e9ef0e
From 260293c0ee5a268bc7fc1483e5304546745122a6 Mon Sep 17 00:00:00 2001
e9ef0e
From: Vernon Mauery <vernon.mauery@intel.com>
e9ef0e
Date: Mon, 9 Apr 2018 12:28:57 -0700
e9ef0e
Subject: [PATCH] lanplus: Auto-select 'best' cipher suite available
e9ef0e
e9ef0e
Current cipher suites could be ranked as this:
e9ef0e
  17 > 3 >> all the rest
e9ef0e
e9ef0e
Cherry-picked-from: 7772254b62826b894ca629df8c597030a98f4f72
e9ef0e
Cherry-picked-from: f9c699c712f884c82fc1a62f1f61a8d597ac0cfd
e9ef0e
e9ef0e
Also fetched some functions/macros for helper.h
e9ef0e
e9ef0e
Equals to getting include/ipmitool/helper.h changes from commits:
e9ef0e
(oldest first)
e9ef0e
e9ef0e
  6c00d44 mc: watchdog get: Update to match IPMI 2.0 spec
e9ef0e
  e8e94d8 mc: watchdog set: Refactor to reduce complexity
e9ef0e
  0310208 mc: Code refactor to reduce copy-paste ratio
e9ef0e
  249e092 general: Make byteswapping arch-independent
e9ef0e
  5491b12 refix 249e0929: Fix byteswapping helpers
e9ef0e
  bb1a4cc Refactoring. Improve code reuse ratio.
e9ef0e
---
e9ef0e
 include/ipmitool/helper.h       |  58 ++++++++
e9ef0e
 include/ipmitool/ipmi_channel.h |  47 +++++++
e9ef0e
 include/ipmitool/ipmi_intf.h    |  39 ++++-
e9ef0e
 lib/ipmi_channel.c              | 242 +++++++++++++++-----------------
e9ef0e
 lib/ipmi_main.c                 |  23 +--
e9ef0e
 src/plugins/ipmi_intf.c         |   5 +-
e9ef0e
 src/plugins/lanplus/lanplus.c   | 114 +++++++++++----
e9ef0e
 7 files changed, 360 insertions(+), 168 deletions(-)
e9ef0e
e9ef0e
diff --git a/include/ipmitool/helper.h b/include/ipmitool/helper.h
e9ef0e
index c53736f..6a2e5f4 100644
e9ef0e
--- a/include/ipmitool/helper.h
e9ef0e
+++ b/include/ipmitool/helper.h
e9ef0e
@@ -38,6 +38,8 @@
e9ef0e
 #include <stdio.h>
e9ef0e
 #include <string.h>
e9ef0e
 
e9ef0e
+#define ARRAY_SIZE(a) (sizeof(a) / sizeof(a[0]))
e9ef0e
+
e9ef0e
 #ifndef TRUE
e9ef0e
 #define TRUE    1
e9ef0e
 #endif
e9ef0e
@@ -111,6 +113,62 @@ FILE * ipmi_open_file(const char * file, int rw);
e9ef0e
 void ipmi_start_daemon(struct ipmi_intf *intf);
e9ef0e
 uint16_t ipmi_get_oem_id(struct ipmi_intf *intf);
e9ef0e
 
e9ef0e
+#define IS_SET(v, b) ((v) & (1 << (b)))
e9ef0e
+
e9ef0e
+/* le16toh(), hto16le(), et. al. don't exist for Windows or Apple */
e9ef0e
+/* For portability, let's simply define our own versions here */
e9ef0e
+
e9ef0e
+/* IPMI is always little-endian */
e9ef0e
+static inline uint16_t ipmi16toh(void *ipmi16)
e9ef0e
+{
e9ef0e
+	uint8_t *ipmi = (uint8_t *)ipmi16;
e9ef0e
+	uint16_t h;
e9ef0e
+
e9ef0e
+	h = ipmi[1] << 8; /* MSB */
e9ef0e
+	h |= ipmi[0]; /* LSB */
e9ef0e
+
e9ef0e
+	return h;
e9ef0e
+}
e9ef0e
+
e9ef0e
+static inline void htoipmi16(uint16_t h, uint8_t *ipmi)
e9ef0e
+{
e9ef0e
+	ipmi[0] = h & 0xFF; /* LSB */
e9ef0e
+	ipmi[1] = h >> 8; /* MSB */
e9ef0e
+}
e9ef0e
+
e9ef0e
+static inline uint32_t ipmi24toh(void *ipmi24)
e9ef0e
+{
e9ef0e
+	uint8_t *ipmi = (uint8_t *)ipmi24;
e9ef0e
+	uint32_t h = 0;
e9ef0e
+
e9ef0e
+	h = ipmi[2] << 16; /* MSB */
e9ef0e
+	h |= ipmi[1] << 8;
e9ef0e
+	h |= ipmi[0]; /* LSB */
e9ef0e
+
e9ef0e
+	return h;
e9ef0e
+}
e9ef0e
+
e9ef0e
+static inline uint32_t ipmi32toh(void *ipmi32)
e9ef0e
+{
e9ef0e
+	uint8_t *ipmi = ipmi32;
e9ef0e
+	uint32_t h;
e9ef0e
+
e9ef0e
+	h = ipmi[3] << 24; /* MSB */
e9ef0e
+	h |= ipmi[2] << 16;
e9ef0e
+	h |= ipmi[1] << 8;
e9ef0e
+	h |= ipmi[0]; /* LSB */
e9ef0e
+
e9ef0e
+	return h;
e9ef0e
+}
e9ef0e
+
e9ef0e
+static inline void htoipmi32(uint32_t h, uint8_t *ipmi)
e9ef0e
+{
e9ef0e
+	ipmi[0] = h & 0xFF; /* LSB */
e9ef0e
+	ipmi[1] = (h >> 8) & 0xFF;
e9ef0e
+	ipmi[2] = (h >> 16) & 0xFF;
e9ef0e
+	ipmi[3] = (h >> 24) & 0xFF; /* MSB */
e9ef0e
+}
e9ef0e
+
e9ef0e
 #define ipmi_open_file_read(file)	ipmi_open_file(file, 0)
e9ef0e
 #define ipmi_open_file_write(file)	ipmi_open_file(file, 1)
e9ef0e
 
e9ef0e
diff --git a/include/ipmitool/ipmi_channel.h b/include/ipmitool/ipmi_channel.h
e9ef0e
index 3ade2d5..324c0bb 100644
e9ef0e
--- a/include/ipmitool/ipmi_channel.h
e9ef0e
+++ b/include/ipmitool/ipmi_channel.h
e9ef0e
@@ -37,6 +37,7 @@
e9ef0e
 # include <config.h>
e9ef0e
 #endif
e9ef0e
 #include <ipmitool/ipmi.h>
e9ef0e
+#include <ipmitool/ipmi_intf.h>
e9ef0e
 
e9ef0e
 
e9ef0e
 #define IPMI_GET_CHANNEL_AUTH_CAP      0x38
e9ef0e
@@ -81,6 +82,50 @@ struct channel_access_t {
e9ef0e
 	uint8_t user_level_auth;
e9ef0e
 };
e9ef0e
 
e9ef0e
+/*
e9ef0e
+ * The Cipher Suite Record Format from table 22-18 of the IPMI v2.0 spec
e9ef0e
+ */
e9ef0e
+enum cipher_suite_format_tag {
e9ef0e
+	STANDARD_CIPHER_SUITE = 0xc0,
e9ef0e
+	OEM_CIPHER_SUITE = 0xc1,
e9ef0e
+};
e9ef0e
+#ifdef HAVE_PRAGMA_PACK
e9ef0e
+#pragma pack(1)
e9ef0e
+#endif
e9ef0e
+struct std_cipher_suite_record_t {
e9ef0e
+	uint8_t start_of_record;
e9ef0e
+	uint8_t cipher_suite_id;
e9ef0e
+	uint8_t auth_alg;
e9ef0e
+	uint8_t integrity_alg;
e9ef0e
+	uint8_t crypt_alg;
e9ef0e
+} ATTRIBUTE_PACKING;
e9ef0e
+struct oem_cipher_suite_record_t {
e9ef0e
+	uint8_t start_of_record;
e9ef0e
+	uint8_t cipher_suite_id;
e9ef0e
+	uint8_t iana[3];
e9ef0e
+	uint8_t auth_alg;
e9ef0e
+	uint8_t integrity_alg;
e9ef0e
+	uint8_t crypt_alg;
e9ef0e
+} ATTRIBUTE_PACKING;
e9ef0e
+#ifdef HAVE_PRAGMA_PACK
e9ef0e
+#pragma pack(0)
e9ef0e
+#endif
e9ef0e
+#define CIPHER_ALG_MASK 0x3f
e9ef0e
+#define MAX_CIPHER_SUITE_RECORD_OFFSET 0x40
e9ef0e
+#define MAX_CIPHER_SUITE_DATA_LEN 0x10
e9ef0e
+#define LIST_ALGORITHMS_BY_CIPHER_SUITE 0x80
e9ef0e
+
e9ef0e
+/* Below is the theoretical maximum number of cipher suites that could be
e9ef0e
+ * reported by a BMC. That is with the Get Channel Cipher Suites Command, at 16
e9ef0e
+ * bytes at a time and 0x40 requests, it can report 1024 bytes, which is about
e9ef0e
+ * 204 standard records or 128 OEM records. Really, we probably don't need more
e9ef0e
+ * than about 20, which is the full set of standard records plus a few OEM
e9ef0e
+ * records.
e9ef0e
+ */
e9ef0e
+#define MAX_CIPHER_SUITE_COUNT (MAX_CIPHER_SUITE_RECORD_OFFSET * \
e9ef0e
+		MAX_CIPHER_SUITE_DATA_LEN / \
e9ef0e
+		sizeof(struct std_cipher_suite_record_t))
e9ef0e
+
e9ef0e
 /*
e9ef0e
  * The Get Authentication Capabilities response structure
e9ef0e
  * From table 22-15 of the IPMI v2.0 spec
e9ef0e
@@ -135,6 +180,8 @@ struct get_channel_auth_cap_rsp {
e9ef0e
 int _ipmi_get_channel_access(struct ipmi_intf *intf,
e9ef0e
 		struct channel_access_t *channel_access,
e9ef0e
 		uint8_t get_volatile_settings);
e9ef0e
+int ipmi_get_channel_cipher_suites(struct ipmi_intf *intf, const char *payload_type,
e9ef0e
+		uint8_t channel, struct cipher_suite_info *suites, size_t *count);
e9ef0e
 int _ipmi_get_channel_info(struct ipmi_intf *intf,
e9ef0e
         struct channel_info_t *channel_info);
e9ef0e
 int _ipmi_set_channel_access(struct ipmi_intf *intf,
e9ef0e
diff --git a/include/ipmitool/ipmi_intf.h b/include/ipmitool/ipmi_intf.h
e9ef0e
index 0b8c64b..7a07d66 100644
e9ef0e
--- a/include/ipmitool/ipmi_intf.h
e9ef0e
+++ b/include/ipmitool/ipmi_intf.h
e9ef0e
@@ -61,13 +61,45 @@ enum LANPLUS_SESSION_STATE {
e9ef0e
 #define IPMI_AUTHCODE_BUFFER_SIZE 20
e9ef0e
 #define IPMI_SIK_BUFFER_SIZE      IPMI_MAX_MD_SIZE
e9ef0e
 
e9ef0e
+enum cipher_suite_ids {
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_0 = 0,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_1 = 1,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_2 = 2,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_3 = 3,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_4 = 4,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_5 = 5,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_6 = 6,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_7 = 7,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_8 = 8,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_9 = 9,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_10 = 10,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_11 = 11,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_12 = 12,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_13 = 13,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_14 = 14,
e9ef0e
+#ifdef HAVE_CRYPTO_SHA256
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_15 = 15,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_16 = 16,
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_17 = 17,
e9ef0e
+#endif /* HAVE_CRYPTO_SHA256 */
e9ef0e
+	IPMI_LANPLUS_CIPHER_SUITE_RESERVED = 0xff,
e9ef0e
+};
e9ef0e
+
e9ef0e
+struct cipher_suite_info {
e9ef0e
+	enum cipher_suite_ids cipher_suite_id;
e9ef0e
+	uint8_t auth_alg;
e9ef0e
+	uint8_t integrity_alg;
e9ef0e
+	uint8_t crypt_alg;
e9ef0e
+	uint32_t iana;
e9ef0e
+};
e9ef0e
+
e9ef0e
 struct ipmi_session_params {
e9ef0e
 	char * hostname;
e9ef0e
 	uint8_t username[17];
e9ef0e
 	uint8_t authcode_set[IPMI_AUTHCODE_BUFFER_SIZE + 1];
e9ef0e
 	uint8_t authtype_set;
e9ef0e
 	uint8_t privlvl;
e9ef0e
-	uint8_t cipher_suite_id;
e9ef0e
+	enum cipher_suite_ids cipher_suite_id;
e9ef0e
 	char sol_escape_char;
e9ef0e
 	int password;
e9ef0e
 	int port;
e9ef0e
@@ -217,7 +249,10 @@ void ipmi_intf_session_set_username(struct ipmi_intf * intf, char * username);
e9ef0e
 void ipmi_intf_session_set_password(struct ipmi_intf * intf, char * password);
e9ef0e
 void ipmi_intf_session_set_privlvl(struct ipmi_intf * intf, uint8_t privlvl);
e9ef0e
 void ipmi_intf_session_set_lookupbit(struct ipmi_intf * intf, uint8_t lookupbit);
e9ef0e
-void ipmi_intf_session_set_cipher_suite_id(struct ipmi_intf * intf, uint8_t cipher_suite_id);
e9ef0e
+#ifdef IPMI_INTF_LANPLUS
e9ef0e
+void ipmi_intf_session_set_cipher_suite_id(struct ipmi_intf * intf,
e9ef0e
+		enum cipher_suite_ids cipher_suite_id);
e9ef0e
+#endif /* IPMI_INTF_LANPLUS */
e9ef0e
 void ipmi_intf_session_set_sol_escape_char(struct ipmi_intf * intf, char sol_escape_char);
e9ef0e
 void ipmi_intf_session_set_kgkey(struct ipmi_intf *intf, const uint8_t *kgkey);
e9ef0e
 void ipmi_intf_session_set_port(struct ipmi_intf * intf, int port);
e9ef0e
diff --git a/lib/ipmi_channel.c b/lib/ipmi_channel.c
e9ef0e
index e1fc75f..3ae3104 100644
e9ef0e
--- a/lib/ipmi_channel.c
e9ef0e
+++ b/lib/ipmi_channel.c
e9ef0e
@@ -342,86 +342,116 @@ ipmi_get_channel_auth_cap(struct ipmi_intf *intf, uint8_t channel, uint8_t priv)
e9ef0e
 	return 0;
e9ef0e
 }
e9ef0e
 
e9ef0e
-static int
e9ef0e
+static size_t
e9ef0e
+parse_channel_cipher_suite_data(uint8_t *cipher_suite_data, size_t data_len,
e9ef0e
+		struct cipher_suite_info* suites, size_t nr_suites)
e9ef0e
+{
e9ef0e
+	size_t count = 0;
e9ef0e
+	size_t offset = 0;
e9ef0e
+	uint32_t iana;
e9ef0e
+	uint8_t auth_alg, integrity_alg, crypt_alg;
e9ef0e
+	uint8_t cipher_suite_id;
e9ef0e
+
e9ef0e
+	memset(suites, 0, sizeof(*suites) * nr_suites);
e9ef0e
+
e9ef0e
+	while (offset < data_len && count < nr_suites) {
e9ef0e
+		auth_alg      = IPMI_AUTH_RAKP_NONE;
e9ef0e
+		integrity_alg = IPMI_INTEGRITY_NONE;
e9ef0e
+		crypt_alg     = IPMI_CRYPT_NONE;
e9ef0e
+		if (cipher_suite_data[offset] == STANDARD_CIPHER_SUITE) {
e9ef0e
+			struct std_cipher_suite_record_t *record =
e9ef0e
+				(struct std_cipher_suite_record_t*)(&cipher_suite_data[offset]);
e9ef0e
+			/* standard type */
e9ef0e
+			iana = 0;
e9ef0e
+
e9ef0e
+			/* Verify that we have at least a full record left; id + 3 algs */
e9ef0e
+			if ((data_len - offset) < sizeof(*record)) {
e9ef0e
+				lprintf(LOG_INFO, "Incomplete data record in cipher suite data");
e9ef0e
+				break;
e9ef0e
+			}
e9ef0e
+			cipher_suite_id = record->cipher_suite_id;
e9ef0e
+			auth_alg = CIPHER_ALG_MASK & record->auth_alg;
e9ef0e
+			integrity_alg = CIPHER_ALG_MASK & record->integrity_alg;
e9ef0e
+			crypt_alg = CIPHER_ALG_MASK & record->crypt_alg;
e9ef0e
+			offset += sizeof(*record);
e9ef0e
+		} else if (cipher_suite_data[offset] == OEM_CIPHER_SUITE) {
e9ef0e
+			/* OEM record type */
e9ef0e
+			struct oem_cipher_suite_record_t *record =
e9ef0e
+				(struct oem_cipher_suite_record_t*)(&cipher_suite_data[offset]);
e9ef0e
+			/* Verify that we have at least a full record left
e9ef0e
+			 * id + iana + 3 algs
e9ef0e
+			 */
e9ef0e
+			if ((data_len - offset) < sizeof(*record)) {
e9ef0e
+				lprintf(LOG_INFO, "Incomplete data record in cipher suite data");
e9ef0e
+				break;
e9ef0e
+			}
e9ef0e
+
e9ef0e
+			cipher_suite_id = record->cipher_suite_id;
e9ef0e
+
e9ef0e
+			/* Grab the IANA */
e9ef0e
+			iana = ipmi24toh(record->iana);
e9ef0e
+			auth_alg = CIPHER_ALG_MASK & record->auth_alg;
e9ef0e
+			integrity_alg = CIPHER_ALG_MASK & record->integrity_alg;
e9ef0e
+			crypt_alg = CIPHER_ALG_MASK & record->crypt_alg;
e9ef0e
+			offset += sizeof(*record);
e9ef0e
+		} else {
e9ef0e
+			lprintf(LOG_INFO, "Bad start of record byte in cipher suite data (offset %d, value %x)", offset, cipher_suite_data[offset]);
e9ef0e
+			break;
e9ef0e
+		}
e9ef0e
+		suites[count].cipher_suite_id = cipher_suite_id;
e9ef0e
+		suites[count].iana = iana;
e9ef0e
+		suites[count].auth_alg = auth_alg;
e9ef0e
+		suites[count].integrity_alg = integrity_alg;
e9ef0e
+		suites[count].crypt_alg = crypt_alg;
e9ef0e
+		count++;
e9ef0e
+	}
e9ef0e
+	return count;
e9ef0e
+}
e9ef0e
+
e9ef0e
+int
e9ef0e
 ipmi_get_channel_cipher_suites(struct ipmi_intf *intf, const char *payload_type,
e9ef0e
-		uint8_t channel)
e9ef0e
+		uint8_t channel, struct cipher_suite_info *suites, size_t *count)
e9ef0e
 {
e9ef0e
 	struct ipmi_rs *rsp;
e9ef0e
 	struct ipmi_rq req;
e9ef0e
 
e9ef0e
 	uint8_t rqdata[3];
e9ef0e
-	uint32_t iana;
e9ef0e
-	uint8_t auth_alg, integrity_alg, crypt_alg;
e9ef0e
-	uint8_t cipher_suite_id;
e9ef0e
 	uint8_t list_index = 0;
e9ef0e
 	/* 0x40 sets * 16 bytes per set */
e9ef0e
-	uint8_t cipher_suite_data[1024];
e9ef0e
-	uint16_t offset = 0;
e9ef0e
-	/* how much was returned, total */
e9ef0e
-	uint16_t cipher_suite_data_length = 0;
e9ef0e
+	uint8_t cipher_suite_data[MAX_CIPHER_SUITE_RECORD_OFFSET *
e9ef0e
+		MAX_CIPHER_SUITE_DATA_LEN];
e9ef0e
+	size_t offset = 0;
e9ef0e
+	size_t nr_suites = 0;
e9ef0e
 
e9ef0e
+	if (!suites || !count || !*count)
e9ef0e
+		return -1;
e9ef0e
+
e9ef0e
+	nr_suites = *count;
e9ef0e
+	*count = 0;
e9ef0e
 	memset(cipher_suite_data, 0, sizeof(cipher_suite_data));
e9ef0e
-	
e9ef0e
+
e9ef0e
 	memset(&req, 0, sizeof(req));
e9ef0e
 	req.msg.netfn = IPMI_NETFN_APP;
e9ef0e
 	req.msg.cmd = IPMI_GET_CHANNEL_CIPHER_SUITES;
e9ef0e
 	req.msg.data = rqdata;
e9ef0e
-	req.msg.data_len = 3;
e9ef0e
+	req.msg.data_len = sizeof(rqdata);
e9ef0e
 
e9ef0e
 	rqdata[0] = channel;
e9ef0e
 	rqdata[1] = ((strncmp(payload_type, "ipmi", 4) == 0)? 0: 1);
e9ef0e
-	/* Always ask for cipher suite format */
e9ef0e
-	rqdata[2] = 0x80;
e9ef0e
-
e9ef0e
-	rsp = intf->sendrecv(intf, &req;;
e9ef0e
-	if (rsp == NULL) {
e9ef0e
-		lprintf(LOG_ERR, "Unable to Get Channel Cipher Suites");
e9ef0e
-		return -1;
e9ef0e
-	}
e9ef0e
-	if (rsp->ccode > 0) {
e9ef0e
-		lprintf(LOG_ERR, "Get Channel Cipher Suites failed: %s",
e9ef0e
-			val2str(rsp->ccode, completion_code_vals));
e9ef0e
-		return -1;
e9ef0e
-	}
e9ef0e
-
e9ef0e
-
e9ef0e
-	/*
e9ef0e
-	 * Grab the returned channel number once.  We assume it's the same
e9ef0e
-	 * in future calls.
e9ef0e
-	 */
e9ef0e
-	if (rsp->data_len >= 1) {
e9ef0e
-		channel = rsp->data[0];
e9ef0e
-	}
e9ef0e
-
e9ef0e
-	while ((rsp->data_len > 1) && (rsp->data_len == 17) && (list_index < 0x3F)) {
e9ef0e
-		/*
e9ef0e
-		 * We got back cipher suite data -- store it.
e9ef0e
-		 * printf("copying data to offset %d\n", offset);
e9ef0e
-		 * printbuf(rsp->data + 1, rsp->data_len - 1, "this is the data");
e9ef0e
-		 */
e9ef0e
-		memcpy(cipher_suite_data + offset, rsp->data + 1, rsp->data_len - 1);
e9ef0e
-		offset += rsp->data_len - 1;
e9ef0e
-		
e9ef0e
-		/*
e9ef0e
-		 * Increment our list for the next call
e9ef0e
-		 */
e9ef0e
-		++list_index;
e9ef0e
-		rqdata[2] =  (rqdata[2] & 0x80) + list_index; 
e9ef0e
 
e9ef0e
+	do {
e9ef0e
+		/* Always ask for cipher suite format */
e9ef0e
+		rqdata[2] = LIST_ALGORITHMS_BY_CIPHER_SUITE | list_index;
e9ef0e
 		rsp = intf->sendrecv(intf, &req;;
e9ef0e
 		if (rsp == NULL) {
e9ef0e
 			lprintf(LOG_ERR, "Unable to Get Channel Cipher Suites");
e9ef0e
 			return -1;
e9ef0e
 		}
e9ef0e
-		if (rsp->ccode > 0) {
e9ef0e
+		if (rsp->ccode || rsp->data_len < 1) {
e9ef0e
 			lprintf(LOG_ERR, "Get Channel Cipher Suites failed: %s",
e9ef0e
 					val2str(rsp->ccode, completion_code_vals));
e9ef0e
 			return -1;
e9ef0e
 		}
e9ef0e
-	}
e9ef0e
-
e9ef0e
-	/* Copy last chunk */
e9ef0e
-	if(rsp->data_len > 1) {
e9ef0e
 		/*
e9ef0e
 		 * We got back cipher suite data -- store it.
e9ef0e
 		 * printf("copying data to offset %d\n", offset);
e9ef0e
@@ -429,88 +459,46 @@ ipmi_get_channel_cipher_suites(struct ipmi_intf *intf, const char *payload_type,
e9ef0e
 		 */
e9ef0e
 		memcpy(cipher_suite_data + offset, rsp->data + 1, rsp->data_len - 1);
e9ef0e
 		offset += rsp->data_len - 1;
e9ef0e
-	}
e9ef0e
 
e9ef0e
-	/* We can chomp on all our data now. */
e9ef0e
-	cipher_suite_data_length = offset;
e9ef0e
-	offset = 0;
e9ef0e
+		/*
e9ef0e
+		 * Increment our list for the next call
e9ef0e
+		 */
e9ef0e
+		++list_index;
e9ef0e
+	} while ((rsp->data_len == (sizeof(uint8_t) + MAX_CIPHER_SUITE_DATA_LEN)) &&
e9ef0e
+			 (list_index < MAX_CIPHER_SUITE_RECORD_OFFSET));
e9ef0e
 
e9ef0e
-	if (! csv_output) {
e9ef0e
-		printf("ID   IANA    Auth Alg        Integrity Alg   Confidentiality Alg\n");
e9ef0e
-	}
e9ef0e
-	while (offset < cipher_suite_data_length) {
e9ef0e
-		if (cipher_suite_data[offset++] == 0xC0) {
e9ef0e
-			/* standard type */
e9ef0e
-			iana = 0;
e9ef0e
+	*count = parse_channel_cipher_suite_data(cipher_suite_data, offset, suites,
e9ef0e
+	                                         nr_suites);
e9ef0e
+	return 0;
e9ef0e
+}
e9ef0e
 
e9ef0e
-			/* Verify that we have at least a full record left; id + 3 algs */
e9ef0e
-			if ((cipher_suite_data_length - offset) < 4) {
e9ef0e
-				lprintf(LOG_ERR, "Incomplete data record in cipher suite data");
e9ef0e
-				return -1;
e9ef0e
-			}
e9ef0e
-			cipher_suite_id = cipher_suite_data[offset++];
e9ef0e
-		} else if (cipher_suite_data[offset++] == 0xC1) {
e9ef0e
-			/* OEM record type */
e9ef0e
-			/* Verify that we have at least a full record left
e9ef0e
-			 * id + iana + 3 algs
e9ef0e
-			 */
e9ef0e
-			if ((cipher_suite_data_length - offset) < 4) {
e9ef0e
-				lprintf(LOG_ERR, "Incomplete data record in cipher suite data");
e9ef0e
-				return -1;
e9ef0e
-			}
e9ef0e
+static int
e9ef0e
+ipmi_print_channel_cipher_suites(struct ipmi_intf *intf, const char *payload_type,
e9ef0e
+		uint8_t channel)
e9ef0e
+{
e9ef0e
+	int rc;
e9ef0e
+	size_t i = 0;
e9ef0e
+	struct cipher_suite_info suites[MAX_CIPHER_SUITE_COUNT];
e9ef0e
+	size_t nr_suites = sizeof(*suites);
e9ef0e
 
e9ef0e
-			cipher_suite_id = cipher_suite_data[offset++];
e9ef0e
+	rc = ipmi_get_channel_cipher_suites(intf, payload_type, channel,
e9ef0e
+			suites, &nr_suites);
e9ef0e
 
e9ef0e
-			/* Grab the IANA */
e9ef0e
-			iana =
e9ef0e
-				cipher_suite_data[offset]            | 
e9ef0e
-				(cipher_suite_data[offset + 1] << 8) | 
e9ef0e
-				(cipher_suite_data[offset + 2] << 16);
e9ef0e
-			offset += 3;
e9ef0e
-		} else {
e9ef0e
-			lprintf(LOG_ERR, "Bad start of record byte in cipher suite data");
e9ef0e
-			return -1;
e9ef0e
-		}
e9ef0e
+	if (rc < 0)
e9ef0e
+		return rc;
e9ef0e
 
e9ef0e
-		/*
e9ef0e
-		 * Grab the algorithms for this cipher suite.  I guess we can't be
e9ef0e
-		 * sure of what order they'll come in.  Also, I suppose we default
e9ef0e
-		 * to the NONE algorithm if one were absent.  This part of the spec is
e9ef0e
-		 * poorly written -- I have read the errata document.  For now, I'm only
e9ef0e
-		 * allowing one algorithm per type (auth, integrity, crypt) because I
e9ef0e
-		 * don't I understand how it could be otherwise.
e9ef0e
-		 */
e9ef0e
-		auth_alg      = IPMI_AUTH_RAKP_NONE;
e9ef0e
-		integrity_alg = IPMI_INTEGRITY_NONE;
e9ef0e
-		crypt_alg     = IPMI_CRYPT_NONE;
e9ef0e
-		
e9ef0e
-		while (((cipher_suite_data[offset] & 0xC0) != 0xC0) &&
e9ef0e
-			   ((cipher_suite_data_length - offset) > 0))
e9ef0e
-		{
e9ef0e
-			switch (cipher_suite_data[offset] & 0xC0)
e9ef0e
-			{
e9ef0e
-			case 0x00:
e9ef0e
-				/* Authentication algorithm specifier */
e9ef0e
-				auth_alg = cipher_suite_data[offset++] & 0x3F;
e9ef0e
-				break;
e9ef0e
-			case 0x40:
e9ef0e
-				/* Interity algorithm specifier */
e9ef0e
-				integrity_alg = cipher_suite_data[offset++] & 0x3F;
e9ef0e
-				break;
e9ef0e
-			case 0x80:
e9ef0e
-				/* Confidentiality algorithm specifier */
e9ef0e
-				crypt_alg = cipher_suite_data[offset++] & 0x3F;
e9ef0e
-				break;
e9ef0e
-			}
e9ef0e
-		}
e9ef0e
+	if (! csv_output) {
e9ef0e
+		printf("ID   IANA    Auth Alg        Integrity Alg   Confidentiality Alg\n");
e9ef0e
+	}
e9ef0e
+	for (i = 0; i < nr_suites; i++) {
e9ef0e
 		/* We have everything we need to spit out a cipher suite record */
e9ef0e
 		printf((csv_output? "%d,%s,%s,%s,%s\n" :
e9ef0e
 			"%-4d %-7s %-15s %-15s %-15s\n"),
e9ef0e
-		       cipher_suite_id,
e9ef0e
-		       iana_string(iana),
e9ef0e
-		       val2str(auth_alg, ipmi_auth_algorithms),
e9ef0e
-		       val2str(integrity_alg, ipmi_integrity_algorithms),
e9ef0e
-		       val2str(crypt_alg, ipmi_encryption_algorithms));
e9ef0e
+		       suites[i].cipher_suite_id,
e9ef0e
+		       iana_string(suites[i].iana),
e9ef0e
+		       val2str(suites[i].auth_alg, ipmi_auth_algorithms),
e9ef0e
+		       val2str(suites[i].integrity_alg, ipmi_integrity_algorithms),
e9ef0e
+		       val2str(suites[i].crypt_alg, ipmi_encryption_algorithms));
e9ef0e
 	}
e9ef0e
 	return 0;
e9ef0e
 }
e9ef0e
@@ -973,7 +961,7 @@ ipmi_channel_main(struct ipmi_intf *intf, int argc, char **argv)
e9ef0e
 				return (-1);
e9ef0e
 			}
e9ef0e
 		}
e9ef0e
-		retval = ipmi_get_channel_cipher_suites(intf,
e9ef0e
+		retval = ipmi_print_channel_cipher_suites(intf,
e9ef0e
 							argv[1], /* ipmi | sol */
e9ef0e
 							channel);
e9ef0e
 	} else if (strncmp(argv[0], "setkg", 5) == 0) {
e9ef0e
diff --git a/lib/ipmi_main.c b/lib/ipmi_main.c
e9ef0e
index 811c80b..6aee102 100644
e9ef0e
--- a/lib/ipmi_main.c
e9ef0e
+++ b/lib/ipmi_main.c
e9ef0e
@@ -323,6 +323,7 @@ ipmi_main(int argc, char ** argv,
e9ef0e
 	uint8_t target_addr = 0;
e9ef0e
 	uint8_t target_channel = 0;
e9ef0e
 
e9ef0e
+	uint8_t u8tmp = 0;
e9ef0e
 	uint8_t transit_addr = 0;
e9ef0e
 	uint8_t transit_channel = 0;
e9ef0e
 	uint8_t target_lun     = 0;
e9ef0e
@@ -347,7 +348,10 @@ ipmi_main(int argc, char ** argv,
e9ef0e
 	char * seloem   = NULL;
e9ef0e
 	int port = 0;
e9ef0e
 	int devnum = 0;
e9ef0e
-	int cipher_suite_id = 3; /* See table 22-19 of the IPMIv2 spec */
e9ef0e
+#ifdef IPMI_INTF_LANPLUS
e9ef0e
+	/* lookup best cipher suite available */
e9ef0e
+	enum cipher_suite_ids cipher_suite_id = IPMI_LANPLUS_CIPHER_SUITE_RESERVED;
e9ef0e
+#endif /* IPMI_INTF_LANPLUS */
e9ef0e
 	int argflag, i, found;
e9ef0e
 	int rc = -1;
e9ef0e
 	int ai_family = AF_UNSPEC;
e9ef0e
@@ -425,19 +429,18 @@ ipmi_main(int argc, char ** argv,
e9ef0e
 				goto out_free;
e9ef0e
 			}
e9ef0e
 			break;
e9ef0e
+#ifdef IPMI_INTF_LANPLUS
e9ef0e
 		case 'C':
e9ef0e
-			if (str2int(optarg, &cipher_suite_id) != 0) {
e9ef0e
-				lprintf(LOG_ERR, "Invalid parameter given or out of range for '-C'.");
e9ef0e
-				rc = -1;
e9ef0e
-				goto out_free;
e9ef0e
-			}
e9ef0e
-			/* add check Cipher is -gt 0 */
e9ef0e
-			if (cipher_suite_id < 0) {
e9ef0e
-				lprintf(LOG_ERR, "Cipher suite ID %i is invalid.", cipher_suite_id);
e9ef0e
+			/* Cipher Suite ID is a byte as per IPMI specification */
e9ef0e
+			if (str2uchar(optarg, &u8tmp) != 0) {
e9ef0e
+				lprintf(LOG_ERR, "Invalid parameter given or out of "
e9ef0e
+				                 "range [0-255] for '-C'.");
e9ef0e
 				rc = -1;
e9ef0e
 				goto out_free;
e9ef0e
 			}
e9ef0e
+			cipher_suite_id = u8tmp;
e9ef0e
 			break;
e9ef0e
+#endif /* IPMI_INTF_LANPLUS */
e9ef0e
 		case 'v':
e9ef0e
 			verbose++;
e9ef0e
 			break;
e9ef0e
@@ -870,7 +873,9 @@ ipmi_main(int argc, char ** argv,
e9ef0e
 
e9ef0e
 	ipmi_intf_session_set_lookupbit(ipmi_main_intf, lookupbit);
e9ef0e
 	ipmi_intf_session_set_sol_escape_char(ipmi_main_intf, sol_escape_char);
e9ef0e
+#ifdef IPMI_INTF_LANPLUS
e9ef0e
 	ipmi_intf_session_set_cipher_suite_id(ipmi_main_intf, cipher_suite_id);
e9ef0e
+#endif /* IPMI_INTF_LANPLUS */
e9ef0e
 
e9ef0e
 	ipmi_main_intf->devnum = devnum;
e9ef0e
 
e9ef0e
diff --git a/src/plugins/ipmi_intf.c b/src/plugins/ipmi_intf.c
e9ef0e
index 1d9e87b..00b0918 100644
e9ef0e
--- a/src/plugins/ipmi_intf.c
e9ef0e
+++ b/src/plugins/ipmi_intf.c
e9ef0e
@@ -252,11 +252,14 @@ ipmi_intf_session_set_lookupbit(struct ipmi_intf * intf, uint8_t lookupbit)
e9ef0e
 	intf->ssn_params.lookupbit = lookupbit;
e9ef0e
 }
e9ef0e
 
e9ef0e
+#ifdef IPMI_INTF_LANPLUS
e9ef0e
 void
e9ef0e
-ipmi_intf_session_set_cipher_suite_id(struct ipmi_intf * intf, uint8_t cipher_suite_id)
e9ef0e
+ipmi_intf_session_set_cipher_suite_id(struct ipmi_intf * intf,
e9ef0e
+		enum cipher_suite_ids cipher_suite_id)
e9ef0e
 {
e9ef0e
 	intf->ssn_params.cipher_suite_id = cipher_suite_id;
e9ef0e
 }
e9ef0e
+#endif /* IPMI_INTF_LANPLUS */
e9ef0e
 
e9ef0e
 void
e9ef0e
 ipmi_intf_session_set_sol_escape_char(struct ipmi_intf * intf, char sol_escape_char)
e9ef0e
diff --git a/src/plugins/lanplus/lanplus.c b/src/plugins/lanplus/lanplus.c
e9ef0e
index a0e388c..3087348 100644
e9ef0e
--- a/src/plugins/lanplus/lanplus.c
e9ef0e
+++ b/src/plugins/lanplus/lanplus.c
e9ef0e
@@ -164,114 +164,109 @@ extern int verbose;
e9ef0e
  * returns 0 on success
e9ef0e
  *         1 on failure
e9ef0e
  */
e9ef0e
-int lanplus_get_requested_ciphers(int       cipher_suite_id,
e9ef0e
+int lanplus_get_requested_ciphers(enum cipher_suite_ids cipher_suite_id,
e9ef0e
 								  uint8_t * auth_alg,
e9ef0e
 								  uint8_t * integrity_alg,
e9ef0e
 								  uint8_t * crypt_alg)
e9ef0e
 {
e9ef0e
-#ifdef HAVE_CRYPTO_SHA256
e9ef0e
-	if ((cipher_suite_id < 0) || (cipher_suite_id > 17)) {
e9ef0e
-		return 1;
e9ef0e
-	}
e9ef0e
-#else
e9ef0e
-	if ((cipher_suite_id < 0) || (cipher_suite_id > 14))
e9ef0e
-		return 1;
e9ef0e
-#endif /* HAVE_CRYPTO_SHA256 */
e9ef0e
 		/* See table 22-19 for the source of the statement */
e9ef0e
 	switch (cipher_suite_id)
e9ef0e
 	{
e9ef0e
-	case 0:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_0:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_NONE;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_NONE;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_NONE;
e9ef0e
 		break;
e9ef0e
-	case 1:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_1:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_SHA1;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_NONE;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_NONE;
e9ef0e
 		break;
e9ef0e
-	case 2:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_2:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_SHA1;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_HMAC_SHA1_96;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_NONE;
e9ef0e
 		break;
e9ef0e
-	case 3:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_3:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_SHA1;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_HMAC_SHA1_96;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_AES_CBC_128;
e9ef0e
 		break;
e9ef0e
-	case 4:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_4:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_SHA1;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_HMAC_SHA1_96;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_XRC4_128;
e9ef0e
 		break;
e9ef0e
-	case 5:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_5:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_SHA1;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_HMAC_SHA1_96;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_XRC4_40;
e9ef0e
 		break;
e9ef0e
-	case 6:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_6:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_MD5;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_NONE;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_NONE;
e9ef0e
 		break;
e9ef0e
-	case 7:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_7:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_MD5;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_HMAC_MD5_128;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_NONE;
e9ef0e
 		break;
e9ef0e
-	case 8:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_8:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_MD5;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_HMAC_MD5_128;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_AES_CBC_128;
e9ef0e
 		break;
e9ef0e
-	case 9:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_9:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_MD5;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_HMAC_MD5_128;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_XRC4_128;
e9ef0e
 		break;
e9ef0e
-	case 10:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_10:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_MD5;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_HMAC_MD5_128;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_XRC4_40;
e9ef0e
 		break;
e9ef0e
-	case 11:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_11:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_MD5;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_MD5_128;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_NONE;
e9ef0e
 		break;
e9ef0e
-	case 12:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_12:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_MD5;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_MD5_128;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_AES_CBC_128;
e9ef0e
 		break;
e9ef0e
-	case 13:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_13:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_MD5;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_MD5_128;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_XRC4_128;
e9ef0e
 		break;
e9ef0e
-	case 14:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_14:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_MD5;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_MD5_128;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_XRC4_40;
e9ef0e
 		break;
e9ef0e
 #ifdef HAVE_CRYPTO_SHA256
e9ef0e
-	case 15:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_15:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_SHA256;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_NONE;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_NONE;
e9ef0e
 		break;
e9ef0e
-	case 16:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_16:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_SHA256;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_HMAC_SHA256_128;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_NONE;
e9ef0e
 		break;
e9ef0e
-	case 17:
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_17:
e9ef0e
 		*auth_alg      = IPMI_AUTH_RAKP_HMAC_SHA256;
e9ef0e
 		*integrity_alg = IPMI_INTEGRITY_HMAC_SHA256_128;
e9ef0e
 		*crypt_alg     = IPMI_CRYPT_AES_CBC_128;
e9ef0e
 		break;
e9ef0e
 #endif /* HAVE_CRYPTO_SHA256 */
e9ef0e
+	case IPMI_LANPLUS_CIPHER_SUITE_RESERVED:
e9ef0e
+	default:
e9ef0e
+		return 1;
e9ef0e
 	}
e9ef0e
 
e9ef0e
 	return 0;
e9ef0e
@@ -3441,6 +3436,57 @@ ipmi_set_session_privlvl_cmd(struct ipmi_intf * intf)
e9ef0e
 	return 0;
e9ef0e
 }
e9ef0e
 
e9ef0e
+static uint8_t
e9ef0e
+ipmi_find_best_cipher_suite(struct ipmi_intf *intf)
e9ef0e
+{
e9ef0e
+	enum cipher_suite_ids best_suite = IPMI_LANPLUS_CIPHER_SUITE_RESERVED;
e9ef0e
+#ifdef HAVE_CRYPTO_SHA256
e9ef0e
+	struct cipher_suite_info suites[MAX_CIPHER_SUITE_COUNT];
e9ef0e
+	size_t nr_suites = ARRAY_SIZE(suites);
e9ef0e
+	/* cipher suite best order is chosen with this criteria:
e9ef0e
+	 * HMAC-MD5 and MD5 are BAD; xRC4 is bad; AES128 is required
e9ef0e
+	 * HMAC-SHA256 > HMAC-SHA1
e9ef0e
+	 * secure authentication > encrypted content
e9ef0e
+	 *
e9ef0e
+	 * With xRC4 out, all cipher suites with MD5 out, and cipher suite 3 being
e9ef0e
+	 * required by the spec, the only better defined standard cipher suite is
e9ef0e
+	 * 17. So if SHA256 is available, we should try to use that, otherwise,
e9ef0e
+	 * fall back to 3.
e9ef0e
+	 */
e9ef0e
+	const enum cipher_suite_ids cipher_order_preferred[] = {
e9ef0e
+		IPMI_LANPLUS_CIPHER_SUITE_17,
e9ef0e
+		IPMI_LANPLUS_CIPHER_SUITE_3,
e9ef0e
+	};
e9ef0e
+	const size_t nr_preferred = ARRAY_SIZE(cipher_order_preferred);
e9ef0e
+	size_t ipref, i;
e9ef0e
+
e9ef0e
+	if (ipmi_get_channel_cipher_suites(intf, "ipmi", IPMI_LAN_CHANNEL_E,
e9ef0e
+	                                   suites, &nr_suites) < 0)
e9ef0e
+	{
e9ef0e
+		/* default legacy behavior - cipher suite 3 if none is requested */
e9ef0e
+		return IPMI_LANPLUS_CIPHER_SUITE_3;
e9ef0e
+	}
e9ef0e
+	for (ipref = 0; ipref < nr_preferred &&
e9ef0e
+	                IPMI_LANPLUS_CIPHER_SUITE_RESERVED == best_suite; ipref++)
e9ef0e
+	{
e9ef0e
+		for (i = 0; i < nr_suites; i++) {
e9ef0e
+			if (cipher_order_preferred[ipref] == suites[i].cipher_suite_id) {
e9ef0e
+				best_suite = cipher_order_preferred[ipref];
e9ef0e
+				break;
e9ef0e
+			}
e9ef0e
+		}
e9ef0e
+	}
e9ef0e
+#endif /* HAVE_CRYPTO_SHA256 */
e9ef0e
+	if (IPMI_LANPLUS_CIPHER_SUITE_RESERVED == best_suite) {
e9ef0e
+		/* IPMI 2.0 spec requires that cipher suite 3 is implemented
e9ef0e
+		 * so we should always be able to fall back to that if better
e9ef0e
+		 * options are not available. */
e9ef0e
+		best_suite = IPMI_LANPLUS_CIPHER_SUITE_3;
e9ef0e
+	}
e9ef0e
+	lprintf(LOG_INFO, "Using best available cipher suite %d\n", best_suite);
e9ef0e
+	return best_suite;
e9ef0e
+}
e9ef0e
+
e9ef0e
 /**
e9ef0e
  * ipmi_lanplus_open
e9ef0e
  */
e9ef0e
@@ -3514,6 +3560,16 @@ ipmi_lanplus_open(struct ipmi_intf * intf)
e9ef0e
 		lprintf(LOG_INFO, "This BMC does not support IPMI v2 / RMCP+");
e9ef0e
 		goto fail;
e9ef0e
 	}
e9ef0e
+	/*
e9ef0e
+	 * If no cipher suite was provided, query the channel cipher suite list and
e9ef0e
+	 * pick the best one available
e9ef0e
+	 */
e9ef0e
+	if (IPMI_LANPLUS_CIPHER_SUITE_RESERVED ==
e9ef0e
+	    intf->ssn_params.cipher_suite_id)
e9ef0e
+	{
e9ef0e
+		ipmi_intf_session_set_cipher_suite_id(intf,
e9ef0e
+			ipmi_find_best_cipher_suite(intf));
e9ef0e
+	}
e9ef0e
 
e9ef0e
 	/*
e9ef0e
 	 * If the open/rakp1/rakp3 sequence encounters a timeout, the whole sequence
e9ef0e
@@ -3728,7 +3784,7 @@ static int ipmi_lanplus_setup(struct ipmi_intf * intf)
e9ef0e
 
e9ef0e
 static void ipmi_lanp_set_max_rq_data_size(struct ipmi_intf * intf, uint16_t size)
e9ef0e
 {
e9ef0e
-	if (intf->ssn_params.cipher_suite_id == 3) {
e9ef0e
+	if (intf->ssn_params.cipher_suite_id == IPMI_LANPLUS_CIPHER_SUITE_3) {
e9ef0e
 		/*
e9ef0e
 		 * encrypted payload can only be multiple of 16 bytes
e9ef0e
 		 */
e9ef0e
@@ -3746,7 +3802,7 @@ static void ipmi_lanp_set_max_rq_data_size(struct ipmi_intf * intf, uint16_t siz
e9ef0e
 
e9ef0e
 static void ipmi_lanp_set_max_rp_data_size(struct ipmi_intf * intf, uint16_t size)
e9ef0e
 {
e9ef0e
-	if (intf->ssn_params.cipher_suite_id == 3) {
e9ef0e
+	if (intf->ssn_params.cipher_suite_id == IPMI_LANPLUS_CIPHER_SUITE_3) {
e9ef0e
 		/*
e9ef0e
 		 * encrypted payload can only be multiple of 16 bytes
e9ef0e
 		 */
e9ef0e
-- 
e9ef0e
2.20.1
e9ef0e