This thread has been locked.
If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.
I'm reviewing code security issues for a MSP430FR2xxx device, do I understand correctly?
---------------------------------------------------------------------------------
I'm mostly interested in protecting the firmware from binary theft by a competitor. Do I understand correctly that with the above any factory worker can readily obtain the 32 byte BSL bootloader password, and with that knowledge leaked, any device in the field can have the firmware stripped using the "TX Data Block command." ?
It also means that to reprogram the part requires two physical connectors (six pins for JTAG/SBW with TagConnect and four pins for BSL).
Is it possible to achieve:
That way nobody can read out the code, but a factory process can still reprogram or update firmware on the part.
References
zrno soli said:Just to add to Winter answer, that mass erase (back to factory state) for FR2xx can be done with both interfaces, SBW and / or BSL. BSL can be disabled, but SBW mass erase stay enabled (even with locked JTAG), so it is impossible to brick device.
Thank you, that's very helpful. And would be a great addition to the TI documentation.
--
Because our serial ports have other functions, the prospect of arranging pins to support BSL was unpleasant.
**Attention** This is a public forum