⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 can128_tst-2_ssb.txt

📁 at90can系列单片机can_bootloader_example
💻 TXT
字号:
#------------------------------------------
# CARE: BootLoader version >3
#
# This file contains all test regarding the 
# Software Security Byte.
#
#----------------------------------------


        #----- FLASH access --------------
    MEMORY FLASH
    ERASE F
        ECHO "   **2.1.1** Flash 1byte; address 0x002 = 0x33"
    ADDRANGE 0x002 0x002
    FILLBUFFER 0x33
    PROGRAM
    VERIFY
    ERASE F

        #----- EEPROM access --------------
    MEMORY EEPROM
    TIMEOUT 60
    ERASE F
        ECHO "   **2.1.2** Eeprom 1byte; address 0x002 = 0x44"
    ADDRANGE 0x002 0x002
    FILLBUFFER 0x44
    PROGRAM
    VERIFY
    TIMEOUT 60
    ERASE F

        #----- Configuration access --------------
    MEMORY 4
        ECHO "   **2.1.3** EB = 0xFF"
    ADDRANGE 0x002 0x002
    FILLBUFFER 0xFF
    PROGRAM
    VERIFY



# SSB : Write protected
#-----------------------
        ECHO "   **2.2.1** Set SSB: Write protected"
    ADDRANGE 0x01 0x01
    FILLBUFFER 0xFE
    PROGRAM
    VERIFY

        #----- FLASH access --------------
    MEMORY FLASH
    ADDRANGE 0 0x1DFFF
    BLANKCHECK
        ECHO "   **2.2.2** Flash 1byte; address 0x001 = 0x11"
    ADDRANGE 0x001 0x001
    FILLBUFFER 0x11
    ASSERT FAIL
    PROGRAM
    ASSERT PASS
    FILLBUFFER 0xFF
    VERIFY

        #----- EEPROM access --------------
    MEMORY EEPROM
    ADDRANGE 0 0xFFF
    BLANKCHECK
        ECHO "   **2.2.3** Eeprom 1byte; address 0x001 = 0x22"
    ADDRANGE 0x001 0x001
    FILLBUFFER 0x22
    ASSERT FAIL
    PROGRAM
    ASSERT PASS
    FILLBUFFER 0xFF
    VERIFY

        #----- Signature access --------------
    MEMORY 2
        ECHO "   **2.2.4** Manufacturer code, Family Code, Product Name & Product Revision"
    ADDRANGE 0x00 0x03
    READ

        #----- Information access --------------
    MEMORY 3
        ECHO "   **2.2.5** Bootloader version + IDs"
    ADDRANGE 0x00 0x02
    READ

        #----- Configuration access --------------
    MEMORY 4
        ECHO "   **2.2.6** EB = 0x33"
    ADDRANGE 0x002 0x002
    FILLBUFFER 0x33
    ASSERT FAIL
    PROGRAM
    ASSERT PASS
    FILLBUFFER 0xFF
    VERIFY

        #----- Device Registers --------------
    MEMORY 5
        ECHO "   **2.2.7** Stack Register (double)"
    ADDRANGE 0x5D 0x5E
    READ



# SSB : Read Write protected
#---------------------------
    MEMORY 4
        ECHO "   **2.3.1** SSB=Read_Write protection"
    ADDRANGE 0x001 0x001
    FILLBUFFER 0xFC
    PROGRAM
        
        #----- FLASH access --------------
    MEMORY FLASH
    ADDRANGE 0 0x1DFFF
    BLANKCHECK
        ECHO "   **2.3.2** Flash 1byte; address 0x001 = 0x44"
    ADDRANGE 0x001 0x001
    FILLBUFFER 0x44
    ASSERT FAIL
    PROGRAM
    READ
    ASSERT PASS

        #----- EEPROM access --------------
    MEMORY EEPROM
    ADDRANGE 0 0xFFF
    BLANKCHECK
        ECHO "   **2.3.3** Eeprom 1byte; address 0x001 = 0x55"
    ADDRANGE 0x001 0x001
    FILLBUFFER 0x55
    ASSERT FAIL
    PROGRAM
    READ
    ASSERT PASS

        #----- Signature access --------------
    MEMORY 2
        ECHO "   **2.3.4** Manufacturer code, Family Code, Product Name & Product Revision"
    ADDRANGE 0x00 0x03
    READ

        #----- Information access --------------
    MEMORY 3
        ECHO "   **2.3.5** Bootloader version + IDs"
    ADDRANGE 0x00 0x02
    READ

        #----- Configuration access --------------
    MEMORY 4
        ECHO "   **2.3.6** EB = 0x66"
    ADDRANGE 0x002 0x002
    FILLBUFFER 0x66
    ASSERT FAIL
    PROGRAM
    ASSERT PASS
    FILLBUFFER 0xFF
    VERIFY

        #----- Device Registers --------------
    MEMORY 5
        ECHO "   **2.3.7** Stack Register (double)"
    ADDRANGE 0x5D 0x5E
    READ


# SSB : No security
#------------------
	MEMORY 4
        ECHO "   **2.4.1** SSB = TRY No-security"
    ADDRANGE 0x001 0x001
    READ 
    FILLBUFFER 0xFE
    ASSERT FAIL
    PROGRAM
    VERIFY
    ASSERT PASS

        #----- FLASH access --------------
    MEMORY FLASH
         ECHO "   **2.4.2** Erase Flash and SSB"
    ERASE F
    ADDRANGE 0 0x1DFFF
    BLANKCHECK

        #----- FLASH erase clears SSB --------------
        #----- Configuration access --------------
    MEMORY 4
         ECHO "   **2.4.3** Verify SSB = 0xFF"
    ADDRANGE 0x001 0x001
    FILLBUFFER 0xFF
    VERIFY

        #----- Check Flash Write --------------
    MEMORY FLASH
        ECHO "   **2.4.4** Flash 1byte; address 0x001 = 0x77"
        ADDRANGE 0x001 0x001
        FILLBUFFER 0x77
    PROGRAM
    VERIFY
    ERASE F

        #----- Check Eeprom Write --------------
    MEMORY EEPROM
        ECHO "   **2.4.5** Eeprom 1byte; address 0x001 = 0x88"
    ADDRANGE 0x001 0x001
    FILLBUFFER 0x88
    PROGRAM
    VERIFY
    TIMEOUT 60
    ERASE F

        #----- Configuration access --------------
    MEMORY 4
        ECHO "   **2.4.6** EB = 0x99"
    ADDRANGE 0x002 0x002
    FILLBUFFER 0x99
    PROGRAM
    VERIFY
    ERASE F

# ******* End Of File *******
        ECHO "   ** 2 ** E.O.F"

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -