diff --git a/firmware/SECRETS b/firmware/SECRETS index 3ea9057..7309cf8 100644 --- a/firmware/SECRETS +++ b/firmware/SECRETS @@ -3,6 +3,7 @@ #undef ENCRYPT_L0DABLE +#if 0 static uint32_t const meshkey[4] = { 0x00000042, 0x000005ec, 0x00000023, 0x00000005 }; @@ -18,5 +19,5 @@ static uint32_t const l0dable_sign_key[4] = { static uint32_t const l0dable_crypt_key[4] = { 0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff }; - +#endif #endif diff --git a/firmware/SECRETS.release b/firmware/SECRETS.release index a87bb87..dbe72e3 100644 --- a/firmware/SECRETS.release +++ b/firmware/SECRETS.release @@ -3,6 +3,7 @@ #undef ENCRYPT_L0DABLE 1 +#if 0 static uint32_t const meshkey[4] = { 0xafbbcb26, 0x39108427, 0x455ef5e5, 0x51b482d2 }; @@ -18,5 +19,5 @@ static uint32_t const l0dable_sign_key[4] = { static uint32_t const l0dable_crypt_key[4] = { 0x303e5fab, 0x1240acc9, 0xf8496f21, 0x361fd856 }; - +#endif #endif diff --git a/firmware/funk/mesh.c b/firmware/funk/mesh.c index 2028ede..dc7cc78 100644 --- a/firmware/funk/mesh.c +++ b/firmware/funk/mesh.c @@ -148,7 +148,7 @@ void mesh_sendloop(void){ }; ctr++; memcpy(buf,meshbuffer[i].pkt,MESHPKTSIZE); - status=nrf_snd_pkt_crc_encr(MESHPKTSIZE,buf,meshkey); + status=nrf_snd_pkt_crc_encr(MESHPKTSIZE,buf,NULL); //Check status? But what would we do... }; @@ -185,7 +185,7 @@ uint8_t mesh_recvqloop_work(void){ __attribute__ ((aligned (4))) uint8_t buf[32]; int len; - len=nrf_rcv_pkt_poll_dec(sizeof(buf),buf,meshkey); + len=nrf_rcv_pkt_poll_dec(sizeof(buf),buf,NULL); // Receive if(len<=0){