Commit Graph

396 Commits

Author SHA1 Message Date
iadgovuser58
12dbf545c0 remove tests vendorid/deviceid 2024-07-26 10:59:22 -04:00
iadgovuser58
0ad042f40f temporarily add test vendorid/deviceid 2024-07-26 10:59:22 -04:00
iadgovuser58
54cb02a4f1 spdm processing - added Device Security Event Data Pci Context 2024-07-26 10:59:22 -04:00
iadgovuser58
715e6599b9 spdm processing - output is complete 2024-07-26 10:59:22 -04:00
iadgovuser58
03ce1b5763 spdm processing 2024-07-26 10:59:22 -04:00
iadgovuser58
ca8407d476 spdm processing 2024-07-26 10:59:22 -04:00
iadgovuser58
d573a13aac spdm processing 2024-07-26 10:59:22 -04:00
iadgovuser58
47bb53f1ff spdm processing 2024-07-26 10:59:22 -04:00
iadgovuser58
6f28b1a42f spdm processing 2024-07-26 10:59:22 -04:00
iadgovuser58
851753b5d4 spdm processing 2024-07-26 10:59:22 -04:00
iadgovuser58
c903400bac spdm processing 2024-07-26 10:59:22 -04:00
iadgovuser58
9c88909a3e spdm initial output 2024-07-26 10:59:22 -04:00
iadgovuser58
e1527373fc spdm initial output 2024-07-26 10:59:22 -04:00
iadgovuser58
92dffcf0f0 spdm processing 2024-07-26 10:59:22 -04:00
iadgovuser58
2cb2437ca0 spdm processing 2024-07-26 10:59:22 -04:00
iadgovuser58
2bfa614161 SPDM processing 2024-07-26 10:59:22 -04:00
iadgovuser58
2ee21afb3b SPDM processing 2024-07-26 10:59:22 -04:00
iadgovuser58
eea1b746c8 parsing event 2024-07-26 10:59:22 -04:00
iadgovuser58
bb4bcf936e additional descriptions for data structures 2024-07-26 10:59:22 -04:00
iadgovuser58
c43e790c74 completed descriptions for data structures 2024-07-26 10:59:22 -04:00
iadgovuser58
422834a8bb spdm event structures 2024-07-26 10:59:22 -04:00
iadgovuser58
c17221c6df added files for EvEfiSpdmFirmwareBlob 2024-07-26 10:59:22 -04:00
iadgovuser58
939240d284 fixed issue caused by change to version method 2024-07-26 10:59:22 -04:00
chubtub
fab56eb0e9 Remove commented lines 2024-03-15 14:37:09 -04:00
chubtub
1947b70a1b Clean up javadocs; change System.out.println to log messages 2024-03-07 00:43:10 -05:00
chubtub
54f3e4bfca Modify swidtag validation to use the public signing cert to verify <KeyName> in a signature and the truststore 2024-03-06 12:40:54 -05:00
chubtub
5445278723
Merge pull request #715 from nsacyber/v3_issue-661_updated
[#661] Output handling should be more concise
2024-03-06 12:40:03 -05:00
Cyrus
eada242284 These changes have been moved over from updates made for issue-705. The
primary function implemented in this set of changes is to track more
specifically what failed when the components of a certificate are
compared.  The implementation required a couple of new DB classes to be
created to store this information.  This is also to set up a better
visual comparison of what was expected vs what was actually found.  This
is similar to the RIM event compare failure page.
2024-03-01 15:29:10 -05:00
chubtub
adb1da93b4 Log an error instead of throwing an exception when the truststore is omitted 2024-02-23 02:11:31 -05:00
chubtub
f6f1ab4ee7 Log an error instead of throwing an exception when a signing key cannot be located in the provided truststore 2024-02-23 02:11:29 -05:00
Cyrus
80ba01a3d0 This commit is for the 3rd listed issue on #705. The green check mark
test was causing an error from ASN1UTF8String.getInstance.  And did some
checkstyle fixes.
2024-02-06 16:34:20 -05:00
Cyrus
6dc3c691e1 Updated some more checkstyle issues and removed the line call from the
settings.gradle file
2024-02-05 13:29:24 -05:00
Cyrus
e819dad52b This commit sets up the suppression filter file. The locations previous
established have been removed.  The configuration is the root directory
2024-02-05 10:50:12 -05:00
Cyrus
ab5036982f Updated version for suppressions file 2024-02-02 08:37:44 -05:00
Cyrus
17bd7d9021 New branch because there seemed to be issues with the previous branch
merges.
2024-02-02 08:07:08 -05:00
Cyrus
1d0a71a1a2 While expecting a StackOverFlow error from uploading an EK certificate,
this is not occurring.  A unit test had to be updated because the
previous BouncyCastle X500Compare.equals() method returned false for 2
empty string compares.  Now it returns true.
2024-01-24 09:48:44 -05:00
Cyrus
29dd1254da
Merge pull request #679 from nsacyber/issue-642-spotbugs-p3
[#642] HIRS_Utils spotbugs fixes
2024-01-23 12:59:25 -05:00
Cyrus
a8756e187e Missed removing an annotation 2024-01-19 09:03:28 -05:00
Cyrus
60729164c8 Last changes that resolve remaining spotbugs issues 2024-01-19 07:45:36 -05:00
Cyrus
575baa3409 Spotsbugs HIRS_Utils initial fixes 2024-01-18 16:02:32 -05:00
Cyrus
8dee0a94ea Update code to pull from 2 different locations 2024-01-18 08:09:13 -05:00
Cyrus
3134a165fa Changes were missing from the unit test file, updated and should pass
now
2024-01-17 14:36:05 -05:00
Cyrus
3d6504743f Update the Version parsing to read the file from a configuration
location rather than the code bases resource location.
2024-01-17 14:18:26 -05:00
chubtub
e4c9150b07
Merge pull request #650 from nsacyber/v3_issue-646
[#646] Fix broken rimtool validation
2024-01-11 10:52:42 -05:00
Cyrus
0432646445 The initial issue found in the tcg event log code is present in the
rest, updating all exclude files to ignore this specific bug for the
time being
2023-12-20 15:53:32 -05:00
Cyrus
7ccfa28f59 Missed adding new file for HIRS_Utils 2023-12-20 13:16:04 -05:00
chubtub
6c5a17a2f7 In ReferenceManifestValidator, set the truststore for swidtag XML files, and check if it has already been set for signature validation; removed a duplicate digest command for calculating file hashes. 2023-12-20 11:04:46 -05:00
Cyrus
e1f846d3ae Upon a quick test, the truststorefile was throwing errors because it is
not just empty but null.  Added null check first.
2023-11-29 14:12:36 -05:00
Cyrus
8ae0745ac5 Fixed issues that caused the ACA to not complete a provision.
FWvalidator was using an object used by the tool and not the portal.
Updated a few repository calls
2023-11-28 15:39:33 -05:00
iadgovuser62
59a4ff0f1a
HIRS_Utils Unit Tests Migration from /hirs/utils/ directory (#621)
* Adding HexUtilsTest

* Adding StringValidatorTest

* Adding VersionHelperTest and necessary resource

* Adding BouncyCastleUtilsTest
2023-11-16 12:51:30 -05:00