Jump to: navigation, search

Security/Chip ID

The Allwinner A-series of SoC's (A10, A10s, A12, A13, A20 and A31) feature a series of efuses used as a unique Chip ID. Other potential uses for these efuses are:

  • MAC address
  • Encryption Key
  • Entropy seed
  • Product serial number

These 128 bits are in theory programmable, but most likely require a certain programming voltage (efuse_vddq) applied to pin T9 (on A10/A20) that is normally tied to GND. Feeding said pin with anything but GND will be hard in practice, since the BGA pin will most likely tied directly to GND.

While these bits tend to be programmed reasonable for a lot of SoC's, there have been SoC's in the wild (mele A1000 so far) that has these efuses all set to 0!

The following ranges appear to be available

0x000  128 bit root-key (sun[457]i)
0x010  128 bit boot-key (sun7i)
0x020   64 bit security-jtag-key (sun7i)
0x028   16 bit key configuration (sun7i)
0x02b   16 bit custom-vendor-key (sun7i)
0x02c  320 bit low general key (sun7i)
0x040   32 bit read-control access (sun7i)
0x064  224 bit low general key (sun7i)
0x080 2304 bit HDCP-key (sun7i)
0x1a0  768 bit high general key (sun7i)

see also: SID Register Guide