01-23-2019 03:56 AM
01-29-2019 10:49 AM
No one is going to help,
This is proprietatary information, and would aid those attacking the device, or those trying to design their own.
Trade secrets.
l.e.o.
01-23-2019 08:28 PM
Hello,
I recommend viewing XAPP1175 / XAPP1084 and the associated reference links for more detailed information. It should explain BBRAM and the eFuses(PL & PS) as well as your question about its "sizes" and much more. These are not really user accessible memory in a general sense and are meant for secure boot for tamper resistant designs/applications.
Regards,
T
01-28-2019 08:41 PM
Hello,
Thanks for the answer, however I couldn't find the size info in those documents.
Regards,
Dosto
01-29-2019 09:52 AM - edited 01-29-2019 09:52 AM
There is a table right in one of the Xapps breaking it down... BBRAM and eFUSE strore encryption keys of size 256-bits. The PS eFuse/RSA is a little bit more complicated and I recommend viewing chapter 32: Device Secure Boot of the Zynq TRM for more info. Should give you much more detail and understainding about the secure boot process and how the RSA keys play into it.
Regards,
T
01-29-2019 10:49 AM
No one is going to help,
This is proprietatary information, and would aid those attacking the device, or those trying to design their own.
Trade secrets.
l.e.o.
01-29-2019 08:48 PM
Thanks for the help,
I saw that table. However, I couldn't be sure; the exact size is not crystal clear IMHO. Anyway, we know their lower bounds; they must be capable of holding at least 256 bit data. lowearthorbit seems right, so I won't dig into further.
Regards,
Dosto