You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Added more logs in PSW components for identifying issues.
Upgraded OpenSSL and SgxSSL to latest version 1.1.1i in DCAP components.
Added data base migration support in PCCS.
Fixed bugs.
Signed-off-by: Li, Xun <[email protected]>
Copy file name to clipboardExpand all lines: README.md
+17-4Lines changed: 17 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,3 +1,5 @@
1
+
2
+
1
3
Intel(R) Software Guard Extensions for Linux\* OS
2
4
================================================
3
5
@@ -29,6 +31,7 @@ Intel(R) Software Guard Extensions for Linux\* OS
29
31
*[Configure the Proxy for aesmd Service](#configure-the-proxy-for-aesmd-service)
30
32
*[Reproducibility](#reproducibility)
31
33
34
+
32
35
Introduction
33
36
------------
34
37
Intel(R) Software Guard Extensions (Intel(R) SGX) is an Intel technology for application developers seeking to protect select code and data from disclosure or modification.
@@ -159,12 +162,23 @@ You can find the three flavors of tools and libraries generated in the `build` d
159
162
- This repository supports to build the Intel(R) SGX SDK with below three combinations:
160
163
* `USE_OPT_LIBS=0` --- build SDK using SGXSSL and open sourced String/Math
161
164
* `USE_OPT_LIBS=1` --- build SDK using optimized IPP crypto and open sourced String/Math
165
+
* `USE_OPT_LIBS=2` --- build SDK with no mitigation using SGXSSL and optimized String/Math
166
+
* `USE_OPT_LIBS=3` --- build SDK with no mitigation using IPP crypto and optimized String/Math
162
167
The default build uses `USE_OPT_LIBS=1`, if you directly type `$ make sdk` as above.
163
-
You can switch to the other build combination instead by entering the following command:
168
+
You can switch to the other build combinations instead by entering the following command:
164
169
```
165
170
$ make sdk USE_OPT_LIBS=0
171
+
```
172
+
or
173
+
```
174
+
$ make sdk_no_mitigation USE_OPT_LIBS=2
175
+
```
176
+
or
177
+
```
178
+
$ make sdk_no_mitigation USE_OPT_LIBS=3
166
179
```
167
180
**Note**: Building the Intel(R) SGX PSW with open sourced SGXSSL/string/math libraries is not supported.
181
+
**Note**: Building mitigation SDK with `USE_OPT_LIBS=2` or `USE_OPT_LIBS=3` is not allowed.
168
182
169
183
- To build Intel(R) SGX SDK with debug information, enter the following command:
170
184
```
@@ -381,7 +395,7 @@ Install the Intel(R) SGX PSW
381
395
```
382
396
383
397
### Install the Intel(R) SGX PSW
384
-
- The SGX PSW provides 3 services: launch, EPID-based attestation, and algorithm agnostic attestation. Starting with the 2.8 release, the SGX PSW is split into smaller packages and the user can choose which features and services to install. There are 2 methods to install the required packages: Using individual packages or using the local repo generated by the build system. Using the local repo is recommended since the system will resolve the dependencies automatically. Currently, we support .deb and .rpm based repos.
398
+
The SGX PSW provides 3 services: launch, EPID-based attestation, and algorithm agnostic attestation. Starting with the 2.8 release, the SGX PSW is split into smaller packages and the user can choose which features and services to install. There are 2 methods to install the required packages: Using individual packages or using the local repo generated by the build system. Using the local repo is recommended since the system will resolve the dependencies automatically. Currently, we support .deb and .rpm based repos.
385
399
386
400
#### Using the local repo(recommended)
387
401
@@ -394,7 +408,7 @@ Install the Intel(R) SGX PSW
394
408
395
409
Optionally, you can install *-dbgsym or *-debuginfo packages to get the debug symbols, and install *-dev or *-devel packages to get the header files for development.
396
410
397
-
**NOTE**: To debug with sgx-gdb on Ubuntu 16.04, you need to ensure the Intel(R) SGX PSW is built under the condition that the environment variable ``DEB_BUILD_OPTIONS="nostrip"`` is set.
411
+
**NOTE**: To debug with sgx-gdb on Ubuntu 16.04, you need to ensure the Intel(R) SGX PSW is built under the condition that the environment variable ``DEB_BUILD_OPTIONS="nostrip"`` is set.
398
412
399
413
#### Using the individual packages
400
414
Please refer [Intel_SGX_Installation_Guide_Linux](https://download.01.org/intel-sgx/latest/linux-latest/docs/) for detail.
@@ -406,7 +420,6 @@ Sometimes we will split old package into smaller ones or move file between diffe
Some packages are configured with recommended dependency on other packages that are not required for certain usage. For instance, the background daemon is not required for container usage. It will be installed by default, but you can drop it by using the additional option during the installation.
SGX_ERROR_INVALID_ATTRIBUTE=SGX_MK_ERROR(0x3002), /* The enclave is not authorized */
75
+
SGX_ERROR_INVALID_ATTRIBUTE=SGX_MK_ERROR(0x3002), /* The enclave is not authorized, e.g., requesting invalid attribute or launch key access on legacy SGX platform without FLC */
76
76
SGX_ERROR_INVALID_CPUSVN=SGX_MK_ERROR(0x3003), /* The cpu svn is beyond platform's cpu svn value */
77
77
SGX_ERROR_INVALID_ISVSVN=SGX_MK_ERROR(0x3004), /* The isv svn is greater than the enclave's isv svn */
78
78
SGX_ERROR_INVALID_KEYNAME=SGX_MK_ERROR(0x3005), /* The key name is an unsupported value */
79
79
80
80
SGX_ERROR_SERVICE_UNAVAILABLE=SGX_MK_ERROR(0x4001), /* Indicates aesm didn't respond or the requested service is not supported */
81
81
SGX_ERROR_SERVICE_TIMEOUT=SGX_MK_ERROR(0x4002), /* The request to aesm timed out */
SGX_ERROR_SERVICE_INVALID_PRIVILEGE=SGX_MK_ERROR(0x4004), /* Enclave has no privilege to get launch token */
83
+
SGX_ERROR_SERVICE_INVALID_PRIVILEGE=SGX_MK_ERROR(0x4004), /* Enclave not authorized to run, .e.g. provisioning enclave hosted in an app without access rights to /dev/sgx_provision */
84
84
SGX_ERROR_EPID_MEMBER_REVOKED=SGX_MK_ERROR(0x4005), /* The EPID group membership is revoked. */
85
85
SGX_ERROR_UPDATE_NEEDED=SGX_MK_ERROR(0x4006), /* SGX needs to be updated */
86
86
SGX_ERROR_NETWORK_FAILURE=SGX_MK_ERROR(0x4007), /* Network connecting or proxy setting issue is encountered */
0 commit comments