blob: 6ba406981fd10ca91c8b032b822c410be68348b1 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/*
2 * SSL/TLS stress testing program
3 *
Paul Bakker77b385e2009-07-28 17:23:11 +00004 * Copyright (C) 2006-2009, Paul Bakker <polarssl_maintainer at polarssl.org>
5 * All rights reserved.
Paul Bakkere0ccd0a2009-01-04 16:27:10 +00006 *
Paul Bakker77b385e2009-07-28 17:23:11 +00007 * Joined copyright on original XySSL code with: Christophe Devine
Paul Bakker5121ce52009-01-03 21:22:43 +00008 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License along
20 * with this program; if not, write to the Free Software Foundation, Inc.,
21 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
22 */
23
24#ifndef _CRT_SECURE_NO_DEPRECATE
25#define _CRT_SECURE_NO_DEPRECATE 1
26#endif
27
28#include <string.h>
29#include <stdlib.h>
30#include <stdio.h>
31
Paul Bakker40e46942009-01-03 21:51:57 +000032#include "polarssl/net.h"
33#include "polarssl/ssl.h"
34#include "polarssl/havege.h"
35#include "polarssl/timing.h"
36#include "polarssl/certs.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000037
38#define OPMODE_NONE 0
39#define OPMODE_CLIENT 1
40#define OPMODE_SERVER 2
41
42#define IOMODE_BLOCK 0
43#define IOMODE_NONBLOCK 1
44
45#define COMMAND_READ 1
46#define COMMAND_WRITE 2
47#define COMMAND_BOTH 3
48
49#define DFL_OPMODE OPMODE_NONE
50#define DFL_IOMODE IOMODE_BLOCK
51#define DFL_SERVER_NAME "localhost"
52#define DFL_SERVER_PORT 4433
53#define DFL_COMMAND COMMAND_READ
54#define DFL_BUFFER_SIZE 1024
55#define DFL_MAX_BYTES 0
56#define DFL_DEBUG_LEVEL 0
57#define DFL_CONN_TIMEOUT 0
58#define DFL_MAX_CONNECTIONS 0
59#define DFL_SESSION_REUSE 1
60#define DFL_SESSION_LIFETIME 86400
61#define DFL_FORCE_CIPHER 0
62
63/*
64 * server-specific data
65 */
66char *dhm_G = "4";
67char *dhm_P =
68"E4004C1F94182000103D883A448B3F802CE4B44A83301270002C20D0321CFD00" \
69"11CCEF784C26A400F43DFB901BCA7538F2C6B176001CF5A0FD16D2C48B1D0C1C" \
70"F6AC8E1DA6BCC3B4E1F96B0564965300FFA1D0B601EB2800F489AA512C4B248C" \
71"01F76949A60BB7F00A40B1EAB64BDD48E8A700D60B7F1200FA8E77B0A979DABF";
72
73int server_fd = -1;
74
75/*
76 * global options
77 */
78struct options
79{
80 int opmode; /* operation mode (client or server) */
81 int iomode; /* I/O mode (blocking or non-blocking) */
82 char *server_name; /* hostname of the server (client only) */
83 int server_port; /* port on which the ssl service runs */
84 int command; /* what to do: read or write operation */
85 int buffer_size; /* size of the send/receive buffer */
86 int max_bytes; /* max. # of bytes before a reconnect */
87 int debug_level; /* level of debugging */
88 int conn_timeout; /* max. delay before a reconnect */
89 int max_connections; /* max. number of reconnections */
90 int session_reuse; /* flag to reuse the keying material */
91 int session_lifetime; /* if reached, session data is expired */
92 int force_cipher[2]; /* protocol/cipher to use, or all */
93};
94
95/*
96 * Although this PRNG has good statistical properties (eg. passes
97 * DIEHARD), it is not cryptographically secure.
98 */
99unsigned long int lcppm5( unsigned long int *state )
100{
101 unsigned long int u, v;
102
103 u = v = state[4] ^ 1;
104 state[u & 3] ^= u;
105 u ^= (v << 12) ^ (v >> 12);
106 u ^= v * state[0]; v >>= 8;
107 u ^= v * state[1]; v >>= 8;
108 u ^= v * state[2]; v >>= 8;
109 u ^= v * state[3];
110 u &= 0xFFFFFFFF;
111 state[4] = u;
112
113 return( u );
114}
115
116void my_debug( void *ctx, int level, char *str )
117{
118 if( level < ((struct options *) ctx)->debug_level )
119 fprintf( stderr, "%s", str );
120}
121
122/*
123 * perform a single SSL connection
124 */
125static int ssl_test( struct options *opt )
126{
127 int ret, i;
128 int client_fd;
129 int bytes_to_read;
130 int bytes_to_write;
Paul Bakker026c03b2009-03-28 17:53:03 +0000131 int offset_to_read = 0;
132 int offset_to_write = 0;
Paul Bakker5121ce52009-01-03 21:22:43 +0000133
134 long int nb_read;
135 long int nb_written;
136
137 unsigned long read_state[5];
138 unsigned long write_state[5];
139
Paul Bakker026c03b2009-03-28 17:53:03 +0000140 unsigned char *read_buf = NULL;
141 unsigned char *write_buf = NULL;
Paul Bakker5121ce52009-01-03 21:22:43 +0000142
143 struct hr_time t;
144 havege_state hs;
145 ssl_context ssl;
146 ssl_session ssn;
147 x509_cert srvcert;
148 rsa_context rsa;
149
150 ret = 1;
151
152 havege_init( &hs );
153 get_timer( &t, 1 );
154
155 memset( read_state, 0, sizeof( read_state ) );
156 memset( write_state, 0, sizeof( write_state ) );
157
158 memset( &srvcert, 0, sizeof( x509_cert ) );
159 memset( &rsa, 0, sizeof( rsa_context ) );
160
161 if( opt->opmode == OPMODE_CLIENT )
162 {
163 if( ( ret = net_connect( &client_fd, opt->server_name,
164 opt->server_port ) ) != 0 )
165 {
166 printf( " ! net_connect returned %d\n\n", ret );
167 return( ret );
168 }
169
170 if( ( ret = ssl_init( &ssl ) ) != 0 )
171 {
172 printf( " ! ssl_init returned %d\n\n", ret );
173 return( ret );
174 }
175
176 ssl_set_endpoint( &ssl, SSL_IS_CLIENT );
177 }
178
179 if( opt->opmode == OPMODE_SERVER )
180 {
181 ret = x509parse_crt( &srvcert, (unsigned char *) test_srv_crt,
182 strlen( test_srv_crt ) );
183 if( ret != 0 )
184 {
185 printf( " ! x509parse_crt returned %d\n\n", ret );
186 goto exit;
187 }
188
189 ret = x509parse_crt( &srvcert, (unsigned char *) test_ca_crt,
190 strlen( test_ca_crt ) );
191 if( ret != 0 )
192 {
193 printf( " ! x509parse_crt returned %d\n\n", ret );
194 goto exit;
195 }
196
197 ret = x509parse_key( &rsa, (unsigned char *) test_srv_key,
198 strlen( test_srv_key ), NULL, 0 );
199 if( ret != 0 )
200 {
201 printf( " ! x509parse_key returned %d\n\n", ret );
202 goto exit;
203 }
204
205 if( server_fd < 0 )
206 {
207 if( ( ret = net_bind( &server_fd, NULL,
208 opt->server_port ) ) != 0 )
209 {
210 printf( " ! net_bind returned %d\n\n", ret );
211 return( ret );
212 }
213 }
214
215 if( ( ret = net_accept( server_fd, &client_fd, NULL ) ) != 0 )
216 {
217 printf( " ! net_accept returned %d\n\n", ret );
218 return( ret );
219 }
220
221 if( ( ret = ssl_init( &ssl ) ) != 0 )
222 {
223 printf( " ! ssl_init returned %d\n\n", ret );
224 return( ret );
225 }
226
227 ssl_set_endpoint( &ssl, SSL_IS_SERVER );
228 ssl_set_dh_param( &ssl, dhm_P, dhm_G );
Paul Bakker40ea7de2009-05-03 10:18:48 +0000229 ssl_set_ca_chain( &ssl, srvcert.next, NULL, NULL );
Paul Bakker5121ce52009-01-03 21:22:43 +0000230 ssl_set_own_cert( &ssl, &srvcert, &rsa );
231 }
232
233 ssl_set_authmode( &ssl, SSL_VERIFY_NONE );
234
235 ssl_set_rng( &ssl, havege_rand, &hs );
236 ssl_set_dbg( &ssl, my_debug, opt );
237 ssl_set_bio( &ssl, net_recv, &client_fd,
238 net_send, &client_fd );
239
240 ssl_set_session( &ssl, opt->session_reuse,
241 opt->session_lifetime, &ssn );
242
243 if( opt->force_cipher[0] == DFL_FORCE_CIPHER )
244 ssl_set_ciphers( &ssl, ssl_default_ciphers );
245 else ssl_set_ciphers( &ssl, opt->force_cipher );
246
247 if( opt->iomode == IOMODE_NONBLOCK )
248 net_set_nonblock( client_fd );
249
250 read_buf = (unsigned char *) malloc( opt->buffer_size );
251 write_buf = (unsigned char *) malloc( opt->buffer_size );
252
253 if( read_buf == NULL || write_buf == NULL )
254 {
255 printf( " ! malloc(%d bytes) failed\n\n", opt->buffer_size );
256 goto exit;
257 }
258
259 nb_read = bytes_to_read = 0;
260 nb_written = bytes_to_write = 0;
261
262 while( 1 )
263 {
264 if( opt->command & COMMAND_WRITE )
265 {
266 if( bytes_to_write == 0 )
267 {
268 while( bytes_to_write == 0 )
269 bytes_to_write = rand() % opt->buffer_size;
270
271 for( i = 0; i < bytes_to_write; i++ )
272 write_buf[i] = (unsigned char) lcppm5( write_state );
273
274 offset_to_write = 0;
275 }
276
277 ret = ssl_write( &ssl, write_buf + offset_to_write,
278 bytes_to_write );
279
280 if( ret >= 0 )
281 {
282 nb_written += ret;
283 bytes_to_write -= ret;
284 offset_to_write += ret;
285 }
286
Paul Bakker40e46942009-01-03 21:51:57 +0000287 if( ret == POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY ||
288 ret == POLARSSL_ERR_NET_CONN_RESET )
Paul Bakker5121ce52009-01-03 21:22:43 +0000289 {
290 ret = 0;
291 goto exit;
292 }
293
Paul Bakker40e46942009-01-03 21:51:57 +0000294 if( ret < 0 && ret != POLARSSL_ERR_NET_TRY_AGAIN )
Paul Bakker5121ce52009-01-03 21:22:43 +0000295 {
296 printf( " ! ssl_write returned %d\n\n", ret );
297 break;
298 }
299 }
300
301 if( opt->command & COMMAND_READ )
302 {
303 if( bytes_to_read == 0 )
304 {
305 bytes_to_read = rand() % opt->buffer_size;
306 offset_to_read = 0;
307 }
308
309 ret = ssl_read( &ssl, read_buf + offset_to_read,
310 bytes_to_read );
311
312 if( ret >= 0 )
313 {
314 for( i = 0; i < ret; i++ )
315 {
316 if( read_buf[offset_to_read + i] !=
317 (unsigned char) lcppm5( read_state ) )
318 {
319 ret = 1;
320 printf( " ! plaintext mismatch\n\n" );
321 goto exit;
322 }
323 }
324
325 nb_read += ret;
326 bytes_to_read -= ret;
327 offset_to_read += ret;
328 }
329
Paul Bakker40e46942009-01-03 21:51:57 +0000330 if( ret == POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY ||
331 ret == POLARSSL_ERR_NET_CONN_RESET )
Paul Bakker5121ce52009-01-03 21:22:43 +0000332 {
333 ret = 0;
334 goto exit;
335 }
336
Paul Bakker40e46942009-01-03 21:51:57 +0000337 if( ret < 0 && ret != POLARSSL_ERR_NET_TRY_AGAIN )
Paul Bakker5121ce52009-01-03 21:22:43 +0000338 {
339 printf( " ! ssl_read returned %d\n\n", ret );
340 break;
341 }
342 }
343
344 ret = 0;
345
346 if( opt->max_bytes != 0 &&
347 ( opt->max_bytes <= nb_read ||
348 opt->max_bytes <= nb_written ) )
349 break;
350
351 if( opt->conn_timeout != 0 &&
352 opt->conn_timeout <= (int) get_timer( &t, 0 ) )
353 break;
354 }
355
356exit:
357
358 fflush( stdout );
359
360 if( read_buf != NULL )
361 free( read_buf );
362
363 if( write_buf != NULL )
364 free( write_buf );
365
366 ssl_close_notify( &ssl );
367 x509_free( &srvcert );
368 rsa_free( &rsa );
369 ssl_free( &ssl );
370 net_close( client_fd );
371
372 return( ret );
373}
374
375#define USAGE \
376 "\n usage: ssl_test opmode=<> command=<>...\n" \
377 "\n acceptable parameters:\n" \
378 " opmode=client/server default: <none>\n" \
379 " iomode=block/nonblock default: block\n" \
380 " server_name=%%s default: localhost\n" \
381 " server_port=%%d default: 4433\n" \
382 " command=read/write/both default: read\n" \
383 " buffer_size=%%d (bytes) default: 1024\n" \
384 " max_bytes=%%d (bytes) default: 0 (no limit)\n" \
385 " debug_level=%%d default: 0 (disabled)\n" \
386 " conn_timeout=%%d (ms) default: 0 (no timeout)\n" \
387 " max_connections=%%d default: 0 (no limit)\n" \
388 " session_reuse=on/off default: on (enabled)\n" \
389 " session_lifetime=%%d (s) default: 86400\n" \
390 " force_cipher=<name> default: all enabled\n" \
391 " acceptable cipher names:\n" \
392 " SSL_RSA_RC4_128_MD5 SSL_RSA_RC4_128_SHA\n" \
393 " SSL_RSA_DES_168_SHA SSL_EDH_RSA_DES_168_SHA\n" \
394 " SSL_RSA_AES_128_SHA SSL_EDH_RSA_AES_256_SHA\n" \
Paul Bakkerb5ef0ba2009-01-11 20:25:36 +0000395 " SSL_RSA_AES_256_SHA SSL_EDH_RSA_CAMELLIA_256_SHA\n" \
396 " SSL_RSA_CAMELLIA_128_SHA SSL_RSA_CAMELLIA_256_SHA\n\n"
Paul Bakker5121ce52009-01-03 21:22:43 +0000397
398int main( int argc, char *argv[] )
399{
400 int i, j, n;
401 int ret = 1;
402 int nb_conn;
403 char *p, *q;
404 struct options opt;
405
406 if( argc == 1 )
407 {
408 usage:
409 printf( USAGE );
410 goto exit;
411 }
412
413 opt.opmode = DFL_OPMODE;
414 opt.iomode = DFL_IOMODE;
415 opt.server_name = DFL_SERVER_NAME;
416 opt.server_port = DFL_SERVER_PORT;
417 opt.command = DFL_COMMAND;
418 opt.buffer_size = DFL_BUFFER_SIZE;
419 opt.max_bytes = DFL_MAX_BYTES;
420 opt.debug_level = DFL_DEBUG_LEVEL;
421 opt.conn_timeout = DFL_CONN_TIMEOUT;
422 opt.max_connections = DFL_MAX_CONNECTIONS;
423 opt.session_reuse = DFL_SESSION_REUSE;
424 opt.session_lifetime = DFL_SESSION_LIFETIME;
425 opt.force_cipher[0] = DFL_FORCE_CIPHER;
426
427 for( i = 1; i < argc; i++ )
428 {
429 n = strlen( argv[i] );
430
431 for( j = 0; j < n; j++ )
432 {
433 if( argv[i][j] >= 'A' && argv[i][j] <= 'Z' )
434 argv[i][j] |= 0x20;
435 }
436
437 p = argv[i];
438 if( ( q = strchr( p, '=' ) ) == NULL )
439 continue;
440 *q++ = '\0';
441
442 if( strcmp( p, "opmode" ) == 0 )
443 {
444 if( strcmp( q, "client" ) == 0 )
445 opt.opmode = OPMODE_CLIENT;
446 else
447 if( strcmp( q, "server" ) == 0 )
448 opt.opmode = OPMODE_SERVER;
449 else goto usage;
450 }
451
452 if( strcmp( p, "iomode" ) == 0 )
453 {
454 if( strcmp( q, "block" ) == 0 )
455 opt.iomode = IOMODE_BLOCK;
456 else
457 if( strcmp( q, "nonblock" ) == 0 )
458 opt.iomode = IOMODE_NONBLOCK;
459 else goto usage;
460 }
461
462 if( strcmp( p, "server_name" ) == 0 )
463 opt.server_name = q;
464
465 if( strcmp( p, "server_port" ) == 0 )
466 {
467 opt.server_port = atoi( q );
468 if( opt.server_port < 1 || opt.server_port > 65535 )
469 goto usage;
470 }
471
472 if( strcmp( p, "command" ) == 0 )
473 {
474 if( strcmp( q, "read" ) == 0 )
475 opt.command = COMMAND_READ;
476 else
477 if( strcmp( q, "write" ) == 0 )
478 opt.command = COMMAND_WRITE;
479 else
480 if( strcmp( q, "both" ) == 0 )
481 {
482 opt.iomode = IOMODE_NONBLOCK;
483 opt.command = COMMAND_BOTH;
484 }
485 else goto usage;
486 }
487
488 if( strcmp( p, "buffer_size" ) == 0 )
489 {
490 opt.buffer_size = atoi( q );
491 if( opt.buffer_size < 1 || opt.buffer_size > 1048576 )
492 goto usage;
493 }
494
495 if( strcmp( p, "max_bytes" ) == 0 )
496 opt.max_bytes = atoi( q );
497
498 if( strcmp( p, "debug_level" ) == 0 )
499 opt.debug_level = atoi( q );
500
501 if( strcmp( p, "conn_timeout" ) == 0 )
502 opt.conn_timeout = atoi( q );
503
504 if( strcmp( p, "max_connections" ) == 0 )
505 opt.max_connections = atoi( q );
506
507 if( strcmp( p, "session_reuse" ) == 0 )
508 {
509 if( strcmp( q, "on" ) == 0 )
510 opt.session_reuse = 1;
511 else
512 if( strcmp( q, "off" ) == 0 )
513 opt.session_reuse = 0;
514 else
515 goto usage;
516 }
517
518 if( strcmp( p, "session_lifetime" ) == 0 )
519 opt.session_lifetime = atoi( q );
520
521 if( strcmp( p, "force_cipher" ) == 0 )
522 {
523 opt.force_cipher[0] = -1;
524
525 if( strcmp( q, "ssl_rsa_rc4_128_md5" ) == 0 )
526 opt.force_cipher[0] = SSL_RSA_RC4_128_MD5;
527
528 if( strcmp( q, "ssl_rsa_rc4_128_sha" ) == 0 )
529 opt.force_cipher[0] = SSL_RSA_RC4_128_SHA;
530
531 if( strcmp( q, "ssl_rsa_des_168_sha" ) == 0 )
532 opt.force_cipher[0] = SSL_RSA_DES_168_SHA;
533
534 if( strcmp( q, "ssl_edh_rsa_des_168_sha" ) == 0 )
535 opt.force_cipher[0] = SSL_EDH_RSA_DES_168_SHA;
536
537 if( strcmp( q, "ssl_rsa_aes_128_sha" ) == 0 )
538 opt.force_cipher[0] = SSL_RSA_AES_128_SHA;
539
540 if( strcmp( q, "ssl_rsa_aes_256_sha" ) == 0 )
541 opt.force_cipher[0] = SSL_RSA_AES_256_SHA;
542
543 if( strcmp( q, "ssl_edh_rsa_aes_256_sha" ) == 0 )
544 opt.force_cipher[0] = SSL_EDH_RSA_AES_256_SHA;
545
Paul Bakkerb5ef0ba2009-01-11 20:25:36 +0000546 if( strcmp( q, "ssl_rsa_camellia_128_sha" ) == 0 )
547 opt.force_cipher[0] = SSL_RSA_CAMELLIA_128_SHA;
548
549 if( strcmp( q, "ssl_rsa_camellia_256_sha" ) == 0 )
550 opt.force_cipher[0] = SSL_RSA_CAMELLIA_256_SHA;
551
552 if( strcmp( q, "ssl_edh_rsa_camellia_256_sha" ) == 0 )
553 opt.force_cipher[0] = SSL_EDH_RSA_CAMELLIA_256_SHA;
554
Paul Bakker5121ce52009-01-03 21:22:43 +0000555 if( opt.force_cipher[0] < 0 )
556 goto usage;
557
558 opt.force_cipher[1] = 0;
559 }
560 }
561
562 switch( opt.opmode )
563 {
564 case OPMODE_CLIENT:
565 break;
566
567 case OPMODE_SERVER:
568 break;
569
570 default:
571 goto usage;
572 }
573
574 nb_conn = 0;
575
576 do {
577 nb_conn++;
578 ret = ssl_test( &opt );
579 if( opt.max_connections != 0 &&
580 opt.max_connections <= nb_conn )
581 break;
582 }
583 while( ret == 0 );
584
585exit:
586
587#ifdef WIN32
588 printf( " Press Enter to exit this program.\n" );
589 fflush( stdout ); getchar();
590#endif
591
592 return( ret );
593}