6.5.3 Subsequent Runs

In subsequent runs, the application is used for encoding the firmware. Prior to encryption, the source file must be compiled, assembled and linked into one code segment file and/or one EEPROM segment file. Files must be of type Intel® hex.

A file name is given at the command prompt and an encrypted file will be generated according to data in the configuration file. For example:

create –c Config.txt –e EEPROM.hex –f Flash.hex –o Update.enc –l BLB11 BLB12

The application software and EEPROM data files will be combined into a single encrypted file.