User manual

Table Of Contents
Zynq-7000 AP SoC Technical Reference Manual www.xilinx.com 766
UG585 (v1.11) September 27, 2016
Chapter 32: Device Secure Boot
A device secure boot involves several systems contained within the AP SoC device. The secure boot
process is always initiated by the BootROM. If RSA authentication has been enabled the BootROM will
use the public key to authenticate the first stage boot loader (FSBL) before it is decrypted or executed.
If the boot image header indicates a secure boot, the BootROM enables the AES and HMAC engines
which reside in the PL. The encrypted FSBL is then sent by the BootROM to the AES and HMAC, a
hardened core within the PL, via the processor configuration access port (PCAP). The FSBL image is
decrypted and sent back to the PS via the PCAP where it is loaded into the on-chip RAM (OCM) for
execution. The PS is then able to securely configure the PL by sending an encrypted bitstream
through the PCAP to the AES/HMAC for decryption, authentication, and distribution to the PL
memory cells.
X-Ref Target - Figure 32-1
Figure 32-1: Secure Boot Block Diagram
CPU0
CPU1
AXI Top Switch
Configuration File 1
Secure FSBL
RSA authenticated,
AES encrypted
with SHA-256 HMAC)
NAND
NOR
QSPI
IOP
On-Chip
RAM
DDR
Memory
Controller
MDDR
FIFO
Secure
Vault
Processing System
Zynq-7000 AP SoC
Programmable Logic
Common Boot Path
PS Boot Path
PL Configuration Path
Step 1: Power applied, BootROM begins
execution
Step 2: (Optional) RSA authentication
performed on encrypted FSBL
Step 3: FSBL decryption (AES) and
authentication (HMAC)
Step 4: Decrypted, authenticated FSBL
stored in OCM
Step 5: (Optional) PL configuration
Secure Boot Process
JTAG
DAP
Device Key
AXI
FIFO
eFuse/BBRAM
Security
AES HMAC
PCAP
Device
Configuration
Block
ROM
Step 1
Mode_Mode MIO pins
PL
UG585_c33_01_052913
Step 3 Step 4
Step 5