/openbmc/phosphor-net-ipmid/ |
H A D | integrity_algo.hpp | 12 namespace integrity namespace 16 * @enum Integrity Algorithms 18 * The Integrity Algorithm Number specifies the algorithm used to generate the 21 * Integrity Algorithm is none the AuthCode value is not calculated and the 37 * Interface is the base class for the Integrity Algorithms. 38 * Unless otherwise specified, the integrity algorithm is applied to the packet 60 * @brief Verify the integrity data of the packet 69 * using integrity algorithm on the packet data, false otherwise 77 * @brief Generate integrity data for the outgoing IPMI packet 88 * @brief Check if the Integrity algorithm is supported [all …]
|
H A D | integrity_algo.cpp | 12 namespace integrity namespace 30 throw std::runtime_error("Generating integrity data failed"); in generateHMAC() 34 // AuthCode field length is based on the integrity algorithm. So we are in generateHMAC() 50 // Verify if the generated integrity data for the packet and the received in verifyIntegrityData() 51 // integrity data matches. in verifyIntegrityData() 70 // Generated Kn for the integrity algorithm with the additional key keyed in generateKn() 75 throw std::runtime_error("Generating KeyN for integrity " in generateKn() 100 // AuthCode field length is based on the integrity algorithm. So we are in generateHMAC() 116 // Verify if the generated integrity data for the packet and the received in verifyIntegrityData() 117 // integrity data matches. in verifyIntegrityData() [all …]
|
H A D | auth_algo.hpp | 52 explicit Interface(integrity::Algorithms intAlgo, in Interface() 69 * Integrity Key. 82 * @brief Generate the Integrity Check Value 85 * Integrity Check Value. 91 * @note The session integrity key which is the secret key for the 127 // Session Integrity Key 131 * Integrity Algorithm is activated and set in the session data only 133 * integrity algorithm is negotiated in the Open Session Request command 134 * . So the integrity algorithm successfully negotiated is stored 137 integrity::Algorithms intAlgo; [all …]
|
H A D | session.hpp | 155 * @brief Get Session's Integrity Algorithm 157 * @return pointer to the integrity algorithm 167 throw std::runtime_error("Integrity Algorithm Empty"); in getIntegrityAlgo() 172 * @brief Set Session's Integrity Algorithm 174 * @param[in] integrityAlgo - unique pointer to integrity algorithm 178 std::unique_ptr<cipher::integrity::Interface>&& integrityAlgo) in setIntegrityAlgo() 183 /** @brief Check if integrity algorithm is enabled for this session. 185 * @return true if integrity algorithm is enabled else false. 301 // Integrity Algorithm Interface for the Session 302 std::unique_ptr<cipher::integrity::Interface> integrityAlgoInterface =
|
H A D | comm_module.hpp | 20 INVALID_INTEGRITY_ALGO, //!< Invalid integrity algorithm 22 NO_MATCH_INTEGRITY_PAYLOAD, //!< No matching integrity payload 30 INVALID_INTEGRITY_VALUE, //!< Invalid integrity check value
|
/openbmc/phosphor-webui/ |
H A D | package-lock.json | 10 …"integrity": "sha512-a9gxpmdXtZEInkCSHUJDLHZVBgb1QS0jhss4cPP93EW7s+uC5bikET2twEF3KV+7rDblJcmNvTR7V… string 19 …"integrity": "sha512-zeFQrr+284Ekvd9e7KAX954LkapWiOmQtsfHirhxqfdlX6MEC32iRE+pqUGlYIBchdevaCwvzxWGS… string 30 …"integrity": "sha512-kWc7L0fw1xwvI0zi8OKVBuxRVefwGOrKSQMvrQ3dW+bIIavBY3/NpXmpjMy7bQnLgwgzWQZ8TlM57… string 54 …"integrity": "sha512-4FJkXzKXEDB1snCFZlLP4gpC3JILicCpGbzG9f9G7tGqGCzETQ2hWPrcinA9oU4wtf2biUaEH5065… string 63 …"integrity": "sha512-KXPvOm8K9IJKFM0bmdn8QXh7udDh1g/giieX0NLCaMnb4hEiVFqnop2ImTXCc5e0/oHz3LTqmHGtE… string 72 …"integrity": "sha512-FM9nNUYrRBAELZQT3xeZQ7fmMOBg6nWNmJKTcgsJeaLstP/UODVpGsr5OhXhhXg6f+qtJ8uiZ+PUx… string 80 …"integrity": "sha512-GbNIxVB3ZJe3tLeDm1HSn2AhuD/mVcyLDpgtLXa5tplmWrJdF/elxB56XNqCuD6szyNkDi6wuoKXl… string 92 …"integrity": "sha512-6o+mJrZBxOoEX77Ezv9zwW7WV8DdluouRKNY/IR5u/YTMuKHgugHOzYWlYvYLpLA9nPsQCAAASpCI… string 101 …"integrity": "sha512-5eFOm2SyFPK4Rh3XMMRDjN7lBH0orh3ss0g3rTYZnBQ+r6YPj7lgDyCvPphynHvUrobJmeMignBr6… string 111 …"integrity": "sha512-4mWm8DCK2LugIS+p1yArqvG1Pf162upsIsjE7cNBjez+NjliQpVhj20obE520nao0o14DaTnFJv+F… string [all …]
|
/openbmc/phosphor-net-ipmid/test/ |
H A D | cipher.cpp | 18 * Step-1 Generate Integrity Data for the packet, using the implemented API in TEST() 23 // Hardcoded Session Integrity Key in TEST() 27 auto algoPtr = std::make_unique<cipher::integrity::AlgoSHA1>(sik); in TEST() 31 // Generate the Integrity Data in TEST() 35 cipher::integrity::AlgoSHA1::SHA1_96_AUTHCODE_LENGTH)); in TEST() 38 * Step-2 Generate Integrity data using OpenSSL SHA1 algorithm in TEST() 45 // Generated K1 for the integrity algorithm with the additional key keyed in TEST() 62 FAIL() << "Generating integrity data failed"; in TEST() 65 output.resize(cipher::integrity::AlgoSHA1::SHA1_96_AUTHCODE_LENGTH); in TEST() 68 * Step-3 Check if the integrity data we generated using the implemented API in TEST() [all …]
|
/openbmc/webui-vue/ |
H A D | package-lock.json | 73 …"integrity": "sha512-7s0VcTwiK/0tNOVdSX9FWMeFdOEcsAOz9HesBldXxFMaGvIak7KC2z9tV9EgsQXn6KUsWsfIkViMN… string 88 …"integrity": "sha512-30iZtAPgz+LTIYoeivqYo853f02jBYSd5uGnGpkFV0M3xOt9aN73erkgYAmZU43x4VfqcnLxW9Kpg… string 101 …"integrity": "sha512-cjQ7ZlQ0Mv3b47hABuTevyTuYN4i+loJKGeV9flcCgIK37cCXRh+L1bd3iBHlynerhQ7BhCkn2BPb… string 115 …"integrity": "sha512-60X7qkglvrap8mn1lh2ebxXdZYtUcpd7gsmy9kLaBJ4i/WdY8PqTSdxyA8qraikqKQK5C1KRBKXqz… string 124 …"integrity": "sha512-yDBHV9kQNcr2/sUr9jghVyz9C3Y5G2zUM2H2lo+9mKv4sFgbA8s8Z9t8D1jiTkGoO/NoIfKMyKWr4… string 154 …"integrity": "sha512-3lSpxGgvnmZznmBkCRnVREPUFJv2wrv9iAoFDvADJc0ypmdOxdUtcLeBgBJ6zE0PMeTKnxeQzyk0x… string 170 …"integrity": "sha512-fXSwMQqitTGeHLBC08Eq5yXz2m37E4pJX1qAU1+2cNedz/ifv/bVXft90VeSav5nFO61EcNgwr0aJ… string 183 …"integrity": "sha512-2+1thGUUWWjLTYTHZWK1n8Yga0ijBz1XAhUXcKy81rd5g6yh7hGqMp45v7cadSbEHc9G3OTv45Syn… string 199 …"integrity": "sha512-V9f6ZFIYSLNEbuGA/92uOvYsGCJNsuA8ESZ4ldc09bWk/j8H8TKiPw8Mk1eG6olpnO0ALHJmYfZvF… string 221 …"integrity": "sha512-uVDC72XVf8UbrH5qQTc18Agb8emwjTiZrQE11Nv3CuBEZmVvTwwE9CBUEvHku06gQCAyYf8Nv6ja1… string [all …]
|
/openbmc/openbmc/meta-security/meta-integrity/classes/ |
H A D | sanity-meta-integrity.bbclass | 5 if 'integrity' not in e.data.getVar('DISTRO_FEATURES').split() and not skip_check: 6 bb.warn("You have included the meta-integrity layer, but \ 7 'integrity' has not been enabled in your DISTRO_FEATURES. Some bbappend files \ 8 and preferred version setting may not take effect. See the meta-integrity README \ 9 for details on enabling integrity support.")
|
/openbmc/openbmc/meta-security/meta-integrity/conf/ |
H A D | layer.conf | 8 BBFILE_COLLECTIONS += "integrity" 27 BBLAYERS_LAYERINDEX_NAME_integrity = "meta-integrity" 29 # Sanity check for meta-integrity layer. 31 INHERIT += "sanity-meta-integrity" 39 WARN_QA:append:integrity = " patch-status missing-metadata"
|
/openbmc/openbmc/meta-security/recipes-ids/tripwire/files/ |
H A D | tripwire.txt | 5 3. Run the first integrity check. (/usr/sbin/tripwire--check) 12 … policy file greatly increases Tripwire software's ability to ensure the integrity of your system. 27 … the rules in the policy file. This database serves as the baseline for integrity checks. The synt… 30 Running an Integrity Check 31 …Integrity Check mode compares the current file system objects with their properties recorded in th… 39 Updating the Database after an Integrity Check 40 Database Update mode enables you to update the Tripwire database after an integrity check if you de… 56 …ine against the current system to determine what changes have occurred. This is an integrity check. 58 …n integrity check, Tripwire software produces report files. Report files summarize any changes tha…
|
/openbmc/openbmc/meta-security/meta-integrity/ |
H A D | README.md | 2 integrity layer. 6 to have 'integrity' in DISTRO_FEATURES to have effect. 9 DISTRO_FEATURES:append = " integrity" 11 If meta-integrity is included, but integrity is not enabled as a 15 'integrity' has not been enabled in your DISTRO_FEATURES. Some bbappend files 45 make sure to copy the maintainer and add a "[meta-integrity]" 54 1. Adding the integrity layer to your build 59 1. Adding the integrity layer to your build 67 location of the integrity layer to bblayers.conf, along with any 74 /path/to/yocto/meta-security/meta-integrity \ [all …]
|
/openbmc/ipmitool/src/plugins/lanplus/ |
H A D | README.lanplus | 13 algorithms, whereas the integrity algorithms are not all HMAC. See section 28 integrity checking. One the one hand, section 13.28.4 states explicitly 29 that HMAC integrity algorithms use the session integrity key as the HMAC 32 "all keying material for the RSP integrity and confidentiality algorithms 35 integrity and confidentiality algorithms defined in this specification, 38 of authentication codes (integrity checking). Furthermore, we are using
|
H A D | lanplus_strings.c | 11 { IPMI_RAKP_STATUS_INVALID_INTEGRITTY_ALGORITHM, "invalid integrity algorithm" }, 13 { IPMI_RAKP_STATUS_NO_MATCHING_INTEGRITY_PAYLOAD, "no matching integrity payload" }, 21 { IPMI_RAKP_STATUS_INVALID_INTEGRITY_CHECK_VALUE, "invalid integrity check value" },
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/ |
H A D | ComponentIntegrity.interface.yaml | 2 Implement to represent component integrity information acquired from a 38 change that leads to component integrity change should update this 46 whose integrity this resource authenticates. 54 component whose integrity this resource reports.
|
/openbmc/phosphor-host-ipmid/app/ |
H A D | channel.hpp | 5 /** @brief this command is used to look up what authentication, integrity, 38 static constexpr auto integrity = "integrity"; variable
|
/openbmc/phosphor-net-ipmid/command/ |
H A D | rakp34.cpp | 25 case cipher::integrity::Algorithms::HMAC_SHA1_96: in applyIntegrityAlgo() 28 std::make_unique<cipher::integrity::AlgoSHA1>( in applyIntegrityAlgo() 32 case cipher::integrity::Algorithms::HMAC_SHA256_128: in applyIntegrityAlgo() 35 std::make_unique<cipher::integrity::AlgoSHA256>( in applyIntegrityAlgo() 177 * Session Integrity Key in RAKP34() 213 // Generate Session Integrity Key in RAKP34() 221 * Integrity Check Value in RAKP34() 250 // Integrity Check Value in RAKP34() 263 // Set the Integrity Algorithm in RAKP34()
|
H A D | open_session.cpp | 41 // Check for valid Integrity Algorithms in openSession() 42 if (!cipher::integrity::Interface::isAlgorithmSupported( in openSession() 43 static_cast<cipher::integrity::Algorithms>(request->intAlgo))) in openSession() 82 static_cast<cipher::integrity::Algorithms>(request->intAlgo), in openSession()
|
/openbmc/openbmc/meta-yadro/recipes-phosphor/ipmi/phosphor-ipmi-config/ |
H A D | cipher_list.json | 5 "integrity":1, number 11 "integrity":4, number
|
/openbmc/openbmc/meta-google/recipes-phosphor/ipmi/phosphor-ipmi-config/ |
H A D | cipher_list.json | 5 "integrity":1, number 11 "integrity":4, number
|
/openbmc/u-boot/arch/x86/include/asm/fsp/ |
H A D | fsp_ffs.h | 10 /* Used to verify the integrity of the file */ 49 /* Used to verify the integrity of the file */ 50 union ffs_integrity integrity; member 72 /* Used to verify the integrity of the file */ 73 union ffs_integrity integrity; member
|
/openbmc/openbmc/poky/bitbake/lib/bb/fetch2/ |
H A D | npm.py | 67 def npm_integrity(integrity): argument 69 Get the checksum name and expected value from the subresource integrity 72 algo, value = integrity.split("-", maxsplit=1) 242 integrity = view.get("dist", {}).get("integrity") 245 if integrity is not None: 246 checksum_name, checksum_expected = npm_integrity(integrity) 251 raise FetchError("Invalid 'dist.integrity' in view", ud.url)
|
H A D | npmsw.py | 86 integrity = params.get("integrity") 97 elif version and is_semver(version) and integrity: 107 checksum_name, checksum_expected = npm_integrity(integrity) 125 elif resolved.startswith("http") and integrity: 131 checksum_name, checksum_expected = npm_integrity(integrity)
|
/openbmc/docs/designs/ |
H A D | redfish-spdm-attestation.md | 15 to authenticate device identity, hardware configuration and firmware integrity. 36 identity and integrity of devices. 66 `Attestation.ComponentIntegrity` provides basic component integrity information, 67 including the protocol to measure the integrity, last updated time, attestation 69 including a link to the trusted component that the component integrity object is 70 reporting, and a link to the systems that the component integrity object is 82 [component-integrity](https://gerrit.openbmc.org/c/openbmc/phosphor-dbus-interfaces/+/64354). 90 a device. It can securely measure the integrity information of a device. 99 integrity object reported by this `TrustedComponent`. 213 trusted component object and component integrity object.
|
/openbmc/u-boot/lib/libavb/ |
H A D | avb_chain_partition_descriptor.h | 19 /* A descriptor containing a pointer to signed integrity data stored 22 * integrity data, and rollback index location to use for rollback
|