@@ -56,9 +56,6 @@ void deserialize_collateral(uint8_t* p)
56
56
bool verify_dcap_direct_evidence (ByteArray& evidence, ByteArray& expected_statement, ByteArray& expected_code_id)
57
57
{
58
58
ByteArray quote;
59
- ByteArray certification_data;
60
- uint32_t certification_data_size;
61
- uint16_t certification_data_type;
62
59
ByteArray collateral;
63
60
time_t untrusted_time;
64
61
bool b;
@@ -73,7 +70,7 @@ bool verify_dcap_direct_evidence(ByteArray& evidence, ByteArray& expected_statem
73
70
CATCH (b, root = json::parse (evidence_str));
74
71
COND2LOGERR (!b, " bad dcap evidence json" );
75
72
76
- // get attestation
73
+ // get attestation/quote
77
74
std::string b64attestation_str;
78
75
std::string attestation_str;
79
76
CATCH (b, b64attestation_str = root[ATTESTATION_TAG].template get <std::string>());
@@ -114,6 +111,10 @@ bool verify_dcap_direct_evidence(ByteArray& evidence, ByteArray& expected_statem
114
111
115
112
// verify quote
116
113
{
114
+ ByteArray certification_data;
115
+ uint32_t certification_data_size;
116
+ uint16_t certification_data_type;
117
+
117
118
qvl_status = sgxAttestationGetQECertificationDataSize (quote.data (), quote.size (), &certification_data_size);
118
119
COND2LOGERR (qvl_status != STATUS_OK,
119
120
" error certification data size: %x" , qvl_status);
0 commit comments