|
Packit Service |
ed0f68 |
/*
|
|
Packit Service |
ed0f68 |
* Copyright (c) 2003 Sun Microsystems, Inc. All Rights Reserved.
|
|
Packit Service |
ed0f68 |
*
|
|
Packit Service |
ed0f68 |
* Redistribution and use in source and binary forms, with or without
|
|
Packit Service |
ed0f68 |
* modification, are permitted provided that the following conditions
|
|
Packit Service |
ed0f68 |
* are met:
|
|
Packit Service |
ed0f68 |
*
|
|
Packit Service |
ed0f68 |
* Redistribution of source code must retain the above copyright
|
|
Packit Service |
ed0f68 |
* notice, this list of conditions and the following disclaimer.
|
|
Packit Service |
ed0f68 |
*
|
|
Packit Service |
ed0f68 |
* Redistribution in binary form must reproduce the above copyright
|
|
Packit Service |
ed0f68 |
* notice, this list of conditions and the following disclaimer in the
|
|
Packit Service |
ed0f68 |
* documentation and/or other materials provided with the distribution.
|
|
Packit Service |
ed0f68 |
*
|
|
Packit Service |
ed0f68 |
* Neither the name of Sun Microsystems, Inc. or the names of
|
|
Packit Service |
ed0f68 |
* contributors may be used to endorse or promote products derived
|
|
Packit Service |
ed0f68 |
* from this software without specific prior written permission.
|
|
Packit Service |
ed0f68 |
*
|
|
Packit Service |
ed0f68 |
* This software is provided "AS IS," without a warranty of any kind.
|
|
Packit Service |
ed0f68 |
* ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
|
|
Packit Service |
ed0f68 |
* INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A
|
|
Packit Service |
ed0f68 |
* PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED.
|
|
Packit Service |
ed0f68 |
* SUN MICROSYSTEMS, INC. ("SUN") AND ITS LICENSORS SHALL NOT BE LIABLE
|
|
Packit Service |
ed0f68 |
* FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, MODIFYING
|
|
Packit Service |
ed0f68 |
* OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. IN NO EVENT WILL
|
|
Packit Service |
ed0f68 |
* SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA,
|
|
Packit Service |
ed0f68 |
* OR FOR DIRECT, INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL OR
|
|
Packit Service |
ed0f68 |
* PUNITIVE DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF
|
|
Packit Service |
ed0f68 |
* LIABILITY, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS SOFTWARE,
|
|
Packit Service |
ed0f68 |
* EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
|
|
Packit Service |
ed0f68 |
*/
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
#include "lanplus.h"
|
|
Packit Service |
ed0f68 |
#include "lanplus_crypt.h"
|
|
Packit Service |
ed0f68 |
#include "lanplus_dump.h"
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
extern const struct valstr ipmi_rakp_return_codes[];
|
|
Packit Service |
ed0f68 |
extern const struct valstr ipmi_priv_levels[];
|
|
Packit Service |
ed0f68 |
extern const struct valstr ipmi_auth_algorithms[];
|
|
Packit Service |
ed0f68 |
extern const struct valstr ipmi_integrity_algorithms[];
|
|
Packit Service |
ed0f68 |
extern const struct valstr ipmi_encryption_algorithms[];
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
#define DUMP_PREFIX_INCOMING "<<"
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
void lanplus_dump_open_session_response(const struct ipmi_rs * rsp)
|
|
Packit Service |
ed0f68 |
{
|
|
Packit Service |
ed0f68 |
if (verbose < 2)
|
|
Packit Service |
ed0f68 |
return;
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%sOPEN SESSION RESPONSE\n", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%s Message tag : 0x%02x\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
rsp->payload.open_session_response.message_tag);
|
|
Packit Service |
ed0f68 |
printf("%s RMCP+ status : %s\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
val2str(rsp->payload.open_session_response.rakp_return_code,
|
|
Packit Service |
ed0f68 |
ipmi_rakp_return_codes));
|
|
Packit Service |
ed0f68 |
printf("%s Maximum privilege level : %s\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
val2str(rsp->payload.open_session_response.max_priv_level,
|
|
Packit Service |
ed0f68 |
ipmi_priv_levels));
|
|
Packit Service |
ed0f68 |
printf("%s Console Session ID : 0x%08lx\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
(long)rsp->payload.open_session_response.console_id);
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
/* only tag, status, privlvl, and console id are returned if error */
|
|
Packit Service |
ed0f68 |
if (rsp->payload.open_session_response.rakp_return_code !=
|
|
Packit Service |
ed0f68 |
IPMI_RAKP_STATUS_NO_ERRORS)
|
|
Packit Service |
ed0f68 |
return;
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%s BMC Session ID : 0x%08lx\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
(long)rsp->payload.open_session_response.bmc_id);
|
|
Packit Service |
ed0f68 |
printf("%s Negotiated authenticatin algorithm : %s\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
val2str(rsp->payload.open_session_response.auth_alg,
|
|
Packit Service |
ed0f68 |
ipmi_auth_algorithms));
|
|
Packit Service |
ed0f68 |
printf("%s Negotiated integrity algorithm : %s\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
val2str(rsp->payload.open_session_response.integrity_alg,
|
|
Packit Service |
ed0f68 |
ipmi_integrity_algorithms));
|
|
Packit Service |
ed0f68 |
printf("%s Negotiated encryption algorithm : %s\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
val2str(rsp->payload.open_session_response.crypt_alg,
|
|
Packit Service |
ed0f68 |
ipmi_encryption_algorithms));
|
|
Packit Service |
ed0f68 |
printf("\n");
|
|
Packit Service |
ed0f68 |
}
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
void lanplus_dump_rakp2_message(const struct ipmi_rs * rsp, uint8_t auth_alg)
|
|
Packit Service |
ed0f68 |
{
|
|
Packit Service |
ed0f68 |
int i;
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
if (verbose < 2)
|
|
Packit Service |
ed0f68 |
return;
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%sRAKP 2 MESSAGE\n", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%s Message tag : 0x%02x\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
rsp->payload.rakp2_message.message_tag);
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%s RMCP+ status : %s\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
val2str(rsp->payload.rakp2_message.rakp_return_code,
|
|
Packit Service |
ed0f68 |
ipmi_rakp_return_codes));
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%s Console Session ID : 0x%08lx\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
(long)rsp->payload.rakp2_message.console_id);
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%s BMC random number : 0x", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
for (i = 0; i < 16; ++i)
|
|
Packit Service |
ed0f68 |
printf("%02x", rsp->payload.rakp2_message.bmc_rand[i]);
|
|
Packit Service |
ed0f68 |
printf("\n");
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%s BMC GUID : 0x", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
for (i = 0; i < 16; ++i)
|
|
Packit Service |
ed0f68 |
printf("%02x", rsp->payload.rakp2_message.bmc_guid[i]);
|
|
Packit Service |
ed0f68 |
printf("\n");
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
switch(auth_alg)
|
|
Packit Service |
ed0f68 |
{
|
|
Packit Service |
ed0f68 |
case IPMI_AUTH_RAKP_NONE:
|
|
Packit Service |
ed0f68 |
printf("%s Key exchange auth code : none\n", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
break;
|
|
Packit Service |
ed0f68 |
case IPMI_AUTH_RAKP_HMAC_SHA1:
|
|
Packit Service |
ed0f68 |
printf("%s Key exchange auth code [sha1] : 0x", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
for (i = 0; i < IPMI_SHA_DIGEST_LENGTH; ++i) {
|
|
Packit Service |
ed0f68 |
printf("%02x", rsp->payload.rakp2_message.key_exchange_auth_code[i]);
|
|
Packit Service |
ed0f68 |
}
|
|
Packit Service |
ed0f68 |
printf("\n");
|
|
Packit Service |
ed0f68 |
break;
|
|
Packit Service |
ed0f68 |
case IPMI_AUTH_RAKP_HMAC_MD5:
|
|
Packit Service |
ed0f68 |
printf("%s Key exchange auth code [md5] : 0x", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
for (i = 0; i < IPMI_MD5_DIGEST_LENGTH; ++i) {
|
|
Packit Service |
ed0f68 |
printf("%02x", rsp->payload.rakp2_message.key_exchange_auth_code[i]);
|
|
Packit Service |
ed0f68 |
}
|
|
Packit Service |
ed0f68 |
printf("\n");
|
|
Packit Service |
ed0f68 |
break;
|
|
Packit Service |
ed0f68 |
#ifdef HAVE_CRYPTO_SHA256
|
|
Packit Service |
ed0f68 |
case IPMI_AUTH_RAKP_HMAC_SHA256:
|
|
Packit Service |
ed0f68 |
printf("%s Key exchange auth code [sha256]: 0x", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
for (i = 0; i < IPMI_SHA256_DIGEST_LENGTH; ++i) {
|
|
Packit Service |
ed0f68 |
printf("%02x", rsp->payload.rakp2_message.key_exchange_auth_code[i]);
|
|
Packit Service |
ed0f68 |
}
|
|
Packit Service |
ed0f68 |
printf("\n");
|
|
Packit Service |
ed0f68 |
break;
|
|
Packit Service |
ed0f68 |
#endif /* HAVE_CRYPTO_SHA256 */
|
|
Packit Service |
ed0f68 |
default:
|
|
Packit Service |
ed0f68 |
printf("%s Key exchange auth code : invalid", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
}
|
|
Packit Service |
ed0f68 |
printf("\n");
|
|
Packit Service |
ed0f68 |
}
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
void lanplus_dump_rakp4_message(const struct ipmi_rs * rsp, uint8_t auth_alg)
|
|
Packit Service |
ed0f68 |
{
|
|
Packit Service |
ed0f68 |
int i;
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
if (verbose < 2)
|
|
Packit Service |
ed0f68 |
return;
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%sRAKP 4 MESSAGE\n", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%s Message tag : 0x%02x\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
rsp->payload.rakp4_message.message_tag);
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%s RMCP+ status : %s\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
val2str(rsp->payload.rakp4_message.rakp_return_code,
|
|
Packit Service |
ed0f68 |
ipmi_rakp_return_codes));
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
printf("%s Console Session ID : 0x%08lx\n",
|
|
Packit Service |
ed0f68 |
DUMP_PREFIX_INCOMING,
|
|
Packit Service |
ed0f68 |
(long)rsp->payload.rakp4_message.console_id);
|
|
Packit Service |
ed0f68 |
|
|
Packit Service |
ed0f68 |
switch(auth_alg)
|
|
Packit Service |
ed0f68 |
{
|
|
Packit Service |
ed0f68 |
case IPMI_AUTH_RAKP_NONE:
|
|
Packit Service |
ed0f68 |
printf("%s Key exchange auth code : none\n", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
break;
|
|
Packit Service |
ed0f68 |
case IPMI_AUTH_RAKP_HMAC_SHA1:
|
|
Packit Service |
ed0f68 |
printf("%s Key exchange auth code [sha1] : 0x", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
for (i = 0; i < IPMI_SHA1_AUTHCODE_SIZE; ++i) {
|
|
Packit Service |
ed0f68 |
printf("%02x", rsp->payload.rakp4_message.integrity_check_value[i]);
|
|
Packit Service |
ed0f68 |
}
|
|
Packit Service |
ed0f68 |
printf("\n");
|
|
Packit Service |
ed0f68 |
break;
|
|
Packit Service |
ed0f68 |
case IPMI_AUTH_RAKP_HMAC_MD5:
|
|
Packit Service |
ed0f68 |
printf("%s Key exchange auth code [md5] : 0x", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
for (i = 0; i < IPMI_HMAC_MD5_AUTHCODE_SIZE; ++i) {
|
|
Packit Service |
ed0f68 |
printf("%02x", rsp->payload.rakp4_message.integrity_check_value[i]);
|
|
Packit Service |
ed0f68 |
}
|
|
Packit Service |
ed0f68 |
printf("\n");
|
|
Packit Service |
ed0f68 |
break;
|
|
Packit Service |
ed0f68 |
#ifdef HAVE_CRYPTO_SHA256
|
|
Packit Service |
ed0f68 |
case IPMI_AUTH_RAKP_HMAC_SHA256:
|
|
Packit Service |
ed0f68 |
printf("%s Key exchange auth code [sha256]: 0x", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
for (i = 0; i < IPMI_HMAC_SHA256_AUTHCODE_SIZE; ++i) {
|
|
Packit Service |
ed0f68 |
printf("%02x", rsp->payload.rakp4_message.integrity_check_value[i]);
|
|
Packit Service |
ed0f68 |
}
|
|
Packit Service |
ed0f68 |
printf("\n");
|
|
Packit Service |
ed0f68 |
break;
|
|
Packit Service |
ed0f68 |
#endif /* HAVE_CRYPTO_SHA256 */
|
|
Packit Service |
ed0f68 |
default:
|
|
Packit Service |
ed0f68 |
printf("%s Key exchange auth code : invalid", DUMP_PREFIX_INCOMING);
|
|
Packit Service |
ed0f68 |
}
|
|
Packit Service |
ed0f68 |
printf("\n");
|
|
Packit Service |
ed0f68 |
}
|
|
Packit Service |
ed0f68 |
|