/external/chromium_org/net/cert/ |
multi_threaded_cert_verifier.h | 107 // Rather than having a single validity point along a monotonically increasing 124 // Returns true iff |now| is within the validity period of |expiration|.
|
x509_certificate_ios.cc | 65 x509_util::ParseDate(&cert_handle->validity.notBefore, &valid_start_); 66 x509_util::ParseDate(&cert_handle->validity.notAfter, &valid_expiry_);
|
x509_certificate_nss.cc | 32 x509_util::ParseDate(&cert_handle_->validity.notBefore, &valid_start_); 33 x509_util::ParseDate(&cert_handle_->validity.notAfter, &valid_expiry_);
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x509_r2x.c | 96 if (X509_gmtime_adj(xi->validity->notBefore,0) == NULL) 98 if (X509_gmtime_adj(xi->validity->notAfter,(long)60*60*24*days) == NULL)
|
/external/chromium_org/third_party/polymer/components/core-input/ |
demo.html | 124 console.log(e.target.id, 'invalid, inputValue:', e.detail.value, e.target.validity); 127 console.log(e.target.id, 'valid, inputValue:', e.detail.value, e.target.validity);
|
/external/chromium_org/third_party/polymer/components-chromium/core-input/ |
demo.html | 124 console.log(e.target.id, 'invalid, inputValue:', e.detail.value, e.target.validity); 127 console.log(e.target.id, 'valid, inputValue:', e.detail.value, e.target.validity);
|
/external/chromium_org/url/ |
url_canon_fileurl.cc | 106 // TODO(brettw) This doesn't do any checking for host name validity. We 107 // should probably handle validity checking of UNC hosts differently than
|
url_canon_internal_file.h | 105 // TODO(brettw) This doesn't do any checking for host name validity. We 106 // should probably handle validity checking of UNC hosts differently than
|
/external/openssl/crypto/x509/ |
x509_r2x.c | 97 if (X509_gmtime_adj(xi->validity->notBefore,0) == NULL) 99 if (X509_gmtime_adj(xi->validity->notAfter,(long)60*60*24*days) == NULL)
|
/external/valgrind/main/gdbserver_tests/ |
mchelp.stdoutB.exp | 18 returns validity bits for <len> (or 1) bytes at <addr> 77 returns validity bits for <len> (or 1) bytes at <addr>
|
/frameworks/base/docs/html/google/play/billing/v2/ |
billing_subscriptions.jd | 37 <li><a href="#validity">Checking Subscription Validity</a></li> 302 subscription validity, although please read the <a 307 <h2 id="validity">Checking Subscription Validity</h2> 310 recurrences over time to remain valid. Your app should check the validity of 352 <li>If your app wants to check validity but you can?t reach your server (or 363 and validity at launch, such as prior to accessing subscriber content, game
|
/libcore/luni/src/main/java/java/util/logging/ |
SocketHandler.java | 104 // check the validity of the host name 108 // check the validity of the port number
|
/libcore/luni/src/main/java/org/xml/sax/ |
ErrorHandler.java | 29 * In order to detect validity errors, an ErrorHandler that does something 83 * validity constraint. The default behaviour is to take no
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/idlelib/ |
configHelpSourceEdit.py | 100 "Simple validity check for a sensible menu item name" 120 "Simple validity check for menu file path"
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/idlelib/ |
configHelpSourceEdit.py | 100 "Simple validity check for a sensible menu item name" 120 "Simple validity check for menu file path"
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
ExtendedPKIXParameters.java | 20 * This class extends the PKIXParameters with a validity model parameter. 138 * This is the default PKIX validity model. Actually there are two variants 150 * This model uses the following validity model. Each certificate must have 187 * @return Returns the validity model. 329 * @param validityModel The validity model to set.
|
/frameworks/base/keystore/java/android/security/ |
KeyPairGeneratorSpec.java | 111 * {@code serialNumber}, and the validity date starting at {@code startDate} 122 * @param startDate the start of the self-signed certificate validity period 123 * @param endDate the end date of the self-signed certificate validity 441 * Sets the start of the validity period for the self-signed certificate 453 * Sets the end of the validity period for the self-signed certificate
|
/external/ipsec-tools/src/racoon/ |
isakmp_ident.c | 127 /* validity check */ 262 /* validity check */ 358 /* validity check */ 438 /* validity check */ 582 /* validity check */ 680 /* validity check */ 831 /* validity check */ 866 /* validity check */ 984 /* validity check */ 1133 /* validity check * [all...] |
isakmp_base.c | 125 /* validity check */ 306 /* validity check */ 421 /* validity check */ 597 /* validity check */ 765 /* validity check */ 797 /* validity check */ 929 /* validity check */ 1085 /* validity check */ 1234 /* validity check */ [all...] |
/external/chromium_org/third_party/libxml/src/ |
error.c | 310 channel(data, "validity "); 340 channel(data, "Schemas validity "); 349 channel(data, "Relax-NG validity "); 760 * Display and format an validity error messages, gives file, 782 xmlGenericError(xmlGenericErrorContext, "validity error: "); 804 * Display and format a validity warning messages, gives file, line, 823 xmlGenericError(xmlGenericErrorContext, "validity warning: ");
|
/external/libxml2/ |
error.c | 313 channel(data, "validity "); 343 channel(data, "Schemas validity "); 352 channel(data, "Relax-NG validity "); 767 * Display and format an validity error messages, gives file, 789 xmlGenericError(xmlGenericErrorContext, "validity error: "); 811 * Display and format a validity warning messages, gives file, line, 830 xmlGenericError(xmlGenericErrorContext, "validity warning: ");
|
/libcore/luni/src/main/java/org/w3c/dom/ |
TypeInfo.java | 39 * <li> If the <b>[validity]</b> property exists AND is <em>"invalid"</em> or <em>"notKnown"</em>: the {target namespace} and {name} properties of the declared type if 43 * choose not to provide type information if validity is not valid. 45 * <li> If the <b>[validity]</b> property exists and is <em>"valid"</em>:
|
/libcore/luni/src/main/java/org/w3c/dom/ls/ |
LSParserFilter.java | 35 * <p> All validity checking while parsing a document occurs on the source 38 * of the document on the stream, and its validity may have been affected by 125 * document, before any modification by the filter. No validity checks
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeyCheckPage.java | 179 int validity = mWizard.getValidity(); local 182 validity)); 184 if (validity < REQUIRED_YEARS) {
|
/cts/apps/CameraITS/tests/scene0/ |
test_metadata.py | 22 """Test the validity of some metadata entries.
|