396 Commits

Author SHA1 Message Date
iadgovuser58
8b3336e565 fixed DeviceContext to include either/or PCI USB 2024-04-24 10:07:50 -04:00
iadgovuser58
0f33fdf4cd remove tests vendorid/deviceid 2024-04-23 17:12:23 -04:00
iadgovuser58
d6a255012a temporarily add test vendorid/deviceid 2024-04-23 17:08:10 -04:00
iadgovuser58
8558546ff5 spdm processing - added Device Security Event Data Pci Context 2024-04-22 19:09:01 -04:00
iadgovuser58
a2737f59d0 spdm processing - output is complete 2024-04-22 14:35:58 -04:00
iadgovuser58
13b90c09f5 spdm processing 2024-04-19 18:38:25 -04:00
iadgovuser58
f4c52271f5 spdm processing 2024-04-19 18:36:58 -04:00
iadgovuser58
c129522768 spdm processing 2024-04-19 18:32:59 -04:00
iadgovuser58
605dbe536a spdm processing 2024-04-19 18:07:00 -04:00
iadgovuser58
53267ec381 spdm processing 2024-04-19 17:21:30 -04:00
iadgovuser58
26c102c205 spdm processing 2024-04-18 17:08:36 -04:00
iadgovuser58
1b6109c107 spdm processing 2024-04-18 12:27:44 -04:00
iadgovuser58
e8bcb0ec0d spdm initial output 2024-04-17 17:49:14 -04:00
iadgovuser58
4547998384 spdm initial output 2024-04-17 17:28:17 -04:00
iadgovuser58
49108ab144 spdm processing 2024-04-16 19:38:32 -04:00
iadgovuser58
e96da43a48 spdm processing 2024-04-15 17:56:23 -04:00
iadgovuser58
e1844dedbd SPDM processing 2024-04-10 12:02:01 -04:00
iadgovuser58
a1534a9c7b SPDM processing 2024-04-10 11:46:37 -04:00
iadgovuser58
f1d75beb3a parsing event 2024-04-09 18:02:53 -04:00
iadgovuser58
11297d26c2 additional descriptions for data structures 2024-04-09 16:41:13 -04:00
iadgovuser58
72be21705e completed descriptions for data structures 2024-04-09 16:23:59 -04:00
iadgovuser58
f5031efb42 spdm event structures 2024-04-08 12:28:03 -04:00
iadgovuser58
07c7b52a64 added files for EvEfiSpdmFirmwareBlob 2024-04-05 10:45:21 -04:00
chubtub
fab56eb0e9 Remove commented lines 2024-03-15 14:37:09 -04:00
chubtub
1947b70a1b Clean up javadocs; change System.out.println to log messages 2024-03-07 00:43:10 -05:00
chubtub
54f3e4bfca Modify swidtag validation to use the public signing cert to verify <KeyName> in a signature and the truststore 2024-03-06 12:40:54 -05:00
chubtub
5445278723
Merge pull request #715 from nsacyber/v3_issue-661_updated
[#661] Output handling should be more concise
2024-03-06 12:40:03 -05:00
Cyrus
eada242284 These changes have been moved over from updates made for issue-705. The
primary function implemented in this set of changes is to track more
specifically what failed when the components of a certificate are
compared.  The implementation required a couple of new DB classes to be
created to store this information.  This is also to set up a better
visual comparison of what was expected vs what was actually found.  This
is similar to the RIM event compare failure page.
2024-03-01 15:29:10 -05:00
chubtub
adb1da93b4 Log an error instead of throwing an exception when the truststore is omitted 2024-02-23 02:11:31 -05:00
chubtub
f6f1ab4ee7 Log an error instead of throwing an exception when a signing key cannot be located in the provided truststore 2024-02-23 02:11:29 -05:00
Cyrus
80ba01a3d0 This commit is for the 3rd listed issue on #705. The green check mark
test was causing an error from ASN1UTF8String.getInstance.  And did some
checkstyle fixes.
2024-02-06 16:34:20 -05:00
Cyrus
6dc3c691e1 Updated some more checkstyle issues and removed the line call from the
settings.gradle file
2024-02-05 13:29:24 -05:00
Cyrus
e819dad52b This commit sets up the suppression filter file. The locations previous
established have been removed.  The configuration is the root directory
2024-02-05 10:50:12 -05:00
Cyrus
ab5036982f Updated version for suppressions file 2024-02-02 08:37:44 -05:00
Cyrus
17bd7d9021 New branch because there seemed to be issues with the previous branch
merges.
2024-02-02 08:07:08 -05:00
Cyrus
1d0a71a1a2 While expecting a StackOverFlow error from uploading an EK certificate,
this is not occurring.  A unit test had to be updated because the
previous BouncyCastle X500Compare.equals() method returned false for 2
empty string compares.  Now it returns true.
2024-01-24 09:48:44 -05:00
Cyrus
29dd1254da
Merge pull request #679 from nsacyber/issue-642-spotbugs-p3
[#642] HIRS_Utils spotbugs fixes
2024-01-23 12:59:25 -05:00
Cyrus
a8756e187e Missed removing an annotation 2024-01-19 09:03:28 -05:00
Cyrus
60729164c8 Last changes that resolve remaining spotbugs issues 2024-01-19 07:45:36 -05:00
Cyrus
575baa3409 Spotsbugs HIRS_Utils initial fixes 2024-01-18 16:02:32 -05:00
Cyrus
8dee0a94ea Update code to pull from 2 different locations 2024-01-18 08:09:13 -05:00
Cyrus
3134a165fa Changes were missing from the unit test file, updated and should pass
now
2024-01-17 14:36:05 -05:00
Cyrus
3d6504743f Update the Version parsing to read the file from a configuration
location rather than the code bases resource location.
2024-01-17 14:18:26 -05:00
chubtub
e4c9150b07
Merge pull request #650 from nsacyber/v3_issue-646
[#646] Fix broken rimtool validation
2024-01-11 10:52:42 -05:00
Cyrus
0432646445 The initial issue found in the tcg event log code is present in the
rest, updating all exclude files to ignore this specific bug for the
time being
2023-12-20 15:53:32 -05:00
Cyrus
7ccfa28f59 Missed adding new file for HIRS_Utils 2023-12-20 13:16:04 -05:00
chubtub
6c5a17a2f7 In ReferenceManifestValidator, set the truststore for swidtag XML files, and check if it has already been set for signature validation; removed a duplicate digest command for calculating file hashes. 2023-12-20 11:04:46 -05:00
Cyrus
e1f846d3ae Upon a quick test, the truststorefile was throwing errors because it is
not just empty but null.  Added null check first.
2023-11-29 14:12:36 -05:00
Cyrus
8ae0745ac5 Fixed issues that caused the ACA to not complete a provision.
FWvalidator was using an object used by the tool and not the portal.
Updated a few repository calls
2023-11-28 15:39:33 -05:00
iadgovuser62
59a4ff0f1a
HIRS_Utils Unit Tests Migration from /hirs/utils/ directory (#621)
* Adding HexUtilsTest

* Adding StringValidatorTest

* Adding VersionHelperTest and necessary resource

* Adding BouncyCastleUtilsTest
2023-11-16 12:51:30 -05:00