Achronix Bitporter Uživatelský manuál Strana 32

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 50
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 31
Picking a STAPL Action (-a option) Using the Achronix STAPL Player
PAGE 26
www.achronix.com Bitporter User Guide
STAPL Actions, JTAG, Secure Mode, and Encrypted Bitstreams
STAPL actions interact with the select ed device through the JTAG interface. To protect
designs, when an Achronix device is running in Secure Mode, any attempts to read device
data(excepttheIDCODE)throughtheJTAGportwillreturnallzeros.
Whengeneratinga*.jamSTAPLfilewithinACE,theusermaychoose
toencryptthebitstream
using the AES encryption scheme. (See the ACE User Guide (UG001) for more information.)
When the PROGRAM_ENCRYPTED action is run from a file containing an encrypted
bitstream, the device automatically enters Secure Mode, making subsequent JTAG reads
impossible.
The STAPL actions within a STAPL file are able to detect
whether the containing file
encapsulates an encrypted bitstream. Any STAPL action that requires the reading of data
throughtheJTAGinterfacewilleitherlogwarningsfortheuserorexitwitherrorswhenthe
actionisrunfromwithinafilecontaininganencryptedbitstream.
Note: OnceadeviceisinSecureMode,
theonlywaytoexitSecureModeistopowercyclethedevice.
ThismeansthatnoteventheERASEorPROGRAM_ENCRYPTEDactionswillsucceedonceadevice
isinSecureMode.
Procedures
STAPLactionsaremadeupofoneormoreSTAPLprocedurecalls(Table 43andTable 44).
Someoftheseprocedurescan be markedas OPTIONAL or RECOMMENDED,meaningthe
user can choose to include or exclude the specified procedure RECOMMENDED
procedures are called by default,but may be excluded
by the user; OPTIONAL procedures
are not called by defaultbut maybeincluded bythe user. Refer to EIA/JEDEC Standard 71
(JESD71),StandardTestandProgrammingLanguage(STAPL)forcompletedetails.
Note: STAPLiscaseinsensitive;theprocedurenameslistedinTable 43andTable 44areinall
capitalsforreadability.
Table 4-2: STAPL Actions Generated by ACE
Action Name Description
READ_IDCODE Returns the IEEE 1149.1 IDCODE of the target device.
PROGRAM
Programs the device with an unencrypted bitstream.
(1)
PROGRAM_ENCRYPTED
Programs the device with an encrypted bitstream.
(1)
VERIFY
Verifies the programming of the device.
(1)(2)
ERASE
Performs a bulk erase of the device.
(1)
READ
Reads the programming data of the device.
(1)
Notes:
1. This action is not supported when the connected device is already running in Secure Mode. See the
full action description for details.
2. This action is not supported for encrypted bitstreams. See the full action description for details.
Zobrazit stránku 31
1 2 ... 27 28 29 30 31 32 33 34 35 36 37 ... 49 50

Komentáře k této Příručce

Žádné komentáře