uint32_t ble_gatts_char_pf_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_char_pf_t); SER_PULL_uint8(&p_struct->format); SER_PULL_int8(&p_struct->exponent); SER_PULL_uint16(&p_struct->unit); SER_PULL_uint8(&p_struct->name_space); SER_PULL_uint16(&p_struct->desc); SER_STRUCT_DEC_END; }
uint32_t ble_gatts_evt_rw_authorize_request_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, uint32_t * const p_ext_len, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_evt_rw_authorize_request_t); SER_PULL_uint8(&p_struct->type); switch (p_struct->type) { case BLE_GATTS_AUTHORIZE_TYPE_READ: SER_PULL_FIELD(&p_struct->request.read, ble_gatts_evt_read_t_dec); break; case BLE_GATTS_AUTHORIZE_TYPE_WRITE: err_code = ble_gatts_evt_write_t_dec(p_buf, buf_len, p_index, p_ext_len, &p_struct->request.write); SER_ASSERT(err_code == NRF_SUCCESS, err_code); break; default: case BLE_GATTS_AUTHORIZE_TYPE_INVALID: return NRF_ERROR_INVALID_DATA; } SER_STRUCT_ENC_END; }
uint32_t ble_evt_user_mem_release_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_EVT_USER_MEM_RELEASE, common, user_mem_release); SER_PULL_uint16(&p_event->evt.common_evt.conn_handle); SER_PULL_uint8(&p_event->evt.common_evt.params.user_mem_release.type); SER_PULL_uint16(&p_event->evt.common_evt.params.user_mem_release.mem_block.len); //Set the memory pointer to not-null value. p_event->evt.common_evt.params.user_mem_release.mem_block.p_mem = (uint8_t *)~0; SER_PULL_COND(&p_event->evt.common_evt.params.user_mem_release.mem_block.p_mem, NULL); if (p_event->evt.common_evt.params.user_mem_release.mem_block.p_mem) { // Using connection handle find which mem block to release in Application Processor uint32_t user_mem_table_index; err_code = app_ble_user_mem_context_find(p_event->evt.common_evt.conn_handle, &user_mem_table_index); SER_ASSERT(err_code == NRF_SUCCESS, err_code); p_event->evt.common_evt.params.user_mem_release.mem_block.p_mem = m_app_user_mem_table[user_mem_table_index].mem_block.p_mem; } // Now user memory context can be released err_code = app_ble_user_mem_context_destroy(p_event->evt.common_evt.conn_handle); SER_ASSERT(err_code == NRF_SUCCESS, err_code); SER_EVT_DEC_END; }
uint32_t ble_gatts_evt_sys_attr_missing_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_evt_sys_attr_missing_t); SER_PULL_uint8(&p_struct->hint); SER_STRUCT_DEC_END; }
uint32_t ble_gap_rssi_get_rsp_dec(uint8_t const * const p_buf, uint32_t packet_len, int8_t * const p_rssi, uint32_t * const p_result_code) { SER_RSP_DEC_BEGIN(SD_BLE_GAP_RSSI_GET); SER_PULL_uint8(p_rssi); SER_RSP_DEC_END; }
uint32_t ble_gatts_evt_timeout_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_evt_timeout_t); SER_PULL_uint8(&p_struct->src); SER_STRUCT_DEC_END; }
uint32_t ble_gatts_conn_cfg_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_conn_cfg_t); SER_PULL_uint8(&p_struct->hvn_tx_queue_size); SER_STRUCT_DEC_END; }
uint32_t ble_gatts_cfg_service_changed_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_cfg_service_changed_t); uint8_t service_changed; SER_PULL_uint8(&service_changed); p_struct->service_changed = service_changed; SER_STRUCT_DEC_END; }
uint32_t ble_gatts_evt_hvn_tx_complete_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_GATTS_EVT_HVN_TX_COMPLETE, gatts, hvn_tx_complete); SER_PULL_uint16(&p_event->evt.gatts_evt.conn_handle); SER_PULL_uint8(&p_event->evt.gatts_evt.params.hvn_tx_complete.count); SER_EVT_DEC_END; }
uint32_t ble_evt_tx_complete_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_EVT_TX_COMPLETE, common, tx_complete); SER_PULL_uint16(&p_event->evt.common_evt.conn_handle); SER_PULL_uint8(&p_event->evt.common_evt.params.tx_complete.count); SER_EVT_DEC_END; }
uint32_t ble_evt_user_mem_request_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_EVT_USER_MEM_REQUEST, common, user_mem_request); SER_PULL_uint16(&p_event->evt.common_evt.conn_handle); SER_PULL_uint8(&p_event->evt.common_evt.params.user_mem_request.type); SER_EVT_DEC_END; }
uint32_t ble_gap_evt_auth_key_request_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_GAP_EVT_AUTH_KEY_REQUEST, gap, auth_key_request); SER_PULL_uint16(&p_event->evt.gap_evt.conn_handle); SER_PULL_uint8(&p_event->evt.gap_evt.params.auth_key_request.key_type); SER_EVT_DEC_END; }
uint32_t ble_gap_evt_timeout_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_GAP_EVT_TIMEOUT, gap, timeout); SER_PULL_uint16(&p_event->evt.gap_evt.conn_handle); SER_PULL_uint8(&p_event->evt.gap_evt.params.timeout.src); SER_EVT_DEC_END; }
uint32_t ble_gap_evt_key_pressed_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_GAP_EVT_KEY_PRESSED, gap, key_pressed); SER_PULL_uint16(&p_event->evt.gap_evt.conn_handle); SER_PULL_uint8(&p_event->evt.gap_evt.params.key_pressed.kp_not); SER_EVT_DEC_END; }
uint32_t ble_gattc_evt_write_cmd_tx_complete_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_GATTC_EVT_WRITE_CMD_TX_COMPLETE, gattc, write_cmd_tx_complete); SER_PULL_uint16(&p_event->evt.gattc_evt.conn_handle); SER_PULL_uint16(&p_event->evt.gattc_evt.gatt_status); SER_PULL_uint16(&p_event->evt.gattc_evt.error_handle); SER_PULL_uint8(&p_event->evt.gattc_evt.params.write_cmd_tx_complete.count); SER_EVT_DEC_END; }
uint32_t ble_gatt_char_ext_props_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatt_char_ext_props_t); uint8_t ser_data; SER_PULL_uint8(&ser_data); p_struct->reliable_wr = ser_data & 0x01; p_struct->wr_aux = (ser_data >> 1) & 0x01; SER_STRUCT_DEC_END; }
uint32_t ble_gatts_evt_write_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, uint32_t * const p_ext_len, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_evt_write_t); SER_PULL_uint16(&p_struct->handle); SER_PULL_FIELD(&p_struct->uuid, ble_uuid_t_dec); SER_PULL_uint8(&p_struct->op); SER_PULL_uint8(&p_struct->auth_required); SER_PULL_uint16(&p_struct->offset); SER_PULL_uint16(&p_struct->len); // Data field is defined as 1-element array, so the first element // is always allocated in the structure. SER_ASSERT_LENGTH_LEQ(p_struct->len, *p_ext_len + 1); SER_PULL_uint8array(p_struct->data, p_struct->len); *p_ext_len = (p_struct->len > 1) ? p_struct->len - 1 : 0; SER_STRUCT_ENC_END; }
uint32_t ble_gap_evt_passkey_display_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_GAP_EVT_PASSKEY_DISPLAY, gap, passkey_display); uint8_t ser_data; SER_PULL_uint16(&p_event->evt.gap_evt.conn_handle); SER_PULL_uint8array(p_event->evt.gap_evt.params.passkey_display.passkey, BLE_GAP_PASSKEY_LEN); SER_PULL_uint8(&ser_data); p_event->evt.gap_evt.params.passkey_display.match_request = (ser_data & 0x01); SER_EVT_DEC_END; }
uint32_t ble_gatts_enable_params_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_enable_params_t); uint8_t ser_data; SER_PULL_uint8(&ser_data); SER_PULL_uint32(&p_struct->attr_tab_size); p_struct->service_changed = ser_data & 0x01; SER_STRUCT_DEC_END; }
uint32_t ble_gatts_authorize_params_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_authorize_params_t); uint8_t ser_data; SER_PULL_uint16(&p_struct->gatt_status); SER_PULL_uint8(&ser_data); SER_PULL_uint16(&p_struct->offset); SER_PULL_len16data((uint8_t **) &p_struct->p_data, &p_struct->len); p_struct->update = ser_data & 0x01; SER_STRUCT_DEC_END; }
uint32_t ble_gatts_attr_md_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_attr_md_t); uint8_t ser_data; SER_PULL_FIELD(&p_struct->read_perm, ble_gap_conn_sec_mode_t_dec); SER_PULL_FIELD(&p_struct->write_perm, ble_gap_conn_sec_mode_t_dec); SER_PULL_uint8(&ser_data); p_struct->vlen = ser_data & 0x01; p_struct->vloc = (ser_data >> 1) & 0x03; p_struct->rd_auth = (ser_data >> 3) & 0x01; p_struct->wr_auth = (ser_data >> 4) & 0x01; SER_STRUCT_DEC_END; }
uint32_t ble_gatt_char_props_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatt_char_props_t); uint8_t ser_data; SER_PULL_uint8(&ser_data); p_struct->broadcast = ser_data & 0x01; p_struct->read = (ser_data >> 1) & 0x01; p_struct->write_wo_resp = (ser_data >> 2) & 0x01; p_struct->write = (ser_data >> 3) & 0x01; p_struct->notify = (ser_data >> 4) & 0x01; p_struct->indicate = (ser_data >> 5) & 0x01; p_struct->auth_signed_wr = (ser_data >> 6) & 0x01; SER_STRUCT_DEC_END; }
uint32_t ble_gap_evt_lesc_dhkey_request_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_GAP_EVT_LESC_DHKEY_REQUEST, gap, lesc_dhkey_request); uint8_t ser_data; SER_PULL_uint16(&p_event->evt.gap_evt.conn_handle); // keyset is an extension of standard event data - used to synchronize keys at application uint32_t conn_index; err_code = app_ble_gap_sec_context_find(p_event->evt.gap_evt.conn_handle, &conn_index); SER_ASSERT(err_code == NRF_SUCCESS, err_code); p_event->evt.gap_evt.params.lesc_dhkey_request.p_pk_peer = m_app_keys_table[conn_index].keyset.keys_peer.p_pk; SER_PULL_COND(&p_event->evt.gap_evt.params.lesc_dhkey_request.p_pk_peer, ble_gap_lesc_p256_pk_t_dec); SER_PULL_uint8(&ser_data); p_event->evt.gap_evt.params.lesc_dhkey_request.oobd_req = ser_data & 0x01; SER_EVT_DEC_END; }
uint32_t ble_gatts_hvx_params_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_hvx_params_t); SER_PULL_uint16(&p_struct->handle); SER_PULL_uint8(&p_struct->type); SER_PULL_uint16(&p_struct->offset); SER_PULL_COND(&p_struct->p_len, uint16_t_dec); if (p_struct->p_len) { #if defined(NRF_SD_BLE_API_VERSION) && NRF_SD_BLE_API_VERSION < 4 SER_PULL_buf(&p_struct->p_data, *p_struct->p_len, *p_struct->p_len); #else SER_PULL_buf((uint8_t**)&p_struct->p_data, *p_struct->p_len, *p_struct->p_len); #endif } SER_STRUCT_DEC_END; }
uint32_t ble_gatts_rw_authorize_reply_params_t_dec(uint8_t const * const p_buf, uint32_t buf_len, uint32_t * const p_index, void * const p_void_struct) { SER_STRUCT_DEC_BEGIN(ble_gatts_rw_authorize_reply_params_t); SER_PULL_uint8(&p_struct->type); if (p_struct->type == BLE_GATTS_AUTHORIZE_TYPE_READ) { SER_PULL_FIELD(&p_struct->params.read, ble_gatts_authorize_params_t_dec); } else if (p_struct->type == BLE_GATTS_AUTHORIZE_TYPE_WRITE) { SER_PULL_FIELD(&p_struct->params.write, ble_gatts_authorize_params_t_dec); } else { return NRF_ERROR_INVALID_PARAM; } SER_STRUCT_DEC_END; }