GM WORLDWIDE ENGINEERING STANDARDS
GMW3110
© Copyright 2010 General Motors All Rights Reserved
February 2010
Page 133 of 336
DeviceContol_Security_Level
ASSEMBLY_PLT
TesterPresent_Timer_State
ACTIVE
DevCtrl_Bad_Key_Counter
2
Send ($67 $04) message.
ENDIF
ENDIF
WHEN ((($Level > $0A)AND($Level < $FB)) AND ($Level MOD 2 = 1))
/* vehicle manufacturer specific - request seed */
WHEN ((($Level > $0A)AND($Level < $FB)) AND ($Level MOD 2 = 0))
/* vehicle manufacturer specific - send key */
WHEN ($Level
≥ $FB AND ($Level MOD 2 = 1))
/* system supplier specific - requestSeed*/
WHEN ($Level
≥ $FB AND ($Level MOD 2 = 0))
/* system supplier specific */
ENDSELECT
ELSE
send Negative Response ($7F $27 $12) /*Subfunction Not Supported-Invalid Format*/
ENDIF
ENDFUNCTION
The following logic is executed periodically (suggested execution rate = 100 ms.):
IF (Security_Delay_Timer > 0) THEN
Decrement the Security_Delay_Timer by the execution rate.
ENDIF
8.8.7 Node Verification Procedures.
8.8.7.1 General Procedures.
Procedure 1:
1. Send a security access request message with the sub-function parameter ($Level) equal to a value that is
not supported and verify $7F $27 $12 response.
2. If negative response code $78 is supported by the ECU, then create the conditions under which the ECU
should return the $7F $27 $78 response and verify that proper response is sent.
3. Repeat step 2 of this procedure for each possible reason an ECU would send the negative response with
response code $78. Verify this for each applicable supported sub-function parameter.
8.8.7.2 Verification Procedures for SPS Programming Security Levels ($01, $02).
The steps for Procedure
1 below shall be performed within 10 s of the ECU being powered up (executing operational software). For
Procedures 2 through 5 below, the verification procedures shall be performed after the ECU has been powered
up (executing operational software) for at least 10 s.
Procedure 1:
1. Within 10 s of power-up send a valid security access request message $01 to an ECU when its
vulnerability_flag !=$FF and its MEC = $00. Verify that the response is $7F $27 $37.
2. Repeat step 1 of this procedure periodically (approximately every 500 ms) and verify that the $7F $27 $37
response is sent each time until the ECU has been powered for 10 s.
3. Send a valid security access request message $01 within 10 s of power-up to an ECU when the
vulnerability_flag = $FF (if supported) and the MEC = $00. Verify the proper positive response message
$67 $01 $00 $00.
4. Send a valid security access request message $01 within 10 s of power-up to an ECU when the MEC >
$00 and the vulnerability_flag (if supported) is not set to $FF. Verify the proper positive response message
$67 $01 $00 $00.
--``,,``````,``,,``,,,`,`,`,,-`-`,,`,,`,`,,`---
CameraLoops.com
Do'stlaringiz bilan baham: |