wersion 1.9
Fork of BLE_API by
ble/SecurityManager.h@1074:1fedc77d9add, 2016-01-11 (annotated)
- Committer:
- vcoubard
- Date:
- Mon Jan 11 08:51:42 2016 +0000
- Revision:
- 1074:1fedc77d9add
- Parent:
- 1063:187f9929cb60
- Child:
- 1075:0d0dafb54bc9
Synchronized with git rev cd809e2a
Author: Andres Amaya Garcia
Modify shutdown API and functionality
Modify the shutdown API to remove the static shutdown function in Gap,
SecurityManager, GattClient and GattServer. Futhermore, remove the static
references to Gap, SecurityManager, GattClient and GattServer objects inside
their own classes. The cleanup method is renamed to `reset()` and made public.
Finally, additional functionality is added to the reset implementation in
Gap.
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
rgrover1 | 716:11b41f651697 | 1 | /* mbed Microcontroller Library |
rgrover1 | 716:11b41f651697 | 2 | * Copyright (c) 2006-2015 ARM Limited |
rgrover1 | 716:11b41f651697 | 3 | * |
rgrover1 | 716:11b41f651697 | 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
rgrover1 | 716:11b41f651697 | 5 | * you may not use this file except in compliance with the License. |
rgrover1 | 716:11b41f651697 | 6 | * You may obtain a copy of the License at |
rgrover1 | 716:11b41f651697 | 7 | * |
rgrover1 | 716:11b41f651697 | 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
rgrover1 | 716:11b41f651697 | 9 | * |
rgrover1 | 716:11b41f651697 | 10 | * Unless required by applicable law or agreed to in writing, software |
rgrover1 | 716:11b41f651697 | 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
rgrover1 | 716:11b41f651697 | 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
rgrover1 | 716:11b41f651697 | 13 | * See the License for the specific language governing permissions and |
rgrover1 | 716:11b41f651697 | 14 | * limitations under the License. |
rgrover1 | 716:11b41f651697 | 15 | */ |
rgrover1 | 716:11b41f651697 | 16 | |
rgrover1 | 716:11b41f651697 | 17 | #ifndef __SECURITY_MANAGER_H__ |
rgrover1 | 716:11b41f651697 | 18 | #define __SECURITY_MANAGER_H__ |
rgrover1 | 716:11b41f651697 | 19 | |
rgrover1 | 716:11b41f651697 | 20 | #include <stdint.h> |
rgrover1 | 716:11b41f651697 | 21 | |
rgrover1 | 716:11b41f651697 | 22 | #include "Gap.h" |
rgrover1 | 716:11b41f651697 | 23 | |
rgrover1 | 716:11b41f651697 | 24 | class SecurityManager { |
rgrover1 | 716:11b41f651697 | 25 | public: |
rgrover1 | 716:11b41f651697 | 26 | enum SecurityMode_t { |
rgrover1 | 716:11b41f651697 | 27 | SECURITY_MODE_NO_ACCESS, |
vcoubard | 1048:efb29faf12fc | 28 | SECURITY_MODE_ENCRYPTION_OPEN_LINK, /**< Require no protection, open link. */ |
vcoubard | 1048:efb29faf12fc | 29 | SECURITY_MODE_ENCRYPTION_NO_MITM, /**< Require encryption, but no MITM protection. */ |
vcoubard | 1048:efb29faf12fc | 30 | SECURITY_MODE_ENCRYPTION_WITH_MITM, /**< Require encryption and MITM protection. */ |
vcoubard | 1048:efb29faf12fc | 31 | SECURITY_MODE_SIGNED_NO_MITM, /**< Require signing or encryption, but no MITM protection. */ |
vcoubard | 1048:efb29faf12fc | 32 | SECURITY_MODE_SIGNED_WITH_MITM, /**< Require signing or encryption, and MITM protection. */ |
rgrover1 | 716:11b41f651697 | 33 | }; |
rgrover1 | 716:11b41f651697 | 34 | |
rgrover1 | 716:11b41f651697 | 35 | /** |
vcoubard | 1048:efb29faf12fc | 36 | * @brief Defines possible security status or states. |
rgrover1 | 716:11b41f651697 | 37 | * |
vcoubard | 1048:efb29faf12fc | 38 | * @details Defines possible security status or states of a link when requested by getLinkSecurity(). |
rgrover1 | 716:11b41f651697 | 39 | */ |
rgrover1 | 716:11b41f651697 | 40 | enum LinkSecurityStatus_t { |
rgrover1 | 716:11b41f651697 | 41 | NOT_ENCRYPTED, /**< The link is not secured. */ |
rgrover1 | 716:11b41f651697 | 42 | ENCRYPTION_IN_PROGRESS, /**< Link security is being established.*/ |
rgrover1 | 716:11b41f651697 | 43 | ENCRYPTED /**< The link is secure.*/ |
rgrover1 | 716:11b41f651697 | 44 | }; |
rgrover1 | 716:11b41f651697 | 45 | |
rgrover1 | 716:11b41f651697 | 46 | enum SecurityIOCapabilities_t { |
vcoubard | 1048:efb29faf12fc | 47 | IO_CAPS_DISPLAY_ONLY = 0x00, /**< Display only. */ |
vcoubard | 1048:efb29faf12fc | 48 | IO_CAPS_DISPLAY_YESNO = 0x01, /**< Display and yes/no entry. */ |
vcoubard | 1048:efb29faf12fc | 49 | IO_CAPS_KEYBOARD_ONLY = 0x02, /**< Keyboard only. */ |
rgrover1 | 716:11b41f651697 | 50 | IO_CAPS_NONE = 0x03, /**< No I/O capabilities. */ |
vcoubard | 1048:efb29faf12fc | 51 | IO_CAPS_KEYBOARD_DISPLAY = 0x04, /**< Keyboard and display. */ |
rgrover1 | 716:11b41f651697 | 52 | }; |
rgrover1 | 716:11b41f651697 | 53 | |
rgrover1 | 716:11b41f651697 | 54 | enum SecurityCompletionStatus_t { |
rgrover1 | 716:11b41f651697 | 55 | SEC_STATUS_SUCCESS = 0x00, /**< Procedure completed with success. */ |
rgrover1 | 716:11b41f651697 | 56 | SEC_STATUS_TIMEOUT = 0x01, /**< Procedure timed out. */ |
rgrover1 | 716:11b41f651697 | 57 | SEC_STATUS_PDU_INVALID = 0x02, /**< Invalid PDU received. */ |
rgrover1 | 716:11b41f651697 | 58 | SEC_STATUS_PASSKEY_ENTRY_FAILED = 0x81, /**< Passkey entry failed (user canceled or other). */ |
rgrover1 | 716:11b41f651697 | 59 | SEC_STATUS_OOB_NOT_AVAILABLE = 0x82, /**< Out of Band Key not available. */ |
rgrover1 | 716:11b41f651697 | 60 | SEC_STATUS_AUTH_REQ = 0x83, /**< Authentication requirements not met. */ |
rgrover1 | 716:11b41f651697 | 61 | SEC_STATUS_CONFIRM_VALUE = 0x84, /**< Confirm value failed. */ |
rgrover1 | 716:11b41f651697 | 62 | SEC_STATUS_PAIRING_NOT_SUPP = 0x85, /**< Pairing not supported. */ |
rgrover1 | 716:11b41f651697 | 63 | SEC_STATUS_ENC_KEY_SIZE = 0x86, /**< Encryption key size. */ |
rgrover1 | 716:11b41f651697 | 64 | SEC_STATUS_SMP_CMD_UNSUPPORTED = 0x87, /**< Unsupported SMP command. */ |
rgrover1 | 716:11b41f651697 | 65 | SEC_STATUS_UNSPECIFIED = 0x88, /**< Unspecified reason. */ |
rgrover1 | 716:11b41f651697 | 66 | SEC_STATUS_REPEATED_ATTEMPTS = 0x89, /**< Too little time elapsed since last attempt. */ |
rgrover1 | 716:11b41f651697 | 67 | SEC_STATUS_INVALID_PARAMS = 0x8A, /**< Invalid parameters. */ |
rgrover1 | 716:11b41f651697 | 68 | }; |
rgrover1 | 716:11b41f651697 | 69 | |
rgrover1 | 716:11b41f651697 | 70 | /** |
rgrover1 | 716:11b41f651697 | 71 | * Declaration of type containing a passkey to be used during pairing. This |
rgrover1 | 716:11b41f651697 | 72 | * is passed into initializeSecurity() to specify a pre-programmed passkey |
rgrover1 | 716:11b41f651697 | 73 | * for authentication instead of generating a random one. |
rgrover1 | 716:11b41f651697 | 74 | */ |
rgrover1 | 716:11b41f651697 | 75 | static const unsigned PASSKEY_LEN = 6; |
rgrover1 | 716:11b41f651697 | 76 | typedef uint8_t Passkey_t[PASSKEY_LEN]; /**< 6-digit passkey in ASCII ('0'-'9' digits only). */ |
rgrover1 | 716:11b41f651697 | 77 | |
rgrover1 | 716:11b41f651697 | 78 | public: |
rgrover1 | 716:11b41f651697 | 79 | typedef void (*HandleSpecificEvent_t)(Gap::Handle_t handle); |
rgrover1 | 716:11b41f651697 | 80 | typedef void (*SecuritySetupInitiatedCallback_t)(Gap::Handle_t, bool allowBonding, bool requireMITM, SecurityIOCapabilities_t iocaps); |
rgrover1 | 716:11b41f651697 | 81 | typedef void (*SecuritySetupCompletedCallback_t)(Gap::Handle_t, SecurityCompletionStatus_t status); |
rgrover1 | 716:11b41f651697 | 82 | typedef void (*LinkSecuredCallback_t)(Gap::Handle_t handle, SecurityMode_t securityMode); |
rgrover1 | 716:11b41f651697 | 83 | typedef void (*PasskeyDisplayCallback_t)(Gap::Handle_t handle, const Passkey_t passkey); |
rgrover1 | 716:11b41f651697 | 84 | |
rgrover1 | 716:11b41f651697 | 85 | /* |
rgrover1 | 716:11b41f651697 | 86 | * The following functions are meant to be overridden in the platform-specific sub-class. |
rgrover1 | 716:11b41f651697 | 87 | */ |
rgrover1 | 716:11b41f651697 | 88 | public: |
rgrover1 | 716:11b41f651697 | 89 | /** |
rgrover1 | 716:11b41f651697 | 90 | * Enable the BLE stack's Security Manager. The Security Manager implements |
rgrover1 | 716:11b41f651697 | 91 | * the actual cryptographic algorithms and protocol exchanges that allow two |
rgrover1 | 716:11b41f651697 | 92 | * devices to securely exchange data and privately detect each other. |
rgrover1 | 716:11b41f651697 | 93 | * Calling this API is a prerequisite for encryption and pairing (bonding). |
rgrover1 | 716:11b41f651697 | 94 | * |
rgrover1 | 716:11b41f651697 | 95 | * @param[in] enableBonding Allow for bonding. |
rgrover1 | 716:11b41f651697 | 96 | * @param[in] requireMITM Require protection for man-in-the-middle attacks. |
vcoubard | 1048:efb29faf12fc | 97 | * @param[in] iocaps To specify the I/O capabilities of this peripheral, |
vcoubard | 1048:efb29faf12fc | 98 | * such as availability of a display or keyboard, to |
rgrover1 | 716:11b41f651697 | 99 | * support out-of-band exchanges of security data. |
rgrover1 | 716:11b41f651697 | 100 | * @param[in] passkey To specify a static passkey. |
rgrover1 | 716:11b41f651697 | 101 | * |
rgrover1 | 716:11b41f651697 | 102 | * @return BLE_ERROR_NONE on success. |
rgrover1 | 716:11b41f651697 | 103 | */ |
rgrover1 | 716:11b41f651697 | 104 | virtual ble_error_t init(bool enableBonding = true, |
rgrover1 | 716:11b41f651697 | 105 | bool requireMITM = true, |
rgrover1 | 716:11b41f651697 | 106 | SecurityIOCapabilities_t iocaps = IO_CAPS_NONE, |
rgrover1 | 716:11b41f651697 | 107 | const Passkey_t passkey = NULL) { |
vcoubard | 1048:efb29faf12fc | 108 | /* Avoid compiler warnings about unused variables. */ |
rgrover1 | 734:4872b70437ce | 109 | (void)enableBonding; |
rgrover1 | 734:4872b70437ce | 110 | (void)requireMITM; |
rgrover1 | 734:4872b70437ce | 111 | (void)iocaps; |
rgrover1 | 734:4872b70437ce | 112 | (void)passkey; |
rgrover1 | 734:4872b70437ce | 113 | |
vcoubard | 1048:efb29faf12fc | 114 | return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */ |
rgrover1 | 716:11b41f651697 | 115 | } |
rgrover1 | 716:11b41f651697 | 116 | |
rgrover1 | 716:11b41f651697 | 117 | /** |
rgrover1 | 716:11b41f651697 | 118 | * Get the security status of a connection. |
rgrover1 | 716:11b41f651697 | 119 | * |
rgrover1 | 716:11b41f651697 | 120 | * @param[in] connectionHandle Handle to identify the connection. |
vcoubard | 1048:efb29faf12fc | 121 | * @param[out] securityStatusP Security status. |
rgrover1 | 716:11b41f651697 | 122 | * |
vcoubard | 1057:93a9679d655c | 123 | * @return BLE_ERROR_NONE or appropriate error code indicating the failure reason. |
rgrover1 | 716:11b41f651697 | 124 | */ |
rgrover1 | 716:11b41f651697 | 125 | virtual ble_error_t getLinkSecurity(Gap::Handle_t connectionHandle, LinkSecurityStatus_t *securityStatusP) { |
vcoubard | 1048:efb29faf12fc | 126 | /* Avoid compiler warnings about unused variables. */ |
rgrover1 | 734:4872b70437ce | 127 | (void)connectionHandle; |
rgrover1 | 734:4872b70437ce | 128 | (void)securityStatusP; |
rgrover1 | 734:4872b70437ce | 129 | |
vcoubard | 1048:efb29faf12fc | 130 | return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */ |
rgrover1 | 716:11b41f651697 | 131 | } |
rgrover1 | 716:11b41f651697 | 132 | |
rgrover1 | 716:11b41f651697 | 133 | /** |
vcoubard | 1057:93a9679d655c | 134 | * Set the security mode on a connection. Useful for elevating the security mode |
vcoubard | 1057:93a9679d655c | 135 | * once certain conditions are met, e.g., a particular service is found. |
vcoubard | 1057:93a9679d655c | 136 | * |
vcoubard | 1057:93a9679d655c | 137 | * @param[in] connectionHandle Handle to identify the connection. |
vcoubard | 1057:93a9679d655c | 138 | * @param[in] securityMode Requested security mode. |
vcoubard | 1057:93a9679d655c | 139 | * |
vcoubard | 1057:93a9679d655c | 140 | * @return BLE_ERROR_NONE or appropriate error code indicating the failure reason. |
vcoubard | 1057:93a9679d655c | 141 | */ |
vcoubard | 1057:93a9679d655c | 142 | virtual ble_error_t setLinkSecurity(Gap::Handle_t connectionHandle, SecurityMode_t securityMode) { |
vcoubard | 1057:93a9679d655c | 143 | /* Avoid compiler warnings about unused variables. */ |
vcoubard | 1057:93a9679d655c | 144 | (void)connectionHandle; |
vcoubard | 1057:93a9679d655c | 145 | (void)securityMode; |
vcoubard | 1057:93a9679d655c | 146 | |
vcoubard | 1057:93a9679d655c | 147 | return BLE_ERROR_NOT_IMPLEMENTED; |
vcoubard | 1057:93a9679d655c | 148 | } |
vcoubard | 1057:93a9679d655c | 149 | |
vcoubard | 1057:93a9679d655c | 150 | /** |
rgrover1 | 716:11b41f651697 | 151 | * Delete all peer device context and all related bonding information from |
rgrover1 | 716:11b41f651697 | 152 | * the database within the security manager. |
rgrover1 | 716:11b41f651697 | 153 | * |
rgrover1 | 716:11b41f651697 | 154 | * @retval BLE_ERROR_NONE On success, else an error code indicating reason for failure. |
vcoubard | 1048:efb29faf12fc | 155 | * @retval BLE_ERROR_INVALID_STATE If the API is called without module initialization or |
rgrover1 | 716:11b41f651697 | 156 | * application registration. |
rgrover1 | 716:11b41f651697 | 157 | */ |
rgrover1 | 716:11b41f651697 | 158 | virtual ble_error_t purgeAllBondingState(void) { |
vcoubard | 1048:efb29faf12fc | 159 | return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */ |
rgrover1 | 716:11b41f651697 | 160 | } |
rgrover1 | 716:11b41f651697 | 161 | |
rgrover1 | 716:11b41f651697 | 162 | /* Event callback handlers. */ |
rgrover1 | 716:11b41f651697 | 163 | public: |
rgrover1 | 716:11b41f651697 | 164 | /** |
vcoubard | 1048:efb29faf12fc | 165 | * To indicate that a security procedure for the link has started. |
rgrover1 | 716:11b41f651697 | 166 | */ |
rgrover1 | 716:11b41f651697 | 167 | virtual void onSecuritySetupInitiated(SecuritySetupInitiatedCallback_t callback) {securitySetupInitiatedCallback = callback;} |
rgrover1 | 716:11b41f651697 | 168 | |
rgrover1 | 716:11b41f651697 | 169 | /** |
vcoubard | 1048:efb29faf12fc | 170 | * To indicate that the security procedure for the link has completed. |
rgrover1 | 716:11b41f651697 | 171 | */ |
rgrover1 | 716:11b41f651697 | 172 | virtual void onSecuritySetupCompleted(SecuritySetupCompletedCallback_t callback) {securitySetupCompletedCallback = callback;} |
rgrover1 | 716:11b41f651697 | 173 | |
rgrover1 | 716:11b41f651697 | 174 | /** |
vcoubard | 1048:efb29faf12fc | 175 | * To indicate that the link with the peer is secured. For bonded devices, |
vcoubard | 1048:efb29faf12fc | 176 | * subsequent reconnections with a bonded peer will result only in this callback |
vcoubard | 1048:efb29faf12fc | 177 | * when the link is secured; setup procedures will not occur (unless the |
vcoubard | 1048:efb29faf12fc | 178 | * bonding information is either lost or deleted on either or both sides). |
rgrover1 | 716:11b41f651697 | 179 | */ |
rgrover1 | 716:11b41f651697 | 180 | virtual void onLinkSecured(LinkSecuredCallback_t callback) {linkSecuredCallback = callback;} |
rgrover1 | 716:11b41f651697 | 181 | |
rgrover1 | 716:11b41f651697 | 182 | /** |
rgrover1 | 716:11b41f651697 | 183 | * To indicate that device context is stored persistently. |
rgrover1 | 716:11b41f651697 | 184 | */ |
rgrover1 | 716:11b41f651697 | 185 | virtual void onSecurityContextStored(HandleSpecificEvent_t callback) {securityContextStoredCallback = callback;} |
rgrover1 | 716:11b41f651697 | 186 | |
rgrover1 | 716:11b41f651697 | 187 | /** |
rgrover1 | 716:11b41f651697 | 188 | * To set the callback for when the passkey needs to be displayed on a peripheral with DISPLAY capability. |
rgrover1 | 716:11b41f651697 | 189 | */ |
rgrover1 | 716:11b41f651697 | 190 | virtual void onPasskeyDisplay(PasskeyDisplayCallback_t callback) {passkeyDisplayCallback = callback;} |
rgrover1 | 716:11b41f651697 | 191 | |
rgrover1 | 716:11b41f651697 | 192 | /* Entry points for the underlying stack to report events back to the user. */ |
rgrover1 | 716:11b41f651697 | 193 | public: |
rgrover1 | 716:11b41f651697 | 194 | void processSecuritySetupInitiatedEvent(Gap::Handle_t handle, bool allowBonding, bool requireMITM, SecurityIOCapabilities_t iocaps) { |
rgrover1 | 716:11b41f651697 | 195 | if (securitySetupInitiatedCallback) { |
rgrover1 | 716:11b41f651697 | 196 | securitySetupInitiatedCallback(handle, allowBonding, requireMITM, iocaps); |
rgrover1 | 716:11b41f651697 | 197 | } |
rgrover1 | 716:11b41f651697 | 198 | } |
rgrover1 | 716:11b41f651697 | 199 | |
rgrover1 | 716:11b41f651697 | 200 | void processSecuritySetupCompletedEvent(Gap::Handle_t handle, SecurityCompletionStatus_t status) { |
rgrover1 | 716:11b41f651697 | 201 | if (securitySetupCompletedCallback) { |
rgrover1 | 716:11b41f651697 | 202 | securitySetupCompletedCallback(handle, status); |
rgrover1 | 716:11b41f651697 | 203 | } |
rgrover1 | 716:11b41f651697 | 204 | } |
rgrover1 | 716:11b41f651697 | 205 | |
rgrover1 | 716:11b41f651697 | 206 | void processLinkSecuredEvent(Gap::Handle_t handle, SecurityMode_t securityMode) { |
rgrover1 | 716:11b41f651697 | 207 | if (linkSecuredCallback) { |
rgrover1 | 716:11b41f651697 | 208 | linkSecuredCallback(handle, securityMode); |
rgrover1 | 716:11b41f651697 | 209 | } |
rgrover1 | 716:11b41f651697 | 210 | } |
rgrover1 | 716:11b41f651697 | 211 | |
rgrover1 | 716:11b41f651697 | 212 | void processSecurityContextStoredEvent(Gap::Handle_t handle) { |
rgrover1 | 716:11b41f651697 | 213 | if (securityContextStoredCallback) { |
rgrover1 | 716:11b41f651697 | 214 | securityContextStoredCallback(handle); |
rgrover1 | 716:11b41f651697 | 215 | } |
rgrover1 | 716:11b41f651697 | 216 | } |
rgrover1 | 716:11b41f651697 | 217 | |
rgrover1 | 716:11b41f651697 | 218 | void processPasskeyDisplayEvent(Gap::Handle_t handle, const Passkey_t passkey) { |
rgrover1 | 716:11b41f651697 | 219 | if (passkeyDisplayCallback) { |
rgrover1 | 716:11b41f651697 | 220 | passkeyDisplayCallback(handle, passkey); |
rgrover1 | 716:11b41f651697 | 221 | } |
rgrover1 | 716:11b41f651697 | 222 | } |
rgrover1 | 716:11b41f651697 | 223 | |
rgrover1 | 716:11b41f651697 | 224 | protected: |
rgrover1 | 716:11b41f651697 | 225 | SecurityManager() : |
rgrover1 | 716:11b41f651697 | 226 | securitySetupInitiatedCallback(), |
rgrover1 | 716:11b41f651697 | 227 | securitySetupCompletedCallback(), |
rgrover1 | 716:11b41f651697 | 228 | linkSecuredCallback(), |
rgrover1 | 716:11b41f651697 | 229 | securityContextStoredCallback(), |
rgrover1 | 716:11b41f651697 | 230 | passkeyDisplayCallback() { |
rgrover1 | 716:11b41f651697 | 231 | /* empty */ |
rgrover1 | 716:11b41f651697 | 232 | } |
rgrover1 | 716:11b41f651697 | 233 | |
vcoubard | 1074:1fedc77d9add | 234 | public: |
vcoubard | 1074:1fedc77d9add | 235 | /** |
vcoubard | 1074:1fedc77d9add | 236 | * Clear all SecurityManager state of the associated object. |
vcoubard | 1074:1fedc77d9add | 237 | * |
vcoubard | 1074:1fedc77d9add | 238 | * This function is meant to be overridden in the platform-specific |
vcoubard | 1074:1fedc77d9add | 239 | * sub-class. Nevertheless, the sub-class is only expected to reset its |
vcoubard | 1074:1fedc77d9add | 240 | * state and not the data held in SecurityManager members. This shall be |
vcoubard | 1074:1fedc77d9add | 241 | * achieved by a call to SecurityManager::reset() from the sub-class' |
vcoubard | 1074:1fedc77d9add | 242 | * reset() implementation. |
vcoubard | 1074:1fedc77d9add | 243 | * |
vcoubard | 1074:1fedc77d9add | 244 | * @return BLE_ERROR_NONE on success. |
vcoubard | 1074:1fedc77d9add | 245 | */ |
vcoubard | 1074:1fedc77d9add | 246 | virtual ble_error_t reset(void) { |
vcoubard | 1074:1fedc77d9add | 247 | securitySetupInitiatedCallback = NULL; |
vcoubard | 1074:1fedc77d9add | 248 | securitySetupCompletedCallback = NULL; |
vcoubard | 1074:1fedc77d9add | 249 | linkSecuredCallback = NULL; |
vcoubard | 1074:1fedc77d9add | 250 | securityContextStoredCallback = NULL; |
vcoubard | 1074:1fedc77d9add | 251 | passkeyDisplayCallback = NULL; |
vcoubard | 1074:1fedc77d9add | 252 | |
vcoubard | 1074:1fedc77d9add | 253 | return BLE_ERROR_NONE; |
vcoubard | 1074:1fedc77d9add | 254 | } |
vcoubard | 1074:1fedc77d9add | 255 | |
rgrover1 | 716:11b41f651697 | 256 | protected: |
rgrover1 | 716:11b41f651697 | 257 | SecuritySetupInitiatedCallback_t securitySetupInitiatedCallback; |
rgrover1 | 716:11b41f651697 | 258 | SecuritySetupCompletedCallback_t securitySetupCompletedCallback; |
rgrover1 | 716:11b41f651697 | 259 | LinkSecuredCallback_t linkSecuredCallback; |
rgrover1 | 716:11b41f651697 | 260 | HandleSpecificEvent_t securityContextStoredCallback; |
rgrover1 | 716:11b41f651697 | 261 | PasskeyDisplayCallback_t passkeyDisplayCallback; |
rgrover1 | 716:11b41f651697 | 262 | }; |
rgrover1 | 716:11b41f651697 | 263 | |
rgrover1 | 716:11b41f651697 | 264 | #endif /*__SECURITY_MANAGER_H__*/ |