securitydialogs/SecUi/Src/SecQueryUi.cpp
changeset 22 6b63ca65093a
parent 19 098e361762d2
child 26 aad866c37519
equal deleted inserted replaced
19:098e361762d2 22:6b63ca65093a
    20 #include <hb/hbcore/hbdevicedialogsymbian.h>    // CHbDeviceDialogSymbian
    20 #include <hb/hbcore/hbdevicedialogsymbian.h>    // CHbDeviceDialogSymbian
    21 #include <hb/hbcore/hbsymbianvariant.h>         // CHbSymbianVariantMap
    21 #include <hb/hbcore/hbsymbianvariant.h>         // CHbSymbianVariantMap
    22 #include <apgicnfl.h>                           // CApaMaskedBitmap
    22 #include <apgicnfl.h>                           // CApaMaskedBitmap
    23 #include <securityuisprivatepskeys.h>
    23 #include <securityuisprivatepskeys.h>
    24 
    24 
    25 #include <CPhCltEmergencyCall.h>
    25 #include <cphcltemergencycall.h>
    26 #include <SCPClient.h>
    26 #include <SCPClient.h>
    27 #include "SecUiWait.h"
    27 #include "SecUiWait.h"
    28 
       
    29 // Variant map keys for notification device dialog
       
    30 _LIT( KNotifDeviceDialogKeyTimeOut, "timeout" );
       
    31 _LIT( KNotifDeviceDialogKeyIconName, "iconName" );
       
    32 _LIT( KNotifDeviceDialogKeyText, "text" );
       
    33 _LIT( KNotifDeviceDialogKeyTitle, "title" );
       
    34 _LIT( KNotifDeviceDialogKeyTouchActivation, "touchActivation" );
       
    35 _LIT( KNotifDeviceDialogKeyActivated, "result" );
       
    36 _LIT( KNotifDeviceDialogKeyActivatedValue, "activated" );
       
    37 _LIT( KNotifDeviceDialogKeyTitleTextWrapping, "titleTextWrapping" );
       
    38 
    28 
    39 const TUid KSWInstHelpUid =
    29 const TUid KSWInstHelpUid =
    40     {
    30     {
    41     0x101F8512
    31     0x101F8512
    42     }; // TODO
    32     }; // TODO
   347 
   337 
   348         if (iReturnValue == KErrCompletion) // the user didn't OK. It was send automatically because validating new lock code through TARM
   338         if (iReturnValue == KErrCompletion) // the user didn't OK. It was send automatically because validating new lock code through TARM
   349             {
   339             {
   350             _LIT(KInvalidNewLockCode, "invalidNewLockCode");
   340             _LIT(KInvalidNewLockCode, "invalidNewLockCode");
   351             _LIT(KInvalidNewLockCode0, "invalidNewLockCode#0");
   341             _LIT(KInvalidNewLockCode0, "invalidNewLockCode#0");
   352             _LIT(KInvalidNewLockCode1, "invalidNewLockCode#1");
       
   353             _LIT(KInvalidNewLockCode2, "invalidNewLockCode#2");
       
   354             AddParamL(KInvalidNewLockCode, KInvalidNewLockCode0); // for starter
   342             AddParamL(KInvalidNewLockCode, KInvalidNewLockCode0); // for starter
   355             RSCPClient scpClient;
   343             RSCPClient scpClient;
   356             TSCPSecCode newCode;
   344             TSCPSecCode newCode;
   357             newCode.Copy(acceptedValueTop);
   345             newCode.Copy(acceptedValueTop);
   358             RDEBUG("scpClient.Connect", 0);
   346             RDEBUG("scpClient.Connect", 0);
   359             if (scpClient.Connect() == KErrNone)
   347             if (scpClient.Connect() == KErrNone)
   360                 {
   348                 {
   361                 /*
       
   362                  RArray<TDevicelockPolicies> aFailedPolicies;
   349                  RArray<TDevicelockPolicies> aFailedPolicies;
   363                  TDevicelockPolicies failedPolicy;
   350                  TDevicelockPolicies failedPolicy;
   364                  TInt retLockcode = KErrNone;
   351                  TInt retLockcode = KErrNone;
   365                  RDEBUG( "scpClient.VerifyNewLockcodeAgainstPolicies", 0 );
   352                  RDEBUG( "scpClient.VerifyNewLockcodeAgainstPolicies", 0 );
   366                  retLockcode = scpClient.VerifyNewLockcodeAgainstPolicies( newCode, aFailedPolicies );
   353                  retLockcode = scpClient.VerifyNewLockcodeAgainstPolicies( newCode, aFailedPolicies );
   372                  RDEBUG( "failedPolicy", failedPolicy );
   359                  RDEBUG( "failedPolicy", failedPolicy );
   373                  TBuf<0x100> KInvalidNewLockCodeX;   KInvalidNewLockCodeX.Zero();    KInvalidNewLockCodeX.Append(_L("invalidNewLockCode"));  KInvalidNewLockCodeX.Append(_L("#"));
   360                  TBuf<0x100> KInvalidNewLockCodeX;   KInvalidNewLockCodeX.Zero();    KInvalidNewLockCodeX.Append(_L("invalidNewLockCode"));  KInvalidNewLockCodeX.Append(_L("#"));
   374                  KInvalidNewLockCodeX.AppendNum(failedPolicy);
   361                  KInvalidNewLockCodeX.AppendNum(failedPolicy);
   375                  AddParamL( KInvalidNewLockCode, KInvalidNewLockCodeX );
   362                  AddParamL( KInvalidNewLockCode, KInvalidNewLockCodeX );
   376                  }
   363                  }
   377                  */
       
   378                 // TODO this should be able to modify MinLenght, MaxLenght
   364                 // TODO this should be able to modify MinLenght, MaxLenght
   379                 scpClient.Close();
   365                 scpClient.Close();
   380                 }
   366                 }
   381             RDEBUG("iDeviceDialog->Update", 0);
   367             RDEBUG("iDeviceDialog->Update", 0);
   382             iDeviceDialog->Update(*iVariantMap);
   368             iDeviceDialog->Update(*iVariantMap);