You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: IDE/XilinxSDK/README.md
+15-13Lines changed: 15 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,7 @@ A build settings template for Zynq UltraScale+ can be found here `./config/examp
28
28
```sh
29
29
$ cp ./config/examples/zynqmp.config .config
30
30
$ make keytools
31
+
$ make wolfboot.elf
31
32
```
32
33
33
34
These template settings are also in this `.cproject` as preprocessor macros. These settings are loaded into the `target.h.in` template by the wolfBoot `make`. If not using the built-in make then the following defines will need to be manually created in `target.h`:
@@ -201,33 +202,34 @@ Successfully ran Hello World application
* Scroll down to Supported Libraries and Check the xiskey library
212
222
* In the system.mss pane, scroll down to Libraries and click Import Examples.
213
223
* Check the xilskey_esfuseps_zynqmp_example
214
-
4. Edit `xilskey_efuseps_zynqmp_input.h`
224
+
5. Edit `xilskey_efuseps_zynqmp_input.h`
215
225
* 433 `#define XSK_EFUSEPS_WRITE_PPK0_HASH TRUE`
216
226
* 453 `#define XSK_EFUSEPS_PPK0_IS_SHA3 TRUE`
217
227
* 454 `#define XSK_EFUSEPS_PPK0_HASH "0000000000000000000000000000000000000000000000000000000000000000" /* from ppkf_hash.txt */`
218
-
5. Update boot.bif (see boot_auth.bif)
219
-
220
-
```
221
-
[auth_params] ppk_select=0; spk_id=0x00000000
222
-
[pskfile] pskf.pem
223
-
[sskfile] sskf.pem
224
-
authentication=rsa
225
-
```
226
228
227
229
6. Build “boot.bin” image:
228
230
* `bootgen -image boot_auth.bif -arch zynqmp -o i BOOT.BIN -w`
229
231
230
-
Note: During testing add `[fsbl_config] bh_auth_enable` to allow skipping of the eFuse check of the PPK hash. In production the RSA_EN eFuses must be blown to force checking of the PPK hash.
232
+
Note: During testing add `[fsbl_config] bh_auth_enable` to allow skipping of the eFuse check of the PPK hash. In production the `RSA_EN` eFuses must be blown to force checking of the PPK hash.
231
233
232
234
Note: To generate a report of a boot.bin use the `bootgen_utility` or after 2022.1 use `bootgen -read`:
0 commit comments