This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

MSP430FR2033: Password generation criteria

Part Number: MSP430FR2033

Dear Support,

According to SLAU610B, my customer is using BSL RX Password command to access BSL in our MSP430FR2033.

The password consists of 32 last bytes of FRAM memory (their code). Can they use those bytes to identify valid firmware? What is the content of those bytes and how is it generated?

They idea is to do like this: start every time into BSL with given password, and if it passes they know the firmware is correct. So they can cycle power and go on.

If it wont pass, start it with empty password and bootload firmware.

So they need this password to be unique for firmware version. They found out there are already some data in, but don't know what they mean and if these are modifiable  for example filling in the timestamp.

I provide in attachment the sample hex file and it's C code form which they embed into upper system firmware (section).

Best regards,

Alberto

Code.zip

  • Alberto,

    The BSL password matches the top 16 words in the BSL interrupt vector table (located between addresses 0xFFE0 and 0xFFFF), you've underlined the eUSCI_A0 Receive/Transmit, Timer0_A3, and System Reset interrupts. When an incorrect password is given, a mass erase is initiated and all code FRAM is erased (but not Information Memory). Interrupt vectors that are used by the application should not be erased/overwritten (and FFE0-FFE2 are reserved) but the unused ones can be modified for whatever customization desired.

    Regards,
    Ryan

**Attention** This is a public forum