/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
Validity.java | 32 * with Validity structure which is the part of X.509 certificate 39 * Validity ::= SEQUENCE { 45 public final class Validity { 50 /** the ASN.1 encoded form of Validity */ 53 public Validity(Date notBefore, Date notAfter) { 73 * Returns ASN.1 encoded form of this X.509 Validity value. 83 * ASN.1 DER X.509 Validity encoder/decoder class. 90 return new Validity((Date) values[0], (Date) values[1]); 94 Validity validity = (Validity) object [all...] |
TBSCertificate.java | 51 * validity Validity, 73 /** the value of validity field of the structure */ 74 private final Validity validity; field in class:TBSCertificate 90 Validity validity, Name subject, 98 this.validity = validity; 108 Validity validity, Name subject [all...] |
/external/chromium_org/chrome/browser/ui/cocoa/autofill/ |
autofill_details_container_unittest.mm | 47 ValidityMessages validity; 51 .WillOnce(Return(validity)) 52 .WillOnce(Return(validity)) 53 .WillOnce(Return(validity)); 63 .WillOnce(Return(validity)) 64 .WillOnce(Return(validity))
|
/external/chromium_org/base/numerics/ |
safe_math.h | 54 : state_(rhs.ValueUnsafe(), rhs.validity()) {} 57 CheckedNumeric(Src value, RangeConstraint validity) 58 : state_(value, validity) {} 70 bool IsValid() const { return validity() == RANGE_VALID; } 86 // ValueFloating() - Since floating point values include their validity state, 94 // validity() - DO NOT USE THIS IN EXTERNAL CODE - It is public right now for 97 // Returns: current validity state (i.e. valid, overflow, underflow, nan). 101 RangeConstraint validity() const { return state_.validity(); } function in class:base::internal::CheckedNumeric 120 RangeConstraint validity; local 131 RangeConstraint validity; local [all...] |
safe_math_impl.h | 115 CheckedAdd(T x, T y, RangeConstraint* validity) { 126 *validity = RANGE_VALID; 128 *validity = HasSignBit(uresult) ? RANGE_OVERFLOW : RANGE_UNDERFLOW; 131 *validity = BinaryComplement(x) >= y ? RANGE_VALID : RANGE_OVERFLOW; 138 CheckedSub(T x, T y, RangeConstraint* validity) { 149 *validity = RANGE_VALID; 151 *validity = HasSignBit(uresult) ? RANGE_OVERFLOW : RANGE_UNDERFLOW; 154 *validity = x >= y ? RANGE_VALID : RANGE_UNDERFLOW; 167 CheckedMul(T x, T y, RangeConstraint* validity) { 171 *validity = DstRangeRelationToSrcRange<T>(tmp) 384 RangeConstraint validity() const { return validity_; } function in class:base::internal::CheckedNumericState 439 RangeConstraint validity() const { function in class:base::internal::CheckedNumericState [all...] |
/external/chromium_org/v8/src/base/ |
safe_math.h | 57 : state_(rhs.ValueUnsafe(), rhs.validity()) {} 60 CheckedNumeric(Src value, RangeConstraint validity) 61 : state_(value, validity) {} 73 bool IsValid() const { return validity() == RANGE_VALID; } 89 // ValueFloating() - Since floating point values include their validity state, 98 // validity() - DO NOT USE THIS IN EXTERNAL CODE - It is public right now for 101 // Returns: current validity state (i.e. valid, overflow, underflow, nan). 105 RangeConstraint validity() const { return state_.validity(); } function in class:v8::base::internal::CheckedNumeric 124 RangeConstraint validity; local 135 RangeConstraint validity; local [all...] |
safe_math_impl.h | 145 CheckedAdd(T x, T y, RangeConstraint* validity) { 156 *validity = RANGE_VALID; 158 *validity = HasSignBit(uresult) ? RANGE_OVERFLOW : RANGE_UNDERFLOW; 161 *validity = BinaryComplement(x) >= y ? RANGE_VALID : RANGE_OVERFLOW; 168 CheckedSub(T x, T y, RangeConstraint* validity) { 179 *validity = RANGE_VALID; 181 *validity = HasSignBit(uresult) ? RANGE_OVERFLOW : RANGE_UNDERFLOW; 184 *validity = x >= y ? RANGE_VALID : RANGE_UNDERFLOW; 197 CheckedMul(T x, T y, RangeConstraint* validity) { 201 *validity = DstRangeRelationToSrcRange<T>(tmp) 415 RangeConstraint validity() const { return validity_; } function in class:v8::base::internal::CheckedNumericState 467 RangeConstraint validity() const { function in class:v8::base::internal::CheckedNumericState [all...] |
/external/smack/src/org/xbill/DNS/ |
SIG0.java | 18 * The default validity period for outgoing SIG(0) signed messages. 21 private static final short VALIDITY = 300; 39 int validity = Options.intValue("sig0validity"); local 40 if (validity < 0) 41 validity = VALIDITY; 45 Date timeExpires = new Date(now + validity * 1000);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
V1TBSCertificateGenerator.java | 18 * validity Validity, 131 ASN1EncodableVector validity = new ASN1EncodableVector(); local 133 validity.add(startDate); 134 validity.add(endDate); 136 seq.add(new DERSequence(validity));
|
V3TBSCertificateGenerator.java | 19 * validity Validity, 177 ASN1EncodableVector validity = new ASN1EncodableVector(); local 179 validity.add(startDate); 180 validity.add(endDate); 182 v.add(new DERSequence(validity));
|
/external/libsepol/man/man3/ |
sepol_check_context.3 | 3 sepol_check_context \- Check the validity of a security context against a binary policy. 13 checks the validity of a security context against a binary policy
|
/external/chromium_org/chrome/app/test_data/ |
README | 3 signed with varying degrees of validity (see cert_maker.bat for details)
|
/libcore/luni/src/main/java/org/apache/harmony/security/asn1/ |
ASN1Choice.java | 52 * Validity ::= SEQUENCE { 62 * class that represents ASN.1 Validity notation may keep values 86 * class Validity { 93 * // custom ASN.1 sequence class: maps Validity class to is notation 100 * return new Validity((Date) values[0], (Date) values[1]); 105 * Validity validity = (Validity) object; 108 * values[0] = validity.notBefore; 109 * values[1] = validity.notAfter [all...] |
/external/chromium_org/chrome/common/ |
spellcheck_marker.h | 10 // A predicate to test spellcheck marker validity.
|
/external/chromium_org/content/browser/fileapi/ |
copy_or_move_file_validator_unittest.cc | 187 enum Validity { 198 explicit TestCopyOrMoveFileValidatorFactory(Validity validity) 199 : validity_(validity) {} 211 explicit TestCopyOrMoveFileValidator(Validity validity) 212 : result_(validity == VALID || validity == POST_WRITE_INVALID ? 215 write_result_(validity == VALID || validity == PRE_WRITE_INVALID [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x509_set.c | 109 if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); 110 in=x->cert_info->validity->notBefore; 116 M_ASN1_TIME_free(x->cert_info->validity->notBefore); 117 x->cert_info->validity->notBefore=in; 127 if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); 128 in=x->cert_info->validity->notAfter; 134 M_ASN1_TIME_free(x->cert_info->validity->notAfter); 135 x->cert_info->validity->notAfter=in;
|
/external/openssl/crypto/x509/ |
x509_set.c | 111 if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); 112 in=x->cert_info->validity->notBefore; 118 M_ASN1_TIME_free(x->cert_info->validity->notBefore); 119 x->cert_info->validity->notBefore=in; 129 if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); 130 in=x->cert_info->validity->notAfter; 136 M_ASN1_TIME_free(x->cert_info->validity->notAfter); 137 x->cert_info->validity->notAfter=in;
|
/external/sepolicy/tools/ |
README | 7 A utility for checking the validity of a file_contexts or a 10 argument in order to check the validity of the security contexts 20 checking the validity of the configurations. Used as part of the
|
/external/chromium_org/chrome/browser/resources/options/ |
search_engine_manager.js | 117 SearchEngineManager.validityCheckCallback = function(validity, modelIndex) { 120 validity, modelIndex); 122 validity, modelIndex); 124 validity, modelIndex);
|
search_engine_manager_engine_list.js | 297 * @param {Object} validity A dictionary of validitation results. 299 validationComplete: function(validity) { 303 if (validity.name) { 310 if (validity.keyword) { 317 if (validity.url) { 324 this.currentlyValid_ = validity.name && validity.keyword && validity.url; 355 * @param {Object} validity A dictionary of validitation results. 357 validationComplete: function(validity, modelIndex) [all...] |
/external/chromium_org/ppapi/shared_impl/ |
file_path.h | 24 // Used for validity-checking.
|
/external/oprofile/libop/ |
op_parse_event.h | 35 * parsed_events with results. Events validity are not checked except.
|
/libcore/luni/src/main/java/java/security/cert/ |
X509Certificate.java | 47 * validity Validity, 80 * The validity defined in ASN.1: 83 * validity Validity 85 * Validity ::= SEQUENCE { 106 * the date to check the validity against. 254 * Returns the {@code notBefore} date from the validity period of the 257 * @return the start of the validity period. 262 * Returns the {@code notAfter} date of the validity period of th [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificateTest.java | 49 import org.apache.harmony.security.x509.Validity; 70 * validity Validity, 85 * Validity ::= SEQUENCE { 127 Validity validity = new Validity(new Date(100000000), new Date(200000000)); local 161 signature, issuer, validity, subject, subjectPublicKeyInfo,
|
/external/chromium_org/base/memory/ |
weak_ptr.cc | 11 // Flags only become bound when checked for validity, or invalidated, 12 // so that we can check that later validity/invalidation operations on
|