In part 4 of this tutorial series, you'll create the project infrastructure necessary to integrate the enclave into your application. Source code is included.
Fast Secure Hash Algorithm (SHA-1) implementation for Intel Architecture.
Intro to Intel® Software Guard Extensions (Intel® SGX) directional enclave argument pointers. Sample code for passing data between enclave and application.
In part 5 of this tutorial series, we complete the interface for the Password Manager DLL. Source code is included. Your application must function on systems both with and without Intel® SGX support, and that means you must create two versions: one intended for use in enclaves, and one for use in untrusted memory.
In Part 9 of the Intel® SGX tutorial series we address complexities of the suspend and resume power cycle. We’ll examine data Intel SGX sealing capabilities and apply our learnings to the Tutorial Password Manager.
Part 6 of this tutorial series shows how to create dual code paths to support hosts with and without Intel® SGX capability. Source code is included.
Learn about the Intel® SGX enclave APIs and how proxy functions are used to marshall data between protected and unprotected memory space. Source code is included.
Download the static binary libraries, source code, and documentation from the link below:
A cross-platform library for obtaining cryptographically secure random numbers from the best available entropy source in the underlying system.