Skip to content

Commit

Permalink
Revert "Bluetooth: Align minimum encryption key size for LE and BR/ED…
Browse files Browse the repository at this point in the history
…R connections"

This reverts commit 745f5c5 which is
commit d5bb334a8e171b262e48f378bd2096c0ea458265 upstream.

Lots of people have reported issues with this patch, and as there does
not seem to be a fix going into Linus's kernel tree any time soon,
revert the commit in the stable trees so as to get people's machines
working properly again.

Reported-by: Vasily Khoruzhick <[email protected]>
Reported-by: Hans de Goede <[email protected]>
Cc: Jeremy Cline <[email protected]>
Cc: Marcel Holtmann <[email protected]>
Cc: Johan Hedberg <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
  • Loading branch information
gregkh committed Jun 22, 2019
1 parent 1beeb04 commit 5e0c41c
Show file tree
Hide file tree
Showing 2 changed files with 0 additions and 11 deletions.
3 changes: 0 additions & 3 deletions include/net/bluetooth/hci_core.h
Original file line number Diff line number Diff line change
Expand Up @@ -176,9 +176,6 @@ struct adv_info {

#define HCI_MAX_SHORT_NAME_LENGTH 10

/* Min encryption key size to match with SMP */
#define HCI_MIN_ENC_KEY_SIZE 7

/* Default LE RPA expiry time, 15 minutes */
#define HCI_DEFAULT_RPA_TIMEOUT (15 * 60)

Expand Down
8 changes: 0 additions & 8 deletions net/bluetooth/hci_conn.c
Original file line number Diff line number Diff line change
Expand Up @@ -1165,14 +1165,6 @@ int hci_conn_check_link_mode(struct hci_conn *conn)
!test_bit(HCI_CONN_ENCRYPT, &conn->flags))
return 0;

/* The minimum encryption key size needs to be enforced by the
* host stack before establishing any L2CAP connections. The
* specification in theory allows a minimum of 1, but to align
* BR/EDR and LE transports, a minimum of 7 is chosen.
*/
if (conn->enc_key_size < HCI_MIN_ENC_KEY_SIZE)
return 0;

return 1;
}

Expand Down

0 comments on commit 5e0c41c

Please sign in to comment.