/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/crypto/tests/integration/targets/openssh_cert/tests/ |
H A D | idempotency.yml | 11 valid_from: always 18 valid_from: always 25 valid_from: always 32 valid_from: always 38 valid_from: always 44 valid_from: always 60 valid_from: +0s 67 valid_from: +0s 74 valid_from: +0s 81 valid_from: +0s [all …]
|
H A D | regenerate.yml | 13 valid_from: always 22 valid_from: always 31 valid_from: always 43 valid_from: always 56 valid_from: always 65 valid_from: always 74 valid_from: always 87 valid_from: always 96 valid_from: always 114 valid_from: "{{ test_case.valid_from | default(omit) }}"
|
H A D | key_idempotency.yml | 20 valid_from: always 31 valid_from: always 47 valid_from: always 63 valid_from: always 78 valid_from: always 93 valid_from: always 104 valid_from: always 114 valid_from: always 124 valid_from: always 135 valid_from: always
|
H A D | options_idempotency.yml | 12 valid_from: always 25 valid_from: always 42 valid_from: always 56 valid_from: always 70 valid_from: always 84 valid_from: always
|
H A D | ssh-agent.yml | 17 valid_from: always 38 valid_from: always 49 valid_from: always 59 valid_from: always 76 valid_from: always
|
H A D | remove.yml | 13 valid_from: always 46 valid_from: "{{ test_case.valid_from | default(omit) }}"
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/openssh_cert/tasks/ |
H A D | main.yml | 28 valid_from: always 37 valid_from: always 45 valid_from: always 53 valid_from: always 62 valid_from: +0s 72 valid_from: +0s 81 valid_from: +0s 90 valid_from: +0s 100 valid_from: always 112 valid_from: always [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chrome/browser/chromeos/child_accounts/parent_access_code/ |
H A D | authenticator.cc | 90 base::Time valid_from, in AccessCode() argument 92 : code_(code), valid_from_(valid_from), valid_to_(valid_to) { in AccessCode() 114 return out << code.code() << " [" << code.valid_from() << " - " in operator <<() 161 const base::Time valid_from = in Generate() local 164 valid_from + config_.code_validity()); in Generate() 172 if (valid_from < base::Time::UnixEpoch()) in Validate() 173 valid_from = base::Time::UnixEpoch(); in Validate() 174 return ValidateInRange(code, valid_from, in Validate() 180 base::Time valid_from, in ValidateInRange() argument 182 DCHECK_LE(base::Time::UnixEpoch(), valid_from); in ValidateInRange() [all …]
|
H A D | authenticator.h | 81 base::Time valid_from, 91 base::Time valid_from() const { return valid_from_; } in valid_from() function 135 base::Time valid_from,
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/crypto/tests/unit/plugins/module_utils/openssh/ |
H A D | test_certificate.py | 266 def test_valid_time_parameters(valid_from, valid_from_hr, valid_from_openssh, valid_from_timestamp, argument 270 valid_from=valid_from, 273 assert time_parameters.valid_from(date_format="human_readable") == valid_from_hr 274 assert time_parameters.valid_from(date_format="openssh") == valid_from_openssh 275 assert time_parameters.valid_from(date_format="timestamp") == valid_from_timestamp 283 def test_invalid_time_parameters(valid_from, valid_to): argument 285 OpensshCertificateTimeParameters(valid_from, valid_to) 289 def test_valid_validity_test(valid_from, valid_to, valid_at): argument 290 assert OpensshCertificateTimeParameters(valid_from, valid_to).within_range(valid_at) 294 def test_invalid_validity_test(valid_from, valid_to, valid_at): argument [all …]
|
/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/tests/ |
H A D | util.py | 22 common_name="Test", valid_from=None, valid_to=None argument 25 valid_from = valid_from if valid_from else datetime.datetime.utcnow() 26 valid_to = valid_to if valid_to else valid_from + datetime.timedelta(days=1) 39 .not_valid_before(valid_from)
|
/dports/databases/p5-Interchange6-Schema/Interchange6-Schema-0.133/lib/Interchange6/Schema/Result/ |
H A D | Tax.pm | 92 column valid_from => 375 $self->valid_from->truncate( to => 'day' ); 382 unless ( $self->valid_to > $self->valid_from ) { 406 valid_from => { 408 $dtf->format_datetime( $self->valid_from ), 414 $dtf->format_datetime( $self->valid_from ), 434 valid_from => 435 { '<=', $dtf->format_datetime( $self->valid_from ) }, 440 { '>=', $dtf->format_datetime( $self->valid_from ) },
|
/dports/databases/p5-Interchange6-Schema/Interchange6-Schema-0.133/t/lib/Test/ |
H A D | Tax.pm | 63 valid_from => '2010-01-01', 81 valid_from => '2010-01-01', 100 $data->{valid_from} = '2011-01-01'; 108 $data->{valid_from} = '2013-01-01'; 115 $data->{valid_from} = '2009-01-01'; 129 $data->{valid_from} = '2011-01-01'; 137 $data->{valid_from} = '2011-01-01'; 145 $data->{valid_from} = '2011-01-01'; 219 valid_from => '2010-01-01', 272 valid_from => '2010-01-01',
|
/dports/www/apache24/httpd-2.4.53/test/modules/md/ |
H A D | md_certs.py | 51 valid_from: timedelta = timedelta(days=-1), 61 self.valid_from = valid_from 152 valid_from=spec.valid_from, valid_to=spec.valid_to) 251 valid_from: timedelta = timedelta(days=-1), 259 issuer=issuer, valid_from=valid_from, 263 email=spec.email, valid_from=valid_from, 267 valid_from=valid_from, valid_to=valid_to, 296 valid_from = datetime.now() 298 valid_from += valid_from_delta 308 .not_valid_before(valid_from) [all …]
|
/dports/www/apache24/httpd-2.4.53/test/pyhttpd/ |
H A D | certs.py | 51 valid_from: timedelta = timedelta(days=-1), 61 self.valid_from = valid_from 169 … valid_from=spec.valid_from, valid_to=spec.valid_to) 283 valid_from: timedelta = timedelta(days=-1), 291 issuer=issuer, valid_from=valid_from, 295 email=spec.email, valid_from=valid_from, 299 valid_from=valid_from, valid_to=valid_to, 328 valid_from = datetime.now() 330 valid_from += valid_from_delta 340 .not_valid_before(valid_from) [all …]
|
/dports/www/mod_http2/mod_h2-2.0.2/test/pyhttpd/ |
H A D | certs.py | 51 valid_from: timedelta = timedelta(days=-1), 61 self.valid_from = valid_from 169 … valid_from=spec.valid_from, valid_to=spec.valid_to) 283 valid_from: timedelta = timedelta(days=-1), 291 issuer=issuer, valid_from=valid_from, 295 email=spec.email, valid_from=valid_from, 299 valid_from=valid_from, valid_to=valid_to, 328 valid_from = datetime.now() 330 valid_from += valid_from_delta 340 .not_valid_before(valid_from) [all …]
|
/dports/security/py-stix2/cti-python-stix2-2.1.0/stix2/test/v21/ |
H A D | test_indicator.py | 47 valid_from=epoch, 64 assert indicator.valid_from == FAKE_TIME 132 indicator.valid_from = dt.datetime.now() 175 assert idctr.valid_from == dt.datetime(1970, 1, 1, 0, 0, 1, tzinfo=pytz.utc) 185 valid_from="2017-01-01T12:34:56Z", 196 valid_from="2017-01-01T12:34:56Z", 221 valid_from=epoch, 260 valid_from=epoch, 275 valid_from=epoch,
|
/dports/security/p5-Net-SSLeay/Net-SSLeay-1.90/helper_script/ |
H A D | pki.cfg | 18 valid_from => '2020-01-01 00:00:00', 131 valid_from => '2020-01-01 00:00:00', 172 valid_from => '2020-01-01 00:00:00', 203 valid_from => '2020-01-01 00:00:00', 235 valid_from => '2020-01-01 00:00:00', 267 valid_from => '2020-01-01 00:00:00', 300 valid_from => '2020-01-01 00:00:00', 346 valid_from => '2020-01-01 00:00:00', 391 valid_from => '2020-01-01 00:00:00',
|
/dports/security/n2n/n2n-2.8/legacy/ |
H A D | n2n_keyfile.c | 100 spec->valid_from = atol(token); in parseKeyLine() 131 if ( k->valid_until < k->valid_from ) { goto bad; } in validCipherSpec() 132 if ( k->valid_from > now ) { goto bad; } in validCipherSpec() 180 idx, k->valid_from, k->valid_until, k->t, k->opaque ); in n2n_read_keyfile() 188 idx, k->valid_from, k->valid_until, k->t, k->opaque ); in n2n_read_keyfile()
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/crypto/ |
H A D | openssh_cert.py | 229 self.valid_from = module.params['valid_from'] 246 self.valid_from = self.valid_from.lstrip() 261 if not (self.valid_from == "always" and self.valid_to == "forever"): 263 if not self.valid_from == "always": 264 timeobj = self.convert_to_datetime(module, self.valid_from) 433 if self.valid_from == "always": 435 elif self.is_relative(self.valid_from): 438 earliest_time = self.convert_to_datetime(module, self.valid_from) 537 valid_from=dict(type='str'),
|
/dports/net/py-ripe.atlas.sagan/ripe.atlas.sagan-1.3.0/tests/ |
H A D | ssl.py | 46 assert(result.certificates[0].valid_from.isoformat() == "2013-01-06T14:00:55+00:00") 80 assert(result.certificates[0].valid_from.isoformat() == "2013-01-06T14:00:55+00:00") 114 assert(result.certificates[0].valid_from.isoformat() == "2013-07-06T05:54:54+00:00") 148 assert(result.certificates[0].valid_from.isoformat() == "2013-07-06T05:54:54+00:00") 182 assert(result.certificates[0].valid_from.isoformat() == "2013-07-06T05:54:54+00:00") 244 assert(result.certificates[0].valid_from.isoformat() == "2013-07-06T05:54:54+00:00") 278 assert(result.certificates[0].valid_from.isoformat() == "2014-01-03T21:22:51+00:00") 312 assert(result.certificates[0].valid_from.isoformat() == "2014-01-03T21:22:51+00:00") 346 assert(result.certificates[0].valid_from.isoformat() == "2014-01-03T21:22:51+00:00")
|
/dports/security/py-stix2/cti-python-stix2-2.1.0/stix2/test/v20/ |
H A D | test_indicator.py | 44 valid_from=epoch, 61 assert indicator.valid_from == FAKE_TIME 128 indicator.valid_from = dt.datetime.now() 172 assert idctr.valid_from == dt.datetime(1970, 1, 1, 0, 0, 1, tzinfo=pytz.utc) 209 valid_from=epoch,
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/drivers/net/ethernet/mellanox/mlxfw/ |
H A D | mlxfw_mfa2_file.h | 24 const void *valid_from = mfa2_file->fw->data; in mlxfw_mfa2_valid_ptr() local 26 return ptr > valid_from && ptr < valid_to; in mlxfw_mfa2_valid_ptr()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/drivers/net/ethernet/mellanox/mlxfw/ |
H A D | mlxfw_mfa2_file.h | 24 const void *valid_from = mfa2_file->fw->data; in mlxfw_mfa2_valid_ptr() local 26 return ptr > valid_from && ptr < valid_to; in mlxfw_mfa2_valid_ptr()
|
/dports/multimedia/libv4l/linux-5.13-rc2/drivers/net/ethernet/mellanox/mlxfw/ |
H A D | mlxfw_mfa2_file.h | 24 const void *valid_from = mfa2_file->fw->data; in mlxfw_mfa2_valid_ptr() local 26 return ptr > valid_from && ptr < valid_to; in mlxfw_mfa2_valid_ptr()
|