Commit | Line | Data |
---|---|---|
b4d0d230 | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
e0e4d82f DH |
2 | /* Null security operations. |
3 | * | |
4 | * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved. | |
5 | * Written by David Howells (dhowells@redhat.com) | |
e0e4d82f DH |
6 | */ |
7 | ||
8 | #include <net/af_rxrpc.h> | |
9 | #include "ar-internal.h" | |
10 | ||
41057ebd DH |
11 | static int none_init_connection_security(struct rxrpc_connection *conn, |
12 | struct rxrpc_key_token *token) | |
e0e4d82f DH |
13 | { |
14 | return 0; | |
15 | } | |
16 | ||
d7d775b1 DH |
17 | /* |
18 | * Work out how much data we can put in an unsecured packet. | |
19 | */ | |
20 | static int none_how_much_data(struct rxrpc_call *call, size_t remain, | |
21 | size_t *_buf_size, size_t *_data_size, size_t *_offset) | |
22 | { | |
23 | *_buf_size = *_data_size = min_t(size_t, remain, RXRPC_JUMBO_DATALEN); | |
24 | *_offset = 0; | |
25 | return 0; | |
26 | } | |
27 | ||
a4ea4c47 | 28 | static int none_secure_packet(struct rxrpc_call *call, struct rxrpc_txbuf *txb) |
e0e4d82f DH |
29 | { |
30 | return 0; | |
31 | } | |
32 | ||
d4d02d8b | 33 | static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb) |
e0e4d82f | 34 | { |
d4d02d8b DH |
35 | struct rxrpc_skb_priv *sp = rxrpc_skb(skb); |
36 | ||
37 | sp->flags |= RXRPC_RX_VERIFIED; | |
e0e4d82f DH |
38 | return 0; |
39 | } | |
40 | ||
1db88c53 DH |
41 | static void none_free_call_crypto(struct rxrpc_call *call) |
42 | { | |
43 | } | |
44 | ||
e0e4d82f | 45 | static int none_respond_to_challenge(struct rxrpc_connection *conn, |
a00ce28b | 46 | struct sk_buff *skb) |
e0e4d82f | 47 | { |
57af281e DH |
48 | return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO, |
49 | rxrpc_eproto_rxnull_challenge); | |
e0e4d82f DH |
50 | } |
51 | ||
52 | static int none_verify_response(struct rxrpc_connection *conn, | |
a00ce28b | 53 | struct sk_buff *skb) |
e0e4d82f | 54 | { |
57af281e DH |
55 | return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO, |
56 | rxrpc_eproto_rxnull_response); | |
e0e4d82f DH |
57 | } |
58 | ||
59 | static void none_clear(struct rxrpc_connection *conn) | |
60 | { | |
61 | } | |
62 | ||
63 | static int none_init(void) | |
64 | { | |
65 | return 0; | |
66 | } | |
67 | ||
68 | static void none_exit(void) | |
69 | { | |
70 | } | |
71 | ||
72 | /* | |
73 | * RxRPC Kerberos-based security | |
74 | */ | |
75 | const struct rxrpc_security rxrpc_no_security = { | |
76 | .name = "none", | |
77 | .security_index = RXRPC_SECURITY_NONE, | |
78 | .init = none_init, | |
79 | .exit = none_exit, | |
80 | .init_connection_security = none_init_connection_security, | |
1db88c53 | 81 | .free_call_crypto = none_free_call_crypto, |
d7d775b1 | 82 | .how_much_data = none_how_much_data, |
e0e4d82f DH |
83 | .secure_packet = none_secure_packet, |
84 | .verify_packet = none_verify_packet, | |
85 | .respond_to_challenge = none_respond_to_challenge, | |
86 | .verify_response = none_verify_response, | |
87 | .clear = none_clear, | |
88 | }; |