
An example bootloader using the 16-bit MCC bootloader and the CAN or CAN-FD peripheral on the dsPIC33 Touch CAN LIN Curiosity Development board demonstrating the following:
- Immutable secure boot via CodeGuard
- A/B type bootloading with Flash partitioning to support two firmware images and anti-roll back
- Secure boot authentication via ECDSA signature verification
- Secure firmware update via CAN-FD
- Crypto acceleration via TA100
- (Optional) Permanent flash memory locking via ICSP inhibit
See secure_boot_and_secure_firmware_upgrade_over_canfd and the associated README.md files for details on the required hardware, software, setup, and how to run the demo.
An example bootloader using the Microchip Device Firmware Update (MDFU) protocol and UART peripheral on the dsPIC33A Curiosity Platform Development Board with a dsPIC33AK128MC106 DIM demonstrating the following:
- Secure firmware update via UART using Microchip Device Firmware Update (MDFU) protocol
- Application verification checking using a 32-bit CRC-32Q signature
- dsPIC33AK128MC106 DIM (EV02G02A)
- dsPIC33A Curiosity Platform Development Board (EV74H48A)
- MDFU Protocol
See dspic33a_bootloader_and_firmware_upgrade_demo and the associated README.md files for details on the required hardware, software, setup, and how to run the demo.