This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

CCS/TMS320F28377S: DCSM evaluation

Part Number: TMS320F28377S

Tool/software: Code Composer Studio

Hello experts,

I got question about DCSM.
My customer plan to use DCSM function for tamper resistance.
To confirm this function is working well or not, they want to know how to evaluate.
Could you tell me evaluation way?

For confirming "cannot writing", is it good way to check download is success or not from CCS?
If DCSM function is working well, the download object without password should be failed.

For confirming 'cannot reading", what is the good way of confirming?

I would appreciate if you would give me reply soon.

Thanks and best regards,
Ryo Akashi
  • Hi,

     For confirming "cannot writing", is it good way to check download is success or not from CCS?

    It may not because CCS errors out even if one location does not get correct. You could just write a test code which will read all secure location and make sure it returns value 0x0. As long as that is confirm, write should be protected as well. For flash sector, you could perform erase operation for each sector (one by one) via flash plug-in GUI and that should fail.

    Hope this helps.

    Regards,

    Vivek Singh

  • Hello Vivek-san,

    Thank you very much for your quick reply.
    I understand writing test code is one way to check "writing" is protected or not.
    Do you have any example of test code? Is there nothing special?

    Also, could you tell me how to check "reading" is protected or not?

    Thanks and best regards,
    Ryo Akashi
  • Hello Vivek-san,

    Could you give me comment?
    Customer need advice as soon as possible.
    I would appreciate if you would give me reply.

     

    Thanks and best regards,
    Ryo Akashi
  • Akashi-san,

    We do not have test code for this as this is very user specific (what they are going to secure). It's simple read/write function. Read is also same test code. Read to any secure region from non-secure region would return 0x0 value.

    Regards,

    Vivek Singh

  • Hello Vivek-san,

    Thank you for your reply.
    I understand test code is very user specific.

    Let me ask one more question.

    If we try to access from JTAG, the return value should be 0x0?

    Thanks and best regards,
    Ryo Akashi
  • Akashi-san,

    Yes, read from JTAG to all secure memory is blocked hence you'll see return value 0x0. 

    Regards,

    Vivek Singh

  • Hello Vivek-san,

    Thank you for your reply.
    I understand we'll see return value 0x0.
    Let me ask one more question regarding JTAG read.
    Could you tell me example of JTAG access without object(software) download?
    Currently, customer develop with CCSv8.1.0. They download object file from "Debug" button.
    To access via JTAG only, do we need special tool or something?

    Thanks and best regards,
    Ryo Akashi
  • Akashi-san,

     Could you tell me example of JTAG access without object(software) download?

    I may not be clear on this query. If you have CCS connected then user should be able to memory watch window and dump memory content. They do not need to download any code/software for this.

     
    Currently, customer develop with CCSv8.1.0. They download object file from "Debug" button.
    To access via JTAG only, do we need special tool or something?

    As mentioned in my last post, JTAG means via CCS only unless user has their own emulation interface to access device via JTAG.
    Regards,
    Vivek Singh