找回密码
 注册
搜索
查看: 910|回复: 6

6280 trusted boot问题讨论

[复制链接]
发表于 2007-10-29 15:07:08 | 显示全部楼层 |阅读模式
6280 trusted boot问题讨论,
小弟正在做高通芯片方案的预研,由于资料少,以前也没有用过高通的方案,很多问题整不清楚,
请用过高通方案的dx不吝指教,

1.  The boot sequencer takes ARM out of reset and makes ARM to start execution from
0xFFFF0000.
2.  ARM executes the primary boot loader residing in BOOT ROM, starting at 0xFFFF0000.
    这个PBL(primary boot loader) 要自己写吗,还是高通的芯片里内带的?
3.  The primary boot loader instruct the NAND Controller to use:
    □  8-bit NAND mode if BOOT_MODE2 = 0,
    □  16-bit NAND mode if BOOT_MODE2 = 1,
   
4.  The primary boot loader performs auto-detection of NAND page size (512 vs. 2k), as well as
NAND type (NAND vs. SuperAND).
5.  The primary boot loader copies config data from NAND to IMEM.
6.  The primary boot loader hashes the secondary boot loader in ARM and copies it to SDRAM.
    那这个SBL(secondary boot loader)要自己写吗,还是高通的芯片里内带的?
7.  The primary boot loader performs 3 RSA calculations in ARM.
    a.  Performs RSA decrypt on secondary signature and extracts hash.
    b.  Compares extracted hash with original.
    c.  Hashes attestation  certificate and compares against RSA decrypt on the signature.
    d.  Hashes intermediate certificate and compares against RSA decrypt on the signature.
    从PBL 对SBL 做的这几步来看,应该是个 SHA+RSA数字签名的解密验证过程,
    那密钥是要我们自己生成写进去呢,还是要高通提供的? 如果是高通提供的,那启不是不能改动SBL了?
   
8.  The primary boot loader transfers control to the secondary boot loader.
9.  The secondary boot loader hashes AMSS using SHA-1 accelerator (resides in Crypto Engine)
and copies it to SDRAM/SRAM.
10.  The secondary boot loader performs 3 RSA calculations in ARM.
    a.  Performs RSA decrypt on secondary signature and extracts hash.
    b.  Compares extracted hash with original.
    c.  Hashes attestation  certificate and compares against RSA decrypt on the signature.
    d.  Hashes intermediate certificate and compares against RSA decrypt on the signature.
    SBL对主机软件的解密验证也是一样, 我不明白这么复杂的启动过程是为了什么,是为了防止有人抄里面的程序吗?
    可是这样做也没有防止到有人抄程序啊, 如果有人把flash里的程序对拷到另外一个flash里面, 照样可以拷贝他里面的程序啊?!

    难道这样就实现了基带芯片和flash芯片之间的一对一的加密? 可看起来也不像啊, 晕菜, 而且, 这样做的话,
    岂不是每生产一个模块就要烧不同的密钥? 更晕, 这成本也太高了吧,
   
   
11.  Hand over control to AMSS.
 楼主| 发表于 2007-10-31 15:53:04 | 显示全部楼层
[em13][em13]
点评回复

使用道具 举报

发表于 2007-10-31 16:06:00 | 显示全部楼层
搂主zte 的吧
点评回复

使用道具 举报

发表于 2007-10-31 21:04:10 | 显示全部楼层
您看看有关可信计算的内容就明白了,TCB:Trusted Computing Base 可信计算,TMP:Trusted Mobile Platform可信移动平台,TPM:Trusted Platform Module可信平台模块。  
可信计算组织(TCG)。

QQ:569888297
点评回复

使用道具 举报

发表于 2009-7-9 22:35:58 | 显示全部楼层
mark!!!
点评回复

使用道具 举报

发表于 2009-7-30 18:40:55 | 显示全部楼层
[em01][em02]
点评回复

使用道具 举报

发表于 2009-8-2 12:24:07 | 显示全部楼层
6280 trusted boot问题讨论,
小弟正在做高通芯片方案的预研,由于资料少,以前也没有用过高通的方案,很多问题整不清楚,
请用过高通方案的dx不吝指教,

1.  The boot sequencer takes ARM out of reset and makes ARM to start execution from
0xFFFF0000.
2.  ARM executes the primary boot loader residing in BOOT ROM, starting at 0xFFFF0000.
    这个PBL(primary boot loader) 要自己写吗,还是高通的芯片里内带的?////这个是高通提供的,而且不会给你提供原代码
3.  The primary boot loader instruct the NAND Controller to use:
    □  8-bit NAND mode if BOOT_MODE2 = 0,
    □  16-bit NAND mode if BOOT_MODE2 = 1,
   
4.  The primary boot loader performs auto-detection of NAND page size (512 vs. 2k), as well as
NAND type (NAND vs. SuperAND).
5.  The primary boot loader copies config data from NAND to IMEM.
6.  The primary boot loader hashes the secondary boot loader in ARM and copies it to SDRAM.
    那这个SBL(secondary boot loader)要自己写吗,还是高通的芯片里内带的? //OEMLSBL QCSB都有原代码,开发者可以修改部分代码
7.  The primary boot loader performs 3 RSA calculations in ARM.
    a.  Performs RSA decrypt on secondary signature and extracts hash.
    b.  Compares extracted hash with original.
    c.  Hashes attestation  certificate and compares against RSA decrypt on the signature.
    d.  Hashes intermediate certificate and compares against RSA decrypt on the signature.
    从PBL 对SBL 做的这几步来看,应该是个 SHA+RSA数字签名的解密验证过程,
    那密钥是要我们自己生成写进去呢,还是要高通提供的? 如果是高通提供的,那启不是不能改动SBL了?///这个在编译过程中会自动生成对开发者来说这个可以忽略。
   
8.  The primary boot loader transfers control to the secondary boot loader.
9.  The secondary boot loader hashes AMSS using SHA-1 accelerator (resides in Crypto Engine)
and copies it to SDRAM/SRAM.
10.  The secondary boot loader performs 3 RSA calculations in ARM.
    a.  Performs RSA decrypt on secondary signature and extracts hash.
    b.  Compares extracted hash with original.
    c.  Hashes attestation  certificate and compares against RSA decrypt on the signature.
    d.  Hashes intermediate certificate and compares against RSA decrypt on the signature.
    SBL对主机软件的解密验证也是一样, 我不明白这么复杂的启动过程是为了什么,是为了防止有人抄里面的程序吗?
    可是这样做也没有防止到有人抄程序啊, 如果有人把flash里的程序对拷到另外一个flash里面, 照样可以拷贝他里面的程序啊?!

    难道这样就实现了基带芯片和flash芯片之间的一对一的加密? 可看起来也不像啊, 晕菜, 而且, 这样做的话,
    岂不是每生产一个模块就要烧不同的密钥? 更晕, 这成本也太高了吧,
   
   
11.  Hand over control to AMSS.     [52RD.com
本文来自:我爱研发网(52RD.com) 详细出处:http://www.52rd.com/bbs/Detail_RD.BBS_100211_67_1_1.html
点评回复

使用道具 举报

高级模式
B Color Image Link Quote Code Smilies

本版积分规则

Archiver|手机版|小黑屋|52RD我爱研发网 ( 沪ICP备2022007804号-2 )

GMT+8, 2024-11-29 22:32 , Processed in 0.044632 second(s), 17 queries , Gzip On.

Powered by Discuz! X3.5

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表