/external/curl/lib/ |
D | socks.c | 109 int remote_port, in Curl_SOCKS4() argument 130 protocol4a ? "a" : "", hostname, remote_port); in Curl_SOCKS4() 134 infof(data, "SOCKS4 communication to %s:%d\n", hostname, remote_port); in Curl_SOCKS4() 149 socksreq[2] = (unsigned char)((remote_port >> 8) & 0xff); /* PORT MSB */ in Curl_SOCKS4() 150 socksreq[3] = (unsigned char)(remote_port & 0xff); /* PORT LSB */ in Curl_SOCKS4() 158 rc = Curl_resolv(conn, hostname, remote_port, &dns); in Curl_SOCKS4() 355 int remote_port, in Curl_SOCKS5() argument 394 hostname, remote_port); in Curl_SOCKS5() 456 infof(data, "SOCKS5 communication to %s:%d\n", hostname, remote_port); in Curl_SOCKS5() 600 int rc = Curl_resolv(conn, hostname, remote_port, &dns); in Curl_SOCKS5() [all …]
|
D | http_proxy.c | 88 int remote_port; in Curl_proxy_connect() local 120 remote_port = conn->secondary_port; in Curl_proxy_connect() 122 remote_port = conn->conn_to_port; in Curl_proxy_connect() 124 remote_port = conn->remote_port; in Curl_proxy_connect() 125 result = Curl_proxyCONNECT(conn, sockindex, hostname, remote_port); in Curl_proxy_connect() 184 int remote_port) in CONNECT() argument 209 hostname, remote_port); in CONNECT() 223 host_port = aprintf("%s:%d", hostname, remote_port); in CONNECT() 248 remote_port); in CONNECT() 663 int remote_port) in Curl_proxyCONNECT() argument [all …]
|
D | socks.h | 50 int remote_port, 61 int remote_port,
|
D | http_proxy.h | 32 const char *hostname, int remote_port);
|
D | pipeline.c | 181 site->port == conn->remote_port) { in Curl_pipeline_site_blacklisted() 183 conn->host.name, conn->remote_port); in Curl_pipeline_site_blacklisted()
|
D | url.c | 1344 needle->remote_port == check->remote_port) { in ConnectionExists() 1528 conn->remote_port; in Curl_connected_proxy() 1851 conn->remote_port = -1; /* unknown at this point */ in allocate_conn() 2148 conn->remote_port = curlx_ultous(port); in parseurlandfillconn() 3017 conn->remote_port = (unsigned short)data->set.use_port; in parse_remote_port() 3018 msnprintf(portbuf, sizeof(portbuf), "%d", conn->remote_port); in parse_remote_port() 3322 if((endp == ptr_next) && (port_to_match == conn->remote_port)) { in parse_connect_to_string() 3393 ALPN_h1, host, conn->remote_port, /* from */ in parse_connect_to_slist() 3405 Curl_alpnid2str(ALPN_h1), host, conn->remote_port, in parse_connect_to_slist() 3483 conn->port = conn->remote_port; in resolve_server() [all …]
|
D | curl_sasl.c | 266 const long int port = SSL_IS_PROXY() ? conn->port : conn->remote_port; in Curl_sasl_start() 418 const long int port = SSL_IS_PROXY() ? conn->port : conn->remote_port; in Curl_sasl_continue()
|
/external/curl/tests/data/ |
D | test1223 | 30 HTTP GET -w remote_ip and -w remote_port 33 http://%HOSTIP:%HTTPPORT/1223 -w 'IP %{remote_ip} and PORT %{remote_port}\n'
|
/external/toybox/toys/pending/ |
D | lsof.c | 179 int local_port, remote_port, state; in scan_ip() local 186 &(remote.s6_addr32[0]), &remote_port, in scan_ip() 196 &remote_port, &state, &inode) == 12; in scan_ip() 208 local_ip, local_port, remote_ip, remote_port, in scan_ip() 213 local_ip, local_port, remote_ip, remote_port); in scan_ip()
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_sockmap_kern.h | 104 __u32 rport = skb->remote_port; in bpf_prog2() 142 rport = skops->remote_port; in bpf_sockmap() 159 rport = skops->remote_port; in bpf_sockmap()
|
D | sockmap_parse_prog.c | 21 __u32 rport = skb->remote_port; in bpf_prog1()
|
D | sockmap_verdict_prog.c | 49 __u32 rport = skb->remote_port; in bpf_prog2()
|
/external/kernel-headers/original/uapi/xen/ |
D | evtchn.h | 54 unsigned int remote_domain, remote_port; member
|
/external/libevent/include/event2/ |
D | http_struct.h | 86 ev_uint16_t remote_port; member
|
/external/iproute2/include/uapi/linux/ |
D | bpf.h | 725 __u32 remote_port; /* Stored in network byte order */ member 832 __u32 remote_port; /* Stored in network byte order */ member
|
/external/kernel-headers/original/uapi/linux/ |
D | bpf.h | 2535 __u32 remote_port; /* Stored in network byte order */ member 2666 __u32 remote_port; /* Stored in network byte order */ member 2800 __u32 remote_port; /* Stored in network byte order */ member
|
/external/bcc/src/cc/compat/linux/ |
D | bpf.h | 2454 __u32 remote_port; /* Stored in network byte order */ member 2583 __u32 remote_port; /* Stored in network byte order */ member 2703 __u32 remote_port; /* Stored in network byte order */ member
|
/external/bcc/src/cc/includes/compat/linux/ |
D | bpf.h | 2454 __u32 remote_port; /* Stored in network byte order */ member 2583 __u32 remote_port; /* Stored in network byte order */ member 2703 __u32 remote_port; /* Stored in network byte order */ member
|
/external/scapy/scapy/layers/tls/ |
D | automaton_srv.py | 85 self.remote_port = None 114 s += "Remote end : %s:%d\n" % (self.remote_ip, self.remote_port) 160 self.remote_ip, self.remote_port = addr 162 self.remote_port))
|
D | automaton_cli.py | 86 self.remote_port = dport 151 self.remote_port)) 152 s.connect((self.remote_ip, self.remote_port))
|
/external/curl/lib/vtls/ |
D | vtls.c | 321 int port = isProxy ? (int)conn->port : conn->remote_port; in Curl_ssl_getsessionid() 348 (port == check->remote_port) && in Curl_ssl_getsessionid() 485 store->remote_port = isProxy ? (int)conn->port : conn->remote_port; in Curl_ssl_addsessionid()
|
/external/openssh/ |
D | sshd.c | 1415 int remote_port; local 2033 if ((remote_port = ssh_remote_port(ssh)) < 0) { 2046 audit_connection_from(remote_ip, remote_port); 2052 remote_ip, remote_port, laddr, ssh_local_port(ssh)); 2160 verbose("Closing connection to %.500s port %d", remote_ip, remote_port);
|
D | packet.h | 61 int remote_port; member
|
/external/openssh/regress/ |
D | netcat.c | 1248 char remote_port[NI_MAXSERV]; in report_connect() local 1257 remote_port, sizeof(remote_port), in report_connect() 1267 "received!\n", remote_host, remote_port); in report_connect()
|
/external/iperf3/src/ |
D | iperf.h | 167 int remote_port; member
|