apple-data 1.0.603 → 1.0.604

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 6481d521a2e38a707f359222233661bd1732d032d4db3b04951e0b9c7ed80038
4
- data.tar.gz: b03d824d4282dfbd6ea02badd95b7a65dc6c32efffa2a7e35a3d57f82cd86b54
3
+ metadata.gz: 505cf3230870a47f259145e62e3f09e63064d46e3f3b6c34532e41394fcff002
4
+ data.tar.gz: 3c57444d5e7147281f03a6aa8aad3ea8539e010643dde4b4706f6e223aa43033
5
5
  SHA512:
6
- metadata.gz: 07ef65c955be0b50e3b7cb3c749107f3d2e7e438c27d88ab566431b155caa921089d32eb218634ddf6034ac1b38576c386f29b7ea256182fa93a9f07737c99a5
7
- data.tar.gz: 468030029f6c6572d4f4a5567d817542e493385a8ffe0cce9872095e3cce0a346918cf28dd9185c193671ad67ca7cba060b7949fc5f1b271e4c64cce2a4cb905
6
+ metadata.gz: 8fcbbf092c4ca492488bd9a95b4812c32d4f8f9d51f86c253799dc3a729fc41da8f21f0407f3fa22b3ad9bc1bb36dd1c8914c60cd73bb8d97c1f9ae921cd8dec
7
+ data.tar.gz: 2d0d389c91f4ec3ad3b9848536ec093bf8dd2877bed17e2d74df1e9579b820ea61261567086fb4e300ec1a6cc2953070b87c80d064cc01db5d01eec03b17771e
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module AppleData
4
- VERSION = '1.0.603'
4
+ VERSION = '1.0.604'
5
5
  end
data/share/img4.yaml CHANGED
@@ -2,6 +2,32 @@
2
2
  metadata:
3
3
  description:
4
4
  credits:
5
+ types:
6
+ digest-object:
7
+ description: Digest Objects are Firmare or Other Hashable Datastreams.
8
+ They will exist in NOR, Disk, or be received over USB. These objects
9
+ will contain a `DGST` value that is the cryptographic hash of the contents.
10
+ They can contain additional properties per object, some of which are standard
11
+ and others that are object specific.
12
+ common_properties:
13
+ ESEC:
14
+ EPRO:
15
+ EKEY:
16
+ subtypes:
17
+ local-boot-object:
18
+ trust-measurement:
19
+ description: A trust measurement is requested from the processor to ensure that
20
+ the boot flow has not changed since a prior time that measurement was taken.
21
+ To date the trust measurement is commonly found on SEP firmware images.
22
+ ssv-root-hash:
23
+ description: Root Hash values are used to validate the Signature of an APFS Signed
24
+ volume or snapshot. They will be paired to a coresponding disk image. Some also
25
+ are paired with `ssv-merkle-tree` which includes the metadata for the volume.
26
+ trust-cache:
27
+ img4-disk-image:
28
+ description: Disk images are often signed IMG4 payloads used for USB boot or as the
29
+ arm64BaseSystem.dmg. IMG4 is used for smaller disk images that can be entirely
30
+ validated "single shot" unlike larger disks which use SSV and validate on read.
5
31
  img4_tags:
6
32
  acfw:
7
33
  description:
@@ -22,12 +48,18 @@ img4_tags:
22
48
  type: boolean
23
49
  anef:
24
50
  description: Apple Neural Engine Firmware
51
+ type: digest-object
52
+ roots:
53
+ - ManifestKey-DataCenter
25
54
  anrd:
26
55
  description:
27
56
  aofi:
28
57
  description:
29
58
  aopf:
30
59
  description: Always on processor firmware
60
+ type: digest-object
61
+ roots:
62
+ - ManifestKey-DataCenter
31
63
  apmv:
32
64
  description:
33
65
  ater:
@@ -37,9 +69,14 @@ img4_tags:
37
69
  auac:
38
70
  description:
39
71
  aubt:
40
- description:
72
+ description: Auxiliary
41
73
  augs:
42
- description: Included in APTicket CA extensions
74
+ description:
75
+ Auxiliary User System Image
76
+ Included in APTicket CA extensions, as well as factory manifests.
77
+ roots:
78
+ - ExtraContent
79
+ - ManifestKey
43
80
  aupr:
44
81
  description:
45
82
  auxi:
@@ -85,13 +122,16 @@ img4_tags:
85
122
  opt in to a more restrictive AuxKC inclusion. The auxp field is a prerequisite for setting the auxr
86
123
  field in the LocalPolicy. Users change the auxr value implicitly when they build a new AuxKC from
87
124
  the Security & Privacy pane in System Preferences.
88
- type: binary
125
+ type: digest-object
89
126
  subtype: sha2-384
90
127
  access:
91
128
  write:
92
129
  - macOS
93
130
  avef:
94
131
  description: AV Encryption (DRM) Firmware
132
+ type: digest-object
133
+ roots:
134
+ - ManifestKey-DataCenter
95
135
  bat0:
96
136
  description: battery image 0
97
137
  bat1:
@@ -100,11 +140,14 @@ img4_tags:
100
140
  description: battery full image
101
141
  BLDS:
102
142
  description:
103
-
104
143
  prid:
105
144
  description: Encrypted Private Key / Private Key Info
106
145
  bles:
107
146
  description:
147
+ rtmu:
148
+ description: Restore TMU for AP
149
+ type: digest-object
150
+ recovery: true
108
151
  BNCH:
109
152
  description: Boot Nonce Hash - based on the values of com.apple.System.boot-nonces
110
153
  BORD:
@@ -118,28 +161,39 @@ img4_tags:
118
161
  alias:
119
162
  - board-id
120
163
  bstc:
121
- description:
164
+ description: Base Sysetm Static Trust Cache
165
+ type: digest-object
166
+ subtype: trust-cache
122
167
  bsys:
123
- description:
168
+ description: Base System Seal Root Hash
169
+ type: digest-object
170
+ subtype: ssv-root-hash
124
171
  CEPO:
125
172
  description: |-
126
173
  Certificate/Chip Epoch. This is a unit of roll-forward time (monotonic) that allows for any security issues
127
174
  in the prior epoch to be fixed by a anti-rollback scheme.
175
+ nullable: true
176
+ type: boolean
128
177
  alias:
129
178
  - chip-epoch
130
179
  cfel:
131
180
  description:
132
181
  chg0:
133
182
  description: Charging Image 0
183
+ type: digest-object
184
+ subtype: graphic
134
185
  faic:
135
186
  description:
136
187
  type: integer
137
188
  default: 0
138
189
  chg1:
139
190
  description: Charging Image 1
191
+ type: digest-object
192
+ subtype: graphic
140
193
  CHIP:
141
194
  description: Unique identifier for a single Apple designed application processor
142
195
  sharing the same GID key
196
+ type: integer
143
197
  width: 2
144
198
  nsph:
145
199
  description: preboot splat manifest hash
@@ -151,14 +205,17 @@ img4_tags:
151
205
  description:
152
206
  cmsv:
153
207
  description:
208
+ rans:
209
+ description: Restore Apple NAND Storage Firmware
210
+ type: digest-object
154
211
  coih:
155
212
  title: CustomOS Image4 Manifest Hash (coih)
156
213
  description: >
157
214
  The `coih` is an SHA384 hash of CustomOS Image4 manifest. The payload for that manifest is used
158
215
  by iBoot (instead of the XNU kernel) to transfer control. Users change the `coih` value implicitly when
159
216
  they use the `kmutil` configure-boot command-line tool in 1TR.
160
- type: binary
161
- subtype: sha2-384
217
+ type: digest-object
218
+ subtype: IM4M
162
219
  access:
163
220
  write:
164
221
  - 1TR
@@ -166,31 +223,71 @@ img4_tags:
166
223
  description: Chip promotion fuse value (what is burned in)
167
224
  alias:
168
225
  - certificate-production-status
226
+ nullable: true
169
227
  type: boolean
170
228
  CSEC:
171
229
  description: Burned-in chip security mode
230
+ type: boolean
231
+ nullable: true
172
232
  alias:
173
233
  - certificate-security-mode
174
234
  csys:
175
- description:
235
+ description: Install / Restore SSV Root Hash
236
+ type: digest-object
237
+ subtype: ssv-root-hash
176
238
  dali:
177
239
  description:
178
240
  data:
179
241
  description:
242
+ casy:
243
+ description: App Cryptex SSV Root Hash
244
+ type: digest-object
245
+ subtype: ssv-root-hash
246
+ roots:
247
+ - ExtraContent
248
+ cssy:
249
+ description: System Cryptex SSV Root Hash
250
+ type: digest-object
251
+ subtype: ssv-root-hash
252
+ roots:
253
+ - ExtraContent
180
254
  DGST:
181
255
  description: payload digest
182
256
  diag:
183
257
  description:
258
+ trca:
259
+ description:
260
+ type: digest-object
261
+ roots:
262
+ - ExtraContent
263
+ csos:
264
+ description:
265
+ type: digest-object
266
+ roots:
267
+ - ExtraContent
268
+ trcs:
269
+ description:
270
+ type: digest-object
271
+ roots:
272
+ - ExtraContent
184
273
  disk:
185
274
  description:
186
275
  DPRO:
187
- description:
276
+ description: Demote from Production Request
277
+ Value is used by TSS sever to issue EPRO values, or effective AP prodctuion state.
188
278
  DSEC:
189
- description:
279
+ description: Demote from Secure Request
280
+ Value is used by TSS server to issue ESEC values, or effective AP Security Mode should the
281
+ requester be authorized. These requests are not available to consumers, only to Apple Internal.
190
282
  dtre:
191
283
  description: device tree
284
+ type: digest-object
285
+ subtype: device-tree
192
286
  dtrs:
193
287
  description: device tree for recovery
288
+ type: digest-object
289
+ subtype: device-tree
290
+ recovery: true
194
291
  ECID:
195
292
  description: Exclusive chip identifier. This is burned into an eFuse at time
196
293
  of manufacture and unique across all devices sharing the same CHIP
@@ -211,10 +308,16 @@ img4_tags:
211
308
  description:
212
309
  EKEY:
213
310
  description: Effective chip promoted
311
+ nullable: false
312
+ type: boolean
214
313
  EPRO:
215
314
  description: Effective chip promotion / demotion state (if CPFM 03 this must be 0 to set ESEC)
216
315
  alias:
217
316
  - effective-production-status-ap
317
+ nullable: false
318
+ type: boolean
319
+ secb:
320
+ description: Sets a security value such as `trst` or the FDR signing trust object. "security blob?"
218
321
  esca:
219
322
  description:
220
323
  hrlp:
@@ -231,6 +334,7 @@ img4_tags:
231
334
  - macOS
232
335
  esdm:
233
336
  description: Extended Security Domain fuses
337
+ type: integer
234
338
  alias:
235
339
  - esdm-fuses
236
340
  styp:
@@ -238,6 +342,37 @@ img4_tags:
238
342
  type: u32
239
343
  alias:
240
344
  - cryptex subtype
345
+ roots:
346
+ - ExtraContent
347
+ acid:
348
+ WSKU:
349
+ description: Wireless SKU
350
+ WMac:
351
+ description: Wireless MAC Address
352
+ TMac:
353
+ description: Thunderbolt MAC Address
354
+ manifest: true
355
+ BMac:
356
+ description: Bluetooth MAC Address
357
+ manifest: true
358
+ SrNm:
359
+ description: Unit Serial Number
360
+ manifest: true
361
+ ptrp:
362
+ snuf:
363
+ description: Staged next update firmware?
364
+ Regn:
365
+ description: Region Code
366
+ example: LL/A
367
+ type: string
368
+ manifest: true
369
+ Mod#:
370
+ CLHS:
371
+ HmCA:
372
+ FSCl:
373
+ ADCL:
374
+ clid:
375
+ hop0:
241
376
  oppd:
242
377
  description: Unknown, used by `stg1`/`sepi` - sha384 hash sized
243
378
  ESEC:
@@ -247,25 +382,49 @@ img4_tags:
247
382
  euou:
248
383
  description: engineering use-only unit
249
384
  clas:
250
- description: product class (often used in FDR specificatons)
385
+ description: Class for Key / Object - Found in FDR objects
386
+ examples:
387
+ roots:
388
+ - ExtraContent
251
389
  psmh:
252
390
  description: previous stage manifest hash
391
+
253
392
  fchp:
254
- description: Cryptex1,ChipID
393
+ description: Cryptex1,ChipID - Mask
394
+ roots:
395
+ - ExtraContent
255
396
  fdrs:
256
397
  description:
398
+ rvok:
399
+ description: Trust object revocation list
400
+ trpk:
401
+ description: Trust public keys
402
+ rssl:
403
+ description: The valid CA used for secure communications with the FDR server to obtain the FDR objects. This
404
+ differs from the `trst` object as `rssl` is in transit and `trst` is at rest.
257
405
  fdrt:
258
406
  description:
259
407
  file:
260
408
  description:
261
409
  fpgt:
262
410
  description:
411
+ ftab:
412
+ description: >
413
+ Factory Trust - Auto Boot
414
+ FTAB images (used for devices such as AirPods, etc) are "hacktivated" or pre-APTicket'ed devices as they
415
+ lack either a restore connection, or persistet memory. Common early usage of this was the Heywire dongles
416
+ used for video conversion on the Mac. It was simplest for the device to lack NAND and simply receive the
417
+ firmware from a host on powerup. FTAB files are fully ready to run blobs often including RTKit OS based
418
+ memory images.
263
419
  ftap:
264
- description:
420
+ description: >
421
+ Factory Trust - Application Processor
422
+ type: hash
265
423
  ftot:
266
- description:
424
+ description: Factory Trust - Other
267
425
  ftsp:
268
- description:
426
+ description: Factory Trust - SEP
427
+ type: hash
269
428
  fuos:
270
429
  description: Fully Unsigned OS
271
430
  gfxf:
@@ -273,7 +432,7 @@ img4_tags:
273
432
  ging:
274
433
  description:
275
434
  glyc:
276
- description:
435
+ description: Gyroscope Calibration
277
436
  glyp:
278
437
  description:
279
438
  hash:
@@ -286,14 +445,34 @@ img4_tags:
286
445
  description:
287
446
  homr:
288
447
  description:
289
- hrlp:
290
- description:
448
+ cnch:
449
+ roots:
450
+ - ExtraContent
451
+ ndom:
452
+ roots:
453
+ - ExtraContent
454
+ pave:
455
+ description: XNU version string?
456
+ type: string
457
+ roots:
458
+ - ExtraContent
291
459
  hypr:
292
460
  description: Hypervisor
293
461
  iBEC:
294
462
  description: iBoot Epoch Change
295
- iBoot:
463
+ ibot:
296
464
  description: iBoot
465
+ ibdt:
466
+ ibd1:
467
+ glyP:
468
+ ibss:
469
+ dven:
470
+ dcp2:
471
+ ciof:
472
+ batF:
473
+ ansf:
474
+ rfcg:
475
+ type: boolean
297
476
  iBSS:
298
477
  description: iBoot Second Stage
299
478
  ienv:
@@ -315,19 +494,21 @@ img4_tags:
315
494
  ispf:
316
495
  description: Image Signal Processor Firmware
317
496
  isys:
318
- description: iBridge System
497
+ description: Install System SSV Root Hash
319
498
  itst:
320
499
  description:
321
500
  iuob:
322
501
  description:
323
502
  iuos:
324
- description:
503
+ description: Internal Use Only Software
325
504
  iuou:
326
- description:
505
+ description: Internal Use Only Unit
327
506
  kdlv:
328
507
  description:
329
508
  krnl:
330
509
  description: Kernel
510
+ acdc:
511
+ description:
331
512
  kuid:
332
513
  title: Key encryption key (KEK) Group UUID (kuid)
333
514
  description: >
@@ -348,7 +529,8 @@ img4_tags:
348
529
  LNCH:
349
530
  description:
350
531
  lobo:
351
- description: Local Boot
532
+ description: Local Boot Object. Indicates that the object is to be used as the target of a local boot only
533
+ and not provided by the server for remote / DFU boots.
352
534
  logo:
353
535
  description: Apple logo image
354
536
  love:
@@ -363,16 +545,25 @@ img4_tags:
363
545
  - 1TR
364
546
  - recoveryOS
365
547
  - macOS
548
+ roots:
549
+ - ManifestKey-DataCenter
366
550
  prtp:
367
551
  description: Product ID String
368
552
  type: string
369
553
  example: iPhone16,2
554
+ roots:
555
+ - ManifestKey-DataCenter
370
556
  sdkp:
371
- description: SEP Product Type
557
+ description: SDK for Product
372
558
  type: string
373
- example: iphoneos
559
+ roots:
560
+ - ManifestKey-DataCenter
561
+ values:
562
+ - iphoneos
563
+ - macos
374
564
  lphp:
375
565
  description:
566
+ mspr:
376
567
  lpnh:
377
568
  title: LocalPolicy Nonce Hash (lpnh)
378
569
  description: >
@@ -401,7 +592,7 @@ img4_tags:
401
592
  magg:
402
593
  description:
403
594
  MANB:
404
- description:
595
+ description: Manifest B
405
596
  MANP:
406
597
  description: Manifest Payload
407
598
  manx:
@@ -421,7 +612,7 @@ img4_tags:
421
612
  msec:
422
613
  description:
423
614
  msys:
424
- description:
615
+ description: Merkle Tree Metadata for System Disk
425
616
  mtfw:
426
617
  description:
427
618
  name:
@@ -433,7 +624,8 @@ img4_tags:
433
624
  nsrv:
434
625
  description:
435
626
  OBJP:
436
- description:
627
+ description: Object Properties - Values that may be assigned per "object" (firmawres) that contain a `DGST`
628
+ type: sequence
437
629
  omer:
438
630
  description:
439
631
  ooth:
@@ -462,6 +654,8 @@ img4_tags:
462
654
  description:
463
655
  pmpf:
464
656
  description: Power Management Processor Firmware
657
+ type: digest-object
658
+ subtype:
465
659
  pndp:
466
660
  description:
467
661
  prot:
@@ -472,8 +666,8 @@ img4_tags:
472
666
  over time (because nonces like lpnh are frequently updated). The prot field, which is found only in each
473
667
  macOS LocalPolicy, provides a pairing to indicate the recoveryOS LocalPolicy that corresponds to the
474
668
  macOS LocalPolicy.
475
- type: binary
476
- subtype: sha2-384
669
+ type: digest-object
670
+ subtype: trust-measurement
477
671
  access:
478
672
  write:
479
673
  - 1TR
@@ -481,18 +675,25 @@ img4_tags:
481
675
  - macOS
482
676
  rbmt:
483
677
  description:
678
+ mtpf:
484
679
  rddg:
485
680
  description:
486
681
  rdsk:
487
- description: Restore Disk Image
682
+ description: Restore Disk Image / ramdisk
488
683
  rdtr:
489
684
  description:
490
685
  recm:
491
686
  description:
687
+ rcfg:
688
+ description: >
689
+ Appears in certificates issues by factory such as `T6031-SDOM1-TssLive-ManifestKey-RevA-Factory`.
690
+ Potentially indicates that the policy is for a recovery boot only.
691
+ type: boolean
492
692
  rfta:
493
693
  description:
494
694
  rfts:
495
695
  description:
696
+ rdcp:
496
697
  rkrn:
497
698
  description: restore kernel
498
699
  rlgo:
@@ -501,6 +702,7 @@ img4_tags:
501
702
  description:
502
703
  rolp:
503
704
  description: recoveryOS local policy
705
+ type: boolean
504
706
  ronh:
505
707
  title: recoveryOS Nonce Hash (ronh)
506
708
  description: >
@@ -533,6 +735,8 @@ img4_tags:
533
735
  change the nsih value implicitly when they perform a software update.
534
736
  type: binary
535
737
  subtype: sha2-384
738
+ context:
739
+ lpol:
536
740
  access:
537
741
  write:
538
742
  - 1TR
@@ -541,9 +745,10 @@ img4_tags:
541
745
  spih:
542
746
  description: Cryptex1 Image4 Hash
543
747
  stng:
544
- description: Cryptex1 Generation
748
+ description: Cryptex1 Generation / Cryptex type?
545
749
  auxh:
546
750
  description: User Authorized Kext List Hash
751
+ context:
547
752
  rpnh:
548
753
  title: Remote Policy Nonce Hash (rpnh)
549
754
  description: >
@@ -559,15 +764,19 @@ img4_tags:
559
764
  - macOS
560
765
  RSCH:
561
766
  description: Research mode
767
+ rcio:
768
+ description: Restore CIO
562
769
  fgpt:
563
- description: factory pre-release global trust
770
+ description: factory glob al pre-release trust
564
771
  UDID:
565
772
  description: universal device identifier
566
773
  rsch:
567
774
  description: research mode
568
775
  vnum:
569
- description: maximum restore version
776
+ description: Version Number - Update Maximum
570
777
  type: string
778
+ roots:
779
+ - ExtraContent
571
780
  rsep:
572
781
  description: Restore SEP Image, paired with oppd/tbms
573
782
  type: string
@@ -622,21 +831,21 @@ img4_tags:
622
831
  slvn:
623
832
  description:
624
833
  smb0:
625
- description: Secure Multi-Boot 0 - Security Mode - Full Security, Reduced, Disabled
834
+ description: Secure Multi-Boot 0 - Security Mode - Full Security, Reduced, Disabled - Setting to 1 sets to reduced
626
835
  smb1:
627
- description: Secure Multi-Boot 1
836
+ description: Secure Multi-Boot 1 - Setting to 1 allows Permissive
628
837
  smb2:
629
838
  description: Secure Multi-Boot 2 - 3rd Party Kexts Status
630
839
  smb3:
631
840
  description: Secure Multi-Boot 3 - User-allowed MDM Control
632
841
  smb4:
633
842
  description: Secure Multi-Boot 3 - DEP-allowed MDM Control
843
+ smb5:
844
+ description: Unknown - but known to exist in Factory signing
634
845
  SNON:
635
846
  description: SEP Nonce
636
847
  snon:
637
848
  description: SEP Nonce
638
- snuf:
639
- description:
640
849
  srnm:
641
850
  description:
642
851
  ster:
@@ -644,12 +853,14 @@ img4_tags:
644
853
  svrn:
645
854
  description: Server nonce
646
855
  tbmr:
647
- description: Trusted Boot Measurement (Root?)
856
+ description: Trusted Boot Measurement (Recovery/Root?)
648
857
  tbms:
649
858
  description: Trusted Boot Measurement (Signature?)
650
859
  notes: Likely encrypted by the SEP and opaque to the AP
651
860
  tatp:
652
- description: Board Name (such as d84)
861
+ description: Board Name (such as d84) - Target AP Test
862
+ roots:
863
+ - ManifestKey-DataCenter
653
864
  tery:
654
865
  description:
655
866
  test:
@@ -657,11 +868,19 @@ img4_tags:
657
868
  tics:
658
869
  description:
659
870
  trst:
660
- description: Trust Cache
871
+ description: Trust Object
661
872
  tsys:
662
873
  description:
663
874
  type:
664
875
  description: Cryptex Type
876
+ type: integer
877
+ roots:
878
+ - ExtraContent
879
+ caos:
880
+ description:
881
+ type: digest-object
882
+ root:
883
+ - ExtraContent
665
884
  ucer:
666
885
  description: User Cert
667
886
  ucon:
@@ -671,6 +890,8 @@ img4_tags:
671
890
  uidm:
672
891
  description:
673
892
  type: boolean
893
+ roots:
894
+ - ManifestKey-DataCenter
674
895
  vice:
675
896
  description:
676
897
  vkdl:
@@ -689,6 +910,9 @@ img4_tags:
689
910
  - macOS
690
911
  ware:
691
912
  description:
913
+ sski:
914
+ description: SHA2 os some kind
915
+ type: binary
692
916
  inst:
693
917
  descryption: The key or file to install
694
918
  wchf:
data/share/pki.yaml CHANGED
@@ -5,10 +5,10 @@ metadata:
5
5
  certificate_names:
6
6
  dcrt: device certificate
7
7
  dcrt-oid: device owner certificate
8
- lcrt: local certificate?
8
+ lcrt: Lynx / Secure Storage for SEP Certificate
9
9
  pcrt: product/production certificate?
10
10
  rcrt: remote/recovery certificate?
11
- scrt: server certificate?
11
+ scrt: SEP Certificate
12
12
  tcrt: test certificate?
13
13
  ucrt: user certificate (mapps to a single iCloud account)
14
14
  vcrt: virtual certificate?
@@ -47,17 +47,23 @@ oids:
47
47
  example:
48
48
  PUT/FSCl:sik-FXFYFXFFYFFEX-QQRRRDEETFEFYCEIESLIREILCILESCLSELRESERSER
49
49
  - oid: 1.2.840.113635.100.6.1.15
50
+ name: TSS Signing Delegation Constraints
50
51
  description:
51
- To be signed certificate...
52
- Contains the boot policy of the machine during certificate issuance
53
- based on boot policy. includes BORD, ronh, lobo, SDOM, lpnh, rpnh
54
- BNCH, CSEC, CHIP, ECID, CPEO, OBJP, EPRO, DPRO, ESEC, DSEC and DGST
52
+ Constriction on values that can be specified or signed by this certificate. Conatins two sub-sequesnces, the MANP (Manifest Properties)
53
+ and the OBJP (Object Properties). Manifest properties are at the issued IM4M, and object properties are per signed object (firmware).
54
+ Values of NULL mean tha tthis certificate can sign any value for that property, values that are set are values that must be signed
55
+ with that value by this certificate. This is how for example `T6031-SDOM1` is enforced. The certificate for that set of servers
56
+ have a null value for ECID (meaning it can be used for any ECID) and have fixed values for CHIP / Security Domain SDOM.
57
+
58
+ This is how Live TSS for customers differs from factory signing in what properties it can include. Factory only manifest properties
59
+ include `augs`, `uidm`
55
60
  found_in:
56
61
  - ucrt
57
62
  - dcrt-oid
58
63
  issuers:
59
64
  - Basic Attestation User Sub CA2
60
65
  - FDRDC-UCRT-SUBCA
66
+ - T6031-SDOM1-TssLive-ManifestKey-RevA-Factory
61
67
  ous:
62
68
  - BAA Certification
63
69
  - ucrt Leaf Certificate
@@ -80,7 +86,7 @@ oids:
80
86
  - oid: 1.2.840.113635.100.7.1.1
81
87
  apple_description: 'Apple FairPlay certificate extended Application Authentication & Authorization: Policy'
82
88
  - oid: 1.2.840.113635.100.8.4
83
- description: contains 3 integer values in ASN1, the second of which seems to be a 64bit mask of 0xFE000000
89
+ description: Contains a sequence of integer values. Some are 0, some are 1, others appear to be int32 bitmasks.
84
90
  is_asn_body: true
85
91
  is_extension: true
86
92
  found_in:
@@ -91,6 +97,7 @@ oids:
91
97
  ous:
92
98
  - BAA Certification
93
99
  - oid: 1.2.840.113635.100.8.5
100
+ description: Similar in nature to `1.2.840.113635.100.8.4`. Non-integer values observed of `ssca`.
94
101
  is_asn_body: true
95
102
  is_extension: true
96
103
  found_in:
@@ -190,3 +197,28 @@ known_symbols:
190
197
  - _oidAppleTVOSApplicationSigningProdQA
191
198
  roots:
192
199
  FDR-CA1-ROOT-CM:
200
+ FDR-DC-SSL-ROOT:
201
+ FDR Sealing Server CA 1:
202
+ subordinate_cas:
203
+ FDR-SS-CM-E1:
204
+ Basic Attestation User Root CA:
205
+ subordinate_cas:
206
+ Basic Attestation User Sub CA2:
207
+ description:
208
+ Issues `ucrt` subordinate CA's that are used for user level signing. Under this `BAA Certification`
209
+ certs are issued.
210
+ Apple Secure Boot Root CA - G6:
211
+ subordinate_cas:
212
+ T6031-SDOM1-RecoveryBoot-RevA-Factory:
213
+ description:
214
+ T6031-SDOM1-TssLive-ManifestKey-RevA-Factory:
215
+ Apple X86 Secure Boot Root CA - G1:
216
+ subject_key_id: 301680147D73CE0A3B41A1A352D2B1141EF6F5B4DD76E6E8
217
+ subordinate_cas:
218
+ T6031-SDOM1-TssLive-ManifestKey-Global-RevA-DataCenter:
219
+ subject_key_id: 0414D8B9E3E9C4A1C542ECB72FC2CF0C2F861E1B3EEF
220
+ Apple Extra Content Global Root CA - G1:
221
+ subject_key_id: 30168014AA63251D082C72A381536C94D2864995881CB0D0
222
+ subordinate_cas:
223
+ ZFF10-SDOM1-TssLive-ManifestKey-ExtraContent-Global-RevA-DataCenter:
224
+ subject_key_id: 041442FEAB470561CE2A7471B55AC0D81AB7536F4B36
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: apple-data
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.603
4
+ version: 1.0.604
5
5
  platform: ruby
6
6
  authors:
7
7
  - Rick Mark
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-02-15 00:00:00.000000000 Z
11
+ date: 2024-02-18 00:00:00.000000000 Z
12
12
  dependencies: []
13
13
  description: |2
14
14
  This package includes machine readable data about Apple platforms maintained by hack-different.