Lines Matching refs:sa
136 struct sockaddr sa; member
415 sa_t sa; in fcgi_init() local
416 socklen_t len = sizeof(sa); in fcgi_init()
459 if (getpeername(0, (struct sockaddr *)&sa, &len) != 0 && errno == ENOTCONN) { in fcgi_init()
499 static PACL prepare_named_pipe_acl(PSECURITY_DESCRIPTOR sd, LPSECURITY_ATTRIBUTES sa) in prepare_named_pipe_acl() argument
551 sa->lpSecurityDescriptor = sd; in prepare_named_pipe_acl()
579 sa_t sa; in fcgi_listen() local
606 memset(&sa.sa_inet, 0, sizeof(sa.sa_inet)); in fcgi_listen()
607 sa.sa_inet.sin_family = AF_INET; in fcgi_listen()
608 sa.sa_inet.sin_port = htons(port); in fcgi_listen()
609 sock_len = sizeof(sa.sa_inet); in fcgi_listen()
612 sa.sa_inet.sin_addr.s_addr = htonl(INADDR_ANY); in fcgi_listen()
614 sa.sa_inet.sin_addr.s_addr = inet_addr(host); in fcgi_listen()
615 if (sa.sa_inet.sin_addr.s_addr == INADDR_NONE) { in fcgi_listen()
630 sa.sa_inet.sin_addr.s_addr = ((struct in_addr*)hep->h_addr_list[0])->s_addr; in fcgi_listen()
640 memset(&sa, 0, sizeof(saw)); in fcgi_listen()
663 if (path_len >= sizeof(sa.sa_unix.sun_path)) { in fcgi_listen()
668 memset(&sa.sa_unix, 0, sizeof(sa.sa_unix)); in fcgi_listen()
669 sa.sa_unix.sun_family = AF_UNIX; in fcgi_listen()
670 memcpy(sa.sa_unix.sun_path, path, path_len + 1); in fcgi_listen()
673 sa.sa_unix.sun_len = sock_len; in fcgi_listen()
680 if ((listen_socket = socket(sa.sa.sa_family, SOCK_STREAM, 0)) < 0 || in fcgi_listen()
684 bind(listen_socket, (struct sockaddr *) &sa, sock_len) < 0 || in fcgi_listen()
1184 sa_t sa; local
1185 socklen_t len = sizeof(sa);
1188 req->fd = accept(listen_socket, (struct sockaddr *)&sa, &len);
1191 if (((struct sockaddr *)&sa)->sa_family == AF_INET) {
1200 if (allowed_clients[n] == sa.sa_inet.sin_addr.s_addr) {
1207 …fprintf(stderr, "Connection from disallowed IP address '%s' is dropped.\n", inet_ntoa(sa.sa_inet.s…