diff --git a/features/FEATURE_BLE/ble/pal/PalSecurityManager.h b/features/FEATURE_BLE/ble/pal/PalSecurityManager.h index 948e64f4c8..3f51299f9b 100644 --- a/features/FEATURE_BLE/ble/pal/PalSecurityManager.h +++ b/features/FEATURE_BLE/ble/pal/PalSecurityManager.h @@ -792,22 +792,6 @@ public: bool mitm ) = 0; - virtual ble_error_t disable_encryption( - connection_handle_t connection - ) = 0; - - /** - * Get the link's key size. - * - * @param[in] connection connection handle - * @param[out] bytesize size of the encryption key in bytes - * @retval BLE_ERROR_NONE On success, else an error code indicating reason for failure - */ - virtual ble_error_t get_encryption_key_size( - connection_handle_t connection, - uint8_t &bytesize - ) = 0; - /** * Encrypt data with a given key. This uses the facility on the controller to * perform the encryption. @@ -891,17 +875,6 @@ public: // Authentication // - /** - * Request authentication of the connection. This will trigger an appropriate reaction, - * which might include encryption or pairing/re-pairing. - * - * @param[in] connection connection handle - * @retval BLE_ERROR_NONE On success, else an error code indicating reason for failure - */ - virtual ble_error_t request_authentication( - connection_handle_t connection - ) = 0; - /** * Generate and return 8 octets of random data compliant with [FIPS PUB 140-2] * diff --git a/features/FEATURE_BLE/targets/TARGET_CORDIO/CordioPalSecurityManager.h b/features/FEATURE_BLE/targets/TARGET_CORDIO/CordioPalSecurityManager.h index ed41ca8ea1..10b0a0922b 100644 --- a/features/FEATURE_BLE/targets/TARGET_CORDIO/CordioPalSecurityManager.h +++ b/features/FEATURE_BLE/targets/TARGET_CORDIO/CordioPalSecurityManager.h @@ -147,25 +147,6 @@ public: bool mitm ); - /** - * @see ::ble::pal::SecurityManager::disable_encryption - */ - virtual ble_error_t disable_encryption(connection_handle_t connection); - - /** - * @see ::ble::pal::SecurityManager::get_encryption_status - */ - virtual ble_error_t get_encryption_status( - connection_handle_t connection, LinkSecurityStatus_t &status - ); - - /** - * @see ::ble::pal::SecurityManager::get_encryption_key_size - */ - virtual ble_error_t get_encryption_key_size( - connection_handle_t, uint8_t &bitsize - ); - /** * @see ::ble::pal::SecurityManager::encrypt_data */ @@ -274,11 +255,6 @@ public: connection_handle_t connection, pairing_failure_t reason ); - /** - * @see ::ble::pal::SecurityManager::request_authentication - */ - virtual ble_error_t request_authentication(connection_handle_t connection); - /** * @see ::ble::pal::SecurityManager::get_random_data */ diff --git a/features/FEATURE_BLE/targets/TARGET_CORDIO/source/CordioPalSecurityManager.cpp b/features/FEATURE_BLE/targets/TARGET_CORDIO/source/CordioPalSecurityManager.cpp index 9e0dc9c2dd..4e1689bc15 100644 --- a/features/FEATURE_BLE/targets/TARGET_CORDIO/source/CordioPalSecurityManager.cpp +++ b/features/FEATURE_BLE/targets/TARGET_CORDIO/source/CordioPalSecurityManager.cpp @@ -171,23 +171,6 @@ ble_error_t CordioSecurityManager::enable_encryption( return BLE_ERROR_NONE; } -ble_error_t CordioSecurityManager::disable_encryption(connection_handle_t connection) -{ - return BLE_ERROR_NOT_IMPLEMENTED; -} - -ble_error_t CordioSecurityManager::get_encryption_status( - connection_handle_t connection, LinkSecurityStatus_t &status -) { - return BLE_ERROR_NOT_IMPLEMENTED; -} - -ble_error_t CordioSecurityManager::get_encryption_key_size( - connection_handle_t, uint8_t &bitsize -) { - return BLE_ERROR_NOT_IMPLEMENTED; -} - ble_error_t CordioSecurityManager::encrypt_data( const byte_array_t<16> &key, encryption_block_t &data @@ -342,11 +325,6 @@ ble_error_t CordioSecurityManager::cancel_pairing( return BLE_ERROR_NONE; } -ble_error_t CordioSecurityManager::request_authentication(connection_handle_t connection) -{ - return BLE_ERROR_NOT_IMPLEMENTED; -} - ble_error_t CordioSecurityManager::get_random_data(byte_array_t<8> &random_data) { SecRand(random_data.buffer(), random_data.size());