/external/webkit/WebKitTools/BuildSlaveSupport/build.webkit.org-config/webkit/ |
__init__.py | 1 from webkit import auth, status, builders, schedulers namespace 2 reload(auth)
|
/external/dbus/test/data/auth/ |
external-silly.auth-script | 1 ## this tests we can't auth with silly credentials 5 SEND 'AUTH EXTERNAL USERID_HEX'
|
fail-after-n-attempts.auth-script | 7 SEND 'AUTH EXTERNAL USERID_HEX' 12 SEND 'AUTH EXTERNAL USERID_HEX' 17 SEND 'AUTH EXTERNAL USERID_HEX' 22 SEND 'AUTH EXTERNAL USERID_HEX' 27 SEND 'AUTH EXTERNAL USERID_HEX' 32 SEND 'AUTH EXTERNAL USERID_HEX'
|
external-failed.auth-script | 1 ## this tests that auth of type EXTERNAL without credentials will fail 5 SEND 'AUTH EXTERNAL USERID_HEX'
|
external-root.auth-script | 1 ## this tests we can auth EXTERNAL as ourselves, with root credentials 5 SEND 'AUTH EXTERNAL USERID_HEX'
|
external-successful.auth-script | 1 ## this tests a successful auth of type EXTERNAL 4 SEND 'AUTH EXTERNAL USERID_HEX'
|
mechanisms.auth-script | 2 ## in response to blank AUTH 5 SEND AUTH
|
fallback.auth-script | 1 ## this tests that a client can fallback to a secondary auth mech 5 ## Will try EXTERNAL by default first without first calling AUTH alone. 7 EXPECT_COMMAND AUTH 12 EXPECT_COMMAND AUTH
|
cancel.auth-script | 4 SEND 'AUTH EXTERNAL USERID_HEX' 12 SEND 'AUTH EXTERNAL USERID_HEX'
|
invalid-hex-encoding.auth-script | 4 SEND 'AUTH EXTERNAL willy'
|
client-out-of-mechanisms.auth-script | 5 EXPECT_COMMAND AUTH
|
invalid-command-client.auth-script | 5 EXPECT_COMMAND AUTH
|
extra-bytes.auth-script | 4 SEND 'AUTH EXTERNAL USERID_HEX'
|
/dalvik/libcore/auth/src/main/java/org/apache/harmony/auth/internal/nls/ |
messages.properties | 18 auth.00=Name can not be null 19 auth.01=sid can not be null 20 auth.02=sid can not be empty 21 auth.03=Subject can not be null 22 auth.04=options can not be null 23 auth.05=Read-only Subject 24 auth.06=uid can not be null 25 auth.07=gid can not be null 26 auth.08=Failed to load Subject-based policy 27 auth.09=invalid AccessControlContex [all...] |
/external/dbus/dbus/ |
dbus-auth.c | 2 /* dbus-auth.c Authentication 23 #include "dbus-auth.h" 50 * per-auth (which raises threadsafety issues too) 52 * @todo grep FIXME in dbus-auth.c 68 typedef dbus_bool_t (* DBusInitialResponseFunction) (DBusAuth *auth, 75 typedef dbus_bool_t (* DBusAuthDataFunction) (DBusAuth *auth, 81 typedef dbus_bool_t (* DBusAuthEncodeFunction) (DBusAuth *auth, 88 typedef dbus_bool_t (* DBusAuthDecodeFunction) (DBusAuth *auth, 95 typedef void (* DBusAuthShutdownFunction) (DBusAuth *auth); 98 * Virtual table representing a particular auth mechanism 327 DBusAuth *auth; local 1979 DBusAuth *auth; local 2025 DBusAuth *auth; local [all...] |
dbus-auth.h | 2 /* dbus-auth.h Authentication 46 DBusAuth* _dbus_auth_ref (DBusAuth *auth); 47 void _dbus_auth_unref (DBusAuth *auth); 48 dbus_bool_t _dbus_auth_set_mechanisms (DBusAuth *auth, 50 DBusAuthState _dbus_auth_do_work (DBusAuth *auth); 51 dbus_bool_t _dbus_auth_get_bytes_to_send (DBusAuth *auth, 53 void _dbus_auth_bytes_sent (DBusAuth *auth, 55 void _dbus_auth_get_buffer (DBusAuth *auth, 57 void _dbus_auth_return_buffer (DBusAuth *auth, 60 void _dbus_auth_get_unused_bytes (DBusAuth *auth, [all...] |
/external/ppp/pppd/ |
ppp.pam | 3 auth required pam_nologin.so 4 auth required pam_unix.so
|
/external/netcat/data/ |
nfs-0.d | 39 000 # auth trash 44 000 # auth trash 49 000 # auth trash 54 000 # extra auth trash? probably not needed
|
/external/quake/quake/src/QW/server/ |
notes.txt | 2 new server auth design;
4 - master sees new server, request auth with MD5(M|S). m is 32bit master key
|
/frameworks/base/tests/DumpRenderTree/assets/results/ |
layout_tests_crashed.txt | 1 /sdcard/android/layout_tests/http/tests/xmlhttprequest/basic-auth.html 2 /sdcard/android/layout_tests/http/tests/xmlhttprequest/failed-auth.html
|
/external/dbus/test/data/valid-config-files/ |
debug-allow-all-sha1.conf | 1 <!-- Bus that listens on a debug pipe and requires SHA1 auth, used to test SHA1 --> 9 <auth>DBUS_COOKIE_SHA1</auth>
|
debug-allow-all-sha1.conf.in | 1 <!-- Bus that listens on a debug pipe and requires SHA1 auth, used to test SHA1 --> 9 <auth>DBUS_COOKIE_SHA1</auth>
|
/external/webkit/WebCore/platform/sql/ |
SQLiteDatabase.cpp | 257 DatabaseAuthorizer* auth = static_cast<DatabaseAuthorizer*>(userData); local 258 ASSERT(auth); 262 return auth->createIndex(parameter1, parameter2); 264 return auth->createTable(parameter1); 266 return auth->createTempIndex(parameter1, parameter2); 268 return auth->createTempTable(parameter1); 270 return auth->createTempTrigger(parameter1, parameter2); 272 return auth->createTempView(parameter1); 274 return auth->createTrigger(parameter1, parameter2); 276 return auth->createView(parameter1) [all...] |
/external/bluetooth/bluez/plugins/ |
service.c | 296 struct pending_auth *auth = l->data; local 297 return auth; 310 struct pending_auth *auth = l->data; local 311 if (g_str_equal(auth->sender, sender)) 312 return auth; 322 struct pending_auth *auth; local 329 auth = find_pending_by_sender(serv_adapter, user_record->sender); 330 if (auth) { 332 auth); 333 g_free(auth); 570 struct pending_auth *auth; local 621 struct pending_auth *auth; local 698 struct pending_auth *auth; local [all...] |
/hardware/msm7k/librpc/ |
rpc.c | 128 xdr_send_auth(xdr_s_type *xdr, const opaque_auth *auth) 132 switch (sizeof(auth->oa_flavor)) { 134 FAILIF(!XDR_SEND_INT8(xdr, (int8_t *)&auth->oa_flavor)); 137 FAILIF(!XDR_SEND_INT16(xdr, (int16_t *)&auth->oa_flavor)); 140 FAILIF(!XDR_SEND_INT32(xdr, (int32_t *)&auth->oa_flavor)); 146 return (XDR_SEND_UINT(xdr, (uint32_t *)&auth->oa_length) && 147 (auth->oa_length == 0 || 148 XDR_SEND_BYTES(xdr, (uint8_t *)auth->oa_base, auth->oa_length)));
|