xref: /OK3568_Linux_fs/kernel/net/rxrpc/security.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-or-later
2*4882a593Smuzhiyun /* RxRPC security handling
3*4882a593Smuzhiyun  *
4*4882a593Smuzhiyun  * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
5*4882a593Smuzhiyun  * Written by David Howells (dhowells@redhat.com)
6*4882a593Smuzhiyun  */
7*4882a593Smuzhiyun 
8*4882a593Smuzhiyun #include <linux/module.h>
9*4882a593Smuzhiyun #include <linux/net.h>
10*4882a593Smuzhiyun #include <linux/skbuff.h>
11*4882a593Smuzhiyun #include <linux/udp.h>
12*4882a593Smuzhiyun #include <linux/crypto.h>
13*4882a593Smuzhiyun #include <net/sock.h>
14*4882a593Smuzhiyun #include <net/af_rxrpc.h>
15*4882a593Smuzhiyun #include <keys/rxrpc-type.h>
16*4882a593Smuzhiyun #include "ar-internal.h"
17*4882a593Smuzhiyun 
18*4882a593Smuzhiyun static const struct rxrpc_security *rxrpc_security_types[] = {
19*4882a593Smuzhiyun 	[RXRPC_SECURITY_NONE]	= &rxrpc_no_security,
20*4882a593Smuzhiyun #ifdef CONFIG_RXKAD
21*4882a593Smuzhiyun 	[RXRPC_SECURITY_RXKAD]	= &rxkad,
22*4882a593Smuzhiyun #endif
23*4882a593Smuzhiyun };
24*4882a593Smuzhiyun 
rxrpc_init_security(void)25*4882a593Smuzhiyun int __init rxrpc_init_security(void)
26*4882a593Smuzhiyun {
27*4882a593Smuzhiyun 	int i, ret;
28*4882a593Smuzhiyun 
29*4882a593Smuzhiyun 	for (i = 0; i < ARRAY_SIZE(rxrpc_security_types); i++) {
30*4882a593Smuzhiyun 		if (rxrpc_security_types[i]) {
31*4882a593Smuzhiyun 			ret = rxrpc_security_types[i]->init();
32*4882a593Smuzhiyun 			if (ret < 0)
33*4882a593Smuzhiyun 				goto failed;
34*4882a593Smuzhiyun 		}
35*4882a593Smuzhiyun 	}
36*4882a593Smuzhiyun 
37*4882a593Smuzhiyun 	return 0;
38*4882a593Smuzhiyun 
39*4882a593Smuzhiyun failed:
40*4882a593Smuzhiyun 	for (i--; i >= 0; i--)
41*4882a593Smuzhiyun 		if (rxrpc_security_types[i])
42*4882a593Smuzhiyun 			rxrpc_security_types[i]->exit();
43*4882a593Smuzhiyun 	return ret;
44*4882a593Smuzhiyun }
45*4882a593Smuzhiyun 
rxrpc_exit_security(void)46*4882a593Smuzhiyun void rxrpc_exit_security(void)
47*4882a593Smuzhiyun {
48*4882a593Smuzhiyun 	int i;
49*4882a593Smuzhiyun 
50*4882a593Smuzhiyun 	for (i = 0; i < ARRAY_SIZE(rxrpc_security_types); i++)
51*4882a593Smuzhiyun 		if (rxrpc_security_types[i])
52*4882a593Smuzhiyun 			rxrpc_security_types[i]->exit();
53*4882a593Smuzhiyun }
54*4882a593Smuzhiyun 
55*4882a593Smuzhiyun /*
56*4882a593Smuzhiyun  * look up an rxrpc security module
57*4882a593Smuzhiyun  */
rxrpc_security_lookup(u8 security_index)58*4882a593Smuzhiyun static const struct rxrpc_security *rxrpc_security_lookup(u8 security_index)
59*4882a593Smuzhiyun {
60*4882a593Smuzhiyun 	if (security_index >= ARRAY_SIZE(rxrpc_security_types))
61*4882a593Smuzhiyun 		return NULL;
62*4882a593Smuzhiyun 	return rxrpc_security_types[security_index];
63*4882a593Smuzhiyun }
64*4882a593Smuzhiyun 
65*4882a593Smuzhiyun /*
66*4882a593Smuzhiyun  * initialise the security on a client connection
67*4882a593Smuzhiyun  */
rxrpc_init_client_conn_security(struct rxrpc_connection * conn)68*4882a593Smuzhiyun int rxrpc_init_client_conn_security(struct rxrpc_connection *conn)
69*4882a593Smuzhiyun {
70*4882a593Smuzhiyun 	const struct rxrpc_security *sec;
71*4882a593Smuzhiyun 	struct rxrpc_key_token *token;
72*4882a593Smuzhiyun 	struct key *key = conn->params.key;
73*4882a593Smuzhiyun 	int ret;
74*4882a593Smuzhiyun 
75*4882a593Smuzhiyun 	_enter("{%d},{%x}", conn->debug_id, key_serial(key));
76*4882a593Smuzhiyun 
77*4882a593Smuzhiyun 	if (!key)
78*4882a593Smuzhiyun 		return 0;
79*4882a593Smuzhiyun 
80*4882a593Smuzhiyun 	ret = key_validate(key);
81*4882a593Smuzhiyun 	if (ret < 0)
82*4882a593Smuzhiyun 		return ret;
83*4882a593Smuzhiyun 
84*4882a593Smuzhiyun 	token = key->payload.data[0];
85*4882a593Smuzhiyun 	if (!token)
86*4882a593Smuzhiyun 		return -EKEYREJECTED;
87*4882a593Smuzhiyun 
88*4882a593Smuzhiyun 	sec = rxrpc_security_lookup(token->security_index);
89*4882a593Smuzhiyun 	if (!sec)
90*4882a593Smuzhiyun 		return -EKEYREJECTED;
91*4882a593Smuzhiyun 	conn->security = sec;
92*4882a593Smuzhiyun 
93*4882a593Smuzhiyun 	ret = conn->security->init_connection_security(conn);
94*4882a593Smuzhiyun 	if (ret < 0) {
95*4882a593Smuzhiyun 		conn->security = &rxrpc_no_security;
96*4882a593Smuzhiyun 		return ret;
97*4882a593Smuzhiyun 	}
98*4882a593Smuzhiyun 
99*4882a593Smuzhiyun 	_leave(" = 0");
100*4882a593Smuzhiyun 	return 0;
101*4882a593Smuzhiyun }
102*4882a593Smuzhiyun 
103*4882a593Smuzhiyun /*
104*4882a593Smuzhiyun  * Find the security key for a server connection.
105*4882a593Smuzhiyun  */
rxrpc_look_up_server_security(struct rxrpc_local * local,struct rxrpc_sock * rx,const struct rxrpc_security ** _sec,struct key ** _key,struct sk_buff * skb)106*4882a593Smuzhiyun bool rxrpc_look_up_server_security(struct rxrpc_local *local, struct rxrpc_sock *rx,
107*4882a593Smuzhiyun 				   const struct rxrpc_security **_sec,
108*4882a593Smuzhiyun 				   struct key **_key,
109*4882a593Smuzhiyun 				   struct sk_buff *skb)
110*4882a593Smuzhiyun {
111*4882a593Smuzhiyun 	const struct rxrpc_security *sec;
112*4882a593Smuzhiyun 	struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
113*4882a593Smuzhiyun 	key_ref_t kref = NULL;
114*4882a593Smuzhiyun 	char kdesc[5 + 1 + 3 + 1];
115*4882a593Smuzhiyun 
116*4882a593Smuzhiyun 	_enter("");
117*4882a593Smuzhiyun 
118*4882a593Smuzhiyun 	sprintf(kdesc, "%u:%u", sp->hdr.serviceId, sp->hdr.securityIndex);
119*4882a593Smuzhiyun 
120*4882a593Smuzhiyun 	sec = rxrpc_security_lookup(sp->hdr.securityIndex);
121*4882a593Smuzhiyun 	if (!sec) {
122*4882a593Smuzhiyun 		trace_rxrpc_abort(0, "SVS",
123*4882a593Smuzhiyun 				  sp->hdr.cid, sp->hdr.callNumber, sp->hdr.seq,
124*4882a593Smuzhiyun 				  RX_INVALID_OPERATION, EKEYREJECTED);
125*4882a593Smuzhiyun 		skb->mark = RXRPC_SKB_MARK_REJECT_ABORT;
126*4882a593Smuzhiyun 		skb->priority = RX_INVALID_OPERATION;
127*4882a593Smuzhiyun 		return false;
128*4882a593Smuzhiyun 	}
129*4882a593Smuzhiyun 
130*4882a593Smuzhiyun 	if (sp->hdr.securityIndex == RXRPC_SECURITY_NONE)
131*4882a593Smuzhiyun 		goto out;
132*4882a593Smuzhiyun 
133*4882a593Smuzhiyun 	if (!rx->securities) {
134*4882a593Smuzhiyun 		trace_rxrpc_abort(0, "SVR",
135*4882a593Smuzhiyun 				  sp->hdr.cid, sp->hdr.callNumber, sp->hdr.seq,
136*4882a593Smuzhiyun 				  RX_INVALID_OPERATION, EKEYREJECTED);
137*4882a593Smuzhiyun 		skb->mark = RXRPC_SKB_MARK_REJECT_ABORT;
138*4882a593Smuzhiyun 		skb->priority = RX_INVALID_OPERATION;
139*4882a593Smuzhiyun 		return false;
140*4882a593Smuzhiyun 	}
141*4882a593Smuzhiyun 
142*4882a593Smuzhiyun 	/* look through the service's keyring */
143*4882a593Smuzhiyun 	kref = keyring_search(make_key_ref(rx->securities, 1UL),
144*4882a593Smuzhiyun 			      &key_type_rxrpc_s, kdesc, true);
145*4882a593Smuzhiyun 	if (IS_ERR(kref)) {
146*4882a593Smuzhiyun 		trace_rxrpc_abort(0, "SVK",
147*4882a593Smuzhiyun 				  sp->hdr.cid, sp->hdr.callNumber, sp->hdr.seq,
148*4882a593Smuzhiyun 				  sec->no_key_abort, EKEYREJECTED);
149*4882a593Smuzhiyun 		skb->mark = RXRPC_SKB_MARK_REJECT_ABORT;
150*4882a593Smuzhiyun 		skb->priority = sec->no_key_abort;
151*4882a593Smuzhiyun 		return false;
152*4882a593Smuzhiyun 	}
153*4882a593Smuzhiyun 
154*4882a593Smuzhiyun out:
155*4882a593Smuzhiyun 	*_sec = sec;
156*4882a593Smuzhiyun 	*_key = key_ref_to_ptr(kref);
157*4882a593Smuzhiyun 	return true;
158*4882a593Smuzhiyun }
159