Visible to Intel only — GUID: ptk1611349849011
Ixiasoft
Visible to Intel only — GUID: ptk1611349849011
Ixiasoft
5.5. Using Design Security Features with Remote System Update
Building RSU Images with .sof Files
If you are storing private keys on your local filesystem, you may generate RSU images with design security features using a simplified flow with .sof files as inputs. To generate RSU images with the .sof file, you may follow the instructions in Section Generating Remote System Update Image Files Using the Programming File Generator of the Intel Agilex® 7 Configuration User Guide. For every .sof file specified on the Input Files tab, click the Properties... button and specify the appropriate settings and keys for the signing and encryption tools. The programming file generator tool automatically signs and encrypts factory and application images while creating the RSU programming files.
Alternatively, if you are storing private keys in an HSM, you must use the quartus_sign tool and therefore use .rbf files. The rest of this section details the changes in the flow to generate RSU images with .rbf files as inputs. You must encrypt and sign .rbf format files prior to selecting them as input files for RSU images; however, the RSU boot info file must not be encrypted and instead only be signed. The Programming File Generator does not support modifying properties of .rbf format files.
The following examples demonstrate the necessary modifications to the commands in Section Generating Remote System Update Image Files Using the Programming File Generator of the Intel Agilex® 7 Configuration User Guide.
Generating the Initial RSU Image Using .rbf Files: Command Modification
From Generating the Initial RSU Image Using .rbf Files section, modify the commands in Step 1. to enable the design security features as desired using instructions from earlier sections of this document.
For example, you would specify a signed firmware file if you were using firmware co-signing, then use the Quartus encryption tool to encrypt each .rbf file, and finally use the quartus_sign tool to sign each file.
quartus_pfg -c factory.sof boot.rbf -o rsu_boot=ON \ -o fw_source=signed_agilex.zip
After you create the boot info .rbf file, use the quartus_sign tool to sign the .rbf file. You must not encrypt the boot info .rbf file.
Generating an Application Image: Command Modification
quartus_pfg -c cosigned_fw_signed_encrypted_application.rbf \ secured_rsu_application.rpd -o mode=ASX4 -o bitswap=ON
Generating a Factory Update Image: Command Modification
quartus_pfg -c cosigned_fw_signed_encrypted_factory.rbf \ secured_rsu_factory_update.rpd \ -o mode=ASX4 -o bitswap=ON -o rsu_upgrade=ON \ -o fw_source=signed_agilex.zip
Did you find the information on this page useful?
Feedback Message
Characters remaining: