SLAAEO4 November 2025 MSPM0G3507 , MSPM0L1306
When SWD access policy remains enabled, the user can further modify SWD debug policy through the BOOTCFG0.DEBUGACCESS field.
MSPM0 supports SWD enable, disable, and encryption with a 128-bit password. Device only verify the password during boot stage. The user generates a DSSM command for password authentication, which includes a reset behavior to unlock the SWD interface.
MSPM0 provide two types of password storage, plain text and SHA2-256 digest. Passwords are stored in the PWDDEBUGLOCK field. The plain text passwords are directly stored in NONMAIN, resulting in the risk of password leakage. The SHA2-256 digest storgae pattern does not directly store the 128-bit password in NONMAIN memory region. Instead, the user generates a 256-bit hash value from the 128-bit password and stores the hash value in the NONMAIN, which enhances the security of the password storage.
Below is how the user generates and sets a SHA2-256 digest password:
The flow is designed for all 256-bit SHA2-256 digest password generation if device supports, including:
Section 4.2 shows how to set the password using the SysConfig tool. Section 6.3 shows how to unlock device using the CCS tool.