Module: Rex::Proto::IPMI

Defined in:
lib/rex/proto/ipmi.rb,
lib/rex/proto/ipmi/rakp2.rb,
lib/rex/proto/ipmi/utils.rb,
lib/rex/proto/ipmi/channel_auth_reply.rb,
lib/rex/proto/ipmi/open_session_reply.rb

Defined Under Namespace

Classes: Channel_Auth_Reply, Open_Session_Reply, RAKP2, Utils

Constant Summary collapse

PAYLOAD_IPMI =

Payload types were identified from xCAT-server source code (IPMI.pm)

0
PAYLOAD_SOL =
1
PAYLOAD_RMCPPLUSOPEN_REQ =
0x10
PAYLOAD_RMCPPLUSOPEN_REP =
0x11
PAYLOAD_RAKP1 =
0x12
PAYLOAD_RAKP2 =
0x13
PAYLOAD_RAKP3 =
0x14
PAYLOAD_RAKP4 =
0x15
RMCP_ERRORS =

Payload types were copied from xCAT-server source code (IPMI.pm)

{
  1 => "Insufficient resources to create new session (wait for existing sessions to timeout)",
  2 => "Invalid Session ID", #this shouldn't occur...
  3 => "Invalid payload type",#shouldn't occur..
  4 => "Invalid authentication algorithm", #if this happens, we need to enhance our mechanism for detecting supported auth algorithms
  5 => "Invalid integrity algorithm", #same as above
  6 => "No matching authentication payload",
  7 => "No matching integrity payload",
  8 => "Inactive Session ID", #this suggests the session was timed out while trying to negotiate, shouldn't happen
  9 => "Invalid role",
  0xa => "Unauthorised role or privilege level requested",
  0xb => "Insufficient resources to create a session at the requested role",
  0xc => "Invalid username length",
  0xd => "Unauthorized name",
  0xe => "Unauthorized GUID",
  0xf => "Invalid integrity check value",
  0x10 => "Invalid confidentiality algorithm",
  0x11 => "No cipher suite match with proposed security algorithms",
  0x12 => "Illegal or unrecognized parameter", #have never observed this, would most likely mean a bug in xCAT or IPMI device
}