/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
TBSCertificate.java | 51 * validity Validity, 73 /** the value of validity field of the structure */ 74 private final Validity validity; field in class:TBSCertificate 90 Validity validity, Name subject, 98 this.validity = validity; 108 Validity validity, Name subject [all...] |
/external/smack/src/org/xbill/DNS/ |
SIG0.java | 18 * The default validity period for outgoing SIG(0) signed messages. 21 private static final short VALIDITY = 300; 39 int validity = Options.intValue("sig0validity"); local 40 if (validity < 0) 41 validity = VALIDITY; 45 Date timeExpires = new Date(now + validity * 1000);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificateTest.java | 49 import org.apache.harmony.security.x509.Validity; 70 * validity Validity, 85 * Validity ::= SEQUENCE { 127 Validity validity = new Validity(new Date(100000000), new Date(200000000)); local 161 signature, issuer, validity, subject, subjectPublicKeyInfo,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
V1TBSCertificateGenerator.java | 18 * validity Validity, 131 ASN1EncodableVector validity = new ASN1EncodableVector(); local 133 validity.add(startDate); 134 validity.add(endDate); 136 seq.add(new DERSequence(validity));
|
V3TBSCertificateGenerator.java | 19 * validity Validity, 177 ASN1EncodableVector validity = new ASN1EncodableVector(); local 179 validity.add(startDate); 180 validity.add(endDate); 182 v.add(new DERSequence(validity));
|
/external/chromium_org/chromeos/network/ |
network_util.h | 32 int32 validity; // optional; -1 if not present in message. member in struct:chromeos::SMS
|
sms_watcher.cc | 58 const char SMSWatcher::kValidityKey[] = "validity"; 66 const char SMSWatcher::kModemManager1ValidityKey[] = "Validity"; 155 double validity = 0; local 157 &validity)) { 158 validity = -1; 160 sms.validity = validity; 329 double validity = 0; local 331 SMSWatcher::kModemManager1ValidityKey, &validity)) { 332 validity = -1 [all...] |
/external/chromium/chrome/browser/ui/webui/options/ |
search_engine_manager_handler.cc | 244 DictionaryValue validity; local 245 validity.SetBoolean("name", edit_controller_->IsTitleValid(name)); 246 validity.SetBoolean("keyword", edit_controller_->IsKeywordValid(keyword)); 247 validity.SetBoolean("url", edit_controller_->IsURLValid(url)); 250 validity, indexValue);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
nssidentity.cc | 212 CERTValidity *validity; local 253 validity = CERT_CreateValidity(not_before, not_after); 254 if (!validity) { 255 LOG(LS_ERROR) << "Couldn't create validity"; 268 certificate = CERT_CreateCertificate(serial, subject_name, validity, certreq); 310 if (validity) CERT_DestroyValidity(validity);
|
/external/chromium_org/chrome/browser/ui/webui/options/ |
search_engine_manager_handler.cc | 269 base::DictionaryValue validity; local 270 validity.SetBoolean("name", edit_controller_->IsTitleValid(name)); 271 validity.SetBoolean("keyword", edit_controller_->IsKeywordValid(keyword)); 272 validity.SetBoolean("url", edit_controller_->IsURLValid(url)); 275 validity, indexValue); 298 // Recheck validity. It's possible to get here with invalid input if e.g. the
|
/external/chromium_org/net/cert/ |
x509_util_nss.cc | 112 CERTValidity* validity = CERT_CreateValidity( local 115 if (!validity) { 117 LOG(ERROR) << "Failed to create certificate validity object: " << prerr; 123 validity, cert_request); 131 CERT_DestroyValidity(validity); 270 CERTValidity* validity = CERT_CreateValidity( local 274 if (!validity) 277 CERT_DestroyValidity(validity);
|
cert_verify_proc_nss.cc | 772 SECCertTimeValidity validity = CERT_CheckCertValidTimes( local 774 if (validity != secCertTimeValid) [all...] |
/external/chromium_org/third_party/WebKit/Source/core/html/ |
FormAssociatedElement.cpp | 61 ValidityState* FormAssociatedElement::validity() function in class:WebCore::FormAssociatedElement
|
/external/chromium_org/third_party/libxml/src/ |
runsuite.c | 792 xmlChar *validity = NULL; local 822 validity = getString(cur, 823 "string(ts:expected/@validity)"); 824 if (validity == NULL) { 825 fprintf(stderr, "instanceDocument line %ld misses expected validity\n", 846 if (xmlStrEqual(validity, BAD_CAST "valid")) { 857 } else if (xmlStrEqual(validity, BAD_CAST "invalid")) { 864 test_log("instanceDocument line %ld has unexpected validity value%s\n", 865 xmlGetLineNo(cur), validity); 873 if (validity != NULL) xmlFree(validity) 889 xmlChar *validity = NULL; local [all...] |
/hardware/samsung_slsi/exynos5/libkeymaster/ |
tlTeeKeymaster_Api.h | 116 bool validity; /**< Signature validity */ member in struct:__anon34084 159 bool validity; /**< Signature validity */ member in struct:__anon34087
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeyCheckPage.java | 179 int validity = mWizard.getValidity(); local 182 validity)); 184 if (validity < REQUIRED_YEARS) {
|
/external/chromium/net/base/ |
x509_certificate_nss.cc | 639 ParseDate(&cert_handle_->validity.notBefore, &valid_start_); 640 ParseDate(&cert_handle_->validity.notAfter, &valid_expiry_); 684 CERTValidity* validity = CERT_CreateValidity(now, not_after); local 686 validity, cert_request); 694 CERT_DestroyValidity(validity); 780 SECCertTimeValidity validity = CERT_CheckCertValidTimes( local 782 if (validity != secCertTimeValid) [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
X509CertFactoryPerfTest.java | 245 Validity validity = typedefs 246 new Validity(new Date(notBefore), new Date(notAfter)); 256 signature, issuer, validity, subject, subjectPublicKeyInfo,
|
X509CertImplTest.java | 78 import org.apache.harmony.security.x509.Validity; 271 Validity validity = local 272 new Validity(new Date(notBefore), new Date(notAfter)); 282 signature, issuer, validity, subject, subjectPublicKeyInfo,
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
X509CertSelectorTest.java | 73 import org.apache.harmony.security.x509.Validity; 2123 Validity validity = new Validity(new Date(100000000), local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509.h | 255 X509_VAL *validity; member in struct:x509_cinf_st 612 #define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore) 613 #define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter) [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
x509.h | 255 X509_VAL *validity; member in struct:x509_cinf_st 612 #define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore) 613 #define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter) [all...] |
/external/openssl/crypto/x509/ |
x509.h | 255 X509_VAL *validity; member in struct:x509_cinf_st 612 #define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore) 613 #define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter) [all...] |
/external/openssl/include/openssl/ |
x509.h | 255 X509_VAL *validity; member in struct:x509_cinf_st 612 #define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore) 613 #define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter) [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
ant.jar | |