George Beckstein | d82afbf | 2020-10-29 17:32:11 -0400 | [diff] [blame] | 1 | { |
| 2 | "name": "mcuboot", |
| 3 | "config": { |
| 4 | "bootloader-build": { |
| 5 | "help": "Build the bootloader, in addition to the MCUboot library.", |
| 6 | "macro_name": "MCUBOOT_BOOTLOADER_BUILD", |
| 7 | "accepted_values": [true, false], |
| 8 | "value": true |
| 9 | }, |
| 10 | "primary-slot-address": { |
| 11 | "help": "Start address of the primary (bootable) image slot. Target-dependent, please set on a per-target basis.", |
| 12 | "macro_name": "MCUBOOT_PRIMARY_SLOT_START_ADDR", |
| 13 | "required": true |
| 14 | }, |
| 15 | "slot-size": { |
| 16 | "help": "Size of the primary (bootable) image slot, in bytes. Target-dependent, please set on a per-target basis.", |
| 17 | "macro_name": "MCUBOOT_SLOT_SIZE", |
| 18 | "required": true |
| 19 | }, |
| 20 | "scratch-address": { |
| 21 | "help": "Start address of the scratch area. If needed, please set on a per-target basis.", |
| 22 | "macro_name": "MCUBOOT_SCRATCH_START_ADDR" |
| 23 | }, |
| 24 | "scratch-size": { |
| 25 | "help": "Size of the scratch area, in bytes. If needed, please set on a per-target basis.", |
| 26 | "macro_name": "MCUBOOT_SCRATCH_SIZE" |
| 27 | }, |
George Beckstein | d82afbf | 2020-10-29 17:32:11 -0400 | [diff] [blame] | 28 | "validate-primary-slot": { |
| 29 | "help": "Always check the signature of the image in the primary slot before booting, even if no upgrade was performed. This is recommended if the boot time penalty is acceptable.", |
| 30 | "macro_name": "MCUBOOT_VALIDATE_PRIMARY_SLOT", |
| 31 | "accepted_values": [true, null], |
| 32 | "value": true |
| 33 | }, |
| 34 | "signature-algorithm": { |
| 35 | "help": "The algorithm used for digital signing.", |
| 36 | "macro_name": "MCUBOOT_SIGNATURE_ALGORITHM", |
| 37 | "required": true, |
George Beckstein | a80e7c6 | 2021-05-11 02:12:46 -0400 | [diff] [blame] | 38 | "accepted_values": ["SIGNATURE_TYPE_RSA", "SIGNATURE_TYPE_EC256", "SIGNATURE_TYPE_ED25519", "SIGNATURE_TYPE_NONE"], |
George Beckstein | d82afbf | 2020-10-29 17:32:11 -0400 | [diff] [blame] | 39 | "value": "SIGNATURE_TYPE_RSA" |
| 40 | }, |
| 41 | "rsa-signature-length": { |
| 42 | "help": "If RSA is used for signature algorithm, this specifies the length.", |
| 43 | "macro_name": "MCUBOOT_RSA_SIGNATURE_LENGTH", |
| 44 | "required": true, |
| 45 | "accepted_values": [2048, 3072], |
| 46 | "value": 2048 |
| 47 | }, |
| 48 | "crypto-backend": { |
| 49 | "help": "The crypto library backend. NOTE: TinyCrypt is currently only supported with GCC for Mbed-OS builds.", |
| 50 | "macro_name": "MCUBOOT_CRYPTO_BACKEND", |
| 51 | "required": true, |
| 52 | "accepted_values": ["MBEDTLS", "TINYCRYPT"], |
| 53 | "value": "MBEDTLS" |
| 54 | }, |
| 55 | "overwrite-only": { |
| 56 | "help": "The default is to support A/B image swapping with rollback. A simpler code path, which only supports overwriting the existing image with the update image, is also available. (null to disable)", |
| 57 | "macro_name": "MCUBOOT_OVERWRITE_ONLY", |
| 58 | "accepted_values": [true, null], |
| 59 | "value": null |
| 60 | }, |
| 61 | "overwrite-only-fast": { |
| 62 | "help": "Only erase and overwrite those primary slot sectors needed to install the new image, rather than the entire image slot.", |
| 63 | "macro_name": "MCUBOOT_OVERWRITE_ONLY_FAST", |
| 64 | "accepted_values": [true, null], |
| 65 | "value": null |
| 66 | }, |
| 67 | "log-level": { |
| 68 | "help": "Verbosity of MCUboot logging.", |
| 69 | "macro_name": "MCUBOOT_LOG_LEVEL", |
| 70 | "accepted_values": ["MCUBOOT_LOG_LEVEL_OFF", "MCUBOOT_LOG_LEVEL_ERROR", "MCUBOOT_LOG_LEVEL_WARN", "MCUBOOT_LOG_LEVEL_INFO", "MCUBOOT_LOG_LEVEL_DEBUG"], |
| 71 | "value": "MCUBOOT_LOG_LEVEL_OFF" |
| 72 | }, |
| 73 | "log-bootloader-only": { |
| 74 | "help": "Exclude non-bootloader logs from Mbed OS (e.g. underlying storage).", |
| 75 | "macro_name": "MCUBOOT_LOG_BOOTLOADER_ONLY", |
| 76 | "accepted_values": [true, false], |
| 77 | "value": true |
| 78 | }, |
| 79 | "max-img-sectors": { |
| 80 | "help": "Maximum number of flash sectors per image slot. Target-dependent, please set on a per-target basis.", |
| 81 | "macro_name": "MCUBOOT_MAX_IMG_SECTORS", |
| 82 | "required": true |
| 83 | }, |
| 84 | "read-granularity": { |
| 85 | "help": "Granularity of read operations, in bytes. Enables a workaround if your block device does not support reading a single byte at a time. If this is used, it should be at least the value of your specific <blockdevice>->get_read_size() result.", |
| 86 | "macro_name": "MCUBOOT_READ_GRANULARITY", |
| 87 | "value": null |
| 88 | }, |
| 89 | "hardware-key": { |
| 90 | "help": "Use hardware key (NOT TESTED)", |
| 91 | "macro_name": "MCUBOOT_HW_KEY", |
| 92 | "accepted_values": [true, null], |
| 93 | "value": null |
| 94 | }, |
| 95 | "boot-swap-move": { |
| 96 | "help": "Boot swap using move (NOT TESTED)", |
| 97 | "macro_name": "MCUBOOT_SWAP_USING_MOVE", |
| 98 | "accepted_values": [true, null], |
| 99 | "value": null |
| 100 | }, |
| 101 | "updateable-image-number": { |
| 102 | "help": "Updateable image number (NOT TESTED)", |
| 103 | "macro_name": "MCUBOOT_IMAGE_NUMBER" |
| 104 | }, |
| 105 | "MCUBOOT_SWAP_SAVE_ENCTLV": { |
| 106 | "help": "Swap save enctlv (NOT TESTED)", |
| 107 | "macro_name": "MCUBOOT_IMAGE_NUMBER", |
| 108 | "value": null |
| 109 | }, |
| 110 | "encrypt-rsa": { |
| 111 | "help": "Encrypt images using RSA (NOT TESTED)", |
| 112 | "macro_name": "MCUBOOT_ENCRYPT_RSA", |
| 113 | "accepted_values": [true, null], |
| 114 | "value": null |
| 115 | }, |
| 116 | "encrypt-ec256": { |
| 117 | "help": "Encrypt images using EC256 (NOT TESTED)", |
| 118 | "macro_name": "MCUBOOT_ENCRYPT_EC256", |
| 119 | "accepted_values": [true, null], |
| 120 | "value": null |
| 121 | }, |
| 122 | "encrypt-x25519": { |
| 123 | "help": "Encrypt images using X25519 (NOT TESTED)", |
| 124 | "macro_name": "MCUBOOT_ENCRYPT_X25519", |
| 125 | "accepted_values": [true, null], |
| 126 | "value": null |
| 127 | }, |
| 128 | "bootstrap": { |
| 129 | "help": "Bootstrap (NOT TESTED)", |
| 130 | "macro_name": "MCUBOOT_BOOTSTRAP", |
| 131 | "value": null |
| 132 | }, |
| 133 | "use-bench": { |
| 134 | "help": "Use bench (NOT TESTED)", |
| 135 | "macro_name": "MCUBOOT_USE_BENCH", |
| 136 | "value": null |
| 137 | }, |
| 138 | "downgrade-prevention": { |
| 139 | "help": "Prevent downgrades (NOT TESTED)", |
| 140 | "macro_name": "MCUBOOT_DOWNGRADE_PREVENTION", |
| 141 | "value": null |
| 142 | }, |
| 143 | "hw-rollback-protection": { |
| 144 | "help": "Hardware rollback protection (NOT TESTED)", |
| 145 | "macro_name": "MCUBOOT_HW_ROLLBACK_PROT", |
| 146 | "value": null |
| 147 | }, |
| 148 | "measured-boot": { |
| 149 | "help": "Measured boot (NOT TESTED)", |
| 150 | "macro_name": "MCUBOOT_MEASURED_BOOT", |
| 151 | "value": null |
| 152 | }, |
| 153 | "share-data": { |
| 154 | "help": "Share data (NOT TESTED)", |
| 155 | "macro_name": "MCUBOOT_DATA_SHARING", |
| 156 | "value": null |
George Beckstein | 2877965 | 2020-12-15 13:54:51 -0500 | [diff] [blame] | 157 | }, |
| 158 | "direct-xip": { |
| 159 | "help": "Enable ability to boot update candidates in-place.", |
| 160 | "macro_name": "MCUBOOT_DIRECT_XIP", |
| 161 | "value": null |
| 162 | }, |
| 163 | "direct-xip-revert": { |
| 164 | "help": "Enable XIP revert mechanism. Only valid if direct-xip is also enabled.", |
| 165 | "macro_name": "MCUBOOT_DIRECT_XIP_REVERT", |
| 166 | "value": null |
| 167 | }, |
| 168 | "xip-secondary-slot-address": { |
| 169 | "help": "Specify start address for secondary slot address in XIP-accessible memory. This is required if direct-xip is enabled.", |
| 170 | "value": null |
George Beckstein | d82afbf | 2020-10-29 17:32:11 -0400 | [diff] [blame] | 171 | } |
| 172 | } |
| 173 | } |