General Specification Electrical Function gmw3110 General Motors Local Area Network Enhanced Diagnostic Test Mode Specification


GM WORLDWIDE ENGINEERING STANDARDS



Download 8,35 Mb.
Pdf ko'rish
bet166/406
Sana03.04.2022
Hajmi8,35 Mb.
#525939
1   ...   162   163   164   165   166   167   168   169   ...   406
Bog'liq
gmw3110

GM WORLDWIDE ENGINEERING STANDARDS 
GMW3110 
© Copyright 2010 General Motors All Rights Reserved 
February 2010 
Page 134 of 336 
Procedure 2: 
This procedure is to be performed twice, once while the ECU is secured (manufacturers enable 
counter = $00, vulnerability flag < $FF, and security has not been accessed (SecurityAccess ($27) request has 
not been sent)) and once when the ECU is unsecured ((manufacturers enable counter > $00 or vulnerability 
flag = $FF), and security has been accessed (SecurityAccess ($27) request has been sent)).
 
1. Send a security access request message $01 with an incorrect number of data bytes and verify $7F $27 
$12 response. 
2. Send a security access request message $02 without sending a security access request message $01 and 
verify $7F $27 $22. 
3. Send a valid security access request message $01 and verify the security access positive response 
message $01. Then send a request message $02 with an incorrect number of data bytes and verify the 
$7F $27 $12 response (only perform this step when the seed response to the level $01 request is a non 
zero seed). 
Procedure 3: 
This procedure is to be performed while the ECU is unsecured
 
((manufacturers enable counter 
> $00 or vulnerability flag = $FF), and security has been accessed (SecurityAccess ($27) request has been 
sent)).
 
1. Send a valid security access request message $01 with the device already unsecured and verify $67 $01 
$00 $00 response. 
2. Repeat step 1 of this procedure and then send a security access request message with level $02. Verify 
$7F $27 $22 response. 
3. After performing steps 1 and 2 of this procedure, verify that the ECU remains unsecured by attempting a 
secure service and verifying the correct positive response. 
Procedure 4: 
The steps in this procedure are to be performed sequentially. This procedure is to be performed 
twice, once while the ECU is secured (manufacturers enable counter = $00, vulnerability flag < $FF, and 
security has not been accessed (SecurityAccess ($27) request has not been sent)) and once while the ECU is 
unsecured

Download 8,35 Mb.

Do'stlaringiz bilan baham:
1   ...   162   163   164   165   166   167   168   169   ...   406




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish