Unverified Commit 060b4be8 authored by Oleh Nikolaiev's avatar Oleh Nikolaiev

Merge branch 'bug/SKALE-3374-leak-in-bls' of github.com:skalenetwork/sgxwallet...

Merge branch 'bug/SKALE-3374-leak-in-bls' of github.com:skalenetwork/sgxwallet into bug/SKALE-3374-leak-in-bls
parents a02e3018 8accc1fd
...@@ -16,3 +16,7 @@ ...@@ -16,3 +16,7 @@
[submodule "sgx-software-enable"] [submodule "sgx-software-enable"]
path = sgx-software-enable path = sgx-software-enable
url = https://github.com/intel/sgx-software-enable url = https://github.com/intel/sgx-software-enable
[submodule "secure_enclave/secp256k1-sgx"]
path = secure_enclave/secp256k1-sgx
url = https://github.com/bl4ck5un/secp256k1-sgx
branch = master
...@@ -10,4 +10,6 @@ RUN bash -c "make -j$(nproc)" ...@@ -10,4 +10,6 @@ RUN bash -c "make -j$(nproc)"
RUN ccache -sz RUN ccache -sz
RUN mkdir -p /usr/src/sdk/sgx_data RUN mkdir -p /usr/src/sdk/sgx_data
COPY docker/start.sh ./ COPY docker/start.sh ./
RUN rm -rf /usr/src/sdk/sgx-sdk-build/
RUN rm /opt/intel/sgxsdk/lib64/*_sim.so
ENTRYPOINT ["/usr/src/sdk/start.sh"] ENTRYPOINT ["/usr/src/sdk/start.sh"]
...@@ -14,4 +14,10 @@ RUN cd scripts && ./sign_enclave.bash ...@@ -14,4 +14,10 @@ RUN cd scripts && ./sign_enclave.bash
RUN ccache -sz RUN ccache -sz
RUN mkdir -p /usr/src/sdk/sgx_data RUN mkdir -p /usr/src/sdk/sgx_data
COPY docker/start.sh ./ COPY docker/start.sh ./
RUN rm -rf /usr/src/sdk/sgx-sdk-build/
RUN rm /opt/intel/sgxsdk/lib64/*_sim.so
RUN rm /usr/src/sdk/secure_enclave/secure_enclave*.so
RUN cd /usr/src/sdk/secure_enclave && \
curl --output secure_enclave.signed.so \
https://raw.githubusercontent.com/skalenetwork/signed_sgx_enclaves/master/secure_enclave_signed.so.1
ENTRYPOINT ["/usr/src/sdk/start.sh"] ENTRYPOINT ["/usr/src/sdk/start.sh"]
...@@ -15,5 +15,6 @@ RUN ./autoconf.bash && \ ...@@ -15,5 +15,6 @@ RUN ./autoconf.bash && \
mkdir -p /usr/src/sdk/sgx_data mkdir -p /usr/src/sdk/sgx_data
COPY docker/start.sh ./ COPY docker/start.sh ./
RUN rm -rf /usr/src/sdk/sgx-sdk-build/
ENTRYPOINT ["/usr/src/sdk/start.sh"] ENTRYPOINT ["/usr/src/sdk/start.sh"]
...@@ -149,7 +149,7 @@ int SGXWalletServer::initHttpsServer(bool _checkCerts) { ...@@ -149,7 +149,7 @@ int SGXWalletServer::initHttpsServer(bool _checkCerts) {
int numThreads = 64; int numThreads = 64;
#if SGX_MODE == SIM #ifdef SGX_HW_SIM
numThreads = 16; numThreads = 16;
#endif #endif
...@@ -654,12 +654,12 @@ Json::Value SGXWalletServer::complaintResponseImpl(const string &_polyName, int ...@@ -654,12 +654,12 @@ Json::Value SGXWalletServer::complaintResponseImpl(const string &_polyName, int
} }
} }
for (int i = 0; i < _n; i++) { for (int i = 0; i < _n; i++) {
string name = _polyName + "_" + to_string(i) + ":"; string name = _polyName + "_" + to_string(i) + ":";
LevelDB::getLevelDb()->deleteDHDKGKey(name); LevelDB::getLevelDb()->deleteDHDKGKey(name);
string shareG2_name = "shareG2_" + _polyName + "_" + to_string(i) + ":"; string shareG2_name = "shareG2_" + _polyName + "_" + to_string(i) + ":";
LevelDB::getLevelDb()->deleteKey(shareG2_name); LevelDB::getLevelDb()->deleteKey(shareG2_name);
} }
LevelDB::getLevelDb()->deleteKey(_polyName); LevelDB::getLevelDb()->deleteKey(_polyName);
string encryptedSecretShareName = "encryptedSecretShare:" + _polyName; string encryptedSecretShareName = "encryptedSecretShare:" + _polyName;
......
...@@ -101,7 +101,7 @@ BOOST_THROW_EXCEPTION(runtime_error(__ERR_STRING__)); \ ...@@ -101,7 +101,7 @@ BOOST_THROW_EXCEPTION(runtime_error(__ERR_STRING__)); \
extern std::shared_timed_mutex sgxInitMutex; extern std::shared_timed_mutex sgxInitMutex;
extern uint64_t initTime; extern uint64_t initTime;
#if SGX_MODE == SIM #ifdef SGX_HW_SIM
#define ENCLAVE_RESTART_PERIOD_S 5 #define ENCLAVE_RESTART_PERIOD_S 5
#else #else
#define ENCLAVE_RESTART_PERIOD_S 60 * 10 #define ENCLAVE_RESTART_PERIOD_S 60 * 10
......
...@@ -28,7 +28,7 @@ cd /usr/src/sdk; ...@@ -28,7 +28,7 @@ cd /usr/src/sdk;
if [[ -f "/var/hwmode" ]] if [[ -f "/var/hwmode" ]]
then then
echo "Running in SGX hardware mode" echo "Running in SGX hardware mode"
export LD_LIBRARY_PATH=${LD_LIBRARY_PATH}:/opt/intel/sgxpsw/aesm/ export LD_LIBRARY_PATH=/usr/src/sdk/secure_enclave:${LD_LIBRARY_PATH}:/opt/intel/sgxpsw/aesm
jhid -d jhid -d
/opt/intel/sgxpsw/aesm/aesm_service & /opt/intel/sgxpsw/aesm/aesm_service &
pid=$! pid=$!
......
Subproject commit adf9682b69694ca2c64b5997e04ee1bb885c511c Subproject commit 82884ec89e84539f25af206a0148ca34c35e078f
Subproject commit 5f235e8e9e821cd972c4a57afdfe47a7fe83acd0
...@@ -163,7 +163,7 @@ void trustedEnclaveInit(uint64_t _logLevel) { ...@@ -163,7 +163,7 @@ void trustedEnclaveInit(uint64_t _logLevel) {
LOG_INFO("SECURITY WARNING: sgxwallet is running in INSECURE DEBUG MODE! NEVER USE IN PRODUCTION!"); LOG_INFO("SECURITY WARNING: sgxwallet is running in INSECURE DEBUG MODE! NEVER USE IN PRODUCTION!");
#endif #endif
#if SGX_MODE == SIM #ifdef SGX_HW_SIM
LOG_INFO("SECURITY WARNING: sgxwallet is running in INSECURE SIMULATION MODE! NEVER USE IN PRODUCTION!"); LOG_INFO("SECURITY WARNING: sgxwallet is running in INSECURE SIMULATION MODE! NEVER USE IN PRODUCTION!");
#endif #endif
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment