Lines Matching defs:from

37  * University Acknowledgment- Portions of this document are derived from
145 * from AUTH options
177 /* telnetd gets session key from here */
322 didnetreceive, /* last time we read data from network */
511 * maps the username from KerberosV5 to unix,
516 * from KRB5 to Unix.
676 "Failed to get key from "
802 * from the original connection. This data is used to
984 fatalperror(net, "Unable to read from /dev/urandom: ",
1241 "\t(encrypt_send_is) error from "
1527 * When we receive a REQEND from the client, it means
1667 * 'bytes' is the number of bytes waiting to be read from
1707 * message from a client.
1712 * from: RFC 2946
2040 * We received the ENC_KEYID message from a client indicating that
2057 * We received the DEC_KEYID message from a client indicating that
2135 * Used to delete an environment variable from the linked list
2191 struct sockaddr_storage from;
2363 fromlen = (socklen_t)sizeof (from);
2364 (void) memset((char *)&from, 0, sizeof (from));
2365 if (getpeername(0, (struct sockaddr *)&from, &fromlen)
2401 doit(0, &from);
2411 * from the network, and pass it through the telnet state machine. We
2977 * T_DATA_REQ from telnetmodopen(). This signals that all data
3080 * Pretend we got a DO ECHO from the client if we have not
3250 * Main loop. Select from pty and network, and
3412 * Something to read from the network...
3815 * We received an "IAC DO ..." message from the client, change our state
3907 * We received an "IAC DONT ..." message from client.
4339 * So, we have to scan the network buffer from the beginning
4453 * data rises from TCP. A more complex fix would be adding proper
4494 * the utmpx user entry from type LOGIN_PROCESS
4656 * invocation of login are from non-root users. However, since telnetd
4658 * prevent LD_* from being inserted into the environment.