blob: f6c59f5fae9d2d6a1e48bdd6605e2f5e2c003ab4 [file] [log] [blame]
Thomas Gleixnerb4d0d232019-05-20 19:08:01 +02001// SPDX-License-Identifier: GPL-2.0-or-later
David Howellse0e4d822016-04-07 17:23:58 +01002/* Null security operations.
3 *
4 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
5 * Written by David Howells (dhowells@redhat.com)
David Howellse0e4d822016-04-07 17:23:58 +01006 */
7
8#include <net/af_rxrpc.h>
9#include "ar-internal.h"
10
11static int none_init_connection_security(struct rxrpc_connection *conn)
12{
13 return 0;
14}
15
Herbert Xua2636292016-06-26 14:55:24 -070016static int none_prime_packet_security(struct rxrpc_connection *conn)
David Howellse0e4d822016-04-07 17:23:58 +010017{
Herbert Xua2636292016-06-26 14:55:24 -070018 return 0;
David Howellse0e4d822016-04-07 17:23:58 +010019}
20
Herbert Xua2636292016-06-26 14:55:24 -070021static int none_secure_packet(struct rxrpc_call *call,
David Howells5a429762016-09-06 22:19:51 +010022 struct sk_buff *skb,
23 size_t data_size,
24 void *sechdr)
David Howellse0e4d822016-04-07 17:23:58 +010025{
26 return 0;
27}
28
David Howells248f2192016-09-08 11:10:12 +010029static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb,
30 unsigned int offset, unsigned int len,
31 rxrpc_seq_t seq, u16 expected_cksum)
David Howellse0e4d822016-04-07 17:23:58 +010032{
33 return 0;
34}
35
David Howells1db88c52019-07-30 15:56:57 +010036static void none_free_call_crypto(struct rxrpc_call *call)
37{
38}
39
David Howells248f2192016-09-08 11:10:12 +010040static void none_locate_data(struct rxrpc_call *call, struct sk_buff *skb,
41 unsigned int *_offset, unsigned int *_len)
42{
43}
44
David Howellse0e4d822016-04-07 17:23:58 +010045static int none_respond_to_challenge(struct rxrpc_connection *conn,
David Howells5a429762016-09-06 22:19:51 +010046 struct sk_buff *skb,
47 u32 *_abort_code)
David Howellse0e4d822016-04-07 17:23:58 +010048{
David Howellsfb46f6e2017-04-06 10:12:00 +010049 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
50
51 trace_rxrpc_rx_eproto(NULL, sp->hdr.serial,
52 tracepoint_string("chall_none"));
David Howellse0e4d822016-04-07 17:23:58 +010053 return -EPROTO;
54}
55
56static int none_verify_response(struct rxrpc_connection *conn,
David Howells5a429762016-09-06 22:19:51 +010057 struct sk_buff *skb,
58 u32 *_abort_code)
David Howellse0e4d822016-04-07 17:23:58 +010059{
David Howellsfb46f6e2017-04-06 10:12:00 +010060 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
61
62 trace_rxrpc_rx_eproto(NULL, sp->hdr.serial,
63 tracepoint_string("resp_none"));
David Howellse0e4d822016-04-07 17:23:58 +010064 return -EPROTO;
65}
66
67static void none_clear(struct rxrpc_connection *conn)
68{
69}
70
71static int none_init(void)
72{
73 return 0;
74}
75
76static void none_exit(void)
77{
78}
79
80/*
81 * RxRPC Kerberos-based security
82 */
83const struct rxrpc_security rxrpc_no_security = {
84 .name = "none",
85 .security_index = RXRPC_SECURITY_NONE,
86 .init = none_init,
87 .exit = none_exit,
88 .init_connection_security = none_init_connection_security,
89 .prime_packet_security = none_prime_packet_security,
David Howells1db88c52019-07-30 15:56:57 +010090 .free_call_crypto = none_free_call_crypto,
David Howellse0e4d822016-04-07 17:23:58 +010091 .secure_packet = none_secure_packet,
92 .verify_packet = none_verify_packet,
David Howells248f2192016-09-08 11:10:12 +010093 .locate_data = none_locate_data,
David Howellse0e4d822016-04-07 17:23:58 +010094 .respond_to_challenge = none_respond_to_challenge,
95 .verify_response = none_verify_response,
96 .clear = none_clear,
97};