Hello-
We have a question about this note in the technical reference for the TMS320F28062 on page 63 that reads:
"NOTE: Any read of the CSM password would yield 0x0000 until the device is unlocked. These reads are labeled "dummy read" or a "fake read." The application reads the password locations, but will always get 0's no matter what the actual value is. What is important is the actual value of the password. If the actual value is all 0xFFFF, then doing this "dummy read" will unlock the device. If the actual value is all 0x0000, then no matter what the application code does, one will never be able to unlock the device. If the actual value is something other than all 0xFFFF or 0x0000, then when the dummy read is performed, the actual value must match the password the user provided."
But our _unlock_CSM function just reads the password from the CSMKEY location, which is not correct, and writes it to the key and that seems to work. At least for the flash functions and Device_cal, but not for allowing JTAG connection. How is that possible?
Thanks and Best Regards, Tim Starr on behalf of DS@PM