6 Bitstream File Configuration
UG290-2.3E
75(87)
6.2.5
Programming Flow
Figure 5-21 shows the flow of how to program or lock the AES key. All
the flows are based on JTAG protocol.
Check ID CODE
Check the device ID to determine whether the JTAG protocol works
properly and whether the programing object is correct to avoid
misoperation.
Figure 6-5 Prepare
Start
Check ID
Transmit Read ID
Command (0x11)
Read 32 Bits
ID match?
Stop
Yes
No
Yes
No
?
The '
?
' sign can be:
A
: To read AES key flow
B
: To program AES key flow
C
: To lock AES key or Set Key2 selected flow