Home
last modified time | relevance | path

Searched refs:valid_from (Results 1 – 25 of 572) sorted by relevance

12345678910>>...23

/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/crypto/tests/integration/targets/openssh_cert/tests/
H A Didempotency.yml11 valid_from: always
18 valid_from: always
25 valid_from: always
32 valid_from: always
38 valid_from: always
44 valid_from: always
60 valid_from: +0s
67 valid_from: +0s
74 valid_from: +0s
81 valid_from: +0s
[all …]
H A Dregenerate.yml13 valid_from: always
22 valid_from: always
31 valid_from: always
43 valid_from: always
56 valid_from: always
65 valid_from: always
74 valid_from: always
87 valid_from: always
96 valid_from: always
114 valid_from: "{{ test_case.valid_from | default(omit) }}"
H A Dkey_idempotency.yml20 valid_from: always
31 valid_from: always
47 valid_from: always
63 valid_from: always
78 valid_from: always
93 valid_from: always
104 valid_from: always
114 valid_from: always
124 valid_from: always
135 valid_from: always
H A Doptions_idempotency.yml12 valid_from: always
25 valid_from: always
42 valid_from: always
56 valid_from: always
70 valid_from: always
84 valid_from: always
H A Dssh-agent.yml17 valid_from: always
38 valid_from: always
49 valid_from: always
59 valid_from: always
76 valid_from: always
H A Dremove.yml13 valid_from: always
46 valid_from: "{{ test_case.valid_from | default(omit) }}"
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/openssh_cert/tasks/
H A Dmain.yml28 valid_from: always
37 valid_from: always
45 valid_from: always
53 valid_from: always
62 valid_from: +0s
72 valid_from: +0s
81 valid_from: +0s
90 valid_from: +0s
100 valid_from: always
112 valid_from: always
[all …]
/dports/www/chromium-legacy/chromium-88.0.4324.182/chrome/browser/chromeos/child_accounts/parent_access_code/
H A Dauthenticator.cc90 base::Time valid_from, in AccessCode() argument
92 : code_(code), valid_from_(valid_from), valid_to_(valid_to) { in AccessCode()
114 return out << code.code() << " [" << code.valid_from() << " - " in operator <<()
161 const base::Time valid_from = in Generate() local
164 valid_from + config_.code_validity()); in Generate()
172 if (valid_from < base::Time::UnixEpoch()) in Validate()
173 valid_from = base::Time::UnixEpoch(); in Validate()
174 return ValidateInRange(code, valid_from, in Validate()
180 base::Time valid_from, in ValidateInRange() argument
182 DCHECK_LE(base::Time::UnixEpoch(), valid_from); in ValidateInRange()
[all …]
H A Dauthenticator.h81 base::Time valid_from,
91 base::Time valid_from() const { return valid_from_; } in valid_from() function
135 base::Time valid_from,
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/crypto/tests/unit/plugins/module_utils/openssh/
H A Dtest_certificate.py266 def test_valid_time_parameters(valid_from, valid_from_hr, valid_from_openssh, valid_from_timestamp, argument
270 valid_from=valid_from,
273 assert time_parameters.valid_from(date_format="human_readable") == valid_from_hr
274 assert time_parameters.valid_from(date_format="openssh") == valid_from_openssh
275 assert time_parameters.valid_from(date_format="timestamp") == valid_from_timestamp
283 def test_invalid_time_parameters(valid_from, valid_to): argument
285 OpensshCertificateTimeParameters(valid_from, valid_to)
289 def test_valid_validity_test(valid_from, valid_to, valid_at): argument
290 assert OpensshCertificateTimeParameters(valid_from, valid_to).within_range(valid_at)
294 def test_invalid_validity_test(valid_from, valid_to, valid_at): argument
[all …]
/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/tests/
H A Dutil.py22 common_name="Test", valid_from=None, valid_to=None argument
25 valid_from = valid_from if valid_from else datetime.datetime.utcnow()
26 valid_to = valid_to if valid_to else valid_from + datetime.timedelta(days=1)
39 .not_valid_before(valid_from)
/dports/databases/p5-Interchange6-Schema/Interchange6-Schema-0.133/lib/Interchange6/Schema/Result/
H A DTax.pm92 column valid_from =>
375 $self->valid_from->truncate( to => 'day' );
382 unless ( $self->valid_to > $self->valid_from ) {
406 valid_from => {
408 $dtf->format_datetime( $self->valid_from ),
414 $dtf->format_datetime( $self->valid_from ),
434 valid_from =>
435 { '<=', $dtf->format_datetime( $self->valid_from ) },
440 { '>=', $dtf->format_datetime( $self->valid_from ) },
/dports/databases/p5-Interchange6-Schema/Interchange6-Schema-0.133/t/lib/Test/
H A DTax.pm63 valid_from => '2010-01-01',
81 valid_from => '2010-01-01',
100 $data->{valid_from} = '2011-01-01';
108 $data->{valid_from} = '2013-01-01';
115 $data->{valid_from} = '2009-01-01';
129 $data->{valid_from} = '2011-01-01';
137 $data->{valid_from} = '2011-01-01';
145 $data->{valid_from} = '2011-01-01';
219 valid_from => '2010-01-01',
272 valid_from => '2010-01-01',
/dports/www/apache24/httpd-2.4.53/test/modules/md/
H A Dmd_certs.py51 valid_from: timedelta = timedelta(days=-1),
61 self.valid_from = valid_from
152 valid_from=spec.valid_from, valid_to=spec.valid_to)
251 valid_from: timedelta = timedelta(days=-1),
259 issuer=issuer, valid_from=valid_from,
263 email=spec.email, valid_from=valid_from,
267 valid_from=valid_from, valid_to=valid_to,
296 valid_from = datetime.now()
298 valid_from += valid_from_delta
308 .not_valid_before(valid_from)
[all …]
/dports/www/apache24/httpd-2.4.53/test/pyhttpd/
H A Dcerts.py51 valid_from: timedelta = timedelta(days=-1),
61 self.valid_from = valid_from
169valid_from=spec.valid_from, valid_to=spec.valid_to)
283 valid_from: timedelta = timedelta(days=-1),
291 issuer=issuer, valid_from=valid_from,
295 email=spec.email, valid_from=valid_from,
299 valid_from=valid_from, valid_to=valid_to,
328 valid_from = datetime.now()
330 valid_from += valid_from_delta
340 .not_valid_before(valid_from)
[all …]
/dports/www/mod_http2/mod_h2-2.0.2/test/pyhttpd/
H A Dcerts.py51 valid_from: timedelta = timedelta(days=-1),
61 self.valid_from = valid_from
169valid_from=spec.valid_from, valid_to=spec.valid_to)
283 valid_from: timedelta = timedelta(days=-1),
291 issuer=issuer, valid_from=valid_from,
295 email=spec.email, valid_from=valid_from,
299 valid_from=valid_from, valid_to=valid_to,
328 valid_from = datetime.now()
330 valid_from += valid_from_delta
340 .not_valid_before(valid_from)
[all …]
/dports/security/py-stix2/cti-python-stix2-2.1.0/stix2/test/v21/
H A Dtest_indicator.py47 valid_from=epoch,
64 assert indicator.valid_from == FAKE_TIME
132 indicator.valid_from = dt.datetime.now()
175 assert idctr.valid_from == dt.datetime(1970, 1, 1, 0, 0, 1, tzinfo=pytz.utc)
185 valid_from="2017-01-01T12:34:56Z",
196 valid_from="2017-01-01T12:34:56Z",
221 valid_from=epoch,
260 valid_from=epoch,
275 valid_from=epoch,
/dports/security/p5-Net-SSLeay/Net-SSLeay-1.90/helper_script/
H A Dpki.cfg18 valid_from => '2020-01-01 00:00:00',
131 valid_from => '2020-01-01 00:00:00',
172 valid_from => '2020-01-01 00:00:00',
203 valid_from => '2020-01-01 00:00:00',
235 valid_from => '2020-01-01 00:00:00',
267 valid_from => '2020-01-01 00:00:00',
300 valid_from => '2020-01-01 00:00:00',
346 valid_from => '2020-01-01 00:00:00',
391 valid_from => '2020-01-01 00:00:00',
/dports/security/n2n/n2n-2.8/legacy/
H A Dn2n_keyfile.c100 spec->valid_from = atol(token); in parseKeyLine()
131 if ( k->valid_until < k->valid_from ) { goto bad; } in validCipherSpec()
132 if ( k->valid_from > now ) { goto bad; } in validCipherSpec()
180 idx, k->valid_from, k->valid_until, k->t, k->opaque ); in n2n_read_keyfile()
188 idx, k->valid_from, k->valid_until, k->t, k->opaque ); in n2n_read_keyfile()
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/crypto/
H A Dopenssh_cert.py229 self.valid_from = module.params['valid_from']
246 self.valid_from = self.valid_from.lstrip()
261 if not (self.valid_from == "always" and self.valid_to == "forever"):
263 if not self.valid_from == "always":
264 timeobj = self.convert_to_datetime(module, self.valid_from)
433 if self.valid_from == "always":
435 elif self.is_relative(self.valid_from):
438 earliest_time = self.convert_to_datetime(module, self.valid_from)
537 valid_from=dict(type='str'),
/dports/net/py-ripe.atlas.sagan/ripe.atlas.sagan-1.3.0/tests/
H A Dssl.py46 assert(result.certificates[0].valid_from.isoformat() == "2013-01-06T14:00:55+00:00")
80 assert(result.certificates[0].valid_from.isoformat() == "2013-01-06T14:00:55+00:00")
114 assert(result.certificates[0].valid_from.isoformat() == "2013-07-06T05:54:54+00:00")
148 assert(result.certificates[0].valid_from.isoformat() == "2013-07-06T05:54:54+00:00")
182 assert(result.certificates[0].valid_from.isoformat() == "2013-07-06T05:54:54+00:00")
244 assert(result.certificates[0].valid_from.isoformat() == "2013-07-06T05:54:54+00:00")
278 assert(result.certificates[0].valid_from.isoformat() == "2014-01-03T21:22:51+00:00")
312 assert(result.certificates[0].valid_from.isoformat() == "2014-01-03T21:22:51+00:00")
346 assert(result.certificates[0].valid_from.isoformat() == "2014-01-03T21:22:51+00:00")
/dports/security/py-stix2/cti-python-stix2-2.1.0/stix2/test/v20/
H A Dtest_indicator.py44 valid_from=epoch,
61 assert indicator.valid_from == FAKE_TIME
128 indicator.valid_from = dt.datetime.now()
172 assert idctr.valid_from == dt.datetime(1970, 1, 1, 0, 0, 1, tzinfo=pytz.utc)
209 valid_from=epoch,
/dports/multimedia/v4l_compat/linux-5.13-rc2/drivers/net/ethernet/mellanox/mlxfw/
H A Dmlxfw_mfa2_file.h24 const void *valid_from = mfa2_file->fw->data; in mlxfw_mfa2_valid_ptr() local
26 return ptr > valid_from && ptr < valid_to; in mlxfw_mfa2_valid_ptr()
/dports/multimedia/v4l-utils/linux-5.13-rc2/drivers/net/ethernet/mellanox/mlxfw/
H A Dmlxfw_mfa2_file.h24 const void *valid_from = mfa2_file->fw->data; in mlxfw_mfa2_valid_ptr() local
26 return ptr > valid_from && ptr < valid_to; in mlxfw_mfa2_valid_ptr()
/dports/multimedia/libv4l/linux-5.13-rc2/drivers/net/ethernet/mellanox/mlxfw/
H A Dmlxfw_mfa2_file.h24 const void *valid_from = mfa2_file->fw->data; in mlxfw_mfa2_valid_ptr() local
26 return ptr > valid_from && ptr < valid_to; in mlxfw_mfa2_valid_ptr()

12345678910>>...23