/external/robolectric/src/test/java/com/xtremelabs/robolectric/shadows/ |
D | AccountTest.java | 18 Account account = new Account("name", "type"); in shouldHaveStringsConstructor() local 20 assertThat(account.name, equalTo("name")); in shouldHaveStringsConstructor() 21 assertThat(account.type, equalTo("type")); in shouldHaveStringsConstructor() 30 Account account = new Account(p); in shouldHaveParcelConstructor() local 31 assertThat(account.name, equalTo("name")); in shouldHaveParcelConstructor() 32 assertThat(account.type, equalTo("type")); in shouldHaveParcelConstructor() 47 Account account = new Account("name", "type"); in shouldHaveToString() local 48 assertThat(account.toString(), equalTo("Account {name=name, type=type}")); in shouldHaveToString()
|
D | PeriodicSyncTest.java | 24 assertThat(sync.account, is(a)); in shouldHaveConstructor()
|
/external/robolectric/src/main/java/com/xtremelabs/robolectric/shadows/ |
D | ShadowAccountManager.java | 50 …public AccountManagerFuture<Bundle> getAuthToken(Account account, String authTokenType, Bundle opt… in getAuthToken() argument 52 final Account finalAccount = account; in getAuthToken() 99 private void addBundleResults(Bundle bundle, final Account account) { in getAuthToken() argument 101 bundle.putString(AccountManager.KEY_ACCOUNT_TYPE, account.type); in getAuthToken() 102 bundle.putString(AccountManager.KEY_ACCOUNT_NAME, account.name); in getAuthToken() 181 for (Account account : accounts) { 182 if (accountType.equals(account.type)) { 183 accountList.add(account); 191 public String peekAuthToken(Account account, String authTokenType) { 192 HashMap<String, String> tokens = cachedAuthTokenValues.get(account); [all …]
|
D | ShadowContentResolver.java | 174 public static void requestSync(Account account, String authority, Bundle extras) { 176 Status status = getStatus(account, authority, true); 182 public static void setIsSyncable(Account account, String authority, int syncable) { 183 getStatus(account, authority, true).state = syncable; 187 public static int getIsSyncable(Account account, String authority) { 188 return getStatus(account, authority, true).state; 192 public static boolean getSyncAutomatically(Account account, String authority) { 193 return getStatus(account, authority, true).syncAutomatically; 197 public static void setSyncAutomatically(Account account, String authority, boolean sync) { 198 getStatus(account, authority, true).syncAutomatically = sync; [all …]
|
D | ShadowPeriodicSync.java | 17 …public void __constructor__(Account account, String authority, Bundle extras, long period) throws … in __constructor__() argument 18 setField("account", account); in __constructor__()
|
/external/icu4c/data/translit/ |
D | ThaiLogical_Latin.txt | 17 ห | $1 ← h ($notAbove*) \u0304; # backward case, account for reordering 53 ฝ | $1 ← f ($notAbove*) \u0304; # backward case, account for reordering 61 ศ | $1 ← s \u0323 ($notAbove*) \u0304; # backward case, account for reordering 64 ส | $1 ← s ($notAbove*) \u0304; # backward case, account for reordering 72 า | $1 ← a ($notAbove*) \u0304; # backward case, account for reordering 74 ำ | $1 ← a ($notAbove*) \u0309 ; # backward case, account for reordering 77 \u0E35 | $1 ← i ($notAbove*) \u0304 ; # backward case, account for reordering 79 \u0E37 | $1 ← u \u0323 ($notAbove*) \u0304 ; # backward case, account for reordering 82 \u0E39 | $1 ← u ($notAbove*) \u0304 ; # backward case, account for reordering
|
/external/openssh/contrib/redhat/ |
D | sshd.pam | 3 account required pam_nologin.so 4 account required pam_stack.so service=system-auth
|
D | sshd.pam.old | 4 account required /lib/security/pam_pwdb.so
|
/external/openssh/contrib/ |
D | sshd.pam.generic | 3 account required /lib/security/pam_nologin.so 4 account required /lib/security/pam_unix.so
|
D | sshd.pam.freebsd | 2 sshd account required pam_unix.so
|
/external/openssh/contrib/caldera/ |
D | sshd.pam | 3 account required /lib/security/pam_nologin.so 4 account required /lib/security/pam_pwdb.so
|
/external/openssh/contrib/aix/ |
D | pam.conf | 11 sshd account required /usr/lib/security/pam_aix 12 OTHER account required /usr/lib/security/pam_aix
|
/external/clang/test/SemaObjC/ |
D | warn-forward-class-attr-deprecated.m | 13 - (id)initWithAccount: (id)account filenames:(id)filenames; 23 - (id)initWithAccount: (id)account filenames:(id)filenames { return 0; }
|
/external/oprofile/ |
D | configure.in | 199 AC_ARG_ENABLE(account-check, 200 [ --disable-account-check disable account check (default is enabled)], 286 echo "Warning: The user account 'oprofile:oprofile' does not exist on the system." 287 echo " To profile JITed code, this special user account must exist." 293 echo "Warning: The user account 'oprofile:oprofile' does not exist on the system." 294 echo " To profile JITed code, this special user account must exist."
|
D | README_PACKAGERS | 64 OProfile requires the special user account "oprofile" to exist for purposes 68 creation of the special "oprofile" user account. Please refer to the URL 72 For example, the following commands would add the necessary user account: 78 -c "Special user account to be used by OProfile" oprofile
|
/external/quake/quake/src/WinQuake/data/ |
D | HELP.TXT | 17 2 -- You can assign yourself a rechargeable PIN account. The system prompts 18 you for your credit card information, and assigns you a PIN account number. 20 Game Hints Line. Once your account runs out, you can charge it up again. 22 3 -- You may also charge up a PIN account using the number 1 (900) call-2-id. 26 4 -- id Software's Game Hints Line is accessible either using a PIN account
|
/external/openssh/contrib/cygwin/ |
D | README | 28 account, these services have nearly all user rights which SYSTEM holds... 32 There's no way around this, except for creating a substitute account which 33 has the appropriate privileges. Basically, this account should be member 41 The ssh-host-config script asks you, if it should create such an account, 45 whether a sshd_server account exists or not. 53 privsep feature requires a non-privileged account called 'sshd'. 94 The host key files have to be owned by the NT account which starts 135 under the users account.
|
/external/ppp/pppd/ |
D | ppp.pam | 5 account required pam_unix.so
|
/external/webkit/LayoutTests/fast/encoding/ |
D | css-charset-expected.txt | 3 …works and that indexed rule access via an IE-specific rules property does not take it into account.
|
/external/llvm/docs/ |
D | Phabricator.rst | 15 There are two options to get an account on Phabricator. You can sign up 16 immediately with one of the supported OAuth account types if you're comfortable 17 with OAuth, but you can also email chandlerc@gmail.com to request an account to
|
/external/icu4c/data/curr/ |
D | en.txt | 364 "Spanish Peseta (A account)", 368 "Spanish Peseta (convertible account)", 1449 one{"Chilean unit of account (UF)"} 1450 other{"Chilean units of account (UF)"} 1549 one{"Spanish peseta (A account)"} 1550 other{"Spanish pesetas (A account)"} 1553 one{"Spanish peseta (convertible account)"} 1554 other{"Spanish pesetas (convertible account)"} 2265 one{"European unit of account (XBC)"} 2266 other{"European units of account (XBC)"} [all …]
|
/external/chromium/chrome/browser/resources/options/ |
D | personal_options.css | 1 #account-picture {
|
/external/valgrind/main/perf/ |
D | README | 38 55 blocks account for only 90% of execution. Has lots of 59 - Strengths: A real program, lots of code (top 100 blocks only account for
|
/external/openssh/ |
D | sshd_config | 79 # Set this to 'yes' to enable PAM authentication, account processing, 85 # If you just want the PAM account and session checks to run without
|
D | sshd_config.android | 78 # Set this to 'yes' to enable PAM authentication, account processing, 84 # If you just want the PAM account and session checks to run without
|