tpm-key_attestation 0.5.0 → 0.10.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (55) hide show
  1. checksums.yaml +4 -4
  2. data/.rspec +1 -1
  3. data/.rubocop.yml +0 -3
  4. data/.travis.yml +21 -8
  5. data/Appraisals +4 -0
  6. data/CHANGELOG.md +43 -0
  7. data/Gemfile +2 -3
  8. data/Gemfile.lock +21 -17
  9. data/README.md +4 -3
  10. data/gemfiles/openssl_2_0.gemfile +3 -2
  11. data/gemfiles/openssl_2_1.gemfile +3 -2
  12. data/gemfiles/openssl_2_2.gemfile +12 -0
  13. data/gemfiles/openssl_default.gemfile +3 -2
  14. data/gemfiles/openssl_head.gemfile +3 -2
  15. data/install-openssl.sh +3 -0
  16. data/install-ruby.sh +10 -0
  17. data/lib/tpm/{ek_certificate.rb → aik_certificate.rb} +56 -29
  18. data/lib/tpm/certificates/AMD/RootCA/AMD-fTPM-ECC-RootCA.crt +0 -0
  19. data/lib/tpm/certificates/AMD/RootCA/AMD-fTPM-RSA-RootCA.crt +0 -0
  20. data/lib/tpm/certificates/Atmel/RootCA/Atmel TPM Root Signing Module.der +0 -0
  21. data/lib/tpm/certificates/Infineon/RootCA/IFX TPM EK Root CA.cer +0 -0
  22. data/lib/tpm/certificates/Infineon/RootCA/IFX-RootCA.cer +0 -0
  23. data/lib/tpm/certificates/Infineon/RootCA/IFX_TPM_RootCert_008.crt +0 -0
  24. data/lib/tpm/certificates/Infineon/RootCA/Infineon OPTIGA(TM) ECC Root CA.crt +0 -0
  25. data/lib/tpm/certificates/Infineon/RootCA/Infineon OPTIGA(TM) RSA Root CA.crt +0 -0
  26. data/lib/tpm/certificates/Intel/RootCA/EKRootPublicKey.cer +0 -0
  27. data/lib/tpm/certificates/Microsoft/RootCA/Microsoft TPM Root Certificate Authority 2014.cer +0 -0
  28. data/lib/tpm/certificates/NationZ/RootCA/EkRootCA.crt +15 -0
  29. data/lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA 01.cer +0 -0
  30. data/lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA 02.cer +0 -0
  31. data/lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA ARSUF 01.cer +0 -0
  32. data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1013.cer +0 -0
  33. data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1014.cer +0 -0
  34. data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1110.cer +0 -0
  35. data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1111.cer +0 -0
  36. data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2010.cer +0 -0
  37. data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2011.cer +0 -0
  38. data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2110.cer +0 -0
  39. data/lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2111.cer +0 -0
  40. data/lib/tpm/certificates/QC/RootCA/Microsoft TPM Root Certificate Authority 2014.cer +0 -0
  41. data/lib/tpm/certificates/STMicro/RootCA/GlobalSign Trusted Computing CA.crt +0 -0
  42. data/lib/tpm/certificates/STMicro/RootCA/GlobalSign Trusted Platform Module ECC Root CA.crt +0 -0
  43. data/lib/tpm/certificates/STMicro/RootCA/ST TPM Root Certificate.crt +0 -0
  44. data/lib/tpm/certificates/STMicro/RootCA/STM TPM ECC Root CA 01.crt +0 -0
  45. data/lib/tpm/certify_validator.rb +41 -16
  46. data/lib/tpm/constants.rb +4 -0
  47. data/lib/tpm/key_attestation.rb +64 -10
  48. data/lib/tpm/key_attestation/version.rb +1 -1
  49. data/lib/tpm/public_area.rb +8 -0
  50. data/lib/tpm/s_attest/s_certify_info.rb +2 -1
  51. data/lib/tpm/t_public.rb +34 -16
  52. data/lib/tpm/tpm2b_name.rb +17 -0
  53. data/lib/tpm/tpmt_ha.rb +20 -0
  54. data/tpm-key_attestation.gemspec +1 -0
  55. metadata +51 -4
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e5df735cc88867e6fb7c0cdb55698173cfdddec88630b3a69534ba15cd0d9c32
4
- data.tar.gz: aef2b61ce9a23bd4bd27f9dda61e7719a7eb1914ce29321d3e6ab2c723ffcf16
3
+ metadata.gz: 28d7fefca9a69f2a4be0c8124bfb2721767c9c891768607473827c11df7aeaa3
4
+ data.tar.gz: 4739a10cab12236ee54f4bfacd2a182bc2c48622c5feaffd800317d1ff49228d
5
5
  SHA512:
6
- metadata.gz: 3ec2802f034dfceebd917044760337c4968cb0268b8de970fd977c0f5d5da5ffbaf3c7017b12c3d372d1973d2f4807d1051e90ed28ddb4a8bca52eb15510cf57
7
- data.tar.gz: 2bba01a0fdcd9baee3af72c2442a388cccde52b31c3e22a2e25ee46cace1edb307d1246ecdb62e11251a3e41d0114318a973f5253bfb8516d940c27dbd134d80
6
+ metadata.gz: b29f8eff516b2f8a8f78583b264586e9eec7c3ad31f8a351517e4b0552a39ef68be0274e83289189395a00e64aac171131252bd24c76fcd964e33a76acab436a
7
+ data.tar.gz: 69a191891d4a12c8afd4b2acd07ec9c5728506fb33e94cd34e102de1d851acbcfd7694befb6daa01981ab0e2cfaf120a9ddcae4b2d1337eb0e9a74bee485bedd
data/.rspec CHANGED
@@ -1,3 +1,3 @@
1
- --format documentation
2
1
  --color
3
2
  --require spec_helper
3
+ --order random
@@ -28,9 +28,6 @@ Security:
28
28
  Style/BlockComments:
29
29
  Enabled: true
30
30
 
31
- Style/BracesAroundHashParameters:
32
- Enabled: true
33
-
34
31
  Style/CaseEquality:
35
32
  Enabled: true
36
33
 
@@ -1,17 +1,27 @@
1
1
  ---
2
2
  dist: bionic
3
3
  language: ruby
4
- cache: bundler
5
4
 
6
- rvm:
7
- - ruby-head
8
- - 2.7.0
9
- - 2.6.5
10
- - 2.5.7
11
- - 2.4.9
5
+ cache:
6
+ bundler: true
7
+ directories:
8
+ - /home/travis/.rvm/
9
+
10
+ env:
11
+ - RB=2.7.1 LIBSSL=1.0
12
+ - RB=2.7.1 LIBSSL=1.1
13
+ - RB=2.6.6 LIBSSL=1.0
14
+ - RB=2.6.6 LIBSSL=1.1
15
+ - RB=2.5.8 LIBSSL=1.0
16
+ - RB=2.5.8 LIBSSL=1.1
17
+ - RB=2.4.10 LIBSSL=1.0
18
+ - RB=2.4.10 LIBSSL=1.1
19
+ - RB=ruby-head LIBSSL=1.0
20
+ - RB=ruby-head LIBSSL=1.1
12
21
 
13
22
  gemfile:
14
23
  - gemfiles/openssl_head.gemfile
24
+ - gemfiles/openssl_2_2.gemfile
15
25
  - gemfiles/openssl_2_1.gemfile
16
26
  - gemfiles/openssl_2_0.gemfile
17
27
  - gemfiles/openssl_default.gemfile
@@ -19,9 +29,12 @@ gemfile:
19
29
  matrix:
20
30
  fast_finish: true
21
31
  allow_failures:
22
- - rvm: ruby-head
32
+ - env: RB=ruby-head LIBSSL=1.0
33
+ - env: RB=ruby-head LIBSSL=1.1
23
34
  - gemfile: gemfiles/openssl_head.gemfile
24
35
 
25
36
  before_install:
37
+ - ./install-openssl.sh
38
+ - ./install-ruby.sh
26
39
  - gem install bundler -v "~> 2.0"
27
40
  - rm Gemfile.lock
data/Appraisals CHANGED
@@ -4,6 +4,10 @@ appraise "openssl_head" do
4
4
  gem "openssl", git: "https://github.com/ruby/openssl"
5
5
  end
6
6
 
7
+ appraise "openssl_2_2" do
8
+ gem "openssl", "~> 2.2.0"
9
+ end
10
+
7
11
  appraise "openssl_2_1" do
8
12
  gem "openssl", "~> 2.1.0"
9
13
  end
@@ -1,5 +1,41 @@
1
1
  # Changelog
2
2
 
3
+ ## [v0.10.0] - 2020-07-09
4
+
5
+ ### Added
6
+
7
+ - Support ECDSA with NIST P384 and P521 curves
8
+
9
+ ## [v0.9.0] - 2020-05-31
10
+
11
+ ### Fixed
12
+
13
+ - Fixed compatibility with OpenSSL-C (libssl) v1.0.2 ([@santiagorodriguez96])
14
+
15
+ ## [v0.8.0] - 2020-03-29
16
+
17
+ ### Changed
18
+
19
+ - Update `openssl-signature_algorithm` gem dependency from `v0.3` to `v0.4`.
20
+
21
+ ## [v0.7.0] - 2020-02-25
22
+
23
+ ### Added
24
+
25
+ - `TPM::KeyAttestation#valid?` performs certificate path validation. In other words, it verifies trust up
26
+ to an acceptable trusted root certificate.
27
+
28
+ ### Changed
29
+
30
+ - Rename `TPM::EKCertificate` to `TPM::AIKCertificate` to fix semantics
31
+
32
+ ## [v0.6.0] - 2020-01-30
33
+
34
+ ### Changed
35
+
36
+ - `TPM::KeyAttestation.new` now accepts `signature_algorithm` and `hash_algorithm` in TPM format in
37
+ replacement of `JOSE` format `algorithm` string
38
+
3
39
  ## [v0.5.0] - 2020-01-23
4
40
 
5
41
  ### Added
@@ -31,8 +67,15 @@
31
67
  - `TPM::EKCertificate` wrapper
32
68
  - `TPM::SAttest` wrapper
33
69
 
70
+ [v0.10.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.9.0...v0.10.0/
71
+ [v0.9.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.8.0...v0.9.0/
72
+ [v0.8.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.7.0...v0.8.0/
73
+ [v0.7.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.6.0...v0.7.0/
74
+ [v0.6.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.5.0...v0.6.0/
34
75
  [v0.5.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.4.0...v0.5.0/
35
76
  [v0.4.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.3.0...v0.4.0/
36
77
  [v0.3.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.2.0...v0.3.0/
37
78
  [v0.2.0]: https://github.com/cedarcode/tpm-key_attestation/compare/v0.1.0...v0.2.0/
38
79
  [v0.1.0]: https://github.com/cedarcode/tpm-key_attestation/compare/57c926ef7e83830cee8d111fdc5ccaf99ab2e861...v0.1.0/
80
+
81
+ [@santiagorodriguez96]: https://github.com/santiagorodriguez96
data/Gemfile CHANGED
@@ -7,7 +7,6 @@ gemspec
7
7
 
8
8
  gem "appraisal", "~> 2.2.0"
9
9
  gem "byebug", "~> 11.0"
10
- gem "rake", "~> 12.0"
10
+ gem "rake", "~> 13.0"
11
11
  gem "rspec", "~> 3.0"
12
-
13
- gem "rubocop"
12
+ gem "rubocop", "~> 0.80.1"
@@ -1,8 +1,9 @@
1
1
  PATH
2
2
  remote: .
3
3
  specs:
4
- tpm-key_attestation (0.5.0)
4
+ tpm-key_attestation (0.10.0)
5
5
  bindata (~> 2.4)
6
+ openssl-signature_algorithm (~> 1.0)
6
7
 
7
8
  GEM
8
9
  remote: https://rubygems.org/
@@ -11,39 +12,42 @@ GEM
11
12
  bundler
12
13
  rake
13
14
  thor (>= 0.14.0)
14
- ast (2.4.0)
15
- bindata (2.4.4)
16
- byebug (11.1.0)
17
- diff-lcs (1.3)
15
+ ast (2.4.1)
16
+ bindata (2.4.7)
17
+ byebug (11.1.3)
18
+ diff-lcs (1.4.4)
18
19
  jaro_winkler (1.5.4)
19
- parallel (1.19.1)
20
- parser (2.7.0.2)
21
- ast (~> 2.4.0)
20
+ openssl-signature_algorithm (1.0.0)
21
+ parallel (1.19.2)
22
+ parser (2.7.1.4)
23
+ ast (~> 2.4.1)
22
24
  rainbow (3.0.0)
23
- rake (12.3.3)
25
+ rake (13.0.1)
26
+ rexml (3.2.4)
24
27
  rspec (3.9.0)
25
28
  rspec-core (~> 3.9.0)
26
29
  rspec-expectations (~> 3.9.0)
27
30
  rspec-mocks (~> 3.9.0)
28
- rspec-core (3.9.1)
29
- rspec-support (~> 3.9.1)
30
- rspec-expectations (3.9.0)
31
+ rspec-core (3.9.2)
32
+ rspec-support (~> 3.9.3)
33
+ rspec-expectations (3.9.2)
31
34
  diff-lcs (>= 1.2.0, < 2.0)
32
35
  rspec-support (~> 3.9.0)
33
36
  rspec-mocks (3.9.1)
34
37
  diff-lcs (>= 1.2.0, < 2.0)
35
38
  rspec-support (~> 3.9.0)
36
- rspec-support (3.9.2)
37
- rubocop (0.79.0)
39
+ rspec-support (3.9.3)
40
+ rubocop (0.80.1)
38
41
  jaro_winkler (~> 1.5.1)
39
42
  parallel (~> 1.10)
40
43
  parser (>= 2.7.0.1)
41
44
  rainbow (>= 2.2.2, < 4.0)
45
+ rexml
42
46
  ruby-progressbar (~> 1.7)
43
47
  unicode-display_width (>= 1.4.0, < 1.7)
44
48
  ruby-progressbar (1.10.1)
45
49
  thor (1.0.1)
46
- unicode-display_width (1.6.0)
50
+ unicode-display_width (1.6.1)
47
51
 
48
52
  PLATFORMS
49
53
  ruby
@@ -51,9 +55,9 @@ PLATFORMS
51
55
  DEPENDENCIES
52
56
  appraisal (~> 2.2.0)
53
57
  byebug (~> 11.0)
54
- rake (~> 12.0)
58
+ rake (~> 13.0)
55
59
  rspec (~> 3.0)
56
- rubocop
60
+ rubocop (~> 0.80.1)
57
61
  tpm-key_attestation!
58
62
 
59
63
  BUNDLED WITH
data/README.md CHANGED
@@ -2,8 +2,9 @@
2
2
 
3
3
  TPM Key Attestation utitlies
4
4
 
5
- [![Gem](https://img.shields.io/gem/v/tpm-key_attestation.svg?style=flat-square)](https://rubygems.org/gems/tpm-key_attestation)
6
- [![Travis](https://img.shields.io/travis/cedarcode/tpm-key_attestation.svg?style=flat-square)](https://travis-ci.org/cedarcode/tpm-key_attestation)
5
+ [![Gem](https://img.shields.io/gem/v/tpm-key_attestation.svg?style=flat-square&color=informational)](https://rubygems.org/gems/tpm-key_attestation)
6
+ [![Travis](https://img.shields.io/travis/cedarcode/tpm-key_attestation/master.svg?style=flat-square)](https://travis-ci.org/cedarcode/tpm-key_attestation)
7
+ [![Conventional Commits](https://img.shields.io/badge/Conventional%20Commits-1.0.0-informational.svg?style=flat-square)](https://conventionalcommits.org)
7
8
 
8
9
  ## Installation
9
10
 
@@ -31,7 +32,7 @@ key_attestation =
31
32
  certified_object,
32
33
  signing_key,
33
34
  quilifying_data,
34
- algorithm: "RS256" # Supported values: "RS256", "PS256", "ES256" (default "RS256")
35
+ signature_algorithm: TPM::ALG_RSAPSS # Supported values: TPM::ALG_RSAPSS, TPM::ALG_RSASSA, TPM::ALG_ECDSA (default TPM::ALG_RSASSA)
35
36
  )
36
37
 
37
38
  if key_attestation.valid?
@@ -3,9 +3,10 @@
3
3
  source "https://rubygems.org"
4
4
 
5
5
  gem "appraisal", "~> 2.2.0"
6
- gem "rake", "~> 12.0"
6
+ gem "byebug", "~> 11.0"
7
+ gem "rake", "~> 13.0"
7
8
  gem "rspec", "~> 3.0"
8
- gem "rubocop"
9
+ gem "rubocop", "~> 0.80.1"
9
10
  gem "openssl", "~> 2.0.0"
10
11
 
11
12
  gemspec path: "../"
@@ -3,9 +3,10 @@
3
3
  source "https://rubygems.org"
4
4
 
5
5
  gem "appraisal", "~> 2.2.0"
6
- gem "rake", "~> 12.0"
6
+ gem "byebug", "~> 11.0"
7
+ gem "rake", "~> 13.0"
7
8
  gem "rspec", "~> 3.0"
8
- gem "rubocop"
9
+ gem "rubocop", "~> 0.80.1"
9
10
  gem "openssl", "~> 2.1.0"
10
11
 
11
12
  gemspec path: "../"
@@ -0,0 +1,12 @@
1
+ # This file was generated by Appraisal
2
+
3
+ source "https://rubygems.org"
4
+
5
+ gem "appraisal", "~> 2.2.0"
6
+ gem "byebug", "~> 11.0"
7
+ gem "rake", "~> 13.0"
8
+ gem "rspec", "~> 3.0"
9
+ gem "rubocop", "~> 0.80.1"
10
+ gem "openssl", "~> 2.2.0"
11
+
12
+ gemspec path: "../"
@@ -3,8 +3,9 @@
3
3
  source "https://rubygems.org"
4
4
 
5
5
  gem "appraisal", "~> 2.2.0"
6
- gem "rake", "~> 12.0"
6
+ gem "byebug", "~> 11.0"
7
+ gem "rake", "~> 13.0"
7
8
  gem "rspec", "~> 3.0"
8
- gem "rubocop"
9
+ gem "rubocop", "~> 0.80.1"
9
10
 
10
11
  gemspec path: "../"
@@ -3,9 +3,10 @@
3
3
  source "https://rubygems.org"
4
4
 
5
5
  gem "appraisal", "~> 2.2.0"
6
- gem "rake", "~> 12.0"
6
+ gem "byebug", "~> 11.0"
7
+ gem "rake", "~> 13.0"
7
8
  gem "rspec", "~> 3.0"
8
- gem "rubocop"
9
+ gem "rubocop", "~> 0.80.1"
9
10
  gem "openssl", git: "https://github.com/ruby/openssl"
10
11
 
11
12
  gemspec path: "../"
@@ -0,0 +1,3 @@
1
+ if [[ "${LIBSSL}" == "1.0" ]]; then
2
+ sudo apt purge libssl-dev && sudo apt-get -yq --no-install-suggests --no-install-recommends install libssl1.0-dev
3
+ fi
@@ -0,0 +1,10 @@
1
+ source ~/.rvm/scripts/rvm
2
+
3
+ if [[ "${LIBSSL}" == "1.0" ]]; then
4
+ rvm install $RB --autolibs=read-only -C --with-openssl-dir=usr/include/openssl
5
+ elif [[ "${LIBSSL}" == "1.1" ]]; then
6
+ rvm install $RB --binary --fuzzy
7
+ fi
8
+
9
+ rvm use $RB
10
+ ruby -ropenssl -e 'puts OpenSSL::OPENSSL_VERSION'
@@ -6,14 +6,15 @@ require "tpm/constants"
6
6
 
7
7
  module TPM
8
8
  # Section 3.2 in https://www.trustedcomputinggroup.org/wp-content/uploads/Credential_Profile_EK_V2.0_R14_published.pdf
9
- class EKCertificate < SimpleDelegator
9
+ class AIKCertificate < SimpleDelegator
10
10
  ASN_V3 = 2
11
11
  EMPTY_NAME = OpenSSL::X509::Name.new([]).freeze
12
12
  SAN_DIRECTORY_NAME = 4
13
- OID_TCG_AT_TPM_MANUFACTURER = "2.23.133.2.1"
14
- OID_TCG_AT_TPM_MODEL = "2.23.133.2.2"
15
- OID_TCG_AT_TPM_VERSION = "2.23.133.2.3"
16
- OID_TCG_KP_AIK_CERTIFICATE = "2.23.133.8.3"
13
+ OID_TCG = "2.23.133"
14
+ OID_TCG_AT_TPM_MANUFACTURER = "#{OID_TCG}.2.1"
15
+ OID_TCG_AT_TPM_MODEL = "#{OID_TCG}.2.2"
16
+ OID_TCG_AT_TPM_VERSION = "#{OID_TCG}.2.3"
17
+ OID_TCG_KP_AIK_CERTIFICATE = "#{OID_TCG}.8.3"
17
18
 
18
19
  def self.from_der(certificate_der)
19
20
  new(OpenSSL::X509::Certificate.new(certificate_der))
@@ -24,13 +25,10 @@ module TPM
24
25
  valid_version? &&
25
26
  valid_extended_key_usage? &&
26
27
  valid_basic_constraints? &&
28
+ empty_subject? &&
27
29
  valid_subject_alternative_name?
28
30
  end
29
31
 
30
- def empty_subject?
31
- subject.eql?(EMPTY_NAME)
32
- end
33
-
34
32
  private
35
33
 
36
34
  def in_use?
@@ -55,31 +53,60 @@ module TPM
55
53
  extended_key_usage && extended_key_usage.value == OID_TCG_KP_AIK_CERTIFICATE && !extended_key_usage.critical?
56
54
  end
57
55
 
56
+ def empty_subject?
57
+ subject.eql?(EMPTY_NAME)
58
+ end
59
+
58
60
  def valid_subject_alternative_name?
59
- extension = extensions.detect { |ext| ext.oid == "subjectAltName" }
60
- return unless extension
61
-
62
- san_asn1 =
63
- OpenSSL::ASN1.decode(extension).find do |val|
64
- val.tag_class == :UNIVERSAL && val.tag == OpenSSL::ASN1::OCTET_STRING
65
- end
66
- directory_name =
67
- OpenSSL::ASN1.decode(san_asn1.value).find do |val|
68
- val.tag_class == :CONTEXT_SPECIFIC && val.tag == SAN_DIRECTORY_NAME
69
- end
70
- name = OpenSSL::X509::Name.new(directory_name.value.first).to_a
71
- manufacturer = name.assoc(OID_TCG_AT_TPM_MANUFACTURER).at(1)
72
- model = name.assoc(OID_TCG_AT_TPM_MODEL).at(1)
73
- version = name.assoc(OID_TCG_AT_TPM_VERSION).at(1)
74
-
75
- ::TPM::VENDOR_IDS[manufacturer] &&
76
- !model.empty? &&
77
- !version.empty? &&
78
- (empty_subject? && extension.critical? || !empty_subject? && !extension.critical?)
61
+ if san_extension
62
+ san_extension.critical? &&
63
+ !tpm_manufacturer.empty? &&
64
+ TPM::VENDOR_IDS[tpm_manufacturer] &&
65
+ !tpm_model.empty? &&
66
+ !tpm_version.empty?
67
+ end
79
68
  end
80
69
 
81
70
  def extension(oid)
82
71
  extensions.detect { |ext| ext.oid == oid }
83
72
  end
73
+
74
+ def tpm_manufacturer
75
+ if san_name
76
+ san_name.assoc(OID_TCG_AT_TPM_MANUFACTURER).at(1)
77
+ end
78
+ end
79
+
80
+ def tpm_model
81
+ if san_name
82
+ san_name.assoc(OID_TCG_AT_TPM_MODEL).at(1)
83
+ end
84
+ end
85
+
86
+ def tpm_version
87
+ if san_name
88
+ san_name.assoc(OID_TCG_AT_TPM_VERSION).at(1)
89
+ end
90
+ end
91
+
92
+ def san_name
93
+ if san_extension
94
+ san_asn1 =
95
+ OpenSSL::ASN1.decode(san_extension).find do |val|
96
+ val.tag_class == :UNIVERSAL && val.tag == OpenSSL::ASN1::OCTET_STRING
97
+ end
98
+
99
+ directory_name =
100
+ OpenSSL::ASN1.decode(san_asn1.value).find do |val|
101
+ val.tag_class == :CONTEXT_SPECIFIC && val.tag == SAN_DIRECTORY_NAME
102
+ end
103
+
104
+ OpenSSL::X509::Name.new(directory_name.value.first).to_a
105
+ end
106
+ end
107
+
108
+ def san_extension
109
+ extension("subjectAltName")
110
+ end
84
111
  end
85
112
  end
@@ -0,0 +1,15 @@
1
+ -----BEGIN CERTIFICATE-----
2
+ MIICRDCCAcqgAwIBAgIBATAKBggqhkjOPQQDAzBrMQswCQYDVQQGEwJDTjEhMB8G
3
+ A1UECgwYTmF0aW9ueiBUZWNobm9sb2dpZXMgSW5jMRswGQYDVQQLDBJOYXRpb256
4
+ IFRQTSBEZXZpY2UxHDAaBgNVBAMME05hdGlvbnogVFBNIFJvb3QgQ0EwHhcNMTcw
5
+ NTEyMDAwMDAwWhcNNDcwNTEzMDAwMDAwWjBrMQswCQYDVQQGEwJDTjEhMB8GA1UE
6
+ CgwYTmF0aW9ueiBUZWNobm9sb2dpZXMgSW5jMRswGQYDVQQLDBJOYXRpb256IFRQ
7
+ TSBEZXZpY2UxHDAaBgNVBAMME05hdGlvbnogVFBNIFJvb3QgQ0EwdjAQBgcqhkjO
8
+ PQIBBgUrgQQAIgNiAATvuDTN8TNvp3A9fSjWpDARLmvz7ItQrDq/mmuzvzInwQfs
9
+ YKUUJza4MXB3yS0PH1jjv1YMvaIBIalAgc+kahScQUy6W2fy6hd36pazmc/vQfG3
10
+ Gdhw56gGwRHx4rn4TuqjQjBAMB0GA1UdDgQWBBQ6vP8I314BDCtkB4vHzpUG9Aj9
11
+ 5DAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNo
12
+ ADBlAjApzqSmd4cCMKC7slJ4NE/7zweXZx89JzSEnEWGcq78jbbXCw6yM+R4nCNX
13
+ phflI9QCMQCeFOAvyR+DQvThfGFINABej+1zeDVIjuZHat3FHVyV0UQVClPgMlZu
14
+ TntipXwGOVY=
15
+ -----END CERTIFICATE-----
@@ -1,19 +1,33 @@
1
1
  # frozen_string_literal: true
2
2
 
3
+ require "openssl/signature_algorithm"
3
4
  require "tpm/constants"
4
- require "tpm/public_area"
5
5
  require "tpm/s_attest"
6
6
 
7
7
  module TPM
8
8
  class CertifyValidator
9
- attr_reader :info, :signature, :nonce, :object, :algorithm
9
+ attr_reader :info, :signature, :nonce, :public_area, :signature_algorithm, :hash_algorithm
10
10
 
11
- def initialize(info, signature, nonce, object, algorithm: "RS256")
11
+ TPM_SIGNATURE_ALG_TO_OPENSSL = {
12
+ ALG_RSASSA => OpenSSL::SignatureAlgorithm::RSAPKCS1,
13
+ ALG_RSAPSS => OpenSSL::SignatureAlgorithm::RSAPSS,
14
+ ALG_ECDSA => OpenSSL::SignatureAlgorithm::ECDSA
15
+ }.freeze
16
+
17
+ TPM_HASH_ALG_TO_OPENSSL = {
18
+ ALG_SHA1 => "SHA1",
19
+ ALG_SHA256 => "SHA256",
20
+ ALG_SHA384 => "SHA384",
21
+ ALG_SHA512 => "SHA512"
22
+ }.freeze
23
+
24
+ def initialize(info, signature, nonce, public_area, signature_algorithm: ALG_RSASSA, hash_algorithm: ALG_SHA256)
12
25
  @info = info
13
26
  @signature = signature
14
27
  @nonce = nonce
15
- @object = object
16
- @algorithm = algorithm
28
+ @public_area = public_area
29
+ @signature_algorithm = signature_algorithm
30
+ @hash_algorithm = hash_algorithm
17
31
  end
18
32
 
19
33
  def valid?(signing_key)
@@ -26,27 +40,38 @@ module TPM
26
40
  attest.attested_type == TPM::ST_ATTEST_CERTIFY &&
27
41
  attest.extra_data.buffer == nonce &&
28
42
  attest.magic == TPM::GENERATED_VALUE &&
29
- attest.attested.name.buffer == TPM::PublicArea.new(object).name
43
+ attest.attested.name.valid_for?(public_area.name)
30
44
  end
31
45
 
32
- def valid_signature?(signing_key)
33
- if rsa_pss?
34
- signing_key.verify_pss(hash_function, signature, info, salt_length: :auto, mgf1_hash: hash_function)
35
- else
36
- signing_key.verify(hash_function, signature, info)
37
- end
46
+ def valid_signature?(verify_key)
47
+ openssl_signature_algorithm = openssl_signature_algorithm_class.new(**openssl_signature_algorithm_parameters)
48
+ openssl_signature_algorithm.verify_key = verify_key
49
+ openssl_signature_algorithm.verify(signature, info)
50
+ rescue OpenSSL::SignatureAlgorithm::Error
51
+ false
38
52
  end
39
53
 
40
54
  def attest
41
55
  @attest ||= TPM::SAttest.deserialize(info)
42
56
  end
43
57
 
44
- def hash_function
45
- "SHA#{algorithm[2..-1]}"
58
+ def openssl_signature_algorithm_parameters
59
+ parameters = { hash_function: openssl_hash_function }
60
+
61
+ if public_area.ecc?
62
+ parameters[:curve] = public_area.openssl_curve_name
63
+ end
64
+
65
+ parameters
66
+ end
67
+
68
+ def openssl_hash_function
69
+ TPM_HASH_ALG_TO_OPENSSL[hash_algorithm] || raise("Unsupported hash algorithm #{hash_algorithm}")
46
70
  end
47
71
 
48
- def rsa_pss?
49
- algorithm.start_with?("PS")
72
+ def openssl_signature_algorithm_class
73
+ TPM_SIGNATURE_ALG_TO_OPENSSL[signature_algorithm] ||
74
+ raise("Unsupported signature algorithm #{signature_algorithm}")
50
75
  end
51
76
  end
52
77
  end
@@ -11,6 +11,8 @@ module TPM
11
11
  ALG_RSA = 0x0001
12
12
  ALG_SHA1 = 0x0004
13
13
  ALG_SHA256 = 0x000B
14
+ ALG_SHA384 = 0x000C
15
+ ALG_SHA512 = 0x000D
14
16
  ALG_NULL = 0x0010
15
17
  ALG_RSASSA = 0x0014
16
18
  ALG_RSAPSS = 0x0016
@@ -19,6 +21,8 @@ module TPM
19
21
 
20
22
  # ECC curves
21
23
  ECC_NIST_P256 = 0x0003
24
+ ECC_NIST_P384 = 0x0004
25
+ ECC_NIST_P521 = 0x0005
22
26
 
23
27
  # https://trustedcomputinggroup.org/resource/vendor-id-registry/ section 2 "TPM Capabilities Vendor ID (CAP_VID)"
24
28
  VENDOR_IDS = {
@@ -1,32 +1,68 @@
1
1
  # frozen_string_literal: true
2
2
 
3
+ require "openssl"
3
4
  require "tpm/key_attestation/version"
5
+
6
+ require "tpm/aik_certificate"
4
7
  require "tpm/certify_validator"
8
+ require "tpm/constants"
9
+ require "tpm/public_area"
5
10
 
6
11
  module TPM
7
12
  class KeyAttestation
13
+ # https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-install-trusted-tpm-root-certificates
14
+ ROOT_CERTIFICATES =
15
+ begin
16
+ pattern = File.expand_path(File.join(__dir__, "certificates", "*", "RootCA", "*.*"))
17
+ Dir.glob(pattern).map do |filename|
18
+ File.open(filename) { |file| OpenSSL::X509::Certificate.new(file) }
19
+ end
20
+ end
21
+
8
22
  class Error < StandardError; end
9
23
 
10
- attr_reader :certify_info, :signature, :certified_object, :signing_key, :algorithm, :qualifying_data
24
+ attr_reader(
25
+ :certify_info,
26
+ :signature,
27
+ :certified_key,
28
+ :certificates,
29
+ :signature_algorithm,
30
+ :hash_algorithm,
31
+ :qualifying_data,
32
+ :root_certificates
33
+ )
11
34
 
12
- def initialize(certify_info, signature, certified_object, signing_key, qualifying_data, algorithm: "RS256")
35
+ def initialize(
36
+ certify_info,
37
+ signature,
38
+ certified_key,
39
+ certificates,
40
+ qualifying_data,
41
+ signature_algorithm: ALG_RSASSA,
42
+ hash_algorithm: ALG_SHA256,
43
+ root_certificates: ROOT_CERTIFICATES
44
+ )
13
45
  @certify_info = certify_info
14
46
  @signature = signature
15
47
 
16
- @certified_object = certified_object
17
- @signing_key = signing_key
18
- @algorithm = algorithm
48
+ @certified_key = certified_key
49
+ @certificates = certificates
50
+ @signature_algorithm = signature_algorithm
51
+ @hash_algorithm = hash_algorithm
19
52
  @qualifying_data = qualifying_data
53
+ @root_certificates = root_certificates
20
54
  end
21
55
 
22
56
  def key
23
- if certify_validator.valid?(signing_key)
57
+ if valid?
24
58
  public_area.key
25
59
  end
26
60
  end
27
61
 
28
62
  def valid?
29
- !!key
63
+ certify_validator.valid?(aik_certificate.public_key) &&
64
+ aik_certificate.conformant? &&
65
+ trustworthy?
30
66
  end
31
67
 
32
68
  private
@@ -37,13 +73,31 @@ module TPM
37
73
  certify_info,
38
74
  signature,
39
75
  qualifying_data,
40
- certified_object,
41
- algorithm: algorithm
76
+ public_area,
77
+ signature_algorithm: signature_algorithm,
78
+ hash_algorithm: hash_algorithm
42
79
  )
43
80
  end
44
81
 
82
+ def trustworthy?
83
+ x509_certificates = certificates.map { |c| OpenSSL::X509::Certificate.new(c) }
84
+
85
+ trust_store.verify(x509_certificates[0], x509_certificates[1..-1])
86
+ end
87
+
88
+ def trust_store
89
+ @trust_store ||=
90
+ OpenSSL::X509::Store.new.tap do |trust_store|
91
+ root_certificates.uniq(&:serial).each { |root_certificate| trust_store.add_cert(root_certificate) }
92
+ end
93
+ end
94
+
95
+ def aik_certificate
96
+ @aik_certificate ||= TPM::AIKCertificate.from_der(certificates.first)
97
+ end
98
+
45
99
  def public_area
46
- @public_area ||= TPM::PublicArea.new(certified_object)
100
+ @public_area ||= TPM::PublicArea.new(certified_key)
47
101
  end
48
102
  end
49
103
  end
@@ -2,6 +2,6 @@
2
2
 
3
3
  module TPM
4
4
  class KeyAttestation
5
- VERSION = "0.5.0"
5
+ VERSION = "0.10.0"
6
6
  end
7
7
  end
@@ -24,6 +24,14 @@ module TPM
24
24
  t_public.key
25
25
  end
26
26
 
27
+ def ecc?
28
+ t_public.ecc?
29
+ end
30
+
31
+ def openssl_curve_name
32
+ t_public.openssl_curve_name
33
+ end
34
+
27
35
  private
28
36
 
29
37
  def name_digest
@@ -2,12 +2,13 @@
2
2
 
3
3
  require "bindata"
4
4
  require "tpm/sized_buffer"
5
+ require "tpm/tpm2b_name"
5
6
 
6
7
  module TPM
7
8
  class SAttest < BinData::Record
8
9
  # Section 10.12.3 in https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-2-Structures-01.38.pdf
9
10
  class SCertifyInfo < BinData::Record
10
- sized_buffer :name
11
+ tpm2b_name :name
11
12
  sized_buffer :qualified_name
12
13
  end
13
14
  end
@@ -1,6 +1,7 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  require "bindata"
4
+ require "openssl"
4
5
  require "tpm/constants"
5
6
  require "tpm/sized_buffer"
6
7
  require "tpm/t_public/s_ecc_parms"
@@ -10,7 +11,16 @@ module TPM
10
11
  # Section 12.2.4 in https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-2-Structures-01.38.pdf
11
12
  class TPublic < BinData::Record
12
13
  BYTE_LENGTH = 8
13
- CURVE_TPM_TO_OPENSSL = { TPM::ECC_NIST_P256 => "prime256v1" }.freeze
14
+
15
+ CURVE_TPM_TO_OPENSSL = {
16
+ TPM::ECC_NIST_P256 => "prime256v1",
17
+ TPM::ECC_NIST_P384 => "secp384r1",
18
+ TPM::ECC_NIST_P521 => "secp521r1",
19
+ }.freeze
20
+
21
+ BN_BASE = 2
22
+ RSA_KEY_DEFAULT_PUBLIC_EXPONENT = 2**16 + 1
23
+ ECC_UNCOMPRESSED_POINT_INDICATOR = "\x04"
14
24
 
15
25
  class << self
16
26
  alias_method :deserialize, :read
@@ -36,12 +46,19 @@ module TPM
36
46
  sized_buffer TPM::ALG_RSA
37
47
  end
38
48
 
49
+ def rsa?
50
+ alg_type == TPM::ALG_RSA
51
+ end
52
+
53
+ def ecc?
54
+ alg_type == TPM::ALG_ECC
55
+ end
56
+
39
57
  def key
40
- if parameters.symmetric == ::TPM::ALG_NULL
41
- case alg_type
42
- when TPM::ALG_ECC
58
+ if parameters.symmetric == TPM::ALG_NULL
59
+ if ecc?
43
60
  ecc_key
44
- when TPM::ALG_RSA
61
+ elsif rsa?
45
62
  rsa_key
46
63
  else
47
64
  raise "Type #{alg_type} not supported"
@@ -49,21 +66,22 @@ module TPM
49
66
  end
50
67
  end
51
68
 
69
+ def openssl_curve_name
70
+ if ecc?
71
+ CURVE_TPM_TO_OPENSSL[parameters.curve_id] || raise("Unknown curve #{parameters.curve_id}")
72
+ end
73
+ end
74
+
52
75
  private
53
76
 
54
77
  def ecc_key
55
78
  if parameters.scheme == TPM::ALG_ECDSA
56
- curve = CURVE_TPM_TO_OPENSSL[parameters.curve_id]
79
+ group = OpenSSL::PKey::EC::Group.new(openssl_curve_name)
57
80
 
58
- if curve
59
- group = OpenSSL::PKey::EC::Group.new(curve)
60
- pkey = OpenSSL::PKey::EC.new(group)
61
- public_key_bn = OpenSSL::BN.new("\x04" + unique.buffer.value, 2)
62
- public_key_point = OpenSSL::PKey::EC::Point.new(group, public_key_bn)
63
- pkey.public_key = public_key_point
81
+ key = OpenSSL::PKey::EC.new(group)
82
+ key.public_key = OpenSSL::PKey::EC::Point.new(group, bn(ECC_UNCOMPRESSED_POINT_INDICATOR + unique.buffer.value))
64
83
 
65
- pkey
66
- end
84
+ key
67
85
  end
68
86
  end
69
87
 
@@ -74,7 +92,7 @@ module TPM
74
92
 
75
93
  if parameters.key_bits / BYTE_LENGTH == n.size
76
94
  key = OpenSSL::PKey::RSA.new(parameters.key_bits.value)
77
- key.set_key(bn(n), nil, nil)
95
+ key.set_key(bn(n), bn(RSA_KEY_DEFAULT_PUBLIC_EXPONENT), nil)
78
96
 
79
97
  key.public_key
80
98
  end
@@ -83,7 +101,7 @@ module TPM
83
101
 
84
102
  def bn(data)
85
103
  if data
86
- OpenSSL::BN.new(data, 2)
104
+ OpenSSL::BN.new(data, BN_BASE)
87
105
  end
88
106
  end
89
107
  end
@@ -0,0 +1,17 @@
1
+ # frozen_string_literal: true
2
+
3
+ require "bindata"
4
+ require "tpm/tpmt_ha"
5
+
6
+ module TPM
7
+ class Tpm2bName < BinData::Record
8
+ endian :big
9
+
10
+ uint16 :name_size, value: lambda { name.to_binary_s.size }
11
+ tpmt_ha :name, read_length: :name_size
12
+
13
+ def valid_for?(other_name)
14
+ name.to_binary_s == other_name
15
+ end
16
+ end
17
+ end
@@ -0,0 +1,20 @@
1
+ # frozen_string_literal: true
2
+
3
+ require "bindata"
4
+
5
+ module TPM
6
+ class TpmtHa < BinData::Record
7
+ BYTE_LENGTH = 8
8
+ DIGEST_LENGTH_SHA1 = 160
9
+ DIGEST_LENGTH_SHA256 = 256
10
+
11
+ endian :big
12
+
13
+ uint16 :hash_alg
14
+
15
+ choice :digest, selection: :hash_alg do
16
+ string TPM::ALG_SHA1, length: DIGEST_LENGTH_SHA1 / BYTE_LENGTH
17
+ string TPM::ALG_SHA256, length: DIGEST_LENGTH_SHA256 / BYTE_LENGTH
18
+ end
19
+ end
20
+ end
@@ -26,4 +26,5 @@ Gem::Specification.new do |spec|
26
26
  spec.require_paths = ["lib"]
27
27
 
28
28
  spec.add_dependency "bindata", "~> 2.4"
29
+ spec.add_dependency "openssl-signature_algorithm", "~> 1.0"
29
30
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: tpm-key_attestation
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.5.0
4
+ version: 0.10.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Gonzalo
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2020-01-23 00:00:00.000000000 Z
11
+ date: 2020-07-09 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bindata
@@ -24,6 +24,20 @@ dependencies:
24
24
  - - "~>"
25
25
  - !ruby/object:Gem::Version
26
26
  version: '2.4'
27
+ - !ruby/object:Gem::Dependency
28
+ name: openssl-signature_algorithm
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '1.0'
34
+ type: :runtime
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '1.0'
27
41
  description:
28
42
  email:
29
43
  executables: []
@@ -46,11 +60,42 @@ files:
46
60
  - bin/setup
47
61
  - gemfiles/openssl_2_0.gemfile
48
62
  - gemfiles/openssl_2_1.gemfile
63
+ - gemfiles/openssl_2_2.gemfile
49
64
  - gemfiles/openssl_default.gemfile
50
65
  - gemfiles/openssl_head.gemfile
66
+ - install-openssl.sh
67
+ - install-ruby.sh
68
+ - lib/tpm/aik_certificate.rb
69
+ - lib/tpm/certificates/AMD/RootCA/AMD-fTPM-ECC-RootCA.crt
70
+ - lib/tpm/certificates/AMD/RootCA/AMD-fTPM-RSA-RootCA.crt
71
+ - lib/tpm/certificates/Atmel/RootCA/Atmel TPM Root Signing Module.der
72
+ - lib/tpm/certificates/Infineon/RootCA/IFX TPM EK Root CA.cer
73
+ - lib/tpm/certificates/Infineon/RootCA/IFX-RootCA.cer
74
+ - lib/tpm/certificates/Infineon/RootCA/IFX_TPM_RootCert_008.crt
75
+ - lib/tpm/certificates/Infineon/RootCA/Infineon OPTIGA(TM) ECC Root CA.crt
76
+ - lib/tpm/certificates/Infineon/RootCA/Infineon OPTIGA(TM) RSA Root CA.crt
77
+ - lib/tpm/certificates/Intel/RootCA/EKRootPublicKey.cer
78
+ - lib/tpm/certificates/Microsoft/RootCA/Microsoft TPM Root Certificate Authority 2014.cer
79
+ - lib/tpm/certificates/NationZ/RootCA/EkRootCA.crt
80
+ - lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA 01.cer
81
+ - lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA 02.cer
82
+ - lib/tpm/certificates/Nuvoton/RootCA/NTC TPM EK Root CA ARSUF 01.cer
83
+ - lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1013.cer
84
+ - lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1014.cer
85
+ - lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1110.cer
86
+ - lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 1111.cer
87
+ - lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2010.cer
88
+ - lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2011.cer
89
+ - lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2110.cer
90
+ - lib/tpm/certificates/Nuvoton/RootCA/Nuvoton TPM Root CA 2111.cer
91
+ - lib/tpm/certificates/QC/RootCA/Microsoft TPM Root Certificate Authority 2014.cer
92
+ - lib/tpm/certificates/STMicro/RootCA/GlobalSign Trusted Computing CA.crt
93
+ - lib/tpm/certificates/STMicro/RootCA/GlobalSign Trusted Platform Module ECC Root
94
+ CA.crt
95
+ - lib/tpm/certificates/STMicro/RootCA/ST TPM Root Certificate.crt
96
+ - lib/tpm/certificates/STMicro/RootCA/STM TPM ECC Root CA 01.crt
51
97
  - lib/tpm/certify_validator.rb
52
98
  - lib/tpm/constants.rb
53
- - lib/tpm/ek_certificate.rb
54
99
  - lib/tpm/key_attestation.rb
55
100
  - lib/tpm/key_attestation/version.rb
56
101
  - lib/tpm/public_area.rb
@@ -60,6 +105,8 @@ files:
60
105
  - lib/tpm/t_public.rb
61
106
  - lib/tpm/t_public/s_ecc_parms.rb
62
107
  - lib/tpm/t_public/s_rsa_parms.rb
108
+ - lib/tpm/tpm2b_name.rb
109
+ - lib/tpm/tpmt_ha.rb
63
110
  - tpm-key_attestation.gemspec
64
111
  homepage: https://github.com/cedarcode/tpm-key_attestation
65
112
  licenses:
@@ -83,7 +130,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
83
130
  - !ruby/object:Gem::Version
84
131
  version: '0'
85
132
  requirements: []
86
- rubygems_version: 3.1.2
133
+ rubygems_version: 3.1.4
87
134
  signing_key:
88
135
  specification_version: 4
89
136
  summary: TPM Key Attestation verifier