This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

OAD Packets with data 0xFF from IOS after .BIN file Data

Hi All,

 I am doing OAD from IOS to Keyfob and also using packet sniffer to capture the Packets exchanged.

when I trasfer .bin file,In packet sniffer logs, I can see after sending the data it also sends packets with data 0xFF

upto 0x1EFF (I am using my customized application having OAD in it,so file size may differ)

I understand the packets with 0xFF would be to empty the flash being used by alternate image type.

If it is so then why are we sending unnecessary packets after actual data?

  

 

My actual data is upto 0x1C24.please find the packets above for details

Regards,

Sarang