3f568da142dbf8590ed98a99ee2f558d82e0dda7
[openssl.git] / crypto / bio / bss_dgram.c
1 /* crypto/bio/bio_dgram.c */
2 /* 
3  * DTLS implementation written by Nagendra Modadugu
4  * (nagendra@cs.stanford.edu) for the OpenSSL project 2005.  
5  */
6 /* ====================================================================
7  * Copyright (c) 1999-2005 The OpenSSL Project.  All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted provided that the following conditions
11  * are met:
12  *
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer. 
15  *
16  * 2. Redistributions in binary form must reproduce the above copyright
17  *    notice, this list of conditions and the following disclaimer in
18  *    the documentation and/or other materials provided with the
19  *    distribution.
20  *
21  * 3. All advertising materials mentioning features or use of this
22  *    software must display the following acknowledgment:
23  *    "This product includes software developed by the OpenSSL Project
24  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25  *
26  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
27  *    endorse or promote products derived from this software without
28  *    prior written permission. For written permission, please contact
29  *    openssl-core@OpenSSL.org.
30  *
31  * 5. Products derived from this software may not be called "OpenSSL"
32  *    nor may "OpenSSL" appear in their names without prior written
33  *    permission of the OpenSSL Project.
34  *
35  * 6. Redistributions of any form whatsoever must retain the following
36  *    acknowledgment:
37  *    "This product includes software developed by the OpenSSL Project
38  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39  *
40  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
41  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
44  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51  * OF THE POSSIBILITY OF SUCH DAMAGE.
52  * ====================================================================
53  *
54  * This product includes cryptographic software written by Eric Young
55  * (eay@cryptsoft.com).  This product includes software written by Tim
56  * Hudson (tjh@cryptsoft.com).
57  *
58  */
59
60 #ifndef OPENSSL_NO_DGRAM
61
62 #include <stdio.h>
63 #include <errno.h>
64 #define USE_SOCKETS
65 #include "cryptlib.h"
66
67 #include <openssl/bio.h>
68
69 #if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VMS)
70 #include <sys/timeb.h>
71 #endif
72
73 #ifdef OPENSSL_SYS_LINUX
74 #define IP_MTU      14 /* linux is lame */
75 #endif
76
77 #ifdef WATT32
78 #define sock_write SockWrite  /* Watt-32 uses same names */
79 #define sock_read  SockRead
80 #define sock_puts  SockPuts
81 #endif
82
83 static int dgram_write(BIO *h, const char *buf, int num);
84 static int dgram_read(BIO *h, char *buf, int size);
85 static int dgram_puts(BIO *h, const char *str);
86 static long dgram_ctrl(BIO *h, int cmd, long arg1, void *arg2);
87 static int dgram_new(BIO *h);
88 static int dgram_free(BIO *data);
89 static int dgram_clear(BIO *bio);
90
91 static int BIO_dgram_should_retry(int s);
92
93 static void get_current_time(struct timeval *t);
94
95 static BIO_METHOD methods_dgramp=
96         {
97         BIO_TYPE_DGRAM,
98         "datagram socket",
99         dgram_write,
100         dgram_read,
101         dgram_puts,
102         NULL, /* dgram_gets, */
103         dgram_ctrl,
104         dgram_new,
105         dgram_free,
106         NULL,
107         };
108
109 typedef struct bio_dgram_data_st
110         {
111         struct sockaddr peer;
112         unsigned int connected;
113         unsigned int _errno;
114         unsigned int mtu;
115         struct timeval next_timeout;
116         struct timeval socket_timeout;
117         } bio_dgram_data;
118
119 BIO_METHOD *BIO_s_datagram(void)
120         {
121         return(&methods_dgramp);
122         }
123
124 BIO *BIO_new_dgram(int fd, int close_flag)
125         {
126         BIO *ret;
127
128         ret=BIO_new(BIO_s_datagram());
129         if (ret == NULL) return(NULL);
130         BIO_set_fd(ret,fd,close_flag);
131         return(ret);
132         }
133
134 static int dgram_new(BIO *bi)
135         {
136         bio_dgram_data *data = NULL;
137
138         bi->init=0;
139         bi->num=0;
140         data = OPENSSL_malloc(sizeof(bio_dgram_data));
141         if (data == NULL)
142                 return 0;
143         memset(data, 0x00, sizeof(bio_dgram_data));
144     bi->ptr = data;
145
146         bi->flags=0;
147         return(1);
148         }
149
150 static int dgram_free(BIO *a)
151         {
152         bio_dgram_data *data;
153
154         if (a == NULL) return(0);
155         if ( ! dgram_clear(a))
156                 return 0;
157
158         data = (bio_dgram_data *)a->ptr;
159         if(data != NULL) OPENSSL_free(data);
160
161         return(1);
162         }
163
164 static int dgram_clear(BIO *a)
165         {
166         if (a == NULL) return(0);
167         if (a->shutdown)
168                 {
169                 if (a->init)
170                         {
171                         SHUTDOWN2(a->num);
172                         }
173                 a->init=0;
174                 a->flags=0;
175                 }
176         return(1);
177         }
178
179 static void dgram_adjust_rcv_timeout(BIO *b)
180         {
181 #if defined(SO_RCVTIMEO)
182         bio_dgram_data *data = (bio_dgram_data *)b->ptr;
183         int sz = sizeof(int);
184
185         /* Is a timer active? */
186         if (data->next_timeout.tv_sec > 0 || data->next_timeout.tv_usec > 0)
187                 {
188                 struct timeval timenow, timeleft;
189
190                 /* Read current socket timeout */
191 #ifdef OPENSSL_SYS_WINDOWS
192                 int timeout;
193                 if (getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO,
194                                            (void*)&timeout, &sz) < 0)
195                         { perror("getsockopt"); }
196                 else
197                         {
198                         data->socket_timeout.tv_sec = timeout / 1000;
199                         data->socket_timeout.tv_usec = (timeout % 1000) * 1000;
200                         }
201 #else
202                 if ( getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, 
203                                                 &(data->socket_timeout), (void *)&sz) < 0)
204                         { perror("getsockopt"); }
205 #endif
206
207                 /* Get current time */
208                 get_current_time(&timenow);
209
210                 /* Calculate time left until timer expires */
211                 memcpy(&timeleft, &(data->next_timeout), sizeof(struct timeval));
212                 timeleft.tv_sec -= timenow.tv_sec;
213                 timeleft.tv_usec -= timenow.tv_usec;
214                 if (timeleft.tv_usec < 0)
215                         {
216                         timeleft.tv_sec--;
217                         timeleft.tv_usec += 1000000;
218                         }
219
220                 /* Adjust socket timeout if next handhake message timer
221                  * will expire earlier.
222                  */
223                 if (data->socket_timeout.tv_sec < timeleft.tv_sec ||
224                         (data->socket_timeout.tv_sec == timeleft.tv_sec &&
225                          data->socket_timeout.tv_usec <= timeleft.tv_usec))
226                         {
227 #ifdef OPENSSL_SYS_WINDOWS
228                         timeout = timeleft.tv_sec * 1000 + timeleft.tv_usec / 1000;
229                         if (setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO,
230                                                    (void*)&timeout, sizeof(timeout)) < 0)
231                                 { perror("setsockopt"); }
232 #else
233                         if ( setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, &timeleft,
234                                                         sizeof(struct timeval)) < 0)
235                                 { perror("setsockopt"); }
236 #endif
237                         }
238                 }
239 #endif
240         }
241
242 static void dgram_reset_rcv_timeout(BIO *b)
243         {
244 #if defined(SO_RCVTIMEO)
245         bio_dgram_data *data = (bio_dgram_data *)b->ptr;
246 #ifdef OPENSSL_SYS_WINDOWS
247         int timeout = data->socket_timeout.tv_sec * 1000 +
248                                   data->socket_timeout.tv_usec / 1000;
249         if (setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO,
250                                    (void*)&timeout, sizeof(timeout)) < 0)
251                 { perror("setsockopt"); }
252 #else
253         if ( setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, &(data->socket_timeout),
254                                         sizeof(struct timeval)) < 0)
255                 { perror("setsockopt"); }
256 #endif
257 #endif
258         }
259
260 static int dgram_read(BIO *b, char *out, int outl)
261         {
262         int ret=0;
263         bio_dgram_data *data = (bio_dgram_data *)b->ptr;
264
265         struct sockaddr peer;
266         int peerlen = sizeof(peer);
267
268         if (out != NULL)
269                 {
270                 clear_socket_error();
271                 memset(&peer, 0x00, peerlen);
272                 /* Last arg in recvfrom is signed on some platforms and
273                  * unsigned on others. It is of type socklen_t on some
274                  * but this is not universal. Cast to (void *) to avoid
275                  * compiler warnings.
276                  */
277                 dgram_adjust_rcv_timeout(b);
278                 ret=recvfrom(b->num,out,outl,0,&peer,(void *)&peerlen);
279                 dgram_reset_rcv_timeout(b);
280
281                 if ( ! data->connected  && ret > 0)
282                         BIO_ctrl(b, BIO_CTRL_DGRAM_CONNECT, 0, &peer);
283
284                 BIO_clear_retry_flags(b);
285                 if (ret <= 0)
286                         {
287                         if (BIO_dgram_should_retry(ret))
288                                 {
289                                 BIO_set_retry_read(b);
290                                 data->_errno = get_last_socket_error();
291                                 }
292 #if 0
293                         memset(&(data->hstimeout), 0, sizeof(struct timeval));
294 #endif
295                         }
296                 }
297         return(ret);
298         }
299
300 static int dgram_write(BIO *b, const char *in, int inl)
301         {
302         int ret;
303         bio_dgram_data *data = (bio_dgram_data *)b->ptr;
304         clear_socket_error();
305
306     if ( data->connected )
307         ret=writesocket(b->num,in,inl);
308     else
309 #if defined(NETWARE_CLIB) && defined(NETWARE_BSDSOCK)
310         ret=sendto(b->num, (char *)in, inl, 0, &data->peer, sizeof(data->peer));
311 #else
312         ret=sendto(b->num, in, inl, 0, &data->peer, sizeof(data->peer));
313 #endif
314
315         BIO_clear_retry_flags(b);
316         if (ret <= 0)
317                 {
318                 if (BIO_sock_should_retry(ret))
319                         {
320                         BIO_set_retry_write(b);  
321                         data->_errno = get_last_socket_error();
322
323 #if 0 /* higher layers are responsible for querying MTU, if necessary */
324                         if ( data->_errno == EMSGSIZE)
325                                 /* retrieve the new MTU */
326                                 BIO_ctrl(b, BIO_CTRL_DGRAM_QUERY_MTU, 0, NULL);
327 #endif
328                         }
329                 }
330         return(ret);
331         }
332
333 static long dgram_ctrl(BIO *b, int cmd, long num, void *ptr)
334         {
335         long ret=1;
336         int *ip;
337         struct sockaddr *to = NULL;
338         bio_dgram_data *data = NULL;
339         long sockopt_val = 0;
340         unsigned int sockopt_len = 0;
341 #ifdef OPENSSL_SYS_LINUX
342         socklen_t addr_len;
343         struct sockaddr_storage addr;
344 #endif
345
346         data = (bio_dgram_data *)b->ptr;
347
348         switch (cmd)
349                 {
350         case BIO_CTRL_RESET:
351                 num=0;
352         case BIO_C_FILE_SEEK:
353                 ret=0;
354                 break;
355         case BIO_C_FILE_TELL:
356         case BIO_CTRL_INFO:
357                 ret=0;
358                 break;
359         case BIO_C_SET_FD:
360                 dgram_clear(b);
361                 b->num= *((int *)ptr);
362                 b->shutdown=(int)num;
363                 b->init=1;
364                 break;
365         case BIO_C_GET_FD:
366                 if (b->init)
367                         {
368                         ip=(int *)ptr;
369                         if (ip != NULL) *ip=b->num;
370                         ret=b->num;
371                         }
372                 else
373                         ret= -1;
374                 break;
375         case BIO_CTRL_GET_CLOSE:
376                 ret=b->shutdown;
377                 break;
378         case BIO_CTRL_SET_CLOSE:
379                 b->shutdown=(int)num;
380                 break;
381         case BIO_CTRL_PENDING:
382         case BIO_CTRL_WPENDING:
383                 ret=0;
384                 break;
385         case BIO_CTRL_DUP:
386         case BIO_CTRL_FLUSH:
387                 ret=1;
388                 break;
389         case BIO_CTRL_DGRAM_CONNECT:
390                 to = (struct sockaddr *)ptr;
391 #if 0
392                 if (connect(b->num, to, sizeof(struct sockaddr)) < 0)
393                         { perror("connect"); ret = 0; }
394                 else
395                         {
396 #endif
397                         memcpy(&(data->peer),to, sizeof(struct sockaddr));
398 #if 0
399                         }
400 #endif
401                 break;
402                 /* (Linux)kernel sets DF bit on outgoing IP packets */
403         case BIO_CTRL_DGRAM_MTU_DISCOVER:
404 #ifdef OPENSSL_SYS_LINUX
405                 addr_len = (socklen_t)sizeof(struct sockaddr_storage);
406                 memset((void *)&addr, 0, sizeof(struct sockaddr_storage));
407                 if (getsockname(b->num, (void *)&addr, &addr_len) < 0)
408                         {
409                         ret = 0;
410                         break;
411                         }
412                 sockopt_len = sizeof(sockopt_val);
413                 switch (addr.ss_family)
414                         {
415                 case AF_INET:
416                         sockopt_val = IP_PMTUDISC_DO;
417                         if ((ret = setsockopt(b->num, IPPROTO_IP, IP_MTU_DISCOVER,
418                                 &sockopt_val, sizeof(sockopt_val))) < 0)
419                                 perror("setsockopt");
420                         break;
421                 case AF_INET6:
422                         sockopt_val = IPV6_PMTUDISC_DO;
423                         if ((ret = setsockopt(b->num, IPPROTO_IPV6, IPV6_MTU_DISCOVER,
424                                 &sockopt_val, sizeof(sockopt_val))) < 0)
425                                 perror("setsockopt");
426                         break;
427                 default:
428                         ret = -1;
429                         break;
430                         }
431                 ret = -1;
432 #else
433                 break;
434 #endif
435         case BIO_CTRL_DGRAM_QUERY_MTU:
436 #ifdef OPENSSL_SYS_LINUX
437                 addr_len = (socklen_t)sizeof(struct sockaddr_storage);
438                 memset((void *)&addr, 0, sizeof(struct sockaddr_storage));
439                 if (getsockname(b->num, (void *)&addr, &addr_len) < 0)
440                         {
441                         ret = 0;
442                         break;
443                         }
444                 sockopt_len = sizeof(sockopt_val);
445                 switch (addr.ss_family)
446                         {
447                 case AF_INET:
448                         if ((ret = getsockopt(b->num, IPPROTO_IP, IP_MTU, (void *)&sockopt_val,
449                                 &sockopt_len)) < 0 || sockopt_val < 0)
450                                 {
451                                 ret = 0;
452                                 }
453                         else
454                                 {
455                                 /* we assume that the transport protocol is UDP and no
456                                  * IP options are used.
457                                  */
458                                 data->mtu = sockopt_val - 8 - 20;
459                                 ret = data->mtu;
460                                 }
461                         break;
462                 case AF_INET6:
463                         if ((ret = getsockopt(b->num, IPPROTO_IPV6, IPV6_MTU, (void *)&sockopt_val,
464                                 &sockopt_len)) < 0 || sockopt_val < 0)
465                                 {
466                                 ret = 0;
467                                 }
468                         else
469                                 {
470                                 /* we assume that the transport protocol is UDP and no
471                                  * IPV6 options are used.
472                                  */
473                                 data->mtu = sockopt_val - 8 - 40;
474                                 ret = data->mtu;
475                                 }
476                         break;
477                 default:
478                         ret = 0;
479                         break;
480                         }
481 #else
482                 ret = 0;
483 #endif
484                 break;
485         case BIO_CTRL_DGRAM_GET_MTU:
486                 return data->mtu;
487                 break;
488         case BIO_CTRL_DGRAM_SET_MTU:
489                 data->mtu = num;
490                 ret = num;
491                 break;
492         case BIO_CTRL_DGRAM_SET_CONNECTED:
493                 to = (struct sockaddr *)ptr;
494
495                 if ( to != NULL)
496                         {
497                         data->connected = 1;
498                         memcpy(&(data->peer),to, sizeof(struct sockaddr));
499                         }
500                 else
501                         {
502                         data->connected = 0;
503                         memset(&(data->peer), 0x00, sizeof(struct sockaddr));
504                         }
505                 break;
506     case BIO_CTRL_DGRAM_SET_PEER:
507         to = (struct sockaddr *) ptr;
508
509         memcpy(&(data->peer), to, sizeof(struct sockaddr));
510         break;
511         case BIO_CTRL_DGRAM_SET_NEXT_TIMEOUT:
512                 memcpy(&(data->next_timeout), ptr, sizeof(struct timeval));             
513                 break;
514 #if defined(SO_RCVTIMEO)
515         case BIO_CTRL_DGRAM_SET_RECV_TIMEOUT:
516 #ifdef OPENSSL_SYS_WINDOWS
517                 {
518                 struct timeval *tv = (struct timeval *)ptr;
519                 int timeout = tv->tv_sec * 1000 + tv->tv_usec/1000;
520                 if (setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO,
521                         (void*)&timeout, sizeof(timeout)) < 0)
522                         { perror("setsockopt"); ret = -1; }
523                 }
524 #else
525                 if ( setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, ptr,
526                         sizeof(struct timeval)) < 0)
527                         { perror("setsockopt"); ret = -1; }
528 #endif
529                 break;
530         case BIO_CTRL_DGRAM_GET_RECV_TIMEOUT:
531 #ifdef OPENSSL_SYS_WINDOWS
532                 {
533                 int timeout, sz = sizeof(timeout);
534                 struct timeval *tv = (struct timeval *)ptr;
535                 if (getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO,
536                         (void*)&timeout, &sz) < 0)
537                         { perror("getsockopt"); ret = -1; }
538                 else
539                         {
540                         tv->tv_sec = timeout / 1000;
541                         tv->tv_usec = (timeout % 1000) * 1000;
542                         ret = sizeof(*tv);
543                         }
544                 }
545 #else
546                 if ( getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, 
547                         ptr, (void *)&ret) < 0)
548                         { perror("getsockopt"); ret = -1; }
549 #endif
550                 break;
551 #endif
552 #if defined(SO_SNDTIMEO)
553         case BIO_CTRL_DGRAM_SET_SEND_TIMEOUT:
554 #ifdef OPENSSL_SYS_WINDOWS
555                 {
556                 struct timeval *tv = (struct timeval *)ptr;
557                 int timeout = tv->tv_sec * 1000 + tv->tv_usec/1000;
558                 if (setsockopt(b->num, SOL_SOCKET, SO_SNDTIMEO,
559                         (void*)&timeout, sizeof(timeout)) < 0)
560                         { perror("setsockopt"); ret = -1; }
561                 }
562 #else
563                 if ( setsockopt(b->num, SOL_SOCKET, SO_SNDTIMEO, ptr,
564                         sizeof(struct timeval)) < 0)
565                         { perror("setsockopt"); ret = -1; }
566 #endif
567                 break;
568         case BIO_CTRL_DGRAM_GET_SEND_TIMEOUT:
569 #ifdef OPENSSL_SYS_WINDOWS
570                 {
571                 int timeout, sz = sizeof(timeout);
572                 struct timeval *tv = (struct timeval *)ptr;
573                 if (getsockopt(b->num, SOL_SOCKET, SO_SNDTIMEO,
574                         (void*)&timeout, &sz) < 0)
575                         { perror("getsockopt"); ret = -1; }
576                 else
577                         {
578                         tv->tv_sec = timeout / 1000;
579                         tv->tv_usec = (timeout % 1000) * 1000;
580                         ret = sizeof(*tv);
581                         }
582                 }
583 #else
584                 if ( getsockopt(b->num, SOL_SOCKET, SO_SNDTIMEO, 
585                         ptr, (void *)&ret) < 0)
586                         { perror("getsockopt"); ret = -1; }
587 #endif
588                 break;
589 #endif
590         case BIO_CTRL_DGRAM_GET_SEND_TIMER_EXP:
591                 /* fall-through */
592         case BIO_CTRL_DGRAM_GET_RECV_TIMER_EXP:
593 #ifdef OPENSSL_SYS_WINDOWS
594                 if ( data->_errno == WSAETIMEDOUT)
595 #else
596                 if ( data->_errno == EAGAIN)
597 #endif
598                         {
599                         ret = 1;
600                         data->_errno = 0;
601                         }
602                 else
603                         ret = 0;
604                 break;
605 #ifdef EMSGSIZE
606         case BIO_CTRL_DGRAM_MTU_EXCEEDED:
607                 if ( data->_errno == EMSGSIZE)
608                         {
609                         ret = 1;
610                         data->_errno = 0;
611                         }
612                 else
613                         ret = 0;
614                 break;
615 #endif
616         default:
617                 ret=0;
618                 break;
619                 }
620         return(ret);
621         }
622
623 static int dgram_puts(BIO *bp, const char *str)
624         {
625         int n,ret;
626
627         n=strlen(str);
628         ret=dgram_write(bp,str,n);
629         return(ret);
630         }
631
632 static int BIO_dgram_should_retry(int i)
633         {
634         int err;
635
636         if ((i == 0) || (i == -1))
637                 {
638                 err=get_last_socket_error();
639
640 #if defined(OPENSSL_SYS_WINDOWS) && 0 /* more microsoft stupidity? perhaps not? Ben 4/1/99 */
641                 if ((i == -1) && (err == 0))
642                         return(1);
643 #endif
644
645                 return(BIO_dgram_non_fatal_error(err));
646                 }
647         return(0);
648         }
649
650 int BIO_dgram_non_fatal_error(int err)
651         {
652         switch (err)
653                 {
654 #if defined(OPENSSL_SYS_WINDOWS)
655 # if defined(WSAEWOULDBLOCK)
656         case WSAEWOULDBLOCK:
657 # endif
658
659 # if 0 /* This appears to always be an error */
660 #  if defined(WSAENOTCONN)
661         case WSAENOTCONN:
662 #  endif
663 # endif
664 #endif
665
666 #ifdef EWOULDBLOCK
667 # ifdef WSAEWOULDBLOCK
668 #  if WSAEWOULDBLOCK != EWOULDBLOCK
669         case EWOULDBLOCK:
670 #  endif
671 # else
672         case EWOULDBLOCK:
673 # endif
674 #endif
675
676 #if defined(ENOTCONN)
677         case ENOTCONN:
678 #endif
679
680 #ifdef EINTR
681         case EINTR:
682 #endif
683
684 #ifdef EAGAIN
685 #if EWOULDBLOCK != EAGAIN
686         case EAGAIN:
687 # endif
688 #endif
689
690 #ifdef EPROTO
691         case EPROTO:
692 #endif
693
694 #ifdef EINPROGRESS
695         case EINPROGRESS:
696 #endif
697
698 #ifdef EALREADY
699         case EALREADY:
700 #endif
701
702 /* DF bit set, and packet larger than MTU */
703 #ifdef EMSGSIZE
704         case EMSGSIZE:
705 #endif
706
707                 return(1);
708                 /* break; */
709         default:
710                 break;
711                 }
712         return(0);
713         }
714 #endif
715
716 static void get_current_time(struct timeval *t)
717         {
718 #ifdef OPENSSL_SYS_WIN32
719         struct _timeb tb;
720         _ftime(&tb);
721         t->tv_sec = (long)tb.time;
722         t->tv_usec = (long)tb.millitm * 1000;
723 #elif defined(OPENSSL_SYS_VMS)
724         struct timeb tb;
725         ftime(&tb);
726         t->tv_sec = (long)tb.time;
727         t->tv_usec = (long)tb.millitm * 1000;
728 #else
729         gettimeofday(t, NULL);
730 #endif
731         }