]> jfr.im git - irc/rqf/shadowircd.git/blame_incremental - libratbox/src/nossl.c
Update FAQ.
[irc/rqf/shadowircd.git] / libratbox / src / nossl.c
... / ...
CommitLineData
1/*
2 * libratbox: a library used by ircd-ratbox and other things
3 * nossl.c: ssl stub code
4 *
5 * Copyright (C) 2007-2008 ircd-ratbox development team
6 * Copyright (C) 2007-2008 Aaron Sethman <androsyn@ratbox.org>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
21 * USA
22 *
23 * $Id: commio.c 24808 2008-01-02 08:17:05Z androsyn $
24 */
25
26
27#include <libratbox_config.h>
28#include <ratbox_lib.h>
29#if !defined(HAVE_OPENSSL) && !defined(HAVE_GNUTLS)
30
31#include "arc4random.h"
32
33#include <commio-int.h>
34#include <commio-ssl.h>
35
36int
37rb_setup_ssl_server(const char *cert, const char *keyfile, const char *dhfile)
38{
39 errno = ENOSYS;
40 return 0;
41}
42
43int
44rb_init_ssl(void)
45{
46 errno = ENOSYS;
47 return -1;
48
49}
50
51int
52rb_ssl_listen(rb_fde_t *F, int backlog)
53{
54 errno = ENOSYS;
55 return -1;
56}
57
58static void
59rb_stir_arc4random(void *unused)
60{
61 arc4random_stir();
62}
63
64
65int
66rb_init_prng(const char *path, prng_seed_t seed_type)
67{
68 /* xxx this ignores the parameters above */
69 arc4random_stir();
70 rb_event_addish("rb_stir_arc4random", rb_stir_arc4random, NULL, 300);
71 return 1;
72}
73
74int
75rb_get_random(void *buf, size_t length)
76{
77 uint32_t rnd = 0, i;
78 uint8_t *xbuf = buf;
79 for(i = 0; i < length; i++)
80 {
81 if(i % 4 == 0)
82 rnd = arc4random();
83 xbuf[i] = rnd;
84 rnd >>= 8;
85 }
86 return 1;
87}
88
89int
90rb_get_pseudo_random(void *buf, size_t length)
91{
92 return rb_get_random(buf, length);
93}
94
95
96const char *
97rb_get_ssl_strerror(rb_fde_t *F)
98{
99 static const char *nosupport = "SSL/TLS not supported";
100 return nosupport;
101}
102
103int
104rb_get_ssl_certfp(rb_fde_t *F, uint8_t certfp[RB_SSL_CERTFP_LEN])
105{
106 return 0;
107}
108
109void
110rb_ssl_start_accepted(rb_fde_t *new_F, ACCB * cb, void *data, int timeout)
111{
112 return;
113}
114
115void
116rb_ssl_start_connected(rb_fde_t *F, CNCB * callback, void *data, int timeout)
117{
118 return;
119}
120
121void
122rb_connect_tcp_ssl(rb_fde_t *F, struct sockaddr *dest,
123 struct sockaddr *clocal, int socklen, CNCB * callback, void *data, int timeout)
124{
125 return;
126}
127
128int
129rb_supports_ssl(void)
130{
131 return 0;
132}
133
134void
135rb_ssl_shutdown(rb_fde_t *F)
136{
137 return;
138}
139
140void
141rb_ssl_accept_setup(rb_fde_t *F, rb_fde_t *new_F, struct sockaddr *st, int addrlen)
142{
143 return;
144}
145
146ssize_t
147rb_ssl_read(rb_fde_t *F, void *buf, size_t count)
148{
149 errno = ENOSYS;
150 return -1;
151}
152
153ssize_t
154rb_ssl_write(rb_fde_t *F, const void *buf, size_t count)
155{
156 errno = ENOSYS;
157 return -1;
158}
159
160unsigned int
161rb_ssl_handshake_count(rb_fde_t *F)
162{
163 return 0;
164}
165
166void
167rb_ssl_clear_handshake_count(rb_fde_t *F)
168{
169 return;
170}
171
172void
173rb_get_ssl_info(char *buf, size_t len)
174{
175 rb_snprintf(buf, len, "Not compiled with SSL support");
176}
177
178#endif /* !HAVE_OPENSSL */