1# SPDX-FileCopyrightText: 2021 Espressif Systems (Shanghai) CO LTD 2# 3# SPDX-License-Identifier: Apache-2.0 4 5CONFIG_ESP_FLASH_SIZE=4MB 6CONFIG_ESP_BOOTLOADER_SIZE=0xF000 7CONFIG_ESP_BOOTLOADER_OFFSET=0x0000 8CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000 9CONFIG_ESP_APPLICATION_SIZE=0x100000 10CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x110000 11CONFIG_ESP_MCUBOOT_WDT_ENABLE=y 12CONFIG_ESP_SCRATCH_OFFSET=0x210000 13CONFIG_ESP_SCRATCH_SIZE=0x40000 14 15# When enabled, prevents updating image to an older version 16# CONFIG_ESP_DOWNGRADE_PREVENTION=y 17# This option makes downgrade prevention rely also on security 18# counter (defined using imgtool) instead of only image version 19# CONFIG_ESP_DOWNGRADE_PREVENTION_SECURITY_COUNTER=y 20 21# Enables multi image, if it is not defined, it is assumed 22# only one updatable image 23# CONFIG_ESP_IMAGE_NUMBER=2 24 25# Enables multi image boot on independent processors 26# (main host OS is not responsible for booting the second image) 27# Use only with CONFIG_ESP_IMAGE_NUMBER=2 28# CONFIG_ESP_MULTI_PROCESSOR_BOOT=y 29 30# Example of values to be used when multi image is enabled 31# Notice that the OS layer and update agent must be aware 32# of these regions 33# CONFIG_ESP_APPLICATION_SIZE=0x80000 34# CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000 35# CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x90000 36# CONFIG_ESP_IMAGE1_PRIMARY_START_ADDRESS=0x110000 37# CONFIG_ESP_IMAGE1_SECONDARY_START_ADDRESS=0x190000 38# CONFIG_ESP_SCRATCH_OFFSET=0x210000 39# CONFIG_ESP_SCRATCH_SIZE=0x40000 40 41# Enables the MCUboot Serial Recovery, that allows the use of 42# MCUMGR to upload a firmware through the serial port 43# CONFIG_ESP_MCUBOOT_SERIAL=y 44# Use Serial through USB JTAG Serial port for Serial Recovery 45# CONFIG_ESP_MCUBOOT_SERIAL_USB_SERIAL_JTAG=y 46# Use sector erasing (recommended) instead of entire image size 47# erasing when uploading through Serial Recovery 48# CONFIG_ESP_MCUBOOT_ERASE_PROGRESSIVELY=y 49 50# GPIO used to boot on Serial Recovery 51# CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT=5 52# GPIO input type (0 for Pull-down, 1 for Pull-up) 53# CONFIG_ESP_SERIAL_BOOT_GPIO_INPUT_TYPE=0 54# GPIO signal value 55# CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT_VAL=1 56# Delay time for identify the GPIO signal 57# CONFIG_ESP_SERIAL_BOOT_DETECT_DELAY_S=5 58# UART port used for serial communication (not needed when using USB) 59# CONFIG_ESP_SERIAL_BOOT_UART_NUM=1 60# GPIO for Serial RX signal 61# CONFIG_ESP_SERIAL_BOOT_GPIO_RX=18 62# GPIO for Serial TX signal 63# CONFIG_ESP_SERIAL_BOOT_GPIO_TX=17 64 65# Use UART0 for console printing (use either UART or USB alone) 66CONFIG_ESP_CONSOLE_UART=y 67CONFIG_ESP_CONSOLE_UART_NUM=0 68# Configures alternative UART port for console printing 69# (UART_NUM=0 must not be changed) 70# CONFIG_ESP_CONSOLE_UART_CUSTOM=y 71# CONFIG_ESP_CONSOLE_UART_TX_GPIO=17 72# CONFIG_ESP_CONSOLE_UART_RX_GPIO=18 73# Use USB JTAG Serial for console printing 74# CONFIG_ESP_CONSOLE_USB_SERIAL_JTAG=y 75 76# CONFIG_ESP_SIGN_EC256=y 77# CONFIG_ESP_SIGN_ED25519=n 78# CONFIG_ESP_SIGN_RSA=n 79# CONFIG_ESP_SIGN_RSA_LEN=2048 80 81# Use Tinycrypt lib for EC256 or ED25519 signing 82# CONFIG_ESP_USE_TINYCRYPT=y 83# Use Mbed TLS lib for RSA image signing 84# CONFIG_ESP_USE_MBEDTLS=n 85 86# It is strongly recommended to generate a new signing key 87# using imgtool instead of use the existent sample 88# CONFIG_ESP_SIGN_KEY_FILE=root-ec-p256.pem 89 90# Hardware Secure Boot related options 91# CONFIG_SECURE_SIGNED_ON_BOOT=1 92# CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME=1 93# CONFIG_SECURE_BOOT=1 94# CONFIG_SECURE_BOOT_V2_ENABLED=1 95# CONFIG_SECURE_BOOT_SUPPORTS_RSA=1 96 97# Hardware Flash Encryption related options 98# CONFIG_SECURE_FLASH_ENC_ENABLED=1 99# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_ENC=1 100# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_DEC=1 101# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_CACHE=1 102# CONFIG_SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT=1 103# CONFIG_SECURE_BOOT_ALLOW_JTAG=1 104# CONFIG_SECURE_BOOT_ALLOW_ROM_BASIC=1 105 106# Options for enabling eFuse emulation in Flash 107# CONFIG_EFUSE_VIRTUAL=1 108# CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH=1 109