#
33503e2a |
| 03-Feb-2025 |
Patrick Williams <patrick@stwcx.xyz> |
clang-format: update latest spec and reformat
Copy the latest format file from the docs repository and apply.
Change-Id: I2a188ebd3faf376ecba3e20ef6a28ffbaa986628 Signed-off-by: Patrick Williams <p
clang-format: update latest spec and reformat
Copy the latest format file from the docs repository and apply.
Change-Id: I2a188ebd3faf376ecba3e20ef6a28ffbaa986628 Signed-off-by: Patrick Williams <patrick@stwcx.xyz>
show more ...
|
#
8425624a |
| 16-Aug-2024 |
Patrick Williams <patrick@stwcx.xyz> |
clang-format: re-format for clang-18
clang-format-18 isn't compatible with the clang-format-17 output, so we need to reformat the code with the latest version. The way clang-18 handles lambda forma
clang-format: re-format for clang-18
clang-format-18 isn't compatible with the clang-format-17 output, so we need to reformat the code with the latest version. The way clang-18 handles lambda formatting also changed, so we have made changes to the organization default style format to better handle lambda formatting.
See I5e08687e696dd240402a2780158664b7113def0e for updated style. See Iea0776aaa7edd483fa395e23de25ebf5a6288f71 for clang-18 enablement.
Change-Id: I8d0072c279e4de87dc001190845d0ca6da233345 Signed-off-by: Patrick Williams <patrick@stwcx.xyz>
show more ...
|
#
099fb097 |
| 10-May-2023 |
Patrick Williams <patrick@stwcx.xyz> |
clang-format: copy latest and re-format
clang-format-16 has some backwards incompatible changes that require additional settings for best compatibility and re-running the formatter. Copy the latest
clang-format: copy latest and re-format
clang-format-16 has some backwards incompatible changes that require additional settings for best compatibility and re-running the formatter. Copy the latest .clang-format from the docs repository and reformat the repository.
Change-Id: I862ed296ce1f42dba7047a74540d9004ad78130c Signed-off-by: Patrick Williams <patrick@stwcx.xyz>
show more ...
|
#
bc8958fe |
| 03-Jul-2022 |
George Liu <liuxiwei@inspur.com> |
Update to latest clang-format
Refer:https://github.com/openbmc/docs/blob/ac5d544553934f8083c61c5986a1420261bc8a4c/style/cpp/.clang-format
Signed-off-by: George Liu <liuxiwei@inspur.com> Change-Id:
Update to latest clang-format
Refer:https://github.com/openbmc/docs/blob/ac5d544553934f8083c61c5986a1420261bc8a4c/style/cpp/.clang-format
Signed-off-by: George Liu <liuxiwei@inspur.com> Change-Id: I1e06864afc29ce7de463e62fa2a0eb6f70e8fd93
show more ...
|
#
7b645018 |
| 17-May-2021 |
Andrew Geissler <geissonator@yahoo.com> |
crypt_algo: add needed include
gcc11 flags an error on this missing include
Signed-off-by: Andrew Geissler <geissonator@yahoo.com> Change-Id: I9eb8c1d9f1427b56e71d4103ae402980075f0780
|
#
9e801a2b |
| 12-Oct-2018 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
netipmid: apply clang-format rules
Lots of whitespace change. Let clang-format do its job and keep the code looking nice.
Change-Id: Idfcad1a99cab8170d55a06163de8ad3f420b68b7 Signed-off-by: Vernon
netipmid: apply clang-format rules
Lots of whitespace change. Let clang-format do its job and keep the code looking nice.
Change-Id: Idfcad1a99cab8170d55a06163de8ad3f420b68b7 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
fe5a6458 |
| 30-Jul-2018 |
Tom Joseph <tomjoseph@in.ibm.com> |
Remove the support for insecure protocols in RMCP+
The two supported Cipher suites for RMCP+ will be cipher Suite 3 and 17 after this change. The cipher suite 3 is the default choice for the ipmitoo
Remove the support for insecure protocols in RMCP+
The two supported Cipher suites for RMCP+ will be cipher Suite 3 and 17 after this change. The cipher suite 3 is the default choice for the ipmitool if the cipher suite is not explicitly mentioned.
The supported algorithms are the following:
Authentication: a) RAKP-HMAC-SHA1, b) RAKP-HMAC-SHA256 Integrity: a) HMAC-SHA1-9, b) HMAC-SHA256-128 Confidentiality: a) AES-CBC-128
Change-Id: Ia2fbaae29235e4bd43c42b59a2295a2db28efce3 Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
show more ...
|
#
9b307be6 |
| 22-Nov-2017 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
Prepare for adding RMCP+ cipher suite 17
In many places, there are baked-in assumptions about algorithms that tie the session initiation to cipher suite 3. This commit teases out those assumptions a
Prepare for adding RMCP+ cipher suite 17
In many places, there are baked-in assumptions about algorithms that tie the session initiation to cipher suite 3. This commit teases out those assumptions and prepares for the next patch that actually adds in the new authentication and integrity algorithms to support cipher suite 17.
Change-Id: I2ee3672a7c503b89c5ff0aba30cf7a4601e24d04 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
70fd29cf |
| 30-Nov-2017 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
explicit use of std::vector instead of buffer/Buffer
There were several scoped 'using buffer = std::vector<uint8_t>;' in header files. This consolidates the code base to use std::vector<uint8_t> ins
explicit use of std::vector instead of buffer/Buffer
There were several scoped 'using buffer = std::vector<uint8_t>;' in header files. This consolidates the code base to use std::vector<uint8_t> instead of buffer or Buffer. This makes the code easier to read and debug.
Change-Id: I918a0f6ca9b8e4b9d331175dccff45cbf4c8379d Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
2f0bd0eb |
| 24-Jan-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Validate Confidentiality Algo in Open Session request
Change-Id: I208e09926a18e215212564eca3203094015724c9 Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
|
#
5469065f |
| 16-Feb-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Add documentation for Cipher Key K2
Change-Id: I401bffba92ea0adc05b74cdd11b2105b5148d667 Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
|
#
06f7a3c9 |
| 25-Jan-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Interfaces for the AES-CBC-128 Confidentiality Algo
Change-Id: I62c06435dfe95bf86c2a49873d8ab25116588afb Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
|
#
d08b5235 |
| 24-Jan-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Interfaces for the Confidentiality Algorithm
This patch defines the interfaces for the confidentaility algorithm. It provides API to decrypt the cipher payload and encrypt the plain text payload.
C
Interfaces for the Confidentiality Algorithm
This patch defines the interfaces for the confidentaility algorithm. It provides API to decrypt the cipher payload and encrypt the plain text payload.
Change-Id: I0c47ee14d5d5574c4d4996e437dffcaa2aa62f9a Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
show more ...
|