.. |
attest-tool
|
Add initial docs for attest-tool (#213)
|
2021-04-15 12:14:18 -07:00 |
internal
|
WIP processing image load events (#216)
|
2021-05-10 12:11:58 -07:00 |
testdata
|
WIP processing image load events (#216)
|
2021-05-10 12:11:58 -07:00 |
activation_test.go
|
Rename AIK to AK everywhere
|
2019-10-09 08:56:19 +11:00 |
activation.go
|
attest: add bounds checks for slice indexes (#197)
|
2020-12-30 19:33:55 +01:00 |
application_key_test.go
|
Validate the RSA-PSS salt length argument. (#219)
|
2021-05-21 15:28:56 -07:00 |
application_key.go
|
Validate the RSA-PSS salt length argument. (#219)
|
2021-05-21 15:28:56 -07:00 |
attest_fuzz.go
|
Enable ParseAKPublic & ParseEKCertificate for fuzzing. (#141)
|
2019-12-04 15:04:06 -08:00 |
attest_simulated_tpm20_test.go
|
Split linuxTPM -> {trousersTPM,wrappedTPM20}, implement CommandChannel
|
2020-05-05 16:56:57 -07:00 |
attest_test.go
|
Split linuxTPM -> {trousersTPM,wrappedTPM20}, implement CommandChannel
|
2020-05-05 16:56:57 -07:00 |
attest_tpm12_test.go
|
Split linuxTPM -> {trousersTPM,wrappedTPM20}, implement CommandChannel
|
2020-05-05 16:56:57 -07:00 |
attest.go
|
Add AK.Certify() and use CertifyEx() for certification (#210)
|
2021-04-23 14:41:30 -07:00 |
certification_test.go
|
Support RSA application keys (#218)
|
2021-05-20 11:15:09 -07:00 |
certification.go
|
Add AK.Certify() and use CertifyEx() for certification (#210)
|
2021-04-23 14:41:30 -07:00 |
challenge_test.go
|
Rename AIK to AK everywhere
|
2019-10-09 08:56:19 +11:00 |
challenge.go
|
Rename AIK to AK everywhere
|
2019-10-09 08:56:19 +11:00 |
eventlog_fuzz.go
|
Fix linter errors, go fmt (#130)
|
2019-10-10 14:29:46 -07:00 |
eventlog_test.go
|
Parse TCG_PCClientPCREvent structures with an eventSize of 0 (#212)
|
2021-04-14 13:59:06 -07:00 |
eventlog_workarounds.go
|
Fix broken build from intersection of two PRs (#155)
|
2020-04-16 11:42:48 -07:00 |
eventlog.go
|
Parse TCG_PCClientPCREvent structures with an eventSize of 0 (#212)
|
2021-04-14 13:59:06 -07:00 |
example_test.go
|
Fix linter errors, go fmt (#130)
|
2019-10-10 14:29:46 -07:00 |
key_linux.go
|
Add AK.Certify() and use CertifyEx() for certification (#210)
|
2021-04-23 14:41:30 -07:00 |
key_windows.go
|
Handle to interface{} in *windowsKey12.certify() (#214)
|
2021-04-23 16:13:10 -07:00 |
pcp_windows.go
|
Deepikarajani24 patch 1 (#193)
|
2020-12-02 11:09:22 -08:00 |
secureboot_test.go
|
WIP processing image load events (#216)
|
2021-05-10 12:11:58 -07:00 |
secureboot.go
|
WIP processing image load events (#216)
|
2021-05-10 12:11:58 -07:00 |
storage.go
|
Refactor part 1: Refactor logic for keys into structs for each TPM/platform invariant. (#53)
|
2019-07-19 13:05:18 -07:00 |
tpm12_linux.go
|
Support for application signing keys (#201)
|
2021-03-08 12:27:00 -08:00 |
tpm_fake.go
|
Add InjectSimulatedTPMForTest function for testing (#187)
|
2020-11-19 07:43:19 +01:00 |
tpm_linux.go
|
Add InjectSimulatedTPMForTest function for testing (#187)
|
2020-11-19 07:43:19 +01:00 |
tpm_other.go
|
Refactor *platformTPM -> tpmBase interface (#160)
|
2020-05-05 14:56:40 -07:00 |
tpm_test.go
|
attest: re-work EK API (#79)
|
2019-08-21 10:26:55 -07:00 |
tpm_windows.go
|
Support for application signing keys (#201)
|
2021-03-08 12:27:00 -08:00 |
tpm.go
|
Support RSA application keys (#218)
|
2021-05-20 11:15:09 -07:00 |
vendors.go
|
Update vendors list (#57)
|
2019-08-06 16:47:13 -07:00 |
win_events_test.go
|
win_events: Determine if the WBCL was for a cold boot (as opposed to a resume from hibernation) (#209)
|
2021-04-07 16:08:29 -07:00 |
win_events.go
|
win_events: Determine if the WBCL was for a cold boot (as opposed to a resume from hibernation) (#209)
|
2021-04-07 16:08:29 -07:00 |
wrapped_tpm20.go
|
Validate the RSA-PSS salt length argument. (#219)
|
2021-05-21 15:28:56 -07:00 |