Nordic nrf51 sdk sources. Mirrored from https://github.com/ARMmbed/nrf51-sdk.
Diff: source/nordic_sdk/components/ble/common/ble_srv_common.c
- Revision:
- 24:2aea0c1c57ee
- Parent:
- 22:67a8d2c0bbbf
- Child:
- 27:0fe148f1bca3
--- a/source/nordic_sdk/components/ble/common/ble_srv_common.c Thu Apr 07 17:37:48 2016 +0100 +++ b/source/nordic_sdk/components/ble/common/ble_srv_common.c Thu Apr 07 17:37:49 2016 +0100 @@ -30,8 +30,8 @@ * */ -/* Attention! -* To maintain compliance with Nordic Semiconductor ASAs Bluetooth profile +/* Attention! +* To maintain compliance with Nordic Semiconductor ASAs Bluetooth profile * qualification listings, this section of source code must not be modified. */ @@ -39,7 +39,7 @@ #include <string.h> #include "nordic_common.h" #include "app_error.h" - +#include "ble.h" uint8_t ble_srv_report_ref_encode(uint8_t * p_encoded_buffer, const ble_srv_report_ref_t * p_report_ref) @@ -58,4 +58,100 @@ { p_utf8->length = (uint16_t)strlen(p_ascii); p_utf8->p_str = (uint8_t *)p_ascii; -} \ No newline at end of file +} + + +/**@brief Function for setting security requirements of a characteristic. + * + * @param[in] level required security level. + * + * @return encoded security level and security mode. + */ +static inline ble_gap_conn_sec_mode_t set_security_req(security_req_t level) +{ + ble_gap_conn_sec_mode_t perm; + + BLE_GAP_CONN_SEC_MODE_SET_NO_ACCESS(&perm); + switch (level) + { + case SEC_NO_ACCESS: + BLE_GAP_CONN_SEC_MODE_SET_NO_ACCESS(&perm); + break; + case SEC_OPEN: + BLE_GAP_CONN_SEC_MODE_SET_OPEN(&perm); + break; + case SEC_JUST_WORKS: + BLE_GAP_CONN_SEC_MODE_SET_ENC_NO_MITM(&perm); + break; + case SEC_MITM: + BLE_GAP_CONN_SEC_MODE_SET_ENC_WITH_MITM(&perm); + break; + case SEC_SIGNED: + BLE_GAP_CONN_SEC_MODE_SET_SIGNED_NO_MITM(&perm); + break; + case SEC_SIGNED_MITM: + BLE_GAP_CONN_SEC_MODE_SET_SIGNED_WITH_MITM(&perm); + break; + } + return(perm); +} + + +uint32_t characteristic_add(uint16_t service_handle, + ble_add_char_params_t * p_char_props, + ble_gatts_char_handles_t * p_char_handle) +{ + ble_gatts_char_md_t char_md; + ble_gatts_attr_t attr_char_value; + ble_uuid_t char_uuid; + ble_gatts_attr_md_t attr_md; + + if (p_char_props->uuid_type == 0) + { + char_uuid.type = BLE_UUID_TYPE_BLE; + } + else + { + char_uuid.type = p_char_props->uuid_type; + } + char_uuid.uuid = p_char_props->uuid; + + memset(&attr_md, 0, sizeof(attr_md)); + attr_md.read_perm = set_security_req(p_char_props->read_access); + attr_md.write_perm = set_security_req(p_char_props->write_access); + attr_md.rd_auth = (p_char_props->is_defered_read ? 1 : 0); + attr_md.wr_auth = (p_char_props->is_defered_write ? 1 : 0); + attr_md.vlen = (p_char_props->is_var_len ? 1 : 0); + attr_md.vloc = (p_char_props->is_value_local ? BLE_GATTS_VLOC_USER : BLE_GATTS_VLOC_STACK); + + + memset(&char_md, 0, sizeof(char_md)); + if ((p_char_props->char_props.notify == 1)||(p_char_props->char_props.indicate == 1)) + { + ble_gatts_attr_md_t cccd_md; + + memset(&cccd_md, 0, sizeof(cccd_md)); + cccd_md.write_perm = set_security_req(p_char_props->cccd_write_access); + BLE_GAP_CONN_SEC_MODE_SET_OPEN(&cccd_md.read_perm); + + cccd_md.vloc = BLE_GATTS_VLOC_STACK; + + char_md.p_cccd_md = &cccd_md; + } + char_md.char_props = p_char_props->char_props; + + memset(&attr_char_value, 0, sizeof(attr_char_value)); + attr_char_value.p_uuid = &char_uuid; + attr_char_value.p_attr_md = &attr_md; + attr_char_value.max_len = p_char_props->max_len; + if (p_char_props->p_init_value != NULL) + { + attr_char_value.init_len = p_char_props->init_len; + attr_char_value.p_value = p_char_props->p_init_value; + } + return sd_ble_gatts_characteristic_add(service_handle, + &char_md, + &attr_char_value, + p_char_handle); +} + \ No newline at end of file