CC2340R5: J-Link Unlock Procedure under Password Protection Mode

Part Number: CC2340R5
Other Parts Discussed in Thread: UNIFLASH

 While you pointed us to the relevant documentation, the manual process of switching APs and writing registers within the J-Link Commander environment is proving to be extremely *** and prone to error in real-world use.

To quickly validate the entire password authentication procedure and its expected behavior, could you please provide a simple operational guide using the official TI development kit (e.g., CCS or UniFlash with an XDS110 debugger) to perform the password authentication on CC2340?

If the official TI tools have a feature that handles this process automatically, it would serve as an effective validation benchmark. Once we confirm the correct authentication process using the official tools, I can then use them to validate my product and even explore the implementation of the same function using J-Link.

We look forward to your continued support. Thank you

  • Hi,

    We have received your post and the investigation will take some time. Thank you for your patience.

  • could you please provide a simple operational guide using the official TI development kit (e.g., CCS or UniFlash with an XDS110 debugger) to perform the password authentication on CC2340

    The best I could share with an NDA is a Tools Guideline and I don't think that will meet the requirement you are looking for.  OpenOCD has source available and supports SimpleLink F3 products in at the Zephyr release, this may be the best starting point from which you can further develop your SWD solution.  You can also contact J-Link concerning their debug tool processes.