Bluetooth SMP pairing failed (0x05) for unspecified reason

Hi,
I am using nrf5340 and nrf52840 SoC in my devices. I have tested that pairing works with the same linux machine for peripheral uart sample for nrf5340dk, nrf53 thingy out of box, and another custom nrf52840 device that is running older nrf5 SDK. Right now, we are on nrf sdk v2.4.2, zephyr commit 28a3fca7da5. What is even more strange is that sometimes pairing has worked from the hundreds of times I have tried this week but even then I could not get the BT service data. I have tested also with 2 other linux machines to initiate pairing and it seems to work reliably. The only difference I can see from btmon is that the linux I am using has SC in authentication requirement and we have disabled SC in SMP. I am kind of running out of ideas and testing configs as none seems to make a difference. I have also attached hci_rpmsg config file which we are using for netcore. The keys for SMP may mismatch here as these may be from different requests but the underlying issue is the same.

I have ran into an issue where pairing is rejected in SMP for unspecified reason as seen on my linux side which is initiating the pair.

kernel: Bluetooth: hci0: unexpected SMP command 0x05 from c5:66:98:3f:cb:cb

I think this is coming from bt_smp_recv in subsys/bluetooth/host/smp.c as unhandled SMP code. I think the SMP is expecting 0x06 Encryption Information command however, I am getting 0x07 Central Information before that. I see that on linux side, I have sent this via btmon (see attached log). Somehow, the device is not receiving this or have received but not got to the Bluetooth Host SMP side?

btmon, failed SMP pairing

      SMP: Pairing Request (0x01) len 6
        IO capability: KeyboardDisplay (0x04)
        OOB data: Authentication data not present (0x00)
        Authentication requirement: Bonding, MITM, SC, No Keypresses (0x0d)
        Max encryption key size: 16
        Initiator key distribution: EncKey Sign (0x05)
        Responder key distribution: EncKey IdKey Sign (0x07)
bluetoothd[1316]: < ACL Data TX: Handle 3584 flags 0x00 dlen 7                                                                           #368 [hci0] 182.683940 
      ATT: Exchange MTU Request (0x02) len 2
        Client RX MTU: 517
bluetoothd[1316]: < ACL Data TX: Handle 3584 flags 0x00 dlen 7                                                                           #369 [hci0] 182.683968 
      ATT: Exchange MTU Response (0x03) len 2
        Server RX MTU: 517
> HCI Event: Number of Completed Packets (0x13) plen 5                                                                                   #370 [hci0] 182.726483
        Num handles: 1
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Count: 1
        #367: len 11 (1 Kb/s)
        Latency: 49 msec (49-49 msec ~49 msec)
> HCI Event: Number of Completed Packets (0x13) plen 5                                                                                   #371 [hci0] 182.727759 
        Num handles: 1
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Count: 1
        #368: len 7 (1 Kb/s)
        Latency: 43 msec (43-49 msec ~46 msec)
> HCI Event: LE Meta Event (0x3e) plen 11                                                                                                #372 [hci0] 182.776931
      LE Data Length Change (0x07)
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Max TX octets: 251
        Max TX time: 17040
        Max RX octets: 251
        Max RX time: 17040
> ACL Data RX: Handle 3584 flags 0x02 dlen 11                                                                                            #373 [hci0] 182.876732
      SMP: Pairing Response (0x02) len 6
        IO capability: NoInputNoOutput (0x03)
        OOB data: Authentication data not present (0x00)
        Authentication requirement: Bonding, No MITM, Legacy, No Keypresses (0x01)
        Max encryption key size: 16
        Initiator key distribution: EncKey (0x01)
        Responder key distribution: EncKey (0x01)
@ MGMT Event: User Confirmation Request (0x000f) plen 12                                                                             {0x0001} [hci0] 182.876800 
        LE Address: C5:66:98:3F:CB:CB (Static)
        Confirm hint: 0x01
        Value: 0x00000000
@ MGMT Event: User Confirmation Request (0x000f) plen 12                                                                             {0x0002} [hci0] 182.876800 
        LE Address: C5:66:98:3F:CB:CB (Static)
        Confirm hint: 0x01
        Value: 0x00000000
bluetoothd[1316]: @ MGMT Command: User Confirmation Reply (0x001c) plen 7                                                            {0x0002} [hci0] 182.877121 
        LE Address: C5:66:98:3F:CB:CB (Static)
@ MGMT Event: Command Complete (0x0001) plen 10                                                                                      {0x0002} [hci0] 182.877182 
      User Confirmation Reply (0x001c) plen 7
        Status: Success (0x00)
        LE Address: C5:66:98:3F:CB:CB (Static)
< ACL Data TX: Handle 3584 flags 0x00 dlen 21                                                                                            #374 [hci0] 182.877333 
      SMP: Pairing Confirm (0x03) len 16
        Confim value: f3975317f42cfe89c144b7f5cd437be7
> HCI Event: Number of Completed Packets (0x13) plen 5                                                                                   #375 [hci0] 182.926828
        Num handles: 1
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Count: 1
        #369: len 7 (0 Kb/s)
        Latency: 242 msec (43-242 msec ~144 msec)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21                                                                                            #376 [hci0] 182.976803
      SMP: Pairing Confirm (0x03) len 16
        Confim value: 9f2eb095f528e0db3ee0b19bafb6ea7b
< ACL Data TX: Handle 3584 flags 0x00 dlen 21                                                                                            #377 [hci0] 182.976860 
      SMP: Pairing Random (0x04) len 16
        Random value: 43a7db37c1dc1706ba28e0a0587acdd7
> HCI Event: Number of Completed Packets (0x13) plen 5                                                                                   #378 [hci0] 183.026503
        Num handles: 1
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Count: 1
        #374: len 21 (1 Kb/s)
        Latency: 149 msec (43-242 msec ~146 msec)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21                                                                                            #379 [hci0] 183.076854
      SMP: Pairing Random (0x04) len 16
        Random value: de0b001e5d44b956894ee427bd392ec1
< HCI Command: LE Start Encryption (0x08|0x0019) plen 28                                                                                 #380 [hci0] 183.076917 
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Random number: 0x0000000000000000
        Encrypted diversifier: 0x0000
        Long term key: 0730f492552dc641e96826af5e40598b
> HCI Event: LE Meta Event (0x3e) plen 6                                                                                                 #381 [hci0] 183.078444 
      LE PHY Update Complete (0x0c)
        Status: Success (0x00)
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        TX PHY: LE 2M (0x02)
        RX PHY: LE 2M (0x02)
> HCI Event: Command Status (0x0f) plen 4                                                                                                #382 [hci0] 183.079180 
      LE Start Encryption (0x08|0x0019) ncmd 1
        Status: Success (0x00)
> HCI Event: Encryption Change (0x08) plen 4                                                                                             #383 [hci0] 183.326313
        Status: Success (0x00)
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Encryption: Enabled with AES-CCM (0x01)
< HCI Command: Write Authenticated Payload Timeout (0x03|0x007c) plen 4                                                                  #384 [hci0] 183.326406 
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Timeout: 30000 msec (0x0bb8)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21                                                                                            #385 [hci0] 183.328160 
      SMP: Encryption Information (0x06) len 16
        Long term key: 9eb2f8a6172c50c0a3456573d56c3ecc
> ACL Data RX: Handle 3584 flags 0x02 dlen 15                                                                                            #386 [hci0] 183.328501 
      SMP: Central Identification (0x07) len 10
        EDIV: 0xe7fb
        Rand: 0x409ea330a9a4b4ce
@ MGMT Event: New Long Term Key (0x000a) plen 37                                                                                     {0x0001} [hci0] 183.328565 
        Store hint: Yes (0x01)
        LE Address: C5:66:98:3F:CB:CB (Static)
        Key type: Unauthenticated legacy key (0x00)
        Central: 0x01
        Encryption size: 16
        Diversifier: fbe7
        Randomizer: ceb4a4a930a39e40
        Key: 9eb2f8a6172c50c0a3456573d56c3ecc
@ MGMT Event: New Long Term Key (0x000a) plen 37                                                                                     {0x0002} [hci0] 183.328565 
        Store hint: Yes (0x01)
        LE Address: C5:66:98:3F:CB:CB (Static)
        Key type: Unauthenticated legacy key (0x00)
        Central: 0x01
        Encryption size: 16
        Diversifier: fbe7
        Randomizer: ceb4a4a930a39e40
        Key: 9eb2f8a6172c50c0a3456573d56c3ecc
@ MGMT Event: New Long Term Key (0x000a) plen 37                                                                                     {0x0001} [hci0] 183.328588 
        Store hint: Yes (0x01)
        LE Address: C5:66:98:3F:CB:CB (Static)
        Key type: Unauthenticated legacy key (0x00)
        Central: 0x00
        Encryption size: 16
        Diversifier: 6353
        Randomizer: 89a079af10768477
        Key: f228e6588ccd724e773614db77bd1682
@ MGMT Event: New Long Term Key (0x000a) plen 37                                                                                     {0x0002} [hci0] 183.328588 
        Store hint: Yes (0x01)
        LE Address: C5:66:98:3F:CB:CB (Static)
        Key type: Unauthenticated legacy key (0x00)
        Central: 0x00
        Encryption size: 16
        Diversifier: 6353
        Randomizer: 89a079af10768477
        Key: f228e6588ccd724e773614db77bd1682
@ MGMT Event: Command Complete (0x0001) plen 10                                                                                      {0x0002} [hci0] 183.328601 
      Pair Device (0x0019) plen 7
        Status: Success (0x00)
        LE Address: C5:66:98:3F:CB:CB (Static)
< ACL Data TX: Handle 3584 flags 0x00 dlen 21                                                                                            #387 [hci0] 183.328622 
      SMP: Encryption Information (0x06) len 16
        Long term key: f228e6588ccd724e773614db77bd1682
< ACL Data TX: Handle 3584 flags 0x00 dlen 15                                                                                            #388 [hci0] 183.328633 
      SMP: Central Identification (0x07) len 10
        EDIV: 0x5363
        Rand: 0x77847610af79a089
> HCI Event: Command Complete (0x0e) plen 6                                                                                              #389 [hci0] 183.329203 
      Write Authenticated Payload Timeout (0x03|0x007c) ncmd 1
        Status: Success (0x00)
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
> HCI Event: Number of Completed Packets (0x13) plen 5                                                                                   #390 [hci0] 183.376320 
        Num handles: 1
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Count: 1
        #377: len 21 (0 Kb/s)
        Latency: 399 msec (43-399 msec ~273 msec)
> ACL Data RX: Handle 3584 flags 0x02 dlen 6                                                                                             #391 [hci0] 183.426393
      SMP: Pairing Failed (0x05) len 1
        Reason: Unspecified reason (0x08)

device side

[00:00:33.069,213] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x01 len 6
[00:00:33.069,213] <dbg> bt_smp: smp_pairing_req: req: io_capability 0x03, oob_flag 0x00, auth_req 0x09, max_key_size 0x10, init_key_dist 0x05, resp_key_dist 0x07
[00:00:33.070,831] <dbg> bt_smp: smp_init: prnd 52c36857a6a9472ecee68cd53fa4440d
[00:00:33.070,831] <inf> BluetoothHdl: pairing accept
[00:00:33.070,861] <dbg> bt_smp: legacy_pairing_req: 
[00:00:33.071,075] <inf> BluetoothHdl: Updated MTU: TX: 498 RX: 498 bytes
[00:00:33.071,105] <inf> BluetoothHdl: MTU exchange done
[00:00:33.071,105] <inf> BluetoothHdl: Connection Information:
[00:00:33.071,105] <inf> BluetoothHdl: Data Len Info: Tx= 21216, Tx time= 8192, Rx= 258, Rx time= 0
[00:00:33.268,951] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x03 len 16
[00:00:33.268,981] <dbg> bt_smp: smp_pairing_confirm: 
[00:00:33.268,981] <dbg> bt_smp: legacy_pairing_confirm: 
[00:00:33.269,073] <dbg> bt_smp: smp_c1: k 00000000000000000000000000000000
[00:00:33.269,104] <dbg> bt_smp: smp_c1: r 52c36857a6a9472ecee68cd53fa4440d
[00:00:33.269,256] <dbg> bt_smp: smp_c1: ia 00:21:AD:40:00:02 (public)
[00:00:33.269,378] <dbg> bt_smp: smp_c1: ra C5:66:98:3F:CB:CB (random)
[00:00:33.269,409] <dbg> bt_smp: smp_c1: preq 01030009100507
[00:00:33.269,439] <dbg> bt_smp: smp_c1: pres 02000005100101
[00:00:33.269,500] <dbg> bt_smp: smp_c1: p1 00010103000910050702000005100101
[00:00:33.269,714] <dbg> bt_smp: smp_c1: p2 cbcb3f9866c5020040ad210000000000
[00:00:33.368,896] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x04 len 16
[00:00:33.368,927] <dbg> bt_smp: smp_pairing_random: 
[00:00:33.368,927] <dbg> bt_smp: legacy_pairing_random: 
[00:00:33.368,957] <dbg> bt_smp: smp_c1: k 00000000000000000000000000000000
[00:00:33.369,018] <dbg> bt_smp: smp_c1: r 1ee7d82be293bf4e51a6437bd55589fc
[00:00:33.369,140] <dbg> bt_smp: smp_c1: ia 00:21:AD:40:00:02 (public)
[00:00:33.369,262] <dbg> bt_smp: smp_c1: ra C5:66:98:3F:CB:CB (random)
[00:00:33.369,293] <dbg> bt_smp: smp_c1: preq 01030009100507
[00:00:33.369,323] <dbg> bt_smp: smp_c1: pres 02000005100101
[00:00:33.369,384] <dbg> bt_smp: smp_c1: p1 00010103000910050702000005100101
[00:00:33.369,598] <dbg> bt_smp: smp_c1: p2 cbcb3f9866c5020040ad210000000000
[00:00:33.369,812] <dbg> bt_smp: legacy_pairing_random: pcnf 5462968eaac86ad572e8565ca4ceb847
[00:00:33.369,842] <dbg> bt_smp: legacy_pairing_random: cfm 5462968eaac86ad572e8565ca4ceb847
[00:00:33.370,086] <dbg> bt_smp: legacy_pairing_random: generated STK 6d79ea1aaae1439543fb7b8f54b835a3
[00:00:33.618,896] <dbg> bt_smp: bt_smp_encrypt_change: chan 0x200055e8 conn 0x20005228 handle 0 encrypt 0x01 hci status 0x00
Security changed: 00:21:AD:40:00:02 (public) level 2
[00:00:33.718,780] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x07 len 10
[00:00:33.718,780] <wrn> bt_smp: Unexpected SMP code 0x07
[00:00:33.718,811] <dbg> bt_smp: smp_pairing_complete: got status 0x8
Pairing failed conn: 00:21:AD:40:00:02 (public), reason 9

btmon, success SMP pair without service data

< ACL Data TX: Handle 3584 flags 0x00 dlen 11                                                                                               #47 [hci0] 13.288304 
      SMP: Pairing Request (0x01) len 6
        IO capability: KeyboardDisplay (0x04)
        OOB data: Authentication data not present (0x00)
        Authentication requirement: Bonding, MITM, SC, No Keypresses (0x0d)
        Max encryption key size: 16
        Initiator key distribution: EncKey Sign (0x05)
        Responder key distribution: EncKey IdKey Sign (0x07)
bluetoothd[1570]: < ACL Data TX: Handle 3584 flags 0x00 dlen 7                                                                              #48 [hci0] 13.294469 
      ATT: Exchange MTU Request (0x02) len 2
        Client RX MTU: 517
bluetoothd[1570]: < ACL Data TX: Handle 3584 flags 0x00 dlen 7                                                                              #49 [hci0] 13.294497 
      ATT: Exchange MTU Response (0x03) len 2
        Server RX MTU: 517
> HCI Event: Number of Completed Packets (0x13) plen 5                                                                                      #50 [hci0] 13.337330
        Num handles: 1
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Count: 1
        #47: len 11 (1 Kb/s)
        Latency: 49 msec (49-49 msec ~49 msec)
> HCI Event: Number of Completed Packets (0x13) plen 5                                                                                      #51 [hci0] 13.338578 
        Num handles: 1
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Count: 1
        #48: len 7 (1 Kb/s)
        Latency: 44 msec (44-49 msec ~46 msec)
> HCI Event: LE Meta Event (0x3e) plen 11                                                                                                   #52 [hci0] 13.387733
      LE Data Length Change (0x07)
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Max TX octets: 251
        Max TX time: 17040
        Max RX octets: 251
        Max RX time: 17040
> ACL Data RX: Handle 3584 flags 0x02 dlen 11                                                                                               #53 [hci0] 13.487532
      SMP: Pairing Response (0x02) len 6
        IO capability: NoInputNoOutput (0x03)
        OOB data: Authentication data not present (0x00)
        Authentication requirement: Bonding, No MITM, Legacy, No Keypresses (0x01)
        Max encryption key size: 16
        Initiator key distribution: EncKey (0x01)
        Responder key distribution: EncKey (0x01)
@ MGMT Event: User Confirmation Request (0x000f) plen 12                                                                               {0x0003} [hci0] 13.487584 
        LE Address: C5:66:98:3F:CB:CB (Static)
        Confirm hint: 0x01
        Value: 0x00000000
@ MGMT Event: User Confirmation Request (0x000f) plen 12                                                                               {0x0001} [hci0] 13.487584 
        LE Address: C5:66:98:3F:CB:CB (Static)
        Confirm hint: 0x01
        Value: 0x00000000
bluetoothd[1570]: @ MGMT Command: User Confirmation Reply (0x001c) plen 7                                                              {0x0001} [hci0] 13.487845 
        LE Address: C5:66:98:3F:CB:CB (Static)
@ MGMT Event: Command Complete (0x0001) plen 10                                                                                        {0x0001} [hci0] 13.487897 
      User Confirmation Reply (0x001c) plen 7
        Status: Success (0x00)
        LE Address: C5:66:98:3F:CB:CB (Static)
< ACL Data TX: Handle 3584 flags 0x00 dlen 21                                                                                               #54 [hci0] 13.487914 
      SMP: Pairing Confirm (0x03) len 16
        Confim value: ddb9fc1087fca166ce678d4522b77d1f
> HCI Event: Number of Completed Packets (0x13) plen 5                                                                                      #55 [hci0] 13.537633
        Num handles: 1
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Count: 1
        #49: len 7 (0 Kb/s)
        Latency: 243 msec (44-243 msec ~144 msec)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21                                                                                               #56 [hci0] 13.587639
      SMP: Pairing Confirm (0x03) len 16
        Confim value: bb438827860c93a744d88fab386967cc
< ACL Data TX: Handle 3584 flags 0x00 dlen 21                                                                                               #57 [hci0] 13.587693 
      SMP: Pairing Random (0x04) len 16
        Random value: b20263be911cd188a2ffa20b61778a16
> HCI Event: Number of Completed Packets (0x13) plen 5                                                                                      #58 [hci0] 13.637613
        Num handles: 1
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Count: 1
        #54: len 21 (1 Kb/s)
        Latency: 149 msec (44-243 msec ~147 msec)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21                                                                                               #59 [hci0] 13.687643
      SMP: Pairing Random (0x04) len 16
        Random value: e7e795d87a1fe78654621292d60e56e7
< HCI Command: LE Start Encryption (0x08|0x0019) plen 28                                                                                    #60 [hci0] 13.687710 
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Random number: 0x0000000000000000
        Encrypted diversifier: 0x0000
        Long term key: 57348e12e433d2da1d701a941a08d975
> HCI Event: LE Meta Event (0x3e) plen 6                                                                                                    #61 [hci0] 13.689286 
      LE PHY Update Complete (0x0c)
        Status: Success (0x00)
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        TX PHY: LE 2M (0x02)
        RX PHY: LE 2M (0x02)
> HCI Event: Command Status (0x0f) plen 4                                                                                                   #62 [hci0] 13.690014 
      LE Start Encryption (0x08|0x0019) ncmd 1
        Status: Success (0x00)
> HCI Event: Encryption Change (0x08) plen 4                                                                                                #63 [hci0] 13.937060
        Status: Success (0x00)
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Encryption: Enabled with AES-CCM (0x01)
< HCI Command: Write Authenticated Payload Timeout (0x03|0x007c) plen 4                                                                     #64 [hci0] 13.937125 
        Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
        Timeout: 30000 msec (0x0bb8)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21                                                                                               #65 [hci0] 13.939240 
      SMP: Encryption Information (0x06) len 16
        Long term key: aae1b8edfd3f510831d8eec84fc6653a
> ACL Data RX: Handle 3584 flags 0x02 dlen 15                                                                                               #66 [hci0] 13.939558 
      SMP: Central Identification (0x07) len 10
        EDIV: 0xfae5
        Rand: 0xe239a4a2f51e0d3c

device side

[00:00:50.333,129] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x01 len 6
[00:00:50.333,129] <dbg> bt_smp: smp_pairing_req: req: io_capability 0x04, oob_flag 0x00, auth_req 0x0D, max_key_size 0x10, init_key_dist 0x05, resp_key_dist 0x07
[00:00:50.334,716] <dbg> bt_smp: smp_init: prnd e7e795d87a1fe78654621292d60e56e7
[00:00:50.334,747] <dbg> bt_smp: legacy_pairing_req: 
[00:00:50.334,991] <inf> BluetoothHdl: Updated MTU: TX: 498 RX: 498 bytes
[00:00:50.335,021] <inf> BluetoothHdl: MTU exchange done
[00:00:50.335,052] <inf> BluetoothHdl: Connection Information:
[00:00:50.335,052] <inf> BluetoothHdl: Data Len Info: Tx= 21216, Tx time= 8192, Rx= 258, Rx time= 0
[00:00:50.532,836] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x03 len 16
[00:00:50.532,836] <dbg> bt_smp: smp_pairing_confirm: 
[00:00:50.532,867] <dbg> bt_smp: legacy_pairing_confirm: 
[00:00:50.532,928] <dbg> bt_smp: smp_c1: k 00000000000000000000000000000000
[00:00:50.532,989] <dbg> bt_smp: smp_c1: r e7e795d87a1fe78654621292d60e56e7
[00:00:50.533,142] <dbg> bt_smp: smp_c1: ia 00:21:AD:40:00:02 (public)
[00:00:50.533,264] <dbg> bt_smp: smp_c1: ra C5:66:98:3F:CB:CB (random)
[00:00:50.533,294] <dbg> bt_smp: smp_c1: preq 0104000d100507
[00:00:50.533,325] <dbg> bt_smp: smp_c1: pres 02030001100101
[00:00:50.533,355] <dbg> bt_smp: smp_c1: p1 00010104000d10050702030001100101
[00:00:50.533,599] <dbg> bt_smp: smp_c1: p2 cbcb3f9866c5020040ad210000000000
[00:00:50.632,812] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x04 len 16
[00:00:50.632,843] <dbg> bt_smp: smp_pairing_random: 
[00:00:50.632,843] <dbg> bt_smp: legacy_pairing_random: 
[00:00:50.632,873] <dbg> bt_smp: smp_c1: k 00000000000000000000000000000000
[00:00:50.632,904] <dbg> bt_smp: smp_c1: r b20263be911cd188a2ffa20b61778a16
[00:00:50.633,056] <dbg> bt_smp: smp_c1: ia 00:21:AD:40:00:02 (public)
[00:00:50.633,178] <dbg> bt_smp: smp_c1: ra C5:66:98:3F:CB:CB (random)
[00:00:50.633,209] <dbg> bt_smp: smp_c1: preq 0104000d100507
[00:00:50.633,270] <dbg> bt_smp: smp_c1: pres 02030001100101
[00:00:50.633,331] <dbg> bt_smp: smp_c1: p1 00010104000d10050702030001100101
[00:00:50.633,544] <dbg> bt_smp: smp_c1: p2 cbcb3f9866c5020040ad210000000000
[00:00:50.633,758] <dbg> bt_smp: legacy_pairing_random: pcnf ddb9fc1087fca166ce678d4522b77d1f
[00:00:50.633,789] <dbg> bt_smp: legacy_pairing_random: cfm ddb9fc1087fca166ce678d4522b77d1f
[00:00:50.634,033] <dbg> bt_smp: legacy_pairing_random: generated STK 57348e12e433d2da1d701a941a08d975
[00:00:50.882,751] <dbg> bt_smp: bt_smp_encrypt_change: chan 0x200055e8 conn 0x20005228 handle 0 encrypt 0x01 hci status 0x00
[00:00:50.982,696] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x06 len 16
[00:00:50.982,696] <dbg> bt_smp: smp_encrypt_info: 
[00:00:50.983,184] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x07 len 10
[00:00:50.983,184] <dbg> bt_smp: smp_central_ident: 
[00:00:50.983,215] <dbg> bt_smp: smp_pairing_complete: got status 0x0

2843.netcore_config.txt

Parents
  • Hi Niklas

    Just to make sure we start off on the same page here, as it isn't clear to me from the description where you're seeing this issue. You say you have tested that pairing works with the nRF5 SDK, so is it the nRF Connect SDK v2.4.2 applications on both nRF52840 and/or nRF5340 that doesn't work correctly? 

    If you're developing a new application for the nRF52/53 series I would recommend moving to a later version of the nRF Connect SDK as v2.4.2 is getting pretty old at this point. The latest version of the SDK at the time of writing this is nRF Connect SDK v3.2.0. I'd recommend checking out the Bluetooth Low Energy DevAcademy course for do's and don'ts for advertising, connecting and pairing in the nRF Connect SDK. https://academy.nordicsemi.com/courses/bluetooth-low-energy-fundamentals/ 

    Best regards,

    Simon

  • Yes, only nRF Connect SDK v2.4.2 applications on both nRF52840 and nRF5340 seem to have this issue. Do you have insight that similar issues may be less seen in v3.2.0? Another nRF52480 that use nRF5 SDK does not seem to have this issue which is why I shared my configuration to see if there could be an issue.

Reply Children
No Data
Related