<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Unexpected indicated connection security with connectivity firmware</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/12833/unexpected-indicated-connection-security-with-connectivity-firmware</link><description>Hi 
 I&amp;#39;ve implemented a BLE peripheral based on the SDK11. For bonding i&amp;#39;m using the new peer manager. If the code runs on a nRF51 DK the bonding works properly. After the connection has been established a pin code may be inserted on the smart device</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 10 Aug 2016 11:37:10 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/12833/unexpected-indicated-connection-security-with-connectivity-firmware" /><item><title>RE: Unexpected indicated connection security with connectivity firmware</title><link>https://devzone.nordicsemi.com/thread/48788?ContentTypeID=1</link><pubDate>Wed, 10 Aug 2016 11:37:10 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9d05d942-1d64-46fb-9515-2f5549845d24</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;Thank you for adding the fix Adrian :)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Unexpected indicated connection security with connectivity firmware</title><link>https://devzone.nordicsemi.com/thread/48787?ContentTypeID=1</link><pubDate>Tue, 09 Aug 2016 11:25:54 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f3421d82-d4c3-42ca-a23c-5ab3937d07b1</guid><dc:creator>Adrian Eggenberger</dc:creator><description>&lt;p&gt;I&amp;#39;ve found the bug that causes the same problem on the central side. The problem on the central side is the same as on the peripheral side. The encoding of the structure ble_gap_enc_info_t has
not been adapted to the S130 2.0.0.&lt;/p&gt;
&lt;p&gt;For the peripheral side the provided ble_gap_sec_info_reply.c fixes this issue.&lt;/p&gt;
&lt;p&gt;For the central side another fix is required. You can download the fix for the central side here (&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/ble_5F00_gap_5F00_encrypt.c"&gt;ble_gap_encrypt.c&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;Regards Adrian&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Unexpected indicated connection security with connectivity firmware</title><link>https://devzone.nordicsemi.com/thread/48786?ContentTypeID=1</link><pubDate>Mon, 08 Aug 2016 13:10:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:849ab214-5e8f-4a7d-af77-0ca2032d0c42</guid><dc:creator>Adrian Eggenberger</dc:creator><description>&lt;p&gt;The file fixes the issue on the peripheral side.
Now I have to reopen the issue. The same problem also exists when acting as a central. Also in this role the security after reestablishing a connection is only 1/2 with key length 8. What file causes the same thing on the central side?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Unexpected indicated connection security with connectivity firmware</title><link>https://devzone.nordicsemi.com/thread/48785?ContentTypeID=1</link><pubDate>Tue, 03 May 2016 13:30:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:970ad368-8201-493a-a3c4-dd024bd91bda</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/ble_5F00_gap_5F00_sec_5F00_info_5F00_reply.c"&gt;Here&lt;/a&gt; is a fix for achieving the correct security level when re-encryption the link with bonded peer.&lt;/p&gt;
&lt;p&gt;Replace ble_gap_sec_info_reply.c with it.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Unexpected indicated connection security with connectivity firmware</title><link>https://devzone.nordicsemi.com/thread/48784?ContentTypeID=1</link><pubDate>Thu, 31 Mar 2016 14:47:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:172d47f5-a42f-4504-91e5-9f5a3eec59aa</guid><dc:creator>Adrian Eggenberger</dc:creator><description>&lt;p&gt;The source code is strictly confidential, so I&amp;#39;ve opened a new support case on the MyPage and attached the project and some instructions how to reproduce there. It would be great if you could have a look at it. Don&amp;#39;t hesitate to ask me if something doesn&amp;#39;t work as expected.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Unexpected indicated connection security with connectivity firmware</title><link>https://devzone.nordicsemi.com/thread/48783?ContentTypeID=1</link><pubDate>Wed, 30 Mar 2016 14:54:56 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4309e1b5-ac8c-4999-b960-17f929a41274</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;Ok. Thanks. Both if you have changed the connectivity source code.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Unexpected indicated connection security with connectivity firmware</title><link>https://devzone.nordicsemi.com/thread/48782?ContentTypeID=1</link><pubDate>Wed, 30 Mar 2016 14:19:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4144c9b9-ba96-47ea-a0d1-993d02aa4766</guid><dc:creator>Adrian Eggenberger</dc:creator><description>&lt;p&gt;After the initial bonding the security mode is correct. After a disconnect and reconnect the security mode is invalid.
I&amp;#39;ll check if i can share the project or parts of it to reproduce. What parts of the project do you need? Host, Connectivity or Both?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Unexpected indicated connection security with connectivity firmware</title><link>https://devzone.nordicsemi.com/thread/48781?ContentTypeID=1</link><pubDate>Wed, 30 Mar 2016 14:11:10 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:95c2c56c-2b64-4acb-9aee-72e45ad935b6</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;I see. Do you get the correct security level with the BLE_GAP_EVT_CONN_SEC_UPDATE event when you do the initial bonding? Would it be possible to share your project? If it is confidential or secret you can do it privately through your MyPage at www.nordicsemi.com&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Unexpected indicated connection security with connectivity firmware</title><link>https://devzone.nordicsemi.com/thread/48780?ContentTypeID=1</link><pubDate>Wed, 30 Mar 2016 12:38:28 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:190c268a-cd92-4b40-b36a-18fc2d2776c6</guid><dc:creator>Adrian Eggenberger</dc:creator><description>&lt;p&gt;I actually added some code in the connectvity firmware to verify if the event from the softdevice contains the unexpected values or if it&amp;#39;s a serialisation/deserialisation problem. That was my first guess, but the event coming from the softdevice in the connectivity firmware alredy contains the invalid values.&lt;/p&gt;
&lt;p&gt;If I should test something to help to investigate the issue please ask.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Unexpected indicated connection security with connectivity firmware</title><link>https://devzone.nordicsemi.com/thread/48779?ContentTypeID=1</link><pubDate>Wed, 30 Mar 2016 12:01:59 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d0ecb0b6-7b7f-4f01-ad79-a7bd87bdb7fb</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;I think your assumption is correct. I will investigate. You could also try putting a breakpoint in the nRF51 and check the BLE_GAP_EVT_CONN_SEC_UPDATE event, before it is relayed.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>