/dports/www/perlbal/Perlbal-1.80/lib/Perlbal/ |
H A D | ReproxyManager.pm | 50 my $ipport = "$datref->[0]:$datref->[1]"; 61 } @{$ReproxyBackends{$ipport}}; 67 $self->spawn_backend($ipport); 101 my $ipport = $be->{ipport}; 102 if ($ReproxyConnecting{$ipport} && $ReproxyConnecting{$ipport} == $be) { 104 $ReproxyBackends{$ipport} ||= []; 111 $self->spawn_backend($ipport); 150 } @{$ReproxyBackends{$be->{ipport}}}; 153 $self->spawn_backend($be->{ipport}); 160 my $ipport = $_[1]; [all …]
|
H A D | BackendHTTP.pm | 100 $NodeStats{$self->{ipport}}->{attempts}++; 170 $self->{ipport} = $prog; # often used as key 219 sub ipport { subroutine 221 return $self->{ipport}; 241 $svc->mark_node_used($self->{ipport}); 333 delete $NoVerify{$self->{ipport}} if 334 defined $NoVerify{$self->{ipport}} && 335 $NoVerify{$self->{ipport}} < $now; 340 $NodeStats{$self->{ipport}}->{connects}++; 385 $NodeStats{$self->{ipport}}->{verifies}++; [all …]
|
H A D | Service.pm | 1127 if (defined $self->{pending_connects}{$be->{ipport}}) { 1141 $self->{pending_connects}{$be->{ipport}} = $be; 1151 if (defined $self->{pending_connects}{$be->{ipport}} && defined $be && 1152 $self->{pending_connects}{$be->{ipport}} == $be) { 1153 $self->{pending_connects}{$be->{ipport}} = undef; 1243 if (defined $self->{pool}->node_used($be->ipport)) { 1314 $self->{backend_no_spawn}->{$be->{ipport}} = 1; 1318 delete $self->{backend_no_spawn}->{$be->{ipport}}; 1702 foreach my $ipport (sort keys %{$self->{pending_connects}}) { 1703 my $be = $self->{pending_connects}{$ipport}; [all …]
|
/dports/science/nwchem/nwchem-7b21660b82ebd85ef659f6fba7e1e73433b0bd0a/src/nwpw/pspw/cpsd/ |
H A D | runsocket.F | 26 character*80 buffer,ipport,stype local 37 call control_socket_ip(ipport) 39 ip = ipport 41 ii = index(ipport,' ') 44 ii = index(ipport,':') 45 it = index(ipport,' ') - 1 46 pp(1:it-ii) = ipport(ii+1:it) 52 ip(1:ii-1) = ipport(1:ii-1) 129 write(*,'(" Connected to = ",A)') ipport
|
/dports/science/nwchem-data/nwchem-7.0.2-release/src/nwpw/pspw/cpsd/ |
H A D | runsocket.F | 26 character*80 buffer,ipport,stype 37 call control_socket_ip(ipport) 39 ip = ipport 41 ii = index(ipport,' ') 44 ii = index(ipport,':') 45 it = index(ipport,' ') - 1 46 pp(1:it-ii) = ipport(ii+1:it) 52 ip(1:ii-1) = ipport(1:ii-1) 129 write(*,'(" Connected to = ",A)') ipport
|
/dports/devel/py-ovsdbapp/ovsdbapp-1.5.0/ovsdbapp/ |
H A D | utils.py | 25 def normalize_ip_port(ipport): argument 27 return normalize_ip(ipport) 30 if ipport[0] == '[': 33 ip, port = ipport[1:].split(']:') 39 ip, port = ipport.split(':')
|
/dports/games/battletanks/btanks-0.9.8083/mrt/ |
H A D | sys_socket.cpp | 57 std::vector<std::string> ipport; in parse() local 58 mrt::split(ipport, ip, ":"); in parse() 59 if (ipport.empty()) { in parse() 64 if (ipport.size() > 1) { in parse() 65 port = atoi(ipport[1].c_str()); in parse() 68 this->ip = inet_addr(ipport[0].c_str()); in parse() 73 this->ip = (inet_aton(ipport[0].c_str(), &a) != 0)? a.s_addr: 0; in parse()
|
/dports/net-im/jabberd/jabberd-2.7.0/s2s/ |
H A D | out.c | 176 char *ipport; in _out_dns_mark_bad() local 183 bad->key = ipport; in _out_dns_mark_bad() 186 free(ipport); in _out_dns_mark_bad() 208 const char *ipport; in dns_select() local 321 ipport = NULL; in dns_select() 391 assert(ipport != NULL); in dns_select() 395 c = strchr(ipport, '/'); in dns_select() 396 strncpy(ip, ipport, c-ipport); in dns_select() 397 ip[c-ipport] = '\0'; in dns_select() 794 free(ipport); in _dns_add_result() [all …]
|
H A D | in.c | 69 char ipport[INET6_ADDRSTRLEN + 17]; in in_mio_callback() local 101 snprintf(ipport, INET6_ADDRSTRLEN + 16, "%s/%d", in->ip, in->port); in in_mio_callback() 102 xhash_zap(in->s2s->in_accept, ipport); in in_mio_callback() 143 snprintf(ipport, INET6_ADDRSTRLEN + 16, "%s/%d", in->ip, in->port); in in_mio_callback() 144 xhash_put(s2s->in_accept, pstrdup(xhash_pool(s2s->in_accept),ipport), (void *) in); in in_mio_callback() 168 char ipport[INET6_ADDRSTRLEN + 17]; in _in_sx_callback() local 264 snprintf(ipport, INET6_ADDRSTRLEN + 16, "%s/%d", in->ip, in->port); in _in_sx_callback() 265 xhash_zap(in->s2s->in_accept, ipport); in _in_sx_callback()
|
/dports/net/sngrep/sngrep-1.4.9/src/ |
H A D | address.c | 105 address_from_str(const char *ipport) in address_from_str() argument 112 if (!ipport || strlen(ipport) > ADDRESSLEN + 6) in address_from_str() 115 strncpy(scanipport, ipport, sizeof(scanipport)); in address_from_str()
|
/dports/www/perlbal/Perlbal-1.80/lib/ |
H A D | Perlbal.pm | 590 my $ipport = shift; 591 foreach my $key (keys %{$ref->{$ipport}}) { 592 if (ref $ref->{$ipport}->{$key} eq 'ARRAY') { 599 $mc->out("$ipport $key $ref->{$ipport}->{$key}"); 608 foreach my $ipport (keys %$ref) { 609 $dump->($ipport); 744 $mc->out("$ipport $until"); 765 foreach my $ipport (sort keys %{$pend{$name}}) { 766 $mc->out("$name $ipport $pend{$name}{$ipport}"); 889 my $ipport = "$node->[0]:$node->[1]"; [all …]
|
/dports/sysutils/froxlor/froxlor-0.9.38.7_4/froxlor/scripts/jobs/ |
H A D | cron_tasks.inc.http.10.apache.php | 157 $ipport = '[' . $row_ipsandports['ip'] . ']:' . $row_ipsandports['port']; 159 $ipport = $row_ipsandports['ip'] . ':' . $row_ipsandports['port']; 170 $this->virtualhosts_data[$vhosts_filename] .= 'Listen ' . $ipport . "\n"; 171 $this->logger->logAction(CRON_ACTION, LOG_DEBUG, $ipport . ' :: inserted listen-statement'); 179 $this->virtualhosts_data[$vhosts_filename] .= 'NameVirtualHost ' . $ipport . "\n"; 189 $this->virtualhosts_data[$vhosts_filename] .= '<VirtualHost ' . $ipport . '>' . "\n"; 475 $this->logger->logAction(CRON_ACTION, LOG_DEBUG, $ipport . ' :: inserted vhostcontainer'); 782 $ipport = ''; 799 $ipport = '[' . $domain['ip'] . ']:' . $domain['port'] . ' '; 801 $ipport = $domain['ip'] . ':' . $domain['port'] . ' '; [all …]
|
/dports/dns/powerdns/pdns-4.5.2/pdns/ |
H A D | resolver.cc | 342 int Resolver::resolve(const ComboAddress& ipport, const DNSName &domain, int type, Resolver::res_t*… in resolve() argument 345 return resolve(ipport, domain, type, res, local); in resolve() 348 void Resolver::getSoaSerial(const ComboAddress& ipport, const DNSName &domain, uint32_t *serial) in getSoaSerial() argument 351 int ret = resolve(ipport, domain, QType::SOA, &res); in getSoaSerial() 354 …throw ResolverException("Query to '" + ipport.toLogString() + "' for SOA of '" + domain.toLogStrin… in getSoaSerial() 357 …throw ResolverException("Query to '" + ipport.toLogString() + "' for SOA of '" + domain.toLogStrin… in getSoaSerial() 362 …throw ResolverException("Query to '" + ipport.toLogString() + "' for SOA of '" + domain.toLogStrin… in getSoaSerial() 368 …throw ResolverException("Query to '" + ipport.toLogString() + "' for SOA of '" + domain.toLogStrin… in getSoaSerial()
|
/dports/mail/dovecot/dovecot-2.3.17/src/lib-http/ |
H A D | test-http-server.c | 69 const char *ipport; in client_http_handle_request() local 82 (void)net_ipport2str(&client->server_ip, client->server_port, &ipport); in client_http_handle_request() 83 str_printfa(content, "Server: %s\r\n", ipport); in client_http_handle_request() 84 (void)net_ipport2str(&client->ip, client->port, &ipport); in client_http_handle_request() 85 str_printfa(content, "Client: %s\r\n", ipport); in client_http_handle_request()
|
/dports/sysutils/kubectl/kubernetes-1.22.2/pkg/util/flag/ |
H A D | flags_test.go | 146 ipport := defaultIPPort 147 fs.Var(IPPortVar{&ipport}, "ipport", "the ip:port") 167 if tc.expectVal != ipport { 168 t.Errorf("%q: Unexpected ipport: expected %q, saw %q", tc.desc, tc.expectVal, ipport)
|
/dports/finance/electrum/Electrum-4.1.5/electrum/gui/kivy/uix/dialogs/ |
H A D | lightning_open_channel.py | 113 self.ipport = text 114 d = LabelDialog(_('IP/port in format:\n[host]:[port]'), self.ipport, callback) 178 if self.ipport: 179 conn_str += '@' + self.ipport.strip()
|
/dports/security/p5-Net-SAML/zxid-1.42/ |
H A D | zxlog.c | 254 const char* ipport, /* 4 null allowed, -:- or cf->ipport if not given */ in zxlog_fmt() argument 296 if (!ipport) { in zxlog_fmt() 297 ipport = cf->ipport; in zxlog_fmt() 298 if (!ipport) in zxlog_fmt() 299 ipport = "-:-"; in zxlog_fmt() 311 ipport, sha1_name, in zxlog_fmt() 400 const char* ipport, /* 4 null allowed, -:- or cf->ipport if not given */ in zxlog() argument 424 ourts, srcts, ipport, entid, msgid, a7nid, nid, sigval, res, in zxlog() 455 0, ses?&ses->srcts:0, ses?ses->ipport:0, in zxlogwsp() 471 const char* ipport, /* 4 null allowed, -:- or cf->ipport if not given */ in zxlogusr() argument [all …]
|
/dports/databases/p5-Cache-Memcached/Cache-Memcached-1.30/lib/Cache/ |
H A D | Memcached.pm | 179 if (my $ipport = $sock_map{$sock}) { 181 $host_dead{$ipport} = $now + $dead_for 183 delete $cache_sock{$ipport}; 194 if (my $ipport = $sock_map{$sock}) { 196 delete $cache_sock{$ipport}; 739 my $ipport = $sock_map{$_} or die "No map found matching for $_"; 740 my $sock = $cache_sock{$ipport} or die "No sock found for $ipport";
|
/dports/net-p2p/libswift/libswift-dc0cbcc/tests/ |
H A D | swiftconn.py | 115 def __init__(self,ipport): # Python tuple argument 116 self.ipport = ipport 118 ipbytes = socket.inet_aton(self.ipport[0]) 119 portbytes = struct.pack(">H",self.ipport[1]) 136 return str(self.ipport) 140 def __init__(self,ipport): # Python tuple argument 141 self.ipport = ipport 144 ipbytes = inet_pton6(self.ipport[0]) 146 ipbytes = socket.inet_pton(socket.AF_INET6, self.ipport[0]) 148 portbytes = struct.pack(">H",self.ipport[1]) [all …]
|
/dports/net/sqtop/sqtop-2015-02-08/src/ |
H A D | Utils.cpp | 38 std::pair <string, string> Utils::SplitIPPort(string ipport) { in SplitIPPort() argument 40 std::string::size_type found = ipport.find_last_of(":"); in SplitIPPort() 42 result.first = ipport.substr(0, found); in SplitIPPort() 43 result.second = ipport.substr(found+1); in SplitIPPort()
|
/dports/security/ossec-hids-local/ossec-hids-3.6.0/src/os_net/ |
H A D | os_net.c | 728 char ipport[NI_MAXSERV]; /* printed port */ in OS_DecodeSockaddr() local 746 sizeof (ipaddr), ipport, sizeof (ipport), in OS_DecodeSockaddr() 751 sizeof (ipaddr), ipport, sizeof (ipport), in OS_DecodeSockaddr() 761 DecodeFamily (sa->sa_family), ipaddr, ipport); in OS_DecodeSockaddr()
|
/dports/security/ossec-hids-server/ossec-hids-3.6.0/src/os_net/ |
H A D | os_net.c | 728 char ipport[NI_MAXSERV]; /* printed port */ in OS_DecodeSockaddr() local 746 sizeof (ipaddr), ipport, sizeof (ipport), in OS_DecodeSockaddr() 751 sizeof (ipaddr), ipport, sizeof (ipport), in OS_DecodeSockaddr() 761 DecodeFamily (sa->sa_family), ipaddr, ipport); in OS_DecodeSockaddr()
|
/dports/security/ossec-hids-agent/ossec-hids-3.6.0/src/os_net/ |
H A D | os_net.c | 728 char ipport[NI_MAXSERV]; /* printed port */ in OS_DecodeSockaddr() local 746 sizeof (ipaddr), ipport, sizeof (ipport), in OS_DecodeSockaddr() 751 sizeof (ipaddr), ipport, sizeof (ipport), in OS_DecodeSockaddr() 761 DecodeFamily (sa->sa_family), ipaddr, ipport); in OS_DecodeSockaddr()
|
/dports/net/freebsd-uucp/freebsd-uucp-r1_07_4/uucp/libuuconf/ |
H A D | tport.c | 33 static int ipport P((pointer pglobal, int argc, char **argv, pointer pvar, 93 as[0].uuconf_pifn = ipport; 254 ipport (pglobal, argc, argv, pvar, pinfo) in ipport() function
|
/dports/mail/qpopper/qpopper4.1.0/popper/ |
H A D | pop_rpop.c | 74 if ( p->ipport >= IPPORT_RESERVED || p->ipport < IPPORT_RESERVED/2 ) {
|