|
@@ -0,0 +1,3631 @@
|
|
|
+/****************************************************************
|
|
|
+****************************************************************
|
|
|
+** **
|
|
|
+** (C)Copyright 2005-2006, American Megatrends Inc. **
|
|
|
+** **
|
|
|
+** All Rights Reserved. **
|
|
|
+** **
|
|
|
+** 6145-F, Northbelt Parkway, Norcross, **
|
|
|
+** **
|
|
|
+** Georgia - 30071, USA. Phone-(770)-246-8600. **
|
|
|
+** **
|
|
|
+****************************************************************
|
|
|
+****************************************************************/
|
|
|
+/*****************************************************************
|
|
|
+*
|
|
|
+* AppDevice.c
|
|
|
+* AppDevice Commands Handler
|
|
|
+*
|
|
|
+* Author: Govind Kothandapani <govindk@ami.com>
|
|
|
+* : Rama Bisa <ramab@ami.com>
|
|
|
+* : Basavaraj Astekar <basavaraja@ami.com>
|
|
|
+* : Bakka Ravinder Reddy <bakkar@ami.com>
|
|
|
+*
|
|
|
+*****************************************************************/
|
|
|
+
|
|
|
+#include "com_BmcType.h"
|
|
|
+#include "Support.h"
|
|
|
+#include "com_IPMIDefs.h"
|
|
|
+#include "com_IPMI_IPM.h"
|
|
|
+#include "com_IPMI_AppDevice.h"
|
|
|
+#include "AppDevice.h"
|
|
|
+#include "RMCP.h"
|
|
|
+#include "Session.h"
|
|
|
+#include "PMConfig.h"
|
|
|
+#include "main.h"
|
|
|
+#include <string.h>
|
|
|
+
|
|
|
+#define USER_ID_ENABLED 0x01
|
|
|
+#define USER_ID_DISABLED 0x02
|
|
|
+#define OP_USERID_ONLY_LENGTH 2
|
|
|
+#define OP_ENABLE_USER_ID 1
|
|
|
+#define OP_DISABLE_USER_ID 0
|
|
|
+#define BIT3_BIT0_MASK 0xf
|
|
|
+#define GET_AUTH_TYPE_MASK 0xc0
|
|
|
+#define AUTH_TYPE_V15 0x0
|
|
|
+#define AUTH_TYPE_V20 0x40
|
|
|
+#define AUTH_CODE_V15_MASK 0x0f
|
|
|
+#define AUTH_CODE_V15_1 0x1
|
|
|
+#define AUTH_CODE_V15_2 0x2
|
|
|
+#define AUTH_CODE_V15_3 0x5
|
|
|
+#define AUTH_CODE_V20_MASK 0x3f
|
|
|
+#define MIN_AUTH_CODE_V20 0x04
|
|
|
+#define MAX_AUTH_CODE_V20 0xc0
|
|
|
+#define NULL_USER 1
|
|
|
+#define ZERO_SETSELECTOR 0x00
|
|
|
+#define MAX_TYPE_OF_ENCODING 0x02
|
|
|
+#define MAX_STRING_LENGTH_COPY 14
|
|
|
+
|
|
|
+#define ASCII_LATIN1 0x00
|
|
|
+#define UTF_8 0x01
|
|
|
+#define UNICODE 0x02
|
|
|
+
|
|
|
+/* Reserved bit macro definitions */
|
|
|
+#define RESERVED_BITS_SENDMS 0x03 //(BIT1 | BIT0)
|
|
|
+
|
|
|
+/* Auth code length */
|
|
|
+#define HMAC_SHA1_96_LEN 12
|
|
|
+
|
|
|
+#if APP_DEVICE == 1
|
|
|
+
|
|
|
+#define COUNT_INCREASE 1
|
|
|
+#define COUNT_DECREASE -1
|
|
|
+#define MAX_BT_PKT_LEN 255
|
|
|
+
|
|
|
+/*macro definitions for set user password options*/
|
|
|
+#define DISABLE_USER 0
|
|
|
+#define ENABLE_USER 1
|
|
|
+#define SET_PASSWORD 2
|
|
|
+#define TEST_PASSWORD 3
|
|
|
+
|
|
|
+/*** Global variables ***/
|
|
|
+uint8_t g_TmrRunning;
|
|
|
+/*** Module variables ***/
|
|
|
+static MsgPkt_T m_MsgPkt; /**< Message Packet for posting and retrieving messaged to/from queue */
|
|
|
+static uint8_t m_Set_ChReserveBit[] ={0xF0,0x0,0x30};
|
|
|
+
|
|
|
+//extern IfcName_T Ifcnametable[MAX_LAN_CHANNELS];
|
|
|
+
|
|
|
+//static void UpdateCurrentEnabledUserCount(int value, int bmcInstId)
|
|
|
+//{
|
|
|
+// if (value == 0) return;
|
|
|
+
|
|
|
+// ChannelInfo_T* pChannelInfo = NULL;
|
|
|
+// ChannelInfo_T* pNvrChannelInfo = NULL;
|
|
|
+// BMCInfo_t* pBMCInfo = &g_BMCInfo[bmcInstId];
|
|
|
+// uint8_t maxUserCount = pBMCInfo->IpmiConfig.MaxChUsers;
|
|
|
+// uint8_t channelIndex = 0;
|
|
|
+
|
|
|
+
|
|
|
+// for (channelIndex = 0; channelIndex < MAX_NUM_CHANNELS; channelIndex++)
|
|
|
+// {
|
|
|
+// if (pBMCInfo->ChConfig[channelIndex].ChType == 0xff) continue;
|
|
|
+
|
|
|
+// pChannelInfo = (ChannelInfo_T*)&pBMCInfo->ChConfig[channelIndex].ChannelInfo;
|
|
|
+
|
|
|
+// if (((value > 0) && ((pChannelInfo->NoCurrentUser + value) > maxUserCount)) ||
|
|
|
+// ((value < 0) && ((pChannelInfo->NoCurrentUser + value) < 0)))
|
|
|
+// {
|
|
|
+// continue;
|
|
|
+// }
|
|
|
+
|
|
|
+// pNvrChannelInfo = GetNVRChConfigs(pChannelInfo, bmcInstId);
|
|
|
+
|
|
|
+// pChannelInfo->NoCurrentUser+=value;
|
|
|
+// pNvrChannelInfo->NoCurrentUser+=value;
|
|
|
+// FlushChConfigs((uint8_t*)pNvrChannelInfo,pNvrChannelInfo->ChannelNumber,bmcInstId);
|
|
|
+//}
|
|
|
+//}
|
|
|
+
|
|
|
+//static int IsPrivilegeAvailable(uint8_t requestedPrivilege, uint8_t channelNumber, int bmcInstId)
|
|
|
+//{
|
|
|
+// // PMConfig_T* pPMConfig = ( PMConfig_T*) GetNVRAddr(NVRH_PMCONFIG, bmcInstId);
|
|
|
+// BMCInfo_t *pBMCInfo = &g_BMCInfo[bmcInstId];
|
|
|
+// uint8_t EthIndex = GetEthIndex(channelNumber & 0x0F, bmcInstId);
|
|
|
+// uint8_t privilege = 0x00;
|
|
|
+//
|
|
|
+// if(0xff == EthIndex) return -1;
|
|
|
+//
|
|
|
+// //Get requested privilege status (enabled or disabled) from PMConfig by channel
|
|
|
+// switch (requestedPrivilege)
|
|
|
+// {
|
|
|
+// case PRIV_CALLBACK:
|
|
|
+// privilege = pBMCInfo->LANCfs[EthIndex].AuthTypeEnables.AuthTypeCallBack;
|
|
|
+// break;
|
|
|
+//
|
|
|
+// case PRIV_USER:
|
|
|
+// privilege = pBMCInfo->LANCfs[EthIndex].AuthTypeEnables.AuthTypeUser;
|
|
|
+// break;
|
|
|
+//
|
|
|
+// case PRIV_OPERATOR:
|
|
|
+// privilege = pBMCInfo->LANCfs[EthIndex].AuthTypeEnables.AuthTypeOperator;
|
|
|
+// break;
|
|
|
+//
|
|
|
+// case PRIV_ADMIN:
|
|
|
+// privilege = pBMCInfo->LANCfs[EthIndex].AuthTypeEnables.AuthTypeAdmin;
|
|
|
+// break;
|
|
|
+//
|
|
|
+// case PRIV_OEM:
|
|
|
+// privilege = pBMCInfo->LANCfs[EthIndex].AuthTypeEnables.AuthTypeOem;
|
|
|
+// break;
|
|
|
+//
|
|
|
+// default:
|
|
|
+// return -1;
|
|
|
+// }
|
|
|
+//
|
|
|
+// //All bits are 0 that means privilege level is disabled
|
|
|
+// return ((privilege != 0x00) ? 0 : -1);
|
|
|
+//}
|
|
|
+
|
|
|
+/*-------------------------------------
|
|
|
+* ValidateIPMBChksum1
|
|
|
+*-------------------------------------*/
|
|
|
+/* Function to validate IPMB Checksum1 for SendMessage Cmd */
|
|
|
+static int ValidateIPMBChksum1( uint8_t* Data)
|
|
|
+{
|
|
|
+ int i=0;
|
|
|
+ uint8_t chksum=0;
|
|
|
+
|
|
|
+ for (i = 0; i < 3; i++)
|
|
|
+ {
|
|
|
+ chksum += *(Data + i);
|
|
|
+ }
|
|
|
+
|
|
|
+ if (chksum != 0)
|
|
|
+ {
|
|
|
+ return FALSE;
|
|
|
+ }
|
|
|
+ return TRUE;
|
|
|
+
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+///*-------------------------------------
|
|
|
+//* ResetWDT
|
|
|
+//*-------------------------------------*/
|
|
|
+//int
|
|
|
+//ResetWDT ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// uint8_t u8ExpirationFlag;
|
|
|
+// BMCInfo_t *pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+
|
|
|
+
|
|
|
+// if (pBMCInfo->Msghndlr.TmrSet == FALSE)
|
|
|
+// {
|
|
|
+// *pRes = CC_ATTEMPT_TO_RESET_UNIN_WATCHDOG;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// // save the WDT expiration flag for later use
|
|
|
+// u8ExpirationFlag = g_WDTTmrMgr.WDTTmr.ExpirationFlag;
|
|
|
+
|
|
|
+
|
|
|
+// /* Reset of Watchdog should not happen once
|
|
|
+// once pretimeout interrupt interval is reached*/
|
|
|
+// if(pBMCInfo->WDTPreTmtStat == TRUE)
|
|
|
+// {
|
|
|
+// *pRes = CC_PARAM_NOT_SUP_IN_CUR_STATE;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// g_WDTTmrMgr.TmrPresent = TRUE;
|
|
|
+// g_WDTTmrMgr.TmrInterval = pBMCInfo->WDTConfig.InitCountDown;
|
|
|
+// g_WDTTmrMgr.PreTimeOutInterval = SEC_TO_MS * pBMCInfo->WDTConfig.PreTimeOutInterval;
|
|
|
+
|
|
|
+// /* if the pre-timeout interrupt is not configured, adjust the pre-timeout interrupt
|
|
|
+// timeout value beyound the regular WDT timeout value so that it won't get triggered
|
|
|
+// before the WDT timeout. */
|
|
|
+// if ((pBMCInfo->WDTConfig.TmrActions & 0x70) == 0)
|
|
|
+// {
|
|
|
+// g_WDTTmrMgr.PreTimeOutInterval = g_WDTTmrMgr.TmrInterval+ 1;
|
|
|
+// }
|
|
|
+
|
|
|
+// _fmemcpy (&g_WDTTmrMgr.WDTTmr, &pBMCInfo->WDTConfig, sizeof (WDTConfig_T));
|
|
|
+
|
|
|
+// // restore the WDT expiration flag, don't use the one from the flash
|
|
|
+// g_WDTTmrMgr.WDTTmr.ExpirationFlag = u8ExpirationFlag;
|
|
|
+
|
|
|
+// // clear WDT sensor event history
|
|
|
+// if( g_corefeatures.internal_sensor == ENABLED )
|
|
|
+// RestartWD2Sensor(BMCInst);
|
|
|
+
|
|
|
+// if(g_corefeatures.wdt_flush_support == ENABLED )
|
|
|
+// {
|
|
|
+// FlushIPMI((uint8_t*)&pBMCInfo->WDTConfig,(uint8_t*)&pBMCInfo->WDTConfig,pBMCInfo->IPMIConfLoc.WDTDATAddr,
|
|
|
+// sizeof(WDTConfig_T),BMCInst);
|
|
|
+// }
|
|
|
+
|
|
|
+// if(BMC_GET_SHARED_MEM(BMCInst)->IsWDTPresent == FALSE)
|
|
|
+// {
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// BMC_GET_SHARED_MEM(BMCInst)->IsWDTRunning=TRUE;
|
|
|
+// BMC_GET_SHARED_MEM(BMCInst)->IsWDTPresent=TRUE;
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// sem_post(&g_BMCInfo[BMCInst].WDTSem);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// BMC_GET_SHARED_MEM(BMCInst)->IsWDTRunning=TRUE;
|
|
|
+// BMC_GET_SHARED_MEM(BMCInst)->IsWDTPresent=TRUE;
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// //Set SetWDTUpdated flag to reload initial countdown value.
|
|
|
+// g_BMCInfo[BMCInst].SetWDTUpdated = TRUE;
|
|
|
+// }
|
|
|
+
|
|
|
+
|
|
|
+// *pRes = CC_NORMAL;
|
|
|
+
|
|
|
+// return sizeof (*pRes);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* SetWDT
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//SetWDT ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// SetWDTReq_T* pSetWDTReq = ( SetWDTReq_T*)pReq;
|
|
|
+//#if GET_MSG_FLAGS != UNIMPLEMENTED
|
|
|
+// GetMsgFlagsRes_T GetMsgFlagsRes;
|
|
|
+//#endif
|
|
|
+// BMCInfo_t* pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+
|
|
|
+
|
|
|
+// //Check for Reserved bits
|
|
|
+// if((pSetWDTReq->TmrUse & (BIT5 | BIT4 | BIT3)) || !(pSetWDTReq->TmrUse & (BIT2 | BIT1 | BIT0)) || ((pSetWDTReq->TmrUse & (BIT1 | BIT2)) == (BIT1 | BIT2)) ||
|
|
|
+// (pSetWDTReq->TmrActions & (BIT7 |BIT6 | BIT3 | BIT2)) || (pSetWDTReq->ExpirationFlag & (BIT7 | BIT6 | BIT0)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+//#if NO_WDT_PRETIMEOUT_INTERRUPT == 1
|
|
|
+// // do not support pre-timeout interrupt
|
|
|
+// if (pSetWDTReq->TmrActions & 0x70)
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+//#endif
|
|
|
+
|
|
|
+// pSetWDTReq->InitCountDown = htoipmi_u16(pSetWDTReq->InitCountDown);
|
|
|
+
|
|
|
+// // error out if the pre-timeout interrupt is greater than the initial countdown value
|
|
|
+// if (pSetWDTReq->InitCountDown < 10 * pSetWDTReq->PreTimeOutInterval)
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// // only clear the memory version of the bit(s) when the input bit is set #31175
|
|
|
+// g_WDTTmrMgr.WDTTmr.ExpirationFlag &= ~pSetWDTReq->ExpirationFlag;
|
|
|
+// pSetWDTReq->ExpirationFlag = g_WDTTmrMgr.WDTTmr.ExpirationFlag;
|
|
|
+
|
|
|
+
|
|
|
+// /* Copy the Timer configuration in NVRAM */
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// _fmemset (( uint8_t*)&pBMCInfo->WDTConfig, 0, sizeof (WDTConfig_T));
|
|
|
+// _fmemcpy (( uint8_t*)&pBMCInfo->WDTConfig, ( uint8_t*)pSetWDTReq, sizeof (SetWDTReq_T));
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+
|
|
|
+// if (TRUE ==BMC_GET_SHARED_MEM(BMCInst)->IsWDTRunning)
|
|
|
+// {
|
|
|
+// /* To check wheather Dont stop bit is set or not */
|
|
|
+// if (pSetWDTReq->TmrUse & 0x40)
|
|
|
+// {
|
|
|
+// /* Set the count down value to given value */
|
|
|
+// g_WDTTmrMgr.TmrPresent = TRUE;
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// BMC_GET_SHARED_MEM(BMCInst)->IsWDTPresent =TRUE;
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// g_WDTTmrMgr.TmrInterval= pSetWDTReq->InitCountDown;
|
|
|
+// g_WDTTmrMgr.PreTimeOutInterval = (SEC_TO_MS * pSetWDTReq->PreTimeOutInterval);
|
|
|
+
|
|
|
+// /* If PreTimeOutInt is set, clear it */
|
|
|
+// if (0 != (pSetWDTReq->TmrActions & 0x70))
|
|
|
+// {
|
|
|
+// pSetWDTReq->TmrActions &= ~0x70;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// // if the pre-timeout interrupt is not configured, adjust the pre-timeout interrupt
|
|
|
+// // timeout value beyound the regular WDT timeout value so that it won't get triggered
|
|
|
+// // before the WDT timeout.
|
|
|
+// g_WDTTmrMgr.PreTimeOutInterval = pSetWDTReq->InitCountDown + 1;
|
|
|
+// }
|
|
|
+// _fmemcpy (&g_WDTTmrMgr.WDTTmr, pSetWDTReq, sizeof (WDTConfig_T ));
|
|
|
+
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// /* Stop the timer */
|
|
|
+// g_WDTTmrMgr.TmrPresent = FALSE;
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// BMC_GET_SHARED_MEM(BMCInst)->IsWDTRunning=FALSE;
|
|
|
+// BMC_GET_SHARED_MEM(BMCInst)->IsWDTPresent =FALSE;
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// g_WDTTmrMgr.TmrInterval= pSetWDTReq->InitCountDown;
|
|
|
+// g_WDTTmrMgr.PreTimeOutInterval = SEC_TO_MS * pSetWDTReq->PreTimeOutInterval;
|
|
|
+// // clear WDT sensor event history
|
|
|
+// if( g_corefeatures.internal_sensor == ENABLED)
|
|
|
+// RestartWD2Sensor(BMCInst);
|
|
|
+// }
|
|
|
+
|
|
|
+// /* Clear the pre-timeout interupt flag */
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// pBMCInfo->WDTConfig.PreTimeoutActionTaken = 0x00;
|
|
|
+// BMC_GET_SHARED_MEM (BMCInst)->MsgFlags &= ~0x08; /* Clear the flag */
|
|
|
+//#if GET_MSG_FLAGS != UNIMPLEMENTED
|
|
|
+// // Clear SMS_ATN bit if and only if the Get Message Flag return 0 in byte 2.
|
|
|
+// GetMsgFlags (NULL, 0, (uint8_t *)&GetMsgFlagsRes,BMCInst);
|
|
|
+// TDBG("GetMsgFlagsRes.CompletionCode : %X, GetMsgFlagsRes.MsgFlags : %X\n",
|
|
|
+// GetMsgFlagsRes.CompletionCode, GetMsgFlagsRes.MsgFlags);
|
|
|
+// if (GetMsgFlagsRes.CompletionCode == CC_NORMAL && GetMsgFlagsRes.MsgFlags == 0)
|
|
|
+//#else
|
|
|
+// if((BMC_GET_SHARED_MEM(BMCInst)->MsgFlags & BIT3_BIT0_MASK) == 0)
|
|
|
+//#endif
|
|
|
+// {
|
|
|
+// /* Clear the SMS_ATN bit */
|
|
|
+// if (pBMCInfo->IpmiConfig.KCS1IfcSupport == 1)
|
|
|
+// {
|
|
|
+// CLEAR_SMS_ATN (0, BMCInst);
|
|
|
+// }
|
|
|
+// if (pBMCInfo->IpmiConfig.KCS2IfcSupport == 1)
|
|
|
+// {
|
|
|
+// CLEAR_SMS_ATN (1, BMCInst);
|
|
|
+// }
|
|
|
+// if (pBMCInfo->IpmiConfig.KCS3IfcSuppport == 1)
|
|
|
+// {
|
|
|
+// CLEAR_SMS_ATN (2, BMCInst);
|
|
|
+// }
|
|
|
+// }
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// g_WDTTmrMgr.TmrInterval = pSetWDTReq->InitCountDown;
|
|
|
+// g_WDTTmrMgr.TmrPresent = FALSE;
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// BMC_GET_SHARED_MEM(BMCInst)->IsWDTPresent =FALSE;
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// // clear WDT sensor event history
|
|
|
+// if( g_corefeatures.internal_sensor == ENABLED)
|
|
|
+// RestartWD2Sensor(BMCInst);
|
|
|
+// }
|
|
|
+
|
|
|
+// // Modify ARP status to resume the thread
|
|
|
+// // after receiving set Watchdog Timer command
|
|
|
+// //BMC_GET_SHARED_MEM(BMCInst)->GratArpStatus = RESUME_ARPS;
|
|
|
+//
|
|
|
+// int i = 0;
|
|
|
+
|
|
|
+// for (i = 0; i < MAX_LAN_CHANNELS; i++)
|
|
|
+// {
|
|
|
+// if((pBMCInfo->LanIfcConfig[i].Enabled == TRUE)
|
|
|
+// && (pBMCInfo->LanIfcConfig[i].Up_Status == LAN_IFC_UP))
|
|
|
+// {
|
|
|
+// BMC_GET_SHARED_MEM(BMCInst)->ArpSuspendStatus[i] = RESUME_ARPS;
|
|
|
+// UpdateArpStatus(pBMCInfo->LanIfcConfig[i].Ethindex, BMC_GET_SHARED_MEM(BMCInst)->IsWDTRunning, BMCInst);
|
|
|
+// }
|
|
|
+// }
|
|
|
+// if(g_corefeatures.wdt_flush_support == ENABLED )
|
|
|
+// {
|
|
|
+// FlushIPMI((uint8_t*)&pBMCInfo->WDTConfig,(uint8_t*)&pBMCInfo->WDTConfig,pBMCInfo->IPMIConfLoc.WDTDATAddr,
|
|
|
+// sizeof(WDTConfig_T),BMCInst);
|
|
|
+// }
|
|
|
+// // set the "Don't Log" bit
|
|
|
+// g_WDTTmrMgr.WDTTmr.TmrUse &= 0x7F;
|
|
|
+// g_WDTTmrMgr.WDTTmr.TmrUse |= (pSetWDTReq->TmrUse & 0x80);
|
|
|
+
|
|
|
+// g_BMCInfo[BMCInst].SetWDTUpdated = TRUE;
|
|
|
+// g_BMCInfo[BMCInst].Msghndlr.TmrSet = TRUE;
|
|
|
+// pBMCInfo->WDTPreTmtStat = FALSE;
|
|
|
+// *pRes = CC_NORMAL;
|
|
|
+
|
|
|
+// return sizeof (*pRes);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* GetWDT
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//GetWDT ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// GetWDTRes_T* pGetWDTRes = ( GetWDTRes_T*)pRes;
|
|
|
+// BMCInfo_t *pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+
|
|
|
+// /* Copy the current settings from the NVRAM */
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// _fmemcpy (( uint8_t*)&pGetWDTRes->CurrentSettings,
|
|
|
+// ( uint8_t*)&pBMCInfo->WDTConfig, sizeof (WDTConfig_T));
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+
|
|
|
+// // get the WDT expiration from the global veriable in memory, not from the flash
|
|
|
+// pGetWDTRes->CurrentSettings.ExpirationFlag = g_WDTTmrMgr.WDTTmr.ExpirationFlag;
|
|
|
+
|
|
|
+// // get the current "Don't Log" bit
|
|
|
+// pGetWDTRes->CurrentSettings.TmrUse &= 0x7F;
|
|
|
+// pGetWDTRes->CurrentSettings.TmrUse |= (g_WDTTmrMgr.WDTTmr.TmrUse & 0x80);
|
|
|
+// if (TRUE == BMC_GET_SHARED_MEM(BMCInst)->IsWDTPresent)
|
|
|
+// {
|
|
|
+// // set the WDT running bit #30235/30467
|
|
|
+// pGetWDTRes->CurrentSettings.TmrUse |= 0x40;
|
|
|
+// /* Present count down in 1/100 of second */
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// // clear the WDT running bit #30235/30467 for Timer Use (ie) WatchDog Timer status
|
|
|
+// pGetWDTRes->CurrentSettings.TmrUse &= ~0x40;
|
|
|
+// pGetWDTRes->CurrentSettings.ExpirationFlag = (pGetWDTRes->CurrentSettings.ExpirationFlag) & 0x3E;
|
|
|
+// }
|
|
|
+
|
|
|
+// pGetWDTRes->PresentCountDown = g_WDTTmrMgr.TmrInterval;
|
|
|
+// pGetWDTRes->CurrentSettings.InitCountDown = htoipmi_u16(pGetWDTRes->CurrentSettings.InitCountDown);
|
|
|
+// pGetWDTRes->CompletionCode = CC_NORMAL;
|
|
|
+
|
|
|
+// return sizeof (GetWDTRes_T);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* SetBMCGlobalEnables
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//SetBMCGlobalEnables ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// uint8_t GblEnblByte = *pReq;
|
|
|
+// BMCInfo_t *pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+// MsgPkt_T MsgPkt;
|
|
|
+
|
|
|
+// _fmemset (&MsgPkt, 0, sizeof (MsgPkt_T));
|
|
|
+
|
|
|
+// /* Check For the reserved bit 4 */
|
|
|
+// if ( GblEnblByte & BIT4)
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->BMCMsgMutex,WAIT_INFINITE);
|
|
|
+// if (((BMC_GET_SHARED_MEM (BMCInst)->GlobalEnables ^ GblEnblByte)) & 0x20)
|
|
|
+// {
|
|
|
+// /* OEM 0 puts us in ICTS compatibility mode for IPMIv2,
|
|
|
+// * Send a message to lan process so it can change behavior
|
|
|
+// */
|
|
|
+// MsgPkt.Channel = GetLANChannel(0, BMCInst);
|
|
|
+// MsgPkt.Param = LAN_ICTS_MODE;
|
|
|
+// MsgPkt.Privilege = PRIV_LOCAL;
|
|
|
+// if (GblEnblByte & 0x20)
|
|
|
+// MsgPkt.Cmd = 1;
|
|
|
+// else
|
|
|
+// MsgPkt.Cmd = 0;
|
|
|
+// PostMsg(&MsgPkt,LAN_IFC_Q,BMCInst);
|
|
|
+// }
|
|
|
+
|
|
|
+// BMC_GET_SHARED_MEM (BMCInst)->GlobalEnables = GblEnblByte;
|
|
|
+// *pRes = CC_NORMAL;
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->BMCMsgMutex);
|
|
|
+
|
|
|
+// return sizeof (*pRes);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* GetBMCGlobalEnables
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//GetBMCGlobalEnables ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// GetBMCGblEnblRes_T* pGetBMCGblEnblRes = ( GetBMCGblEnblRes_T*)pRes;
|
|
|
+// BMCInfo_t *pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->BMCMsgMutex,WAIT_INFINITE);
|
|
|
+// pGetBMCGblEnblRes->CompletionCode = CC_NORMAL;
|
|
|
+// pGetBMCGblEnblRes->BMCGblEnblByte = BMC_GET_SHARED_MEM (BMCInst)->GlobalEnables;
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->BMCMsgMutex);
|
|
|
+
|
|
|
+// return sizeof (GetBMCGblEnblRes_T);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* ClrMsgFlags
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//ClrMsgFlags ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// ClearMsgsFlagReq_T* pClearMsgsFlagReq = ( ClearMsgsFlagReq_T*)pReq;
|
|
|
+// uint8_t *kcsifcnum;
|
|
|
+//#if GET_MSG_FLAGS != UNIMPLEMENTED
|
|
|
+// GetMsgFlagsRes_T GetMsgFlagsRes;
|
|
|
+//#endif
|
|
|
+// BMCInfo_t* pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+
|
|
|
+// //Check for Reserved bits
|
|
|
+// if(pClearMsgsFlagReq->Flag & (BIT4 | BIT2))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// OS_THREAD_TLS_GET(g_tls.CurKCSIfcNum,kcsifcnum);
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->BMCMsgMutex,WAIT_INFINITE);
|
|
|
+// /* Flush Receive Message Queue */
|
|
|
+// if (0 != (pClearMsgsFlagReq->Flag & 0x01))
|
|
|
+// {
|
|
|
+// while (0 == GetMsg (&m_MsgPkt, &g_RcvMsgQ[*kcsifcnum][0], WAIT_NONE,BMCInst))
|
|
|
+// {
|
|
|
+// BMC_GET_SHARED_MEM (BMCInst)->NumRcvMsg[*kcsifcnum]--;
|
|
|
+// }
|
|
|
+
|
|
|
+// BMC_GET_SHARED_MEM (BMCInst)->MsgFlags &= ~0x01; /* Clear the flag */
|
|
|
+// }
|
|
|
+
|
|
|
+// /* Flush Event Message Buffer */
|
|
|
+// if (0 != (pClearMsgsFlagReq->Flag & 0x02))
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->EventMutex,WAIT_INFINITE);
|
|
|
+// while (0 == GetMsg (&m_MsgPkt, EVT_MSG_Q, WAIT_NONE,BMCInst))
|
|
|
+// {
|
|
|
+// BMC_GET_SHARED_MEM (BMCInst)->NumEvtMsg--;
|
|
|
+// }
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->EventMutex);
|
|
|
+// BMC_GET_SHARED_MEM (BMCInst)->MsgFlags &= ~0x02; /* Clear the flag */
|
|
|
+// }
|
|
|
+
|
|
|
+// /* Clear WatchdogTimer Interrupt*/
|
|
|
+// if (0 != (pClearMsgsFlagReq->Flag & 0x08))
|
|
|
+// {
|
|
|
+// /* Clear the pre-timeout interupt flag */
|
|
|
+// pBMCInfo->WDTConfig.PreTimeoutActionTaken = 0x00;
|
|
|
+// BMC_GET_SHARED_MEM (BMCInst)->MsgFlags &= ~0x08; /* Clear the flag */
|
|
|
+// if(g_corefeatures.wdt_flush_support == ENABLED )
|
|
|
+// {
|
|
|
+// FlushIPMI((uint8_t*)&pBMCInfo->WDTConfig,(uint8_t*)&pBMCInfo->WDTConfig,pBMCInfo->IPMIConfLoc.WDTDATAddr,
|
|
|
+// sizeof(WDTConfig_T),BMCInst);
|
|
|
+// }
|
|
|
+
|
|
|
+// }
|
|
|
+
|
|
|
+//#if GET_MSG_FLAGS != UNIMPLEMENTED
|
|
|
+// // Clear SMS_ATN bit if and only if the Get Message Flag return 0 in byte 2.
|
|
|
+// GetMsgFlags (NULL, 0, (uint8_t *)&GetMsgFlagsRes,BMCInst);
|
|
|
+// TDBG("GetMsgFlagsRes.CompletionCode : %X, GetMsgFlagsRes.MsgFlags : %X\n",
|
|
|
+// GetMsgFlagsRes.CompletionCode, GetMsgFlagsRes.MsgFlags);
|
|
|
+// if (GetMsgFlagsRes.CompletionCode == CC_NORMAL && GetMsgFlagsRes.MsgFlags == 0)
|
|
|
+//#else
|
|
|
+// if((BMC_GET_SHARED_MEM(BMCInst)->MsgFlags & BIT3_BIT0_MASK) == 0)
|
|
|
+//#endif
|
|
|
+// {
|
|
|
+// /* Clear the SMS_ATN bit */
|
|
|
+// if (pBMCInfo->IpmiConfig.KCS1IfcSupport == 1)
|
|
|
+// {
|
|
|
+// CLEAR_SMS_ATN (0, BMCInst);
|
|
|
+// }
|
|
|
+// if (pBMCInfo->IpmiConfig.KCS2IfcSupport == 1)
|
|
|
+// {
|
|
|
+// CLEAR_SMS_ATN (1, BMCInst);
|
|
|
+// }
|
|
|
+// if (pBMCInfo->IpmiConfig.KCS3IfcSuppport == 1)
|
|
|
+// {
|
|
|
+// CLEAR_SMS_ATN (2, BMCInst);
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// *pRes = CC_NORMAL;
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->BMCMsgMutex);
|
|
|
+
|
|
|
+// return sizeof (*pRes);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+// /*---------------------------------------
|
|
|
+// GetMsgFlags
|
|
|
+// ---------------------------------------*/
|
|
|
+// int
|
|
|
+// GetMsgFlags ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+// {
|
|
|
+// GetMsgFlagsRes_T* pGetMsgFlagsRes = ( GetMsgFlagsRes_T*)pRes;
|
|
|
+// uint8_t *kcsifcnum;
|
|
|
+
|
|
|
+// /* get the message flags */
|
|
|
+// pGetMsgFlagsRes->MsgFlags = BMC_GET_SHARED_MEM (BMCInst)->MsgFlags;
|
|
|
+
|
|
|
+// if (BMC_GET_SHARED_MEM (BMCInst)->NumEvtMsg >= EVT_MSG_BUF_SIZE)
|
|
|
+// {
|
|
|
+// /* If Event MessageBuffer is Full set the BIT */
|
|
|
+// pGetMsgFlagsRes->MsgFlags |= 0x02;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// /* else reset the Flag */
|
|
|
+// pGetMsgFlagsRes->MsgFlags &= ~0x02;
|
|
|
+// }
|
|
|
+
|
|
|
+// if(kcsifcnum != NULL && 0 != BMC_GET_SHARED_MEM (BMCInst)->NumRcvMsg[*kcsifcnum])
|
|
|
+// {
|
|
|
+// /* if any Message in ReceiveMsgQ set the Flag */
|
|
|
+// pGetMsgFlagsRes->MsgFlags |= 0x01;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// /* else reset the Flag */
|
|
|
+// pGetMsgFlagsRes->MsgFlags &= ~0x01;
|
|
|
+// }
|
|
|
+
|
|
|
+// /* get the Pre-Timeout Bits Value & Set it to Response Data */
|
|
|
+// //PRETIMEOUT BIT is 3rd bit so changed accordingly
|
|
|
+// pGetMsgFlagsRes->MsgFlags |= (pBMCInfo->WDTConfig.PreTimeoutActionTaken & 0x08);
|
|
|
+
|
|
|
+// /* Update the Message flags in shared Mem */
|
|
|
+// BMC_GET_SHARED_MEM (BMCInst)->MsgFlags |= pGetMsgFlagsRes->MsgFlags;
|
|
|
+// pGetMsgFlagsRes->CompletionCode = CC_NORMAL;
|
|
|
+
|
|
|
+// return sizeof (GetMsgFlagsRes_T);
|
|
|
+// }
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* EnblMsgChannelRcv
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//EnblMsgChannelRcv ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// EnblMsgChRcvReq_T* pEnblMsgChRcvReq = ( EnblMsgChRcvReq_T*)pReq;
|
|
|
+// EnblMsgChRcvRes_T* pEnblMsgChRcvRes = ( EnblMsgChRcvRes_T*)pRes;
|
|
|
+// ChannelInfo_T* pChannelInfo;
|
|
|
+// BMCInfo_t *pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+
|
|
|
+// //Check for Reserved bits
|
|
|
+// if(pEnblMsgChRcvReq->ChannelNum & (BIT7 | BIT6 | BIT5 | BIT4))
|
|
|
+// {
|
|
|
+// pEnblMsgChRcvRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->ChUserMutex,WAIT_INFINITE);
|
|
|
+// pChannelInfo = getChannelInfo (pEnblMsgChRcvReq->ChannelNum & 0x0F, BMCInst);
|
|
|
+
|
|
|
+// TDBG ("ENBL_MSG_CH_RCV: processing..\n");
|
|
|
+
|
|
|
+// if (NULL == pChannelInfo)
|
|
|
+// {
|
|
|
+// pEnblMsgChRcvRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// switch (pEnblMsgChRcvReq->ChannelState)
|
|
|
+// {
|
|
|
+// case 0:
|
|
|
+// /* disable Receive Message Queue for this Channel */
|
|
|
+// pChannelInfo->ReceiveMsgQ = 0x0;
|
|
|
+// break;
|
|
|
+
|
|
|
+// case 1:
|
|
|
+// /*enable Recevive Message Queue for this Channel */
|
|
|
+// pChannelInfo->ReceiveMsgQ = 0x1;
|
|
|
+// break;
|
|
|
+
|
|
|
+// case 2:
|
|
|
+// /*get Channel State */
|
|
|
+// pEnblMsgChRcvRes->ChannelState = pChannelInfo->ReceiveMsgQ;
|
|
|
+// break;
|
|
|
+
|
|
|
+// default:
|
|
|
+// pEnblMsgChRcvRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// pEnblMsgChRcvRes->CompletionCode = CC_NORMAL;
|
|
|
+
|
|
|
+// /*get Channel Number */
|
|
|
+// pEnblMsgChRcvRes->ChannelNum = pEnblMsgChRcvReq->ChannelNum & 0x0F;
|
|
|
+
|
|
|
+// pEnblMsgChRcvRes->ChannelState = pChannelInfo->ReceiveMsgQ;
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+
|
|
|
+// return sizeof (EnblMsgChRcvRes_T);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+/*---------------------------------------
|
|
|
+* GetMessage
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+GetMessage ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+{
|
|
|
+ GetMsgRes_T* pGetMsgRes = ( GetMsgRes_T*)pRes;
|
|
|
+ uint8_t Index = 0,*kcsifcnum;
|
|
|
+#if GET_MSG_FLAGS != UNIMPLEMENTED
|
|
|
+ GetMsgFlagsRes_T GetMsgFlagsRes;
|
|
|
+#endif
|
|
|
+ printf("GetMessage!\n");
|
|
|
+
|
|
|
+// if (0 != GetMsg (&m_MsgPkt, &g_RcvMsgQ[*kcsifcnum][0], WAIT_NONE))
|
|
|
+// {
|
|
|
+// /* if Queue is Empty */
|
|
|
+// pGetMsgRes->CompletionCode = CC_GET_MSG_QUEUE_EMPTY;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// #if GET_MSG_FLAGS != UNIMPLEMENTED
|
|
|
+// // Clear SMS_ATN bit if and only if the Get Message Flag return 0 in byte 2.
|
|
|
+// GetMsgFlags (NULL, 0, (uint8_t *)&GetMsgFlagsRes,BMCInst);
|
|
|
+// TDBG("GetMsgFlagsRes.CompletionCode : %X, GetMsgFlagsRes.MsgFlags : %X\n",
|
|
|
+// GetMsgFlagsRes.CompletionCode, GetMsgFlagsRes.MsgFlags);
|
|
|
+// if (GetMsgFlagsRes.CompletionCode == CC_NORMAL && GetMsgFlagsRes.MsgFlags == 0)
|
|
|
+// #else
|
|
|
+// if (0 == BMC_GET_SHARED_MEM (BMCInst)->NumRcvMsg[*kcsifcnum])
|
|
|
+// #endif
|
|
|
+// {
|
|
|
+// /* Clear the SMS_ATN bit */
|
|
|
+// CLEAR_SMS_ATN (*kcsifcnum,BMCInst);
|
|
|
+// }
|
|
|
+
|
|
|
+// /* Completion Code */
|
|
|
+// pGetMsgRes->CompletionCode = CC_NORMAL;
|
|
|
+// /* Channel number and privilege level */
|
|
|
+// pGetMsgRes->ChannelNum = m_MsgPkt.Channel;
|
|
|
+
|
|
|
+// Index = sizeof (GetMsgRes_T);
|
|
|
+
|
|
|
+// /* First byte should be session handle */
|
|
|
+// if(pBMCInfo->IpmiConfig.SecondaryIPMBSupport == 0x01)
|
|
|
+// {
|
|
|
+// if ((PRIMARY_IPMB_CHANNEL != m_MsgPkt.Channel) && (pBMCInfo->SecondaryIPMBCh != m_MsgPkt.Channel))
|
|
|
+// {
|
|
|
+// pGetMsgRes->ChannelNum |= m_MsgPkt.Privilege << 0x04;
|
|
|
+// pRes [Index++] = m_MsgPkt.Param;
|
|
|
+// }
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// if(PRIMARY_IPMB_CHANNEL != m_MsgPkt.Channel)
|
|
|
+// {
|
|
|
+// pGetMsgRes->ChannelNum |= m_MsgPkt.Privilege << 0x04;
|
|
|
+// pRes [Index++] = m_MsgPkt.Param;
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// /* copy the Message data */
|
|
|
+// _fmemcpy (( uint8_t*)&pRes[Index], &m_MsgPkt.Data[1], m_MsgPkt.Size-1);
|
|
|
+
|
|
|
+// IPMI_DBG_PRINT ("GetMsg: Sending the following data through requested channel\n");
|
|
|
+// IPMI_DBG_PRINT_BUF (pRes, m_MsgPkt.Size + Index);
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->BMCMsgMutex);
|
|
|
+
|
|
|
+// return ((m_MsgPkt.Size-1)+ Index); /*+ 2 for completion code & channel No. */
|
|
|
+ return 1;
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+/*---------------------------------------
|
|
|
+* SendMessage
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+SendMessage ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+{
|
|
|
+ SendMsgReq_T* pSendMsgReq = ( SendMsgReq_T*)pReq;
|
|
|
+ SendMsgRes_T* pSendMsgRes = ( SendMsgRes_T*)pRes;
|
|
|
+ IPMIMsgHdr_T* pIPMIMsgHdr;
|
|
|
+ int Queuefd = 0;
|
|
|
+ uint8_t Tracking;
|
|
|
+ uint8_t Channel=0,resaddr=0;
|
|
|
+ uint8_t ResLen = 1;
|
|
|
+ uint8_t RetVal = 0;
|
|
|
+ uint8_t Offset = 1;
|
|
|
+ uint8_t SeqNum = g_BMCInfo.SendMsgSeqNum;
|
|
|
+ uint8_t PBTbl = PRIMARY_PB_TBL;
|
|
|
+ uint8_t SrcSessionHndl = 0;
|
|
|
+ ChannelInfo_T* pChannelInfo;
|
|
|
+ MsgPkt_T ResPkt;
|
|
|
+ SessionInfo_T* pSessionInfo = NULL;
|
|
|
+ uint32_t *CurSesID;
|
|
|
+ uint8_t *curprivlevel,*curchannel,*kcsifcnum;
|
|
|
+
|
|
|
+ *pRes = CC_NORMAL;
|
|
|
+ if (ReqLen < 1)
|
|
|
+ {
|
|
|
+ *pRes = CC_REQ_INV_LEN;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ if(pSendMsgReq->ChNoTrackReq == 0xC0)
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ /* Get the channel number */
|
|
|
+ Channel = pSendMsgReq->ChNoTrackReq & 0x0F;
|
|
|
+
|
|
|
+ /* Get Tracking field */
|
|
|
+ Tracking = pSendMsgReq->ChNoTrackReq >> 6;
|
|
|
+
|
|
|
+ if (Tracking == RESERVED_BITS_SENDMS)
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ CurSesID = pthread_getspecific(g_tls.CurSessionID);
|
|
|
+ curchannel = pthread_getspecific(g_tls.CurChannel);
|
|
|
+ kcsifcnum = pthread_getspecific(g_tls.CurKCSIfcNum);
|
|
|
+
|
|
|
+ m_MsgPkt.Param = BRIDGING_REQUEST;
|
|
|
+ m_MsgPkt.Channel = Channel;
|
|
|
+ m_MsgPkt.Size = ReqLen - 1; /* -1 to skip channel num */
|
|
|
+
|
|
|
+
|
|
|
+ /* Copy the message data */
|
|
|
+ memcpy (m_MsgPkt.Data, &pReq[1], m_MsgPkt.Size);
|
|
|
+ /* Copy the IPMI Message header */
|
|
|
+ pIPMIMsgHdr = ( IPMIMsgHdr_T*)&m_MsgPkt.Data[Offset - 1];
|
|
|
+ if(ValidateIPMBChksum1(( uint8_t*)pIPMIMsgHdr) == FALSE)
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ printf("Invalid checksum1\n");
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ if(m_MsgPkt.Data[ReqLen - 2] != CalculateCheckSum2 (( uint8_t*)pIPMIMsgHdr, ReqLen - Offset - 1))
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+#if 0
|
|
|
+ int z;
|
|
|
+ printf("m_MsgPkt: ");
|
|
|
+ for(z = 0; z < m_MsgPkt.Size;z++)
|
|
|
+ printf("%02x ", m_MsgPkt.Data[z]);
|
|
|
+ printf("\n");
|
|
|
+#endif
|
|
|
+
|
|
|
+ printf("---> curchannel: %d, Channel: %d\n", *curchannel, Channel);
|
|
|
+
|
|
|
+ if((Channel == PRIMARY_IPMB_CHANNEL) && g_BMCInfo.IpmiConfig.PrimaryIPMBSupport == 1)
|
|
|
+ {
|
|
|
+ //printf ("SendMsg: To Primary IPMB Interface\n");
|
|
|
+ m_MsgPkt.SrcQ = gFd_PrimaryIpmbIfcQ;
|
|
|
+ }
|
|
|
+ else if(( Channel == SECONDARY_IPMB_CHANNEL) && (g_BMCInfo.IpmiConfig.SecondaryIPMBSupport == 1))
|
|
|
+ {
|
|
|
+ //printf ("SendMsg: To Secondary IPMB Interface\n");
|
|
|
+ m_MsgPkt.SrcQ = gFd_SecondaryIpmbIfcQ;
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ printf ("SendMsg: Invalid Channel\n");
|
|
|
+ *pRes = CC_DEST_UNAVAILABLE;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ if (1 == Tracking)
|
|
|
+ {
|
|
|
+ ResLen = 0;
|
|
|
+ //printf("---> Tracking, curchannel %d, ", *curchannel);
|
|
|
+ /* Tracking is not required if originator is System ifc */
|
|
|
+ if (SYS_IFC_CHANNEL == (*curchannel & 0xF))
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ if(*curchannel == LAN_RMCP_CHANNEL)
|
|
|
+ {
|
|
|
+ pSessionInfo = getSessionInfo (SESSION_ID_INFO, CurSesID);
|
|
|
+ //printf("SendMEssage/CurSesID %#x, SessionHandle %#x\n", *CurSesID, pSessionInfo->SessionHandle);
|
|
|
+ if (NULL != pSessionInfo)
|
|
|
+ {
|
|
|
+ g_BMCInfo.SessionHandle = pSessionInfo->SessionHandle;
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ printf("Error: Not get valid session!\n");
|
|
|
+ *pRes = CC_UNSPECIFIED_ERR;
|
|
|
+ return sizeof(*pRes);
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ PBTbl = (Channel == SECONDARY_IPMB_CHANNEL) ? SECONDARY_PB_TBL : PRIMARY_PB_TBL ;
|
|
|
+ //printf("PBTbl %d, g_BMCInfo.SendMsgSeqNum %d, ", PBTbl, g_BMCInfo.SendMsgSeqNum);
|
|
|
+ /* Store in the table for response tracking */
|
|
|
+ while(TRUE)
|
|
|
+ {
|
|
|
+ if (FALSE == m_PendingBridgedResTbl[PBTbl][SeqNum].Used)
|
|
|
+ {
|
|
|
+ m_PendingBridgedResTbl[PBTbl][SeqNum].TimeOut = g_BMCInfo.IpmiConfig.SendMsgTimeout;
|
|
|
+ m_PendingBridgedResTbl[PBTbl][SeqNum].ChannelNum = (*curchannel & 0xF);
|
|
|
+ m_PendingBridgedResTbl[PBTbl][SeqNum].OriginSrc = ORIGIN_SENDMSG;
|
|
|
+ g_BMCInfo.SendMsgSeqNum = SeqNum;
|
|
|
+
|
|
|
+ if (1 != Offset)
|
|
|
+ {
|
|
|
+ //TODO:这个貌似没用到?
|
|
|
+ m_PendingBridgedResTbl[PBTbl][SeqNum].DstSessionHandle = pReq[Offset]; /* Session handle */
|
|
|
+ }
|
|
|
+
|
|
|
+ m_PendingBridgedResTbl[PBTbl][SeqNum].SrcSessionHandle = pSessionInfo->SessionHandle;// SrcSessionHndl;
|
|
|
+
|
|
|
+ memcpy (&m_PendingBridgedResTbl[PBTbl][SeqNum].ReqMsgHdr, pIPMIMsgHdr, sizeof (IPMIMsgHdr_T));
|
|
|
+
|
|
|
+ /* Format the IPMI Msg Hdr */
|
|
|
+ if(Channel == PRIMARY_IPMB_CHANNEL)
|
|
|
+ {
|
|
|
+ pIPMIMsgHdr->ReqAddr = g_BMCInfo.PrimaryIPMBAddr;
|
|
|
+ }
|
|
|
+ else if(Channel == SECONDARY_IPMB_CHANNEL)
|
|
|
+ {
|
|
|
+ pIPMIMsgHdr->ReqAddr = g_BMCInfo.SecondaryIPMBAddr;
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ printf("Invalid channel %d\n", Channel);//pIPMIMsgHdr->ReqAddr = pBMCInfo->IpmiConfig.BMCSlaveAddr;
|
|
|
+ }
|
|
|
+
|
|
|
+ pIPMIMsgHdr->RqSeqLUN = (g_BMCInfo.SendMsgSeqNum << 2) & 0xFC; /* Seq Num and LUN =00 */
|
|
|
+
|
|
|
+ /* Recalculate the checksum */
|
|
|
+ m_MsgPkt.Data[ReqLen - 2] = CalculateCheckSum2 (( uint8_t*)pIPMIMsgHdr, ReqLen - Offset - 1);
|
|
|
+ if((*curchannel & 0xF) == LAN_RMCP_CHANNEL)
|
|
|
+ {
|
|
|
+ m_PendingBridgedResTbl[PBTbl][SeqNum].DestQ = gFd_LanIfcQ;
|
|
|
+
|
|
|
+ }
|
|
|
+ else if((*curchannel & 0xF) == UDS_CHANNEL)
|
|
|
+ {
|
|
|
+ m_PendingBridgedResTbl[PBTbl][SeqNum].DestQ = gFdUdsIfc;
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ printf("Not support channel! %d\n", *curchannel);
|
|
|
+ *pRes = CC_PARAM_OUT_OF_RANGE;
|
|
|
+ return 1;
|
|
|
+ }
|
|
|
+ m_PendingBridgedResTbl[PBTbl][SeqNum].Used = TRUE;
|
|
|
+ m_PendingBridgedResTbl[PBTbl][SeqNum].SeqNum = SeqNum;
|
|
|
+ m_PendingBridgedResTbl[PBTbl][SeqNum].ResDataOk = 0;
|
|
|
+ //printf( "SendMessage SeqNum %d, ", SeqNum);
|
|
|
+ //memcpy (&m_PendingBridgedResTbl[PBTbl][SeqNum].ResMsgHdr, pRes->Data, sizeof (IPMIMsgHdr_T));
|
|
|
+
|
|
|
+
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ SeqNum = (SeqNum + 1) & 0x3F;
|
|
|
+
|
|
|
+ if (SeqNum == g_BMCInfo.SendMsgSeqNum) //转了一圈,没有空闲的SeqNum可用。
|
|
|
+ {
|
|
|
+ /* If not been added to the Pending Bridge table, an error should be reported back.
|
|
|
+ If not, for internal channel, the thread calling it may end up waiting! */
|
|
|
+ *pRes = CC_NODE_BUSY;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ pSendMsgRes->CompletionCode = 0xff;
|
|
|
+ return 1;
|
|
|
+ }
|
|
|
+
|
|
|
+ // printf ("SendMsgCmd:Posting to interface ");
|
|
|
+ // int y;
|
|
|
+ // for(y=0;y<m_MsgPkt.Size;y++)
|
|
|
+ // printf("%#x ", m_MsgPkt.Data[y]);
|
|
|
+ // printf("\n");
|
|
|
+
|
|
|
+ m_MsgPkt.Cmd = PAYLOAD_IPMI_MSG;
|
|
|
+ /* Post the message to interface */
|
|
|
+ if (0 != PostMsg (m_MsgPkt.SrcQ, &m_MsgPkt))
|
|
|
+ {
|
|
|
+ printf ("Warning: SendMsg Failed to post message to interface queue\n");
|
|
|
+ }
|
|
|
+
|
|
|
+ pSendMsgRes->CompletionCode = CC_NORMAL;
|
|
|
+
|
|
|
+ return ResLen;
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* ReadEvtMsgBuffer
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//ReadEvtMsgBuffer ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// ReadEvtMsgBufRes_T* pReadEvtMsgBufRes = ( ReadEvtMsgBufRes_T*)pRes;
|
|
|
+//#if GET_MSG_FLAGS != UNIMPLEMENTED
|
|
|
+// GetMsgFlagsRes_T GetMsgFlagsRes;
|
|
|
+//#endif
|
|
|
+// BMCInfo_t* pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->BMCMsgMutex,WAIT_INFINITE);
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->EventMutex,WAIT_INFINITE);
|
|
|
+// if (-2 == GetMsg(&m_MsgPkt, EVT_MSG_Q, WAIT_NONE, BMCInst))
|
|
|
+// {
|
|
|
+// /*If queue is empty */
|
|
|
+// pReadEvtMsgBufRes->CompletionCode = CC_EVT_MSG_QUEUE_EMPTY;/* Queue is empty */
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->EventMutex);
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->BMCMsgMutex);
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// if (BMC_GET_SHARED_MEM (BMCInst)->NumEvtMsg == 0)
|
|
|
+// {
|
|
|
+// pReadEvtMsgBufRes->CompletionCode = CC_EVT_MSG_QUEUE_EMPTY;
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->EventMutex);
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->BMCMsgMutex);
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// BMC_GET_SHARED_MEM (BMCInst)->NumEvtMsg--;
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->EventMutex);
|
|
|
+
|
|
|
+//#if GET_MSG_FLAGS != UNIMPLEMENTED
|
|
|
+// // Clear SMS_ATN bit if and only if the Get Message Flag return 0 in byte 2.
|
|
|
+// GetMsgFlags (NULL, 0, (uint8_t *)&GetMsgFlagsRes,BMCInst);
|
|
|
+// TDBG("GetMsgFlagsRes.CompletionCode : %X, GetMsgFlagsRes.MsgFlags : %X\n",
|
|
|
+// GetMsgFlagsRes.CompletionCode, GetMsgFlagsRes.MsgFlags);
|
|
|
+// if (GetMsgFlagsRes.CompletionCode == CC_NORMAL && GetMsgFlagsRes.MsgFlags == 0)
|
|
|
+//#else
|
|
|
+// if (0 == BMC_GET_SHARED_MEM (BMCInst)->NumEvtMsg)
|
|
|
+//#endif
|
|
|
+// {
|
|
|
+// /* if there is no messssage in buffer reset SMS/EVT ATN bit */
|
|
|
+// // CLEAR_SMS_ATN ();
|
|
|
+// if (pBMCInfo->IpmiConfig.KCS1IfcSupport == 1)
|
|
|
+// {
|
|
|
+// CLEAR_SMS_ATN (0, BMCInst);
|
|
|
+// }
|
|
|
+// if (pBMCInfo->IpmiConfig.KCS2IfcSupport == 1)
|
|
|
+// {
|
|
|
+// CLEAR_SMS_ATN (1, BMCInst);
|
|
|
+// }
|
|
|
+// if (pBMCInfo->IpmiConfig.KCS3IfcSuppport == 1)
|
|
|
+// {
|
|
|
+// CLEAR_SMS_ATN (2, BMCInst);
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// /* clear EventMessageBuffer full flag */
|
|
|
+// BMC_GET_SHARED_MEM (BMCInst)->MsgFlags &= ~0x02;
|
|
|
+
|
|
|
+// pReadEvtMsgBufRes->CompletionCode = CC_NORMAL; /* Completion Code */
|
|
|
+
|
|
|
+// /* copy the Message data */
|
|
|
+// _fmemcpy (pReadEvtMsgBufRes->ResData, m_MsgPkt.Data, m_MsgPkt.Size);
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->BMCMsgMutex);
|
|
|
+
|
|
|
+// return sizeof (ReadEvtMsgBufRes_T);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* GetBTIfcCap
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//GetBTIfcCap ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// GetBTIfcCapRes_T* pGetBTIfcCapRes = ( GetBTIfcCapRes_T*)pRes;
|
|
|
+
|
|
|
+// pGetBTIfcCapRes->CompletionCode = CC_NORMAL;
|
|
|
+// pGetBTIfcCapRes->NumReqSupported = 2;
|
|
|
+// pGetBTIfcCapRes->InputBufSize = MAX_BT_PKT_LEN;
|
|
|
+// pGetBTIfcCapRes->OutputBufSize = MAX_BT_PKT_LEN;
|
|
|
+// pGetBTIfcCapRes->RespTime = 1;
|
|
|
+// pGetBTIfcCapRes->Retries = 0;
|
|
|
+
|
|
|
+// return sizeof (GetBTIfcCapRes_T);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* GetSystemGUID
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//GetSystemGUID ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// GetSysGUIDRes_T* pGetSysGUIDRes = ( GetSysGUIDRes_T*)pRes;
|
|
|
+
|
|
|
+// pGetSysGUIDRes->CompletionCode = CC_NORMAL;
|
|
|
+// LOCK_BMC_SHARED_MEM (BMCInst);
|
|
|
+// _fmemcpy (&pGetSysGUIDRes->Node, BMC_GET_SHARED_MEM (BMCInst)->SystemGUID, 16);
|
|
|
+// UNLOCK_BMC_SHARED_MEM (BMCInst);
|
|
|
+
|
|
|
+// return sizeof (GetSysGUIDRes_T);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+#define SUPPORT_IPMI20 0x02
|
|
|
+#define SUPPORT_IPMI15 0x01
|
|
|
+/*---------------------------------------
|
|
|
+* GetChAuthCap
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+GetChAuthCap ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+{
|
|
|
+ //TODO: dummy data
|
|
|
+// GetChAuthCapReq_T* pGetChAuthCapReq = ( GetChAuthCapReq_T*)pReq;
|
|
|
+ GetChAuthCapRes_T* pGetChAuthCapRes = ( GetChAuthCapRes_T*)pRes;
|
|
|
+
|
|
|
+ pGetChAuthCapRes->CompletionCode = CC_NORMAL;
|
|
|
+ pGetChAuthCapRes->ChannelNum = LAN_RMCP_CHANNEL;
|
|
|
+ pGetChAuthCapRes->AuthType = 0x36;
|
|
|
+ pGetChAuthCapRes->PerMsgUserAuthLoginStatus = 0x04;
|
|
|
+ pGetChAuthCapRes->ExtCap = 0;
|
|
|
+ pGetChAuthCapRes->OEMID[0] = 0;
|
|
|
+ pGetChAuthCapRes->OEMID[1] = 0;
|
|
|
+ pGetChAuthCapRes->OEMID[2] = 0;
|
|
|
+ pGetChAuthCapRes->OEMAuxData = 0;
|
|
|
+
|
|
|
+ return sizeof (GetChAuthCapRes_T);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+/*---------------------------------------
|
|
|
+* GetSessionChallenge
|
|
|
+* Create session in this function
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+GetSessionChallenge ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+{
|
|
|
+ GetSesChallengeReq_T* pGetSesChalReq = ( GetSesChallengeReq_T*)pReq;
|
|
|
+ GetSesChallengeRes_T* pGetSesChalRes = ( GetSesChallengeRes_T*)pRes;
|
|
|
+ uint8_t Index;
|
|
|
+ uint8_t ChallengeString[CHALLENGE_STR_LEN];
|
|
|
+ UserInfo_T *pUserInfo;
|
|
|
+ uint32_t TempSessId;
|
|
|
+ SessionInfo_T SessionInfo;
|
|
|
+ uint8_t *curchannel;
|
|
|
+ uint32_t TempRandom;
|
|
|
+
|
|
|
+ if(pGetSesChalReq->UserName[0] == 0)
|
|
|
+ {
|
|
|
+ pGetSesChalRes->CompletionCode = 0x82;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ g_BMCInfo.pUserInfo = NULL;
|
|
|
+ pUserInfo = getUserNameInfo(pGetSesChalReq->UserName);
|
|
|
+ if((pUserInfo == NULL) || (TRUE != pUserInfo->UserStatus))
|
|
|
+ {
|
|
|
+ pGetSesChalRes->CompletionCode = 0x81;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ curchannel = pthread_getspecific(g_tls.CurChannel);
|
|
|
+
|
|
|
+ do
|
|
|
+ {
|
|
|
+ /*generate 32 bit temp session Id*/
|
|
|
+ TempSessId = stm32_generate_random32bit();
|
|
|
+ } while ((NULL != getSessionInfo (SESSION_ID_INFO, &TempSessId)) || (0 == TempSessId));
|
|
|
+
|
|
|
+ SessionInfo.UserId = (uint8_t)pUserInfo->UserId;
|
|
|
+ /*Activated in ActivateSession Command*/
|
|
|
+ SessionInfo.Activated = FALSE;
|
|
|
+ SessionInfo.AuthType = pGetSesChalReq->AuthType;
|
|
|
+ SessionInfo.Channel = *curchannel & 0xF;
|
|
|
+ SessionInfo.SessionID = TempSessId;
|
|
|
+ SessionInfo.TimeOutValue = g_BMCInfo.IpmiConfig.SessionTimeOut;
|
|
|
+
|
|
|
+ if(GetNumOfUsedSessions() >= g_BMCInfo.IpmiConfig.MaxSession)
|
|
|
+ {
|
|
|
+ CleanSession();
|
|
|
+ }
|
|
|
+ /* Add Session information in Table */
|
|
|
+ AddSession (&SessionInfo);
|
|
|
+
|
|
|
+
|
|
|
+ g_BMCInfo.pUserInfo = pUserInfo;
|
|
|
+
|
|
|
+ pGetSesChalRes->CompletionCode = CC_NORMAL;
|
|
|
+ pGetSesChalRes->TempSessionID = TempSessId;
|
|
|
+
|
|
|
+ /* generate Randam Challenge String */
|
|
|
+ for(Index=0;Index < CHALLENGE_STR_LEN;Index+=4)
|
|
|
+ {
|
|
|
+ TempRandom = stm32_generate_random32bit();
|
|
|
+// printf("TempRandom: %#lx\n", TempRandom);
|
|
|
+ ChallengeString[Index] = TempRandom&0xff;
|
|
|
+ ChallengeString[Index+1] = TempRandom>>8;
|
|
|
+ ChallengeString[Index+2] = TempRandom>>16;
|
|
|
+ ChallengeString[Index+3] = TempRandom>>24;
|
|
|
+ }
|
|
|
+ memcpy(pGetSesChalRes->ChallengeString, ChallengeString, CHALLENGE_STR_LEN);
|
|
|
+
|
|
|
+ return sizeof (GetSesChallengeRes_T);
|
|
|
+}
|
|
|
+
|
|
|
+/*---------------------------------------
|
|
|
+* ActivateSession
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+ActivateSession ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+{
|
|
|
+ //TODO: dummy data
|
|
|
+ ActivateSesReq_T* pAcvtSesReq = ( ActivateSesReq_T*)pReq;
|
|
|
+ ActivateSesRes_T* pAcvtSesRes = ( ActivateSesRes_T*)pRes;
|
|
|
+ uint32_t *CurSesID,*curchannel;
|
|
|
+ SessionInfo_T* pSessInfo;
|
|
|
+
|
|
|
+ /* Initial Outbound Sequence Number cannot be null */
|
|
|
+ if (pAcvtSesReq->OutboundSeq == 0)
|
|
|
+ {
|
|
|
+ pAcvtSesRes->CompletionCode = CC_ACTIVATE_SESS_SEQ_OUT_OF_RANGE;
|
|
|
+ return sizeof(*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ CurSesID = pthread_getspecific(g_tls.CurSessionID);
|
|
|
+ curchannel = pthread_getspecific(g_tls.CurChannel);
|
|
|
+
|
|
|
+ pSessInfo = getSessionInfo (SESSION_ID_INFO, CurSesID);
|
|
|
+ if(pSessInfo == NULL)
|
|
|
+ {
|
|
|
+ pAcvtSesRes->CompletionCode = CC_ACTIVATE_SESS_INVALID_SESSION_ID;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ pSessInfo->Activated = TRUE;
|
|
|
+ pSessInfo->Channel = (*curchannel & 0xF);
|
|
|
+ /* set the Max Privilege allowed for the Session*/
|
|
|
+ pSessInfo->MaxPrivilege = pAcvtSesReq->Privilege;
|
|
|
+ /* set the Out bound sequensce Number */
|
|
|
+ pSessInfo->OutboundSeq = (pAcvtSesReq->OutboundSeq);
|
|
|
+
|
|
|
+ g_BMCInfo.SessionHandle += 1;
|
|
|
+ pSessInfo->SessionHandle = g_BMCInfo.SessionHandle;
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+ pAcvtSesRes->CompletionCode = CC_NORMAL;
|
|
|
+ pAcvtSesRes->AuthType = (pSessInfo->AuthType & 0x0F);
|
|
|
+ pAcvtSesRes->SessionID = pSessInfo->SessionID;
|
|
|
+ pAcvtSesRes->InboundSeq = stm32_generate_random32bit();
|
|
|
+ pAcvtSesRes->Privilege = 0x04;
|
|
|
+
|
|
|
+ pSessInfo->InboundRecv = 0xFF;
|
|
|
+ pSessInfo->InboundSeq = (pAcvtSesRes->InboundSeq -1);
|
|
|
+
|
|
|
+ return sizeof (ActivateSesRes_T);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+/*---------------------------------------
|
|
|
+* SetSessionPrivLevel
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+SetSessionPrivLevel ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+{
|
|
|
+ SetSesPrivLevelReq_T* pSetSesPrivLevelReq = ( SetSesPrivLevelReq_T*)pReq;
|
|
|
+ SetSesPrivLevelRes_T* pSetSesPrivLevelRes = ( SetSesPrivLevelRes_T*)pRes;
|
|
|
+
|
|
|
+ //Check for Reserved bits
|
|
|
+ if((pSetSesPrivLevelReq->Privilege == PRIV_LEVEL_CALLBACK) || (pSetSesPrivLevelReq->Privilege > PRIV_LEVEL_PROPRIETARY))
|
|
|
+ {
|
|
|
+ pSetSesPrivLevelRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof(SetSesPrivLevelRes_T);
|
|
|
+ }
|
|
|
+
|
|
|
+ /* According to the IPMI 2.0 Priv Level =1 is reserved */
|
|
|
+ if((PRIV_USER != pSetSesPrivLevelReq->Privilege) &&
|
|
|
+ (PRIV_OPERATOR != pSetSesPrivLevelReq->Privilege) &&
|
|
|
+ (PRIV_ADMIN != pSetSesPrivLevelReq->Privilege) &&
|
|
|
+ (PRIV_OEM != pSetSesPrivLevelReq->Privilege))
|
|
|
+ {
|
|
|
+ /*Requested Privilege exceeds ChannelPrivilege Limit */
|
|
|
+ pSetSesPrivLevelRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ pSetSesPrivLevelRes->CompletionCode = CC_NORMAL;
|
|
|
+ pSetSesPrivLevelRes->Privilege = pSetSesPrivLevelReq->Privilege;
|
|
|
+
|
|
|
+ return sizeof (SetSesPrivLevelRes_T);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+/*---------------------------------------
|
|
|
+* CloseSession
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+CloseSession ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+{
|
|
|
+ CloseSesReq_T* pCloseSesReq = (CloseSesReq_T*)pReq;
|
|
|
+ SessionInfo_T* pSessInfo;
|
|
|
+ uint32_t SessionID;
|
|
|
+
|
|
|
+ *pRes = CC_REQ_INV_LEN;
|
|
|
+
|
|
|
+ if ((4 != ReqLen) && (5 != ReqLen))
|
|
|
+ {
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ if (0 == pCloseSesReq->SessionID)
|
|
|
+ {
|
|
|
+ if (5 != ReqLen)
|
|
|
+ {
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+ SessionID = (uint32_t)pCloseSesReq->SessionHandle;
|
|
|
+ *pRes = CC_CLOSE_INVALID_SESSION_ID_HANDLE;
|
|
|
+ pSessInfo = getSessionInfo (SESSION_HANDLE_INFO, &SessionID);
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ if (4 != ReqLen)
|
|
|
+ {
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+ SessionID = pCloseSesReq->SessionID;
|
|
|
+ *pRes = CC_CLOSE_INVALID_SESSION_ID;
|
|
|
+ pSessInfo = getSessionInfo (SESSION_ID_INFO, &SessionID);
|
|
|
+ }
|
|
|
+
|
|
|
+ if ((NULL == pSessInfo) || (0 == pSessInfo->Activated))
|
|
|
+ {
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ /* The SessionInfo is deleted form session table from interface */
|
|
|
+ DeleteSession(pSessInfo);
|
|
|
+ *pRes = CC_NORMAL;
|
|
|
+ return sizeof (*pRes);
|
|
|
+}
|
|
|
+
|
|
|
+//#if GET_SESSION_INFO != UNIMPLEMENTED
|
|
|
+///*---------------------------------------
|
|
|
+//* GetSessionInfo
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//GetSessionInfo ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// GetSesInfoReq_T* pGetSesInfoReq = ( GetSesInfoReq_T*)pReq;
|
|
|
+// GetSesInfoRes_T* pGetSesInfoRes = ( GetSesInfoRes_T*)pRes;
|
|
|
+// BMCInfo_t* pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+// LANSesInfoRes_T LANSesInfo;
|
|
|
+// LANIPv6SesInfoRes_T LANIPv6SesInfo;
|
|
|
+// SessionInfo_T* pSessInfo;
|
|
|
+// ChannelInfo_T* pChannelInfo;
|
|
|
+// void* SessionArg;
|
|
|
+// uint8_t SessionArgAlign[4];
|
|
|
+// uint8_t SessionArgType,EthIndex, netindex = 0xFF;
|
|
|
+// char IfcName[IFNAMSIZ];
|
|
|
+// uint32_t *CurSesID,*curchannel;
|
|
|
+// int i;
|
|
|
+
|
|
|
+// *pRes = CC_REQ_INV_LEN;
|
|
|
+
|
|
|
+// switch (pGetSesInfoReq->SessionIndex)
|
|
|
+// {
|
|
|
+// case 0:
|
|
|
+// /* Get session information for this session */
|
|
|
+// if (1 != ReqLen)
|
|
|
+// {
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// SessionArgType = SESSION_ID_INFO;
|
|
|
+// OS_THREAD_TLS_GET(g_tls.CurSessionID,CurSesID);
|
|
|
+// SessionArg = CurSesID;
|
|
|
+// break;
|
|
|
+
|
|
|
+// case 0xFF:
|
|
|
+// if (5 != ReqLen)
|
|
|
+// {
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// SessionArgType = SESSION_ID_INFO;
|
|
|
+
|
|
|
+// SessionArgAlign[0] = pGetSesInfoReq->SessionHandleOrID[0];
|
|
|
+// SessionArgAlign[1] = pGetSesInfoReq->SessionHandleOrID[1];
|
|
|
+// SessionArgAlign[2] = pGetSesInfoReq->SessionHandleOrID[2];
|
|
|
+// SessionArgAlign[3] = pGetSesInfoReq->SessionHandleOrID[3];
|
|
|
+// SessionArg = SessionArgAlign;
|
|
|
+// break;
|
|
|
+
|
|
|
+// case 0xFE:
|
|
|
+// if (2 != ReqLen)
|
|
|
+// {
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// if (pGetSesInfoReq->SessionHandleOrID[0] == 0)
|
|
|
+// {
|
|
|
+// *pRes=CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// SessionArgType = SESSION_HANDLE_INFO;
|
|
|
+// SessionArgAlign[0] = pGetSesInfoReq->SessionHandleOrID[0];
|
|
|
+// SessionArgAlign[1] = pGetSesInfoReq->SessionHandleOrID[1];
|
|
|
+// SessionArgAlign[2] = pGetSesInfoReq->SessionHandleOrID[2];
|
|
|
+// SessionArgAlign[3] = pGetSesInfoReq->SessionHandleOrID[3];
|
|
|
+// SessionArg = SessionArgAlign;
|
|
|
+// break;
|
|
|
+
|
|
|
+// default:
|
|
|
+// if (1 != ReqLen)
|
|
|
+// {
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// SessionArgType = SESSION_INDEX_INFO;
|
|
|
+// SessionArg = &pGetSesInfoReq->SessionIndex;
|
|
|
+// break;
|
|
|
+// }
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->SessionTblMutex, WAIT_INFINITE);
|
|
|
+// pSessInfo = getSessionInfo (SessionArgType, SessionArg, BMCInst);
|
|
|
+// if (NULL == pSessInfo)
|
|
|
+// {
|
|
|
+// TDBG ("GetSessionInfo: pSessInfo is NULL\n");
|
|
|
+// /* if there is no active channel for the current session Index
|
|
|
+// * return the following bytes
|
|
|
+// */
|
|
|
+
|
|
|
+// OS_THREAD_TLS_GET(g_tls.CurChannel,curchannel);
|
|
|
+// pChannelInfo = getChannelInfo (*curchannel & 0xF, BMCInst);
|
|
|
+// if(NULL == pChannelInfo)
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// pGetSesInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// pGetSesInfoRes->CompletionCode = CC_NORMAL;
|
|
|
+// pGetSesInfoRes->SessionHandle = BMC_GET_SHARED_MEM (BMCInst)->SessionHandle;
|
|
|
+// pGetSesInfoRes->NumPossibleActiveSession= pBMCInfo->IpmiConfig.MaxSession;
|
|
|
+// pGetSesInfoRes->NumActiveSession = GetNumOfActiveSessions (BMCInst);
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// return (sizeof (GetSesInfoRes_T) - sizeof (ActiveSesInfo_T) - sizeof (SessionInfoRes_T));
|
|
|
+// }
|
|
|
+
|
|
|
+// memset (pGetSesInfoRes,0,sizeof(GetSesInfoRes_T));
|
|
|
+// pChannelInfo = getChannelInfo (pSessInfo->Channel, BMCInst);
|
|
|
+// if(NULL == pChannelInfo)
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// pGetSesInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// pGetSesInfoRes->CompletionCode = CC_NORMAL;
|
|
|
+// pGetSesInfoRes->SessionHandle = pSessInfo->SessionHandle;
|
|
|
+// pGetSesInfoRes->NumPossibleActiveSession = pBMCInfo->IpmiConfig.MaxSession;
|
|
|
+// pGetSesInfoRes->NumActiveSession = GetNumOfActiveSessions (BMCInst);
|
|
|
+// pGetSesInfoRes->ActiveSesinfo.UserID = pSessInfo->UserId & 0x3F;
|
|
|
+// pGetSesInfoRes->ActiveSesinfo.Privilege = pSessInfo->Privilege & 0x0F;
|
|
|
+// /* Set protocol bit as per Auth Type, bit4 must be 1 for IPMIv2.0 RMCP, 0 for IPMIv1.5 */
|
|
|
+// if( AUTHTYPE_RMCP_PLUS_FORMAT == pSessInfo->AuthType )
|
|
|
+// {
|
|
|
+// pGetSesInfoRes->ActiveSesinfo.ChannelNum = (pSessInfo->Channel & 0x0F) | 0x10;
|
|
|
+// }else
|
|
|
+// {
|
|
|
+// pGetSesInfoRes->ActiveSesinfo.ChannelNum = pSessInfo->Channel & 0x0F;
|
|
|
+// }
|
|
|
+// EthIndex= GetEthIndex(pSessInfo->Channel & 0x0F, BMCInst);
|
|
|
+// if(0xff == EthIndex)
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// DeleteSession (pSessInfo,BMCInst);
|
|
|
+// return sizeof (uint8_t);
|
|
|
+// }
|
|
|
+// memset(IfcName,0,sizeof(IfcName));
|
|
|
+// /*Get the EthIndex*/
|
|
|
+// if(GetIfcName(EthIndex,IfcName, BMCInst) == -1)
|
|
|
+// {
|
|
|
+// TCRIT("Error in Getting Ifc name\n");
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (uint8_t);
|
|
|
+// }
|
|
|
+
|
|
|
+// for(i=0;i<sizeof(Ifcnametable)/sizeof(IfcName_T);i++)
|
|
|
+// {
|
|
|
+// if(strcmp(Ifcnametable[i].Ifcname,IfcName) == 0)
|
|
|
+// {
|
|
|
+// netindex= Ifcnametable[i].Index;
|
|
|
+// break;
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// if(netindex == 0xFF)
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (uint8_t);
|
|
|
+// }
|
|
|
+// if (IsLANChannel( pSessInfo->Channel, BMCInst))
|
|
|
+// {
|
|
|
+// if(g_corefeatures.global_ipv6 == ENABLED)
|
|
|
+// {
|
|
|
+// if(GetIPAdrressType(&pSessInfo->LANRMCPPkt.IPHdr.Srcv6Addr[0])==4)
|
|
|
+// {
|
|
|
+// memset(&LANSesInfo,0,sizeof(LANSesInfo));
|
|
|
+// /* IP Address */
|
|
|
+// _fmemcpy (&(LANSesInfo.IPAddress),
|
|
|
+// &pSessInfo->LANRMCPPkt.IPHdr.Srcv6Addr[sizeof(struct in6_addr)-sizeof(struct in_addr)],
|
|
|
+// sizeof(struct in_addr));
|
|
|
+// /* MAC Address */
|
|
|
+// if(pSessInfo->LANRMCPPkt.MACHdr.DestAddr[0] == 0)
|
|
|
+// nwGetSrcCacheMacAddr((uint8_t*)&pSessInfo->LANRMCPPkt.IPHdr.Srcv6Addr[12],
|
|
|
+// netindex, pSessInfo->LANRMCPPkt.MACHdr.DestAddr);
|
|
|
+
|
|
|
+// _fmemcpy(LANSesInfo.MACAddress, pSessInfo->LANRMCPPkt.MACHdr.DestAddr, MAC_ADDR_LEN);
|
|
|
+// /* Port number */
|
|
|
+// LANSesInfo.PortNumber = pSessInfo->LANRMCPPkt.UDPHdr.SrcPort;
|
|
|
+
|
|
|
+// _fmemcpy ((pRes+sizeof (GetSesInfoRes_T) - sizeof (SessionInfoRes_T)),&LANSesInfo, sizeof (LANSesInfoRes_T));
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// return (sizeof (GetSesInfoRes_T) - sizeof (SessionInfoRes_T)+sizeof (LANSesInfoRes_T));
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// /* IP Address */
|
|
|
+// memset(&LANIPv6SesInfo,0,sizeof(LANIPv6SesInfo));
|
|
|
+// _fmemcpy (&(LANIPv6SesInfo.IPv6Address),
|
|
|
+// pSessInfo->LANRMCPPkt.IPHdr.Srcv6Addr,
|
|
|
+// sizeof(struct in6_addr));
|
|
|
+// /* MAC Address */
|
|
|
+// if(pSessInfo->LANRMCPPkt.MACHdr.DestAddr[0] == 0)
|
|
|
+// nwGetSrcMacAddr_IPV6((uint8_t*)&pSessInfo->LANRMCPPkt.IPHdr.Srcv6Addr,
|
|
|
+// pSessInfo->LANRMCPPkt.MACHdr.DestAddr);
|
|
|
+
|
|
|
+// _fmemcpy(LANIPv6SesInfo.MACAddress, pSessInfo->LANRMCPPkt.MACHdr.DestAddr, MAC_ADDR_LEN);
|
|
|
+// /* Port number */
|
|
|
+// LANIPv6SesInfo.PortNumber = pSessInfo->LANRMCPPkt.UDPHdr.SrcPort;
|
|
|
+
|
|
|
+// _fmemcpy ((pRes+sizeof (GetSesInfoRes_T) - sizeof(SessionInfoRes_T)),&LANIPv6SesInfo, sizeof (LANIPv6SesInfoRes_T));
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// return (sizeof (GetSesInfoRes_T) - sizeof (SessionInfoRes_T)+sizeof (LANIPv6SesInfoRes_T));
|
|
|
+// }
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+
|
|
|
+// /* IP Address */
|
|
|
+// _fmemcpy (pGetSesInfoRes->SesInfo.LANSesInfo.IPAddress,
|
|
|
+// pSessInfo->LANRMCPPkt.IPHdr.Srcv4Addr,
|
|
|
+// sizeof (pSessInfo->LANRMCPPkt.IPHdr.Srcv4Addr));
|
|
|
+// /* MAC Address */
|
|
|
+// if(pSessInfo->LANRMCPPkt.MACHdr.DestAddr[0] == 0)
|
|
|
+// nwGetSrcCacheMacAddr((uint8_t*)pSessInfo->LANRMCPPkt.IPHdr.Srcv4Addr, netindex,
|
|
|
+// pSessInfo->LANRMCPPkt.MACHdr.DestAddr);
|
|
|
+// _fmemcpy(pGetSesInfoRes->SesInfo.LANSesInfo.MACAddress,
|
|
|
+// pSessInfo->LANRMCPPkt.MACHdr.DestAddr, MAC_ADDR_LEN);
|
|
|
+// /* Port number */
|
|
|
+// pGetSesInfoRes->SesInfo.LANSesInfo.PortNumber = pSessInfo->LANRMCPPkt.UDPHdr.SrcPort;
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// return (sizeof (GetSesInfoRes_T) - sizeof (SessionInfoRes_T) + sizeof (LANSesInfoRes_T));
|
|
|
+// }
|
|
|
+// }
|
|
|
+// else if (pBMCInfo->IpmiConfig.SerialIfcSupport == 1 && pBMCInfo->SERIALch== pSessInfo->Channel)
|
|
|
+// {
|
|
|
+
|
|
|
+// pChannelInfo = getChannelInfo (pBMCInfo->SERIALch, BMCInst);
|
|
|
+// if(NULL == pChannelInfo)
|
|
|
+// {
|
|
|
+// pGetSesInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// pGetSesInfoRes->SesInfo.SerialSesInfo.SessionActivityType = 0;
|
|
|
+// pGetSesInfoRes->SesInfo.SerialSesInfo.DestinationSelector = 0;
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// return (sizeof (GetSesInfoRes_T) - sizeof (SessionInfoRes_T) + sizeof (SerialSesInfoRes_T));
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// pChannelInfo = getChannelInfo(pSessInfo->Channel, BMCInst);
|
|
|
+// if(NULL == pChannelInfo)
|
|
|
+// {
|
|
|
+// pGetSesInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->SessionTblMutex);
|
|
|
+// return (sizeof (GetSesInfoRes_T) - sizeof (SessionInfoRes_T));
|
|
|
+// }
|
|
|
+//}
|
|
|
+//#endif
|
|
|
+
|
|
|
+
|
|
|
+///**
|
|
|
+// * @fn GetAuthCodeForTypeV15
|
|
|
+// * @brief This function will use the encryption technique supported
|
|
|
+// * in IPMI V1.5 in order to produce Auth Code.
|
|
|
+// * @param[in] pUserInfo - Pointer to User info structure.
|
|
|
+// * @param[in] pGetAuthCodeReq - Pointer to the structure of request data
|
|
|
+// * @param[out] pGetAuthCodeRes - Pointer to the resultant data.
|
|
|
+// * @retval size of the result data.
|
|
|
+// */
|
|
|
+//static int
|
|
|
+//GetAuthCodeForTypeV15 (UserInfo_T* pUserInfo,
|
|
|
+// GetAuthCodeReq_T* pGetAuthCodeReq,
|
|
|
+// GetAuthCodeRes_T* pGetAuthCodeRes )
|
|
|
+//{
|
|
|
+// uint8_t AuthCode;
|
|
|
+// uint8_t InBuffer[2*IPMI15_MAX_PASSWORD_LEN + HASH_DATA_LENGTH];
|
|
|
+// char UserPswd[MAX_PASSWD_LEN];
|
|
|
+// uint8_t PwdEncKey[MAX_SIZE_KEY + 1] = {0};
|
|
|
+// BMCInfo_t* pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+
|
|
|
+// memset(&(pGetAuthCodeRes->AuthCode), 0, AUTH_CODE_HASH_LEN);
|
|
|
+// AuthCode = pGetAuthCodeReq->AuthType & AUTH_CODE_V15_MASK;
|
|
|
+// if((pGetAuthCodeReq->AuthType & (BIT5 | BIT4)) ||
|
|
|
+// (AuthCode == AUTHTYPE_RESERVED) || (AuthCode == AUTHTYPE_NONE) ||
|
|
|
+// (AuthCode == AUTHTYPE_STRAIGHT_PASSWORD) ||
|
|
|
+// (AuthCode > AUTHTYPE_OEM_PROPRIETARY))
|
|
|
+// {
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return (sizeof (GetAuthCodeRes_T) - 4);
|
|
|
+// }
|
|
|
+
|
|
|
+// if (g_corefeatures.userpswd_encryption == ENABLED)
|
|
|
+// {
|
|
|
+// /* Get Encryption Key from the MBMCInfo_t structure */
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// memcpy(PwdEncKey, &(g_MBMCInfo.PwdEncKey), MAX_SIZE_KEY);
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+
|
|
|
+// if(DecryptPassword((INT8S *)(pBMCInfo->EncryptedUserInfo[pUserInfo->UserId - 1].EncryptedPswd), MAX_PASSWORD_LEN, UserPswd, MAX_PASSWORD_LEN, PwdEncKey))
|
|
|
+// {
|
|
|
+// TCRIT("Error in decrypting the IPMI User password for User ID:%d.\n", pUserInfo->UserId);
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_UNSPECIFIED_ERR;
|
|
|
+// return sizeof(*pGetAuthCodeRes);
|
|
|
+// }
|
|
|
+// memcpy(&InBuffer[0],UserPswd,IPMI15_MAX_PASSWORD_LEN);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// memcpy(&InBuffer[0],pUserInfo->UserPassword,IPMI15_MAX_PASSWORD_LEN);
|
|
|
+// }
|
|
|
+
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// switch (AuthCode)
|
|
|
+// {
|
|
|
+// #if 0 // As per IPMIv2 Markup E4, Straight Password key is Reserved
|
|
|
+// case AUTH_TYPE_PASSWORD: /* Straight password */
|
|
|
+// if (0 == _fmemcmp (pUserInfo->UserPassword,pGetAuthCodeReq->HashData,IPMI15_MAX_PASSWORD_LEN))
|
|
|
+// {
|
|
|
+// _fmemcpy (pGetAuthCodeRes->AuthCode, "OK", 2);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// }
|
|
|
+// break;
|
|
|
+// #endif
|
|
|
+
|
|
|
+// case AUTH_TYPE_MD2: /* MD2 */
|
|
|
+// _fmemcpy (&InBuffer[IPMI15_MAX_PASSWORD_LEN],
|
|
|
+// pGetAuthCodeReq->HashData, HASH_DATA_LENGTH);
|
|
|
+// if (g_corefeatures.userpswd_encryption == ENABLED)
|
|
|
+// {
|
|
|
+// _fmemcpy(&InBuffer[IPMI15_MAX_PASSWORD_LEN+HASH_DATA_LENGTH],
|
|
|
+// UserPswd, IPMI15_MAX_PASSWORD_LEN);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// _fmemcpy(&InBuffer[IPMI15_MAX_PASSWORD_LEN+HASH_DATA_LENGTH],
|
|
|
+// pUserInfo->UserPassword, IPMI15_MAX_PASSWORD_LEN);
|
|
|
+// }
|
|
|
+
|
|
|
+// AuthCodeCalMD2 (InBuffer, pGetAuthCodeRes->AuthCode, sizeof (InBuffer));
|
|
|
+// break;
|
|
|
+
|
|
|
+// case AUTH_TYPE_MD5: /* MD5 */
|
|
|
+// _fmemcpy (&InBuffer[IPMI15_MAX_PASSWORD_LEN],
|
|
|
+// pGetAuthCodeReq->HashData, HASH_DATA_LENGTH);
|
|
|
+// if (g_corefeatures.userpswd_encryption == ENABLED)
|
|
|
+// {
|
|
|
+// _fmemcpy(&InBuffer[IPMI15_MAX_PASSWORD_LEN+HASH_DATA_LENGTH],
|
|
|
+// UserPswd,IPMI15_MAX_PASSWORD_LEN);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// _fmemcpy(&InBuffer[IPMI15_MAX_PASSWORD_LEN+HASH_DATA_LENGTH],
|
|
|
+// pUserInfo->UserPassword,IPMI15_MAX_PASSWORD_LEN);
|
|
|
+// }
|
|
|
+// AuthCodeCalMD5 (InBuffer, pGetAuthCodeRes->AuthCode, sizeof (InBuffer));
|
|
|
+// break;
|
|
|
+
|
|
|
+// default:
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// }
|
|
|
+
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// // IPMI V1.5 AuthCode is only 16 byte.
|
|
|
+// return (sizeof (GetAuthCodeRes_T) - 4);
|
|
|
+//}
|
|
|
+
|
|
|
+///**
|
|
|
+// * @fn GetAuthCodeForTypeV20
|
|
|
+// * @brief This function will use the encryption technique supported
|
|
|
+// * in IPMI V2.0 in order to produce Auth Code.
|
|
|
+// * @param[in] pUserInfo - Pointer to User info structure.
|
|
|
+// * @param[in] pGetAuthCodeReq - Pointer to the structure of request data
|
|
|
+// * @param[out] pGetAuthCodeRes - Pointer to the resultant data.
|
|
|
+// * @retval size of the result data.
|
|
|
+// */
|
|
|
+//static int
|
|
|
+//GetAuthCodeForTypeV20 (UserInfo_T* pUserInfo,
|
|
|
+// GetAuthCodeReq_T* pGetAuthCodeReq,
|
|
|
+// GetAuthCodeRes_T* pGetAuthCodeRes )
|
|
|
+//{
|
|
|
+// uint8_t AuthCode;
|
|
|
+// uint8_t UserPasswdLen=0;
|
|
|
+// uint8_t DecVal = 0;
|
|
|
+// uint8_t m_SIK [SESSION_INTEGRITY_KEY_SIZE];
|
|
|
+// char UserPswd[MAX_PASSWD_LEN];
|
|
|
+// unsigned char PwdEncKey[MAX_SIZE_KEY + 1] = {0};
|
|
|
+// BMCInfo_t* pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+
|
|
|
+// if (g_corefeatures.userpswd_encryption == ENABLED)
|
|
|
+// {
|
|
|
+// /* Get Encryption Key from the MBMCInfo_t structure */
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// memcpy(PwdEncKey, &(g_MBMCInfo.PwdEncKey), MAX_SIZE_KEY);
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+
|
|
|
+// if(DecryptPassword((INT8S *)(pBMCInfo->EncryptedUserInfo[pUserInfo->UserId - 1].EncryptedPswd), MAX_PASSWORD_LEN, UserPswd, MAX_PASSWORD_LEN, PwdEncKey))
|
|
|
+// {
|
|
|
+// TCRIT("\nError in decrypting the IPMI User password for user with ID:%d.\n", pUserInfo->UserId);
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_UNSPECIFIED_ERR;
|
|
|
+// return sizeof (*pGetAuthCodeRes);
|
|
|
+// }
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// memcpy(&UserPswd, pUserInfo->UserPassword, MAX_PASSWD_LEN);
|
|
|
+// }
|
|
|
+
|
|
|
+// /* Calculate password length */
|
|
|
+// UserPasswdLen = _fstrlen (( char*)UserPswd);
|
|
|
+// UserPasswdLen = (UserPasswdLen > MAX_PASSWORD_LEN) ?
|
|
|
+// MAX_PASSWORD_LEN : UserPasswdLen;
|
|
|
+
|
|
|
+// memset(&(pGetAuthCodeRes->AuthCode), 0, AUTH_CODE_HASH_LEN);
|
|
|
+// AuthCode = pGetAuthCodeReq->AuthType & AUTH_CODE_V20_MASK;
|
|
|
+// /* Validate the Auth Code */
|
|
|
+// if ((AuthCode > MIN_AUTH_CODE_V20) && (AuthCode < MAX_AUTH_CODE_V20))
|
|
|
+// {
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(GetAuthCodeRes_T);
|
|
|
+// }
|
|
|
+
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// switch(AuthCode)
|
|
|
+// {
|
|
|
+// case AUTH_NONE: /* none */
|
|
|
+// TDBG ("\nInside AUTH_NONE in GetAuthCode");
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// break;
|
|
|
+
|
|
|
+// case AUTH_HMAC_SHA1_96: /* HMAC-SHA1-96 */
|
|
|
+// TDBG ("\nInside AUTH_HMAC_SHA1_96 in GetAuthCode");
|
|
|
+// hmac_sha1 ((uint8_t *)UserPswd, UserPasswdLen,
|
|
|
+// (uint8_t *)pGetAuthCodeReq->HashData, HASH_DATA_LEN,
|
|
|
+// (uint8_t *)m_SIK, SESSION_INTEGRITY_KEY_SIZE);
|
|
|
+
|
|
|
+// hmac_sha1 ((uint8_t *)m_SIK, SESSION_INTEGRITY_KEY_SIZE,
|
|
|
+// (uint8_t *)pGetAuthCodeReq->HashData, HASH_DATA_LEN,
|
|
|
+// (uint8_t *)&(pGetAuthCodeRes->AuthCode), HMAC_SHA1_96_LEN);
|
|
|
+
|
|
|
+// DecVal = AUTH_CODE_HASH_LEN - HMAC_SHA1_96_LEN;
|
|
|
+// break;
|
|
|
+
|
|
|
+// case AUTH_HMAC_MD5_128: /* HMAC-MD5-128 */
|
|
|
+// TDBG ("\nInside AUTH_HMAC_MD5_128 in GetAuthCode");
|
|
|
+// hmac_md5 ((unsigned char*)UserPswd, UserPasswdLen,
|
|
|
+// pGetAuthCodeReq->HashData, HASH_DATA_LEN,
|
|
|
+// m_SIK, SESSION_HMAC_MD5_I_KEY_SIZE);
|
|
|
+
|
|
|
+// hmac_md5 (m_SIK, SESSION_HMAC_MD5_I_KEY_SIZE,
|
|
|
+// pGetAuthCodeReq->HashData, HASH_DATA_LEN,
|
|
|
+// (unsigned char *)&(pGetAuthCodeRes->AuthCode),
|
|
|
+// SESSION_HMAC_MD5_I_KEY_SIZE);
|
|
|
+// DecVal = AUTH_CODE_HASH_LEN - SESSION_HMAC_MD5_I_KEY_SIZE;
|
|
|
+// break;
|
|
|
+
|
|
|
+// case AUTH_MD5_128: /* MD5-128 */
|
|
|
+// TDBG ("\nInside AUTH_MD5_128 in GetAuthCode");
|
|
|
+// MD5_128 ((char *)UserPswd, UserPasswdLen,
|
|
|
+// (char *)pGetAuthCodeReq->HashData, HASH_DATA_LEN,
|
|
|
+// (char *)m_SIK, SESSION_MD5_KEY_SIZE);
|
|
|
+
|
|
|
+// MD5_128 ((char *)m_SIK, SESSION_INTEGRITY_KEY_SIZE,
|
|
|
+// (char *)pGetAuthCodeReq->HashData, HASH_DATA_LEN,
|
|
|
+// (char *)&(pGetAuthCodeRes->AuthCode), SESSION_MD5_KEY_SIZE);
|
|
|
+// DecVal = AUTH_CODE_HASH_LEN - SESSION_MD5_KEY_SIZE;
|
|
|
+// break;
|
|
|
+
|
|
|
+// case AUTH_HMAC_SHA256_128: /* HMAC-SHA256-128 */
|
|
|
+// TDBG ("\nInside AUTH_HMAC_SHA256_128 in GetAuthCode");
|
|
|
+// hmac_sha256 ((unsigned char *)UserPswd, UserPasswdLen,
|
|
|
+// (unsigned char *)pGetAuthCodeReq->HashData, HASH_DATA_LEN,
|
|
|
+// (unsigned char *)m_SIK, SHA2_HASH_KEY_SIZE);
|
|
|
+
|
|
|
+// hmac_sha256 (m_SIK, SHA2_HASH_KEY_SIZE,
|
|
|
+// (unsigned char *)pGetAuthCodeReq->HashData, HASH_DATA_LEN,
|
|
|
+// (unsigned char *)&(pGetAuthCodeRes->AuthCode), HMAC_SHA256_128_LEN);
|
|
|
+// DecVal = AUTH_CODE_HASH_LEN - HMAC_SHA256_128_LEN;
|
|
|
+// break;
|
|
|
+
|
|
|
+// //! TODO: Need support in openssl.
|
|
|
+// default: /* OEM or Reserved */
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// }
|
|
|
+
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// if (DecVal > sizeof(GetAuthCodeRes_T))
|
|
|
+// return sizeof(GetAuthCodeRes_T);
|
|
|
+// else
|
|
|
+// return (sizeof(GetAuthCodeRes_T) - DecVal);
|
|
|
+//}
|
|
|
+
|
|
|
+///**
|
|
|
+// * @fn GetAuthCode
|
|
|
+// * @brief This function will encrypt the given 16 byte data with
|
|
|
+// * the algorithm given and return Auth Code.
|
|
|
+// * @param[in] pReq - Request data.
|
|
|
+// * @param[in] ReqLen - Length of the request data.
|
|
|
+// * @param[out] pRes - Result data
|
|
|
+// * @retval size of the result data.
|
|
|
+// */
|
|
|
+//int
|
|
|
+//GetAuthCode ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes )
|
|
|
+//{
|
|
|
+// GetAuthCodeReq_T* pGetAuthCodeReq = ( GetAuthCodeReq_T*)pReq;
|
|
|
+// GetAuthCodeRes_T* pGetAuthCodeRes = ( GetAuthCodeRes_T*)pRes;
|
|
|
+// BMCInfo_t *pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+// UserInfo_T* pUserInfo;
|
|
|
+// uint8_t AuthType,*curchannel;
|
|
|
+// ChannelInfo_T* pChannelInfo;
|
|
|
+// int nRetSize = 0;
|
|
|
+
|
|
|
+// /* Check for Reserved Bits */
|
|
|
+// if((pGetAuthCodeReq->ChannelNum & (BIT7 | BIT6 | BIT5 | BIT4)) ||
|
|
|
+// (pGetAuthCodeReq->UserID & (BIT7 | BIT6)))
|
|
|
+// {
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->ChUserMutex,WAIT_INFINITE);
|
|
|
+// /* Validate the channel number given */
|
|
|
+// if (CURRENT_CHANNEL_NUM == pGetAuthCodeReq->ChannelNum)
|
|
|
+// {
|
|
|
+// OS_THREAD_TLS_GET(g_tls.CurChannel,curchannel);
|
|
|
+// pChannelInfo = getChannelInfo(*curchannel & 0xF,BMCInst);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// pChannelInfo = getChannelInfo(pGetAuthCodeReq->ChannelNum,BMCInst);
|
|
|
+
|
|
|
+// if (NULL == pChannelInfo)
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// /* Get the user information for the given userID */
|
|
|
+// pUserInfo = getUserIdInfo (pGetAuthCodeReq->UserID,BMCInst);
|
|
|
+// if (NULL == pUserInfo)
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// TDBG ("AppDevice.c : GetAuthCode - Invalid user Id\n");
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// AuthType = pGetAuthCodeReq->AuthType & GET_AUTH_TYPE_MASK;
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_NORMAL;
|
|
|
+
|
|
|
+// switch(AuthType)
|
|
|
+// {
|
|
|
+// case AUTH_TYPE_V15: /* IPMI v1.5 AuthCode Algorithms */
|
|
|
+// nRetSize = GetAuthCodeForTypeV15(pUserInfo, pGetAuthCodeReq, pGetAuthCodeRes,BMCInst);
|
|
|
+// break;
|
|
|
+
|
|
|
+// case AUTH_TYPE_V20: /* IPMI v2.0/RMCP+ Algorithm Number */
|
|
|
+// nRetSize = GetAuthCodeForTypeV20(pUserInfo, pGetAuthCodeReq, pGetAuthCodeRes,BMCInst);
|
|
|
+// break;
|
|
|
+
|
|
|
+// default:
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// pGetAuthCodeRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// return nRetSize;
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* SetChAccess
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//SetChAccess ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// SetChAccessReq_T* pSetChAccessReq = ( SetChAccessReq_T*)pReq;
|
|
|
+// uint8_t ChannelNum, AccessMode;
|
|
|
+// ChannelInfo_T* pNvrChInfo;
|
|
|
+// ChannelInfo_T* pChannelInfo;
|
|
|
+// BMCInfo_t* pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+// uint8_t AccessFlags = 0,i=0,*curchannel;
|
|
|
+//// char ChFilename[MAX_CHFILE_NAME];
|
|
|
+
|
|
|
+// /* Reserve Bit Checking for Set Channel Acces */
|
|
|
+// for(i=0;i<ReqLen;i++)
|
|
|
+// {
|
|
|
+// if( 0 != (pReq[i] & m_Set_ChReserveBit[i]))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// }
|
|
|
+// /* Reserve Value checking */
|
|
|
+
|
|
|
+// if((pReq[1] & 0xC0)== 0xC0 || (pReq[2] & 0xC0) == 0xC0)
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// ChannelNum = pSetChAccessReq->ChannelNum & 0x0F;
|
|
|
+// if (CURRENT_CHANNEL_NUM == ChannelNum)
|
|
|
+// {
|
|
|
+// OS_THREAD_TLS_GET(g_tls.CurChannel,curchannel);
|
|
|
+// ChannelNum = *curchannel & 0xF;
|
|
|
+// }
|
|
|
+
|
|
|
+// if (((GetBits (pSetChAccessReq->Privilege, 0x0F)) < PRIV_LEVEL_CALLBACK) ||
|
|
|
+// ((GetBits (pSetChAccessReq->Privilege, 0x0F)) > PRIV_LEVEL_PROPRIETARY))
|
|
|
+// {
|
|
|
+// IPMI_DBG_PRINT_1 ("Invalid Channel Privilege = 0x%x\n", pSetChAccessReq->Privilege);
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->ChUserMutex,WAIT_INFINITE);
|
|
|
+// pChannelInfo = getChannelInfo(ChannelNum, BMCInst);
|
|
|
+// if (NULL == pChannelInfo)
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// /*point to NVRAM ChannelInfo */
|
|
|
+// pNvrChInfo = GetNVRChConfigs(pChannelInfo,BMCInst);
|
|
|
+
|
|
|
+// if (SESSIONLESS_CHANNEL == pChannelInfo->SessionSupport)
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// /* Channel is sessionless channel this command is not supported */
|
|
|
+// *pRes = CC_SET_CH_COMMAND_NOT_SUPPORTED;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+
|
|
|
+// AccessMode = pSetChAccessReq->ChannelAccess & 0x07;
|
|
|
+// if(ChannelNum == pBMCInfo->SERIALch)
|
|
|
+// {
|
|
|
+// if( NULL != g_PDKHandle[PDK_SWITCHMUX])
|
|
|
+// {
|
|
|
+// ((void(*)(uint8_t, int))(g_PDKHandle[PDK_SWITCHMUX]))(AccessMode ,BMCInst);
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// /* if the requested access mode is supported for the given channel */
|
|
|
+// if (0 == (pChannelInfo->AccessModeSupported & (1 << AccessMode)))
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// *pRes = CC_SET_CH_ACCES_MODE_NOT_SUPPORTED;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// AccessFlags = GetBits (pSetChAccessReq->ChannelAccess, 0xC0);
|
|
|
+
|
|
|
+// switch (AccessFlags)
|
|
|
+// {
|
|
|
+// case 0:
|
|
|
+// /* dont set channel access */
|
|
|
+// break;
|
|
|
+
|
|
|
+// case 1:
|
|
|
+// /*set in Non volatile Memory and in voatile Memory */
|
|
|
+// pNvrChInfo->Alerting = GetBits (pSetChAccessReq->ChannelAccess , 0x20);
|
|
|
+// pNvrChInfo->PerMessageAuth = GetBits (pSetChAccessReq->ChannelAccess , 0x10);
|
|
|
+// pNvrChInfo->UserLevelAuth = GetBits (pSetChAccessReq->ChannelAccess , 0x08);
|
|
|
+// pNvrChInfo->AccessMode = AccessMode;
|
|
|
+// /* write to NVRAM */
|
|
|
+// FlushChConfigs((uint8_t*)pNvrChInfo,pNvrChInfo->ChannelNumber,BMCInst);
|
|
|
+// pChannelInfo->Alerting = pNvrChInfo->Alerting;
|
|
|
+// pChannelInfo->PerMessageAuth= pNvrChInfo->PerMessageAuth;
|
|
|
+// pChannelInfo->UserLevelAuth = pNvrChInfo->UserLevelAuth;
|
|
|
+// pChannelInfo->AccessMode = AccessMode;
|
|
|
+// break;
|
|
|
+
|
|
|
+// case 2:
|
|
|
+// /*set in volatile Memmory only */
|
|
|
+// pChannelInfo->Alerting = GetBits (pSetChAccessReq->ChannelAccess, 0x20);
|
|
|
+// pChannelInfo->PerMessageAuth= GetBits (pSetChAccessReq->ChannelAccess, 0x10);
|
|
|
+// pChannelInfo->UserLevelAuth = GetBits (pSetChAccessReq->ChannelAccess, 0x08);
|
|
|
+// pChannelInfo->AccessMode = AccessMode;
|
|
|
+// }
|
|
|
+
|
|
|
+// switch (GetBits (pSetChAccessReq->Privilege, 0xC0))
|
|
|
+// {
|
|
|
+// case 0:
|
|
|
+// /* dont set prilivege level */
|
|
|
+// break;
|
|
|
+
|
|
|
+// case 1:
|
|
|
+// /* set in non volatile mem and volatile memeory*/ /*set privilege*/
|
|
|
+// pNvrChInfo->MaxPrivilege = GetBits (pSetChAccessReq->Privilege, 0x0F);
|
|
|
+// pChannelInfo->MaxPrivilege = pNvrChInfo->MaxPrivilege;
|
|
|
+// break;
|
|
|
+
|
|
|
+// case 2:
|
|
|
+// /*set privilege*/
|
|
|
+// /* set in volatile memeory only */
|
|
|
+// pChannelInfo->MaxPrivilege = GetBits (pSetChAccessReq->Privilege, 0x0F);
|
|
|
+// }
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// *pRes = CC_NORMAL;
|
|
|
+
|
|
|
+// return sizeof (*pRes);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* GetChAccess
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//GetChAccess ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// GetChAccessReq_T* pGetChAccessReq = ( GetChAccessReq_T*)pReq;
|
|
|
+// GetChAccessRes_T* pGetChAccessRes = ( GetChAccessRes_T*)pRes;
|
|
|
+// ChannelInfo_T* pChannelInfo;
|
|
|
+// ChannelInfo_T* pNvrChInfo;
|
|
|
+// uint8_t ChannelNum,AccessFlag,*curchannel;
|
|
|
+// BMCInfo_t *pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+
|
|
|
+// /* Check for reserved bits */
|
|
|
+// if((0 != (pGetChAccessReq->ChannelNum & 0xf0)) ||
|
|
|
+// (0 != (pGetChAccessReq-> AccessFlag & 0x3f)))
|
|
|
+// {
|
|
|
+// pGetChAccessRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// ChannelNum = pGetChAccessReq->ChannelNum & 0x0F;
|
|
|
+// if (CURRENT_CHANNEL_NUM == ChannelNum)
|
|
|
+// {
|
|
|
+// OS_THREAD_TLS_GET(g_tls.CurChannel,curchannel);
|
|
|
+// ChannelNum = *curchannel & 0xF;
|
|
|
+// }
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->ChUserMutex,WAIT_INFINITE);
|
|
|
+// pChannelInfo = getChannelInfo (ChannelNum, BMCInst);
|
|
|
+
|
|
|
+// if (NULL == pChannelInfo)
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// pGetChAccessRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// if (SESSIONLESS_CHANNEL == pChannelInfo->SessionSupport)
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// /* Channel is sessionless channel this command is not supported */
|
|
|
+// pGetChAccessRes->CompletionCode = CC_GET_CH_COMMAND_NOT_SUPPORTED;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// AccessFlag = GetBits (pGetChAccessReq->AccessFlag, 0xC0);
|
|
|
+
|
|
|
+// pGetChAccessRes->CompletionCode = CC_NORMAL;
|
|
|
+
|
|
|
+// switch (AccessFlag)
|
|
|
+// {
|
|
|
+// case 1:
|
|
|
+// /* Get Channel Information from NVRAM */
|
|
|
+// pNvrChInfo = GetNVRChConfigs(pChannelInfo,BMCInst);
|
|
|
+
|
|
|
+// pGetChAccessRes->ChannelAccess = SetBits (0x20, pNvrChInfo->Alerting);
|
|
|
+// pGetChAccessRes->ChannelAccess |= SetBits (0x10, pNvrChInfo->PerMessageAuth);
|
|
|
+// pGetChAccessRes->ChannelAccess |= SetBits (0x08, pNvrChInfo->UserLevelAuth);
|
|
|
+// pGetChAccessRes->ChannelAccess |= SetBits (0x07, pNvrChInfo->AccessMode);
|
|
|
+// pGetChAccessRes->Privilege = SetBits (0x0F, pNvrChInfo->MaxPrivilege);
|
|
|
+// break;
|
|
|
+
|
|
|
+// case 2:
|
|
|
+// /* Get Channel Information from Volatile RAM */
|
|
|
+// pGetChAccessRes->ChannelAccess = SetBits (0x20, pChannelInfo->Alerting);
|
|
|
+// pGetChAccessRes->ChannelAccess |= SetBits (0x10, pChannelInfo->PerMessageAuth);
|
|
|
+// pGetChAccessRes->ChannelAccess |= SetBits (0x08, pChannelInfo->UserLevelAuth);
|
|
|
+// pGetChAccessRes->ChannelAccess |= SetBits (0x07, pChannelInfo->AccessMode);
|
|
|
+// pGetChAccessRes->Privilege = SetBits (0x0F, pChannelInfo->MaxPrivilege);
|
|
|
+// break;
|
|
|
+
|
|
|
+// default:
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// pGetChAccessRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// return sizeof (GetChAccessRes_T);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* GetChInfo
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//GetChInfo ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// GetChInfoReq_T* pGetChInfoReq = ( GetChInfoReq_T*)pReq;
|
|
|
+// GetChInfoRes_T* pGetChInfoRes = ( GetChInfoRes_T*)pRes;
|
|
|
+// BMCInfo_t *pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+// ChannelInfo_T* pChannelInfo;
|
|
|
+// uint8_t ChannelNum,*curchannel;
|
|
|
+
|
|
|
+// if(pGetChInfoReq->ChannelNum & (BIT7 | BIT6 | BIT5 | BIT4)) //Check for Reserved bits
|
|
|
+// {
|
|
|
+// pGetChInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// ChannelNum = pGetChInfoReq->ChannelNum;
|
|
|
+// if (CURRENT_CHANNEL_NUM == ChannelNum)
|
|
|
+// {
|
|
|
+// OS_THREAD_TLS_GET(g_tls.CurChannel,curchannel);
|
|
|
+// ChannelNum = *curchannel & 0xF;
|
|
|
+//
|
|
|
+// /* UDS, not being a physical channel, will hold LAN properties */
|
|
|
+// if(UDS_CHANNEL == ChannelNum)
|
|
|
+// {
|
|
|
+// ChannelNum = LAN_RMCP_CHANNEL1_TYPE;
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_ACQUIRE(&pBMCInfo->ChUserMutex,WAIT_INFINITE);
|
|
|
+// pChannelInfo = getChannelInfo(ChannelNum, BMCInst);
|
|
|
+// if (NULL == pChannelInfo)
|
|
|
+// {
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+// pGetChInfoRes->CompletionCode = CC_INV_DATA_FIELD ;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// pGetChInfoRes->CompletionCode = CC_NORMAL;
|
|
|
+// pGetChInfoRes->ChannelNum = ChannelNum;
|
|
|
+// pGetChInfoRes->ChannelMedium = pChannelInfo->ChannelMedium;
|
|
|
+// pGetChInfoRes->ChannelProtocol = pChannelInfo->ChannelProtocol;
|
|
|
+// pGetChInfoRes->SessionActiveSupport = pChannelInfo->SessionSupport << 6;
|
|
|
+// pGetChInfoRes->SessionActiveSupport |= pChannelInfo->ActiveSession;
|
|
|
+
|
|
|
+// _fmemcpy (pGetChInfoRes->VendorID, pChannelInfo->ProtocolVendorId,
|
|
|
+// sizeof (pGetChInfoRes->VendorID));
|
|
|
+// _fmemcpy (pGetChInfoRes->AuxiliaryInfo, pChannelInfo->AuxiliaryInfo,
|
|
|
+// sizeof (pGetChInfoRes->AuxiliaryInfo));
|
|
|
+
|
|
|
+// OS_THREAD_MUTEX_RELEASE(&pBMCInfo->ChUserMutex);
|
|
|
+
|
|
|
+// return sizeof (GetChInfoRes_T);
|
|
|
+//}
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* IsChannelSuppGroups
|
|
|
+//*---------------------------------------*/
|
|
|
+//uint8_t IsChannelSuppGroups(uint8_t ChannelNum )
|
|
|
+//{
|
|
|
+// BMCInfo_t* pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+// ChannelInfo_T* pChannelInfo;
|
|
|
+// if(IsLANChannel(ChannelNum, BMCInst))
|
|
|
+// {
|
|
|
+//
|
|
|
+// pChannelInfo = getChannelInfo (ChannelNum, BMCInst);
|
|
|
+// if(pChannelInfo==NULL)
|
|
|
+// return 0;
|
|
|
+// if(pChannelInfo->ChannelType==LAN_RMCP_CHANNEL1_TYPE)
|
|
|
+// {
|
|
|
+// return pChannelInfo->ChannelType;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// if(pChannelInfo->ChannelType==LAN_RMCP_CHANNEL2_TYPE)
|
|
|
+// {
|
|
|
+// return pChannelInfo->ChannelType;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// if(pChannelInfo->ChannelType==LAN_RMCP_CHANNEL3_TYPE)
|
|
|
+// {
|
|
|
+// return pChannelInfo->ChannelType;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// return 0;
|
|
|
+// }
|
|
|
+// }
|
|
|
+// return 0;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// if (pBMCInfo->IpmiConfig.SerialIfcSupport == 1 && (pBMCInfo->SERIALch != CH_NOT_USED && ChannelNum == pBMCInfo->SERIALch))
|
|
|
+// {
|
|
|
+// pChannelInfo = getChannelInfo (ChannelNum, BMCInst);
|
|
|
+// if(pChannelInfo==NULL)
|
|
|
+// return 0;
|
|
|
+// return pChannelInfo->ChannelType;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// return 0;
|
|
|
+// }
|
|
|
+//}
|
|
|
+///*---------------------------------------
|
|
|
+//* ModifyUsrGRP
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//ModifyUsrGrp(char * UserName,uint8_t ChannelNum,uint8_t OldAccessLimit, uint8_t NewAccessLimit )
|
|
|
+//{
|
|
|
+
|
|
|
+// char oldgrp[20]="",newgrp[20]="";
|
|
|
+
|
|
|
+// if(0 == NewAccessLimit)
|
|
|
+// {
|
|
|
+// DeleteUsrFromIPMIGrp(UserName);
|
|
|
+// }
|
|
|
+
|
|
|
+// if(PRIV_LEVEL_NO_ACCESS == OldAccessLimit)
|
|
|
+// {
|
|
|
+// strcpy(oldgrp,g_GrpPriv[g_ChannelPrivtbl[ChannelNum].Privilege].grpname);
|
|
|
+// }
|
|
|
+// else if(IGNORE_ADD_OR_REMOVE != OldAccessLimit)
|
|
|
+// {
|
|
|
+// strcpy(oldgrp,g_GrpPriv[g_ChannelPrivtbl[ChannelNum].Privilege+OldAccessLimit].grpname);
|
|
|
+// }
|
|
|
+
|
|
|
+// if(PRIV_LEVEL_NO_ACCESS == NewAccessLimit)
|
|
|
+// {
|
|
|
+// strcpy(newgrp,g_GrpPriv[g_ChannelPrivtbl[ChannelNum].Privilege].grpname);
|
|
|
+// }
|
|
|
+// else if(IGNORE_ADD_OR_REMOVE != NewAccessLimit)
|
|
|
+// {
|
|
|
+// strcpy(newgrp,g_GrpPriv[g_ChannelPrivtbl[ChannelNum].Privilege+NewAccessLimit].grpname);
|
|
|
+// }
|
|
|
+
|
|
|
+// AddIPMIUsrtoChGrp(UserName,(char *)oldgrp,(char *)newgrp);
|
|
|
+// return 0;
|
|
|
+//}
|
|
|
+
|
|
|
+/*---------------------------------------
|
|
|
+* SetUserAccess
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+SetUserAccess ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+{
|
|
|
+ SetUserAccessReq_T* pSetUserAccessReq = ( SetUserAccessReq_T*)pReq;
|
|
|
+ UserInfo_T* pUserInfo;
|
|
|
+
|
|
|
+ if (ReqLen == sizeof(SetUserAccessReq_T) - sizeof(pSetUserAccessReq->SessionLimit) )
|
|
|
+ {
|
|
|
+ pSetUserAccessReq->SessionLimit = 0;
|
|
|
+ }
|
|
|
+ else if(ReqLen == sizeof(SetUserAccessReq_T))
|
|
|
+ {
|
|
|
+ if(0 != pSetUserAccessReq->SessionLimit)
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ *pRes = CC_REQ_INV_LEN;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ pUserInfo = getUserIdInfo(pSetUserAccessReq->UserID);
|
|
|
+ if (NULL == pUserInfo)
|
|
|
+ {
|
|
|
+ printf ("AppDevice.c : SetUserAccess - Invalid user Id\n");
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ // if (pUserInfo->ID != USER_ID)
|
|
|
+ // {
|
|
|
+ // printf("Invalid data field\n");
|
|
|
+ // *pRes = CC_INV_DATA_FIELD;
|
|
|
+ // return sizeof (*pRes);
|
|
|
+ // }
|
|
|
+
|
|
|
+// pUserInfo->ChannelAccess = (pSetUserAccessReq->ChannelNoUserAccess&0x70) | (pSetUserAccessReq->AccessLimit&0x0f);
|
|
|
+ *pRes = CC_NORMAL;
|
|
|
+
|
|
|
+ return sizeof (*pRes);
|
|
|
+}
|
|
|
+
|
|
|
+/*---------------------------------------
|
|
|
+* GetUserAccess
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+GetUserAccess ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+{
|
|
|
+ GetUserAccessReq_T* pGetUserAccessReq = ( GetUserAccessReq_T*)pReq;
|
|
|
+ GetUserAccessRes_T* pGetUserAccessRes = ( GetUserAccessRes_T*)pRes;
|
|
|
+ UserInfo_T* pUserInfo;
|
|
|
+
|
|
|
+ pUserInfo = getUserIdInfo (pGetUserAccessReq->UserID);
|
|
|
+
|
|
|
+ if (NULL == pUserInfo)
|
|
|
+ {
|
|
|
+ pGetUserAccessRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ if(FALSE == pUserInfo->UserStatus)
|
|
|
+ pGetUserAccessRes->ChannelAccess = 0x0F;
|
|
|
+ else
|
|
|
+ pGetUserAccessRes->ChannelAccess = 0x34;
|
|
|
+
|
|
|
+ pGetUserAccessRes->CompletionCode = CC_NORMAL;
|
|
|
+ pGetUserAccessRes->MaxNoUserID = MAX_USER_NUM;
|
|
|
+ pGetUserAccessRes->CurrentUserID = g_BMCInfo.CurrentNoUser;
|
|
|
+ pGetUserAccessRes->FixedUserID = 0;
|
|
|
+
|
|
|
+
|
|
|
+ return sizeof (GetUserAccessRes_T);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+/*---------------------------------------
|
|
|
+* SetUserName
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+SetUserName ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes) //default password 123456
|
|
|
+{
|
|
|
+ SetUserNameReq_T* pSetUserNameReq = ( SetUserNameReq_T*)pReq;
|
|
|
+ UserInfo_T* pUserInfo;
|
|
|
+ uint8_t i;
|
|
|
+ uint8_t UserName[MAX_USERNAME_LEN + 1]; //plus 1 for null terminator
|
|
|
+ uint8_t InvalidChar[]={ ' ' , ',' , '.' , '/' , ':' , ';' , '\\' , '(', ')' , 0x01 ,
|
|
|
+ 0x02 , 0x03 , 0x04 , 0x05 , 0x06 , 0x07 , 0x08 , 0x09, 0x0A ,
|
|
|
+ 0x0B , 0x0C , 0x0D , 0x0E , 0x0F , 0x10 , 0x11 , 0x12, 0x13 ,
|
|
|
+ 0x14 , 0x15 , 0x16 , 0x17 , 0x18 , 0x19 , 0x1A , 0x1B, 0x1C ,
|
|
|
+ 0x1D , 0x1E , 0x1F , 0x7F} ;
|
|
|
+
|
|
|
+
|
|
|
+ // Check for Reserved bits
|
|
|
+ if(pSetUserNameReq->UserID & (BIT7 | BIT6) || (pSetUserNameReq->UserID == 0x00))
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof(*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ /*User Id exceeded the limit or Cant set NULL User */
|
|
|
+ if (pSetUserNameReq->UserID > MAX_USER_NUM )
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD ;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+ /* We should not set the NULL user */
|
|
|
+ if(0== pSetUserNameReq->UserName [0] )
|
|
|
+ {
|
|
|
+ printf("\n Setting the NULL user :%x",pSetUserNameReq->UserID);
|
|
|
+ *pRes = CC_INV_DATA_FIELD ;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ if((strlen(pSetUserNameReq->UserName) > MAX_USERNAME_LEN) || (strlen(pSetUserNameReq->UserName) == 0))
|
|
|
+ {
|
|
|
+ printf("Invalid username length: %d\n", strlen(pSetUserNameReq->UserName));
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return 1;
|
|
|
+ }
|
|
|
+ pUserInfo = getUserIdInfo(pSetUserNameReq->UserID);
|
|
|
+
|
|
|
+ /* check for numeric first char and special chars */
|
|
|
+ if( (pSetUserNameReq->UserName[0] >= '0') && (pSetUserNameReq->UserName[0] <= '9') )
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof(*pRes);
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ strncpy((char *)UserName,(const char *) pSetUserNameReq->UserName, sizeof(pSetUserNameReq->UserName));
|
|
|
+ UserName[MAX_USERNAME_LEN] = '\0';
|
|
|
+ for(i=0;i<sizeof(InvalidChar);i++)
|
|
|
+ {
|
|
|
+ if( NULL != strchr((const char *)UserName, InvalidChar[i] ))
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof(*pRes);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ //Don't check duplicated user names for 0xFF, this request is for deleting user
|
|
|
+ if(0xFF != pSetUserNameReq->UserName [0])
|
|
|
+ {
|
|
|
+ //checking for Duplicate user names
|
|
|
+ if(CheckForDuplicateUsers(pSetUserNameReq->UserName)==FALSE)
|
|
|
+ {
|
|
|
+ printf("Duplicate ipmi user!!\n");
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ /* If User[0] is 0xFF means the user is requested to delete */
|
|
|
+ if (0xFF == pSetUserNameReq->UserName [0]) //delete user
|
|
|
+ {
|
|
|
+ if( (g_BMCInfo.CurrentNoUser > 1) && (0 != pUserInfo->UserId))
|
|
|
+ {
|
|
|
+ if(pUserInfo->UserStatus == TRUE)
|
|
|
+ {
|
|
|
+ g_BMCInfo.CurrentNoUser--;
|
|
|
+ }
|
|
|
+ /* Delete the user both in Volatile & Non Volatile memory*/
|
|
|
+ memset (pUserInfo, 0, sizeof (UserInfo_T));
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD ;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ else if(0 == pUserInfo->UserId) //add user
|
|
|
+ {
|
|
|
+ /* If First time-if user ID does not exist */
|
|
|
+ /* if the user name is set for the first time */
|
|
|
+ pUserInfo->UserId = pSetUserNameReq->UserID;
|
|
|
+ pUserInfo->UserStatus = TRUE;
|
|
|
+ memcpy(pUserInfo->UserName, pSetUserNameReq->UserName, MAX_USERNAME_LEN);
|
|
|
+ strcpy(pUserInfo->UserPassword, "123456");
|
|
|
+ g_BMCInfo.CurrentNoUser++;
|
|
|
+ }
|
|
|
+ else if (0 != pUserInfo->UserId)//modifying users
|
|
|
+ {
|
|
|
+ memcpy (pUserInfo->UserName, pSetUserNameReq->UserName, MAX_USERNAME_LEN);
|
|
|
+ }
|
|
|
+
|
|
|
+ FlushUserInfoTbl();
|
|
|
+ *pRes = CC_NORMAL;
|
|
|
+ return sizeof (*pRes);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+/*---------------------------------------
|
|
|
+* GetUserName
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+GetUserName ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+{
|
|
|
+ GetUserNameReq_T* pGetUserNameReq = ( GetUserNameReq_T*)pReq;
|
|
|
+ GetUserNameRes_T* pGetUserNameRes = ( GetUserNameRes_T*)pRes;
|
|
|
+ UserInfo_T* pUserInfo;
|
|
|
+
|
|
|
+ // Check for Reserved bits
|
|
|
+ if(pGetUserNameReq->UserID & (BIT7 | BIT6) || (pGetUserNameReq->UserID == 0x00))
|
|
|
+ {
|
|
|
+ pGetUserNameRes->CompletionCode = CC_INV_DATA_FIELD ;
|
|
|
+ return sizeof(*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ if (pGetUserNameReq->UserID > MAX_USER_NUM)
|
|
|
+ {
|
|
|
+ /* if user ID exceeded the Max limit */
|
|
|
+ pGetUserNameRes->CompletionCode = CC_INV_DATA_FIELD ;
|
|
|
+ return sizeof (*pRes);/* Invalied user id */
|
|
|
+ }
|
|
|
+ pUserInfo = getUserIdInfo(pGetUserNameReq->UserID);
|
|
|
+
|
|
|
+ /* if User is disabled or if User is not created */
|
|
|
+
|
|
|
+ //if user is disabled we dont have to return invalid data field
|
|
|
+ //instead we return everything possible about the user
|
|
|
+ // if pUserInfo is NULL then nothing in the structure at all
|
|
|
+ // pUserInfo being NULL is probably not possible
|
|
|
+ // If the signature doesnt match then the useris not yet configured
|
|
|
+ // so reasonable to return an error
|
|
|
+ if ((NULL == pUserInfo)/* || (pUserInfo->ID != USER_ID)*/)
|
|
|
+ {
|
|
|
+ /* User with given ID is disabled */
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ //if we are here then the user is just disabled
|
|
|
+ if(FALSE == pUserInfo->UserStatus)
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ //Err = 0;
|
|
|
+ pGetUserNameRes->CompletionCode = CC_NORMAL;
|
|
|
+ memcpy (pGetUserNameRes->UserName, pUserInfo->UserName, MAX_USERNAME_LEN);
|
|
|
+ return sizeof (GetUserNameRes_T);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+/*---------------------------------------
|
|
|
+* SetUserPassword
|
|
|
+*---------------------------------------*/
|
|
|
+int
|
|
|
+SetUserPassword ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes)
|
|
|
+{
|
|
|
+ SetUserPswdReq_T* pSetUserPswdReq = ( SetUserPswdReq_T*)pReq;
|
|
|
+ UserInfo_T* pUserInfo;
|
|
|
+ uint8_t UserId=0, Operation;
|
|
|
+ uint8_t i;
|
|
|
+ uint8_t UserPassword[ MAX_PASSWORD_LEN + 1 ] = {0};
|
|
|
+ uint8_t InvalidChar[] = { 0x01 , 0x02 , 0x03 , 0x04 ,0x05 , 0x06 , 0x07 , 0x08 , 0x09 , 0x0A,
|
|
|
+ 0x0B , 0x0C , 0x0D , 0x0E , 0x0F , 0x10 , 0x11 , 0x12 , 0x13 , 0x14,
|
|
|
+ 0x15 , 0x16 , 0x17 , 0x18 , 0x19 , 0x1A , 0x1B , 0x1C , 0x1D , 0x1E ,
|
|
|
+ 0x1F , 0x7F };
|
|
|
+
|
|
|
+
|
|
|
+ Operation = pSetUserPswdReq->Operation & 0x03;
|
|
|
+ UserId = pSetUserPswdReq->UserID & 0x3F;
|
|
|
+
|
|
|
+ /* Reserved bits checking */
|
|
|
+ if((pSetUserPswdReq->UserID & BIT6) || (UserId == 0) || (pSetUserPswdReq->Operation & (BIT7 | BIT6 | BIT5 | BIT4 | BIT3 | BIT2)))
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ if (ReqLen == IPMI_15_PASSWORD_LEN)
|
|
|
+ {
|
|
|
+ memset (pSetUserPswdReq->Password + 16, 0, 4);
|
|
|
+ }
|
|
|
+ ReqLen -=2;
|
|
|
+
|
|
|
+ if (UserId > MAX_USER_NUM)
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes); /*User Id exceeded the limit*/
|
|
|
+ }
|
|
|
+
|
|
|
+ pUserInfo = getUserIdInfo (UserId);
|
|
|
+
|
|
|
+ if ( NULL == pUserInfo )
|
|
|
+ {
|
|
|
+ printf ("Invalid User Id \n");
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+
|
|
|
+ *pRes = CC_NORMAL;
|
|
|
+
|
|
|
+ switch (Operation)
|
|
|
+ {
|
|
|
+ case DISABLE_USER:
|
|
|
+ //here we can disable the user
|
|
|
+ if ((pUserInfo->UserStatus == TRUE) && (g_BMCInfo.CurrentNoUser > 1))
|
|
|
+ {
|
|
|
+ pUserInfo->UserStatus = FALSE;
|
|
|
+ g_BMCInfo.CurrentNoUser--;
|
|
|
+ FlushUserInfoTbl();
|
|
|
+ }
|
|
|
+ break;
|
|
|
+ case ENABLE_USER:
|
|
|
+ /*enable user */
|
|
|
+ if ((0 != pUserInfo->UserId) && (0 != pUserInfo->UserName[0]))
|
|
|
+ {
|
|
|
+ /* if for the first time then Increment the Current user No */
|
|
|
+ if ( pUserInfo->UserStatus == FALSE )
|
|
|
+ {
|
|
|
+ pUserInfo->UserStatus = TRUE;
|
|
|
+ g_BMCInfo.CurrentNoUser++;
|
|
|
+ FlushUserInfoTbl();
|
|
|
+ }
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ *pRes = CC_UNSPECIFIED_ERR;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+ break;
|
|
|
+
|
|
|
+ case SET_PASSWORD:
|
|
|
+ /*set password */
|
|
|
+ if ((0 != pUserInfo->UserId) && (0 != pUserInfo->UserName[0]))
|
|
|
+ {
|
|
|
+ /*check for special characters*/
|
|
|
+ strncpy((char *)UserPassword,(const char *) pSetUserPswdReq->Password, sizeof(pSetUserPswdReq->Password));
|
|
|
+ for( i = 0 ; i < sizeof(InvalidChar) ; i++ )
|
|
|
+ {
|
|
|
+ if( NULL != strchr((const char *)UserPassword, InvalidChar[i] ))
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof(*pRes);
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ strcpy(pUserInfo->UserPassword, pSetUserPswdReq->Password);
|
|
|
+ FlushUserInfoTbl();
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ *pRes = CC_INV_DATA_FIELD;
|
|
|
+ return sizeof (*pRes);
|
|
|
+ }
|
|
|
+ break;
|
|
|
+
|
|
|
+ case TEST_PASSWORD:
|
|
|
+ memcpy (UserPassword, pUserInfo->UserPassword, MAX_PASSWORD_LEN);
|
|
|
+
|
|
|
+ /*Test Password */
|
|
|
+ if ((FALSE == pUserInfo->UserStatus) ||
|
|
|
+ (0 != memcmp (UserPassword, pSetUserPswdReq->Password, MAX_PASSWORD_LEN)))
|
|
|
+ {
|
|
|
+ *pRes = CC_PASSWORD_TEST_FAILED;
|
|
|
+ }
|
|
|
+ break;
|
|
|
+
|
|
|
+ }
|
|
|
+ return sizeof (*pRes);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* MasterWriteRead
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//MasterWriteRead ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// MasterWriteReadReq_T* pMasterWriteReadReq = ( MasterWriteReadReq_T*)pReq;
|
|
|
+// MasterWriteReadRes_T* pMasterWriteReadRes = ( MasterWriteReadRes_T*)pRes;
|
|
|
+// BMCInfo_t* pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+// uint8_t* OutBuffer;
|
|
|
+// uint8_t* InBuffer;
|
|
|
+// uint8_t ChannelNum, BusID, BusType, SlaveAddr, ReadCount, WriteCount;
|
|
|
+// INT8S BusName[64];
|
|
|
+// int retval = 0;
|
|
|
+// uint8_t OrgReadCount;
|
|
|
+// uint8_t I2CBusId=0;
|
|
|
+// uint8_t DevID = 0; // This will be '0' by Default... /dev/peci0
|
|
|
+// uint8_t Target = 0x30; // This is the Client address. 30h = 48 is Default for CPU0
|
|
|
+// uint8_t Domain = 0; // Multi-Domain support. Default is '0'
|
|
|
+// uint8_t Xmit_Feedback = 0; // If full response is Desired, enable this. Default is '1'
|
|
|
+// uint8_t AWFCS = 0; // Enable AWFCS in the Transmitted packet by Hw. Default is '0'
|
|
|
+// uint8_t Read_Len = 0; // Number of bytes of read back Data from PECI Client
|
|
|
+// uint8_t Write_Len = 0; // Number of bytes of data, host is sending to client
|
|
|
+// uint8_t *Write_Data = NULL; // Pointer to the Data sent by User to the PECI Client
|
|
|
+// uint8_t *Read_Data = NULL; // Pointer to the Data received from PECI Client to be sent to user
|
|
|
+// int ret_val = 0;
|
|
|
+
|
|
|
+// if(pMasterWriteReadReq->SlaveAddress & BIT0)
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// ReadCount = pMasterWriteReadReq->ReadCount;
|
|
|
+// ChannelNum = GetBits (pMasterWriteReadReq->BusTypeChNo, 0xF0);
|
|
|
+// BusID = GetBits (pMasterWriteReadReq->BusTypeChNo, 0x0E);
|
|
|
+// BusType = GetBits (pMasterWriteReadReq->BusTypeChNo, 0x01);
|
|
|
+// SlaveAddr = (pMasterWriteReadReq->SlaveAddress >> 1);
|
|
|
+
|
|
|
+// if ((BusType == 0x00 && BusID != 0x00) || ((BusType == 0x01) && (BusID == 0x00)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// // Command order:
|
|
|
+// // ipmitool -H <IP> -I lan -U <Username> -P <Password> bus=7 <Slave_Addr> <Read_Len> <Write_Len> <AWFCS> <Domain> <Data>
|
|
|
+// // <bus=7> : Bus# must be 0x07 for comunicating with PECI over IPMI. Other buses are not for this feature
|
|
|
+// // <Slave_Addr> : This is the PECI Client target address.
|
|
|
+// // <Read_Len> : Number of bytes of data to read from the PECI Response
|
|
|
+// // <Write_Len> : Number of bytes of data being written, as per the PECI Spec. Number of Bytes after Domain.
|
|
|
+// // <AWFCS> : 0x01 or 0x00 indicates enabling or disabling of AWFCS feature respectively
|
|
|
+// // <Domain> : 0x01 or 0x00 indicates domain=1 or domain=0 for multi-domain commands respectively
|
|
|
+// // <Data> : Rest of data like Command, and other params as per the PECI Spec.
|
|
|
+
|
|
|
+// // If BusType is External (0x01) and BusID is 7, then we consider to communicate with PECI
|
|
|
+//
|
|
|
+// if(g_corefeatures.peci_over_ipmi == ENABLED )
|
|
|
+// {
|
|
|
+// if ((BusType & 0x01) && (BusID == 0x07))
|
|
|
+// {
|
|
|
+// DevID = 0;
|
|
|
+// Xmit_Feedback = 0;
|
|
|
+// Target = pMasterWriteReadReq->SlaveAddress;
|
|
|
+// Read_Len = ReadCount;
|
|
|
+// Write_Len = pMasterWriteReadReq->Data[0];
|
|
|
+// AWFCS = pMasterWriteReadReq->Data[1];
|
|
|
+// Domain = pMasterWriteReadReq->Data[2];
|
|
|
+// Write_Data = &pMasterWriteReadReq->Data[3];
|
|
|
+// Read_Data = &pMasterWriteReadRes->Data[0];
|
|
|
+
|
|
|
+// memset(&pMasterWriteReadRes->Data[0], 0, sizeof(pMasterWriteReadRes->Data));
|
|
|
+//
|
|
|
+// // Call the PECI Generic Handler for passing the command to the PECI Controller
|
|
|
+// if(g_HALPECIHandle[HAL_PECI_COMMAND] != NULL)
|
|
|
+// {
|
|
|
+// ret_val = ((int(*)(char, char, char, char, char, char *, char, char *, char))g_HALPECIHandle[HAL_PECI_COMMAND]) (DevID, Target,
|
|
|
+// Domain, Xmit_Feedback, AWFCS,
|
|
|
+// (char *)Write_Data, Write_Len,
|
|
|
+// (char *)Read_Data, Read_Len );
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// pMasterWriteReadRes->CompletionCode = CC_PARAM_NOT_SUP_IN_CUR_STATE;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// /* Check if peci issue command operation is success or not */
|
|
|
+// if (ret_val == -1)
|
|
|
+// {
|
|
|
+// pMasterWriteReadRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// pMasterWriteReadRes->CompletionCode = CC_NORMAL;
|
|
|
+
|
|
|
+// return (sizeof (*pRes) + ReadCount);
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// if(0 ==BusType){
|
|
|
+// if(PRIMARY_IPMB_CHANNEL == ChannelNum)
|
|
|
+// {
|
|
|
+// I2CBusId=pBMCInfo->IpmiConfig.PrimaryIPMBBusNumber;
|
|
|
+// }
|
|
|
+// else if((pBMCInfo->IpmiConfig.SecondaryIPMBSupport == 0x01)&&(pBMCInfo->SecondaryIPMBCh == ChannelNum))
|
|
|
+// {
|
|
|
+// I2CBusId=pBMCInfo->IpmiConfig.SecondaryIPMBBusNumber;
|
|
|
+// }else{
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// if(BusID==pBMCInfo->IpmiConfig.PrimaryIPMBBusNumber)
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }else if((pBMCInfo->IpmiConfig.SecondaryIPMBSupport == 0x01)&&(BusID==pBMCInfo->IpmiConfig.SecondaryIPMBBusNumber))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }else{
|
|
|
+// I2CBusId=BusID;
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// if (ReqLen < 3)
|
|
|
+// {
|
|
|
+// *pRes = CC_REQ_INV_LEN;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// /* number of bytes to write
|
|
|
+// * = pMasterWriteReadReq length - 3 for Request Data byte -
|
|
|
+// * BusTypeChNo,SlaveAddr,Readcount + 1 byte for address
|
|
|
+// */
|
|
|
+// WriteCount = ReqLen - 3;
|
|
|
+
|
|
|
+// OutBuffer = (pMasterWriteReadReq->Data);
|
|
|
+// InBuffer = pMasterWriteReadRes->Data;
|
|
|
+// sprintf(BusName,"/dev/i2c%d",I2CBusId);
|
|
|
+
|
|
|
+// // Save original ReadCount in case we need to modify it
|
|
|
+// OrgReadCount = ReadCount;
|
|
|
+
|
|
|
+// // If both ReadCount and WriteCount are zero, then force a read of 1 byte.
|
|
|
+// // If we do not do this, the write command will fail.
|
|
|
+// // Having both counts 0 is a way of "pinging" the given device to see if it
|
|
|
+// // is responding to its address.
|
|
|
+//
|
|
|
+// if (ReadCount == 0 && WriteCount == 0)
|
|
|
+// {
|
|
|
+// ReadCount = 1;
|
|
|
+// }
|
|
|
+
|
|
|
+// if (ReadCount > 0 && WriteCount == 0)
|
|
|
+// {
|
|
|
+// if(g_HALI2CHandle[HAL_I2C_MR] != NULL)
|
|
|
+// {
|
|
|
+// retval = ((int(*)(char *,u8,u8 *,size_t))g_HALI2CHandle[HAL_I2C_MR]) (BusName, SlaveAddr, InBuffer, ReadCount);
|
|
|
+// if (retval < 0)
|
|
|
+// {
|
|
|
+// pMasterWriteReadRes->CompletionCode = (retval & MASTER_RW_ERRCODE);
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// pMasterWriteReadRes->CompletionCode = CC_PARAM_NOT_SUP_IN_CUR_STATE;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// ReadCount = OrgReadCount;
|
|
|
+
|
|
|
+// /* copy the bytes read to Response Data */
|
|
|
+// _fmemcpy (pMasterWriteReadRes->Data, InBuffer, ReadCount);
|
|
|
+// }
|
|
|
+// else if(ReadCount > 0 && WriteCount > 0 )
|
|
|
+// {
|
|
|
+// if(g_HALI2CHandle[HAL_I2C_RW] != NULL)
|
|
|
+// {
|
|
|
+// retval = ((int(*)(char *,u8,u8 *,u8 *,size_t,size_t))g_HALI2CHandle[HAL_I2C_RW]) (BusName, SlaveAddr, OutBuffer, InBuffer, WriteCount, ReadCount);
|
|
|
+// if (retval < 0)
|
|
|
+// {
|
|
|
+// pMasterWriteReadRes->CompletionCode = (retval & MASTER_RW_ERRCODE);
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// pMasterWriteReadRes->CompletionCode = CC_PARAM_NOT_SUP_IN_CUR_STATE;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+
|
|
|
+// ReadCount = OrgReadCount;
|
|
|
+
|
|
|
+// /* copy the bytes read to Response Data */
|
|
|
+// _fmemcpy (pMasterWriteReadRes->Data, InBuffer, ReadCount);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// /* No data to read so use master write instead,
|
|
|
+// * otherwise some devices (EEPROM) that have not finished writing
|
|
|
+// * will fail on the read transaction and possibly corrupt data
|
|
|
+// */
|
|
|
+// if(g_HALI2CHandle[HAL_I2C_MW] != NULL)
|
|
|
+// {
|
|
|
+// retval= ((ssize_t(*)(char *,u8,u8 *,size_t))g_HALI2CHandle[HAL_I2C_MW]) (BusName, SlaveAddr, OutBuffer, WriteCount);
|
|
|
+// if(retval < 0)
|
|
|
+// {
|
|
|
+// pMasterWriteReadRes->CompletionCode = (retval & MASTER_RW_ERRCODE);
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// pMasterWriteReadRes->CompletionCode = CC_PARAM_NOT_SUP_IN_CUR_STATE;
|
|
|
+// return sizeof(*pRes);
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// pMasterWriteReadRes->CompletionCode = CC_NORMAL;
|
|
|
+
|
|
|
+// return (sizeof (*pRes) + ReadCount);
|
|
|
+//}
|
|
|
+
|
|
|
+
|
|
|
+//#if 0
|
|
|
+///*-------------------------------------------
|
|
|
+//* ComputeAuthCode
|
|
|
+//*-------------------------------------------*/
|
|
|
+//void
|
|
|
+//ComputeAuthCode ( uint8_t* pPassword, SessionHdr_T* pSessionHdr,
|
|
|
+// IPMIMsgHdr_T* pIPMIMsg, uint8_t* pAuthCode,
|
|
|
+// uint8_t ChannelType)
|
|
|
+//{
|
|
|
+// if (AUTH_TYPE_PASSWORD == pSessionHdr->AuthType)
|
|
|
+// {
|
|
|
+// _fmemcpy (pAuthCode, pPassword, MAX_PASSWORD_LEN);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// uint8_t AuthBuf [MAX_AUTH_PARAM_SIZE];
|
|
|
+// uint16_t AuthBufLen = 0;
|
|
|
+// uint8_t IPMIMsgLen = *(( uint8_t*) pIPMIMsg - 1);
|
|
|
+
|
|
|
+// /* Password */
|
|
|
+// _fmemcpy (AuthBuf, pPassword, MAX_PASSWORD_LEN);
|
|
|
+// AuthBufLen += MAX_PASSWORD_LEN;
|
|
|
+// /* Session ID */
|
|
|
+// _fmemcpy (AuthBuf + AuthBufLen, &pSessionHdr->SessionID, sizeof (uint32_t));
|
|
|
+// AuthBufLen += sizeof (uint32_t);
|
|
|
+// /* IPMI Response Message */
|
|
|
+// _fmemcpy (AuthBuf + AuthBufLen, pIPMIMsg, IPMIMsgLen);
|
|
|
+// AuthBufLen += IPMIMsgLen;
|
|
|
+
|
|
|
+// if (ChannelType == MULTI_SESSION_CHANNEL)
|
|
|
+// {
|
|
|
+// /* Session Sequence Number */
|
|
|
+// _fmemcpy (AuthBuf + AuthBufLen,
|
|
|
+// &pSessionHdr->SessionSeqNum, sizeof (uint32_t));
|
|
|
+// AuthBufLen += sizeof (uint32_t);
|
|
|
+// }
|
|
|
+// /* Password */
|
|
|
+// _fmemcpy (AuthBuf + AuthBufLen, pPassword, MAX_PASSWORD_LEN);
|
|
|
+// AuthBufLen += MAX_PASSWORD_LEN;
|
|
|
+
|
|
|
+// switch (pSessionHdr->AuthType)
|
|
|
+// {
|
|
|
+// case AUTH_TYPE_MD2 :
|
|
|
+// AuthCodeCalMD2 (AuthBuf, pAuthCode, AuthBufLen);
|
|
|
+// break;
|
|
|
+
|
|
|
+// case AUTH_TYPE_MD5 :
|
|
|
+// AuthCodeCalMD5 (AuthBuf, pAuthCode, AuthBufLen);
|
|
|
+// break;
|
|
|
+
|
|
|
+// default :
|
|
|
+// TDBG ("RMCP: Invalid Authentication Type \n");
|
|
|
+// }
|
|
|
+// }
|
|
|
+//}
|
|
|
+//#endif
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* GetSystemInfoParam
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//GetSystemInfoParam ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+
|
|
|
+// GetSystemInfoParamReq_T* pGetSysInfoReq = ( GetSystemInfoParamReq_T*)pReq;
|
|
|
+// GetSystemInfoParamRes_T* pGetSysInfoRes = ( GetSystemInfoParamRes_T* ) pRes ;
|
|
|
+// GetSystemInfoParamOEMRes_T* pGetSysInfoOEMRes = ( GetSystemInfoParamOEMRes_T* ) pRes ;
|
|
|
+// BMCInfo_t *pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+// SystemInfoConfig_T* pSysInfoCfg;
|
|
|
+// uint8_t resSize = sizeof(pGetSysInfoRes->CompletionCode) + sizeof(pGetSysInfoRes->ParamRevision);
|
|
|
+// uint8_t oem_len;
|
|
|
+// unsigned long oem_addr;
|
|
|
+
|
|
|
+// // Check for Reserved bits
|
|
|
+// if(pGetSysInfoReq->ParamRev & (BIT6 | BIT5 | BIT4 | BIT3 | BIT2 | BIT1 | BIT0))
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pGetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+
|
|
|
+// pGetSysInfoRes->CompletionCode = CC_NORMAL;
|
|
|
+
|
|
|
+// /* Fill the param's older Version and the present version */
|
|
|
+// pGetSysInfoRes->ParamRevision = ((PARAM_OLDER_REVISION << 4) & 0xF0 ) | PARAM_PRESENT_REVISION;
|
|
|
+
|
|
|
+// /* Check for Revision only parameter */
|
|
|
+// if (pGetSysInfoReq->ParamRev & GET_PARAM_REV_ONLY )
|
|
|
+// {
|
|
|
+// if((MAX_APP_CONF_PARAM >= pGetSysInfoReq->ParamSelector))
|
|
|
+// {
|
|
|
+// return resSize;
|
|
|
+// }
|
|
|
+// else if(( NULL != g_PDKHandle[PDK_GETSYSINFOPARAM]) &&
|
|
|
+// ((MIN_SYSINFO_OEM_CONF_PARAM <= pGetSysInfoReq->ParamSelector) && (MAX_SYSINFO_OEM_CONF_PARAM >= pGetSysInfoReq->ParamSelector)))
|
|
|
+// {
|
|
|
+// oem_len = ((int(*)(uint8_t, unsigned long*,int))(g_PDKHandle[PDK_GETSYSINFOPARAM]))(pGetSysInfoReq->ParamSelector, &oem_addr ,BMCInst);
|
|
|
+// if( oem_len == 0)
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->CompletionCode = CC_SYS_INFO_PARAM_NOT_SUPPORTED;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// return resSize;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// *pRes = CC_PARAM_NOT_SUPPORTED;
|
|
|
+// return sizeof (*pRes);
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// /* Get Systen Info parameters from NVRAM */
|
|
|
+// pSysInfoCfg = &pBMCInfo->SystemInfoConfig;
|
|
|
+
|
|
|
+// switch(pGetSysInfoReq->ParamSelector)
|
|
|
+// {
|
|
|
+// case SET_IN_PROGRESS_PARAM: /*Parameter 0 volatile*/
|
|
|
+// if( (0x00 != pGetSysInfoReq->SetSelector) || (0x00 != pGetSysInfoReq->BlockSelector) )
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pGetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// pGetSysInfoRes->SysInfo.SetInProgress = BMC_GET_SHARED_MEM(BMCInst)->m_Sys_SetInProgress;
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// resSize++;
|
|
|
+// break;
|
|
|
+
|
|
|
+// case SYS_FW_VERSION_PARAM:
|
|
|
+// _fmemset(&pGetSysInfoRes->SysInfo.SysVerInfo,0,sizeof(SysVerInfo_T));
|
|
|
+// if((pGetSysInfoReq->SetSelector >= MAX_BLOCK_SIZE)|| (0x00 != pGetSysInfoReq->BlockSelector))
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pGetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+
|
|
|
+// pGetSysInfoRes->SysInfo.SysVerInfo.SetSelector = pGetSysInfoReq->SetSelector;
|
|
|
+// resSize++;
|
|
|
+// if(pGetSysInfoReq->SetSelector==ZERO_SETSELECTOR)
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->SysInfo.SysVerInfo.SysFWVersion[0]=pSysInfoCfg->SysFWVersion.TypeOfEncoding;
|
|
|
+// pGetSysInfoRes->SysInfo.SysVerInfo.SysFWVersion[1]=pSysInfoCfg->SysFWVersion.StringLength;
|
|
|
+// _fmemcpy(&pGetSysInfoRes->SysInfo.SysVerInfo.SysFWVersion[2], pSysInfoCfg->SysFWVersion.SysFWVersionName,MAX_STRING_LENGTH_COPY);
|
|
|
+// resSize += MAX_BLOCK_SIZE;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// _fmemcpy(&pGetSysInfoRes->SysInfo.SysVerInfo.SysFWVersion[0],
|
|
|
+// &pSysInfoCfg->SysFWVersion.SysFWVersionName[(pGetSysInfoReq->SetSelector * MAX_BLOCK_SIZE) - 2],MAX_BLOCK_SIZE);
|
|
|
+// resSize += MAX_BLOCK_SIZE;
|
|
|
+// }
|
|
|
+// break;
|
|
|
+
|
|
|
+// case SYS_NAME_PARAM:
|
|
|
+// if((pGetSysInfoReq->SetSelector >= MAX_BLOCK_SIZE)|| (0x00 != pGetSysInfoReq->BlockSelector))
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pGetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+
|
|
|
+// pGetSysInfoRes->SysInfo.SysNameInfo.SetSelector = pGetSysInfoReq->SetSelector;
|
|
|
+// resSize++;
|
|
|
+// if(pGetSysInfoReq->SetSelector==ZERO_SETSELECTOR)
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->SysInfo.SysNameInfo.SysName[0]=pSysInfoCfg->SysName.TypeOfEncoding_Sys_Name;
|
|
|
+// pGetSysInfoRes->SysInfo.SysNameInfo.SysName[1]=pSysInfoCfg->SysName.StringLength_Sys_Name;
|
|
|
+// _fmemcpy(&pGetSysInfoRes->SysInfo.SysNameInfo.SysName[2],&pSysInfoCfg->SysName.SystemName,MAX_STRING_LENGTH_COPY);
|
|
|
+// resSize += MAX_BLOCK_SIZE;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// _fmemcpy(&pGetSysInfoRes->SysInfo.SysNameInfo.SysName[0],
|
|
|
+// &pSysInfoCfg->SysName.SystemName[(pGetSysInfoReq->SetSelector * MAX_BLOCK_SIZE) - 2], MAX_BLOCK_SIZE);
|
|
|
+// resSize += MAX_BLOCK_SIZE;
|
|
|
+// }
|
|
|
+// break;
|
|
|
+
|
|
|
+// case PRIM_OS_NAME_PARAM:
|
|
|
+// if((pGetSysInfoReq->SetSelector >= MAX_BLOCK_SIZE)|| (0x00 != pGetSysInfoReq->BlockSelector))
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pGetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+
|
|
|
+// pGetSysInfoRes->SysInfo.PrimOSInfo.SetSelector = pGetSysInfoReq->SetSelector;
|
|
|
+// resSize++;
|
|
|
+// if(pGetSysInfoReq->SetSelector==ZERO_SETSELECTOR)
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->SysInfo.PrimOSInfo.PrimaryOSName[0]=pSysInfoCfg->PrimaryOSName.TypeOfEncoding_PrimaryOSName;
|
|
|
+// pGetSysInfoRes->SysInfo.PrimOSInfo.PrimaryOSName[1]=pSysInfoCfg->PrimaryOSName.StringLength_PrimaryOSName;
|
|
|
+// _fmemcpy(&pGetSysInfoRes->SysInfo.PrimOSInfo.PrimaryOSName[2], &pSysInfoCfg->PrimaryOSName.PrimaryOperatingSystemName, MAX_STRING_LENGTH_COPY);
|
|
|
+// resSize += MAX_BLOCK_SIZE;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// _fmemcpy(&pGetSysInfoRes->SysInfo.PrimOSInfo.PrimaryOSName[0],
|
|
|
+// &pSysInfoCfg->PrimaryOSName.PrimaryOperatingSystemName[(pGetSysInfoReq->SetSelector * MAX_BLOCK_SIZE) - 2],MAX_BLOCK_SIZE);
|
|
|
+// resSize += MAX_BLOCK_SIZE;
|
|
|
+// }
|
|
|
+// break;
|
|
|
+
|
|
|
+// case OS_NAME_PARAM:
|
|
|
+// /*Parameter 4 volatile*/
|
|
|
+// _fmemset(&pGetSysInfoRes->SysInfo.OSInfo,0,sizeof(OSInfo_T));
|
|
|
+// if((pGetSysInfoReq->SetSelector >= MAX_BLOCK_SIZE)||(0x00 != pGetSysInfoReq->BlockSelector))
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pGetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// pGetSysInfoRes->SysInfo.OSInfo.SetSelector = pGetSysInfoReq->SetSelector;
|
|
|
+// resSize++;
|
|
|
+// if(pGetSysInfoReq->SetSelector==ZERO_SETSELECTOR)
|
|
|
+// {
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// pGetSysInfoRes->SysInfo.OSInfo.OperatingSystemName[0]=BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.TypeOfEncoding_OSName;
|
|
|
+// pGetSysInfoRes->SysInfo.OSInfo.OperatingSystemName[1]=BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.StringLength_OSName;
|
|
|
+// _fmemcpy(&pGetSysInfoRes->SysInfo.OSInfo.OperatingSystemName[2], BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.OSName, MAX_STRING_LENGTH_COPY);
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// resSize += MAX_BLOCK_SIZE;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// _fmemcpy(&pGetSysInfoRes->SysInfo.OSInfo.OperatingSystemName[0],
|
|
|
+// &BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.OSName[(pGetSysInfoReq->SetSelector * MAX_BLOCK_SIZE) - 2],MAX_BLOCK_SIZE);
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// resSize += MAX_BLOCK_SIZE;
|
|
|
+// }
|
|
|
+//
|
|
|
+// break;
|
|
|
+
|
|
|
+// default:
|
|
|
+// if(g_PDKHandle[PDK_GETSYSINFOPARAM] != NULL &&
|
|
|
+// (pGetSysInfoReq->ParamSelector >= 192 && pGetSysInfoReq->ParamSelector <= 255))
|
|
|
+// {
|
|
|
+// oem_len = ((int(*)(uint8_t, unsigned long*,int))(g_PDKHandle[PDK_GETSYSINFOPARAM]))(pGetSysInfoReq->ParamSelector, &oem_addr ,BMCInst);
|
|
|
+// if( oem_len == 0)
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->CompletionCode = CC_SYS_INFO_PARAM_NOT_SUPPORTED;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// //Acquire the OEM parameters
|
|
|
+// if( oem_len < MSG_PAYLOAD_SIZE - sizeof(GetLanCCRev_T))
|
|
|
+// {
|
|
|
+// memcpy((char*)pGetSysInfoOEMRes + sizeof(GetSystemInfoParamOEMRes_T) ,\
|
|
|
+// (unsigned int*)oem_addr , oem_len);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->CompletionCode = CC_SYS_INFO_PARAM_NOT_SUPPORTED;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// return sizeof(GetSystemInfoParamOEMRes_T) + oem_len;
|
|
|
+// }
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// pGetSysInfoRes->CompletionCode = CC_SYS_INFO_PARAM_NOT_SUPPORTED;
|
|
|
+// return sizeof(pGetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// }
|
|
|
+// /* return the size of the response */
|
|
|
+// return resSize;
|
|
|
+//}
|
|
|
+
|
|
|
+//int validatestring(uint8_t* String,int len,uint8_t TOE)
|
|
|
+//{
|
|
|
+// int i,delimit = 0,strlen = 0;
|
|
|
+
|
|
|
+// for(i=0;i<len;i++)
|
|
|
+// {
|
|
|
+// if(String[i] == 0)
|
|
|
+// {
|
|
|
+// delimit++;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// if(delimit != 0)
|
|
|
+// {
|
|
|
+// if(TOE == UNICODE)
|
|
|
+// {
|
|
|
+// if(delimit == 2)
|
|
|
+// {
|
|
|
+// strlen = strlen + 2;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// return -1;
|
|
|
+// }
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// if(delimit == 1)
|
|
|
+// {
|
|
|
+// strlen = strlen + 1;
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// return -1;
|
|
|
+// }
|
|
|
+// }
|
|
|
+// delimit = 0;
|
|
|
+// }
|
|
|
+// strlen++;
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// return strlen;
|
|
|
+//}
|
|
|
+
|
|
|
+///*---------------------------------------
|
|
|
+//* SetSystemInfoParam
|
|
|
+//*---------------------------------------*/
|
|
|
+//int
|
|
|
+//SetSystemInfoParam ( uint8_t* pReq, uint8_t ReqLen, uint8_t* pRes, int BMCInst)
|
|
|
+//{
|
|
|
+// SetSystemInfoParamReq_T* pSetSysInfoReq = ( SetSystemInfoParamReq_T*)pReq;
|
|
|
+// SetSystemInfoParamOEMReq_T* pSetSysInfoOEMReq = ( SetSystemInfoParamOEMReq_T*)pReq;
|
|
|
+// SetSystemInfoParamRes_T* pSetSysInfoRes = ( SetSystemInfoParamRes_T*)pRes;
|
|
|
+// BMCInfo_t *pBMCInfo = &g_BMCInfo[BMCInst];
|
|
|
+// SystemInfoConfig_T* pSysInfoCfg;
|
|
|
+// uint8_t *pSetInProgress;
|
|
|
+// unsigned long oem_addr[2]={0}; // use oem_addr[1] as read-only/write-only flag
|
|
|
+// int size,strlen,len;
|
|
|
+// uint8_t OSName[MAX_OS_NAME_LENGTH] = {0};
|
|
|
+
|
|
|
+// //If the OEM parameter is existing, then skip the length check.
|
|
|
+// if(g_PDKHandle[PDK_SETSYSINFOPARAM] == NULL && (pSetSysInfoReq->ParamSelector < 192 )){
|
|
|
+// if( !( (SET_IN_PROGRESS_PARAM == pSetSysInfoReq->ParamSelector && ( ReqLen == ( sizeof(pSetSysInfoReq->ParamSelector) + sizeof(uint8_t) /* for Data */ ) )) ||
|
|
|
+// ( pSetSysInfoReq->ParamSelector < MAX_PARAM_SELECTOR && ReqLen == ( sizeof(pSetSysInfoReq->ParamSelector) + sizeof(uint8_t) /* for set Selector */ + MAX_BLOCK_SIZE))) )
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_REQ_INV_LEN;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// }
|
|
|
+
|
|
|
+// pSetInProgress = &BMC_GET_SHARED_MEM(BMCInst)->m_Sys_SetInProgress;
|
|
|
+
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_NORMAL;
|
|
|
+
|
|
|
+// /*Get NVRAM System Info Configuration parameters */
|
|
|
+// pSysInfoCfg = &pBMCInfo->SystemInfoConfig;
|
|
|
+
|
|
|
+// switch (pSetSysInfoReq->ParamSelector)
|
|
|
+// {
|
|
|
+// /*Parameter 0 volatile */
|
|
|
+// case SET_IN_PROGRESS_PARAM:
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// /* If Request for Set In progress */
|
|
|
+// if(( SYS_INFO_SET_IN_PROGRESS == *pSetInProgress ) &&
|
|
|
+// ( SYS_INFO_SET_IN_PROGRESS == pSetSysInfoReq->SysInfo.SetInProgress ))
|
|
|
+// {
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// /* Trying to SetinProgress when already in set*/
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_SYS_INFO_SET_IN_PROGRESS ;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// } else if( SYS_INFO_COMMIT_WRITE == pSetSysInfoReq->SysInfo.SetInProgress )
|
|
|
+// {
|
|
|
+// /* Write SysInfoConfig to NVR */
|
|
|
+// FlushIPMI((uint8_t*)&pBMCInfo->SystemInfoConfig,(uint8_t*)&pBMCInfo->SystemInfoConfig,
|
|
|
+// pBMCInfo->IPMIConfLoc.SystemInfoConfigAddr,sizeof(SystemInfoConfig_T),BMCInst);
|
|
|
+// /* Write volatile data to the BMC Shared memory */
|
|
|
+//
|
|
|
+// } else if ( SYS_INFO_SET_COMPLETE == pSetSysInfoReq->SysInfo.SetInProgress )
|
|
|
+// {
|
|
|
+// //PMCONFIG_FILE(BMCInst,PMConfigFile);
|
|
|
+// /* Set it to set Complete */
|
|
|
+// *pSetInProgress = pSetSysInfoReq->SysInfo.SetInProgress;
|
|
|
+// FlushIPMI((uint8_t*)&pBMCInfo->SystemInfoConfig,(uint8_t*)&pBMCInfo->SystemInfoConfig,
|
|
|
+// pBMCInfo->IPMIConfLoc.SystemInfoConfigAddr,sizeof(SystemInfoConfig_T),BMCInst);
|
|
|
+// } else if ( SYS_INFO_SET_IN_PROGRESS != pSetSysInfoReq->SysInfo.SetInProgress )
|
|
|
+// {
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+
|
|
|
+// *pSetInProgress = pSetSysInfoReq->SysInfo.SetInProgress;
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// break;
|
|
|
+
|
|
|
+// case SYS_FW_VERSION_PARAM:
|
|
|
+//
|
|
|
+// if(pSetSysInfoReq->SysInfo.SysVerInfo.SetSelector >= MAX_BLOCK_SIZE)
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// if(pSetSysInfoReq->SysInfo.SysNameInfo.SetSelector==ZERO_SETSELECTOR)
|
|
|
+// {
|
|
|
+// if(pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[1]> MAX_FW_VER_LENGTH)
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// if(pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[0] > MAX_TYPE_OF_ENCODING)
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// memset(&pSysInfoCfg->SysFWVersion,0,sizeof(pSysInfoCfg->SysFWVersion));
|
|
|
+// pSysInfoCfg->SysFWVersion.TypeOfEncoding=pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[0];
|
|
|
+// pSysInfoCfg->SysFWVersion.StringLength=pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[1];
|
|
|
+// /*First character should not be a delimiter*/
|
|
|
+// if(pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[2] == 0x0 || ((pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[0] == UNICODE) && (pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[2] == 0x0 || pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[3] == 0x0)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// strlen = validatestring(&pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[2],MAX_BLOCK_SIZE-2,pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[0]);
|
|
|
+// if(strlen == -1 || (strlen > pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[1]) || ((pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[1] <= (MAX_BLOCK_SIZE - 2)) && strlen != pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[1]))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// if(((MAX_BLOCK_SIZE -2) < pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[1]) && (strlen != (MAX_BLOCK_SIZE - 2)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// _fmemcpy(&pSysInfoCfg->SysFWVersion.SysFWVersionName[0],&pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[2], MAX_STRING_LENGTH_COPY);
|
|
|
+// FlushIPMI((uint8_t*)&pBMCInfo->SystemInfoConfig,(uint8_t*)&pBMCInfo->SystemInfoConfig.SysFWVersion,
|
|
|
+// pBMCInfo->IPMIConfLoc.SystemInfoConfigAddr,sizeof(SysFWVersion_T),BMCInst);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// _fmemcpy(&pSysInfoCfg->SysFWVersion.SysFWVersionName[(pSetSysInfoReq->SysInfo.SysVerInfo.SetSelector* MAX_BLOCK_SIZE) - 2],
|
|
|
+// &pSetSysInfoReq->SysInfo.SysVerInfo.SysFWVersion[0],MAX_BLOCK_SIZE);
|
|
|
+// len = ((pSetSysInfoReq->SysInfo.SysVerInfo.SetSelector* MAX_BLOCK_SIZE) + MAX_BLOCK_SIZE) - 2;
|
|
|
+// strlen = validatestring(&pSysInfoCfg->SysFWVersion.SysFWVersionName[0],len,pSysInfoCfg->SysFWVersion.TypeOfEncoding);
|
|
|
+// if(strlen == -1 || (strlen > pSysInfoCfg->SysFWVersion.StringLength))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// /*Check the String length*/
|
|
|
+// if(((len < pSysInfoCfg->SysFWVersion.StringLength) && (len != strlen)) || ((len > pSysInfoCfg->SysFWVersion.StringLength) && (pSysInfoCfg->SysFWVersion.StringLength != strlen)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// if((len == pSysInfoCfg->SysFWVersion.StringLength) && (pSysInfoCfg->SysFWVersion.StringLength != strlen))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+
|
|
|
+// FlushIPMI((uint8_t*)&pBMCInfo->SystemInfoConfig,
|
|
|
+// (uint8_t*)&pBMCInfo->SystemInfoConfig.SysFWVersion,pBMCInfo->IPMIConfLoc.SystemInfoConfigAddr,sizeof(SysFWVersion_T),BMCInst);
|
|
|
+// }
|
|
|
+// break;
|
|
|
+
|
|
|
+// case SYS_NAME_PARAM:
|
|
|
+// if(pSetSysInfoReq->SysInfo.SysNameInfo.SetSelector >= MAX_BLOCK_SIZE )
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// if(pSetSysInfoReq->SysInfo.SysNameInfo.SetSelector==ZERO_SETSELECTOR)
|
|
|
+// {
|
|
|
+// if((pSetSysInfoReq->SysInfo.SysNameInfo.SysName[1] > MAX_SYS_NAME_LENGTH))
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// if(pSetSysInfoReq->SysInfo.SysNameInfo.SysName[0]>MAX_TYPE_OF_ENCODING)
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// memset(&pSysInfoCfg->SysName,0,sizeof(pSysInfoCfg->SysName));
|
|
|
+// pSysInfoCfg->SysName.TypeOfEncoding_Sys_Name=pSetSysInfoReq->SysInfo.SysNameInfo.SysName[0];
|
|
|
+// pSysInfoCfg->SysName.StringLength_Sys_Name=pSetSysInfoReq->SysInfo.SysNameInfo.SysName[1];
|
|
|
+
|
|
|
+// /*First character should not be a delimiter*/
|
|
|
+// if(pSetSysInfoReq->SysInfo.SysNameInfo.SysName[2] == 0x0 || ((pSetSysInfoReq->SysInfo.SysNameInfo.SysName[0] == UNICODE) && (pSetSysInfoReq->SysInfo.SysNameInfo.SysName[2] == 0x0 || pSetSysInfoReq->SysInfo.SysNameInfo.SysName[3] == 0x0)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+
|
|
|
+// strlen = validatestring(&pSetSysInfoReq->SysInfo.SysNameInfo.SysName[2],MAX_BLOCK_SIZE-2,pSetSysInfoReq->SysInfo.SysNameInfo.SysName[0]);
|
|
|
+// if(strlen == -1 || (strlen > pSetSysInfoReq->SysInfo.SysNameInfo.SysName[1]) || ((pSetSysInfoReq->SysInfo.SysNameInfo.SysName[1] <= (MAX_BLOCK_SIZE - 2)) && strlen != pSetSysInfoReq->SysInfo.SysNameInfo.SysName[1]))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// if(((MAX_BLOCK_SIZE -2) < pSetSysInfoReq->SysInfo.SysNameInfo.SysName[1]) && (strlen != (MAX_BLOCK_SIZE - 2)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+
|
|
|
+// _fmemcpy(&pSysInfoCfg->SysName.SystemName[0], &pSetSysInfoReq->SysInfo.SysNameInfo.SysName[2],MAX_STRING_LENGTH_COPY);
|
|
|
+// FlushIPMI((uint8_t*)&pBMCInfo->SystemInfoConfig,(uint8_t*)&pBMCInfo->SystemInfoConfig.SysName,
|
|
|
+// pBMCInfo->IPMIConfLoc.SystemInfoConfigAddr,sizeof(SysName_T),BMCInst);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// _fmemcpy(&pSysInfoCfg->SysName.SystemName[(pSetSysInfoReq->SysInfo.SysNameInfo.SetSelector* MAX_BLOCK_SIZE) - 2],
|
|
|
+// &pSetSysInfoReq->SysInfo.SysNameInfo.SysName,MAX_BLOCK_SIZE);
|
|
|
+// len = ((pSetSysInfoReq->SysInfo.SysNameInfo.SetSelector* MAX_BLOCK_SIZE) + MAX_BLOCK_SIZE) - 2;
|
|
|
+// strlen = validatestring(&pSysInfoCfg->SysName.SystemName[0],len,pSysInfoCfg->SysName.TypeOfEncoding_Sys_Name);
|
|
|
+// if(strlen == -1 || (strlen > pSysInfoCfg->SysName.StringLength_Sys_Name))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// /*Check the String length*/
|
|
|
+// if(((len < pSysInfoCfg->SysName.StringLength_Sys_Name) && (len != strlen)) || ((len > pSysInfoCfg->SysName.StringLength_Sys_Name) && (pSysInfoCfg->SysName.StringLength_Sys_Name != strlen)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// if((len == pSysInfoCfg->SysName.StringLength_Sys_Name) && (pSysInfoCfg->SysName.StringLength_Sys_Name != strlen))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+
|
|
|
+// FlushIPMI((uint8_t*)&pBMCInfo->SystemInfoConfig,(uint8_t*)&pBMCInfo->SystemInfoConfig.SysName,
|
|
|
+// pBMCInfo->IPMIConfLoc.SystemInfoConfigAddr,sizeof(SysName_T),BMCInst);
|
|
|
+// }
|
|
|
+// break;
|
|
|
+
|
|
|
+// case PRIM_OS_NAME_PARAM:
|
|
|
+// if(pSetSysInfoReq->SysInfo.PrimOSInfo.SetSelector >= MAX_BLOCK_SIZE )
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// if(pSetSysInfoReq->SysInfo.PrimOSInfo.SetSelector==ZERO_SETSELECTOR)
|
|
|
+// {
|
|
|
+// if((pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[1] > MAX_PRIM_OS_NAME_LENGTH))
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+//
|
|
|
+// }
|
|
|
+// if(pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[0]>MAX_TYPE_OF_ENCODING)
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// memset(&pSysInfoCfg->PrimaryOSName,0,sizeof(pSysInfoCfg->PrimaryOSName));
|
|
|
+// pSysInfoCfg->PrimaryOSName.TypeOfEncoding_PrimaryOSName=pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[0];
|
|
|
+// pSysInfoCfg->PrimaryOSName.StringLength_PrimaryOSName=pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[1];
|
|
|
+
|
|
|
+// /*First character should not be a delimiter*/
|
|
|
+// if(pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[2] == 0x0 || ((pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[0] == UNICODE) && (pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[2] == 0x0 || pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[3] == 0x0)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+
|
|
|
+// strlen = validatestring(&pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[2],MAX_BLOCK_SIZE-2,pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[0]);
|
|
|
+// if(strlen == -1 || (strlen > pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[1]) || ((pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[1] <= (MAX_BLOCK_SIZE - 2)) && strlen != pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[1]))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// if(((MAX_BLOCK_SIZE -2) < pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[1]) && (strlen != (MAX_BLOCK_SIZE - 2)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+
|
|
|
+// _fmemcpy(&pSysInfoCfg->PrimaryOSName.PrimaryOperatingSystemName[0], &pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName[2], MAX_STRING_LENGTH_COPY);
|
|
|
+// FlushIPMI((uint8_t*)&pBMCInfo->SystemInfoConfig,(uint8_t*)&pBMCInfo->SystemInfoConfig.PrimaryOSName,
|
|
|
+// pBMCInfo->IPMIConfLoc.SystemInfoConfigAddr,sizeof(PrimaryOSName_T),BMCInst);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// _fmemcpy(&pSysInfoCfg->PrimaryOSName.PrimaryOperatingSystemName[(pSetSysInfoReq->SysInfo.PrimOSInfo.SetSelector * MAX_BLOCK_SIZE) - 2],
|
|
|
+// &pSetSysInfoReq->SysInfo.PrimOSInfo.PrimaryOSName, MAX_BLOCK_SIZE);
|
|
|
+// len = ((pSetSysInfoReq->SysInfo.PrimOSInfo.SetSelector* MAX_BLOCK_SIZE) + MAX_BLOCK_SIZE) - 2;
|
|
|
+// strlen = validatestring(&pSysInfoCfg->PrimaryOSName.PrimaryOperatingSystemName[0],len,pSysInfoCfg->PrimaryOSName.TypeOfEncoding_PrimaryOSName);
|
|
|
+// if(strlen == -1 || (strlen > pSysInfoCfg->PrimaryOSName.StringLength_PrimaryOSName))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// /*Check the String length*/
|
|
|
+// if(((len < pSysInfoCfg->PrimaryOSName.StringLength_PrimaryOSName) && (len != strlen)) || ((len > pSysInfoCfg->PrimaryOSName.StringLength_PrimaryOSName) && (pSysInfoCfg->PrimaryOSName.StringLength_PrimaryOSName != strlen)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// if((len == pSysInfoCfg->PrimaryOSName.StringLength_PrimaryOSName) && (pSysInfoCfg->PrimaryOSName.StringLength_PrimaryOSName != strlen))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+
|
|
|
+// FlushIPMI((uint8_t*)&pBMCInfo->SystemInfoConfig,
|
|
|
+// (uint8_t*)&pBMCInfo->SystemInfoConfig.PrimaryOSName,pBMCInfo->IPMIConfLoc.SystemInfoConfigAddr,sizeof(PrimaryOSName_T),BMCInst);
|
|
|
+// }
|
|
|
+// break;
|
|
|
+
|
|
|
+// case OS_NAME_PARAM:
|
|
|
+// /*Parameter 4 volatile*/
|
|
|
+// if(pSetSysInfoReq->SysInfo.OSInfo.SetSelector >= MAX_BLOCK_SIZE )
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// if(pSetSysInfoReq->SysInfo.OSInfo.SetSelector==ZERO_SETSELECTOR)
|
|
|
+// {
|
|
|
+// if(pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[1] > MAX_OS_NAME_LENGTH)
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// if(pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[0] > MAX_TYPE_OF_ENCODING)
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+
|
|
|
+// /*First character should not be a delimiter*/
|
|
|
+// if(pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[2] == 0x0 || ((pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[0] == UNICODE) && (pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[2] == 0x0 || pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[3] == 0x0)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+
|
|
|
+// strlen = validatestring(&pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[2],MAX_BLOCK_SIZE-2,pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[0]);
|
|
|
+// if(strlen == -1 || (strlen > pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[1]) || ((pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[1] <= (MAX_BLOCK_SIZE - 2)) && strlen != pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[1]))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// if(((MAX_BLOCK_SIZE -2) < pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[1]) && (strlen != (MAX_BLOCK_SIZE - 2)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+
|
|
|
+// memset(&BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName,0,sizeof(OSName_T));
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.TypeOfEncoding_OSName=pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[0];
|
|
|
+// BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.StringLength_OSName=pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[1];
|
|
|
+// _fmemcpy(&BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.OSName, &pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName[2],
|
|
|
+// MAX_STRING_LENGTH_COPY);
|
|
|
+// UNLOCK_BMC_SHARED_MEM (BMCInst);
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// LOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// _fmemcpy(&OSName[0],&BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.OSName[0],MAX_OS_NAME_LENGTH);
|
|
|
+// _fmemcpy(&OSName[(pSetSysInfoReq->SysInfo.OSInfo.SetSelector * MAX_BLOCK_SIZE) - 2],&pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName,MAX_BLOCK_SIZE);
|
|
|
+// len = ((pSetSysInfoReq->SysInfo.OSInfo.SetSelector* MAX_BLOCK_SIZE) + MAX_BLOCK_SIZE) - 2;
|
|
|
+// strlen = validatestring(&OSName[0],len,BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.TypeOfEncoding_OSName);
|
|
|
+// if(strlen == -1 || (strlen > BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.StringLength_OSName))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// UNLOCK_BMC_SHARED_MEM(BMCInst);
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// /*Check the String length*/
|
|
|
+// if(((len < BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.StringLength_OSName) && (len != strlen)) || ((len > BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.StringLength_OSName) && (BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.StringLength_OSName != strlen)))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+// if((len == BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.StringLength_OSName) && (BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.StringLength_OSName != strlen))
|
|
|
+// {
|
|
|
+// *pRes = CC_INV_DATA_FIELD;
|
|
|
+// return sizeof(uint8_t);
|
|
|
+// }
|
|
|
+
|
|
|
+// _fmemcpy(&(BMC_GET_SHARED_MEM(BMCInst)->OperatingSystemName.OSName[(pSetSysInfoReq->SysInfo.OSInfo.SetSelector * MAX_BLOCK_SIZE) - 2]),
|
|
|
+// &pSetSysInfoReq->SysInfo.OSInfo.OperatingSystemName,MAX_BLOCK_SIZE);
|
|
|
+// UNLOCK_BMC_SHARED_MEM (BMCInst);
|
|
|
+// }
|
|
|
+// break;
|
|
|
+
|
|
|
+// default:
|
|
|
+// if(g_PDKHandle[PDK_SETSYSINFOPARAM] != NULL &&
|
|
|
+// (pSetSysInfoReq->ParamSelector >= 192 && pSetSysInfoReq->ParamSelector <= 255))
|
|
|
+// {
|
|
|
+// oem_addr[0] = (unsigned long)((char*)pSetSysInfoOEMReq + sizeof(SetSystemInfoParamOEMReq_T));
|
|
|
+// size = ((int(*)(uint8_t, unsigned long*,int))(g_PDKHandle[PDK_SETSYSINFOPARAM]))(pSetSysInfoReq->ParamSelector, oem_addr ,BMCInst);
|
|
|
+// if(size <= 0)
|
|
|
+// {
|
|
|
+// switch (oem_addr[1]) {
|
|
|
+// case CC_SYS_INFO_READ_ONLY_PARAM:
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_SYS_INFO_READ_ONLY_PARAM;
|
|
|
+// break;
|
|
|
+// default:
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_PARAM_NOT_SUPPORTED;
|
|
|
+// }
|
|
|
+// }
|
|
|
+// else
|
|
|
+// {
|
|
|
+// pSetSysInfoRes->CompletionCode = CC_SYS_INFO_PARAM_NOT_SUPPORTED;
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+// }
|
|
|
+// }
|
|
|
+// }
|
|
|
+// return sizeof(pSetSysInfoRes->CompletionCode);
|
|
|
+//}
|
|
|
+
|
|
|
+#endif /* APP_DEVICE */
|