Historial de Commits

Autor SHA1 Mensaje Fecha
  dettanym c508171e76 Got decryptor working with intel-sgx-ssl libraries without any linker errors. Added in sample ECDHE key and shared secret generation code, key derivation code that worked outside sgx hace 5 años
  dettanym a20b36689c Not working commit of compiling ECDHE key generation code. Correct code is in openssl_ecdhe folder. Linking error of thread functions not defined in stdc keeps throwing up. hace 5 años
  dettanym 6e1febba9c Added in ECDHE key generation code - does not work with 2 implementations on JS side hace 5 años
  dettanym cb9e34027d Added in new interface to send post-LA msgs so we don't need to know the size of msgs beforehand for native read/write sys calls hace 5 años
  dettanym 95ebb52e20 Modified ecalls and interface for post-LA AES encryption and decryption functions. Seems to work hace 5 años
  dettanym 0ee2a787ef Works with verifier + Apache! hace 5 años
  dettanym 4d36ab706b Pre-verification changes - ecdsa verification function remains in decryptor.cpp but is not being called hace 5 años
  dettanym 3e7ec25c87 Got signature to be verified in encrypt_mitigator_header_value - had to change LA function signature to send public key from untrusted app hace 5 años
  dettanym a293868311 Removed bug in ecdsa signature generation for message sent to Apache enclave hace 5 años
  dettanym c13b0dc0b2 Removed repeated code hace 5 años
  dettanym 84ac2070dd Works with sample verifier mrenclave being encrypted and written to Apache. Verification of signature not done yet. hace 5 años
  dettanym db9db9cc96 Post LA encryption works hace 5 años
  dettanym e1f77b314f EDL files - private ecalls are not inter-enclave function calls. For inter-enclave function calls, entries are removed from the edl files. Added in code for verify_peer_enclave_trust to save the mrenclave of the 1st LA and to compare mrsigner to a global one the second time LA is called. Cleaned up unused functions. hace 6 años
  dettanym 5aea4929f0 Removed unused functions in main decryptor code hace 6 años
  dettanym 5268bf9954 Sealed signing keypair 1 hace 6 años
  dettanym 5c090407ec Added in files for modular LA in app. (Forgot to add them in last commit) hace 6 años
  dettanym 74ba6f2f7f Refactored LA code that is outside the enclave hace 6 años
  dettanym 5196f3802a Changed the order of the private and the public key in the serialization and deserialization functions, so that a public key can be serialized for ECDSA signing hace 6 años
  dettanym 514af6f3b3 Can now generate keypair, seal both parts to a file and unseal them, if the file already exists. hace 6 años
  dettanym 06df39a8fd Generated and sealed private key to disk. hace 6 años
  dettanym 53aa094042 Previous commit had a buggy sgx_seal_data implementation - wrong parameters - and no error checking. Fixed that. hace 6 años
  dettanym 62087a9143 Can seal a fixed msg of the same buffer length. can generate keypair. cannot seal keypair yet. hace 6 años
  dettanym 8410c52adb Works with sgx_calc_sealed_data working properly. Had to make it return the uint32_t rather than pass it as a pointer, for some reason. hace 6 años
  dettanym 442b3d1019 Can generate ecdsa keypair now (not seal to disk). hace 6 años
  dettanym 62fddb71db Runs sgx_seal_data with null arguments in the session_request - rightly returns an error. Modified veify_peer_enclave_trust in decryptor.cpp to not run sgx_create_rsa_key_pair hace 6 años
  dettanym 812ae31801 Initial working local attestation commit with the sdk library - version 2.1 hace 6 años