Specifications

Page 24 Steps for Implementing a Secure Configuration Flow
Using the Design Security Features in Altera FPGAs June 2012 Altera Corporation
4. Click Start to program the key (Figure 23).
1 The Quartus II software message window provides information about the
success or failure of the key programming operation.
How to Perform Multi-Device Volatile or Non-Volatile Key Programming Using
Quartus II Software with the Command-Line Interface
To perform multi-device volatile or non-volatile key programming using the
Quartus II software command-line interface through the EthernetBlaster, perform the
following steps:
1. Perform Step 1 of “How to Perform Single-Device Volatile or Non-Volatile Key
Programming Using Quartus II Software” on page 20.
2. To determine the EthernetBlaster cable port number that is connected to the JTAG
server, type quartus_jli -n at the command-line prompt.
3. With the multi_ekp.jam file generated in “Step 1: Generate the .ekp File and
Encrypt Configuration File” on page 6, execute volatile or non-volatile key
programming for multiple FPGAs with the following command-line:
Volatile key programming:
quartus_jli -c<n> multi_ekp.jam -aKEY_CONFIGURE
Non-volatile key programming:
quartus_jli -c<n> multi_ekp.jam -aKEY_PROGRAM
<n>
is the port n umber returned with the -n option.
1 The Quartus II software command-line interface provides information
about the success or failure of the key programming operation.
Figure 23. Multi-Device Key Programming with .jam Files
Click Start to
program the key
Highlight the file and click
Program/Configure