SKALE-2794 add logs

parent 5dced189
......@@ -1003,6 +1003,9 @@ void trustedGetPublicEcdsaKeyAES(int *errStatus, char *errString,
char skey[ECDSA_SKEY_LEN];
int status = AES_decrypt(encryptedPrivateKey, enc_len, skey);
skey[enc_len - SGX_AESGCM_MAC_SIZE - SGX_AESGCM_IV_SIZE] = '\0';
LOG_INFO("ENCRYPTED SKEY");
LOG_INFO(skey);
if (status != 0) {
snprintf(errString, BUF_LEN, "AES_decrypt failed with status %d", status);
......@@ -1013,8 +1016,6 @@ void trustedGetPublicEcdsaKeyAES(int *errStatus, char *errString,
return;
}
skey[enc_len - SGX_AESGCM_MAC_SIZE - SGX_AESGCM_IV_SIZE] = '\0';
strncpy(errString, skey, 1024);
mpz_t privateKeyMpz;
......@@ -1028,14 +1029,17 @@ void trustedGetPublicEcdsaKeyAES(int *errStatus, char *errString,
return;
}
LOG_INFO("SET STR SUCCESS");
//Public key
point Pkey = point_init();
signature_extract_public_key(Pkey, privateKeyMpz, curve);
LOG_INFO("SIGNATURE EXTRACT PK SUCCESS");
point Pkey_test = point_init();
point_multiplication(Pkey_test, privateKeyMpz, curve->G, curve);
LOG_INFO("POINT MULTIPLICATION SUCCESS");
if (!point_cmp(Pkey, Pkey_test)) {
snprintf(errString, BUF_LEN, "Points are not equal");
......@@ -1048,11 +1052,14 @@ void trustedGetPublicEcdsaKeyAES(int *errStatus, char *errString,
return;
}
LOG_INFO("POINTS CMP SUCCESS");
int len = mpz_sizeinbase(Pkey->x, ECDSA_SKEY_BASE) + 2;
char arr_x[len];
mpz_get_str(arr_x, ECDSA_SKEY_BASE, Pkey->x);
LOG_INFO("GET STR X SUCCESS");
LOG_INFO(arr_x);
int n_zeroes = 64 - strlen(arr_x);
for (int i = 0; i < n_zeroes; i++) {
......@@ -1063,11 +1070,13 @@ void trustedGetPublicEcdsaKeyAES(int *errStatus, char *errString,
char arr_y[mpz_sizeinbase(Pkey->y, ECDSA_SKEY_BASE) + 2];
mpz_get_str(arr_y, ECDSA_SKEY_BASE, Pkey->y);
LOG_INFO("GET STR Y SUCCESS");
LOG_INFO(arr_y);
n_zeroes = 64 - strlen(arr_y);
for (int i = 0; i < n_zeroes; i++) {
pub_key_y[i] = '0';
}
strncpy(pub_key_y + n_zeroes, arr_y, 1024 - n_zeroes);
strncpy(pub_key_y + n_zeroes, arr_y, 1024 - n_zeroes); // ??????????????????????????????????? SIGSEGV
mpz_clear(privateKeyMpz);
domain_parameters_clear(curve);
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment