OCStackResult GetDoxmIsOwned(bool *isOwned)
{
+ OIC_LOG_V(INFO, TAG, "In %s", __func__);
if (isOwned && gDoxm)
{
- *isOwned = gDoxm->owned;
+ *isOwned = gDoxm->owned;
+ OIC_LOG_V(INFO, TAG, "isOwned - %s", *isOwned ? "true" : "false");
+ OIC_LOG_V(INFO, TAG, "Out %s", __func__);
return OC_STACK_OK;
}
return OC_STACK_ERROR;
const char *resource,
const uint16_t requestedPermission)
{
+ OIC_LOG_V(INFO, TAG, "In %s", __func__);
+
SRMAccessResponse_t retVal = ACCESS_DENIED_POLICY_ENGINE_ERROR;
VERIFY_NON_NULL(TAG, context, ERROR);
// AND c) the request is for a SVR resource.
// If all 3 conditions are met, grant request.
bool isDeviceOwned = true; // default to value that will not grant access
+ OIC_LOG_V(INFO, TAG, "IsRequestFromDevOwner - %s", IsRequestFromDevOwner(context) ? "true" : "false");
+ OIC_LOG_V(INFO, TAG, "Pstat IsOp - %s", GetPstatIsop() ? "true" : "false");
+
if (OC_STACK_OK != GetDoxmIsOwned(&isDeviceOwned)) // if runtime error, don't grant
{
context->retVal = ACCESS_DENIED_POLICY_ENGINE_ERROR;
}
exit:
+ OIC_LOG_V(INFO, TAG, "context->retVal - %d", retVal);
+ OIC_LOG_V(INFO, TAG, "Out %s", __func__);
return retVal;
}