This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

When do encryption keys exchange?

I have a problem with bonding with a static passkey. I have some sensors, which have a static passkey hardcoded in them. If I want to bond with them, I have to provide this passkey from my custom central app, which uses s120 and SDK 8.1.0. For the past few days I wasn't able to make a successfull bond, because I keep getting BLE_GAP_SEC_STATUS_AUTH_REQ from the sensor. I can't find much information on what to do in this case. I can bond with MCP just fine.

I compared log file from MCP and sniffer trace from my central bonding attempt and they are different in one very impotant aspect. MCP exchanges keys and encrypts the connection before trying to authenticate the link. Default behavioral of the device manage in SDK 8.1.0 is not the same. If I call dm_security_setup_req it only forces authentication without previous key exchange. This is why authentication fails. If I go into debug mode, I can see that keys are always 0. Does anyone have any suggestions about this matter? Are there any examples that mimic MCP behavioral?

Edit: added trace logs for windows phone, s120 and MCP log file, all done with the same sensor (which uses TI stack).

Windows phone pairing attempt: windows_pairing_with_adv.pcapng

S120 pairing attempt: s120_central_pairing.pcapng

MCP log file: log.txt

Android bonding attempt: android_bonding.pcapng

Parents
  • I've managed to get android sniffer trace with old version of wireshark and added it to my main question. I can see, that android also uses CSRK keys for bonding, therefore, I'm back at the beginning. I don't think I will be able to do MCP sniffer trace, as I only have one development kit available, and I need it to run both the MCP and sniffer. If you look at the attached MCP log file (line number 165), MCP sends pairing request without CSRK and still succeeds. My pairing request is identical to MCP, but my fails. I still can't figure it out.

Reply
  • I've managed to get android sniffer trace with old version of wireshark and added it to my main question. I can see, that android also uses CSRK keys for bonding, therefore, I'm back at the beginning. I don't think I will be able to do MCP sniffer trace, as I only have one development kit available, and I need it to run both the MCP and sniffer. If you look at the attached MCP log file (line number 165), MCP sends pairing request without CSRK and still succeeds. My pairing request is identical to MCP, but my fails. I still can't figure it out.

Children
No Data
Related