Home
last modified time | relevance | path

Searched refs:account (Results 1 – 25 of 190) sorted by relevance

12345678

/external/robolectric/src/test/java/com/xtremelabs/robolectric/shadows/
DAccountTest.java18 Account account = new Account("name", "type"); in shouldHaveStringsConstructor() local
20 assertThat(account.name, equalTo("name")); in shouldHaveStringsConstructor()
21 assertThat(account.type, equalTo("type")); in shouldHaveStringsConstructor()
30 Account account = new Account(p); in shouldHaveParcelConstructor() local
31 assertThat(account.name, equalTo("name")); in shouldHaveParcelConstructor()
32 assertThat(account.type, equalTo("type")); in shouldHaveParcelConstructor()
47 Account account = new Account("name", "type"); in shouldHaveToString() local
48 assertThat(account.toString(), equalTo("Account {name=name, type=type}")); in shouldHaveToString()
DPeriodicSyncTest.java24 assertThat(sync.account, is(a)); in shouldHaveConstructor()
/external/robolectric/src/main/java/com/xtremelabs/robolectric/shadows/
DShadowAccountManager.java50 …public AccountManagerFuture<Bundle> getAuthToken(Account account, String authTokenType, Bundle opt… in getAuthToken() argument
52 final Account finalAccount = account; in getAuthToken()
99 private void addBundleResults(Bundle bundle, final Account account) { in getAuthToken() argument
101 bundle.putString(AccountManager.KEY_ACCOUNT_TYPE, account.type); in getAuthToken()
102 bundle.putString(AccountManager.KEY_ACCOUNT_NAME, account.name); in getAuthToken()
181 for (Account account : accounts) {
182 if (accountType.equals(account.type)) {
183 accountList.add(account);
191 public String peekAuthToken(Account account, String authTokenType) {
192 HashMap<String, String> tokens = cachedAuthTokenValues.get(account);
[all …]
DShadowContentResolver.java174 public static void requestSync(Account account, String authority, Bundle extras) {
176 Status status = getStatus(account, authority, true);
182 public static void setIsSyncable(Account account, String authority, int syncable) {
183 getStatus(account, authority, true).state = syncable;
187 public static int getIsSyncable(Account account, String authority) {
188 return getStatus(account, authority, true).state;
192 public static boolean getSyncAutomatically(Account account, String authority) {
193 return getStatus(account, authority, true).syncAutomatically;
197 public static void setSyncAutomatically(Account account, String authority, boolean sync) {
198 getStatus(account, authority, true).syncAutomatically = sync;
[all …]
DShadowPeriodicSync.java17 …public void __constructor__(Account account, String authority, Bundle extras, long period) throws … in __constructor__() argument
18 setField("account", account); in __constructor__()
/external/icu4c/data/translit/
DThaiLogical_Latin.txt17 ห | $1 ← h ($notAbove*) \u0304; # backward case, account for reordering
53 ฝ | $1 ← f ($notAbove*) \u0304; # backward case, account for reordering
61 ศ | $1 ← s \u0323 ($notAbove*) \u0304; # backward case, account for reordering
64 ส | $1 ← s ($notAbove*) \u0304; # backward case, account for reordering
72 า | $1 ← a ($notAbove*) \u0304; # backward case, account for reordering
74 ำ | $1 ← a ($notAbove*) \u0309 ; # backward case, account for reordering
77 \u0E35 | $1 ← i ($notAbove*) \u0304 ; # backward case, account for reordering
79 \u0E37 | $1 ← u \u0323 ($notAbove*) \u0304 ; # backward case, account for reordering
82 \u0E39 | $1 ← u ($notAbove*) \u0304 ; # backward case, account for reordering
/external/openssh/contrib/redhat/
Dsshd.pam3 account required pam_nologin.so
4 account required pam_stack.so service=system-auth
Dsshd.pam.old4 account required /lib/security/pam_pwdb.so
/external/openssh/contrib/
Dsshd.pam.generic3 account required /lib/security/pam_nologin.so
4 account required /lib/security/pam_unix.so
Dsshd.pam.freebsd2 sshd account required pam_unix.so
/external/openssh/contrib/caldera/
Dsshd.pam3 account required /lib/security/pam_nologin.so
4 account required /lib/security/pam_pwdb.so
/external/openssh/contrib/aix/
Dpam.conf11 sshd account required /usr/lib/security/pam_aix
12 OTHER account required /usr/lib/security/pam_aix
/external/clang/test/SemaObjC/
Dwarn-forward-class-attr-deprecated.m13 - (id)initWithAccount: (id)account filenames:(id)filenames;
23 - (id)initWithAccount: (id)account filenames:(id)filenames { return 0; }
/external/oprofile/
Dconfigure.in199 AC_ARG_ENABLE(account-check,
200 [ --disable-account-check disable account check (default is enabled)],
286 echo "Warning: The user account 'oprofile:oprofile' does not exist on the system."
287 echo " To profile JITed code, this special user account must exist."
293 echo "Warning: The user account 'oprofile:oprofile' does not exist on the system."
294 echo " To profile JITed code, this special user account must exist."
DREADME_PACKAGERS64 OProfile requires the special user account "oprofile" to exist for purposes
68 creation of the special "oprofile" user account. Please refer to the URL
72 For example, the following commands would add the necessary user account:
78 -c "Special user account to be used by OProfile" oprofile
/external/quake/quake/src/WinQuake/data/
DHELP.TXT17 2 -- You can assign yourself a rechargeable PIN account. The system prompts
18 you for your credit card information, and assigns you a PIN account number.
20 Game Hints Line. Once your account runs out, you can charge it up again.
22 3 -- You may also charge up a PIN account using the number 1 (900) call-2-id.
26 4 -- id Software's Game Hints Line is accessible either using a PIN account
/external/openssh/contrib/cygwin/
DREADME28 account, these services have nearly all user rights which SYSTEM holds...
32 There's no way around this, except for creating a substitute account which
33 has the appropriate privileges. Basically, this account should be member
41 The ssh-host-config script asks you, if it should create such an account,
45 whether a sshd_server account exists or not.
53 privsep feature requires a non-privileged account called 'sshd'.
94 The host key files have to be owned by the NT account which starts
135 under the users account.
/external/ppp/pppd/
Dppp.pam5 account required pam_unix.so
/external/webkit/LayoutTests/fast/encoding/
Dcss-charset-expected.txt3 …works and that indexed rule access via an IE-specific rules property does not take it into account.
/external/llvm/docs/
DPhabricator.rst15 There are two options to get an account on Phabricator. You can sign up
16 immediately with one of the supported OAuth account types if you're comfortable
17 with OAuth, but you can also email chandlerc@gmail.com to request an account to
/external/icu4c/data/curr/
Den.txt364 "Spanish Peseta (A account)",
368 "Spanish Peseta (convertible account)",
1449 one{"Chilean unit of account (UF)"}
1450 other{"Chilean units of account (UF)"}
1549 one{"Spanish peseta (A account)"}
1550 other{"Spanish pesetas (A account)"}
1553 one{"Spanish peseta (convertible account)"}
1554 other{"Spanish pesetas (convertible account)"}
2265 one{"European unit of account (XBC)"}
2266 other{"European units of account (XBC)"}
[all …]
/external/chromium/chrome/browser/resources/options/
Dpersonal_options.css1 #account-picture {
/external/valgrind/main/perf/
DREADME38 55 blocks account for only 90% of execution. Has lots of
59 - Strengths: A real program, lots of code (top 100 blocks only account for
/external/openssh/
Dsshd_config79 # Set this to 'yes' to enable PAM authentication, account processing,
85 # If you just want the PAM account and session checks to run without
Dsshd_config.android78 # Set this to 'yes' to enable PAM authentication, account processing,
84 # If you just want the PAM account and session checks to run without

12345678