Home | History | Annotate | Download | only in openssh

Lines Matching defs:from

6  * This program is the ssh daemon.  It listens for connections from clients,
8 * information to/from the application to the user client over an encrypted
157 /* Flag indicating that the daemon is being started from inetd. */
306 * Called from the main program after receiving SIGHUP.
450 logit("Did not receive identification string from %s",
479 "from %s port %d", client_version_string,
491 logit("probed from %s with %s. Don't panic.",
496 logit("scanned from %s with %s. Don't panic.",
1019 * Protocol from reexec master to child:
1109 /* Accept a connection from inetd */
1216 * from this function are in a forked subprocess.
1225 struct sockaddr_storage from;
1295 fromlen = sizeof(from);
1297 (struct sockaddr *)&from, &fromlen);
1427 * from that of the child
1634 * key (unless started from inetd)
1644 * Unset KRB5CCNAME, otherwise the user's session may inherit it from
1897 debug("Forcing server key to %d bits to make it differ from host key.",
1962 * If not in debugging mode, and not started from inetd, disconnect
1963 * from the controlling terminal, and fork. The original process
1973 /* Disconnect from the controlling tty. */
1993 /* Get a connection, either from inetd or a listening TCP socket */
2137 verbose("Connection from %s port %d on %s port %d",
2166 /* XXX global for cleanup, access from other modules */
2351 * doing IP spoofing from a remote machine; any machine on the local
2412 /* Get check bytes from the packet. These must match those we
2448 * Extract session key from the decrypted integer. The key is in the
2455 error("do_ssh1_kex: bad session key len from %s: "
2486 /* Set the session key. From this on all communications will be encrypted. */