>> "OK.jwt" signature successfully verified using "data/pkey.json"
[claims-set]
{
"ear.status": "affirming",
"eat_profile": "tag:github.com/veraison/ar4si,2022-10-17",
"ear.trustworthiness-vector": {
"instance-identity": 2,
"configuration": 2,
"executables": 3,
"file-system": 2,
"hardware": 2,
"runtime-opaque": 2,
"storage-opaque": 2,
"sourced-data": 2
},
"ear.raw-evidence": "3q2+7w==",
"iat": 1666091373,
"ear.appraisal-policy-id": "https://veraison.example/policy/1/60a0068d"
}
[trustworthiness vector]
Instance Identity [\033[42maffirming\033[0m]: recognized and not compromised
Configuration [\033[42maffirming\033[0m]: all recognized and approved
Executables [\033[42maffirming\033[0m]: recognized and approved boot-time
File System [\033[42maffirming\033[0m]: all recognized and approved
Hardware [\033[42maffirming\033[0m]: genuine
Runtime Opaque [\033[42maffirming\033[0m]: memory encryption
Storage Opaque [\033[42maffirming\033[0m]: encrypted secrets with HW-backed keys
Sourced Data [\033[42maffirming\033[0m]: from attesters in the affirming tier