Unverified Commit 13298a9c authored by Oleh's avatar Oleh

SKALE-2956 clean up logs

parent 7ac8f800
......@@ -1029,8 +1029,6 @@ void trustedGetPublicEcdsaKeyAES(int *errStatus, char *errString,
int status = AES_decrypt(encryptedPrivateKey, enc_len, skey);
skey[enc_len - SGX_AESGCM_MAC_SIZE - SGX_AESGCM_IV_SIZE] = '\0';
LOG_TRACE("ENCRYPTED SKEY");
LOG_TRACE(skey);
if (status != 0) {
snprintf(errString, BUF_LEN, "AES_decrypt failed with status %d", status);
......@@ -1054,17 +1052,14 @@ void trustedGetPublicEcdsaKeyAES(int *errStatus, char *errString,
return;
}
LOG_TRACE("SET STR SUCCESS");
//Public key
point Pkey = point_init();
signature_extract_public_key(Pkey, privateKeyMpz, curve);
LOG_TRACE("SIGNATURE EXTRACT PK SUCCESS");
point Pkey_test = point_init();
point_multiplication(Pkey_test, privateKeyMpz, curve->G, curve);
LOG_TRACE("POINT MULTIPLICATION SUCCESS");
if (!point_cmp(Pkey, Pkey_test)) {
snprintf(errString, BUF_LEN, "Points are not equal");
......@@ -1077,14 +1072,11 @@ void trustedGetPublicEcdsaKeyAES(int *errStatus, char *errString,
return;
}
LOG_TRACE("POINTS CMP SUCCESS");
int len = mpz_sizeinbase(Pkey->x, ECDSA_SKEY_BASE) + 2;
char arr_x[len];
mpz_get_str(arr_x, ECDSA_SKEY_BASE, Pkey->x);
LOG_TRACE("GET STR X SUCCESS");
LOG_TRACE(arr_x);
int n_zeroes = 64 - strlen(arr_x);
for (int i = 0; i < n_zeroes; i++) {
......@@ -1095,8 +1087,6 @@ void trustedGetPublicEcdsaKeyAES(int *errStatus, char *errString,
char arr_y[mpz_sizeinbase(Pkey->y, ECDSA_SKEY_BASE) + 2];
mpz_get_str(arr_y, ECDSA_SKEY_BASE, Pkey->y);
LOG_TRACE("GET STR Y SUCCESS");
LOG_TRACE(arr_y);
n_zeroes = 64 - strlen(arr_y);
for (int i = 0; i < n_zeroes; i++) {
pub_key_y[i] = '0';
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment