Lines Matching refs:sa

239 	struct sockaddr     sa;  member
486 sa_t sa; in fcgi_init() local
487 socklen_t len = sizeof(sa); in fcgi_init()
536 if (getpeername(0, (struct sockaddr *)&sa, &len) != 0 && errno == ENOTCONN) { in fcgi_init()
576 static PACL prepare_named_pipe_acl(PSECURITY_DESCRIPTOR sd, LPSECURITY_ATTRIBUTES sa) in prepare_named_pipe_acl() argument
628 sa->lpSecurityDescriptor = sd; in prepare_named_pipe_acl()
656 sa_t sa; in fcgi_listen() local
683 memset(&sa.sa_inet, 0, sizeof(sa.sa_inet)); in fcgi_listen()
684 sa.sa_inet.sin_family = AF_INET; in fcgi_listen()
685 sa.sa_inet.sin_port = htons(port); in fcgi_listen()
686 sock_len = sizeof(sa.sa_inet); in fcgi_listen()
689 sa.sa_inet.sin_addr.s_addr = htonl(INADDR_ANY); in fcgi_listen()
691 sa.sa_inet.sin_addr.s_addr = inet_addr(host); in fcgi_listen()
692 if (sa.sa_inet.sin_addr.s_addr == INADDR_NONE) { in fcgi_listen()
707 sa.sa_inet.sin_addr.s_addr = ((struct in_addr*)hep->h_addr_list[0])->s_addr; in fcgi_listen()
717 memset(&sa, 0, sizeof(saw)); in fcgi_listen()
740 if (path_len >= sizeof(sa.sa_unix.sun_path)) { in fcgi_listen()
745 memset(&sa.sa_unix, 0, sizeof(sa.sa_unix)); in fcgi_listen()
746 sa.sa_unix.sun_family = AF_UNIX; in fcgi_listen()
747 memcpy(sa.sa_unix.sun_path, path, path_len + 1); in fcgi_listen()
750 sa.sa_unix.sun_len = sock_len; in fcgi_listen()
757 if ((listen_socket = socket(sa.sa.sa_family, SOCK_STREAM, 0)) < 0 || in fcgi_listen()
761 bind(listen_socket, (struct sockaddr *) &sa, sock_len) < 0 || in fcgi_listen()
793 allowed_clients[n].sa.sa_family = AF_INET; in fcgi_listen()
797 allowed_clients[n].sa.sa_family = AF_INET6; in fcgi_listen()
805 allowed_clients[n].sa.sa_family = 0; in fcgi_listen()
853 allowed_clients[n].sa.sa_family = AF_INET; in fcgi_set_allowed_clients()
857 allowed_clients[n].sa.sa_family = AF_INET6; in fcgi_set_allowed_clients()
865 allowed_clients[n].sa.sa_family = 0; in fcgi_set_allowed_clients()
1326 if (client_sa.sa.sa_family == AF_UNIX) { in fcgi_is_allowed()
1332 if (client_sa.sa.sa_family == AF_INET) { in fcgi_is_allowed()
1333 for (i = 0; allowed_clients[i].sa.sa_family ; i++) { in fcgi_is_allowed()
1334 if (allowed_clients[i].sa.sa_family == AF_INET in fcgi_is_allowed()
1341 if (client_sa.sa.sa_family == AF_INET6) { in fcgi_is_allowed()
1342 for (i = 0; allowed_clients[i].sa.sa_family ; i++) { in fcgi_is_allowed()
1343 if (allowed_clients[i].sa.sa_family == AF_INET6 in fcgi_is_allowed()
1348 if (allowed_clients[i].sa.sa_family == AF_INET in fcgi_is_allowed()
1403 sa_t sa; local
1404 socklen_t len = sizeof(sa);
1407 req->fd = accept(listen_socket, (struct sockaddr *)&sa, &len);
1410 client_sa = sa;
1751 if (client_sa.sa.sa_family == AF_INET) {
1752 return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet.sin_addr, str, INET6_ADDRSTRLEN);
1757 if (client_sa.sa.sa_family == AF_INET6
1763 if (client_sa.sa.sa_family == AF_INET6) {
1764 return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet6.sin6_addr, str, INET6_ADDRSTRLEN);