|
@@ -108,7 +108,7 @@ return decrypt(ciphertext, 32, tag, (uint8_t*) &(apache_mr_signer.m));
|
|
|
}
|
|
|
|
|
|
// signature_data - 96 bytes, encrypted_signature assumed to be at least 64 bytes, tag - at least 16 bytes
|
|
|
-uint32_t create_and_encrypt_mitigator_header_value(uint8_t* plaintext_sign_data_and_sign, uint8_t* encrypted_sign_data_and_sign, uint8_t* tag, sgx_ec256_public_t* pub_key)
|
|
|
+uint32_t create_and_encrypt_mitigator_header_value(uint8_t* plaintext_sign_data_and_sign, uint8_t* encrypted_sign_data_and_sign, uint8_t* tag)
|
|
|
{
|
|
|
uint32_t count;
|
|
|
uint8_t sign_data_and_sign[160];
|
|
@@ -118,13 +118,13 @@ uint32_t create_and_encrypt_mitigator_header_value(uint8_t* plaintext_sign_data_
|
|
|
// printf("Could not generate or sign another keypair for client-side, error:%x.\n", ret_status); fflush(stdout);
|
|
|
return 0xFFFFFFDD;
|
|
|
}
|
|
|
- ret_status=verify_mitigator_header_value(sign_data_and_sign, sign_data_and_sign+96, pub_key);
|
|
|
- if(ret_status !=0)
|
|
|
- return ret_status;
|
|
|
-// for(count=0; count<160; count++)
|
|
|
-// *(plaintext_sign_data_and_sign+count)=sign_data_and_sign[count];
|
|
|
+// ret_status=verify_mitigator_header_value(sign_data_and_sign, sign_data_and_sign+96, pub_key);
|
|
|
+// if(ret_status !=0)
|
|
|
+// return ret_status;
|
|
|
+ for(count=0; count<160; count++)
|
|
|
+ *(plaintext_sign_data_and_sign+count)=sign_data_and_sign[count];
|
|
|
|
|
|
-// ret_status = encrypt_internal(sign_data_and_sign, 160, tag, encrypted_sign_data_and_sign);
|
|
|
+ ret_status = encrypt_internal(sign_data_and_sign, 160, tag, encrypted_sign_data_and_sign);
|
|
|
return ret_status;
|
|
|
}
|
|
|
|