/kernel/linux/linux-6.6/drivers/nvmem/ |
H A D | stm32-bsec-optee-ta.c | 104 u32 session_id; in stm32_bsec_optee_ta_open() local 119 rc = stm32_bsec_ta_open_session(tee_ctx, &session_id); in stm32_bsec_optee_ta_open() 125 stm32_bsec_ta_close_session(tee_ctx, session_id); in stm32_bsec_optee_ta_open() 148 u32 session_id; in stm32_bsec_optee_ta_read() local 150 ret = stm32_bsec_ta_open_session(ctx, &session_id); in stm32_bsec_optee_ta_read() 158 arg.session = session_id; in stm32_bsec_optee_ta_read() 199 stm32_bsec_ta_close_session(ctx, session_id); in stm32_bsec_optee_ta_read() 212 u32 session_id; in stm32_bsec_optee_ta_write() local 214 ret = stm32_bsec_ta_open_session(ctx, &session_id); in stm32_bsec_optee_ta_write() 226 arg.session = session_id; in stm32_bsec_optee_ta_write() [all...] |
/kernel/linux/linux-5.10/net/l2tp/ |
H A D | l2tp_core.c | 129 * The session_id SHOULD be random according to RFC3931, but several 131 * hash on the session_id, rather than a simple bitmask. 134 l2tp_session_id_hash_2(struct l2tp_net *pn, u32 session_id) in l2tp_session_id_hash_2() argument 136 return &pn->l2tp_session_hlist[hash_32(session_id, L2TP_HASH_BITS_2)]; in l2tp_session_id_hash_2() 140 * The session_id SHOULD be random according to RFC2661, but several 142 * session_ids. So we do a real hash on the session_id, rather than a 146 l2tp_session_id_hash(struct l2tp_tunnel *tunnel, u32 session_id) in l2tp_session_id_hash() argument 148 return &tunnel->session_hlist[hash_32(session_id, L2TP_HASH_BITS)]; in l2tp_session_id_hash() 244 u32 session_id) in l2tp_tunnel_get_session() 249 session_list = l2tp_session_id_hash(tunnel, session_id); in l2tp_tunnel_get_session() 243 l2tp_tunnel_get_session(struct l2tp_tunnel *tunnel, u32 session_id) l2tp_tunnel_get_session() argument 265 l2tp_session_get(const struct net *net, u32 session_id) l2tp_session_get() argument 799 u32 tunnel_id, session_id; l2tp_udp_recv_core() local 935 u32 session_id = session->peer_session_id; l2tp_build_l2tpv2_header() local 1583 l2tp_session_create(int priv_size, struct l2tp_tunnel *tunnel, u32 session_id, u32 peer_session_id, struct l2tp_session_cfg *cfg) l2tp_session_create() argument [all...] |
H A D | l2tp_ppp.c | 21 * attaches it to a bound UDP socket with local tunnel_id / session_id and 22 * peer tunnel_id / session_id set. Data can then be sent or received using 26 * When a PPPoL2TP socket is connected with local and peer session_id values 45 * sax.pppol2tp.s_session = session_id; 559 u32 session_id; member 578 info->session_id = sa_v2in4->pppol2tp.s_session; in pppol2tp_sockaddr_get_info() 594 info->session_id = sa_v3in4->pppol2tp.s_session; in pppol2tp_sockaddr_get_info() 610 info->session_id = sa_v2in6->pppol2tp.s_session; in pppol2tp_sockaddr_get_info() 626 info->session_id = sa_v3in6->pppol2tp.s_session; in pppol2tp_sockaddr_get_info() 665 /* Special case: create tunnel context if session_id an in pppol2tp_tunnel_get() 863 pppol2tp_session_create(struct net *net, struct l2tp_tunnel *tunnel, u32 session_id, u32 peer_session_id, struct l2tp_session_cfg *cfg) pppol2tp_session_create() argument 1115 u32 session_id; pppol2tp_ioctl() local [all...] |
H A D | l2tp_core.h | 75 u32 session_id; member 199 u32 session_id, u32 peer_session_id, 228 u32 session_id); 230 struct l2tp_session *l2tp_session_get(const struct net *net, u32 session_id); 248 u32 session_id, u32 peer_session_id,
|
/kernel/linux/linux-6.6/net/l2tp/ |
H A D | l2tp_core.c | 129 * The session_id SHOULD be random according to RFC3931, but several 131 * hash on the session_id, rather than a simple bitmask. 134 l2tp_session_id_hash_2(struct l2tp_net *pn, u32 session_id) in l2tp_session_id_hash_2() argument 136 return &pn->l2tp_session_hlist[hash_32(session_id, L2TP_HASH_BITS_2)]; in l2tp_session_id_hash_2() 140 * The session_id SHOULD be random according to RFC2661, but several 142 * session_ids. So we do a real hash on the session_id, rather than a 146 l2tp_session_id_hash(struct l2tp_tunnel *tunnel, u32 session_id) in l2tp_session_id_hash() argument 148 return &tunnel->session_hlist[hash_32(session_id, L2TP_HASH_BITS)]; in l2tp_session_id_hash() 244 u32 session_id) in l2tp_tunnel_get_session() 249 session_list = l2tp_session_id_hash(tunnel, session_id); in l2tp_tunnel_get_session() 243 l2tp_tunnel_get_session(struct l2tp_tunnel *tunnel, u32 session_id) l2tp_tunnel_get_session() argument 265 l2tp_session_get(const struct net *net, u32 session_id) l2tp_session_get() argument 799 u32 tunnel_id, session_id; l2tp_udp_recv_core() local 935 u32 session_id = session->peer_session_id; l2tp_build_l2tpv2_header() local 1581 l2tp_session_create(int priv_size, struct l2tp_tunnel *tunnel, u32 session_id, u32 peer_session_id, struct l2tp_session_cfg *cfg) l2tp_session_create() argument [all...] |
H A D | l2tp_ppp.c | 21 * attaches it to a bound UDP socket with local tunnel_id / session_id and 22 * peer tunnel_id / session_id set. Data can then be sent or received using 26 * When a PPPoL2TP socket is connected with local and peer session_id values 45 * sax.pppol2tp.s_session = session_id; 558 u32 session_id; member 577 info->session_id = sa_v2in4->pppol2tp.s_session; in pppol2tp_sockaddr_get_info() 593 info->session_id = sa_v3in4->pppol2tp.s_session; in pppol2tp_sockaddr_get_info() 609 info->session_id = sa_v2in6->pppol2tp.s_session; in pppol2tp_sockaddr_get_info() 625 info->session_id = sa_v3in6->pppol2tp.s_session; in pppol2tp_sockaddr_get_info() 664 /* Special case: create tunnel context if session_id an in pppol2tp_tunnel_get() 862 pppol2tp_session_create(struct net *net, struct l2tp_tunnel *tunnel, u32 session_id, u32 peer_session_id, struct l2tp_session_cfg *cfg) pppol2tp_session_create() argument 1114 u32 session_id; pppol2tp_ioctl() local [all...] |
H A D | l2tp_core.h | 75 u32 session_id; member 199 u32 session_id, u32 peer_session_id, 228 u32 session_id); 230 struct l2tp_session *l2tp_session_get(const struct net *net, u32 session_id); 248 u32 session_id, u32 peer_session_id,
|
/kernel/linux/linux-6.6/drivers/net/wwan/iosm/ |
H A D | iosm_ipc_mux_codec.c | 1059 static int ipc_mux_ul_adgh_encode(struct iosm_mux *ipc_mux, int session_id, in ipc_mux_ul_adgh_encode() argument 1126 adb->adgh->if_id = session_id; in ipc_mux_ul_adgh_encode() 1171 * @session_id: session id 1176 int session_id, int qlth_n_ql_size, in ipc_mux_ul_adb_update_ql() 1182 p_qlt = (struct mux_qlth *)p_adb->pp_qlt[session_id]; in ipc_mux_ul_adb_update_ql() 1185 if (p_adb->qlt_updated[session_id] == 0) { in ipc_mux_ul_adb_update_ql() 1187 p_qlt->if_id = session_id; in ipc_mux_ul_adb_update_ql() 1195 p_adb->qlt_updated[session_id] = 1; in ipc_mux_ul_adb_update_ql() 1200 int session_id, in mux_ul_dg_update_tbl_index() 1208 ipc_mux_ul_adb_update_ql(ipc_mux, adb, session_id, in mux_ul_dg_update_tbl_index() 1175 ipc_mux_ul_adb_update_ql(struct iosm_mux *ipc_mux, struct mux_adb *p_adb, int session_id, int qlth_n_ql_size, struct sk_buff_head *ul_list) ipc_mux_ul_adb_update_ql() argument 1199 mux_ul_dg_update_tbl_index(struct iosm_mux *ipc_mux, int session_id, struct sk_buff_head *ul_list, struct mux_adth_dg *dg, int aligned_size, u32 qlth_n_ql_size, struct mux_adb *adb, struct sk_buff *src_skb) mux_ul_dg_update_tbl_index() argument 1224 mux_ul_dg_encode(struct iosm_mux *ipc_mux, struct mux_adb *adb, struct mux_adth_dg *dg, struct sk_buff_head *ul_list, struct sk_buff *src_skb, int session_id, int pkt_to_send, u32 qlth_n_ql_size, int *out_offset, int head_pad_len) mux_ul_dg_encode() argument 1290 mux_ul_adb_encode(struct iosm_mux *ipc_mux, int session_id, struct mux_session *session, struct sk_buff_head *ul_list, struct mux_adb *adb, int pkt_to_send) mux_ul_adb_encode() argument 1352 int session_id; ipc_mux_ul_data_encode() local [all...] |
/kernel/linux/linux-5.10/drivers/firmware/broadcom/ |
H A D | tee_bnxt_fw.c | 55 * @session_id: TA session identifier. 60 u32 session_id; member 74 arg->session = pvt_data.session_id; in prepare_args() 211 pvt_data.session_id = sess_arg.session; in tee_bnxt_fw_probe() 227 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in tee_bnxt_fw_probe() 237 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in tee_bnxt_fw_remove() 247 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in tee_bnxt_fw_shutdown()
|
/kernel/linux/linux-5.10/drivers/char/hw_random/ |
H A D | optee-rng.c | 56 * @session_id: RNG TA session identifier. 64 u32 session_id; member 87 inv_arg.session = pvt_data->session_id; in get_optee_rng_data() 187 inv_arg.session = pvt_data.session_id; in get_optee_rng_info() 240 pvt_data.session_id = sess_arg.session; in optee_rng_probe() 257 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in optee_rng_probe() 267 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in optee_rng_remove()
|
/kernel/linux/linux-6.6/drivers/char/hw_random/ |
H A D | optee-rng.c | 56 * @session_id: RNG TA session identifier. 64 u32 session_id; member 87 inv_arg.session = pvt_data->session_id; in get_optee_rng_data() 187 inv_arg.session = pvt_data.session_id; in get_optee_rng_info() 240 pvt_data.session_id = sess_arg.session; in optee_rng_probe() 257 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in optee_rng_probe() 266 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in optee_rng_remove()
|
/kernel/linux/linux-6.6/drivers/firmware/broadcom/ |
H A D | tee_bnxt_fw.c | 55 * @session_id: TA session identifier. 60 u32 session_id; member 74 arg->session = pvt_data.session_id; in prepare_args() 211 pvt_data.session_id = sess_arg.session; in tee_bnxt_fw_probe() 227 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in tee_bnxt_fw_probe() 237 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in tee_bnxt_fw_remove() 247 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in tee_bnxt_fw_shutdown()
|
/kernel/linux/linux-5.10/drivers/crypto/virtio/ |
H A D | virtio_crypto_algs.c | 184 ctx->enc_sess_info.session_id = le64_to_cpu(input->session_id); in virtio_crypto_alg_skcipher_init_session() 186 ctx->dec_sess_info.session_id = le64_to_cpu(input->session_id); in virtio_crypto_alg_skcipher_init_session() 223 destroy_session->session_id = cpu_to_le64(ctx->enc_sess_info.session_id); in virtio_crypto_alg_skcipher_close_session() 225 destroy_session->session_id = cpu_to_le64(ctx->dec_sess_info.session_id); in virtio_crypto_alg_skcipher_close_session() 239 pr_err("virtio_crypto: Close session failed status: %u, session_id: 0x%llx\n", in virtio_crypto_alg_skcipher_close_session() 240 ctrl_status->status, destroy_session->session_id); in virtio_crypto_alg_skcipher_close_session() [all...] |
H A D | virtio_crypto_akcipher_algs.c | 31 __u64 session_id; member 152 ctx->session_id = le64_to_cpu(input->session_id); in virtio_crypto_alg_akcipher_init_session() 188 destroy_session->session_id = cpu_to_le64(ctx->session_id); in virtio_crypto_alg_akcipher_close_session() 201 pr_err("virtio_crypto: Close session failed status: %u, session_id: 0x%llx\n", in virtio_crypto_alg_akcipher_close_session() 202 ctrl_status->status, destroy_session->session_id); in virtio_crypto_alg_akcipher_close_session() 305 header->session_id = cpu_to_le64(ctx->session_id); in virtio_crypto_rsa_do_req()
|
/kernel/linux/linux-6.6/drivers/crypto/virtio/ |
H A D | virtio_crypto_skcipher_algs.c | 181 ctx->enc_sess_info.session_id = le64_to_cpu(input->session_id); in virtio_crypto_alg_skcipher_init_session() 183 ctx->dec_sess_info.session_id = le64_to_cpu(input->session_id); in virtio_crypto_alg_skcipher_init_session() 220 destroy_session->session_id = cpu_to_le64(ctx->enc_sess_info.session_id); in virtio_crypto_alg_skcipher_close_session() 222 destroy_session->session_id = cpu_to_le64(ctx->dec_sess_info.session_id); in virtio_crypto_alg_skcipher_close_session() 236 pr_err("virtio_crypto: Close session failed status: %u, session_id: 0x%llx\n", in virtio_crypto_alg_skcipher_close_session() 237 ctrl_status->status, destroy_session->session_id); in virtio_crypto_alg_skcipher_close_session() [all...] |
H A D | virtio_crypto_akcipher_algs.c | 31 __u64 session_id; member 156 ctx->session_id = le64_to_cpu(input->session_id); in virtio_crypto_alg_akcipher_init_session() 192 destroy_session->session_id = cpu_to_le64(ctx->session_id); in virtio_crypto_alg_akcipher_close_session() 205 pr_err("virtio_crypto: Close session failed status: %u, session_id: 0x%llx\n", in virtio_crypto_alg_akcipher_close_session() 206 ctrl_status->status, destroy_session->session_id); in virtio_crypto_alg_akcipher_close_session() 309 header->session_id = cpu_to_le64(ctx->session_id); in virtio_crypto_rsa_do_req()
|
/kernel/linux/linux-6.6/security/keys/trusted-keys/ |
H A D | trusted_tee.c | 48 * @session_id: Trusted key TA session identifier. 54 u32 session_id; member 81 inv_arg.session = pvt_data.session_id; in trusted_tee_seal() 128 inv_arg.session = pvt_data.session_id; in trusted_tee_unseal() 174 inv_arg.session = pvt_data.session_id; in trusted_tee_get_random() 229 pvt_data.session_id = sess_arg.session; in trusted_key_probe() 240 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in trusted_key_probe() 250 tee_client_close_session(pvt_data.ctx, pvt_data.session_id); in trusted_key_remove()
|
/kernel/linux/linux-6.6/drivers/rtc/ |
H A D | rtc-optee.c | 43 * @session_id: RTC TA session identifier. 50 u32 session_id; member 64 inv_arg.session = priv->session_id; in optee_rtc_readtime() 113 inv_arg.session = priv->session_id; in optee_rtc_settime() 144 inv_arg.session = priv->session_id; in optee_rtc_readoffset() 169 inv_arg.session = priv->session_id; in optee_rtc_setoffset() 200 inv_arg.session = priv->session_id; in optee_rtc_read_info() 275 priv->session_id = sess_arg.session; in optee_rtc_probe() 312 tee_client_close_session(priv->ctx, priv->session_id); in optee_rtc_probe() 323 tee_client_close_session(priv->ctx, priv->session_id); in optee_rtc_remove() [all...] |
/kernel/linux/linux-5.10/drivers/gpu/drm/amd/amdgpu/ |
H A D | amdgpu_psp.h | 125 uint32_t session_id; member 130 uint32_t session_id; member 140 uint32_t session_id; member 149 uint32_t session_id; member 158 uint32_t session_id; member 167 uint32_t session_id; member
|
H A D | amdgpu_psp.c | 312 cmd->resp.session_id = psp->cmd_buf_mem->resp.session_id; in psp_cmd_submit_buf() 551 psp->asd_context.session_id = cmd->resp.session_id; in psp_asd_load() 560 uint32_t session_id) in psp_prep_ta_unload_cmd_buf() 563 cmd->cmd.cmd_unload_ta.session_id = session_id; in psp_prep_ta_unload_cmd_buf() 581 psp_prep_ta_unload_cmd_buf(cmd, psp->asd_context.session_id); in psp_asd_unload() 656 uint32_t session_id) in psp_prep_ta_invoke_cmd_buf() 659 cmd->cmd.cmd_invoke_cmd.session_id in psp_prep_ta_invoke_cmd_buf() 559 psp_prep_ta_unload_cmd_buf(struct psp_gfx_cmd_resp *cmd, uint32_t session_id) psp_prep_ta_unload_cmd_buf() argument 654 psp_prep_ta_invoke_cmd_buf(struct psp_gfx_cmd_resp *cmd, uint32_t ta_cmd_id, uint32_t session_id) psp_prep_ta_invoke_cmd_buf() argument 663 psp_ta_invoke(struct psp_context *psp, uint32_t ta_cmd_id, uint32_t session_id) psp_ta_invoke() argument [all...] |
H A D | psp_gfx_if.h | 126 uint32_t session_id; /* Session ID of the loaded TA to be unloaded */ member 159 uint32_t session_id; /* Session ID of the TA to be executed */ member 295 uint32_t session_id; /* +4 session ID in response to LoadTa command */ member
|
/kernel/linux/linux-5.10/include/net/ |
H A D | erspan.h | 104 __u8 session_id:8; member 113 __u8 session_id:8; 121 ershdr->session_id = id & 0xff; in set_session_id() 127 return (ershdr->session_id_upper << 8) + ershdr->session_id; in get_session_id()
|
/kernel/linux/linux-6.6/include/net/ |
H A D | erspan.h | 107 __u8 session_id:8; member 116 __u8 session_id:8; 124 ershdr->session_id = id & 0xff; in set_session_id() 130 return (ershdr->session_id_upper << 8) + ershdr->session_id; in get_session_id()
|
/kernel/linux/linux-5.10/drivers/media/platform/qcom/venus/ |
H A D | hfi_cmds.c | 160 pkt->shdr.session_id = hash32_ptr(cookie); in pkt_session_init() 171 pkt->shdr.session_id = hash32_ptr(cookie); in pkt_session_cmd() 183 pkt->shdr.session_id = hash32_ptr(cookie); in pkt_session_set_buffers() 222 pkt->shdr.session_id = hash32_ptr(cookie); in pkt_session_unset_buffers() 262 pkt->shdr.session_id = hash32_ptr(cookie); in pkt_session_etb_decoder() 286 pkt->shdr.session_id = hash32_ptr(cookie); in pkt_session_etb_encoder() 311 pkt->shdr.session_id = hash32_ptr(cookie); in pkt_session_ftb() 338 pkt->shdr.session_id = hash32_ptr(cookie); in pkt_session_parse_seq_header() 353 pkt->shdr.session_id = hash32_ptr(cookie); in pkt_session_get_seq_hdr() 374 pkt->shdr.session_id in pkt_session_flush() [all...] |
H A D | hfi_msgs.c | 143 pkt->shdr.session_id, pkt->event_data1, in event_sys_error() 156 pkt->event_data1, pkt->shdr.session_id); in event_session_error() 172 pkt->shdr.session_id); in event_session_error() 703 static struct venus_inst *to_instance(struct venus_core *core, u32 session_id) in to_instance() argument 709 if (hash32_ptr(inst) == session_id) { in to_instance() 751 inst = to_instance(core, pkt->shdr.session_id); in hfi_process_msg_packet() 754 dev_warn(dev, "no valid instance(pkt session_id:%x, pkt:%x)\n", in hfi_process_msg_packet() 755 pkt->shdr.session_id, in hfi_process_msg_packet() 764 pkt->shdr.session_id); in hfi_process_msg_packet()
|