Rough and ready port of axTLS
ssl/openssl.c@0:5a29fd060ac8, 2013-05-13 (annotated)
- Committer:
- ashleymills
- Date:
- Mon May 13 18:15:18 2013 +0000
- Revision:
- 0:5a29fd060ac8
initial commit
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
ashleymills | 0:5a29fd060ac8 | 1 | /* |
ashleymills | 0:5a29fd060ac8 | 2 | * Copyright (c) 2007, Cameron Rich |
ashleymills | 0:5a29fd060ac8 | 3 | * |
ashleymills | 0:5a29fd060ac8 | 4 | * All rights reserved. |
ashleymills | 0:5a29fd060ac8 | 5 | * |
ashleymills | 0:5a29fd060ac8 | 6 | * Redistribution and use in source and binary forms, with or without |
ashleymills | 0:5a29fd060ac8 | 7 | * modification, are permitted provided that the following conditions are met: |
ashleymills | 0:5a29fd060ac8 | 8 | * |
ashleymills | 0:5a29fd060ac8 | 9 | * * Redistributions of source code must retain the above copyright notice, |
ashleymills | 0:5a29fd060ac8 | 10 | * this list of conditions and the following disclaimer. |
ashleymills | 0:5a29fd060ac8 | 11 | * * Redistributions in binary form must reproduce the above copyright notice, |
ashleymills | 0:5a29fd060ac8 | 12 | * this list of conditions and the following disclaimer in the documentation |
ashleymills | 0:5a29fd060ac8 | 13 | * and/or other materials provided with the distribution. |
ashleymills | 0:5a29fd060ac8 | 14 | * * Neither the name of the axTLS project nor the names of its contributors |
ashleymills | 0:5a29fd060ac8 | 15 | * may be used to endorse or promote products derived from this software |
ashleymills | 0:5a29fd060ac8 | 16 | * without specific prior written permission. |
ashleymills | 0:5a29fd060ac8 | 17 | * |
ashleymills | 0:5a29fd060ac8 | 18 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
ashleymills | 0:5a29fd060ac8 | 19 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
ashleymills | 0:5a29fd060ac8 | 20 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
ashleymills | 0:5a29fd060ac8 | 21 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR |
ashleymills | 0:5a29fd060ac8 | 22 | * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, |
ashleymills | 0:5a29fd060ac8 | 23 | * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, |
ashleymills | 0:5a29fd060ac8 | 24 | * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR |
ashleymills | 0:5a29fd060ac8 | 25 | * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF |
ashleymills | 0:5a29fd060ac8 | 26 | * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING |
ashleymills | 0:5a29fd060ac8 | 27 | * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS |
ashleymills | 0:5a29fd060ac8 | 28 | * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
ashleymills | 0:5a29fd060ac8 | 29 | */ |
ashleymills | 0:5a29fd060ac8 | 30 | |
ashleymills | 0:5a29fd060ac8 | 31 | /* |
ashleymills | 0:5a29fd060ac8 | 32 | * Enable a subset of openssl compatible functions. We don't aim to be 100% |
ashleymills | 0:5a29fd060ac8 | 33 | * compatible - just to be able to do basic ports etc. |
ashleymills | 0:5a29fd060ac8 | 34 | * |
ashleymills | 0:5a29fd060ac8 | 35 | * Only really tested on mini_httpd, so I'm not too sure how extensive this |
ashleymills | 0:5a29fd060ac8 | 36 | * port is. |
ashleymills | 0:5a29fd060ac8 | 37 | */ |
ashleymills | 0:5a29fd060ac8 | 38 | |
ashleymills | 0:5a29fd060ac8 | 39 | #include "config.h" |
ashleymills | 0:5a29fd060ac8 | 40 | |
ashleymills | 0:5a29fd060ac8 | 41 | #ifdef CONFIG_OPENSSL_COMPATIBLE |
ashleymills | 0:5a29fd060ac8 | 42 | #include <stdlib.h> |
ashleymills | 0:5a29fd060ac8 | 43 | #include <string.h> |
ashleymills | 0:5a29fd060ac8 | 44 | #include <stdarg.h> |
ashleymills | 0:5a29fd060ac8 | 45 | #include "os_port.h" |
ashleymills | 0:5a29fd060ac8 | 46 | #include "ssl.h" |
ashleymills | 0:5a29fd060ac8 | 47 | |
ashleymills | 0:5a29fd060ac8 | 48 | #define OPENSSL_CTX_ATTR ((OPENSSL_CTX *)ssl_ctx->bonus_attr) |
ashleymills | 0:5a29fd060ac8 | 49 | |
ashleymills | 0:5a29fd060ac8 | 50 | static char *key_password = NULL; |
ashleymills | 0:5a29fd060ac8 | 51 | |
ashleymills | 0:5a29fd060ac8 | 52 | void *SSLv23_server_method(void) { return NULL; } |
ashleymills | 0:5a29fd060ac8 | 53 | void *SSLv3_server_method(void) { return NULL; } |
ashleymills | 0:5a29fd060ac8 | 54 | void *TLSv1_server_method(void) { return NULL; } |
ashleymills | 0:5a29fd060ac8 | 55 | void *SSLv23_client_method(void) { return NULL; } |
ashleymills | 0:5a29fd060ac8 | 56 | void *SSLv3_client_method(void) { return NULL; } |
ashleymills | 0:5a29fd060ac8 | 57 | void *TLSv1_client_method(void) { return NULL; } |
ashleymills | 0:5a29fd060ac8 | 58 | |
ashleymills | 0:5a29fd060ac8 | 59 | typedef void * (*ssl_func_type_t)(void); |
ashleymills | 0:5a29fd060ac8 | 60 | typedef void * (*bio_func_type_t)(void); |
ashleymills | 0:5a29fd060ac8 | 61 | |
ashleymills | 0:5a29fd060ac8 | 62 | typedef struct |
ashleymills | 0:5a29fd060ac8 | 63 | { |
ashleymills | 0:5a29fd060ac8 | 64 | ssl_func_type_t ssl_func_type; |
ashleymills | 0:5a29fd060ac8 | 65 | } OPENSSL_CTX; |
ashleymills | 0:5a29fd060ac8 | 66 | |
ashleymills | 0:5a29fd060ac8 | 67 | SSL_CTX * SSL_CTX_new(ssl_func_type_t meth) |
ashleymills | 0:5a29fd060ac8 | 68 | { |
ashleymills | 0:5a29fd060ac8 | 69 | SSL_CTX *ssl_ctx = ssl_ctx_new(0, 5); |
ashleymills | 0:5a29fd060ac8 | 70 | ssl_ctx->bonus_attr = malloc(sizeof(OPENSSL_CTX)); |
ashleymills | 0:5a29fd060ac8 | 71 | OPENSSL_CTX_ATTR->ssl_func_type = meth; |
ashleymills | 0:5a29fd060ac8 | 72 | return ssl_ctx; |
ashleymills | 0:5a29fd060ac8 | 73 | } |
ashleymills | 0:5a29fd060ac8 | 74 | |
ashleymills | 0:5a29fd060ac8 | 75 | void SSL_CTX_free(SSL_CTX * ssl_ctx) |
ashleymills | 0:5a29fd060ac8 | 76 | { |
ashleymills | 0:5a29fd060ac8 | 77 | free(ssl_ctx->bonus_attr); |
ashleymills | 0:5a29fd060ac8 | 78 | ssl_ctx_free(ssl_ctx); |
ashleymills | 0:5a29fd060ac8 | 79 | } |
ashleymills | 0:5a29fd060ac8 | 80 | |
ashleymills | 0:5a29fd060ac8 | 81 | SSL * SSL_new(SSL_CTX *ssl_ctx) |
ashleymills | 0:5a29fd060ac8 | 82 | { |
ashleymills | 0:5a29fd060ac8 | 83 | SSL *ssl; |
ashleymills | 0:5a29fd060ac8 | 84 | ssl_func_type_t ssl_func_type; |
ashleymills | 0:5a29fd060ac8 | 85 | |
ashleymills | 0:5a29fd060ac8 | 86 | ssl = ssl_new(ssl_ctx, -1); /* fd is set later */ |
ashleymills | 0:5a29fd060ac8 | 87 | ssl_func_type = OPENSSL_CTX_ATTR->ssl_func_type; |
ashleymills | 0:5a29fd060ac8 | 88 | |
ashleymills | 0:5a29fd060ac8 | 89 | #ifdef CONFIG_SSL_ENABLE_CLIENT |
ashleymills | 0:5a29fd060ac8 | 90 | if (ssl_func_type == SSLv23_client_method || |
ashleymills | 0:5a29fd060ac8 | 91 | ssl_func_type == SSLv3_client_method || |
ashleymills | 0:5a29fd060ac8 | 92 | ssl_func_type == TLSv1_client_method) |
ashleymills | 0:5a29fd060ac8 | 93 | { |
ashleymills | 0:5a29fd060ac8 | 94 | SET_SSL_FLAG(SSL_IS_CLIENT); |
ashleymills | 0:5a29fd060ac8 | 95 | } |
ashleymills | 0:5a29fd060ac8 | 96 | else |
ashleymills | 0:5a29fd060ac8 | 97 | #endif |
ashleymills | 0:5a29fd060ac8 | 98 | { |
ashleymills | 0:5a29fd060ac8 | 99 | ssl->next_state = HS_CLIENT_HELLO; |
ashleymills | 0:5a29fd060ac8 | 100 | } |
ashleymills | 0:5a29fd060ac8 | 101 | |
ashleymills | 0:5a29fd060ac8 | 102 | return ssl; |
ashleymills | 0:5a29fd060ac8 | 103 | } |
ashleymills | 0:5a29fd060ac8 | 104 | |
ashleymills | 0:5a29fd060ac8 | 105 | int SSL_set_fd(SSL *s, int fd) |
ashleymills | 0:5a29fd060ac8 | 106 | { |
ashleymills | 0:5a29fd060ac8 | 107 | s->client_fd = fd; |
ashleymills | 0:5a29fd060ac8 | 108 | return 1; /* always succeeds */ |
ashleymills | 0:5a29fd060ac8 | 109 | } |
ashleymills | 0:5a29fd060ac8 | 110 | |
ashleymills | 0:5a29fd060ac8 | 111 | int SSL_accept(SSL *ssl) |
ashleymills | 0:5a29fd060ac8 | 112 | { |
ashleymills | 0:5a29fd060ac8 | 113 | while (ssl_read(ssl, NULL) == SSL_OK) |
ashleymills | 0:5a29fd060ac8 | 114 | { |
ashleymills | 0:5a29fd060ac8 | 115 | if (ssl->next_state == HS_CLIENT_HELLO) |
ashleymills | 0:5a29fd060ac8 | 116 | return 1; /* we're done */ |
ashleymills | 0:5a29fd060ac8 | 117 | } |
ashleymills | 0:5a29fd060ac8 | 118 | |
ashleymills | 0:5a29fd060ac8 | 119 | return -1; |
ashleymills | 0:5a29fd060ac8 | 120 | } |
ashleymills | 0:5a29fd060ac8 | 121 | |
ashleymills | 0:5a29fd060ac8 | 122 | #ifdef CONFIG_SSL_ENABLE_CLIENT |
ashleymills | 0:5a29fd060ac8 | 123 | int SSL_connect(SSL *ssl) |
ashleymills | 0:5a29fd060ac8 | 124 | { |
ashleymills | 0:5a29fd060ac8 | 125 | return do_client_connect(ssl) == SSL_OK ? 1 : -1; |
ashleymills | 0:5a29fd060ac8 | 126 | } |
ashleymills | 0:5a29fd060ac8 | 127 | #endif |
ashleymills | 0:5a29fd060ac8 | 128 | |
ashleymills | 0:5a29fd060ac8 | 129 | void SSL_free(SSL *ssl) |
ashleymills | 0:5a29fd060ac8 | 130 | { |
ashleymills | 0:5a29fd060ac8 | 131 | ssl_free(ssl); |
ashleymills | 0:5a29fd060ac8 | 132 | } |
ashleymills | 0:5a29fd060ac8 | 133 | |
ashleymills | 0:5a29fd060ac8 | 134 | int SSL_read(SSL *ssl, void *buf, int num) |
ashleymills | 0:5a29fd060ac8 | 135 | { |
ashleymills | 0:5a29fd060ac8 | 136 | uint8_t *read_buf; |
ashleymills | 0:5a29fd060ac8 | 137 | int ret; |
ashleymills | 0:5a29fd060ac8 | 138 | |
ashleymills | 0:5a29fd060ac8 | 139 | while ((ret = ssl_read(ssl, &read_buf)) == SSL_OK); |
ashleymills | 0:5a29fd060ac8 | 140 | |
ashleymills | 0:5a29fd060ac8 | 141 | if (ret > SSL_OK) |
ashleymills | 0:5a29fd060ac8 | 142 | { |
ashleymills | 0:5a29fd060ac8 | 143 | memcpy(buf, read_buf, ret > num ? num : ret); |
ashleymills | 0:5a29fd060ac8 | 144 | } |
ashleymills | 0:5a29fd060ac8 | 145 | |
ashleymills | 0:5a29fd060ac8 | 146 | return ret; |
ashleymills | 0:5a29fd060ac8 | 147 | } |
ashleymills | 0:5a29fd060ac8 | 148 | |
ashleymills | 0:5a29fd060ac8 | 149 | int SSL_write(SSL *ssl, const void *buf, int num) |
ashleymills | 0:5a29fd060ac8 | 150 | { |
ashleymills | 0:5a29fd060ac8 | 151 | return ssl_write(ssl, buf, num); |
ashleymills | 0:5a29fd060ac8 | 152 | } |
ashleymills | 0:5a29fd060ac8 | 153 | |
ashleymills | 0:5a29fd060ac8 | 154 | int SSL_CTX_use_certificate_file(SSL_CTX *ssl_ctx, const char *file, int type) |
ashleymills | 0:5a29fd060ac8 | 155 | { |
ashleymills | 0:5a29fd060ac8 | 156 | return (ssl_obj_load(ssl_ctx, SSL_OBJ_X509_CERT, file, NULL) == SSL_OK); |
ashleymills | 0:5a29fd060ac8 | 157 | } |
ashleymills | 0:5a29fd060ac8 | 158 | |
ashleymills | 0:5a29fd060ac8 | 159 | int SSL_CTX_use_PrivateKey_file(SSL_CTX *ssl_ctx, const char *file, int type) |
ashleymills | 0:5a29fd060ac8 | 160 | { |
ashleymills | 0:5a29fd060ac8 | 161 | return (ssl_obj_load(ssl_ctx, SSL_OBJ_RSA_KEY, file, key_password) == SSL_OK); |
ashleymills | 0:5a29fd060ac8 | 162 | } |
ashleymills | 0:5a29fd060ac8 | 163 | |
ashleymills | 0:5a29fd060ac8 | 164 | int SSL_CTX_use_certificate_ASN1(SSL_CTX *ssl_ctx, int len, const uint8_t *d) |
ashleymills | 0:5a29fd060ac8 | 165 | { |
ashleymills | 0:5a29fd060ac8 | 166 | return (ssl_obj_memory_load(ssl_ctx, |
ashleymills | 0:5a29fd060ac8 | 167 | SSL_OBJ_X509_CERT, d, len, NULL) == SSL_OK); |
ashleymills | 0:5a29fd060ac8 | 168 | } |
ashleymills | 0:5a29fd060ac8 | 169 | |
ashleymills | 0:5a29fd060ac8 | 170 | int SSL_CTX_set_session_id_context(SSL_CTX *ctx, const unsigned char *sid_ctx, |
ashleymills | 0:5a29fd060ac8 | 171 | unsigned int sid_ctx_len) |
ashleymills | 0:5a29fd060ac8 | 172 | { |
ashleymills | 0:5a29fd060ac8 | 173 | return 1; |
ashleymills | 0:5a29fd060ac8 | 174 | } |
ashleymills | 0:5a29fd060ac8 | 175 | |
ashleymills | 0:5a29fd060ac8 | 176 | int SSL_CTX_set_default_verify_paths(SSL_CTX *ctx) |
ashleymills | 0:5a29fd060ac8 | 177 | { |
ashleymills | 0:5a29fd060ac8 | 178 | return 1; |
ashleymills | 0:5a29fd060ac8 | 179 | } |
ashleymills | 0:5a29fd060ac8 | 180 | |
ashleymills | 0:5a29fd060ac8 | 181 | int SSL_CTX_use_certificate_chain_file(SSL_CTX *ssl_ctx, const char *file) |
ashleymills | 0:5a29fd060ac8 | 182 | { |
ashleymills | 0:5a29fd060ac8 | 183 | return (ssl_obj_load(ssl_ctx, |
ashleymills | 0:5a29fd060ac8 | 184 | SSL_OBJ_X509_CERT, file, NULL) == SSL_OK); |
ashleymills | 0:5a29fd060ac8 | 185 | } |
ashleymills | 0:5a29fd060ac8 | 186 | |
ashleymills | 0:5a29fd060ac8 | 187 | int SSL_shutdown(SSL *ssl) |
ashleymills | 0:5a29fd060ac8 | 188 | { |
ashleymills | 0:5a29fd060ac8 | 189 | return 1; |
ashleymills | 0:5a29fd060ac8 | 190 | } |
ashleymills | 0:5a29fd060ac8 | 191 | |
ashleymills | 0:5a29fd060ac8 | 192 | /*** get/set session ***/ |
ashleymills | 0:5a29fd060ac8 | 193 | SSL_SESSION *SSL_get1_session(SSL *ssl) |
ashleymills | 0:5a29fd060ac8 | 194 | { |
ashleymills | 0:5a29fd060ac8 | 195 | return (SSL_SESSION *)ssl_get_session_id(ssl); /* note: wrong cast */ |
ashleymills | 0:5a29fd060ac8 | 196 | } |
ashleymills | 0:5a29fd060ac8 | 197 | |
ashleymills | 0:5a29fd060ac8 | 198 | int SSL_set_session(SSL *ssl, SSL_SESSION *session) |
ashleymills | 0:5a29fd060ac8 | 199 | { |
ashleymills | 0:5a29fd060ac8 | 200 | memcpy(ssl->session_id, (uint8_t *)session, SSL_SESSION_ID_SIZE); |
ashleymills | 0:5a29fd060ac8 | 201 | return 1; |
ashleymills | 0:5a29fd060ac8 | 202 | } |
ashleymills | 0:5a29fd060ac8 | 203 | |
ashleymills | 0:5a29fd060ac8 | 204 | void SSL_SESSION_free(SSL_SESSION *session) { } |
ashleymills | 0:5a29fd060ac8 | 205 | /*** end get/set session ***/ |
ashleymills | 0:5a29fd060ac8 | 206 | |
ashleymills | 0:5a29fd060ac8 | 207 | long SSL_CTX_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg) |
ashleymills | 0:5a29fd060ac8 | 208 | { |
ashleymills | 0:5a29fd060ac8 | 209 | return 0; |
ashleymills | 0:5a29fd060ac8 | 210 | } |
ashleymills | 0:5a29fd060ac8 | 211 | |
ashleymills | 0:5a29fd060ac8 | 212 | void SSL_CTX_set_verify(SSL_CTX *ctx, int mode, |
ashleymills | 0:5a29fd060ac8 | 213 | int (*verify_callback)(int, void *)) { } |
ashleymills | 0:5a29fd060ac8 | 214 | |
ashleymills | 0:5a29fd060ac8 | 215 | void SSL_CTX_set_verify_depth(SSL_CTX *ctx,int depth) { } |
ashleymills | 0:5a29fd060ac8 | 216 | |
ashleymills | 0:5a29fd060ac8 | 217 | int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, |
ashleymills | 0:5a29fd060ac8 | 218 | const char *CApath) |
ashleymills | 0:5a29fd060ac8 | 219 | { |
ashleymills | 0:5a29fd060ac8 | 220 | return 1; |
ashleymills | 0:5a29fd060ac8 | 221 | } |
ashleymills | 0:5a29fd060ac8 | 222 | |
ashleymills | 0:5a29fd060ac8 | 223 | void *SSL_load_client_CA_file(const char *file) |
ashleymills | 0:5a29fd060ac8 | 224 | { |
ashleymills | 0:5a29fd060ac8 | 225 | return (void *)file; |
ashleymills | 0:5a29fd060ac8 | 226 | } |
ashleymills | 0:5a29fd060ac8 | 227 | |
ashleymills | 0:5a29fd060ac8 | 228 | void SSL_CTX_set_client_CA_list(SSL_CTX *ssl_ctx, void *file) |
ashleymills | 0:5a29fd060ac8 | 229 | { |
ashleymills | 0:5a29fd060ac8 | 230 | |
ashleymills | 0:5a29fd060ac8 | 231 | ssl_obj_load(ssl_ctx, SSL_OBJ_X509_CERT, (const char *)file, NULL); |
ashleymills | 0:5a29fd060ac8 | 232 | } |
ashleymills | 0:5a29fd060ac8 | 233 | |
ashleymills | 0:5a29fd060ac8 | 234 | void SSLv23_method(void) { } |
ashleymills | 0:5a29fd060ac8 | 235 | |
ashleymills | 0:5a29fd060ac8 | 236 | void SSL_CTX_set_default_passwd_cb(SSL_CTX *ctx, void *cb) { } |
ashleymills | 0:5a29fd060ac8 | 237 | |
ashleymills | 0:5a29fd060ac8 | 238 | void SSL_CTX_set_default_passwd_cb_userdata(SSL_CTX *ctx, void *u) |
ashleymills | 0:5a29fd060ac8 | 239 | { |
ashleymills | 0:5a29fd060ac8 | 240 | key_password = (char *)u; |
ashleymills | 0:5a29fd060ac8 | 241 | } |
ashleymills | 0:5a29fd060ac8 | 242 | |
ashleymills | 0:5a29fd060ac8 | 243 | int SSL_peek(SSL *ssl, void *buf, int num) |
ashleymills | 0:5a29fd060ac8 | 244 | { |
ashleymills | 0:5a29fd060ac8 | 245 | memcpy(buf, ssl->bm_data, num); |
ashleymills | 0:5a29fd060ac8 | 246 | return num; |
ashleymills | 0:5a29fd060ac8 | 247 | } |
ashleymills | 0:5a29fd060ac8 | 248 | |
ashleymills | 0:5a29fd060ac8 | 249 | void SSL_set_bio(SSL *ssl, void *rbio, void *wbio) { } |
ashleymills | 0:5a29fd060ac8 | 250 | |
ashleymills | 0:5a29fd060ac8 | 251 | long SSL_get_verify_result(const SSL *ssl) |
ashleymills | 0:5a29fd060ac8 | 252 | { |
ashleymills | 0:5a29fd060ac8 | 253 | return ssl_handshake_status(ssl); |
ashleymills | 0:5a29fd060ac8 | 254 | } |
ashleymills | 0:5a29fd060ac8 | 255 | |
ashleymills | 0:5a29fd060ac8 | 256 | int SSL_state(SSL *ssl) |
ashleymills | 0:5a29fd060ac8 | 257 | { |
ashleymills | 0:5a29fd060ac8 | 258 | return 0x03; // ok state |
ashleymills | 0:5a29fd060ac8 | 259 | } |
ashleymills | 0:5a29fd060ac8 | 260 | |
ashleymills | 0:5a29fd060ac8 | 261 | /** end of could do better list */ |
ashleymills | 0:5a29fd060ac8 | 262 | |
ashleymills | 0:5a29fd060ac8 | 263 | void *SSL_get_peer_certificate(const SSL *ssl) |
ashleymills | 0:5a29fd060ac8 | 264 | { |
ashleymills | 0:5a29fd060ac8 | 265 | return &ssl->ssl_ctx->certs[0]; |
ashleymills | 0:5a29fd060ac8 | 266 | } |
ashleymills | 0:5a29fd060ac8 | 267 | |
ashleymills | 0:5a29fd060ac8 | 268 | int SSL_clear(SSL *ssl) |
ashleymills | 0:5a29fd060ac8 | 269 | { |
ashleymills | 0:5a29fd060ac8 | 270 | return 1; |
ashleymills | 0:5a29fd060ac8 | 271 | } |
ashleymills | 0:5a29fd060ac8 | 272 | |
ashleymills | 0:5a29fd060ac8 | 273 | |
ashleymills | 0:5a29fd060ac8 | 274 | int SSL_CTX_check_private_key(const SSL_CTX *ctx) |
ashleymills | 0:5a29fd060ac8 | 275 | { |
ashleymills | 0:5a29fd060ac8 | 276 | return 1; |
ashleymills | 0:5a29fd060ac8 | 277 | } |
ashleymills | 0:5a29fd060ac8 | 278 | |
ashleymills | 0:5a29fd060ac8 | 279 | int SSL_CTX_set_cipher_list(SSL *s, const char *str) |
ashleymills | 0:5a29fd060ac8 | 280 | { |
ashleymills | 0:5a29fd060ac8 | 281 | return 1; |
ashleymills | 0:5a29fd060ac8 | 282 | } |
ashleymills | 0:5a29fd060ac8 | 283 | |
ashleymills | 0:5a29fd060ac8 | 284 | int SSL_get_error(const SSL *ssl, int ret) |
ashleymills | 0:5a29fd060ac8 | 285 | { |
ashleymills | 0:5a29fd060ac8 | 286 | ssl_display_error(ret); |
ashleymills | 0:5a29fd060ac8 | 287 | return 0; /* TODO: return proper return code */ |
ashleymills | 0:5a29fd060ac8 | 288 | } |
ashleymills | 0:5a29fd060ac8 | 289 | |
ashleymills | 0:5a29fd060ac8 | 290 | void SSL_CTX_set_options(SSL_CTX *ssl_ctx, int option) {} |
ashleymills | 0:5a29fd060ac8 | 291 | int SSL_library_init(void ) { return 1; } |
ashleymills | 0:5a29fd060ac8 | 292 | void SSL_load_error_strings(void ) {} |
ashleymills | 0:5a29fd060ac8 | 293 | void ERR_print_errors_fp(FILE *fp) {} |
ashleymills | 0:5a29fd060ac8 | 294 | |
ashleymills | 0:5a29fd060ac8 | 295 | #ifndef CONFIG_SSL_SKELETON_MODE |
ashleymills | 0:5a29fd060ac8 | 296 | long SSL_CTX_get_timeout(const SSL_CTX *ssl_ctx) { |
ashleymills | 0:5a29fd060ac8 | 297 | return CONFIG_SSL_EXPIRY_TIME*3600; } |
ashleymills | 0:5a29fd060ac8 | 298 | long SSL_CTX_set_timeout(SSL_CTX *ssl_ctx, long t) { |
ashleymills | 0:5a29fd060ac8 | 299 | return SSL_CTX_get_timeout(ssl_ctx); } |
ashleymills | 0:5a29fd060ac8 | 300 | #endif |
ashleymills | 0:5a29fd060ac8 | 301 | void BIO_printf(FILE *f, const char *format, ...) |
ashleymills | 0:5a29fd060ac8 | 302 | { |
ashleymills | 0:5a29fd060ac8 | 303 | va_list(ap); |
ashleymills | 0:5a29fd060ac8 | 304 | va_start(ap, format); |
ashleymills | 0:5a29fd060ac8 | 305 | vfprintf(f, format, ap); |
ashleymills | 0:5a29fd060ac8 | 306 | va_end(ap); |
ashleymills | 0:5a29fd060ac8 | 307 | } |
ashleymills | 0:5a29fd060ac8 | 308 | |
ashleymills | 0:5a29fd060ac8 | 309 | void* BIO_s_null(void) { return NULL; } |
ashleymills | 0:5a29fd060ac8 | 310 | FILE *BIO_new(bio_func_type_t func) |
ashleymills | 0:5a29fd060ac8 | 311 | { |
ashleymills | 0:5a29fd060ac8 | 312 | if (func == BIO_s_null) |
ashleymills | 0:5a29fd060ac8 | 313 | return fopen("/dev/null", "r"); |
ashleymills | 0:5a29fd060ac8 | 314 | else |
ashleymills | 0:5a29fd060ac8 | 315 | return NULL; |
ashleymills | 0:5a29fd060ac8 | 316 | } |
ashleymills | 0:5a29fd060ac8 | 317 | |
ashleymills | 0:5a29fd060ac8 | 318 | FILE *BIO_new_fp(FILE *stream, int close_flag) { return stream; } |
ashleymills | 0:5a29fd060ac8 | 319 | int BIO_free(FILE *a) { if (a != stdout && a != stderr) fclose(a); return 1; } |
ashleymills | 0:5a29fd060ac8 | 320 | |
ashleymills | 0:5a29fd060ac8 | 321 | |
ashleymills | 0:5a29fd060ac8 | 322 | |
ashleymills | 0:5a29fd060ac8 | 323 | #endif |