Step 1: Dump com.apple.hap.pairing
keychain data from macos keychain
Follow this guide`.
To list the signing identities use security find-identity -v
. Then take the text (not the hexnumber) including the quotation marks and run export CODESIGNKIT_DEFAULT_IDENTITY="<text>"
To show the keys, don't forget to add the -v
to the swift run command.
––––––––––––––––––––––––––––
There might be multiple, so testing each might be necessary to find the correct one.
Format: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX -> This is the iOSDevicePairingID.
For usage with
hap-controller-node
the entire string including the-
, needs to be converted into a hexstring.
This consists of the <iOSDeviceLTPK>+<iOSDeviceLTSK>
For usage with
hap-controller-node
: iOSDeviceLTSK=<iOSDeviceLTSK><iOSDeviceLTPK>
Format: XX:XX:XX:XX:XX:XX -> This is the AccessoryPairingID.
For usage with
hap-controller-node
the entire string including the:
, needs to be converted into a hexstring.
This is the AccessoryLTPK.
This library usually accepts the data in the format from the keychain