Created
July 29, 2020 14:43
-
-
Save rampadc/e20eedeb66db39a24a00e78d7e59d8ba to your computer and use it in GitHub Desktop.
esp32_mouse_keyboard: successfully bonded on Catalina 10.15.6
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
I (2456) EXT_UART: external UART processing task started | |
I (2466) HID_LE_PRF: GATT EVT 12 | |
D (13446) BT_SMP: SMDBG l2c smp_connect_callback | |
I (13446) HID_LE_PRF: HID connection establish, conn_id = 0 | |
I (13446) HID_DEMO: ESP_HIDD_EVENT_BLE_CONNECT | |
I (13446) HID_LE_PRF: GATT EVT 4 | |
D (13456) BT_SMP: SMP_Pair state=0 br_state=0 flag=0x0 | |
D (13456) BT_SMP: SMDBG l2c smp_connect_callback | |
D (13466) BT_SMP: smp_connect_callback() for pairing BDA: 8c85908a6d15 Event: connected | |
D (13476) BT_SMP: main smp_sm_event | |
D (13476) BT_SMP: SMP Role: Slave State: [SMP_STATE_IDLE (0)], Event: [L2CAP_CONN_EVT (18)] | |
D (13486) BT_SMP: State change: SMP_STATE_IDLE(0) ==> SMP_STATE_WAIT_APP_RSP(1) | |
D (13486) BT_SMP: smp_send_app_cback p_cb->cb_evt=1 | |
D (13496) BT_SMP: io_cap = 4 | |
D (13496) BT_SMP: callback_rc=0 p_cb->cb_evt=1 | |
D (13506) BT_SMP: rcvd auth_req: 0x0d, io_cap: 2 loc_oob_flag: 0 loc_enc_size: 16,local_i_key: 0x03, local_r_key: 0x03 | |
D (13516) BT_SMP: lmp_version_below LMP version 8 < 8 | |
D (13526) BT_SMP: set auth_req: 0x0d, local_i_key: 0x03, local_r_key: 0x03 | |
D (13526) BT_SMP: main smp_sm_event | |
D (13536) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_APP_RSP (1)], Event: [API_IO_RSP_EVT (20)] | |
D (13546) BT_SMP: State change: SMP_STATE_WAIT_APP_RSP(1) ==> SMP_STATE_PAIR_REQ_RSP(3) | |
D (13546) BT_SMP: smp_process_io_response | |
D (13556) BT_SMP: State change: SMP_STATE_PAIR_REQ_RSP(3) ==> SMP_STATE_SEC_REQ_PENDING(2) | |
D (13566) BT_SMP: smp_send_cmd on l2cap cmd_code=0xb | |
D (13566) BT_SMP: smp_build_security_request | |
D (13576) BT_SMP: opcode=11 auth_req=0xd | |
D (13576) BT_SMP: smp_send_msg_to_L2CAP | |
D (13586) BT_SMP: result state = SMP_STATE_SEC_REQ_PENDING | |
D (13586) BT_SMP: smp_send_app_cback return | |
D (13586) BT_SMP: result state = SMP_STATE_SEC_REQ_PENDING | |
D (13606) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (13606) BT_SMP: main smp_sm_event | |
D (13606) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_REQ_PENDING (2)], Event: [PAIRING_REQ_EVT (1)] | |
D (13616) BT_SMP: State change: SMP_STATE_SEC_REQ_PENDING(2) ==> SMP_STATE_PAIR_REQ_RSP(3) | |
D (13626) BT_SMP: smp_proc_pair_cmd | |
D (13626) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x01 | |
D (13636) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x01 | |
D (13636) BT_SMP: smp_pairing_request_response_parameters_are_valid for cmd code 0x01 | |
D (13646) BT_SMP: smp_select_association_model | |
D (13656) BT_SMP: smp_select_association_model p_cb->peer_io_caps = 4 p_cb->local_io_capability = 2 | |
D (13666) BT_SMP: smp_select_association_model p_cb->peer_oob_flag = 0 p_cb->loc_oob_flag = 0 | |
D (13666) BT_SMP: smp_select_association_model p_cb->peer_auth_req = 0x0d p_cb->loc_auth_req = 0x0d | |
D (13676) BT_SMP: smp_select_association_model p_cb->secure_connections_only_mode_required = FALSE | |
D (13686) BT_SMP: use_sc_process = 1 | |
D (13696) BT_SMP: smp_select_association_model_secure_connections | |
D (13696) BT_SMP: smp_get_auth_mode model 6 | |
D (13706) BT_SMP: smp_send_pair_rsp | |
D (13706) BT_SMP: smp_send_cmd on l2cap cmd_code=0x2 | |
D (13716) BT_SMP: smp_build_pairing_cmd | |
D (13716) BT_SMP: smp_send_msg_to_L2CAP | |
D (13726) BT_SMP: smp_decide_association_model Association Model = 6 | |
D (13726) BT_SMP: sec_level=0 | |
D (13726) BT_SMP: main smp_sm_event | |
D (13736) BT_SMP: SMP Role: Slave State: [SMP_STATE_PAIR_REQ_RSP (3)], Event: [PUBLIC_KEY_EXCHANGE_REQ_EVT (27)] | |
D (13746) BT_SMP: State change: SMP_STATE_PAIR_REQ_RSP(3) ==> SMP_STATE_PUBLIC_KEY_EXCH(7) | |
D (13756) BT_SMP: smp_create_private_key | |
D (13756) BT_SMP: result state = SMP_STATE_PUBLIC_KEY_EXCH | |
D (13766) BT_SMP: result state = SMP_STATE_PUBLIC_KEY_EXCH | |
D (13766) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (13776) BT_SMP: main smp_sm_event | |
D (13776) BT_SMP: SMP Role: Slave State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [PAIR_PUBLIC_KEY_EVT (12)] | |
D (13786) BT_SMP: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_PUBLIC_KEY_EXCH(7) | |
D (13796) BT_SMP: smp_process_pairing_public_key | |
D (13796) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0c | |
D (13806) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0c | |
D (13816) BT_SMP: smp_wait_for_both_public_keys | |
D (13816) BT_SMP: result state = SMP_STATE_PUBLIC_KEY_EXCH | |
D (13826) BT_SMP: smp_rand_back state=0x9 | |
D (13826) BT_SMP: smp_continue_private_key_creation state=0x9 | |
D (13836) BT_SMP: smp_rand_back state=0xa | |
D (13836) BT_SMP: smp_continue_private_key_creation state=0xa | |
D (13846) BT_SMP: smp_rand_back state=0xb | |
D (13846) BT_SMP: smp_continue_private_key_creation state=0xb | |
D (13856) BT_SMP: smp_rand_back state=0xc | |
D (13856) BT_SMP: smp_continue_private_key_creation state=0xc | |
D (13866) BT_SMP: smp_process_private_key | |
D (13956) BT_SMP: main smp_sm_event | |
D (13956) BT_SMP: SMP Role: Slave State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [LOCAL_PUBLIC_KEY_CRTD_EVT (28)] | |
D (13966) BT_SMP: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_PUBLIC_KEY_EXCH(7) | |
D (13966) BT_SMP: smp_wait_for_both_public_keys | |
D (13976) BT_SMP: main smp_sm_event | |
D (13976) BT_SMP: SMP Role: Slave State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [BOTH_PUBLIC_KEYS_RCVD_EVT (29)] | |
D (13986) BT_SMP: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (13996) BT_SMP: smp_both_have_public_keys | |
D (14006) BT_SMP: smp_compute_dhkey | |
D (14096) BT_SMP: smp_send_pair_public_key | |
D (14096) BT_SMP: smp_send_cmd on l2cap cmd_code=0xc | |
D (14096) BT_SMP: smp_build_pair_public_key_cmd | |
D (14096) BT_SMP: smp_send_msg_to_L2CAP | |
D (14106) BT_SMP: main smp_sm_event | |
D (14106) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [SEC_CONN_DHKEY_COMPLETE_EVT (30)] | |
D (14116) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (14126) BT_SMP: smp_start_secure_connection_phase1 | |
D (14136) BT_SMP: p_cb->sec_level =4 (SMP_SEC_AUTHENTICATED) | |
D (14136) BT_SMP: main smp_sm_event | |
D (14146) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [TK_REQ_EVT (22)] | |
D (14156) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_APP_RSP(1) | |
D (14166) BT_SMP: smp_send_app_cback p_cb->cb_evt=4 | |
D (14166) BT_SMP: callback_rc=0 p_cb->cb_evt=4 | |
D (14176) BT_SMP: smp_send_app_cback return | |
D (14176) BT_SMP: result state = SMP_STATE_WAIT_APP_RSP | |
D (14186) BT_SMP: result state = SMP_STATE_WAIT_APP_RSP | |
D (14186) BT_SMP: result state = SMP_STATE_WAIT_APP_RSP | |
D (14196) BT_SMP: result state = SMP_STATE_WAIT_APP_RSP | |
I (14206) HID_DEMO: Requesting security key... | |
I (14206) HID_DEMO: Requester's BD_ADDR: 8c85908a6d15 | |
E (14536) BT_GATT: GATT_INSUF_AUTHENTICATION: MITM Required | |
I (30076) EXT_UART: sending command to parser: PK 745453 | |
I (30076) EXT_UART: Received passkey input | |
I (30076) EXT_UART: [2] Requester's BD_ADDR: 8c85908a6d15 | |
I (30086) EXT_UART: Sending: 745453 | |
D (30086) BT_SMP: SMP_PasskeyReply: Key: 745453 Result:0 | |
D (30096) BT_SMP: main smp_sm_event | |
D (30096) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_APP_RSP (1)], Event: [SEC_CONN_KEY_READY_EVT (37)] | |
D (30106) BT_SMP: State change: SMP_STATE_WAIT_APP_RSP(1) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (30116) BT_SMP: smp_start_passkey_verification | |
D (30116) BT_SMP: smp_start_nonce_generation | |
D (30126) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (30126) BT_SMP: smp_rand_back state=0xd | |
D (30136) BT_SMP: smp_finish_nonce_generation | |
D (30146) BT_SMP: smp_rand_back state=0xe | |
D (30146) BT_SMP: smp_process_new_nonce round 0 | |
D (30146) BT_SMP: main smp_sm_event | |
D (30146) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (30166) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (30166) BT_SMP: smp_process_local_nonce | |
D (30176) BT_SMP: smp_calculate_local_commitment | |
D (30176) BT_SMP: random: 0xed, round: 0, i: 0, j: 0 | |
D (30186) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (30186) BT_SMP: smp_calculate_f4 | |
D (30196) BT_SMP: aes_cipher_msg_auth_code | |
D (30196) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (30206) BT_SMP: cmac_generate_subkey | |
D (30206) BT_SMP: smp_encrypt_data | |
D (30216) BT_SMP: cmac_subkey_cont | |
D (30216) BT_SMP: leftshift_onebit | |
D (30216) BT_SMP: leftshift_onebit | |
D (30226) BT_SMP: cmac_prepare_last_block | |
D (30226) BT_SMP: flag = 0 round = 5 | |
D (30226) BT_SMP: smp_xor_128 | |
D (30236) BT_SMP: cmac_aes_k_calculate | |
D (30236) BT_SMP: smp_xor_128 | |
D (30236) BT_SMP: smp_encrypt_data | |
D (30246) BT_SMP: smp_xor_128 | |
D (30246) BT_SMP: smp_encrypt_data | |
D (30246) BT_SMP: smp_xor_128 | |
D (30256) BT_SMP: smp_encrypt_data | |
D (30256) BT_SMP: smp_xor_128 | |
D (30256) BT_SMP: smp_encrypt_data | |
D (30266) BT_SMP: smp_xor_128 | |
D (30266) BT_SMP: smp_encrypt_data | |
D (30276) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (30276) BT_SMP: p_mac[0] = 0x9b p_mac[1] = 0xbc p_mac[2] = 0x60 p_mac[3] = 0x53 | |
D (30286) BT_SMP: p_mac[4] = 0xc2 p_mac[5] = 0xf5 p_mac[6] = 0xc2 p_mac[7] = 0x50 | |
D (30286) BT_SMP: local commitment calculation is completed | |
D (30296) BT_SMP: result state = SMP_STATE_WAIT_COMMITMENT | |
D (37216) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (37216) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (37216) BT_SMP: main smp_sm_event | |
D (37216) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_COMMITMENT (9)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (37226) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (37236) BT_SMP: smp_process_pairing_commitment | |
D (37246) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (37246) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (37256) BT_SMP: smp_send_commitment | |
D (37256) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (37266) BT_SMP: smp_build_pairing_commitment_cmd | |
D (37266) BT_SMP: smp_send_msg_to_L2CAP | |
D (37276) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (37306) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (37306) BT_SMP: main smp_sm_event | |
D (37306) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (37306) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (37316) BT_SMP: smp_proc_rand | |
D (37326) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (37326) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (37336) BT_SMP: smp_process_peer_nonce start | |
D (37346) BT_SMP: smp_check_commitment | |
D (37346) BT_SMP: smp_calculate_peer_commitment | |
D (37346) BT_SMP: random: 0xed, round: 0, i: 0, j: 0 | |
D (37356) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (37356) BT_SMP: smp_calculate_f4 | |
D (37366) BT_SMP: aes_cipher_msg_auth_code | |
D (37366) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (37376) BT_SMP: cmac_generate_subkey | |
D (37376) BT_SMP: smp_encrypt_data | |
D (37386) BT_SMP: cmac_subkey_cont | |
D (37386) BT_SMP: leftshift_onebit | |
D (37386) BT_SMP: smp_xor_128 | |
D (37396) BT_SMP: leftshift_onebit | |
D (37396) BT_SMP: smp_xor_128 | |
D (37396) BT_SMP: cmac_prepare_last_block | |
D (37406) BT_SMP: flag = 0 round = 5 | |
D (37406) BT_SMP: smp_xor_128 | |
D (37406) BT_SMP: cmac_aes_k_calculate | |
D (37416) BT_SMP: smp_xor_128 | |
D (37416) BT_SMP: smp_encrypt_data | |
D (37416) BT_SMP: smp_xor_128 | |
D (37426) BT_SMP: smp_encrypt_data | |
D (37426) BT_SMP: smp_xor_128 | |
D (37426) BT_SMP: smp_encrypt_data | |
D (37436) BT_SMP: smp_xor_128 | |
D (37436) BT_SMP: smp_encrypt_data | |
D (37446) BT_SMP: smp_xor_128 | |
D (37446) BT_SMP: smp_encrypt_data | |
D (37446) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (37456) BT_SMP: p_mac[0] = 0xbf p_mac[1] = 0x68 p_mac[2] = 0x17 p_mac[3] = 0x28 | |
D (37456) BT_SMP: p_mac[4] = 0x84 p_mac[5] = 0x18 p_mac[6] = 0x12 p_mac[7] = 0x28 | |
D (37466) BT_SMP: peer commitment calculation is completed | |
D (37476) BT_SMP: Commitment check succeeds | |
D (37476) BT_SMP: smp_send_rand | |
D (37476) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (37486) BT_SMP: smp_build_rand_cmd | |
D (37486) BT_SMP: smp_send_msg_to_L2CAP | |
D (37496) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (37506) BT_SMP: smp_start_nonce_generation | |
D (37506) BT_SMP: smp_process_peer_nonce end | |
D (37516) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (37516) BT_SMP: smp_rand_back state=0xd | |
D (37526) BT_SMP: smp_finish_nonce_generation | |
D (37526) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (37536) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (37536) BT_SMP: main smp_sm_event | |
D (37546) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (37556) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (37566) BT_SMP: smp_process_pairing_commitment | |
D (37566) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (37576) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (37586) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (37586) BT_SMP: smp_rand_back state=0xe | |
D (37596) BT_SMP: smp_process_new_nonce round 1 | |
D (37596) BT_SMP: main smp_sm_event | |
D (37596) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (37606) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (37616) BT_SMP: smp_process_local_nonce | |
D (37626) BT_SMP: smp_calculate_local_commitment | |
D (37626) BT_SMP: random: 0xed, round: 1, i: 0, j: 1 | |
D (37636) BT_SMP: smp_calculate_random_input ri=0x80 | |
D (37636) BT_SMP: smp_calculate_f4 | |
D (37646) BT_SMP: aes_cipher_msg_auth_code | |
D (37646) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (37656) BT_SMP: cmac_generate_subkey | |
D (37656) BT_SMP: smp_encrypt_data | |
D (37656) BT_SMP: cmac_subkey_cont | |
D (37666) BT_SMP: leftshift_onebit | |
D (37666) BT_SMP: smp_xor_128 | |
D (37666) BT_SMP: leftshift_onebit | |
D (37676) BT_SMP: smp_xor_128 | |
D (37676) BT_SMP: cmac_prepare_last_block | |
D (37686) BT_SMP: flag = 0 round = 5 | |
D (37686) BT_SMP: smp_xor_128 | |
D (37686) BT_SMP: cmac_aes_k_calculate | |
D (37696) BT_SMP: smp_xor_128 | |
D (37696) BT_SMP: smp_encrypt_data | |
D (37696) BT_SMP: smp_xor_128 | |
D (37706) BT_SMP: smp_encrypt_data | |
D (37706) BT_SMP: smp_xor_128 | |
D (37706) BT_SMP: smp_encrypt_data | |
D (37716) BT_SMP: smp_xor_128 | |
D (37716) BT_SMP: smp_encrypt_data | |
D (37716) BT_SMP: smp_xor_128 | |
D (37726) BT_SMP: smp_encrypt_data | |
D (37726) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (37726) BT_SMP: p_mac[0] = 0x21 p_mac[1] = 0x2e p_mac[2] = 0x80 p_mac[3] = 0x0e | |
D (37736) BT_SMP: p_mac[4] = 0xb5 p_mac[5] = 0x8e p_mac[6] = 0xff p_mac[7] = 0x36 | |
D (37746) BT_SMP: local commitment calculation is completed | |
D (37756) BT_SMP: smp_send_commitment | |
D (37756) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (37756) BT_SMP: smp_build_pairing_commitment_cmd | |
D (37766) BT_SMP: smp_send_msg_to_L2CAP | |
D (37766) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (37776) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (37796) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (37806) BT_SMP: main smp_sm_event | |
D (37806) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (37806) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (37816) BT_SMP: smp_proc_rand | |
D (37816) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (37826) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (37836) BT_SMP: smp_process_peer_nonce start | |
D (37836) BT_SMP: smp_check_commitment | |
D (37846) BT_SMP: smp_calculate_peer_commitment | |
D (37846) BT_SMP: random: 0xed, round: 1, i: 0, j: 1 | |
D (37856) BT_SMP: smp_calculate_random_input ri=0x80 | |
D (37856) BT_SMP: smp_calculate_f4 | |
D (37866) BT_SMP: aes_cipher_msg_auth_code | |
D (37866) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (37876) BT_SMP: cmac_generate_subkey | |
D (37876) BT_SMP: smp_encrypt_data | |
D (37876) BT_SMP: cmac_subkey_cont | |
D (37886) BT_SMP: leftshift_onebit | |
D (37886) BT_SMP: smp_xor_128 | |
D (37886) BT_SMP: leftshift_onebit | |
D (37896) BT_SMP: smp_xor_128 | |
D (37896) BT_SMP: cmac_prepare_last_block | |
D (37896) BT_SMP: flag = 0 round = 5 | |
D (37906) BT_SMP: smp_xor_128 | |
D (37906) BT_SMP: cmac_aes_k_calculate | |
D (37906) BT_SMP: smp_xor_128 | |
D (37916) BT_SMP: smp_encrypt_data | |
D (37916) BT_SMP: smp_xor_128 | |
D (37926) BT_SMP: smp_encrypt_data | |
D (37926) BT_SMP: smp_xor_128 | |
D (37926) BT_SMP: smp_encrypt_data | |
D (37936) BT_SMP: smp_xor_128 | |
D (37936) BT_SMP: smp_encrypt_data | |
D (37936) BT_SMP: smp_xor_128 | |
D (37946) BT_SMP: smp_encrypt_data | |
D (37946) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (37946) BT_SMP: p_mac[0] = 0x87 p_mac[1] = 0x2d p_mac[2] = 0x51 p_mac[3] = 0xb6 | |
D (37956) BT_SMP: p_mac[4] = 0x10 p_mac[5] = 0xcf p_mac[6] = 0x64 p_mac[7] = 0x8c | |
D (37966) BT_SMP: peer commitment calculation is completed | |
D (37966) BT_SMP: Commitment check succeeds | |
D (37976) BT_SMP: smp_send_rand | |
D (37976) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (37986) BT_SMP: smp_build_rand_cmd | |
D (37986) BT_SMP: smp_send_msg_to_L2CAP | |
D (37996) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (37996) BT_SMP: smp_start_nonce_generation | |
D (38006) BT_SMP: smp_process_peer_nonce end | |
D (38006) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (38016) BT_SMP: smp_rand_back state=0xd | |
D (38016) BT_SMP: smp_finish_nonce_generation | |
D (38026) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (38026) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (38036) BT_SMP: main smp_sm_event | |
D (38046) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (38056) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (38056) BT_SMP: smp_process_pairing_commitment | |
D (38066) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (38076) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (38076) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (38086) BT_SMP: smp_rand_back state=0xe | |
D (38086) BT_SMP: smp_process_new_nonce round 2 | |
D (38096) BT_SMP: main smp_sm_event | |
D (38096) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (38106) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (38116) BT_SMP: smp_process_local_nonce | |
D (38116) BT_SMP: smp_calculate_local_commitment | |
D (38126) BT_SMP: random: 0xed, round: 2, i: 0, j: 2 | |
D (38136) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (38136) BT_SMP: smp_calculate_f4 | |
D (38136) BT_SMP: aes_cipher_msg_auth_code | |
D (38146) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (38146) BT_SMP: cmac_generate_subkey | |
D (38156) BT_SMP: smp_encrypt_data | |
D (38156) BT_SMP: cmac_subkey_cont | |
D (38166) BT_SMP: leftshift_onebit | |
D (38166) BT_SMP: smp_xor_128 | |
D (38166) BT_SMP: leftshift_onebit | |
D (38176) BT_SMP: smp_xor_128 | |
D (38176) BT_SMP: cmac_prepare_last_block | |
D (38176) BT_SMP: flag = 0 round = 5 | |
D (38186) BT_SMP: smp_xor_128 | |
D (38186) BT_SMP: cmac_aes_k_calculate | |
D (38186) BT_SMP: smp_xor_128 | |
D (38196) BT_SMP: smp_encrypt_data | |
D (38196) BT_SMP: smp_xor_128 | |
D (38196) BT_SMP: smp_encrypt_data | |
D (38206) BT_SMP: smp_xor_128 | |
D (38206) BT_SMP: smp_encrypt_data | |
D (38206) BT_SMP: smp_xor_128 | |
D (38216) BT_SMP: smp_encrypt_data | |
D (38216) BT_SMP: smp_xor_128 | |
D (38216) BT_SMP: smp_encrypt_data | |
D (38226) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (38226) BT_SMP: p_mac[0] = 0x73 p_mac[1] = 0xf6 p_mac[2] = 0x00 p_mac[3] = 0x40 | |
D (38236) BT_SMP: p_mac[4] = 0x6b p_mac[5] = 0x23 p_mac[6] = 0x06 p_mac[7] = 0xe6 | |
D (38246) BT_SMP: local commitment calculation is completed | |
D (38246) BT_SMP: smp_send_commitment | |
D (38256) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (38256) BT_SMP: smp_build_pairing_commitment_cmd | |
D (38266) BT_SMP: smp_send_msg_to_L2CAP | |
D (38266) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (38276) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (38296) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (38296) BT_SMP: main smp_sm_event | |
D (38296) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (38306) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (38316) BT_SMP: smp_proc_rand | |
D (38316) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (38326) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (38326) BT_SMP: smp_process_peer_nonce start | |
D (38336) BT_SMP: smp_check_commitment | |
D (38336) BT_SMP: smp_calculate_peer_commitment | |
D (38346) BT_SMP: random: 0xed, round: 2, i: 0, j: 2 | |
D (38346) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (38356) BT_SMP: smp_calculate_f4 | |
D (38356) BT_SMP: aes_cipher_msg_auth_code | |
D (38356) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (38366) BT_SMP: cmac_generate_subkey | |
D (38366) BT_SMP: smp_encrypt_data | |
D (38376) BT_SMP: cmac_subkey_cont | |
D (38376) BT_SMP: leftshift_onebit | |
D (38386) BT_SMP: leftshift_onebit | |
D (38386) BT_SMP: cmac_prepare_last_block | |
D (38386) BT_SMP: flag = 0 round = 5 | |
D (38396) BT_SMP: smp_xor_128 | |
D (38396) BT_SMP: cmac_aes_k_calculate | |
D (38396) BT_SMP: smp_xor_128 | |
D (38406) BT_SMP: smp_encrypt_data | |
D (38406) BT_SMP: smp_xor_128 | |
D (38406) BT_SMP: smp_encrypt_data | |
D (38416) BT_SMP: smp_xor_128 | |
D (38416) BT_SMP: smp_encrypt_data | |
D (38416) BT_SMP: smp_xor_128 | |
D (38426) BT_SMP: smp_encrypt_data | |
D (38426) BT_SMP: smp_xor_128 | |
D (38426) BT_SMP: smp_encrypt_data | |
D (38436) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (38436) BT_SMP: p_mac[0] = 0x76 p_mac[1] = 0xff p_mac[2] = 0xe2 p_mac[3] = 0x6a | |
D (38446) BT_SMP: p_mac[4] = 0xa4 p_mac[5] = 0x21 p_mac[6] = 0xe0 p_mac[7] = 0xfe | |
D (38456) BT_SMP: peer commitment calculation is completed | |
D (38456) BT_SMP: Commitment check succeeds | |
D (38466) BT_SMP: smp_send_rand | |
D (38466) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (38476) BT_SMP: smp_build_rand_cmd | |
D (38476) BT_SMP: smp_send_msg_to_L2CAP | |
D (38486) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (38486) BT_SMP: smp_start_nonce_generation | |
D (38496) BT_SMP: smp_process_peer_nonce end | |
D (38496) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (38506) BT_SMP: smp_rand_back state=0xd | |
D (38506) BT_SMP: smp_finish_nonce_generation | |
D (38516) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (38516) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (38526) BT_SMP: main smp_sm_event | |
D (38526) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (38536) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (38546) BT_SMP: smp_process_pairing_commitment | |
D (38556) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (38556) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (38566) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (38576) BT_SMP: smp_rand_back state=0xe | |
D (38576) BT_SMP: smp_process_new_nonce round 3 | |
D (38586) BT_SMP: main smp_sm_event | |
D (38586) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (38596) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (38606) BT_SMP: smp_process_local_nonce | |
D (38606) BT_SMP: smp_calculate_local_commitment | |
D (38616) BT_SMP: random: 0xed, round: 3, i: 0, j: 3 | |
D (38616) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (38626) BT_SMP: smp_calculate_f4 | |
D (38626) BT_SMP: aes_cipher_msg_auth_code | |
D (38636) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (38636) BT_SMP: cmac_generate_subkey | |
D (38646) BT_SMP: smp_encrypt_data | |
D (38646) BT_SMP: cmac_subkey_cont | |
D (38646) BT_SMP: leftshift_onebit | |
D (38656) BT_SMP: leftshift_onebit | |
D (38656) BT_SMP: smp_xor_128 | |
D (38656) BT_SMP: cmac_prepare_last_block | |
D (38666) BT_SMP: flag = 0 round = 5 | |
D (38666) BT_SMP: smp_xor_128 | |
D (38676) BT_SMP: cmac_aes_k_calculate | |
D (38676) BT_SMP: smp_xor_128 | |
D (38676) BT_SMP: smp_encrypt_data | |
D (38686) BT_SMP: smp_xor_128 | |
D (38686) BT_SMP: smp_encrypt_data | |
D (38686) BT_SMP: smp_xor_128 | |
D (38696) BT_SMP: smp_encrypt_data | |
D (38696) BT_SMP: smp_xor_128 | |
D (38696) BT_SMP: smp_encrypt_data | |
D (38706) BT_SMP: smp_xor_128 | |
D (38706) BT_SMP: smp_encrypt_data | |
D (38706) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (38716) BT_SMP: p_mac[0] = 0xe1 p_mac[1] = 0x25 p_mac[2] = 0x07 p_mac[3] = 0xd4 | |
D (38726) BT_SMP: p_mac[4] = 0x64 p_mac[5] = 0xe4 p_mac[6] = 0xb7 p_mac[7] = 0x44 | |
D (38726) BT_SMP: local commitment calculation is completed | |
D (38736) BT_SMP: smp_send_commitment | |
D (38736) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (38746) BT_SMP: smp_build_pairing_commitment_cmd | |
D (38746) BT_SMP: smp_send_msg_to_L2CAP | |
D (38756) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (38756) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (38776) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (38776) BT_SMP: main smp_sm_event | |
D (38776) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (38786) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (38796) BT_SMP: smp_proc_rand | |
D (38796) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (38806) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (38806) BT_SMP: smp_process_peer_nonce start | |
D (38816) BT_SMP: smp_check_commitment | |
D (38816) BT_SMP: smp_calculate_peer_commitment | |
D (38826) BT_SMP: random: 0xed, round: 3, i: 0, j: 3 | |
D (38826) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (38836) BT_SMP: smp_calculate_f4 | |
D (38836) BT_SMP: aes_cipher_msg_auth_code | |
D (38846) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (38846) BT_SMP: cmac_generate_subkey | |
D (38856) BT_SMP: smp_encrypt_data | |
D (38856) BT_SMP: cmac_subkey_cont | |
D (38856) BT_SMP: leftshift_onebit | |
D (38866) BT_SMP: leftshift_onebit | |
D (38866) BT_SMP: cmac_prepare_last_block | |
D (38866) BT_SMP: flag = 0 round = 5 | |
D (38876) BT_SMP: smp_xor_128 | |
D (38876) BT_SMP: cmac_aes_k_calculate | |
D (38886) BT_SMP: smp_xor_128 | |
D (38886) BT_SMP: smp_encrypt_data | |
D (38886) BT_SMP: smp_xor_128 | |
D (38896) BT_SMP: smp_encrypt_data | |
D (38896) BT_SMP: smp_xor_128 | |
D (38896) BT_SMP: smp_encrypt_data | |
D (38906) BT_SMP: smp_xor_128 | |
D (38906) BT_SMP: smp_encrypt_data | |
D (38906) BT_SMP: smp_xor_128 | |
D (38916) BT_SMP: smp_encrypt_data | |
D (38916) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (38916) BT_SMP: p_mac[0] = 0x7d p_mac[1] = 0x22 p_mac[2] = 0xb3 p_mac[3] = 0x6e | |
D (38926) BT_SMP: p_mac[4] = 0xd8 p_mac[5] = 0xae p_mac[6] = 0x92 p_mac[7] = 0xd8 | |
D (38936) BT_SMP: peer commitment calculation is completed | |
D (38936) BT_SMP: Commitment check succeeds | |
D (38946) BT_SMP: smp_send_rand | |
D (38946) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (38956) BT_SMP: smp_build_rand_cmd | |
D (38956) BT_SMP: smp_send_msg_to_L2CAP | |
D (38966) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (38976) BT_SMP: smp_start_nonce_generation | |
D (38976) BT_SMP: smp_process_peer_nonce end | |
D (38976) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (38986) BT_SMP: smp_rand_back state=0xd | |
D (38986) BT_SMP: smp_finish_nonce_generation | |
D (38996) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (38996) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (39006) BT_SMP: main smp_sm_event | |
D (39016) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (39026) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (39036) BT_SMP: smp_process_pairing_commitment | |
D (39036) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (39046) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (39046) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (39056) BT_SMP: smp_rand_back state=0xe | |
D (39056) BT_SMP: smp_process_new_nonce round 4 | |
D (39066) BT_SMP: main smp_sm_event | |
D (39066) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (39076) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (39086) BT_SMP: smp_process_local_nonce | |
D (39096) BT_SMP: smp_calculate_local_commitment | |
D (39096) BT_SMP: random: 0xed, round: 4, i: 0, j: 4 | |
D (39106) BT_SMP: smp_calculate_random_input ri=0x80 | |
D (39106) BT_SMP: smp_calculate_f4 | |
D (39106) BT_SMP: aes_cipher_msg_auth_code | |
D (39116) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (39116) BT_SMP: cmac_generate_subkey | |
D (39126) BT_SMP: smp_encrypt_data | |
D (39126) BT_SMP: cmac_subkey_cont | |
D (39136) BT_SMP: leftshift_onebit | |
D (39136) BT_SMP: leftshift_onebit | |
D (39136) BT_SMP: cmac_prepare_last_block | |
D (39146) BT_SMP: flag = 0 round = 5 | |
D (39146) BT_SMP: smp_xor_128 | |
D (39146) BT_SMP: cmac_aes_k_calculate | |
D (39156) BT_SMP: smp_xor_128 | |
D (39156) BT_SMP: smp_encrypt_data | |
D (39156) BT_SMP: smp_xor_128 | |
D (39166) BT_SMP: smp_encrypt_data | |
D (39166) BT_SMP: smp_xor_128 | |
D (39166) BT_SMP: smp_encrypt_data | |
D (39176) BT_SMP: smp_xor_128 | |
D (39176) BT_SMP: smp_encrypt_data | |
D (39186) BT_SMP: smp_xor_128 | |
D (39186) BT_SMP: smp_encrypt_data | |
D (39186) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (39196) BT_SMP: p_mac[0] = 0xf0 p_mac[1] = 0x13 p_mac[2] = 0x7b p_mac[3] = 0x79 | |
D (39196) BT_SMP: p_mac[4] = 0x9b p_mac[5] = 0x03 p_mac[6] = 0xb5 p_mac[7] = 0x8a | |
D (39206) BT_SMP: local commitment calculation is completed | |
D (39216) BT_SMP: smp_send_commitment | |
D (39216) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (39226) BT_SMP: smp_build_pairing_commitment_cmd | |
D (39226) BT_SMP: smp_send_msg_to_L2CAP | |
D (39236) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (39236) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (39256) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (39256) BT_SMP: main smp_sm_event | |
D (39256) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (39266) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (39266) BT_SMP: smp_proc_rand | |
D (39276) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (39276) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (39286) BT_SMP: smp_process_peer_nonce start | |
D (39296) BT_SMP: smp_check_commitment | |
D (39296) BT_SMP: smp_calculate_peer_commitment | |
D (39296) BT_SMP: random: 0xed, round: 4, i: 0, j: 4 | |
D (39306) BT_SMP: smp_calculate_random_input ri=0x80 | |
D (39306) BT_SMP: smp_calculate_f4 | |
D (39316) BT_SMP: aes_cipher_msg_auth_code | |
D (39316) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (39326) BT_SMP: cmac_generate_subkey | |
D (39326) BT_SMP: smp_encrypt_data | |
D (39336) BT_SMP: cmac_subkey_cont | |
D (39336) BT_SMP: leftshift_onebit | |
D (39336) BT_SMP: leftshift_onebit | |
D (39346) BT_SMP: cmac_prepare_last_block | |
D (39346) BT_SMP: flag = 0 round = 5 | |
D (39346) BT_SMP: smp_xor_128 | |
D (39356) BT_SMP: cmac_aes_k_calculate | |
D (39356) BT_SMP: smp_xor_128 | |
D (39356) BT_SMP: smp_encrypt_data | |
D (39366) BT_SMP: smp_xor_128 | |
D (39366) BT_SMP: smp_encrypt_data | |
D (39376) BT_SMP: smp_xor_128 | |
D (39376) BT_SMP: smp_encrypt_data | |
D (39376) BT_SMP: smp_xor_128 | |
D (39386) BT_SMP: smp_encrypt_data | |
D (39386) BT_SMP: smp_xor_128 | |
D (39386) BT_SMP: smp_encrypt_data | |
D (39396) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (39396) BT_SMP: p_mac[0] = 0xb1 p_mac[1] = 0x64 p_mac[2] = 0x6e p_mac[3] = 0xb5 | |
D (39406) BT_SMP: p_mac[4] = 0xad p_mac[5] = 0x65 p_mac[6] = 0xac p_mac[7] = 0x79 | |
D (39416) BT_SMP: peer commitment calculation is completed | |
D (39416) BT_SMP: Commitment check succeeds | |
D (39426) BT_SMP: smp_send_rand | |
D (39426) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (39426) BT_SMP: smp_build_rand_cmd | |
D (39436) BT_SMP: smp_send_msg_to_L2CAP | |
D (39436) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (39446) BT_SMP: smp_start_nonce_generation | |
D (39456) BT_SMP: smp_process_peer_nonce end | |
D (39456) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (39466) BT_SMP: smp_rand_back state=0xd | |
D (39466) BT_SMP: smp_finish_nonce_generation | |
D (39476) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (39476) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (39486) BT_SMP: main smp_sm_event | |
D (39486) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (39496) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (39506) BT_SMP: smp_process_pairing_commitment | |
D (39516) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (39516) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (39526) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (39536) BT_SMP: smp_rand_back state=0xe | |
D (39536) BT_SMP: smp_process_new_nonce round 5 | |
D (39536) BT_SMP: main smp_sm_event | |
D (39546) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (39556) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (39566) BT_SMP: smp_process_local_nonce | |
D (39566) BT_SMP: smp_calculate_local_commitment | |
D (39576) BT_SMP: random: 0xed, round: 5, i: 0, j: 5 | |
D (39576) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (39586) BT_SMP: smp_calculate_f4 | |
D (39586) BT_SMP: aes_cipher_msg_auth_code | |
D (39586) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (39596) BT_SMP: cmac_generate_subkey | |
D (39596) BT_SMP: smp_encrypt_data | |
D (39606) BT_SMP: cmac_subkey_cont | |
D (39606) BT_SMP: leftshift_onebit | |
D (39616) BT_SMP: leftshift_onebit | |
D (39616) BT_SMP: cmac_prepare_last_block | |
D (39616) BT_SMP: flag = 0 round = 5 | |
D (39626) BT_SMP: smp_xor_128 | |
D (39626) BT_SMP: cmac_aes_k_calculate | |
D (39626) BT_SMP: smp_xor_128 | |
D (39636) BT_SMP: smp_encrypt_data | |
D (39636) BT_SMP: smp_xor_128 | |
D (39636) BT_SMP: smp_encrypt_data | |
D (39646) BT_SMP: smp_xor_128 | |
D (39646) BT_SMP: smp_encrypt_data | |
D (39646) BT_SMP: smp_xor_128 | |
D (39656) BT_SMP: smp_encrypt_data | |
D (39656) BT_SMP: smp_xor_128 | |
D (39656) BT_SMP: smp_encrypt_data | |
D (39666) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (39666) BT_SMP: p_mac[0] = 0xbe p_mac[1] = 0x21 p_mac[2] = 0x6d p_mac[3] = 0x3e | |
D (39676) BT_SMP: p_mac[4] = 0x24 p_mac[5] = 0x8b p_mac[6] = 0x17 p_mac[7] = 0x9c | |
D (39686) BT_SMP: local commitment calculation is completed | |
D (39686) BT_SMP: smp_send_commitment | |
D (39696) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (39696) BT_SMP: smp_build_pairing_commitment_cmd | |
D (39706) BT_SMP: smp_send_msg_to_L2CAP | |
D (39706) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (39716) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (39746) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (39756) BT_SMP: main smp_sm_event | |
D (39756) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (39756) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (39766) BT_SMP: smp_proc_rand | |
D (39766) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (39776) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (39786) BT_SMP: smp_process_peer_nonce start | |
D (39786) BT_SMP: smp_check_commitment | |
D (39786) BT_SMP: smp_calculate_peer_commitment | |
D (39796) BT_SMP: random: 0xed, round: 5, i: 0, j: 5 | |
D (39796) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (39806) BT_SMP: smp_calculate_f4 | |
D (39806) BT_SMP: aes_cipher_msg_auth_code | |
D (39816) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (39816) BT_SMP: cmac_generate_subkey | |
D (39826) BT_SMP: smp_encrypt_data | |
D (39826) BT_SMP: cmac_subkey_cont | |
D (39826) BT_SMP: leftshift_onebit | |
D (39836) BT_SMP: smp_xor_128 | |
D (39836) BT_SMP: leftshift_onebit | |
D (39836) BT_SMP: cmac_prepare_last_block | |
D (39846) BT_SMP: flag = 0 round = 5 | |
D (39846) BT_SMP: smp_xor_128 | |
D (39856) BT_SMP: cmac_aes_k_calculate | |
D (39856) BT_SMP: smp_xor_128 | |
D (39856) BT_SMP: smp_encrypt_data | |
D (39866) BT_SMP: smp_xor_128 | |
D (39866) BT_SMP: smp_encrypt_data | |
D (39866) BT_SMP: smp_xor_128 | |
D (39876) BT_SMP: smp_encrypt_data | |
D (39876) BT_SMP: smp_xor_128 | |
D (39876) BT_SMP: smp_encrypt_data | |
D (39886) BT_SMP: smp_xor_128 | |
D (39886) BT_SMP: smp_encrypt_data | |
D (39886) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (39896) BT_SMP: p_mac[0] = 0x27 p_mac[1] = 0x43 p_mac[2] = 0x03 p_mac[3] = 0x19 | |
D (39906) BT_SMP: p_mac[4] = 0x33 p_mac[5] = 0x12 p_mac[6] = 0x22 p_mac[7] = 0x1a | |
D (39906) BT_SMP: peer commitment calculation is completed | |
D (39916) BT_SMP: Commitment check succeeds | |
D (39916) BT_SMP: smp_send_rand | |
D (39926) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (39926) BT_SMP: smp_build_rand_cmd | |
D (39936) BT_SMP: smp_send_msg_to_L2CAP | |
D (39936) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (39946) BT_SMP: smp_start_nonce_generation | |
D (39946) BT_SMP: smp_process_peer_nonce end | |
D (39956) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (39966) BT_SMP: smp_rand_back state=0xd | |
D (39966) BT_SMP: smp_finish_nonce_generation | |
D (39976) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (39976) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (39986) BT_SMP: main smp_sm_event | |
D (39986) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (39996) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (40006) BT_SMP: smp_process_pairing_commitment | |
D (40006) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (40016) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (40026) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (40026) BT_SMP: smp_rand_back state=0xe | |
D (40036) BT_SMP: smp_process_new_nonce round 6 | |
D (40036) BT_SMP: main smp_sm_event | |
D (40046) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (40056) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (40066) BT_SMP: smp_process_local_nonce | |
D (40066) BT_SMP: smp_calculate_local_commitment | |
D (40066) BT_SMP: random: 0xed, round: 6, i: 0, j: 6 | |
D (40076) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (40076) BT_SMP: smp_calculate_f4 | |
D (40086) BT_SMP: aes_cipher_msg_auth_code | |
D (40086) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (40096) BT_SMP: cmac_generate_subkey | |
D (40096) BT_SMP: smp_encrypt_data | |
D (40106) BT_SMP: cmac_subkey_cont | |
D (40106) BT_SMP: leftshift_onebit | |
D (40106) BT_SMP: leftshift_onebit | |
D (40116) BT_SMP: smp_xor_128 | |
D (40116) BT_SMP: cmac_prepare_last_block | |
D (40116) BT_SMP: flag = 0 round = 5 | |
D (40126) BT_SMP: smp_xor_128 | |
D (40126) BT_SMP: cmac_aes_k_calculate | |
D (40126) BT_SMP: smp_xor_128 | |
D (40136) BT_SMP: smp_encrypt_data | |
D (40136) BT_SMP: smp_xor_128 | |
D (40136) BT_SMP: smp_encrypt_data | |
D (40146) BT_SMP: smp_xor_128 | |
D (40146) BT_SMP: smp_encrypt_data | |
D (40156) BT_SMP: smp_xor_128 | |
D (40156) BT_SMP: smp_encrypt_data | |
D (40156) BT_SMP: smp_xor_128 | |
D (40166) BT_SMP: smp_encrypt_data | |
D (40166) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (40166) BT_SMP: p_mac[0] = 0x63 p_mac[1] = 0xe7 p_mac[2] = 0x3b p_mac[3] = 0xa1 | |
D (40176) BT_SMP: p_mac[4] = 0x4b p_mac[5] = 0x43 p_mac[6] = 0xcd p_mac[7] = 0x98 | |
D (40186) BT_SMP: local commitment calculation is completed | |
D (40186) BT_SMP: smp_send_commitment | |
D (40196) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (40196) BT_SMP: smp_build_pairing_commitment_cmd | |
D (40206) BT_SMP: smp_send_msg_to_L2CAP | |
D (40206) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (40216) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (40226) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (40236) BT_SMP: main smp_sm_event | |
D (40236) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (40236) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (40246) BT_SMP: smp_proc_rand | |
D (40246) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (40256) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (40266) BT_SMP: smp_process_peer_nonce start | |
D (40266) BT_SMP: smp_check_commitment | |
D (40276) BT_SMP: smp_calculate_peer_commitment | |
D (40276) BT_SMP: random: 0xed, round: 6, i: 0, j: 6 | |
D (40286) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (40286) BT_SMP: smp_calculate_f4 | |
D (40296) BT_SMP: aes_cipher_msg_auth_code | |
D (40296) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (40306) BT_SMP: cmac_generate_subkey | |
D (40306) BT_SMP: smp_encrypt_data | |
D (40306) BT_SMP: cmac_subkey_cont | |
D (40316) BT_SMP: leftshift_onebit | |
D (40316) BT_SMP: smp_xor_128 | |
D (40316) BT_SMP: leftshift_onebit | |
D (40326) BT_SMP: cmac_prepare_last_block | |
D (40326) BT_SMP: flag = 0 round = 5 | |
D (40336) BT_SMP: smp_xor_128 | |
D (40336) BT_SMP: cmac_aes_k_calculate | |
D (40336) BT_SMP: smp_xor_128 | |
D (40346) BT_SMP: smp_encrypt_data | |
D (40346) BT_SMP: smp_xor_128 | |
D (40346) BT_SMP: smp_encrypt_data | |
D (40356) BT_SMP: smp_xor_128 | |
D (40356) BT_SMP: smp_encrypt_data | |
D (40356) BT_SMP: smp_xor_128 | |
D (40366) BT_SMP: smp_encrypt_data | |
D (40366) BT_SMP: smp_xor_128 | |
D (40366) BT_SMP: smp_encrypt_data | |
D (40376) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (40376) BT_SMP: p_mac[0] = 0xdf p_mac[1] = 0x09 p_mac[2] = 0xa6 p_mac[3] = 0x90 | |
D (40386) BT_SMP: p_mac[4] = 0x41 p_mac[5] = 0x31 p_mac[6] = 0xa6 p_mac[7] = 0xae | |
D (40396) BT_SMP: peer commitment calculation is completed | |
D (40396) BT_SMP: Commitment check succeeds | |
D (40406) BT_SMP: smp_send_rand | |
D (40406) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (40406) BT_SMP: smp_build_rand_cmd | |
D (40416) BT_SMP: smp_send_msg_to_L2CAP | |
D (40426) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (40426) BT_SMP: smp_start_nonce_generation | |
D (40436) BT_SMP: smp_process_peer_nonce end | |
D (40436) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (40446) BT_SMP: smp_rand_back state=0xd | |
D (40446) BT_SMP: smp_finish_nonce_generation | |
D (40456) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (40456) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (40466) BT_SMP: main smp_sm_event | |
D (40466) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (40476) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (40486) BT_SMP: smp_process_pairing_commitment | |
D (40496) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (40496) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (40506) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (40516) BT_SMP: smp_rand_back state=0xe | |
D (40516) BT_SMP: smp_process_new_nonce round 7 | |
D (40516) BT_SMP: main smp_sm_event | |
D (40526) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (40536) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (40546) BT_SMP: smp_process_local_nonce | |
D (40546) BT_SMP: smp_calculate_local_commitment | |
D (40556) BT_SMP: random: 0xed, round: 7, i: 0, j: 7 | |
D (40556) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (40566) BT_SMP: smp_calculate_f4 | |
D (40566) BT_SMP: aes_cipher_msg_auth_code | |
D (40576) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (40576) BT_SMP: cmac_generate_subkey | |
D (40586) BT_SMP: smp_encrypt_data | |
D (40586) BT_SMP: cmac_subkey_cont | |
D (40586) BT_SMP: leftshift_onebit | |
D (40596) BT_SMP: leftshift_onebit | |
D (40596) BT_SMP: cmac_prepare_last_block | |
D (40596) BT_SMP: flag = 0 round = 5 | |
D (40606) BT_SMP: smp_xor_128 | |
D (40606) BT_SMP: cmac_aes_k_calculate | |
D (40606) BT_SMP: smp_xor_128 | |
D (40616) BT_SMP: smp_encrypt_data | |
D (40616) BT_SMP: smp_xor_128 | |
D (40616) BT_SMP: smp_encrypt_data | |
D (40626) BT_SMP: smp_xor_128 | |
D (40626) BT_SMP: smp_encrypt_data | |
D (40636) BT_SMP: smp_xor_128 | |
D (40636) BT_SMP: smp_encrypt_data | |
D (40636) BT_SMP: smp_xor_128 | |
D (40636) BT_SMP: smp_encrypt_data | |
D (40646) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (40646) BT_SMP: p_mac[0] = 0xc1 p_mac[1] = 0xc6 p_mac[2] = 0xbf p_mac[3] = 0x10 | |
D (40656) BT_SMP: p_mac[4] = 0x0a p_mac[5] = 0xb3 p_mac[6] = 0x7a p_mac[7] = 0x99 | |
D (40666) BT_SMP: local commitment calculation is completed | |
D (40666) BT_SMP: smp_send_commitment | |
D (40676) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (40676) BT_SMP: smp_build_pairing_commitment_cmd | |
D (40686) BT_SMP: smp_send_msg_to_L2CAP | |
D (40686) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (40696) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (40706) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (40716) BT_SMP: main smp_sm_event | |
D (40716) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (40716) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (40726) BT_SMP: smp_proc_rand | |
D (40726) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (40736) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (40746) BT_SMP: smp_process_peer_nonce start | |
D (40746) BT_SMP: smp_check_commitment | |
D (40756) BT_SMP: smp_calculate_peer_commitment | |
D (40756) BT_SMP: random: 0xed, round: 7, i: 0, j: 7 | |
D (40766) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (40766) BT_SMP: smp_calculate_f4 | |
D (40776) BT_SMP: aes_cipher_msg_auth_code | |
D (40776) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (40786) BT_SMP: cmac_generate_subkey | |
D (40786) BT_SMP: smp_encrypt_data | |
D (40786) BT_SMP: cmac_subkey_cont | |
D (40796) BT_SMP: leftshift_onebit | |
D (40796) BT_SMP: smp_xor_128 | |
D (40796) BT_SMP: leftshift_onebit | |
D (40806) BT_SMP: cmac_prepare_last_block | |
D (40806) BT_SMP: flag = 0 round = 5 | |
D (40806) BT_SMP: smp_xor_128 | |
D (40816) BT_SMP: cmac_aes_k_calculate | |
D (40816) BT_SMP: smp_xor_128 | |
D (40816) BT_SMP: smp_encrypt_data | |
D (40826) BT_SMP: smp_xor_128 | |
D (40826) BT_SMP: smp_encrypt_data | |
D (40836) BT_SMP: smp_xor_128 | |
D (40836) BT_SMP: smp_encrypt_data | |
D (40836) BT_SMP: smp_xor_128 | |
D (40846) BT_SMP: smp_encrypt_data | |
D (40846) BT_SMP: smp_xor_128 | |
D (40846) BT_SMP: smp_encrypt_data | |
D (40856) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (40856) BT_SMP: p_mac[0] = 0xe7 p_mac[1] = 0xf7 p_mac[2] = 0x63 p_mac[3] = 0x80 | |
D (40866) BT_SMP: p_mac[4] = 0x72 p_mac[5] = 0x0f p_mac[6] = 0x04 p_mac[7] = 0x76 | |
D (40876) BT_SMP: peer commitment calculation is completed | |
D (40876) BT_SMP: Commitment check succeeds | |
D (40886) BT_SMP: smp_send_rand | |
D (40886) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (40886) BT_SMP: smp_build_rand_cmd | |
D (40896) BT_SMP: smp_send_msg_to_L2CAP | |
D (40896) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (40906) BT_SMP: smp_start_nonce_generation | |
D (40916) BT_SMP: smp_process_peer_nonce end | |
D (40916) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (40926) BT_SMP: smp_rand_back state=0xd | |
D (40926) BT_SMP: smp_finish_nonce_generation | |
D (40936) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (40936) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (40946) BT_SMP: main smp_sm_event | |
D (40946) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (40956) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (40966) BT_SMP: smp_process_pairing_commitment | |
D (40976) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (40976) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (40986) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (40996) BT_SMP: smp_rand_back state=0xe | |
D (40996) BT_SMP: smp_process_new_nonce round 8 | |
D (40996) BT_SMP: main smp_sm_event | |
D (41006) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (41016) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (41026) BT_SMP: smp_process_local_nonce | |
D (41026) BT_SMP: smp_calculate_local_commitment | |
D (41036) BT_SMP: random: 0x5f, round: 8, i: 1, j: 0 | |
D (41036) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (41046) BT_SMP: smp_calculate_f4 | |
D (41046) BT_SMP: aes_cipher_msg_auth_code | |
D (41046) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (41056) BT_SMP: cmac_generate_subkey | |
D (41056) BT_SMP: smp_encrypt_data | |
D (41066) BT_SMP: cmac_subkey_cont | |
D (41066) BT_SMP: leftshift_onebit | |
D (41076) BT_SMP: smp_xor_128 | |
D (41076) BT_SMP: leftshift_onebit | |
D (41076) BT_SMP: smp_xor_128 | |
D (41086) BT_SMP: cmac_prepare_last_block | |
D (41086) BT_SMP: flag = 0 round = 5 | |
D (41086) BT_SMP: smp_xor_128 | |
D (41096) BT_SMP: cmac_aes_k_calculate | |
D (41096) BT_SMP: smp_xor_128 | |
D (41096) BT_SMP: smp_encrypt_data | |
D (41106) BT_SMP: smp_xor_128 | |
D (41106) BT_SMP: smp_encrypt_data | |
D (41106) BT_SMP: smp_xor_128 | |
D (41116) BT_SMP: smp_encrypt_data | |
D (41116) BT_SMP: smp_xor_128 | |
D (41116) BT_SMP: smp_encrypt_data | |
D (41126) BT_SMP: smp_xor_128 | |
D (41126) BT_SMP: smp_encrypt_data | |
D (41126) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (41136) BT_SMP: p_mac[0] = 0x64 p_mac[1] = 0xbf p_mac[2] = 0xf3 p_mac[3] = 0x01 | |
D (41146) BT_SMP: p_mac[4] = 0x67 p_mac[5] = 0x1b p_mac[6] = 0x74 p_mac[7] = 0x49 | |
D (41146) BT_SMP: local commitment calculation is completed | |
D (41156) BT_SMP: smp_send_commitment | |
D (41156) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (41166) BT_SMP: smp_build_pairing_commitment_cmd | |
D (41166) BT_SMP: smp_send_msg_to_L2CAP | |
D (41176) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (41186) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (41206) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (41206) BT_SMP: main smp_sm_event | |
D (41206) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (41216) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (41216) BT_SMP: smp_proc_rand | |
D (41226) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (41226) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (41236) BT_SMP: smp_process_peer_nonce start | |
D (41246) BT_SMP: smp_check_commitment | |
D (41246) BT_SMP: smp_calculate_peer_commitment | |
D (41246) BT_SMP: random: 0x5f, round: 8, i: 1, j: 0 | |
D (41256) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (41256) BT_SMP: smp_calculate_f4 | |
D (41266) BT_SMP: aes_cipher_msg_auth_code | |
D (41266) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (41276) BT_SMP: cmac_generate_subkey | |
D (41276) BT_SMP: smp_encrypt_data | |
D (41286) BT_SMP: cmac_subkey_cont | |
D (41286) BT_SMP: leftshift_onebit | |
D (41286) BT_SMP: leftshift_onebit | |
D (41296) BT_SMP: smp_xor_128 | |
D (41296) BT_SMP: cmac_prepare_last_block | |
D (41296) BT_SMP: flag = 0 round = 5 | |
D (41306) BT_SMP: smp_xor_128 | |
D (41306) BT_SMP: cmac_aes_k_calculate | |
D (41306) BT_SMP: smp_xor_128 | |
D (41316) BT_SMP: smp_encrypt_data | |
D (41316) BT_SMP: smp_xor_128 | |
D (41316) BT_SMP: smp_encrypt_data | |
D (41326) BT_SMP: smp_xor_128 | |
D (41326) BT_SMP: smp_encrypt_data | |
D (41336) BT_SMP: smp_xor_128 | |
D (41336) BT_SMP: smp_encrypt_data | |
D (41336) BT_SMP: smp_xor_128 | |
D (41346) BT_SMP: smp_encrypt_data | |
D (41346) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (41346) BT_SMP: p_mac[0] = 0x4c p_mac[1] = 0xd7 p_mac[2] = 0x0e p_mac[3] = 0xa0 | |
D (41356) BT_SMP: p_mac[4] = 0xee p_mac[5] = 0xb6 p_mac[6] = 0xd7 p_mac[7] = 0x5c | |
D (41366) BT_SMP: peer commitment calculation is completed | |
D (41366) BT_SMP: Commitment check succeeds | |
D (41376) BT_SMP: smp_send_rand | |
D (41376) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (41386) BT_SMP: smp_build_rand_cmd | |
D (41386) BT_SMP: smp_send_msg_to_L2CAP | |
D (41396) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (41396) BT_SMP: smp_start_nonce_generation | |
D (41406) BT_SMP: smp_process_peer_nonce end | |
D (41406) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (41416) BT_SMP: smp_rand_back state=0xd | |
D (41416) BT_SMP: smp_finish_nonce_generation | |
D (41426) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (41426) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (41436) BT_SMP: main smp_sm_event | |
D (41436) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (41456) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (41456) BT_SMP: smp_process_pairing_commitment | |
D (41466) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (41476) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (41476) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (41486) BT_SMP: smp_rand_back state=0xe | |
D (41486) BT_SMP: smp_process_new_nonce round 9 | |
D (41496) BT_SMP: main smp_sm_event | |
D (41496) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (41506) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (41516) BT_SMP: smp_process_local_nonce | |
D (41516) BT_SMP: smp_calculate_local_commitment | |
D (41526) BT_SMP: random: 0x5f, round: 9, i: 1, j: 1 | |
D (41526) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (41536) BT_SMP: smp_calculate_f4 | |
D (41536) BT_SMP: aes_cipher_msg_auth_code | |
D (41546) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (41546) BT_SMP: cmac_generate_subkey | |
D (41556) BT_SMP: smp_encrypt_data | |
D (41556) BT_SMP: cmac_subkey_cont | |
D (41556) BT_SMP: leftshift_onebit | |
D (41566) BT_SMP: smp_xor_128 | |
D (41566) BT_SMP: leftshift_onebit | |
D (41566) BT_SMP: cmac_prepare_last_block | |
D (41576) BT_SMP: flag = 0 round = 5 | |
D (41576) BT_SMP: smp_xor_128 | |
D (41586) BT_SMP: cmac_aes_k_calculate | |
D (41586) BT_SMP: smp_xor_128 | |
D (41586) BT_SMP: smp_encrypt_data | |
D (41596) BT_SMP: smp_xor_128 | |
D (41596) BT_SMP: smp_encrypt_data | |
D (41596) BT_SMP: smp_xor_128 | |
D (41606) BT_SMP: smp_encrypt_data | |
D (41606) BT_SMP: smp_xor_128 | |
D (41606) BT_SMP: smp_encrypt_data | |
D (41616) BT_SMP: smp_xor_128 | |
D (41616) BT_SMP: smp_encrypt_data | |
D (41616) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (41626) BT_SMP: p_mac[0] = 0x8f p_mac[1] = 0x55 p_mac[2] = 0x75 p_mac[3] = 0xb4 | |
D (41636) BT_SMP: p_mac[4] = 0x60 p_mac[5] = 0x1f p_mac[6] = 0xf5 p_mac[7] = 0x25 | |
D (41636) BT_SMP: local commitment calculation is completed | |
D (41646) BT_SMP: smp_send_commitment | |
D (41646) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (41656) BT_SMP: smp_build_pairing_commitment_cmd | |
D (41656) BT_SMP: smp_send_msg_to_L2CAP | |
D (41666) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (41676) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (41686) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (41686) BT_SMP: main smp_sm_event | |
D (41686) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (41696) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (41706) BT_SMP: smp_proc_rand | |
D (41706) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (41716) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (41716) BT_SMP: smp_process_peer_nonce start | |
D (41726) BT_SMP: smp_check_commitment | |
D (41726) BT_SMP: smp_calculate_peer_commitment | |
D (41736) BT_SMP: random: 0x5f, round: 9, i: 1, j: 1 | |
D (41736) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (41746) BT_SMP: smp_calculate_f4 | |
D (41746) BT_SMP: aes_cipher_msg_auth_code | |
D (41746) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (41756) BT_SMP: cmac_generate_subkey | |
D (41756) BT_SMP: smp_encrypt_data | |
D (41766) BT_SMP: cmac_subkey_cont | |
D (41766) BT_SMP: leftshift_onebit | |
D (41776) BT_SMP: leftshift_onebit | |
D (41776) BT_SMP: smp_xor_128 | |
D (41776) BT_SMP: cmac_prepare_last_block | |
D (41786) BT_SMP: flag = 0 round = 5 | |
D (41786) BT_SMP: smp_xor_128 | |
D (41786) BT_SMP: cmac_aes_k_calculate | |
D (41796) BT_SMP: smp_xor_128 | |
D (41796) BT_SMP: smp_encrypt_data | |
D (41796) BT_SMP: smp_xor_128 | |
D (41806) BT_SMP: smp_encrypt_data | |
D (41806) BT_SMP: smp_xor_128 | |
D (41806) BT_SMP: smp_encrypt_data | |
D (41816) BT_SMP: smp_xor_128 | |
D (41816) BT_SMP: smp_encrypt_data | |
D (41816) BT_SMP: smp_xor_128 | |
D (41826) BT_SMP: smp_encrypt_data | |
D (41826) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (41836) BT_SMP: p_mac[0] = 0x58 p_mac[1] = 0x54 p_mac[2] = 0xa8 p_mac[3] = 0xba | |
D (41836) BT_SMP: p_mac[4] = 0xee p_mac[5] = 0x3f p_mac[6] = 0x16 p_mac[7] = 0x79 | |
D (41846) BT_SMP: peer commitment calculation is completed | |
D (41856) BT_SMP: Commitment check succeeds | |
D (41856) BT_SMP: smp_send_rand | |
D (41856) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (41866) BT_SMP: smp_build_rand_cmd | |
D (41866) BT_SMP: smp_send_msg_to_L2CAP | |
D (41876) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (41886) BT_SMP: smp_start_nonce_generation | |
D (41886) BT_SMP: smp_process_peer_nonce end | |
D (41896) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (41896) BT_SMP: smp_rand_back state=0xd | |
D (41906) BT_SMP: smp_finish_nonce_generation | |
D (41906) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (41916) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (41916) BT_SMP: main smp_sm_event | |
D (41926) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (41936) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (41946) BT_SMP: smp_process_pairing_commitment | |
D (41946) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (41956) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (41966) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (41966) BT_SMP: smp_rand_back state=0xe | |
D (41976) BT_SMP: smp_process_new_nonce round 10 | |
D (41976) BT_SMP: main smp_sm_event | |
D (41976) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (41986) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (41996) BT_SMP: smp_process_local_nonce | |
D (42006) BT_SMP: smp_calculate_local_commitment | |
D (42006) BT_SMP: random: 0x5f, round: 10, i: 1, j: 2 | |
D (42016) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (42016) BT_SMP: smp_calculate_f4 | |
D (42026) BT_SMP: aes_cipher_msg_auth_code | |
D (42026) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (42036) BT_SMP: cmac_generate_subkey | |
D (42036) BT_SMP: smp_encrypt_data | |
D (42036) BT_SMP: cmac_subkey_cont | |
D (42046) BT_SMP: leftshift_onebit | |
D (42046) BT_SMP: leftshift_onebit | |
D (42046) BT_SMP: cmac_prepare_last_block | |
D (42056) BT_SMP: flag = 0 round = 5 | |
D (42056) BT_SMP: smp_xor_128 | |
D (42066) BT_SMP: cmac_aes_k_calculate | |
D (42066) BT_SMP: smp_xor_128 | |
D (42066) BT_SMP: smp_encrypt_data | |
D (42076) BT_SMP: smp_xor_128 | |
D (42076) BT_SMP: smp_encrypt_data | |
D (42076) BT_SMP: smp_xor_128 | |
D (42086) BT_SMP: smp_encrypt_data | |
D (42086) BT_SMP: smp_xor_128 | |
D (42086) BT_SMP: smp_encrypt_data | |
D (42096) BT_SMP: smp_xor_128 | |
D (42096) BT_SMP: smp_encrypt_data | |
D (42096) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (42106) BT_SMP: p_mac[0] = 0xa4 p_mac[1] = 0xec p_mac[2] = 0x16 p_mac[3] = 0xb5 | |
D (42116) BT_SMP: p_mac[4] = 0x4b p_mac[5] = 0xf1 p_mac[6] = 0x61 p_mac[7] = 0x99 | |
D (42116) BT_SMP: local commitment calculation is completed | |
D (42126) BT_SMP: smp_send_commitment | |
D (42126) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (42136) BT_SMP: smp_build_pairing_commitment_cmd | |
D (42136) BT_SMP: smp_send_msg_to_L2CAP | |
D (42146) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (42156) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (42176) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (42186) BT_SMP: main smp_sm_event | |
D (42186) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (42186) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (42196) BT_SMP: smp_proc_rand | |
D (42196) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (42206) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (42216) BT_SMP: smp_process_peer_nonce start | |
D (42216) BT_SMP: smp_check_commitment | |
D (42216) BT_SMP: smp_calculate_peer_commitment | |
D (42226) BT_SMP: random: 0x5f, round: 10, i: 1, j: 2 | |
D (42226) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (42236) BT_SMP: smp_calculate_f4 | |
D (42236) BT_SMP: aes_cipher_msg_auth_code | |
D (42246) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (42246) BT_SMP: cmac_generate_subkey | |
D (42256) BT_SMP: smp_encrypt_data | |
D (42256) BT_SMP: cmac_subkey_cont | |
D (42256) BT_SMP: leftshift_onebit | |
D (42266) BT_SMP: smp_xor_128 | |
D (42266) BT_SMP: leftshift_onebit | |
D (42266) BT_SMP: cmac_prepare_last_block | |
D (42276) BT_SMP: flag = 0 round = 5 | |
D (42276) BT_SMP: smp_xor_128 | |
D (42286) BT_SMP: cmac_aes_k_calculate | |
D (42286) BT_SMP: smp_xor_128 | |
D (42286) BT_SMP: smp_encrypt_data | |
D (42296) BT_SMP: smp_xor_128 | |
D (42296) BT_SMP: smp_encrypt_data | |
D (42296) BT_SMP: smp_xor_128 | |
D (42306) BT_SMP: smp_encrypt_data | |
D (42306) BT_SMP: smp_xor_128 | |
D (42306) BT_SMP: smp_encrypt_data | |
D (42316) BT_SMP: smp_xor_128 | |
D (42316) BT_SMP: smp_encrypt_data | |
D (42316) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (42326) BT_SMP: p_mac[0] = 0x91 p_mac[1] = 0xa1 p_mac[2] = 0x81 p_mac[3] = 0xfb | |
D (42336) BT_SMP: p_mac[4] = 0x59 p_mac[5] = 0xcd p_mac[6] = 0x12 p_mac[7] = 0x26 | |
D (42336) BT_SMP: peer commitment calculation is completed | |
D (42346) BT_SMP: Commitment check succeeds | |
D (42346) BT_SMP: smp_send_rand | |
D (42356) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (42356) BT_SMP: smp_build_rand_cmd | |
D (42366) BT_SMP: smp_send_msg_to_L2CAP | |
D (42366) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (42376) BT_SMP: smp_start_nonce_generation | |
D (42376) BT_SMP: smp_process_peer_nonce end | |
D (42386) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (42396) BT_SMP: smp_rand_back state=0xd | |
D (42396) BT_SMP: smp_finish_nonce_generation | |
D (42396) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (42406) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (42416) BT_SMP: main smp_sm_event | |
D (42416) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (42426) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (42436) BT_SMP: smp_process_pairing_commitment | |
D (42436) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (42446) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (42456) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (42456) BT_SMP: smp_rand_back state=0xe | |
D (42466) BT_SMP: smp_process_new_nonce round 11 | |
D (42466) BT_SMP: main smp_sm_event | |
D (42476) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (42486) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (42496) BT_SMP: smp_process_local_nonce | |
D (42496) BT_SMP: smp_calculate_local_commitment | |
D (42496) BT_SMP: random: 0x5f, round: 11, i: 1, j: 3 | |
D (42506) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (42516) BT_SMP: smp_calculate_f4 | |
D (42516) BT_SMP: aes_cipher_msg_auth_code | |
D (42516) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (42526) BT_SMP: cmac_generate_subkey | |
D (42526) BT_SMP: smp_encrypt_data | |
D (42536) BT_SMP: cmac_subkey_cont | |
D (42536) BT_SMP: leftshift_onebit | |
D (42536) BT_SMP: smp_xor_128 | |
D (42546) BT_SMP: leftshift_onebit | |
D (42546) BT_SMP: smp_xor_128 | |
D (42546) BT_SMP: cmac_prepare_last_block | |
D (42556) BT_SMP: flag = 0 round = 5 | |
D (42556) BT_SMP: smp_xor_128 | |
D (42556) BT_SMP: cmac_aes_k_calculate | |
D (42566) BT_SMP: smp_xor_128 | |
D (42566) BT_SMP: smp_encrypt_data | |
D (42576) BT_SMP: smp_xor_128 | |
D (42576) BT_SMP: smp_encrypt_data | |
D (42576) BT_SMP: smp_xor_128 | |
D (42586) BT_SMP: smp_encrypt_data | |
D (42586) BT_SMP: smp_xor_128 | |
D (42586) BT_SMP: smp_encrypt_data | |
D (42596) BT_SMP: smp_xor_128 | |
D (42596) BT_SMP: smp_encrypt_data | |
D (42596) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (42606) BT_SMP: p_mac[0] = 0x3c p_mac[1] = 0xe8 p_mac[2] = 0xfa p_mac[3] = 0xd5 | |
D (42606) BT_SMP: p_mac[4] = 0x5f p_mac[5] = 0x70 p_mac[6] = 0x10 p_mac[7] = 0x3c | |
D (42616) BT_SMP: local commitment calculation is completed | |
D (42626) BT_SMP: smp_send_commitment | |
D (42626) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (42636) BT_SMP: smp_build_pairing_commitment_cmd | |
D (42636) BT_SMP: smp_send_msg_to_L2CAP | |
D (42646) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (42646) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (42676) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (42676) BT_SMP: main smp_sm_event | |
D (42676) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (42686) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (42686) BT_SMP: smp_proc_rand | |
D (42696) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (42696) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (42706) BT_SMP: smp_process_peer_nonce start | |
D (42716) BT_SMP: smp_check_commitment | |
D (42716) BT_SMP: smp_calculate_peer_commitment | |
D (42716) BT_SMP: random: 0x5f, round: 11, i: 1, j: 3 | |
D (42726) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (42726) BT_SMP: smp_calculate_f4 | |
D (42736) BT_SMP: aes_cipher_msg_auth_code | |
D (42736) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (42746) BT_SMP: cmac_generate_subkey | |
D (42746) BT_SMP: smp_encrypt_data | |
D (42756) BT_SMP: cmac_subkey_cont | |
D (42756) BT_SMP: leftshift_onebit | |
D (42756) BT_SMP: smp_xor_128 | |
D (42766) BT_SMP: leftshift_onebit | |
D (42766) BT_SMP: smp_xor_128 | |
D (42766) BT_SMP: cmac_prepare_last_block | |
D (42776) BT_SMP: flag = 0 round = 5 | |
D (42776) BT_SMP: smp_xor_128 | |
D (42776) BT_SMP: cmac_aes_k_calculate | |
D (42786) BT_SMP: smp_xor_128 | |
D (42786) BT_SMP: smp_encrypt_data | |
D (42786) BT_SMP: smp_xor_128 | |
D (42796) BT_SMP: smp_encrypt_data | |
D (42796) BT_SMP: smp_xor_128 | |
D (42796) BT_SMP: smp_encrypt_data | |
D (42806) BT_SMP: smp_xor_128 | |
D (42806) BT_SMP: smp_encrypt_data | |
D (42816) BT_SMP: smp_xor_128 | |
D (42816) BT_SMP: smp_encrypt_data | |
D (42816) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (42826) BT_SMP: p_mac[0] = 0x70 p_mac[1] = 0x3e p_mac[2] = 0x3e p_mac[3] = 0xc5 | |
D (42826) BT_SMP: p_mac[4] = 0xf2 p_mac[5] = 0xab p_mac[6] = 0xd8 p_mac[7] = 0xf3 | |
D (42836) BT_SMP: peer commitment calculation is completed | |
D (42846) BT_SMP: Commitment check succeeds | |
D (42846) BT_SMP: smp_send_rand | |
D (42856) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (42856) BT_SMP: smp_build_rand_cmd | |
D (42856) BT_SMP: smp_send_msg_to_L2CAP | |
D (42866) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (42876) BT_SMP: smp_start_nonce_generation | |
D (42876) BT_SMP: smp_process_peer_nonce end | |
D (42886) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (42886) BT_SMP: smp_rand_back state=0xd | |
D (42896) BT_SMP: smp_finish_nonce_generation | |
D (42896) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (42906) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (42906) BT_SMP: main smp_sm_event | |
D (42916) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (42926) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (42936) BT_SMP: smp_process_pairing_commitment | |
D (42936) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (42946) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (42956) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (42956) BT_SMP: smp_rand_back state=0xe | |
D (42966) BT_SMP: smp_process_new_nonce round 12 | |
D (42966) BT_SMP: main smp_sm_event | |
D (42966) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (42976) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (42986) BT_SMP: smp_process_local_nonce | |
D (42996) BT_SMP: smp_calculate_local_commitment | |
D (42996) BT_SMP: random: 0x5f, round: 12, i: 1, j: 4 | |
D (43006) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (43006) BT_SMP: smp_calculate_f4 | |
D (43016) BT_SMP: aes_cipher_msg_auth_code | |
D (43016) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (43026) BT_SMP: cmac_generate_subkey | |
D (43026) BT_SMP: smp_encrypt_data | |
D (43036) BT_SMP: cmac_subkey_cont | |
D (43036) BT_SMP: leftshift_onebit | |
D (43036) BT_SMP: smp_xor_128 | |
D (43036) BT_SMP: leftshift_onebit | |
D (43046) BT_SMP: cmac_prepare_last_block | |
D (43046) BT_SMP: flag = 0 round = 5 | |
D (43056) BT_SMP: smp_xor_128 | |
D (43056) BT_SMP: cmac_aes_k_calculate | |
D (43056) BT_SMP: smp_xor_128 | |
D (43066) BT_SMP: smp_encrypt_data | |
D (43066) BT_SMP: smp_xor_128 | |
D (43066) BT_SMP: smp_encrypt_data | |
D (43076) BT_SMP: smp_xor_128 | |
D (43076) BT_SMP: smp_encrypt_data | |
D (43076) BT_SMP: smp_xor_128 | |
D (43086) BT_SMP: smp_encrypt_data | |
D (43086) BT_SMP: smp_xor_128 | |
D (43086) BT_SMP: smp_encrypt_data | |
D (43096) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (43096) BT_SMP: p_mac[0] = 0x71 p_mac[1] = 0x3b p_mac[2] = 0xec p_mac[3] = 0x31 | |
D (43106) BT_SMP: p_mac[4] = 0x13 p_mac[5] = 0xa0 p_mac[6] = 0xa6 p_mac[7] = 0x7a | |
D (43116) BT_SMP: local commitment calculation is completed | |
D (43116) BT_SMP: smp_send_commitment | |
D (43126) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (43126) BT_SMP: smp_build_pairing_commitment_cmd | |
D (43136) BT_SMP: smp_send_msg_to_L2CAP | |
D (43136) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (43146) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (43166) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (43176) BT_SMP: main smp_sm_event | |
D (43176) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (43176) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (43186) BT_SMP: smp_proc_rand | |
D (43186) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (43196) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (43206) BT_SMP: smp_process_peer_nonce start | |
D (43206) BT_SMP: smp_check_commitment | |
D (43206) BT_SMP: smp_calculate_peer_commitment | |
D (43216) BT_SMP: random: 0x5f, round: 12, i: 1, j: 4 | |
D (43216) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (43226) BT_SMP: smp_calculate_f4 | |
D (43226) BT_SMP: aes_cipher_msg_auth_code | |
D (43236) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (43236) BT_SMP: cmac_generate_subkey | |
D (43246) BT_SMP: smp_encrypt_data | |
D (43246) BT_SMP: cmac_subkey_cont | |
D (43246) BT_SMP: leftshift_onebit | |
D (43256) BT_SMP: smp_xor_128 | |
D (43256) BT_SMP: leftshift_onebit | |
D (43256) BT_SMP: cmac_prepare_last_block | |
D (43266) BT_SMP: flag = 0 round = 5 | |
D (43266) BT_SMP: smp_xor_128 | |
D (43276) BT_SMP: cmac_aes_k_calculate | |
D (43276) BT_SMP: smp_xor_128 | |
D (43276) BT_SMP: smp_encrypt_data | |
D (43286) BT_SMP: smp_xor_128 | |
D (43286) BT_SMP: smp_encrypt_data | |
D (43286) BT_SMP: smp_xor_128 | |
D (43296) BT_SMP: smp_encrypt_data | |
D (43296) BT_SMP: smp_xor_128 | |
D (43296) BT_SMP: smp_encrypt_data | |
D (43306) BT_SMP: smp_xor_128 | |
D (43306) BT_SMP: smp_encrypt_data | |
D (43306) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (43316) BT_SMP: p_mac[0] = 0x89 p_mac[1] = 0xce p_mac[2] = 0x3d p_mac[3] = 0xb8 | |
D (43326) BT_SMP: p_mac[4] = 0x8f p_mac[5] = 0x21 p_mac[6] = 0x7e p_mac[7] = 0x85 | |
D (43326) BT_SMP: peer commitment calculation is completed | |
D (43336) BT_SMP: Commitment check succeeds | |
D (43336) BT_SMP: smp_send_rand | |
D (43346) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (43346) BT_SMP: smp_build_rand_cmd | |
D (43356) BT_SMP: smp_send_msg_to_L2CAP | |
D (43356) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (43366) BT_SMP: smp_start_nonce_generation | |
D (43366) BT_SMP: smp_process_peer_nonce end | |
D (43376) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (43386) BT_SMP: smp_rand_back state=0xd | |
D (43386) BT_SMP: smp_finish_nonce_generation | |
D (43396) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (43396) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (43406) BT_SMP: main smp_sm_event | |
D (43406) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (43416) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (43426) BT_SMP: smp_process_pairing_commitment | |
D (43426) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (43436) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (43446) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (43446) BT_SMP: smp_rand_back state=0xe | |
D (43456) BT_SMP: smp_process_new_nonce round 13 | |
D (43456) BT_SMP: main smp_sm_event | |
D (43466) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (43476) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (43486) BT_SMP: smp_process_local_nonce | |
D (43486) BT_SMP: smp_calculate_local_commitment | |
D (43486) BT_SMP: random: 0x5f, round: 13, i: 1, j: 5 | |
D (43496) BT_SMP: smp_calculate_random_input ri=0x80 | |
D (43506) BT_SMP: smp_calculate_f4 | |
D (43506) BT_SMP: aes_cipher_msg_auth_code | |
D (43506) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (43516) BT_SMP: cmac_generate_subkey | |
D (43516) BT_SMP: smp_encrypt_data | |
D (43526) BT_SMP: cmac_subkey_cont | |
D (43526) BT_SMP: leftshift_onebit | |
D (43526) BT_SMP: leftshift_onebit | |
D (43536) BT_SMP: cmac_prepare_last_block | |
D (43536) BT_SMP: flag = 0 round = 5 | |
D (43536) BT_SMP: smp_xor_128 | |
D (43546) BT_SMP: cmac_aes_k_calculate | |
D (43546) BT_SMP: smp_xor_128 | |
D (43556) BT_SMP: smp_encrypt_data | |
D (43556) BT_SMP: smp_xor_128 | |
D (43556) BT_SMP: smp_encrypt_data | |
D (43566) BT_SMP: smp_xor_128 | |
D (43566) BT_SMP: smp_encrypt_data | |
D (43566) BT_SMP: smp_xor_128 | |
D (43576) BT_SMP: smp_encrypt_data | |
D (43576) BT_SMP: smp_xor_128 | |
D (43576) BT_SMP: smp_encrypt_data | |
D (43586) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (43586) BT_SMP: p_mac[0] = 0x2b p_mac[1] = 0x80 p_mac[2] = 0xee p_mac[3] = 0x77 | |
D (43596) BT_SMP: p_mac[4] = 0xdf p_mac[5] = 0x2c p_mac[6] = 0x30 p_mac[7] = 0x36 | |
D (43606) BT_SMP: local commitment calculation is completed | |
D (43606) BT_SMP: smp_send_commitment | |
D (43616) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (43616) BT_SMP: smp_build_pairing_commitment_cmd | |
D (43626) BT_SMP: smp_send_msg_to_L2CAP | |
D (43626) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (43636) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (43646) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (43656) BT_SMP: main smp_sm_event | |
D (43656) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (43656) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (43666) BT_SMP: smp_proc_rand | |
D (43666) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (43676) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (43686) BT_SMP: smp_process_peer_nonce start | |
D (43686) BT_SMP: smp_check_commitment | |
D (43696) BT_SMP: smp_calculate_peer_commitment | |
D (43696) BT_SMP: random: 0x5f, round: 13, i: 1, j: 5 | |
D (43706) BT_SMP: smp_calculate_random_input ri=0x80 | |
D (43706) BT_SMP: smp_calculate_f4 | |
D (43716) BT_SMP: aes_cipher_msg_auth_code | |
D (43716) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (43726) BT_SMP: cmac_generate_subkey | |
D (43726) BT_SMP: smp_encrypt_data | |
D (43726) BT_SMP: cmac_subkey_cont | |
D (43736) BT_SMP: leftshift_onebit | |
D (43736) BT_SMP: leftshift_onebit | |
D (43736) BT_SMP: smp_xor_128 | |
D (43746) BT_SMP: cmac_prepare_last_block | |
D (43746) BT_SMP: flag = 0 round = 5 | |
D (43746) BT_SMP: smp_xor_128 | |
D (43756) BT_SMP: cmac_aes_k_calculate | |
D (43756) BT_SMP: smp_xor_128 | |
D (43756) BT_SMP: smp_encrypt_data | |
D (43766) BT_SMP: smp_xor_128 | |
D (43766) BT_SMP: smp_encrypt_data | |
D (43776) BT_SMP: smp_xor_128 | |
D (43776) BT_SMP: smp_encrypt_data | |
D (43776) BT_SMP: smp_xor_128 | |
D (43786) BT_SMP: smp_encrypt_data | |
D (43786) BT_SMP: smp_xor_128 | |
D (43786) BT_SMP: smp_encrypt_data | |
D (43796) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (43796) BT_SMP: p_mac[0] = 0x37 p_mac[1] = 0x69 p_mac[2] = 0xd7 p_mac[3] = 0x0d | |
D (43806) BT_SMP: p_mac[4] = 0x12 p_mac[5] = 0xbf p_mac[6] = 0xc3 p_mac[7] = 0xdd | |
D (43816) BT_SMP: peer commitment calculation is completed | |
D (43816) BT_SMP: Commitment check succeeds | |
D (43826) BT_SMP: smp_send_rand | |
D (43826) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (43826) BT_SMP: smp_build_rand_cmd | |
D (43836) BT_SMP: smp_send_msg_to_L2CAP | |
D (43836) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (43846) BT_SMP: smp_start_nonce_generation | |
D (43856) BT_SMP: smp_process_peer_nonce end | |
D (43856) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (43866) BT_SMP: smp_rand_back state=0xd | |
D (43866) BT_SMP: smp_finish_nonce_generation | |
D (43876) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (43876) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (43886) BT_SMP: main smp_sm_event | |
D (43886) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (43896) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (43906) BT_SMP: smp_process_pairing_commitment | |
D (43916) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (43916) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (43926) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (43936) BT_SMP: smp_rand_back state=0xe | |
D (43936) BT_SMP: smp_process_new_nonce round 14 | |
D (43936) BT_SMP: main smp_sm_event | |
D (43946) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (43956) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (43966) BT_SMP: smp_process_local_nonce | |
D (43966) BT_SMP: smp_calculate_local_commitment | |
D (43976) BT_SMP: random: 0x5f, round: 14, i: 1, j: 6 | |
D (43976) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (43986) BT_SMP: smp_calculate_f4 | |
D (43986) BT_SMP: aes_cipher_msg_auth_code | |
D (43986) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (43996) BT_SMP: cmac_generate_subkey | |
D (43996) BT_SMP: smp_encrypt_data | |
D (44006) BT_SMP: cmac_subkey_cont | |
D (44006) BT_SMP: leftshift_onebit | |
D (44016) BT_SMP: leftshift_onebit | |
D (44016) BT_SMP: smp_xor_128 | |
D (44016) BT_SMP: cmac_prepare_last_block | |
D (44026) BT_SMP: flag = 0 round = 5 | |
D (44026) BT_SMP: smp_xor_128 | |
D (44026) BT_SMP: cmac_aes_k_calculate | |
D (44036) BT_SMP: smp_xor_128 | |
D (44036) BT_SMP: smp_encrypt_data | |
D (44036) BT_SMP: smp_xor_128 | |
D (44046) BT_SMP: smp_encrypt_data | |
D (44046) BT_SMP: smp_xor_128 | |
D (44046) BT_SMP: smp_encrypt_data | |
D (44056) BT_SMP: smp_xor_128 | |
D (44056) BT_SMP: smp_encrypt_data | |
D (44056) BT_SMP: smp_xor_128 | |
D (44066) BT_SMP: smp_encrypt_data | |
D (44066) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (44076) BT_SMP: p_mac[0] = 0x25 p_mac[1] = 0xbb p_mac[2] = 0xf9 p_mac[3] = 0x28 | |
D (44076) BT_SMP: p_mac[4] = 0xdc p_mac[5] = 0xf1 p_mac[6] = 0x05 p_mac[7] = 0xf1 | |
D (44086) BT_SMP: local commitment calculation is completed | |
D (44096) BT_SMP: smp_send_commitment | |
D (44096) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (44106) BT_SMP: smp_build_pairing_commitment_cmd | |
D (44106) BT_SMP: smp_send_msg_to_L2CAP | |
D (44116) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (44116) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (44146) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (44146) BT_SMP: main smp_sm_event | |
D (44146) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (44156) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (44156) BT_SMP: smp_proc_rand | |
D (44166) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (44166) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (44176) BT_SMP: smp_process_peer_nonce start | |
D (44186) BT_SMP: smp_check_commitment | |
D (44186) BT_SMP: smp_calculate_peer_commitment | |
D (44186) BT_SMP: random: 0x5f, round: 14, i: 1, j: 6 | |
D (44196) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (44196) BT_SMP: smp_calculate_f4 | |
D (44206) BT_SMP: aes_cipher_msg_auth_code | |
D (44206) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (44216) BT_SMP: cmac_generate_subkey | |
D (44216) BT_SMP: smp_encrypt_data | |
D (44226) BT_SMP: cmac_subkey_cont | |
D (44226) BT_SMP: leftshift_onebit | |
D (44226) BT_SMP: leftshift_onebit | |
D (44236) BT_SMP: smp_xor_128 | |
D (44236) BT_SMP: cmac_prepare_last_block | |
D (44236) BT_SMP: flag = 0 round = 5 | |
D (44246) BT_SMP: smp_xor_128 | |
D (44246) BT_SMP: cmac_aes_k_calculate | |
D (44246) BT_SMP: smp_xor_128 | |
D (44256) BT_SMP: smp_encrypt_data | |
D (44256) BT_SMP: smp_xor_128 | |
D (44256) BT_SMP: smp_encrypt_data | |
D (44266) BT_SMP: smp_xor_128 | |
D (44266) BT_SMP: smp_encrypt_data | |
D (44276) BT_SMP: smp_xor_128 | |
D (44276) BT_SMP: smp_encrypt_data | |
D (44276) BT_SMP: smp_xor_128 | |
D (44286) BT_SMP: smp_encrypt_data | |
D (44286) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (44286) BT_SMP: p_mac[0] = 0xb5 p_mac[1] = 0x78 p_mac[2] = 0x57 p_mac[3] = 0xd1 | |
D (44296) BT_SMP: p_mac[4] = 0x60 p_mac[5] = 0xff p_mac[6] = 0xc4 p_mac[7] = 0xe2 | |
D (44306) BT_SMP: peer commitment calculation is completed | |
D (44306) BT_SMP: Commitment check succeeds | |
D (44316) BT_SMP: smp_send_rand | |
D (44316) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (44326) BT_SMP: smp_build_rand_cmd | |
D (44326) BT_SMP: smp_send_msg_to_L2CAP | |
D (44336) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (44336) BT_SMP: smp_start_nonce_generation | |
D (44346) BT_SMP: smp_process_peer_nonce end | |
D (44346) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (44356) BT_SMP: smp_rand_back state=0xd | |
D (44356) BT_SMP: smp_finish_nonce_generation | |
D (44366) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (44366) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (44376) BT_SMP: main smp_sm_event | |
D (44386) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (44396) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (44396) BT_SMP: smp_process_pairing_commitment | |
D (44406) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (44416) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (44416) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (44426) BT_SMP: smp_rand_back state=0xe | |
D (44426) BT_SMP: smp_process_new_nonce round 15 | |
D (44436) BT_SMP: main smp_sm_event | |
D (44436) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (44446) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (44456) BT_SMP: smp_process_local_nonce | |
D (44456) BT_SMP: smp_calculate_local_commitment | |
D (44466) BT_SMP: random: 0x5f, round: 15, i: 1, j: 7 | |
D (44476) BT_SMP: smp_calculate_random_input ri=0x80 | |
D (44476) BT_SMP: smp_calculate_f4 | |
D (44476) BT_SMP: aes_cipher_msg_auth_code | |
D (44486) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (44486) BT_SMP: cmac_generate_subkey | |
D (44496) BT_SMP: smp_encrypt_data | |
D (44496) BT_SMP: cmac_subkey_cont | |
D (44506) BT_SMP: leftshift_onebit | |
D (44506) BT_SMP: smp_xor_128 | |
D (44506) BT_SMP: leftshift_onebit | |
D (44516) BT_SMP: cmac_prepare_last_block | |
D (44516) BT_SMP: flag = 0 round = 5 | |
D (44516) BT_SMP: smp_xor_128 | |
D (44526) BT_SMP: cmac_aes_k_calculate | |
D (44526) BT_SMP: smp_xor_128 | |
D (44526) BT_SMP: smp_encrypt_data | |
D (44536) BT_SMP: smp_xor_128 | |
D (44536) BT_SMP: smp_encrypt_data | |
D (44536) BT_SMP: smp_xor_128 | |
D (44546) BT_SMP: smp_encrypt_data | |
D (44546) BT_SMP: smp_xor_128 | |
D (44546) BT_SMP: smp_encrypt_data | |
D (44556) BT_SMP: smp_xor_128 | |
D (44556) BT_SMP: smp_encrypt_data | |
D (44556) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (44566) BT_SMP: p_mac[0] = 0x14 p_mac[1] = 0x6c p_mac[2] = 0x6c p_mac[3] = 0xf4 | |
D (44576) BT_SMP: p_mac[4] = 0x35 p_mac[5] = 0x37 p_mac[6] = 0xf4 p_mac[7] = 0xe3 | |
D (44576) BT_SMP: local commitment calculation is completed | |
D (44586) BT_SMP: smp_send_commitment | |
D (44586) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (44596) BT_SMP: smp_build_pairing_commitment_cmd | |
D (44596) BT_SMP: smp_send_msg_to_L2CAP | |
D (44606) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (44616) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (44626) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (44626) BT_SMP: main smp_sm_event | |
D (44626) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (44636) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (44646) BT_SMP: smp_proc_rand | |
D (44646) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (44656) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (44656) BT_SMP: smp_process_peer_nonce start | |
D (44666) BT_SMP: smp_check_commitment | |
D (44666) BT_SMP: smp_calculate_peer_commitment | |
D (44676) BT_SMP: random: 0x5f, round: 15, i: 1, j: 7 | |
D (44676) BT_SMP: smp_calculate_random_input ri=0x80 | |
D (44686) BT_SMP: smp_calculate_f4 | |
D (44686) BT_SMP: aes_cipher_msg_auth_code | |
D (44696) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (44696) BT_SMP: cmac_generate_subkey | |
D (44706) BT_SMP: smp_encrypt_data | |
D (44706) BT_SMP: cmac_subkey_cont | |
D (44706) BT_SMP: leftshift_onebit | |
D (44716) BT_SMP: leftshift_onebit | |
D (44716) BT_SMP: smp_xor_128 | |
D (44716) BT_SMP: cmac_prepare_last_block | |
D (44726) BT_SMP: flag = 0 round = 5 | |
D (44726) BT_SMP: smp_xor_128 | |
D (44726) BT_SMP: cmac_aes_k_calculate | |
D (44736) BT_SMP: smp_xor_128 | |
D (44736) BT_SMP: smp_encrypt_data | |
D (44736) BT_SMP: smp_xor_128 | |
D (44746) BT_SMP: smp_encrypt_data | |
D (44746) BT_SMP: smp_xor_128 | |
D (44746) BT_SMP: smp_encrypt_data | |
D (44756) BT_SMP: smp_xor_128 | |
D (44756) BT_SMP: smp_encrypt_data | |
D (44766) BT_SMP: smp_xor_128 | |
D (44766) BT_SMP: smp_encrypt_data | |
D (44766) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (44776) BT_SMP: p_mac[0] = 0x9a p_mac[1] = 0x58 p_mac[2] = 0x0e p_mac[3] = 0x20 | |
D (44776) BT_SMP: p_mac[4] = 0xb6 p_mac[5] = 0xf5 p_mac[6] = 0x54 p_mac[7] = 0xce | |
D (44786) BT_SMP: peer commitment calculation is completed | |
D (44796) BT_SMP: Commitment check succeeds | |
D (44796) BT_SMP: smp_send_rand | |
D (44806) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (44806) BT_SMP: smp_build_rand_cmd | |
D (44806) BT_SMP: smp_send_msg_to_L2CAP | |
D (44816) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (44826) BT_SMP: smp_start_nonce_generation | |
D (44826) BT_SMP: smp_process_peer_nonce end | |
D (44836) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (44836) BT_SMP: smp_rand_back state=0xd | |
D (44846) BT_SMP: smp_finish_nonce_generation | |
D (44846) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (44856) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (44856) BT_SMP: main smp_sm_event | |
D (44866) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (44876) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (44886) BT_SMP: smp_process_pairing_commitment | |
D (44886) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (44896) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (44906) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (44906) BT_SMP: smp_rand_back state=0xe | |
D (44916) BT_SMP: smp_process_new_nonce round 16 | |
D (44916) BT_SMP: main smp_sm_event | |
D (44916) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (44926) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (44936) BT_SMP: smp_process_local_nonce | |
D (44946) BT_SMP: smp_calculate_local_commitment | |
D (44946) BT_SMP: random: 0x0b, round: 16, i: 2, j: 0 | |
D (44956) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (44956) BT_SMP: smp_calculate_f4 | |
D (44966) BT_SMP: aes_cipher_msg_auth_code | |
D (44966) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (44976) BT_SMP: cmac_generate_subkey | |
D (44976) BT_SMP: smp_encrypt_data | |
D (44976) BT_SMP: cmac_subkey_cont | |
D (44986) BT_SMP: leftshift_onebit | |
D (44986) BT_SMP: smp_xor_128 | |
D (44986) BT_SMP: leftshift_onebit | |
D (44996) BT_SMP: cmac_prepare_last_block | |
D (44996) BT_SMP: flag = 0 round = 5 | |
D (45006) BT_SMP: smp_xor_128 | |
D (45006) BT_SMP: cmac_aes_k_calculate | |
D (45006) BT_SMP: smp_xor_128 | |
D (45016) BT_SMP: smp_encrypt_data | |
D (45016) BT_SMP: smp_xor_128 | |
D (45016) BT_SMP: smp_encrypt_data | |
D (45026) BT_SMP: smp_xor_128 | |
D (45026) BT_SMP: smp_encrypt_data | |
D (45026) BT_SMP: smp_xor_128 | |
D (45036) BT_SMP: smp_encrypt_data | |
D (45036) BT_SMP: smp_xor_128 | |
D (45036) BT_SMP: smp_encrypt_data | |
D (45046) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (45046) BT_SMP: p_mac[0] = 0x16 p_mac[1] = 0x73 p_mac[2] = 0xb3 p_mac[3] = 0xa4 | |
D (45056) BT_SMP: p_mac[4] = 0x4d p_mac[5] = 0x94 p_mac[6] = 0xbf p_mac[7] = 0xc2 | |
D (45066) BT_SMP: local commitment calculation is completed | |
D (45066) BT_SMP: smp_send_commitment | |
D (45076) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (45076) BT_SMP: smp_build_pairing_commitment_cmd | |
D (45086) BT_SMP: smp_send_msg_to_L2CAP | |
D (45086) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (45096) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (45116) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (45126) BT_SMP: main smp_sm_event | |
D (45126) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (45126) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (45136) BT_SMP: smp_proc_rand | |
D (45136) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (45146) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (45156) BT_SMP: smp_process_peer_nonce start | |
D (45156) BT_SMP: smp_check_commitment | |
D (45156) BT_SMP: smp_calculate_peer_commitment | |
D (45166) BT_SMP: random: 0x0b, round: 16, i: 2, j: 0 | |
D (45166) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (45176) BT_SMP: smp_calculate_f4 | |
D (45176) BT_SMP: aes_cipher_msg_auth_code | |
D (45186) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (45186) BT_SMP: cmac_generate_subkey | |
D (45196) BT_SMP: smp_encrypt_data | |
D (45196) BT_SMP: cmac_subkey_cont | |
D (45196) BT_SMP: leftshift_onebit | |
D (45206) BT_SMP: smp_xor_128 | |
D (45206) BT_SMP: leftshift_onebit | |
D (45206) BT_SMP: smp_xor_128 | |
D (45216) BT_SMP: cmac_prepare_last_block | |
D (45216) BT_SMP: flag = 0 round = 5 | |
D (45226) BT_SMP: smp_xor_128 | |
D (45226) BT_SMP: cmac_aes_k_calculate | |
D (45226) BT_SMP: smp_xor_128 | |
D (45236) BT_SMP: smp_encrypt_data | |
D (45236) BT_SMP: smp_xor_128 | |
D (45236) BT_SMP: smp_encrypt_data | |
D (45246) BT_SMP: smp_xor_128 | |
D (45246) BT_SMP: smp_encrypt_data | |
D (45246) BT_SMP: smp_xor_128 | |
D (45256) BT_SMP: smp_encrypt_data | |
D (45256) BT_SMP: smp_xor_128 | |
D (45256) BT_SMP: smp_encrypt_data | |
D (45266) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (45266) BT_SMP: p_mac[0] = 0x28 p_mac[1] = 0xfb p_mac[2] = 0x76 p_mac[3] = 0xc6 | |
D (45276) BT_SMP: p_mac[4] = 0xe6 p_mac[5] = 0x68 p_mac[6] = 0x44 p_mac[7] = 0x2d | |
D (45286) BT_SMP: peer commitment calculation is completed | |
D (45286) BT_SMP: Commitment check succeeds | |
D (45296) BT_SMP: smp_send_rand | |
D (45296) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (45306) BT_SMP: smp_build_rand_cmd | |
D (45306) BT_SMP: smp_send_msg_to_L2CAP | |
D (45306) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (45316) BT_SMP: smp_start_nonce_generation | |
D (45326) BT_SMP: smp_process_peer_nonce end | |
D (45326) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (45336) BT_SMP: smp_rand_back state=0xd | |
D (45336) BT_SMP: smp_finish_nonce_generation | |
D (45346) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (45346) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (45356) BT_SMP: main smp_sm_event | |
D (45356) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (45366) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (45376) BT_SMP: smp_process_pairing_commitment | |
D (45386) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (45386) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (45396) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (45406) BT_SMP: smp_rand_back state=0xe | |
D (45406) BT_SMP: smp_process_new_nonce round 17 | |
D (45416) BT_SMP: main smp_sm_event | |
D (45416) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (45426) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (45436) BT_SMP: smp_process_local_nonce | |
D (45436) BT_SMP: smp_calculate_local_commitment | |
D (45446) BT_SMP: random: 0x0b, round: 17, i: 2, j: 1 | |
D (45446) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (45456) BT_SMP: smp_calculate_f4 | |
D (45456) BT_SMP: aes_cipher_msg_auth_code | |
D (45466) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (45466) BT_SMP: cmac_generate_subkey | |
D (45476) BT_SMP: smp_encrypt_data | |
D (45476) BT_SMP: cmac_subkey_cont | |
D (45476) BT_SMP: leftshift_onebit | |
D (45486) BT_SMP: smp_xor_128 | |
D (45486) BT_SMP: leftshift_onebit | |
D (45486) BT_SMP: cmac_prepare_last_block | |
D (45496) BT_SMP: flag = 0 round = 5 | |
D (45496) BT_SMP: smp_xor_128 | |
D (45496) BT_SMP: cmac_aes_k_calculate | |
D (45506) BT_SMP: smp_xor_128 | |
D (45506) BT_SMP: smp_encrypt_data | |
D (45516) BT_SMP: smp_xor_128 | |
D (45516) BT_SMP: smp_encrypt_data | |
D (45516) BT_SMP: smp_xor_128 | |
D (45526) BT_SMP: smp_encrypt_data | |
D (45526) BT_SMP: smp_xor_128 | |
D (45526) BT_SMP: smp_encrypt_data | |
D (45536) BT_SMP: smp_xor_128 | |
D (45536) BT_SMP: smp_encrypt_data | |
D (45536) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (45546) BT_SMP: p_mac[0] = 0xa5 p_mac[1] = 0x0c p_mac[2] = 0xed p_mac[3] = 0x6a | |
D (45546) BT_SMP: p_mac[4] = 0x60 p_mac[5] = 0x32 p_mac[6] = 0xc7 p_mac[7] = 0xca | |
D (45556) BT_SMP: local commitment calculation is completed | |
D (45566) BT_SMP: smp_send_commitment | |
D (45566) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (45576) BT_SMP: smp_build_pairing_commitment_cmd | |
D (45576) BT_SMP: smp_send_msg_to_L2CAP | |
D (45586) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (45586) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (45616) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (45616) BT_SMP: main smp_sm_event | |
D (45616) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (45626) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (45626) BT_SMP: smp_proc_rand | |
D (45636) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (45636) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (45646) BT_SMP: smp_process_peer_nonce start | |
D (45656) BT_SMP: smp_check_commitment | |
D (45656) BT_SMP: smp_calculate_peer_commitment | |
D (45656) BT_SMP: random: 0x0b, round: 17, i: 2, j: 1 | |
D (45666) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (45666) BT_SMP: smp_calculate_f4 | |
D (45676) BT_SMP: aes_cipher_msg_auth_code | |
D (45676) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (45686) BT_SMP: cmac_generate_subkey | |
D (45686) BT_SMP: smp_encrypt_data | |
D (45696) BT_SMP: cmac_subkey_cont | |
D (45696) BT_SMP: leftshift_onebit | |
D (45696) BT_SMP: smp_xor_128 | |
D (45706) BT_SMP: leftshift_onebit | |
D (45706) BT_SMP: cmac_prepare_last_block | |
D (45706) BT_SMP: flag = 0 round = 5 | |
D (45716) BT_SMP: smp_xor_128 | |
D (45716) BT_SMP: cmac_aes_k_calculate | |
D (45716) BT_SMP: smp_xor_128 | |
D (45726) BT_SMP: smp_encrypt_data | |
D (45726) BT_SMP: smp_xor_128 | |
D (45726) BT_SMP: smp_encrypt_data | |
D (45736) BT_SMP: smp_xor_128 | |
D (45736) BT_SMP: smp_encrypt_data | |
D (45746) BT_SMP: smp_xor_128 | |
D (45746) BT_SMP: smp_encrypt_data | |
D (45746) BT_SMP: smp_xor_128 | |
D (45756) BT_SMP: smp_encrypt_data | |
D (45756) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (45756) BT_SMP: p_mac[0] = 0x17 p_mac[1] = 0xef p_mac[2] = 0x4f p_mac[3] = 0xfc | |
D (45766) BT_SMP: p_mac[4] = 0x61 p_mac[5] = 0x5f p_mac[6] = 0xb9 p_mac[7] = 0x0c | |
D (45776) BT_SMP: peer commitment calculation is completed | |
D (45776) BT_SMP: Commitment check succeeds | |
D (45786) BT_SMP: smp_send_rand | |
D (45786) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (45796) BT_SMP: smp_build_rand_cmd | |
D (45796) BT_SMP: smp_send_msg_to_L2CAP | |
D (45806) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (45806) BT_SMP: smp_start_nonce_generation | |
D (45816) BT_SMP: smp_process_peer_nonce end | |
D (45816) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (45826) BT_SMP: smp_rand_back state=0xd | |
D (45826) BT_SMP: smp_finish_nonce_generation | |
D (45836) BT_SMP: smp_rand_back state=0xe | |
D (45836) BT_SMP: smp_process_new_nonce round 18 | |
D (45846) BT_SMP: main smp_sm_event | |
D (45846) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (45856) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (45866) BT_SMP: smp_process_local_nonce | |
D (45866) BT_SMP: smp_calculate_local_commitment | |
D (45876) BT_SMP: random: 0x0b, round: 18, i: 2, j: 2 | |
D (45876) BT_SMP: smp_calculate_random_input ri=0x80 | |
D (45886) BT_SMP: smp_calculate_f4 | |
D (45886) BT_SMP: aes_cipher_msg_auth_code | |
D (45896) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (45896) BT_SMP: cmac_generate_subkey | |
D (45906) BT_SMP: smp_encrypt_data | |
D (45906) BT_SMP: cmac_subkey_cont | |
D (45906) BT_SMP: leftshift_onebit | |
D (45916) BT_SMP: smp_xor_128 | |
D (45916) BT_SMP: leftshift_onebit | |
D (45916) BT_SMP: cmac_prepare_last_block | |
D (45926) BT_SMP: flag = 0 round = 5 | |
D (45926) BT_SMP: smp_xor_128 | |
D (45936) BT_SMP: cmac_aes_k_calculate | |
D (45936) BT_SMP: smp_xor_128 | |
D (45936) BT_SMP: smp_encrypt_data | |
D (45946) BT_SMP: smp_xor_128 | |
D (45946) BT_SMP: smp_encrypt_data | |
D (45946) BT_SMP: smp_xor_128 | |
D (45956) BT_SMP: smp_encrypt_data | |
D (45956) BT_SMP: smp_xor_128 | |
D (45956) BT_SMP: smp_encrypt_data | |
D (45966) BT_SMP: smp_xor_128 | |
D (45966) BT_SMP: smp_encrypt_data | |
D (45966) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (45976) BT_SMP: p_mac[0] = 0x00 p_mac[1] = 0x54 p_mac[2] = 0x4a p_mac[3] = 0x9e | |
D (45986) BT_SMP: p_mac[4] = 0x4e p_mac[5] = 0x4f p_mac[6] = 0x32 p_mac[7] = 0xe9 | |
D (45986) BT_SMP: local commitment calculation is completed | |
D (45996) BT_SMP: result state = SMP_STATE_WAIT_COMMITMENT | |
D (46006) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (46006) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (46016) BT_SMP: main smp_sm_event | |
D (46016) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_COMMITMENT (9)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (46026) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (46036) BT_SMP: smp_process_pairing_commitment | |
D (46036) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (46046) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (46056) BT_SMP: smp_send_commitment | |
D (46056) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (46066) BT_SMP: smp_build_pairing_commitment_cmd | |
D (46066) BT_SMP: smp_send_msg_to_L2CAP | |
D (46076) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (46096) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (46096) BT_SMP: main smp_sm_event | |
D (46096) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (46106) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (46106) BT_SMP: smp_proc_rand | |
D (46116) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (46116) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (46126) BT_SMP: smp_process_peer_nonce start | |
D (46136) BT_SMP: smp_check_commitment | |
D (46136) BT_SMP: smp_calculate_peer_commitment | |
D (46136) BT_SMP: random: 0x0b, round: 18, i: 2, j: 2 | |
D (46146) BT_SMP: smp_calculate_random_input ri=0x80 | |
D (46146) BT_SMP: smp_calculate_f4 | |
D (46156) BT_SMP: aes_cipher_msg_auth_code | |
D (46156) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (46166) BT_SMP: cmac_generate_subkey | |
D (46166) BT_SMP: smp_encrypt_data | |
D (46176) BT_SMP: cmac_subkey_cont | |
D (46176) BT_SMP: leftshift_onebit | |
D (46176) BT_SMP: smp_xor_128 | |
D (46186) BT_SMP: leftshift_onebit | |
D (46186) BT_SMP: smp_xor_128 | |
D (46186) BT_SMP: cmac_prepare_last_block | |
D (46196) BT_SMP: flag = 0 round = 5 | |
D (46196) BT_SMP: smp_xor_128 | |
D (46196) BT_SMP: cmac_aes_k_calculate | |
D (46206) BT_SMP: smp_xor_128 | |
D (46206) BT_SMP: smp_encrypt_data | |
D (46216) BT_SMP: smp_xor_128 | |
D (46216) BT_SMP: smp_encrypt_data | |
D (46216) BT_SMP: smp_xor_128 | |
D (46226) BT_SMP: smp_encrypt_data | |
D (46226) BT_SMP: smp_xor_128 | |
D (46226) BT_SMP: smp_encrypt_data | |
D (46236) BT_SMP: smp_xor_128 | |
D (46236) BT_SMP: smp_encrypt_data | |
D (46236) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (46246) BT_SMP: p_mac[0] = 0x91 p_mac[1] = 0x67 p_mac[2] = 0x69 p_mac[3] = 0xe2 | |
D (46246) BT_SMP: p_mac[4] = 0x17 p_mac[5] = 0xe7 p_mac[6] = 0x2b p_mac[7] = 0x5f | |
D (46256) BT_SMP: peer commitment calculation is completed | |
D (46266) BT_SMP: Commitment check succeeds | |
D (46266) BT_SMP: smp_send_rand | |
D (46276) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (46276) BT_SMP: smp_build_rand_cmd | |
D (46276) BT_SMP: smp_send_msg_to_L2CAP | |
D (46286) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (46296) BT_SMP: smp_start_nonce_generation | |
D (46306) BT_SMP: smp_process_peer_nonce end | |
D (46306) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (46306) BT_SMP: smp_rand_back state=0xd | |
D (46316) BT_SMP: smp_finish_nonce_generation | |
D (46316) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (46326) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d | |
D (46326) BT_SMP: main smp_sm_event | |
D (46336) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)] | |
D (46346) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8) | |
D (46356) BT_SMP: smp_process_pairing_commitment | |
D (46356) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f | |
D (46366) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f | |
D (46376) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START | |
D (46376) BT_SMP: smp_rand_back state=0xe | |
D (46386) BT_SMP: smp_process_new_nonce round 19 | |
D (46386) BT_SMP: main smp_sm_event | |
D (46386) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)] | |
D (46406) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9) | |
D (46406) BT_SMP: smp_process_local_nonce | |
D (46416) BT_SMP: smp_calculate_local_commitment | |
D (46416) BT_SMP: random: 0x0b, round: 19, i: 2, j: 3 | |
D (46426) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (46426) BT_SMP: smp_calculate_f4 | |
D (46436) BT_SMP: aes_cipher_msg_auth_code | |
D (46436) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (46446) BT_SMP: cmac_generate_subkey | |
D (46446) BT_SMP: smp_encrypt_data | |
D (46456) BT_SMP: cmac_subkey_cont | |
D (46456) BT_SMP: leftshift_onebit | |
D (46456) BT_SMP: leftshift_onebit | |
D (46466) BT_SMP: smp_xor_128 | |
D (46466) BT_SMP: cmac_prepare_last_block | |
D (46466) BT_SMP: flag = 0 round = 5 | |
D (46476) BT_SMP: smp_xor_128 | |
D (46476) BT_SMP: cmac_aes_k_calculate | |
D (46476) BT_SMP: smp_xor_128 | |
D (46486) BT_SMP: smp_encrypt_data | |
D (46486) BT_SMP: smp_xor_128 | |
D (46486) BT_SMP: smp_encrypt_data | |
D (46496) BT_SMP: smp_xor_128 | |
D (46496) BT_SMP: smp_encrypt_data | |
D (46496) BT_SMP: smp_xor_128 | |
D (46506) BT_SMP: smp_encrypt_data | |
D (46506) BT_SMP: smp_xor_128 | |
D (46506) BT_SMP: smp_encrypt_data | |
D (46516) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (46516) BT_SMP: p_mac[0] = 0x16 p_mac[1] = 0xa8 p_mac[2] = 0x7a p_mac[3] = 0x7d | |
D (46526) BT_SMP: p_mac[4] = 0xf2 p_mac[5] = 0x4a p_mac[6] = 0x13 p_mac[7] = 0xed | |
D (46536) BT_SMP: local commitment calculation is completed | |
D (46536) BT_SMP: smp_send_commitment | |
D (46546) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf | |
D (46546) BT_SMP: smp_build_pairing_commitment_cmd | |
D (46556) BT_SMP: smp_send_msg_to_L2CAP | |
D (46556) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10) | |
D (46566) BT_SMP: result state = SMP_STATE_WAIT_NONCE | |
D (46586) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (46596) BT_SMP: main smp_sm_event | |
D (46596) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)] | |
D (46596) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11) | |
D (46606) BT_SMP: smp_proc_rand | |
D (46606) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04 | |
D (46616) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04 | |
D (46626) BT_SMP: smp_process_peer_nonce start | |
D (46626) BT_SMP: smp_check_commitment | |
D (46626) BT_SMP: smp_calculate_peer_commitment | |
D (46636) BT_SMP: random: 0x0b, round: 19, i: 2, j: 3 | |
D (46636) BT_SMP: smp_calculate_random_input ri=0x81 | |
D (46646) BT_SMP: smp_calculate_f4 | |
D (46646) BT_SMP: aes_cipher_msg_auth_code | |
D (46656) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (46656) BT_SMP: cmac_generate_subkey | |
D (46666) BT_SMP: smp_encrypt_data | |
D (46666) BT_SMP: cmac_subkey_cont | |
D (46666) BT_SMP: leftshift_onebit | |
D (46676) BT_SMP: leftshift_onebit | |
D (46676) BT_SMP: cmac_prepare_last_block | |
D (46686) BT_SMP: flag = 0 round = 5 | |
D (46686) BT_SMP: smp_xor_128 | |
D (46686) BT_SMP: cmac_aes_k_calculate | |
D (46696) BT_SMP: smp_xor_128 | |
D (46696) BT_SMP: smp_encrypt_data | |
D (46696) BT_SMP: smp_xor_128 | |
D (46706) BT_SMP: smp_encrypt_data | |
D (46706) BT_SMP: smp_xor_128 | |
D (46706) BT_SMP: smp_encrypt_data | |
D (46716) BT_SMP: smp_xor_128 | |
D (46716) BT_SMP: smp_encrypt_data | |
D (46716) BT_SMP: smp_xor_128 | |
D (46726) BT_SMP: smp_encrypt_data | |
D (46726) BT_SMP: tlen = 16 p_mac = 0x3ffccd04 | |
D (46736) BT_SMP: p_mac[0] = 0xde p_mac[1] = 0xed p_mac[2] = 0xcd p_mac[3] = 0xfb | |
D (46736) BT_SMP: p_mac[4] = 0xaa p_mac[5] = 0x5a p_mac[6] = 0xef p_mac[7] = 0x93 | |
D (46746) BT_SMP: peer commitment calculation is completed | |
D (46756) BT_SMP: Commitment check succeeds | |
D (46756) BT_SMP: smp_send_rand | |
D (46756) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4 | |
D (46766) BT_SMP: smp_build_rand_cmd | |
D (46766) BT_SMP: smp_send_msg_to_L2CAP | |
D (46776) BT_SMP: main smp_sm_event | |
D (46776) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS2_START (11)], Event: [SEC_CONN_PHASE1_CMPLT_EVT (32)] | |
D (46786) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_WAIT_DHK_CHECK(12) | |
D (46796) BT_SMP: smp_calculate_local_dhkey_check | |
D (46806) BT_SMP: smp_calculate_f5_mackey_and_long_term_key | |
D (46806) BT_SMP: smp_collect_local_ble_address | |
D (46816) BT_SMP: smp_collect_peer_ble_address | |
D (46816) BT_SMP: smp_calculate_f5 | |
D (46816) BT_SMP: smp_calculate_f5_key | |
D (46826) BT_SMP: aes_cipher_msg_auth_code | |
D (46826) BT_SMP: AES128_CMAC started, allocate buffer size = 32 | |
D (46836) BT_SMP: cmac_generate_subkey | |
D (46836) BT_SMP: smp_encrypt_data | |
D (46846) BT_SMP: cmac_subkey_cont | |
D (46846) BT_SMP: leftshift_onebit | |
D (46846) BT_SMP: smp_xor_128 | |
D (46856) BT_SMP: leftshift_onebit | |
D (46856) BT_SMP: cmac_prepare_last_block | |
D (46856) BT_SMP: flag = 1 round = 2 | |
D (46866) BT_SMP: smp_xor_128 | |
D (46866) BT_SMP: cmac_aes_k_calculate | |
D (46866) BT_SMP: smp_xor_128 | |
D (46876) BT_SMP: smp_encrypt_data | |
D (46876) BT_SMP: smp_xor_128 | |
D (46876) BT_SMP: smp_encrypt_data | |
D (46886) BT_SMP: tlen = 16 p_mac = 0x3ffccc54 | |
D (46886) BT_SMP: p_mac[0] = 0x78 p_mac[1] = 0x79 p_mac[2] = 0x44 p_mac[3] = 0xc6 | |
D (46896) BT_SMP: p_mac[4] = 0xe3 p_mac[5] = 0x8e p_mac[6] = 0xaf p_mac[7] = 0xc7 | |
D (46906) BT_SMP: smp_calculate_f5_mackey_or_long_term_key | |
D (46906) BT_SMP: aes_cipher_msg_auth_code | |
D (46916) BT_SMP: AES128_CMAC started, allocate buffer size = 64 | |
D (46916) BT_SMP: cmac_generate_subkey | |
D (46926) BT_SMP: smp_encrypt_data | |
D (46926) BT_SMP: cmac_subkey_cont | |
D (46926) BT_SMP: leftshift_onebit | |
D (46936) BT_SMP: smp_xor_128 | |
D (46936) BT_SMP: leftshift_onebit | |
D (46946) BT_SMP: cmac_prepare_last_block | |
D (46946) BT_SMP: flag = 0 round = 4 | |
D (46946) BT_SMP: smp_xor_128 | |
D (46956) BT_SMP: cmac_aes_k_calculate | |
D (46956) BT_SMP: smp_xor_128 | |
D (46956) BT_SMP: smp_encrypt_data | |
D (46966) BT_SMP: smp_xor_128 | |
D (46966) BT_SMP: smp_encrypt_data | |
D (46966) BT_SMP: smp_xor_128 | |
D (46976) BT_SMP: smp_encrypt_data | |
D (46976) BT_SMP: smp_xor_128 | |
D (46976) BT_SMP: smp_encrypt_data | |
D (46986) BT_SMP: tlen = 16 p_mac = 0x3ffccc34 | |
D (46986) BT_SMP: p_mac[0] = 0xbf p_mac[1] = 0x1e p_mac[2] = 0x42 p_mac[3] = 0xa4 | |
D (46996) BT_SMP: p_mac[4] = 0x0a p_mac[5] = 0xf5 p_mac[6] = 0xd1 p_mac[7] = 0x60 | |
D (47006) BT_SMP: smp_calculate_f5_mackey_or_long_term_key | |
D (47006) BT_SMP: aes_cipher_msg_auth_code | |
D (47016) BT_SMP: AES128_CMAC started, allocate buffer size = 64 | |
D (47016) BT_SMP: cmac_generate_subkey | |
D (47026) BT_SMP: smp_encrypt_data | |
D (47026) BT_SMP: cmac_subkey_cont | |
D (47026) BT_SMP: leftshift_onebit | |
D (47036) BT_SMP: smp_xor_128 | |
D (47036) BT_SMP: leftshift_onebit | |
D (47036) BT_SMP: cmac_prepare_last_block | |
D (47046) BT_SMP: flag = 0 round = 4 | |
D (47046) BT_SMP: smp_xor_128 | |
D (47056) BT_SMP: cmac_aes_k_calculate | |
D (47056) BT_SMP: smp_xor_128 | |
D (47056) BT_SMP: smp_encrypt_data | |
D (47066) BT_SMP: smp_xor_128 | |
D (47066) BT_SMP: smp_encrypt_data | |
D (47066) BT_SMP: smp_xor_128 | |
D (47076) BT_SMP: smp_encrypt_data | |
D (47076) BT_SMP: smp_xor_128 | |
D (47076) BT_SMP: smp_encrypt_data | |
D (47086) BT_SMP: tlen = 16 p_mac = 0x3ffccc34 | |
D (47086) BT_SMP: p_mac[0] = 0xa5 p_mac[1] = 0xf2 p_mac[2] = 0x3f p_mac[3] = 0x06 | |
D (47096) BT_SMP: p_mac[4] = 0x9b p_mac[5] = 0x29 p_mac[6] = 0xe0 p_mac[7] = 0x2a | |
D (47106) BT_SMP: smp_calculate_f5_mackey_and_long_term_key is completed | |
D (47106) BT_SMP: smp_collect_local_io_capabilities | |
D (47116) BT_SMP: smp_collect_local_ble_address | |
D (47116) BT_SMP: smp_collect_peer_ble_address | |
D (47126) BT_SMP: smp_calculate_f6 | |
D (47126) BT_SMP: aes_cipher_msg_auth_code | |
D (47136) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (47136) BT_SMP: cmac_generate_subkey | |
D (47146) BT_SMP: smp_encrypt_data | |
D (47146) BT_SMP: cmac_subkey_cont | |
D (47146) BT_SMP: leftshift_onebit | |
D (47156) BT_SMP: smp_xor_128 | |
D (47156) BT_SMP: leftshift_onebit | |
D (47156) BT_SMP: smp_xor_128 | |
D (47166) BT_SMP: cmac_prepare_last_block | |
D (47166) BT_SMP: flag = 0 round = 5 | |
D (47166) BT_SMP: smp_xor_128 | |
D (47176) BT_SMP: cmac_aes_k_calculate | |
D (47176) BT_SMP: smp_xor_128 | |
D (47176) BT_SMP: smp_encrypt_data | |
D (47186) BT_SMP: smp_xor_128 | |
D (47186) BT_SMP: smp_encrypt_data | |
D (47196) BT_SMP: smp_xor_128 | |
D (47196) BT_SMP: smp_encrypt_data | |
D (47196) BT_SMP: smp_xor_128 | |
D (47206) BT_SMP: smp_encrypt_data | |
D (47206) BT_SMP: smp_xor_128 | |
D (47206) BT_SMP: smp_encrypt_data | |
D (47216) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4 | |
D (47216) BT_SMP: p_mac[0] = 0xd8 p_mac[1] = 0x11 p_mac[2] = 0x5c p_mac[3] = 0x38 | |
D (47226) BT_SMP: p_mac[4] = 0x03 p_mac[5] = 0x0f p_mac[6] = 0x6d p_mac[7] = 0x76 | |
D (47236) BT_SMP: local DHKey check calculation is completed | |
D (47236) BT_SMP: smp_phase_2_dhkey_checks_are_present | |
D (47246) BT_SMP: result state = SMP_STATE_WAIT_DHK_CHECK | |
D (47246) BT_SMP: smp_process_peer_nonce end | |
D (47256) BT_SMP: result state = SMP_STATE_WAIT_DHK_CHECK | |
D (47256) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (47266) BT_SMP: main smp_sm_event | |
D (47266) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_DHK_CHECK (12)], Event: [PAIR_DHKEY_CHECK_EVT (13)] | |
D (47276) BT_SMP: State change: SMP_STATE_WAIT_DHK_CHECK(12) ==> SMP_STATE_DHK_CHECK(13) | |
D (47286) BT_SMP: smp_process_dhkey_check | |
D (47286) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0d | |
D (47296) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0d | |
D (47306) BT_SMP: smp_calculate_peer_dhkey_check | |
D (47306) BT_SMP: smp_collect_peer_io_capabilities | |
D (47316) BT_SMP: smp_collect_local_ble_address | |
D (47316) BT_SMP: smp_collect_peer_ble_address | |
D (47326) BT_SMP: smp_calculate_f6 | |
D (47326) BT_SMP: aes_cipher_msg_auth_code | |
D (47326) BT_SMP: AES128_CMAC started, allocate buffer size = 80 | |
D (47336) BT_SMP: cmac_generate_subkey | |
D (47336) BT_SMP: smp_encrypt_data | |
D (47346) BT_SMP: cmac_subkey_cont | |
D (47346) BT_SMP: leftshift_onebit | |
D (47346) BT_SMP: smp_xor_128 | |
D (47356) BT_SMP: leftshift_onebit | |
D (47356) BT_SMP: smp_xor_128 | |
D (47356) BT_SMP: cmac_prepare_last_block | |
D (47366) BT_SMP: flag = 0 round = 5 | |
D (47366) BT_SMP: smp_xor_128 | |
D (47366) BT_SMP: cmac_aes_k_calculate | |
D (47376) BT_SMP: smp_xor_128 | |
D (47376) BT_SMP: smp_encrypt_data | |
D (47386) BT_SMP: smp_xor_128 | |
D (47386) BT_SMP: smp_encrypt_data | |
D (47386) BT_SMP: smp_xor_128 | |
D (47396) BT_SMP: smp_encrypt_data | |
D (47396) BT_SMP: smp_xor_128 | |
D (47396) BT_SMP: smp_encrypt_data | |
D (47406) BT_SMP: smp_xor_128 | |
D (47406) BT_SMP: smp_encrypt_data | |
D (47406) BT_SMP: tlen = 16 p_mac = 0x3ffccd14 | |
D (47416) BT_SMP: p_mac[0] = 0x8c p_mac[1] = 0xdb p_mac[2] = 0x3f p_mac[3] = 0xc4 | |
D (47426) BT_SMP: p_mac[4] = 0x90 p_mac[5] = 0xeb p_mac[6] = 0x7b p_mac[7] = 0x81 | |
D (47426) BT_SMP: peer DHKey check calculation is completed | |
D (47436) BT_SMP: main smp_sm_event | |
D (47436) BT_SMP: SMP Role: Slave State: [SMP_STATE_DHK_CHECK (13)], Event: [SEC_CONN_KEY_READY_EVT (37)] | |
D (47446) BT_SMP: State change: SMP_STATE_DHK_CHECK(13) ==> SMP_STATE_DHK_CHECK(13) | |
D (47456) BT_SMP: smp_match_dhkey_checks | |
D (47456) BT_SMP: dhkey checks match | |
D (47466) BT_SMP: main smp_sm_event | |
D (47466) BT_SMP: SMP Role: Slave State: [SMP_STATE_DHK_CHECK (13)], Event: [PAIR_DHKEY_CHECK_EVT (13)] | |
D (47476) BT_SMP: State change: SMP_STATE_DHK_CHECK(13) ==> SMP_STATE_ENCRYPTION_PENDING(14) | |
D (47486) BT_SMP: smp_send_dhkey_check | |
D (47486) BT_SMP: smp_send_cmd on l2cap cmd_code=0xd | |
D (47496) BT_SMP: smp_build_pair_dhkey_check_cmd | |
D (47496) BT_SMP: smp_send_msg_to_L2CAP | |
D (47506) BT_SMP: result state = SMP_STATE_ENCRYPTION_PENDING | |
D (47506) BT_SMP: result state = SMP_STATE_ENCRYPTION_PENDING | |
D (47516) BT_SMP: result state = SMP_STATE_ENCRYPTION_PENDING | |
D (47536) BT_SMP: smp_proc_ltk_request state = 14 | |
D (47536) BT_SMP: main smp_sm_event | |
D (47536) BT_SMP: SMP Role: Slave State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [ENC_REQ_EVT (24)] | |
D (47546) BT_SMP: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14) | |
D (47556) BT_SMP: smp_generate_stk | |
W (47556) BT_SMP: FOR LE SC LTK IS USED INSTEAD OF STK | |
D (47556) BT_SMP: smp_process_stk | |
D (47566) BT_SMP: smp_mask_enc_key | |
D (47566) BT_SMP: main smp_sm_event | |
D (47576) BT_SMP: SMP Role: Slave State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [KEY_READY_EVT (16)] | |
D (47586) BT_SMP: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14) | |
D (47586) BT_SMP: smp_send_ltk_reply | |
D (47596) BT_SMP: result state = SMP_STATE_ENCRYPTION_PENDING | |
D (47596) BT_SMP: result state = SMP_STATE_ENCRYPTION_PENDING | |
D (47626) BT_SMP: smp_link_encrypted encr_enable=1 | |
D (47626) BT_SMP: main smp_sm_event | |
D (47626) BT_SMP: SMP Role: Slave State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [ENCRYPTED_EVT (17)] | |
D (47636) BT_SMP: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14) | |
D (47636) BT_SMP: smp_check_auth_req rcvs enc_enable=1 i_keys=0x3 r_keys=0x3 (i-initiator r-responder) | |
D (47646) BT_SMP: smp_check_auth_req rcvs upgrades: i_keys=0x3 r_keys=0x3 (i-initiator r-responder) | |
D (47656) BT_SMP: main smp_sm_event | |
D (47666) BT_SMP: SMP Role: Slave State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [BOND_REQ_EVT (25)] | |
D (47676) BT_SMP: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_BOND_PENDING(15) | |
D (47686) BT_SMP: | |
smp_key_distribution role=1 (0-master) r_keys=0x3 i_keys=0x3 | |
D (47686) BT_SMP: smp_key_pick_key key_to_dist=0x3 | |
D (47696) BT_SMP: key to send = 03, i = 0 | |
D (47696) BT_SMP: smp_distribute_act[0] | |
D (47706) BT_SMP: smp_generate_ltk | |
D (47706) BT_SMP: smp_process_secure_connection_long_term_key | |
D (47716) BT_SMP: smp_save_secure_connections_long_term_key-Save LTK as local LTK key | |
D (47716) BT_SMP: smp_save_secure_connections_long_term_key-Save LTK as peer LTK key | |
D (47726) BT_SMP: smp_update_key_mask before update role=1 recv=0 local_i_key = 03, local_r_key = 03 | |
D (47736) BT_SMP: updated local_i_key = 02, local_r_key = 02 | |
D (47746) BT_SMP: | |
smp_key_distribution role=1 (0-master) r_keys=0x2 i_keys=0x2 | |
D (47756) BT_SMP: smp_key_pick_key key_to_dist=0x2 | |
D (47756) BT_SMP: key to send = 02, i = 0 | |
D (47756) BT_SMP: key to send = 02, i = 1 | |
D (47766) BT_SMP: smp_distribute_act[1] | |
D (47766) BT_SMP: smp_send_id_info | |
D (47776) BT_SMP: smp_update_key_mask before update role=1 recv=0 local_i_key = 02, local_r_key = 02 | |
D (47786) BT_SMP: updated local_i_key = 02, local_r_key = 00 | |
D (47786) BT_SMP: smp_send_cmd on l2cap cmd_code=0x8 | |
D (47796) BT_SMP: smp_build_identity_info_cmd | |
D (47796) BT_SMP: smp_send_msg_to_L2CAP | |
D (47806) BT_SMP: smp_send_cmd on l2cap cmd_code=0x9 | |
D (47806) BT_SMP: smp_build_id_addr_cmd | |
D (47816) BT_SMP: smp_send_msg_to_L2CAP | |
D (47816) BT_SMP: smp_key_distribution_by_transport | |
D (47816) BT_SMP: | |
smp_key_distribution role=1 (0-master) r_keys=0x0 i_keys=0x2 | |
D (47826) BT_SMP: smp_key_pick_key key_to_dist=0x0 | |
D (47836) BT_SMP: key to send = 00, i = 0 | |
D (47836) BT_SMP: key to send = 00, i = 1 | |
D (47846) BT_SMP: key to send = 00, i = 2 | |
D (47846) BT_SMP: key to send = 00, i = 3 | |
D (47846) BT_SMP: result state = SMP_STATE_BOND_PENDING | |
D (47856) BT_SMP: result state = SMP_STATE_BOND_PENDING | |
D (47866) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (47866) BT_SMP: main smp_sm_event | |
D (47866) BT_SMP: SMP Role: Slave State: [SMP_STATE_BOND_PENDING (15)], Event: [ID_INFO_EVT (8)] | |
D (47876) BT_SMP: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15) | |
D (47886) BT_SMP: smp_proc_id_info | |
D (47886) BT_SMP: smp_key_distribution_by_transport | |
D (47896) BT_SMP: | |
smp_key_distribution role=1 (0-master) r_keys=0x0 i_keys=0x2 | |
D (47906) BT_SMP: smp_key_pick_key key_to_dist=0x0 | |
D (47906) BT_SMP: key to send = 00, i = 0 | |
D (47916) BT_SMP: key to send = 00, i = 1 | |
D (47916) BT_SMP: key to send = 00, i = 2 | |
D (47916) BT_SMP: key to send = 00, i = 3 | |
D (47926) BT_SMP: result state = SMP_STATE_BOND_PENDING | |
D (47926) BT_SMP: | |
SMDBG l2c smp_data_received | |
D (47936) BT_SMP: main smp_sm_event | |
D (47936) BT_SMP: SMP Role: Slave State: [SMP_STATE_BOND_PENDING (15)], Event: [ID_ADDR_EVT (9)] | |
D (47946) BT_SMP: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15) | |
D (47956) BT_SMP: smp_proc_id_addr | |
D (47956) BT_SMP: smp_update_key_mask before update role=1 recv=1 local_i_key = 02, local_r_key = 00 | |
D (47966) BT_SMP: updated local_i_key = 00, local_r_key = 00 | |
D (47976) BT_SMP: smp_key_distribution_by_transport | |
D (47976) BT_SMP: | |
smp_key_distribution role=1 (0-master) r_keys=0x0 i_keys=0x0 | |
D (47986) BT_SMP: smp_key_pick_key key_to_dist=0x0 | |
D (47996) BT_SMP: key to send = 00, i = 0 | |
D (47996) BT_SMP: key to send = 00, i = 1 | |
D (47996) BT_SMP: key to send = 00, i = 2 | |
D (48006) BT_SMP: key to send = 00, i = 3 | |
D (48006) BT_SMP: main smp_sm_event | |
D (48016) BT_SMP: SMP Role: Slave State: [SMP_STATE_BOND_PENDING (15)], Event: [AUTH_CMPL_EVT (23)] | |
D (48026) BT_SMP: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_IDLE(0) | |
D (48026) BT_SMP: smp_send_pair_fail status=0 failure=0 | |
D (48036) BT_SMP: smp_proc_pairing_cmpl | |
D (48036) BT_SMP: send SMP_COMPLT_EVT reason=0x0 sec_level=0x4 | |
D (48046) BT_SMP: smp_reset_control_value | |
D (48046) BT_SMP: smp_remove_fixed_channel | |
D (48056) BT_SMP: smp_cb_cleanup | |
D (48056) BT_SMP: result state = SMP_STATE_IDLE | |
D (48066) BT_SMP: result state = SMP_STATE_IDLE | |
D (48066) nvs: nvs_open_from_partition bt_config.conf 1 | |
D (48076) nvs: nvs_set_blob bt_cfg_key0 510 | |
D (48096) nvs: nvs_close 5 | |
D (48096) nvs: nvs_open_from_partition bt_config.conf 1 | |
D (48096) nvs: nvs_set_blob bt_cfg_key0 524 | |
D (48116) nvs: nvs_close 6 | |
D (48126) nvs: nvs_open_from_partition bt_config.conf 1 | |
D (48126) nvs: nvs_set_blob bt_cfg_key0 607 | |
D (48146) nvs: nvs_close 7$GP | |
D (48146) nvs: nvs_open_from_partition bt_config.conf 1 | |
D (48146) nvs: nvs_set_blob bt_cfg_key0 667 | |
D (48226) nvs: nvs_close 8 | |
D (48236) nvs: nvs_open_from_partition bt_config.conf 1 | |
D (48236) nvs: nvs_set_blob bt_cfg_key0 722 | |
D (48266) nvs: nvs_close 9 | |
D (48266) nvs: nvs_open_from_partition bt_config.conf 1 | |
D (48266) nvs: nvs_set_blob bt_cfg_key0 736 | |
D (48286) nvs: nvs_close 10 | |
I (48286) HID_LE_PRF: GATT EVT 1 | |
I (48286) HID_LE_PRF: GATT EVT 1 | |
I (48286) HID_LE_PRF: GATT EVT 1 | |
I (48296) HID_DEMO: remote BD_ADDR: 8c85908a6d15 | |
I (48296) HID_DEMO: address type = 0 | |
I (48306) HID_DEMO: pair status = success | |
I (48696) HID_LE_PRF: GATT EVT 1 | |
I (48726) HID_LE_PRF: GATT EVT 1 | |
I (48756) HID_LE_PRF: GATT EVT 1 | |
I (48786) HID_LE_PRF: GATT EVT 1 | |
I (48816) HID_LE_PRF: GATT EVT 1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment