User guide
25-12
Source Protection
Simulating Encrypted Models
When you simulate an encrypted model, information about
hierarchical names and design objects is protected. This means that
some CLI commands, such as those that display hierarchical names
and design objects at a specified level of the hierarchy, do not work
at protected levels of the design hierarchy. Protected levels are the
encrypted levels.
Certain system tasks continue to work in protected levels of the design
hierarchy but you need to know the hierarchical names in these
protected regions and there is no way, other than from the vendor
that encrypted the model, that you can obtain the hierarchical names
in protected levels.
The -Xman
compile-time option does not work in protected source
descriptions.
Using the CLI
Some CLI commands whose arguments are design objects or
instances do not work when these objects are in protected regions.
These CLI commands are:
Note:
The info command continues to display the simulation time.
info
scope show