SPRADG2 January   2024 AM67 , AM67A , AM68 , AM68A , AM69 , AM69A , DRA821U , DRA821U-Q1 , DRA829J , DRA829J-Q1 , DRA829V , DRA829V-Q1 , TDA4AEN-Q1 , TDA4AH-Q1 , TDA4AL-Q1 , TDA4AP-Q1 , TDA4VE-Q1 , TDA4VEN-Q1 , TDA4VH-Q1 , TDA4VL-Q1 , TDA4VM , TDA4VM-Q1 , TDA4VP-Q1

 

  1.   1
  2.   Abstract
  3.   Trademarks
  4. 1Introduction
  5. 2Device Type and Key Information Provided
    1. 2.1 Get Other Key Information via MCU UART
  6. 3HS Device Return
    1. 3.1 CRP Script Tool
    2. 3.2 Generate and Signs the WIR Certificate Binary (override.bin) Standalone
    3. 3.3 Generate the Binaries for Bench Test Standalone
  7. 4Summary
  8. 5References

Generate and Signs the WIR Certificate Binary (override.bin) Standalone

This is mandatory for all Jacinto7 HS device return ATE test. WIR certificate is used to unlock the JTAG debug port in the ATE test stage. After the JTAG is unlocked, ATE tests can be move on, and some basic bare mental test programs can also be run. But this test can only run single-module test on a specific failure module. If the above tests are all passed, it is necessary to enter the high-level operating system (HLOS) to perform bench system-level tests, and conduct targeted system-level tests according to customer failure scenarios. To generate the WIR certificate, you need to replace the UID in bold with the following template code and save it as x509_sec_override.txt.

In the following code template, certType = INTEGER:2147483649 (0x80000001 in decimal), representing Override Cert mode. debugType = INTEGER:4 stands for DEBUG_FULL, which is used to unlock the JTAG function and enable full debugging function.

[ req ] 
distinguished_name = req_distinguished_name 
x509_extensions = v3_ca 
prompt = no dirstring_type = nobmp 
[ req_distinguished_name ] 
C = gc 
ST = cW 
L = y6qqF9wh61 
O = vGtcXq5gItAeCDXDyVCtdVayXh 
OU = tcDeqFyxG4r 
CN = rgH4qfPTF 
emailAddress = lQeqF8F1HQuc2@lrIP7hPUyQ03x.com 
[ v3_ca ]  
basicConstraints = CA:true  
1.3.6.1.4.1.294.1.1=ASN1:SEQUENCE:boot_seq  
1.3.6.1.4.1.294.1.8=ASN1:SEQUENCE:debug 
[ boot_seq ]  
certType = INTEGER:2147483649  
bootCore = INTEGER:0  
bootCoreOpts = INTEGER:0  
destAddr = FORMAT:HEX,OCT:00000000  
imageSize = INTEGER:0 
[ debug ]  
debugUID = FORMAT:HEX,OCT:486227340651ed7670e840191e064dbb8d0ad5164737980ed860ebd81672b8cc  
debugType = INTEGER:4  
coreDbgEn = INTEGER:0  
coreDbgSecEn = INTEGER:0

Use the following command to generate a WIR Cert file named override.bin. The custkey.pem in the following command is the root private key of the customer, and the command needs to be run in the same path.

$ openssl req -new -x509 -key custkey.pem -nodes -outform DER –out override.bin -config x509_sec_override.txt -sha512

This has been integrated into the CPR Script tool.