@@ -23,11 +23,11 @@ config TFM_BOARD
2323 default "arm/musca_b1" if BOARD_V2M_MUSCA_B1
2424 default "arm/musca_s1" if BOARD_V2M_MUSCA_S1
2525 default "adi/max32657" if BOARD_MAX32657EVKIT_MAX32657_NS
26- default "${ ZEPHYR_BASE} /modules/trusted-firmware-m/nordic/nrf9160" if SOC_NRF9160
27- default "${ ZEPHYR_BASE} /modules/trusted-firmware-m/nordic/nrf9120" if SOC_NRF9120
28- default "${ ZEPHYR_BASE} /modules/trusted-firmware-m/nordic/nrf5340_cpuapp" if SOC_NRF5340_CPUAPP
29- default "${ ZEPHYR_BASE} /modules/trusted-firmware-m/nordic/nrf54l15_cpuapp" if SOC_NRF54L15_CPUAPP
30- default "${ ZEPHYR_BASE} /modules/trusted-firmware-m/nordic/nrf54l10_cpuapp" if SOC_NRF54L10_CPUAPP
26+ default "$( ZEPHYR_BASE) /modules/trusted-firmware-m/nordic/nrf9160" if SOC_NRF9160
27+ default "$( ZEPHYR_BASE) /modules/trusted-firmware-m/nordic/nrf9120" if SOC_NRF9120
28+ default "$( ZEPHYR_BASE) /modules/trusted-firmware-m/nordic/nrf5340_cpuapp" if SOC_NRF5340_CPUAPP
29+ default "$( ZEPHYR_BASE) /modules/trusted-firmware-m/nordic/nrf54l15_cpuapp" if SOC_NRF54L15_CPUAPP
30+ default "$( ZEPHYR_BASE) /modules/trusted-firmware-m/nordic/nrf54l10_cpuapp" if SOC_NRF54L10_CPUAPP
3131 help
3232 The board name used for building TFM. Building with TFM requires that
3333 TFM has been ported to the given board/SoC.
@@ -256,7 +256,7 @@ config TFM_BL2_SIGNING_KEY_PATH
256256 string "Path to private key used to sign BL2 firmware images."
257257 help
258258 Path to binary BL2 signing private key
259- Default is ${ ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR} /bl1/bl1_2/bl1_dummy_rotpk
259+ Default is $( ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR) /bl1/bl1_2/bl1_dummy_rotpk
260260 if it has not been changed on TF-M side for your board
261261
262262endif # TFM_BL1
@@ -281,7 +281,7 @@ config TFM_MCUBOOT_SIGNATURE_TYPE
281281
282282config TFM_KEY_FILE_S
283283 string "Path to private key used to sign secure firmware images."
284- default "${ ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR} /bl2/ext/mcuboot/root-${CONFIG_TFM_MCUBOOT_SIGNATURE_TYPE}.pem"
284+ default "$( ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR) /bl2/ext/mcuboot/root-${CONFIG_TFM_MCUBOOT_SIGNATURE_TYPE}.pem"
285285 help
286286 The path and filename for the .pem file containing the private key
287287 that should be used by the BL2 bootloader when signing secure
@@ -290,7 +290,7 @@ config TFM_KEY_FILE_S
290290
291291config TFM_KEY_FILE_NS
292292 string "Path to private key used to sign non-secure firmware images."
293- default "${ ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR} /bl2/ext/mcuboot/root-${CONFIG_TFM_MCUBOOT_SIGNATURE_TYPE}_1.pem"
293+ default "$( ZEPHYR_TRUSTED_FIRMWARE_M_MODULE_DIR) /bl2/ext/mcuboot/root-${CONFIG_TFM_MCUBOOT_SIGNATURE_TYPE}_1.pem"
294294 help
295295 The path and filename for the .pem file containing the private key
296296 that should be used by the BL2 bootloader when signing non-secure
@@ -334,7 +334,7 @@ endchoice
334334config TFM_ETHOS_DRIVER_PATH_LOCAL
335335 string "Path to a locally available Ethos-U driver or an empty string"
336336 depends on SOC_SERIES_MPS3 || SOC_SERIES_MPS4
337- default "${ ZEPHYR_HAL_ETHOS_U_MODULE_DIR} "
337+ default "$( ZEPHYR_HAL_ETHOS_U_MODULE_DIR) "
338338 help
339339 Path to a locally available Ethos-U driver to be used for TF-M builds or
340340 an empty string to allow TF-M to automatically fetch the Ethos-U
0 commit comments