/art/test/etc/ |
reference-run-test-classes | 55 PORT=8000 57 msg " jdb -attach localhost:$PORT" 58 DEBUG_OPTS="-agentlib:jdwp=transport=dt_socket,address=$PORT,server=y,suspend=y"
|
push-and-run-test-jar | 116 PORT=12345 118 msg " adb forward tcp:$PORT tcp:$PORT" 119 msg " jdb -attach localhost:$PORT" 120 DEBUGGER_OPTS="-agentlib:jdwp=transport=dt_socket,address=$PORT,server=y,suspend=y"
|
host-run-test-jar | 90 PORT=8000 92 msg " jdb -attach localhost:$PORT" 93 DEBUGGER_OPTS="-agentlib:jdwp=transport=dt_socket,address=$PORT,server=y,suspend=y"
|
/dalvik/tests/etc/ |
reference-run-test-classes | 55 PORT=8000 56 msg "Waiting for debugger to connect on localhost:$PORT" 57 DEBUG_OPTS="-agentlib:jdwp=transport=dt_socket,address=$PORT,server=y,suspend=y"
|
host-run-test-jar | 147 PORT=8000 148 msg "Waiting for debugger to connect on localhost:$PORT" 149 DEX_DEBUG="-agentlib:jdwp=transport=dt_socket,addres=$PORT,server=y,suspend=y"
|
/docs/source.android.com/scripts/ |
micro-httpd.py | 24 PORT = int(os.environ.get('HTTP_PORT', 8080)) 26 httpd = SocketServer.TCPServer(('0.0.0.0', PORT), Handler) 28 print 'Serving on port %d' % PORT
|
/external/openssh/regress/ |
forwarding.sh | 10 last=$PORT 42 -$d ${base}01:127.0.0.1:$PORT \ 43 -$d ${base}02:127.0.0.1:$PORT \ 44 -$d ${base}03:127.0.0.1:$PORT \ 45 -$d ${base}04:127.0.0.1:$PORT \ 52 -$d ${base}01:127.0.0.1:$PORT \ 53 -$d ${base}02:127.0.0.1:$PORT \ 54 -$d ${base}03:127.0.0.1:$PORT \ 55 -$d ${base}01:127.0.0.1:$PORT \ 56 -$d ${base}04:127.0.0.1:$PORT \ [all...] |
ssh2putty.sh | 5 echo "Usage: ssh2putty hostname port ssh-private-key" 10 PORT=$2 33 echo "rsa2@$PORT:$HOST $public_exponent,$modulus"
|
keyscan.sh | 13 ${SSHKEYSCAN} -t $t -p $PORT 127.0.0.1 127.0.0.1 127.0.0.1 \
|
login-timeout.sh | 11 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 & 24 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 &
|
cfgmatch.sh | 8 fwd="-L $fwdport:127.0.0.1:$PORT" 49 echo "PermitOpen 127.0.0.1:$PORT" >>$OBJ/sshd_config 53 echo "PermitOpen 127.0.0.1:$PORT" >>$OBJ/sshd_proxy 78 echon 'permitopen="127.0.0.1:'$PORT'" ' >$OBJ/authorized_keys_$USER 80 echon 'permitopen="127.0.0.1:'$PORT'" ' >>$OBJ/authorized_keys_$USER 90 # Test both sshd_config and key options permitting the same dst/port pair. 101 echo "PermitOpen 127.0.0.1:1 127.0.0.1:$PORT 127.0.0.2:2" >>$OBJ/sshd_proxy 115 echo "PermitOpen 127.0.0.1:1 127.0.0.1:$PORT 127.0.0.2:2" >>$OBJ/sshd_proxy
|
dynamic-forward.sh | 6 FWDPORT=`expr $PORT + 1` 45 -o "ProxyCommand ${proxycmd}${s} $h $PORT" \
|
conch-ciphers.sh | 22 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
|
test-exec.sh | 18 PORT="$TEST_SSH_PORT" 20 PORT=4242 185 fatal "sshd didn't exit port $PORT pid $pid" 248 Port $PORT 278 Port $PORT 351 ${SRC}/ssh2putty.sh 127.0.0.1 $PORT $OBJ/rsa > \ 360 echo "PortNumber=$PORT" >> ${OBJ}/.putty/sessions/localhost_prox [all...] |
/external/ipsec-tools/src/libipsec/ |
policy_parse.h | 53 PORT = 269, 72 #define PORT 269
|
/development/tools/axl/ |
axl.py | 61 PORT = 8001 68 PORT = 8002 75 PORT = 8003 82 PORT = 8004 92 PORT = 8005 103 PORT = 8006 113 PORT = 8007 130 PORT = 8008 147 PORT = 8009 157 PORT = 801 [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_docxmlrpc.py | 10 PORT = None 30 global PORT 31 PORT = serv.socket.getsockname()[1] 67 PORT = None 79 # wait for port to be assigned 81 while n > 0 and PORT is None: 85 self.client = httplib.HTTPConnection("localhost:%d" % PORT)
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_docxmlrpc.py | 10 PORT = None 30 global PORT 31 PORT = serv.socket.getsockname()[1] 67 PORT = None 79 # wait for port to be assigned 81 while n > 0 and PORT is None: 85 self.client = httplib.HTTPConnection("localhost:%d" % PORT)
|
/external/jmonkeyengine/engine/src/test/jme3test/network/ |
TestChatServer.java | 51 public static final int PORT = 5110; 64 Server server = Network.createServer(NAME, VERSION, PORT, UDP_PORT);
|
/external/qemu/telephony/ |
test2.c | 18 #define PORT 8000 206 server_channel = sys_channel_create_tcp_server( PORT ); 207 printf( "listening on port %d with %p\n", PORT, server_channel );
|
/external/mdnsresponder/mDNSShared/ |
dnsextd_lexer.l | 58 port return PORT;
|
/frameworks/base/packages/services/Proxy/src/com/android/proxyhandler/ |
ProxyService.java | 40 // STOPSHIP This being a static port means it can be hijacked by other apps. 41 public static final int PORT = 8182;
|
/pdk/apps/CameraITS/pymodules/its/ |
device.py | 50 # Open a connection to localhost:6000, forwarded to port 6000 on the device. 53 PORT = 6000 68 _run('%s forward tcp:%d tcp:%d' % (self.ADB,self.PORT,self.PORT)) 70 self.sock.connect((self.IPADDR, self.PORT))
|
/external/chromium_org/tools/measure_page_load_time/ie_bho/ |
MeasurePageLoadTimeBHO.cpp | 16 #define PORT 42492 // port to listen on. Also jhaas's 120 addrBind.sin_port = htons(PORT);
|
/external/chromium_org/tools/site_compare/utils/ |
browser_iterate.py | 30 PORT = 42492 94 s.connect(("localhost", PORT))
|