mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
fix: fix various errors in Kconfig files
This commit is contained in:
parent
7d3ac1abe4
commit
01ee296db0
@ -14,6 +14,7 @@ menu "Application Level Tracing"
|
|||||||
|
|
||||||
config APPTRACE_DEST_NONE
|
config APPTRACE_DEST_NONE
|
||||||
bool "None"
|
bool "None"
|
||||||
|
|
||||||
endchoice
|
endchoice
|
||||||
|
|
||||||
config APPTRACE_DEST_UART
|
config APPTRACE_DEST_UART
|
||||||
@ -60,7 +61,7 @@ menu "Application Level Tracing"
|
|||||||
endchoice
|
endchoice
|
||||||
|
|
||||||
config APPTRACE_UART_TX_GPIO
|
config APPTRACE_UART_TX_GPIO
|
||||||
int "UART TX on GPIO#"
|
int "UART TX on GPIO<num>"
|
||||||
depends on APPTRACE_DEST_UART_NOUSB
|
depends on APPTRACE_DEST_UART_NOUSB
|
||||||
range 0 46
|
range 0 46
|
||||||
default 12 if IDF_TARGET_ESP32
|
default 12 if IDF_TARGET_ESP32
|
||||||
@ -70,7 +71,7 @@ menu "Application Level Tracing"
|
|||||||
This GPIO is used for UART TX pin.
|
This GPIO is used for UART TX pin.
|
||||||
|
|
||||||
config APPTRACE_UART_RX_GPIO
|
config APPTRACE_UART_RX_GPIO
|
||||||
int "UART RX on GPIO#"
|
int "UART RX on GPIO<num>"
|
||||||
depends on APPTRACE_DEST_UART_NOUSB
|
depends on APPTRACE_DEST_UART_NOUSB
|
||||||
range 0 46
|
range 0 46
|
||||||
default 13 if IDF_TARGET_ESP32
|
default 13 if IDF_TARGET_ESP32
|
||||||
@ -213,7 +214,7 @@ menu "Application Level Tracing"
|
|||||||
depends on APPTRACE_SV_ENABLE
|
depends on APPTRACE_SV_ENABLE
|
||||||
default APPTRACE_SV_DEST_JTAG
|
default APPTRACE_SV_DEST_JTAG
|
||||||
help
|
help
|
||||||
SystemView witt transfer data trough defined interface.
|
SystemView will transfer data through the defined interface.
|
||||||
|
|
||||||
config APPTRACE_SV_DEST_JTAG
|
config APPTRACE_SV_DEST_JTAG
|
||||||
bool "Data destination JTAG"
|
bool "Data destination JTAG"
|
||||||
|
@ -28,9 +28,11 @@ menu "Format"
|
|||||||
|
|
||||||
config BOOTLOADER_LOG_TIMESTAMP_SOURCE_NONE
|
config BOOTLOADER_LOG_TIMESTAMP_SOURCE_NONE
|
||||||
bool "None"
|
bool "None"
|
||||||
depends on No # hide it now, turn it on final MR
|
depends on NO_SYMBOL # hide it now, turn it on final MR
|
||||||
|
|
||||||
config BOOTLOADER_LOG_TIMESTAMP_SOURCE_CPU_TICKS
|
config BOOTLOADER_LOG_TIMESTAMP_SOURCE_CPU_TICKS
|
||||||
bool "Milliseconds Since Boot"
|
bool "Milliseconds Since Boot"
|
||||||
|
|
||||||
endchoice # BOOTLOADER_LOG_TIMESTAMP_SOURCE
|
endchoice # BOOTLOADER_LOG_TIMESTAMP_SOURCE
|
||||||
|
|
||||||
endmenu
|
endmenu
|
||||||
|
@ -145,7 +145,7 @@ menu "Bootloader config"
|
|||||||
|
|
||||||
config BOOTLOADER_FACTORY_RESET
|
config BOOTLOADER_FACTORY_RESET
|
||||||
bool "GPIO triggers factory reset"
|
bool "GPIO triggers factory reset"
|
||||||
default N
|
default n
|
||||||
select BOOTLOADER_RESERVE_RTC_MEM if SOC_RTC_FAST_MEM_SUPPORTED
|
select BOOTLOADER_RESERVE_RTC_MEM if SOC_RTC_FAST_MEM_SUPPORTED
|
||||||
help
|
help
|
||||||
Allows to reset the device to factory settings:
|
Allows to reset the device to factory settings:
|
||||||
@ -200,7 +200,7 @@ menu "Bootloader config"
|
|||||||
|
|
||||||
config BOOTLOADER_APP_TEST
|
config BOOTLOADER_APP_TEST
|
||||||
bool "GPIO triggers boot from test app partition"
|
bool "GPIO triggers boot from test app partition"
|
||||||
default N
|
default n
|
||||||
depends on !BOOTLOADER_APP_ANTI_ROLLBACK
|
depends on !BOOTLOADER_APP_ANTI_ROLLBACK
|
||||||
help
|
help
|
||||||
Allows to run the test app from "TEST" partition.
|
Allows to run the test app from "TEST" partition.
|
||||||
@ -763,7 +763,7 @@ menu "Security features"
|
|||||||
config SECURE_BOOT_ENABLE_AGGRESSIVE_KEY_REVOKE
|
config SECURE_BOOT_ENABLE_AGGRESSIVE_KEY_REVOKE
|
||||||
bool "Enable Aggressive key revoke strategy"
|
bool "Enable Aggressive key revoke strategy"
|
||||||
depends on SECURE_BOOT && SOC_SUPPORT_SECURE_BOOT_REVOKE_KEY
|
depends on SECURE_BOOT && SOC_SUPPORT_SECURE_BOOT_REVOKE_KEY
|
||||||
default N
|
default n
|
||||||
help
|
help
|
||||||
If this option is set, ROM bootloader will revoke the public key digest burned in efuse block
|
If this option is set, ROM bootloader will revoke the public key digest burned in efuse block
|
||||||
if it fails to verify the signature of software bootloader with it.
|
if it fails to verify the signature of software bootloader with it.
|
||||||
@ -779,7 +779,7 @@ menu "Security features"
|
|||||||
config SECURE_BOOT_FLASH_BOOTLOADER_DEFAULT
|
config SECURE_BOOT_FLASH_BOOTLOADER_DEFAULT
|
||||||
bool "Flash bootloader along with other artifacts when using the default flash command"
|
bool "Flash bootloader along with other artifacts when using the default flash command"
|
||||||
depends on SECURE_BOOT_V2_ENABLED && SECURE_BOOT_BUILD_SIGNED_BINARIES
|
depends on SECURE_BOOT_V2_ENABLED && SECURE_BOOT_BUILD_SIGNED_BINARIES
|
||||||
default N
|
default n
|
||||||
help
|
help
|
||||||
When Secure Boot V2 is enabled, by default the bootloader is not flashed along with other artifacts
|
When Secure Boot V2 is enabled, by default the bootloader is not flashed along with other artifacts
|
||||||
like the application and the partition table images, i.e. bootloader has to be separately flashed
|
like the application and the partition table images, i.e. bootloader has to be separately flashed
|
||||||
@ -819,7 +819,7 @@ menu "Security features"
|
|||||||
config SECURE_BOOT_INSECURE
|
config SECURE_BOOT_INSECURE
|
||||||
bool "Allow potentially insecure options"
|
bool "Allow potentially insecure options"
|
||||||
depends on SECURE_BOOT
|
depends on SECURE_BOOT
|
||||||
default N
|
default n
|
||||||
help
|
help
|
||||||
You can disable some of the default protections offered by secure boot, in order to enable testing or a
|
You can disable some of the default protections offered by secure boot, in order to enable testing or a
|
||||||
custom combination of security features.
|
custom combination of security features.
|
||||||
@ -830,7 +830,7 @@ menu "Security features"
|
|||||||
|
|
||||||
config SECURE_FLASH_ENC_ENABLED
|
config SECURE_FLASH_ENC_ENABLED
|
||||||
bool "Enable flash encryption on boot (READ DOCS FIRST)"
|
bool "Enable flash encryption on boot (READ DOCS FIRST)"
|
||||||
default N
|
default n
|
||||||
select SPI_FLASH_ENABLE_ENCRYPTED_READ_WRITE
|
select SPI_FLASH_ENABLE_ENCRYPTED_READ_WRITE
|
||||||
help
|
help
|
||||||
If this option is set, flash contents will be encrypted by the bootloader on first boot.
|
If this option is set, flash contents will be encrypted by the bootloader on first boot.
|
||||||
@ -917,7 +917,7 @@ menu "Security features"
|
|||||||
config SECURE_BOOT_ALLOW_ROM_BASIC
|
config SECURE_BOOT_ALLOW_ROM_BASIC
|
||||||
bool "Leave ROM BASIC Interpreter available on reset"
|
bool "Leave ROM BASIC Interpreter available on reset"
|
||||||
depends on (SECURE_BOOT_INSECURE || SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT) && IDF_TARGET_ESP32
|
depends on (SECURE_BOOT_INSECURE || SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT) && IDF_TARGET_ESP32
|
||||||
default N
|
default n
|
||||||
help
|
help
|
||||||
By default, the BASIC ROM Console starts on reset if no valid bootloader is
|
By default, the BASIC ROM Console starts on reset if no valid bootloader is
|
||||||
read from the flash.
|
read from the flash.
|
||||||
@ -932,7 +932,7 @@ menu "Security features"
|
|||||||
bool "Allow JTAG Debugging"
|
bool "Allow JTAG Debugging"
|
||||||
depends on SECURE_BOOT_INSECURE || SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT
|
depends on SECURE_BOOT_INSECURE || SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT
|
||||||
select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE
|
select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE
|
||||||
default N
|
default n
|
||||||
help
|
help
|
||||||
If not set (default), the bootloader will permanently disable JTAG (across entire chip) on first boot
|
If not set (default), the bootloader will permanently disable JTAG (across entire chip) on first boot
|
||||||
when either secure boot or flash encryption is enabled.
|
when either secure boot or flash encryption is enabled.
|
||||||
@ -979,7 +979,7 @@ menu "Security features"
|
|||||||
config SECURE_BOOT_ALLOW_UNUSED_DIGEST_SLOTS
|
config SECURE_BOOT_ALLOW_UNUSED_DIGEST_SLOTS
|
||||||
bool "Leave unused digest slots available (not revoke)"
|
bool "Leave unused digest slots available (not revoke)"
|
||||||
depends on SECURE_BOOT_INSECURE && SOC_EFUSE_REVOKE_BOOT_KEY_DIGESTS
|
depends on SECURE_BOOT_INSECURE && SOC_EFUSE_REVOKE_BOOT_KEY_DIGESTS
|
||||||
default N
|
default n
|
||||||
help
|
help
|
||||||
If not set (default), during startup in the app all unused digest slots will be revoked.
|
If not set (default), during startup in the app all unused digest slots will be revoked.
|
||||||
To revoke unused slot will be called esp_efuse_set_digest_revoke(num_digest) for each digest.
|
To revoke unused slot will be called esp_efuse_set_digest_revoke(num_digest) for each digest.
|
||||||
@ -998,7 +998,7 @@ menu "Security features"
|
|||||||
bool "Leave UART bootloader encryption enabled"
|
bool "Leave UART bootloader encryption enabled"
|
||||||
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT
|
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT
|
||||||
select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE
|
select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE
|
||||||
default N
|
default n
|
||||||
help
|
help
|
||||||
If not set (default), the bootloader will permanently disable UART bootloader encryption access on
|
If not set (default), the bootloader will permanently disable UART bootloader encryption access on
|
||||||
first boot. If set, the UART bootloader will still be able to access hardware encryption.
|
first boot. If set, the UART bootloader will still be able to access hardware encryption.
|
||||||
@ -1008,7 +1008,7 @@ menu "Security features"
|
|||||||
config SECURE_FLASH_UART_BOOTLOADER_ALLOW_DEC
|
config SECURE_FLASH_UART_BOOTLOADER_ALLOW_DEC
|
||||||
bool "Leave UART bootloader decryption enabled"
|
bool "Leave UART bootloader decryption enabled"
|
||||||
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT && IDF_TARGET_ESP32
|
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT && IDF_TARGET_ESP32
|
||||||
default N
|
default n
|
||||||
help
|
help
|
||||||
If not set (default), the bootloader will permanently disable UART bootloader decryption access on
|
If not set (default), the bootloader will permanently disable UART bootloader decryption access on
|
||||||
first boot. If set, the UART bootloader will still be able to access hardware decryption.
|
first boot. If set, the UART bootloader will still be able to access hardware decryption.
|
||||||
@ -1020,7 +1020,7 @@ menu "Security features"
|
|||||||
bool "Leave UART bootloader flash cache enabled"
|
bool "Leave UART bootloader flash cache enabled"
|
||||||
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT && \
|
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT && \
|
||||||
(IDF_TARGET_ESP32 || SOC_EFUSE_DIS_DOWNLOAD_ICACHE || SOC_EFUSE_DIS_DOWNLOAD_DCACHE) # NOERROR
|
(IDF_TARGET_ESP32 || SOC_EFUSE_DIS_DOWNLOAD_ICACHE || SOC_EFUSE_DIS_DOWNLOAD_DCACHE) # NOERROR
|
||||||
default N
|
default n
|
||||||
select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE
|
select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE
|
||||||
help
|
help
|
||||||
If not set (default), the bootloader will permanently disable UART bootloader flash cache access on
|
If not set (default), the bootloader will permanently disable UART bootloader flash cache access on
|
||||||
@ -1031,7 +1031,7 @@ menu "Security features"
|
|||||||
config SECURE_FLASH_REQUIRE_ALREADY_ENABLED
|
config SECURE_FLASH_REQUIRE_ALREADY_ENABLED
|
||||||
bool "Require flash encryption to be already enabled"
|
bool "Require flash encryption to be already enabled"
|
||||||
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT
|
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT
|
||||||
default N
|
default n
|
||||||
help
|
help
|
||||||
If not set (default), and flash encryption is not yet enabled in eFuses, the 2nd stage bootloader
|
If not set (default), and flash encryption is not yet enabled in eFuses, the 2nd stage bootloader
|
||||||
will enable flash encryption: generate the flash encryption key and program eFuses.
|
will enable flash encryption: generate the flash encryption key and program eFuses.
|
||||||
|
@ -315,7 +315,7 @@ menu "ESP System Settings"
|
|||||||
default -1 if ESP_CONSOLE_NONE
|
default -1 if ESP_CONSOLE_NONE
|
||||||
|
|
||||||
config ESP_CONSOLE_UART_TX_GPIO
|
config ESP_CONSOLE_UART_TX_GPIO
|
||||||
int "UART TX on GPIO#"
|
int "UART TX on GPIO<num>"
|
||||||
depends on ESP_CONSOLE_UART_CUSTOM
|
depends on ESP_CONSOLE_UART_CUSTOM
|
||||||
range 0 SOC_GPIO_OUT_RANGE_MAX
|
range 0 SOC_GPIO_OUT_RANGE_MAX
|
||||||
default 1 if IDF_TARGET_ESP32
|
default 1 if IDF_TARGET_ESP32
|
||||||
@ -335,7 +335,7 @@ menu "ESP System Settings"
|
|||||||
is reconfigured after the bootloader exits and the app starts.
|
is reconfigured after the bootloader exits and the app starts.
|
||||||
|
|
||||||
config ESP_CONSOLE_UART_RX_GPIO
|
config ESP_CONSOLE_UART_RX_GPIO
|
||||||
int "UART RX on GPIO#"
|
int "UART RX on GPIO<num>"
|
||||||
depends on ESP_CONSOLE_UART_CUSTOM
|
depends on ESP_CONSOLE_UART_CUSTOM
|
||||||
range 0 SOC_GPIO_IN_RANGE_MAX
|
range 0 SOC_GPIO_IN_RANGE_MAX
|
||||||
default 3 if IDF_TARGET_ESP32
|
default 3 if IDF_TARGET_ESP32
|
||||||
|
@ -39,14 +39,18 @@ menu "Format"
|
|||||||
|
|
||||||
config LOG_TIMESTAMP_SOURCE_NONE
|
config LOG_TIMESTAMP_SOURCE_NONE
|
||||||
bool "None"
|
bool "None"
|
||||||
depends on No # hide it now, turn it on final MR
|
depends on NO_SYMBOL # hide it now, turn it on final MR
|
||||||
|
|
||||||
config LOG_TIMESTAMP_SOURCE_RTOS
|
config LOG_TIMESTAMP_SOURCE_RTOS
|
||||||
bool "Milliseconds Since Boot"
|
bool "Milliseconds Since Boot"
|
||||||
|
|
||||||
config LOG_TIMESTAMP_SOURCE_SYSTEM
|
config LOG_TIMESTAMP_SOURCE_SYSTEM
|
||||||
bool "System Time (HH:MM:SS.sss)"
|
bool "System Time (HH:MM:SS.sss)"
|
||||||
|
|
||||||
config LOG_TIMESTAMP_SOURCE_SYSTEM_FULL
|
config LOG_TIMESTAMP_SOURCE_SYSTEM_FULL
|
||||||
bool "System Time (YY-MM-DD HH:MM:SS.sss)"
|
bool "System Time (YY-MM-DD HH:MM:SS.sss)"
|
||||||
depends on No # hide it now, turn it on final MR
|
depends on NO_SYMBOL # hide it now, turn it on final MR
|
||||||
|
|
||||||
endchoice # LOG_TIMESTAMP_SOURCE
|
endchoice # LOG_TIMESTAMP_SOURCE
|
||||||
|
|
||||||
endmenu
|
endmenu
|
||||||
|
@ -246,11 +246,11 @@ menu "mbedTLS"
|
|||||||
See mbedTLS documentation for required API and more details.
|
See mbedTLS documentation for required API and more details.
|
||||||
|
|
||||||
config MBEDTLS_PKCS7_C
|
config MBEDTLS_PKCS7_C
|
||||||
bool "Enable PKCS #7"
|
bool "Enable PKCS number 7"
|
||||||
default y
|
default y
|
||||||
depends on MBEDTLS_X509_CRL_PARSE_C
|
depends on MBEDTLS_X509_CRL_PARSE_C
|
||||||
help
|
help
|
||||||
Enable PKCS #7 core for using PKCS #7-formatted signatures.
|
Enable PKCS number 7 core for using PKCS number 7-formatted signatures.
|
||||||
|
|
||||||
config MBEDTLS_SSL_CID_PADDING_GRANULARITY
|
config MBEDTLS_SSL_CID_PADDING_GRANULARITY
|
||||||
int "Record plaintext padding"
|
int "Record plaintext padding"
|
||||||
|
Loading…
Reference in New Issue
Block a user