| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 1 | #include "channel.hpp" | 
|  | 2 | #include "types.hpp" | 
|  | 3 | #include "transporthandler.hpp" | 
|  | 4 | #include "utils.hpp" | 
| Patrick Venture | c7c1c3c | 2017-11-15 14:29:18 -0800 | [diff] [blame] | 5 | #include "net.hpp" | 
| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 6 |  | 
| Tom Joseph | 7cbe228 | 2018-03-21 21:17:33 +0530 | [diff] [blame] | 7 | #include <fstream> | 
| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 8 | #include <string> | 
|  | 9 | #include <arpa/inet.h> | 
|  | 10 |  | 
|  | 11 | #include <phosphor-logging/log.hpp> | 
|  | 12 | #include <phosphor-logging/elog-errors.hpp> | 
|  | 13 | #include "xyz/openbmc_project/Common/error.hpp" | 
|  | 14 |  | 
| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 15 |  | 
|  | 16 | using namespace phosphor::logging; | 
|  | 17 | using namespace sdbusplus::xyz::openbmc_project::Common::Error; | 
|  | 18 |  | 
|  | 19 | /** @struct GetChannelAccessRequest | 
|  | 20 | * | 
|  | 21 | *  IPMI payload for Get Channel access command request. | 
|  | 22 | */ | 
|  | 23 | struct GetChannelAccessRequest | 
|  | 24 | { | 
|  | 25 | uint8_t channelNumber;      //!< Channel number. | 
|  | 26 | uint8_t volatileSetting;    //!< Get non-volatile or the volatile setting. | 
|  | 27 | } __attribute__((packed)); | 
|  | 28 |  | 
|  | 29 | /** @struct GetChannelAccessResponse | 
|  | 30 | * | 
|  | 31 | *  IPMI payload for Get Channel access command response. | 
|  | 32 | */ | 
|  | 33 | struct GetChannelAccessResponse | 
|  | 34 | { | 
|  | 35 | uint8_t settings;          //!< Channel settings. | 
|  | 36 | uint8_t privilegeLimit;    //!< Channel privilege level limit. | 
|  | 37 | } __attribute__((packed)); | 
|  | 38 |  | 
| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 39 |  | 
|  | 40 | ipmi_ret_t ipmi_get_channel_access(ipmi_netfn_t netfn, ipmi_cmd_t cmd, | 
|  | 41 | ipmi_request_t request, ipmi_response_t response, | 
|  | 42 | ipmi_data_len_t data_len, ipmi_context_t context) | 
|  | 43 | { | 
|  | 44 | auto requestData = reinterpret_cast<const GetChannelAccessRequest*> | 
|  | 45 | (request); | 
|  | 46 | std::vector<uint8_t> outPayload(sizeof(GetChannelAccessResponse)); | 
|  | 47 | auto responseData = reinterpret_cast<GetChannelAccessResponse*> | 
|  | 48 | (outPayload.data()); | 
|  | 49 |  | 
| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 50 | /* | 
|  | 51 | * The value Eh is used as a way to identify the current channel that | 
|  | 52 | * the command is being received from. | 
|  | 53 | */ | 
|  | 54 | constexpr auto channelE = 0x0E; | 
| Patrick Venture | c7c1c3c | 2017-11-15 14:29:18 -0800 | [diff] [blame] | 55 | int channel = requestData->channelNumber; | 
|  | 56 | auto ethdevice = ipmi::network::ChanneltoEthernet(channel); | 
| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 57 |  | 
| Patrick Venture | c7c1c3c | 2017-11-15 14:29:18 -0800 | [diff] [blame] | 58 | if (channel != channelE && ethdevice.empty()) | 
| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 59 | { | 
|  | 60 | *data_len = 0; | 
|  | 61 | return IPMI_CC_INVALID_FIELD_REQUEST; | 
|  | 62 | } | 
|  | 63 |  | 
|  | 64 | /* | 
|  | 65 | * [7:6] - reserved | 
|  | 66 | * [5]   - 1b = Alerting disabled | 
|  | 67 | * [4]   - 1b = per message authentication disabled | 
|  | 68 | * [3]   - 0b = User level authentication enabled | 
|  | 69 | * [2:0] - 2h = always available | 
|  | 70 | */ | 
|  | 71 | constexpr auto channelSetting = 0x32; | 
|  | 72 |  | 
|  | 73 | responseData->settings = channelSetting; | 
|  | 74 | //Defaulting the channel privilege to administrator level. | 
|  | 75 | responseData->privilegeLimit = PRIVILEGE_ADMIN; | 
|  | 76 |  | 
|  | 77 | *data_len = outPayload.size(); | 
|  | 78 | memcpy(response, outPayload.data(), *data_len); | 
|  | 79 |  | 
|  | 80 | return IPMI_CC_OK; | 
|  | 81 | } | 
|  | 82 |  | 
|  | 83 | // ATTENTION: This ipmi function is very hardcoded on purpose | 
|  | 84 | // OpenBMC does not fully support IPMI.  This command is useful | 
|  | 85 | // to have around because it enables testing of interfaces with | 
|  | 86 | // the IPMI tool. | 
|  | 87 | #define GET_CHANNEL_INFO_CHANNEL_OFFSET 0 | 
|  | 88 | // IPMI Table 6-2 | 
|  | 89 | #define IPMI_CHANNEL_TYPE_IPMB 1 | 
|  | 90 | // IPMI Table 6-3 | 
|  | 91 | #define IPMI_CHANNEL_MEDIUM_TYPE_OTHER 6 | 
|  | 92 |  | 
|  | 93 | ipmi_ret_t ipmi_app_channel_info(ipmi_netfn_t netfn, ipmi_cmd_t cmd, | 
|  | 94 | ipmi_request_t request, ipmi_response_t response, | 
|  | 95 | ipmi_data_len_t data_len, ipmi_context_t context) | 
|  | 96 | { | 
|  | 97 | ipmi_ret_t rc = IPMI_CC_OK; | 
|  | 98 | uint8_t resp[] = { | 
|  | 99 | 1, | 
|  | 100 | IPMI_CHANNEL_MEDIUM_TYPE_OTHER, | 
|  | 101 | IPMI_CHANNEL_TYPE_IPMB, | 
|  | 102 | 1,0x41,0xA7,0x00,0,0}; | 
|  | 103 | uint8_t *p = (uint8_t*) request; | 
| Patrick Venture | c7c1c3c | 2017-11-15 14:29:18 -0800 | [diff] [blame] | 104 | int channel = (*p) & CHANNEL_MASK; | 
|  | 105 | std::string ethdevice = ipmi::network::ChanneltoEthernet(channel); | 
| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 106 |  | 
| Patrick Venture | c7c1c3c | 2017-11-15 14:29:18 -0800 | [diff] [blame] | 107 | // The supported channels numbers are those which are configured. | 
| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 108 | // Channel Number E is used as way to identify the current channel | 
|  | 109 | // that the command is being is received from. | 
| Patrick Venture | c7c1c3c | 2017-11-15 14:29:18 -0800 | [diff] [blame] | 110 | if (channel != 0xe && ethdevice.empty()) { | 
| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 111 | rc = IPMI_CC_PARM_OUT_OF_RANGE; | 
|  | 112 | *data_len = 0; | 
| Patrick Venture | c7c1c3c | 2017-11-15 14:29:18 -0800 | [diff] [blame] | 113 | } else { | 
|  | 114 | *data_len = sizeof(resp); | 
|  | 115 | memcpy(response, resp, *data_len); | 
| Patrick Venture | 5794fcf | 2017-10-26 11:11:14 -0700 | [diff] [blame] | 116 | } | 
|  | 117 |  | 
|  | 118 | return rc; | 
|  | 119 | } | 
| Tom Joseph | 7cbe228 | 2018-03-21 21:17:33 +0530 | [diff] [blame] | 120 |  | 
|  | 121 | namespace cipher | 
|  | 122 | { | 
|  | 123 |  | 
|  | 124 | /** @brief Get the supported Cipher records | 
|  | 125 | * | 
|  | 126 | * The cipher records are read from the JSON file and converted into cipher | 
|  | 127 | * suite record format mentioned in the IPMI specification. The records can be | 
|  | 128 | * either OEM or standard cipher. Each json entry is parsed and converted into | 
|  | 129 | * the cipher record format and pushed into the vector. | 
|  | 130 | * | 
|  | 131 | * @return vector containing all the cipher suite records. | 
|  | 132 | * | 
|  | 133 | */ | 
|  | 134 | std::vector<uint8_t> getCipherRecords() | 
|  | 135 | { | 
|  | 136 | std::vector<uint8_t> records; | 
|  | 137 |  | 
|  | 138 | std::ifstream jsonFile(configFile); | 
|  | 139 | if (!jsonFile.is_open()) | 
|  | 140 | { | 
|  | 141 | log<level::ERR>("Channel Cipher suites file not found"); | 
|  | 142 | elog<InternalFailure>(); | 
|  | 143 | } | 
|  | 144 |  | 
|  | 145 | auto data = Json::parse(jsonFile, nullptr, false); | 
|  | 146 | if (data.is_discarded()) | 
|  | 147 | { | 
|  | 148 | log<level::ERR>("Parsing channel cipher suites JSON failed"); | 
|  | 149 | elog<InternalFailure>(); | 
|  | 150 | } | 
|  | 151 |  | 
|  | 152 | for (const auto& record : data) | 
|  | 153 | { | 
|  | 154 | if (record.find(oem) != record.end()) | 
|  | 155 | { | 
|  | 156 | // OEM cipher suite - 0xC1 | 
|  | 157 | records.push_back(oemCipherSuite); | 
|  | 158 | // Cipher Suite ID | 
|  | 159 | records.push_back(record.value(cipher, 0)); | 
|  | 160 | // OEM IANA - 3 bytes | 
|  | 161 | records.push_back(record.value(oem, 0)); | 
|  | 162 | records.push_back(record.value(oem, 0) >> 8); | 
|  | 163 | records.push_back(record.value(oem, 0) >> 16); | 
|  | 164 |  | 
|  | 165 | } | 
|  | 166 | else | 
|  | 167 | { | 
|  | 168 | // OEM cipher suite - 0xC0 | 
|  | 169 | records.push_back(stdCipherSuite); | 
|  | 170 | // Cipher Suite ID | 
|  | 171 | records.push_back(record.value(cipher, 0)); | 
|  | 172 | } | 
|  | 173 |  | 
|  | 174 | // Authentication algorithm number | 
|  | 175 | records.push_back(record.value(auth, 0)); | 
|  | 176 | // Integrity algorithm number | 
|  | 177 | records.push_back(record.value(integrity, 0) | integrityTag); | 
|  | 178 | // Confidentiality algorithm number | 
|  | 179 | records.push_back(record.value(conf, 0) | confTag); | 
|  | 180 | } | 
|  | 181 |  | 
|  | 182 | return records; | 
|  | 183 | } | 
|  | 184 |  | 
|  | 185 | } //namespace cipher | 
|  | 186 |  | 
|  | 187 | ipmi_ret_t getChannelCipherSuites(ipmi_netfn_t netfn, | 
|  | 188 | ipmi_cmd_t cmd, | 
|  | 189 | ipmi_request_t request, | 
|  | 190 | ipmi_response_t response, | 
|  | 191 | ipmi_data_len_t data_len, | 
|  | 192 | ipmi_context_t context) | 
|  | 193 | { | 
|  | 194 | static std::vector<uint8_t> records; | 
|  | 195 | static auto recordInit = false; | 
|  | 196 |  | 
|  | 197 | auto requestData = | 
|  | 198 | reinterpret_cast<const GetChannelCipherRequest*>(request); | 
|  | 199 |  | 
|  | 200 |  | 
|  | 201 | if (*data_len < sizeof(GetChannelCipherRequest)) | 
|  | 202 | { | 
|  | 203 | *data_len = 0; | 
|  | 204 | return IPMI_CC_REQ_DATA_LEN_INVALID; | 
|  | 205 | } | 
|  | 206 |  | 
|  | 207 | *data_len = 0; | 
|  | 208 |  | 
|  | 209 | // Support only for list algorithms by cipher suite | 
|  | 210 | if (cipher::listCipherSuite != | 
|  | 211 | (requestData->listIndex & cipher::listTypeMask)) | 
|  | 212 | { | 
|  | 213 | return IPMI_CC_INVALID_FIELD_REQUEST; | 
|  | 214 | } | 
|  | 215 |  | 
|  | 216 | if (!recordInit) | 
|  | 217 | { | 
|  | 218 | try | 
|  | 219 | { | 
|  | 220 | records = cipher::getCipherRecords(); | 
|  | 221 | recordInit = true; | 
|  | 222 | } | 
|  | 223 | catch (const std::exception &e) | 
|  | 224 | { | 
|  | 225 | return IPMI_CC_UNSPECIFIED_ERROR; | 
|  | 226 | } | 
|  | 227 | } | 
|  | 228 |  | 
|  | 229 | // List index(00h-3Fh), 0h selects the first set of 16, 1h selects the next | 
|  | 230 | // set of 16 and so on. | 
|  | 231 | auto index = static_cast<size_t>( | 
|  | 232 | requestData->listIndex & cipher::listIndexMask); | 
|  | 233 |  | 
|  | 234 | // Calculate the number of record data bytes to be returned. | 
|  | 235 | auto start = std::min(index * cipher::respSize, records.size()); | 
|  | 236 | auto end = std::min((index * cipher::respSize) + cipher::respSize, | 
|  | 237 | records.size()); | 
|  | 238 | auto size = end - start; | 
|  | 239 |  | 
|  | 240 | auto responseData = reinterpret_cast<GetChannelCipherRespHeader*> | 
|  | 241 | (response); | 
|  | 242 | responseData->channelNumber = cipher::defaultChannelNumber; | 
|  | 243 |  | 
|  | 244 | if (!size) | 
|  | 245 | { | 
|  | 246 | *data_len = sizeof(GetChannelCipherRespHeader); | 
|  | 247 | } | 
|  | 248 | else | 
|  | 249 | { | 
|  | 250 | std::copy_n(records.data() + start, | 
|  | 251 | size, | 
|  | 252 | static_cast<uint8_t*>(response) + 1); | 
|  | 253 | *data_len = size + sizeof(GetChannelCipherRespHeader); | 
|  | 254 | } | 
|  | 255 |  | 
|  | 256 | return IPMI_CC_OK; | 
|  | 257 | } |