as others have described I run the sniffer
than go through pairing process, the encrypted packets show up as "Encrypted packet decrypted incorrectly (bad MIC)"
is there any solution to that?
(I went through the user guide, verified all version of SW is ok)
this shows up for any two devices I tried..
really appreciate your help..
I have the same issue. Also using V2. But I do not use LE Secure Connections.
Hi.Could you create a new ticket for this issue?This ticket is old and it will be hard for other community members to find it when they are searching.
I tried both legacy pairing and secure connection both look the same.
what I have find out is that short messages are parsed correctly where as long messages (USING DATA LENGTH EXTENSION) shows up as bad mic and have incorrect payload.
Andreas, can you please find out whether the data length extension is supported? (core spec 4.2)
if it is supported, what should I do in order to parse it correctly?
Both data length extension (DLE) and LE Secure Connections (LESC) is part of BLE 5.0, so not the core spec 4.2
Are you using the Adafuirt Bluefruit Sniffer as well? My sniffer was flashed before shipping with the 2.0.0-beta1 version. 2.0.0-beta3 version mentions "Bugfixes for Data Length Extension and 2 Mbps (nRF52 DK and nRF52840 DK only)" Also, version 2.0.0 (no beta) has been released. Maybe we should test them.
Andreas maybe you are refering to another feature because the once I mentioned are in core 4.2.
just small example:
but I was also reading spec 4.2 and it was there.
anyway the wireshare says it only supports ATT core spec 4.0 so that must be the issue
thanks for your help