s_time.c 12.4 KB
Newer Older
R
Rich Salz 已提交
1
/*
2
 * Copyright 1995-2017 The OpenSSL Project Authors. All Rights Reserved.
3
 *
R
Rich Salz 已提交
4 5 6 7
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
8 9
 */

10
#define NO_SHUTDOWN
11 12 13 14 15

#include <stdio.h>
#include <stdlib.h>
#include <string.h>

M
Matt Caswell 已提交
16 17 18 19
#include <openssl/opensslconf.h>

#ifndef OPENSSL_NO_SOCK

20 21
#define USE_SOCKETS
#include "apps.h"
22 23 24
#include <openssl/x509.h>
#include <openssl/ssl.h>
#include <openssl/pem.h>
25
#include "s_apps.h"
26
#include <openssl/err.h>
27
#if !defined(OPENSSL_SYS_MSDOS)
28
# include OPENSSL_UNISTD
29
#endif
30

U
Ulf Möller 已提交
31
#undef ioctl
32 33
#define ioctl ioctlsocket

34
#define SSL_CONNECT_NAME        "localhost:4433"
35

36
/* no default cert. */
37 38 39
/*
 * #define TEST_CERT "client.pem"
 */
40

41 42
#undef min
#undef max
43 44 45 46
#define min(a,b) (((a) < (b)) ? (a) : (b))
#define max(a,b) (((a) > (b)) ? (a) : (b))

#undef SECONDS
47
#define SECONDS 30
48 49 50
#define SECONDSSTR "30"

static SSL *doConnection(SSL *scon, const char *host, SSL_CTX *ctx);
51

P
Pauli 已提交
52 53 54 55 56
/*
 * Define a HTTP get command globally.
 * Also define the size of the command, this is two bytes less than
 * the size of the string because the %s is replaced by the URL.
 */
57
static const char fmt_http_get_cmd[] = "GET %s HTTP/1.0\r\n\r\n";
P
Pauli 已提交
58
static const size_t fmt_http_get_cmd_size = sizeof(fmt_http_get_cmd) - 2;
59

60 61
typedef enum OPTION_choice {
    OPT_ERR = -1, OPT_EOF = 0, OPT_HELP,
62
    OPT_CONNECT, OPT_CIPHER, OPT_CERT, OPT_NAMEOPT, OPT_KEY, OPT_CAPATH,
63 64
    OPT_CAFILE, OPT_NOCAPATH, OPT_NOCAFILE, OPT_NEW, OPT_REUSE, OPT_BUGS,
    OPT_VERIFY, OPT_TIME, OPT_SSL3,
65 66 67
    OPT_WWW
} OPTION_CHOICE;

F
FdaSilvaYY 已提交
68
const OPTIONS s_time_options[] = {
69 70 71 72 73
    {"help", OPT_HELP, '-', "Display this summary"},
    {"connect", OPT_CONNECT, 's',
     "Where to connect as post:port (default is " SSL_CONNECT_NAME ")"},
    {"cipher", OPT_CIPHER, 's', "Cipher to use, see 'openssl ciphers'"},
    {"cert", OPT_CERT, '<', "Cert file to use, PEM format assumed"},
74
    {"nameopt", OPT_NAMEOPT, 's', "Various certificate name options"},
75 76 77
    {"key", OPT_KEY, '<', "File with key, PEM; default is -cert file"},
    {"CApath", OPT_CAPATH, '/', "PEM format directory of CA's"},
    {"cafile", OPT_CAFILE, '<', "PEM format file of CA's"},
78 79 80 81
    {"no-CAfile", OPT_NOCAFILE, '-',
     "Do not load the default certificates file"},
    {"no-CApath", OPT_NOCAPATH, '-',
     "Do not load certificates from the default certificates directory"},
82 83 84 85 86
    {"new", OPT_NEW, '-', "Just time new connections"},
    {"reuse", OPT_REUSE, '-', "Just time connection reuse"},
    {"bugs", OPT_BUGS, '-', "Turn on SSL bug compatibility"},
    {"verify", OPT_VERIFY, 'p',
     "Turn on peer certificate verification, set depth"},
87
    {"time", OPT_TIME, 'p', "Seconds to collect data, default " SECONDSSTR},
88 89 90
    {"www", OPT_WWW, 's', "Fetch specified page from the site"},
#ifndef OPENSSL_NO_SSL3
    {"ssl3", OPT_SSL3, '-', "Just use SSLv3"},
91
#endif
92 93
    {NULL}
};
94

95 96
#define START   0
#define STOP    1
97

98
static double tm_Time_F(int s)
99
{
100
    return app_tminterval(s, 1);
101 102
}

103
int s_time_main(int argc, char **argv)
104
{
105 106 107 108 109 110 111
    char buf[1024 * 8];
    SSL *scon = NULL;
    SSL_CTX *ctx = NULL;
    const SSL_METHOD *meth = NULL;
    char *CApath = NULL, *CAfile = NULL, *cipher = NULL, *www_path = NULL;
    char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog;
    double totalTime = 0.0;
112
    int noCApath = 0, noCAfile = 0;
113
    int maxtime = SECONDS, nConn = 0, perform = 3, ret = 1, i, st_bugs = 0;
114 115
    long bytes_read = 0, finishtime = 0;
    OPTION_CHOICE o;
116 117
    int max_version = 0, ver, buf_len;
    size_t buf_size;
118

119
    meth = TLS_client_method();
120

121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136
    prog = opt_init(argc, argv, s_time_options);
    while ((o = opt_next()) != OPT_EOF) {
        switch (o) {
        case OPT_EOF:
        case OPT_ERR:
 opthelp:
            BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
            goto end;
        case OPT_HELP:
            opt_help(s_time_options);
            ret = 0;
            goto end;
        case OPT_CONNECT:
            host = opt_arg();
            break;
        case OPT_REUSE:
137
            perform = 2;
138 139
            break;
        case OPT_NEW:
140
            perform = 1;
141 142
            break;
        case OPT_VERIFY:
143
            if (!opt_int(opt_arg(), &verify_args.depth))
144 145
                goto opthelp;
            BIO_printf(bio_err, "%s: verify depth is %d\n",
146
                       prog, verify_args.depth);
147 148 149 150
            break;
        case OPT_CERT:
            certfile = opt_arg();
            break;
151 152 153 154
        case OPT_NAMEOPT:
            if (!set_nameopt(opt_arg()))
                goto end;
            break;
155 156 157 158 159 160 161 162 163
        case OPT_KEY:
            keyfile = opt_arg();
            break;
        case OPT_CAPATH:
            CApath = opt_arg();
            break;
        case OPT_CAFILE:
            CAfile = opt_arg();
            break;
164 165 166 167 168 169
        case OPT_NOCAPATH:
            noCApath = 1;
            break;
        case OPT_NOCAFILE:
            noCAfile = 1;
            break;
170 171 172 173
        case OPT_CIPHER:
            cipher = opt_arg();
            break;
        case OPT_BUGS:
174
            st_bugs = 1;
175 176 177 178 179 180 181
            break;
        case OPT_TIME:
            if (!opt_int(opt_arg(), &maxtime))
                goto opthelp;
            break;
        case OPT_WWW:
            www_path = opt_arg();
P
Pauli 已提交
182
            buf_size = strlen(www_path) + fmt_http_get_cmd_size;
183 184
            if (buf_size > sizeof(buf)) {
                BIO_printf(bio_err, "%s: -www option is too long\n", prog);
185
                goto end;
M
Matt Caswell 已提交
186
            }
187
            break;
188
        case OPT_SSL3:
189
            max_version = SSL3_VERSION;
190
            break;
191
        }
192
    }
193
    argc = opt_num_rest();
K
Kurt Roeckx 已提交
194 195
    if (argc != 0)
        goto opthelp;
196

197 198 199
    if (cipher == NULL)
        cipher = getenv("SSL_CIPHER");
    if (cipher == NULL) {
R
Rich Salz 已提交
200
        BIO_printf(bio_err, "No CIPHER specified\n");
201
        goto end;
202 203
    }

204
    if ((ctx = SSL_CTX_new(meth)) == NULL)
205 206
        goto end;

207
    SSL_CTX_set_quiet_shutdown(ctx, 1);
208 209
    if (SSL_CTX_set_max_proto_version(ctx, max_version) == 0)
        goto end;
210 211

    if (st_bugs)
212 213
        SSL_CTX_set_options(ctx, SSL_OP_ALL);
    if (!SSL_CTX_set_cipher_list(ctx, cipher))
M
Matt Caswell 已提交
214
        goto end;
215
    if (!set_cert_stuff(ctx, certfile, keyfile))
216 217
        goto end;

218
    if (!ctx_set_verify_locations(ctx, CAfile, CApath, noCAfile, noCApath)) {
219
        ERR_print_errors(bio_err);
220
        goto end;
221 222 223
    }
    if (!(perform & 1))
        goto next;
224
    printf("Collecting connection statistics for %d seconds\n", maxtime);
225

226
    /* Loop and time how long it takes to make connections */
227

228
    bytes_read = 0;
229
    finishtime = (long)time(NULL) + maxtime;
230 231 232 233
    tm_Time_F(START);
    for (;;) {
        if (finishtime < (long)time(NULL))
            break;
234

235
        if ((scon = doConnection(NULL, host, ctx)) == NULL)
236
            goto end;
237

238
        if (www_path != NULL) {
P
Pauli 已提交
239 240 241
            buf_len = BIO_snprintf(buf, sizeof(buf), fmt_http_get_cmd,
                                   www_path);
            if (buf_len <= 0 || SSL_write(scon, buf, buf_len) <= 0)
M
Matt Caswell 已提交
242
                goto end;
243 244
            while ((i = SSL_read(scon, buf, sizeof(buf))) > 0 || SSL_get_error(scon, i) == SSL_ERROR_WANT_READ)
                if (i > 0) bytes_read += i;
245
        }
246
#ifdef NO_SHUTDOWN
247
        SSL_set_shutdown(scon, SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);
248
#else
249
        SSL_shutdown(scon);
250
#endif
R
Rich Salz 已提交
251
        BIO_closesocket(SSL_get_fd(scon));
252 253

        nConn += 1;
254
        if (SSL_session_reused(scon)) {
255
            ver = 'r';
256
        } else {
257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272
            ver = SSL_version(scon);
            if (ver == TLS1_VERSION)
                ver = 't';
            else if (ver == SSL3_VERSION)
                ver = '3';
            else
                ver = '*';
        }
        fputc(ver, stdout);
        fflush(stdout);

        SSL_free(scon);
        scon = NULL;
    }
    totalTime += tm_Time_F(STOP); /* Add the time for this iteration */

273
    i = (int)((long)time(NULL) - finishtime + maxtime);
274 275 276 277 278
    printf
        ("\n\n%d connections in %.2fs; %.2f connections/user sec, bytes read %ld\n",
         nConn, totalTime, ((double)nConn / totalTime), bytes_read);
    printf
        ("%d connections in %ld real seconds, %ld bytes read per connection\n",
279
         nConn, (long)time(NULL) - finishtime + maxtime, bytes_read / nConn);
280 281 282 283 284 285 286 287 288 289 290

    /*
     * Now loop and time connections using the same session id over and over
     */

 next:
    if (!(perform & 2))
        goto end;
    printf("\n\nNow timing with session id reuse.\n");

    /* Get an SSL object so we can reuse the session id */
291
    if ((scon = doConnection(NULL, host, ctx)) == NULL) {
R
Rich Salz 已提交
292
        BIO_printf(bio_err, "Unable to get connection\n");
293 294 295
        goto end;
    }

296
    if (www_path != NULL) {
P
Pauli 已提交
297 298
        buf_len = BIO_snprintf(buf, sizeof(buf), fmt_http_get_cmd, www_path);
        if (buf_len <= 0 || SSL_write(scon, buf, buf_len) <= 0)
M
Matt Caswell 已提交
299
            goto end;
300
        while ((i = SSL_read(scon, buf, sizeof(buf))) > 0 || SSL_get_error(scon, i) == SSL_ERROR_WANT_READ)
301
            continue;
302
    }
303
#ifdef NO_SHUTDOWN
304
    SSL_set_shutdown(scon, SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);
305
#else
306
    SSL_shutdown(scon);
307
#endif
R
Rich Salz 已提交
308
    BIO_closesocket(SSL_get_fd(scon));
309 310 311

    nConn = 0;
    totalTime = 0.0;
312

313
    finishtime = (long)time(NULL) + maxtime;
314

315 316 317
    printf("starting\n");
    bytes_read = 0;
    tm_Time_F(START);
318

319 320 321
    for (;;) {
        if (finishtime < (long)time(NULL))
            break;
322

323
        if ((doConnection(scon, host, ctx)) == NULL)
324
            goto end;
325

326
        if (www_path != NULL) {
P
Pauli 已提交
327 328 329
            buf_len = BIO_snprintf(buf, sizeof(buf), fmt_http_get_cmd,
                                   www_path);
            if (buf_len <= 0 || SSL_write(scon, buf, buf_len) <= 0)
M
Matt Caswell 已提交
330
                goto end;
331 332
            while ((i = SSL_read(scon, buf, sizeof(buf))) > 0 || SSL_get_error(scon, i) == SSL_ERROR_WANT_READ)
                if (i > 0) bytes_read += i;
333
        }
334
#ifdef NO_SHUTDOWN
335
        SSL_set_shutdown(scon, SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);
336
#else
337
        SSL_shutdown(scon);
338
#endif
R
Rich Salz 已提交
339
        BIO_closesocket(SSL_get_fd(scon));
340 341

        nConn += 1;
342
        if (SSL_session_reused(scon)) {
343
            ver = 'r';
344
        } else {
345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362
            ver = SSL_version(scon);
            if (ver == TLS1_VERSION)
                ver = 't';
            else if (ver == SSL3_VERSION)
                ver = '3';
            else
                ver = '*';
        }
        fputc(ver, stdout);
        fflush(stdout);
    }
    totalTime += tm_Time_F(STOP); /* Add the time for this iteration */

    printf
        ("\n\n%d connections in %.2fs; %.2f connections/user sec, bytes read %ld\n",
         nConn, totalTime, ((double)nConn / totalTime), bytes_read);
    printf
        ("%d connections in %ld real seconds, %ld bytes read per connection\n",
363
         nConn, (long)time(NULL) - finishtime + maxtime, bytes_read / nConn);
364 365

    ret = 0;
366

367
 end:
R
Rich Salz 已提交
368
    SSL_free(scon);
369
    SSL_CTX_free(ctx);
P
Pauli 已提交
370
    return ret;
371
}
372

373
/*-
374 375
 * doConnection - make a connection
 */
376
static SSL *doConnection(SSL *scon, const char *host, SSL_CTX *ctx)
377 378 379 380 381 382 383
{
    BIO *conn;
    SSL *serverCon;
    int width, i;
    fd_set readfds;

    if ((conn = BIO_new(BIO_s_connect())) == NULL)
P
Pauli 已提交
384
        return NULL;
385 386 387 388

    BIO_set_conn_hostname(conn, host);

    if (scon == NULL)
389
        serverCon = SSL_new(ctx);
390 391 392 393
    else {
        serverCon = scon;
        SSL_set_connect_state(serverCon);
    }
394

395
    SSL_set_bio(serverCon, conn, conn);
396

397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419
    /* ok, lets connect */
    for (;;) {
        i = SSL_connect(serverCon);
        if (BIO_sock_should_retry(i)) {
            BIO_printf(bio_err, "DELAY\n");

            i = SSL_get_fd(serverCon);
            width = i + 1;
            FD_ZERO(&readfds);
            openssl_fdset(i, &readfds);
            /*
             * Note: under VMS with SOCKETSHR the 2nd parameter is currently
             * of type (int *) whereas under other systems it is (void *) if
             * you don't have a cast it will choke the compiler: if you do
             * have a cast then you can either go for (int *) or (void *).
             */
            select(width, (void *)&readfds, NULL, NULL, NULL);
            continue;
        }
        break;
    }
    if (i <= 0) {
        BIO_printf(bio_err, "ERROR\n");
420
        if (verify_args.error != X509_V_OK)
421
            BIO_printf(bio_err, "verify error:%s\n",
422
                       X509_verify_cert_error_string(verify_args.error));
423 424 425 426 427 428
        else
            ERR_print_errors(bio_err);
        if (scon == NULL)
            SSL_free(serverCon);
        return NULL;
    }
429

430 431
    return serverCon;
}
M
Matt Caswell 已提交
432
#endif /* OPENSSL_NO_SOCK */