blob: a29d26c273b5a5c871605be11dd93bd38abc584e [file] [log] [blame]
Thomas Gleixnerb4d0d232019-05-20 19:08:01 +02001// SPDX-License-Identifier: GPL-2.0-or-later
David Howellse0e4d822016-04-07 17:23:58 +01002/* Null security operations.
3 *
4 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
5 * Written by David Howells (dhowells@redhat.com)
David Howellse0e4d822016-04-07 17:23:58 +01006 */
7
8#include <net/af_rxrpc.h>
9#include "ar-internal.h"
10
11static int none_init_connection_security(struct rxrpc_connection *conn)
12{
13 return 0;
14}
15
Herbert Xua2636292016-06-26 14:55:24 -070016static int none_prime_packet_security(struct rxrpc_connection *conn)
David Howellse0e4d822016-04-07 17:23:58 +010017{
Herbert Xua2636292016-06-26 14:55:24 -070018 return 0;
David Howellse0e4d822016-04-07 17:23:58 +010019}
20
Herbert Xua2636292016-06-26 14:55:24 -070021static int none_secure_packet(struct rxrpc_call *call,
David Howells5a429762016-09-06 22:19:51 +010022 struct sk_buff *skb,
23 size_t data_size,
24 void *sechdr)
David Howellse0e4d822016-04-07 17:23:58 +010025{
26 return 0;
27}
28
David Howells248f2192016-09-08 11:10:12 +010029static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb,
30 unsigned int offset, unsigned int len,
31 rxrpc_seq_t seq, u16 expected_cksum)
David Howellse0e4d822016-04-07 17:23:58 +010032{
33 return 0;
34}
35
David Howells248f2192016-09-08 11:10:12 +010036static void none_locate_data(struct rxrpc_call *call, struct sk_buff *skb,
37 unsigned int *_offset, unsigned int *_len)
38{
39}
40
David Howellse0e4d822016-04-07 17:23:58 +010041static int none_respond_to_challenge(struct rxrpc_connection *conn,
David Howells5a429762016-09-06 22:19:51 +010042 struct sk_buff *skb,
43 u32 *_abort_code)
David Howellse0e4d822016-04-07 17:23:58 +010044{
David Howellsfb46f6e2017-04-06 10:12:00 +010045 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
46
47 trace_rxrpc_rx_eproto(NULL, sp->hdr.serial,
48 tracepoint_string("chall_none"));
David Howellse0e4d822016-04-07 17:23:58 +010049 return -EPROTO;
50}
51
52static int none_verify_response(struct rxrpc_connection *conn,
David Howells5a429762016-09-06 22:19:51 +010053 struct sk_buff *skb,
54 u32 *_abort_code)
David Howellse0e4d822016-04-07 17:23:58 +010055{
David Howellsfb46f6e2017-04-06 10:12:00 +010056 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
57
58 trace_rxrpc_rx_eproto(NULL, sp->hdr.serial,
59 tracepoint_string("resp_none"));
David Howellse0e4d822016-04-07 17:23:58 +010060 return -EPROTO;
61}
62
63static void none_clear(struct rxrpc_connection *conn)
64{
65}
66
67static int none_init(void)
68{
69 return 0;
70}
71
72static void none_exit(void)
73{
74}
75
76/*
77 * RxRPC Kerberos-based security
78 */
79const struct rxrpc_security rxrpc_no_security = {
80 .name = "none",
81 .security_index = RXRPC_SECURITY_NONE,
82 .init = none_init,
83 .exit = none_exit,
84 .init_connection_security = none_init_connection_security,
85 .prime_packet_security = none_prime_packet_security,
86 .secure_packet = none_secure_packet,
87 .verify_packet = none_verify_packet,
David Howells248f2192016-09-08 11:10:12 +010088 .locate_data = none_locate_data,
David Howellse0e4d822016-04-07 17:23:58 +010089 .respond_to_challenge = none_respond_to_challenge,
90 .verify_response = none_verify_response,
91 .clear = none_clear,
92};