Just having a read of the boot loader documentation it becomes obvious that
unless you deliberately program some of the bytes just above 0xffe0, someone
could easily use the bootstrap Rx feature to download the MSP code, even after
the JTAG fuse has been blown to protect the software. Unless you were aware of
this, you would probably leave the area alone (unprogramed).

Someone attempting a reverse engineer of the code would easily guess that it
might be 0xFF, 0xFF ... 0xFF, and still the code from the device.

Cheers
Harry



-----Original Message-----
From: [email protected]
[mailto:[email protected]]on Behalf Of Garst R. Reese
Sent: Wednesday, September 10, 2003 2:19 PM
To: [email protected]
Subject: Re: [Mspgcc-users] Bootloader and Ramloader examples?

Check TI application notes: slaa103, slaa089A, slaa096B

[email protected] wrote:
>
> Hi,
>
> i have to code a ramloader, i. e. function in ram for updating the flash,
which has to load the new flash
> content only via RxD and TxD from an UART.
> I also have to code a bootloader which can update the flash above itself from
a storage card (MMC/SDC,
> connected via SPI to an UART). Therefore, and because at university i´ve never
heard details about coding
> such code, i´m looking for examples but TI has no examples.
>
> Can someone post links to examples or send me some examples?
>
> Regards
>
> Rolf F.
>
> -------------------------------------------------------
> This sf.net email is sponsored by:ThinkGeek
> Welcome to geek heaven.
> http://thinkgeek.com/sf
> _______________________________________________
> Mspgcc-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/mspgcc-users


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Mspgcc-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/mspgcc-users


Reply via email to