int bacapp_encode_context_timestamp( uint8_t * apdu, uint8_t tag_number, BACNET_TIMESTAMP * value) { int len = 0; /* length of each encoding */ int apdu_len = 0; if (value && apdu) { len = encode_opening_tag(&apdu[apdu_len], tag_number); apdu_len += len; len = bacapp_encode_timestamp(&apdu[apdu_len], value); apdu_len += len; len = encode_closing_tag(&apdu[apdu_len], tag_number); apdu_len += len; } return apdu_len; }
/* return apdu len, or BACNET_STATUS_ERROR on error */ int Credential_Data_Input_Read_Property( BACNET_READ_PROPERTY_DATA * rpdata) { int len = 0; int apdu_len = 0; /* return value */ BACNET_BIT_STRING bit_string; BACNET_CHARACTER_STRING char_string; unsigned object_index = 0; unsigned i = 0; bool state = false; uint8_t *apdu = NULL; if ((rpdata == NULL) || (rpdata->application_data == NULL) || (rpdata->application_data_len == 0)) { return 0; } apdu = rpdata->application_data; object_index = Credential_Data_Input_Instance_To_Index(rpdata->object_instance); switch (rpdata->object_property) { case PROP_OBJECT_IDENTIFIER: apdu_len = encode_application_object_id(&apdu[0], OBJECT_CREDENTIAL_DATA_INPUT, rpdata->object_instance); break; case PROP_OBJECT_NAME: Credential_Data_Input_Object_Name(rpdata->object_instance, &char_string); apdu_len = encode_application_character_string(&apdu[0], &char_string); break; case PROP_OBJECT_TYPE: apdu_len = encode_application_enumerated(&apdu[0], OBJECT_CREDENTIAL_DATA_INPUT); break; case PROP_PRESENT_VALUE: apdu_len = bacapp_encode_authentication_factor(&apdu[apdu_len], &cdi_descr[object_index].present_value); break; case PROP_STATUS_FLAGS: bitstring_init(&bit_string); bitstring_set_bit(&bit_string, STATUS_FLAG_IN_ALARM, false); bitstring_set_bit(&bit_string, STATUS_FLAG_FAULT, false); bitstring_set_bit(&bit_string, STATUS_FLAG_OVERRIDDEN, false); state = Credential_Data_Input_Out_Of_Service(rpdata->object_instance); bitstring_set_bit(&bit_string, STATUS_FLAG_OUT_OF_SERVICE, state); apdu_len = encode_application_bitstring(&apdu[0], &bit_string); break; case PROP_RELIABILITY: apdu_len = encode_application_enumerated(&apdu[0], cdi_descr[object_index].reliability); break; case PROP_OUT_OF_SERVICE: state = Credential_Data_Input_Out_Of_Service(rpdata->object_instance); apdu_len = encode_application_boolean(&apdu[0], state); break; case PROP_SUPPORTED_FORMATS: if (rpdata->array_index == 0) { apdu_len = encode_application_unsigned(&apdu[0], cdi_descr[object_index].supported_formats_count); } else if (rpdata->array_index == BACNET_ARRAY_ALL) { for (i = 0; i < cdi_descr[object_index].supported_formats_count; i++) { len = bacapp_encode_authentication_factor_format(&apdu[0], &cdi_descr[object_index].supported_formats[i]); if (apdu_len + len < MAX_APDU) apdu_len += len; else { rpdata->error_code = ERROR_CODE_ABORT_SEGMENTATION_NOT_SUPPORTED; apdu_len = BACNET_STATUS_ABORT; break; } } } else { if (rpdata->array_index <= cdi_descr[object_index].supported_formats_count) { apdu_len = bacapp_encode_authentication_factor_format(&apdu[0], &cdi_descr[object_index]. supported_formats[rpdata->array_index - 1]); } else { rpdata->error_class = ERROR_CLASS_PROPERTY; rpdata->error_code = ERROR_CODE_INVALID_ARRAY_INDEX; apdu_len = BACNET_STATUS_ERROR; } } break; case PROP_UPDATE_TIME: apdu_len = bacapp_encode_timestamp(&apdu[0], &cdi_descr[object_index].timestamp); break; default: rpdata->error_class = ERROR_CLASS_PROPERTY; rpdata->error_code = ERROR_CODE_UNKNOWN_PROPERTY; apdu_len = BACNET_STATUS_ERROR; break; } /* only array properties can have array options */ if ((apdu_len >= 0) && (rpdata->object_property != PROP_SUPPORTED_FORMATS) && (rpdata->array_index != BACNET_ARRAY_ALL)) { rpdata->error_class = ERROR_CLASS_PROPERTY; rpdata->error_code = ERROR_CODE_PROPERTY_IS_NOT_AN_ARRAY; apdu_len = BACNET_STATUS_ERROR; } return apdu_len; }