summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorFabio Estevam <festevam@denx.de>2024-09-08 21:29:29 -0300
committerKhem Raj <raj.khem@gmail.com>2024-09-09 08:00:09 -0700
commit87579c932e19d9802ce05c692b1d56a56d7762fe (patch)
tree6904254d17fd803879f212cbb1a54ef033c44464
parent52d6841a10bc25cdecea01a31754a8d5e6574321 (diff)
downloadmeta-openembedded-87579c932e19d9802ce05c692b1d56a56d7762fe.tar.gz
imx-cst: Add recipe
Add a recipe for the i.MX CST (Code Signing Tool) version 3.4.0. The Code Signing Tool is used for secure boot implementation on i.MX devices. Example on how to use the CST tool to sign U-Boot on i.MX5/i.MX6/i.MX7: https://source.denx.de/u-boot/u-boot/-/blob/master/doc/imx/habv4/guides/mx6_mx7_secure_boot.txt Example on how to use the CST tool to sign U-Boot on i.MX8M: https://source.denx.de/u-boot/u-boot/-/blob/master/doc/imx/habv4/guides/mx8m_spl_secure_boot.txt Multiple layers include the imx-cst package and offer their version of the recipes: - meta-freescale - meta-secure-imx - meta-phytec and probably more. The idea of having imx-cst in meta-oe is to centralize and maintain the efforts in a single location. Move the existing imx-cst recipe from meta-freescale recipe to meta-oe. Signed-off-by: Fabio Estevam <festevam@denx.de> Signed-off-by: Khem Raj <raj.khem@gmail.com>
-rw-r--r--meta-oe/recipes-support/imx-cst/imx-cst_3.4.0.bb39
1 files changed, 39 insertions, 0 deletions
diff --git a/meta-oe/recipes-support/imx-cst/imx-cst_3.4.0.bb b/meta-oe/recipes-support/imx-cst/imx-cst_3.4.0.bb
new file mode 100644
index 0000000000..c4b7ce032d
--- /dev/null
+++ b/meta-oe/recipes-support/imx-cst/imx-cst_3.4.0.bb
@@ -0,0 +1,39 @@
1SUMMARY = "i.MX code signing tool"
2DESCRIPTION = "Code signing support that integrates the HABv4 and AHAB library for i.MX processors"
3LICENSE = "BSD-3-Clause & Apache-2.0"
4
5LIC_FILES_CHKSUM = "\
6 file://LICENSE.bsd3;md5=14aba05f9fa6c25527297c8aac95fcf6 \
7 file://LICENSE.hidapi;md5=e0ea014f523f64f0adb13409055ee59e \
8 file://LICENSE.openssl;md5=3441526b1df5cc01d812c7dfc218cea6 \
9"
10
11DEPENDS = "byacc-native flex-native openssl"
12
13# debian: 3.4.0+dfsg-2
14DEBIAN_PGK_NAME = "imx-code-signing-tool"
15DEBIAN_PGK_VERSION = "${PV}+dfsg"
16
17SRC_URI = "\
18 ${DEBIAN_MIRROR}/main/i/${DEBIAN_PGK_NAME}/${DEBIAN_PGK_NAME}_${DEBIAN_PGK_VERSION}.orig.tar.xz \
19"
20
21SRC_URI[sha256sum] = "52ee3cee3bc500a42095f73c4584e223b4b9d2dfc1cd3e5df965c5952eba8c8d"
22
23S = "${WORKDIR}/${DEBIAN_PGK_NAME}-${DEBIAN_PGK_VERSION}"
24
25EXTRA_OEMAKE = 'CC="${CC}" LD="${CC}" AR="${AR}" OBJCOPY="${OBJCOPY}"'
26
27do_compile() {
28 oe_runmake -C code/obj.linux64 OSTYPE=linux64 ENCRYPTION=yes COPTIONS="${CFLAGS} ${CPPFLAGS}" LDOPTIONS="${LDFLAGS}"
29 oe_runmake -C add-ons/hab_csf_parser COPTS="${CFLAGS} ${CPPFLAGS} ${LDFLAGS}"
30}
31
32do_install () {
33 install -d ${D}${bindir}
34 install -m 755 ${S}/code/obj.linux64/cst ${D}${bindir}/
35 install -m 755 ${S}/code/obj.linux64/srktool ${D}${bindir}
36 install -m 755 ${S}/add-ons/hab_csf_parser/csf_parser ${D}${bindir}
37}
38
39BBCLASSEXTEND = "native nativesdk"