Zone Security Status - Texas Instruments Concerto F28M35 Series Technical Reference Manual

Table of Contents

Advertisement

Code Security Module (CSM)
1.10.3.3.2 C Code Example to Resecure C28x Zone1
volatile int *CSMSCR = 0x00AEF; //CSMSCR register
//Set FORCESEC bit
*CSMSCR = 0x8000;
Table 1-33
shows different conditions for a zone to be secure or non-secure.
CSM-ARMED
0
1
1
1
1
1.10.3.4 Environments That Require ECSL Unlocking
The following are the typical situations under which unsecuring memories can be required: the user
develops some main IP, and then outsources peripheral functions to a subcontractor who must be able to
run the customer code during debug but source code should not be visible to the subcontractor.
1.10.3.5 ECSL Password Match Flow
Password match flow (PMF) is essentially a sequence of eight dummy reads from password locations
(PWL) followed by eight writes to KEY registers.
security logic registers and disable security logic.
152
System Control and Interrupts
Table 1-33. Zone Security Status
CSM-ALLZERO
CSM-ALLONE
X
0
1
0
0
Figure 1-24
Copyright © 2012–2019, Texas Instruments Incorporated
CSM-MATCH
X
X
0
0
0
X
1
X
0
1
shows how the PMF helps to initialize the
SPRUH22I – April 2012 – Revised November 2019
www.ti.com
ZONE STATUS
SECURE
SECURE
SECURE
NON-SECURE
NON-SECURE
Submit Documentation Feedback

Advertisement

Table of Contents
loading

Table of Contents