apple-data 1.0.603 → 1.0.604

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 6481d521a2e38a707f359222233661bd1732d032d4db3b04951e0b9c7ed80038
4
- data.tar.gz: b03d824d4282dfbd6ea02badd95b7a65dc6c32efffa2a7e35a3d57f82cd86b54
3
+ metadata.gz: 505cf3230870a47f259145e62e3f09e63064d46e3f3b6c34532e41394fcff002
4
+ data.tar.gz: 3c57444d5e7147281f03a6aa8aad3ea8539e010643dde4b4706f6e223aa43033
5
5
  SHA512:
6
- metadata.gz: 07ef65c955be0b50e3b7cb3c749107f3d2e7e438c27d88ab566431b155caa921089d32eb218634ddf6034ac1b38576c386f29b7ea256182fa93a9f07737c99a5
7
- data.tar.gz: 468030029f6c6572d4f4a5567d817542e493385a8ffe0cce9872095e3cce0a346918cf28dd9185c193671ad67ca7cba060b7949fc5f1b271e4c64cce2a4cb905
6
+ metadata.gz: 8fcbbf092c4ca492488bd9a95b4812c32d4f8f9d51f86c253799dc3a729fc41da8f21f0407f3fa22b3ad9bc1bb36dd1c8914c60cd73bb8d97c1f9ae921cd8dec
7
+ data.tar.gz: 2d0d389c91f4ec3ad3b9848536ec093bf8dd2877bed17e2d74df1e9579b820ea61261567086fb4e300ec1a6cc2953070b87c80d064cc01db5d01eec03b17771e
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module AppleData
4
- VERSION = '1.0.603'
4
+ VERSION = '1.0.604'
5
5
  end
data/share/img4.yaml CHANGED
@@ -2,6 +2,32 @@
2
2
  metadata:
3
3
  description:
4
4
  credits:
5
+ types:
6
+ digest-object:
7
+ description: Digest Objects are Firmare or Other Hashable Datastreams.
8
+ They will exist in NOR, Disk, or be received over USB. These objects
9
+ will contain a `DGST` value that is the cryptographic hash of the contents.
10
+ They can contain additional properties per object, some of which are standard
11
+ and others that are object specific.
12
+ common_properties:
13
+ ESEC:
14
+ EPRO:
15
+ EKEY:
16
+ subtypes:
17
+ local-boot-object:
18
+ trust-measurement:
19
+ description: A trust measurement is requested from the processor to ensure that
20
+ the boot flow has not changed since a prior time that measurement was taken.
21
+ To date the trust measurement is commonly found on SEP firmware images.
22
+ ssv-root-hash:
23
+ description: Root Hash values are used to validate the Signature of an APFS Signed
24
+ volume or snapshot. They will be paired to a coresponding disk image. Some also
25
+ are paired with `ssv-merkle-tree` which includes the metadata for the volume.
26
+ trust-cache:
27
+ img4-disk-image:
28
+ description: Disk images are often signed IMG4 payloads used for USB boot or as the
29
+ arm64BaseSystem.dmg. IMG4 is used for smaller disk images that can be entirely
30
+ validated "single shot" unlike larger disks which use SSV and validate on read.
5
31
  img4_tags:
6
32
  acfw:
7
33
  description:
@@ -22,12 +48,18 @@ img4_tags:
22
48
  type: boolean
23
49
  anef:
24
50
  description: Apple Neural Engine Firmware
51
+ type: digest-object
52
+ roots:
53
+ - ManifestKey-DataCenter
25
54
  anrd:
26
55
  description:
27
56
  aofi:
28
57
  description:
29
58
  aopf:
30
59
  description: Always on processor firmware
60
+ type: digest-object
61
+ roots:
62
+ - ManifestKey-DataCenter
31
63
  apmv:
32
64
  description:
33
65
  ater:
@@ -37,9 +69,14 @@ img4_tags:
37
69
  auac:
38
70
  description:
39
71
  aubt:
40
- description:
72
+ description: Auxiliary
41
73
  augs:
42
- description: Included in APTicket CA extensions
74
+ description:
75
+ Auxiliary User System Image
76
+ Included in APTicket CA extensions, as well as factory manifests.
77
+ roots:
78
+ - ExtraContent
79
+ - ManifestKey
43
80
  aupr:
44
81
  description:
45
82
  auxi:
@@ -85,13 +122,16 @@ img4_tags:
85
122
  opt in to a more restrictive AuxKC inclusion. The auxp field is a prerequisite for setting the auxr
86
123
  field in the LocalPolicy. Users change the auxr value implicitly when they build a new AuxKC from
87
124
  the Security & Privacy pane in System Preferences.
88
- type: binary
125
+ type: digest-object
89
126
  subtype: sha2-384
90
127
  access:
91
128
  write:
92
129
  - macOS
93
130
  avef:
94
131
  description: AV Encryption (DRM) Firmware
132
+ type: digest-object
133
+ roots:
134
+ - ManifestKey-DataCenter
95
135
  bat0:
96
136
  description: battery image 0
97
137
  bat1:
@@ -100,11 +140,14 @@ img4_tags:
100
140
  description: battery full image
101
141
  BLDS:
102
142
  description:
103
-
104
143
  prid:
105
144
  description: Encrypted Private Key / Private Key Info
106
145
  bles:
107
146
  description:
147
+ rtmu:
148
+ description: Restore TMU for AP
149
+ type: digest-object
150
+ recovery: true
108
151
  BNCH:
109
152
  description: Boot Nonce Hash - based on the values of com.apple.System.boot-nonces
110
153
  BORD:
@@ -118,28 +161,39 @@ img4_tags:
118
161
  alias:
119
162
  - board-id
120
163
  bstc:
121
- description:
164
+ description: Base Sysetm Static Trust Cache
165
+ type: digest-object
166
+ subtype: trust-cache
122
167
  bsys:
123
- description:
168
+ description: Base System Seal Root Hash
169
+ type: digest-object
170
+ subtype: ssv-root-hash
124
171
  CEPO:
125
172
  description: |-
126
173
  Certificate/Chip Epoch. This is a unit of roll-forward time (monotonic) that allows for any security issues
127
174
  in the prior epoch to be fixed by a anti-rollback scheme.
175
+ nullable: true
176
+ type: boolean
128
177
  alias:
129
178
  - chip-epoch
130
179
  cfel:
131
180
  description:
132
181
  chg0:
133
182
  description: Charging Image 0
183
+ type: digest-object
184
+ subtype: graphic
134
185
  faic:
135
186
  description:
136
187
  type: integer
137
188
  default: 0
138
189
  chg1:
139
190
  description: Charging Image 1
191
+ type: digest-object
192
+ subtype: graphic
140
193
  CHIP:
141
194
  description: Unique identifier for a single Apple designed application processor
142
195
  sharing the same GID key
196
+ type: integer
143
197
  width: 2
144
198
  nsph:
145
199
  description: preboot splat manifest hash
@@ -151,14 +205,17 @@ img4_tags:
151
205
  description:
152
206
  cmsv:
153
207
  description:
208
+ rans:
209
+ description: Restore Apple NAND Storage Firmware
210
+ type: digest-object
154
211
  coih:
155
212
  title: CustomOS Image4 Manifest Hash (coih)
156
213
  description: >
157
214
  The `coih` is an SHA384 hash of CustomOS Image4 manifest. The payload for that manifest is used
158
215
  by iBoot (instead of the XNU kernel) to transfer control. Users change the `coih` value implicitly when
159
216
  they use the `kmutil` configure-boot command-line tool in 1TR.
160
- type: binary
161
- subtype: sha2-384
217
+ type: digest-object
218
+ subtype: IM4M
162
219
  access:
163
220
  write:
164
221
  - 1TR
@@ -166,31 +223,71 @@ img4_tags:
166
223
  description: Chip promotion fuse value (what is burned in)
167
224
  alias:
168
225
  - certificate-production-status
226
+ nullable: true
169
227
  type: boolean
170
228
  CSEC:
171
229
  description: Burned-in chip security mode
230
+ type: boolean
231
+ nullable: true
172
232
  alias:
173
233
  - certificate-security-mode
174
234
  csys:
175
- description:
235
+ description: Install / Restore SSV Root Hash
236
+ type: digest-object
237
+ subtype: ssv-root-hash
176
238
  dali:
177
239
  description:
178
240
  data:
179
241
  description:
242
+ casy:
243
+ description: App Cryptex SSV Root Hash
244
+ type: digest-object
245
+ subtype: ssv-root-hash
246
+ roots:
247
+ - ExtraContent
248
+ cssy:
249
+ description: System Cryptex SSV Root Hash
250
+ type: digest-object
251
+ subtype: ssv-root-hash
252
+ roots:
253
+ - ExtraContent
180
254
  DGST:
181
255
  description: payload digest
182
256
  diag:
183
257
  description:
258
+ trca:
259
+ description:
260
+ type: digest-object
261
+ roots:
262
+ - ExtraContent
263
+ csos:
264
+ description:
265
+ type: digest-object
266
+ roots:
267
+ - ExtraContent
268
+ trcs:
269
+ description:
270
+ type: digest-object
271
+ roots:
272
+ - ExtraContent
184
273
  disk:
185
274
  description:
186
275
  DPRO:
187
- description:
276
+ description: Demote from Production Request
277
+ Value is used by TSS sever to issue EPRO values, or effective AP prodctuion state.
188
278
  DSEC:
189
- description:
279
+ description: Demote from Secure Request
280
+ Value is used by TSS server to issue ESEC values, or effective AP Security Mode should the
281
+ requester be authorized. These requests are not available to consumers, only to Apple Internal.
190
282
  dtre:
191
283
  description: device tree
284
+ type: digest-object
285
+ subtype: device-tree
192
286
  dtrs:
193
287
  description: device tree for recovery
288
+ type: digest-object
289
+ subtype: device-tree
290
+ recovery: true
194
291
  ECID:
195
292
  description: Exclusive chip identifier. This is burned into an eFuse at time
196
293
  of manufacture and unique across all devices sharing the same CHIP
@@ -211,10 +308,16 @@ img4_tags:
211
308
  description:
212
309
  EKEY:
213
310
  description: Effective chip promoted
311
+ nullable: false
312
+ type: boolean
214
313
  EPRO:
215
314
  description: Effective chip promotion / demotion state (if CPFM 03 this must be 0 to set ESEC)
216
315
  alias:
217
316
  - effective-production-status-ap
317
+ nullable: false
318
+ type: boolean
319
+ secb:
320
+ description: Sets a security value such as `trst` or the FDR signing trust object. "security blob?"
218
321
  esca:
219
322
  description:
220
323
  hrlp:
@@ -231,6 +334,7 @@ img4_tags:
231
334
  - macOS
232
335
  esdm:
233
336
  description: Extended Security Domain fuses
337
+ type: integer
234
338
  alias:
235
339
  - esdm-fuses
236
340
  styp:
@@ -238,6 +342,37 @@ img4_tags:
238
342
  type: u32
239
343
  alias:
240
344
  - cryptex subtype
345
+ roots:
346
+ - ExtraContent
347
+ acid:
348
+ WSKU:
349
+ description: Wireless SKU
350
+ WMac:
351
+ description: Wireless MAC Address
352
+ TMac:
353
+ description: Thunderbolt MAC Address
354
+ manifest: true
355
+ BMac:
356
+ description: Bluetooth MAC Address
357
+ manifest: true
358
+ SrNm:
359
+ description: Unit Serial Number
360
+ manifest: true
361
+ ptrp:
362
+ snuf:
363
+ description: Staged next update firmware?
364
+ Regn:
365
+ description: Region Code
366
+ example: LL/A
367
+ type: string
368
+ manifest: true
369
+ Mod#:
370
+ CLHS:
371
+ HmCA:
372
+ FSCl:
373
+ ADCL:
374
+ clid:
375
+ hop0:
241
376
  oppd:
242
377
  description: Unknown, used by `stg1`/`sepi` - sha384 hash sized
243
378
  ESEC:
@@ -247,25 +382,49 @@ img4_tags:
247
382
  euou:
248
383
  description: engineering use-only unit
249
384
  clas:
250
- description: product class (often used in FDR specificatons)
385
+ description: Class for Key / Object - Found in FDR objects
386
+ examples:
387
+ roots:
388
+ - ExtraContent
251
389
  psmh:
252
390
  description: previous stage manifest hash
391
+
253
392
  fchp:
254
- description: Cryptex1,ChipID
393
+ description: Cryptex1,ChipID - Mask
394
+ roots:
395
+ - ExtraContent
255
396
  fdrs:
256
397
  description:
398
+ rvok:
399
+ description: Trust object revocation list
400
+ trpk:
401
+ description: Trust public keys
402
+ rssl:
403
+ description: The valid CA used for secure communications with the FDR server to obtain the FDR objects. This
404
+ differs from the `trst` object as `rssl` is in transit and `trst` is at rest.
257
405
  fdrt:
258
406
  description:
259
407
  file:
260
408
  description:
261
409
  fpgt:
262
410
  description:
411
+ ftab:
412
+ description: >
413
+ Factory Trust - Auto Boot
414
+ FTAB images (used for devices such as AirPods, etc) are "hacktivated" or pre-APTicket'ed devices as they
415
+ lack either a restore connection, or persistet memory. Common early usage of this was the Heywire dongles
416
+ used for video conversion on the Mac. It was simplest for the device to lack NAND and simply receive the
417
+ firmware from a host on powerup. FTAB files are fully ready to run blobs often including RTKit OS based
418
+ memory images.
263
419
  ftap:
264
- description:
420
+ description: >
421
+ Factory Trust - Application Processor
422
+ type: hash
265
423
  ftot:
266
- description:
424
+ description: Factory Trust - Other
267
425
  ftsp:
268
- description:
426
+ description: Factory Trust - SEP
427
+ type: hash
269
428
  fuos:
270
429
  description: Fully Unsigned OS
271
430
  gfxf:
@@ -273,7 +432,7 @@ img4_tags:
273
432
  ging:
274
433
  description:
275
434
  glyc:
276
- description:
435
+ description: Gyroscope Calibration
277
436
  glyp:
278
437
  description:
279
438
  hash:
@@ -286,14 +445,34 @@ img4_tags:
286
445
  description:
287
446
  homr:
288
447
  description:
289
- hrlp:
290
- description:
448
+ cnch:
449
+ roots:
450
+ - ExtraContent
451
+ ndom:
452
+ roots:
453
+ - ExtraContent
454
+ pave:
455
+ description: XNU version string?
456
+ type: string
457
+ roots:
458
+ - ExtraContent
291
459
  hypr:
292
460
  description: Hypervisor
293
461
  iBEC:
294
462
  description: iBoot Epoch Change
295
- iBoot:
463
+ ibot:
296
464
  description: iBoot
465
+ ibdt:
466
+ ibd1:
467
+ glyP:
468
+ ibss:
469
+ dven:
470
+ dcp2:
471
+ ciof:
472
+ batF:
473
+ ansf:
474
+ rfcg:
475
+ type: boolean
297
476
  iBSS:
298
477
  description: iBoot Second Stage
299
478
  ienv:
@@ -315,19 +494,21 @@ img4_tags:
315
494
  ispf:
316
495
  description: Image Signal Processor Firmware
317
496
  isys:
318
- description: iBridge System
497
+ description: Install System SSV Root Hash
319
498
  itst:
320
499
  description:
321
500
  iuob:
322
501
  description:
323
502
  iuos:
324
- description:
503
+ description: Internal Use Only Software
325
504
  iuou:
326
- description:
505
+ description: Internal Use Only Unit
327
506
  kdlv:
328
507
  description:
329
508
  krnl:
330
509
  description: Kernel
510
+ acdc:
511
+ description:
331
512
  kuid:
332
513
  title: Key encryption key (KEK) Group UUID (kuid)
333
514
  description: >
@@ -348,7 +529,8 @@ img4_tags:
348
529
  LNCH:
349
530
  description:
350
531
  lobo:
351
- description: Local Boot
532
+ description: Local Boot Object. Indicates that the object is to be used as the target of a local boot only
533
+ and not provided by the server for remote / DFU boots.
352
534
  logo:
353
535
  description: Apple logo image
354
536
  love:
@@ -363,16 +545,25 @@ img4_tags:
363
545
  - 1TR
364
546
  - recoveryOS
365
547
  - macOS
548
+ roots:
549
+ - ManifestKey-DataCenter
366
550
  prtp:
367
551
  description: Product ID String
368
552
  type: string
369
553
  example: iPhone16,2
554
+ roots:
555
+ - ManifestKey-DataCenter
370
556
  sdkp:
371
- description: SEP Product Type
557
+ description: SDK for Product
372
558
  type: string
373
- example: iphoneos
559
+ roots:
560
+ - ManifestKey-DataCenter
561
+ values:
562
+ - iphoneos
563
+ - macos
374
564
  lphp:
375
565
  description:
566
+ mspr:
376
567
  lpnh:
377
568
  title: LocalPolicy Nonce Hash (lpnh)
378
569
  description: >
@@ -401,7 +592,7 @@ img4_tags:
401
592
  magg:
402
593
  description:
403
594
  MANB:
404
- description:
595
+ description: Manifest B
405
596
  MANP:
406
597
  description: Manifest Payload
407
598
  manx:
@@ -421,7 +612,7 @@ img4_tags:
421
612
  msec:
422
613
  description:
423
614
  msys:
424
- description:
615
+ description: Merkle Tree Metadata for System Disk
425
616
  mtfw:
426
617
  description:
427
618
  name:
@@ -433,7 +624,8 @@ img4_tags:
433
624
  nsrv:
434
625
  description:
435
626
  OBJP:
436
- description:
627
+ description: Object Properties - Values that may be assigned per "object" (firmawres) that contain a `DGST`
628
+ type: sequence
437
629
  omer:
438
630
  description:
439
631
  ooth:
@@ -462,6 +654,8 @@ img4_tags:
462
654
  description:
463
655
  pmpf:
464
656
  description: Power Management Processor Firmware
657
+ type: digest-object
658
+ subtype:
465
659
  pndp:
466
660
  description:
467
661
  prot:
@@ -472,8 +666,8 @@ img4_tags:
472
666
  over time (because nonces like lpnh are frequently updated). The prot field, which is found only in each
473
667
  macOS LocalPolicy, provides a pairing to indicate the recoveryOS LocalPolicy that corresponds to the
474
668
  macOS LocalPolicy.
475
- type: binary
476
- subtype: sha2-384
669
+ type: digest-object
670
+ subtype: trust-measurement
477
671
  access:
478
672
  write:
479
673
  - 1TR
@@ -481,18 +675,25 @@ img4_tags:
481
675
  - macOS
482
676
  rbmt:
483
677
  description:
678
+ mtpf:
484
679
  rddg:
485
680
  description:
486
681
  rdsk:
487
- description: Restore Disk Image
682
+ description: Restore Disk Image / ramdisk
488
683
  rdtr:
489
684
  description:
490
685
  recm:
491
686
  description:
687
+ rcfg:
688
+ description: >
689
+ Appears in certificates issues by factory such as `T6031-SDOM1-TssLive-ManifestKey-RevA-Factory`.
690
+ Potentially indicates that the policy is for a recovery boot only.
691
+ type: boolean
492
692
  rfta:
493
693
  description:
494
694
  rfts:
495
695
  description:
696
+ rdcp:
496
697
  rkrn:
497
698
  description: restore kernel
498
699
  rlgo:
@@ -501,6 +702,7 @@ img4_tags:
501
702
  description:
502
703
  rolp:
503
704
  description: recoveryOS local policy
705
+ type: boolean
504
706
  ronh:
505
707
  title: recoveryOS Nonce Hash (ronh)
506
708
  description: >
@@ -533,6 +735,8 @@ img4_tags:
533
735
  change the nsih value implicitly when they perform a software update.
534
736
  type: binary
535
737
  subtype: sha2-384
738
+ context:
739
+ lpol:
536
740
  access:
537
741
  write:
538
742
  - 1TR
@@ -541,9 +745,10 @@ img4_tags:
541
745
  spih:
542
746
  description: Cryptex1 Image4 Hash
543
747
  stng:
544
- description: Cryptex1 Generation
748
+ description: Cryptex1 Generation / Cryptex type?
545
749
  auxh:
546
750
  description: User Authorized Kext List Hash
751
+ context:
547
752
  rpnh:
548
753
  title: Remote Policy Nonce Hash (rpnh)
549
754
  description: >
@@ -559,15 +764,19 @@ img4_tags:
559
764
  - macOS
560
765
  RSCH:
561
766
  description: Research mode
767
+ rcio:
768
+ description: Restore CIO
562
769
  fgpt:
563
- description: factory pre-release global trust
770
+ description: factory glob al pre-release trust
564
771
  UDID:
565
772
  description: universal device identifier
566
773
  rsch:
567
774
  description: research mode
568
775
  vnum:
569
- description: maximum restore version
776
+ description: Version Number - Update Maximum
570
777
  type: string
778
+ roots:
779
+ - ExtraContent
571
780
  rsep:
572
781
  description: Restore SEP Image, paired with oppd/tbms
573
782
  type: string
@@ -622,21 +831,21 @@ img4_tags:
622
831
  slvn:
623
832
  description:
624
833
  smb0:
625
- description: Secure Multi-Boot 0 - Security Mode - Full Security, Reduced, Disabled
834
+ description: Secure Multi-Boot 0 - Security Mode - Full Security, Reduced, Disabled - Setting to 1 sets to reduced
626
835
  smb1:
627
- description: Secure Multi-Boot 1
836
+ description: Secure Multi-Boot 1 - Setting to 1 allows Permissive
628
837
  smb2:
629
838
  description: Secure Multi-Boot 2 - 3rd Party Kexts Status
630
839
  smb3:
631
840
  description: Secure Multi-Boot 3 - User-allowed MDM Control
632
841
  smb4:
633
842
  description: Secure Multi-Boot 3 - DEP-allowed MDM Control
843
+ smb5:
844
+ description: Unknown - but known to exist in Factory signing
634
845
  SNON:
635
846
  description: SEP Nonce
636
847
  snon:
637
848
  description: SEP Nonce
638
- snuf:
639
- description:
640
849
  srnm:
641
850
  description:
642
851
  ster:
@@ -644,12 +853,14 @@ img4_tags:
644
853
  svrn:
645
854
  description: Server nonce
646
855
  tbmr:
647
- description: Trusted Boot Measurement (Root?)
856
+ description: Trusted Boot Measurement (Recovery/Root?)
648
857
  tbms:
649
858
  description: Trusted Boot Measurement (Signature?)
650
859
  notes: Likely encrypted by the SEP and opaque to the AP
651
860
  tatp:
652
- description: Board Name (such as d84)
861
+ description: Board Name (such as d84) - Target AP Test
862
+ roots:
863
+ - ManifestKey-DataCenter
653
864
  tery:
654
865
  description:
655
866
  test:
@@ -657,11 +868,19 @@ img4_tags:
657
868
  tics:
658
869
  description:
659
870
  trst:
660
- description: Trust Cache
871
+ description: Trust Object
661
872
  tsys:
662
873
  description:
663
874
  type:
664
875
  description: Cryptex Type
876
+ type: integer
877
+ roots:
878
+ - ExtraContent
879
+ caos:
880
+ description:
881
+ type: digest-object
882
+ root:
883
+ - ExtraContent
665
884
  ucer:
666
885
  description: User Cert
667
886
  ucon:
@@ -671,6 +890,8 @@ img4_tags:
671
890
  uidm:
672
891
  description:
673
892
  type: boolean
893
+ roots:
894
+ - ManifestKey-DataCenter
674
895
  vice:
675
896
  description:
676
897
  vkdl:
@@ -689,6 +910,9 @@ img4_tags:
689
910
  - macOS
690
911
  ware:
691
912
  description:
913
+ sski:
914
+ description: SHA2 os some kind
915
+ type: binary
692
916
  inst:
693
917
  descryption: The key or file to install
694
918
  wchf:
data/share/pki.yaml CHANGED
@@ -5,10 +5,10 @@ metadata:
5
5
  certificate_names:
6
6
  dcrt: device certificate
7
7
  dcrt-oid: device owner certificate
8
- lcrt: local certificate?
8
+ lcrt: Lynx / Secure Storage for SEP Certificate
9
9
  pcrt: product/production certificate?
10
10
  rcrt: remote/recovery certificate?
11
- scrt: server certificate?
11
+ scrt: SEP Certificate
12
12
  tcrt: test certificate?
13
13
  ucrt: user certificate (mapps to a single iCloud account)
14
14
  vcrt: virtual certificate?
@@ -47,17 +47,23 @@ oids:
47
47
  example:
48
48
  PUT/FSCl:sik-FXFYFXFFYFFEX-QQRRRDEETFEFYCEIESLIREILCILESCLSELRESERSER
49
49
  - oid: 1.2.840.113635.100.6.1.15
50
+ name: TSS Signing Delegation Constraints
50
51
  description:
51
- To be signed certificate...
52
- Contains the boot policy of the machine during certificate issuance
53
- based on boot policy. includes BORD, ronh, lobo, SDOM, lpnh, rpnh
54
- BNCH, CSEC, CHIP, ECID, CPEO, OBJP, EPRO, DPRO, ESEC, DSEC and DGST
52
+ Constriction on values that can be specified or signed by this certificate. Conatins two sub-sequesnces, the MANP (Manifest Properties)
53
+ and the OBJP (Object Properties). Manifest properties are at the issued IM4M, and object properties are per signed object (firmware).
54
+ Values of NULL mean tha tthis certificate can sign any value for that property, values that are set are values that must be signed
55
+ with that value by this certificate. This is how for example `T6031-SDOM1` is enforced. The certificate for that set of servers
56
+ have a null value for ECID (meaning it can be used for any ECID) and have fixed values for CHIP / Security Domain SDOM.
57
+
58
+ This is how Live TSS for customers differs from factory signing in what properties it can include. Factory only manifest properties
59
+ include `augs`, `uidm`
55
60
  found_in:
56
61
  - ucrt
57
62
  - dcrt-oid
58
63
  issuers:
59
64
  - Basic Attestation User Sub CA2
60
65
  - FDRDC-UCRT-SUBCA
66
+ - T6031-SDOM1-TssLive-ManifestKey-RevA-Factory
61
67
  ous:
62
68
  - BAA Certification
63
69
  - ucrt Leaf Certificate
@@ -80,7 +86,7 @@ oids:
80
86
  - oid: 1.2.840.113635.100.7.1.1
81
87
  apple_description: 'Apple FairPlay certificate extended Application Authentication & Authorization: Policy'
82
88
  - oid: 1.2.840.113635.100.8.4
83
- description: contains 3 integer values in ASN1, the second of which seems to be a 64bit mask of 0xFE000000
89
+ description: Contains a sequence of integer values. Some are 0, some are 1, others appear to be int32 bitmasks.
84
90
  is_asn_body: true
85
91
  is_extension: true
86
92
  found_in:
@@ -91,6 +97,7 @@ oids:
91
97
  ous:
92
98
  - BAA Certification
93
99
  - oid: 1.2.840.113635.100.8.5
100
+ description: Similar in nature to `1.2.840.113635.100.8.4`. Non-integer values observed of `ssca`.
94
101
  is_asn_body: true
95
102
  is_extension: true
96
103
  found_in:
@@ -190,3 +197,28 @@ known_symbols:
190
197
  - _oidAppleTVOSApplicationSigningProdQA
191
198
  roots:
192
199
  FDR-CA1-ROOT-CM:
200
+ FDR-DC-SSL-ROOT:
201
+ FDR Sealing Server CA 1:
202
+ subordinate_cas:
203
+ FDR-SS-CM-E1:
204
+ Basic Attestation User Root CA:
205
+ subordinate_cas:
206
+ Basic Attestation User Sub CA2:
207
+ description:
208
+ Issues `ucrt` subordinate CA's that are used for user level signing. Under this `BAA Certification`
209
+ certs are issued.
210
+ Apple Secure Boot Root CA - G6:
211
+ subordinate_cas:
212
+ T6031-SDOM1-RecoveryBoot-RevA-Factory:
213
+ description:
214
+ T6031-SDOM1-TssLive-ManifestKey-RevA-Factory:
215
+ Apple X86 Secure Boot Root CA - G1:
216
+ subject_key_id: 301680147D73CE0A3B41A1A352D2B1141EF6F5B4DD76E6E8
217
+ subordinate_cas:
218
+ T6031-SDOM1-TssLive-ManifestKey-Global-RevA-DataCenter:
219
+ subject_key_id: 0414D8B9E3E9C4A1C542ECB72FC2CF0C2F861E1B3EEF
220
+ Apple Extra Content Global Root CA - G1:
221
+ subject_key_id: 30168014AA63251D082C72A381536C94D2864995881CB0D0
222
+ subordinate_cas:
223
+ ZFF10-SDOM1-TssLive-ManifestKey-ExtraContent-Global-RevA-DataCenter:
224
+ subject_key_id: 041442FEAB470561CE2A7471B55AC0D81AB7536F4B36
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: apple-data
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.603
4
+ version: 1.0.604
5
5
  platform: ruby
6
6
  authors:
7
7
  - Rick Mark
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-02-15 00:00:00.000000000 Z
11
+ date: 2024-02-18 00:00:00.000000000 Z
12
12
  dependencies: []
13
13
  description: |2
14
14
  This package includes machine readable data about Apple platforms maintained by hack-different.