X-Git-Url: https://jfr.im/git/irc/rqf/shadowircd.git/blobdiff_plain/4414eb3c9ec4fbd192992d0e4da42a8940a987ca..36fb4e9a7743326d1a2ca7601bc9bf1c5b9a0bcb:/libratbox/src/nossl.c diff --git a/libratbox/src/nossl.c b/libratbox/src/nossl.c index f3758c5..ee85189 100644 --- a/libratbox/src/nossl.c +++ b/libratbox/src/nossl.c @@ -33,7 +33,7 @@ #include #include -int +int rb_setup_ssl_server(const char *cert, const char *keyfile, const char *dhfile) { errno = ENOSYS; @@ -60,9 +60,10 @@ rb_stir_arc4random(void *unused) { arc4random_stir(); } - -int rb_init_prng(const char *path, prng_seed_t seed_type) + +int +rb_init_prng(const char *path, prng_seed_t seed_type) { /* xxx this ignores the parameters above */ arc4random_stir(); @@ -74,8 +75,8 @@ int rb_get_random(void *buf, size_t length) { uint32_t rnd = 0, i; - uint8_t *xbuf = buf; - for (i = 0; i < sizeof(length); i++) + uint8_t *xbuf = buf; + for(i = 0; i < length; i++) { if(i % 4 == 0) rnd = arc4random(); @@ -88,7 +89,7 @@ rb_get_random(void *buf, size_t length) int rb_get_pseudo_random(void *buf, size_t length) { - return rb_get_random(buf, length); + return rb_get_random(buf, length); } @@ -99,21 +100,27 @@ rb_get_ssl_strerror(rb_fde_t *F) return nosupport; } -void -rb_ssl_start_accepted(rb_fde_t *new_F, ACCB *cb, void *data, int timeout) +int +rb_get_ssl_certfp(rb_fde_t *F, uint8_t certfp[RB_SSL_CERTFP_LEN]) +{ + return 0; +} + +void +rb_ssl_start_accepted(rb_fde_t *new_F, ACCB * cb, void *data, int timeout) { return; } -void -rb_ssl_start_connected(rb_fde_t *F, CNCB *callback, void *data, int timeout) +void +rb_ssl_start_connected(rb_fde_t *F, CNCB * callback, void *data, int timeout) { return; } void -rb_connect_tcp_ssl(rb_fde_t *F, struct sockaddr *dest, - struct sockaddr *clocal, int socklen, CNCB *callback, void *data, int timeout) +rb_connect_tcp_ssl(rb_fde_t *F, struct sockaddr *dest, + struct sockaddr *clocal, int socklen, CNCB * callback, void *data, int timeout) { return; } @@ -125,26 +132,26 @@ rb_supports_ssl(void) } void -rb_ssl_shutdown(rb_fde_t * F) -{ +rb_ssl_shutdown(rb_fde_t *F) +{ return; -} +} void -rb_ssl_accept_setup(rb_fde_t * F, rb_fde_t *new_F, struct sockaddr *st, int addrlen) +rb_ssl_accept_setup(rb_fde_t *F, rb_fde_t *new_F, struct sockaddr *st, int addrlen) { return; } ssize_t -rb_ssl_read(rb_fde_t * F, void *buf, size_t count) +rb_ssl_read(rb_fde_t *F, void *buf, size_t count) { errno = ENOSYS; return -1; } ssize_t -rb_ssl_write(rb_fde_t * F, const void *buf, size_t count) +rb_ssl_write(rb_fde_t *F, const void *buf, size_t count) { errno = ENOSYS; return -1; @@ -155,12 +162,17 @@ rb_ssl_handshake_count(rb_fde_t *F) { return 0; } - -void + +void rb_ssl_clear_handshake_count(rb_fde_t *F) { return; } - -#endif /* !HAVE_OPENSSL */ +void +rb_get_ssl_info(char *buf, size_t len) +{ + rb_snprintf(buf, len, "Not compiled with SSL support"); +} + +#endif /* !HAVE_OPENSSL */