dtlstransport.cpp 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610
  1. /**
  2. * Copyright (c) 2019 Paul-Louis Ageneau
  3. *
  4. * This library is free software; you can redistribute it and/or
  5. * modify it under the terms of the GNU Lesser General Public
  6. * License as published by the Free Software Foundation; either
  7. * version 2.1 of the License, or (at your option) any later version.
  8. *
  9. * This library is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  12. * Lesser General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU Lesser General Public
  15. * License along with this library; if not, write to the Free Software
  16. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  17. */
  18. #include "dtlstransport.hpp"
  19. #include "icetransport.hpp"
  20. #include <chrono>
  21. #include <cstring>
  22. #include <exception>
  23. #include <iostream>
  24. using namespace std::chrono;
  25. using std::shared_ptr;
  26. using std::string;
  27. using std::unique_ptr;
  28. using std::weak_ptr;
  29. #if USE_GNUTLS
  30. #include <gnutls/dtls.h>
  31. namespace {
  32. static bool check_gnutls(int ret, const string &message = "GnuTLS error") {
  33. if (ret < 0) {
  34. if (!gnutls_error_is_fatal(ret)) {
  35. PLOG_INFO << gnutls_strerror(ret);
  36. return false;
  37. }
  38. PLOG_ERROR << message << ": " << gnutls_strerror(ret);
  39. throw std::runtime_error(message + ": " + gnutls_strerror(ret));
  40. }
  41. return true;
  42. }
  43. } // namespace
  44. namespace rtc {
  45. void DtlsTransport::Init() {
  46. // Nothing to do
  47. }
  48. void DtlsTransport::Cleanup() {
  49. // Nothing to do
  50. }
  51. DtlsTransport::DtlsTransport(shared_ptr<IceTransport> lower, certificate_ptr certificate,
  52. verifier_callback verifierCallback, state_callback stateChangeCallback)
  53. : Transport(lower, std::move(stateChangeCallback)), mCertificate(certificate),
  54. mVerifierCallback(std::move(verifierCallback)) {
  55. PLOG_DEBUG << "Initializing DTLS transport (GnuTLS)";
  56. bool active = lower->role() == Description::Role::Active;
  57. unsigned int flags = GNUTLS_DATAGRAM | (active ? GNUTLS_CLIENT : GNUTLS_SERVER);
  58. check_gnutls(gnutls_init(&mSession, flags));
  59. try {
  60. // RFC 8261: SCTP performs segmentation and reassembly based on the path MTU.
  61. // Therefore, the DTLS layer MUST NOT use any compression algorithm.
  62. // See https://tools.ietf.org/html/rfc8261#section-5
  63. const char *priorities = "SECURE128:-VERS-SSL3.0:-ARCFOUR-128:-COMP-ALL:+COMP-NULL";
  64. const char *err_pos = NULL;
  65. check_gnutls(gnutls_priority_set_direct(mSession, priorities, &err_pos),
  66. "Failed to set TLS priorities");
  67. gnutls_certificate_set_verify_function(mCertificate->credentials(), CertificateCallback);
  68. check_gnutls(
  69. gnutls_credentials_set(mSession, GNUTLS_CRD_CERTIFICATE, mCertificate->credentials()));
  70. gnutls_dtls_set_timeouts(mSession,
  71. 1000, // 1s retransmission timeout recommended by RFC 6347
  72. 30000); // 30s total timeout
  73. gnutls_handshake_set_timeout(mSession, 30000);
  74. gnutls_session_set_ptr(mSession, this);
  75. gnutls_transport_set_ptr(mSession, this);
  76. gnutls_transport_set_push_function(mSession, WriteCallback);
  77. gnutls_transport_set_pull_function(mSession, ReadCallback);
  78. gnutls_transport_set_pull_timeout_function(mSession, TimeoutCallback);
  79. mRecvThread = std::thread(&DtlsTransport::runRecvLoop, this);
  80. registerIncoming();
  81. } catch (...) {
  82. gnutls_deinit(mSession);
  83. throw;
  84. }
  85. }
  86. DtlsTransport::~DtlsTransport() {
  87. stop();
  88. gnutls_deinit(mSession);
  89. }
  90. bool DtlsTransport::stop() {
  91. if (!Transport::stop())
  92. return false;
  93. PLOG_DEBUG << "Stopping DTLS recv thread";
  94. mIncomingQueue.stop();
  95. mRecvThread.join();
  96. return true;
  97. }
  98. bool DtlsTransport::send(message_ptr message) {
  99. if (!message || state() != State::Connected)
  100. return false;
  101. PLOG_VERBOSE << "Send size=" << message->size();
  102. ssize_t ret;
  103. do {
  104. ret = gnutls_record_send(mSession, message->data(), message->size());
  105. } while (ret == GNUTLS_E_INTERRUPTED || ret == GNUTLS_E_AGAIN);
  106. if (ret == GNUTLS_E_LARGE_PACKET)
  107. return false;
  108. return check_gnutls(ret);
  109. }
  110. void DtlsTransport::incoming(message_ptr message) {
  111. if (!message) {
  112. mIncomingQueue.stop();
  113. return;
  114. }
  115. PLOG_VERBOSE << "Incoming size=" << message->size();
  116. mIncomingQueue.push(message);
  117. }
  118. void DtlsTransport::runRecvLoop() {
  119. const size_t maxMtu = 4096;
  120. // Handshake loop
  121. try {
  122. changeState(State::Connecting);
  123. gnutls_dtls_set_mtu(mSession, 1280 - 40 - 8); // min MTU over UDP/IPv6
  124. int ret;
  125. do {
  126. ret = gnutls_handshake(mSession);
  127. if (ret == GNUTLS_E_LARGE_PACKET)
  128. throw std::runtime_error("MTU is too low");
  129. } while (ret == GNUTLS_E_INTERRUPTED || ret == GNUTLS_E_AGAIN ||
  130. !check_gnutls(ret, "DTLS handshake failed"));
  131. // RFC 8261: DTLS MUST support sending messages larger than the current path MTU
  132. // See https://tools.ietf.org/html/rfc8261#section-5
  133. gnutls_dtls_set_mtu(mSession, maxMtu + 1);
  134. } catch (const std::exception &e) {
  135. PLOG_ERROR << "DTLS handshake: " << e.what();
  136. changeState(State::Failed);
  137. return;
  138. }
  139. // Receive loop
  140. try {
  141. PLOG_INFO << "DTLS handshake finished";
  142. changeState(State::Connected);
  143. const size_t bufferSize = maxMtu;
  144. char buffer[bufferSize];
  145. while (true) {
  146. ssize_t ret;
  147. do {
  148. ret = gnutls_record_recv(mSession, buffer, bufferSize);
  149. } while (ret == GNUTLS_E_INTERRUPTED || ret == GNUTLS_E_AGAIN);
  150. // Consider premature termination as remote closing
  151. if (ret == GNUTLS_E_PREMATURE_TERMINATION) {
  152. PLOG_DEBUG << "DTLS connection terminated";
  153. break;
  154. }
  155. if (check_gnutls(ret)) {
  156. if (ret == 0) {
  157. // Closed
  158. PLOG_DEBUG << "DTLS connection cleanly closed";
  159. break;
  160. }
  161. auto *b = reinterpret_cast<byte *>(buffer);
  162. recv(make_message(b, b + ret));
  163. }
  164. }
  165. } catch (const std::exception &e) {
  166. PLOG_ERROR << "DTLS recv: " << e.what();
  167. }
  168. gnutls_bye(mSession, GNUTLS_SHUT_RDWR);
  169. PLOG_INFO << "DTLS closed";
  170. changeState(State::Disconnected);
  171. recv(nullptr);
  172. }
  173. int DtlsTransport::CertificateCallback(gnutls_session_t session) {
  174. DtlsTransport *t = static_cast<DtlsTransport *>(gnutls_session_get_ptr(session));
  175. if (gnutls_certificate_type_get(session) != GNUTLS_CRT_X509) {
  176. return GNUTLS_E_CERTIFICATE_ERROR;
  177. }
  178. unsigned int count = 0;
  179. const gnutls_datum_t *array = gnutls_certificate_get_peers(session, &count);
  180. if (!array || count == 0) {
  181. return GNUTLS_E_CERTIFICATE_ERROR;
  182. }
  183. gnutls_x509_crt_t crt;
  184. check_gnutls(gnutls_x509_crt_init(&crt));
  185. int ret = gnutls_x509_crt_import(crt, &array[0], GNUTLS_X509_FMT_DER);
  186. if (ret != GNUTLS_E_SUCCESS) {
  187. gnutls_x509_crt_deinit(crt);
  188. return GNUTLS_E_CERTIFICATE_ERROR;
  189. }
  190. string fingerprint = make_fingerprint(crt);
  191. gnutls_x509_crt_deinit(crt);
  192. bool success = t->mVerifierCallback(fingerprint);
  193. return success ? GNUTLS_E_SUCCESS : GNUTLS_E_CERTIFICATE_ERROR;
  194. }
  195. ssize_t DtlsTransport::WriteCallback(gnutls_transport_ptr_t ptr, const void *data, size_t len) {
  196. DtlsTransport *t = static_cast<DtlsTransport *>(ptr);
  197. if (len > 0) {
  198. auto b = reinterpret_cast<const byte *>(data);
  199. t->outgoing(make_message(b, b + len));
  200. }
  201. gnutls_transport_set_errno(t->mSession, 0);
  202. return ssize_t(len);
  203. }
  204. ssize_t DtlsTransport::ReadCallback(gnutls_transport_ptr_t ptr, void *data, size_t maxlen) {
  205. DtlsTransport *t = static_cast<DtlsTransport *>(ptr);
  206. if (auto next = t->mIncomingQueue.pop()) {
  207. auto message = *next;
  208. ssize_t len = std::min(maxlen, message->size());
  209. std::memcpy(data, message->data(), len);
  210. gnutls_transport_set_errno(t->mSession, 0);
  211. return len;
  212. }
  213. // Closed
  214. gnutls_transport_set_errno(t->mSession, 0);
  215. return 0;
  216. }
  217. int DtlsTransport::TimeoutCallback(gnutls_transport_ptr_t ptr, unsigned int ms) {
  218. DtlsTransport *t = static_cast<DtlsTransport *>(ptr);
  219. t->mIncomingQueue.wait(ms != GNUTLS_INDEFINITE_TIMEOUT ? std::make_optional(milliseconds(ms))
  220. : nullopt);
  221. return !t->mIncomingQueue.empty() ? 1 : 0;
  222. }
  223. } // namespace rtc
  224. #else // USE_GNUTLS==0
  225. #include <openssl/bio.h>
  226. #include <openssl/ec.h>
  227. #include <openssl/err.h>
  228. #include <openssl/ssl.h>
  229. namespace {
  230. const int BIO_EOF = -1;
  231. string openssl_error_string(unsigned long err) {
  232. const size_t bufferSize = 256;
  233. char buffer[bufferSize];
  234. ERR_error_string_n(err, buffer, bufferSize);
  235. return string(buffer);
  236. }
  237. bool check_openssl(int success, const string &message = "OpenSSL error") {
  238. if (success)
  239. return true;
  240. string str = openssl_error_string(ERR_get_error());
  241. PLOG_ERROR << message << ": " << str;
  242. throw std::runtime_error(message + ": " + str);
  243. }
  244. bool check_openssl_ret(SSL *ssl, int ret, const string &message = "OpenSSL error") {
  245. if (ret == BIO_EOF)
  246. return true;
  247. unsigned long err = SSL_get_error(ssl, ret);
  248. if (err == SSL_ERROR_NONE || err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
  249. return true;
  250. }
  251. if (err == SSL_ERROR_ZERO_RETURN) {
  252. PLOG_DEBUG << "DTLS connection cleanly closed";
  253. return false;
  254. }
  255. string str = openssl_error_string(err);
  256. PLOG_ERROR << str;
  257. throw std::runtime_error(message + ": " + str);
  258. }
  259. } // namespace
  260. namespace rtc {
  261. BIO_METHOD *DtlsTransport::BioMethods = NULL;
  262. int DtlsTransport::TransportExIndex = -1;
  263. std::mutex DtlsTransport::GlobalMutex;
  264. void DtlsTransport::Init() {
  265. std::lock_guard lock(GlobalMutex);
  266. if (!BioMethods) {
  267. BioMethods = BIO_meth_new(BIO_TYPE_BIO, "DTLS writer");
  268. if (!BioMethods)
  269. throw std::runtime_error("Failed to create BIO methods for DTLS writer");
  270. BIO_meth_set_create(BioMethods, BioMethodNew);
  271. BIO_meth_set_destroy(BioMethods, BioMethodFree);
  272. BIO_meth_set_write(BioMethods, BioMethodWrite);
  273. BIO_meth_set_ctrl(BioMethods, BioMethodCtrl);
  274. }
  275. if (TransportExIndex < 0) {
  276. TransportExIndex = SSL_get_ex_new_index(0, NULL, NULL, NULL, NULL);
  277. }
  278. }
  279. void DtlsTransport::Cleanup() {
  280. // Nothing to do
  281. }
  282. DtlsTransport::DtlsTransport(shared_ptr<IceTransport> lower, shared_ptr<Certificate> certificate,
  283. verifier_callback verifierCallback, state_callback stateChangeCallback)
  284. : Transport(lower, std::move(stateChangeCallback)), mCertificate(certificate),
  285. mVerifierCallback(std::move(verifierCallback)) {
  286. PLOG_DEBUG << "Initializing DTLS transport (OpenSSL)";
  287. try {
  288. if (!(mCtx = SSL_CTX_new(DTLS_method())))
  289. throw std::runtime_error("Failed to create SSL context");
  290. check_openssl(SSL_CTX_set_cipher_list(mCtx, "ALL:!LOW:!EXP:!RC4:!MD5:@STRENGTH"),
  291. "Failed to set SSL priorities");
  292. // RFC 8261: SCTP performs segmentation and reassembly based on the path MTU.
  293. // Therefore, the DTLS layer MUST NOT use any compression algorithm.
  294. // See https://tools.ietf.org/html/rfc8261#section-5
  295. SSL_CTX_set_options(mCtx, SSL_OP_NO_SSLv3 | SSL_OP_NO_COMPRESSION | SSL_OP_NO_QUERY_MTU);
  296. SSL_CTX_set_min_proto_version(mCtx, DTLS1_VERSION);
  297. SSL_CTX_set_read_ahead(mCtx, 1);
  298. SSL_CTX_set_quiet_shutdown(mCtx, 1);
  299. SSL_CTX_set_info_callback(mCtx, InfoCallback);
  300. SSL_CTX_set_verify(mCtx, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
  301. CertificateCallback);
  302. SSL_CTX_set_verify_depth(mCtx, 1);
  303. auto [x509, pkey] = mCertificate->credentials();
  304. SSL_CTX_use_certificate(mCtx, x509);
  305. SSL_CTX_use_PrivateKey(mCtx, pkey);
  306. check_openssl(SSL_CTX_check_private_key(mCtx), "SSL local private key check failed");
  307. if (!(mSsl = SSL_new(mCtx)))
  308. throw std::runtime_error("Failed to create SSL instance");
  309. SSL_set_ex_data(mSsl, TransportExIndex, this);
  310. if (lower->role() == Description::Role::Active)
  311. SSL_set_connect_state(mSsl);
  312. else
  313. SSL_set_accept_state(mSsl);
  314. if (!(mInBio = BIO_new(BIO_s_mem())) || !(mOutBio = BIO_new(BioMethods)))
  315. throw std::runtime_error("Failed to create BIO");
  316. BIO_set_mem_eof_return(mInBio, BIO_EOF);
  317. BIO_set_data(mOutBio, this);
  318. SSL_set_bio(mSsl, mInBio, mOutBio);
  319. auto ecdh = unique_ptr<EC_KEY, decltype(&EC_KEY_free)>(
  320. EC_KEY_new_by_curve_name(NID_X9_62_prime256v1), EC_KEY_free);
  321. SSL_set_options(mSsl, SSL_OP_SINGLE_ECDH_USE);
  322. SSL_set_tmp_ecdh(mSsl, ecdh.get());
  323. mRecvThread = std::thread(&DtlsTransport::runRecvLoop, this);
  324. registerIncoming();
  325. } catch (...) {
  326. if (mSsl)
  327. SSL_free(mSsl);
  328. if (mCtx)
  329. SSL_CTX_free(mCtx);
  330. throw;
  331. }
  332. }
  333. DtlsTransport::~DtlsTransport() {
  334. stop();
  335. SSL_free(mSsl);
  336. SSL_CTX_free(mCtx);
  337. }
  338. bool DtlsTransport::stop() {
  339. if (!Transport::stop())
  340. return false;
  341. PLOG_DEBUG << "Stopping DTLS recv thread";
  342. mIncomingQueue.stop();
  343. mRecvThread.join();
  344. SSL_shutdown(mSsl);
  345. return true;
  346. }
  347. bool DtlsTransport::send(message_ptr message) {
  348. if (!message || state() != State::Connected)
  349. return false;
  350. PLOG_VERBOSE << "Send size=" << message->size();
  351. int ret = SSL_write(mSsl, message->data(), message->size());
  352. return check_openssl_ret(mSsl, ret);
  353. }
  354. void DtlsTransport::incoming(message_ptr message) {
  355. if (!message) {
  356. mIncomingQueue.stop();
  357. return;
  358. }
  359. PLOG_VERBOSE << "Incoming size=" << message->size();
  360. mIncomingQueue.push(message);
  361. }
  362. void DtlsTransport::runRecvLoop() {
  363. const size_t maxMtu = 4096;
  364. try {
  365. changeState(State::Connecting);
  366. SSL_set_mtu(mSsl, 1280 - 40 - 8); // min MTU over UDP/IPv6
  367. // Initiate the handshake
  368. int ret = SSL_do_handshake(mSsl);
  369. check_openssl_ret(mSsl, ret, "Handshake failed");
  370. const size_t bufferSize = maxMtu;
  371. byte buffer[bufferSize];
  372. while (true) {
  373. // Process pending messages
  374. while (!mIncomingQueue.empty()) {
  375. auto message = *mIncomingQueue.pop();
  376. BIO_write(mInBio, message->data(), message->size());
  377. if (state() == State::Connecting) {
  378. // Continue the handshake
  379. int ret = SSL_do_handshake(mSsl);
  380. if (!check_openssl_ret(mSsl, ret, "Handshake failed"))
  381. break;
  382. if (SSL_is_init_finished(mSsl)) {
  383. // RFC 8261: DTLS MUST support sending messages larger than the current path
  384. // MTU See https://tools.ietf.org/html/rfc8261#section-5
  385. SSL_set_mtu(mSsl, maxMtu + 1);
  386. PLOG_INFO << "DTLS handshake finished";
  387. changeState(State::Connected);
  388. }
  389. } else {
  390. int ret = SSL_read(mSsl, buffer, bufferSize);
  391. if (!check_openssl_ret(mSsl, ret))
  392. break;
  393. if (ret > 0)
  394. recv(make_message(buffer, buffer + ret));
  395. }
  396. }
  397. // No more messages pending, retransmit and rearm timeout if connecting
  398. std::optional<milliseconds> duration;
  399. if (state() == State::Connecting) {
  400. // Warning: This function breaks the usual return value convention
  401. int ret = DTLSv1_handle_timeout(mSsl);
  402. if (ret < 0) {
  403. throw std::runtime_error("Handshake timeout"); // write BIO can't fail
  404. } else if (ret > 0) {
  405. LOG_VERBOSE << "OpenSSL did DTLS retransmit";
  406. }
  407. struct timeval timeout = {};
  408. if (state() == State::Connecting && DTLSv1_get_timeout(mSsl, &timeout)) {
  409. duration = milliseconds(timeout.tv_sec * 1000 + timeout.tv_usec / 1000);
  410. // Also handle handshake timeout manually because OpenSSL actually doesn't...
  411. // OpenSSL backs off exponentially in base 2 starting from the recommended 1s
  412. // so this allows for 5 retransmissions and fails after roughly 30s.
  413. if (duration > 30s) {
  414. throw std::runtime_error("Handshake timeout");
  415. } else {
  416. LOG_VERBOSE << "OpenSSL DTLS retransmit timeout is " << duration->count()
  417. << "ms";
  418. }
  419. }
  420. }
  421. if (!mIncomingQueue.wait(duration))
  422. break; // queue is stopped
  423. }
  424. } catch (const std::exception &e) {
  425. PLOG_ERROR << "DTLS recv: " << e.what();
  426. }
  427. if (state() == State::Connected) {
  428. PLOG_INFO << "DTLS closed";
  429. changeState(State::Disconnected);
  430. recv(nullptr);
  431. } else {
  432. PLOG_ERROR << "DTLS handshake failed";
  433. changeState(State::Failed);
  434. }
  435. }
  436. int DtlsTransport::CertificateCallback(int preverify_ok, X509_STORE_CTX *ctx) {
  437. SSL *ssl =
  438. static_cast<SSL *>(X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx()));
  439. DtlsTransport *t =
  440. static_cast<DtlsTransport *>(SSL_get_ex_data(ssl, DtlsTransport::TransportExIndex));
  441. X509 *crt = X509_STORE_CTX_get_current_cert(ctx);
  442. std::string fingerprint = make_fingerprint(crt);
  443. return t->mVerifierCallback(fingerprint) ? 1 : 0;
  444. }
  445. void DtlsTransport::InfoCallback(const SSL *ssl, int where, int ret) {
  446. DtlsTransport *t =
  447. static_cast<DtlsTransport *>(SSL_get_ex_data(ssl, DtlsTransport::TransportExIndex));
  448. if (where & SSL_CB_ALERT) {
  449. if (ret != 256) { // Close Notify
  450. PLOG_ERROR << "DTLS alert: " << SSL_alert_desc_string_long(ret);
  451. }
  452. t->mIncomingQueue.stop(); // Close the connection
  453. }
  454. }
  455. int DtlsTransport::BioMethodNew(BIO *bio) {
  456. BIO_set_init(bio, 1);
  457. BIO_set_data(bio, NULL);
  458. BIO_set_shutdown(bio, 0);
  459. return 1;
  460. }
  461. int DtlsTransport::BioMethodFree(BIO *bio) {
  462. if (!bio)
  463. return 0;
  464. BIO_set_data(bio, NULL);
  465. return 1;
  466. }
  467. int DtlsTransport::BioMethodWrite(BIO *bio, const char *in, int inl) {
  468. if (inl <= 0)
  469. return inl;
  470. auto transport = reinterpret_cast<DtlsTransport *>(BIO_get_data(bio));
  471. if (!transport)
  472. return -1;
  473. auto b = reinterpret_cast<const byte *>(in);
  474. transport->outgoing(make_message(b, b + inl));
  475. return inl; // can't fail
  476. }
  477. long DtlsTransport::BioMethodCtrl(BIO *bio, int cmd, long num, void *ptr) {
  478. switch (cmd) {
  479. case BIO_CTRL_FLUSH:
  480. return 1;
  481. case BIO_CTRL_DGRAM_QUERY_MTU:
  482. return 0; // SSL_OP_NO_QUERY_MTU must be set
  483. case BIO_CTRL_WPENDING:
  484. case BIO_CTRL_PENDING:
  485. return 0;
  486. default:
  487. break;
  488. }
  489. return 0;
  490. }
  491. } // namespace rtc
  492. #endif