diff --git a/features/FEATURE_BLE/ble/SecurityManager.h b/features/FEATURE_BLE/ble/SecurityManager.h index 011c33dbd9..64836613a5 100644 --- a/features/FEATURE_BLE/ble/SecurityManager.h +++ b/features/FEATURE_BLE/ble/SecurityManager.h @@ -644,6 +644,7 @@ public: */ ble_error_t setKeypressNotification(bool enabled = true); +#if BLE_FEATURE_SIGNING /** * Request generation and exchange of signing keys so that packet signing can be utilised * on this connection. @@ -655,6 +656,7 @@ public: * @return BLE_ERROR_NONE or appropriate error code indicating the failure reason. */ ble_error_t enableSigning(ble::connection_handle_t connectionHandle, bool enabled = true); +#endif // BLE_FEATURE_SIGNING /** * Give a hint to the stack that the master/slave role might change in the future. diff --git a/features/FEATURE_BLE/source/SecurityManager.tpp b/features/FEATURE_BLE/source/SecurityManager.tpp index 4ecf297ddf..6509a4c2c8 100644 --- a/features/FEATURE_BLE/source/SecurityManager.tpp +++ b/features/FEATURE_BLE/source/SecurityManager.tpp @@ -137,6 +137,7 @@ ble_error_t SecurityManager::setKeypressNotification(bool enabled) { return impl()->setKeypressNotification_(enabled); } +#if BLE_FEATURE_SIGNING template ble_error_t SecurityManager::enableSigning( ble::connection_handle_t connectionHandle, @@ -144,6 +145,7 @@ ble_error_t SecurityManager::enableSigning( ) { return impl()->enableSigning_(connectionHandle, enabled); } +#endif // BLE_FEATURE_SIGNING template ble_error_t SecurityManager::setHintFutureRoleReversal(bool enable) {