/openbmc/phosphor-net-ipmid/ |
H A D | message_parsers.hpp | 16 // RMCP Messages with class=IPMI should be sent with an RMCP Sequence 17 // Number of FFh to indicate that an RMCP ACK message should not be 21 // RMCP Message Class 7h is for IPMI 24 // RMCP Session Header Size 27 // RMCP/ASF Pong Message ASF Header Data Length 50 // RMCP Header 53 // RMCP Header 62 // RMCP Header 63 struct RmcpHeader_t rmcp; member 261 // ASF message fields for RMCP Ping message [all …]
|
H A D | message_parsers.cpp | 19 // Check if the packet has atleast the size of the RMCP Header in unflatten() 22 throw std::runtime_error("RMCP Header missing"); in unflatten() 27 // Verify if the fields in the RMCP header conforms to the specification in unflatten() 33 throw std::runtime_error("RMCP Header is invalid"); in unflatten() 39 throw std::runtime_error("RMCP Ping is not supported"); in unflatten() 119 static_cast<ClassOfMsg>(header->base.rmcp.classOfMsg); in unflatten() 144 header->base.rmcp.version = parser::RMCP_VERSION; in flatten() 145 header->base.rmcp.reserved = 0x00; in flatten() 146 header->base.rmcp.rmcpSeqNum = parser::RMCP_SEQ; in flatten() 147 header->base.rmcp.classOfMsg = static_cast<uint8_t>(ClassOfMsg::IPMI); in flatten() [all …]
|
H A D | message.hpp | 26 // RMCP Classes of Message as per section 13.1.3. 36 // RMCP Message Type as per section 13.1.3. 114 * Session packets are encapsulated in RMCP packets, which are encapsulated in 116 * Encapsulation Under RMCP). IPMI payload is a special class of data 145 // special behavior for rmcp+ session creation in Message() 257 * “Payloads” are a capability specified for RMCP+ that enable an IPMI 260 * Messages, messages for session setup under RMCP+, and the payload for
|
H A D | integrity_algo.cpp | 18 k1 = generateKn(sik, rmcp::const_1); in AlgoSHA1() 65 const rmcp::Const_n& const_n) const in generateKn() 84 k1 = generateKn(sik, rmcp::const_1); in AlgoSHA256() 131 const rmcp::Const_n& const_n) const in generateKn()
|
H A D | integrity_algo.hpp | 3 #include "rmcp.hpp" 20 * IPMI v2.0/RMCP+ messages once the session has been established. If the 114 * algorithm. Other implementations of the RMCP+ algorithm (ipmitool 132 const std::vector<uint8_t>& sik, const rmcp::Const_n& data) const = 0; 216 const rmcp::Const_n& const_n) const; 301 const rmcp::Const_n& const_n) const;
|
H A D | rmcp.hpp | 7 namespace rmcp namespace 34 } // namespace rmcp
|
H A D | meson.options | 12 description : 'Enable RMCP Ping support'
|
/openbmc/phosphor-net-ipmid/command/ |
H A D | channel_auth.hpp | 39 // Support OEM identified by the IANA OEM ID in RMCP+ ping response 50 // Support OEM identified by the IANA OEM ID in RMCP+ ping response 68 // Two key login status . only for IPMI V2.0 RMCP+ RAKP 75 // Two key login status . only for IPMI V2.0 RMCP+ RAKP 109 * v2.0 / RMCP+ packet format. It also provides information that the remote 113 * ‘session-less’ command that the BMC accepts in both IPMI v1.5 and v2.0/RMCP+ 131 * that support IPMI v2.0/RMCP+ sessions. This command can be executed prior to
|
H A D | open_session.hpp | 13 * IPMI Payload for RMCP+ Open Session Request 88 * IPMI Payload for RMCP+ Open Session Response 163 * @brief RMCP+ Open Session Request, RMCP+ Open Session Response 165 * The RMCP+ Open Session request and response messages are used to enable a
|
/openbmc/ipmitool/src/plugins/lan/ |
H A D | lan.c | 65 #include "rmcp.h" 273 /* the first read may return ECONNREFUSED because the rmcp ping in ipmi_lan_recv_packet() 317 * parse response RMCP "pong" packet 324 * udp.dest = ? // udp.source from rmcp-ping 327 * rmcp.ver = 0x06 // RMCP Version 1.0 328 * rmcp.__res = 0x00 // RESERVED 329 * rmcp.seq = 0xff // no RMCP ACK 330 * rmcp.class = 0x06 // RMCP_CLASS_ASF 333 * asf.tag = ? // asf.tag from rmcp-ping 354 "Received IPMI/RMCP response packet: \n" in ipmi_handle_pong() [all …]
|
H A D | rmcp.h | 50 { RMCP_TYPE_NORM, "Normal RMCP" }, 51 { RMCP_TYPE_ACK, "RMCP ACK" }, 70 /* RMCP message header */ 85 struct rmcp_hdr rmcp; member
|
/openbmc/ipmitool/src/plugins/lanplus/ |
H A D | README.sol | 9 functionality is built on top of the RMCP+ protocol as an additional 15 verifies that an RMCP+ session (lanplus interface) is being used to 17 established on a port different than the RMCP+ port that the "activate 67 Creation of RMCP+ packet
|
H A D | lanplus.c | 69 #include "rmcp.h" 133 .desc = "IPMI v2.0 RMCP+ LAN Interface", 430 /* the first read may return ECONNREFUSED because the rmcp ping in ipmi_lan_recv_packet() 476 * parse response RMCP "pong" packet 483 * udp.dest = ? // udp.source from rmcp-ping 486 * rmcp.ver = 0x06 // RMCP Version 1.0 487 * rmcp.__res = 0x00 // RESERVED 488 * rmcp.seq = 0xff // no RMCP ACK 489 * rmcp.class = 0x06 // RMCP_CLASS_ASF 492 * asf.tag = ? // asf.tag from rmcp-ping [all …]
|
H A D | rmcp.h | 49 { RMCP_TYPE_NORM, "Normal RMCP" }, 50 { RMCP_TYPE_ACK, "RMCP ACK" }, 66 /* RMCP message header */
|
H A D | lanplus_dump.c | 54 printf("%s RMCP+ status : %s\n", in lanplus_dump_open_session_response() 104 printf("%s RMCP+ status : %s\n", in lanplus_dump_rakp2_message() 161 printf("%s RMCP+ status : %s\n", in lanplus_dump_rakp4_message()
|
/openbmc/phosphor-net-ipmid/test/ |
H A D | cipher.cpp | 4 #include "rmcp.hpp" 20 // Packet = RMCP Session Header (4 bytes) + Packet (8 bytes) in TEST() 41 constexpr rmcp::Const_n const1 = {0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, in TEST() 81 // Packet = RMCP Session Header (4 bytes) + Packet (8 bytes) in TEST() 89 constexpr rmcp::Const_n const1 = {0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, in TEST() 145 // Packet = RMCP Session Header (4 bytes) + Packet (8 bytes) in TEST() 181 // Packet = RMCP Session Header (4 bytes) + Packet (8 bytes) in TEST() 204 constexpr rmcp::Const_n const1 = {0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, in TEST() 244 // Packet = RMCP Session Header (4 bytes) + Packet (8 bytes) in TEST() 253 constexpr rmcp::Const_n const1 = {0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, in TEST() [all …]
|
/openbmc/ipmitool/include/ipmitool/ |
H A D | ipmi_lanp.h | 105 { IPMI_LANP_PRI_RMCP_PORT, 2, "Primary RMCP Port", NULL, 0 }, 106 { IPMI_LANP_SEC_RMCP_PORT, 2, "Secondary RMCP Port", NULL, 0 }, 119 { IPMI_LANP_RMCP_CIPHER_SUPPORT,1, "RMCP+ Cipher Suite Count", NULL, 0 }, 120 { IPMI_LANP_RMCP_CIPHERS, 16, "RMCP+ Cipher Suites", NULL, 0 },
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Ipmi/ |
H A D | SESSION_README.md | 5 IPMI RMCP+ sessions are created and maintained by phosphor-ipmi-net daemon, 7 Hence IPMI RMCP+ session details has to be exposed through D-Bus interface, so
|
H A D | SessionInfo.interface.yaml | 2 Provides properties for IPMI RMCP+ session objects. Provides RMCP+ session
|
/openbmc/ipmitool/ |
H A D | README | 101 Protocol (RMCP) packets which are then transferred as UDP datagrams. 104 specification. The RMCP packet format is defined by the Alert Standard 105 Forum, and it has been followed up with the RMCP+ protocol that adds 107 accordingly to to support the RMCP+ protocol and brings with it enhanced 254 -p port Remote RMCP port [default=623] 269 lanplus IPMI v2.0 RMCP+ LAN Interface 341 port <port> Remote RMCP port
|
/openbmc/openbmc/meta-phosphor/recipes-phosphor/ipmi/ |
H A D | phosphor-ipmi-net_git.bb | 36 PACKAGECONFIG ??= "pam-authenticate rmcp-ping" 37 PACKAGECONFIG[rmcp-ping] = "-Drmcp_ping=enabled,-Drmcp_ping=disabled"
|
/openbmc/phosphor-host-ipmid/user_channel/ |
H A D | usercommands.cpp | 373 * - rmcpAuthTypes - RMCP auth types (IPMI 1.5) 383 * - rmcp - RMCP (IPMI 1.5) connection support 384 * - rmcpp - RMCP+ (IPMI 2.0) connection support 400 bool, // rmcp 437 constexpr bool rmcp = false; // IPMI 1.5 - not supported in ipmiGetChannelAuthenticationCapabilities() local 449 rmcp, rmcpp, reserved5, oemID, oemAuxillary); in ipmiGetChannelAuthenticationCapabilities()
|
/openbmc/openbmc/meta-ampere/meta-common/recipes-phosphor/ipmi/ |
H A D | phosphor-ipmi-net_%.bbappend | 3 PACKAGECONFIG:remove = "rmcp-ping"
|
/openbmc/docs/architecture/ |
H A D | ipmi-architecture.md | 26 | LAN - RMCP+ | | | 73 fields from whatever transport format (RMCP+, IPMB, KCS, etc.) For session-based 74 channels (RMCP+) the bridge is responsible for establishing the session with 116 handle session (RMCP+) and SOL commands and responses to those commands. Get/Set
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_oem.c | 55 .desc = "Intel IPMI 2.0 BMC with RMCP+ communication support", 68 .desc = "Intel 82571 MAC with integrated RMCP+ support in super pass-through mode",
|