release.txt Driver File Contents (Broadcom827.exe)

Release Notes
=============

                       Broadcom ASF Management Console
                                 For Win32
  
                Copyright (c) 2000-2005 Broadcom Corporation
                            All rights reserved.


Version 1.22 (March 25, 2005)
-----------------------------

   Enhancements:
   =============
   1. Change:
      The right-click "pop-up" menu on the Events tab now includes menu items
      for copying the selected event or all events to the Windows clipboard.
      Useful for pasting PET events into bug reports or support e-mails.

   2. Change:
      Log all error message details (even if the "Log" checkbox is unchecked).
      When stressing an ASF adapter, the "Log" checkbox is often unchecked
      for performance reasons and errors were not always logged in this case.

   3. Change:
      Created a separate column in the Events tab for the Event Sensor "Type"
      and "Description". Previously, both the hexadecimal sensor "Type" value
      and textual description were in the same column, causing some OEM
      confusion.


Version 1.21 (September 1, 2004)
-------------------------------
   Fixes:
   ======
   1. Problem:
      The "Beep" check-box on the Events tab doesn't work on Windows XP
      (no audible beep is heard upon received event messages).

      Change:
      Changed the Beep API call to specify a frequency and duration rather
      than relying on Windows to use the MessageBeep API to play the
      "OK" sound.

   2. Problem: (CQ 10826)
      Secure RMCP acknowledgement RSP headers contained the session ID of
      and sequence numbers from the originally received RSP header.
      
      Change:
      Secure RMCP acknowledgement RSP headers now contain the session ID
      of the "destination entity" (the client) and the appropriate
      (incremented) sequence number, rather than just a copy of the received
      RSP header.

   3. Problem: (CQ 10854)
      The Management Console did not verify the DWORD-alignment of the
      "integrity data" field in received secure RMCP messages (responses).

      Change:
      VerifyRspTrailer() now verifies the DWORD-alignment of integrity-
      protected data in secure RMCP responses (catches CQ 10854).

      Impact:
      RMCP "Close Session Response" packets received from ASF Firmware v6.21
      and earlier will fail the RSP integrity check.


Version 1.20 (August 16, 2004)
------------------------------
   Fixes:
   ======
   1. Problem:
      Management console's RSP sequence number was not being incremented
      *before* being included in RSP headers (for secure RMCP packets).
      This would cause a sequence number of 0 to be used for the first
      secure packet (following session establishment), which is a protocol
      violation.
      
      ASF managed clients that verify the RSP sequence number (e.g.
      Broadcom ASF 2.0 Firmware v6.20) will ignore the first packet.
      
      Change:
      Increment the RSP sequence number *before* including in RSP headers
      for outbound secure RMCP messages. Additionally, the sequence number
      is only incremented for packets transmitted over non-Bypass (secure)
      sessions.
 
      
   2. Problem:
      Management console did not verify session ID or sequence number of
      secure RMCP response packets, which is a protocol violation.
      
      Change:
      RMCP response packets with invalid session ID or sequence numbers are
      logged and ignored.
      
      Impact:
      Must use Broadcom ASF 2.0 Firmware v6.20 or later. Previous versions
      included the *client* RSP session ID in the RSP header. Interactions
      with older firmware will only work if both the management console and
      managed client's session IDs are the same value.
      
      
   Enhancements:
   =============
   1. Change:
      Version information displayed is read from the version resource
      embedded in the .exe, making the displayed version more accurate.
      
   2. Change:
      Additional RMCP command/response packet parsing/debug output.
      e.g. Now parsed and displayed from RMCP responses: 
      - System state
      - System capabilities
      - Firmware capabilities
      - Supported interactions
      - Supported entities
      - Supported special commands
      
      
Version 1.13 (April 21, 2004)
-----------------------------
   Fixes:
   ======
   1. Problem:
      When viewing PET event details, some event entity descriptions were
      wrong.

      Cause:
      PET event entity descriptions were based on IPMI PET 1.0 specification.
      Entity values 19-38 were re-defined by the ASF specification.

      Change:
      Use descriptions of IPMI Entity IDs from ASF specification, sections
      A.7 and A.8.


   2. Problem:
      When viewing PET event details, the event and trap source descriptions
      were wrong.

      Cause:
      Event and trap source descriptions were based on wrong offsets in SNMP
      message.

      Change:
      Use correct offsets for source description table lookup.


   Enhancements:
   =============
   1. Change:
      Moved "Secure Management (ASF 2.0)" button to "Manage" tab sheet
      to make toggling between secure and insecure ASF more easy.
      The "Security" tab sheet now disappears and reappears based on
      this checkbox (rather than disabling/graying the controls).

   2. Change:
      Added toolbar button to the "Manage" tab to open and authenticate
      a secure session, or close an open session.

   3. Change:
      Display PET Event Sensor Type in hexadecimal along with description.

   4. Change:
      Added hints ("tool-tips") for PET Event Details dialog to clarify
      displayed values, including indications of "decimal" or "hexadecimal"
      notation.

   5. Change:
      The following PET Event Details values are now displayed in
      hexadecimal notation: event severity, sensor dev (SMBus address) and
      sensor number.


Version 1.12 (April 12, 2004)
-----------------------------
   Fixes:
   ======
   1. Problem:
      Entering a security key byte value of hexadecimal FF and toggling
      between Hex and ASCII representation would expand the string beyond
      the key buffer bounds, eventually crashing the application.

      Cause:
      The FF value was being sign-extended to a 32-bit negative value.

      Change:
      Convert hexadecimal byte values to unsigned 8-bit value before
      converting to ASCII.

   Enhancements:
   =============
   1. Change:
      Added a toolbar with a set of buttons for quickly and conveniently
      sending a single remote management command: Ping, Capabilities
      Request, System State Request, Reset, Power Up, Power Down, and
      Power Reset.

   2. Change:
      Terminology of some text labels updated to more closely match the
      new ASF Configuration Control Panel Applet and documentation.


Version 1.11 (March 4, 2004)
----------------------------
   Enhancements:
   =============
   1. Change:
      Added support for security keys in hexadecimal notation. ASF 2.0
      RMCP security keys are not restricted to ASCII text. This feature
      allows an operator or administrator to authenticate a secure
      session with an ASF client using security keys that contain
      non-ASCII characters. You must use b57diag v7.21 or later to
      configure hexadecimal security keys on a Broadcom network adapter.


Version 1.10 (February 18, 2004)
--------------------------------
   Fixes:
   ======
   1. Problem: (CQ 9415)
      Leaving the Management Console unattended while RMCP stressing a
      client and/or receiving event packets from clients could consume
      unlimited amounts of system memory and take a long time (and 100%
      CPU utilization) to clear the PET event log.

      Cause:
      There was no limit imposed on the number of trapped PET events added
      to the Events log or RMCP transmit/receive information added to the
      Management log.

      Change:
      Added configurable limits for the number of Management log lines and
      PET events before older lines/events are automatically deleted.

      Impact:
      If a user needs to review a large number of Management log lines or
      PET events, they may need to increase the limits for these logs
      (under the "Settings" tab).

   Enhancements:
   =============
   1. Request: (CQ 9318)
      Display verbose translation of trapped PET event codes.

      Change:
      PET Events log now displays Trap, Event and Sensor source descriptions
      as well as numeric values of event type and offset in place of the 
      Enterprise string (always the same).

      Impact:
      User must display Event details to see Enterprise string.

   2. Change:
      Support unattended RMCP stress testing with RMCP "Stress" checkbox
      which causes repeated sending of RMCP commands to continue without
      interruption even if no RMCP ACKs or expected responses are
      received.

   3. Change:
      Support configurable RMCP timeout (while waiting for RMCP ACK or
      expected response).

   4. Change:
      Support RMCP command retries (configurable) when no valid RMCP ACK
      is received after sending an RMCP command.

   5. Change:
      Display (and allow the editing of) the Secure Session ID (on the 
      "Security" tab).

   6. Change:
      Added "Abort Session" button to "Security" tab to allow the Management
      Console to abandon an open session (by changing the current Secure
      Session ID to "0") without closing it. This allows testing of ASF
      firmware session ID allocation/reuse without running multiple
      Management Consoles.

   7. Change:
      Added "Mask Keys" checkbox to "Security" tab to hide key values
      (secrets) in edit boxes.

   8. Change:
      All configurable settings are now saved-to and restored-from the
      Windows Registry when the application is closed and run.


Version 1.00 (December 11, 2003)
-------------------------------
Initial release. See readme.txt for documentation.

   Fixes:
   ======
   None.

   Enhancements:
   =============
   None.


/* End of File */
Download Driver Pack

How To Update Drivers Manually

After your driver has been downloaded, follow these simple steps to install it.

  • Expand the archive file (if the download file is in zip or rar format).

  • If the expanded file has an .exe extension, double click it and follow the installation instructions.

  • Otherwise, open Device Manager by right-clicking the Start menu and selecting Device Manager.

  • Find the device and model you want to update in the device list.

  • Double-click on it to open the Properties dialog box.

  • From the Properties dialog box, select the Driver tab.

  • Click the Update Driver button, then follow the instructions.

Very important: You must reboot your system to ensure that any driver updates have taken effect.

For more help, visit our Driver Support section for step-by-step videos on how to install drivers for every file type.

server: web2, load: 1.82