xref: /openbmc/ipmitool/src/plugins/lanplus/lanplus_strings.c (revision c18ec02f3304ce2a889a50e378f07a4168af3884)
1*c18ec02fSPetter Reinholdtsen #include "lanplus.h"
2*c18ec02fSPetter Reinholdtsen #include "ipmitool/ipmi_constants.h"
3*c18ec02fSPetter Reinholdtsen 
4*c18ec02fSPetter Reinholdtsen const struct valstr ipmi_rakp_return_codes[] = {
5*c18ec02fSPetter Reinholdtsen 
6*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_NO_ERRORS,                          "no errors"                           },
7*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_INSUFFICIENT_RESOURCES_FOR_SESSION, "insufficient resources for session"  },
8*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_INVALID_SESSION_ID,                 "invalid session ID"                  },
9*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_INVALID_PAYLOAD_TYPE,               "invalid payload type"                },
10*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_INVALID_AUTHENTICATION_ALGORITHM,   "invalid authentication algorithm"    },
11*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_INVALID_INTEGRITTY_ALGORITHM,       "invalid integrity algorithm"         },
12*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_NO_MATCHING_AUTHENTICATION_PAYLOAD, "no matching authentication algorithm"},
13*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_NO_MATCHING_INTEGRITY_PAYLOAD,      "no matching integrity payload"       },
14*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_INACTIVE_SESSION_ID,                "inactive session ID"                 },
15*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_INVALID_ROLE,                       "invalid role"                        },
16*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_UNAUTHORIZED_ROLE_REQUESTED,        "unauthorized role requested"         },
17*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_INSUFFICIENT_RESOURCES_FOR_ROLE,    "insufficient resources for role"     },
18*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_INVALID_NAME_LENGTH,                "invalid name length"                 },
19*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_UNAUTHORIZED_NAME,                  "unauthorized name"                   },
20*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_UNAUTHORIZED_GUID,                  "unauthorized GUID"                   },
21*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_INVALID_INTEGRITY_CHECK_VALUE,      "invalid integrity check value"       },
22*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_INVALID_CONFIDENTIALITY_ALGORITHM,  "invalid confidentiality algorithm"   },
23*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_NO_CIPHER_SUITE_MATCH,              "no matching cipher suite"            },
24*c18ec02fSPetter Reinholdtsen 	{ IPMI_RAKP_STATUS_ILLEGAL_PARAMTER,                   "illegal parameter"                   },
25*c18ec02fSPetter Reinholdtsen 	{ 0,                                                   0                                     },
26*c18ec02fSPetter Reinholdtsen };
27*c18ec02fSPetter Reinholdtsen 
28*c18ec02fSPetter Reinholdtsen 
29*c18ec02fSPetter Reinholdtsen const struct valstr ipmi_priv_levels[] = {
30*c18ec02fSPetter Reinholdtsen 	{ IPMI_PRIV_CALLBACK, "callback" },
31*c18ec02fSPetter Reinholdtsen 	{ IPMI_PRIV_USER,     "user"     },
32*c18ec02fSPetter Reinholdtsen 	{ IPMI_PRIV_OPERATOR, "operator" },
33*c18ec02fSPetter Reinholdtsen 	{ IPMI_PRIV_ADMIN,    "admin"    },
34*c18ec02fSPetter Reinholdtsen 	{ IPMI_PRIV_OEM,      "oem"      },
35*c18ec02fSPetter Reinholdtsen 	{ 0,                  0          },
36*c18ec02fSPetter Reinholdtsen };
37*c18ec02fSPetter Reinholdtsen 
38*c18ec02fSPetter Reinholdtsen 
39*c18ec02fSPetter Reinholdtsen 
40