The contents of the reference design downloaded are as follows:
Pre-generated public keys:
- psk0.pem (primary secret key)
- psk1.pem (primary secret key)
- ssk0.pem (secondary secret key)
- ssk1.pem (secondary secret key)
Pre-generated hash for two primary keys:
- hash_ppk0
- hash_ppk1
Source files needed to build lab application:
- key_revocation_lab_main.c
- key_revocation_lab_main.h
- key_revocation_lab_utils.c
- key_revocation_lab_utils.h
BIF_files sub-directory which contains the BIF files:
- non_secured.bif– Used to first boot the lab application for device provisioning.
- secured.bif– Used to boot after device is provisioned (PPK0, PPK1, and RSA_EN have been programmed).
- secured_mod– Used to boot when the default SPK_ID is modified for Zynq UltraScale+ MPSoC Standard Key Revocation.
- secured_eKeyR.bif– Used to boot to demonstrate Zynq UltraScale+ MPSoC Enhanced Key Revocation.
- secured_eKeyR_mod– Used to boot when User-eFUSE SPK ID is changed.
- secured_eKeyR_PPKr– Used to boot when PPK0 is revoked.