===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
ntpsec-1.2.0+dfsg1/pylib/statfiles.py-102-            try:
ntpsec-1.2.0+dfsg1/pylib/statfiles.py:103:                (hostname, _, _) = socket.gethostbyaddr(key)
ntpsec-1.2.0+dfsg1/pylib/statfiles.py-104-                return hostname
##############################################
ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1027-
ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py:1028:def encode_ipaddr(bigEndian, octets):
ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py:1029:    sanity_ipaddr(octets)
ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1030-    return encode_octetstr(bigEndian, octets)
##############################################
ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1032-
ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py:1033:def decode_ipaddr(data, header):
ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1034-    addr, data = decode_octetstr(data, header)
##############################################
ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1038-
ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py:1039:def sanity_ipaddr(data):
ntpsec-1.2.0+dfsg1/pylib/agentx_packet.py-1040-    if len(data) not in (4, 16):
##############################################
ntpsec-1.2.0+dfsg1/pylib/packet.py-658-
ntpsec-1.2.0+dfsg1/pylib/packet.py:659:    def sortaddr(self):
ntpsec-1.2.0+dfsg1/pylib/packet.py-660-        addr = self.addr
##############################################
ntpsec-1.2.0+dfsg1/pylib/packet.py-1577-            # IPv4 asc. then IPv6 asc.
ntpsec-1.2.0+dfsg1/pylib/packet.py:1578:            "addr": lambda e: e.sortaddr(),
ntpsec-1.2.0+dfsg1/pylib/packet.py-1579-            # IPv6 desc. then IPv4 desc.
ntpsec-1.2.0+dfsg1/pylib/packet.py:1580:            "-addr": lambda e: e.sortaddr(),
ntpsec-1.2.0+dfsg1/pylib/packet.py-1581-            # hit count ascending
##############################################
ntpsec-1.2.0+dfsg1/tests/pylib/test_agentx_packet.py-1559-
ntpsec-1.2.0+dfsg1/tests/pylib/test_agentx_packet.py:1560:    def test_ipaddr(self):
ntpsec-1.2.0+dfsg1/tests/pylib/test_agentx_packet.py-1561-        enc = AX.encode_ipaddr
##############################################
ntpsec-1.2.0+dfsg1/tests/pylib/jigs.py-171-
ntpsec-1.2.0+dfsg1/tests/pylib/jigs.py:172:    def gethostbyaddr(self, addr):
ntpsec-1.2.0+dfsg1/tests/pylib/jigs.py-173-        self.ghba_calls.append(addr)
##############################################
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-190-        span.entries = [entry1, entry2, entry3, entry4]
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py:191:        sorter = (lambda e: e.sortaddr())  # Extracted from parse_mru_variables
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-192-        sortkey = "addr"
##############################################
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-606-            cls.addr = "[11:22:33::44:55]:42"
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py:607:            self.assertEqual(cls.sortaddr(),
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-608-                             ntp.poly.polybytes("\x00\x11\x00\x22\x00\x33\x00\x00"
##############################################
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-611-            cls.addr = "[11:22:33::44:55%8]:42"
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py:612:            self.assertEqual(cls.sortaddr(),
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-613-                             ntp.poly.polybytes("\x00\x11\x00\x22\x00\x33\x00\x00"
##############################################
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-617-        cls.addr = "11.22.33.44:23"
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py:618:        self.assertEqual(cls.sortaddr(),
ntpsec-1.2.0+dfsg1/tests/pylib/test_packet.py-619-                         ntp.poly.polybytes((("\0" * 16) + "\x0b\x16\x21\x2c")))
##############################################
ntpsec-1.2.0+dfsg1/tests/common/sockaddrtest.c-71-	SET_AF(&s, AF_INET);
ntpsec-1.2.0+dfsg1/tests/common/sockaddrtest.c:72:	PSOCK_ADDR4(&s)->s_addr = inet_addr(address);
ntpsec-1.2.0+dfsg1/tests/common/sockaddrtest.c-73-	SET_PORT(&s, port);
##############################################
ntpsec-1.2.0+dfsg1/tests/ntpd/restrict.c-18-	NSRCPORT(&sockaddr) = htons(sin_port);
ntpsec-1.2.0+dfsg1/tests/ntpd/restrict.c:19:	PSOCK_ADDR4(&sockaddr)->s_addr = inet_addr(ip_addr);
ntpsec-1.2.0+dfsg1/tests/ntpd/restrict.c-20-
##############################################
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-36-	SET_AF(&expected, AF_INET);
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c:37:	PSOCK_ADDR4(&expected)->s_addr = inet_addr("192.0.2.1");
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-38-	SET_PORT(&expected, NTP_PORT);
##############################################
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-52-	SET_AF(&expected, AF_INET);
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c:53:	PSOCK_ADDR4(&expected)->s_addr = inet_addr("192.0.2.2");
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-54-	SET_PORT(&expected, 2000);
##############################################
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-68-	SET_AF(&expected, AF_INET);
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c:69:	PSOCK_ADDR4(&expected)->s_addr = inet_addr("192.168.2.2");
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-70-	SET_PORT(&expected, 123);
##############################################
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-139-	SET_AF(&expected, AF_INET);
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c:140:	PSOCK_ADDR4(&expected)->s_addr = inet_addr("192.0.2.1");
ntpsec-1.2.0+dfsg1/tests/libntp/decodenetnum.c-141-	SET_PORT(&expected, NTP_PORT);
##############################################
ntpsec-1.2.0+dfsg1/tests/libntp/macencrypt.c-139-	SET_NSRCPORT(&addr, htons(80));
ntpsec-1.2.0+dfsg1/tests/libntp/macencrypt.c:140:	uint32_t address = inet_addr("192.0.2.1");
ntpsec-1.2.0+dfsg1/tests/libntp/macencrypt.c-141-	PSOCK_ADDR4(&addr)->s_addr = address;
##############################################
ntpsec-1.2.0+dfsg1/docs/refclock.adoc-67-Commands] page. The +prefer+ option can be useful to persuade the
ntpsec-1.2.0+dfsg1/docs/refclock.adoc:68:server to cherish a reference clock with somewhat more enthusiasm than
ntpsec-1.2.0+dfsg1/docs/refclock.adoc-69-other reference clocks or peers. It is further discussed on the
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-43- */
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:44:#define MASK_IPV6_ADDR(dst, src, msk)					\
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-45-	do {								\
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-114-static void		dec_res_limited(void);
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:115:static restrict_u *	match_restrict4_addr(uint32_t, unsigned short);
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:116:static restrict_u *	match_restrict6_addr(const struct in6_addr *,
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-117-					     unsigned short);
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-269-static restrict_u *
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:270:match_restrict4_addr(
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-271-	uint32_t	addr,
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-289-static restrict_u *
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:290:match_restrict6_addr(
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-291-	const struct in6_addr *	addr,
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-301-		INSIST(next != res);
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:302:		MASK_IPV6_ADDR(&masked, addr, &res->u.v6.mask);
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-303-		if (ADDR6_EQ(&masked, &res->u.v6.addr)
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-439-
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:440:		match = match_restrict4_addr(SRCADR(srcadr),
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-441-					     SRCPORT(srcadr));
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-466-
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:467:		match = match_restrict6_addr(pin6, SRCPORT(srcadr));
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-468-		match->hitcount++;
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-530-		match.u.v6.mask = SOCK_ADDR6(resmask);
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:531:		MASK_IPV6_ADDR(&match.u.v6.addr, PSOCK_ADDR6(resaddr),
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-532-			       &match.u.v6.mask);
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-644-	if (IS_IPV4(addr)) {
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:645:		res = match_restrict4_addr(SRCADR(addr), SRCPORT(addr));
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-646-		found_specific = (SRCADR(&onesmask) == res->u.v4.mask);
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-647-	} else {
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:648:		res = match_restrict6_addr(&SOCK_ADDR6(addr),
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-649-					   SRCPORT(addr));
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-696-	if (IS_IPV4(addr)) {
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:697:		res = match_restrict4_addr(SRCADR(addr), SRCPORT(addr));
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-698-	} else {
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c:699:		res = match_restrict6_addr(&SOCK_ADDR6(addr),
ntpsec-1.2.0+dfsg1/ntpd/ntp_restrict.c-700-					   SRCPORT(addr));
##############################################
ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-38-int open_TCP_socket(struct peer *peer, const char *hostname);
ntpsec-1.2.0+dfsg1/ntpd/nts_client.c:39:struct addrinfo * find_best_addr(struct addrinfo *answer);
ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-40-bool connect_TCP_socket(int sockfd, struct addrinfo *addr);
##############################################
ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-289-	 */
ntpsec-1.2.0+dfsg1/ntpd/nts_client.c:290:	worker = find_best_addr(answer);
ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-291-	memcpy(&sockaddr, worker->ai_addr, worker->ai_addrlen);
##############################################
ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-316-
ntpsec-1.2.0+dfsg1/ntpd/nts_client.c:317:struct addrinfo *find_best_addr(struct addrinfo *answer) {
ntpsec-1.2.0+dfsg1/ntpd/nts_client.c-318-	/* default to first one */
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-69-					      struct peer *, int);
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:70:static struct peer *	findexistingpeer_addr(sockaddr_u *,
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-71-					      struct peer *, int);
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-155-struct peer *
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:156:findexistingpeer_addr(
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-157-	sockaddr_u *	addr,
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-163-
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:164:	DPRINT(2, ("findexistingpeer_addr(%s, %s, %d)\n",
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-165-		   sockporttoa(addr),
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-177-	if (NULL == start_peer)
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:178:		peer = peer_hash[NTP_HASH_ADDR(addr)];
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-179-	else
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-213-	else
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:214:		return findexistingpeer_addr(addr, start_peer, mode);
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-215-}
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-232-	srcadr = &rbufp->recv_srcadr;
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:233:	hash = NTP_HASH_ADDR(srcadr);
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-234-        for (p = peer_hash[hash]; p != NULL; p = p->adr_link) {
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-371-	if ((MDF_UCAST & p->cast_flags) && !(FLAG_LOOKUP & p->cfg.flags)) {
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:372:		hash = NTP_HASH_ADDR(&p->srcadr);
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-373-		peer_hash_count[hash]--;
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-712-
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:713:        hash = NTP_HASH_ADDR(&peer->srcadr);
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-714-        peer_hash_count[hash]--;
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-727-
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c:728:	hash = NTP_HASH_ADDR(&peer->srcadr);
ntpsec-1.2.0+dfsg1/ntpd/ntp_peer.c-729-	LINK_SLIST(peer_hash[hash], peer, adr_link);
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_parser.y-1421-	:	'(' T_Integer T_Ellipsis T_Integer ')'
ntpsec-1.2.0+dfsg1/ntpd/ntp_parser.y:1422:			{ $$ = create_attr_rangeval('-', $2, $4); }
ntpsec-1.2.0+dfsg1/ntpd/ntp_parser.y-1423-	;
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-126-static void
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:127:netaddr_fromsockaddr(isc_netaddr_t *netaddr, const isc_sockaddr_t *source);
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-128-
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-155-
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:156:static bool	is_wildcard_addr	(const sockaddr_u *);
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-157-
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-212-static	int	create_sockets	(unsigned short);
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:213:static	void	set_reuseaddr	(int);
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-214-
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-519-static void
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:520:netaddr_fromsockaddr(isc_netaddr_t *t, const isc_sockaddr_t *s) {
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-521-	int family = s->type.sa.sa_family;
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-610-	memcpy(&isc_sa.type, a, min(sizeof(isc_sa.type), sizeof(*a)));
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:611:	netaddr_fromsockaddr(&isc_a, &isc_sa);
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-612-
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-614-	memcpy(&isc_sa.type, b, min(sizeof(isc_sa.type), sizeof(*b)));
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:615:	netaddr_fromsockaddr(&isc_b, &isc_sa);
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-616-
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1013-
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1014:	iswildcard = is_wildcard_addr(if_addr);
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1015-	isloopback = !!(INT_LOOPBACK & if_flags);
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1270-static bool
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1271:is_wildcard_addr(
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1272-	const sockaddr_u *psau
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1511-		 */
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1512:		if (is_wildcard_addr(&enumep.sin))
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1513-			continue;
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1704-	 */
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1705:	set_reuseaddr(0);
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1706-
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1796-/*
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1797: * set_reuseaddr() - set/clear REUSEADDR on all sockets
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1798- *			NB possible hole - should we be doing this on broadcast
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1801-static void
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1802:set_reuseaddr(
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1803-	int flag
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1947-	 */
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1948:	if (!is_wildcard_addr(addr))
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1949-		set_wildcard_reuse(AF(addr), 1);
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1957-#ifdef NEED_REUSEADDR_FOR_IFADDRBIND
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c:1958:	if (!is_wildcard_addr(addr))
ntpsec-1.2.0+dfsg1/ntpd/ntp_io.c-1959-		set_wildcard_reuse(AF(addr), 0);
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c-2067-					addrbits = 8 *
ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c:2068:					    SIZEOF_INADDR(AF(&addr));
ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c-2069-					prefixlen = max(-1, prefixlen);
##############################################
ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c-3357-# ifdef ISC_PLATFORM_HAVESALEN
ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c:3358:	addr->sa.sa_len = SIZEOF_SOCKADDR(AF(addr));
ntpsec-1.2.0+dfsg1/ntpd/ntp_config.c-3359-# endif
##############################################
ntpsec-1.2.0+dfsg1/wafhelpers/check_sockaddr.py-10-
ntpsec-1.2.0+dfsg1/wafhelpers/check_sockaddr.py:11:def check_sockaddr(ctx):
ntpsec-1.2.0+dfsg1/wafhelpers/check_sockaddr.py-12-    ctx.check_cc(
##############################################
ntpsec-1.2.0+dfsg1/include/ntp_net.h-98-
ntpsec-1.2.0+dfsg1/include/ntp_net.h:99:#define SIZEOF_INADDR(fam)					\
ntpsec-1.2.0+dfsg1/include/ntp_net.h-100-	((AF_INET == (fam))					\
##############################################
ntpsec-1.2.0+dfsg1/include/ntp_net.h-103-
ntpsec-1.2.0+dfsg1/include/ntp_net.h:104:#define SIZEOF_SOCKADDR(fam)					\
ntpsec-1.2.0+dfsg1/include/ntp_net.h-105-	((AF_INET == (fam))					\
##############################################
ntpsec-1.2.0+dfsg1/include/ntp.h-538-#define	NTP_HASH_MASK		(NTP_HASH_SIZE-1)
ntpsec-1.2.0+dfsg1/include/ntp.h:539:#define	NTP_HASH_ADDR(src)	(sock_hash(src) & NTP_HASH_MASK)
ntpsec-1.2.0+dfsg1/include/ntp.h-540-
##############################################
ntpsec-1.2.0+dfsg1/include/ntp.h-655-typedef struct res_addr4_tag {
ntpsec-1.2.0+dfsg1/include/ntp.h:656:	uint32_t	addr;		/* IPv4 addr (host order) */
ntpsec-1.2.0+dfsg1/include/ntp.h-657-	uint32_t	mask;		/* IPv4 mask (host order) */
##############################################
ntpsec-1.2.0+dfsg1/include/ntp.h-660-typedef struct res_addr6_tag {
ntpsec-1.2.0+dfsg1/include/ntp.h:661:	struct in6_addr addr;		/* IPv6 addr (net order) */
ntpsec-1.2.0+dfsg1/include/ntp.h-662-	struct in6_addr mask;		/* IPv6 mask (net order) */
##############################################
ntpsec-1.2.0+dfsg1/packaging/SUSE/ntpsec.changes-133-  * ntp.h: remove unused INADDR_NTP
ntpsec-1.2.0+dfsg1/packaging/SUSE/ntpsec.changes:134:  * ntp_io: remove unused sau_from_netaddr()
ntpsec-1.2.0+dfsg1/packaging/SUSE/ntpsec.changes-135-  * ntp_refclock: make refclock_setup() local.
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-79-static void
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:80:get_addr(unsigned int family, isc_netaddr_t *dst, struct sockaddr *src,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-81-         char *ifname)
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-394-
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:395:        get_addr((unsigned int)family, &iter->current.address,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-396-                  ifa->ifa_addr, ifa->ifa_name);
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-398-        if (ifa->ifa_netmask != NULL)
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:399:                get_addr((unsigned int)family, &iter->current.netmask, ifa->ifa_netmask,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-400-                         ifa->ifa_name);
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-403-            (iter->current.flags & INTERFACE_F_POINTTOPOINT) != 0)
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:404:                get_addr((unsigned int)family, &iter->current.dstaddress,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-405-                         ifa->ifa_dstaddr,
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-409-            (iter->current.flags & INTERFACE_F_BROADCAST) != 0)
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:410:                get_addr((unsigned int)family, &iter->current.broadcast,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-411-                         ifa->ifa_broadaddr,
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-678-
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:679:                get_addr(family, &iter->current.address, addr_sa,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-680-                         iter->current.name);
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-682-                if (mask_sa != NULL)
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:683:                        get_addr(family, &iter->current.netmask, mask_sa,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-684-                                 iter->current.name);
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-687-                    (iter->current.flags & INTERFACE_F_POINTTOPOINT) != 0)
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:688:                        get_addr(family, &iter->current.dstaddress, dst_sa,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-689-                                 iter->current.name);
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-692-                    (iter->current.flags & INTERFACE_F_BROADCAST) != 0)
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:693:                        get_addr(family, &iter->current.broadcast, dst_sa,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-694-                                 iter->current.name);
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1111-
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1112:        get_addr(family, &iter->current.address,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1113-                 (struct sockaddr *)&ifrp->ifr_addr, ifreq.ifr_name);
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1220-                }
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1221:                get_addr(family, &iter->current.dstaddress,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1222-                         (struct sockaddr *)&ifreq.ifr_dstaddr, ifreq.ifr_name);
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1238-                }
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1239:                get_addr(family, &iter->current.broadcast,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1240-                         (struct sockaddr *)&ifreq.ifr_broadaddr, ifreq.ifr_name);
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1258-        }
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1259:        get_addr(family, &iter->current.netmask,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1260-                 (struct sockaddr *)&ifreq.ifr_addr, ifreq.ifr_name);
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1294-
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1295:        get_addr(family, &iter->current.address,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1296-                 (struct sockaddr *)&lifreq.lifr_addr, lifreq.lifr_name);
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1377-                }
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1378:                get_addr(family, &iter->current.dstaddress,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1379-                         (struct sockaddr *)&lifreq.lifr_dstaddr,
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1397-                }
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1398:                get_addr(family, &iter->current.broadcast,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1399-                         (struct sockaddr *)&lifreq.lifr_broadaddr,
##############################################
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1441-        }
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c:1442:        get_addr(family, &iter->current.netmask,
ntpsec-1.2.0+dfsg1/libntp/isc_interfaceiter.c-1443-                 (struct sockaddr *)&lifreq.lifr_addr, lifreq.lifr_name);
##############################################
ntpsec-1.2.0+dfsg1/devel/make-tarball-13-
ntpsec-1.2.0+dfsg1/devel/make-tarball:14:if [ `basename $PWD` != devel ]
ntpsec-1.2.0+dfsg1/devel/make-tarball-15-then
##############################################
ntpsec-1.2.0+dfsg1/etc/rc/ntpd-19-    if [ -r $PIDFILE ]; then
ntpsec-1.2.0+dfsg1/etc/rc/ntpd:20:        echo "ntpd seems to be already running under pid `cat $PIDFILE`."
ntpsec-1.2.0+dfsg1/etc/rc/ntpd-21-        echo "Delete $PIDFILE if this is not the case.";
##############################################
ntpsec-1.2.0+dfsg1/etc/rc/ntpd-53-    echo -n "Stopping NTP daemon...";
ntpsec-1.2.0+dfsg1/etc/rc/ntpd:54:    PID=`cat $PIDFILE`
ntpsec-1.2.0+dfsg1/etc/rc/ntpd-55-
##############################################
ntpsec-1.2.0+dfsg1/etc/rc/ntpd-58-        for i in `seq 1 15`; do
ntpsec-1.2.0+dfsg1/etc/rc/ntpd:59:            if [ -n "`ps -p $PID|grep -v PID`" ]; then
ntpsec-1.2.0+dfsg1/etc/rc/ntpd-60-                echo -n .
##############################################
ntpsec-1.2.0+dfsg1/etc/rc/ntpd-75-    if [ -r $PIDFILE ]; then
ntpsec-1.2.0+dfsg1/etc/rc/ntpd:76:        echo "NTP daemon is running as `cat $PIDFILE`"
ntpsec-1.2.0+dfsg1/etc/rc/ntpd-77-    else
##############################################
ntpsec-1.2.0+dfsg1/ntpclients/ntpsnmpd.py-528-
ntpsec-1.2.0+dfsg1/ntpclients/ntpsnmpd.py:529:    def sub_assocAddr(self):
ntpsec-1.2.0+dfsg1/ntpclients/ntpsnmpd.py-530-        def handler(oid, associd):
##############################################
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-53-
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:54:SELF="`basename $0`"
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-55-
##############################################
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-259-        fi
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:260:        echo "`echo \"$1\" | tr a-z A-Z`: $2"
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-261-        return 0
##############################################
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-292-
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:293:    local RAW="`sed -ne'/^#[\$@h]/p;/^[^#]/s/.#.*$//p' $1 `"
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-294-
##############################################
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-296-
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:297:    local DATA="`echo \"$RAW\" | sed -e'/^#h/d' -e's/^#[\$@]//g' | tr -d '[:space:]'`"
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-298-
##############################################
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-304-
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:305:    local DSHA1="`printf \"$DATA\" | $SHASUM | sed -e's/[? *].*$//'`"
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-306-
##############################################
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-312-    #
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:313:    local FSHA1="`grep '^#h' $1 | tr -d '[:cntrl:]' | sed -e's/^#h/0x/' -e's/ / 0x/g'`"
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:314:    FSHA1=`printf '%08x%08x%08x%08x%08x' $FSHA1`
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-315-
##############################################
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-329-
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:330:    EXPIRES="`echo \"$RAW\" | sed -e'/^#@/!d' -e's/^#@//' | tr -d '[:space:]'`"
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-331-    EXPIRES="$(($EXPIRES - 2208988800 ))"
##############################################
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-333-    if [ $EXPIRES -lt `date -u +%s` ]; then
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:334:        log "notice" "File expired on `date -u -d \"Jan 1, 1970 00:00:00 +0000 + $EXPIRES seconds\"`"
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-335-        return 2
##############################################
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-347-# Parse ntp.conf for leapfile directive
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:348:LEAPFILE="`grep -x 'leapfile *.*' $NTPCONF | grep -o ' [^ ]*.*'`"
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-349-if [ -z "$LEAPFILE" ]; then
##############################################
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-370-
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch:371:if [ -n "$FORCE" ] || ! verifySHA1 $LEAPFILE "$VERBOSE" || [ $EXPIRES -lt `date -d "NOW + $PREFETCH" +%s` ] ; then
ntpsec-1.2.0+dfsg1/ntpclients/ntpleapfetch-372-    TRY=0
##############################################
ntpsec-1.2.0+dfsg1/waflib/Tools/asm.py-25-		elif self.env.ASM_NAME=='nasm':
ntpsec-1.2.0+dfsg1/waflib/Tools/asm.py:26:			Logs.warn('The Nasm dependency scanner is incomplete!')
ntpsec-1.2.0+dfsg1/waflib/Tools/asm.py-27-		try:
##############################################
ntpsec-1.2.0+dfsg1/.pc/update-refclock-docs.patch/docs/refclock.adoc-67-Commands] page. The +prefer+ option can be useful to persuade the
ntpsec-1.2.0+dfsg1/.pc/update-refclock-docs.patch/docs/refclock.adoc:68:server to cherish a reference clock with somewhat more enthusiasm than
ntpsec-1.2.0+dfsg1/.pc/update-refclock-docs.patch/docs/refclock.adoc-69-other reference clocks or peers. It is further discussed on the
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-53-
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:54:SELF="`basename $0`"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-55-
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-259-        fi
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:260:        echo "`echo \"$1\" | tr a-z A-Z`: $2"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-261-        return 0
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-292-
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:293:    local RAW="`sed -ne'/^#[\$@h]/p;/^[^#]/s/.#.*$//p' $1 `"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-294-
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-296-
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:297:    local DATA="`echo \"$RAW\" | sed -e'/^#h/d' -e's/^#[\$@]//g' | tr -d '[:space:]'`"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-298-
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-304-
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:305:    local DSHA1="`printf \"$DATA\" | $SHASUM | sed -e's/[? *].*$//'`"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-306-
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-312-    #
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:313:    local FSHA1="`grep '^#h' $1 | tr -d '[:cntrl:]' | sed -e's/^#h/0x/' -e's/ / 0x/g'`"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:314:    FSHA1=`printf '%08x%08x%08x%08x%08x' $FSHA1`
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-315-
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-329-
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:330:    EXPIRES="`echo \"$RAW\" | sed -e'/^#@/!d' -e's/^#@//' | tr -d '[:space:]'`"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-331-    EXPIRES="$(($EXPIRES - 2208988800 ))"
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-333-    if [ $EXPIRES -lt `date -u +%s` ]; then
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:334:        log "notice" "File expired on `date -u -d \"Jan 1, 1970 00:00:00 +0000 + $EXPIRES seconds\"`"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-335-        return 2
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-347-# Parse ntp.conf for leapfile directive
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:348:LEAPFILE="`grep -x 'leapfile *.*' $NTPCONF | grep -o ' [^ ]*.*'`"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-349-if [ -z "$LEAPFILE" ]; then
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-370-
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch:371:if [ -n "$FORCE" ] || ! verifySHA1 $LEAPFILE "$VERBOSE" || [ $EXPIRES -lt `date -d "NOW + $PREFETCH" +%s` ] ; then
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpclients/ntpleapfetch-372-    TRY=0
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c-2067-					addrbits = 8 *
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c:2068:					    SIZEOF_INADDR(AF(&addr));
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c-2069-					prefixlen = max(-1, prefixlen);
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c-3357-# ifdef ISC_PLATFORM_HAVESALEN
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c:3358:	addr->sa.sa_len = SIZEOF_SOCKADDR(AF(addr));
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/ntpd/ntp_config.c-3359-# endif
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py-658-
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py:659:    def sortaddr(self):
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py-660-        addr = self.addr
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py-1577-            # IPv4 asc. then IPv6 asc.
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py:1578:            "addr": lambda e: e.sortaddr(),
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py-1579-            # IPv6 desc. then IPv4 desc.
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py:1580:            "-addr": lambda e: e.sortaddr(),
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/pylib/packet.py-1581-            # hit count ascending
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-190-        span.entries = [entry1, entry2, entry3, entry4]
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py:191:        sorter = (lambda e: e.sortaddr())  # Extracted from parse_mru_variables
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-192-        sortkey = "addr"
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-606-            cls.addr = "[11:22:33::44:55]:42"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py:607:            self.assertEqual(cls.sortaddr(),
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-608-                             ntp.poly.polybytes("\x00\x11\x00\x22\x00\x33\x00\x00"
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-611-            cls.addr = "[11:22:33::44:55%8]:42"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py:612:            self.assertEqual(cls.sortaddr(),
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-613-                             ntp.poly.polybytes("\x00\x11\x00\x22\x00\x33\x00\x00"
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-617-        cls.addr = "11.22.33.44:23"
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py:618:        self.assertEqual(cls.sortaddr(),
ntpsec-1.2.0+dfsg1/.pc/use-etc-ntpsec.patch/tests/pylib/test_packet.py-619-                         ntp.poly.polybytes((("\0" * 16) + "\x0b\x16\x21\x2c")))
##############################################
ntpsec-1.2.0+dfsg1/.pc/use-sbin-for-ntploggps-and-ntplogtemp.patch/wscript-729-    from wafhelpers.check_sockaddr import check_sockaddr
ntpsec-1.2.0+dfsg1/.pc/use-sbin-for-ntploggps-and-ntplogtemp.patch/wscript:730:    check_sockaddr(ctx)
ntpsec-1.2.0+dfsg1/.pc/use-sbin-for-ntploggps-and-ntplogtemp.patch/wscript-731-
##############################################
ntpsec-1.2.0+dfsg1/wscript-729-    from wafhelpers.check_sockaddr import check_sockaddr
ntpsec-1.2.0+dfsg1/wscript:730:    check_sockaddr(ctx)
ntpsec-1.2.0+dfsg1/wscript-731-