/third_party/ltp/testcases/kernel/syscalls/ipc/semop/ |
D | semop02.c | 36 static struct tst_ts *valid_to = &timeout, *invalid_to; variable 54 {0, &valid_sem_id, NULL, &sem_op_1, 0, 0, 0, BIGOPS, 1, &valid_to, E2BIG}, 55 {0, &noperm_sem_id, NULL, &sem_op_1, 0, 0, 0, NSOPS, 1, &valid_to, EACCES}, 56 {0, &valid_sem_id, &faulty_buf, &sem_op_1, 0, 0, 0, NSOPS, 1, &valid_to, EFAULT}, 57 {0, &valid_sem_id, NULL, &sem_op_1, 0, 0, 0, 0, 1, &valid_to, EINVAL}, 58 {0, &bad_sem_id, NULL, &sem_op_1, 0, 0, 0, NSOPS, 1, &valid_to, EINVAL}, 59 {0, &valid_sem_id, NULL, &sem_op_max, 0, 0, 0, 1, 1, &valid_to, ERANGE}, 60 {0, &valid_sem_id, NULL, &sem_op_1, 0, -1, SEM_UNDO, 1, 1, &valid_to, EFBIG}, 61 {0, &valid_sem_id, NULL, &sem_op_1, 0, PSEMS + 1, SEM_UNDO, 1, 1, &valid_to, EFBIG}, 62 {0, &valid_sem_id, NULL, &sem_op_zero, 2, 2, IPC_NOWAIT, 1, 1, &valid_to, EAGAIN}, [all …]
|
/third_party/ltp/testcases/kernel/syscalls/select/ |
D | select03.c | 24 static struct timeval *valid_to = &timeout, *invalid_to; variable 35 { "Negative nfds", &negative_nfds, &preadfds_reg, &pwritefds_reg, &nullfds, &valid_to, EINVAL }, 36 { "Invalid readfds", &maxfds, &pfds_closed, &pwritefds_reg, &nullfds, &valid_to, EBADF }, 37 { "Invalid writefds", &maxfds, &preadfds_reg, &pfds_closed, &nullfds, &valid_to, EBADF }, 38 { "Invalid exceptfds", &maxfds, &preadfds_reg, &pwritefds_reg, &pfds_closed, &valid_to, EBADF }, 39 { "Faulty readfds", &maxfds, &faulty_fds, &pwritefds_reg, &nullfds, &valid_to, EFAULT }, 40 { "Faulty writefds", &maxfds, &preadfds_reg, &faulty_fds, &nullfds, &valid_to, EFAULT }, 41 { "Faulty exceptfds", &maxfds, &preadfds_reg, &pwritefds_reg, &faulty_fds, &valid_to, EFAULT },
|
/third_party/node/test/parallel/ |
D | test-crypto-x509.js | 292 valid_to: 'Jun 17 21:40:37 2296 GMT', property 314 assert.strictEqual(legacyObject.valid_to, legacyObjectCheck.valid_to);
|
/third_party/mbedtls/library/ |
D | x509_crt.c | 1082 &crt->valid_to)) != 0) { in x509_crt_parse_der_core() 1658 crt->valid_to.year, crt->valid_to.mon, in mbedtls_x509_crt_info() 1659 crt->valid_to.day, crt->valid_to.hour, in mbedtls_x509_crt_info() 1660 crt->valid_to.min, crt->valid_to.sec); in mbedtls_x509_crt_info() 2181 if (mbedtls_x509_time_is_past(&parent->valid_to) || in x509_crt_find_parent_in() 2408 if (mbedtls_x509_time_is_past(&child->valid_to)) { in x509_crt_verify_chain()
|
D | pkcs7.c | 671 if (mbedtls_x509_time_is_past(&cert->valid_to) || in mbedtls_pkcs7_data_or_hash_verify()
|
/third_party/mbedtls/include/mbedtls/ |
D | x509_crt.h | 71 mbedtls_x509_time valid_to; /**< End time of certificate validity. */ member
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_x509parse.function | 952 } else if (strcmp(entity, "valid_to") == 0) { 953 TEST_ASSERT(mbedtls_x509_time_is_past(&crt.valid_to) == result); 974 } else if (strcmp(entity, "valid_to") == 0) { 975 TEST_ASSERT(mbedtls_x509_time_is_future(&crt.valid_to) == result);
|
D | test_suite_x509parse.data | 500 mbedtls_x509_time_is_past:"data_files/server1.crt":"valid_to":0 508 mbedtls_x509_time_is_past:"data_files/server2.crt":"valid_to":0 516 mbedtls_x509_time_is_past:"data_files/test-ca.crt":"valid_to":0 524 mbedtls_x509_time_is_future:"data_files/server5.crt":"valid_to":1 532 mbedtls_x509_time_is_future:"data_files/server5-future.crt":"valid_to":1 540 mbedtls_x509_time_is_future:"data_files/test-ca2.crt":"valid_to":1
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
D | mbedtls-x509.c | 118 buf->time = lws_tls_mbedtls_time_to_unix(&x509->MBEDTLS_PRIVATE_V30_ONLY(valid_to)); in lws_tls_mbedtls_cert_info()
|
/third_party/node/doc/api/ |
D | tls.md | 1221 * `valid_to` {string} The date-time the certificate is valid to. 1287 valid_to: 'Nov 20 23:59:59 2019 GMT',
|
/third_party/libbpf/.github/actions/build-selftests/ |
D | vmlinux.h | 56244 time64_t valid_to; member
|