User guide
25-8
Source Protection
CB75+Q/]R_IAP/>HS+b<XFP,-BHfcZTIG0-QILLIa1#.RbX6.K?Oc8f5]f);BW=Q
FVa@-^&@e+:K0>(?(&ZL:4Z:.F[<5J)gQ+CaA]^7\.N^/0@RRZQe-]A,Z+L>?FQG
([A0S=LXHPgN[<Dg5fQG?^6IUP7.VV3a@$
`endprotected
endmodule
The following is an example of the contents of the new source file
VCS creates when you run source protection with the
+auto3protect
option:
module top( inp, outp);
parameter size=8;
`protected
\,MGH?JR[D?0R_D#+XJ(MQD#HgXV@ZUVI2+HT)1OS)C8#L7OA[9ge#^#5@WO0P_<
,Y)[^ZVDDCBf<EB?2(=)>S#aSR58?]Qgg6\#OOf<^.+RK[6<#2&X>SZM:)F9>
VLf:FHRSd[QP=WCC\gA;=g5M=>PG5EDUaZ:#/If[CTXV9RKJNNOf]>Cfgg[4&W.f
=2FD]<,R0?@:B0R:?\4fP_dgaGgF_IB9MV#E1M?b2)Cd._<:&@,KV\a5:Q3D]CPL
[9HDe2.gQYL0;\_Y^V\a;_Ag-fP;+K\;GUU/:HXFf;gaGJ1fO8_f1M)eGF8LRRY]
CB75+Q/]R_IAP/>HS+b<XFP,-BHfcZTIG0-QILLIa1#.RbX6.K?Oc8f5]f);BW=Q
FVa@-^&@e+:K0>(?(&ZL:4Z:.F[<5J)gQ+CaA]^7\.N^/0@RRZQe-]A,Z+L>?FQG
([A0S=LXHPgN[<Dg5fQG?^6IUP7.VV3a@$
`endprotected
endmodule
Notice that parameter size is not encrypted but parameter stoptime is.
The following is an example of the contents of the new file VCS
creates when you run source protection with the +autoprotect
option:
module top
`protected
>Z.>B/)c?G.-UDVP<^?H0Yb_HSKg0>@UY0+-eY-/@YK^^Q3g+K6c\\5#ge+/8McF
WaK-/QI-?Gc^d8.))aeZ1gQBZbE_1.[U;1dVZ9b#.(A336;]&NM^GF,dR34)I]GZ
FEc-R?e1V3Mb1SUUB,J7R4[T\LZe?BDb#^@7/_5IAdM<(J.BN7\[<[^We?@JeVSf
FKC)D.#bB@C#L^I4(55SG>:SXgTL^&GCG<&&6bQO;;EG)S]2d7X6,U:,<:S:<<KM
=&<OWaR?Ef.SEQW;RKYD.F\Se&WE+ALI=PafD8b:T[4#gbK??IgJ@4c&0?#H]1:1
4HJ)e)G^U4:Y)^4@48:Gf:I6Ue)NG\JH:@fL5Q3?Gc+R)#)9f3g-cA(CM2fTf&(:
_+HVA=2@:MR&^=>5EbYF63a\/BQ71<H>\GMJe&,PIA&I_9O4fMd7#PNW1?KgK2UP
XbVJ+FB\;6IY)+QZQTBS<+f;c:YeOc7eI(G:cT#1&7E]Jda1^]]H@cNWM$
`endprotected
endmodule
In this file encryption begins after the module identifier instead of after
the port list.