Blame view

net/rxrpc/insecure.c 2.27 KB
81f7e3824   Eric Lee   Initial Release, ...
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
  /* Null security operations.
   *
   * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
   * Written by David Howells (dhowells@redhat.com)
   *
   * This program is free software; you can redistribute it and/or
   * modify it under the terms of the GNU General Public Licence
   * as published by the Free Software Foundation; either version
   * 2 of the Licence, or (at your option) any later version.
   */
  
  #include <net/af_rxrpc.h>
  #include "ar-internal.h"
  
  static int none_init_connection_security(struct rxrpc_connection *conn)
  {
  	return 0;
  }
  
  static int none_prime_packet_security(struct rxrpc_connection *conn)
  {
  	return 0;
  }
  
  static int none_secure_packet(struct rxrpc_call *call,
  			      struct sk_buff *skb,
  			      size_t data_size,
  			      void *sechdr)
  {
  	return 0;
  }
  
  static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb,
  			      unsigned int offset, unsigned int len,
  			      rxrpc_seq_t seq, u16 expected_cksum)
  {
  	return 0;
  }
  
  static void none_locate_data(struct rxrpc_call *call, struct sk_buff *skb,
  			     unsigned int *_offset, unsigned int *_len)
  {
  }
  
  static int none_respond_to_challenge(struct rxrpc_connection *conn,
  				     struct sk_buff *skb,
  				     u32 *_abort_code)
  {
  	struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
  
  	trace_rxrpc_rx_eproto(NULL, sp->hdr.serial,
  			      tracepoint_string("chall_none"));
  	return -EPROTO;
  }
  
  static int none_verify_response(struct rxrpc_connection *conn,
  				struct sk_buff *skb,
  				u32 *_abort_code)
  {
  	struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
  
  	trace_rxrpc_rx_eproto(NULL, sp->hdr.serial,
  			      tracepoint_string("resp_none"));
  	return -EPROTO;
  }
  
  static void none_clear(struct rxrpc_connection *conn)
  {
  }
  
  static int none_init(void)
  {
  	return 0;
  }
  
  static void none_exit(void)
  {
  }
  
  /*
   * RxRPC Kerberos-based security
   */
  const struct rxrpc_security rxrpc_no_security = {
  	.name				= "none",
  	.security_index			= RXRPC_SECURITY_NONE,
  	.init				= none_init,
  	.exit				= none_exit,
  	.init_connection_security	= none_init_connection_security,
  	.prime_packet_security		= none_prime_packet_security,
  	.secure_packet			= none_secure_packet,
  	.verify_packet			= none_verify_packet,
  	.locate_data			= none_locate_data,
  	.respond_to_challenge		= none_respond_to_challenge,
  	.verify_response		= none_verify_response,
  	.clear				= none_clear,
  };