Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp2524195ybk; Mon, 18 May 2020 01:00:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyjq4f0Gtgw5e37eS3pflSNePK7kOCBuG4BiuFqZ8KZUqs52vtbc4YKIAu1wn+rZaBEeBin X-Received: by 2002:a17:906:4dcc:: with SMTP id f12mr14491487ejw.272.1589788819359; Mon, 18 May 2020 01:00:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589788819; cv=none; d=google.com; s=arc-20160816; b=gEpLt2yJRhQMaBktidDV4GdoS9CjO+yZLul/SErmlodOVzkDzJrah0hQtqtlXzGD5j DX801hiKECOrFSzWynm7GUVb7iZyVZ5x8DpqmHUkNP+ZFM/DuYwsbT0EDQQFP/kXHmz0 qCeyvUTnTrhvT3XvBO81IZojlK6M2Hy8PZay+Eco1wSdoNtGymEfPQ2H1eRvMcmxRXu1 q9SqFr0Gw/rMVE+2stZE98feiMM5zFnoFj5OpbUnCDgZ+U8cOy6UQf6+De1Tm0Q7L52O fRIlpWvCt5+N8ZHLg5XQu3KsE4/9HeonX24dyhQXxBpZuZEmulLXUDzr4JoEv4iV4fbG aDjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version; bh=ZlIACqTAJorzDFsbH8wujYzHxG/7bWWgNLysKoRKawA=; b=O62o3OOI2z4s/z2Di8T2iPcIk0ncb1V84XS3EGs/2e95EDcndKJb2iVB6fJEti6LT/ ydhtiFaHVO0ZZ9gKH252fU72iziug+kDcxI2guXvWf9AeDjcdUsdqnJ6DBZu8G2vAoY5 OGsLAzcYTsKMDJD019KhGWmHS/5Nl9D2V1w0yI0PsG/dmQcSUo28tksuAl/Bi8IaQJbN DhG5UGf1tqjFjX0aliMx7p/FRd4pYiGkxruJBq9dvjbcAXLtLmqjP/Lr93c2HofGsNfH KKVquFCPmCkC7GsA82fL2OT6IJJrYdoKl9NDwsTY1Wd7M3VnW3LpJe+AL9wyBU5HbuEy Gxcw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q23si5139091eds.325.2020.05.18.00.59.53; Mon, 18 May 2020 01:00:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726758AbgERH7s convert rfc822-to-8bit (ORCPT + 99 others); Mon, 18 May 2020 03:59:48 -0400 Received: from coyote.holtmann.net ([212.227.132.17]:43617 "EHLO mail.holtmann.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726489AbgERH7s (ORCPT ); Mon, 18 May 2020 03:59:48 -0400 Received: from marcel-macbook.fritz.box (p4FEFC5A7.dip0.t-ipconnect.de [79.239.197.167]) by mail.holtmann.org (Postfix) with ESMTPSA id 256C1CECE2; Mon, 18 May 2020 10:09:31 +0200 (CEST) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: [PATCH] bluetooth/smp: Fix for GAP/SEC/SEM/BI-10-C From: Marcel Holtmann In-Reply-To: <20200513081853.362-1-lukasz.rymanowski@codecoup.pl> Date: Mon, 18 May 2020 09:59:47 +0200 Cc: linux-bluetooth@vger.kernel.org Content-Transfer-Encoding: 8BIT Message-Id: <86292E0B-2816-414C-82FD-7ACFFD4C9587@holtmann.org> References: <20200513081853.362-1-lukasz.rymanowski@codecoup.pl> To: =?utf-8?Q?=C5=81ukasz_Rymanowski?= X-Mailer: Apple Mail (2.3608.80.23.2.2) Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org Hi Lukasz, > Security Mode 1 level 4, force us to use have key size 16 octects long. > This patch adds check for that. > > This is required for the qualification test GAP/SEC/SEM/BI-10-C > > Logs from test when ATT is configured with sec level BT_SECURITY_FIPS > > < ACL Data TX: Handle 3585 flags 0x00 dlen 11 #28 [hci0] 3.785965 > SMP: Pairing Request (0x01) len 6 > IO capability: DisplayYesNo (0x01) > OOB data: Authentication data not present (0x00) > Authentication requirement: Bonding, MITM, SC, No Keypresses (0x0d) > Max encryption key size: 16 > Initiator key distribution: EncKey Sign (0x05) > Responder key distribution: EncKey IdKey Sign (0x07) >> ACL Data RX: Handle 3585 flags 0x02 dlen 11 #35 [hci0] 3.883020 > SMP: Pairing Response (0x02) len 6 > IO capability: DisplayYesNo (0x01) > OOB data: Authentication data not present (0x00) > Authentication requirement: Bonding, MITM, SC, No Keypresses (0x0d) > Max encryption key size: 7 > Initiator key distribution: EncKey Sign (0x05) > Responder key distribution: EncKey IdKey Sign (0x07) > < ACL Data TX: Handle 3585 flags 0x00 dlen 6 #36 [hci0] 3.883136 > SMP: Pairing Failed (0x05) len 1 > Reason: Encryption key size (0x06) > > Signed-off-by: Ɓukasz Rymanowski > --- > net/bluetooth/smp.c | 4 ++++ > 1 file changed, 4 insertions(+) patch has been applied to bluetooth-next tree. Regards Marcel