Hello,
My customer wants to enable the secure debug feature to protect the JTAG port from being red externally.
I am a bit confused here as you are referring to some SW routines of unspecified drivers.
So to make it clear in case of PASS module implementation you need to program DCF records to censor JTAG access. Once you have done it your device will behave as there is no JTAG module to external world until valid password is provided.
1. Set the JTAG Password and passwords of the Password Groups;
Yes
2. Push the MCU's Lifecycle to OEM Production;
Yes. After this you need to do destructive reset so the device will load changed DCF records during reset phase.
3. Call DeactiveSecureDebug() once the device receives the corresponding commands;
No idea what SW you are referring to. But once you censor the JTAG via PASS module, no SW will make change to fact, that you need to provide JTAG password in order to unlock JTAG module for debugging. Is it some MCAL driver?
4. In DeactiveSecureDebug() - 1)Check the DBL bit of 4 Password Group; 2)If one of the 4 Password Group's DBL bit is set to 1, call PASS_DRV_UnlockPassgroup() to unlock the access to this Password Group, then set this DBL bit to 0
Once you access the JTAG via providing correct censorship password, you will be able to connect to device. But you wont be able to modify the PASS module protected memory content until you provide valid PASS passwords into CIN registers.
Once you have done this, then you can read/modify flash with no restrictions from PASS module.
(enable the secure debug feature to protect the JTAG port from being red externally, and the secure debug feature can be enabled and disabled by ActivateSecureDebug() and DeactivateDebug() when the system receives commands from another device with higher priority) on MPC5775E?
If the supervisor unit can provide PASS passwords or clear DBL bit in PASS_LOCK3 for MPC5775 then it will be unlocked for configured masters.
I have no knowledge on function's headers you have posted.

Best regards,
Peter