// // Created by miti on 21/07/19. // #include "UntrustedInclude/SealingUntrusted.h" namespace SealingUntrusted { namespace { int create_and_seal_signing_key_pair_to_disk(int fd) { uint32_t ret_status=0, length=0, counter=0; uint8_t* sealed_data; Decryptor_calculate_sealed_keypair_size_wrapper(e2_enclave_id, &length); if(length == 0xFFFFFFFF) return -31; sealed_data=(uint8_t*) malloc(length); // 0x300); // TODO: Shouldn't it be malloc of length? printf("length: %d\n", length); fflush(stdout); Decryptor_create_and_seal_long_term_signing_key_pair_wrapper(e2_enclave_id, &ret_status, &length, sealed_data); if(ret_status != SGX_SUCCESS) { printf("create_and_seal called returned an error: %x", ret_status); free(sealed_data); return -32; } printf("It returned sgx_success\n"); fflush(stdout); for(counter=0; counter