Skip to content

Commit d55f1d0

Browse files
committed
[nrf fromlist] docs: Bluetooth: Mesh: Add Static OOB entropy requirement
Updates documentation for clarifying that for secure provisioning with the BTM_ECDH_P256_HMAC_SHA256_AES_CCM algorithm, the Static OOB value should contain more than 128 bits of entropy to provide adequate security against attacks. Upstream PR #: 100368 Signed-off-by: Stine Åkredalen <[email protected]> (cherry picked from commit 3a6455e8185f4afd9a325c353915ea5998b02e91)
1 parent fc695cb commit d55f1d0

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

doc/connectivity/bluetooth/api/mesh/provisioning.rst

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,9 @@ provisionee:
124124

125125
* **Static OOB:** An authentication value is assigned to the device in
126126
production, which the provisioner can query in some application specific
127-
way.
127+
way. For secure provisioning with the BTM_ECDH_P256_HMAC_SHA256_AES_CCM
128+
algorithm, the Static OOB value should contain more than 128 bits of entropy
129+
to provide adequate security against attacks.
128130
* **Input OOB:** The user inputs the authentication value. The available input
129131
actions are listed in :c:enum:`bt_mesh_input_action_t`.
130132
* **Output OOB:** Show the user the authentication value. The available output

0 commit comments

Comments
 (0)