Files
system76-edk2/CryptoPkg/Library/OpensslLib/OpensslStub/SslExtServNull.c
Yi Li dfa6147a79 CryptoPkg: add more dummy implement of openssl for size optimization
Add dummy implement of Encoder, Pkcs12 and sslserver.
OpenSSL libraries which don't need these features can include
these files to reduce the size of output.

Signed-off-by: Yi Li <yi1.li@intel.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Xiaoyu Lu <xiaoyu1.lu@intel.com>
Cc: Guomin Jiang <guomin.jiang@intel.com>
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
Acked-by: Ard Biesheuvel <ardb@kernel.org>
Tested-by: Ard Biesheuvel <ardb@kernel.org>
Tested-by: Brian J. Johnson <brian.johnson@hpe.com>
Tested-by: Kenneth Lautner <klautner@microsoft.com>
2023-08-09 07:10:31 +00:00

518 lines
8.5 KiB
C

/** @file
Null implementation of SslExtServ functions called by TlsLib.
Copyright (c) 2023, Intel Corporation. All rights reserved.<BR>
SPDX-License-Identifier: BSD-2-Clause-Patent
**/
#include <openssl/ocsp.h>
#include "../ssl_local.h"
#include "statem_local.h"
#include "internal/cryptlib.h"
int
tls_parse_ctos_renegotiate (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return -1;
}
int
tls_parse_ctos_server_name (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_maxfragmentlen (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#ifndef OPENSSL_NO_SRP
int
tls_parse_ctos_srp (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#endif
int
tls_parse_ctos_ec_pt_formats (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_session_ticket (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_sig_algs_cert (
SSL *s,
PACKET *pkt,
ossl_unused unsigned int context,
ossl_unused X509 *x,
ossl_unused size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_sig_algs (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#ifndef OPENSSL_NO_OCSP
int
tls_parse_ctos_status_request (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#endif
#ifndef OPENSSL_NO_NEXTPROTONEG
int
tls_parse_ctos_npn (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#endif
/*
* Save the ALPN extension in a ClientHello.|pkt| holds the contents of the ALPN
* extension, not including type and length. Returns: 1 on success, 0 on error.
*/
int
tls_parse_ctos_alpn (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#ifndef OPENSSL_NO_SRTP
int
tls_parse_ctos_use_srtp (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
#endif
int
tls_parse_ctos_etm (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
/*
* Process a psk_kex_modes extension received in the ClientHello. |pkt| contains
* the raw PACKET data for the extension. Returns 1 on success or 0 on failure.
*/
int
tls_parse_ctos_psk_kex_modes (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
/*
* Process a key_share extension received in the ClientHello. |pkt| contains
* the raw PACKET data for the extension. Returns 1 on success or 0 on failure.
*/
int
tls_parse_ctos_key_share (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_cookie (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_supported_groups (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_ems (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_early_data (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_psk (
SSL *s,
PACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return 0;
}
int
tls_parse_ctos_post_handshake_auth (
SSL *s,
PACKET *pkt,
ossl_unused unsigned int context,
ossl_unused X509 *x,
ossl_unused size_t chainidx
)
{
return 0;
}
/*
* Add the server's renegotiation binding
*/
EXT_RETURN
tls_construct_stoc_renegotiate (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_server_name (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
/* Add/include the server's max fragment len extension into ServerHello */
EXT_RETURN
tls_construct_stoc_maxfragmentlen (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_ec_pt_formats (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_supported_groups (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_session_ticket (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
#ifndef OPENSSL_NO_OCSP
EXT_RETURN
tls_construct_stoc_status_request (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
#endif
#ifndef OPENSSL_NO_NEXTPROTONEG
EXT_RETURN
tls_construct_stoc_next_proto_neg (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
#endif
EXT_RETURN
tls_construct_stoc_alpn (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
#ifndef OPENSSL_NO_SRTP
EXT_RETURN
tls_construct_stoc_use_srtp (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
#endif
EXT_RETURN
tls_construct_stoc_etm (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_ems (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_supported_versions (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_key_share (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_cookie (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_cryptopro_bug (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_early_data (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}
EXT_RETURN
tls_construct_stoc_psk (
SSL *s,
WPACKET *pkt,
unsigned int context,
X509 *x,
size_t chainidx
)
{
return EXT_RETURN_FAIL;
}