Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
S
sgxwallet
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
董子豪
sgxwallet
Commits
1c69824a
Unverified
Commit
1c69824a
authored
Dec 09, 2020
by
kladko
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
SKALE-3654
parent
b7ffbd6a
Changes
9
Hide whitespace changes
Inline
Side-by-side
Showing
9 changed files
with
74 additions
and
66 deletions
+74
-66
BLSCrypto.cpp
BLSCrypto.cpp
+2
-2
DKGCrypto.cpp
DKGCrypto.cpp
+29
-28
ECDSACrypto.cpp
ECDSACrypto.cpp
+2
-2
SEKManager.cpp
SEKManager.cpp
+1
-1
SGXWalletServer.cpp
SGXWalletServer.cpp
+8
-8
TestUtils.cpp
TestUtils.cpp
+4
-5
VERSION
VERSION
+1
-1
sgxwallet_common.h
sgxwallet_common.h
+25
-17
testw.cpp
testw.cpp
+2
-2
No files found.
BLSCrypto.cpp
View file @
1c69824a
...
...
@@ -145,7 +145,7 @@ bool sign(const char *_encryptedKeyHex, const char *_hashHex, size_t _t, size_t
uint64_t
binLen
;
if
(
!
hex2carray
(
_hashHex
,
&
binLen
,
hash
->
data
(),
hash
->
size
()))
{
throw
SGXException
(
INVALID_HEX
,
"
Invalid hash"
);
throw
SGXException
(
SIGN_FUNCTION_INVALID_HEX
,
string
(
__FUNCTION__
)
+
":
Invalid hash"
);
}
auto
keyShare
=
make_shared
<
BLSPrivateKeyShareSGX
>
(
keyStr
,
_t
,
_n
);
...
...
@@ -170,7 +170,7 @@ bool sign_aes(const char *_encryptedKeyHex, const char *_hashHex, size_t _t, siz
uint64_t
binLen
;
if
(
!
hex2carray
(
_hashHex
,
&
binLen
,
hash
->
data
(),
hash
->
size
()))
{
throw
SGXException
(
INVALID_HEX
,
"
Invalid hash"
);
throw
SGXException
(
SIGN_AES_INVALID_HASH
,
string
(
__FUNCTION__
)
+
":
Invalid hash"
);
}
shared_ptr
<
signatures
::
Bls
>
obj
;
...
...
DKGCrypto.cpp
View file @
1c69824a
...
...
@@ -153,7 +153,7 @@ string gen_dkg_poly(int _t) {
return
result
;
}
vector
<
vector
<
string
>>
get_verif_vect
(
const
string
&
encryptedPolyHex
,
int
t
,
int
n
)
{
vector
<
vector
<
string
>>
get_verif_vect
(
const
string
&
encryptedPolyHex
,
int
t
,
int
n
)
{
auto
encryptedPolyHexPtr
=
encryptedPolyHex
.
c_str
();
...
...
@@ -170,7 +170,7 @@ vector <vector<string>> get_verif_vect(const string& encryptedPolyHex, int t, in
vector
<
uint8_t
>
encrDKGPoly
(
2
*
BUF_LEN
,
0
);
if
(
!
hex2carray
(
encryptedPolyHexPtr
,
&
encLen
,
encrDKGPoly
.
data
(),
6100
))
{
throw
SGXException
(
INVALID
_HEX
,
":Invalid encryptedPolyHex"
);
throw
SGXException
(
GET_VV_INVALID_POLY
_HEX
,
":Invalid encryptedPolyHex"
);
}
...
...
@@ -179,7 +179,7 @@ vector <vector<string>> get_verif_vect(const string& encryptedPolyHex, int t, in
SEMAPHORE_BEGIN
status
=
trustedGetPublicShares
(
eid
,
&
errStatus
,
errMsg
.
data
(),
encrDKGPoly
.
data
(),
encLen
,
pubShares
.
data
(),
t
,
n
);
pubShares
.
data
(),
t
,
n
);
SEMAPHORE_END
HANDLE_TRUSTED_FUNCTION_ERROR
(
status
,
errStatus
,
errMsg
.
data
());
...
...
@@ -194,10 +194,10 @@ vector <vector<string>> get_verif_vect(const string& encryptedPolyHex, int t, in
return
pubSharesVect
;
}
vector
<
vector
<
string
>>
getVerificationVectorMult
(
const
std
::
string
&
encryptedPolyHex
,
int
t
,
int
n
,
size_t
ind
)
{
vector
<
vector
<
string
>>
getVerificationVectorMult
(
const
std
::
string
&
encryptedPolyHex
,
int
t
,
int
n
,
size_t
ind
)
{
auto
verificationVector
=
get_verif_vect
(
encryptedPolyHex
,
t
,
n
);
vector
<
vector
<
string
>>
result
(
t
);
vector
<
vector
<
string
>>
result
(
t
);
for
(
int
i
=
0
;
i
<
t
;
++
i
)
{
libff
::
alt_bn128_G2
current_coefficient
;
...
...
@@ -207,7 +207,7 @@ vector <vector<string>> getVerificationVectorMult(const std::string& encryptedPo
current_coefficient
.
Y
.
c1
=
libff
::
alt_bn128_Fq
(
verificationVector
[
i
][
3
].
c_str
());
current_coefficient
.
Z
=
libff
::
alt_bn128_Fq2
::
one
();
current_coefficient
=
libff
::
power
(
libff
::
alt_bn128_Fr
(
ind
+
1
),
i
)
*
current_coefficient
;
current_coefficient
=
libff
::
power
(
libff
::
alt_bn128_Fr
(
ind
+
1
),
i
)
*
current_coefficient
;
current_coefficient
.
to_affine_coordinates
();
auto
g2_str
=
convertG2ToString
(
current_coefficient
);
...
...
@@ -233,7 +233,7 @@ getSecretShares(const string &_polyName, const char *_encryptedPolyHex, const ve
if
(
!
hex2carray
(
_encryptedPolyHex
,
&
encLen
,
encrDKGPoly
.
data
(),
BUF_LEN
))
{
throw
SGXException
(
INVALID_HEX
,
":Invalid encryptedPolyHex"
);
throw
SGXException
(
GET_SS_INVALID_HEX
,
string
(
__FUNCTION__
)
+
":Invalid encryptedPolyHex"
);
}
...
...
@@ -260,8 +260,8 @@ getSecretShares(const string &_polyName, const char *_encryptedPolyHex, const ve
errMsg
.
data
(),
encrDKGPoly
.
data
(),
encLen
,
encryptedSkey
.
data
(),
&
decLen
,
currentShare
.
data
(),
sShareG2
.
data
(),
pubKeyB
.
data
(),
_t
,
_n
,
i
+
1
);
currentShare
.
data
(),
sShareG2
.
data
(),
pubKeyB
.
data
(),
_t
,
_n
,
i
+
1
);
HANDLE_TRUSTED_FUNCTION_ERROR
(
status
,
errStatus
,
errMsg
.
data
());
...
...
@@ -283,7 +283,9 @@ getSecretShares(const string &_polyName, const char *_encryptedPolyHex, const ve
return
result
;
}
string
getSecretSharesV2
(
const
string
&
_polyName
,
const
char
*
_encryptedPolyHex
,
const
vector
<
string
>&
_publicKeys
,
int
_t
,
int
_n
)
{
string
getSecretSharesV2
(
const
string
&
_polyName
,
const
char
*
_encryptedPolyHex
,
const
vector
<
string
>
&
_publicKeys
,
int
_t
,
int
_n
)
{
CHECK_STATE
(
_encryptedPolyHex
);
vector
<
char
>
hexEncrKey
(
BUF_LEN
,
0
);
...
...
@@ -319,11 +321,11 @@ string getSecretSharesV2(const string& _polyName, const char* _encryptedPolyHex,
sgx_status_t
status
=
SGX_SUCCESS
;
status
=
trustedGetEncryptedSecretShareV2
(
eid
,
&
errStatus
,
errMsg
.
data
(),
encrDKGPoly
.
data
(),
encLen
,
encryptedSkey
.
data
(),
&
decLen
,
currentShare
.
data
(),
sShareG2
.
data
(),
pubKeyB
.
data
(),
_t
,
_n
,
i
+
1
);
errMsg
.
data
(),
encrDKGPoly
.
data
(),
encLen
,
encryptedSkey
.
data
(),
&
decLen
,
currentShare
.
data
(),
sShareG2
.
data
(),
pubKeyB
.
data
(),
_t
,
_n
,
i
+
1
);
HANDLE_TRUSTED_FUNCTION_ERROR
(
status
,
errStatus
,
errMsg
.
data
());
...
...
@@ -359,7 +361,7 @@ verifyShares(const char *publicShares, const char *encr_sshare, const char *encr
SAFE_UINT8_BUF
(
encr_key
,
BUF_LEN
);
if
(
!
hex2carray
(
encryptedKeyHex
,
&
decKeyLen
,
encr_key
,
BUF_LEN
))
{
throw
SGXException
(
INVALID_HEX
,
string
(
__FUNCTION__
)
+
":Invalid encryptedPolyHex"
);
throw
SGXException
(
VERIFY_SHARES_INVALID_KEY_HEX
,
string
(
__FUNCTION__
)
+
":Invalid encryptedPolyHex"
);
}
SAFE_CHAR_BUF
(
pshares
,
8193
);
...
...
@@ -369,14 +371,14 @@ verifyShares(const char *publicShares, const char *encr_sshare, const char *encr
SEMAPHORE_BEGIN
status
=
trustedDkgVerify
(
eid
,
&
errStatus
,
errMsg
.
data
(),
pshares
,
encr_sshare
,
encr_key
,
decKeyLen
,
t
,
ind
,
&
result
);
ind
,
&
result
);
SEMAPHORE_END
HANDLE_TRUSTED_FUNCTION_ERROR
(
status
,
errStatus
,
errMsg
.
data
());
if
(
result
==
2
)
{
throw
SGXException
(
INVALID_HEX
,
string
(
__FUNCTION__
)
+
+
":Invalid public shares"
);
throw
SGXException
(
VERIFY_SHARES_INVALID_PUBLIC_SHARES
,
string
(
__FUNCTION__
)
+
+
":Invalid public shares"
);
}
return
result
;
...
...
@@ -396,7 +398,7 @@ verifySharesV2(const char *publicShares, const char *encr_sshare, const char *en
SAFE_UINT8_BUF
(
encr_key
,
BUF_LEN
);
if
(
!
hex2carray
(
encryptedKeyHex
,
&
decKeyLen
,
encr_key
,
BUF_LEN
))
{
throw
SGXException
(
INVALID_HEX
,
string
(
__FUNCTION__
)
+
":Invalid encryptedPolyHex"
);
throw
SGXException
(
VERIFY_SHARES_V2_INVALID_POLY_HEX
,
string
(
__FUNCTION__
)
+
":Invalid encryptedPolyHex"
);
}
SAFE_CHAR_BUF
(
pshares
,
8193
);
...
...
@@ -406,13 +408,13 @@ verifySharesV2(const char *publicShares, const char *encr_sshare, const char *en
SEMAPHORE_BEGIN
status
=
trustedDkgVerifyV2
(
eid
,
&
errStatus
,
errMsg
.
data
(),
pshares
,
encr_sshare
,
encr_key
,
decKeyLen
,
t
,
ind
,
&
result
);
ind
,
&
result
);
SEMAPHORE_END
HANDLE_TRUSTED_FUNCTION_ERROR
(
status
,
errStatus
,
errMsg
.
data
());
if
(
result
==
2
)
{
throw
SGXException
(
INVALID_HEX
,
string
(
__FUNCTION__
)
+
":Invalid public shares"
);
throw
SGXException
(
VERIFY_SHARES_V2_INVALID_PUBLIC_SHARES
,
string
(
__FUNCTION__
)
+
":Invalid public shares"
);
}
return
result
;
...
...
@@ -428,7 +430,7 @@ bool createBLSShare(const string &blsKeyName, const char *s_shares, const char *
uint64_t
decKeyLen
;
SAFE_UINT8_BUF
(
encr_bls_key
,
BUF_LEN
);
SAFE_UINT8_BUF
(
encr_key
,
BUF_LEN
);
if
(
!
hex2carray
(
encryptedKeyHex
,
&
decKeyLen
,
encr_key
,
BUF_LEN
))
{
throw
SGXException
(
INVALID
_HEX
,
string
(
__FUNCTION__
)
+
":Invalid encryptedKeyHex"
);
throw
SGXException
(
CREATE_BLS_SHARE_INVALID_KEY
_HEX
,
string
(
__FUNCTION__
)
+
":Invalid encryptedKeyHex"
);
}
uint64_t
enc_bls_len
=
0
;
...
...
@@ -437,7 +439,7 @@ bool createBLSShare(const string &blsKeyName, const char *s_shares, const char *
SEMAPHORE_BEGIN
status
=
trustedCreateBlsKey
(
eid
,
&
errStatus
,
errMsg
.
data
(),
s_shares
,
encr_key
,
decKeyLen
,
encr_bls_key
,
&
enc_bls_len
);
&
enc_bls_len
);
SEMAPHORE_END
HANDLE_TRUSTED_FUNCTION_ERROR
(
status
,
errStatus
,
errMsg
.
data
());
...
...
@@ -461,7 +463,7 @@ vector <string> getBLSPubKey(const char *encryptedKeyHex) {
SAFE_UINT8_BUF
(
encrKey
,
BUF_LEN
);
if
(
!
hex2carray
(
encryptedKeyHex
,
&
decKeyLen
,
encrKey
,
BUF_LEN
))
{
throw
SGXException
(
INVALID
_HEX
,
string
(
__FUNCTION__
)
+
":Invalid encryptedKeyHex"
);
throw
SGXException
(
GET_BLS_PUBKEY_INVALID_KEY
_HEX
,
string
(
__FUNCTION__
)
+
":Invalid encryptedKeyHex"
);
}
SAFE_CHAR_BUF
(
pubKey
,
320
)
...
...
@@ -545,10 +547,9 @@ string decryptDHKey(const string &polyName, int ind) {
vector
<
char
>
hexEncrKey
(
2
*
BUF_LEN
,
0
);
uint64_t
dhEncLen
=
0
;
SAFE_UINT8_BUF
(
encryptedDHKey
,
BUF_LEN
)
uint64_t
dhEncLen
=
0
;
SAFE_UINT8_BUF
(
encryptedDHKey
,
BUF_LEN
)
if
(
!
hex2carray
(
hexEncrKeyPtr
->
c_str
(),
&
dhEncLen
,
encryptedDHKey
,
BUF_LEN
))
{
throw
SGXException
(
INVALID
_HEX
,
string
(
__FUNCTION__
)
+
":Invalid hexEncrKey"
);
throw
SGXException
(
DECRYPT_DH_KEY_INVALID_KEY
_HEX
,
string
(
__FUNCTION__
)
+
":Invalid hexEncrKey"
);
}
spdlog
::
debug
(
"encr DH key length is {}"
,
dhEncLen
);
...
...
ECDSACrypto.cpp
View file @
1c69824a
...
...
@@ -96,7 +96,7 @@ string getECDSAPubKey(const std::string& _encryptedKeyHex) {
if
(
!
hex2carray
(
_encryptedKeyHex
.
c_str
(),
&
enc_len
,
encrPrKey
.
data
(),
BUF_LEN
))
{
throw
SGXException
(
INVALID
_HEX
,
"Invalid encryptedKeyHex"
);
throw
SGXException
(
GET_ECDSA_PUB_KEY_INVALID_KEY
_HEX
,
"Invalid encryptedKeyHex"
);
}
sgx_status_t
status
=
SGX_SUCCESS
;
...
...
@@ -185,7 +185,7 @@ vector <string> ecdsaSignHash(const std::string& encryptedKeyHex, const char *ha
if
(
!
hex2carray
(
encryptedKeyHex
.
c_str
(),
&
decLen
,
encryptedKey
.
data
(),
BUF_LEN
))
{
throw
SGXException
(
INVALID
_HEX
,
"Invalid encryptedKeyHex"
);
throw
SGXException
(
ECDSA_SIGN_INVALID_KEY
_HEX
,
"Invalid encryptedKeyHex"
);
}
sgx_status_t
status
=
SGX_SUCCESS
;
...
...
SEKManager.cpp
View file @
1c69824a
...
...
@@ -231,7 +231,7 @@ void setSEK(shared_ptr <string> hex_encrypted_SEK) {
if
(
!
hex2carray
(
hex_encrypted_SEK
->
c_str
(),
&
len
,
encrypted_SEK
,
BUF_LEN
))
{
throw
SGXException
(
INVALID
_HEX
,
"Invalid encrypted SEK Hex"
);
throw
SGXException
(
SET_SEK_INVALID_SEK
_HEX
,
"Invalid encrypted SEK Hex"
);
}
sgx_status_t
status
=
SGX_SUCCESS
;
...
...
SGXWalletServer.cpp
View file @
1c69824a
...
...
@@ -208,7 +208,7 @@ SGXWalletServer::importBLSKeyShareImpl(const string &_keyShare, const string &_k
try
{
if
(
!
checkName
(
_keyShareName
,
"BLS_KEY"
))
{
throw
SGXException
(
INVALID_BLS
_NAME
,
string
(
__FUNCTION__
)
+
":Invalid BLS key name"
);
throw
SGXException
(
BLS_IMPORT_INVALID_KEY
_NAME
,
string
(
__FUNCTION__
)
+
":Invalid BLS key name"
);
}
string
hashTmp
=
_keyShare
;
...
...
@@ -217,7 +217,7 @@ SGXWalletServer::importBLSKeyShareImpl(const string &_keyShare, const string &_k
}
if
(
!
checkHex
(
hashTmp
))
{
throw
SGXException
(
INVALID_BLS
_KEY_SHARE
,
string
(
__FUNCTION__
)
+
":Invalid BLS key share, please use hex"
);
throw
SGXException
(
BLS_IMPORT_INVALID
_KEY_SHARE
,
string
(
__FUNCTION__
)
+
":Invalid BLS key share, please use hex"
);
}
encryptedKeyShareHex
=
encryptBLSKeyShare2Hex
(
&
errStatus
,
(
char
*
)
errMsg
.
data
(),
hashTmp
.
c_str
());
...
...
@@ -227,7 +227,7 @@ SGXWalletServer::importBLSKeyShareImpl(const string &_keyShare, const string &_k
}
if
(
encryptedKeyShareHex
.
empty
())
{
throw
SGXException
(
EMPTY_ENCRYPTED_KEY_SHARE
,
string
(
__FUNCTION__
)
+
throw
SGXException
(
BLS_IMPORT_
EMPTY_ENCRYPTED_KEY_SHARE
,
string
(
__FUNCTION__
)
+
":Empty encrypted key share"
);
}
...
...
@@ -281,11 +281,11 @@ SGXWalletServer::blsSignMessageHashImpl(const string &_keyShareName, const strin
try
{
if
(
!
checkName
(
_keyShareName
,
"BLS_KEY"
))
{
throw
SGXException
(
INVALID_POLY
_NAME
,
string
(
__FUNCTION__
)
+
":Invalid BLSKey name"
);
throw
SGXException
(
BLS_SIGN_INVALID_KS
_NAME
,
string
(
__FUNCTION__
)
+
":Invalid BLSKey name"
);
}
if
(
!
check_n_t
(
t
,
n
))
{
throw
SGXException
(
INVALID_DKG
_PARAMS
,
string
(
__FUNCTION__
)
+
":Invalid t/n parameters"
);
throw
SGXException
(
BLS_SIGN_INVALID
_PARAMS
,
string
(
__FUNCTION__
)
+
":Invalid t/n parameters"
);
}
string
hashTmp
=
_messageHash
;
...
...
@@ -461,7 +461,7 @@ Json::Value SGXWalletServer::generateDKGPolyImpl(const string &_polyName, int _t
string
(
__FUNCTION__
)
+
":Invalid gen DKG polynomial name."
);
}
if
(
_t
<=
0
||
_t
>
32
)
{
throw
SGXException
(
INVALID_DKG
_PARAMS
,
string
(
__FUNCTION__
)
+
":Invalid gen dkg param t "
);
throw
SGXException
(
GENERATE_DKG_POLY_INVALID
_PARAMS
,
string
(
__FUNCTION__
)
+
":Invalid gen dkg param t "
);
}
encrPolyHex
=
gen_dkg_poly
(
_t
);
writeDataToDB
(
_polyName
,
encrPolyHex
);
...
...
@@ -807,7 +807,7 @@ Json::Value SGXWalletServer::deleteBlsKeyImpl(const string &name) {
result
[
"deleted"
]
=
false
;
try
{
if
(
!
checkName
(
name
,
"BLS_KEY"
))
{
throw
SGXException
(
INVALID_BLS_
NAME
,
string
(
__FUNCTION__
)
+
":Invalid BLSKey name format"
);
throw
SGXException
(
DELETE_BLS_KEY_INVALID_KEY
NAME
,
string
(
__FUNCTION__
)
+
":Invalid BLSKey name format"
);
}
shared_ptr
<
string
>
bls_ptr
=
LevelDB
::
getLevelDb
()
->
readString
(
name
);
...
...
@@ -816,7 +816,7 @@ Json::Value SGXWalletServer::deleteBlsKeyImpl(const string &name) {
result
[
"deleted"
]
=
true
;
}
else
{
auto
error_msg
=
"BLS key not found: "
+
name
;
throw
SGXException
(
INVALID_BLS_NAME
,
string
(
__FUNCTION__
)
+
":"
+
error_msg
.
c_str
());
throw
SGXException
(
DELETE_BLS_KEY_NOT_FOUND
,
string
(
__FUNCTION__
)
+
":"
+
error_msg
.
c_str
());
}
}
HANDLE_SGX_EXCEPTION
(
result
)
...
...
TestUtils.cpp
View file @
1c69824a
...
...
@@ -241,7 +241,7 @@ void TestUtils::sendRPCRequest() {
auto
hash_arr
=
make_shared
<
array
<
uint8_t
,
32
>>
();
uint64_t
binLen
;
if
(
!
hex2carray
(
hash
.
c_str
(),
&
binLen
,
hash_arr
->
data
(),
32
))
{
throw
SGXException
(
INVALID_HEX
,
"Invalid hash"
);
throw
SGXException
(
TEST_
INVALID_HEX
,
"Invalid hash"
);
}
map
<
size_t
,
shared_ptr
<
BLSPublicKeyShare
>>
coeffs_pkeys_map
;
...
...
@@ -355,7 +355,7 @@ void TestUtils::sendRPCRequestV2() {
auto
hash_arr
=
make_shared
<
array
<
uint8_t
,
32
>>
();
uint64_t
binLen
;
if
(
!
hex2carray
(
hash
.
c_str
(),
&
binLen
,
hash_arr
->
data
(),
32
))
{
throw
SGXException
(
INVALID_HEX
,
"Invalid hash"
);
throw
SGXException
(
TEST_
INVALID_HEX
,
"Invalid hash"
);
}
map
<
size_t
,
shared_ptr
<
BLSPublicKeyShare
>>
coeffs_pkeys_map
;
...
...
@@ -488,7 +488,7 @@ void TestUtils::doDKG(StubClient &c, int n, int t,
auto
hash_arr
=
make_shared
<
array
<
uint8_t
,
32
>>
();
uint64_t
binLen
;
if
(
!
hex2carray
(
hash
.
c_str
(),
&
binLen
,
hash_arr
->
data
(),
32
))
{
throw
SGXException
(
INVALID_HEX
,
"Invalid hash"
);
throw
SGXException
(
TEST_
INVALID_HEX
,
"Invalid hash"
);
}
map
<
size_t
,
shared_ptr
<
BLSPublicKeyShare
>>
pubKeyShares
;
...
...
@@ -629,7 +629,7 @@ void TestUtils::doDKGV2(StubClient &c, int n, int t,
auto
hash_arr
=
make_shared
<
array
<
uint8_t
,
32
>>
();
uint64_t
binLen
;
if
(
!
hex2carray
(
hash
.
c_str
(),
&
binLen
,
hash_arr
->
data
(),
32
))
{
throw
SGXException
(
INVALID_HEX
,
"Invalid hash"
);
throw
SGXException
(
TEST_
INVALID_HEX
,
"Invalid hash"
);
}
map
<
size_t
,
shared_ptr
<
BLSPublicKeyShare
>>
pubKeyShares
;
...
...
@@ -721,7 +721,6 @@ int sessionKeyRecoverDH(const char *skey_str, const char *sshare, char *common_k
mpz_clear
(
skey
);
point_clear
(
pub_keyB
);
point_clear
(
session_key
);
return
ret
;
}
...
...
VERSION
View file @
1c69824a
1.64.1
\ No newline at end of file
1.64.2
\ No newline at end of file
sgxwallet_common.h
View file @
1c69824a
...
...
@@ -73,26 +73,25 @@ extern bool autoconfirm;
#define NULL_KEY -4
#define INCORRECT_STRING_CONVERSION -5
#define ENCRYPTED_KEY_TOO_LONG -6
#define SEAL_KEY_FAILED -7
#define KEY_SHARE_DOES_NOT_EXIST -7
#define KEY_SHARE_ALREADY_EXISTS -8
#define COULD_NOT_ACCESS_DATABASE -9
#define NULL_DATABASE -10
#define INVALID_POLY_NAME -11
#define INVALID_DKG_PARAMS -12
#define BLS_SIGN_INVALID_KS_NAME -11
#define BLS_SIGN_INVALID_PARAMS -12
#define INVALID_SECRET_SHARES_LENGTH -13
#define INVALID_BLS_NAME -15
#define CERT_REQUEST_DOES_NOT_EXIST -14
#define BLS_IMPORT_INVALID_KEY_NAME -15
#define SEAL_KEY_FAILED -16
#define GET_VV_INVALID_POLY_HEX -17
#define GET_SS_INVALID_HEX -18
#define DECRYPT_DH_KEY_INVALID_KEY_HEX -19
#define INVALID_ECDSA_KEY_NAME -20
#define INVALID_HEX -21
#define VERIFY_SHARES_INVALID_KEY_HEX -21
#define INVALID_ECSDA_SIGNATURE -22
#define KEY_NAME_ALREADY_EXISTS -23
#define EMPTY_ENCRYPTED_KEY_SHARE -24
#define
INVALID_BLS
_KEY_SHARE -25
#define
BLS_IMPORT_
EMPTY_ENCRYPTED_KEY_SHARE -24
#define
BLS_IMPORT_INVALID
_KEY_SHARE -25
#define INVALID_BLS_HEX -26
#define INVALID_ECDSA_HEX -27
#define COULD_NOT_BLS_SIGN -28
...
...
@@ -141,16 +140,25 @@ extern bool autoconfirm;
#define INVALID_DKG_VV_V2_ECDSA_KEY_NAME -67
#define INVALID_DKG_VV_V2_PARAMS -68
#define INVALID_DKG_VV_V2_SS_HEX -69
#define
INVALID_DKG_VV_V2_SS_COUNT -70
#define INVALID_DKG_VV_V2_SS_COUNT -70
#define EXCEPTION_IN_CONVERT_HEX_TO_DEC -71
#define GET_SS_V2_INVALID_HEX -72
#define EXCEPTION_IN_CONVERT_G2_STRING -73
#define CONVERT_G2_INCORRECT_STRING_CONVERSION -74
#define DELETE_BLS_KEY_INVALID_KEYNAME -75
#define DELETE_BLS_KEY_NOT_FOUND -76
#define VERIFY_SHARES_INVALID_PUBLIC_SHARES -77
#define VERIFY_SHARES_V2_INVALID_POLY_HEX -78
#define VERIFY_SHARES_V2_INVALID_PUBLIC_SHARES -79
#define CREATE_BLS_SHARE_INVALID_KEY_HEX -80
#define GET_BLS_PUBKEY_INVALID_KEY_HEX -81
#define GENERATE_DKG_POLY_INVALID_PARAMS -82
#define SIGN_FUNCTION_INVALID_HEX -83
#define SIGN_AES_INVALID_HASH -84
#define GET_ECDSA_PUB_KEY_INVALID_KEY_HEX -85
#define ECDSA_SIGN_INVALID_KEY_HEX -86
#define SET_SEK_INVALID_SEK_HEX -87
#define TEST_INVALID_HEX -88
#define SGX_ENCLAVE_ERROR -666
...
...
testw.cpp
View file @
1c69824a
...
...
@@ -825,7 +825,7 @@ TEST_CASE_METHOD(TestFixture, "AES_DKG test", "[aes-dkg]") {
uint64_t
binLen
;
if
(
!
hex2carray
(
hash
.
c_str
(),
&
binLen
,
hash_arr
->
data
(),
32
))
{
throw
SGXException
(
INVALID_HEX
,
"Invalid hash"
);
throw
SGXException
(
TEST_
INVALID_HEX
,
"Invalid hash"
);
}
map
<
size_t
,
shared_ptr
<
BLSPublicKeyShare
>>
coeffs_pkeys_map
;
...
...
@@ -991,7 +991,7 @@ TEST_CASE_METHOD(TestFixture, "AES_DKG V2 test", "[aes-dkg-v2]") {
uint64_t
binLen
;
if
(
!
hex2carray
(
hash
.
c_str
(),
&
binLen
,
hash_arr
->
data
(),
32
))
{
throw
SGXException
(
INVALID_HEX
,
"Invalid hash"
);
throw
SGXException
(
TEST_
INVALID_HEX
,
"Invalid hash"
);
}
map
<
size_t
,
shared_ptr
<
BLSPublicKeyShare
>>
coeffs_pkeys_map
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment