apple-data 1.0.603 → 1.0.604
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/apple_data/version.rb +1 -1
- data/share/img4.yaml +266 -42
- data/share/pki.yaml +39 -7
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 505cf3230870a47f259145e62e3f09e63064d46e3f3b6c34532e41394fcff002
|
|
4
|
+
data.tar.gz: 3c57444d5e7147281f03a6aa8aad3ea8539e010643dde4b4706f6e223aa43033
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 8fcbbf092c4ca492488bd9a95b4812c32d4f8f9d51f86c253799dc3a729fc41da8f21f0407f3fa22b3ad9bc1bb36dd1c8914c60cd73bb8d97c1f9ae921cd8dec
|
|
7
|
+
data.tar.gz: 2d0d389c91f4ec3ad3b9848536ec093bf8dd2877bed17e2d74df1e9579b820ea61261567086fb4e300ec1a6cc2953070b87c80d064cc01db5d01eec03b17771e
|
data/lib/apple_data/version.rb
CHANGED
data/share/img4.yaml
CHANGED
|
@@ -2,6 +2,32 @@
|
|
|
2
2
|
metadata:
|
|
3
3
|
description:
|
|
4
4
|
credits:
|
|
5
|
+
types:
|
|
6
|
+
digest-object:
|
|
7
|
+
description: Digest Objects are Firmare or Other Hashable Datastreams.
|
|
8
|
+
They will exist in NOR, Disk, or be received over USB. These objects
|
|
9
|
+
will contain a `DGST` value that is the cryptographic hash of the contents.
|
|
10
|
+
They can contain additional properties per object, some of which are standard
|
|
11
|
+
and others that are object specific.
|
|
12
|
+
common_properties:
|
|
13
|
+
ESEC:
|
|
14
|
+
EPRO:
|
|
15
|
+
EKEY:
|
|
16
|
+
subtypes:
|
|
17
|
+
local-boot-object:
|
|
18
|
+
trust-measurement:
|
|
19
|
+
description: A trust measurement is requested from the processor to ensure that
|
|
20
|
+
the boot flow has not changed since a prior time that measurement was taken.
|
|
21
|
+
To date the trust measurement is commonly found on SEP firmware images.
|
|
22
|
+
ssv-root-hash:
|
|
23
|
+
description: Root Hash values are used to validate the Signature of an APFS Signed
|
|
24
|
+
volume or snapshot. They will be paired to a coresponding disk image. Some also
|
|
25
|
+
are paired with `ssv-merkle-tree` which includes the metadata for the volume.
|
|
26
|
+
trust-cache:
|
|
27
|
+
img4-disk-image:
|
|
28
|
+
description: Disk images are often signed IMG4 payloads used for USB boot or as the
|
|
29
|
+
arm64BaseSystem.dmg. IMG4 is used for smaller disk images that can be entirely
|
|
30
|
+
validated "single shot" unlike larger disks which use SSV and validate on read.
|
|
5
31
|
img4_tags:
|
|
6
32
|
acfw:
|
|
7
33
|
description:
|
|
@@ -22,12 +48,18 @@ img4_tags:
|
|
|
22
48
|
type: boolean
|
|
23
49
|
anef:
|
|
24
50
|
description: Apple Neural Engine Firmware
|
|
51
|
+
type: digest-object
|
|
52
|
+
roots:
|
|
53
|
+
- ManifestKey-DataCenter
|
|
25
54
|
anrd:
|
|
26
55
|
description:
|
|
27
56
|
aofi:
|
|
28
57
|
description:
|
|
29
58
|
aopf:
|
|
30
59
|
description: Always on processor firmware
|
|
60
|
+
type: digest-object
|
|
61
|
+
roots:
|
|
62
|
+
- ManifestKey-DataCenter
|
|
31
63
|
apmv:
|
|
32
64
|
description:
|
|
33
65
|
ater:
|
|
@@ -37,9 +69,14 @@ img4_tags:
|
|
|
37
69
|
auac:
|
|
38
70
|
description:
|
|
39
71
|
aubt:
|
|
40
|
-
description:
|
|
72
|
+
description: Auxiliary
|
|
41
73
|
augs:
|
|
42
|
-
description:
|
|
74
|
+
description:
|
|
75
|
+
Auxiliary User System Image
|
|
76
|
+
Included in APTicket CA extensions, as well as factory manifests.
|
|
77
|
+
roots:
|
|
78
|
+
- ExtraContent
|
|
79
|
+
- ManifestKey
|
|
43
80
|
aupr:
|
|
44
81
|
description:
|
|
45
82
|
auxi:
|
|
@@ -85,13 +122,16 @@ img4_tags:
|
|
|
85
122
|
opt in to a more restrictive AuxKC inclusion. The auxp field is a prerequisite for setting the auxr
|
|
86
123
|
field in the LocalPolicy. Users change the auxr value implicitly when they build a new AuxKC from
|
|
87
124
|
the Security & Privacy pane in System Preferences.
|
|
88
|
-
type:
|
|
125
|
+
type: digest-object
|
|
89
126
|
subtype: sha2-384
|
|
90
127
|
access:
|
|
91
128
|
write:
|
|
92
129
|
- macOS
|
|
93
130
|
avef:
|
|
94
131
|
description: AV Encryption (DRM) Firmware
|
|
132
|
+
type: digest-object
|
|
133
|
+
roots:
|
|
134
|
+
- ManifestKey-DataCenter
|
|
95
135
|
bat0:
|
|
96
136
|
description: battery image 0
|
|
97
137
|
bat1:
|
|
@@ -100,11 +140,14 @@ img4_tags:
|
|
|
100
140
|
description: battery full image
|
|
101
141
|
BLDS:
|
|
102
142
|
description:
|
|
103
|
-
|
|
104
143
|
prid:
|
|
105
144
|
description: Encrypted Private Key / Private Key Info
|
|
106
145
|
bles:
|
|
107
146
|
description:
|
|
147
|
+
rtmu:
|
|
148
|
+
description: Restore TMU for AP
|
|
149
|
+
type: digest-object
|
|
150
|
+
recovery: true
|
|
108
151
|
BNCH:
|
|
109
152
|
description: Boot Nonce Hash - based on the values of com.apple.System.boot-nonces
|
|
110
153
|
BORD:
|
|
@@ -118,28 +161,39 @@ img4_tags:
|
|
|
118
161
|
alias:
|
|
119
162
|
- board-id
|
|
120
163
|
bstc:
|
|
121
|
-
description:
|
|
164
|
+
description: Base Sysetm Static Trust Cache
|
|
165
|
+
type: digest-object
|
|
166
|
+
subtype: trust-cache
|
|
122
167
|
bsys:
|
|
123
|
-
description:
|
|
168
|
+
description: Base System Seal Root Hash
|
|
169
|
+
type: digest-object
|
|
170
|
+
subtype: ssv-root-hash
|
|
124
171
|
CEPO:
|
|
125
172
|
description: |-
|
|
126
173
|
Certificate/Chip Epoch. This is a unit of roll-forward time (monotonic) that allows for any security issues
|
|
127
174
|
in the prior epoch to be fixed by a anti-rollback scheme.
|
|
175
|
+
nullable: true
|
|
176
|
+
type: boolean
|
|
128
177
|
alias:
|
|
129
178
|
- chip-epoch
|
|
130
179
|
cfel:
|
|
131
180
|
description:
|
|
132
181
|
chg0:
|
|
133
182
|
description: Charging Image 0
|
|
183
|
+
type: digest-object
|
|
184
|
+
subtype: graphic
|
|
134
185
|
faic:
|
|
135
186
|
description:
|
|
136
187
|
type: integer
|
|
137
188
|
default: 0
|
|
138
189
|
chg1:
|
|
139
190
|
description: Charging Image 1
|
|
191
|
+
type: digest-object
|
|
192
|
+
subtype: graphic
|
|
140
193
|
CHIP:
|
|
141
194
|
description: Unique identifier for a single Apple designed application processor
|
|
142
195
|
sharing the same GID key
|
|
196
|
+
type: integer
|
|
143
197
|
width: 2
|
|
144
198
|
nsph:
|
|
145
199
|
description: preboot splat manifest hash
|
|
@@ -151,14 +205,17 @@ img4_tags:
|
|
|
151
205
|
description:
|
|
152
206
|
cmsv:
|
|
153
207
|
description:
|
|
208
|
+
rans:
|
|
209
|
+
description: Restore Apple NAND Storage Firmware
|
|
210
|
+
type: digest-object
|
|
154
211
|
coih:
|
|
155
212
|
title: CustomOS Image4 Manifest Hash (coih)
|
|
156
213
|
description: >
|
|
157
214
|
The `coih` is an SHA384 hash of CustomOS Image4 manifest. The payload for that manifest is used
|
|
158
215
|
by iBoot (instead of the XNU kernel) to transfer control. Users change the `coih` value implicitly when
|
|
159
216
|
they use the `kmutil` configure-boot command-line tool in 1TR.
|
|
160
|
-
type:
|
|
161
|
-
subtype:
|
|
217
|
+
type: digest-object
|
|
218
|
+
subtype: IM4M
|
|
162
219
|
access:
|
|
163
220
|
write:
|
|
164
221
|
- 1TR
|
|
@@ -166,31 +223,71 @@ img4_tags:
|
|
|
166
223
|
description: Chip promotion fuse value (what is burned in)
|
|
167
224
|
alias:
|
|
168
225
|
- certificate-production-status
|
|
226
|
+
nullable: true
|
|
169
227
|
type: boolean
|
|
170
228
|
CSEC:
|
|
171
229
|
description: Burned-in chip security mode
|
|
230
|
+
type: boolean
|
|
231
|
+
nullable: true
|
|
172
232
|
alias:
|
|
173
233
|
- certificate-security-mode
|
|
174
234
|
csys:
|
|
175
|
-
description:
|
|
235
|
+
description: Install / Restore SSV Root Hash
|
|
236
|
+
type: digest-object
|
|
237
|
+
subtype: ssv-root-hash
|
|
176
238
|
dali:
|
|
177
239
|
description:
|
|
178
240
|
data:
|
|
179
241
|
description:
|
|
242
|
+
casy:
|
|
243
|
+
description: App Cryptex SSV Root Hash
|
|
244
|
+
type: digest-object
|
|
245
|
+
subtype: ssv-root-hash
|
|
246
|
+
roots:
|
|
247
|
+
- ExtraContent
|
|
248
|
+
cssy:
|
|
249
|
+
description: System Cryptex SSV Root Hash
|
|
250
|
+
type: digest-object
|
|
251
|
+
subtype: ssv-root-hash
|
|
252
|
+
roots:
|
|
253
|
+
- ExtraContent
|
|
180
254
|
DGST:
|
|
181
255
|
description: payload digest
|
|
182
256
|
diag:
|
|
183
257
|
description:
|
|
258
|
+
trca:
|
|
259
|
+
description:
|
|
260
|
+
type: digest-object
|
|
261
|
+
roots:
|
|
262
|
+
- ExtraContent
|
|
263
|
+
csos:
|
|
264
|
+
description:
|
|
265
|
+
type: digest-object
|
|
266
|
+
roots:
|
|
267
|
+
- ExtraContent
|
|
268
|
+
trcs:
|
|
269
|
+
description:
|
|
270
|
+
type: digest-object
|
|
271
|
+
roots:
|
|
272
|
+
- ExtraContent
|
|
184
273
|
disk:
|
|
185
274
|
description:
|
|
186
275
|
DPRO:
|
|
187
|
-
description:
|
|
276
|
+
description: Demote from Production Request
|
|
277
|
+
Value is used by TSS sever to issue EPRO values, or effective AP prodctuion state.
|
|
188
278
|
DSEC:
|
|
189
|
-
description:
|
|
279
|
+
description: Demote from Secure Request
|
|
280
|
+
Value is used by TSS server to issue ESEC values, or effective AP Security Mode should the
|
|
281
|
+
requester be authorized. These requests are not available to consumers, only to Apple Internal.
|
|
190
282
|
dtre:
|
|
191
283
|
description: device tree
|
|
284
|
+
type: digest-object
|
|
285
|
+
subtype: device-tree
|
|
192
286
|
dtrs:
|
|
193
287
|
description: device tree for recovery
|
|
288
|
+
type: digest-object
|
|
289
|
+
subtype: device-tree
|
|
290
|
+
recovery: true
|
|
194
291
|
ECID:
|
|
195
292
|
description: Exclusive chip identifier. This is burned into an eFuse at time
|
|
196
293
|
of manufacture and unique across all devices sharing the same CHIP
|
|
@@ -211,10 +308,16 @@ img4_tags:
|
|
|
211
308
|
description:
|
|
212
309
|
EKEY:
|
|
213
310
|
description: Effective chip promoted
|
|
311
|
+
nullable: false
|
|
312
|
+
type: boolean
|
|
214
313
|
EPRO:
|
|
215
314
|
description: Effective chip promotion / demotion state (if CPFM 03 this must be 0 to set ESEC)
|
|
216
315
|
alias:
|
|
217
316
|
- effective-production-status-ap
|
|
317
|
+
nullable: false
|
|
318
|
+
type: boolean
|
|
319
|
+
secb:
|
|
320
|
+
description: Sets a security value such as `trst` or the FDR signing trust object. "security blob?"
|
|
218
321
|
esca:
|
|
219
322
|
description:
|
|
220
323
|
hrlp:
|
|
@@ -231,6 +334,7 @@ img4_tags:
|
|
|
231
334
|
- macOS
|
|
232
335
|
esdm:
|
|
233
336
|
description: Extended Security Domain fuses
|
|
337
|
+
type: integer
|
|
234
338
|
alias:
|
|
235
339
|
- esdm-fuses
|
|
236
340
|
styp:
|
|
@@ -238,6 +342,37 @@ img4_tags:
|
|
|
238
342
|
type: u32
|
|
239
343
|
alias:
|
|
240
344
|
- cryptex subtype
|
|
345
|
+
roots:
|
|
346
|
+
- ExtraContent
|
|
347
|
+
acid:
|
|
348
|
+
WSKU:
|
|
349
|
+
description: Wireless SKU
|
|
350
|
+
WMac:
|
|
351
|
+
description: Wireless MAC Address
|
|
352
|
+
TMac:
|
|
353
|
+
description: Thunderbolt MAC Address
|
|
354
|
+
manifest: true
|
|
355
|
+
BMac:
|
|
356
|
+
description: Bluetooth MAC Address
|
|
357
|
+
manifest: true
|
|
358
|
+
SrNm:
|
|
359
|
+
description: Unit Serial Number
|
|
360
|
+
manifest: true
|
|
361
|
+
ptrp:
|
|
362
|
+
snuf:
|
|
363
|
+
description: Staged next update firmware?
|
|
364
|
+
Regn:
|
|
365
|
+
description: Region Code
|
|
366
|
+
example: LL/A
|
|
367
|
+
type: string
|
|
368
|
+
manifest: true
|
|
369
|
+
Mod#:
|
|
370
|
+
CLHS:
|
|
371
|
+
HmCA:
|
|
372
|
+
FSCl:
|
|
373
|
+
ADCL:
|
|
374
|
+
clid:
|
|
375
|
+
hop0:
|
|
241
376
|
oppd:
|
|
242
377
|
description: Unknown, used by `stg1`/`sepi` - sha384 hash sized
|
|
243
378
|
ESEC:
|
|
@@ -247,25 +382,49 @@ img4_tags:
|
|
|
247
382
|
euou:
|
|
248
383
|
description: engineering use-only unit
|
|
249
384
|
clas:
|
|
250
|
-
description:
|
|
385
|
+
description: Class for Key / Object - Found in FDR objects
|
|
386
|
+
examples:
|
|
387
|
+
roots:
|
|
388
|
+
- ExtraContent
|
|
251
389
|
psmh:
|
|
252
390
|
description: previous stage manifest hash
|
|
391
|
+
|
|
253
392
|
fchp:
|
|
254
|
-
description: Cryptex1,ChipID
|
|
393
|
+
description: Cryptex1,ChipID - Mask
|
|
394
|
+
roots:
|
|
395
|
+
- ExtraContent
|
|
255
396
|
fdrs:
|
|
256
397
|
description:
|
|
398
|
+
rvok:
|
|
399
|
+
description: Trust object revocation list
|
|
400
|
+
trpk:
|
|
401
|
+
description: Trust public keys
|
|
402
|
+
rssl:
|
|
403
|
+
description: The valid CA used for secure communications with the FDR server to obtain the FDR objects. This
|
|
404
|
+
differs from the `trst` object as `rssl` is in transit and `trst` is at rest.
|
|
257
405
|
fdrt:
|
|
258
406
|
description:
|
|
259
407
|
file:
|
|
260
408
|
description:
|
|
261
409
|
fpgt:
|
|
262
410
|
description:
|
|
411
|
+
ftab:
|
|
412
|
+
description: >
|
|
413
|
+
Factory Trust - Auto Boot
|
|
414
|
+
FTAB images (used for devices such as AirPods, etc) are "hacktivated" or pre-APTicket'ed devices as they
|
|
415
|
+
lack either a restore connection, or persistet memory. Common early usage of this was the Heywire dongles
|
|
416
|
+
used for video conversion on the Mac. It was simplest for the device to lack NAND and simply receive the
|
|
417
|
+
firmware from a host on powerup. FTAB files are fully ready to run blobs often including RTKit OS based
|
|
418
|
+
memory images.
|
|
263
419
|
ftap:
|
|
264
|
-
description:
|
|
420
|
+
description: >
|
|
421
|
+
Factory Trust - Application Processor
|
|
422
|
+
type: hash
|
|
265
423
|
ftot:
|
|
266
|
-
description:
|
|
424
|
+
description: Factory Trust - Other
|
|
267
425
|
ftsp:
|
|
268
|
-
description:
|
|
426
|
+
description: Factory Trust - SEP
|
|
427
|
+
type: hash
|
|
269
428
|
fuos:
|
|
270
429
|
description: Fully Unsigned OS
|
|
271
430
|
gfxf:
|
|
@@ -273,7 +432,7 @@ img4_tags:
|
|
|
273
432
|
ging:
|
|
274
433
|
description:
|
|
275
434
|
glyc:
|
|
276
|
-
description:
|
|
435
|
+
description: Gyroscope Calibration
|
|
277
436
|
glyp:
|
|
278
437
|
description:
|
|
279
438
|
hash:
|
|
@@ -286,14 +445,34 @@ img4_tags:
|
|
|
286
445
|
description:
|
|
287
446
|
homr:
|
|
288
447
|
description:
|
|
289
|
-
|
|
290
|
-
|
|
448
|
+
cnch:
|
|
449
|
+
roots:
|
|
450
|
+
- ExtraContent
|
|
451
|
+
ndom:
|
|
452
|
+
roots:
|
|
453
|
+
- ExtraContent
|
|
454
|
+
pave:
|
|
455
|
+
description: XNU version string?
|
|
456
|
+
type: string
|
|
457
|
+
roots:
|
|
458
|
+
- ExtraContent
|
|
291
459
|
hypr:
|
|
292
460
|
description: Hypervisor
|
|
293
461
|
iBEC:
|
|
294
462
|
description: iBoot Epoch Change
|
|
295
|
-
|
|
463
|
+
ibot:
|
|
296
464
|
description: iBoot
|
|
465
|
+
ibdt:
|
|
466
|
+
ibd1:
|
|
467
|
+
glyP:
|
|
468
|
+
ibss:
|
|
469
|
+
dven:
|
|
470
|
+
dcp2:
|
|
471
|
+
ciof:
|
|
472
|
+
batF:
|
|
473
|
+
ansf:
|
|
474
|
+
rfcg:
|
|
475
|
+
type: boolean
|
|
297
476
|
iBSS:
|
|
298
477
|
description: iBoot Second Stage
|
|
299
478
|
ienv:
|
|
@@ -315,19 +494,21 @@ img4_tags:
|
|
|
315
494
|
ispf:
|
|
316
495
|
description: Image Signal Processor Firmware
|
|
317
496
|
isys:
|
|
318
|
-
description:
|
|
497
|
+
description: Install System SSV Root Hash
|
|
319
498
|
itst:
|
|
320
499
|
description:
|
|
321
500
|
iuob:
|
|
322
501
|
description:
|
|
323
502
|
iuos:
|
|
324
|
-
description:
|
|
503
|
+
description: Internal Use Only Software
|
|
325
504
|
iuou:
|
|
326
|
-
description:
|
|
505
|
+
description: Internal Use Only Unit
|
|
327
506
|
kdlv:
|
|
328
507
|
description:
|
|
329
508
|
krnl:
|
|
330
509
|
description: Kernel
|
|
510
|
+
acdc:
|
|
511
|
+
description:
|
|
331
512
|
kuid:
|
|
332
513
|
title: Key encryption key (KEK) Group UUID (kuid)
|
|
333
514
|
description: >
|
|
@@ -348,7 +529,8 @@ img4_tags:
|
|
|
348
529
|
LNCH:
|
|
349
530
|
description:
|
|
350
531
|
lobo:
|
|
351
|
-
description: Local Boot
|
|
532
|
+
description: Local Boot Object. Indicates that the object is to be used as the target of a local boot only
|
|
533
|
+
and not provided by the server for remote / DFU boots.
|
|
352
534
|
logo:
|
|
353
535
|
description: Apple logo image
|
|
354
536
|
love:
|
|
@@ -363,16 +545,25 @@ img4_tags:
|
|
|
363
545
|
- 1TR
|
|
364
546
|
- recoveryOS
|
|
365
547
|
- macOS
|
|
548
|
+
roots:
|
|
549
|
+
- ManifestKey-DataCenter
|
|
366
550
|
prtp:
|
|
367
551
|
description: Product ID String
|
|
368
552
|
type: string
|
|
369
553
|
example: iPhone16,2
|
|
554
|
+
roots:
|
|
555
|
+
- ManifestKey-DataCenter
|
|
370
556
|
sdkp:
|
|
371
|
-
description:
|
|
557
|
+
description: SDK for Product
|
|
372
558
|
type: string
|
|
373
|
-
|
|
559
|
+
roots:
|
|
560
|
+
- ManifestKey-DataCenter
|
|
561
|
+
values:
|
|
562
|
+
- iphoneos
|
|
563
|
+
- macos
|
|
374
564
|
lphp:
|
|
375
565
|
description:
|
|
566
|
+
mspr:
|
|
376
567
|
lpnh:
|
|
377
568
|
title: LocalPolicy Nonce Hash (lpnh)
|
|
378
569
|
description: >
|
|
@@ -401,7 +592,7 @@ img4_tags:
|
|
|
401
592
|
magg:
|
|
402
593
|
description:
|
|
403
594
|
MANB:
|
|
404
|
-
description:
|
|
595
|
+
description: Manifest B
|
|
405
596
|
MANP:
|
|
406
597
|
description: Manifest Payload
|
|
407
598
|
manx:
|
|
@@ -421,7 +612,7 @@ img4_tags:
|
|
|
421
612
|
msec:
|
|
422
613
|
description:
|
|
423
614
|
msys:
|
|
424
|
-
description:
|
|
615
|
+
description: Merkle Tree Metadata for System Disk
|
|
425
616
|
mtfw:
|
|
426
617
|
description:
|
|
427
618
|
name:
|
|
@@ -433,7 +624,8 @@ img4_tags:
|
|
|
433
624
|
nsrv:
|
|
434
625
|
description:
|
|
435
626
|
OBJP:
|
|
436
|
-
description:
|
|
627
|
+
description: Object Properties - Values that may be assigned per "object" (firmawres) that contain a `DGST`
|
|
628
|
+
type: sequence
|
|
437
629
|
omer:
|
|
438
630
|
description:
|
|
439
631
|
ooth:
|
|
@@ -462,6 +654,8 @@ img4_tags:
|
|
|
462
654
|
description:
|
|
463
655
|
pmpf:
|
|
464
656
|
description: Power Management Processor Firmware
|
|
657
|
+
type: digest-object
|
|
658
|
+
subtype:
|
|
465
659
|
pndp:
|
|
466
660
|
description:
|
|
467
661
|
prot:
|
|
@@ -472,8 +666,8 @@ img4_tags:
|
|
|
472
666
|
over time (because nonces like lpnh are frequently updated). The prot field, which is found only in each
|
|
473
667
|
macOS LocalPolicy, provides a pairing to indicate the recoveryOS LocalPolicy that corresponds to the
|
|
474
668
|
macOS LocalPolicy.
|
|
475
|
-
type:
|
|
476
|
-
subtype:
|
|
669
|
+
type: digest-object
|
|
670
|
+
subtype: trust-measurement
|
|
477
671
|
access:
|
|
478
672
|
write:
|
|
479
673
|
- 1TR
|
|
@@ -481,18 +675,25 @@ img4_tags:
|
|
|
481
675
|
- macOS
|
|
482
676
|
rbmt:
|
|
483
677
|
description:
|
|
678
|
+
mtpf:
|
|
484
679
|
rddg:
|
|
485
680
|
description:
|
|
486
681
|
rdsk:
|
|
487
|
-
description: Restore Disk Image
|
|
682
|
+
description: Restore Disk Image / ramdisk
|
|
488
683
|
rdtr:
|
|
489
684
|
description:
|
|
490
685
|
recm:
|
|
491
686
|
description:
|
|
687
|
+
rcfg:
|
|
688
|
+
description: >
|
|
689
|
+
Appears in certificates issues by factory such as `T6031-SDOM1-TssLive-ManifestKey-RevA-Factory`.
|
|
690
|
+
Potentially indicates that the policy is for a recovery boot only.
|
|
691
|
+
type: boolean
|
|
492
692
|
rfta:
|
|
493
693
|
description:
|
|
494
694
|
rfts:
|
|
495
695
|
description:
|
|
696
|
+
rdcp:
|
|
496
697
|
rkrn:
|
|
497
698
|
description: restore kernel
|
|
498
699
|
rlgo:
|
|
@@ -501,6 +702,7 @@ img4_tags:
|
|
|
501
702
|
description:
|
|
502
703
|
rolp:
|
|
503
704
|
description: recoveryOS local policy
|
|
705
|
+
type: boolean
|
|
504
706
|
ronh:
|
|
505
707
|
title: recoveryOS Nonce Hash (ronh)
|
|
506
708
|
description: >
|
|
@@ -533,6 +735,8 @@ img4_tags:
|
|
|
533
735
|
change the nsih value implicitly when they perform a software update.
|
|
534
736
|
type: binary
|
|
535
737
|
subtype: sha2-384
|
|
738
|
+
context:
|
|
739
|
+
lpol:
|
|
536
740
|
access:
|
|
537
741
|
write:
|
|
538
742
|
- 1TR
|
|
@@ -541,9 +745,10 @@ img4_tags:
|
|
|
541
745
|
spih:
|
|
542
746
|
description: Cryptex1 Image4 Hash
|
|
543
747
|
stng:
|
|
544
|
-
description: Cryptex1 Generation
|
|
748
|
+
description: Cryptex1 Generation / Cryptex type?
|
|
545
749
|
auxh:
|
|
546
750
|
description: User Authorized Kext List Hash
|
|
751
|
+
context:
|
|
547
752
|
rpnh:
|
|
548
753
|
title: Remote Policy Nonce Hash (rpnh)
|
|
549
754
|
description: >
|
|
@@ -559,15 +764,19 @@ img4_tags:
|
|
|
559
764
|
- macOS
|
|
560
765
|
RSCH:
|
|
561
766
|
description: Research mode
|
|
767
|
+
rcio:
|
|
768
|
+
description: Restore CIO
|
|
562
769
|
fgpt:
|
|
563
|
-
description: factory pre-release
|
|
770
|
+
description: factory glob al pre-release trust
|
|
564
771
|
UDID:
|
|
565
772
|
description: universal device identifier
|
|
566
773
|
rsch:
|
|
567
774
|
description: research mode
|
|
568
775
|
vnum:
|
|
569
|
-
description:
|
|
776
|
+
description: Version Number - Update Maximum
|
|
570
777
|
type: string
|
|
778
|
+
roots:
|
|
779
|
+
- ExtraContent
|
|
571
780
|
rsep:
|
|
572
781
|
description: Restore SEP Image, paired with oppd/tbms
|
|
573
782
|
type: string
|
|
@@ -622,21 +831,21 @@ img4_tags:
|
|
|
622
831
|
slvn:
|
|
623
832
|
description:
|
|
624
833
|
smb0:
|
|
625
|
-
description: Secure Multi-Boot 0 - Security Mode - Full Security, Reduced, Disabled
|
|
834
|
+
description: Secure Multi-Boot 0 - Security Mode - Full Security, Reduced, Disabled - Setting to 1 sets to reduced
|
|
626
835
|
smb1:
|
|
627
|
-
description: Secure Multi-Boot 1
|
|
836
|
+
description: Secure Multi-Boot 1 - Setting to 1 allows Permissive
|
|
628
837
|
smb2:
|
|
629
838
|
description: Secure Multi-Boot 2 - 3rd Party Kexts Status
|
|
630
839
|
smb3:
|
|
631
840
|
description: Secure Multi-Boot 3 - User-allowed MDM Control
|
|
632
841
|
smb4:
|
|
633
842
|
description: Secure Multi-Boot 3 - DEP-allowed MDM Control
|
|
843
|
+
smb5:
|
|
844
|
+
description: Unknown - but known to exist in Factory signing
|
|
634
845
|
SNON:
|
|
635
846
|
description: SEP Nonce
|
|
636
847
|
snon:
|
|
637
848
|
description: SEP Nonce
|
|
638
|
-
snuf:
|
|
639
|
-
description:
|
|
640
849
|
srnm:
|
|
641
850
|
description:
|
|
642
851
|
ster:
|
|
@@ -644,12 +853,14 @@ img4_tags:
|
|
|
644
853
|
svrn:
|
|
645
854
|
description: Server nonce
|
|
646
855
|
tbmr:
|
|
647
|
-
description: Trusted Boot Measurement (Root?)
|
|
856
|
+
description: Trusted Boot Measurement (Recovery/Root?)
|
|
648
857
|
tbms:
|
|
649
858
|
description: Trusted Boot Measurement (Signature?)
|
|
650
859
|
notes: Likely encrypted by the SEP and opaque to the AP
|
|
651
860
|
tatp:
|
|
652
|
-
description: Board Name (such as d84)
|
|
861
|
+
description: Board Name (such as d84) - Target AP Test
|
|
862
|
+
roots:
|
|
863
|
+
- ManifestKey-DataCenter
|
|
653
864
|
tery:
|
|
654
865
|
description:
|
|
655
866
|
test:
|
|
@@ -657,11 +868,19 @@ img4_tags:
|
|
|
657
868
|
tics:
|
|
658
869
|
description:
|
|
659
870
|
trst:
|
|
660
|
-
description: Trust
|
|
871
|
+
description: Trust Object
|
|
661
872
|
tsys:
|
|
662
873
|
description:
|
|
663
874
|
type:
|
|
664
875
|
description: Cryptex Type
|
|
876
|
+
type: integer
|
|
877
|
+
roots:
|
|
878
|
+
- ExtraContent
|
|
879
|
+
caos:
|
|
880
|
+
description:
|
|
881
|
+
type: digest-object
|
|
882
|
+
root:
|
|
883
|
+
- ExtraContent
|
|
665
884
|
ucer:
|
|
666
885
|
description: User Cert
|
|
667
886
|
ucon:
|
|
@@ -671,6 +890,8 @@ img4_tags:
|
|
|
671
890
|
uidm:
|
|
672
891
|
description:
|
|
673
892
|
type: boolean
|
|
893
|
+
roots:
|
|
894
|
+
- ManifestKey-DataCenter
|
|
674
895
|
vice:
|
|
675
896
|
description:
|
|
676
897
|
vkdl:
|
|
@@ -689,6 +910,9 @@ img4_tags:
|
|
|
689
910
|
- macOS
|
|
690
911
|
ware:
|
|
691
912
|
description:
|
|
913
|
+
sski:
|
|
914
|
+
description: SHA2 os some kind
|
|
915
|
+
type: binary
|
|
692
916
|
inst:
|
|
693
917
|
descryption: The key or file to install
|
|
694
918
|
wchf:
|
data/share/pki.yaml
CHANGED
|
@@ -5,10 +5,10 @@ metadata:
|
|
|
5
5
|
certificate_names:
|
|
6
6
|
dcrt: device certificate
|
|
7
7
|
dcrt-oid: device owner certificate
|
|
8
|
-
lcrt:
|
|
8
|
+
lcrt: Lynx / Secure Storage for SEP Certificate
|
|
9
9
|
pcrt: product/production certificate?
|
|
10
10
|
rcrt: remote/recovery certificate?
|
|
11
|
-
scrt:
|
|
11
|
+
scrt: SEP Certificate
|
|
12
12
|
tcrt: test certificate?
|
|
13
13
|
ucrt: user certificate (mapps to a single iCloud account)
|
|
14
14
|
vcrt: virtual certificate?
|
|
@@ -47,17 +47,23 @@ oids:
|
|
|
47
47
|
example:
|
|
48
48
|
PUT/FSCl:sik-FXFYFXFFYFFEX-QQRRRDEETFEFYCEIESLIREILCILESCLSELRESERSER
|
|
49
49
|
- oid: 1.2.840.113635.100.6.1.15
|
|
50
|
+
name: TSS Signing Delegation Constraints
|
|
50
51
|
description:
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
52
|
+
Constriction on values that can be specified or signed by this certificate. Conatins two sub-sequesnces, the MANP (Manifest Properties)
|
|
53
|
+
and the OBJP (Object Properties). Manifest properties are at the issued IM4M, and object properties are per signed object (firmware).
|
|
54
|
+
Values of NULL mean tha tthis certificate can sign any value for that property, values that are set are values that must be signed
|
|
55
|
+
with that value by this certificate. This is how for example `T6031-SDOM1` is enforced. The certificate for that set of servers
|
|
56
|
+
have a null value for ECID (meaning it can be used for any ECID) and have fixed values for CHIP / Security Domain SDOM.
|
|
57
|
+
|
|
58
|
+
This is how Live TSS for customers differs from factory signing in what properties it can include. Factory only manifest properties
|
|
59
|
+
include `augs`, `uidm`
|
|
55
60
|
found_in:
|
|
56
61
|
- ucrt
|
|
57
62
|
- dcrt-oid
|
|
58
63
|
issuers:
|
|
59
64
|
- Basic Attestation User Sub CA2
|
|
60
65
|
- FDRDC-UCRT-SUBCA
|
|
66
|
+
- T6031-SDOM1-TssLive-ManifestKey-RevA-Factory
|
|
61
67
|
ous:
|
|
62
68
|
- BAA Certification
|
|
63
69
|
- ucrt Leaf Certificate
|
|
@@ -80,7 +86,7 @@ oids:
|
|
|
80
86
|
- oid: 1.2.840.113635.100.7.1.1
|
|
81
87
|
apple_description: 'Apple FairPlay certificate extended Application Authentication & Authorization: Policy'
|
|
82
88
|
- oid: 1.2.840.113635.100.8.4
|
|
83
|
-
description:
|
|
89
|
+
description: Contains a sequence of integer values. Some are 0, some are 1, others appear to be int32 bitmasks.
|
|
84
90
|
is_asn_body: true
|
|
85
91
|
is_extension: true
|
|
86
92
|
found_in:
|
|
@@ -91,6 +97,7 @@ oids:
|
|
|
91
97
|
ous:
|
|
92
98
|
- BAA Certification
|
|
93
99
|
- oid: 1.2.840.113635.100.8.5
|
|
100
|
+
description: Similar in nature to `1.2.840.113635.100.8.4`. Non-integer values observed of `ssca`.
|
|
94
101
|
is_asn_body: true
|
|
95
102
|
is_extension: true
|
|
96
103
|
found_in:
|
|
@@ -190,3 +197,28 @@ known_symbols:
|
|
|
190
197
|
- _oidAppleTVOSApplicationSigningProdQA
|
|
191
198
|
roots:
|
|
192
199
|
FDR-CA1-ROOT-CM:
|
|
200
|
+
FDR-DC-SSL-ROOT:
|
|
201
|
+
FDR Sealing Server CA 1:
|
|
202
|
+
subordinate_cas:
|
|
203
|
+
FDR-SS-CM-E1:
|
|
204
|
+
Basic Attestation User Root CA:
|
|
205
|
+
subordinate_cas:
|
|
206
|
+
Basic Attestation User Sub CA2:
|
|
207
|
+
description:
|
|
208
|
+
Issues `ucrt` subordinate CA's that are used for user level signing. Under this `BAA Certification`
|
|
209
|
+
certs are issued.
|
|
210
|
+
Apple Secure Boot Root CA - G6:
|
|
211
|
+
subordinate_cas:
|
|
212
|
+
T6031-SDOM1-RecoveryBoot-RevA-Factory:
|
|
213
|
+
description:
|
|
214
|
+
T6031-SDOM1-TssLive-ManifestKey-RevA-Factory:
|
|
215
|
+
Apple X86 Secure Boot Root CA - G1:
|
|
216
|
+
subject_key_id: 301680147D73CE0A3B41A1A352D2B1141EF6F5B4DD76E6E8
|
|
217
|
+
subordinate_cas:
|
|
218
|
+
T6031-SDOM1-TssLive-ManifestKey-Global-RevA-DataCenter:
|
|
219
|
+
subject_key_id: 0414D8B9E3E9C4A1C542ECB72FC2CF0C2F861E1B3EEF
|
|
220
|
+
Apple Extra Content Global Root CA - G1:
|
|
221
|
+
subject_key_id: 30168014AA63251D082C72A381536C94D2864995881CB0D0
|
|
222
|
+
subordinate_cas:
|
|
223
|
+
ZFF10-SDOM1-TssLive-ManifestKey-ExtraContent-Global-RevA-DataCenter:
|
|
224
|
+
subject_key_id: 041442FEAB470561CE2A7471B55AC0D81AB7536F4B36
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: apple-data
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.0.
|
|
4
|
+
version: 1.0.604
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Rick Mark
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2024-02-
|
|
11
|
+
date: 2024-02-18 00:00:00.000000000 Z
|
|
12
12
|
dependencies: []
|
|
13
13
|
description: |2
|
|
14
14
|
This package includes machine readable data about Apple platforms maintained by hack-different.
|