Searched refs:sock (Results 1 - 25 of 535) sorted by path

1234567891011>>

/macosx-10.10.1/BerkeleyDB-21/db/test/
H A Dreputils.tcl2043 set sock [socket -server Unused -myaddr localhost 0]
2044 set port [lindex [fconfigure $sock -sockname] 2]
2046 lappend socks $sock
2050 foreach sock $socks {
2051 close $sock
/macosx-10.10.1/CPANInternal-159.1/Crypt-SSLeay-0.64/eg/
H A Dnet-ssl-test127 my $sock = Net::SSL->new(
133 $sock || ($@ ||= "no Net::SSL connection established");
139 $out .= "CIPHER : ".$sock->get_cipher."\n";
140 my $cert = $sock->get_peer_certificate;
148 $sock->print("$method $path HTTP/1.0\n\n");
153 while ($sock->read($buf, 1024)) {
/macosx-10.10.1/CPANInternal-159.1/Crypt-SSLeay-0.64/lib/Net/
H A DSSL.pm62 ## $socket->configure($args). Because the $sock->configure() will
283 # XXX: no way to disable <$sock>?? (tied handle perhaps?)
571 $sock->blocking(0); # set to non-blocking mode
/macosx-10.10.1/CPANInternal-159.1/HTTP-Proxy-0.25/lib/HTTP/
H A DProxy.pm621 my ($sock, $peer, $from ) = $conn eq $_
626 my $read = $sock->sysread( $data, 4096 );
636 $_->close for ( $sock, $peer );
637 $select->remove( $sock, $peer );
/macosx-10.10.1/CPANInternal-159.1/HTTP-Proxy-0.25/t/
H A DUtils.pm97 my $sock = IO::Socket::INET->new(
104 print $sock "GET $url HTTP/1.0\015\012",
106 my $content = join "", <$sock>;
109 close $sock or warn "close: $!";
/macosx-10.10.1/CPANInternal-159.1/HTTP-Proxy-0.300/lib/HTTP/
H A DProxy.pm621 my ($sock, $peer, $from ) = $conn eq $_
626 my $read = $sock->sysread( $data, 4096 );
636 $_->close for ( $sock, $peer );
637 $select->remove( $sock, $peer );
/macosx-10.10.1/CPANInternal-159.1/HTTP-Proxy-0.300/t/
H A DUtils.pm97 my $sock = IO::Socket::INET->new(
104 print $sock "GET $url HTTP/1.0\015\012",
106 my $content = join "", <$sock>;
109 close $sock or warn "close: $!";
/macosx-10.10.1/CPANInternal-159.1/IO-Socket-SSL/example/
H A Dssl_client.pl12 my ($v_mode, $sock, $buf);
26 if(!($sock = IO::Socket::SSL->new( PeerAddr => 'localhost',
36 warn "connect ($sock).\n" if ($IO::Socket::SSL::DEBUG);
41 if( ref($sock) eq "IO::Socket::SSL") {
42 $subject_name = $sock->peer_certificate("subject");
43 $issuer_name = $sock->peer_certificate("issuer");
44 $cipher = $sock->get_cipher();
49 my ($buf) = $sock->getlines;
51 $sock->close();
H A Dssl_server.pl12 my ($sock, $s, $v_mode);
26 if(!($sock = IO::Socket::SSL->new( Listen => 5,
37 warn "socket created: $sock.\n";
42 while(($s = $sock->accept())) {
46 warn "error: ", $sock->errstr, "\n";
52 if( ref($sock) eq "IO::Socket::SSL") {
68 $sock->close();
/macosx-10.10.1/CPANInternal-159.1/IO-Socket-SSL/t/
H A Dtestlib.pl176 my $sock = IO::Socket::INET->new(
182 ($port,$addr) = unpack_sockaddr_in( getsockname($sock) );
183 return wantarray ? ( $sock, inet_ntoa($addr).':'.$port ) : $sock;
/macosx-10.10.1/CPANInternal-159.1/Log-Log4perl-1.40/lib/Log/Log4perl/Appender/
H A DSocket.pm159 my $sock = IO::Socket::INET->new(
165 while(my $client = $sock->accept()) {
/macosx-10.10.1/CPANInternal-159.1/Log-Log4perl-1.40/t/
H A D042SyncApp.t199 my $sock = IO::Socket::INET->new(
206 die "Cannot start server: $!" unless defined $sock;
216 while(my $client = $sock->accept()) {
296 my $sock = IO::Socket::INET->new(
303 die "Cannot start server: $!" unless defined $sock;
311 while(my $client = $sock->accept()) {
/macosx-10.10.1/CPANInternal-159.1/Net-Daemon-0.48/lib/Net/
H A DDaemon.pm1203 my($line, $sock);
1204 $sock = $self->{'socket'};
1206 if (!defined($line = $sock->getline())) {
1207 if ($sock->error()) {
1209 $sock->error());
1211 $sock->close();
1218 $rc = printf $sock ("%x\n", $result);
1220 $rc = printf $sock ("%o\n", $result);
1222 $rc = printf $sock ("%d\n", $result);
1226 $sock
[all...]
/macosx-10.10.1/CPANInternal-159.1/SOAP-Lite-1.11/lib/SOAP/Transport/
H A DTCP.pm69 my($self, $sock, $data) = @_;
71 my $timeout = $sock->timeout;
73 my $select = IO::Select->new($sock);
80 my $wc = syswrite($sock, $data, length($data));
91 my($self, $sock) = @_;
93 my $timeout = $sock->timeout;
94 my $select = IO::Select->new($sock);
100 my $rc = sysread($sock, $data, 4096);
124 my $sock = $socket->new (
136 if ($sock) {
[all...]
/macosx-10.10.1/Heimdal-398.1.2/appl/gssmask/
H A Dcommon.h73 if (krb5_ret_int16((_client)->sock, &(num)) != 0) \
79 if (krb5_ret_int32((_client)->sock, &(num)) != 0) \
85 if (krb5_ret_data((_client)->sock, &(data)) != 0) \
91 if (krb5_ret_string((_client)->sock, &(data)) != 0) \
98 if (krb5_store_int32((_client)->sock, num) != 0) \
104 if (krb5_store_data((_client)->sock, data) != 0) \
110 if (store_string((_client)->sock, str) != 0) \
H A Dgssmaestro.c47 krb5_storage *sock; member in struct:client
649 c->sock = krb5_storage_from_fd(fd);
651 if (c->sock == NULL)
H A Dgssmask.c51 krb5_storage *sock; member in struct:client
1109 c->sock = krb5_storage_from_fd(fd);
1110 if (c->sock == NULL)
1125 krb5_storage_free(c->sock);
/macosx-10.10.1/Heimdal-398.1.2/appl/kf/
H A Dkf.c120 * forward creds to `hostname'/`service' over `sock'
125 proto (int sock, const char *hostname, const char *service, argument
147 &sock);
167 &sock,
189 status = krb5_write_priv_message(context, auth_context, &sock, &data_send);
197 status = krb5_write_priv_message(context, auth_context, &sock, &data_send);
254 status = krb5_write_priv_message(context, auth_context, &sock, &data);
264 status = krb5_read_priv_message(context, auth_context, &sock, &data);
H A Dkfd.c123 proto (int sock, const char *service) argument
145 &sock);
162 &sock,
183 krb5_write_message(context, &sock, &data);
189 &sock, &remotename);
193 &sock, &tk_file);
204 status = krb5_read_priv_message(context, auth_context, &sock, &data);
277 status = krb5_write_priv_message(context, auth_context, &sock, &data);
/macosx-10.10.1/Heimdal-398.1.2/appl/kx/
H A Dcommon.c470 * cookie and copy the rest of it to `sock'.
500 verify_and_remove_cookies (int fd, int sock, int cookiesp) argument
516 if (net_write (sock, beg, 6) != 6)
549 if (net_write (sock, zeros, 6) != 6)
750 suspicious_address (int sock, struct sockaddr *addr) argument
760 || getsockopt (sock, IPPROTO_IP, IP_OPTIONS, data, &len) < 0
H A Dkrb5.c375 * Receive authentication information on `sock' (first four bytes
380 recv_v5_auth (kx_context *kc, int sock, u_char *buf) argument
391 if (net_read(sock, buf, len) != len) {
405 ret = krb5_sock_to_principal (CONTEXT(kc), sock, "host",
414 &sock,
H A Dkx.h162 int verify_and_remove_cookies (int fd, int sock, int cookiesp);
165 int suspicious_address (int sock, struct sockaddr *addr);
234 recv_v5_auth (kx_context *kc, int sock, u_char *buf);
H A Dkxd.c106 * Prepare to receive a connection on `sock'.
110 recv_conn (int sock, kx_context *kc, argument
132 if (getsockname (sock, kc->thisaddr, &addrlen) < 0) {
139 if (getpeername (sock, kc->thataddr, &addrlen) < 0) {
150 if (net_read (sock, msg, 4) != 4) {
156 if (ret && recv_v5_auth (kc, sock, msg) == 0)
165 len = kx_read (kc, sock, msg, sizeof(msg));
172 fatal(kc, sock, "Bad message");
175 fatal(kc, sock, "user");
179 fatal(kc, sock, "use
280 passive_session(kx_context *kc, int fd, int sock, int cookiesp) argument
293 active_session(kx_context *kc, int fd, int sock, int cookiesp) argument
311 int sock, sock2, port; local
446 doit_passive(kx_context *kc, int sock, int flags, int dispnr, int nsockets, struct x_socket *sockets, int tcp_flag) argument
632 doit_active(kx_context *kc, int sock, int flags, int tcp_flag) argument
680 doit(int sock, int tcp_flag) argument
[all...]
/macosx-10.10.1/Heimdal-398.1.2/appl/rsh/
H A Drshd.c98 fatal (int sock, const char *what, const char *m, ...) argument
113 net_write (sock, buf, len + 1);
/macosx-10.10.1/Heimdal-398.1.2/appl/test/
H A Dgss_common.c42 write_token (int sock, gss_buffer_t buf) argument
51 if (net_write (sock, &net_len, 4) != 4)
53 if (net_write (sock, buf->value, len) != len)
72 read_token (int sock, gss_buffer_t buf) argument
76 enet_read (sock, &net_len, 4);
80 enet_read (sock, buf->value, len);

Completed in 452 milliseconds

1234567891011>>