/macosx-10.10.1/BerkeleyDB-21/db/test/ |
H A D | reputils.tcl | 2043 set sock [socket -server Unused -myaddr localhost 0] 2044 set port [lindex [fconfigure $sock -sockname] 2] 2046 lappend socks $sock 2050 foreach sock $socks { 2051 close $sock
|
/macosx-10.10.1/CPANInternal-159.1/Crypt-SSLeay-0.64/eg/ |
H A D | net-ssl-test | 127 my $sock = Net::SSL->new( 133 $sock || ($@ ||= "no Net::SSL connection established"); 139 $out .= "CIPHER : ".$sock->get_cipher."\n"; 140 my $cert = $sock->get_peer_certificate; 148 $sock->print("$method $path HTTP/1.0\n\n"); 153 while ($sock->read($buf, 1024)) {
|
/macosx-10.10.1/CPANInternal-159.1/Crypt-SSLeay-0.64/lib/Net/ |
H A D | SSL.pm | 62 ## $socket->configure($args). Because the $sock->configure() will 283 # XXX: no way to disable <$sock>?? (tied handle perhaps?) 571 $sock->blocking(0); # set to non-blocking mode
|
/macosx-10.10.1/CPANInternal-159.1/HTTP-Proxy-0.25/lib/HTTP/ |
H A D | Proxy.pm | 621 my ($sock, $peer, $from ) = $conn eq $_ 626 my $read = $sock->sysread( $data, 4096 ); 636 $_->close for ( $sock, $peer ); 637 $select->remove( $sock, $peer );
|
/macosx-10.10.1/CPANInternal-159.1/HTTP-Proxy-0.25/t/ |
H A D | Utils.pm | 97 my $sock = IO::Socket::INET->new( 104 print $sock "GET $url HTTP/1.0\015\012", 106 my $content = join "", <$sock>; 109 close $sock or warn "close: $!";
|
/macosx-10.10.1/CPANInternal-159.1/HTTP-Proxy-0.300/lib/HTTP/ |
H A D | Proxy.pm | 621 my ($sock, $peer, $from ) = $conn eq $_ 626 my $read = $sock->sysread( $data, 4096 ); 636 $_->close for ( $sock, $peer ); 637 $select->remove( $sock, $peer );
|
/macosx-10.10.1/CPANInternal-159.1/HTTP-Proxy-0.300/t/ |
H A D | Utils.pm | 97 my $sock = IO::Socket::INET->new( 104 print $sock "GET $url HTTP/1.0\015\012", 106 my $content = join "", <$sock>; 109 close $sock or warn "close: $!";
|
/macosx-10.10.1/CPANInternal-159.1/IO-Socket-SSL/example/ |
H A D | ssl_client.pl | 12 my ($v_mode, $sock, $buf); 26 if(!($sock = IO::Socket::SSL->new( PeerAddr => 'localhost', 36 warn "connect ($sock).\n" if ($IO::Socket::SSL::DEBUG); 41 if( ref($sock) eq "IO::Socket::SSL") { 42 $subject_name = $sock->peer_certificate("subject"); 43 $issuer_name = $sock->peer_certificate("issuer"); 44 $cipher = $sock->get_cipher(); 49 my ($buf) = $sock->getlines; 51 $sock->close();
|
H A D | ssl_server.pl | 12 my ($sock, $s, $v_mode); 26 if(!($sock = IO::Socket::SSL->new( Listen => 5, 37 warn "socket created: $sock.\n"; 42 while(($s = $sock->accept())) { 46 warn "error: ", $sock->errstr, "\n"; 52 if( ref($sock) eq "IO::Socket::SSL") { 68 $sock->close();
|
/macosx-10.10.1/CPANInternal-159.1/IO-Socket-SSL/t/ |
H A D | testlib.pl | 176 my $sock = IO::Socket::INET->new( 182 ($port,$addr) = unpack_sockaddr_in( getsockname($sock) ); 183 return wantarray ? ( $sock, inet_ntoa($addr).':'.$port ) : $sock;
|
/macosx-10.10.1/CPANInternal-159.1/Log-Log4perl-1.40/lib/Log/Log4perl/Appender/ |
H A D | Socket.pm | 159 my $sock = IO::Socket::INET->new( 165 while(my $client = $sock->accept()) {
|
/macosx-10.10.1/CPANInternal-159.1/Log-Log4perl-1.40/t/ |
H A D | 042SyncApp.t | 199 my $sock = IO::Socket::INET->new( 206 die "Cannot start server: $!" unless defined $sock; 216 while(my $client = $sock->accept()) { 296 my $sock = IO::Socket::INET->new( 303 die "Cannot start server: $!" unless defined $sock; 311 while(my $client = $sock->accept()) {
|
/macosx-10.10.1/CPANInternal-159.1/Net-Daemon-0.48/lib/Net/ |
H A D | Daemon.pm | 1203 my($line, $sock); 1204 $sock = $self->{'socket'}; 1206 if (!defined($line = $sock->getline())) { 1207 if ($sock->error()) { 1209 $sock->error()); 1211 $sock->close(); 1218 $rc = printf $sock ("%x\n", $result); 1220 $rc = printf $sock ("%o\n", $result); 1222 $rc = printf $sock ("%d\n", $result); 1226 $sock [all...] |
/macosx-10.10.1/CPANInternal-159.1/SOAP-Lite-1.11/lib/SOAP/Transport/ |
H A D | TCP.pm | 69 my($self, $sock, $data) = @_; 71 my $timeout = $sock->timeout; 73 my $select = IO::Select->new($sock); 80 my $wc = syswrite($sock, $data, length($data)); 91 my($self, $sock) = @_; 93 my $timeout = $sock->timeout; 94 my $select = IO::Select->new($sock); 100 my $rc = sysread($sock, $data, 4096); 124 my $sock = $socket->new ( 136 if ($sock) { [all...] |
/macosx-10.10.1/Heimdal-398.1.2/appl/gssmask/ |
H A D | common.h | 73 if (krb5_ret_int16((_client)->sock, &(num)) != 0) \ 79 if (krb5_ret_int32((_client)->sock, &(num)) != 0) \ 85 if (krb5_ret_data((_client)->sock, &(data)) != 0) \ 91 if (krb5_ret_string((_client)->sock, &(data)) != 0) \ 98 if (krb5_store_int32((_client)->sock, num) != 0) \ 104 if (krb5_store_data((_client)->sock, data) != 0) \ 110 if (store_string((_client)->sock, str) != 0) \
|
H A D | gssmaestro.c | 47 krb5_storage *sock; member in struct:client 649 c->sock = krb5_storage_from_fd(fd); 651 if (c->sock == NULL)
|
H A D | gssmask.c | 51 krb5_storage *sock; member in struct:client 1109 c->sock = krb5_storage_from_fd(fd); 1110 if (c->sock == NULL) 1125 krb5_storage_free(c->sock);
|
/macosx-10.10.1/Heimdal-398.1.2/appl/kf/ |
H A D | kf.c | 120 * forward creds to `hostname'/`service' over `sock' 125 proto (int sock, const char *hostname, const char *service, argument 147 &sock); 167 &sock, 189 status = krb5_write_priv_message(context, auth_context, &sock, &data_send); 197 status = krb5_write_priv_message(context, auth_context, &sock, &data_send); 254 status = krb5_write_priv_message(context, auth_context, &sock, &data); 264 status = krb5_read_priv_message(context, auth_context, &sock, &data);
|
H A D | kfd.c | 123 proto (int sock, const char *service) argument 145 &sock); 162 &sock, 183 krb5_write_message(context, &sock, &data); 189 &sock, &remotename); 193 &sock, &tk_file); 204 status = krb5_read_priv_message(context, auth_context, &sock, &data); 277 status = krb5_write_priv_message(context, auth_context, &sock, &data);
|
/macosx-10.10.1/Heimdal-398.1.2/appl/kx/ |
H A D | common.c | 470 * cookie and copy the rest of it to `sock'. 500 verify_and_remove_cookies (int fd, int sock, int cookiesp) argument 516 if (net_write (sock, beg, 6) != 6) 549 if (net_write (sock, zeros, 6) != 6) 750 suspicious_address (int sock, struct sockaddr *addr) argument 760 || getsockopt (sock, IPPROTO_IP, IP_OPTIONS, data, &len) < 0
|
H A D | krb5.c | 375 * Receive authentication information on `sock' (first four bytes 380 recv_v5_auth (kx_context *kc, int sock, u_char *buf) argument 391 if (net_read(sock, buf, len) != len) { 405 ret = krb5_sock_to_principal (CONTEXT(kc), sock, "host", 414 &sock,
|
H A D | kx.h | 162 int verify_and_remove_cookies (int fd, int sock, int cookiesp); 165 int suspicious_address (int sock, struct sockaddr *addr); 234 recv_v5_auth (kx_context *kc, int sock, u_char *buf);
|
H A D | kxd.c | 106 * Prepare to receive a connection on `sock'. 110 recv_conn (int sock, kx_context *kc, argument 132 if (getsockname (sock, kc->thisaddr, &addrlen) < 0) { 139 if (getpeername (sock, kc->thataddr, &addrlen) < 0) { 150 if (net_read (sock, msg, 4) != 4) { 156 if (ret && recv_v5_auth (kc, sock, msg) == 0) 165 len = kx_read (kc, sock, msg, sizeof(msg)); 172 fatal(kc, sock, "Bad message"); 175 fatal(kc, sock, "user"); 179 fatal(kc, sock, "use 280 passive_session(kx_context *kc, int fd, int sock, int cookiesp) argument 293 active_session(kx_context *kc, int fd, int sock, int cookiesp) argument 311 int sock, sock2, port; local 446 doit_passive(kx_context *kc, int sock, int flags, int dispnr, int nsockets, struct x_socket *sockets, int tcp_flag) argument 632 doit_active(kx_context *kc, int sock, int flags, int tcp_flag) argument 680 doit(int sock, int tcp_flag) argument [all...] |
/macosx-10.10.1/Heimdal-398.1.2/appl/rsh/ |
H A D | rshd.c | 98 fatal (int sock, const char *what, const char *m, ...) argument 113 net_write (sock, buf, len + 1);
|
/macosx-10.10.1/Heimdal-398.1.2/appl/test/ |
H A D | gss_common.c | 42 write_token (int sock, gss_buffer_t buf) argument 51 if (net_write (sock, &net_len, 4) != 4) 53 if (net_write (sock, buf->value, len) != len) 72 read_token (int sock, gss_buffer_t buf) argument 76 enet_read (sock, &net_len, 4); 80 enet_read (sock, buf->value, len);
|