github.com/cloudwan/edgelq-sdk@v1.15.4/iam/client/v1alpha2/attestation/attestation_custom.pb.go (about) 1 // Code generated by protoc-gen-goten-go 2 // File: edgelq/iam/proto/v1alpha2/attestation_custom.proto 3 // DO NOT EDIT!!! 4 5 package attestation_client 6 7 import ( 8 "fmt" 9 "reflect" 10 "sync" 11 12 "google.golang.org/protobuf/encoding/protojson" 13 "google.golang.org/protobuf/proto" 14 preflect "google.golang.org/protobuf/reflect/protoreflect" 15 "google.golang.org/protobuf/runtime/protoimpl" 16 ) 17 18 // proto imports 19 import ( 20 attestation_domain "github.com/cloudwan/edgelq-sdk/iam/resources/v1alpha2/attestation_domain" 21 iam_common "github.com/cloudwan/edgelq-sdk/iam/resources/v1alpha2/common" 22 project "github.com/cloudwan/edgelq-sdk/iam/resources/v1alpha2/project" 23 ) 24 25 // Reference imports to suppress errors if they are not otherwise used. 26 var ( 27 _ = fmt.Errorf 28 _ = reflect.Method{} 29 _ = sync.Once{} 30 31 _ = protojson.MarshalOptions{} 32 _ = proto.MarshalOptions{} 33 _ = preflect.Value{} 34 _ = protoimpl.DescBuilder{} 35 ) 36 37 // make sure we're using proto imports 38 var ( 39 _ = &attestation_domain.AttestationDomain{} 40 _ = &iam_common.PCR{} 41 _ = &project.Project{} 42 ) 43 44 const ( 45 // Verify that this generated code is sufficiently up-to-date. 46 _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) 47 // Verify that runtime/protoimpl is sufficiently up-to-date. 48 _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) 49 ) 50 51 type VerifyRequest_AskForChallenge_ChallengeFormat int32 52 53 const ( 54 // Credential Protection as defined in section 24 of the TPM specification 55 // revision 2 part 1 See: 56 // https://trustedcomputinggroup.org/resource/tpm-library-specification/ 57 // Returned primitives are of type TPM2B_ID_OBJECT and 58 // TPM2B_ENCRYPTED_SECRET. 59 // NOTE: ECC is not supported. 60 // 61 // Reference implementation: 62 // github.com/google/go-attestation@v0.3.2/attest/activation.go:generateChallengeTPM20, 63 // which uses 64 // github.com/google/go-tmp@v0.3.2/tmp2/credactivation/credential_activation.go:Generate 65 VerifyRequest_AskForChallenge_TPM20_CREDENTIAL VerifyRequest_AskForChallenge_ChallengeFormat = 0 66 // Challenge as defined in section 15.1 of the TPM 1.2 commands spec 67 // See: 68 // https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-3-Commands_v1.2_rev116_01032011.pdf 69 // Returned primitives are of type TPM12_EKBLOB (with 70 // TPM_EK_BLOB_ACTIVATE) and bytes. 71 // 72 // Reference implementation: 73 // github.com/google/go-attestation@v0.3.2/attest/activation.go:generateChallengeTPM12, 74 // which uses 75 // github.com/google/go-attestation@v0.3.2/attest/challenge.go:generateChallenge12 76 VerifyRequest_AskForChallenge_TPM12_EKBLOB VerifyRequest_AskForChallenge_ChallengeFormat = 1 77 // TSPI_EKBLOB is a TPM1.2 challenge format accepted by TrouSerS daemon's 78 // Tspi_TPM_ActivateIdentity function. As far as I can tell, it's not 79 // documented except in the code. Returned primitives are of type 80 // TPM12_EKBLOB (with TPM_EK_BLOB_ACTIVATE) and bytes. 81 // 82 // Reference implementation: 83 // github.com/google/go-attestation@v0.3.2/attest/activation.go:generateChallengeTPM12, 84 // which uses 85 // github.com/google/go-tspi@v0.3.0/verification/verification.go:GenerateChallengeEx 86 VerifyRequest_AskForChallenge_TSPI_EKBLOB VerifyRequest_AskForChallenge_ChallengeFormat = 2 87 ) 88 89 var ( 90 VerifyRequest_AskForChallenge_ChallengeFormat_name = map[int32]string{ 91 0: "TPM20_CREDENTIAL", 92 1: "TPM12_EKBLOB", 93 2: "TSPI_EKBLOB", 94 } 95 96 VerifyRequest_AskForChallenge_ChallengeFormat_value = map[string]int32{ 97 "TPM20_CREDENTIAL": 0, 98 "TPM12_EKBLOB": 1, 99 "TSPI_EKBLOB": 2, 100 } 101 ) 102 103 func (x VerifyRequest_AskForChallenge_ChallengeFormat) Enum() *VerifyRequest_AskForChallenge_ChallengeFormat { 104 p := new(VerifyRequest_AskForChallenge_ChallengeFormat) 105 *p = x 106 return p 107 } 108 109 func (x VerifyRequest_AskForChallenge_ChallengeFormat) String() string { 110 return protoimpl.X.EnumStringOf(x.Descriptor(), preflect.EnumNumber(x)) 111 } 112 113 func (VerifyRequest_AskForChallenge_ChallengeFormat) Descriptor() preflect.EnumDescriptor { 114 return edgelq_iam_proto_v1alpha2_attestation_custom_proto_enumTypes[0].Descriptor() 115 } 116 117 func (VerifyRequest_AskForChallenge_ChallengeFormat) Type() preflect.EnumType { 118 return &edgelq_iam_proto_v1alpha2_attestation_custom_proto_enumTypes[0] 119 } 120 121 func (x VerifyRequest_AskForChallenge_ChallengeFormat) Number() preflect.EnumNumber { 122 return preflect.EnumNumber(x) 123 } 124 125 // Deprecated, Use VerifyRequest_AskForChallenge_ChallengeFormat.ProtoReflect.Descriptor instead. 126 func (VerifyRequest_AskForChallenge_ChallengeFormat) EnumDescriptor() ([]byte, []int) { 127 return edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescGZIP(), []int{0, 0, 0} 128 } 129 130 // Request message for method [Verify][ntt.iam.v1alpha2.Verify] 131 type VerifyRequest struct { 132 state protoimpl.MessageState 133 sizeCache protoimpl.SizeCache 134 unknownFields protoimpl.UnknownFields 135 // Types that are valid to be assigned to Msg: 136 // *VerifyRequest_AskForChallenge_ 137 // *VerifyRequest_ChallengeResponse_ 138 Msg isVerifyRequest_Msg `protobuf_oneof:"msg"` 139 } 140 141 func (m *VerifyRequest) Reset() { 142 *m = VerifyRequest{} 143 if protoimpl.UnsafeEnabled { 144 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[0] 145 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 146 ms.StoreMessageInfo(mi) 147 } 148 } 149 150 func (m *VerifyRequest) String() string { 151 return protoimpl.X.MessageStringOf(m) 152 } 153 154 func (*VerifyRequest) ProtoMessage() {} 155 156 func (m *VerifyRequest) ProtoReflect() preflect.Message { 157 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[0] 158 if protoimpl.UnsafeEnabled && m != nil { 159 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 160 if ms.LoadMessageInfo() == nil { 161 ms.StoreMessageInfo(mi) 162 } 163 return ms 164 } 165 return mi.MessageOf(m) 166 } 167 168 func (*VerifyRequest) GotenMessage() {} 169 170 // Deprecated, Use VerifyRequest.ProtoReflect.Descriptor instead. 171 func (*VerifyRequest) Descriptor() ([]byte, []int) { 172 return edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescGZIP(), []int{0} 173 } 174 175 func (m *VerifyRequest) Unmarshal(b []byte) error { 176 return proto.Unmarshal(b, m) 177 } 178 179 func (m *VerifyRequest) Marshal() ([]byte, error) { 180 return proto.Marshal(m) 181 } 182 183 func (m *VerifyRequest) MarshalJSON() ([]byte, error) { 184 return protojson.MarshalOptions{}.Marshal(m) 185 } 186 187 func (m *VerifyRequest) UnmarshalJSON(data []byte) error { 188 return protojson.Unmarshal(data, m) 189 } 190 191 type isVerifyRequest_Msg interface { 192 isVerifyRequest_Msg() 193 } 194 195 type VerifyRequest_AskForChallenge_ struct { 196 AskForChallenge *VerifyRequest_AskForChallenge `protobuf:"bytes,1,opt,name=ask_for_challenge,json=askForChallenge,proto3,oneof"` 197 } 198 type VerifyRequest_ChallengeResponse_ struct { 199 ChallengeResponse *VerifyRequest_ChallengeResponse `protobuf:"bytes,2,opt,name=challenge_response,json=challengeResponse,proto3,oneof"` 200 } 201 202 func (*VerifyRequest_AskForChallenge_) isVerifyRequest_Msg() {} 203 func (*VerifyRequest_ChallengeResponse_) isVerifyRequest_Msg() {} 204 func (m *VerifyRequest) GetMsg() isVerifyRequest_Msg { 205 if m != nil { 206 return m.Msg 207 } 208 return nil 209 } 210 func (m *VerifyRequest) GetAskForChallenge() *VerifyRequest_AskForChallenge { 211 if x, ok := m.GetMsg().(*VerifyRequest_AskForChallenge_); ok { 212 return x.AskForChallenge 213 } 214 return nil 215 } 216 func (m *VerifyRequest) GetChallengeResponse() *VerifyRequest_ChallengeResponse { 217 if x, ok := m.GetMsg().(*VerifyRequest_ChallengeResponse_); ok { 218 return x.ChallengeResponse 219 } 220 return nil 221 } 222 func (m *VerifyRequest) SetMsg(ofv isVerifyRequest_Msg) { 223 if m == nil { 224 panic(fmt.Errorf("can't set %s on nil %s", "isVerifyRequest_Msg", "VerifyRequest")) 225 } 226 m.Msg = ofv 227 } 228 func (m *VerifyRequest) SetAskForChallenge(fv *VerifyRequest_AskForChallenge) { 229 m.SetMsg(&VerifyRequest_AskForChallenge_{AskForChallenge: fv}) 230 } 231 func (m *VerifyRequest) SetChallengeResponse(fv *VerifyRequest_ChallengeResponse) { 232 m.SetMsg(&VerifyRequest_ChallengeResponse_{ChallengeResponse: fv}) 233 } 234 235 // Response message for method [Verify][ntt.iam.v1alpha2.Verify] 236 type VerifyResponse struct { 237 state protoimpl.MessageState 238 sizeCache protoimpl.SizeCache 239 unknownFields protoimpl.UnknownFields 240 // Types that are valid to be assigned to Msg: 241 // *VerifyResponse_Challenge_ 242 // *VerifyResponse_AttestationSuccessful_ 243 Msg isVerifyResponse_Msg `protobuf_oneof:"msg"` 244 } 245 246 func (m *VerifyResponse) Reset() { 247 *m = VerifyResponse{} 248 if protoimpl.UnsafeEnabled { 249 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[1] 250 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 251 ms.StoreMessageInfo(mi) 252 } 253 } 254 255 func (m *VerifyResponse) String() string { 256 return protoimpl.X.MessageStringOf(m) 257 } 258 259 func (*VerifyResponse) ProtoMessage() {} 260 261 func (m *VerifyResponse) ProtoReflect() preflect.Message { 262 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[1] 263 if protoimpl.UnsafeEnabled && m != nil { 264 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 265 if ms.LoadMessageInfo() == nil { 266 ms.StoreMessageInfo(mi) 267 } 268 return ms 269 } 270 return mi.MessageOf(m) 271 } 272 273 func (*VerifyResponse) GotenMessage() {} 274 275 // Deprecated, Use VerifyResponse.ProtoReflect.Descriptor instead. 276 func (*VerifyResponse) Descriptor() ([]byte, []int) { 277 return edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescGZIP(), []int{1} 278 } 279 280 func (m *VerifyResponse) Unmarshal(b []byte) error { 281 return proto.Unmarshal(b, m) 282 } 283 284 func (m *VerifyResponse) Marshal() ([]byte, error) { 285 return proto.Marshal(m) 286 } 287 288 func (m *VerifyResponse) MarshalJSON() ([]byte, error) { 289 return protojson.MarshalOptions{}.Marshal(m) 290 } 291 292 func (m *VerifyResponse) UnmarshalJSON(data []byte) error { 293 return protojson.Unmarshal(data, m) 294 } 295 296 type isVerifyResponse_Msg interface { 297 isVerifyResponse_Msg() 298 } 299 300 type VerifyResponse_Challenge_ struct { 301 Challenge *VerifyResponse_Challenge `protobuf:"bytes,1,opt,name=challenge,proto3,oneof"` 302 } 303 type VerifyResponse_AttestationSuccessful_ struct { 304 AttestationSuccessful *VerifyResponse_AttestationSuccessful `protobuf:"bytes,2,opt,name=attestation_successful,json=attestationSuccessful,proto3,oneof"` 305 } 306 307 func (*VerifyResponse_Challenge_) isVerifyResponse_Msg() {} 308 func (*VerifyResponse_AttestationSuccessful_) isVerifyResponse_Msg() {} 309 func (m *VerifyResponse) GetMsg() isVerifyResponse_Msg { 310 if m != nil { 311 return m.Msg 312 } 313 return nil 314 } 315 func (m *VerifyResponse) GetChallenge() *VerifyResponse_Challenge { 316 if x, ok := m.GetMsg().(*VerifyResponse_Challenge_); ok { 317 return x.Challenge 318 } 319 return nil 320 } 321 func (m *VerifyResponse) GetAttestationSuccessful() *VerifyResponse_AttestationSuccessful { 322 if x, ok := m.GetMsg().(*VerifyResponse_AttestationSuccessful_); ok { 323 return x.AttestationSuccessful 324 } 325 return nil 326 } 327 func (m *VerifyResponse) SetMsg(ofv isVerifyResponse_Msg) { 328 if m == nil { 329 panic(fmt.Errorf("can't set %s on nil %s", "isVerifyResponse_Msg", "VerifyResponse")) 330 } 331 m.Msg = ofv 332 } 333 func (m *VerifyResponse) SetChallenge(fv *VerifyResponse_Challenge) { 334 m.SetMsg(&VerifyResponse_Challenge_{Challenge: fv}) 335 } 336 func (m *VerifyResponse) SetAttestationSuccessful(fv *VerifyResponse_AttestationSuccessful) { 337 m.SetMsg(&VerifyResponse_AttestationSuccessful_{AttestationSuccessful: fv}) 338 } 339 340 type VerifyRequest_AskForChallenge struct { 341 state protoimpl.MessageState 342 sizeCache protoimpl.SizeCache 343 unknownFields protoimpl.UnknownFields 344 // This will be used to set "sub" claim for attestation token. 345 // This "sub" should be compared to "sub" of JWT access token during 346 // validation. "Sub" comparison ties both tokens together and protects 347 // against theft/reuse of one of them by another service account. 348 Subject string `protobuf:"bytes,1,opt,name=subject,proto3" json:"subject,omitempty"` 349 // attestation domain ref 350 AttestationDomain *attestation_domain.Name `protobuf:"bytes,2,opt,customtype=Name,name=attestation_domain,json=attestationDomain,proto3" json:"attestation_domain,omitempty"` 351 TpmVersion iam_common.TpmVersion `protobuf:"varint,3,opt,name=tpm_version,json=tpmVersion,proto3,enum=ntt.iam.v1alpha2.TpmVersion" json:"tpm_version,omitempty"` 352 // PKIX encoded EK public 353 Ekpub []byte `protobuf:"bytes,4,opt,name=ekpub,proto3" json:"ekpub,omitempty"` 354 // ASN.1 DER encoded EK certificate. 355 Ekcert []byte `protobuf:"bytes,5,opt,name=ekcert,proto3" json:"ekcert,omitempty"` 356 // For Intel TPMs, Intel hosts certificates at a public URL derived from the 357 // Public key. Clients or servers can perform an HTTP GET to this URL, and 358 // use ParseEKCertificate on the response body. 359 Ekcerturl string `protobuf:"bytes,6,opt,name=ekcerturl,proto3" json:"ekcerturl,omitempty"` 360 // https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf 361 // https://www.trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-2-Structures-01.38.pdf 362 // TPMT_PUBLIC (TPM 2.0) or TPM_PUBKEY (TPM 1.2) 363 Akpub []byte `protobuf:"bytes,7,opt,name=akpub,proto3" json:"akpub,omitempty"` 364 // TPMS_CREATION_DATA 365 CreationData []byte `protobuf:"bytes,8,opt,name=creation_data,json=creationData,proto3" json:"creation_data,omitempty"` 366 // TPMS_ATTEST 367 Attest []byte `protobuf:"bytes,9,opt,name=attest,proto3" json:"attest,omitempty"` 368 // TPMT_SIGNATURE 369 Signature []byte `protobuf:"bytes,10,opt,name=signature,proto3" json:"signature,omitempty"` 370 // ChallengeFormat defines the method of generating identity activation 371 // challenge by the Verifier (server). It should affect the interpretation 372 // ChallengeResponse fields cred_encrypted_by_ekpub and 373 // secret_encrypted_by_cred. Attestor (client) is responsible for chosing 374 // the right format depending on TPM version and the presence of TrouSerS 375 // daemon. 376 ChallengeFormat VerifyRequest_AskForChallenge_ChallengeFormat `protobuf:"varint,11,opt,name=challenge_format,json=challengeFormat,proto3,enum=ntt.iam.v1alpha2.VerifyRequest_AskForChallenge_ChallengeFormat" json:"challenge_format,omitempty"` 377 } 378 379 func (m *VerifyRequest_AskForChallenge) Reset() { 380 *m = VerifyRequest_AskForChallenge{} 381 if protoimpl.UnsafeEnabled { 382 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[2] 383 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 384 ms.StoreMessageInfo(mi) 385 } 386 } 387 388 func (m *VerifyRequest_AskForChallenge) String() string { 389 return protoimpl.X.MessageStringOf(m) 390 } 391 392 func (*VerifyRequest_AskForChallenge) ProtoMessage() {} 393 394 func (m *VerifyRequest_AskForChallenge) ProtoReflect() preflect.Message { 395 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[2] 396 if protoimpl.UnsafeEnabled && m != nil { 397 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 398 if ms.LoadMessageInfo() == nil { 399 ms.StoreMessageInfo(mi) 400 } 401 return ms 402 } 403 return mi.MessageOf(m) 404 } 405 406 func (*VerifyRequest_AskForChallenge) GotenMessage() {} 407 408 // Deprecated, Use VerifyRequest_AskForChallenge.ProtoReflect.Descriptor instead. 409 func (*VerifyRequest_AskForChallenge) Descriptor() ([]byte, []int) { 410 return edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescGZIP(), []int{0, 0} 411 } 412 413 func (m *VerifyRequest_AskForChallenge) Unmarshal(b []byte) error { 414 return proto.Unmarshal(b, m) 415 } 416 417 func (m *VerifyRequest_AskForChallenge) Marshal() ([]byte, error) { 418 return proto.Marshal(m) 419 } 420 421 func (m *VerifyRequest_AskForChallenge) MarshalJSON() ([]byte, error) { 422 return protojson.MarshalOptions{}.Marshal(m) 423 } 424 425 func (m *VerifyRequest_AskForChallenge) UnmarshalJSON(data []byte) error { 426 return protojson.Unmarshal(data, m) 427 } 428 429 func (m *VerifyRequest_AskForChallenge) GetSubject() string { 430 if m != nil { 431 return m.Subject 432 } 433 return "" 434 } 435 436 func (m *VerifyRequest_AskForChallenge) GetAttestationDomain() *attestation_domain.Name { 437 if m != nil { 438 return m.AttestationDomain 439 } 440 return nil 441 } 442 443 func (m *VerifyRequest_AskForChallenge) GetTpmVersion() iam_common.TpmVersion { 444 if m != nil { 445 return m.TpmVersion 446 } 447 return iam_common.TpmVersion_TPMVAGNOSTIC 448 } 449 450 func (m *VerifyRequest_AskForChallenge) GetEkpub() []byte { 451 if m != nil { 452 return m.Ekpub 453 } 454 return nil 455 } 456 457 func (m *VerifyRequest_AskForChallenge) GetEkcert() []byte { 458 if m != nil { 459 return m.Ekcert 460 } 461 return nil 462 } 463 464 func (m *VerifyRequest_AskForChallenge) GetEkcerturl() string { 465 if m != nil { 466 return m.Ekcerturl 467 } 468 return "" 469 } 470 471 func (m *VerifyRequest_AskForChallenge) GetAkpub() []byte { 472 if m != nil { 473 return m.Akpub 474 } 475 return nil 476 } 477 478 func (m *VerifyRequest_AskForChallenge) GetCreationData() []byte { 479 if m != nil { 480 return m.CreationData 481 } 482 return nil 483 } 484 485 func (m *VerifyRequest_AskForChallenge) GetAttest() []byte { 486 if m != nil { 487 return m.Attest 488 } 489 return nil 490 } 491 492 func (m *VerifyRequest_AskForChallenge) GetSignature() []byte { 493 if m != nil { 494 return m.Signature 495 } 496 return nil 497 } 498 499 func (m *VerifyRequest_AskForChallenge) GetChallengeFormat() VerifyRequest_AskForChallenge_ChallengeFormat { 500 if m != nil { 501 return m.ChallengeFormat 502 } 503 return VerifyRequest_AskForChallenge_TPM20_CREDENTIAL 504 } 505 506 func (m *VerifyRequest_AskForChallenge) SetSubject(fv string) { 507 if m == nil { 508 panic(fmt.Errorf("can't set %s on nil %s", "Subject", "VerifyRequest_AskForChallenge")) 509 } 510 m.Subject = fv 511 } 512 513 func (m *VerifyRequest_AskForChallenge) SetAttestationDomain(fv *attestation_domain.Name) { 514 if m == nil { 515 panic(fmt.Errorf("can't set %s on nil %s", "AttestationDomain", "VerifyRequest_AskForChallenge")) 516 } 517 m.AttestationDomain = fv 518 } 519 520 func (m *VerifyRequest_AskForChallenge) SetTpmVersion(fv iam_common.TpmVersion) { 521 if m == nil { 522 panic(fmt.Errorf("can't set %s on nil %s", "TpmVersion", "VerifyRequest_AskForChallenge")) 523 } 524 m.TpmVersion = fv 525 } 526 527 func (m *VerifyRequest_AskForChallenge) SetEkpub(fv []byte) { 528 if m == nil { 529 panic(fmt.Errorf("can't set %s on nil %s", "Ekpub", "VerifyRequest_AskForChallenge")) 530 } 531 m.Ekpub = fv 532 } 533 534 func (m *VerifyRequest_AskForChallenge) SetEkcert(fv []byte) { 535 if m == nil { 536 panic(fmt.Errorf("can't set %s on nil %s", "Ekcert", "VerifyRequest_AskForChallenge")) 537 } 538 m.Ekcert = fv 539 } 540 541 func (m *VerifyRequest_AskForChallenge) SetEkcerturl(fv string) { 542 if m == nil { 543 panic(fmt.Errorf("can't set %s on nil %s", "Ekcerturl", "VerifyRequest_AskForChallenge")) 544 } 545 m.Ekcerturl = fv 546 } 547 548 func (m *VerifyRequest_AskForChallenge) SetAkpub(fv []byte) { 549 if m == nil { 550 panic(fmt.Errorf("can't set %s on nil %s", "Akpub", "VerifyRequest_AskForChallenge")) 551 } 552 m.Akpub = fv 553 } 554 555 func (m *VerifyRequest_AskForChallenge) SetCreationData(fv []byte) { 556 if m == nil { 557 panic(fmt.Errorf("can't set %s on nil %s", "CreationData", "VerifyRequest_AskForChallenge")) 558 } 559 m.CreationData = fv 560 } 561 562 func (m *VerifyRequest_AskForChallenge) SetAttest(fv []byte) { 563 if m == nil { 564 panic(fmt.Errorf("can't set %s on nil %s", "Attest", "VerifyRequest_AskForChallenge")) 565 } 566 m.Attest = fv 567 } 568 569 func (m *VerifyRequest_AskForChallenge) SetSignature(fv []byte) { 570 if m == nil { 571 panic(fmt.Errorf("can't set %s on nil %s", "Signature", "VerifyRequest_AskForChallenge")) 572 } 573 m.Signature = fv 574 } 575 576 func (m *VerifyRequest_AskForChallenge) SetChallengeFormat(fv VerifyRequest_AskForChallenge_ChallengeFormat) { 577 if m == nil { 578 panic(fmt.Errorf("can't set %s on nil %s", "ChallengeFormat", "VerifyRequest_AskForChallenge")) 579 } 580 m.ChallengeFormat = fv 581 } 582 583 type VerifyRequest_ChallengeResponse struct { 584 state protoimpl.MessageState 585 sizeCache protoimpl.SizeCache 586 unknownFields protoimpl.UnknownFields 587 AkActivationDecryptedSecret []byte `protobuf:"bytes,1,opt,name=ak_activation_decrypted_secret,json=akActivationDecryptedSecret,proto3" json:"ak_activation_decrypted_secret,omitempty"` 588 Quotes []*VerifyRequest_ChallengeResponse_Quote `protobuf:"bytes,2,rep,name=quotes,proto3" json:"quotes,omitempty"` 589 Pcrs []*iam_common.PCR `protobuf:"bytes,3,rep,name=pcrs,proto3" json:"pcrs,omitempty"` 590 // Binary contents of /sys/kernel/security/tpm0/binary_bios_measurements 591 Eventlog []byte `protobuf:"bytes,4,opt,name=eventlog,proto3" json:"eventlog,omitempty"` 592 } 593 594 func (m *VerifyRequest_ChallengeResponse) Reset() { 595 *m = VerifyRequest_ChallengeResponse{} 596 if protoimpl.UnsafeEnabled { 597 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[3] 598 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 599 ms.StoreMessageInfo(mi) 600 } 601 } 602 603 func (m *VerifyRequest_ChallengeResponse) String() string { 604 return protoimpl.X.MessageStringOf(m) 605 } 606 607 func (*VerifyRequest_ChallengeResponse) ProtoMessage() {} 608 609 func (m *VerifyRequest_ChallengeResponse) ProtoReflect() preflect.Message { 610 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[3] 611 if protoimpl.UnsafeEnabled && m != nil { 612 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 613 if ms.LoadMessageInfo() == nil { 614 ms.StoreMessageInfo(mi) 615 } 616 return ms 617 } 618 return mi.MessageOf(m) 619 } 620 621 func (*VerifyRequest_ChallengeResponse) GotenMessage() {} 622 623 // Deprecated, Use VerifyRequest_ChallengeResponse.ProtoReflect.Descriptor instead. 624 func (*VerifyRequest_ChallengeResponse) Descriptor() ([]byte, []int) { 625 return edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescGZIP(), []int{0, 1} 626 } 627 628 func (m *VerifyRequest_ChallengeResponse) Unmarshal(b []byte) error { 629 return proto.Unmarshal(b, m) 630 } 631 632 func (m *VerifyRequest_ChallengeResponse) Marshal() ([]byte, error) { 633 return proto.Marshal(m) 634 } 635 636 func (m *VerifyRequest_ChallengeResponse) MarshalJSON() ([]byte, error) { 637 return protojson.MarshalOptions{}.Marshal(m) 638 } 639 640 func (m *VerifyRequest_ChallengeResponse) UnmarshalJSON(data []byte) error { 641 return protojson.Unmarshal(data, m) 642 } 643 644 func (m *VerifyRequest_ChallengeResponse) GetAkActivationDecryptedSecret() []byte { 645 if m != nil { 646 return m.AkActivationDecryptedSecret 647 } 648 return nil 649 } 650 651 func (m *VerifyRequest_ChallengeResponse) GetQuotes() []*VerifyRequest_ChallengeResponse_Quote { 652 if m != nil { 653 return m.Quotes 654 } 655 return nil 656 } 657 658 func (m *VerifyRequest_ChallengeResponse) GetPcrs() []*iam_common.PCR { 659 if m != nil { 660 return m.Pcrs 661 } 662 return nil 663 } 664 665 func (m *VerifyRequest_ChallengeResponse) GetEventlog() []byte { 666 if m != nil { 667 return m.Eventlog 668 } 669 return nil 670 } 671 672 func (m *VerifyRequest_ChallengeResponse) SetAkActivationDecryptedSecret(fv []byte) { 673 if m == nil { 674 panic(fmt.Errorf("can't set %s on nil %s", "AkActivationDecryptedSecret", "VerifyRequest_ChallengeResponse")) 675 } 676 m.AkActivationDecryptedSecret = fv 677 } 678 679 func (m *VerifyRequest_ChallengeResponse) SetQuotes(fv []*VerifyRequest_ChallengeResponse_Quote) { 680 if m == nil { 681 panic(fmt.Errorf("can't set %s on nil %s", "Quotes", "VerifyRequest_ChallengeResponse")) 682 } 683 m.Quotes = fv 684 } 685 686 func (m *VerifyRequest_ChallengeResponse) SetPcrs(fv []*iam_common.PCR) { 687 if m == nil { 688 panic(fmt.Errorf("can't set %s on nil %s", "Pcrs", "VerifyRequest_ChallengeResponse")) 689 } 690 m.Pcrs = fv 691 } 692 693 func (m *VerifyRequest_ChallengeResponse) SetEventlog(fv []byte) { 694 if m == nil { 695 panic(fmt.Errorf("can't set %s on nil %s", "Eventlog", "VerifyRequest_ChallengeResponse")) 696 } 697 m.Eventlog = fv 698 } 699 700 type VerifyRequest_ChallengeResponse_Quote struct { 701 state protoimpl.MessageState 702 sizeCache protoimpl.SizeCache 703 unknownFields protoimpl.UnknownFields 704 // TPMS_ATTEST (TSS_VALIDATION.Data or TSS_VALIDATION.rgbData) 705 // This contains PCR selection information for which the signature was 706 // calculated and other required data, like nonce. 707 Quote []byte `protobuf:"bytes,1,opt,name=quote,proto3" json:"quote,omitempty"` 708 // TSS_VALIDATION.ValidationData or TSS_VALIDATION.rgbValidationData 709 Signature []byte `protobuf:"bytes,2,opt,name=signature,proto3" json:"signature,omitempty"` 710 } 711 712 func (m *VerifyRequest_ChallengeResponse_Quote) Reset() { 713 *m = VerifyRequest_ChallengeResponse_Quote{} 714 if protoimpl.UnsafeEnabled { 715 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[4] 716 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 717 ms.StoreMessageInfo(mi) 718 } 719 } 720 721 func (m *VerifyRequest_ChallengeResponse_Quote) String() string { 722 return protoimpl.X.MessageStringOf(m) 723 } 724 725 func (*VerifyRequest_ChallengeResponse_Quote) ProtoMessage() {} 726 727 func (m *VerifyRequest_ChallengeResponse_Quote) ProtoReflect() preflect.Message { 728 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[4] 729 if protoimpl.UnsafeEnabled && m != nil { 730 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 731 if ms.LoadMessageInfo() == nil { 732 ms.StoreMessageInfo(mi) 733 } 734 return ms 735 } 736 return mi.MessageOf(m) 737 } 738 739 func (*VerifyRequest_ChallengeResponse_Quote) GotenMessage() {} 740 741 // Deprecated, Use VerifyRequest_ChallengeResponse_Quote.ProtoReflect.Descriptor instead. 742 func (*VerifyRequest_ChallengeResponse_Quote) Descriptor() ([]byte, []int) { 743 return edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescGZIP(), []int{0, 1, 0} 744 } 745 746 func (m *VerifyRequest_ChallengeResponse_Quote) Unmarshal(b []byte) error { 747 return proto.Unmarshal(b, m) 748 } 749 750 func (m *VerifyRequest_ChallengeResponse_Quote) Marshal() ([]byte, error) { 751 return proto.Marshal(m) 752 } 753 754 func (m *VerifyRequest_ChallengeResponse_Quote) MarshalJSON() ([]byte, error) { 755 return protojson.MarshalOptions{}.Marshal(m) 756 } 757 758 func (m *VerifyRequest_ChallengeResponse_Quote) UnmarshalJSON(data []byte) error { 759 return protojson.Unmarshal(data, m) 760 } 761 762 func (m *VerifyRequest_ChallengeResponse_Quote) GetQuote() []byte { 763 if m != nil { 764 return m.Quote 765 } 766 return nil 767 } 768 769 func (m *VerifyRequest_ChallengeResponse_Quote) GetSignature() []byte { 770 if m != nil { 771 return m.Signature 772 } 773 return nil 774 } 775 776 func (m *VerifyRequest_ChallengeResponse_Quote) SetQuote(fv []byte) { 777 if m == nil { 778 panic(fmt.Errorf("can't set %s on nil %s", "Quote", "VerifyRequest_ChallengeResponse_Quote")) 779 } 780 m.Quote = fv 781 } 782 783 func (m *VerifyRequest_ChallengeResponse_Quote) SetSignature(fv []byte) { 784 if m == nil { 785 panic(fmt.Errorf("can't set %s on nil %s", "Signature", "VerifyRequest_ChallengeResponse_Quote")) 786 } 787 m.Signature = fv 788 } 789 790 type VerifyResponse_Challenge struct { 791 state protoimpl.MessageState 792 sizeCache protoimpl.SizeCache 793 unknownFields protoimpl.UnknownFields 794 // Platform attestation 795 PlatformAttestationNonce []byte `protobuf:"bytes,1,opt,name=platform_attestation_nonce,json=platformAttestationNonce,proto3" json:"platform_attestation_nonce,omitempty"` 796 // AK Identity Activation 797 CredEncryptedByEkpub []byte `protobuf:"bytes,2,opt,name=cred_encrypted_by_ekpub,json=credEncryptedByEkpub,proto3" json:"cred_encrypted_by_ekpub,omitempty"` 798 SecretEncryptedByCred []byte `protobuf:"bytes,3,opt,name=secret_encrypted_by_cred,json=secretEncryptedByCred,proto3" json:"secret_encrypted_by_cred,omitempty"` 799 } 800 801 func (m *VerifyResponse_Challenge) Reset() { 802 *m = VerifyResponse_Challenge{} 803 if protoimpl.UnsafeEnabled { 804 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[5] 805 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 806 ms.StoreMessageInfo(mi) 807 } 808 } 809 810 func (m *VerifyResponse_Challenge) String() string { 811 return protoimpl.X.MessageStringOf(m) 812 } 813 814 func (*VerifyResponse_Challenge) ProtoMessage() {} 815 816 func (m *VerifyResponse_Challenge) ProtoReflect() preflect.Message { 817 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[5] 818 if protoimpl.UnsafeEnabled && m != nil { 819 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 820 if ms.LoadMessageInfo() == nil { 821 ms.StoreMessageInfo(mi) 822 } 823 return ms 824 } 825 return mi.MessageOf(m) 826 } 827 828 func (*VerifyResponse_Challenge) GotenMessage() {} 829 830 // Deprecated, Use VerifyResponse_Challenge.ProtoReflect.Descriptor instead. 831 func (*VerifyResponse_Challenge) Descriptor() ([]byte, []int) { 832 return edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescGZIP(), []int{1, 0} 833 } 834 835 func (m *VerifyResponse_Challenge) Unmarshal(b []byte) error { 836 return proto.Unmarshal(b, m) 837 } 838 839 func (m *VerifyResponse_Challenge) Marshal() ([]byte, error) { 840 return proto.Marshal(m) 841 } 842 843 func (m *VerifyResponse_Challenge) MarshalJSON() ([]byte, error) { 844 return protojson.MarshalOptions{}.Marshal(m) 845 } 846 847 func (m *VerifyResponse_Challenge) UnmarshalJSON(data []byte) error { 848 return protojson.Unmarshal(data, m) 849 } 850 851 func (m *VerifyResponse_Challenge) GetPlatformAttestationNonce() []byte { 852 if m != nil { 853 return m.PlatformAttestationNonce 854 } 855 return nil 856 } 857 858 func (m *VerifyResponse_Challenge) GetCredEncryptedByEkpub() []byte { 859 if m != nil { 860 return m.CredEncryptedByEkpub 861 } 862 return nil 863 } 864 865 func (m *VerifyResponse_Challenge) GetSecretEncryptedByCred() []byte { 866 if m != nil { 867 return m.SecretEncryptedByCred 868 } 869 return nil 870 } 871 872 func (m *VerifyResponse_Challenge) SetPlatformAttestationNonce(fv []byte) { 873 if m == nil { 874 panic(fmt.Errorf("can't set %s on nil %s", "PlatformAttestationNonce", "VerifyResponse_Challenge")) 875 } 876 m.PlatformAttestationNonce = fv 877 } 878 879 func (m *VerifyResponse_Challenge) SetCredEncryptedByEkpub(fv []byte) { 880 if m == nil { 881 panic(fmt.Errorf("can't set %s on nil %s", "CredEncryptedByEkpub", "VerifyResponse_Challenge")) 882 } 883 m.CredEncryptedByEkpub = fv 884 } 885 886 func (m *VerifyResponse_Challenge) SetSecretEncryptedByCred(fv []byte) { 887 if m == nil { 888 panic(fmt.Errorf("can't set %s on nil %s", "SecretEncryptedByCred", "VerifyResponse_Challenge")) 889 } 890 m.SecretEncryptedByCred = fv 891 } 892 893 type VerifyResponse_AttestationSuccessful struct { 894 state protoimpl.MessageState 895 sizeCache protoimpl.SizeCache 896 unknownFields protoimpl.UnknownFields 897 AttestationToken string `protobuf:"bytes,1,opt,name=attestation_token,json=attestationToken,proto3" json:"attestation_token,omitempty"` 898 } 899 900 func (m *VerifyResponse_AttestationSuccessful) Reset() { 901 *m = VerifyResponse_AttestationSuccessful{} 902 if protoimpl.UnsafeEnabled { 903 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[6] 904 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 905 ms.StoreMessageInfo(mi) 906 } 907 } 908 909 func (m *VerifyResponse_AttestationSuccessful) String() string { 910 return protoimpl.X.MessageStringOf(m) 911 } 912 913 func (*VerifyResponse_AttestationSuccessful) ProtoMessage() {} 914 915 func (m *VerifyResponse_AttestationSuccessful) ProtoReflect() preflect.Message { 916 mi := &edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[6] 917 if protoimpl.UnsafeEnabled && m != nil { 918 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(m)) 919 if ms.LoadMessageInfo() == nil { 920 ms.StoreMessageInfo(mi) 921 } 922 return ms 923 } 924 return mi.MessageOf(m) 925 } 926 927 func (*VerifyResponse_AttestationSuccessful) GotenMessage() {} 928 929 // Deprecated, Use VerifyResponse_AttestationSuccessful.ProtoReflect.Descriptor instead. 930 func (*VerifyResponse_AttestationSuccessful) Descriptor() ([]byte, []int) { 931 return edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescGZIP(), []int{1, 1} 932 } 933 934 func (m *VerifyResponse_AttestationSuccessful) Unmarshal(b []byte) error { 935 return proto.Unmarshal(b, m) 936 } 937 938 func (m *VerifyResponse_AttestationSuccessful) Marshal() ([]byte, error) { 939 return proto.Marshal(m) 940 } 941 942 func (m *VerifyResponse_AttestationSuccessful) MarshalJSON() ([]byte, error) { 943 return protojson.MarshalOptions{}.Marshal(m) 944 } 945 946 func (m *VerifyResponse_AttestationSuccessful) UnmarshalJSON(data []byte) error { 947 return protojson.Unmarshal(data, m) 948 } 949 950 func (m *VerifyResponse_AttestationSuccessful) GetAttestationToken() string { 951 if m != nil { 952 return m.AttestationToken 953 } 954 return "" 955 } 956 957 func (m *VerifyResponse_AttestationSuccessful) SetAttestationToken(fv string) { 958 if m == nil { 959 panic(fmt.Errorf("can't set %s on nil %s", "AttestationToken", "VerifyResponse_AttestationSuccessful")) 960 } 961 m.AttestationToken = fv 962 } 963 964 var edgelq_iam_proto_v1alpha2_attestation_custom_proto preflect.FileDescriptor 965 966 var edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDesc = []byte{ 967 0x0a, 0x32, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x71, 0x2f, 0x69, 0x61, 0x6d, 0x2f, 0x70, 0x72, 0x6f, 968 0x74, 0x6f, 0x2f, 0x76, 0x31, 0x61, 0x6c, 0x70, 0x68, 0x61, 0x32, 0x2f, 0x61, 0x74, 0x74, 0x65, 969 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x2e, 0x70, 970 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x10, 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 971 0x61, 0x6c, 0x70, 0x68, 0x61, 0x32, 0x1a, 0x19, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x61, 972 0x70, 0x69, 0x2f, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 973 0x6f, 0x1a, 0x20, 0x67, 0x6f, 0x74, 0x65, 0x6e, 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 974 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x76, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x65, 0x2e, 0x70, 0x72, 975 0x6f, 0x74, 0x6f, 0x1a, 0x1d, 0x67, 0x6f, 0x74, 0x65, 0x6e, 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 976 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x67, 0x6f, 0x74, 0x65, 0x6e, 0x2e, 0x70, 0x72, 0x6f, 977 0x74, 0x6f, 0x1a, 0x1d, 0x67, 0x6f, 0x74, 0x65, 0x6e, 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 978 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x73, 0x74, 0x6f, 0x72, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 979 0x6f, 0x1a, 0x20, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x71, 0x2f, 0x69, 0x61, 0x6d, 0x2f, 0x61, 0x6e, 980 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x69, 0x61, 0x6d, 0x2e, 0x70, 0x72, 981 0x6f, 0x74, 0x6f, 0x1a, 0x24, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x71, 0x2f, 0x61, 0x75, 0x64, 0x69, 982 0x74, 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x61, 0x75, 983 0x64, 0x69, 0x74, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x26, 0x65, 0x64, 0x67, 0x65, 0x6c, 984 0x71, 0x2f, 0x69, 0x61, 0x6d, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x2f, 0x76, 0x31, 0x61, 0x6c, 985 0x70, 0x68, 0x61, 0x32, 0x2f, 0x63, 0x6f, 0x6d, 0x6d, 0x6f, 0x6e, 0x2e, 0x70, 0x72, 0x6f, 0x74, 986 0x6f, 0x1a, 0x32, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x71, 0x2f, 0x69, 0x61, 0x6d, 0x2f, 0x70, 0x72, 987 0x6f, 0x74, 0x6f, 0x2f, 0x76, 0x31, 0x61, 0x6c, 0x70, 0x68, 0x61, 0x32, 0x2f, 0x61, 0x74, 0x74, 988 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x64, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x2e, 989 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x39, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x71, 0x2f, 0x69, 0x61, 990 0x6d, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x2f, 0x76, 0x31, 0x61, 0x6c, 0x70, 0x68, 0x61, 0x32, 991 0x2f, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x64, 0x6f, 0x6d, 992 0x61, 0x69, 0x6e, 0x5f, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 993 0x22, 0xcb, 0x08, 0x0a, 0x0d, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 994 0x73, 0x74, 0x12, 0x5d, 0x0a, 0x11, 0x61, 0x73, 0x6b, 0x5f, 0x66, 0x6f, 0x72, 0x5f, 0x63, 0x68, 995 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x2f, 0x2e, 996 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x61, 0x6c, 0x70, 0x68, 0x61, 0x32, 997 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x2e, 0x41, 998 0x73, 0x6b, 0x46, 0x6f, 0x72, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x48, 0x00, 999 0x52, 0x0f, 0x61, 0x73, 0x6b, 0x46, 0x6f, 0x72, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 1000 0x65, 0x12, 0x62, 0x0a, 0x12, 0x63, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x5f, 0x72, 1001 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x31, 0x2e, 1002 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x61, 0x6c, 0x70, 0x68, 0x61, 0x32, 1003 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x2e, 0x43, 1004 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 1005 0x48, 0x00, 0x52, 0x11, 0x63, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x52, 0x65, 0x73, 1006 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x1a, 0xbf, 0x04, 0x0a, 0x0f, 0x41, 0x73, 0x6b, 0x46, 0x6f, 0x72, 1007 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x12, 0x18, 0x0a, 0x07, 0x73, 0x75, 0x62, 1008 0x6a, 0x65, 0x63, 0x74, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x07, 0x73, 0x75, 0x62, 0x6a, 1009 0x65, 0x63, 0x74, 0x12, 0x5e, 0x0a, 0x12, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 1010 0x6f, 0x6e, 0x5f, 0x64, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x42, 1011 0x2f, 0xfa, 0x41, 0x13, 0x0a, 0x11, 0x41, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 1012 0x6e, 0x44, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0xb2, 0xda, 0x21, 0x15, 0x0a, 0x13, 0x0a, 0x11, 0x41, 1013 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x44, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 1014 0x52, 0x11, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x44, 0x6f, 0x6d, 1015 0x61, 0x69, 0x6e, 0x12, 0x3d, 0x0a, 0x0b, 0x74, 0x70, 0x6d, 0x5f, 0x76, 0x65, 0x72, 0x73, 0x69, 1016 0x6f, 0x6e, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1c, 0x2e, 0x6e, 0x74, 0x74, 0x2e, 0x69, 1017 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x61, 0x6c, 0x70, 0x68, 0x61, 0x32, 0x2e, 0x54, 0x70, 0x6d, 0x56, 1018 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x52, 0x0a, 0x74, 0x70, 0x6d, 0x56, 0x65, 0x72, 0x73, 0x69, 1019 0x6f, 0x6e, 0x12, 0x14, 0x0a, 0x05, 0x65, 0x6b, 0x70, 0x75, 0x62, 0x18, 0x04, 0x20, 0x01, 0x28, 1020 0x0c, 0x52, 0x05, 0x65, 0x6b, 0x70, 0x75, 0x62, 0x12, 0x16, 0x0a, 0x06, 0x65, 0x6b, 0x63, 0x65, 1021 0x72, 0x74, 0x18, 0x05, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x06, 0x65, 0x6b, 0x63, 0x65, 0x72, 0x74, 1022 0x12, 0x1c, 0x0a, 0x09, 0x65, 0x6b, 0x63, 0x65, 0x72, 0x74, 0x75, 0x72, 0x6c, 0x18, 0x06, 0x20, 1023 0x01, 0x28, 0x09, 0x52, 0x09, 0x65, 0x6b, 0x63, 0x65, 0x72, 0x74, 0x75, 0x72, 0x6c, 0x12, 0x14, 1024 0x0a, 0x05, 0x61, 0x6b, 0x70, 0x75, 0x62, 0x18, 0x07, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x05, 0x61, 1025 0x6b, 0x70, 0x75, 0x62, 0x12, 0x23, 0x0a, 0x0d, 0x63, 0x72, 0x65, 0x61, 0x74, 0x69, 0x6f, 0x6e, 1026 0x5f, 0x64, 0x61, 0x74, 0x61, 0x18, 0x08, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0c, 0x63, 0x72, 0x65, 1027 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x44, 0x61, 0x74, 0x61, 0x12, 0x16, 0x0a, 0x06, 0x61, 0x74, 0x74, 1028 0x65, 0x73, 0x74, 0x18, 0x09, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x06, 0x61, 0x74, 0x74, 0x65, 0x73, 1029 0x74, 0x12, 0x1c, 0x0a, 0x09, 0x73, 0x69, 0x67, 0x6e, 0x61, 0x74, 0x75, 0x72, 0x65, 0x18, 0x0a, 1030 0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x73, 0x69, 0x67, 0x6e, 0x61, 0x74, 0x75, 0x72, 0x65, 0x12, 1031 0x6a, 0x0a, 0x10, 0x63, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x5f, 0x66, 0x6f, 0x72, 1032 0x6d, 0x61, 0x74, 0x18, 0x0b, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x3f, 0x2e, 0x6e, 0x74, 0x74, 0x2e, 1033 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x61, 0x6c, 0x70, 0x68, 0x61, 0x32, 0x2e, 0x56, 0x65, 0x72, 1034 0x69, 0x66, 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x2e, 0x41, 0x73, 0x6b, 0x46, 0x6f, 1035 0x72, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x2e, 0x43, 0x68, 0x61, 0x6c, 0x6c, 1036 0x65, 0x6e, 0x67, 0x65, 0x46, 0x6f, 0x72, 0x6d, 0x61, 0x74, 0x52, 0x0f, 0x63, 0x68, 0x61, 0x6c, 1037 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x46, 0x6f, 0x72, 0x6d, 0x61, 0x74, 0x22, 0x4a, 0x0a, 0x0f, 0x43, 1038 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x46, 0x6f, 0x72, 0x6d, 0x61, 0x74, 0x12, 0x14, 1039 0x0a, 0x10, 0x54, 0x50, 0x4d, 0x32, 0x30, 0x5f, 0x43, 0x52, 0x45, 0x44, 0x45, 0x4e, 0x54, 0x49, 1040 0x41, 0x4c, 0x10, 0x00, 0x12, 0x10, 0x0a, 0x0c, 0x54, 0x50, 0x4d, 0x31, 0x32, 0x5f, 0x45, 0x4b, 1041 0x42, 0x4c, 0x4f, 0x42, 0x10, 0x01, 0x12, 0x0f, 0x0a, 0x0b, 0x54, 0x53, 0x50, 0x49, 0x5f, 0x45, 1042 0x4b, 0x42, 0x4c, 0x4f, 0x42, 0x10, 0x02, 0x1a, 0xad, 0x02, 0x0a, 0x11, 0x43, 0x68, 0x61, 0x6c, 1043 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x43, 0x0a, 1044 0x1e, 0x61, 0x6b, 0x5f, 0x61, 0x63, 0x74, 0x69, 0x76, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x64, 1045 0x65, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x5f, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x18, 1046 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x1b, 0x61, 0x6b, 0x41, 0x63, 0x74, 0x69, 0x76, 0x61, 0x74, 1047 0x69, 0x6f, 0x6e, 0x44, 0x65, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x53, 0x65, 0x63, 0x72, 1048 0x65, 0x74, 0x12, 0x4f, 0x0a, 0x06, 0x71, 0x75, 0x6f, 0x74, 0x65, 0x73, 0x18, 0x02, 0x20, 0x03, 1049 0x28, 0x0b, 0x32, 0x37, 0x2e, 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x61, 1050 0x6c, 0x70, 0x68, 0x61, 0x32, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 0x71, 0x75, 1051 0x65, 0x73, 0x74, 0x2e, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x52, 0x65, 0x73, 1052 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x2e, 0x51, 0x75, 0x6f, 0x74, 0x65, 0x52, 0x06, 0x71, 0x75, 0x6f, 1053 0x74, 0x65, 0x73, 0x12, 0x29, 0x0a, 0x04, 0x70, 0x63, 0x72, 0x73, 0x18, 0x03, 0x20, 0x03, 0x28, 1054 0x0b, 0x32, 0x15, 0x2e, 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x61, 0x6c, 1055 0x70, 0x68, 0x61, 0x32, 0x2e, 0x50, 0x43, 0x52, 0x52, 0x04, 0x70, 0x63, 0x72, 0x73, 0x12, 0x1a, 1056 0x0a, 0x08, 0x65, 0x76, 0x65, 0x6e, 0x74, 0x6c, 0x6f, 0x67, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0c, 1057 0x52, 0x08, 0x65, 0x76, 0x65, 0x6e, 0x74, 0x6c, 0x6f, 0x67, 0x1a, 0x3b, 0x0a, 0x05, 0x51, 0x75, 1058 0x6f, 0x74, 0x65, 0x12, 0x14, 0x0a, 0x05, 0x71, 0x75, 0x6f, 0x74, 0x65, 0x18, 0x01, 0x20, 0x01, 1059 0x28, 0x0c, 0x52, 0x05, 0x71, 0x75, 0x6f, 0x74, 0x65, 0x12, 0x1c, 0x0a, 0x09, 0x73, 0x69, 0x67, 1060 0x6e, 0x61, 0x74, 0x75, 0x72, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x73, 0x69, 1061 0x67, 0x6e, 0x61, 0x74, 0x75, 0x72, 0x65, 0x42, 0x05, 0x0a, 0x03, 0x6d, 0x73, 0x67, 0x22, 0xd6, 1062 0x03, 0x0a, 0x0e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 1063 0x65, 0x12, 0x4a, 0x0a, 0x09, 0x63, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x18, 0x01, 1064 0x20, 0x01, 0x28, 0x0b, 0x32, 0x2a, 0x2e, 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 1065 0x31, 0x61, 0x6c, 0x70, 0x68, 0x61, 0x32, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 1066 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x2e, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 1067 0x48, 0x00, 0x52, 0x09, 0x63, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x12, 0x6f, 0x0a, 1068 0x16, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x73, 0x75, 0x63, 1069 0x63, 0x65, 0x73, 0x73, 0x66, 0x75, 0x6c, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x36, 0x2e, 1070 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x76, 0x31, 0x61, 0x6c, 0x70, 0x68, 0x61, 0x32, 1071 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x2e, 1072 0x41, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x75, 0x63, 0x63, 0x65, 1073 0x73, 0x73, 0x66, 0x75, 0x6c, 0x48, 0x00, 0x52, 0x15, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 1074 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x66, 0x75, 0x6c, 0x1a, 0xb9, 1075 0x01, 0x0a, 0x09, 0x43, 0x68, 0x61, 0x6c, 0x6c, 0x65, 0x6e, 0x67, 0x65, 0x12, 0x3c, 0x0a, 0x1a, 1076 0x70, 0x6c, 0x61, 0x74, 0x66, 0x6f, 0x72, 0x6d, 0x5f, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 1077 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x6e, 0x6f, 0x6e, 0x63, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 1078 0x52, 0x18, 0x70, 0x6c, 0x61, 0x74, 0x66, 0x6f, 0x72, 0x6d, 0x41, 0x74, 0x74, 0x65, 0x73, 0x74, 1079 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x4e, 0x6f, 0x6e, 0x63, 0x65, 0x12, 0x35, 0x0a, 0x17, 0x63, 0x72, 1080 0x65, 0x64, 0x5f, 0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x5f, 0x62, 0x79, 0x5f, 1081 0x65, 0x6b, 0x70, 0x75, 0x62, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x14, 0x63, 0x72, 0x65, 1082 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x42, 0x79, 0x45, 0x6b, 0x70, 0x75, 1083 0x62, 0x12, 0x37, 0x0a, 0x18, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x5f, 0x65, 0x6e, 0x63, 0x72, 1084 0x79, 0x70, 0x74, 0x65, 0x64, 0x5f, 0x62, 0x79, 0x5f, 0x63, 0x72, 0x65, 0x64, 0x18, 0x03, 0x20, 1085 0x01, 0x28, 0x0c, 0x52, 0x15, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x45, 0x6e, 0x63, 0x72, 0x79, 1086 0x70, 0x74, 0x65, 0x64, 0x42, 0x79, 0x43, 0x72, 0x65, 0x64, 0x1a, 0x44, 0x0a, 0x15, 0x41, 0x74, 1087 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 1088 0x66, 0x75, 0x6c, 0x12, 0x2b, 0x0a, 0x11, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 1089 0x6f, 0x6e, 0x5f, 0x74, 0x6f, 0x6b, 0x65, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x10, 1090 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x54, 0x6f, 0x6b, 0x65, 0x6e, 1091 0x42, 0x05, 0x0a, 0x03, 0x6d, 0x73, 0x67, 0x42, 0x82, 0x01, 0x0a, 0x17, 0x63, 0x6f, 0x6d, 0x2e, 1092 0x6e, 0x74, 0x74, 0x2e, 0x69, 0x61, 0x6d, 0x2e, 0x70, 0x62, 0x2e, 0x76, 0x31, 0x61, 0x6c, 0x70, 1093 0x68, 0x61, 0x32, 0x42, 0x16, 0x41, 0x74, 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 1094 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x50, 0x00, 0x5a, 0x4d, 0x67, 1095 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x77, 1096 0x61, 0x6e, 0x2f, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x71, 0x2f, 0x69, 0x61, 0x6d, 0x2f, 0x63, 0x6c, 1097 0x69, 0x65, 0x6e, 0x74, 0x2f, 0x76, 0x31, 0x61, 0x6c, 0x70, 0x68, 0x61, 0x32, 0x2f, 0x61, 0x74, 1098 0x74, 0x65, 0x73, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x3b, 0x61, 0x74, 0x74, 0x65, 0x73, 0x74, 1099 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x63, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x62, 0x06, 0x70, 0x72, 1100 0x6f, 0x74, 0x6f, 0x33, 1101 } 1102 1103 var ( 1104 edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescOnce sync.Once 1105 edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescData = edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDesc 1106 ) 1107 1108 func edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescGZIP() []byte { 1109 edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescOnce.Do(func() { 1110 edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescData = protoimpl.X.CompressGZIP(edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescData) 1111 }) 1112 return edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDescData 1113 } 1114 1115 var edgelq_iam_proto_v1alpha2_attestation_custom_proto_enumTypes = make([]protoimpl.EnumInfo, 1) 1116 var edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes = make([]protoimpl.MessageInfo, 7) 1117 var edgelq_iam_proto_v1alpha2_attestation_custom_proto_goTypes = []interface{}{ 1118 (VerifyRequest_AskForChallenge_ChallengeFormat)(0), // 0: ntt.iam.v1alpha2.VerifyRequest_AskForChallenge_ChallengeFormat 1119 (*VerifyRequest)(nil), // 1: ntt.iam.v1alpha2.VerifyRequest 1120 (*VerifyResponse)(nil), // 2: ntt.iam.v1alpha2.VerifyResponse 1121 (*VerifyRequest_AskForChallenge)(nil), // 3: ntt.iam.v1alpha2.VerifyRequest.AskForChallenge 1122 (*VerifyRequest_ChallengeResponse)(nil), // 4: ntt.iam.v1alpha2.VerifyRequest.ChallengeResponse 1123 (*VerifyRequest_ChallengeResponse_Quote)(nil), // 5: ntt.iam.v1alpha2.VerifyRequest.ChallengeResponse.Quote 1124 (*VerifyResponse_Challenge)(nil), // 6: ntt.iam.v1alpha2.VerifyResponse.Challenge 1125 (*VerifyResponse_AttestationSuccessful)(nil), // 7: ntt.iam.v1alpha2.VerifyResponse.AttestationSuccessful 1126 (iam_common.TpmVersion)(0), // 8: ntt.iam.v1alpha2.TpmVersion 1127 (*iam_common.PCR)(nil), // 9: ntt.iam.v1alpha2.PCR 1128 } 1129 var edgelq_iam_proto_v1alpha2_attestation_custom_proto_depIdxs = []int32{ 1130 3, // 0: ntt.iam.v1alpha2.VerifyRequest.ask_for_challenge:type_name -> ntt.iam.v1alpha2.VerifyRequest.AskForChallenge 1131 4, // 1: ntt.iam.v1alpha2.VerifyRequest.challenge_response:type_name -> ntt.iam.v1alpha2.VerifyRequest.ChallengeResponse 1132 6, // 2: ntt.iam.v1alpha2.VerifyResponse.challenge:type_name -> ntt.iam.v1alpha2.VerifyResponse.Challenge 1133 7, // 3: ntt.iam.v1alpha2.VerifyResponse.attestation_successful:type_name -> ntt.iam.v1alpha2.VerifyResponse.AttestationSuccessful 1134 8, // 4: ntt.iam.v1alpha2.VerifyRequest.AskForChallenge.tpm_version:type_name -> ntt.iam.v1alpha2.TpmVersion 1135 0, // 5: ntt.iam.v1alpha2.VerifyRequest.AskForChallenge.challenge_format:type_name -> ntt.iam.v1alpha2.VerifyRequest_AskForChallenge_ChallengeFormat 1136 5, // 6: ntt.iam.v1alpha2.VerifyRequest.ChallengeResponse.quotes:type_name -> ntt.iam.v1alpha2.VerifyRequest.ChallengeResponse.Quote 1137 9, // 7: ntt.iam.v1alpha2.VerifyRequest.ChallengeResponse.pcrs:type_name -> ntt.iam.v1alpha2.PCR 1138 8, // [8:8] is the sub-list for method output_type 1139 8, // [8:8] is the sub-list for method input_type 1140 8, // [8:8] is the sub-list for extension type_name 1141 8, // [8:8] is the sub-list for extension extendee 1142 0, // [0:8] is the sub-list for field type_name 1143 } 1144 1145 func init() { edgelq_iam_proto_v1alpha2_attestation_custom_proto_init() } 1146 func edgelq_iam_proto_v1alpha2_attestation_custom_proto_init() { 1147 if edgelq_iam_proto_v1alpha2_attestation_custom_proto != nil { 1148 return 1149 } 1150 if !protoimpl.UnsafeEnabled { 1151 1152 edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { 1153 switch v := v.(*VerifyRequest); i { 1154 case 0: 1155 return &v.state 1156 case 1: 1157 return &v.sizeCache 1158 case 2: 1159 return &v.unknownFields 1160 default: 1161 return nil 1162 } 1163 } 1164 edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { 1165 switch v := v.(*VerifyResponse); i { 1166 case 0: 1167 return &v.state 1168 case 1: 1169 return &v.sizeCache 1170 case 2: 1171 return &v.unknownFields 1172 default: 1173 return nil 1174 } 1175 } 1176 edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { 1177 switch v := v.(*VerifyRequest_AskForChallenge); i { 1178 case 0: 1179 return &v.state 1180 case 1: 1181 return &v.sizeCache 1182 case 2: 1183 return &v.unknownFields 1184 default: 1185 return nil 1186 } 1187 } 1188 edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { 1189 switch v := v.(*VerifyRequest_ChallengeResponse); i { 1190 case 0: 1191 return &v.state 1192 case 1: 1193 return &v.sizeCache 1194 case 2: 1195 return &v.unknownFields 1196 default: 1197 return nil 1198 } 1199 } 1200 edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { 1201 switch v := v.(*VerifyRequest_ChallengeResponse_Quote); i { 1202 case 0: 1203 return &v.state 1204 case 1: 1205 return &v.sizeCache 1206 case 2: 1207 return &v.unknownFields 1208 default: 1209 return nil 1210 } 1211 } 1212 edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { 1213 switch v := v.(*VerifyResponse_Challenge); i { 1214 case 0: 1215 return &v.state 1216 case 1: 1217 return &v.sizeCache 1218 case 2: 1219 return &v.unknownFields 1220 default: 1221 return nil 1222 } 1223 } 1224 edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { 1225 switch v := v.(*VerifyResponse_AttestationSuccessful); i { 1226 case 0: 1227 return &v.state 1228 case 1: 1229 return &v.sizeCache 1230 case 2: 1231 return &v.unknownFields 1232 default: 1233 return nil 1234 } 1235 } 1236 } 1237 1238 edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[0].OneofWrappers = []interface{}{ 1239 (*VerifyRequest_AskForChallenge_)(nil), 1240 (*VerifyRequest_ChallengeResponse_)(nil), 1241 } 1242 edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes[1].OneofWrappers = []interface{}{ 1243 (*VerifyResponse_Challenge_)(nil), 1244 (*VerifyResponse_AttestationSuccessful_)(nil), 1245 } 1246 type x struct{} 1247 out := protoimpl.TypeBuilder{ 1248 File: protoimpl.DescBuilder{ 1249 GoPackagePath: reflect.TypeOf(x{}).PkgPath(), 1250 RawDescriptor: edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDesc, 1251 NumEnums: 1, 1252 NumMessages: 7, 1253 NumExtensions: 0, 1254 NumServices: 0, 1255 }, 1256 GoTypes: edgelq_iam_proto_v1alpha2_attestation_custom_proto_goTypes, 1257 DependencyIndexes: edgelq_iam_proto_v1alpha2_attestation_custom_proto_depIdxs, 1258 EnumInfos: edgelq_iam_proto_v1alpha2_attestation_custom_proto_enumTypes, 1259 MessageInfos: edgelq_iam_proto_v1alpha2_attestation_custom_proto_msgTypes, 1260 }.Build() 1261 edgelq_iam_proto_v1alpha2_attestation_custom_proto = out.File 1262 edgelq_iam_proto_v1alpha2_attestation_custom_proto_rawDesc = nil 1263 edgelq_iam_proto_v1alpha2_attestation_custom_proto_goTypes = nil 1264 edgelq_iam_proto_v1alpha2_attestation_custom_proto_depIdxs = nil 1265 }