Index: firmware/App/Services/SystemCommMessages.c =================================================================== diff -u -refead43ba16292aa173f72ebfa2b73aebfd2a587 -rce45405bd0094f54a599a1906e201622347fd15a --- firmware/App/Services/SystemCommMessages.c (.../SystemCommMessages.c) (revision efead43ba16292aa173f72ebfa2b73aebfd2a587) +++ firmware/App/Services/SystemCommMessages.c (.../SystemCommMessages.c) (revision ce45405bd0094f54a599a1906e201622347fd15a) @@ -8895,4 +8895,36 @@ sendTestAckResponseMsg( (MSG_ID_T)message->hdr.msgID, status ); } +/*********************************************************************//** +* @brief +* The handleBloodLeakEmbModeInfoValuesOverride function handles the blood +* leak embedded mode info commands override. +* @details Inputs: none +* @details Outputs: message handled +* @param message a pointer to the message to handle +* @return none +*************************************************************************/ +void handleBloodLeakEmbModeInfoValuesOverride( MESSAGE_T* message ) +{ + TEST_OVERRIDE_ARRAY_PAYLOAD_T payload; + BOOL result = FALSE; + + // verify payload length + if ( sizeof( TEST_OVERRIDE_ARRAY_PAYLOAD_T ) == message->hdr.payloadLen ) + { + memcpy( &payload, message->payload, sizeof( TEST_OVERRIDE_ARRAY_PAYLOAD_T ) ); + if ( FALSE == payload.reset ) + { + result = testSetBloodLeakEmbeddedModeInfoOverride( payload.index, payload.state.u32 ); + } + else + { + result = testResetBloodLeakEmbeddedModeInfoOverride( payload.index ); + } + } + + // respond to request + sendTestAckResponseMsg( (MSG_ID_T)message->hdr.msgID, result ); +} + /**@}*/