SPRUJC1
April 2024
1
Abstract
Trademarks
1
Introduction
1.1
Unlocking JTAG With Jacinto7 Security Enabled Devices
2
Steps to Unlock JTAG for HSM Core With TRACE32
2.1
Modifying the SCI Client Default Security Board Configuration
2.1.1
PROCESSOR-SDK-RTOS
2.1.2
PROCESSOR-SDK-LINUX
2.2
Building the SCI Client Security Board Configuration
2.2.1
PROCESSOR-SDK-RTOS
2.2.2
PROCESSOR-SDK-LINUX
2.3
Modifying the Secondary Bootloader’s x509 Certificate
2.3.1
Windows Build Environment
2.3.2
Ubuntu Build Environment
2.4
Building the Secondary Bootloader
2.5
Verifying Secondary Bootloader and TIFS is Executing
2.6
Creating a Downloadable x509 Certificate With a Debug Extension
2.7
Execution of TRACE32 Unlock Script
2.8
Attaching to HSM Core With TRACE32
User's Guide
How to Unlock JTAG and Debug the Hardware Security Module (HSM) on Jacinto7 Security Enabled Devices with Lauterbach