|  | # General configuration options | 
|  |  | 
|  | # Copyright (c) 2014-2015 Wind River Systems, Inc. | 
|  | # Copyright (c) 2016 Intel Corporation | 
|  | # Copyright (c) 2023 Nordic Semiconductor ASA | 
|  | # SPDX-License-Identifier: Apache-2.0 | 
|  |  | 
|  | config MCUBOOT | 
|  | bool | 
|  | help | 
|  | Hidden option used to indicate that the current image is MCUBoot | 
|  |  | 
|  | config BOOTLOADER_MCUBOOT | 
|  | bool "MCUboot bootloader support" | 
|  | select USE_DT_CODE_PARTITION if !MCUBOOT_BOOTLOADER_MODE_RAM_LOAD | 
|  | imply INIT_ARCH_HW_AT_BOOT if ARCH_SUPPORTS_ARCH_HW_INIT | 
|  | depends on !MCUBOOT | 
|  | help | 
|  | This option signifies that the target uses MCUboot as a bootloader, | 
|  | or in other words that the image is to be chain-loaded by MCUboot. | 
|  | This sets several required build system and Device Tree options in | 
|  | order for the image generated to be bootable using the MCUboot open | 
|  | source bootloader. Currently this includes: | 
|  |  | 
|  | * Setting ROM_START_OFFSET to a default value that allows space | 
|  | for the MCUboot image header | 
|  | * Activating SW_VECTOR_RELAY_CLIENT on Cortex-M0 | 
|  | (or Armv8-M baseline) targets with no built-in vector relocation | 
|  | mechanisms | 
|  |  | 
|  | By default, this option instructs Zephyr to initialize the core | 
|  | architecture HW registers during boot, when this is supported by | 
|  | the application. This removes the need by MCUboot to reset | 
|  | the core registers' state itself. | 
|  |  | 
|  | if BOOTLOADER_MCUBOOT | 
|  |  | 
|  | config MCUBOOT_SIGNATURE_KEY_FILE | 
|  | string "Path to the mcuboot signing key file" | 
|  | default "" | 
|  | depends on !MCUBOOT_GENERATE_UNSIGNED_IMAGE | 
|  | help | 
|  | The file contains a key pair whose public half is verified | 
|  | by your target's MCUboot image. The file is in PEM format. | 
|  |  | 
|  | If set to a non-empty value, the build system tries to | 
|  | sign the final binaries using a 'west sign -t imgtool' command. | 
|  | The signed binaries are placed in the build directory | 
|  | at zephyr/zephyr.signed.bin and zephyr/zephyr.signed.hex. | 
|  |  | 
|  | The file names can be customized with CONFIG_KERNEL_BIN_NAME. | 
|  | The existence of bin and hex files depends on CONFIG_BUILD_OUTPUT_BIN | 
|  | and CONFIG_BUILD_OUTPUT_HEX. | 
|  |  | 
|  | This option should contain a path to the same file as the | 
|  | BOOT_SIGNATURE_KEY_FILE option in your MCUboot .config. The path | 
|  | may be absolute or relative to the west workspace topdir. (The MCUboot | 
|  | config option is used for the MCUboot bootloader image; this option is | 
|  | for your application which is to be loaded by MCUboot. The MCUboot | 
|  | config option can be a relative path from the MCUboot repository | 
|  | root.) | 
|  |  | 
|  | If left empty and MCUBOOT_GENERATE_UNSIGNED_IMAGE is not set, you | 
|  | must sign and prepare the Zephyr binaries manually to be bootable | 
|  | from MCUboot. | 
|  |  | 
|  | config MCUBOOT_ENCRYPTION_KEY_FILE | 
|  | string "Path to the mcuboot encryption key file" | 
|  | default "" | 
|  | depends on MCUBOOT_SIGNATURE_KEY_FILE != "" | 
|  | help | 
|  | The file contains the public key that is used to encrypt the | 
|  | ephemeral key that encrypts the image. The corresponding | 
|  | private key is hard coded in the MCUboot source code and is | 
|  | used to decrypt the ephemeral key that is embedded in the | 
|  | image. The file is in PEM format. | 
|  |  | 
|  | If set to a non-empty value, the build system tries to | 
|  | sign and encrypt the final binaries using a 'west sign -t imgtool' | 
|  | command. The binaries are placed in the build directory at | 
|  | zephyr/zephyr.signed.encrypted.bin and | 
|  | zephyr/zephyr.signed.encrypted.hex. | 
|  |  | 
|  | The file names can be customized with CONFIG_KERNEL_BIN_NAME. | 
|  | The existence of bin and hex files depends on CONFIG_BUILD_OUTPUT_BIN | 
|  | and CONFIG_BUILD_OUTPUT_HEX. | 
|  |  | 
|  | This option should either be an absolute path or a path relative to | 
|  | the west workspace topdir. | 
|  | Example: './bootloader/mcuboot/enc-rsa2048-pub.pem' | 
|  |  | 
|  | If left empty, you must encrypt the Zephyr binaries manually. | 
|  |  | 
|  | if MCUBOOT_ENCRYPTION_KEY_FILE != "" | 
|  |  | 
|  | choice MCUBOOT_ENCRYPTION_ALG | 
|  | prompt "Algorithm used for image encryption" | 
|  | default MCUBOOT_ENCRYPTION_ALG_AES_128 | 
|  |  | 
|  | config MCUBOOT_ENCRYPTION_ALG_AES_128 | 
|  | bool "Use AES-128 for image encryption" | 
|  |  | 
|  | config MCUBOOT_ENCRYPTION_ALG_AES_256 | 
|  | bool "Use AES-256 for image encryption" | 
|  |  | 
|  | endchoice # MCUBOOT_ENCRYPTION_ALG | 
|  |  | 
|  | endif # MCUBOOT_ENCRYPTION_KEY_FILE != "" | 
|  |  | 
|  | config MCUBOOT_IMGTOOL_SIGN_VERSION | 
|  | string "Version to pass to imgtool when signing" | 
|  | default "$(APP_VERSION_TWEAK_STRING)" if "$(VERSION_MAJOR)" != "" | 
|  | default "0.0.0+0" | 
|  | help | 
|  | When signing with imgtool then this setting will be passed as version | 
|  | argument to the tool. | 
|  | The format is major.minor.revision+build. | 
|  |  | 
|  | config MCUBOOT_IMGTOOL_OVERWRITE_ONLY | 
|  | bool "Use overwrite-only instead of swap upgrades" | 
|  | help | 
|  | If enabled, --overwrite-only option passed to imgtool to avoid | 
|  | adding the swap status area size when calculating overflow. | 
|  |  | 
|  | config MCUBOOT_IMGTOOL_UUID_VID | 
|  | bool "Append vendor unique identifier TLV" | 
|  | help | 
|  | If enabled, --vid option passed to imgtool with the value set by | 
|  | the MCUBOOT_IMGTOOL_UUID_VID_NAME option. | 
|  |  | 
|  | config MCUBOOT_IMGTOOL_UUID_VID_NAME | 
|  | string "Vendor UUID" | 
|  | depends on MCUBOOT_IMGTOOL_UUID_VID | 
|  | help | 
|  | The vendor unique identifier. | 
|  | The following formats are supported: | 
|  | - Domain name (i.e. amce.corp) | 
|  | - Raw UUID (i.e. 12345678-1234-5678-1234-567812345678) | 
|  | - Raw HEX UUID (i.e. 12345678123456781234567812345678) | 
|  |  | 
|  | config MCUBOOT_IMGTOOL_UUID_CID | 
|  | bool "Append image class unique identifier TLV" | 
|  | help | 
|  | If enabled, --cid option passed to imgtool with the value set by | 
|  | the MCUBOOT_IMGTOOL_UUID_CID_NAME option. | 
|  |  | 
|  | config MCUBOOT_IMGTOOL_UUID_CID_NAME | 
|  | string "Image class UUID" | 
|  | depends on MCUBOOT_IMGTOOL_UUID_CID | 
|  | help | 
|  | The image class unique identifier. | 
|  | The following formats are supported: | 
|  | - Image class name (i.e. nRF5340_door_lock_btperipheral). | 
|  | This format requires MCUBOOT_IMGTOOL_UUID_VID_NAME to be defined | 
|  | as the VID UUID is used as the namespace for image class UUID. | 
|  | - Raw UUID (i.e. 12345678-1234-5678-1234-567812345678) | 
|  | - Raw HEX UUID (i.e. 12345678123456781234567812345678) | 
|  |  | 
|  | config MCUBOOT_EXTRA_IMGTOOL_ARGS | 
|  | string "Extra arguments to pass to imgtool when signing" | 
|  | default "" | 
|  | help | 
|  | When signing (CONFIG_MCUBOOT_SIGNATURE_KEY_FILE is a non-empty | 
|  | string) you can use this option to pass extra options to | 
|  | imgtool. For example, you could set this to "--version 1.2". | 
|  |  | 
|  | config MCUBOOT_GENERATE_UNSIGNED_IMAGE | 
|  | bool "Generate unsigned binary image bootable with MCUboot" | 
|  | help | 
|  | Enabling this configuration allows automatic unsigned binary image | 
|  | generation when MCUboot signing key is not provided, | 
|  | i.e., MCUBOOT_SIGNATURE_KEY_FILE is left empty. A hash of the | 
|  | image will be generated and included in the unsigned image, instead | 
|  | of a signature. | 
|  |  | 
|  | config MCUBOOT_GENERATE_CONFIRMED_IMAGE | 
|  | bool "Also generate a padded, confirmed image" | 
|  | help | 
|  | The signed, padded, and confirmed binaries are placed in the build | 
|  | directory at zephyr/zephyr.signed.confirmed.bin and | 
|  | zephyr/zephyr.signed.confirmed.hex. | 
|  |  | 
|  | The file names can be customized with CONFIG_KERNEL_BIN_NAME. | 
|  | The existence of bin and hex files depends on CONFIG_BUILD_OUTPUT_BIN | 
|  | and CONFIG_BUILD_OUTPUT_HEX. | 
|  |  | 
|  | menu "On board MCUboot operation mode" | 
|  |  | 
|  | choice MCUBOOT_BOOTLOADER_MODE | 
|  | prompt "Application assumed MCUboot mode of operation" | 
|  | # Should be removed if board dts is updated | 
|  | default MCUBOOT_BOOTLOADER_MODE_SWAP_USING_MOVE if SOC_FAMILY_STM32 || SOC_FAMILY_ESPRESSIF_ESP32 | 
|  | default MCUBOOT_BOOTLOADER_MODE_SWAP_USING_OFFSET | 
|  | help | 
|  | Informs application build on assumed MCUboot mode of operation. | 
|  | This is important for validataing application against DT configuration, | 
|  | which is done by west sign. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_SINGLE_APP | 
|  | bool "MCUboot has been configured for single slot execution" | 
|  | select MCUBOOT_IMGTOOL_OVERWRITE_ONLY | 
|  | help | 
|  | MCUboot will only boot slot0_partition placed application and does | 
|  | not care about other slots. In this mode application is not able | 
|  | to DFU its own update to secondary slot and all updates need to | 
|  | be performed using MCUboot serial recovery. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_SWAP_USING_OFFSET | 
|  | bool "MCUboot has been configured for swap using offset operation" | 
|  | select MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | help | 
|  | MCUboot expects slot0_partition and slot1_partition to be present | 
|  | in DT and application will boot from slot0_partition. | 
|  | MCUBOOT_BOOTLOADER_NO_DOWNGRADE should also be selected | 
|  | if MCUboot has been built with MCUBOOT_DOWNGRADE_PREVENTION. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_SWAP_USING_MOVE | 
|  | bool "MCUboot has been configured for swap using move operation" | 
|  | select MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | help | 
|  | MCUboot expects slot0_partition and slot1_partition to be present | 
|  | in DT and application will boot from slot0_partition. | 
|  | MCUBOOT_BOOTLOADER_NO_DOWNGRADE should also be selected | 
|  | if MCUboot has been built with MCUBOOT_DOWNGRADE_PREVENTION. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_SWAP_WITHOUT_SCRATCH | 
|  | bool "MCUboot has been configured for swap without scratch operation [DEPRECATED]" | 
|  | select DEPRECATED | 
|  | select MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | help | 
|  | This Kconfig is deprecated, use MCUBOOT_BOOTLOADER_MODE_SWAP_USING_MOVE instead. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_SWAP_SCRATCH | 
|  | bool "MCUboot has been configured for swap using scratch operation" | 
|  | select MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | help | 
|  | MCUboot expects slot0_partition, slot1_partition and scratch_partition | 
|  | to be present in DT, and application will boot from slot0_partition. | 
|  | In this mode scratch_partition is used as temporary storage when | 
|  | MCUboot swaps application from the secondary slot to the primary | 
|  | slot. | 
|  | MCUBOOT_BOOTLOADER_NO_DOWNGRADE should also be selected | 
|  | if MCUboot has been built with MCUBOOT_DOWNGRADE_PREVENTION. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_OVERWRITE_ONLY | 
|  | bool "MCUboot has been configured to just overwrite primary slot" | 
|  | select MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | select MCUBOOT_IMGTOOL_OVERWRITE_ONLY | 
|  | help | 
|  | MCUboot will take contents of secondary slot of an image and will | 
|  | overwrite primary slot with it. | 
|  | In this mode it is not possible to revert back to previous version | 
|  | as it is not stored in the secondary slot. | 
|  | This mode supports MCUBOOT_BOOTLOADER_NO_DOWNGRADE which means | 
|  | that the overwrite will not happen unless the version of secondary | 
|  | slot is higher than the version in primary slot. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_RAM_LOAD | 
|  | bool "MCUboot has been configured for RAM LOAD operation" | 
|  | select MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | select MCUBOOT_BOOTLOADER_NO_DOWNGRADE | 
|  | help | 
|  | MCUboot expects slot0_partition and slot1_partition to exist in DT. In this mode, MCUboot | 
|  | will select the image with the higher version number, copy it to RAM and begin execution | 
|  | from there. The image must be linked to execute from RAM, the address that it is copied | 
|  | to is specified using the load-addr argument when running imgtool. | 
|  | This option automatically selects MCUBOOT_BOOTLOADER_NO_DOWNGRADE as it is not possible | 
|  | to swap back to older version of the application. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_RAM_LOAD_WITH_REVERT | 
|  | bool "MCUboot has been configured for RAM LOAD with revert" | 
|  | select MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | select MCUBOOT_BOOTLOADER_NO_DOWNGRADE | 
|  | help | 
|  | MCUboot expects slot0_partition and slot1_partition to exist in DT. In this mode, MCUboot | 
|  | will select the image with the higher version number, copy it to RAM and begin execution | 
|  | from there. The image must be linked to execute from RAM, the address that it is copied | 
|  | to is specified using the load-addr argument when running imgtool. | 
|  | This option automatically selects MCUBOOT_BOOTLOADER_NO_DOWNGRADE as | 
|  | MCUBoot will automatically select the highest revision of the application | 
|  | to boot. Note however that MCUBoot will select an older revision of | 
|  | the application if the booted revision does not mark itself as confirmed. | 
|  | In this mode MCUboot will boot the application with the higher | 
|  | version from either slot, as long as it has been marked to be boot | 
|  | next time for test or permanently. In case when application is marked | 
|  | for test it needs to confirm itself, on the first boot, or it will be | 
|  | removed and MCUboot will revert to booting previously approved | 
|  | application. Note that in this mode MCUboot will not boot an | 
|  | application if it does not have an image header, so if an application | 
|  | is flashed manually it should be marked as confirmed | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_DIRECT_XIP | 
|  | bool "MCUboot has been configured for DirectXIP operation" | 
|  | select MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | select MCUBOOT_BOOTLOADER_NO_DOWNGRADE | 
|  | help | 
|  | MCUboot expects slot0_partition and slot1_partition to exist in DT. | 
|  | In this mode MCUboot can boot from either partition and will | 
|  | select one with higher application image version, which usually | 
|  | means major.minor.patch triple, unless BOOT_VERSION_CMP_USE_BUILD_NUMBER | 
|  | is also selected that enables comparison of build number. | 
|  | This option automatically selects | 
|  | MCUBOOT_BOOTLOADER_NO_DOWNGRADE as it is not possible | 
|  | to swap back to older version of application. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_DIRECT_XIP_WITH_REVERT | 
|  | bool "MCUboot has been configured for DirectXIP with revert" | 
|  | select MCUBOOT_BOOTUTIL_LIB | 
|  | select MCUBOOT_BOOTUTIL_LIB_FOR_DIRECT_XIP | 
|  | select MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | select MCUBOOT_BOOTLOADER_NO_DOWNGRADE | 
|  | imply MCUBOOT_GENERATE_CONFIRMED_IMAGE | 
|  | help | 
|  | MCUboot expects slot0_partition and slot1_partition to exist in DT. | 
|  | In this mode MCUboot will boot the application with the higher version | 
|  | from either slot, as long as it has been marked to be boot | 
|  | next time for test or permanently. In case when application is marked | 
|  | for test it needs to confirm itself, on the first boot, or it will | 
|  | be removed and MCUboot will revert to booting previously approved | 
|  | application. | 
|  | This mode does not allow freely switching between application | 
|  | versions, as, once higher version application is approved, it is | 
|  | not possible to select lower version for boot. | 
|  | This mode selects MCUBOOT_BOOTLOADER_NO_DOWNGRADE as it is not possible | 
|  | to downgrade running application, but note that MCUboot may do that | 
|  | if application with higher version will not get confirmed. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_FIRMWARE_UPDATER | 
|  | bool "MCUboot has been configured in firmware updater mode" | 
|  | select MCUBOOT_IMGTOOL_OVERWRITE_ONLY | 
|  | help | 
|  | MCUboot will only boot slot0_partition for the main application but has | 
|  | an entrance mechanism defined for entering the slot1_partition which is | 
|  | a dedicated firmware updater application used to update the slot0_partition | 
|  | application. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_SINGLE_APP_RAM_LOAD | 
|  | bool "MCUboot has been configured in single app RAM load mode" | 
|  | select MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | select MCUBOOT_BOOTLOADER_NO_DOWNGRADE | 
|  | help | 
|  | MCUboot can load the image to RAM from an arbitrary location. In this mode, | 
|  | MCUboot will copy the image to RAM and begin execution from there. The image | 
|  | must be linked to execute from RAM, the address that it is copied to is | 
|  | specified using the load-addr argument when running imgtool. | 
|  | Note that while not used directly, a slot0_partition must be defined in the | 
|  | DT, as it is used to get information about size of the image to be loaded. | 
|  | This option automatically selects MCUBOOT_BOOTLOADER_NO_DOWNGRADE as it is | 
|  | not possible to swap back to older version of the application. In fact, none | 
|  | of the swap operations are supported in this mode. | 
|  |  | 
|  | endchoice # MCUBOOT_BOOTLOADER_MODE | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | bool | 
|  | help | 
|  | Selected mode supports downgrade prevention, where you cannot switch to | 
|  | an application with lower version than the currently running application. | 
|  |  | 
|  | if MCUBOOT_BOOTLOADER_MODE_HAS_NO_DOWNGRADE | 
|  | config MCUBOOT_BOOTLOADER_NO_DOWNGRADE | 
|  | bool "MCUboot mode has downgrade prevention enabled" | 
|  | help | 
|  | Selected MCUboot mode has downgrade prevention enabled, where you are not | 
|  | able to change back to image with lower version number. | 
|  | This options should be selected when MCUboot has been built with | 
|  | MCUBOOT_DOWNGRADE_PREVENTION option enabled. | 
|  | endif | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_USES_SHA512 | 
|  | bool "MCUboot uses SHA512 for image hash" | 
|  | help | 
|  | MCUboot has been compiled to verify images using SHA512. | 
|  |  | 
|  | config MCUBOOT_BOOTLOADER_SIGNATURE_TYPE_PURE | 
|  | bool "Signature is verified over an image rather than sha of an image" | 
|  | help | 
|  | MCUboot has been compiled to verify images using pure signature | 
|  | verification, i.e., the signature is verified over the image rather | 
|  | than the SHA of the image. | 
|  |  | 
|  | config MCUBOOT_APPLICATION_FIRMWARE_UPDATER | 
|  | bool "Application is firmware updater image" | 
|  | depends on MCUBOOT_BOOTLOADER_MODE_FIRMWARE_UPDATER | 
|  | help | 
|  | Select this if the current image is the firmware updater image. This will use slot 1 | 
|  | information when signing the image. | 
|  |  | 
|  | Note that the zephyr chosen node ``zephyr,code-partition`` should be set to | 
|  | ``slot1_partition`` for this image. | 
|  |  | 
|  | endmenu # On board MCUboot operation mode | 
|  |  | 
|  | endif # BOOTLOADER_MCUBOOT | 
|  |  | 
|  | menuconfig MCUBOOT_BOOTUTIL_LIB | 
|  | bool "MCUboot utility library" | 
|  | help | 
|  | Enable MCUboot utility library which implements functions | 
|  | required by the chain-loaded application and the MCUboot. | 
|  |  | 
|  | if MCUBOOT_BOOTUTIL_LIB | 
|  |  | 
|  | # hidden option for disabling module-own log configuration | 
|  | # while building MCUboot bootloader | 
|  | config MCUBOOT_BOOTUTIL_LIB_OWN_LOG | 
|  | bool | 
|  | default y | 
|  |  | 
|  | if MCUBOOT_BOOTUTIL_LIB_OWN_LOG | 
|  | module = MCUBOOT_UTIL | 
|  | module-str = MCUboot bootutil | 
|  | source "subsys/logging/Kconfig.template.log_config" | 
|  | endif | 
|  |  | 
|  | config BOOT_IMAGE_ACCESS_HOOKS | 
|  | bool "Hooks for overriding MCUboot's bootutil native routines" | 
|  | help | 
|  | Allow to provide procedures for override or extend native | 
|  | MCUboot's routines required for access the image data. | 
|  | It is up to the application project to add source file which | 
|  | implements hooks to the build. | 
|  |  | 
|  | if MCUBOOT_BOOTLOADER_MODE_DIRECT_XIP_WITH_REVERT | 
|  |  | 
|  | config MCUBOOT_BOOTUTIL_LIB_FOR_DIRECT_XIP | 
|  | bool | 
|  | help | 
|  | Adds support for setting for test and confirming images | 
|  | when bootloader is in DirectXIP-revert mode. | 
|  | endif | 
|  |  | 
|  | DT_CHOSEN_ZEPHYR_FLASH := zephyr,flash | 
|  | DT_CHOSEN_ZEPHYR_FLASH_NODE := $(dt_chosen_path,$(DT_CHOSEN_ZEPHYR_FLASH)) | 
|  |  | 
|  | config MCUBOOT_BOOT_MAX_ALIGN | 
|  | int "Override programmable flash block alignment" | 
|  | default $(dt_node_int_prop_int,$(DT_CHOSEN_ZEPHYR_FLASH_NODE),write-block-size) | 
|  | help | 
|  | Allow to override the programmable flash block alignment size. | 
|  | By default it's set to the maximum of the write block size of | 
|  | the chosen zephyr,flash node and 8. | 
|  |  | 
|  | endif # MCUBOOT_BOOTUTIL_LIB |