uname -a
yum update kernel
yum install \\libsgx-ae-le libsgx-ae-pce libsgx-ae-qe3 libsgx-ae-qve \\libsgx-aesm-ecdsa-plugin libsgx-aesm-launch-plugin libsgx-aesm-pce-plugin libsgx-aesm-quote-ex-plugin \\libsgx-dcap-default-qpl libsgx-dcap-default-qpl-devel libsgx-dcap-ql libsgx-dcap-ql-devel \\libsgx-dcap-quote-verify libsgx-dcap-quote-verify-devel libsgx-enclave-common libsgx-enclave-common-devel libsgx-epid-devel \\libsgx-launch libsgx-launch-devel libsgx-pce-logic libsgx-qe3-logic libsgx-quote-ex libsgx-quote-ex-devel \\libsgx-ra-network libsgx-ra-uefi libsgx-uae-service libsgx-urts sgx-ra-service \\sgx-aesm-service
/opt/intel/sgx-aesm-service.yum install sgx-linux-x64-sdk
/opt/intel/sgxsdk. You can develop an SGX program as instructed in Intel® Software Guard Extensions (Intel® SGX) SDK for Linux OS Developer Reference./etc/sgx_default_qcnl.conf of the service will be generated automatically. Manually modify the file in the following steps to adapt to the service in the region of your SGX CVM instance./etc/sgx_default_qcnl.conf as follows:# PCCS server addressPCCS_URL=https://sgx-dcap-server-tc.[Region-ID].tencent.cn/sgx/certification/v3/# To accept insecure HTTPS cert, set this option to FALSEUSE_SECURE_CERT=TRUE
[Region-ID] with the ID of the region where your SGX CVM instance resides; for example:
Sample configuration for the Beijing region:# PCCS server addressPCCS_URL=https://sgx-dcap-server-tc.bj.tencent.cn/sgx/certification/v3/# To accept insecure HTTPS cert, set this option to FALSEUSE_SECURE_CERT=TRUE
# PCCS server addressPCCS_URL=https://sgx-dcap-server-tc.sh.tencent.cn/sgx/certification/v3/# To accept insecure HTTPS cert, set this option to FALSEUSE_SECURE_CERT=TRUE
# PCCS server addressPCCS_URL=https://sgx-dcap-server-tc.gz.tencent.cn/sgx/certification/v3/# To accept insecure HTTPS cert, set this option to FALSEUSE_SECURE_CERT=TRUE
/opt/intel/sgxsdk/SampleCode. The effect of this sample code (SampleEnclave) is to start an enclave to check whether the installed SGX SDK works normally and whether the confidential memory resource of your SGX CVM instance is available.source /opt/intel/sgxsdk/environment
SampleEnclave:cd /opt/intel/sgxsdk/SampleCode/SampleEnclave && make
./app

QuoteGenerationSample) and verifier (QuoteVerificationSample).source /opt/intel/sgxsdk/environment
cd /root && yum install git
git clone https://github.com/intel/SGXDataCenterAttestationPrimitives.git
QuoteGenerationSample:QuoteGenerationSample directory: cd /root/SGXDataCenterAttestationPrimitives/SampleCode/QuoteGenerationSample
QuoteGenerationSample:make
QuoteGenerationSample to generate a quote:./app
QuoteVerificationSample:cd /root/SGXDataCenterAttestationPrimitives/SampleCode/QuoteVerificationSample && make
QuoteVerificationSample enclave:sgx_sign sign -key Enclave/Enclave_private_sample.pem -enclave enclave.so -out enclave.signed.so -config Enclave/Enclave.config.xml
QuoteVerificationSample to verify the quote:./app

Feedback