Important changes to repositories hosted on mbed.com
Mbed hosted mercurial repositories are deprecated and are due to be permanently deleted in July 2026.
To keep a copy of this software download the repository Zip archive or clone locally using Mercurial.
It is also possible to export all your personal repositories from the account settings page.
Fork of nRF51822 by
btle/btle_security.cpp@133:74079098b3c9, 2015-05-08 (annotated)
- Committer:
- rgrover1
- Date:
- Fri May 08 15:33:55 2015 +0100
- Revision:
- 133:74079098b3c9
- Child:
- 134:df7e7964a9c3
Synchronized with git rev e599b93b
Author: Rohit Grover
separating out security related code into btle_security.cpp
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
rgrover1 | 133:74079098b3c9 | 1 | /* mbed Microcontroller Library |
rgrover1 | 133:74079098b3c9 | 2 | * Copyright (c) 2006-2013 ARM Limited |
rgrover1 | 133:74079098b3c9 | 3 | * |
rgrover1 | 133:74079098b3c9 | 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
rgrover1 | 133:74079098b3c9 | 5 | * you may not use this file except in compliance with the License. |
rgrover1 | 133:74079098b3c9 | 6 | * You may obtain a copy of the License at |
rgrover1 | 133:74079098b3c9 | 7 | * |
rgrover1 | 133:74079098b3c9 | 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
rgrover1 | 133:74079098b3c9 | 9 | * |
rgrover1 | 133:74079098b3c9 | 10 | * Unless required by applicable law or agreed to in writing, software |
rgrover1 | 133:74079098b3c9 | 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
rgrover1 | 133:74079098b3c9 | 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
rgrover1 | 133:74079098b3c9 | 13 | * See the License for the specific language governing permissions and |
rgrover1 | 133:74079098b3c9 | 14 | * limitations under the License. |
rgrover1 | 133:74079098b3c9 | 15 | */ |
rgrover1 | 133:74079098b3c9 | 16 | |
rgrover1 | 133:74079098b3c9 | 17 | #include "btle.h" |
rgrover1 | 133:74079098b3c9 | 18 | #include "pstorage.h" |
rgrover1 | 133:74079098b3c9 | 19 | #include "nRF51Gap.h" |
rgrover1 | 133:74079098b3c9 | 20 | #include "device_manager.h" |
rgrover1 | 133:74079098b3c9 | 21 | |
rgrover1 | 133:74079098b3c9 | 22 | static ret_code_t dm_handler(dm_handle_t const *p_handle, dm_event_t const *p_event, ret_code_t event_result); |
rgrover1 | 133:74079098b3c9 | 23 | |
rgrover1 | 133:74079098b3c9 | 24 | ble_error_t |
rgrover1 | 133:74079098b3c9 | 25 | btle_initializeSecurity() |
rgrover1 | 133:74079098b3c9 | 26 | { |
rgrover1 | 133:74079098b3c9 | 27 | if (pstorage_init() != NRF_SUCCESS) { |
rgrover1 | 133:74079098b3c9 | 28 | return BLE_ERROR_UNSPECIFIED; |
rgrover1 | 133:74079098b3c9 | 29 | } |
rgrover1 | 133:74079098b3c9 | 30 | |
rgrover1 | 133:74079098b3c9 | 31 | dm_init_param_t dm_init_param = { |
rgrover1 | 133:74079098b3c9 | 32 | .clear_persistent_data = false /* Set to true in case the module should clear all persistent data. */ |
rgrover1 | 133:74079098b3c9 | 33 | }; |
rgrover1 | 133:74079098b3c9 | 34 | if (dm_init(&dm_init_param) != NRF_SUCCESS) { |
rgrover1 | 133:74079098b3c9 | 35 | return BLE_ERROR_UNSPECIFIED; |
rgrover1 | 133:74079098b3c9 | 36 | } |
rgrover1 | 133:74079098b3c9 | 37 | |
rgrover1 | 133:74079098b3c9 | 38 | uint8_t applicationInstance; |
rgrover1 | 133:74079098b3c9 | 39 | const dm_application_param_t dm_param = { |
rgrover1 | 133:74079098b3c9 | 40 | .evt_handler = dm_handler, |
rgrover1 | 133:74079098b3c9 | 41 | .service_type = DM_PROTOCOL_CNTXT_GATT_CLI_ID, |
rgrover1 | 133:74079098b3c9 | 42 | .sec_param = { |
rgrover1 | 133:74079098b3c9 | 43 | .bond = 1, /**< Perform bonding. */ |
rgrover1 | 133:74079098b3c9 | 44 | .mitm = 1, /**< Man In The Middle protection required. */ |
rgrover1 | 133:74079098b3c9 | 45 | .io_caps = BLE_GAP_IO_CAPS_NONE, /**< IO capabilities, see @ref BLE_GAP_IO_CAPS. */ |
rgrover1 | 133:74079098b3c9 | 46 | .oob = 0, /**< Out Of Band data available. */ |
rgrover1 | 133:74079098b3c9 | 47 | .min_key_size = 16, /**< Minimum encryption key size in octets between 7 and 16. If 0 then not applicable in this instance. */ |
rgrover1 | 133:74079098b3c9 | 48 | .max_key_size = 16, /**< Maximum encryption key size in octets between min_key_size and 16. */ |
rgrover1 | 133:74079098b3c9 | 49 | .kdist_periph = { |
rgrover1 | 133:74079098b3c9 | 50 | .enc = 1, /**< Long Term Key and Master Identification. */ |
rgrover1 | 133:74079098b3c9 | 51 | .id = 1, /**< Identity Resolving Key and Identity Address Information. */ |
rgrover1 | 133:74079098b3c9 | 52 | .sign = 1, /**< Connection Signature Resolving Key. */ |
rgrover1 | 133:74079098b3c9 | 53 | }, /**< Key distribution bitmap: keys that the peripheral device will distribute. */ |
rgrover1 | 133:74079098b3c9 | 54 | } |
rgrover1 | 133:74079098b3c9 | 55 | }; |
rgrover1 | 133:74079098b3c9 | 56 | |
rgrover1 | 133:74079098b3c9 | 57 | ret_code_t rc; |
rgrover1 | 133:74079098b3c9 | 58 | if ((rc = dm_register(&applicationInstance, &dm_param)) != NRF_SUCCESS) { |
rgrover1 | 133:74079098b3c9 | 59 | switch (rc) { |
rgrover1 | 133:74079098b3c9 | 60 | case NRF_ERROR_INVALID_STATE: |
rgrover1 | 133:74079098b3c9 | 61 | return BLE_ERROR_INVALID_STATE; |
rgrover1 | 133:74079098b3c9 | 62 | case NRF_ERROR_NO_MEM: |
rgrover1 | 133:74079098b3c9 | 63 | return BLE_ERROR_NO_MEM; |
rgrover1 | 133:74079098b3c9 | 64 | default: |
rgrover1 | 133:74079098b3c9 | 65 | return BLE_ERROR_UNSPECIFIED; |
rgrover1 | 133:74079098b3c9 | 66 | } |
rgrover1 | 133:74079098b3c9 | 67 | } |
rgrover1 | 133:74079098b3c9 | 68 | |
rgrover1 | 133:74079098b3c9 | 69 | return BLE_ERROR_NONE; |
rgrover1 | 133:74079098b3c9 | 70 | } |
rgrover1 | 133:74079098b3c9 | 71 | |
rgrover1 | 133:74079098b3c9 | 72 | ret_code_t |
rgrover1 | 133:74079098b3c9 | 73 | dm_handler(dm_handle_t const *p_handle, dm_event_t const *p_event, ret_code_t event_result) |
rgrover1 | 133:74079098b3c9 | 74 | { |
rgrover1 | 133:74079098b3c9 | 75 | switch (p_event->event_id) { |
rgrover1 | 133:74079098b3c9 | 76 | case DM_EVT_SECURITY_SETUP: /* started */ |
rgrover1 | 133:74079098b3c9 | 77 | nRF51Gap::getInstance().processSecuritySetupStartedEvent(p_event->event_param.p_gap_param->conn_handle); |
rgrover1 | 133:74079098b3c9 | 78 | break; |
rgrover1 | 133:74079098b3c9 | 79 | case DM_EVT_SECURITY_SETUP_COMPLETE: |
rgrover1 | 133:74079098b3c9 | 80 | nRF51Gap::getInstance().processSecuritySetupCompletedEvent(p_event->event_param.p_gap_param->conn_handle); |
rgrover1 | 133:74079098b3c9 | 81 | break; |
rgrover1 | 133:74079098b3c9 | 82 | case DM_EVT_LINK_SECURED: |
rgrover1 | 133:74079098b3c9 | 83 | nRF51Gap::getInstance().processLinkSecuredEvent(p_event->event_param.p_gap_param->conn_handle); |
rgrover1 | 133:74079098b3c9 | 84 | break; |
rgrover1 | 133:74079098b3c9 | 85 | case DM_EVT_DEVICE_CONTEXT_STORED: |
rgrover1 | 133:74079098b3c9 | 86 | nRF51Gap::getInstance().processSecurityContextStoredEvent(p_event->event_param.p_gap_param->conn_handle); |
rgrover1 | 133:74079098b3c9 | 87 | break; |
rgrover1 | 133:74079098b3c9 | 88 | default: |
rgrover1 | 133:74079098b3c9 | 89 | break; |
rgrover1 | 133:74079098b3c9 | 90 | } |
rgrover1 | 133:74079098b3c9 | 91 | |
rgrover1 | 133:74079098b3c9 | 92 | return NRF_SUCCESS; |
rgrover1 | 133:74079098b3c9 | 93 | } |