<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Maximum Passkey Length</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/42867/maximum-passkey-length</link><description>As per my requirement, I need strong pairing mechanism, i am referring ble_app_gls example of nRF5_SDK_15.2.0_9412b96 sdk for checking pairing. As i have seen in the code, only 6 bytes passkey are used. Can we increase the Passkey Length? If yes, how</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 23 Jan 2019 09:52:25 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/42867/maximum-passkey-length" /><item><title>RE: Maximum Passkey Length</title><link>https://devzone.nordicsemi.com/thread/167308?ContentTypeID=1</link><pubDate>Wed, 23 Jan 2019 09:52:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c5086013-034d-4ca6-8f15-138527936e79</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;Hi,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The passkey must be 6 digits (0-9) according to the Bluetooth specification.&amp;nbsp;You can read more about the Pairing methods in Bluetooth core specification v.5, vol. 3, part H, section 2.3.&amp;nbsp; I don&amp;#39;t think it&amp;#39;s feasible to perform a MITM attack if you use LE secure connections pairing (LESC).&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>