General Specification Electrical Function gmw3110 General Motors Local Area Network Enhanced Diagnostic Test Mode Specification


GM WORLDWIDE ENGINEERING STANDARDS



Download 8,35 Mb.
Pdf ko'rish
bet218/406
Sana03.04.2022
Hajmi8,35 Mb.
#525939
1   ...   214   215   216   217   218   219   220   221   ...   406
Bog'liq
gmw3110

GM WORLDWIDE ENGINEERING STANDARDS 
GMW3110 
© Copyright 2010 General Motors All Rights Reserved 
February 2010 
Page 174 of 336 
ENDIF 
ENDFUNCTION 
8.14.7 Node Verification Procedure. 
Procedure 1: 
1. Send a $3B message for each $dataIdentifier supported including good data and verify positive response 
message (test data formatting). 
Procedure 2: 
1. Send a $3B message with an invalid $dataIdentifier parameter and verify the negative response ($7F $3B 
$31 - RequestOutOfRange). 
2. Send a $3B message with no data included after the Service Identifier and verify the negative response 
($7F $3B $12 - InvalidFormat). 
3. Send a $3B message with a valid dataIdentifier and an invalid number of data bytes after the dataIdentifier 
and verify the negative response ($7F $3B $12 - InvalidFormat). 
4. Repeat step 3 for each dataIdentifier supported. 
Procedure 3: 
(If ECU implements this RC_). 
1. Send a $3B message with a valid dataIdentifier and associated data bytes at a time when ECU internal 
conditions would not allow the data to be written (e.g., EEPROM failure) and verify that the ECU sends the 
correct negative response ($7F $3B $22 - ConditionsNotCorrect). 
Procedure 4: 
(If ECU supports secure DIDs).
 
1. Send a $3B message with a secured dataIdentifier and associated data bytes after the data - parameter to 
a secured ECU and verify the negative response ($7F $3B $31 - RequestOutOfRange). 
2. Send a $3B message with a secured dataIdentifier and associated data bytes after the dataIdentifier when 
the manufacturers enable counter > $00 or vulnerability flag = $FF and security has not been accessed 
(SecurityAccess ($27) request has not been sent)
 
and verify the negative response ($7F $3B $31 - 
RequestOutOfRange). 
3. Send a $3B message with a secured dataIdentifier and associated data bytes after the dataIdentifier when 
the manufacturers enable counter > $00 or vulnerability flag = $FF and security has been accessed 
(SecurityAccess ($27) request has been sent)
 
and verify the positive response (to unlock an ECU see 
SecurityAccess service). 
4. Repeat steps 1 and 2 for each DID that requires security. 

Download 8,35 Mb.

Do'stlaringiz bilan baham:
1   ...   214   215   216   217   218   219   220   221   ...   406




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish