525 lines
17 KiB
CMake
525 lines
17 KiB
CMake
# CMakeLists.txt for building mcuboot as a Zephyr project
|
|
#
|
|
# Copyright (c) 2017 Open Source Foundries Limited
|
|
# Copyright (c) 2023 Nordic Semiconductor ASA
|
|
#
|
|
# SPDX-License-Identifier: Apache-2.0
|
|
|
|
cmake_minimum_required(VERSION 3.13.1)
|
|
|
|
# find_package(Zephyr) in order to load application boilerplate:
|
|
# http://docs.zephyrproject.org/application/application.html
|
|
find_package(Zephyr REQUIRED HINTS $ENV{ZEPHYR_BASE})
|
|
project(NONE)
|
|
|
|
# Path to "boot" subdirectory of repository root.
|
|
get_filename_component(BOOT_DIR ${APPLICATION_SOURCE_DIR} DIRECTORY)
|
|
# Path to top-level repository root directory.
|
|
get_filename_component(MCUBOOT_DIR ${BOOT_DIR} DIRECTORY)
|
|
# Path to tinycrypt library source subdirectory of MCUBOOT_DIR.
|
|
set(TINYCRYPT_DIR "${MCUBOOT_DIR}/ext/tinycrypt/lib")
|
|
assert_exists(TINYCRYPT_DIR)
|
|
set(TINYCRYPT_SHA512_DIR "${MCUBOOT_DIR}/ext/tinycrypt-sha512/lib")
|
|
assert_exists(TINYCRYPT_SHA512_DIR)
|
|
# Path to crypto-fiat
|
|
set(FIAT_DIR "${MCUBOOT_DIR}/ext/fiat")
|
|
assert_exists(FIAT_DIR)
|
|
# Path to mbed-tls' asn1 parser library.
|
|
set(MBEDTLS_ASN1_DIR "${MCUBOOT_DIR}/ext/mbedtls-asn1")
|
|
assert_exists(MBEDTLS_ASN1_DIR)
|
|
set(NRF_DIR "${MCUBOOT_DIR}/ext/nrf")
|
|
|
|
if(CONFIG_BOOT_USE_NRF_CC310_BL)
|
|
set(NRFXLIB_DIR ${ZEPHYR_BASE}/../nrfxlib)
|
|
if(NOT EXISTS ${NRFXLIB_DIR})
|
|
message(FATAL_ERROR "
|
|
------------------------------------------------------------------------
|
|
No such file or directory: ${NRFXLIB_DIR}
|
|
The current configuration enables nRF CC310 crypto accelerator hardware
|
|
with the `CONFIG_BOOT_USE_NRF_CC310_BL` option. Please follow
|
|
`ext/nrf/README.md` guide to fix your setup or use tinycrypt instead of
|
|
the HW accelerator.
|
|
To use the tinycrypt set `CONFIG_BOOT_ECDSA_TINYCRYPT` to y.
|
|
------------------------------------------------------------------------")
|
|
endif()
|
|
# Don't include this if we are using west
|
|
add_subdirectory(${NRFXLIB_DIR} ${PROJECT_BINARY_DIR}/nrfxlib)
|
|
endif()
|
|
|
|
zephyr_library_include_directories(
|
|
include
|
|
targets
|
|
)
|
|
if(EXISTS targets/${BOARD}.h)
|
|
zephyr_library_compile_definitions(MCUBOOT_TARGET_CONFIG="${BOARD}.h")
|
|
endif()
|
|
|
|
# Zephyr port-specific sources.
|
|
zephyr_library_sources(
|
|
main.c
|
|
io.c
|
|
flash_map_extended.c
|
|
os.c
|
|
keys.c
|
|
)
|
|
|
|
if(DEFINED CONFIG_ENABLE_MGMT_PERUSER)
|
|
zephyr_library_sources(
|
|
boot_serial_extensions.c
|
|
)
|
|
|
|
zephyr_linker_sources_ifdef(
|
|
CONFIG_ENABLE_MGMT_PERUSER
|
|
SECTIONS include/boot_serial/boot_serial.ld
|
|
)
|
|
|
|
if(DEFINED CONFIG_BOOT_MGMT_CUSTOM_STORAGE_ERASE OR DEFINED CONFIG_BOOT_MGMT_CUSTOM_IMG_LIST)
|
|
zephyr_library_sources(
|
|
boot_serial_extension_zephyr_basic.c
|
|
)
|
|
endif()
|
|
endif()
|
|
|
|
if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT)
|
|
zephyr_library_sources(
|
|
flash_map_legacy.c
|
|
)
|
|
endif()
|
|
|
|
if(DEFINED CONFIG_BOOT_SHARE_BACKEND_RETENTION)
|
|
zephyr_library_sources(
|
|
shared_data.c
|
|
)
|
|
endif()
|
|
|
|
# Generic bootutil sources and includes.
|
|
zephyr_library_include_directories(${BOOT_DIR}/bootutil/include)
|
|
zephyr_library_sources(
|
|
${BOOT_DIR}/bootutil/src/image_validate.c
|
|
${BOOT_DIR}/bootutil/src/tlv.c
|
|
${BOOT_DIR}/bootutil/src/encrypted.c
|
|
${BOOT_DIR}/bootutil/src/image_rsa.c
|
|
${BOOT_DIR}/bootutil/src/image_ecdsa.c
|
|
${BOOT_DIR}/bootutil/src/image_ed25519.c
|
|
${BOOT_DIR}/bootutil/src/bootutil_misc.c
|
|
${BOOT_DIR}/bootutil/src/fault_injection_hardening.c
|
|
)
|
|
|
|
if(DEFINED CONFIG_MEASURED_BOOT OR DEFINED CONFIG_BOOT_SHARE_DATA)
|
|
zephyr_library_sources(
|
|
${BOOT_DIR}/bootutil/src/boot_record.c
|
|
)
|
|
|
|
# Set a define for this file which will allow inclusion of the Zephyr version
|
|
# include file
|
|
set_source_files_properties(
|
|
${BOOT_DIR}/bootutil/src/boot_record.c
|
|
PROPERTIES COMPILE_FLAGS -DZEPHYR_VER_INCLUDE=1
|
|
)
|
|
endif()
|
|
|
|
# library which might be common source code for MCUBoot and an application
|
|
zephyr_link_libraries(MCUBOOT_BOOTUTIL)
|
|
|
|
if(CONFIG_BOOT_FIH_PROFILE_HIGH)
|
|
zephyr_library_sources(
|
|
${BOOT_DIR}/bootutil/src/fault_injection_hardening_delay_rng_mbedtls.c
|
|
)
|
|
endif()
|
|
|
|
if(CONFIG_SINGLE_APPLICATION_SLOT)
|
|
zephyr_library_sources(
|
|
${BOOT_DIR}/zephyr/single_loader.c
|
|
)
|
|
zephyr_library_include_directories(${BOOT_DIR}/bootutil/src)
|
|
elseif(CONFIG_BOOT_FIRMWARE_LOADER)
|
|
zephyr_library_sources(
|
|
${BOOT_DIR}/zephyr/firmware_loader.c
|
|
)
|
|
zephyr_library_include_directories(${BOOT_DIR}/bootutil/src)
|
|
else()
|
|
zephyr_library_sources(
|
|
${BOOT_DIR}/bootutil/src/loader.c
|
|
${BOOT_DIR}/bootutil/src/swap_misc.c
|
|
${BOOT_DIR}/bootutil/src/swap_scratch.c
|
|
${BOOT_DIR}/bootutil/src/swap_move.c
|
|
${BOOT_DIR}/bootutil/src/caps.c
|
|
)
|
|
endif()
|
|
|
|
if(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256 OR CONFIG_BOOT_ENCRYPT_EC256)
|
|
zephyr_library_include_directories(
|
|
${MBEDTLS_ASN1_DIR}/include
|
|
)
|
|
zephyr_library_sources(
|
|
# Additionally pull in just the ASN.1 parser from mbedTLS.
|
|
${MBEDTLS_ASN1_DIR}/src/asn1parse.c
|
|
${MBEDTLS_ASN1_DIR}/src/platform_util.c
|
|
)
|
|
if(CONFIG_BOOT_USE_TINYCRYPT)
|
|
# When using ECDSA signatures, pull in our copy of the tinycrypt library.
|
|
zephyr_library_include_directories(
|
|
${BOOT_DIR}/zephyr/include
|
|
${TINYCRYPT_DIR}/include
|
|
)
|
|
zephyr_include_directories(${TINYCRYPT_DIR}/include)
|
|
|
|
zephyr_library_sources(
|
|
${TINYCRYPT_DIR}/source/ecc.c
|
|
${TINYCRYPT_DIR}/source/ecc_dsa.c
|
|
${TINYCRYPT_DIR}/source/sha256.c
|
|
${TINYCRYPT_DIR}/source/utils.c
|
|
)
|
|
elseif(CONFIG_BOOT_USE_NRF_CC310_BL)
|
|
zephyr_library_sources(${NRF_DIR}/cc310_glue.c)
|
|
zephyr_library_include_directories(${NRF_DIR})
|
|
zephyr_link_libraries(nrfxlib_crypto)
|
|
endif()
|
|
|
|
# Since here we are not using Zephyr's mbedTLS but rather our own, we need
|
|
# to set MBEDTLS_CONFIG_FILE ourselves. When using Zephyr's copy, this
|
|
# variable is set by its Kconfig in the Zephyr codebase.
|
|
zephyr_library_compile_definitions(
|
|
MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h"
|
|
)
|
|
elseif(CONFIG_BOOT_SIGNATURE_TYPE_NONE)
|
|
zephyr_library_include_directories(
|
|
${BOOT_DIR}/zephyr/include
|
|
${TINYCRYPT_DIR}/include
|
|
)
|
|
|
|
zephyr_library_sources(
|
|
${TINYCRYPT_DIR}/source/sha256.c
|
|
${TINYCRYPT_DIR}/source/utils.c
|
|
)
|
|
elseif(CONFIG_BOOT_SIGNATURE_TYPE_RSA)
|
|
# Use mbedTLS provided by Zephyr for RSA signatures. (Its config file
|
|
# is set using Kconfig.)
|
|
zephyr_include_directories(include)
|
|
if(CONFIG_BOOT_ENCRYPT_RSA)
|
|
set_source_files_properties(
|
|
${BOOT_DIR}/bootutil/src/encrypted.c
|
|
PROPERTIES
|
|
INCLUDE_DIRECTORIES ${ZEPHYR_MBEDTLS_MODULE_DIR}/library
|
|
)
|
|
endif()
|
|
elseif(CONFIG_BOOT_SIGNATURE_TYPE_ED25519 OR CONFIG_BOOT_ENCRYPT_X25519)
|
|
if(CONFIG_BOOT_USE_TINYCRYPT)
|
|
zephyr_library_include_directories(
|
|
${MBEDTLS_ASN1_DIR}/include
|
|
${BOOT_DIR}/zephyr/include
|
|
${TINYCRYPT_DIR}/include
|
|
${TINYCRYPT_SHA512_DIR}/include
|
|
)
|
|
zephyr_library_sources(
|
|
${TINYCRYPT_DIR}/source/sha256.c
|
|
${TINYCRYPT_DIR}/source/utils.c
|
|
${TINYCRYPT_SHA512_DIR}/source/sha512.c
|
|
# Additionally pull in just the ASN.1 parser from mbedTLS.
|
|
${MBEDTLS_ASN1_DIR}/src/asn1parse.c
|
|
${MBEDTLS_ASN1_DIR}/src/platform_util.c
|
|
)
|
|
zephyr_library_compile_definitions(
|
|
MBEDTLS_CONFIG_FILE="${CMAKE_CURRENT_LIST_DIR}/include/mcuboot-mbedtls-cfg.h"
|
|
)
|
|
else()
|
|
zephyr_include_directories(include)
|
|
endif()
|
|
|
|
zephyr_library_include_directories(
|
|
${BOOT_DIR}/zephyr/include
|
|
${FIAT_DIR}/include/
|
|
)
|
|
|
|
zephyr_library_sources(
|
|
${FIAT_DIR}/src/curve25519.c
|
|
)
|
|
endif()
|
|
|
|
if(CONFIG_BOOT_ENCRYPT_EC256 OR CONFIG_BOOT_ENCRYPT_X25519)
|
|
zephyr_library_sources(
|
|
${TINYCRYPT_DIR}/source/aes_encrypt.c
|
|
${TINYCRYPT_DIR}/source/aes_decrypt.c
|
|
${TINYCRYPT_DIR}/source/ctr_mode.c
|
|
${TINYCRYPT_DIR}/source/hmac.c
|
|
${TINYCRYPT_DIR}/source/ecc_dh.c
|
|
)
|
|
endif()
|
|
|
|
if(CONFIG_BOOT_ENCRYPT_EC256)
|
|
zephyr_library_sources(
|
|
${TINYCRYPT_DIR}/source/ecc_dh.c
|
|
)
|
|
endif()
|
|
|
|
if(CONFIG_MCUBOOT_SERIAL)
|
|
zephyr_sources(${BOOT_DIR}/zephyr/serial_adapter.c)
|
|
zephyr_sources(${BOOT_DIR}/boot_serial/src/boot_serial.c)
|
|
zephyr_sources(${BOOT_DIR}/boot_serial/src/zcbor_bulk.c)
|
|
|
|
zephyr_include_directories(${BOOT_DIR}/bootutil/include)
|
|
zephyr_include_directories(${BOOT_DIR}/boot_serial/include)
|
|
zephyr_include_directories(include)
|
|
|
|
zephyr_include_directories_ifdef(
|
|
CONFIG_BOOT_ERASE_PROGRESSIVELY
|
|
${BOOT_DIR}/bootutil/src
|
|
)
|
|
|
|
if(CONFIG_BOOT_ENCRYPT_IMAGE)
|
|
zephyr_library_sources(
|
|
${BOOT_DIR}/boot_serial/src/boot_serial_encryption.c
|
|
)
|
|
endif()
|
|
endif()
|
|
|
|
if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "")
|
|
# CONF_FILE points to the KConfig configuration files of the bootloader.
|
|
foreach (filepath ${CONF_FILE})
|
|
file(READ ${filepath} temp_text)
|
|
string(FIND "${temp_text}" ${CONFIG_BOOT_SIGNATURE_KEY_FILE} match)
|
|
if (${match} GREATER_EQUAL 0)
|
|
if (NOT DEFINED CONF_DIR)
|
|
get_filename_component(CONF_DIR ${filepath} DIRECTORY)
|
|
else()
|
|
message(FATAL_ERROR "Signature key file defined in multiple conf files")
|
|
endif()
|
|
endif()
|
|
endforeach()
|
|
|
|
if(IS_ABSOLUTE ${CONFIG_BOOT_SIGNATURE_KEY_FILE})
|
|
set(KEY_FILE ${CONFIG_BOOT_SIGNATURE_KEY_FILE})
|
|
elseif((DEFINED CONF_DIR) AND
|
|
(EXISTS ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE}))
|
|
set(KEY_FILE ${CONF_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE})
|
|
else()
|
|
set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_SIGNATURE_KEY_FILE})
|
|
endif()
|
|
message("MCUBoot bootloader key file: ${KEY_FILE}")
|
|
|
|
set(GENERATED_PUBKEY ${ZEPHYR_BINARY_DIR}/autogen-pubkey.c)
|
|
add_custom_command(
|
|
OUTPUT ${GENERATED_PUBKEY}
|
|
COMMAND
|
|
${PYTHON_EXECUTABLE}
|
|
${MCUBOOT_DIR}/scripts/imgtool.py
|
|
getpub
|
|
-k
|
|
${KEY_FILE}
|
|
> ${GENERATED_PUBKEY}
|
|
DEPENDS ${KEY_FILE}
|
|
)
|
|
zephyr_library_sources(${GENERATED_PUBKEY})
|
|
endif()
|
|
|
|
if(CONFIG_BOOT_ENCRYPTION_KEY_FILE AND NOT CONFIG_BOOT_ENCRYPTION_KEY_FILE STREQUAL "")
|
|
# CONF_FILE points to the KConfig configuration files of the bootloader.
|
|
unset(CONF_DIR)
|
|
foreach(filepath ${CONF_FILE})
|
|
file(READ ${filepath} temp_text)
|
|
string(FIND "${temp_text}" ${CONFIG_BOOT_ENCRYPTION_KEY_FILE} match)
|
|
if(${match} GREATER_EQUAL 0)
|
|
if(NOT DEFINED CONF_DIR)
|
|
get_filename_component(CONF_DIR ${filepath} DIRECTORY)
|
|
else()
|
|
message(FATAL_ERROR "Encryption key file defined in multiple conf files")
|
|
endif()
|
|
endif()
|
|
endforeach()
|
|
|
|
if(IS_ABSOLUTE ${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
|
|
set(KEY_FILE ${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
|
|
elseif((DEFINED CONF_DIR) AND
|
|
(EXISTS ${CONF_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE}))
|
|
set(KEY_FILE ${CONF_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
|
|
else()
|
|
set(KEY_FILE ${MCUBOOT_DIR}/${CONFIG_BOOT_ENCRYPTION_KEY_FILE})
|
|
endif()
|
|
message("MCUBoot bootloader encryption key file: ${KEY_FILE}")
|
|
|
|
set(GENERATED_ENCKEY ${ZEPHYR_BINARY_DIR}/autogen-enckey.c)
|
|
add_custom_command(
|
|
OUTPUT ${GENERATED_ENCKEY}
|
|
COMMAND
|
|
${PYTHON_EXECUTABLE}
|
|
${MCUBOOT_DIR}/scripts/imgtool.py
|
|
getpriv
|
|
-k
|
|
${KEY_FILE}
|
|
> ${GENERATED_ENCKEY}
|
|
DEPENDS ${KEY_FILE}
|
|
)
|
|
zephyr_library_sources(${GENERATED_ENCKEY})
|
|
endif()
|
|
|
|
if(CONFIG_MCUBOOT_CLEANUP_ARM_CORE)
|
|
zephyr_library_sources(
|
|
${BOOT_DIR}/zephyr/arm_cleanup.c
|
|
)
|
|
endif()
|
|
|
|
if(CONFIG_MCUBOOT_BOOT_BANNER)
|
|
# Replace Zephyr's boot banner with the MCUboot one
|
|
zephyr_sources(kernel/banner.c)
|
|
endif()
|
|
|
|
if(SYSBUILD)
|
|
function(align_up num align result)
|
|
math(EXPR out "(((${num}) + ((${align}) - 1)) & ~((${align}) - 1))")
|
|
set(${result} "${out}" PARENT_SCOPE)
|
|
endfunction()
|
|
|
|
function(dt_get_parent node)
|
|
string(FIND "${${node}}" "/" pos REVERSE)
|
|
|
|
if(pos EQUAL -1)
|
|
message(ERROR "Unable to get parent of node: ${${node}}")
|
|
endif()
|
|
|
|
string(SUBSTRING "${${node}}" 0 ${pos} ${node})
|
|
set(${node} "${${node}}" PARENT_SCOPE)
|
|
endfunction()
|
|
|
|
if(CONFIG_SINGLE_APPLICATION_SLOT OR CONFIG_BOOT_FIRMWARE_LOADER OR CONFIG_BOOT_SWAP_USING_SCRATCH OR CONFIG_BOOT_SWAP_USING_MOVE OR CONFIG_BOOT_UPGRADE_ONLY OR CONFIG_BOOT_DIRECT_XIP OR CONFIG_BOOT_RAM_LOAD)
|
|
# TODO: RAM LOAD support
|
|
dt_nodelabel(slot0_flash NODELABEL "slot0_partition")
|
|
dt_get_parent(slot0_flash)
|
|
dt_get_parent(slot0_flash)
|
|
|
|
if(NOT CONFIG_SINGLE_APPLICATION_SLOT)
|
|
dt_nodelabel(slot1_flash NODELABEL "slot1_partition")
|
|
dt_get_parent(slot1_flash)
|
|
dt_get_parent(slot1_flash)
|
|
|
|
if(NOT "${slot0_flash}" STREQUAL "${slot1_flash}")
|
|
# Check both slots for the one with the largest write/erase block size
|
|
dt_prop(erase_size_slot0 PATH "${slot0_flash}" PROPERTY "erase-block-size")
|
|
dt_prop(write_size_slot0 PATH "${slot0_flash}" PROPERTY "write-block-size")
|
|
dt_prop(erase_size_slot1 PATH "${slot1_flash}" PROPERTY "erase-block-size")
|
|
dt_prop(write_size_slot1 PATH "${slot1_flash}" PROPERTY "write-block-size")
|
|
|
|
if(DEFINED erase_size_slot0 AND DEFINED erase_size_slot1)
|
|
if(${erase_size_slot0} GREATER ${erase_size_slot1})
|
|
set(erase_size ${erase_size_slot0})
|
|
else()
|
|
set(erase_size ${erase_size_slot1})
|
|
endif()
|
|
elseif(DEFINED erase_size_slot0)
|
|
set(erase_size ${erase_size_slot0})
|
|
elseif(DEFINED erase_size_slot1)
|
|
set(erase_size ${erase_size_slot1})
|
|
endif()
|
|
|
|
if(DEFINED write_size_slot0 AND DEFINED write_size_slot1)
|
|
if(${write_size_slot0} GREATER ${write_size_slot1})
|
|
set(write_size ${write_size_slot0})
|
|
else()
|
|
set(write_size ${write_size_slot1})
|
|
endif()
|
|
elseif(DEFINED write_size_slot0)
|
|
set(write_size ${write_size_slot0})
|
|
elseif(DEFINED write_size_slot1)
|
|
set(write_size ${write_size_slot1})
|
|
endif()
|
|
else()
|
|
dt_prop(erase_size PATH "${slot0_flash}" PROPERTY "erase-block-size")
|
|
dt_prop(write_size PATH "${slot0_flash}" PROPERTY "write-block-size")
|
|
endif()
|
|
else()
|
|
dt_prop(erase_size PATH "${slot0_flash}" PROPERTY "erase-block-size")
|
|
dt_prop(write_size PATH "${slot0_flash}" PROPERTY "write-block-size")
|
|
endif()
|
|
|
|
if(NOT DEFINED erase_size)
|
|
message(WARNING "Unable to determine erase size of slot0 or slot1 partition, setting to 1 (this is probably wrong)")
|
|
set(erase_size 1)
|
|
endif()
|
|
|
|
if(NOT DEFINED write_size)
|
|
message(WARNING "Unable to determine write size of slot0 or slot1 partition, setting to 8 (this is probably wrong)")
|
|
set(write_size 8)
|
|
endif()
|
|
|
|
if(${write_size} LESS 8)
|
|
set(max_align_size 8)
|
|
else()
|
|
set(max_align_size ${write_size})
|
|
endif()
|
|
|
|
set(key_size 0)
|
|
|
|
# Boot trailer magic size
|
|
set(boot_magic_size 16)
|
|
|
|
# Estimates for trailer TLV data size, this was taken from hello world builds for nrf52840dk
|
|
if(CONFIG_BOOT_SIGNATURE_TYPE_RSA)
|
|
if(CONFIG_BOOT_SIGNATURE_TYPE_RSA_LEN EQUAL 3072)
|
|
set(boot_tlv_estimate 464)
|
|
else()
|
|
set(boot_tlv_estimate 336)
|
|
endif()
|
|
elseif(CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256)
|
|
set(boot_tlv_estimate 150)
|
|
elseif(CONFIG_BOOT_SIGNATURE_TYPE_ED25519)
|
|
set(boot_tlv_estimate 144)
|
|
else()
|
|
set(boot_tlv_estimate 40)
|
|
endif()
|
|
|
|
if(CONFIG_BOOT_ENCRYPT_RSA OR CONFIG_BOOT_ENCRYPT_EC256 OR CONFIG_BOOT_ENCRYPT_X25519)
|
|
# 128-bit AES key size
|
|
set(boot_enc_key_size 16)
|
|
|
|
if(CONFIG_BOOT_SWAP_SAVE_ENCTLV)
|
|
if(CONFIG_BOOT_ENCRYPT_RSA)
|
|
set(key_size 256)
|
|
elseif(CONFIG_BOOT_ENCRYPT_EC256)
|
|
math(EXPR key_size "65 + 32 + ${boot_enc_key_size}")
|
|
elseif(CONFIG_BOOT_ENCRYPT_X25519)
|
|
math(EXPR key_size "32 + 32 + ${boot_enc_key_size}")
|
|
endif()
|
|
else()
|
|
set(key_size "${boot_enc_key_size}")
|
|
endif()
|
|
|
|
align_up(${key_size} ${max_align_size} key_size)
|
|
math(EXPR key_size "${key_size} * 2")
|
|
endif()
|
|
|
|
align_up(${boot_magic_size} ${write_size} boot_magic_size)
|
|
|
|
if(CONFIG_SINGLE_APPLICATION_SLOT OR CONFIG_BOOT_FIRMWARE_LOADER)
|
|
set(boot_swap_data_size 0)
|
|
else()
|
|
math(EXPR boot_swap_data_size "${max_align_size} * 4")
|
|
endif()
|
|
|
|
if(CONFIG_BOOT_SWAP_USING_SCRATCH OR CONFIG_BOOT_SWAP_USING_MOVE)
|
|
math(EXPR boot_status_data_size "${CONFIG_BOOT_MAX_IMG_SECTORS} * (3 * ${write_size})")
|
|
else()
|
|
set(boot_status_data_size 0)
|
|
endif()
|
|
|
|
math(EXPR required_size "${key_size} + ${boot_magic_size} + ${boot_swap_data_size} + ${boot_status_data_size} + ${boot_tlv_estimate}")
|
|
align_up(${required_size} ${erase_size} required_size)
|
|
|
|
if(CONFIG_SINGLE_APPLICATION_SLOT OR CONFIG_BOOT_FIRMWARE_LOADER)
|
|
set(required_upgrade_size "0")
|
|
else()
|
|
math(EXPR required_upgrade_size "${boot_magic_size} + ${boot_swap_data_size} + ${boot_status_data_size}")
|
|
align_up(${required_upgrade_size} ${erase_size} required_upgrade_size)
|
|
endif()
|
|
|
|
if(CONFIG_BOOT_SWAP_USING_MOVE)
|
|
math(EXPR required_size "${required_size} + ${erase_size}")
|
|
math(EXPR required_upgrade_size "${required_upgrade_size} + ${erase_size}")
|
|
endif()
|
|
else()
|
|
set(required_size 0)
|
|
set(required_upgrade_size 0)
|
|
endif()
|
|
|
|
set(mcuboot_image_footer_size ${required_size} CACHE INTERNAL "Estimated MCUboot image trailer size" FORCE)
|
|
set(mcuboot_image_upgrade_footer_size ${required_upgrade_size} CACHE INTERNAL "Estimated MCUboot update image trailer size" FORCE)
|
|
endif()
|