/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_payload.robot | 2 Documentation This suite tests IPMI Payload in OpenBMC. 10 Suite Setup IPMI Payload Setup Execution 34 Test Get Payload Activation Status 35 [Documentation] Test get payload activation status. 38 # SOL is the payload currently supported for payload status. 43 ${payload_status}= Get Payload Activation Status 47 Test Activate Payload 48 [Documentation] Test activate payload via IPMI raw command. 51 ${payload_status}= Get Payload Activation Status 52 IF '${payload_status}' == '01' Deactivate Payload [all …]
|
/openbmc/phosphor-net-ipmid/command/ |
H A D | payload_cmds.hpp | 21 * IPMI payload for Activate Payload command request. 26 uint8_t payloadType:6; //!< Payload type. 31 uint8_t reserved1:2; //!< Payload type. 32 uint8_t payloadType:6; //!< Payload type. 36 uint8_t payloadInstance:4; //!< Payload instance. 42 uint8_t payloadInstance:4; //!< Payload instance. 45 /** @brief The following Auxiliary Request Data applies only for payload 54 uint8_t auth:1; //!< If true, activate payload with authentication. 55 uint8_t encryption:1; //!< If true, activate payload with encryption. 59 uint8_t encryption:1; //!< If true, activate payload with encryption. [all …]
|
/openbmc/slpd-lite/test/ |
H A D | test-suite.py | 14 print("Invalid Lang Tag Length, large payload") 15 payload = ( variable 26 ret = sock.sendto(payload, addr) 30 print("Large Lang Tag Length, large payload") 31 payload = ( variable 42 ret = sock.sendto(payload, addr) 46 print("Invalid Lang Tag Length, small payload") 47 payload = ( variable 58 ret = sock.sendto(payload, addr) 62 print("Large Lang Tag Length, small payload") [all …]
|
/openbmc/qemu/docs/interop/ |
H A D | vhost-user-gpu.rst | 39 fields and a payload. 42 | request | flags | size | payload | 54 :size: ``u32``, size of the payload 56 Payload types 59 Depending on the request type, **payload** can be: 160 uint32_t size; /* the following payload size */ 171 } payload; 194 :request payload: N/A 195 :reply payload: ``u64`` 201 :request payload: ``u64`` [all …]
|
H A D | vhost-user.rst | 66 A vhost-user message consists of 3 header fields and a payload. 69 | request | flags | size | payload | 84 :size: 32-bit size of the payload 86 Payload section in Message Specification 89 Depending on the request type, **payload** can be: 273 | offset | size | flags | payload | 284 :payload: Size bytes array holding the contents of the virtio 691 vhost_iotlb_msg`` as payload. For update events, the ``iotlb`` payload 696 ``iotlb`` payload has to be filled with the invalidation message type 698 expected to reply with a zero payload, non-zero otherwise. [all …]
|
/openbmc/ipmitool/src/plugins/lanplus/ |
H A D | lanplus.c | 96 struct ipmi_v2_payload * payload); 99 struct ipmi_v2_payload * payload, /* in */ 107 struct ipmi_v2_payload * payload); 119 struct ipmi_v2_payload * payload); 644 * The authtype / payload type determines what we are receiving in ipmi_lan_poll_single() 654 * 2) An RMCP+ message with an IPMI reponse payload in ipmi_lan_poll_single() 699 lprintf(LOG_DEBUG+1, "<< Payload type : %s", in ipmi_lan_poll_single() 705 lprintf(LOG_DEBUG+1, "<< IPMI Msg/Payload Length : %d", in ipmi_lan_poll_single() 709 rsp->payload.ipmi_response.rq_addr); in ipmi_lan_poll_single() 711 rsp->payload.ipmi_response.netfn); in ipmi_lan_poll_single() [all …]
|
H A D | lanplus_dump.c | 53 rsp->payload.open_session_response.message_tag); in lanplus_dump_open_session_response() 56 val2str(rsp->payload.open_session_response.rakp_return_code, in lanplus_dump_open_session_response() 60 val2str(rsp->payload.open_session_response.max_priv_level, in lanplus_dump_open_session_response() 64 (long)rsp->payload.open_session_response.console_id); in lanplus_dump_open_session_response() 67 if (rsp->payload.open_session_response.rakp_return_code != in lanplus_dump_open_session_response() 73 (long)rsp->payload.open_session_response.bmc_id); in lanplus_dump_open_session_response() 76 val2str(rsp->payload.open_session_response.auth_alg, in lanplus_dump_open_session_response() 80 val2str(rsp->payload.open_session_response.integrity_alg, in lanplus_dump_open_session_response() 84 val2str(rsp->payload.open_session_response.crypt_alg, in lanplus_dump_open_session_response() 102 rsp->payload.rakp2_message.message_tag); in lanplus_dump_rakp2_message() [all …]
|
/openbmc/phosphor-net-ipmid/ |
H A D | crypt_algo.hpp | 18 * algorithm field that is used for encrypted payload data under the session. 19 * The ‘encrypted’ bit in the payload type field being set identifies packets 21 * When payload data is encrypted, there may be additional “Confidentiality 23 * payload. The size and definition of those fields is specific to the 56 * @brief Decrypt the incoming payload 60 * @param[in] payloadLen - Length of the encrypted IPMI payload 62 * @return decrypted payload if the operation is successful 69 * @brief Encrypt the outgoing payload 71 * @param[in] payload - plain payload for the outgoing IPMI packet 73 * @return encrypted payload if the operation is successful [all …]
|
H A D | message.hpp | 116 * Encapsulation Under RMCP). IPMI payload is a special class of data 165 * @brief Extract the command from the IPMI payload 177 reinterpret_cast<LAN::header::Request*>(payload.data()); in getCommand() 187 * The IPMI outgoing message is constructed out of payload and the 188 * corresponding fields are populated. For the payload type IPMI, the 191 * @param[in] output - Payload for outgoing message 208 outMessage->payload.resize( in createResponse() 213 reinterpret_cast<LAN::header::Request*>(payload.data()); in createResponse() 215 outMessage->payload.data()); in createResponse() 229 outMessage->payload.begin() + assembledSize); in createResponse() [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/ltp/ltp/ |
H A D | 0001-kernel-kvm-don-t-hardcode-objcopy.patch | 6 testcases/kernel/kvm uses objcopy to contruct a payload binary, but in 11 objcopy: Unable to recognise the format of the input file `kvm_svm03-payload.elf' 12 make[3]: *** [ltp/testcases/kernel/kvm/Makefile:67: kvm_svm03-payload.o] Error 1 54 %-payload.o: %.c lib_guest.o $(ARCH_OBJ) 56 $(CC) $(GUEST_CPPFLAGS) $(GUEST_CFLAGS) $(GUEST_LDFLAGS) -o $*-payload.elf $^ $(GUEST_LDLIBS) 57 ….text -j .data -j .init -j .preinit_array -j .init_array --gap-fill=0 $*-payload.elf $*-payload.bin 58 ….text -j .data -j .init -j .preinit_array -j .init_array --gap-fill=0 $*-payload.elf $*-payload.bin 59 …KVM_LD) -z noexecstack -r -T $(abs_srcdir)/linker/payload.lds --oformat=$(BIN_FORMAT) -o $@ $*-pay… 61 @$(CC) $(GUEST_CPPFLAGS) $(GUEST_CFLAGS) $(GUEST_LDFLAGS) -o $*-payload.elf $^ $(GUEST_LDLIBS) 62 ….text -j .data -j .init -j .preinit_array -j .init_array --gap-fill=0 $*-payload.elf $*-payload.bin [all …]
|
/openbmc/phosphor-host-ipmid/test/message/ |
H A D | payload.cpp | 27 TEST(Payload, InputSize) in TEST() argument 31 ipmi::message::Payload p(std::forward<ipmi::SecureBuffer>(i)); in TEST() 35 TEST(Payload, OutputSize) in TEST() argument 37 ipmi::message::Payload p; in TEST() 47 TEST(Payload, Resize) in TEST() argument 50 ipmi::message::Payload p; in TEST() 56 TEST(Payload, Data) in TEST() argument 59 ipmi::message::Payload p; in TEST() 67 ipmi::message::Payload p; in TEST() 75 ipmi::message::Payload p; in TEST() [all …]
|
H A D | unpack.cpp | 24 ipmi::message::Payload p(std::forward<ipmi::SecureBuffer>(i)); in TEST() 28 // check that the payload was fully unpacked in TEST() 38 ipmi::message::Payload p(std::forward<ipmi::SecureBuffer>(i)); in TEST() 42 // check that the payload was not fully unpacked in TEST() 52 ipmi::message::Payload p(std::forward<ipmi::SecureBuffer>(i)); in TEST() 56 // check that the payload was not fully unpacked (comprehends unpack errors) in TEST() 65 ipmi::message::Payload p(std::forward<ipmi::SecureBuffer>(i)); in TEST() 69 // check that the payload was fully unpacked in TEST() 79 ipmi::message::Payload p(std::forward<ipmi::SecureBuffer>(i)); in TEST() 83 // check that the payload was not fully unpacked in TEST() [all …]
|
/openbmc/phosphor-net-ipmid/sol/ |
H A D | sol_context.hpp | 16 * Operation/Status in an outbound SOL payload format(BMC to Remote Console). 43 * Operation/Status in an Inbound SOL Payload format(Remote Console to BMC). 70 /** @struct Payload 72 * SOL Payload Data Format.The following fields make up the SOL payload in an 75 struct Payload struct 95 * packets under the IPMI session. At the payload level, SOL packets include 127 * @return outbound sequence number to populate the SOL payload. 151 * interfaces to handle incoming SOL payload, send response and send outbound 152 * SOL payload. 166 * This is called by the SOL Manager when a SOL payload instance is [all …]
|
H A D | sol_manager.hpp | 35 * Manager class acts a manager for the SOL payload instances and provides 36 * interfaces to start a payload instance, stop a payload instance and get 46 /** @brief SOL Payload Instance is the key for the map, the value is the 96 * This controls whether the SOL payload can be activated. By default 101 /** @brief SOL payload encryption. 105 * all SOL payload data. Encryption controlled by remote console: 107 * console at the time the payload is activated. The default is force 112 /** @brief SOL payload authentication. 116 * authentication for all SOL payload data. Authentication controlled 127 * able to activate SOL using the Activate Payload command. [all …]
|
/openbmc/google-misc/subprojects/libcr51sign/src/ |
H A D | libcr51sign_mauv.c | 33 // Verify BLOB magic bytes in payload's image descriptor at the expected offset 39 // @param[in] payload_blob_offset Absolute offset of payload BLOB data in 40 // payload's image descriptor 61 CPRINTS(ctx, "%s: Could not read BLOB magic bytes from payload\n", in verify_payload_blob_magic() 68 CPRINTS(ctx, "%s: BLOB magic bytes read from payload(%x) are invalid\n", in verify_payload_blob_magic() 76 // Find offset of Image MAUV data in payload BLOB inside the image descriptor 83 // payload BLOB magic bytes in image 85 // @param[in] payload_blob_size Size of payload BLOB as per its image 88 // data in payload's image 91 // payload's image descriptor [all …]
|
/openbmc/pldm/libpldmresponder/test/ |
H A D | libpldmresponder_base_test.cpp | 29 // payload length will be 0 in this case in TEST_F() 35 uint8_t* payload_ptr = responsePtr->payload; in TEST_F() 51 uint8_t* payload_ptr = responsePtr->payload; in TEST_F() 63 request->payload[0] = 0xFF; in TEST_F() 68 uint8_t* payload_ptr = responsePtr->payload; in TEST_F() 94 ASSERT_EQ(responsePtr->payload[0], 0); in TEST_F() 95 ASSERT_EQ(0, memcmp(responsePtr->payload + sizeof(responsePtr->payload[0]), in TEST_F() 97 ASSERT_EQ(0, memcmp(responsePtr->payload + sizeof(responsePtr->payload[0]) + in TEST_F() 100 ASSERT_EQ(0, memcmp(responsePtr->payload + sizeof(responsePtr->payload[0]) + in TEST_F() 125 ASSERT_EQ(responsePtr->payload[0], PLDM_ERROR_INVALID_LENGTH); in TEST_F() [all …]
|
/openbmc/pldm/oem/ibm/test/ |
H A D | libpldmresponder_fileio_test.cpp | 132 ASSERT_EQ(responsePtr->payload[0], PLDM_SUCCESS); in TEST() 133 ASSERT_EQ(0, memcmp(responsePtr->payload + sizeof(responsePtr->payload[0]), in TEST() 142 ASSERT_EQ(responsePtr->payload[0], PLDM_SUCCESS); in TEST() 143 ASSERT_EQ(0, memcmp(responsePtr->payload + sizeof(responsePtr->payload[0]), in TEST() 154 ASSERT_EQ(responsePtr->payload[0], PLDM_SUCCESS); in TEST() 155 ASSERT_EQ(0, memcmp(responsePtr->payload + sizeof(responsePtr->payload[0]), in TEST() 164 ASSERT_EQ(responsePtr->payload[0], PLDM_SUCCESS); in TEST() 165 ASSERT_EQ(0, memcmp(responsePtr->payload + sizeof(responsePtr->payload[0]), in TEST() 174 ASSERT_EQ(responsePtr->payload[0], PLDM_SUCCESS); in TEST() 175 ASSERT_EQ(0, memcmp(responsePtr->payload + sizeof(responsePtr->payload[0]), in TEST() [all …]
|
/openbmc/phosphor-networkd/src/ |
H A D | ncsi_cmd.cpp | 76 " " << progname << " <options> raw TYPE [PAYLOAD...]\n" in print_usage() 77 " " << progname << " <options> oem [PAYLOAD...]\n" in print_usage() 97 "raw TYPE [PAYLOAD...]\n" in print_usage() 98 " Send a single command using raw type/payload data.\n" in print_usage() 100 " PAYLOAD Command payload bytes, as hex\n" in print_usage() 102 "oem PAYLOAD\n" in print_usage() 104 " PAYLOAD Command payload bytes, as hex\n" in print_usage() 180 std::vector<unsigned char> payload; in parsePayload() local 182 /* we support two formats of payload - all as one argument: in parsePayload() 199 std::cerr << "Invalid payload length " << len0 in parsePayload() [all …]
|
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libxml/libxml-libxml-perl/ |
H A D | 0001-libxml-mm-Fix-function-prototypes-in-function-pointe.patch | 26 -void PmmRegistryDumpHashScanner(void * payload, void * data, xmlChar * name) 27 +void PmmRegistryDumpHashScanner(void * payload, void * data, const xmlChar * name) 29 LocalProxyNodePtr lp = (LocalProxyNodePtr) payload; 35 -PmmRegistryHashDeallocator(void *payload, xmlChar *name) 36 +PmmRegistryHashDeallocator(void *payload, const xmlChar *name) 38 Safefree((LocalProxyNodePtr) payload); 44 -PmmRegistryHashCopier(void *payload, xmlChar *name) 45 +PmmRegistryHashCopier(void *payload, const xmlChar *name) 47 ProxyNodePtr proxy = ((LocalProxyNodePtr) payload)->proxy;
|
/openbmc/phosphor-host-ipmid/include/ipmid/message/ |
H A D | unpack.hpp | 52 void UnpackBytesUnaligned(Payload& p, NumericType& i) in UnpackBytesUnaligned() 63 * @brief Utility to unpack a single C++ element from a Payload 75 * @param[in] p - Payload to unpack from. 78 static int op(Payload& p, T& t) in op() 133 * @brief Utility to unpack a single C++ element from a Payload 141 static int op(Payload& p, std::string& t) in op() 166 static int op(Payload& p, fixed_uint_t<N>& t) in op() 170 // acquire enough bits in the stream to fulfill the Payload in op() 187 static int op(Payload& p, bool& b) in op() 189 // acquire enough bits in the stream to fulfill the Payload in op() [all …]
|
/openbmc/phosphor-host-ipmid/include/ipmid/ |
H A D | message.hpp | 97 * @brief a payload class that provides a mechanism to pack and unpack data 99 * When a new request is being executed, the Payload class is responsible for 102 * Payload object, which will then allow the remaining data to be extracted as 106 * newly created payload object to pack all the parameters into a buffer that is 112 struct Payload struct 114 Payload() = default; 115 Payload(const Payload&) = default; 116 Payload& operator=(const Payload&) = default; 117 Payload(Payload&&) = default; 118 Payload& operator=(Payload&&) = default; [all …]
|
/openbmc/google-ipmi-sys/test/ |
H A D | google_accel_oob_unittest.cpp | 52 const auto payload = std::get<1>(r); in TEST() local 53 ASSERT_EQ(payload.has_value(), true); in TEST() 54 const auto payload_tuple = payload.value(); in TEST() 94 const auto payload = std::get<1>(r); in TEST() local 95 ASSERT_EQ(payload.has_value(), true); in TEST() 96 const auto payload_tuple = payload.value(); in TEST() 155 const auto payload = std::get<1>(r); in TEST() local 156 ASSERT_EQ(payload.has_value(), true); in TEST() 157 const auto payload_tuple = payload.value(); in TEST() 221 const auto payload = std::get<1>(r); in TEST() local [all …]
|
H A D | bios_setting_unittest.cpp | 42 void writeTmpFile(std::vector<uint8_t> payload) in writeTmpFile() argument 46 ofs.write(reinterpret_cast<char*>(payload.data()), payload.size()); in writeTmpFile() 70 std::vector<uint8_t> payload = {0x0A, 0xDE, 0xAD, 0xBE, 0xEF, 0x0A}; in TEST_F() local 74 writeTmpFile(payload); in TEST_F() 96 // Request with payload size 1 but no payload in TEST_F() 101 // Request with payload size 1 but actual payload size of 2 bytes in TEST_F() 106 // Request with payload size 2 but actual payload of 1 byte in TEST_F() 127 // Validate the payload is correct in TEST_F() 147 // Validate the payload is correct in TEST_F()
|
/openbmc/libpldm/tests/oem/ibm/ |
H A D | fileio.cpp | 65 // Request payload message is missing in TEST() 80 // Payload length is invalid in TEST() 104 ASSERT_EQ(response->payload[0], PLDM_SUCCESS); in TEST() 105 ASSERT_EQ(0, memcmp(response->payload + sizeof(response->payload[0]), in TEST() 117 ASSERT_EQ(response->payload[0], PLDM_SUCCESS); in TEST() 118 ASSERT_EQ(0, memcmp(response->payload + sizeof(response->payload[0]), in TEST() 139 ASSERT_EQ(response->payload[0], PLDM_ERROR); in TEST() 150 ASSERT_EQ(response->payload[0], PLDM_ERROR); in TEST() 185 // Request payload message is missing in TEST() 194 // Payload length is invalid in TEST() [all …]
|
/openbmc/qemu/tests/qemu-iotests/tests/ |
H A D | luks-detached-header | 109 # Create detached LUKS raw payload 117 node_name="luks-2-payload-storage", 125 "file": "luks-2-payload-storage", 152 # Create detached LUKS qcow2 payload 213 # Add detached LUKS header with raw payload 225 node_name="luks-2-payload-raw-storage", 232 file="luks-2-payload-raw-storage", 234 node_name="luks-2-payload-raw-format", 238 # Add detached LUKS header with qcow2 payload 250 node_name="luks-3-payload-qcow2-storage", [all …]
|