Kconfig 2.0 KB

1234567891011121314151617181920212223242526272829303132333435363738
  1. menu "NVS"
  2. config NVS_ENCRYPTION
  3. bool "Enable NVS encryption"
  4. depends on SECURE_FLASH_ENC_ENABLED || SOC_HMAC_SUPPORTED
  5. default y if SECURE_FLASH_ENC_ENABLED
  6. help
  7. This option enables encryption for NVS. When enabled, XTS-AES is used to encrypt
  8. the complete NVS data, except the page headers. It requires XTS encryption keys
  9. to be stored in an encrypted partition (enabling flash encryption is mandatory here)
  10. or to be derived from an HMAC key burnt in eFuse.
  11. config NVS_COMPATIBLE_PRE_V4_3_ENCRYPTION_FLAG
  12. bool "NVS partition encrypted flag compatible with ESP-IDF before v4.3"
  13. depends on SECURE_FLASH_ENC_ENABLED
  14. help
  15. Enabling this will ignore "encrypted" flag for NVS partitions. NVS encryption
  16. scheme is different than hardware flash encryption and hence it is not recommended
  17. to have "encrypted" flag for NVS partitions. This was not being checked in pre v4.3
  18. IDF. Hence, if you have any devices where this flag is kept enabled in partition
  19. table then enabling this config will allow to have same behavior as pre v4.3 IDF.
  20. config NVS_ASSERT_ERROR_CHECK
  21. bool "Use assertions for error checking"
  22. default n
  23. help
  24. This option switches error checking type between assertions (y) or return codes (n).
  25. config NVS_LEGACY_DUP_KEYS_COMPATIBILITY
  26. bool "Enable legacy nvs_set function behavior when same key is reused with different data types"
  27. default n
  28. help
  29. Enabling this option will switch the nvs_set() family of functions to the legacy mode:
  30. when called repeatedly with the same key but different data type, the existing value
  31. in the NVS remains active and the new value is just stored, actually not accessible through
  32. corresponding nvs_get() call for the key given. Use this option only when your application
  33. relies on such NVS API behaviour.
  34. endmenu