Closed ZweiEuro closed 3 years ago
When erasing flash and retrying i get this tough:
>>> homekit_client_process: [Client 57] Got 128 incomming data
>>> homekit_server_on_pair_setup: Pair Setup
>>> homekit_server_on_pair_setup: Free heap: 15956
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 0 value (1 bytes): \x00
>>> tlv_debug: Type 6 value (1 bytes): \x01
I (148188) HAP: >>> HomeKit: [Client 57] Pair Setup Step 1/3
>>> homekit_server_on_pair_setup: Free heap: 16144
>>> crypto_srp_new: Initializing SRP
>>> homekit_server_on_pair_setup: [Client 57] Initializing crypto
>>> homekit_server_on_pair_setup: Free heap: 15284
>>> homekit_server_on_pair_setup: [Client 57] Using user-specified password: 111-11-111
>>> crypto_srp_init: Generating salt
>>> crypto_srp_init: Setting SRP username
>>> crypto_srp_init: Setting SRP params
>>> crypto_srp_init: Setting SRP password
>>> crypto_srp_init: Getting SRP verifier
>>> crypto_srp_init: Failed to get SRP verifier (code -2)
>>> crypto_srp_get_public_key: Calculating public key
E (148248) HAP: !!! HomeKit: [Client 57] Failed to dump SPR public key (code -2)
Which seems to be this ?
int crypto_srp_get_public_key(Srp *srp, byte *buffer, size_t *buffer_size) {
if (buffer_size == NULL)
return -1;
// TODO: Fix hardcoded public key size
if (*buffer_size < 384) {
*buffer_size = 384;
return -2;
}
DEBUG("Calculating public key");
word32 len = *buffer_size;
int r = wc_SrpGetPublic(srp, buffer, &len);
*buffer_size = len;
return r;
}
The problem is this:
I (148188) HAP: >>> HomeKit: [Client 57] Pair Setup Step 1/3
>>> homekit_server_on_pair_setup: Free heap: 16144
Pairing cryptography uses a lot of RAM, ~22-23K at peak. So, you need to have that much memory in order for pairing to succeed. Error code -2 means that you run out of memory.
Yes I read this in another issue, but the problem is not solved, here is a log without the memory error:
I (15338) HAP: >>> HomeKit: Starting server
I (15348) HAP: >>> HomeKit: Resetting HomeKit storage
I (15358) HAP: >>> HomeKit: Formatting HomeKit storage at 0x200000
I (15398) HAP: >>> HomeKit: Generated new accessory ID: F8:32:5D:08:3F:9A
I (16048) HAP: >>> HomeKit: Generated new accessory key
I (16058) HAP: >>> HomeKit: Configuring mDNS
>>> homekit_run_server: Staring HTTP server
I (42188) HAP: >>> HomeKit: Got new client connection: 57 from 192.168.0.2
>>> homekit_client_process: [Client 57] Got 128 incomming data
>>> homekit_server_on_pair_setup: Pair Setup
>>> homekit_server_on_pair_setup: Free heap: 54456
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 0 value (1 bytes): \x00
>>> tlv_debug: Type 6 value (1 bytes): \x01
I (42208) HAP: >>> HomeKit: [Client 57] Pair Setup Step 1/3
>>> homekit_server_on_pair_setup: Free heap: 54396
>>> crypto_srp_new: Initializing SRP
>>> homekit_server_on_pair_setup: [Client 57] Initializing crypto
>>> homekit_server_on_pair_setup: Free heap: 53740
>>> homekit_server_on_pair_setup: [Client 57] Using user-specified password: 111-11-111
>>> crypto_srp_init: Generating salt
>>> crypto_srp_init: Setting SRP username
>>> crypto_srp_init: Setting SRP params
>>> crypto_srp_init: Setting SRP password
>>> crypto_srp_init: Getting SRP verifier
>>> crypto_srp_init: Setting SRP verifier
>>> crypto_srp_get_public_key: Calculating public key
>>> send_tlv_response: [Client 57] Sending TLV response
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 3 value (384 bytes): \xC1\x9B\x11\xA2+Y\x8F\xFD\x16~\xD7\xC7N1\xD8\xAF\x91\xA57y\x8A\xE4\xE9\x95\x15\xDD\xF4\xB5^B9\x13\xF4m\x05\x9Em\x14\x10(.\xDA\xD29\xE4\x03:n\xB0\x83\x14X\xF4\x92\x1E\xEC\xE3v\xEF\xD2\x1B\x87\x82\x99\xC8*\xF8,\x19AL\x80\xB8\xB3\x93\xA9:\xA5/e\x1A"\xD1\xADW\x96\x1E\xD6>`\xE3"\x079S\xC9L\x83\xDA\xF8\x0E\x09\xA1R\xA6\xF0"\x8A\xC5\xBEo\x83&\xAE\x9C\xDE\x0C\x98\xD7L\xFE\xFE\xDFs_h\x8Bc\xAA\xD6\xFB\xEF\xF0\x1Ar\xCB1jTB\xA6w\xBE\x88z\xA9|\xE5\xDE\x17\xC3Hh\xA5\x8F\xAF\xAE\x90\xAC\xC8wqK\xB74h.\xC27\xD2\xAD)\xCC\x12\xE0\x95\xE1\xCE\xD0\x9F\xB6\xE5S!\x10\xD9E\xCCZ\xE2\xC9\x13U\xBCI\x809\xFCBCi+\xDEmI\xF2\xE1\x08 \xA0\xD5\xB3\x06Mi[xF\x1B\xF9\x82\xD1g\xB2\x0A9n\x17\x05\xB2x\x00\xC8S\x07\xB8\x14\xCD\xBAj\xE3_M\x00{\xEC\xEFu\xCB\xE6\x18\xDE\xC2-\x96\xF3\x83\xAB\xBC\xA3\xDA\xDDIj\x84\xA9P\xE2X\xE4}\x05\x00\xE4\xD4S][\xF6\xEB\xAF\xF9bd\xF0\xA3\xB3|_\x09|\xA7\xF9VB\xE9=\xCD\x97\xF5\xE5[9\xC8n\xD8\x8F5\x1F,Q\xAF\x0Ag\xE0}R\xA8Ne\x8E\x1A\xED\xDE\xCC\x9C\xEBy\xF8WpL\xF3\x17\xE1\x12\xC2P\xFD\x81\xAF=\x9DM A\xE3\x95JZ\x10|\xF7\xF0\xE2%\x97H\xCF\xACe\xDBbO\xDB\x83h[e\xDCqh"lX\xA5"\x0F\x05\xF3\x83\xC3\x83\xCF
>>> tlv_debug: Type 2 value (16 bytes): \x0C\xBD\x89\xD4z9\xB5\xDF\x0C\x8A\x1D\x12\xC6;6\xB0
>>> tlv_debug: Type 6 value (1 bytes): \x02
>>> client_send: [Client 57] Sending payload: HTTP/1.1 200 OK\x0D\x0AContent-Type: application/pairing+tlv8\x0D\x0AContent-Length: 409\x0D\x0AConnection: keep-alive\x0D\x0A\x0D\x0A\x03\xFF\xC1\x9B\x11\xA2+Y\x8F\xFD\x16~\xD7\xC7N1\xD8\xAF\x91\xA57y\x8A\xE4\xE9\x95\x15\xDD\xF4\xB5^B9\x13\xF4m\x05\x9Em\x14\x10(.\xDA\xD29\xE4\x03:n\xB0\x83\x14X\xF4\x92\x1E\xEC\xE3v\xEF\xD2\x1B\x87\x82\x99\xC8*\xF8,\x19AL\x80\xB8\xB3\x93\xA9:\xA5/e\x1A"\xD1\xADW\x96\x1E\xD6>`\xE3"\x079S\xC9L\x83\xDA\xF8\x0E\x09\xA1R\xA6\xF0"\x8A\xC5\xBEo\x83&\xAE\x9C\xDE\x0C\x98\xD7L\xFE\xFE\xDFs_h\x8Bc\xAA\xD6\xFB\xEF\xF0\x1Ar\xCB1jTB\xA6w\xBE\x88z\xA9|\xE5\xDE\x17\xC3Hh\xA5\x8F\xAF\xAE\x90\xAC\xC8wqK\xB74h.\xC27\xD2\xAD)\xCC\x12\xE0\x95\xE1\xCE\xD0\x9F\xB6\xE5S!\x10\xD9E\xCCZ\xE2\xC9\x13U\xBCI\x809\xFCBCi+\xDEmI\xF2\xE1\x08 \xA0\xD5\xB3\x06Mi[xF\x1B\xF9\x82\xD1g\xB2\x0A9n\x17\x05\xB2x\x00\xC8S\x07\xB8\x14\xCD\xBAj\xE3_M\x00{\xEC\xEFu\xCB\xE6\x18\xDE\xC2-\x96\x03\x81\xF3\x83\xAB\xBC\xA3\xDA\xDDIj\x84\xA9P\xE2X\xE4}\x05\x00\xE4\xD4S][\xF6\xEB\xAF\xF9bd\xF0\xA3\xB3|_\x09|\xA7\xF9VB\xE9=\xCD\x97\xF5\xE5[9\xC8n\xD8\x8F5\x1F,Q\xAF\x0Ag\xE0}R\xA8Ne\x8E\x1A\xED\xDE\xCC\x9C\xEBy\xF8WpL\xF3\x17\xE1\x12\xC2P\xFD\x81\xAF=\x9DM A\xE3\x95JZ\x10|\xF7\xF0\xE2%\x97H\xCF\xACe\xDBbO\xDB\x83h[e\xDCqh"lX\xA5"\x0F\x05\xF3\x83\xC3\x83\xCF\x02\x10\x0C\xBD\x89\xD4z9\xB5\xDF\x0C\x8A\x1D\x12\xC6;6\xB0\x06\x01\x02
>>> homekit_client_process: [Client 57] Finished processing
>>> homekit_client_process: [Client 57] Got 581 incomming data
>>> homekit_server_on_pair_setup: Pair Setup
>>> homekit_server_on_pair_setup: Free heap: 51240
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 6 value (1 bytes): \x03
>>> tlv_debug: Type 3 value (384 bytes): \xDE\xC7\xA3\xA5\xC8A6\x95{MK<dA\xE8\x1F\x9C\x0B\xE0I\xFCE\xB1\xBB\xF2\x9F\xA9\xF8\xB2\x83\x8D\xC6I6\x0E\xA4\xBDG\x04D\xCE\x80UJ\x81\x04y=\x03}\xC3\xB3\x9A\xF4c\x8BV\xB2\x19\xA9\xD39\xC6\x1D\xC1V\xD3\xB0\xE8\xCA\xC9\xECZx\xBC\xF4%\xD2\x040\xF4\xA9f>z+M\xCE\xDAH\xD9\x8D\x06 >\xEB\x8D.ME\xBF'DUi\xFA,\xB0Po\xD3n^\xEC\x90\xC7\xE7e\xCF\x04.\xBF\x1F+Z\xE8\x93b\x17\x1D\xE7\x94C\xD3\xBA\xDC\x16\xB7\xCA\x1E\x93\x86\xFA\xA5E\xA5\xE5WfD\xD8\xF4\x09\xAEo\x8C\xA1r\xB3E\xFF\xD4\xE0\xA0\xA4g\x9Dry\xC7\xB83\xE7~\xD7 \xBFR\xB1!\xDA\xFF\x0DN\xF1q\x88\xD6\xAE\xCD\xB7\x0C\xD1G\xFF\xB9#\x8B\xE4.\x94P[\xDD\x95we\x97(\xFBi6w\xBF\x15\xA7\x8B_\x07\x07\x84\xEF\x05\xE7\xA3\x91\xAB\xD9\xAC\xC23\xEA\xF5-\xD9\x05~KZGT\x9F\x98\x88f\x0B\xDEs\xD7\xADs\xDD\xCA\xC91i\xDB\xD9\x06\xA2\xB2\xD5\x9B\xD9\xC07\x10\xFFP4\x0E8\x9B{\x04\xB2\xC2\x03}l\x8B\x9AW\x8BH\x9C\x8C)\x11\xDD,\xE2\x99\x91\x99$\xBE\xDBo`\xFC\xEA\xF5\x92\xB19c\x89\x85\xC4-\x0E\x96c4\x9E\xBE\x9B\xAD\xF4jz\x82r\x0B9n\x1C\x89\xE9!9/J\xB8\xF7kj\xAE\xCB\x9C\xE51\x9F\x88\x84\xE3\x97G3\x11\x09\xAA\xC4E\x88\x10!\xA9\x0A\x0A\xB7nm\xAC\x09\xF0\x86\xF6\x17\xA0u\x86#\x1A\xDAxAps\xC5\xD6
>>> tlv_debug: Type 4 value (64 bytes): v\xCF\x10\xFFa\x168Y\x06*:_\x9D\xA0\x08\x89N"\xC9\xDD\xF6\xB1\xE8\xEFwp\xCAO\xC2\xEA\xF6\x80\x85\x8A\xAA\xAD\xB0`\xB56p\xAC'\x92\x09VR\xFE7"\xA5z\xF6u#4P9\xA4\xC1\x9D
I (56438) HAP: >>> HomeKit: [Client 57] Pair Setup Step 2/3
>>> homekit_server_on_pair_setup: Free heap: 50712
>>> homekit_server_on_pair_setup: [Client 57] Computing SRP shared secret
>>> homekit_server_on_pair_setup: Free heap: 50712
>>> homekit_server_on_pair_setup: [Client 57] Verifying peer's proof
>>> homekit_server_on_pair_setup: Free heap: 51028
>>> homekit_server_on_pair_setup: [Client 57] Generating own proof
>>> send_tlv_response: [Client 57] Sending TLV response
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 6 value (1 bytes): \x04
>>> tlv_debug: Type 4 value (64 bytes): \xC2\x83\xA1\xD0 \xF6\x06(\xBEn\xED\x18\xC5\x95\x00\xEF0\x9FE]*\x97U\xDF\xF2W\xEE5KS\x8C\xED\xADv\xD2\xA1\xA7\xA7\x19\x839\xC21\xC6\x88\xB6\xB6\x11\x92A\x96\xD6\x021\x93=v\xACi\x81t$\xD8
>>> client_send: [Client 57] Sending payload: HTTP/1.1 200 OK\x0D\x0AContent-Type: application/pairing+tlv8\x0D\x0AContent-Length: 69\x0D\x0AConnection: keep-alive\x0D\x0A\x0D\x0A\x06\x01\x04\x04@\xC2\x83\xA1\xD0 \xF6\x06(\xBEn\xED\x18\xC5\x95\x00\xEF0\x9FE]*\x97U\xDF\xF2W\xEE5KS\x8C\xED\xADv\xD2\xA1\xA7\xA7\x19\x839\xC21\xC6\x88\xB6\xB6\x11\x92A\x96\xD6\x021\x93=v\xACi\x81t$\xD8
>>> homekit_client_process: [Client 57] Finished processing
>>> homekit_client_process: [Client 57] Got 283 incomming data
>>> homekit_server_on_pair_setup: Pair Setup
>>> homekit_server_on_pair_setup: Free heap: 51856
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 5 value (154 bytes): \xB7U\x0A\x85"M\x00%Z\x0E\xA8m `\x13{\xC6\\\x001A\x13\x1B\x88\xDC\x1FT\xD3@\xA37\x03`\x18\x0EvOa\xC6\x15\xE0\xAD9"+\xEB\x068Pn\xA2s\x1FQ=\xB4I\xF7\x89\x87:T\xDA\xE8\x18\x04I`\xD6\x81\xE9\xF7\xB2\x9C@\xAB\xE7x\xC5\xEC@\xAC\xAB\x9Dy\xBD\x11<L\x97\xEF\xA2\xF8\x17%\xDF\x01\xFC\xF4#\x9D\xCD\xD2s\xB6-\xFF\x94\xFD\xD0\x8Ew\xDB\x19M"\xC0\xAAr1\xE0\xFD=d\xA0}\xC7\xB1\\#\xFBh\xEEY[-\xF6\xBD\x8F\xDC>\xB8a\x89H\x8E\x9Ae\xF1\x0B\x9Bf\x1A\xAE
>>> tlv_debug: Type 6 value (1 bytes): \x05
I (60558) HAP: >>> HomeKit: [Client 57] Pair Setup Step 3/3
>>> homekit_server_on_pair_setup: Free heap: 51640
>>> homekit_server_on_pair_setup: [Client 57] Calculating shared secret
>>> homekit_server_on_pair_setup: [Client 57] Decrypting payload
>>> homekit_server_on_pair_setup: [Client 57] Importing device public key
>>> homekit_server_on_pair_setup: [Client 57] Calculating DeviceX
>>> homekit_server_on_pair_setup: [Client 57] Verifying device signature
I (61968) HAP: >>> HomeKit: Added pairing with F638FD40-836D-46F7-B66A-4B76C7372ADB
>>> homekit_server_on_pair_setup: [Client 57] Exporting accessory public key
>>> homekit_server_on_pair_setup: [Client 57] Calculating AccessoryX
>>> homekit_server_on_pair_setup: [Client 57] Generating accessory signature
>>> homekit_server_on_pair_setup: Free heap: 51520
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 1 value (17 bytes): F8:32:5D:08:3F:9A
>>> tlv_debug: Type 3 value (32 bytes): \x8A@vJ\xEB\xC3\x88\xA8\xAA\xADxQF\xD9\xE9_\x8Cd\x00\xB2\xE0\x84#{>\x98\xD8\xC9d\xBCd#
>>> tlv_debug: Type 10 value (64 bytes): \xD6<>z\xC0\xEA'\x91\x04\x99\xF3\xA4\\h\x1C\x82\xEBI\x9D\x9A$\xC1\xAA\xBB\x89C\xE2?\xFD\x9B\x95\xE2\x04\x878\xEBLu\xE0\x8E\xD1+\xA6:\x99\xF1\xA1\xBD\x90\x0E\xE6\x1A\x0F\xA3\x83\xD6\xC4-\x97\xC7n\xD4\xE6\x00
>>> homekit_server_on_pair_setup: [Client 57] Encrypting response
>>> send_tlv_response: [Client 57] Sending TLV response
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 6 value (1 bytes): \x06
>>> tlv_debug: Type 5 value (135 bytes): k\xEC\xB4O*\xEE\xDD\xF1w\x87V\xF4\xCC\xF4\x06\xBD\xA9M\xE5\x0D\xAC/3\xFE\x92`\xA9,\xA1\x8F\x83\xF6\xBAhX8Q\xA3\x9Fx\xAF\x04N\xF1@}l@\x13\xA5\xCB\x95c!\xC1\xA2\x09\xCF\xED\xA3:\xE6\xF8\xCAC\xB4\xEEJ\x97y\xD5\x8B,Wd\x02\x8A.\xB7&Fe\xDB\x87\xB5S\x1C\xDEB\x98\xCDH\\\xD9\xF8.d\xF3\xC0\x92\xDC\x9Er\xAD\x84\x83\xDEs\x11\xD2Y\xAB\x98"1\xB20!\xB1\xC2M\x89#\xC2\x02\x0A\x8Ek~\xC5\x1Ap\xCA
>>> client_send: [Client 57] Sending payload: HTTP/1.1 200 OK\x0D\x0AContent-Type: application/pairing+tlv8\x0D\x0AContent-Length: 140\x0D\x0AConnection: keep-alive\x0D\x0A\x0D\x0A\x06\x01\x06\x05\x87k\xEC\xB4O*\xEE\xDD\xF1w\x87V\xF4\xCC\xF4\x06\xBD\xA9M\xE5\x0D\xAC/3\xFE\x92`\xA9,\xA1\x8F\x83\xF6\xBAhX8Q\xA3\x9Fx\xAF\x04N\xF1@}l@\x13\xA5\xCB\x95c!\xC1\xA2\x09\xCF\xED\xA3:\xE6\xF8\xCAC\xB4\xEEJ\x97y\xD5\x8B,Wd\x02\x8A.\xB7&Fe\xDB\x87\xB5S\x1C\xDEB\x98\xCDH\\\xD9\xF8.d\xF3\xC0\x92\xDC\x9Er\xAD\x84\x83\xDEs\x11\xD2Y\xAB\x98"1\xB20!\xB1\xC2M\x89#\xC2\x02\x0A\x8Ek~\xC5\x1Ap\xCA
I (62788) HAP: >>> HomeKit: Configuring mDNS
I (62798) HAP: >>> HomeKit: [Client 57] Successfully paired
>>> homekit_client_process: [Client 57] Finished processing
I (62968) HAP: >>> HomeKit: [Client 57] Closing client connection
I (62978) HAP: >>> HomeKit: Got new client connection: 57 from 192.168.0.2
>>> homekit_client_process: [Client 57] Got 161 incomming data
>>> homekit_server_on_pair_verify: HomeKit Pair Verify
>>> homekit_server_on_pair_verify: Free heap: 53904
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 6 value (1 bytes): \x01
>>> tlv_debug: Type 3 value (32 bytes): \xDE"_\xEB\x81\xE3]w\xAD\xB6\xB6\xD9\x9C\x17\xA5C<w\xE0\xC4\\\xFEb[\x80G\x0A\xA6\x93(\xC4\x0D
I (63008) HAP: >>> HomeKit: [Client 57] Pair Verify Step 1/2
>>> homekit_server_on_pair_verify: [Client 57] Importing device Curve25519 public key
>>> homekit_server_on_pair_verify: [Client 57] Generating accessory Curve25519 key
>>> homekit_server_on_pair_verify: [Client 57] Exporting accessory Curve25519 public key
>>> homekit_server_on_pair_verify: [Client 57] Generating Curve25519 shared secret
>>> homekit_server_on_pair_verify: [Client 57] Generating signature
>>> homekit_server_on_pair_verify: [Client 57] Generating proof
>>> homekit_server_on_pair_verify: [Client 57] Encrypting response
>>> send_tlv_response: [Client 57] Sending TLV response
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 6 value (1 bytes): \x02
>>> tlv_debug: Type 3 value (32 bytes): o!\x02-\x01\xFB\xC2\xD7\xE3\x88\xA0:\x00_\\\x82\\a\xE8\xB3\x089\xB0S\xF9\x91\x91\xE6\xE6\xB6\x18\x0C
>>> tlv_debug: Type 5 value (101 bytes): \xD0v\xB5\xF8}\xDE\x17\x9A\x05\xC5\xA0\x1C\xCE\xAE\xBA^e\x05\x19\xBC\xFA\xB1\x8D\xD2{\x07\xB07\xDB\xB0l>\xBE[\x99\xA8d\x15\x16\x85\x1C\xBB\x17\xCC1\x91\x8CC\x05w\xD2\x09\xCB2\xFC\xE9<\xD4\xC6\xCD;\xB5\x83b\xDAd\x86?\xCDM\xA1\xC0\x8A\xB0\xDF&\xD8\x96q\xD2\x02\xA7\x1A\x81\x8A]\x08\x8A%\xE4\x0E\xFEv\x9E\x8F\xEB|\xD4\x8C\x9D
>>> client_send: [Client 57] Sending payload: HTTP/1.1 200 OK\x0D\x0AContent-Type: application/pairing+tlv8\x0D\x0AContent-Length: 140\x0D\x0AConnection: keep-alive\x0D\x0A\x0D\x0A\x06\x01\x02\x03 o!\x02-\x01\xFB\xC2\xD7\xE3\x88\xA0:\x00_\\\x82\\a\xE8\xB3\x089\xB0S\xF9\x91\x91\xE6\xE6\xB6\x18\x0C\x05e\xD0v\xB5\xF8}\xDE\x17\x9A\x05\xC5\xA0\x1C\xCE\xAE\xBA^e\x05\x19\xBC\xFA\xB1\x8D\xD2{\x07\xB07\xDB\xB0l>\xBE[\x99\xA8d\x15\x16\x85\x1C\xBB\x17\xCC1\x91\x8CC\x05w\xD2\x09\xCB2\xFC\xE9<\xD4\xC6\xCD;\xB5\x83b\xDAd\x86?\xCDM\xA1\xC0\x8A\xB0\xDF&\xD8\x96q\xD2\x02\xA7\x1A\x81\x8A]\x08\x8A%\xE4\x0E\xFEv\x9E\x8F\xEB|\xD4\x8C\x9D
>>> homekit_client_process: [Client 57] Finished processing
>>> homekit_client_process: [Client 57] Got 250 incomming data
>>> homekit_server_on_pair_verify: HomeKit Pair Verify
>>> homekit_server_on_pair_verify: Free heap: 53592
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 5 value (120 bytes): \x8B{\xAF\xFC\xE3o\x0B\xE3\xC9\x8B \x81s\x0B1\x09;\xB8\x90\xF0\xB4!\xE3\xE5\xAE\xB2\x9F <C\x06\x1COk\x9F\xE4\xFAl\xFDY\x8D\x14\xBC\xDE\xF7\xCCp\xB42\xDB\xB3J3\x1B\xB8\x82J\x1F\x0C\x81\x19\x9B\x92\xDA\x9C\x17M\xBDJ\xA4\x89\xDC\xCF\x0D\xA7Up\x83\xEB?\xAC!\x86\xE6\x1E\x16\xA2\xFEO;\x0FV\x0A2\xA1\x86\xB8\x1C\xE7\x0E\x8A5"\xB68$\xE7\xAD\xF9$\x18\xB2\x0F~\x06\xD5h\x12\xA4
>>> tlv_debug: Type 6 value (1 bytes): \x03
I (65268) HAP: >>> HomeKit: [Client 57] Pair Verify Step 2/2
>>> homekit_server_on_pair_verify: [Client 57] Decrypting payload
>>> homekit_server_on_pair_verify: [Client 57] Searching pairing with F638FD40-836D-46F7-B66A-4B76C7372ADB
I (65288) HAP: >>> HomeKit: [Client 57] Found pairing with F638FD40-836D-46F7-B66A-4B76C7372ADB
>>> homekit_server_on_pair_verify: [Client 57] Verifying device signature
>>> send_tlv_response: [Client 57] Sending TLV response
>>> tlv_debug: Got following TLV values:
>>> tlv_debug: Type 6 value (1 bytes): \x04
>>> client_send: [Client 57] Sending payload: HTTP/1.1 200 OK\x0D\x0AContent-Type: application/pairing+tlv8\x0D\x0AContent-Length: 3\x0D\x0AConnection: keep-alive\x0D\x0A\x0D\x0A\x06\x01\x04
I (66698) HAP: >>> HomeKit: [Client 57] Verification successful, secure session established
>>> homekit_client_process: [Client 57] Finished processing
>>> homekit_client_process: [Client 57] Got 81 incomming data
>>> homekit_client_process: [Client 57] Decrypting data
>>> homekit_client_process: [Client 57] Decrypted 63 bytes, available 0
Decrypted data (63 bytes): "GET /accessories HTTP/1.1\x0D\x0AHost: MasterGate._hap._tcp.local\x0D\x0A\x0D\x0A"
I (66878) HAP: >>> HomeKit: [Client 57] Get Accessories
>>> homekit_server_on_get_accessories: Free heap: 54052
>>> client_send: [Client 57] Sending payload: HTTP/1.1 200 OK\x0D\x0AContent-Type: application/hap+json\x0D\x0ATransfer-Encoding: chunked\x0D\x0AConnection: keep-alive\x0D\x0A\x0D\x0A
>>> client_send: [Client 57] Sending payload: 3e5\x0D\x0A{"accessories":[{"aid":1,"services":[{"iid":1,"type":"0000003E-0000-1000-8000-0026BB765291","hidden":false,"primary":false,"characteristics":[{"aid":1,"iid":2,"type":"00000023-0000-1000-8000-0026BB765291","perms":["pr"],"description":"Name","format":"string","value":"MasterGate"},{"aid":1,"iid":3,"type":"00000020-0000-1000-8000-0026BB765291","perms":["pr"],"description":"Manufacturer","format":"string","value":"Intertechno"},{"aid":1,"iid":4,"type":"00000030-0000-1000-8000-0026BB765291","perms":["pr"],"description":"Serial Number","format":"string","value":"0FC134"},{"aid":1,"iid":5,"type":"00000021-0000-1000-8000-0026BB765291","perms":["pr"],"description":"Model","format":"string","value":"Master-GateV2"},{"aid":1,"iid":6,"type":"00000052-0000-1000-8000-0026BB765291","perms":["pr"],"description":"Firmware Revision","format":"string","value":"7"},{"aid":1,"iid":7,"type":"00000014-0000-1000-8000-0026BB765291","perms":["pw"],"description":"Identify","format":"bool"}]},{"iid":8,"type":\x0D\x0A
>>> client_send: [Client 57] Sending payload: 17a\x0D\x0A"00000043-0000-1000-8000-0026BB765291","hidden":false,"primary":false,"characteristics":[{"aid":1,"iid":9,"type":"00000023-0000-1000-8000-0026BB765291","perms":["pr"],"description":"Name","format":"string","value":"\xBC\xB5\xFB?\x01"},{"aid":1,"iid":10,"type":"00000025-0000-1000-8000-0026BB765291","perms":["pr","pw","ev"],"ev":false,"description":"On","format":"bool","value":false}]}]}]}\x0D\x0A
>>> client_send: [Client 57] Sending payload: 0\x0D\x0A\x0D\x0A
>>> homekit_client_process: [Client 57] Finished processing
I (67068) HAP: >>> HomeKit: [Client 57] Closing client connection
That's a different issue: you have a non-ascii name in your lightbulb service, which (non-ascii name) is not supported.
ah ok, thanks for the information, i found the issue
But i get this on the device(german): ">name< could not be added to home"
Restarting the device it seems to think there already exists an admin pairing, so i can't even repair without fully erasing the flash