diff -r e0432375ea67 -r 5d3e34b7618a securitydialogs/SecUi/Src/SecQueryUi.cpp --- a/securitydialogs/SecUi/Src/SecQueryUi.cpp Tue Jul 06 15:15:05 2010 +0300 +++ b/securitydialogs/SecUi/Src/SecQueryUi.cpp Wed Aug 18 10:40:08 2010 +0300 @@ -93,7 +93,7 @@ TDes& aDataText, TInt aMinLength, TInt aMaxLength, TInt aMode) { RDEBUG("aCaption", 0); - RDebug::Print(aCaption); + RDEBUGSTR(aCaption); RDEBUG("aMode", aMode); TInt secUiOriginatedQuery(ESecurityUIsSecUIOriginatedUninitialized); TInt err = RProperty::Get(KPSUidSecurityUIs, @@ -170,7 +170,7 @@ RDEBUG("error", error); User::LeaveIfError(error); RDEBUG("iPassword", 0); - RDebug::Print(iPassword); + RDEBUGSTR(iPassword); aDataText.Copy(iPassword); err = RProperty::Set(KPSUidSecurityUIs, KSecurityUIsSecUIOriginatedQuery, @@ -355,13 +355,13 @@ { TPtrC acceptedValueTop = *acceptedVariantTop->Value (); RDEBUG("acceptedValueTop", 0); - RDebug::Print(acceptedValueTop); + RDEBUGSTR(acceptedValueTop); iPassword.Copy(acceptedValueTop); if (iReturnValue == KErrCompletion) // the user didn't OK. It was send automatically because validating new lock code through TARM { _LIT(KInvalidNewLockCode, "invalidNewLockCode"); - _LIT(KInvalidNewLockCode0, "invalidNewLockCode#0"); + _LIT(KInvalidNewLockCode0, "invalidNewLockCode$-1"); AddParamL(KInvalidNewLockCode, KInvalidNewLockCode0); // for starter RSCPClient scpClient; TSCPSecCode newCode; @@ -372,18 +372,20 @@ RArray aFailedPolicies; TDevicelockPolicies failedPolicy; TInt retLockcode = KErrNone; + TInt nPoliciesFailed = 0; RDEBUG( "scpClient.VerifyNewLockcodeAgainstPolicies", 0 ); retLockcode = scpClient.VerifyNewLockcodeAgainstPolicies( newCode, aFailedPolicies ); RDEBUG( "retLockcode", retLockcode ); - RDEBUG( "aFailedPolicies.Count()", aFailedPolicies.Count() ); - for(TInt i=0; i KInvalidNewLockCodeX; KInvalidNewLockCodeX.Zero(); KInvalidNewLockCodeX.Append(_L("invalidNewLockCode")); KInvalidNewLockCodeX.Append(_L("#")); - KInvalidNewLockCodeX.AppendNum(failedPolicy); - AddParamL( KInvalidNewLockCode, KInvalidNewLockCodeX ); - } + nPoliciesFailed = aFailedPolicies.Count(); + RDEBUG( "nPoliciesFailed", nPoliciesFailed ); + for(TInt i=0; i KInvalidNewLockCodeX; KInvalidNewLockCodeX.Zero(); KInvalidNewLockCodeX.Append(_L("invalidNewLockCode")); KInvalidNewLockCodeX.Append(_L("$")); + KInvalidNewLockCodeX.AppendNum(failedPolicy); + AddParamL( KInvalidNewLockCode, KInvalidNewLockCodeX ); // it overwrites the previous one + } // TODO this should be able to modify MinLenght, MaxLenght scpClient.Close(); }