static GVariant *__bt_hal_service_getall(GDBusProxy *device, const char *interface);
static void __bt_hal_agent_release_memory(void);
static inline void stack_trim(void);
-static void __bt_hal_send_authorize_request_event(const gchar *address, const char *uuid);
#ifdef TIZEN_SYSPOPUP_SUPPORTED
static gboolean __bt_hal_device_is_hid_keyboard(unsigned int dev_class);
#else
static void __bt_hal_send_ssp_request_events(const gchar *address, const gchar *name,
guint passkey, uint32_t cod, unsigned char variant);
+static void __bt_hal_send_authorize_request_event(const gchar *address, const char *uuid);
#endif
void* _bt_hal_create_agent(const char *path, gboolean adapter)
return adapter_agent;
}
+#ifndef TIZEN_SYSPOPUP_SUPPORTED
static void __bt_hal_send_authorize_request_event(const gchar *address, const char *uuid)
{
struct hal_ev_authorize_request ev;
DBG("-");
}
+#endif
/* Legacy Pairing */
static void __bt_hal_send_pin_request_event(const gchar *address, const gchar *name,
*/
#ifdef TIZEN_SYSPOPUP_SUPPORTED
DBG("Launch Syspopup: AUTHORIZE_REQUEST");
- _bt_hal_launch_system_popup(BT_AGENT_EVENT_AUTHORIZE_REQUEST,
+ _bt_hal_launch_system_popup(BT_HAL_AGENT_EVENT_AUTHORIZE_REQUEST,
name, NULL, NULL, _gap_agent_get_path(agent));
#else
__bt_hal_send_authorize_request_event(address, uuid);
DBG("Accept: %d", accept);
gap_agent_reply_confirmation(priv, accept, invocation);
} else if (g_strcmp0(method_name, "ReplyAuthorize") == 0) {
- /* TODO */
+ GapAgentPrivate *priv = user_data;
+ const guint accept;
+
+ g_variant_get(parameters, "(u)", &accept);
+ DBG("Accept: %d", accept);
+ gap_agent_reply_authorize(priv, accept, invocation);
}
DBG("-");
}
%if %{bt_bluez_hal} == ENABLED
export BT_INCLUDE_OAL_BLUEZ=ENABLED
export CFLAGS="$CFLAGS -DTIZEN_BT_INCLUDE_OAL_BLUEZ"
-#export CFLAGS="$CFLAGS -DTIZEN_SYSPOPUP_SUPPORTED"
+export CFLAGS="$CFLAGS -DTIZEN_SYSPOPUP_SUPPORTED"
%else
export BT_INCLUDE_OAL_BLUEZ=DISABLED
%endif