mirror of
https://github.com/corda/corda.git
synced 2024-12-29 09:18:58 +00:00
f21f8e7142
* Remove diverged copy of 'linux-sgx' * Squashed 'sgx-jvm/linux-sgx/' content from commit 3699ffd5e git-subtree-dir: sgx-jvm/linux-sgx git-subtree-split: 3699ffd5ebd8e79d599301fa2e5814e2386cad2d * ENT-1194 - Executable heap * ENT-1194 - Placeholder for passing of enclave context to create_thread |
||
---|---|---|
.. | ||
.settings | ||
DRM_app | ||
DRM_enclave | ||
include | ||
.cproject | ||
.project | ||
Makefile | ||
README.txt |
---------------------------- Purpose of SealedData ---------------------------- The project demonstrates: - How an application enclave can encrypt and integrity-protect enclave secrets to store them outside the enclave - How an application enclave can use Monotonic Counter to implement replay-protected policy, and Trusted Time to enforce time based policy ------------------------------------ How to Build/Execute the Sample Code ------------------------------------ 1. Install Intel(R) Software Guard Extensions (Intel(R) SGX) SDK for Linux* OS 2. Make sure your environment is set: $ source ${sgx-sdk-install-path}/environment 3. Build the project with the prepared Makefile: a. Hardware Mode, Debug build: $ make b. Hardware Mode, Pre-release build: $ make SGX_PRERELEASE=1 SGX_DEBUG=0 c. Hardware Mode, Release build: $ make SGX_DEBUG=0 d. Simulation Mode, Debug build: $ make SGX_MODE=SIM e. Simulation Mode, Pre-release build: $ make SGX_MODE=SIM SGX_PRERELEASE=1 SGX_DEBUG=0 f. Simulation Mode, Release build: $ make SGX_MODE=SIM SGX_DEBUG=0 4. Execute the binary directly: $ ./app 5. Remember to "make clean" before switching build mode