1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /* Null security operations.
3 *
4 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
5 * Written by David Howells (dhowells@redhat.com)
6 */
7
8 #include <net/af_rxrpc.h>
9 #include "ar-internal.h"
10
none_init_connection_security(struct rxrpc_connection * conn,struct rxrpc_key_token * token)11 static int none_init_connection_security(struct rxrpc_connection *conn,
12 struct rxrpc_key_token *token)
13 {
14 return 0;
15 }
16
17 /*
18 * Allocate an appropriately sized buffer for the amount of data remaining.
19 */
none_alloc_txbuf(struct rxrpc_call * call,size_t remain,gfp_t gfp)20 static struct rxrpc_txbuf *none_alloc_txbuf(struct rxrpc_call *call, size_t remain, gfp_t gfp)
21 {
22 return rxrpc_alloc_data_txbuf(call, umin(remain, RXRPC_JUMBO_DATALEN), 1, gfp);
23 }
24
none_secure_packet(struct rxrpc_call * call,struct rxrpc_txbuf * txb)25 static int none_secure_packet(struct rxrpc_call *call, struct rxrpc_txbuf *txb)
26 {
27 txb->pkt_len = txb->len;
28 if (txb->len == RXRPC_JUMBO_DATALEN)
29 txb->jumboable = true;
30 return 0;
31 }
32
none_verify_packet(struct rxrpc_call * call,struct sk_buff * skb)33 static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb)
34 {
35 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
36
37 sp->flags |= RXRPC_RX_VERIFIED;
38 return 0;
39 }
40
none_free_call_crypto(struct rxrpc_call * call)41 static void none_free_call_crypto(struct rxrpc_call *call)
42 {
43 }
44
none_validate_challenge(struct rxrpc_connection * conn,struct sk_buff * skb)45 static bool none_validate_challenge(struct rxrpc_connection *conn,
46 struct sk_buff *skb)
47 {
48 rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
49 rxrpc_eproto_rxnull_challenge);
50 return true;
51 }
52
none_sendmsg_respond_to_challenge(struct sk_buff * challenge,struct msghdr * msg)53 static int none_sendmsg_respond_to_challenge(struct sk_buff *challenge,
54 struct msghdr *msg)
55 {
56 return -EINVAL;
57 }
58
none_verify_response(struct rxrpc_connection * conn,struct sk_buff * skb)59 static int none_verify_response(struct rxrpc_connection *conn,
60 struct sk_buff *skb)
61 {
62 return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
63 rxrpc_eproto_rxnull_response);
64 }
65
none_clear(struct rxrpc_connection * conn)66 static void none_clear(struct rxrpc_connection *conn)
67 {
68 }
69
none_init(void)70 static int none_init(void)
71 {
72 return 0;
73 }
74
none_exit(void)75 static void none_exit(void)
76 {
77 }
78
79 /*
80 * RxRPC Kerberos-based security
81 */
82 const struct rxrpc_security rxrpc_no_security = {
83 .name = "none",
84 .security_index = RXRPC_SECURITY_NONE,
85 .init = none_init,
86 .exit = none_exit,
87 .init_connection_security = none_init_connection_security,
88 .free_call_crypto = none_free_call_crypto,
89 .alloc_txbuf = none_alloc_txbuf,
90 .secure_packet = none_secure_packet,
91 .verify_packet = none_verify_packet,
92 .validate_challenge = none_validate_challenge,
93 .sendmsg_respond_to_challenge = none_sendmsg_respond_to_challenge,
94 .verify_response = none_verify_response,
95 .clear = none_clear,
96 };
97