Nordic nrf51 sdk sources. Mirrored from https://github.com/ARMmbed/nrf51-sdk.
source/nordic_sdk/components/ble/common/ble_srv_common.c
- Committer:
- vcoubard
- Date:
- 2016-04-07
- Revision:
- 24:2aea0c1c57ee
- Parent:
- 22:67a8d2c0bbbf
- Child:
- 27:0fe148f1bca3
File content as of revision 24:2aea0c1c57ee:
/* * Copyright (c) Nordic Semiconductor ASA * All rights reserved. * * Redistribution and use in source and binary forms, with or without modification, * are permitted provided that the following conditions are met: * * 1. Redistributions of source code must retain the above copyright notice, this * list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright notice, this * list of conditions and the following disclaimer in the documentation and/or * other materials provided with the distribution. * * 3. Neither the name of Nordic Semiconductor ASA nor the names of other * contributors to this software may be used to endorse or promote products * derived from this software without specific prior written permission. * * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * */ /* Attention! * To maintain compliance with Nordic Semiconductor ASAs Bluetooth profile * qualification listings, this section of source code must not be modified. */ #include "ble_srv_common.h" #include <string.h> #include "nordic_common.h" #include "app_error.h" #include "ble.h" uint8_t ble_srv_report_ref_encode(uint8_t * p_encoded_buffer, const ble_srv_report_ref_t * p_report_ref) { uint8_t len = 0; p_encoded_buffer[len++] = p_report_ref->report_id; p_encoded_buffer[len++] = p_report_ref->report_type; APP_ERROR_CHECK_BOOL(len == BLE_SRV_ENCODED_REPORT_REF_LEN); return len; } void ble_srv_ascii_to_utf8(ble_srv_utf8_str_t * p_utf8, char * p_ascii) { p_utf8->length = (uint16_t)strlen(p_ascii); p_utf8->p_str = (uint8_t *)p_ascii; } /**@brief Function for setting security requirements of a characteristic. * * @param[in] level required security level. * * @return encoded security level and security mode. */ static inline ble_gap_conn_sec_mode_t set_security_req(security_req_t level) { ble_gap_conn_sec_mode_t perm; BLE_GAP_CONN_SEC_MODE_SET_NO_ACCESS(&perm); switch (level) { case SEC_NO_ACCESS: BLE_GAP_CONN_SEC_MODE_SET_NO_ACCESS(&perm); break; case SEC_OPEN: BLE_GAP_CONN_SEC_MODE_SET_OPEN(&perm); break; case SEC_JUST_WORKS: BLE_GAP_CONN_SEC_MODE_SET_ENC_NO_MITM(&perm); break; case SEC_MITM: BLE_GAP_CONN_SEC_MODE_SET_ENC_WITH_MITM(&perm); break; case SEC_SIGNED: BLE_GAP_CONN_SEC_MODE_SET_SIGNED_NO_MITM(&perm); break; case SEC_SIGNED_MITM: BLE_GAP_CONN_SEC_MODE_SET_SIGNED_WITH_MITM(&perm); break; } return(perm); } uint32_t characteristic_add(uint16_t service_handle, ble_add_char_params_t * p_char_props, ble_gatts_char_handles_t * p_char_handle) { ble_gatts_char_md_t char_md; ble_gatts_attr_t attr_char_value; ble_uuid_t char_uuid; ble_gatts_attr_md_t attr_md; if (p_char_props->uuid_type == 0) { char_uuid.type = BLE_UUID_TYPE_BLE; } else { char_uuid.type = p_char_props->uuid_type; } char_uuid.uuid = p_char_props->uuid; memset(&attr_md, 0, sizeof(attr_md)); attr_md.read_perm = set_security_req(p_char_props->read_access); attr_md.write_perm = set_security_req(p_char_props->write_access); attr_md.rd_auth = (p_char_props->is_defered_read ? 1 : 0); attr_md.wr_auth = (p_char_props->is_defered_write ? 1 : 0); attr_md.vlen = (p_char_props->is_var_len ? 1 : 0); attr_md.vloc = (p_char_props->is_value_local ? BLE_GATTS_VLOC_USER : BLE_GATTS_VLOC_STACK); memset(&char_md, 0, sizeof(char_md)); if ((p_char_props->char_props.notify == 1)||(p_char_props->char_props.indicate == 1)) { ble_gatts_attr_md_t cccd_md; memset(&cccd_md, 0, sizeof(cccd_md)); cccd_md.write_perm = set_security_req(p_char_props->cccd_write_access); BLE_GAP_CONN_SEC_MODE_SET_OPEN(&cccd_md.read_perm); cccd_md.vloc = BLE_GATTS_VLOC_STACK; char_md.p_cccd_md = &cccd_md; } char_md.char_props = p_char_props->char_props; memset(&attr_char_value, 0, sizeof(attr_char_value)); attr_char_value.p_uuid = &char_uuid; attr_char_value.p_attr_md = &attr_md; attr_char_value.max_len = p_char_props->max_len; if (p_char_props->p_init_value != NULL) { attr_char_value.init_len = p_char_props->init_len; attr_char_value.p_value = p_char_props->p_init_value; } return sd_ble_gatts_characteristic_add(service_handle, &char_md, &attr_char_value, p_char_handle); }