Gustavo Henrique Nihei | 523ef3f | 2021-11-12 17:53:18 -0300 | [diff] [blame] | 1 | # SPDX-FileCopyrightText: 2021 Espressif Systems (Shanghai) CO LTD |
Almir Okato | eb6b7bf | 2021-09-07 17:06:35 -0300 | [diff] [blame] | 2 | # |
| 3 | # SPDX-License-Identifier: Apache-2.0 |
| 4 | |
Almir Okato | fa173df | 2022-04-19 01:10:30 -0300 | [diff] [blame] | 5 | CONFIG_ESP_FLASH_SIZE=4MB |
Shubham Kulkarni | 052561d | 2021-07-20 11:42:44 +0530 | [diff] [blame] | 6 | CONFIG_ESP_BOOTLOADER_SIZE=0xF000 |
Almir Okato | fa173df | 2022-04-19 01:10:30 -0300 | [diff] [blame] | 7 | CONFIG_ESP_BOOTLOADER_OFFSET=0x1000 |
Almir Okato | a1d641d | 2022-02-21 19:31:46 -0300 | [diff] [blame] | 8 | CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000 |
Shubham Kulkarni | 052561d | 2021-07-20 11:42:44 +0530 | [diff] [blame] | 9 | CONFIG_ESP_APPLICATION_SIZE=0x100000 |
Almir Okato | a1d641d | 2022-02-21 19:31:46 -0300 | [diff] [blame] | 10 | CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x110000 |
Shubham Kulkarni | 052561d | 2021-07-20 11:42:44 +0530 | [diff] [blame] | 11 | CONFIG_ESP_MCUBOOT_WDT_ENABLE=y |
| 12 | CONFIG_ESP_SCRATCH_OFFSET=0x210000 |
| 13 | CONFIG_ESP_SCRATCH_SIZE=0x40000 |
Almir Okato | eb6b7bf | 2021-09-07 17:06:35 -0300 | [diff] [blame] | 14 | |
Almir Okato | 84da51b | 2022-11-25 01:25:41 -0300 | [diff] [blame] | 15 | # When enabled, prevents updating image to an older version |
| 16 | # CONFIG_ESP_DOWNGRADE_PREVENTION=y |
| 17 | # This option makes downgrade prevention rely also on security |
| 18 | # counter (defined using imgtool) instead of only image version |
| 19 | # CONFIG_ESP_DOWNGRADE_PREVENTION_SECURITY_COUNTER=y |
| 20 | |
Almir Okato | e8cbc0d | 2022-06-13 10:45:39 -0300 | [diff] [blame] | 21 | # Enables the MCUboot Serial Recovery, that allows the use of |
| 22 | # MCUMGR to upload a firmware through the serial port |
| 23 | # CONFIG_ESP_MCUBOOT_SERIAL=y |
Almir Okato | 707a69d | 2022-09-23 15:22:07 -0300 | [diff] [blame] | 24 | # Use sector erasing instead of entire image size erasing |
| 25 | # when uploading through Serial Recovery |
| 26 | # CONFIG_ESP_MCUBOOT_ERASE_PROGRESSIVELY=y |
Almir Okato | e8cbc0d | 2022-06-13 10:45:39 -0300 | [diff] [blame] | 27 | # GPIO used to boot on Serial Recovery |
| 28 | # CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT=32 |
| 29 | # GPIO input type (0 for Pull-down, 1 for Pull-up) |
| 30 | # CONFIG_ESP_SERIAL_BOOT_GPIO_INPUT_TYPE=0 |
| 31 | # GPIO signal value |
| 32 | # CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT_VAL=1 |
| 33 | # Delay time for identify the GPIO signal |
| 34 | # CONFIG_ESP_SERIAL_BOOT_DETECT_DELAY_S=5 |
| 35 | # UART port used for serial communication |
| 36 | # CONFIG_ESP_SERIAL_BOOT_UART_NUM=1 |
| 37 | # GPIO for Serial RX signal |
| 38 | # CONFIG_ESP_SERIAL_BOOT_GPIO_RX=25 |
| 39 | # GPIO for Serial TX signal |
| 40 | # CONFIG_ESP_SERIAL_BOOT_GPIO_TX=26 |
| 41 | |
| 42 | CONFIG_ESP_CONSOLE_UART=y |
| 43 | CONFIG_ESP_CONSOLE_UART_NUM=0 |
| 44 | # Configures alternative UART port for console printing |
| 45 | # CONFIG_ESP_CONSOLE_UART_CUSTOM=y |
| 46 | # CONFIG_ESP_CONSOLE_UART_TX_GPIO=26 |
| 47 | # CONFIG_ESP_CONSOLE_UART_RX_GPIO=25 |
| 48 | |
Almir Okato | a1d641d | 2022-02-21 19:31:46 -0300 | [diff] [blame] | 49 | # Enables multi image, if it is not defined, it is assumed |
| 50 | # only one updatable image |
| 51 | # CONFIG_ESP_IMAGE_NUMBER=2 |
| 52 | |
| 53 | # Enables multi image boot on independent processors |
| 54 | # (main host OS is not responsible for booting the second image) |
| 55 | # Use only with CONFIG_ESP_IMAGE_NUMBER=2 |
| 56 | # CONFIG_ESP_MULTI_PROCESSOR_BOOT=y |
| 57 | |
| 58 | # Example of values to be used when multi image is enabled |
| 59 | # Notice that the OS layer and update agent must be aware |
| 60 | # of these regions |
Almir Okato | fa173df | 2022-04-19 01:10:30 -0300 | [diff] [blame] | 61 | # CONFIG_ESP_APPLICATION_SIZE=0x80000 |
Almir Okato | a1d641d | 2022-02-21 19:31:46 -0300 | [diff] [blame] | 62 | # CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000 |
Almir Okato | fa173df | 2022-04-19 01:10:30 -0300 | [diff] [blame] | 63 | # CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x90000 |
| 64 | # CONFIG_ESP_IMAGE1_PRIMARY_START_ADDRESS=0x110000 |
| 65 | # CONFIG_ESP_IMAGE1_SECONDARY_START_ADDRESS=0x190000 |
| 66 | # CONFIG_ESP_SCRATCH_OFFSET=0x210000 |
Almir Okato | a1d641d | 2022-02-21 19:31:46 -0300 | [diff] [blame] | 67 | # CONFIG_ESP_SCRATCH_SIZE=0x40000 |
| 68 | |
Almir Okato | eb6b7bf | 2021-09-07 17:06:35 -0300 | [diff] [blame] | 69 | # CONFIG_ESP_SIGN_EC256=y |
| 70 | # CONFIG_ESP_SIGN_ED25519=n |
| 71 | # CONFIG_ESP_SIGN_RSA=n |
| 72 | # CONFIG_ESP_SIGN_RSA_LEN=2048 |
| 73 | |
| 74 | # Use Tinycrypt lib for EC256 or ED25519 signing |
| 75 | # CONFIG_ESP_USE_TINYCRYPT=y |
| 76 | # Use Mbed TLS lib for RSA image signing |
| 77 | # CONFIG_ESP_USE_MBEDTLS=n |
| 78 | |
| 79 | # It is strongly recommended to generate a new signing key |
| 80 | # using imgtool instead of use the existent sample |
| 81 | # CONFIG_ESP_SIGN_KEY_FILE=root-ec-p256.pem |
Gustavo Henrique Nihei | 523ef3f | 2021-11-12 17:53:18 -0300 | [diff] [blame] | 82 | |
| 83 | # Hardware Secure Boot related options |
| 84 | # CONFIG_SECURE_SIGNED_ON_BOOT=1 |
| 85 | # CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME=1 |
| 86 | # CONFIG_SECURE_BOOT=1 |
| 87 | # CONFIG_SECURE_BOOT_V2_ENABLED=1 |
| 88 | # CONFIG_SECURE_BOOT_SUPPORTS_RSA=1 |
| 89 | |
Almir Okato | 14763b1 | 2021-11-25 00:45:26 -0300 | [diff] [blame] | 90 | # Hardware Flash Encryption related options |
| 91 | # CONFIG_SECURE_FLASH_ENC_ENABLED=1 |
| 92 | # CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_ENC=1 |
| 93 | # CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_DEC=1 |
| 94 | # CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_CACHE=1 |
| 95 | # CONFIG_SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT=1 |
| 96 | # CONFIG_SECURE_BOOT_ALLOW_JTAG=1 |
| 97 | # CONFIG_SECURE_BOOT_ALLOW_ROM_BASIC=1 |
| 98 | |
Gustavo Henrique Nihei | 523ef3f | 2021-11-12 17:53:18 -0300 | [diff] [blame] | 99 | # Options for enabling eFuse emulation in Flash |
| 100 | # CONFIG_EFUSE_VIRTUAL=1 |
| 101 | # CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH=1 |