Searched refs:validity (Results 1 - 16 of 16) sorted by relevance

/osnet-11/usr/src/lib/libc/port/sys/
H A Dmeminfosys.c41 int info_count, uint64_t *outdata, uint_t *validity)
49 minfo.mi_validity = validity;
40 meminfo(const uint64_t *inaddr, int addr_count, const uint_t *info_req, int info_count, uint64_t *outdata, uint_t *validity) argument
/osnet-11/usr/src/lib/libproc/common/
H A Dpr_meminfo.c42 uint64_t *outdata, uint_t *validity)
170 if (Pread(Pr, validity, validityarraysize, validityaddr)
172 dprintf("pr_meminfo: Pread of validity array failed\n");
40 pr_meminfo(struct ps_prochandle *Pr, const uint64_t *addrs, int addr_count, const uint_t *info, int info_count, uint64_t *outdata, uint_t *validity) argument
H A Dlibproc.h301 uint64_t *outdata, uint_t *validity);
/osnet-11/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c119 free_validity(KMF_X509_VALIDITY *validity) argument
121 free_data(&validity->notBefore.time);
122 free_data(&validity->notAfter.time);
190 free_validity(&tbscert->validity);
687 encode_validity(BerElement *asn1, KMF_X509_VALIDITY *validity) argument
692 validity->notBefore.timeType,
693 validity->notBefore.time.Data,
694 validity->notAfter.timeType,
695 validity->notAfter.time.Data);
704 get_validity(BerElement *asn1, KMF_X509_VALIDITY *validity) argument
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Encode/bin/
H A Dpiconv110 -C N | -c | -p check the validity of the input
175 Check the validity of the stream if I<N> = 1. When I<N> = -1, something
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c377 SECCertTimeValidity validity; local
393 validity = CERT_CheckCertValidTimes(nss_cert, PR_Now(),
395 if (validity != secCertTimeValid) {
403 validity = CERT_CheckCertValidTimes(nss_cert, PR_Now(),
405 if (validity == secCertTimeValid) {
598 KMF_CERT_VALIDITY validity; local
626 &validity, NULL);
628 validity = KMF_ALL_CERTS;
635 validity);
641 &certlist, validity);
697 KMF_CERT_VALIDITY validity; local
[all...]
/osnet-11/usr/src/lib/libkmf/libkmf/common/
H A Dcertgetsetop.c1714 not_before_str = certData->certificate.validity.notBefore.time.Data;
1730 not_after_str = certData->certificate.validity.notAfter.time.Data;
1945 /* Set up validity fields */
1957 CertData->certificate.validity.notBefore.timeType = BER_UTCTIME;
1958 CertData->certificate.validity.notBefore.time.Length =
1960 CertData->certificate.validity.notBefore.time.Data =
1970 CertData->certificate.validity.notAfter.timeType = BER_UTCTIME;
1971 CertData->certificate.validity.notAfter.time.Length =
1973 CertData->certificate.validity.notAfter.time.Data =
H A Dgeneralop.c1228 free_validity(KMF_X509_VALIDITY *validity) argument
1230 if (validity == NULL)
1232 kmf_free_data(&validity->notBefore.time);
1233 kmf_free_data(&validity->notAfter.time);
1264 free_validity(&tbscert->validity);
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c660 KMF_CERT_VALIDITY validity, char *pathname,
683 rv = kmf_load_cert(kmfh, issuer, subject, serial, validity,
711 if (validity == KMF_NONEXPIRED_CERTS) {
713 } else if (validity == KMF_EXPIRED_CERTS) {
752 KMF_CERT_VALIDITY validity,
765 if (validity == KMF_NONEXPIRED_CERTS) {
767 } else if (validity == KMF_EXPIRED_CERTS) {
1038 KMF_CERT_VALIDITY validity; local
1071 &validity, NULL);
1073 validity
659 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA **certlist, uint32_t *numcerts) argument
750 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument
1268 KMF_CERT_VALIDITY validity; local
[all...]
/osnet-11/usr/src/lib/libslp/clib/
H A Dslp_ami.h125 struct ami_validity *validity; member in struct:ami_cert_info
276 struct ami_validity *validity; /* NULL for not present */ member in struct:ami_tkey
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c477 boolean_t private, KMF_CERT_VALIDITY validity,
580 if (validity == KMF_ALL_CERTS) {
604 if (validity == KMF_NONEXPIRED_CERTS) {
621 if (validity == KMF_EXPIRED_CERTS) {
678 KMF_CERT_VALIDITY validity; local
710 &validity, NULL);
712 validity = KMF_ALL_CERTS;
732 validity, &objlist, num_certs);
1344 KMF_CERT_VALIDITY validity; local
1361 &validity, NUL
475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument
[all...]
/osnet-11/usr/src/lib/libkmf/include/
H A Dkmftypes.h574 KMF_X509_VALIDITY validity; member in struct:__anon1885
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/pod/
H A Dpod2man.PL190 No longer used. B<pod2man> used to check its input for validity as a manual
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Math/BigInt/
H A DCalc.pm2090 parameter validity is done by the caller, so you need not worry about
/osnet-11/usr/src/lib/libc/port/
H A Dllib-lc1376 int info_count, uint64_t *outdata, uint_t *validity);
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/
H A DCPAN.pm3224 Please check the validity of the index file by comparing it to more
3234 check the validity of the index file by comparing it to more than one
3242 Please check the validity of the index file by comparing it to more

Completed in 125 milliseconds