/dalvik/tests/etc/ |
reference-run-test-classes | 55 PORT=8000 56 msg "Waiting for debugger to connect on localhost:$PORT" 57 DEBUG_OPTS="-agentlib:jdwp=transport=dt_socket,address=$PORT,server=y,suspend=y"
|
host-run-test-jar | 147 PORT=8000 148 msg "Waiting for debugger to connect on localhost:$PORT" 149 DEX_DEBUG="-agentlib:jdwp=transport=dt_socket,addres=$PORT,server=y,suspend=y"
|
/docs/source.android.com/scripts/ |
micro-httpd.py | 24 PORT = int(os.environ.get('HTTP_PORT', 8080)) 26 httpd = SocketServer.TCPServer(('0.0.0.0', PORT), Handler) 28 print 'Serving on port %d' % PORT
|
/external/openssh/regress/ |
forwarding.sh | 10 last=$PORT 42 -$d ${base}01:127.0.0.1:$PORT \ 43 -$d ${base}02:127.0.0.1:$PORT \ 44 -$d ${base}03:127.0.0.1:$PORT \ 45 -$d ${base}04:127.0.0.1:$PORT \ 52 -$d ${base}01:127.0.0.1:$PORT \ 53 -$d ${base}02:127.0.0.1:$PORT \ 54 -$d ${base}03:127.0.0.1:$PORT \ 55 -$d ${base}01:127.0.0.1:$PORT \ 56 -$d ${base}04:127.0.0.1:$PORT \ [all...] |
ssh2putty.sh | 5 echo "Usage: ssh2putty hostname port ssh-private-key" 10 PORT=$2 33 echo "rsa2@$PORT:$HOST $public_exponent,$modulus"
|
keyscan.sh | 13 ${SSHKEYSCAN} -t $t -p $PORT 127.0.0.1 127.0.0.1 127.0.0.1 \
|
login-timeout.sh | 11 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 & 24 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 &
|
cfgmatch.sh | 8 fwd="-L $fwdport:127.0.0.1:$PORT" 49 echo "PermitOpen 127.0.0.1:$PORT" >>$OBJ/sshd_config 53 echo "PermitOpen 127.0.0.1:$PORT" >>$OBJ/sshd_proxy 78 echon 'permitopen="127.0.0.1:'$PORT'" ' >$OBJ/authorized_keys_$USER 80 echon 'permitopen="127.0.0.1:'$PORT'" ' >>$OBJ/authorized_keys_$USER 90 # Test both sshd_config and key options permitting the same dst/port pair. 101 echo "PermitOpen 127.0.0.1:1 127.0.0.1:$PORT 127.0.0.2:2" >>$OBJ/sshd_proxy 115 echo "PermitOpen 127.0.0.1:1 127.0.0.1:$PORT 127.0.0.2:2" >>$OBJ/sshd_proxy
|
dynamic-forward.sh | 6 FWDPORT=`expr $PORT + 1` 45 -o "ProxyCommand ${proxycmd}${s} $h $PORT" \
|
conch-ciphers.sh | 22 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
|
test-exec.sh | 18 PORT="$TEST_SSH_PORT" 20 PORT=4242 185 fatal "sshd didn't exit port $PORT pid $pid" 248 Port $PORT 278 Port $PORT 351 ${SRC}/ssh2putty.sh 127.0.0.1 $PORT $OBJ/rsa > \ 360 echo "PortNumber=$PORT" >> ${OBJ}/.putty/sessions/localhost_prox [all...] |
ssh-com-client.sh | 48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1 56 Port ${PORT}
|
/external/ipsec-tools/src/libipsec/ |
policy_parse.h | 53 PORT = 269, 72 #define PORT 269
|
/development/tools/axl/ |
axl.py | 61 PORT = 8001 68 PORT = 8002 75 PORT = 8003 82 PORT = 8004 92 PORT = 8005 103 PORT = 8006 113 PORT = 8007 130 PORT = 8008 147 PORT = 8009 157 PORT = 801 [all...] |
/external/jmonkeyengine/engine/src/test/jme3test/network/ |
TestChatServer.java | 51 public static final int PORT = 5110; 64 Server server = Network.createServer(NAME, VERSION, PORT, UDP_PORT);
|
/external/webkit/LayoutTests/fast/url/script-tests/ |
trivial-segments.js | 4 // [URL, [SCHEME, HOST, PORT, PATH, QUERY, REF]]
|
/external/qemu/telephony/ |
test2.c | 18 #define PORT 8000 206 server_channel = sys_channel_create_tcp_server( PORT ); 207 printf( "listening on port %d with %p\n", PORT, server_channel );
|
/external/mdnsresponder/mDNSShared/ |
dnsextd_lexer.l | 58 port return PORT;
|
dnsextd_parser.y | 104 %token PORT 174 LISTEN_ON PORT NUMBER addresscontent 182 NAMESERVER ADDRESS networkaddress PORT NUMBER 186 PRIVATE PORT NUMBER 191 LLQ PORT NUMBER
|
/external/libpcap/ |
tokdefs.h | 38 PORT = 264, 142 #define PORT 264
|
/external/openssl/apps/ |
s_apps.h | 147 #define PORT 4433 151 int do_server(int port, int type, int *ret, int (*cb) (char *hostname, int s, unsigned char *context), unsigned char *context); 159 int init_client(int *sock, char *server, int port, int type);
|
/cts/tests/tests/os/src/android/os/cts/ |
ParcelFileDescriptorTest.java | 61 final int PORT = 12222; 68 ss = new ServerSocket(PORT); 83 socket = new Socket(InetAddress.getLocalHost(), PORT);
|
/development/samples/training/NsdChat/src/com/example/android/nsdchat/ |
ChatConnection.java | 58 public void connectToServer(InetAddress address, int port) { 59 mChatClient = new ChatClient(address, port); 72 public void setLocalPort(int port) { 73 mPort = port; 141 // Since discovery will happen via Nsd, we don't need to care which port is 151 int port = mSocket.getPort(); local 153 connectToServer(address, port); 167 private int PORT; 174 public ChatClient(InetAddress address, int port) { 178 this.PORT = port [all...] |
/build/ |
envsetup.sh | 857 local PORT="$2" 858 if [ "$PORT" ] ; then 859 PORT=$2 861 PORT=":5039" 883 adb forward "tcp$PORT" "tcp$PORT" 884 adb shell gdbserver $PORT --attach $PID & 889 echo " gdbserver $PORT /system/bin/$EXE" 891 echo " gdbserver $PORT --attach <PID>" 897 echo >>"$OUT_ROOT/gdbclient.cmds" "target remote $PORT" [all...] |
/cts/tests/tests/content/src/android/content/cts/ |
IntentFilterTest.java | 65 private static final int PORT = 80; 265 mIntentFilter.addDataAuthority(HOST + i, String.valueOf(PORT + i)); 275 assertEquals(PORT + i, actual.getPort()); 276 AuthorityEntry ae = new AuthorityEntry(HOST + i, String.valueOf(PORT + i)); 279 Uri uri = Uri.parse("http://" + HOST + i + ":" + String.valueOf(PORT + i)); 281 Uri uri2 = Uri.parse("http://" + HOST + i + 10 + ":" + PORT + i + 10); 367 mIntentFilter.addDataAuthority(HOST, String.valueOf(PORT)); 370 final Uri uri = Uri.parse("http://" + HOST + ":" + PORT); 417 mIntentFilter.addDataAuthority(HOST, String.valueOf(PORT)); 434 assertEquals(PORT, intentFilter.getDataAuthority(0).getPort()) [all...] |