Hi...
Ty for getting back to me...
I agree that what we are doing is quite unorthodox, and that we are
using the flash locking / unlocking feature very differently from what
it was intended for.
By way of (brief) background info:
We are using the state of FSEC as a means of controlling the re-
programming of the ECU... All programming commands
sourced on the CAN bus check this byte, and if the unit is secured,
they don't do anything. An 'authorised person' will lock the device
with a key known to himself only, and then the ECU can't be changed
without his unlocking it first. [quite literally: use of a BDM is impossible
once the unit has been assembled.]
electronically, it doesn't actually prevent us from programming it, nor
is it actually secure from hacking, but it does prevent impromptu code
changes.
Problem is: it is not always convenient to have to re-program the ECU
in the presence of the 'authorised person', and it would be much more
workable to be able to get him to unlock it, and then we give it back to him
2, 3 days later to re-lock.
Thing is, NVFSEC seems to be similar to NVFPROT, in that they may only
be re-programmed after a mass erase... And I was wondering if this was
actually the case, or if there is a trick that I'd missed.
Best regards,
Sebastian
PS: surprisingly enough, there was no problem 'protecting' the back door
key BAKEY with the FPROT mechanism. Buit I do agree that it is very risky,
in that the upper sector of code will be trashed (and the ECU written off!) if
something goes wrong...