Nithin Sade
ae4b8b8d16
Support ECDSA based AK's on Windows ( #415 )
CodeQL / Analyze (go) (push) Has been cancelled
Test / test-linux (1.24.x) (push) Has been cancelled
Test / test-linux-tpm12 (1.24.x) (push) Has been cancelled
Test / test-macos (1.24.x) (push) Has been cancelled
Test / test-windows (1.24.x) (push) Has been cancelled
2025-03-27 10:15:13 -07:00
zhsh
dfabc9c919
attest: Support "qualifyingData" when creating a new key. ( #401 )
2025-02-03 13:43:19 +11:00
zhsh
046550658b
attest: Create keys under non-default SRKs ( #342 )
2023-07-11 10:14:13 -04:00
Paweł Szałachowski
c4760bd1c6
Validate the RSA-PSS salt length argument. ( #219 )
2021-05-21 15:28:56 -07:00
Paweł Szałachowski
0b7298fb18
Support RSA application keys ( #218 )
2021-05-20 11:15:09 -07:00
Paweł Szałachowski
7f6fec6b36
add ecdsa configuration options ( #217 )
...
Add configuration options for ECDSA key generation.
2021-05-19 11:32:54 -07:00
Paweł Szałachowski
1bbba0bdfd
Minor fixes and additions ( #207 )
...
* replace ReadPublic() by DecodePublic() when creating and loading keys: the current implementation calls ReadPublic() even if public data is already accessible
* drop handle() from the ak interface: it is unnecessary
* add Blobs() to attest.Key: to allow agnostic key marshaling
2021-04-01 19:29:45 -07:00
Paweł Szałachowski
440d34a877
Support for application signing keys ( #201 )
2021-03-08 12:27:00 -08:00