blob: 8bac4b249b37a8e328deb85abef509206d5c0eab [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/*
2 * SSL/TLS stress testing program
3 *
Paul Bakkercce9d772011-11-18 14:26:47 +00004 * Copyright (C) 2006-2011, Brainspark B.V.
Paul Bakkerb96f1542010-07-18 20:36:00 +00005 *
6 * This file is part of PolarSSL (http://www.polarssl.org)
Paul Bakker84f12b72010-07-18 10:13:04 +00007 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
Paul Bakkerb96f1542010-07-18 20:36:00 +00008 *
Paul Bakker77b385e2009-07-28 17:23:11 +00009 * All rights reserved.
Paul Bakkere0ccd0a2009-01-04 16:27:10 +000010 *
Paul Bakker5121ce52009-01-03 21:22:43 +000011 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License along
22 * with this program; if not, write to the Free Software Foundation, Inc.,
23 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
24 */
25
26#ifndef _CRT_SECURE_NO_DEPRECATE
27#define _CRT_SECURE_NO_DEPRECATE 1
28#endif
29
30#include <string.h>
31#include <stdlib.h>
32#include <stdio.h>
33
Paul Bakker5690efc2011-05-26 13:16:06 +000034#include "polarssl/config.h"
35
Paul Bakker40e46942009-01-03 21:51:57 +000036#include "polarssl/net.h"
37#include "polarssl/ssl.h"
38#include "polarssl/havege.h"
39#include "polarssl/timing.h"
40#include "polarssl/certs.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000041
42#define OPMODE_NONE 0
43#define OPMODE_CLIENT 1
44#define OPMODE_SERVER 2
45
46#define IOMODE_BLOCK 0
47#define IOMODE_NONBLOCK 1
48
49#define COMMAND_READ 1
50#define COMMAND_WRITE 2
51#define COMMAND_BOTH 3
52
53#define DFL_OPMODE OPMODE_NONE
54#define DFL_IOMODE IOMODE_BLOCK
55#define DFL_SERVER_NAME "localhost"
56#define DFL_SERVER_PORT 4433
57#define DFL_COMMAND COMMAND_READ
58#define DFL_BUFFER_SIZE 1024
59#define DFL_MAX_BYTES 0
60#define DFL_DEBUG_LEVEL 0
61#define DFL_CONN_TIMEOUT 0
62#define DFL_MAX_CONNECTIONS 0
63#define DFL_SESSION_REUSE 1
64#define DFL_SESSION_LIFETIME 86400
65#define DFL_FORCE_CIPHER 0
66
67/*
68 * server-specific data
69 */
70char *dhm_G = "4";
71char *dhm_P =
72"E4004C1F94182000103D883A448B3F802CE4B44A83301270002C20D0321CFD00" \
73"11CCEF784C26A400F43DFB901BCA7538F2C6B176001CF5A0FD16D2C48B1D0C1C" \
74"F6AC8E1DA6BCC3B4E1F96B0564965300FFA1D0B601EB2800F489AA512C4B248C" \
75"01F76949A60BB7F00A40B1EAB64BDD48E8A700D60B7F1200FA8E77B0A979DABF";
76
77int server_fd = -1;
78
79/*
80 * global options
81 */
82struct options
83{
84 int opmode; /* operation mode (client or server) */
85 int iomode; /* I/O mode (blocking or non-blocking) */
86 char *server_name; /* hostname of the server (client only) */
87 int server_port; /* port on which the ssl service runs */
88 int command; /* what to do: read or write operation */
89 int buffer_size; /* size of the send/receive buffer */
90 int max_bytes; /* max. # of bytes before a reconnect */
91 int debug_level; /* level of debugging */
92 int conn_timeout; /* max. delay before a reconnect */
93 int max_connections; /* max. number of reconnections */
94 int session_reuse; /* flag to reuse the keying material */
95 int session_lifetime; /* if reached, session data is expired */
Paul Bakkere3166ce2011-01-27 17:40:50 +000096 int force_ciphersuite[2]; /* protocol/ciphersuite to use, or all */
Paul Bakker5121ce52009-01-03 21:22:43 +000097};
98
99/*
100 * Although this PRNG has good statistical properties (eg. passes
101 * DIEHARD), it is not cryptographically secure.
102 */
103unsigned long int lcppm5( unsigned long int *state )
104{
105 unsigned long int u, v;
106
107 u = v = state[4] ^ 1;
108 state[u & 3] ^= u;
109 u ^= (v << 12) ^ (v >> 12);
110 u ^= v * state[0]; v >>= 8;
111 u ^= v * state[1]; v >>= 8;
112 u ^= v * state[2]; v >>= 8;
113 u ^= v * state[3];
114 u &= 0xFFFFFFFF;
115 state[4] = u;
116
117 return( u );
118}
119
Paul Bakkerff60ee62010-03-16 21:09:09 +0000120void my_debug( void *ctx, int level, const char *str )
Paul Bakker5121ce52009-01-03 21:22:43 +0000121{
122 if( level < ((struct options *) ctx)->debug_level )
123 fprintf( stderr, "%s", str );
124}
125
Paul Bakker5690efc2011-05-26 13:16:06 +0000126#if !defined(POLARSSL_BIGNUM_C) || !defined(POLARSSL_HAVEGE_C) || \
127 !defined(POLARSSL_SSL_TLS_C) || !defined(POLARSSL_SSL_SRV_C) || \
128 !defined(POLARSSL_SSL_CLI_C) || !defined(POLARSSL_NET_C) || \
129 !defined(POLARSSL_RSA_C)
Paul Bakkercce9d772011-11-18 14:26:47 +0000130int main( int argc, char *argv[] )
Paul Bakker5690efc2011-05-26 13:16:06 +0000131{
Paul Bakkercce9d772011-11-18 14:26:47 +0000132 ((void) argc);
133 ((void) argv);
134
Paul Bakker5690efc2011-05-26 13:16:06 +0000135 printf("POLARSSL_BIGNUM_C and/or POLARSSL_HAVEGE_C and/or "
136 "POLARSSL_SSL_TLS_C and/or POLARSSL_SSL_SRV_C and/or "
137 "POLARSSL_SSL_CLI_C and/or POLARSSL_NET_C and/or "
138 "POLARSSL_RSA_C not defined.\n");
139 return( 0 );
140}
141#else
Paul Bakker5121ce52009-01-03 21:22:43 +0000142/*
143 * perform a single SSL connection
144 */
145static int ssl_test( struct options *opt )
146{
147 int ret, i;
148 int client_fd;
149 int bytes_to_read;
150 int bytes_to_write;
Paul Bakker026c03b2009-03-28 17:53:03 +0000151 int offset_to_read = 0;
152 int offset_to_write = 0;
Paul Bakker5121ce52009-01-03 21:22:43 +0000153
154 long int nb_read;
155 long int nb_written;
156
157 unsigned long read_state[5];
158 unsigned long write_state[5];
159
Paul Bakker026c03b2009-03-28 17:53:03 +0000160 unsigned char *read_buf = NULL;
161 unsigned char *write_buf = NULL;
Paul Bakker5121ce52009-01-03 21:22:43 +0000162
163 struct hr_time t;
164 havege_state hs;
165 ssl_context ssl;
166 ssl_session ssn;
167 x509_cert srvcert;
168 rsa_context rsa;
169
170 ret = 1;
171
172 havege_init( &hs );
173 get_timer( &t, 1 );
174
175 memset( read_state, 0, sizeof( read_state ) );
176 memset( write_state, 0, sizeof( write_state ) );
177
178 memset( &srvcert, 0, sizeof( x509_cert ) );
179 memset( &rsa, 0, sizeof( rsa_context ) );
180
181 if( opt->opmode == OPMODE_CLIENT )
182 {
183 if( ( ret = net_connect( &client_fd, opt->server_name,
184 opt->server_port ) ) != 0 )
185 {
186 printf( " ! net_connect returned %d\n\n", ret );
187 return( ret );
188 }
189
190 if( ( ret = ssl_init( &ssl ) ) != 0 )
191 {
192 printf( " ! ssl_init returned %d\n\n", ret );
193 return( ret );
194 }
195
196 ssl_set_endpoint( &ssl, SSL_IS_CLIENT );
197 }
198
199 if( opt->opmode == OPMODE_SERVER )
200 {
Paul Bakker5690efc2011-05-26 13:16:06 +0000201#if !defined(POLARSSL_CERTS_C)
202 printf("POLARSSL_CERTS_C not defined.\n");
203 goto exit;
204#else
Paul Bakker5121ce52009-01-03 21:22:43 +0000205 ret = x509parse_crt( &srvcert, (unsigned char *) test_srv_crt,
206 strlen( test_srv_crt ) );
207 if( ret != 0 )
208 {
209 printf( " ! x509parse_crt returned %d\n\n", ret );
210 goto exit;
211 }
212
213 ret = x509parse_crt( &srvcert, (unsigned char *) test_ca_crt,
214 strlen( test_ca_crt ) );
215 if( ret != 0 )
216 {
217 printf( " ! x509parse_crt returned %d\n\n", ret );
218 goto exit;
219 }
220
221 ret = x509parse_key( &rsa, (unsigned char *) test_srv_key,
222 strlen( test_srv_key ), NULL, 0 );
223 if( ret != 0 )
224 {
225 printf( " ! x509parse_key returned %d\n\n", ret );
226 goto exit;
227 }
Paul Bakker5690efc2011-05-26 13:16:06 +0000228#endif
Paul Bakker5121ce52009-01-03 21:22:43 +0000229
230 if( server_fd < 0 )
231 {
232 if( ( ret = net_bind( &server_fd, NULL,
233 opt->server_port ) ) != 0 )
234 {
235 printf( " ! net_bind returned %d\n\n", ret );
236 return( ret );
237 }
238 }
239
240 if( ( ret = net_accept( server_fd, &client_fd, NULL ) ) != 0 )
241 {
242 printf( " ! net_accept returned %d\n\n", ret );
243 return( ret );
244 }
245
246 if( ( ret = ssl_init( &ssl ) ) != 0 )
247 {
248 printf( " ! ssl_init returned %d\n\n", ret );
249 return( ret );
250 }
251
252 ssl_set_endpoint( &ssl, SSL_IS_SERVER );
253 ssl_set_dh_param( &ssl, dhm_P, dhm_G );
Paul Bakker40ea7de2009-05-03 10:18:48 +0000254 ssl_set_ca_chain( &ssl, srvcert.next, NULL, NULL );
Paul Bakker5121ce52009-01-03 21:22:43 +0000255 ssl_set_own_cert( &ssl, &srvcert, &rsa );
256 }
257
258 ssl_set_authmode( &ssl, SSL_VERIFY_NONE );
259
Paul Bakkera3d195c2011-11-27 21:07:34 +0000260 ssl_set_rng( &ssl, havege_random, &hs );
Paul Bakker5121ce52009-01-03 21:22:43 +0000261 ssl_set_dbg( &ssl, my_debug, opt );
262 ssl_set_bio( &ssl, net_recv, &client_fd,
263 net_send, &client_fd );
264
265 ssl_set_session( &ssl, opt->session_reuse,
266 opt->session_lifetime, &ssn );
267
Paul Bakkere3166ce2011-01-27 17:40:50 +0000268 if( opt->force_ciphersuite[0] == DFL_FORCE_CIPHER )
269 ssl_set_ciphersuites( &ssl, ssl_default_ciphersuites );
270 else ssl_set_ciphersuites( &ssl, opt->force_ciphersuite );
Paul Bakker5121ce52009-01-03 21:22:43 +0000271
272 if( opt->iomode == IOMODE_NONBLOCK )
273 net_set_nonblock( client_fd );
274
275 read_buf = (unsigned char *) malloc( opt->buffer_size );
276 write_buf = (unsigned char *) malloc( opt->buffer_size );
277
278 if( read_buf == NULL || write_buf == NULL )
279 {
280 printf( " ! malloc(%d bytes) failed\n\n", opt->buffer_size );
281 goto exit;
282 }
283
284 nb_read = bytes_to_read = 0;
285 nb_written = bytes_to_write = 0;
286
287 while( 1 )
288 {
289 if( opt->command & COMMAND_WRITE )
290 {
291 if( bytes_to_write == 0 )
292 {
293 while( bytes_to_write == 0 )
294 bytes_to_write = rand() % opt->buffer_size;
295
296 for( i = 0; i < bytes_to_write; i++ )
297 write_buf[i] = (unsigned char) lcppm5( write_state );
298
299 offset_to_write = 0;
300 }
301
302 ret = ssl_write( &ssl, write_buf + offset_to_write,
303 bytes_to_write );
304
305 if( ret >= 0 )
306 {
307 nb_written += ret;
308 bytes_to_write -= ret;
309 offset_to_write += ret;
310 }
311
Paul Bakker40e46942009-01-03 21:51:57 +0000312 if( ret == POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY ||
313 ret == POLARSSL_ERR_NET_CONN_RESET )
Paul Bakker5121ce52009-01-03 21:22:43 +0000314 {
315 ret = 0;
316 goto exit;
317 }
318
Paul Bakker831a7552011-05-18 13:32:51 +0000319 if( ret < 0 && ret != POLARSSL_ERR_NET_WANT_READ &&
320 ret != POLARSSL_ERR_NET_WANT_WRITE )
Paul Bakker5121ce52009-01-03 21:22:43 +0000321 {
322 printf( " ! ssl_write returned %d\n\n", ret );
323 break;
324 }
325 }
326
327 if( opt->command & COMMAND_READ )
328 {
329 if( bytes_to_read == 0 )
330 {
331 bytes_to_read = rand() % opt->buffer_size;
332 offset_to_read = 0;
333 }
334
335 ret = ssl_read( &ssl, read_buf + offset_to_read,
336 bytes_to_read );
337
338 if( ret >= 0 )
339 {
340 for( i = 0; i < ret; i++ )
341 {
342 if( read_buf[offset_to_read + i] !=
343 (unsigned char) lcppm5( read_state ) )
344 {
345 ret = 1;
346 printf( " ! plaintext mismatch\n\n" );
347 goto exit;
348 }
349 }
350
351 nb_read += ret;
352 bytes_to_read -= ret;
353 offset_to_read += ret;
354 }
355
Paul Bakker40e46942009-01-03 21:51:57 +0000356 if( ret == POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY ||
357 ret == POLARSSL_ERR_NET_CONN_RESET )
Paul Bakker5121ce52009-01-03 21:22:43 +0000358 {
359 ret = 0;
360 goto exit;
361 }
362
Paul Bakker831a7552011-05-18 13:32:51 +0000363 if( ret < 0 && ret != POLARSSL_ERR_NET_WANT_READ &&
364 ret != POLARSSL_ERR_NET_WANT_WRITE )
Paul Bakker5121ce52009-01-03 21:22:43 +0000365 {
366 printf( " ! ssl_read returned %d\n\n", ret );
367 break;
368 }
369 }
370
371 ret = 0;
372
373 if( opt->max_bytes != 0 &&
374 ( opt->max_bytes <= nb_read ||
375 opt->max_bytes <= nb_written ) )
376 break;
377
378 if( opt->conn_timeout != 0 &&
379 opt->conn_timeout <= (int) get_timer( &t, 0 ) )
380 break;
381 }
382
383exit:
384
385 fflush( stdout );
386
387 if( read_buf != NULL )
388 free( read_buf );
389
390 if( write_buf != NULL )
391 free( write_buf );
392
393 ssl_close_notify( &ssl );
394 x509_free( &srvcert );
395 rsa_free( &rsa );
396 ssl_free( &ssl );
397 net_close( client_fd );
398
399 return( ret );
400}
401
402#define USAGE \
403 "\n usage: ssl_test opmode=<> command=<>...\n" \
404 "\n acceptable parameters:\n" \
405 " opmode=client/server default: <none>\n" \
406 " iomode=block/nonblock default: block\n" \
407 " server_name=%%s default: localhost\n" \
408 " server_port=%%d default: 4433\n" \
409 " command=read/write/both default: read\n" \
410 " buffer_size=%%d (bytes) default: 1024\n" \
411 " max_bytes=%%d (bytes) default: 0 (no limit)\n" \
412 " debug_level=%%d default: 0 (disabled)\n" \
413 " conn_timeout=%%d (ms) default: 0 (no timeout)\n" \
414 " max_connections=%%d default: 0 (no limit)\n" \
415 " session_reuse=on/off default: on (enabled)\n" \
416 " session_lifetime=%%d (s) default: 86400\n" \
Paul Bakkere3166ce2011-01-27 17:40:50 +0000417 " force_ciphersuite=<name> default: all enabled\n" \
418 " acceptable ciphersuite names:\n"
Paul Bakker5121ce52009-01-03 21:22:43 +0000419
420int main( int argc, char *argv[] )
421{
422 int i, j, n;
Paul Bakkere3166ce2011-01-27 17:40:50 +0000423 const int *list;
Paul Bakker5121ce52009-01-03 21:22:43 +0000424 int ret = 1;
425 int nb_conn;
426 char *p, *q;
427 struct options opt;
428
429 if( argc == 1 )
430 {
431 usage:
432 printf( USAGE );
Paul Bakkere3166ce2011-01-27 17:40:50 +0000433
434 list = ssl_list_ciphersuites();
435 while( *list )
436 {
437 printf(" %s\n", ssl_get_ciphersuite_name( *list ) );
438 list++;
439 }
440 printf("\n");
Paul Bakker5121ce52009-01-03 21:22:43 +0000441 goto exit;
442 }
443
444 opt.opmode = DFL_OPMODE;
445 opt.iomode = DFL_IOMODE;
446 opt.server_name = DFL_SERVER_NAME;
447 opt.server_port = DFL_SERVER_PORT;
448 opt.command = DFL_COMMAND;
449 opt.buffer_size = DFL_BUFFER_SIZE;
450 opt.max_bytes = DFL_MAX_BYTES;
451 opt.debug_level = DFL_DEBUG_LEVEL;
452 opt.conn_timeout = DFL_CONN_TIMEOUT;
453 opt.max_connections = DFL_MAX_CONNECTIONS;
454 opt.session_reuse = DFL_SESSION_REUSE;
455 opt.session_lifetime = DFL_SESSION_LIFETIME;
Paul Bakkere3166ce2011-01-27 17:40:50 +0000456 opt.force_ciphersuite[0] = DFL_FORCE_CIPHER;
Paul Bakker5121ce52009-01-03 21:22:43 +0000457
458 for( i = 1; i < argc; i++ )
459 {
460 n = strlen( argv[i] );
461
462 for( j = 0; j < n; j++ )
463 {
464 if( argv[i][j] >= 'A' && argv[i][j] <= 'Z' )
465 argv[i][j] |= 0x20;
466 }
467
468 p = argv[i];
469 if( ( q = strchr( p, '=' ) ) == NULL )
470 continue;
471 *q++ = '\0';
472
473 if( strcmp( p, "opmode" ) == 0 )
474 {
475 if( strcmp( q, "client" ) == 0 )
476 opt.opmode = OPMODE_CLIENT;
477 else
478 if( strcmp( q, "server" ) == 0 )
479 opt.opmode = OPMODE_SERVER;
480 else goto usage;
481 }
482
483 if( strcmp( p, "iomode" ) == 0 )
484 {
485 if( strcmp( q, "block" ) == 0 )
486 opt.iomode = IOMODE_BLOCK;
487 else
488 if( strcmp( q, "nonblock" ) == 0 )
489 opt.iomode = IOMODE_NONBLOCK;
490 else goto usage;
491 }
492
493 if( strcmp( p, "server_name" ) == 0 )
494 opt.server_name = q;
495
496 if( strcmp( p, "server_port" ) == 0 )
497 {
498 opt.server_port = atoi( q );
499 if( opt.server_port < 1 || opt.server_port > 65535 )
500 goto usage;
501 }
502
503 if( strcmp( p, "command" ) == 0 )
504 {
505 if( strcmp( q, "read" ) == 0 )
506 opt.command = COMMAND_READ;
507 else
508 if( strcmp( q, "write" ) == 0 )
509 opt.command = COMMAND_WRITE;
510 else
511 if( strcmp( q, "both" ) == 0 )
512 {
513 opt.iomode = IOMODE_NONBLOCK;
514 opt.command = COMMAND_BOTH;
515 }
516 else goto usage;
517 }
518
519 if( strcmp( p, "buffer_size" ) == 0 )
520 {
521 opt.buffer_size = atoi( q );
522 if( opt.buffer_size < 1 || opt.buffer_size > 1048576 )
523 goto usage;
524 }
525
526 if( strcmp( p, "max_bytes" ) == 0 )
527 opt.max_bytes = atoi( q );
528
529 if( strcmp( p, "debug_level" ) == 0 )
530 opt.debug_level = atoi( q );
531
532 if( strcmp( p, "conn_timeout" ) == 0 )
533 opt.conn_timeout = atoi( q );
534
535 if( strcmp( p, "max_connections" ) == 0 )
536 opt.max_connections = atoi( q );
537
538 if( strcmp( p, "session_reuse" ) == 0 )
539 {
540 if( strcmp( q, "on" ) == 0 )
541 opt.session_reuse = 1;
542 else
543 if( strcmp( q, "off" ) == 0 )
544 opt.session_reuse = 0;
545 else
546 goto usage;
547 }
548
549 if( strcmp( p, "session_lifetime" ) == 0 )
550 opt.session_lifetime = atoi( q );
551
Paul Bakkere3166ce2011-01-27 17:40:50 +0000552 if( strcmp( p, "force_ciphersuite" ) == 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000553 {
Paul Bakkere3166ce2011-01-27 17:40:50 +0000554 opt.force_ciphersuite[0] = -1;
Paul Bakker5121ce52009-01-03 21:22:43 +0000555
Paul Bakkere3166ce2011-01-27 17:40:50 +0000556 opt.force_ciphersuite[0] = ssl_get_ciphersuite_id( q );
Paul Bakker5121ce52009-01-03 21:22:43 +0000557
Paul Bakkere3166ce2011-01-27 17:40:50 +0000558 if( opt.force_ciphersuite[0] <= 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000559 goto usage;
560
Paul Bakkere3166ce2011-01-27 17:40:50 +0000561 opt.force_ciphersuite[1] = 0;
Paul Bakker5121ce52009-01-03 21:22:43 +0000562 }
563 }
564
565 switch( opt.opmode )
566 {
567 case OPMODE_CLIENT:
568 break;
569
570 case OPMODE_SERVER:
571 break;
572
573 default:
574 goto usage;
575 }
576
577 nb_conn = 0;
578
579 do {
580 nb_conn++;
581 ret = ssl_test( &opt );
582 if( opt.max_connections != 0 &&
583 opt.max_connections <= nb_conn )
584 break;
585 }
586 while( ret == 0 );
587
588exit:
589
Paul Bakkercce9d772011-11-18 14:26:47 +0000590#if defined(_WIN32)
Paul Bakker5121ce52009-01-03 21:22:43 +0000591 printf( " Press Enter to exit this program.\n" );
592 fflush( stdout ); getchar();
593#endif
594
595 return( ret );
596}
Paul Bakker5690efc2011-05-26 13:16:06 +0000597#endif /* POLARSSL_BIGNUM_C && POLARSSL_HAVEGE_C && POLARSSL_SSL_TLS_C &&
598 POLARSSL_SSL_SRV_C && POLARSSL_SSL_CLI_C && POLARSSL_NET_C &&
599 POLARSSL_RSA_C */