Loading...
1// SPDX-License-Identifier: GPL-2.0-or-later
2/* Null security operations.
3 *
4 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
5 * Written by David Howells (dhowells@redhat.com)
6 */
7
8#include <net/af_rxrpc.h>
9#include "ar-internal.h"
10
11static int none_init_connection_security(struct rxrpc_connection *conn,
12 struct rxrpc_key_token *token)
13{
14 return 0;
15}
16
17/*
18 * Allocate an appropriately sized buffer for the amount of data remaining.
19 */
20static struct rxrpc_txbuf *none_alloc_txbuf(struct rxrpc_call *call, size_t remain, gfp_t gfp)
21{
22 return rxrpc_alloc_data_txbuf(call, min_t(size_t, remain, RXRPC_JUMBO_DATALEN), 1, gfp);
23}
24
25static int none_secure_packet(struct rxrpc_call *call, struct rxrpc_txbuf *txb)
26{
27 return 0;
28}
29
30static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb)
31{
32 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
33
34 sp->flags |= RXRPC_RX_VERIFIED;
35 return 0;
36}
37
38static void none_free_call_crypto(struct rxrpc_call *call)
39{
40}
41
42static int none_respond_to_challenge(struct rxrpc_connection *conn,
43 struct sk_buff *skb)
44{
45 return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
46 rxrpc_eproto_rxnull_challenge);
47}
48
49static int none_verify_response(struct rxrpc_connection *conn,
50 struct sk_buff *skb)
51{
52 return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
53 rxrpc_eproto_rxnull_response);
54}
55
56static void none_clear(struct rxrpc_connection *conn)
57{
58}
59
60static int none_init(void)
61{
62 return 0;
63}
64
65static void none_exit(void)
66{
67}
68
69/*
70 * RxRPC Kerberos-based security
71 */
72const struct rxrpc_security rxrpc_no_security = {
73 .name = "none",
74 .security_index = RXRPC_SECURITY_NONE,
75 .init = none_init,
76 .exit = none_exit,
77 .init_connection_security = none_init_connection_security,
78 .free_call_crypto = none_free_call_crypto,
79 .alloc_txbuf = none_alloc_txbuf,
80 .secure_packet = none_secure_packet,
81 .verify_packet = none_verify_packet,
82 .respond_to_challenge = none_respond_to_challenge,
83 .verify_response = none_verify_response,
84 .clear = none_clear,
85};
1/* Null security operations.
2 *
3 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public Licence
8 * as published by the Free Software Foundation; either version
9 * 2 of the Licence, or (at your option) any later version.
10 */
11
12#include <net/af_rxrpc.h>
13#include "ar-internal.h"
14
15static int none_init_connection_security(struct rxrpc_connection *conn)
16{
17 return 0;
18}
19
20static int none_prime_packet_security(struct rxrpc_connection *conn)
21{
22 return 0;
23}
24
25static int none_secure_packet(struct rxrpc_call *call,
26 struct sk_buff *skb,
27 size_t data_size,
28 void *sechdr)
29{
30 return 0;
31}
32
33static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb,
34 unsigned int offset, unsigned int len,
35 rxrpc_seq_t seq, u16 expected_cksum)
36{
37 return 0;
38}
39
40static void none_locate_data(struct rxrpc_call *call, struct sk_buff *skb,
41 unsigned int *_offset, unsigned int *_len)
42{
43}
44
45static int none_respond_to_challenge(struct rxrpc_connection *conn,
46 struct sk_buff *skb,
47 u32 *_abort_code)
48{
49 *_abort_code = RX_PROTOCOL_ERROR;
50 return -EPROTO;
51}
52
53static int none_verify_response(struct rxrpc_connection *conn,
54 struct sk_buff *skb,
55 u32 *_abort_code)
56{
57 *_abort_code = RX_PROTOCOL_ERROR;
58 return -EPROTO;
59}
60
61static void none_clear(struct rxrpc_connection *conn)
62{
63}
64
65static int none_init(void)
66{
67 return 0;
68}
69
70static void none_exit(void)
71{
72}
73
74/*
75 * RxRPC Kerberos-based security
76 */
77const struct rxrpc_security rxrpc_no_security = {
78 .name = "none",
79 .security_index = RXRPC_SECURITY_NONE,
80 .init = none_init,
81 .exit = none_exit,
82 .init_connection_security = none_init_connection_security,
83 .prime_packet_security = none_prime_packet_security,
84 .secure_packet = none_secure_packet,
85 .verify_packet = none_verify_packet,
86 .locate_data = none_locate_data,
87 .respond_to_challenge = none_respond_to_challenge,
88 .verify_response = none_verify_response,
89 .clear = none_clear,
90};