/openbmc/phosphor-net-ipmid/ |
H A D | message.hpp | 13 enum class PayloadType : uint8_t enum 124 payloadType(PayloadType::INVALID), in Message() 142 payloadType(other.payloadType), rcSessionID(other.rcSessionID), in Message() 146 if (PayloadType::OPEN_SESSION_REQUEST == other.payloadType) in Message() 148 payloadType = PayloadType::OPEN_SESSION_RESPONSE; in Message() 150 else if (PayloadType::RAKP1 == other.payloadType) in Message() 152 payloadType = PayloadType::RAKP2; in Message() 154 else if (PayloadType::RAKP3 == other.payloadType) in Message() 156 payloadType = PayloadType::RAKP4; in Message() 173 command |= (static_cast<uint32_t>(payloadType) << 16); in getCommand() [all …]
|
H A D | comm_module.cpp | 22 {{(static_cast<uint32_t>(message::PayloadType::OPEN_SESSION_REQUEST) in sessionSetupCommands() 28 {{(static_cast<uint32_t>(message::PayloadType::RAKP1) << 16)}, in sessionSetupCommands() 33 {{(static_cast<uint32_t>(message::PayloadType::RAKP3) << 16)}, in sessionSetupCommands() 38 {{(static_cast<uint32_t>(message::PayloadType::IPMI) << 16) | in sessionSetupCommands() 44 {{(static_cast<uint32_t>(message::PayloadType::IPMI) << 16) | in sessionSetupCommands() 50 {{(static_cast<uint32_t>(message::PayloadType::IPMI) << 16) | in sessionSetupCommands() 56 {{(static_cast<uint32_t>(message::PayloadType::IPMI) << 16) | in sessionSetupCommands()
|
H A D | sol_module.cpp | 16 {{(static_cast<uint32_t>(message::PayloadType::SOL) << 16)}, in registerCommands() 21 {{(static_cast<uint32_t>(message::PayloadType::IPMI) << 16) | in registerCommands() 27 {{(static_cast<uint32_t>(message::PayloadType::IPMI) << 16) | in registerCommands() 33 {{(static_cast<uint32_t>(message::PayloadType::IPMI) << 16) | in registerCommands() 39 {{(static_cast<uint32_t>(message::PayloadType::IPMI) << 16) | in registerCommands()
|
H A D | message_parsers.cpp | 113 message->payloadType = PayloadType::IPMI; in unflatten() 193 message->payloadType = static_cast<PayloadType>(header->payloadType & 0x3F); in unflatten() 197 ((header->payloadType & PAYLOAD_ENCRYPT_MASK) ? true : false); in unflatten() 199 ((header->payloadType & PAYLOAD_AUTH_MASK) ? true : false); in unflatten() 260 header->payloadType = static_cast<uint8_t>(outMessage->payloadType); in flatten() 271 header->payloadType |= PAYLOAD_ENCRYPT_MASK; in flatten() 293 header->payloadType |= PAYLOAD_AUTH_MASK; in flatten() 426 message->payloadType = PayloadType::IPMI; in unflatten()
|
H A D | message_handler.cpp | 110 if (inMessage->payloadType == PayloadType::IPMI) in executeCommand() 112 // Process PayloadType::IPMI only if ipmi is enabled or for sessionless in executeCommand() 180 outMessage->payloadType = PayloadType::SOL; in sendSOLPayload() 194 outMessage->payloadType = PayloadType::IPMI; in sendUnsolicitedIPMIPayload()
|
H A D | message_parsers.hpp | 153 uint8_t payloadType; member
|
/openbmc/phosphor-host-ipmid/user_channel/ |
H A D | channel_layer.cpp | 142 bool isValidPayloadType(const PayloadType payloadType) in isValidPayloadType() argument 145 payloadType == PayloadType::IPMI || payloadType == PayloadType::SOL || in isValidPayloadType() 146 payloadType == PayloadType::OPEN_SESSION_REQUEST || in isValidPayloadType() 147 payloadType == PayloadType::OPEN_SESSION_RESPONSE || in isValidPayloadType() 148 payloadType == PayloadType::RAKP1 || in isValidPayloadType() 149 payloadType == PayloadType::RAKP2 || in isValidPayloadType() 150 payloadType == PayloadType::RAKP3 || payloadType == PayloadType::RAKP4); in isValidPayloadType()
|
H A D | channelcommands.cpp | 294 constexpr uint16_t standardPayloadBit(PayloadType p) in standardPayloadBit() 299 constexpr uint16_t sessionPayloadBit(PayloadType p) in sessionPayloadBit() 302 static_cast<size_t>(PayloadType::OPEN_SESSION_REQUEST); in sessionPayloadBit() 341 constexpr uint16_t stdPayloadType = standardPayloadBit(PayloadType::IPMI) | in ipmiGetChannelPayloadSupport() 342 standardPayloadBit(PayloadType::SOL); in ipmiGetChannelPayloadSupport() 344 sessionPayloadBit(PayloadType::OPEN_SESSION_REQUEST) | in ipmiGetChannelPayloadSupport() 345 sessionPayloadBit(PayloadType::OPEN_SESSION_RESPONSE) | in ipmiGetChannelPayloadSupport() 346 sessionPayloadBit(PayloadType::RAKP1) | in ipmiGetChannelPayloadSupport() 347 sessionPayloadBit(PayloadType::RAKP2) | in ipmiGetChannelPayloadSupport() 348 sessionPayloadBit(PayloadType::RAKP3) | in ipmiGetChannelPayloadSupport() [all …]
|
H A D | channel_layer.hpp | 115 // TODO: Remove duplicate 'PayloadType' definition from netipmid's message.hpp 120 enum class PayloadType : uint8_t enum 372 bool isValidPayloadType(const PayloadType payloadType);
|
H A D | user_mgmt.cpp | 1171 .stdPayloadEnables1[static_cast<uint8_t>(ipmi::PayloadType::SOL)] = in updatePayloadAccessInUserInfo() 1172 stdPayload[static_cast<uint8_t>(ipmi::PayloadType::SOL)][chIndex]; in updatePayloadAccessInUserInfo() 1260 stdPayload[static_cast<uint8_t>(ipmi::PayloadType::SOL)].fill(true); in readUserData() 1581 ipmi::PayloadType::SOL)] = true; in cacheUserDataFile()
|
/openbmc/intel-ipmi-oem/src/ |
H A D | biosconfigcommands.cpp | 314 uint8_t payloadType = static_cast<uint8_t>(ipmi::PType::IntelXMLType1); in updatePayloadInfo() local 315 auto& payloadInfo = gNVOOBdata.payloadInfo[payloadType]; in updatePayloadInfo() 328 payloadInfo.payloadType = payloadType; in updatePayloadInfo() 568 uint8_t payloadType) in generateAndSendAttributesData() argument 574 gNVOOBdata.payloadInfo[payloadType].payloadStatus = in generateAndSendAttributesData() 586 gNVOOBdata.payloadInfo[payloadType].payloadStatus = in generateAndSendAttributesData() 593 gNVOOBdata.payloadInfo[payloadType].payloadStatus = in generateAndSendAttributesData() 613 static void cleanUpPayloadFile(uint8_t& payloadType) in cleanUpPayloadFile() argument 616 std::string FilePath = "/var/oob/temp" + std::to_string(payloadType); in cleanUpPayloadFile() 618 FilePath = "/var/oob/Payload" + std::to_string(payloadType); in cleanUpPayloadFile() [all …]
|
/openbmc/phosphor-net-ipmid/command/ |
H A D | payload_cmds.cpp | 36 if (static_cast<uint8_t>(message::PayloadType::SOL) != request->payloadType) in activatePayload() 79 message::PayloadType::SOL)])) in activatePayload() 136 if (static_cast<uint8_t>(message::PayloadType::SOL) != request->payloadType) in deactivatePayload() 222 if (static_cast<uint8_t>(message::PayloadType::SOL) != request->payloadType) in getPayloadStatus() 258 if (static_cast<uint8_t>(message::PayloadType::SOL) != in getPayloadInfo() 259 request->payloadType || in getPayloadInfo()
|
H A D | payload_cmds.hpp | 26 uint8_t payloadType:6; //!< Payload type. member 32 uint8_t payloadType:6; //!< Payload type. member 125 uint8_t payloadType:6; //!< Payload type. member 131 uint8_t payloadType:6; //!< Reserved. member 186 uint8_t payloadType; //!< Payload type member 265 uint8_t payloadType; //!< Payload type member
|
H A D | channel_auth.cpp | 210 uint8_t payloadType = inPayload[1] & payloadMask; in getChannelCipherSuites() local 211 if (payloadType != inPayload[1]) in getChannelCipherSuites() 235 if (!ipmi::isValidPayloadType(static_cast<ipmi::PayloadType>(payloadType))) in getChannelCipherSuites()
|
/openbmc/phosphor-host-ipmid/app/ |
H A D | channel.cpp | 104 * @ param payloadType - payload type 116 uint4_t reserved1, uint8_t payloadType, in getChannelCipherSuites() argument 131 if (!ipmi::isValidPayloadType(static_cast<ipmi::PayloadType>(payloadType))) in getChannelCipherSuites()
|
H A D | channel.hpp | 10 * @ param payloadType - payload type 22 uint4_t reserved1, uint8_t payloadType,
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/BIOSConfig/ |
H A D | Password.interface.yaml | 4 /xyz/openbmc_project/biosconfigMgr/<PayloadType>. Password interface is used
|
/openbmc/intel-ipmi-oem/include/ |
H A D | biosconfigcommands.hpp | 72 uint8_t payloadType; member
|
/openbmc/ipmitool/src/plugins/lanplus/ |
H A D | lanplus.c | 686 if (rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_IPMI) { in ipmi_lan_poll_single() 700 val2str(rsp->session.payloadtype, plus_payload_types_vals)); in ipmi_lan_poll_single() 794 } else if (rsp->session.payloadtype == in ipmi_lan_poll_single() 807 } else if (rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_RAKP_2) { in ipmi_lan_poll_single() 817 } else if (rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_RAKP_4) { in ipmi_lan_poll_single() 827 } else if (rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_SOL) { in ipmi_lan_poll_single() 849 rsp->session.payloadtype); in ipmi_lan_poll_single() 1155 rsp->session.payloadtype = rsp->data[(*offset)++] & 0x3F; in read_session_data_v2x() 1216 rsp->session.payloadtype = IPMI_PAYLOAD_TYPE_IPMI; in read_session_data_v15() 1557 * | session.payloadtype | [all …]
|
/openbmc/ipmitool/include/ipmitool/ |
H A D | ipmi.h | 178 uint8_t payloadtype; /* IPMI v2 only */ member
|
/openbmc/ipmitool/src/plugins/lan/ |
H A D | lan.c | 495 rsp->session.payloadtype = IPMI_PAYLOAD_TYPE_SOL; in ipmi_lan_poll_recv() 552 rsp->session.payloadtype = IPMI_PAYLOAD_TYPE_IPMI; in ipmi_lan_poll_recv() 655 if (rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_IPMI) in ipmi_lan_poll_recv() 1227 (rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_SOL)); in is_sol_packet() 1453 (rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_SOL)) in check_sol_packet_for_new_data() 1502 (rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_SOL) && in ack_sol_packet()
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_isol.c | 551 else if ((rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_SOL) && in processiSolUserInput()
|
H A D | ipmi_sol.c | 1269 (rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_SOL)) in output() 1468 (rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_SOL) && in processSolUserInput()
|