2019-05-20 19:08:01 +02:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2016-04-07 17:23:58 +01:00
|
|
|
/* Null security operations.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
|
|
|
|
* Written by David Howells (dhowells@redhat.com)
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <net/af_rxrpc.h>
|
|
|
|
#include "ar-internal.h"
|
|
|
|
|
2020-09-16 08:19:12 +01:00
|
|
|
static int none_init_connection_security(struct rxrpc_connection *conn,
|
|
|
|
struct rxrpc_key_token *token)
|
2016-04-07 17:23:58 +01:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-09-16 01:34:39 +01:00
|
|
|
/*
|
2024-01-29 23:47:57 +00:00
|
|
|
* Allocate an appropriately sized buffer for the amount of data remaining.
|
2020-09-16 01:34:39 +01:00
|
|
|
*/
|
2024-01-29 23:47:57 +00:00
|
|
|
static struct rxrpc_txbuf *none_alloc_txbuf(struct rxrpc_call *call, size_t remain, gfp_t gfp)
|
2020-09-16 01:34:39 +01:00
|
|
|
{
|
2024-04-28 19:16:38 +08:00
|
|
|
return rxrpc_alloc_data_txbuf(call, min_t(size_t, remain, RXRPC_JUMBO_DATALEN), 1, gfp);
|
2020-09-16 01:34:39 +01:00
|
|
|
}
|
|
|
|
|
2022-03-31 23:55:08 +01:00
|
|
|
static int none_secure_packet(struct rxrpc_call *call, struct rxrpc_txbuf *txb)
|
2016-04-07 17:23:58 +01:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-10-07 17:44:39 +01:00
|
|
|
static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb)
|
2016-04-07 17:23:58 +01:00
|
|
|
{
|
2022-10-07 17:44:39 +01:00
|
|
|
struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
|
|
|
|
|
|
|
|
sp->flags |= RXRPC_RX_VERIFIED;
|
2016-04-07 17:23:58 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-07-30 15:56:57 +01:00
|
|
|
static void none_free_call_crypto(struct rxrpc_call *call)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2016-04-07 17:23:58 +01:00
|
|
|
static int none_respond_to_challenge(struct rxrpc_connection *conn,
|
2022-10-20 09:56:36 +01:00
|
|
|
struct sk_buff *skb)
|
2016-04-07 17:23:58 +01:00
|
|
|
{
|
2022-10-06 21:45:42 +01:00
|
|
|
return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
|
|
|
|
rxrpc_eproto_rxnull_challenge);
|
2016-04-07 17:23:58 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static int none_verify_response(struct rxrpc_connection *conn,
|
2022-10-20 09:56:36 +01:00
|
|
|
struct sk_buff *skb)
|
2016-04-07 17:23:58 +01:00
|
|
|
{
|
2022-10-06 21:45:42 +01:00
|
|
|
return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
|
|
|
|
rxrpc_eproto_rxnull_response);
|
2016-04-07 17:23:58 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static void none_clear(struct rxrpc_connection *conn)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static int none_init(void)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void none_exit(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* RxRPC Kerberos-based security
|
|
|
|
*/
|
|
|
|
const struct rxrpc_security rxrpc_no_security = {
|
|
|
|
.name = "none",
|
|
|
|
.security_index = RXRPC_SECURITY_NONE,
|
|
|
|
.init = none_init,
|
|
|
|
.exit = none_exit,
|
|
|
|
.init_connection_security = none_init_connection_security,
|
2019-07-30 15:56:57 +01:00
|
|
|
.free_call_crypto = none_free_call_crypto,
|
2024-01-29 23:47:57 +00:00
|
|
|
.alloc_txbuf = none_alloc_txbuf,
|
2016-04-07 17:23:58 +01:00
|
|
|
.secure_packet = none_secure_packet,
|
|
|
|
.verify_packet = none_verify_packet,
|
|
|
|
.respond_to_challenge = none_respond_to_challenge,
|
|
|
|
.verify_response = none_verify_response,
|
|
|
|
.clear = none_clear,
|
|
|
|
};
|