/third_party/vk-gl-cts/external/vulkan-docs/src/scripts/ |
H A D | validitygenerator.py | 17 from spec_tools.validity import ValidityCollection, ValidityEntry 23 super().__init__('Got a case in the validity generator that we have not explicitly handled: ' + msg) 25 super().__init__('Got a case in the validity generator that we have not explicitly handled.') 219 def writeInclude(self, directory, basename, validity: ValidityCollection, 226 validity - ValidityCollection to write. 237 # Create validity file 245 if validity: 248 write(validity, file=fp, end='') 340 # If no validity is being generated, it usually means that validity i [all...] |
H A D | reflib.py | 142 self.validity = None 143 """index of validity include""" 146 """index of last line of the page (heuristic validity include, or // refEnd)""" 186 printPageInfoField('VALIDITY', pi.validity, file) 282 # # If nothing is found but an include line with no begin, validity, 289 # if pi.begin is None and pi.validity is None and pi.end is None: 292 # pi.Warning = 'No begin, validity, or end lines identified' 340 # We can get to this point with .include, .param, and .validity 408 # It looks for various generated file conventions, and for the api/validity 501 # Must match later type definitions in interface/validity include [all...] |
H A D | hostsyncgenerator.py | 9 from spec_tools.validity import ValidityCollection, ValidityEntry 100 """Create thread safety validity for a single param of a command."""
|
/third_party/node/deps/v8/tools/debug_helper/ |
H A D | debug-macro-shims.h | 19 d::MemoryAccessResult validity = \ 22 if (validity != d::MemoryAccessResult::kOk) return {validity, {}}; \ 30 d::MemoryAccessResult validity = \ 33 if (validity != d::MemoryAccessResult::kOk) return {validity, {}}; \ 40 if ((val).validity != d::MemoryAccessResult::kOk) \ 41 return {(val).validity, {}}; \
|
H A D | get-object-properties.cc | 143 if (map_ptr.validity == d::MemoryAccessResult::kOk) { in IsTypedHeapObjectInstanceTypeOf() 146 if (type.validity == d::MemoryAccessResult::kOk) { in IsTypedHeapObjectInstanceTypeOf() 160 if (map_ptr.validity != d::MemoryAccessResult::kOk) { in GetTypedHeapObject() 164 return {map_ptr.validity == d::MemoryAccessResult::kAddressNotValid in GetTypedHeapObject() 172 if (type.validity == d::MemoryAccessResult::kOk) { in GetTypedHeapObject() 190 type.validity == d::MemoryAccessResult::kAddressNotValid in GetTypedHeapObject() 250 d::MemoryAccessResult validity = in ReadCharacter() local 253 return {validity, value}; in ReadCharacter() 320 DCHECK_IMPLIES(map_ptr.validity == d::MemoryAccessResult::kOk, in IsExternalStringCached() 400 if (value.validity ! in GetOrFinish() 663 d::MemoryAccessResult validity = memory_accessor( GetStackFrame() local [all...] |
H A D | debug-helper-internal.h | 29 d::MemoryAccessResult validity; member
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | x509_set.c | 82 return ossl_x509_set1_time(&x->cert_info.validity.notBefore, tm); in X509_set1_notBefore() 89 return ossl_x509_set1_time(&x->cert_info.validity.notAfter, tm); in X509_set1_notAfter() 118 return x->cert_info.validity.notBefore; in X509_get0_notBefore() 123 return x->cert_info.validity.notAfter; in X509_get0_notAfter() 128 return x->cert_info.validity.notBefore; in X509_getm_notBefore() 133 return x->cert_info.validity.notAfter; in X509_getm_notAfter()
|
H A D | x509_r2x.c | 50 if (X509_gmtime_adj(xi->validity.notBefore, 0) == NULL) in X509_REQ_to_X509() 52 if (X509_gmtime_adj(xi->validity.notAfter, (long)60 * 60 * 24 * days) == in X509_REQ_to_X509()
|
H A D | x_x509.c | 23 ASN1_EMBED(X509_CINF, validity, X509_VAL),
|
/third_party/openssl/crypto/x509/ |
H A D | x509_set.c | 82 return ossl_x509_set1_time(&x->cert_info.validity.notBefore, tm); in X509_set1_notBefore() 89 return ossl_x509_set1_time(&x->cert_info.validity.notAfter, tm); in X509_set1_notAfter() 118 return x->cert_info.validity.notBefore; in X509_get0_notBefore() 123 return x->cert_info.validity.notAfter; in X509_get0_notAfter() 128 return x->cert_info.validity.notBefore; in X509_getm_notBefore() 133 return x->cert_info.validity.notAfter; in X509_getm_notAfter()
|
H A D | x509_r2x.c | 50 if (X509_gmtime_adj(xi->validity.notBefore, 0) == NULL) in X509_REQ_to_X509() 52 if (X509_gmtime_adj(xi->validity.notAfter, (long)60 * 60 * 24 * days) == in X509_REQ_to_X509()
|
H A D | x_x509.c | 23 ASN1_EMBED(X509_CINF, validity, X509_VAL),
|
/third_party/node/test/fixtures/x509-escaping/ |
H A D | create-certs.js | 295 validity: { 449 validity: { 601 validity: {
|
/third_party/node/deps/v8/src/torque/ |
H A D | class-debug-reader-generator.cc | 233 // includes both a "validity", indicating whether the memory could be fetched, 239 // d::MemoryAccessResult validity = accessor( 243 // return {validity, EnsureDecompressed(value, address_)}; 251 // d::MemoryAccessResult validity = accessor( 255 // return {validity, EnsureDecompressed(value, address_)}; 285 cc_contents << " d::MemoryAccessResult validity = accessor(" in GenerateFieldValueAccessor() 293 cc_contents << " return {validity, " in GenerateFieldValueAccessor() 321 // could fail if the debuggee has incomplete memory, so the "validity" from that 345 // if (indexed_field_slice_descriptors.validity == d::MemoryAccessResult::kOk) { 355 // GetArrayKind(indexed_field_slice_descriptors.validity))); // Fiel 395 std::string validity = indexed_field_slice + ".validity"; GenerateGetPropsChunkForField() local [all...] |
/third_party/node/test/fixtures/0-dns/ |
H A D | create-cert.js | 39 validity:
|
/third_party/node/deps/openssl/openssl/crypto/crmf/ |
H A D | crmf_local.h | 298 * validity [4] OptionalValidity OPTIONAL, 313 OSSL_CRMF_OPTIONALVALIDITY *validity; member
|
H A D | crmf_asn.c | 198 ASN1_IMP_OPT(OSSL_CRMF_CERTTEMPLATE, validity,
|
/third_party/openssl/crypto/crmf/ |
H A D | crmf_local.h | 298 * validity [4] OptionalValidity OPTIONAL, 313 OSSL_CRMF_OPTIONALVALIDITY *validity; member
|
H A D | crmf_asn.c | 198 ASN1_IMP_OPT(OSSL_CRMF_CERTTEMPLATE, validity,
|
/third_party/libunwind/libunwind/doc/ |
H A D | unw_set_caching_policy.tex | 39 changes in a way that could affect the validity of cached information.
|
/third_party/openssl/ohos_lite/include/crypto/ |
H A D | x509.h | 151 X509_VAL validity; member 220 /* Check CRL validity */
|
/third_party/node/deps/openssl/openssl/include/crypto/ |
H A D | x509.h | 165 X509_VAL validity; member 240 /* Check CRL validity */
|
/third_party/openssl/include/crypto/ |
H A D | x509.h | 165 X509_VAL validity; member 240 /* Check CRL validity */
|
/third_party/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/calendar/ |
H A D | CalendarRegressionTest.java | 424 for (int validity=0; validity<30; validity++) { in Test4083167() 426 (long)validity*1000*24*60*60); in Test4083167()
|
/third_party/icu/ohos_icu4j/src/main/tests/ohos/global/icu/dev/test/calendar/ |
H A D | CalendarRegressionTest.java | 427 for (int validity=0; validity<30; validity++) { in Test4083167() 429 (long)validity*1000*24*60*60); in Test4083167()
|