Hi all,
- I have made NV_RESTORE is TRUE, SECURE=1 and TC_LINKKEY_JOIN is TRUE in my project and the stack profile id is "0-NETWORK_SPECIFIC".
- I am using "BUILD_ALL_DEVICES" compiler flag as device type and by NVM variable decides the device type(Zc, Zr, or ZED).
- The problem is if the APS security (AF_EN_SECURITY) enabled on the packet the Ti devices are failed to decrypt the packet or it is not passing to application.
- As of my project it is necessary that to use APS security on specific command, because it is going to interlope with 3rd party devices on field which are using APS security on specific command.
- And he 3rd paty devices are using APS security on "update device cmd" which are not able to process by Ti coordinator which leads to 3rd party devices to not able to join network.(But direct join is happening between Ti & 3rd party, and communication also happening with APS security disabled cmds.).
- I made the application with " Z-Stack Energy" as well as with Z-Stack Mesh On latest version available @ Z-stack .Both are having same problem.
- I suspect if the stack profile id is "0-NETWORK_SPECIFIC", AF_EN_SECURITY enable cmds are not able to decrypt by Ti.
- The attached sniffier log picture may give the proper information about the problem.
- In the attached file "IEE Addr req" is used for pinging the coordinator and 3rd P are using "APS security enabled" cmds for "IEE Addr rsp" which are not able to process by Ti device.
- And if "AF_EN_SECURITY" is enabled during "IEE Addr req" on Ti Zr, Ti Zc is unable to process the packet and vice versa.
Please please provide a solution.
Thanks
Request from Ti Zr to Ti Zc
Request from Ti Zr(AF_EN_SECURITY) to Ti Zc
Request from Ti Zr to 3rd P Zc
Request from Ti Zr(AF_EN_SECURITY) to 3rd P Zc
Update device cmd from 3rd P device to Ti Zc