| /openbmc/qemu/crypto/ |
| H A D | tlssession.c | 68 qcrypto_tls_session_free(QCryptoTLSSession *session) in qcrypto_tls_session_free() argument 70 if (!session) { in qcrypto_tls_session_free() 74 error_free(session->rerr); in qcrypto_tls_session_free() 75 error_free(session->werr); in qcrypto_tls_session_free() 77 gnutls_deinit(session->handle); in qcrypto_tls_session_free() 78 g_free(session->hostname); in qcrypto_tls_session_free() 79 g_free(session->peername); in qcrypto_tls_session_free() 80 g_free(session->authzid); in qcrypto_tls_session_free() 81 object_unref(OBJECT(session->creds)); in qcrypto_tls_session_free() 82 qemu_mutex_destroy(&session->lock); in qcrypto_tls_session_free() [all …]
|
| /openbmc/ipmitool/src/plugins/lanplus/ |
| H A D | lanplus_crypt.c | 72 lanplus_rakp2_hmac_matches(const struct ipmi_session * session, in lanplus_rakp2_hmac_matches() argument 83 if (session->v2_data.auth_alg == IPMI_AUTH_RAKP_NONE) in lanplus_rakp2_hmac_matches() 87 assert(session->v2_data.auth_alg == IPMI_AUTH_RAKP_HMAC_SHA1); in lanplus_rakp2_hmac_matches() 112 SIDm_lsbf = session->v2_data.console_id; in lanplus_rakp2_hmac_matches() 120 SIDc_lsbf = session->v2_data.bmc_id; in lanplus_rakp2_hmac_matches() 129 buffer[8 + i] = session->v2_data.console_rand[16 - 1 - i]; in lanplus_rakp2_hmac_matches() 132 buffer[8 + i] = session->v2_data.console_rand[i]; in lanplus_rakp2_hmac_matches() 138 buffer[24 + i] = session->v2_data.bmc_rand[16 - 1 - i]; in lanplus_rakp2_hmac_matches() 141 buffer[24 + i] = session->v2_data.bmc_rand[i]; in lanplus_rakp2_hmac_matches() 147 buffer[40 + i] = session->v2_data.bmc_guid[16 - 1 - i]; in lanplus_rakp2_hmac_matches() [all …]
|
| H A D | lanplus.c | 423 tmout.tv_sec = intf->session->timeout; in ipmi_lan_recv_packet() 449 tmout.tv_sec = intf->session->timeout; in ipmi_lan_recv_packet() 616 struct ipmi_session * session = intf->session; in ipmi_lan_poll_single() local 663 read_session_data(rsp, &offset, intf->session); in ipmi_lan_poll_single() 665 if (lanplus_has_valid_auth_code(rsp, intf->session) == 0) { in ipmi_lan_poll_single() 670 if ((session->v2_data.session_state == LANPLUS_STATE_ACTIVE) && in ipmi_lan_poll_single() 671 (rsp->session.authtype == IPMI_SESSION_AUTHTYPE_RMCP_PLUS) && in ipmi_lan_poll_single() 672 (rsp->session.bEncrypted)) { in ipmi_lan_poll_single() 673 lanplus_decrypt_payload(session->v2_data.crypt_alg, in ipmi_lan_poll_single() 674 session->v2_data.k2, in ipmi_lan_poll_single() [all …]
|
| /openbmc/openbmc-tools/reboot-ping-pong/ |
| H A D | rpp | 24 def __init__(self, session, prompt): argument 25 self.session = session 29 self.session.expect([".+".encode(), pexpect.TIMEOUT], timeout=5) 32 self.session.sendline() 34 self.session.sendline("obmcutil -w {}".format(cmd).encode()) 35 self.session.expect(needle, timeout=None) 36 rc = self.session.after.decode() 53 self.session.sendline("obmcutil -w poweron") 54 self.session.expect(self.prompt) 57 self.session.sendline("obmcutil -w chassisoff") [all …]
|
| /openbmc/phosphor-net-ipmid/command/ |
| H A D | session_cmds.cpp | 42 auto session = session::Manager::get().getSession(handler->sessionID); in setSessionPrivilegeLevel() local 46 response->newPrivLevel = session->currentPrivilege(); in setSessionPrivilegeLevel() 50 static_cast<uint8_t>(session::Privilege::CALLBACK) || in setSessionPrivilegeLevel() 51 reqPrivilegeLevel > static_cast<uint8_t>(session::Privilege::OEM)) in setSessionPrivilegeLevel() 57 if (reqPrivilegeLevel > (static_cast<uint8_t>(session->reqMaxPrivLevel) & in setSessionPrivilegeLevel() 58 session::reqMaxPrivMask)) in setSessionPrivilegeLevel() 66 if (session->sessionChannelAccess.privLimit < in setSessionPrivilegeLevel() 67 session->sessionUserPrivAccess.privilege) in setSessionPrivilegeLevel() 69 minPriv = session->sessionChannelAccess.privLimit; in setSessionPrivilegeLevel() 73 minPriv = session->sessionUserPrivAccess.privilege; in setSessionPrivilegeLevel() [all …]
|
| H A D | rakp12.cpp | 56 session::sessionZero) in RAKP12() 64 std::shared_ptr<session::Session> session; in RAKP12() local 67 session = session::Manager::get().getSession( in RAKP12() 92 session->userName.assign(request->user_name, request->user_name_len); in RAKP12() 95 session->updateLastTransactionTime(); in RAKP12() 97 auto rcSessionID = endian::to_ipmi(session->getRCSessionID()); in RAKP12() 98 auto bmcSessionID = endian::to_ipmi(session->getBMCSessionID()); in RAKP12() 99 auto authAlgo = session->getAuthAlgo(); in RAKP12() 119 sizeof(request->user_name_len) + session->userName.size()); in RAKP12() 157 if (!(static_cast<session::Privilege>( in RAKP12() [all …]
|
| H A D | rakp34.cpp | 19 auto session = session::Manager::get().getSession(bmcSessionID); in applyIntegrityAlgo() local 21 auto authAlgo = session->getAuthAlgo(); in applyIntegrityAlgo() 27 session->setIntegrityAlgo( in applyIntegrityAlgo() 34 session->setIntegrityAlgo( in applyIntegrityAlgo() 46 auto session = session::Manager::get().getSession(bmcSessionID); in applyCryptAlgo() local 48 auto authAlgo = session->getAuthAlgo(); in applyCryptAlgo() 54 auto intAlgo = session->getIntegrityAlgo(); in applyCryptAlgo() 57 session->setCryptAlgo( in applyCryptAlgo() 84 session::sessionZero) in RAKP34() 92 std::shared_ptr<session::Session> session; in RAKP34() local [all …]
|
| H A D | open_session.cpp | 50 session::Privilege priv; in openSession() 59 priv = session::Privilege::ADMIN; in openSession() 63 priv = static_cast<session::Privilege>(request->maxPrivLevel); in openSession() 75 std::shared_ptr<session::Session> session; in openSession() local 79 session = session::Manager::get().startSession( in openSession() 95 response->maxPrivLevel = static_cast<uint8_t>(session->reqMaxPrivLevel); in openSession() 97 endian::to_ipmi<>(session->getBMCSessionID()); in openSession() 111 session->updateLastTransactionTime(); in openSession() 114 session->state(static_cast<uint8_t>(session::State::setupInProgress)); in openSession()
|
| /openbmc/phosphor-ipmi-blobs/ |
| H A D | manager.cpp | 67 uint16_t* session) in open() argument 78 if (!getSession(session)) in open() 95 if (!handler->open(*session, flags, path)) in open() 101 sessions[*session] = SessionInfo(path, handler, flags); in open() 102 openSessions[handler].insert(*session); in open() 121 bool BlobManager::stat(uint16_t session, BlobMeta* meta) in stat() argument 123 if (auto handler = getActionHandler(session)) in stat() 125 return handler->stat(session, meta); in stat() 130 bool BlobManager::commit(uint16_t session, const std::vector<uint8_t>& data) in commit() argument 132 if (auto handler = getActionHandler(session)) in commit() [all …]
|
| H A D | manager.hpp | 52 uint16_t* session) = 0; 56 virtual bool stat(uint16_t session, BlobMeta* meta) = 0; 58 virtual bool commit(uint16_t session, const std::vector<uint8_t>& data) = 0; 60 virtual bool close(uint16_t session) = 0; 62 virtual std::vector<uint8_t> read(uint16_t session, uint32_t offset, 65 virtual bool write(uint16_t session, uint32_t offset, 70 virtual bool writeMeta(uint16_t session, uint32_t offset, 129 uint16_t* session) override; 147 bool stat(uint16_t session, BlobMeta* meta) override; 156 bool commit(uint16_t session, const std::vector<uint8_t>& data) override; [all …]
|
| /openbmc/smbios-mdr/src/smbios-ipmi-blobs/test/ |
| H A D | handler_readwrite_unittest.cpp | 24 EXPECT_FALSE(handler.write(session, 0, data)); in TEST_F() 31 EXPECT_TRUE(handler.open(session, 0, expectedBlobId)); in TEST_F() 34 EXPECT_FALSE(handler.write(session, 0, data)); in TEST_F() 42 EXPECT_TRUE(handler.open(session, blobs::OpenFlags::write, expectedBlobId)); in TEST_F() 43 EXPECT_FALSE(handler.write(session, 0, data)); in TEST_F() 50 EXPECT_TRUE(handler.open(session, blobs::OpenFlags::write, expectedBlobId)); in TEST_F() 51 EXPECT_FALSE(handler.write(session, 1, data)); in TEST_F() 58 EXPECT_TRUE(handler.open(session, blobs::OpenFlags::write, expectedBlobId)); in TEST_F() 59 EXPECT_FALSE(handler.write(session, handlerMaxBufferSize - 1, data)); in TEST_F() 66 EXPECT_TRUE(handler.open(session, blobs::OpenFlags::write, expectedBlobId)); in TEST_F() [all …]
|
| /openbmc/phosphor-net-ipmid/ |
| H A D | sessions_manager.cpp | 15 namespace session namespace 18 static std::array<uint8_t, session::maxNetworkInstanceSupported> 29 index < session::maxNetworkInstanceSupported) in setNetworkInstance() 63 *getSdBus(), session::sessionManagerRootPath); in managerInit() 65 auto objPath = std::string(session::sessionManagerRootPath) + "/" + in managerInit() 82 std::shared_ptr<Session> session = nullptr; in startSession() local 90 auto activeSessions = sessionsMap.size() - session::maxSessionlessCount; in startSession() 97 bmcSessionID &= session::multiIntfaceSessionIDMask; in startSession() 129 sessionHandle &= session::multiIntfaceSessionHandleMask; in startSession() 136 auto objPath = std::string(session::sessionManagerRootPath) + "/" + in startSession() [all …]
|
| H A D | command_table.cpp | 45 if (handler->sessionID == session::sessionZero) in executeCommand() 53 std::shared_ptr<session::Session> session = in executeCommand() local 54 session::Manager::get().getSession(handler->sessionID); in executeCommand() 57 auto state = static_cast<session::State>(session->state()); in executeCommand() 58 if (state != session::State::active) in executeCommand() 73 ipmi::ipmiUserGetUserId(session->userName)))}, in executeCommand() 75 ipmi::Value(static_cast<int>(session->currentPrivilege()))}, in executeCommand() 77 ipmi::Value(static_cast<uint32_t>(session->getBMCSessionID()))}, in executeCommand() 110 if (handler->sessionID != session::sessionZero) in executeCommand() 112 std::shared_ptr<session::Session> session = in executeCommand() local [all …]
|
| H A D | message_parsers.cpp | 71 const std::shared_ptr<session::Session>& session) in flatten() argument 78 return ipmi15parser::flatten(outMessage, session); in flatten() 82 return ipmi20parser::flatten(outMessage, session); in flatten() 106 if (sessionID != session::sessionZero) in unflatten() 114 message->bmcSessionID = session::sessionZero; in unflatten() 138 const std::shared_ptr<session::Session>& /* session */) in flatten() 185 auto session = session::Manager::get().getSession(sessionID); in unflatten() local 186 if (!session) in unflatten() 212 session->isIntegrityAlgoEnabled() && !message->isPacketAuthenticated; in unflatten() 213 bool encryptMismatch = session->isCryptAlgoEnabled() && in unflatten() [all …]
|
| H A D | message_parsers.hpp | 99 const std::shared_ptr<session::Session>& session); 138 const std::shared_ptr<session::Session>& session); 186 const std::shared_ptr<session::Session>& session); 199 const std::shared_ptr<session::Session>& session); 213 const std::shared_ptr<session::Session>& session); 225 const std::shared_ptr<session::Session>& session); 239 size_t payloadLen, const std::shared_ptr<session::Session>& session); 251 const std::shared_ptr<session::Session>& session);
|
| /openbmc/phosphor-ipmi-blobs/example/ |
| H A D | example.cpp | 50 bool ExampleBlobHandler::open(uint16_t session, uint16_t flags, in open() argument 58 auto findSess = sessions.find(session); in open() 64 sessions[session] = ExampleBlob(session, flags); in open() 68 std::vector<uint8_t> ExampleBlobHandler::read(uint16_t session, uint32_t offset, in read() argument 71 ExampleBlob* sess = getSession(session); in read() 94 bool ExampleBlobHandler::write(uint16_t session, uint32_t offset, in write() argument 97 ExampleBlob* sess = getSession(session); in write() 127 bool ExampleBlobHandler::commit(uint16_t session, const std::vector<uint8_t>&) in commit() argument 129 ExampleBlob* sess = getSession(session); in commit() 140 bool ExampleBlobHandler::close(uint16_t session) in close() argument [all …]
|
| /openbmc/u-boot/test/dm/ |
| H A D | tee.c | 14 static int open_session(struct udevice *dev, u32 *session) in open_session() argument 27 *session = arg.session; in open_session() 32 static int invoke_func(struct udevice *dev, u32 session) in invoke_func() argument 38 arg.session = session; in invoke_func() 62 u32 session = 0; in test_tee() local 69 ut_assert(!state->session); in test_tee() 71 rc = open_session(dev, &session); in test_tee() 73 ut_assert(session == state->session); in test_tee() 75 rc = invoke_func(dev, session); in test_tee() 78 rc = tee_close_session(dev, session); in test_tee() [all …]
|
| /openbmc/bmcweb/redfish-core/lib/ |
| H A D | redfish_sessions.hpp | 41 const persistent_data::UserSession& session) in fillSessionObject() argument 43 res.jsonValue["Id"] = session.uniqueId; in fillSessionObject() 44 res.jsonValue["UserName"] = session.username; in fillSessionObject() 46 roles.emplace_back(redfish::getRoleIdFromPrivilege(session.userRole)); in fillSessionObject() 49 "/redfish/v1/SessionService/Sessions/{}", session.uniqueId); in fillSessionObject() 53 res.jsonValue["ClientOriginIPAddress"] = session.clientIp; in fillSessionObject() 54 if (session.clientId) in fillSessionObject() 56 res.jsonValue["Context"] = *session.clientId; in fillSessionObject() 88 auto session = in handleSessionGet() local 91 if (session == nullptr) in handleSessionGet() [all …]
|
| /openbmc/phosphor-ipmi-flash/tools/test/ |
| H A D | tools_updater_unittest.cpp | 30 const std::uint16_t session = 0xbeef; member in host_tool::UpdateHandlerTest 69 .WillOnce(Return(session)); in TEST_F() 71 EXPECT_CALL(handlerMock, sendContents(firmwareImage, session)) in TEST_F() 74 EXPECT_CALL(blobMock, closeBlob(session)).Times(1); in TEST_F() 114 .WillRepeatedly(Return(session)); in TEST_F() 116 EXPECT_CALL(handlerMock, sendContents(firmwareImage, session)) in TEST_F() 119 EXPECT_CALL(blobMock, closeBlob(session)).Times(3); in TEST_F() 140 .WillRepeatedly(Return(session)); in TEST_F() 142 EXPECT_CALL(handlerMock, sendContents(firmwareImage, session)) in TEST_F() 147 EXPECT_CALL(blobMock, closeBlob(session)).Times(3); in TEST_F() [all …]
|
| H A D | tools_helper_unittest.cpp | 21 std::uint16_t session = 0xbeef; member in host_tool::HelperTest 31 EXPECT_CALL(blobMock, getStat(TypedEq<std::uint16_t>(session))) in TEST_F() 34 EXPECT_NO_THROW(pollStatus(session, &blobMock)); in TEST_F() 44 EXPECT_CALL(blobMock, getStat(TypedEq<std::uint16_t>(session))) in TEST_F() 47 EXPECT_THROW(pollStatus(session, &blobMock), ToolException); in TEST_F() 57 EXPECT_CALL(blobMock, getStat(TypedEq<std::uint16_t>(session))) in TEST_F() 60 EXPECT_NO_THROW(pollReadReady(session, &blobMock)); in TEST_F() 69 EXPECT_CALL(blobMock, getStat(TypedEq<std::uint16_t>(session))) in TEST_F() 72 EXPECT_THROW(pollReadReady(session, &blobMock), ToolException); in TEST_F() 85 EXPECT_CALL(blobMock, getStat(TypedEq<std::uint16_t>(session))) in TEST_F() [all …]
|
| /openbmc/bmcweb/include/ |
| H A D | dbus_privileges.hpp | 31 persistent_data::UserSession& session, in populateUserInfo() argument 57 session.userRole = userRole; in populateUserInfo() 58 BMCWEB_LOG_DEBUG("userName = {} userRole = {}", session.username, userRole); in populateUserInfo() 63 session.isConfigureSelfOnly = passwordExpired.value_or(false); in populateUserInfo() 65 session.userGroups.clear(); in populateUserInfo() 68 session.userGroups.swap(*userGroups); in populateUserInfo() 78 if (req.session == nullptr) in isUserPrivileged() 84 redfish::getUserPrivileges(*req.session); in isUserPrivileged() 87 if (req.session->isConfigureSelfOnly) in isUserPrivileged() 98 if (req.session->isConfigureSelfOnly) in isUserPrivileged() [all …]
|
| /openbmc/openbmc/poky/meta/recipes-graphics/mini-x-session/ |
| H A D | mini-x-session_0.1.bb | 1 SUMMARY = "Very simple session manager for X" 2 DESCRIPTION = "Simple session manager for X, that provides just the right boilerplate to create a s… 8 LIC_FILES_CHKSUM = "file://mini-x-session;endline=5;md5=b6430bffbcf05f9760e72938826b7487" 13 SRC_URI = "file://mini-x-session" 22 ALTERNATIVE:${PN} = "x-session-manager" 23 ALTERNATIVE_TARGET[x-session-manager] = "${bindir}/mini-x-session" 28 install -m 0755 ${S}/mini-x-session ${D}/${bindir}
|
| /openbmc/openbmc-tools/check_journal/ |
| H A D | check_journal | 18 def login(session): argument 19 response = session.post( 28 session.headers.update({"X-Auth-Token": auth}) 31 def get_golden(session): argument 32 response = session.get( 45 session = requests.Session() 47 login(session) 48 members = get_golden(session) 58 response3 = session.get(page_uri, verify=verify_ssl) 83 response2 = session.get(
|
| /openbmc/openbmc/poky/meta/recipes-graphics/matchbox-session/ |
| H A D | matchbox-session_0.1.bb | 1 SUMMARY = "Custom Matchbox session files" 2 DESCRIPTION = "Very simple session manager for matchbox tools" 7 LIC_FILES_CHKSUM = "file://matchbox-session;endline=20;md5=180f1c169a15d059a56c30094f6fb5ea" 12 SRC_URI = "file://matchbox-session" 20 ALTERNATIVE:${PN} = "x-session-manager" 21 ALTERNATIVE_TARGET[x-session-manager] = "${bindir}/matchbox-session" 26 install -m 0755 ${S}/matchbox-session ${D}/${bindir}
|
| /openbmc/google-misc/subprojects/metrics-ipmi-blobs/ |
| H A D | handler.cpp | 67 bool MetricBlobHandler::open(uint16_t session, uint16_t flags, in open() argument 83 sessions[session] = nullptr; in open() 84 sessions[session] = std::move(bhs); in open() 91 std::vector<uint8_t> MetricBlobHandler::read(uint16_t session, uint32_t offset, in read() argument 94 auto it = sessions.find(session); in read() 124 bool MetricBlobHandler::close(uint16_t session) in close() argument 126 auto itr = sessions.find(session); in close() 136 bool MetricBlobHandler::stat(uint16_t session, BlobMeta* meta) in stat() argument 138 auto it = sessions.find(session); in stat() 146 bool MetricBlobHandler::expire(uint16_t session) in expire() argument [all …]
|