blob: 630091d7eba24dc32e5af7a457ceb933d7ce3e2f [file] [log] [blame]
Gustavo Henrique Nihei523ef3f2021-11-12 17:53:18 -03001# SPDX-FileCopyrightText: 2021 Espressif Systems (Shanghai) CO LTD
Almir Okatoeb6b7bf2021-09-07 17:06:35 -03002#
3# SPDX-License-Identifier: Apache-2.0
4
Almir Okatofa173df2022-04-19 01:10:30 -03005CONFIG_ESP_FLASH_SIZE=4MB
Shubham Kulkarni052561d2021-07-20 11:42:44 +05306CONFIG_ESP_BOOTLOADER_SIZE=0xF000
Almir Okatofa173df2022-04-19 01:10:30 -03007CONFIG_ESP_BOOTLOADER_OFFSET=0x0000
Almir Okatoa1d641d2022-02-21 19:31:46 -03008CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000
Shubham Kulkarni052561d2021-07-20 11:42:44 +05309CONFIG_ESP_APPLICATION_SIZE=0x100000
Almir Okatoa1d641d2022-02-21 19:31:46 -030010CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x110000
Shubham Kulkarni052561d2021-07-20 11:42:44 +053011CONFIG_ESP_MCUBOOT_WDT_ENABLE=y
12CONFIG_ESP_SCRATCH_OFFSET=0x210000
13CONFIG_ESP_SCRATCH_SIZE=0x40000
Almir Okatoeb6b7bf2021-09-07 17:06:35 -030014
Almir Okatoa1d641d2022-02-21 19:31:46 -030015# Enables multi image, if it is not defined, it is assumed
16# only one updatable image
17# CONFIG_ESP_IMAGE_NUMBER=2
18
19# Enables multi image boot on independent processors
20# (main host OS is not responsible for booting the second image)
21# Use only with CONFIG_ESP_IMAGE_NUMBER=2
22# CONFIG_ESP_MULTI_PROCESSOR_BOOT=y
23
24# Example of values to be used when multi image is enabled
25# Notice that the OS layer and update agent must be aware
26# of these regions
Almir Okatofa173df2022-04-19 01:10:30 -030027# CONFIG_ESP_APPLICATION_SIZE=0x80000
Almir Okatoa1d641d2022-02-21 19:31:46 -030028# CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000
Almir Okatofa173df2022-04-19 01:10:30 -030029# CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x90000
30# CONFIG_ESP_IMAGE1_PRIMARY_START_ADDRESS=0x110000
31# CONFIG_ESP_IMAGE1_SECONDARY_START_ADDRESS=0x190000
32# CONFIG_ESP_SCRATCH_OFFSET=0x210000
Almir Okatoa1d641d2022-02-21 19:31:46 -030033# CONFIG_ESP_SCRATCH_SIZE=0x40000
34
Almir Okatofc1eabf2022-10-20 17:16:25 -030035# Enables the MCUboot Serial Recovery, that allows the use of
36# MCUMGR to upload a firmware through the serial port
37# CONFIG_ESP_MCUBOOT_SERIAL=y
38# Use Serial through USB JTAG Serial port for Serial Recovery
39# CONFIG_ESP_MCUBOOT_SERIAL_USB_SERIAL_JTAG=y
40# Use sector erasing (recommended) instead of entire image size
41# erasing when uploading through Serial Recovery
42# CONFIG_ESP_MCUBOOT_ERASE_PROGRESSIVELY=y
43
44# GPIO used to boot on Serial Recovery
45# CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT=5
46# GPIO input type (0 for Pull-down, 1 for Pull-up)
47# CONFIG_ESP_SERIAL_BOOT_GPIO_INPUT_TYPE=0
48# GPIO signal value
49# CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT_VAL=1
50# Delay time for identify the GPIO signal
51# CONFIG_ESP_SERIAL_BOOT_DETECT_DELAY_S=5
52# UART port used for serial communication (not needed when using USB)
53# CONFIG_ESP_SERIAL_BOOT_UART_NUM=1
54# GPIO for Serial RX signal
55# CONFIG_ESP_SERIAL_BOOT_GPIO_RX=18
56# GPIO for Serial TX signal
57# CONFIG_ESP_SERIAL_BOOT_GPIO_TX=17
58
59# Use UART0 for console printing (use either UART or USB alone)
60CONFIG_ESP_CONSOLE_UART=y
61CONFIG_ESP_CONSOLE_UART_NUM=0
62# Configures alternative UART port for console printing
63# (UART_NUM=0 must not be changed)
64# CONFIG_ESP_CONSOLE_UART_CUSTOM=y
65# CONFIG_ESP_CONSOLE_UART_TX_GPIO=17
66# CONFIG_ESP_CONSOLE_UART_RX_GPIO=18
67# Use USB JTAG Serial for console printing
68# CONFIG_ESP_CONSOLE_USB_SERIAL_JTAG=y
69
Almir Okatoeb6b7bf2021-09-07 17:06:35 -030070# CONFIG_ESP_SIGN_EC256=y
71# CONFIG_ESP_SIGN_ED25519=n
72# CONFIG_ESP_SIGN_RSA=n
73# CONFIG_ESP_SIGN_RSA_LEN=2048
74
75# Use Tinycrypt lib for EC256 or ED25519 signing
76# CONFIG_ESP_USE_TINYCRYPT=y
77# Use Mbed TLS lib for RSA image signing
78# CONFIG_ESP_USE_MBEDTLS=n
79
80# It is strongly recommended to generate a new signing key
81# using imgtool instead of use the existent sample
82# CONFIG_ESP_SIGN_KEY_FILE=root-ec-p256.pem
Gustavo Henrique Nihei523ef3f2021-11-12 17:53:18 -030083
84# Hardware Secure Boot related options
85# CONFIG_SECURE_SIGNED_ON_BOOT=1
86# CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME=1
87# CONFIG_SECURE_BOOT=1
88# CONFIG_SECURE_BOOT_V2_ENABLED=1
89# CONFIG_SECURE_BOOT_SUPPORTS_RSA=1
90
Almir Okato14763b12021-11-25 00:45:26 -030091# Hardware Flash Encryption related options
92# CONFIG_SECURE_FLASH_ENC_ENABLED=1
93# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_ENC=1
94# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_DEC=1
95# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_CACHE=1
96# CONFIG_SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT=1
97# CONFIG_SECURE_BOOT_ALLOW_JTAG=1
98# CONFIG_SECURE_BOOT_ALLOW_ROM_BASIC=1
99
Gustavo Henrique Nihei523ef3f2021-11-12 17:53:18 -0300100# Options for enabling eFuse emulation in Flash
101# CONFIG_EFUSE_VIRTUAL=1
102# CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH=1