File tree Expand file tree Collapse file tree 2 files changed +2
-3
lines changed
SampleCode/RemoteAttestation Expand file tree Collapse file tree 2 files changed +2
-3
lines changed Original file line number Diff line number Diff line change @@ -287,7 +287,7 @@ int main(int argc, char* argv[])
287
287
}
288
288
fprintf (OUTPUT, " \n Call sgx_select_att_key_id success." );
289
289
}
290
- // Remote attestation will be initiated the ISV server challenges the ISV
290
+ // Remote attestation will be initiated if the ISV server challenges the ISV
291
291
// app or if the ISV app detects it doesn't have the credentials
292
292
// (shared secret) from a previous attestation required for secure
293
293
// communication with the server.
@@ -741,4 +741,3 @@ int main(int argc, char* argv[])
741
741
getchar ();
742
742
return ret;
743
743
}
744
-
Original file line number Diff line number Diff line change 43
43
// attestation secure channel binding. The public EC key should be hardcoded in
44
44
// the enclave or delivered in a trustworthy manner. The use of a spoofed public
45
45
// EC key in the remote attestation with secure channel binding session may lead
46
- // to a security compromise. Every different SP the enlcave communicates to
46
+ // to a security compromise. Every different SP the enclave communicates to
47
47
// must have a unique SP public key. Delivery of the SP public key is
48
48
// determined by the ISV. The TKE SIGMA protocl expects an Elliptical Curve key
49
49
// based on NIST P-256
You can’t perform that action at this time.
0 commit comments