Reference Design Contents

Key Revocation Lab (XAPP1344)

Document ID
XAPP1344
Release Date
2022-03-14
Revision
v1.1 English

The contents of the reference design downloaded are as follows:

Pre-generated public keys:

  • psk0.pem (primary secret key)
  • psk1.pem (primary secret key)
  • ssk0.pem (secondary secret key)
  • ssk1.pem (secondary secret key)

Pre-generated hash for two primary keys:

  • hash_ppk0
  • hash_ppk1

Source files needed to build lab application:

  • key_revocation_lab_main.c
  • key_revocation_lab_main.h
  • key_revocation_lab_utils.c
  • key_revocation_lab_utils.h

BIF_files sub-directory which contains the BIF files:

  • non_secured.bif– Used to first boot the lab application for device provisioning.
  • secured.bif– Used to boot after device is provisioned (PPK0, PPK1, and RSA_EN have been programmed).
  • secured_mod– Used to boot when the default SPK_ID is modified for Zynq UltraScale+ MPSoC Standard Key Revocation.
  • secured_eKeyR.bif– Used to boot to demonstrate Zynq UltraScale+ MPSoC Enhanced Key Revocation.
  • secured_eKeyR_mod– Used to boot when User-eFUSE SPK ID is changed.
  • secured_eKeyR_PPKr– Used to boot when PPK0 is revoked.