equal
deleted
inserted
replaced
694 LOG(_L8("\tACCESS DENIED")); |
694 LOG(_L8("\tACCESS DENIED")); |
695 } |
695 } |
696 else if(aResult == EBTSecManAccessGranted) |
696 else if(aResult == EBTSecManAccessGranted) |
697 { |
697 { |
698 LOG(_L8("\tACCESS GRANTED")); |
698 LOG(_L8("\tACCESS GRANTED")); |
699 if (RemoteIndicatedNoBondingToDedicatedBonding()) |
|
700 { |
|
701 // We allow the device to bond, but tell theUI layer so it can delete the link key if it wants to |
|
702 aResult = KErrRemoteDeviceIndicatedNoBonding; |
|
703 LOG(_L8("\t... but remote indicated no bonding")); |
|
704 } |
|
705 } |
699 } |
706 else |
700 else |
707 { |
701 { |
708 LOG1(_L8("\tERROR (%d)"), aResult); |
702 LOG1(_L8("\tERROR (%d)"), aResult); |
709 } |
703 } |
710 #endif // __FLOG_ACTIVE |
704 #endif // __FLOG_ACTIVE |
|
705 |
|
706 if (aResult == EBTSecManAccessGranted && RemoteIndicatedNoBondingToDedicatedBonding()) |
|
707 { |
|
708 // We allow the device to bond, but tell theUI layer so it can delete the link key if it wants to |
|
709 aResult = KErrRemoteDeviceIndicatedNoBonding; |
|
710 LOG(_L8("\t... but remote indicated no bonding")); |
|
711 } |
|
712 |
711 iSecMan.AccessRequestComplete(this, aResult); |
713 iSecMan.AccessRequestComplete(this, aResult); |
712 } |
714 } |
713 |
715 |
714 /** |
716 /** |
715 Take the access requirements of the service and compare them with the permissions given |
717 Take the access requirements of the service and compare them with the permissions given |