blob: 14b46f86589ba0cd37b862023754dc5d357787b0 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/*
2 * SSL/TLS stress testing program
3 *
Paul Bakkerfc8c4362010-03-21 17:37:16 +00004 * Copyright (C) 2006-2010, Paul Bakker <polarssl_maintainer at polarssl.org>
Paul Bakker77b385e2009-07-28 17:23:11 +00005 * All rights reserved.
Paul Bakkere0ccd0a2009-01-04 16:27:10 +00006 *
Paul Bakker5121ce52009-01-03 21:22:43 +00007 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along
18 * with this program; if not, write to the Free Software Foundation, Inc.,
19 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
20 */
21
22#ifndef _CRT_SECURE_NO_DEPRECATE
23#define _CRT_SECURE_NO_DEPRECATE 1
24#endif
25
26#include <string.h>
27#include <stdlib.h>
28#include <stdio.h>
29
Paul Bakker40e46942009-01-03 21:51:57 +000030#include "polarssl/net.h"
31#include "polarssl/ssl.h"
32#include "polarssl/havege.h"
33#include "polarssl/timing.h"
34#include "polarssl/certs.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000035
36#define OPMODE_NONE 0
37#define OPMODE_CLIENT 1
38#define OPMODE_SERVER 2
39
40#define IOMODE_BLOCK 0
41#define IOMODE_NONBLOCK 1
42
43#define COMMAND_READ 1
44#define COMMAND_WRITE 2
45#define COMMAND_BOTH 3
46
47#define DFL_OPMODE OPMODE_NONE
48#define DFL_IOMODE IOMODE_BLOCK
49#define DFL_SERVER_NAME "localhost"
50#define DFL_SERVER_PORT 4433
51#define DFL_COMMAND COMMAND_READ
52#define DFL_BUFFER_SIZE 1024
53#define DFL_MAX_BYTES 0
54#define DFL_DEBUG_LEVEL 0
55#define DFL_CONN_TIMEOUT 0
56#define DFL_MAX_CONNECTIONS 0
57#define DFL_SESSION_REUSE 1
58#define DFL_SESSION_LIFETIME 86400
59#define DFL_FORCE_CIPHER 0
60
61/*
62 * server-specific data
63 */
64char *dhm_G = "4";
65char *dhm_P =
66"E4004C1F94182000103D883A448B3F802CE4B44A83301270002C20D0321CFD00" \
67"11CCEF784C26A400F43DFB901BCA7538F2C6B176001CF5A0FD16D2C48B1D0C1C" \
68"F6AC8E1DA6BCC3B4E1F96B0564965300FFA1D0B601EB2800F489AA512C4B248C" \
69"01F76949A60BB7F00A40B1EAB64BDD48E8A700D60B7F1200FA8E77B0A979DABF";
70
71int server_fd = -1;
72
73/*
74 * global options
75 */
76struct options
77{
78 int opmode; /* operation mode (client or server) */
79 int iomode; /* I/O mode (blocking or non-blocking) */
80 char *server_name; /* hostname of the server (client only) */
81 int server_port; /* port on which the ssl service runs */
82 int command; /* what to do: read or write operation */
83 int buffer_size; /* size of the send/receive buffer */
84 int max_bytes; /* max. # of bytes before a reconnect */
85 int debug_level; /* level of debugging */
86 int conn_timeout; /* max. delay before a reconnect */
87 int max_connections; /* max. number of reconnections */
88 int session_reuse; /* flag to reuse the keying material */
89 int session_lifetime; /* if reached, session data is expired */
90 int force_cipher[2]; /* protocol/cipher to use, or all */
91};
92
93/*
94 * Although this PRNG has good statistical properties (eg. passes
95 * DIEHARD), it is not cryptographically secure.
96 */
97unsigned long int lcppm5( unsigned long int *state )
98{
99 unsigned long int u, v;
100
101 u = v = state[4] ^ 1;
102 state[u & 3] ^= u;
103 u ^= (v << 12) ^ (v >> 12);
104 u ^= v * state[0]; v >>= 8;
105 u ^= v * state[1]; v >>= 8;
106 u ^= v * state[2]; v >>= 8;
107 u ^= v * state[3];
108 u &= 0xFFFFFFFF;
109 state[4] = u;
110
111 return( u );
112}
113
Paul Bakkerff60ee62010-03-16 21:09:09 +0000114void my_debug( void *ctx, int level, const char *str )
Paul Bakker5121ce52009-01-03 21:22:43 +0000115{
116 if( level < ((struct options *) ctx)->debug_level )
117 fprintf( stderr, "%s", str );
118}
119
120/*
121 * perform a single SSL connection
122 */
123static int ssl_test( struct options *opt )
124{
125 int ret, i;
126 int client_fd;
127 int bytes_to_read;
128 int bytes_to_write;
Paul Bakker026c03b2009-03-28 17:53:03 +0000129 int offset_to_read = 0;
130 int offset_to_write = 0;
Paul Bakker5121ce52009-01-03 21:22:43 +0000131
132 long int nb_read;
133 long int nb_written;
134
135 unsigned long read_state[5];
136 unsigned long write_state[5];
137
Paul Bakker026c03b2009-03-28 17:53:03 +0000138 unsigned char *read_buf = NULL;
139 unsigned char *write_buf = NULL;
Paul Bakker5121ce52009-01-03 21:22:43 +0000140
141 struct hr_time t;
142 havege_state hs;
143 ssl_context ssl;
144 ssl_session ssn;
145 x509_cert srvcert;
146 rsa_context rsa;
147
148 ret = 1;
149
150 havege_init( &hs );
151 get_timer( &t, 1 );
152
153 memset( read_state, 0, sizeof( read_state ) );
154 memset( write_state, 0, sizeof( write_state ) );
155
156 memset( &srvcert, 0, sizeof( x509_cert ) );
157 memset( &rsa, 0, sizeof( rsa_context ) );
158
159 if( opt->opmode == OPMODE_CLIENT )
160 {
161 if( ( ret = net_connect( &client_fd, opt->server_name,
162 opt->server_port ) ) != 0 )
163 {
164 printf( " ! net_connect returned %d\n\n", ret );
165 return( ret );
166 }
167
168 if( ( ret = ssl_init( &ssl ) ) != 0 )
169 {
170 printf( " ! ssl_init returned %d\n\n", ret );
171 return( ret );
172 }
173
174 ssl_set_endpoint( &ssl, SSL_IS_CLIENT );
175 }
176
177 if( opt->opmode == OPMODE_SERVER )
178 {
179 ret = x509parse_crt( &srvcert, (unsigned char *) test_srv_crt,
180 strlen( test_srv_crt ) );
181 if( ret != 0 )
182 {
183 printf( " ! x509parse_crt returned %d\n\n", ret );
184 goto exit;
185 }
186
187 ret = x509parse_crt( &srvcert, (unsigned char *) test_ca_crt,
188 strlen( test_ca_crt ) );
189 if( ret != 0 )
190 {
191 printf( " ! x509parse_crt returned %d\n\n", ret );
192 goto exit;
193 }
194
195 ret = x509parse_key( &rsa, (unsigned char *) test_srv_key,
196 strlen( test_srv_key ), NULL, 0 );
197 if( ret != 0 )
198 {
199 printf( " ! x509parse_key returned %d\n\n", ret );
200 goto exit;
201 }
202
203 if( server_fd < 0 )
204 {
205 if( ( ret = net_bind( &server_fd, NULL,
206 opt->server_port ) ) != 0 )
207 {
208 printf( " ! net_bind returned %d\n\n", ret );
209 return( ret );
210 }
211 }
212
213 if( ( ret = net_accept( server_fd, &client_fd, NULL ) ) != 0 )
214 {
215 printf( " ! net_accept returned %d\n\n", ret );
216 return( ret );
217 }
218
219 if( ( ret = ssl_init( &ssl ) ) != 0 )
220 {
221 printf( " ! ssl_init returned %d\n\n", ret );
222 return( ret );
223 }
224
225 ssl_set_endpoint( &ssl, SSL_IS_SERVER );
226 ssl_set_dh_param( &ssl, dhm_P, dhm_G );
Paul Bakker40ea7de2009-05-03 10:18:48 +0000227 ssl_set_ca_chain( &ssl, srvcert.next, NULL, NULL );
Paul Bakker5121ce52009-01-03 21:22:43 +0000228 ssl_set_own_cert( &ssl, &srvcert, &rsa );
229 }
230
231 ssl_set_authmode( &ssl, SSL_VERIFY_NONE );
232
233 ssl_set_rng( &ssl, havege_rand, &hs );
234 ssl_set_dbg( &ssl, my_debug, opt );
235 ssl_set_bio( &ssl, net_recv, &client_fd,
236 net_send, &client_fd );
237
238 ssl_set_session( &ssl, opt->session_reuse,
239 opt->session_lifetime, &ssn );
240
241 if( opt->force_cipher[0] == DFL_FORCE_CIPHER )
242 ssl_set_ciphers( &ssl, ssl_default_ciphers );
243 else ssl_set_ciphers( &ssl, opt->force_cipher );
244
245 if( opt->iomode == IOMODE_NONBLOCK )
246 net_set_nonblock( client_fd );
247
248 read_buf = (unsigned char *) malloc( opt->buffer_size );
249 write_buf = (unsigned char *) malloc( opt->buffer_size );
250
251 if( read_buf == NULL || write_buf == NULL )
252 {
253 printf( " ! malloc(%d bytes) failed\n\n", opt->buffer_size );
254 goto exit;
255 }
256
257 nb_read = bytes_to_read = 0;
258 nb_written = bytes_to_write = 0;
259
260 while( 1 )
261 {
262 if( opt->command & COMMAND_WRITE )
263 {
264 if( bytes_to_write == 0 )
265 {
266 while( bytes_to_write == 0 )
267 bytes_to_write = rand() % opt->buffer_size;
268
269 for( i = 0; i < bytes_to_write; i++ )
270 write_buf[i] = (unsigned char) lcppm5( write_state );
271
272 offset_to_write = 0;
273 }
274
275 ret = ssl_write( &ssl, write_buf + offset_to_write,
276 bytes_to_write );
277
278 if( ret >= 0 )
279 {
280 nb_written += ret;
281 bytes_to_write -= ret;
282 offset_to_write += ret;
283 }
284
Paul Bakker40e46942009-01-03 21:51:57 +0000285 if( ret == POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY ||
286 ret == POLARSSL_ERR_NET_CONN_RESET )
Paul Bakker5121ce52009-01-03 21:22:43 +0000287 {
288 ret = 0;
289 goto exit;
290 }
291
Paul Bakker40e46942009-01-03 21:51:57 +0000292 if( ret < 0 && ret != POLARSSL_ERR_NET_TRY_AGAIN )
Paul Bakker5121ce52009-01-03 21:22:43 +0000293 {
294 printf( " ! ssl_write returned %d\n\n", ret );
295 break;
296 }
297 }
298
299 if( opt->command & COMMAND_READ )
300 {
301 if( bytes_to_read == 0 )
302 {
303 bytes_to_read = rand() % opt->buffer_size;
304 offset_to_read = 0;
305 }
306
307 ret = ssl_read( &ssl, read_buf + offset_to_read,
308 bytes_to_read );
309
310 if( ret >= 0 )
311 {
312 for( i = 0; i < ret; i++ )
313 {
314 if( read_buf[offset_to_read + i] !=
315 (unsigned char) lcppm5( read_state ) )
316 {
317 ret = 1;
318 printf( " ! plaintext mismatch\n\n" );
319 goto exit;
320 }
321 }
322
323 nb_read += ret;
324 bytes_to_read -= ret;
325 offset_to_read += ret;
326 }
327
Paul Bakker40e46942009-01-03 21:51:57 +0000328 if( ret == POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY ||
329 ret == POLARSSL_ERR_NET_CONN_RESET )
Paul Bakker5121ce52009-01-03 21:22:43 +0000330 {
331 ret = 0;
332 goto exit;
333 }
334
Paul Bakker40e46942009-01-03 21:51:57 +0000335 if( ret < 0 && ret != POLARSSL_ERR_NET_TRY_AGAIN )
Paul Bakker5121ce52009-01-03 21:22:43 +0000336 {
337 printf( " ! ssl_read returned %d\n\n", ret );
338 break;
339 }
340 }
341
342 ret = 0;
343
344 if( opt->max_bytes != 0 &&
345 ( opt->max_bytes <= nb_read ||
346 opt->max_bytes <= nb_written ) )
347 break;
348
349 if( opt->conn_timeout != 0 &&
350 opt->conn_timeout <= (int) get_timer( &t, 0 ) )
351 break;
352 }
353
354exit:
355
356 fflush( stdout );
357
358 if( read_buf != NULL )
359 free( read_buf );
360
361 if( write_buf != NULL )
362 free( write_buf );
363
364 ssl_close_notify( &ssl );
365 x509_free( &srvcert );
366 rsa_free( &rsa );
367 ssl_free( &ssl );
368 net_close( client_fd );
369
370 return( ret );
371}
372
373#define USAGE \
374 "\n usage: ssl_test opmode=<> command=<>...\n" \
375 "\n acceptable parameters:\n" \
376 " opmode=client/server default: <none>\n" \
377 " iomode=block/nonblock default: block\n" \
378 " server_name=%%s default: localhost\n" \
379 " server_port=%%d default: 4433\n" \
380 " command=read/write/both default: read\n" \
381 " buffer_size=%%d (bytes) default: 1024\n" \
382 " max_bytes=%%d (bytes) default: 0 (no limit)\n" \
383 " debug_level=%%d default: 0 (disabled)\n" \
384 " conn_timeout=%%d (ms) default: 0 (no timeout)\n" \
385 " max_connections=%%d default: 0 (no limit)\n" \
386 " session_reuse=on/off default: on (enabled)\n" \
387 " session_lifetime=%%d (s) default: 86400\n" \
388 " force_cipher=<name> default: all enabled\n" \
389 " acceptable cipher names:\n" \
390 " SSL_RSA_RC4_128_MD5 SSL_RSA_RC4_128_SHA\n" \
391 " SSL_RSA_DES_168_SHA SSL_EDH_RSA_DES_168_SHA\n" \
392 " SSL_RSA_AES_128_SHA SSL_EDH_RSA_AES_256_SHA\n" \
Paul Bakkerb5ef0ba2009-01-11 20:25:36 +0000393 " SSL_RSA_AES_256_SHA SSL_EDH_RSA_CAMELLIA_256_SHA\n" \
394 " SSL_RSA_CAMELLIA_128_SHA SSL_RSA_CAMELLIA_256_SHA\n\n"
Paul Bakker5121ce52009-01-03 21:22:43 +0000395
396int main( int argc, char *argv[] )
397{
398 int i, j, n;
399 int ret = 1;
400 int nb_conn;
401 char *p, *q;
402 struct options opt;
403
404 if( argc == 1 )
405 {
406 usage:
407 printf( USAGE );
408 goto exit;
409 }
410
411 opt.opmode = DFL_OPMODE;
412 opt.iomode = DFL_IOMODE;
413 opt.server_name = DFL_SERVER_NAME;
414 opt.server_port = DFL_SERVER_PORT;
415 opt.command = DFL_COMMAND;
416 opt.buffer_size = DFL_BUFFER_SIZE;
417 opt.max_bytes = DFL_MAX_BYTES;
418 opt.debug_level = DFL_DEBUG_LEVEL;
419 opt.conn_timeout = DFL_CONN_TIMEOUT;
420 opt.max_connections = DFL_MAX_CONNECTIONS;
421 opt.session_reuse = DFL_SESSION_REUSE;
422 opt.session_lifetime = DFL_SESSION_LIFETIME;
423 opt.force_cipher[0] = DFL_FORCE_CIPHER;
424
425 for( i = 1; i < argc; i++ )
426 {
427 n = strlen( argv[i] );
428
429 for( j = 0; j < n; j++ )
430 {
431 if( argv[i][j] >= 'A' && argv[i][j] <= 'Z' )
432 argv[i][j] |= 0x20;
433 }
434
435 p = argv[i];
436 if( ( q = strchr( p, '=' ) ) == NULL )
437 continue;
438 *q++ = '\0';
439
440 if( strcmp( p, "opmode" ) == 0 )
441 {
442 if( strcmp( q, "client" ) == 0 )
443 opt.opmode = OPMODE_CLIENT;
444 else
445 if( strcmp( q, "server" ) == 0 )
446 opt.opmode = OPMODE_SERVER;
447 else goto usage;
448 }
449
450 if( strcmp( p, "iomode" ) == 0 )
451 {
452 if( strcmp( q, "block" ) == 0 )
453 opt.iomode = IOMODE_BLOCK;
454 else
455 if( strcmp( q, "nonblock" ) == 0 )
456 opt.iomode = IOMODE_NONBLOCK;
457 else goto usage;
458 }
459
460 if( strcmp( p, "server_name" ) == 0 )
461 opt.server_name = q;
462
463 if( strcmp( p, "server_port" ) == 0 )
464 {
465 opt.server_port = atoi( q );
466 if( opt.server_port < 1 || opt.server_port > 65535 )
467 goto usage;
468 }
469
470 if( strcmp( p, "command" ) == 0 )
471 {
472 if( strcmp( q, "read" ) == 0 )
473 opt.command = COMMAND_READ;
474 else
475 if( strcmp( q, "write" ) == 0 )
476 opt.command = COMMAND_WRITE;
477 else
478 if( strcmp( q, "both" ) == 0 )
479 {
480 opt.iomode = IOMODE_NONBLOCK;
481 opt.command = COMMAND_BOTH;
482 }
483 else goto usage;
484 }
485
486 if( strcmp( p, "buffer_size" ) == 0 )
487 {
488 opt.buffer_size = atoi( q );
489 if( opt.buffer_size < 1 || opt.buffer_size > 1048576 )
490 goto usage;
491 }
492
493 if( strcmp( p, "max_bytes" ) == 0 )
494 opt.max_bytes = atoi( q );
495
496 if( strcmp( p, "debug_level" ) == 0 )
497 opt.debug_level = atoi( q );
498
499 if( strcmp( p, "conn_timeout" ) == 0 )
500 opt.conn_timeout = atoi( q );
501
502 if( strcmp( p, "max_connections" ) == 0 )
503 opt.max_connections = atoi( q );
504
505 if( strcmp( p, "session_reuse" ) == 0 )
506 {
507 if( strcmp( q, "on" ) == 0 )
508 opt.session_reuse = 1;
509 else
510 if( strcmp( q, "off" ) == 0 )
511 opt.session_reuse = 0;
512 else
513 goto usage;
514 }
515
516 if( strcmp( p, "session_lifetime" ) == 0 )
517 opt.session_lifetime = atoi( q );
518
519 if( strcmp( p, "force_cipher" ) == 0 )
520 {
521 opt.force_cipher[0] = -1;
522
523 if( strcmp( q, "ssl_rsa_rc4_128_md5" ) == 0 )
524 opt.force_cipher[0] = SSL_RSA_RC4_128_MD5;
525
526 if( strcmp( q, "ssl_rsa_rc4_128_sha" ) == 0 )
527 opt.force_cipher[0] = SSL_RSA_RC4_128_SHA;
528
529 if( strcmp( q, "ssl_rsa_des_168_sha" ) == 0 )
530 opt.force_cipher[0] = SSL_RSA_DES_168_SHA;
531
532 if( strcmp( q, "ssl_edh_rsa_des_168_sha" ) == 0 )
533 opt.force_cipher[0] = SSL_EDH_RSA_DES_168_SHA;
534
535 if( strcmp( q, "ssl_rsa_aes_128_sha" ) == 0 )
536 opt.force_cipher[0] = SSL_RSA_AES_128_SHA;
537
538 if( strcmp( q, "ssl_rsa_aes_256_sha" ) == 0 )
539 opt.force_cipher[0] = SSL_RSA_AES_256_SHA;
540
541 if( strcmp( q, "ssl_edh_rsa_aes_256_sha" ) == 0 )
542 opt.force_cipher[0] = SSL_EDH_RSA_AES_256_SHA;
543
Paul Bakkerb5ef0ba2009-01-11 20:25:36 +0000544 if( strcmp( q, "ssl_rsa_camellia_128_sha" ) == 0 )
545 opt.force_cipher[0] = SSL_RSA_CAMELLIA_128_SHA;
546
547 if( strcmp( q, "ssl_rsa_camellia_256_sha" ) == 0 )
548 opt.force_cipher[0] = SSL_RSA_CAMELLIA_256_SHA;
549
550 if( strcmp( q, "ssl_edh_rsa_camellia_256_sha" ) == 0 )
551 opt.force_cipher[0] = SSL_EDH_RSA_CAMELLIA_256_SHA;
552
Paul Bakker5121ce52009-01-03 21:22:43 +0000553 if( opt.force_cipher[0] < 0 )
554 goto usage;
555
556 opt.force_cipher[1] = 0;
557 }
558 }
559
560 switch( opt.opmode )
561 {
562 case OPMODE_CLIENT:
563 break;
564
565 case OPMODE_SERVER:
566 break;
567
568 default:
569 goto usage;
570 }
571
572 nb_conn = 0;
573
574 do {
575 nb_conn++;
576 ret = ssl_test( &opt );
577 if( opt.max_connections != 0 &&
578 opt.max_connections <= nb_conn )
579 break;
580 }
581 while( ret == 0 );
582
583exit:
584
585#ifdef WIN32
586 printf( " Press Enter to exit this program.\n" );
587 fflush( stdout ); getchar();
588#endif
589
590 return( ret );
591}