Symmetric Cryptographic Intel FPGA Hard IP User Guide

ID 714305
Date 12/19/2022
Public

A newer version of this document is available. Customers should click here to go to the newest version.

Document Table of Contents

5.1. Reset Sequencer

The reset sequencer manages soft and hard IP resets within the Symmetric Cryptographic IP core through the reset and reset acknowledgment signals.
Figure 10. Reset Sequencer Block Connections
The following steps describe the reset assertion flow:
  • The subsystem_cold_rst_n assertion resets the entire Symmetric Cryptographic IP core. Each of the soft and hard IP blocks observes the reset signal assertion.
  • The synchronous reset acknowledgment signal (rst_ack) asserts when the reset assertion has propagated through all of the logic.
  • Each of the soft and hard IP blocks assert a corresponding reset acknowledgement signal back to the Reset Sequencer.
  • The Reset Sequencer asserts the subsystem_cold_rst_ack_n signal to logic once the block receives the soft and hard IP blocks reset acknowledgement signals.
The following steps describe the reset deassertion flow:
  • The subsystem_cold_rst_n signal deassertion triggers the reset deassertion to the entire Symmetric Cryptographic IP core. Consequently, each of the soft and hard IP blocks observes the reset signal de-assertion.
  • The synchronous reset acknowledgment signal (rst_ack) deasserts when the reset deassertion propagated through all of the logic.
  • Each of the soft and hard IP blocks deassert a corresponding reset acknowledgement signal back to the Reset Sequencer.
  • The Reset Sequencer deasserts the subsystem_cold_rst_ack_n signal to logic once the block receives the soft and hard IP blocks reset acknowledgement signals from the soft and hard IP blocks.
Note: The Symmetric Cryptographic IP core keeps deasserting the ready signals on the AXI-ST and AXI-Lite interfaces until the AES/SM4 Inline Cryptographic Accelerator is fully out of reset and ready to accept the incoming packets.