Import Enclave helps to select the enclaves to be imported to the untrusted components. Then the untrusted components can make use of the enclaves.
Import Enclave provides the following functions:
Once the Intel® SGX Debugger has been selected for the application project, setting breakpoints and/or stepping into an enclave works exactly as normal application debugging does in Microsoft* Visual Studio*.
The Intel® Software Guard Extensions SDK provides the following collection of untrusted libraries.
Table 9 Untrusted Libraries included in the Intel® SGX SDK
The Enclave Definition Language (EDL) supports user defined data types, but should be defined in a header file. Any basic datatype which is typedef’ed into another becomes a user defined data type.
If a power transition occurs, the enclave memory will be removed and all the enclave data will be inaccessible. Consequently, when the system is resumed, each of the in-process ECALLS and the subsequent ECALLs will fail with the error code
SGX_ERROR_ENCLAVE_LOST which indicates the enclave is lost due to a power transition.
The enabling and launch control function helps you to enable the Intel® SGX device and return appropriate status.
The Intel® Software Guard Extensions SDK includes a trusted version of the C standard library. The library is named
sgx_tstdc (trusted standard C), and can only be used inside an enclave. Standard C headers are located under
sgx_tstdc provides a subset of C99 functions that are ported from OpenBSD* project. Some functions are not allowed to use inside the enclave for following reasons:
sgx_get_quote_size is deprecated. Use the
sgx_calc_quote_size function instead.
sgx_get_quote_size returns the required buffer size for the quote.
sgx_status_t sgx_get_quote_size( const uint8_t *p_sig_rl, uint32_t *p_quote_size );
Optional revoke list of signatures, can be NULL.