Zone Security Status - Texas Instruments Concerto F28M36 Series Technical Reference Manual

Table of Contents

Advertisement

www.ti.com
1.10.3.3.2 C Code Example to Resecure C28x Zone1
volatile int *CSMSCR = 0x00AEF; //CSMSCR register
//Set FORCESEC bit
*CSMSCR = 0x8000;
Table 1-33
shows different conditions for a zone to be secure or non-secure.
CSM-ARMED
0
1
1
1
1
1.10.3.4 Environments That Require ECSL Unlocking
The following are the typical situations under which unsecuring memories can be required: the user
develops some main IP, and then outsources peripheral functions to a subcontractor who must be able to
run the customer code during debug but source code should not be visible to the subcontractor.
1.10.3.5 ECSL Password Match Flow
Password match flow (PMF) is essentially a sequence of eight dummy reads from password locations
(PWL) followed by eight writes to KEY registers.
security logic registers and disable security logic.
SPRUHE8E – October 2012 – Revised November 2019
Submit Documentation Feedback
Table 1-33. Zone Security Status
CSM-ALLZERO
CSM-ALLONE
X
0
1
0
0
Figure 1-24
Copyright © 2012–2019, Texas Instruments Incorporated
CSM-MATCH
X
X
0
0
0
X
1
X
0
1
shows how the PMF helps to initialize the
System Control and Interrupts
Code Security Module (CSM)
ZONE STATUS
SECURE
SECURE
SECURE
NON-SECURE
NON-SECURE
153

Advertisement

Table of Contents
loading

Table of Contents