-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sealed Storage for ECC #421
Comments
// Provided/implemented by a common sealed storage module
void ocall_load(
[in, string] const char *str,
[out, size=max_data_len] uint8_t *data, uint32_t max_data_len
[out] uint32_t *data_len);
void ocall_store(
[in, string] const char *str,
[in, size=data_len] uint8_t *data, uint32_t data_len); |
Presumably, above EDL would, though, be a module-internal API? Or put differently, i suggest the public API used by the rest of ECC would be a (trusted) c functions along the lines of
with ECC_State with a struct (maybe protobuf?) of whatever we want to have sealed (see also #420) and the second function allowing to distinguish via return code whether simply nothing was sealed or there was a processing error. The API/module itself then would then implemented by two libraries -- one in enclave, the other one outside --, connected via above EDL? |
Description
To allow ecc restarts (e.g., due to peer restart, #282, or just ecc external builder getting terminated by peer and restarted), ecc will eventually require to store enclave and cc secrets to sealed storage.
Link to feature or bug
Link to dependent issues
The text was updated successfully, but these errors were encountered: