summaryrefslogtreecommitdiffstats
path: root/auth_algo.cpp
Commit message (Collapse)AuthorAgeFilesLines
* netipmid: replace std::cerr with phosphor::logging callsVernon Mauery2018-12-191-5/+8
| | | | | | | | This is part of a cleanup and standardization effort of code to get existing code up to date. Change-Id: I0c982ef8d7afa2f56a9cd204bb8ac3112769641c Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
* netipmid: apply clang-format rulesVernon Mauery2018-11-021-12/+12
| | | | | | | | Lots of whitespace change. Let clang-format do its job and keep the code looking nice. Change-Id: Idfcad1a99cab8170d55a06163de8ad3f420b68b7 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
* Support username for IPMI default user accountTom Joseph2018-04-231-0/+2
| | | | | | | | | | | | | The current support in IPMI is for the nameless account, which has no username and only password associated with the account. In ipmitool for the nameless account -U option is not needed. There are management scripts which take a parameter for -U option and fails if -U option is not supported by ipmitool option. This patch is to support "admin" username for the default account. Once full fledged user account management is in place, this change can be removed. Change-Id: Idad73c0d04f189af66f2365424a68a637fe0e476 Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
* Add support for cipher suite 17Vernon Mauery2017-12-081-0/+34
| | | | | | | | | cipher suite 17 uses RAKP_HMAC_SHA256 for authentication and RAKP_HMAC_SHA256_128 for integrity. This adds those in and fixes up the lookups so the stack knows about the new algorithms. Change-Id: Icdc66563d08060fc0e541ceaf3bee9dd5f89fdb2 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
* Prepare for adding RMCP+ cipher suite 17Vernon Mauery2017-12-071-0/+1
| | | | | | | | | | In many places, there are baked-in assumptions about algorithms that tie the session initiation to cipher suite 3. This commit teases out those assumptions and prepares for the next patch that actually adds in the new authentication and integrity algorithms to support cipher suite 17. Change-Id: I2ee3672a7c503b89c5ff0aba30cf7a4601e24d04 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
* explicit use of std::vector instead of buffer/BufferVernon Mauery2017-12-051-2/+4
| | | | | | | | | | There were several scoped 'using buffer = std::vector<uint8_t>;' in header files. This consolidates the code base to use std::vector<uint8_t> instead of buffer or Buffer. This makes the code easier to read and debug. Change-Id: I918a0f6ca9b8e4b9d331175dccff45cbf4c8379d Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
* Truncate Integrity Check Value to the correct lengthVernon Mauery2017-12-041-0/+1
| | | | | | | | | | | | | According to the RMCP+ spec: RAKP-HMAC-SHA1 specifies the use of RAKP messages for the key exchange portion of establishing the session, and that HMAC-SHA1 (per [RFC2104]) is used to create 20-byte Key Exchange Authentication Code fields in RAKP Message 2 and RAKP Message 3. HMAC-SHA1-96 (per [RFC2404]) is used for generating a 12-byte Integrity Check Value field for RAKP Message 4. Change-Id: Ic85b79a748ceb4083b613a0df1c253d8099a6c22 Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
* Implemenation of the RAKP Authentication AlgorithmsTom Joseph2016-11-211-0/+46
This patch contains the implementation of the RAKP-HMAC_SHA1 algorithm for Authentication.OpenSSL is used for the HMAC operation. Change-Id: I7e926aca9010443939e32f476c37ac1481cd2476 Signed-off-by: Tom Joseph <tomjoseph@in.ibm.com>
OpenPOWER on IntegriCloud