sa_inet 138 sapi/cgi/fastcgi.c struct sockaddr_in sa_inet; sa_inet 606 sapi/cgi/fastcgi.c memset(&sa.sa_inet, 0, sizeof(sa.sa_inet)); sa_inet 607 sapi/cgi/fastcgi.c sa.sa_inet.sin_family = AF_INET; sa_inet 608 sapi/cgi/fastcgi.c sa.sa_inet.sin_port = htons(port); sa_inet 609 sapi/cgi/fastcgi.c sock_len = sizeof(sa.sa_inet); sa_inet 612 sapi/cgi/fastcgi.c sa.sa_inet.sin_addr.s_addr = htonl(INADDR_ANY); sa_inet 614 sapi/cgi/fastcgi.c sa.sa_inet.sin_addr.s_addr = inet_addr(host); sa_inet 615 sapi/cgi/fastcgi.c if (sa.sa_inet.sin_addr.s_addr == INADDR_NONE) { sa_inet 630 sapi/cgi/fastcgi.c sa.sa_inet.sin_addr.s_addr = ((struct in_addr*)hep->h_addr_list[0])->s_addr; sa_inet 1202 sapi/cgi/fastcgi.c if (allowed_clients[n] == sa.sa_inet.sin_addr.s_addr) { sa_inet 1209 sapi/cgi/fastcgi.c fprintf(stderr, "Connection from disallowed IP address '%s' is dropped.\n", inet_ntoa(sa.sa_inet.sin_addr)); sa_inet 137 sapi/fpm/fpm/fastcgi.c struct sockaddr_in sa_inet; sa_inet 268 sapi/fpm/fpm/fastcgi.c if (inet_pton(AF_INET, cur, &allowed_clients[n].sa_inet.sin_addr)>0) { sa_inet 781 sapi/fpm/fpm/fastcgi.c && !memcmp(&client_sa.sa_inet.sin_addr, &allowed_clients[i].sa_inet.sin_addr, 4)) { sa_inet 795 sapi/fpm/fpm/fastcgi.c && !memcmp(((char *)&client_sa.sa_inet6.sin6_addr)+12, &allowed_clients[i].sa_inet.sin_addr, 4)) { sa_inet 1135 sapi/fpm/fpm/fastcgi.c return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet.sin_addr, str, INET6_ADDRSTRLEN);