prova invio BLE
Dependents: BLE_HeartRate_IDB04A1
Fork of BLE_API by
ble/SecurityManager.h@1088:709ebced28ab, 2016-01-11 (annotated)
- Committer:
- vcoubard
- Date:
- Mon Jan 11 08:51:49 2016 +0000
- Revision:
- 1088:709ebced28ab
- Parent:
- 1084:40c1e518d6de
- Child:
- 1089:8e810a8e083e
Synchronized with git rev 0781293b
Author: Andres Amaya Garcia
Add onShutdown to register callbacks
Add an onShutdown() function to Gap, GattClient, GattServer and
SecurityManager. The callbacks are added to a private callback chain in each of
the instances. The callbacks will be executed inside each object's reset()
function BEFORE the state of the instance is cleared. The developers of the
platform-specific implementation must call the parent class' reset() function
for the callbacks to be executed.
Finally, an onShutdown() function that returns the shutdown callchain is added
to allow detaching callbacks.
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
rgrover1 | 716:11b41f651697 | 1 | /* mbed Microcontroller Library |
rgrover1 | 716:11b41f651697 | 2 | * Copyright (c) 2006-2015 ARM Limited |
rgrover1 | 716:11b41f651697 | 3 | * |
rgrover1 | 716:11b41f651697 | 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
rgrover1 | 716:11b41f651697 | 5 | * you may not use this file except in compliance with the License. |
rgrover1 | 716:11b41f651697 | 6 | * You may obtain a copy of the License at |
rgrover1 | 716:11b41f651697 | 7 | * |
rgrover1 | 716:11b41f651697 | 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
rgrover1 | 716:11b41f651697 | 9 | * |
rgrover1 | 716:11b41f651697 | 10 | * Unless required by applicable law or agreed to in writing, software |
rgrover1 | 716:11b41f651697 | 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
rgrover1 | 716:11b41f651697 | 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
rgrover1 | 716:11b41f651697 | 13 | * See the License for the specific language governing permissions and |
rgrover1 | 716:11b41f651697 | 14 | * limitations under the License. |
rgrover1 | 716:11b41f651697 | 15 | */ |
rgrover1 | 716:11b41f651697 | 16 | |
rgrover1 | 716:11b41f651697 | 17 | #ifndef __SECURITY_MANAGER_H__ |
rgrover1 | 716:11b41f651697 | 18 | #define __SECURITY_MANAGER_H__ |
rgrover1 | 716:11b41f651697 | 19 | |
rgrover1 | 716:11b41f651697 | 20 | #include <stdint.h> |
rgrover1 | 716:11b41f651697 | 21 | |
rgrover1 | 716:11b41f651697 | 22 | #include "Gap.h" |
vcoubard | 1088:709ebced28ab | 23 | #include "CallChainOfFunctionPointersWithContext.h" |
rgrover1 | 716:11b41f651697 | 24 | |
rgrover1 | 716:11b41f651697 | 25 | class SecurityManager { |
rgrover1 | 716:11b41f651697 | 26 | public: |
rgrover1 | 716:11b41f651697 | 27 | enum SecurityMode_t { |
rgrover1 | 716:11b41f651697 | 28 | SECURITY_MODE_NO_ACCESS, |
vcoubard | 1048:efb29faf12fc | 29 | SECURITY_MODE_ENCRYPTION_OPEN_LINK, /**< Require no protection, open link. */ |
vcoubard | 1048:efb29faf12fc | 30 | SECURITY_MODE_ENCRYPTION_NO_MITM, /**< Require encryption, but no MITM protection. */ |
vcoubard | 1048:efb29faf12fc | 31 | SECURITY_MODE_ENCRYPTION_WITH_MITM, /**< Require encryption and MITM protection. */ |
vcoubard | 1048:efb29faf12fc | 32 | SECURITY_MODE_SIGNED_NO_MITM, /**< Require signing or encryption, but no MITM protection. */ |
vcoubard | 1048:efb29faf12fc | 33 | SECURITY_MODE_SIGNED_WITH_MITM, /**< Require signing or encryption, and MITM protection. */ |
rgrover1 | 716:11b41f651697 | 34 | }; |
rgrover1 | 716:11b41f651697 | 35 | |
rgrover1 | 716:11b41f651697 | 36 | /** |
vcoubard | 1048:efb29faf12fc | 37 | * @brief Defines possible security status or states. |
rgrover1 | 716:11b41f651697 | 38 | * |
vcoubard | 1048:efb29faf12fc | 39 | * @details Defines possible security status or states of a link when requested by getLinkSecurity(). |
rgrover1 | 716:11b41f651697 | 40 | */ |
rgrover1 | 716:11b41f651697 | 41 | enum LinkSecurityStatus_t { |
rgrover1 | 716:11b41f651697 | 42 | NOT_ENCRYPTED, /**< The link is not secured. */ |
rgrover1 | 716:11b41f651697 | 43 | ENCRYPTION_IN_PROGRESS, /**< Link security is being established.*/ |
rgrover1 | 716:11b41f651697 | 44 | ENCRYPTED /**< The link is secure.*/ |
rgrover1 | 716:11b41f651697 | 45 | }; |
rgrover1 | 716:11b41f651697 | 46 | |
rgrover1 | 716:11b41f651697 | 47 | enum SecurityIOCapabilities_t { |
vcoubard | 1048:efb29faf12fc | 48 | IO_CAPS_DISPLAY_ONLY = 0x00, /**< Display only. */ |
vcoubard | 1048:efb29faf12fc | 49 | IO_CAPS_DISPLAY_YESNO = 0x01, /**< Display and yes/no entry. */ |
vcoubard | 1048:efb29faf12fc | 50 | IO_CAPS_KEYBOARD_ONLY = 0x02, /**< Keyboard only. */ |
rgrover1 | 716:11b41f651697 | 51 | IO_CAPS_NONE = 0x03, /**< No I/O capabilities. */ |
vcoubard | 1048:efb29faf12fc | 52 | IO_CAPS_KEYBOARD_DISPLAY = 0x04, /**< Keyboard and display. */ |
rgrover1 | 716:11b41f651697 | 53 | }; |
rgrover1 | 716:11b41f651697 | 54 | |
rgrover1 | 716:11b41f651697 | 55 | enum SecurityCompletionStatus_t { |
rgrover1 | 716:11b41f651697 | 56 | SEC_STATUS_SUCCESS = 0x00, /**< Procedure completed with success. */ |
rgrover1 | 716:11b41f651697 | 57 | SEC_STATUS_TIMEOUT = 0x01, /**< Procedure timed out. */ |
rgrover1 | 716:11b41f651697 | 58 | SEC_STATUS_PDU_INVALID = 0x02, /**< Invalid PDU received. */ |
rgrover1 | 716:11b41f651697 | 59 | SEC_STATUS_PASSKEY_ENTRY_FAILED = 0x81, /**< Passkey entry failed (user canceled or other). */ |
rgrover1 | 716:11b41f651697 | 60 | SEC_STATUS_OOB_NOT_AVAILABLE = 0x82, /**< Out of Band Key not available. */ |
rgrover1 | 716:11b41f651697 | 61 | SEC_STATUS_AUTH_REQ = 0x83, /**< Authentication requirements not met. */ |
rgrover1 | 716:11b41f651697 | 62 | SEC_STATUS_CONFIRM_VALUE = 0x84, /**< Confirm value failed. */ |
rgrover1 | 716:11b41f651697 | 63 | SEC_STATUS_PAIRING_NOT_SUPP = 0x85, /**< Pairing not supported. */ |
rgrover1 | 716:11b41f651697 | 64 | SEC_STATUS_ENC_KEY_SIZE = 0x86, /**< Encryption key size. */ |
rgrover1 | 716:11b41f651697 | 65 | SEC_STATUS_SMP_CMD_UNSUPPORTED = 0x87, /**< Unsupported SMP command. */ |
rgrover1 | 716:11b41f651697 | 66 | SEC_STATUS_UNSPECIFIED = 0x88, /**< Unspecified reason. */ |
rgrover1 | 716:11b41f651697 | 67 | SEC_STATUS_REPEATED_ATTEMPTS = 0x89, /**< Too little time elapsed since last attempt. */ |
rgrover1 | 716:11b41f651697 | 68 | SEC_STATUS_INVALID_PARAMS = 0x8A, /**< Invalid parameters. */ |
rgrover1 | 716:11b41f651697 | 69 | }; |
rgrover1 | 716:11b41f651697 | 70 | |
rgrover1 | 716:11b41f651697 | 71 | /** |
rgrover1 | 716:11b41f651697 | 72 | * Declaration of type containing a passkey to be used during pairing. This |
rgrover1 | 716:11b41f651697 | 73 | * is passed into initializeSecurity() to specify a pre-programmed passkey |
rgrover1 | 716:11b41f651697 | 74 | * for authentication instead of generating a random one. |
rgrover1 | 716:11b41f651697 | 75 | */ |
rgrover1 | 716:11b41f651697 | 76 | static const unsigned PASSKEY_LEN = 6; |
rgrover1 | 716:11b41f651697 | 77 | typedef uint8_t Passkey_t[PASSKEY_LEN]; /**< 6-digit passkey in ASCII ('0'-'9' digits only). */ |
rgrover1 | 716:11b41f651697 | 78 | |
rgrover1 | 716:11b41f651697 | 79 | public: |
rgrover1 | 716:11b41f651697 | 80 | typedef void (*HandleSpecificEvent_t)(Gap::Handle_t handle); |
rgrover1 | 716:11b41f651697 | 81 | typedef void (*SecuritySetupInitiatedCallback_t)(Gap::Handle_t, bool allowBonding, bool requireMITM, SecurityIOCapabilities_t iocaps); |
rgrover1 | 716:11b41f651697 | 82 | typedef void (*SecuritySetupCompletedCallback_t)(Gap::Handle_t, SecurityCompletionStatus_t status); |
rgrover1 | 716:11b41f651697 | 83 | typedef void (*LinkSecuredCallback_t)(Gap::Handle_t handle, SecurityMode_t securityMode); |
rgrover1 | 716:11b41f651697 | 84 | typedef void (*PasskeyDisplayCallback_t)(Gap::Handle_t handle, const Passkey_t passkey); |
rgrover1 | 716:11b41f651697 | 85 | |
vcoubard | 1088:709ebced28ab | 86 | typedef FunctionPointerWithContext<const SecurityManager *> SecurityManagerShutdownCallback_t; |
vcoubard | 1088:709ebced28ab | 87 | typedef CallChainOfFunctionPointersWithContext<const SecurityManager *> SecurityManagerShutdownCallbackChain_t; |
vcoubard | 1088:709ebced28ab | 88 | |
rgrover1 | 716:11b41f651697 | 89 | /* |
rgrover1 | 716:11b41f651697 | 90 | * The following functions are meant to be overridden in the platform-specific sub-class. |
rgrover1 | 716:11b41f651697 | 91 | */ |
rgrover1 | 716:11b41f651697 | 92 | public: |
rgrover1 | 716:11b41f651697 | 93 | /** |
rgrover1 | 716:11b41f651697 | 94 | * Enable the BLE stack's Security Manager. The Security Manager implements |
rgrover1 | 716:11b41f651697 | 95 | * the actual cryptographic algorithms and protocol exchanges that allow two |
rgrover1 | 716:11b41f651697 | 96 | * devices to securely exchange data and privately detect each other. |
rgrover1 | 716:11b41f651697 | 97 | * Calling this API is a prerequisite for encryption and pairing (bonding). |
rgrover1 | 716:11b41f651697 | 98 | * |
rgrover1 | 716:11b41f651697 | 99 | * @param[in] enableBonding Allow for bonding. |
rgrover1 | 716:11b41f651697 | 100 | * @param[in] requireMITM Require protection for man-in-the-middle attacks. |
vcoubard | 1048:efb29faf12fc | 101 | * @param[in] iocaps To specify the I/O capabilities of this peripheral, |
vcoubard | 1048:efb29faf12fc | 102 | * such as availability of a display or keyboard, to |
rgrover1 | 716:11b41f651697 | 103 | * support out-of-band exchanges of security data. |
rgrover1 | 716:11b41f651697 | 104 | * @param[in] passkey To specify a static passkey. |
rgrover1 | 716:11b41f651697 | 105 | * |
rgrover1 | 716:11b41f651697 | 106 | * @return BLE_ERROR_NONE on success. |
rgrover1 | 716:11b41f651697 | 107 | */ |
rgrover1 | 716:11b41f651697 | 108 | virtual ble_error_t init(bool enableBonding = true, |
rgrover1 | 716:11b41f651697 | 109 | bool requireMITM = true, |
rgrover1 | 716:11b41f651697 | 110 | SecurityIOCapabilities_t iocaps = IO_CAPS_NONE, |
rgrover1 | 716:11b41f651697 | 111 | const Passkey_t passkey = NULL) { |
vcoubard | 1048:efb29faf12fc | 112 | /* Avoid compiler warnings about unused variables. */ |
rgrover1 | 734:4872b70437ce | 113 | (void)enableBonding; |
rgrover1 | 734:4872b70437ce | 114 | (void)requireMITM; |
rgrover1 | 734:4872b70437ce | 115 | (void)iocaps; |
rgrover1 | 734:4872b70437ce | 116 | (void)passkey; |
rgrover1 | 734:4872b70437ce | 117 | |
vcoubard | 1048:efb29faf12fc | 118 | return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */ |
rgrover1 | 716:11b41f651697 | 119 | } |
rgrover1 | 716:11b41f651697 | 120 | |
rgrover1 | 716:11b41f651697 | 121 | /** |
rgrover1 | 716:11b41f651697 | 122 | * Get the security status of a connection. |
rgrover1 | 716:11b41f651697 | 123 | * |
rgrover1 | 716:11b41f651697 | 124 | * @param[in] connectionHandle Handle to identify the connection. |
vcoubard | 1048:efb29faf12fc | 125 | * @param[out] securityStatusP Security status. |
rgrover1 | 716:11b41f651697 | 126 | * |
vcoubard | 1057:93a9679d655c | 127 | * @return BLE_ERROR_NONE or appropriate error code indicating the failure reason. |
rgrover1 | 716:11b41f651697 | 128 | */ |
rgrover1 | 716:11b41f651697 | 129 | virtual ble_error_t getLinkSecurity(Gap::Handle_t connectionHandle, LinkSecurityStatus_t *securityStatusP) { |
vcoubard | 1048:efb29faf12fc | 130 | /* Avoid compiler warnings about unused variables. */ |
rgrover1 | 734:4872b70437ce | 131 | (void)connectionHandle; |
rgrover1 | 734:4872b70437ce | 132 | (void)securityStatusP; |
rgrover1 | 734:4872b70437ce | 133 | |
vcoubard | 1048:efb29faf12fc | 134 | return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */ |
rgrover1 | 716:11b41f651697 | 135 | } |
rgrover1 | 716:11b41f651697 | 136 | |
rgrover1 | 716:11b41f651697 | 137 | /** |
vcoubard | 1057:93a9679d655c | 138 | * Set the security mode on a connection. Useful for elevating the security mode |
vcoubard | 1057:93a9679d655c | 139 | * once certain conditions are met, e.g., a particular service is found. |
vcoubard | 1057:93a9679d655c | 140 | * |
vcoubard | 1057:93a9679d655c | 141 | * @param[in] connectionHandle Handle to identify the connection. |
vcoubard | 1057:93a9679d655c | 142 | * @param[in] securityMode Requested security mode. |
vcoubard | 1057:93a9679d655c | 143 | * |
vcoubard | 1057:93a9679d655c | 144 | * @return BLE_ERROR_NONE or appropriate error code indicating the failure reason. |
vcoubard | 1057:93a9679d655c | 145 | */ |
vcoubard | 1057:93a9679d655c | 146 | virtual ble_error_t setLinkSecurity(Gap::Handle_t connectionHandle, SecurityMode_t securityMode) { |
vcoubard | 1057:93a9679d655c | 147 | /* Avoid compiler warnings about unused variables. */ |
vcoubard | 1057:93a9679d655c | 148 | (void)connectionHandle; |
vcoubard | 1057:93a9679d655c | 149 | (void)securityMode; |
vcoubard | 1057:93a9679d655c | 150 | |
vcoubard | 1057:93a9679d655c | 151 | return BLE_ERROR_NOT_IMPLEMENTED; |
vcoubard | 1057:93a9679d655c | 152 | } |
vcoubard | 1057:93a9679d655c | 153 | |
vcoubard | 1057:93a9679d655c | 154 | /** |
rgrover1 | 716:11b41f651697 | 155 | * Delete all peer device context and all related bonding information from |
rgrover1 | 716:11b41f651697 | 156 | * the database within the security manager. |
rgrover1 | 716:11b41f651697 | 157 | * |
rgrover1 | 716:11b41f651697 | 158 | * @retval BLE_ERROR_NONE On success, else an error code indicating reason for failure. |
vcoubard | 1048:efb29faf12fc | 159 | * @retval BLE_ERROR_INVALID_STATE If the API is called without module initialization or |
rgrover1 | 716:11b41f651697 | 160 | * application registration. |
rgrover1 | 716:11b41f651697 | 161 | */ |
rgrover1 | 716:11b41f651697 | 162 | virtual ble_error_t purgeAllBondingState(void) { |
vcoubard | 1048:efb29faf12fc | 163 | return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */ |
rgrover1 | 716:11b41f651697 | 164 | } |
rgrover1 | 716:11b41f651697 | 165 | |
rgrover1 | 716:11b41f651697 | 166 | /* Event callback handlers. */ |
rgrover1 | 716:11b41f651697 | 167 | public: |
rgrover1 | 716:11b41f651697 | 168 | /** |
vcoubard | 1088:709ebced28ab | 169 | * Setup a callback to be invoked to notify the user application that the |
vcoubard | 1088:709ebced28ab | 170 | * SecurityManager instance is about to shutdown (possibly as a result of a call |
vcoubard | 1088:709ebced28ab | 171 | * to BLE::shutdown()). |
vcoubard | 1088:709ebced28ab | 172 | * |
vcoubard | 1088:709ebced28ab | 173 | * @Note: It is possible to chain together multiple onShutdown callbacks |
vcoubard | 1088:709ebced28ab | 174 | * (potentially from different modules of an application) to be notified |
vcoubard | 1088:709ebced28ab | 175 | * before the SecurityManager is shutdown. |
vcoubard | 1088:709ebced28ab | 176 | * |
vcoubard | 1088:709ebced28ab | 177 | * @Note: It is also possible to set up a callback into a member function of |
vcoubard | 1088:709ebced28ab | 178 | * some object. |
vcoubard | 1088:709ebced28ab | 179 | * |
vcoubard | 1088:709ebced28ab | 180 | * @Note It is possible to unregister a callback using onShutdown().detach(callback) |
vcoubard | 1088:709ebced28ab | 181 | */ |
vcoubard | 1088:709ebced28ab | 182 | void onShutdown(const SecurityManagerShutdownCallback_t& callback) { |
vcoubard | 1088:709ebced28ab | 183 | shutdownCallChain.add(callback); |
vcoubard | 1088:709ebced28ab | 184 | } |
vcoubard | 1088:709ebced28ab | 185 | template <typename T> |
vcoubard | 1088:709ebced28ab | 186 | void onShutdown(T *objPtr, void (T::*memberPtr)(void)) { |
vcoubard | 1088:709ebced28ab | 187 | shutdownCallChain.add(objPtr, memberPtr); |
vcoubard | 1088:709ebced28ab | 188 | } |
vcoubard | 1088:709ebced28ab | 189 | |
vcoubard | 1088:709ebced28ab | 190 | /** |
vcoubard | 1088:709ebced28ab | 191 | * @brief provide access to the callchain of shutdown event callbacks |
vcoubard | 1088:709ebced28ab | 192 | * It is possible to register callbacks using onShutdown().add(callback); |
vcoubard | 1088:709ebced28ab | 193 | * It is possible to unregister callbacks using onShutdown().detach(callback) |
vcoubard | 1088:709ebced28ab | 194 | * @return The shutdown event callbacks chain |
vcoubard | 1088:709ebced28ab | 195 | */ |
vcoubard | 1088:709ebced28ab | 196 | SecurityManagerShutdownCallbackChain_t& onShutdown() { |
vcoubard | 1088:709ebced28ab | 197 | return shutdownCallChain; |
vcoubard | 1088:709ebced28ab | 198 | } |
vcoubard | 1088:709ebced28ab | 199 | |
vcoubard | 1088:709ebced28ab | 200 | /** |
vcoubard | 1048:efb29faf12fc | 201 | * To indicate that a security procedure for the link has started. |
rgrover1 | 716:11b41f651697 | 202 | */ |
rgrover1 | 716:11b41f651697 | 203 | virtual void onSecuritySetupInitiated(SecuritySetupInitiatedCallback_t callback) {securitySetupInitiatedCallback = callback;} |
rgrover1 | 716:11b41f651697 | 204 | |
rgrover1 | 716:11b41f651697 | 205 | /** |
vcoubard | 1048:efb29faf12fc | 206 | * To indicate that the security procedure for the link has completed. |
rgrover1 | 716:11b41f651697 | 207 | */ |
rgrover1 | 716:11b41f651697 | 208 | virtual void onSecuritySetupCompleted(SecuritySetupCompletedCallback_t callback) {securitySetupCompletedCallback = callback;} |
rgrover1 | 716:11b41f651697 | 209 | |
rgrover1 | 716:11b41f651697 | 210 | /** |
vcoubard | 1048:efb29faf12fc | 211 | * To indicate that the link with the peer is secured. For bonded devices, |
vcoubard | 1048:efb29faf12fc | 212 | * subsequent reconnections with a bonded peer will result only in this callback |
vcoubard | 1048:efb29faf12fc | 213 | * when the link is secured; setup procedures will not occur (unless the |
vcoubard | 1048:efb29faf12fc | 214 | * bonding information is either lost or deleted on either or both sides). |
rgrover1 | 716:11b41f651697 | 215 | */ |
rgrover1 | 716:11b41f651697 | 216 | virtual void onLinkSecured(LinkSecuredCallback_t callback) {linkSecuredCallback = callback;} |
rgrover1 | 716:11b41f651697 | 217 | |
rgrover1 | 716:11b41f651697 | 218 | /** |
rgrover1 | 716:11b41f651697 | 219 | * To indicate that device context is stored persistently. |
rgrover1 | 716:11b41f651697 | 220 | */ |
rgrover1 | 716:11b41f651697 | 221 | virtual void onSecurityContextStored(HandleSpecificEvent_t callback) {securityContextStoredCallback = callback;} |
rgrover1 | 716:11b41f651697 | 222 | |
rgrover1 | 716:11b41f651697 | 223 | /** |
rgrover1 | 716:11b41f651697 | 224 | * To set the callback for when the passkey needs to be displayed on a peripheral with DISPLAY capability. |
rgrover1 | 716:11b41f651697 | 225 | */ |
rgrover1 | 716:11b41f651697 | 226 | virtual void onPasskeyDisplay(PasskeyDisplayCallback_t callback) {passkeyDisplayCallback = callback;} |
rgrover1 | 716:11b41f651697 | 227 | |
rgrover1 | 716:11b41f651697 | 228 | /* Entry points for the underlying stack to report events back to the user. */ |
rgrover1 | 716:11b41f651697 | 229 | public: |
rgrover1 | 716:11b41f651697 | 230 | void processSecuritySetupInitiatedEvent(Gap::Handle_t handle, bool allowBonding, bool requireMITM, SecurityIOCapabilities_t iocaps) { |
rgrover1 | 716:11b41f651697 | 231 | if (securitySetupInitiatedCallback) { |
rgrover1 | 716:11b41f651697 | 232 | securitySetupInitiatedCallback(handle, allowBonding, requireMITM, iocaps); |
rgrover1 | 716:11b41f651697 | 233 | } |
rgrover1 | 716:11b41f651697 | 234 | } |
rgrover1 | 716:11b41f651697 | 235 | |
rgrover1 | 716:11b41f651697 | 236 | void processSecuritySetupCompletedEvent(Gap::Handle_t handle, SecurityCompletionStatus_t status) { |
rgrover1 | 716:11b41f651697 | 237 | if (securitySetupCompletedCallback) { |
rgrover1 | 716:11b41f651697 | 238 | securitySetupCompletedCallback(handle, status); |
rgrover1 | 716:11b41f651697 | 239 | } |
rgrover1 | 716:11b41f651697 | 240 | } |
rgrover1 | 716:11b41f651697 | 241 | |
rgrover1 | 716:11b41f651697 | 242 | void processLinkSecuredEvent(Gap::Handle_t handle, SecurityMode_t securityMode) { |
rgrover1 | 716:11b41f651697 | 243 | if (linkSecuredCallback) { |
rgrover1 | 716:11b41f651697 | 244 | linkSecuredCallback(handle, securityMode); |
rgrover1 | 716:11b41f651697 | 245 | } |
rgrover1 | 716:11b41f651697 | 246 | } |
rgrover1 | 716:11b41f651697 | 247 | |
rgrover1 | 716:11b41f651697 | 248 | void processSecurityContextStoredEvent(Gap::Handle_t handle) { |
rgrover1 | 716:11b41f651697 | 249 | if (securityContextStoredCallback) { |
rgrover1 | 716:11b41f651697 | 250 | securityContextStoredCallback(handle); |
rgrover1 | 716:11b41f651697 | 251 | } |
rgrover1 | 716:11b41f651697 | 252 | } |
rgrover1 | 716:11b41f651697 | 253 | |
rgrover1 | 716:11b41f651697 | 254 | void processPasskeyDisplayEvent(Gap::Handle_t handle, const Passkey_t passkey) { |
rgrover1 | 716:11b41f651697 | 255 | if (passkeyDisplayCallback) { |
rgrover1 | 716:11b41f651697 | 256 | passkeyDisplayCallback(handle, passkey); |
rgrover1 | 716:11b41f651697 | 257 | } |
rgrover1 | 716:11b41f651697 | 258 | } |
rgrover1 | 716:11b41f651697 | 259 | |
rgrover1 | 716:11b41f651697 | 260 | protected: |
rgrover1 | 716:11b41f651697 | 261 | SecurityManager() : |
rgrover1 | 716:11b41f651697 | 262 | securitySetupInitiatedCallback(), |
rgrover1 | 716:11b41f651697 | 263 | securitySetupCompletedCallback(), |
rgrover1 | 716:11b41f651697 | 264 | linkSecuredCallback(), |
rgrover1 | 716:11b41f651697 | 265 | securityContextStoredCallback(), |
rgrover1 | 716:11b41f651697 | 266 | passkeyDisplayCallback() { |
rgrover1 | 716:11b41f651697 | 267 | /* empty */ |
rgrover1 | 716:11b41f651697 | 268 | } |
rgrover1 | 716:11b41f651697 | 269 | |
vcoubard | 1082:127667021827 | 270 | public: |
vcoubard | 1082:127667021827 | 271 | /** |
vcoubard | 1088:709ebced28ab | 272 | * Notify all registered onShutdown callbacks that the SecurityManager is |
vcoubard | 1088:709ebced28ab | 273 | * about to be shutdown and clear all SecurityManager state of the |
vcoubard | 1088:709ebced28ab | 274 | * associated object. |
vcoubard | 1082:127667021827 | 275 | * |
vcoubard | 1082:127667021827 | 276 | * This function is meant to be overridden in the platform-specific |
vcoubard | 1082:127667021827 | 277 | * sub-class. Nevertheless, the sub-class is only expected to reset its |
vcoubard | 1082:127667021827 | 278 | * state and not the data held in SecurityManager members. This shall be |
vcoubard | 1082:127667021827 | 279 | * achieved by a call to SecurityManager::reset() from the sub-class' |
vcoubard | 1082:127667021827 | 280 | * reset() implementation. |
vcoubard | 1082:127667021827 | 281 | * |
vcoubard | 1082:127667021827 | 282 | * @return BLE_ERROR_NONE on success. |
vcoubard | 1082:127667021827 | 283 | */ |
vcoubard | 1082:127667021827 | 284 | virtual ble_error_t reset(void) { |
vcoubard | 1088:709ebced28ab | 285 | /* Notify that the instance is about to shutdown */ |
vcoubard | 1088:709ebced28ab | 286 | shutdownCallChain.call(this); |
vcoubard | 1088:709ebced28ab | 287 | |
vcoubard | 1082:127667021827 | 288 | securitySetupInitiatedCallback = NULL; |
vcoubard | 1082:127667021827 | 289 | securitySetupCompletedCallback = NULL; |
vcoubard | 1084:40c1e518d6de | 290 | linkSecuredCallback = NULL; |
vcoubard | 1084:40c1e518d6de | 291 | securityContextStoredCallback = NULL; |
vcoubard | 1084:40c1e518d6de | 292 | passkeyDisplayCallback = NULL; |
vcoubard | 1082:127667021827 | 293 | |
vcoubard | 1082:127667021827 | 294 | return BLE_ERROR_NONE; |
vcoubard | 1082:127667021827 | 295 | } |
vcoubard | 1082:127667021827 | 296 | |
rgrover1 | 716:11b41f651697 | 297 | protected: |
rgrover1 | 716:11b41f651697 | 298 | SecuritySetupInitiatedCallback_t securitySetupInitiatedCallback; |
rgrover1 | 716:11b41f651697 | 299 | SecuritySetupCompletedCallback_t securitySetupCompletedCallback; |
rgrover1 | 716:11b41f651697 | 300 | LinkSecuredCallback_t linkSecuredCallback; |
rgrover1 | 716:11b41f651697 | 301 | HandleSpecificEvent_t securityContextStoredCallback; |
rgrover1 | 716:11b41f651697 | 302 | PasskeyDisplayCallback_t passkeyDisplayCallback; |
vcoubard | 1088:709ebced28ab | 303 | |
vcoubard | 1088:709ebced28ab | 304 | private: |
vcoubard | 1088:709ebced28ab | 305 | SecurityManagerShutdownCallbackChain_t shutdownCallChain; |
rgrover1 | 716:11b41f651697 | 306 | }; |
rgrover1 | 716:11b41f651697 | 307 | |
rgrover1 | 716:11b41f651697 | 308 | #endif /*__SECURITY_MANAGER_H__*/ |