Click here to Skip to main content
15,886,101 members
Articles / Mobile Apps / Windows Mobile

Managed Wrapper to Connection Manager and How to Bypass the Connection Planner

Rate me:
Please Sign up or sign in to vote.
4.33/5 (11 votes)
24 Sep 2008Public Domain4 min read 69.1K   1.5K   37  
This article explains how we can bypass the Connection Planner and establish a connection using the Connection Manager APIs on Windows Mobile devices.
//===============================================================================
// Microsoft patterns & practices
// Mobile Client Software Factory - July 2006
//===============================================================================
// Copyright  Microsoft Corporation.  All rights reserved.
// THIS CODE AND INFORMATION IS PROVIDED "AS IS" WITHOUT WARRANTY
// OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT
// LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
// FITNESS FOR A PARTICULAR PURPOSE.
//===============================================================================
// The example companies, organizations, products, domain names,
// e-mail addresses, logos, people, places, and events depicted
// herein are fictitious.  No association with any real company,
// organization, product, domain name, email address, logo, person,
// places, or events is intended or should be inferred.
//===============================================================================

using System;
using System.Collections.Generic;
using System.Text;

namespace Microsoft.Practices.Mobile.Configuration
{
	/// <summary>
	///		This is the base class for providers that can decrypt sections of the configuration XML.
	///		Right now the only subclass is <see cref="RijndaelConfigurationProvider"/>.
	/// </summary>
	public abstract class ProtectedConfigurationProvider
	{
		/// <summary>
		///		This method is called with the encrypted string and must return the decrypted string.
		/// </summary>
		/// <param name="encryptedSection">The encrypted string.</param>
		/// <returns>The decrypted string.</returns>
		public abstract string Decrypt(string encryptedSection);
	}
}

By viewing downloads associated with this article you agree to the Terms of Service and the article's licence.

If a file you wish to view isn't highlighted, and is a text file (not binary), please let us know and we'll add colourisation support for it.

License

This article, along with any associated source code and files, is licensed under A Public Domain dedication


Written By
Architect Tata Consultancy Services
India India
Naynesh Shah is a senior solution architect working with the Mobile Solutions - Technology Excellency Group of TATA Consultancy Services.

He specializes in architecting enterprise and embedded mobile solutions based on Windows CE and Windows Mobile. He is also involved in helping customers define the mobile middleware adoption strategy.

Comments and Discussions