Hi All,
I want you to tell about the structure of Secure JTAG.
By reading the document about i.MX6, I learned about Secure JTAG.
Is my understanding described in the above correct?
BR,
George
Solved! Go to Solution.
Hi George
Secure JTAG requires external debugger tools (such as Lauterbach Trace32,
ARM RVDS/DS5 Debuggers, etc.) that support the challenge/response-based authentication
mechanism and its usage is described in AN4686 Configuring Secure JTAG for the
i.MX 6 Series Family of Applications Processors. I think your understanding is correct.
Best regards
igor
-----------------------------------------------------------------------------------------------------------------------
Note: If this post answers your question, please click the Correct Answer button. Thank you!
-----------------------------------------------------------------------------------------------------------------------
Dear Igor,
Thank you for the reply.
I already read the document which you say.
However, we have not got yet debugger which can use the Security JTAG function.
And I am uneasy about whether our understanding is correct.
Can one key burned to eFUSE be used for all devices as a common key for JTAG access?
BR,
George
Hi George
sorry, I do not understand your question
Best regards
igor
Dear Igor
Is the following correct?
BR,
George
Hi George
key is symmetric.
Best regards
igor
Thanks.