diff options
author | Andrew Davis <afd@ti.com> | 2023-02-15 13:33:45 -0600 |
---|---|---|
committer | Ryan Eatmon <reatmon@ti.com> | 2023-03-01 09:16:02 -0600 |
commit | 844778f9e8fe96998c1d47e8a7480af5119d63b5 (patch) | |
tree | 8908c0285a6a72225b89b6f7c80baeacb437f8c2 | |
parent | ebe1ea981baf3d964220f8455d7ab86181ab8600 (diff) | |
download | meta-ti-844778f9e8fe96998c1d47e8a7480af5119d63b5.tar.gz |
ti-rtos-firmware: Use new ti-secdev class to sign the images
Use ti-k3-secdev native package to provide secure-binary-image.sh script
when it is not passed on as an environment variable. This fixes an issue
with AM64xx which is always HS but should not require TI_SECURE_DEV_PKG
when building for HS-FS or GP platforms.
Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
-rw-r--r-- | meta-ti-bsp/recipes-ti/ti-rtos-bin/ti-rtos-firmware.bb | 7 |
1 files changed, 1 insertions, 6 deletions
diff --git a/meta-ti-bsp/recipes-ti/ti-rtos-bin/ti-rtos-firmware.bb b/meta-ti-bsp/recipes-ti/ti-rtos-bin/ti-rtos-firmware.bb index 9a6da088..fddb5e2e 100644 --- a/meta-ti-bsp/recipes-ti/ti-rtos-bin/ti-rtos-firmware.bb +++ b/meta-ti-bsp/recipes-ti/ti-rtos-bin/ti-rtos-firmware.bb | |||
@@ -31,9 +31,7 @@ CLEANBROKEN = "1" | |||
31 | PR = "${INC_PR}.0" | 31 | PR = "${INC_PR}.0" |
32 | 32 | ||
33 | # Secure Build | 33 | # Secure Build |
34 | DEPENDS += "openssl-native" | 34 | inherit ti-secdev |
35 | |||
36 | TI_SECURE_DEV_PKG ?= "" | ||
37 | 35 | ||
38 | RTOS_ETH_FW_DIR = "${S}/ti-eth/${PLAT_SFX}" | 36 | RTOS_ETH_FW_DIR = "${S}/ti-eth/${PLAT_SFX}" |
39 | RTOS_DM_FW_DIR = "${S}/ti-dm/${PLAT_SFX}" | 37 | RTOS_DM_FW_DIR = "${S}/ti-dm/${PLAT_SFX}" |
@@ -49,7 +47,6 @@ DM_FIRMWARE = "ipc_echo_testb_mcu1_0_release_strip.xer5f" | |||
49 | 47 | ||
50 | # J721e HS support | 48 | # J721e HS support |
51 | do_install:prepend:j721e-hs-evm() { | 49 | do_install:prepend:j721e-hs-evm() { |
52 | export TI_SECURE_DEV_PKG=${TI_SECURE_DEV_PKG} | ||
53 | ( cd ${RTOS_DM_FW_DIR}; \ | 50 | ( cd ${RTOS_DM_FW_DIR}; \ |
54 | mv ${DM_FIRMWARE} ${DM_FIRMWARE}.unsigned; \ | 51 | mv ${DM_FIRMWARE} ${DM_FIRMWARE}.unsigned; \ |
55 | ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh ${DM_FIRMWARE}.unsigned ${DM_FIRMWARE}; \ | 52 | ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh ${DM_FIRMWARE}.unsigned ${DM_FIRMWARE}; \ |
@@ -80,7 +77,6 @@ do_install:prepend:j721e-hs-evm() { | |||
80 | 77 | ||
81 | # J7200 HS support | 78 | # J7200 HS support |
82 | do_install:prepend:j7200-hs-evm() { | 79 | do_install:prepend:j7200-hs-evm() { |
83 | export TI_SECURE_DEV_PKG=${TI_SECURE_DEV_PKG} | ||
84 | ( cd ${RTOS_DM_FW_DIR}; \ | 80 | ( cd ${RTOS_DM_FW_DIR}; \ |
85 | mv ${DM_FIRMWARE} ${DM_FIRMWARE}.unsigned; \ | 81 | mv ${DM_FIRMWARE} ${DM_FIRMWARE}.unsigned; \ |
86 | ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh ${DM_FIRMWARE}.unsigned ${DM_FIRMWARE}; \ | 82 | ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh ${DM_FIRMWARE}.unsigned ${DM_FIRMWARE}; \ |
@@ -101,7 +97,6 @@ do_install:prepend:j7200-hs-evm() { | |||
101 | 97 | ||
102 | # J721s2 HS support | 98 | # J721s2 HS support |
103 | do_install:prepend:j721s2-hs-evm() { | 99 | do_install:prepend:j721s2-hs-evm() { |
104 | export TI_SECURE_DEV_PKG=${TI_SECURE_DEV_PKG} | ||
105 | ( cd ${RTOS_DM_FW_DIR}; \ | 100 | ( cd ${RTOS_DM_FW_DIR}; \ |
106 | mv ${DM_FIRMWARE} ${DM_FIRMWARE}.unsigned; \ | 101 | mv ${DM_FIRMWARE} ${DM_FIRMWARE}.unsigned; \ |
107 | ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh ${DM_FIRMWARE}.unsigned ${DM_FIRMWARE}; \ | 102 | ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh ${DM_FIRMWARE}.unsigned ${DM_FIRMWARE}; \ |