Lines Matching refs:sa

243 	struct sockaddr     sa;  member
490 sa_t sa; in fcgi_init() local
491 socklen_t len = sizeof(sa); in fcgi_init()
540 if (getpeername(0, (struct sockaddr *)&sa, &len) != 0 && errno == ENOTCONN) { in fcgi_init()
580 static PACL prepare_named_pipe_acl(PSECURITY_DESCRIPTOR sd, LPSECURITY_ATTRIBUTES sa) in prepare_named_pipe_acl() argument
632 sa->lpSecurityDescriptor = sd; in prepare_named_pipe_acl()
660 sa_t sa; in fcgi_listen() local
687 memset(&sa.sa_inet, 0, sizeof(sa.sa_inet)); in fcgi_listen()
688 sa.sa_inet.sin_family = AF_INET; in fcgi_listen()
689 sa.sa_inet.sin_port = htons(port); in fcgi_listen()
690 sock_len = sizeof(sa.sa_inet); in fcgi_listen()
693 sa.sa_inet.sin_addr.s_addr = htonl(INADDR_ANY); in fcgi_listen()
695 sa.sa_inet.sin_addr.s_addr = inet_addr(host); in fcgi_listen()
696 if (sa.sa_inet.sin_addr.s_addr == INADDR_NONE) { in fcgi_listen()
711 sa.sa_inet.sin_addr.s_addr = ((struct in_addr*)hep->h_addr_list[0])->s_addr; in fcgi_listen()
721 memset(&sa, 0, sizeof(saw)); in fcgi_listen()
744 if (path_len >= sizeof(sa.sa_unix.sun_path)) { in fcgi_listen()
749 memset(&sa.sa_unix, 0, sizeof(sa.sa_unix)); in fcgi_listen()
750 sa.sa_unix.sun_family = AF_UNIX; in fcgi_listen()
751 memcpy(sa.sa_unix.sun_path, path, path_len + 1); in fcgi_listen()
754 sa.sa_unix.sun_len = sock_len; in fcgi_listen()
761 if ((listen_socket = socket(sa.sa.sa_family, SOCK_STREAM, 0)) < 0 || in fcgi_listen()
765 bind(listen_socket, (struct sockaddr *) &sa, sock_len) < 0 || in fcgi_listen()
797 allowed_clients[n].sa.sa_family = AF_INET; in fcgi_listen()
801 allowed_clients[n].sa.sa_family = AF_INET6; in fcgi_listen()
809 allowed_clients[n].sa.sa_family = 0; in fcgi_listen()
857 allowed_clients[n].sa.sa_family = AF_INET; in fcgi_set_allowed_clients()
861 allowed_clients[n].sa.sa_family = AF_INET6; in fcgi_set_allowed_clients()
869 allowed_clients[n].sa.sa_family = 0; in fcgi_set_allowed_clients()
1327 if (client_sa.sa.sa_family == AF_UNIX) { in fcgi_is_allowed()
1333 if (client_sa.sa.sa_family == AF_INET) { in fcgi_is_allowed()
1334 for (i = 0; allowed_clients[i].sa.sa_family ; i++) { in fcgi_is_allowed()
1335 if (allowed_clients[i].sa.sa_family == AF_INET in fcgi_is_allowed()
1342 if (client_sa.sa.sa_family == AF_INET6) { in fcgi_is_allowed()
1343 for (i = 0; allowed_clients[i].sa.sa_family ; i++) { in fcgi_is_allowed()
1344 if (allowed_clients[i].sa.sa_family == AF_INET6 in fcgi_is_allowed()
1349 if (allowed_clients[i].sa.sa_family == AF_INET in fcgi_is_allowed()
1402 sa_t sa; local
1403 socklen_t len = sizeof(sa);
1408 req->fd = accept(listen_socket, (struct sockaddr *)&sa, &len);
1411 client_sa = sa;
1748 if (client_sa.sa.sa_family == AF_INET) {
1749 return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet.sin_addr, str, INET6_ADDRSTRLEN);
1754 if (client_sa.sa.sa_family == AF_INET6
1760 if (client_sa.sa.sa_family == AF_INET6) {
1761 return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet6.sin6_addr, str, INET6_ADDRSTRLEN);