This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts
This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

How to get past "link secure failed! error: PM_CONN_SEC_ERROR_DISCONNECT

I was working with examples/ble_peripheral/ble_app_gls. In the SDK11alpha configuration, I paired the dev board with my Android phone running nRF Toolbox and was able to start to modify the example and do things with the glucose data.

I've worked my changes into SDK11 - the change from device_manager to peer_manager had me starting over all of my work as the main program changed so much. No matter.

The real issue is that now I went into the Android part with the nRF Control Panel, and undid the pairing (since the softdevice on the nRF51 is different, etc.) and now want to re-pair the two devices.

However, in the RTT printout, I see: 0> BLE_GAP_EVT_SEC_PARAMS_REQUEST 0> À link secure failed! error: PM_CONN_SEC_ERROR_DISCONNECT

and on the Android phone, the display shows "bonding..." for awhile, and simultaneous with the second line appearing on RTT, it shows "not bonded".

How best to work around this?

Parents
  • FormerMember
    0 FormerMember

    It would be very useful to check what is being transferred over the air. Do you have an extra nRF51-DK or a nRF51-Dongle? If so, could you use the sniffer to track what is being transferred over the air? And upload the sniffer trace here?

    The sniffer should be used with Wireshark, and it works best with version 1.10, not one of the newer versions. Wireshark can be downloaded here:

  • FormerMember
    0 FormerMember in reply to FormerMember

    The sniffer can catch the key exchange process. In order to do so, you have to make sure that the sniffer is present when the two devices exchange encryption keys, not just when the devices are re-connecting. You can upload the file in the original question, not in the comments.

    Could you delete the bonding information on both the phone and the nRF51/52 device before using sniffer to capture the bonding process?

Reply
  • FormerMember
    0 FormerMember in reply to FormerMember

    The sniffer can catch the key exchange process. In order to do so, you have to make sure that the sniffer is present when the two devices exchange encryption keys, not just when the devices are re-connecting. You can upload the file in the original question, not in the comments.

    Could you delete the bonding information on both the phone and the nRF51/52 device before using sniffer to capture the bonding process?

Children
No Data
Related