|
@@ -637,7 +637,7 @@ int local_attestation_initiator(__attribute__((unused)) uint8_t* expected_mr_s
|
|
|
}
|
|
|
encode_msg1_to_protobuf(protobuf_msg1, &dh_msg1);
|
|
|
print_initialized_msg1(protobuf_msg1, &dh_msg1);
|
|
|
- printf("Done initialization");
|
|
|
+ printf("Done initialization with session id 0x%x", session_id);
|
|
|
fflush(stdout);
|
|
|
|
|
|
int no_of_msgs_xchanged=0;
|
|
@@ -708,18 +708,18 @@ uint32_t unseal_signing_key_pair_from_disk(int fd, __attribute__((unused)) sgx_
|
|
|
return ret_status;
|
|
|
}
|
|
|
*/
|
|
|
-uint32_t create_and_seal_signing_key_pair_to_disk( __attribute__((unused)) int fd, sgx_ec256_public_t* pub_key, uint32_t* actual_sealed_msg_length)
|
|
|
+uint32_t create_and_seal_signing_key_pair_to_disk( __attribute__((unused)) int fd, __attribute__((unused)) sgx_ec256_public_t* pub_key, __attribute__((unused)) uint32_t* actual_sealed_msg_length)
|
|
|
{
|
|
|
- uint32_t ret_status;
|
|
|
+ // uint32_t ret_status;
|
|
|
// Generating a signing ECDSA key to sign the encryption key.
|
|
|
-
|
|
|
- Decryptor_calculate_sealed_data_size(e2_enclave_id, 3*SGX_ECP256_KEY_SIZE, actual_sealed_msg_length); // sgx_calc_sealed_data_size(0,3*SGX_ECP256_KEY_SIZE);
|
|
|
- if(*actual_sealed_msg_length == 0xFFFFFFFF)
|
|
|
+ uint32_t length;
|
|
|
+ Decryptor_calculate_sealed_data_size(e2_enclave_id, &length, 3*SGX_ECP256_KEY_SIZE); // sgx_calc_sealed_data_size(0,3*SGX_ECP256_KEY_SIZE);
|
|
|
+ if(length == 0xFFFFFFFF)
|
|
|
return 0xFFFFFFFF;
|
|
|
- printf("%x bytes for sealed msg\n", *actual_sealed_msg_length); fflush(stdout);
|
|
|
- uint8_t* sealed_data=(uint8_t*) malloc(*actual_sealed_msg_length);
|
|
|
+ printf("0x%x input msg, 0x%x bytes for sealed msg in parameter value\n", 3*SGX_ECP256_KEY_SIZE, length); fflush(stdout);
|
|
|
+// uint8_t* sealed_data=(uint8_t*) malloc(*actual_sealed_msg_length);
|
|
|
printf("Made call to sgx_calc_sealed_data_size\n"); fflush(stdout);
|
|
|
- Decryptor_create_and_seal_ecdsa_signing_key_pair(e2_enclave_id, &ret_status, pub_key, actual_sealed_msg_length, sealed_data);
|
|
|
+/* Decryptor_create_and_seal_ecdsa_signing_key_pair(e2_enclave_id, &ret_status, pub_key, actual_sealed_msg_length, sealed_data);
|
|
|
if(ret_status != SGX_SUCCESS)
|
|
|
{
|
|
|
printf("create_and_seal called returned an error: %x", ret_status);
|
|
@@ -727,7 +727,8 @@ uint32_t create_and_seal_signing_key_pair_to_disk( __attribute__((unused)) int
|
|
|
return 0xFFFFFFFF;
|
|
|
}
|
|
|
printf("It returned sgx_success\n"); fflush(stdout);
|
|
|
-/* ret_status = write_to_fd(fd, sealed_data, actual_sealed_msg_length);
|
|
|
+
|
|
|
+ ret_status = write_to_fd(fd, sealed_data, actual_sealed_msg_length);
|
|
|
free(sealed_data);
|
|
|
return ret_status;*/ return 0;
|
|
|
}
|
|
@@ -752,13 +753,13 @@ int main(__attribute__((unused)) int argc, __attribute__((unused)) char* argv[])
|
|
|
}
|
|
|
printf("\nDecryptor - EnclaveID %" PRIx64, e2_enclave_id);
|
|
|
fflush(stdout);
|
|
|
- ret_status=local_attestation_initiator(NULL);
|
|
|
+/* ret_status=local_attestation_initiator(NULL);
|
|
|
if(ret_status!=0)
|
|
|
{
|
|
|
printf("local attestation did not successfully return: %x\n", ret_status); fflush(stdout); return 0xFFFFFFFF;
|
|
|
|
|
|
}
|
|
|
- int sealed_signing_key_fd = open("sealed_signing_key.txt", O_CREAT | O_RDWR, S_IRUSR | S_IWUSR);
|
|
|
+ */ int sealed_signing_key_fd = open("sealed_signing_key.txt", O_CREAT | O_RDWR, S_IRUSR | S_IWUSR);
|
|
|
if(sealed_signing_key_fd == -1)
|
|
|
{
|
|
|
perror("\nError in opening the file sealed_signing_key.txt - ");
|