Lines Matching +defs:all +defs:multi
1002 zmgr_resume_xfrs(dns_zonemgr_t *zmgr, bool multi);
2621 * all we're interested in.)
3809 * Get the RRset containing all private-type records at the zone apex.
3966 * can regenerate all the NSEC3 chains.
4121 * Remove from the key zone all the KEYDATA records found in rdataset.
4225 * Add a null key to the security roots for so that all queries
4260 /* Now insert all the accepted trust anchors from this keydata set. */
4399 * Write all transactions in 'diff' to the zone journal file.
4544 * zone. If a domain is no longer named in managed-keys, delete all keys
7766 * Otherwise it needs to be deleted as we have removed all
7834 * - remove all NSEC3PARAM records matching the relevant NSEC3 chain,
7836 * - remove all private-type records containing NSEC3PARAM RDATA matching
7849 * chain additions vs. removals and needs to handle all cases properly.
7895 * Delete all NSEC3PARAM records which match that in nsec3chain.
7972 * Delete all private records which match that in nsec3chain.
8025 * with all flags bits cleared.
8222 * Remove all tuples with the same name and type as 'cur' from 'src' and append
8278 * Signature changes for all RRs with name tuple->name and type
8280 * remove all the "raw" changes with the same name and type
8406 * them. Once all nodes are processed, the "delete_nsec" field is
8409 * point to the first node and the loop traverses all of them again,
8415 * The above is repeated until all requested NSEC3 chain changes are
8478 * we skip all obscured names.
8640 * NSEC chain by iterating over all nodes in the zone database and only
8641 * then goes on to remove NSEC3 records be iterating over all nodes
8742 * we skip all obscured names.
9033 * Pause all iterators so that dns_db_closeversion() can succeed.
9158 * Delete all RRSIG records with the given algorithm and keyid.
9160 * If all remaining RRsets are signed with the given algorithm
9562 * we skip all obscured names.
9825 * Pause all iterators so that dns_db_closeversion() can succeed.
9872 * Pause all dbiterators.
10403 * trusted keys then all we can do is look at any revoked keys.
10456 * automatically trust all the keys we find at the zone apex.
10790 * RFC5011 says, "A trust point that has all of its trust anchors
10796 * the security roots; then all queries to the zone will fail.
10814 * If "updatekey" was true for all keys found in the DNSKEY
10817 * externally triggered), it may happen that all relevant
11855 * If DNS_ZONEFLG_SHUTDOWN is set, all external references to
13329 /* If last request, release all related resources */
16859 * by using the raw zone's journal, applying all the deltas
19330 zmgr_resume_xfrs(dns_zonemgr_t *zmgr, bool multi) {
19341 if (multi) {
19421 * We linearly scan a list of all transfers; if this turns
22747 * with all active keys, whether they're new or not.
23448 bool all;
23518 if (kd->all) {
23600 *kd = (struct keydone){ .all = false };
23602 if (strcasecmp(keystr, "all") == 0) {
23603 kd->all = true;