]> jfr.im git - solanum.git/blob - librb/src/nossl.c
Fix Clang 6 compiler warnings
[solanum.git] / librb / src / nossl.c
1 /*
2 * librb: a library used by ircd-ratbox and other things
3 * nossl.c: ssl stub code
4 *
5 * Copyright (C) 2007-2008 ircd-ratbox development team
6 * Copyright (C) 2007-2008 Aaron Sethman <androsyn@ratbox.org>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
21 * USA
22 *
23 */
24
25
26 #include <librb_config.h>
27 #include <rb_lib.h>
28 #if !defined(HAVE_OPENSSL) && !defined(HAVE_GNUTLS) && !defined(HAVE_MBEDTLS)
29
30 #include "arc4random.h"
31
32 #include <commio-int.h>
33 #include <commio-ssl.h>
34
35 int
36 rb_setup_ssl_server(const char *cert __attribute__((unused)), const char *keyfile __attribute__((unused)), const char *dhfile __attribute__((unused)), const char *cipher_list __attribute__((unused)))
37 {
38 errno = ENOSYS;
39 return 0;
40 }
41
42 int
43 rb_init_ssl(void)
44 {
45 errno = ENOSYS;
46 return -1;
47
48 }
49
50 int
51 rb_ssl_listen(rb_fde_t *F __attribute__((unused)), int backlog __attribute__((unused)), int defer_accept __attribute__((unused)))
52 {
53 errno = ENOSYS;
54 return -1;
55 }
56
57 static void
58 rb_stir_arc4random(void *unused __attribute__((unused)))
59 {
60 arc4random_stir();
61 }
62
63
64 int
65 rb_init_prng(const char *path __attribute__((unused)), prng_seed_t seed_type __attribute__((unused)))
66 {
67 /* xxx this ignores the parameters above */
68 arc4random_stir();
69 rb_event_addish("rb_stir_arc4random", rb_stir_arc4random, NULL, 300);
70 return 1;
71 }
72
73 int
74 rb_get_random(void *buf, size_t length)
75 {
76 uint32_t rnd = 0, i;
77 uint8_t *xbuf = buf;
78 for(i = 0; i < length; i++)
79 {
80 if(i % 4 == 0)
81 rnd = arc4random();
82 xbuf[i] = rnd;
83 rnd >>= 8;
84 }
85 return 1;
86 }
87
88 const char *
89 rb_get_ssl_strerror(rb_fde_t *F __attribute__((unused)))
90 {
91 static const char *nosupport = "SSL/TLS not supported";
92 return nosupport;
93 }
94
95 int
96 rb_get_ssl_certfp(rb_fde_t *F __attribute__((unused)), uint8_t certfp[RB_SSL_CERTFP_LEN] __attribute__((unused)), int method __attribute__((unused)))
97 {
98 return 0;
99 }
100
101 int
102 rb_get_ssl_certfp_file(const char *filename __attribute__((unused)), uint8_t certfp[RB_SSL_CERTFP_LEN] __attribute__((unused)), int method __attribute__((unused)))
103 {
104 return 0;
105 }
106
107 void
108 rb_ssl_start_accepted(rb_fde_t *new_F __attribute__((unused)), ACCB * cb __attribute__((unused)), void *data __attribute__((unused)), int timeout __attribute__((unused)))
109 {
110 return;
111 }
112
113 void
114 rb_ssl_start_connected(rb_fde_t *F __attribute__((unused)), CNCB * callback __attribute__((unused)), void *data __attribute__((unused)), int timeout __attribute__((unused)))
115 {
116 return;
117 }
118
119 void
120 rb_connect_tcp_ssl(rb_fde_t *F __attribute__((unused)), struct sockaddr *dest __attribute__((unused)),
121 struct sockaddr *clocal __attribute__((unused)), CNCB * callback __attribute__((unused)), void *data __attribute__((unused)), int timeout __attribute__((unused)))
122 {
123 return;
124 }
125
126 int
127 rb_supports_ssl(void)
128 {
129 return 0;
130 }
131
132 void
133 rb_ssl_shutdown(rb_fde_t *F __attribute__((unused)))
134 {
135 return;
136 }
137
138 void
139 rb_ssl_accept_setup(rb_fde_t *F __attribute__((unused)), rb_fde_t *new_F __attribute__((unused)), struct sockaddr *st __attribute__((unused)), int addrlen __attribute__((unused)))
140 {
141 return;
142 }
143
144 ssize_t
145 rb_ssl_read(rb_fde_t *F __attribute__((unused)), void *buf __attribute__((unused)), size_t count __attribute__((unused)))
146 {
147 errno = ENOSYS;
148 return -1;
149 }
150
151 ssize_t
152 rb_ssl_write(rb_fde_t *F __attribute__((unused)), const void *buf __attribute__((unused)), size_t count __attribute__((unused)))
153 {
154 errno = ENOSYS;
155 return -1;
156 }
157
158 unsigned int
159 rb_ssl_handshake_count(rb_fde_t *F __attribute__((unused)))
160 {
161 return 0;
162 }
163
164 void
165 rb_ssl_clear_handshake_count(rb_fde_t *F __attribute__((unused)))
166 {
167 return;
168 }
169
170 void
171 rb_get_ssl_info(char *buf __attribute__((unused)), size_t len __attribute__((unused)))
172 {
173 snprintf(buf, len, "Not compiled with SSL support");
174 }
175
176 int
177 rb_ssl_get_certfp(rb_fde_t *F __attribute__((unused)), uint8_t certfp[RB_SSL_CERTFP_LEN] __attribute__((unused)))
178 {
179 errno = ENOSYS;
180 return -1;
181 }
182
183 const char *
184 rb_ssl_get_cipher(rb_fde_t *F __attribute__((unused)))
185 {
186 errno = ENOSYS;
187 return NULL;
188 }
189
190 #endif /* !HAVE_OPENSSL */