Search Results for

    Show / Hide Table of Contents

    Intel Trust Authority Go Connector

    · 05/16/2025 ·

    The Intel® Trust Authority client and related TEE adapters encapsulate all the functions needed to collect evidence, package it as a quote, and obtain an attestation token from the Intel Trust Authority service. The client modules are designed to be used by both attesters and relying parties.

    The Intel Trust Authority Go client modules, build, and installation instructions are on GitHub at intel/trustauthority-client-for-go. The main branch contains the latest release. Intel Trust Authority Go client code is open source. The client code is a good source of examples that show how to use the following API functions.

    Note

    We are transitioning from manually created API documentation (this article) to Go Package documentation generated from comments in the codebase. For more information, see Intel Trust Authority Client for Go package documentation on pkg.go.dev. The package documentation is more complete than this documentation. The API documentation will be removed from this article in a future release.

    Go client API index

    go-connector APIs

    Attest
    Collects evidence and requests an attestation token from Intel Trust Authority for clients using a Passport validation model.

    GetNonce
    Retrieves a signed nonce and parses it to JSON.

    GetToken
    Requests an attestation token from Intel Trust Authority. GetToken Provides more control than Attest, by allowing a confidential app to include user data, provide a nonce, and modify evidence structures before requesting a token. GetToken supports both Passport and Background-check attestation models.

    GetTokenSigningCertificates
    Retrieves a JSON Web Key Set (JWKS) that contains the collection of signing certificates used by Intel Trust Authority to sign attestation tokens.

    VerifyToken
    Verifies that an Intel Trust Authority attestation token is properly formatted and signed.

    go-sgx APIs

    CollectEvidence
    Collects evidence from an Intel SGX enclave and formats it as a quote for attestation.

    NewEvidenceAdapter
    Instantiates a new Intel SGX Go adapter.

    go-tdx APIs

    NewEventLogParser
    Reads and parses the ACPI event log that contains TD startup events.

    NewEvidenceAdapter
    Instantiates a new Intel TDX evidence collection adapter.

    CollectEvidence
    Collects evidence from an Intel TDX TD and formats it as a quote for attestation.

    Decrypt
    Decrypts an encrypted binary object.

    GenerateKeyPair
    Creates an RSA key pair. The default key length is 3072 bits.

    GetEventLogs
    Gets the TD event logs containing the events that were used to create the RMTR(0-3) hash data.

    go-nvgpu APIs

    NewCompositeEvidenceAdapter
    Creates a new composite evidence adapter for Intel TDX and GPU evidence.

    GetEvidence
    Gets evidence from the GPU.

    GetEvidenceIdentifier
    Gets the evidence identifier, currently set to "nvgpu".

    GPUAttester
    Gets evidence from a remote GPU attester.

    GPUEvidence
    Returns the GPU evidence collected from the attester.

    go-AMD APIs

    Note

    AMD SEV-SNP attestation is in limited preview status. Details of implementation and usage may change before general availability. Contact your Intel representative for access.

    CollectEvidence
    is used to retrieve the SEV-SNP report.

    Go client library structure

    go-connector is responsible for creating a secure connection to Intel Trust Authority and invoking the attestation-related REST APIs. go-connector is usable by confidential computing clients and relying parties. The only prerequisites are Go and the correct URLs, API key, and TLS configuration.

    go-sgx is required to collect evidence (quote) from an Intel SGX enclave. go-sgx requires Intel SGX DCAP and an Intel SGX-enabled platform.

    go-tdx is required to collect evidence from an Intel® TDX trust domain. There are currently two variants of go-tdx, with more in development:

    • Intel TDX platform adapter — For on-premise and cloud platforms using the Intel TDX stack and PSW. This version of go-tdx is in the main branch of the client repo.
    • Azure confidential VMs for Intel TDX adapter — For TDs running on Azure confidential VMs with Intel TDX platform only. This is a fork of the Intel TDX adapter customized to work with Azure's implementation of Intel. This adapter requires the TPM2 TSS library, but does not require Intel SGX DCAP. This version of go-tdx is in the azure-tdx-preview branch of the client repo.

    go-amd is required to collect the required measurement data from AMD SEV-SNP hardware platforms for and during the remote attestation process and ensure integration into the existing attestation workflow.

    Basic attestation API workflow

    The basic attestation workflow is as follows. Many variations are possible. With the exception of Attest, which requires a TEE adapter, all the APIs are usable by both the attester and the relying party (RP).

    1. New — create a new Connector for Intel Trust Authority SaaS.
    2. NewEvidenceAdapter — an attesting TEE needs to create a new evidence adapter. (RPs skip this step).
    3. Intel TDX clients must call NewEventLogParser to get the ACPI tables before creating a new adapter.
    4. Attest — simplest use case for attesters using the Passport attestation model. Gets a nonce, collects evidence, and requests an attestation token. If successful, it returns an attestation token.
    5. GetNonce — gets a nonce to be included with the quote in the request for attestation.
    6. (EvidenceAdapter) CollectEvidence — Collects evidence for a quote. The attester can add TEE or application user data to the evidence collected from the TEE.
    7. GetToken — after being given a nonce, evidence collected from the TEE, and optional user data, requests an attestation token (JWT) from Intel Trust Authority.
    8. VerifyToken — after being given an attestation token, it checks that the token is properly formatted and signed by Intel Trust Authority.
    9. GetTokenSigningCertificates — retrieves a JWKS containing the signing certificates used to sign nonces and JWTs.

    The other APIs are used as needed by TEE attesters and RPs.

    go-connector API

    To use the connector, you must first set values for the connector configuration and retry configuration, then create a new connector instance, as shown in the following code fragment.

    There are two Intel Trust Authority deployment regions: European Union (EU) region, > and a global region for all other countries. There are different BaseUrl and ApiUrl for each region, as follows:

    Region BaseUrl ApiUrl
    EU https://portal.eu.trustauthority.intel.com https://api.eu.trustauthority.intel.com
    World/US https://portal.trustauthority.intel.com api.trustauthority.intel.com
    import "github.com/intel/trustauthority-client-for-go/go-connector"
    
    cfg := connector.Config{
            // The Intel Trust Authority base URL.
            BaseUrl: "https://portal.trustauthority.intel.com",
            // The Intel Trust Authority API URL.
            ApiUrl: "https://api.trustauthority.intel.com",
            // Provide TLS config.
            TlsCfg: &tls.Config{},
            // Replace TRUSTAUTHORITY_API_KEY with a real API key.
            ApiKey: "TRUSTAUTHORITY_API_KEY",
            // Provide Retry config
            RClient: &RetryConfig{},
    }
    
    retryCfg := connector.RetryConfig{
            // Minimum time to wait; default is 2s.
            RetryWaitMin:
            // Maximum time to wait; default is 10s.
            RetryWaitMax:
            // Maximum number of retries; default is 2.
            RetryMax:
            // CheckRetry specifies the policy for handling retries, and is called
            // after each request. Default retries when HTTP status code is one among 500, 503, and 504
            // and when there is a client timeout or if a service is unavailable.
            CheckRetry:
            // Backoff specifies the policy for how long to wait between retries, default is DefaultBackoff, which 
            // provides a default callback for Backoff which will perform exponential backoff based on the attempt
            // number and limited by the provided minimum and maximum durations.
            BackOff:
    }
    
    connector, err := connector.New(&cfg)
    

    Attest

    Attest provides a relatively simple method to obtain an attestation token for the client.

    func (connector *trustAuthorityConnector) Attest(args AttestArgs) (AttestResponse, error)
    

    Parameters

    Name Datatype Description
    Args AttestArgs A type structure that holds the request parameters needed for attestation.
    AttestArgs.Adapter EvidenceAdapter
    AttestArgs.PolicyIds []uuid.UUID An optional array of up to ten policy IDs to apply during attestation.
    AttestArgs.RequestId string An optional RequestID.
    AttestArgs.TokenSigningAlg string An optional value to specify the token signing algorithm. Allowed values are { "PS384" | "RS256" }; the default is PS384.
    AttestArgs.PolicyMustMatch bool An optional value that overrides the default token issuance behavior. If set to true, all supplied policies must match for a token to be issued. If set to false or omitted, an attestation token will be issued unless an error occurs. For more information, see Policy results.

    Returns

    Name Datatype Description
    AttestResponse type A type structure that contains the JWT and HTTP response headers.
    AttestResponse.Token string A base64-encoded attestation token (JWT).
    AttestResponse.Headers http.Header The HTTP response headers returned from Intel Trust Authority.

    Usage

    Attest is designed for a passport attestation model where the attester wants to get a token and doesn't need to append user data to evidence. The attester only needs to create a new Intel Trust Authority client connection and evidence adapter before calling Attest. If you need to include user data with the evidence, see GetToken.

    If you don't provide policy IDs, the policies (if any) associated with the API key are used. If you do provide a list of policy IDs, the supplied policies replace the associated policies, which are not evaluated at all.

    If you don't provide a request ID, the API gateway will generate a random ID that isn't guaranteed to be unique.

    The TokenSigningAlg option lets you choose a signing algorithm (RS256) that is less computationally intensive than PS384, or for compatibility with other systems.

    Attest performs the following actions:

    • Gets a nonce from Intel Trust Authority.
    • Collects evidence by using the TEE adapter.
    • Forwards the evidence and policy IDs to Intel Trust Authority.
    • Returns an attestation token and HTTP response headers.

    Example

    req := connector.AttestArgs{
        Adapter:   adapter,
        PolicyIds: policyIds,
        RequestId: reqId,
    }
    resp, err := connector.Attest(req)
    if err != nil {
        return err
    }
    

    GetNonce

    GetNonce retrieves a signed nonce from Intel Trust Authority.

    func (connector *trustAuthorityConnector) GetNonce(args GetNonceArgs) (GetNonceResponse, error)
    

    Parameters

    Name Datatype Description
    args GetNonceArgs A GetNonceArgs structure that contains an optional RequestID to associate with the request for a nonce.

    Returns

    Name Datatype Description
    args GetNonceArgs A GetNonceArgs structure that contains an optional RequestID to associate with the request for a nonce.

    A GetNonceResponse structure that contains the nonce (val, iat, and signature) and HTTP response headers.

    Example

    req := connector.GetNonceArgs{
        RequestId: reqId,
    }
    resp, err := connector.GetNonce(req)
    if err != nil {
        fmt.Printf("Something bad happened: %s\n\n", err)
        return err
    }
    

    GetToken

    Requests a new Intel Trust Authority attestation token.

    func (connector *trustAuthorityConnector) GetToken(args GetTokenArgs) (GetTokenResponse, error)
    

    Parameters

    Name Datatype Description
    GetTokenArgs.Nonce *VerifierNonce
    GetTokenArgs.Evidence *Evidence An evidence structure returned from a TEE adapter. Evidence contains the quote for attestation.
    GetTokenArgs.PolicyIds []uuid.UUID An optional array of up to ten policy IDs to apply during attestation.
    GetTokenArgs.RequestId string An optional RequestID.
    GetTokenArgs.TokenSigningAlg string An optional value to specify the token signing algorithm. Allowed values are { "PS384" | "RS256" }; the default is PS384.
    GetTokenArgs.PolicyMustMatch bool An optional value that overrides the default token issuance behavior. If set to true, all supplied policies must match for a token to be issued. If set to false or omitted, an attestation token will be issued unless an error occurs. For more information, see Policy results.

    Returns

    Name Datatype Description
    GetTokenResponse type A type structure that contains the JWT and HTTP response headers.
    GetTokenResponse.Token string A base64-encoded attestation token (JWT).
    GetTokenResponse.Headers http.Header The HTTP response headers returned from Intel Trust Authority.

    Usage

    GetToken is for complex scenarios where Attest doesn't provide enough flexibility. GetToken provides more control than Attest by allowing a confidential app to include user_data, provide a nonce, or modify evidence structures before requesting a token. GetToken supports both Passport and Background-check validation models.

    Example

    req := connector.GetTokenArgs{
        Nonce:     nonce,
        Evidence:  evidence,
        PolicyIds: policyIds,
        RequestId: reqId,
        TokenSigningAlg: alg,
        PolicyMustMatch: matchFlag,
    }
    resp, err := connector.GetToken(req)
    if err != nil {
        fmt.Printf("Something bad happened: %s\n\n", err)
        return err
    }
    

    GetTokenSigningCertificates

    GetTokenSigningCertificates retrieves a JSON Web Key Set (JWKS) that contains the collection of signing certificates (in JWT format) used by Intel Trust Authority to sign attestation tokens and nonces.

    func (connector *trustAuthorityConnector) GetTokenSigningCertificates() ([]byte, error)
    

    Parameters

    GetTokenSigningCertificates doesn't take any input.

    Returns

    A JWKS. Use the kid claim to find the JWK used to sign the token.

    Example

    jwks, err := connector.GetTokenSigningCertificates()
    if err != nil {
        fmt.Printf("An error ocurred: %s\n\n", err)
        return err
    }
    

    VerifyToken

    Verifies the attestation token to ensure that the token is generated from a genuine Intel Trust Authority attestation service.

    func (connector *trustAuthorityConnector) VerifyToken(token string) (*jwt.Token, error)
    

    Parameters

    Name Datatype Description
    token sting A complete attestation token in base64-encoded string format.

    Returns

    Example

    parsedToken, err := connector.VerifyToken(string(token))
    if err != nil {
        fmt.Printf("An error ocurred: %s\n\n", err)
        return err
    }
    

    go-sgx adapter API reference

    Prior to integrating an Intel® SGX workload with the Intel® Trust Authority client, the workload must implement a function to generate an enclave report. This function should take the SHA256 hash of the nonce and user data to form report data for the sgx_create_report API. The Intel Trust Authority Attestation Service performs a report data verification where it expects the report data to be a SHA256 hash of nonce and user_data.

    import "github.com/intel/trustauthority-client-for-go/go-sgx"
    

    The following code fragment creates a new Go SGX adapter and uses it to collect a quote from the SGX TEE.

    import "github.com/intel/trustauthority-client-for-go/go-sgx"
    
    adapter, err := sgx.NewEvidenceAdapter(enclaveId, enclaveHeldData, unsafe.Pointer(C.enclave_create_report))
    if err != nil {
        return err
    }
    
    evidence, err := adapter.CollectEvidence(nonce)
    if err != nil {
        return err
    }
    

    NewEvidenceAdapter (Intel SGX)

    NewAdapter returns a new Intel SGX TEE adapter instance.

    func NewEvidenceAdapter(eid uint64, udata []byte, reportFunction unsafe.Pointer) (connector.EvidenceAdapter, error)
    

    Parameters

    Name Datatype Description
    eid uint64 Enclave ID, a unique identifier for the enclave, set by the developer at compile time.
    udata []byte Optional user data, sometimes called enclave held data.
    reportFunction unsafe.Pointer A pointer to the sgx_create_report function.

    Returns

    An EvidenceAdapter structure.

    CollectEvidence (Intel SGX)

    CollectEvidence is used to get a quote from an Intel SGX enclave using Intel® SGX DCAP.

    func (adapter *sgxAdapter) CollectEvidence(nonce []byte) (*connector.Evidence, error)
    

    Parameters

    Name Datatype Description
    nonce []byte An Intel Trust Authority nonce in base64-encoded format.

    Returns

    An Evidence structure that contains the quote for attestation.

    go-tdx adapter API reference

    The Intel® Trust Authority Intel® TDX Attestation client includes a Go client and a CLI for use on the command line or by languages other than Go, enabling you to use Intel TDX remote attestation in your application.

    There are currently two variants of the Intel Trust Authority go-tdx adapter, as explained below. Some details of an Intel TDX client implementation for CSP platforms are different than the "standard" Intel TDX TCB that runs on a hosted server or on-premises server. CSP platforms require a customized adapter to map CSP implementations to the requirements of Intel Trust Authority's evidence verification service. Intel Trust Authority go-tdx adapters differ mainly in terms of how the evidence collected from the TD is combined with user data (if supplied) and hashed for verification. Nearly all of the API functions are identical across adapters, but where there's a difference in behavior, it's described in the API's Usage section.

    Intel Trust Authority go-tdx variants

    • go-tdx for Intel TDX-enabled platforms. Code for this adapter is located in intel/trustauthority-client-for-go/go-tdx on the main branch.
    • go-tdx for Microsoft Azure confidential VMs with Intel TDX. Code for the Azure adapter is located in intel/trustauthority-client-for-go/go-tdx on the azure_tdx_preview branch.

    The go-tdx adapter for Azure confidential VMs with Intel TDX varies from the Intel TDX stack in the following ways.

    • The tdreport.report_data hash doesn't measure user data. It only measures the Azure TD runtime data provided by the Azure "paravisor" component.
    • Azure TD runtime data is always a JSON object literal.
    • If the user data is JSON, it's output as JSON in the attester_user_data claim. If the user data is binary, it's output in the attester_held_data claim as base64-encoded data.
    • Intel Trust Authority requires a hash of the runtime data to be present in the TDREPORT.report_data field. The customized go-tdx adapter for Azure TD handles the logic to retrieve the runtime data from the paravisor. The Azure TD runtime data has a predefined (JSON) data structure, which includes a 64-byte user-data field. The customized go-tdx adapter for Azure TD uses runtime_data.user-data field to hold the hash (SHA512) of the original user-provided data and nonce (if any).
    • A new API endpoint is available to support Azure TDX attestation: api.trusthauthority.com/appraisal/v1/attest/tdxvm This API accepts a user_data parameter in the request:
        {
        "quote":"<tdx-quote>",
        "runtime_data": "<paravisor runtime data>",
        "policy_ids":[<policy_ids>],
        "verifier_nonce": [<verifier nonce>],
        "user_data": "<user-provided data>"
        }
    
    • TDREPORT.report_data is used to verify the integrity of runtime data. (This is common to both go-tdx adapters). A SHA256 hash is calculated from runtime data, then stored in the lower 32 bytes of the TDREPORT.report_data field.

    Example

    The following code fragment creates a new TDX adapter and then collects evidence for a quote. This sample assumes that you have previously obtained a nonce for CollectEvidence.

    import "github.com/intel/trustauthority-client/go-tdx"
    
    evLogParser := tdx.NewEventLogParser()
    adapter, err := tdx.NewEvidenceAdapter(tdHeldData, evLogParser)
    if err != nil {
        return err
    }
    
    evidence, err := adapter.CollectEvidence(nonce)
    if err != nil {
        return err
    }
    

    NewEventLogParser

    NewEventLogParser initializes an instance of EventLogParser, which manages the event log collection from a trust domain by reading either the ACPI (Advanced Configuration and Power Interface) tables or an EFI (Extensible Firmware Interface) file containing event log data. The event log for a trust domain is stored in ACPI tables.

    func NewEventLogParser() EventLogParser
    

    Parameters

    NewEventLogParser doesn't take any input.

    Example

    evLogParser := tdx.NewEventLogParser()
    eventLog, err := evLogParser.GetEventLogs()
    if err != nil {
        return err
    }
    

    NewEvidenceAdapter (Intel TDX)

    NewEvidenceAdapter initializes an instance of TdxAdapter, which manages the quote collection from a trust domain (TD). TdxAdapter is also responsible for collecting the event log for a TD.

    func NewEvidenceAdapter(udata []byte, evLogParser EventLogParser) (connector.EvidenceAdapter, error)
    

    Parameters

    Name Datatype Description
    udata Input Optional user data to be included in the evidence.
    evLogParser Input An event log parser instance opens and parses the UEFI event log device file.

    Example

    The following code snippet shows how to create a new Go TDX adapter and then use the adapter to collect a quote from the TDX-enabled platform.

    adapter, err := tdx.NewEvidenceAdapter(tdHeldData, nil)
    if err != nil {
        return err
    }
    

    CollectEvidence (Intel TDX)

    CollectEvidence Collects a quote from the Intel TDX trust domain. It takes a nonce as input, which is hashed (along with user data, if supplied) during trust domain report creation. The SHA512 hash of nonce + user data is stored in TDREPORT.report_data, which is output in the attestation token in the tdx_report_data claim. Intel Trust Authority requires the report_data hash for quote verification, and custom clients must ensure that the hash is present.

    func (adapter *tdxAdapter) CollectEvidence(nonce []byte) (*connector.Evidence, error)
    

    Parameters

    Name I/O Description
    nonce Input An Intel Trust Authority nonce.

    Additionally, user_data can be added to the evidence by including it in the tdxAdapter.uData field.

    Returns

    If successful, CollectEvidence returns an Evidence structure; otherwise, it returns an error.

    Decrypt

    Decrypt takes encrypted data as input and decrypts the data using the private key that is passed in the EncryptionMetadata. The Decrypt API returns a byte array containing decrypted data in case of success, else error in case of failure.

    func Decrypt(encryptedData []byte, em *EncryptionMetadata) ([]byte, error)
    

    Parameters

    Name I/O Description
    encryptedData Input An encrypted binary object.
    em Input An encryption metadata structure containing three fields:
    PrivateKey — An optional byte array containing the private key to use for decryption.
    PrivateKeyLocation — An optional parameter containing the path to the private key file. Either the PrivateKey or PrivateKeyLocation must be provided.
    HashAlgorithm — A string value ["SHA256" | "SHA384" | "SHA512" | "SM3_256" ] that identifies the hash algorithm.

    Returns

    The decrypted object as a byte array.

    Example

    The following snippet shows how to decrypt an encrypted blob.

    em := &tdx.EncryptionMetadata{
    	PrivateKeyLocation: privateKeyPath,
    	HashAlgorithm:      "SHA256",
    }
    decryptedData, err := tdx.Decrypt(encryptedData, em)
    if err != nil {
        fmt.Printf("Something bad happened: %s\n\n", err)
        return err
    }
    

    GenerateKeyPair

    GenerateKeyPair is used to create a private key based on key metadata.

    func GenerateKeyPair(km *KeyMetadata) ([]byte, []byte, error)
    

    Parameters

    Name I/O Description
    km Input A KeyMetadata structure. KeyMetadata.KeyLength contains the length in bits of the key to generate.

    Returns

    Two byte arrays: The first value is the private key, and the second value is the public key.

    Example

    km := &tdx.KeyMetadata{
    	KeyLength: 3072,
    }
    privateKeyPem, publicKeyPem, err := tdx.GenerateKeyPair(km)
    if err != nil {
        fmt.Printf("Something bad happened: %s\n\n", err)
        return err
    }
    

    GetEventLogs

    The GetEventLogs API returns a trust domain event log in the form of JSON. The trust domain event log consists of all the events that get measured to all the four RTMRs in order. The TD event log can be used to verify the integrity of RTMRs (Real-Time Monitoring and Response) by replaying all the event measurements in order.

    func (parser *fileEventLogParser) GetEventLogs() ([]RtmrEventLog, error)
    

    Parameters

    GetEventLogs does not take any input.

    Returns

    The TD event log as a JSON object literal.

    Example

    The following snippet collects the event log from a TD.

    evLogParser := sevsnp.NewEventLogParser()
    eventLog, err := evLogParser.GetEventLogs()
    if err != nil {
        return err
    }
    

    go-nvgpu adapter API reference

    Package nvgpu

    gpu_adapter.go

    import "github.com/intel/trustauthority-client/go-nvgpu"
    

    NewCompositeEvidenceAdapter

    Creates a new composite evidence adapter, used to collect a combined quote for both the GPU and CVM.

    func NewCompositeEvidenceAdapter(opts ...Option) connector.CompositeEvidenceAdapter
    

    GetEvidence

    Gets evidence (a quote) from the GPU.

    func (adapter *GPUAdapter) GetEvidence(verifierNonce *connector.VerifierNonce, userData []byte) (any, error)
    

    GetEvidenceIdentifier

    Currently set to return "nvgpu".

    func (*GPUAdapter) GetEvidenceIdentifier() string
    

    GPUAttester

    Gets evidence (a quote) from the remote GPU attester.

    type GPUAttester interface {
        GetRemoteEvidence([]byte) ([]gonvtrust.RemoteEvidence, error)
    }
    

    GPUEvidence

    Contains the evidence collected from the GPU, signing certificate, and nonces.

    type GPUEvidence struct {
        Evidence      string                   `json:"evidence"`
        Certificate   string                   `json:"certificate"`
        Nonce         string                   `json:"gpu_nonce"`
        VerifierNonce *connector.VerifierNonce `json:"verifier_nonce, omitempty"`
        Arch          string                   `json:"arch"`
    }
    

    go-amd adapter API reference

    Note

    This feature is in limited preview status. Details of implementation and usage may change before general availability. Contact your Intel representative for access.

    CollectEvidence (AMD)

    CollectEvidence is used to retrieve an SEV-SNP report using an SEV-SNP guest driver in the VM.

    Note

    CollectEvidence follows different internal logic depending on which Intel AMD SEVSNP platform you're using. Some CSPs customize the base Intel AMD SEVSNP stack for their platform, which requires a modified go-amd to match the requirements for Intel Trust Authority quote verification. Ensure that you are using the correct adapter for your Intel AMD SEVSNP platform.

    func (adapter *sevsnpAdapter) CollectEvidence(nonce []byte) (*connector.Evidence, error) 
    

    Parameters

    Name I/O Description
    nonce Input An Intel Trust Authority nonce.

    Returns

    If successful, CollectEvidence returns an Evidence structure; otherwise, it returns an error.

    In this article
    Back to top Notice & Disclaimer