uint32_t sd_ble_gap_sec_params_reply(uint16_t conn_handle, uint8_t sec_status, ble_gap_sec_params_t const * p_sec_params, ble_gap_sec_keyset_t const * p_sec_keyset) { uint8_t * p_buffer; uint32_t buffer_length = 0; uint32_t sec_tab_index = 0; uint32_t err_code = NRF_SUCCESS; tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length); m_output_params.gap_sec_params_reply_out_params.p_sec_keyset = p_sec_keyset; m_output_params.gap_sec_params_reply_out_params.conn_handle = conn_handle; // First allocate security context for serialization if (p_sec_keyset) { err_code = app_ble_gap_sec_context_create(conn_handle, &sec_tab_index); SER_ASSERT(err_code == NRF_SUCCESS, err_code); memcpy(&(m_app_keys_table[sec_tab_index].keyset), p_sec_keyset, sizeof(ble_gap_sec_keyset_t)); } err_code = ble_gap_sec_params_reply_req_enc(conn_handle, sec_status, p_sec_params, p_sec_keyset, &(p_buffer[1]), &buffer_length); APP_ERROR_CHECK(err_code); //@note: Increment buffer length as internally managed packet type field must be included. return ser_sd_transport_cmd_write(p_buffer, (++buffer_length), gap_sec_params_reply_rsp_dec); }
uint32_t sd_ble_gap_sec_params_reply(adapter_t *adapter, uint16_t conn_handle, uint8_t sec_status, ble_gap_sec_params_t const *p_sec_params, ble_gap_sec_keyset_t const *p_sec_keyset) { encode_function_t encode_function = [&](uint8_t *buffer, uint32_t *length) -> uint32_t { uint32_t index = 0; auto err_code = app_ble_gap_sec_keys_storage_create(conn_handle, &index); if (err_code != NRF_SUCCESS) { return err_code; } if (p_sec_keyset) { err_code = app_ble_gap_sec_keys_update(index, p_sec_keyset); if (err_code != NRF_SUCCESS) { return err_code; } } return ble_gap_sec_params_reply_req_enc(conn_handle, sec_status, p_sec_params, p_sec_keyset, buffer, length); }; decode_function_t decode_function = [&](uint8_t *buffer, uint32_t length, uint32_t *result) -> uint32_t { return ble_gap_sec_params_reply_rsp_dec(buffer, length, p_sec_keyset, result); }; return gap_encode_decode(adapter, encode_function, decode_function); }