apple-data 1.0.628 → 1.0.629

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 8eb4efc2cd53fa67764ff0d7dbfda026c4ffb60fd0cf085f45859711cefe80fd
4
- data.tar.gz: 40760f04615246b72222505609c7cba2c3f22b479a2b66b39804b2b4ffa14646
3
+ metadata.gz: 7ccec50a6440b05805fb2139a50c19abcfa15433b0f33c93a0564b934446fb9c
4
+ data.tar.gz: 062551007e74d609abe1c4858040a25f63656345256ddf2eefce434fee62fafa
5
5
  SHA512:
6
- metadata.gz: 52fbf723e92913ce97364be4c8694d8f3e87b29f8f30d4d0e8a9c5fc431ee2bf24f8eb927bad09743b70bc0b2f95b5bdae0d43f6ada54bcd49c121e2f7a3160f
7
- data.tar.gz: 6249f8b1d4269f4f078063b268699468167c623e31940193eca79f98cb13b22bb3f573759bcd54f5514acc459156560c68094be55f1b36d6a8b2fad85d1ee558
6
+ metadata.gz: e52bb4d0d08328bb56a946cffa4f597f765610e20b7adad4f8f1db8721f843c7a528c724da39abadba7634cb6f97af2d0ae2543aadf42db403e2b410f48b4f2f
7
+ data.tar.gz: ff8cd17c5f061a4c5078a3db242b5871873e89c88f6c02428c5940e3616e94c09ecf765a98a4bd47cd16b8752eab4f0e7a50b1832cb828edf9d0b55b63b27e5f
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module AppleData
4
- VERSION = '1.0.628'
4
+ VERSION = '1.0.629'
5
5
  end
data/share/baseband.yaml CHANGED
@@ -6,6 +6,46 @@ metadata:
6
6
  - product_basebands
7
7
  esim:
8
8
  root_keys:
9
+ baseband_behaviors:
10
+ - FlashPSI-Version
11
+ - ModemStack-Digest
12
+ - ModemStack-Length
13
+ - RamPSI-Version
14
+ - FlashPSI-SecPackDigest
15
+ - ModemStack-SecPackDigest
16
+ - FlashPSI-Digest
17
+ - EBL-Digest
18
+ - RamPSI-PartialDigest
19
+ - FlashPSI-PartialDigest
20
+ - RamPSI-Blob
21
+ - RestoreRamPSI-Blob
22
+ - PSI-Blob
23
+ - RestorePSI-Blob
24
+ - PSI2-Blob
25
+ - RestorePSI2-Blob
26
+ - FlashPSI-Blob
27
+ - BBTicket
28
+ - DBL-Version
29
+ - DBL-PartialDigest
30
+ - ENANDPRG-Version
31
+ - ENANDPRG-PartialDigest
32
+ - DBL-Blob
33
+ - ENANDPRG-Blob
34
+ - OSBL-DownloadDigest
35
+ - AMSS-DownloadDigest
36
+ - AMSS-HashTableDigest
37
+ - PartitionTable-Digest
38
+ - eDBL-Version
39
+ - eDBL-PartialDigest
40
+ - eDBL-Blob
41
+ - RestoreDBL-Version
42
+ - RestoreDBL-PartialDigest
43
+ - RestoreDBL-Blob
44
+ - DSP1-DownloadDigest
45
+ - DSP1-HashTableDigest
46
+ - DSP2-DownloadDigest
47
+ - DSP2-HashTableDigest
48
+ - SBL1-Version
9
49
  products: {}
10
50
  product_basebands:
11
51
  iPad11,2:
data/share/bundles.yaml CHANGED
@@ -5,46 +5,82 @@ metadata:
5
5
  collections:
6
6
  - bundles
7
7
  bundles:
8
+ app_mode_loader:
8
9
  com.apple.accessibility.universalAccessAuthWarn:
9
10
  com.apple.AirPlayUIAgent:
10
11
  com.apple.appkit.xpc.openAndSavePanelService:
11
12
  com.apple.AppSSOAgent:
12
13
  com.apple.AppStore:
14
+ com.apple.appstore.AppDownloadLauncher:
15
+ com.apple.apreceivermac:
13
16
  com.apple.AquaAppearanceHelper:
14
17
  com.apple.AssistantServices:
18
+ com.apple.Authorization.LAContextAuthorizationTestApp:
15
19
  com.apple.AVKit.RoutePickerViewService:
20
+ com.apple.avkittester:
21
+ com.apple.bni.AppleNetInstall:
22
+ com.apple.Cauldron:
16
23
  com.apple.controlcenter:
17
24
  com.apple.controlstrip:
18
25
  com.apple.CoreLocationAgent:
19
26
  com.apple.coreservices.uiagent:
20
27
  com.apple.CoreSimulator.CoreSimulatorService:
21
28
  com.apple.CoreSimulator.SimulatorTrampoline:
29
+ com.apple.dashboardlauncher:
30
+ com.apple.DCSD:
22
31
  com.apple.dock:
23
32
  com.apple.dock.extra:
33
+ com.apple.dt.uxi.client:
24
34
  com.apple.dt.Xcode:
35
+ com.apple.dt.XCPreviewAgent:
36
+ com.apple.factory.SNIFF:
25
37
  com.apple.finder:
38
+ com.apple.finder.Open-iCloudDrive:
39
+ com.apple.frontrowlauncher:
40
+ com.apple.FruitBasket:
41
+ com.apple.green-restore:
26
42
  com.apple.imdpersistence.IMDPersistenceAgent:
27
43
  com.apple.imtransferservices.IMTransferAgent:
28
44
  com.apple.inputmethod.EmojiFunctionRowItem:
45
+ com.apple.internal.ApplePayAutomation:
46
+ com.apple.internal.Blade.xctrunner:
47
+ com.apple.internal.CarDisplaySim:
48
+ com.apple.iOS-Menu:
49
+ com.apple.iPhoneMenu:
50
+ com.apple.iRemoteX:
51
+ com.apple.ist.Radar7:
52
+ com.apple.jett.Switch:
29
53
  com.apple.LocalAuthentication.UIAgent:
30
54
  com.apple.locationd:
31
55
  com.apple.locationmenu:
32
56
  com.apple.loginwindow:
33
57
  com.apple.LookupViewService:
58
+ com.apple.macFieldDiags.DiagsLoader:
34
59
  com.apple.nbagent:
35
60
  com.apple.notificationcenterui:
36
61
  com.apple.NowPlayingTouchUI:
37
62
  com.apple.OSDUIHelper:
38
63
  com.apple.PowerChime:
64
+ com.apple.PowerWarriorX:
39
65
  com.apple.Preferences:
66
+ com.apple.PurpleCrashReporter:
67
+ com.apple.PurplePod:
68
+ com.apple.purpleRegister:
69
+ com.apple.PurpleRestore:
40
70
  com.apple.quicklook.QuickLookUIService:
41
71
  com.apple.QuickLookThumbnailing.extension.ThumbnailExtension-macOS:
42
72
  com.apple.QuickLookUIFramework.QLPreviewGenerationExtension:
73
+ com.apple.Redwood.app.SafeViewAgent:
74
+ com.apple.remoteinstallmacosx:
43
75
  com.apple.Safari:
44
76
  com.apple.Safari.SandboxBroker:
77
+ com.apple.ScreenShotr:
45
78
  com.apple.security.Keychain-Circle-Notification:
46
79
  com.apple.SoftwareUpdateNotificationManager:
47
80
  com.apple.Spotlight:
81
+ com.apple.stack:
82
+ com.apple.SumacUI:
83
+ com.apple.SwiftUIColorGrid:
48
84
  com.apple.systemuiserver:
49
85
  com.apple.talagent:
50
86
  com.apple.Terminal:
@@ -52,6 +88,8 @@ bundles:
52
88
  com.apple.TextInputSwitcher:
53
89
  com.apple.TV:
54
90
  com.apple.UIKitSystemApp:
91
+ com.apple.UIKitSystemApp.HelloWorld:
92
+ com.apple.usbqa.USBProber:
55
93
  com.apple.ViewBridgeAuxiliary:
56
94
  com.apple.WebKit.GPU:
57
95
  com.apple.WebKit.Networking:
@@ -25,7 +25,6 @@ provisioning:
25
25
  kAMAuthinstallProvisioningICCID:
26
26
  kAMAuthinstallProvisioningMANIFESTDATA:
27
27
  kAMAuthinstallProvisioningRequest:
28
-
29
28
  install:
30
29
  monet:
31
30
  kAMAuthInstallMonetLocalDefaultTrustURL:
@@ -127,7 +126,6 @@ application_processor:
127
126
  kAMAuthInstallTagCryptex1Version:
128
127
  kAMAuthInstallTagCryptex1PreauthorizationVersion:
129
128
  kAMAuthInstallTagCryptex1FakeRoot:
130
-
131
129
  options:
132
130
  kAMAuthInstallApParameterAllowMixAndMatch:
133
131
  kAMAuthInstallApParameterApInternalUseOnlySW:
@@ -200,8 +198,13 @@ application_processor:
200
198
  kAMAuthInstallApImg4LocalTicketTagnsrv:
201
199
  kAMAuthInstallApImg4LocalTicketTagrsep:
202
200
  kAMAuthInstallApImg4LocalTicketTagsepi:
203
-
204
201
  secondary_cores:
202
+ AppleNandStorage:
203
+ type: aarch64
204
+ description: Processor that presents NVMe to the AP and provides both NVMe storage
205
+ as well as emulated SPI flash for early boot. This
206
+ firmware_type: ansf
207
+ restore_firmware_type: rans
205
208
  AppleTypeCRetimer:
206
209
  options:
207
210
  kATCRTTicketNameFormat:
@@ -221,53 +224,6 @@ secondary_cores:
221
224
  kATCRTHardwareIDKeyChipID:
222
225
  kATCRTDeviceInfoKeyHardwareID:
223
226
  kATCRTDeviceInfoKeyInfoArray:
224
- TCON:
225
- options:
226
- kAppleTCONCommonIORegPropProdFuseValue:
227
- kAppleTCONCommonIORegPropNonce:
228
- kAppleTCONCommonIORegPropECID:
229
- kAppleTCONCommonIORegPropPRODStatus:
230
- kAppleTCONCommonIORegPropSDOMStatus:
231
- kAppleTCONCommonIORegPropFirmwareVer:
232
- kAppleTCONCommonIORegPropBundleVer:
233
- kAppleTCONCommonIORegPropDeviceID:
234
- kAppleTCONCommonOptionFuseProd:
235
- kAppleTCONCommonOptionFuseSDOM:
236
- kAppleTCONCommonOptionSkipSameVersion:
237
- kAppleTCONCommonOptionInternalBundle:
238
- kAppleTCONCommonTagBuildIdentityPathKey:
239
- kAppleTCONCommonTagBuildIdentityInfoKey:
240
- kAppleTCONCommonTagMeasurementDigest:
241
- TCON2:
242
- options:
243
- Vynal:
244
- options:
245
- kAMAuthInstallPROverrideVinylFirmwareKey:
246
- kAMAuthInstallTagVinylApProductionMode:
247
- kAMAuthInstallTagVinylRootKeyID:
248
- kAMAuthInstallTagVinylDigest:
249
- kAMAuthInstallTagVinylNonce:
250
- kAMAuthInstallTagVinylMain:
251
- kAMAuthInstallTagVinylGold:
252
- kAMAuthInstallTagVinylEID:
253
- kAMAuthInstallTagVinylChipID:
254
- kAMAuthInstallTagVinylTicketResponse:
255
- kAMAuthInstallTagVinylTicket:
256
- kAMAuthInstallVinylIm4pVersion:
257
- kAMAuthInstallVinyl4CCManpMain:
258
- kAMAuthInstallVinyl4CCManpGold:
259
- kAMAuthInstallTagVinylVendorAuthDataGold:
260
- kAMAuthInstallTagVinylVendorAuthDataMain:
261
- kAMAuthInstallTagVinylFwLoaderVersionPlist:
262
- kAMAuthInstallTagVinylRootKeyIdentifierPlist:
263
-
264
-
265
- AppleNandStorage:
266
- type: aarch64
267
- description: Processor that presents NVMe to the AP and provides both NVMe storage
268
- as well as emulated SPI flash for early boot. This
269
- firmware_type: ansf
270
- restore_firmware_type: rans
271
227
  Baseband:
272
228
  description: Comes from multiple vendors, encoded in `bbfw` file. See `baseband.yaml`
273
229
  for more info.
@@ -393,12 +349,88 @@ secondary_cores:
393
349
  kAMAuthInstallTagBbAppsDownloadDigest:
394
350
  kAMAuthInstallTagBbDsp3HashSectionDigest:
395
351
  kAMAuthInstallTagBbDsp3DownloadDigest:
396
-
352
+ eUICC:
353
+ options:
354
+ eUICCprofileObjectSpec:
355
+ eUICCprofileOptionSpec:
356
+ eUICCcertChainSpec:
357
+ eUICCSignIdPayloadSpec:
358
+ eUICCPCFObjectSpec:
359
+ eUICCPCFValueSpec:
360
+ eUICCPCFValueDataSpec:
361
+ tags:
362
+ kAMAuthInstallTagEuiccCSN:
363
+ kAMAuthInstallTagEuiccMainNonce:
364
+ kAMAuthInstallTagEuiccGoldNonce:
365
+ kAMAuthInstallTagEuiccTicketVersion:
366
+ kAMAuthInstallTagEuiccCertIdentifier:
367
+ kAMAuthInstallTagEuiccSignedTicketMain:
368
+ kAMAuthInstallTagEuiccSignedTicketGold:
369
+ kAMAuthInstallTagEuiccChipID:
370
+ kAMAuthInstallTagEuiccFirmwareLoaderVersion:
371
+ kAMAuthInstallTagEuiccSignedProfileMain:
372
+ kAMAuthInstallTagEuiccSignedProfileGold:
397
373
  ImageSignalProcessor:
398
374
  firmware_type: ispf
399
375
  description: Image Signal Processor
400
376
  Juliet:
401
377
  description: The Infared FaceID camera
378
+ kT200:
379
+ kT200CertificationURL:
380
+ kT200PersonalizationOption;:
381
+ kT200RestoreSystemPartition:
382
+ kT200SkipFirmwareMapStore:
383
+ kT200TagRequestFirmwareTicket:
384
+ kT200TagResponseFirmwareTicket:
385
+ kT200DeviceInfoChipID:
386
+ kT200DeviceInfoNonce:
387
+ kT200DeviceInfoUniqueID:
388
+ kT200DeviceInfoRevision:
389
+ kT200DeviceInfoProductionMode:
390
+ kT200DeviceInfoUpdateType:
391
+ kT200DeviceInfoChemistryID:
392
+ kT200DeviceInfoLocalSigningID:
393
+ kT200DeviceHWVersion:
394
+ kT200UpdaterOptions:
395
+ kT200TagChipID:
396
+ kT200TagBoardID:
397
+ kT200TagNonce:
398
+ kT200TagUniqueID:
399
+ kT200TagRevision:
400
+ kT200TagProductionMode:
401
+ kT200TagCertificateEpoch:
402
+ kT200TagFAEnable:
403
+ kT200TagVNVEnable:
404
+ kT200TagFWOverWrite:
405
+ kT200TagEFFV:
406
+ kT200TagFAEnableOption:
407
+ kT200TagVNVEnableOption:
408
+ kT200TagFWSkipSameVersion:
409
+ kT200TagRollbackFWVer:
410
+ kT200TagPreflight:
411
+ kT200TagMeasurementFirmware:
412
+ kT200TagMeasurementFirmwarePlist:
413
+ kT200TagDerFirmwarePlist:
414
+ kT200TagBoardId:
415
+ kT200MeasurementDictFirmware:
416
+ kT200DigestDERDictFirmware:
417
+ kT200TagMeasurementDigest:
418
+ kT200OptionDebugArgs:
419
+ kT200OptionUpdateType:
420
+ kT200OptionFirmwareData:
421
+ kT200OptionFirmwareIsOverride:
422
+ kT200OptionOptions:
423
+ kT200OptionRestoreInternal:
424
+ kT200OptionDeviceInfo:
425
+ kT200OptionBuildIdentity:
426
+ kT200OptionTicket:
427
+ kT200OptionRequest:
428
+ kT200OptionSourceBundlePath:
429
+ kT200OptionDestBundlePath:
430
+ kT200ReturnTagsInBI:
431
+ kT200ReturnTagsInTssResponse:
432
+ kT200BuildIdentityInfoKey:
433
+ kT200BuildIdentityPathKey:
402
434
  Maggie:
403
435
  description: Ultra low power FPGA (iCE5LP4K) / Lattice iCEcube2
404
436
  firmware_type: magg
@@ -406,16 +438,6 @@ secondary_cores:
406
438
  description: The FaceID assembly
407
439
  options:
408
440
  kAMAuthInstallTagPearlCertificationRootPub:
409
- x86:
410
- options:
411
- kAMAuthInstallTagX86ProductionMode:
412
- kAMAuthInstallTagX86SecurityMode:
413
- kAMAuthInstallTagX86Nonce:
414
- kAMAuthInstallTagX86UseGlobalSigning:
415
- kAMAuthInstallTagX86AllowMixAndMatch:
416
- kAMAuthInstallTagX86OSLongVersion:
417
- kAMAuthInstallTagX86Img4Ticket:
418
- kAMAuthInstallTagX86RequestImg4Ticket:
419
441
  PowerManagementProcessor:
420
442
  type: arm7m
421
443
  description: Power Management Processor. Provides ARM Cortex-M processor for
@@ -424,27 +446,51 @@ secondary_cores:
424
446
  `volume-up-debounce` and `volume-down-debounce`. There have been reported copies
425
447
  of debug firmwares in the wild which might avoid such power sequencing.
426
448
  firmware_type: pmpf
427
- eUICC:
449
+ PS190:
428
450
  options:
429
- eUICCprofileObjectSpec:
430
- eUICCprofileOptionSpec:
431
- eUICCcertChainSpec:
432
- eUICCSignIdPayloadSpec:
433
- eUICCPCFObjectSpec:
434
- eUICCPCFValueSpec:
435
- eUICCPCFValueDataSpec:
451
+ kPS190SecurityDomainTagFormat:
452
+ kPS190BoardIDTagFormat:
453
+ kPS190FirmwareTagFormat:
454
+ kPS190SecurityDomainTagSuffix:
455
+ kPS190BoardIDTagSuffix:
456
+ kPS190FirmwareTagSuffix:
457
+ kPS190TagNameFormatString:
458
+ kPS190TicketNameFormatString:
459
+ kPS190FirmwareKeySecurityDomain:
460
+ kPS190FirmwareKeyBoardID:
461
+ kPS190FirmwareKeyFirmwareData:
462
+ info:
463
+ kPS190DeviceInfoKeyApplicationProcessorInfo:
464
+ kPS190DeviceInfoKeyFWFeatureConfig:
465
+ kPS190DeviceInfokeyUseHDCPEntitlement:
466
+ kPS190DeviceInfoKeyDebugEnableOverride:
467
+ kPS190DeviceInfoKeyTagNumber:
468
+ kPS190DeviceInfoKeyTicketName:
469
+ kPS190DeviceInfoKeyAuthlistFormattedECID:
470
+ kPS190DeviceInfoKeyNeedsOTPProgramming:
471
+ kPS190DeviceInfoKeyRequiresPersonalization:
472
+ kPS190DeviceInfoKeySecurityMode:
473
+ kPS190DeviceInfoKeySecurityDomain:
474
+ kPS190DeviceInfoKeyRealHDCPKeysPresent:
475
+ kPS190DeviceInfoKeyProductionMode:
476
+ kPS190DeviceInfoKeyNonce:
477
+ kPS190DeviceInfokeyECID:
478
+ kPS190DeviceInfoKeyDebugDisable:
479
+ kPS190DeviceInfoKeyChipID:
480
+ kPS190DeviceInfoKeyCertificateEpoch:
481
+ kPS190DeviceInfoKeyBoardID:
482
+ kPS190DeviceInfoKeyHardwareID:
483
+ kPS190DeviceInfoKeyInfoArray:
484
+ Rose:
436
485
  tags:
437
- kAMAuthInstallTagEuiccCSN:
438
- kAMAuthInstallTagEuiccMainNonce:
439
- kAMAuthInstallTagEuiccGoldNonce:
440
- kAMAuthInstallTagEuiccTicketVersion:
441
- kAMAuthInstallTagEuiccCertIdentifier:
442
- kAMAuthInstallTagEuiccSignedTicketMain:
443
- kAMAuthInstallTagEuiccSignedTicketGold:
444
- kAMAuthInstallTagEuiccChipID:
445
- kAMAuthInstallTagEuiccFirmwareLoaderVersion:
446
- kAMAuthInstallTagEuiccSignedProfileMain:
447
- kAMAuthInstallTagEuiccSignedProfileGold:
486
+ kRoseTagDigest:
487
+ kRoseTagMeasurementRTKitOS:
488
+ kRoseTagMeasurementSwBinDsp1:
489
+ options:
490
+ kRoseSwDsp1:
491
+ kRoseRtkitos:
492
+ kRoseRestoreRtkitos:
493
+ kRoseRtkitosICNF:
448
494
  Savage:
449
495
  description:
450
496
  options:
@@ -475,8 +521,6 @@ secondary_cores:
475
521
  kSavageReturnTagsInTssResponse:
476
522
  kSavageBuildIdentityInfoKey:
477
523
  kSavageBuildIdentityPathKey:
478
-
479
-
480
524
  tags:
481
525
  kSavageTagRequestTicket:
482
526
  kSavageTagResponseTicket:
@@ -524,96 +568,6 @@ secondary_cores:
524
568
  kSavageTagMeasurementBFProdPatchVT:
525
569
  kSavageMeasurementDictPatch:
526
570
  kSavageMeasurementDictPatchVT:
527
- Veridian:
528
- type: arm7m
529
- is_rtkit: false
530
- stack_size: 24576
531
- ram_base: 536870912
532
- mmio_base: 1073741824
533
- Vinyl:
534
- description: |
535
- the eUICC or eSIM Contains a ZIP file with various hash specifiers, each containing two directories. One `recovery` is seemingly empty (strange as this would imply a bad eUICC can never be recovered but also is consistent with observed behaviour of a eSIM surviving DFU recovery). Update seems to contain two folders "main" and "gold".
536
- These folders contain a `firmware.der` as well as a `profile.bin`
537
- These folders contain a number of "root keys" as defined in the eUICC spec.
538
- firmware_packing:
539
- - zip
540
- Yonkers:
541
- description:
542
- options:
543
- kYonkersPreflightRequiredOption:
544
- kYonkersOptions:
545
- kYonkersSkipOption:
546
- kYonkersFirmwareData:
547
- kYonkersTagRequestTicket:
548
- kYonkersTagResponseTicket:
549
- kYonkersDeviceInfo:
550
- kYonkersTagDeviceBoardID:
551
- kYonkersTagDeviceChipID:
552
- kYonkersTagDeviceNonce:
553
- kYonkersTagDeviceECID:
554
- kYonkersTagDeviceFabRevision:
555
- kYonkersTagDeviceProductionMode:
556
- kYonkersTagDeviceRootPublicKeyIdentifier:
557
- kYonkersTagPatchEpoch:
558
- kYonkersTagSepObject:
559
- kYonkersTagReadECKey:
560
- kYonkersTagWriteECKey:
561
- kYonkersTagWriteECID:
562
- kYonkersTagWriteEpoch:
563
- kYonkersTagReadGID:
564
- kYonkersTagReadFWKey:
565
- kYonkersTagAllowOfflineBoot:
566
- kYonkersTagTempDemote:
567
- kYonkersTagAccessSensor:
568
- kYonkersTagAccessSecurity:
569
- kYonkersTagFADemote:
570
- kYonkersTagDebugStatus:
571
- kYonkersTagProvisioning:
572
- Rose:
573
- tags:
574
- kRoseTagDigest:
575
- kRoseTagMeasurementRTKitOS:
576
- kRoseTagMeasurementSwBinDsp1:
577
- options:
578
- kRoseSwDsp1:
579
- kRoseRtkitos:
580
- kRoseRestoreRtkitos:
581
- kRoseRtkitosICNF:
582
- PS190:
583
- options:
584
- kPS190SecurityDomainTagFormat:
585
- kPS190BoardIDTagFormat:
586
- kPS190FirmwareTagFormat:
587
- kPS190SecurityDomainTagSuffix:
588
- kPS190BoardIDTagSuffix:
589
- kPS190FirmwareTagSuffix:
590
- kPS190TagNameFormatString:
591
- kPS190TicketNameFormatString:
592
- kPS190FirmwareKeySecurityDomain:
593
- kPS190FirmwareKeyBoardID:
594
- kPS190FirmwareKeyFirmwareData:
595
- info:
596
- kPS190DeviceInfoKeyApplicationProcessorInfo:
597
- kPS190DeviceInfoKeyFWFeatureConfig:
598
- kPS190DeviceInfokeyUseHDCPEntitlement:
599
- kPS190DeviceInfoKeyDebugEnableOverride:
600
- kPS190DeviceInfoKeyTagNumber:
601
- kPS190DeviceInfoKeyTicketName:
602
- kPS190DeviceInfoKeyAuthlistFormattedECID:
603
- kPS190DeviceInfoKeyNeedsOTPProgramming:
604
- kPS190DeviceInfoKeyRequiresPersonalization:
605
- kPS190DeviceInfoKeySecurityMode:
606
- kPS190DeviceInfoKeySecurityDomain:
607
- kPS190DeviceInfoKeyRealHDCPKeysPresent:
608
- kPS190DeviceInfoKeyProductionMode:
609
- kPS190DeviceInfoKeyNonce:
610
- kPS190DeviceInfokeyECID:
611
- kPS190DeviceInfoKeyDebugDisable:
612
- kPS190DeviceInfoKeyChipID:
613
- kPS190DeviceInfoKeyCertificateEpoch:
614
- kPS190DeviceInfoKeyBoardID:
615
- kPS190DeviceInfoKeyHardwareID:
616
- kPS190DeviceInfoKeyInfoArray:
617
571
  SecureEnclaveProcessor:
618
572
  options:
619
573
  kSEOptionDebugSESA:
@@ -663,63 +617,100 @@ secondary_cores:
663
617
  kSETagMeasurementUpdatePayload:
664
618
  kSETagMeasurementDevHash:
665
619
  kSETagMeasurementProdHash:
666
- kT200:
667
- kT200CertificationURL:
668
- kT200PersonalizationOption;:
669
- kT200RestoreSystemPartition:
670
- kT200SkipFirmwareMapStore:
671
- kT200TagRequestFirmwareTicket:
672
- kT200TagResponseFirmwareTicket:
673
- kT200DeviceInfoChipID:
674
- kT200DeviceInfoNonce:
675
- kT200DeviceInfoUniqueID:
676
- kT200DeviceInfoRevision:
677
- kT200DeviceInfoProductionMode:
678
- kT200DeviceInfoUpdateType:
679
- kT200DeviceInfoChemistryID:
680
- kT200DeviceInfoLocalSigningID:
681
- kT200DeviceHWVersion:
682
- kT200UpdaterOptions:
683
- kT200TagChipID:
684
- kT200TagBoardID:
685
- kT200TagNonce:
686
- kT200TagUniqueID:
687
- kT200TagRevision:
688
- kT200TagProductionMode:
689
- kT200TagCertificateEpoch:
690
- kT200TagFAEnable:
691
- kT200TagVNVEnable:
692
- kT200TagFWOverWrite:
693
- kT200TagEFFV:
694
- kT200TagFAEnableOption:
695
- kT200TagVNVEnableOption:
696
- kT200TagFWSkipSameVersion:
697
- kT200TagRollbackFWVer:
698
- kT200TagPreflight:
699
- kT200TagMeasurementFirmware:
700
- kT200TagMeasurementFirmwarePlist:
701
- kT200TagDerFirmwarePlist:
702
- kT200TagBoardId:
703
- kT200MeasurementDictFirmware:
704
- kT200DigestDERDictFirmware:
705
- kT200TagMeasurementDigest:
706
- kT200OptionDebugArgs:
707
- kT200OptionUpdateType:
708
- kT200OptionFirmwareData:
709
- kT200OptionFirmwareIsOverride:
710
- kT200OptionOptions:
711
- kT200OptionRestoreInternal:
712
- kT200OptionDeviceInfo:
713
- kT200OptionBuildIdentity:
714
- kT200OptionTicket:
715
- kT200OptionRequest:
716
- kT200OptionSourceBundlePath:
717
- kT200OptionDestBundlePath:
718
- kT200ReturnTagsInBI:
719
- kT200ReturnTagsInTssResponse:
720
- kT200BuildIdentityInfoKey:
721
- kT200BuildIdentityPathKey:
722
-
620
+ TCON:
621
+ options:
622
+ kAppleTCONCommonIORegPropProdFuseValue:
623
+ kAppleTCONCommonIORegPropNonce:
624
+ kAppleTCONCommonIORegPropECID:
625
+ kAppleTCONCommonIORegPropPRODStatus:
626
+ kAppleTCONCommonIORegPropSDOMStatus:
627
+ kAppleTCONCommonIORegPropFirmwareVer:
628
+ kAppleTCONCommonIORegPropBundleVer:
629
+ kAppleTCONCommonIORegPropDeviceID:
630
+ kAppleTCONCommonOptionFuseProd:
631
+ kAppleTCONCommonOptionFuseSDOM:
632
+ kAppleTCONCommonOptionSkipSameVersion:
633
+ kAppleTCONCommonOptionInternalBundle:
634
+ kAppleTCONCommonTagBuildIdentityPathKey:
635
+ kAppleTCONCommonTagBuildIdentityInfoKey:
636
+ kAppleTCONCommonTagMeasurementDigest:
637
+ TCON2:
638
+ options:
639
+ Veridian:
640
+ type: arm7m
641
+ is_rtkit: false
642
+ stack_size: 24576
643
+ ram_base: 536870912
644
+ mmio_base: 1073741824
645
+ Vinyl:
646
+ description: |
647
+ the eUICC or eSIM Contains a ZIP file with various hash specifiers, each containing two directories. One `recovery` is seemingly empty (strange as this would imply a bad eUICC can never be recovered but also is consistent with observed behaviour of a eSIM surviving DFU recovery). Update seems to contain two folders "main" and "gold".
648
+ These folders contain a `firmware.der` as well as a `profile.bin`
649
+ These folders contain a number of "root keys" as defined in the eUICC spec.
650
+ firmware_packing:
651
+ - zip
652
+ Vynal:
653
+ options:
654
+ kAMAuthInstallPROverrideVinylFirmwareKey:
655
+ kAMAuthInstallTagVinylApProductionMode:
656
+ kAMAuthInstallTagVinylRootKeyID:
657
+ kAMAuthInstallTagVinylDigest:
658
+ kAMAuthInstallTagVinylNonce:
659
+ kAMAuthInstallTagVinylMain:
660
+ kAMAuthInstallTagVinylGold:
661
+ kAMAuthInstallTagVinylEID:
662
+ kAMAuthInstallTagVinylChipID:
663
+ kAMAuthInstallTagVinylTicketResponse:
664
+ kAMAuthInstallTagVinylTicket:
665
+ kAMAuthInstallVinylIm4pVersion:
666
+ kAMAuthInstallVinyl4CCManpMain:
667
+ kAMAuthInstallVinyl4CCManpGold:
668
+ kAMAuthInstallTagVinylVendorAuthDataGold:
669
+ kAMAuthInstallTagVinylVendorAuthDataMain:
670
+ kAMAuthInstallTagVinylFwLoaderVersionPlist:
671
+ kAMAuthInstallTagVinylRootKeyIdentifierPlist:
672
+ x86:
673
+ options:
674
+ kAMAuthInstallTagX86ProductionMode:
675
+ kAMAuthInstallTagX86SecurityMode:
676
+ kAMAuthInstallTagX86Nonce:
677
+ kAMAuthInstallTagX86UseGlobalSigning:
678
+ kAMAuthInstallTagX86AllowMixAndMatch:
679
+ kAMAuthInstallTagX86OSLongVersion:
680
+ kAMAuthInstallTagX86Img4Ticket:
681
+ kAMAuthInstallTagX86RequestImg4Ticket:
682
+ Yonkers:
683
+ description:
684
+ options:
685
+ kYonkersPreflightRequiredOption:
686
+ kYonkersOptions:
687
+ kYonkersSkipOption:
688
+ kYonkersFirmwareData:
689
+ kYonkersTagRequestTicket:
690
+ kYonkersTagResponseTicket:
691
+ kYonkersDeviceInfo:
692
+ kYonkersTagDeviceBoardID:
693
+ kYonkersTagDeviceChipID:
694
+ kYonkersTagDeviceNonce:
695
+ kYonkersTagDeviceECID:
696
+ kYonkersTagDeviceFabRevision:
697
+ kYonkersTagDeviceProductionMode:
698
+ kYonkersTagDeviceRootPublicKeyIdentifier:
699
+ kYonkersTagPatchEpoch:
700
+ kYonkersTagSepObject:
701
+ kYonkersTagReadECKey:
702
+ kYonkersTagWriteECKey:
703
+ kYonkersTagWriteECID:
704
+ kYonkersTagWriteEpoch:
705
+ kYonkersTagReadGID:
706
+ kYonkersTagReadFWKey:
707
+ kYonkersTagAllowOfflineBoot:
708
+ kYonkersTagTempDemote:
709
+ kYonkersTagAccessSensor:
710
+ kYonkersTagAccessSecurity:
711
+ kYonkersTagFADemote:
712
+ kYonkersTagDebugStatus:
713
+ kYonkersTagProvisioning:
723
714
  other:
724
715
  keys:
725
716
  KeyCellIDSkip:
data/share/fdr.yaml CHANGED
@@ -4,6 +4,35 @@ metadata:
4
4
  credits:
5
5
  collections:
6
6
  - fdr_properties
7
+ fdr_modes:
8
+ '':
9
+ description: Objects for the device directly, indicates no factory process or
10
+ mode in use.
11
+ mansta:
12
+ description: The "Management Station", or factory station being used to configure
13
+ a device at an Apple factory using factory tooling and images
14
+ mandev:
15
+ description: The "Managed Device", or the device attached to the `mansta` to be
16
+ configured or tested at a factory
17
+ fdr_objects:
18
+ trst:
19
+ description: The trust object establishes the signing root for FDR objects, the
20
+ SSL CA for connections to FDR, the set of revoked keys, as well as trusted public
21
+ keys
22
+ fCfg:
23
+ eCfg:
24
+ dCfg:
25
+ appv:
26
+ ADCL:
27
+ FSCl:
28
+ HmCA:
29
+ hop0:
30
+ lcrt:
31
+ NvMR:
32
+ sePk:
33
+ pcrt:
34
+ scrt:
35
+ seal:
7
36
  fdr_properties:
8
37
  ADCL:
9
38
  description: Raw Panel / Coverglass
data/share/img4.yaml CHANGED
@@ -12,6 +12,62 @@ metadata:
12
12
  - core
13
13
  - types
14
14
  - cryptex_properties
15
+ unmapped:
16
+ - ApRelaxedImageVerification
17
+ - "@BCert"
18
+ - "@Managed"
19
+ - "@AlternateSU"
20
+ - Ap,UseGlobalSigning
21
+ - AllowNeRDBoot
22
+ - NeRDEpoch
23
+ - PermitNeRDPivot
24
+ - Ap,OSEnvironment
25
+ - Ap,CurrentOSSecurityVersion
26
+ - Ap,MinimumOSSecurityVersion
27
+ - Ap,EnableGroundhog
28
+ - Ap,SoftwareUpdateDeviceID
29
+ - ApCertificateEpoch
30
+ - ApLeafCertStatus
31
+ - BuildString
32
+ - Name
33
+ - UID_MODE
34
+ - "@Cryptex1,Ticket"
35
+ - Cryptex1,Ticket
36
+ - Cryptex1,ChipID
37
+ - Cryptex1,ProductClass
38
+ - Cryptex1,UseProductClass
39
+ - Cryptex1,Nonce
40
+ - Cryptex1,NonceDomain
41
+ - Cryptex1,ProductionMode
42
+ - Cryptex1,UseGlobalSigning
43
+ - Cryptex1,Version
44
+ - Cryptex1,FakeRoot
45
+ - PearlCertificationRootPub
46
+ - x86,ProductionMode
47
+ - x86,SecurityMode
48
+ - x86,Nonce
49
+ - x86,UseGlobalSigning
50
+ - x86,AllowMixAndMatch
51
+ - x86,OSLongVersion
52
+ - x86,Ticket
53
+ - "@x86,Ticket"
54
+ - "@Locality"
55
+ - "@BBTicket"
56
+ - BbSNUM
57
+ - BbGoldCertId
58
+ - BbSkeyId
59
+ - BbNonce
60
+ - BpApBindingDigest
61
+ - BbServerNonce
62
+ - BbVendorData
63
+ - BbFieldDiagsEnable
64
+ - "@EUICCTicket"
65
+ - EuiccMainTicket
66
+ - EuiccGoldTicket
67
+ - EUICCSignedProfileMain
68
+ - EUICCSignedProfileGold
69
+ - BbAntennaType
70
+ - BbBehavior
15
71
  core:
16
72
  IM4M:
17
73
  description: Image4 Manifest Object (No payload, only manifest). IM4M, verion,
@@ -29,6 +85,7 @@ core:
29
85
  OBJP:
30
86
  description: Object Properties - Values that may be assigned per "object" (firmwares)
31
87
  that contain a `DGST`
88
+ name: ObjectPayloadPropertyDigest
32
89
  type: sequence
33
90
  types:
34
91
  digest-object:
@@ -38,7 +95,9 @@ types:
38
95
  additional properties per object, some of which are standard and others that
39
96
  are object specific.
40
97
  common_properties:
41
- DGST: The cryptographic digest of the object
98
+ DGST:
99
+ description: The cryptographic digest of the object
100
+ name: Digest
42
101
  EKEY:
43
102
  description: Effective Key Access - The effective access to teh SEP, used
44
103
  to protect data during demotion. Effective chip promoted
@@ -101,6 +160,7 @@ types:
101
160
  with a `secb` object with a `trst` object), `rssl` (Factory SSL root CA),
102
161
  `rvok` (Revocation list) and `trpk` (trusted public keys?)
103
162
  lpol_properties:
163
+ AMNM:
104
164
  auxi:
105
165
  title: Auxiliary Image4 Manifest Hash (`auxi`)
106
166
  description: After the system verifies that the UAKL hash matches what’s found
@@ -151,6 +211,15 @@ lpol_properties:
151
211
  access:
152
212
  write:
153
213
  - macOS
214
+ bat0:
215
+ bat1:
216
+ batf:
217
+ BNCH:
218
+ BORD:
219
+ CEPO:
220
+ chg0:
221
+ chg1:
222
+ CHIP:
154
223
  coih:
155
224
  title: CustomOS Image4 Manifest Hash (coih)
156
225
  description: The `coih` is an SHA384 hash of CustomOS Image4 manifest. The payload
@@ -162,8 +231,20 @@ lpol_properties:
162
231
  access:
163
232
  write:
164
233
  - 1TR
234
+ CPRO:
235
+ CSEC:
236
+ DGST:
237
+ diag:
238
+ DPRO:
239
+ DSEC:
240
+ dtre:
241
+ ECID:
242
+ EPRO:
243
+ ESEC:
165
244
  gaid:
166
245
  description: Gaia Authentication ID (Apple Internal)
246
+ glyc:
247
+ glyp:
167
248
  hrlp:
168
249
  title: Has Secure Enclave Signed recoveryOS Local Policy (hrlp)
169
250
  description: The `hrlp` indicates whether or not the `prot` value is the measurement
@@ -176,6 +257,9 @@ lpol_properties:
176
257
  - 1TR
177
258
  - recoveryOS
178
259
  - macOS
260
+ ibot:
261
+ illb:
262
+ krnl:
179
263
  kuid:
180
264
  title: Key encryption key (KEK) Group UUID (kuid)
181
265
  description: The kuid indicates the volume that was booted. The key encryption
@@ -189,10 +273,13 @@ lpol_properties:
189
273
  - 1TR
190
274
  - recoveryOS
191
275
  - macOS
276
+ LCST:
277
+ LNCH:
192
278
  lobo:
193
279
  description: Local Boot Object. Indicates that the object is to be used as the
194
280
  target of a local boot only and not provided by the server for remote / DFU
195
281
  boots.
282
+ logo:
196
283
  lpnh:
197
284
  title: LocalPolicy Nonce Hash (lpnh)
198
285
  description: The lpnh is used for anti-replay of the LocalPolicy. This is an SHA384
@@ -228,6 +315,7 @@ lpol_properties:
228
315
  intention of what operating system the user has created a LocalPolicy for. Users
229
316
  change the nsih value implicitly when they perform a software update.
230
317
  type: binary
318
+ name: Ap,NextStageCryptex1IM4MHash
231
319
  subtype: sha2-384
232
320
  context:
233
321
  lpol:
@@ -236,6 +324,7 @@ lpol_properties:
236
324
  - 1TR
237
325
  - recoveryOS
238
326
  - macOS
327
+ nsrv:
239
328
  prot:
240
329
  title: Paired recoveryOS Trusted Boot Policy Measurement (prot)
241
330
  description: A paired recoveryOS Trusted Boot Policy Measurement (TBPM) is a special
@@ -251,6 +340,8 @@ lpol_properties:
251
340
  - 1TR
252
341
  - recoveryOS
253
342
  - macOS
343
+ recm:
344
+ RNCH:
254
345
  rolp:
255
346
  description: recoveryOS local policy
256
347
  type: boolean
@@ -285,6 +376,9 @@ lpol_properties:
285
376
  - 1TR
286
377
  - recoveryOS
287
378
  - macOS
379
+ rsep:
380
+ SDOM:
381
+ sepi:
288
382
  sip0:
289
383
  title: System Integrity Protection (SIP) 0 Status - Overall
290
384
  description: The sip0 holds the existing System Integrity Protection (SIP) policy
@@ -324,10 +418,13 @@ lpol_properties:
324
418
  description: Secure Multi-Boot 3 - DEP-allowed MDM Control
325
419
  smb5:
326
420
  description: Unknown - but known to exist in Factory signing
421
+ snon:
327
422
  snuf:
328
423
  description: Software Nonce For Update Freshness
329
424
  spih:
330
425
  description: Cryptex1 Image4 Hash
426
+ tbmr:
427
+ tbms:
331
428
  vuid:
332
429
  title: APFS volume group UUID (vuid)
333
430
  description: The vuid indicates the volume group the kernel should use as root.
@@ -373,12 +470,14 @@ cryptex_properties:
373
470
  pave:
374
471
  description: Pre-authorization Version (XNU) The version of a pre-authorized Cryptex.
375
472
  type: string
473
+ name: Cryptex1,PreauthorizationVersion
376
474
  roots:
377
475
  - ExtraContent
378
476
  snuf:
379
477
  description: SoftwareNonceForUpdateFreshness
380
478
  styp:
381
479
  description: Crytpex Subtype
480
+ name: Cryptex1,SubType
382
481
  type: u32
383
482
  alias:
384
483
  - cryptex subtype
@@ -386,10 +485,12 @@ cryptex_properties:
386
485
  - ExtraContent
387
486
  type:
388
487
  description: Cryptex Type
488
+ name: Cryptex1,Type
389
489
  type: integer
390
490
  roots:
391
491
  - ExtraContent
392
492
  UDID:
493
+ name: Cryptex1,UDID
393
494
  description: universal device identifier
394
495
  vnum:
395
496
  description: Version Number - Update Maximum
@@ -539,8 +640,10 @@ manifest_properties:
539
640
  description: Internal Use Only Software
540
641
  iuou:
541
642
  description: Internal Use Only Unit
643
+ name: Ap,InternalUseOnlyUnit
542
644
  LNCH:
543
645
  description: Local Policy Next Cryptographic Hash
646
+ name: ApLocalNonceHash
544
647
  love:
545
648
  title: Long Operating System Version (love)
546
649
  description: The love indicates the OS version that the LocalPolicy is created
@@ -548,6 +651,7 @@ manifest_properties:
548
651
  creation and is used to enforce recoveryOS pairing restrictions.
549
652
  type: string
550
653
  example: 21.3.66.0.0,0
654
+ name: Ap,OSLongVersion
551
655
  access:
552
656
  write:
553
657
  - 1TR
@@ -557,6 +661,7 @@ manifest_properties:
557
661
  - ManifestKey-DataCenter
558
662
  lpol:
559
663
  description: Local Policy
664
+ manx:
560
665
  mmap:
561
666
  description: Memory Map
562
667
  Mod#:
@@ -567,6 +672,7 @@ manifest_properties:
567
672
  prtp:
568
673
  description: Product Type String
569
674
  type: string
675
+ name: Ap,ProductType
570
676
  example: iPhone16,2
571
677
  roots:
572
678
  - ManifestKey-DataCenter
@@ -589,9 +695,18 @@ manifest_properties:
589
695
  description: Research mode
590
696
  rsch:
591
697
  description: research mode
698
+ rso0:
699
+ name: Ap,RestoreSecurityOverrides0
700
+ rso1:
701
+ name: Ap,RestoreSecurityOverrides1
702
+ rso2:
703
+ name: Ap,RestoreSecurityOverrides2
704
+ rso3:
705
+ name: Ap,RestoreSecurityOverrides3
592
706
  sdkp:
593
707
  description: SDK Platform
594
708
  type: string
709
+ name: Ap,SDKPlatform
595
710
  roots:
596
711
  - ManifestKey-DataCenter
597
712
  values:
@@ -613,11 +728,12 @@ manifest_properties:
613
728
  seid:
614
729
  description: Secure Enclave ID - Root Domain
615
730
  sika:
616
- description: System Identity Key Access
731
+ description: System Identity Key Access/Attestation?
732
+ name: Ap,SikaFuse
617
733
  SNON:
618
734
  description: SEP Nonce
619
735
  snon:
620
- description: SEP Nonce
736
+ description: SEP Nonce (Yes it differs by case)
621
737
  SrNm:
622
738
  description: Unit Serial Number
623
739
  manifest: true
@@ -630,6 +746,7 @@ manifest_properties:
630
746
  description: Server nonce
631
747
  tatp:
632
748
  description: Target Type (board name)
749
+ name: Ap,TargetType
633
750
  roots:
634
751
  - ManifestKey-DataCenter
635
752
  TMac:
@@ -903,12 +1020,14 @@ img4_tags:
903
1020
  description:
904
1021
  aciw:
905
1022
  description:
1023
+ adba:
906
1024
  ADCL:
907
1025
  description: Apple Display Calibration
908
1026
  ader:
909
1027
  description:
910
1028
  agfi:
911
1029
  description:
1030
+ anid:
912
1031
  anrd:
913
1032
  description: Apple Notarized Ram Disk
914
1033
  aofi:
@@ -921,10 +1040,13 @@ img4_tags:
921
1040
  description:
922
1041
  auac:
923
1042
  description:
1043
+ batf:
1044
+ berb:
924
1045
  BLDS:
925
1046
  description: Boot LocalPolicy Digest String?
926
1047
  bles:
927
1048
  description:
1049
+ BNCN:
928
1050
  cfel:
929
1051
  description:
930
1052
  firmware_name: CFELoader
@@ -969,6 +1091,7 @@ img4_tags:
969
1091
  description: Emulated GID3 Nonce
970
1092
  eg3t:
971
1093
  description: Emulated GID3 Type
1094
+ eply:
972
1095
  esca:
973
1096
  description: Emulated System Certificate Authority
974
1097
  fdrs:
@@ -983,10 +1106,15 @@ img4_tags:
983
1106
  description:
984
1107
  ftot:
985
1108
  description: Factory Trust/FIPS Test? - Other / Original Trust
1109
+ fuos:
1110
+ gdmg:
1111
+ ginf:
986
1112
  ging:
987
1113
  description:
988
1114
  glyc:
989
1115
  description: Gyroscope Calibration
1116
+ gtcd:
1117
+ gtgv:
990
1118
  hash:
991
1119
  description:
992
1120
  hclo:
@@ -1016,6 +1144,7 @@ img4_tags:
1016
1144
  description: Locker - Used for Effaceable Storage end Obliteration
1017
1145
  lphp:
1018
1146
  description: Local Policy Hash Protection?
1147
+ lpol:
1019
1148
  ltrs:
1020
1149
  description: Local TrustStore Recovery System?
1021
1150
  manx:
@@ -1044,7 +1173,8 @@ img4_tags:
1044
1173
  ooth:
1045
1174
  description: Other OS Translator (Rosetta) Hash?
1046
1175
  osev:
1047
- description: Other System (Rosetta) Environment?
1176
+ description: Operating System Environment
1177
+ name: Ap,OSEnvironment
1048
1178
  osrd:
1049
1179
  description: Other System (Rosetta) Ramdisk?
1050
1180
  otes:
@@ -1069,26 +1199,22 @@ img4_tags:
1069
1199
  description:
1070
1200
  prid:
1071
1201
  description: Encrypted Private Key / Private Key Info / Private Recovery Identity?
1202
+ prot:
1072
1203
  ptrp:
1073
1204
  rbmt:
1074
1205
  description: Restore Boot Monitor?
1075
1206
  firmware_name: RBM
1076
1207
  rddg:
1077
1208
  description: Ramdisk for Debugging
1078
- rso0:
1079
- description:
1080
- rso1:
1081
- description:
1082
- rso2:
1083
- description:
1084
- rso3:
1085
- description:
1209
+ refk:
1086
1210
  rtpf:
1087
1211
  description:
1088
1212
  slvn:
1089
1213
  description:
1214
+ snid:
1090
1215
  SPTM:
1091
1216
  description: Secure Page Table Monitor
1217
+ srvn:
1092
1218
  ssca:
1093
1219
  description: SEP Subject Certificate Authority?
1094
1220
  ster:
@@ -1117,3 +1243,54 @@ img4_tags:
1117
1243
  description: VMWare?
1118
1244
  xugs:
1119
1245
  description: x64 User System Disk
1246
+ der:
1247
+ uikp:
1248
+ description: UIK Public
1249
+ kid:
1250
+ description: Key UUID
1251
+ aonm:
1252
+ description: AON Mask
1253
+ rkm:
1254
+ description: Ref Key Mask / Key Ref MAC (message authentication code)
1255
+ bid:
1256
+ description: Key BID
1257
+ cpo:
1258
+ description: Key ACL Constraint Policy
1259
+ ckon:
1260
+ description: Key ACL Constraint K of N (Shamir Key Split)
1261
+ cup:
1262
+ description: Key ACL Constraint User Passcode
1263
+ kv:
1264
+ description: Key Version
1265
+ kt:
1266
+ description: Key Type
1267
+ pub:
1268
+ description: Public Key
1269
+ id:
1270
+ description: Key ID
1271
+ ag:
1272
+ description: Access Groups
1273
+ p:
1274
+ description: Passcode
1275
+ iter:
1276
+ description: Iterations (Hash Rounds)
1277
+ acmh:
1278
+ description: ACM (Apple Credential Manager) Handle
1279
+ wk:
1280
+ description: Wrapped Key
1281
+ pad:
1282
+ description: Key Padding (Block alignment bytes)
1283
+ tag:
1284
+ description: Key Tag
1285
+ ed:
1286
+ description: External Data
1287
+ pd:
1288
+ description: Protected Data
1289
+ ad:
1290
+ description: Authentication Data
1291
+ d:
1292
+ description: Data
1293
+ bc:
1294
+ description: Keybag Class
1295
+ rk:
1296
+ description: Key Ref Key
@@ -0,0 +1,6 @@
1
+ ---
2
+ metadata:
3
+ description: The Apple Secure Multi-Boot Schema (Apple Silicon Only) and Local Policy
4
+ System
5
+ credits:
6
+ - rickmark
data/share/sip.yaml CHANGED
@@ -21,15 +21,16 @@ csr_flags:
21
21
  always_enforced: true
22
22
  CSR_ALLOW_APPLE_INTERNAL:
23
23
  value: 16
24
- description:
24
+ description: Allows for AppleInternal (non-production signed code)
25
25
  disable_default: true
26
26
  CSR_ALLOW_DEVICE_CONFIGURATION:
27
27
  value: 128
28
- description:
28
+ description: This indicates that the device is booted into a mode whereby `bputil`
29
+ will allow changes
29
30
  always_enforced: true
30
31
  CSR_ALLOW_EXECUTABLE_POLICY_OVERRIDE:
31
32
  value: 1024
32
- description: override spctl or executable policy
33
+ description: override trust-cache or executable policy
33
34
  CSR_ALLOW_KERNEL_DEBUGGER:
34
35
  value: 8
35
36
  description: allow using the kernel debugger (KDP) - requires configuring the
@@ -37,14 +38,14 @@ csr_flags:
37
38
  disable_default: true
38
39
  CSR_ALLOW_TASK_FOR_PID:
39
40
  value: 4
40
- description: allow getting the pid task, required for debugging
41
+ description: allow getting the pid task, required for privileged debugging
41
42
  disable_default: true
42
43
  CSR_ALLOW_UNAPPROVED_KEXTS:
43
44
  value: 512
44
45
  description: do not require kext approval (managed in the T2 when it exists)
45
46
  CSR_ALLOW_UNAUTHENTICATED_ROOT:
46
47
  value: 2048
47
- description:
48
+ description: Permits the root filesystem to lack SSV (signed system volume) protection
48
49
  CSR_ALLOW_UNRESTRICTED_DTRACE:
49
50
  aliases:
50
51
  - CSR_ALLOW_DESTRUCTIVE_DTRACE
@@ -64,3 +65,36 @@ csr_flags:
64
65
  value: 1
65
66
  description: allow loading kernel extensions that are not signed
66
67
  disable_default: true
68
+ csrutil:
69
+ flags:
70
+ "--no-internal":
71
+ "--with":
72
+ "--without":
73
+ options:
74
+ basesystem:
75
+ name: BaseSystem Verification
76
+ flag: CSR_ALLOW_ANY_RECOVERY_OS
77
+ nvram:
78
+ name: NVRAM Protections
79
+ flag: CSR_ALLOW_UNRESTRICTED_NVRAM
80
+ debug:
81
+ name:
82
+ flag: CSR_ALLOW_KERNEL_DEBUGGER
83
+ dtrace:
84
+ name: DTrace Restrictions
85
+ flag: CSR_ALLOW_UNRESTRICTED_DTRACE
86
+ fs:
87
+ name: Filesystem Protections
88
+ flag: CSR_ALLOW_UNRESTRICTED_FS
89
+ kext:
90
+ name: Kext Signing
91
+ flag: CSR_ALLOW_UNTRUSTED_KEXTS
92
+ commands:
93
+ status:
94
+ description: Shows
95
+ enable:
96
+ disable:
97
+ netboot:
98
+ report:
99
+ authenticated-root:
100
+ verify-factory-sip:
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: apple-data
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.628
4
+ version: 1.0.629
5
5
  platform: ruby
6
6
  authors:
7
7
  - Rick Mark
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-03-09 00:00:00.000000000 Z
11
+ date: 2024-03-11 00:00:00.000000000 Z
12
12
  dependencies: []
13
13
  description: |2
14
14
  This package includes machine readable data about Apple platforms maintained by hack-different.
@@ -251,6 +251,7 @@ files:
251
251
  - share/keys.yaml
252
252
  - share/launchd/services_bridgeOS_6.1.yaml
253
253
  - share/lightning.yaml
254
+ - share/local_policy.yaml
254
255
  - share/lockdownd.yaml
255
256
  - share/mach_o.yaml
256
257
  - share/mobile_assets.yaml