[Feature]add MT2731_MP2_MR2_SVN388 baseline version
Change-Id: Ief04314834b31e27effab435d3ca8ba33b499059
diff --git a/meta/meta-mediatek-gpl/recipes-devtools/android-tools/android-tools-avbtool/0001-security-boot-add-avbtool-support-hsm.patch b/meta/meta-mediatek-gpl/recipes-devtools/android-tools/android-tools-avbtool/0001-security-boot-add-avbtool-support-hsm.patch
new file mode 100644
index 0000000..a4e96e1
--- /dev/null
+++ b/meta/meta-mediatek-gpl/recipes-devtools/android-tools/android-tools-avbtool/0001-security-boot-add-avbtool-support-hsm.patch
@@ -0,0 +1,64 @@
+From 92eac8dd843a5f00b837b6eff79c91a500ba85e3 Mon Sep 17 00:00:00 2001
+From: darrenchen <Darren.Chen@mediatek.com>
+Date: Fri, 16 Nov 2018 11:48:02 +0800
+Subject: [PATCH] security boot: add avbtool support hsm
+
+add avbtool support hsm
+modify signing_helper to signing_helper_with_files
+
+Test: OK
+
+Signed-off-by: Darren Chen <Darren.Chen@mediatek.com>
+CR-Id: AUTO00000778
+---
+ avbtool | 27 ++++++++++++++++-----------
+ 1 file changed, 16 insertions(+), 11 deletions(-)
+
+diff --git a/avbtool b/avbtool
+index 10ff39a..81f1f7b 100755
+--- a/avbtool
++++ b/avbtool
+@@ -420,24 +420,29 @@ def raw_sign(signing_helper, algorithm_name, signature_num_bytes, key_path,
+ """
+ p = None
+ if signing_helper is not None:
++ signing_file = tempfile.NamedTemporaryFile()
++ signing_file.write(str(raw_data_to_sign))
++ signing_file.flush()
+ p = subprocess.Popen(
+- [signing_helper, algorithm_name, key_path],
+- stdin=subprocess.PIPE,
+- stdout=subprocess.PIPE,
+- stderr=subprocess.PIPE)
++ [signing_helper, os.getenv("VERIFIED_KEY"), "none", "raw", signing_file.name])
++ retcode = p.wait()
++ if retcode != 0:
++ raise AvbError('Error signing')
++ signing_file.seek(0)
++ signature = bytearray(signing_file.read())
+ else:
+ p = subprocess.Popen(
+ ['openssl', 'rsautl', '-sign', '-inkey', key_path, '-raw'],
+ stdin=subprocess.PIPE,
+ stdout=subprocess.PIPE,
+ stderr=subprocess.PIPE)
+- (pout, perr) = p.communicate(str(raw_data_to_sign))
+- retcode = p.wait()
+- if retcode != 0:
+- raise AvbError('Error signing: {}'.format(perr))
+- signature = bytearray(pout)
+- if len(signature) != signature_num_bytes:
+- raise AvbError('Error signing: Invalid length of signature')
++ (pout, perr) = p.communicate(str(raw_data_to_sign))
++ retcode = p.wait()
++ if retcode != 0:
++ raise AvbError('Error signing')
++ signature = bytearray(pout)
++ if len(signature) != signature_num_bytes:
++ raise AvbError('Error signing: Invalid length of signature')
+ return signature
+
+
+--
+2.18.0
+