This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

secure connect 52832

I urgently need to decide on the use of the chip in future developments and deliveries. There was no problem with the 51822 chip in the connection between 51822 to BlueGiga (using oob), but we want to use a newer chip. I can not establish the same secure connection between 52832 and 52832.Please help the ready-made examples for the nrf52832 chip. To establish a secure connection using oob.

I did not find ready-made examples in SDK14.2.0 (S132)

where the oob data is stored ?

what should the program respond to the event (on periph device)  on PM_EVT_CONN_SEC_PARAMS_REQ

sd_ble_gap_sec_params_reply(current_connection, BLE_GAP_SEC_STATUS_SUCCESS, ???,  ???)

Parents
  • FormerMember
    0 FormerMember

    In the SDK there are a some examples showing how to do OOB pairing using NFC. The examples are located in the  ble_central/experimental and  ble_peripheral/experimental folder, and explained here.

  • This is LOG nRF52832(central)  connect to BlueGiga:  (all working GOOD)

    I'm using and correct project (central/ble_app_hrs_c).

    <info> app: Try connect to MAC:4D24C9800700

    <info> app: Connected to a previously bonded device.

    <info> app: Connected

    <info> app: GATT ATT MTU on connection 0x0 changed to 23.

    <info> app: BLE_GATTC_EVT_EXCHANGE_MTU_RSP

    <info> app: BLE_GAP_EVT_SEC_PARAMS_REQUEST, bond 1 mitm 1  oob 1

    <info> app: BLE_GAP_EVT_AUTH_KEY_REQUEST

    <info> app: Data length for connection 0x0 updated to 27.

    <info> app: BLE_GAP_EVT_DATA_LENGTH_UPDATE

    <info> app: Connection secured: role: 2, conn_handle: 0x0, procedure: 0.

    <info> app: BLE_GAP_EVT_CONN_SEC_UPDATE

    <info> app: Connection secured: role: 2, conn_handle: 0x0, procedure: 1.

    <info> app: BLE_GAP_EVT_AUTH_STATUS 0

    This is LOG nRF52832 connect to nRF52832 (for second device I'm using and correct project  periph/ ble_app_hrs)

    <info> app: Try connect to MAC:6B12F8E4DEDC

    <info> app: Connected

    <info> app: BLE_GATTS_EVT_EXCHANGE_MTU_REQUEST

    <info> app: GATT ATT MTU on connection 0x0 changed to 247.

    <info> app: BLE_GATTC_EVT_EXCHANGE_MTU_RSP

    <info> app: Data length for connection 0x0 updated to 251.

    <info> app: BLE_GAP_EVT_DATA_LENGTH_UPDATE

    <info> app: BLE_GAP_EVT_CONN_PARAM_UPDATE_REQUEST

    <info> app: BLE_GAP_EVT_CONN_PARAM_UPDATE

    At which stage a secure connection is established. Which command (EVT) is used for this code.

  • FormerMember
    0 FormerMember in reply to AndSin

    In the nRF-nRF connction, there is no security setup in the  connection. From the above log, I suspect that the peripheral (BlueGiga) initiates pairing by sending a "security request", where the nRF52832 ble_app_hrs peripheral doesn't.  

    In the case with BlueGiga, does the central receive the event BLE_GAP_EVT_SEC_REQUEST?

Reply
  • FormerMember
    0 FormerMember in reply to AndSin

    In the nRF-nRF connction, there is no security setup in the  connection. From the above log, I suspect that the peripheral (BlueGiga) initiates pairing by sending a "security request", where the nRF52832 ble_app_hrs peripheral doesn't.  

    In the case with BlueGiga, does the central receive the event BLE_GAP_EVT_SEC_REQUEST?

Children
Related