SPRUJC1 April 2024
Located within your PROCESSOR-SDK-RTOS directory, <pdk_path/ti/drv/sciclient/soc/V4/ exists a file named “sciclient_defaultBoardcfg_security.c”. This file contains two structure elements whose values must be configured correctly in order to permit a runtime JTAG unlock to occur.
Element | Type | Description |
allow_jtag_unlock | uint8_t | Must be set to 0x5A for runtime JTAG unlock to occur |
allow_wildcard_unlock | uint8_t | Set to the value of 0 to
enforce UID match before JTAG unlock can occur. Hence the x509
certificate must contain the UID of the device being unlocked. Set to a value of 0x5A to bypass UID match before JTAG unlock. |
In Figure 2-1, “.allow_jtag_unlock = 0x5A” is set to permit runtime JTAG unlock to occur and “.allow_wildcard_unlock = 0x5A”, which bypasses any UID check before the JTAG unlock. For production use cases, it is recommended to set “.allow_wildcard_unlock = 0x0” in order to enforce the UID check. Enforcing the UID check can prevent the unlocking JTAG of different devices with the same debug certificate.
For a detailed description of all secure debug unlock elements located in the SCI Client Security Board Configuration see TISCI User Guide - Secure Debug Unlock.