/external/openssl/crypto/x509/ |
x509_set.c | 111 if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); 112 in=x->cert_info->validity->notBefore; 118 M_ASN1_TIME_free(x->cert_info->validity->notBefore); 119 x->cert_info->validity->notBefore=in; 129 if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); 130 in=x->cert_info->validity->notAfter; 136 M_ASN1_TIME_free(x->cert_info->validity->notAfter); 137 x->cert_info->validity->notAfter=in;
|
x509_r2x.c | 97 if (X509_gmtime_adj(xi->validity->notBefore,0) == NULL) 99 if (X509_gmtime_adj(xi->validity->notAfter,(long)60*60*24*days) == NULL)
|
/external/webkit/Source/WebCore/html/ |
HTMLFieldSetElement.idl | 24 readonly attribute ValidityState validity;
|
HTMLKeygenElement.idl | 44 readonly attribute ValidityState validity;
|
HTMLOutputElement.idl | 36 readonly attribute ValidityState validity;
|
FormAssociatedElement.h | 45 ValidityState* validity();
|
HTMLButtonElement.idl | 31 readonly attribute ValidityState validity;
|
HTMLSelectElement.idl | 39 readonly attribute ValidityState validity;
|
HTMLTextAreaElement.idl | 26 readonly attribute ValidityState validity;
|
HTMLObjectElement.idl | 46 readonly attribute ValidityState validity;
|
/external/bouncycastle/src/main/java/org/bouncycastle/asn1/x509/ |
V1TBSCertificateGenerator.java | 18 * validity Validity, 125 ASN1EncodableVector validity = new ASN1EncodableVector(); local 127 validity.add(startDate); 128 validity.add(endDate); 130 seq.add(new DERSequence(validity));
|
V3TBSCertificateGenerator.java | 19 * validity Validity, 161 ASN1EncodableVector validity = new ASN1EncodableVector(); local 163 validity.add(startDate); 164 validity.add(endDate); 166 v.add(new DERSequence(validity));
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
Validity.java | 32 * with Validity structure which is the part of X.509 certificate 39 * Validity ::= SEQUENCE { 45 public final class Validity { 50 /** the ASN.1 encoded form of Validity */ 53 public Validity(Date notBefore, Date notAfter) { 73 * Returns ASN.1 encoded form of this X.509 Validity value. 83 * ASN.1 DER X.509 Validity encoder/decoder class. 90 return new Validity((Date) values[0], (Date) values[1]); 94 Validity validity = (Validity) object [all...] |
TBSCertificate.java | 51 * validity Validity, 73 /** the value of validity field of the structure */ 74 private final Validity validity; field in class:TBSCertificate 90 Validity validity, Name subject, 98 this.validity = validity; 108 Validity validity, Name subject [all...] |
/external/dbus/bus/ |
config-parser-trivial.c | 342 } Validity; 421 Validity validity, 441 else if (validity == VALID) 461 if (validity == INVALID) 474 Validity validity; member in struct:__anon5128 482 return do_load (d->full_path, d->validity, TRUE); 488 Validity validity) [all...] |
/external/dbus/dbus/ |
dbus-marshal-validate.c | 443 DBusValidity validity; local 494 validity = validate_body_helper (&sub, byte_order, FALSE, 497 if (validity != DBUS_VALID) 498 return validity; 523 DBusValidity validity; local 533 validity = 537 if (validity != DBUS_VALID) 538 return validity; 564 DBusValidity validity; local 613 validity = validate_body_helper (&sub, byte_order, FALSE 630 DBusValidity validity; local 714 DBusValidity validity; local [all...] |
dbus-marshal-validate-util.c | 534 DBusValidity validity; local 536 validity = _dbus_validate_body_with_reason (&signature, 0, 540 if (validity != DBUS_VALID) 543 validity, sequence); 559 DBusValidity validity; local 561 validity = _dbus_validate_body_with_reason (&signature, 0, 565 if (validity != DBUS_VALID) 568 validity, sequence);
|
dbus-marshal-header.h | 105 DBusValidity *validity, 115 DBusValidity *validity,
|
dbus-marshal-header.c | 647 * @param validity return location for why the data is invalid if it is 659 DBusValidity *validity, 683 *validity = DBUS_INVALID_BAD_BYTE_ORDER; 693 *validity = DBUS_INVALID_INSANE_FIELDS_ARRAY_LENGTH; 703 *validity = DBUS_INVALID_INSANE_BODY_LENGTH; 716 *validity = DBUS_INVALID_MESSAGE_TOO_LONG; 728 *validity = DBUS_VALID; 931 * returns #FALSE and *validity == #DBUS_VALIDITY_UNKNOWN_OOM_ERROR, 933 * and *validity != #DBUS_VALIDITY_UNKNOWN_OOM_ERROR then the data was 943 * @param validity return location for invalidity reaso [all...] |
dbus-marshal-validate.h | 52 DBUS_VALIDITY_UNKNOWN_OOM_ERROR = -4, /**< can't determine validity due to OOM */ 130 const char *_dbus_validity_to_error_message (DBusValidity validity);
|
/external/chromium/chrome/browser/ui/webui/options/ |
search_engine_manager_handler.cc | 244 DictionaryValue validity; local 245 validity.SetBoolean("name", edit_controller_->IsTitleValid(name)); 246 validity.SetBoolean("keyword", edit_controller_->IsKeywordValid(keyword)); 247 validity.SetBoolean("url", edit_controller_->IsURLValid(url)); 250 validity, indexValue);
|
/cts/tests/tests/webkit/src/android/webkit/cts/ |
CacheManager_CacheResultTest.java | 132 final long validity = 5 * 50 * 1000; // 5 min local 139 mWebServer.setDocumentValidity(validity); 164 assertEquals(time + validity, result.getExpires(), tolerance);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificateTest.java | 49 import org.apache.harmony.security.x509.Validity; 70 * validity Validity, 85 * Validity ::= SEQUENCE { 127 Validity validity = new Validity(new Date(100000000), new Date(200000000)); local 161 signature, issuer, validity, subject, subjectPublicKeyInfo,
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeyCheckPage.java | 165 int validity = mWizard.getValidity(); local 168 validity)); 170 if (validity < 25) {
|
/external/llvm/utils/ |
check-each-file | 132 echo Checking validity of new $program
|