Fixes

parent f0b1f121
...@@ -98,8 +98,6 @@ bool sign(const char* _encryptedKeyHex, const char* _hashHex, size_t _t, size_t ...@@ -98,8 +98,6 @@ bool sign(const char* _encryptedKeyHex, const char* _hashHex, size_t _t, size_t
hex2carray(_hashHex, &binLen, hash->data()); hex2carray(_hashHex, &binLen, hash->data());
auto keyShare = std::make_shared<BLSPrivateKeyShareSGX>(keyStr, _t, _n); auto keyShare = std::make_shared<BLSPrivateKeyShareSGX>(keyStr, _t, _n);
auto sigShare = keyShare->signWithHelperSGX(hash, _signerIndex); auto sigShare = keyShare->signWithHelperSGX(hash, _signerIndex);
......
...@@ -159,6 +159,8 @@ std::shared_ptr<BLSSigShare> BLSPrivateKeyShareSGX::signWithHelperSGX( ...@@ -159,6 +159,8 @@ std::shared_ptr<BLSSigShare> BLSPrivateKeyShareSGX::signWithHelperSGX(
BOOST_THROW_EXCEPTION(std::invalid_argument("Invalid hex encrypted key")); BOOST_THROW_EXCEPTION(std::invalid_argument("Invalid hex encrypted key"));
} }
cerr << "Key is " + *encryptedKeyHex << endl;
sgx_status_t status = sgx_status_t status =
bls_sign_message(eid, &errStatus, errMsg, encryptedKey, bls_sign_message(eid, &errStatus, errMsg, encryptedKey,
encryptedKeyHex->size() / 2, xStrArg, yStrArg, signature); encryptedKeyHex->size() / 2, xStrArg, yStrArg, signature);
......
...@@ -99,8 +99,8 @@ add_custom_target(sgxd COMMAND make all ...@@ -99,8 +99,8 @@ add_custom_target(sgxd COMMAND make all
libff/libff/common/utils.cpp libff/libff/common/utils.cpp
libff/libff/common/utils.hpp libff/libff/common/utils.hpp
libff/libff/common/utils.tcc libff/libff/common/utils.tcc
secure_enclave/BLSUtils.cpp secure_enclave/BLSEnclave.cpp
secure_enclave/BLSUtils.h secure_enclave/BLSEnclave.h
secure_enclave/secure_enclave.c secure_enclave/secure_enclave.c
secure_enclave/secure_enclave_t.c secure_enclave/secure_enclave_t.c
secure_enclave/secure_enclave_t.h secure_enclave/secure_enclave_t.h
......
...@@ -125,7 +125,7 @@ void checkKey(int *err_status, char *err_string, const char *_keyString) { ...@@ -125,7 +125,7 @@ void checkKey(int *err_status, char *err_string, const char *_keyString) {
} }
bool sign(const char *_keyString, const char *_hashXString, const char *_hashYString, bool enclave_sign(const char *_keyString, const char *_hashXString, const char *_hashYString,
char sig[BUF_LEN]) { char sig[BUF_LEN]) {
......
...@@ -19,7 +19,7 @@ EXTERNC void check_key(int *err_status, char *err_string, const char* _keyString ...@@ -19,7 +19,7 @@ EXTERNC void check_key(int *err_status, char *err_string, const char* _keyString
EXTERNC bool sign(const char *_keyString, const char* _hashXString, const char* _hashYString, EXTERNC bool enclave_sign(const char *_keyString, const char* _hashXString, const char* _hashYString,
char* _sig); char* _sig);
......
...@@ -242,8 +242,9 @@ void bls_sign_message(int *err_status, char *err_string, uint8_t *encrypted_key, ...@@ -242,8 +242,9 @@ void bls_sign_message(int *err_status, char *err_string, uint8_t *encrypted_key,
char *_hashY, char *signature) { char *_hashY, char *signature) {
char key[BUF_LEN]; char key[BUF_LEN];
char sig[BUF_LEN]; char* sig = (char*) calloc(BUF_LEN, 1);
init(); init();
...@@ -254,7 +255,7 @@ void bls_sign_message(int *err_status, char *err_string, uint8_t *encrypted_key, ...@@ -254,7 +255,7 @@ void bls_sign_message(int *err_status, char *err_string, uint8_t *encrypted_key,
return; return;
} }
sign(key, _hashX, _hashY, sig); // enclave_sign(key, _hashX, _hashY, sig);
strncpy(signature, sig, BUF_LEN); strncpy(signature, sig, BUF_LEN);
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment