1# SPDX-FileCopyrightText: 2021 Espressif Systems (Shanghai) CO LTD
2#
3# SPDX-License-Identifier: Apache-2.0
4
5CONFIG_ESP_FLASH_SIZE=4MB
6CONFIG_ESP_BOOTLOADER_SIZE=0xF000
7CONFIG_ESP_BOOTLOADER_OFFSET=0x0000
8CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000
9CONFIG_ESP_APPLICATION_SIZE=0x100000
10CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x110000
11CONFIG_ESP_MCUBOOT_WDT_ENABLE=y
12CONFIG_ESP_SCRATCH_OFFSET=0x210000
13CONFIG_ESP_SCRATCH_SIZE=0x40000
14
15# When enabled, prevents updating image to an older version
16# CONFIG_ESP_DOWNGRADE_PREVENTION=y
17# This option makes downgrade prevention rely also on security
18# counter (defined using imgtool) instead of only image version
19# CONFIG_ESP_DOWNGRADE_PREVENTION_SECURITY_COUNTER=y
20
21# Enables multi image, if it is not defined, it is assumed
22# only one updatable image
23# CONFIG_ESP_IMAGE_NUMBER=2
24
25# Enables multi image boot on independent processors
26# (main host OS is not responsible for booting the second image)
27# Use only with CONFIG_ESP_IMAGE_NUMBER=2
28# CONFIG_ESP_MULTI_PROCESSOR_BOOT=y
29
30# Example of values to be used when multi image is enabled
31# Notice that the OS layer and update agent must be aware
32# of these regions
33# CONFIG_ESP_APPLICATION_SIZE=0x80000
34# CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000
35# CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x90000
36# CONFIG_ESP_IMAGE1_PRIMARY_START_ADDRESS=0x110000
37# CONFIG_ESP_IMAGE1_SECONDARY_START_ADDRESS=0x190000
38# CONFIG_ESP_SCRATCH_OFFSET=0x210000
39# CONFIG_ESP_SCRATCH_SIZE=0x40000
40
41# Enables the MCUboot Serial Recovery, that allows the use of
42# MCUMGR to upload a firmware through the serial port
43# CONFIG_ESP_MCUBOOT_SERIAL=y
44# Use Serial through USB JTAG Serial port for Serial Recovery
45# CONFIG_ESP_MCUBOOT_SERIAL_USB_SERIAL_JTAG=y
46# Use sector erasing (recommended) instead of entire image size
47# erasing when uploading through Serial Recovery
48# CONFIG_ESP_MCUBOOT_ERASE_PROGRESSIVELY=y
49
50# GPIO used to boot on Serial Recovery
51# CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT=5
52# GPIO input type (0 for Pull-down, 1 for Pull-up)
53# CONFIG_ESP_SERIAL_BOOT_GPIO_INPUT_TYPE=0
54# GPIO signal value
55# CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT_VAL=1
56# Delay time for identify the GPIO signal
57# CONFIG_ESP_SERIAL_BOOT_DETECT_DELAY_S=5
58# UART port used for serial communication (not needed when using USB)
59# CONFIG_ESP_SERIAL_BOOT_UART_NUM=1
60# GPIO for Serial RX signal
61# CONFIG_ESP_SERIAL_BOOT_GPIO_RX=18
62# GPIO for Serial TX signal
63# CONFIG_ESP_SERIAL_BOOT_GPIO_TX=17
64
65# Use UART0 for console printing (use either UART or USB alone)
66CONFIG_ESP_CONSOLE_UART=y
67CONFIG_ESP_CONSOLE_UART_NUM=0
68# Configures alternative UART port for console printing
69# (UART_NUM=0 must not be changed)
70# CONFIG_ESP_CONSOLE_UART_CUSTOM=y
71# CONFIG_ESP_CONSOLE_UART_TX_GPIO=17
72# CONFIG_ESP_CONSOLE_UART_RX_GPIO=18
73# Use USB JTAG Serial for console printing
74# CONFIG_ESP_CONSOLE_USB_SERIAL_JTAG=y
75
76# CONFIG_ESP_SIGN_EC256=y
77# CONFIG_ESP_SIGN_ED25519=n
78# CONFIG_ESP_SIGN_RSA=n
79# CONFIG_ESP_SIGN_RSA_LEN=2048
80
81# Use Tinycrypt lib for EC256 or ED25519 signing
82# CONFIG_ESP_USE_TINYCRYPT=y
83# Use Mbed TLS lib for RSA image signing
84# CONFIG_ESP_USE_MBEDTLS=n
85
86# It is strongly recommended to generate a new signing key
87# using imgtool instead of use the existent sample
88# CONFIG_ESP_SIGN_KEY_FILE=root-ec-p256.pem
89
90# Hardware Secure Boot related options
91# CONFIG_SECURE_SIGNED_ON_BOOT=1
92# CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME=1
93# CONFIG_SECURE_BOOT=1
94# CONFIG_SECURE_BOOT_V2_ENABLED=1
95# CONFIG_SECURE_BOOT_SUPPORTS_RSA=1
96
97# Hardware Flash Encryption related options
98# CONFIG_SECURE_FLASH_ENC_ENABLED=1
99# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_ENC=1
100# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_DEC=1
101# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_CACHE=1
102# CONFIG_SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT=1
103# CONFIG_SECURE_BOOT_ALLOW_JTAG=1
104# CONFIG_SECURE_BOOT_ALLOW_ROM_BASIC=1
105
106# Options for enabling eFuse emulation in Flash
107# CONFIG_EFUSE_VIRTUAL=1
108# CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH=1
109