Blame src/plugins/lanplus/lanplus_dump.c

Packit Service ed0f68
/*
Packit Service ed0f68
 * Copyright (c) 2003 Sun Microsystems, Inc.  All Rights Reserved.
Packit Service ed0f68
 * 
Packit Service ed0f68
 * Redistribution and use in source and binary forms, with or without
Packit Service ed0f68
 * modification, are permitted provided that the following conditions
Packit Service ed0f68
 * are met:
Packit Service ed0f68
 * 
Packit Service ed0f68
 * Redistribution of source code must retain the above copyright
Packit Service ed0f68
 * notice, this list of conditions and the following disclaimer.
Packit Service ed0f68
 * 
Packit Service ed0f68
 * Redistribution in binary form must reproduce the above copyright
Packit Service ed0f68
 * notice, this list of conditions and the following disclaimer in the
Packit Service ed0f68
 * documentation and/or other materials provided with the distribution.
Packit Service ed0f68
 * 
Packit Service ed0f68
 * Neither the name of Sun Microsystems, Inc. or the names of
Packit Service ed0f68
 * contributors may be used to endorse or promote products derived
Packit Service ed0f68
 * from this software without specific prior written permission.
Packit Service ed0f68
 * 
Packit Service ed0f68
 * This software is provided "AS IS," without a warranty of any kind.
Packit Service ed0f68
 * ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
Packit Service ed0f68
 * INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A
Packit Service ed0f68
 * PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED.
Packit Service ed0f68
 * SUN MICROSYSTEMS, INC. ("SUN") AND ITS LICENSORS SHALL NOT BE LIABLE
Packit Service ed0f68
 * FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, MODIFYING
Packit Service ed0f68
 * OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES.  IN NO EVENT WILL
Packit Service ed0f68
 * SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA,
Packit Service ed0f68
 * OR FOR DIRECT, INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL OR
Packit Service ed0f68
 * PUNITIVE DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF
Packit Service ed0f68
 * LIABILITY, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS SOFTWARE,
Packit Service ed0f68
 * EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Packit Service ed0f68
 */
Packit Service ed0f68
Packit Service ed0f68
#include "lanplus.h"
Packit Service ed0f68
#include "lanplus_crypt.h"
Packit Service ed0f68
#include "lanplus_dump.h"
Packit Service ed0f68
Packit Service ed0f68
extern const struct valstr ipmi_rakp_return_codes[];
Packit Service ed0f68
extern const struct valstr ipmi_priv_levels[];
Packit Service ed0f68
extern const struct valstr ipmi_auth_algorithms[];
Packit Service ed0f68
extern const struct valstr ipmi_integrity_algorithms[];
Packit Service ed0f68
extern const struct valstr ipmi_encryption_algorithms[];
Packit Service ed0f68
Packit Service ed0f68
#define DUMP_PREFIX_INCOMING "<<"
Packit Service ed0f68
Packit Service ed0f68
void lanplus_dump_open_session_response(const struct ipmi_rs * rsp)
Packit Service ed0f68
{
Packit Service ed0f68
	if (verbose < 2)
Packit Service ed0f68
		return;
Packit Service ed0f68
Packit Service ed0f68
 	printf("%sOPEN SESSION RESPONSE\n", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
Packit Service ed0f68
	printf("%s  Message tag                        : 0x%02x\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   rsp->payload.open_session_response.message_tag);
Packit Service ed0f68
	printf("%s  RMCP+ status                       : %s\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   val2str(rsp->payload.open_session_response.rakp_return_code,
Packit Service ed0f68
				   ipmi_rakp_return_codes));
Packit Service ed0f68
	printf("%s  Maximum privilege level            : %s\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   val2str(rsp->payload.open_session_response.max_priv_level,
Packit Service ed0f68
				   ipmi_priv_levels));
Packit Service ed0f68
	printf("%s  Console Session ID                 : 0x%08lx\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   (long)rsp->payload.open_session_response.console_id);
Packit Service ed0f68
Packit Service ed0f68
	/* only tag, status, privlvl, and console id are returned if error */
Packit Service ed0f68
	if (rsp->payload.open_session_response.rakp_return_code !=
Packit Service ed0f68
	    IPMI_RAKP_STATUS_NO_ERRORS)
Packit Service ed0f68
		return;
Packit Service ed0f68
Packit Service ed0f68
	printf("%s  BMC Session ID                     : 0x%08lx\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   (long)rsp->payload.open_session_response.bmc_id);
Packit Service ed0f68
	printf("%s  Negotiated authenticatin algorithm : %s\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   val2str(rsp->payload.open_session_response.auth_alg,
Packit Service ed0f68
				   ipmi_auth_algorithms));
Packit Service ed0f68
	printf("%s  Negotiated integrity algorithm     : %s\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   val2str(rsp->payload.open_session_response.integrity_alg,
Packit Service ed0f68
				   ipmi_integrity_algorithms));
Packit Service ed0f68
	printf("%s  Negotiated encryption algorithm    : %s\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   val2str(rsp->payload.open_session_response.crypt_alg,
Packit Service ed0f68
				   ipmi_encryption_algorithms));
Packit Service ed0f68
	printf("\n");
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
Packit Service ed0f68
Packit Service ed0f68
void lanplus_dump_rakp2_message(const struct ipmi_rs * rsp, uint8_t auth_alg)
Packit Service ed0f68
{
Packit Service ed0f68
	int i;
Packit Service ed0f68
Packit Service ed0f68
	if (verbose < 2)
Packit Service ed0f68
		return;
Packit Service ed0f68
Packit Service ed0f68
	printf("%sRAKP 2 MESSAGE\n", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
Packit Service ed0f68
	printf("%s  Message tag                   : 0x%02x\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   rsp->payload.rakp2_message.message_tag);
Packit Service ed0f68
Packit Service ed0f68
	printf("%s  RMCP+ status                  : %s\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   val2str(rsp->payload.rakp2_message.rakp_return_code,
Packit Service ed0f68
				   ipmi_rakp_return_codes));
Packit Service ed0f68
Packit Service ed0f68
	printf("%s  Console Session ID            : 0x%08lx\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   (long)rsp->payload.rakp2_message.console_id);
Packit Service ed0f68
Packit Service ed0f68
	printf("%s  BMC random number             : 0x", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
	for (i = 0; i < 16; ++i)
Packit Service ed0f68
		printf("%02x", rsp->payload.rakp2_message.bmc_rand[i]);
Packit Service ed0f68
	printf("\n");
Packit Service ed0f68
Packit Service ed0f68
	printf("%s  BMC GUID                      : 0x", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
	for (i = 0; i < 16; ++i)
Packit Service ed0f68
		printf("%02x", rsp->payload.rakp2_message.bmc_guid[i]);
Packit Service ed0f68
	printf("\n");
Packit Service ed0f68
Packit Service ed0f68
	switch(auth_alg)
Packit Service ed0f68
	{
Packit Service ed0f68
	case IPMI_AUTH_RAKP_NONE:
Packit Service ed0f68
		printf("%s  Key exchange auth code         : none\n", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
		break;
Packit Service ed0f68
	case IPMI_AUTH_RAKP_HMAC_SHA1:
Packit Service ed0f68
		printf("%s  Key exchange auth code [sha1] : 0x", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
		for (i = 0; i < IPMI_SHA_DIGEST_LENGTH; ++i) {
Packit Service ed0f68
			printf("%02x", rsp->payload.rakp2_message.key_exchange_auth_code[i]);
Packit Service ed0f68
		}
Packit Service ed0f68
		printf("\n");
Packit Service ed0f68
		break;
Packit Service ed0f68
	case IPMI_AUTH_RAKP_HMAC_MD5:
Packit Service ed0f68
		printf("%s  Key exchange auth code [md5]   : 0x", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
		for (i = 0; i < IPMI_MD5_DIGEST_LENGTH; ++i) {
Packit Service ed0f68
			printf("%02x", rsp->payload.rakp2_message.key_exchange_auth_code[i]);
Packit Service ed0f68
		}
Packit Service ed0f68
		printf("\n");
Packit Service ed0f68
		break;
Packit Service ed0f68
#ifdef HAVE_CRYPTO_SHA256
Packit Service ed0f68
	case IPMI_AUTH_RAKP_HMAC_SHA256:
Packit Service ed0f68
		printf("%s  Key exchange auth code [sha256]: 0x", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
		for (i = 0; i < IPMI_SHA256_DIGEST_LENGTH; ++i) {
Packit Service ed0f68
			printf("%02x", rsp->payload.rakp2_message.key_exchange_auth_code[i]);
Packit Service ed0f68
		}
Packit Service ed0f68
		printf("\n");
Packit Service ed0f68
		break;
Packit Service ed0f68
#endif /* HAVE_CRYPTO_SHA256 */
Packit Service ed0f68
	default:
Packit Service ed0f68
		printf("%s  Key exchange auth code         : invalid", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
	}
Packit Service ed0f68
	printf("\n");
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
Packit Service ed0f68
Packit Service ed0f68
void lanplus_dump_rakp4_message(const struct ipmi_rs * rsp, uint8_t auth_alg)
Packit Service ed0f68
{
Packit Service ed0f68
	int i;
Packit Service ed0f68
Packit Service ed0f68
	if (verbose < 2)
Packit Service ed0f68
		return;
Packit Service ed0f68
Packit Service ed0f68
	printf("%sRAKP 4 MESSAGE\n", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
Packit Service ed0f68
	printf("%s  Message tag                   : 0x%02x\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   rsp->payload.rakp4_message.message_tag);
Packit Service ed0f68
Packit Service ed0f68
	printf("%s  RMCP+ status                  : %s\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   val2str(rsp->payload.rakp4_message.rakp_return_code,
Packit Service ed0f68
				   ipmi_rakp_return_codes));
Packit Service ed0f68
Packit Service ed0f68
	printf("%s  Console Session ID            : 0x%08lx\n",
Packit Service ed0f68
		   DUMP_PREFIX_INCOMING,
Packit Service ed0f68
		   (long)rsp->payload.rakp4_message.console_id);
Packit Service ed0f68
Packit Service ed0f68
	switch(auth_alg)
Packit Service ed0f68
	{
Packit Service ed0f68
	case IPMI_AUTH_RAKP_NONE:
Packit Service ed0f68
		printf("%s  Key exchange auth code        : none\n", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
		break;
Packit Service ed0f68
	case IPMI_AUTH_RAKP_HMAC_SHA1:
Packit Service ed0f68
		printf("%s  Key exchange auth code [sha1] : 0x", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
		for (i = 0; i < IPMI_SHA1_AUTHCODE_SIZE; ++i) {
Packit Service ed0f68
			printf("%02x", rsp->payload.rakp4_message.integrity_check_value[i]);
Packit Service ed0f68
		}
Packit Service ed0f68
		printf("\n");
Packit Service ed0f68
		break;
Packit Service ed0f68
	case IPMI_AUTH_RAKP_HMAC_MD5:
Packit Service ed0f68
		printf("%s  Key exchange auth code [md5]   : 0x", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
		for (i = 0; i < IPMI_HMAC_MD5_AUTHCODE_SIZE; ++i) {
Packit Service ed0f68
			printf("%02x", rsp->payload.rakp4_message.integrity_check_value[i]);
Packit Service ed0f68
		}
Packit Service ed0f68
		printf("\n");
Packit Service ed0f68
		break;
Packit Service ed0f68
#ifdef HAVE_CRYPTO_SHA256
Packit Service ed0f68
	case IPMI_AUTH_RAKP_HMAC_SHA256:
Packit Service ed0f68
		printf("%s  Key exchange auth code [sha256]: 0x", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
		for (i = 0; i < IPMI_HMAC_SHA256_AUTHCODE_SIZE; ++i) {
Packit Service ed0f68
			printf("%02x", rsp->payload.rakp4_message.integrity_check_value[i]);
Packit Service ed0f68
		}
Packit Service ed0f68
		printf("\n");
Packit Service ed0f68
		break;
Packit Service ed0f68
#endif /* HAVE_CRYPTO_SHA256 */
Packit Service ed0f68
	default:
Packit Service ed0f68
		printf("%s  Key exchange auth code         : invalid", DUMP_PREFIX_INCOMING);
Packit Service ed0f68
	}
Packit Service ed0f68
	printf("\n");
Packit Service ed0f68
}
Packit Service ed0f68