dettanym
|
3e7ec25c87
Got signature to be verified in encrypt_mitigator_header_value - had to change LA function signature to send public key from untrusted app
|
6 years ago |
dettanym
|
a293868311
Removed bug in ecdsa signature generation for message sent to Apache enclave
|
6 years ago |
dettanym
|
c13b0dc0b2
Removed repeated code
|
6 years ago |
dettanym
|
84ac2070dd
Works with sample verifier mrenclave being encrypted and written to Apache. Verification of signature not done yet.
|
6 years ago |
dettanym
|
db9db9cc96
Post LA encryption works
|
6 years ago |
dettanym
|
e1f77b314f
EDL files - private ecalls are not inter-enclave function calls. For inter-enclave function calls, entries are removed from the edl files. Added in code for verify_peer_enclave_trust to save the mrenclave of the 1st LA and to compare mrsigner to a global one the second time LA is called. Cleaned up unused functions.
|
6 years ago |
dettanym
|
5aea4929f0
Removed unused functions in main decryptor code
|
6 years ago |
dettanym
|
5268bf9954
Sealed signing keypair 1
|
6 years ago |
dettanym
|
5c090407ec
Added in files for modular LA in app. (Forgot to add them in last commit)
|
6 years ago |
dettanym
|
74ba6f2f7f
Refactored LA code that is outside the enclave
|
6 years ago |
dettanym
|
5196f3802a
Changed the order of the private and the public key in the serialization and deserialization functions, so that a public key can be serialized for ECDSA signing
|
6 years ago |
dettanym
|
514af6f3b3
Can now generate keypair, seal both parts to a file and unseal them, if the file already exists.
|
6 years ago |
dettanym
|
06df39a8fd
Generated and sealed private key to disk.
|
6 years ago |
dettanym
|
53aa094042
Previous commit had a buggy sgx_seal_data implementation - wrong parameters - and no error checking. Fixed that.
|
6 years ago |
dettanym
|
62087a9143
Can seal a fixed msg of the same buffer length. can generate keypair. cannot seal keypair yet.
|
6 years ago |
dettanym
|
8410c52adb
Works with sgx_calc_sealed_data working properly. Had to make it return the uint32_t rather than pass it as a pointer, for some reason.
|
6 years ago |
dettanym
|
442b3d1019
Can generate ecdsa keypair now (not seal to disk).
|
6 years ago |
dettanym
|
62fddb71db
Runs sgx_seal_data with null arguments in the session_request - rightly returns an error. Modified veify_peer_enclave_trust in decryptor.cpp to not run sgx_create_rsa_key_pair
|
6 years ago |
dettanym
|
812ae31801
Initial working local attestation commit with the sdk library - version 2.1
|
6 years ago |