<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>BLEGapSecStatus.confirm_value on passkey bonding.</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/40955/blegapsecstatus-confirm_value-on-passkey-bonding</link><description>Hi all, I&amp;#39;m trying to implement passkey bonding using pc-ble-driver-py. 
 It doesn&amp;#39;t appear to be supported in the BLEDriver.py itself, so I tried to add the sd_ble_gap_auth_key_reply call to pc-ble-driver myself. 
 I&amp;#39;m using: 
 
 And feeding in: 
 
</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 02 May 2019 17:34:47 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/40955/blegapsecstatus-confirm_value-on-passkey-bonding" /><item><title>RE: BLEGapSecStatus.confirm_value on passkey bonding.</title><link>https://devzone.nordicsemi.com/thread/184988?ContentTypeID=1</link><pubDate>Thu, 02 May 2019 17:34:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:756b533d-3d76-4ecc-acd2-aa677420504d</guid><dc:creator>Alex</dc:creator><description>&lt;p&gt;Hello, I&amp;#39;d like to use ble_gap_auth_key_reply() to send a fixed passkey as well.&amp;nbsp; Any luck with this?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLEGapSecStatus.confirm_value on passkey bonding.</title><link>https://devzone.nordicsemi.com/thread/164522?ContentTypeID=1</link><pubDate>Tue, 08 Jan 2019 12:58:18 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b2b22c87-4594-40f7-966e-8112e9e24eb2</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;The passkey is forwarded to the SoftDevice by the connectivity firmware running on the nRF device (which receives it via UART from the pc-ble-driver). I was interested in checking the pass key at this point. It should be corrupted already here, since we know that the pc-ble-driver and connectivity firmware itself works (by using nRF Connect). You could verify by debugging or adding some logging in&amp;nbsp;conn_mw_ble_gap_auth_key_reply() in the connectivity firmware? Perhaps seeing how the passkey is corrupted could give some hint.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLEGapSecStatus.confirm_value on passkey bonding.</title><link>https://devzone.nordicsemi.com/thread/164030?ContentTypeID=1</link><pubDate>Fri, 04 Jan 2019 16:50:12 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b192040f-baf2-49ff-bf62-41b0954aaa26</guid><dc:creator>mstratford_c</dc:creator><description>&lt;p&gt;Hi, I&amp;#39;m just getting back to working on this again. Is there a way to see from the Nordic SDK (I&amp;#39;m using a nrf52 dev board running the glucose service peripheral example in SDK 15.2) to see what the other side is receiving pass-code wise? As far as I can see it&amp;#39;s hidden within the softdevice itself. I can confirm that NRF Connect on PC with passcode bonding works fine. As far as I can see, ble_adapter.py does all this in the authenticate() function correctly. &lt;a href="https://www.nordicsemi.com/DocLib/Content/SoftDevice_API_Doc/S130/v2-0-1/group_ble_gap_central_bonding_pk_periph_oob_msc"&gt;www.nordicsemi.com/.../group_ble_gap_central_bonding_pk_periph_oob_msc&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLEGapSecStatus.confirm_value on passkey bonding.</title><link>https://devzone.nordicsemi.com/thread/160873?ContentTypeID=1</link><pubDate>Mon, 10 Dec 2018 07:08:45 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:56f5ab15-4b49-4a88-b088-bb137dd6de04</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;I was wondering if you could debug on the nRF side, which is based on the SDK connectivity firmware with some patched from the pc-ble-driver. How to patch it and build it is described &lt;a href="https://github.com/NordicSemiconductor/pc-ble-driver/blob/master/Installation.md#compiling-the-connectivity-hex-files"&gt;here&lt;/a&gt;. I do not expect there to be any issues on that side though, as the connectivity firmware itself and pc-ble-driver support passkey entry and that works. This can easily be verified by simply using&amp;nbsp;&lt;a href="https://github.com/NordicSemiconductor/pc-nrfconnect-ble"&gt;nRF Connect Bluetooth Low Energy&lt;/a&gt;, which uses pc-ble-driver (with the js wrapper) under the hood.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLEGapSecStatus.confirm_value on passkey bonding.</title><link>https://devzone.nordicsemi.com/thread/160582?ContentTypeID=1</link><pubDate>Thu, 06 Dec 2018 13:24:24 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c6b36a70-50da-4efd-aa4c-440783e78471</guid><dc:creator>mstratford_c</dc:creator><description>&lt;p&gt;Hi there, i&amp;#39;m not seeing an obvious instructions for building those into some firmware I can debug in Keil 5? Could you elaborate a little more please? Cheers!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLEGapSecStatus.confirm_value on passkey bonding.</title><link>https://devzone.nordicsemi.com/thread/160218?ContentTypeID=1</link><pubDate>Tue, 04 Dec 2018 13:53:14 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d2ce7185-5289-4715-8dad-5aff29114c67</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;I see. Can you debug on the nRF side, and see if all looks good in&amp;nbsp;conn_mw_ble_gap_auth_key_reply() in conn_mw_ble_gap.c?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLEGapSecStatus.confirm_value on passkey bonding.</title><link>https://devzone.nordicsemi.com/thread/160005?ContentTypeID=1</link><pubDate>Mon, 03 Dec 2018 14:36:28 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:66f0ed00-98d7-4857-b147-d9f6341e75df</guid><dc:creator>mstratford_c</dc:creator><description>&lt;p&gt;Hi there, I&amp;#39;ve just checked this, it&amp;#39;s giving me a 6 element array of 0x30-0x39, as required. I&amp;#39;d like to mention, this code did/does work perfectly with the old&amp;nbsp;nrf51-ble-driver_win_0.5.0. Given I&amp;#39;ve tried this with multiple Bluetooth devices, of which work fine with passcodes on my phone, I think it&amp;#39;s an issue with the Softdevice / DLL&amp;nbsp;driver layer provided with the python pc-ble-central-py PIP/github package. Cheers.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLEGapSecStatus.confirm_value on passkey bonding.</title><link>https://devzone.nordicsemi.com/thread/159436?ContentTypeID=1</link><pubDate>Wed, 28 Nov 2018 14:38:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6ded927e-7e30-4542-adea-e8eba8ff01b6</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Ah, yes. I missed that when I read the question. In that case it seems you are successfully providing six bytes, but for some reason they are corrupted. Can you do the conversion with util.list_to_uint8_array(key).cast() before the call to&amp;nbsp;driver::sd_ble_gap_auth_key_reply(), just so you can verify that it is what you would expect? It should be a ASCII string with only 0-9, so each byte in the array should be between 0x30 and 0x39.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLEGapSecStatus.confirm_value on passkey bonding.</title><link>https://devzone.nordicsemi.com/thread/159428?ContentTypeID=1</link><pubDate>Wed, 28 Nov 2018 14:15:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:705e3959-345d-489d-a02a-164fc8a86e6a</guid><dc:creator>mstratford_c</dc:creator><description>&lt;p&gt;&lt;span&gt;The auth_status returns as BLEGapSecStatus.confirm_value according to the driver. All I can see is&amp;nbsp;&lt;a href="https://infocenter.nordicsemi.com/topic/com.nordic.infocenter.s120.api.v2.1.0/group___b_l_e___g_a_p___s_e_c___s_t_a_t_u_s.html#ga9d1c29d319e7b1b77d8bbae74760cfe5"&gt;infocenter.nordicsemi.com/.../group___b_l_e___g_a_p___s_e_c___s_t_a_t_u_s.html&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLEGapSecStatus.confirm_value on passkey bonding.</title><link>https://devzone.nordicsemi.com/thread/159427?ContentTypeID=1</link><pubDate>Wed, 28 Nov 2018 14:12:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:16f6c5bf-88b7-4776-bd94-f8e99d2a1066</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;This looks sensible, though I have not tested myself. What is the auth_status you get?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>