@@ -23,11 +23,11 @@ config TFM_BOARD
23
23
default "arm/musca_b1" if BOARD_V2M_MUSCA_B1
24
24
default "arm/musca_s1" if BOARD_V2M_MUSCA_S1
25
25
default "adi/max32657" if BOARD_MAX32657EVKIT_MAX32657_NS
26
- default "${ ZEPHYR_BASE} /modules/trusted-firmware-m/nordic/nrf9160" if SOC_NRF9160
27
- default "${ ZEPHYR_BASE} /modules/trusted-firmware-m/nordic/nrf9120" if SOC_NRF9120
28
- default "${ ZEPHYR_BASE} /modules/trusted-firmware-m/nordic/nrf5340_cpuapp" if SOC_NRF5340_CPUAPP
29
- default "${ ZEPHYR_BASE} /modules/trusted-firmware-m/nordic/nrf54l15_cpuapp" if SOC_NRF54L15_CPUAPP
30
- default "${ ZEPHYR_BASE} /modules/trusted-firmware-m/nordic/nrf54l10_cpuapp" if SOC_NRF54L10_CPUAPP
26
+ default "$( ZEPHYR_BASE) /modules/trusted-firmware-m/nordic/nrf9160" if SOC_NRF9160
27
+ default "$( ZEPHYR_BASE) /modules/trusted-firmware-m/nordic/nrf9120" if SOC_NRF9120
28
+ default "$( ZEPHYR_BASE) /modules/trusted-firmware-m/nordic/nrf5340_cpuapp" if SOC_NRF5340_CPUAPP
29
+ default "$( ZEPHYR_BASE) /modules/trusted-firmware-m/nordic/nrf54l15_cpuapp" if SOC_NRF54L15_CPUAPP
30
+ default "$( ZEPHYR_BASE) /modules/trusted-firmware-m/nordic/nrf54l10_cpuapp" if SOC_NRF54L10_CPUAPP
31
31
help
32
32
The board name used for building TFM. Building with TFM requires that
33
33
TFM has been ported to the given board/SoC.
@@ -256,7 +256,7 @@ config TFM_BL2_SIGNING_KEY_PATH
256
256
string "Path to private key used to sign BL2 firmware images."
257
257
help
258
258
Path to binary BL2 signing private key
259
- Default is ${ ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR} /bl1/bl1_2/bl1_dummy_rotpk
259
+ Default is $( ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR) /bl1/bl1_2/bl1_dummy_rotpk
260
260
if it has not been changed on TF-M side for your board
261
261
262
262
endif # TFM_BL1
@@ -281,7 +281,7 @@ config TFM_MCUBOOT_SIGNATURE_TYPE
281
281
282
282
config TFM_KEY_FILE_S
283
283
string "Path to private key used to sign secure firmware images."
284
- default "${ ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR} /bl2/ext/mcuboot/root-${CONFIG_TFM_MCUBOOT_SIGNATURE_TYPE}.pem"
284
+ default "$( ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR) /bl2/ext/mcuboot/root-${CONFIG_TFM_MCUBOOT_SIGNATURE_TYPE}.pem"
285
285
help
286
286
The path and filename for the .pem file containing the private key
287
287
that should be used by the BL2 bootloader when signing secure
@@ -290,7 +290,7 @@ config TFM_KEY_FILE_S
290
290
291
291
config TFM_KEY_FILE_NS
292
292
string "Path to private key used to sign non-secure firmware images."
293
- default "${ ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR} /bl2/ext/mcuboot/root-${CONFIG_TFM_MCUBOOT_SIGNATURE_TYPE}_1.pem"
293
+ default "$( ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR) /bl2/ext/mcuboot/root-${CONFIG_TFM_MCUBOOT_SIGNATURE_TYPE}_1.pem"
294
294
help
295
295
The path and filename for the .pem file containing the private key
296
296
that should be used by the BL2 bootloader when signing non-secure
@@ -334,7 +334,7 @@ endchoice
334
334
config TFM_ETHOS_DRIVER_PATH_LOCAL
335
335
string "Path to a locally available Ethos-U driver or an empty string"
336
336
depends on SOC_SERIES_MPS3 || SOC_SERIES_MPS4
337
- default "${ ZEPHYR_HAL_ETHOS_U_MODULE_DIR} "
337
+ default "$( ZEPHYR_HAL_ETHOS_U_MODULE_DIR) "
338
338
help
339
339
Path to a locally available Ethos-U driver to be used for TF-M builds or
340
340
an empty string to allow TF-M to automatically fetch the Ethos-U
0 commit comments