うおーるぼっとをiPhoneでコントロールするプログラムです。 iPhoneとはBTLEで接続しています。

Dependencies:   FatFileSystem HighSpeedAnalogIn TB6612FNG2 mbed

Committer:
jksoft
Date:
Fri May 10 11:48:07 2013 +0000
Revision:
0:373bcb197dc8
?????????

Who changed what in which revision?

UserRevisionLine numberNew contents of line
jksoft 0:373bcb197dc8 1
jksoft 0:373bcb197dc8 2 // profile.h generated from profile.gatt for BTstack
jksoft 0:373bcb197dc8 3
jksoft 0:373bcb197dc8 4 // binary representation
jksoft 0:373bcb197dc8 5 // attribute size in bytes (16), flags(16), handle (16), uuid (16/128), value(...)
jksoft 0:373bcb197dc8 6
jksoft 0:373bcb197dc8 7 #include <stdint.h>
jksoft 0:373bcb197dc8 8
jksoft 0:373bcb197dc8 9 const uint8_t profile_data[] =
jksoft 0:373bcb197dc8 10 {
jksoft 0:373bcb197dc8 11 // 0x0001 PRIMARY_SERVICE-GAP_SERVICE
jksoft 0:373bcb197dc8 12 0x0a, 0x00, 0x02, 0x00, 0x01, 0x00, 0x00, 0x28, 0x00, 0x18,
jksoft 0:373bcb197dc8 13 // 0x0002 CHARACTERISTIC-GAP_DEVICE_NAME-READ
jksoft 0:373bcb197dc8 14 0x0d, 0x00, 0x02, 0x00, 0x02, 0x00, 0x03, 0x28, 0x02, 0x03, 0x00, 0x00, 0x2a,
jksoft 0:373bcb197dc8 15 // 0x0003 VALUE-GAP_DEVICE_NAME-READ-"WALLBOT BLE1.0"
jksoft 0:373bcb197dc8 16 0x16, 0x00, 0x02, 0x00, 0x03, 0x00, 0x00, 0x2a, 0x57, 0x41, 0x4c, 0x4c, 0x42, 0x4f, 0x54, 0x20, 0x42, 0x4c, 0x45, 0x31, 0x2e, 0x30,
jksoft 0:373bcb197dc8 17 // 0x0004 CHARACTERISTIC-GAP_APPEARANCE-READ
jksoft 0:373bcb197dc8 18 0x0d, 0x00, 0x02, 0x00, 0x04, 0x00, 0x03, 0x28, 0x02, 0x05, 0x00, 0x01, 0x2a,
jksoft 0:373bcb197dc8 19 // 0x0005 VALUE-GAP_APPEARANCE-READ-00 00
jksoft 0:373bcb197dc8 20 0x0a, 0x00, 0x02, 0x00, 0x05, 0x00, 0x01, 0x2a, 0x00, 0x00,
jksoft 0:373bcb197dc8 21 // 0x0006 PRIMARY_SERVICE-GATT_SERVICE
jksoft 0:373bcb197dc8 22 0x0a, 0x00, 0x02, 0x00, 0x06, 0x00, 0x00, 0x28, 0x01, 0x18,
jksoft 0:373bcb197dc8 23 // 0x0007 CHARACTERISTIC-GATT_SERVICE_CHANGED-READ
jksoft 0:373bcb197dc8 24 0x0d, 0x00, 0x02, 0x00, 0x07, 0x00, 0x03, 0x28, 0x02, 0x08, 0x00, 0x05, 0x2a,
jksoft 0:373bcb197dc8 25 // 0x0008 VALUE-GATT_SERVICE_CHANGED-READ-
jksoft 0:373bcb197dc8 26 0x08, 0x00, 0x02, 0x00, 0x08, 0x00, 0x05, 0x2a,
jksoft 0:373bcb197dc8 27 // 0x0009 PRIMARY_SERVICE-FFF0
jksoft 0:373bcb197dc8 28 0x0a, 0x00, 0x02, 0x00, 0x09, 0x00, 0x00, 0x28, 0xf0, 0xff,
jksoft 0:373bcb197dc8 29 // 0x000a CHARACTERISTIC-FFF1-READ | WRITE | DYNAMIC
jksoft 0:373bcb197dc8 30 0x0d, 0x00, 0x02, 0x00, 0x0a, 0x00, 0x03, 0x28, 0x0a, 0x0b, 0x00, 0xf1, 0xff,
jksoft 0:373bcb197dc8 31 // 0x000b VALUE-FFF1-READ | WRITE | DYNAMIC-
jksoft 0:373bcb197dc8 32 0x08, 0x00, 0x0a, 0x01, 0x0b, 0x00, 0xf1, 0xff,
jksoft 0:373bcb197dc8 33 // 0x000c CHARACTERISTIC-FFF2-READ | WRITE | DYNAMIC
jksoft 0:373bcb197dc8 34 0x0d, 0x00, 0x02, 0x00, 0x0c, 0x00, 0x03, 0x28, 0x0a, 0x0d, 0x00, 0xf2, 0xff,
jksoft 0:373bcb197dc8 35 // 0x000d VALUE-FFF2-READ | WRITE | DYNAMIC-
jksoft 0:373bcb197dc8 36 0x08, 0x00, 0x0a, 0x01, 0x0d, 0x00, 0xf2, 0xff,
jksoft 0:373bcb197dc8 37 // 0x000e CHARACTERISTIC-FFF3-READ | WRITE | DYNAMIC
jksoft 0:373bcb197dc8 38 0x0d, 0x00, 0x02, 0x00, 0x0e, 0x00, 0x03, 0x28, 0x0a, 0x0f, 0x00, 0xf3, 0xff,
jksoft 0:373bcb197dc8 39 // 0x000f VALUE-FFF3-READ | WRITE | DYNAMIC-
jksoft 0:373bcb197dc8 40 0x08, 0x00, 0x0a, 0x01, 0x0f, 0x00, 0xf3, 0xff,
jksoft 0:373bcb197dc8 41 // END
jksoft 0:373bcb197dc8 42 0x00, 0x00,
jksoft 0:373bcb197dc8 43 }; // total size 110 bytes