<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.7 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC5652 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5652.xml">
<!ENTITY RFC7030 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml">
<!ENTITY RFC4210 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4210.xml">
<!ENTITY RFC8555 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8555.xml">
<!ENTITY I-D.tschofenig-rats-psa-token SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.tschofenig-rats-psa-token.xml">
<!ENTITY I-D.gutmann-scep SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.gutmann-scep.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-richardson-rats-usecases-03" category="info">

  <front>
    <title abbrev="useful RATS">Use cases for Remote Attestation common encodings</title>

    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="C." surname="Wallace" fullname="Carl Wallace">
      <organization>Red Hound Software</organization>
      <address>
        <email>carl@redhoundsoftware.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>

    <date year="2019" month="July" day="08"/>

    <area>Internet</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document details mechanisms created for performing Remote Attestation
that have been used in a number of industries.  The document intially focuses
on existing industry verticals, mapping terminology used in those
specifications to the more abstract terminology used by RATS.</t>

<t>The document aspires to describe possible future
use cases that would be enabled by common formats.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>The recently chartered IETF RATS WG intends to create a system of
attestations that can be shared across a multitude of different users.</t>

<t>This document exists as place to collect use cases for the common RATS
technologies in support of the IETF RATS charter point 1.  This document is
not expected to be published as an RFC, but remain open as a working
document.  It could become an appendix to provide motivation for a protocol
standards document.</t>

<t>This document will probably not deal with use cases from an end-user point of
view, but rather on the technology verticals that wish to use RATS concepts
(such as EAT) in their deployments.  However, the end-user use cases for
these verticales will be explained.</t>

<t>End-user use cases that would either directly leverage RATS technology, or
would serve to inform technology choices are welcome, however.</t>

</section>
<section anchor="Terminology" title="Terminology">

<t>Critical to dealing with and constrasting different technologies is to
collect terms with are compatible, to distinguish those terms which are
similar but used in different ways.</t>

<t>This section will grow to include forward and external references to terms
which have been seen.  When terms need to be disambiguated they will be
prefixed with their source, such as "TCG(claim)" or "FIDO(relying party)"</t>

<t>Platform attestations generally come in two categories. This document will
attempt to indicate for a particular attestation technology falls into this.</t>

<section anchor="static-attestations" title="Static attestations">

<t>A static attestation says something about the platform on which the code is running.</t>

</section>
<section anchor="session-attestations" title="Session attestations">

<t>A session attestation says something about how the shared session key was
created.</t>

</section>
<section anchor="statements" title="Statements">

<t>The term "statement" is used as the generic term for the semantic content
which is being attested to.</t>

</section>
</section>
<section anchor="rfc2119" title="Requirements Language">

<t>This document is not a standards track document and does not make any
normative protocol requirements using terminology described in <xref target="RFC2119"/>.</t>

</section>
<section anchor="overview-of-sources-of-use-cases" title="Overview of Sources of Use Cases">

<t>The following specifications have been convered in this document:</t>

<t><list style="symbols">
  <t>The Trusted Computing Group "Network Attestation System" (private document)</t>
  <t>Android Keystore</t>
  <t>Fast Identity Online (FIDO) Alliance attestation,</t>
</list></t>

<t>This document will be expanded to include summaries from:</t>

<t><list style="symbols">
  <t>Trusted Computing Group (TCG) Trusted Platform Module (TPM)/Trusted
Software Stack (TSS)</t>
  <t>ARM "Platform Security Architecture" <xref target="I-D.tschofenig-rats-psa-token"/></t>
</list></t>

<t>And any additional sources suggested.</t>

</section>
<section anchor="use-case-summaries" title="Use case summaries">

<t>This section lists a series of cases where an attestation is done.</t>

<section anchor="netattest" title="Device Capabilities/Firmware Attestation">

<t>A network operator wants to know the qualities of the hardware and software
on the machines attached to their network.  The process starts with some kind
of Root of Trust, performs a series of measurements, and expresses this
with an attestation as to the hardware and firmware/software which is
running.  This is a general description for which there are many specific use
cases.</t>

<section anchor="relying-on-an-attestation-server" title="Relying on an Attestation Server">

<t>The measurements from a heterogenous network of devices are provided to
device-specific attestation servers.  The attestation servers know what the
"golden" measurements are, and perform the appropriate evaluations, resulting
in attestations that the relying parties can depend upon.</t>

</section>
<section anchor="autonomous-relying-party" title="Autonomous Relying Party">

<t>The signed measurements are sent to a relying party which must validate them
directly.  (It may do so with the help of of a signed list of golden values,
or some other process).  The relying party needs to validate the signed
statements directly.</t>

<t>This may occur because the network is not connected, or even because it can
not be connected until the equipment is validated.</t>

</section>
<section anchor="proxy-root-of-trust" title="Proxy Root of Trust">

<t>A variety of devices provide measurements via their Root of Trust.
A server collects these measurements, and (having applied a local policy)
then creates a device agnostic attestation.  The relying party can validate
the claims in a standard format.</t>

</section>
<section anchor="network-scaling-small" title="network scaling &#8211; small">

<t>An entire network of systems needs to be validated (such as all the desktops
in an enterprise's building).  The infrastructure is in control of a single
operator and is already trusted.  The network can be partitioned so that
machines that do not pass attestation can be quarantined.  A 1:1 relationship
between the device and the relying party can be used to maintain freshness of
the attestation.</t>

</section>
<section anchor="network-scaling-medium" title="network scaling &#8211; medium">

<t>An entire network of systems needs to be validated: such as all the desktops
in an enterprise's building, or all the routers at an ISP.  The
infrastructure is not necessarily trusted: it could be subverted, and it must
also attest.   The devices may be under a variety of operators, and may be
mutually suspicious: each device may therefore need to process attestations
from every other device.  An NxM mesh of attestations may be untenable, but a
system of N:1:M relationships can be setup via proxy attestations.</t>

</section>
<section anchor="network-scaling-large" title="network scaling &#8211; large">

<t>An entire network of systems need to be continuously attested.  This could be
all of the smartphones on an LTE network, or every desktop system in a
worldwide enterprise.  The network operator wishes to do this in order
maintain identities of connected devices more than to validate correct
firmware, but both situations are reasonable.</t>

</section>
<section anchor="computation-characteristics" title="Computation characteristics">

<t>A group of enterprises organized as a consortium seeks to deploy computing
node s as the basis of their shared blockchain system. Each member of the
consortium  must forward an equal number of computing nodes to participate in
the P2P network of nodes that form the basis of the blockchain system. In
order to prevent the various issues (e.g. concentration of hash power,
anonymous mining nodes) found in other blockchain systems, each computing
node must comply to a predefined allowable manifest of system hardware,
software and firmware, as agreed to by the membership of the
consortium. Thus, a given computing node must be able to report the
(pre-boot) configuration of its system and be able to report at an y time the
operational status of the various components that make-up its system.</t>

<t>The consortium seeks to have the following things attested: system
configuration, group membership, and virtualization status.</t>

<t>This is a peer-to-peer protocol so each device in the consortium is
a relying party.  The attestation may be requested online by another entity
within the consortium, but not by other parties.  The attestation needs to be
compact and interoperable and may be included in the blockchain itself at the
completion of the consensus algorithm.</t>

<t>The attestation will need to start in a hardware RoT in order to validate
if the system is running real hardware rather than running a virtual
machine.</t>

</section>
</section>
<section anchor="cryptattest" title="Cryptographic Key Attestation">

<t>The relying party wants to know how secure a private key that identifies
an entity is.  Unlike the network attestation, the relying party is not part of
the network infrastructure, nor do they necessarily have a business relationship (such as
ownership) over the end device.</t>

<section anchor="device-type-attestation" title="Device Type Attestation">

<t>This use case convinces the relying party of the characteristics of a
device.  For privacy reasons, it might not identify the actual device itself,
but rather the class of device.  The relying party can understand from either
in-band (claims) or out-of-band (model numbers, which may be expressed as a claim) whether the device has
features such as a hardware TPM, software TPM via TEE, or software TPM
without TEE.  Other details such as the availability of finger-print readers
or HDMI outputs may also be inferred.</t>

</section>
<section anchor="key-storage-attestation" title="Key storage attestation">

<t>This use case convinces the relying party only about the provenance of a private key by
providing claims of the
storage security of the private key.  This can be conceived as a subset of
the previous case, but may be apply very specifically to just a keystore. Additional
details associated with the private key may be provided as well, including limitations on
usage of the key.</t>

<t>Key storage attestations may be consumed by systems provisioning public
key certificates for devices or human users. In these cases, attestations may be
incorporated into certificate request protocols (e.g., EST {#rfc7030}, CMP {#rfc4210}, ACME {#rfc8555}, SCEP <xref target="I-D.gutmann-scep"/>, etc.) and processed by
registration authorities or certification authorities prior to determining contents for
any issued certificate.</t>

</section>
<section anchor="end-user-authorization" title="End user authorization">

<t>This use case convinces the relying party that the digital signatures made by
the indicated key pair were done with the approval of the end-user operator.
This may also be considered possible subset of the device attestation above,
but the attestation may be on a case-by-case basis.  The nature of the
approval by the end-user would be indicated. Examples include: the user
unlocked the device, the user viewed some message and acknowledge it inside
an app, the message was displayed to the user via out-of-app control
mechanism.  The acknowledgements could include selecting options on the
screen, pushing physical buttons, scanning fingerprints, proximity to other
devices (via bluetooth beacons, chargers, etc)</t>

</section>
</section>
<section anchor="geographic-attestation" title="Geographic attestation">

<t>The relying party wants to know the physical location (on the planet earth)
of the device.  This may be provided directly by a GPS/GLONASS/Galileo module
that is incorporated into a TPM.  This may also be provided by collecting other
proximity messages from other device that the relying party can form a trust
relationship with.</t>

<section anchor="i-am-here" title="I am here">

<t>The simplest use case is the claim of some specific coordinates.</t>

</section>
<section anchor="i-am-near" title="I am near">

<t>The second use case is the claim that some other devices are nearby.  This
may be absolute ("I am near device X, which claims to be at location A"),
or just relative, ("I am near device X").  This use could use
"I am here" or "I am near" claims from a 1:1 basis with device X, or use
some other protocol.  The nature of how the proximity was established would
be part of this claim.  In order to defeat a variety of mechanisms that
might attempt to proxy ("wormhole") radio communications, highly precise
clocks may be required, and there may also have to be attestations as to the
precision of those clocks.</t>

<t>An additional example of being near would be for the case where two
smartphones can establish that they are together by recording a common random
movement, such as both devices being shaken together.  Each device may
validate the claim from the other (in a disconnected fashion), or a third
party may validate the claim as the relying party.</t>

<t>This could be used to establish that a medical professional was in proximity
of a patient with implanted devices who needs help.</t>

</section>
<section anchor="you-are-here" title="You are here">

<t>A third way to establish location is for a third party to communicate
directly with the relying party.   The nature of how this trust is
established (and whether it is done recursively) is outside of the scope
here.  What is critical is that the identity of "You" can be communicated
through the third party in a way that the relying party can use, but other
intermediaries can not view.</t>

</section>
</section>
<section anchor="connectivity-attestation" title="Connectivity attestation">

<t>The relying party wants to know what devices are connected.  A typical
situation would be a media owner needing to know what TV device is connected
via HDMI and if High-bandwidth Digital Content Protection (HDCP) is
intact.</t>

</section>
</section>
<section anchor="technology-users-for-rats" title="Technology users for RATS">

<section anchor="trusted-computing-group-tcg" title="Trusted Computing Group (TCG)">

<t>The TCG is trying to solve the problem of knowing if a networking device
should be part of a network, if it belongs to the operator, and if it is running
approriate software.  The work covers most of the use cases in <xref target="netattest"/>.</t>

<t>This proposal is a work-in-progress, and is available to TCG members only.
The goal is to be multi-vendor, scalable and extensible.   The proposal
intentionally limits itself to:</t>

<t><list style="symbols">
  <t>"non-privacy-preserving applications (i.e., networking, Industrial IoT )",</t>
  <t>that the firmware is provided by the device manufacturer</t>
  <t>that there is a manufacturer installed hardware root of trust (such as a
TPM and boot room)</t>
</list></t>

<t>Service providers and enterprises deploy hundreds of routers, many of them in
remote locations where they're difficult to access or secure.  The point of
remote attestation is to:</t>

<t><list style="symbols">
  <t>identify a remote box in a way that's hard to spoof</t>
  <t>report the inventory of software was launched on the box in a way that can
not be spoofed</t>
</list></t>

<t>The use case described is to be able to monitor the authenticity of software
versions and configurations running on each device.  This allows owners and
auditors to detect deviation from approved software and firmware versions and
configurations, potentially identifying infected devices.</t>

<t>Attestation may be performed by network management systems.  Networking
Equipment is often highly interconnected, so it's also possible that
attestation could be performed by neighboring devices.</t>

<t>Specifically listed to be out of scope for the first generation includes:
Linux processes, assemblies of hardware/software created by end-customers,
and equipment that is sleepy.  There is an intention to cover some of these
are topics in future versions of the documents.</t>

<t>The TCG Attestation leverages the TPM to make a series of measurements during
the boot process, and to have the TPM sign those measurements.  The resulting
"PCG" hashes are then available to an external verifier.</t>

<t>The TCG uses the following terminology:</t>

<t><list style="symbols">
  <t>Device Manufacuter</t>
  <t>Attester ("device under attestation")</t>
  <t>Verifier (Network Management Station)</t>
  <t>"Explicit Attestation" is the TCG term for a static (platform) statement.</t>
  <t>"Implicit Attestation" is the TCG term for a session statement.</t>
  <t>Reference Integrity Measurements (RIM), which are signed my device
manufacturer and integrated into firmware.</t>
  <t>Quotes: measured values (having been signed), and RIMs</t>
  <t>Reference Integrity Values (RIV)</t>
  <t>devices have a Initial Attestation Key (IAK), which is provisioned at the
same time as the IDevID.</t>
  <t>PCR - Platform Configuration Registry (deals with hash chains)</t>
</list></t>

<t>The TCG document builds upon a number of IETF technologies: SNMP (Attestation
MIB), YANG, XML, JSON, CBOR, NETCONF, RESTCONF, CoAP, TLS and SSH.
The TCG document leverages the 802.1AR IDevID and LDevID processes.</t>

</section>
<section anchor="android-keystore-system" title="Android Keystore system">

<t><xref target="keystore"/> describes a system used in smart phones that run the Android
operation system.   The system is primarily a software container to contain
and control access to cryptographic keys, and therefore provides many of the
same functions that a hardware Trusted Platform Module might provide.</t>

<t>The uses described in section <xref target="cryptattest"/> are the primary focus.</t>

<t>On hardware which is supported, the Android Keystore will make use of
whatever trusted hardware is available, including use of Trusted Execution
Environment (TEE) or Secure Element (SE).  The Keystore therefore abstracts
the hardware, and guarantees to applications that the same APIs can be used
on both more and less capable devices.</t>

<t>A great deal of focus from the Android Keystore seems to be on providing
fine-grained authorization of what keys can be used by which applications.</t>

<t>XXX - clearly there must be additional (intended?) use cases that provide
some kind of attestation.</t>

<t>Android 9 on Pixel 2 and 3 can provided protected confirmation messages.
This uses hardware access from the TPM/TEE to display a message directly to
the user, and receives confirmation directly from the user.  A hash of the
contents of the message can provided in an attestation that the device
provides.</t>

<t>In addition, the Android Keystore provides attestation information about itself
for use by FIDO.</t>

<t>QUOTE: Finally, the Verified Boot state is included in key attestation
certificates (provided by Keymaster/Strongbox) in the deviceLocked and
verifiedBootState fields, which can be verified by apps as well as
passed onto backend services to remotely verify boot integrity</t>

</section>
<section anchor="fast-identity-online-fido-alliance" title="Fast IDentity Online (FIDO) Alliance">

<t>The FIDO Alliance <xref target="fido"/> has a number of specifications aimed primarily at
eliminating the need for passwords for authentication to online services.
The goal is to leverage asymmetric cryptographic operations in common
browser and smart-phone platforms so that users can easily authentication.</t>

<t>The use cases of <xref target="cryptattest"/> are primary.</t>

<t>FIDO specifications extend to various hardware second factor authentication
devices.</t>

<t>Terminology includes:</t>

<t><list style="symbols">
  <t>"relying party" validates a claim</t>
  <t>"relying party application" makes FIDO Authn calls</t>
  <t>"browser" provides Web Authentication JS API</t>
  <t>"platform" is the base system</t>
  <t>"internal authenticator" is some credential built-in to the device</t>
  <t>"external authenticator" may be connected by USB, bluetooth, wifi, and may
be an stand-alone device, USB connected key, phone or watch.</t>
</list></t>

<t>FIDO2 had a Key Attestation Format <xref target="fidoattestation"/>, and a Signature Format
<xref target="fidosignature"/>, but these have been combined into the W3C document
<xref target="fido_w3c"/> specification.</t>

<t>A FIDO use case involves a relying party having an attestation on
the biometric system that identifies a human.  It is the state of the
biometric system that is being attested to, not the identity of the human!</t>

<t>FIDO does provides a transport in the form of the WebAuthn and FIDO CTAP
protocols.</t>

<t>According to <xref target="fidotechnote"/> FIDO uses attestation to make claims about the
kind of device which is be used to enroll.  Keypairs are generated on a
per-device <spanx style="emph">model</spanx> basis, with a certificate having a trust chain that leads
back to a well-known root certificate.  It is expected that as many as
100,000 devices in a production run would have the same public and private
key pair.  One assumes that this is stored in a tamper-proof TPM so it is
relatively difficult to get this key out.  The use of this key attests to the
the device type, and the kind of protections for keys that the relying party
may assume, not to the identity of the end user.</t>

</section>
</section>
<section anchor="examples-of-existing-attestation-formats" title="Examples of Existing Attestation Formats.">

<t>This section provides examples of some existing attestation formats.</t>

<section anchor="android-keystore" title="Android Keystore">

<t>Android Keystore attestations take the form of X.509 certificates. The examples below
package the attestation certificate along with intermediate CA certificates required
to validate the attestation as a certificates-only SignedData message <xref target="RFC5652"/>. The
trust anchor is available here: <xref target="keystore_attestation"/>.</t>

<t>The attestations below were generated using the generateKeyPair method from the
DevicePolicyManager class using code similar to the following.</t>

<t>```
KeyGenParameterSpec.Builder builder = null;
if(hasStrongBox) {
        builder = new KeyGenParameterSpec.Builder(
                        m_alias,
                        KeyProperties.PURPOSE_SIGN | KeyProperties.PURPOSE_VERIFY | KeyProperties.PURPOSE_ENCRYPT | KeyProperties.PURPOSE_DECRYPT)
                        .setKeySize(2048)
                        .setDigests(KeyProperties.DIGEST_NONE, KeyProperties.DIGEST_SHA256)
                        .setBlockModes(KeyProperties.BLOCK_MODE_CBC, KeyProperties.BLOCK_MODE_GCM)
                        .setEncryptionPaddings(KeyProperties.ENCRYPTION_PADDING_RSA_PKCS1, KeyProperties.ENCRYPTION_PADDING_RSA_OAEP)
                        .setSignaturePaddings(KeyProperties.SIGNATURE_PADDING_RSA_PSS, KeyProperties.SIGNATURE_PADDING_RSA_PKCS1)
                        .setUserAuthenticationRequired(false)
                        .setIsStrongBoxBacked(true)
                        .setUnlockedDeviceRequired(true);
}
else {
        builder = new KeyGenParameterSpec.Builder(
                        m_alias,
                        KeyProperties.PURPOSE_SIGN | KeyProperties.PURPOSE_VERIFY | KeyProperties.PURPOSE_ENCRYPT | KeyProperties.PURPOSE_DECRYPT)
                        .setKeySize(2048)
                        .setDigests(KeyProperties.DIGEST_NONE, KeyProperties.DIGEST_SHA256, KeyProperties.DIGEST_SHA384, KeyProperties.DIGEST_SHA512)
                        .setBlockModes(KeyProperties.BLOCK_MODE_CBC, KeyProperties.BLOCK_MODE_CTR,KeyProperties.BLOCK_MODE_GCM)
                        .setEncryptionPaddings(KeyProperties.ENCRYPTION_PADDING_RSA_PKCS1, KeyProperties.ENCRYPTION_PADDING_RSA_OAEP)
                        .setSignaturePaddings(KeyProperties.SIGNATURE_PADDING_RSA_PSS, KeyProperties.SIGNATURE_PADDING_RSA_PKCS1)
                        .setUserAuthenticationRequired(false)
                        .setIsStrongBoxBacked(false)
                        .setUnlockedDeviceRequired(true);
}
builder.setAttestationChallenge(challenge_bytes);</t>

<t>KeyGenParameterSpec keySpec = builder.build();
AttestedKeyPair akp = dpm.generateKeyPair(componentName, algorithm, keySpec, idAttestationFlags);</t>

<t>```</t>

<section anchor="tee" title="TEE">
<t>Annotations included below are delimited by ASN.1 comments, i.e., &#8211;. Annotations should
be consistent with structures described here: <xref target="keystore_attestation"/>.</t>

<t><spanx style="verb">
   0 1172: SEQUENCE {
   4  764:   SEQUENCE {
   8    3:     [0] {
  10    1:       INTEGER 2
         :       }
  13    1:     INTEGER 1
  16   13:     SEQUENCE {
  18    9:       OBJECT IDENTIFIER
         :         sha256WithRSAEncryption (1 2 840 113549 1 1 11)
  29    0:       NULL
         :       }
  31   27:     SEQUENCE {
  33   25:       SET {
  35   23:         SEQUENCE {
  37    3:           OBJECT IDENTIFIER serialNumber (2 5 4 5)
  42   16:           PrintableString 'c6047571d8f0d17c'
         :           }
         :         }
         :       }
  60   32:     SEQUENCE {
  62   13:       UTCTime 01/01/1970 00:00:00 GMT
  77   15:       GeneralizedTime 07/02/2106 06:28:15 GMT
         :       }
  94   31:     SEQUENCE {
  96   29:       SET {
  98   27:         SEQUENCE {
 100    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 105   20:           UTF8String 'Android Keystore Key'
         :           }
         :         }
         :       }
 127  290:     SEQUENCE {
 131   13:       SEQUENCE {
 133    9:         OBJECT IDENTIFIER rsaEncryption (1 2 840 113549 1 1 1)
 144    0:         NULL
         :         }
 146  271:       BIT STRING, encapsulates {
 151  266:         SEQUENCE {
 155  257:           INTEGER
         :             00 B5 3A 83 61 A2 85 CC D2 D6 25 7F 07 0B B4 A0
         :             F6 FE 05 01 C9 55 CB 0D 18 D2 C6 79 BA 82 12 67
         :             75 8D 5B F3 24 D3 F8 EA 99 82 7D 1F 5E CD 77 D6
         :             99 11 13 FF 18 C9 3D 4D 01 C5 8E E9 04 E7 17 E2
         :             88 12 2B B9 A1 77 2F C2 4F 57 78 98 4E E3 DE 7A
         :             1B 18 BE D3 ED C9 59 A0 24 50 E1 FA AC 81 B6 DA
         :             80 B0 BD 48 AD 26 9C 4A 4E CE 54 17 58 C1 F4 F8
         :             7F 3C 5D 8F C8 2C 2A 7B 18 95 B3 D4 E0 3A C8 9D
         :                     [ Another 129 bytes skipped ]
 416    3:           INTEGER 65537
         :           }
         :         }
         :       }
 421  347:     [3] {
 425  343:       SEQUENCE {
 429   14:         SEQUENCE {
 431    3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
 436    1:           BOOLEAN TRUE
 439    4:           OCTET STRING, encapsulates {
 441    2:             BIT STRING 4 unused bits
         :               '1100'B
         :             }
         :           }
 445  323:         SEQUENCE {
 449   10:           OBJECT IDENTIFIER '1 3 6 1 4 1 11129 2 1 17'
 461  307:           OCTET STRING, encapsulates {  -- Attestation Extension
 465  303:             SEQUENCE {           -- KeyDescription
 469    1:               INTEGER 2          -- attestationVersion (KM3)
 472    1:               ENUMERATED 1       -- attestationSecurityLevel (TrustedEnv.)
 475    1:               INTEGER 3          -- keymasterVersion
 478    1:               ENUMERATED 1       -- keymasterSecurityLevel (TrustedEnv.)
 481    9:               OCTET STRING 'challenge'    -- attestationChallenge
 492    0:               OCTET STRING       -- reserved
         :                 Error: Object has zero length.
 494   44:               SEQUENCE {         -- softwareEnforced
 496    8:                 [701] {          -- creationDateTime
 500    6:                   INTEGER 01 64 47 2A 4B 64
         :                   }
 508   28:                 [709] {               -- attestationApplicationId
 512   26:                   OCTET STRING, encapsulates {
 514   24:                     SEQUENCE {        -- AttestationApplicationId
 516   20:                       SET {           -- package_infos
 518   18:                         SEQUENCE {    -- AttestationPackageInfo
 520   13:                           OCTET STRING 'AndroidSystem'  -- package_name
 535    1:                           INTEGER 1   -- version
         :                           }
         :                         }
 538    0:                       SET {}     -- signature_digests
         :                       }
         :                     }
         :                   }
         :                 }
 540  229:               SEQUENCE {         -- hardwareEnforced
 543   14:                 [1] {            -- purpose
 545   12:                   SET {
 547    1:                     INTEGER 0    -- KeyPurpose.ENCRYPT
 550    1:                     INTEGER 1    -- KeyPurpose.DECRYPT
 553    1:                     INTEGER 2    -- KeyPurpose.SIGN
 556    1:                     INTEGER 3    -- KeyPurpose.VERIFY
         :                     }
         :                   }
 559    3:                 [2] {            -- algorithm
 561    1:                   INTEGER 1      -- Algorithm.RSA
         :                   }
 564    4:                 [3] {            -- keySize
 566    2:                   INTEGER 2048
         :                   }
 570   11:                 [5] {            -- digest
 572    9:                   SET {
 574    1:                     INTEGER 4    -- Digest.SHA256
 577    1:                     INTEGER 5    -- Digest.SHA384
 580    1:                     INTEGER 6    -- Digest.SHA512
         :                     }
         :                   }
 583   14:                 [6] {            -- padding
 585   12:                   SET {
 587    1:                     INTEGER 4    -- PaddingMode.RSA_PKCS1_1_5_ENCRYPT
 590    1:                     INTEGER 2    -- PaddingMode.RSA_OAEP
 593    1:                     INTEGER 3    -- PaddingMode.RSA_PKCS1_1_5_SIGN
 596    1:                     INTEGER 5    -- PaddingMode.RSA_PSS
         :                     }
         :                   }
 599    5:                 [200] {          -- rsaPublicExponent
 603    3:                   INTEGER 65537
         :                   }
 608    2:                 [503] {          -- noAuthRequired
 612    0:                   NULL           -- documentation indicates this is a Boolean
         :                   }
 614    3:                 [702] {          -- origin
 618    1:                   INTEGER 0      -- KeyOrigin.GENERATED
         :                   }
 621    2:                 [703] {          -- rollbackResistant
 625    0:                   NULL           -- documentation indicates this is a Boolean
         :                   }
 627   42:                 [704] {          -- rootOfTrust
 631   40:                   SEQUENCE {     -- verifiedBootKey
 633   32:                     OCTET STRING
         :                   19 62 B0 53 85 79 FF CE 9A C9 F5 07 C4 6A FE 3B
         :                   92 05 5B AC 71 46 46 22 83 C8 5C 50 0B E7 8D 82
 667    1:                     BOOLEAN TRUE -- deviceLocked
 670    1:                     ENUMERATED 0 -- verifiedBootState (verified)
         :                     }
         :                   }
 673    5:                 [705] {          -- osVersion
 677    3:                   INTEGER 90000  -- Android P
         :                   }
 682    5:                 [706] {          -- osPatchLevel
 686    3:                   INTEGER 201806 -- June 2018
         :                   }
 691    8:                 [710] {          -- attestationIdBrand
 695    6:                   OCTET STRING 'google'
         :                   }
 703    9:                 [711] {          -- attestationIdDevice
 707    7:                   OCTET STRING 'walleye'
         :                   }
 716    9:                 [712] {          -- attestationIdProduct
 720    7:                   OCTET STRING 'walleye'
         :                   }
 729   14:                 [713] {          -- attestationIdSerial
 733   12:                   OCTET STRING 'HT83K1A03849'
         :                   }
 747    8:                 [716] {          -- attestationIdManufacturer
 751    6:                   OCTET STRING 'Google'
         :                   }
 759    9:                 [717] {          -- attestationIdModel
 763    7:                   OCTET STRING 'Pixel 2'
         :                   }
         :                 }
         :               }
         :             }
         :           }
         :         }
         :       }
         :     }
 772   13:   SEQUENCE {
 774    9:     OBJECT IDENTIFIER sha256WithRSAEncryption (1 2 840 113549 1 1 11)
 785    0:     NULL
         :     }
 787  385:   BIT STRING
         :     05 41 B9 13 11 53 93 A2 02 62 1F 15 35 8E D9 7C
         :     A1 D5 2E ED 13 AC 24 26 B2 A1 2F EE B4 0C 4D 71
         :     DC 9F 55 EC A1 F6 64 62 F2 73 A8 7E FC 48 63 29
         :     1E F5 0D 48 F3 73 43 0C 00 E0 D4 07 86 A6 A4 38
         :     0E A8 47 0F 27 01 01 31 52 F6 62 8A 4B 80 BE 72
         :     FB 02 E7 56 84 CA CA 4D C3 6C 7C B2 BA C7 D7 9B
         :     C5 9D 90 65 4E F5 54 8F 25 CC 11 7F 8E 77 10 6A
         :     6E 9F 80 89 48 8B 1D 51 AA 3B B7 C5 24 3C 28 B1
         :             [ Another 256 bytes skipped ]
         :   }
   0 1304: SEQUENCE {
   4  768:   SEQUENCE {
   8    3:     [0] {
  10    1:       INTEGER 2
         :       }
  13   10:     INTEGER 10 34 53 32 94 08 68 79 38 72
  25   13:     SEQUENCE {
  27    9:       OBJECT IDENTIFIER
         :         sha256WithRSAEncryption (1 2 840 113549 1 1 11)
  38    0:       NULL
         :       }
  40   27:     SEQUENCE {
  42   25:       SET {
  44   23:         SEQUENCE {
  46    3:           OBJECT IDENTIFIER serialNumber (2 5 4 5)
  51   16:           PrintableString '87f4514475ba0a2b'
         :           }
         :         }
         :       }
  69   30:     SEQUENCE {
  71   13:       UTCTime 26/05/2016 17:14:51 GMT
  86   13:       UTCTime 24/05/2026 17:14:51 GMT
         :       }
 101   27:     SEQUENCE {
 103   25:       SET {
 105   23:         SEQUENCE {
 107    3:           OBJECT IDENTIFIER serialNumber (2 5 4 5)
 112   16:           PrintableString 'c6047571d8f0d17c'
         :           }
         :         }
         :       }
 130  418:     SEQUENCE {
 134   13:       SEQUENCE {
 136    9:         OBJECT IDENTIFIER rsaEncryption (1 2 840 113549 1 1 1)
 147    0:         NULL
         :         }
 149  399:       BIT STRING, encapsulates {
 154  394:         SEQUENCE {
 158  385:           INTEGER
         :             00 B3 01 0D 78 BC 06 33 25 CA D6 A7 2C EF 49 05
         :             4C C1 77 36 F2 E5 7B E8 4C 0A 87 8F 77 6A 09 45
         :             9B AC E8 72 DA E2 0E 20 3D 68 30 A5 86 26 14 77
         :             AD 7E 93 F5 1D 38 A9 DB 5B FE B2 B8 1A 7B CD 22
         :             3B 17 98 FC 1F 4F 77 2D 92 E9 DE 5F 6B 02 09 4E
         :             99 86 53 98 1C 5E 23 B6 A4 61 53 A5 FB D1 37 09
         :             DB C0 0A 40 E9 28 E6 BE E2 8E 57 94 A9 F2 13 3A
         :             11 40 D2 34 99 A6 B4 F3 99 F2 5D 4A 5D 6A 6C 4B
         :                     [ Another 257 bytes skipped ]
 547    3:           INTEGER 65537
         :           }
         :         }
         :       }
 552  221:     [3] {
 555  218:       SEQUENCE {
 558   29:         SEQUENCE {
 560    3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
 565   22:           OCTET STRING, encapsulates {
 567   20:             OCTET STRING
         :               7B 7B F8 43 CA 1F 0F 96 27 0F 10 6F 7D 0C 23 14
         :               72 8F 1D 80
         :             }
         :           }
 589   31:         SEQUENCE {
 591    3:           OBJECT IDENTIFIER authorityKeyIdentifier (2 5 29 35)
 596   24:           OCTET STRING, encapsulates {
 598   22:             SEQUENCE {
 600   20:               [0]
         :                 0E 55 6F 46 F5 3B 77 67 E1 B9 73 DC 55 E6 AE EA
         :                 B4 FD 27 DD
         :               }
         :             }
         :           }
 622   12:         SEQUENCE {
 624    3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
 629    1:           BOOLEAN TRUE
 632    2:           OCTET STRING, encapsulates {
 634    0:             SEQUENCE {}
         :             }
         :           }
 636   14:         SEQUENCE {
 638    3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
 643    1:           BOOLEAN TRUE
 646    4:           OCTET STRING, encapsulates {
 648    2:             BIT STRING 7 unused bits
         :               '1'B (bit 0)
         :             }
         :           }
 652   36:         SEQUENCE {
 654    3:           OBJECT IDENTIFIER nameConstraints (2 5 29 30)
 659   29:           OCTET STRING, encapsulates {
 661   27:             SEQUENCE {
 663   25:               [0] {
 665   23:                 SEQUENCE {
 667   21:                   [2] 'invalid;email:invalid'
         :                   }
         :                 }
         :               }
         :             }
         :           }
 690   84:         SEQUENCE {
 692    3:           OBJECT IDENTIFIER cRLDistributionPoints (2 5 29 31)
 697   77:           OCTET STRING, encapsulates {
 699   75:             SEQUENCE {
 701   73:               SEQUENCE {
 703   71:                 [0] {
 705   69:                   [0] {
 707   67:                     [6]
         :                   'https://android.googleapis.com/attestation/crl/1'
         :                   '0345332940868793872'
         :                     }
         :                   }
         :                 }
         :               }
         :             }
         :           }
         :         }
         :       }
         :     }
 776   13:   SEQUENCE {
 778    9:     OBJECT IDENTIFIER sha256WithRSAEncryption (1 2 840 113549 1 1 11)
 789    0:     NULL
         :     }
 791  513:   BIT STRING
         :     69 13 A7 56 B3 9F E1 2B CE A2 09 89 E5 DC 03 B4
         :     B6 FF F6 1E 96 C7 62 C2 31 D1 B3 D6 1A 9E 36 CF
         :     C2 FC 0E 06 FA 0E CF B5 2D F8 19 D6 13 96 0B 56
         :     B0 EE 86 3B B1 B8 38 70 4E 57 EB D9 60 DC 58 74
         :     FE C8 EB A5 78 9F B7 19 5C F0 80 CF 29 16 6B 04
         :     3A 5D 7C 2E 5F 11 12 36 BE 46 29 45 04 41 8F B5
         :     AB C6 31 5F 23 28 0C F2 7C 48 4A F6 43 AA 50 D0
         :     53 96 1E AD 7C A3 89 96 BB 8B BF 2D 9A 0C 16 35
         :             [ Another 384 bytes skipped ]
         :   }
   0 1393: SEQUENCE {
   4  857:   SEQUENCE {
   8    3:     [0] {
  10    1:       INTEGER 2
         :       }
  13   10:     INTEGER 03 88 26 67 60 65 89 96 85 74
  25   13:     SEQUENCE {
  27    9:       OBJECT IDENTIFIER
         :         sha256WithRSAEncryption (1 2 840 113549 1 1 11)
  38    0:       NULL
         :       }
  40   27:     SEQUENCE {
  42   25:       SET {
  44   23:         SEQUENCE {
  46    3:           OBJECT IDENTIFIER serialNumber (2 5 4 5)
  51   16:           PrintableString 'f92009e853b6b045'
         :           }
         :         }
         :       }
  69   30:     SEQUENCE {
  71   13:       UTCTime 26/05/2016 17:01:32 GMT
  86   13:       UTCTime 24/05/2026 17:01:32 GMT
         :       }
 101   27:     SEQUENCE {
 103   25:       SET {
 105   23:         SEQUENCE {
 107    3:           OBJECT IDENTIFIER serialNumber (2 5 4 5)
 112   16:           PrintableString '87f4514475ba0a2b'
         :           }
         :         }
         :       }
 130  546:     SEQUENCE {
 134   13:       SEQUENCE {
 136    9:         OBJECT IDENTIFIER rsaEncryption (1 2 840 113549 1 1 1)
 147    0:         NULL
         :         }
 149  527:       BIT STRING, encapsulates {
 154  522:         SEQUENCE {
 158  513:           INTEGER
         :             00 D2 60 D6 45 85 E3 E2 23 79 5A DA 45 57 A7 D8
         :             5B AF BD 9A 37 CB FA 97 C0 65 44 9D 3A C6 47 F6
         :             0D 0B A2 74 12 CA F7 4B B9 5F FB B4 EC 5A 2B D0
         :             16 01 DE BE E2 FE D2 76 0D 75 C4 B1 6A CB 3A 67
         :             07 21 E0 D5 19 68 C8 1B 01 A2 24 02 FE AD 40 D6
         :             A7 98 16 0F A2 98 2E A7 AD 75 34 84 6F F8 CF 8A
         :             A1 0E 90 33 40 9E D0 86 26 57 71 CE FF CF 52 E1
         :             F0 F9 2B 7E 68 62 03 D8 FD FD 02 53 03 19 AC 28
         :                     [ Another 385 bytes skipped ]
 675    3:           INTEGER 65537
         :           }
         :         }
         :       }
 680  182:     [3] {
 683  179:       SEQUENCE {
 686   29:         SEQUENCE {
 688    3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
 693   22:           OCTET STRING, encapsulates {
 695   20:             OCTET STRING
         :               0E 55 6F 46 F5 3B 77 67 E1 B9 73 DC 55 E6 AE EA
         :               B4 FD 27 DD
         :             }
         :           }
 717   31:         SEQUENCE {
 719    3:           OBJECT IDENTIFIER authorityKeyIdentifier (2 5 29 35)
 724   24:           OCTET STRING, encapsulates {
 726   22:             SEQUENCE {
 728   20:               [0]
         :                 36 61 E1 00 7C 88 05 09 51 8B 44 6C 47 FF 1A 4C
         :                 C9 EA 4F 12
         :               }
         :             }
         :           }
 750   15:         SEQUENCE {
 752    3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
 757    1:           BOOLEAN TRUE
 760    5:           OCTET STRING, encapsulates {
 762    3:             SEQUENCE {
 764    1:               BOOLEAN TRUE
         :               }
         :             }
         :           }
 767   14:         SEQUENCE {
 769    3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
 774    1:           BOOLEAN TRUE
 777    4:           OCTET STRING, encapsulates {
 779    2:             BIT STRING 1 unused bit
         :               '1100001'B
         :             }
         :           }
 783   80:         SEQUENCE {
 785    3:           OBJECT IDENTIFIER cRLDistributionPoints (2 5 29 31)
 790   73:           OCTET STRING, encapsulates {
 792   71:             SEQUENCE {
 794   69:               SEQUENCE {
 796   67:                 [0] {
 798   65:                   [0] {
 800   63:                     [6]
         :                   'https://android.googleapis.com/attestation/crl/E'
         :                   '8FA196314D2FA18'
         :                     }
         :                   }
         :                 }
         :               }
         :             }
         :           }
         :         }
         :       }
         :     }
 865   13:   SEQUENCE {
 867    9:     OBJECT IDENTIFIER sha256WithRSAEncryption (1 2 840 113549 1 1 11)
 878    0:     NULL
         :     }
 880  513:   BIT STRING
         :     0E 0D 71 4A 88 0A 58 53 B6 31 14 7D DA 22 31 C6
         :     06 D6 EF 3B 22 4D D7 A5 C0 3F BF C6 B4 64 A3 FB
         :     92 C2 CC 67 F4 6C 24 25 49 6E F6 CB 08 D6 A8 0D
         :     94 06 7F 8C 8C 3C B1 77 CD C2 3F C7 5E A3 85 6D
         :     F7 A5 94 13 CD 5A 5C F3 9B 0A 0D E1 82 42 F4 C9
         :     3F AD FC FB 7C AA 27 04 CC 1C 12 45 15 EB E6 70
         :     A0 6C DE 77 77 54 9B 1F 02 05 76 03 A4 FC 6C 07
         :     F4 CB BB 59 F5 CB ED 58 D8 30 9B 6E 3C F7 76 C1
         :             [ Another 384 bytes skipped ]
         :   }
   0 1376: SEQUENCE {
   4  840:   SEQUENCE {
   8    3:     [0] {
  10    1:       INTEGER 2
         :       }
  13    9:     INTEGER 00 E8 FA 19 63 14 D2 FA 18
  24   13:     SEQUENCE {
  26    9:       OBJECT IDENTIFIER
         :         sha256WithRSAEncryption (1 2 840 113549 1 1 11)
  37    0:       NULL
         :       }
  39   27:     SEQUENCE {
  41   25:       SET {
  43   23:         SEQUENCE {
  45    3:           OBJECT IDENTIFIER serialNumber (2 5 4 5)
  50   16:           PrintableString 'f92009e853b6b045'
         :           }
         :         }
         :       }
  68   30:     SEQUENCE {
  70   13:       UTCTime 26/05/2016 16:28:52 GMT
  85   13:       UTCTime 24/05/2026 16:28:52 GMT
         :       }
 100   27:     SEQUENCE {
 102   25:       SET {
 104   23:         SEQUENCE {
 106    3:           OBJECT IDENTIFIER serialNumber (2 5 4 5)
 111   16:           PrintableString 'f92009e853b6b045'
         :           }
         :         }
         :       }
 129  546:     SEQUENCE {
 133   13:       SEQUENCE {
 135    9:         OBJECT IDENTIFIER rsaEncryption (1 2 840 113549 1 1 1)
 146    0:         NULL
         :         }
 148  527:       BIT STRING, encapsulates {
 153  522:         SEQUENCE {
 157  513:           INTEGER
         :             00 AF B6 C7 82 2B B1 A7 01 EC 2B B4 2E 8B CC 54
         :             16 63 AB EF 98 2F 32 C7 7F 75 31 03 0C 97 52 4B
         :             1B 5F E8 09 FB C7 2A A9 45 1F 74 3C BD 9A 6F 13
         :             35 74 4A A5 5E 77 F6 B6 AC 35 35 EE 17 C2 5E 63
         :             95 17 DD 9C 92 E6 37 4A 53 CB FE 25 8F 8F FB B6
         :             FD 12 93 78 A2 2A 4C A9 9C 45 2D 47 A5 9F 32 01
         :             F4 41 97 CA 1C CD 7E 76 2F B2 F5 31 51 B6 FE B2
         :             FF FD 2B 6F E4 FE 5B C6 BD 9E C3 4B FE 08 23 9D
         :                     [ Another 385 bytes skipped ]
 674    3:           INTEGER 65537
         :           }
         :         }
         :       }
 679  166:     [3] {
 682  163:       SEQUENCE {
 685   29:         SEQUENCE {
 687    3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
 692   22:           OCTET STRING, encapsulates {
 694   20:             OCTET STRING
         :               36 61 E1 00 7C 88 05 09 51 8B 44 6C 47 FF 1A 4C
         :               C9 EA 4F 12
         :             }
         :           }
 716   31:         SEQUENCE {
 718    3:           OBJECT IDENTIFIER authorityKeyIdentifier (2 5 29 35)
 723   24:           OCTET STRING, encapsulates {
 725   22:             SEQUENCE {
 727   20:               [0]
         :                 36 61 E1 00 7C 88 05 09 51 8B 44 6C 47 FF 1A 4C
         :                 C9 EA 4F 12
         :               }
         :             }
         :           }
 749   15:         SEQUENCE {
 751    3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
 756    1:           BOOLEAN TRUE
 759    5:           OCTET STRING, encapsulates {
 761    3:             SEQUENCE {
 763    1:               BOOLEAN TRUE
         :               }
         :             }
         :           }
 766   14:         SEQUENCE {
 768    3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
 773    1:           BOOLEAN TRUE
 776    4:           OCTET STRING, encapsulates {
 778    2:             BIT STRING 1 unused bit
         :               '1100001'B
         :             }
         :           }
 782   64:         SEQUENCE {
 784    3:           OBJECT IDENTIFIER cRLDistributionPoints (2 5 29 31)
 789   57:           OCTET STRING, encapsulates {
 791   55:             SEQUENCE {
 793   53:               SEQUENCE {
 795   51:                 [0] {
 797   49:                   [0] {
 799   47:                     [6]
         :                   'https://android.googleapis.com/attestation/crl/'
         :                     }
         :                   }
         :                 }
         :               }
         :             }
         :           }
         :         }
         :       }
         :     }
 848   13:   SEQUENCE {
 850    9:     OBJECT IDENTIFIER sha256WithRSAEncryption (1 2 840 113549 1 1 11)
 861    0:     NULL
         :     }
 863  513:   BIT STRING
         :     20 C8 C3 8D 4B DC A9 57 1B 46 8C 89 2F FF 72 AA
         :     C6 F8 44 A1 1D 41 A8 F0 73 6C C3 7D 16 D6 42 6D
         :     8E 7E 94 07 04 4C EA 39 E6 8B 07 C1 3D BF 15 03
         :     DD 5C 85 BD AF B2 C0 2D 5F 6C DB 4E FA 81 27 DF
         :     8B 04 F1 82 77 0F C4 E7 74 5B 7F CE AA 87 12 9A
         :     88 01 CE 8E 9B C0 CB 96 37 9B 4D 26 A8 2D 30 FD
         :     9C 2F 8E ED 6D C1 BE 2F 84 B6 89 E4 D9 14 25 8B
         :     14 4B BA E6 24 A1 C7 06 71 13 2E 2F 06 16 A8 84
         :             [ Another 384 bytes skipped ]
         :   }
</spanx></t>

</section>
<section anchor="secure-element" title="Secure Element">

<t>The structures below are not annotated except where the difference is specific to the
difference between the TEE structure shown above and artifacts emitted by StrongBox.</t>

<t>```
   0 5143: SEQUENCE {
   4    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
  15 5128:   [0] {
  19 5124:     SEQUENCE {
  23    1:       INTEGER 1
  26    0:       SET {}
  28   11:       SEQUENCE {
  30    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
         :         }
  41 5100:       [0] {
  45 1114:         SEQUENCE {
  49  834:           SEQUENCE {
  53    3:             [0] {
  55    1:               INTEGER 2
         :               }
  58    1:             INTEGER 1
  61   13:             SEQUENCE {
  63    9:               OBJECT IDENTIFIER
         :                 sha256WithRSAEncryption (1 2 840 113549 1 1 11)
  74    0:               NULL
         :               }
  76   47:             SEQUENCE {
  78   25:               SET {
  80   23:                 SEQUENCE {
  82    3:                   OBJECT IDENTIFIER serialNumber (2 5 4 5)
  87   16:                   PrintableString '90e8da3cadfc7820'
         :                   }
         :                 }
 105   18:               SET {
 107   16:                 SEQUENCE {
 109    3:                   OBJECT IDENTIFIER title (2 5 4 12)
 114    9:                   UTF8String 'StrongBox'
         :                   }
         :                 }
         :               }
 125   30:             SEQUENCE {
 127   13:               UTCTime 01/01/1970 00:00:00 GMT
 142   13:               UTCTime 23/05/2028 23:59:59 GMT
         :               }
 157   31:             SEQUENCE {
 159   29:               SET {
 161   27:                 SEQUENCE {
 163    3:                   OBJECT IDENTIFIER commonName (2 5 4 3)
 168   20:                   UTF8String 'Android Keystore Key'
         :                   }
         :                 }
         :               }
 190  290:             SEQUENCE {
 194   13:               SEQUENCE {
 196    9:                 OBJECT IDENTIFIER
         :                   rsaEncryption (1 2 840 113549 1 1 1)
 207    0:                 NULL
         :                 }
 209  271:               BIT STRING, encapsulates {
 214  266:                 SEQUENCE {
 218  257:                   INTEGER
         :                   00 DE 98 94 D5 E5 05 98 E8 FC 73 4D 26 FB 48 6A
         :                   CA 06 A0 24 FA 05 D1 D2 32 10 46 F8 50 DD 3E 0D
         :                   DF 4F 95 53 D2 CB 10 1F 00 B2 62 15 1E 21 7E 05
         :                   C6 10 AC EE 7A D8 69 F1 1F 32 C3 17 CA D7 07 BE
         :                   3B 2B 83 0F B4 9C 3D C7 13 0B 9C 59 2F 1A 38 CE
         :                   A5 1D 95 A7 3C EE 70 6A CF 41 FF 55 3F E0 9C 69
         :                   E5 A0 C1 19 EF 40 E9 40 FC 74 D3 3B 96 D9 0E C1
         :                   C3 9D 14 10 0C A6 95 19 49 88 F4 AB 74 FC 86 A6
         :                           [ Another 129 bytes skipped ]
 479    3:                   INTEGER 65537
         :                   }
         :                 }
         :               }
 484  399:             [3] {
 488  395:               SEQUENCE {
 492   14:                 SEQUENCE {
 494    3:                   OBJECT IDENTIFIER keyUsage (2 5 29 15)
 499    1:                   BOOLEAN TRUE
 502    4:                   OCTET STRING, encapsulates {
 504    2:                     BIT STRING 7 unused bits
         :                       '1'B (bit 0)
         :                     }
         :                   }
 508  375:                 SEQUENCE {
 512   10:                   OBJECT IDENTIFIER '1 3 6 1 4 1 11129 2 1 17'
 524  359:                   OCTET STRING, encapsulates {
 528  355:                     SEQUENCE {
 532    1:                       INTEGER 3
 535    1:                       ENUMERATED 2   &#8211; attestationSecurityLevel (StrongBox)
 538    1:                       INTEGER 4
 541    1:                       ENUMERATED 2   &#8211; attestationSecurityLevel (StrongBox)
 544    9:                       OCTET STRING 'challenge'
 555    0:                       OCTET STRING
         :                         Error: Object has zero length.
 557   53:                       SEQUENCE {
 559    2:                         [509] {
 563    0:                           NULL
         :                           }
 565   11:                         [701] {
 569    9:                           INTEGER 00 FF FF FF FF FF E5 99 78
         :                           }
 580   28:                         [709] {
 584   26:                           OCTET STRING, encapsulates {
 586   24:                             SEQUENCE {
 588   20:                               SET {
 590   18:                                 SEQUENCE {
 592   13:                                   OCTET STRING 'AndroidSystem'
 607    1:                                   INTEGER 1
         :                                   }
         :                                 }
 610    0:                               SET {}
         :                               }
         :                             }
         :                           }
         :                         }
 612  271:                       SEQUENCE {
 616   14:                         [1] {
 618   12:                           SET {
 620    1:                             INTEGER 0
 623    1:                             INTEGER 1
 626    1:                             INTEGER 2
 629    1:                             INTEGER 3
         :                             }
         :                           }
 632    3:                         [2] {
 634    1:                           INTEGER 1
         :                           }
 637    4:                         [3] {
 639    2:                           INTEGER 2048
         :                           }
 643    8:                         [4] {
 645    6:                           SET {
 647    1:                             INTEGER 2
 650    1:                             INTEGER 32
         :                             }
         :                           }
 653    8:                         [5] {
 655    6:                           SET {
 657    1:                             INTEGER 0
 660    1:                             INTEGER 4
         :                             }
         :                           }
 663   14:                         [6] {
 665   12:                           SET {
 667    1:                             INTEGER 2
 670    1:                             INTEGER 3
 673    1:                             INTEGER 4
 676    1:                             INTEGER 5
         :                             }
         :                           }
 679    2:                         [503] {
 683    0:                           NULL
         :                           }
 685    3:                         [702] {
 689    1:                           INTEGER 0
         :                           }
 692   76:                         [704] {
 696   74:                           SEQUENCE {
 698   32:                             OCTET STRING
         :                   61 FD A1 2B 32 ED 84 21 4A 9C F1 3D 1A FF B7 AA
         :                   80 BD 8A 26 8A 86 1E D4 BB 7A 15 17 0F 1A B0 0C
 732    1:                             BOOLEAN TRUE
 735    1:                             ENUMERATED 0
 738   32:                             OCTET STRING
         :                   77 96 C5 3D 0E 09 46 2B BA BB FB 7B 8A 65 F6 8D
         :                   EF 5C 46 88 BF 99 C4 1E 88 42 01 4D 1F 01 2D C5
         :                             }
         :                           }
 772    3:                         [705] {
 776    1:                           INTEGER 0
         :                           }
 779    5:                         [706] {
 783    3:                           INTEGER 201903
         :                           }
 788    8:                         [710] {
 792    6:                           OCTET STRING 'google'
         :                           }
 800   10:                         [711] {
 804    8:                           OCTET STRING 'blueline'
         :                           }
 814   10:                         [712] {
 818    8:                           OCTET STRING 'blueline'
         :                           }
 828   11:                         [713] {
 832    9:                           OCTET STRING '8A2X0KLUU'
         :                           }
 843    8:                         [716] {
 847    6:                           OCTET STRING 'Google'
         :                           }
 855    9:                         [717] {
 859    7:                           OCTET STRING 'Pixel 3'
         :                           }
 868    6:                         [718] {
 872    4:                           INTEGER 20180905
         :                           }
 878    5:                         [719] {
 882    3:                           INTEGER 201903
         :                           }
         :                         }
         :                       }
         :                     }
         :                   }
         :                 }
         :               }
         :             }
 887   13:           SEQUENCE {
 889    9:             OBJECT IDENTIFIER
         :               sha256WithRSAEncryption (1 2 840 113549 1 1 11)
 900    0:             NULL
         :             }
 902  257:           BIT STRING
         :             83 EA 59 8D BE 37 4A D5 C0 FC F8 FB AC 8B 72 1E
         :             A5 C2 3B 0C C0 04 1B C0 5A 18 A5 DF D4 67 1D B9
         :             08 42 4B E2 2C AC 07 0F D8 0E 24 97 56 9E 14 F2
         :             D0 AC DD 1E FC DD 68 20 11 DF 88 B8 B6 22 AD 2B
         :             DB 9C 2E 5C 3F AF 0B 8F 02 68 AA 34 4B 5E C8 75
         :             B1 1A 09 D2 19 41 24 61 65 97 2C 0D A4 78 43 A7
         :             9A 27 B2 4E 24 11 4F FF E2 D8 04 56 39 75 B2 34
         :             D8 18 C7 25 F3 3F C0 6A 37 AB 49 B6 96 51 61 72
         :                     [ Another 128 bytes skipped ]
         :           }
1163 1181:         SEQUENCE {
1167  645:           SEQUENCE {
1171    3:             [0] {
1173    1:               INTEGER 2
         :               }
1176   10:             INTEGER 17 10 24 68 40 71 02 97 78 50
1188   13:             SEQUENCE {
1190    9:               OBJECT IDENTIFIER
         :                 sha256WithRSAEncryption (1 2 840 113549 1 1 11)
1201    0:               NULL
         :               }
1203   47:             SEQUENCE {
1205   25:               SET {
1207   23:                 SEQUENCE {
1209    3:                   OBJECT IDENTIFIER serialNumber (2 5 4 5)
1214   16:                   PrintableString 'ccd18b9b608d658e'
         :                   }
         :                 }
1232   18:               SET {
1234   16:                 SEQUENCE {
1236    3:                   OBJECT IDENTIFIER title (2 5 4 12)
1241    9:                   UTF8String 'StrongBox'
         :                   }
         :                 }
         :               }
1252   30:             SEQUENCE {
1254   13:               UTCTime 25/05/2018 23:28:47 GMT
1269   13:               UTCTime 22/05/2028 23:28:47 GMT
         :               }
1284   47:             SEQUENCE {
1286   25:               SET {
1288   23:                 SEQUENCE {
1290    3:                   OBJECT IDENTIFIER serialNumber (2 5 4 5)
1295   16:                   PrintableString '90e8da3cadfc7820'
         :                   }
         :                 }
1313   18:               SET {
1315   16:                 SEQUENCE {
1317    3:                   OBJECT IDENTIFIER title (2 5 4 12)
1322    9:                   UTF8String 'StrongBox'
         :                   }
         :                 }
         :               }
1333  290:             SEQUENCE {
1337   13:               SEQUENCE {
1339    9:                 OBJECT IDENTIFIER
         :                   rsaEncryption (1 2 840 113549 1 1 1)
1350    0:                 NULL
         :                 }
1352  271:               BIT STRING, encapsulates {
1357  266:                 SEQUENCE {
1361  257:                   INTEGER
         :                   00 A5 09 D4 09 D2 30 19 36 34 71 FD 7D 41 89 E6
         :                   2C A5 9D 10 1B 4F 40 6A B0 5F 56 34 16 E6 EB D7
         :                   F3 E9 C5 DC 20 F3 86 D1 77 19 D7 15 1F E7 EC 62
         :                   DC 0A BC 64 E9 18 52 B0 AA B8 FF 58 6A E0 0F B8
         :                   56 AF 77 D3 CE 3C DC 48 52 DD B2 86 0D 76 17 7C
         :                   FD EE B4 E6 6E 0A 08 9E 06 CA 0F EC 4B B0 7C AF
         :                   EA 82 27 A8 C9 A7 63 DA 89 F6 30 BA 3C 3A E5 C6
         :                   EF 11 06 42 8A 2E FE 19 BE F2 C7 3B 34 16 B2 E2
         :                           [ Another 129 bytes skipped ]
1622    3:                   INTEGER 65537
         :                   }
         :                 }
         :               }
1627  186:             [3] {
1630  183:               SEQUENCE {
1633   29:                 SEQUENCE {
1635    3:                   OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
1640   22:                   OCTET STRING, encapsulates {
1642   20:                     OCTET STRING
         :                   77 A4 AD DF 1D 29 89 CA 92 E3 BA DE 27 3C 70 DF
         :                   36 03 7C 0C
         :                     }
         :                   }
1664   31:                 SEQUENCE {
1666    3:                   OBJECT IDENTIFIER
         :                     authorityKeyIdentifier (2 5 29 35)
1671   24:                   OCTET STRING, encapsulates {
1673   22:                     SEQUENCE {
1675   20:                       [0]
         :                   1B 17 70 C6 97 DC 84 54 75 7C 3C 98 5C E6 1D 1D
         :                   08 59 5D 53
         :                       }
         :                     }
         :                   }
1697   15:                 SEQUENCE {
1699    3:                   OBJECT IDENTIFIER basicConstraints (2 5 29 19)
1704    1:                   BOOLEAN TRUE
1707    5:                   OCTET STRING, encapsulates {
1709    3:                     SEQUENCE {
1711    1:                       BOOLEAN TRUE
         :                       }
         :                     }
         :                   }
1714   14:                 SEQUENCE {
1716    3:                   OBJECT IDENTIFIER keyUsage (2 5 29 15)
1721    1:                   BOOLEAN TRUE
1724    4:                   OCTET STRING, encapsulates {
1726    2:                     BIT STRING 2 unused bits
         :                       '100000'B (bit 5)
         :                     }
         :                   }
1730   84:                 SEQUENCE {
1732    3:                   OBJECT IDENTIFIER cRLDistributionPoints (2 5 29 31)
1737   77:                   OCTET STRING, encapsulates {
1739   75:                     SEQUENCE {
1741   73:                       SEQUENCE {
1743   71:                         [0] {
1745   69:                           [0] {
1747   67:                             [6]
         :                   'https://android.googleapis.com/attestation/crl/1'
         :                   '7102468407102977850'
         :                             }
         :                           }
         :                         }
         :                       }
         :                     }
         :                   }
         :                 }
         :               }
         :             }
1816   13:           SEQUENCE {
1818    9:             OBJECT IDENTIFIER
         :               sha256WithRSAEncryption (1 2 840 113549 1 1 11)
1829    0:             NULL
         :             }
1831  513:           BIT STRING
         :             13 22 DA F2 92 93 CE C0 9F 70 40 C9 DA 85 6B 61
         :             6F 8F BE E0 A4 04 55 C1 63 84 61 37 F5 4B 71 6D
         :             62 AA 6F BF 6C E8 48 03 AD 28 85 21 9E 3C 1C 91
         :             48 EE 65 28 65 70 D0 BD 5B CC DB CE B1 F5 B5 C3
         :             CA 7A A9 C8 8A 68 12 8A CA 6A 85 A6 BC DA 36 E9
         :             B9 94 35 82 5B CA BC B6 9F 83 03 7F 21 6C EE 82
         :             C1 3F BD C1 41 4B DD 1A 6F 6C AF 4A 52 FC 19 19
         :             17 AC 29 0C 5E D7 57 90 D5 B1 2B 36 29 1F 45 33
         :                     [ Another 384 bytes skipped ]
         :           }
2348 1376:         SEQUENCE {
2352  840:           SEQUENCE {
2356    3:             [0] {
2358    1:               INTEGER 2
         :               }
2361    9:             INTEGER 00 E8 FA 19 63 14 D2 FA 18
2372   13:             SEQUENCE {
2374    9:               OBJECT IDENTIFIER
         :                 sha256WithRSAEncryption (1 2 840 113549 1 1 11)
2385    0:               NULL
         :               }
2387   27:             SEQUENCE {
2389   25:               SET {
2391   23:                 SEQUENCE {
2393    3:                   OBJECT IDENTIFIER serialNumber (2 5 4 5)
2398   16:                   PrintableString 'f92009e853b6b045'
         :                   }
         :                 }
         :               }
2416   30:             SEQUENCE {
2418   13:               UTCTime 26/05/2016 16:28:52 GMT
2433   13:               UTCTime 24/05/2026 16:28:52 GMT
         :               }
2448   27:             SEQUENCE {
2450   25:               SET {
2452   23:                 SEQUENCE {
2454    3:                   OBJECT IDENTIFIER serialNumber (2 5 4 5)
2459   16:                   PrintableString 'f92009e853b6b045'
         :                   }
         :                 }
         :               }
2477  546:             SEQUENCE {
2481   13:               SEQUENCE {
2483    9:                 OBJECT IDENTIFIER
         :                   rsaEncryption (1 2 840 113549 1 1 1)
2494    0:                 NULL
         :                 }
2496  527:               BIT STRING, encapsulates {
2501  522:                 SEQUENCE {
2505  513:                   INTEGER
         :                   00 AF B6 C7 82 2B B1 A7 01 EC 2B B4 2E 8B CC 54
         :                   16 63 AB EF 98 2F 32 C7 7F 75 31 03 0C 97 52 4B
         :                   1B 5F E8 09 FB C7 2A A9 45 1F 74 3C BD 9A 6F 13
         :                   35 74 4A A5 5E 77 F6 B6 AC 35 35 EE 17 C2 5E 63
         :                   95 17 DD 9C 92 E6 37 4A 53 CB FE 25 8F 8F FB B6
         :                   FD 12 93 78 A2 2A 4C A9 9C 45 2D 47 A5 9F 32 01
         :                   F4 41 97 CA 1C CD 7E 76 2F B2 F5 31 51 B6 FE B2
         :                   FF FD 2B 6F E4 FE 5B C6 BD 9E C3 4B FE 08 23 9D
         :                           [ Another 385 bytes skipped ]
3022    3:                   INTEGER 65537
         :                   }
         :                 }
         :               }
3027  166:             [3] {
3030  163:               SEQUENCE {
3033   29:                 SEQUENCE {
3035    3:                   OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
3040   22:                   OCTET STRING, encapsulates {
3042   20:                     OCTET STRING
         :                   36 61 E1 00 7C 88 05 09 51 8B 44 6C 47 FF 1A 4C
         :                   C9 EA 4F 12
         :                     }
         :                   }
3064   31:                 SEQUENCE {
3066    3:                   OBJECT IDENTIFIER
         :                     authorityKeyIdentifier (2 5 29 35)
3071   24:                   OCTET STRING, encapsulates {
3073   22:                     SEQUENCE {
3075   20:                       [0]
         :                   36 61 E1 00 7C 88 05 09 51 8B 44 6C 47 FF 1A 4C
         :                   C9 EA 4F 12
         :                       }
         :                     }
         :                   }
3097   15:                 SEQUENCE {
3099    3:                   OBJECT IDENTIFIER basicConstraints (2 5 29 19)
3104    1:                   BOOLEAN TRUE
3107    5:                   OCTET STRING, encapsulates {
3109    3:                     SEQUENCE {
3111    1:                       BOOLEAN TRUE
         :                       }
         :                     }
         :                   }
3114   14:                 SEQUENCE {
3116    3:                   OBJECT IDENTIFIER keyUsage (2 5 29 15)
3121    1:                   BOOLEAN TRUE
3124    4:                   OCTET STRING, encapsulates {
3126    2:                     BIT STRING 1 unused bit
         :                       '1100001'B
         :                     }
         :                   }
3130   64:                 SEQUENCE {
3132    3:                   OBJECT IDENTIFIER cRLDistributionPoints (2 5 29 31)
3137   57:                   OCTET STRING, encapsulates {
3139   55:                     SEQUENCE {
3141   53:                       SEQUENCE {
3143   51:                         [0] {
3145   49:                           [0] {
3147   47:                             [6]
         :                   'https://android.googleapis.com/attestation/crl/'
         :                             }
         :                           }
         :                         }
         :                       }
         :                     }
         :                   }
         :                 }
         :               }
         :             }
3196   13:           SEQUENCE {
3198    9:             OBJECT IDENTIFIER
         :               sha256WithRSAEncryption (1 2 840 113549 1 1 11)
3209    0:             NULL
         :             }
3211  513:           BIT STRING
         :             20 C8 C3 8D 4B DC A9 57 1B 46 8C 89 2F FF 72 AA
         :             C6 F8 44 A1 1D 41 A8 F0 73 6C C3 7D 16 D6 42 6D
         :             8E 7E 94 07 04 4C EA 39 E6 8B 07 C1 3D BF 15 03
         :             DD 5C 85 BD AF B2 C0 2D 5F 6C DB 4E FA 81 27 DF
         :             8B 04 F1 82 77 0F C4 E7 74 5B 7F CE AA 87 12 9A
         :             88 01 CE 8E 9B C0 CB 96 37 9B 4D 26 A8 2D 30 FD
         :             9C 2F 8E ED 6D C1 BE 2F 84 B6 89 E4 D9 14 25 8B
         :             14 4B BA E6 24 A1 C7 06 71 13 2E 2F 06 16 A8 84
         :                     [ Another 384 bytes skipped ]
         :           }
3728 1413:         SEQUENCE {
3732  877:           SEQUENCE {
3736    3:             [0] {
3738    1:               INTEGER 2
         :               }
3741   10:             INTEGER 03 88 26 67 60 65 89 96 85 99
3753   13:             SEQUENCE {
3755    9:               OBJECT IDENTIFIER
         :                 sha256WithRSAEncryption (1 2 840 113549 1 1 11)
3766    0:               NULL
         :               }
3768   27:             SEQUENCE {
3770   25:               SET {
3772   23:                 SEQUENCE {
3774    3:                   OBJECT IDENTIFIER serialNumber (2 5 4 5)
3779   16:                   PrintableString 'f92009e853b6b045'
         :                   }
         :                 }
         :               }
3797   30:             SEQUENCE {
3799   13:               UTCTime 20/06/2018 22:47:35 GMT
3814   13:               UTCTime 17/06/2028 22:47:35 GMT
         :               }
3829   47:             SEQUENCE {
3831   25:               SET {
3833   23:                 SEQUENCE {
3835    3:                   OBJECT IDENTIFIER serialNumber (2 5 4 5)
3840   16:                   PrintableString 'ccd18b9b608d658e'
         :                   }
         :                 }
3858   18:               SET {
3860   16:                 SEQUENCE {
3862    3:                   OBJECT IDENTIFIER title (2 5 4 12)
3867    9:                   UTF8String 'StrongBox'
         :                   }
         :                 }
         :               }
3878  546:             SEQUENCE {
3882   13:               SEQUENCE {
3884    9:                 OBJECT IDENTIFIER
         :                   rsaEncryption (1 2 840 113549 1 1 1)
3895    0:                 NULL
         :                 }
3897  527:               BIT STRING, encapsulates {
3902  522:                 SEQUENCE {
3906  513:                   INTEGER
         :                   00 E8 22 0B F1 72 A6 01 63 D3 3C 44 9D DB 7A 87
         :                   D6 3D 6F 6D 92 B7 C9 4A 70 96 5D 29 7A 8E 96 3E
         :                   FE F3 10 53 B2 19 A5 BF 6E 54 AD D0 0A A2 8E 54
         :                   E0 D4 B4 2E A6 E0 D4 30 F8 5A 47 CC 09 00 56 45
         :                   BE DA 5A 84 59 90 18 CE 29 6C 8E 9E E6 90 98 BD
         :                   D4 D8 F8 38 82 90 C9 79 DB 31 D3 7A A1 CA BA 6A
         :                   8B 9D 15 91 E2 6C 41 A3 2B 25 DA 4F E4 B3 14 E5
         :                   4B EC B7 89 06 44 18 67 C1 4C 03 35 18 D8 FD 7D
         :                           [ Another 385 bytes skipped ]
4423    3:                   INTEGER 65537
         :                   }
         :                 }
         :               }
4428  182:             [3] {
4431  179:               SEQUENCE {
4434   29:                 SEQUENCE {
4436    3:                   OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
4441   22:                   OCTET STRING, encapsulates {
4443   20:                     OCTET STRING
         :                   1B 17 70 C6 97 DC 84 54 75 7C 3C 98 5C E6 1D 1D
         :                   08 59 5D 53
         :                     }
         :                   }
4465   31:                 SEQUENCE {
4467    3:                   OBJECT IDENTIFIER
         :                     authorityKeyIdentifier (2 5 29 35)
4472   24:                   OCTET STRING, encapsulates {
4474   22:                     SEQUENCE {
4476   20:                       [0]
         :                   36 61 E1 00 7C 88 05 09 51 8B 44 6C 47 FF 1A 4C
         :                   C9 EA 4F 12
         :                       }
         :                     }
         :                   }
4498   15:                 SEQUENCE {
4500    3:                   OBJECT IDENTIFIER basicConstraints (2 5 29 19)
4505    1:                   BOOLEAN TRUE
4508    5:                   OCTET STRING, encapsulates {
4510    3:                     SEQUENCE {
4512    1:                       BOOLEAN TRUE
         :                       }
         :                     }
         :                   }
4515   14:                 SEQUENCE {
4517    3:                   OBJECT IDENTIFIER keyUsage (2 5 29 15)
4522    1:                   BOOLEAN TRUE
4525    4:                   OCTET STRING, encapsulates {
4527    2:                     BIT STRING 2 unused bits
         :                       '100000'B (bit 5)
         :                     }
         :                   }
4531   80:                 SEQUENCE {
4533    3:                   OBJECT IDENTIFIER cRLDistributionPoints (2 5 29 31)
4538   73:                   OCTET STRING, encapsulates {
4540   71:                     SEQUENCE {
4542   69:                       SEQUENCE {
4544   67:                         [0] {
4546   65:                           [0] {
4548   63:                             [6]
         :                   'https://android.googleapis.com/attestation/crl/8'
         :                   'F6734C9FA504789'
         :                             }
         :                           }
         :                         }
         :                       }
         :                     }
         :                   }
         :                 }
         :               }
         :             }
4613   13:           SEQUENCE {
4615    9:             OBJECT IDENTIFIER
         :               sha256WithRSAEncryption (1 2 840 113549 1 1 11)
4626    0:             NULL
         :             }
4628  513:           BIT STRING
         :             9B E2 2D 8C 43 AC 8F 11 35 11 77 BD F9 32 B3 01
         :             8C E9 97 58 08 E5 C0 DD C4 CC A6 B1 4A A3 E5 D0
         :             48 A6 18 1C 8E 5C FD 35 4A A5 12 C2 1A 82 64 3E
         :             B4 CC 0C 0B 1F 5E D5 11 C0 B7 49 5B A6 E7 74 37
         :             0B 7D 99 27 84 B7 E0 34 58 28 01 CC 03 76 50 F8
         :             1A B5 3B EF CA D2 FF 7D C9 37 FE D9 F7 30 3D 31
         :             24 CA 83 FD 67 AC 38 E3 82 23 B0 70 80 48 84 D6
         :             A1 2E 18 BD 94 1F 9A 8E 82 CC 2F EB 97 AA 5B A3
         :                     [ Another 384 bytes skipped ]
         :           }
         :         }
5145    0:       SET {}
         :       }
         :     }
         :   }</t>

<t>```</t>

</section>
</section>
<section anchor="windows-10-tpm" title="Windows 10 TPM">

<t>The next two sections provide two views of a CSR generated via invocation of the
Certificate Enrollment Manager API similar to the below:</t>

<t>```
CertificateRequestProperties request = new CertificateRequestProperties();
request.FriendlyName = "Self-Signed Device Certificate";</t>

<t>request.KeyAlgorithmName = KeyAlgorithmNames.Rsa;
request.KeyStorageProviderName = "Microsoft Smart Card Key Storage Provider";
request.UseExistingKey = true;
request.Exportable = ExportOption.NotExportable;
request.ContainerName = prj.GetContainerName();</t>

<t>request.Subject = subject_name;
request.KeyUsages = keyUsages;
request.SmartcardReaderName = smartCardReaderName;</t>

<t>string privacyCa =
    "MIIDezCCAmOgAwIBAgIBATANBgkqhkiG9w0BAQsFADBUMQswCQYDVQQGEwJVUzEY" +
    "MBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQ0wCwYDVQQLEwRESVNBMRwwGgYDVQQD" +
    "ExNQdXJlYnJlZCBQcml2YWN5IENBMB4XDTE4MDQwMzE0NTQwMFoXDTI4MDQwMzE0" +
    "NTQwMFowVDELMAkGA1UEBhMCVVMxGDAWBgNVBAoTD1UuUy4gR292ZXJubWVudDEN" +
    "MAsGA1UECxMERElTQTEcMBoGA1UEAxMTUHVyZWJyZWQgUHJpdmFjeSBDQTCCASIw" +
    "DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMROV8sQ707OSvjRxoX5S6MaB0r4" +
    "r5TnM97cx0RjtSVPu3O/WG9KRQdJtG9gARKKlxqgKOPJkTfTIxvUvWwKrtL9HjYs" +
    "IC2V/otsX3JKgPepud2CTIy3I1ADU7UD0/0MGqALbn+grDTaZOSi5p6cA0eo/f0X" +
    "O7UNh5r2YWOYAhZdhIy5F9BIOZEN/7pRyvKziupf3OVTQaMjMWoiDrCQC+D0xya4" +
    "8qxU/VFy4c9BmIg7uNzkHDqdaogo1Gsj5t2y0lW37IbRo6HrZ5Dl18laIX7s7n9k" +
    "Mp7GbK4rq/1FTMvI5bBpN/Pp4syi3f+oyQbSz+FPQwfBWGLukTUzPYcDVfUCAwEA" +
    "AaNYMFYwHQYDVR0OBBYEFAFy9PrSM65GYyC0EVDPU91WJ0BXMAsGA1UdDwQEAwIC" +
    "pDAoBgNVHSUEITAfBggrBgEFBQcDAgYIKwYBBQUHAwEGCSsGAQQBgjcVJDANBgkq" +
    "hkiG9w0BAQsFAAOCAQEAG777BuS/EXmuoHiVctA0n58u4SZb6i9Jvw1gI3qIryGM" +
    "2oxDSKPr36c7R2tFmAqo4m9N97wh4xFebkkYHgZWPsp0hRFy79veE+wMCw+Z0B88" +
    "ri4a2z/oTDmW9uf3r+BaZjRKpVoaYW9eztmz6DJA3wtvEdvUE2Nq4G1V5yXIdiSU" +
    "pfVd4eyEPVNy0Yp9DZDBP9vVcd5x7VfG8rzQoaDcerwrsXJ9/WLDz76A6d2/syHN" +
    "74CRuXYGhpBb7YL1jIhgVi6Rb4Dbq3dgDIkmTqUecEknuX73Oddr/phgqMOrVWUB" +
    "1XrHJbPUuC+nuPbShhJ0vPRw13TX3deqjzTsj8XEcA==";</t>

<t>byte[] privacyCaBytes = Convert.FromBase64String(privacyCa);
IBuffer buffer = privacyCaBytes.AsBuffer();
request.AttestationCredentialCertificate = new Certificate(buffer); ;</t>

<t>csrToDiscard = await
CertificateEnrollmentManager.UserCertificateEnrollmentManager.\
CreateRequestAsync(request);
```</t>

<t>Attestation details are described here: https://msdn.microsoft.com/en-us/library/dn366894.aspx.</t>

<t>The structure is essentially a Full PKI Request as described in RFC 5272.</t>

<t><list style="symbols">
  <t>ContentInfo
  <list style="symbols">
      <t>SignedData
      <list style="symbols">
          <t>PKIData
          <list style="symbols">
              <t>Empty controlSequence</t>
              <t>One TaggestRequest
              <list style="symbols">
                  <t>PKCS 10
                  <list style="symbols">
                      <t>Basic request details along with encrypted attestation extension</t>
                    </list></t>
                </list></t>
              <t>Empty cmsSequence</t>
              <t>Empty otherMsgSequence</t>
            </list></t>
          <t>Certificates bag with two certs (one of which is revoked)</t>
        </list></t>
    </list></t>
</list></t>

<section anchor="attestation-statement" title="Attestation statement">

<t>This section provides an annotation attestation statement as extracted from an encrypted
attestation extension. The structure of the attestation statement is defined here:
https://msdn.microsoft.com/en-us/library/dn408990.aspx.</t>

<t>```
 600 1256:                         SEQUENCE {
 604    9:                           OBJECT IDENTIFIER '1 3 6 1 4 1 311 21 24'
 615 1241:                           SET {
 619 1237:                             OCTET STRING
         :                   4B 41 53 54 01 00 00 00 02 00 00 00 1C 00 00 00
         :                   00 00 00 00 B9 04 00 00 00 00 00 00 4B 41 44 53
         :                   02 00 00 00 18 00 00 00 A1 00 00 00 00 01 00 00
         :                   00 03 00 00 FF 54 43 47 80 17 00 22 00 0B 9A FD
         :                   AB 8A 0B E9 0B BB 3F 7F E6 B6 77 91 EF A9 15 8A
         :                   03 B2 2B 8C BE 3F EC 56 B6 30 BF 82 73 9C 00 14
         :                   13 6E 2F 14 DD AF 30 72 A6 E3 89 4D BF 7A 54 26
         :                   36 2F 10 D6 00 00 00 00 51 4F CB E5 AD 8C 8C 60
         :                   E6 C2 70 80 00 D4 2C 65 4C 6B 95 ED 95 00 22 00
         :                   0B 2B E6 2C AD 8D E8 9A 85 04 D7 F3 7B B7 4C F8
         :                   32 CD B4 F1 80 CA A6 35 B9 2C 39 87 B7 96 03 C3
         :                   A3 00 22 00 0B 6C 88 60 B2 80 E3 BE 7D 34 F2 85
         :                   DC 26 9D 1B 72 A8 0A 17 CF 31 08 F1 55 F2 9B 4E
         :                   82 C8 5B 49 7B 1A F1 4B 12 A1 C5 D1 A4 C5 A4 59
         :                   C4 0A 97 E0 88 ED 1C D3 B6 38 4A 5D 6C 27 F5 69
         :                   7D 17 AD F6 C0 03 27 09 5D 93 B5 13 EA 50 B5 05
         :                   27 7B A0 51 4D 1B 17 52 87 7D B8 A6 05 4A 4F 39
         :                   CA 36 5C A1 19 19 0B 73 B4 0E 7F D3 91 DA 91 EE
         :                   37 C6 CE 78 AF 15 21 5D EB 5E 5F 23 A7 08 E9 85
         :                   D4 6B A0 95 6D D7 E0 3A D1 92 72 B7 D4 E5 35 6A
         :                   01 B0 7D 35 D0 99 BA A1 77 35 76 75 E3 90 A8 8B
         :                   86 27 B8 3D 47 75 2D 98 D0 23 4E 09 D8 26 6B 32
         :                   3C AB AC 50 A2 E8 FF 70 21 85 C5 5E B1 F5 9C B9
         :                   6E 21 27 C7 2A CD 84 61 02 47 6A A0 E1 9A 9F AF
         :                   02 43 08 D8 BF 9F 69 14 C4 8C 80 32 2D 5C A3 60
         :                   48 F5 5E 8E 65 6B 5E B5 0E A4 ED B9 8B F9 C3 D9
         :                   A8 CE C0 64 71 F6 E3 81 F7 9D 79 E5 73 7B F3 A4
         :                   6E 65 8D 72 B4 0A 3E 5E 70 5F AB 2B 89 B9 5E 65
         :                   44 BF 44 7B FB 2E 29 39 64 36 85 63 46 62 AF 25
         :                   A5 8B 19 30 AF 50 43 50 4D 38 00 00 00 02 00 00
         :                   00 03 00 00 00 38 01 00 00 E0 00 00 00 00 00 00
         :                   00 00 00 00 00 B0 00 00 00 00 00 00 00 00 00 00
         :                   00 00 00 00 00 00 00 00 00 00 00 00 00 01 36 00
         :                   01 00 0B 00 06 00 72 00 20 9D FF CB F3 6C 38 3A
         :                   E6 99 FB 98 68 DC 6D CB 89 D7 15 38 84 BE 28 03
         :                   92 2C 12 41 58 BF AD 22 AE 00 10 00 10 08 00 00
         :                   00 00 00 01 00 9B B1 27 B7 E3 5D 0C 10 74 52 1B
         :                   60 59 96 5E B6 08 D4 76 26 17 B5 92 49 39 34 CD
         :                   A4 2D 4D C9 3E 50 05 2E D8 9E 22 37 E2 05 D2 7F
         :                   3B 3E 4D 9F E0 E0 31 52 74 A0 D5 18 BE F1 9F 79
         :                   48 D6 24 69 35 3C D4 1F 55 73 75 ED 83 D6 3A E3
         :                   63 77 A6 5B 92 97 86 13 7C 69 3B DE AA E5 0E 9A
         :                   39 CF 53 DF 4C 7A E0 3C A3 EC 29 DA 18 5F 86 E6
         :                   22 D9 2C A3 8E D8 E2 3E 80 9C 69 52 FA 1E 90 3F
         :                   BA 09 04 D0 91 6A 27 2B 44 8C FF E8 DE FF BD B9
         :                   CE DD 95 67 70 FD 94 E5 3A E6 E4 EA 01 A5 AC 4A
         :                   79 5C 88 4D 07 43 C7 C0 B8 95 3E 7C 72 90 CD 35
         :                   99 B3 32 8A C7 8C 90 63 E3 46 88 62 35 A4 5B 54
         :                   F1 E8 61 0E CF 85 B4 41 6F 06 94 B6 BA 6F 4B CE
         :                   F7 8A 18 6C 5E 9A 6B 65 C3 F5 58 ED 7D 6A 3A E6
         :                   24 B6 21 6F 8C EE 1C 21 60 9E 2F 86 22 D2 2B 8F
         :                   E0 3B 12 AC 6B F5 FF 54 C6 E8 D4 3C 2E D3 B6 8E
         :                   7A 30 36 29 3D 00 DE 00 20 13 F5 31 2B 87 50 19
         :                   D3 95 1F F2 B6 00 95 5B 0A E2 54 7A A0 CF 6A 2C
         :                   F5 4F AD 77 C6 D5 4F 52 CB 00 10 3B 41 34 BF D4
         :                   FC 8B BE 87 14 47 81 4E 5C 5C 23 73 44 AF D6 56
         :                   6F A6 6E BE E7 63 9C 43 53 C4 3C 26 33 B6 AD 75
         :                   36 AC 91 98 C1 FF E3 B2 AF E6 3F 14 C0 2E 65 D7
         :                   C1 AD F6 22 D9 59 96 B6 70 8C 30 2F DE 76 1B EB
         :                   9D 56 C1 77 F8 1D 38 5C 7D 13 9C FD 1E 3E 00 1B
         :                   5A 74 C4 8E 49 2B 0B B5 C5 0E E3 A7 2C 92 E2 96
         :                   1E 9D C8 43 02 2F 8F F8 6E 66 4A FA D8 56 57 59
         :                   48 A4 D5 B7 7F 49 52 CA FA 11 E4 AF 27 E7 64 21
         :                   76 79 9B 8A A3 1A A6 FA A1 03 3E CC CD 41 26 3C
         :                   0D 3C DC 81 21 21 DE 92 4D 2A EF 66 DE D6 77 FE
         :                   41 0C 5D 44 1A D0 C4 D7 8B EA 6D DE 01 EE 97 DB
         :                   61 0F FD 62 59 00 00 00 06 00 20 8F CD 21 69 AB
         :                   92 69 4E 0C 63 3F 1A B7 72 84 2B 82 41 BB C2 02
         :                   88 98 1F C7 AC 1E DD C1 FD DB 0E 00 20 E5 29 F5
         :                   D6 11 28 72 95 4E 8E D6 60 51 17 B7 57 E2 37 C6
         :                   E1 95 13 A9 49 FE E1 F2 04 C4 58 02 3A 00 20 AF
         :                   2C A5 69 69 9C 43 6A 21 00 6F 1C B8 A2 75 6C 98
         :                   BC 1C 76 5A 35 59 C5 FE 1C 3F 5E 72 28 A7 E7 00
         :                   20 C4 13 A8 47 B1 11 12 B1 CB DD D4 EC A4 DA AA
         :                   15 A1 85 2C 1C 3B BA 57 46 1D 25 76 05 F3 D5 AF
         :                   53 00 00 00 20 04 8E 9A 3A CE 08 58 3F 79 F3 44
         :                   FF 78 5B BE A9 F0 7A C7 FA 33 25 B3 D4 9A 21 DD
         :                   51 94 C6 58 50
         :                             }</t>

<t>```
The format is structured as follows:</t>

<t>```
typedef struct  {
   UINT32 Magic;
   UINT32 Version;
   UINT32 Platform;
   UINT32 HeaderSize;
   UINT32 cbIdBinding;
   UINT32 cbKeyAttestation;
   UINT32 cbAIKOpaque;
   BYTE idBinding[cbIdBinding];
   BYTE keyAttestation[cbKeyAttestation];
   BYTE aikOpaque[cbAIKOpaque];
 } KeyAttestationStatement;</t>

<t>4B 41 53 54 - Magic
01 00 00 00 - Version
02 00 00 00 - Platform
1C 00 00 00 - HeaderSize
00 00 00 00 - cbIdBinding
B9 04 00 00 - cbKeyAttestation
00 00 00 00 &#8211; cbAIKOpaque
```</t>

<t>The remainder is the keyAttestation, which is structured as follows:</t>

<t>```
typedef struct {
   UINT32 Magic;
   UINT32 Platform;
   UINT32 HeaderSize;
   UINT32 cbKeyAttest;
   UINT32 cbSignature;
   UINT32 cbKeyBlob;
   BYTE keyAttest[cbKeyAttest];
   BYTE signature[cbSignature];
   BYTE keyBlob[cbKeyBlob];
 } keyAttestation;</t>

<t>4B 41 44 53 - Magic
02 00 00 00 - Platform
18 00 00 00 - HeaderSize
A1 00 00 00 &#8211; cbKeyAttest (161)
00 01 00 00 &#8211; cbSignature (256)
00 03 00 00 - cbKeyBlob
```</t>

<t>keyAttest (161 bytes)
<spanx style="verb">
FF 54 43 47 80 17 00 22 00 0B 9A FD AB 8A 0B E9 0B BB 3F 7F E6 B6 77 91 EF A9 15 8A 03 B2
2B 8C BE 3F EC 56 B6 30 BF 82 73 9C 00 14 13 6E 2F 14 DD AF 30 72 A6 E3 89 4D BF 7A 54 26
36 2F 10 D6 00 00 00 00 51 4F CB E5 AD 8C 8C 60 E6 C2 70 80 00 D4 2C 65 4C 6B 95 ED 95 00
22 00 0B 2B E6 2C AD 8D E8 9A 85 04 D7 F3 7B B7 4C F8 32 CD B4 F1 80 CA A6 35 B9 2C 39 87
B7 96 03 C3 A3 00 22 00 0B 6C 88 60 B2 80 E3 BE 7D 34 F2 85 DC 26 9D 1B 72 A8 0A 17 CF 31
08 F1 55 F2 9B 4E 82 C8 5B 49 7B
</spanx></t>

<t>The keyAttest field is of type TPMS_ATTEST. The TPMS_ATTEST structure is defined in
section 10.11.8 of
https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-2-Structures-00.99.pdf.
```
FF 54 43 47 - magic
80 17 &#8211; type (TPM_ST_ATTEST_CERTIFY)
00 22 &#8211; name - TPM2B_NAME.size (34 bytes)
00 0B 9A FD AB 8A 0B E9 0B BB - TPM2B_NAME.name
3F 7F E6 B6 77 91 EF A9 15 8A
03 B2 2B 8C BE 3F EC 56 B6 30
BF 82 73 9C</t>

<t>00 14 &#8211; extraData &#8211; TPM2B_DATA.size (20 bytes)
13 6E 2F 14 DD AF 30 72 A6 E3 &#8211; TPM2B_DATA.buffer
89 4D BF 7A 54 26 36 2F 10 D6</t>

<t>00 00 00 00 51 4F CB E5 &#8211; clockInfo &#8211; TPMS_CLOCK_INFO.clock
AD 8C 8C 60 &#8211; TPMS_CLOCK_INFO.resetCount
E6 C2 70 80 &#8211; TPMS_CLOCK_INFO.restartCount
00 - &#8211; TPMS_CLOCK_INFO.safe</t>

<t>D4 2C 65 4C 6B 95 ED 95 - firmwareVersion</t>

<t>00 22 &#8211; attested &#8211; TPMS_CERTIFY_INFO.name.size
00 0B 2B E6 2C AD 8D E8 9A 85 - TPM2B_NAME.name
04 D7 F3 7B B7 4C F8 32 CD B4
F1 80 CA A6 35 B9 2C 39 87 B7
96 03 C3 A3</t>

<t>00 22 &#8211; TPMS_CERTIFY_INFO.qualifiedName.size
00 0B 6C 88 60 B2 80 E3 BE 7D - TPM2B_NAME.name
34 F2 85 DC 26 9D 1B 72 A8 0A
17 CF 31 08 F1 55 F2 9B 4E 82
C8 5B 49 7B
```</t>

<t>Signature (256 bytes) &#8211; generated using the AIK private key
<spanx style="verb">
1A F1 4B 12 A1 C5 D1 A4 C5 A4 59 C4 0A 97 E0 88 ED 1C D3 B6 38 4A 5D 6C 27 F5 69 7D 17 AD
F6 C0 03 27 09 5D 93 B5 13 EA 50 B5 05 27 7B A0 51 4D 1B 17 52 87 7D B8 A6 05 4A 4F 39 CA
36 5C A1 19 19 0B 73 B4 0E 7F D3 91 DA 91 EE 37 C6 CE 78 AF 15 21 5D EB 5E 5F 23 A7 08 E9
85 D4 6B A0 95 6D D7 E0 3A D1 92 72 B7 D4 E5 35 6A 01 B0 7D 35 D0 99 BA A1 77 35 76 75 E3
90 A8 8B 86 27 B8 3D 47 75 2D 98 D0 23 4E 09 D8 26 6B 32 3C AB AC 50 A2 E8 FF 70 21 85 C5
5E B1 F5 9C B9 6E 21 27 C7 2A CD 84 61 02 47 6A A0 E1 9A 9F AF 02 43 08 D8 BF 9F 69 14 C4
8C 80 32 2D 5C A3 60 48 F5 5E 8E 65 6B 5E B5 0E A4 ED B9 8B F9 C3 D9 A8 CE C0 64 71 F6 E3
81 F7 9D 79 E5 73 7B F3 A4 6E 65 8D 72 B4 0A 3E 5E 70 5F AB 2B 89 B9 5E 65 44 BF 44 7B FB
2E 29 39 64 36 85 63 46 62 AF 25 A5 8B 19 30 AF
</spanx></t>

<t>The remainder is the keyBlob, which is defined here:
https://github.com/Microsoft/TSS.MSR/blob/master/PCPTool.v11/inc/TpmAtt.h.</t>

</section>
</section>
<section anchor="yubikey" title="Yubikey">
<t>As with the Android Keystore attestations, Yubikey attestations take the form of an X.509
certificate. As above, the certificate is presented here packaged along with an
intermediate CA certificate as a certificates-only SignedData message.</t>

<t>The attestations below were generated using code similar to that found in the
yubico-piv-tool (https://github.com/Yubico/yubico-piv-tool). Details regarding
attestations are here: https://developers.yubico.com/PIV/Introduction/PIV_attestation.html</t>

<section anchor="yubikey-4" title="Yubikey 4">
<t><spanx style="verb">
   0 1576: SEQUENCE {
   4    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
  15 1561:   [0] {
  19 1557:     SEQUENCE {
  23    1:       INTEGER 1
  26    0:       SET {}
  28   11:       SEQUENCE {
  30    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
         :         }
  41 1533:       [0] {
  45  742:         SEQUENCE {
  49  462:           SEQUENCE {
  53    3:             [0] {
  55    1:               INTEGER 2
         :               }
  58    9:             INTEGER 00 A4 85 22 AA 34 AF AE 4F
  69   13:             SEQUENCE {
  71    9:               OBJECT IDENTIFIER
         :                 sha256WithRSAEncryption (1 2 840 113549 1 1 11)
  82    0:               NULL
         :               }
  84   43:             SEQUENCE {
  86   41:               SET {
  88   39:                 SEQUENCE {
  90    3:                   OBJECT IDENTIFIER commonName (2 5 4 3)
  95   32:                   UTF8String 'Yubico PIV Root CA Serial 263751'
         :                   }
         :                 }
         :               }
 129   32:             SEQUENCE {
 131   13:               UTCTime 14/03/2016 00:00:00 GMT
 146   15:               GeneralizedTime 17/04/2052 00:00:00 GMT
         :               }
 163   33:             SEQUENCE {
 165   31:               SET {
 167   29:                 SEQUENCE {
 169    3:                   OBJECT IDENTIFIER commonName (2 5 4 3)
 174   22:                   UTF8String 'Yubico PIV Attestation'
         :                   }
         :                 }
         :               }
 198  290:             SEQUENCE {
 202   13:               SEQUENCE {
 204    9:                 OBJECT IDENTIFIER
         :                   rsaEncryption (1 2 840 113549 1 1 1)
 215    0:                 NULL
         :                 }
 217  271:               BIT STRING
         :                 30 82 01 0A 02 82 01 01 00 AB A9 0B 16 9B EF 31
         :                 CC 3E AC 18 5A 2D 45 80 75 70 C7 58 B0 6C 3F 1B
         :                 59 0D 49 B9 89 E8 6F CE BB 27 6F D8 3C 60 3A 85
         :                 00 EF 5C BC 40 99 3D 41 EE EA C0 81 7F 76 48 E4
         :                 A9 4C BC D5 6B E1 1F 0A 60 93 C6 FE AA D2 8D 8E
         :                 E2 B7 CD 8B 2B F7 9B DD 5A AB 2F CF B9 0E 54 CE
         :                 EC 8D F5 5E D7 7B 91 C3 A7 56 9C DC C1 06 86 76
         :                 36 44 53 FB 08 25 D8 06 B9 06 8C 81 FD 63 67 CA
         :                         [ Another 142 bytes skipped ]
         :               }
 492   21:             [3] {
 494   19:               SEQUENCE {
 496   17:                 SEQUENCE {
 498   10:                   OBJECT IDENTIFIER '1 3 6 1 4 1 41482 3 3'
 510    3:                   OCTET STRING 04 03 03
         :                   }
         :                 }
         :               }
         :             }
 515   13:           SEQUENCE {
 517    9:             OBJECT IDENTIFIER
         :               sha256WithRSAEncryption (1 2 840 113549 1 1 11)
 528    0:             NULL
         :             }
 530  257:           BIT STRING
         :             52 80 5A 6D C3 9E DF 47 A8 F1 B2 A5 9C A3 80 81
         :             3B 1D 6A EB 6A 12 62 4B 11 FD 8D 30 F1 7B FC 71
         :             10 C9 B2 08 FC D1 4E 35 7F 45 F2 10 A2 52 B9 D4
         :             B3 02 1A 01 56 07 6B FA 64 A7 08 F0 03 FB 27 A9
         :             60 8D 0D D3 AC 5A 10 CF 20 96 4E 82 BC 9D E3 37
         :             DA C1 4C 50 E1 3D 16 B4 CA F4 1B FF 08 64 C9 74
         :             4F 2A 3A 43 E0 DE 42 79 F2 13 AE 77 A1 E2 AE 6B
         :             DF 72 A5 B6 CE D7 4C 90 13 DF DE DB F2 8B 34 45
         :                     [ Another 128 bytes skipped ]
         :           }
 791  783:         SEQUENCE {
 795  503:           SEQUENCE {
 799    3:             [0] {
 801    1:               INTEGER 2
         :               }
 804   17:             INTEGER
         :               00 FE B9 AF 03 3B 0B A7 79 04 02 F5 67 AE DF 72
         :               ED
 823   13:             SEQUENCE {
 825    9:               OBJECT IDENTIFIER
         :                 sha256WithRSAEncryption (1 2 840 113549 1 1 11)
 836    0:               NULL
         :               }
 838   33:             SEQUENCE {
 840   31:               SET {
 842   29:                 SEQUENCE {
 844    3:                   OBJECT IDENTIFIER commonName (2 5 4 3)
 849   22:                   UTF8String 'Yubico PIV Attestation'
         :                   }
         :                 }
         :               }
 873   32:             SEQUENCE {
 875   13:               UTCTime 14/03/2016 00:00:00 GMT
 890   15:               GeneralizedTime 17/04/2052 00:00:00 GMT
         :               }
 907   37:             SEQUENCE {
 909   35:               SET {
 911   33:                 SEQUENCE {
 913    3:                   OBJECT IDENTIFIER commonName (2 5 4 3)
 918   26:                   UTF8String 'YubiKey PIV Attestation 9e'
         :                   }
         :                 }
         :               }
 946  290:             SEQUENCE {
 950   13:               SEQUENCE {
 952    9:                 OBJECT IDENTIFIER
         :                   rsaEncryption (1 2 840 113549 1 1 1)
 963    0:                 NULL
         :                 }
 965  271:               BIT STRING
         :                 30 82 01 0A 02 82 01 01 00 93 C4 C0 35 95 7E 26
         :                 2A 7E A5 D0 29 C4 D7 E9 39 67 22 B1 09 45 46 4D
         :                 DB A4 77 CB 0B A3 F1 D0 69 3C 24 8D A2 72 72 27
         :                 E1 7F DE CB 67 A4 1D D2 E5 43 44 6F 21 39 F8 57
         :                 34 01 0E 7E C3 81 63 63 6A 6D D7 40 20 7B AF 35
         :                 61 9C 8D C1 D1 2B 25 48 EE 52 FC F3 72 6A 74 96
         :                 01 CB 1C 1A B2 AD F9 18 96 EB 59 EF E3 3A CA BC
         :                 AA 9B 42 FE FF 60 6E 28 89 49 0D C1 B1 B0 25 AE
         :                         [ Another 142 bytes skipped ]
         :               }
1240   60:             [3] {
1242   58:               SEQUENCE {
1244   17:                 SEQUENCE {
1246   10:                   OBJECT IDENTIFIER '1 3 6 1 4 1 41482 3 3'
1258    3:                   OCTET STRING 04 03 03                      -- firmware version
         :                   }
1263   19:                 SEQUENCE {
1265   10:                   OBJECT IDENTIFIER '1 3 6 1 4 1 41482 3 7'
1277    5:                   OCTET STRING 02 03 4F 9B B5        -- serial number
         :                   }
1284   16:                 SEQUENCE {
1286   10:                   OBJECT IDENTIFIER '1 3 6 1 4 1 41482 3 8'
1298    2:                   OCTET STRING 01 01                         -- PIN and touch policy
         :                   }
         :                 }
         :               }
         :             }
1302   13:           SEQUENCE {
1304    9:             OBJECT IDENTIFIER
         :               sha256WithRSAEncryption (1 2 840 113549 1 1 11)
1315    0:             NULL
         :             }
1317  257:           BIT STRING
         :             1F 2B B8 1C 95 A1 01 74 3F 87 27 F6 B3 A6 A9 9D
         :             11 B9 ED 68 92 B9 05 2D 22 36 51 28 23 3D B0 2F
         :             7A 17 D5 8C 0C F4 3A 68 FD 2A 34 0D 80 3C F7 8F
         :             B8 79 B0 76 E5 4D 61 94 C5 72 D6 9F 6E 26 76 5F
         :             03 94 55 40 93 5C 04 EF CC 58 41 EB 7C 86 64 23
         :             5F 23 5E 94 78 73 2E 77 8C 58 C5 45 87 22 CF BA
         :             69 06 B8 C7 06 37 10 21 8C 74 AD 08 B9 85 F2 7B
         :             99 02 4A 3E E8 96 09 D3 F4 C6 AB FA 49 68 E2 E0
         :                     [ Another 128 bytes skipped ]
         :           }
         :         }
1578    0:       SET {}
         :       }
         :     }
         :   }
</spanx></t>

</section>
<section anchor="yubikey-5" title="Yubikey 5">

<t><spanx style="verb">
   0 1613: SEQUENCE {
   4    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
  15 1598:   [0] {
  19 1594:     SEQUENCE {
  23    1:       INTEGER 1
  26    0:       SET {}
  28   11:       SEQUENCE {
  30    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
         :         }
  41 1570:       [0] {
  45  762:         SEQUENCE {
  49  482:           SEQUENCE {
  53    3:             [0] {
  55    1:               INTEGER 2
         :               }
  58    9:             INTEGER 00 86 77 17 E0 1D 19 2B 26
  69   13:             SEQUENCE {
  71    9:               OBJECT IDENTIFIER
         :                 sha256WithRSAEncryption (1 2 840 113549 1 1 11)
  82    0:               NULL
         :               }
  84   43:             SEQUENCE {
  86   41:               SET {
  88   39:                 SEQUENCE {
  90    3:                   OBJECT IDENTIFIER commonName (2 5 4 3)
  95   32:                   UTF8String 'Yubico PIV Root CA Serial 263751'
         :                   }
         :                 }
         :               }
 129   32:             SEQUENCE {
 131   13:               UTCTime 14/03/2016 00:00:00 GMT
 146   15:               GeneralizedTime 17/04/2052 00:00:00 GMT
         :               }
 163   33:             SEQUENCE {
 165   31:               SET {
 167   29:                 SEQUENCE {
 169    3:                   OBJECT IDENTIFIER commonName (2 5 4 3)
 174   22:                   UTF8String 'Yubico PIV Attestation'
         :                   }
         :                 }
         :               }
 198  290:             SEQUENCE {
 202   13:               SEQUENCE {
 204    9:                 OBJECT IDENTIFIER
         :                   rsaEncryption (1 2 840 113549 1 1 1)
 215    0:                 NULL
         :                 }
 217  271:               BIT STRING
         :                 30 82 01 0A 02 82 01 01 00 C5 5B 8D E9 B9 3C 53
         :                 69 82 88 FE DA 70 FC 5C 88 78 41 25 A2 1D 7B 84
         :                 8E 93 36 AD 67 2B 4C AB 45 BE B2 E0 D5 9C 1B A1
         :                 68 D5 6B F8 63 5C 83 CB 83 38 62 B7 64 AE 83 37
         :                 37 8E C8 60 80 E6 01 F8 75 AA AE F6 6E A7 D5 76
         :                 C5 C1 25 AD AA 9E 9D DC B5 7E E9 8E 2A B4 3F 99
         :                 0D F7 9F 20 A0 28 A0 9F B3 B1 22 5F AF 38 FB 73
         :                 46 F4 C7 93 30 DD FA D0 86 E0 C9 C6 72 99 AF FB
         :                         [ Another 142 bytes skipped ]
         :               }
 492   41:             [3] {
 494   39:               SEQUENCE {
 496   17:                 SEQUENCE {
 498   10:                   OBJECT IDENTIFIER '1 3 6 1 4 1 41482 3 3'
 510    3:                   OCTET STRING 05 01 02
         :                   }
 515   18:                 SEQUENCE {
 517    3:                   OBJECT IDENTIFIER basicConstraints (2 5 29 19)
 522    1:                   BOOLEAN TRUE
 525    8:                   OCTET STRING 30 06 01 01 FF 02 01 00
         :                   }
         :                 }
         :               }
         :             }
 535   13:           SEQUENCE {
 537    9:             OBJECT IDENTIFIER
         :               sha256WithRSAEncryption (1 2 840 113549 1 1 11)
 548    0:             NULL
         :             }
 550  257:           BIT STRING
         :             05 57 B7 BF 5A 41 74 F9 5F EC 2E D2 B8 78 26 E5
         :             EF 4F EA BF 5A 64 C9 CF 06 7F CA 8C 0A FC 1A 47
         :             1C D6 AC ED C8 5B 54 72 00 9F B8 59 AB 73 25 B2
         :             D6 02 A3 59 83 31 69 EE C1 5F 3D F2 2B 1B 22 CA
         :             B6 FC F9 FB 21 32 9E 08 F3 08 54 6D C9 26 10 42
         :             08 1D 3C B5 F0 5A B1 98 D4 68 DC 91 F1 D3 91 54
         :             7A A0 34 8B F6 65 EB 13 9F 3A 1C BF 43 C5 D1 D0
         :             33 23 C6 25 A0 4C E4 E9 AA 59 80 D8 02 1E B0 10
         :                     [ Another 128 bytes skipped ]
         :           }
 811  800:         SEQUENCE {
 815  520:           SEQUENCE {
 819    3:             [0] {
 821    1:               INTEGER 2
         :               }
 824   16:             INTEGER
         :               17 7D 2D F7 D6 6D 97 CC D6 CF 69 33 87 5B F1 5E
 842   13:             SEQUENCE {
 844    9:               OBJECT IDENTIFIER
         :                 sha256WithRSAEncryption (1 2 840 113549 1 1 11)
 855    0:               NULL
         :               }
 857   33:             SEQUENCE {
 859   31:               SET {
 861   29:                 SEQUENCE {
 863    3:                   OBJECT IDENTIFIER commonName (2 5 4 3)
 868   22:                   UTF8String 'Yubico PIV Attestation'
         :                   }
         :                 }
         :               }
 892   32:             SEQUENCE {
 894   13:               UTCTime 14/03/2016 00:00:00 GMT
 909   15:               GeneralizedTime 17/04/2052 00:00:00 GMT
         :               }
 926   37:             SEQUENCE {
 928   35:               SET {
 930   33:                 SEQUENCE {
 932    3:                   OBJECT IDENTIFIER commonName (2 5 4 3)
 937   26:                   UTF8String 'YubiKey PIV Attestation 9e'
         :                   }
         :                 }
         :               }
 965  290:             SEQUENCE {
 969   13:               SEQUENCE {
 971    9:                 OBJECT IDENTIFIER
         :                   rsaEncryption (1 2 840 113549 1 1 1)
 982    0:                 NULL
         :                 }
 984  271:               BIT STRING
         :                 30 82 01 0A 02 82 01 01 00 A9 02 2D 7A 4C 0B B1
         :                 0C 02 F9 E5 9C E5 6F 20 D1 9D F9 CE B3 B3 4D 1B
         :                 61 B0 B4 E0 3F 44 19 72 88 8B 8D 9F 86 4A 5E C7
         :                 38 F0 AF C9 28 5C D8 A2 80 C9 43 93 2D FA 39 7F
         :                 E9 39 2D 18 1B A7 A2 76 8F D4 6C D0 75 96 99 0D
         :                 06 37 9D 90 D5 71 00 6E FB 82 D1 5B 2A 7C 3B 62
         :                 9E AB 15 81 B9 AD 7F 3D 30 1C C2 4B 9D C4 D5 64
         :                 32 9A 54 D6 23 B1 65 92 A3 D7 57 E2 62 10 2B 93
         :                         [ Another 142 bytes skipped ]
         :               }
1259   78:             [3] {
1261   76:               SEQUENCE {
1263   17:                 SEQUENCE {
1265   10:                   OBJECT IDENTIFIER '1 3 6 1 4 1 41482 3 3'
1277    3:                   OCTET STRING 05 01 02                              -- firmware version
         :                   }
1282   20:                 SEQUENCE {
1284   10:                   OBJECT IDENTIFIER '1 3 6 1 4 1 41482 3 7'
1296    6:                   OCTET STRING 02 04 00 93 6A A0     -- serial number
         :                   }
1304   16:                 SEQUENCE {
1306   10:                   OBJECT IDENTIFIER '1 3 6 1 4 1 41482 3 8'
1318    2:                   OCTET STRING 01 01                                 -- PIN and touch policy
         :                   }
1322   15:                 SEQUENCE {
1324   10:                   OBJECT IDENTIFIER '1 3 6 1 4 1 41482 3 9'
1336    1:                   OCTET STRING 02                                    -- form factor
         :                   }
         :                 }
         :               }
         :             }
1339   13:           SEQUENCE {
1341    9:             OBJECT IDENTIFIER
         :               sha256WithRSAEncryption (1 2 840 113549 1 1 11)
1352    0:             NULL
         :             }
1354  257:           BIT STRING
         :             9F EB 7A 4C F0 7C 67 11 ED C5 84 07 C8 19 41 B2
         :             71 42 08 2B D6 CD A8 5F DC AE 79 75 6C F1 E5 4D
         :             28 95 89 69 9D C0 2E A7 D4 48 51 B0 75 FF 63 FD
         :             B8 79 93 03 EA BB 8A 67 D8 E7 EC C9 1C 8E 3F AF
         :             74 30 D4 7E 74 A4 26 50 9F D4 57 AE 23 C0 8A 63
         :             4E F3 C7 CF 5A AF 91 11 A2 6B 3B 49 24 32 26 88
         :             D8 4F 6F BE BC F0 2D A9 A2 88 B4 5F 54 AF 42 72
         :             08 74 64 57 76 5A 02 9A 9D 21 4B FD 7F 44 8F AF
         :                     [ Another 128 bytes skipped ]
         :           }
         :         }
1615    0:       SET {}
         :       }
         :     }
         :   }
</spanx></t>

</section>
</section>
</section>
<section anchor="privacy-considerations" title="Privacy Considerations.">

<t>TBD</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>TBD.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>TBD.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>Thomas Hardjono provided the text on blockchain system.
Dave Thaler suggested many small variations.  Frank Xialiang suggested the
scalling scenarios that might preclude a 1:1 protocol between attesters and
relying parties. Henk Birkholz provided many reviews. Kathleen Moriarty
provided many useful edits.  Ned Smith, Anders Rundgren and Steve Hanna
provided many useful pointers to TCG terms and concepts. Thomas Fossati and
Shawn Willden elucidated the Android Keystore goals and limitations.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;


    </references>

    <references title='Informative References'>

&RFC5652;
&RFC7030;
&RFC4210;
&RFC8555;
&I-D.tschofenig-rats-psa-token;
&I-D.gutmann-scep;
<reference anchor="keystore" target="https://developer.android.com/training/articles/keystore">
  <front>
    <title>Android Keystore System</title>
    <author initials="." surname="Google">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="android_security" target="https://arxiv.org/pdf/1904.05572.pdf">
  <front>
    <title>The Android Platform Security Model</title>
    <author initials="R.M.a.J.V.S.a.C.B.a.N." surname="Kralevich" fullname="Rene Mayrhofer and Jeffrey Vander Stoep and Chad Brubaker and Nick Kralevich">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="keystore_attestation" target="https://developer.android.com/training/articles/security-key-attestation">
  <front>
    <title>Verifying hardware-backed key pairs with Key Attestation</title>
    <author initials="." surname="Google">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="yubikey_attestation" target="https://developers.yubico.com/PIV/Introduction/PIV_attestation.html">
  <front>
    <title>PIV Attestation</title>
    <author initials="." surname="Yubico">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="fido_w3c" target="https://www.w3.org/TR/webauthn-1/">
  <front>
    <title>Web Authentication: An API for accessing Public Key Credentials Level 1</title>
    <author initials="." surname="W3C">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="fido" target="https://fidoalliance.org/specifications/">
  <front>
    <title>FIDO Specification Overview</title>
    <author initials="." surname="FIDO Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="fidotechnote" target="https://fidoalliance.org/fido-technotes-the-truth-about-attestation/">
  <front>
    <title>FIDO TechNotes: The Truth about Attestation</title>
    <author initials="." surname="FIDO Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="fidoattestation" target="https://fidoalliance.org/specs/fido-v2.0-ps-20150904/fido-key-attestation-v2.0-ps-20150904.html">
  <front>
    <title>FIDO 2.0: Key Attestation</title>
    <author initials="." surname="FIDO Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="fidosignature" target="https://fidoalliance.org/specs/fido-v2.0-ps-20150904/fido-signature-format-v2.0-ps-20150904.html">
  <front>
    <title>FIDO 2.0: Signature Format</title>
    <author initials="." surname="FIDO Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>


<section anchor="changes" title="Changes">

<t><list style="symbols">
  <t>created new section for target use cases</t>
  <t>added comments from Guy, Jessica, Henk and Ned on TCG description.</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

