1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /* Null security operations.
4 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
8 #include <net/af_rxrpc.h>
9 #include "ar-internal.h"
11 static int none_init_connection_security(struct rxrpc_connection *conn,
12 struct rxrpc_key_token *token)
18 * Allocate an appropriately sized buffer for the amount of data remaining.
20 static struct rxrpc_txbuf *none_alloc_txbuf(struct rxrpc_call *call, size_t remain, gfp_t gfp)
22 return rxrpc_alloc_data_txbuf(call, umin(remain, RXRPC_JUMBO_DATALEN), 1, gfp);
25 static int none_secure_packet(struct rxrpc_call *call, struct rxrpc_txbuf *txb)
27 txb->pkt_len = txb->len;
28 if (txb->len == RXRPC_JUMBO_DATALEN)
29 txb->jumboable = true;
33 static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb)
35 struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
37 sp->flags |= RXRPC_RX_VERIFIED;
41 static void none_free_call_crypto(struct rxrpc_call *call)
45 static int none_respond_to_challenge(struct rxrpc_connection *conn,
48 return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
49 rxrpc_eproto_rxnull_challenge);
52 static int none_verify_response(struct rxrpc_connection *conn,
55 return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
56 rxrpc_eproto_rxnull_response);
59 static void none_clear(struct rxrpc_connection *conn)
63 static int none_init(void)
68 static void none_exit(void)
73 * RxRPC Kerberos-based security
75 const struct rxrpc_security rxrpc_no_security = {
77 .security_index = RXRPC_SECURITY_NONE,
80 .init_connection_security = none_init_connection_security,
81 .free_call_crypto = none_free_call_crypto,
82 .alloc_txbuf = none_alloc_txbuf,
83 .secure_packet = none_secure_packet,
84 .verify_packet = none_verify_packet,
85 .respond_to_challenge = none_respond_to_challenge,
86 .verify_response = none_verify_response,