Skip to content

Commit e389eaf

Browse files
committed
Wrap prints with #ifdef _BLE_TRACE_
1 parent a1f8e3e commit e389eaf

File tree

2 files changed

+23
-7
lines changed

2 files changed

+23
-7
lines changed

src/utility/HCI.cpp

+8
Original file line numberDiff line numberDiff line change
@@ -485,6 +485,7 @@ void HCIClass::leAddResolvingAddress(uint8_t addressType, uint8_t* peerAddress,
485485
addDevice.peerIRK[15-i] = peerIrk[i];
486486
addDevice.localIRK[15-i] = localIrk[i];
487487
}
488+
#ifdef _BLE_TRACE_
488489
Serial.print("ADDTYPE :");
489490
btct.printBytes(&addDevice.peerAddressType,1);
490491
Serial.print("adddddd :");
@@ -493,6 +494,7 @@ void HCIClass::leAddResolvingAddress(uint8_t addressType, uint8_t* peerAddress,
493494
btct.printBytes(addDevice.peerIRK,16);
494495
Serial.print("localIRK :");
495496
btct.printBytes(addDevice.localIRK,16);
497+
#endif
496498
sendCommand(OGF_LE_CTL << 10 | 0x27, sizeof(addDevice), &addDevice);
497499

498500
leStartResolvingAddresses();
@@ -516,17 +518,21 @@ int HCIClass::leReadPeerResolvableAddress(uint8_t peerAddressType, uint8_t* peer
516518

517519

518520
int res = sendCommand(OGF_LE_CTL << 10 | 0x2B, sizeof(request), &request);
521+
#ifdef _BLE_TRACE_
519522
Serial.print("res: 0x");
520523
Serial.println(res, HEX);
524+
#endif
521525
if(res==0){
522526
struct __attribute__ ((packed)) Response {
523527
uint8_t status;
524528
uint8_t peerResolvableAddress[6];
525529
} *response = (Response*)_cmdResponse;
530+
#ifdef _BLE_TRACE_
526531
Serial.print("Address resolution status: 0x");
527532
Serial.println(response->status, HEX);
528533
Serial.print("peer resolvable address: ");
529534
btct.printBytes(response->peerResolvableAddress,6);
535+
#endif
530536
}
531537
return res;
532538
}
@@ -566,7 +572,9 @@ int HCIClass::tryResolveAddress(uint8_t* BDAddr, uint8_t* address){
566572

567573

568574
if(!HCI._getIRKs(&nIRKs, BDAddrType, BADDRs, IRKs)){
575+
#ifdef _BLE_TRACE_
569576
Serial.println("error getting IRKs.");
577+
#endif
570578
}
571579
for(int i=0; i<nIRKs; i++){
572580
if(!foundMatch){

src/utility/btct.cpp

+15-7
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ unsigned char const_Rb[16] = {
2727
#define LEN_MAC_KEY 16
2828

2929
void BluetoothCryptoToolbox::printBytes(uint8_t bytes[], uint8_t length){
30+
#ifdef _BLE_TRACE_
3031
for(int i=0; i<length; i++){
3132
if(i>0){
3233
Serial.print(", 0x");
@@ -36,7 +37,10 @@ void BluetoothCryptoToolbox::printBytes(uint8_t bytes[], uint8_t length){
3637
Serial.print(bytes[i],HEX);
3738
}
3839
Serial.print('\n');
40+
#endif
3941
}
42+
43+
4044
int BluetoothCryptoToolbox::f5(uint8_t DHKey[],uint8_t N_master[], uint8_t N_slave[],
4145
uint8_t BD_ADDR_master[], uint8_t BD_ADDR_slave[], uint8_t MacKey[], uint8_t LTK[])
4246
{
@@ -128,15 +132,15 @@ void BluetoothCryptoToolbox::testAh()
128132
{
129133
uint8_t irk[16] = {0xec,0x02,0x34,0xa3,0x57,0xc8,0xad,0x05,0x34,0x10,0x10,0xa6,0x0a,0x39,0x7d,0x9b};
130134
uint8_t expected_final[3] = {0x0d,0xfb,0xaa};
131-
132135
uint8_t ourResult[3];
133136
ah(irk, expected_final, ourResult);
134137

135-
138+
#ifdef _BLE_TRACE_
136139
Serial.print("Expected : ");
137140
printBytes(&expected_final[3], 3);
138141
Serial.print("Actual : ");
139142
printBytes(ourResult, 3);
143+
#endif
140144
}
141145

142146
int BluetoothCryptoToolbox::g2(uint8_t U[], uint8_t V[], uint8_t X[], uint8_t Y[], uint8_t out[4])
@@ -160,19 +164,19 @@ void BluetoothCryptoToolbox::testg2(){
160164
uint8_t X[16] = {0xd5,0xcb,0x84,0x54,0xd1,0x77,0x73,0x3e,0xff,0xff,0xb2,0xec,0x71,0x2b,0xae,0xab};
161165
uint8_t Y[16] = {0xa6,0xe8,0xe7,0xcc,0x25,0xa7,0x5f,0x6e,0x21,0x65,0x83,0xf7,0xff,0x3d,0xc4,0xcf};
162166
uint8_t out[4];
163-
164-
167+
165168
uint32_t expected = 0;
166169
g2(U,V,X,Y,out);
167170
uint32_t result = 0;
168171
for(int i=0; i<4; i++) result += out[i] << 8*i;
169172

173+
#ifdef _BLE_TRACE_
170174
Serial.print("Expected : ");
171175
Serial.println(expected);
172176
Serial.print("Result : ");
173177
Serial.println(result);
174178
Serial.println();
175-
179+
#endif
176180
}
177181

178182
void BluetoothCryptoToolbox::AES_CMAC ( unsigned char *key, unsigned char *input, int length,
@@ -264,16 +268,20 @@ int BluetoothCryptoToolbox::AES_128(uint8_t* key, uint8_t* data_in, uint8_t* dat
264268
int n = 0;
265269
int tries = 30;
266270
while(HCI.leEncrypt(key,data_in, &status, data_out)!=1&&n<tries){
271+
#ifdef _BLE_TRACE_
267272
Serial.print("AES failed... retrying: ");
268273
Serial.println(n);
274+
#endif
269275
BLE.end();
270276
delay(200);
271277
BLE.begin();
272278
n++;
273279
delay(100*n);
274280
}
275281
if(n==tries){
282+
#ifdef _BLE_TRACE_
276283
Serial.println("something went wrong with AES.");
284+
#endif
277285
return 0;
278286
}
279287
return 1;
@@ -288,7 +296,7 @@ void BluetoothCryptoToolbox::test(){
288296

289297
for ( i=0; i<16; i++ ) Z[i] = 0x00;
290298
uint8_t k[16] = {0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c};
291-
299+
292300
Serial.println("AES Plaintext:");
293301
for(int i=0; i<16; i++){
294302
Serial.print(" 0x");
@@ -352,7 +360,7 @@ void BluetoothCryptoToolbox::test(){
352360
}
353361
Serial.println(".");
354362
}
355-
#endif
363+
#endif //_BLE_TRACE_
356364
// From RFC
357365
void BluetoothCryptoToolbox::leftshift_onebit(unsigned char *input,unsigned char *output)
358366
{

0 commit comments

Comments
 (0)