All you ever wanted to know about checksum calculations


Oct 15, 2021

It is a well-known and good practice to use checksum calculation for verifying the image integrity in embedded systems. The image could easily be corrupted during the programming or in the transfer process for the remote update for example. You can use a checksum to verify that the image is the same at runtime as when the image’s original checksum was generated.

This process sounds simple and most of the development tools provide plain ways to work with checksum. However there are some choices that you must always consider and there are some choices to make like the memory range (or ranges) that you want to verify, which algorithm and size is most suitable in your case, specify which fill pattern to be used during calculation and finally define an explicit initial value.

Additionally, what kind of breakpoints can you use to avoid that the checksum calculation over a memory range fails and what about the locations where the checksum can be placed?

In our last webinar you will learn to cover all these matters and how to easily generate the checksum from the IDE or even command line and finally how to debug checksum calculations in the best way.

Watch on-demand webinar

죄송하지만, 이 콘텐츠는 한국어로 제공되지 않습니다.

당사 웹 사이트 중 한국어가 제공되는 않는 페이지는 기본적으로 영어로 제공됩니다. 보다 정확한 정보를 위해 영어로 제공되는 글로벌 웹 사이트를 방문하실 것을 권장합니다.

죄송하지만, 당사 사이트에서는 Internet Explorer를 지원하지 않습니다.보다 편안한 사이트를 위해 Chrome, Edge, Firefox 등과 같은 최신 브라우저를 사용해 주시길 부탁드립니다.