|
发表于 2009-8-2 12:24:07
|
显示全部楼层
6280 trusted boot问题讨论,
小弟正在做高通芯片方案的预研,由于资料少,以前也没有用过高通的方案,很多问题整不清楚,
请用过高通方案的dx不吝指教,
1. The boot sequencer takes ARM out of reset and makes ARM to start execution from
0xFFFF0000.
2. ARM executes the primary boot loader residing in BOOT ROM, starting at 0xFFFF0000.
这个PBL(primary boot loader) 要自己写吗,还是高通的芯片里内带的?////这个是高通提供的,而且不会给你提供原代码
3. The primary boot loader instruct the NAND Controller to use:
□ 8-bit NAND mode if BOOT_MODE2 = 0,
□ 16-bit NAND mode if BOOT_MODE2 = 1,
4. The primary boot loader performs auto-detection of NAND page size (512 vs. 2k), as well as
NAND type (NAND vs. SuperAND).
5. The primary boot loader copies config data from NAND to IMEM.
6. The primary boot loader hashes the secondary boot loader in ARM and copies it to SDRAM.
那这个SBL(secondary boot loader)要自己写吗,还是高通的芯片里内带的? //OEMLSBL QCSB都有原代码,开发者可以修改部分代码
7. The primary boot loader performs 3 RSA calculations in ARM.
a. Performs RSA decrypt on secondary signature and extracts hash.
b. Compares extracted hash with original.
c. Hashes attestation certificate and compares against RSA decrypt on the signature.
d. Hashes intermediate certificate and compares against RSA decrypt on the signature.
从PBL 对SBL 做的这几步来看,应该是个 SHA+RSA数字签名的解密验证过程,
那密钥是要我们自己生成写进去呢,还是要高通提供的? 如果是高通提供的,那启不是不能改动SBL了?///这个在编译过程中会自动生成对开发者来说这个可以忽略。
8. The primary boot loader transfers control to the secondary boot loader.
9. The secondary boot loader hashes AMSS using SHA-1 accelerator (resides in Crypto Engine)
and copies it to SDRAM/SRAM.
10. The secondary boot loader performs 3 RSA calculations in ARM.
a. Performs RSA decrypt on secondary signature and extracts hash.
b. Compares extracted hash with original.
c. Hashes attestation certificate and compares against RSA decrypt on the signature.
d. Hashes intermediate certificate and compares against RSA decrypt on the signature.
SBL对主机软件的解密验证也是一样, 我不明白这么复杂的启动过程是为了什么,是为了防止有人抄里面的程序吗?
可是这样做也没有防止到有人抄程序啊, 如果有人把flash里的程序对拷到另外一个flash里面, 照样可以拷贝他里面的程序啊?!
难道这样就实现了基带芯片和flash芯片之间的一对一的加密? 可看起来也不像啊, 晕菜, 而且, 这样做的话,
岂不是每生产一个模块就要烧不同的密钥? 更晕, 这成本也太高了吧,
11. Hand over control to AMSS. [52RD.com
本文来自:我爱研发网(52RD.com) 详细出处:http://www.52rd.com/bbs/Detail_RD.BBS_100211_67_1_1.html |
|