/osnet-11/usr/src/lib/libc/port/sys/ |
H A D | meminfosys.c | 41 int info_count, uint64_t *outdata, uint_t *validity) 49 minfo.mi_validity = validity; 40 meminfo(const uint64_t *inaddr, int addr_count, const uint_t *info_req, int info_count, uint64_t *outdata, uint_t *validity) argument
|
/osnet-11/usr/src/lib/libproc/common/ |
H A D | pr_meminfo.c | 42 uint64_t *outdata, uint_t *validity) 170 if (Pread(Pr, validity, validityarraysize, validityaddr) 172 dprintf("pr_meminfo: Pread of validity array failed\n"); 40 pr_meminfo(struct ps_prochandle *Pr, const uint64_t *addrs, int addr_count, const uint_t *info, int info_count, uint64_t *outdata, uint_t *validity) argument
|
H A D | libproc.h | 301 uint64_t *outdata, uint_t *validity);
|
/osnet-11/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 119 free_validity(KMF_X509_VALIDITY *validity) argument 121 free_data(&validity->notBefore.time); 122 free_data(&validity->notAfter.time); 190 free_validity(&tbscert->validity); 687 encode_validity(BerElement *asn1, KMF_X509_VALIDITY *validity) argument 692 validity->notBefore.timeType, 693 validity->notBefore.time.Data, 694 validity->notAfter.timeType, 695 validity->notAfter.time.Data); 704 get_validity(BerElement *asn1, KMF_X509_VALIDITY *validity) argument [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Encode/bin/ |
H A D | piconv | 110 -C N | -c | -p check the validity of the input 175 Check the validity of the stream if I<N> = 1. When I<N> = -1, something
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 377 SECCertTimeValidity validity; local 393 validity = CERT_CheckCertValidTimes(nss_cert, PR_Now(), 395 if (validity != secCertTimeValid) { 403 validity = CERT_CheckCertValidTimes(nss_cert, PR_Now(), 405 if (validity == secCertTimeValid) { 598 KMF_CERT_VALIDITY validity; local 626 &validity, NULL); 628 validity = KMF_ALL_CERTS; 635 validity); 641 &certlist, validity); 697 KMF_CERT_VALIDITY validity; local [all...] |
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | certgetsetop.c | 1714 not_before_str = certData->certificate.validity.notBefore.time.Data; 1730 not_after_str = certData->certificate.validity.notAfter.time.Data; 1945 /* Set up validity fields */ 1957 CertData->certificate.validity.notBefore.timeType = BER_UTCTIME; 1958 CertData->certificate.validity.notBefore.time.Length = 1960 CertData->certificate.validity.notBefore.time.Data = 1970 CertData->certificate.validity.notAfter.timeType = BER_UTCTIME; 1971 CertData->certificate.validity.notAfter.time.Length = 1973 CertData->certificate.validity.notAfter.time.Data =
|
H A D | generalop.c | 1228 free_validity(KMF_X509_VALIDITY *validity) argument 1230 if (validity == NULL) 1232 kmf_free_data(&validity->notBefore.time); 1233 kmf_free_data(&validity->notAfter.time); 1264 free_validity(&tbscert->validity);
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 660 KMF_CERT_VALIDITY validity, char *pathname, 683 rv = kmf_load_cert(kmfh, issuer, subject, serial, validity, 711 if (validity == KMF_NONEXPIRED_CERTS) { 713 } else if (validity == KMF_EXPIRED_CERTS) { 752 KMF_CERT_VALIDITY validity, 765 if (validity == KMF_NONEXPIRED_CERTS) { 767 } else if (validity == KMF_EXPIRED_CERTS) { 1038 KMF_CERT_VALIDITY validity; local 1071 &validity, NULL); 1073 validity 659 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA **certlist, uint32_t *numcerts) argument 750 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument 1268 KMF_CERT_VALIDITY validity; local [all...] |
/osnet-11/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 125 struct ami_validity *validity; member in struct:ami_cert_info 276 struct ami_validity *validity; /* NULL for not present */ member in struct:ami_tkey
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 477 boolean_t private, KMF_CERT_VALIDITY validity, 580 if (validity == KMF_ALL_CERTS) { 604 if (validity == KMF_NONEXPIRED_CERTS) { 621 if (validity == KMF_EXPIRED_CERTS) { 678 KMF_CERT_VALIDITY validity; local 710 &validity, NULL); 712 validity = KMF_ALL_CERTS; 732 validity, &objlist, num_certs); 1344 KMF_CERT_VALIDITY validity; local 1361 &validity, NUL 475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument [all...] |
/osnet-11/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 574 KMF_X509_VALIDITY validity; member in struct:__anon1885
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/pod/ |
H A D | pod2man.PL | 190 No longer used. B<pod2man> used to check its input for validity as a manual
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Math/BigInt/ |
H A D | Calc.pm | 2090 parameter validity is done by the caller, so you need not worry about
|
/osnet-11/usr/src/lib/libc/port/ |
H A D | llib-lc | 1376 int info_count, uint64_t *outdata, uint_t *validity);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/ |
H A D | CPAN.pm | 3224 Please check the validity of the index file by comparing it to more 3234 check the validity of the index file by comparing it to more than one 3242 Please check the validity of the index file by comparing it to more
|