fork
Fork of nRF51822 by
nRF51SecurityManager.h@362:6fa0d4d555f6, 2015-07-02 (annotated)
- Committer:
- rgrover1
- Date:
- Thu Jul 02 09:08:44 2015 +0100
- Revision:
- 362:6fa0d4d555f6
Synchronized with git rev 2716309c
Author: Rohit Grover
Release 0.4.0
=============
This is a major release which introduces the GATT Client functionality. It
aligns with release 0.4.0 of BLE_API.
Enhancements
~~~~~~~~~~~~
* Introduce GattClient. This includes functionality for service-discovery,
connections, and attribute-reads and writes. You'll find a demo program for
LEDBlinker on the mbed.org Bluetooth team page to use the new APIs. Some of
the GATT client functionality hasn't been implemented yet, but the APIs have
been added.
* We've added an implementation for the abstract base class for
SecurityManager. All security related APIs have been moved into that.
* There has been a major cleanup of APIs under BLE. APIs have now been
categorized as belonging to Gap, GattServer, GattClient, or SecurityManager.
There are accessors to get references for Gap, GattServer, GattClient, and
SecurityManager. A former call to ble.setAddress(...) is now expected to be
achieved with ble.gap().setAddress(...).
* We've cleaned up our APIs, and this has resulted in dropping some APIs like
BLE::reset().
* We've also dropped GattServer::initializeGattDatabase(). THis was added at
some point to support controllers where a commit point was needed to
indicate when the application had finished constructing the GATT database.
This API would get called internally before Gap::startAdvertising(). We now
expect the underlying port to do the equivalent of initializeGattDatabase()
implicitly upon Gap::startAdvertising().
* We've added a version of Gap::disconnect() which takes a connection handle.
The previous API (which did not take a connection handle) has been
deprecated; it will still work for situations where there's only a single
active connection. We hold on to that API to allow existing code to migrate
to the new API.
Bugfixes
~~~~~~~~
* None.
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
rgrover1 | 362:6fa0d4d555f6 | 1 | /* mbed Microcontroller Library |
rgrover1 | 362:6fa0d4d555f6 | 2 | * Copyright (c) 2006-2013 ARM Limited |
rgrover1 | 362:6fa0d4d555f6 | 3 | * |
rgrover1 | 362:6fa0d4d555f6 | 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
rgrover1 | 362:6fa0d4d555f6 | 5 | * you may not use this file except in compliance with the License. |
rgrover1 | 362:6fa0d4d555f6 | 6 | * You may obtain a copy of the License at |
rgrover1 | 362:6fa0d4d555f6 | 7 | * |
rgrover1 | 362:6fa0d4d555f6 | 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
rgrover1 | 362:6fa0d4d555f6 | 9 | * |
rgrover1 | 362:6fa0d4d555f6 | 10 | * Unless required by applicable law or agreed to in writing, software |
rgrover1 | 362:6fa0d4d555f6 | 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
rgrover1 | 362:6fa0d4d555f6 | 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
rgrover1 | 362:6fa0d4d555f6 | 13 | * See the License for the specific language governing permissions and |
rgrover1 | 362:6fa0d4d555f6 | 14 | * limitations under the License. |
rgrover1 | 362:6fa0d4d555f6 | 15 | */ |
rgrover1 | 362:6fa0d4d555f6 | 16 | |
rgrover1 | 362:6fa0d4d555f6 | 17 | #ifndef __NRF51822_SECURITY_MANAGER_H__ |
rgrover1 | 362:6fa0d4d555f6 | 18 | #define __NRF51822_SECURITY_MANAGER_H__ |
rgrover1 | 362:6fa0d4d555f6 | 19 | |
rgrover1 | 362:6fa0d4d555f6 | 20 | #include <stddef.h> |
rgrover1 | 362:6fa0d4d555f6 | 21 | |
rgrover1 | 362:6fa0d4d555f6 | 22 | #include "ble/SecurityManager.h" |
rgrover1 | 362:6fa0d4d555f6 | 23 | #include "btle_security.h" |
rgrover1 | 362:6fa0d4d555f6 | 24 | |
rgrover1 | 362:6fa0d4d555f6 | 25 | class nRF51SecurityManager : public SecurityManager |
rgrover1 | 362:6fa0d4d555f6 | 26 | { |
rgrover1 | 362:6fa0d4d555f6 | 27 | public: |
rgrover1 | 362:6fa0d4d555f6 | 28 | static nRF51SecurityManager &getInstance(); |
rgrover1 | 362:6fa0d4d555f6 | 29 | |
rgrover1 | 362:6fa0d4d555f6 | 30 | /* Functions that must be implemented from SecurityManager */ |
rgrover1 | 362:6fa0d4d555f6 | 31 | virtual ble_error_t init(bool enableBonding, |
rgrover1 | 362:6fa0d4d555f6 | 32 | bool requireMITM, |
rgrover1 | 362:6fa0d4d555f6 | 33 | SecurityIOCapabilities_t iocaps, |
rgrover1 | 362:6fa0d4d555f6 | 34 | const Passkey_t passkey) { |
rgrover1 | 362:6fa0d4d555f6 | 35 | return btle_initializeSecurity(enableBonding, requireMITM, iocaps, passkey); |
rgrover1 | 362:6fa0d4d555f6 | 36 | } |
rgrover1 | 362:6fa0d4d555f6 | 37 | |
rgrover1 | 362:6fa0d4d555f6 | 38 | virtual ble_error_t getLinkSecurity(Gap::Handle_t connectionHandle, LinkSecurityStatus_t *securityStatusP) { |
rgrover1 | 362:6fa0d4d555f6 | 39 | return btle_getLinkSecurity(connectionHandle, securityStatusP); |
rgrover1 | 362:6fa0d4d555f6 | 40 | } |
rgrover1 | 362:6fa0d4d555f6 | 41 | |
rgrover1 | 362:6fa0d4d555f6 | 42 | virtual ble_error_t purgeAllBondingState(void) { |
rgrover1 | 362:6fa0d4d555f6 | 43 | return btle_purgeAllBondingState(); |
rgrover1 | 362:6fa0d4d555f6 | 44 | } |
rgrover1 | 362:6fa0d4d555f6 | 45 | |
rgrover1 | 362:6fa0d4d555f6 | 46 | public: |
rgrover1 | 362:6fa0d4d555f6 | 47 | nRF51SecurityManager() { |
rgrover1 | 362:6fa0d4d555f6 | 48 | /* empty */ |
rgrover1 | 362:6fa0d4d555f6 | 49 | } |
rgrover1 | 362:6fa0d4d555f6 | 50 | |
rgrover1 | 362:6fa0d4d555f6 | 51 | private: |
rgrover1 | 362:6fa0d4d555f6 | 52 | nRF51SecurityManager(const nRF51SecurityManager &); |
rgrover1 | 362:6fa0d4d555f6 | 53 | const nRF51SecurityManager& operator=(const nRF51SecurityManager &); |
rgrover1 | 362:6fa0d4d555f6 | 54 | }; |
rgrover1 | 362:6fa0d4d555f6 | 55 | |
rgrover1 | 362:6fa0d4d555f6 | 56 | #endif // ifndef __NRF51822_SECURITY_MANAGER_H__ |