HomeSort by relevance Sort by last modified time
    Searched refs:PORT (Results 1 - 25 of 55) sorted by null

1 2 3

  /dalvik/tests/etc/
reference-run-test-classes 55 PORT=8000
56 msg "Waiting for debugger to connect on localhost:$PORT"
57 DEBUG_OPTS="-agentlib:jdwp=transport=dt_socket,address=$PORT,server=y,suspend=y"
host-run-test-jar 147 PORT=8000
148 msg "Waiting for debugger to connect on localhost:$PORT"
149 DEX_DEBUG="-agentlib:jdwp=transport=dt_socket,addres=$PORT,server=y,suspend=y"
  /docs/source.android.com/scripts/
micro-httpd.py 24 PORT = int(os.environ.get('HTTP_PORT', 8080))
26 httpd = SocketServer.TCPServer(('0.0.0.0', PORT), Handler)
28 print 'Serving on port %d' % PORT
  /external/openssh/regress/
forwarding.sh 10 last=$PORT
42 -$d ${base}01:127.0.0.1:$PORT \
43 -$d ${base}02:127.0.0.1:$PORT \
44 -$d ${base}03:127.0.0.1:$PORT \
45 -$d ${base}04:127.0.0.1:$PORT \
52 -$d ${base}01:127.0.0.1:$PORT \
53 -$d ${base}02:127.0.0.1:$PORT \
54 -$d ${base}03:127.0.0.1:$PORT \
55 -$d ${base}01:127.0.0.1:$PORT \
56 -$d ${base}04:127.0.0.1:$PORT \
    [all...]
ssh2putty.sh 5 echo "Usage: ssh2putty hostname port ssh-private-key"
10 PORT=$2
33 echo "rsa2@$PORT:$HOST $public_exponent,$modulus"
keyscan.sh 13 ${SSHKEYSCAN} -t $t -p $PORT 127.0.0.1 127.0.0.1 127.0.0.1 \
login-timeout.sh 11 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 &
24 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 &
cfgmatch.sh 8 fwd="-L $fwdport:127.0.0.1:$PORT"
49 echo "PermitOpen 127.0.0.1:$PORT" >>$OBJ/sshd_config
53 echo "PermitOpen 127.0.0.1:$PORT" >>$OBJ/sshd_proxy
78 echon 'permitopen="127.0.0.1:'$PORT'" ' >$OBJ/authorized_keys_$USER
80 echon 'permitopen="127.0.0.1:'$PORT'" ' >>$OBJ/authorized_keys_$USER
90 # Test both sshd_config and key options permitting the same dst/port pair.
101 echo "PermitOpen 127.0.0.1:1 127.0.0.1:$PORT 127.0.0.2:2" >>$OBJ/sshd_proxy
115 echo "PermitOpen 127.0.0.1:1 127.0.0.1:$PORT 127.0.0.2:2" >>$OBJ/sshd_proxy
dynamic-forward.sh 6 FWDPORT=`expr $PORT + 1`
45 -o "ProxyCommand ${proxycmd}${s} $h $PORT" \
conch-ciphers.sh 22 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
test-exec.sh 18 PORT="$TEST_SSH_PORT"
20 PORT=4242
185 fatal "sshd didn't exit port $PORT pid $pid"
248 Port $PORT
278 Port $PORT
351 ${SRC}/ssh2putty.sh 127.0.0.1 $PORT $OBJ/rsa > \
360 echo "PortNumber=$PORT" >> ${OBJ}/.putty/sessions/localhost_prox
    [all...]
ssh-com-client.sh 48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1
56 Port ${PORT}
  /external/ipsec-tools/src/libipsec/
policy_parse.h 53 PORT = 269,
72 #define PORT 269
  /development/tools/axl/
axl.py 61 PORT = 8001
68 PORT = 8002
75 PORT = 8003
82 PORT = 8004
92 PORT = 8005
103 PORT = 8006
113 PORT = 8007
130 PORT = 8008
147 PORT = 8009
157 PORT = 801
    [all...]
  /external/jmonkeyengine/engine/src/test/jme3test/network/
TestChatServer.java 51 public static final int PORT = 5110;
64 Server server = Network.createServer(NAME, VERSION, PORT, UDP_PORT);
  /external/webkit/LayoutTests/fast/url/script-tests/
trivial-segments.js 4 // [URL, [SCHEME, HOST, PORT, PATH, QUERY, REF]]
  /external/qemu/telephony/
test2.c 18 #define PORT 8000
206 server_channel = sys_channel_create_tcp_server( PORT );
207 printf( "listening on port %d with %p\n", PORT, server_channel );
  /external/mdnsresponder/mDNSShared/
dnsextd_lexer.l 58 port return PORT;
dnsextd_parser.y 104 %token PORT
174 LISTEN_ON PORT NUMBER addresscontent
182 NAMESERVER ADDRESS networkaddress PORT NUMBER
186 PRIVATE PORT NUMBER
191 LLQ PORT NUMBER
  /external/libpcap/
tokdefs.h 38 PORT = 264,
142 #define PORT 264
  /external/openssl/apps/
s_apps.h 147 #define PORT 4433
151 int do_server(int port, int type, int *ret, int (*cb) (char *hostname, int s, unsigned char *context), unsigned char *context);
159 int init_client(int *sock, char *server, int port, int type);
  /cts/tests/tests/os/src/android/os/cts/
ParcelFileDescriptorTest.java 61 final int PORT = 12222;
68 ss = new ServerSocket(PORT);
83 socket = new Socket(InetAddress.getLocalHost(), PORT);
  /development/samples/training/NsdChat/src/com/example/android/nsdchat/
ChatConnection.java 58 public void connectToServer(InetAddress address, int port) {
59 mChatClient = new ChatClient(address, port);
72 public void setLocalPort(int port) {
73 mPort = port;
141 // Since discovery will happen via Nsd, we don't need to care which port is
151 int port = mSocket.getPort(); local
153 connectToServer(address, port);
167 private int PORT;
174 public ChatClient(InetAddress address, int port) {
178 this.PORT = port
    [all...]
  /build/
envsetup.sh 753 local PORT="$2"
754 if [ "$PORT" ] ; then
755 PORT=$2
757 PORT=":5039"
768 adb forward "tcp$PORT" "tcp$PORT"
769 adb shell gdbserver $PORT --attach $PID &
774 echo " gdbserver $PORT /system/bin/$EXE"
776 echo " gdbserver $PORT --attach $PID"
782 echo >>"$OUT_ROOT/gdbclient.cmds" "target remote $PORT"
    [all...]
  /cts/tests/tests/content/src/android/content/cts/
IntentFilterTest.java 65 private static final int PORT = 80;
265 mIntentFilter.addDataAuthority(HOST + i, String.valueOf(PORT + i));
275 assertEquals(PORT + i, actual.getPort());
276 AuthorityEntry ae = new AuthorityEntry(HOST + i, String.valueOf(PORT + i));
279 Uri uri = Uri.parse("http://" + HOST + i + ":" + String.valueOf(PORT + i));
281 Uri uri2 = Uri.parse("http://" + HOST + i + 10 + ":" + PORT + i + 10);
367 mIntentFilter.addDataAuthority(HOST, String.valueOf(PORT));
370 final Uri uri = Uri.parse("http://" + HOST + ":" + PORT);
417 mIntentFilter.addDataAuthority(HOST, String.valueOf(PORT));
434 assertEquals(PORT, intentFilter.getDataAuthority(0).getPort())
    [all...]

Completed in 479 milliseconds

1 2 3