S32K144 unlock Secure debug

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

S32K144 unlock Secure debug

1,213 Views
Kishore_14
Contributor III

Hi,

We are attempting to unlock secure debug on an S32K144 device using winIDEA.
According to iSYSTEM documentation 
NXP S32: Unlocking secure debug on NXP S32G2/3xx and S32R45x
secure debug unlocking is supported for S32G2 and S32K3 devices with password parameters.

Kishore_14_1-1770114549004.png

However, when configuring the S32K144 in winIDEA CPU Options, the security unlock
parameters (Protection, Password, SmartCardPassword) that are available for S32G2/S32K3
devices are not present.

**The connection script $(SFR_FILE_DIR)/S32K1xx_ConnectToSoC.cpp contains no unlock parameters
or security-related functions for S32K144 devices**

 

Kishore_14_0-1770114001399.png

Questions:
1. Does S32K144 support secure debug unlocking?
2. If yes, what is the proper procedure for S32K144?
3. Are there alternative methods or tools for S32K144 secure debug unlock?

Tags (3)
0 Kudos
Reply
7 Replies

1,185 Views
Julián_AragónM
NXP TechSupport
NXP TechSupport

Hi @Kishore_14,

1. Yes. However, it is somewhat different than S32K3xx procedures. The JTAG/SWD interface will be disabled when the part is secured. This means that a debug controller cannot read or write to SOC memory mapped addresses when the part is in this state.

The part is secure when the FTFC_FSEC byte is in a secure state in the flash configuration field. 

2. Please refer to AN12130 & Example S32K144 Verify Backdoor Access Key S32DS1.3. Also, chapter 5.2.1 Flash memory security from S32K1xx reference manual also explains how the FSEC field works.

3. There is also the JTAG Lock procedure on NXP S32K1xx blog from winIDEA. It is the same documentation as the S32K/G/R link you've shared, but focused on the K1 devices.

Best regards,
Julián

0 Kudos
Reply

1,167 Views
Kishore_14
Contributor III

Hi,

Thank you for the references provided.

We have reviewed:
- S32DS1.3 Backdoor Access Key example
- winIDEA S32K1xx JTAG Lock blog

The winIDEA blog shows how to lock S32K1xx devices using Flash Security byte (0x40C),
but we need the procedure to UNLOCK an already secured S32K1xx device via winIDEA.

The iSYSTEM unlock documentation only covers S32K3xx and S32G2xx devices with
password parameters, which are not available for S32K1xx in winIDEA.

Could you please provide:
1. The specific winIDEA procedure to unlock a secured S32K1xx device?
2. How to configure the backdoor access key method in winIDEA for S32K1xx?



Tags (3)
0 Kudos
Reply

1,148 Views
Julián_AragónM
NXP TechSupport
NXP TechSupport

Hi @Kishore_14,

I am not sure what is the specific procedure to unlock the S32K device through winIDEA. Since this SW is not from NXP, rather from a third-party, could you try contacting them instead? Online Help - iSYSTEM.

In order to unlock the S32K1xx, you either need to enable and enter the backdoor key or mass erase must be enabled.

The backdoor key can be used to unlock the MCU by the FTFC command only. (Unlock flash on S32K144W from firmware - NXP Community)

If you want to unlock the MCU from outside, you need to mass erase the whole chip. 

I've found this post explaining the same thing, using winIDEA: Arm Cortex-M: Locked/secured device - TASKING Knowledge Base.

Best regards,
Julián

0 Kudos
Reply

1,134 Views
Kishore_14
Contributor III

We have an additional question regarding S32K1xx secure debug unlock:

Hardware Debugger Support:
1. S32 Debugger- Shows "Secure debugging" option in S32DS:
- "Enable secure debugging" checkbox available
- "Debugging type: Password" dropdown available
-  We don't have S32 debugger hardware

 

Kishore_14_3-1770286733658.png

2. PEMicro Debugger - No secure debugging option visible:
-  We have PEMicro hardware
-  No secure debugging options in S32DS interface
-  We don't have PEMicro license

Kishore_14_4-1770286771591.png


1. Does PEMicro debugger support S32K1xx secure debug unlock?
2. Is the secure debugging feature only available with S32 debugger hardware?
3. If PEMicro supports it, how do we enable secure debugging options for S32K1xx with PEMicro?

Tags (3)
0 Kudos
Reply

1,109 Views
Julián_AragónM
NXP TechSupport
NXP TechSupport

Hi @Kishore_14,

1. Does PEMicro debugger support S32K1xx secure debug unlock?

Not as far as I'm aware. 

2. Is the secure debugging feature only available with S32 debugger hardware?

Secure debugging is only available for S32G/R/Z devices. You can see that selecting the S32K144 device disables the "Secure debugging" option:

Julin_AragnM_0-1770414322872.pngJulin_AragnM_1-1770414329536.png

3. If PEMicro supports it, how do we enable secure debugging options for S32K1xx with PEMicro?

If they support any kind of scripts, you can ask their support page: PEmicro Support Home.

However, as I've mentioned, you have two methods: backdoor key by the FTFC command or mass erase the whole chip (if mass erase is enabled).

Best regards,
Julián

0 Kudos
Reply

1,076 Views
Kishore_14
Contributor III

Hi Julian,

Following up on your previous response about "backdoor key by FTFC command" for S32K1xx:

1. When you mention "backdoor key by FTFC command," do you mean using the example project Example_S32K144_Verify_Backdoor_Access_Key_S32DS1.3_v2 approach with FTFC command 0x45?

2. If I'm using a different project (like a bootloader), do I need to hardcode the backdoor key unlock code into every project?

Thanks.

Tags (3)
0 Kudos
Reply

1,058 Views
Julián_AragónM
NXP TechSupport
NXP TechSupport

Hi @Kishore_14,

1. Yes. 

2. I'm not sure if I understood the question correctly. The FSEC register is a read-only register and is loaded with the content of the flash security byte in the Flash Configuration Field located in program flash memory during the reset sequence. The configuration field holds the Backdoor comparison key as well and is configurable in startup_S32K1XX.S file.

If you are referring to loading the key through FTFC, you can create a routine which receives the key through UART, CAN, SPI, etc. (except JTAG/SWD) and loads the key, thus un-securing the device and unlocking JTAG/SWD interface as well until the next reset.

Best regards,
Julián

0 Kudos
Reply
%3CLINGO-SUB%20id%3D%22lingo-sub-2305238%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3ES32K144%20unlock%20Secure%20debug%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2305238%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EHi%2C%3CBR%20%2F%3E%3CBR%20%2F%3EWe%20are%20attempting%20to%20unlock%20secure%20debug%20on%20an%20S32K144%20device%20using%20winIDEA.%3CBR%20%2F%3EAccording%20to%20iSYSTEM%20documentation%26nbsp%3B%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.isystem.com%2Fdownloads%2FwinIDEA%2Fhelp%2Fnxp-s32-unlock-secure-debug.html%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3ENXP%20S32%3A%20Unlocking%20secure%20debug%20on%20NXP%20S32G2%2F3xx%20and%20S32R45x%3C%2FA%3E%3CBR%20%2F%3Esecure%20debug%20unlocking%20is%20supported%20for%20S32G2%20and%20S32K3%20devices%20with%20password%20parameters.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Kishore_14_1-1770114549004.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_1-1770114549004.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_1-1770114549004.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_1-1770114549004.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_1-1770114549004.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_1-1770114549004.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_1-1770114549004.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F375297i880BC87A3A57FAAF%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Kishore_14_1-1770114549004.png%22%20alt%3D%22Kishore_14_1-1770114549004.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EHowever%2C%20when%20configuring%20the%20S32K144%20in%20winIDEA%20CPU%20Options%2C%20the%20security%20unlock%3CBR%20%2F%3Eparameters%20(Protection%2C%20Password%2C%20SmartCardPassword)%20that%20are%20available%20for%20S32G2%2FS32K3%3CBR%20%2F%3Edevices%20are%20not%20present.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3E**The%20connection%20script%20%24(SFR_FILE_DIR)%2FS32K1xx_ConnectToSoC.cpp%20contains%20no%20unlock%20parameters%3CBR%20%2F%3Eor%20security-related%20functions%20for%20S32K144%20devices**%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Kishore_14_0-1770114001399.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_0-1770114001399.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_0-1770114001399.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_0-1770114001399.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_0-1770114001399.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_0-1770114001399.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_0-1770114001399.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F375296iCD95CBF77F70CEF5%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Kishore_14_0-1770114001399.png%22%20alt%3D%22Kishore_14_0-1770114001399.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EQuestions%3A%3CBR%20%2F%3E1.%20Does%20S32K144%20support%20secure%20debug%20unlocking%3F%3CBR%20%2F%3E2.%20If%20yes%2C%20what%20is%20the%20proper%20procedure%20for%20S32K144%3F%3CBR%20%2F%3E3.%20Are%20there%20alternative%20methods%20or%20tools%20for%20S32K144%20secure%20debug%20unlock%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2305783%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K144%20unlock%20Secure%20debug%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2305783%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EHi%2C%3CBR%20%2F%3E%3CBR%20%2F%3EThank%20you%20for%20the%20references%20provided.%3CBR%20%2F%3E%3CBR%20%2F%3EWe%20have%20reviewed%3A%3CBR%20%2F%3E-%20S32DS1.3%20Backdoor%20Access%20Key%20example%3CBR%20%2F%3E-%20winIDEA%20S32K1xx%20JTAG%20Lock%20blog%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3EThe%20winIDEA%20blog%20shows%20how%20to%20lock%20S32K1xx%20devices%20using%20Flash%20Security%20byte%20(0x40C)%2C%3CBR%20%2F%3Ebut%20we%20need%20the%20procedure%20to%20UNLOCK%20an%20already%20secured%20S32K1xx%20device%20via%20winIDEA.%3C%2FP%3E%3CP%3EThe%20iSYSTEM%20unlock%20documentation%20only%20covers%20S32K3xx%20and%20S32G2xx%20devices%20with%3CBR%20%2F%3Epassword%20parameters%2C%20which%20are%20not%20available%20for%20S32K1xx%20in%20winIDEA.%3CBR%20%2F%3E%3CBR%20%2F%3ECould%20you%20please%20provide%3A%3CBR%20%2F%3E1.%20The%20specific%20winIDEA%20procedure%20to%20unlock%20a%20secured%20S32K1xx%20device%3F%3CBR%20%2F%3E2.%20How%20to%20configure%20the%20backdoor%20access%20key%20method%20in%20winIDEA%20for%20S32K1xx%3F%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2305521%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K144%20unlock%20Secure%20debug%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2305521%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F257154%22%20target%3D%22_blank%22%3E%40Kishore_14%3C%2FA%3E%2C%3C%2FP%3E%0A%3CP%3E1.%20Yes.%20However%2C%20it%20is%20somewhat%20different%20than%20S32K3xx%20procedures.%26nbsp%3BThe%20JTAG%2FSWD%20interface%20will%20be%20disabled%20when%20the%20part%20is%20%3CSTRONG%3Esecured%3C%2FSTRONG%3E.%20This%20means%20that%20a%20debug%20controller%20cannot%20read%20or%20write%20to%20SOC%20memory%20mapped%20addresses%20when%20the%20part%20is%20in%20this%20state.%3C%2FP%3E%0A%3CP%3EThe%20part%20is%20secure%20when%20the%20%3CSTRONG%3EFTFC_FSEC%3C%2FSTRONG%3E%20byte%20is%20in%20a%20secure%20state%20in%20the%20flash%20configuration%20field.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E2.%20Please%20refer%20to%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.nxp.com%2Fdocs%2Fen%2Fapplication-note%2FAN12130.pdf%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EAN12130%3C%2FA%3E%26nbsp%3B%26amp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2FS32K-Knowledge-Base%2FExample-S32K144-Verify-Backdoor-Access-Key-S32DS1-3%2Fta-p%2F1102820%22%20target%3D%22_blank%22%3EExample%20S32K144%20Verify%20Backdoor%20Access%20Key%20S32DS1.3%3C%2FA%3E.%20Also%2C%20chapter%26nbsp%3B%3CSTRONG%3E5.2.1%20Flash%20memory%20security%3C%2FSTRONG%3E%20from%20S32K1xx%20reference%20manual%20also%20explains%20how%20the%20FSEC%20field%20works.%3C%2FP%3E%0A%3CP%3E3.%20There%20is%20also%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.isystem.com%2Fdownloads%2FwinIDEA%2Fhelp%2Fnxp-s32k-jtag-lock-procedure-s32k1.html%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EJTAG%20Lock%20procedure%20on%20NXP%20S32K1xx%3C%2FA%3E%26nbsp%3Bblog%20from%20winIDEA.%20It%20is%20the%20same%20documentation%20as%20the%20S32K%2FG%2FR%20link%20you've%20shared%2C%20but%20focused%20on%20the%20K1%20devices.%3C%2FP%3E%0A%3CP%3EBest%20regards%2C%3CBR%20%2F%3EJuli%C3%A1n%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2312386%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K144%20unlock%20Secure%20debug%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2312386%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F257154%22%20target%3D%22_blank%22%3E%40Kishore_14%3C%2FA%3E%2C%3C%2FP%3E%0A%3CP%3EI%20am%20not%20sure%20what%20is%20the%20specific%20procedure%20to%20unlock%20the%20S32K%20device%20through%20winIDEA.%20Since%20this%20SW%20is%20not%20from%20NXP%2C%20rather%20from%20a%20third-party%2C%20could%20you%20try%20contacting%20them%20instead%3F%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.isystem.com%2Fsupport%2Fonline-help.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EOnline%20Help%20-%20iSYSTEM%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3EIn%20order%20to%20unlock%20the%20S32K1xx%2C%20you%20either%20need%20to%20enable%20and%20enter%20the%20backdoor%20key%20or%20mass%20erase%20must%20be%20enabled.%3C%2FP%3E%0A%3CP%3EThe%20backdoor%20key%20can%20be%20used%20to%20unlock%20the%26nbsp%3BMCU%26nbsp%3Bby%20the%20FTFC%20command%20only.%20(%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2FS32K%2FUnlock-flash-on-S32K144W-from-firmware%2Ftd-p%2F1744546%22%20target%3D%22_blank%22%3EUnlock%20flash%20on%20S32K144W%20from%20firmware%20-%20NXP%20Community%3C%2FA%3E)%3C%2FP%3E%0A%3CP%3EIf%20you%20want%20to%20unlock%20the%20MCU%26nbsp%3Bfrom%20outside%2C%20you%20need%20to%20mass%20erase%20the%20whole%20chip.%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI've%20found%20this%20post%20explaining%20the%20same%20thing%2C%20using%20winIDEA%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fkb.tasking.com%2FKB%2F122%2FArticle%2F97%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EArm%20Cortex-M%3A%20Locked%2Fsecured%20device%20-%20TASKING%20Knowledge%20Base%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3EBest%20regards%2C%3CBR%20%2F%3EJuli%C3%A1n%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2312831%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K144%20unlock%20Secure%20debug%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2312831%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EWe%20have%20an%20additional%20question%20regarding%20S32K1xx%20secure%20debug%20unlock%3A%3CBR%20%2F%3E%3CBR%20%2F%3EHardware%20Debugger%20Support%3A%3CBR%20%2F%3E1.%20S32%20Debugger-%20Shows%20%22Secure%20debugging%22%20option%20in%20S32DS%3A%3CBR%20%2F%3E-%20%22Enable%20secure%20debugging%22%20checkbox%20available%3CBR%20%2F%3E-%20%22Debugging%20type%3A%20Password%22%20dropdown%20available%3CBR%20%2F%3E-%26nbsp%3B%20We%20don't%20have%20S32%20debugger%20hardware%3C%2FP%3E%3CDIV%20class%3D%22%22%3E%26nbsp%3B%3C%2FDIV%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Kishore_14_3-1770286733658.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_3-1770286733658.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_3-1770286733658.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_3-1770286733658.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_3-1770286733658.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F375656i412C0899AE8E683F%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Kishore_14_3-1770286733658.png%22%20alt%3D%22Kishore_14_3-1770286733658.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E2.%20PEMicro%20Debugger%20-%20No%20secure%20debugging%20option%20visible%3A%3CBR%20%2F%3E-%26nbsp%3B%20We%20have%20PEMicro%20hardware%3CBR%20%2F%3E-%26nbsp%3B%20No%20secure%20debugging%20options%20in%20S32DS%20interface%3CBR%20%2F%3E-%26nbsp%3B%20We%20don't%20have%20PEMicro%20license%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Kishore_14_4-1770286771591.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_4-1770286771591.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_4-1770286771591.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_4-1770286771591.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Kishore_14_4-1770286771591.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F375657i7D87BC427FE4A955%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Kishore_14_4-1770286771591.png%22%20alt%3D%22Kishore_14_4-1770286771591.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CBR%20%2F%3E1.%20Does%20PEMicro%20debugger%20support%20S32K1xx%20secure%20debug%20unlock%3F%3CBR%20%2F%3E2.%20Is%20the%20secure%20debugging%20feature%20only%20available%20with%20S32%20debugger%20hardware%3F%3CBR%20%2F%3E3.%20If%20PEMicro%20supports%20it%2C%20how%20do%20we%20enable%20secure%20debugging%20options%20for%20S32K1xx%20with%20PEMicro%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2314004%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K144%20unlock%20Secure%20debug%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2314004%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F257154%22%20target%3D%22_blank%22%3E%40Kishore_14%3C%2FA%3E%2C%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E1.%20Does%20PEMicro%20debugger%20support%20S32K1xx%20secure%20debug%20unlock%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ENot%20as%20far%20as%20I'm%20aware.%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E2.%20Is%20the%20secure%20debugging%20feature%20only%20available%20with%20S32%20debugger%20hardware%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecure%20debugging%20is%20only%20available%20for%20S32G%2FR%2FZ%20devices.%20You%20can%20see%20that%20selecting%20the%20S32K144%20device%20disables%20the%20%22Secure%20debugging%22%20option%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Julin_AragnM_0-1770414322872.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Julin_AragnM_0-1770414322872.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Julin_AragnM_0-1770414322872.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Julin_AragnM_0-1770414322872.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F375950iB9334ABC2525221D%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Julin_AragnM_0-1770414322872.png%22%20alt%3D%22Julin_AragnM_0-1770414322872.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Julin_AragnM_1-1770414329536.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Julin_AragnM_1-1770414329536.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Julin_AragnM_1-1770414329536.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%22Julin_AragnM_1-1770414329536.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F375951iC7394A0CB96015F4%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Julin_AragnM_1-1770414329536.png%22%20alt%3D%22Julin_AragnM_1-1770414329536.png%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%20style%3D%22font-family%3A%20inherit%3B%22%3E3.%20If%20PEMicro%20supports%20it%2C%20how%20do%20we%20enable%20secure%20debugging%20options%20for%20S32K1xx%20with%20PEMicro%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CDIV%20id%3D%22bodyDisplay%22%20class%3D%22lia-message-body%20lia-component-message-view-widget-body%20lia-component-body-signature-highlight-escalation%20lia-component-message-view-widget-body-signature-highlight-escalation%22%3E%0A%3CDIV%20class%3D%22lia-message-body-content%22%3E%0A%3CP%3EIf%20they%20support%20any%20kind%20of%20scripts%2C%20you%20can%20ask%20their%20support%20page%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.pemicro.com%2Fsupport%2Findex.cfm%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EPEmicro%20Support%20Home%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3EHowever%2C%20as%20I've%20mentioned%2C%20you%20have%20two%20methods%3A%20backdoor%20key%20by%20the%20FTFC%20command%20or%20mass%20erase%20the%20whole%20chip%20(if%20mass%20erase%20is%20enabled).%3C%2FP%3E%0A%3CP%3EBest%20regards%2C%3CBR%20%2F%3EJuli%C3%A1n%3C%2FP%3E%0A%3C%2FDIV%3E%0A%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2314399%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K144%20unlock%20Secure%20debug%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2314399%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EHi%20Julian%2C%3C%2FP%3E%3CP%3EFollowing%20up%20on%20your%20previous%20response%20about%20%22backdoor%20key%20by%20FTFC%20command%22%20for%20S32K1xx%3A%3C%2FP%3E%3CP%3E%3CSTRONG%3E1.%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3EWhen%20you%20mention%20%22backdoor%20key%20by%20FTFC%20command%2C%22%20do%20you%20mean%20using%20the%20example%20project%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20title%3D%22%22%20href%3D%22vscode-file%3A%2F%2Fvscode-app%2Fc%3A%2FUsers%2F25020801%2FAppData%2FLocal%2FPrograms%2FMicrosoft%2520VS%2520Code%2Fresources%2Fapp%2Fout%2Fvs%2Fcode%2Felectron-browser%2Fworkbench%2Fworkbench.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20class%3D%22%22%3EExample_S32K144_Verify_Backdoor_Access_Key_S32DS1.3_v2%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eapproach%20with%20FTFC%20command%200x45%3F%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSTRONG%3E2.%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3BIf%20I'm%20using%20a%20different%20project%20(like%20a%20bootloader)%2C%20do%20I%20need%20to%20hardcode%20the%20backdoor%20key%20unlock%20code%20into%20every%20project%3F%3CBR%20%2F%3E%3CBR%20%2F%3EThanks.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2314977%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20S32K144%20unlock%20Secure%20debug%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2314977%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F257154%22%20target%3D%22_blank%22%3E%40Kishore_14%3C%2FA%3E%2C%3C%2FP%3E%0A%3CP%3E1.%20Yes.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E2.%20I'm%20not%20sure%20if%20I%20understood%20the%20question%20correctly.%26nbsp%3B%3CSPAN%3EThe%20FSEC%20register%20is%20a%20read-only%20register%20and%20is%20loaded%20with%20the%20content%20of%20the%20flash%20security%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Ebyte%20in%20the%20Flash%20Configuration%20Field%20located%20in%20program%20flash%20memory%20during%20the%20reset%20sequence.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3EThe%20configuration%20field%20holds%20the%20Backdoor%20comparison%20key%20as%20well%20and%20is%20configurable%20in%20startup_S32K1XX.S%20file.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIf%20you%20are%20referring%20to%20loading%20the%20key%20through%20FTFC%2C%20you%20can%20create%20a%20routine%20which%20receives%20the%20key%20through%20UART%2C%20CAN%2C%20SPI%2C%20etc.%20(except%20JTAG%2FSWD)%20and%20loads%20the%20key%2C%20thus%20un-securing%20the%20device%20and%20unlocking%20JTAG%2FSWD%20interface%20as%20well%20until%20the%20next%20reset.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EBest%20regards%2C%3CBR%20%2F%3EJuli%C3%A1n%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E