fix: fix various errors in Kconfig files

This commit is contained in:
Jan Beran 2024-07-15 10:11:15 +02:00
parent 7d3ac1abe4
commit 01ee296db0
6 changed files with 30 additions and 23 deletions

View File

@ -14,6 +14,7 @@ menu "Application Level Tracing"
config APPTRACE_DEST_NONE config APPTRACE_DEST_NONE
bool "None" bool "None"
endchoice endchoice
config APPTRACE_DEST_UART config APPTRACE_DEST_UART
@ -60,7 +61,7 @@ menu "Application Level Tracing"
endchoice endchoice
config APPTRACE_UART_TX_GPIO config APPTRACE_UART_TX_GPIO
int "UART TX on GPIO#" int "UART TX on GPIO<num>"
depends on APPTRACE_DEST_UART_NOUSB depends on APPTRACE_DEST_UART_NOUSB
range 0 46 range 0 46
default 12 if IDF_TARGET_ESP32 default 12 if IDF_TARGET_ESP32
@ -70,7 +71,7 @@ menu "Application Level Tracing"
This GPIO is used for UART TX pin. This GPIO is used for UART TX pin.
config APPTRACE_UART_RX_GPIO config APPTRACE_UART_RX_GPIO
int "UART RX on GPIO#" int "UART RX on GPIO<num>"
depends on APPTRACE_DEST_UART_NOUSB depends on APPTRACE_DEST_UART_NOUSB
range 0 46 range 0 46
default 13 if IDF_TARGET_ESP32 default 13 if IDF_TARGET_ESP32
@ -213,7 +214,7 @@ menu "Application Level Tracing"
depends on APPTRACE_SV_ENABLE depends on APPTRACE_SV_ENABLE
default APPTRACE_SV_DEST_JTAG default APPTRACE_SV_DEST_JTAG
help help
SystemView witt transfer data trough defined interface. SystemView will transfer data through the defined interface.
config APPTRACE_SV_DEST_JTAG config APPTRACE_SV_DEST_JTAG
bool "Data destination JTAG" bool "Data destination JTAG"

View File

@ -28,9 +28,11 @@ menu "Format"
config BOOTLOADER_LOG_TIMESTAMP_SOURCE_NONE config BOOTLOADER_LOG_TIMESTAMP_SOURCE_NONE
bool "None" bool "None"
depends on No # hide it now, turn it on final MR depends on NO_SYMBOL # hide it now, turn it on final MR
config BOOTLOADER_LOG_TIMESTAMP_SOURCE_CPU_TICKS config BOOTLOADER_LOG_TIMESTAMP_SOURCE_CPU_TICKS
bool "Milliseconds Since Boot" bool "Milliseconds Since Boot"
endchoice # BOOTLOADER_LOG_TIMESTAMP_SOURCE endchoice # BOOTLOADER_LOG_TIMESTAMP_SOURCE
endmenu endmenu

View File

@ -145,7 +145,7 @@ menu "Bootloader config"
config BOOTLOADER_FACTORY_RESET config BOOTLOADER_FACTORY_RESET
bool "GPIO triggers factory reset" bool "GPIO triggers factory reset"
default N default n
select BOOTLOADER_RESERVE_RTC_MEM if SOC_RTC_FAST_MEM_SUPPORTED select BOOTLOADER_RESERVE_RTC_MEM if SOC_RTC_FAST_MEM_SUPPORTED
help help
Allows to reset the device to factory settings: Allows to reset the device to factory settings:
@ -200,7 +200,7 @@ menu "Bootloader config"
config BOOTLOADER_APP_TEST config BOOTLOADER_APP_TEST
bool "GPIO triggers boot from test app partition" bool "GPIO triggers boot from test app partition"
default N default n
depends on !BOOTLOADER_APP_ANTI_ROLLBACK depends on !BOOTLOADER_APP_ANTI_ROLLBACK
help help
Allows to run the test app from "TEST" partition. Allows to run the test app from "TEST" partition.
@ -763,7 +763,7 @@ menu "Security features"
config SECURE_BOOT_ENABLE_AGGRESSIVE_KEY_REVOKE config SECURE_BOOT_ENABLE_AGGRESSIVE_KEY_REVOKE
bool "Enable Aggressive key revoke strategy" bool "Enable Aggressive key revoke strategy"
depends on SECURE_BOOT && SOC_SUPPORT_SECURE_BOOT_REVOKE_KEY depends on SECURE_BOOT && SOC_SUPPORT_SECURE_BOOT_REVOKE_KEY
default N default n
help help
If this option is set, ROM bootloader will revoke the public key digest burned in efuse block If this option is set, ROM bootloader will revoke the public key digest burned in efuse block
if it fails to verify the signature of software bootloader with it. if it fails to verify the signature of software bootloader with it.
@ -779,7 +779,7 @@ menu "Security features"
config SECURE_BOOT_FLASH_BOOTLOADER_DEFAULT config SECURE_BOOT_FLASH_BOOTLOADER_DEFAULT
bool "Flash bootloader along with other artifacts when using the default flash command" bool "Flash bootloader along with other artifacts when using the default flash command"
depends on SECURE_BOOT_V2_ENABLED && SECURE_BOOT_BUILD_SIGNED_BINARIES depends on SECURE_BOOT_V2_ENABLED && SECURE_BOOT_BUILD_SIGNED_BINARIES
default N default n
help help
When Secure Boot V2 is enabled, by default the bootloader is not flashed along with other artifacts When Secure Boot V2 is enabled, by default the bootloader is not flashed along with other artifacts
like the application and the partition table images, i.e. bootloader has to be separately flashed like the application and the partition table images, i.e. bootloader has to be separately flashed
@ -819,7 +819,7 @@ menu "Security features"
config SECURE_BOOT_INSECURE config SECURE_BOOT_INSECURE
bool "Allow potentially insecure options" bool "Allow potentially insecure options"
depends on SECURE_BOOT depends on SECURE_BOOT
default N default n
help help
You can disable some of the default protections offered by secure boot, in order to enable testing or a You can disable some of the default protections offered by secure boot, in order to enable testing or a
custom combination of security features. custom combination of security features.
@ -830,7 +830,7 @@ menu "Security features"
config SECURE_FLASH_ENC_ENABLED config SECURE_FLASH_ENC_ENABLED
bool "Enable flash encryption on boot (READ DOCS FIRST)" bool "Enable flash encryption on boot (READ DOCS FIRST)"
default N default n
select SPI_FLASH_ENABLE_ENCRYPTED_READ_WRITE select SPI_FLASH_ENABLE_ENCRYPTED_READ_WRITE
help help
If this option is set, flash contents will be encrypted by the bootloader on first boot. If this option is set, flash contents will be encrypted by the bootloader on first boot.
@ -917,7 +917,7 @@ menu "Security features"
config SECURE_BOOT_ALLOW_ROM_BASIC config SECURE_BOOT_ALLOW_ROM_BASIC
bool "Leave ROM BASIC Interpreter available on reset" bool "Leave ROM BASIC Interpreter available on reset"
depends on (SECURE_BOOT_INSECURE || SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT) && IDF_TARGET_ESP32 depends on (SECURE_BOOT_INSECURE || SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT) && IDF_TARGET_ESP32
default N default n
help help
By default, the BASIC ROM Console starts on reset if no valid bootloader is By default, the BASIC ROM Console starts on reset if no valid bootloader is
read from the flash. read from the flash.
@ -932,7 +932,7 @@ menu "Security features"
bool "Allow JTAG Debugging" bool "Allow JTAG Debugging"
depends on SECURE_BOOT_INSECURE || SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT depends on SECURE_BOOT_INSECURE || SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT
select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE
default N default n
help help
If not set (default), the bootloader will permanently disable JTAG (across entire chip) on first boot If not set (default), the bootloader will permanently disable JTAG (across entire chip) on first boot
when either secure boot or flash encryption is enabled. when either secure boot or flash encryption is enabled.
@ -979,7 +979,7 @@ menu "Security features"
config SECURE_BOOT_ALLOW_UNUSED_DIGEST_SLOTS config SECURE_BOOT_ALLOW_UNUSED_DIGEST_SLOTS
bool "Leave unused digest slots available (not revoke)" bool "Leave unused digest slots available (not revoke)"
depends on SECURE_BOOT_INSECURE && SOC_EFUSE_REVOKE_BOOT_KEY_DIGESTS depends on SECURE_BOOT_INSECURE && SOC_EFUSE_REVOKE_BOOT_KEY_DIGESTS
default N default n
help help
If not set (default), during startup in the app all unused digest slots will be revoked. If not set (default), during startup in the app all unused digest slots will be revoked.
To revoke unused slot will be called esp_efuse_set_digest_revoke(num_digest) for each digest. To revoke unused slot will be called esp_efuse_set_digest_revoke(num_digest) for each digest.
@ -998,7 +998,7 @@ menu "Security features"
bool "Leave UART bootloader encryption enabled" bool "Leave UART bootloader encryption enabled"
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT
select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE
default N default n
help help
If not set (default), the bootloader will permanently disable UART bootloader encryption access on If not set (default), the bootloader will permanently disable UART bootloader encryption access on
first boot. If set, the UART bootloader will still be able to access hardware encryption. first boot. If set, the UART bootloader will still be able to access hardware encryption.
@ -1008,7 +1008,7 @@ menu "Security features"
config SECURE_FLASH_UART_BOOTLOADER_ALLOW_DEC config SECURE_FLASH_UART_BOOTLOADER_ALLOW_DEC
bool "Leave UART bootloader decryption enabled" bool "Leave UART bootloader decryption enabled"
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT && IDF_TARGET_ESP32 depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT && IDF_TARGET_ESP32
default N default n
help help
If not set (default), the bootloader will permanently disable UART bootloader decryption access on If not set (default), the bootloader will permanently disable UART bootloader decryption access on
first boot. If set, the UART bootloader will still be able to access hardware decryption. first boot. If set, the UART bootloader will still be able to access hardware decryption.
@ -1020,7 +1020,7 @@ menu "Security features"
bool "Leave UART bootloader flash cache enabled" bool "Leave UART bootloader flash cache enabled"
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT && \ depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT && \
(IDF_TARGET_ESP32 || SOC_EFUSE_DIS_DOWNLOAD_ICACHE || SOC_EFUSE_DIS_DOWNLOAD_DCACHE) # NOERROR (IDF_TARGET_ESP32 || SOC_EFUSE_DIS_DOWNLOAD_ICACHE || SOC_EFUSE_DIS_DOWNLOAD_DCACHE) # NOERROR
default N default n
select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE select SECURE_FLASH_SKIP_WRITE_PROTECTION_CACHE if SECURE_FLASH_HAS_WRITE_PROTECTION_CACHE
help help
If not set (default), the bootloader will permanently disable UART bootloader flash cache access on If not set (default), the bootloader will permanently disable UART bootloader flash cache access on
@ -1031,7 +1031,7 @@ menu "Security features"
config SECURE_FLASH_REQUIRE_ALREADY_ENABLED config SECURE_FLASH_REQUIRE_ALREADY_ENABLED
bool "Require flash encryption to be already enabled" bool "Require flash encryption to be already enabled"
depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT depends on SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT
default N default n
help help
If not set (default), and flash encryption is not yet enabled in eFuses, the 2nd stage bootloader If not set (default), and flash encryption is not yet enabled in eFuses, the 2nd stage bootloader
will enable flash encryption: generate the flash encryption key and program eFuses. will enable flash encryption: generate the flash encryption key and program eFuses.

View File

@ -315,7 +315,7 @@ menu "ESP System Settings"
default -1 if ESP_CONSOLE_NONE default -1 if ESP_CONSOLE_NONE
config ESP_CONSOLE_UART_TX_GPIO config ESP_CONSOLE_UART_TX_GPIO
int "UART TX on GPIO#" int "UART TX on GPIO<num>"
depends on ESP_CONSOLE_UART_CUSTOM depends on ESP_CONSOLE_UART_CUSTOM
range 0 SOC_GPIO_OUT_RANGE_MAX range 0 SOC_GPIO_OUT_RANGE_MAX
default 1 if IDF_TARGET_ESP32 default 1 if IDF_TARGET_ESP32
@ -335,7 +335,7 @@ menu "ESP System Settings"
is reconfigured after the bootloader exits and the app starts. is reconfigured after the bootloader exits and the app starts.
config ESP_CONSOLE_UART_RX_GPIO config ESP_CONSOLE_UART_RX_GPIO
int "UART RX on GPIO#" int "UART RX on GPIO<num>"
depends on ESP_CONSOLE_UART_CUSTOM depends on ESP_CONSOLE_UART_CUSTOM
range 0 SOC_GPIO_IN_RANGE_MAX range 0 SOC_GPIO_IN_RANGE_MAX
default 3 if IDF_TARGET_ESP32 default 3 if IDF_TARGET_ESP32

View File

@ -39,14 +39,18 @@ menu "Format"
config LOG_TIMESTAMP_SOURCE_NONE config LOG_TIMESTAMP_SOURCE_NONE
bool "None" bool "None"
depends on No # hide it now, turn it on final MR depends on NO_SYMBOL # hide it now, turn it on final MR
config LOG_TIMESTAMP_SOURCE_RTOS config LOG_TIMESTAMP_SOURCE_RTOS
bool "Milliseconds Since Boot" bool "Milliseconds Since Boot"
config LOG_TIMESTAMP_SOURCE_SYSTEM config LOG_TIMESTAMP_SOURCE_SYSTEM
bool "System Time (HH:MM:SS.sss)" bool "System Time (HH:MM:SS.sss)"
config LOG_TIMESTAMP_SOURCE_SYSTEM_FULL config LOG_TIMESTAMP_SOURCE_SYSTEM_FULL
bool "System Time (YY-MM-DD HH:MM:SS.sss)" bool "System Time (YY-MM-DD HH:MM:SS.sss)"
depends on No # hide it now, turn it on final MR depends on NO_SYMBOL # hide it now, turn it on final MR
endchoice # LOG_TIMESTAMP_SOURCE endchoice # LOG_TIMESTAMP_SOURCE
endmenu endmenu

View File

@ -246,11 +246,11 @@ menu "mbedTLS"
See mbedTLS documentation for required API and more details. See mbedTLS documentation for required API and more details.
config MBEDTLS_PKCS7_C config MBEDTLS_PKCS7_C
bool "Enable PKCS #7" bool "Enable PKCS number 7"
default y default y
depends on MBEDTLS_X509_CRL_PARSE_C depends on MBEDTLS_X509_CRL_PARSE_C
help help
Enable PKCS #7 core for using PKCS #7-formatted signatures. Enable PKCS number 7 core for using PKCS number 7-formatted signatures.
config MBEDTLS_SSL_CID_PADDING_GRANULARITY config MBEDTLS_SSL_CID_PADDING_GRANULARITY
int "Record plaintext padding" int "Record plaintext padding"