Skip to content

Commit 43862f5

Browse files
committed
Minor documentation fixes.
1 parent 07dd56e commit 43862f5

File tree

2 files changed

+10
-5
lines changed

2 files changed

+10
-5
lines changed

IDE/XilinxSDK/README.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ Successfully ran Hello World application
214214
4. Edit `xilskey_efuseps_zynqmp_input.h`
215215
* 433 `#define XSK_EFUSEPS_WRITE_PPK0_HASH TRUE`
216216
* 453 `#define XSK_EFUSEPS_PPK0_IS_SHA3 TRUE`
217-
* 454 `#define XSK_EFUSEPS_PPK0_HASH "0000000000000000000000000000000000000000000000000000000000000000" /* from ppkf_hash.txt */``
217+
* 454 `#define XSK_EFUSEPS_PPK0_HASH "0000000000000000000000000000000000000000000000000000000000000000" /* from ppkf_hash.txt */`
218218
5. Update boot.bif (see boot_auth.bif)
219219

220220
```
@@ -297,7 +297,7 @@ Example .bif that includes the PUF helper data and black key/iv. This enables th
297297
the_ROM_image:
298298
{
299299
// Boot Header Authentication Enable
300-
[fsbl_config] a53_x64, bh_auth_enable, puf4kmode, shutter=0x0100005E, pufhd_bh, auth_only
300+
[fsbl_config] a53_x64, bh_auth_enable, puf4kmode, shutter=0x0100005E, pufhd_bh
301301
[keysrc_encryption] bh_blk_key
302302
[puf_file] helperdata.txt
303303
[bh_key_iv] black_iv.txt
@@ -310,7 +310,7 @@ the_ROM_image:
310310
[pskfile] pskf.pem
311311
[sskfile] sskf.pem
312312
313-
[bootloader, authentication=rsa, destination_cpu=a53-0] zynqmp_fsbl.elf
313+
[bootloader, authentication=rsa, encryption=aes, destination_cpu=a53-0] zynqmp_fsbl.elf
314314
[destination_cpu=pmu, authentication=rsa] pmufw.elf
315315
[destination_device=pl, authentication=rsa] system.bit
316316
[destination_cpu=a53-0, authentication=rsa, exception_level=el-3, trustzone] bl31.elf
@@ -320,6 +320,11 @@ the_ROM_image:
320320
}
321321
```
322322

323+
Generated BOOT.BIN using: `bootgen -image bootgen.bif -arch zynqmp -o BOOT.BIN -w -p xzcu9eg`
324+
325+
This will create an encryption key file `zynqmp_fsbl.nky`.
326+
327+
323328
### CSU JTAG Enable
324329

325330
When RSA authentication is enabled the JTAG feature is disabled in the PMU. To re-enable it (assuming eFuse allows it) build with `CFLAGS_EXTRA+=-DDEBUG_CSU=2` and apply the PMUFW patches below.

src/tpm.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1245,8 +1245,8 @@ void wolfBoot_tpm2_deinit(void)
12451245
TPMA_SESSION_continueSession));
12461246
if (rc == 0) {
12471247
/* Change platform auth to random value, to prevent application
1248-
* from being able to use platform hierarchy. This is defined in
1249-
* section 10 of the TCG PC Client Platform specification. */
1248+
* from being able to use platform hierarchy. This is defined in
1249+
* section 10 of the TCG PC Client Platform specification. */
12501250
rc = wolfTPM2_ChangePlatformAuth(&wolftpm_dev, &wolftpm_session);
12511251
}
12521252
if (rc != 0) {

0 commit comments

Comments
 (0)