]> git.kernelconcepts.de Git - karo-tx-uboot.git/commitdiff
mpc85xx: configs - Enable blob command in freescale platforms
authorRuchika Gupta <ruchika.gupta@freescale.com>
Tue, 7 Oct 2014 10:18:46 +0000 (15:48 +0530)
committerYork Sun <yorksun@freescale.com>
Thu, 16 Oct 2014 21:21:09 +0000 (14:21 -0700)
Enable blob commands for platforms having SEC 4.0 or greater
for secure boot scenarios

Signed-off-by: Ruchika Gupta <ruchika.gupta@freescale.com>
Reviewed-by: York Sun <yorksun@freescale.com>
include/configs/B4860QDS.h
include/configs/BSC9132QDS.h
include/configs/P1010RDB.h
include/configs/P2041RDB.h
include/configs/T1040QDS.h
include/configs/T104xRDB.h
include/configs/T208xQDS.h
include/configs/T208xRDB.h
include/configs/T4240QDS.h
include/configs/T4240RDB.h
include/configs/corenet_ds.h

index 32233c1f3d42d2529be52bb0df2bc4571889320b..dc1a9bc1ef98d9bc2d78ea88a550f17054b4110a 100644 (file)
@@ -920,4 +920,8 @@ unsigned long get_board_ddr_clk(void);
 
 #include <asm/fsl_secure_boot.h>
 
+#ifdef CONFIG_SECURE_BOOT
+#define CONFIG_CMD_BLOB
+#endif
+
 #endif /* __CONFIG_H */
index 7be1a023e32794fcce880d594c995dec289d3adb..989363c0fbc0def810b96a73ae07889382205656 100644 (file)
@@ -711,4 +711,8 @@ combinations. this should be removed later
 
 #include <asm/fsl_secure_boot.h>
 
+#ifdef CONFIG_SECURE_BOOT
+#define CONFIG_CMD_BLOB
+#endif
+
 #endif /* __CONFIG_H */
index f58fba28f07d8501898a5083a413d35304958f9b..d378dbd1a1e2ccb4537257a329e4ced51cc01599 100644 (file)
@@ -963,4 +963,8 @@ extern unsigned long get_sdram_size(void);
 
 #include <asm/fsl_secure_boot.h>
 
+#ifdef CONFIG_SECURE_BOOT
+#define CONFIG_CMD_BLOB
+#endif
+
 #endif /* __CONFIG_H */
index bab0e1e72f9c1637b78e0cf8fd19300e0b58c5dd..2e11aaa13cd35156e605cf29723b6f6a6ff2d9cb 100644 (file)
@@ -750,4 +750,8 @@ unsigned long get_board_sys_clk(unsigned long dummy);
 
 #include <asm/fsl_secure_boot.h>
 
+#ifdef CONFIG_SECURE_BOOT
+#define CONFIG_CMD_BLOB
+#endif
+
 #endif /* __CONFIG_H */
index 273919375fb907514e6a0e74c8fdeaa6a75d3657..1d0664ddf6e828b01a2801a96f73becd06d34036 100644 (file)
@@ -825,6 +825,7 @@ unsigned long get_board_ddr_clk(void);
 
 #ifdef CONFIG_SECURE_BOOT
 #include <asm/fsl_secure_boot.h>
+#define CONFIG_CMD_BLOB
 #endif
 
 #endif /* __CONFIG_H */
index eb2ca73454ca47f16d0979009b5eb6bdd022536b..2bb86e40caf97b742f8ad39fe152a8b3b7c9dd08 100644 (file)
 
 #ifdef CONFIG_SECURE_BOOT
 #include <asm/fsl_secure_boot.h>
+#define CONFIG_CMD_BLOB
 #endif
 
 #endif /* __CONFIG_H */
index 2268dd6383978a00f31b51cda89f2096ff087193..27333589afe4f092214acd94ef6e93e3d696058a 100644 (file)
@@ -916,6 +916,7 @@ unsigned long get_board_ddr_clk(void);
 
 #ifdef CONFIG_SECURE_BOOT
 #include <asm/fsl_secure_boot.h>
+#define CONFIG_CMD_BLOB
 #undef CONFIG_CMD_USB
 #endif
 
index b896d74bc1bef24b50be7d46f64405260f82d523..400d979643caaf7cdaddc8ddfdae5dbf87a6169a 100644 (file)
@@ -875,6 +875,7 @@ unsigned long get_board_ddr_clk(void);
 
 #ifdef CONFIG_SECURE_BOOT
 #include <asm/fsl_secure_boot.h>
+#define CONFIG_CMD_BLOB
 #undef CONFIG_CMD_USB
 #endif
 
index e5d3f04a5f0a2bdc35c92b173fbe94f48968d7ce..1e0f5ece092067afcce0ae74cedc14e86f4c2b96 100644 (file)
@@ -632,4 +632,8 @@ unsigned long get_board_ddr_clk(void);
 
 #include <asm/fsl_secure_boot.h>
 
+#ifdef CONFIG_SECURE_BOOT
+#define CONFIG_CMD_BLOB
+#endif
+
 #endif /* __CONFIG_H */
index 4381c61f59a35682acaed3cc27a3d20c773c3453..13f4bd3c539fae5629ec1adc374f875ec0417bdc 100644 (file)
@@ -758,6 +758,7 @@ unsigned long get_board_ddr_clk(void);
  * which is anyways not used in Secure Environment.
  */
 #undef CONFIG_CMD_USB
+#define CONFIG_CMD_BLOB
 #endif
 
 #endif /* __CONFIG_H */
index ea0363a771b6d52d9855656917b2a7b5314f8db4..72b7efa5092c51cc00016ba5777c66e647952ec7 100644 (file)
 
 #include <asm/fsl_secure_boot.h>
 
+#ifdef CONFIG_SECURE_BOOT
+#define CONFIG_CMD_BLOB
+#endif
+
 #endif /* __CONFIG_H */