Secure Enclave

From The iPhone Wiki
Revision as of 15:06, 26 December 2013 by M2m (talk | contribs)
Jump to: navigation, search

The Secure Enclave is part of the A7 chip and a basic part of Apples Touch ID fingerprint technology. Within the Secure Enclave the fingerprint data is stored in an encrypted form which - according to Apple - can only be decrypted by a key available by the Secure Enclave thus making fingerprint data walled off from the rest of A7 Chip and as well as the rest of iOS. The secure enclave itself is a flashable 4MB processore called the secure enclave processor (SEP) as documented in Appple Patent Application 20130308838. The technology used is basically ARM's TrustZone/SecurCore.

The SEP has its on OS (called SEP OS) and there exists a tool called seputil which is used to communicate with it.

seputil has the following valid commands:

--ping        Send a PING operation to the SEP OS
--load        Load <file> as the SEP runtime firmware
--restore     Load <file> as the SEP runtime firmware in restore mode
--restore+art Load <file> as the SEP runtime firmware in restore mode with ART
--wait        Pause for kernel driver to load before failing
--preflight   Pre-flight load/restore firmware against ART to pre-check for boot failures
--log         Dump the mailbox message log
--rom status  Get the ROM status
--rom tz0     Send a ROM TZ0 command
--rom nop     Send a ROM NOP command
--rom nonce   Send a ROM nonce request
--new-nonce   Request new SEP/OS nonce
--kill-nonce  Request invalidate SEP/OS nonce
--art get     Dump current ART from Memory
--art set     Persist the supplied ART to storage
--art clear   Clear the persisted ART
--art ctrtest Counter self-test (DESTRUCTIVE - WILL BRICK DEVICE)
--sleep       Sleep the SEP NOW!
--nap         Nap the SEP NOW!
--pingflood   Ping SEP endlessly
--clkgate     Enable SEP clock gating
--get <obj>   Read obj and write to stdout
--put <obj>   Read stdin and write to obj
--boot-check <file>  Check whether a firmware might be bootable WRT the current ART
--dump-fw <file>     Dump measurements of firmware file

Further References

www.forbes.com