2019-05-21 01:08:01 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2016-04-08 00:23:58 +08:00
|
|
|
/* Null security operations.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
|
|
|
|
* Written by David Howells (dhowells@redhat.com)
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <net/af_rxrpc.h>
|
|
|
|
#include "ar-internal.h"
|
|
|
|
|
2020-09-16 15:19:12 +08:00
|
|
|
static int none_init_connection_security(struct rxrpc_connection *conn,
|
|
|
|
struct rxrpc_key_token *token)
|
2016-04-08 00:23:58 +08:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-09-16 08:34:39 +08:00
|
|
|
/*
|
2024-01-30 07:47:57 +08:00
|
|
|
* Allocate an appropriately sized buffer for the amount of data remaining.
|
2020-09-16 08:34:39 +08:00
|
|
|
*/
|
2024-01-30 07:47:57 +08:00
|
|
|
static struct rxrpc_txbuf *none_alloc_txbuf(struct rxrpc_call *call, size_t remain, gfp_t gfp)
|
2020-09-16 08:34:39 +08:00
|
|
|
{
|
2024-04-28 19:16:38 +08:00
|
|
|
return rxrpc_alloc_data_txbuf(call, min_t(size_t, remain, RXRPC_JUMBO_DATALEN), 1, gfp);
|
2020-09-16 08:34:39 +08:00
|
|
|
}
|
|
|
|
|
2022-04-01 06:55:08 +08:00
|
|
|
static int none_secure_packet(struct rxrpc_call *call, struct rxrpc_txbuf *txb)
|
2016-04-08 00:23:58 +08:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-10-08 00:44:39 +08:00
|
|
|
static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb)
|
2016-04-08 00:23:58 +08:00
|
|
|
{
|
2022-10-08 00:44:39 +08:00
|
|
|
struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
|
|
|
|
|
|
|
|
sp->flags |= RXRPC_RX_VERIFIED;
|
2016-04-08 00:23:58 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-07-30 22:56:57 +08:00
|
|
|
static void none_free_call_crypto(struct rxrpc_call *call)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2016-04-08 00:23:58 +08:00
|
|
|
static int none_respond_to_challenge(struct rxrpc_connection *conn,
|
2022-10-20 16:56:36 +08:00
|
|
|
struct sk_buff *skb)
|
2016-04-08 00:23:58 +08:00
|
|
|
{
|
2022-10-07 04:45:42 +08:00
|
|
|
return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
|
|
|
|
rxrpc_eproto_rxnull_challenge);
|
2016-04-08 00:23:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int none_verify_response(struct rxrpc_connection *conn,
|
2022-10-20 16:56:36 +08:00
|
|
|
struct sk_buff *skb)
|
2016-04-08 00:23:58 +08:00
|
|
|
{
|
2022-10-07 04:45:42 +08:00
|
|
|
return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
|
|
|
|
rxrpc_eproto_rxnull_response);
|
2016-04-08 00:23:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void none_clear(struct rxrpc_connection *conn)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static int none_init(void)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void none_exit(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* RxRPC Kerberos-based security
|
|
|
|
*/
|
|
|
|
const struct rxrpc_security rxrpc_no_security = {
|
|
|
|
.name = "none",
|
|
|
|
.security_index = RXRPC_SECURITY_NONE,
|
|
|
|
.init = none_init,
|
|
|
|
.exit = none_exit,
|
|
|
|
.init_connection_security = none_init_connection_security,
|
2019-07-30 22:56:57 +08:00
|
|
|
.free_call_crypto = none_free_call_crypto,
|
2024-01-30 07:47:57 +08:00
|
|
|
.alloc_txbuf = none_alloc_txbuf,
|
2016-04-08 00:23:58 +08:00
|
|
|
.secure_packet = none_secure_packet,
|
|
|
|
.verify_packet = none_verify_packet,
|
|
|
|
.respond_to_challenge = none_respond_to_challenge,
|
|
|
|
.verify_response = none_verify_response,
|
|
|
|
.clear = none_clear,
|
|
|
|
};
|