uint32_t ble_gatts_evt_rw_authorize_request_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_GATTS_EVT_HVC, gatts, rw_authorize_request); SER_PULL_uint16(&p_event->evt.gatts_evt.conn_handle); SER_PULL_FIELD_EXTENDED(&p_event->evt.gatts_evt.params.authorize_request, ble_gatts_evt_rw_authorize_request_t_dec); //Correct event length / memory sync. if (p_event->evt.gatts_evt.params.authorize_request.type == BLE_GATTS_AUTHORIZE_TYPE_READ) { evt_struct_len = offsetof(ble_evt_t, evt.gatts_evt.params.authorize_request.request.read) - offsetof(ble_evt_t, evt) + sizeof(ble_gatts_evt_read_t); } else if ((p_event->evt.gatts_evt.params.authorize_request.type == BLE_GATTS_AUTHORIZE_TYPE_WRITE) && ( (p_event->evt.gatts_evt.params.authorize_request.request.write.op == BLE_GATTS_OP_EXEC_WRITE_REQ_NOW) || (p_event->evt.gatts_evt.params.authorize_request.request.write.op == BLE_GATTS_OP_PREP_WRITE_REQ))) { uint32_t conn_index; if (app_ble_user_mem_context_find(p_event->evt.gatts_evt.conn_handle, &conn_index) != NRF_ERROR_NOT_FOUND) { SER_PULL_len16data(&m_app_user_mem_table[conn_index].mem_block.p_mem, &m_app_user_mem_table[conn_index].mem_block.len); } } SER_EVT_DEC_END; }
uint32_t ble_gatts_evt_write_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_GATTS_EVT_WRITE, gatts, write); SER_PULL_uint16(&p_event->evt.gatts_evt.conn_handle); SER_PULL_FIELD_EXTENDED(&p_event->evt.gatts_evt.params.write, ble_gatts_evt_write_t_dec); if (p_event != NULL) { if (p_event->evt.gatts_evt.params.write.op == BLE_GATTS_OP_EXEC_WRITE_REQ_NOW) { uint32_t conn_index; if (app_ble_user_mem_context_find(p_event->evt.gatts_evt.conn_handle, &conn_index) != NRF_ERROR_NOT_FOUND) { SER_PULL_len16data(&m_app_user_mem_table[conn_index].mem_block.p_mem, &m_app_user_mem_table[conn_index].mem_block.len); SER_ASSERT(err_code == NRF_SUCCESS, err_code); } } } SER_EVT_DEC_END; }
uint32_t ble_evt_user_mem_release_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_EVT_DEC_BEGIN(BLE_EVT_USER_MEM_RELEASE, common, user_mem_release); SER_PULL_uint16(&p_event->evt.common_evt.conn_handle); SER_PULL_uint8(&p_event->evt.common_evt.params.user_mem_release.type); SER_PULL_uint16(&p_event->evt.common_evt.params.user_mem_release.mem_block.len); //Set the memory pointer to not-null value. p_event->evt.common_evt.params.user_mem_release.mem_block.p_mem = (uint8_t *)~0; SER_PULL_COND(&p_event->evt.common_evt.params.user_mem_release.mem_block.p_mem, NULL); if (p_event->evt.common_evt.params.user_mem_release.mem_block.p_mem) { // Using connection handle find which mem block to release in Application Processor uint32_t user_mem_table_index; err_code = app_ble_user_mem_context_find(p_event->evt.common_evt.conn_handle, &user_mem_table_index); SER_ASSERT(err_code == NRF_SUCCESS, err_code); p_event->evt.common_evt.params.user_mem_release.mem_block.p_mem = m_app_user_mem_table[user_mem_table_index].mem_block.p_mem; } // Now user memory context can be released err_code = app_ble_user_mem_context_destroy(p_event->evt.common_evt.conn_handle); SER_ASSERT(err_code == NRF_SUCCESS, err_code); SER_EVT_DEC_END; }
uint32_t ble_evt_user_mem_release_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_ASSERT_NOT_NULL(p_buf); SER_ASSERT_NOT_NULL(p_event); SER_ASSERT_NOT_NULL(p_event_len); uint32_t index = 0; uint32_t err_code = NRF_SUCCESS; uint32_t event_len = (uint16_t) (offsetof(ble_evt_t, evt.common_evt.params.user_mem_release)) + sizeof (ble_evt_user_mem_release_t) - sizeof (ble_evt_hdr_t); if (p_event == NULL) { *p_event_len = event_len; return NRF_SUCCESS; } p_event->header.evt_id = BLE_EVT_USER_MEM_RELEASE; p_event->header.evt_len = event_len; ble_evt_user_mem_release_t * p_user_mem_rel = &(p_event->evt.common_evt.params.user_mem_release); err_code = uint16_t_dec(p_buf, packet_len, &index, &(p_event->evt.common_evt.conn_handle)); SER_ASSERT(err_code == NRF_SUCCESS, err_code); err_code = uint8_t_dec(p_buf, packet_len, &index, &(p_user_mem_rel->type)); SER_ASSERT(err_code == NRF_SUCCESS, err_code); // Decoding order of mem block is different than structure elements order - length is decoded first err_code = uint16_t_dec(p_buf, packet_len, &index, &(p_user_mem_rel->mem_block.len)); SER_ASSERT(err_code == NRF_SUCCESS, err_code); if (p_buf[index++] == SER_FIELD_PRESENT) { // Using connection handle find which mem block to release in Application Processor uint32_t user_mem_table_index; err_code = app_ble_user_mem_context_find(p_event->evt.common_evt.conn_handle, &user_mem_table_index); SER_ASSERT(err_code == NRF_SUCCESS, err_code); p_user_mem_rel->mem_block.p_mem = m_app_user_mem_table[user_mem_table_index].mem_block.p_mem; } else { p_user_mem_rel->mem_block.p_mem = NULL; } // Now user memory context can be released err_code = app_ble_user_mem_context_destroy(p_event->evt.common_evt.conn_handle); SER_ASSERT(err_code == NRF_SUCCESS, err_code); SER_ASSERT_LENGTH_EQ(index, packet_len); *p_event_len = event_len; return err_code; }
uint32_t ble_gatts_evt_rw_authorize_request_dec(uint8_t const * const p_buf, uint32_t packet_len, ble_evt_t * const p_event, uint32_t * const p_event_len) { SER_ASSERT_NOT_NULL(p_buf); SER_ASSERT_NOT_NULL(p_event_len); uint32_t index = 0; uint32_t err_code = NRF_SUCCESS; uint32_t in_event_len = *p_event_len; *p_event_len = offsetof(ble_evt_t, evt.gatts_evt.params) - sizeof (ble_evt_hdr_t); uint16_t conn_handle; err_code = uint16_t_dec(p_buf, packet_len, &index, &conn_handle); SER_ASSERT(err_code == NRF_SUCCESS, err_code); void * p_void_authorize_request = NULL; if (p_event != NULL) { SER_ASSERT_LENGTH_LEQ(*p_event_len, in_event_len); p_event->header.evt_id = BLE_GATTS_EVT_RW_AUTHORIZE_REQUEST; p_event->evt.gatts_evt.conn_handle = conn_handle; p_void_authorize_request = &(p_event->evt.gatts_evt.params.authorize_request); } uint32_t tmp_event_len = in_event_len - *p_event_len; err_code = ble_gatts_evt_rw_authorize_request_t_dec(p_buf, packet_len, &index, &tmp_event_len, p_void_authorize_request); SER_ASSERT(err_code == NRF_SUCCESS, err_code); *p_event_len += tmp_event_len; if(p_event != NULL) { if((p_event->evt.gatts_evt.params.authorize_request.type == BLE_GATTS_AUTHORIZE_TYPE_WRITE) && (p_event->evt.gatts_evt.params.authorize_request.request.write.op == BLE_GATTS_OP_EXEC_WRITE_REQ_NOW)) { uint32_t conn_index; if(app_ble_user_mem_context_find(p_event->evt.gatts_evt.conn_handle, &conn_index) != NRF_ERROR_NOT_FOUND) { err_code = len16data_dec(p_buf, packet_len, &index, &m_app_user_mem_table[conn_index].mem_block.p_mem, &m_app_user_mem_table[conn_index].mem_block.len); SER_ASSERT(err_code == NRF_SUCCESS, err_code); } } } SER_ASSERT_LENGTH_EQ(index, packet_len); return err_code; }