Syntax
- For Zynq devices and Zynq UltraScale+ MPSoC:
[encryption = <options>] <partition>
- For
Versal®
ACAP:
{ encryption = <options>, file = <filename> }
Description
This specifies the partition needs to be encrypted. Encryption algorithms are:
Arguments
- none: Partition not encrypted. This is the default value.
- aes: Partition encrypted using AES algorithm.
Example
- For Zynq devices and Zynq UltraScale+ MPSoC:
all: { [aeskeyfile] test.nky [bootloader, encryption=aes] fsbl.elf [encryption=aes] hello.elf }
- For
Versal®
ACAP:
all: { id_code = 0x04ca8093 extended_id_code = 0x01 id = 0x2 metaheader { encryption = aes, keysrc = bbram_red_key, aeskeyfile = efuse_red_metaheader_key.nky, } image { name = pmc_subsys, id = 0x1c000001 partition { id = 0x01, type = bootloader, encryption = aes, keysrc = bbram_red_key, aeskeyfile = bbram_red_key.nky, file = plm.elf } partition { id = 0x09, type = pmcdata, load = 0xf2000000, aeskeyfile = pmcdata.nky, file = pmc_data.cdo } } image { name = lpd, id = 0x4210002 partition { id = 0x0C, type = cdo, encryption = aes, keysrc = bbram_red_key, aeskeyfile = key1.nky, file = lpd_data.cdo } partition { id = 0x0B, core = psm, encryption = aes, keysrc = bbram_red_key, aeskeyfile = key2.nky, file = psm_fw.elf } } image { name = fpd, id = 0x420c003 partition { id = 0x08, type = cdo, encryption = aes, keysrc = bbram_red_key, aeskeyfile = key5.nky, file = fpd_data.cdo } } }