uint32_t sd_ble_gap_encrypt(adapter_t *adapter, uint16_t conn_handle, ble_gap_master_id_t const *p_master_id, ble_gap_enc_info_t const *p_enc_info) { encode_function_t encode_function = [&](uint8_t *buffer, uint32_t *length) -> uint32_t { return ble_gap_encrypt_req_enc(conn_handle, p_master_id, p_enc_info, buffer, length); }; decode_function_t decode_function = [&](uint8_t *buffer, uint32_t length, uint32_t *result) -> uint32_t { return ble_gap_encrypt_rsp_dec(buffer, length, result); }; return gap_encode_decode(adapter, encode_function, decode_function); }
uint32_t sd_ble_gap_encrypt( uint16_t conn_handle, ble_gap_master_id_t const * p_master_id, ble_gap_enc_info_t const * p_enc_info) { uint8_t * p_buffer; uint32_t buffer_length = 0; tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length); const uint32_t err_code = ble_gap_encrypt_req_enc( conn_handle, p_master_id, p_enc_info, &(p_buffer[1]), &buffer_length ); //@note: Should never fail. APP_ERROR_CHECK(err_code); //@note: Increment buffer length as internally managed packet type field must be included. return ser_sd_transport_cmd_write(p_buffer, (++buffer_length), gap_encrypt_rsp_dec); }