/openbmc/phosphor-net-ipmid/command/ |
H A D | payload_cmds.cpp | 18 std::vector<uint8_t> activatePayload(const std::vector<uint8_t>& inPayload, in activatePayload() argument 22 reinterpret_cast<const ActivatePayloadRequest*>(inPayload.data()); in activatePayload() 23 if (inPayload.size() != sizeof(*request)) in activatePayload() 118 deactivatePayload(const std::vector<uint8_t>& inPayload, in deactivatePayload() argument 122 reinterpret_cast<const DeactivatePayloadRequest*>(inPayload.data()); in deactivatePayload() 123 if (inPayload.size() != sizeof(*request)) in deactivatePayload() 205 getPayloadStatus(const std::vector<uint8_t>& inPayload, in getPayloadStatus() argument 210 if (inPayload.size() != sizeof(*request)) in getPayloadStatus() 239 getPayloadInfo(const std::vector<uint8_t>& inPayload, in getPayloadInfo() argument 243 reinterpret_cast<const GetPayloadInfoRequest*>(inPayload.data()); in getPayloadInfo() [all …]
|
H A D | channel_auth.cpp | 27 GetChannelCapabilities(const std::vector<uint8_t>& inPayload, in GetChannelCapabilities() argument 31 reinterpret_cast<const GetChannelCapabilitiesReq*>(inPayload.data()); in GetChannelCapabilities() 32 if (inPayload.size() != sizeof(*request)) in GetChannelCapabilities() 188 getChannelCipherSuites(const std::vector<uint8_t>& inPayload, in getChannelCipherSuites() argument 198 if (inPayload.size() != getChannelCipherSuitesReqLen) in getChannelCipherSuites() 204 uint8_t channelNumber = inPayload[0] & channelMask; in getChannelCipherSuites() 205 if (channelNumber != inPayload[0]) in getChannelCipherSuites() 210 uint8_t payloadType = inPayload[1] & payloadMask; in getChannelCipherSuites() 211 if (payloadType != inPayload[1]) in getChannelCipherSuites() 216 uint8_t listIndex = inPayload[2] & indexMask; in getChannelCipherSuites() [all …]
|
H A D | sol_cmds.cpp | 17 std::vector<uint8_t> payloadHandler(const std::vector<uint8_t>& inPayload, in payloadHandler() argument 21 if (inPayload.size() < sizeof(Payload)) in payloadHandler() 26 auto request = reinterpret_cast<const Payload*>(inPayload.data()); in payloadHandler() 27 auto solDataSize = inPayload.size() - sizeof(Payload); in payloadHandler() 32 std::copy_n(inPayload.data() + sizeof(Payload), solDataSize, in payloadHandler()
|
H A D | session_cmds.cpp | 20 setSessionPrivilegeLevel(const std::vector<uint8_t>& inPayload, in setSessionPrivilegeLevel() argument 24 reinterpret_cast<const SetSessionPrivLevelReq*>(inPayload.data()); in setSessionPrivilegeLevel() 25 if (inPayload.size() != sizeof(*request)) in setSessionPrivilegeLevel() 245 std::vector<uint8_t> closeSession(const std::vector<uint8_t>& inPayload, in closeSession() argument 250 if (inPayload.size() != sizeof(uint32_t) && in closeSession() 251 inPayload.size() != sizeof(CloseSessionRequest)) in closeSession() 258 reinterpret_cast<const CloseSessionRequest*>(inPayload.data()); in closeSession() 267 if (inPayload.size() == sizeof(CloseSessionRequest)) in closeSession() 279 if (inPayload.size() == sizeof(reqSessionId) && in closeSession() 287 inPayload.size() != sizeof(reqSessionId)) in closeSession()
|
H A D | payload_cmds.hpp | 113 activatePayload(const std::vector<uint8_t>& inPayload, 177 deactivatePayload(const std::vector<uint8_t>& inPayload, 256 getPayloadStatus(const std::vector<uint8_t>& inPayload, 291 std::vector<uint8_t> getPayloadInfo(const std::vector<uint8_t>& inPayload,
|
H A D | open_session.cpp | 13 openSession(const std::vector<uint8_t>& inPayload, in openSession() argument 17 reinterpret_cast<const OpenSessionRequest*>(inPayload.data()); in openSession() 18 if (inPayload.size() != sizeof(*request)) in openSession()
|
H A D | session_cmds.hpp | 78 setSessionPrivilegeLevel(const std::vector<uint8_t>& inPayload, 116 std::vector<uint8_t> closeSession(const std::vector<uint8_t>& inPayload,
|
H A D | channel_auth.hpp | 122 GetChannelCapabilities(const std::vector<uint8_t>& inPayload, 140 getChannelCipherSuites(const std::vector<uint8_t>& inPayload,
|
H A D | rakp34.cpp | 66 std::vector<uint8_t> RAKP34(const std::vector<uint8_t>& inPayload, in RAKP34() argument 70 auto request = reinterpret_cast<const RAKP3request*>(inPayload.data()); in RAKP34() 74 if (inPayload.size() < sizeof(RAKP3request)) in RAKP34() 159 if (inPayload.size() != (sizeof(RAKP3request) + output.size()) || in RAKP34()
|
H A D | rakp12.cpp | 40 std::vector<uint8_t> RAKP12(const std::vector<uint8_t>& inPayload, in RAKP12() argument 43 auto request = reinterpret_cast<const RAKP1request*>(inPayload.data()); in RAKP12() 45 if (inPayload.size() < (sizeof(*request) - userNameMaxLen)) in RAKP12() 84 inPayload.size() != rakp1Size) in RAKP12()
|
H A D | rakp34.hpp | 52 std::vector<uint8_t> RAKP34(const std::vector<uint8_t>& inPayload,
|
H A D | sol_cmds.hpp | 24 std::vector<uint8_t> payloadHandler(const std::vector<uint8_t>& inPayload,
|
H A D | rakp12.hpp | 75 std::vector<uint8_t> RAKP12(const std::vector<uint8_t>& inPayload,
|
H A D | open_session.hpp | 177 std::vector<uint8_t> openSession(const std::vector<uint8_t>& inPayload,
|
/openbmc/phosphor-net-ipmid/ |
H A D | message_handler.cpp | 126 std::vector<uint8_t> inPayload(start, end); in executeCommand() local 127 command::Table::get().executeCommand(command, inPayload, in executeCommand()
|