ACK: [SRU][PATCH][Xenial 1/1] Revert "Bluetooth: Align minimum encryption key size for LE and BR/EDR connections"

Connor Kuehl connor.kuehl at canonical.com
Fri Jun 21 16:45:26 UTC 2019


On 6/21/19 9:36 AM, Kleber Sacilotto de Souza wrote:
> From: Greg Kroah-Hartman <gregkh at linuxfoundation.org>
> 
> BugLink: https://bugs.launchpad.net/bugs/1833698
> 
> This reverts commit 07e38998a19d72b916c39a983c19134522ae806b which is
> commit d5bb334a8e171b262e48f378bd2096c0ea458265 upstream.
> 
> Lots of people have reported issues with this patch, and as there does
> not seem to be a fix going into Linus's kernel tree any time soon,
> revert the commit in the stable trees so as to get people's machines
> working properly again.
> 
> Reported-by: Vasily Khoruzhick <anarsoul at gmail.com>
> Reported-by: Hans de Goede <hdegoede at redhat.com>
> Cc: Jeremy Cline <jeremy at jcline.org>
> Cc: Marcel Holtmann <marcel at holtmann.org>
> Cc: Johan Hedberg <johan.hedberg at intel.com>
> Signed-off-by: Greg Kroah-Hartman <gregkh at linuxfoundation.org>
> (cherry picked from commit b528880e8b0167c34cb36c1b4e6165192f76267c linux-5.1.y)
> Signed-off-by: Kleber Sacilotto de Souza <kleber.souza at canonical.com>

Acked-by: Connor Kuehl <connor.kuehl at canonical.com>

> ---
>  include/net/bluetooth/hci_core.h | 3 ---
>  net/bluetooth/hci_conn.c         | 8 --------
>  2 files changed, 11 deletions(-)
> 
> diff --git a/include/net/bluetooth/hci_core.h b/include/net/bluetooth/hci_core.h
> index 5b82efbe8d3d..9c0aa27e3bf3 100644
> --- a/include/net/bluetooth/hci_core.h
> +++ b/include/net/bluetooth/hci_core.h
> @@ -174,9 +174,6 @@ struct adv_info {
>  
>  #define HCI_MAX_SHORT_NAME_LENGTH	10
>  
> -/* Min encryption key size to match with SMP */
> -#define HCI_MIN_ENC_KEY_SIZE		7
> -
>  /* Default LE RPA expiry time, 15 minutes */
>  #define HCI_DEFAULT_RPA_TIMEOUT		(15 * 60)
>  
> diff --git a/net/bluetooth/hci_conn.c b/net/bluetooth/hci_conn.c
> index 83d4d574fa44..80be0ee17ff3 100644
> --- a/net/bluetooth/hci_conn.c
> +++ b/net/bluetooth/hci_conn.c
> @@ -1177,14 +1177,6 @@ int hci_conn_check_link_mode(struct hci_conn *conn)
>  	    !test_bit(HCI_CONN_ENCRYPT, &conn->flags))
>  		return 0;
>  
> -	/* The minimum encryption key size needs to be enforced by the
> -	 * host stack before establishing any L2CAP connections. The
> -	 * specification in theory allows a minimum of 1, but to align
> -	 * BR/EDR and LE transports, a minimum of 7 is chosen.
> -	 */
> -	if (conn->enc_key_size < HCI_MIN_ENC_KEY_SIZE)
> -		return 0;
> -
>  	return 1;
>  }
>  
> 


-- 
Connor
-------------- next part --------------
A non-text attachment was scrubbed...
Name: pEpkey.asc
Type: application/pgp-keys
Size: 5950 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20190621/8a681355/attachment.key>


More information about the kernel-team mailing list