CloverBootloader/Library/OpensslLib/OpensslStub/SslExtServNull.c

518 lines
8.5 KiB
C

/** @file
Null implementation of SslExtServ functions called by TlsLib.
Copyright (c) 2023, Intel Corporation. All rights reserved.<BR>
SPDX-License-Identifier: BSD-2-Clause-Patent
**/
#include <openssl/ocsp.h>
#include "../ssl_local.h"
#include "statem_local.h"
#include "internal/cryptlib.h"
int
tls_parse_ctos_renegotiate (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return -1;
}
int
tls_parse_ctos_server_name (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_maxfragmentlen (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#ifndef OPENSSL_NO_SRP
int
tls_parse_ctos_srp (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#endif
int
tls_parse_ctos_ec_pt_formats (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_session_ticket (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_sig_algs_cert (
SSL *s,
PACKET *pkt,
ossl_unused unsigned int context,
ossl_unused X509 *x,
ossl_unused size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_sig_algs (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#ifndef OPENSSL_NO_OCSP
int
tls_parse_ctos_status_request (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#endif
#ifndef OPENSSL_NO_NEXTPROTONEG
int
tls_parse_ctos_npn (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#endif
/*
* Save the ALPN extension in a ClientHello.|pkt| holds the contents of the ALPN
* extension, not including type and length. Returns: 1 on success, 0 on error.
*/
int
tls_parse_ctos_alpn (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#ifndef OPENSSL_NO_SRTP
int
tls_parse_ctos_use_srtp (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#endif
int
tls_parse_ctos_etm (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
/*
* Process a psk_kex_modes extension received in the ClientHello. |pkt| contains
* the raw PACKET data for the extension. Returns 1 on success or 0 on failure.
*/
int
tls_parse_ctos_psk_kex_modes (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
/*
* Process a key_share extension received in the ClientHello. |pkt| contains
* the raw PACKET data for the extension. Returns 1 on success or 0 on failure.
*/
int
tls_parse_ctos_key_share (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_cookie (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_supported_groups (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_ems (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_early_data (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_psk (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_post_handshake_auth (
SSL *s,
PACKET *pkt,
ossl_unused unsigned int context,
ossl_unused X509 *x,
ossl_unused size_t chainidx
)
{
return 0;
}
/*
* Add the server's renegotiation binding
*/
EXT_RETURN
tls_construct_stoc_renegotiate (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_server_name (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
/* Add/include the server's max fragment len extension into ServerHello */
EXT_RETURN
tls_construct_stoc_maxfragmentlen (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_ec_pt_formats (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_supported_groups (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_session_ticket (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
#ifndef OPENSSL_NO_OCSP
EXT_RETURN
tls_construct_stoc_status_request (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
#endif
#ifndef OPENSSL_NO_NEXTPROTONEG
EXT_RETURN
tls_construct_stoc_next_proto_neg (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
#endif
EXT_RETURN
tls_construct_stoc_alpn (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
#ifndef OPENSSL_NO_SRTP
EXT_RETURN
tls_construct_stoc_use_srtp (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
#endif
EXT_RETURN
tls_construct_stoc_etm (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_ems (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_supported_versions (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_key_share (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_cookie (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_cryptopro_bug (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_early_data (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_psk (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}