/osnet-11/usr/src/lib/libc/port/sys/ |
H A D | meminfosys.c | 41 int info_count, uint64_t *outdata, uint_t *validity) 49 minfo.mi_validity = validity; 40 meminfo(const uint64_t *inaddr, int addr_count, const uint_t *info_req, int info_count, uint64_t *outdata, uint_t *validity) argument
|
/osnet-11/usr/src/lib/libproc/common/ |
H A D | pr_meminfo.c | 42 uint64_t *outdata, uint_t *validity) 170 if (Pread(Pr, validity, validityarraysize, validityaddr) 172 dprintf("pr_meminfo: Pread of validity array failed\n"); 40 pr_meminfo(struct ps_prochandle *Pr, const uint64_t *addrs, int addr_count, const uint_t *info, int info_count, uint64_t *outdata, uint_t *validity) argument
|
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | generalop.c | 1228 free_validity(KMF_X509_VALIDITY *validity) argument 1230 if (validity == NULL) 1232 kmf_free_data(&validity->notBefore.time); 1233 kmf_free_data(&validity->notAfter.time); 1264 free_validity(&tbscert->validity);
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 377 SECCertTimeValidity validity; local 393 validity = CERT_CheckCertValidTimes(nss_cert, PR_Now(), 395 if (validity != secCertTimeValid) { 403 validity = CERT_CheckCertValidTimes(nss_cert, PR_Now(), 405 if (validity == secCertTimeValid) { 598 KMF_CERT_VALIDITY validity; local 626 &validity, NULL); 628 validity = KMF_ALL_CERTS; 635 validity); 641 &certlist, validity); 697 KMF_CERT_VALIDITY validity; local [all...] |
/osnet-11/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 119 free_validity(KMF_X509_VALIDITY *validity) argument 121 free_data(&validity->notBefore.time); 122 free_data(&validity->notAfter.time); 190 free_validity(&tbscert->validity); 687 encode_validity(BerElement *asn1, KMF_X509_VALIDITY *validity) argument 692 validity->notBefore.timeType, 693 validity->notBefore.time.Data, 694 validity->notAfter.timeType, 695 validity->notAfter.time.Data); 704 get_validity(BerElement *asn1, KMF_X509_VALIDITY *validity) argument [all...] |
/osnet-11/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 125 struct ami_validity *validity; member in struct:ami_cert_info 276 struct ami_validity *validity; /* NULL for not present */ member in struct:ami_tkey
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 477 boolean_t private, KMF_CERT_VALIDITY validity, 580 if (validity == KMF_ALL_CERTS) { 604 if (validity == KMF_NONEXPIRED_CERTS) { 621 if (validity == KMF_EXPIRED_CERTS) { 678 KMF_CERT_VALIDITY validity; local 710 &validity, NULL); 712 validity = KMF_ALL_CERTS; 732 validity, &objlist, num_certs); 1344 KMF_CERT_VALIDITY validity; local 1361 &validity, NUL 475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument [all...] |
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 660 KMF_CERT_VALIDITY validity, char *pathname, 683 rv = kmf_load_cert(kmfh, issuer, subject, serial, validity, 711 if (validity == KMF_NONEXPIRED_CERTS) { 713 } else if (validity == KMF_EXPIRED_CERTS) { 752 KMF_CERT_VALIDITY validity, 765 if (validity == KMF_NONEXPIRED_CERTS) { 767 } else if (validity == KMF_EXPIRED_CERTS) { 1038 KMF_CERT_VALIDITY validity; local 1071 &validity, NULL); 1073 validity 659 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA **certlist, uint32_t *numcerts) argument 750 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument 1268 KMF_CERT_VALIDITY validity; local [all...] |
/osnet-11/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 574 KMF_X509_VALIDITY validity; member in struct:__anon1885
|