/system/weaved/buffet/ |
H A D | avahi_mdns_client.cc | 76 uint16_t port, 81 if (prev_port_ == port && prev_service_type_ == service_type && 104 if (prev_port_ == port && prev_service_type_ == service_type) { 111 prev_port_ = port; 119 service_name_.c_str(), service_type.c_str(), nullptr, nullptr, port, 154 uint16_t port = prev_port_; local 157 PublishService(service_type, port, txt); 75 PublishService(const std::string& service_type, uint16_t port, const std::vector<std::string>& txt) argument
|
H A D | shill_client.cc | 574 uint16_t port, 579 SocketStream::ConnectBlocking(host, port)}; 573 OpenSslSocket(const std::string& host, uint16_t port, const OpenSslSocketCallback& callback) argument
|
H A D | socket_stream.cc | 66 int ConnectSocket(const std::string& host, uint16_t port) { argument 67 std::string service = std::to_string(port); 147 uint16_t port) { 148 int socket_fd = ConnectSocket(host, port); 145 ConnectBlocking( const std::string& host, uint16_t port) argument
|
/system/webservd/webservd/ |
H A D | config.cc | 38 const char kPortKey[] = "port"; 47 "port": 80, 52 "port": 443, 61 int port = 0; local 62 if (!handler_value->GetInteger(kPortKey, &port)) { 70 if (port < 1 || port > 0xFFFF) { 75 "Invalid port value: %d", port); 78 handler_config->port [all...] |
H A D | firewalld_firewall.cc | 33 uint16_t port, 37 proxy_->PunchTcpHoleAsync(port, interface_name, success_cb, failure_cb); 32 PunchTcpHoleAsync( uint16_t port, const std::string& interface_name, const base::Callback<void(bool)>& success_cb, const base::Callback<void(brillo::Error*)>& failure_cb) argument
|
H A D | permission_broker_firewall.cc | 50 uint16_t port, 56 proxy_->RequestTcpPortAccessAsync(port, interface_name, dbus_fd, success_cb, 49 PunchTcpHoleAsync( uint16_t port, const std::string& interface_name, const base::Callback<void(bool)>& success_cb, const base::Callback<void(brillo::Error*)>& failure_cb) argument
|
H A D | server.cc | 47 uint16_t port, 50 LOG(INFO) << "Successfully opened up port " << port << " on interface " 53 LOG(ERROR) << "Failed to open up port " << port << ", interface: " 123 << ", Port = " << handler_config.port << ", Interface = " 126 handler_config.port, 129 handler_config.port), 46 OnFirewallSuccess(const std::string& itf_name, uint16_t port, bool allowed) argument
|
/system/tpm/trunks/ftdi/ |
H A D | support.c | 205 int set_bits_low(struct mpsse_context* mpsse, int port) { argument 209 buf[1] = port; 216 int set_bits_high(struct mpsse_context* mpsse, int port) { argument 220 buf[1] = port;
|
/system/update_engine/common/ |
H A D | http_fetcher_unittest.cc | 79 static inline string LocalServerUrlForPath(in_port_t port, argument 81 string port_str = (port ? base::StringPrintf(":%hu", port) : ""); 131 // Wait for server to begin accepting connections, obtain its port. 149 // Parse the port from the output line. 163 LOG(INFO) << "server running, listening on port " << port_; 190 const char* PythonHttpServer::kServerListeningMsgPrefix = "listening on port "; 216 virtual string BigUrl(in_port_t port) const { return kUnusedUrl; } 217 virtual string SmallUrl(in_port_t port) const { return kUnusedUrl; } 218 virtual string ErrorUrl(in_port_t port) cons 498 int port = server.GetPort(); local 783 int port = server->GetPort(); local 820 int port = server->GetPort(); local [all...] |
/system/update_engine/ |
H A D | test_http_server.cc | 22 // To use this, simply make an HTTP connection to localhost:port and 61 static const char* kListeningMsgPrefix = "listening on port "; 560 "\"%sN\" (where N is an integer port number)\n", 613 // Check the actual port. 621 in_port_t port = ntohs(bound_addr.sin_port); local 623 // Output the listening port, indicating that the server is processing 628 string listening_msg = base::StringPrintf("%s%hu", kListeningMsgPrefix, port);
|
/system/netd/server/ |
H A D | CommandListener.cpp | 1352 int port = atoi(argv[3]); local 1356 res |= gCtls->firewallCtrl.setEgressDestRule(addr, PROTOCOL_TCP, port, rule); 1357 res |= gCtls->firewallCtrl.setEgressDestRule(addr, PROTOCOL_UDP, port, rule);
|
H A D | FirewallController.cpp | 191 int FirewallController::setEgressDestRule(const char* addr, int protocol, int port, argument 207 sprintf(portStr, "%d", port);
|
H A D | MDnsSdListener.cpp | 159 const char *domain, const char *host, int port, int txtLen, void *txtRecord) { 162 interfaceName, serviceName, serviceType, domain, host, port, txtLen); 166 port = htons(port); 176 serviceType, domain, host, port, txtLen, txtRecord, &MDnsSdListenerRegisterCallback, 248 const char *hosttarget, uint16_t port, uint16_t txtLen, 253 port = ntohs(port); 269 asprintf(&msg, "%d %s %s %d %d \"%s\"", refNumber, quotedFullName, quotedHostTarget, port, 277 refNumber, fullname, hosttarget, port, txtLe 157 serviceRegister(SocketClient *cli, int requestId, const char *interfaceName, const char *serviceName, const char *serviceType, const char *domain, const char *host, int port, int txtLen, void *txtRecord) argument 246 MDnsSdListenerResolveCallback(DNSServiceRef , DNSServiceFlags , uint32_t , DNSServiceErrorType errorCode, const char *fullname, const char *hosttarget, uint16_t port, uint16_t txtLen, const unsigned char *txtRecord , void *inContext) argument 440 int port = atoi(argv[5]); local [all...] |
H A D | SockDiagTest.cpp | 34 uint16_t port = 1024 + arc4random_uniform(0xffff - 1024); local 35 sockaddr_in6 sin6 = { .sin6_family = AF_INET6, .sin6_port = htons(port) }; 38 return port; 72 uint16_t port = bindAndListen(listensocket); local 73 ASSERT_NE(0, port) << "Can't bind to server port"; 76 sockaddr_in server4 = { .sin_family = AF_INET, .sin_port = htons(port) }; 77 sockaddr_in6 server6 = { .sin6_family = AF_INET6, .sin6_port = htons(port) }; 96 port, ntohs(client46.sin6_port), ntohs(client6.sin6_port)); 131 seenServer46 |= (msg->id.idiag_sport == htons(port)); 299 uint16_t port = bindAndListen(listensocket); local [all...] |
/system/extras/multinetwork/ |
H A D | common.cpp | 125 char port[sizeof("65535")]; local 128 port, sizeof(port), 131 if (port[0] == '0' || port[0] == '\0') { 134 return (is_ipv6 ? "[" : "") + std::string(host) + (is_ipv6 ? "]:" : ":") + std::string(port);
|
H A D | httpurl.cpp | 35 Parameters() : ss({}), port("80"), path("/") {} 40 std::string port; member in struct:Parameters 77 std::cerr << "Malformed port portion." << std::endl; 80 parameters->port = parameters->host.substr(closing_bracket + 2); 85 parameters->port = parameters->host.substr(first_colon + 1); 95 << ", port=" << parameters->port 109 parameters->port.c_str(), 114 parameters->port.c_str(),
|
/system/firewalld/ |
H A D | iptables.cc | 138 bool IpTables::PunchHole(uint16_t port, argument 142 if (port == 0) { 143 // Port 0 is not a valid TCP/UDP port. 152 Hole hole = std::make_pair(port, interface); 154 // We have already punched a hole for |port| on |interface|. 160 LOG(INFO) << "Punching hole for " << sprotocol << " port " << port 162 if (!AddAcceptRules(protocol, port, interface)) { 174 bool IpTables::PlugHole(uint16_t port, argument 178 if (port 227 AddAcceptRules(ProtocolEnum protocol, uint16_t port, const std::string& interface) argument 253 DeleteAcceptRules(ProtocolEnum protocol, uint16_t port, const std::string& interface) argument 327 AddAcceptRule(const std::string& executable_path, ProtocolEnum protocol, uint16_t port, const std::string& interface) argument 351 DeleteAcceptRule(const std::string& executable_path, ProtocolEnum protocol, uint16_t port, const std::string& interface) argument [all...] |
/system/core/adb/ |
H A D | adb.cpp | 1081 int port = DEFAULT_ADB_LOCAL_TRANSPORT_PORT; local 1083 if (!android::base::ParseNetAddress(address, &host, &port, &serial, &error)) { 1132 int port = atoi(service+9); local 1133 local_connect(port);
|
H A D | adb_listeners.cpp | 115 int port = atoi(name + 4); local 117 return network_inaddr_any_server(port, SOCK_STREAM, error); 119 return network_loopback_server(port, SOCK_STREAM, error);
|
H A D | console.cpp | 55 // Return the console port of the currently connected emulator (if any) or -1 if 60 int port; local 61 return (sscanf(serial, "emulator-%d", &port) == 1) ? port : -1; 74 int port; local 77 if (sscanf(device.c_str(), "emulator-%d", &port) == 1) { 91 return port; 95 int port = adb_get_emulator_console_port(serial); local 96 if (port == -1) { 101 int fd = network_loopback_client(port, SOCK_STREA [all...] |
H A D | services.cpp | 101 int port = (int) (uintptr_t) cookie; local 102 if (port <= 0) { 103 WriteFdFmt(fd, "invalid port %d\n", port); 109 snprintf(value, sizeof(value), "%d", port); 110 property_set("service.adb.tcp.port", value); 111 WriteFdFmt(fd, "restarting in TCP mode port: %d\n", port); 116 property_set("service.adb.tcp.port", "0"); 282 int port local 342 int port; local 416 int port = DEFAULT_ADB_LOCAL_TRANSPORT_PORT; local [all...] |
H A D | sysdeps_win32.cpp | 841 int network_loopback_client(int port, int type, std::string* error) { argument 855 addr.sin_port = htons(port); 875 D("could not connect to %s:%d: %s", type != SOCK_STREAM ? "udp" : "tcp", port, 883 port); 884 D("port %d type %s => fd %d", port, type != SOCK_STREAM ? "udp" : "tcp", fd); 892 static int _network_server(int port, int type, u_long interface_address, std::string* error) { argument 907 addr.sin_port = htons(port); 925 // same port, so instead use SO_EXCLUSIVEADDRUSE. 942 D("could not bind to %s:%d: %s", type != SOCK_STREAM ? "udp" : "tcp", port, erro 966 network_loopback_server(int port, int type, std::string* error) argument 970 network_inaddr_any_server(int port, int type, std::string* error) argument 974 network_connect(const std::string& host, int port, int type, int timeout, std::string* error) argument [all...] |
H A D | transport.cpp | 843 // Local transports can match [tcp:|udp:]<hostname>[:port]. 857 // |target| may omit the port to default to ours. 934 int register_socket_transport(int s, const char *serial, int port, int local) { argument 943 D("transport: %s init'ing for socket %d, on port %d", serial, s, port); 944 if (init_socket_transport(t, s, port, local) < 0) {
|
H A D | transport_local.cpp | 41 // Android Wear has been using port 5601 in all of its documentation/tooling, 43 // Avoid stomping on their port by limiting the number of emulators that can be 93 void local_connect(int port) { argument 95 local_connect_arbitrary_ports(port-1, port, &dummy); 133 int port = DEFAULT_ADB_LOCAL_TRANSPORT_PORT; local 137 for ( ; count > 0; count--, port += 2 ) { 138 local_connect(port); 151 int port = (int) (uintptr_t) arg; local 159 serverfd = network_inaddr_any_server(port, SOCK_STREA 232 const int port = (int) (uintptr_t) arg; local 291 local_init(int port) argument [all...] |
/system/core/adb/daemon/ |
H A D | main.cpp | 131 // Don't listen on a port (default 5037) if running in secure mode. 141 D("Local port disabled"); 198 // If one of these properties is set, also listen on that port. 200 // on the default port. 202 property_get("service.adb.tcp.port", prop_port, ""); 204 property_get("persist.adb.tcp.port", prop_port, ""); 207 int port; local 208 if (sscanf(prop_port, "%d", &port) == 1 && port > 0) { 209 D("using port [all...] |