dtlstransport.cpp 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611
  1. /**
  2. * Copyright (c) 2019 Paul-Louis Ageneau
  3. *
  4. * This library is free software; you can redistribute it and/or
  5. * modify it under the terms of the GNU Lesser General Public
  6. * License as published by the Free Software Foundation; either
  7. * version 2.1 of the License, or (at your option) any later version.
  8. *
  9. * This library is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  12. * Lesser General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU Lesser General Public
  15. * License along with this library; if not, write to the Free Software
  16. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  17. */
  18. #include "dtlstransport.hpp"
  19. #include "globals.hpp"
  20. #include "icetransport.hpp"
  21. #include <chrono>
  22. #include <cstring>
  23. #include <exception>
  24. #include <iostream>
  25. #if !USE_GNUTLS
  26. #ifdef _WIN32
  27. #include <winsock2.h> // for timeval
  28. #else
  29. #include <sys/time.h> // for timeval
  30. #endif
  31. #endif
  32. using namespace std::chrono;
  33. namespace rtc::impl {
  34. #if USE_GNUTLS
  35. void DtlsTransport::Init() {
  36. gnutls_global_init(); // optional
  37. }
  38. void DtlsTransport::Cleanup() { gnutls_global_deinit(); }
  39. DtlsTransport::DtlsTransport(shared_ptr<IceTransport> lower, certificate_ptr certificate,
  40. optional<size_t> mtu, verifier_callback verifierCallback,
  41. state_callback stateChangeCallback)
  42. : Transport(lower, std::move(stateChangeCallback)), mMtu(mtu), mCertificate(certificate),
  43. mVerifierCallback(std::move(verifierCallback)),
  44. mIsClient(lower->role() == Description::Role::Active), mCurrentDscp(0) {
  45. PLOG_DEBUG << "Initializing DTLS transport (GnuTLS)";
  46. gnutls_certificate_credentials_t creds = mCertificate->credentials();
  47. gnutls_certificate_set_verify_function(creds, CertificateCallback);
  48. unsigned int flags = GNUTLS_DATAGRAM | (mIsClient ? GNUTLS_CLIENT : GNUTLS_SERVER);
  49. gnutls::check(gnutls_init(&mSession, flags));
  50. try {
  51. // RFC 8261: SCTP performs segmentation and reassembly based on the path MTU.
  52. // Therefore, the DTLS layer MUST NOT use any compression algorithm.
  53. // See https://tools.ietf.org/html/rfc8261#section-5
  54. const char *priorities = "SECURE128:-VERS-SSL3.0:-ARCFOUR-128:-COMP-ALL:+COMP-NULL";
  55. const char *err_pos = NULL;
  56. gnutls::check(gnutls_priority_set_direct(mSession, priorities, &err_pos),
  57. "Failed to set TLS priorities");
  58. gnutls::check(gnutls_credentials_set(mSession, GNUTLS_CRD_CERTIFICATE, creds));
  59. gnutls_dtls_set_timeouts(mSession,
  60. 1000, // 1s retransmission timeout recommended by RFC 6347
  61. 30000); // 30s total timeout
  62. gnutls_handshake_set_timeout(mSession, 30000);
  63. gnutls_session_set_ptr(mSession, this);
  64. gnutls_transport_set_ptr(mSession, this);
  65. gnutls_transport_set_push_function(mSession, WriteCallback);
  66. gnutls_transport_set_pull_function(mSession, ReadCallback);
  67. gnutls_transport_set_pull_timeout_function(mSession, TimeoutCallback);
  68. } catch (...) {
  69. gnutls_deinit(mSession);
  70. throw;
  71. }
  72. }
  73. DtlsTransport::~DtlsTransport() {
  74. stop();
  75. gnutls_deinit(mSession);
  76. }
  77. void DtlsTransport::start() {
  78. Transport::start();
  79. registerIncoming();
  80. PLOG_DEBUG << "Starting DTLS recv thread";
  81. mRecvThread = std::thread(&DtlsTransport::runRecvLoop, this);
  82. }
  83. bool DtlsTransport::stop() {
  84. if (!Transport::stop())
  85. return false;
  86. PLOG_DEBUG << "Stopping DTLS recv thread";
  87. mIncomingQueue.stop();
  88. mRecvThread.join();
  89. return true;
  90. }
  91. bool DtlsTransport::send(message_ptr message) {
  92. if (!message || state() != State::Connected)
  93. return false;
  94. PLOG_VERBOSE << "Send size=" << message->size();
  95. ssize_t ret;
  96. do {
  97. std::lock_guard lock(mSendMutex);
  98. mCurrentDscp = message->dscp;
  99. ret = gnutls_record_send(mSession, message->data(), message->size());
  100. } while (ret == GNUTLS_E_INTERRUPTED || ret == GNUTLS_E_AGAIN);
  101. if (ret == GNUTLS_E_LARGE_PACKET)
  102. return false;
  103. return gnutls::check(ret);
  104. }
  105. void DtlsTransport::incoming(message_ptr message) {
  106. if (!message) {
  107. mIncomingQueue.stop();
  108. return;
  109. }
  110. PLOG_VERBOSE << "Incoming size=" << message->size();
  111. mIncomingQueue.push(message);
  112. }
  113. bool DtlsTransport::outgoing(message_ptr message) {
  114. if (message->dscp == 0)
  115. message->dscp = mCurrentDscp;
  116. return Transport::outgoing(std::move(message));
  117. }
  118. void DtlsTransport::postHandshake() {
  119. // Dummy
  120. }
  121. void DtlsTransport::runRecvLoop() {
  122. const size_t bufferSize = 4096;
  123. // Handshake loop
  124. try {
  125. changeState(State::Connecting);
  126. size_t mtu = mMtu.value_or(DEFAULT_MTU) - 8 - 40; // UDP/IPv6
  127. gnutls_dtls_set_mtu(mSession, static_cast<unsigned int>(mtu));
  128. PLOG_VERBOSE << "SSL MTU set to " << mtu;
  129. int ret;
  130. do {
  131. ret = gnutls_handshake(mSession);
  132. if (ret == GNUTLS_E_LARGE_PACKET)
  133. throw std::runtime_error("MTU is too low");
  134. } while (ret == GNUTLS_E_INTERRUPTED || ret == GNUTLS_E_AGAIN ||
  135. !gnutls::check(ret, "DTLS handshake failed"));
  136. // RFC 8261: DTLS MUST support sending messages larger than the current path MTU
  137. // See https://tools.ietf.org/html/rfc8261#section-5
  138. gnutls_dtls_set_mtu(mSession, bufferSize + 1);
  139. } catch (const std::exception &e) {
  140. PLOG_ERROR << "DTLS handshake: " << e.what();
  141. changeState(State::Failed);
  142. return;
  143. }
  144. // Receive loop
  145. try {
  146. PLOG_INFO << "DTLS handshake finished";
  147. postHandshake();
  148. changeState(State::Connected);
  149. char buffer[bufferSize];
  150. while (true) {
  151. ssize_t ret;
  152. do {
  153. ret = gnutls_record_recv(mSession, buffer, bufferSize);
  154. } while (ret == GNUTLS_E_INTERRUPTED || ret == GNUTLS_E_AGAIN);
  155. // RFC 8827: Implementations MUST NOT implement DTLS renegotiation and MUST reject it
  156. // with a "no_renegotiation" alert if offered.
  157. // See https://tools.ietf.org/html/rfc8827#section-6.5
  158. if (ret == GNUTLS_E_REHANDSHAKE) {
  159. do {
  160. std::lock_guard lock(mSendMutex);
  161. ret = gnutls_alert_send(mSession, GNUTLS_AL_WARNING, GNUTLS_A_NO_RENEGOTIATION);
  162. } while (ret == GNUTLS_E_INTERRUPTED || ret == GNUTLS_E_AGAIN);
  163. continue;
  164. }
  165. // Consider premature termination as remote closing
  166. if (ret == GNUTLS_E_PREMATURE_TERMINATION) {
  167. PLOG_DEBUG << "DTLS connection terminated";
  168. break;
  169. }
  170. if (gnutls::check(ret)) {
  171. if (ret == 0) {
  172. // Closed
  173. PLOG_DEBUG << "DTLS connection cleanly closed";
  174. break;
  175. }
  176. auto *b = reinterpret_cast<byte *>(buffer);
  177. recv(make_message(b, b + ret));
  178. }
  179. }
  180. } catch (const std::exception &e) {
  181. PLOG_ERROR << "DTLS recv: " << e.what();
  182. }
  183. gnutls_bye(mSession, GNUTLS_SHUT_RDWR);
  184. PLOG_INFO << "DTLS closed";
  185. changeState(State::Disconnected);
  186. recv(nullptr);
  187. }
  188. int DtlsTransport::CertificateCallback(gnutls_session_t session) {
  189. DtlsTransport *t = static_cast<DtlsTransport *>(gnutls_session_get_ptr(session));
  190. if (gnutls_certificate_type_get(session) != GNUTLS_CRT_X509) {
  191. return GNUTLS_E_CERTIFICATE_ERROR;
  192. }
  193. unsigned int count = 0;
  194. const gnutls_datum_t *array = gnutls_certificate_get_peers(session, &count);
  195. if (!array || count == 0) {
  196. return GNUTLS_E_CERTIFICATE_ERROR;
  197. }
  198. gnutls_x509_crt_t crt;
  199. gnutls::check(gnutls_x509_crt_init(&crt));
  200. int ret = gnutls_x509_crt_import(crt, &array[0], GNUTLS_X509_FMT_DER);
  201. if (ret != GNUTLS_E_SUCCESS) {
  202. gnutls_x509_crt_deinit(crt);
  203. return GNUTLS_E_CERTIFICATE_ERROR;
  204. }
  205. string fingerprint = make_fingerprint(crt);
  206. gnutls_x509_crt_deinit(crt);
  207. bool success = t->mVerifierCallback(fingerprint);
  208. return success ? GNUTLS_E_SUCCESS : GNUTLS_E_CERTIFICATE_ERROR;
  209. }
  210. ssize_t DtlsTransport::WriteCallback(gnutls_transport_ptr_t ptr, const void *data, size_t len) {
  211. DtlsTransport *t = static_cast<DtlsTransport *>(ptr);
  212. if (len > 0) {
  213. auto b = reinterpret_cast<const byte *>(data);
  214. t->outgoing(make_message(b, b + len));
  215. }
  216. gnutls_transport_set_errno(t->mSession, 0);
  217. return ssize_t(len);
  218. }
  219. ssize_t DtlsTransport::ReadCallback(gnutls_transport_ptr_t ptr, void *data, size_t maxlen) {
  220. DtlsTransport *t = static_cast<DtlsTransport *>(ptr);
  221. if (auto next = t->mIncomingQueue.pop()) {
  222. message_ptr message = std::move(*next);
  223. ssize_t len = std::min(maxlen, message->size());
  224. std::memcpy(data, message->data(), len);
  225. gnutls_transport_set_errno(t->mSession, 0);
  226. return len;
  227. }
  228. // Closed
  229. gnutls_transport_set_errno(t->mSession, 0);
  230. return 0;
  231. }
  232. int DtlsTransport::TimeoutCallback(gnutls_transport_ptr_t ptr, unsigned int ms) {
  233. DtlsTransport *t = static_cast<DtlsTransport *>(ptr);
  234. bool notEmpty = t->mIncomingQueue.wait(
  235. ms != GNUTLS_INDEFINITE_TIMEOUT ? std::make_optional(milliseconds(ms)) : nullopt);
  236. return notEmpty ? 1 : 0;
  237. }
  238. #else // USE_GNUTLS==0
  239. BIO_METHOD *DtlsTransport::BioMethods = NULL;
  240. int DtlsTransport::TransportExIndex = -1;
  241. std::mutex DtlsTransport::GlobalMutex;
  242. void DtlsTransport::Init() {
  243. std::lock_guard lock(GlobalMutex);
  244. openssl::init();
  245. if (!BioMethods) {
  246. BioMethods = BIO_meth_new(BIO_TYPE_BIO, "DTLS writer");
  247. if (!BioMethods)
  248. throw std::runtime_error("Failed to create BIO methods for DTLS writer");
  249. BIO_meth_set_create(BioMethods, BioMethodNew);
  250. BIO_meth_set_destroy(BioMethods, BioMethodFree);
  251. BIO_meth_set_write(BioMethods, BioMethodWrite);
  252. BIO_meth_set_ctrl(BioMethods, BioMethodCtrl);
  253. }
  254. if (TransportExIndex < 0) {
  255. TransportExIndex = SSL_get_ex_new_index(0, NULL, NULL, NULL, NULL);
  256. }
  257. }
  258. void DtlsTransport::Cleanup() {
  259. // Nothing to do
  260. }
  261. DtlsTransport::DtlsTransport(shared_ptr<IceTransport> lower, shared_ptr<Certificate> certificate,
  262. optional<size_t> mtu, verifier_callback verifierCallback,
  263. state_callback stateChangeCallback)
  264. : Transport(lower, std::move(stateChangeCallback)), mMtu(mtu), mCertificate(certificate),
  265. mVerifierCallback(std::move(verifierCallback)),
  266. mIsClient(lower->role() == Description::Role::Active), mCurrentDscp(0) {
  267. PLOG_DEBUG << "Initializing DTLS transport (OpenSSL)";
  268. try {
  269. mCtx = SSL_CTX_new(DTLS_method());
  270. if (!mCtx)
  271. throw std::runtime_error("Failed to create SSL context");
  272. openssl::check(SSL_CTX_set_cipher_list(mCtx, "ALL:!LOW:!EXP:!RC4:!MD5:@STRENGTH"),
  273. "Failed to set SSL priorities");
  274. // RFC 8261: SCTP performs segmentation and reassembly based on the path MTU.
  275. // Therefore, the DTLS layer MUST NOT use any compression algorithm.
  276. // See https://tools.ietf.org/html/rfc8261#section-5
  277. // RFC 8827: Implementations MUST NOT implement DTLS renegotiation
  278. // See https://tools.ietf.org/html/rfc8827#section-6.5
  279. SSL_CTX_set_options(mCtx, SSL_OP_NO_SSLv3 | SSL_OP_NO_COMPRESSION | SSL_OP_NO_QUERY_MTU |
  280. SSL_OP_NO_RENEGOTIATION);
  281. SSL_CTX_set_min_proto_version(mCtx, DTLS1_VERSION);
  282. SSL_CTX_set_read_ahead(mCtx, 1);
  283. SSL_CTX_set_quiet_shutdown(mCtx, 1);
  284. SSL_CTX_set_info_callback(mCtx, InfoCallback);
  285. SSL_CTX_set_verify(mCtx, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
  286. CertificateCallback);
  287. SSL_CTX_set_verify_depth(mCtx, 1);
  288. auto [x509, pkey] = mCertificate->credentials();
  289. SSL_CTX_use_certificate(mCtx, x509);
  290. SSL_CTX_use_PrivateKey(mCtx, pkey);
  291. openssl::check(SSL_CTX_check_private_key(mCtx), "SSL local private key check failed");
  292. mSsl = SSL_new(mCtx);
  293. if (!mSsl)
  294. throw std::runtime_error("Failed to create SSL instance");
  295. SSL_set_ex_data(mSsl, TransportExIndex, this);
  296. if (mIsClient)
  297. SSL_set_connect_state(mSsl);
  298. else
  299. SSL_set_accept_state(mSsl);
  300. mInBio = BIO_new(BIO_s_mem());
  301. mOutBio = BIO_new(BioMethods);
  302. if (!mInBio || !mOutBio)
  303. throw std::runtime_error("Failed to create BIO");
  304. BIO_set_mem_eof_return(mInBio, BIO_EOF);
  305. BIO_set_data(mOutBio, this);
  306. SSL_set_bio(mSsl, mInBio, mOutBio);
  307. auto ecdh = unique_ptr<EC_KEY, decltype(&EC_KEY_free)>(
  308. EC_KEY_new_by_curve_name(NID_X9_62_prime256v1), EC_KEY_free);
  309. SSL_set_options(mSsl, SSL_OP_SINGLE_ECDH_USE);
  310. SSL_set_tmp_ecdh(mSsl, ecdh.get());
  311. } catch (...) {
  312. if (mSsl)
  313. SSL_free(mSsl);
  314. if (mCtx)
  315. SSL_CTX_free(mCtx);
  316. throw;
  317. }
  318. }
  319. DtlsTransport::~DtlsTransport() {
  320. stop();
  321. SSL_free(mSsl);
  322. SSL_CTX_free(mCtx);
  323. }
  324. void DtlsTransport::start() {
  325. Transport::start();
  326. registerIncoming();
  327. PLOG_DEBUG << "Starting DTLS recv thread";
  328. mRecvThread = std::thread(&DtlsTransport::runRecvLoop, this);
  329. }
  330. bool DtlsTransport::stop() {
  331. if (!Transport::stop())
  332. return false;
  333. PLOG_DEBUG << "Stopping DTLS recv thread";
  334. mIncomingQueue.stop();
  335. mRecvThread.join();
  336. SSL_shutdown(mSsl);
  337. return true;
  338. }
  339. bool DtlsTransport::send(message_ptr message) {
  340. if (!message || state() != State::Connected)
  341. return false;
  342. PLOG_VERBOSE << "Send size=" << message->size();
  343. mCurrentDscp = message->dscp;
  344. int ret = SSL_write(mSsl, message->data(), int(message->size()));
  345. return openssl::check(mSsl, ret);
  346. }
  347. void DtlsTransport::incoming(message_ptr message) {
  348. if (!message) {
  349. mIncomingQueue.stop();
  350. return;
  351. }
  352. PLOG_VERBOSE << "Incoming size=" << message->size();
  353. mIncomingQueue.push(message);
  354. }
  355. bool DtlsTransport::outgoing(message_ptr message) {
  356. if (message->dscp == 0)
  357. message->dscp = mCurrentDscp;
  358. return Transport::outgoing(std::move(message));
  359. }
  360. void DtlsTransport::postHandshake() {
  361. // Dummy
  362. }
  363. void DtlsTransport::runRecvLoop() {
  364. const size_t bufferSize = 4096;
  365. try {
  366. changeState(State::Connecting);
  367. size_t mtu = mMtu.value_or(DEFAULT_MTU) - 8 - 40; // UDP/IPv6
  368. SSL_set_mtu(mSsl, static_cast<unsigned int>(mtu));
  369. PLOG_VERBOSE << "SSL MTU set to " << mtu;
  370. // Initiate the handshake
  371. int ret = SSL_do_handshake(mSsl);
  372. openssl::check(mSsl, ret, "Handshake failed");
  373. byte buffer[bufferSize];
  374. while (mIncomingQueue.running()) {
  375. // Process pending messages
  376. while (auto next = mIncomingQueue.tryPop()) {
  377. message_ptr message = std::move(*next);
  378. BIO_write(mInBio, message->data(), int(message->size()));
  379. if (state() == State::Connecting) {
  380. // Continue the handshake
  381. ret = SSL_do_handshake(mSsl);
  382. if (!openssl::check(mSsl, ret, "Handshake failed"))
  383. break;
  384. if (SSL_is_init_finished(mSsl)) {
  385. // RFC 8261: DTLS MUST support sending messages larger than the current path
  386. // MTU See https://tools.ietf.org/html/rfc8261#section-5
  387. SSL_set_mtu(mSsl, bufferSize + 1);
  388. PLOG_INFO << "DTLS handshake finished";
  389. postHandshake();
  390. changeState(State::Connected);
  391. }
  392. } else {
  393. ret = SSL_read(mSsl, buffer, bufferSize);
  394. if (!openssl::check(mSsl, ret))
  395. break;
  396. if (ret > 0)
  397. recv(make_message(buffer, buffer + ret));
  398. }
  399. }
  400. // No more messages pending, retransmit and rearm timeout if connecting
  401. optional<milliseconds> duration;
  402. if (state() == State::Connecting) {
  403. // Warning: This function breaks the usual return value convention
  404. ret = DTLSv1_handle_timeout(mSsl);
  405. if (ret < 0) {
  406. throw std::runtime_error("Handshake timeout"); // write BIO can't fail
  407. } else if (ret > 0) {
  408. LOG_VERBOSE << "OpenSSL did DTLS retransmit";
  409. }
  410. struct timeval timeout = {};
  411. if (state() == State::Connecting && DTLSv1_get_timeout(mSsl, &timeout)) {
  412. duration = milliseconds(timeout.tv_sec * 1000 + timeout.tv_usec / 1000);
  413. // Also handle handshake timeout manually because OpenSSL actually doesn't...
  414. // OpenSSL backs off exponentially in base 2 starting from the recommended 1s
  415. // so this allows for 5 retransmissions and fails after roughly 30s.
  416. if (duration > 30s) {
  417. throw std::runtime_error("Handshake timeout");
  418. } else {
  419. LOG_VERBOSE << "OpenSSL DTLS retransmit timeout is " << duration->count()
  420. << "ms";
  421. }
  422. }
  423. }
  424. mIncomingQueue.wait(duration);
  425. }
  426. } catch (const std::exception &e) {
  427. PLOG_ERROR << "DTLS recv: " << e.what();
  428. }
  429. if (state() == State::Connected) {
  430. PLOG_INFO << "DTLS closed";
  431. changeState(State::Disconnected);
  432. recv(nullptr);
  433. } else {
  434. PLOG_ERROR << "DTLS handshake failed";
  435. changeState(State::Failed);
  436. }
  437. }
  438. int DtlsTransport::CertificateCallback(int /*preverify_ok*/, X509_STORE_CTX *ctx) {
  439. SSL *ssl =
  440. static_cast<SSL *>(X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx()));
  441. DtlsTransport *t =
  442. static_cast<DtlsTransport *>(SSL_get_ex_data(ssl, DtlsTransport::TransportExIndex));
  443. X509 *crt = X509_STORE_CTX_get_current_cert(ctx);
  444. string fingerprint = make_fingerprint(crt);
  445. return t->mVerifierCallback(fingerprint) ? 1 : 0;
  446. }
  447. void DtlsTransport::InfoCallback(const SSL *ssl, int where, int ret) {
  448. DtlsTransport *t =
  449. static_cast<DtlsTransport *>(SSL_get_ex_data(ssl, DtlsTransport::TransportExIndex));
  450. if (where & SSL_CB_ALERT) {
  451. if (ret != 256) { // Close Notify
  452. PLOG_ERROR << "DTLS alert: " << SSL_alert_desc_string_long(ret);
  453. }
  454. t->mIncomingQueue.stop(); // Close the connection
  455. }
  456. }
  457. int DtlsTransport::BioMethodNew(BIO *bio) {
  458. BIO_set_init(bio, 1);
  459. BIO_set_data(bio, NULL);
  460. BIO_set_shutdown(bio, 0);
  461. return 1;
  462. }
  463. int DtlsTransport::BioMethodFree(BIO *bio) {
  464. if (!bio)
  465. return 0;
  466. BIO_set_data(bio, NULL);
  467. return 1;
  468. }
  469. int DtlsTransport::BioMethodWrite(BIO *bio, const char *in, int inl) {
  470. if (inl <= 0)
  471. return inl;
  472. auto transport = reinterpret_cast<DtlsTransport *>(BIO_get_data(bio));
  473. if (!transport)
  474. return -1;
  475. auto b = reinterpret_cast<const byte *>(in);
  476. transport->outgoing(make_message(b, b + inl));
  477. return inl; // can't fail
  478. }
  479. long DtlsTransport::BioMethodCtrl(BIO * /*bio*/, int cmd, long /*num*/, void * /*ptr*/) {
  480. switch (cmd) {
  481. case BIO_CTRL_FLUSH:
  482. return 1;
  483. case BIO_CTRL_DGRAM_QUERY_MTU:
  484. return 0; // SSL_OP_NO_QUERY_MTU must be set
  485. case BIO_CTRL_WPENDING:
  486. case BIO_CTRL_PENDING:
  487. return 0;
  488. default:
  489. break;
  490. }
  491. return 0;
  492. }
  493. #endif
  494. } // namespace rtc::impl