1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* Null security operations. 3 * 4 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved. 5 * Written by David Howells (dhowells@redhat.com) 6 */ 7 8 #include <net/af_rxrpc.h> 9 #include "ar-internal.h" 10 11 static int none_init_connection_security(struct rxrpc_connection *conn, 12 struct rxrpc_key_token *token) 13 { 14 return 0; 15 } 16 17 /* 18 * Allocate an appropriately sized buffer for the amount of data remaining. 19 */ 20 static struct rxrpc_txbuf *none_alloc_txbuf(struct rxrpc_call *call, size_t remain, gfp_t gfp) 21 { 22 return rxrpc_alloc_data_txbuf(call, min_t(size_t, remain, RXRPC_JUMBO_DATALEN), 1, gfp); 23 } 24 25 static int none_secure_packet(struct rxrpc_call *call, struct rxrpc_txbuf *txb) 26 { 27 return 0; 28 } 29 30 static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb) 31 { 32 struct rxrpc_skb_priv *sp = rxrpc_skb(skb); 33 34 sp->flags |= RXRPC_RX_VERIFIED; 35 return 0; 36 } 37 38 static void none_free_call_crypto(struct rxrpc_call *call) 39 { 40 } 41 42 static int none_respond_to_challenge(struct rxrpc_connection *conn, 43 struct sk_buff *skb) 44 { 45 return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO, 46 rxrpc_eproto_rxnull_challenge); 47 } 48 49 static int none_verify_response(struct rxrpc_connection *conn, 50 struct sk_buff *skb) 51 { 52 return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO, 53 rxrpc_eproto_rxnull_response); 54 } 55 56 static void none_clear(struct rxrpc_connection *conn) 57 { 58 } 59 60 static int none_init(void) 61 { 62 return 0; 63 } 64 65 static void none_exit(void) 66 { 67 } 68 69 /* 70 * RxRPC Kerberos-based security 71 */ 72 const struct rxrpc_security rxrpc_no_security = { 73 .name = "none", 74 .security_index = RXRPC_SECURITY_NONE, 75 .init = none_init, 76 .exit = none_exit, 77 .init_connection_security = none_init_connection_security, 78 .free_call_crypto = none_free_call_crypto, 79 .alloc_txbuf = none_alloc_txbuf, 80 .secure_packet = none_secure_packet, 81 .verify_packet = none_verify_packet, 82 .respond_to_challenge = none_respond_to_challenge, 83 .verify_response = none_verify_response, 84 .clear = none_clear, 85 }; 86