_SOURCE_DIR}/targets/${BOARD}.h") target_compile_definitions(app PRIVATE "-DMCUBOOT_TARGET_CONFIG=\"${BOARD}.h\"") endif() # Zephyr port-specific sources. target_sources(app PRIVATE main.c) target_sources(app PRIVATE flash_map_extended.c) target_sources(app PRIVATE os.c) target_sources(app PRIVATE keys.c) if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT) target_sources(app PRIVATE flash_map_legacy.c) endif() # Generic bootutil sources and includes. target_include_directories(app PRIVATE "${BOOT_DIR}/bootutil/include") target_sources(app PRIVATE "${BOOT_DIR}/bootutil/src/loader.c") target_sources(app PRIVATE "${BOOT_DIR}/bootutil/src/bootutil_misc.c") target_sources(app PRIVATE "${BOOT_DIR}/bootutil/src/image_validate.c") target_sources(app PRIVATE "${BOOT_DIR}/bootutil/src/image_rsa.c") target_sources(app PRIVATE "${BOOT_DIR}/bootutil/src/image_ec256.c") target_sources(app PRIVATE "${BOOT_DIR}/bootutil/src/caps.c") if(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256) # When using ECDSA signatures, pull in our copy of the tinycrypt library. target_include_directories(app PRIVATE "${BOOT_DIR}/zephyr/include") target_include_directories(app PRIVATE "${TINYCRYPT_DIR}/include") target_include_directories(app PRIVATE "${MBEDTLS_ASN1_DIR}/include") target_sources(app PRIVATE "${TINYCRYPT_DIR}/source/ecc.c") target_sources(app PRIVATE "${TINYCRYPT_DIR}/source/ecc_dsa.c") target_sources(app PRIVATE "${TINYCRYPT_DIR}/source/sha256.c") target_sources(app PRIVATE "${TINYCRYPT_DIR}/source/utils.c") # When building for ECDSA, we use our own copy of mbedTLS, so the Zephyr # one must not be enabled or the MBEDTLS_CONFIG_FILE macros will collide. if(DEFINED CONFIG_MBEDTLS) message(FATAL_ERROR "\ CONFIG_MBEDTLS should not be enabled. \ Try adding CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256=y to your prj.conf, \ delete the build folder and build from scratch.") endif() # Since here we are not using Zephyr's mbedTLS but rather our own, we need # to set MBEDTLS_CONFIG_FILE ourselves. When using Zephyr's copy, this # variable is set by its Kconfig in the Zephyr codebase. target_compile_definitions(app PRIVATE MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h") # Additionally pull in just the ASN.1 parser from mbedTLS. target_sources(app PRIVATE "${MBEDTLS_ASN1_DIR}/src/asn1parse.c") elseif(CONFIG_BOOT_SIGNATURE_TYPE_RSA) # Use mbedTLS provided by Zephyr for RSA signatures. (Its config file # is set using Kconfig.) zephyr_include_directories(include) target_include_directories(app PRIVATE $ENV{ZEPHYR_BASE}/ext/lib/crypto/mbedtls/include) endif() if (CONFIG_MCUBOOT_SERIAL) zephyr_sources(${BOOT_DIR}/zephyr/serial_adapter.c) zephyr_sources(${BOOT_DIR}/boot_serial/src/boot_serial.c) zephyr_include_directories(${BOOT_DIR}/bootutil/include) zephyr_include_directories(${BOOT_DIR}/boot_serial/include) zephyr_include_directories(include) zephyr_link_libraries_ifdef(CONFIG_TINYCBOR TINYCBOR) endif() if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "") if(IS_ABSOLUTE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) set(KEY_FILE ${CONFIG_BOOT_SIGNATURE_KEY_FILE}) else() set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}) endif() set(GENERATED_PUBKEY ${ZEPHYR_BINARY_DIR}/autogen-pubkey.c) add_custom_command( OUTPUT ${GENERATED_PUBKEY} COMMAND ${PYTHON_EXECUTABLE} ${MCUBOOT_DIR}/scripts/imgtool.py getpub -k ${KEY_FILE} > ${GENERATED_PUBKEY} DEPENDS ${KEY_FILE} ) target_sources(app PRIVATE "${GENERATED_PUBKEY}") endif()