-
Updated
Jun 17, 2021 - C
sgx
Here are 128 public repositories matching this topic...
-
Updated
Jun 16, 2021 - Rust
-
Updated
Jun 14, 2021 - C
-
Updated
Sep 3, 2020 - Python
-
Updated
Jun 17, 2021 - C
-
Updated
Dec 2, 2020 - C
-
Updated
Jan 14, 2018 - C
-
Updated
Feb 19, 2020 - C++
Since raw queries only return encrypted keys, it's pointless and will break implementations coming from other networks without letting anyone know.
We should remove it from the next version
-
Updated
Jun 17, 2021 - Go
-
Updated
Sep 6, 2020 - Rust
-
Updated
Jun 17, 2021 - Go
-
Updated
Mar 10, 2020 - Rust
-
Updated
May 11, 2021 - C
-
Updated
Jun 14, 2021 - C++
Describe the bug
The SGX enclave entry functions for Sonora are not easily discoverable
To Reproduce
Try grepping for sinaloa_init_remote_attestation_enc in the project directory. You will find calls to it but not an implementation
Expected behaviour
To aide newcomers to the project, functions should be easy for them to find the implementations of.
Additional context
-
Updated
Jan 5, 2021 - C
-
Updated
Jun 17, 2021 - Rust
-
Updated
Sep 12, 2020 - JavaScript
-
Updated
Jun 11, 2021 - BitBake
-
Updated
Jun 16, 2021 - Shell
-
Updated
Oct 22, 2019 - Dockerfile
-
Updated
Mar 7, 2019 - C
Improve this page
Add a description, image, and links to the sgx topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the sgx topic, visit your repo's landing page and select "manage topics."
Description of the feature
It would be nice to be able to forward some environment variables from the untrusted host e.g. by specifying their names in the manifest.
Example use case: providing the application with a ip+port/domain to connect to (which by definition can be manipulated by the untrusted host anyway).
Please note that this is a different feature than `loader.insecure__use_ho