Lines Matching defs:setting

122  * key derived from the setting type in the most significant bits and user
359 for (String setting : settingsToBackup) {
360 if (validators.get(setting) == null) {
361 offenders.append(setting).append(" ");
384 Setting setting = getGlobalSetting(name);
385 return packageValueForCallResult(setting, isTrackingGeneration(args));
389 Setting setting = getSecureSetting(name, requestingUserId,
391 return packageValueForCallResult(setting, isTrackingGeneration(args));
395 Setting setting = getSystemSetting(name, requestingUserId);
396 return packageValueForCallResult(setting, isTrackingGeneration(args));
471 Setting setting = getGlobalSetting(args.name);
472 return packageSettingForQuery(setting, normalizedProjection);
481 Setting setting = getSecureSetting(args.name, userId);
482 return packageSettingForQuery(setting, normalizedProjection);
491 Setting setting = getSystemSetting(args.name, userId);
492 return packageSettingForQuery(setting, normalizedProjection);
679 // Redirect cache to parent if ringtone setting is owned by profile parent
763 Setting setting = settingsState.getSettingLocked(name);
764 pw.print("_id:"); pw.print(toDumpString(setting.getId()));
766 if (setting.getPackageName() != null) {
767 pw.print(" pkg:"); pw.print(setting.getPackageName());
769 pw.print(" value:"); pw.print(toDumpString(setting.getValue()));
770 if (setting.getDefaultValue() != null) {
771 pw.print(" default:"); pw.print(setting.getDefaultValue());
772 pw.print(" defaultSystemSet:"); pw.print(setting.isDefaultFromSystem());
774 if (setting.getTag() != null) {
775 pw.print(" tag:"); pw.print(setting.getTag());
839 // should be reworked to keep them separate and system code should check the setting
853 Setting setting = getSecureSetting(
856 setting != null ? setting.getValue() : null, null,
868 Setting setting = getGlobalSetting(Settings.Global.INSTALL_NON_MARKET_APPS);
869 String value = setting != null ? setting.getValue() : null;
882 Setting setting = getGlobalSetting(Settings.Global.ADB_ENABLED);
883 String value = setting != null ? setting.getValue() : null;
916 Setting setting = getGlobalSetting(
918 String value = setting != null ? setting.getValue() : null;
950 Setting setting = settingsState.getSettingLocked(name);
951 appendSettingToCursor(result, setting);
963 // Ensure the caller can access the setting.
1022 // If this is a setting that is currently restricted for this user, do not allow
1098 // This caller is not permitted to access this setting. Pretend the setting
1105 final Setting setting;
1107 setting = getSsaidSettingLocked(ssaidCallingPkg, owningUserId);
1109 setting = mSettingsRegistry.getSettingLocked(SETTINGS_TYPE_SECURE, owningUserId,
1112 appendSettingToCursor(result, setting);
1131 // Ensure the caller can access the setting.
1138 // This caller is not permitted to access this setting. Pretend the setting doesn't
1213 Setting setting = mSettingsRegistry.getSettingLocked(SETTINGS_TYPE_SSAID,
1215 return mascaradeSsaidSetting(ssaidSettings, setting);
1220 Setting setting = mSettingsRegistry.generateSsaidLocked(callingPkg, owningUserId);
1221 return mascaradeSsaidSetting(ssaidSettings, setting);
1251 final Setting setting = getGlobalSetting(
1253 if (!"1".equals(setting.getValue())) {
1330 // If this is a setting that is currently restricted for this user, do not allow
1340 // Only the owning user can change the setting.
1404 Setting setting = mSettingsRegistry.getSettingLocked(
1406 appendSettingToCursor(result, setting);
1421 // Ensure the caller can access the setting.
1484 // Only the owning user id can change the setting.
1545 + " for setting: " + name);
1550 * Returns {@code true} if the specified secure setting should be accessible to the caller.
1564 // address in this secure setting. Secure settings can normally be read by any app,
1567 // To mitigate this we make this setting available only to callers privileged to see
1591 private int resolveOwningUserIdForSecureSettingLocked(int userId, String setting) {
1592 return resolveOwningUserIdLocked(userId, sSecureCloneToManagedSettings, setting);
1595 private int resolveOwningUserIdForSystemSettingLocked(int userId, String setting) {
1597 // Resolves dependency if setting has a dependency and the calling user has a parent
1598 if (sSystemCloneFromParentOnDependency.containsKey(setting)
1600 // The setting has a dependency and the profile has a parent
1601 String dependency = sSystemCloneFromParentOnDependency.get(setting);
1602 // Lookup the dependency setting as ourselves, some callers may not have access to it.
1613 return resolveOwningUserIdLocked(userId, sSystemCloneToManagedSettings, setting);
1723 + " trying to access unexposed setting, this will be an error in the future.");
1786 * This setting contains a list of the currently enabled location providers.
1876 "get/set setting for user", null);
1879 private Bundle packageValueForCallResult(Setting setting,
1882 if (setting == null || setting.isNull()) {
1885 return Bundle.forPair(Settings.NameValueTable.VALUE, setting.getValue());
1889 !setting.isNull() ? setting.getValue() : null);
1891 mSettingsRegistry.mGenerationRegistry.addGenerationData(result, setting.getKey());
1965 private static MatrixCursor packageSettingForQuery(Setting setting, String[] projection) {
1966 if (setting.isNull()) {
1970 appendSettingToCursor(cursor, setting);
1990 private static void appendSettingToCursor(MatrixCursor cursor, Setting setting) {
1991 if (setting == null || setting.isNull()) {
2003 values[i] = setting.getId();
2007 values[i] = setting.getName();
2011 values[i] = setting.getValue();
2287 // Migrate the setting for this user if needed.
2474 Setting setting = settingsState.getSettingLocked(name);
2475 if (packageName.equals(setting.getPackageName())) {
2476 if (tag != null && !tag.equals(setting.getTag())) {
2493 Setting setting = settingsState.getSettingLocked(name);
2495 setting.getPackageName())) {
2510 Setting setting = settingsState.getSettingLocked(name);
2512 setting.getPackageName())) {
2513 if (setting.isDefaultFromSystem()) {
2531 Setting setting = settingsState.getSettingLocked(name);
2533 if (setting.isDefaultFromSystem()) {
2761 // change notification for the location setting.
3024 * This is an example of moving a setting from secure to global.
3066 // v120: Add double tap to wake setting.
3287 // Remove setting that specifies if magnification values should be preserved.
3288 // This setting defaulted to true and never has a UI.
3353 // setting through the UI.
3378 // the user can no longer change the value of this setting through the UI.
3392 // This implementation was incorrectly setting the current value of
3469 // "wifi_wakeup_available" setting).
3470 // The setting that was added here is deleted in 153.
3530 // Version 152: Removed. (This version made the setting for wifi_wakeup enabled
3532 // The setting updated here is deleted in 153.
3631 // Remove setting that specifies wifi bgscan throttling params
3655 // The setting is no longer valid for managed profiles, it should be
3847 Setting setting = settings.getSettingLocked(name);
3850 // that made the last change to the setting to properly determine
3854 callingUid = mPackageManager.getPackageUid(setting.getPackageName(), 0, userId);
3859 Slog.e(LOG_TAG, "Unknown package: " + setting.getPackageName());
3864 setting.getPackageName(), callingUid);
3866 settings.insertSettingLocked(name, setting.getValue(),
3867 setting.getTag(), true, setting.getPackageName());
3868 } else if (setting.getDefaultValue() != null && setting.isDefaultFromSystem()) {
3871 // the package changed the setting last is not a system one but the
3872 // setting is marked as its default coming from the system we clear
3879 Slog.e(LOG_TAG, "Error upgrading setting: " + setting.getName(), e);