/illumos-gate/usr/src/lib/libpicltree/ |
H A D | picltree.h | 164 int critical; member in struct:__anon3759
|
/illumos-gate/usr/src/cmd/vntsd/ |
H A D | common.c | 488 int critical = 0; local 501 critical = 1; 550 critical = 1; 555 critical = 1; 560 critical = 1; 569 critical = 1; 574 critical = 1; 579 critical = 1; 584 critical = 1; 589 critical [all...] |
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | csrcrlop.c | 226 char *altname, int critical, 235 (KMF_OID *)&KMFOID_SubjectAltName, critical, alttype, 243 int critical, uint16_t kubits) 251 &CSRData->csr.extensions, critical, kubits); 258 int critical) 326 foundextn->critical = critical; 334 newextn.critical = critical; 225 kmf_set_csr_subject_altname(KMF_CSR_DATA *Csr, char *altname, int critical, KMF_GENERALNAMECHOICES alttype) argument 242 kmf_set_csr_ku(KMF_CSR_DATA *CSRData, int critical, uint16_t kubits) argument 257 kmf_add_csr_eku(KMF_CSR_DATA *CSRData, KMF_OID *ekuOID, int critical) argument
|
H A D | certgetsetop.c | 81 dstext->critical = srcext->critical; 174 * return the OIDs for critical, non-critical or all extensions. 182 * NumOIDs - number of critical extensions found. 212 if (flag == KMF_CRITICAL_EXTNS && eptr->critical == 0) 214 else if (flag == KMF_NONCRITICAL_EXTNS && eptr->critical != 0) 243 * any critical or non_critical extensions. When that happened, 283 keyusage->critical = (extn.critical ! 419 kmf_get_cert_basic_constraint(const KMF_DATA *certdata, KMF_BOOL *critical, KMF_X509EXT_BASICCONSTRAINTS *constraint) argument 614 kmf_get_cert_policies(const KMF_DATA *certdata, KMF_BOOL *critical, KMF_X509EXT_CERT_POLICIES *extptr) argument 1811 set_key_usage_extension(KMF_X509_EXTENSIONS *extns, int critical, uint32_t bits) argument 1867 kmf_set_cert_ku(KMF_X509_CERTIFICATE *CertData, int critical, uint16_t kubits) argument 2046 kmf_set_cert_issuer_altname(KMF_X509_CERTIFICATE *CertData, int critical, KMF_GENERALNAMECHOICES nametype, char *namedata) argument 2059 kmf_set_cert_subject_altname(KMF_X509_CERTIFICATE *CertData, int critical, KMF_GENERALNAMECHOICES nametype, char *namedata) argument 2072 kmf_add_cert_eku(KMF_X509_CERTIFICATE *CertData, KMF_OID *ekuOID, int critical) argument 2193 kmf_set_cert_basic_constraint(KMF_X509_CERTIFICATE *CertData, KMF_BOOL critical, KMF_X509EXT_BASICCONSTRAINTS *constraint) argument [all...] |
H A D | certop.c | 171 KMF_BOOL critical = B_FALSE; local 199 * critical extension in all CA certificates that 205 &critical, &constraint); 210 if ((!critical) || (!constraint.cA)) 430 KMF_BOOL critical; local 435 &critical, &basicConstraint); 611 * marked critical. 1971 KMF_BOOL critical = B_FALSE; local 1997 * marked critical. 2002 &critical, [all...] |
H A D | generalop.c | 148 boolean_t critical; member in struct:__anon3482 2165 int critical, 2246 foundextn->critical = critical; 2250 subjAltName.critical = critical; 2163 kmf_set_altname(KMF_X509_EXTENSIONS *extensions, KMF_OID *oid, int critical, KMF_GENERALNAMECHOICES nametype, char *namedata) argument
|
/illumos-gate/usr/src/uts/sun4u/opl/sys/ |
H A D | drmach.h | 135 * Note that it is important to keep the "critical" 138 * critical data into the cache so that there is no 142 * They are all locked in TLB and the critical data 250 drmach_copy_rename_critical_t *critical; member in struct:drmach_copy_rename_program
|
/illumos-gate/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 1045 if (extns->extensions[i].critical) { 1047 extns->extensions[i].critical) == -1) { 1115 int critical, tag; local 1138 critical = 0; 1142 if (kmfber_scanf(asn1, "b", &critical) == -1) 1166 ex->critical = critical; 1232 * critical BOOLEAN DEFAULT FALSE,
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | common.c | 1018 * The field may be marked "critical" by prepending 1019 * "critical:" to the list. 1020 * EX: critical:digitialSignature,keyEncipherment 1023 verify_keyusage(char *kustr, uint16_t *kubits, int *critical) argument 1033 /* Check to see if this is critical */ 1034 if (strncasecmp(kustr, "critical:", strlen("critical:")) == 0) { 1035 *critical = TRUE; 1036 kustr += strlen("critical:"); 1038 *critical 1063 verify_altname(char *arg, KMF_GENERALNAMECHOICES *type, int *critical) argument 1212 addToEKUList(EKU_LIST *ekus, int critical, KMF_OID *newoid) argument 1253 int critical; local [all...] |
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 198 amiBoolean critical; member in struct:ami_cert_extn
|
/illumos-gate/usr/src/cmd/init/ |
H A D | init.c | 4077 contract_make_template(uint_t info, uint_t critical, uint_t fatal, argument 4106 if (err = ct_tmpl_set_critical(fd, critical)) 4107 console(B_TRUE, ioctl_tset_emsg, "critical", strerror(err)); 4349 /* Allow unexpected critical events to be released. */
|
/illumos-gate/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 541 KMF_BOOL critical; member in struct:__anon3454 663 uchar_t critical; member in struct:__anon3466 669 uchar_t critical; member in struct:__anon3467
|
/illumos-gate/usr/src/uts/sun4u/sys/ |
H A D | rmc_comm_hproto.h | 203 rsci32 critical; /* boolean */ member in struct:dp_send_alert
|
/illumos-gate/usr/src/uts/sfmmu/vm/ |
H A D | hat_sfmmu.c | 6966 * Now that we're out of the performance critical section we can 10520 sfmmu_get_free_hblk(struct hme_blk **hmeblkpp, uint_t critical) argument 10530 * critical request from sfmmu_hblk_steal() 10533 if (freehblkcnt <= HBLK_RESERVE_MIN && !critical) { 10572 sfmmu_put_free_hblk(struct hme_blk *hmeblkp, uint_t critical) argument 10591 if (freehblkcnt < HBLK_RESERVE_CNT || critical) { 10593 if (freehblkcnt < HBLK_RESERVE_CNT || critical) { 10609 ASSERT(!critical); 11256 uint_t critical; local 11274 critical 11312 uint_t loop_cnt = 0, critical; local [all...] |