Rizky Ardi Maulana / mbed-os
Committer:
elessair
Date:
Sun Oct 23 15:10:02 2016 +0000
Revision:
0:f269e3021894
Initial commit

Who changed what in which revision?

UserRevisionLine numberNew contents of line
elessair 0:f269e3021894 1 /* mbed Microcontroller Library
elessair 0:f269e3021894 2 * Copyright (c) 2006-2015 ARM Limited
elessair 0:f269e3021894 3 *
elessair 0:f269e3021894 4 * Licensed under the Apache License, Version 2.0 (the "License");
elessair 0:f269e3021894 5 * you may not use this file except in compliance with the License.
elessair 0:f269e3021894 6 * You may obtain a copy of the License at
elessair 0:f269e3021894 7 *
elessair 0:f269e3021894 8 * http://www.apache.org/licenses/LICENSE-2.0
elessair 0:f269e3021894 9 *
elessair 0:f269e3021894 10 * Unless required by applicable law or agreed to in writing, software
elessair 0:f269e3021894 11 * distributed under the License is distributed on an "AS IS" BASIS,
elessair 0:f269e3021894 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
elessair 0:f269e3021894 13 * See the License for the specific language governing permissions and
elessair 0:f269e3021894 14 * limitations under the License.
elessair 0:f269e3021894 15 */
elessair 0:f269e3021894 16
elessair 0:f269e3021894 17 #ifndef __SECURITY_MANAGER_H__
elessair 0:f269e3021894 18 #define __SECURITY_MANAGER_H__
elessair 0:f269e3021894 19
elessair 0:f269e3021894 20 #include <stdint.h>
elessair 0:f269e3021894 21
elessair 0:f269e3021894 22 #include "Gap.h"
elessair 0:f269e3021894 23 #include "CallChainOfFunctionPointersWithContext.h"
elessair 0:f269e3021894 24
elessair 0:f269e3021894 25 class SecurityManager {
elessair 0:f269e3021894 26 public:
elessair 0:f269e3021894 27 enum SecurityMode_t {
elessair 0:f269e3021894 28 SECURITY_MODE_NO_ACCESS,
elessair 0:f269e3021894 29 SECURITY_MODE_ENCRYPTION_OPEN_LINK, /**< Require no protection, open link. */
elessair 0:f269e3021894 30 SECURITY_MODE_ENCRYPTION_NO_MITM, /**< Require encryption, but no MITM protection. */
elessair 0:f269e3021894 31 SECURITY_MODE_ENCRYPTION_WITH_MITM, /**< Require encryption and MITM protection. */
elessair 0:f269e3021894 32 SECURITY_MODE_SIGNED_NO_MITM, /**< Require signing or encryption, but no MITM protection. */
elessair 0:f269e3021894 33 SECURITY_MODE_SIGNED_WITH_MITM, /**< Require signing or encryption, and MITM protection. */
elessair 0:f269e3021894 34 };
elessair 0:f269e3021894 35
elessair 0:f269e3021894 36 /**
elessair 0:f269e3021894 37 * @brief Defines possible security status or states.
elessair 0:f269e3021894 38 *
elessair 0:f269e3021894 39 * @details Defines possible security status or states of a link when requested by getLinkSecurity().
elessair 0:f269e3021894 40 */
elessair 0:f269e3021894 41 enum LinkSecurityStatus_t {
elessair 0:f269e3021894 42 NOT_ENCRYPTED, /**< The link is not secured. */
elessair 0:f269e3021894 43 ENCRYPTION_IN_PROGRESS, /**< Link security is being established.*/
elessair 0:f269e3021894 44 ENCRYPTED /**< The link is secure.*/
elessair 0:f269e3021894 45 };
elessair 0:f269e3021894 46
elessair 0:f269e3021894 47 enum SecurityIOCapabilities_t {
elessair 0:f269e3021894 48 IO_CAPS_DISPLAY_ONLY = 0x00, /**< Display only. */
elessair 0:f269e3021894 49 IO_CAPS_DISPLAY_YESNO = 0x01, /**< Display and yes/no entry. */
elessair 0:f269e3021894 50 IO_CAPS_KEYBOARD_ONLY = 0x02, /**< Keyboard only. */
elessair 0:f269e3021894 51 IO_CAPS_NONE = 0x03, /**< No I/O capabilities. */
elessair 0:f269e3021894 52 IO_CAPS_KEYBOARD_DISPLAY = 0x04, /**< Keyboard and display. */
elessair 0:f269e3021894 53 };
elessair 0:f269e3021894 54
elessair 0:f269e3021894 55 enum SecurityCompletionStatus_t {
elessair 0:f269e3021894 56 SEC_STATUS_SUCCESS = 0x00, /**< Procedure completed with success. */
elessair 0:f269e3021894 57 SEC_STATUS_TIMEOUT = 0x01, /**< Procedure timed out. */
elessair 0:f269e3021894 58 SEC_STATUS_PDU_INVALID = 0x02, /**< Invalid PDU received. */
elessair 0:f269e3021894 59 SEC_STATUS_PASSKEY_ENTRY_FAILED = 0x81, /**< Passkey entry failed (user canceled or other). */
elessair 0:f269e3021894 60 SEC_STATUS_OOB_NOT_AVAILABLE = 0x82, /**< Out of Band Key not available. */
elessair 0:f269e3021894 61 SEC_STATUS_AUTH_REQ = 0x83, /**< Authentication requirements not met. */
elessair 0:f269e3021894 62 SEC_STATUS_CONFIRM_VALUE = 0x84, /**< Confirm value failed. */
elessair 0:f269e3021894 63 SEC_STATUS_PAIRING_NOT_SUPP = 0x85, /**< Pairing not supported. */
elessair 0:f269e3021894 64 SEC_STATUS_ENC_KEY_SIZE = 0x86, /**< Encryption key size. */
elessair 0:f269e3021894 65 SEC_STATUS_SMP_CMD_UNSUPPORTED = 0x87, /**< Unsupported SMP command. */
elessair 0:f269e3021894 66 SEC_STATUS_UNSPECIFIED = 0x88, /**< Unspecified reason. */
elessair 0:f269e3021894 67 SEC_STATUS_REPEATED_ATTEMPTS = 0x89, /**< Too little time elapsed since last attempt. */
elessair 0:f269e3021894 68 SEC_STATUS_INVALID_PARAMS = 0x8A, /**< Invalid parameters. */
elessair 0:f269e3021894 69 };
elessair 0:f269e3021894 70
elessair 0:f269e3021894 71 /**
elessair 0:f269e3021894 72 * Declaration of type containing a passkey to be used during pairing. This
elessair 0:f269e3021894 73 * is passed into initializeSecurity() to specify a pre-programmed passkey
elessair 0:f269e3021894 74 * for authentication instead of generating a random one.
elessair 0:f269e3021894 75 */
elessair 0:f269e3021894 76 static const unsigned PASSKEY_LEN = 6;
elessair 0:f269e3021894 77 typedef uint8_t Passkey_t[PASSKEY_LEN]; /**< 6-digit passkey in ASCII ('0'-'9' digits only). */
elessair 0:f269e3021894 78
elessair 0:f269e3021894 79 public:
elessair 0:f269e3021894 80 typedef void (*HandleSpecificEvent_t)(Gap::Handle_t handle);
elessair 0:f269e3021894 81 typedef void (*SecuritySetupInitiatedCallback_t)(Gap::Handle_t, bool allowBonding, bool requireMITM, SecurityIOCapabilities_t iocaps);
elessair 0:f269e3021894 82 typedef void (*SecuritySetupCompletedCallback_t)(Gap::Handle_t, SecurityCompletionStatus_t status);
elessair 0:f269e3021894 83 typedef void (*LinkSecuredCallback_t)(Gap::Handle_t handle, SecurityMode_t securityMode);
elessair 0:f269e3021894 84 typedef void (*PasskeyDisplayCallback_t)(Gap::Handle_t handle, const Passkey_t passkey);
elessair 0:f269e3021894 85
elessair 0:f269e3021894 86 typedef FunctionPointerWithContext<const SecurityManager *> SecurityManagerShutdownCallback_t;
elessair 0:f269e3021894 87 typedef CallChainOfFunctionPointersWithContext<const SecurityManager *> SecurityManagerShutdownCallbackChain_t;
elessair 0:f269e3021894 88
elessair 0:f269e3021894 89 /*
elessair 0:f269e3021894 90 * The following functions are meant to be overridden in the platform-specific sub-class.
elessair 0:f269e3021894 91 */
elessair 0:f269e3021894 92 public:
elessair 0:f269e3021894 93 /**
elessair 0:f269e3021894 94 * Enable the BLE stack's Security Manager. The Security Manager implements
elessair 0:f269e3021894 95 * the actual cryptographic algorithms and protocol exchanges that allow two
elessair 0:f269e3021894 96 * devices to securely exchange data and privately detect each other.
elessair 0:f269e3021894 97 * Calling this API is a prerequisite for encryption and pairing (bonding).
elessair 0:f269e3021894 98 *
elessair 0:f269e3021894 99 * @param[in] enableBonding Allow for bonding.
elessair 0:f269e3021894 100 * @param[in] requireMITM Require protection for man-in-the-middle attacks.
elessair 0:f269e3021894 101 * @param[in] iocaps To specify the I/O capabilities of this peripheral,
elessair 0:f269e3021894 102 * such as availability of a display or keyboard, to
elessair 0:f269e3021894 103 * support out-of-band exchanges of security data.
elessair 0:f269e3021894 104 * @param[in] passkey To specify a static passkey.
elessair 0:f269e3021894 105 *
elessair 0:f269e3021894 106 * @return BLE_ERROR_NONE on success.
elessair 0:f269e3021894 107 */
elessair 0:f269e3021894 108 virtual ble_error_t init(bool enableBonding = true,
elessair 0:f269e3021894 109 bool requireMITM = true,
elessair 0:f269e3021894 110 SecurityIOCapabilities_t iocaps = IO_CAPS_NONE,
elessair 0:f269e3021894 111 const Passkey_t passkey = NULL) {
elessair 0:f269e3021894 112 /* Avoid compiler warnings about unused variables. */
elessair 0:f269e3021894 113 (void)enableBonding;
elessair 0:f269e3021894 114 (void)requireMITM;
elessair 0:f269e3021894 115 (void)iocaps;
elessair 0:f269e3021894 116 (void)passkey;
elessair 0:f269e3021894 117
elessair 0:f269e3021894 118 return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */
elessair 0:f269e3021894 119 }
elessair 0:f269e3021894 120
elessair 0:f269e3021894 121 /**
elessair 0:f269e3021894 122 * Get the security status of a connection.
elessair 0:f269e3021894 123 *
elessair 0:f269e3021894 124 * @param[in] connectionHandle Handle to identify the connection.
elessair 0:f269e3021894 125 * @param[out] securityStatusP Security status.
elessair 0:f269e3021894 126 *
elessair 0:f269e3021894 127 * @return BLE_ERROR_NONE or appropriate error code indicating the failure reason.
elessair 0:f269e3021894 128 */
elessair 0:f269e3021894 129 virtual ble_error_t getLinkSecurity(Gap::Handle_t connectionHandle, LinkSecurityStatus_t *securityStatusP) {
elessair 0:f269e3021894 130 /* Avoid compiler warnings about unused variables. */
elessair 0:f269e3021894 131 (void)connectionHandle;
elessair 0:f269e3021894 132 (void)securityStatusP;
elessair 0:f269e3021894 133
elessair 0:f269e3021894 134 return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */
elessair 0:f269e3021894 135 }
elessair 0:f269e3021894 136
elessair 0:f269e3021894 137 /**
elessair 0:f269e3021894 138 * Set the security mode on a connection. Useful for elevating the security mode
elessair 0:f269e3021894 139 * once certain conditions are met, e.g., a particular service is found.
elessair 0:f269e3021894 140 *
elessair 0:f269e3021894 141 * @param[in] connectionHandle Handle to identify the connection.
elessair 0:f269e3021894 142 * @param[in] securityMode Requested security mode.
elessair 0:f269e3021894 143 *
elessair 0:f269e3021894 144 * @return BLE_ERROR_NONE or appropriate error code indicating the failure reason.
elessair 0:f269e3021894 145 */
elessair 0:f269e3021894 146 virtual ble_error_t setLinkSecurity(Gap::Handle_t connectionHandle, SecurityMode_t securityMode) {
elessair 0:f269e3021894 147 /* Avoid compiler warnings about unused variables. */
elessair 0:f269e3021894 148 (void)connectionHandle;
elessair 0:f269e3021894 149 (void)securityMode;
elessair 0:f269e3021894 150
elessair 0:f269e3021894 151 return BLE_ERROR_NOT_IMPLEMENTED;
elessair 0:f269e3021894 152 }
elessair 0:f269e3021894 153
elessair 0:f269e3021894 154 /**
elessair 0:f269e3021894 155 * Delete all peer device context and all related bonding information from
elessair 0:f269e3021894 156 * the database within the security manager.
elessair 0:f269e3021894 157 *
elessair 0:f269e3021894 158 * @retval BLE_ERROR_NONE On success, else an error code indicating reason for failure.
elessair 0:f269e3021894 159 * @retval BLE_ERROR_INVALID_STATE If the API is called without module initialization or
elessair 0:f269e3021894 160 * application registration.
elessair 0:f269e3021894 161 */
elessair 0:f269e3021894 162 virtual ble_error_t purgeAllBondingState(void) {
elessair 0:f269e3021894 163 return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */
elessair 0:f269e3021894 164 }
elessair 0:f269e3021894 165
elessair 0:f269e3021894 166 /**
elessair 0:f269e3021894 167 * Get a list of addresses from all peers in the bond table.
elessair 0:f269e3021894 168 *
elessair 0:f269e3021894 169 * @param[in,out] addresses
elessair 0:f269e3021894 170 * (on input) addresses.capacity contains the maximum
elessair 0:f269e3021894 171 * number of addresses to be returned.
elessair 0:f269e3021894 172 * (on output) The populated table with copies of the
elessair 0:f269e3021894 173 * addresses in the implementation's whitelist.
elessair 0:f269e3021894 174 *
elessair 0:f269e3021894 175 * @retval BLE_ERROR_NONE On success, else an error code indicating reason for failure.
elessair 0:f269e3021894 176 * @retval BLE_ERROR_INVALID_STATE If the API is called without module initialization or
elessair 0:f269e3021894 177 * application registration.
elessair 0:f269e3021894 178 *
elessair 0:f269e3021894 179 * @experimental
elessair 0:f269e3021894 180 */
elessair 0:f269e3021894 181 virtual ble_error_t getAddressesFromBondTable(Gap::Whitelist_t &addresses) const {
elessair 0:f269e3021894 182 /* Avoid compiler warnings about unused variables */
elessair 0:f269e3021894 183 (void) addresses;
elessair 0:f269e3021894 184
elessair 0:f269e3021894 185 return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */
elessair 0:f269e3021894 186 }
elessair 0:f269e3021894 187
elessair 0:f269e3021894 188 /* Event callback handlers. */
elessair 0:f269e3021894 189 public:
elessair 0:f269e3021894 190 /**
elessair 0:f269e3021894 191 * Setup a callback to be invoked to notify the user application that the
elessair 0:f269e3021894 192 * SecurityManager instance is about to shutdown (possibly as a result of a call
elessair 0:f269e3021894 193 * to BLE::shutdown()).
elessair 0:f269e3021894 194 *
elessair 0:f269e3021894 195 * @note It is possible to chain together multiple onShutdown callbacks
elessair 0:f269e3021894 196 * (potentially from different modules of an application) to be notified
elessair 0:f269e3021894 197 * before the SecurityManager is shutdown.
elessair 0:f269e3021894 198 *
elessair 0:f269e3021894 199 * @note It is also possible to set up a callback into a member function of
elessair 0:f269e3021894 200 * some object.
elessair 0:f269e3021894 201 *
elessair 0:f269e3021894 202 * @note It is possible to unregister a callback using onShutdown().detach(callback)
elessair 0:f269e3021894 203 */
elessair 0:f269e3021894 204 void onShutdown(const SecurityManagerShutdownCallback_t& callback) {
elessair 0:f269e3021894 205 shutdownCallChain.add(callback);
elessair 0:f269e3021894 206 }
elessair 0:f269e3021894 207 template <typename T>
elessair 0:f269e3021894 208 void onShutdown(T *objPtr, void (T::*memberPtr)(const SecurityManager *)) {
elessair 0:f269e3021894 209 shutdownCallChain.add(objPtr, memberPtr);
elessair 0:f269e3021894 210 }
elessair 0:f269e3021894 211
elessair 0:f269e3021894 212 /**
elessair 0:f269e3021894 213 * @brief provide access to the callchain of shutdown event callbacks
elessair 0:f269e3021894 214 * It is possible to register callbacks using onShutdown().add(callback);
elessair 0:f269e3021894 215 * It is possible to unregister callbacks using onShutdown().detach(callback)
elessair 0:f269e3021894 216 * @return The shutdown event callbacks chain
elessair 0:f269e3021894 217 */
elessair 0:f269e3021894 218 SecurityManagerShutdownCallbackChain_t& onShutdown() {
elessair 0:f269e3021894 219 return shutdownCallChain;
elessair 0:f269e3021894 220 }
elessair 0:f269e3021894 221
elessair 0:f269e3021894 222 /**
elessair 0:f269e3021894 223 * To indicate that a security procedure for the link has started.
elessair 0:f269e3021894 224 */
elessair 0:f269e3021894 225 virtual void onSecuritySetupInitiated(SecuritySetupInitiatedCallback_t callback) {securitySetupInitiatedCallback = callback;}
elessair 0:f269e3021894 226
elessair 0:f269e3021894 227 /**
elessair 0:f269e3021894 228 * To indicate that the security procedure for the link has completed.
elessair 0:f269e3021894 229 */
elessair 0:f269e3021894 230 virtual void onSecuritySetupCompleted(SecuritySetupCompletedCallback_t callback) {securitySetupCompletedCallback = callback;}
elessair 0:f269e3021894 231
elessair 0:f269e3021894 232 /**
elessair 0:f269e3021894 233 * To indicate that the link with the peer is secured. For bonded devices,
elessair 0:f269e3021894 234 * subsequent reconnections with a bonded peer will result only in this callback
elessair 0:f269e3021894 235 * when the link is secured; setup procedures will not occur (unless the
elessair 0:f269e3021894 236 * bonding information is either lost or deleted on either or both sides).
elessair 0:f269e3021894 237 */
elessair 0:f269e3021894 238 virtual void onLinkSecured(LinkSecuredCallback_t callback) {linkSecuredCallback = callback;}
elessair 0:f269e3021894 239
elessair 0:f269e3021894 240 /**
elessair 0:f269e3021894 241 * To indicate that device context is stored persistently.
elessair 0:f269e3021894 242 */
elessair 0:f269e3021894 243 virtual void onSecurityContextStored(HandleSpecificEvent_t callback) {securityContextStoredCallback = callback;}
elessair 0:f269e3021894 244
elessair 0:f269e3021894 245 /**
elessair 0:f269e3021894 246 * To set the callback for when the passkey needs to be displayed on a peripheral with DISPLAY capability.
elessair 0:f269e3021894 247 */
elessair 0:f269e3021894 248 virtual void onPasskeyDisplay(PasskeyDisplayCallback_t callback) {passkeyDisplayCallback = callback;}
elessair 0:f269e3021894 249
elessair 0:f269e3021894 250 /* Entry points for the underlying stack to report events back to the user. */
elessair 0:f269e3021894 251 public:
elessair 0:f269e3021894 252 void processSecuritySetupInitiatedEvent(Gap::Handle_t handle, bool allowBonding, bool requireMITM, SecurityIOCapabilities_t iocaps) {
elessair 0:f269e3021894 253 if (securitySetupInitiatedCallback) {
elessair 0:f269e3021894 254 securitySetupInitiatedCallback(handle, allowBonding, requireMITM, iocaps);
elessair 0:f269e3021894 255 }
elessair 0:f269e3021894 256 }
elessair 0:f269e3021894 257
elessair 0:f269e3021894 258 void processSecuritySetupCompletedEvent(Gap::Handle_t handle, SecurityCompletionStatus_t status) {
elessair 0:f269e3021894 259 if (securitySetupCompletedCallback) {
elessair 0:f269e3021894 260 securitySetupCompletedCallback(handle, status);
elessair 0:f269e3021894 261 }
elessair 0:f269e3021894 262 }
elessair 0:f269e3021894 263
elessair 0:f269e3021894 264 void processLinkSecuredEvent(Gap::Handle_t handle, SecurityMode_t securityMode) {
elessair 0:f269e3021894 265 if (linkSecuredCallback) {
elessair 0:f269e3021894 266 linkSecuredCallback(handle, securityMode);
elessair 0:f269e3021894 267 }
elessair 0:f269e3021894 268 }
elessair 0:f269e3021894 269
elessair 0:f269e3021894 270 void processSecurityContextStoredEvent(Gap::Handle_t handle) {
elessair 0:f269e3021894 271 if (securityContextStoredCallback) {
elessair 0:f269e3021894 272 securityContextStoredCallback(handle);
elessair 0:f269e3021894 273 }
elessair 0:f269e3021894 274 }
elessair 0:f269e3021894 275
elessair 0:f269e3021894 276 void processPasskeyDisplayEvent(Gap::Handle_t handle, const Passkey_t passkey) {
elessair 0:f269e3021894 277 if (passkeyDisplayCallback) {
elessair 0:f269e3021894 278 passkeyDisplayCallback(handle, passkey);
elessair 0:f269e3021894 279 }
elessair 0:f269e3021894 280 }
elessair 0:f269e3021894 281
elessair 0:f269e3021894 282 protected:
elessair 0:f269e3021894 283 SecurityManager() :
elessair 0:f269e3021894 284 securitySetupInitiatedCallback(),
elessair 0:f269e3021894 285 securitySetupCompletedCallback(),
elessair 0:f269e3021894 286 linkSecuredCallback(),
elessair 0:f269e3021894 287 securityContextStoredCallback(),
elessair 0:f269e3021894 288 passkeyDisplayCallback() {
elessair 0:f269e3021894 289 /* empty */
elessair 0:f269e3021894 290 }
elessair 0:f269e3021894 291
elessair 0:f269e3021894 292 public:
elessair 0:f269e3021894 293 /**
elessair 0:f269e3021894 294 * Notify all registered onShutdown callbacks that the SecurityManager is
elessair 0:f269e3021894 295 * about to be shutdown and clear all SecurityManager state of the
elessair 0:f269e3021894 296 * associated object.
elessair 0:f269e3021894 297 *
elessair 0:f269e3021894 298 * This function is meant to be overridden in the platform-specific
elessair 0:f269e3021894 299 * sub-class. Nevertheless, the sub-class is only expected to reset its
elessair 0:f269e3021894 300 * state and not the data held in SecurityManager members. This shall be
elessair 0:f269e3021894 301 * achieved by a call to SecurityManager::reset() from the sub-class'
elessair 0:f269e3021894 302 * reset() implementation.
elessair 0:f269e3021894 303 *
elessair 0:f269e3021894 304 * @return BLE_ERROR_NONE on success.
elessair 0:f269e3021894 305 */
elessair 0:f269e3021894 306 virtual ble_error_t reset(void) {
elessair 0:f269e3021894 307 /* Notify that the instance is about to shutdown */
elessair 0:f269e3021894 308 shutdownCallChain.call(this);
elessair 0:f269e3021894 309 shutdownCallChain.clear();
elessair 0:f269e3021894 310
elessair 0:f269e3021894 311 securitySetupInitiatedCallback = NULL;
elessair 0:f269e3021894 312 securitySetupCompletedCallback = NULL;
elessair 0:f269e3021894 313 linkSecuredCallback = NULL;
elessair 0:f269e3021894 314 securityContextStoredCallback = NULL;
elessair 0:f269e3021894 315 passkeyDisplayCallback = NULL;
elessair 0:f269e3021894 316
elessair 0:f269e3021894 317 return BLE_ERROR_NONE;
elessair 0:f269e3021894 318 }
elessair 0:f269e3021894 319
elessair 0:f269e3021894 320 protected:
elessair 0:f269e3021894 321 SecuritySetupInitiatedCallback_t securitySetupInitiatedCallback;
elessair 0:f269e3021894 322 SecuritySetupCompletedCallback_t securitySetupCompletedCallback;
elessair 0:f269e3021894 323 LinkSecuredCallback_t linkSecuredCallback;
elessair 0:f269e3021894 324 HandleSpecificEvent_t securityContextStoredCallback;
elessair 0:f269e3021894 325 PasskeyDisplayCallback_t passkeyDisplayCallback;
elessair 0:f269e3021894 326
elessair 0:f269e3021894 327 private:
elessair 0:f269e3021894 328 SecurityManagerShutdownCallbackChain_t shutdownCallChain;
elessair 0:f269e3021894 329 };
elessair 0:f269e3021894 330
elessair 0:f269e3021894 331 #endif /*__SECURITY_MANAGER_H__*/