You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The S32K1xx test application (`test-app/app_s32k1xx.c`) provides a feature-rich demo application for testing wolfBoot functionality.
@@ -3141,77 +3107,38 @@ Copyright 2025 wolfSSL Inc.
3141
3107
Firmware Version: 1
3142
3108
3143
3109
=== Partition Information ===
3144
-
Boot Partition @ 0xC000:
3110
+
Boot Partition:
3111
+
Address: 0x0000C000
3145
3112
Version: 1
3146
-
State: SUCCESS (0x00)
3147
-
Update Partition @ 0x25000:
3148
-
Version: 0 (empty)
3149
-
State: (no trailer)
3113
+
State: SUCCESS
3114
+
Update Partition:
3115
+
Address: 0x00025000
3116
+
Version: 0
3117
+
State: SUCCESS
3118
+
Swap Partition:
3119
+
Address: 0x0003E000
3120
+
Size: 2048 bytes
3150
3121
3151
3122
=== Keystore Information ===
3152
-
Number of keys: 1
3153
-
Key 0: ECDSA P-256 (secp256r1), SHA-256
3123
+
Number of public keys: 1
3124
+
Hash: SHA-256
3125
+
3126
+
Key #0:
3127
+
Algorithm: ECDSA P-256 (secp256r1)
3128
+
Size: 64 bytes
3129
+
Data:
3130
+
9a 33 e0 18 24 4b a7 29 51 90 15 f0 74 6e e4 a6
3131
+
bf 2d 00 47 32 1f 32 5a d6 9a 30 32 d1 c3 30 3f
3132
+
0a e3 1b 0d 0f 98 b2 e6 5c eb 42 1c 64 2b 32 db
3133
+
a4 48 75 5b e3 49 94 45 12 64 e3 57 b4 5b 81 73
3154
3134
3155
3135
Type 'help' for available commands.
3156
3136
3157
3137
cmd>
3158
3138
```
3159
3139
3160
-
**Testing Firmware Update:**
3161
-
3162
-
1. Flash with v2 image: `./tools/scripts/nxp-s32k142-flash.sh --test-update`
3163
-
2. Connect to UART: `picocom -b 115200 /dev/ttyACM1`
3164
-
3. Run `status` to verify v1 in boot, v2 in update
3165
-
4. Run `trigger` to set update flag
3166
-
5. Run `reboot` to start update
3167
-
6. After reboot, LED changes from Green (v1) to Blue (v2)
3168
-
7. Run `success` to mark v2 as good
3169
-
3170
-
### NXP S32K1XX: Flash Configuration Field (FCF)
3171
-
3172
-
The bootloader includes the Flash Configuration Field (FCF) at address 0x400-0x40F with the following settings:
3173
-
- Flash security: Unsecured
3174
-
- Flash protection: All regions unprotected
3175
-
- Backdoor key access: Enabled
3176
-
3177
-
**CRITICAL WARNING:** The FCF region at 0x400-0x40F controls device security settings. Writing incorrect values can **permanently lock the device**, making it irrecoverable. The wolfBoot HAL includes protection to prevent accidental writes to this region.
3178
-
3179
-
### NXP S32K1XX: Recovering a Locked/Unresponsive Device
3180
-
3181
-
If your S32K device becomes locked or unresponsive (e.g., stuck in reset with D1 LED illuminated on S32K-EVB boards), try these recovery procedures:
3182
-
3183
-
**Symptoms of a locked device:**
3184
-
- Debugger cannot connect ("Soft reset failed", "Failed to enter debug mode")
3185
-
- Device stuck in reset (D1 LED constantly on for S32K-EVB)
3186
-
- J-Link reports "Readout protection is set" at address 0x400-0x40F
0 commit comments