Home
last modified time | relevance | path

Searched refs:servers (Results 1 – 25 of 331) sorted by relevance

12345678910>>...14

/third_party/node/deps/cares/src/lib/
Dares_options.c32 struct ares_addr_node **servers) in ares_get_servers() argument
63 srvr_curr->family = channel->servers[i].addr.family; in ares_get_servers()
65 memcpy(&srvr_curr->addrV4, &channel->servers[i].addr.addrV4, in ares_get_servers()
68 memcpy(&srvr_curr->addrV6, &channel->servers[i].addr.addrV6, in ares_get_servers()
81 *servers = srvr_head; in ares_get_servers()
87 struct ares_addr_port_node **servers) in ares_get_servers_ports() argument
118 srvr_curr->family = channel->servers[i].addr.family; in ares_get_servers_ports()
119 srvr_curr->udp_port = ntohs((unsigned short)channel->servers[i].addr.udp_port); in ares_get_servers_ports()
120 srvr_curr->tcp_port = ntohs((unsigned short)channel->servers[i].addr.tcp_port); in ares_get_servers_ports()
122 memcpy(&srvr_curr->addrV4, &channel->servers[i].addr.addrV4, in ares_get_servers_ports()
[all …]
Dares_init.c73 static int config_nameserver(struct server_state **servers, int *nservers,
145 channel->servers = NULL; in ares_init_options()
226 if (channel->servers) in ares_init_options()
227 ares_free(channel->servers); in ares_init_options()
259 struct ares_addr_port_node *servers; in ares_dup() local
300 if ((src->servers[i].addr.family != AF_INET) || in ares_dup()
301 (src->servers[i].addr.udp_port != 0) || in ares_dup()
302 (src->servers[i].addr.tcp_port != 0)) { in ares_dup()
308 rc = ares_get_servers_ports(src, &servers); in ares_dup()
314 rc = ares_set_servers_ports(*dest, servers); in ares_dup()
[all …]
Dares_destroy.c29 if(options->servers) in ares_destroy_options()
30 ares_free(options->servers); in ares_destroy_options()
109 if (channel->servers) in ares__destroy_servers_state()
113 server = &channel->servers[i]; in ares__destroy_servers_state()
117 ares_free(channel->servers); in ares__destroy_servers_state()
118 channel->servers = NULL; in ares__destroy_servers_state()
Dares_cancel.c57 if (channel->servers) in ares_cancel()
60 ares__close_sockets(channel, &channel->servers[i]); in ares_cancel()
/third_party/node/lib/internal/dns/
Dutils.js96 setServers(servers) { argument
97 validateArray(servers, 'servers');
103 ArrayPrototypeForEach(servers, (serv, index) => {
141 this[kSetServersInteral](newSet, servers);
144 [kSetServersInteral](newSet, servers) { argument
153 throw new ERR_DNS_SET_SERVERS_FAILED(err, servers);
157 this[kSnapshotStates].servers = newSet;
186 const { timeout, tries, localAddress, servers } = this[kSnapshotStates];
192 if (servers) {
193 this[kSetServersInteral](servers, servers);
/third_party/node/test/parallel/
Dtest-tls-client-verify.js35 servers: [ property
44 servers: [ property
53 servers: [ property
67 function testServers(index, servers, clientOptions, cb) { argument
68 const serverOptions = servers[index];
112 testServers(index + 1, servers, clientOptions, cb);
131 testServers(0, tcase.servers, clientOptions, common.mustCall(function() {
Dtest-cluster-disconnect.js37 const servers = 2; constant
60 for (let i = 0; i < servers; i++) {
64 if (done === servers) {
81 if (online === workers * servers) {
84 }, servers));
Dtest-dns.js36 const servers = []; variable
38 servers[0] = '127.0.0.1';
39 servers[2] = '0.0.0.0';
40 dns.setServers(servers);
46 const servers = ['127.0.0.1', '192.168.1.1']; variable
48 servers[3] = '127.1.0.1';
49 servers[4] = '127.1.0.1';
50 servers[5] = '127.1.1.1';
52 Object.defineProperty(servers, 2, {
55 servers.length = 3;
[all …]
Dtest-dns-multi-channel.js8 const servers = [ variable
19 let waiting = servers.length;
20 for (const { socket, reply } of servers) {
40 const resolvers = servers.map((server) => ({
Dtest-tls-ticket.js96 const servers = naturalServers.concat(naturalServers).concat(naturalServers); constant
100 servers.shift().emit('connection', c);
118 let left = servers.length;
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant_lib/cert_mgr_deps/src/
Dcm_load_sa.cpp20 OnDemandLoadCertManagerCallback::OnDemandLoadCertManagerCallback(string servers) : servers(servers) in OnDemandLoadCertManagerCallback() argument
22 CM_LOG_E("Servers %s on demand Callback constructor success", servers.c_str()); in OnDemandLoadCertManagerCallback()
/third_party/libuv/test/
Dbenchmark-multi-accept.c205 struct server_ctx* servers) { in send_listen_handles() argument
231 uv_sem_post(&servers[i].semaphore); in send_listen_handles()
238 uv_sem_wait(&servers[i].semaphore); in send_listen_handles()
363 struct server_ctx* servers; in test_tcp() local
373 servers = calloc(num_servers, sizeof(servers[0])); in test_tcp()
375 ASSERT_NOT_NULL(servers); in test_tcp()
383 struct server_ctx* ctx = servers + i; in test_tcp()
388 send_listen_handles(UV_TCP, num_servers, servers); in test_tcp()
411 struct server_ctx* ctx = servers + i; in test_tcp()
423 struct server_ctx* ctx = servers + i; in test_tcp()
[all …]
/third_party/curl/docs/cmdline-opts/
Ddns-servers.d3 Long: dns-servers
9 Example: --dns-servers 192.168.0.1,192.168.0.2 $URL
13 Set the list of DNS servers to be used instead of the system default.
/third_party/curl/docs/
DSSL-PROBLEMS.md41 Some broken servers fail to support the protocol negotiation properly that
42 SSL servers are supposed to handle. This may cause the connection to fail
54 Clients give servers a list of ciphers to select from. If the list does not
67 Schannel in Windows XP is not able to connect to servers that no longer
77 to mitigate this attack, it turned out that some broken servers out there in
80 To make such broken servers work, the --ssl-allow-beast option was
83 servers.
/third_party/cares/include/
Dares.h268 struct in_addr *servers; member
729 struct ares_addr_node *servers);
731 struct ares_addr_port_node *servers);
735 const char* servers);
737 const char* servers);
740 struct ares_addr_node **servers);
742 struct ares_addr_port_node **servers);
/third_party/node/deps/cares/include/
Dares.h277 struct in_addr *servers; member
739 struct ares_addr_node *servers);
741 struct ares_addr_port_node *servers);
745 const char* servers);
747 const char* servers);
750 struct ares_addr_node **servers);
752 struct ares_addr_port_node **servers);
/third_party/curl/tests/server/
DCMakeLists.txt47 # Test servers simply are standalone programs that do not use libcurl
48 # library. For convenience and to ease portability of these servers,
50 # to build the servers. In order to achieve proper linkage of these
51 # files on Win32 targets it is necessary to build the test servers
/third_party/curl/lib/
Dhostsyn.c60 char *servers) in Curl_set_dns_servers() argument
63 (void)servers; in Curl_set_dns_servers()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant_lib/cert_mgr_deps/include/
Dcm_load_sa.h26 OnDemandLoadCertManagerCallback(std::string servers);
32 std::string servers;
/third_party/node/deps/cares/src/tools/
Dadig.c168 struct ares_addr_node *srvr, *servers = NULL; in main() local
184 options.servers = NULL; in main()
220 destroy_addr_list(servers); in main()
223 append_addr_list(&servers, srvr); in main()
234 destroy_addr_list(servers); in main()
252 destroy_addr_list(servers); in main()
330 if(servers) in main()
332 status = ares_set_servers(channel, servers); in main()
333 destroy_addr_list(servers); in main()
/third_party/pulseaudio/src/pulsecore/
Dprotocol-http.c106 pa_strlist *servers; member
789 pa_strlist_free(p->servers); in pa_http_protocol_unref()
801 p->servers = pa_strlist_prepend(p->servers, name); in pa_http_protocol_add_server_string()
809 p->servers = pa_strlist_remove(p->servers, name); in pa_http_protocol_remove_server_string()
816 return p->servers; in pa_http_protocol_servers()
/third_party/openssl/doc/man3/
DSSL_CTX_set_options.pod116 servers. See the B<SECURE RENEGOTIATION> section for more details.
203 Allow legacy insecure renegotiation between OpenSSL and unpatched servers
224 Normally clients and servers will transparently attempt to negotiate the
228 propose, and servers will not accept the extension.
232 Normally clients and servers will transparently attempt to negotiate the
236 not propose, and servers will not accept the extension.
396 and renegotiation between patched OpenSSL clients and unpatched servers
398 servers will fail.
401 clients that are willing to connect to servers that do not implement
406 servers should always B<set> B<SSL_OP_LEGACY_SERVER_CONNECT>
[all …]
DSSL_CONF_cmd.pod29 both clients and servers and the B<value> parameter is not used. The default
59 Equivalent to B<SSL_OP_CIPHER_SERVER_PREFERENCE>. Only used by servers.
63 Allows servers to accept client-initiated renegotiation. Equivalent to
65 Only used by servers.
79 Sets B<SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION>. Only used by servers.
91 Only used by servers. Requires B<-serverpref>.
107 algorithms extension. For servers it is used to determine which signature
129 authentication for TLSv1.2 and TLSv1.3. For servers the B<algs> is used
141 the supported groups extension. For servers, it is used to determine which
163 by servers.
[all …]
/third_party/cups-filters/utils/
Dcups-browsed.conf.in60 # selected servers using the "BrowseAllow", "BrowseDeny", and
64 # to trusted servers or to reduce the number of listed printers in the
76 # "BrowseDeny" lines, only servers matching at last one "BrowseAllow"
81 # "BrowseAllow" lines, all servers NOT matching any of the
86 # beginning all servers are accepted, then the "BrowseDeny" lines are
87 # applied to exclude unwished servers or networks and after that the
88 # "BrowseAllow" lines to re-include servers or networks. With
89 # "BrowseOrder Allow,Deny" we start with denying all servers, then
96 # If there are no "Browse..." lines at all, all servers are accepted.
129 # of their servers
[all …]
/third_party/skia/third_party/externals/opengl-registry/extensions/SGIX/
DGLX_SGIX_visual_select_group.txt36 A new visual attribute is introduced, providing a way for servers
63 is used to communicate between servers and GLX client.
107 between servers and GLX client. It is not accepted by the <attrib_list>

12345678910>>...14