mirror of
https://github.com/xcat2/xcat-dep.git
synced 2024-11-21 09:01:46 +00:00
Rebuild ipmitool-xcat for EL9
This commit is contained in:
parent
20a19acd10
commit
21dd7853de
40
ipmitool/0008-add-extern.patch
Normal file
40
ipmitool/0008-add-extern.patch
Normal file
@ -0,0 +1,40 @@
|
||||
From 95f666fa10c32233ee202d8b99d05b5e13528a25 Mon Sep 17 00:00:00 2001
|
||||
From: Vaclav Dolezal <vdolezal@redhat.com>
|
||||
Date: Thu, 23 Jan 2020 11:26:32 +0100
|
||||
Subject: [PATCH] hpmfwupg: move variable definition to .c file
|
||||
|
||||
Signed-off-by: Vaclav Dolezal <vdolezal@redhat.com>
|
||||
---
|
||||
include/ipmitool/ipmi_hpmfwupg.h | 2 +-
|
||||
lib/ipmi_hpmfwupg.c | 2 ++
|
||||
2 files changed, 3 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/include/ipmitool/ipmi_hpmfwupg.h b/include/ipmitool/ipmi_hpmfwupg.h
|
||||
index de65292..07f597b 100644
|
||||
--- a/include/ipmitool/ipmi_hpmfwupg.h
|
||||
+++ b/include/ipmitool/ipmi_hpmfwupg.h
|
||||
@@ -800,7 +800,7 @@ typedef struct _VERSIONINFO {
|
||||
char descString[HPMFWUPG_DESC_STRING_LENGTH + 1];
|
||||
}VERSIONINFO, *PVERSIONINFO;
|
||||
|
||||
-VERSIONINFO gVersionInfo[HPMFWUPG_COMPONENT_ID_MAX];
|
||||
+extern VERSIONINFO gVersionInfo[HPMFWUPG_COMPONENT_ID_MAX];
|
||||
|
||||
#define TARGET_VER (0x01)
|
||||
#define ROLLBACK_VER (0x02)
|
||||
diff --git a/lib/ipmi_hpmfwupg.c b/lib/ipmi_hpmfwupg.c
|
||||
index bbcffc0..d7cdcd6 100644
|
||||
--- a/lib/ipmi_hpmfwupg.c
|
||||
+++ b/lib/ipmi_hpmfwupg.c
|
||||
@@ -58,6 +58,8 @@ ipmi_intf_get_max_request_data_size(struct ipmi_intf * intf);
|
||||
|
||||
extern int verbose;
|
||||
|
||||
+VERSIONINFO gVersionInfo[HPMFWUPG_COMPONENT_ID_MAX];
|
||||
+
|
||||
int HpmfwupgUpgrade(struct ipmi_intf *intf, char *imageFilename,
|
||||
int activate, int, int);
|
||||
int HpmfwupgValidateImageIntegrity(struct HpmfwupgUpgradeCtx *pFwupgCtx);
|
||||
--
|
||||
2.20.1
|
||||
|
864
ipmitool/0009-best-cipher.patch
Normal file
864
ipmitool/0009-best-cipher.patch
Normal file
@ -0,0 +1,864 @@
|
||||
From f2df2aa5a010544d53589a5b048677406eb40ee8 Mon Sep 17 00:00:00 2001
|
||||
From: Vernon Mauery <vernon.mauery@intel.com>
|
||||
Date: Mon, 9 Apr 2018 12:28:57 -0700
|
||||
Subject: [PATCH] lanplus: Auto-select 'best' cipher suite available
|
||||
|
||||
Current cipher suites could be ranked as this:
|
||||
17 > 3 >> all the rest
|
||||
|
||||
Cherry-picked-from: 7772254b62826b894ca629df8c597030a98f4f72
|
||||
Cherry-picked-from: f9c699c712f884c82fc1a62f1f61a8d597ac0cfd
|
||||
|
||||
Also fetched some functions/macros for helper.h
|
||||
|
||||
Equals to getting include/ipmitool/helper.h changes from commits:
|
||||
(oldest first)
|
||||
|
||||
6c00d44 mc: watchdog get: Update to match IPMI 2.0 spec
|
||||
e8e94d8 mc: watchdog set: Refactor to reduce complexity
|
||||
0310208 mc: Code refactor to reduce copy-paste ratio
|
||||
249e092 general: Make byteswapping arch-independent
|
||||
5491b12 refix 249e0929: Fix byteswapping helpers
|
||||
bb1a4cc Refactoring. Improve code reuse ratio.
|
||||
---
|
||||
include/ipmitool/helper.h | 58 ++++++++
|
||||
include/ipmitool/ipmi_channel.h | 47 +++++++
|
||||
include/ipmitool/ipmi_intf.h | 39 ++++-
|
||||
lib/ipmi_channel.c | 242 +++++++++++++++-----------------
|
||||
lib/ipmi_main.c | 23 +--
|
||||
src/plugins/ipmi_intf.c | 5 +-
|
||||
src/plugins/lanplus/lanplus.c | 114 +++++++++++----
|
||||
7 files changed, 360 insertions(+), 168 deletions(-)
|
||||
|
||||
diff --git a/include/ipmitool/helper.h b/include/ipmitool/helper.h
|
||||
index c53736f..6a2e5f4 100644
|
||||
--- a/include/ipmitool/helper.h
|
||||
+++ b/include/ipmitool/helper.h
|
||||
@@ -38,6 +38,8 @@
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
|
||||
+#define ARRAY_SIZE(a) (sizeof(a) / sizeof(a[0]))
|
||||
+
|
||||
#ifndef TRUE
|
||||
#define TRUE 1
|
||||
#endif
|
||||
@@ -111,6 +113,62 @@ FILE * ipmi_open_file(const char * file, int rw);
|
||||
void ipmi_start_daemon(struct ipmi_intf *intf);
|
||||
uint16_t ipmi_get_oem_id(struct ipmi_intf *intf);
|
||||
|
||||
+#define IS_SET(v, b) ((v) & (1 << (b)))
|
||||
+
|
||||
+/* le16toh(), hto16le(), et. al. don't exist for Windows or Apple */
|
||||
+/* For portability, let's simply define our own versions here */
|
||||
+
|
||||
+/* IPMI is always little-endian */
|
||||
+static inline uint16_t ipmi16toh(void *ipmi16)
|
||||
+{
|
||||
+ uint8_t *ipmi = (uint8_t *)ipmi16;
|
||||
+ uint16_t h;
|
||||
+
|
||||
+ h = ipmi[1] << 8; /* MSB */
|
||||
+ h |= ipmi[0]; /* LSB */
|
||||
+
|
||||
+ return h;
|
||||
+}
|
||||
+
|
||||
+static inline void htoipmi16(uint16_t h, uint8_t *ipmi)
|
||||
+{
|
||||
+ ipmi[0] = h & 0xFF; /* LSB */
|
||||
+ ipmi[1] = h >> 8; /* MSB */
|
||||
+}
|
||||
+
|
||||
+static inline uint32_t ipmi24toh(void *ipmi24)
|
||||
+{
|
||||
+ uint8_t *ipmi = (uint8_t *)ipmi24;
|
||||
+ uint32_t h = 0;
|
||||
+
|
||||
+ h = ipmi[2] << 16; /* MSB */
|
||||
+ h |= ipmi[1] << 8;
|
||||
+ h |= ipmi[0]; /* LSB */
|
||||
+
|
||||
+ return h;
|
||||
+}
|
||||
+
|
||||
+static inline uint32_t ipmi32toh(void *ipmi32)
|
||||
+{
|
||||
+ uint8_t *ipmi = ipmi32;
|
||||
+ uint32_t h;
|
||||
+
|
||||
+ h = ipmi[3] << 24; /* MSB */
|
||||
+ h |= ipmi[2] << 16;
|
||||
+ h |= ipmi[1] << 8;
|
||||
+ h |= ipmi[0]; /* LSB */
|
||||
+
|
||||
+ return h;
|
||||
+}
|
||||
+
|
||||
+static inline void htoipmi32(uint32_t h, uint8_t *ipmi)
|
||||
+{
|
||||
+ ipmi[0] = h & 0xFF; /* LSB */
|
||||
+ ipmi[1] = (h >> 8) & 0xFF;
|
||||
+ ipmi[2] = (h >> 16) & 0xFF;
|
||||
+ ipmi[3] = (h >> 24) & 0xFF; /* MSB */
|
||||
+}
|
||||
+
|
||||
#define ipmi_open_file_read(file) ipmi_open_file(file, 0)
|
||||
#define ipmi_open_file_write(file) ipmi_open_file(file, 1)
|
||||
|
||||
diff --git a/include/ipmitool/ipmi_channel.h b/include/ipmitool/ipmi_channel.h
|
||||
index 3ade2d5..324c0bb 100644
|
||||
--- a/include/ipmitool/ipmi_channel.h
|
||||
+++ b/include/ipmitool/ipmi_channel.h
|
||||
@@ -37,6 +37,7 @@
|
||||
# include <config.h>
|
||||
#endif
|
||||
#include <ipmitool/ipmi.h>
|
||||
+#include <ipmitool/ipmi_intf.h>
|
||||
|
||||
|
||||
#define IPMI_GET_CHANNEL_AUTH_CAP 0x38
|
||||
@@ -81,6 +82,50 @@ struct channel_access_t {
|
||||
uint8_t user_level_auth;
|
||||
};
|
||||
|
||||
+/*
|
||||
+ * The Cipher Suite Record Format from table 22-18 of the IPMI v2.0 spec
|
||||
+ */
|
||||
+enum cipher_suite_format_tag {
|
||||
+ STANDARD_CIPHER_SUITE = 0xc0,
|
||||
+ OEM_CIPHER_SUITE = 0xc1,
|
||||
+};
|
||||
+#ifdef HAVE_PRAGMA_PACK
|
||||
+#pragma pack(1)
|
||||
+#endif
|
||||
+struct std_cipher_suite_record_t {
|
||||
+ uint8_t start_of_record;
|
||||
+ uint8_t cipher_suite_id;
|
||||
+ uint8_t auth_alg;
|
||||
+ uint8_t integrity_alg;
|
||||
+ uint8_t crypt_alg;
|
||||
+} ATTRIBUTE_PACKING;
|
||||
+struct oem_cipher_suite_record_t {
|
||||
+ uint8_t start_of_record;
|
||||
+ uint8_t cipher_suite_id;
|
||||
+ uint8_t iana[3];
|
||||
+ uint8_t auth_alg;
|
||||
+ uint8_t integrity_alg;
|
||||
+ uint8_t crypt_alg;
|
||||
+} ATTRIBUTE_PACKING;
|
||||
+#ifdef HAVE_PRAGMA_PACK
|
||||
+#pragma pack(0)
|
||||
+#endif
|
||||
+#define CIPHER_ALG_MASK 0x3f
|
||||
+#define MAX_CIPHER_SUITE_RECORD_OFFSET 0x40
|
||||
+#define MAX_CIPHER_SUITE_DATA_LEN 0x10
|
||||
+#define LIST_ALGORITHMS_BY_CIPHER_SUITE 0x80
|
||||
+
|
||||
+/* Below is the theoretical maximum number of cipher suites that could be
|
||||
+ * reported by a BMC. That is with the Get Channel Cipher Suites Command, at 16
|
||||
+ * bytes at a time and 0x40 requests, it can report 1024 bytes, which is about
|
||||
+ * 204 standard records or 128 OEM records. Really, we probably don't need more
|
||||
+ * than about 20, which is the full set of standard records plus a few OEM
|
||||
+ * records.
|
||||
+ */
|
||||
+#define MAX_CIPHER_SUITE_COUNT (MAX_CIPHER_SUITE_RECORD_OFFSET * \
|
||||
+ MAX_CIPHER_SUITE_DATA_LEN / \
|
||||
+ sizeof(struct std_cipher_suite_record_t))
|
||||
+
|
||||
/*
|
||||
* The Get Authentication Capabilities response structure
|
||||
* From table 22-15 of the IPMI v2.0 spec
|
||||
@@ -135,6 +180,8 @@ struct get_channel_auth_cap_rsp {
|
||||
int _ipmi_get_channel_access(struct ipmi_intf *intf,
|
||||
struct channel_access_t *channel_access,
|
||||
uint8_t get_volatile_settings);
|
||||
+int ipmi_get_channel_cipher_suites(struct ipmi_intf *intf, const char *payload_type,
|
||||
+ uint8_t channel, struct cipher_suite_info *suites, size_t *count);
|
||||
int _ipmi_get_channel_info(struct ipmi_intf *intf,
|
||||
struct channel_info_t *channel_info);
|
||||
int _ipmi_set_channel_access(struct ipmi_intf *intf,
|
||||
diff --git a/include/ipmitool/ipmi_intf.h b/include/ipmitool/ipmi_intf.h
|
||||
index 0b8c64b..7a07d66 100644
|
||||
--- a/include/ipmitool/ipmi_intf.h
|
||||
+++ b/include/ipmitool/ipmi_intf.h
|
||||
@@ -61,13 +61,45 @@ enum LANPLUS_SESSION_STATE {
|
||||
#define IPMI_AUTHCODE_BUFFER_SIZE 20
|
||||
#define IPMI_SIK_BUFFER_SIZE IPMI_MAX_MD_SIZE
|
||||
|
||||
+enum cipher_suite_ids {
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_0 = 0,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_1 = 1,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_2 = 2,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_3 = 3,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_4 = 4,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_5 = 5,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_6 = 6,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_7 = 7,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_8 = 8,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_9 = 9,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_10 = 10,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_11 = 11,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_12 = 12,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_13 = 13,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_14 = 14,
|
||||
+#ifdef HAVE_CRYPTO_SHA256
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_15 = 15,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_16 = 16,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_17 = 17,
|
||||
+#endif /* HAVE_CRYPTO_SHA256 */
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_RESERVED = 0xff,
|
||||
+};
|
||||
+
|
||||
+struct cipher_suite_info {
|
||||
+ enum cipher_suite_ids cipher_suite_id;
|
||||
+ uint8_t auth_alg;
|
||||
+ uint8_t integrity_alg;
|
||||
+ uint8_t crypt_alg;
|
||||
+ uint32_t iana;
|
||||
+};
|
||||
+
|
||||
struct ipmi_session_params {
|
||||
char * hostname;
|
||||
uint8_t username[17];
|
||||
uint8_t authcode_set[IPMI_AUTHCODE_BUFFER_SIZE + 1];
|
||||
uint8_t authtype_set;
|
||||
uint8_t privlvl;
|
||||
- uint8_t cipher_suite_id;
|
||||
+ enum cipher_suite_ids cipher_suite_id;
|
||||
char sol_escape_char;
|
||||
int password;
|
||||
int port;
|
||||
@@ -217,7 +249,10 @@ void ipmi_intf_session_set_username(struct ipmi_intf * intf, char * username);
|
||||
void ipmi_intf_session_set_password(struct ipmi_intf * intf, char * password);
|
||||
void ipmi_intf_session_set_privlvl(struct ipmi_intf * intf, uint8_t privlvl);
|
||||
void ipmi_intf_session_set_lookupbit(struct ipmi_intf * intf, uint8_t lookupbit);
|
||||
-void ipmi_intf_session_set_cipher_suite_id(struct ipmi_intf * intf, uint8_t cipher_suite_id);
|
||||
+#ifdef IPMI_INTF_LANPLUS
|
||||
+void ipmi_intf_session_set_cipher_suite_id(struct ipmi_intf * intf,
|
||||
+ enum cipher_suite_ids cipher_suite_id);
|
||||
+#endif /* IPMI_INTF_LANPLUS */
|
||||
void ipmi_intf_session_set_sol_escape_char(struct ipmi_intf * intf, char sol_escape_char);
|
||||
void ipmi_intf_session_set_kgkey(struct ipmi_intf *intf, const uint8_t *kgkey);
|
||||
void ipmi_intf_session_set_port(struct ipmi_intf * intf, int port);
|
||||
diff --git a/lib/ipmi_channel.c b/lib/ipmi_channel.c
|
||||
index e1fc75f..3ae3104 100644
|
||||
--- a/lib/ipmi_channel.c
|
||||
+++ b/lib/ipmi_channel.c
|
||||
@@ -342,86 +342,116 @@ ipmi_get_channel_auth_cap(struct ipmi_intf *intf, uint8_t channel, uint8_t priv)
|
||||
return 0;
|
||||
}
|
||||
|
||||
-static int
|
||||
+static size_t
|
||||
+parse_channel_cipher_suite_data(uint8_t *cipher_suite_data, size_t data_len,
|
||||
+ struct cipher_suite_info* suites, size_t nr_suites)
|
||||
+{
|
||||
+ size_t count = 0;
|
||||
+ size_t offset = 0;
|
||||
+ uint32_t iana;
|
||||
+ uint8_t auth_alg, integrity_alg, crypt_alg;
|
||||
+ uint8_t cipher_suite_id;
|
||||
+
|
||||
+ memset(suites, 0, sizeof(*suites) * nr_suites);
|
||||
+
|
||||
+ while (offset < data_len && count < nr_suites) {
|
||||
+ auth_alg = IPMI_AUTH_RAKP_NONE;
|
||||
+ integrity_alg = IPMI_INTEGRITY_NONE;
|
||||
+ crypt_alg = IPMI_CRYPT_NONE;
|
||||
+ if (cipher_suite_data[offset] == STANDARD_CIPHER_SUITE) {
|
||||
+ struct std_cipher_suite_record_t *record =
|
||||
+ (struct std_cipher_suite_record_t*)(&cipher_suite_data[offset]);
|
||||
+ /* standard type */
|
||||
+ iana = 0;
|
||||
+
|
||||
+ /* Verify that we have at least a full record left; id + 3 algs */
|
||||
+ if ((data_len - offset) < sizeof(*record)) {
|
||||
+ lprintf(LOG_INFO, "Incomplete data record in cipher suite data");
|
||||
+ break;
|
||||
+ }
|
||||
+ cipher_suite_id = record->cipher_suite_id;
|
||||
+ auth_alg = CIPHER_ALG_MASK & record->auth_alg;
|
||||
+ integrity_alg = CIPHER_ALG_MASK & record->integrity_alg;
|
||||
+ crypt_alg = CIPHER_ALG_MASK & record->crypt_alg;
|
||||
+ offset += sizeof(*record);
|
||||
+ } else if (cipher_suite_data[offset] == OEM_CIPHER_SUITE) {
|
||||
+ /* OEM record type */
|
||||
+ struct oem_cipher_suite_record_t *record =
|
||||
+ (struct oem_cipher_suite_record_t*)(&cipher_suite_data[offset]);
|
||||
+ /* Verify that we have at least a full record left
|
||||
+ * id + iana + 3 algs
|
||||
+ */
|
||||
+ if ((data_len - offset) < sizeof(*record)) {
|
||||
+ lprintf(LOG_INFO, "Incomplete data record in cipher suite data");
|
||||
+ break;
|
||||
+ }
|
||||
+
|
||||
+ cipher_suite_id = record->cipher_suite_id;
|
||||
+
|
||||
+ /* Grab the IANA */
|
||||
+ iana = ipmi24toh(record->iana);
|
||||
+ auth_alg = CIPHER_ALG_MASK & record->auth_alg;
|
||||
+ integrity_alg = CIPHER_ALG_MASK & record->integrity_alg;
|
||||
+ crypt_alg = CIPHER_ALG_MASK & record->crypt_alg;
|
||||
+ offset += sizeof(*record);
|
||||
+ } else {
|
||||
+ lprintf(LOG_INFO, "Bad start of record byte in cipher suite data (offset %d, value %x)", offset, cipher_suite_data[offset]);
|
||||
+ break;
|
||||
+ }
|
||||
+ suites[count].cipher_suite_id = cipher_suite_id;
|
||||
+ suites[count].iana = iana;
|
||||
+ suites[count].auth_alg = auth_alg;
|
||||
+ suites[count].integrity_alg = integrity_alg;
|
||||
+ suites[count].crypt_alg = crypt_alg;
|
||||
+ count++;
|
||||
+ }
|
||||
+ return count;
|
||||
+}
|
||||
+
|
||||
+int
|
||||
ipmi_get_channel_cipher_suites(struct ipmi_intf *intf, const char *payload_type,
|
||||
- uint8_t channel)
|
||||
+ uint8_t channel, struct cipher_suite_info *suites, size_t *count)
|
||||
{
|
||||
struct ipmi_rs *rsp;
|
||||
struct ipmi_rq req;
|
||||
|
||||
uint8_t rqdata[3];
|
||||
- uint32_t iana;
|
||||
- uint8_t auth_alg, integrity_alg, crypt_alg;
|
||||
- uint8_t cipher_suite_id;
|
||||
uint8_t list_index = 0;
|
||||
/* 0x40 sets * 16 bytes per set */
|
||||
- uint8_t cipher_suite_data[1024];
|
||||
- uint16_t offset = 0;
|
||||
- /* how much was returned, total */
|
||||
- uint16_t cipher_suite_data_length = 0;
|
||||
+ uint8_t cipher_suite_data[MAX_CIPHER_SUITE_RECORD_OFFSET *
|
||||
+ MAX_CIPHER_SUITE_DATA_LEN];
|
||||
+ size_t offset = 0;
|
||||
+ size_t nr_suites = 0;
|
||||
|
||||
+ if (!suites || !count || !*count)
|
||||
+ return -1;
|
||||
+
|
||||
+ nr_suites = *count;
|
||||
+ *count = 0;
|
||||
memset(cipher_suite_data, 0, sizeof(cipher_suite_data));
|
||||
-
|
||||
+
|
||||
memset(&req, 0, sizeof(req));
|
||||
req.msg.netfn = IPMI_NETFN_APP;
|
||||
req.msg.cmd = IPMI_GET_CHANNEL_CIPHER_SUITES;
|
||||
req.msg.data = rqdata;
|
||||
- req.msg.data_len = 3;
|
||||
+ req.msg.data_len = sizeof(rqdata);
|
||||
|
||||
rqdata[0] = channel;
|
||||
rqdata[1] = ((strncmp(payload_type, "ipmi", 4) == 0)? 0: 1);
|
||||
- /* Always ask for cipher suite format */
|
||||
- rqdata[2] = 0x80;
|
||||
-
|
||||
- rsp = intf->sendrecv(intf, &req);
|
||||
- if (rsp == NULL) {
|
||||
- lprintf(LOG_ERR, "Unable to Get Channel Cipher Suites");
|
||||
- return -1;
|
||||
- }
|
||||
- if (rsp->ccode > 0) {
|
||||
- lprintf(LOG_ERR, "Get Channel Cipher Suites failed: %s",
|
||||
- val2str(rsp->ccode, completion_code_vals));
|
||||
- return -1;
|
||||
- }
|
||||
-
|
||||
-
|
||||
- /*
|
||||
- * Grab the returned channel number once. We assume it's the same
|
||||
- * in future calls.
|
||||
- */
|
||||
- if (rsp->data_len >= 1) {
|
||||
- channel = rsp->data[0];
|
||||
- }
|
||||
-
|
||||
- while ((rsp->data_len > 1) && (rsp->data_len == 17) && (list_index < 0x3F)) {
|
||||
- /*
|
||||
- * We got back cipher suite data -- store it.
|
||||
- * printf("copying data to offset %d\n", offset);
|
||||
- * printbuf(rsp->data + 1, rsp->data_len - 1, "this is the data");
|
||||
- */
|
||||
- memcpy(cipher_suite_data + offset, rsp->data + 1, rsp->data_len - 1);
|
||||
- offset += rsp->data_len - 1;
|
||||
-
|
||||
- /*
|
||||
- * Increment our list for the next call
|
||||
- */
|
||||
- ++list_index;
|
||||
- rqdata[2] = (rqdata[2] & 0x80) + list_index;
|
||||
|
||||
+ do {
|
||||
+ /* Always ask for cipher suite format */
|
||||
+ rqdata[2] = LIST_ALGORITHMS_BY_CIPHER_SUITE | list_index;
|
||||
rsp = intf->sendrecv(intf, &req);
|
||||
if (rsp == NULL) {
|
||||
lprintf(LOG_ERR, "Unable to Get Channel Cipher Suites");
|
||||
return -1;
|
||||
}
|
||||
- if (rsp->ccode > 0) {
|
||||
+ if (rsp->ccode || rsp->data_len < 1) {
|
||||
lprintf(LOG_ERR, "Get Channel Cipher Suites failed: %s",
|
||||
val2str(rsp->ccode, completion_code_vals));
|
||||
return -1;
|
||||
}
|
||||
- }
|
||||
-
|
||||
- /* Copy last chunk */
|
||||
- if(rsp->data_len > 1) {
|
||||
/*
|
||||
* We got back cipher suite data -- store it.
|
||||
* printf("copying data to offset %d\n", offset);
|
||||
@@ -429,88 +459,46 @@ ipmi_get_channel_cipher_suites(struct ipmi_intf *intf, const char *payload_type,
|
||||
*/
|
||||
memcpy(cipher_suite_data + offset, rsp->data + 1, rsp->data_len - 1);
|
||||
offset += rsp->data_len - 1;
|
||||
- }
|
||||
|
||||
- /* We can chomp on all our data now. */
|
||||
- cipher_suite_data_length = offset;
|
||||
- offset = 0;
|
||||
+ /*
|
||||
+ * Increment our list for the next call
|
||||
+ */
|
||||
+ ++list_index;
|
||||
+ } while ((rsp->data_len == (sizeof(uint8_t) + MAX_CIPHER_SUITE_DATA_LEN)) &&
|
||||
+ (list_index < MAX_CIPHER_SUITE_RECORD_OFFSET));
|
||||
|
||||
- if (! csv_output) {
|
||||
- printf("ID IANA Auth Alg Integrity Alg Confidentiality Alg\n");
|
||||
- }
|
||||
- while (offset < cipher_suite_data_length) {
|
||||
- if (cipher_suite_data[offset++] == 0xC0) {
|
||||
- /* standard type */
|
||||
- iana = 0;
|
||||
+ *count = parse_channel_cipher_suite_data(cipher_suite_data, offset, suites,
|
||||
+ nr_suites);
|
||||
+ return 0;
|
||||
+}
|
||||
|
||||
- /* Verify that we have at least a full record left; id + 3 algs */
|
||||
- if ((cipher_suite_data_length - offset) < 4) {
|
||||
- lprintf(LOG_ERR, "Incomplete data record in cipher suite data");
|
||||
- return -1;
|
||||
- }
|
||||
- cipher_suite_id = cipher_suite_data[offset++];
|
||||
- } else if (cipher_suite_data[offset++] == 0xC1) {
|
||||
- /* OEM record type */
|
||||
- /* Verify that we have at least a full record left
|
||||
- * id + iana + 3 algs
|
||||
- */
|
||||
- if ((cipher_suite_data_length - offset) < 4) {
|
||||
- lprintf(LOG_ERR, "Incomplete data record in cipher suite data");
|
||||
- return -1;
|
||||
- }
|
||||
+static int
|
||||
+ipmi_print_channel_cipher_suites(struct ipmi_intf *intf, const char *payload_type,
|
||||
+ uint8_t channel)
|
||||
+{
|
||||
+ int rc;
|
||||
+ size_t i = 0;
|
||||
+ struct cipher_suite_info suites[MAX_CIPHER_SUITE_COUNT];
|
||||
+ size_t nr_suites = sizeof(*suites);
|
||||
|
||||
- cipher_suite_id = cipher_suite_data[offset++];
|
||||
+ rc = ipmi_get_channel_cipher_suites(intf, payload_type, channel,
|
||||
+ suites, &nr_suites);
|
||||
|
||||
- /* Grab the IANA */
|
||||
- iana =
|
||||
- cipher_suite_data[offset] |
|
||||
- (cipher_suite_data[offset + 1] << 8) |
|
||||
- (cipher_suite_data[offset + 2] << 16);
|
||||
- offset += 3;
|
||||
- } else {
|
||||
- lprintf(LOG_ERR, "Bad start of record byte in cipher suite data");
|
||||
- return -1;
|
||||
- }
|
||||
+ if (rc < 0)
|
||||
+ return rc;
|
||||
|
||||
- /*
|
||||
- * Grab the algorithms for this cipher suite. I guess we can't be
|
||||
- * sure of what order they'll come in. Also, I suppose we default
|
||||
- * to the NONE algorithm if one were absent. This part of the spec is
|
||||
- * poorly written -- I have read the errata document. For now, I'm only
|
||||
- * allowing one algorithm per type (auth, integrity, crypt) because I
|
||||
- * don't I understand how it could be otherwise.
|
||||
- */
|
||||
- auth_alg = IPMI_AUTH_RAKP_NONE;
|
||||
- integrity_alg = IPMI_INTEGRITY_NONE;
|
||||
- crypt_alg = IPMI_CRYPT_NONE;
|
||||
-
|
||||
- while (((cipher_suite_data[offset] & 0xC0) != 0xC0) &&
|
||||
- ((cipher_suite_data_length - offset) > 0))
|
||||
- {
|
||||
- switch (cipher_suite_data[offset] & 0xC0)
|
||||
- {
|
||||
- case 0x00:
|
||||
- /* Authentication algorithm specifier */
|
||||
- auth_alg = cipher_suite_data[offset++] & 0x3F;
|
||||
- break;
|
||||
- case 0x40:
|
||||
- /* Interity algorithm specifier */
|
||||
- integrity_alg = cipher_suite_data[offset++] & 0x3F;
|
||||
- break;
|
||||
- case 0x80:
|
||||
- /* Confidentiality algorithm specifier */
|
||||
- crypt_alg = cipher_suite_data[offset++] & 0x3F;
|
||||
- break;
|
||||
- }
|
||||
- }
|
||||
+ if (! csv_output) {
|
||||
+ printf("ID IANA Auth Alg Integrity Alg Confidentiality Alg\n");
|
||||
+ }
|
||||
+ for (i = 0; i < nr_suites; i++) {
|
||||
/* We have everything we need to spit out a cipher suite record */
|
||||
printf((csv_output? "%d,%s,%s,%s,%s\n" :
|
||||
"%-4d %-7s %-15s %-15s %-15s\n"),
|
||||
- cipher_suite_id,
|
||||
- iana_string(iana),
|
||||
- val2str(auth_alg, ipmi_auth_algorithms),
|
||||
- val2str(integrity_alg, ipmi_integrity_algorithms),
|
||||
- val2str(crypt_alg, ipmi_encryption_algorithms));
|
||||
+ suites[i].cipher_suite_id,
|
||||
+ iana_string(suites[i].iana),
|
||||
+ val2str(suites[i].auth_alg, ipmi_auth_algorithms),
|
||||
+ val2str(suites[i].integrity_alg, ipmi_integrity_algorithms),
|
||||
+ val2str(suites[i].crypt_alg, ipmi_encryption_algorithms));
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
@@ -973,7 +961,7 @@ ipmi_channel_main(struct ipmi_intf *intf, int argc, char **argv)
|
||||
return (-1);
|
||||
}
|
||||
}
|
||||
- retval = ipmi_get_channel_cipher_suites(intf,
|
||||
+ retval = ipmi_print_channel_cipher_suites(intf,
|
||||
argv[1], /* ipmi | sol */
|
||||
channel);
|
||||
} else if (strncmp(argv[0], "setkg", 5) == 0) {
|
||||
diff --git a/lib/ipmi_main.c b/lib/ipmi_main.c
|
||||
index 811c80b..6aee102 100644
|
||||
--- a/lib/ipmi_main.c
|
||||
+++ b/lib/ipmi_main.c
|
||||
@@ -323,6 +323,7 @@ ipmi_main(int argc, char ** argv,
|
||||
uint8_t target_addr = 0;
|
||||
uint8_t target_channel = 0;
|
||||
|
||||
+ uint8_t u8tmp = 0;
|
||||
uint8_t transit_addr = 0;
|
||||
uint8_t transit_channel = 0;
|
||||
uint8_t target_lun = 0;
|
||||
@@ -347,7 +348,10 @@ ipmi_main(int argc, char ** argv,
|
||||
char * seloem = NULL;
|
||||
int port = 0;
|
||||
int devnum = 0;
|
||||
- int cipher_suite_id = 3; /* See table 22-19 of the IPMIv2 spec */
|
||||
+#ifdef IPMI_INTF_LANPLUS
|
||||
+ /* lookup best cipher suite available */
|
||||
+ enum cipher_suite_ids cipher_suite_id = IPMI_LANPLUS_CIPHER_SUITE_RESERVED;
|
||||
+#endif /* IPMI_INTF_LANPLUS */
|
||||
int argflag, i, found;
|
||||
int rc = -1;
|
||||
int ai_family = AF_UNSPEC;
|
||||
@@ -425,19 +429,18 @@ ipmi_main(int argc, char ** argv,
|
||||
goto out_free;
|
||||
}
|
||||
break;
|
||||
+#ifdef IPMI_INTF_LANPLUS
|
||||
case 'C':
|
||||
- if (str2int(optarg, &cipher_suite_id) != 0) {
|
||||
- lprintf(LOG_ERR, "Invalid parameter given or out of range for '-C'.");
|
||||
- rc = -1;
|
||||
- goto out_free;
|
||||
- }
|
||||
- /* add check Cipher is -gt 0 */
|
||||
- if (cipher_suite_id < 0) {
|
||||
- lprintf(LOG_ERR, "Cipher suite ID %i is invalid.", cipher_suite_id);
|
||||
+ /* Cipher Suite ID is a byte as per IPMI specification */
|
||||
+ if (str2uchar(optarg, &u8tmp) != 0) {
|
||||
+ lprintf(LOG_ERR, "Invalid parameter given or out of "
|
||||
+ "range [0-255] for '-C'.");
|
||||
rc = -1;
|
||||
goto out_free;
|
||||
}
|
||||
+ cipher_suite_id = u8tmp;
|
||||
break;
|
||||
+#endif /* IPMI_INTF_LANPLUS */
|
||||
case 'v':
|
||||
verbose++;
|
||||
break;
|
||||
@@ -870,7 +873,9 @@ ipmi_main(int argc, char ** argv,
|
||||
|
||||
ipmi_intf_session_set_lookupbit(ipmi_main_intf, lookupbit);
|
||||
ipmi_intf_session_set_sol_escape_char(ipmi_main_intf, sol_escape_char);
|
||||
+#ifdef IPMI_INTF_LANPLUS
|
||||
ipmi_intf_session_set_cipher_suite_id(ipmi_main_intf, cipher_suite_id);
|
||||
+#endif /* IPMI_INTF_LANPLUS */
|
||||
|
||||
ipmi_main_intf->devnum = devnum;
|
||||
|
||||
diff --git a/src/plugins/ipmi_intf.c b/src/plugins/ipmi_intf.c
|
||||
index 1d9e87b..00b0918 100644
|
||||
--- a/src/plugins/ipmi_intf.c
|
||||
+++ b/src/plugins/ipmi_intf.c
|
||||
@@ -252,11 +252,14 @@ ipmi_intf_session_set_lookupbit(struct ipmi_intf * intf, uint8_t lookupbit)
|
||||
intf->ssn_params.lookupbit = lookupbit;
|
||||
}
|
||||
|
||||
+#ifdef IPMI_INTF_LANPLUS
|
||||
void
|
||||
-ipmi_intf_session_set_cipher_suite_id(struct ipmi_intf * intf, uint8_t cipher_suite_id)
|
||||
+ipmi_intf_session_set_cipher_suite_id(struct ipmi_intf * intf,
|
||||
+ enum cipher_suite_ids cipher_suite_id)
|
||||
{
|
||||
intf->ssn_params.cipher_suite_id = cipher_suite_id;
|
||||
}
|
||||
+#endif /* IPMI_INTF_LANPLUS */
|
||||
|
||||
void
|
||||
ipmi_intf_session_set_sol_escape_char(struct ipmi_intf * intf, char sol_escape_char)
|
||||
diff --git a/src/plugins/lanplus/lanplus.c b/src/plugins/lanplus/lanplus.c
|
||||
index a0e388c..3087348 100644
|
||||
--- a/src/plugins/lanplus/lanplus.c
|
||||
+++ b/src/plugins/lanplus/lanplus.c
|
||||
@@ -164,114 +164,109 @@ extern int verbose;
|
||||
* returns 0 on success
|
||||
* 1 on failure
|
||||
*/
|
||||
-int lanplus_get_requested_ciphers(int cipher_suite_id,
|
||||
+int lanplus_get_requested_ciphers(enum cipher_suite_ids cipher_suite_id,
|
||||
uint8_t * auth_alg,
|
||||
uint8_t * integrity_alg,
|
||||
uint8_t * crypt_alg)
|
||||
{
|
||||
-#ifdef HAVE_CRYPTO_SHA256
|
||||
- if ((cipher_suite_id < 0) || (cipher_suite_id > 17)) {
|
||||
- return 1;
|
||||
- }
|
||||
-#else
|
||||
- if ((cipher_suite_id < 0) || (cipher_suite_id > 14))
|
||||
- return 1;
|
||||
-#endif /* HAVE_CRYPTO_SHA256 */
|
||||
/* See table 22-19 for the source of the statement */
|
||||
switch (cipher_suite_id)
|
||||
{
|
||||
- case 0:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_0:
|
||||
*auth_alg = IPMI_AUTH_RAKP_NONE;
|
||||
*integrity_alg = IPMI_INTEGRITY_NONE;
|
||||
*crypt_alg = IPMI_CRYPT_NONE;
|
||||
break;
|
||||
- case 1:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_1:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_SHA1;
|
||||
*integrity_alg = IPMI_INTEGRITY_NONE;
|
||||
*crypt_alg = IPMI_CRYPT_NONE;
|
||||
break;
|
||||
- case 2:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_2:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_SHA1;
|
||||
*integrity_alg = IPMI_INTEGRITY_HMAC_SHA1_96;
|
||||
*crypt_alg = IPMI_CRYPT_NONE;
|
||||
break;
|
||||
- case 3:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_3:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_SHA1;
|
||||
*integrity_alg = IPMI_INTEGRITY_HMAC_SHA1_96;
|
||||
*crypt_alg = IPMI_CRYPT_AES_CBC_128;
|
||||
break;
|
||||
- case 4:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_4:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_SHA1;
|
||||
*integrity_alg = IPMI_INTEGRITY_HMAC_SHA1_96;
|
||||
*crypt_alg = IPMI_CRYPT_XRC4_128;
|
||||
break;
|
||||
- case 5:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_5:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_SHA1;
|
||||
*integrity_alg = IPMI_INTEGRITY_HMAC_SHA1_96;
|
||||
*crypt_alg = IPMI_CRYPT_XRC4_40;
|
||||
break;
|
||||
- case 6:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_6:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_MD5;
|
||||
*integrity_alg = IPMI_INTEGRITY_NONE;
|
||||
*crypt_alg = IPMI_CRYPT_NONE;
|
||||
break;
|
||||
- case 7:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_7:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_MD5;
|
||||
*integrity_alg = IPMI_INTEGRITY_HMAC_MD5_128;
|
||||
*crypt_alg = IPMI_CRYPT_NONE;
|
||||
break;
|
||||
- case 8:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_8:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_MD5;
|
||||
*integrity_alg = IPMI_INTEGRITY_HMAC_MD5_128;
|
||||
*crypt_alg = IPMI_CRYPT_AES_CBC_128;
|
||||
break;
|
||||
- case 9:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_9:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_MD5;
|
||||
*integrity_alg = IPMI_INTEGRITY_HMAC_MD5_128;
|
||||
*crypt_alg = IPMI_CRYPT_XRC4_128;
|
||||
break;
|
||||
- case 10:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_10:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_MD5;
|
||||
*integrity_alg = IPMI_INTEGRITY_HMAC_MD5_128;
|
||||
*crypt_alg = IPMI_CRYPT_XRC4_40;
|
||||
break;
|
||||
- case 11:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_11:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_MD5;
|
||||
*integrity_alg = IPMI_INTEGRITY_MD5_128;
|
||||
*crypt_alg = IPMI_CRYPT_NONE;
|
||||
break;
|
||||
- case 12:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_12:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_MD5;
|
||||
*integrity_alg = IPMI_INTEGRITY_MD5_128;
|
||||
*crypt_alg = IPMI_CRYPT_AES_CBC_128;
|
||||
break;
|
||||
- case 13:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_13:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_MD5;
|
||||
*integrity_alg = IPMI_INTEGRITY_MD5_128;
|
||||
*crypt_alg = IPMI_CRYPT_XRC4_128;
|
||||
break;
|
||||
- case 14:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_14:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_MD5;
|
||||
*integrity_alg = IPMI_INTEGRITY_MD5_128;
|
||||
*crypt_alg = IPMI_CRYPT_XRC4_40;
|
||||
break;
|
||||
#ifdef HAVE_CRYPTO_SHA256
|
||||
- case 15:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_15:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_SHA256;
|
||||
*integrity_alg = IPMI_INTEGRITY_NONE;
|
||||
*crypt_alg = IPMI_CRYPT_NONE;
|
||||
break;
|
||||
- case 16:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_16:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_SHA256;
|
||||
*integrity_alg = IPMI_INTEGRITY_HMAC_SHA256_128;
|
||||
*crypt_alg = IPMI_CRYPT_NONE;
|
||||
break;
|
||||
- case 17:
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_17:
|
||||
*auth_alg = IPMI_AUTH_RAKP_HMAC_SHA256;
|
||||
*integrity_alg = IPMI_INTEGRITY_HMAC_SHA256_128;
|
||||
*crypt_alg = IPMI_CRYPT_AES_CBC_128;
|
||||
break;
|
||||
#endif /* HAVE_CRYPTO_SHA256 */
|
||||
+ case IPMI_LANPLUS_CIPHER_SUITE_RESERVED:
|
||||
+ default:
|
||||
+ return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
@@ -3441,6 +3436,57 @@ ipmi_set_session_privlvl_cmd(struct ipmi_intf * intf)
|
||||
return 0;
|
||||
}
|
||||
|
||||
+static uint8_t
|
||||
+ipmi_find_best_cipher_suite(struct ipmi_intf *intf)
|
||||
+{
|
||||
+ enum cipher_suite_ids best_suite = IPMI_LANPLUS_CIPHER_SUITE_RESERVED;
|
||||
+#ifdef HAVE_CRYPTO_SHA256
|
||||
+ struct cipher_suite_info suites[MAX_CIPHER_SUITE_COUNT];
|
||||
+ size_t nr_suites = ARRAY_SIZE(suites);
|
||||
+ /* cipher suite best order is chosen with this criteria:
|
||||
+ * HMAC-MD5 and MD5 are BAD; xRC4 is bad; AES128 is required
|
||||
+ * HMAC-SHA256 > HMAC-SHA1
|
||||
+ * secure authentication > encrypted content
|
||||
+ *
|
||||
+ * With xRC4 out, all cipher suites with MD5 out, and cipher suite 3 being
|
||||
+ * required by the spec, the only better defined standard cipher suite is
|
||||
+ * 17. So if SHA256 is available, we should try to use that, otherwise,
|
||||
+ * fall back to 3.
|
||||
+ */
|
||||
+ const enum cipher_suite_ids cipher_order_preferred[] = {
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_17,
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_3,
|
||||
+ };
|
||||
+ const size_t nr_preferred = ARRAY_SIZE(cipher_order_preferred);
|
||||
+ size_t ipref, i;
|
||||
+
|
||||
+ if (ipmi_get_channel_cipher_suites(intf, "ipmi", IPMI_LAN_CHANNEL_E,
|
||||
+ suites, &nr_suites) < 0)
|
||||
+ {
|
||||
+ /* default legacy behavior - cipher suite 3 if none is requested */
|
||||
+ return IPMI_LANPLUS_CIPHER_SUITE_3;
|
||||
+ }
|
||||
+ for (ipref = 0; ipref < nr_preferred &&
|
||||
+ IPMI_LANPLUS_CIPHER_SUITE_RESERVED == best_suite; ipref++)
|
||||
+ {
|
||||
+ for (i = 0; i < nr_suites; i++) {
|
||||
+ if (cipher_order_preferred[ipref] == suites[i].cipher_suite_id) {
|
||||
+ best_suite = cipher_order_preferred[ipref];
|
||||
+ break;
|
||||
+ }
|
||||
+ }
|
||||
+ }
|
||||
+#endif /* HAVE_CRYPTO_SHA256 */
|
||||
+ if (IPMI_LANPLUS_CIPHER_SUITE_RESERVED == best_suite) {
|
||||
+ /* IPMI 2.0 spec requires that cipher suite 3 is implemented
|
||||
+ * so we should always be able to fall back to that if better
|
||||
+ * options are not available. */
|
||||
+ best_suite = IPMI_LANPLUS_CIPHER_SUITE_3;
|
||||
+ }
|
||||
+ lprintf(LOG_INFO, "Using best available cipher suite %d\n", best_suite);
|
||||
+ return best_suite;
|
||||
+}
|
||||
+
|
||||
/**
|
||||
* ipmi_lanplus_open
|
||||
*/
|
||||
@@ -3514,6 +3560,16 @@ ipmi_lanplus_open(struct ipmi_intf * intf)
|
||||
lprintf(LOG_INFO, "This BMC does not support IPMI v2 / RMCP+");
|
||||
goto fail;
|
||||
}
|
||||
+ /*
|
||||
+ * If no cipher suite was provided, query the channel cipher suite list and
|
||||
+ * pick the best one available
|
||||
+ */
|
||||
+ if (IPMI_LANPLUS_CIPHER_SUITE_RESERVED ==
|
||||
+ intf->ssn_params.cipher_suite_id)
|
||||
+ {
|
||||
+ ipmi_intf_session_set_cipher_suite_id(intf,
|
||||
+ ipmi_find_best_cipher_suite(intf));
|
||||
+ }
|
||||
|
||||
/*
|
||||
* If the open/rakp1/rakp3 sequence encounters a timeout, the whole sequence
|
||||
@@ -3728,7 +3784,7 @@ static int ipmi_lanplus_setup(struct ipmi_intf * intf)
|
||||
|
||||
static void ipmi_lanp_set_max_rq_data_size(struct ipmi_intf * intf, uint16_t size)
|
||||
{
|
||||
- if (intf->ssn_params.cipher_suite_id == 3) {
|
||||
+ if (intf->ssn_params.cipher_suite_id == IPMI_LANPLUS_CIPHER_SUITE_3) {
|
||||
/*
|
||||
* encrypted payload can only be multiple of 16 bytes
|
||||
*/
|
||||
@@ -3746,7 +3802,7 @@ static void ipmi_lanp_set_max_rq_data_size(struct ipmi_intf * intf, uint16_t siz
|
||||
|
||||
static void ipmi_lanp_set_max_rp_data_size(struct ipmi_intf * intf, uint16_t size)
|
||||
{
|
||||
- if (intf->ssn_params.cipher_suite_id == 3) {
|
||||
+ if (intf->ssn_params.cipher_suite_id == IPMI_LANPLUS_CIPHER_SUITE_3) {
|
||||
/*
|
||||
* encrypted payload can only be multiple of 16 bytes
|
||||
*/
|
||||
--
|
||||
2.20.1
|
||||
|
33
ipmitool/0010-pef-missing-newline.patch
Normal file
33
ipmitool/0010-pef-missing-newline.patch
Normal file
@ -0,0 +1,33 @@
|
||||
From f65ea137f0d03f883219a791a49cf8ea7e16776a Mon Sep 17 00:00:00 2001
|
||||
From: Vaclav Dolezal <vdolezal@redhat.com>
|
||||
Date: Fri, 1 Mar 2019 14:46:12 +0100
|
||||
Subject: [PATCH] Fix "ipmitool pef {status,info}" not printing final newline
|
||||
|
||||
Signed-off-by: Vaclav Dolezal <vdolezal@redhat.com>
|
||||
---
|
||||
lib/ipmi_pef.c | 2 ++
|
||||
1 file changed, 2 insertions(+)
|
||||
|
||||
diff --git a/lib/ipmi_pef.c b/lib/ipmi_pef.c
|
||||
index bbf25f2..4be749e 100644
|
||||
--- a/lib/ipmi_pef.c
|
||||
+++ b/lib/ipmi_pef.c
|
||||
@@ -1183,6 +1183,7 @@ ipmi_pef2_get_info(struct ipmi_intf *intf)
|
||||
ipmi_pef_print_guid(guid_ptr);
|
||||
}
|
||||
ipmi_pef_print_flags(&pef_b2s_actions, P_SUPP, pcap.actions);
|
||||
+ putchar('\n');
|
||||
return 0;
|
||||
}
|
||||
|
||||
@@ -1242,6 +1243,7 @@ ipmi_pef2_get_status(struct ipmi_intf *intf)
|
||||
return (-1);
|
||||
}
|
||||
ipmi_pef_print_flags(&pef_b2s_actions, P_ACTV, rsp->data[1]);
|
||||
+ putchar('\n');
|
||||
return 0;
|
||||
}
|
||||
|
||||
--
|
||||
2.20.1
|
||||
|
57
ipmitool/0011-expand-sensor-name-column.patch
Normal file
57
ipmitool/0011-expand-sensor-name-column.patch
Normal file
@ -0,0 +1,57 @@
|
||||
From 57b57b27fe2c17e3030c41ee5566af36ccd33941 Mon Sep 17 00:00:00 2001
|
||||
From: Vaclav Dolezal <vdolezal@redhat.com>
|
||||
Date: Thu, 30 Jan 2020 16:18:37 +0100
|
||||
Subject: [PATCH] Expand column with name in ipmitool sdr/sensor output
|
||||
|
||||
---
|
||||
lib/ipmi_sdr.c | 4 ++--
|
||||
lib/ipmi_sensor.c | 4 ++--
|
||||
2 files changed, 4 insertions(+), 4 deletions(-)
|
||||
|
||||
diff --git a/lib/ipmi_sdr.c b/lib/ipmi_sdr.c
|
||||
index fd2c02d..0f6faab 100644
|
||||
--- a/lib/ipmi_sdr.c
|
||||
+++ b/lib/ipmi_sdr.c
|
||||
@@ -1619,7 +1619,7 @@ ipmi_sdr_print_sensor_fc(struct ipmi_intf *intf,
|
||||
/*
|
||||
* print sensor name, reading, state
|
||||
*/
|
||||
- printf("%-16s | ", sr->s_id);
|
||||
+ printf("%-24s | ", sr->s_id);
|
||||
|
||||
memset(sval, 0, sizeof (sval));
|
||||
|
||||
@@ -1657,7 +1657,7 @@ ipmi_sdr_print_sensor_fc(struct ipmi_intf *intf,
|
||||
/*
|
||||
* print sensor name, number, state, entity, reading
|
||||
*/
|
||||
- printf("%-16s | %02Xh | ",
|
||||
+ printf("%-24s | %02Xh | ",
|
||||
sr->s_id, sensor->keys.sensor_num);
|
||||
|
||||
if (IS_THRESHOLD_SENSOR(sensor)) {
|
||||
diff --git a/lib/ipmi_sensor.c b/lib/ipmi_sensor.c
|
||||
index a0b7eb8..7328508 100644
|
||||
--- a/lib/ipmi_sensor.c
|
||||
+++ b/lib/ipmi_sensor.c
|
||||
@@ -175,7 +175,7 @@ ipmi_sensor_print_fc_discrete(struct ipmi_intf *intf,
|
||||
/* output format
|
||||
* id value units status thresholds....
|
||||
*/
|
||||
- printf("%-16s ", sr->s_id);
|
||||
+ printf("%-24s ", sr->s_id);
|
||||
if (sr->s_reading_valid) {
|
||||
if (sr->s_has_analog_value) {
|
||||
/* don't show discrete component */
|
||||
@@ -276,7 +276,7 @@ ipmi_sensor_print_fc_threshold(struct ipmi_intf *intf,
|
||||
/* output format
|
||||
* id value units status thresholds....
|
||||
*/
|
||||
- printf("%-16s ", sr->s_id);
|
||||
+ printf("%-24s ", sr->s_id);
|
||||
if (sr->s_reading_valid) {
|
||||
if (sr->s_has_analog_value)
|
||||
printf("| %-10.3f | %-10s | %-6s",
|
||||
--
|
||||
2.20.1
|
||||
|
@ -2,11 +2,11 @@ From b3e74778c65ba3ffc8a9b3133c87588ee5d18a74 Mon Sep 17 00:00:00 2001
|
||||
From: Chrostoper Ertl <chertl@microsoft.com>
|
||||
Date: Thu, 28 Nov 2019 16:33:59 +0000
|
||||
Subject: [PATCH] Fixes for CVE-2020-5208
|
||||
|
||||
|
||||
see https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp
|
||||
|
||||
|
||||
This patch is combination of following commits:
|
||||
|
||||
|
||||
pick e824c23316ae50beb7f7488f2055ac65e8b341f2 fru: Fix buffer overflow vulnerabilities
|
||||
pick 840fb1cbb4fb365cb9797300e3374d4faefcdb10 fru: Fix buffer overflow in ipmi_spd_print_fru
|
||||
pick 41d7026946fafbd4d1ec0bcaca3ea30a6e8eed22 session: Fix buffer overflow in ipmi_get_session_info
|
||||
@ -21,7 +21,7 @@ pick 7ccea283dd62a05a320c1921e3d8d71a87772637 fru, sdr: Fix id_string buffer ove
|
||||
lib/ipmi_sdr.c | 40 ++++++++++++++++++++++++----------------
|
||||
lib/ipmi_session.c | 12 ++++++++----
|
||||
6 files changed, 83 insertions(+), 32 deletions(-)
|
||||
|
||||
|
||||
diff --git a/lib/dimm_spd.c b/lib/dimm_spd.c
|
||||
index 41e30db..68f3b4f 100644
|
||||
--- a/lib/dimm_spd.c
|
||||
@ -57,10 +57,10 @@ index 3ae3104..80ba522 100644
|
||||
lprintf(LOG_ERR, "Unable to Get Channel Cipher Suites");
|
||||
return -1;
|
||||
}
|
||||
- if (rsp->ccode > 0) {
|
||||
- if (rsp->ccode || rsp->data_len < 1) {
|
||||
+ if (rsp->ccode
|
||||
+ || rsp->data_len < 1
|
||||
+ || rsp->data_len > sizeof(uint8_t) )
|
||||
+ || rsp->data_len > sizeof(uint8_t) + MAX_CIPHER_SUITE_DATA_LEN)
|
||||
+ {
|
||||
lprintf(LOG_ERR, "Get Channel Cipher Suites failed: %s",
|
||||
val2str(rsp->ccode, completion_code_vals));
|
||||
@ -375,3 +375,4 @@ index 141f0f4..b9af1fd 100644
|
||||
break;
|
||||
--
|
||||
2.20.1
|
||||
|
||||
|
420
ipmitool/0013-quanta-oem-support.patch
Normal file
420
ipmitool/0013-quanta-oem-support.patch
Normal file
@ -0,0 +1,420 @@
|
||||
From 87a898756a7bd54898c1f6d2a5441efb1f810b67 Mon Sep 17 00:00:00 2001
|
||||
From: qctbmc <qct.bmc@gmail.com>
|
||||
Date: Tue, 10 Jul 2018 11:21:55 +0800
|
||||
Subject: [PATCH] oem: Add basic support for Quanta
|
||||
|
||||
---
|
||||
include/ipmitool/Makefile.am | 2 +-
|
||||
include/ipmitool/ipmi_quantaoem.h | 55 +++++++++
|
||||
lib/Makefile.am | 2 +-
|
||||
lib/ipmi_main.c | 1 +
|
||||
lib/ipmi_oem.c | 14 +++
|
||||
lib/ipmi_quantaoem.c | 184 ++++++++++++++++++++++++++++++
|
||||
lib/ipmi_sel.c | 21 +++-
|
||||
src/ipmitool.c | 1 +
|
||||
8 files changed, 274 insertions(+), 6 deletions(-)
|
||||
create mode 100644 include/ipmitool/ipmi_quantaoem.h
|
||||
create mode 100644 lib/ipmi_quantaoem.c
|
||||
|
||||
diff --git a/include/ipmitool/Makefile.am b/include/ipmitool/Makefile.am
|
||||
index 9093a56..8bc584a 100644
|
||||
--- a/include/ipmitool/Makefile.am
|
||||
+++ b/include/ipmitool/Makefile.am
|
||||
@@ -39,4 +39,4 @@ noinst_HEADERS = log.h bswap.h hpm2.h helper.h ipmi.h ipmi_cc.h ipmi_intf.h \
|
||||
ipmi_fwum.h ipmi_main.h ipmi_tsol.h ipmi_firewall.h \
|
||||
ipmi_kontronoem.h ipmi_ekanalyzer.h ipmi_gendev.h ipmi_ime.h \
|
||||
ipmi_delloem.h ipmi_dcmi.h ipmi_vita.h ipmi_sel_supermicro.h \
|
||||
- ipmi_cfgp.h ipmi_lanp6.h
|
||||
+ ipmi_cfgp.h ipmi_lanp6.h ipmi_quantaoem.h
|
||||
diff --git a/include/ipmitool/ipmi_quantaoem.h b/include/ipmitool/ipmi_quantaoem.h
|
||||
new file mode 100644
|
||||
index 0000000..544f510
|
||||
--- /dev/null
|
||||
+++ b/include/ipmitool/ipmi_quantaoem.h
|
||||
@@ -0,0 +1,55 @@
|
||||
+/*
|
||||
+ * Copyright (c) 2018 Quanta Computer Inc. All rights reserved.
|
||||
+ *
|
||||
+ * Redistribution and use in source and binary forms, with or without
|
||||
+ * modification, are permitted provided that the following conditions
|
||||
+ * are met:
|
||||
+ *
|
||||
+ * Redistribution of source code must retain the above copyright
|
||||
+ * notice, this list of conditions and the following disclaimer.
|
||||
+ *
|
||||
+ * Redistribution in binary form must reproduce the above copyright
|
||||
+ * notice, this list of conditions and the following disclaimer in the
|
||||
+ * documentation and/or other materials provided with the distribution.
|
||||
+ *
|
||||
+ * Neither the name of Quanta Computer Inc. or the names of
|
||||
+ * contributors may be used to endorse or promote products derived
|
||||
+ * from this software without specific prior written permission.
|
||||
+ *
|
||||
+ * This software is provided "AS IS," without a warranty of any kind.
|
||||
+ * ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
|
||||
+ * INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A
|
||||
+ * PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED.
|
||||
+ * Quanta Computer Inc. AND ITS LICENSORS SHALL NOT BE LIABLE
|
||||
+ * FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, MODIFYING
|
||||
+ * OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. IN NO EVENT WILL
|
||||
+ * Quanta Computer Inc. OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA,
|
||||
+ * OR FOR DIRECT, INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL OR
|
||||
+ * PUNITIVE DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF
|
||||
+ * LIABILITY, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS SOFTWARE,
|
||||
+ * EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
|
||||
+ */
|
||||
+
|
||||
+#ifndef IPMI_QUANTAOEM_H
|
||||
+#define IPMI_QUANTAOEM_H
|
||||
+
|
||||
+#if HAVE_CONFIG_H
|
||||
+# include <config.h>
|
||||
+#endif
|
||||
+#include <ipmitool/ipmi.h>
|
||||
+#include <ipmitool/ipmi_sdr.h>
|
||||
+
|
||||
+#define OEM_QCT_NETFN 0x36
|
||||
+#define OEM_QCT_GET_INFO 0x65
|
||||
+
|
||||
+typedef enum
|
||||
+{
|
||||
+ OEM_QCT_PLATFORM_UNKNOWN = 0,
|
||||
+ OEM_QCT_PLATFORM_GRANTLEY,
|
||||
+ OEM_QCT_PLATFORM_PURLEY
|
||||
+} qct_platform_t;
|
||||
+
|
||||
+qct_platform_t oem_qct_get_platform_id(struct ipmi_intf *intf);
|
||||
+char *oem_qct_get_evt_desc(struct ipmi_intf *intf, struct sel_event_record *rec);
|
||||
+
|
||||
+#endif /*IPMI_QUANTAOEM_H*/
|
||||
diff --git a/lib/Makefile.am b/lib/Makefile.am
|
||||
index cc69a8f..e7568f3 100644
|
||||
--- a/lib/Makefile.am
|
||||
+++ b/lib/Makefile.am
|
||||
@@ -41,7 +41,7 @@ libipmitool_la_SOURCES = helper.c ipmi_sdr.c ipmi_sel.c ipmi_sol.c ipmi_pef.c \
|
||||
ipmi_main.c ipmi_tsol.c ipmi_firewall.c ipmi_kontronoem.c \
|
||||
ipmi_hpmfwupg.c ipmi_sdradd.c ipmi_ekanalyzer.c ipmi_gendev.c \
|
||||
ipmi_ime.c ipmi_delloem.c ipmi_dcmi.c hpm2.c ipmi_vita.c \
|
||||
- ipmi_lanp6.c ipmi_cfgp.c \
|
||||
+ ipmi_lanp6.c ipmi_cfgp.c ipmi_quantaoem.c \
|
||||
../src/plugins/lan/md5.c ../src/plugins/lan/md5.h
|
||||
|
||||
libipmitool_la_LDFLAGS = -export-dynamic
|
||||
diff --git a/lib/ipmi_main.c b/lib/ipmi_main.c
|
||||
index 6aee102..9d4a148 100644
|
||||
--- a/lib/ipmi_main.c
|
||||
+++ b/lib/ipmi_main.c
|
||||
@@ -75,6 +75,7 @@
|
||||
#include <ipmitool/ipmi_picmg.h>
|
||||
#include <ipmitool/ipmi_kontronoem.h>
|
||||
#include <ipmitool/ipmi_vita.h>
|
||||
+#include <ipmitool/ipmi_quantaoem.h>
|
||||
|
||||
#ifdef HAVE_CONFIG_H
|
||||
# include <config.h>
|
||||
diff --git a/lib/ipmi_oem.c b/lib/ipmi_oem.c
|
||||
index 96db2ea..86fd803 100644
|
||||
--- a/lib/ipmi_oem.c
|
||||
+++ b/lib/ipmi_oem.c
|
||||
@@ -39,6 +39,7 @@
|
||||
|
||||
static int ipmi_oem_supermicro(struct ipmi_intf * intf);
|
||||
static int ipmi_oem_ibm(struct ipmi_intf * intf);
|
||||
+static int ipmi_oem_quanta(struct ipmi_intf * intf);
|
||||
|
||||
static struct ipmi_oem_handle ipmi_oem_list[] = {
|
||||
{
|
||||
@@ -71,6 +72,11 @@ static struct ipmi_oem_handle ipmi_oem_list[] = {
|
||||
.name = "kontron",
|
||||
.desc = "Kontron OEM big buffer support"
|
||||
},
|
||||
+ {
|
||||
+ .name = "quanta",
|
||||
+ .desc = "Quanta IPMIv1.5 BMC with OEM LAN authentication support",
|
||||
+ .setup = ipmi_oem_quanta,
|
||||
+ },
|
||||
{ 0 }
|
||||
};
|
||||
|
||||
@@ -93,6 +99,14 @@ ipmi_oem_ibm(struct ipmi_intf * intf)
|
||||
return ipmi_sel_oem_init((const char *)filename);
|
||||
}
|
||||
|
||||
+/* Quanta IPMIv2 BMCs use OEM authtype */
|
||||
+static int
|
||||
+ipmi_oem_quanta(struct ipmi_intf * intf)
|
||||
+{
|
||||
+ ipmi_intf_session_set_authtype(intf, IPMI_SESSION_AUTHTYPE_OEM);
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
/* ipmi_oem_print - print list of OEM handles
|
||||
*/
|
||||
void
|
||||
diff --git a/lib/ipmi_quantaoem.c b/lib/ipmi_quantaoem.c
|
||||
new file mode 100644
|
||||
index 0000000..7b4c5c6
|
||||
--- /dev/null
|
||||
+++ b/lib/ipmi_quantaoem.c
|
||||
@@ -0,0 +1,184 @@
|
||||
+/*
|
||||
+ * Copyright (c) 2018 Quanta Computer Inc. All rights reserved.
|
||||
+ *
|
||||
+ * Redistribution and use in source and binary forms, with or without
|
||||
+ * modification, are permitted provided that the following conditions
|
||||
+ * are met:
|
||||
+ *
|
||||
+ * Redistribution of source code must retain the above copyright
|
||||
+ * notice, this list of conditions and the following disclaimer.
|
||||
+ *
|
||||
+ * Redistribution in binary form must reproduce the above copyright
|
||||
+ * notice, this list of conditions and the following disclaimer in the
|
||||
+ * documentation and/or other materials provided with the distribution.
|
||||
+ *
|
||||
+ * Neither the name of Quanta Computer Inc. or the names of
|
||||
+ * contributors may be used to endorse or promote products derived
|
||||
+ * from this software without specific prior written permission.
|
||||
+ *
|
||||
+ * This software is provided "AS IS," without a warranty of any kind.
|
||||
+ * ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
|
||||
+ * INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A
|
||||
+ * PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED.
|
||||
+ * Quanta Computer Inc. AND ITS LICENSORS SHALL NOT BE LIABLE
|
||||
+ * FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, MODIFYING
|
||||
+ * OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. IN NO EVENT WILL
|
||||
+ * Quanta Computer Inc. OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA,
|
||||
+ * OR FOR DIRECT, INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL OR
|
||||
+ * PUNITIVE DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF
|
||||
+ * LIABILITY, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS SOFTWARE,
|
||||
+ * EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
|
||||
+ */
|
||||
+#define _XOPEN_SOURCE
|
||||
+
|
||||
+#include <stdlib.h>
|
||||
+#include <stdio.h>
|
||||
+#include <string.h>
|
||||
+#include <strings.h>
|
||||
+#include <sys/socket.h>
|
||||
+#include <netinet/in.h>
|
||||
+#include <arpa/inet.h>
|
||||
+#include <errno.h>
|
||||
+#include <time.h>
|
||||
+#include <unistd.h>
|
||||
+#include <signal.h>
|
||||
+#include <ctype.h>
|
||||
+#include <sys/time.h>
|
||||
+#include <limits.h>
|
||||
+#include <fcntl.h>
|
||||
+#include <sys/select.h>
|
||||
+#include <termios.h>
|
||||
+#include <ipmitool/ipmi.h>
|
||||
+#include <ipmitool/ipmi_mc.h>
|
||||
+#include <ipmitool/ipmi_intf.h>
|
||||
+#include <ipmitool/helper.h>
|
||||
+#include <ipmitool/log.h>
|
||||
+#include <ipmitool/ipmi_sel.h>
|
||||
+#include <ipmitool/ipmi_sdr.h>
|
||||
+#include <ipmitool/ipmi_strings.h>
|
||||
+#include <ipmitool/ipmi_channel.h>
|
||||
+#include <ipmitool/ipmi_quantaoem.h>
|
||||
+#include <ipmitool/ipmi_raw.h>
|
||||
+
|
||||
+/* Max Size of the description String to be displyed for the Each sel entry */
|
||||
+#define SIZE_OF_DESC 128
|
||||
+
|
||||
+#define CPU_SHIFT 6
|
||||
+#define CPU_MASK 0X03
|
||||
+#define CPU_NUM(x) (((x) >> CPU_SHIFT) & CPU_MASK)
|
||||
+
|
||||
+#define CHANNEL_BASE 0x41
|
||||
+#define CHANNEL_SHIFT 3
|
||||
+#define CHANNEL_MASK 0x07
|
||||
+#define CHANNEL_OFFSET(x) (((x) >> CHANNEL_SHIFT) & CHANNEL_MASK)
|
||||
+#define CHANNEL_NUM(x) (CHANNEL_BASE + CHANNEL_OFFSET(x))
|
||||
+
|
||||
+#define DIMM_MASK 0x07
|
||||
+#define DIMM_NUM(x) ((x) & DIMM_MASK)
|
||||
+
|
||||
+#define GET_PLATFORM_ID_DATA_SIZE 4
|
||||
+
|
||||
+// Magic code to check if it's valid command
|
||||
+#define QCT_MAGIC_1 0x4C
|
||||
+#define QCT_MAGIC_2 0x1C
|
||||
+#define QCT_MAGIC_3 0x00
|
||||
+#define QCT_MAGIC_4 0x02
|
||||
+
|
||||
+qct_platform_t
|
||||
+oem_qct_get_platform_id(struct ipmi_intf *intf)
|
||||
+{
|
||||
+ /* Execute a Get platform ID command to determine the board */
|
||||
+ struct ipmi_rs *rsp;
|
||||
+ struct ipmi_rq req;
|
||||
+ qct_platform_t platform_id;
|
||||
+ uint8_t msg_data[GET_PLATFORM_ID_DATA_SIZE];
|
||||
+
|
||||
+ /* Ask for IPMI v2 data as well */
|
||||
+ msg_data[0] = QCT_MAGIC_1;
|
||||
+ msg_data[1] = QCT_MAGIC_2;
|
||||
+ msg_data[2] = QCT_MAGIC_3;
|
||||
+ msg_data[3] = QCT_MAGIC_4;
|
||||
+
|
||||
+ memset(&req, 0, sizeof(req));
|
||||
+ req.msg.netfn = OEM_QCT_NETFN;
|
||||
+ req.msg.cmd = OEM_QCT_GET_INFO;
|
||||
+ req.msg.data = msg_data;
|
||||
+ req.msg.data_len = sizeof(msg_data);
|
||||
+
|
||||
+ rsp = intf->sendrecv(intf, &req);
|
||||
+ if (rsp == NULL) {
|
||||
+ lprintf(LOG_ERR, "Get Platform ID command failed");
|
||||
+ return 0;
|
||||
+ }
|
||||
+ if (rsp->ccode) {
|
||||
+ lprintf(LOG_ERR, "Get Platform ID command failed: %#x %s",
|
||||
+ rsp->ccode, val2str(rsp->ccode, completion_code_vals));
|
||||
+ return 0;
|
||||
+ }
|
||||
+ platform_id = rsp->data[0];
|
||||
+ lprintf(LOG_DEBUG,"Platform ID: %hhx", rsp->data[0]);
|
||||
+ return platform_id;
|
||||
+}
|
||||
+
|
||||
+char *
|
||||
+oem_qct_get_evt_desc(struct ipmi_intf *intf, struct sel_event_record *rec)
|
||||
+{
|
||||
+ struct ipmi_rs *rsp;
|
||||
+ struct ipmi_rq req;
|
||||
+ char *desc = NULL;
|
||||
+ int data;
|
||||
+ int sensor_type;
|
||||
+ qct_platform_t platform_id;
|
||||
+
|
||||
+ /* Get the OEM event Bytes of the SEL Records byte 15 to data */
|
||||
+ data = rec->sel_type.standard_type.event_data[2];
|
||||
+ /* Check for the Standard Event type == 0x6F */
|
||||
+ if (rec->sel_type.standard_type.event_type != 0x6F) {
|
||||
+ goto out;
|
||||
+ }
|
||||
+ /* Allocate mem for te Description string */
|
||||
+ desc = malloc(SIZE_OF_DESC);
|
||||
+ if (desc == NULL) {
|
||||
+ lprintf(LOG_ERR, "ipmitool: malloc failure");
|
||||
+ goto out;
|
||||
+ }
|
||||
+ memset(desc, 0, SIZE_OF_DESC);
|
||||
+ sensor_type = rec->sel_type.standard_type.sensor_type;
|
||||
+ switch (sensor_type) {
|
||||
+ case SENSOR_TYPE_MEMORY:
|
||||
+ memset(&req, 0, sizeof (req));
|
||||
+ req.msg.netfn = IPMI_NETFN_APP;
|
||||
+ req.msg.lun = 0;
|
||||
+ req.msg.cmd = BMC_GET_DEVICE_ID;
|
||||
+ req.msg.data = NULL;
|
||||
+ req.msg.data_len = 0;
|
||||
+
|
||||
+ rsp = intf->sendrecv(intf, &req);
|
||||
+ if (rsp == NULL) {
|
||||
+ lprintf(LOG_ERR, " Error getting system info");
|
||||
+ goto out;
|
||||
+ } else if (rsp->ccode) {
|
||||
+ lprintf(LOG_ERR, " Error getting system info: %s",
|
||||
+ val2str(rsp->ccode, completion_code_vals));
|
||||
+ goto out;
|
||||
+ }
|
||||
+ /* check the platform type */
|
||||
+ platform_id = oem_qct_get_platform_id(intf);
|
||||
+ if (OEM_QCT_PLATFORM_PURLEY == platform_id) {
|
||||
+ snprintf(desc, SIZE_OF_DESC, "CPU%d_%c%d",
|
||||
+ CPU_NUM(data),
|
||||
+ CHANNEL_NUM(data),
|
||||
+ DIMM_NUM(data));
|
||||
+ }
|
||||
+ break;
|
||||
+ default:
|
||||
+ goto out;
|
||||
+ }
|
||||
+ return desc;
|
||||
+out:
|
||||
+ if (desc) {
|
||||
+ free(desc);
|
||||
+ desc = NULL;
|
||||
+ }
|
||||
+ return desc;
|
||||
+}
|
||||
diff --git a/lib/ipmi_sel.c b/lib/ipmi_sel.c
|
||||
index 8b0395e..a54fefd 100644
|
||||
--- a/lib/ipmi_sel.c
|
||||
+++ b/lib/ipmi_sel.c
|
||||
@@ -50,6 +50,7 @@
|
||||
#include <ipmitool/ipmi_fru.h>
|
||||
#include <ipmitool/ipmi_sensor.h>
|
||||
#include <ipmitool/ipmi_strings.h>
|
||||
+#include <ipmitool/ipmi_quantaoem.h>
|
||||
|
||||
extern int verbose;
|
||||
static int sel_extended = 0;
|
||||
@@ -1244,6 +1245,9 @@ ipmi_get_oem_desc(struct ipmi_intf * intf, struct sel_event_record * rec)
|
||||
case IPMI_OEM_SUPERMICRO_47488:
|
||||
desc = get_supermicro_evt_desc(intf, rec);
|
||||
break;
|
||||
+ case IPMI_OEM_QUANTA:
|
||||
+ desc = oem_qct_get_evt_desc(intf, rec);
|
||||
+ break;
|
||||
case IPMI_OEM_UNKNOWN:
|
||||
default:
|
||||
break;
|
||||
@@ -1349,6 +1353,9 @@ ipmi_get_event_desc(struct ipmi_intf * intf, struct sel_event_record * rec, char
|
||||
sfx = ipmi_get_oem_desc(intf, rec);
|
||||
break;
|
||||
/* add your oem sensor assignation here */
|
||||
+ case IPMI_OEM_QUANTA:
|
||||
+ sfx = ipmi_get_oem_desc(intf, rec);
|
||||
+ break;
|
||||
default:
|
||||
lprintf(LOG_DEBUG, "oem sensor type %x using standard type supplied description",
|
||||
rec->sel_type.standard_type.sensor_type );
|
||||
@@ -1359,9 +1366,12 @@ ipmi_get_event_desc(struct ipmi_intf * intf, struct sel_event_record * rec, char
|
||||
case IPMI_OEM_SUPERMICRO:
|
||||
case IPMI_OEM_SUPERMICRO_47488:
|
||||
sfx = ipmi_get_oem_desc(intf, rec);
|
||||
- break;
|
||||
+ break;
|
||||
+ case IPMI_OEM_QUANTA:
|
||||
+ sfx = ipmi_get_oem_desc(intf, rec);
|
||||
+ break;
|
||||
default:
|
||||
- break;
|
||||
+ break;
|
||||
}
|
||||
}
|
||||
/*
|
||||
@@ -1986,9 +1996,12 @@ ipmi_sel_print_std_entry(struct ipmi_intf * intf, struct sel_event_record * evt)
|
||||
case IPMI_OEM_SUPERMICRO:
|
||||
case IPMI_OEM_SUPERMICRO_47488:
|
||||
print_sensor = 0;
|
||||
- break;
|
||||
+ break;
|
||||
+ case IPMI_OEM_QUANTA:
|
||||
+ print_sensor = 0;
|
||||
+ break;
|
||||
default:
|
||||
- break;
|
||||
+ break;
|
||||
}
|
||||
/*
|
||||
* Sensor-Specific Discrete
|
||||
diff --git a/src/ipmitool.c b/src/ipmitool.c
|
||||
index 5e19c6e..ec0b741 100644
|
||||
--- a/src/ipmitool.c
|
||||
+++ b/src/ipmitool.c
|
||||
@@ -66,6 +66,7 @@
|
||||
#include <ipmitool/ipmi_ime.h>
|
||||
#include <ipmitool/ipmi_dcmi.h>
|
||||
#include <ipmitool/ipmi_vita.h>
|
||||
+#include <ipmitool/ipmi_quantaoem.h>
|
||||
|
||||
#ifdef HAVE_CONFIG_H
|
||||
# include <config.h>
|
||||
--
|
||||
2.20.1
|
||||
|
38
ipmitool/0014-lanplus-cipher-retry.patch
Normal file
38
ipmitool/0014-lanplus-cipher-retry.patch
Normal file
@ -0,0 +1,38 @@
|
||||
From 9d72def87ecc384d0a46525c766e755068fefe54 Mon Sep 17 00:00:00 2001
|
||||
From: =?UTF-8?q?V=C3=A1clav=20Dole=C5=BEal?= <vdolezal@redhat.com>
|
||||
Date: Thu, 28 May 2020 13:32:31 +0200
|
||||
Subject: [PATCH] lanplus: don't retry pre-session Get cipher suites
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain; charset=UTF-8
|
||||
Content-Transfer-Encoding: 8bit
|
||||
|
||||
Some BMCs are ignoring it, causing needless delay.
|
||||
|
||||
Signed-off-by: Václav Doležal <vdolezal@redhat.com>
|
||||
---
|
||||
src/plugins/lanplus/lanplus.c | 8 ++++++--
|
||||
1 file changed, 6 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/src/plugins/lanplus/lanplus.c b/src/plugins/lanplus/lanplus.c
|
||||
index 3087348..c442c0e 100644
|
||||
--- a/src/plugins/lanplus/lanplus.c
|
||||
+++ b/src/plugins/lanplus/lanplus.c
|
||||
@@ -3459,9 +3459,13 @@ ipmi_find_best_cipher_suite(struct ipmi_intf *intf)
|
||||
};
|
||||
const size_t nr_preferred = ARRAY_SIZE(cipher_order_preferred);
|
||||
size_t ipref, i;
|
||||
+ int rc;
|
||||
+ int retry_old = intf->ssn_params.retry;
|
||||
|
||||
- if (ipmi_get_channel_cipher_suites(intf, "ipmi", IPMI_LAN_CHANNEL_E,
|
||||
- suites, &nr_suites) < 0)
|
||||
+ ipmi_intf_session_set_retry(intf, 1);
|
||||
+ rc = ipmi_get_channel_cipher_suites(intf, "ipmi", IPMI_LAN_CHANNEL_E, suites, &nr_suites);
|
||||
+ ipmi_intf_session_set_retry(intf, retry_old);
|
||||
+ if (rc < 0)
|
||||
{
|
||||
/* default legacy behavior - cipher suite 3 if none is requested */
|
||||
return IPMI_LANPLUS_CIPHER_SUITE_3;
|
||||
--
|
||||
2.25.4
|
||||
|
@ -0,0 +1,65 @@
|
||||
From 646160e2175f9e0ba33e4f2bda12d84555e9c30e Mon Sep 17 00:00:00 2001
|
||||
From: Alexander Amelkin <alexander@amelkin.msk.ru>
|
||||
Date: Thu, 29 Nov 2018 13:10:53 +0300
|
||||
Subject: [PATCH] lanplus: Cleanup. Refix 6dec83ff, fix be2c0c4b
|
||||
|
||||
This is a cleanup commit.
|
||||
|
||||
Commit 6dec83ff removed assignment of `rsp` pointer
|
||||
in SOL-processing block of ipmi_lan_poll_single(),
|
||||
but left the check for the pointer validity in place.
|
||||
Although that has effectively fixed the bug of potentially
|
||||
accessing the null `rsp` pointer in the `else` block introduced
|
||||
with be2c0c4b, the resulting if/else looked suspicious and left
|
||||
and impression that a NULL pointer could still be accessed.
|
||||
|
||||
This commit removes the check for `rsp` from the `if`
|
||||
as it is checked at the start of the function where `rsp`
|
||||
is initialized (and that is the only place where it is ever changed).
|
||||
|
||||
Signed-off-by: Alexander Amelkin <alexander@amelkin.msk.ru>
|
||||
(cherry picked from commit 64727f59c4a1412fdb73e092fb838ae66e2aad1a)
|
||||
|
||||
lanplus: Fix segfault for truncated dcmi response
|
||||
|
||||
On occasion a dcmi power reading will return error C6, and a
|
||||
truncated response payload. As the decrypted payload is shorter
|
||||
than the expected length, lanplus_decrypt_aes_cbc_128() adjusts
|
||||
the payload_size downward by one byte. In ipmi_lan_poll_single()
|
||||
the calculation to determine if the payload size has increased
|
||||
erroniously sets extra_data_length to -1, with a subsequent
|
||||
segv when calling a memmove to shift response data.
|
||||
The fix is to check for a positive value in the extra_data_length.
|
||||
|
||||
Resolves ipmitool/ipmitool#72
|
||||
|
||||
(cherry picked from commit 9ec2232321a7bca7e1fb8f939d071f12c8dfa7fd)
|
||||
---
|
||||
src/plugins/lanplus/lanplus.c | 4 ++--
|
||||
1 file changed, 2 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/src/plugins/lanplus/lanplus.c b/src/plugins/lanplus/lanplus.c
|
||||
index c442c0e..ef132f6 100644
|
||||
--- a/src/plugins/lanplus/lanplus.c
|
||||
+++ b/src/plugins/lanplus/lanplus.c
|
||||
@@ -814,7 +814,7 @@ ipmi_lan_poll_single(struct ipmi_intf * intf)
|
||||
* rsp->data_len becomes the length of that data
|
||||
*/
|
||||
extra_data_length = payload_size - (offset - payload_start) - 1;
|
||||
- if (extra_data_length) {
|
||||
+ if (extra_data_length > 0) {
|
||||
rsp->data_len = extra_data_length;
|
||||
memmove(rsp->data, rsp->data + offset, extra_data_length);
|
||||
} else {
|
||||
@@ -868,7 +868,7 @@ ipmi_lan_poll_single(struct ipmi_intf * intf)
|
||||
}
|
||||
read_sol_packet(rsp, &offset);
|
||||
extra_data_length = payload_size - (offset - payload_start);
|
||||
- if (rsp && extra_data_length) {
|
||||
+ if (extra_data_length > 0) {
|
||||
rsp->data_len = extra_data_length;
|
||||
memmove(rsp->data, rsp->data + offset, extra_data_length);
|
||||
} else {
|
||||
--
|
||||
2.26.3
|
||||
|
@ -15,10 +15,20 @@ if (grep /Red Hat Enterprise Linux Server release 5\.\d/, @output) {
|
||||
$os = "rh7";
|
||||
} elsif (grep /Red Hat Enterprise Linux release 8\.\d/, @output) {
|
||||
$os = "rh8";
|
||||
} elsif (grep /Red Hat Enterprise Linux release 9\.\d/, @output) {
|
||||
$os = "rh9";
|
||||
} elsif (grep /CentOS Linux release 7\.\d/, @output) {
|
||||
$os = "rh7";
|
||||
} elsif (grep /CentOS release 6\.\d/, @output) {
|
||||
$os = "rh6";
|
||||
} elsif (grep /AlmaLinux 8\.\d/, @output) {
|
||||
$os = "rh8";
|
||||
} elsif (grep /AlmaLinux 9\.\d/, @output) {
|
||||
$os = "rh9";
|
||||
} elsif (grep /Rocky Linux 8\.\d/, @output) {
|
||||
$os = "rh8";
|
||||
} elsif (grep /Rocky Linux 9\.\d/, @output) {
|
||||
$os = "rh9";
|
||||
} elsif (grep /SUSE Linux Enterprise Server 10/, @output) {
|
||||
$os = "sles10";
|
||||
} elsif (grep /SUSE Linux Enterprise Server 11/, @output) {
|
||||
|
@ -1,7 +1,7 @@
|
||||
Name: ipmitool-xcat
|
||||
Summary: ipmitool - Utility for IPMI control
|
||||
Version: 1.8.18
|
||||
Release: 3
|
||||
Release: 4
|
||||
License: BSD
|
||||
Group: Utilities
|
||||
Packager: IBM Corp.
|
||||
@ -15,18 +15,29 @@ Patch4: 0004-slowswid.patch
|
||||
Patch5: 0005-sensor-id-length.patch
|
||||
Patch6: 0006-enable-usb.patch
|
||||
Patch7: 0007-check-input.patch
|
||||
Patch8: 0008-add-extern.patch
|
||||
Patch9: 0009-best-cipher.patch
|
||||
Patch10: 0010-pef-missing-newline.patch
|
||||
Patch11: 0011-expand-sensor-name-column.patch
|
||||
Patch12: 0012-CVE-2020-5208.patch
|
||||
Patch13: 0013-quanta-oem-support.patch
|
||||
Patch14: 0014-lanplus-cipher-retry.patch
|
||||
Patch15: 0015-lanplus-Cleanup.-Refix-6dec83ff-fix-be2c0c4b.patch
|
||||
|
||||
Patch80: ipmitool-%{version}-saneretry.patch
|
||||
Patch82: ipmitool-%{version}-rflash.patch
|
||||
Patch83: ipmitool-%{version}-signal.patch
|
||||
|
||||
Patch12: 0012-CVE-2020-5208.patch
|
||||
|
||||
Buildroot: /var/tmp/ipmitool-root
|
||||
|
||||
BuildRequires: openssl-devel readline-devel ncurses-devel
|
||||
%{?systemd_requires}
|
||||
BuildRequires: systemd
|
||||
# bootstrap
|
||||
BuildRequires: automake autoconf libtool
|
||||
Obsoletes: OpenIPMI-tools < 2.0.14-3
|
||||
Provides: OpenIPMI-tools = 2.0.14-3
|
||||
|
||||
|
||||
%description
|
||||
This package contains a utility for interfacing with devices that support
|
||||
@ -56,10 +67,17 @@ fi
|
||||
%patch5 -p1
|
||||
%patch6 -p1
|
||||
%patch7 -p1
|
||||
%patch8 -p1
|
||||
%patch9 -p1
|
||||
%patch10 -p1
|
||||
%patch11 -p1
|
||||
%patch12 -p1
|
||||
%patch13 -p1
|
||||
%patch14 -p1
|
||||
%patch15 -p1
|
||||
%patch80 -p1
|
||||
%patch82 -p1
|
||||
%patch83 -p1
|
||||
%patch12 -p1
|
||||
|
||||
for f in AUTHORS ChangeLog; do
|
||||
iconv -f iso-8859-1 -t utf8 < ${f} > ${f}.utf8
|
||||
@ -72,6 +90,8 @@ done
|
||||
# --disable-intf-free disables FreeIPMI support - we don't want to depend on
|
||||
# FreeIPMI libraries, FreeIPMI has its own ipmitoool-like utility.
|
||||
|
||||
# begin: release auto-tools
|
||||
# Used to be needed by aarch64 support, now only cxoem patch makefiles are left.
|
||||
aclocal
|
||||
libtoolize --automake --copy
|
||||
autoheader
|
||||
@ -79,20 +99,10 @@ automake --foreign --add-missing --copy
|
||||
aclocal
|
||||
autoconf
|
||||
automake --foreign
|
||||
%configure --disable-dependency-tracking \
|
||||
--enable-file-security \
|
||||
--disable-intf-free \
|
||||
--with-kerneldir \
|
||||
--with-rpm-distro= \
|
||||
--prefix=%{_prefix} \
|
||||
--bindir=%{_bindir} \
|
||||
--sbindir=%{_sbindir} \
|
||||
--datadir=%{_datadir} \
|
||||
--includedir=%{_includedir} \
|
||||
--libdir=%{_libdir} \
|
||||
--mandir=%{_mandir} \
|
||||
--sysconfdir=%{_sysconfdir}
|
||||
make
|
||||
# end: release auto-tools
|
||||
|
||||
%configure --disable-dependency-tracking --enable-file-security --disable-intf-free
|
||||
make %{?_smp_mflags}
|
||||
|
||||
%install
|
||||
mkdir -p $RPM_BUILD_ROOT/opt/xcat/bin
|
||||
@ -109,6 +119,8 @@ fi
|
||||
|
||||
|
||||
%changelog
|
||||
* Mon Sep 26 2022 <markus.hilger@megware.com> 1.8.18-4
|
||||
Rebuild on RHEL 9. Merge patches from RHEL 9
|
||||
* Thu Apr 30 2020 <cxhong@us.ibm.com> 1.8.18-3
|
||||
Add security patch CVE-2020-5208
|
||||
* Thu Nov 15 2018 <gongjie@linux.vnet.ibm.com> 1.8.18-2
|
||||
|
Loading…
Reference in New Issue
Block a user