⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 bl_alg.c

📁 MTK 平台启动源码
💻 C
字号:
/*****************************************************************************
*  Copyright Statement:
*  --------------------
*  This software is protected by Copyright and the information contained
*  herein is confidential. The software may not be copied and the information
*  contained herein may not be used or disclosed except with the written
*  permission of MediaTek Inc. (C) 2007
*
*  BY OPENING THIS FILE, BUYER HEREBY UNEQUIVOCALLY ACKNOWLEDGES AND AGREES
*  THAT THE SOFTWARE/FIRMWARE AND ITS DOCUMENTATIONS ("MEDIATEK SOFTWARE")
*  RECEIVED FROM MEDIATEK AND/OR ITS REPRESENTATIVES ARE PROVIDED TO BUYER ON
*  AN "AS-IS" BASIS ONLY. MEDIATEK EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES,
*  EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
*  MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT.
*  NEITHER DOES MEDIATEK PROVIDE ANY WARRANTY WHATSOEVER WITH RESPECT TO THE
*  SOFTWARE OF ANY THIRD PARTY WHICH MAY BE USED BY, INCORPORATED IN, OR
*  SUPPLIED WITH THE MEDIATEK SOFTWARE, AND BUYER AGREES TO LOOK ONLY TO SUCH
*  THIRD PARTY FOR ANY WARRANTY CLAIM RELATING THERETO. MEDIATEK SHALL ALSO
*  NOT BE RESPONSIBLE FOR ANY MEDIATEK SOFTWARE RELEASES MADE TO BUYER'S
*  SPECIFICATION OR TO CONFORM TO A PARTICULAR STANDARD OR OPEN FORUM.
*
*  BUYER'S SOLE AND EXCLUSIVE REMEDY AND MEDIATEK'S ENTIRE AND CUMULATIVE
*  LIABILITY WITH RESPECT TO THE MEDIATEK SOFTWARE RELEASED HEREUNDER WILL BE,
*  AT MEDIATEK'S OPTION, TO REVISE OR REPLACE THE MEDIATEK SOFTWARE AT ISSUE,
*  OR REFUND ANY SOFTWARE LICENSE FEES OR SERVICE CHARGE PAID BY BUYER TO
*  MEDIATEK FOR SUCH MEDIATEK SOFTWARE AT ISSUE. 
*
*  THE TRANSACTION CONTEMPLATED HEREUNDER SHALL BE CONSTRUED IN ACCORDANCE
*  WITH THE LAWS OF THE STATE OF CALIFORNIA, USA, EXCLUDING ITS CONFLICT OF
*  LAWS PRINCIPLES.  ANY DISPUTES, CONTROVERSIES OR CLAIMS ARISING THEREOF AND
*  RELATED THERETO SHALL BE SETTLED BY ARBITRATION IN SAN FRANCISCO, CA, UNDER
*  THE RULES OF THE INTERNATIONAL CHAMBER OF COMMERCE (ICC).
*
*****************************************************************************/

/*****************************************************************************
 *
 * Filename:
 * ---------
 *   BL_Alg.c
 *
 * Project:
 * --------
 *   BootLoader
 *
 * Description:
 * ------------
 *   This Module defines cryptographic algorithm
 *
 * Author:
 * -------
 * -------
 *
 *============================================================================
 *             HISTORY
 * Below this line, this part is controlled by PVCS VM. DO NOT MODIFY!!
 *------------------------------------------------------------------------------
 * removed!
 * removed!
 * removed!
 *
 * removed!
 * removed!
 * removed!
 *
 * removed!
 * removed!
 * removed!
 *
 *
 *------------------------------------------------------------------------------
 * Upper this line, this part is controlled by PVCS VM. DO NOT MODIFY!!
 *============================================================================
 ****************************************************************************/

#include "kal_release.h"
#include "bl_loader.h"

#ifdef __SECURE_USB_DOWNLOAD__

#include "sha1.h"
#include "rc4.h"
#include "custom_nvram_sec.h"

//#define _BL_ALG_DEBUG_
//#define _BL_ALG_SKIP_

/*
#define  M1_MAX_KEY_LEN                         128
typedef struct t_Customer_Public_Key
{
   kal_uint32 nELen;
   kal_uint32 nNLen;
   kal_uint16 MCoeff;
   kal_uint16 nCutLength;
   kal_uint16 E_Key[M1_MAX_KEY_LEN];
   kal_uint16 N_Key[M1_MAX_KEY_LEN]; //256, 512, 1024 bit
} T_Customer_Public_Key;
*/

extern kal_uint32  Image$$EXT_RAM$$ZI$$Limit;

extern kal_uint32 custom_get_symmetric_key(kal_uint8 *key, kal_uint32 len);
extern kal_uint32 custom_get_asymmetric_key(kal_uint8 *key, kal_uint32 len);
extern kal_bool RSA_Encode(kal_uint32 dest_addr, kal_uint32 src_addr, kal_uint32 len, kal_uint32 key, kal_uint32 key_len);


kal_bool bl_Alg_Hash_Init(void);
kal_bool bl_Alg_Hash_Append(kal_uint32 addr, kal_uint32 len);
kal_bool bl_Alg_Hash_Finish(kal_uint32 digest, kal_uint32 len);
kal_bool bl_Alg_Sym_Decrypt(kal_uint32 dest_addr, kal_uint32 src_addr, kal_uint32 len, kal_uint32 key, kal_uint32 key_len);
kal_bool bl_Alg_Asym_Decrypt(kal_uint32 dest_addr, kal_uint32 src_addr, kal_uint32 len, kal_uint32 key, kal_uint32 key_len);


#endif /* __SECURE_USB_DOWNLOAD__ */


#pragma arm section rodata = "BL_ALG_TABLE"
#ifdef __SECURE_USB_DOWNLOAD__
const T_BL_FUNC_TABLE g_BlFunc_Table =
{
   bl_Alg_Hash_Init,
   bl_Alg_Hash_Append,
   bl_Alg_Hash_Finish,
   bl_Alg_Sym_Decrypt,
   bl_Alg_Asym_Decrypt,
   sizeof(T_BL_FUNC_TABLE),
   FUNC_TABLE_ID
};
#else /* __SECURE_USB_DOWNLOAD__ */
const T_BL_FUNC_TABLE g_BlFunc_Table;
#endif /* __SECURE_USB_DOWNLOAD__ */
#pragma arm section rodata



#pragma arm section code = "BL_ALGORITHM"

#ifdef __SECURE_USB_DOWNLOAD__

static sha1_context hash_context;

kal_bool bl_Alg_Hash_Init(void)
{
#ifdef _BL_ALG_DEBUG_
   dbg_print("bl_Alg_Hash_Init\n\r");
#endif /*_BL_ALG_DEBUG_ */

#ifndef _BL_ALG_SKIP_
   CHE_sha1_Init(&hash_context);
#endif /* _BL_ALG_SKIP_ */
   
   return KAL_TRUE;
}


kal_bool bl_Alg_Hash_Append(kal_uint32 addr, kal_uint32 len)
{
#ifdef _BL_ALG_DEBUG_
   dbg_print("bl_Alg_Hash_Append(%x, %d)\n\r", addr, len);
#endif /*_BL_ALG_DEBUG_ */
   
#ifndef _BL_ALG_SKIP_
   CHE_sha1_append(&hash_context, (kal_uint8 *)addr, (int)len);
#endif /* _BL_ALG_SKIP_ */

   return KAL_TRUE;
}

kal_bool bl_Alg_Hash_Finish(kal_uint32 digest, kal_uint32 len)
{
#ifdef _BL_ALG_DEBUG_
   dbg_print("bl_Alg_Hash_Finish(%x, %d)\n\r", digest, len);
#endif /*_BL_ALG_DEBUG_ */
   
#ifndef _BL_ALG_SKIP_
   if (len < sizeof(sha1_digest))
   {
      return KAL_FALSE;
   }

   CHE_sha1_finish(&hash_context, (kal_uint8 *)digest);
#endif /* _BL_ALG_SKIP_ */
   
   return KAL_TRUE;
}


kal_bool bl_Alg_Sym_Decrypt(kal_uint32 dest_addr, kal_uint32 src_addr, kal_uint32 len, kal_uint32 key, kal_uint32 key_len)
{
#ifdef _BL_ALG_DEBUG_
   dbg_print("bl_Alg_Sym_Decrypt(%x, %x, %d, %x, %d)\n\r", dest_addr, src_addr, len, key, key_len);
#endif /*_BL_ALG_DEBUG_ */
   
#ifndef _BL_ALG_SKIP_
   che_rc4((kal_uint8 *)src_addr, (int)len, (kal_uint8 *)key, (int)key_len, CHE_MODE_NULL, (kal_uint8 *)dest_addr);
#endif /* _BL_ALG_SKIP_ */

   return KAL_TRUE;
}

kal_bool bl_Alg_Asym_Decrypt(kal_uint32 dest_addr, kal_uint32 src_addr, kal_uint32 len, kal_uint32 key, kal_uint32 key_len)
{
   kal_uint32 Asym_Decrypt_Failed = 0;

#ifdef _BL_ALG_DEBUG_
   dbg_print("bl_Alg_Asym_Decrypt(%x, %x, %d, %x, %d)\n\r", dest_addr, src_addr, len, key, key_len);
#endif /*_BL_ALG_DEBUG_ */

#ifndef _BL_ALG_SKIP_
   if (RSA_Encode(dest_addr, src_addr, len, key, key_len) != KAL_TRUE)
   {
      dbg_print("RSA decryption: failed\n\r");
      ASSERT(Asym_Decrypt_Failed);
   }
#endif /* _BL_ALG_SKIP_ */

   return KAL_TRUE;
}

#endif /* __SECURE_USB_DOWNLOAD__ */

kal_bool bl_Alg_SignatureVerify(kal_uint32 addr, kal_uint32 len, kal_uint32 sig_addr, kal_uint32 sig_len)
{
#ifdef __SECURE_USB_DOWNLOAD__
   kal_uint8 *dest_addr = (kal_uint8 *)addr;
   kal_uint8 *sig = (kal_uint8 *)sig_addr;
   kal_uint8 *key = (kal_uint8 *)&Image$$EXT_RAM$$ZI$$Limit;
   kal_uint32 key_len;
   kal_uint8 hash[20];
   char sig_buf[32];
   kal_uint32 Sig_Verify_Failed = 0;
   
#ifdef _BL_ALG_DEBUG_
   dbg_print("bl_Alg_SignatureVerify(%x, %d, %x, %d)\n\r", addr, len, sig_addr, sig_len);
#endif /*_BL_ALG_DEBUG_ */

   /* Use the customer symmetric key to decrypt the binary image content */
   key_len = custom_get_symmetric_key(key, 128);
#ifndef _BL_ALG_SKIP_
   ASSERT(key_len > 0);
#endif /* _BL_ALG_SKIP_ */
   bl_Alg_Sym_Decrypt((kal_uint32)dest_addr, addr, len, (kal_uint32)key, key_len);
   /* Use the customer asymmetric key to decrypt the signature */
   key_len = custom_get_asymmetric_key(key, NVRAM_ASYMMETRIC_KEY_MAX_SIZE);
#ifndef _BL_ALG_SKIP_
   ASSERT(key_len > 0);
#endif /* _BL_ALG_SKIP_ */
   bl_Alg_Asym_Decrypt((kal_uint32)sig_buf, sig_addr, sig_len, (kal_uint32)key, key_len);
   /* Calculate the hash value */
   bl_Alg_Hash_Init();
   bl_Alg_Hash_Append((kal_uint32)dest_addr, len);
   bl_Alg_Hash_Finish((kal_uint32)hash, sizeof(hash));
   /* Compare the hash value */
   if (memcmp(hash, sig_buf, sizeof(hash)) != 0)
   {
#ifndef _BL_ALG_SKIP_
      ASSERT(Sig_Verify_Failed);
#endif /* _BL_ALG_SKIP_ */
   }
#endif /* __SECURE_USB_DOWNLOAD__ */
   
   return KAL_TRUE;
}

#pragma arm section code

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -