-
Notifications
You must be signed in to change notification settings - Fork 551
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Upgraded Intel(R) Integrated Performance Primitives Cryptography library to version 2021 update 3. Upgraded Intel(R) SGX Architecture Enclaves based on new IPP crypto library. Added software prevention of fault injection attacks. Upgraded to GNU Binutils 2.36.1. Stopped providing ld.gold (developers should use ld instead). Supported Google Protobuf C++. Enabled C++14 within SGX SDK. Added SM2/3/4 Samples. Fixed bugs. Signed-off-by: Zhang Lili <lili.z.zhang@intel.com>
- Loading branch information
Showing
665 changed files
with
15,152 additions
and
3,482 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,211 @@ | ||
/* | ||
* Copyright (C) 2011-2021 Intel Corporation. All rights reserved. | ||
* | ||
* Redistribution and use in source and binary forms, with or without | ||
* modification, are permitted provided that the following conditions | ||
* are met: | ||
* | ||
* * Redistributions of source code must retain the above copyright | ||
* notice, this list of conditions and the following disclaimer. | ||
* * Redistributions in binary form must reproduce the above copyright | ||
* notice, this list of conditions and the following disclaimer in | ||
* the documentation and/or other materials provided with the | ||
* distribution. | ||
* * Neither the name of Intel Corporation nor the names of its | ||
* contributors may be used to endorse or promote products derived | ||
* from this software without specific prior written permission. | ||
* | ||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | ||
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | ||
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR | ||
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT | ||
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT | ||
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | ||
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | ||
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | ||
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | ||
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||
* | ||
*/ | ||
|
||
#include <stdio.h> | ||
#include <string.h> | ||
#include <assert.h> | ||
|
||
# include <unistd.h> | ||
# include <pwd.h> | ||
# define MAX_PATH FILENAME_MAX | ||
|
||
#include "sgx_urts.h" | ||
#include "App.h" | ||
#include "Enclave_u.h" | ||
|
||
/* Global EID shared by multiple threads */ | ||
sgx_enclave_id_t global_eid = 0; | ||
|
||
typedef struct _sgx_errlist_t { | ||
sgx_status_t err; | ||
const char *msg; | ||
const char *sug; /* Suggestion */ | ||
} sgx_errlist_t; | ||
|
||
/* Error code returned by sgx_create_enclave */ | ||
static sgx_errlist_t sgx_errlist[] = { | ||
{ | ||
SGX_ERROR_UNEXPECTED, | ||
"Unexpected error occurred.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_INVALID_PARAMETER, | ||
"Invalid parameter.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_OUT_OF_MEMORY, | ||
"Out of memory.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_ENCLAVE_LOST, | ||
"Power transition occurred.", | ||
"Please refer to the sample \"PowerTransition\" for details." | ||
}, | ||
{ | ||
SGX_ERROR_INVALID_ENCLAVE, | ||
"Invalid enclave image.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_INVALID_ENCLAVE_ID, | ||
"Invalid enclave identification.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_INVALID_SIGNATURE, | ||
"Invalid enclave signature.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_OUT_OF_EPC, | ||
"Out of EPC memory.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_NO_DEVICE, | ||
"Invalid SGX device.", | ||
"Please make sure SGX module is enabled in the BIOS, and install SGX driver afterwards." | ||
}, | ||
{ | ||
SGX_ERROR_MEMORY_MAP_CONFLICT, | ||
"Memory map conflicted.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_INVALID_METADATA, | ||
"Invalid enclave metadata.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_DEVICE_BUSY, | ||
"SGX device was busy.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_INVALID_VERSION, | ||
"Enclave version was invalid.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_INVALID_ATTRIBUTE, | ||
"Enclave was not authorized.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_ENCLAVE_FILE_ACCESS, | ||
"Can't open enclave file.", | ||
NULL | ||
}, | ||
{ | ||
SGX_ERROR_NDEBUG_ENCLAVE, | ||
"The enclave is signed as product enclave, and can not be created as debuggable enclave.", | ||
NULL | ||
}, | ||
}; | ||
|
||
/* Check error conditions for loading enclave */ | ||
void print_error_message(sgx_status_t ret) | ||
{ | ||
size_t idx = 0; | ||
size_t ttl = sizeof sgx_errlist/sizeof sgx_errlist[0]; | ||
|
||
for (idx = 0; idx < ttl; idx++) { | ||
if(ret == sgx_errlist[idx].err) { | ||
if(NULL != sgx_errlist[idx].sug) | ||
printf("Info: %s\n", sgx_errlist[idx].sug); | ||
printf("Error: %s\n", sgx_errlist[idx].msg); | ||
break; | ||
} | ||
} | ||
|
||
if (idx == ttl) | ||
printf("Error: Unexpected error occurred.\n"); | ||
} | ||
|
||
/* Initialize the enclave: | ||
* Call sgx_create_enclave to initialize an enclave instance | ||
*/ | ||
int initialize_enclave(void) | ||
{ | ||
sgx_status_t ret = SGX_ERROR_UNEXPECTED; | ||
|
||
/* Call sgx_create_enclave to initialize an enclave instance */ | ||
/* Debug Support: set 2nd parameter to 1 */ | ||
ret = sgx_create_enclave(ENCLAVE_FILENAME, SGX_DEBUG_FLAG, NULL, NULL, &global_eid, NULL); | ||
if (ret != SGX_SUCCESS) { | ||
print_error_message(ret); | ||
return -1; | ||
} | ||
|
||
return 0; | ||
} | ||
|
||
/* OCall functions */ | ||
void ocall_print_string(const char *str) | ||
{ | ||
/* Proxy/Bridge will check the length and null-terminate | ||
* the input string to prevent buffer overflow. | ||
*/ | ||
printf("%s", str); | ||
} | ||
|
||
|
||
/* Application entry */ | ||
int SGX_CDECL main(int argc, char *argv[]) | ||
{ | ||
(void)(argc); | ||
(void)(argv); | ||
|
||
|
||
/* Initialize the enclave */ | ||
if(initialize_enclave() < 0){ | ||
printf("Enter a character before exit ...\n"); | ||
getchar(); | ||
return -1; | ||
} | ||
|
||
|
||
/* Utilize trusted libraries */ | ||
ecall_libcxx_functions(); | ||
|
||
/* Destroy the enclave */ | ||
sgx_destroy_enclave(global_eid); | ||
|
||
printf("Info: Cxx14DemoEnclave successfully returned.\n"); | ||
|
||
//printf("Enter a character before exit ...\n"); | ||
//getchar(); | ||
return 0; | ||
} | ||
|
Oops, something went wrong.