5628 - MachXO3L: What is the difference between "Security Program Password Key" and "Security Program Password Key with Lock" operations?
The 'Security Program Password Key' operation secures the sectors SRAM, CFG, and Feature Row only, the UFM is not protected and can be read anytime. Meanwhile, the 'Security Program Password Key' operation secures the sectors SRAM, CFG and Feature Row and UFM, the UFM is protected and cannot be read. These security features can be erased using the Key set in the device
Related Articles
5736 - MachX03: What is the difference between "Security Program Password Key" and "Security Program Password Key With Lock" in terms of Feature Row mapping?
The difference between "Security Program Password Key" and "Security Program Password Key With Lock" is that Security Program Password Key With Lock enables Secure PWD which is a bit that locks the feature row. For JTAG, the flow is: Send in 8 bits ...
7409 - [MachXO3] Lattice Diamond Programmer: Is feature row updated when programming password key?
Description: Lattice Diamond programmer programs the PWD enable bit to "1" on the feature row after shifting the password. This enables the security feature right after shifting the password.
7086 - MachXO3D: How to convert PEM file format to Public Key format and vice-versa.
Lattice "Pubkey Program" command is expecting to receive 64 bytes of raw Public Key. To get the raw Public Key from PEM file or vice versa, user can go to programmer tool -> advanced security key programming, load the desired Key format file, and the ...
534 - MachXO: Why can't I scan or program the MachXO device on the MachXO Mini board after I programmed my pattern into the device?
The MachXO JTAG pins on the MACHXO Mini board share the same traces with some generic IOs of the MachXO device (as shown on page 4 and page 2 of the schematic). If the new design patterns have signals driving out of these pins, they could potentially ...
3336 - MachXO2: what is the difference between "Flash erase, program, verify, secure" and "Flash erase, program, verify, secure plus"?
"FLASH Erase, Program, Verify, Secure" works as the following steps. 1. Erase the flash 2. Program the flash 3. Verify the flash 4. Secure the device by programming the Security bit This operation will secure the CFG Flash Sectors. For example, user ...