/linux-4.1.27/net/l2tp/ |
H A D | l2tp_ppp.c | 25 * attaches it to a bound UDP socket with local tunnel_id / session_id and 26 * peer tunnel_id / session_id set. Data can then be sent or received using 30 * When a PPPoL2TP socket is connected with local and peer session_id values 49 * sax.pppol2tp.s_session = session_id; 601 u32 session_id, peer_session_id; pppol2tp_connect() local 632 session_id = sp->pppol2tp.s_session; pppol2tp_connect() 641 session_id = sp3->pppol2tp.s_session; pppol2tp_connect() 649 session_id = sp6->pppol2tp.s_session; pppol2tp_connect() 658 session_id = sp6->pppol2tp.s_session; pppol2tp_connect() 672 /* Special case: create tunnel context if session_id and pppol2tp_connect() 676 if ((session_id == 0) && (peer_session_id == 0)) { pppol2tp_connect() 709 session = l2tp_session_find(sock_net(sk), tunnel, session_id); pppol2tp_connect() 718 tunnel, session_id, pppol2tp_connect() 764 /* Special case: if source & dest session_id == 0x0000, this pppol2tp_connect() 769 if ((session->session_id == 0) && pppol2tp_connect() 806 static int pppol2tp_session_create(struct net *net, u32 tunnel_id, u32 session_id, u32 peer_session_id, struct l2tp_session_cfg *cfg) pppol2tp_session_create() argument 826 session = l2tp_session_find(net, tunnel, session_id); pppol2tp_session_create() 839 tunnel, session_id, pppol2tp_session_create() 900 sp.pppol2tp.s_session = session->session_id; pppol2tp_getname() 919 sp.pppol2tp.s_session = session->session_id; pppol2tp_getname() 938 sp.pppol2tp.s_session = session->session_id; pppol2tp_getname() 956 sp.pppol2tp.s_session = session->session_id; pppol2tp_getname() 981 * control only. Tunnel PPPoX sockets have session_id == 0 and simply allow 1109 stats.session_id = session->session_id; pppol2tp_session_ioctl() 1132 * specifies a session_id, the session ioctl handler is called. This allows an 1160 if (stats.session_id != 0) { pppol2tp_tunnel_ioctl() 1163 l2tp_session_find(sock_net(sk), tunnel, stats.session_id); pppol2tp_tunnel_ioctl() 1223 /* Special case: if session's session_id is zero, treat ioctl as a pppol2tp_ioctl() 1227 if ((session->session_id == 0) && pppol2tp_ioctl() 1253 * Tunnel PPPoX sockets have session_id == 0 and simply allow the user 1385 /* Special case: if session_id == 0x0000, treat as operation on tunnel pppol2tp_setsockopt() 1388 if ((session->session_id == 0) && pppol2tp_setsockopt() 1513 /* Special case: if session_id == 0x0000, treat as operation on tunnel */ pppol2tp_getsockopt() 1515 if ((session->session_id == 0) && pppol2tp_getsockopt() 1660 session->session_id, pppol2tp_seq_session_show()
|
H A D | l2tp_core.c | 164 * The session_id SHOULD be random according to RFC3931, but several 166 * hash on the session_id, rather than a simple bitmask. 169 l2tp_session_id_hash_2(struct l2tp_net *pn, u32 session_id) l2tp_session_id_hash_2() argument 171 return &pn->l2tp_session_hlist[hash_32(session_id, L2TP_HASH_BITS_2)]; l2tp_session_id_hash_2() 222 static struct l2tp_session *l2tp_session_find_2(struct net *net, u32 session_id) l2tp_session_find_2() argument 226 l2tp_session_id_hash_2(pn, session_id); l2tp_session_find_2() 231 if (session->session_id == session_id) { hlist_for_each_entry_rcu() 242 * The session_id SHOULD be random according to RFC2661, but several 244 * session_ids. So we do a real hash on the session_id, rather than a 248 l2tp_session_id_hash(struct l2tp_tunnel *tunnel, u32 session_id) l2tp_session_id_hash() argument 250 return &tunnel->session_hlist[hash_32(session_id, L2TP_HASH_BITS)]; l2tp_session_id_hash() 255 struct l2tp_session *l2tp_session_find(struct net *net, struct l2tp_tunnel *tunnel, u32 session_id) l2tp_session_find() argument 265 return l2tp_session_find_2(net, session_id); l2tp_session_find() 267 session_list = l2tp_session_id_hash(tunnel, session_id); l2tp_session_find() 270 if (session->session_id == session_id) { hlist_for_each_entry() 659 session->session_id); l2tp_recv_common() 849 u32 tunnel_id, session_id; l2tp_udp_recv_core() local 913 session_id = ntohs(*(__be16 *) ptr); l2tp_udp_recv_core() 918 session_id = ntohl(*(__be32 *) ptr); l2tp_udp_recv_core() 923 session = l2tp_session_find(tunnel->l2tp_net, tunnel, session_id); l2tp_udp_recv_core() 928 tunnel->name, tunnel_id, session_id); l2tp_udp_recv_core() 986 u32 session_id = session->peer_session_id; l2tp_build_l2tpv2_header() local 994 *bufp++ = htons(session_id); l2tp_build_l2tpv2_header() 1664 if (session->session_id != 0) l2tp_session_free() 1739 struct l2tp_session *l2tp_session_create(int priv_size, struct l2tp_tunnel *tunnel, u32 session_id, u32 peer_session_id, struct l2tp_session_cfg *cfg) l2tp_session_create() argument 1748 session->session_id = session_id; l2tp_session_create() 1762 tunnel->tunnel_id, session->session_id); l2tp_session_create() 1809 l2tp_session_id_hash(tunnel, session_id)); l2tp_session_create() 1818 l2tp_session_id_hash_2(pn, session_id)); l2tp_session_create() 1823 if (session->session_id != 0) l2tp_session_create()
|
H A D | l2tp_core.h | 91 u32 session_id; member in struct:l2tp_session 209 int (*session_create)(struct net *net, u32 tunnel_id, u32 session_id, u32 peer_session_id, struct l2tp_session_cfg *cfg); 245 u32 session_id); 258 u32 session_id, u32 peer_session_id,
|
H A D | l2tp_ip.c | 119 u32 session_id; l2tp_ip_recv() local 132 session_id = ntohl(*((__be32 *) ptr)); l2tp_ip_recv() 136 * the session_id. If it is 0, the packet is a L2TP control l2tp_ip_recv() 137 * frame and the session_id value can be discarded. l2tp_ip_recv() 139 if (session_id == 0) { l2tp_ip_recv() 145 session = l2tp_session_find(net, NULL, session_id); l2tp_ip_recv() 440 /* Insert 0 session_id */ l2tp_ip_sendmsg()
|
H A D | l2tp_netlink.c | 61 u32 session_id; l2tp_nl_session_find() local 73 session_id = nla_get_u32(info->attrs[L2TP_ATTR_SESSION_ID]); l2tp_nl_session_find() 76 session = l2tp_session_find(net, tunnel, session_id); l2tp_nl_session_find() 482 u32 session_id; l2tp_nl_cmd_session_create() local 505 session_id = nla_get_u32(info->attrs[L2TP_ATTR_SESSION_ID]); l2tp_nl_cmd_session_create() 506 session = l2tp_session_find(net, tunnel, session_id); l2tp_nl_cmd_session_create() 619 session_id, peer_session_id, &cfg); l2tp_nl_cmd_session_create() 622 session = l2tp_session_find(net, tunnel, session_id); l2tp_nl_cmd_session_create() 715 nla_put_u32(skb, L2TP_ATTR_SESSION_ID, session->session_id) || l2tp_nl_session_send()
|
H A D | l2tp_eth.c | 209 static int l2tp_eth_create(struct net *net, u32 tunnel_id, u32 session_id, u32 peer_session_id, struct l2tp_session_cfg *cfg) l2tp_eth_create() argument 226 session = l2tp_session_find(net, tunnel, session_id); l2tp_eth_create() 243 session = l2tp_session_create(sizeof(*spriv), tunnel, session_id, l2tp_eth_create()
|
H A D | l2tp_ip6.c | 131 u32 session_id; l2tp_ip6_recv() local 144 session_id = ntohl(*((__be32 *) ptr)); l2tp_ip6_recv() 148 * the session_id. If it is 0, the packet is a L2TP control l2tp_ip6_recv() 149 * frame and the session_id value can be discarded. l2tp_ip6_recv() 151 if (session_id == 0) { l2tp_ip6_recv() 157 session = l2tp_session_find(&init_net, NULL, session_id); l2tp_ip6_recv()
|
H A D | l2tp_debugfs.c | 116 if (session->session_id == 0) l2tp_dfs_seq_tunnel_show() 167 seq_printf(m, " SESSION %u, peer %u, %s\n", session->session_id, l2tp_dfs_seq_session_show()
|
/linux-4.1.27/drivers/staging/ozwpan/ |
H A D | ozproto.c | 110 body->session_id = pd->session_id; oz_send_conn_rsp() 239 if ((new_apps & 0x1) && (body->session_id)) { oz_connect_req() 240 if (pd->session_id) { oz_connect_req() 241 if (pd->session_id != body->session_id) { oz_connect_req() 247 pd->session_id = oz_connect_req() 248 oz_get_new_session_id(body->session_id); oz_connect_req() 251 if (pd->session_id && !body->session_id) { oz_connect_req() 256 pd->session_id = oz_connect_req() 257 oz_get_new_session_id(body->session_id); oz_connect_req()
|
H A D | ozpd.h | 71 u8 session_id; member in struct:oz_pd
|
H A D | ozprotocol.h | 78 u8 session_id; member in struct:oz_elt_connect_req 113 u8 session_id; member in struct:oz_elt_connect_rsp
|
H A D | ozpd.c | 299 if (pd->keep_alive && pd->session_id) oz_pd_sleep()
|
/linux-4.1.27/include/uapi/linux/ |
H A D | ppp-ioctl.h | 69 __u16 session_id; /* if zero, get tunnel stats */ member in struct:pppol2tp_ioc_stats 70 __u32 using_ipsec:1; /* valid only for session_id == 0 */
|
/linux-4.1.27/drivers/net/fddi/skfp/h/ |
H A D | sba.h | 67 u_short session_id ; member in struct:s_sba_sessions
|
/linux-4.1.27/net/nfc/nci/ |
H A D | hci.c | 688 skb->len == strlen(ndev->hci_dev->init_data.session_id) && nci_hci_dev_session_init() 689 memcmp(ndev->hci_dev->init_data.session_id, nci_hci_dev_session_init() 705 ndev->hci_dev->init_data.session_id, nci_hci_dev_session_init() 706 strlen(ndev->hci_dev->init_data.session_id)); nci_hci_dev_session_init()
|
/linux-4.1.27/drivers/net/ |
H A D | sb1000.c | 746 unsigned char st[2], buffer[FRAMESIZE], session_id, frame_id; sb1000_rx() local 774 session_id = lp->rx_session_id[ns]; sb1000_rx() 776 if (st[0] == session_id) { sb1000_rx() 784 } else if (st[0] == (session_id | 0x40)) { sb1000_rx() 800 skb ? session_id : session_id | 0x40, frame_id); sb1000_rx() 1061 /* set session_id, frame_id and pkt_type too */ sb1000_dev_ioctl()
|
/linux-4.1.27/drivers/crypto/ux500/cryp/ |
H A D | cryp_core.c | 43 static atomic_t session_id; variable 87 u32 session_id; member in struct:cryp_ctx 184 if (unlikely(atomic_inc_and_test(&session_id))) add_session_id() 185 atomic_inc(&session_id); add_session_id() 187 ctx->session_id = atomic_read(&session_id); add_session_id() 406 ctx->session_id != atomic_read(&session_id)) { cryp_setup_context() 1534 atomic_set(&session_id, 1); ux500_cryp_probe()
|
/linux-4.1.27/net/nfc/hci/ |
H A D | core.c | 472 if (skb->len && skb->len == strlen(hdev->init_data.session_id) && hci_dev_session_init() 473 (memcmp(hdev->init_data.session_id, skb->data, hci_dev_session_init() 494 hdev->init_data.session_id, hci_dev_session_init() 495 strlen(hdev->init_data.session_id)); hci_dev_session_init()
|
/linux-4.1.27/drivers/nfc/st21nfcb/ |
H A D | st21nfcb_se.c | 547 scnprintf(ndev->hci_dev->init_data.session_id, st21nfcb_hci_network_init() 548 sizeof(ndev->hci_dev->init_data.session_id), st21nfcb_hci_network_init()
|
/linux-4.1.27/include/net/nfc/ |
H A D | hci.h | 94 char session_id[9]; member in struct:nfc_hci_init_data
|
H A D | nci_core.h | 161 char session_id[9]; member in struct:nci_hci_init_data
|
/linux-4.1.27/drivers/nfc/st21nfca/ |
H A D | st21nfca.c | 1002 scnprintf(init_data.session_id, sizeof(init_data.session_id), "%s%2x", st21nfca_hci_probe()
|
/linux-4.1.27/drivers/net/wireless/ti/wlcore/ |
H A D | tx.c | 316 u8 session_id = wl->session_ids[hlid]; wl1271_tx_fill_hdr() local 320 session_id = 0; wl1271_tx_fill_hdr() 323 tx_attr = session_id << TX_HW_ATTR_OFST_SESSION_COUNTER; wl1271_tx_fill_hdr()
|
H A D | cmd.h | 605 u8 session_id; member in struct:wl12xx_cmd_add_peer
|
H A D | cmd.c | 1547 cmd->session_id = wl->session_ids[hlid]; wl12xx_cmd_add_peer()
|
/linux-4.1.27/drivers/nfc/microread/ |
H A D | microread.c | 678 strcpy(init_data.session_id, "MICROREA"); microread_probe()
|
/linux-4.1.27/drivers/nfc/pn544/ |
H A D | pn544.c | 944 strcpy(init_data.session_id, "ID544HCI"); pn544_hci_probe()
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/mvm/ |
H A D | fw-api.h | 801 * @session_id: session's unique id 809 __le32 session_id; member in struct:iwl_time_event_notif
|
/linux-4.1.27/drivers/net/wireless/ath/wcn36xx/ |
H A D | smd.c | 1884 msg_body.session_id = 0; wcn36xx_smd_add_ba() 1941 msg_body.session_id = 0; wcn36xx_smd_trigger_ba()
|
H A D | hal.h | 2616 u8 session_id; member in struct:wcn36xx_hal_add_ba_req_msg 2656 u8 session_id; member in struct:wcn36xx_hal_trigger_ba_req_msg
|
/linux-4.1.27/kernel/ |
H A D | auditsc.c | 1958 static atomic_t session_id = ATOMIC_INIT(0); variable 2025 sessionid = (unsigned int)atomic_inc_return(&session_id); audit_set_loginuid()
|