]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - contrib/wpa/src/crypto/tls_none.c
MFV r341618:
[FreeBSD/FreeBSD.git] / contrib / wpa / src / crypto / tls_none.c
1 /*
2  * SSL/TLS interface functions for no TLS case
3  * Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8
9 #include "includes.h"
10
11 #include "common.h"
12 #include "tls.h"
13
14 void * tls_init(const struct tls_config *conf)
15 {
16         return (void *) 1;
17 }
18
19
20 void tls_deinit(void *ssl_ctx)
21 {
22 }
23
24
25 int tls_get_errors(void *tls_ctx)
26 {
27         return 0;
28 }
29
30
31 struct tls_connection * tls_connection_init(void *tls_ctx)
32 {
33         return NULL;
34 }
35
36
37 void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn)
38 {
39 }
40
41
42 int tls_connection_established(void *tls_ctx, struct tls_connection *conn)
43 {
44         return -1;
45 }
46
47
48 char * tls_connection_peer_serial_num(void *tls_ctx,
49                                       struct tls_connection *conn)
50 {
51         return NULL;
52 }
53
54
55 int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn)
56 {
57         return -1;
58 }
59
60
61 int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
62                               const struct tls_connection_params *params)
63 {
64         return -1;
65 }
66
67
68 int tls_global_set_params(void *tls_ctx,
69                           const struct tls_connection_params *params)
70 {
71         return -1;
72 }
73
74
75 int tls_global_set_verify(void *tls_ctx, int check_crl)
76 {
77         return -1;
78 }
79
80
81 int tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn,
82                               int verify_peer, unsigned int flags,
83                               const u8 *session_ctx, size_t session_ctx_len)
84 {
85         return -1;
86 }
87
88
89 int tls_connection_get_random(void *tls_ctx, struct tls_connection *conn,
90                               struct tls_random *data)
91 {
92         return -1;
93 }
94
95
96 int tls_connection_export_key(void *tls_ctx, struct tls_connection *conn,
97                               const char *label, u8 *out, size_t out_len)
98 {
99         return -1;
100 }
101
102
103 int tls_connection_get_eap_fast_key(void *tls_ctx, struct tls_connection *conn,
104                                     u8 *out, size_t out_len)
105 {
106         return -1;
107 }
108
109
110 struct wpabuf * tls_connection_handshake(void *tls_ctx,
111                                          struct tls_connection *conn,
112                                          const struct wpabuf *in_data,
113                                          struct wpabuf **appl_data)
114 {
115         return NULL;
116 }
117
118
119 struct wpabuf * tls_connection_server_handshake(void *tls_ctx,
120                                                 struct tls_connection *conn,
121                                                 const struct wpabuf *in_data,
122                                                 struct wpabuf **appl_data)
123 {
124         return NULL;
125 }
126
127
128 struct wpabuf * tls_connection_encrypt(void *tls_ctx,
129                                        struct tls_connection *conn,
130                                        const struct wpabuf *in_data)
131 {
132         return NULL;
133 }
134
135
136 struct wpabuf * tls_connection_decrypt(void *tls_ctx,
137                                        struct tls_connection *conn,
138                                        const struct wpabuf *in_data)
139 {
140         return NULL;
141 }
142
143
144 int tls_connection_resumed(void *tls_ctx, struct tls_connection *conn)
145 {
146         return 0;
147 }
148
149
150 int tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn,
151                                    u8 *ciphers)
152 {
153         return -1;
154 }
155
156
157 int tls_get_version(void *ssl_ctx, struct tls_connection *conn,
158                     char *buf, size_t buflen)
159 {
160         return -1;
161 }
162
163
164 int tls_get_cipher(void *tls_ctx, struct tls_connection *conn,
165                    char *buf, size_t buflen)
166 {
167         return -1;
168 }
169
170
171 int tls_connection_enable_workaround(void *tls_ctx,
172                                      struct tls_connection *conn)
173 {
174         return -1;
175 }
176
177
178 int tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn,
179                                     int ext_type, const u8 *data,
180                                     size_t data_len)
181 {
182         return -1;
183 }
184
185
186 int tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn)
187 {
188         return 0;
189 }
190
191
192 int tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn)
193 {
194         return 0;
195 }
196
197
198 int tls_connection_get_write_alerts(void *tls_ctx,
199                                     struct tls_connection *conn)
200 {
201         return 0;
202 }
203
204
205 int tls_get_library_version(char *buf, size_t buf_len)
206 {
207         return os_snprintf(buf, buf_len, "none");
208 }
209
210
211 void tls_connection_set_success_data(struct tls_connection *conn,
212                                      struct wpabuf *data)
213 {
214 }
215
216
217 void tls_connection_set_success_data_resumed(struct tls_connection *conn)
218 {
219 }
220
221
222 const struct wpabuf *
223 tls_connection_get_success_data(struct tls_connection *conn)
224 {
225         return NULL;
226 }
227
228
229 void tls_connection_remove_session(struct tls_connection *conn)
230 {
231 }