From 97c84656d9173c7136e249097586f3a28cc4f071 Mon Sep 17 00:00:00 2001 From: alperen sener Date: Tue, 4 Nov 2025 17:05:33 +0100 Subject: [PATCH 1/4] manifest: sdk-zephyr: deprecate fixed passkey Manifest update to depracate and replace BT_FIXED_PADDKEY Signed-off-by: alperen sener --- west.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/west.yml b/west.yml index cb402e7a376..bff0ebdba9b 100644 --- a/west.yml +++ b/west.yml @@ -65,7 +65,7 @@ manifest: # https://developer.nordicsemi.com/nRF_Connect_SDK/doc/latest/zephyr/guides/modules.html - name: zephyr repo-path: sdk-zephyr - revision: cefb2ed86ac723218c509ef7ceae2509bb1f89f6 + revision: pull/3466/head import: # In addition to the zephyr repository itself, NCS also # imports the contents of zephyr/west.yml at the above From 81f6477b873a5b141b2ee41535c13e0bce5678e0 Mon Sep 17 00:00:00 2001 From: alperen sener Date: Tue, 4 Nov 2025 14:13:07 +0100 Subject: [PATCH 2/4] bluetooth: mesh: update le pair responder model with BT_APP_PASSKEY BT_FIXED_PASSKEY is depracated so wee need to aling the le pair responder model with the new Kconfig BT_APP_PASSKEY usage. Adding bt_mesh_le_pair_resp_passkey_get to be able to retreive the passkey set randomly or by app. Signed-off-by: alperen sener --- .../mesh/vnd/images/bt_mesh_le_pair_resp.svg | 554 +++++++++++------- .../bluetooth/mesh/vnd/le_pair_resp.rst | 17 +- .../releases/release-notes-changelog.rst | 6 + include/bluetooth/mesh/vnd/le_pair_resp.h | 14 +- subsys/bluetooth/mesh/vnd/Kconfig | 4 +- subsys/bluetooth/mesh/vnd/le_pair_resp.c | 21 +- 6 files changed, 381 insertions(+), 235 deletions(-) diff --git a/doc/nrf/libraries/bluetooth/mesh/vnd/images/bt_mesh_le_pair_resp.svg b/doc/nrf/libraries/bluetooth/mesh/vnd/images/bt_mesh_le_pair_resp.svg index f02269c0389..a299e819c69 100644 --- a/doc/nrf/libraries/bluetooth/mesh/vnd/images/bt_mesh_le_pair_resp.svg +++ b/doc/nrf/libraries/bluetooth/mesh/vnd/images/bt_mesh_le_pair_resp.svg @@ -1,210 +1,344 @@ - - - - - - - - - - - - - - - - - - - nRF Connect SDK diagram - - Sheet.1 - Max 800 px - - - Max 800 px - - Sheet.2 - Max 780 px - - - Max 780 px - - Sheet.3 - - - - Sheet.4 - - - - Straight Line - - - - Straight Line.15 - - - - Line Arrow - Passkey Reset - - - - - Passkey Reset - - Arced Line Double Arrow - - - - - - Box - bt_rand() + bt_passkey_set() - - bt_rand() + bt_passkey_set() - - Arced Line Double Arrow.30 - - - - - - Box.31 - Setting the received passkey - - Setting the received passkey - - Arced Line Double Arrow.32 - - - - - - Box.33 - bt_conn_auth_pairing_confirm() - - bt_conn_auth_pairing_confirm() - - Arced Line Double Arrow.38 - - - - - - Box.39 - bt_mesh_le_pair_resp_passkey_invalidate() - - bt_mesh_le_pair_resp_passkey_invalidate() - - Line Arrow.47 - Passkey Status (passkey) - - - - - Passkey Status (passkey) - - Signal, right-to-left - - Dynamic connector.32 - - - - Sheet.19 - bt_conn_auth_cb.pairing_display() - - bt_conn_auth_cb.pairing_display() - - - Signal, right-to-left.52 - - Dynamic connector.32 - - - - Sheet.22 - bt_conn_auth_cb.pairing_confirm() - - bt_conn_auth_cb.pairing_confirm() - - - Signal, right-to-left.55 - - Dynamic connector.32 - - - - Sheet.25 - bt_conn_auth_info_cb.pairing_complete() / bt_conn_auth_info_c... - - bt_conn_auth_info_cb.pairing_complete() / bt_conn_auth_info_cb.pairing_failed() - - - Signal, left-to-right - - Dynamic connector.31 - - - - Sheet.28 - A passkey is requested - - A passkey is requested - - - Nordic Lake - Initiator (Mobile app) - - Initiator (Mobile app) - - Nordic Lake.77 - LE Pairing Responder (Mesh node) - - LE Pairing Responder (Mesh node) - - Nordic Middle Grey - The Initiator is ready for pairing - - The Initiator is ready for pairing - - Nordic Middle Grey.82 - The Initiator requests the passkey - - The Initiator requests the passkey - - Nordic Middle Grey.84 - The Initiator initiates the pairing - - The Initiator initiates the pairing - - Nordic Middle Grey.86 - Pairing completed / failed - - Pairing completed / failed - - + + + + + + + + + + + + + + + + + nRF Connect SDK diagram + + + + + + Sheet.1 + Max 800 px + + + + + Max 800 px + + Sheet.2 + Max 780 px + + + + + Max 780 px + + Sheet.3 + + + + Sheet.4 + + + + Straight Line + + + + + + + Straight Line.15 + + + + + + + Line Arrow + Passkey Reset + + + + + + + + + + + + Passkey Reset + + Arced Line Double Arrow + + + + + + + + + + + Box + Create random passkey or use passkey set by App. + + + + + + + Create random passkey or use passkey set by App. + + Box.31 + bt_conn_auth_cb: passkey_entry (passkey) + + + + + + + bt_conn_auth_cb: passkey_entry (passkey) + + Box.33 + bt_conn_auth_pairing_confirm() + + + + + + + bt_conn_auth_pairing_confirm() + + Box.39 + bt_mesh_le_pair_passkey_invalidate() + + + + + + + bt_mesh_le_pair_passkey_invalidate() + + Line Arrow.47 + Passkey Status (passkey) + + + + + + + + + + + + Passkey Status (passkey) + + Nordic Lake + Initiator (Mobile app) + + + + Initiator + (Mobile app) + + Nordic Lake.77 + LE Pairing Responder (Mesh node) + + + + LE Pairing Responder + (Mesh node) + + Nordic Middle Grey + Initiator for pairing + + + + Initiator for pairing + + Nordic Middle Grey.82 + Initiator requests the passkey + + + + Initiator requests the passkey + + Nordic Middle Grey.84 + Initiator starts pairing + + + + Initiator starts pairing + + Nordic Middle Grey.86 + Pairing completed / failed + + + + Pairing completed / failed + + Arced Line Double Arrow.36 + + + + + + + + + + + Signal, right-to-left.37 + + Sheet.39 + + + + + Sheet.40 + bt_conn_auth_cb: app_passkey(passkey) + + + + bt_conn_auth_cb: app_passkey(passkey) + + Arced Line Double Arrow.44 + + + + + + + + + + + Sheet.47 + bt_conn_auth_cb: pairing_display(passkey) + + + + bt_conn_auth_cb: pairing_display(passkey) + + Sheet.48 + bt_conn_auth_cb: pairing_confirm(passkey) + + + + bt_conn_auth_cb: pairing_confirm(passkey) + + Arced Line Double Arrow.49 + + + + + + + + + + + Arced Line Double Arrow.50 + + + + + + + + + + + Sheet.51 + bt_conn_auth_Info_cb: pairing_complete + + + + bt_conn_auth_Info_cb: pairing_complete + + Sheet.52 + bt_conn_auth_Info_cb: pairing_failed + + + + bt_conn_auth_Info_cb: pairing_failed + + Arced Line Double Arrow.53 + + + + + + + + + + + Arced Line Double Arrow.54 + + + + + + + + + + + Nordic Lake.55 + Initiator + + + + Initiator + (Mobile app) + + Nordic Lake.56 + LE Pairing Responder (Mesh node) + + + + LE Pairing Responder + (Mesh node) + + + diff --git a/doc/nrf/libraries/bluetooth/mesh/vnd/le_pair_resp.rst b/doc/nrf/libraries/bluetooth/mesh/vnd/le_pair_resp.rst index 68978b09884..1fdbf6e5ca9 100644 --- a/doc/nrf/libraries/bluetooth/mesh/vnd/le_pair_resp.rst +++ b/doc/nrf/libraries/bluetooth/mesh/vnd/le_pair_resp.rst @@ -7,22 +7,15 @@ LE Pairing Responder :local: :depth: 2 -The LE Pairing Responder model is a vendor model. +The LE Pairing Responder model is a vendor model and it requires :kconfig:option:`CONFIG_BT_APP_PASSKEY` option to be enabled. This model can be used to hand over a passkey that will authenticate a Bluetooth LE connection over a mesh network when it is not possible to use other pairing methods. -Before the pairing is initiated, an initiator should send an LE Pairing message with Passkey Reset sub-opcode to set a new passkey for the next pairing request. +Before the pairing is initiated, an initiator should send an LE Pairing message with Passkey Reset sub-opcode. If the passkey has been set by the :c:func:`bt_mesh_le_pair_resp_passkey_set` function, the predefined passkey will be returned in the Passkey Status message. Otherwise, a new passkey will be generated by LE Pairing Responder model and returned in the Passkey Status message. The passkey returned in the LE Pairing message with the Passkey Status sub-opcode should be used for the next pairing. -The passkey is generated using the :c:func:`bt_rand` function and set to the host using the :c:func:`bt_passkey_set` function. -The latter requires the :kconfig:option:`CONFIG_BT_FIXED_PASSKEY` option to be enabled. - -.. note:: - The warning generated by the :kconfig:option:`CONFIG_BT_FIXED_PASSKEY` option should be disregarded as long as the application always invalidates the previously used passkey by calling the :c:func:`bt_mesh_le_pair_resp_passkey_invalidate` function regardless of the pairing result (see below). - -This model requires an application to only enable the display capability for the LE pairing by setting the :c:member:`bt_conn_auth_cb.pairing_display` callback. -After every pairing request, the application must invalidate the previously used passkey by calling the :c:func:`bt_mesh_le_pair_resp_passkey_invalidate` function. -This function can be called from callbacks :c:member:`bt_conn_auth_info_cb.pairing_complete` and :c:member:`bt_conn_auth_info_cb.pairing_failed`. -See the :file:`samples/bluetooth/mesh/common/smp_bt_auth.c` file for the reference. +This model requires an application to only enable the display capability for the LE pairing by setting the :c:member:`bt_conn_auth_cb.pairing_display` callback. The application must also set the :c:member:`bt_conn_auth_cb.app_passkey` callback to use the passkey generated by LE Pairing Responder model. +After every pairing request, the application must invalidate the previously used passkey by calling the :c:func:`bt_mesh_le_pair_resp_passkey_invalidate` function or calling :c:func:`bt_mesh_le_pair_resp_passkey_set` with :ref:`BT_PASSKEY_RAND` value. +Those functions can be called from callbacks :c:member:`bt_conn_auth_info_cb.pairing_complete` and :c:member:`bt_conn_auth_info_cb.pairing_failed`. See the :file:`samples/bluetooth/mesh/common/smp_bt_auth.c` file for the reference. .. figure:: images/bt_mesh_le_pair_resp.svg :alt: Diagram of interaction between an Initiator and the LE Pairing Responder model diff --git a/doc/nrf/releases_and_maturity/releases/release-notes-changelog.rst b/doc/nrf/releases_and_maturity/releases/release-notes-changelog.rst index cb1c2ff9879..c534c9d656b 100644 --- a/doc/nrf/releases_and_maturity/releases/release-notes-changelog.rst +++ b/doc/nrf/releases_and_maturity/releases/release-notes-changelog.rst @@ -163,6 +163,10 @@ Bluetooth Mesh * Deprecated the :kconfig:option:`CONFIG_BT_MESH_NLC_PERF_CONF` and :kconfig:option:`CONFIG_BT_MESH_NLC_PERF_DEFAULT` Kconfig options. Existing configurations continue to work but you should migrate to individual profile options. +* Update the LE Pairing Responder model: + + * Deprecated the :kconfig:option:`CONFIG_BT_FIXED_PASSKEY` option in favor of the new and supported :kconfig:option:`CONFIG_BT_APP_PASSKEY` option. + DECT NR+ -------- @@ -386,6 +390,8 @@ Bluetooth Mesh samples * Updated the :makevar:`FILE_SUFFIX` make variable to use more descriptive suffixes for external flash configurations. The new suffixes are ``_dfu_ext_flash`` for external flash DFU storage and ``_ext_flash_settings`` for external flash settings storage. + * Updated the sample to use the :kconfig:option:`CONFIG_BT_APP_PASSKEY` option instead of the deprecated :kconfig:option:`CONFIG_BT_FIXED_PASSKEY` option. + * :ref:`ble_mesh_dfu_target` sample: * Added: diff --git a/include/bluetooth/mesh/vnd/le_pair_resp.h b/include/bluetooth/mesh/vnd/le_pair_resp.h index 3486c4eeec4..2b37db3e4a1 100644 --- a/include/bluetooth/mesh/vnd/le_pair_resp.h +++ b/include/bluetooth/mesh/vnd/le_pair_resp.h @@ -43,11 +43,23 @@ void bt_mesh_le_pair_resp_passkey_invalidate(void); * By default, passkeys will be randomly generated on every new request. This function allows to use * pre-defined passkey instead. * - * @params passkey Passkey to use for the pairing, or @ref BT_PASSKEY_INVALID to use randomly + * @params passkey Passkey to use for the pairing, or @ref BT_PASSKEY_RAND to use randomly * generated passkey again. */ void bt_mesh_le_pair_resp_passkey_set(uint32_t passkey); +/** @brief Get passkey to be used in the very next pairing. + * + * This function will return the passkey set by the @ref bt_mesh_le_pair_resp_passkey_set function or it will return + * a randomly generated passkey by the Reset message. + * + * If the passkey has never been set or the Reset message has never been received, @ref BT_PASSKEY_RAND will be returned. + * + * @return Passkey to be used in the very next pairing; + * @ref BT_PASSKEY_RAND if passkey is not set. + */ +uint32_t bt_mesh_le_pair_resp_passkey_get(void); + /** @cond INTERNAL_HIDDEN */ extern const struct bt_mesh_model_op _bt_mesh_le_pair_resp_op[]; diff --git a/subsys/bluetooth/mesh/vnd/Kconfig b/subsys/bluetooth/mesh/vnd/Kconfig index 46b0706be65..904513e5171 100644 --- a/subsys/bluetooth/mesh/vnd/Kconfig +++ b/subsys/bluetooth/mesh/vnd/Kconfig @@ -85,10 +85,10 @@ config BT_MESH_DM_SRV_REFLECTOR_RANGING_WINDOW_US endif # BT_MESH_DM_SRV config BT_MESH_LE_PAIR_RESP - bool "LE Pairing Responder model" + bool "LE Pairing Responder model [EXPERIMENTAL]" select BT_MESH_VENDOR_MODELS select EXPERIMENTAL - depends on BT_FIXED_PASSKEY + depends on BT_APP_PASSKEY depends on BT_SMP_SC_ONLY help Enable the LE Pairing Responder model. The LE Pairing Responder model is used to generate diff --git a/subsys/bluetooth/mesh/vnd/le_pair_resp.c b/subsys/bluetooth/mesh/vnd/le_pair_resp.c index 4755dd97676..846b9f4a024 100644 --- a/subsys/bluetooth/mesh/vnd/le_pair_resp.c +++ b/subsys/bluetooth/mesh/vnd/le_pair_resp.c @@ -24,14 +24,13 @@ LOG_MODULE_REGISTER(bt_mesh_le_pair_resp); #define STATUS_PASSKEY_SET 0x00 #define STATUS_PASSKEY_NOT_SET 0x01 -static uint32_t predefined_passkey = BT_PASSKEY_INVALID; +static uint32_t predefined_passkey = BT_PASSKEY_RAND; static int handle_reset(const struct bt_mesh_model *model, struct bt_mesh_msg_ctx *ctx, struct net_buf_simple *buf) { uint32_t passkey; uint8_t status = STATUS_PASSKEY_SET; - int err; if (buf->len != 0) { return -EINVAL; @@ -39,16 +38,13 @@ static int handle_reset(const struct bt_mesh_model *model, struct bt_mesh_msg_ct BT_MESH_MODEL_BUF_DEFINE(rsp, BT_MESH_LE_PAIR_OP, 5); - if (predefined_passkey != BT_PASSKEY_INVALID) { + if (predefined_passkey != BT_PASSKEY_RAND) { passkey = predefined_passkey; } else { passkey = sys_rand32_get() % 1000000; - } - - err = bt_passkey_set(passkey); - if (err) { - LOG_ERR("Unable to set passkey (err: %d)", err); - status = STATUS_PASSKEY_NOT_SET; + /* Overwrite the predefined passkey with the randomly generated passkey. + So the le pair responder can use the randomly generated passkey for the next pairing request.*/ + predefined_passkey = passkey; } bt_mesh_model_msg_init(&rsp, BT_MESH_LE_PAIR_OP); @@ -112,10 +108,15 @@ const struct bt_mesh_model_cb _bt_mesh_le_pair_resp_cb = { void bt_mesh_le_pair_resp_passkey_invalidate(void) { - (void)bt_passkey_set(BT_PASSKEY_INVALID); + predefined_passkey = BT_PASSKEY_RAND; } void bt_mesh_le_pair_resp_passkey_set(uint32_t passkey) { predefined_passkey = passkey; } + +uint32_t bt_mesh_le_pair_resp_passkey_get(void) +{ + return predefined_passkey; +} From 2521bf9455d0d25239024b730fad00a582f39ee8 Mon Sep 17 00:00:00 2001 From: alperen sener Date: Tue, 4 Nov 2025 14:16:35 +0100 Subject: [PATCH 3/4] sample: bluetooth: mesh: start using BT_APP_PASSKEY BT_FIXED_PASSKEY is deprecated, thus we start using BT_APP_PASSKEY Signed-off-by: alperen sener --- samples/bluetooth/mesh/common/smp_bt_auth.c | 6 ++++++ .../bluetooth/mesh/dfu/distributor/overlay-smp-bt-auth.conf | 2 +- 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/samples/bluetooth/mesh/common/smp_bt_auth.c b/samples/bluetooth/mesh/common/smp_bt_auth.c index 9a60b9d1af2..7931051bc68 100644 --- a/samples/bluetooth/mesh/common/smp_bt_auth.c +++ b/samples/bluetooth/mesh/common/smp_bt_auth.c @@ -47,12 +47,18 @@ static void pairing_confirm(struct bt_conn *conn) printk("Pairing confirmed: %s\n", addr); } +static uint32_t app_passkey(struct bt_conn *conn) +{ + return bt_mesh_le_pair_resp_passkey_get(); +} + static struct bt_conn_auth_cb auth_cb = { /* Enable passkey_display callback to enable the display capability. */ .passkey_display = passkey_display, /* These 2 callbacks are required for passkey_display callback. */ .cancel = cancel, .pairing_confirm = pairing_confirm, + .app_passkey = app_passkey, }; static void pairing_complete(struct bt_conn *conn, bool bonded) diff --git a/samples/bluetooth/mesh/dfu/distributor/overlay-smp-bt-auth.conf b/samples/bluetooth/mesh/dfu/distributor/overlay-smp-bt-auth.conf index 57599466ce0..d1a0243088a 100644 --- a/samples/bluetooth/mesh/dfu/distributor/overlay-smp-bt-auth.conf +++ b/samples/bluetooth/mesh/dfu/distributor/overlay-smp-bt-auth.conf @@ -1,6 +1,6 @@ CONFIG_MCUMGR_TRANSPORT_BT_PERM_RW_AUTHEN=y CONFIG_BT_SMP=y -CONFIG_BT_FIXED_PASSKEY=y +CONFIG_BT_APP_PASSKEY=y CONFIG_BT_MESH_LE_PAIR_RESP=y CONFIG_BT_SMP_SC_ONLY=y CONFIG_BT_SMP_ALLOW_UNAUTH_OVERWRITE=n From d30f08599c00858c5e1709d58db22f4575350576 Mon Sep 17 00:00:00 2001 From: alperen sener Date: Wed, 5 Nov 2025 15:59:44 +0100 Subject: [PATCH 4/4] sample: matter: Door Lock sample uses BT_APP_PASSKEY BT_FIXED_APPKEY is deprecated. Signed-off-by: alperen sener --- .../releases/release-notes-changelog.rst | 1 + .../matter/common/src/bt_nus/bt_nus_service.cpp | 15 ++++++++++----- samples/matter/common/src/bt_nus/bt_nus_service.h | 3 +++ samples/matter/lock/sample.yaml | 2 +- 4 files changed, 15 insertions(+), 6 deletions(-) diff --git a/doc/nrf/releases_and_maturity/releases/release-notes-changelog.rst b/doc/nrf/releases_and_maturity/releases/release-notes-changelog.rst index c534c9d656b..9ecd352bf76 100644 --- a/doc/nrf/releases_and_maturity/releases/release-notes-changelog.rst +++ b/doc/nrf/releases_and_maturity/releases/release-notes-changelog.rst @@ -571,6 +571,7 @@ Matter samples * Added a callback for the auto-relock feature. This resolves the :ref:`known issue ` KRKNWK-20691. + * Updated to use the :kconfig:option:`CONFIG_BT_APP_PASSKEY` option instead of the deprecated :kconfig:option:`CONFIG_BT_FIXED_PASSKEY` option. Networking samples ------------------ diff --git a/samples/matter/common/src/bt_nus/bt_nus_service.cpp b/samples/matter/common/src/bt_nus/bt_nus_service.cpp index af067d10713..c5218682dfb 100644 --- a/samples/matter/common/src/bt_nus/bt_nus_service.cpp +++ b/samples/matter/common/src/bt_nus/bt_nus_service.cpp @@ -31,6 +31,9 @@ BT_CONN_CB_DEFINE(conn_callbacks) = { bt_conn_auth_cb Nrf::NUSService::sConnAuthCallbacks = { .passkey_display = AuthPasskeyDisplay, .cancel = AuthCancel, +#if defined(CONFIG_BT_APP_PASSKEY) + .app_passkey = AuthAppPasskey, +#endif /* CONFIG_BT_APP_PASSKEY */ }; bt_conn_auth_info_cb Nrf::NUSService::sConnAuthInfoCallbacks = { .pairing_complete = PairingComplete, @@ -71,11 +74,6 @@ bool NUSService::Init(uint8_t priority, uint16_t minInterval, uint16_t maxInterv LOG_DBG("NUS BLE advertising stopped"); }; -#if defined(CONFIG_BT_FIXED_PASSKEY) - if (bt_passkey_set(CONFIG_CHIP_NUS_FIXED_PASSKEY) != 0) - return false; -#endif - return true; } @@ -234,6 +232,13 @@ void NUSService::AuthPasskeyDisplay(bt_conn *conn, unsigned int passkey) LOG_INF("PROVIDE THE FOLLOWING CODE IN YOUR MOBILE APP: %d", passkey); } +#if defined(CONFIG_BT_APP_PASSKEY) +uint32_t NUSService::AuthAppPasskey(bt_conn *conn) +{ + return CONFIG_CHIP_NUS_FIXED_PASSKEY; +} +#endif /* CONFIG_BT_APP_PASSKEY */ + void NUSService::AuthCancel(bt_conn *conn) { LOG_INF("NUS BT Pairing cancelled: %s", LogAddress(conn)); diff --git a/samples/matter/common/src/bt_nus/bt_nus_service.h b/samples/matter/common/src/bt_nus/bt_nus_service.h index f28a7415c9f..8f9f57bf44f 100644 --- a/samples/matter/common/src/bt_nus/bt_nus_service.h +++ b/samples/matter/common/src/bt_nus/bt_nus_service.h @@ -82,6 +82,9 @@ class NUSService { static void RxCallback(struct bt_conn *conn, const uint8_t *const data, uint16_t len); static void AuthPasskeyDisplay(struct bt_conn *conn, unsigned int passkey); static void AuthCancel(struct bt_conn *conn); +#if defined(CONFIG_BT_APP_PASSKEY) + static uint32_t AuthAppPasskey(struct bt_conn *conn); +#endif /* CONFIG_BT_APP_PASSKEY */ static void PairingComplete(struct bt_conn *conn, bool bonded); static void PairingFailed(struct bt_conn *conn, enum bt_security_err reason); static char* LogAddress(struct bt_conn *conn); diff --git a/samples/matter/lock/sample.yaml b/samples/matter/lock/sample.yaml index 38e6930d1d1..7698f288fac 100644 --- a/samples/matter/lock/sample.yaml +++ b/samples/matter/lock/sample.yaml @@ -124,7 +124,7 @@ tests: build_only: true extra_args: - CONFIG_CHIP_NUS=y - - CONFIG_BT_FIXED_PASSKEY=y + - CONFIG_BT_APP_PASSKEY=y - CONFIG_CHIP_NUS_FIXED_PASSKEY=112233 integration_platforms: - nrf52840dk/nrf52840