how to prove to myself that secured gazell library is encrypting data

To the kind attention of Nordic support team,

I have been doing the pairing between two devices using nrf gazell secured library. Then, what I want to do, it is to read how gazell secured library

has set addresses and timing.

I want to give those addresses and timing to a third device that has got only NOT secured gazell library, and know nothing about the key exchange: I want to be able to receive

correctly from the first transmitting device non encrypted pipe, and I want to receive garbage from the same device encrypted pipe.

I figured out that nrf_gzll_get_base_address_X and nrf_gzll_get_address_prefix_byte is ok to know how address are configured in the paired host.

But I'm still missing every other timing parameter and how to retrieve it in order to set in the third device.

I think in third device I need something like that:

nrf_gzll_init(NRF_GZLL_MODE_HOST);
nrf_gzll_set_datarate(???); 
nrf_gzll_set_max_tx_attempts(???);
nrf_gzll_set_device_channel_selection_policy(???);
nrf_gzll_set_timeslot_period(???);
nrf_gzll_set_sync_lifetime(???);
nrf_gzll_set_timeslots_per_channel(???);
nrf_gzll_set_tx_power(NRF_GZLL_TX_POWER_0_DBM);

nrf_gzll_set_base_address_0(OK);
nrf_gzll_set_base_address_0(OK);
nrf_gzll_set_address_prefix_byte(OK, 0x0);

nrf_gzll_set_base_address_1(OK);
nrf_gzll_set_address_prefix_byte(1, OK);
nrf_gzll_set_address_prefix_byte(2, OK);
nrf_gzll_set_address_prefix_byte(3, OK);
nrf_gzll_set_address_prefix_byte(4, OK);
nrf_gzll_set_address_prefix_byte(5, OK);

nrf_gzll_set_channel_table((uint8_t *)channels, PROTO_GZLL_CHANNEL_TAB_SIZE);

Might you help me in figure out how to retrieve every secured gazell library connection parameters? Please notice that connection parameters refers

to the standard pairing example that you provide in your SDK(15.2 - 15.3 -16 ).

I'll be updating this page for every parameter that I can find studying the code.

Thank you for your kindness

Related