/* * librb: a library used by ircd-ratbox and other things * nossl.c: ssl stub code * * Copyright (C) 2007-2008 ircd-ratbox development team * Copyright (C) 2007-2008 Aaron Sethman * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 * USA * */ #include #include #if !defined(HAVE_OPENSSL) && !defined(HAVE_GNUTLS) && !defined(HAVE_MBEDTLS) #include "arc4random.h" #include #include int rb_setup_ssl_server(const char *cert __attribute__((unused)), const char *keyfile __attribute__((unused)), const char *dhfile __attribute__((unused)), const char *cipher_list __attribute__((unused))) { errno = ENOSYS; return 0; } int rb_init_ssl(void) { errno = ENOSYS; return -1; } int rb_ssl_listen(rb_fde_t *F __attribute__((unused)), int backlog __attribute__((unused)), int defer_accept __attribute__((unused))) { errno = ENOSYS; return -1; } static void rb_stir_arc4random(void *unused __attribute__((unused))) { arc4random_stir(); } int rb_init_prng(const char *path __attribute__((unused)), prng_seed_t seed_type __attribute__((unused))) { /* xxx this ignores the parameters above */ arc4random_stir(); rb_event_addish("rb_stir_arc4random", rb_stir_arc4random, NULL, 300); return 1; } int rb_get_random(void *buf, size_t length) { uint32_t rnd = 0, i; uint8_t *xbuf = buf; for(i = 0; i < length; i++) { if(i % 4 == 0) rnd = arc4random(); xbuf[i] = rnd; rnd >>= 8; } return 1; } const char * rb_get_ssl_strerror(rb_fde_t *F __attribute__((unused))) { static const char *nosupport = "SSL/TLS not supported"; return nosupport; } int rb_get_ssl_certfp(rb_fde_t *F __attribute__((unused)), uint8_t certfp[RB_SSL_CERTFP_LEN] __attribute__((unused)), int method __attribute__((unused))) { return 0; } int rb_get_ssl_certfp_file(const char *filename __attribute__((unused)), uint8_t certfp[RB_SSL_CERTFP_LEN] __attribute__((unused)), int method __attribute__((unused))) { return 0; } void rb_ssl_start_accepted(rb_fde_t *new_F __attribute__((unused)), ACCB * cb __attribute__((unused)), void *data __attribute__((unused)), int timeout __attribute__((unused))) { return; } void rb_ssl_start_connected(rb_fde_t *F __attribute__((unused)), CNCB * callback __attribute__((unused)), void *data __attribute__((unused)), int timeout __attribute__((unused))) { return; } void rb_connect_tcp_ssl(rb_fde_t *F __attribute__((unused)), struct sockaddr *dest __attribute__((unused)), struct sockaddr *clocal __attribute__((unused)), CNCB * callback __attribute__((unused)), void *data __attribute__((unused)), int timeout __attribute__((unused))) { return; } int rb_supports_ssl(void) { return 0; } void rb_ssl_shutdown(rb_fde_t *F __attribute__((unused))) { return; } void rb_ssl_accept_setup(rb_fde_t *F __attribute__((unused)), rb_fde_t *new_F __attribute__((unused)), struct sockaddr *st __attribute__((unused)), int addrlen __attribute__((unused))) { return; } ssize_t rb_ssl_read(rb_fde_t *F __attribute__((unused)), void *buf __attribute__((unused)), size_t count __attribute__((unused))) { errno = ENOSYS; return -1; } ssize_t rb_ssl_write(rb_fde_t *F __attribute__((unused)), const void *buf __attribute__((unused)), size_t count __attribute__((unused))) { errno = ENOSYS; return -1; } unsigned int rb_ssl_handshake_count(rb_fde_t *F __attribute__((unused))) { return 0; } void rb_ssl_clear_handshake_count(rb_fde_t *F __attribute__((unused))) { return; } void rb_get_ssl_info(char *buf __attribute__((unused)), size_t len __attribute__((unused))) { snprintf(buf, len, "Not compiled with SSL support"); } const char * rb_ssl_get_cipher(rb_fde_t *F __attribute__((unused))) { errno = ENOSYS; return NULL; } #endif /* !HAVE_OPENSSL */