Skip to content

Commit 80e02c2

Browse files
aiwyatt787davidflowers
authored andcommitted
Pull request #12: feature/MCU16GITHUB-878-fix-documentation-rendering
Merge in MCU16CE/dspic33-dsc-bootloader-code-examples from ~C74569/dspic33-dsc-bootloader-code-examples:feature/MCU16GITHUB-837-update-the-readme.md to feature/MCU16GITHUB-836-bootloader-pre-generated-demos * commit '5da3452550a05f5b51836192fce3e6e4f67cc7af': Shrink image Shrink image slightly Fix image error Fix rendering issue Add line breaks
2 parents 5370bfd + 5da3452 commit 80e02c2

File tree

3 files changed

+15
-15
lines changed

3 files changed

+15
-15
lines changed

secure_boot_and_secure_firmware_upgrade_over_canfd/README.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -49,41 +49,41 @@ The associated bootloader and application projects demonstrate the following:
4949
1. With the Development Board detached from any power source, programmer, or USB connection, connect the TA100 8-Pin SOIC CryptoAutomotive™ Socket board into the mikroBUS™ A slot with the jumpers set for SPI
5050
2. Connect the Peak analyzer/generator to your computer
5151
3. Connect the Peak analyzer/generator to the CAN/CAN-FD Driver Circuit on the Development Board
52-
4. Connect the micro-USB cable to port J1 of the Development Board to the host computer.
52+
4. Connect the micro-USB cable to port J1 of the Development Board to the host computer.<br>
5353

5454
![Hardware Setup](./images/hardware_setup.png)
5555

5656
#### Programming the Bootloader
5757
1. Open the boot.X project in MPLAB® X
5858
2. Open MCC
59-
3. Right click on Project Resources and select "Force Update on All"
59+
3. Right click on Project Resources and select "Force Update on All"<br>
6060
![Force Update](./images/MCC_Force_Update.png)
61-
4. Click "Generate"
61+
4. Click "Generate"<br>
6262
![Generate](./images/MCC_Generate.png)
63-
5. Accept all incoming code changes for files **within the CryptoAuthenticationLibrary directory** by selecting "Replace All" in the merge helper UI. **NOTE: DO NOT accept incoming changes for boot_demo.c. Accept all other file changes and close out of MCC**
63+
5. Accept all incoming code changes for files **within the CryptoAuthenticationLibrary directory** by selecting "Replace All" in the merge helper UI. **NOTE: DO NOT accept incoming changes for boot_demo.c. Accept all other file changes and close out of MCC**<br>
6464
![Merge Resolution](./images/MCC_Merge_Resolution.PNG)
65-
6. Press the “Make and Program” button on the top bar
65+
6. Press the “Make and Program” button on the top bar<br>
6666
![Make and Program Device](./images/make_and_program.png)
6767
7. Select the appropriate programmer if prompted
6868
8. The project should compile and program successfully
6969
9. Verify the LED11 is solid on the Development Board. This indicates the bootloader is running
7070

7171
#### Building the Application
7272
1. Open the app.X project in MPLAB® X
73-
2. Press the “Clean and Build Project” button on the top bar. **NOTE**: Make sure not to hit the program button. This will program the application code over the bootloader that was just programmed
73+
2. Press the “Clean and Build Project” button on the top bar. **NOTE**: Make sure not to hit the program button. This will program the application code over the bootloader that was just programmed<br>
7474
![Clean and Build](./images/clean_and_build.png)
7575
3. The project should compile cleanly. app.X/dist/default/production/app.X.production.hex should be generated
7676
4. Verify that LED11 is still solid
7777
a. If LED11 is blinking instead of solid, then the application code was programmed instead of only compiled. Go back to the “Programming the Bootloader” stage and re-program the bootloader
7878

7979
#### Loading the Application
80-
1. Open the Universal Bootloader Host Application tool (UBHA)
80+
1. Open the Universal Bootloader Host Application tool (UBHA)<br>
8181
![UBHA](./images/UBHA_open.png)
82-
2. Select the “PIC24/dsPIC” option from the “Device Architecture” selection drop down
82+
2. Select the “PIC24/dsPIC” option from the “Device Architecture” selection drop down<br>
8383
![UBHA Device Architecture](./images/UBHA_device_architecture.png)
84-
3. Select “CAN” from the protocol drop down selection box
84+
3. Select “CAN” from the protocol drop down selection box<br>
8585
![UBHA Protocol Selection](./images/UBHA_protocol.png)
86-
4. Select the “Settings->CAN” option from the top menu
86+
4. Select the “Settings->CAN” option from the top menu<br>
8787
![UBHA CAN Settings Dropdown](./images/UBHA_Settings_CAN_Dropdown.png)
8888
5. Select the Peak protocol analyzer being used and the appropriate CAN configuration settings for this demo (listed below). When complete, press “Apply”:
8989
a. Nominal Bit Rate: 125.00 kbits/s
@@ -93,18 +93,18 @@ The associated bootloader and application projects demonstrate the following:
9393
e. Flexible Data Rate: 2Mbits/s
9494
f. Message Format: Standard
9595
g. Host to Device ID: 0xA1
96-
h. Device to Host ID: 0xA2
96+
h. Device to Host ID: 0xA2<br>
9797
![CAN Settings](./images/UBHA_CAN_Settings.png)
9898
6. Press the "Read Device Settings" button
99-
a. The Application start address and Application end address fields should have updated. If it did not or if you get a communication error, please go back to the “Programming the Bootloader” stage to make sure the bootloader was programmed correctly
99+
a. The Application start address and Application end address fields should have updated. If it did not or if you get a communication error, please go back to the “Programming the Bootloader” stage to make sure the bootloader was programmed correctly<br>
100100
![Read Device Settings](./images/UBHA_Read_Device_Settings.png)
101101
7. Load the application hex file by selecting “File->Open/Load File (*.hex)”
102-
a. Select the file generated in the previous section: app.X/dist/default/production/app.X.production.hex
102+
a. Select the file generated in the previous section: app.X/dist/default/production/app.X.production.hex<br>
103103
![Open Hex File](./images/UBHA_Open_Hex.png)
104-
8. Check the "Enable Self Verification After Program" checkbox
104+
8. Check the "Enable Self Verification After Program" checkbox<br>
105105
![Enable Verification](./images/UBHA_Enable_Verification.png)
106106
9. Press “Program Device”. The application should program erase, program and perform a self verify using the TA100 for an ECDSA verify then read back verify correctly. Note: The reset response may not be fully transmitted before reset which may result in the reset response failing. The reset most likely did occur and the error can be safely ignored.
107-
a. After a few seconds, LED11 should be blinking
107+
a. After a few seconds, LED11 should be blinking<br>
108108
![Program Device](./images/UBHA_Program.png)
109109

110110
## Trademarks
-6.62 KB
Loading
551 KB
Loading

0 commit comments

Comments
 (0)