You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: dspic33a_secure_boot/README.md
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@
13
13
---
14
14
15
15
<br>
16
-
_Figure 1. - Curiosity Platform Development Board_<br><br>
16
+
_Figure 1. - dsPIC33A Curiosity Platform Development Board_<br><br>
17
17
18
18
<br>
19
19
_Figure 2. - dsPIC33AK512MPS512 Curiosity GP DIM_<br><br>
@@ -42,13 +42,13 @@ The associated bootloader and application projects demonstrate the following:
42
42
43
43
### Hardware
44
44
*[dsPIC33AK512MPS512 DIM (EV80L65A)](https://www.microchip.com/EV80L65A)
45
-
*[Curiosity Platform Development Board (EV74H48A)](https://www.microchip.com/en-us/development-tool/ev74h48a)
45
+
*[dsPIC33A Curiosity Platform Development Board (EV74H48A)](https://www.microchip.com/en-us/development-tool/ev74h48a)
46
46
* A USB-Type C cable (for powering the board)
47
47
48
48
## Running the Demo
49
49
50
50
### Hardware Setup
51
-
1. Insert the dsPIC33AK512MPS512 Curiosity GP Dim into the Curiosity DIM Connector.
51
+
1. Insert the dsPIC33AK512MPS512 Curiosity GP Dim into the dsPIC33A Curiosity DIM Connector.
52
52
2. Connect the USB-C cable to connector J24 of the Development Board to the host computer.
53
53
54
54
### Programming the Bootloader
@@ -516,7 +516,7 @@ Additional example application projects are included in this demo under the flas
516
516
517
517
### Flash Region Erase Examples
518
518
519
-
The examples within the flash_region_erase folder are intended to verify that an IRT region cannot be erased by non-IRT code and that the boot, executable, and keystore sections are locked to modification. By modifying the boot loader code, developers can verify that if these regions are not switched to "locked until next reset" or are not IRT enabled regions, they can be unlocked and modified.
519
+
The examples projects listed below are intended to verify that an IRT region cannot be erased by non-IRT code and that the boot, executable, and keystore sections are locked to modification. By modifying the boot loader code, developers can verify that if these regions are not switched to "locked until next reset" or are not IRT enabled regions, they can be unlocked and modified. These projects can be found in the flash_protection_examples folder.
@@ -544,7 +544,7 @@ Given the FIRT_IRT bit has been set and the projects are loaded via the firmware
544
544
545
545
### Flash Region Read Examples
546
546
547
-
The examples within the flash_region_read folder are intended to verify that an IRT region cannot be read by non-IRT code.
547
+
The examples projects below are intended to verify that an IRT region cannot be read by non-IRT code. They are located in the flash_protection_examples folder.
@@ -564,7 +564,7 @@ Given the FIRT_IRT bit has been set and the projects are loaded via the firmware
564
564
565
565
### Flash Region Execute Example
566
566
567
-
The example within the flash_region_execute folder is intended to verify that the IRT regions are fully protected and non-IRT user space cannot access IRT code.
567
+
The example project below is intended to verify that the IRT regions are fully protected and non-IRT user space cannot access IRT code. It is located in the flash_protection_examples folder.
568
568
569
569
* bootExecuteFlashProtection.X
570
570
* Jumps to an address in the IRT boot region from non-IRT user space.
0 commit comments