mirror of
https://github.com/corda/corda.git
synced 2024-12-30 17:57:02 +00:00
f21f8e7142
* Remove diverged copy of 'linux-sgx' * Squashed 'sgx-jvm/linux-sgx/' content from commit 3699ffd5e git-subtree-dir: sgx-jvm/linux-sgx git-subtree-split: 3699ffd5ebd8e79d599301fa2e5814e2386cad2d * ENT-1194 - Executable heap * ENT-1194 - Placeholder for passing of enclave context to create_thread |
||
---|---|---|
.. | ||
.settings | ||
App | ||
Enclave1 | ||
Enclave2 | ||
Enclave3 | ||
Include | ||
LocalAttestationCode | ||
Untrusted_LocalAttestation | ||
.cproject | ||
.project | ||
Makefile | ||
README.txt |
--------------------------- Purpose of LocalAttestation --------------------------- The project demonstrates: - How to establish a protected channel - Secret message exchange using enclave to enclave function calls ------------------------------------ How to Build/Execute the Sample Code ------------------------------------ 1. Install Intel(R) Software Guard Extensions (Intel(R) SGX) SDK for Linux* OS 2. Make sure your environment is set: $ source ${sgx-sdk-install-path}/environment 3. Build the project with the prepared Makefile: a. Hardware Mode, Debug build: $ make b. Hardware Mode, Pre-release build: $ make SGX_PRERELEASE=1 SGX_DEBUG=0 c. Hardware Mode, Release build: $ make SGX_DEBUG=0 d. Simulation Mode, Debug build: $ make SGX_MODE=SIM e. Simulation Mode, Pre-release build: $ make SGX_MODE=SIM SGX_PRERELEASE=1 SGX_DEBUG=0 f. Simulation Mode, Release build: $ make SGX_MODE=SIM SGX_DEBUG=0 4. Execute the binary directly: $ ./app 5. Remember to "make clean" before switching build mode