Skip to content

Instantly share code, notes, and snippets.

@rampadc
Created July 29, 2020 14:43
Show Gist options
  • Save rampadc/e20eedeb66db39a24a00e78d7e59d8ba to your computer and use it in GitHub Desktop.
Save rampadc/e20eedeb66db39a24a00e78d7e59d8ba to your computer and use it in GitHub Desktop.
esp32_mouse_keyboard: successfully bonded on Catalina 10.15.6
I (2456) EXT_UART: external UART processing task started
I (2466) HID_LE_PRF: GATT EVT 12
D (13446) BT_SMP: SMDBG l2c smp_connect_callback
I (13446) HID_LE_PRF: HID connection establish, conn_id = 0
I (13446) HID_DEMO: ESP_HIDD_EVENT_BLE_CONNECT
I (13446) HID_LE_PRF: GATT EVT 4
D (13456) BT_SMP: SMP_Pair state=0 br_state=0 flag=0x0
D (13456) BT_SMP: SMDBG l2c smp_connect_callback
D (13466) BT_SMP: smp_connect_callback() for pairing BDA: 8c85908a6d15 Event: connected
D (13476) BT_SMP: main smp_sm_event
D (13476) BT_SMP: SMP Role: Slave State: [SMP_STATE_IDLE (0)], Event: [L2CAP_CONN_EVT (18)]
D (13486) BT_SMP: State change: SMP_STATE_IDLE(0) ==> SMP_STATE_WAIT_APP_RSP(1)
D (13486) BT_SMP: smp_send_app_cback p_cb->cb_evt=1
D (13496) BT_SMP: io_cap = 4
D (13496) BT_SMP: callback_rc=0 p_cb->cb_evt=1
D (13506) BT_SMP: rcvd auth_req: 0x0d, io_cap: 2 loc_oob_flag: 0 loc_enc_size: 16,local_i_key: 0x03, local_r_key: 0x03
D (13516) BT_SMP: lmp_version_below LMP version 8 < 8
D (13526) BT_SMP: set auth_req: 0x0d, local_i_key: 0x03, local_r_key: 0x03
D (13526) BT_SMP: main smp_sm_event
D (13536) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_APP_RSP (1)], Event: [API_IO_RSP_EVT (20)]
D (13546) BT_SMP: State change: SMP_STATE_WAIT_APP_RSP(1) ==> SMP_STATE_PAIR_REQ_RSP(3)
D (13546) BT_SMP: smp_process_io_response
D (13556) BT_SMP: State change: SMP_STATE_PAIR_REQ_RSP(3) ==> SMP_STATE_SEC_REQ_PENDING(2)
D (13566) BT_SMP: smp_send_cmd on l2cap cmd_code=0xb
D (13566) BT_SMP: smp_build_security_request
D (13576) BT_SMP: opcode=11 auth_req=0xd
D (13576) BT_SMP: smp_send_msg_to_L2CAP
D (13586) BT_SMP: result state = SMP_STATE_SEC_REQ_PENDING
D (13586) BT_SMP: smp_send_app_cback return
D (13586) BT_SMP: result state = SMP_STATE_SEC_REQ_PENDING
D (13606) BT_SMP:
SMDBG l2c smp_data_received
D (13606) BT_SMP: main smp_sm_event
D (13606) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_REQ_PENDING (2)], Event: [PAIRING_REQ_EVT (1)]
D (13616) BT_SMP: State change: SMP_STATE_SEC_REQ_PENDING(2) ==> SMP_STATE_PAIR_REQ_RSP(3)
D (13626) BT_SMP: smp_proc_pair_cmd
D (13626) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x01
D (13636) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x01
D (13636) BT_SMP: smp_pairing_request_response_parameters_are_valid for cmd code 0x01
D (13646) BT_SMP: smp_select_association_model
D (13656) BT_SMP: smp_select_association_model p_cb->peer_io_caps = 4 p_cb->local_io_capability = 2
D (13666) BT_SMP: smp_select_association_model p_cb->peer_oob_flag = 0 p_cb->loc_oob_flag = 0
D (13666) BT_SMP: smp_select_association_model p_cb->peer_auth_req = 0x0d p_cb->loc_auth_req = 0x0d
D (13676) BT_SMP: smp_select_association_model p_cb->secure_connections_only_mode_required = FALSE
D (13686) BT_SMP: use_sc_process = 1
D (13696) BT_SMP: smp_select_association_model_secure_connections
D (13696) BT_SMP: smp_get_auth_mode model 6
D (13706) BT_SMP: smp_send_pair_rsp
D (13706) BT_SMP: smp_send_cmd on l2cap cmd_code=0x2
D (13716) BT_SMP: smp_build_pairing_cmd
D (13716) BT_SMP: smp_send_msg_to_L2CAP
D (13726) BT_SMP: smp_decide_association_model Association Model = 6
D (13726) BT_SMP: sec_level=0
D (13726) BT_SMP: main smp_sm_event
D (13736) BT_SMP: SMP Role: Slave State: [SMP_STATE_PAIR_REQ_RSP (3)], Event: [PUBLIC_KEY_EXCHANGE_REQ_EVT (27)]
D (13746) BT_SMP: State change: SMP_STATE_PAIR_REQ_RSP(3) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
D (13756) BT_SMP: smp_create_private_key
D (13756) BT_SMP: result state = SMP_STATE_PUBLIC_KEY_EXCH
D (13766) BT_SMP: result state = SMP_STATE_PUBLIC_KEY_EXCH
D (13766) BT_SMP:
SMDBG l2c smp_data_received
D (13776) BT_SMP: main smp_sm_event
D (13776) BT_SMP: SMP Role: Slave State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [PAIR_PUBLIC_KEY_EVT (12)]
D (13786) BT_SMP: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
D (13796) BT_SMP: smp_process_pairing_public_key
D (13796) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0c
D (13806) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0c
D (13816) BT_SMP: smp_wait_for_both_public_keys
D (13816) BT_SMP: result state = SMP_STATE_PUBLIC_KEY_EXCH
D (13826) BT_SMP: smp_rand_back state=0x9
D (13826) BT_SMP: smp_continue_private_key_creation state=0x9
D (13836) BT_SMP: smp_rand_back state=0xa
D (13836) BT_SMP: smp_continue_private_key_creation state=0xa
D (13846) BT_SMP: smp_rand_back state=0xb
D (13846) BT_SMP: smp_continue_private_key_creation state=0xb
D (13856) BT_SMP: smp_rand_back state=0xc
D (13856) BT_SMP: smp_continue_private_key_creation state=0xc
D (13866) BT_SMP: smp_process_private_key
D (13956) BT_SMP: main smp_sm_event
D (13956) BT_SMP: SMP Role: Slave State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [LOCAL_PUBLIC_KEY_CRTD_EVT (28)]
D (13966) BT_SMP: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
D (13966) BT_SMP: smp_wait_for_both_public_keys
D (13976) BT_SMP: main smp_sm_event
D (13976) BT_SMP: SMP Role: Slave State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [BOTH_PUBLIC_KEYS_RCVD_EVT (29)]
D (13986) BT_SMP: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (13996) BT_SMP: smp_both_have_public_keys
D (14006) BT_SMP: smp_compute_dhkey
D (14096) BT_SMP: smp_send_pair_public_key
D (14096) BT_SMP: smp_send_cmd on l2cap cmd_code=0xc
D (14096) BT_SMP: smp_build_pair_public_key_cmd
D (14096) BT_SMP: smp_send_msg_to_L2CAP
D (14106) BT_SMP: main smp_sm_event
D (14106) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [SEC_CONN_DHKEY_COMPLETE_EVT (30)]
D (14116) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (14126) BT_SMP: smp_start_secure_connection_phase1
D (14136) BT_SMP: p_cb->sec_level =4 (SMP_SEC_AUTHENTICATED)
D (14136) BT_SMP: main smp_sm_event
D (14146) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [TK_REQ_EVT (22)]
D (14156) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_APP_RSP(1)
D (14166) BT_SMP: smp_send_app_cback p_cb->cb_evt=4
D (14166) BT_SMP: callback_rc=0 p_cb->cb_evt=4
D (14176) BT_SMP: smp_send_app_cback return
D (14176) BT_SMP: result state = SMP_STATE_WAIT_APP_RSP
D (14186) BT_SMP: result state = SMP_STATE_WAIT_APP_RSP
D (14186) BT_SMP: result state = SMP_STATE_WAIT_APP_RSP
D (14196) BT_SMP: result state = SMP_STATE_WAIT_APP_RSP
I (14206) HID_DEMO: Requesting security key...
I (14206) HID_DEMO: Requester's BD_ADDR: 8c85908a6d15
E (14536) BT_GATT: GATT_INSUF_AUTHENTICATION: MITM Required
I (30076) EXT_UART: sending command to parser: PK 745453
I (30076) EXT_UART: Received passkey input
I (30076) EXT_UART: [2] Requester's BD_ADDR: 8c85908a6d15
I (30086) EXT_UART: Sending: 745453
D (30086) BT_SMP: SMP_PasskeyReply: Key: 745453 Result:0
D (30096) BT_SMP: main smp_sm_event
D (30096) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_APP_RSP (1)], Event: [SEC_CONN_KEY_READY_EVT (37)]
D (30106) BT_SMP: State change: SMP_STATE_WAIT_APP_RSP(1) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (30116) BT_SMP: smp_start_passkey_verification
D (30116) BT_SMP: smp_start_nonce_generation
D (30126) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (30126) BT_SMP: smp_rand_back state=0xd
D (30136) BT_SMP: smp_finish_nonce_generation
D (30146) BT_SMP: smp_rand_back state=0xe
D (30146) BT_SMP: smp_process_new_nonce round 0
D (30146) BT_SMP: main smp_sm_event
D (30146) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (30166) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (30166) BT_SMP: smp_process_local_nonce
D (30176) BT_SMP: smp_calculate_local_commitment
D (30176) BT_SMP: random: 0xed, round: 0, i: 0, j: 0
D (30186) BT_SMP: smp_calculate_random_input ri=0x81
D (30186) BT_SMP: smp_calculate_f4
D (30196) BT_SMP: aes_cipher_msg_auth_code
D (30196) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (30206) BT_SMP: cmac_generate_subkey
D (30206) BT_SMP: smp_encrypt_data
D (30216) BT_SMP: cmac_subkey_cont
D (30216) BT_SMP: leftshift_onebit
D (30216) BT_SMP: leftshift_onebit
D (30226) BT_SMP: cmac_prepare_last_block
D (30226) BT_SMP: flag = 0 round = 5
D (30226) BT_SMP: smp_xor_128
D (30236) BT_SMP: cmac_aes_k_calculate
D (30236) BT_SMP: smp_xor_128
D (30236) BT_SMP: smp_encrypt_data
D (30246) BT_SMP: smp_xor_128
D (30246) BT_SMP: smp_encrypt_data
D (30246) BT_SMP: smp_xor_128
D (30256) BT_SMP: smp_encrypt_data
D (30256) BT_SMP: smp_xor_128
D (30256) BT_SMP: smp_encrypt_data
D (30266) BT_SMP: smp_xor_128
D (30266) BT_SMP: smp_encrypt_data
D (30276) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (30276) BT_SMP: p_mac[0] = 0x9b p_mac[1] = 0xbc p_mac[2] = 0x60 p_mac[3] = 0x53
D (30286) BT_SMP: p_mac[4] = 0xc2 p_mac[5] = 0xf5 p_mac[6] = 0xc2 p_mac[7] = 0x50
D (30286) BT_SMP: local commitment calculation is completed
D (30296) BT_SMP: result state = SMP_STATE_WAIT_COMMITMENT
D (37216) BT_SMP:
SMDBG l2c smp_data_received
D (37216) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (37216) BT_SMP: main smp_sm_event
D (37216) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_COMMITMENT (9)], Event: [PAIR_COMMITMENT_EVT (15)]
D (37226) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (37236) BT_SMP: smp_process_pairing_commitment
D (37246) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (37246) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (37256) BT_SMP: smp_send_commitment
D (37256) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (37266) BT_SMP: smp_build_pairing_commitment_cmd
D (37266) BT_SMP: smp_send_msg_to_L2CAP
D (37276) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (37306) BT_SMP:
SMDBG l2c smp_data_received
D (37306) BT_SMP: main smp_sm_event
D (37306) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (37306) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (37316) BT_SMP: smp_proc_rand
D (37326) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (37326) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (37336) BT_SMP: smp_process_peer_nonce start
D (37346) BT_SMP: smp_check_commitment
D (37346) BT_SMP: smp_calculate_peer_commitment
D (37346) BT_SMP: random: 0xed, round: 0, i: 0, j: 0
D (37356) BT_SMP: smp_calculate_random_input ri=0x81
D (37356) BT_SMP: smp_calculate_f4
D (37366) BT_SMP: aes_cipher_msg_auth_code
D (37366) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (37376) BT_SMP: cmac_generate_subkey
D (37376) BT_SMP: smp_encrypt_data
D (37386) BT_SMP: cmac_subkey_cont
D (37386) BT_SMP: leftshift_onebit
D (37386) BT_SMP: smp_xor_128
D (37396) BT_SMP: leftshift_onebit
D (37396) BT_SMP: smp_xor_128
D (37396) BT_SMP: cmac_prepare_last_block
D (37406) BT_SMP: flag = 0 round = 5
D (37406) BT_SMP: smp_xor_128
D (37406) BT_SMP: cmac_aes_k_calculate
D (37416) BT_SMP: smp_xor_128
D (37416) BT_SMP: smp_encrypt_data
D (37416) BT_SMP: smp_xor_128
D (37426) BT_SMP: smp_encrypt_data
D (37426) BT_SMP: smp_xor_128
D (37426) BT_SMP: smp_encrypt_data
D (37436) BT_SMP: smp_xor_128
D (37436) BT_SMP: smp_encrypt_data
D (37446) BT_SMP: smp_xor_128
D (37446) BT_SMP: smp_encrypt_data
D (37446) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (37456) BT_SMP: p_mac[0] = 0xbf p_mac[1] = 0x68 p_mac[2] = 0x17 p_mac[3] = 0x28
D (37456) BT_SMP: p_mac[4] = 0x84 p_mac[5] = 0x18 p_mac[6] = 0x12 p_mac[7] = 0x28
D (37466) BT_SMP: peer commitment calculation is completed
D (37476) BT_SMP: Commitment check succeeds
D (37476) BT_SMP: smp_send_rand
D (37476) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (37486) BT_SMP: smp_build_rand_cmd
D (37486) BT_SMP: smp_send_msg_to_L2CAP
D (37496) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (37506) BT_SMP: smp_start_nonce_generation
D (37506) BT_SMP: smp_process_peer_nonce end
D (37516) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (37516) BT_SMP: smp_rand_back state=0xd
D (37526) BT_SMP: smp_finish_nonce_generation
D (37526) BT_SMP:
SMDBG l2c smp_data_received
D (37536) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (37536) BT_SMP: main smp_sm_event
D (37546) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (37556) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (37566) BT_SMP: smp_process_pairing_commitment
D (37566) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (37576) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (37586) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (37586) BT_SMP: smp_rand_back state=0xe
D (37596) BT_SMP: smp_process_new_nonce round 1
D (37596) BT_SMP: main smp_sm_event
D (37596) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (37606) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (37616) BT_SMP: smp_process_local_nonce
D (37626) BT_SMP: smp_calculate_local_commitment
D (37626) BT_SMP: random: 0xed, round: 1, i: 0, j: 1
D (37636) BT_SMP: smp_calculate_random_input ri=0x80
D (37636) BT_SMP: smp_calculate_f4
D (37646) BT_SMP: aes_cipher_msg_auth_code
D (37646) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (37656) BT_SMP: cmac_generate_subkey
D (37656) BT_SMP: smp_encrypt_data
D (37656) BT_SMP: cmac_subkey_cont
D (37666) BT_SMP: leftshift_onebit
D (37666) BT_SMP: smp_xor_128
D (37666) BT_SMP: leftshift_onebit
D (37676) BT_SMP: smp_xor_128
D (37676) BT_SMP: cmac_prepare_last_block
D (37686) BT_SMP: flag = 0 round = 5
D (37686) BT_SMP: smp_xor_128
D (37686) BT_SMP: cmac_aes_k_calculate
D (37696) BT_SMP: smp_xor_128
D (37696) BT_SMP: smp_encrypt_data
D (37696) BT_SMP: smp_xor_128
D (37706) BT_SMP: smp_encrypt_data
D (37706) BT_SMP: smp_xor_128
D (37706) BT_SMP: smp_encrypt_data
D (37716) BT_SMP: smp_xor_128
D (37716) BT_SMP: smp_encrypt_data
D (37716) BT_SMP: smp_xor_128
D (37726) BT_SMP: smp_encrypt_data
D (37726) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (37726) BT_SMP: p_mac[0] = 0x21 p_mac[1] = 0x2e p_mac[2] = 0x80 p_mac[3] = 0x0e
D (37736) BT_SMP: p_mac[4] = 0xb5 p_mac[5] = 0x8e p_mac[6] = 0xff p_mac[7] = 0x36
D (37746) BT_SMP: local commitment calculation is completed
D (37756) BT_SMP: smp_send_commitment
D (37756) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (37756) BT_SMP: smp_build_pairing_commitment_cmd
D (37766) BT_SMP: smp_send_msg_to_L2CAP
D (37766) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (37776) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (37796) BT_SMP:
SMDBG l2c smp_data_received
D (37806) BT_SMP: main smp_sm_event
D (37806) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (37806) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (37816) BT_SMP: smp_proc_rand
D (37816) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (37826) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (37836) BT_SMP: smp_process_peer_nonce start
D (37836) BT_SMP: smp_check_commitment
D (37846) BT_SMP: smp_calculate_peer_commitment
D (37846) BT_SMP: random: 0xed, round: 1, i: 0, j: 1
D (37856) BT_SMP: smp_calculate_random_input ri=0x80
D (37856) BT_SMP: smp_calculate_f4
D (37866) BT_SMP: aes_cipher_msg_auth_code
D (37866) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (37876) BT_SMP: cmac_generate_subkey
D (37876) BT_SMP: smp_encrypt_data
D (37876) BT_SMP: cmac_subkey_cont
D (37886) BT_SMP: leftshift_onebit
D (37886) BT_SMP: smp_xor_128
D (37886) BT_SMP: leftshift_onebit
D (37896) BT_SMP: smp_xor_128
D (37896) BT_SMP: cmac_prepare_last_block
D (37896) BT_SMP: flag = 0 round = 5
D (37906) BT_SMP: smp_xor_128
D (37906) BT_SMP: cmac_aes_k_calculate
D (37906) BT_SMP: smp_xor_128
D (37916) BT_SMP: smp_encrypt_data
D (37916) BT_SMP: smp_xor_128
D (37926) BT_SMP: smp_encrypt_data
D (37926) BT_SMP: smp_xor_128
D (37926) BT_SMP: smp_encrypt_data
D (37936) BT_SMP: smp_xor_128
D (37936) BT_SMP: smp_encrypt_data
D (37936) BT_SMP: smp_xor_128
D (37946) BT_SMP: smp_encrypt_data
D (37946) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (37946) BT_SMP: p_mac[0] = 0x87 p_mac[1] = 0x2d p_mac[2] = 0x51 p_mac[3] = 0xb6
D (37956) BT_SMP: p_mac[4] = 0x10 p_mac[5] = 0xcf p_mac[6] = 0x64 p_mac[7] = 0x8c
D (37966) BT_SMP: peer commitment calculation is completed
D (37966) BT_SMP: Commitment check succeeds
D (37976) BT_SMP: smp_send_rand
D (37976) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (37986) BT_SMP: smp_build_rand_cmd
D (37986) BT_SMP: smp_send_msg_to_L2CAP
D (37996) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (37996) BT_SMP: smp_start_nonce_generation
D (38006) BT_SMP: smp_process_peer_nonce end
D (38006) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (38016) BT_SMP: smp_rand_back state=0xd
D (38016) BT_SMP: smp_finish_nonce_generation
D (38026) BT_SMP:
SMDBG l2c smp_data_received
D (38026) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (38036) BT_SMP: main smp_sm_event
D (38046) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (38056) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (38056) BT_SMP: smp_process_pairing_commitment
D (38066) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (38076) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (38076) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (38086) BT_SMP: smp_rand_back state=0xe
D (38086) BT_SMP: smp_process_new_nonce round 2
D (38096) BT_SMP: main smp_sm_event
D (38096) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (38106) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (38116) BT_SMP: smp_process_local_nonce
D (38116) BT_SMP: smp_calculate_local_commitment
D (38126) BT_SMP: random: 0xed, round: 2, i: 0, j: 2
D (38136) BT_SMP: smp_calculate_random_input ri=0x81
D (38136) BT_SMP: smp_calculate_f4
D (38136) BT_SMP: aes_cipher_msg_auth_code
D (38146) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (38146) BT_SMP: cmac_generate_subkey
D (38156) BT_SMP: smp_encrypt_data
D (38156) BT_SMP: cmac_subkey_cont
D (38166) BT_SMP: leftshift_onebit
D (38166) BT_SMP: smp_xor_128
D (38166) BT_SMP: leftshift_onebit
D (38176) BT_SMP: smp_xor_128
D (38176) BT_SMP: cmac_prepare_last_block
D (38176) BT_SMP: flag = 0 round = 5
D (38186) BT_SMP: smp_xor_128
D (38186) BT_SMP: cmac_aes_k_calculate
D (38186) BT_SMP: smp_xor_128
D (38196) BT_SMP: smp_encrypt_data
D (38196) BT_SMP: smp_xor_128
D (38196) BT_SMP: smp_encrypt_data
D (38206) BT_SMP: smp_xor_128
D (38206) BT_SMP: smp_encrypt_data
D (38206) BT_SMP: smp_xor_128
D (38216) BT_SMP: smp_encrypt_data
D (38216) BT_SMP: smp_xor_128
D (38216) BT_SMP: smp_encrypt_data
D (38226) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (38226) BT_SMP: p_mac[0] = 0x73 p_mac[1] = 0xf6 p_mac[2] = 0x00 p_mac[3] = 0x40
D (38236) BT_SMP: p_mac[4] = 0x6b p_mac[5] = 0x23 p_mac[6] = 0x06 p_mac[7] = 0xe6
D (38246) BT_SMP: local commitment calculation is completed
D (38246) BT_SMP: smp_send_commitment
D (38256) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (38256) BT_SMP: smp_build_pairing_commitment_cmd
D (38266) BT_SMP: smp_send_msg_to_L2CAP
D (38266) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (38276) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (38296) BT_SMP:
SMDBG l2c smp_data_received
D (38296) BT_SMP: main smp_sm_event
D (38296) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (38306) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (38316) BT_SMP: smp_proc_rand
D (38316) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (38326) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (38326) BT_SMP: smp_process_peer_nonce start
D (38336) BT_SMP: smp_check_commitment
D (38336) BT_SMP: smp_calculate_peer_commitment
D (38346) BT_SMP: random: 0xed, round: 2, i: 0, j: 2
D (38346) BT_SMP: smp_calculate_random_input ri=0x81
D (38356) BT_SMP: smp_calculate_f4
D (38356) BT_SMP: aes_cipher_msg_auth_code
D (38356) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (38366) BT_SMP: cmac_generate_subkey
D (38366) BT_SMP: smp_encrypt_data
D (38376) BT_SMP: cmac_subkey_cont
D (38376) BT_SMP: leftshift_onebit
D (38386) BT_SMP: leftshift_onebit
D (38386) BT_SMP: cmac_prepare_last_block
D (38386) BT_SMP: flag = 0 round = 5
D (38396) BT_SMP: smp_xor_128
D (38396) BT_SMP: cmac_aes_k_calculate
D (38396) BT_SMP: smp_xor_128
D (38406) BT_SMP: smp_encrypt_data
D (38406) BT_SMP: smp_xor_128
D (38406) BT_SMP: smp_encrypt_data
D (38416) BT_SMP: smp_xor_128
D (38416) BT_SMP: smp_encrypt_data
D (38416) BT_SMP: smp_xor_128
D (38426) BT_SMP: smp_encrypt_data
D (38426) BT_SMP: smp_xor_128
D (38426) BT_SMP: smp_encrypt_data
D (38436) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (38436) BT_SMP: p_mac[0] = 0x76 p_mac[1] = 0xff p_mac[2] = 0xe2 p_mac[3] = 0x6a
D (38446) BT_SMP: p_mac[4] = 0xa4 p_mac[5] = 0x21 p_mac[6] = 0xe0 p_mac[7] = 0xfe
D (38456) BT_SMP: peer commitment calculation is completed
D (38456) BT_SMP: Commitment check succeeds
D (38466) BT_SMP: smp_send_rand
D (38466) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (38476) BT_SMP: smp_build_rand_cmd
D (38476) BT_SMP: smp_send_msg_to_L2CAP
D (38486) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (38486) BT_SMP: smp_start_nonce_generation
D (38496) BT_SMP: smp_process_peer_nonce end
D (38496) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (38506) BT_SMP: smp_rand_back state=0xd
D (38506) BT_SMP: smp_finish_nonce_generation
D (38516) BT_SMP:
SMDBG l2c smp_data_received
D (38516) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (38526) BT_SMP: main smp_sm_event
D (38526) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (38536) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (38546) BT_SMP: smp_process_pairing_commitment
D (38556) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (38556) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (38566) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (38576) BT_SMP: smp_rand_back state=0xe
D (38576) BT_SMP: smp_process_new_nonce round 3
D (38586) BT_SMP: main smp_sm_event
D (38586) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (38596) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (38606) BT_SMP: smp_process_local_nonce
D (38606) BT_SMP: smp_calculate_local_commitment
D (38616) BT_SMP: random: 0xed, round: 3, i: 0, j: 3
D (38616) BT_SMP: smp_calculate_random_input ri=0x81
D (38626) BT_SMP: smp_calculate_f4
D (38626) BT_SMP: aes_cipher_msg_auth_code
D (38636) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (38636) BT_SMP: cmac_generate_subkey
D (38646) BT_SMP: smp_encrypt_data
D (38646) BT_SMP: cmac_subkey_cont
D (38646) BT_SMP: leftshift_onebit
D (38656) BT_SMP: leftshift_onebit
D (38656) BT_SMP: smp_xor_128
D (38656) BT_SMP: cmac_prepare_last_block
D (38666) BT_SMP: flag = 0 round = 5
D (38666) BT_SMP: smp_xor_128
D (38676) BT_SMP: cmac_aes_k_calculate
D (38676) BT_SMP: smp_xor_128
D (38676) BT_SMP: smp_encrypt_data
D (38686) BT_SMP: smp_xor_128
D (38686) BT_SMP: smp_encrypt_data
D (38686) BT_SMP: smp_xor_128
D (38696) BT_SMP: smp_encrypt_data
D (38696) BT_SMP: smp_xor_128
D (38696) BT_SMP: smp_encrypt_data
D (38706) BT_SMP: smp_xor_128
D (38706) BT_SMP: smp_encrypt_data
D (38706) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (38716) BT_SMP: p_mac[0] = 0xe1 p_mac[1] = 0x25 p_mac[2] = 0x07 p_mac[3] = 0xd4
D (38726) BT_SMP: p_mac[4] = 0x64 p_mac[5] = 0xe4 p_mac[6] = 0xb7 p_mac[7] = 0x44
D (38726) BT_SMP: local commitment calculation is completed
D (38736) BT_SMP: smp_send_commitment
D (38736) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (38746) BT_SMP: smp_build_pairing_commitment_cmd
D (38746) BT_SMP: smp_send_msg_to_L2CAP
D (38756) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (38756) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (38776) BT_SMP:
SMDBG l2c smp_data_received
D (38776) BT_SMP: main smp_sm_event
D (38776) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (38786) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (38796) BT_SMP: smp_proc_rand
D (38796) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (38806) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (38806) BT_SMP: smp_process_peer_nonce start
D (38816) BT_SMP: smp_check_commitment
D (38816) BT_SMP: smp_calculate_peer_commitment
D (38826) BT_SMP: random: 0xed, round: 3, i: 0, j: 3
D (38826) BT_SMP: smp_calculate_random_input ri=0x81
D (38836) BT_SMP: smp_calculate_f4
D (38836) BT_SMP: aes_cipher_msg_auth_code
D (38846) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (38846) BT_SMP: cmac_generate_subkey
D (38856) BT_SMP: smp_encrypt_data
D (38856) BT_SMP: cmac_subkey_cont
D (38856) BT_SMP: leftshift_onebit
D (38866) BT_SMP: leftshift_onebit
D (38866) BT_SMP: cmac_prepare_last_block
D (38866) BT_SMP: flag = 0 round = 5
D (38876) BT_SMP: smp_xor_128
D (38876) BT_SMP: cmac_aes_k_calculate
D (38886) BT_SMP: smp_xor_128
D (38886) BT_SMP: smp_encrypt_data
D (38886) BT_SMP: smp_xor_128
D (38896) BT_SMP: smp_encrypt_data
D (38896) BT_SMP: smp_xor_128
D (38896) BT_SMP: smp_encrypt_data
D (38906) BT_SMP: smp_xor_128
D (38906) BT_SMP: smp_encrypt_data
D (38906) BT_SMP: smp_xor_128
D (38916) BT_SMP: smp_encrypt_data
D (38916) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (38916) BT_SMP: p_mac[0] = 0x7d p_mac[1] = 0x22 p_mac[2] = 0xb3 p_mac[3] = 0x6e
D (38926) BT_SMP: p_mac[4] = 0xd8 p_mac[5] = 0xae p_mac[6] = 0x92 p_mac[7] = 0xd8
D (38936) BT_SMP: peer commitment calculation is completed
D (38936) BT_SMP: Commitment check succeeds
D (38946) BT_SMP: smp_send_rand
D (38946) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (38956) BT_SMP: smp_build_rand_cmd
D (38956) BT_SMP: smp_send_msg_to_L2CAP
D (38966) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (38976) BT_SMP: smp_start_nonce_generation
D (38976) BT_SMP: smp_process_peer_nonce end
D (38976) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (38986) BT_SMP: smp_rand_back state=0xd
D (38986) BT_SMP: smp_finish_nonce_generation
D (38996) BT_SMP:
SMDBG l2c smp_data_received
D (38996) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (39006) BT_SMP: main smp_sm_event
D (39016) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (39026) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (39036) BT_SMP: smp_process_pairing_commitment
D (39036) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (39046) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (39046) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (39056) BT_SMP: smp_rand_back state=0xe
D (39056) BT_SMP: smp_process_new_nonce round 4
D (39066) BT_SMP: main smp_sm_event
D (39066) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (39076) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (39086) BT_SMP: smp_process_local_nonce
D (39096) BT_SMP: smp_calculate_local_commitment
D (39096) BT_SMP: random: 0xed, round: 4, i: 0, j: 4
D (39106) BT_SMP: smp_calculate_random_input ri=0x80
D (39106) BT_SMP: smp_calculate_f4
D (39106) BT_SMP: aes_cipher_msg_auth_code
D (39116) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (39116) BT_SMP: cmac_generate_subkey
D (39126) BT_SMP: smp_encrypt_data
D (39126) BT_SMP: cmac_subkey_cont
D (39136) BT_SMP: leftshift_onebit
D (39136) BT_SMP: leftshift_onebit
D (39136) BT_SMP: cmac_prepare_last_block
D (39146) BT_SMP: flag = 0 round = 5
D (39146) BT_SMP: smp_xor_128
D (39146) BT_SMP: cmac_aes_k_calculate
D (39156) BT_SMP: smp_xor_128
D (39156) BT_SMP: smp_encrypt_data
D (39156) BT_SMP: smp_xor_128
D (39166) BT_SMP: smp_encrypt_data
D (39166) BT_SMP: smp_xor_128
D (39166) BT_SMP: smp_encrypt_data
D (39176) BT_SMP: smp_xor_128
D (39176) BT_SMP: smp_encrypt_data
D (39186) BT_SMP: smp_xor_128
D (39186) BT_SMP: smp_encrypt_data
D (39186) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (39196) BT_SMP: p_mac[0] = 0xf0 p_mac[1] = 0x13 p_mac[2] = 0x7b p_mac[3] = 0x79
D (39196) BT_SMP: p_mac[4] = 0x9b p_mac[5] = 0x03 p_mac[6] = 0xb5 p_mac[7] = 0x8a
D (39206) BT_SMP: local commitment calculation is completed
D (39216) BT_SMP: smp_send_commitment
D (39216) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (39226) BT_SMP: smp_build_pairing_commitment_cmd
D (39226) BT_SMP: smp_send_msg_to_L2CAP
D (39236) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (39236) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (39256) BT_SMP:
SMDBG l2c smp_data_received
D (39256) BT_SMP: main smp_sm_event
D (39256) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (39266) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (39266) BT_SMP: smp_proc_rand
D (39276) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (39276) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (39286) BT_SMP: smp_process_peer_nonce start
D (39296) BT_SMP: smp_check_commitment
D (39296) BT_SMP: smp_calculate_peer_commitment
D (39296) BT_SMP: random: 0xed, round: 4, i: 0, j: 4
D (39306) BT_SMP: smp_calculate_random_input ri=0x80
D (39306) BT_SMP: smp_calculate_f4
D (39316) BT_SMP: aes_cipher_msg_auth_code
D (39316) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (39326) BT_SMP: cmac_generate_subkey
D (39326) BT_SMP: smp_encrypt_data
D (39336) BT_SMP: cmac_subkey_cont
D (39336) BT_SMP: leftshift_onebit
D (39336) BT_SMP: leftshift_onebit
D (39346) BT_SMP: cmac_prepare_last_block
D (39346) BT_SMP: flag = 0 round = 5
D (39346) BT_SMP: smp_xor_128
D (39356) BT_SMP: cmac_aes_k_calculate
D (39356) BT_SMP: smp_xor_128
D (39356) BT_SMP: smp_encrypt_data
D (39366) BT_SMP: smp_xor_128
D (39366) BT_SMP: smp_encrypt_data
D (39376) BT_SMP: smp_xor_128
D (39376) BT_SMP: smp_encrypt_data
D (39376) BT_SMP: smp_xor_128
D (39386) BT_SMP: smp_encrypt_data
D (39386) BT_SMP: smp_xor_128
D (39386) BT_SMP: smp_encrypt_data
D (39396) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (39396) BT_SMP: p_mac[0] = 0xb1 p_mac[1] = 0x64 p_mac[2] = 0x6e p_mac[3] = 0xb5
D (39406) BT_SMP: p_mac[4] = 0xad p_mac[5] = 0x65 p_mac[6] = 0xac p_mac[7] = 0x79
D (39416) BT_SMP: peer commitment calculation is completed
D (39416) BT_SMP: Commitment check succeeds
D (39426) BT_SMP: smp_send_rand
D (39426) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (39426) BT_SMP: smp_build_rand_cmd
D (39436) BT_SMP: smp_send_msg_to_L2CAP
D (39436) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (39446) BT_SMP: smp_start_nonce_generation
D (39456) BT_SMP: smp_process_peer_nonce end
D (39456) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (39466) BT_SMP: smp_rand_back state=0xd
D (39466) BT_SMP: smp_finish_nonce_generation
D (39476) BT_SMP:
SMDBG l2c smp_data_received
D (39476) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (39486) BT_SMP: main smp_sm_event
D (39486) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (39496) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (39506) BT_SMP: smp_process_pairing_commitment
D (39516) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (39516) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (39526) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (39536) BT_SMP: smp_rand_back state=0xe
D (39536) BT_SMP: smp_process_new_nonce round 5
D (39536) BT_SMP: main smp_sm_event
D (39546) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (39556) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (39566) BT_SMP: smp_process_local_nonce
D (39566) BT_SMP: smp_calculate_local_commitment
D (39576) BT_SMP: random: 0xed, round: 5, i: 0, j: 5
D (39576) BT_SMP: smp_calculate_random_input ri=0x81
D (39586) BT_SMP: smp_calculate_f4
D (39586) BT_SMP: aes_cipher_msg_auth_code
D (39586) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (39596) BT_SMP: cmac_generate_subkey
D (39596) BT_SMP: smp_encrypt_data
D (39606) BT_SMP: cmac_subkey_cont
D (39606) BT_SMP: leftshift_onebit
D (39616) BT_SMP: leftshift_onebit
D (39616) BT_SMP: cmac_prepare_last_block
D (39616) BT_SMP: flag = 0 round = 5
D (39626) BT_SMP: smp_xor_128
D (39626) BT_SMP: cmac_aes_k_calculate
D (39626) BT_SMP: smp_xor_128
D (39636) BT_SMP: smp_encrypt_data
D (39636) BT_SMP: smp_xor_128
D (39636) BT_SMP: smp_encrypt_data
D (39646) BT_SMP: smp_xor_128
D (39646) BT_SMP: smp_encrypt_data
D (39646) BT_SMP: smp_xor_128
D (39656) BT_SMP: smp_encrypt_data
D (39656) BT_SMP: smp_xor_128
D (39656) BT_SMP: smp_encrypt_data
D (39666) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (39666) BT_SMP: p_mac[0] = 0xbe p_mac[1] = 0x21 p_mac[2] = 0x6d p_mac[3] = 0x3e
D (39676) BT_SMP: p_mac[4] = 0x24 p_mac[5] = 0x8b p_mac[6] = 0x17 p_mac[7] = 0x9c
D (39686) BT_SMP: local commitment calculation is completed
D (39686) BT_SMP: smp_send_commitment
D (39696) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (39696) BT_SMP: smp_build_pairing_commitment_cmd
D (39706) BT_SMP: smp_send_msg_to_L2CAP
D (39706) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (39716) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (39746) BT_SMP:
SMDBG l2c smp_data_received
D (39756) BT_SMP: main smp_sm_event
D (39756) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (39756) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (39766) BT_SMP: smp_proc_rand
D (39766) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (39776) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (39786) BT_SMP: smp_process_peer_nonce start
D (39786) BT_SMP: smp_check_commitment
D (39786) BT_SMP: smp_calculate_peer_commitment
D (39796) BT_SMP: random: 0xed, round: 5, i: 0, j: 5
D (39796) BT_SMP: smp_calculate_random_input ri=0x81
D (39806) BT_SMP: smp_calculate_f4
D (39806) BT_SMP: aes_cipher_msg_auth_code
D (39816) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (39816) BT_SMP: cmac_generate_subkey
D (39826) BT_SMP: smp_encrypt_data
D (39826) BT_SMP: cmac_subkey_cont
D (39826) BT_SMP: leftshift_onebit
D (39836) BT_SMP: smp_xor_128
D (39836) BT_SMP: leftshift_onebit
D (39836) BT_SMP: cmac_prepare_last_block
D (39846) BT_SMP: flag = 0 round = 5
D (39846) BT_SMP: smp_xor_128
D (39856) BT_SMP: cmac_aes_k_calculate
D (39856) BT_SMP: smp_xor_128
D (39856) BT_SMP: smp_encrypt_data
D (39866) BT_SMP: smp_xor_128
D (39866) BT_SMP: smp_encrypt_data
D (39866) BT_SMP: smp_xor_128
D (39876) BT_SMP: smp_encrypt_data
D (39876) BT_SMP: smp_xor_128
D (39876) BT_SMP: smp_encrypt_data
D (39886) BT_SMP: smp_xor_128
D (39886) BT_SMP: smp_encrypt_data
D (39886) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (39896) BT_SMP: p_mac[0] = 0x27 p_mac[1] = 0x43 p_mac[2] = 0x03 p_mac[3] = 0x19
D (39906) BT_SMP: p_mac[4] = 0x33 p_mac[5] = 0x12 p_mac[6] = 0x22 p_mac[7] = 0x1a
D (39906) BT_SMP: peer commitment calculation is completed
D (39916) BT_SMP: Commitment check succeeds
D (39916) BT_SMP: smp_send_rand
D (39926) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (39926) BT_SMP: smp_build_rand_cmd
D (39936) BT_SMP: smp_send_msg_to_L2CAP
D (39936) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (39946) BT_SMP: smp_start_nonce_generation
D (39946) BT_SMP: smp_process_peer_nonce end
D (39956) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (39966) BT_SMP: smp_rand_back state=0xd
D (39966) BT_SMP: smp_finish_nonce_generation
D (39976) BT_SMP:
SMDBG l2c smp_data_received
D (39976) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (39986) BT_SMP: main smp_sm_event
D (39986) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (39996) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (40006) BT_SMP: smp_process_pairing_commitment
D (40006) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (40016) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (40026) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (40026) BT_SMP: smp_rand_back state=0xe
D (40036) BT_SMP: smp_process_new_nonce round 6
D (40036) BT_SMP: main smp_sm_event
D (40046) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (40056) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (40066) BT_SMP: smp_process_local_nonce
D (40066) BT_SMP: smp_calculate_local_commitment
D (40066) BT_SMP: random: 0xed, round: 6, i: 0, j: 6
D (40076) BT_SMP: smp_calculate_random_input ri=0x81
D (40076) BT_SMP: smp_calculate_f4
D (40086) BT_SMP: aes_cipher_msg_auth_code
D (40086) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (40096) BT_SMP: cmac_generate_subkey
D (40096) BT_SMP: smp_encrypt_data
D (40106) BT_SMP: cmac_subkey_cont
D (40106) BT_SMP: leftshift_onebit
D (40106) BT_SMP: leftshift_onebit
D (40116) BT_SMP: smp_xor_128
D (40116) BT_SMP: cmac_prepare_last_block
D (40116) BT_SMP: flag = 0 round = 5
D (40126) BT_SMP: smp_xor_128
D (40126) BT_SMP: cmac_aes_k_calculate
D (40126) BT_SMP: smp_xor_128
D (40136) BT_SMP: smp_encrypt_data
D (40136) BT_SMP: smp_xor_128
D (40136) BT_SMP: smp_encrypt_data
D (40146) BT_SMP: smp_xor_128
D (40146) BT_SMP: smp_encrypt_data
D (40156) BT_SMP: smp_xor_128
D (40156) BT_SMP: smp_encrypt_data
D (40156) BT_SMP: smp_xor_128
D (40166) BT_SMP: smp_encrypt_data
D (40166) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (40166) BT_SMP: p_mac[0] = 0x63 p_mac[1] = 0xe7 p_mac[2] = 0x3b p_mac[3] = 0xa1
D (40176) BT_SMP: p_mac[4] = 0x4b p_mac[5] = 0x43 p_mac[6] = 0xcd p_mac[7] = 0x98
D (40186) BT_SMP: local commitment calculation is completed
D (40186) BT_SMP: smp_send_commitment
D (40196) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (40196) BT_SMP: smp_build_pairing_commitment_cmd
D (40206) BT_SMP: smp_send_msg_to_L2CAP
D (40206) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (40216) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (40226) BT_SMP:
SMDBG l2c smp_data_received
D (40236) BT_SMP: main smp_sm_event
D (40236) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (40236) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (40246) BT_SMP: smp_proc_rand
D (40246) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (40256) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (40266) BT_SMP: smp_process_peer_nonce start
D (40266) BT_SMP: smp_check_commitment
D (40276) BT_SMP: smp_calculate_peer_commitment
D (40276) BT_SMP: random: 0xed, round: 6, i: 0, j: 6
D (40286) BT_SMP: smp_calculate_random_input ri=0x81
D (40286) BT_SMP: smp_calculate_f4
D (40296) BT_SMP: aes_cipher_msg_auth_code
D (40296) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (40306) BT_SMP: cmac_generate_subkey
D (40306) BT_SMP: smp_encrypt_data
D (40306) BT_SMP: cmac_subkey_cont
D (40316) BT_SMP: leftshift_onebit
D (40316) BT_SMP: smp_xor_128
D (40316) BT_SMP: leftshift_onebit
D (40326) BT_SMP: cmac_prepare_last_block
D (40326) BT_SMP: flag = 0 round = 5
D (40336) BT_SMP: smp_xor_128
D (40336) BT_SMP: cmac_aes_k_calculate
D (40336) BT_SMP: smp_xor_128
D (40346) BT_SMP: smp_encrypt_data
D (40346) BT_SMP: smp_xor_128
D (40346) BT_SMP: smp_encrypt_data
D (40356) BT_SMP: smp_xor_128
D (40356) BT_SMP: smp_encrypt_data
D (40356) BT_SMP: smp_xor_128
D (40366) BT_SMP: smp_encrypt_data
D (40366) BT_SMP: smp_xor_128
D (40366) BT_SMP: smp_encrypt_data
D (40376) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (40376) BT_SMP: p_mac[0] = 0xdf p_mac[1] = 0x09 p_mac[2] = 0xa6 p_mac[3] = 0x90
D (40386) BT_SMP: p_mac[4] = 0x41 p_mac[5] = 0x31 p_mac[6] = 0xa6 p_mac[7] = 0xae
D (40396) BT_SMP: peer commitment calculation is completed
D (40396) BT_SMP: Commitment check succeeds
D (40406) BT_SMP: smp_send_rand
D (40406) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (40406) BT_SMP: smp_build_rand_cmd
D (40416) BT_SMP: smp_send_msg_to_L2CAP
D (40426) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (40426) BT_SMP: smp_start_nonce_generation
D (40436) BT_SMP: smp_process_peer_nonce end
D (40436) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (40446) BT_SMP: smp_rand_back state=0xd
D (40446) BT_SMP: smp_finish_nonce_generation
D (40456) BT_SMP:
SMDBG l2c smp_data_received
D (40456) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (40466) BT_SMP: main smp_sm_event
D (40466) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (40476) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (40486) BT_SMP: smp_process_pairing_commitment
D (40496) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (40496) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (40506) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (40516) BT_SMP: smp_rand_back state=0xe
D (40516) BT_SMP: smp_process_new_nonce round 7
D (40516) BT_SMP: main smp_sm_event
D (40526) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (40536) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (40546) BT_SMP: smp_process_local_nonce
D (40546) BT_SMP: smp_calculate_local_commitment
D (40556) BT_SMP: random: 0xed, round: 7, i: 0, j: 7
D (40556) BT_SMP: smp_calculate_random_input ri=0x81
D (40566) BT_SMP: smp_calculate_f4
D (40566) BT_SMP: aes_cipher_msg_auth_code
D (40576) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (40576) BT_SMP: cmac_generate_subkey
D (40586) BT_SMP: smp_encrypt_data
D (40586) BT_SMP: cmac_subkey_cont
D (40586) BT_SMP: leftshift_onebit
D (40596) BT_SMP: leftshift_onebit
D (40596) BT_SMP: cmac_prepare_last_block
D (40596) BT_SMP: flag = 0 round = 5
D (40606) BT_SMP: smp_xor_128
D (40606) BT_SMP: cmac_aes_k_calculate
D (40606) BT_SMP: smp_xor_128
D (40616) BT_SMP: smp_encrypt_data
D (40616) BT_SMP: smp_xor_128
D (40616) BT_SMP: smp_encrypt_data
D (40626) BT_SMP: smp_xor_128
D (40626) BT_SMP: smp_encrypt_data
D (40636) BT_SMP: smp_xor_128
D (40636) BT_SMP: smp_encrypt_data
D (40636) BT_SMP: smp_xor_128
D (40636) BT_SMP: smp_encrypt_data
D (40646) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (40646) BT_SMP: p_mac[0] = 0xc1 p_mac[1] = 0xc6 p_mac[2] = 0xbf p_mac[3] = 0x10
D (40656) BT_SMP: p_mac[4] = 0x0a p_mac[5] = 0xb3 p_mac[6] = 0x7a p_mac[7] = 0x99
D (40666) BT_SMP: local commitment calculation is completed
D (40666) BT_SMP: smp_send_commitment
D (40676) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (40676) BT_SMP: smp_build_pairing_commitment_cmd
D (40686) BT_SMP: smp_send_msg_to_L2CAP
D (40686) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (40696) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (40706) BT_SMP:
SMDBG l2c smp_data_received
D (40716) BT_SMP: main smp_sm_event
D (40716) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (40716) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (40726) BT_SMP: smp_proc_rand
D (40726) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (40736) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (40746) BT_SMP: smp_process_peer_nonce start
D (40746) BT_SMP: smp_check_commitment
D (40756) BT_SMP: smp_calculate_peer_commitment
D (40756) BT_SMP: random: 0xed, round: 7, i: 0, j: 7
D (40766) BT_SMP: smp_calculate_random_input ri=0x81
D (40766) BT_SMP: smp_calculate_f4
D (40776) BT_SMP: aes_cipher_msg_auth_code
D (40776) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (40786) BT_SMP: cmac_generate_subkey
D (40786) BT_SMP: smp_encrypt_data
D (40786) BT_SMP: cmac_subkey_cont
D (40796) BT_SMP: leftshift_onebit
D (40796) BT_SMP: smp_xor_128
D (40796) BT_SMP: leftshift_onebit
D (40806) BT_SMP: cmac_prepare_last_block
D (40806) BT_SMP: flag = 0 round = 5
D (40806) BT_SMP: smp_xor_128
D (40816) BT_SMP: cmac_aes_k_calculate
D (40816) BT_SMP: smp_xor_128
D (40816) BT_SMP: smp_encrypt_data
D (40826) BT_SMP: smp_xor_128
D (40826) BT_SMP: smp_encrypt_data
D (40836) BT_SMP: smp_xor_128
D (40836) BT_SMP: smp_encrypt_data
D (40836) BT_SMP: smp_xor_128
D (40846) BT_SMP: smp_encrypt_data
D (40846) BT_SMP: smp_xor_128
D (40846) BT_SMP: smp_encrypt_data
D (40856) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (40856) BT_SMP: p_mac[0] = 0xe7 p_mac[1] = 0xf7 p_mac[2] = 0x63 p_mac[3] = 0x80
D (40866) BT_SMP: p_mac[4] = 0x72 p_mac[5] = 0x0f p_mac[6] = 0x04 p_mac[7] = 0x76
D (40876) BT_SMP: peer commitment calculation is completed
D (40876) BT_SMP: Commitment check succeeds
D (40886) BT_SMP: smp_send_rand
D (40886) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (40886) BT_SMP: smp_build_rand_cmd
D (40896) BT_SMP: smp_send_msg_to_L2CAP
D (40896) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (40906) BT_SMP: smp_start_nonce_generation
D (40916) BT_SMP: smp_process_peer_nonce end
D (40916) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (40926) BT_SMP: smp_rand_back state=0xd
D (40926) BT_SMP: smp_finish_nonce_generation
D (40936) BT_SMP:
SMDBG l2c smp_data_received
D (40936) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (40946) BT_SMP: main smp_sm_event
D (40946) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (40956) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (40966) BT_SMP: smp_process_pairing_commitment
D (40976) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (40976) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (40986) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (40996) BT_SMP: smp_rand_back state=0xe
D (40996) BT_SMP: smp_process_new_nonce round 8
D (40996) BT_SMP: main smp_sm_event
D (41006) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (41016) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (41026) BT_SMP: smp_process_local_nonce
D (41026) BT_SMP: smp_calculate_local_commitment
D (41036) BT_SMP: random: 0x5f, round: 8, i: 1, j: 0
D (41036) BT_SMP: smp_calculate_random_input ri=0x81
D (41046) BT_SMP: smp_calculate_f4
D (41046) BT_SMP: aes_cipher_msg_auth_code
D (41046) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (41056) BT_SMP: cmac_generate_subkey
D (41056) BT_SMP: smp_encrypt_data
D (41066) BT_SMP: cmac_subkey_cont
D (41066) BT_SMP: leftshift_onebit
D (41076) BT_SMP: smp_xor_128
D (41076) BT_SMP: leftshift_onebit
D (41076) BT_SMP: smp_xor_128
D (41086) BT_SMP: cmac_prepare_last_block
D (41086) BT_SMP: flag = 0 round = 5
D (41086) BT_SMP: smp_xor_128
D (41096) BT_SMP: cmac_aes_k_calculate
D (41096) BT_SMP: smp_xor_128
D (41096) BT_SMP: smp_encrypt_data
D (41106) BT_SMP: smp_xor_128
D (41106) BT_SMP: smp_encrypt_data
D (41106) BT_SMP: smp_xor_128
D (41116) BT_SMP: smp_encrypt_data
D (41116) BT_SMP: smp_xor_128
D (41116) BT_SMP: smp_encrypt_data
D (41126) BT_SMP: smp_xor_128
D (41126) BT_SMP: smp_encrypt_data
D (41126) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (41136) BT_SMP: p_mac[0] = 0x64 p_mac[1] = 0xbf p_mac[2] = 0xf3 p_mac[3] = 0x01
D (41146) BT_SMP: p_mac[4] = 0x67 p_mac[5] = 0x1b p_mac[6] = 0x74 p_mac[7] = 0x49
D (41146) BT_SMP: local commitment calculation is completed
D (41156) BT_SMP: smp_send_commitment
D (41156) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (41166) BT_SMP: smp_build_pairing_commitment_cmd
D (41166) BT_SMP: smp_send_msg_to_L2CAP
D (41176) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (41186) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (41206) BT_SMP:
SMDBG l2c smp_data_received
D (41206) BT_SMP: main smp_sm_event
D (41206) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (41216) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (41216) BT_SMP: smp_proc_rand
D (41226) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (41226) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (41236) BT_SMP: smp_process_peer_nonce start
D (41246) BT_SMP: smp_check_commitment
D (41246) BT_SMP: smp_calculate_peer_commitment
D (41246) BT_SMP: random: 0x5f, round: 8, i: 1, j: 0
D (41256) BT_SMP: smp_calculate_random_input ri=0x81
D (41256) BT_SMP: smp_calculate_f4
D (41266) BT_SMP: aes_cipher_msg_auth_code
D (41266) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (41276) BT_SMP: cmac_generate_subkey
D (41276) BT_SMP: smp_encrypt_data
D (41286) BT_SMP: cmac_subkey_cont
D (41286) BT_SMP: leftshift_onebit
D (41286) BT_SMP: leftshift_onebit
D (41296) BT_SMP: smp_xor_128
D (41296) BT_SMP: cmac_prepare_last_block
D (41296) BT_SMP: flag = 0 round = 5
D (41306) BT_SMP: smp_xor_128
D (41306) BT_SMP: cmac_aes_k_calculate
D (41306) BT_SMP: smp_xor_128
D (41316) BT_SMP: smp_encrypt_data
D (41316) BT_SMP: smp_xor_128
D (41316) BT_SMP: smp_encrypt_data
D (41326) BT_SMP: smp_xor_128
D (41326) BT_SMP: smp_encrypt_data
D (41336) BT_SMP: smp_xor_128
D (41336) BT_SMP: smp_encrypt_data
D (41336) BT_SMP: smp_xor_128
D (41346) BT_SMP: smp_encrypt_data
D (41346) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (41346) BT_SMP: p_mac[0] = 0x4c p_mac[1] = 0xd7 p_mac[2] = 0x0e p_mac[3] = 0xa0
D (41356) BT_SMP: p_mac[4] = 0xee p_mac[5] = 0xb6 p_mac[6] = 0xd7 p_mac[7] = 0x5c
D (41366) BT_SMP: peer commitment calculation is completed
D (41366) BT_SMP: Commitment check succeeds
D (41376) BT_SMP: smp_send_rand
D (41376) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (41386) BT_SMP: smp_build_rand_cmd
D (41386) BT_SMP: smp_send_msg_to_L2CAP
D (41396) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (41396) BT_SMP: smp_start_nonce_generation
D (41406) BT_SMP: smp_process_peer_nonce end
D (41406) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (41416) BT_SMP: smp_rand_back state=0xd
D (41416) BT_SMP: smp_finish_nonce_generation
D (41426) BT_SMP:
SMDBG l2c smp_data_received
D (41426) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (41436) BT_SMP: main smp_sm_event
D (41436) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (41456) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (41456) BT_SMP: smp_process_pairing_commitment
D (41466) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (41476) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (41476) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (41486) BT_SMP: smp_rand_back state=0xe
D (41486) BT_SMP: smp_process_new_nonce round 9
D (41496) BT_SMP: main smp_sm_event
D (41496) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (41506) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (41516) BT_SMP: smp_process_local_nonce
D (41516) BT_SMP: smp_calculate_local_commitment
D (41526) BT_SMP: random: 0x5f, round: 9, i: 1, j: 1
D (41526) BT_SMP: smp_calculate_random_input ri=0x81
D (41536) BT_SMP: smp_calculate_f4
D (41536) BT_SMP: aes_cipher_msg_auth_code
D (41546) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (41546) BT_SMP: cmac_generate_subkey
D (41556) BT_SMP: smp_encrypt_data
D (41556) BT_SMP: cmac_subkey_cont
D (41556) BT_SMP: leftshift_onebit
D (41566) BT_SMP: smp_xor_128
D (41566) BT_SMP: leftshift_onebit
D (41566) BT_SMP: cmac_prepare_last_block
D (41576) BT_SMP: flag = 0 round = 5
D (41576) BT_SMP: smp_xor_128
D (41586) BT_SMP: cmac_aes_k_calculate
D (41586) BT_SMP: smp_xor_128
D (41586) BT_SMP: smp_encrypt_data
D (41596) BT_SMP: smp_xor_128
D (41596) BT_SMP: smp_encrypt_data
D (41596) BT_SMP: smp_xor_128
D (41606) BT_SMP: smp_encrypt_data
D (41606) BT_SMP: smp_xor_128
D (41606) BT_SMP: smp_encrypt_data
D (41616) BT_SMP: smp_xor_128
D (41616) BT_SMP: smp_encrypt_data
D (41616) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (41626) BT_SMP: p_mac[0] = 0x8f p_mac[1] = 0x55 p_mac[2] = 0x75 p_mac[3] = 0xb4
D (41636) BT_SMP: p_mac[4] = 0x60 p_mac[5] = 0x1f p_mac[6] = 0xf5 p_mac[7] = 0x25
D (41636) BT_SMP: local commitment calculation is completed
D (41646) BT_SMP: smp_send_commitment
D (41646) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (41656) BT_SMP: smp_build_pairing_commitment_cmd
D (41656) BT_SMP: smp_send_msg_to_L2CAP
D (41666) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (41676) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (41686) BT_SMP:
SMDBG l2c smp_data_received
D (41686) BT_SMP: main smp_sm_event
D (41686) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (41696) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (41706) BT_SMP: smp_proc_rand
D (41706) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (41716) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (41716) BT_SMP: smp_process_peer_nonce start
D (41726) BT_SMP: smp_check_commitment
D (41726) BT_SMP: smp_calculate_peer_commitment
D (41736) BT_SMP: random: 0x5f, round: 9, i: 1, j: 1
D (41736) BT_SMP: smp_calculate_random_input ri=0x81
D (41746) BT_SMP: smp_calculate_f4
D (41746) BT_SMP: aes_cipher_msg_auth_code
D (41746) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (41756) BT_SMP: cmac_generate_subkey
D (41756) BT_SMP: smp_encrypt_data
D (41766) BT_SMP: cmac_subkey_cont
D (41766) BT_SMP: leftshift_onebit
D (41776) BT_SMP: leftshift_onebit
D (41776) BT_SMP: smp_xor_128
D (41776) BT_SMP: cmac_prepare_last_block
D (41786) BT_SMP: flag = 0 round = 5
D (41786) BT_SMP: smp_xor_128
D (41786) BT_SMP: cmac_aes_k_calculate
D (41796) BT_SMP: smp_xor_128
D (41796) BT_SMP: smp_encrypt_data
D (41796) BT_SMP: smp_xor_128
D (41806) BT_SMP: smp_encrypt_data
D (41806) BT_SMP: smp_xor_128
D (41806) BT_SMP: smp_encrypt_data
D (41816) BT_SMP: smp_xor_128
D (41816) BT_SMP: smp_encrypt_data
D (41816) BT_SMP: smp_xor_128
D (41826) BT_SMP: smp_encrypt_data
D (41826) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (41836) BT_SMP: p_mac[0] = 0x58 p_mac[1] = 0x54 p_mac[2] = 0xa8 p_mac[3] = 0xba
D (41836) BT_SMP: p_mac[4] = 0xee p_mac[5] = 0x3f p_mac[6] = 0x16 p_mac[7] = 0x79
D (41846) BT_SMP: peer commitment calculation is completed
D (41856) BT_SMP: Commitment check succeeds
D (41856) BT_SMP: smp_send_rand
D (41856) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (41866) BT_SMP: smp_build_rand_cmd
D (41866) BT_SMP: smp_send_msg_to_L2CAP
D (41876) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (41886) BT_SMP: smp_start_nonce_generation
D (41886) BT_SMP: smp_process_peer_nonce end
D (41896) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (41896) BT_SMP: smp_rand_back state=0xd
D (41906) BT_SMP: smp_finish_nonce_generation
D (41906) BT_SMP:
SMDBG l2c smp_data_received
D (41916) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (41916) BT_SMP: main smp_sm_event
D (41926) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (41936) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (41946) BT_SMP: smp_process_pairing_commitment
D (41946) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (41956) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (41966) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (41966) BT_SMP: smp_rand_back state=0xe
D (41976) BT_SMP: smp_process_new_nonce round 10
D (41976) BT_SMP: main smp_sm_event
D (41976) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (41986) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (41996) BT_SMP: smp_process_local_nonce
D (42006) BT_SMP: smp_calculate_local_commitment
D (42006) BT_SMP: random: 0x5f, round: 10, i: 1, j: 2
D (42016) BT_SMP: smp_calculate_random_input ri=0x81
D (42016) BT_SMP: smp_calculate_f4
D (42026) BT_SMP: aes_cipher_msg_auth_code
D (42026) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (42036) BT_SMP: cmac_generate_subkey
D (42036) BT_SMP: smp_encrypt_data
D (42036) BT_SMP: cmac_subkey_cont
D (42046) BT_SMP: leftshift_onebit
D (42046) BT_SMP: leftshift_onebit
D (42046) BT_SMP: cmac_prepare_last_block
D (42056) BT_SMP: flag = 0 round = 5
D (42056) BT_SMP: smp_xor_128
D (42066) BT_SMP: cmac_aes_k_calculate
D (42066) BT_SMP: smp_xor_128
D (42066) BT_SMP: smp_encrypt_data
D (42076) BT_SMP: smp_xor_128
D (42076) BT_SMP: smp_encrypt_data
D (42076) BT_SMP: smp_xor_128
D (42086) BT_SMP: smp_encrypt_data
D (42086) BT_SMP: smp_xor_128
D (42086) BT_SMP: smp_encrypt_data
D (42096) BT_SMP: smp_xor_128
D (42096) BT_SMP: smp_encrypt_data
D (42096) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (42106) BT_SMP: p_mac[0] = 0xa4 p_mac[1] = 0xec p_mac[2] = 0x16 p_mac[3] = 0xb5
D (42116) BT_SMP: p_mac[4] = 0x4b p_mac[5] = 0xf1 p_mac[6] = 0x61 p_mac[7] = 0x99
D (42116) BT_SMP: local commitment calculation is completed
D (42126) BT_SMP: smp_send_commitment
D (42126) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (42136) BT_SMP: smp_build_pairing_commitment_cmd
D (42136) BT_SMP: smp_send_msg_to_L2CAP
D (42146) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (42156) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (42176) BT_SMP:
SMDBG l2c smp_data_received
D (42186) BT_SMP: main smp_sm_event
D (42186) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (42186) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (42196) BT_SMP: smp_proc_rand
D (42196) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (42206) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (42216) BT_SMP: smp_process_peer_nonce start
D (42216) BT_SMP: smp_check_commitment
D (42216) BT_SMP: smp_calculate_peer_commitment
D (42226) BT_SMP: random: 0x5f, round: 10, i: 1, j: 2
D (42226) BT_SMP: smp_calculate_random_input ri=0x81
D (42236) BT_SMP: smp_calculate_f4
D (42236) BT_SMP: aes_cipher_msg_auth_code
D (42246) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (42246) BT_SMP: cmac_generate_subkey
D (42256) BT_SMP: smp_encrypt_data
D (42256) BT_SMP: cmac_subkey_cont
D (42256) BT_SMP: leftshift_onebit
D (42266) BT_SMP: smp_xor_128
D (42266) BT_SMP: leftshift_onebit
D (42266) BT_SMP: cmac_prepare_last_block
D (42276) BT_SMP: flag = 0 round = 5
D (42276) BT_SMP: smp_xor_128
D (42286) BT_SMP: cmac_aes_k_calculate
D (42286) BT_SMP: smp_xor_128
D (42286) BT_SMP: smp_encrypt_data
D (42296) BT_SMP: smp_xor_128
D (42296) BT_SMP: smp_encrypt_data
D (42296) BT_SMP: smp_xor_128
D (42306) BT_SMP: smp_encrypt_data
D (42306) BT_SMP: smp_xor_128
D (42306) BT_SMP: smp_encrypt_data
D (42316) BT_SMP: smp_xor_128
D (42316) BT_SMP: smp_encrypt_data
D (42316) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (42326) BT_SMP: p_mac[0] = 0x91 p_mac[1] = 0xa1 p_mac[2] = 0x81 p_mac[3] = 0xfb
D (42336) BT_SMP: p_mac[4] = 0x59 p_mac[5] = 0xcd p_mac[6] = 0x12 p_mac[7] = 0x26
D (42336) BT_SMP: peer commitment calculation is completed
D (42346) BT_SMP: Commitment check succeeds
D (42346) BT_SMP: smp_send_rand
D (42356) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (42356) BT_SMP: smp_build_rand_cmd
D (42366) BT_SMP: smp_send_msg_to_L2CAP
D (42366) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (42376) BT_SMP: smp_start_nonce_generation
D (42376) BT_SMP: smp_process_peer_nonce end
D (42386) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (42396) BT_SMP: smp_rand_back state=0xd
D (42396) BT_SMP: smp_finish_nonce_generation
D (42396) BT_SMP:
SMDBG l2c smp_data_received
D (42406) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (42416) BT_SMP: main smp_sm_event
D (42416) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (42426) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (42436) BT_SMP: smp_process_pairing_commitment
D (42436) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (42446) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (42456) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (42456) BT_SMP: smp_rand_back state=0xe
D (42466) BT_SMP: smp_process_new_nonce round 11
D (42466) BT_SMP: main smp_sm_event
D (42476) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (42486) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (42496) BT_SMP: smp_process_local_nonce
D (42496) BT_SMP: smp_calculate_local_commitment
D (42496) BT_SMP: random: 0x5f, round: 11, i: 1, j: 3
D (42506) BT_SMP: smp_calculate_random_input ri=0x81
D (42516) BT_SMP: smp_calculate_f4
D (42516) BT_SMP: aes_cipher_msg_auth_code
D (42516) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (42526) BT_SMP: cmac_generate_subkey
D (42526) BT_SMP: smp_encrypt_data
D (42536) BT_SMP: cmac_subkey_cont
D (42536) BT_SMP: leftshift_onebit
D (42536) BT_SMP: smp_xor_128
D (42546) BT_SMP: leftshift_onebit
D (42546) BT_SMP: smp_xor_128
D (42546) BT_SMP: cmac_prepare_last_block
D (42556) BT_SMP: flag = 0 round = 5
D (42556) BT_SMP: smp_xor_128
D (42556) BT_SMP: cmac_aes_k_calculate
D (42566) BT_SMP: smp_xor_128
D (42566) BT_SMP: smp_encrypt_data
D (42576) BT_SMP: smp_xor_128
D (42576) BT_SMP: smp_encrypt_data
D (42576) BT_SMP: smp_xor_128
D (42586) BT_SMP: smp_encrypt_data
D (42586) BT_SMP: smp_xor_128
D (42586) BT_SMP: smp_encrypt_data
D (42596) BT_SMP: smp_xor_128
D (42596) BT_SMP: smp_encrypt_data
D (42596) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (42606) BT_SMP: p_mac[0] = 0x3c p_mac[1] = 0xe8 p_mac[2] = 0xfa p_mac[3] = 0xd5
D (42606) BT_SMP: p_mac[4] = 0x5f p_mac[5] = 0x70 p_mac[6] = 0x10 p_mac[7] = 0x3c
D (42616) BT_SMP: local commitment calculation is completed
D (42626) BT_SMP: smp_send_commitment
D (42626) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (42636) BT_SMP: smp_build_pairing_commitment_cmd
D (42636) BT_SMP: smp_send_msg_to_L2CAP
D (42646) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (42646) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (42676) BT_SMP:
SMDBG l2c smp_data_received
D (42676) BT_SMP: main smp_sm_event
D (42676) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (42686) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (42686) BT_SMP: smp_proc_rand
D (42696) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (42696) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (42706) BT_SMP: smp_process_peer_nonce start
D (42716) BT_SMP: smp_check_commitment
D (42716) BT_SMP: smp_calculate_peer_commitment
D (42716) BT_SMP: random: 0x5f, round: 11, i: 1, j: 3
D (42726) BT_SMP: smp_calculate_random_input ri=0x81
D (42726) BT_SMP: smp_calculate_f4
D (42736) BT_SMP: aes_cipher_msg_auth_code
D (42736) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (42746) BT_SMP: cmac_generate_subkey
D (42746) BT_SMP: smp_encrypt_data
D (42756) BT_SMP: cmac_subkey_cont
D (42756) BT_SMP: leftshift_onebit
D (42756) BT_SMP: smp_xor_128
D (42766) BT_SMP: leftshift_onebit
D (42766) BT_SMP: smp_xor_128
D (42766) BT_SMP: cmac_prepare_last_block
D (42776) BT_SMP: flag = 0 round = 5
D (42776) BT_SMP: smp_xor_128
D (42776) BT_SMP: cmac_aes_k_calculate
D (42786) BT_SMP: smp_xor_128
D (42786) BT_SMP: smp_encrypt_data
D (42786) BT_SMP: smp_xor_128
D (42796) BT_SMP: smp_encrypt_data
D (42796) BT_SMP: smp_xor_128
D (42796) BT_SMP: smp_encrypt_data
D (42806) BT_SMP: smp_xor_128
D (42806) BT_SMP: smp_encrypt_data
D (42816) BT_SMP: smp_xor_128
D (42816) BT_SMP: smp_encrypt_data
D (42816) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (42826) BT_SMP: p_mac[0] = 0x70 p_mac[1] = 0x3e p_mac[2] = 0x3e p_mac[3] = 0xc5
D (42826) BT_SMP: p_mac[4] = 0xf2 p_mac[5] = 0xab p_mac[6] = 0xd8 p_mac[7] = 0xf3
D (42836) BT_SMP: peer commitment calculation is completed
D (42846) BT_SMP: Commitment check succeeds
D (42846) BT_SMP: smp_send_rand
D (42856) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (42856) BT_SMP: smp_build_rand_cmd
D (42856) BT_SMP: smp_send_msg_to_L2CAP
D (42866) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (42876) BT_SMP: smp_start_nonce_generation
D (42876) BT_SMP: smp_process_peer_nonce end
D (42886) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (42886) BT_SMP: smp_rand_back state=0xd
D (42896) BT_SMP: smp_finish_nonce_generation
D (42896) BT_SMP:
SMDBG l2c smp_data_received
D (42906) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (42906) BT_SMP: main smp_sm_event
D (42916) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (42926) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (42936) BT_SMP: smp_process_pairing_commitment
D (42936) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (42946) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (42956) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (42956) BT_SMP: smp_rand_back state=0xe
D (42966) BT_SMP: smp_process_new_nonce round 12
D (42966) BT_SMP: main smp_sm_event
D (42966) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (42976) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (42986) BT_SMP: smp_process_local_nonce
D (42996) BT_SMP: smp_calculate_local_commitment
D (42996) BT_SMP: random: 0x5f, round: 12, i: 1, j: 4
D (43006) BT_SMP: smp_calculate_random_input ri=0x81
D (43006) BT_SMP: smp_calculate_f4
D (43016) BT_SMP: aes_cipher_msg_auth_code
D (43016) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (43026) BT_SMP: cmac_generate_subkey
D (43026) BT_SMP: smp_encrypt_data
D (43036) BT_SMP: cmac_subkey_cont
D (43036) BT_SMP: leftshift_onebit
D (43036) BT_SMP: smp_xor_128
D (43036) BT_SMP: leftshift_onebit
D (43046) BT_SMP: cmac_prepare_last_block
D (43046) BT_SMP: flag = 0 round = 5
D (43056) BT_SMP: smp_xor_128
D (43056) BT_SMP: cmac_aes_k_calculate
D (43056) BT_SMP: smp_xor_128
D (43066) BT_SMP: smp_encrypt_data
D (43066) BT_SMP: smp_xor_128
D (43066) BT_SMP: smp_encrypt_data
D (43076) BT_SMP: smp_xor_128
D (43076) BT_SMP: smp_encrypt_data
D (43076) BT_SMP: smp_xor_128
D (43086) BT_SMP: smp_encrypt_data
D (43086) BT_SMP: smp_xor_128
D (43086) BT_SMP: smp_encrypt_data
D (43096) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (43096) BT_SMP: p_mac[0] = 0x71 p_mac[1] = 0x3b p_mac[2] = 0xec p_mac[3] = 0x31
D (43106) BT_SMP: p_mac[4] = 0x13 p_mac[5] = 0xa0 p_mac[6] = 0xa6 p_mac[7] = 0x7a
D (43116) BT_SMP: local commitment calculation is completed
D (43116) BT_SMP: smp_send_commitment
D (43126) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (43126) BT_SMP: smp_build_pairing_commitment_cmd
D (43136) BT_SMP: smp_send_msg_to_L2CAP
D (43136) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (43146) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (43166) BT_SMP:
SMDBG l2c smp_data_received
D (43176) BT_SMP: main smp_sm_event
D (43176) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (43176) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (43186) BT_SMP: smp_proc_rand
D (43186) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (43196) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (43206) BT_SMP: smp_process_peer_nonce start
D (43206) BT_SMP: smp_check_commitment
D (43206) BT_SMP: smp_calculate_peer_commitment
D (43216) BT_SMP: random: 0x5f, round: 12, i: 1, j: 4
D (43216) BT_SMP: smp_calculate_random_input ri=0x81
D (43226) BT_SMP: smp_calculate_f4
D (43226) BT_SMP: aes_cipher_msg_auth_code
D (43236) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (43236) BT_SMP: cmac_generate_subkey
D (43246) BT_SMP: smp_encrypt_data
D (43246) BT_SMP: cmac_subkey_cont
D (43246) BT_SMP: leftshift_onebit
D (43256) BT_SMP: smp_xor_128
D (43256) BT_SMP: leftshift_onebit
D (43256) BT_SMP: cmac_prepare_last_block
D (43266) BT_SMP: flag = 0 round = 5
D (43266) BT_SMP: smp_xor_128
D (43276) BT_SMP: cmac_aes_k_calculate
D (43276) BT_SMP: smp_xor_128
D (43276) BT_SMP: smp_encrypt_data
D (43286) BT_SMP: smp_xor_128
D (43286) BT_SMP: smp_encrypt_data
D (43286) BT_SMP: smp_xor_128
D (43296) BT_SMP: smp_encrypt_data
D (43296) BT_SMP: smp_xor_128
D (43296) BT_SMP: smp_encrypt_data
D (43306) BT_SMP: smp_xor_128
D (43306) BT_SMP: smp_encrypt_data
D (43306) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (43316) BT_SMP: p_mac[0] = 0x89 p_mac[1] = 0xce p_mac[2] = 0x3d p_mac[3] = 0xb8
D (43326) BT_SMP: p_mac[4] = 0x8f p_mac[5] = 0x21 p_mac[6] = 0x7e p_mac[7] = 0x85
D (43326) BT_SMP: peer commitment calculation is completed
D (43336) BT_SMP: Commitment check succeeds
D (43336) BT_SMP: smp_send_rand
D (43346) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (43346) BT_SMP: smp_build_rand_cmd
D (43356) BT_SMP: smp_send_msg_to_L2CAP
D (43356) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (43366) BT_SMP: smp_start_nonce_generation
D (43366) BT_SMP: smp_process_peer_nonce end
D (43376) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (43386) BT_SMP: smp_rand_back state=0xd
D (43386) BT_SMP: smp_finish_nonce_generation
D (43396) BT_SMP:
SMDBG l2c smp_data_received
D (43396) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (43406) BT_SMP: main smp_sm_event
D (43406) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (43416) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (43426) BT_SMP: smp_process_pairing_commitment
D (43426) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (43436) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (43446) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (43446) BT_SMP: smp_rand_back state=0xe
D (43456) BT_SMP: smp_process_new_nonce round 13
D (43456) BT_SMP: main smp_sm_event
D (43466) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (43476) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (43486) BT_SMP: smp_process_local_nonce
D (43486) BT_SMP: smp_calculate_local_commitment
D (43486) BT_SMP: random: 0x5f, round: 13, i: 1, j: 5
D (43496) BT_SMP: smp_calculate_random_input ri=0x80
D (43506) BT_SMP: smp_calculate_f4
D (43506) BT_SMP: aes_cipher_msg_auth_code
D (43506) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (43516) BT_SMP: cmac_generate_subkey
D (43516) BT_SMP: smp_encrypt_data
D (43526) BT_SMP: cmac_subkey_cont
D (43526) BT_SMP: leftshift_onebit
D (43526) BT_SMP: leftshift_onebit
D (43536) BT_SMP: cmac_prepare_last_block
D (43536) BT_SMP: flag = 0 round = 5
D (43536) BT_SMP: smp_xor_128
D (43546) BT_SMP: cmac_aes_k_calculate
D (43546) BT_SMP: smp_xor_128
D (43556) BT_SMP: smp_encrypt_data
D (43556) BT_SMP: smp_xor_128
D (43556) BT_SMP: smp_encrypt_data
D (43566) BT_SMP: smp_xor_128
D (43566) BT_SMP: smp_encrypt_data
D (43566) BT_SMP: smp_xor_128
D (43576) BT_SMP: smp_encrypt_data
D (43576) BT_SMP: smp_xor_128
D (43576) BT_SMP: smp_encrypt_data
D (43586) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (43586) BT_SMP: p_mac[0] = 0x2b p_mac[1] = 0x80 p_mac[2] = 0xee p_mac[3] = 0x77
D (43596) BT_SMP: p_mac[4] = 0xdf p_mac[5] = 0x2c p_mac[6] = 0x30 p_mac[7] = 0x36
D (43606) BT_SMP: local commitment calculation is completed
D (43606) BT_SMP: smp_send_commitment
D (43616) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (43616) BT_SMP: smp_build_pairing_commitment_cmd
D (43626) BT_SMP: smp_send_msg_to_L2CAP
D (43626) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (43636) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (43646) BT_SMP:
SMDBG l2c smp_data_received
D (43656) BT_SMP: main smp_sm_event
D (43656) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (43656) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (43666) BT_SMP: smp_proc_rand
D (43666) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (43676) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (43686) BT_SMP: smp_process_peer_nonce start
D (43686) BT_SMP: smp_check_commitment
D (43696) BT_SMP: smp_calculate_peer_commitment
D (43696) BT_SMP: random: 0x5f, round: 13, i: 1, j: 5
D (43706) BT_SMP: smp_calculate_random_input ri=0x80
D (43706) BT_SMP: smp_calculate_f4
D (43716) BT_SMP: aes_cipher_msg_auth_code
D (43716) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (43726) BT_SMP: cmac_generate_subkey
D (43726) BT_SMP: smp_encrypt_data
D (43726) BT_SMP: cmac_subkey_cont
D (43736) BT_SMP: leftshift_onebit
D (43736) BT_SMP: leftshift_onebit
D (43736) BT_SMP: smp_xor_128
D (43746) BT_SMP: cmac_prepare_last_block
D (43746) BT_SMP: flag = 0 round = 5
D (43746) BT_SMP: smp_xor_128
D (43756) BT_SMP: cmac_aes_k_calculate
D (43756) BT_SMP: smp_xor_128
D (43756) BT_SMP: smp_encrypt_data
D (43766) BT_SMP: smp_xor_128
D (43766) BT_SMP: smp_encrypt_data
D (43776) BT_SMP: smp_xor_128
D (43776) BT_SMP: smp_encrypt_data
D (43776) BT_SMP: smp_xor_128
D (43786) BT_SMP: smp_encrypt_data
D (43786) BT_SMP: smp_xor_128
D (43786) BT_SMP: smp_encrypt_data
D (43796) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (43796) BT_SMP: p_mac[0] = 0x37 p_mac[1] = 0x69 p_mac[2] = 0xd7 p_mac[3] = 0x0d
D (43806) BT_SMP: p_mac[4] = 0x12 p_mac[5] = 0xbf p_mac[6] = 0xc3 p_mac[7] = 0xdd
D (43816) BT_SMP: peer commitment calculation is completed
D (43816) BT_SMP: Commitment check succeeds
D (43826) BT_SMP: smp_send_rand
D (43826) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (43826) BT_SMP: smp_build_rand_cmd
D (43836) BT_SMP: smp_send_msg_to_L2CAP
D (43836) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (43846) BT_SMP: smp_start_nonce_generation
D (43856) BT_SMP: smp_process_peer_nonce end
D (43856) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (43866) BT_SMP: smp_rand_back state=0xd
D (43866) BT_SMP: smp_finish_nonce_generation
D (43876) BT_SMP:
SMDBG l2c smp_data_received
D (43876) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (43886) BT_SMP: main smp_sm_event
D (43886) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (43896) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (43906) BT_SMP: smp_process_pairing_commitment
D (43916) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (43916) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (43926) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (43936) BT_SMP: smp_rand_back state=0xe
D (43936) BT_SMP: smp_process_new_nonce round 14
D (43936) BT_SMP: main smp_sm_event
D (43946) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (43956) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (43966) BT_SMP: smp_process_local_nonce
D (43966) BT_SMP: smp_calculate_local_commitment
D (43976) BT_SMP: random: 0x5f, round: 14, i: 1, j: 6
D (43976) BT_SMP: smp_calculate_random_input ri=0x81
D (43986) BT_SMP: smp_calculate_f4
D (43986) BT_SMP: aes_cipher_msg_auth_code
D (43986) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (43996) BT_SMP: cmac_generate_subkey
D (43996) BT_SMP: smp_encrypt_data
D (44006) BT_SMP: cmac_subkey_cont
D (44006) BT_SMP: leftshift_onebit
D (44016) BT_SMP: leftshift_onebit
D (44016) BT_SMP: smp_xor_128
D (44016) BT_SMP: cmac_prepare_last_block
D (44026) BT_SMP: flag = 0 round = 5
D (44026) BT_SMP: smp_xor_128
D (44026) BT_SMP: cmac_aes_k_calculate
D (44036) BT_SMP: smp_xor_128
D (44036) BT_SMP: smp_encrypt_data
D (44036) BT_SMP: smp_xor_128
D (44046) BT_SMP: smp_encrypt_data
D (44046) BT_SMP: smp_xor_128
D (44046) BT_SMP: smp_encrypt_data
D (44056) BT_SMP: smp_xor_128
D (44056) BT_SMP: smp_encrypt_data
D (44056) BT_SMP: smp_xor_128
D (44066) BT_SMP: smp_encrypt_data
D (44066) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (44076) BT_SMP: p_mac[0] = 0x25 p_mac[1] = 0xbb p_mac[2] = 0xf9 p_mac[3] = 0x28
D (44076) BT_SMP: p_mac[4] = 0xdc p_mac[5] = 0xf1 p_mac[6] = 0x05 p_mac[7] = 0xf1
D (44086) BT_SMP: local commitment calculation is completed
D (44096) BT_SMP: smp_send_commitment
D (44096) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (44106) BT_SMP: smp_build_pairing_commitment_cmd
D (44106) BT_SMP: smp_send_msg_to_L2CAP
D (44116) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (44116) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (44146) BT_SMP:
SMDBG l2c smp_data_received
D (44146) BT_SMP: main smp_sm_event
D (44146) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (44156) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (44156) BT_SMP: smp_proc_rand
D (44166) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (44166) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (44176) BT_SMP: smp_process_peer_nonce start
D (44186) BT_SMP: smp_check_commitment
D (44186) BT_SMP: smp_calculate_peer_commitment
D (44186) BT_SMP: random: 0x5f, round: 14, i: 1, j: 6
D (44196) BT_SMP: smp_calculate_random_input ri=0x81
D (44196) BT_SMP: smp_calculate_f4
D (44206) BT_SMP: aes_cipher_msg_auth_code
D (44206) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (44216) BT_SMP: cmac_generate_subkey
D (44216) BT_SMP: smp_encrypt_data
D (44226) BT_SMP: cmac_subkey_cont
D (44226) BT_SMP: leftshift_onebit
D (44226) BT_SMP: leftshift_onebit
D (44236) BT_SMP: smp_xor_128
D (44236) BT_SMP: cmac_prepare_last_block
D (44236) BT_SMP: flag = 0 round = 5
D (44246) BT_SMP: smp_xor_128
D (44246) BT_SMP: cmac_aes_k_calculate
D (44246) BT_SMP: smp_xor_128
D (44256) BT_SMP: smp_encrypt_data
D (44256) BT_SMP: smp_xor_128
D (44256) BT_SMP: smp_encrypt_data
D (44266) BT_SMP: smp_xor_128
D (44266) BT_SMP: smp_encrypt_data
D (44276) BT_SMP: smp_xor_128
D (44276) BT_SMP: smp_encrypt_data
D (44276) BT_SMP: smp_xor_128
D (44286) BT_SMP: smp_encrypt_data
D (44286) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (44286) BT_SMP: p_mac[0] = 0xb5 p_mac[1] = 0x78 p_mac[2] = 0x57 p_mac[3] = 0xd1
D (44296) BT_SMP: p_mac[4] = 0x60 p_mac[5] = 0xff p_mac[6] = 0xc4 p_mac[7] = 0xe2
D (44306) BT_SMP: peer commitment calculation is completed
D (44306) BT_SMP: Commitment check succeeds
D (44316) BT_SMP: smp_send_rand
D (44316) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (44326) BT_SMP: smp_build_rand_cmd
D (44326) BT_SMP: smp_send_msg_to_L2CAP
D (44336) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (44336) BT_SMP: smp_start_nonce_generation
D (44346) BT_SMP: smp_process_peer_nonce end
D (44346) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (44356) BT_SMP: smp_rand_back state=0xd
D (44356) BT_SMP: smp_finish_nonce_generation
D (44366) BT_SMP:
SMDBG l2c smp_data_received
D (44366) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (44376) BT_SMP: main smp_sm_event
D (44386) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (44396) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (44396) BT_SMP: smp_process_pairing_commitment
D (44406) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (44416) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (44416) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (44426) BT_SMP: smp_rand_back state=0xe
D (44426) BT_SMP: smp_process_new_nonce round 15
D (44436) BT_SMP: main smp_sm_event
D (44436) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (44446) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (44456) BT_SMP: smp_process_local_nonce
D (44456) BT_SMP: smp_calculate_local_commitment
D (44466) BT_SMP: random: 0x5f, round: 15, i: 1, j: 7
D (44476) BT_SMP: smp_calculate_random_input ri=0x80
D (44476) BT_SMP: smp_calculate_f4
D (44476) BT_SMP: aes_cipher_msg_auth_code
D (44486) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (44486) BT_SMP: cmac_generate_subkey
D (44496) BT_SMP: smp_encrypt_data
D (44496) BT_SMP: cmac_subkey_cont
D (44506) BT_SMP: leftshift_onebit
D (44506) BT_SMP: smp_xor_128
D (44506) BT_SMP: leftshift_onebit
D (44516) BT_SMP: cmac_prepare_last_block
D (44516) BT_SMP: flag = 0 round = 5
D (44516) BT_SMP: smp_xor_128
D (44526) BT_SMP: cmac_aes_k_calculate
D (44526) BT_SMP: smp_xor_128
D (44526) BT_SMP: smp_encrypt_data
D (44536) BT_SMP: smp_xor_128
D (44536) BT_SMP: smp_encrypt_data
D (44536) BT_SMP: smp_xor_128
D (44546) BT_SMP: smp_encrypt_data
D (44546) BT_SMP: smp_xor_128
D (44546) BT_SMP: smp_encrypt_data
D (44556) BT_SMP: smp_xor_128
D (44556) BT_SMP: smp_encrypt_data
D (44556) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (44566) BT_SMP: p_mac[0] = 0x14 p_mac[1] = 0x6c p_mac[2] = 0x6c p_mac[3] = 0xf4
D (44576) BT_SMP: p_mac[4] = 0x35 p_mac[5] = 0x37 p_mac[6] = 0xf4 p_mac[7] = 0xe3
D (44576) BT_SMP: local commitment calculation is completed
D (44586) BT_SMP: smp_send_commitment
D (44586) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (44596) BT_SMP: smp_build_pairing_commitment_cmd
D (44596) BT_SMP: smp_send_msg_to_L2CAP
D (44606) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (44616) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (44626) BT_SMP:
SMDBG l2c smp_data_received
D (44626) BT_SMP: main smp_sm_event
D (44626) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (44636) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (44646) BT_SMP: smp_proc_rand
D (44646) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (44656) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (44656) BT_SMP: smp_process_peer_nonce start
D (44666) BT_SMP: smp_check_commitment
D (44666) BT_SMP: smp_calculate_peer_commitment
D (44676) BT_SMP: random: 0x5f, round: 15, i: 1, j: 7
D (44676) BT_SMP: smp_calculate_random_input ri=0x80
D (44686) BT_SMP: smp_calculate_f4
D (44686) BT_SMP: aes_cipher_msg_auth_code
D (44696) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (44696) BT_SMP: cmac_generate_subkey
D (44706) BT_SMP: smp_encrypt_data
D (44706) BT_SMP: cmac_subkey_cont
D (44706) BT_SMP: leftshift_onebit
D (44716) BT_SMP: leftshift_onebit
D (44716) BT_SMP: smp_xor_128
D (44716) BT_SMP: cmac_prepare_last_block
D (44726) BT_SMP: flag = 0 round = 5
D (44726) BT_SMP: smp_xor_128
D (44726) BT_SMP: cmac_aes_k_calculate
D (44736) BT_SMP: smp_xor_128
D (44736) BT_SMP: smp_encrypt_data
D (44736) BT_SMP: smp_xor_128
D (44746) BT_SMP: smp_encrypt_data
D (44746) BT_SMP: smp_xor_128
D (44746) BT_SMP: smp_encrypt_data
D (44756) BT_SMP: smp_xor_128
D (44756) BT_SMP: smp_encrypt_data
D (44766) BT_SMP: smp_xor_128
D (44766) BT_SMP: smp_encrypt_data
D (44766) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (44776) BT_SMP: p_mac[0] = 0x9a p_mac[1] = 0x58 p_mac[2] = 0x0e p_mac[3] = 0x20
D (44776) BT_SMP: p_mac[4] = 0xb6 p_mac[5] = 0xf5 p_mac[6] = 0x54 p_mac[7] = 0xce
D (44786) BT_SMP: peer commitment calculation is completed
D (44796) BT_SMP: Commitment check succeeds
D (44796) BT_SMP: smp_send_rand
D (44806) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (44806) BT_SMP: smp_build_rand_cmd
D (44806) BT_SMP: smp_send_msg_to_L2CAP
D (44816) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (44826) BT_SMP: smp_start_nonce_generation
D (44826) BT_SMP: smp_process_peer_nonce end
D (44836) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (44836) BT_SMP: smp_rand_back state=0xd
D (44846) BT_SMP: smp_finish_nonce_generation
D (44846) BT_SMP:
SMDBG l2c smp_data_received
D (44856) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (44856) BT_SMP: main smp_sm_event
D (44866) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (44876) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (44886) BT_SMP: smp_process_pairing_commitment
D (44886) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (44896) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (44906) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (44906) BT_SMP: smp_rand_back state=0xe
D (44916) BT_SMP: smp_process_new_nonce round 16
D (44916) BT_SMP: main smp_sm_event
D (44916) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (44926) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (44936) BT_SMP: smp_process_local_nonce
D (44946) BT_SMP: smp_calculate_local_commitment
D (44946) BT_SMP: random: 0x0b, round: 16, i: 2, j: 0
D (44956) BT_SMP: smp_calculate_random_input ri=0x81
D (44956) BT_SMP: smp_calculate_f4
D (44966) BT_SMP: aes_cipher_msg_auth_code
D (44966) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (44976) BT_SMP: cmac_generate_subkey
D (44976) BT_SMP: smp_encrypt_data
D (44976) BT_SMP: cmac_subkey_cont
D (44986) BT_SMP: leftshift_onebit
D (44986) BT_SMP: smp_xor_128
D (44986) BT_SMP: leftshift_onebit
D (44996) BT_SMP: cmac_prepare_last_block
D (44996) BT_SMP: flag = 0 round = 5
D (45006) BT_SMP: smp_xor_128
D (45006) BT_SMP: cmac_aes_k_calculate
D (45006) BT_SMP: smp_xor_128
D (45016) BT_SMP: smp_encrypt_data
D (45016) BT_SMP: smp_xor_128
D (45016) BT_SMP: smp_encrypt_data
D (45026) BT_SMP: smp_xor_128
D (45026) BT_SMP: smp_encrypt_data
D (45026) BT_SMP: smp_xor_128
D (45036) BT_SMP: smp_encrypt_data
D (45036) BT_SMP: smp_xor_128
D (45036) BT_SMP: smp_encrypt_data
D (45046) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (45046) BT_SMP: p_mac[0] = 0x16 p_mac[1] = 0x73 p_mac[2] = 0xb3 p_mac[3] = 0xa4
D (45056) BT_SMP: p_mac[4] = 0x4d p_mac[5] = 0x94 p_mac[6] = 0xbf p_mac[7] = 0xc2
D (45066) BT_SMP: local commitment calculation is completed
D (45066) BT_SMP: smp_send_commitment
D (45076) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (45076) BT_SMP: smp_build_pairing_commitment_cmd
D (45086) BT_SMP: smp_send_msg_to_L2CAP
D (45086) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (45096) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (45116) BT_SMP:
SMDBG l2c smp_data_received
D (45126) BT_SMP: main smp_sm_event
D (45126) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (45126) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (45136) BT_SMP: smp_proc_rand
D (45136) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (45146) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (45156) BT_SMP: smp_process_peer_nonce start
D (45156) BT_SMP: smp_check_commitment
D (45156) BT_SMP: smp_calculate_peer_commitment
D (45166) BT_SMP: random: 0x0b, round: 16, i: 2, j: 0
D (45166) BT_SMP: smp_calculate_random_input ri=0x81
D (45176) BT_SMP: smp_calculate_f4
D (45176) BT_SMP: aes_cipher_msg_auth_code
D (45186) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (45186) BT_SMP: cmac_generate_subkey
D (45196) BT_SMP: smp_encrypt_data
D (45196) BT_SMP: cmac_subkey_cont
D (45196) BT_SMP: leftshift_onebit
D (45206) BT_SMP: smp_xor_128
D (45206) BT_SMP: leftshift_onebit
D (45206) BT_SMP: smp_xor_128
D (45216) BT_SMP: cmac_prepare_last_block
D (45216) BT_SMP: flag = 0 round = 5
D (45226) BT_SMP: smp_xor_128
D (45226) BT_SMP: cmac_aes_k_calculate
D (45226) BT_SMP: smp_xor_128
D (45236) BT_SMP: smp_encrypt_data
D (45236) BT_SMP: smp_xor_128
D (45236) BT_SMP: smp_encrypt_data
D (45246) BT_SMP: smp_xor_128
D (45246) BT_SMP: smp_encrypt_data
D (45246) BT_SMP: smp_xor_128
D (45256) BT_SMP: smp_encrypt_data
D (45256) BT_SMP: smp_xor_128
D (45256) BT_SMP: smp_encrypt_data
D (45266) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (45266) BT_SMP: p_mac[0] = 0x28 p_mac[1] = 0xfb p_mac[2] = 0x76 p_mac[3] = 0xc6
D (45276) BT_SMP: p_mac[4] = 0xe6 p_mac[5] = 0x68 p_mac[6] = 0x44 p_mac[7] = 0x2d
D (45286) BT_SMP: peer commitment calculation is completed
D (45286) BT_SMP: Commitment check succeeds
D (45296) BT_SMP: smp_send_rand
D (45296) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (45306) BT_SMP: smp_build_rand_cmd
D (45306) BT_SMP: smp_send_msg_to_L2CAP
D (45306) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (45316) BT_SMP: smp_start_nonce_generation
D (45326) BT_SMP: smp_process_peer_nonce end
D (45326) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (45336) BT_SMP: smp_rand_back state=0xd
D (45336) BT_SMP: smp_finish_nonce_generation
D (45346) BT_SMP:
SMDBG l2c smp_data_received
D (45346) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (45356) BT_SMP: main smp_sm_event
D (45356) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (45366) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (45376) BT_SMP: smp_process_pairing_commitment
D (45386) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (45386) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (45396) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (45406) BT_SMP: smp_rand_back state=0xe
D (45406) BT_SMP: smp_process_new_nonce round 17
D (45416) BT_SMP: main smp_sm_event
D (45416) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (45426) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (45436) BT_SMP: smp_process_local_nonce
D (45436) BT_SMP: smp_calculate_local_commitment
D (45446) BT_SMP: random: 0x0b, round: 17, i: 2, j: 1
D (45446) BT_SMP: smp_calculate_random_input ri=0x81
D (45456) BT_SMP: smp_calculate_f4
D (45456) BT_SMP: aes_cipher_msg_auth_code
D (45466) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (45466) BT_SMP: cmac_generate_subkey
D (45476) BT_SMP: smp_encrypt_data
D (45476) BT_SMP: cmac_subkey_cont
D (45476) BT_SMP: leftshift_onebit
D (45486) BT_SMP: smp_xor_128
D (45486) BT_SMP: leftshift_onebit
D (45486) BT_SMP: cmac_prepare_last_block
D (45496) BT_SMP: flag = 0 round = 5
D (45496) BT_SMP: smp_xor_128
D (45496) BT_SMP: cmac_aes_k_calculate
D (45506) BT_SMP: smp_xor_128
D (45506) BT_SMP: smp_encrypt_data
D (45516) BT_SMP: smp_xor_128
D (45516) BT_SMP: smp_encrypt_data
D (45516) BT_SMP: smp_xor_128
D (45526) BT_SMP: smp_encrypt_data
D (45526) BT_SMP: smp_xor_128
D (45526) BT_SMP: smp_encrypt_data
D (45536) BT_SMP: smp_xor_128
D (45536) BT_SMP: smp_encrypt_data
D (45536) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (45546) BT_SMP: p_mac[0] = 0xa5 p_mac[1] = 0x0c p_mac[2] = 0xed p_mac[3] = 0x6a
D (45546) BT_SMP: p_mac[4] = 0x60 p_mac[5] = 0x32 p_mac[6] = 0xc7 p_mac[7] = 0xca
D (45556) BT_SMP: local commitment calculation is completed
D (45566) BT_SMP: smp_send_commitment
D (45566) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (45576) BT_SMP: smp_build_pairing_commitment_cmd
D (45576) BT_SMP: smp_send_msg_to_L2CAP
D (45586) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (45586) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (45616) BT_SMP:
SMDBG l2c smp_data_received
D (45616) BT_SMP: main smp_sm_event
D (45616) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (45626) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (45626) BT_SMP: smp_proc_rand
D (45636) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (45636) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (45646) BT_SMP: smp_process_peer_nonce start
D (45656) BT_SMP: smp_check_commitment
D (45656) BT_SMP: smp_calculate_peer_commitment
D (45656) BT_SMP: random: 0x0b, round: 17, i: 2, j: 1
D (45666) BT_SMP: smp_calculate_random_input ri=0x81
D (45666) BT_SMP: smp_calculate_f4
D (45676) BT_SMP: aes_cipher_msg_auth_code
D (45676) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (45686) BT_SMP: cmac_generate_subkey
D (45686) BT_SMP: smp_encrypt_data
D (45696) BT_SMP: cmac_subkey_cont
D (45696) BT_SMP: leftshift_onebit
D (45696) BT_SMP: smp_xor_128
D (45706) BT_SMP: leftshift_onebit
D (45706) BT_SMP: cmac_prepare_last_block
D (45706) BT_SMP: flag = 0 round = 5
D (45716) BT_SMP: smp_xor_128
D (45716) BT_SMP: cmac_aes_k_calculate
D (45716) BT_SMP: smp_xor_128
D (45726) BT_SMP: smp_encrypt_data
D (45726) BT_SMP: smp_xor_128
D (45726) BT_SMP: smp_encrypt_data
D (45736) BT_SMP: smp_xor_128
D (45736) BT_SMP: smp_encrypt_data
D (45746) BT_SMP: smp_xor_128
D (45746) BT_SMP: smp_encrypt_data
D (45746) BT_SMP: smp_xor_128
D (45756) BT_SMP: smp_encrypt_data
D (45756) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (45756) BT_SMP: p_mac[0] = 0x17 p_mac[1] = 0xef p_mac[2] = 0x4f p_mac[3] = 0xfc
D (45766) BT_SMP: p_mac[4] = 0x61 p_mac[5] = 0x5f p_mac[6] = 0xb9 p_mac[7] = 0x0c
D (45776) BT_SMP: peer commitment calculation is completed
D (45776) BT_SMP: Commitment check succeeds
D (45786) BT_SMP: smp_send_rand
D (45786) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (45796) BT_SMP: smp_build_rand_cmd
D (45796) BT_SMP: smp_send_msg_to_L2CAP
D (45806) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (45806) BT_SMP: smp_start_nonce_generation
D (45816) BT_SMP: smp_process_peer_nonce end
D (45816) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (45826) BT_SMP: smp_rand_back state=0xd
D (45826) BT_SMP: smp_finish_nonce_generation
D (45836) BT_SMP: smp_rand_back state=0xe
D (45836) BT_SMP: smp_process_new_nonce round 18
D (45846) BT_SMP: main smp_sm_event
D (45846) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (45856) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (45866) BT_SMP: smp_process_local_nonce
D (45866) BT_SMP: smp_calculate_local_commitment
D (45876) BT_SMP: random: 0x0b, round: 18, i: 2, j: 2
D (45876) BT_SMP: smp_calculate_random_input ri=0x80
D (45886) BT_SMP: smp_calculate_f4
D (45886) BT_SMP: aes_cipher_msg_auth_code
D (45896) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (45896) BT_SMP: cmac_generate_subkey
D (45906) BT_SMP: smp_encrypt_data
D (45906) BT_SMP: cmac_subkey_cont
D (45906) BT_SMP: leftshift_onebit
D (45916) BT_SMP: smp_xor_128
D (45916) BT_SMP: leftshift_onebit
D (45916) BT_SMP: cmac_prepare_last_block
D (45926) BT_SMP: flag = 0 round = 5
D (45926) BT_SMP: smp_xor_128
D (45936) BT_SMP: cmac_aes_k_calculate
D (45936) BT_SMP: smp_xor_128
D (45936) BT_SMP: smp_encrypt_data
D (45946) BT_SMP: smp_xor_128
D (45946) BT_SMP: smp_encrypt_data
D (45946) BT_SMP: smp_xor_128
D (45956) BT_SMP: smp_encrypt_data
D (45956) BT_SMP: smp_xor_128
D (45956) BT_SMP: smp_encrypt_data
D (45966) BT_SMP: smp_xor_128
D (45966) BT_SMP: smp_encrypt_data
D (45966) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (45976) BT_SMP: p_mac[0] = 0x00 p_mac[1] = 0x54 p_mac[2] = 0x4a p_mac[3] = 0x9e
D (45986) BT_SMP: p_mac[4] = 0x4e p_mac[5] = 0x4f p_mac[6] = 0x32 p_mac[7] = 0xe9
D (45986) BT_SMP: local commitment calculation is completed
D (45996) BT_SMP: result state = SMP_STATE_WAIT_COMMITMENT
D (46006) BT_SMP:
SMDBG l2c smp_data_received
D (46006) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (46016) BT_SMP: main smp_sm_event
D (46016) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_COMMITMENT (9)], Event: [PAIR_COMMITMENT_EVT (15)]
D (46026) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (46036) BT_SMP: smp_process_pairing_commitment
D (46036) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (46046) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (46056) BT_SMP: smp_send_commitment
D (46056) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (46066) BT_SMP: smp_build_pairing_commitment_cmd
D (46066) BT_SMP: smp_send_msg_to_L2CAP
D (46076) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (46096) BT_SMP:
SMDBG l2c smp_data_received
D (46096) BT_SMP: main smp_sm_event
D (46096) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (46106) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (46106) BT_SMP: smp_proc_rand
D (46116) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (46116) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (46126) BT_SMP: smp_process_peer_nonce start
D (46136) BT_SMP: smp_check_commitment
D (46136) BT_SMP: smp_calculate_peer_commitment
D (46136) BT_SMP: random: 0x0b, round: 18, i: 2, j: 2
D (46146) BT_SMP: smp_calculate_random_input ri=0x80
D (46146) BT_SMP: smp_calculate_f4
D (46156) BT_SMP: aes_cipher_msg_auth_code
D (46156) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (46166) BT_SMP: cmac_generate_subkey
D (46166) BT_SMP: smp_encrypt_data
D (46176) BT_SMP: cmac_subkey_cont
D (46176) BT_SMP: leftshift_onebit
D (46176) BT_SMP: smp_xor_128
D (46186) BT_SMP: leftshift_onebit
D (46186) BT_SMP: smp_xor_128
D (46186) BT_SMP: cmac_prepare_last_block
D (46196) BT_SMP: flag = 0 round = 5
D (46196) BT_SMP: smp_xor_128
D (46196) BT_SMP: cmac_aes_k_calculate
D (46206) BT_SMP: smp_xor_128
D (46206) BT_SMP: smp_encrypt_data
D (46216) BT_SMP: smp_xor_128
D (46216) BT_SMP: smp_encrypt_data
D (46216) BT_SMP: smp_xor_128
D (46226) BT_SMP: smp_encrypt_data
D (46226) BT_SMP: smp_xor_128
D (46226) BT_SMP: smp_encrypt_data
D (46236) BT_SMP: smp_xor_128
D (46236) BT_SMP: smp_encrypt_data
D (46236) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (46246) BT_SMP: p_mac[0] = 0x91 p_mac[1] = 0x67 p_mac[2] = 0x69 p_mac[3] = 0xe2
D (46246) BT_SMP: p_mac[4] = 0x17 p_mac[5] = 0xe7 p_mac[6] = 0x2b p_mac[7] = 0x5f
D (46256) BT_SMP: peer commitment calculation is completed
D (46266) BT_SMP: Commitment check succeeds
D (46266) BT_SMP: smp_send_rand
D (46276) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (46276) BT_SMP: smp_build_rand_cmd
D (46276) BT_SMP: smp_send_msg_to_L2CAP
D (46286) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (46296) BT_SMP: smp_start_nonce_generation
D (46306) BT_SMP: smp_process_peer_nonce end
D (46306) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (46306) BT_SMP: smp_rand_back state=0xd
D (46316) BT_SMP: smp_finish_nonce_generation
D (46316) BT_SMP:
SMDBG l2c smp_data_received
D (46326) BT_SMP: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x0d
D (46326) BT_SMP: main smp_sm_event
D (46336) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
D (46346) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
D (46356) BT_SMP: smp_process_pairing_commitment
D (46356) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0f
D (46366) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0f
D (46376) BT_SMP: result state = SMP_STATE_SEC_CONN_PHS1_START
D (46376) BT_SMP: smp_rand_back state=0xe
D (46386) BT_SMP: smp_process_new_nonce round 19
D (46386) BT_SMP: main smp_sm_event
D (46386) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
D (46406) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
D (46406) BT_SMP: smp_process_local_nonce
D (46416) BT_SMP: smp_calculate_local_commitment
D (46416) BT_SMP: random: 0x0b, round: 19, i: 2, j: 3
D (46426) BT_SMP: smp_calculate_random_input ri=0x81
D (46426) BT_SMP: smp_calculate_f4
D (46436) BT_SMP: aes_cipher_msg_auth_code
D (46436) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (46446) BT_SMP: cmac_generate_subkey
D (46446) BT_SMP: smp_encrypt_data
D (46456) BT_SMP: cmac_subkey_cont
D (46456) BT_SMP: leftshift_onebit
D (46456) BT_SMP: leftshift_onebit
D (46466) BT_SMP: smp_xor_128
D (46466) BT_SMP: cmac_prepare_last_block
D (46466) BT_SMP: flag = 0 round = 5
D (46476) BT_SMP: smp_xor_128
D (46476) BT_SMP: cmac_aes_k_calculate
D (46476) BT_SMP: smp_xor_128
D (46486) BT_SMP: smp_encrypt_data
D (46486) BT_SMP: smp_xor_128
D (46486) BT_SMP: smp_encrypt_data
D (46496) BT_SMP: smp_xor_128
D (46496) BT_SMP: smp_encrypt_data
D (46496) BT_SMP: smp_xor_128
D (46506) BT_SMP: smp_encrypt_data
D (46506) BT_SMP: smp_xor_128
D (46506) BT_SMP: smp_encrypt_data
D (46516) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (46516) BT_SMP: p_mac[0] = 0x16 p_mac[1] = 0xa8 p_mac[2] = 0x7a p_mac[3] = 0x7d
D (46526) BT_SMP: p_mac[4] = 0xf2 p_mac[5] = 0x4a p_mac[6] = 0x13 p_mac[7] = 0xed
D (46536) BT_SMP: local commitment calculation is completed
D (46536) BT_SMP: smp_send_commitment
D (46546) BT_SMP: smp_send_cmd on l2cap cmd_code=0xf
D (46546) BT_SMP: smp_build_pairing_commitment_cmd
D (46556) BT_SMP: smp_send_msg_to_L2CAP
D (46556) BT_SMP: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
D (46566) BT_SMP: result state = SMP_STATE_WAIT_NONCE
D (46586) BT_SMP:
SMDBG l2c smp_data_received
D (46596) BT_SMP: main smp_sm_event
D (46596) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
D (46596) BT_SMP: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
D (46606) BT_SMP: smp_proc_rand
D (46606) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x04
D (46616) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x04
D (46626) BT_SMP: smp_process_peer_nonce start
D (46626) BT_SMP: smp_check_commitment
D (46626) BT_SMP: smp_calculate_peer_commitment
D (46636) BT_SMP: random: 0x0b, round: 19, i: 2, j: 3
D (46636) BT_SMP: smp_calculate_random_input ri=0x81
D (46646) BT_SMP: smp_calculate_f4
D (46646) BT_SMP: aes_cipher_msg_auth_code
D (46656) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (46656) BT_SMP: cmac_generate_subkey
D (46666) BT_SMP: smp_encrypt_data
D (46666) BT_SMP: cmac_subkey_cont
D (46666) BT_SMP: leftshift_onebit
D (46676) BT_SMP: leftshift_onebit
D (46676) BT_SMP: cmac_prepare_last_block
D (46686) BT_SMP: flag = 0 round = 5
D (46686) BT_SMP: smp_xor_128
D (46686) BT_SMP: cmac_aes_k_calculate
D (46696) BT_SMP: smp_xor_128
D (46696) BT_SMP: smp_encrypt_data
D (46696) BT_SMP: smp_xor_128
D (46706) BT_SMP: smp_encrypt_data
D (46706) BT_SMP: smp_xor_128
D (46706) BT_SMP: smp_encrypt_data
D (46716) BT_SMP: smp_xor_128
D (46716) BT_SMP: smp_encrypt_data
D (46716) BT_SMP: smp_xor_128
D (46726) BT_SMP: smp_encrypt_data
D (46726) BT_SMP: tlen = 16 p_mac = 0x3ffccd04
D (46736) BT_SMP: p_mac[0] = 0xde p_mac[1] = 0xed p_mac[2] = 0xcd p_mac[3] = 0xfb
D (46736) BT_SMP: p_mac[4] = 0xaa p_mac[5] = 0x5a p_mac[6] = 0xef p_mac[7] = 0x93
D (46746) BT_SMP: peer commitment calculation is completed
D (46756) BT_SMP: Commitment check succeeds
D (46756) BT_SMP: smp_send_rand
D (46756) BT_SMP: smp_send_cmd on l2cap cmd_code=0x4
D (46766) BT_SMP: smp_build_rand_cmd
D (46766) BT_SMP: smp_send_msg_to_L2CAP
D (46776) BT_SMP: main smp_sm_event
D (46776) BT_SMP: SMP Role: Slave State: [SMP_STATE_SEC_CONN_PHS2_START (11)], Event: [SEC_CONN_PHASE1_CMPLT_EVT (32)]
D (46786) BT_SMP: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_WAIT_DHK_CHECK(12)
D (46796) BT_SMP: smp_calculate_local_dhkey_check
D (46806) BT_SMP: smp_calculate_f5_mackey_and_long_term_key
D (46806) BT_SMP: smp_collect_local_ble_address
D (46816) BT_SMP: smp_collect_peer_ble_address
D (46816) BT_SMP: smp_calculate_f5
D (46816) BT_SMP: smp_calculate_f5_key
D (46826) BT_SMP: aes_cipher_msg_auth_code
D (46826) BT_SMP: AES128_CMAC started, allocate buffer size = 32
D (46836) BT_SMP: cmac_generate_subkey
D (46836) BT_SMP: smp_encrypt_data
D (46846) BT_SMP: cmac_subkey_cont
D (46846) BT_SMP: leftshift_onebit
D (46846) BT_SMP: smp_xor_128
D (46856) BT_SMP: leftshift_onebit
D (46856) BT_SMP: cmac_prepare_last_block
D (46856) BT_SMP: flag = 1 round = 2
D (46866) BT_SMP: smp_xor_128
D (46866) BT_SMP: cmac_aes_k_calculate
D (46866) BT_SMP: smp_xor_128
D (46876) BT_SMP: smp_encrypt_data
D (46876) BT_SMP: smp_xor_128
D (46876) BT_SMP: smp_encrypt_data
D (46886) BT_SMP: tlen = 16 p_mac = 0x3ffccc54
D (46886) BT_SMP: p_mac[0] = 0x78 p_mac[1] = 0x79 p_mac[2] = 0x44 p_mac[3] = 0xc6
D (46896) BT_SMP: p_mac[4] = 0xe3 p_mac[5] = 0x8e p_mac[6] = 0xaf p_mac[7] = 0xc7
D (46906) BT_SMP: smp_calculate_f5_mackey_or_long_term_key
D (46906) BT_SMP: aes_cipher_msg_auth_code
D (46916) BT_SMP: AES128_CMAC started, allocate buffer size = 64
D (46916) BT_SMP: cmac_generate_subkey
D (46926) BT_SMP: smp_encrypt_data
D (46926) BT_SMP: cmac_subkey_cont
D (46926) BT_SMP: leftshift_onebit
D (46936) BT_SMP: smp_xor_128
D (46936) BT_SMP: leftshift_onebit
D (46946) BT_SMP: cmac_prepare_last_block
D (46946) BT_SMP: flag = 0 round = 4
D (46946) BT_SMP: smp_xor_128
D (46956) BT_SMP: cmac_aes_k_calculate
D (46956) BT_SMP: smp_xor_128
D (46956) BT_SMP: smp_encrypt_data
D (46966) BT_SMP: smp_xor_128
D (46966) BT_SMP: smp_encrypt_data
D (46966) BT_SMP: smp_xor_128
D (46976) BT_SMP: smp_encrypt_data
D (46976) BT_SMP: smp_xor_128
D (46976) BT_SMP: smp_encrypt_data
D (46986) BT_SMP: tlen = 16 p_mac = 0x3ffccc34
D (46986) BT_SMP: p_mac[0] = 0xbf p_mac[1] = 0x1e p_mac[2] = 0x42 p_mac[3] = 0xa4
D (46996) BT_SMP: p_mac[4] = 0x0a p_mac[5] = 0xf5 p_mac[6] = 0xd1 p_mac[7] = 0x60
D (47006) BT_SMP: smp_calculate_f5_mackey_or_long_term_key
D (47006) BT_SMP: aes_cipher_msg_auth_code
D (47016) BT_SMP: AES128_CMAC started, allocate buffer size = 64
D (47016) BT_SMP: cmac_generate_subkey
D (47026) BT_SMP: smp_encrypt_data
D (47026) BT_SMP: cmac_subkey_cont
D (47026) BT_SMP: leftshift_onebit
D (47036) BT_SMP: smp_xor_128
D (47036) BT_SMP: leftshift_onebit
D (47036) BT_SMP: cmac_prepare_last_block
D (47046) BT_SMP: flag = 0 round = 4
D (47046) BT_SMP: smp_xor_128
D (47056) BT_SMP: cmac_aes_k_calculate
D (47056) BT_SMP: smp_xor_128
D (47056) BT_SMP: smp_encrypt_data
D (47066) BT_SMP: smp_xor_128
D (47066) BT_SMP: smp_encrypt_data
D (47066) BT_SMP: smp_xor_128
D (47076) BT_SMP: smp_encrypt_data
D (47076) BT_SMP: smp_xor_128
D (47076) BT_SMP: smp_encrypt_data
D (47086) BT_SMP: tlen = 16 p_mac = 0x3ffccc34
D (47086) BT_SMP: p_mac[0] = 0xa5 p_mac[1] = 0xf2 p_mac[2] = 0x3f p_mac[3] = 0x06
D (47096) BT_SMP: p_mac[4] = 0x9b p_mac[5] = 0x29 p_mac[6] = 0xe0 p_mac[7] = 0x2a
D (47106) BT_SMP: smp_calculate_f5_mackey_and_long_term_key is completed
D (47106) BT_SMP: smp_collect_local_io_capabilities
D (47116) BT_SMP: smp_collect_local_ble_address
D (47116) BT_SMP: smp_collect_peer_ble_address
D (47126) BT_SMP: smp_calculate_f6
D (47126) BT_SMP: aes_cipher_msg_auth_code
D (47136) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (47136) BT_SMP: cmac_generate_subkey
D (47146) BT_SMP: smp_encrypt_data
D (47146) BT_SMP: cmac_subkey_cont
D (47146) BT_SMP: leftshift_onebit
D (47156) BT_SMP: smp_xor_128
D (47156) BT_SMP: leftshift_onebit
D (47156) BT_SMP: smp_xor_128
D (47166) BT_SMP: cmac_prepare_last_block
D (47166) BT_SMP: flag = 0 round = 5
D (47166) BT_SMP: smp_xor_128
D (47176) BT_SMP: cmac_aes_k_calculate
D (47176) BT_SMP: smp_xor_128
D (47176) BT_SMP: smp_encrypt_data
D (47186) BT_SMP: smp_xor_128
D (47186) BT_SMP: smp_encrypt_data
D (47196) BT_SMP: smp_xor_128
D (47196) BT_SMP: smp_encrypt_data
D (47196) BT_SMP: smp_xor_128
D (47206) BT_SMP: smp_encrypt_data
D (47206) BT_SMP: smp_xor_128
D (47206) BT_SMP: smp_encrypt_data
D (47216) BT_SMP: tlen = 16 p_mac = 0x3ffcccb4
D (47216) BT_SMP: p_mac[0] = 0xd8 p_mac[1] = 0x11 p_mac[2] = 0x5c p_mac[3] = 0x38
D (47226) BT_SMP: p_mac[4] = 0x03 p_mac[5] = 0x0f p_mac[6] = 0x6d p_mac[7] = 0x76
D (47236) BT_SMP: local DHKey check calculation is completed
D (47236) BT_SMP: smp_phase_2_dhkey_checks_are_present
D (47246) BT_SMP: result state = SMP_STATE_WAIT_DHK_CHECK
D (47246) BT_SMP: smp_process_peer_nonce end
D (47256) BT_SMP: result state = SMP_STATE_WAIT_DHK_CHECK
D (47256) BT_SMP:
SMDBG l2c smp_data_received
D (47266) BT_SMP: main smp_sm_event
D (47266) BT_SMP: SMP Role: Slave State: [SMP_STATE_WAIT_DHK_CHECK (12)], Event: [PAIR_DHKEY_CHECK_EVT (13)]
D (47276) BT_SMP: State change: SMP_STATE_WAIT_DHK_CHECK(12) ==> SMP_STATE_DHK_CHECK(13)
D (47286) BT_SMP: smp_process_dhkey_check
D (47286) BT_SMP: smp_command_has_invalid_parameters for cmd code 0x0d
D (47296) BT_SMP: smp_command_has_valid_fixed_length for cmd code 0x0d
D (47306) BT_SMP: smp_calculate_peer_dhkey_check
D (47306) BT_SMP: smp_collect_peer_io_capabilities
D (47316) BT_SMP: smp_collect_local_ble_address
D (47316) BT_SMP: smp_collect_peer_ble_address
D (47326) BT_SMP: smp_calculate_f6
D (47326) BT_SMP: aes_cipher_msg_auth_code
D (47326) BT_SMP: AES128_CMAC started, allocate buffer size = 80
D (47336) BT_SMP: cmac_generate_subkey
D (47336) BT_SMP: smp_encrypt_data
D (47346) BT_SMP: cmac_subkey_cont
D (47346) BT_SMP: leftshift_onebit
D (47346) BT_SMP: smp_xor_128
D (47356) BT_SMP: leftshift_onebit
D (47356) BT_SMP: smp_xor_128
D (47356) BT_SMP: cmac_prepare_last_block
D (47366) BT_SMP: flag = 0 round = 5
D (47366) BT_SMP: smp_xor_128
D (47366) BT_SMP: cmac_aes_k_calculate
D (47376) BT_SMP: smp_xor_128
D (47376) BT_SMP: smp_encrypt_data
D (47386) BT_SMP: smp_xor_128
D (47386) BT_SMP: smp_encrypt_data
D (47386) BT_SMP: smp_xor_128
D (47396) BT_SMP: smp_encrypt_data
D (47396) BT_SMP: smp_xor_128
D (47396) BT_SMP: smp_encrypt_data
D (47406) BT_SMP: smp_xor_128
D (47406) BT_SMP: smp_encrypt_data
D (47406) BT_SMP: tlen = 16 p_mac = 0x3ffccd14
D (47416) BT_SMP: p_mac[0] = 0x8c p_mac[1] = 0xdb p_mac[2] = 0x3f p_mac[3] = 0xc4
D (47426) BT_SMP: p_mac[4] = 0x90 p_mac[5] = 0xeb p_mac[6] = 0x7b p_mac[7] = 0x81
D (47426) BT_SMP: peer DHKey check calculation is completed
D (47436) BT_SMP: main smp_sm_event
D (47436) BT_SMP: SMP Role: Slave State: [SMP_STATE_DHK_CHECK (13)], Event: [SEC_CONN_KEY_READY_EVT (37)]
D (47446) BT_SMP: State change: SMP_STATE_DHK_CHECK(13) ==> SMP_STATE_DHK_CHECK(13)
D (47456) BT_SMP: smp_match_dhkey_checks
D (47456) BT_SMP: dhkey checks match
D (47466) BT_SMP: main smp_sm_event
D (47466) BT_SMP: SMP Role: Slave State: [SMP_STATE_DHK_CHECK (13)], Event: [PAIR_DHKEY_CHECK_EVT (13)]
D (47476) BT_SMP: State change: SMP_STATE_DHK_CHECK(13) ==> SMP_STATE_ENCRYPTION_PENDING(14)
D (47486) BT_SMP: smp_send_dhkey_check
D (47486) BT_SMP: smp_send_cmd on l2cap cmd_code=0xd
D (47496) BT_SMP: smp_build_pair_dhkey_check_cmd
D (47496) BT_SMP: smp_send_msg_to_L2CAP
D (47506) BT_SMP: result state = SMP_STATE_ENCRYPTION_PENDING
D (47506) BT_SMP: result state = SMP_STATE_ENCRYPTION_PENDING
D (47516) BT_SMP: result state = SMP_STATE_ENCRYPTION_PENDING
D (47536) BT_SMP: smp_proc_ltk_request state = 14
D (47536) BT_SMP: main smp_sm_event
D (47536) BT_SMP: SMP Role: Slave State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [ENC_REQ_EVT (24)]
D (47546) BT_SMP: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14)
D (47556) BT_SMP: smp_generate_stk
W (47556) BT_SMP: FOR LE SC LTK IS USED INSTEAD OF STK
D (47556) BT_SMP: smp_process_stk
D (47566) BT_SMP: smp_mask_enc_key
D (47566) BT_SMP: main smp_sm_event
D (47576) BT_SMP: SMP Role: Slave State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [KEY_READY_EVT (16)]
D (47586) BT_SMP: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14)
D (47586) BT_SMP: smp_send_ltk_reply
D (47596) BT_SMP: result state = SMP_STATE_ENCRYPTION_PENDING
D (47596) BT_SMP: result state = SMP_STATE_ENCRYPTION_PENDING
D (47626) BT_SMP: smp_link_encrypted encr_enable=1
D (47626) BT_SMP: main smp_sm_event
D (47626) BT_SMP: SMP Role: Slave State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [ENCRYPTED_EVT (17)]
D (47636) BT_SMP: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14)
D (47636) BT_SMP: smp_check_auth_req rcvs enc_enable=1 i_keys=0x3 r_keys=0x3 (i-initiator r-responder)
D (47646) BT_SMP: smp_check_auth_req rcvs upgrades: i_keys=0x3 r_keys=0x3 (i-initiator r-responder)
D (47656) BT_SMP: main smp_sm_event
D (47666) BT_SMP: SMP Role: Slave State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [BOND_REQ_EVT (25)]
D (47676) BT_SMP: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_BOND_PENDING(15)
D (47686) BT_SMP:
smp_key_distribution role=1 (0-master) r_keys=0x3 i_keys=0x3
D (47686) BT_SMP: smp_key_pick_key key_to_dist=0x3
D (47696) BT_SMP: key to send = 03, i = 0
D (47696) BT_SMP: smp_distribute_act[0]
D (47706) BT_SMP: smp_generate_ltk
D (47706) BT_SMP: smp_process_secure_connection_long_term_key
D (47716) BT_SMP: smp_save_secure_connections_long_term_key-Save LTK as local LTK key
D (47716) BT_SMP: smp_save_secure_connections_long_term_key-Save LTK as peer LTK key
D (47726) BT_SMP: smp_update_key_mask before update role=1 recv=0 local_i_key = 03, local_r_key = 03
D (47736) BT_SMP: updated local_i_key = 02, local_r_key = 02
D (47746) BT_SMP:
smp_key_distribution role=1 (0-master) r_keys=0x2 i_keys=0x2
D (47756) BT_SMP: smp_key_pick_key key_to_dist=0x2
D (47756) BT_SMP: key to send = 02, i = 0
D (47756) BT_SMP: key to send = 02, i = 1
D (47766) BT_SMP: smp_distribute_act[1]
D (47766) BT_SMP: smp_send_id_info
D (47776) BT_SMP: smp_update_key_mask before update role=1 recv=0 local_i_key = 02, local_r_key = 02
D (47786) BT_SMP: updated local_i_key = 02, local_r_key = 00
D (47786) BT_SMP: smp_send_cmd on l2cap cmd_code=0x8
D (47796) BT_SMP: smp_build_identity_info_cmd
D (47796) BT_SMP: smp_send_msg_to_L2CAP
D (47806) BT_SMP: smp_send_cmd on l2cap cmd_code=0x9
D (47806) BT_SMP: smp_build_id_addr_cmd
D (47816) BT_SMP: smp_send_msg_to_L2CAP
D (47816) BT_SMP: smp_key_distribution_by_transport
D (47816) BT_SMP:
smp_key_distribution role=1 (0-master) r_keys=0x0 i_keys=0x2
D (47826) BT_SMP: smp_key_pick_key key_to_dist=0x0
D (47836) BT_SMP: key to send = 00, i = 0
D (47836) BT_SMP: key to send = 00, i = 1
D (47846) BT_SMP: key to send = 00, i = 2
D (47846) BT_SMP: key to send = 00, i = 3
D (47846) BT_SMP: result state = SMP_STATE_BOND_PENDING
D (47856) BT_SMP: result state = SMP_STATE_BOND_PENDING
D (47866) BT_SMP:
SMDBG l2c smp_data_received
D (47866) BT_SMP: main smp_sm_event
D (47866) BT_SMP: SMP Role: Slave State: [SMP_STATE_BOND_PENDING (15)], Event: [ID_INFO_EVT (8)]
D (47876) BT_SMP: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15)
D (47886) BT_SMP: smp_proc_id_info
D (47886) BT_SMP: smp_key_distribution_by_transport
D (47896) BT_SMP:
smp_key_distribution role=1 (0-master) r_keys=0x0 i_keys=0x2
D (47906) BT_SMP: smp_key_pick_key key_to_dist=0x0
D (47906) BT_SMP: key to send = 00, i = 0
D (47916) BT_SMP: key to send = 00, i = 1
D (47916) BT_SMP: key to send = 00, i = 2
D (47916) BT_SMP: key to send = 00, i = 3
D (47926) BT_SMP: result state = SMP_STATE_BOND_PENDING
D (47926) BT_SMP:
SMDBG l2c smp_data_received
D (47936) BT_SMP: main smp_sm_event
D (47936) BT_SMP: SMP Role: Slave State: [SMP_STATE_BOND_PENDING (15)], Event: [ID_ADDR_EVT (9)]
D (47946) BT_SMP: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15)
D (47956) BT_SMP: smp_proc_id_addr
D (47956) BT_SMP: smp_update_key_mask before update role=1 recv=1 local_i_key = 02, local_r_key = 00
D (47966) BT_SMP: updated local_i_key = 00, local_r_key = 00
D (47976) BT_SMP: smp_key_distribution_by_transport
D (47976) BT_SMP:
smp_key_distribution role=1 (0-master) r_keys=0x0 i_keys=0x0
D (47986) BT_SMP: smp_key_pick_key key_to_dist=0x0
D (47996) BT_SMP: key to send = 00, i = 0
D (47996) BT_SMP: key to send = 00, i = 1
D (47996) BT_SMP: key to send = 00, i = 2
D (48006) BT_SMP: key to send = 00, i = 3
D (48006) BT_SMP: main smp_sm_event
D (48016) BT_SMP: SMP Role: Slave State: [SMP_STATE_BOND_PENDING (15)], Event: [AUTH_CMPL_EVT (23)]
D (48026) BT_SMP: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_IDLE(0)
D (48026) BT_SMP: smp_send_pair_fail status=0 failure=0
D (48036) BT_SMP: smp_proc_pairing_cmpl
D (48036) BT_SMP: send SMP_COMPLT_EVT reason=0x0 sec_level=0x4
D (48046) BT_SMP: smp_reset_control_value
D (48046) BT_SMP: smp_remove_fixed_channel
D (48056) BT_SMP: smp_cb_cleanup
D (48056) BT_SMP: result state = SMP_STATE_IDLE
D (48066) BT_SMP: result state = SMP_STATE_IDLE
D (48066) nvs: nvs_open_from_partition bt_config.conf 1
D (48076) nvs: nvs_set_blob bt_cfg_key0 510
D (48096) nvs: nvs_close 5
D (48096) nvs: nvs_open_from_partition bt_config.conf 1
D (48096) nvs: nvs_set_blob bt_cfg_key0 524
D (48116) nvs: nvs_close 6
D (48126) nvs: nvs_open_from_partition bt_config.conf 1
D (48126) nvs: nvs_set_blob bt_cfg_key0 607
D (48146) nvs: nvs_close 7$GP
D (48146) nvs: nvs_open_from_partition bt_config.conf 1
D (48146) nvs: nvs_set_blob bt_cfg_key0 667
D (48226) nvs: nvs_close 8
D (48236) nvs: nvs_open_from_partition bt_config.conf 1
D (48236) nvs: nvs_set_blob bt_cfg_key0 722
D (48266) nvs: nvs_close 9
D (48266) nvs: nvs_open_from_partition bt_config.conf 1
D (48266) nvs: nvs_set_blob bt_cfg_key0 736
D (48286) nvs: nvs_close 10
I (48286) HID_LE_PRF: GATT EVT 1
I (48286) HID_LE_PRF: GATT EVT 1
I (48286) HID_LE_PRF: GATT EVT 1
I (48296) HID_DEMO: remote BD_ADDR: 8c85908a6d15
I (48296) HID_DEMO: address type = 0
I (48306) HID_DEMO: pair status = success
I (48696) HID_LE_PRF: GATT EVT 1
I (48726) HID_LE_PRF: GATT EVT 1
I (48756) HID_LE_PRF: GATT EVT 1
I (48786) HID_LE_PRF: GATT EVT 1
I (48816) HID_LE_PRF: GATT EVT 1
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment