bt_gap_config/
bt_gap_config_rust_config_lib_source.rs1use fidl::unpersist;
2use fidl_cf_sc_internal_btgapconfig::Config as FidlConfig;
3use fuchsia_component_config::{Config as ComponentConfig, Error};
4use fuchsia_inspect::Node;
5use std::convert::TryInto;
6const EXPECTED_CHECKSUM: &[u8] = &[
7 0x1c, 0xbb, 0x3f, 0x24, 0x89, 0x00, 0x00, 0x5d, 0x4c, 0xd8, 0x73, 0xbc, 0x20, 0x94, 0xec, 0x68,
8 0x95, 0xd6, 0xf3, 0x1a, 0x90, 0x90, 0xdb, 0x99, 0x5e, 0xc2, 0xf7, 0xa0, 0x90, 0x50, 0x34, 0x31,
9];
10const EXPECTED_CHECKSUM_LENGTH: [u8; 2] = (EXPECTED_CHECKSUM.len() as u16).to_le_bytes();
11#[derive(Debug)]
12pub struct Config {
13 pub bredr_connectable: bool,
14 pub bredr_security_mode: String,
15 pub le_background_scanning: bool,
16 pub le_privacy: bool,
17 pub le_security_mode: String,
18}
19impl Config {
20 #[doc = r" Take the config startup handle and parse its contents."]
21 #[doc = r""]
22 #[doc = r" # Panics"]
23 #[doc = r""]
24 #[doc = r" If the config startup handle was already taken or if it is not valid."]
25 pub fn take_from_startup_handle() -> Self {
26 <Self as ComponentConfig>::take_from_startup_handle()
27 }
28 #[doc = r" Parse `Self` from `vmo`."]
29 pub fn from_vmo(vmo: &zx::Vmo) -> Result<Self, Error> {
30 <Self as ComponentConfig>::from_vmo(vmo)
31 }
32 #[doc = r" Parse `Self` from `bytes`."]
33 pub fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
34 <Self as ComponentConfig>::from_bytes(bytes)
35 }
36 pub fn record_inspect(&self, inspector_node: &Node) {
37 <Self as ComponentConfig>::record_inspect(self, inspector_node)
38 }
39}
40impl ComponentConfig for Config {
41 #[doc = r" Parse `Self` from `bytes`."]
42 fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
43 let (checksum_len_bytes, bytes) = bytes.split_at_checked(2).ok_or(Error::TooFewBytes)?;
44 let checksum_len_bytes: [u8; 2] =
45 checksum_len_bytes.try_into().expect("previous call guaranteed 2 element slice");
46 let checksum_length = u16::from_le_bytes(checksum_len_bytes) as usize;
47 let (observed_checksum, bytes) =
48 bytes.split_at_checked(checksum_length).ok_or(Error::TooFewBytes)?;
49 if observed_checksum != EXPECTED_CHECKSUM {
50 return Err(Error::ChecksumMismatch {
51 expected_checksum: EXPECTED_CHECKSUM.to_vec(),
52 observed_checksum: observed_checksum.to_vec(),
53 });
54 }
55 let fidl_config: FidlConfig = unpersist(bytes).map_err(Error::Unpersist)?;
56 Ok(Self {
57 bredr_connectable: fidl_config.bredr_connectable,
58 bredr_security_mode: fidl_config.bredr_security_mode,
59 le_background_scanning: fidl_config.le_background_scanning,
60 le_privacy: fidl_config.le_privacy,
61 le_security_mode: fidl_config.le_security_mode,
62 })
63 }
64 fn to_bytes(&self) -> Result<Vec<u8>, Error> {
65 let fidl_config = FidlConfig {
66 bredr_connectable: self.bredr_connectable.clone(),
67 bredr_security_mode: self.bredr_security_mode.clone(),
68 le_background_scanning: self.le_background_scanning.clone(),
69 le_privacy: self.le_privacy.clone(),
70 le_security_mode: self.le_security_mode.clone(),
71 };
72 let mut fidl_bytes = fidl::persist(&fidl_config).map_err(Error::Persist)?;
73 let mut bytes = Vec::with_capacity(
74 EXPECTED_CHECKSUM_LENGTH.len() + EXPECTED_CHECKSUM.len() + fidl_bytes.len(),
75 );
76 bytes.extend_from_slice(&EXPECTED_CHECKSUM_LENGTH);
77 bytes.extend_from_slice(EXPECTED_CHECKSUM);
78 bytes.append(&mut fidl_bytes);
79 Ok(bytes)
80 }
81 fn record_inspect(&self, inspector_node: &Node) {
82 inspector_node.record_bool("bredr_connectable", self.bredr_connectable);
83 inspector_node.record_string("bredr_security_mode", &self.bredr_security_mode);
84 inspector_node.record_bool("le_background_scanning", self.le_background_scanning);
85 inspector_node.record_bool("le_privacy", self.le_privacy);
86 inspector_node.record_string("le_security_mode", &self.le_security_mode);
87 }
88}