Lines Matching refs:sa

241 	struct sockaddr     sa;  member
488 sa_t sa; in fcgi_init() local
489 socklen_t len = sizeof(sa); in fcgi_init()
538 if (getpeername(0, (struct sockaddr *)&sa, &len) != 0 && errno == ENOTCONN) { in fcgi_init()
578 static PACL prepare_named_pipe_acl(PSECURITY_DESCRIPTOR sd, LPSECURITY_ATTRIBUTES sa) in prepare_named_pipe_acl() argument
630 sa->lpSecurityDescriptor = sd; in prepare_named_pipe_acl()
658 sa_t sa; in fcgi_listen() local
685 memset(&sa.sa_inet, 0, sizeof(sa.sa_inet)); in fcgi_listen()
686 sa.sa_inet.sin_family = AF_INET; in fcgi_listen()
687 sa.sa_inet.sin_port = htons(port); in fcgi_listen()
688 sock_len = sizeof(sa.sa_inet); in fcgi_listen()
691 sa.sa_inet.sin_addr.s_addr = htonl(INADDR_ANY); in fcgi_listen()
693 sa.sa_inet.sin_addr.s_addr = inet_addr(host); in fcgi_listen()
694 if (sa.sa_inet.sin_addr.s_addr == INADDR_NONE) { in fcgi_listen()
709 sa.sa_inet.sin_addr.s_addr = ((struct in_addr*)hep->h_addr_list[0])->s_addr; in fcgi_listen()
719 memset(&sa, 0, sizeof(saw)); in fcgi_listen()
742 if (path_len >= sizeof(sa.sa_unix.sun_path)) { in fcgi_listen()
747 memset(&sa.sa_unix, 0, sizeof(sa.sa_unix)); in fcgi_listen()
748 sa.sa_unix.sun_family = AF_UNIX; in fcgi_listen()
749 memcpy(sa.sa_unix.sun_path, path, path_len + 1); in fcgi_listen()
752 sa.sa_unix.sun_len = sock_len; in fcgi_listen()
759 if ((listen_socket = socket(sa.sa.sa_family, SOCK_STREAM, 0)) < 0 || in fcgi_listen()
763 bind(listen_socket, (struct sockaddr *) &sa, sock_len) < 0 || in fcgi_listen()
795 allowed_clients[n].sa.sa_family = AF_INET; in fcgi_listen()
799 allowed_clients[n].sa.sa_family = AF_INET6; in fcgi_listen()
807 allowed_clients[n].sa.sa_family = 0; in fcgi_listen()
855 allowed_clients[n].sa.sa_family = AF_INET; in fcgi_set_allowed_clients()
859 allowed_clients[n].sa.sa_family = AF_INET6; in fcgi_set_allowed_clients()
867 allowed_clients[n].sa.sa_family = 0; in fcgi_set_allowed_clients()
1328 if (client_sa.sa.sa_family == AF_UNIX) { in fcgi_is_allowed()
1334 if (client_sa.sa.sa_family == AF_INET) { in fcgi_is_allowed()
1335 for (i = 0; allowed_clients[i].sa.sa_family ; i++) { in fcgi_is_allowed()
1336 if (allowed_clients[i].sa.sa_family == AF_INET in fcgi_is_allowed()
1343 if (client_sa.sa.sa_family == AF_INET6) { in fcgi_is_allowed()
1344 for (i = 0; allowed_clients[i].sa.sa_family ; i++) { in fcgi_is_allowed()
1345 if (allowed_clients[i].sa.sa_family == AF_INET6 in fcgi_is_allowed()
1350 if (allowed_clients[i].sa.sa_family == AF_INET in fcgi_is_allowed()
1405 sa_t sa; local
1406 socklen_t len = sizeof(sa);
1409 req->fd = accept(listen_socket, (struct sockaddr *)&sa, &len);
1412 client_sa = sa;
1753 if (client_sa.sa.sa_family == AF_INET) {
1754 return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet.sin_addr, str, INET6_ADDRSTRLEN);
1759 if (client_sa.sa.sa_family == AF_INET6
1765 if (client_sa.sa.sa_family == AF_INET6) {
1766 return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet6.sin6_addr, str, INET6_ADDRSTRLEN);