/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/crypto/tests/integration/targets/openssh_cert/tests/ |
H A D | idempotency.yml | 12 valid_to: forever 19 valid_to: forever 26 valid_to: forever 33 valid_to: forever 39 valid_to: forever 45 valid_to: forever 61 valid_to: +32w 68 valid_to: +32w 75 valid_to: +32w 82 valid_to: +32w [all …]
|
H A D | regenerate.yml | 14 valid_to: forever 23 valid_to: forever 32 valid_to: forever 44 valid_to: forever 57 valid_to: forever 66 valid_to: forever 75 valid_to: forever 88 valid_to: forever 97 valid_to: forever 115 valid_to: "{{ test_case.valid_to | default(omit) }}"
|
H A D | key_idempotency.yml | 21 valid_to: forever 32 valid_to: forever 48 valid_to: forever 64 valid_to: forever 79 valid_to: forever 94 valid_to: forever 105 valid_to: forever 115 valid_to: forever 125 valid_to: forever 136 valid_to: forever
|
H A D | options_idempotency.yml | 13 valid_to: forever 26 valid_to: forever 43 valid_to: forever 57 valid_to: forever 71 valid_to: forever 85 valid_to: forever
|
H A D | ssh-agent.yml | 18 valid_to: forever 39 valid_to: forever 50 valid_to: forever 60 valid_to: forever 77 valid_to: forever
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/openssh_cert/tasks/ |
H A D | main.yml | 29 valid_to: forever 38 valid_to: forever 46 valid_to: forever 54 valid_to: forever 63 valid_to: +32w 73 valid_to: +32w 82 valid_to: +32w 91 valid_to: +32w 101 valid_to: forever 113 valid_to: forever [all …]
|
/dports/databases/p5-Interchange6-Schema/Interchange6-Schema-0.133/lib/Interchange6/Schema/Result/ |
H A D | Tax.pm | 103 column valid_to => { data_type => "date", is_nullable => 1 }; 377 if ( defined $self->valid_to ) { 380 $self->valid_to->truncate( to => 'day' ); 382 unless ( $self->valid_to > $self->valid_from ) { 401 if ( defined $self->valid_to ) { 409 $dtf->format_datetime( $self->valid_to ), 412 valid_to => { 415 $dtf->format_datetime( $self->valid_to ), 433 valid_to => undef, 438 valid_to => { '!=', undef }, [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/crypto/tests/unit/plugins/module_utils/openssh/ |
H A D | test_certificate.py | 267 valid_to, valid_to_hr, valid_to_openssh, valid_to_timestamp, argument 271 valid_to=valid_to 276 assert time_parameters.valid_to(date_format="human_readable") == valid_to_hr 277 assert time_parameters.valid_to(date_format="openssh") == valid_to_openssh 278 assert time_parameters.valid_to(date_format="timestamp") == valid_to_timestamp 283 def test_invalid_time_parameters(valid_from, valid_to): argument 285 OpensshCertificateTimeParameters(valid_from, valid_to) 289 def test_valid_validity_test(valid_from, valid_to, valid_at): argument 290 assert OpensshCertificateTimeParameters(valid_from, valid_to).within_range(valid_at) 294 def test_invalid_validity_test(valid_from, valid_to, valid_at): argument [all …]
|
/dports/net/parpd/parpd-1.3/ |
H A D | cache6.c | 9 time_t valid_to; member 17 time_t valid_to; member 82 p->valid_to - global.now, p->retry); in print_nd_table() 92 if(p->valid_to >= global.now) { in print_delay6_table() 95 p->valid_to - global.now, p->count); in print_delay6_table() 193 if(p->valid_to < global.now) { in lookup_and_update_last_query6() 235 if(p->valid_to > global.now) in expire_cache6() 249 if(p->valid_to > global.now) in expire_cache6() 272 p->valid_to += diff; in update_cache6_config() 291 p->valid_to += diff; in update_cache6_config() [all …]
|
H A D | cache.c | 9 time_t valid_to; member 17 time_t valid_to; member 82 p->valid_to - global.now, p->retry); in print_arp_table() 92 if(p->valid_to >= global.now) { in print_delay_table() 95 p->valid_to - global.now, p->count); in print_delay_table() 195 if(p->valid_to < global.now) { in lookup_and_update_last_query() 237 if(p->valid_to > global.now) in expire_cache() 259 if(p->valid_to > global.now) in expire_cache() 286 p->valid_to += diff; in update_cache_config() 305 p->valid_to += diff; in update_cache_config() [all …]
|
/dports/security/pear-LiveUser/LiveUser-0.16.14/docs/examples/example4/ |
H A D | news_new.php | 18 $valid_to = array_key_exists('valid_to', $_POST) ? (int)$_POST['valid_to'] : ''; variable 25 if (!preg_match('/^[1-9][0-9]?$/', $valid_to)) { 45 … ' . $db->quote( date('Y.m.d H:i:s', time()+60*60*24*7*$valid_to), 'timestamp' ) . ', 54 $valid_to = ''; variable 65 if (!empty($valid_to)) { 66 $tpl->setVariable('valid', $valid_to);
|
H A D | news_change.php | 43 $valid_to = array_key_exists('valid_to', $_POST) ? (int)$_POST['valid_to'] : ''; variable 47 if (!preg_match('/^[1-9][0-9]?$/', $valid_to)) { 56 … valid_to = "' . date('Y.m.d H:i:s', $newsRow['created_at']+60*60*24*7*$valid_to) . '", 80 if (!empty($valid_to)) { 81 $tpl->setVariable('valid', $valid_to);
|
/dports/security/pkcs11-helper/pkcs11-helper-1.27.0/lib/ |
H A D | _pkcs11h-crypto-mbedtls.c | 106 if (0 == x509_time_expired(&x509.valid_to)) { in __pkcs11h_crypto_mbedtls_certificate_get_expiration() 110 tm1.tm_year = x509.valid_to.year - 1900; in __pkcs11h_crypto_mbedtls_certificate_get_expiration() 111 tm1.tm_mon = x509.valid_to.mon - 1; in __pkcs11h_crypto_mbedtls_certificate_get_expiration() 112 tm1.tm_mday = x509.valid_to.day; in __pkcs11h_crypto_mbedtls_certificate_get_expiration() 113 tm1.tm_hour = x509.valid_to.hour - 1; in __pkcs11h_crypto_mbedtls_certificate_get_expiration() 114 tm1.tm_min = x509.valid_to.min - 1; in __pkcs11h_crypto_mbedtls_certificate_get_expiration() 115 tm1.tm_sec = x509.valid_to.sec - 1; in __pkcs11h_crypto_mbedtls_certificate_get_expiration()
|
/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/tests/ |
H A D | util.py | 22 common_name="Test", valid_from=None, valid_to=None argument 26 valid_to = valid_to if valid_to else valid_from + datetime.timedelta(days=1) 40 .not_valid_after(valid_to)
|
/dports/www/apache24/httpd-2.4.53/test/modules/md/ |
H A D | md_certs.py | 52 valid_to: timedelta = timedelta(days=89), 62 self.valid_to = valid_to 152 valid_from=spec.valid_from, valid_to=spec.valid_to) 252 valid_to: timedelta = timedelta(days=89), 260 valid_to=valid_to, key_type=key_type) 264 valid_to=valid_to, key_type=key_type) 267 valid_from=valid_from, valid_to=valid_to, 391 valid_to: timedelta = timedelta(days=89), 403 valid_from_delta=valid_from, valid_until_delta=valid_to) 414 valid_to: timedelta = timedelta(days=89), [all …]
|
/dports/databases/p5-Interchange6-Schema/Interchange6-Schema-0.133/t/lib/Test/ |
H A D | Tax.pm | 64 valid_to => '2011-12-31' 82 valid_to => '2011-12-31' 101 $data->{valid_to} = undef; 122 $data->{valid_to} = '2010-01-01'; 130 $data->{valid_to} = '2013-01-01'; 138 $data->{valid_to} = '2011-01-01'; 146 $data->{valid_to} = '2010-01-01';
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chrome/browser/chromeos/child_accounts/parent_access_code/ |
H A D | authenticator.cc | 91 base::Time valid_to) in AccessCode() argument 92 : code_(code), valid_from_(valid_from), valid_to_(valid_to) { in AccessCode() 105 valid_to_ == rhs.valid_to(); in operator ==() 110 valid_to_ != rhs.valid_to(); in operator !=() 115 << code.valid_to() << "]"; in operator <<() 181 base::Time valid_to) const { in ValidateInRange() 183 DCHECK_GE(valid_to, valid_from); in ValidateInRange() 188 valid_to.ToJavaTime() / kAccessCodeGranularity.InMilliseconds(); in ValidateInRange()
|
H A D | authenticator.h | 82 base::Time valid_to); 94 base::Time valid_to() const { return valid_to_; } in valid_to() function 136 base::Time valid_to) const;
|
/dports/www/apache24/httpd-2.4.53/test/pyhttpd/ |
H A D | certs.py | 52 valid_to: timedelta = timedelta(days=89), 62 self.valid_to = valid_to 169 … valid_from=spec.valid_from, valid_to=spec.valid_to) 284 valid_to: timedelta = timedelta(days=89), 292 valid_to=valid_to, key_type=key_type) 296 valid_to=valid_to, key_type=key_type) 299 valid_from=valid_from, valid_to=valid_to, 423 valid_to: timedelta = timedelta(days=89), 435 valid_from_delta=valid_from, valid_until_delta=valid_to) 446 valid_to: timedelta = timedelta(days=89), [all …]
|
/dports/www/mod_http2/mod_h2-2.0.2/test/pyhttpd/ |
H A D | certs.py | 52 valid_to: timedelta = timedelta(days=89), 62 self.valid_to = valid_to 169 … valid_from=spec.valid_from, valid_to=spec.valid_to) 284 valid_to: timedelta = timedelta(days=89), 292 valid_to=valid_to, key_type=key_type) 296 valid_to=valid_to, key_type=key_type) 299 valid_from=valid_from, valid_to=valid_to, 423 valid_to: timedelta = timedelta(days=89), 435 valid_from_delta=valid_from, valid_until_delta=valid_to) 446 valid_to: timedelta = timedelta(days=89), [all …]
|
/dports/devel/py-vsts/vsts-0.1.25/vsts/service_hooks/v4_0/models/ |
H A D | session_token.py | 29 def __init__(self, error=None, token=None, valid_to=None): argument 33 self.valid_to = valid_to
|
/dports/devel/py-vsts/vsts-0.1.25/vsts/service_hooks/v4_1/models/ |
H A D | session_token.py | 29 def __init__(self, error=None, token=None, valid_to=None): argument 33 self.valid_to = valid_to
|
/dports/devel/py-vsts/vsts-0.1.25/vsts/identity/v4_0/models/ |
H A D | access_token_result.py | 44 …=None, error_description=None, has_error=None, refresh_token=None, token_type=None, valid_to=None): argument 53 self.valid_to = valid_to
|
/dports/devel/py-vsts/vsts-0.1.25/vsts/identity/v4_1/models/ |
H A D | access_token_result.py | 44 …=None, error_description=None, has_error=None, refresh_token=None, token_type=None, valid_to=None): argument 53 self.valid_to = valid_to
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/crypto/ |
H A D | openssh_cert.py | 230 self.valid_to = module.params['valid_to'] 247 self.valid_to = self.valid_to.lstrip() 261 if not (self.valid_from == "always" and self.valid_to == "forever"): 278 if self.valid_to == "forever": 282 timeobj = self.convert_to_datetime(module, self.valid_to) 440 if self.valid_to == "forever": 442 elif self.is_relative(self.valid_to): 445 last_time = self.convert_to_datetime(module, self.valid_to) 538 valid_to=dict(type='str'),
|