Searched defs:validity (Results 1 - 9 of 9) sorted by relevance

/osnet-11/usr/src/lib/libc/port/sys/
H A Dmeminfosys.c41 int info_count, uint64_t *outdata, uint_t *validity)
49 minfo.mi_validity = validity;
40 meminfo(const uint64_t *inaddr, int addr_count, const uint_t *info_req, int info_count, uint64_t *outdata, uint_t *validity) argument
/osnet-11/usr/src/lib/libproc/common/
H A Dpr_meminfo.c42 uint64_t *outdata, uint_t *validity)
170 if (Pread(Pr, validity, validityarraysize, validityaddr)
172 dprintf("pr_meminfo: Pread of validity array failed\n");
40 pr_meminfo(struct ps_prochandle *Pr, const uint64_t *addrs, int addr_count, const uint_t *info, int info_count, uint64_t *outdata, uint_t *validity) argument
/osnet-11/usr/src/lib/libkmf/libkmf/common/
H A Dgeneralop.c1228 free_validity(KMF_X509_VALIDITY *validity) argument
1230 if (validity == NULL)
1232 kmf_free_data(&validity->notBefore.time);
1233 kmf_free_data(&validity->notAfter.time);
1264 free_validity(&tbscert->validity);
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c377 SECCertTimeValidity validity; local
393 validity = CERT_CheckCertValidTimes(nss_cert, PR_Now(),
395 if (validity != secCertTimeValid) {
403 validity = CERT_CheckCertValidTimes(nss_cert, PR_Now(),
405 if (validity == secCertTimeValid) {
598 KMF_CERT_VALIDITY validity; local
626 &validity, NULL);
628 validity = KMF_ALL_CERTS;
635 validity);
641 &certlist, validity);
697 KMF_CERT_VALIDITY validity; local
[all...]
/osnet-11/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c119 free_validity(KMF_X509_VALIDITY *validity) argument
121 free_data(&validity->notBefore.time);
122 free_data(&validity->notAfter.time);
190 free_validity(&tbscert->validity);
687 encode_validity(BerElement *asn1, KMF_X509_VALIDITY *validity) argument
692 validity->notBefore.timeType,
693 validity->notBefore.time.Data,
694 validity->notAfter.timeType,
695 validity->notAfter.time.Data);
704 get_validity(BerElement *asn1, KMF_X509_VALIDITY *validity) argument
[all...]
/osnet-11/usr/src/lib/libslp/clib/
H A Dslp_ami.h125 struct ami_validity *validity; member in struct:ami_cert_info
276 struct ami_validity *validity; /* NULL for not present */ member in struct:ami_tkey
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c477 boolean_t private, KMF_CERT_VALIDITY validity,
580 if (validity == KMF_ALL_CERTS) {
604 if (validity == KMF_NONEXPIRED_CERTS) {
621 if (validity == KMF_EXPIRED_CERTS) {
678 KMF_CERT_VALIDITY validity; local
710 &validity, NULL);
712 validity = KMF_ALL_CERTS;
732 validity, &objlist, num_certs);
1344 KMF_CERT_VALIDITY validity; local
1361 &validity, NUL
475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument
[all...]
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c660 KMF_CERT_VALIDITY validity, char *pathname,
683 rv = kmf_load_cert(kmfh, issuer, subject, serial, validity,
711 if (validity == KMF_NONEXPIRED_CERTS) {
713 } else if (validity == KMF_EXPIRED_CERTS) {
752 KMF_CERT_VALIDITY validity,
765 if (validity == KMF_NONEXPIRED_CERTS) {
767 } else if (validity == KMF_EXPIRED_CERTS) {
1038 KMF_CERT_VALIDITY validity; local
1071 &validity, NULL);
1073 validity
659 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA **certlist, uint32_t *numcerts) argument
750 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument
1268 KMF_CERT_VALIDITY validity; local
[all...]
/osnet-11/usr/src/lib/libkmf/include/
H A Dkmftypes.h574 KMF_X509_VALIDITY validity; member in struct:__anon1885

Completed in 97 milliseconds