This thread has been locked.
If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.
Tool/software:
The example boot_ex1_cpu1_cpu2_cm_secure_flash is running well.
Now I have question about to test secure boot by fault injection.
One case: to change the generated golden CMAC Tag, to make the secure boot failed.
Question: Is the golden CMAC Tag stored in the generated hex file as plaintext?
#pragma RETAIN(cmac_sb_1) #pragma LOCATION(cmac_sb_1, 0x080002) const char cmac_sb_1[8] = { 0 };
I really cannot understand the layout of boot_ex1_cpu1_cpu2_cm_secure_flash_cpu1.hex.
How to locate the 0x080002 with 128bits golden CMAC Tag?
I'm not familiar with that hex file format. But it looks quite similar to intel hex (can be looked up in Wikipedia). In the case of intel hex format, it is a text format and thus, a binary value is represented as hex plaintext.
Hi WZ,
Apologies for some delay - please allow another day for me to review your inquiry.
Best Regards,
Allison
Hi WZ,
Please refer to our Secure Boot App note (https://www.ti.com/lit/an/spract3/spract3.pdf) if you haven't already.
The TMS320C28x Assembly Language Tools User's Guide also describes the format of hex files: https://www.ti.com/lit/ug/spru513z/spru513z.pdf
Please let me know if these resources help resolve the question.
Best Regards,
Allison