bluetooth/btstack/secman/btaccessrequester.cpp
branchRCL_3
changeset 14 9b6d3ca0c601
parent 13 20fda83a6398
child 18 f8503e232b0c
equal deleted inserted replaced
13:20fda83a6398 14:9b6d3ca0c601
   694 		LOG(_L8("\tACCESS DENIED"));
   694 		LOG(_L8("\tACCESS DENIED"));
   695 		}
   695 		}
   696 	else if(aResult == EBTSecManAccessGranted)
   696 	else if(aResult == EBTSecManAccessGranted)
   697 		{
   697 		{
   698 		LOG(_L8("\tACCESS GRANTED"));
   698 		LOG(_L8("\tACCESS GRANTED"));
   699 		if (RemoteIndicatedNoBondingToDedicatedBonding())
       
   700 			{
       
   701 			// We allow the device to bond, but tell theUI layer so it can delete the link key if it wants to
       
   702 			aResult = KErrRemoteDeviceIndicatedNoBonding;
       
   703 			LOG(_L8("\t... but remote indicated no bonding"));
       
   704 			}
       
   705 		}
   699 		}
   706 	else
   700 	else
   707 		{
   701 		{
   708 		LOG1(_L8("\tERROR (%d)"), aResult);
   702 		LOG1(_L8("\tERROR (%d)"), aResult);
   709 		}
   703 		}
   710 #endif // __FLOG_ACTIVE
   704 #endif // __FLOG_ACTIVE
       
   705 	
       
   706 	if (aResult == EBTSecManAccessGranted && RemoteIndicatedNoBondingToDedicatedBonding())
       
   707 		{
       
   708 		// We allow the device to bond, but tell theUI layer so it can delete the link key if it wants to
       
   709 		aResult = KErrRemoteDeviceIndicatedNoBonding;
       
   710 		LOG(_L8("\t... but remote indicated no bonding"));
       
   711 		}
       
   712 	
   711 	iSecMan.AccessRequestComplete(this, aResult);
   713 	iSecMan.AccessRequestComplete(this, aResult);
   712 	}
   714 	}
   713 
   715 
   714 /**
   716 /**
   715 Take the access requirements of the service and compare them with the permissions given 
   717 Take the access requirements of the service and compare them with the permissions given