tpm-key_attestation 0.5.0 → 0.10.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.rspec +1 -1
- data/.rubocop.yml +0 -3
- data/.travis.yml +21 -8
- data/Appraisals +4 -0
- data/CHANGELOG.md +43 -0
- data/Gemfile +2 -3
- data/Gemfile.lock +21 -17
- data/README.md +4 -3
- data/gemfiles/openssl_2_0.gemfile +3 -2
- data/gemfiles/openssl_2_1.gemfile +3 -2
- data/gemfiles/openssl_2_2.gemfile +12 -0
- data/gemfiles/openssl_default.gemfile +3 -2
- data/gemfiles/openssl_head.gemfile +3 -2
- data/install-openssl.sh +3 -0
- data/install-ruby.sh +10 -0
- data/lib/tpm/{ek_certificate.rb → aik_certificate.rb} +56 -29
- data/lib/tpm/certificates/AMD/RootCA/AMD-fTPM-ECC-RootCA.crt +0 -0
- data/lib/tpm/certificates/AMD/RootCA/AMD-fTPM-RSA-RootCA.crt +0 -0
- data/lib/tpm/certificates/Atmel/RootCA/Atmel TPM Root Signing Module.der +0 -0
- data/lib/tpm/certificates/Infineon/RootCA/IFX TPM EK Root CA.cer +0 -0
- data/lib/tpm/certificates/Infineon/RootCA/IFX-RootCA.cer +0 -0
- data/lib/tpm/certificates/Infineon/RootCA/IFX_TPM_RootCert_008.crt +0 -0
- data/lib/tpm/certificates/Infineon/RootCA/Infineon OPTIGA(TM) ECC Root CA.crt +0 -0
- data/lib/tpm/certificates/Infineon/RootCA/Infineon OPTIGA(TM) RSA Root CA.crt +0 -0
- data/lib/tpm/certificates/Intel/RootCA/EKRootPublicKey.cer +0 -0
- data/lib/tpm/certificates/Microsoft/RootCA/Microsoft TPM Root Certificate Authority 2014.cer +0 -0
- data/lib/tpm/certificates/NationZ/RootCA/EkRootCA.crt +15 -0
- data/lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA 01.cer +0 -0
- data/lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA 02.cer +0 -0
- data/lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA ARSUF 01.cer +0 -0
- data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1013.cer +0 -0
- data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1014.cer +0 -0
- data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1110.cer +0 -0
- data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1111.cer +0 -0
- data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2010.cer +0 -0
- data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2011.cer +0 -0
- data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2110.cer +0 -0
- data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2111.cer +0 -0
- data/lib/tpm/certificates/QC/RootCA/Microsoft TPM Root Certificate Authority 2014.cer +0 -0
- data/lib/tpm/certificates/STMicro/RootCA/GlobalSign Trusted Computing CA.crt +0 -0
- data/lib/tpm/certificates/STMicro/RootCA/GlobalSign Trusted Platform Module ECC Root CA.crt +0 -0
- data/lib/tpm/certificates/STMicro/RootCA/ST TPM Root Certificate.crt +0 -0
- data/lib/tpm/certificates/STMicro/RootCA/STM TPM ECC Root CA 01.crt +0 -0
- data/lib/tpm/certify_validator.rb +41 -16
- data/lib/tpm/constants.rb +4 -0
- data/lib/tpm/key_attestation.rb +64 -10
- data/lib/tpm/key_attestation/version.rb +1 -1
- data/lib/tpm/public_area.rb +8 -0
- data/lib/tpm/s_attest/s_certify_info.rb +2 -1
- data/lib/tpm/t_public.rb +34 -16
- data/lib/tpm/tpm2b_name.rb +17 -0
- data/lib/tpm/tpmt_ha.rb +20 -0
- data/tpm-key_attestation.gemspec +1 -0
- metadata +51 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 28d7fefca9a69f2a4be0c8124bfb2721767c9c891768607473827c11df7aeaa3
|
4
|
+
data.tar.gz: 4739a10cab12236ee54f4bfacd2a182bc2c48622c5feaffd800317d1ff49228d
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b29f8eff516b2f8a8f78583b264586e9eec7c3ad31f8a351517e4b0552a39ef68be0274e83289189395a00e64aac171131252bd24c76fcd964e33a76acab436a
|
7
|
+
data.tar.gz: 69a191891d4a12c8afd4b2acd07ec9c5728506fb33e94cd34e102de1d851acbcfd7694befb6daa01981ab0e2cfaf120a9ddcae4b2d1337eb0e9a74bee485bedd
|
data/.rspec
CHANGED
data/.rubocop.yml
CHANGED
data/.travis.yml
CHANGED
@@ -1,17 +1,27 @@
|
|
1
1
|
---
|
2
2
|
dist: bionic
|
3
3
|
language: ruby
|
4
|
-
cache: bundler
|
5
4
|
|
6
|
-
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
|
11
|
-
|
5
|
+
cache:
|
6
|
+
bundler: true
|
7
|
+
directories:
|
8
|
+
- /home/travis/.rvm/
|
9
|
+
|
10
|
+
env:
|
11
|
+
- RB=2.7.1 LIBSSL=1.0
|
12
|
+
- RB=2.7.1 LIBSSL=1.1
|
13
|
+
- RB=2.6.6 LIBSSL=1.0
|
14
|
+
- RB=2.6.6 LIBSSL=1.1
|
15
|
+
- RB=2.5.8 LIBSSL=1.0
|
16
|
+
- RB=2.5.8 LIBSSL=1.1
|
17
|
+
- RB=2.4.10 LIBSSL=1.0
|
18
|
+
- RB=2.4.10 LIBSSL=1.1
|
19
|
+
- RB=ruby-head LIBSSL=1.0
|
20
|
+
- RB=ruby-head LIBSSL=1.1
|
12
21
|
|
13
22
|
gemfile:
|
14
23
|
- gemfiles/openssl_head.gemfile
|
24
|
+
- gemfiles/openssl_2_2.gemfile
|
15
25
|
- gemfiles/openssl_2_1.gemfile
|
16
26
|
- gemfiles/openssl_2_0.gemfile
|
17
27
|
- gemfiles/openssl_default.gemfile
|
@@ -19,9 +29,12 @@ gemfile:
|
|
19
29
|
matrix:
|
20
30
|
fast_finish: true
|
21
31
|
allow_failures:
|
22
|
-
-
|
32
|
+
- env: RB=ruby-head LIBSSL=1.0
|
33
|
+
- env: RB=ruby-head LIBSSL=1.1
|
23
34
|
- gemfile: gemfiles/openssl_head.gemfile
|
24
35
|
|
25
36
|
before_install:
|
37
|
+
- ./install-openssl.sh
|
38
|
+
- ./install-ruby.sh
|
26
39
|
- gem install bundler -v "~> 2.0"
|
27
40
|
- rm Gemfile.lock
|
data/Appraisals
CHANGED
data/CHANGELOG.md
CHANGED
@@ -1,5 +1,41 @@
|
|
1
1
|
# Changelog
|
2
2
|
|
3
|
+
## [v0.10.0] - 2020-07-09
|
4
|
+
|
5
|
+
### Added
|
6
|
+
|
7
|
+
- Support ECDSA with NIST P384 and P521 curves
|
8
|
+
|
9
|
+
## [v0.9.0] - 2020-05-31
|
10
|
+
|
11
|
+
### Fixed
|
12
|
+
|
13
|
+
- Fixed compatibility with OpenSSL-C (libssl) v1.0.2 ([@santiagorodriguez96])
|
14
|
+
|
15
|
+
## [v0.8.0] - 2020-03-29
|
16
|
+
|
17
|
+
### Changed
|
18
|
+
|
19
|
+
- Update `openssl-signature_algorithm` gem dependency from `v0.3` to `v0.4`.
|
20
|
+
|
21
|
+
## [v0.7.0] - 2020-02-25
|
22
|
+
|
23
|
+
### Added
|
24
|
+
|
25
|
+
- `TPM::KeyAttestation#valid?` performs certificate path validation. In other words, it verifies trust up
|
26
|
+
to an acceptable trusted root certificate.
|
27
|
+
|
28
|
+
### Changed
|
29
|
+
|
30
|
+
- Rename `TPM::EKCertificate` to `TPM::AIKCertificate` to fix semantics
|
31
|
+
|
32
|
+
## [v0.6.0] - 2020-01-30
|
33
|
+
|
34
|
+
### Changed
|
35
|
+
|
36
|
+
- `TPM::KeyAttestation.new` now accepts `signature_algorithm` and `hash_algorithm` in TPM format in
|
37
|
+
replacement of `JOSE` format `algorithm` string
|
38
|
+
|
3
39
|
## [v0.5.0] - 2020-01-23
|
4
40
|
|
5
41
|
### Added
|
@@ -31,8 +67,15 @@
|
|
31
67
|
- `TPM::EKCertificate` wrapper
|
32
68
|
- `TPM::SAttest` wrapper
|
33
69
|
|
70
|
+
[v0.10.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.9.0...v0.10.0/
|
71
|
+
[v0.9.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.8.0...v0.9.0/
|
72
|
+
[v0.8.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.7.0...v0.8.0/
|
73
|
+
[v0.7.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.6.0...v0.7.0/
|
74
|
+
[v0.6.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.5.0...v0.6.0/
|
34
75
|
[v0.5.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.4.0...v0.5.0/
|
35
76
|
[v0.4.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.3.0...v0.4.0/
|
36
77
|
[v0.3.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.2.0...v0.3.0/
|
37
78
|
[v0.2.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.1.0...v0.2.0/
|
38
79
|
[v0.1.0]: https://github.com/cedarcode/tpm-key_attestation/compare/57c926ef7e83830cee8d111fdc5ccaf99ab2e861...v0.1.0/
|
80
|
+
|
81
|
+
[@santiagorodriguez96]: https://github.com/santiagorodriguez96
|
data/Gemfile
CHANGED
data/Gemfile.lock
CHANGED
@@ -1,8 +1,9 @@
|
|
1
1
|
PATH
|
2
2
|
remote: .
|
3
3
|
specs:
|
4
|
-
tpm-key_attestation (0.
|
4
|
+
tpm-key_attestation (0.10.0)
|
5
5
|
bindata (~> 2.4)
|
6
|
+
openssl-signature_algorithm (~> 1.0)
|
6
7
|
|
7
8
|
GEM
|
8
9
|
remote: https://rubygems.org/
|
@@ -11,39 +12,42 @@ GEM
|
|
11
12
|
bundler
|
12
13
|
rake
|
13
14
|
thor (>= 0.14.0)
|
14
|
-
ast (2.4.
|
15
|
-
bindata (2.4.
|
16
|
-
byebug (11.1.
|
17
|
-
diff-lcs (1.
|
15
|
+
ast (2.4.1)
|
16
|
+
bindata (2.4.7)
|
17
|
+
byebug (11.1.3)
|
18
|
+
diff-lcs (1.4.4)
|
18
19
|
jaro_winkler (1.5.4)
|
19
|
-
|
20
|
-
|
21
|
-
|
20
|
+
openssl-signature_algorithm (1.0.0)
|
21
|
+
parallel (1.19.2)
|
22
|
+
parser (2.7.1.4)
|
23
|
+
ast (~> 2.4.1)
|
22
24
|
rainbow (3.0.0)
|
23
|
-
rake (
|
25
|
+
rake (13.0.1)
|
26
|
+
rexml (3.2.4)
|
24
27
|
rspec (3.9.0)
|
25
28
|
rspec-core (~> 3.9.0)
|
26
29
|
rspec-expectations (~> 3.9.0)
|
27
30
|
rspec-mocks (~> 3.9.0)
|
28
|
-
rspec-core (3.9.
|
29
|
-
rspec-support (~> 3.9.
|
30
|
-
rspec-expectations (3.9.
|
31
|
+
rspec-core (3.9.2)
|
32
|
+
rspec-support (~> 3.9.3)
|
33
|
+
rspec-expectations (3.9.2)
|
31
34
|
diff-lcs (>= 1.2.0, < 2.0)
|
32
35
|
rspec-support (~> 3.9.0)
|
33
36
|
rspec-mocks (3.9.1)
|
34
37
|
diff-lcs (>= 1.2.0, < 2.0)
|
35
38
|
rspec-support (~> 3.9.0)
|
36
|
-
rspec-support (3.9.
|
37
|
-
rubocop (0.
|
39
|
+
rspec-support (3.9.3)
|
40
|
+
rubocop (0.80.1)
|
38
41
|
jaro_winkler (~> 1.5.1)
|
39
42
|
parallel (~> 1.10)
|
40
43
|
parser (>= 2.7.0.1)
|
41
44
|
rainbow (>= 2.2.2, < 4.0)
|
45
|
+
rexml
|
42
46
|
ruby-progressbar (~> 1.7)
|
43
47
|
unicode-display_width (>= 1.4.0, < 1.7)
|
44
48
|
ruby-progressbar (1.10.1)
|
45
49
|
thor (1.0.1)
|
46
|
-
unicode-display_width (1.6.
|
50
|
+
unicode-display_width (1.6.1)
|
47
51
|
|
48
52
|
PLATFORMS
|
49
53
|
ruby
|
@@ -51,9 +55,9 @@ PLATFORMS
|
|
51
55
|
DEPENDENCIES
|
52
56
|
appraisal (~> 2.2.0)
|
53
57
|
byebug (~> 11.0)
|
54
|
-
rake (~>
|
58
|
+
rake (~> 13.0)
|
55
59
|
rspec (~> 3.0)
|
56
|
-
rubocop
|
60
|
+
rubocop (~> 0.80.1)
|
57
61
|
tpm-key_attestation!
|
58
62
|
|
59
63
|
BUNDLED WITH
|
data/README.md
CHANGED
@@ -2,8 +2,9 @@
|
|
2
2
|
|
3
3
|
TPM Key Attestation utitlies
|
4
4
|
|
5
|
-
[![Gem](https://img.shields.io/gem/v/tpm-key_attestation.svg?style=flat-square)](https://rubygems.org/gems/tpm-key_attestation)
|
6
|
-
[![Travis](https://img.shields.io/travis/cedarcode/tpm-key_attestation.svg?style=flat-square)](https://travis-ci.org/cedarcode/tpm-key_attestation)
|
5
|
+
[![Gem](https://img.shields.io/gem/v/tpm-key_attestation.svg?style=flat-square&color=informational)](https://rubygems.org/gems/tpm-key_attestation)
|
6
|
+
[![Travis](https://img.shields.io/travis/cedarcode/tpm-key_attestation/master.svg?style=flat-square)](https://travis-ci.org/cedarcode/tpm-key_attestation)
|
7
|
+
[![Conventional Commits](https://img.shields.io/badge/Conventional%20Commits-1.0.0-informational.svg?style=flat-square)](https://conventionalcommits.org)
|
7
8
|
|
8
9
|
## Installation
|
9
10
|
|
@@ -31,7 +32,7 @@ key_attestation =
|
|
31
32
|
certified_object,
|
32
33
|
signing_key,
|
33
34
|
quilifying_data,
|
34
|
-
|
35
|
+
signature_algorithm: TPM::ALG_RSAPSS # Supported values: TPM::ALG_RSAPSS, TPM::ALG_RSASSA, TPM::ALG_ECDSA (default TPM::ALG_RSASSA)
|
35
36
|
)
|
36
37
|
|
37
38
|
if key_attestation.valid?
|
@@ -3,9 +3,10 @@
|
|
3
3
|
source "https://rubygems.org"
|
4
4
|
|
5
5
|
gem "appraisal", "~> 2.2.0"
|
6
|
-
gem "
|
6
|
+
gem "byebug", "~> 11.0"
|
7
|
+
gem "rake", "~> 13.0"
|
7
8
|
gem "rspec", "~> 3.0"
|
8
|
-
gem "rubocop"
|
9
|
+
gem "rubocop", "~> 0.80.1"
|
9
10
|
gem "openssl", "~> 2.0.0"
|
10
11
|
|
11
12
|
gemspec path: "../"
|
@@ -3,9 +3,10 @@
|
|
3
3
|
source "https://rubygems.org"
|
4
4
|
|
5
5
|
gem "appraisal", "~> 2.2.0"
|
6
|
-
gem "
|
6
|
+
gem "byebug", "~> 11.0"
|
7
|
+
gem "rake", "~> 13.0"
|
7
8
|
gem "rspec", "~> 3.0"
|
8
|
-
gem "rubocop"
|
9
|
+
gem "rubocop", "~> 0.80.1"
|
9
10
|
gem "openssl", "~> 2.1.0"
|
10
11
|
|
11
12
|
gemspec path: "../"
|
@@ -0,0 +1,12 @@
|
|
1
|
+
# This file was generated by Appraisal
|
2
|
+
|
3
|
+
source "https://rubygems.org"
|
4
|
+
|
5
|
+
gem "appraisal", "~> 2.2.0"
|
6
|
+
gem "byebug", "~> 11.0"
|
7
|
+
gem "rake", "~> 13.0"
|
8
|
+
gem "rspec", "~> 3.0"
|
9
|
+
gem "rubocop", "~> 0.80.1"
|
10
|
+
gem "openssl", "~> 2.2.0"
|
11
|
+
|
12
|
+
gemspec path: "../"
|
@@ -3,9 +3,10 @@
|
|
3
3
|
source "https://rubygems.org"
|
4
4
|
|
5
5
|
gem "appraisal", "~> 2.2.0"
|
6
|
-
gem "
|
6
|
+
gem "byebug", "~> 11.0"
|
7
|
+
gem "rake", "~> 13.0"
|
7
8
|
gem "rspec", "~> 3.0"
|
8
|
-
gem "rubocop"
|
9
|
+
gem "rubocop", "~> 0.80.1"
|
9
10
|
gem "openssl", git: "https://github.com/ruby/openssl"
|
10
11
|
|
11
12
|
gemspec path: "../"
|
data/install-openssl.sh
ADDED
data/install-ruby.sh
ADDED
@@ -0,0 +1,10 @@
|
|
1
|
+
source ~/.rvm/scripts/rvm
|
2
|
+
|
3
|
+
if [[ "${LIBSSL}" == "1.0" ]]; then
|
4
|
+
rvm install $RB --autolibs=read-only -C --with-openssl-dir=usr/include/openssl
|
5
|
+
elif [[ "${LIBSSL}" == "1.1" ]]; then
|
6
|
+
rvm install $RB --binary --fuzzy
|
7
|
+
fi
|
8
|
+
|
9
|
+
rvm use $RB
|
10
|
+
ruby -ropenssl -e 'puts OpenSSL::OPENSSL_VERSION'
|
@@ -6,14 +6,15 @@ require "tpm/constants"
|
|
6
6
|
|
7
7
|
module TPM
|
8
8
|
# Section 3.2 in https://www.trustedcomputinggroup.org/wp-content/uploads/Credential_Profile_EK_V2.0_R14_published.pdf
|
9
|
-
class
|
9
|
+
class AIKCertificate < SimpleDelegator
|
10
10
|
ASN_V3 = 2
|
11
11
|
EMPTY_NAME = OpenSSL::X509::Name.new([]).freeze
|
12
12
|
SAN_DIRECTORY_NAME = 4
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
13
|
+
OID_TCG = "2.23.133"
|
14
|
+
OID_TCG_AT_TPM_MANUFACTURER = "#{OID_TCG}.2.1"
|
15
|
+
OID_TCG_AT_TPM_MODEL = "#{OID_TCG}.2.2"
|
16
|
+
OID_TCG_AT_TPM_VERSION = "#{OID_TCG}.2.3"
|
17
|
+
OID_TCG_KP_AIK_CERTIFICATE = "#{OID_TCG}.8.3"
|
17
18
|
|
18
19
|
def self.from_der(certificate_der)
|
19
20
|
new(OpenSSL::X509::Certificate.new(certificate_der))
|
@@ -24,13 +25,10 @@ module TPM
|
|
24
25
|
valid_version? &&
|
25
26
|
valid_extended_key_usage? &&
|
26
27
|
valid_basic_constraints? &&
|
28
|
+
empty_subject? &&
|
27
29
|
valid_subject_alternative_name?
|
28
30
|
end
|
29
31
|
|
30
|
-
def empty_subject?
|
31
|
-
subject.eql?(EMPTY_NAME)
|
32
|
-
end
|
33
|
-
|
34
32
|
private
|
35
33
|
|
36
34
|
def in_use?
|
@@ -55,31 +53,60 @@ module TPM
|
|
55
53
|
extended_key_usage && extended_key_usage.value == OID_TCG_KP_AIK_CERTIFICATE && !extended_key_usage.critical?
|
56
54
|
end
|
57
55
|
|
56
|
+
def empty_subject?
|
57
|
+
subject.eql?(EMPTY_NAME)
|
58
|
+
end
|
59
|
+
|
58
60
|
def valid_subject_alternative_name?
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
directory_name =
|
67
|
-
OpenSSL::ASN1.decode(san_asn1.value).find do |val|
|
68
|
-
val.tag_class == :CONTEXT_SPECIFIC && val.tag == SAN_DIRECTORY_NAME
|
69
|
-
end
|
70
|
-
name = OpenSSL::X509::Name.new(directory_name.value.first).to_a
|
71
|
-
manufacturer = name.assoc(OID_TCG_AT_TPM_MANUFACTURER).at(1)
|
72
|
-
model = name.assoc(OID_TCG_AT_TPM_MODEL).at(1)
|
73
|
-
version = name.assoc(OID_TCG_AT_TPM_VERSION).at(1)
|
74
|
-
|
75
|
-
::TPM::VENDOR_IDS[manufacturer] &&
|
76
|
-
!model.empty? &&
|
77
|
-
!version.empty? &&
|
78
|
-
(empty_subject? && extension.critical? || !empty_subject? && !extension.critical?)
|
61
|
+
if san_extension
|
62
|
+
san_extension.critical? &&
|
63
|
+
!tpm_manufacturer.empty? &&
|
64
|
+
TPM::VENDOR_IDS[tpm_manufacturer] &&
|
65
|
+
!tpm_model.empty? &&
|
66
|
+
!tpm_version.empty?
|
67
|
+
end
|
79
68
|
end
|
80
69
|
|
81
70
|
def extension(oid)
|
82
71
|
extensions.detect { |ext| ext.oid == oid }
|
83
72
|
end
|
73
|
+
|
74
|
+
def tpm_manufacturer
|
75
|
+
if san_name
|
76
|
+
san_name.assoc(OID_TCG_AT_TPM_MANUFACTURER).at(1)
|
77
|
+
end
|
78
|
+
end
|
79
|
+
|
80
|
+
def tpm_model
|
81
|
+
if san_name
|
82
|
+
san_name.assoc(OID_TCG_AT_TPM_MODEL).at(1)
|
83
|
+
end
|
84
|
+
end
|
85
|
+
|
86
|
+
def tpm_version
|
87
|
+
if san_name
|
88
|
+
san_name.assoc(OID_TCG_AT_TPM_VERSION).at(1)
|
89
|
+
end
|
90
|
+
end
|
91
|
+
|
92
|
+
def san_name
|
93
|
+
if san_extension
|
94
|
+
san_asn1 =
|
95
|
+
OpenSSL::ASN1.decode(san_extension).find do |val|
|
96
|
+
val.tag_class == :UNIVERSAL && val.tag == OpenSSL::ASN1::OCTET_STRING
|
97
|
+
end
|
98
|
+
|
99
|
+
directory_name =
|
100
|
+
OpenSSL::ASN1.decode(san_asn1.value).find do |val|
|
101
|
+
val.tag_class == :CONTEXT_SPECIFIC && val.tag == SAN_DIRECTORY_NAME
|
102
|
+
end
|
103
|
+
|
104
|
+
OpenSSL::X509::Name.new(directory_name.value.first).to_a
|
105
|
+
end
|
106
|
+
end
|
107
|
+
|
108
|
+
def san_extension
|
109
|
+
extension("subjectAltName")
|
110
|
+
end
|
84
111
|
end
|
85
112
|
end
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
@@ -0,0 +1,15 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIICRDCCAcqgAwIBAgIBATAKBggqhkjOPQQDAzBrMQswCQYDVQQGEwJDTjEhMB8G
|
3
|
+
A1UECgwYTmF0aW9ueiBUZWNobm9sb2dpZXMgSW5jMRswGQYDVQQLDBJOYXRpb256
|
4
|
+
IFRQTSBEZXZpY2UxHDAaBgNVBAMME05hdGlvbnogVFBNIFJvb3QgQ0EwHhcNMTcw
|
5
|
+
NTEyMDAwMDAwWhcNNDcwNTEzMDAwMDAwWjBrMQswCQYDVQQGEwJDTjEhMB8GA1UE
|
6
|
+
CgwYTmF0aW9ueiBUZWNobm9sb2dpZXMgSW5jMRswGQYDVQQLDBJOYXRpb256IFRQ
|
7
|
+
TSBEZXZpY2UxHDAaBgNVBAMME05hdGlvbnogVFBNIFJvb3QgQ0EwdjAQBgcqhkjO
|
8
|
+
PQIBBgUrgQQAIgNiAATvuDTN8TNvp3A9fSjWpDARLmvz7ItQrDq/mmuzvzInwQfs
|
9
|
+
YKUUJza4MXB3yS0PH1jjv1YMvaIBIalAgc+kahScQUy6W2fy6hd36pazmc/vQfG3
|
10
|
+
Gdhw56gGwRHx4rn4TuqjQjBAMB0GA1UdDgQWBBQ6vP8I314BDCtkB4vHzpUG9Aj9
|
11
|
+
5DAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNo
|
12
|
+
ADBlAjApzqSmd4cCMKC7slJ4NE/7zweXZx89JzSEnEWGcq78jbbXCw6yM+R4nCNX
|
13
|
+
phflI9QCMQCeFOAvyR+DQvThfGFINABej+1zeDVIjuZHat3FHVyV0UQVClPgMlZu
|
14
|
+
TntipXwGOVY=
|
15
|
+
-----END CERTIFICATE-----
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
@@ -1,19 +1,33 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
|
+
require "openssl/signature_algorithm"
|
3
4
|
require "tpm/constants"
|
4
|
-
require "tpm/public_area"
|
5
5
|
require "tpm/s_attest"
|
6
6
|
|
7
7
|
module TPM
|
8
8
|
class CertifyValidator
|
9
|
-
attr_reader :info, :signature, :nonce, :
|
9
|
+
attr_reader :info, :signature, :nonce, :public_area, :signature_algorithm, :hash_algorithm
|
10
10
|
|
11
|
-
|
11
|
+
TPM_SIGNATURE_ALG_TO_OPENSSL = {
|
12
|
+
ALG_RSASSA => OpenSSL::SignatureAlgorithm::RSAPKCS1,
|
13
|
+
ALG_RSAPSS => OpenSSL::SignatureAlgorithm::RSAPSS,
|
14
|
+
ALG_ECDSA => OpenSSL::SignatureAlgorithm::ECDSA
|
15
|
+
}.freeze
|
16
|
+
|
17
|
+
TPM_HASH_ALG_TO_OPENSSL = {
|
18
|
+
ALG_SHA1 => "SHA1",
|
19
|
+
ALG_SHA256 => "SHA256",
|
20
|
+
ALG_SHA384 => "SHA384",
|
21
|
+
ALG_SHA512 => "SHA512"
|
22
|
+
}.freeze
|
23
|
+
|
24
|
+
def initialize(info, signature, nonce, public_area, signature_algorithm: ALG_RSASSA, hash_algorithm: ALG_SHA256)
|
12
25
|
@info = info
|
13
26
|
@signature = signature
|
14
27
|
@nonce = nonce
|
15
|
-
@
|
16
|
-
@
|
28
|
+
@public_area = public_area
|
29
|
+
@signature_algorithm = signature_algorithm
|
30
|
+
@hash_algorithm = hash_algorithm
|
17
31
|
end
|
18
32
|
|
19
33
|
def valid?(signing_key)
|
@@ -26,27 +40,38 @@ module TPM
|
|
26
40
|
attest.attested_type == TPM::ST_ATTEST_CERTIFY &&
|
27
41
|
attest.extra_data.buffer == nonce &&
|
28
42
|
attest.magic == TPM::GENERATED_VALUE &&
|
29
|
-
attest.attested.name.
|
43
|
+
attest.attested.name.valid_for?(public_area.name)
|
30
44
|
end
|
31
45
|
|
32
|
-
def valid_signature?(
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
46
|
+
def valid_signature?(verify_key)
|
47
|
+
openssl_signature_algorithm = openssl_signature_algorithm_class.new(**openssl_signature_algorithm_parameters)
|
48
|
+
openssl_signature_algorithm.verify_key = verify_key
|
49
|
+
openssl_signature_algorithm.verify(signature, info)
|
50
|
+
rescue OpenSSL::SignatureAlgorithm::Error
|
51
|
+
false
|
38
52
|
end
|
39
53
|
|
40
54
|
def attest
|
41
55
|
@attest ||= TPM::SAttest.deserialize(info)
|
42
56
|
end
|
43
57
|
|
44
|
-
def
|
45
|
-
|
58
|
+
def openssl_signature_algorithm_parameters
|
59
|
+
parameters = { hash_function: openssl_hash_function }
|
60
|
+
|
61
|
+
if public_area.ecc?
|
62
|
+
parameters[:curve] = public_area.openssl_curve_name
|
63
|
+
end
|
64
|
+
|
65
|
+
parameters
|
66
|
+
end
|
67
|
+
|
68
|
+
def openssl_hash_function
|
69
|
+
TPM_HASH_ALG_TO_OPENSSL[hash_algorithm] || raise("Unsupported hash algorithm #{hash_algorithm}")
|
46
70
|
end
|
47
71
|
|
48
|
-
def
|
49
|
-
|
72
|
+
def openssl_signature_algorithm_class
|
73
|
+
TPM_SIGNATURE_ALG_TO_OPENSSL[signature_algorithm] ||
|
74
|
+
raise("Unsupported signature algorithm #{signature_algorithm}")
|
50
75
|
end
|
51
76
|
end
|
52
77
|
end
|
data/lib/tpm/constants.rb
CHANGED
@@ -11,6 +11,8 @@ module TPM
|
|
11
11
|
ALG_RSA = 0x0001
|
12
12
|
ALG_SHA1 = 0x0004
|
13
13
|
ALG_SHA256 = 0x000B
|
14
|
+
ALG_SHA384 = 0x000C
|
15
|
+
ALG_SHA512 = 0x000D
|
14
16
|
ALG_NULL = 0x0010
|
15
17
|
ALG_RSASSA = 0x0014
|
16
18
|
ALG_RSAPSS = 0x0016
|
@@ -19,6 +21,8 @@ module TPM
|
|
19
21
|
|
20
22
|
# ECC curves
|
21
23
|
ECC_NIST_P256 = 0x0003
|
24
|
+
ECC_NIST_P384 = 0x0004
|
25
|
+
ECC_NIST_P521 = 0x0005
|
22
26
|
|
23
27
|
# https://trustedcomputinggroup.org/resource/vendor-id-registry/ section 2 "TPM Capabilities Vendor ID (CAP_VID)"
|
24
28
|
VENDOR_IDS = {
|
data/lib/tpm/key_attestation.rb
CHANGED
@@ -1,32 +1,68 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
|
+
require "openssl"
|
3
4
|
require "tpm/key_attestation/version"
|
5
|
+
|
6
|
+
require "tpm/aik_certificate"
|
4
7
|
require "tpm/certify_validator"
|
8
|
+
require "tpm/constants"
|
9
|
+
require "tpm/public_area"
|
5
10
|
|
6
11
|
module TPM
|
7
12
|
class KeyAttestation
|
13
|
+
# https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-install-trusted-tpm-root-certificates
|
14
|
+
ROOT_CERTIFICATES =
|
15
|
+
begin
|
16
|
+
pattern = File.expand_path(File.join(__dir__, "certificates", "*", "RootCA", "*.*"))
|
17
|
+
Dir.glob(pattern).map do |filename|
|
18
|
+
File.open(filename) { |file| OpenSSL::X509::Certificate.new(file) }
|
19
|
+
end
|
20
|
+
end
|
21
|
+
|
8
22
|
class Error < StandardError; end
|
9
23
|
|
10
|
-
attr_reader
|
24
|
+
attr_reader(
|
25
|
+
:certify_info,
|
26
|
+
:signature,
|
27
|
+
:certified_key,
|
28
|
+
:certificates,
|
29
|
+
:signature_algorithm,
|
30
|
+
:hash_algorithm,
|
31
|
+
:qualifying_data,
|
32
|
+
:root_certificates
|
33
|
+
)
|
11
34
|
|
12
|
-
def initialize(
|
35
|
+
def initialize(
|
36
|
+
certify_info,
|
37
|
+
signature,
|
38
|
+
certified_key,
|
39
|
+
certificates,
|
40
|
+
qualifying_data,
|
41
|
+
signature_algorithm: ALG_RSASSA,
|
42
|
+
hash_algorithm: ALG_SHA256,
|
43
|
+
root_certificates: ROOT_CERTIFICATES
|
44
|
+
)
|
13
45
|
@certify_info = certify_info
|
14
46
|
@signature = signature
|
15
47
|
|
16
|
-
@
|
17
|
-
@
|
18
|
-
@
|
48
|
+
@certified_key = certified_key
|
49
|
+
@certificates = certificates
|
50
|
+
@signature_algorithm = signature_algorithm
|
51
|
+
@hash_algorithm = hash_algorithm
|
19
52
|
@qualifying_data = qualifying_data
|
53
|
+
@root_certificates = root_certificates
|
20
54
|
end
|
21
55
|
|
22
56
|
def key
|
23
|
-
if
|
57
|
+
if valid?
|
24
58
|
public_area.key
|
25
59
|
end
|
26
60
|
end
|
27
61
|
|
28
62
|
def valid?
|
29
|
-
|
63
|
+
certify_validator.valid?(aik_certificate.public_key) &&
|
64
|
+
aik_certificate.conformant? &&
|
65
|
+
trustworthy?
|
30
66
|
end
|
31
67
|
|
32
68
|
private
|
@@ -37,13 +73,31 @@ module TPM
|
|
37
73
|
certify_info,
|
38
74
|
signature,
|
39
75
|
qualifying_data,
|
40
|
-
|
41
|
-
|
76
|
+
public_area,
|
77
|
+
signature_algorithm: signature_algorithm,
|
78
|
+
hash_algorithm: hash_algorithm
|
42
79
|
)
|
43
80
|
end
|
44
81
|
|
82
|
+
def trustworthy?
|
83
|
+
x509_certificates = certificates.map { |c| OpenSSL::X509::Certificate.new(c) }
|
84
|
+
|
85
|
+
trust_store.verify(x509_certificates[0], x509_certificates[1..-1])
|
86
|
+
end
|
87
|
+
|
88
|
+
def trust_store
|
89
|
+
@trust_store ||=
|
90
|
+
OpenSSL::X509::Store.new.tap do |trust_store|
|
91
|
+
root_certificates.uniq(&:serial).each { |root_certificate| trust_store.add_cert(root_certificate) }
|
92
|
+
end
|
93
|
+
end
|
94
|
+
|
95
|
+
def aik_certificate
|
96
|
+
@aik_certificate ||= TPM::AIKCertificate.from_der(certificates.first)
|
97
|
+
end
|
98
|
+
|
45
99
|
def public_area
|
46
|
-
@public_area ||= TPM::PublicArea.new(
|
100
|
+
@public_area ||= TPM::PublicArea.new(certified_key)
|
47
101
|
end
|
48
102
|
end
|
49
103
|
end
|
data/lib/tpm/public_area.rb
CHANGED
@@ -2,12 +2,13 @@
|
|
2
2
|
|
3
3
|
require "bindata"
|
4
4
|
require "tpm/sized_buffer"
|
5
|
+
require "tpm/tpm2b_name"
|
5
6
|
|
6
7
|
module TPM
|
7
8
|
class SAttest < BinData::Record
|
8
9
|
# Section 10.12.3 in https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-2-Structures-01.38.pdf
|
9
10
|
class SCertifyInfo < BinData::Record
|
10
|
-
|
11
|
+
tpm2b_name :name
|
11
12
|
sized_buffer :qualified_name
|
12
13
|
end
|
13
14
|
end
|
data/lib/tpm/t_public.rb
CHANGED
@@ -1,6 +1,7 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
3
|
require "bindata"
|
4
|
+
require "openssl"
|
4
5
|
require "tpm/constants"
|
5
6
|
require "tpm/sized_buffer"
|
6
7
|
require "tpm/t_public/s_ecc_parms"
|
@@ -10,7 +11,16 @@ module TPM
|
|
10
11
|
# Section 12.2.4 in https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-2-Structures-01.38.pdf
|
11
12
|
class TPublic < BinData::Record
|
12
13
|
BYTE_LENGTH = 8
|
13
|
-
|
14
|
+
|
15
|
+
CURVE_TPM_TO_OPENSSL = {
|
16
|
+
TPM::ECC_NIST_P256 => "prime256v1",
|
17
|
+
TPM::ECC_NIST_P384 => "secp384r1",
|
18
|
+
TPM::ECC_NIST_P521 => "secp521r1",
|
19
|
+
}.freeze
|
20
|
+
|
21
|
+
BN_BASE = 2
|
22
|
+
RSA_KEY_DEFAULT_PUBLIC_EXPONENT = 2**16 + 1
|
23
|
+
ECC_UNCOMPRESSED_POINT_INDICATOR = "\x04"
|
14
24
|
|
15
25
|
class << self
|
16
26
|
alias_method :deserialize, :read
|
@@ -36,12 +46,19 @@ module TPM
|
|
36
46
|
sized_buffer TPM::ALG_RSA
|
37
47
|
end
|
38
48
|
|
49
|
+
def rsa?
|
50
|
+
alg_type == TPM::ALG_RSA
|
51
|
+
end
|
52
|
+
|
53
|
+
def ecc?
|
54
|
+
alg_type == TPM::ALG_ECC
|
55
|
+
end
|
56
|
+
|
39
57
|
def key
|
40
|
-
if parameters.symmetric ==
|
41
|
-
|
42
|
-
when TPM::ALG_ECC
|
58
|
+
if parameters.symmetric == TPM::ALG_NULL
|
59
|
+
if ecc?
|
43
60
|
ecc_key
|
44
|
-
|
61
|
+
elsif rsa?
|
45
62
|
rsa_key
|
46
63
|
else
|
47
64
|
raise "Type #{alg_type} not supported"
|
@@ -49,21 +66,22 @@ module TPM
|
|
49
66
|
end
|
50
67
|
end
|
51
68
|
|
69
|
+
def openssl_curve_name
|
70
|
+
if ecc?
|
71
|
+
CURVE_TPM_TO_OPENSSL[parameters.curve_id] || raise("Unknown curve #{parameters.curve_id}")
|
72
|
+
end
|
73
|
+
end
|
74
|
+
|
52
75
|
private
|
53
76
|
|
54
77
|
def ecc_key
|
55
78
|
if parameters.scheme == TPM::ALG_ECDSA
|
56
|
-
|
79
|
+
group = OpenSSL::PKey::EC::Group.new(openssl_curve_name)
|
57
80
|
|
58
|
-
|
59
|
-
|
60
|
-
pkey = OpenSSL::PKey::EC.new(group)
|
61
|
-
public_key_bn = OpenSSL::BN.new("\x04" + unique.buffer.value, 2)
|
62
|
-
public_key_point = OpenSSL::PKey::EC::Point.new(group, public_key_bn)
|
63
|
-
pkey.public_key = public_key_point
|
81
|
+
key = OpenSSL::PKey::EC.new(group)
|
82
|
+
key.public_key = OpenSSL::PKey::EC::Point.new(group, bn(ECC_UNCOMPRESSED_POINT_INDICATOR + unique.buffer.value))
|
64
83
|
|
65
|
-
|
66
|
-
end
|
84
|
+
key
|
67
85
|
end
|
68
86
|
end
|
69
87
|
|
@@ -74,7 +92,7 @@ module TPM
|
|
74
92
|
|
75
93
|
if parameters.key_bits / BYTE_LENGTH == n.size
|
76
94
|
key = OpenSSL::PKey::RSA.new(parameters.key_bits.value)
|
77
|
-
key.set_key(bn(n),
|
95
|
+
key.set_key(bn(n), bn(RSA_KEY_DEFAULT_PUBLIC_EXPONENT), nil)
|
78
96
|
|
79
97
|
key.public_key
|
80
98
|
end
|
@@ -83,7 +101,7 @@ module TPM
|
|
83
101
|
|
84
102
|
def bn(data)
|
85
103
|
if data
|
86
|
-
OpenSSL::BN.new(data,
|
104
|
+
OpenSSL::BN.new(data, BN_BASE)
|
87
105
|
end
|
88
106
|
end
|
89
107
|
end
|
@@ -0,0 +1,17 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require "bindata"
|
4
|
+
require "tpm/tpmt_ha"
|
5
|
+
|
6
|
+
module TPM
|
7
|
+
class Tpm2bName < BinData::Record
|
8
|
+
endian :big
|
9
|
+
|
10
|
+
uint16 :name_size, value: lambda { name.to_binary_s.size }
|
11
|
+
tpmt_ha :name, read_length: :name_size
|
12
|
+
|
13
|
+
def valid_for?(other_name)
|
14
|
+
name.to_binary_s == other_name
|
15
|
+
end
|
16
|
+
end
|
17
|
+
end
|
data/lib/tpm/tpmt_ha.rb
ADDED
@@ -0,0 +1,20 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require "bindata"
|
4
|
+
|
5
|
+
module TPM
|
6
|
+
class TpmtHa < BinData::Record
|
7
|
+
BYTE_LENGTH = 8
|
8
|
+
DIGEST_LENGTH_SHA1 = 160
|
9
|
+
DIGEST_LENGTH_SHA256 = 256
|
10
|
+
|
11
|
+
endian :big
|
12
|
+
|
13
|
+
uint16 :hash_alg
|
14
|
+
|
15
|
+
choice :digest, selection: :hash_alg do
|
16
|
+
string TPM::ALG_SHA1, length: DIGEST_LENGTH_SHA1 / BYTE_LENGTH
|
17
|
+
string TPM::ALG_SHA256, length: DIGEST_LENGTH_SHA256 / BYTE_LENGTH
|
18
|
+
end
|
19
|
+
end
|
20
|
+
end
|
data/tpm-key_attestation.gemspec
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: tpm-key_attestation
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.10.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Gonzalo
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-
|
11
|
+
date: 2020-07-09 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: bindata
|
@@ -24,6 +24,20 @@ dependencies:
|
|
24
24
|
- - "~>"
|
25
25
|
- !ruby/object:Gem::Version
|
26
26
|
version: '2.4'
|
27
|
+
- !ruby/object:Gem::Dependency
|
28
|
+
name: openssl-signature_algorithm
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
30
|
+
requirements:
|
31
|
+
- - "~>"
|
32
|
+
- !ruby/object:Gem::Version
|
33
|
+
version: '1.0'
|
34
|
+
type: :runtime
|
35
|
+
prerelease: false
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
37
|
+
requirements:
|
38
|
+
- - "~>"
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: '1.0'
|
27
41
|
description:
|
28
42
|
email:
|
29
43
|
executables: []
|
@@ -46,11 +60,42 @@ files:
|
|
46
60
|
- bin/setup
|
47
61
|
- gemfiles/openssl_2_0.gemfile
|
48
62
|
- gemfiles/openssl_2_1.gemfile
|
63
|
+
- gemfiles/openssl_2_2.gemfile
|
49
64
|
- gemfiles/openssl_default.gemfile
|
50
65
|
- gemfiles/openssl_head.gemfile
|
66
|
+
- install-openssl.sh
|
67
|
+
- install-ruby.sh
|
68
|
+
- lib/tpm/aik_certificate.rb
|
69
|
+
- lib/tpm/certificates/AMD/RootCA/AMD-fTPM-ECC-RootCA.crt
|
70
|
+
- lib/tpm/certificates/AMD/RootCA/AMD-fTPM-RSA-RootCA.crt
|
71
|
+
- lib/tpm/certificates/Atmel/RootCA/Atmel TPM Root Signing Module.der
|
72
|
+
- lib/tpm/certificates/Infineon/RootCA/IFX TPM EK Root CA.cer
|
73
|
+
- lib/tpm/certificates/Infineon/RootCA/IFX-RootCA.cer
|
74
|
+
- lib/tpm/certificates/Infineon/RootCA/IFX_TPM_RootCert_008.crt
|
75
|
+
- lib/tpm/certificates/Infineon/RootCA/Infineon OPTIGA(TM) ECC Root CA.crt
|
76
|
+
- lib/tpm/certificates/Infineon/RootCA/Infineon OPTIGA(TM) RSA Root CA.crt
|
77
|
+
- lib/tpm/certificates/Intel/RootCA/EKRootPublicKey.cer
|
78
|
+
- lib/tpm/certificates/Microsoft/RootCA/Microsoft TPM Root Certificate Authority 2014.cer
|
79
|
+
- lib/tpm/certificates/NationZ/RootCA/EkRootCA.crt
|
80
|
+
- lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA 01.cer
|
81
|
+
- lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA 02.cer
|
82
|
+
- lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA ARSUF 01.cer
|
83
|
+
- lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1013.cer
|
84
|
+
- lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1014.cer
|
85
|
+
- lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1110.cer
|
86
|
+
- lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1111.cer
|
87
|
+
- lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2010.cer
|
88
|
+
- lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2011.cer
|
89
|
+
- lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2110.cer
|
90
|
+
- lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2111.cer
|
91
|
+
- lib/tpm/certificates/QC/RootCA/Microsoft TPM Root Certificate Authority 2014.cer
|
92
|
+
- lib/tpm/certificates/STMicro/RootCA/GlobalSign Trusted Computing CA.crt
|
93
|
+
- lib/tpm/certificates/STMicro/RootCA/GlobalSign Trusted Platform Module ECC Root
|
94
|
+
CA.crt
|
95
|
+
- lib/tpm/certificates/STMicro/RootCA/ST TPM Root Certificate.crt
|
96
|
+
- lib/tpm/certificates/STMicro/RootCA/STM TPM ECC Root CA 01.crt
|
51
97
|
- lib/tpm/certify_validator.rb
|
52
98
|
- lib/tpm/constants.rb
|
53
|
-
- lib/tpm/ek_certificate.rb
|
54
99
|
- lib/tpm/key_attestation.rb
|
55
100
|
- lib/tpm/key_attestation/version.rb
|
56
101
|
- lib/tpm/public_area.rb
|
@@ -60,6 +105,8 @@ files:
|
|
60
105
|
- lib/tpm/t_public.rb
|
61
106
|
- lib/tpm/t_public/s_ecc_parms.rb
|
62
107
|
- lib/tpm/t_public/s_rsa_parms.rb
|
108
|
+
- lib/tpm/tpm2b_name.rb
|
109
|
+
- lib/tpm/tpmt_ha.rb
|
63
110
|
- tpm-key_attestation.gemspec
|
64
111
|
homepage: https://github.com/cedarcode/tpm-key_attestation
|
65
112
|
licenses:
|
@@ -83,7 +130,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
83
130
|
- !ruby/object:Gem::Version
|
84
131
|
version: '0'
|
85
132
|
requirements: []
|
86
|
-
rubygems_version: 3.1.
|
133
|
+
rubygems_version: 3.1.4
|
87
134
|
signing_key:
|
88
135
|
specification_version: 4
|
89
136
|
summary: TPM Key Attestation verifier
|