//----------------------------------------------------------------------------
//
// Copyright (c) Intel Corporation, 2003 - 2012 All Rights Reserved.
//
// File: AMT_AuditLog.cs
//
// Contents: Represents an Audit Log
// This file was automatically generated from AMT_AuditLog.mof
//
//----------------------------------------------------------------------------
using System;
using System.Collections.Generic;
using System.Collections.ObjectModel;
using System.Text;
using System.Globalization;
using System.Xml.Serialization;
using System.IO;
using Intel.Manageability.WSManagement;
using Intel.Manageability.Cim.Untyped;
namespace Intel.Manageability.Cim.Typed
{
///
///Represents an Audit Log
///
[System.SerializableAttribute()]
[System.Xml.Serialization.XmlTypeAttribute(Namespace="http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog")]
[System.Xml.Serialization.XmlRootAttribute("AMT_AuditLog", Namespace="http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog", IsNullable=false)]
public class AMT_AuditLog : CIM_Log
{
///
/// Default constructor.
///
public AMT_AuditLog() :base()
{
}
///
/// Constructor that recieves an xml string for deserialization.
///
/// xml string to deserialize
public AMT_AuditLog(string xml): base((IWSManClient)null)
{
this.Deserialize(xml);
}
///
/// Constructor which recieves a Ws-Management client object.
///
/// Ws-Management client
public AMT_AuditLog(IWSManClient client): base(client)
{
}
///
/// Required, State of log. A bitwise combination of one or more of: 0x00 (Enabled), 0x01 (Disabled), 0x02 (Locked), 0x04 (Almost Full - The storage area dedicated for the audit log reached 85% full, and non-critical events will not be logged.), 0x08 (Full - The storage area dedicated for the audit log is completely full; no events will be logged and critical events in policy will not be executed.), 0x10 (No Key - No key and certificate were set for the signing of the audit log. Feature cannot be enabled).
///
[CimField(false, true)]
public virtual uint AuditState
{
get
{
return uint.Parse(this["AuditState"][0], CultureInfo.InvariantCulture);
}
set
{
this.SetOrAddField("AuditState",value.ToString(CultureInfo.InvariantCulture));
}
}
///
/// Required, Maximum number of auditors allowed
///
[CimField(false, true)]
public virtual ushort MaxAllowedAuditors
{
get
{
return ushort.Parse(this["MaxAllowedAuditors"][0], CultureInfo.InvariantCulture);
}
set
{
this.SetOrAddField("MaxAllowedAuditors",value.ToString(CultureInfo.InvariantCulture));
}
}
///
/// Remove MinDaysToKeep field.
/// Note: This method will succeed only if this field is optional in the concrete object.
///
public virtual void RemoveMinDaysToKeep()
{
RemoveField("MinDaysToKeep");
}
///
/// Is true if the field MinDaysToKeep exists in the current object,
/// otherwise is false.
///
public virtual bool MinDaysToKeepExist
{
get
{
return ContainsField("MinDaysToKeep");
}
}
///
/// Optional, Minimum number of days to keep records in the AuditLog. Relevant only if "storagePolicy" is set to "RESTRICTED_ROLL_OVER".
///
[CimField(false, false)]
public virtual byte MinDaysToKeep
{
get
{
return byte.Parse(this["MinDaysToKeep"][0], CultureInfo.InvariantCulture);
}
set
{
this.SetOrAddField("MinDaysToKeep",value.ToString(CultureInfo.InvariantCulture));
}
}
///
/// Key, Required,
///
[CimField(true, true)]
public override string Name
{
get
{
return this.GetField("Name")[0];
}
set
{
this.SetOrAddField("Name",value);
}
}
///
/// Required, Indicates the percentage of free space in the storage dedicated to the audit log.
///
[CimField(false, true)]
public virtual uint PercentageFree
{
get
{
return uint.Parse(this["PercentageFree"][0], CultureInfo.InvariantCulture);
}
set
{
this.SetOrAddField("PercentageFree",value.ToString(CultureInfo.InvariantCulture));
}
}
///
/// Remove StoragePolicy field.
/// Note: This method will succeed only if this field is optional in the concrete object.
///
public virtual void RemoveStoragePolicy()
{
RemoveField("StoragePolicy");
}
///
/// Is true if the field StoragePolicy exists in the current object,
/// otherwise is false.
///
public virtual bool StoragePolicyExist
{
get
{
return ContainsField("StoragePolicy");
}
}
///
/// Optional, AuditLog storage policy. The available policies are: "NO_ROLL_OVER" - No roll-over in storage. Old events will not be overwritten. "ROLL_OVER" - Full rollover. Any old record will be overwritten. "RESTRICTED_ROLL_OVER" - Parital (restricted) rollover. Only old events (under certain threshold, which can be set using SetStoragePolicy) will be overwritten. If not specified default is "ROLL_OVER" unless FW was upgraded from AMT 5.0 and then "NO_ROLL_OVER" will be used as default.
///
[CimField(false, false)]
public virtual byte StoragePolicy
{
get
{
return byte.Parse(this["StoragePolicy"][0], CultureInfo.InvariantCulture);
}
set
{
this.SetOrAddField("StoragePolicy",value.ToString(CultureInfo.InvariantCulture));
}
}
///
/// Remove TimeOfLastRecord field.
/// Note: This method will succeed only if this field is optional in the concrete object.
///
public virtual void RemoveTimeOfLastRecord()
{
RemoveField("TimeOfLastRecord");
}
///
/// Is true if the field TimeOfLastRecord exists in the current object,
/// otherwise is false.
///
public virtual bool TimeOfLastRecordExist
{
get
{
return ContainsField("TimeOfLastRecord");
}
}
///
/// Optional, Time stamp of the most recent entry in the log if such an entry exists.
///
[CimField(false, false)]
public virtual CimDateTime TimeOfLastRecord
{
get
{
return CimDateTime.Parse(this["TimeOfLastRecord"][0]);
}
set
{
this.SetOrAddField("TimeOfLastRecord",value.ToString());
}
}
///
///Returns a list of consecutive audit log records in chronological order: The first record in the returned array is the oldest record stored in the log . The record entries are returned as an array of base64Binary elements. Each record holds the following information: uint16 AuditAppID -A unique ID for each auditable application. uint16 EventID -ID of an event of the application. uint8 InitiatorType -0 (HTTP Digest username), 1 (Kerberos SID), 2 (Local). See below InitiatorData -See below. uint32 TimeStamp -Time when the event occurred in seconds since 1.1.1970. uint8 MCLocationType -0 (IPv4 Address), 1 (IPv6 Address), 2 (None). uint8 NetAddressLength -Length of the NetAddress field. Array of uint8 NetAddress -ASCII representation of the network address of management console or Local Host IP (e.g. 127.0.0.1). Note: In Intel AMT Release 4.0 IP address representation includes null-terminator and NetAddressLength includes the null terminator. uint8 ExtendedDataLength -Length of event specific data. Array of uint8 ExtendedData -Event specific data.
///The InitiatorData field may hold different data types according to the InitiatorType field: HTTP digest initiator: In Intel AMT Release 4.0 data for username includes null terminator and UsernameLength includes the null terminator. uint8 UsernameLength Array of uint8 Username Kerberos SID initiator: uint32 UserInDomain uint8 DomainLength Array of uint8 Domain Local: Empty.
///
[System.SerializableAttribute()]
[System.Xml.Serialization.XmlTypeAttribute(AnonymousType=true)]
[System.Xml.Serialization.XmlRootAttribute(Namespace="http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog", IsNullable=false)]
private class ReadRecords_INPUT : CimParams
{
public ReadRecords_INPUT(string ns) : base(ns)
{
}
///
/// Required, Identifies the position of the first record to retrieve. An index of 1 indicates the first record in the log.
///
[CimField(false,true)]
public virtual uint StartIndex
{
set
{
this.SetOrAddField("StartIndex",value.ToString(CultureInfo.InvariantCulture));
}
}
}
///
///Returns a list of consecutive audit log records in chronological order: The first record in the returned array is the oldest record stored in the log . The record entries are returned as an array of base64Binary elements. Each record holds the following information: uint16 AuditAppID -A unique ID for each auditable application. uint16 EventID -ID of an event of the application. uint8 InitiatorType -0 (HTTP Digest username), 1 (Kerberos SID), 2 (Local). See below InitiatorData -See below. uint32 TimeStamp -Time when the event occurred in seconds since 1.1.1970. uint8 MCLocationType -0 (IPv4 Address), 1 (IPv6 Address), 2 (None). uint8 NetAddressLength -Length of the NetAddress field. Array of uint8 NetAddress -ASCII representation of the network address of management console or Local Host IP (e.g. 127.0.0.1). Note: In Intel AMT Release 4.0 IP address representation includes null-terminator and NetAddressLength includes the null terminator. uint8 ExtendedDataLength -Length of event specific data. Array of uint8 ExtendedData -Event specific data.
///The InitiatorData field may hold different data types according to the InitiatorType field: HTTP digest initiator: In Intel AMT Release 4.0 data for username includes null terminator and UsernameLength includes the null terminator. uint8 UsernameLength Array of uint8 Username Kerberos SID initiator: uint32 UserInDomain uint8 DomainLength Array of uint8 Domain Local: Empty.
///
[System.SerializableAttribute()]
[System.Xml.Serialization.XmlTypeAttribute(AnonymousType=true)]
[System.Xml.Serialization.XmlRootAttribute(Namespace="http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog", IsNullable=false)]
private class ReadRecords_OUTPUT : CimParams
{
public ReadRecords_OUTPUT() : base("")
{
}
///
/// Optional, The total number of records in the log.
///
[CimField(false,false)]
public virtual uint TotalRecordCount
{
get
{
return uint.Parse(this["TotalRecordCount"][0], CultureInfo.InvariantCulture);
}
}
///
/// Optional, The number of records returned + content of 10 records from the start index.
///
[CimField(false,false)]
public virtual uint RecordsReturned
{
get
{
return uint.Parse(this["RecordsReturned"][0], CultureInfo.InvariantCulture);
}
}
///
/// Optional, Notice: the values of this array are actually base64 encoded values. A list of event records.
///
[CimField(false,false)]
public virtual string[] EventRecords
{
get
{
return this["EventRecords"];
}
}
}
///
///Returns a list of consecutive audit log records in chronological order: The first record in the returned array is the oldest record stored in the log . The record entries are returned as an array of base64Binary elements. Each record holds the following information: uint16 AuditAppID -A unique ID for each auditable application. uint16 EventID -ID of an event of the application. uint8 InitiatorType -0 (HTTP Digest username), 1 (Kerberos SID), 2 (Local). See below InitiatorData -See below. uint32 TimeStamp -Time when the event occurred in seconds since 1.1.1970. uint8 MCLocationType -0 (IPv4 Address), 1 (IPv6 Address), 2 (None). uint8 NetAddressLength -Length of the NetAddress field. Array of uint8 NetAddress -ASCII representation of the network address of management console or Local Host IP (e.g. 127.0.0.1). Note: In Intel AMT Release 4.0 IP address representation includes null-terminator and NetAddressLength includes the null terminator. uint8 ExtendedDataLength -Length of event specific data. Array of uint8 ExtendedData -Event specific data.
///The InitiatorData field may hold different data types according to the InitiatorType field: HTTP digest initiator: In Intel AMT Release 4.0 data for username includes null terminator and UsernameLength includes the null terminator. uint8 UsernameLength Array of uint8 Username Kerberos SID initiator: uint32 UserInDomain uint8 DomainLength Array of uint8 Domain Local: Empty.
///
/// Required, IN -Identifies the position of the first record to retrieve. An index of 1 indicates the first record in the log.
/// OUT - The total number of records in the log.
/// OUT - The number of records returned + content of 10 records from the start index.
/// OUT - Notice: the values of this array are actually base64 encoded values. A list of event records.
///
/// Legal values:
/// PT_STATUS_SUCCESS : 0
/// PT_STATUS_INTERNAL_ERROR : 1
/// PT_STATUS_NOT_READY : 2
/// PT_STATUS_INVALID_INDEX : 35
///
public virtual uint ReadRecords(uint? inStartIndex,out uint outTotalRecordCount,out uint outRecordsReturned,out string[] outEventRecords)
{
ReadRecords_INPUT input = new ReadRecords_INPUT(this.XmlNamespace);
if (inStartIndex.HasValue)
input.StartIndex=inStartIndex.Value;
ReadRecords_OUTPUT output = new ReadRecords_OUTPUT();
uint returnValue = base.Invoke("ReadRecords",input,out output);
outTotalRecordCount=0;
outRecordsReturned=0;
outEventRecords=null;
if (returnValue == 0)
{
if (output.ContainsField("TotalRecordCount"))
outTotalRecordCount = output.TotalRecordCount;
if (output.ContainsField("RecordsReturned"))
outRecordsReturned = output.RecordsReturned;
if (output.ContainsField("EventRecords"))
outEventRecords = output.EventRecords;
}
return returnValue;
}
///
///This method is used by an auditor to stop the system from logging any records while exporting and clearing the log. It performs lock, unlock or allows unprovisioning of the system. When the audit log is locked, no events are written into the log. Any events marked in the policy as critical will not be executed. If the log is locked and another lock is requested with the same handle, so the timeout will be renewed with the new LockTimeoutInSeconds.
///
[System.SerializableAttribute()]
[System.Xml.Serialization.XmlTypeAttribute(AnonymousType=true)]
[System.Xml.Serialization.XmlRootAttribute(Namespace="http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog", IsNullable=false)]
private class SetAuditLock_INPUT : CimParams
{
public SetAuditLock_INPUT(string ns) : base(ns)
{
}
///
/// Optional, The maximum number of seconds that the audit log will be locked in case for some reason the auditor fails to unlock the log. Max value is 5 minutes. This parameter is required when the flag parameter has a value of AUDIT_LOG_LOCK, or UNPROVISIONING_LOCK. This parameter is not required and is ignored when AUDIT_LOG_UNLOCK flag is used.
///
[CimField(false,false)]
public virtual uint LockTimeoutInSeconds
{
set
{
this.SetOrAddField("LockTimeoutInSeconds",value.ToString(CultureInfo.InvariantCulture));
}
}
///
/// Required, Defines the locking action.
///
[CimField(false,true)]
public virtual uint Flag
{
set
{
this.SetOrAddField("Flag",value.ToString(CultureInfo.InvariantCulture));
}
}
///
/// Optional, A handle is received when locking the log. As long as the log is locked, lock and unlock requests can be performed only by using the same handle. If the log is not locked so Handle-IN is not required and is ignored. Handle-OUT is not supplied when SetAuditLock failed to lock the audit log or when unlock is preformed.
///
[CimField(false,false)]
public virtual uint Handle
{
set
{
this.SetOrAddField("Handle",value.ToString(CultureInfo.InvariantCulture));
}
}
}
///
///This method is used by an auditor to stop the system from logging any records while exporting and clearing the log. It performs lock, unlock or allows unprovisioning of the system. When the audit log is locked, no events are written into the log. Any events marked in the policy as critical will not be executed. If the log is locked and another lock is requested with the same handle, so the timeout will be renewed with the new LockTimeoutInSeconds.
///
[System.SerializableAttribute()]
[System.Xml.Serialization.XmlTypeAttribute(AnonymousType=true)]
[System.Xml.Serialization.XmlRootAttribute(Namespace="http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog", IsNullable=false)]
private class SetAuditLock_OUTPUT : CimParams
{
public SetAuditLock_OUTPUT() : base("")
{
}
///
/// Optional, A handle is received when locking the log. As long as the log is locked, lock and unlock requests can be performed only by using the same handle. If the log is not locked so Handle-IN is not required and is ignored. Handle-OUT is not supplied when SetAuditLock failed to lock the audit log or when unlock is preformed.
///
[CimField(false,false)]
public virtual uint Handle
{
get
{
return uint.Parse(this["Handle"][0], CultureInfo.InvariantCulture);
}
}
}
///
///This method is used by an auditor to stop the system from logging any records while exporting and clearing the log. It performs lock, unlock or allows unprovisioning of the system. When the audit log is locked, no events are written into the log. Any events marked in the policy as critical will not be executed. If the log is locked and another lock is requested with the same handle, so the timeout will be renewed with the new LockTimeoutInSeconds.
///
/// Optional, IN -The maximum number of seconds that the audit log will be locked in case for some reason the auditor fails to unlock the log. Max value is 5 minutes. This parameter is required when the flag parameter has a value of AUDIT_LOG_LOCK, or UNPROVISIONING_LOCK. This parameter is not required and is ignored when AUDIT_LOG_UNLOCK flag is used.
/// Required, IN -Defines the locking action.
/// Optional, IN -A handle is received when locking the log. As long as the log is locked, lock and unlock requests can be performed only by using the same handle. If the log is not locked so Handle-IN is not required and is ignored. Handle-OUT is not supplied when SetAuditLock failed to lock the audit log or when unlock is preformed.
/// OUT - A handle is received when locking the log. As long as the log is locked, lock and unlock requests can be performed only by using the same handle. If the log is not locked so Handle-IN is not required and is ignored. Handle-OUT is not supplied when SetAuditLock failed to lock the audit log or when unlock is preformed.
///
/// Legal values:
/// PT_STATUS_SUCCESS : 0
/// PT_STATUS_INTERNAL_ERROR : 1
/// PT_STATUS_NOT_READY : 2
/// PT_STATUS_NOT_PERMITTED : 16
/// PT_STATUS_INVALID_PARAMETER : 36
/// PT_STATUS_INVALID_HANDLE : 2053
///
public virtual uint SetAuditLock(uint? inLockTimeoutInSeconds,uint? inFlag,uint? inHandle,out uint outHandle)
{
SetAuditLock_INPUT input = new SetAuditLock_INPUT(this.XmlNamespace);
if (inLockTimeoutInSeconds.HasValue)
input.LockTimeoutInSeconds=inLockTimeoutInSeconds.Value;
if (inFlag.HasValue)
input.Flag=inFlag.Value;
if (inHandle.HasValue)
input.Handle=inHandle.Value;
SetAuditLock_OUTPUT output = new SetAuditLock_OUTPUT();
uint returnValue = base.Invoke("SetAuditLock",input,out output);
outHandle=0;
if (returnValue == 0)
{
if (output.ContainsField("Handle"))
outHandle = output.Handle;
}
return returnValue;
}
///
///Returns the audit log signature and log related information.
///
[System.SerializableAttribute()]
[System.Xml.Serialization.XmlTypeAttribute(AnonymousType=true)]
[System.Xml.Serialization.XmlRootAttribute(Namespace="http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog", IsNullable=false)]
private class ExportAuditLogSignature_INPUT : CimParams
{
public ExportAuditLogSignature_INPUT(string ns) : base(ns)
{
}
///
/// Required, Signing Mechanism
///
[CimField(false,true)]
public virtual uint SigningMechanism
{
set
{
this.SetOrAddField("SigningMechanism",value.ToString(CultureInfo.InvariantCulture));
}
}
}
///
///Returns the audit log signature and log related information.
///
[System.SerializableAttribute()]
[System.Xml.Serialization.XmlTypeAttribute(AnonymousType=true)]
[System.Xml.Serialization.XmlRootAttribute(Namespace="http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog", IsNullable=false)]
private class ExportAuditLogSignature_OUTPUT : CimParams
{
public ExportAuditLogSignature_OUTPUT() : base("")
{
}
///
/// Optional, The total number of event records in the event log.
///
[CimField(false,false)]
public virtual uint TotalRecordCount
{
get
{
return uint.Parse(this["TotalRecordCount"][0], CultureInfo.InvariantCulture);
}
}
///
/// Optional, Time stamp of the first record.
///
[CimField(false,false)]
public virtual CimDateTime StartLogTime
{
get
{
return CimDateTime.Parse(this["StartLogTime"][0]);
}
}
///
/// Optional, Time stamp of the last record.
///
[CimField(false,false)]
public virtual CimDateTime EndLogTime
{
get
{
return CimDateTime.Parse(this["EndLogTime"][0]);
}
}
///
/// Optional, Time stamp indicating when was the signature generated.
///
[CimField(false,false)]
public virtual CimDateTime GenerationTime
{
get
{
return CimDateTime.Parse(this["GenerationTime"][0]);
}
}
///
/// Optional, UUID of the current system for identifying it in the audit repository.
///
[CimField(false,false)]
public virtual string UUID
{
get
{
return this.GetField("UUID")[0];
}
}
///
/// Optional, FQDN of the system.
///
[CimField(false,false)]
public virtual string FQDN
{
get
{
return this.GetField("FQDN")[0];
}
}
///
/// Optional, Signature mechanism.
///
[CimField(false,false)]
public virtual uint SignatureMechanism
{
get
{
return uint.Parse(this["SignatureMechanism"][0], CultureInfo.InvariantCulture);
}
}
///
/// Optional, The audit log signature, 1024 bytes long.
///
[CimField(false,false)]
public virtual byte[] Signature
{
get
{
return Convert.FromBase64String(this.GetField("Signature")[0]); }
}
///
/// Optional, An array specifying the length of each certificate.
///
[CimField(false,false)]
public virtual ushort[] LengthOfCertificates
{
get
{
string[] arr = this["LengthOfCertificates"];
List newArr = new List();
foreach (string str in arr)
{
newArr.Add(ushort.Parse(str, CultureInfo.InvariantCulture));
}
return newArr.ToArray();
}
}
///
/// Optional, The certificates, cascaded into one stream.
///
[CimField(false,false)]
public virtual byte[] Certificates
{
get
{
return Convert.FromBase64String(this.GetField("Certificates")[0]); }
}
}
///
///Returns the audit log signature and log related information.
///
/// Required, IN -Signing Mechanism
/// OUT - The total number of event records in the event log.
/// OUT - Time stamp of the first record.
/// OUT - Time stamp of the last record.
/// OUT - Time stamp indicating when was the signature generated.
/// OUT - UUID of the current system for identifying it in the audit repository.
/// OUT - FQDN of the system.
/// OUT - Signature mechanism.
/// OUT - The audit log signature, 1024 bytes long.
/// OUT - An array specifying the length of each certificate.
/// OUT - The certificates, cascaded into one stream.
///
/// Legal values:
/// PT_STATUS_SUCCESS : 0
/// PT_INTERNAL_ERROR : 1
/// PT_STATUS_NOT_READY : 2
/// PT_STATUS_NOT_PERMITTED : 16
/// PT_STATUS_UNSUPPORTED : 2066
///
public virtual uint ExportAuditLogSignature(uint? inSigningMechanism,out uint outTotalRecordCount,out CimDateTime outStartLogTime,out CimDateTime outEndLogTime,out CimDateTime outGenerationTime,out string outUUID,out string outFQDN,out uint outSignatureMechanism,out byte[] outSignature,out ushort[] outLengthOfCertificates,out byte[] outCertificates)
{
ExportAuditLogSignature_INPUT input = new ExportAuditLogSignature_INPUT(this.XmlNamespace);
if (inSigningMechanism.HasValue)
input.SigningMechanism=inSigningMechanism.Value;
ExportAuditLogSignature_OUTPUT output = new ExportAuditLogSignature_OUTPUT();
uint returnValue = base.Invoke("ExportAuditLogSignature",input,out output);
outTotalRecordCount=0;
outStartLogTime=null;
outEndLogTime=null;
outGenerationTime=null;
outUUID=null;
outFQDN=null;
outSignatureMechanism=0;
outSignature=null;
outLengthOfCertificates=null;
outCertificates=null;
if (returnValue == 0)
{
if (output.ContainsField("TotalRecordCount"))
outTotalRecordCount = output.TotalRecordCount;
if (output.ContainsField("StartLogTime"))
outStartLogTime = output.StartLogTime;
if (output.ContainsField("EndLogTime"))
outEndLogTime = output.EndLogTime;
if (output.ContainsField("GenerationTime"))
outGenerationTime = output.GenerationTime;
if (output.ContainsField("UUID"))
outUUID = output.UUID;
if (output.ContainsField("FQDN"))
outFQDN = output.FQDN;
if (output.ContainsField("SignatureMechanism"))
outSignatureMechanism = output.SignatureMechanism;
if (output.ContainsField("Signature"))
outSignature = output.Signature;
if (output.ContainsField("LengthOfCertificates"))
outLengthOfCertificates = output.LengthOfCertificates;
if (output.ContainsField("Certificates"))
outCertificates = output.Certificates;
}
return returnValue;
}
///
///Sets the key and certificates needed for the signing of the audit log. This method must be called before enabling the audit log.
///
[System.SerializableAttribute()]
[System.Xml.Serialization.XmlTypeAttribute(AnonymousType=true)]
[System.Xml.Serialization.XmlRootAttribute(Namespace="http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog", IsNullable=false)]
private class SetSigningKeyMaterial_INPUT : CimParams
{
public SetSigningKeyMaterial_INPUT(string ns) : base(ns)
{
}
///
/// Required, Audit data signing mechanism type.
///
[CimField(false,true)]
public virtual uint SigningMechanismType
{
set
{
this.SetOrAddField("SigningMechanismType",value.ToString(CultureInfo.InvariantCulture));
}
}
///
/// Required, Key pair (RSA 2048 bit modulus).
///
[CimField(false,true)]
public virtual byte[] SigningKey
{
set
{
this.SetOrAddField("SigningKey",Convert.ToBase64String(value));
}
}
///
/// Required, An array specifying the length of each certificate.
///
[CimField(false,true)]
public virtual ushort[] LengthOfCertificates
{
set
{
List newArr = new List();
foreach (ushort val in value)
{
newArr.Add(val.ToString(CultureInfo.InvariantCulture));
}
this.SetOrAddField("LengthOfCertificates",newArr.ToArray());
}
}
///
/// Required, Up to 5 certificates cascaded into one stream (with a total length of 4100 bytes).
///
[CimField(false,true)]
public virtual byte[] Certificates
{
set
{
this.SetOrAddField("Certificates",Convert.ToBase64String(value));
}
}
}
///
///Sets the key and certificates needed for the signing of the audit log. This method must be called before enabling the audit log.
///
[System.SerializableAttribute()]
[System.Xml.Serialization.XmlTypeAttribute(AnonymousType=true)]
[System.Xml.Serialization.XmlRootAttribute(Namespace="http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog", IsNullable=false)]
private class SetSigningKeyMaterial_OUTPUT : CimParams
{
public SetSigningKeyMaterial_OUTPUT() : base("")
{
}
}
///
///Sets the key and certificates needed for the signing of the audit log. This method must be called before enabling the audit log.
///
/// Required, IN -Audit data signing mechanism type.
/// Required, IN -Key pair (RSA 2048 bit modulus).
/// Required, IN -An array specifying the length of each certificate.
/// Required, IN -Up to 5 certificates cascaded into one stream (with a total length of 4100 bytes).
///
/// Legal values:
/// PT_STATUS_SUCCESS : 0
/// PT_STATUS_INTERNAL_ERROR : 1
/// PT_STATUS_NOT_READY : 2
/// PT_STATUS_INVALID_PARAMETER : 36
/// PT_STATUS_FLASH_WRITE_LIMIT_EXCEEDED : 38
/// PT_STATUS_INVALID_KEY : 2062
/// PT_STATUS_INVALID_CERT : 2063
/// PT_STATUS_CERT_KEY_NOT_MATCH : 2064
/// PT_STATUS_UNSUPPORTED : 2066
///
public virtual uint SetSigningKeyMaterial(uint? inSigningMechanismType,byte[] inSigningKey,ushort[] inLengthOfCertificates,byte[] inCertificates)
{
SetSigningKeyMaterial_INPUT input = new SetSigningKeyMaterial_INPUT(this.XmlNamespace);
if (inSigningMechanismType.HasValue)
input.SigningMechanismType=inSigningMechanismType.Value;
if (inSigningKey != null)
input.SigningKey=inSigningKey;
if (inLengthOfCertificates != null)
input.LengthOfCertificates=inLengthOfCertificates;
if (inCertificates != null)
input.Certificates=inCertificates;
SetSigningKeyMaterial_OUTPUT output = new SetSigningKeyMaterial_OUTPUT();
uint returnValue = base.Invoke("SetSigningKeyMaterial",input,out output);
return returnValue;
}
///
/// Enumerate instances of AMT_AuditLog class at an endpoint.
///
/// WS-Management client
/// Keys for selecting the instances
/// Collection of AMT_AuditLog objects
public static new Collection Enumerate(IWSManClient client, CimBase.CimKeys cimKeys)
{
List ret = CimBase.Enumerate(client, cimKeys);
return new Collection(ret);
}
///
/// Enumerate instances of AMT_AuditLog class at an endpoint.
///
/// WS-Management client
/// Collection of AMT_AuditLog objects
public static new Collection Enumerate(IWSManClient client)
{
List ret = CimBase.Enumerate(client);
return new Collection(ret);
}
///
/// Delete the instance of AMT_AuditLog if it is singular.
/// Note: This method will succeed only if a single instance of the class exists.
///
/// WS-Management client
public static new void Delete(IWSManClient client)
{
CimBase.Delete(client);
}
///
/// Represents the keys of the AMT_AuditLog class.
///
public new class CimKeys : CIM_Log.CimKeys
{
///
/// Key, Required,
///
public virtual string Name
{
get
{
return GetKey("Name");
}
set
{
SetOrAddKey("Name", value);
}
}
}
}
}