Lines Matching refs:from
16 * may be used to endorse or promote products derived from this software
46 * LOOKAT checks if the message is of the requested type and comes from
63 struct sockaddr_in from;
90 fprintf(fd, "readmsg: looking for %s from %s, %s\n",
123 from = ptr->addr;
132 if ((ntp->mask & from.sin_addr.s_addr) ==
142 print(&msgin, &from);
150 == from.sin_addr.s_addr
167 * coming from the network. Set the timer and wait
205 length = sizeof(from);
207 (struct sockaddr*)(void *)&from, &length)) < 0) {
213 "short packet (%lu/%lu bytes) from %s",
215 inet_ntoa(from.sin_addr));
232 "in packet from %s", inet_ntoa(from.sin_addr));
238 if ((ntp->mask & from.sin_addr.s_addr) ==
245 * drop packets from nets we are ignoring permanently
259 print(&msgin, &from);
266 * Throw away messages coming from this machine,
280 print(&msgin, &from);
288 * sent from a higher level routine. Different
301 if (LOOKAT(msgin, type, machfrom, netfrom, from)) {
304 print(&msgin, &from);
310 * behind. However, it seems able to recover from all cases of lost
328 tail->addr = from;
353 print(&msgin, &from);
355 xmit(TSP_ACK,msgin.tsp_seq, &from);
361 print(&msgin, &from);
368 * Certain packets may arrive from this machine on ignored networks.
381 print(&msgin, &from);
383 xmit(TSP_ACK,msgin.tsp_seq, &from);
389 print(&msgin, &from);
416 print(&msgin, &from);
418 xmit(TSP_ACK,msgin.tsp_seq, &from);
425 print(&msgin, &from);
427 xmit(TSP_MASTERACK,msgin.tsp_seq, &from);
433 print(&msgin, &from);
449 fprintf(fd, "bad type (%u) on packet from %s\n",