Lines Matching defs:n

140 static char BANNER1[] = "\r\n\r\n";
141 static char BANNER2[] = "\r\n\r\0\r\n\r\0";
397 "SENT ENCRYPT SUPPORT\n");
421 "krb5 auth reply length too large (%d)\n",
448 "%s %s|%s %s\n",
503 " ktkt_warnd(1M) down?\n");
523 "Successfully stored forwarded creds\n");
725 "\tKerberos5 identifies user as ``%s''\r\n",
765 "RCVD KRB_FORWARD data (%d bytes)\n", cnt);
829 "forwarded credentials\r\n");
841 "credentials obtained\r\n");
846 "\tUnknown Kerberos option %d\r\n",
857 (void) fprintf(stderr, "\tKerberos V5 error: %s\r\n", errbuf);
892 "reply\n");
898 "\t(auth_name) NAME exceeds %d bytes\n",
905 (void) fprintf(stderr, "\t(auth_name) name [%s]\n", namebuf);
932 "(%d bytes)\n", aptr->AuthString, cnt);
946 "auth_level = %d user = %s\n",
1039 "SENT TELOPT_ENCRYPT ENCRYPT_REQSTART\n");
1090 "\t(encrypt_is) initial state = %d\n",
1101 "IV bytes\n");
1116 "\t(encrypt_is) We accept NULL encr\n");
1124 "for initial negotiation\r\n",
1149 "SENT TELOPT_ENCRYPT ENCRYPT_REPLY %s %s\n",
1165 "\t(encrypt_is) final DECRYPT state = %d\n",
1210 " state = %d\n", lstate);
1223 "start encryption yet\n");
1228 "\t(encrypt_send_is) Creating new feed\n");
1242 "getrandom: %d\n", kret);
1243 syslog(LOG_ERR, "Failed to create encryption key (err %d)\n");
1284 (void) fprintf(stderr, "\n");
1360 "= %d\n", lstate);
1383 "(lstate = %d) data waiting = %d\n",
1402 "crypto_method %d\n",
1460 "\t(encrypt_start_output) Encrypting output\n");
1476 "autoencrypt = ON\n");
1546 (void) fprintf(stderr, "SENT TELOPT_ENCRYPT ENCRYPT_END\n");
1571 (void) fprintf(stderr, "SENT TELOPT_ENCRYPT ENCRYPT_REQEND\n");
1593 "defined yet\n");
1606 "crypto_method %d\n", encr_data.decrypt.type);
1648 "decrypt side\n");
1678 "ncc=%d bytes = %d\n", ncc, bytes);
1697 "\t(encrypt_start) Start DECRYPT using %s\n",
1725 "RCVD ENCRYPT SUPPORT %s\n",
1750 "disabled.\n");
1771 "[NULL]\n");
1798 "\t(send_keyid) store %d byte %s keyid\n",
1820 (void) fprintf(stderr, "SENT TELOPT_ENCRYPT %s %d\n",
1846 "\t(encrypt_reply) ENCRYPT REPLY %s %s [len=%d]\n",
1855 "\t(encrypt_reply) initial ENCRYPT state = %d\n",
1885 "REPLY message\n");
1897 "OFF\n");
1906 "\t(encrypt_reply) ENCRYPT final state = %d\n",
1920 "\t(set_keyid_state) %s initial state = %d\n",
1932 "len=%d value=%d\n", *keyidlen, *keyid);
1950 "\t(set_keyid_state) %s final state = %d\n",
1973 "\t(keyid) keylen too big (%d)\n", len);
1978 (void) fprintf(stderr, "\t(keyid) set KEYID for %s len = %d\n",
1988 "failure\n");
1997 "\t(keyid) Setting new key (%d bytes)\n",
2010 "state = %d autoflag=%d\n",
2027 (void) fprintf(stderr, "\t(keyid) %s final state = %d\n",
2079 "session key (unknown type = %d)\n",
2085 "for server\n");
2270 "%s\n", optarg);
2288 syslog(LOG_ERR, "netibuf malloc failed\n");
2306 "unknown service\n");
2429 syslog(LOG_INFO, "ttloop: peer closed connection\n");
2526 "[data]\n");
2565 (void) fprintf(stderr, "SENT WILL ENCRYPT\n");
2575 (void) fprintf(stderr, "SENT DO ENCRYPT\n");
2661 (void) fprintf(stderr, "getterminaltype() forcing encrypt\n");
2666 (void) fprintf(stderr, "getterminaltype() encryption %sstarted\n",
2783 syslog(LOG_INFO, "ioctl TIOCGETP pty t: %m\n");
2789 syslog(LOG_INFO, "ioctl TIOCSETN pty t: %m\n");
2791 syslog(LOG_INFO, "ioctl TIOCGETP pty pty: %m\n");
2794 syslog(LOG_INFO, "ioctl TIOCSETN pty pty: %m\n");
2805 fatal(f, "Cannot alloc memory for address info\n");
2809 fatal(f, "Cannot alloc memory for port info\n");
2842 fatal(f, "Cannot alloc memory for address info\n");
2847 fatal(f, "Cannot alloc memory for port info\n");
2874 syslog(LOG_ERR, "unknown address family %d\n",
2876 fatal(f, "getpeername: unknown address family\n");
2970 fatal(f, "ioctl CRPASSTHRU failed\n");
2986 fatalperror(f, "readstream failed\n", errno);
3001 fatal(f, "ioctl I_LINK of /dev/ptmx failed\n");
3003 fatal(f, "ioctl I_LINK of tcp connection failed\n");
3021 fatal(netfd, "ioctl LOGDMX_IOC_QEXCHANGE of netfd failed\n");
3039 fatal(netfd, "ioctl LOGDMX_IOC_QEXCHANGE of ptmfd failed\n");
3178 fatal(net, "Authentication failed\n");
3232 (void) snprintf(buf, sizeof (buf), "telnetd: %s.\r\n", msg);
3244 "%s: %s\r\n", msg, strerror(errnum));
3267 syslog(LOG_INFO, "ioctl FIONBIO net: %m\n");
3269 syslog(LOG_INFO, "ioctl FIONBIO pty p: %m\n");
3335 syslog(LOG_DEBUG, "TEL_IOC_MODE binary has changed\n");
3338 fatal(net, "ioctl TEL_IOC_MODE failed\n");
3347 "ioctl I_NREAD failed\n", errno);
3370 failed\n");
3390 fatal(net, "ioctl TEL_IOC_GETBLK failed\n");
3462 /* Strip off \n or \0 after a \r */
3463 if ((c == 0) || (c == '\n')) {
3476 * We map \r\n ==> \r, since
3477 * We now map \r\n ==> \r for pragmatic reasons.
3478 * Many client implementations send \r\n when
3481 * We USED to map \r\n ==> \n, since \r\n says
3511 write_data_len("\r\n[Yes]\r\n", 9);
3523 "ioctl TIOCGLTC: %m\n");
3549 "ioctl TIOCGETP: %m\n");
3642 syslog(LOG_ERR, "telnetd: panic state=%d\n", state);
3643 (void) printf("telnetd: panic state=%d\n", state);
3719 "RCVD IAC WILL TELOPT_ENCRYPT\n");
3786 "RCVD WONT TELOPT_AUTHENTICATE\n");
3795 "RCVD IAC WONT TELOPT_ENCRYPT\n");
3856 (void) fprintf(stderr, "RCVD DO TELOPT_ENCRYPT\n");
3881 "RCVD DO TELOPT_AUTHENTICATION\n");
3925 (void) fprintf(stderr, "RCVD IAC DONT ENCRYPT\n");
4123 "(%d bytes)\n",
4132 "(%d bytes)\n",
4147 (void) fprintf(stderr, "RCVD ENCRYPT %s\n",
4202 syslog(LOG_INFO, "tcgetattr: %m\n");
4230 syslog(LOG_INFO, "tcsetattr: %m\n");
4246 syslog(LOG_INFO, "ioctl TIOCGETP: %m\n");
4279 int n;
4281 if ((n = pfrontp - pbackp) > 0)
4282 n = write(master, pbackp, n);
4283 if (n < 0)
4285 pbackp += n;
4396 int n;
4398 if ((n = nfrontp - nbackp) > 0) {
4405 n = write(net, nbackp, n); /* normal write */
4407 n = neturg - nbackp;
4417 if (n > 1) {
4419 n = write(net, nbackp, n-1);
4422 n = send_oob(net, nbackp, n);
4426 if (n < 0) {
4433 nbackp += n;
4563 fatal(net, "netibuf realloc failed\n");
4573 syslog(LOG_ERR, "getmsg returned -1, errno %d\n",
4602 fatalperror(net, "netibuf realloc failed\n", errno);
4609 syslog(LOG_ERR, "read %d bytes\n", nbytes);
4776 if (strlen(cp) + strlen("eval echo '") + strlen("'\n")
4781 (void) strlcat(evalbuf, "'\n",
4797 p = strrchr(buf, '\n');
4825 * Map the banner: "\n" -> "\r\n" and "\r" -> "\r\0"
4828 if (*p == '\n') {
4830 *q++ = '\n';