General Specification Electrical Function gmw3110 General Motors Local Area Network Enhanced Diagnostic Test Mode Specification



Download 8,35 Mb.
Pdf ko'rish
bet167/406
Sana03.04.2022
Hajmi8,35 Mb.
#525939
1   ...   163   164   165   166   167   168   169   170   ...   406
Bog'liq
gmw3110

 
((manufacturers enable counter > $00 or vulnerability flag = $FF), and security has been accessed 
(SecurityAccess ($27) request has been sent)).
 
1. Send a valid security access request message with $Level = $01. Verify the proper positive response 
($0000 seed if unlocked and non zero seed if locked). 
2. This step is performed when the seed in the above step is a non zero value. Send a valid security access 
request message $02 with a correct key and verify the proper positive response message. 
3. Verify that the device is now unsecured by attempting a secure mode and verifying the appropriate positive 
response. 
4. Send valid $3E message within P3
C
ms for 2 minutes. Then verify the device remains unsecured by 
attempting a secure service and verifying the appropriate positive response. 
5. Stop sending TesterPresent ($3E) messages. Verify that after P3
Cmax
ms without sending a $3E message 
the device is secured by requesting a secure service and verifying the appropriate negative response. 
Procedure 5: 
This procedure is to be performed when the ECU vulnerability flag is not $FF (if supported) and 
the MEC = 0.
 
1. Send a valid security access request message $01 and verify $67 $01 $seedMsb $seedLsb response. 
2. After step 1 is complete, send a security access request message with level $02 and an incorrect key. 
Verify $7F $27 $35 response. 
3. Repeat step 1 and 2 of this procedure and verify that the response from step 2 (the second level $02 
message) changes to $7F $27 $36. Then send a request for this service with $Level = $01 within 10 s and 
verify $7F $27 $37 message. 
4. After performing steps 1 through 3 of this procedure, verify that the ECU remains locked by attempting a 
secure service and verifying the correct negative response. 
8.8.7.3 Verification Procedures for Device Control Security Levels ($03, $04). 
The procedures below shall 
be followed if the ECU supports the Device Control security access levels ($03 and $04). The steps for 
Procedure 1 below shall be performed within 10 s of the ECU being powered up (executing operational 
software). For procedures 2 through 6 below, the verification procedures shall be performed after the ECU has 
been powered up (executing operational software) for at least 10 s. 
--``,,``````,``,,``,,,`,`,`,,-`-`,,`,,`,`,,`---
CameraLoops.com



Download 8,35 Mb.

Do'stlaringiz bilan baham:
1   ...   163   164   165   166   167   168   169   170   ...   406




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish