@@ -20,7 +20,6 @@ config MCUBOOT
20
20
config BOOT_USE_MBEDTLS
21
21
bool
22
22
# Hidden option
23
- default n
24
23
help
25
24
Use mbedTLS for crypto primitives.
26
25
@@ -33,7 +32,6 @@ config BOOT_USE_PSA_CRYPTO
33
32
config BOOT_USE_TINYCRYPT
34
33
bool
35
34
# Hidden option
36
- default n
37
35
# When building for ECDSA, we use our own copy of mbedTLS, so the
38
36
# Zephyr one must not be enabled or the MBEDTLS_CONFIG_FILE macros
39
37
# will collide.
@@ -44,7 +42,6 @@ config BOOT_USE_TINYCRYPT
44
42
config BOOT_USE_CC310
45
43
bool
46
44
# Hidden option
47
- default n
48
45
# When building for ECDSA, we use our own copy of mbedTLS, so the
49
46
# Zephyr one must not be enabled or the MBEDTLS_CONFIG_FILE macros
50
47
# will collide.
@@ -53,15 +50,12 @@ config BOOT_USE_CC310
53
50
54
51
config BOOT_USE_NRF_CC310_BL
55
52
bool
56
- default n
57
53
58
54
config NRFXLIB_CRYPTO
59
55
bool
60
- default n
61
56
62
57
config NRF_CC310_BL
63
58
bool
64
- default n
65
59
66
60
if BOOT_USE_MBEDTLS && MBEDTLS_BUILTIN
67
61
@@ -130,7 +124,6 @@ menu "MCUBoot settings"
130
124
131
125
config SINGLE_APPLICATION_SLOT
132
126
bool "Single slot bootloader"
133
- default n
134
127
help
135
128
Single image area is used for application which means that
136
129
uploading a new application overwrites the one that previously
@@ -376,7 +369,6 @@ config MBEDTLS_CFG_FILE
376
369
377
370
config BOOT_HW_KEY
378
371
bool "Use HW key for image verification"
379
- default n
380
372
help
381
373
Use HW key for image verification, otherwise the public key is embedded
382
374
in MCUBoot. If enabled the public key is appended to the signed image
@@ -395,7 +387,6 @@ config BOOT_VALIDATE_SLOT0
395
387
config BOOT_VALIDATE_SLOT0_ONCE
396
388
bool "Validate image in the primary slot just once after after upgrade"
397
389
depends on !BOOT_VALIDATE_SLOT0 && SINGLE_APPLICATION_SLOT
398
- default n
399
390
help
400
391
If y, the bootloader attempts to validate the signature of the
401
392
primary slot only once after an upgrade of the main slot.
@@ -501,7 +492,6 @@ endchoice
501
492
config BOOT_DIRECT_XIP_REVERT
502
493
bool "Enable the revert mechanism in direct-xip mode"
503
494
depends on BOOT_DIRECT_XIP
504
- default n
505
495
help
506
496
If y, enables the revert mechanism in direct-xip similar to the one in
507
497
swap mode. It requires the trailer magic to be added to the signed image.
@@ -512,15 +502,13 @@ config BOOT_DIRECT_XIP_REVERT
512
502
513
503
config BOOT_BOOTSTRAP
514
504
bool "Bootstrap erased the primary slot from the secondary slot"
515
- default n
516
505
help
517
506
If y, enables bootstraping support. Bootstrapping allows an erased
518
507
primary slot to be initialized from a valid image in the secondary slot.
519
508
If unsure, leave at the default value.
520
509
521
510
config BOOT_SWAP_SAVE_ENCTLV
522
511
bool "Save encrypted key TLVs instead of plaintext keys in swap metadata"
523
- default n
524
512
depends on BOOT_ENCRYPT_IMAGE
525
513
help
526
514
If y, instead of saving the encrypted image keys in plaintext in the
@@ -649,7 +637,6 @@ config BOOT_MAX_IMG_SECTORS
649
637
650
638
config BOOT_SHARE_BACKEND_AVAILABLE
651
639
bool
652
- default n
653
640
help
654
641
Hidden open which indicates if there is a sharing backend available.
655
642
@@ -658,7 +645,6 @@ DT_CHOSEN_BOOTLOADER_INFO := zephyr,bootloader-info
658
645
659
646
config BOOT_SHARE_BACKEND_AVAILABLE
660
647
bool
661
- default n
662
648
help
663
649
Hidden open which indicates if there is a sharing backend available.
664
650
@@ -693,7 +679,6 @@ endchoice
693
679
694
680
menuconfig BOOT_SHARE_DATA
695
681
bool "Save application specific data"
696
- default n
697
682
depends on BOOT_SHARE_BACKEND_AVAILABLE
698
683
help
699
684
This will allow data to be shared between MCUboot and an application,
@@ -705,15 +690,13 @@ menuconfig BOOT_SHARE_DATA
705
690
706
691
config BOOT_SHARE_DATA_BOOTINFO
707
692
bool "Save boot information data"
708
- default n
709
693
depends on BOOT_SHARE_DATA
710
694
help
711
695
This will place information about the MCUboot configuration and
712
696
running application into a shared memory area.
713
697
714
698
menuconfig MEASURED_BOOT
715
699
bool "Store the boot state/measurements in shared memory area"
716
- default n
717
700
depends on BOOT_SHARE_BACKEND_AVAILABLE
718
701
help
719
702
If enabled, the bootloader will store certain boot measurements such as
@@ -830,7 +813,6 @@ config BOOT_USB_DFU_NO_APPLICATION
830
813
831
814
config BOOT_USE_BENCH
832
815
bool "Enable benchmark code"
833
- default n
834
816
help
835
817
If y, adds support for simple benchmarking that can record
836
818
time intervals between two calls. The time printed depends
@@ -867,7 +849,6 @@ rsource "Kconfig.firmware_loader"
867
849
868
850
config BOOT_INTR_VEC_RELOC
869
851
bool "Relocate the interrupt vector to the application"
870
- default n
871
852
depends on SW_VECTOR_RELAY || CPU_CORTEX_M_HAS_VTOR
872
853
help
873
854
Relocate the interrupt vector to the application before it is started.
@@ -1062,7 +1043,6 @@ config MCUBOOT_DEVICE_SETTINGS
1062
1043
config MCUBOOT_DEVICE_CPU_CORTEX_M0
1063
1044
# Hidden selector for Cortex-M0 settings
1064
1045
bool
1065
- default n
1066
1046
select SW_VECTOR_RELAY if !CPU_CORTEX_M0_HAS_VECTOR_TABLE_REMAP
1067
1047
1068
1048
comment "Zephyr configuration options"
@@ -1091,7 +1071,6 @@ config USB_DEVICE_PRODUCT
1091
1071
# use MCUboot's own log configuration
1092
1072
config MCUBOOT_BOOTUTIL_LIB_OWN_LOG
1093
1073
bool
1094
- default n
1095
1074
1096
1075
config MCUBOOT_VERIFY_IMG_ADDRESS
1097
1076
bool "Verify reset address of image in secondary slot"
0 commit comments