#
bac2f1a3 |
| 06-Feb-2025 |
Lei YU <yulei.sh@bytedance.com> |
Enable clang-tidy and apply fixes
Enable clang-tidy, fix the compile issue and fix the clang-tidy issues.
Signed-off-by: Lei YU <yulei.sh@bytedance.com> Change-Id: I6250c6519a725c07b0cd10abe464fda9
Enable clang-tidy and apply fixes
Enable clang-tidy, fix the compile issue and fix the clang-tidy issues.
Signed-off-by: Lei YU <yulei.sh@bytedance.com> Change-Id: I6250c6519a725c07b0cd10abe464fda97a2aebd7
show more ...
|
#
099fb097 |
| 10-May-2023 |
Patrick Williams <patrick@stwcx.xyz> |
clang-format: copy latest and re-format
clang-format-16 has some backwards incompatible changes that require additional settings for best compatibility and re-running the formatter. Copy the latest
clang-format: copy latest and re-format
clang-format-16 has some backwards incompatible changes that require additional settings for best compatibility and re-running the formatter. Copy the latest .clang-format from the docs repository and reformat the repository.
Change-Id: I862ed296ce1f42dba7047a74540d9004ad78130c Signed-off-by: Patrick Williams <patrick@stwcx.xyz>
show more ...
|
#
198b0f81 |
| 04-Aug-2022 |
George Liu <liuxiwei@inspur.com> |
Safe overloading with std::equal
Since C++20, there is a safer way to overload std::equal: template< class InputIt1, class InputIt2 > constexpr bool equal( InputIt1 first1, InputIt1 last1,
Safe overloading with std::equal
Since C++20, there is a safer way to overload std::equal: template< class InputIt1, class InputIt2 > constexpr bool equal( InputIt1 first1, InputIt1 last1, InputIt2 first2, InputIt2 last2 ); Because if they are different lengths, it won't run past on either side. In theory, they should always be the same length.
Signed-off-by: George Liu <liuxiwei@inspur.com> Change-Id: I1d25331521c1590b5f448f93b657f58f9f06d778
show more ...
|
#
bc8958fe |
| 03-Jul-2022 |
George Liu <liuxiwei@inspur.com> |
Update to latest clang-format
Refer:https://github.com/openbmc/docs/blob/ac5d544553934f8083c61c5986a1420261bc8a4c/style/cpp/.clang-format
Signed-off-by: George Liu <liuxiwei@inspur.com> Change-Id:
Update to latest clang-format
Refer:https://github.com/openbmc/docs/blob/ac5d544553934f8083c61c5986a1420261bc8a4c/style/cpp/.clang-format
Signed-off-by: George Liu <liuxiwei@inspur.com> Change-Id: I1e06864afc29ce7de463e62fa2a0eb6f70e8fd93
show more ...
|
#
9d9b7638 |
| 17-May-2020 |
Andrew Geissler <geissonator@yahoo.com> |
size_t: ensure cstddef included
Latest upstream yocto appears to have removed a free include of cstddef. This is causing compile failures for files which do not include it properly.
Signed-off-by:
size_t: ensure cstddef included
Latest upstream yocto appears to have removed a free include of cstddef. This is causing compile failures for files which do not include it properly.
Signed-off-by: Andrew Geissler <geissonator@yahoo.com> Change-Id: Ie54a2768ef72f59ab140df05e79e86baae6eaa82
show more ...
|
#
4c494398 |
| 31-Mar-2020 |
Suryakanth Sekar <suryakanth.sekar@linux.intel.com> |
Remove HMAC-SHA1 from Authentication/Integrity Alg
Reason: For security reason- HMAC-SHA1 is deprecated.
Plesae note: Use latest ipmitool or ipmitool v1.8.18.177.g7ccea28 later
Tested : ipmitool -
Remove HMAC-SHA1 from Authentication/Integrity Alg
Reason: For security reason- HMAC-SHA1 is deprecated.
Plesae note: Use latest ipmitool or ipmitool v1.8.18.177.g7ccea28 later
Tested : ipmitool -H <BMCIP> -I lanplus -U <username> -P <password> -C 3 raw 6 1 Error in open session response message : invalid authentication algorithm Error: Unable to establish IPMI v2 / RMCP+ session
ipmitool -H <BMCIP> -I lanplus -U <username> -P <password> -C 17 raw 6 1 23 00 00 40 02 bf 57 01 00 91 00 0d 62 04 f5
Signed-off-by: Suryakanth Sekar <suryakanth.sekar@linux.intel.com> Change-Id: I8226c06a248ec601d848c1e2dd7eb129a272c503
show more ...
|
#
9e801a2b |
| 12-Oct-2018 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
netipmid: apply clang-format rules
Lots of whitespace change. Let clang-format do its job and keep the code looking nice.
Change-Id: Idfcad1a99cab8170d55a06163de8ad3f420b68b7 Signed-off-by: Vernon
netipmid: apply clang-format rules
Lots of whitespace change. Let clang-format do its job and keep the code looking nice.
Change-Id: Idfcad1a99cab8170d55a06163de8ad3f420b68b7 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
fe5a6458 |
| 30-Jul-2018 |
Tom Joseph <tomjoseph@in.ibm.com> |
Remove the support for insecure protocols in RMCP+
The two supported Cipher suites for RMCP+ will be cipher Suite 3 and 17 after this change. The cipher suite 3 is the default choice for the ipmitoo
Remove the support for insecure protocols in RMCP+
The two supported Cipher suites for RMCP+ will be cipher Suite 3 and 17 after this change. The cipher suite 3 is the default choice for the ipmitool if the cipher suite is not explicitly mentioned.
The supported algorithms are the following:
Authentication: a) RAKP-HMAC-SHA1, b) RAKP-HMAC-SHA256 Integrity: a) HMAC-SHA1-9, b) HMAC-SHA256-128 Confidentiality: a) AES-CBC-128
Change-Id: Ia2fbaae29235e4bd43c42b59a2295a2db28efce3 Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
show more ...
|
#
7e9e2ef6 |
| 29-Nov-2017 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
Add support for cipher suite 17
cipher suite 17 uses RAKP_HMAC_SHA256 for authentication and RAKP_HMAC_SHA256_128 for integrity. This adds those in and fixes up the lookups so the stack knows about
Add support for cipher suite 17
cipher suite 17 uses RAKP_HMAC_SHA256 for authentication and RAKP_HMAC_SHA256_128 for integrity. This adds those in and fixes up the lookups so the stack knows about the new algorithms.
Change-Id: Icdc66563d08060fc0e541ceaf3bee9dd5f89fdb2 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
9b307be6 |
| 22-Nov-2017 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
Prepare for adding RMCP+ cipher suite 17
In many places, there are baked-in assumptions about algorithms that tie the session initiation to cipher suite 3. This commit teases out those assumptions a
Prepare for adding RMCP+ cipher suite 17
In many places, there are baked-in assumptions about algorithms that tie the session initiation to cipher suite 3. This commit teases out those assumptions and prepares for the next patch that actually adds in the new authentication and integrity algorithms to support cipher suite 17.
Change-Id: I2ee3672a7c503b89c5ff0aba30cf7a4601e24d04 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
70fd29cf |
| 30-Nov-2017 |
Vernon Mauery <vernon.mauery@linux.intel.com> |
explicit use of std::vector instead of buffer/Buffer
There were several scoped 'using buffer = std::vector<uint8_t>;' in header files. This consolidates the code base to use std::vector<uint8_t> ins
explicit use of std::vector instead of buffer/Buffer
There were several scoped 'using buffer = std::vector<uint8_t>;' in header files. This consolidates the code base to use std::vector<uint8_t> instead of buffer or Buffer. This makes the code easier to read and debug.
Change-Id: I918a0f6ca9b8e4b9d331175dccff45cbf4c8379d Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
show more ...
|
#
3563f8fe |
| 08-May-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Correct doxygen syntax in phosphor-net-ipmid
Resolves openbmc/openbmc#1147
Change-Id: I57ab1b09ec1bf308cc3d97cd30b2d18564beb38b Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
|
#
1e7aa196 |
| 24-Feb-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Validate Integrity Algorithm in Open Session Request command
Change-Id: I54106099fbbe50156529644eaadd65dc1db7e141 Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
|
#
d212a6dc |
| 10-Jan-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Implementation of HMAC-SHA1-96 Integrity Algorithm
Change-Id: Id301f0cb6e7cc9cde79385a18f3999d8d9c0feab Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
|
#
77531db5 |
| 10-Jan-2017 |
Tom Joseph <tomjoseph@in.ibm.com> |
Interface for the Integrity Algorithm
This patch defines the interfaces for the integrity algorithm. It provides the API to verify integrity data of the incoming packet and to generate integrity dat
Interface for the Integrity Algorithm
This patch defines the interfaces for the integrity algorithm. It provides the API to verify integrity data of the incoming packet and to generate integrity data for the outgoing packet.
Change-Id: Ibd645c0ab0d9f4ec26f085353d141f7a3262ab2e Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
show more ...
|