SWRU455M February 2017 – October 2020 CC3120 , CC3120MOD , CC3130 , CC3135 , CC3135MOD , CC3220MOD , CC3220MODA , CC3220R , CC3220S , CC3220SF , CC3230S , CC3230SF , CC3235MODAS , CC3235MODASF , CC3235MODS , CC3235MODSF , CC3235S , CC3235SF
For security reasons, some of the system files must be created with specific flag. Table 9-4 lists the files and their required creation flags.
Filename | CC3120, CC3130, CC3135 | CC3220S, CC3230S, CC3235S | CC3220SF, CC3230SF, CC3235SF | CC3220R | Remark |
---|---|---|---|---|---|
/sys/servicepack.ucf /sys/certstore.lst |
Secure signed by TI + public write + Fail-safe |
Secure signed by TI + public write + Fail-safe |
Secure signed by TI + public write + Fail-safe |
Secure signed by TI + public write + Fail-safe |
Those files are delivered by TI. The service pack contains fixes to the device code; the trusted root-certificate catalog contains the root CAs supported by TI and a revoked certificate list. TI might deliver a new version for those files when required. TI highly recommends designing the host to support future updates of these files. |
/sys/mcuimg.bin | NA | Secure signed | NA | Not secure | The file contains the host application |
/sys/mcuflashimg.bin | NA | NA | Secure signed | NA | The file contains the host application and used during programming and over-the-air firmware update |
/sys/cert/private.key /sys/cert/client.der /sys/cert/ca.der |
Secure | Secure | Secure | Secure, blocked for read | The files contain the key and certificates for enterprise connection. |
The trusted root-certificate catalog file has a downgrade protection mechanism based on built-in version number value.
The service pack is a special file which already contains the signature. When writing the service pack by the host, the sl_FsClose() function should receive a NULL certificate name and a NULL signature.