HomeSort by: relevance | last modified time | path
    Searched defs:zones (Results 1 - 17 of 17) sorted by relevancy

  /src/external/mpl/bind/dist/bin/tests/system/xferquota/
setup.py 18 zones = 300 variable
20 for z in range(zones):
37 with open("ns1/zones.conf", "w", encoding="utf-8") as priconf, open(
38 "ns2/zones.conf", "w", encoding="utf-8"
40 for z in range(zones):
  /src/sys/external/bsd/drm2/dist/include/drm/ttm/
ttm_memory.h 56 * @zones: Array of pointers to accounting zones.
57 * @num_zones: Number of populated entries in the @zones array.
76 struct ttm_mem_zone *zones[TTM_MEM_MAX_ZONES]; member in struct:ttm_mem_global
  /src/tests/lib/libutil/
t_parsedate.c 179 /* numeric zones not permitted with am/pm ... */
513 ATF_TC(zones); variable
515 ATF_TC_HEAD(zones, tc)
517 atf_tc_set_md_var(tc, "descr", "Test parsing dates with zones");
520 ATF_TC_BODY(zones, tc)
630 ATF_TP_ADD_TC(tp, zones);
  /src/external/bsd/jemalloc/dist/src/
zone.c 7 # error "This source file is for zones on Darwin (OS X)."
371 malloc_zone_t **zones = NULL; local
376 * present in the list of registered zones. That zone uses a "lite zone"
380 * zone is the default. So get the list of zones to get the first one,
384 (vm_address_t**)&zones, &num_zones)) {
393 return zones[0];
410 * On OSX < 10.6, unregistering shifts all registered zones.
456 * a scalable_zone. As purgeable zones only exist on >= 10.6, we need
  /src/external/bsd/jemalloc.old/dist/src/
zone.c 7 # error "This source file is for zones on Darwin (OS X)."
371 malloc_zone_t **zones = NULL; local
376 * present in the list of registered zones. That zone uses a "lite zone"
380 * zone is the default. So get the list of zones to get the first one,
384 (vm_address_t**)&zones, &num_zones)) {
393 return zones[0];
410 * On OSX < 10.6, unregistering shifts all registered zones.
456 * a scalable_zone. As purgeable zones only exist on >= 10.6, we need
  /src/external/bsd/nsd/dist/
xfrd.h 94 /* set to 1 if zones have received xfrs since the last write_timer */
114 /* tree of zones, by apex name, contains xfrd_zone_type*. Only secondary zones. */
115 rbtree_type *zones; member in struct:xfrd_state
117 /* tree of zones, by apex name, contains notify_zone*. All zones. */
124 /* tree of catalog consumer zones. Processing is disabled if > 1. */
127 /* tree of updated catalog producer zones for which the content to serve */
461 * Prepare zones for a reload, this sets the times on the zones to b
    [all...]
  /src/external/bsd/unbound/dist/services/
localzone.c 2 * services/localzone.c - local zones authority service.
86 void local_zones_print(struct local_zones* zones)
89 lock_rw_rdlock(&zones->lock);
90 log_info("number of auth zones %u", (unsigned)zones->ztree.count);
91 RBTREE_FOR(z, struct local_zone*, &zones->ztree) {
94 lock_rw_unlock(&zones->lock);
100 struct local_zones* zones = (struct local_zones*)calloc(1, local
101 sizeof(*zones));
102 if(!zones)
    [all...]
  /src/external/mpl/bind/dist/lib/dns/
catz.c 96 dns_db_t *db; /* zones database */
98 dns_db_t *updb; /* zones database we're working on */
135 * Collection of catalog zones for a view
139 isc_ht_t *zones; member in struct:dns_catz_zones
486 * (from catz->catzs->zmm) for appropriate member zones.
539 * old zone, or are in both zones and are modified.
800 isc_ht_init(&catzs->zones, mctx, 4, ISC_HT_CASE_SENSITIVE);
916 * 'catzs->zones' can become NULL only during shutdown.
918 INSIST(catzs->zones != NULL);
921 result = isc_ht_find(catzs->zones, name->ndata, name->length
    [all...]
zone.c 385 * Zones in certain states such as "waiting for zone transfer"
660 dns_zonelist_t zones; member in struct:dns_zonemgr
1912 * This is true for secondary zones, mirror zones, stub zones, key zones,
1913 * and zones that allow dynamic updates either by having an update
1929 /* Inline zones are always dynamic. */
1983 dns_rpz_dbupdate_register(db, zone->rpzs->zones[zone->rpz_num]);
1992 dns_rpz_dbupdate_unregister(db, zone->rpzs->zones[zone->rpz_num])
    [all...]
  /src/external/mpl/bind/dist/lib/dns/include/dns/
rpz.h 40 * Sub-zones of various trigger types.
101 * Mask of the specified and higher numbered policy zones
140 dns_rpz_num_t num; /* ordinal in list of policy zones */
165 dns_db_t *db; /* zones database */
167 dns_db_t *updb; /* zones database we're working on */
180 * Bitfields indicating which policy zones have policies of
220 * Response policy zones known to a view.
229 dns_rpz_zone_t *zones[DNS_RPZ_MAX_ZONES]; member in struct:dns_rpz_zones
238 * reconfigured with new zones or policy.
262 * policy zones in the view. It is only used to print summar
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/
catz.c 100 * Collection of catalog zones for a view
104 isc_ht_t *zones; member in struct:dns_catz_zones
446 * old zone, or are in both zones and are modified.
615 isc_ht_init(&new_zones->zones, mctx, 4, ISC_HT_CASE_SENSITIVE);
632 isc_ht_destroy(&new_zones->zones);
725 result = isc_ht_add(catzs->zones, new_zone->name.ndata,
735 tresult = isc_ht_find(catzs->zones, name->ndata, name->length,
758 result = isc_ht_find(catzs->zones, name->ndata, name->length,
850 if (catzs->zones != NULL) {
853 isc_ht_iter_create(catzs->zones, &iter)
    [all...]
rpz.c 167 * The data in a RBT node has two pairs of bits for policy zones.
419 * qname_skip_recurse (a bit field indicating which policy zones
425 * has to have bits set for the policy zones for which
434 * triggers in policy zones listed after other zones
445 * zbits_req now contains bits set for zones which require
449 * zone requires recursion, then all zones after that (higher
455 * zbits_req = 0b000 mask = 0xffffffff (no zones have to wait for
457 * zbits_req = 0b001 mask = 0x00000000 (all zones have to wait)
461 * zbits_req = 0b011 mask = 0x00000000 (all zones have to wait
1462 dns_rpz_zones_t *zones; local
    [all...]
zone.c 393 * Zones in certain states such as "waiting for zone transfer"
647 dns_zonelist_t zones; member in struct:dns_zonemgr
1854 * This is true for slave zones, mirror zones, stub zones, key zones,
1855 * and zones that allow dynamic updates either by having an update
1870 /* Inline zones are always dynamic. */
1894 * Only RBTDB zones can be used for response policy zones,
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/
rpz.h 39 * Sub-zones of various trigger types.
100 * Mask of the specified and higher numbered policy zones
137 dns_rpz_num_t num; /* ordinal in list of policy zones */
159 dns_db_t *db; /* zones database */
161 dns_db_t *updb; /* zones database we're working on */
179 * Bitfields indicating which policy zones have policies of
216 * Response policy zones known to a view.
220 dns_rpz_zone_t *zones[DNS_RPZ_MAX_ZONES]; member in struct:dns_rpz_zones
226 * reconfigured with new zones or policy.
250 * policy zones in the view. It is only used to print summar
    [all...]
  /src/external/mpl/bind/dist/lib/isccfg/
check.c 3017 "zone '%s': mirror zones can only be used with "
3449 "redirect zones must be called \".\"");
3672 * Reject zones with both dnssec-policy and max-zone-ttl
3726 * at the zone level for mirror zones.
3735 * Primary, secondary, and mirror zones may have an "also-notify"
3791 * Secondary, mirror, and stub zones must have a "primaries" field,
3869 * Primary and secondary zones that have a "parental-agents" field,
3901 "zone '%s': mirror zones cannot be used if "
3908 * Primary zones can't have both "allow-update" and "update-policy".
3976 "zones using dnssec-policy%s. See
5666 const cfg_obj_t *zones = NULL; local
6440 const cfg_obj_t *zones = NULL; local
    [all...]
  /src/lib/libc/time/
zic.c 452 static struct zone * zones; variable in typeref:struct:zone
453 static ptrdiff_t nzones; /* number of zones */
1401 for (j = i + 1; j < nzones && zones[j].z_name == NULL; ++j)
1403 outzone(&zones[i], j - i);
1865 ** Associate sets of rules with zones.
1913 zp = &zones[i];
1923 zp = &zones[i];
1931 zp = &zones[i];
2184 if (zones[i].z_name != NULL &&
2185 strcmp(zones[i].z_name, fields[ZF_NAME]) == 0)
    [all...]
  /src/external/mpl/bind/dist/bin/named/
server.c 302 * new zones to be added at runtime.
380 * These zones should not leak onto the Internet.
2287 "limit of %d response policy zones exceeded",
2352 if (dns_name_equal(&view->rpzs->zones[rpz_num]->origin,
2469 dns_rpz_zones_t *zones; local
2548 zones = view->rpzs;
2550 zones->p.nsip_on = nsip_on;
2551 zones->p.nsdname_on = nsdname_on;
2552 zones->p.slow_mode = ns_server_getoption(named_g_server->sctx,
2571 zones->p.break_dnssec = true
6025 } zones[] = { local
    [all...]

Completed in 49 milliseconds