Fixing

parent a24a27f4
...@@ -60,7 +60,7 @@ sgx_status_t status; ...@@ -60,7 +60,7 @@ sgx_status_t status;
int updated; int updated;
TEST_CASE("BLS key encrypt/decrypt", "[bls-key-encrypt-decrypt]") { TEST_CASE("BLS key encrypt", "[bls-key-encrypt-decrypt]") {
{ {
...@@ -70,46 +70,45 @@ TEST_CASE("BLS key encrypt/decrypt", "[bls-key-encrypt-decrypt]") { ...@@ -70,46 +70,45 @@ TEST_CASE("BLS key encrypt/decrypt", "[bls-key-encrypt-decrypt]") {
"791864649971919844"; "791864649971919844";
char *keyArray = (char *) calloc(128, 1); char *keyArray = (char *) calloc(128, 1);
uint8_t *encryptedKey = (uint8_t *) calloc(1024, 1); uint8_t *encryptedKey = (uint8_t *) calloc(1024, 1);
char *errMsg = (char *) calloc(1024, 1); char *errMsg = (char *) calloc(1024, 1);
strncpy((char *) keyArray, (char *) key, 128); strncpy((char *) keyArray, (char *) key, 128);
int err_status = 0; int errStatus = 0;
unsigned int enc_len = 0; unsigned int encryptedLen = 0;
status = encrypt_key(eid, &err_status, errMsg, keyArray, encryptedKey, &enc_len); status = encrypt_key(eid, &errStatus, errMsg, keyArray, encryptedKey, &encryptedLen);
REQUIRE(status == SGX_SUCCESS); REQUIRE(status == SGX_SUCCESS);
REQUIRE(err_status == 0); REQUIRE(errStatus == 0);
printf("Encrypt key completed with status: %d %s \n", errStatus, errMsg);
printf("Encrypt key completed with status: %d %s \n", err_status, errMsg); printf(" Encrypted key len %d\n", encryptedLen);
printf(" Encrypted key len %d\n", enc_len);
char result[2 * BUF_LEN]; char result[2 * BUF_LEN];
carray2Hex(encryptedKey, enc_len, result); carray2Hex(encryptedKey, encryptedLen, result);
uint64_t dec_len = 0; uint64_t decodedLen = 0;
uint8_t bin[BUF_LEN]; uint8_t decoded[BUF_LEN];
REQUIRE(hex2carray(result, &dec_len, bin)); REQUIRE(hex2carray(result, &decodedLen, decoded));
for (uint64_t i = 0; i < dec_len; i++) { for (uint64_t i = 0; i < decodedLen; i++) {
REQUIRE(bin[i] == encryptedKey[i]); REQUIRE(decoded[i] == encryptedKey[i]);
} }
REQUIRE(dec_len == enc_len); REQUIRE(decodedLen == encryptedLen);
gmp_printf("Result: %s", result); gmp_printf("Result: %s", result);
gmp_printf("\n Length: %d \n", enc_len); gmp_printf("\n Length: %d \n", encryptedLen);
} }
} }
...@@ -134,23 +133,23 @@ TEST_CASE("BLS sign test", "[bls-sign]") { ...@@ -134,23 +133,23 @@ TEST_CASE("BLS sign test", "[bls-sign]") {
strncpy((char *) keyArray, (char *) key, 128); strncpy((char *) keyArray, (char *) key, 128);
int err_status = 0; int errStatus = 0;
unsigned int enc_len = 0; unsigned int encryptedLen = 0;
status = encrypt_key(eid, &err_status, errMsg, keyArray, encryptedKey, &enc_len); status = encrypt_key(eid, &errStatus, errMsg, keyArray, encryptedKey, &encryptedLen);
REQUIRE(status == SGX_SUCCESS); REQUIRE(status == SGX_SUCCESS);
REQUIRE(err_status == 0); REQUIRE(errStatus == 0);
printf("Encrypt key completed with status: %d %s \n", err_status, errMsg); printf("Encrypt key completed with status: %d %s \n", errStatus, errMsg);
printf(" Encrypted key len %d\n", enc_len); printf(" Encrypted key len %d\n", encryptedLen);
char result[2 * BUF_LEN]; char result[2 * BUF_LEN];
carray2Hex(encryptedKey, enc_len, result carray2Hex(encryptedKey, encryptedLen, result
); );
uint64_t dec_len = 0; uint64_t dec_len = 0;
...@@ -164,11 +163,11 @@ TEST_CASE("BLS sign test", "[bls-sign]") { ...@@ -164,11 +163,11 @@ TEST_CASE("BLS sign test", "[bls-sign]") {
REQUIRE(bin[i] == encryptedKey[i]); REQUIRE(bin[i] == encryptedKey[i]);
} }
REQUIRE(dec_len == enc_len); REQUIRE(dec_len == encryptedLen);
gmp_printf("Result: %s", result); gmp_printf("Result: %s", result);
gmp_printf("\n Length: %d \n", enc_len); gmp_printf("\n Length: %d \n", encryptedLen);
char sig[BUF_LEN]; char sig[BUF_LEN];
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment