sa_inet           138 sapi/cgi/fastcgi.c 	struct sockaddr_in  sa_inet;
sa_inet           606 sapi/cgi/fastcgi.c 		memset(&sa.sa_inet, 0, sizeof(sa.sa_inet));
sa_inet           607 sapi/cgi/fastcgi.c 		sa.sa_inet.sin_family = AF_INET;
sa_inet           608 sapi/cgi/fastcgi.c 		sa.sa_inet.sin_port = htons(port);
sa_inet           609 sapi/cgi/fastcgi.c 		sock_len = sizeof(sa.sa_inet);
sa_inet           612 sapi/cgi/fastcgi.c 			sa.sa_inet.sin_addr.s_addr = htonl(INADDR_ANY);
sa_inet           614 sapi/cgi/fastcgi.c 			sa.sa_inet.sin_addr.s_addr = inet_addr(host);
sa_inet           615 sapi/cgi/fastcgi.c 			if (sa.sa_inet.sin_addr.s_addr == INADDR_NONE) {
sa_inet           630 sapi/cgi/fastcgi.c 				sa.sa_inet.sin_addr.s_addr = ((struct in_addr*)hep->h_addr_list[0])->s_addr;
sa_inet          1202 sapi/cgi/fastcgi.c 									if (allowed_clients[n] == sa.sa_inet.sin_addr.s_addr) {
sa_inet          1209 sapi/cgi/fastcgi.c 									fprintf(stderr, "Connection from disallowed IP address '%s' is dropped.\n", inet_ntoa(sa.sa_inet.sin_addr));
sa_inet           137 sapi/fpm/fpm/fastcgi.c 	struct sockaddr_in  sa_inet;
sa_inet           268 sapi/fpm/fpm/fastcgi.c 			if (inet_pton(AF_INET, cur, &allowed_clients[n].sa_inet.sin_addr)>0) {
sa_inet           781 sapi/fpm/fpm/fastcgi.c 				&& !memcmp(&client_sa.sa_inet.sin_addr, &allowed_clients[i].sa_inet.sin_addr, 4)) {
sa_inet           795 sapi/fpm/fpm/fastcgi.c 				&& !memcmp(((char *)&client_sa.sa_inet6.sin6_addr)+12, &allowed_clients[i].sa_inet.sin_addr, 4)) {
sa_inet          1135 sapi/fpm/fpm/fastcgi.c 		return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet.sin_addr, str, INET6_ADDRSTRLEN);