]> jfr.im git - solanum.git/blame_incremental - librb/src/nossl.c
OpenSSL: Initialise if LibreSSL
[solanum.git] / librb / src / nossl.c
... / ...
CommitLineData
1/*
2 * librb: a library used by ircd-ratbox and other things
3 * nossl.c: ssl stub code
4 *
5 * Copyright (C) 2007-2008 ircd-ratbox development team
6 * Copyright (C) 2007-2008 Aaron Sethman <androsyn@ratbox.org>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
21 * USA
22 *
23 */
24
25
26#include <librb_config.h>
27#include <rb_lib.h>
28#if !defined(HAVE_OPENSSL) && !defined(HAVE_GNUTLS) && !defined(HAVE_MBEDTLS)
29
30#include "arc4random.h"
31
32#include <commio-int.h>
33#include <commio-ssl.h>
34
35int
36rb_setup_ssl_server(const char *cert, const char *keyfile, const char *dhfile, const char *cipher_list)
37{
38 errno = ENOSYS;
39 return 0;
40}
41
42int
43rb_init_ssl(void)
44{
45 errno = ENOSYS;
46 return -1;
47
48}
49
50int
51rb_ssl_listen(rb_fde_t *F, int backlog, int defer_accept)
52{
53 errno = ENOSYS;
54 return -1;
55}
56
57static void
58rb_stir_arc4random(void *unused)
59{
60 arc4random_stir();
61}
62
63
64int
65rb_init_prng(const char *path, prng_seed_t seed_type)
66{
67 /* xxx this ignores the parameters above */
68 arc4random_stir();
69 rb_event_addish("rb_stir_arc4random", rb_stir_arc4random, NULL, 300);
70 return 1;
71}
72
73int
74rb_get_random(void *buf, size_t length)
75{
76 uint32_t rnd = 0, i;
77 uint8_t *xbuf = buf;
78 for(i = 0; i < length; i++)
79 {
80 if(i % 4 == 0)
81 rnd = arc4random();
82 xbuf[i] = rnd;
83 rnd >>= 8;
84 }
85 return 1;
86}
87
88const char *
89rb_get_ssl_strerror(rb_fde_t *F)
90{
91 static const char *nosupport = "SSL/TLS not supported";
92 return nosupport;
93}
94
95int
96rb_get_ssl_certfp(rb_fde_t *F, uint8_t certfp[RB_SSL_CERTFP_LEN], int method)
97{
98 return 0;
99}
100
101int
102rb_get_ssl_certfp_file(const char *filename, uint8_t certfp[RB_SSL_CERTFP_LEN], int method)
103{
104 return 0;
105}
106
107void
108rb_ssl_start_accepted(rb_fde_t *new_F, ACCB * cb, void *data, int timeout)
109{
110 return;
111}
112
113void
114rb_ssl_start_connected(rb_fde_t *F, CNCB * callback, void *data, int timeout)
115{
116 return;
117}
118
119void
120rb_connect_tcp_ssl(rb_fde_t *F, struct sockaddr *dest,
121 struct sockaddr *clocal, CNCB * callback, void *data, int timeout)
122{
123 return;
124}
125
126int
127rb_supports_ssl(void)
128{
129 return 0;
130}
131
132void
133rb_ssl_shutdown(rb_fde_t *F)
134{
135 return;
136}
137
138void
139rb_ssl_accept_setup(rb_fde_t *F, rb_fde_t *new_F, struct sockaddr *st, int addrlen)
140{
141 return;
142}
143
144ssize_t
145rb_ssl_read(rb_fde_t *F, void *buf, size_t count)
146{
147 errno = ENOSYS;
148 return -1;
149}
150
151ssize_t
152rb_ssl_write(rb_fde_t *F, const void *buf, size_t count)
153{
154 errno = ENOSYS;
155 return -1;
156}
157
158unsigned int
159rb_ssl_handshake_count(rb_fde_t *F)
160{
161 return 0;
162}
163
164void
165rb_ssl_clear_handshake_count(rb_fde_t *F)
166{
167 return;
168}
169
170void
171rb_get_ssl_info(char *buf, size_t len)
172{
173 snprintf(buf, len, "Not compiled with SSL support");
174}
175
176int
177rb_ssl_get_certfp(rb_fde_t *F, uint8_t certfp[RB_SSL_CERTFP_LEN])
178{
179 errno = ENOSYS;
180 return -1;
181}
182
183const char *
184rb_ssl_get_cipher(rb_fde_t *F)
185{
186 errno = ENOSYS;
187 return NULL;
188}
189
190#endif /* !HAVE_OPENSSL */