
6.1.1.1 Introduction.......................................................................................................................... 159
6.1.1.2 Secure boot process............................................................................................................ 160
6.1.1.3 Pre-boot phase.....................................................................................................................160
6.1.1.4 ISBC phase..........................................................................................................................161
6.1.1.4.1 Flow in the ISBC code.......................................................................................... 161
6.1.1.4.2 Super Root Keys (SRKs) and signing keys........................................................... 162
6.1.1.4.3 Key revocation.......................................................................................................162
6.1.1.4.4 Alternate image support........................................................................................163
6.1.1.4.5 ESBC with CSF header........................................................................................ 163
6.1.1.5 ESBC phase........................................................................................................................ 163
6.1.1.5.1 Boot script............................................................................................................. 164
6.1.1.6 Next executable (Linux phase).............................................................................................169
6.1.1.7 Product execution.................................................................................................................169
6.1.1.7.1 Introduction............................................................................................................169
6.1.1.7.2 Chain of Trust with confidentiality.......................................................................... 170
6.1.1.7.3 ISBC Key Extension (IE)........................................................................................ 174
6.1.1.8 Troubleshooting....................................................................................................................181
6.1.1.9 CSF Header Data Structure.................................................................................................181
6.1.1.10 ISBC Validation Error Codes.............................................................................................. 191
6.1.1.11 ESBC Validation Error Codes.............................................................................................195
6.1.1.12 Trust Architecture and SFP Information............................................................................. 196
6.1.2 Service Processor (SP) Based Platforms..........................................................................197
6.1.2.1 Secure Boot Introduction..................................................................................................... 197
6.1.2.1.1 Secure Boot process.............................................................................................199
6.1.2.2 ISBC Phase.........................................................................................................................200
6.1.2.2.1 ISBC for PBI validation.........................................................................................200
6.1.2.2.2 ISBC for Boot1 (Boot Loader 1) validation............................................................201
6.1.2.3 ESBC Phase........................................................................................................................201
6.1.2.3.1 esbc_validate command.......................................................................................202
6.1.2.3.2 esbc_halt command............................................................................................. 202
6.1.2.3.3 blob enc command............................................................................................... 202
6.1.2.3.4 blob dec command............................................................................................... 202
6.1.2.3.5 Boot Script............................................................................................................203
6.1.2.4 Next executable phase........................................................................................................ 205
6.1.2.5 Product Execution................................................................................................................205
6.1.2.5.1 Introduction...........................................................................................................206
6.1.2.5.2 Chain of Trust with confidentiality.........................................................................207
6.1.2.5.3 ISBC Key Extension (IE).......................................................................................210
6.1.2.6 PBI structure........................................................................................................................226
6.1.2.7 CSF header structure definition...........................................................................................228
6.1.2.8 CSF header structure definition...........................................................................................235
6.1.2.9 Secure boot specific RCW fields......................................................................................... 241
6.1.2.10 ISBC error codes...............................................................................................................242
6.1.2.11 ESBC error codes..............................................................................................................249
6.1.2.12 Troubleshooting................................................................................................................. 251
6.1.3 Code Signing Tool............................................................................................................. 251
6.1.3.1 Key generation.................................................................................................................... 252
6.1.3.1.1 gen_keys...............................................................................................................252
6.1.3.1.2 gen_otpmk_drbg................................................................................................... 254
6.1.3.1.3 gen_drv_drbg........................................................................................................255
6.1.3.2 Header creation...................................................................................................................256
6.1.3.2.1 uni_pbi..................................................................................................................256
6.1.3.2.2 uni_pbi (create_hdr_pbi)...................................................................................... 259
6.1.3.2.3 uni_sign................................................................................................................ 265
6.1.3.2.4 uni_sign (create_hdr_isbc)................................................................................... 269
Contents
Layerscape Software Development Kit 18.03 Documentation, Rev. 18.03, 04/2018
4
NXP Semiconductors
评论1