EasyManua.ls Logo

ST X-CUBE-SBSFU - Test Protections; Test Secure Engine User Code; Figure 30. User Application Test Protection Menu

ST X-CUBE-SBSFU
94 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
UM2262 Rev 6 57/94
UM2262 Step-by-step execution
93
8.5.2 Test protections
An example of the test protection menu is shown in Figure 30. The actual menu depends on
the STM32 Series.
Figure 30. User application test protection menu
The test protection menu is printed at each test attempt of a prohibited operation or error
injection as a function of the test run:
Firewall tests (#1, #2)
Causes a reset trying to access protected code or data (either in RAM or Flash)
PCROP test (#3)
Causes an error trying to access the PCROP region protecting the keys
WRP test (#4)
Causes an error trying to erase write protected code
IWDG test (#5)
Causes a reset simulating a deadlock by not refreshing the watchdog
TAMPER test (#6)
Causes a reset if a tamper event is detected
In order to generate a tamper event, the user must connect PA0 (CN7.28) to GND
(It may be enough to put a finger close to CN7.28).
CORRUPT IMAGE test (#7)
Causes a signature verification failure at next boot.
Returning to the previous menu is obtained by pressing the x key.
8.5.3 Test Secure Engine user code
The version and size of the current user firmware are retrieved by means of a Secure
Engine service, and printed in the console.

Table of Contents

Related product manuals