yes
Yes, please.
If the LED1 is turned on, you know that the application is running as expected on top of the SoftDevice.nrfjprog --program firmware.hex --sectorerase -f nrf52
nrfjprog --reset -f nrf52
Code: Select all
make BOARD=pca10056 SD=s140 sd
make BOARD=pca10056 SD=s140 flash
You nailed it. After making that change, it works now, even on the pca10056.c45713 wrote: ↑Wed Oct 17, 2018 8:32 pmI believe i see the problem here. If I run the configuration you attached, it turns out that the BLUETOOTH_WEBBLUETOOTH_REPL has to be set to 0. This flag is used to alternate the advertisment packet between normal advertisment ("micr") and Eddystone URL (https://goo.gl/F7fZ69 => https://aykevl.nl/apps/nus/) . The Eddystone mode is not needed for BLE REPL to work.
Ref:
https://github.com/micropython/micropyt ... art.c#L232
Could you try to disable the BLUETOOTH_WEBBLUETOOTH_REPL in bluetooth_conf.h and see if it helps?
It should be possible. The only thing i have done on security so far is to add some pairing to the central in order to get a BLE keyboard connected to a central and print out the characters received from it.BTW: is there a possibility to have some sort of security on the Bluetooth REPL?
Code: Select all
>>> import ble
>>> ble.enable()
SoftDevice enabled
>>> ble.address()
'fe:08:48:84:fe:28'
>>>