NUCLEO-F401RE + BlueNRG shield client test (TI Sensortag reading)
bluenrg/SimpleBlueNRG_HCI/includes/sm.h@0:aa1e012ec210, 2014-08-16 (annotated)
- Committer:
- ostapsky
- Date:
- Sat Aug 16 11:00:04 2014 +0000
- Revision:
- 0:aa1e012ec210
CLIENT mode first revision
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
ostapsky | 0:aa1e012ec210 | 1 | /******************** (C) COPYRIGHT 2012 STMicroelectronics ******************** |
ostapsky | 0:aa1e012ec210 | 2 | * File Name : sm.h |
ostapsky | 0:aa1e012ec210 | 3 | * Author : AMS - HEA&RF BU |
ostapsky | 0:aa1e012ec210 | 4 | * Version : V1.0.0 |
ostapsky | 0:aa1e012ec210 | 5 | * Date : 19-July-2012 |
ostapsky | 0:aa1e012ec210 | 6 | * Description : Header file for BlueNRG's security manager. |
ostapsky | 0:aa1e012ec210 | 7 | ******************************************************************************** |
ostapsky | 0:aa1e012ec210 | 8 | * THE PRESENT FIRMWARE WHICH IS FOR GUIDANCE ONLY AIMS AT PROVIDING CUSTOMERS |
ostapsky | 0:aa1e012ec210 | 9 | * WITH CODING INFORMATION REGARDING THEIR PRODUCTS IN ORDER FOR THEM TO SAVE TIME. |
ostapsky | 0:aa1e012ec210 | 10 | * AS A RESULT, STMICROELECTRONICS SHALL NOT BE HELD LIABLE FOR ANY DIRECT, |
ostapsky | 0:aa1e012ec210 | 11 | * INDIRECT OR CONSEQUENTIAL DAMAGES WITH RESPECT TO ANY CLAIMS ARISING FROM THE |
ostapsky | 0:aa1e012ec210 | 12 | * CONTENT OF SUCH FIRMWARE AND/OR THE USE MADE BY CUSTOMERS OF THE CODING |
ostapsky | 0:aa1e012ec210 | 13 | * INFORMATION CONTAINED HEREIN IN CONNECTION WITH THEIR PRODUCTS. |
ostapsky | 0:aa1e012ec210 | 14 | *******************************************************************************/ |
ostapsky | 0:aa1e012ec210 | 15 | |
ostapsky | 0:aa1e012ec210 | 16 | #ifndef __SM_H__ |
ostapsky | 0:aa1e012ec210 | 17 | #define __SM_H__ |
ostapsky | 0:aa1e012ec210 | 18 | |
ostapsky | 0:aa1e012ec210 | 19 | /****************************************************************************** |
ostapsky | 0:aa1e012ec210 | 20 | * Macros |
ostapsky | 0:aa1e012ec210 | 21 | *****************************************************************************/ |
ostapsky | 0:aa1e012ec210 | 22 | |
ostapsky | 0:aa1e012ec210 | 23 | /* IO capabilities */ |
ostapsky | 0:aa1e012ec210 | 24 | typedef tHalUint8 tSMIoCapability; |
ostapsky | 0:aa1e012ec210 | 25 | #define IO_CAP_DISPLAY_ONLY (0x00) |
ostapsky | 0:aa1e012ec210 | 26 | #define IO_CAP_DISPLAY_YES_NO (0x01) |
ostapsky | 0:aa1e012ec210 | 27 | #define KEYBOARD_ONLY (0x02) |
ostapsky | 0:aa1e012ec210 | 28 | #define IO_CAP_NO_INPUT_NO_OUTPUT (0x03) |
ostapsky | 0:aa1e012ec210 | 29 | #define IO_CAP_KEYBOARD_DISPLAY (0x04) |
ostapsky | 0:aa1e012ec210 | 30 | |
ostapsky | 0:aa1e012ec210 | 31 | /* authentication requirements */ |
ostapsky | 0:aa1e012ec210 | 32 | typedef tHalUint8 tSMBondingMode; |
ostapsky | 0:aa1e012ec210 | 33 | #define BONDING (0x01) |
ostapsky | 0:aa1e012ec210 | 34 | #define NO_BONDING (0x00) |
ostapsky | 0:aa1e012ec210 | 35 | |
ostapsky | 0:aa1e012ec210 | 36 | typedef tHalUint8 tSMMIMTMode; |
ostapsky | 0:aa1e012ec210 | 37 | #define MITM_PROTECTION_NOT_REQUIRED (0x00) |
ostapsky | 0:aa1e012ec210 | 38 | #define MITM_PROTECTION_REQUIRED (0x01) |
ostapsky | 0:aa1e012ec210 | 39 | |
ostapsky | 0:aa1e012ec210 | 40 | #define OOB_AUTH_DATA_ABSENT (0x00) |
ostapsky | 0:aa1e012ec210 | 41 | #define OOB_AUTH_DATA_PRESENT (0x01) |
ostapsky | 0:aa1e012ec210 | 42 | |
ostapsky | 0:aa1e012ec210 | 43 | #define AUTHORIZATION_NOT_REQUIRED (0x00) |
ostapsky | 0:aa1e012ec210 | 44 | #define AUTHORIZATION_REQUIRED (0x01) |
ostapsky | 0:aa1e012ec210 | 45 | |
ostapsky | 0:aa1e012ec210 | 46 | /* valid authorization responses */ |
ostapsky | 0:aa1e012ec210 | 47 | #define CONNECTION_AUTHORIZED (0x01) |
ostapsky | 0:aa1e012ec210 | 48 | #define CONNECTION_REJECTED (0x02) |
ostapsky | 0:aa1e012ec210 | 49 | |
ostapsky | 0:aa1e012ec210 | 50 | #define USE_FIXED_PIN_FOR_PAIRING (0x0) |
ostapsky | 0:aa1e012ec210 | 51 | #define DONOT_USE_FIXED_PIN_FOR_PAIRING (0x01) |
ostapsky | 0:aa1e012ec210 | 52 | #define PASSKEY_ENTERED (0x02) |
ostapsky | 0:aa1e012ec210 | 53 | |
ostapsky | 0:aa1e012ec210 | 54 | /* link security status */ |
ostapsky | 0:aa1e012ec210 | 55 | #define SM_LINK_AUTHENTICATED (0x01) |
ostapsky | 0:aa1e012ec210 | 56 | #define SM_LINK_AUTHORIZED (0x02) |
ostapsky | 0:aa1e012ec210 | 57 | #define SM_LINK_ENCRYPTED (0x04) |
ostapsky | 0:aa1e012ec210 | 58 | |
ostapsky | 0:aa1e012ec210 | 59 | /* SMP pairing failed reason codes */ |
ostapsky | 0:aa1e012ec210 | 60 | #define PASSKEY_ENTRY_FAILED (0x01) |
ostapsky | 0:aa1e012ec210 | 61 | #define OOB_NOT_AVAILABLE (0x02) |
ostapsky | 0:aa1e012ec210 | 62 | #define AUTH_REQ_CANNOT_BE_MET (0x03) |
ostapsky | 0:aa1e012ec210 | 63 | #define CONFIRM_VALUE_FAILED (0x04) |
ostapsky | 0:aa1e012ec210 | 64 | #define PAIRING_NOT_SUPPORTED (0x05) |
ostapsky | 0:aa1e012ec210 | 65 | #define INSUFF_ENCRYPTION_KEY_SIZE (0x06) |
ostapsky | 0:aa1e012ec210 | 66 | #define CMD_NOT_SUPPORTED (0x07) |
ostapsky | 0:aa1e012ec210 | 67 | #define UNSPECIFIED_REASON (0x08) |
ostapsky | 0:aa1e012ec210 | 68 | #define VERY_EARLY_NEXT_ATTEMPT (0x09) |
ostapsky | 0:aa1e012ec210 | 69 | #define SM_INVALID_PARAMS (0x0A) |
ostapsky | 0:aa1e012ec210 | 70 | |
ostapsky | 0:aa1e012ec210 | 71 | |
ostapsky | 0:aa1e012ec210 | 72 | /* error codes to be sent with the pairing complete event */ |
ostapsky | 0:aa1e012ec210 | 73 | #define SM_PAIRING_TIMEOUT (0x01) |
ostapsky | 0:aa1e012ec210 | 74 | #define SM_PAIRING_FAILED (0x02) |
ostapsky | 0:aa1e012ec210 | 75 | |
ostapsky | 0:aa1e012ec210 | 76 | |
ostapsky | 0:aa1e012ec210 | 77 | #endif /* __SM_H__ */ |
ostapsky | 0:aa1e012ec210 | 78 |