Why is my FPGA not working correctly when programmed with a POF file?

AI Thread Summary
The discussion revolves around issues encountered when programming an FPGA with a POF file, which successfully programs but does not function according to the intended logic, unlike the SOF file. Key points include inquiries about the target board—whether it's a proven developer's kit or a custom design—and the user's experience level with FPGA projects. There is also a question regarding the programming method, specifically if JTAG is being used. A reference to an Intel FPGA forum is provided for further insights on the differences between SOF and POF files, highlighting the need for clarity in responses to troubleshooting questions.
core7916
Messages
71
Reaction score
3
TL;DR Summary
failed to program the pof file
Hello,
i am programming my fpga with certain logic. With the sof file the logic is working fine and correct. but when i am programming pof file i am getting error. (programming is successful, but doesn't work as per the logic).
 
Technology news on Phys.org
core7916 said:
TL;DR Summary: failed to program the pof file

(programming is successful, but doesn't work as per the logic).
What is your target board? Is it a developer's kit board (that is a proven design), or is it your own design that you are bringing up for the first time? Is this your first FPGA project, or have you been successful with such projects in the past?

Are you programming via JTAG? Perhaps this discussion at the Intel FPGA forum can be of help:

https://community.intel.com/t5/Programmable-Devices/SOF-and-POF-difference/td-p/225759
 
thank you
 
core7916 said:
thank you
"Thank you" isn't an answer to the questions that @berkeman asked...
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
Back
Top