| # SPDX-FileCopyrightText: 2021 Espressif Systems (Shanghai) CO LTD |
| # |
| # SPDX-License-Identifier: Apache-2.0 |
| |
| CONFIG_ESP_FLASH_SIZE=4MB |
| CONFIG_ESP_BOOTLOADER_SIZE=0xF000 |
| CONFIG_ESP_BOOTLOADER_OFFSET=0x1000 |
| CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000 |
| CONFIG_ESP_APPLICATION_SIZE=0x100000 |
| CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x110000 |
| CONFIG_ESP_MCUBOOT_WDT_ENABLE=y |
| CONFIG_ESP_SCRATCH_OFFSET=0x210000 |
| CONFIG_ESP_SCRATCH_SIZE=0x40000 |
| |
| # Enables the MCUboot Serial Recovery, that allows the use of |
| # MCUMGR to upload a firmware through the serial port |
| # CONFIG_ESP_MCUBOOT_SERIAL=y |
| # Use sector erasing instead of entire image size erasing |
| # when uploading through Serial Recovery |
| # CONFIG_ESP_MCUBOOT_ERASE_PROGRESSIVELY=y |
| # GPIO used to boot on Serial Recovery |
| # CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT=32 |
| # GPIO input type (0 for Pull-down, 1 for Pull-up) |
| # CONFIG_ESP_SERIAL_BOOT_GPIO_INPUT_TYPE=0 |
| # GPIO signal value |
| # CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT_VAL=1 |
| # Delay time for identify the GPIO signal |
| # CONFIG_ESP_SERIAL_BOOT_DETECT_DELAY_S=5 |
| # UART port used for serial communication |
| # CONFIG_ESP_SERIAL_BOOT_UART_NUM=1 |
| # GPIO for Serial RX signal |
| # CONFIG_ESP_SERIAL_BOOT_GPIO_RX=25 |
| # GPIO for Serial TX signal |
| # CONFIG_ESP_SERIAL_BOOT_GPIO_TX=26 |
| |
| CONFIG_ESP_CONSOLE_UART=y |
| CONFIG_ESP_CONSOLE_UART_NUM=0 |
| # Configures alternative UART port for console printing |
| # CONFIG_ESP_CONSOLE_UART_CUSTOM=y |
| # CONFIG_ESP_CONSOLE_UART_TX_GPIO=26 |
| # CONFIG_ESP_CONSOLE_UART_RX_GPIO=25 |
| |
| # Enables multi image, if it is not defined, it is assumed |
| # only one updatable image |
| # CONFIG_ESP_IMAGE_NUMBER=2 |
| |
| # Enables multi image boot on independent processors |
| # (main host OS is not responsible for booting the second image) |
| # Use only with CONFIG_ESP_IMAGE_NUMBER=2 |
| # CONFIG_ESP_MULTI_PROCESSOR_BOOT=y |
| |
| # Example of values to be used when multi image is enabled |
| # Notice that the OS layer and update agent must be aware |
| # of these regions |
| # CONFIG_ESP_APPLICATION_SIZE=0x80000 |
| # CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000 |
| # CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x90000 |
| # CONFIG_ESP_IMAGE1_PRIMARY_START_ADDRESS=0x110000 |
| # CONFIG_ESP_IMAGE1_SECONDARY_START_ADDRESS=0x190000 |
| # CONFIG_ESP_SCRATCH_OFFSET=0x210000 |
| # CONFIG_ESP_SCRATCH_SIZE=0x40000 |
| |
| # CONFIG_ESP_SIGN_EC256=y |
| # CONFIG_ESP_SIGN_ED25519=n |
| # CONFIG_ESP_SIGN_RSA=n |
| # CONFIG_ESP_SIGN_RSA_LEN=2048 |
| |
| # Use Tinycrypt lib for EC256 or ED25519 signing |
| # CONFIG_ESP_USE_TINYCRYPT=y |
| # Use Mbed TLS lib for RSA image signing |
| # CONFIG_ESP_USE_MBEDTLS=n |
| |
| # It is strongly recommended to generate a new signing key |
| # using imgtool instead of use the existent sample |
| # CONFIG_ESP_SIGN_KEY_FILE=root-ec-p256.pem |
| |
| # Hardware Secure Boot related options |
| # CONFIG_SECURE_SIGNED_ON_BOOT=1 |
| # CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME=1 |
| # CONFIG_SECURE_BOOT=1 |
| # CONFIG_SECURE_BOOT_V2_ENABLED=1 |
| # CONFIG_SECURE_BOOT_SUPPORTS_RSA=1 |
| |
| # Hardware Flash Encryption related options |
| # CONFIG_SECURE_FLASH_ENC_ENABLED=1 |
| # CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_ENC=1 |
| # CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_DEC=1 |
| # CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_CACHE=1 |
| # CONFIG_SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT=1 |
| # CONFIG_SECURE_BOOT_ALLOW_JTAG=1 |
| # CONFIG_SECURE_BOOT_ALLOW_ROM_BASIC=1 |
| |
| # Options for enabling eFuse emulation in Flash |
| # CONFIG_EFUSE_VIRTUAL=1 |
| # CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH=1 |