| /src/external/mpl/bind/dist/bin/tests/system/xferquota/ |
| setup.py | 18 zones = 300 variable 20 for z in range(zones): 37 with open("ns1/zones.conf", "w", encoding="utf-8") as priconf, open( 38 "ns2/zones.conf", "w", encoding="utf-8" 40 for z in range(zones):
|
| /src/sys/external/bsd/drm2/dist/include/drm/ttm/ |
| ttm_memory.h | 56 * @zones: Array of pointers to accounting zones. 57 * @num_zones: Number of populated entries in the @zones array. 76 struct ttm_mem_zone *zones[TTM_MEM_MAX_ZONES]; member in struct:ttm_mem_global
|
| /src/tests/lib/libutil/ |
| t_parsedate.c | 179 /* numeric zones not permitted with am/pm ... */ 513 ATF_TC(zones); variable 515 ATF_TC_HEAD(zones, tc) 517 atf_tc_set_md_var(tc, "descr", "Test parsing dates with zones"); 520 ATF_TC_BODY(zones, tc) 630 ATF_TP_ADD_TC(tp, zones);
|
| /src/external/bsd/jemalloc/dist/src/ |
| zone.c | 7 # error "This source file is for zones on Darwin (OS X)." 371 malloc_zone_t **zones = NULL; local 376 * present in the list of registered zones. That zone uses a "lite zone" 380 * zone is the default. So get the list of zones to get the first one, 384 (vm_address_t**)&zones, &num_zones)) { 393 return zones[0]; 410 * On OSX < 10.6, unregistering shifts all registered zones. 456 * a scalable_zone. As purgeable zones only exist on >= 10.6, we need
|
| /src/external/bsd/jemalloc.old/dist/src/ |
| zone.c | 7 # error "This source file is for zones on Darwin (OS X)." 371 malloc_zone_t **zones = NULL; local 376 * present in the list of registered zones. That zone uses a "lite zone" 380 * zone is the default. So get the list of zones to get the first one, 384 (vm_address_t**)&zones, &num_zones)) { 393 return zones[0]; 410 * On OSX < 10.6, unregistering shifts all registered zones. 456 * a scalable_zone. As purgeable zones only exist on >= 10.6, we need
|
| /src/external/bsd/nsd/dist/ |
| xfrd.h | 94 /* set to 1 if zones have received xfrs since the last write_timer */ 114 /* tree of zones, by apex name, contains xfrd_zone_type*. Only secondary zones. */ 115 rbtree_type *zones; member in struct:xfrd_state 117 /* tree of zones, by apex name, contains notify_zone*. All zones. */ 124 /* tree of catalog consumer zones. Processing is disabled if > 1. */ 127 /* tree of updated catalog producer zones for which the content to serve */ 461 * Prepare zones for a reload, this sets the times on the zones to b [all...] |
| /src/external/bsd/unbound/dist/services/ |
| localzone.c | 2 * services/localzone.c - local zones authority service. 86 void local_zones_print(struct local_zones* zones) 89 lock_rw_rdlock(&zones->lock); 90 log_info("number of auth zones %u", (unsigned)zones->ztree.count); 91 RBTREE_FOR(z, struct local_zone*, &zones->ztree) { 94 lock_rw_unlock(&zones->lock); 100 struct local_zones* zones = (struct local_zones*)calloc(1, local 101 sizeof(*zones)); 102 if(!zones) [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| catz.c | 96 dns_db_t *db; /* zones database */ 98 dns_db_t *updb; /* zones database we're working on */ 135 * Collection of catalog zones for a view 139 isc_ht_t *zones; member in struct:dns_catz_zones 486 * (from catz->catzs->zmm) for appropriate member zones. 539 * old zone, or are in both zones and are modified. 800 isc_ht_init(&catzs->zones, mctx, 4, ISC_HT_CASE_SENSITIVE); 916 * 'catzs->zones' can become NULL only during shutdown. 918 INSIST(catzs->zones != NULL); 921 result = isc_ht_find(catzs->zones, name->ndata, name->length [all...] |
| zone.c | 385 * Zones in certain states such as "waiting for zone transfer" 660 dns_zonelist_t zones; member in struct:dns_zonemgr 1912 * This is true for secondary zones, mirror zones, stub zones, key zones, 1913 * and zones that allow dynamic updates either by having an update 1929 /* Inline zones are always dynamic. */ 1983 dns_rpz_dbupdate_register(db, zone->rpzs->zones[zone->rpz_num]); 1992 dns_rpz_dbupdate_unregister(db, zone->rpzs->zones[zone->rpz_num]) [all...] |
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| rpz.h | 40 * Sub-zones of various trigger types. 101 * Mask of the specified and higher numbered policy zones 140 dns_rpz_num_t num; /* ordinal in list of policy zones */ 165 dns_db_t *db; /* zones database */ 167 dns_db_t *updb; /* zones database we're working on */ 180 * Bitfields indicating which policy zones have policies of 220 * Response policy zones known to a view. 229 dns_rpz_zone_t *zones[DNS_RPZ_MAX_ZONES]; member in struct:dns_rpz_zones 238 * reconfigured with new zones or policy. 262 * policy zones in the view. It is only used to print summar [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| catz.c | 100 * Collection of catalog zones for a view 104 isc_ht_t *zones; member in struct:dns_catz_zones 446 * old zone, or are in both zones and are modified. 615 isc_ht_init(&new_zones->zones, mctx, 4, ISC_HT_CASE_SENSITIVE); 632 isc_ht_destroy(&new_zones->zones); 725 result = isc_ht_add(catzs->zones, new_zone->name.ndata, 735 tresult = isc_ht_find(catzs->zones, name->ndata, name->length, 758 result = isc_ht_find(catzs->zones, name->ndata, name->length, 850 if (catzs->zones != NULL) { 853 isc_ht_iter_create(catzs->zones, &iter) [all...] |
| rpz.c | 167 * The data in a RBT node has two pairs of bits for policy zones. 419 * qname_skip_recurse (a bit field indicating which policy zones 425 * has to have bits set for the policy zones for which 434 * triggers in policy zones listed after other zones 445 * zbits_req now contains bits set for zones which require 449 * zone requires recursion, then all zones after that (higher 455 * zbits_req = 0b000 mask = 0xffffffff (no zones have to wait for 457 * zbits_req = 0b001 mask = 0x00000000 (all zones have to wait) 461 * zbits_req = 0b011 mask = 0x00000000 (all zones have to wait 1462 dns_rpz_zones_t *zones; local [all...] |
| zone.c | 393 * Zones in certain states such as "waiting for zone transfer" 647 dns_zonelist_t zones; member in struct:dns_zonemgr 1854 * This is true for slave zones, mirror zones, stub zones, key zones, 1855 * and zones that allow dynamic updates either by having an update 1870 /* Inline zones are always dynamic. */ 1894 * Only RBTDB zones can be used for response policy zones, [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| rpz.h | 39 * Sub-zones of various trigger types. 100 * Mask of the specified and higher numbered policy zones 137 dns_rpz_num_t num; /* ordinal in list of policy zones */ 159 dns_db_t *db; /* zones database */ 161 dns_db_t *updb; /* zones database we're working on */ 179 * Bitfields indicating which policy zones have policies of 216 * Response policy zones known to a view. 220 dns_rpz_zone_t *zones[DNS_RPZ_MAX_ZONES]; member in struct:dns_rpz_zones 226 * reconfigured with new zones or policy. 250 * policy zones in the view. It is only used to print summar [all...] |
| /src/external/mpl/bind/dist/lib/isccfg/ |
| check.c | 3017 "zone '%s': mirror zones can only be used with " 3449 "redirect zones must be called \".\""); 3672 * Reject zones with both dnssec-policy and max-zone-ttl 3726 * at the zone level for mirror zones. 3735 * Primary, secondary, and mirror zones may have an "also-notify" 3791 * Secondary, mirror, and stub zones must have a "primaries" field, 3869 * Primary and secondary zones that have a "parental-agents" field, 3901 "zone '%s': mirror zones cannot be used if " 3908 * Primary zones can't have both "allow-update" and "update-policy". 3976 "zones using dnssec-policy%s. See 5666 const cfg_obj_t *zones = NULL; local 6440 const cfg_obj_t *zones = NULL; local [all...] |
| /src/lib/libc/time/ |
| zic.c | 452 static struct zone * zones; variable in typeref:struct:zone 453 static ptrdiff_t nzones; /* number of zones */ 1401 for (j = i + 1; j < nzones && zones[j].z_name == NULL; ++j) 1403 outzone(&zones[i], j - i); 1865 ** Associate sets of rules with zones. 1913 zp = &zones[i]; 1923 zp = &zones[i]; 1931 zp = &zones[i]; 2184 if (zones[i].z_name != NULL && 2185 strcmp(zones[i].z_name, fields[ZF_NAME]) == 0) [all...] |
| /src/external/mpl/bind/dist/bin/named/ |
| server.c | 302 * new zones to be added at runtime. 380 * These zones should not leak onto the Internet. 2287 "limit of %d response policy zones exceeded", 2352 if (dns_name_equal(&view->rpzs->zones[rpz_num]->origin, 2469 dns_rpz_zones_t *zones; local 2548 zones = view->rpzs; 2550 zones->p.nsip_on = nsip_on; 2551 zones->p.nsdname_on = nsdname_on; 2552 zones->p.slow_mode = ns_server_getoption(named_g_server->sctx, 2571 zones->p.break_dnssec = true 6025 } zones[] = { local [all...] |