Fixing

parent a08d0080
...@@ -59,58 +59,58 @@ sgx_enclave_id_t eid; ...@@ -59,58 +59,58 @@ sgx_enclave_id_t eid;
sgx_status_t status; sgx_status_t status;
int updated; int updated;
char *encryptKey2Hex(int *errStatus, char *err_string, const char *_key) {
TEST_CASE("BLS key encrypt", "[bls-key-encrypt]") {
{
init_all();
const char *key = "4160780231445160889237664391382223604184857153814275770598"
"791864649971919844";
char *keyArray = (char *) calloc(BUF_LEN, 1); char *keyArray = (char *) calloc(BUF_LEN, 1);
uint8_t *encryptedKey = (uint8_t *) calloc(BUF_LEN, 1); uint8_t *encryptedKey = (uint8_t *) calloc(BUF_LEN, 1);
char *errMsg = (char *) calloc(BUF_LEN, 1); char *errMsg = (char *) calloc(BUF_LEN, 1);
strncpy((char *) keyArray, (char *) _key, BUF_LEN);
strncpy((char *) keyArray, (char *) key, BUF_LEN); *errStatus = -1;
int errStatus = 0;
unsigned int encryptedLen = 0; unsigned int encryptedLen = 0;
status = encrypt_key(eid, &errStatus, errMsg, keyArray, encryptedKey, &encryptedLen); status = encrypt_key(eid, errStatus, errMsg, keyArray, encryptedKey, &encryptedLen);
REQUIRE(status == SGX_SUCCESS); if (status != SGX_SUCCESS) {
REQUIRE(errStatus == 0); *errStatus = -1;
return nullptr;
}
printf("Encrypt key completed with status: %d %s \n", errStatus, errMsg); if (*errStatus != 0) {
printf(" Encrypted key len %d\n", encryptedLen); return nullptr;
}
char result[2 * BUF_LEN]; char *result = (char *) calloc(2 * BUF_LEN, 1);
carray2Hex(encryptedKey, encryptedLen, result); carray2Hex(encryptedKey, encryptedLen, result);
uint64_t decodedLen = 0; return result;
}
uint8_t decoded[BUF_LEN];
REQUIRE(hex2carray(result, &decodedLen, decoded)); TEST_CASE("BLS key encrypt", "[bls-key-encrypt]") {
for (uint64_t i = 0; i < decodedLen; i++) {
REQUIRE(decoded[i] == encryptedKey[i]);
}
REQUIRE(decodedLen == encryptedLen); init_all();
gmp_printf("Result: %s", result); const char *key = "4160780231445160889237664391382223604184857153814275770598"
"791864649971919844";
gmp_printf("\n Length: %d \n", encryptedLen);
} int errStatus = -1;
char *errMsg = (char *) calloc(BUF_LEN, 1);
char *encryptedKeyHex = encryptKey2Hex(&errStatus, errMsg, key);
REQUIRE(encryptedKeyHex != nullptr);
REQUIRE(errStatus == 0);
printf("Encrypt key completed with status: %d %s \n", errStatus, errMsg);
printf("Encrypted key len %d\n", (int) strlen(encryptedKeyHex));
printf("Encrypted key %s \n", encryptedKeyHex);
} }
...@@ -161,7 +161,7 @@ TEST_CASE("BLS key encrypt/decrypt", "[bls-key-encrypt-decrypt]") { ...@@ -161,7 +161,7 @@ TEST_CASE("BLS key encrypt/decrypt", "[bls-key-encrypt-decrypt]") {
gmp_printf("\n Encrypted length: %d \n", encryptedLen); gmp_printf("\n Encrypted length: %d \n", encryptedLen);
char *plaintextKey = (char*) calloc(BUF_LEN, 1); char *plaintextKey = (char *) calloc(BUF_LEN, 1);
status = decrypt_key(eid, &errStatus, errMsg, decoded, decodedLen, plaintextKey); status = decrypt_key(eid, &errStatus, errMsg, decoded, decodedLen, plaintextKey);
...@@ -171,7 +171,7 @@ TEST_CASE("BLS key encrypt/decrypt", "[bls-key-encrypt-decrypt]") { ...@@ -171,7 +171,7 @@ TEST_CASE("BLS key encrypt/decrypt", "[bls-key-encrypt-decrypt]") {
REQUIRE(strcmp(plaintextKey, key) == 0); REQUIRE(strcmp(plaintextKey, key) == 0);
for (int i = 0 ; i < BUF_LEN; i++) { for (int i = 0; i < BUF_LEN; i++) {
REQUIRE(plaintextKey[i] == keyArray[i]); REQUIRE(plaintextKey[i] == keyArray[i]);
} }
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment