{
NCR_Instance inst = (NCR_Instance)arg;
- DEBUG_LOG("Receive timeout for [%s:%d]",
- UTI_IPToString(&inst->remote_addr.ip_addr), inst->remote_addr.port);
+ DEBUG_LOG("Receive timeout for %s", UTI_IPSockAddrToString(&inst->remote_addr));
inst->rx_timeout_id = 0;
close_client_socket(inst);
return;
}
- DEBUG_LOG("Transmit timeout for [%s:%d]",
- UTI_IPToString(&inst->remote_addr.ip_addr), inst->remote_addr.port);
+ DEBUG_LOG("Transmit timeout for %s", UTI_IPSockAddrToString(&inst->remote_addr));
/* Open new client socket */
if (inst->mode == MODE_CLIENT) {
return;
if (!ADF_IsAllowed(access_auth_table, &remote_addr->ip_addr)) {
- DEBUG_LOG("NTP packet received from unauthorised host %s port %d",
- UTI_IPToString(&remote_addr->ip_addr),
- remote_addr->port);
+ DEBUG_LOG("NTP packet received from unauthorised host %s",
+ UTI_IPToString(&remote_addr->ip_addr));
return;
}
assert(initialised);
if (local_addr->sock_fd == INVALID_SOCK_FD) {
- DEBUG_LOG("No socket to send to %s:%d",
- UTI_IPToString(&remote_addr->ip_addr), remote_addr->port);
+ DEBUG_LOG("No socket to send to %s", UTI_IPSockAddrToString(remote_addr));
return 0;
}