Loading...
1// SPDX-License-Identifier: GPL-2.0-or-later
2/* Null security operations.
3 *
4 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
5 * Written by David Howells (dhowells@redhat.com)
6 */
7
8#include <net/af_rxrpc.h>
9#include "ar-internal.h"
10
11static int none_init_connection_security(struct rxrpc_connection *conn,
12 struct rxrpc_key_token *token)
13{
14 return 0;
15}
16
17/*
18 * Allocate an appropriately sized buffer for the amount of data remaining.
19 */
20static struct rxrpc_txbuf *none_alloc_txbuf(struct rxrpc_call *call, size_t remain, gfp_t gfp)
21{
22 return rxrpc_alloc_data_txbuf(call, min_t(size_t, remain, RXRPC_JUMBO_DATALEN), 1, gfp);
23}
24
25static int none_secure_packet(struct rxrpc_call *call, struct rxrpc_txbuf *txb)
26{
27 return 0;
28}
29
30static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb)
31{
32 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
33
34 sp->flags |= RXRPC_RX_VERIFIED;
35 return 0;
36}
37
38static void none_free_call_crypto(struct rxrpc_call *call)
39{
40}
41
42static int none_respond_to_challenge(struct rxrpc_connection *conn,
43 struct sk_buff *skb)
44{
45 return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
46 rxrpc_eproto_rxnull_challenge);
47}
48
49static int none_verify_response(struct rxrpc_connection *conn,
50 struct sk_buff *skb)
51{
52 return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
53 rxrpc_eproto_rxnull_response);
54}
55
56static void none_clear(struct rxrpc_connection *conn)
57{
58}
59
60static int none_init(void)
61{
62 return 0;
63}
64
65static void none_exit(void)
66{
67}
68
69/*
70 * RxRPC Kerberos-based security
71 */
72const struct rxrpc_security rxrpc_no_security = {
73 .name = "none",
74 .security_index = RXRPC_SECURITY_NONE,
75 .init = none_init,
76 .exit = none_exit,
77 .init_connection_security = none_init_connection_security,
78 .free_call_crypto = none_free_call_crypto,
79 .alloc_txbuf = none_alloc_txbuf,
80 .secure_packet = none_secure_packet,
81 .verify_packet = none_verify_packet,
82 .respond_to_challenge = none_respond_to_challenge,
83 .verify_response = none_verify_response,
84 .clear = none_clear,
85};
1// SPDX-License-Identifier: GPL-2.0-or-later
2/* Null security operations.
3 *
4 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
5 * Written by David Howells (dhowells@redhat.com)
6 */
7
8#include <net/af_rxrpc.h>
9#include "ar-internal.h"
10
11static int none_init_connection_security(struct rxrpc_connection *conn)
12{
13 return 0;
14}
15
16static int none_prime_packet_security(struct rxrpc_connection *conn)
17{
18 return 0;
19}
20
21static int none_secure_packet(struct rxrpc_call *call,
22 struct sk_buff *skb,
23 size_t data_size,
24 void *sechdr)
25{
26 return 0;
27}
28
29static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb,
30 unsigned int offset, unsigned int len,
31 rxrpc_seq_t seq, u16 expected_cksum)
32{
33 return 0;
34}
35
36static void none_free_call_crypto(struct rxrpc_call *call)
37{
38}
39
40static void none_locate_data(struct rxrpc_call *call, struct sk_buff *skb,
41 unsigned int *_offset, unsigned int *_len)
42{
43}
44
45static int none_respond_to_challenge(struct rxrpc_connection *conn,
46 struct sk_buff *skb,
47 u32 *_abort_code)
48{
49 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
50
51 trace_rxrpc_rx_eproto(NULL, sp->hdr.serial,
52 tracepoint_string("chall_none"));
53 return -EPROTO;
54}
55
56static int none_verify_response(struct rxrpc_connection *conn,
57 struct sk_buff *skb,
58 u32 *_abort_code)
59{
60 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
61
62 trace_rxrpc_rx_eproto(NULL, sp->hdr.serial,
63 tracepoint_string("resp_none"));
64 return -EPROTO;
65}
66
67static void none_clear(struct rxrpc_connection *conn)
68{
69}
70
71static int none_init(void)
72{
73 return 0;
74}
75
76static void none_exit(void)
77{
78}
79
80/*
81 * RxRPC Kerberos-based security
82 */
83const struct rxrpc_security rxrpc_no_security = {
84 .name = "none",
85 .security_index = RXRPC_SECURITY_NONE,
86 .init = none_init,
87 .exit = none_exit,
88 .init_connection_security = none_init_connection_security,
89 .prime_packet_security = none_prime_packet_security,
90 .free_call_crypto = none_free_call_crypto,
91 .secure_packet = none_secure_packet,
92 .verify_packet = none_verify_packet,
93 .locate_data = none_locate_data,
94 .respond_to_challenge = none_respond_to_challenge,
95 .verify_response = none_verify_response,
96 .clear = none_clear,
97};