Repostiory containing DAPLink source code with Reset Pin workaround for HANI_IOT board.

Upstream: https://github.com/ARMmbed/DAPLink

Revision:
0:01f31e923fe2
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/source/family/freescale/target_reset_rapid_iot.c	Tue Apr 07 12:55:42 2020 +0200
@@ -0,0 +1,142 @@
+/**
+ * @file    target_reset.c
+ *
+ * DAPLink Interface Firmware
+ * Copyright (c) 2009-2019, ARM Limited, All Rights Reserved
+ * SPDX-License-Identifier: Apache-2.0
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License"); you may
+ * not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include "swd_host.h"
+#include "info.h"
+#include "target_config.h"
+#include "target_family.h"
+
+#define MDM_STATUS  0x01000000
+#define MDM_CTRL    0x01000004
+#define MDM_IDR     0x010000fc
+#define MDM_ID_K64  0x001c0000 // K64
+#define MDM_ID_KW4  0x001c0020 // KW4
+
+/* Kinetis series ID */
+#define K_SERIES     0
+#define KW_SERIES    5
+
+/* KW4 subfamily defines */
+#define KW40         0
+#define KW41         1
+
+static uint8_t target_unlock_sequence(void)
+{
+    uint32_t val;
+
+    // read the device ID
+    if (!swd_read_ap(MDM_IDR, &val)) {
+        return 0;
+    }
+    /*
+    // verify the result
+    if (val != mdm_id) {
+        return 0;
+    }
+    */
+
+    if (!swd_read_ap(MDM_STATUS, &val)) {
+        return 0;
+    }
+
+    // flash in secured mode
+    if (val & (1 << 2)) {
+        // hold the device in reset
+        swd_set_target_reset(1);
+
+        // write the mass-erase enable bit
+        if (!swd_write_ap(MDM_CTRL, 1)) {
+            return 0;
+        }
+
+        while (1) {
+            // wait until mass erase is started
+            if (!swd_read_ap(MDM_STATUS, &val)) {
+                return 0;
+            }
+
+            if (val & 1) {
+                break;
+            }
+        }
+
+        // mass erase in progress
+        while (1) {
+            // keep reading until procedure is complete
+            if (!swd_read_ap(MDM_CTRL, &val)) {
+                return 0;
+            }
+
+            if (val == 0) {
+                break;
+            }
+        }
+    }
+
+    return 1;
+}
+
+// Check Flash Configuration Field bytes at address 0x400-0x40f to ensure that flash security
+// won't be enabled.
+//
+// FCF bytes:
+// [0x0-0x7]=backdoor key
+// [0x8-0xb]=flash protection bytes
+// [0xc]=FSEC:
+//      [7:6]=KEYEN (2'b10 is backdoor key enabled, all others backdoor key disabled)
+//      [5:4]=MEEN (2'b10 mass erase disabled, all other mass erase enabled)
+//      [3:2]=FSLACC (2'b00 and 2'b11 factory access enabled, 2'b01 and 2'b10 factory access disabled)
+//      [1:0]=SEC (2'b10 flash security disabled, all other flash security enabled)
+// [0xd]=FOPT
+// [0xe]=EEPROM protection bytes (FlexNVM devices only)
+// [0xf]=data flash protection bytes (FlexNVM devices only)
+//
+// This function checks that:
+// - FSEC does not disable mass erase or secure the device.
+//
+static uint8_t security_bits_set(uint32_t addr, uint8_t *data, uint32_t size)
+{
+    const uint32_t fsec_addr = 0x40C;
+
+    if ((addr <= fsec_addr) && (addr + size) > fsec_addr) {
+        uint8_t fsec = data[fsec_addr - addr];
+
+        // make sure we can unsecure the device or dont program at all
+        if ((fsec & 0x30) == 0x20) {
+            // Dont allow programming mass-erase disabled state
+            return 1;
+        }
+
+        // Security is OK long as we can mass-erase (comment the following out to enable target security)
+        if ((fsec & 0x03) != 0x02) {
+            return 1;
+        }
+    }
+
+    return 0;
+}
+
+
+const target_family_descriptor_t g_nxp_rapid_iot = {
+    .family_id = kNXP_RapidIot_FamilyID,
+    .default_reset_type = kHardwareReset,
+    .target_unlock_sequence = target_unlock_sequence,
+    .security_bits_set = security_bits_set,
+};