Hi,
I am using nrf5340 and nrf52840 SoC in my devices. I have tested that pairing works with the same linux machine for peripheral uart sample for nrf5340dk, nrf53 thingy out of box, and another custom nrf52840 device that is running older nrf5 SDK. Right now, we are on nrf sdk v2.4.2, zephyr commit 28a3fca7da5. What is even more strange is that sometimes pairing has worked from the hundreds of times I have tried this week but even then I could not get the BT service data. I have tested also with 2 other linux machines to initiate pairing and it seems to work reliably. The only difference I can see from btmon is that the linux I am using has SC in authentication requirement and we have disabled SC in SMP. I am kind of running out of ideas and testing configs as none seems to make a difference. I have also attached hci_rpmsg config file which we are using for netcore. The keys for SMP may mismatch here as these may be from different requests but the underlying issue is the same.
I have ran into an issue where pairing is rejected in SMP for unspecified reason as seen on my linux side which is initiating the pair.
kernel: Bluetooth: hci0: unexpected SMP command 0x05 from c5:66:98:3f:cb:cb
I think this is coming from bt_smp_recv in subsys/bluetooth/host/smp.c as unhandled SMP code. I think the SMP is expecting 0x06 Encryption Information command however, I am getting 0x07 Central Information before that. I see that on linux side, I have sent this via btmon (see attached log). Somehow, the device is not receiving this or have received but not got to the Bluetooth Host SMP side?
btmon, failed SMP pairing
SMP: Pairing Request (0x01) len 6
IO capability: KeyboardDisplay (0x04)
OOB data: Authentication data not present (0x00)
Authentication requirement: Bonding, MITM, SC, No Keypresses (0x0d)
Max encryption key size: 16
Initiator key distribution: EncKey Sign (0x05)
Responder key distribution: EncKey IdKey Sign (0x07)
bluetoothd[1316]: < ACL Data TX: Handle 3584 flags 0x00 dlen 7 #368 [hci0] 182.683940
ATT: Exchange MTU Request (0x02) len 2
Client RX MTU: 517
bluetoothd[1316]: < ACL Data TX: Handle 3584 flags 0x00 dlen 7 #369 [hci0] 182.683968
ATT: Exchange MTU Response (0x03) len 2
Server RX MTU: 517
> HCI Event: Number of Completed Packets (0x13) plen 5 #370 [hci0] 182.726483
Num handles: 1
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Count: 1
#367: len 11 (1 Kb/s)
Latency: 49 msec (49-49 msec ~49 msec)
> HCI Event: Number of Completed Packets (0x13) plen 5 #371 [hci0] 182.727759
Num handles: 1
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Count: 1
#368: len 7 (1 Kb/s)
Latency: 43 msec (43-49 msec ~46 msec)
> HCI Event: LE Meta Event (0x3e) plen 11 #372 [hci0] 182.776931
LE Data Length Change (0x07)
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Max TX octets: 251
Max TX time: 17040
Max RX octets: 251
Max RX time: 17040
> ACL Data RX: Handle 3584 flags 0x02 dlen 11 #373 [hci0] 182.876732
SMP: Pairing Response (0x02) len 6
IO capability: NoInputNoOutput (0x03)
OOB data: Authentication data not present (0x00)
Authentication requirement: Bonding, No MITM, Legacy, No Keypresses (0x01)
Max encryption key size: 16
Initiator key distribution: EncKey (0x01)
Responder key distribution: EncKey (0x01)
@ MGMT Event: User Confirmation Request (0x000f) plen 12 {0x0001} [hci0] 182.876800
LE Address: C5:66:98:3F:CB:CB (Static)
Confirm hint: 0x01
Value: 0x00000000
@ MGMT Event: User Confirmation Request (0x000f) plen 12 {0x0002} [hci0] 182.876800
LE Address: C5:66:98:3F:CB:CB (Static)
Confirm hint: 0x01
Value: 0x00000000
bluetoothd[1316]: @ MGMT Command: User Confirmation Reply (0x001c) plen 7 {0x0002} [hci0] 182.877121
LE Address: C5:66:98:3F:CB:CB (Static)
@ MGMT Event: Command Complete (0x0001) plen 10 {0x0002} [hci0] 182.877182
User Confirmation Reply (0x001c) plen 7
Status: Success (0x00)
LE Address: C5:66:98:3F:CB:CB (Static)
< ACL Data TX: Handle 3584 flags 0x00 dlen 21 #374 [hci0] 182.877333
SMP: Pairing Confirm (0x03) len 16
Confim value: f3975317f42cfe89c144b7f5cd437be7
> HCI Event: Number of Completed Packets (0x13) plen 5 #375 [hci0] 182.926828
Num handles: 1
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Count: 1
#369: len 7 (0 Kb/s)
Latency: 242 msec (43-242 msec ~144 msec)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21 #376 [hci0] 182.976803
SMP: Pairing Confirm (0x03) len 16
Confim value: 9f2eb095f528e0db3ee0b19bafb6ea7b
< ACL Data TX: Handle 3584 flags 0x00 dlen 21 #377 [hci0] 182.976860
SMP: Pairing Random (0x04) len 16
Random value: 43a7db37c1dc1706ba28e0a0587acdd7
> HCI Event: Number of Completed Packets (0x13) plen 5 #378 [hci0] 183.026503
Num handles: 1
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Count: 1
#374: len 21 (1 Kb/s)
Latency: 149 msec (43-242 msec ~146 msec)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21 #379 [hci0] 183.076854
SMP: Pairing Random (0x04) len 16
Random value: de0b001e5d44b956894ee427bd392ec1
< HCI Command: LE Start Encryption (0x08|0x0019) plen 28 #380 [hci0] 183.076917
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Random number: 0x0000000000000000
Encrypted diversifier: 0x0000
Long term key: 0730f492552dc641e96826af5e40598b
> HCI Event: LE Meta Event (0x3e) plen 6 #381 [hci0] 183.078444
LE PHY Update Complete (0x0c)
Status: Success (0x00)
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
TX PHY: LE 2M (0x02)
RX PHY: LE 2M (0x02)
> HCI Event: Command Status (0x0f) plen 4 #382 [hci0] 183.079180
LE Start Encryption (0x08|0x0019) ncmd 1
Status: Success (0x00)
> HCI Event: Encryption Change (0x08) plen 4 #383 [hci0] 183.326313
Status: Success (0x00)
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Encryption: Enabled with AES-CCM (0x01)
< HCI Command: Write Authenticated Payload Timeout (0x03|0x007c) plen 4 #384 [hci0] 183.326406
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Timeout: 30000 msec (0x0bb8)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21 #385 [hci0] 183.328160
SMP: Encryption Information (0x06) len 16
Long term key: 9eb2f8a6172c50c0a3456573d56c3ecc
> ACL Data RX: Handle 3584 flags 0x02 dlen 15 #386 [hci0] 183.328501
SMP: Central Identification (0x07) len 10
EDIV: 0xe7fb
Rand: 0x409ea330a9a4b4ce
@ MGMT Event: New Long Term Key (0x000a) plen 37 {0x0001} [hci0] 183.328565
Store hint: Yes (0x01)
LE Address: C5:66:98:3F:CB:CB (Static)
Key type: Unauthenticated legacy key (0x00)
Central: 0x01
Encryption size: 16
Diversifier: fbe7
Randomizer: ceb4a4a930a39e40
Key: 9eb2f8a6172c50c0a3456573d56c3ecc
@ MGMT Event: New Long Term Key (0x000a) plen 37 {0x0002} [hci0] 183.328565
Store hint: Yes (0x01)
LE Address: C5:66:98:3F:CB:CB (Static)
Key type: Unauthenticated legacy key (0x00)
Central: 0x01
Encryption size: 16
Diversifier: fbe7
Randomizer: ceb4a4a930a39e40
Key: 9eb2f8a6172c50c0a3456573d56c3ecc
@ MGMT Event: New Long Term Key (0x000a) plen 37 {0x0001} [hci0] 183.328588
Store hint: Yes (0x01)
LE Address: C5:66:98:3F:CB:CB (Static)
Key type: Unauthenticated legacy key (0x00)
Central: 0x00
Encryption size: 16
Diversifier: 6353
Randomizer: 89a079af10768477
Key: f228e6588ccd724e773614db77bd1682
@ MGMT Event: New Long Term Key (0x000a) plen 37 {0x0002} [hci0] 183.328588
Store hint: Yes (0x01)
LE Address: C5:66:98:3F:CB:CB (Static)
Key type: Unauthenticated legacy key (0x00)
Central: 0x00
Encryption size: 16
Diversifier: 6353
Randomizer: 89a079af10768477
Key: f228e6588ccd724e773614db77bd1682
@ MGMT Event: Command Complete (0x0001) plen 10 {0x0002} [hci0] 183.328601
Pair Device (0x0019) plen 7
Status: Success (0x00)
LE Address: C5:66:98:3F:CB:CB (Static)
< ACL Data TX: Handle 3584 flags 0x00 dlen 21 #387 [hci0] 183.328622
SMP: Encryption Information (0x06) len 16
Long term key: f228e6588ccd724e773614db77bd1682
< ACL Data TX: Handle 3584 flags 0x00 dlen 15 #388 [hci0] 183.328633
SMP: Central Identification (0x07) len 10
EDIV: 0x5363
Rand: 0x77847610af79a089
> HCI Event: Command Complete (0x0e) plen 6 #389 [hci0] 183.329203
Write Authenticated Payload Timeout (0x03|0x007c) ncmd 1
Status: Success (0x00)
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
> HCI Event: Number of Completed Packets (0x13) plen 5 #390 [hci0] 183.376320
Num handles: 1
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Count: 1
#377: len 21 (0 Kb/s)
Latency: 399 msec (43-399 msec ~273 msec)
> ACL Data RX: Handle 3584 flags 0x02 dlen 6 #391 [hci0] 183.426393
SMP: Pairing Failed (0x05) len 1
Reason: Unspecified reason (0x08)
device side
[00:00:33.069,213] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x01 len 6
[00:00:33.069,213] <dbg> bt_smp: smp_pairing_req: req: io_capability 0x03, oob_flag 0x00, auth_req 0x09, max_key_size 0x10, init_key_dist 0x05, resp_key_dist 0x07
[00:00:33.070,831] <dbg> bt_smp: smp_init: prnd 52c36857a6a9472ecee68cd53fa4440d
[00:00:33.070,831] <inf> BluetoothHdl: pairing accept
[00:00:33.070,861] <dbg> bt_smp: legacy_pairing_req:
[00:00:33.071,075] <inf> BluetoothHdl: Updated MTU: TX: 498 RX: 498 bytes
[00:00:33.071,105] <inf> BluetoothHdl: MTU exchange done
[00:00:33.071,105] <inf> BluetoothHdl: Connection Information:
[00:00:33.071,105] <inf> BluetoothHdl: Data Len Info: Tx= 21216, Tx time= 8192, Rx= 258, Rx time= 0
[00:00:33.268,951] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x03 len 16
[00:00:33.268,981] <dbg> bt_smp: smp_pairing_confirm:
[00:00:33.268,981] <dbg> bt_smp: legacy_pairing_confirm:
[00:00:33.269,073] <dbg> bt_smp: smp_c1: k 00000000000000000000000000000000
[00:00:33.269,104] <dbg> bt_smp: smp_c1: r 52c36857a6a9472ecee68cd53fa4440d
[00:00:33.269,256] <dbg> bt_smp: smp_c1: ia 00:21:AD:40:00:02 (public)
[00:00:33.269,378] <dbg> bt_smp: smp_c1: ra C5:66:98:3F:CB:CB (random)
[00:00:33.269,409] <dbg> bt_smp: smp_c1: preq 01030009100507
[00:00:33.269,439] <dbg> bt_smp: smp_c1: pres 02000005100101
[00:00:33.269,500] <dbg> bt_smp: smp_c1: p1 00010103000910050702000005100101
[00:00:33.269,714] <dbg> bt_smp: smp_c1: p2 cbcb3f9866c5020040ad210000000000
[00:00:33.368,896] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x04 len 16
[00:00:33.368,927] <dbg> bt_smp: smp_pairing_random:
[00:00:33.368,927] <dbg> bt_smp: legacy_pairing_random:
[00:00:33.368,957] <dbg> bt_smp: smp_c1: k 00000000000000000000000000000000
[00:00:33.369,018] <dbg> bt_smp: smp_c1: r 1ee7d82be293bf4e51a6437bd55589fc
[00:00:33.369,140] <dbg> bt_smp: smp_c1: ia 00:21:AD:40:00:02 (public)
[00:00:33.369,262] <dbg> bt_smp: smp_c1: ra C5:66:98:3F:CB:CB (random)
[00:00:33.369,293] <dbg> bt_smp: smp_c1: preq 01030009100507
[00:00:33.369,323] <dbg> bt_smp: smp_c1: pres 02000005100101
[00:00:33.369,384] <dbg> bt_smp: smp_c1: p1 00010103000910050702000005100101
[00:00:33.369,598] <dbg> bt_smp: smp_c1: p2 cbcb3f9866c5020040ad210000000000
[00:00:33.369,812] <dbg> bt_smp: legacy_pairing_random: pcnf 5462968eaac86ad572e8565ca4ceb847
[00:00:33.369,842] <dbg> bt_smp: legacy_pairing_random: cfm 5462968eaac86ad572e8565ca4ceb847
[00:00:33.370,086] <dbg> bt_smp: legacy_pairing_random: generated STK 6d79ea1aaae1439543fb7b8f54b835a3
[00:00:33.618,896] <dbg> bt_smp: bt_smp_encrypt_change: chan 0x200055e8 conn 0x20005228 handle 0 encrypt 0x01 hci status 0x00
Security changed: 00:21:AD:40:00:02 (public) level 2
[00:00:33.718,780] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x07 len 10
[00:00:33.718,780] <wrn> bt_smp: Unexpected SMP code 0x07
[00:00:33.718,811] <dbg> bt_smp: smp_pairing_complete: got status 0x8
Pairing failed conn: 00:21:AD:40:00:02 (public), reason 9
btmon, success SMP pair without service data
< ACL Data TX: Handle 3584 flags 0x00 dlen 11 #47 [hci0] 13.288304
SMP: Pairing Request (0x01) len 6
IO capability: KeyboardDisplay (0x04)
OOB data: Authentication data not present (0x00)
Authentication requirement: Bonding, MITM, SC, No Keypresses (0x0d)
Max encryption key size: 16
Initiator key distribution: EncKey Sign (0x05)
Responder key distribution: EncKey IdKey Sign (0x07)
bluetoothd[1570]: < ACL Data TX: Handle 3584 flags 0x00 dlen 7 #48 [hci0] 13.294469
ATT: Exchange MTU Request (0x02) len 2
Client RX MTU: 517
bluetoothd[1570]: < ACL Data TX: Handle 3584 flags 0x00 dlen 7 #49 [hci0] 13.294497
ATT: Exchange MTU Response (0x03) len 2
Server RX MTU: 517
> HCI Event: Number of Completed Packets (0x13) plen 5 #50 [hci0] 13.337330
Num handles: 1
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Count: 1
#47: len 11 (1 Kb/s)
Latency: 49 msec (49-49 msec ~49 msec)
> HCI Event: Number of Completed Packets (0x13) plen 5 #51 [hci0] 13.338578
Num handles: 1
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Count: 1
#48: len 7 (1 Kb/s)
Latency: 44 msec (44-49 msec ~46 msec)
> HCI Event: LE Meta Event (0x3e) plen 11 #52 [hci0] 13.387733
LE Data Length Change (0x07)
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Max TX octets: 251
Max TX time: 17040
Max RX octets: 251
Max RX time: 17040
> ACL Data RX: Handle 3584 flags 0x02 dlen 11 #53 [hci0] 13.487532
SMP: Pairing Response (0x02) len 6
IO capability: NoInputNoOutput (0x03)
OOB data: Authentication data not present (0x00)
Authentication requirement: Bonding, No MITM, Legacy, No Keypresses (0x01)
Max encryption key size: 16
Initiator key distribution: EncKey (0x01)
Responder key distribution: EncKey (0x01)
@ MGMT Event: User Confirmation Request (0x000f) plen 12 {0x0003} [hci0] 13.487584
LE Address: C5:66:98:3F:CB:CB (Static)
Confirm hint: 0x01
Value: 0x00000000
@ MGMT Event: User Confirmation Request (0x000f) plen 12 {0x0001} [hci0] 13.487584
LE Address: C5:66:98:3F:CB:CB (Static)
Confirm hint: 0x01
Value: 0x00000000
bluetoothd[1570]: @ MGMT Command: User Confirmation Reply (0x001c) plen 7 {0x0001} [hci0] 13.487845
LE Address: C5:66:98:3F:CB:CB (Static)
@ MGMT Event: Command Complete (0x0001) plen 10 {0x0001} [hci0] 13.487897
User Confirmation Reply (0x001c) plen 7
Status: Success (0x00)
LE Address: C5:66:98:3F:CB:CB (Static)
< ACL Data TX: Handle 3584 flags 0x00 dlen 21 #54 [hci0] 13.487914
SMP: Pairing Confirm (0x03) len 16
Confim value: ddb9fc1087fca166ce678d4522b77d1f
> HCI Event: Number of Completed Packets (0x13) plen 5 #55 [hci0] 13.537633
Num handles: 1
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Count: 1
#49: len 7 (0 Kb/s)
Latency: 243 msec (44-243 msec ~144 msec)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21 #56 [hci0] 13.587639
SMP: Pairing Confirm (0x03) len 16
Confim value: bb438827860c93a744d88fab386967cc
< ACL Data TX: Handle 3584 flags 0x00 dlen 21 #57 [hci0] 13.587693
SMP: Pairing Random (0x04) len 16
Random value: b20263be911cd188a2ffa20b61778a16
> HCI Event: Number of Completed Packets (0x13) plen 5 #58 [hci0] 13.637613
Num handles: 1
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Count: 1
#54: len 21 (1 Kb/s)
Latency: 149 msec (44-243 msec ~147 msec)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21 #59 [hci0] 13.687643
SMP: Pairing Random (0x04) len 16
Random value: e7e795d87a1fe78654621292d60e56e7
< HCI Command: LE Start Encryption (0x08|0x0019) plen 28 #60 [hci0] 13.687710
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Random number: 0x0000000000000000
Encrypted diversifier: 0x0000
Long term key: 57348e12e433d2da1d701a941a08d975
> HCI Event: LE Meta Event (0x3e) plen 6 #61 [hci0] 13.689286
LE PHY Update Complete (0x0c)
Status: Success (0x00)
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
TX PHY: LE 2M (0x02)
RX PHY: LE 2M (0x02)
> HCI Event: Command Status (0x0f) plen 4 #62 [hci0] 13.690014
LE Start Encryption (0x08|0x0019) ncmd 1
Status: Success (0x00)
> HCI Event: Encryption Change (0x08) plen 4 #63 [hci0] 13.937060
Status: Success (0x00)
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Encryption: Enabled with AES-CCM (0x01)
< HCI Command: Write Authenticated Payload Timeout (0x03|0x007c) plen 4 #64 [hci0] 13.937125
Handle: 3584 Address: C5:66:98:3F:CB:CB (Static)
Timeout: 30000 msec (0x0bb8)
> ACL Data RX: Handle 3584 flags 0x02 dlen 21 #65 [hci0] 13.939240
SMP: Encryption Information (0x06) len 16
Long term key: aae1b8edfd3f510831d8eec84fc6653a
> ACL Data RX: Handle 3584 flags 0x02 dlen 15 #66 [hci0] 13.939558
SMP: Central Identification (0x07) len 10
EDIV: 0xfae5
Rand: 0xe239a4a2f51e0d3c
device side
[00:00:50.333,129] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x01 len 6
[00:00:50.333,129] <dbg> bt_smp: smp_pairing_req: req: io_capability 0x04, oob_flag 0x00, auth_req 0x0D, max_key_size 0x10, init_key_dist 0x05, resp_key_dist 0x07
[00:00:50.334,716] <dbg> bt_smp: smp_init: prnd e7e795d87a1fe78654621292d60e56e7
[00:00:50.334,747] <dbg> bt_smp: legacy_pairing_req:
[00:00:50.334,991] <inf> BluetoothHdl: Updated MTU: TX: 498 RX: 498 bytes
[00:00:50.335,021] <inf> BluetoothHdl: MTU exchange done
[00:00:50.335,052] <inf> BluetoothHdl: Connection Information:
[00:00:50.335,052] <inf> BluetoothHdl: Data Len Info: Tx= 21216, Tx time= 8192, Rx= 258, Rx time= 0
[00:00:50.532,836] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x03 len 16
[00:00:50.532,836] <dbg> bt_smp: smp_pairing_confirm:
[00:00:50.532,867] <dbg> bt_smp: legacy_pairing_confirm:
[00:00:50.532,928] <dbg> bt_smp: smp_c1: k 00000000000000000000000000000000
[00:00:50.532,989] <dbg> bt_smp: smp_c1: r e7e795d87a1fe78654621292d60e56e7
[00:00:50.533,142] <dbg> bt_smp: smp_c1: ia 00:21:AD:40:00:02 (public)
[00:00:50.533,264] <dbg> bt_smp: smp_c1: ra C5:66:98:3F:CB:CB (random)
[00:00:50.533,294] <dbg> bt_smp: smp_c1: preq 0104000d100507
[00:00:50.533,325] <dbg> bt_smp: smp_c1: pres 02030001100101
[00:00:50.533,355] <dbg> bt_smp: smp_c1: p1 00010104000d10050702030001100101
[00:00:50.533,599] <dbg> bt_smp: smp_c1: p2 cbcb3f9866c5020040ad210000000000
[00:00:50.632,812] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x04 len 16
[00:00:50.632,843] <dbg> bt_smp: smp_pairing_random:
[00:00:50.632,843] <dbg> bt_smp: legacy_pairing_random:
[00:00:50.632,873] <dbg> bt_smp: smp_c1: k 00000000000000000000000000000000
[00:00:50.632,904] <dbg> bt_smp: smp_c1: r b20263be911cd188a2ffa20b61778a16
[00:00:50.633,056] <dbg> bt_smp: smp_c1: ia 00:21:AD:40:00:02 (public)
[00:00:50.633,178] <dbg> bt_smp: smp_c1: ra C5:66:98:3F:CB:CB (random)
[00:00:50.633,209] <dbg> bt_smp: smp_c1: preq 0104000d100507
[00:00:50.633,270] <dbg> bt_smp: smp_c1: pres 02030001100101
[00:00:50.633,331] <dbg> bt_smp: smp_c1: p1 00010104000d10050702030001100101
[00:00:50.633,544] <dbg> bt_smp: smp_c1: p2 cbcb3f9866c5020040ad210000000000
[00:00:50.633,758] <dbg> bt_smp: legacy_pairing_random: pcnf ddb9fc1087fca166ce678d4522b77d1f
[00:00:50.633,789] <dbg> bt_smp: legacy_pairing_random: cfm ddb9fc1087fca166ce678d4522b77d1f
[00:00:50.634,033] <dbg> bt_smp: legacy_pairing_random: generated STK 57348e12e433d2da1d701a941a08d975
[00:00:50.882,751] <dbg> bt_smp: bt_smp_encrypt_change: chan 0x200055e8 conn 0x20005228 handle 0 encrypt 0x01 hci status 0x00
[00:00:50.982,696] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x06 len 16
[00:00:50.982,696] <dbg> bt_smp: smp_encrypt_info:
[00:00:50.983,184] <dbg> bt_smp: bt_smp_recv: Received SMP code 0x07 len 10
[00:00:50.983,184] <dbg> bt_smp: smp_central_ident:
[00:00:50.983,215] <dbg> bt_smp: smp_pairing_complete: got status 0x0