ehsm
ehsm copied to clipboard
An End-to-End Distributed and Scalable Cloud KMS (Key Management System) built on top of Intel SGX enclave-based HSM (Hardware Security Module), aka eHSM.
these restful API will be adjusted: POST /ehsm?Action= CreateKey Encrypt Decrypt AsymmetricEncrypt AsymmetricDecrypt Sign Verify GenerateDataKey GenerateDataKeyWithoutPlaintext ExportDataKey test: passed the unittest Signed-off-by: wanghouqi
If I need to enable secret data encryption like KMS,
Reject Restful APIs from the blacklisted callers
these restful API will be adjusted: POST /ehsm?Action= CreateKey Encrypt Decrypt AsymmetricEncrypt AsymmetricDecrypt Sign Verify GenerateDataKey GenerateDataKeyWithoutPlaintext ExportDataKey test: passed the Python test Signed-off-by: wanghouqi
remove sgx mounts of k8s, Because K8S natively supports sgx. Signed-off-by: wanghouqi
- update Kubernetes version to 1.23.5, because 1.19.0 does not support sgx device plugin - add Step 6 for SGX Device Plugin for Kubernetes test passed the K8S cluster Signed-off-by:...
dkeyserver, dkeycache, kms suport readinessProbe and livenessProbe test passed the K8S Signed-off-by: wanghouqi
Update docs for k8s deployment
Hello~ # Heap OOB `enclave_decrypt` defined in EDL set `cmk_size` as `cmk`'s size, but attacker can feed `cmk_size` smaller then `sizeof(ehsm_keyblob_t)`, and TBridge only `malloc` `cmk_size` for it. ```c public...