152 lines
5.9 KiB
YAML
152 lines
5.9 KiB
YAML
# Licensed to the Apache Software Foundation (ASF) under one
|
|
# or more contributor license agreements. See the NOTICE file
|
|
# distributed with this work for additional information
|
|
# regarding copyright ownership. The ASF licenses this file
|
|
# to you under the Apache License, Version 2.0 (the
|
|
# "License"); you may not use this file except in compliance
|
|
# with the License. You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing,
|
|
# software distributed under the License is distributed on an
|
|
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
# KIND, either express or implied. See the License for the
|
|
# specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
|
|
# Package: boot/mynewt/mcuboot_config
|
|
|
|
syscfg.defs:
|
|
BOOTUTIL_IMAGE_NUMBER:
|
|
description: 'Number of images for multi-image (0 and 1 mean single image).'
|
|
value: 0
|
|
BOOTUTIL_VALIDATE_SLOT0:
|
|
description: 'Validate image at slot 0 on each boot.'
|
|
value: 0
|
|
BOOTUTIL_SIGN_RSA:
|
|
description: 'Images are signed using RSA.'
|
|
value: 0
|
|
BOOTUTIL_SIGN_RSA_LEN:
|
|
description: 'Key size for RSA keys (2048 or 3072).'
|
|
value: 2048
|
|
BOOTUTIL_SIGN_EC:
|
|
description: 'Images are signed using ECDSA NIST P-224.'
|
|
value: 0
|
|
BOOTUTIL_SIGN_EC256:
|
|
description: 'Images are signed using ECDSA NIST P-256.'
|
|
value: 0
|
|
BOOTUTIL_SIGN_ED25519:
|
|
description: 'Images are signed using ED25519.'
|
|
value: 0
|
|
BOOTUTIL_ENCRYPT_RSA:
|
|
description: 'Support for encrypted images using RSA-2048-OAEP.'
|
|
value: 0
|
|
BOOTUTIL_ENCRYPT_KW:
|
|
description: 'Support for encrypted images using AES-128-Keywrap.'
|
|
value: 0
|
|
BOOTUTIL_ENCRYPT_EC256:
|
|
description: 'Support for encrypted images using ECIES-P256.'
|
|
value: 0
|
|
BOOTUTIL_ENCRYPT_X25519:
|
|
description: 'Support for encrypted images using ECIES-X25519.'
|
|
value: 0
|
|
BOOTUTIL_USE_MBED_TLS:
|
|
description: 'Use mbed TLS for crypto operations.'
|
|
value: 1
|
|
BOOTUTIL_USE_TINYCRYPT:
|
|
description: 'Use tinycrypt for crypto operations.'
|
|
value: 0
|
|
BOOTUTIL_SWAP_USING_MOVE:
|
|
description: 'Perform swap without requiring scratch.'
|
|
value: 0
|
|
BOOTUTIL_SWAP_SAVE_ENCTLV:
|
|
description: 'Save TLVs instead of plaintext encryption keys in swap status.'
|
|
value: 0
|
|
BOOTUTIL_OVERWRITE_ONLY:
|
|
description: 'Non-swapping upgrades, copy from slot 1 to slot 0 only.'
|
|
value: 0
|
|
BOOTUTIL_OVERWRITE_ONLY_FAST:
|
|
description: 'Use faster copy only upgrade.'
|
|
value: 1
|
|
BOOTUTIL_IMAGE_FORMAT_V2:
|
|
description: 'Indicates that system is using v2 of image format.'
|
|
value: 1
|
|
BOOTUTIL_MAX_IMG_SECTORS:
|
|
description: 'Maximum number of sectors that are swapped.'
|
|
value: 128
|
|
BOOTUTIL_DOWNGRADE_PREVENTION:
|
|
description: >
|
|
Select downgrade prevention strategy.
|
|
- none downgrades are allowed
|
|
- version:
|
|
Prevent downgrades by enforcing incrementing version numbers.
|
|
When this option is set, any upgrade must have greater major version
|
|
or greater minor version with equal major version. This mechanism
|
|
only protects against some attacks against version downgrades (for
|
|
example, a JTAG could be used to write an older version).
|
|
- security_counter:
|
|
security counter is used for version eligibility check instead of pure
|
|
version. When this option is set, any upgrade must have greater or
|
|
equal security counter value.
|
|
Because of the acceptance of equal values it allows for software
|
|
downgrades to some extent.
|
|
choices:
|
|
- none
|
|
- version
|
|
- security_counter
|
|
value: none
|
|
BOOTUTIL_HW_ROLLBACK_PROT:
|
|
description: >
|
|
Prevent undesirable/malicious software downgrades. When this option is
|
|
set, any upgrade must have greater or equal security counter value.
|
|
Because of the acceptance of equal values it allows for software
|
|
downgrade to some extent
|
|
value: 0
|
|
BOOTUTIL_HAVE_LOGGING:
|
|
description: 'Enable serial logging'
|
|
value: 0
|
|
restrictions:
|
|
- "!BOOTUTIL_NO_LOGGING"
|
|
BOOTUTIL_NO_LOGGING:
|
|
description: 'No serial logging'
|
|
value: 1
|
|
restrictions:
|
|
- "!BOOTUTIL_HAVE_LOGGING"
|
|
BOOTUTIL_LOG_LEVEL:
|
|
description: >
|
|
Default console log level. Valid values are:
|
|
BOOTUTIL_LOG_LEVEL_OFF
|
|
BOOTUTIL_LOG_LEVEL_ERROR
|
|
BOOTUTIL_LOG_LEVEL_WARNING
|
|
BOOTUTIL_LOG_LEVEL_INFO
|
|
BOOTUTIL_LOG_LEVEL_DEBUG
|
|
value: 'BOOTUTIL_LOG_LEVEL_INFO'
|
|
BOOTUTIL_BOOTSTRAP:
|
|
description: 'Support bootstrapping slot0 from slot1, if slot0 is empty'
|
|
value: 0
|
|
BOOTUTIL_FEED_WATCHDOG:
|
|
description: 'Enable watchdog feeding while performing a swap upgrade'
|
|
value: 0
|
|
|
|
MCUBOOT_MEASURED_BOOT:
|
|
description: >
|
|
Store the boot state/measurements in shared memory.
|
|
If enabled, the bootloader will store certain boot measurements such as
|
|
the hash of the firmware image in a shared memory area. This data can
|
|
be used later by runtime services (e.g. by a device attestation service).
|
|
value:
|
|
MCUBOOT_MEASURED_BOOT_MAX_RECORD_SZ:
|
|
description: the maximum size of the CBOR encoded boot record in bytes.
|
|
value:
|
|
MCUBOOT_DATA_SHARING:
|
|
description: Save application specific data in shared memory (RAM).
|
|
value:
|
|
MCUBOOT_SHARED_DATA_BASE:
|
|
description: RAM address of shared data
|
|
value:
|
|
MCUBOOT_SHARED_DATA_SIZE:
|
|
description: Shared data size.
|
|
value:
|