|
| 1 | +# SPDX-FileCopyrightText: 2026 Espressif Systems (Shanghai) CO LTD |
| 2 | +# |
| 3 | +# SPDX-License-Identifier: Apache-2.0 |
| 4 | + |
| 5 | +# Define upgrade mode (default is CONFIG_ESP_BOOT_SWAP_USING_SCRATCH) |
| 6 | +# CONFIG_ESP_BOOT_SWAP_USING_MOVE=y |
| 7 | +# CONFIG_ESP_BOOT_UPGRADE_ONLY=y |
| 8 | + |
| 9 | +CONFIG_ESP_FLASH_SIZE=4MB |
| 10 | +CONFIG_ESP_BOOTLOADER_SIZE=0xF000 |
| 11 | +CONFIG_ESP_BOOTLOADER_OFFSET=0x2000 |
| 12 | +CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x20000 |
| 13 | +CONFIG_ESP_APPLICATION_SIZE=0x1C0000 |
| 14 | +CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x1E0000 |
| 15 | +CONFIG_ESP_MCUBOOT_WDT_ENABLE=y |
| 16 | +CONFIG_ESP_SCRATCH_OFFSET=0x3E0000 |
| 17 | +CONFIG_ESP_SCRATCH_SIZE=0x1F000 |
| 18 | + |
| 19 | +CONFIG_BOOTLOADER_PROJECT_VER=0x1 |
| 20 | + |
| 21 | +# When enabled, prevents updating image to an older version |
| 22 | +# CONFIG_ESP_DOWNGRADE_PREVENTION=y |
| 23 | +# This option makes downgrade prevention rely also on security |
| 24 | +# counter (defined using imgtool) instead of only image version |
| 25 | +# CONFIG_ESP_DOWNGRADE_PREVENTION_SECURITY_COUNTER=y |
| 26 | + |
| 27 | +# Enables the MCUboot Serial Recovery, that allows the use of |
| 28 | +# MCUMGR to upload a firmware through the serial port |
| 29 | +# CONFIG_ESP_MCUBOOT_SERIAL=y |
| 30 | +# Use Serial through USB JTAG Serial port for Serial Recovery |
| 31 | +# CONFIG_ESP_MCUBOOT_SERIAL_USB_SERIAL_JTAG=y |
| 32 | +# Use sector erasing (recommended) instead of entire image size |
| 33 | +# erasing when uploading through Serial Recovery |
| 34 | +# CONFIG_ESP_MCUBOOT_ERASE_PROGRESSIVELY=y |
| 35 | + |
| 36 | +# GPIO used to boot on Serial Recovery |
| 37 | +# CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT=3 |
| 38 | +# GPIO input type (0 for Pull-down, 1 for Pull-up) |
| 39 | +# CONFIG_ESP_SERIAL_BOOT_GPIO_INPUT_TYPE=0 |
| 40 | +# GPIO signal value |
| 41 | +# CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT_VAL=1 |
| 42 | +# Delay time for identify the GPIO signal |
| 43 | +# CONFIG_ESP_SERIAL_BOOT_DETECT_DELAY_S=5 |
| 44 | +# UART port used for serial communication (not needed when using USB) |
| 45 | +# CONFIG_ESP_SERIAL_BOOT_UART_NUM=1 |
| 46 | +# GPIO for Serial RX signal |
| 47 | +# CONFIG_ESP_SERIAL_BOOT_GPIO_RX=8 |
| 48 | +# GPIO for Serial TX signal |
| 49 | +# CONFIG_ESP_SERIAL_BOOT_GPIO_TX=9 |
| 50 | +# Baudrate for Serial Recovery communication |
| 51 | +# CONFIG_ESP_SERIAL_BOOT_BAUDRATE=115200 |
| 52 | + |
| 53 | +# Use UART0 for console printing (use either UART or USB alone) |
| 54 | +CONFIG_ESP_CONSOLE_UART=y |
| 55 | +CONFIG_ESP_CONSOLE_UART_NUM=0 |
| 56 | +# Configures alternative UART port for console printing |
| 57 | +# (UART_NUM=0 must not be changed) |
| 58 | +# CONFIG_ESP_CONSOLE_UART_CUSTOM=y |
| 59 | +# CONFIG_ESP_CONSOLE_UART_TX_GPIO=9 |
| 60 | +# CONFIG_ESP_CONSOLE_UART_RX_GPIO=8 |
| 61 | +# Use USB JTAG Serial for console printing |
| 62 | +# CONFIG_ESP_CONSOLE_USB_SERIAL_JTAG=y |
| 63 | + |
| 64 | +# CONFIG_ESP_SIGN_EC256=y |
| 65 | +# CONFIG_ESP_SIGN_ED25519=n |
| 66 | +# CONFIG_ESP_SIGN_RSA=n |
| 67 | +# CONFIG_ESP_SIGN_RSA_LEN=2048 |
| 68 | + |
| 69 | +# Use Tinycrypt lib for EC256 or ED25519 signing |
| 70 | +# CONFIG_ESP_USE_TINYCRYPT=y |
| 71 | +# Use Mbed TLS lib for RSA image signing |
| 72 | +# CONFIG_ESP_USE_MBEDTLS=n |
| 73 | + |
| 74 | +# It is strongly recommended to generate a new signing key |
| 75 | +# using imgtool instead of use the existent sample |
| 76 | +# CONFIG_ESP_SIGN_KEY_FILE=root-ec-p256.pem |
| 77 | + |
| 78 | +# Hardware Secure Boot related options |
| 79 | +# CONFIG_SECURE_SIGNED_ON_BOOT=1 |
| 80 | +# CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME=1 |
| 81 | +# CONFIG_SECURE_BOOT=1 |
| 82 | +# CONFIG_SECURE_BOOT_V2_ENABLED=1 |
| 83 | +# CONFIG_SECURE_BOOT_SUPPORTS_RSA=1 |
| 84 | + |
| 85 | +# Hardware Flash Encryption related options |
| 86 | +# CONFIG_SECURE_FLASH_ENC_ENABLED=1 |
| 87 | +# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_ENC=1 |
| 88 | +# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_DEC=1 |
| 89 | +# CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_CACHE=1 |
| 90 | +# CONFIG_SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT=1 |
| 91 | +# CONFIG_SECURE_BOOT_ALLOW_JTAG=1 |
| 92 | +# CONFIG_SECURE_BOOT_ALLOW_ROM_BASIC=1 |
| 93 | + |
| 94 | +# Options for enabling eFuse emulation in Flash (adjust |
| 95 | +# CONFIG_EFUSE_VIRTUAL_OFFSET accordingly in order |
| 96 | +# to not overlap with other flash regions) |
| 97 | +# CONFIG_EFUSE_VIRTUAL=1 |
| 98 | +# CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH=1 |
| 99 | +# CONFIG_EFUSE_VIRTUAL_OFFSET=0x250000 |
| 100 | +# CONFIG_EFUSE_VIRTUAL_SIZE=0x2000 |
0 commit comments