]> jfr.im git - solanum.git/blame - librb/src/nossl.c
[mbedtls] Various fixes and improvements
[solanum.git] / librb / src / nossl.c
CommitLineData
55abcbb2 1/*
fe037171 2 * librb: a library used by ircd-ratbox and other things
db137867
AC
3 * nossl.c: ssl stub code
4 *
5 * Copyright (C) 2007-2008 ircd-ratbox development team
6 * Copyright (C) 2007-2008 Aaron Sethman <androsyn@ratbox.org>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
55abcbb2 17 *
db137867
AC
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
21 * USA
55abcbb2 22 *
db137867
AC
23 */
24
25
fe037171
EM
26#include <librb_config.h>
27#include <rb_lib.h>
6f57a957 28#if !defined(HAVE_OPENSSL) && !defined(HAVE_GNUTLS) && !defined(HAVE_MBEDTLS)
db137867 29
a9fb3ed0
VY
30#include "arc4random.h"
31
db137867
AC
32#include <commio-int.h>
33#include <commio-ssl.h>
34
3202e249 35int
c1725bda 36rb_setup_ssl_server(const char *cert, const char *keyfile, const char *dhfile, const char *cipher_list)
db137867
AC
37{
38 errno = ENOSYS;
39 return 0;
40}
41
42int
43rb_init_ssl(void)
44{
45 errno = ENOSYS;
46 return -1;
47
48}
49
50int
aa4737a0 51rb_ssl_listen(rb_fde_t *F, int backlog, int defer_accept)
db137867
AC
52{
53 errno = ENOSYS;
54 return -1;
55}
56
a9fb3ed0
VY
57static void
58rb_stir_arc4random(void *unused)
59{
60 arc4random_stir();
61}
a9fb3ed0 62
3202e249
VY
63
64int
65rb_init_prng(const char *path, prng_seed_t seed_type)
db137867 66{
a9fb3ed0
VY
67 /* xxx this ignores the parameters above */
68 arc4random_stir();
69 rb_event_addish("rb_stir_arc4random", rb_stir_arc4random, NULL, 300);
70 return 1;
db137867
AC
71}
72
73int
74rb_get_random(void *buf, size_t length)
75{
a9fb3ed0 76 uint32_t rnd = 0, i;
3202e249
VY
77 uint8_t *xbuf = buf;
78 for(i = 0; i < length; i++)
a9fb3ed0
VY
79 {
80 if(i % 4 == 0)
81 rnd = arc4random();
82 xbuf[i] = rnd;
83 rnd >>= 8;
84 }
85 return 1;
86}
87
db137867
AC
88const char *
89rb_get_ssl_strerror(rb_fde_t *F)
90{
91 static const char *nosupport = "SSL/TLS not supported";
92 return nosupport;
93}
94
7247337a 95int
e6bbb410 96rb_get_ssl_certfp(rb_fde_t *F, uint8_t certfp[RB_SSL_CERTFP_LEN], int method)
7247337a
JT
97{
98 return 0;
99}
100
03469187
SA
101int
102rb_get_ssl_certfp_file(const char *filename, uint8_t certfp[RB_SSL_CERTFP_LEN], int method)
103{
104 return 0;
105}
106
3202e249
VY
107void
108rb_ssl_start_accepted(rb_fde_t *new_F, ACCB * cb, void *data, int timeout)
db137867
AC
109{
110 return;
111}
112
3202e249
VY
113void
114rb_ssl_start_connected(rb_fde_t *F, CNCB * callback, void *data, int timeout)
db137867
AC
115{
116 return;
117}
118
119void
3202e249 120rb_connect_tcp_ssl(rb_fde_t *F, struct sockaddr *dest,
5ad62c80 121 struct sockaddr *clocal, CNCB * callback, void *data, int timeout)
db137867
AC
122{
123 return;
124}
125
126int
127rb_supports_ssl(void)
128{
129 return 0;
130}
131
132void
3202e249
VY
133rb_ssl_shutdown(rb_fde_t *F)
134{
db137867 135 return;
3202e249 136}
a8f0b117
AC
137
138void
3202e249 139rb_ssl_accept_setup(rb_fde_t *F, rb_fde_t *new_F, struct sockaddr *st, int addrlen)
a8f0b117
AC
140{
141 return;
142}
143
144ssize_t
3202e249 145rb_ssl_read(rb_fde_t *F, void *buf, size_t count)
a8f0b117 146{
c2ac22cc
VY
147 errno = ENOSYS;
148 return -1;
a8f0b117
AC
149}
150
151ssize_t
3202e249 152rb_ssl_write(rb_fde_t *F, const void *buf, size_t count)
a8f0b117 153{
c2ac22cc
VY
154 errno = ENOSYS;
155 return -1;
a8f0b117
AC
156}
157
c2ac22cc
VY
158unsigned int
159rb_ssl_handshake_count(rb_fde_t *F)
160{
161 return 0;
162}
3202e249
VY
163
164void
c2ac22cc
VY
165rb_ssl_clear_handshake_count(rb_fde_t *F)
166{
167 return;
168}
db137867 169
030272f3
VY
170void
171rb_get_ssl_info(char *buf, size_t len)
172{
5203cba5 173 snprintf(buf, len, "Not compiled with SSL support");
030272f3 174}
55abcbb2 175
7c16cc90
AC
176int
177rb_ssl_get_certfp(rb_fde_t *F, uint8_t certfp[RB_SSL_CERTFP_LEN])
178{
179 errno = ENOSYS;
180 return -1;
181}
182
183const char *
184rb_ssl_get_cipher(rb_fde_t *F)
185{
186 errno = ENOSYS;
187 return NULL;
188}
189
3202e249 190#endif /* !HAVE_OPENSSL */