@@ -60,16 +60,8 @@ int BluetoothCryptoToolbox::f5(uint8_t DHKey[],uint8_t N_master[], uint8_t N_sla
6060 printBytes (BD_ADDR_slave, ADDR_LEN);
6161#endif
6262
63- uint8_t ADD_M[7 ];
64- uint8_t ADD_S[7 ];
6563 uint8_t T[16 ];
6664
67- for (int i=0 ; i<6 ; i++){
68- ADD_M[1 +i] = BD_ADDR_master[i];
69- ADD_M[0 ] = 0x00 ;
70- ADD_S[i+1 ] = BD_ADDR_slave[i];
71- ADD_S[0 ] = 0x00 ;
72- }
7365 struct __attribute__ ((packed)) CmacInput
7466 {
7567 uint8_t counter;
@@ -135,11 +127,8 @@ int BluetoothCryptoToolbox::ah(uint8_t k[16], uint8_t r[3], uint8_t* result)
135127void BluetoothCryptoToolbox::testAh ()
136128{
137129 uint8_t irk[16 ] = {0xec ,0x02 ,0x34 ,0xa3 ,0x57 ,0xc8 ,0xad ,0x05 ,0x34 ,0x10 ,0x10 ,0xa6 ,0x0a ,0x39 ,0x7d ,0x9b };
138- uint8_t r[3 ] = {0x70 ,0x81 ,0x94 };
139- uint8_t expected_AES[16 ] = {0x15 ,0x9d ,0x5f ,0xb7 ,0x2e ,0xbe ,0x23 ,0x11 ,0xa4 ,0x8c ,0x1b ,0xdc ,0xc4 ,0x0d ,0xfb ,0xaa };
140130 uint8_t expected_final[3 ] = {0x0d ,0xfb ,0xaa };
141131
142- for (int i=0 ; i<3 ; i++) r[2 -i] = expected_final[3 +i];
143132 uint8_t ourResult[3 ];
144133 ah (irk, expected_final, ourResult);
145134
@@ -170,7 +159,6 @@ void BluetoothCryptoToolbox::testg2(){
170159 uint8_t V[32 ] = {0x55 ,0x18 ,0x8b ,0x3d ,0x32 ,0xf6 ,0xbb ,0x9a ,0x90 ,0x0a ,0xfc ,0xfb ,0xee ,0xd4 ,0xe7 ,0x2a ,0x59 ,0xcb ,0x9a ,0xc2 ,0xf1 ,0x9d ,0x7c ,0xfb ,0x6b ,0x4f ,0xdd ,0x49 ,0xf4 ,0x7f ,0xc5 ,0xfd };
171160 uint8_t X[16 ] = {0xd5 ,0xcb ,0x84 ,0x54 ,0xd1 ,0x77 ,0x73 ,0x3e ,0xff ,0xff ,0xb2 ,0xec ,0x71 ,0x2b ,0xae ,0xab };
172161 uint8_t Y[16 ] = {0xa6 ,0xe8 ,0xe7 ,0xcc ,0x25 ,0xa7 ,0x5f ,0x6e ,0x21 ,0x65 ,0x83 ,0xf7 ,0xff ,0x3d ,0xc4 ,0xcf };
173- uint8_t AES[16 ] = {0x15 ,0x36 ,0xd1 ,0x8d ,0xe3 ,0xd2 ,0x0d ,0xf9 ,0x9b ,0x70 ,0x44 ,0xc1 ,0x2f ,0x9e ,0xd5 ,0xba };
174162 uint8_t out[4 ];
175163
176164
0 commit comments