Project-Cerberus/core/intrusion
Christopher Weimer b4d4a717f8 Switch to new authorized command handling and remove legacy handlers.
This is the final piece rearchitecting the authorized command handling and config reset flows.  It decouples the command handling from the types of operations that can be executed after authorization, allowing easy extension to any platform-specific workflows.  Without the direct dependency on config_resete APIs, intrusion reset is also decoupled from resetting other configuration in the system.
2024-07-08 16:33:33 +00:00
..
authorized_execution_reset_intrusion.c Switch to new authorized command handling and remove legacy handlers. 2024-07-08 16:33:33 +00:00
authorized_execution_reset_intrusion.h Create authorized execution contexts for existing authorized commands. 2024-07-03 00:12:58 +00:00
authorized_execution_reset_intrusion_static.h Switch to new authorized command handling and remove legacy handlers. 2024-07-08 16:33:33 +00:00
intrusion_logging.h Merged PR 3286: Run uncrustify on cerberus-core repo 2024-05-16 05:19:56 +00:00
intrusion_manager.c Merged PR 3663: [Cerberus-core]: Integrate uncrustify on onefleet pipeline 2024-06-06 14:44:29 +00:00
intrusion_manager.h Merged PR 3356: Check intrusion state before resetting intrusion 2024-06-04 23:42:05 +00:00
intrusion_manager_async.c Merged PR 3286: Run uncrustify on cerberus-core repo 2024-05-16 05:19:56 +00:00
intrusion_manager_async.h Merged PR 3286: Run uncrustify on cerberus-core repo 2024-05-16 05:19:56 +00:00
intrusion_state.h Merged PR 3286: Run uncrustify on cerberus-core repo 2024-05-16 05:19:56 +00:00
intrusion_state_observer.h Merged PR 3286: Run uncrustify on cerberus-core repo 2024-05-16 05:19:56 +00:00