/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509/ |
H A D | x509_set.c | 117 if ((x == NULL) || (x->cert_info->validity == NULL)) 119 in = x->cert_info->validity->notBefore; 123 M_ASN1_TIME_free(x->cert_info->validity->notBefore); 124 x->cert_info->validity->notBefore = in; 134 if ((x == NULL) || (x->cert_info->validity == NULL)) 136 in = x->cert_info->validity->notAfter; 140 M_ASN1_TIME_free(x->cert_info->validity->notAfter); 141 x->cert_info->validity->notAfter = in;
|
H A D | x509_r2x.c | 97 if (X509_gmtime_adj(xi->validity->notBefore, 0) == NULL) 99 if (X509_gmtime_adj(xi->validity->notAfter, (long)60 * 60 * 24 * days) ==
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509/ |
H A D | x509_set.c | 111 if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); 112 in=x->cert_info->validity->notBefore; 118 M_ASN1_TIME_free(x->cert_info->validity->notBefore); 119 x->cert_info->validity->notBefore=in; 129 if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); 130 in=x->cert_info->validity->notAfter; 136 M_ASN1_TIME_free(x->cert_info->validity->notAfter); 137 x->cert_info->validity->notAfter=in;
|
H A D | x509_r2x.c | 97 if (X509_gmtime_adj(xi->validity->notBefore,0) == NULL) 99 if (X509_gmtime_adj(xi->validity->notAfter,(long)60*60*24*days) == NULL)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509/ |
H A D | x509_set.c | 117 if ((x == NULL) || (x->cert_info->validity == NULL)) 119 in = x->cert_info->validity->notBefore; 123 M_ASN1_TIME_free(x->cert_info->validity->notBefore); 124 x->cert_info->validity->notBefore = in; 134 if ((x == NULL) || (x->cert_info->validity == NULL)) 136 in = x->cert_info->validity->notAfter; 140 M_ASN1_TIME_free(x->cert_info->validity->notAfter); 141 x->cert_info->validity->notAfter = in;
|
H A D | x509_r2x.c | 97 if (X509_gmtime_adj(xi->validity->notBefore, 0) == NULL) 99 if (X509_gmtime_adj(xi->validity->notAfter, (long)60 * 60 * 24 * days) ==
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/ |
H A D | auth_x.h | 18 struct ceph_timespec validity; member in struct:ceph_x_ticket_handler
|
H A D | auth_x.c | 165 struct timespec validity; local 210 ceph_decode_timespec(&validity, &new_validity); 211 new_expires = get_seconds() + validity.tv_sec; 212 new_renew_after = new_expires - (validity.tv_sec / 4); 250 th->validity = new_validity;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/bus/ |
H A D | config-parser-trivial.c | 421 Validity validity, 441 else if (validity == VALID) 461 if (validity == INVALID) 474 Validity validity; member in struct:__anon1613 482 return do_load (d->full_path, d->validity, TRUE); 488 Validity validity) 526 if (validity == VALID) 528 else if (validity == INVALID) 559 validity == VALID ? "valid" : 560 (validity 420 do_load(const DBusString *full_path, Validity validity, dbus_bool_t oom_possible) argument 486 process_test_valid_subdir(const DBusString *test_base_dir, const char *subdir, Validity validity) argument 646 check_file_valid(DBusString *full_path, Validity validity) argument [all...] |
H A D | config-parser.c | 2800 Validity validity, 2821 else if (validity == VALID) 2846 if (validity == INVALID) 2859 Validity validity; member in struct:__anon1623 2868 return do_load (d->full_path, d->validity, TRUE, d->check_own_rules); 2874 Validity validity) 2912 if (validity == VALID) 2914 else if (validity == INVALID) 2945 validity == VALID ? "valid" : 2946 (validity 2799 do_load(const DBusString *full_path, Validity validity, dbus_bool_t oom_possible, dbus_bool_t check_own_rules) argument 2872 process_test_valid_subdir(const DBusString *test_base_dir, const char *subdir, Validity validity) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/dbus/ |
H A D | dbus-marshal-validate.c | 443 DBusValidity validity; local 494 validity = validate_body_helper (&sub, byte_order, FALSE, 497 if (validity != DBUS_VALID) 498 return validity; 523 DBusValidity validity; local 533 validity = 537 if (validity != DBUS_VALID) 538 return validity; 564 DBusValidity validity; local 613 validity 630 DBusValidity validity; local 714 DBusValidity validity; local 837 _dbus_validity_to_error_message(DBusValidity validity) argument [all...] |
H A D | dbus-marshal-validate-util.c | 534 DBusValidity validity; local 536 validity = _dbus_validate_body_with_reason (&signature, 0, 540 if (validity != DBUS_VALID) 543 validity, sequence); 559 DBusValidity validity; local 561 validity = _dbus_validate_body_with_reason (&signature, 0, 565 if (validity != DBUS_VALID) 568 validity, sequence);
|
H A D | dbus-marshal-header.h | 104 DBusValidity *validity, 114 DBusValidity *validity,
|
H A D | dbus-marshal-header.c | 660 * @param validity return location for why the data is invalid if it is 672 DBusValidity *validity, 696 *validity = DBUS_INVALID_BAD_BYTE_ORDER; 706 *validity = DBUS_INVALID_INSANE_FIELDS_ARRAY_LENGTH; 716 *validity = DBUS_INVALID_INSANE_BODY_LENGTH; 729 *validity = DBUS_INVALID_MESSAGE_TOO_LONG; 741 *validity = DBUS_VALID; 945 * returns #FALSE and *validity == #DBUS_VALIDITY_UNKNOWN_OOM_ERROR, 947 * and *validity != #DBUS_VALIDITY_UNKNOWN_OOM_ERROR then the data was 957 * @param validity retur 671 _dbus_header_have_message_untrusted(int max_message_length, DBusValidity *validity, int *byte_order, int *fields_array_len, int *header_len, int *body_len, const DBusString *str, int start, int len) argument 968 _dbus_header_load(DBusHeader *header, DBusValidationMode mode, DBusValidity *validity, int byte_order, int fields_array_len, int header_len, int body_len, const DBusString *str, int start, int len) argument [all...] |
H A D | dbus-marshal-validate.h | 52 DBUS_VALIDITY_UNKNOWN_OOM_ERROR = -4, /**< can't determine validity due to OOM */ 130 const char *_dbus_validity_to_error_message (DBusValidity validity);
|
H A D | dbus-message.c | 4026 DBusValidity validity; local 4046 &validity, 4054 _dbus_verbose ("Failed to load header for new message code %d\n", validity); 4058 _dbus_assert (validity != DBUS_VALID); 4060 if (validity == DBUS_VALIDITY_UNKNOWN_OOM_ERROR) 4065 loader->corruption_reason = validity; 4070 _dbus_assert (validity == DBUS_VALID); 4080 validity = _dbus_validate_body_with_reason (type_str, 4087 if (validity != DBUS_VALID) 4089 _dbus_verbose ("Failed to validate message body code %d\n", validity); 4225 DBusValidity validity; local 4732 DBusValidity validity = DBUS_VALID; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libxml2-2.7.2/ |
H A D | runsuite.c | 792 xmlChar *validity = NULL; local 822 validity = getString(cur, 823 "string(ts:expected/@validity)"); 824 if (validity == NULL) { 825 fprintf(stderr, "instanceDocument line %ld misses expected validity\n", 846 if (xmlStrEqual(validity, BAD_CAST "valid")) { 857 } else if (xmlStrEqual(validity, BAD_CAST "invalid")) { 864 test_log("instanceDocument line %ld has unexpected validity value%s\n", 865 xmlGetLineNo(cur), validity); 873 if (validity ! 889 xmlChar *validity = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/libxml2-2.7.2/source/ |
H A D | runsuite.c | 792 xmlChar *validity = NULL; local 822 validity = getString(cur, 823 "string(ts:expected/@validity)"); 824 if (validity == NULL) { 825 fprintf(stderr, "instanceDocument line %ld misses expected validity\n", 846 if (xmlStrEqual(validity, BAD_CAST "valid")) { 857 } else if (xmlStrEqual(validity, BAD_CAST "invalid")) { 864 test_log("instanceDocument line %ld has unexpected validity value%s\n", 865 xmlGetLineNo(cur), validity); 873 if (validity ! 889 xmlChar *validity = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/usb/class/ |
H A D | cdc-wdm.c | 73 struct urb *validity; member in struct:wdm_device 266 usb_kill_urb(desc->validity); 272 usb_free_urb(desc->validity); 282 desc->validity->transfer_dma); 545 rv = usb_submit_urb(desc->validity, GFP_KERNEL); 692 desc->validity = usb_alloc_urb(0, GFP_KERNEL); 693 if (!desc->validity) 711 &desc->validity->transfer_dma); 723 desc->validity, 732 desc->validity [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/char/ip2/ |
H A D | i2lib.h | 84 USHORT validity; // Indicates whether the given channel has been member in struct:_i2ChanStr 243 // validity 246 #define CHANNEL_MAGIC 0x5300 // (validity & CHANNEL_MAGIC_BITS) ==
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | x_x509.c | 71 ASN1_SIMPLE(X509_CINF, validity, X509_VAL),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | x_x509.c | 71 ASN1_SIMPLE(X509_CINF, validity, X509_VAL),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | x_x509.c | 71 ASN1_SIMPLE(X509_CINF, validity, X509_VAL),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/docs/latex/wx/ |
H A D | icon.tex | 129 The validity of these flags depends on the platform and wxWidgets configuration. 268 The validity of these flags depends on the platform and wxWidgets configuration.} 305 The validity of these flags depends on the platform and wxWidgets configuration.}
|
H A D | bitmap.tex | 127 The validity of these flags depends on the platform and wxWidgets configuration. 428 The validity of these flags depends on the platform and wxWidgets configuration. 491 The validity of these flags depends on the platform and wxWidgets configuration. 552 %%Sets the validity member (does not affect the bitmap data).
|