Specifications
Page 22 Steps for Implementing a Secure Configuration Flow
Using the Design Security Features in Altera FPGAs June 2012 Altera Corporation
12. The Quartus II software message window provides information about the success
or failure of the key programming operation.
How to Perform Single-Device Volatile or Non-Volatile Key Programming
Using Quartus II Software with the Command-Line Interface
To perform single-device volatile or non-volatile key programming using the
Quartus II command-line interface through the EthernetBlaster, perform the
following steps:
1. Perform Step 1 of “How to Perform Single-Device Volatile or Non-Volatile Key
Programming Using Quartus II Software” on page 20.
2. To determine the EthernetBlaster cable port number that is connected to the JTAG
server, type quartus_jli -n at the command-line prompt.
3. With the single_ekp.jam file generated in “Step 1: Generate the .ekp File and
Encrypt Configuration File” on page 6, execute volatile or non-volatile key
programming to a single FPGA with the following command line:
■ Volatile key programming:
quartus_jli -c<n> single_ekp.jam -aKEY_CONFIGURE
■ Non-volatile key programming:
quartus_jli -c<n> single_ekp.jam -aKEY_PROGRAM
<
n
> is the port number returned with the -n option.
1 The Quartus II software command-line executable provides information about the
success or failure of the key programming operation.
f For more information about
quartus_jli
, refer to the Using the Command-Line
Executable in Quartus II Software section in AN425: Using Command-Line Jam STAPL
Solution for Device Programming.
Figure 21. Programming Options Window
Option for volatile or
non-volatile key programmin
g