This application note details on how to use the security-related eFUSEs to enable secure boot on a ZCU102 device (i.e., device provisioning). It also demonstrates how to perform key revocations for partitions/applications using SPK eFUSE (Zynq UltraScale+ standard key revocation) and User eFUSEs (Zynq UltraScale+ enhanced key revocation). Lastly, it demonstrates PPK revocation and the importance of caution while using this feature. The source code of this lab example can be studied to understand which APIs to use for security-related eFUSE programming, and users can modify the given example code according to their needs.
Important: Exercise extreme
caution while using this lab exercise. eFUSE programming is permanent and can lead to
the board being unusable if done carelessly.