BLE
Fork of BLE_API by
ble/SecurityManager.h@1091:148d8b9b56a5, 2016-01-11 (annotated)
- Committer:
- vcoubard
- Date:
- Mon Jan 11 08:51:50 2016 +0000
- Revision:
- 1091:148d8b9b56a5
- Parent:
- 1090:8e810a8e083e
- Child:
- 1127:08db6549adef
Synchronized with git rev 0024b78a
Author: Andres Amaya Garcia
Clear shutdown callchain after exec callbacks
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
rgrover1 | 717:11b41f651697 | 1 | /* mbed Microcontroller Library |
rgrover1 | 717:11b41f651697 | 2 | * Copyright (c) 2006-2015 ARM Limited |
rgrover1 | 717:11b41f651697 | 3 | * |
rgrover1 | 717:11b41f651697 | 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
rgrover1 | 717:11b41f651697 | 5 | * you may not use this file except in compliance with the License. |
rgrover1 | 717:11b41f651697 | 6 | * You may obtain a copy of the License at |
rgrover1 | 717:11b41f651697 | 7 | * |
rgrover1 | 717:11b41f651697 | 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
rgrover1 | 717:11b41f651697 | 9 | * |
rgrover1 | 717:11b41f651697 | 10 | * Unless required by applicable law or agreed to in writing, software |
rgrover1 | 717:11b41f651697 | 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
rgrover1 | 717:11b41f651697 | 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
rgrover1 | 717:11b41f651697 | 13 | * See the License for the specific language governing permissions and |
rgrover1 | 717:11b41f651697 | 14 | * limitations under the License. |
rgrover1 | 717:11b41f651697 | 15 | */ |
rgrover1 | 717:11b41f651697 | 16 | |
rgrover1 | 717:11b41f651697 | 17 | #ifndef __SECURITY_MANAGER_H__ |
rgrover1 | 717:11b41f651697 | 18 | #define __SECURITY_MANAGER_H__ |
rgrover1 | 717:11b41f651697 | 19 | |
rgrover1 | 717:11b41f651697 | 20 | #include <stdint.h> |
rgrover1 | 717:11b41f651697 | 21 | |
rgrover1 | 717:11b41f651697 | 22 | #include "Gap.h" |
vcoubard | 1091:148d8b9b56a5 | 23 | #include "CallChainOfFunctionPointersWithContext.h" |
rgrover1 | 717:11b41f651697 | 24 | |
rgrover1 | 717:11b41f651697 | 25 | class SecurityManager { |
rgrover1 | 717:11b41f651697 | 26 | public: |
rgrover1 | 717:11b41f651697 | 27 | enum SecurityMode_t { |
rgrover1 | 717:11b41f651697 | 28 | SECURITY_MODE_NO_ACCESS, |
vcoubard | 1049:efb29faf12fc | 29 | SECURITY_MODE_ENCRYPTION_OPEN_LINK, /**< Require no protection, open link. */ |
vcoubard | 1049:efb29faf12fc | 30 | SECURITY_MODE_ENCRYPTION_NO_MITM, /**< Require encryption, but no MITM protection. */ |
vcoubard | 1049:efb29faf12fc | 31 | SECURITY_MODE_ENCRYPTION_WITH_MITM, /**< Require encryption and MITM protection. */ |
vcoubard | 1049:efb29faf12fc | 32 | SECURITY_MODE_SIGNED_NO_MITM, /**< Require signing or encryption, but no MITM protection. */ |
vcoubard | 1049:efb29faf12fc | 33 | SECURITY_MODE_SIGNED_WITH_MITM, /**< Require signing or encryption, and MITM protection. */ |
rgrover1 | 717:11b41f651697 | 34 | }; |
rgrover1 | 717:11b41f651697 | 35 | |
rgrover1 | 717:11b41f651697 | 36 | /** |
vcoubard | 1049:efb29faf12fc | 37 | * @brief Defines possible security status or states. |
rgrover1 | 717:11b41f651697 | 38 | * |
vcoubard | 1049:efb29faf12fc | 39 | * @details Defines possible security status or states of a link when requested by getLinkSecurity(). |
rgrover1 | 717:11b41f651697 | 40 | */ |
rgrover1 | 717:11b41f651697 | 41 | enum LinkSecurityStatus_t { |
rgrover1 | 717:11b41f651697 | 42 | NOT_ENCRYPTED, /**< The link is not secured. */ |
rgrover1 | 717:11b41f651697 | 43 | ENCRYPTION_IN_PROGRESS, /**< Link security is being established.*/ |
rgrover1 | 717:11b41f651697 | 44 | ENCRYPTED /**< The link is secure.*/ |
rgrover1 | 717:11b41f651697 | 45 | }; |
rgrover1 | 717:11b41f651697 | 46 | |
rgrover1 | 717:11b41f651697 | 47 | enum SecurityIOCapabilities_t { |
vcoubard | 1049:efb29faf12fc | 48 | IO_CAPS_DISPLAY_ONLY = 0x00, /**< Display only. */ |
vcoubard | 1049:efb29faf12fc | 49 | IO_CAPS_DISPLAY_YESNO = 0x01, /**< Display and yes/no entry. */ |
vcoubard | 1049:efb29faf12fc | 50 | IO_CAPS_KEYBOARD_ONLY = 0x02, /**< Keyboard only. */ |
rgrover1 | 717:11b41f651697 | 51 | IO_CAPS_NONE = 0x03, /**< No I/O capabilities. */ |
vcoubard | 1049:efb29faf12fc | 52 | IO_CAPS_KEYBOARD_DISPLAY = 0x04, /**< Keyboard and display. */ |
rgrover1 | 717:11b41f651697 | 53 | }; |
rgrover1 | 717:11b41f651697 | 54 | |
rgrover1 | 717:11b41f651697 | 55 | enum SecurityCompletionStatus_t { |
rgrover1 | 717:11b41f651697 | 56 | SEC_STATUS_SUCCESS = 0x00, /**< Procedure completed with success. */ |
rgrover1 | 717:11b41f651697 | 57 | SEC_STATUS_TIMEOUT = 0x01, /**< Procedure timed out. */ |
rgrover1 | 717:11b41f651697 | 58 | SEC_STATUS_PDU_INVALID = 0x02, /**< Invalid PDU received. */ |
rgrover1 | 717:11b41f651697 | 59 | SEC_STATUS_PASSKEY_ENTRY_FAILED = 0x81, /**< Passkey entry failed (user canceled or other). */ |
rgrover1 | 717:11b41f651697 | 60 | SEC_STATUS_OOB_NOT_AVAILABLE = 0x82, /**< Out of Band Key not available. */ |
rgrover1 | 717:11b41f651697 | 61 | SEC_STATUS_AUTH_REQ = 0x83, /**< Authentication requirements not met. */ |
rgrover1 | 717:11b41f651697 | 62 | SEC_STATUS_CONFIRM_VALUE = 0x84, /**< Confirm value failed. */ |
rgrover1 | 717:11b41f651697 | 63 | SEC_STATUS_PAIRING_NOT_SUPP = 0x85, /**< Pairing not supported. */ |
rgrover1 | 717:11b41f651697 | 64 | SEC_STATUS_ENC_KEY_SIZE = 0x86, /**< Encryption key size. */ |
rgrover1 | 717:11b41f651697 | 65 | SEC_STATUS_SMP_CMD_UNSUPPORTED = 0x87, /**< Unsupported SMP command. */ |
rgrover1 | 717:11b41f651697 | 66 | SEC_STATUS_UNSPECIFIED = 0x88, /**< Unspecified reason. */ |
rgrover1 | 717:11b41f651697 | 67 | SEC_STATUS_REPEATED_ATTEMPTS = 0x89, /**< Too little time elapsed since last attempt. */ |
rgrover1 | 717:11b41f651697 | 68 | SEC_STATUS_INVALID_PARAMS = 0x8A, /**< Invalid parameters. */ |
rgrover1 | 717:11b41f651697 | 69 | }; |
rgrover1 | 717:11b41f651697 | 70 | |
rgrover1 | 717:11b41f651697 | 71 | /** |
rgrover1 | 717:11b41f651697 | 72 | * Declaration of type containing a passkey to be used during pairing. This |
rgrover1 | 717:11b41f651697 | 73 | * is passed into initializeSecurity() to specify a pre-programmed passkey |
rgrover1 | 717:11b41f651697 | 74 | * for authentication instead of generating a random one. |
rgrover1 | 717:11b41f651697 | 75 | */ |
rgrover1 | 717:11b41f651697 | 76 | static const unsigned PASSKEY_LEN = 6; |
rgrover1 | 717:11b41f651697 | 77 | typedef uint8_t Passkey_t[PASSKEY_LEN]; /**< 6-digit passkey in ASCII ('0'-'9' digits only). */ |
rgrover1 | 717:11b41f651697 | 78 | |
rgrover1 | 717:11b41f651697 | 79 | public: |
rgrover1 | 717:11b41f651697 | 80 | typedef void (*HandleSpecificEvent_t)(Gap::Handle_t handle); |
rgrover1 | 717:11b41f651697 | 81 | typedef void (*SecuritySetupInitiatedCallback_t)(Gap::Handle_t, bool allowBonding, bool requireMITM, SecurityIOCapabilities_t iocaps); |
rgrover1 | 717:11b41f651697 | 82 | typedef void (*SecuritySetupCompletedCallback_t)(Gap::Handle_t, SecurityCompletionStatus_t status); |
rgrover1 | 717:11b41f651697 | 83 | typedef void (*LinkSecuredCallback_t)(Gap::Handle_t handle, SecurityMode_t securityMode); |
rgrover1 | 717:11b41f651697 | 84 | typedef void (*PasskeyDisplayCallback_t)(Gap::Handle_t handle, const Passkey_t passkey); |
rgrover1 | 717:11b41f651697 | 85 | |
vcoubard | 1091:148d8b9b56a5 | 86 | typedef FunctionPointerWithContext<const SecurityManager *> SecurityManagerShutdownCallback_t; |
vcoubard | 1091:148d8b9b56a5 | 87 | typedef CallChainOfFunctionPointersWithContext<const SecurityManager *> SecurityManagerShutdownCallbackChain_t; |
vcoubard | 1091:148d8b9b56a5 | 88 | |
rgrover1 | 717:11b41f651697 | 89 | /* |
rgrover1 | 717:11b41f651697 | 90 | * The following functions are meant to be overridden in the platform-specific sub-class. |
rgrover1 | 717:11b41f651697 | 91 | */ |
rgrover1 | 717:11b41f651697 | 92 | public: |
rgrover1 | 717:11b41f651697 | 93 | /** |
rgrover1 | 717:11b41f651697 | 94 | * Enable the BLE stack's Security Manager. The Security Manager implements |
rgrover1 | 717:11b41f651697 | 95 | * the actual cryptographic algorithms and protocol exchanges that allow two |
rgrover1 | 717:11b41f651697 | 96 | * devices to securely exchange data and privately detect each other. |
rgrover1 | 717:11b41f651697 | 97 | * Calling this API is a prerequisite for encryption and pairing (bonding). |
rgrover1 | 717:11b41f651697 | 98 | * |
rgrover1 | 717:11b41f651697 | 99 | * @param[in] enableBonding Allow for bonding. |
rgrover1 | 717:11b41f651697 | 100 | * @param[in] requireMITM Require protection for man-in-the-middle attacks. |
vcoubard | 1049:efb29faf12fc | 101 | * @param[in] iocaps To specify the I/O capabilities of this peripheral, |
vcoubard | 1049:efb29faf12fc | 102 | * such as availability of a display or keyboard, to |
rgrover1 | 717:11b41f651697 | 103 | * support out-of-band exchanges of security data. |
rgrover1 | 717:11b41f651697 | 104 | * @param[in] passkey To specify a static passkey. |
rgrover1 | 717:11b41f651697 | 105 | * |
rgrover1 | 717:11b41f651697 | 106 | * @return BLE_ERROR_NONE on success. |
rgrover1 | 717:11b41f651697 | 107 | */ |
rgrover1 | 717:11b41f651697 | 108 | virtual ble_error_t init(bool enableBonding = true, |
rgrover1 | 717:11b41f651697 | 109 | bool requireMITM = true, |
rgrover1 | 717:11b41f651697 | 110 | SecurityIOCapabilities_t iocaps = IO_CAPS_NONE, |
rgrover1 | 717:11b41f651697 | 111 | const Passkey_t passkey = NULL) { |
vcoubard | 1049:efb29faf12fc | 112 | /* Avoid compiler warnings about unused variables. */ |
rgrover1 | 735:4872b70437ce | 113 | (void)enableBonding; |
rgrover1 | 735:4872b70437ce | 114 | (void)requireMITM; |
rgrover1 | 735:4872b70437ce | 115 | (void)iocaps; |
rgrover1 | 735:4872b70437ce | 116 | (void)passkey; |
rgrover1 | 735:4872b70437ce | 117 | |
vcoubard | 1049:efb29faf12fc | 118 | return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */ |
rgrover1 | 717:11b41f651697 | 119 | } |
rgrover1 | 717:11b41f651697 | 120 | |
rgrover1 | 717:11b41f651697 | 121 | /** |
rgrover1 | 717:11b41f651697 | 122 | * Get the security status of a connection. |
rgrover1 | 717:11b41f651697 | 123 | * |
rgrover1 | 717:11b41f651697 | 124 | * @param[in] connectionHandle Handle to identify the connection. |
vcoubard | 1049:efb29faf12fc | 125 | * @param[out] securityStatusP Security status. |
rgrover1 | 717:11b41f651697 | 126 | * |
vcoubard | 1058:93a9679d655c | 127 | * @return BLE_ERROR_NONE or appropriate error code indicating the failure reason. |
rgrover1 | 717:11b41f651697 | 128 | */ |
rgrover1 | 717:11b41f651697 | 129 | virtual ble_error_t getLinkSecurity(Gap::Handle_t connectionHandle, LinkSecurityStatus_t *securityStatusP) { |
vcoubard | 1049:efb29faf12fc | 130 | /* Avoid compiler warnings about unused variables. */ |
rgrover1 | 735:4872b70437ce | 131 | (void)connectionHandle; |
rgrover1 | 735:4872b70437ce | 132 | (void)securityStatusP; |
rgrover1 | 735:4872b70437ce | 133 | |
vcoubard | 1049:efb29faf12fc | 134 | return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */ |
rgrover1 | 717:11b41f651697 | 135 | } |
rgrover1 | 717:11b41f651697 | 136 | |
rgrover1 | 717:11b41f651697 | 137 | /** |
vcoubard | 1058:93a9679d655c | 138 | * Set the security mode on a connection. Useful for elevating the security mode |
vcoubard | 1058:93a9679d655c | 139 | * once certain conditions are met, e.g., a particular service is found. |
vcoubard | 1058:93a9679d655c | 140 | * |
vcoubard | 1058:93a9679d655c | 141 | * @param[in] connectionHandle Handle to identify the connection. |
vcoubard | 1058:93a9679d655c | 142 | * @param[in] securityMode Requested security mode. |
vcoubard | 1058:93a9679d655c | 143 | * |
vcoubard | 1058:93a9679d655c | 144 | * @return BLE_ERROR_NONE or appropriate error code indicating the failure reason. |
vcoubard | 1058:93a9679d655c | 145 | */ |
vcoubard | 1058:93a9679d655c | 146 | virtual ble_error_t setLinkSecurity(Gap::Handle_t connectionHandle, SecurityMode_t securityMode) { |
vcoubard | 1058:93a9679d655c | 147 | /* Avoid compiler warnings about unused variables. */ |
vcoubard | 1058:93a9679d655c | 148 | (void)connectionHandle; |
vcoubard | 1058:93a9679d655c | 149 | (void)securityMode; |
vcoubard | 1058:93a9679d655c | 150 | |
vcoubard | 1058:93a9679d655c | 151 | return BLE_ERROR_NOT_IMPLEMENTED; |
vcoubard | 1058:93a9679d655c | 152 | } |
vcoubard | 1058:93a9679d655c | 153 | |
vcoubard | 1058:93a9679d655c | 154 | /** |
rgrover1 | 717:11b41f651697 | 155 | * Delete all peer device context and all related bonding information from |
rgrover1 | 717:11b41f651697 | 156 | * the database within the security manager. |
rgrover1 | 717:11b41f651697 | 157 | * |
rgrover1 | 717:11b41f651697 | 158 | * @retval BLE_ERROR_NONE On success, else an error code indicating reason for failure. |
vcoubard | 1049:efb29faf12fc | 159 | * @retval BLE_ERROR_INVALID_STATE If the API is called without module initialization or |
rgrover1 | 717:11b41f651697 | 160 | * application registration. |
rgrover1 | 717:11b41f651697 | 161 | */ |
rgrover1 | 717:11b41f651697 | 162 | virtual ble_error_t purgeAllBondingState(void) { |
vcoubard | 1049:efb29faf12fc | 163 | return BLE_ERROR_NOT_IMPLEMENTED; /* Requesting action from porters: override this API if security is supported. */ |
rgrover1 | 717:11b41f651697 | 164 | } |
rgrover1 | 717:11b41f651697 | 165 | |
rgrover1 | 717:11b41f651697 | 166 | /* Event callback handlers. */ |
rgrover1 | 717:11b41f651697 | 167 | public: |
rgrover1 | 717:11b41f651697 | 168 | /** |
vcoubard | 1091:148d8b9b56a5 | 169 | * Setup a callback to be invoked to notify the user application that the |
vcoubard | 1091:148d8b9b56a5 | 170 | * SecurityManager instance is about to shutdown (possibly as a result of a call |
vcoubard | 1091:148d8b9b56a5 | 171 | * to BLE::shutdown()). |
vcoubard | 1091:148d8b9b56a5 | 172 | * |
vcoubard | 1091:148d8b9b56a5 | 173 | * @Note: It is possible to chain together multiple onShutdown callbacks |
vcoubard | 1091:148d8b9b56a5 | 174 | * (potentially from different modules of an application) to be notified |
vcoubard | 1091:148d8b9b56a5 | 175 | * before the SecurityManager is shutdown. |
vcoubard | 1091:148d8b9b56a5 | 176 | * |
vcoubard | 1091:148d8b9b56a5 | 177 | * @Note: It is also possible to set up a callback into a member function of |
vcoubard | 1091:148d8b9b56a5 | 178 | * some object. |
vcoubard | 1091:148d8b9b56a5 | 179 | * |
vcoubard | 1091:148d8b9b56a5 | 180 | * @Note It is possible to unregister a callback using onShutdown().detach(callback) |
vcoubard | 1091:148d8b9b56a5 | 181 | */ |
vcoubard | 1091:148d8b9b56a5 | 182 | void onShutdown(const SecurityManagerShutdownCallback_t& callback) { |
vcoubard | 1091:148d8b9b56a5 | 183 | shutdownCallChain.add(callback); |
vcoubard | 1091:148d8b9b56a5 | 184 | } |
vcoubard | 1091:148d8b9b56a5 | 185 | template <typename T> |
vcoubard | 1091:148d8b9b56a5 | 186 | void onShutdown(T *objPtr, void (T::*memberPtr)(void)) { |
vcoubard | 1091:148d8b9b56a5 | 187 | shutdownCallChain.add(objPtr, memberPtr); |
vcoubard | 1091:148d8b9b56a5 | 188 | } |
vcoubard | 1091:148d8b9b56a5 | 189 | |
vcoubard | 1091:148d8b9b56a5 | 190 | /** |
vcoubard | 1091:148d8b9b56a5 | 191 | * @brief provide access to the callchain of shutdown event callbacks |
vcoubard | 1091:148d8b9b56a5 | 192 | * It is possible to register callbacks using onShutdown().add(callback); |
vcoubard | 1091:148d8b9b56a5 | 193 | * It is possible to unregister callbacks using onShutdown().detach(callback) |
vcoubard | 1091:148d8b9b56a5 | 194 | * @return The shutdown event callbacks chain |
vcoubard | 1091:148d8b9b56a5 | 195 | */ |
vcoubard | 1091:148d8b9b56a5 | 196 | SecurityManagerShutdownCallbackChain_t& onShutdown() { |
vcoubard | 1091:148d8b9b56a5 | 197 | return shutdownCallChain; |
vcoubard | 1091:148d8b9b56a5 | 198 | } |
vcoubard | 1091:148d8b9b56a5 | 199 | |
vcoubard | 1091:148d8b9b56a5 | 200 | /** |
vcoubard | 1049:efb29faf12fc | 201 | * To indicate that a security procedure for the link has started. |
rgrover1 | 717:11b41f651697 | 202 | */ |
rgrover1 | 717:11b41f651697 | 203 | virtual void onSecuritySetupInitiated(SecuritySetupInitiatedCallback_t callback) {securitySetupInitiatedCallback = callback;} |
rgrover1 | 717:11b41f651697 | 204 | |
rgrover1 | 717:11b41f651697 | 205 | /** |
vcoubard | 1049:efb29faf12fc | 206 | * To indicate that the security procedure for the link has completed. |
rgrover1 | 717:11b41f651697 | 207 | */ |
rgrover1 | 717:11b41f651697 | 208 | virtual void onSecuritySetupCompleted(SecuritySetupCompletedCallback_t callback) {securitySetupCompletedCallback = callback;} |
rgrover1 | 717:11b41f651697 | 209 | |
rgrover1 | 717:11b41f651697 | 210 | /** |
vcoubard | 1049:efb29faf12fc | 211 | * To indicate that the link with the peer is secured. For bonded devices, |
vcoubard | 1049:efb29faf12fc | 212 | * subsequent reconnections with a bonded peer will result only in this callback |
vcoubard | 1049:efb29faf12fc | 213 | * when the link is secured; setup procedures will not occur (unless the |
vcoubard | 1049:efb29faf12fc | 214 | * bonding information is either lost or deleted on either or both sides). |
rgrover1 | 717:11b41f651697 | 215 | */ |
rgrover1 | 717:11b41f651697 | 216 | virtual void onLinkSecured(LinkSecuredCallback_t callback) {linkSecuredCallback = callback;} |
rgrover1 | 717:11b41f651697 | 217 | |
rgrover1 | 717:11b41f651697 | 218 | /** |
rgrover1 | 717:11b41f651697 | 219 | * To indicate that device context is stored persistently. |
rgrover1 | 717:11b41f651697 | 220 | */ |
rgrover1 | 717:11b41f651697 | 221 | virtual void onSecurityContextStored(HandleSpecificEvent_t callback) {securityContextStoredCallback = callback;} |
rgrover1 | 717:11b41f651697 | 222 | |
rgrover1 | 717:11b41f651697 | 223 | /** |
rgrover1 | 717:11b41f651697 | 224 | * To set the callback for when the passkey needs to be displayed on a peripheral with DISPLAY capability. |
rgrover1 | 717:11b41f651697 | 225 | */ |
rgrover1 | 717:11b41f651697 | 226 | virtual void onPasskeyDisplay(PasskeyDisplayCallback_t callback) {passkeyDisplayCallback = callback;} |
rgrover1 | 717:11b41f651697 | 227 | |
rgrover1 | 717:11b41f651697 | 228 | /* Entry points for the underlying stack to report events back to the user. */ |
rgrover1 | 717:11b41f651697 | 229 | public: |
rgrover1 | 717:11b41f651697 | 230 | void processSecuritySetupInitiatedEvent(Gap::Handle_t handle, bool allowBonding, bool requireMITM, SecurityIOCapabilities_t iocaps) { |
rgrover1 | 717:11b41f651697 | 231 | if (securitySetupInitiatedCallback) { |
rgrover1 | 717:11b41f651697 | 232 | securitySetupInitiatedCallback(handle, allowBonding, requireMITM, iocaps); |
rgrover1 | 717:11b41f651697 | 233 | } |
rgrover1 | 717:11b41f651697 | 234 | } |
rgrover1 | 717:11b41f651697 | 235 | |
rgrover1 | 717:11b41f651697 | 236 | void processSecuritySetupCompletedEvent(Gap::Handle_t handle, SecurityCompletionStatus_t status) { |
rgrover1 | 717:11b41f651697 | 237 | if (securitySetupCompletedCallback) { |
rgrover1 | 717:11b41f651697 | 238 | securitySetupCompletedCallback(handle, status); |
rgrover1 | 717:11b41f651697 | 239 | } |
rgrover1 | 717:11b41f651697 | 240 | } |
rgrover1 | 717:11b41f651697 | 241 | |
rgrover1 | 717:11b41f651697 | 242 | void processLinkSecuredEvent(Gap::Handle_t handle, SecurityMode_t securityMode) { |
rgrover1 | 717:11b41f651697 | 243 | if (linkSecuredCallback) { |
rgrover1 | 717:11b41f651697 | 244 | linkSecuredCallback(handle, securityMode); |
rgrover1 | 717:11b41f651697 | 245 | } |
rgrover1 | 717:11b41f651697 | 246 | } |
rgrover1 | 717:11b41f651697 | 247 | |
rgrover1 | 717:11b41f651697 | 248 | void processSecurityContextStoredEvent(Gap::Handle_t handle) { |
rgrover1 | 717:11b41f651697 | 249 | if (securityContextStoredCallback) { |
rgrover1 | 717:11b41f651697 | 250 | securityContextStoredCallback(handle); |
rgrover1 | 717:11b41f651697 | 251 | } |
rgrover1 | 717:11b41f651697 | 252 | } |
rgrover1 | 717:11b41f651697 | 253 | |
rgrover1 | 717:11b41f651697 | 254 | void processPasskeyDisplayEvent(Gap::Handle_t handle, const Passkey_t passkey) { |
rgrover1 | 717:11b41f651697 | 255 | if (passkeyDisplayCallback) { |
rgrover1 | 717:11b41f651697 | 256 | passkeyDisplayCallback(handle, passkey); |
rgrover1 | 717:11b41f651697 | 257 | } |
rgrover1 | 717:11b41f651697 | 258 | } |
rgrover1 | 717:11b41f651697 | 259 | |
rgrover1 | 717:11b41f651697 | 260 | protected: |
rgrover1 | 717:11b41f651697 | 261 | SecurityManager() : |
rgrover1 | 717:11b41f651697 | 262 | securitySetupInitiatedCallback(), |
rgrover1 | 717:11b41f651697 | 263 | securitySetupCompletedCallback(), |
rgrover1 | 717:11b41f651697 | 264 | linkSecuredCallback(), |
rgrover1 | 717:11b41f651697 | 265 | securityContextStoredCallback(), |
rgrover1 | 717:11b41f651697 | 266 | passkeyDisplayCallback() { |
rgrover1 | 717:11b41f651697 | 267 | /* empty */ |
rgrover1 | 717:11b41f651697 | 268 | } |
rgrover1 | 717:11b41f651697 | 269 | |
vcoubard | 1083:127667021827 | 270 | public: |
vcoubard | 1083:127667021827 | 271 | /** |
vcoubard | 1091:148d8b9b56a5 | 272 | * Notify all registered onShutdown callbacks that the SecurityManager is |
vcoubard | 1091:148d8b9b56a5 | 273 | * about to be shutdown and clear all SecurityManager state of the |
vcoubard | 1091:148d8b9b56a5 | 274 | * associated object. |
vcoubard | 1083:127667021827 | 275 | * |
vcoubard | 1083:127667021827 | 276 | * This function is meant to be overridden in the platform-specific |
vcoubard | 1083:127667021827 | 277 | * sub-class. Nevertheless, the sub-class is only expected to reset its |
vcoubard | 1083:127667021827 | 278 | * state and not the data held in SecurityManager members. This shall be |
vcoubard | 1083:127667021827 | 279 | * achieved by a call to SecurityManager::reset() from the sub-class' |
vcoubard | 1083:127667021827 | 280 | * reset() implementation. |
vcoubard | 1083:127667021827 | 281 | * |
vcoubard | 1083:127667021827 | 282 | * @return BLE_ERROR_NONE on success. |
vcoubard | 1083:127667021827 | 283 | */ |
vcoubard | 1083:127667021827 | 284 | virtual ble_error_t reset(void) { |
vcoubard | 1091:148d8b9b56a5 | 285 | /* Notify that the instance is about to shutdown */ |
vcoubard | 1091:148d8b9b56a5 | 286 | shutdownCallChain.call(this); |
vcoubard | 1091:148d8b9b56a5 | 287 | shutdownCallChain.clear(); |
vcoubard | 1091:148d8b9b56a5 | 288 | |
vcoubard | 1083:127667021827 | 289 | securitySetupInitiatedCallback = NULL; |
vcoubard | 1083:127667021827 | 290 | securitySetupCompletedCallback = NULL; |
vcoubard | 1085:40c1e518d6de | 291 | linkSecuredCallback = NULL; |
vcoubard | 1085:40c1e518d6de | 292 | securityContextStoredCallback = NULL; |
vcoubard | 1085:40c1e518d6de | 293 | passkeyDisplayCallback = NULL; |
vcoubard | 1083:127667021827 | 294 | |
vcoubard | 1083:127667021827 | 295 | return BLE_ERROR_NONE; |
vcoubard | 1083:127667021827 | 296 | } |
vcoubard | 1083:127667021827 | 297 | |
rgrover1 | 717:11b41f651697 | 298 | protected: |
rgrover1 | 717:11b41f651697 | 299 | SecuritySetupInitiatedCallback_t securitySetupInitiatedCallback; |
rgrover1 | 717:11b41f651697 | 300 | SecuritySetupCompletedCallback_t securitySetupCompletedCallback; |
rgrover1 | 717:11b41f651697 | 301 | LinkSecuredCallback_t linkSecuredCallback; |
rgrover1 | 717:11b41f651697 | 302 | HandleSpecificEvent_t securityContextStoredCallback; |
rgrover1 | 717:11b41f651697 | 303 | PasskeyDisplayCallback_t passkeyDisplayCallback; |
vcoubard | 1091:148d8b9b56a5 | 304 | |
vcoubard | 1091:148d8b9b56a5 | 305 | private: |
vcoubard | 1091:148d8b9b56a5 | 306 | SecurityManagerShutdownCallbackChain_t shutdownCallChain; |
rgrover1 | 717:11b41f651697 | 307 | }; |
rgrover1 | 717:11b41f651697 | 308 | |
rgrover1 | 717:11b41f651697 | 309 | #endif /*__SECURITY_MANAGER_H__*/ |