123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932 |
- /* -*-mode: C; indent-tabs-mode: t; -*-
- * Copyright (c) 2003 Sun Microsystems, Inc. All Rights Reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * Redistribution of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- *
- * Redistribution in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- *
- * Neither the name of Sun Microsystems, Inc. or the names of
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * This software is provided "AS IS," without a warranty of any kind.
- * ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
- * INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A
- * PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED.
- * SUN MICROSYSTEMS, INC. ("SUN") AND ITS LICENSORS SHALL NOT BE LIABLE
- * FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, MODIFYING
- * OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. IN NO EVENT WILL
- * SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA,
- * OR FOR DIRECT, INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL OR
- * PUNITIVE DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF
- * LIABILITY, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS SOFTWARE,
- * EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
- */
- #include <stdlib.h>
- #include <stdio.h>
- #include <string.h>
- #include <strings.h>
- #include <sys/types.h>
- #include <sys/socket.h>
- #include <netinet/in.h>
- #include <arpa/inet.h>
- #include <errno.h>
- #include <unistd.h>
- #include <signal.h>
- #include <ipmitool/ipmi.h>
- #include <ipmitool/ipmi_intf.h>
- #include <ipmitool/helper.h>
- #include <ipmitool/log.h>
- #include <ipmitool/ipmi_lanp.h>
- #include <ipmitool/ipmi_channel.h>
- #include <ipmitool/ipmi_strings.h>
- #include <ipmitool/ipmi_constants.h>
- #include <ipmitool/ipmi_user.h>
- extern int csv_output;
- extern int verbose;
- void printf_channel_usage(void);
- /* _ipmi_get_channel_access - Get Channel Access for given channel. Results are
- * stored into passed struct.
- *
- * @intf - IPMI interface
- * @channel_access - ptr to channel_access_t with Channel set.
- * @get_volatile_settings - get volatile if != 0, else non-volatile settings.
- *
- * returns - negative number means error, positive is a ccode.
- */
- int
- _ipmi_get_channel_access(struct ipmi_intf *intf,
- struct channel_access_t *channel_access,
- uint8_t get_volatile_settings)
- {
- struct ipmi_rs *rsp;
- struct ipmi_rq req = {0};
- uint8_t data[2];
- if (channel_access == NULL) {
- return (-3);
- }
- data[0] = channel_access->channel & 0x0F;
- /* volatile - 0x80; non-volatile - 0x40 */
- data[1] = get_volatile_settings ? 0x80 : 0x40;
- req.msg.netfn = IPMI_NETFN_APP;
- req.msg.cmd = IPMI_GET_CHANNEL_ACCESS;
- req.msg.data = data;
- req.msg.data_len = 2;
- rsp = intf->sendrecv(intf, &req);
- if (rsp == NULL) {
- return (-1);
- } else if (rsp->ccode != 0) {
- return rsp->ccode;
- } else if (rsp->data_len != 2) {
- return (-2);
- }
- channel_access->alerting = rsp->data[0] & 0x20;
- channel_access->per_message_auth = rsp->data[0] & 0x10;
- channel_access->user_level_auth = rsp->data[0] & 0x08;
- channel_access->access_mode = rsp->data[0] & 0x07;
- channel_access->privilege_limit = rsp->data[1] & 0x0F;
- return 0;
- }
- /* _ipmi_get_channel_info - Get Channel Info for given channel. Results are
- * stored into passed struct.
- *
- * @intf - IPMI interface
- * @channel_info - ptr to channel_info_t with Channel set.
- *
- * returns - negative number means error, positive is a ccode.
- */
- int
- _ipmi_get_channel_info(struct ipmi_intf *intf,
- struct channel_info_t *channel_info)
- {
- struct ipmi_rs *rsp;
- struct ipmi_rq req = {0};
- uint8_t data[1];
- if (channel_info == NULL) {
- return (-3);
- }
- data[0] = channel_info->channel & 0x0F;
- req.msg.netfn = IPMI_NETFN_APP;
- req.msg.cmd = IPMI_GET_CHANNEL_INFO;
- req.msg.data = data;
- req.msg.data_len = 1;
- rsp = intf->sendrecv(intf, &req);
- if (rsp == NULL) {
- return (-1);
- } else if (rsp->ccode != 0) {
- return rsp->ccode;
- } else if (rsp->data_len != 9) {
- return (-2);
- }
- channel_info->channel = rsp->data[0] & 0x0F;
- channel_info->medium = rsp->data[1] & 0x7F;
- channel_info->protocol = rsp->data[2] & 0x1F;
- channel_info->session_support = rsp->data[3] & 0xC0;
- channel_info->active_sessions = rsp->data[3] & 0x3F;
- memcpy(channel_info->vendor_id, &rsp->data[4],
- sizeof(channel_info->vendor_id));
- memcpy(channel_info->aux_info, &rsp->data[7],
- sizeof(channel_info->aux_info));
- return 0;
- }
- /* _ipmi_set_channel_access - Set Channel Access values for given channel.
- *
- * @intf - IPMI interface
- * @channel_access - channel_access_t with desired values and channel set.
- * @access_option:
- * - 0 = don't set/change Channel Access
- * - 1 = set non-volatile settings of Channel Access
- * - 2 = set volatile settings of Channel Access
- * @privilege_option:
- * - 0 = don't set/change Privilege Level Limit
- * - 1 = set non-volatile settings of Privilege Limit
- * - 2 = set volatile settings of Privilege Limit
- *
- * returns - negative number means error, positive is a ccode. See IPMI
- * specification for further information on ccodes for Set Channel Access.
- * 0x82 - set not supported on selected channel, eg. session-less channel.
- * 0x83 - access mode not supported
- */
- int
- _ipmi_set_channel_access(struct ipmi_intf *intf,
- struct channel_access_t channel_access,
- uint8_t access_option,
- uint8_t privilege_option)
- {
- struct ipmi_rs *rsp;
- struct ipmi_rq req;
- uint8_t data[3];
- /* Only values from <0..2> are accepted as valid. */
- if (access_option > 2 || privilege_option > 2) {
- return (-3);
- }
- memset(&data, 0, sizeof(data));
- data[0] = channel_access.channel & 0x0F;
- data[1] = (access_option << 6);
- if (channel_access.alerting) {
- data[1] |= 0x20;
- }
- if (channel_access.per_message_auth) {
- data[1] |= 0x10;
- }
- if (channel_access.user_level_auth) {
- data[1] |= 0x08;
- }
- data[1] |= (channel_access.access_mode & 0x07);
- data[2] = (privilege_option << 6);
- data[2] |= (channel_access.privilege_limit & 0x0F);
- memset(&req, 0, sizeof(req));
- req.msg.netfn = IPMI_NETFN_APP;
- req.msg.cmd = IPMI_SET_CHANNEL_ACCESS;
- req.msg.data = data;
- req.msg.data_len = 3;
-
- rsp = intf->sendrecv(intf, &req);
- if (rsp == NULL) {
- return (-1);
- }
- return rsp->ccode;
- }
- static const char *
- iana_string(uint32_t iana)
- {
- static char s[10];
- if (iana) {
- sprintf(s, "%06x", iana);
- return s;
- } else {
- return "N/A";
- }
- }
- /**
- * ipmi_1_5_authtypes
- *
- * Create a string describing the supported authentication types as
- * specificed by the parameter n
- */
- static const char *
- ipmi_1_5_authtypes(uint8_t n)
- {
- uint32_t i;
- static char supportedTypes[128];
- memset(supportedTypes, 0, sizeof(supportedTypes));
- for (i = 0; ipmi_authtype_vals[i].val != 0; i++) {
- if (n & ipmi_authtype_vals[i].val) {
- strcat(supportedTypes, ipmi_authtype_vals[i].str);
- strcat(supportedTypes, " ");
- }
- }
- return supportedTypes;
- }
- uint8_t
- ipmi_current_channel_medium(struct ipmi_intf *intf)
- {
- return ipmi_get_channel_medium(intf, 0xE);
- }
- /**
- * ipmi_get_channel_auth_cap
- *
- * return 0 on success
- * -1 on failure
- */
- int
- ipmi_get_channel_auth_cap(struct ipmi_intf *intf, uint8_t channel, uint8_t priv)
- {
- struct ipmi_rs *rsp;
- struct ipmi_rq req;
- struct get_channel_auth_cap_rsp auth_cap;
- uint8_t msg_data[2];
- /* Ask for IPMI v2 data as well */
- msg_data[0] = channel | 0x80;
- msg_data[1] = priv;
- memset(&req, 0, sizeof(req));
- req.msg.netfn = IPMI_NETFN_APP;
- req.msg.cmd = IPMI_GET_CHANNEL_AUTH_CAP;
- req.msg.data = msg_data;
- req.msg.data_len = 2;
- rsp = intf->sendrecv(intf, &req);
- if ((rsp == NULL) || (rsp->ccode > 0)) {
- /*
- * It's very possible that this failed because we asked for IPMI v2 data
- * Ask again, without requesting IPMI v2 data
- */
- msg_data[0] &= 0x7F;
-
- rsp = intf->sendrecv(intf, &req);
- if (rsp == NULL) {
- lprintf(LOG_ERR, "Unable to Get Channel Authentication Capabilities");
- return (-1);
- }
- if (rsp->ccode > 0) {
- lprintf(LOG_ERR, "Get Channel Authentication Capabilities failed: %s",
- val2str(rsp->ccode, completion_code_vals));
- return (-1);
- }
- }
- memcpy(&auth_cap, rsp->data, sizeof(struct get_channel_auth_cap_rsp));
- printf("Channel number : %d\n",
- auth_cap.channel_number);
- printf("IPMI v1.5 auth types : %s\n",
- ipmi_1_5_authtypes(auth_cap.enabled_auth_types));
- if (auth_cap.v20_data_available) {
- printf("KG status : %s\n",
- (auth_cap.kg_status) ? "non-zero" : "default (all zeroes)");
- }
- printf("Per message authentication : %sabled\n",
- (auth_cap.per_message_auth) ? "dis" : "en");
- printf("User level authentication : %sabled\n",
- (auth_cap.user_level_auth) ? "dis" : "en");
- printf("Non-null user names exist : %s\n",
- (auth_cap.non_null_usernames) ? "yes" : "no");
- printf("Null user names exist : %s\n",
- (auth_cap.null_usernames) ? "yes" : "no");
- printf("Anonymous login enabled : %s\n",
- (auth_cap.anon_login_enabled) ? "yes" : "no");
- if (auth_cap.v20_data_available) {
- printf("Channel supports IPMI v1.5 : %s\n",
- (auth_cap.ipmiv15_support) ? "yes" : "no");
- printf("Channel supports IPMI v2.0 : %s\n",
- (auth_cap.ipmiv20_support) ? "yes" : "no");
- }
- /*
- * If there is support for an OEM authentication type, there is some
- * information.
- */
- if (auth_cap.enabled_auth_types & IPMI_1_5_AUTH_TYPE_BIT_OEM) {
- printf("IANA Number for OEM : %d\n",
- auth_cap.oem_id[0] |
- auth_cap.oem_id[1] << 8 |
- auth_cap.oem_id[2] << 16);
- printf("OEM Auxiliary Data : 0x%x\n",
- auth_cap.oem_aux_data);
- }
- return 0;
- }
- static int
- ipmi_get_channel_cipher_suites(struct ipmi_intf *intf, const char *payload_type,
- uint8_t channel)
- {
- struct ipmi_rs *rsp;
- struct ipmi_rq req;
- uint8_t rqdata[3];
- uint32_t iana;
- uint8_t auth_alg, integrity_alg, crypt_alg;
- uint8_t cipher_suite_id;
- uint8_t list_index = 0;
- /* 0x40 sets * 16 bytes per set */
- uint8_t cipher_suite_data[1024];
- uint16_t offset = 0;
- /* how much was returned, total */
- uint16_t cipher_suite_data_length = 0;
- memset(cipher_suite_data, 0, sizeof(cipher_suite_data));
-
- memset(&req, 0, sizeof(req));
- req.msg.netfn = IPMI_NETFN_APP;
- req.msg.cmd = IPMI_GET_CHANNEL_CIPHER_SUITES;
- req.msg.data = rqdata;
- req.msg.data_len = 3;
- rqdata[0] = channel;
- rqdata[1] = ((strncmp(payload_type, "ipmi", 4) == 0)? 0: 1);
- /* Always ask for cipher suite format */
- rqdata[2] = 0x80;
- rsp = intf->sendrecv(intf, &req);
- if (rsp == NULL) {
- lprintf(LOG_ERR, "Unable to Get Channel Cipher Suites");
- return -1;
- }
- if (rsp->ccode > 0) {
- lprintf(LOG_ERR, "Get Channel Cipher Suites failed: %s",
- val2str(rsp->ccode, completion_code_vals));
- return -1;
- }
- /*
- * Grab the returned channel number once. We assume it's the same
- * in future calls.
- */
- if (rsp->data_len >= 1) {
- channel = rsp->data[0];
- }
- while ((rsp->data_len > 1) && (rsp->data_len == 17) && (list_index < 0x3F)) {
- /*
- * We got back cipher suite data -- store it.
- * printf("copying data to offset %d\n", offset);
- * printbuf(rsp->data + 1, rsp->data_len - 1, "this is the data");
- */
- memcpy(cipher_suite_data + offset, rsp->data + 1, rsp->data_len - 1);
- offset += rsp->data_len - 1;
-
- /*
- * Increment our list for the next call
- */
- ++list_index;
- rqdata[2] = (rqdata[2] & 0x80) + list_index;
- rsp = intf->sendrecv(intf, &req);
- if (rsp == NULL) {
- lprintf(LOG_ERR, "Unable to Get Channel Cipher Suites");
- return -1;
- }
- if (rsp->ccode > 0) {
- lprintf(LOG_ERR, "Get Channel Cipher Suites failed: %s",
- val2str(rsp->ccode, completion_code_vals));
- return -1;
- }
- }
- /* Copy last chunk */
- if(rsp->data_len > 1) {
- /*
- * We got back cipher suite data -- store it.
- * printf("copying data to offset %d\n", offset);
- * printbuf(rsp->data + 1, rsp->data_len - 1, "this is the data");
- */
- memcpy(cipher_suite_data + offset, rsp->data + 1, rsp->data_len - 1);
- offset += rsp->data_len - 1;
- }
- /* We can chomp on all our data now. */
- cipher_suite_data_length = offset;
- offset = 0;
- if (! csv_output) {
- printf("ID IANA Auth Alg Integrity Alg Confidentiality Alg\n");
- }
- while (offset < cipher_suite_data_length) {
- if (cipher_suite_data[offset++] == 0xC0) {
- /* standard type */
- iana = 0;
- /* Verify that we have at least a full record left; id + 3 algs */
- if ((cipher_suite_data_length - offset) < 4) {
- lprintf(LOG_ERR, "Incomplete data record in cipher suite data");
- return -1;
- }
- cipher_suite_id = cipher_suite_data[offset++];
- } else if (cipher_suite_data[offset++] == 0xC1) {
- /* OEM record type */
- /* Verify that we have at least a full record left
- * id + iana + 3 algs
- */
- if ((cipher_suite_data_length - offset) < 4) {
- lprintf(LOG_ERR, "Incomplete data record in cipher suite data");
- return -1;
- }
- cipher_suite_id = cipher_suite_data[offset++];
- /* Grab the IANA */
- iana =
- cipher_suite_data[offset] |
- (cipher_suite_data[offset + 1] << 8) |
- (cipher_suite_data[offset + 2] << 16);
- offset += 3;
- } else {
- lprintf(LOG_ERR, "Bad start of record byte in cipher suite data");
- return -1;
- }
- /*
- * Grab the algorithms for this cipher suite. I guess we can't be
- * sure of what order they'll come in. Also, I suppose we default
- * to the NONE algorithm if one were absent. This part of the spec is
- * poorly written -- I have read the errata document. For now, I'm only
- * allowing one algorithm per type (auth, integrity, crypt) because I
- * don't I understand how it could be otherwise.
- */
- auth_alg = IPMI_AUTH_RAKP_NONE;
- integrity_alg = IPMI_INTEGRITY_NONE;
- crypt_alg = IPMI_CRYPT_NONE;
-
- while (((cipher_suite_data[offset] & 0xC0) != 0xC0) &&
- ((cipher_suite_data_length - offset) > 0))
- {
- switch (cipher_suite_data[offset] & 0xC0)
- {
- case 0x00:
- /* Authentication algorithm specifier */
- auth_alg = cipher_suite_data[offset++] & 0x3F;
- break;
- case 0x40:
- /* Interity algorithm specifier */
- integrity_alg = cipher_suite_data[offset++] & 0x3F;
- break;
- case 0x80:
- /* Confidentiality algorithm specifier */
- crypt_alg = cipher_suite_data[offset++] & 0x3F;
- break;
- }
- }
- /* We have everything we need to spit out a cipher suite record */
- printf((csv_output? "%d,%s,%s,%s,%s\n" :
- "%-4d %-7s %-15s %-15s %-15s\n"),
- cipher_suite_id,
- iana_string(iana),
- val2str(auth_alg, ipmi_auth_algorithms),
- val2str(integrity_alg, ipmi_integrity_algorithms),
- val2str(crypt_alg, ipmi_encryption_algorithms));
- }
- return 0;
- }
- /**
- * ipmi_get_channel_info
- *
- * returns 0 on success
- * -1 on failure
- *
- */
- int
- ipmi_get_channel_info(struct ipmi_intf *intf, uint8_t channel)
- {
- struct channel_info_t channel_info = {0};
- struct channel_access_t channel_access = {0};
- int ccode = 0;
- channel_info.channel = channel;
- ccode = _ipmi_get_channel_info(intf, &channel_info);
- if (eval_ccode(ccode) != 0) {
- lprintf(LOG_ERR, "Unable to Get Channel Info");
- return (-1);
- }
- printf("Channel 0x%x info:\n", channel_info.channel);
- printf(" Channel Medium Type : %s\n",
- val2str(channel_info.medium,
- ipmi_channel_medium_vals));
- printf(" Channel Protocol Type : %s\n",
- val2str(channel_info.protocol,
- ipmi_channel_protocol_vals));
- printf(" Session Support : ");
- switch (channel_info.session_support) {
- case IPMI_CHANNEL_SESSION_LESS:
- printf("session-less\n");
- break;
- case IPMI_CHANNEL_SESSION_SINGLE:
- printf("single-session\n");
- break;
- case IPMI_CHANNEL_SESSION_MULTI:
- printf("multi-session\n");
- break;
- case IPMI_CHANNEL_SESSION_BASED:
- printf("session-based\n");
- break;
- default:
- printf("unknown\n");
- break;
- }
- printf(" Active Session Count : %d\n",
- channel_info.active_sessions);
- printf(" Protocol Vendor ID : %d\n",
- channel_info.vendor_id[0] |
- channel_info.vendor_id[1] << 8 |
- channel_info.vendor_id[2] << 16);
- /* only proceed if this is LAN channel */
- if (channel_info.medium != IPMI_CHANNEL_MEDIUM_LAN
- && channel_info.medium != IPMI_CHANNEL_MEDIUM_LAN_OTHER) {
- return 0;
- }
- channel_access.channel = channel_info.channel;
- ccode = _ipmi_get_channel_access(intf, &channel_access, 1);
- if (eval_ccode(ccode) != 0) {
- lprintf(LOG_ERR, "Unable to Get Channel Access (volatile)");
- return (-1);
- }
- printf(" Volatile(active) Settings\n");
- printf(" Alerting : %sabled\n",
- (channel_access.alerting) ? "dis" : "en");
- printf(" Per-message Auth : %sabled\n",
- (channel_access.per_message_auth) ? "dis" : "en");
- printf(" User Level Auth : %sabled\n",
- (channel_access.user_level_auth) ? "dis" : "en");
- printf(" Access Mode : ");
- switch (channel_access.access_mode) {
- case 0:
- printf("disabled\n");
- break;
- case 1:
- printf("pre-boot only\n");
- break;
- case 2:
- printf("always available\n");
- break;
- case 3:
- printf("shared\n");
- break;
- default:
- printf("unknown\n");
- break;
- }
- memset(&channel_access, 0, sizeof(channel_access));
- channel_access.channel = channel_info.channel;
- /* get non-volatile settings */
- ccode = _ipmi_get_channel_access(intf, &channel_access, 0);
- if (eval_ccode(ccode) != 0) {
- lprintf(LOG_ERR, "Unable to Get Channel Access (non-volatile)");
- return (-1);
- }
- printf(" Non-Volatile Settings\n");
- printf(" Alerting : %sabled\n",
- (channel_access.alerting) ? "dis" : "en");
- printf(" Per-message Auth : %sabled\n",
- (channel_access.per_message_auth) ? "dis" : "en");
- printf(" User Level Auth : %sabled\n",
- (channel_access.user_level_auth) ? "dis" : "en");
- printf(" Access Mode : ");
- switch (channel_access.access_mode) {
- case 0:
- printf("disabled\n");
- break;
- case 1:
- printf("pre-boot only\n");
- break;
- case 2:
- printf("always available\n");
- break;
- case 3:
- printf("shared\n");
- break;
- default:
- printf("unknown\n");
- break;
- }
- return 0;
- }
- /* ipmi_get_channel_medium - Return Medium of given IPMI Channel.
- *
- * @channel - IPMI Channel
- *
- * returns - IPMI Channel Medium, IPMI_CHANNEL_MEDIUM_RESERVED if ccode > 0,
- * 0 on error.
- */
- uint8_t
- ipmi_get_channel_medium(struct ipmi_intf *intf, uint8_t channel)
- {
- struct channel_info_t channel_info = {0};
- int ccode = 0;
- channel_info.channel = channel;
- ccode = _ipmi_get_channel_info(intf, &channel_info);
- if (ccode == 0xCC) {
- return IPMI_CHANNEL_MEDIUM_RESERVED;
- } else if (ccode < 0 && eval_ccode(ccode) != 0) {
- return 0;
- } else if (ccode > 0) {
- lprintf(LOG_ERR, "Get Channel Info command failed: %s",
- val2str(ccode, completion_code_vals));
- return IPMI_CHANNEL_MEDIUM_RESERVED;
- }
- lprintf(LOG_DEBUG, "Channel type: %s",
- val2str(channel_info.medium, ipmi_channel_medium_vals));
- return channel_info.medium;
- }
- /* ipmi_get_user_access - Get User Access for given Channel and User or Users.
- *
- * @intf - IPMI interface
- * @channel - IPMI Channel we're getting access for
- * @user_id - User ID. If 0 is passed, all IPMI users will be listed
- *
- * returns - 0 on success, (-1) on error
- */
- static int
- ipmi_get_user_access(struct ipmi_intf *intf, uint8_t channel, uint8_t user_id)
- {
- struct user_access_t user_access;
- struct user_name_t user_name;
- int ccode = 0;
- int curr_uid;
- int init = 1;
- int max_uid = 0;
- curr_uid = user_id ? user_id : 1;
- do {
- memset(&user_access, 0, sizeof(user_access));
- user_access.channel = channel;
- user_access.user_id = curr_uid;
- ccode = _ipmi_get_user_access(intf, &user_access);
- if (eval_ccode(ccode) != 0) {
- lprintf(LOG_ERR,
- "Unable to Get User Access (channel %d id %d)",
- channel, curr_uid);
- return (-1);
- }
- memset(&user_name, 0, sizeof(user_name));
- user_name.user_id = curr_uid;
- ccode = _ipmi_get_user_name(intf, &user_name);
- if (ccode == 0xCC) {
- user_name.user_id = curr_uid;
- memset(&user_name.user_name, '\0', 17);
- } else if (eval_ccode(ccode) != 0) {
- lprintf(LOG_ERR, "Unable to Get User Name (id %d)", curr_uid);
- return (-1);
- }
- if (init) {
- printf("Maximum User IDs : %d\n", user_access.max_user_ids);
- printf("Enabled User IDs : %d\n", user_access.enabled_user_ids);
- max_uid = user_access.max_user_ids;
- init = 0;
- }
- printf("\n");
- printf("User ID : %d\n", curr_uid);
- printf("User Name : %s\n", user_name.user_name);
- printf("Fixed Name : %s\n",
- (curr_uid <= user_access.fixed_user_ids) ? "Yes" : "No");
- printf("Access Available : %s\n",
- (user_access.callin_callback) ? "callback" : "call-in / callback");
- printf("Link Authentication : %sabled\n",
- (user_access.link_auth) ? "en" : "dis");
- printf("IPMI Messaging : %sabled\n",
- (user_access.ipmi_messaging) ? "en" : "dis");
- printf("Privilege Level : %s\n",
- val2str(user_access.privilege_limit, ipmi_privlvl_vals));
- printf("Enable Status : %s\n",
- val2str(user_access.enable_status, ipmi_user_enable_status_vals));
- curr_uid ++;
- } while (!user_id && curr_uid <= max_uid);
- return 0;
- }
- /* ipmi_set_user_access - Query BMC for current Channel ACLs, parse CLI args
- * and update current ACLs.
- *
- * returns - 0 on success, (-1) on error
- */
- int
- ipmi_set_user_access(struct ipmi_intf *intf, int argc, char **argv)
- {
- struct user_access_t user_access = {0};
- int ccode = 0;
- int i = 0;
- uint8_t channel = 0;
- uint8_t priv = 0;
- uint8_t user_id = 0;
- if (argc > 0 && strncmp(argv[0], "help", 4) == 0) {
- printf_channel_usage();
- return 0;
- } else if (argc < 3) {
- lprintf(LOG_ERR, "Not enough parameters given.");
- printf_channel_usage();
- return (-1);
- }
- if (is_ipmi_channel_num(argv[0], &channel) != 0
- || is_ipmi_user_id(argv[1], &user_id) != 0) {
- return (-1);
- }
- user_access.channel = channel;
- user_access.user_id = user_id;
- ccode = _ipmi_get_user_access(intf, &user_access);
- if (eval_ccode(ccode) != 0) {
- lprintf(LOG_ERR,
- "Unable to Get User Access (channel %d id %d)",
- channel, user_id);
- return (-1);
- }
- for (i = 2; i < argc; i ++) {
- if (strncmp(argv[i], "callin=", 7) == 0) {
- if (strncmp(argv[i] + 7, "off", 3) == 0) {
- user_access.callin_callback = 1;
- } else {
- user_access.callin_callback = 0;
- }
- } else if (strncmp(argv[i], "link=", 5) == 0) {
- if (strncmp(argv[i] + 5, "off", 3) == 0) {
- user_access.link_auth = 0;
- } else {
- user_access.link_auth = 1;
- }
- } else if (strncmp(argv[i], "ipmi=", 5) == 0) {
- if (strncmp(argv[i] + 5, "off", 3) == 0) {
- user_access.ipmi_messaging = 0;
- } else {
- user_access.ipmi_messaging = 1;
- }
- } else if (strncmp(argv[i], "privilege=", 10) == 0) {
- if (str2uchar(argv[i] + 10, &priv) != 0) {
- lprintf(LOG_ERR,
- "Numeric value expected, but '%s' given.",
- argv[i] + 10);
- return (-1);
- }
- user_access.privilege_limit = priv;
- } else {
- lprintf(LOG_ERR, "Invalid option: %s\n", argv[i]);
- return (-1);
- }
- }
- ccode = _ipmi_set_user_access(intf, &user_access, 0);
- if (eval_ccode(ccode) != 0) {
- lprintf(LOG_ERR,
- "Unable to Set User Access (channel %d id %d)",
- channel, user_id);
- return (-1);
- }
- printf("Set User Access (channel %d id %d) successful.\n",
- channel, user_id);
- return 0;
- }
- int
- ipmi_channel_main(struct ipmi_intf *intf, int argc, char **argv)
- {
- int retval = 0;
- uint8_t channel;
- uint8_t priv = 0;
- if (argc < 1) {
- lprintf(LOG_ERR, "Not enough parameters given.");
- printf_channel_usage();
- return (-1);
- } else if (strncmp(argv[0], "help", 4) == 0) {
- printf_channel_usage();
- return 0;
- } else if (strncmp(argv[0], "authcap", 7) == 0) {
- if (argc != 3) {
- printf_channel_usage();
- return (-1);
- }
- if (is_ipmi_channel_num(argv[1], &channel) != 0
- || is_ipmi_user_priv_limit(argv[2], &priv) != 0) {
- return (-1);
- }
- retval = ipmi_get_channel_auth_cap(intf, channel, priv);
- } else if (strncmp(argv[0], "getaccess", 10) == 0) {
- uint8_t user_id = 0;
- if ((argc < 2) || (argc > 3)) {
- lprintf(LOG_ERR, "Not enough parameters given.");
- printf_channel_usage();
- return (-1);
- }
- if (is_ipmi_channel_num(argv[1], &channel) != 0) {
- return (-1);
- }
- if (argc == 3) {
- if (is_ipmi_user_id(argv[2], &user_id) != 0) {
- return (-1);
- }
- }
- retval = ipmi_get_user_access(intf, channel, user_id);
- } else if (strncmp(argv[0], "setaccess", 9) == 0) {
- return ipmi_set_user_access(intf, (argc - 1), &(argv[1]));
- } else if (strncmp(argv[0], "info", 4) == 0) {
- channel = 0xE;
- if (argc > 2) {
- printf_channel_usage();
- return (-1);
- }
- if (argc == 2) {
- if (is_ipmi_channel_num(argv[1], &channel) != 0) {
- return (-1);
- }
- }
- retval = ipmi_get_channel_info(intf, channel);
- } else if (strncmp(argv[0], "getciphers", 10) == 0) {
- /* channel getciphers <ipmi|sol> [channel] */
- channel = 0xE;
- if ((argc < 2) || (argc > 3) ||
- (strncmp(argv[1], "ipmi", 4) && strncmp(argv[1], "sol", 3))) {
- printf_channel_usage();
- return (-1);
- }
- if (argc == 3) {
- if (is_ipmi_channel_num(argv[2], &channel) != 0) {
- return (-1);
- }
- }
- retval = ipmi_get_channel_cipher_suites(intf,
- argv[1], /* ipmi | sol */
- channel);
- } else {
- lprintf(LOG_ERR, "Invalid CHANNEL command: %s\n", argv[0]);
- printf_channel_usage();
- retval = -1;
- }
- return retval;
- }
- /* printf_channel_usage - print-out help. */
- void
- printf_channel_usage()
- {
- lprintf(LOG_NOTICE,
- "Channel Commands: authcap <channel number> <max privilege>");
- lprintf(LOG_NOTICE,
- " getaccess <channel number> [user id]");
- lprintf(LOG_NOTICE,
- " setaccess <channel number> "
- "<user id> [callin=on|off] [ipmi=on|off] [link=on|off] [privilege=level]");
- lprintf(LOG_NOTICE,
- " info [channel number]");
- lprintf(LOG_NOTICE,
- " getciphers <ipmi | sol> [channel]");
- lprintf(LOG_NOTICE,
- "");
- lprintf(LOG_NOTICE,
- "Possible privilege levels are:");
- lprintf(LOG_NOTICE,
- " 1 Callback level");
- lprintf(LOG_NOTICE,
- " 2 User level");
- lprintf(LOG_NOTICE,
- " 3 Operator level");
- lprintf(LOG_NOTICE,
- " 4 Administrator level");
- lprintf(LOG_NOTICE,
- " 5 OEM Proprietary level");
- lprintf(LOG_NOTICE,
- " 15 No access");
- }
|