Searched defs:critical (Results 1 - 14 of 14) sorted by relevance

/illumos-gate/usr/src/lib/libpicltree/
H A Dpicltree.h164 int critical; member in struct:__anon3759
/illumos-gate/usr/src/cmd/vntsd/
H A Dcommon.c488 int critical = 0; local
501 critical = 1;
550 critical = 1;
555 critical = 1;
560 critical = 1;
569 critical = 1;
574 critical = 1;
579 critical = 1;
584 critical = 1;
589 critical
[all...]
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dcsrcrlop.c226 char *altname, int critical,
235 (KMF_OID *)&KMFOID_SubjectAltName, critical, alttype,
243 int critical, uint16_t kubits)
251 &CSRData->csr.extensions, critical, kubits);
258 int critical)
326 foundextn->critical = critical;
334 newextn.critical = critical;
225 kmf_set_csr_subject_altname(KMF_CSR_DATA *Csr, char *altname, int critical, KMF_GENERALNAMECHOICES alttype) argument
242 kmf_set_csr_ku(KMF_CSR_DATA *CSRData, int critical, uint16_t kubits) argument
257 kmf_add_csr_eku(KMF_CSR_DATA *CSRData, KMF_OID *ekuOID, int critical) argument
H A Dcertgetsetop.c81 dstext->critical = srcext->critical;
174 * return the OIDs for critical, non-critical or all extensions.
182 * NumOIDs - number of critical extensions found.
212 if (flag == KMF_CRITICAL_EXTNS && eptr->critical == 0)
214 else if (flag == KMF_NONCRITICAL_EXTNS && eptr->critical != 0)
243 * any critical or non_critical extensions. When that happened,
283 keyusage->critical = (extn.critical !
419 kmf_get_cert_basic_constraint(const KMF_DATA *certdata, KMF_BOOL *critical, KMF_X509EXT_BASICCONSTRAINTS *constraint) argument
614 kmf_get_cert_policies(const KMF_DATA *certdata, KMF_BOOL *critical, KMF_X509EXT_CERT_POLICIES *extptr) argument
1811 set_key_usage_extension(KMF_X509_EXTENSIONS *extns, int critical, uint32_t bits) argument
1867 kmf_set_cert_ku(KMF_X509_CERTIFICATE *CertData, int critical, uint16_t kubits) argument
2046 kmf_set_cert_issuer_altname(KMF_X509_CERTIFICATE *CertData, int critical, KMF_GENERALNAMECHOICES nametype, char *namedata) argument
2059 kmf_set_cert_subject_altname(KMF_X509_CERTIFICATE *CertData, int critical, KMF_GENERALNAMECHOICES nametype, char *namedata) argument
2072 kmf_add_cert_eku(KMF_X509_CERTIFICATE *CertData, KMF_OID *ekuOID, int critical) argument
2193 kmf_set_cert_basic_constraint(KMF_X509_CERTIFICATE *CertData, KMF_BOOL critical, KMF_X509EXT_BASICCONSTRAINTS *constraint) argument
[all...]
H A Dcertop.c171 KMF_BOOL critical = B_FALSE; local
199 * critical extension in all CA certificates that
205 &critical, &constraint);
210 if ((!critical) || (!constraint.cA))
430 KMF_BOOL critical; local
435 &critical, &basicConstraint);
611 * marked critical.
1971 KMF_BOOL critical = B_FALSE; local
1997 * marked critical.
2002 &critical,
[all...]
H A Dgeneralop.c148 boolean_t critical; member in struct:__anon3482
2165 int critical,
2246 foundextn->critical = critical;
2250 subjAltName.critical = critical;
2163 kmf_set_altname(KMF_X509_EXTENSIONS *extensions, KMF_OID *oid, int critical, KMF_GENERALNAMECHOICES nametype, char *namedata) argument
/illumos-gate/usr/src/uts/sun4u/opl/sys/
H A Ddrmach.h135 * Note that it is important to keep the "critical"
138 * critical data into the cache so that there is no
142 * They are all locked in TLB and the critical data
250 drmach_copy_rename_critical_t *critical; member in struct:drmach_copy_rename_program
/illumos-gate/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c1045 if (extns->extensions[i].critical) {
1047 extns->extensions[i].critical) == -1) {
1115 int critical, tag; local
1138 critical = 0;
1142 if (kmfber_scanf(asn1, "b", &critical) == -1)
1166 ex->critical = critical;
1232 * critical BOOLEAN DEFAULT FALSE,
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dcommon.c1018 * The field may be marked "critical" by prepending
1019 * "critical:" to the list.
1020 * EX: critical:digitialSignature,keyEncipherment
1023 verify_keyusage(char *kustr, uint16_t *kubits, int *critical) argument
1033 /* Check to see if this is critical */
1034 if (strncasecmp(kustr, "critical:", strlen("critical:")) == 0) {
1035 *critical = TRUE;
1036 kustr += strlen("critical:");
1038 *critical
1063 verify_altname(char *arg, KMF_GENERALNAMECHOICES *type, int *critical) argument
1212 addToEKUList(EKU_LIST *ekus, int critical, KMF_OID *newoid) argument
1253 int critical; local
[all...]
/illumos-gate/usr/src/lib/libslp/clib/
H A Dslp_ami.h198 amiBoolean critical; member in struct:ami_cert_extn
/illumos-gate/usr/src/cmd/init/
H A Dinit.c4077 contract_make_template(uint_t info, uint_t critical, uint_t fatal, argument
4106 if (err = ct_tmpl_set_critical(fd, critical))
4107 console(B_TRUE, ioctl_tset_emsg, "critical", strerror(err));
4349 /* Allow unexpected critical events to be released. */
/illumos-gate/usr/src/lib/libkmf/include/
H A Dkmftypes.h541 KMF_BOOL critical; member in struct:__anon3454
663 uchar_t critical; member in struct:__anon3466
669 uchar_t critical; member in struct:__anon3467
/illumos-gate/usr/src/uts/sun4u/sys/
H A Drmc_comm_hproto.h203 rsci32 critical; /* boolean */ member in struct:dp_send_alert
/illumos-gate/usr/src/uts/sfmmu/vm/
H A Dhat_sfmmu.c6966 * Now that we're out of the performance critical section we can
10520 sfmmu_get_free_hblk(struct hme_blk **hmeblkpp, uint_t critical) argument
10530 * critical request from sfmmu_hblk_steal()
10533 if (freehblkcnt <= HBLK_RESERVE_MIN && !critical) {
10572 sfmmu_put_free_hblk(struct hme_blk *hmeblkp, uint_t critical) argument
10591 if (freehblkcnt < HBLK_RESERVE_CNT || critical) {
10593 if (freehblkcnt < HBLK_RESERVE_CNT || critical) {
10609 ASSERT(!critical);
11256 uint_t critical; local
11274 critical
11312 uint_t loop_cnt = 0, critical; local
[all...]

Completed in 146 milliseconds