Hi Carel, On Fri, Apr 21, 2006, Carel Bast wrote: > ~ $ hcidump -X -V > HCI sniffer - Bluetooth packet analyzer ver 1.17 > device: hci0 snap_len: 1028 filter: 0xffffffff > > HCI Event: Command Status (0x0f) plen 4 > Create Connection (0x01|0x0005) status 0x00 ncmd 1 > > HCI Event: Connect Complete (0x03) plen 11 > status 0x00 handle 1 bdaddr 00:17:4B:66:FF:3A type ACL encrypt 0x00 > > HCI Event: Command Complete (0x0e) plen 6 > Write Link Policy Settings (0x02|0x000d) ncmd 1 > 0000: 00 01 00 ... > [[OK]] > > HCI Event: Command Complete (0x0e) plen 10 > Link Key Request Reply (0x01|0x000b) ncmd 1 > 0000: 00 3a ff 66 4b 17 00 .:.fK.. > > HCI Event: Encrypt Change (0x08) plen 4 > status 0x00 handle 1 encrypt 0x01 > > HCI Event: Command Status (0x0f) plen 4 > Authentication Requested (0x01|0x0011) status 0x00 ncmd 1 > > HCI Event: Auth Complete (0x06) plen 3 > status 0x00 handle 1 > [[OK]] > > HCI Event: Command Status (0x0f) plen 4 > Authentication Requested (0x01|0x0011) status 0x00 ncmd 1 > > HCI Event: Auth Complete (0x06) plen 3 > status 0x00 handle 1 > > HCI Event: Command Status (0x0f) plen 4 > Disconnect (0x01|0x0006) status 0x00 ncmd 1 > > HCI Event: Disconn Complete (0x05) plen 4 > status 0x00 handle 1 reason 0x16 > Reason: Connection Terminated by Local Host > > (if I disable "connect without ack." (to make sure I connect to the > correct phone), I have to press OK on the phone at the location marked > with "[[OK]]") > > Does this give you a clue? Unfortunately not. However, it looks like there is missing information in the dump: only contains events that are received, but doesn't show anything about what we're sending (lines starting with ">" indicate data received while lines starting with "<" indicate data sent). No idea why that is though, if you're sure that it is the precise output of hcidump. Johan