github.com/cloudwan/edgelq-sdk@v1.15.4/iam/client/v1/attestation/attestation_custom.pb.go (about) 1 // Code generated by protoc-gen-goten-go 2 // File: edgelq/iam/proto/v1/attestation_custom.proto 3 // DO NOT EDIT!!! 4 5 package attestation_client 6 7 import ( 8 "fmt" 9 "reflect" 10 "sync" 11 12 "google.golang.org/protobuf/encoding/protojson" 13 "google.golang.org/protobuf/proto" 14 preflect "google.golang.org/protobuf/reflect/protoreflect" 15 "google.golang.org/protobuf/runtime/protoimpl" 16 ) 17 18 // proto imports 19 import ( 20 attestation_domain "github.com/cloudwan/edgelq-sdk/iam/resources/v1/attestation_domain" 21 iam_common "github.com/cloudwan/edgelq-sdk/iam/resources/v1/common" 22 project "github.com/cloudwan/edgelq-sdk/iam/resources/v1/project" 23 ) 24 25 // Reference imports to suppress errors if they are not otherwise used. 26 var ( 27 _ = fmt.Errorf 28 _ = reflect.Method{} 29 _ = sync.Once{} 30 31 _ = protojson.MarshalOptions{} 32 _ = proto.MarshalOptions{} 33 _ = preflect.Value{} 34 _ = protoimpl.DescBuilder{} 35 ) 36 37 // make sure we're using proto imports 38 var ( 39 _ = &attestation_domain.AttestationDomain{} 40 _ = &iam_common.PCR{} 41 _ = &project.Project{} 42 ) 43 44 const ( 45 // Verify that this generated code is sufficiently up-to-date. 46 _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) 47 // Verify that runtime/protoimpl is sufficiently up-to-date. 48 _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) 49 ) 50 51 type VerifyRequest_AskForChallenge_ChallengeFormat int32 52 53 const ( 54 // Credential Protection as defined in section 24 of the TPM specification 55 // revision 2 part 1 See: 56 // https://trustedcomputinggroup.org/resource/tpm-library-specification/ 57 // Returned primitives are of type TPM2B_ID_OBJECT and 58 // TPM2B_ENCRYPTED_SECRET. 59 // NOTE: ECC is not supported. 60 // 61 // Reference implementation: 62 // github.com/google/go-attestation@v0.3.2/attest/activation.go:generateChallengeTPM20, 63 // which uses 64 // github.com/google/go-tmp@v0.3.2/tmp2/credactivation/credential_activation.go:Generate 65 VerifyRequest_AskForChallenge_TPM20_CREDENTIAL VerifyRequest_AskForChallenge_ChallengeFormat = 0 66 // Challenge as defined in section 15.1 of the TPM 1.2 commands spec 67 // See: 68 // https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-3-Commands_v1.2_rev116_01032011.pdf 69 // Returned primitives are of type TPM12_EKBLOB (with 70 // TPM_EK_BLOB_ACTIVATE) and bytes. 71 // 72 // Reference implementation: 73 // github.com/google/go-attestation@v0.3.2/attest/activation.go:generateChallengeTPM12, 74 // which uses 75 // github.com/google/go-attestation@v0.3.2/attest/challenge.go:generateChallenge12 76 VerifyRequest_AskForChallenge_TPM12_EKBLOB VerifyRequest_AskForChallenge_ChallengeFormat = 1 77 // TSPI_EKBLOB is a TPM1.2 challenge format accepted by TrouSerS daemon's 78 // Tspi_TPM_ActivateIdentity function. As far as I can tell, it's not 79 // documented except in the code. Returned primitives are of type 80 // TPM12_EKBLOB (with TPM_EK_BLOB_ACTIVATE) and bytes. 81 // 82 // Reference implementation: 83 // github.com/google/go-attestation@v0.3.2/attest/activation.go:generateChallengeTPM12, 84 // which uses 85 // github.com/google/go-tspi@v0.3.0/verification/verification.go:GenerateChallengeEx 86 VerifyRequest_AskForChallenge_TSPI_EKBLOB VerifyRequest_AskForChallenge_ChallengeFormat = 2 87 ) 88 89 var ( 90 VerifyRequest_AskForChallenge_ChallengeFormat_name = map[int32]string{ 91 0: "TPM20_CREDENTIAL", 92 1: "TPM12_EKBLOB", 93 2: "TSPI_EKBLOB", 94 } 95 96 VerifyRequest_AskForChallenge_ChallengeFormat_value = map[string]int32{ 97 "TPM20_CREDENTIAL": 0, 98 "TPM12_EKBLOB": 1, 99 "TSPI_EKBLOB": 2, 100 } 101 ) 102 103 func (x VerifyRequest_AskForChallenge_ChallengeFormat) Enum() *VerifyRequest_AskForChallenge_ChallengeFormat { 104 p := new(VerifyRequest_AskForChallenge_ChallengeFormat) 105 *p = x 106 return p 107 } 108 109 func (x VerifyRequest_AskForChallenge_ChallengeFormat) String() string { 110 return protoimpl.X.EnumStringOf(x.Descriptor(), preflect.EnumNumber(x)) 111 } 112 113 func (VerifyRequest_AskForChallenge_ChallengeFormat) Descriptor() preflect.EnumDescriptor { 114 return edgelq_iam_proto_v1_attestation_custom_proto_enumTypes[0].Descriptor() 115 } 116 117 func (VerifyRequest_AskForChallenge_ChallengeFormat) Type() preflect.EnumType { 118 return &edgelq_iam_proto_v1_attestation_custom_proto_enumTypes[0] 119 } 120 121 func (x VerifyRequest_AskForChallenge_ChallengeFormat) Number() preflect.EnumNumber { 122 return preflect.EnumNumber(x) 123 } 124 125 // Deprecated, Use VerifyRequest_AskForChallenge_ChallengeFormat.ProtoReflect.Descriptor instead. 126 func (VerifyRequest_AskForChallenge_ChallengeFormat) EnumDescriptor() ([]byte, []int) { 127 return edgelq_iam_proto_v1_attestation_custom_proto_rawDescGZIP(), []int{0, 0, 0} 128 } 129 130 // Request message for method [Verify][ntt.iam.v1.Verify] 131 type VerifyRequest struct { 132 state protoimpl.MessageState 133 sizeCache protoimpl.SizeCache 134 unknownFields protoimpl.UnknownFields 135 // Types that are valid to be assigned to Msg: 136 // *VerifyRequest_AskForChallenge_ 137 // *VerifyRequest_ChallengeResponse_ 138 Msg isVerifyRequest_Msg `protobuf_oneof:"msg"` 139 } 140 141 func (m *VerifyRequest) Reset() { 142 *m = VerifyRequest{} 143 if protoimpl.UnsafeEnabled { 144 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[0] 145 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 146 ms.StoreMessageInfo(mi) 147 } 148 } 149 150 func (m *VerifyRequest) String() string { 151 return protoimpl.X.MessageStringOf(m) 152 } 153 154 func (*VerifyRequest) ProtoMessage() {} 155 156 func (m *VerifyRequest) ProtoReflect() preflect.Message { 157 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[0] 158 if protoimpl.UnsafeEnabled && m != nil { 159 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 160 if ms.LoadMessageInfo() == nil { 161 ms.StoreMessageInfo(mi) 162 } 163 return ms 164 } 165 return mi.MessageOf(m) 166 } 167 168 func (*VerifyRequest) GotenMessage() {} 169 170 // Deprecated, Use VerifyRequest.ProtoReflect.Descriptor instead. 171 func (*VerifyRequest) Descriptor() ([]byte, []int) { 172 return edgelq_iam_proto_v1_attestation_custom_proto_rawDescGZIP(), []int{0} 173 } 174 175 func (m *VerifyRequest) Unmarshal(b []byte) error { 176 return proto.Unmarshal(b, m) 177 } 178 179 func (m *VerifyRequest) Marshal() ([]byte, error) { 180 return proto.Marshal(m) 181 } 182 183 func (m *VerifyRequest) MarshalJSON() ([]byte, error) { 184 return protojson.MarshalOptions{}.Marshal(m) 185 } 186 187 func (m *VerifyRequest) UnmarshalJSON(data []byte) error { 188 return protojson.Unmarshal(data, m) 189 } 190 191 type isVerifyRequest_Msg interface { 192 isVerifyRequest_Msg() 193 } 194 195 type VerifyRequest_AskForChallenge_ struct { 196 AskForChallenge *VerifyRequest_AskForChallenge `protobuf:"bytes,1,opt,name=ask_for_challenge,json=askForChallenge,proto3,oneof"` 197 } 198 type VerifyRequest_ChallengeResponse_ struct { 199 ChallengeResponse *VerifyRequest_ChallengeResponse `protobuf:"bytes,2,opt,name=challenge_response,json=challengeResponse,proto3,oneof"` 200 } 201 202 func (*VerifyRequest_AskForChallenge_) isVerifyRequest_Msg() {} 203 func (*VerifyRequest_ChallengeResponse_) isVerifyRequest_Msg() {} 204 func (m *VerifyRequest) GetMsg() isVerifyRequest_Msg { 205 if m != nil { 206 return m.Msg 207 } 208 return nil 209 } 210 func (m *VerifyRequest) GetAskForChallenge() *VerifyRequest_AskForChallenge { 211 if x, ok := m.GetMsg().(*VerifyRequest_AskForChallenge_); ok { 212 return x.AskForChallenge 213 } 214 return nil 215 } 216 func (m *VerifyRequest) GetChallengeResponse() *VerifyRequest_ChallengeResponse { 217 if x, ok := m.GetMsg().(*VerifyRequest_ChallengeResponse_); ok { 218 return x.ChallengeResponse 219 } 220 return nil 221 } 222 func (m *VerifyRequest) SetMsg(ofv isVerifyRequest_Msg) { 223 if m == nil { 224 panic(fmt.Errorf("can't set %s on nil %s", "isVerifyRequest_Msg", "VerifyRequest")) 225 } 226 m.Msg = ofv 227 } 228 func (m *VerifyRequest) SetAskForChallenge(fv *VerifyRequest_AskForChallenge) { 229 m.SetMsg(&VerifyRequest_AskForChallenge_{AskForChallenge: fv}) 230 } 231 func (m *VerifyRequest) SetChallengeResponse(fv *VerifyRequest_ChallengeResponse) { 232 m.SetMsg(&VerifyRequest_ChallengeResponse_{ChallengeResponse: fv}) 233 } 234 235 // Response message for method [Verify][ntt.iam.v1.Verify] 236 type VerifyResponse struct { 237 state protoimpl.MessageState 238 sizeCache protoimpl.SizeCache 239 unknownFields protoimpl.UnknownFields 240 // Types that are valid to be assigned to Msg: 241 // *VerifyResponse_Challenge_ 242 // *VerifyResponse_AttestationSuccessful_ 243 Msg isVerifyResponse_Msg `protobuf_oneof:"msg"` 244 } 245 246 func (m *VerifyResponse) Reset() { 247 *m = VerifyResponse{} 248 if protoimpl.UnsafeEnabled { 249 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[1] 250 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 251 ms.StoreMessageInfo(mi) 252 } 253 } 254 255 func (m *VerifyResponse) String() string { 256 return protoimpl.X.MessageStringOf(m) 257 } 258 259 func (*VerifyResponse) ProtoMessage() {} 260 261 func (m *VerifyResponse) ProtoReflect() preflect.Message { 262 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[1] 263 if protoimpl.UnsafeEnabled && m != nil { 264 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 265 if ms.LoadMessageInfo() == nil { 266 ms.StoreMessageInfo(mi) 267 } 268 return ms 269 } 270 return mi.MessageOf(m) 271 } 272 273 func (*VerifyResponse) GotenMessage() {} 274 275 // Deprecated, Use VerifyResponse.ProtoReflect.Descriptor instead. 276 func (*VerifyResponse) Descriptor() ([]byte, []int) { 277 return edgelq_iam_proto_v1_attestation_custom_proto_rawDescGZIP(), []int{1} 278 } 279 280 func (m *VerifyResponse) Unmarshal(b []byte) error { 281 return proto.Unmarshal(b, m) 282 } 283 284 func (m *VerifyResponse) Marshal() ([]byte, error) { 285 return proto.Marshal(m) 286 } 287 288 func (m *VerifyResponse) MarshalJSON() ([]byte, error) { 289 return protojson.MarshalOptions{}.Marshal(m) 290 } 291 292 func (m *VerifyResponse) UnmarshalJSON(data []byte) error { 293 return protojson.Unmarshal(data, m) 294 } 295 296 type isVerifyResponse_Msg interface { 297 isVerifyResponse_Msg() 298 } 299 300 type VerifyResponse_Challenge_ struct { 301 Challenge *VerifyResponse_Challenge `protobuf:"bytes,1,opt,name=challenge,proto3,oneof"` 302 } 303 type VerifyResponse_AttestationSuccessful_ struct { 304 AttestationSuccessful *VerifyResponse_AttestationSuccessful `protobuf:"bytes,2,opt,name=attestation_successful,json=attestationSuccessful,proto3,oneof"` 305 } 306 307 func (*VerifyResponse_Challenge_) isVerifyResponse_Msg() {} 308 func (*VerifyResponse_AttestationSuccessful_) isVerifyResponse_Msg() {} 309 func (m *VerifyResponse) GetMsg() isVerifyResponse_Msg { 310 if m != nil { 311 return m.Msg 312 } 313 return nil 314 } 315 func (m *VerifyResponse) GetChallenge() *VerifyResponse_Challenge { 316 if x, ok := m.GetMsg().(*VerifyResponse_Challenge_); ok { 317 return x.Challenge 318 } 319 return nil 320 } 321 func (m *VerifyResponse) GetAttestationSuccessful() *VerifyResponse_AttestationSuccessful { 322 if x, ok := m.GetMsg().(*VerifyResponse_AttestationSuccessful_); ok { 323 return x.AttestationSuccessful 324 } 325 return nil 326 } 327 func (m *VerifyResponse) SetMsg(ofv isVerifyResponse_Msg) { 328 if m == nil { 329 panic(fmt.Errorf("can't set %s on nil %s", "isVerifyResponse_Msg", "VerifyResponse")) 330 } 331 m.Msg = ofv 332 } 333 func (m *VerifyResponse) SetChallenge(fv *VerifyResponse_Challenge) { 334 m.SetMsg(&VerifyResponse_Challenge_{Challenge: fv}) 335 } 336 func (m *VerifyResponse) SetAttestationSuccessful(fv *VerifyResponse_AttestationSuccessful) { 337 m.SetMsg(&VerifyResponse_AttestationSuccessful_{AttestationSuccessful: fv}) 338 } 339 340 type VerifyRequest_AskForChallenge struct { 341 state protoimpl.MessageState 342 sizeCache protoimpl.SizeCache 343 unknownFields protoimpl.UnknownFields 344 // This will be used to set "sub" claim for attestation token. 345 // This "sub" should be compared to "sub" of JWT access token during 346 // validation. "Sub" comparison ties both tokens together and protects 347 // against theft/reuse of one of them by another service account. 348 Subject string `protobuf:"bytes,1,opt,name=subject,proto3" json:"subject,omitempty"` 349 // attestation domain ref 350 AttestationDomain *attestation_domain.Name `protobuf:"bytes,2,opt,customtype=Name,name=attestation_domain,json=attestationDomain,proto3" json:"attestation_domain,omitempty"` 351 TpmVersion iam_common.TpmVersion `protobuf:"varint,3,opt,name=tpm_version,json=tpmVersion,proto3,enum=ntt.iam.v1.TpmVersion" json:"tpm_version,omitempty"` 352 // PKIX encoded EK public 353 Ekpub []byte `protobuf:"bytes,4,opt,name=ekpub,proto3" json:"ekpub,omitempty"` 354 // ASN.1 DER encoded EK certificate. 355 Ekcert []byte `protobuf:"bytes,5,opt,name=ekcert,proto3" json:"ekcert,omitempty"` 356 // For Intel TPMs, Intel hosts certificates at a public URL derived from the 357 // Public key. Clients or servers can perform an HTTP GET to this URL, and 358 // use ParseEKCertificate on the response body. 359 Ekcerturl string `protobuf:"bytes,6,opt,name=ekcerturl,proto3" json:"ekcerturl,omitempty"` 360 // https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf 361 // https://www.trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-2-Structures-01.38.pdf 362 // TPMT_PUBLIC (TPM 2.0) or TPM_PUBKEY (TPM 1.2) 363 Akpub []byte `protobuf:"bytes,7,opt,name=akpub,proto3" json:"akpub,omitempty"` 364 // TPMS_CREATION_DATA 365 CreationData []byte `protobuf:"bytes,8,opt,name=creation_data,json=creationData,proto3" json:"creation_data,omitempty"` 366 // TPMS_ATTEST 367 Attest []byte `protobuf:"bytes,9,opt,name=attest,proto3" json:"attest,omitempty"` 368 // TPMT_SIGNATURE 369 Signature []byte `protobuf:"bytes,10,opt,name=signature,proto3" json:"signature,omitempty"` 370 // ChallengeFormat defines the method of generating identity activation 371 // challenge by the Verifier (server). It should affect the interpretation 372 // ChallengeResponse fields cred_encrypted_by_ekpub and 373 // secret_encrypted_by_cred. Attestor (client) is responsible for chosing 374 // the right format depending on TPM version and the presence of TrouSerS 375 // daemon. 376 ChallengeFormat VerifyRequest_AskForChallenge_ChallengeFormat `protobuf:"varint,11,opt,name=challenge_format,json=challengeFormat,proto3,enum=ntt.iam.v1.VerifyRequest_AskForChallenge_ChallengeFormat" json:"challenge_format,omitempty"` 377 } 378 379 func (m *VerifyRequest_AskForChallenge) Reset() { 380 *m = VerifyRequest_AskForChallenge{} 381 if protoimpl.UnsafeEnabled { 382 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[2] 383 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 384 ms.StoreMessageInfo(mi) 385 } 386 } 387 388 func (m *VerifyRequest_AskForChallenge) String() string { 389 return protoimpl.X.MessageStringOf(m) 390 } 391 392 func (*VerifyRequest_AskForChallenge) ProtoMessage() {} 393 394 func (m *VerifyRequest_AskForChallenge) ProtoReflect() preflect.Message { 395 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[2] 396 if protoimpl.UnsafeEnabled && m != nil { 397 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 398 if ms.LoadMessageInfo() == nil { 399 ms.StoreMessageInfo(mi) 400 } 401 return ms 402 } 403 return mi.MessageOf(m) 404 } 405 406 func (*VerifyRequest_AskForChallenge) GotenMessage() {} 407 408 // Deprecated, Use VerifyRequest_AskForChallenge.ProtoReflect.Descriptor instead. 409 func (*VerifyRequest_AskForChallenge) Descriptor() ([]byte, []int) { 410 return edgelq_iam_proto_v1_attestation_custom_proto_rawDescGZIP(), []int{0, 0} 411 } 412 413 func (m *VerifyRequest_AskForChallenge) Unmarshal(b []byte) error { 414 return proto.Unmarshal(b, m) 415 } 416 417 func (m *VerifyRequest_AskForChallenge) Marshal() ([]byte, error) { 418 return proto.Marshal(m) 419 } 420 421 func (m *VerifyRequest_AskForChallenge) MarshalJSON() ([]byte, error) { 422 return protojson.MarshalOptions{}.Marshal(m) 423 } 424 425 func (m *VerifyRequest_AskForChallenge) UnmarshalJSON(data []byte) error { 426 return protojson.Unmarshal(data, m) 427 } 428 429 func (m *VerifyRequest_AskForChallenge) GetSubject() string { 430 if m != nil { 431 return m.Subject 432 } 433 return "" 434 } 435 436 func (m *VerifyRequest_AskForChallenge) GetAttestationDomain() *attestation_domain.Name { 437 if m != nil { 438 return m.AttestationDomain 439 } 440 return nil 441 } 442 443 func (m *VerifyRequest_AskForChallenge) GetTpmVersion() iam_common.TpmVersion { 444 if m != nil { 445 return m.TpmVersion 446 } 447 return iam_common.TpmVersion_TPMVAGNOSTIC 448 } 449 450 func (m *VerifyRequest_AskForChallenge) GetEkpub() []byte { 451 if m != nil { 452 return m.Ekpub 453 } 454 return nil 455 } 456 457 func (m *VerifyRequest_AskForChallenge) GetEkcert() []byte { 458 if m != nil { 459 return m.Ekcert 460 } 461 return nil 462 } 463 464 func (m *VerifyRequest_AskForChallenge) GetEkcerturl() string { 465 if m != nil { 466 return m.Ekcerturl 467 } 468 return "" 469 } 470 471 func (m *VerifyRequest_AskForChallenge) GetAkpub() []byte { 472 if m != nil { 473 return m.Akpub 474 } 475 return nil 476 } 477 478 func (m *VerifyRequest_AskForChallenge) GetCreationData() []byte { 479 if m != nil { 480 return m.CreationData 481 } 482 return nil 483 } 484 485 func (m *VerifyRequest_AskForChallenge) GetAttest() []byte { 486 if m != nil { 487 return m.Attest 488 } 489 return nil 490 } 491 492 func (m *VerifyRequest_AskForChallenge) GetSignature() []byte { 493 if m != nil { 494 return m.Signature 495 } 496 return nil 497 } 498 499 func (m *VerifyRequest_AskForChallenge) GetChallengeFormat() VerifyRequest_AskForChallenge_ChallengeFormat { 500 if m != nil { 501 return m.ChallengeFormat 502 } 503 return VerifyRequest_AskForChallenge_TPM20_CREDENTIAL 504 } 505 506 func (m *VerifyRequest_AskForChallenge) SetSubject(fv string) { 507 if m == nil { 508 panic(fmt.Errorf("can't set %s on nil %s", "Subject", "VerifyRequest_AskForChallenge")) 509 } 510 m.Subject = fv 511 } 512 513 func (m *VerifyRequest_AskForChallenge) SetAttestationDomain(fv *attestation_domain.Name) { 514 if m == nil { 515 panic(fmt.Errorf("can't set %s on nil %s", "AttestationDomain", "VerifyRequest_AskForChallenge")) 516 } 517 m.AttestationDomain = fv 518 } 519 520 func (m *VerifyRequest_AskForChallenge) SetTpmVersion(fv iam_common.TpmVersion) { 521 if m == nil { 522 panic(fmt.Errorf("can't set %s on nil %s", "TpmVersion", "VerifyRequest_AskForChallenge")) 523 } 524 m.TpmVersion = fv 525 } 526 527 func (m *VerifyRequest_AskForChallenge) SetEkpub(fv []byte) { 528 if m == nil { 529 panic(fmt.Errorf("can't set %s on nil %s", "Ekpub", "VerifyRequest_AskForChallenge")) 530 } 531 m.Ekpub = fv 532 } 533 534 func (m *VerifyRequest_AskForChallenge) SetEkcert(fv []byte) { 535 if m == nil { 536 panic(fmt.Errorf("can't set %s on nil %s", "Ekcert", "VerifyRequest_AskForChallenge")) 537 } 538 m.Ekcert = fv 539 } 540 541 func (m *VerifyRequest_AskForChallenge) SetEkcerturl(fv string) { 542 if m == nil { 543 panic(fmt.Errorf("can't set %s on nil %s", "Ekcerturl", "VerifyRequest_AskForChallenge")) 544 } 545 m.Ekcerturl = fv 546 } 547 548 func (m *VerifyRequest_AskForChallenge) SetAkpub(fv []byte) { 549 if m == nil { 550 panic(fmt.Errorf("can't set %s on nil %s", "Akpub", "VerifyRequest_AskForChallenge")) 551 } 552 m.Akpub = fv 553 } 554 555 func (m *VerifyRequest_AskForChallenge) SetCreationData(fv []byte) { 556 if m == nil { 557 panic(fmt.Errorf("can't set %s on nil %s", "CreationData", "VerifyRequest_AskForChallenge")) 558 } 559 m.CreationData = fv 560 } 561 562 func (m *VerifyRequest_AskForChallenge) SetAttest(fv []byte) { 563 if m == nil { 564 panic(fmt.Errorf("can't set %s on nil %s", "Attest", "VerifyRequest_AskForChallenge")) 565 } 566 m.Attest = fv 567 } 568 569 func (m *VerifyRequest_AskForChallenge) SetSignature(fv []byte) { 570 if m == nil { 571 panic(fmt.Errorf("can't set %s on nil %s", "Signature", "VerifyRequest_AskForChallenge")) 572 } 573 m.Signature = fv 574 } 575 576 func (m *VerifyRequest_AskForChallenge) SetChallengeFormat(fv VerifyRequest_AskForChallenge_ChallengeFormat) { 577 if m == nil { 578 panic(fmt.Errorf("can't set %s on nil %s", "ChallengeFormat", "VerifyRequest_AskForChallenge")) 579 } 580 m.ChallengeFormat = fv 581 } 582 583 type VerifyRequest_ChallengeResponse struct { 584 state protoimpl.MessageState 585 sizeCache protoimpl.SizeCache 586 unknownFields protoimpl.UnknownFields 587 AkActivationDecryptedSecret []byte `protobuf:"bytes,1,opt,name=ak_activation_decrypted_secret,json=akActivationDecryptedSecret,proto3" json:"ak_activation_decrypted_secret,omitempty"` 588 Quotes []*VerifyRequest_ChallengeResponse_Quote `protobuf:"bytes,2,rep,name=quotes,proto3" json:"quotes,omitempty"` 589 Pcrs []*iam_common.PCR `protobuf:"bytes,3,rep,name=pcrs,proto3" json:"pcrs,omitempty"` 590 // Binary contents of /sys/kernel/security/tpm0/binary_bios_measurements 591 Eventlog []byte `protobuf:"bytes,4,opt,name=eventlog,proto3" json:"eventlog,omitempty"` 592 } 593 594 func (m *VerifyRequest_ChallengeResponse) Reset() { 595 *m = VerifyRequest_ChallengeResponse{} 596 if protoimpl.UnsafeEnabled { 597 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[3] 598 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 599 ms.StoreMessageInfo(mi) 600 } 601 } 602 603 func (m *VerifyRequest_ChallengeResponse) String() string { 604 return protoimpl.X.MessageStringOf(m) 605 } 606 607 func (*VerifyRequest_ChallengeResponse) ProtoMessage() {} 608 609 func (m *VerifyRequest_ChallengeResponse) ProtoReflect() preflect.Message { 610 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[3] 611 if protoimpl.UnsafeEnabled && m != nil { 612 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 613 if ms.LoadMessageInfo() == nil { 614 ms.StoreMessageInfo(mi) 615 } 616 return ms 617 } 618 return mi.MessageOf(m) 619 } 620 621 func (*VerifyRequest_ChallengeResponse) GotenMessage() {} 622 623 // Deprecated, Use VerifyRequest_ChallengeResponse.ProtoReflect.Descriptor instead. 624 func (*VerifyRequest_ChallengeResponse) Descriptor() ([]byte, []int) { 625 return edgelq_iam_proto_v1_attestation_custom_proto_rawDescGZIP(), []int{0, 1} 626 } 627 628 func (m *VerifyRequest_ChallengeResponse) Unmarshal(b []byte) error { 629 return proto.Unmarshal(b, m) 630 } 631 632 func (m *VerifyRequest_ChallengeResponse) Marshal() ([]byte, error) { 633 return proto.Marshal(m) 634 } 635 636 func (m *VerifyRequest_ChallengeResponse) MarshalJSON() ([]byte, error) { 637 return protojson.MarshalOptions{}.Marshal(m) 638 } 639 640 func (m *VerifyRequest_ChallengeResponse) UnmarshalJSON(data []byte) error { 641 return protojson.Unmarshal(data, m) 642 } 643 644 func (m *VerifyRequest_ChallengeResponse) GetAkActivationDecryptedSecret() []byte { 645 if m != nil { 646 return m.AkActivationDecryptedSecret 647 } 648 return nil 649 } 650 651 func (m *VerifyRequest_ChallengeResponse) GetQuotes() []*VerifyRequest_ChallengeResponse_Quote { 652 if m != nil { 653 return m.Quotes 654 } 655 return nil 656 } 657 658 func (m *VerifyRequest_ChallengeResponse) GetPcrs() []*iam_common.PCR { 659 if m != nil { 660 return m.Pcrs 661 } 662 return nil 663 } 664 665 func (m *VerifyRequest_ChallengeResponse) GetEventlog() []byte { 666 if m != nil { 667 return m.Eventlog 668 } 669 return nil 670 } 671 672 func (m *VerifyRequest_ChallengeResponse) SetAkActivationDecryptedSecret(fv []byte) { 673 if m == nil { 674 panic(fmt.Errorf("can't set %s on nil %s", "AkActivationDecryptedSecret", "VerifyRequest_ChallengeResponse")) 675 } 676 m.AkActivationDecryptedSecret = fv 677 } 678 679 func (m *VerifyRequest_ChallengeResponse) SetQuotes(fv []*VerifyRequest_ChallengeResponse_Quote) { 680 if m == nil { 681 panic(fmt.Errorf("can't set %s on nil %s", "Quotes", "VerifyRequest_ChallengeResponse")) 682 } 683 m.Quotes = fv 684 } 685 686 func (m *VerifyRequest_ChallengeResponse) SetPcrs(fv []*iam_common.PCR) { 687 if m == nil { 688 panic(fmt.Errorf("can't set %s on nil %s", "Pcrs", "VerifyRequest_ChallengeResponse")) 689 } 690 m.Pcrs = fv 691 } 692 693 func (m *VerifyRequest_ChallengeResponse) SetEventlog(fv []byte) { 694 if m == nil { 695 panic(fmt.Errorf("can't set %s on nil %s", "Eventlog", "VerifyRequest_ChallengeResponse")) 696 } 697 m.Eventlog = fv 698 } 699 700 type VerifyRequest_ChallengeResponse_Quote struct { 701 state protoimpl.MessageState 702 sizeCache protoimpl.SizeCache 703 unknownFields protoimpl.UnknownFields 704 // TPMS_ATTEST (TSS_VALIDATION.Data or TSS_VALIDATION.rgbData) 705 // This contains PCR selection information for which the signature was 706 // calculated and other required data, like nonce. 707 Quote []byte `protobuf:"bytes,1,opt,name=quote,proto3" json:"quote,omitempty"` 708 // TSS_VALIDATION.ValidationData or TSS_VALIDATION.rgbValidationData 709 Signature []byte `protobuf:"bytes,2,opt,name=signature,proto3" json:"signature,omitempty"` 710 } 711 712 func (m *VerifyRequest_ChallengeResponse_Quote) Reset() { 713 *m = VerifyRequest_ChallengeResponse_Quote{} 714 if protoimpl.UnsafeEnabled { 715 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[4] 716 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 717 ms.StoreMessageInfo(mi) 718 } 719 } 720 721 func (m *VerifyRequest_ChallengeResponse_Quote) String() string { 722 return protoimpl.X.MessageStringOf(m) 723 } 724 725 func (*VerifyRequest_ChallengeResponse_Quote) ProtoMessage() {} 726 727 func (m *VerifyRequest_ChallengeResponse_Quote) ProtoReflect() preflect.Message { 728 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[4] 729 if protoimpl.UnsafeEnabled && m != nil { 730 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 731 if ms.LoadMessageInfo() == nil { 732 ms.StoreMessageInfo(mi) 733 } 734 return ms 735 } 736 return mi.MessageOf(m) 737 } 738 739 func (*VerifyRequest_ChallengeResponse_Quote) GotenMessage() {} 740 741 // Deprecated, Use VerifyRequest_ChallengeResponse_Quote.ProtoReflect.Descriptor instead. 742 func (*VerifyRequest_ChallengeResponse_Quote) Descriptor() ([]byte, []int) { 743 return edgelq_iam_proto_v1_attestation_custom_proto_rawDescGZIP(), []int{0, 1, 0} 744 } 745 746 func (m *VerifyRequest_ChallengeResponse_Quote) Unmarshal(b []byte) error { 747 return proto.Unmarshal(b, m) 748 } 749 750 func (m *VerifyRequest_ChallengeResponse_Quote) Marshal() ([]byte, error) { 751 return proto.Marshal(m) 752 } 753 754 func (m *VerifyRequest_ChallengeResponse_Quote) MarshalJSON() ([]byte, error) { 755 return protojson.MarshalOptions{}.Marshal(m) 756 } 757 758 func (m *VerifyRequest_ChallengeResponse_Quote) UnmarshalJSON(data []byte) error { 759 return protojson.Unmarshal(data, m) 760 } 761 762 func (m *VerifyRequest_ChallengeResponse_Quote) GetQuote() []byte { 763 if m != nil { 764 return m.Quote 765 } 766 return nil 767 } 768 769 func (m *VerifyRequest_ChallengeResponse_Quote) GetSignature() []byte { 770 if m != nil { 771 return m.Signature 772 } 773 return nil 774 } 775 776 func (m *VerifyRequest_ChallengeResponse_Quote) SetQuote(fv []byte) { 777 if m == nil { 778 panic(fmt.Errorf("can't set %s on nil %s", "Quote", "VerifyRequest_ChallengeResponse_Quote")) 779 } 780 m.Quote = fv 781 } 782 783 func (m *VerifyRequest_ChallengeResponse_Quote) SetSignature(fv []byte) { 784 if m == nil { 785 panic(fmt.Errorf("can't set %s on nil %s", "Signature", "VerifyRequest_ChallengeResponse_Quote")) 786 } 787 m.Signature = fv 788 } 789 790 type VerifyResponse_Challenge struct { 791 state protoimpl.MessageState 792 sizeCache protoimpl.SizeCache 793 unknownFields protoimpl.UnknownFields 794 // Platform attestation 795 PlatformAttestationNonce []byte `protobuf:"bytes,1,opt,name=platform_attestation_nonce,json=platformAttestationNonce,proto3" json:"platform_attestation_nonce,omitempty"` 796 // AK Identity Activation 797 CredEncryptedByEkpub []byte `protobuf:"bytes,2,opt,name=cred_encrypted_by_ekpub,json=credEncryptedByEkpub,proto3" json:"cred_encrypted_by_ekpub,omitempty"` 798 SecretEncryptedByCred []byte `protobuf:"bytes,3,opt,name=secret_encrypted_by_cred,json=secretEncryptedByCred,proto3" json:"secret_encrypted_by_cred,omitempty"` 799 } 800 801 func (m *VerifyResponse_Challenge) Reset() { 802 *m = VerifyResponse_Challenge{} 803 if protoimpl.UnsafeEnabled { 804 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[5] 805 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 806 ms.StoreMessageInfo(mi) 807 } 808 } 809 810 func (m *VerifyResponse_Challenge) String() string { 811 return protoimpl.X.MessageStringOf(m) 812 } 813 814 func (*VerifyResponse_Challenge) ProtoMessage() {} 815 816 func (m *VerifyResponse_Challenge) ProtoReflect() preflect.Message { 817 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[5] 818 if protoimpl.UnsafeEnabled && m != nil { 819 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 820 if ms.LoadMessageInfo() == nil { 821 ms.StoreMessageInfo(mi) 822 } 823 return ms 824 } 825 return mi.MessageOf(m) 826 } 827 828 func (*VerifyResponse_Challenge) GotenMessage() {} 829 830 // Deprecated, Use VerifyResponse_Challenge.ProtoReflect.Descriptor instead. 831 func (*VerifyResponse_Challenge) Descriptor() ([]byte, []int) { 832 return edgelq_iam_proto_v1_attestation_custom_proto_rawDescGZIP(), []int{1, 0} 833 } 834 835 func (m *VerifyResponse_Challenge) Unmarshal(b []byte) error { 836 return proto.Unmarshal(b, m) 837 } 838 839 func (m *VerifyResponse_Challenge) Marshal() ([]byte, error) { 840 return proto.Marshal(m) 841 } 842 843 func (m *VerifyResponse_Challenge) MarshalJSON() ([]byte, error) { 844 return protojson.MarshalOptions{}.Marshal(m) 845 } 846 847 func (m *VerifyResponse_Challenge) UnmarshalJSON(data []byte) error { 848 return protojson.Unmarshal(data, m) 849 } 850 851 func (m *VerifyResponse_Challenge) GetPlatformAttestationNonce() []byte { 852 if m != nil { 853 return m.PlatformAttestationNonce 854 } 855 return nil 856 } 857 858 func (m *VerifyResponse_Challenge) GetCredEncryptedByEkpub() []byte { 859 if m != nil { 860 return m.CredEncryptedByEkpub 861 } 862 return nil 863 } 864 865 func (m *VerifyResponse_Challenge) GetSecretEncryptedByCred() []byte { 866 if m != nil { 867 return m.SecretEncryptedByCred 868 } 869 return nil 870 } 871 872 func (m *VerifyResponse_Challenge) SetPlatformAttestationNonce(fv []byte) { 873 if m == nil { 874 panic(fmt.Errorf("can't set %s on nil %s", "PlatformAttestationNonce", "VerifyResponse_Challenge")) 875 } 876 m.PlatformAttestationNonce = fv 877 } 878 879 func (m *VerifyResponse_Challenge) SetCredEncryptedByEkpub(fv []byte) { 880 if m == nil { 881 panic(fmt.Errorf("can't set %s on nil %s", "CredEncryptedByEkpub", "VerifyResponse_Challenge")) 882 } 883 m.CredEncryptedByEkpub = fv 884 } 885 886 func (m *VerifyResponse_Challenge) SetSecretEncryptedByCred(fv []byte) { 887 if m == nil { 888 panic(fmt.Errorf("can't set %s on nil %s", "SecretEncryptedByCred", "VerifyResponse_Challenge")) 889 } 890 m.SecretEncryptedByCred = fv 891 } 892 893 type VerifyResponse_AttestationSuccessful struct { 894 state protoimpl.MessageState 895 sizeCache protoimpl.SizeCache 896 unknownFields protoimpl.UnknownFields 897 AttestationToken string `protobuf:"bytes,1,opt,name=attestation_token,json=attestationToken,proto3" json:"attestation_token,omitempty"` 898 } 899 900 func (m *VerifyResponse_AttestationSuccessful) Reset() { 901 *m = VerifyResponse_AttestationSuccessful{} 902 if protoimpl.UnsafeEnabled { 903 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[6] 904 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 905 ms.StoreMessageInfo(mi) 906 } 907 } 908 909 func (m *VerifyResponse_AttestationSuccessful) String() string { 910 return protoimpl.X.MessageStringOf(m) 911 } 912 913 func (*VerifyResponse_AttestationSuccessful) ProtoMessage() {} 914 915 func (m *VerifyResponse_AttestationSuccessful) ProtoReflect() preflect.Message { 916 mi := &edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[6] 917 if protoimpl.UnsafeEnabled && m != nil { 918 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 919 if ms.LoadMessageInfo() == nil { 920 ms.StoreMessageInfo(mi) 921 } 922 return ms 923 } 924 return mi.MessageOf(m) 925 } 926 927 func (*VerifyResponse_AttestationSuccessful) GotenMessage() {} 928 929 // Deprecated, Use VerifyResponse_AttestationSuccessful.ProtoReflect.Descriptor instead. 930 func (*VerifyResponse_AttestationSuccessful) Descriptor() ([]byte, []int) { 931 return edgelq_iam_proto_v1_attestation_custom_proto_rawDescGZIP(), []int{1, 1} 932 } 933 934 func (m *VerifyResponse_AttestationSuccessful) Unmarshal(b []byte) error { 935 return proto.Unmarshal(b, m) 936 } 937 938 func (m *VerifyResponse_AttestationSuccessful) Marshal() ([]byte, error) { 939 return proto.Marshal(m) 940 } 941 942 func (m *VerifyResponse_AttestationSuccessful) MarshalJSON() ([]byte, error) { 943 return protojson.MarshalOptions{}.Marshal(m) 944 } 945 946 func (m *VerifyResponse_AttestationSuccessful) UnmarshalJSON(data []byte) error { 947 return protojson.Unmarshal(data, m) 948 } 949 950 func (m *VerifyResponse_AttestationSuccessful) GetAttestationToken() string { 951 if m != nil { 952 return m.AttestationToken 953 } 954 return "" 955 } 956 957 func (m *VerifyResponse_AttestationSuccessful) SetAttestationToken(fv string) { 958 if m == nil { 959 panic(fmt.Errorf("can't set %s on nil %s", "AttestationToken", "VerifyResponse_AttestationSuccessful")) 960 } 961 m.AttestationToken = fv 962 } 963 964 var edgelq_iam_proto_v1_attestation_custom_proto preflect.FileDescriptor 965 966 var edgelq_iam_proto_v1_attestation_custom_proto_rawDesc = []byte{ 967 0x0a, 0x2c, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x71, 0x2f, 0x69, 0x61, 0x6d, 0x2f, 0x70, 0x72, 0x6f, 968 0x74, 0x6f, 0x2f, 0x76, 0x31, 0x2f, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 969 0x6e, 0x5f, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x0a, 970 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x1a, 0x20, 0x67, 0x6f, 0x74, 0x65, 971 0x6e, 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x76, 0x61, 972 0x6c, 0x69, 0x64, 0x61, 0x74, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1d, 0x67, 0x6f, 973 0x74, 0x65, 0x6e, 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 974 0x67, 0x6f, 0x74, 0x65, 0x6e, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1f, 0x67, 0x6f, 0x74, 975 0x65, 0x6e, 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x73, 976 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x24, 0x67, 0x6f, 977 0x74, 0x65, 0x6e, 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 978 0x6d, 0x75, 0x6c, 0x74, 0x69, 0x5f, 0x72, 0x65, 0x67, 0x69, 0x6f, 0x6e, 0x2e, 0x70, 0x72, 0x6f, 979 0x74, 0x6f, 0x1a, 0x2c, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x71, 0x2f, 0x69, 0x61, 0x6d, 0x2f, 0x70, 980 0x72, 0x6f, 0x74, 0x6f, 0x2f, 0x76, 0x31, 0x2f, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 981 0x69, 0x6f, 0x6e, 0x5f, 0x64, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 982 0x1a, 0x33, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x71, 0x2f, 0x69, 0x61, 0x6d, 0x2f, 0x70, 0x72, 0x6f, 983 0x74, 0x6f, 0x2f, 0x76, 0x31, 0x2f, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 984 0x6e, 0x5f, 0x64, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x5f, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x2e, 985 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x20, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x71, 0x2f, 0x69, 0x61, 986 0x6d, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x2f, 0x76, 0x31, 0x2f, 0x63, 0x6f, 0x6d, 0x6d, 0x6f, 987 0x6e, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x22, 0x91, 0x08, 0x0a, 0x0d, 0x56, 0x65, 0x72, 0x69, 988 0x66, 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x57, 0x0a, 0x11, 0x61, 0x73, 0x6b, 989 0x5f, 0x66, 0x6f, 0x72, 0x5f, 0x63, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x18, 0x01, 990 0x20, 0x01, 0x28, 0x0b, 0x32, 0x29, 0x2e, 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 991 0x31, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x2e, 992 0x41, 0x73, 0x6b, 0x46, 0x6f, 0x72, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x48, 993 0x00, 0x52, 0x0f, 0x61, 0x73, 0x6b, 0x46, 0x6f, 0x72, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 994 0x67, 0x65, 0x12, 0x5c, 0x0a, 0x12, 0x63, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x5f, 995 0x72, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x2b, 996 0x2e, 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x2e, 0x56, 0x65, 0x72, 0x69, 997 0x66, 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x2e, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 998 0x6e, 0x67, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x48, 0x00, 0x52, 0x11, 0x63, 999 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 1000 0x1a, 0x9d, 0x04, 0x0a, 0x0f, 0x41, 0x73, 0x6b, 0x46, 0x6f, 0x72, 0x43, 0x68, 0x61, 0x6c, 0x6c, 1001 0x65, 0x6e, 0x67, 0x65, 0x12, 0x18, 0x0a, 0x07, 0x73, 0x75, 0x62, 0x6a, 0x65, 0x63, 0x74, 0x18, 1002 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x07, 0x73, 0x75, 0x62, 0x6a, 0x65, 0x63, 0x74, 0x12, 0x48, 1003 0x0a, 0x12, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x64, 0x6f, 1004 0x6d, 0x61, 0x69, 0x6e, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x42, 0x19, 0xb2, 0xda, 0x21, 0x15, 1005 0x0a, 0x13, 0x0a, 0x11, 0x41, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x44, 1006 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x52, 0x11, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 1007 0x6f, 0x6e, 0x44, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x12, 0x37, 0x0a, 0x0b, 0x74, 0x70, 0x6d, 0x5f, 1008 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x16, 0x2e, 1009 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x2e, 0x54, 0x70, 0x6d, 0x56, 0x65, 1010 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x52, 0x0a, 0x74, 0x70, 0x6d, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 1011 0x6e, 0x12, 0x14, 0x0a, 0x05, 0x65, 0x6b, 0x70, 0x75, 0x62, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0c, 1012 0x52, 0x05, 0x65, 0x6b, 0x70, 0x75, 0x62, 0x12, 0x16, 0x0a, 0x06, 0x65, 0x6b, 0x63, 0x65, 0x72, 1013 0x74, 0x18, 0x05, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x06, 0x65, 0x6b, 0x63, 0x65, 0x72, 0x74, 0x12, 1014 0x1c, 0x0a, 0x09, 0x65, 0x6b, 0x63, 0x65, 0x72, 0x74, 0x75, 0x72, 0x6c, 0x18, 0x06, 0x20, 0x01, 1015 0x28, 0x09, 0x52, 0x09, 0x65, 0x6b, 0x63, 0x65, 0x72, 0x74, 0x75, 0x72, 0x6c, 0x12, 0x14, 0x0a, 1016 0x05, 0x61, 0x6b, 0x70, 0x75, 0x62, 0x18, 0x07, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x05, 0x61, 0x6b, 1017 0x70, 0x75, 0x62, 0x12, 0x23, 0x0a, 0x0d, 0x63, 0x72, 0x65, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 1018 0x64, 0x61, 0x74, 0x61, 0x18, 0x08, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0c, 0x63, 0x72, 0x65, 0x61, 1019 0x74, 0x69, 0x6f, 0x6e, 0x44, 0x61, 0x74, 0x61, 0x12, 0x16, 0x0a, 0x06, 0x61, 0x74, 0x74, 0x65, 1020 0x73, 0x74, 0x18, 0x09, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x06, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 1021 0x12, 0x1c, 0x0a, 0x09, 0x73, 0x69, 0x67, 0x6e, 0x61, 0x74, 0x75, 0x72, 0x65, 0x18, 0x0a, 0x20, 1022 0x01, 0x28, 0x0c, 0x52, 0x09, 0x73, 0x69, 0x67, 0x6e, 0x61, 0x74, 0x75, 0x72, 0x65, 0x12, 0x64, 1023 0x0a, 0x10, 0x63, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x5f, 0x66, 0x6f, 0x72, 0x6d, 1024 0x61, 0x74, 0x18, 0x0b, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x39, 0x2e, 0x6e, 0x74, 0x74, 0x2e, 0x69, 1025 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 0x71, 0x75, 1026 0x65, 0x73, 0x74, 0x2e, 0x41, 0x73, 0x6b, 0x46, 0x6f, 0x72, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 1027 0x6e, 0x67, 0x65, 0x2e, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x46, 0x6f, 0x72, 1028 0x6d, 0x61, 0x74, 0x52, 0x0f, 0x63, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x46, 0x6f, 1029 0x72, 0x6d, 0x61, 0x74, 0x22, 0x4a, 0x0a, 0x0f, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 1030 0x65, 0x46, 0x6f, 0x72, 0x6d, 0x61, 0x74, 0x12, 0x14, 0x0a, 0x10, 0x54, 0x50, 0x4d, 0x32, 0x30, 1031 0x5f, 0x43, 0x52, 0x45, 0x44, 0x45, 0x4e, 0x54, 0x49, 0x41, 0x4c, 0x10, 0x00, 0x12, 0x10, 0x0a, 1032 0x0c, 0x54, 0x50, 0x4d, 0x31, 0x32, 0x5f, 0x45, 0x4b, 0x42, 0x4c, 0x4f, 0x42, 0x10, 0x01, 0x12, 1033 0x0f, 0x0a, 0x0b, 0x54, 0x53, 0x50, 0x49, 0x5f, 0x45, 0x4b, 0x42, 0x4c, 0x4f, 0x42, 0x10, 0x02, 1034 0x1a, 0xa1, 0x02, 0x0a, 0x11, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x52, 0x65, 1035 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x43, 0x0a, 0x1e, 0x61, 0x6b, 0x5f, 0x61, 0x63, 0x74, 1036 0x69, 0x76, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x64, 0x65, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 1037 0x64, 0x5f, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x1b, 1038 0x61, 0x6b, 0x41, 0x63, 0x74, 0x69, 0x76, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x44, 0x65, 0x63, 0x72, 1039 0x79, 0x70, 0x74, 0x65, 0x64, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x12, 0x49, 0x0a, 0x06, 0x71, 1040 0x75, 0x6f, 0x74, 0x65, 0x73, 0x18, 0x02, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x31, 0x2e, 0x6e, 0x74, 1041 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 1042 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x2e, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 1043 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x2e, 0x51, 0x75, 0x6f, 0x74, 0x65, 0x52, 0x06, 1044 0x71, 0x75, 0x6f, 0x74, 0x65, 0x73, 0x12, 0x23, 0x0a, 0x04, 0x70, 0x63, 0x72, 0x73, 0x18, 0x03, 1045 0x20, 0x03, 0x28, 0x0b, 0x32, 0x0f, 0x2e, 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 1046 0x31, 0x2e, 0x50, 0x43, 0x52, 0x52, 0x04, 0x70, 0x63, 0x72, 0x73, 0x12, 0x1a, 0x0a, 0x08, 0x65, 1047 0x76, 0x65, 0x6e, 0x74, 0x6c, 0x6f, 0x67, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x08, 0x65, 1048 0x76, 0x65, 0x6e, 0x74, 0x6c, 0x6f, 0x67, 0x1a, 0x3b, 0x0a, 0x05, 0x51, 0x75, 0x6f, 0x74, 0x65, 1049 0x12, 0x14, 0x0a, 0x05, 0x71, 0x75, 0x6f, 0x74, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 1050 0x05, 0x71, 0x75, 0x6f, 0x74, 0x65, 0x12, 0x1c, 0x0a, 0x09, 0x73, 0x69, 0x67, 0x6e, 0x61, 0x74, 1051 0x75, 0x72, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x73, 0x69, 0x67, 0x6e, 0x61, 1052 0x74, 0x75, 0x72, 0x65, 0x42, 0x05, 0x0a, 0x03, 0x6d, 0x73, 0x67, 0x22, 0xca, 0x03, 0x0a, 0x0e, 1053 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x44, 1054 0x0a, 0x09, 0x63, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 1055 0x0b, 0x32, 0x24, 0x2e, 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x2e, 0x56, 1056 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x2e, 0x43, 0x68, 1057 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x48, 0x00, 0x52, 0x09, 0x63, 0x68, 0x61, 0x6c, 0x6c, 1058 0x65, 0x6e, 0x67, 0x65, 0x12, 0x69, 0x0a, 0x16, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 1059 0x69, 0x6f, 0x6e, 0x5f, 0x73, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x66, 0x75, 0x6c, 0x18, 0x02, 1060 0x20, 0x01, 0x28, 0x0b, 0x32, 0x30, 0x2e, 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 1061 0x31, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 1062 0x2e, 0x41, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x75, 0x63, 0x63, 1063 0x65, 0x73, 0x73, 0x66, 0x75, 0x6c, 0x48, 0x00, 0x52, 0x15, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 1064 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x66, 0x75, 0x6c, 0x1a, 1065 0xb9, 0x01, 0x0a, 0x09, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x12, 0x3c, 0x0a, 1066 0x1a, 0x70, 0x6c, 0x61, 0x74, 0x66, 0x6f, 0x72, 0x6d, 0x5f, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 1067 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x6e, 0x6f, 0x6e, 0x63, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 1068 0x0c, 0x52, 0x18, 0x70, 0x6c, 0x61, 0x74, 0x66, 0x6f, 0x72, 0x6d, 0x41, 0x74, 0x74, 0x65, 0x73, 1069 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x4e, 0x6f, 0x6e, 0x63, 0x65, 0x12, 0x35, 0x0a, 0x17, 0x63, 1070 0x72, 0x65, 0x64, 0x5f, 0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x5f, 0x62, 0x79, 1071 0x5f, 0x65, 0x6b, 0x70, 0x75, 0x62, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x14, 0x63, 0x72, 1072 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x42, 0x79, 0x45, 0x6b, 0x70, 1073 0x75, 0x62, 0x12, 0x37, 0x0a, 0x18, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x5f, 0x65, 0x6e, 0x63, 1074 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x5f, 0x62, 0x79, 0x5f, 0x63, 0x72, 0x65, 0x64, 0x18, 0x03, 1075 0x20, 0x01, 0x28, 0x0c, 0x52, 0x15, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x45, 0x6e, 0x63, 0x72, 1076 0x79, 0x70, 0x74, 0x65, 0x64, 0x42, 0x79, 0x43, 0x72, 0x65, 0x64, 0x1a, 0x44, 0x0a, 0x15, 0x41, 1077 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x75, 0x63, 0x63, 0x65, 0x73, 1078 0x73, 0x66, 0x75, 0x6c, 0x12, 0x2b, 0x0a, 0x11, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 1079 0x69, 0x6f, 0x6e, 0x5f, 0x74, 0x6f, 0x6b, 0x65, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 1080 0x10, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x54, 0x6f, 0x6b, 0x65, 1081 0x6e, 0x42, 0x05, 0x0a, 0x03, 0x6d, 0x73, 0x67, 0x42, 0x7a, 0xe8, 0xde, 0x21, 0x00, 0x0a, 0x11, 1082 0x63, 0x6f, 0x6d, 0x2e, 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x70, 0x62, 0x2e, 0x76, 1083 0x31, 0x42, 0x16, 0x41, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x43, 0x75, 1084 0x73, 0x74, 0x6f, 0x6d, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x50, 0x00, 0x5a, 0x47, 0x67, 0x69, 0x74, 1085 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x77, 0x61, 0x6e, 1086 0x2f, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x71, 0x2f, 0x69, 0x61, 0x6d, 0x2f, 0x63, 0x6c, 0x69, 0x65, 1087 0x6e, 0x74, 0x2f, 0x76, 0x31, 0x2f, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 1088 0x6e, 0x3b, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x63, 0x6c, 1089 0x69, 0x65, 0x6e, 0x74, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33, 1090 } 1091 1092 var ( 1093 edgelq_iam_proto_v1_attestation_custom_proto_rawDescOnce sync.Once 1094 edgelq_iam_proto_v1_attestation_custom_proto_rawDescData = edgelq_iam_proto_v1_attestation_custom_proto_rawDesc 1095 ) 1096 1097 func edgelq_iam_proto_v1_attestation_custom_proto_rawDescGZIP() []byte { 1098 edgelq_iam_proto_v1_attestation_custom_proto_rawDescOnce.Do(func() { 1099 edgelq_iam_proto_v1_attestation_custom_proto_rawDescData = protoimpl.X.CompressGZIP(edgelq_iam_proto_v1_attestation_custom_proto_rawDescData) 1100 }) 1101 return edgelq_iam_proto_v1_attestation_custom_proto_rawDescData 1102 } 1103 1104 var edgelq_iam_proto_v1_attestation_custom_proto_enumTypes = make([]protoimpl.EnumInfo, 1) 1105 var edgelq_iam_proto_v1_attestation_custom_proto_msgTypes = make([]protoimpl.MessageInfo, 7) 1106 var edgelq_iam_proto_v1_attestation_custom_proto_goTypes = []interface{}{ 1107 (VerifyRequest_AskForChallenge_ChallengeFormat)(0), // 0: ntt.iam.v1.VerifyRequest_AskForChallenge_ChallengeFormat 1108 (*VerifyRequest)(nil), // 1: ntt.iam.v1.VerifyRequest 1109 (*VerifyResponse)(nil), // 2: ntt.iam.v1.VerifyResponse 1110 (*VerifyRequest_AskForChallenge)(nil), // 3: ntt.iam.v1.VerifyRequest.AskForChallenge 1111 (*VerifyRequest_ChallengeResponse)(nil), // 4: ntt.iam.v1.VerifyRequest.ChallengeResponse 1112 (*VerifyRequest_ChallengeResponse_Quote)(nil), // 5: ntt.iam.v1.VerifyRequest.ChallengeResponse.Quote 1113 (*VerifyResponse_Challenge)(nil), // 6: ntt.iam.v1.VerifyResponse.Challenge 1114 (*VerifyResponse_AttestationSuccessful)(nil), // 7: ntt.iam.v1.VerifyResponse.AttestationSuccessful 1115 (iam_common.TpmVersion)(0), // 8: ntt.iam.v1.TpmVersion 1116 (*iam_common.PCR)(nil), // 9: ntt.iam.v1.PCR 1117 } 1118 var edgelq_iam_proto_v1_attestation_custom_proto_depIdxs = []int32{ 1119 3, // 0: ntt.iam.v1.VerifyRequest.ask_for_challenge:type_name -> ntt.iam.v1.VerifyRequest.AskForChallenge 1120 4, // 1: ntt.iam.v1.VerifyRequest.challenge_response:type_name -> ntt.iam.v1.VerifyRequest.ChallengeResponse 1121 6, // 2: ntt.iam.v1.VerifyResponse.challenge:type_name -> ntt.iam.v1.VerifyResponse.Challenge 1122 7, // 3: ntt.iam.v1.VerifyResponse.attestation_successful:type_name -> ntt.iam.v1.VerifyResponse.AttestationSuccessful 1123 8, // 4: ntt.iam.v1.VerifyRequest.AskForChallenge.tpm_version:type_name -> ntt.iam.v1.TpmVersion 1124 0, // 5: ntt.iam.v1.VerifyRequest.AskForChallenge.challenge_format:type_name -> ntt.iam.v1.VerifyRequest_AskForChallenge_ChallengeFormat 1125 5, // 6: ntt.iam.v1.VerifyRequest.ChallengeResponse.quotes:type_name -> ntt.iam.v1.VerifyRequest.ChallengeResponse.Quote 1126 9, // 7: ntt.iam.v1.VerifyRequest.ChallengeResponse.pcrs:type_name -> ntt.iam.v1.PCR 1127 8, // [8:8] is the sub-list for method output_type 1128 8, // [8:8] is the sub-list for method input_type 1129 8, // [8:8] is the sub-list for extension type_name 1130 8, // [8:8] is the sub-list for extension extendee 1131 0, // [0:8] is the sub-list for field type_name 1132 } 1133 1134 func init() { edgelq_iam_proto_v1_attestation_custom_proto_init() } 1135 func edgelq_iam_proto_v1_attestation_custom_proto_init() { 1136 if edgelq_iam_proto_v1_attestation_custom_proto != nil { 1137 return 1138 } 1139 if !protoimpl.UnsafeEnabled { 1140 1141 edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { 1142 switch v := v.(*VerifyRequest); i { 1143 case 0: 1144 return &v.state 1145 case 1: 1146 return &v.sizeCache 1147 case 2: 1148 return &v.unknownFields 1149 default: 1150 return nil 1151 } 1152 } 1153 edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { 1154 switch v := v.(*VerifyResponse); i { 1155 case 0: 1156 return &v.state 1157 case 1: 1158 return &v.sizeCache 1159 case 2: 1160 return &v.unknownFields 1161 default: 1162 return nil 1163 } 1164 } 1165 edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { 1166 switch v := v.(*VerifyRequest_AskForChallenge); i { 1167 case 0: 1168 return &v.state 1169 case 1: 1170 return &v.sizeCache 1171 case 2: 1172 return &v.unknownFields 1173 default: 1174 return nil 1175 } 1176 } 1177 edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { 1178 switch v := v.(*VerifyRequest_ChallengeResponse); i { 1179 case 0: 1180 return &v.state 1181 case 1: 1182 return &v.sizeCache 1183 case 2: 1184 return &v.unknownFields 1185 default: 1186 return nil 1187 } 1188 } 1189 edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { 1190 switch v := v.(*VerifyRequest_ChallengeResponse_Quote); i { 1191 case 0: 1192 return &v.state 1193 case 1: 1194 return &v.sizeCache 1195 case 2: 1196 return &v.unknownFields 1197 default: 1198 return nil 1199 } 1200 } 1201 edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { 1202 switch v := v.(*VerifyResponse_Challenge); i { 1203 case 0: 1204 return &v.state 1205 case 1: 1206 return &v.sizeCache 1207 case 2: 1208 return &v.unknownFields 1209 default: 1210 return nil 1211 } 1212 } 1213 edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { 1214 switch v := v.(*VerifyResponse_AttestationSuccessful); i { 1215 case 0: 1216 return &v.state 1217 case 1: 1218 return &v.sizeCache 1219 case 2: 1220 return &v.unknownFields 1221 default: 1222 return nil 1223 } 1224 } 1225 } 1226 1227 edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[0].OneofWrappers = []interface{}{ 1228 (*VerifyRequest_AskForChallenge_)(nil), 1229 (*VerifyRequest_ChallengeResponse_)(nil), 1230 } 1231 edgelq_iam_proto_v1_attestation_custom_proto_msgTypes[1].OneofWrappers = []interface{}{ 1232 (*VerifyResponse_Challenge_)(nil), 1233 (*VerifyResponse_AttestationSuccessful_)(nil), 1234 } 1235 type x struct{} 1236 out := protoimpl.TypeBuilder{ 1237 File: protoimpl.DescBuilder{ 1238 GoPackagePath: reflect.TypeOf(x{}).PkgPath(), 1239 RawDescriptor: edgelq_iam_proto_v1_attestation_custom_proto_rawDesc, 1240 NumEnums: 1, 1241 NumMessages: 7, 1242 NumExtensions: 0, 1243 NumServices: 0, 1244 }, 1245 GoTypes: edgelq_iam_proto_v1_attestation_custom_proto_goTypes, 1246 DependencyIndexes: edgelq_iam_proto_v1_attestation_custom_proto_depIdxs, 1247 EnumInfos: edgelq_iam_proto_v1_attestation_custom_proto_enumTypes, 1248 MessageInfos: edgelq_iam_proto_v1_attestation_custom_proto_msgTypes, 1249 }.Build() 1250 edgelq_iam_proto_v1_attestation_custom_proto = out.File 1251 edgelq_iam_proto_v1_attestation_custom_proto_rawDesc = nil 1252 edgelq_iam_proto_v1_attestation_custom_proto_goTypes = nil 1253 edgelq_iam_proto_v1_attestation_custom_proto_depIdxs = nil 1254 }