uint32_t ble_gap_evt_auth_status_enc(ble_evt_t const * const p_event, uint32_t event_len, uint8_t * const p_buf, uint32_t * const p_buf_len) { SER_EVT_ENC_BEGIN(BLE_GAP_EVT_AUTH_STATUS); SER_PUSH_uint16(&p_event->evt.gap_evt.conn_handle); SER_PUSH_FIELD(&p_event->evt.gap_evt.params.auth_status, ble_gap_evt_auth_status_t_enc); // keyset is an extension of standard event data - used to synchronize keys at application uint32_t conn_index; err_code = conn_ble_gap_sec_context_find(p_event->evt.gap_evt.conn_handle, &conn_index); if (err_code == NRF_SUCCESS) { SER_PUSH_FIELD(&(m_conn_keys_table[conn_index].keyset), ble_gap_sec_keyset_t_enc); err_code = conn_ble_gap_sec_context_destroy(p_event->evt.gap_evt.conn_handle); SER_ASSERT(err_code == NRF_SUCCESS, err_code); } else { err_code = NRF_SUCCESS; } SER_EVT_ENC_END; }
uint32_t conn_mw_ble_gap_sec_params_reply(uint8_t const * const p_rx_buf, uint32_t rx_buf_len, uint8_t * const p_tx_buf, uint32_t * const p_tx_buf_len) { SER_ASSERT_NOT_NULL(p_rx_buf); SER_ASSERT_NOT_NULL(p_tx_buf); SER_ASSERT_NOT_NULL(p_tx_buf_len); uint32_t err_code = NRF_SUCCESS; uint32_t sd_err_code; uint32_t sec_tab_index = 0; uint16_t * p_conn_handle; uint8_t sec_status; ble_gap_sec_params_t sec_params; ble_gap_sec_params_t * p_sec_params = &sec_params; // Allocate global security context for soft device err_code = conn_ble_gap_sec_context_create(&sec_tab_index); SER_ASSERT(err_code == NRF_SUCCESS, err_code); p_conn_handle = &(m_conn_keys_table[sec_tab_index].conn_handle); // Set up global structure for command decoder ble_gap_sec_keyset_t * p_sec_keyset = &(m_conn_keys_table[sec_tab_index].keyset); p_sec_keyset->keys_own.p_enc_key = &(m_conn_keys_table[sec_tab_index].enc_key_own); p_sec_keyset->keys_own.p_id_key = &(m_conn_keys_table[sec_tab_index].id_key_own); p_sec_keyset->keys_own.p_sign_key = &(m_conn_keys_table[sec_tab_index].sign_key_own); p_sec_keyset->keys_own.p_pk = &(m_conn_keys_table[sec_tab_index].pk_own); p_sec_keyset->keys_peer.p_enc_key = &(m_conn_keys_table[sec_tab_index].enc_key_peer); p_sec_keyset->keys_peer.p_id_key = &(m_conn_keys_table[sec_tab_index].id_key_peer); p_sec_keyset->keys_peer.p_sign_key = &(m_conn_keys_table[sec_tab_index].sign_key_peer); p_sec_keyset->keys_peer.p_pk = &(m_conn_keys_table[sec_tab_index].pk_peer); err_code = ble_gap_sec_params_reply_req_dec(p_rx_buf, rx_buf_len, p_conn_handle, &sec_status, &p_sec_params, &p_sec_keyset); SER_ASSERT(err_code == NRF_SUCCESS, err_code); if (p_sec_keyset == NULL) { //If no keyset was sent destroy the context. err_code = conn_ble_gap_sec_context_destroy(*p_conn_handle); SER_ASSERT(err_code == NRF_SUCCESS, err_code); } sd_err_code = sd_ble_gap_sec_params_reply(*p_conn_handle, sec_status, p_sec_params, p_sec_keyset); err_code = ble_gap_sec_params_reply_rsp_enc(sd_err_code, p_tx_buf, p_tx_buf_len, p_sec_keyset); SER_ASSERT(err_code == NRF_SUCCESS, err_code); return err_code; }
uint32_t ble_gap_evt_auth_status_enc(ble_evt_t const * const p_event, uint32_t event_len, uint8_t * const p_buf, uint32_t * const p_buf_len) { uint32_t index = 0; uint16_t evt_header = BLE_GAP_EVT_AUTH_STATUS; uint32_t total_len; uint32_t err_code = NRF_SUCCESS; uint32_t conn_index; SER_ASSERT_NOT_NULL(p_event); SER_ASSERT_NOT_NULL(p_buf); SER_ASSERT_NOT_NULL(p_buf_len); total_len = *p_buf_len; err_code = uint16_t_enc(&evt_header, p_buf, total_len, &index); SER_ASSERT(err_code == NRF_SUCCESS, err_code); err_code = uint16_t_enc(&p_event->evt.gap_evt.conn_handle, p_buf, total_len, &index); SER_ASSERT(err_code == NRF_SUCCESS, err_code); err_code = ble_gap_evt_auth_status_t_enc(&(p_event->evt.gap_evt.params.auth_status), p_buf, total_len, &index); SER_ASSERT(err_code == NRF_SUCCESS, err_code); if (p_event->evt.gap_evt.params.auth_status.bonded) { // keyset is an extension of standard event data - used to synchronize keys at application err_code = conn_ble_gap_sec_context_find(p_event->evt.gap_evt.conn_handle, &conn_index); SER_ASSERT(err_code == NRF_SUCCESS, err_code); err_code = ble_gap_sec_keyset_t_enc(&(m_conn_keys_table[conn_index].keyset), p_buf, total_len, &index); SER_ASSERT(err_code == NRF_SUCCESS, err_code); err_code = conn_ble_gap_sec_context_destroy(p_event->evt.gap_evt.conn_handle); SER_ASSERT(err_code == NRF_SUCCESS, err_code); } *p_buf_len = index; return err_code; }
uint32_t ble_gap_evt_disconnected_enc(ble_evt_t const * const p_event, uint32_t event_len, uint8_t * const p_buf, uint32_t * const p_buf_len) { SER_EVT_ENC_BEGIN(BLE_GAP_EVT_DISCONNECTED); SER_PUSH_uint16(&p_event->evt.gap_evt.conn_handle); SER_PUSH_FIELD(&p_event->evt.gap_evt.params.disconnected, ble_gap_evt_disconnected_t_enc); // If disconnected and context is not yet destroyed, destroy it now uint32_t conn_index; err_code = conn_ble_gap_sec_context_find(p_event->evt.gap_evt.conn_handle, &conn_index); if (err_code == NRF_SUCCESS) { err_code = conn_ble_gap_sec_context_destroy(p_event->evt.gap_evt.conn_handle); SER_ASSERT(err_code == NRF_SUCCESS, err_code); } err_code = NRF_SUCCESS; SER_EVT_ENC_END; }