Updated through tag hostap_2_5 from git://w1.fi/hostap.git
[mech_eap.git] / libeap / src / crypto / tls_none.c
1 /*
2  * SSL/TLS interface functions for no TLS case
3  * Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8
9 #include "includes.h"
10
11 #include "common.h"
12 #include "tls.h"
13
14 void * tls_init(const struct tls_config *conf)
15 {
16         return (void *) 1;
17 }
18
19
20 void tls_deinit(void *ssl_ctx)
21 {
22 }
23
24
25 int tls_get_errors(void *tls_ctx)
26 {
27         return 0;
28 }
29
30
31 struct tls_connection * tls_connection_init(void *tls_ctx)
32 {
33         return NULL;
34 }
35
36
37 void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn)
38 {
39 }
40
41
42 int tls_connection_established(void *tls_ctx, struct tls_connection *conn)
43 {
44         return -1;
45 }
46
47
48 int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn)
49 {
50         return -1;
51 }
52
53
54 int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
55                               const struct tls_connection_params *params)
56 {
57         return -1;
58 }
59
60
61 int tls_global_set_params(void *tls_ctx,
62                           const struct tls_connection_params *params)
63 {
64         return -1;
65 }
66
67
68 int tls_global_set_verify(void *tls_ctx, int check_crl)
69 {
70         return -1;
71 }
72
73
74 int tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn,
75                               int verify_peer, unsigned int flags,
76                               const u8 *session_ctx, size_t session_ctx_len)
77 {
78         return -1;
79 }
80
81
82 int tls_connection_get_random(void *tls_ctx, struct tls_connection *conn,
83                               struct tls_random *data)
84 {
85         return -1;
86 }
87
88
89 int tls_connection_prf(void *tls_ctx, struct tls_connection *conn,
90                        const char *label, int server_random_first,
91                        int skip_keyblock, u8 *out, size_t out_len)
92 {
93         return -1;
94 }
95
96
97 struct wpabuf * tls_connection_handshake(void *tls_ctx,
98                                          struct tls_connection *conn,
99                                          const struct wpabuf *in_data,
100                                          struct wpabuf **appl_data)
101 {
102         return NULL;
103 }
104
105
106 struct wpabuf * tls_connection_server_handshake(void *tls_ctx,
107                                                 struct tls_connection *conn,
108                                                 const struct wpabuf *in_data,
109                                                 struct wpabuf **appl_data)
110 {
111         return NULL;
112 }
113
114
115 struct wpabuf * tls_connection_encrypt(void *tls_ctx,
116                                        struct tls_connection *conn,
117                                        const struct wpabuf *in_data)
118 {
119         return NULL;
120 }
121
122
123 struct wpabuf * tls_connection_decrypt(void *tls_ctx,
124                                        struct tls_connection *conn,
125                                        const struct wpabuf *in_data)
126 {
127         return NULL;
128 }
129
130
131 int tls_connection_resumed(void *tls_ctx, struct tls_connection *conn)
132 {
133         return 0;
134 }
135
136
137 int tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn,
138                                    u8 *ciphers)
139 {
140         return -1;
141 }
142
143
144 int tls_get_version(void *ssl_ctx, struct tls_connection *conn,
145                     char *buf, size_t buflen)
146 {
147         return -1;
148 }
149
150
151 int tls_get_cipher(void *tls_ctx, struct tls_connection *conn,
152                    char *buf, size_t buflen)
153 {
154         return -1;
155 }
156
157
158 int tls_connection_enable_workaround(void *tls_ctx,
159                                      struct tls_connection *conn)
160 {
161         return -1;
162 }
163
164
165 int tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn,
166                                     int ext_type, const u8 *data,
167                                     size_t data_len)
168 {
169         return -1;
170 }
171
172
173 int tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn)
174 {
175         return 0;
176 }
177
178
179 int tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn)
180 {
181         return 0;
182 }
183
184
185 int tls_connection_get_write_alerts(void *tls_ctx,
186                                     struct tls_connection *conn)
187 {
188         return 0;
189 }
190
191
192 int tls_get_library_version(char *buf, size_t buf_len)
193 {
194         return os_snprintf(buf, buf_len, "none");
195 }
196
197
198 void tls_connection_set_success_data(struct tls_connection *conn,
199                                      struct wpabuf *data)
200 {
201 }
202
203
204 void tls_connection_set_success_data_resumed(struct tls_connection *conn)
205 {
206 }
207
208
209 const struct wpabuf *
210 tls_connection_get_success_data(struct tls_connection *conn)
211 {
212         return NULL;
213 }
214
215
216 void tls_connection_remove_session(struct tls_connection *conn)
217 {
218 }