This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Error when trying to pair/bond to a peripheral in nRF connect v1.0 on Linux

I get an error when trying to pair to a peripheral in nRF connect v1.0 on Linux.

I have two nRF-DK v1.1.0 (pca10040), one is the adapter that is connected to nRF Connect, the other is loaded with ble_app_hrs example (SDK 12).

In nRF Connect, I perform a scan, connect and everything is fine. The link is unencrypted. I then try the "Pair..." button. I tested with "No keyboard, no display", with and without LE secure, with and without "Perform bonding" and I always get this message:

"Failed to reply security parameters. (NRF_ERROR_INTERNAL)"

Here is a dump of the nRF Connect console:

2016-09-19T20:25:42.636Z DEBUG      284 ->  [00 7e 00 00 01 35 07 10 01 01 ]
               type:     VENDOR_SPECIFIC reliable:yes seq#:4 ack#:1 payload_length:a data_integrity:1 header_checksum:86 err_code:0
2016-09-19T20:25:42.640Z DEBUG   271/ 0 <-  []
               type:                 ACK reliable: no seq#:0 ack#:5 payload_length:0 data_integrity:0 err_code:0
2016-09-19T20:25:42.641Z DEBUG   272/ 0 <-  [01 7e 00 00 00 00 ]
               type:     VENDOR_SPECIFIC reliable:yes seq#:1 ack#:5 payload_length:6 data_integrity:1 header_checksum:a9 err_code:0
2016-09-19T20:25:42.641Z DEBUG      285 ->  []
               type:                 ACK reliable: no seq#:0 ack#:2 payload_length:0 data_integrity:0 err_code:0
2016-09-19T20:25:42.642Z DEBUG Authenticate, secParams: Record { "bond": true, "io_caps": 3, "lesc": true, "mitm": false, "oob": false, "keypress": false, "min_key_size": 7, "max_key_size": 16, "kdist_own": [object Object], "kdist_peer": [object Object] }
2016-09-19T20:25:42.668Z DEBUG   273/ 0 <-  [02 13 00 00 00 31 00 10 01 01 ]
               type:     VENDOR_SPECIFIC reliable:yes seq#:2 ack#:5 payload_length:a data_integrity:1 header_checksum:68 err_code:0
2016-09-19T20:25:42.669Z DEBUG      286 ->  []
               type:                 ACK reliable: no seq#:0 ack#:3 payload_length:0 data_integrity:0 err_code:0
2016-09-19T20:25:42.675Z DEBUG GAP_EVT_SEC_PARAMS_REQUEST time:2016-09-19T20:25:42.655Z connHandle:0 peerParams:[bond:true mitm:false lesc:false keypress:false ioCaps:bleGapIoCapsNone oob:false minKeySize:0 maxKeySize:16 kdistOwn:[enc:true sign:false link:false] kdistPeer:[enc:true sign:false link:true]]
2016-09-19T20:25:42.678Z DEBUG      287 ->  [00 7f 00 00 00 00 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 95 69 e6 d2 cb c8 9c 97 b3 8c 18 11 75 87 40 2f 17 ca c8 66 01 53 0a 46 d7 23 41 40 2f 49 af 0f 87 a0 f5 b5 0a 0a 91 53 e2 52 da 06 ed dc ab 96 e4 d8 81 f7 ac 94 df 20 aa 8e ca 12 a7 fa 67 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]
               type:     VENDOR_SPECIFIC reliable:yes seq#:5 ack#:3 payload_length:113 data_integrity:1 header_checksum:d4 err_code:0
2016-09-19T20:25:42.779Z DEBUG      288 ->  [00 7f 00 00 00 00 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 95 69 e6 d2 cb c8 9c 97 b3 8c 18 11 75 87 40 2f 17 ca c8 66 01 53 0a 46 d7 23 41 40 2f 49 af 0f 87 a0 f5 b5 0a 0a 91 53 e2 52 da 06 ed dc ab 96 e4 d8 81 f7 ac 94 df 20 aa 8e ca 12 a7 fa 67 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]
               type:     VENDOR_SPECIFIC reliable:yes seq#:5 ack#:3 payload_length:113 data_integrity:1 header_checksum:d4 err_code:0
2016-09-19T20:25:42.878Z DEBUG      289 ->  [00 7f 00 00 00 00 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 95 69 e6 d2 cb c8 9c 97 b3 8c 18 11 75 87 40 2f 17 ca c8 66 01 53 0a 46 d7 23 41 40 2f 49 af 0f 87 a0 f5 b5 0a 0a 91 53 e2 52 da 06 ed dc ab 96 e4 d8 81 f7 ac 94 df 20 aa 8e ca 12 a7 fa 67 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]
               type:     VENDOR_SPECIFIC reliable:yes seq#:5 ack#:3 payload_length:113 data_integrity:1 header_checksum:d4 err_code:0
2016-09-19T20:25:42.978Z DEBUG      290 ->  [00 7f 00 00 00 00 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 95 69 e6 d2 cb c8 9c 97 b3 8c 18 11 75 87 40 2f 17 ca c8 66 01 53 0a 46 d7 23 41 40 2f 49 af 0f 87 a0 f5 b5 0a 0a 91 53 e2 52 da 06 ed dc ab 96 e4 d8 81 f7 ac 94 df 20 aa 8e ca 12 a7 fa 67 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]
               type:     VENDOR_SPECIFIC reliable:yes seq#:5 ack#:3 payload_length:113 data_integrity:1 header_checksum:d4 err_code:0
2016-09-19T20:25:43.080Z ERROR Failed to reply security parameters. (NRF_ERROR_INTERNAL)
2016-09-19T20:25:43.084Z DEBUG Error: Failed to reply security parameters. (NRF_ERROR_INTERNAL)
    at Adapter.<anonymous> (/var/repo/nrf-connect-linux-x64/resources/app/js/actions/adapterActions.js:151:34)
    at emitOne (events.js:77:13)
    at Adapter.emit (events.js:169:7)
    at Adapter._emitError (/var/repo/nrf-connect-linux-x64/resources/app/node_modules/pc-ble-driver-js/api/adapter.js:176:14)
    at Adapter._checkAndPropagateError (/var/repo/nrf-connect-linux-x64/resources/app/node_modules/pc-ble-driver-js/api/adapter.js:166:18)
    at _adapter.gapReplySecurityParameters (/var/repo/nrf-connect-linux-x64/resources/app/node_modules/pc-ble-driver-js/api/adapter.js:1907:22)
2016-09-19T20:25:43.110Z WARN Error when calling replySecParams: Error: Error occured when replying sec params. Errorcode: NRF_ERROR_INTERNAL (0x3)

2016-09-19T20:25:43.120Z DEBUG ReplySecParams, secParams: null
2016-09-19T20:25:43.120Z ERROR Received status with code 4 Unknown value, message: 'Error sending packet to target. Code #13'

Thanks,

Marc

Related