Switch to Open Enclave 0.17.0 rc1 (#2701)

This commit is contained in:
Amaury Chamayou 2021-06-24 14:19:33 +01:00 коммит произвёл GitHub
Родитель 1795848fde
Коммит 5d8f46a92c
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23
13 изменённых файлов: 41 добавлений и 167 удалений

Просмотреть файл

@ -7,7 +7,7 @@ trigger:
jobs:
- job: build_and_publish_docs
container: ccfciteam/ccf-ci:oe0.16.1
container: ccfciteam/ccf-ci:oe0.17.0-rc1
pool:
vmImage: ubuntu-18.04

Просмотреть файл

@ -27,11 +27,11 @@ schedules:
resources:
containers:
- container: nosgx
image: ccfciteam/ccf-ci:oe0.16.1
image: ccfciteam/ccf-ci:oe0.17.0-rc1
options: --publish-all --cap-add NET_ADMIN --cap-add NET_RAW --cap-add SYS_PTRACE -v /dev/shm:/tmp/ccache -v /lib/modules:/lib/modules:ro
- container: sgx
image: ccfciteam/ccf-ci:oe0.16.1
image: ccfciteam/ccf-ci:oe0.17.0-rc1
options: --publish-all --cap-add NET_ADMIN --cap-add NET_RAW --device /dev/sgx:/dev/sgx -v /dev/shm:/tmp/ccache -v /lib/modules:/lib/modules:ro
variables:

Просмотреть файл

@ -23,11 +23,11 @@ schedules:
resources:
containers:
- container: nosgx
image: ccfciteam/ccf-ci:oe0.16.1
image: ccfciteam/ccf-ci:oe0.17.0-rc1
options: --publish-all --cap-add NET_ADMIN --cap-add NET_RAW --cap-add SYS_PTRACE -v /dev/shm:/tmp/ccache
- container: sgx
image: ccfciteam/ccf-ci:oe0.16.1
image: ccfciteam/ccf-ci:oe0.17.0-rc1
options: --publish-all --cap-add NET_ADMIN --cap-add NET_RAW --device /dev/sgx:/dev/sgx -v /dev/shm:/tmp/ccache
jobs:

2
.github/workflows/ci-checks.yml поставляемый
Просмотреть файл

@ -9,7 +9,7 @@ on:
jobs:
checks:
runs-on: ubuntu-18.04
container: ccfciteam/ccf-ci:oe0.16.1
container: ccfciteam/ccf-ci:oe0.17.0-rc1
steps:
- name: Checkout repository

Просмотреть файл

@ -16,7 +16,7 @@ pr:
resources:
containers:
- container: sgx
image: ccfciteam/ccf-ci:oe0.16.1
image: ccfciteam/ccf-ci:oe0.17.0-rc1
options: --publish-all --cap-add NET_ADMIN --cap-add NET_RAW --device /dev/sgx:/dev/sgx -v /dev/shm:/tmp/ccache
jobs:

Просмотреть файл

@ -21,7 +21,7 @@ schedules:
resources:
containers:
- container: sgx
image: ccfciteam/ccf-ci:oe0.16.1
image: ccfciteam/ccf-ci:oe0.17.0-rc1
options: --publish-all --cap-add NET_ADMIN --cap-add NET_RAW --device /dev/sgx:/dev/sgx -v /dev/shm:/tmp/ccache
jobs:

Просмотреть файл

@ -30,7 +30,7 @@ if((NOT ${IS_VALID_TARGET}))
endif()
# Find OpenEnclave package
find_package(OpenEnclave 0.16.1 CONFIG REQUIRED)
find_package(OpenEnclave 0.17.0 CONFIG REQUIRED)
# As well as pulling in openenclave:: targets, this sets variables which can be
# used for our edge cases (eg - for virtual libraries). These do not follow the
# standard naming patterns, for example use OE_INCLUDEDIR rather than

Просмотреть файл

@ -20,7 +20,7 @@ endif()
# CPack variables for Debian packages
set(CPACK_DEBIAN_PACKAGE_DEPENDS
"open-enclave (>=0.16.1), libuv1 (>= 1.18.0), libc++1-8, libc++abi1-8"
"open-enclave (>=0.16.9), libuv1 (>= 1.18.0), libc++1-8, libc++abi1-8"
)
set(CPACK_DEBIAN_FILE_NAME DEB-DEFAULT)

Просмотреть файл

@ -1,6 +1,6 @@
oe_ver: "0.16.1"
oe_ver: "0.17.0-rc1"
# Usually the same, except for rc, where ver is -rc and ver_ is _rc
oe_ver_: "0.16.1"
oe_ver_: "0.17.0_rc1"
# Source install
workspace: "/tmp/"

Просмотреть файл

@ -228,10 +228,12 @@ namespace ccf
if (expected_claim_val_hex != actual_claim_val_hex)
{
LOG_FAIL_FMT(
"{}: JWKS kid {} has a mismatching {} SGX claim",
"{}: JWKS kid {} has a mismatching {} SGX claim: {} != {}",
log_prefix,
jwk.kid,
claim_name);
claim_name,
expected_claim_val_hex,
actual_claim_val_hex);
return false;
}
}

Просмотреть файл

@ -112,11 +112,30 @@ def test_jwt_without_key_policy(network, args):
return network
def make_attested_cert(network, args):
keygen = os.path.join(args.binary_dir, "keygenerator.sh")
oeutil = os.path.join(args.oe_binary, "oeutil")
infra.proc.ccall(
keygen, "--name", "attested", "--gen-enc-key", path=network.common_dir
).check_returncode()
privk = os.path.join(network.common_dir, "attested_enc_privk.pem")
pubk = os.path.join(network.common_dir, "attested_enc_pubk.pem")
der = os.path.join(network.common_dir, "oe_cert.der")
infra.proc.ccall(
oeutil, "generate-evidence", "-f", "cert", privk, pubk, "-o", der
).check_returncode()
pem = os.path.join(network.common_dir, "oe_cert.pem")
infra.proc.ccall(
"openssl", "x509", "-inform", "der", "-in", der, "-out", pem
).check_returncode()
return pem
@reqs.description("JWT with SGX key policy")
def test_jwt_with_sgx_key_policy(network, args):
primary, _ = network.find_nodes()
oe_cert_path = make_attested_cert(network, args)
oe_cert_path = os.path.join(this_dir, "oe_cert.pem")
with open(oe_cert_path) as f:
oe_cert_pem = f.read()
@ -125,7 +144,7 @@ def test_jwt_with_sgx_key_policy(network, args):
matching_key_policy = {
"sgx_claims": {
"signer_id": "ca9ad7331448980aa28890ce73e433638377f179ab4456b2fe237193193a8d0a",
"signer_id": "0db06a8126015c16dcad0f63b5bad4eb031e00fc2d08e2c11cbde3d30071f696",
"attributes": "0300000000000000",
}
}
@ -200,7 +219,7 @@ def test_jwt_with_sgx_key_policy(network, args):
def test_jwt_with_sgx_key_filter(network, args):
primary, _ = network.find_nodes()
oe_cert_path = os.path.join(this_dir, "oe_cert.pem")
oe_cert_path = make_attested_cert(network, args)
with open(oe_cert_path) as f:
oe_cert_pem = f.read()
@ -409,8 +428,9 @@ def run(args):
) as network:
network.start_and_join(args)
network = test_jwt_without_key_policy(network, args)
network = test_jwt_with_sgx_key_policy(network, args)
network = test_jwt_with_sgx_key_filter(network, args)
if args.enclave_type != "virtual":
network = test_jwt_with_sgx_key_policy(network, args)
network = test_jwt_with_sgx_key_filter(network, args)
network = test_jwt_key_auto_refresh(network, args)
# Check that auto refresh also works on backups

Просмотреть файл

@ -1,116 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIVUTCCFDmgAwIBAgIBATANBgkqhkiG9w0BAQsFADA8MRkwFwYDVQQDDBBPcGVu
IEVuY2xhdmUgU0RLMRIwEAYDVQQKDAlPRVNESyBUTFMxCzAJBgNVBAYTAlVTMCAX
DTE5MDUwMTAwMDAwMFoYDzIwNTAxMjMxMjM1OTU5WjA8MRkwFwYDVQQDDBBPcGVu
IEVuY2xhdmUgU0RLMRIwEAYDVQQKDAlPRVNESyBUTFMxCzAJBgNVBAYTAlVTMIIB
IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0IWayEiNub7Cghtsazb8eZng
xfxTlCvprLQJSiJ9M9RsMx6NrhlBfS9BXarm38UlBIm6mdHQuzfkfe+btPPuuJLq
X7aLaAdcaQTkmbZVehMEtFM5h4rj9lDCWmoRBuN8llpLlWuzFYRNghmUNKVr+WKp
iFIpu+icdraM/SGESs3Z+CUNcAq1qmwmMsGnyeKhG+bfrr/lnHt5zDTAtxAoVdr1
FPP+vD/HzVfQl75Rnms7450lo2XSJ8uYXgYE0FdldYNzhdvNO5MDVV3trB9Lj+jm
ie20kDnAccGD8x15z2mZNK7kLGH8U4TtKd7ElnwUbI5RDipSawwBIBeqw+ZNFQID
AQABo4ISWjCCElYwCQYDVR0TBAIwADAdBgNVHQ4EFgQUgh0ArWFgozGTJOkIVlL5
UTZiPBMwHwYDVR0jBBgwFoAUgh0ArWFgozGTJOkIVlL5UTZiPBMwghIHBgkqhkiG
9xQKAQEEghH4AQAAAAIAAADoEQAAAAAAAAMAAgAAAAAABQAKAJOacjP3nEyplAoN
s5V/BgeMnvZ8XHfY0GOKF+MEtvQZAAAAAA8PAwX/gAYAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAAAAAAAAABwAAAAAAAADieP+r5030
g69s9L/fOr3A6LeNO/Lur0ZtVMHvIJLnywAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAyprXMxRImAqiiJDOc+QzY4N38XmrRFay/iNxkxk6jQoAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAEAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAALI3WxXtCS0lfxbTE7kShWuh+2DPAtSRhyOssnUaFnCsAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQQAAB43cDpjHsl25cXdGSpWR1dz+HD
z3hx/Q+vhiqtJ+uZs+7Fc4acIlnxA6gFwn1AW+EiRW6ezFJvqqpNMIx8KBPMRd+z
HAnON8t0e5WKttINbpMruB1qqeKFQfgtIPBCCHb8Kbf4PeWyVd75QTs881YNxRFA
7lfuSTlev7tOOzkszQ8PAwX/gAYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAABUAAAAAAAAABwAAAAAAAABg2Fryi+jRxAoI2YsAnV+KzBOE
o4XPRggA5Hh5HRqXnAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAjE9X
ddeWUD6WE393xoqCmgBWrI3tcBQLCBsJRJDFe/8AAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAUAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeoTg
oTg4yf33oUwpG2+Wu858mDdLLEuKPcPfvBTGbKYAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAESsaMgTR10/mjykQnNGJedhxGmqKE7YpLdnMjUXBSCwsx8f
Tl8sjSQ/InlOXrANy0OXFdInkHFkrOZoZ/XBGckgAAABAgMEBQYHCAkKCwwNDg8Q
ERITFBUWFxgZGhscHR4fBQDMDQAALS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0t
Ck1JSUVnRENDQkNhZ0F3SUJBZ0lVUEY4L0VNeVVIVjNCQ04vMEwzTTNoL3NPeGVn
d0NnWUlLb1pJemowRUF3SXcKY1RFak1DRUdBMVVFQXd3YVNXNTBaV3dnVTBkWUlG
QkRTeUJRY205alpYTnpiM0lnUTBFeEdqQVlCZ05WQkFvTQpFVWx1ZEdWc0lFTnZj
bkJ2Y21GMGFXOXVNUlF3RWdZRFZRUUhEQXRUWVc1MFlTQkRiR0Z5WVRFTE1Ba0dB
MVVFCkNBd0NRMEV4Q3pBSkJnTlZCQVlUQWxWVE1CNFhEVEl3TURneU9USXhNVFkw
TmxvWERUSTNNRGd5T1RJeE1UWTAKTmxvd2NERWlNQ0FHQTFVRUF3d1pTVzUwWld3
Z1UwZFlJRkJEU3lCRFpYSjBhV1pwWTJGMFpURWFNQmdHQTFVRQpDZ3dSU1c1MFpX
d2dRMjl5Y0c5eVlYUnBiMjR4RkRBU0JnTlZCQWNNQzFOaGJuUmhJRU5zWVhKaE1R
c3dDUVlEClZRUUlEQUpEUVRFTE1Ba0dBMVVFQmhNQ1ZWTXdXVEFUQmdjcWhrak9Q
UUlCQmdncWhrak9QUU1CQndOQ0FBUzgKTDJwVWpwUHZnSVJVL0RsbS9OSUZQekY5
Q1dueHpocktRbmxXY1NjYU5YejJYMU1CbGZYb2orVUE0c2s4SnNVWApYR3lINTZr
dWNNakVzL0wrZTFUR280SUNtekNDQXBjd0h3WURWUjBqQkJnd0ZvQVUwT2lxMm5Y
WCtTNUpGNWc4CmV4UmwwTlh5V1Uwd1h3WURWUjBmQkZnd1ZqQlVvRktnVUlaT2FI
UjBjSE02THk5aGNHa3VkSEoxYzNSbFpITmwKY25acFkyVnpMbWx1ZEdWc0xtTnZi
Uzl6WjNndlkyVnlkR2xtYVdOaGRHbHZiaTkyTWk5d1kydGpjbXcvWTJFOQpjSEp2
WTJWemMyOXlNQjBHQTFVZERnUVdCQlM3eDMybXhiamJJdlVJc0J0enFsRjduNHZq
b0RBT0JnTlZIUThCCkFmOEVCQU1DQnNBd0RBWURWUjBUQVFIL0JBSXdBRENDQWRR
R0NTcUdTSWI0VFFFTkFRU0NBY1V3Z2dIQk1CNEcKQ2lxR1NJYjRUUUVOQVFFRUVG
QXF0eUh1NTlVSUhQQ0RzcjdoanJRd2dnRmtCZ29xaGtpRytFMEJEUUVDTUlJQgpW
REFRQmdzcWhraUcrRTBCRFFFQ0FRSUJEekFRQmdzcWhraUcrRTBCRFFFQ0FnSUJE
ekFRQmdzcWhraUcrRTBCCkRRRUNBd0lCQWpBUUJnc3Foa2lHK0UwQkRRRUNCQUlC
QkRBUUJnc3Foa2lHK0UwQkRRRUNCUUlCQVRBUkJnc3EKaGtpRytFMEJEUUVDQmdJ
Q0FJQXdFQVlMS29aSWh2aE5BUTBCQWdjQ0FRWXdFQVlMS29aSWh2aE5BUTBCQWdn
QwpBUUF3RUFZTEtvWklodmhOQVEwQkFna0NBUUF3RUFZTEtvWklodmhOQVEwQkFn
b0NBUUF3RUFZTEtvWklodmhOCkFRMEJBZ3NDQVFBd0VBWUxLb1pJaHZoTkFRMEJB
Z3dDQVFBd0VBWUxLb1pJaHZoTkFRMEJBZzBDQVFBd0VBWUwKS29aSWh2aE5BUTBC
QWc0Q0FRQXdFQVlMS29aSWh2aE5BUTBCQWc4Q0FRQXdFQVlMS29aSWh2aE5BUTBC
QWhBQwpBUUF3RUFZTEtvWklodmhOQVEwQkFoRUNBUW93SHdZTEtvWklodmhOQVEw
QkFoSUVFQThQQWdRQmdBWUFBQUFBCkFBQUFBQUF3RUFZS0tvWklodmhOQVEwQkF3
UUNBQUF3RkFZS0tvWklodmhOQVEwQkJBUUdBSkJ1MVFBQU1BOEcKQ2lxR1NJYjRU
UUVOQVFVS0FRQXdDZ1lJS29aSXpqMEVBd0lEU0FBd1JRSWdZQmdMSzU4SHFHcTVz
WEp0REhMRQpFUDJTSjdFSno1TzRxeWZPejlJZHhhb0NJUUREVlg0MWluOWM0T2Fh
eUFXbU1Ed0NrWFpNeFpUQnF0VnVQU3NPCjVvajZ6dz09Ci0tLS0tRU5EIENFUlRJ
RklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNsekND
QWo2Z0F3SUJBZ0lWQU5Eb3F0cDExL2t1U1JlWVBIc1VaZERWOGxsTk1Bb0dDQ3FH
U000OUJBTUMKTUdneEdqQVlCZ05WQkFNTUVVbHVkR1ZzSUZOSFdDQlNiMjkwSUVO
Qk1Sb3dHQVlEVlFRS0RCRkpiblJsYkNCRApiM0p3YjNKaGRHbHZiakVVTUJJR0Ex
VUVCd3dMVTJGdWRHRWdRMnhoY21FeEN6QUpCZ05WQkFnTUFrTkJNUXN3CkNRWURW
UVFHRXdKVlV6QWVGdzB4T0RBMU1qRXhNRFExTURoYUZ3MHpNekExTWpFeE1EUTFN
RGhhTUhFeEl6QWgKQmdOVkJBTU1Ha2x1ZEdWc0lGTkhXQ0JRUTBzZ1VISnZZMlZ6
YzI5eUlFTkJNUm93R0FZRFZRUUtEQkZKYm5SbApiQ0JEYjNKd2IzSmhkR2x2YmpF
VU1CSUdBMVVFQnd3TFUyRnVkR0VnUTJ4aGNtRXhDekFKQmdOVkJBZ01Ba05CCk1R
c3dDUVlEVlFRR0V3SlZVekJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEw
SUFCTDlxK05NcDJJT2cKdGRsMWJrL3VXWjUrVEdRbThhQ2k4ejc4ZnMrZktDUTNk
K3VEelhuVlRBVDJaaERDaWZ5SXVKd3ZOM3dOQnA5aQpIQlNTTUpNSnJCT2pnYnN3
Z2Jnd0h3WURWUjBqQkJnd0ZvQVVJbVVNMWxxZE5JbnpnN1NWVXI5UUd6a25CcXd3
ClVnWURWUjBmQkVzd1NUQkhvRVdnUTRaQmFIUjBjSE02THk5alpYSjBhV1pwWTJG
MFpYTXVkSEoxYzNSbFpITmwKY25acFkyVnpMbWx1ZEdWc0xtTnZiUzlKYm5SbGJG
TkhXRkp2YjNSRFFTNWpjbXd3SFFZRFZSME9CQllFRk5EbwpxdHAxMS9rdVNSZVlQ
SHNVWmREVjhsbE5NQTRHQTFVZER3RUIvd1FFQXdJQkJqQVNCZ05WSFJNQkFmOEVD
REFHCkFRSC9BZ0VBTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUMvOWorODRUK0h6
dFZPL3NPUUJXSmJTZCsvMnVleEsKNCthQTBqY0ZCTGNwQWlBM2RoTXJGNWNENTJ0
NkZxTXZBSXBqOFhkR215MmJlZWxqTEpLK3B6cGNSQT09Ci0tLS0tRU5EIENFUlRJ
RklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNqakND
QWpTZ0F3SUJBZ0lVSW1VTTFscWROSW56ZzdTVlVyOVFHemtuQnF3d0NnWUlLb1pJ
emowRUF3SXcKYURFYU1CZ0dBMVVFQXd3UlNXNTBaV3dnVTBkWUlGSnZiM1FnUTBF
eEdqQVlCZ05WQkFvTUVVbHVkR1ZzSUVOdgpjbkJ2Y21GMGFXOXVNUlF3RWdZRFZR
UUhEQXRUWVc1MFlTQkRiR0Z5WVRFTE1Ba0dBMVVFQ0F3Q1EwRXhDekFKCkJnTlZC
QVlUQWxWVE1CNFhEVEU0TURVeU1URXdOREV4TVZvWERUTXpNRFV5TVRFd05ERXhN
Rm93YURFYU1CZ0cKQTFVRUF3d1JTVzUwWld3Z1UwZFlJRkp2YjNRZ1EwRXhHakFZ
QmdOVkJBb01FVWx1ZEdWc0lFTnZjbkJ2Y21GMAphVzl1TVJRd0VnWURWUVFIREF0
VFlXNTBZU0JEYkdGeVlURUxNQWtHQTFVRUNBd0NRMEV4Q3pBSkJnTlZCQVlUCkFs
VlRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUVDNm5Fd01ESVla
T2ovaVBXc0N6YUVLaTcKMU9pT1NMUkZoV0dqYm5CVkpmVm5rWTR1M0lqa0RZWUww
TXhPNG1xc3lZamxCYWxUVll4RlAyc0pCSzV6bEtPQgp1ekNCdURBZkJnTlZIU01F
R0RBV2dCUWlaUXpXV3AwMGlmT0R0SlZTdjFBYk9TY0dyREJTQmdOVkhSOEVTekJK
Ck1FZWdSYUJEaGtGb2RIUndjem92TDJObGNuUnBabWxqWVhSbGN5NTBjblZ6ZEdW
a2MyVnlkbWxqWlhNdWFXNTAKWld3dVkyOXRMMGx1ZEdWc1UwZFlVbTl2ZEVOQkxt
TnliREFkQmdOVkhRNEVGZ1FVSW1VTTFscWROSW56ZzdTVgpVcjlRR3prbkJxd3dE
Z1lEVlIwUEFRSC9CQVFEQWdFR01CSUdBMVVkRXdFQi93UUlNQVlCQWY4Q0FRRXdD
Z1lJCktvWkl6ajBFQXdJRFNBQXdSUUlnUVFzLzA4cnljZFBhdUNGazhVUFFYQ01B
bHNsb0JlN053YVFHVGNkcGEwRUMKSVFDVXQ4U0d2eEttanBjTS96MFdQOUR2bzho
Mms1ZHUxaVdEZEJrQW4rMGlpQT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K
ADANBgkqhkiG9w0BAQsFAAOCAQEAdB2EcAp3gXfjlZTNN6vKmm5owWWqqk2fqxga
2Oq6LvRO5ERKga8x8a8ynNZ49w0v2Hter+Bu5kjTr2fICdev+a8F6KOJB6nje7DE
VLHFIfGUkf/GTaryis1VQ6O2qx/hhNT5N81miIf4wr3xvsHkVogDk6kDkYbz7K7t
rw1SQ5iP0khU7d9XyyRfLtVdXPm7UocbtggKDoZgVxDUC8p4kNY4Svlg6EaQV8FO
K/PdHQmhTZEmRYBv+MTubJUVmN42aBTbYLW3hiORdobUiZQ3/AqGfv3+EDo0IfL8
XqKSFbmNW1SVZbQgk0mPyS875kyyGSXeE8Voua4awkCIg1TwDQ==
-----END CERTIFICATE-----

Просмотреть файл

@ -1,32 +0,0 @@
#!/bin/bash
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache 2.0 License.
set -e
if [ -z "$OE_BUILD_DIR" ]; then
echo "OE_BUILD_DIR must be set to the build folder of OE"
exit 1
fi
OECERT_TOOL="$OE_BUILD_DIR/tests/tools/oecert/host/oecert"
OECERT_ENCL="$OE_BUILD_DIR/tests/tools/oecert/enc/oecert_enc"
if [ ! -f "$OECERT_TOOL" ]; then
echo "$OECERT_TOOL not found, did you build with -DBUILD_TESTS=ON?"
exit 1
fi
set -x
openssl genrsa -out oe_cert_key.priv 2048
openssl rsa -in oe_cert_key.priv -outform PEM -pubout -out oe_cert_key.pub
"$OECERT_TOOL" "$OECERT_ENCL" \
--cert oe_cert_key.priv oe_cert_key.pub \
--out oe_cert.der
openssl x509 -inform DER -in oe_cert.der -out oe_cert.pem
openssl x509 -inform DER -in oe_cert.der -text
echo "New attested certificate written to oe_cert.pem"
rm oe_cert_key.priv oe_cert_key.pub oe_cert.der