Updated
Fork of BLE_API by
Diff: ble/BLE.h
- Revision:
- 1077:98d37e26903c
- Parent:
- 1075:0d0dafb54bc9
- Child:
- 1078:79c089630b38
--- a/ble/BLE.h Mon Jan 11 08:51:43 2016 +0000 +++ b/ble/BLE.h Mon Jan 11 08:51:43 2016 +0000 @@ -196,7 +196,7 @@ * directly, as it returns references to singletons. * * @param[in] id - * Instance-ID. This should be less than NUM_INSTANCES + * Instance-ID. This should be less than NUM_INSTANCES * for the returned BLE singleton to be useful. * * @return a reference to a single object. @@ -239,7 +239,7 @@ * ble.setAddress(...) should be replaced with * ble.gap().setAddress(...). */ - ble_error_t setAddress(BLEProtocol::AddressType::Type type, const Gap::Address_t address) { + ble_error_t setAddress(Gap::AddressType_t type, const Gap::Address_t address) { return gap().setAddress(type, address); } @@ -252,7 +252,7 @@ * ble.getAddress(...) should be replaced with * ble.gap().getAddress(...). */ - ble_error_t getAddress(BLEProtocol::AddressType::Type *typeP, Gap::Address_t address) { + ble_error_t getAddress(Gap::AddressType_t *typeP, Gap::Address_t address) { return gap().getAddress(typeP, address); } @@ -753,7 +753,7 @@ * ble.gap().connect(...). */ ble_error_t connect(const Gap::Address_t peerAddr, - BLEProtocol::AddressType::Type peerAddrType = BLEProtocol::AddressType::RANDOM_STATIC, + Gap::AddressType_t peerAddrType = Gap::ADDR_TYPE_RANDOM_STATIC, const Gap::ConnectionParams_t *connectionParams = NULL, const GapScanningParams *scanParams = NULL) { return gap().connect(peerAddr, peerAddrType, connectionParams, scanParams); @@ -773,7 +773,7 @@ } /** - * This call initiates the disconnection procedure, and its completion + * This call initiates the disconnection procedure, and its completion * is communicated to the application with an invocation of the * onDisconnection callback. * @@ -1407,7 +1407,7 @@ /** * Set up a callback for when the passkey needs to be displayed on a * peripheral with DISPLAY capability. This happens when security is - * configured to prevent Man-In-The-Middle attacks, and the peers need to exchange + * configured to prevent Man-In-The-Middle attacks, and the peers need to exchange * a passkey (or PIN) to authenticate the connection * attempt. *