BLE: Remove useless pal sm API

pull/6188/head
Vincent Coubard 2018-03-01 14:46:12 +00:00
parent e29ea95fc9
commit 1170b3132d
3 changed files with 0 additions and 73 deletions

View File

@ -792,22 +792,6 @@ public:
bool mitm
) = 0;
virtual ble_error_t disable_encryption(
connection_handle_t connection
) = 0;
/**
* Get the link's key size.
*
* @param[in] connection connection handle
* @param[out] bytesize size of the encryption key in bytes
* @retval BLE_ERROR_NONE On success, else an error code indicating reason for failure
*/
virtual ble_error_t get_encryption_key_size(
connection_handle_t connection,
uint8_t &bytesize
) = 0;
/**
* Encrypt data with a given key. This uses the facility on the controller to
* perform the encryption.
@ -891,17 +875,6 @@ public:
// Authentication
//
/**
* Request authentication of the connection. This will trigger an appropriate reaction,
* which might include encryption or pairing/re-pairing.
*
* @param[in] connection connection handle
* @retval BLE_ERROR_NONE On success, else an error code indicating reason for failure
*/
virtual ble_error_t request_authentication(
connection_handle_t connection
) = 0;
/**
* Generate and return 8 octets of random data compliant with [FIPS PUB 140-2]
*

View File

@ -147,25 +147,6 @@ public:
bool mitm
);
/**
* @see ::ble::pal::SecurityManager::disable_encryption
*/
virtual ble_error_t disable_encryption(connection_handle_t connection);
/**
* @see ::ble::pal::SecurityManager::get_encryption_status
*/
virtual ble_error_t get_encryption_status(
connection_handle_t connection, LinkSecurityStatus_t &status
);
/**
* @see ::ble::pal::SecurityManager::get_encryption_key_size
*/
virtual ble_error_t get_encryption_key_size(
connection_handle_t, uint8_t &bitsize
);
/**
* @see ::ble::pal::SecurityManager::encrypt_data
*/
@ -274,11 +255,6 @@ public:
connection_handle_t connection, pairing_failure_t reason
);
/**
* @see ::ble::pal::SecurityManager::request_authentication
*/
virtual ble_error_t request_authentication(connection_handle_t connection);
/**
* @see ::ble::pal::SecurityManager::get_random_data
*/

View File

@ -171,23 +171,6 @@ ble_error_t CordioSecurityManager::enable_encryption(
return BLE_ERROR_NONE;
}
ble_error_t CordioSecurityManager::disable_encryption(connection_handle_t connection)
{
return BLE_ERROR_NOT_IMPLEMENTED;
}
ble_error_t CordioSecurityManager::get_encryption_status(
connection_handle_t connection, LinkSecurityStatus_t &status
) {
return BLE_ERROR_NOT_IMPLEMENTED;
}
ble_error_t CordioSecurityManager::get_encryption_key_size(
connection_handle_t, uint8_t &bitsize
) {
return BLE_ERROR_NOT_IMPLEMENTED;
}
ble_error_t CordioSecurityManager::encrypt_data(
const byte_array_t<16> &key,
encryption_block_t &data
@ -342,11 +325,6 @@ ble_error_t CordioSecurityManager::cancel_pairing(
return BLE_ERROR_NONE;
}
ble_error_t CordioSecurityManager::request_authentication(connection_handle_t connection)
{
return BLE_ERROR_NOT_IMPLEMENTED;
}
ble_error_t CordioSecurityManager::get_random_data(byte_array_t<8> &random_data)
{
SecRand(random_data.buffer(), random_data.size());