1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332 |
- /* tls_bench.c
- *
- * Copyright (C) 2006-2023 wolfSSL Inc.
- *
- * This file is part of wolfSSL.
- *
- * wolfSSL is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * wolfSSL is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
- */
- /*
- Example gcc build statement
- gcc -lwolfssl -lpthread -o tls_bench tls_bench.c
- ./tls_bench
- Or
- #include <examples/benchmark/tls_bench.h>
- bench_tls(args);
- */
- #ifdef HAVE_CONFIG_H
- #include <config.h>
- #endif
- #ifndef WOLFSSL_USER_SETTINGS
- #include <wolfssl/options.h>
- #endif
- #include <wolfssl/wolfcrypt/settings.h>
- #include <wolfssl/wolfcrypt/types.h>
- #include <wolfssl/wolfcrypt/wc_port.h>
- #include <wolfssl/ssl.h>
- #include <wolfssl/wolfcrypt/hash.h> /* WC_MAX_DIGEST_SIZE */
- #include <wolfssl/test.h>
- #include <wolfssl/wolfio.h>
- #include <examples/benchmark/tls_bench.h>
- /* force certificate test buffers to be included via headers */
- #undef USE_CERT_BUFFERS_2048
- #define USE_CERT_BUFFERS_2048
- #undef USE_CERT_BUFFERS_256
- #define USE_CERT_BUFFERS_256
- #include <wolfssl/certs_test.h>
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #include <unistd.h>
- #include <sys/time.h>
- #include <errno.h>
- /* For testing no threading support */
- #if 0
- #undef HAVE_PTHREAD
- #define SINGLE_THREADED
- #endif
- /* PTHREAD requires server and client enabled */
- #if defined(NO_WOLFSSL_CLIENT) || defined(NO_WOLFSSL_SERVER)
- #if !defined(SINGLE_THREADED)
- #ifdef __GNUC__ /* GCC compiler */
- #pragma message "PTHREAD requires server and client enabled."
- #elif defined(_MSC_VER) /* Microsoft Visual C++ compiler */
- #pragma message("PTHREAD requires server and client enabled.")
- #else
- #warning "PTHREAD requires server and client enabled."
- #endif
- #define SINGLE_THREADED
- #endif
- #endif
- /* Conversely, if both server and client are enabled, we must require pthreads */
- #if !defined(NO_WOLFSSL_CLIENT) && !defined(NO_WOLFSSL_SERVER) \
- && defined(SINGLE_THREADED)
- #error "threads must be enabled if building benchmark suite \
- to run both client and server. Please define HAVE_PTHREAD if your \
- platform supports it"
- #endif
- #if 0
- #define BENCH_USE_NONBLOCK
- #endif
- /* Defaults for configuration parameters */
- #define BENCH_DEFAULT_HOST "localhost"
- #define BENCH_DEFAULT_PORT 11112
- #define NUM_THREAD_PAIRS 1 /* Thread pairs of server/client */
- #ifndef BENCH_RUNTIME_SEC
- #ifdef BENCH_EMBEDDED
- #define BENCH_RUNTIME_SEC 15
- #else
- #define BENCH_RUNTIME_SEC 1
- #endif
- #endif
- /* TLS packet size */
- #ifndef TEST_PACKET_SIZE
- #ifdef BENCH_EMBEDDED
- #define TEST_PACKET_SIZE (2 * 1024)
- #else
- #define TEST_PACKET_SIZE (16 * 1024)
- #endif
- #endif
- /* Total bytes to benchmark per connection */
- #ifndef TEST_MAX_SIZE
- #ifdef BENCH_EMBEDDED
- #define TEST_MAX_SIZE (16 * 1024)
- #else
- #define TEST_MAX_SIZE (128 * 1024)
- #endif
- #endif
- #ifdef WOLFSSL_DTLS
- #ifdef BENCH_EMBEDDED
- /* WOLFSSL_MAX_MTU in internal.h */
- #define TEST_DTLS_PACKET_SIZE (1500)
- #else
- /* MAX_UDP_SIZE in interna.h */
- #define TEST_DTLS_PACKET_SIZE (8092)
- #endif
- #endif
- /* In memory transfer buffer maximum size */
- /* Must be large enough to handle max TLS packet size plus max TLS header MAX_MSG_EXTRA */
- #define MEM_BUFFER_SZ (TEST_PACKET_SIZE + 38 + WC_MAX_DIGEST_SIZE)
- #define SHOW_VERBOSE 0 /* Default output is tab delimited format */
- #if (!defined(NO_WOLFSSL_CLIENT) || !defined(NO_WOLFSSL_SERVER)) && \
- !defined(WOLFCRYPT_ONLY) && defined(USE_WOLFSSL_IO)
- /* shutdown message - nice signal to server, we are done */
- static const char* kShutdown = "shutdown";
- #ifndef NO_WOLFSSL_CLIENT
- PEDANTIC_EXTENSION static const char* kTestStr =
- "Biodiesel cupidatat marfa, cliche aute put a bird on it incididunt elit\n"
- "polaroid. Sunt tattooed bespoke reprehenderit. Sint twee organic id\n"
- "marfa. Commodo veniam ad esse gastropub. 3 wolf moon sartorial vero,\n"
- "plaid delectus biodiesel squid +1 vice. Post-ironic keffiyeh leggings\n"
- "selfies cray fap hoodie, forage anim. Carles cupidatat shoreditch, VHS\n"
- "small batch meggings kogi dolore food truck bespoke gastropub.\n"
- "\n"
- "Terry richardson adipisicing actually typewriter tumblr, twee whatever\n"
- "four loko you probably haven't heard of them high life. Messenger bag\n"
- "whatever tattooed deep v mlkshk. Brooklyn pinterest assumenda chillwave\n"
- "et, banksy ullamco messenger bag umami pariatur direct trade forage.\n"
- "Typewriter culpa try-hard, pariatur sint brooklyn meggings. Gentrify\n"
- "food truck next level, tousled irony non semiotics PBR ethical anim cred\n"
- "readymade. Mumblecore brunch lomo odd future, portland organic terry\n"
- "richardson elit leggings adipisicing ennui raw denim banjo hella. Godard\n"
- "mixtape polaroid, pork belly readymade organic cray typewriter helvetica\n"
- "four loko whatever street art yr farm-to-table.\n"
- "\n"
- "Vinyl keytar vice tofu. Locavore you probably haven't heard of them pug\n"
- "pickled, hella tonx labore truffaut DIY mlkshk elit cosby sweater sint\n"
- "et mumblecore. Elit swag semiotics, reprehenderit DIY sartorial nisi ugh\n"
- "nesciunt pug pork belly wayfarers selfies delectus. Ethical hoodie\n"
- "seitan fingerstache kale chips. Terry richardson artisan williamsburg,\n"
- "eiusmod fanny pack irony tonx ennui lo-fi incididunt tofu YOLO\n"
- "readymade. 8-bit sed ethnic beard officia. Pour-over iphone DIY butcher,\n"
- "ethnic art party qui letterpress nisi proident jean shorts mlkshk\n"
- "locavore.\n"
- "\n"
- "Narwhal flexitarian letterpress, do gluten-free voluptate next level\n"
- "banh mi tonx incididunt carles DIY. Odd future nulla 8-bit beard ut\n"
- "cillum pickled velit, YOLO officia you probably haven't heard of them\n"
- "trust fund gastropub. Nisi adipisicing tattooed, Austin mlkshk 90's\n"
- "small batch american apparel. Put a bird on it cosby sweater before they\n"
- "sold out pork belly kogi hella. Street art mollit sustainable polaroid,\n"
- "DIY ethnic ea pug beard dreamcatcher cosby sweater magna scenester nisi.\n"
- "Sed pork belly skateboard mollit, labore proident eiusmod. Sriracha\n"
- "excepteur cosby sweater, anim deserunt laborum eu aliquip ethical et\n"
- "neutra PBR selvage.\n"
- "\n"
- "Raw denim pork belly truffaut, irony plaid sustainable put a bird on it\n"
- "next level jean shorts exercitation. Hashtag keytar whatever, nihil\n"
- "authentic aliquip disrupt laborum. Tattooed selfies deserunt trust fund\n"
- "wayfarers. 3 wolf moon synth church-key sartorial, gastropub leggings\n"
- "tattooed. Labore high life commodo, meggings raw denim fingerstache pug\n"
- "trust fund leggings seitan forage. Nostrud ullamco duis, reprehenderit\n"
- "incididunt flannel sustainable helvetica pork belly pug banksy you\n"
- "probably haven't heard of them nesciunt farm-to-table. Disrupt nostrud\n"
- "mollit magna, sriracha sartorial helvetica.\n"
- "\n"
- "Nulla kogi reprehenderit, skateboard sustainable duis adipisicing viral\n"
- "ad fanny pack salvia. Fanny pack trust fund you probably haven't heard\n"
- "of them YOLO vice nihil. Keffiyeh cray lo-fi pinterest cardigan aliqua,\n"
- "reprehenderit aute. Culpa tousled williamsburg, marfa lomo actually anim\n"
- "skateboard. Iphone aliqua ugh, semiotics pariatur vero readymade\n"
- "organic. Marfa squid nulla, in laborum disrupt laboris irure gastropub.\n"
- "Veniam sunt food truck leggings, sint vinyl fap.\n"
- "\n"
- "Hella dolore pork belly, truffaut carles you probably haven't heard of\n"
- "them PBR helvetica in sapiente. Fashion axe ugh bushwick american\n"
- "apparel. Fingerstache sed iphone, jean shorts blue bottle nisi bushwick\n"
- "flexitarian officia veniam plaid bespoke fap YOLO lo-fi. Blog\n"
- "letterpress mumblecore, food truck id cray brooklyn cillum ad sed.\n"
- "Assumenda chambray wayfarers vinyl mixtape sustainable. VHS vinyl\n"
- "delectus, culpa williamsburg polaroid cliche swag church-key synth kogi\n"
- "magna pop-up literally. Swag thundercats ennui shoreditch vegan\n"
- "pitchfork neutra truffaut etsy, sed single-origin coffee craft beer.\n"
- "\n"
- "Odio letterpress brooklyn elit. Nulla single-origin coffee in occaecat\n"
- "meggings. Irony meggings 8-bit, chillwave lo-fi adipisicing cred\n"
- "dreamcatcher veniam. Put a bird on it irony umami, trust fund bushwick\n"
- "locavore kale chips. Sriracha swag thundercats, chillwave disrupt\n"
- "tousled beard mollit mustache leggings portland next level. Nihil esse\n"
- "est, skateboard art party etsy thundercats sed dreamcatcher ut iphone\n"
- "swag consectetur et. Irure skateboard banjo, nulla deserunt messenger\n"
- "bag dolor terry richardson sapiente.\n";
- #endif
- #if !defined(NO_DH)
- #define MIN_DHKEY_BITS 1024
- #if !defined(NO_WOLFSSL_SERVER)
- /* dh2048 p */
- static const unsigned char dhp[] =
- {
- 0xb0, 0xa1, 0x08, 0x06, 0x9c, 0x08, 0x13, 0xba, 0x59, 0x06, 0x3c, 0xbc, 0x30,
- 0xd5, 0xf5, 0x00, 0xc1, 0x4f, 0x44, 0xa7, 0xd6, 0xef, 0x4a, 0xc6, 0x25, 0x27,
- 0x1c, 0xe8, 0xd2, 0x96, 0x53, 0x0a, 0x5c, 0x91, 0xdd, 0xa2, 0xc2, 0x94, 0x84,
- 0xbf, 0x7d, 0xb2, 0x44, 0x9f, 0x9b, 0xd2, 0xc1, 0x8a, 0xc5, 0xbe, 0x72, 0x5c,
- 0xa7, 0xe7, 0x91, 0xe6, 0xd4, 0x9f, 0x73, 0x07, 0x85, 0x5b, 0x66, 0x48, 0xc7,
- 0x70, 0xfa, 0xb4, 0xee, 0x02, 0xc9, 0x3d, 0x9a, 0x4a, 0xda, 0x3d, 0xc1, 0x46,
- 0x3e, 0x19, 0x69, 0xd1, 0x17, 0x46, 0x07, 0xa3, 0x4d, 0x9f, 0x2b, 0x96, 0x17,
- 0x39, 0x6d, 0x30, 0x8d, 0x2a, 0xf3, 0x94, 0xd3, 0x75, 0xcf, 0xa0, 0x75, 0xe6,
- 0xf2, 0x92, 0x1f, 0x1a, 0x70, 0x05, 0xaa, 0x04, 0x83, 0x57, 0x30, 0xfb, 0xda,
- 0x76, 0x93, 0x38, 0x50, 0xe8, 0x27, 0xfd, 0x63, 0xee, 0x3c, 0xe5, 0xb7, 0xc8,
- 0x09, 0xae, 0x6f, 0x50, 0x35, 0x8e, 0x84, 0xce, 0x4a, 0x00, 0xe9, 0x12, 0x7e,
- 0x5a, 0x31, 0xd7, 0x33, 0xfc, 0x21, 0x13, 0x76, 0xcc, 0x16, 0x30, 0xdb, 0x0c,
- 0xfc, 0xc5, 0x62, 0xa7, 0x35, 0xb8, 0xef, 0xb7, 0xb0, 0xac, 0xc0, 0x36, 0xf6,
- 0xd9, 0xc9, 0x46, 0x48, 0xf9, 0x40, 0x90, 0x00, 0x2b, 0x1b, 0xaa, 0x6c, 0xe3,
- 0x1a, 0xc3, 0x0b, 0x03, 0x9e, 0x1b, 0xc2, 0x46, 0xe4, 0x48, 0x4e, 0x22, 0x73,
- 0x6f, 0xc3, 0x5f, 0xd4, 0x9a, 0xd6, 0x30, 0x07, 0x48, 0xd6, 0x8c, 0x90, 0xab,
- 0xd4, 0xf6, 0xf1, 0xe3, 0x48, 0xd3, 0x58, 0x4b, 0xa6, 0xb9, 0xcd, 0x29, 0xbf,
- 0x68, 0x1f, 0x08, 0x4b, 0x63, 0x86, 0x2f, 0x5c, 0x6b, 0xd6, 0xb6, 0x06, 0x65,
- 0xf7, 0xa6, 0xdc, 0x00, 0x67, 0x6b, 0xbb, 0xc3, 0xa9, 0x41, 0x83, 0xfb, 0xc7,
- 0xfa, 0xc8, 0xe2, 0x1e, 0x7e, 0xaf, 0x00, 0x3f, 0x93
- };
- /* dh2048 g */
- static const unsigned char dhg[] =
- {
- 0x02,
- };
- #endif /* !NO_WOLFSSL_SERVER */
- #endif /* !NO_DH */
- #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
- struct group_info {
- word16 group;
- const char *name;
- };
- static struct group_info groups[] = {
- { WOLFSSL_ECC_SECP160K1, "ECC_SECP160K1" },
- { WOLFSSL_ECC_SECP160R1, "ECC_SECP160R1" },
- { WOLFSSL_ECC_SECP160R2, "ECC_SECP160R2" },
- { WOLFSSL_ECC_SECP192K1, "ECC_SECP192K1" },
- { WOLFSSL_ECC_SECP192R1, "ECC_SECP192R1" },
- { WOLFSSL_ECC_SECP224K1, "ECC_SECP224K1" },
- { WOLFSSL_ECC_SECP224R1, "ECC_SECP224R1" },
- { WOLFSSL_ECC_SECP256K1, "ECC_SECP256K1" },
- { WOLFSSL_ECC_SECP256R1, "ECC_SECP256R1" },
- { WOLFSSL_ECC_SECP384R1, "ECC_SECP384R1" },
- { WOLFSSL_ECC_SECP521R1, "ECC_SECP521R1" },
- { WOLFSSL_ECC_BRAINPOOLP256R1, "ECC_BRAINPOOLP256R1" },
- { WOLFSSL_ECC_BRAINPOOLP384R1, "ECC_BRAINPOOLP384R1" },
- { WOLFSSL_ECC_BRAINPOOLP512R1, "ECC_BRAINPOOLP512R1" },
- { WOLFSSL_ECC_X25519, "ECC_X25519" },
- { WOLFSSL_ECC_X448, "ECC_X448" },
- { WOLFSSL_FFDHE_2048, "FFDHE_2048" },
- { WOLFSSL_FFDHE_3072, "FFDHE_3072" },
- { WOLFSSL_FFDHE_4096, "FFDHE_4096" },
- { WOLFSSL_FFDHE_6144, "FFDHE_6144" },
- { WOLFSSL_FFDHE_8192, "FFDHE_8192" },
- #ifdef HAVE_PQC
- { WOLFSSL_KYBER_LEVEL1, "KYBER_LEVEL1" },
- { WOLFSSL_KYBER_LEVEL3, "KYBER_LEVEL3" },
- { WOLFSSL_KYBER_LEVEL5, "KYBER_LEVEL5" },
- { WOLFSSL_P256_KYBER_LEVEL1, "P256_KYBER_LEVEL1" },
- { WOLFSSL_P384_KYBER_LEVEL3, "P384_KYBER_LEVEL3" },
- { WOLFSSL_P521_KYBER_LEVEL5, "P521_KYBER_LEVEL5" },
- #endif
- { 0, NULL }
- };
- #endif /* WOLFSSL_TLS13 && HAVE_SUPPORTED_CURVES */
- #ifndef SINGLE_THREADED
- typedef struct {
- unsigned char buf[MEM_BUFFER_SZ];
- int write_bytes;
- int write_idx;
- int read_bytes;
- int read_idx;
- COND_TYPE cond;
- int done;
- } memBuf_t;
- #endif
- typedef struct {
- double connTime;
- double rxTime;
- double txTime;
- int connCount;
- int rxTotal;
- int txTotal;
- } stats_t;
- typedef struct {
- int shutdown;
- int sockFd;
- int ret;
- } side_t;
- typedef struct {
- const char* cipher;
- word16 group;
- const char* host;
- word32 port;
- int packetSize; /* The data payload size in the packet */
- int maxSize;
- int runTimeSec;
- int showPeerInfo;
- int showVerbose;
- #ifndef NO_WOLFSSL_SERVER
- int listenFd;
- #endif
- #ifdef WOLFSSL_DTLS
- int doDTLS;
- struct sockaddr_in serverAddr;
- struct sockaddr_in clientAddr;
- #ifndef SINGLE_THREADED
- int serverReady;
- int clientOrserverOnly;
- wolfSSL_Mutex dtls_mutex;
- COND_TYPE dtls_cond;
- #endif
- #endif
- side_t client;
- side_t server;
- #ifndef SINGLE_THREADED
- int useLocalMem;
- /* client messages to server in memory */
- memBuf_t to_server;
- /* server messages to client in memory */
- memBuf_t to_client;
- /* Indicates that the server is ready for connection */
- int serverListening;
- #endif
- /* server */
- stats_t server_stats;
- /* client */
- stats_t client_stats;
- } info_t;
- /* Global vars for argument parsing */
- int myoptind = 0;
- char* myoptarg = NULL;
- #ifdef WOLFSSL_DTLS
- int DoneHandShake = 0;
- #endif
- #if defined(HAVE_FIPS) && defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION == 5)
- static int run_all_CAST(void)
- {
- int ret = 0;
- int cast_idx = 0;
- for (cast_idx = 0; cast_idx < FIPS_CAST_COUNT; cast_idx++) {
- if ((ret = wc_RunCast_fips(cast_idx)) != 0) {
- #ifdef NO_ERROR_STRINGS
- fprintf(stderr,
- "ERROR: FIPS CAST failed with return code: %d\n", ret);
- #else
- fprintf(stderr,
- "ERROR: FIPS CAST failed for algorithm: %s\n",
- wc_GetErrorString(ret));
- #endif
- return ret;
- }
- }
- return ret;
- }
- #endif /* HAVE_FIPS && HAVE_FIPS_VERSION == 5 */
- static double gettime_secs(int reset)
- {
- struct timeval tv;
- LIBCALL_CHECK_RET(gettimeofday(&tv, 0));
- (void)reset;
- return (double)tv.tv_sec + (double)tv.tv_usec / 1000000;
- }
- #ifndef SINGLE_THREADED
- /* server send callback */
- static int ServerMemSend(info_t* info, char* buf, int sz)
- {
- THREAD_CHECK_RET(wolfSSL_CondStart(&info->to_client.cond));
- #ifndef BENCH_USE_NONBLOCK
- /* check for overflow */
- if (info->to_client.write_idx + sz > MEM_BUFFER_SZ) {
- THREAD_CHECK_RET(wolfSSL_CondEnd(&info->to_client.cond));
- fprintf(stderr, "ServerMemSend overflow\n");
- return -1;
- }
- #else
- if (info->to_client.write_idx + sz > MEM_BUFFER_SZ) {
- sz = MEM_BUFFER_SZ - info->to_client.write_idx;
- }
- #endif
- XMEMCPY(&info->to_client.buf[info->to_client.write_idx], buf, (size_t)sz);
- info->to_client.write_idx += sz;
- info->to_client.write_bytes += sz;
- THREAD_CHECK_RET(wolfSSL_CondSignal(&info->to_client.cond));
- THREAD_CHECK_RET(wolfSSL_CondEnd(&info->to_client.cond));
- #ifdef BENCH_USE_NONBLOCK
- if (sz == 0) {
- return WOLFSSL_CBIO_ERR_WANT_WRITE;
- }
- #endif
- return sz;
- }
- /* server recv callback */
- static int ServerMemRecv(info_t* info, char* buf, int sz)
- {
- THREAD_CHECK_RET(wolfSSL_CondStart(&info->to_server.cond));
- #ifndef BENCH_USE_NONBLOCK
- while (info->to_server.write_idx - info->to_server.read_idx < sz &&
- !info->to_client.done) {
- THREAD_CHECK_RET(wolfSSL_CondWait(&info->to_server.cond));
- }
- #else
- if (info->to_server.write_idx - info->to_server.read_idx < sz) {
- sz = info->to_server.write_idx - info->to_server.read_idx;
- }
- #endif
- XMEMCPY(buf, &info->to_server.buf[info->to_server.read_idx], (size_t)sz);
- info->to_server.read_idx += sz;
- info->to_server.read_bytes += sz;
- /* if the rx has caught up with pending then reset buffer positions */
- if (info->to_server.read_bytes == info->to_server.write_bytes) {
- info->to_server.read_bytes = info->to_server.read_idx = 0;
- info->to_server.write_bytes = info->to_server.write_idx = 0;
- }
- THREAD_CHECK_RET(wolfSSL_CondEnd(&info->to_server.cond));
- if (info->to_client.done != 0) {
- return -1;
- }
- #ifdef BENCH_USE_NONBLOCK
- if (sz == 0) {
- return WOLFSSL_CBIO_ERR_WANT_READ;
- }
- #endif
- return sz;
- }
- /* client send callback */
- static int ClientMemSend(info_t* info, char* buf, int sz)
- {
- THREAD_CHECK_RET(wolfSSL_CondStart(&info->to_server.cond));
- #ifndef BENCH_USE_NONBLOCK
- /* check for overflow */
- if (info->to_server.write_idx + sz > MEM_BUFFER_SZ) {
- fprintf(stderr, "ClientMemSend overflow %d %d %d\n",
- info->to_server.write_idx, sz, MEM_BUFFER_SZ);
- THREAD_CHECK_RET(wolfSSL_CondEnd(&info->to_server.cond));
- return -1;
- }
- #else
- if (info->to_server.write_idx + sz > MEM_BUFFER_SZ) {
- sz = MEM_BUFFER_SZ - info->to_server.write_idx;
- }
- #endif
- XMEMCPY(&info->to_server.buf[info->to_server.write_idx], buf, (size_t)sz);
- info->to_server.write_idx += sz;
- info->to_server.write_bytes += sz;
- THREAD_CHECK_RET(wolfSSL_CondSignal(&info->to_server.cond));
- THREAD_CHECK_RET(wolfSSL_CondEnd(&info->to_server.cond));
- #ifdef BENCH_USE_NONBLOCK
- if (sz == 0) {
- return WOLFSSL_CBIO_ERR_WANT_WRITE;
- }
- #endif
- return sz;
- }
- /* client recv callback */
- static int ClientMemRecv(info_t* info, char* buf, int sz)
- {
- THREAD_CHECK_RET(wolfSSL_CondStart(&info->to_client.cond));
- #ifndef BENCH_USE_NONBLOCK
- while (info->to_client.write_idx - info->to_client.read_idx < sz &&
- !info->to_server.done) {
- THREAD_CHECK_RET(wolfSSL_CondWait(&info->to_client.cond));
- }
- #else
- if (info->to_client.write_idx - info->to_client.read_idx < sz) {
- sz = info->to_client.write_idx - info->to_client.read_idx;
- }
- #endif
- XMEMCPY(buf, &info->to_client.buf[info->to_client.read_idx], (size_t)sz);
- info->to_client.read_idx += sz;
- info->to_client.read_bytes += sz;
- /* if the rx has caught up with pending then reset buffer positions */
- if (info->to_client.read_bytes == info->to_client.write_bytes) {
- info->to_client.read_bytes = info->to_client.read_idx = 0;
- info->to_client.write_bytes = info->to_client.write_idx = 0;
- }
- THREAD_CHECK_RET(wolfSSL_CondEnd(&info->to_client.cond));
- if (info->to_server.done != 0) {
- return -1;
- }
- #ifdef BENCH_USE_NONBLOCK
- if (sz == 0) {
- return WOLFSSL_CBIO_ERR_WANT_READ;
- }
- #endif
- return sz;
- }
- #endif /* !SINGLE_THREADED */
- static int SocketRecv(int sockFd, char* buf, int sz)
- {
- int recvd = (int)recv(sockFd, buf, (size_t)sz, 0);
- if (recvd == -1) {
- switch (errno) {
- #if EAGAIN != SOCKET_EWOULDBLOCK
- case EAGAIN: /* EAGAIN == EWOULDBLOCK on some systems, but not others */
- #endif
- case SOCKET_EWOULDBLOCK:
- return WOLFSSL_CBIO_ERR_WANT_READ;
- case SOCKET_ECONNRESET:
- return WOLFSSL_CBIO_ERR_CONN_RST;
- case SOCKET_EINTR:
- return WOLFSSL_CBIO_ERR_ISR;
- case SOCKET_ECONNREFUSED: /* DTLS case */
- return WOLFSSL_CBIO_ERR_WANT_READ;
- case SOCKET_ECONNABORTED:
- return WOLFSSL_CBIO_ERR_CONN_CLOSE;
- default:
- return WOLFSSL_CBIO_ERR_GENERAL;
- }
- }
- else if (recvd == 0) {
- return WOLFSSL_CBIO_ERR_CONN_CLOSE;
- }
- return recvd;
- }
- static int SocketSend(int sockFd, char* buf, int sz)
- {
- int sent = (int)send(sockFd, buf, (size_t)sz, 0);
- if (sent == -1) {
- switch (errno) {
- #if EAGAIN != SOCKET_EWOULDBLOCK
- case EAGAIN: /* EAGAIN == EWOULDBLOCK on some systems, but not others */
- #endif
- case SOCKET_EWOULDBLOCK:
- return WOLFSSL_CBIO_ERR_WANT_READ;
- case SOCKET_ECONNRESET:
- return WOLFSSL_CBIO_ERR_CONN_RST;
- case SOCKET_EINTR:
- return WOLFSSL_CBIO_ERR_ISR;
- case SOCKET_EPIPE:
- return WOLFSSL_CBIO_ERR_CONN_CLOSE;
- default:
- return WOLFSSL_CBIO_ERR_GENERAL;
- }
- }
- else if (sent == 0) {
- return 0;
- }
- return sent;
- }
- #if defined(WOLFSSL_DTLS) && !defined(NO_WOLFSSL_SERVER)
- static int ReceiveFrom(WOLFSSL *ssl, int sd, char *buf, int sz)
- {
- int recvd;
- int dtls_timeout = wolfSSL_dtls_get_current_timeout(ssl);
- struct sockaddr peer;
- socklen_t peerSz = 0;
- if (DoneHandShake) {
- dtls_timeout = 0;
- }
- if (!wolfSSL_get_using_nonblock(ssl)) {
- struct timeval timeout;
- XMEMSET(&timeout, 0, sizeof(timeout));
- timeout.tv_sec = dtls_timeout;
- if (setsockopt(sd, SOL_SOCKET, SO_RCVTIMEO, (char*)&timeout,
- sizeof(timeout)) != 0) {
- fprintf(stderr, "setsockopt rcvtimeo failed\n");
- }
- }
- recvd = (int)recvfrom(sd, buf, (size_t)sz, 0, (SOCKADDR*)&peer, &peerSz);
- if (recvd < 0) {
- if (errno == SOCKET_EWOULDBLOCK || errno == SOCKET_EAGAIN) {
- if (wolfSSL_dtls_get_using_nonblock(ssl)) {
- return WOLFSSL_CBIO_ERR_WANT_READ;
- }
- else {
- return WOLFSSL_CBIO_ERR_TIMEOUT;
- }
- }
- else if (errno == SOCKET_ECONNRESET) {
- return WOLFSSL_CBIO_ERR_CONN_RST;
- }
- else if (errno == SOCKET_EINTR) {
- return WOLFSSL_CBIO_ERR_ISR;
- }
- else if (errno == SOCKET_ECONNREFUSED) {
- return WOLFSSL_CBIO_ERR_WANT_READ;
- }
- else {
- return WOLFSSL_CBIO_ERR_GENERAL;
- }
- }
- else {
- if (recvd == 0) {
- return WOLFSSL_CBIO_ERR_CONN_CLOSE;
- }
- }
- return recvd;
- }
- #endif /* WOLFSSL_DTLS && !NO_WOLFSSL_SERVER */
- #if defined(WOLFSSL_DTLS) && !defined(NO_WOLFSSL_CLIENT)
- static int SendTo(int sd, char *buf, int sz, const struct sockaddr *peer,
- socklen_t peerSz)
- {
- int sent;
- sent = (int)sendto(sd, buf, (size_t)sz, 0, peer, peerSz);
- if (sent < 0) {
- if (errno == SOCKET_EWOULDBLOCK || errno == SOCKET_EAGAIN) {
- return WOLFSSL_CBIO_ERR_WANT_WRITE;
- }
- else if (errno == SOCKET_ECONNRESET) {
- return WOLFSSL_CBIO_ERR_CONN_RST;
- }
- else if (errno == SOCKET_EINTR) {
- return WOLFSSL_CBIO_ERR_ISR;
- }
- else if (errno == SOCKET_EPIPE) {
- return WOLFSSL_CBIO_ERR_CONN_CLOSE;
- }
- else {
- return WOLFSSL_CBIO_ERR_GENERAL;
- }
- }
- return sent;
- }
- static int myDoneHsCb(WOLFSSL* ssl, void* user_ctx)
- {
- (void) ssl;
- (void) user_ctx;
- DoneHandShake = 1;
- return 1;
- }
- #endif /* WOLFSSL_DTLS && !NO_WOLFSSL_CLIENT */
- #ifndef NO_WOLFSSL_SERVER
- static int ServerSend(WOLFSSL* ssl, char* buf, int sz, void* ctx)
- {
- info_t* info = (info_t*)ctx;
- (void)ssl;
- #ifndef SINGLE_THREADED
- if (info->useLocalMem) {
- return ServerMemSend(info, buf, sz);
- }
- #endif
- #if defined(WOLFSSL_DTLS) && !defined(NO_WOLFSSL_CLIENT)
- if (info->doDTLS) {
- return SendTo(info->server.sockFd, buf, sz,
- (const struct sockaddr*)&info->clientAddr, sizeof(info->clientAddr));
- }
- else
- #endif
- {
- return SocketSend(info->server.sockFd, buf, sz);
- }
- }
- static int ServerRecv(WOLFSSL* ssl, char* buf, int sz, void* ctx)
- {
- info_t* info = (info_t*)ctx;
- (void)ssl;
- #ifndef SINGLE_THREADED
- if (info->useLocalMem) {
- return ServerMemRecv(info, buf, sz);
- }
- #endif
- #ifdef WOLFSSL_DTLS
- if (info->doDTLS) {
- return ReceiveFrom(ssl, info->server.sockFd, buf, sz);
- }
- else
- #endif
- {
- return SocketRecv(info->server.sockFd, buf, sz);
- }
- }
- #endif /* !NO_WOLFSSL_SERVER */
- #ifndef NO_WOLFSSL_CLIENT
- static int ClientSend(WOLFSSL* ssl, char* buf, int sz, void* ctx)
- {
- info_t* info = (info_t*)ctx;
- (void)ssl;
- #ifndef SINGLE_THREADED
- if (info->useLocalMem) {
- return ClientMemSend(info, buf, sz);
- }
- #endif
- #ifdef WOLFSSL_DTLS
- if (info->doDTLS) {
- return SendTo(info->client.sockFd, buf, sz,
- (const struct sockaddr*)&info->serverAddr, sizeof(info->serverAddr));
- }
- else
- #endif
- {
- return SocketSend(info->client.sockFd, buf, sz);
- }
- }
- static int ClientRecv(WOLFSSL* ssl, char* buf, int sz, void* ctx)
- {
- info_t* info = (info_t*)ctx;
- (void)ssl;
- #ifndef SINGLE_THREADED
- if (info->useLocalMem) {
- return ClientMemRecv(info, buf, sz);
- }
- #endif
- #if defined(WOLFSSL_DTLS) && !defined(NO_WOLFSSL_SERVER)
- if (info->doDTLS) {
- return ReceiveFrom(ssl, info->client.sockFd, buf, sz);
- }
- else
- #endif
- {
- return SocketRecv(info->client.sockFd, buf, sz);
- }
- }
- #endif /* !NO_WOLFSSL_CLIENT */
- static void CloseAndCleanupSocket(int* sockFd)
- {
- if (*sockFd != -1) {
- close(*sockFd);
- *sockFd = -1;
- }
- #ifdef WOLFSSL_DTLS
- DoneHandShake = 0;
- #endif
- }
- #ifdef BENCH_USE_NONBLOCK
- static int SetSocketNonBlocking(int sockFd)
- {
- int flags = fcntl(sockFd, F_GETFL, 0);
- if (flags < 0) {
- fprintf(stderr, "fcntl get failed\n");
- return -1;
- }
- flags = fcntl(sockFd, F_SETFL, flags | O_NONBLOCK);
- if (flags < 0) {
- fprintf(stderr, "fcntl set failed\n");
- return -1;
- }
- return 0;
- }
- #endif
- #ifndef NO_WOLFSSL_CLIENT
- static int SetupSocketAndConnect(info_t* info, const char* host,
- word32 port)
- {
- struct sockaddr_in servAddr;
- struct hostent* entry;
- /* Setup server address */
- XMEMSET(&servAddr, 0, sizeof(servAddr));
- servAddr.sin_family = AF_INET;
- servAddr.sin_port = htons((uint16_t)port);
- /* Resolve host */
- entry = gethostbyname(host);
- if (entry) {
- XMEMCPY(&servAddr.sin_addr.s_addr, entry->h_addr_list[0],
- (size_t)entry->h_length);
- }
- else {
- servAddr.sin_addr.s_addr = inet_addr(host);
- }
- #ifdef WOLFSSL_DTLS
- if (info->doDTLS) {
- /* Create the SOCK_DGRAM socket type is implemented on the User
- * Datagram Protocol/Internet Protocol(UDP/IP protocol).*/
- if ((info->client.sockFd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
- fprintf(stderr, "ERROR: failed to create the SOCK_DGRAM socket\n");
- return -1;
- }
- XMEMCPY(&info->serverAddr, &servAddr, sizeof(servAddr));
- }
- else
- #endif
- {
- /* Create a socket that uses an Internet IPv4 address,
- * Sets the socket to be stream based (TCP),
- * 0 means choose the default protocol. */
- if ((info->client.sockFd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
- fprintf(stderr, "ERROR: failed to create the socket\n");
- return -1;
- }
- /* Connect to the server */
- #ifndef SINGLE_THREADED
- while ((info->serverListening == 0) && (info->server.shutdown == 0)) {
- if (info->showVerbose) {
- fprintf(stderr, "Waiting for server to listen...\n");
- }
- XSLEEP_MS(1);
- }
- #endif
- if (info->server.shutdown == 1) {
- fprintf(stderr, "ERROR: server side has shutdown\n");
- return -1;
- }
- if (connect(info->client.sockFd, (struct sockaddr*)&servAddr,
- sizeof(servAddr)) == -1) {
- fprintf(stderr, "ERROR: failed to connect\n");
- return -1;
- }
- }
- #ifdef BENCH_USE_NONBLOCK
- if (SetSocketNonBlocking(info->client.sockFd) != 0) {
- return -1;
- }
- #endif
- if (info->showVerbose) {
- fprintf(stderr, "Connected to %s on port %d\n", host, port);
- }
- return 0;
- }
- static int bench_tls_client(info_t* info)
- {
- byte *writeBuf = NULL, *readBuf = NULL;
- double start, total = 0;
- int ret, readBufSz;
- WOLFSSL_CTX* cli_ctx = NULL;
- WOLFSSL* cli_ssl = NULL;
- int haveShownPeerInfo = 0;
- int tls13 = XSTRNCMP(info->cipher, "TLS13", 5) == 0;
- int total_sz;
- total = gettime_secs(0);
- /* set up client */
- #ifdef WOLFSSL_DTLS
- if (info->doDTLS) {
- if (tls13) {
- #ifdef WOLFSSL_DTLS13
- cli_ctx = wolfSSL_CTX_new(wolfDTLSv1_3_client_method());
- #endif
- }
- else {
- #ifndef WOLFSSL_NO_TLS12
- cli_ctx = wolfSSL_CTX_new(wolfDTLSv1_2_client_method());
- #endif
- }
- }
- else
- #endif
- {
- #ifdef WOLFSSL_TLS13
- if (tls13) {
- cli_ctx = wolfSSL_CTX_new(wolfTLSv1_3_client_method());
- }
- else
- #endif
- {
- #if !defined(WOLFSSL_TLS13)
- cli_ctx = wolfSSL_CTX_new(wolfSSLv23_client_method());
- #elif !defined(WOLFSSL_NO_TLS12)
- cli_ctx = wolfSSL_CTX_new(wolfTLSv1_2_client_method());
- #endif
- }
- }
- if (cli_ctx == NULL) {
- fprintf(stderr, "error creating ctx\n");
- ret = MEMORY_E; goto exit;
- }
- #ifndef NO_CERTS
- #ifdef HAVE_ECC
- if (XSTRSTR(info->cipher, "ECDSA")) {
- ret = wolfSSL_CTX_load_verify_buffer(cli_ctx, ca_ecc_cert_der_256,
- sizeof_ca_ecc_cert_der_256, WOLFSSL_FILETYPE_ASN1);
- }
- else
- #endif
- {
- ret = wolfSSL_CTX_load_verify_buffer(cli_ctx, ca_cert_der_2048,
- sizeof_ca_cert_der_2048, WOLFSSL_FILETYPE_ASN1);
- }
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "error loading CA\n");
- goto exit;
- }
- #endif
- wolfSSL_CTX_SetIOSend(cli_ctx, ClientSend);
- wolfSSL_CTX_SetIORecv(cli_ctx, ClientRecv);
- /* set cipher suite */
- ret = wolfSSL_CTX_set_cipher_list(cli_ctx, info->cipher);
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "error setting cipher suite\n");
- goto exit;
- }
- #ifndef NO_DH
- ret = wolfSSL_CTX_SetMinDhKey_Sz(cli_ctx, MIN_DHKEY_BITS);
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "Error setting minimum DH key size\n");
- goto exit;
- }
- #endif
- #ifndef NO_PSK
- wolfSSL_CTX_set_psk_client_callback(cli_ctx, my_psk_client_cb);
- #ifdef WOLFSSL_TLS13
- #if !defined(WOLFSSL_PSK_TLS13_CB) && !defined(WOLFSSL_PSK_ONE_ID)
- wolfSSL_CTX_set_psk_client_cs_callback(cli_ctx, my_psk_client_cs_cb);
- #else
- wolfSSL_CTX_set_psk_client_tls13_callback(cli_ctx, my_psk_client_tls13_cb);
- #endif
- #endif
- wolfSSL_CTX_set_psk_callback_ctx(cli_ctx, (void*)info->cipher);
- #endif /* !NO_PSK */
- /* Allocate and initialize a packet sized buffer */
- writeBuf = (unsigned char*)XMALLOC((size_t)info->packetSize, NULL,
- DYNAMIC_TYPE_TMP_BUFFER);
- if (writeBuf == NULL) {
- fprintf(stderr, "failed to allocate write memory\n");
- ret = MEMORY_E; goto exit;
- }
- /* Allocate read buffer */
- readBufSz = info->packetSize;
- readBuf = (unsigned char*)XMALLOC((size_t)readBufSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- if (readBuf == NULL) {
- fprintf(stderr, "failed to allocate read memory\n");
- ret = MEMORY_E; goto exit;
- }
- /* BENCHMARK CONNECTIONS LOOP */
- while (!info->client.shutdown) {
- int writeSz = info->packetSize;
- #ifdef BENCH_USE_NONBLOCK
- int err;
- #endif
- #ifndef SINGLE_THREADED
- if (!info->useLocalMem)
- #endif
- {
- /* Setup socket and connection */
- ret = SetupSocketAndConnect(info, info->host, info->port);
- if (ret != 0) goto exit;
- }
- cli_ssl = wolfSSL_new(cli_ctx);
- if (cli_ssl == NULL) {
- fprintf(stderr, "error creating client object\n");
- goto exit;
- }
- #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
- if (info->group != 0) {
- ret = wolfSSL_UseKeyShare(cli_ssl, info->group);
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "error setting client key share.\n");
- goto exit;
- }
- }
- #endif
- #ifdef WOLFSSL_DTLS
- if (info->doDTLS) {
- ret = wolfSSL_dtls_set_peer(cli_ssl, &info->serverAddr,
- sizeof(info->serverAddr));
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "error setting dtls peer\n");
- goto exit;
- }
- ret = wolfSSL_SetHsDoneCb(cli_ssl, myDoneHsCb, NULL);
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "error handshake done callback\n");
- goto exit;
- }
- }
- #endif
- wolfSSL_SetIOReadCtx(cli_ssl, info);
- wolfSSL_SetIOWriteCtx(cli_ssl, info);
- #if !defined(SINGLE_THREADED) && defined(WOLFSSL_DTLS)
- /* synchronize with server */
- if (info->doDTLS && !info->clientOrserverOnly) {
- THREAD_CHECK_RET(wolfSSL_CondStart(&info->dtls_cond));
- if (info->serverReady != 1) {
- THREAD_CHECK_RET(wolfSSL_CondWait(&info->dtls_cond));
- }
- /* for next loop */
- info->serverReady = 0;
- THREAD_CHECK_RET(wolfSSL_CondEnd(&info->dtls_cond));
- }
- #endif
- /* perform connect */
- start = gettime_secs(1);
- #ifndef BENCH_USE_NONBLOCK
- ret = wolfSSL_connect(cli_ssl);
- #else
- do
- {
- ret = wolfSSL_connect(cli_ssl);
- err = wolfSSL_get_error(cli_ssl, ret);
- }
- while (err == WOLFSSL_ERROR_WANT_READ || err == WOLFSSL_ERROR_WANT_WRITE);
- #endif
- start = gettime_secs(0) - start;
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "error connecting client\n");
- ret = wolfSSL_get_error(cli_ssl, ret);
- goto exit;
- }
- info->client_stats.connTime += start;
- info->client_stats.connCount++;
- if ((info->showPeerInfo) && (!haveShownPeerInfo)) {
- haveShownPeerInfo = 1;
- showPeer(cli_ssl);
- }
- /* check for run time completion and issue shutdown */
- if (gettime_secs(0) - total >= info->runTimeSec) {
- info->client.shutdown = 1;
- writeSz = (int)XSTRLEN(kShutdown) + 1;
- XMEMCPY(writeBuf, kShutdown, (size_t)writeSz); /* include null term */
- if (info->showVerbose) {
- fprintf(stderr, "Sending shutdown\n");
- }
- ret = wolfSSL_write(cli_ssl, writeBuf, writeSz);
- if (ret < 0) {
- fprintf(stderr, "error on client write\n");
- ret = wolfSSL_get_error(cli_ssl, ret);
- goto exit;
- }
- }
- else {
- XMEMSET(writeBuf, 0, (size_t)info->packetSize);
- XSTRNCPY((char*)writeBuf, kTestStr, (size_t)info->packetSize);
- }
- /* write / read echo loop */
- ret = 0;
- total_sz = 0;
- while (ret == 0 && total_sz < info->maxSize && !info->client.shutdown) {
- /* write test message to server */
- start = gettime_secs(1);
- #ifndef BENCH_USE_NONBLOCK
- ret = wolfSSL_write(cli_ssl, writeBuf, writeSz);
- #else
- do {
- ret = wolfSSL_write(cli_ssl, writeBuf, writeSz);
- err = wolfSSL_get_error(cli_ssl, ret);
- }
- while (err == WOLFSSL_ERROR_WANT_WRITE);
- #endif
- info->client_stats.txTime += gettime_secs(0) - start;
- if (ret < 0) {
- fprintf(stderr, "error on client write\n");
- ret = wolfSSL_get_error(cli_ssl, ret);
- goto exit;
- }
- info->client_stats.txTotal += ret;
- total_sz += ret;
- /* read echo of message from server */
- XMEMSET(readBuf, 0, (size_t)readBufSz);
- start = gettime_secs(1);
- #ifndef BENCH_USE_NONBLOCK
- ret = wolfSSL_read(cli_ssl, readBuf, readBufSz);
- #else
- do {
- ret = wolfSSL_read(cli_ssl, readBuf, readBufSz);
- err = wolfSSL_get_error(cli_ssl, ret);
- }
- while (err == WOLFSSL_ERROR_WANT_READ);
- #endif
- info->client_stats.rxTime += gettime_secs(0) - start;
- if (ret < 0) {
- fprintf(stderr, "error on client read\n");
- ret = wolfSSL_get_error(cli_ssl, ret);
- goto exit;
- }
- info->client_stats.rxTotal += ret;
- ret = 0; /* reset return code */
- /* validate echo */
- if (XMEMCMP((char*)writeBuf, (char*)readBuf, (size_t)writeSz) != 0) {
- fprintf(stderr, "echo check failed!\n");
- ret = wolfSSL_get_error(cli_ssl, ret);
- goto exit;
- }
- }
- CloseAndCleanupSocket(&info->client.sockFd);
- wolfSSL_free(cli_ssl);
- cli_ssl = NULL;
- }
- exit:
- if (ret != 0 && ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "Client Error: %d (%s)\n", ret,
- wolfSSL_ERR_reason_error_string((unsigned long)ret));
- }
- /* clean up */
- CloseAndCleanupSocket(&info->client.sockFd);
- if (cli_ssl != NULL) {
- wolfSSL_free(cli_ssl);
- }
- if (cli_ctx != NULL) {
- wolfSSL_CTX_free(cli_ctx);
- }
- XFREE(readBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- XFREE(writeBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- info->client.ret = ret;
- (void)tls13;
- return ret;
- }
- #if !defined(SINGLE_THREADED) && defined(WOLFSSL_THREAD_NO_JOIN)
- static THREAD_RETURN WOLFSSL_THREAD_NO_JOIN client_thread(void* args)
- {
- int ret;
- info_t* info = (info_t*)args;
- ret = bench_tls_client(info);
- THREAD_CHECK_RET(wolfSSL_CondStart(&info->to_server.cond));
- info->to_client.done = 1;
- info->client.ret = ret;
- THREAD_CHECK_RET(wolfSSL_CondSignal(&info->to_server.cond));
- THREAD_CHECK_RET(wolfSSL_CondEnd(&info->to_server.cond));
- WOLFSSL_RETURN_FROM_THREAD(0);
- }
- #endif /* !SINGLE_THREADED */
- #endif /* !NO_WOLFSSL_CLIENT */
- #ifndef NO_WOLFSSL_SERVER
- static int SetupSocketAndListen(int* listenFd, word32 port, int doDTLS)
- {
- struct sockaddr_in servAddr;
- #if defined(_MSC_VER) || defined(__MINGW32__)
- char optval = 1;
- #else
- int optval = 1;
- #endif
- #ifndef WOLFSSL_DTLS
- (void) doDTLS;
- #endif
- /* Setup server address */
- XMEMSET(&servAddr, 0, sizeof(servAddr));
- servAddr.sin_family = AF_INET;
- servAddr.sin_port = htons((uint16_t)port);
- servAddr.sin_addr.s_addr = INADDR_ANY;
- #ifdef WOLFSSL_DTLS
- if (doDTLS) {
- /* Create a socket that is implemented on the User Datagram Protocol/
- * Interet Protocol(UDP/IP protocol). */
- if((*listenFd = socket(AF_INET, SOCK_DGRAM, 0)) == -1) {
- fprintf(stderr, "ERROR: failed to create the socket\n");
- return -1;
- }
- }
- else
- #endif
- {
- /* Create a socket that uses an Internet IPv4 address,
- * Sets the socket to be stream based (TCP),
- * 0 means choose the default protocol. */
- if ((*listenFd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
- fprintf(stderr, "ERROR: failed to create the socket\n");
- return -1;
- }
- /* allow reuse */
- if (setsockopt(*listenFd, SOL_SOCKET, SO_REUSEADDR,
- &optval, sizeof(optval)) == -1) {
- fprintf(stderr, "setsockopt SO_REUSEADDR failed\n");
- return -1;
- }
- /* Listen for the client. */
- if (bind(*listenFd, (struct sockaddr*)&servAddr,
- sizeof(servAddr)) == -1) {
- fprintf(stderr, "ERROR: failed to bind\n");
- return -1;
- }
- }
- if (listen(*listenFd, 5) != 0) {
- fprintf(stderr, "ERROR: failed to listen\n");
- return -1;
- }
- #ifdef BENCH_USE_NONBLOCK
- if (SetSocketNonBlocking(*listenFd) != 0) {
- return -1;
- }
- #endif
- return 0;
- }
- static int SocketWaitClient(info_t* info)
- {
- int connd;
- struct sockaddr_in clientAddr;
- socklen_t size = sizeof(clientAddr);
- #ifdef WOLFSSL_DTLS
- if (info->doDTLS) {
- char msg[64];
- #ifndef SINGLE_THREADED
- if (!info->clientOrserverOnly) {
- THREAD_CHECK_RET(wolfSSL_CondStart(&info->dtls_cond));
- info->serverReady = 1;
- THREAD_CHECK_RET(wolfSSL_CondSignal(&info->dtls_cond));
- THREAD_CHECK_RET(wolfSSL_CondEnd(&info->dtls_cond));
- }
- #endif
- connd = (int)recvfrom(info->listenFd, (char *)msg, sizeof(msg),
- MSG_PEEK, (struct sockaddr*)&clientAddr, &size);
- if (connd < -1) {
- fprintf(stderr, "ERROR: failed to accept the connection\n");
- return -1;
- }
- XMEMCPY(&info->clientAddr, &clientAddr, sizeof(clientAddr));
- info->server.sockFd = info->listenFd;
- }
- else
- #endif
- {
- #ifndef SINGLE_THREADED
- info->serverListening = 1;
- #endif
- if ((connd = accept(info->listenFd, (struct sockaddr*)&clientAddr,
- &size)) == -1) {
- if (errno == SOCKET_EWOULDBLOCK) {
- return -2;
- }
- fprintf(stderr, "ERROR: failed to accept the connection\n");
- return -1;
- }
- info->server.sockFd = connd;
- }
- if (info->showVerbose) {
- fprintf(stderr, "Got client %d\n", connd);
- }
- return 0;
- }
- static void CloseAndCleanupListenSocket(int* listenFd)
- {
- if (*listenFd != -1) {
- close(*listenFd);
- *listenFd = -1;
- }
- }
- static int bench_tls_server(info_t* info)
- {
- byte *readBuf = NULL;
- double start;
- int ret, len = 0, readBufSz;
- WOLFSSL_CTX* srv_ctx = NULL;
- WOLFSSL* srv_ssl = NULL;
- int tls13 = XSTRNCMP(info->cipher, "TLS13", 5) == 0;
- int total_sz;
- /* set up server */
- #ifdef WOLFSSL_DTLS
- if (info->doDTLS) {
- if (tls13) {
- #ifdef WOLFSSL_DTLS13
- srv_ctx = wolfSSL_CTX_new(wolfDTLSv1_3_server_method());
- #endif
- }
- else {
- #ifndef WOLFSSL_NO_TLS12
- srv_ctx = wolfSSL_CTX_new(wolfDTLSv1_2_server_method());
- #endif
- }
- }
- else
- #endif
- {
- #ifdef WOLFSSL_TLS13
- if (tls13) {
- srv_ctx = wolfSSL_CTX_new(wolfTLSv1_3_server_method());
- }
- else
- #endif
- {
- #if !defined(WOLFSSL_TLS13)
- srv_ctx = wolfSSL_CTX_new(wolfSSLv23_server_method());
- #elif !defined(WOLFSSL_NO_TLS12)
- srv_ctx = wolfSSL_CTX_new(wolfTLSv1_2_server_method());
- #endif
- }
- }
- if (srv_ctx == NULL) {
- fprintf(stderr, "error creating server ctx\n");
- ret = MEMORY_E; goto exit;
- }
- #ifndef NO_CERTS
- #ifdef HAVE_ECC
- if (XSTRSTR(info->cipher, "ECDSA")) {
- ret = wolfSSL_CTX_use_PrivateKey_buffer(srv_ctx, ecc_key_der_256,
- sizeof_ecc_key_der_256, WOLFSSL_FILETYPE_ASN1);
- }
- else
- #endif
- {
- ret = wolfSSL_CTX_use_PrivateKey_buffer(srv_ctx, server_key_der_2048,
- sizeof_server_key_der_2048, WOLFSSL_FILETYPE_ASN1);
- }
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "error loading server key\n");
- goto exit;
- }
- #ifdef HAVE_ECC
- if (XSTRSTR(info->cipher, "ECDSA")) {
- ret = wolfSSL_CTX_use_certificate_buffer(srv_ctx, serv_ecc_der_256,
- sizeof_serv_ecc_der_256, WOLFSSL_FILETYPE_ASN1);
- }
- else
- #endif
- {
- ret = wolfSSL_CTX_use_certificate_buffer(srv_ctx, server_cert_der_2048,
- sizeof_server_cert_der_2048, WOLFSSL_FILETYPE_ASN1);
- }
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "error loading server cert\n");
- goto exit;
- }
- #endif /* !NO_CERTS */
- wolfSSL_CTX_SetIOSend(srv_ctx, ServerSend);
- wolfSSL_CTX_SetIORecv(srv_ctx, ServerRecv);
- /* set cipher suite */
- ret = wolfSSL_CTX_set_cipher_list(srv_ctx, info->cipher);
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "error setting cipher suite\n");
- goto exit;
- }
- #ifndef NO_DH
- ret = wolfSSL_CTX_SetMinDhKey_Sz(srv_ctx, MIN_DHKEY_BITS);
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "Error setting minimum DH key size\n");
- goto exit;
- }
- #endif
- #ifndef NO_PSK
- wolfSSL_CTX_set_psk_server_callback(srv_ctx, my_psk_server_cb);
- #ifdef WOLFSSL_TLS13
- wolfSSL_CTX_set_psk_server_tls13_callback(srv_ctx, my_psk_server_tls13_cb);
- #endif
- #endif /* !NO_PSK */
- /* Allocate read buffer */
- readBufSz = info->packetSize;
- readBuf = (unsigned char*)XMALLOC((size_t)readBufSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- if (readBuf == NULL) {
- fprintf(stderr, "failed to allocate read memory\n");
- ret = MEMORY_E; goto exit;
- }
- /* BENCHMARK CONNECTIONS LOOP */
- while (!info->server.shutdown) {
- #ifdef BENCH_USE_NONBLOCK
- int err;
- #endif
- #ifndef SINGLE_THREADED
- if (!info->useLocalMem)
- #endif
- {
- /* Accept client connections */
- ret = SocketWaitClient(info);
- #ifdef BENCH_USE_NONBLOCK
- if (ret == -2) {
- XSLEEP_MS(0);
- continue;
- }
- #endif
- if (ret != 0) {
- goto exit;
- }
- }
- srv_ssl = wolfSSL_new(srv_ctx);
- if (srv_ssl == NULL) {
- fprintf(stderr, "error creating server object\n");
- ret = MEMORY_E; goto exit;
- }
- #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
- if (info->group != 0) {
- ret = wolfSSL_UseKeyShare(srv_ssl, info->group);
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "error setting server key share.\n");
- goto exit;
- }
- }
- #endif
- #ifdef WOLFSSL_DTLS
- if (info->doDTLS) {
- ret = wolfSSL_dtls_set_peer(srv_ssl, &info->clientAddr,
- sizeof(info->clientAddr));
- if (ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "error setting dtls peer\n");
- goto exit;
- }
- }
- #endif
- wolfSSL_SetIOReadCtx(srv_ssl, info);
- wolfSSL_SetIOWriteCtx(srv_ssl, info);
- #ifndef NO_DH
- wolfSSL_SetTmpDH(srv_ssl, dhp, sizeof(dhp), dhg, sizeof(dhg));
- #endif
- /* accept TLS connection */
- start = gettime_secs(1);
- #ifndef BENCH_USE_NONBLOCK
- ret = wolfSSL_accept(srv_ssl);
- #else
- do {
- ret = wolfSSL_accept(srv_ssl);
- err = wolfSSL_get_error(srv_ssl, ret);
- }
- while (err == WOLFSSL_ERROR_WANT_READ || err == WOLFSSL_ERROR_WANT_WRITE);
- #endif
- start = gettime_secs(0) - start;
- if (ret != WOLFSSL_SUCCESS) {
- #ifndef SINGLE_THREADED
- if (info->to_client.done) {
- ret = 0; /* done - success */
- }
- else
- #endif
- {
- fprintf(stderr, "error on server accept\n");
- ret = wolfSSL_get_error(srv_ssl, ret);
- }
- goto exit;
- }
- info->server_stats.connTime += start;
- info->server_stats.connCount++;
- /* echo loop */
- ret = 0;
- total_sz = 0;
- while (ret == 0 && total_sz < info->maxSize) {
- double rxTime;
- /* read message from client */
- XMEMSET(readBuf, 0, (size_t)readBufSz);
- start = gettime_secs(1);
- #ifndef BENCH_USE_NONBLOCK
- ret = wolfSSL_read(srv_ssl, readBuf, readBufSz);
- #else
- do {
- ret = wolfSSL_read(srv_ssl, readBuf, readBufSz);
- err = wolfSSL_get_error(srv_ssl, ret);
- }
- while (err == WOLFSSL_ERROR_WANT_READ);
- #endif
- rxTime = gettime_secs(0) - start;
- /* shutdown signals, no more connections for this cipher */
- if (XSTRSTR((const char*)readBuf, kShutdown) != NULL) {
- info->server.shutdown = 1;
- if (info->showVerbose) {
- fprintf(stderr, "Server shutdown done\n");
- }
- ret = 0; /* success */
- break;
- }
- info->server_stats.rxTime += rxTime;
- if (ret < 0) {
- #ifndef SINGLE_THREADED
- if (info->to_client.done) {
- ret = 0; /* done - success */
- }
- else
- #endif
- {
- fprintf(stderr, "error on server read\n");
- ret = wolfSSL_get_error(srv_ssl, ret);
- }
- goto exit;
- }
- info->server_stats.rxTotal += ret;
- len = ret;
- total_sz += ret;
- /* write message back to client */
- start = gettime_secs(1);
- #ifndef BENCH_USE_NONBLOCK
- ret = wolfSSL_write(srv_ssl, readBuf, len);
- #else
- do {
- ret = wolfSSL_write(srv_ssl, readBuf, len);
- err = wolfSSL_get_error(srv_ssl, ret);
- }
- while (err == WOLFSSL_ERROR_WANT_WRITE);
- #endif
- info->server_stats.txTime += gettime_secs(0) - start;
- if (ret < 0) {
- fprintf(stderr, "error on server write\n");
- ret = wolfSSL_get_error(srv_ssl, ret);
- goto exit;
- }
- info->server_stats.txTotal += ret;
- ret = 0; /* reset return code */
- }
- CloseAndCleanupSocket(&info->server.sockFd);
- wolfSSL_free(srv_ssl);
- srv_ssl = NULL;
- #ifdef WOLFSSL_DTLS
- if (info->doDTLS) {
- SetupSocketAndListen(&info->listenFd, info->port, info->doDTLS);
- }
- #endif
- }
- exit:
- if (ret != 0 && ret != WOLFSSL_SUCCESS) {
- fprintf(stderr, "Server Error: %d (%s)\n", ret,
- wolfSSL_ERR_reason_error_string((unsigned long)ret));
- }
- /* clean up */
- CloseAndCleanupSocket(&info->server.sockFd);
- if (srv_ssl != NULL) {
- wolfSSL_free(srv_ssl);
- }
- if (srv_ctx != NULL) {
- wolfSSL_CTX_free(srv_ctx);
- }
- XFREE(readBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- info->server.ret = ret;
- (void)tls13;
- return ret;
- }
- #if !defined(SINGLE_THREADED) && defined(WOLFSSL_THREAD_NO_JOIN)
- static THREAD_RETURN WOLFSSL_THREAD_NO_JOIN server_thread(void* args)
- {
- int ret = 0;
- info_t* info = (info_t*)args;
- if (!info->useLocalMem) {
- /* Setup TLS server listener */
- #ifdef WOLFSSL_DTLS
- ret = SetupSocketAndListen(&info->listenFd, info->port, info->doDTLS);
- #else
- ret = SetupSocketAndListen(&info->listenFd, info->port, 0);
- #endif
- }
- if (ret == 0) {
- ret = bench_tls_server(info);
- if (!info->useLocalMem) {
- CloseAndCleanupListenSocket(&info->listenFd);
- }
- }
- THREAD_CHECK_RET(wolfSSL_CondStart(&info->to_client.cond));
- info->to_server.done = 1;
- info->server.ret = ret;
- THREAD_CHECK_RET(wolfSSL_CondSignal(&info->to_client.cond));
- THREAD_CHECK_RET(wolfSSL_CondEnd(&info->to_client.cond));
- WOLFSSL_RETURN_FROM_THREAD(0);
- }
- #endif /* !SINGLE_THREADED */
- #endif /* !NO_WOLFSSL_SERVER */
- static void print_stats(stats_t* wcStat, const char* desc, const char* cipher, const char *group, int verbose)
- {
- if (verbose) {
- fprintf(stderr,
- "wolfSSL %s Benchmark on %s with group %s:\n"
- "\tTotal : %9d bytes\n"
- "\tNum Conns : %9d\n"
- "\tRx Total : %9.3f ms\n"
- "\tTx Total : %9.3f ms\n"
- "\tRx : %9.3f MB/s\n"
- "\tTx : %9.3f MB/s\n"
- "\tConnect : %9.3f ms\n"
- "\tConnect Avg : %9.3f ms\n",
- desc,
- cipher,
- group,
- wcStat->txTotal + wcStat->rxTotal,
- wcStat->connCount,
- wcStat->rxTime * 1000,
- wcStat->txTime * 1000,
- wcStat->rxTotal / wcStat->rxTime / 1024 / 1024,
- wcStat->txTotal / wcStat->txTime / 1024 / 1024,
- wcStat->connTime * 1000,
- wcStat->connTime * 1000 / wcStat->connCount);
- }
- else {
- fprintf(stderr,
- "%-6s %-33s %-25s %11d %9d %9.3f %9.3f %9.3f "
- "%9.3f %17.3f %15.3f\n",
- desc,
- cipher,
- group,
- wcStat->txTotal + wcStat->rxTotal,
- wcStat->connCount,
- wcStat->rxTime * 1000,
- wcStat->txTime * 1000,
- wcStat->rxTotal / wcStat->rxTime / 1024 / 1024,
- wcStat->txTotal / wcStat->txTime / 1024 / 1024,
- wcStat->connTime * 1000,
- wcStat->connTime * 1000 / wcStat->connCount);
- }
- }
- static void Usage(void)
- {
- fprintf(stderr, "tls_bench " LIBWOLFSSL_VERSION_STRING
- " NOTE: All files relative to wolfSSL home dir\n");
- fprintf(stderr, "-? Help, print this usage\n");
- fprintf(stderr, "-c Run as client only, no threading and uses sockets\n");
- fprintf(stderr, "-s Run as server only, no threading and uses sockets\n");
- fprintf(stderr, "-h Host (default %s)\n", BENCH_DEFAULT_HOST);
- fprintf(stderr, "-P Port (default %d)\n", BENCH_DEFAULT_PORT);
- fprintf(stderr, "-e List Every cipher suite available\n");
- fprintf(stderr, "-i Show peer info\n");
- #ifdef WOLFSSL_TLS13
- fprintf(stderr, "-g Run through each of the TLS 1.3 groups that are available\n");
- #endif
- fprintf(stderr, "-l <str> Cipher suite list (: delimited)\n");
- fprintf(stderr, "-t <num> Time <num> (seconds) to run each test (default %d)\n", BENCH_RUNTIME_SEC);
- fprintf(stderr, "-p <num> The packet size <num> in bytes [1-16kB] (default %d)\n", TEST_PACKET_SIZE);
- #ifdef WOLFSSL_DTLS
- fprintf(stderr, " In the case of DTLS, [1-8kB] (default %d)\n", TEST_DTLS_PACKET_SIZE);
- #endif
- fprintf(stderr, "-S <num> The total size <num> in bytes (default %d)\n", TEST_MAX_SIZE);
- fprintf(stderr, "-v Show verbose output\n");
- #ifdef DEBUG_WOLFSSL
- fprintf(stderr, "-d Enable debug messages\n");
- #endif
- #ifndef SINGLE_THREADED
- fprintf(stderr, "-T <num> Number of threaded server/client pairs (default %d)\n", NUM_THREAD_PAIRS);
- fprintf(stderr, "-m Use local memory, not socket\n");
- #endif
- #ifdef WOLFSSL_DTLS
- fprintf(stderr, "-u Use DTLS\n");
- #endif
- }
- static void ShowCiphers(void)
- {
- char ciphers[WOLFSSL_CIPHER_LIST_MAX_SIZE];
- int ret = wolfSSL_get_ciphers(ciphers, (int)sizeof(ciphers));
- if (ret == WOLFSSL_SUCCESS) {
- fprintf(stderr, "%s\n", ciphers);
- }
- }
- #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
- static int SetupSupportedGroups(int verbose)
- {
- int i;
- WOLFSSL_CTX* ctx = NULL;
- WOLFSSL* ssl = NULL;
- int ret = 0;
- if (ret == 0) {
- #ifdef NO_WOLFSSL_CLIENT
- ctx = wolfSSL_CTX_new(wolfTLSv1_3_server_method());
- #else
- ctx = wolfSSL_CTX_new(wolfTLSv1_3_client_method());
- #endif
- if (ctx == NULL) {
- ret = -1;
- }
- }
- if (ret == 0) {
- ssl = wolfSSL_new(ctx);
- if (ssl == NULL) {
- ret = -1;
- }
- }
- /* Determine which groups are actually supported. */
- for (i = 0; groups[i].name != NULL; i++) {
- if (ret == 0) {
- int uks_ret = wolfSSL_UseKeyShare(ssl, groups[i].group);
- if (uks_ret == WOLFSSL_SUCCESS) {
- if (verbose) {
- printf("Will benchmark the following group: %s\n",
- groups[i].name);
- }
- } else if (uks_ret == BAD_FUNC_ARG || uks_ret == NOT_COMPILED_IN) {
- groups[i].group = 0;
- if (verbose) {
- printf("Will NOT benchmark the following group: %s\n",
- groups[i].name);
- }
- } else {
- ret = -1;
- }
- }
- }
- if (ssl != NULL) {
- wolfSSL_free(ssl);
- }
- if (ctx != NULL) {
- wolfSSL_CTX_free(ctx);
- }
- return ret;
- }
- #endif
- int bench_tls(void* args)
- {
- int ret = 0;
- info_t *theadInfo = NULL, *info;
- stats_t cli_comb, srv_comb;
- int i;
- char *cipher, *next_cipher, *ciphers = NULL;
- int argc = 0;
- char** argv = NULL;
- int ch;
- /* Vars configured by command line arguments */
- int argRuntimeSec = BENCH_RUNTIME_SEC;
- char *argCipherList = NULL;
- int argTestPacketSize = TEST_PACKET_SIZE;
- int argTestMaxSize = TEST_MAX_SIZE;
- int argThreadPairs = NUM_THREAD_PAIRS;
- int argShowVerbose = SHOW_VERBOSE;
- int argClientOnly = 0;
- int argServerOnly = 0;
- const char* argHost = BENCH_DEFAULT_HOST;
- word32 argPort = BENCH_DEFAULT_PORT;
- int argShowPeerInfo = 0;
- #ifndef SINGLE_THREADED
- int doShutdown;
- #endif
- #if !defined(NO_WOLFSSL_SERVER) || !defined(SINGLE_THREADED)
- int argLocalMem = 0;
- int listenFd = -1;
- #endif
- #if defined(WOLFSSL_DTLS) && !defined(NO_WOLFSSL_SERVER)
- int option_p = 0;
- #endif
- #ifdef WOLFSSL_DTLS
- int doDTLS = 0;
- #endif
- #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
- int group_index = 0;
- int argDoGroups = 0;
- #endif
- if (args != NULL) {
- argc = ((func_args*)args)->argc;
- argv = ((func_args*)args)->argv;
- ((func_args*)args)->return_code = -1; /* error state */
- }
- /* Initialize wolfSSL */
- wolfSSL_Init();
- #if defined(HAVE_FIPS) && defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION == 5)
- /*
- * When running benchmarks on FIPS builds, we need to run ALL CASTs up
- * front before spawning client/server threads, otherwise there is the
- * possibility that both threads try to run a CAST at the same time during
- * the handshake. In this scenario, the thread that doesn't win the race
- * will not be able to run the CAST, since it returns "busy", which is treated
- * as a failure. Running the CASTs up front is a simpler solution than
- * implementing an additional layer of synchronization.
- */
- if ((ret = run_all_CAST()) != 0)
- {
- fprintf(stderr, "CAST failed. Exiting benchmark\n");
- goto exit;
- }
- #endif /* HAVE_FIPS && HAVE_FIPS_VERSION == 5 */
- /* Parse command line arguments */
- while ((ch = mygetopt(argc, argv, "?" "udeil:p:t:vT:sch:P:mS:g")) != -1) {
- switch (ch) {
- case '?' :
- Usage();
- goto exit;
- case 's':
- argServerOnly = 1;
- break;
- case 'c':
- argClientOnly = 1;
- break;
- case 'h':
- argHost = myoptarg;
- break;
- case 'P':
- argPort = (word32)atoi(myoptarg);
- break;
- case 'd' :
- #ifdef DEBUG_WOLFSSL
- wolfSSL_Debugging_ON();
- #endif
- break;
- case 'e' :
- ShowCiphers();
- goto exit;
- case 'g' :
- #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
- argDoGroups = 1;
- break;
- #else
- fprintf(stderr, "There are only groups in TLS 1.3\n");
- Usage();
- ret = MY_EX_USAGE; goto exit;
- #endif
- case 'i' :
- argShowPeerInfo = 1;
- break;
- case 'l' :
- argCipherList = myoptarg;
- break;
- case 'p' :
- argTestPacketSize = atoi(myoptarg);
- if (argTestPacketSize > (16 * 1024)) {
- fprintf(stderr, "Invalid packet size %d\n", argTestPacketSize);
- Usage();
- ret = MY_EX_USAGE; goto exit;
- }
- #if defined(WOLFSSL_DTLS) && !defined(NO_WOLFSSL_SERVER)
- option_p = 1;
- #endif
- break;
- case 'S' :
- argTestMaxSize = atoi(myoptarg);
- break;
- case 't' :
- argRuntimeSec = atoi(myoptarg);
- break;
- case 'v' :
- argShowVerbose = 1;
- break;
- case 'T' :
- #ifndef SINGLE_THREADED
- argThreadPairs = atoi(myoptarg);
- #endif
- break;
- case 'm':
- #ifndef SINGLE_THREADED
- argLocalMem = 1;
- #endif
- break;
- case 'u':
- #ifdef WOLFSSL_DTLS
- doDTLS = 1;
- #ifdef BENCH_USE_NONBLOCK
- fprintf(stderr, "tls_bench hasn't yet supported DTLS "
- "non-blocking mode.\n");
- Usage();
- ret = MY_EX_USAGE; goto exit;
- #endif
- #endif
- break;
- default:
- Usage();
- ret = MY_EX_USAGE; goto exit;
- }
- }
- /* reset for test cases */
- myoptind = 0;
- if (argCipherList != NULL) {
- /* Use the list from CL argument */
- cipher = argCipherList;
- }
- else {
- /* Run for each cipher */
- ciphers = (char*)XMALLOC(WOLFSSL_CIPHER_LIST_MAX_SIZE, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- if (ciphers == NULL) {
- goto exit;
- }
- wolfSSL_get_ciphers(ciphers, WOLFSSL_CIPHER_LIST_MAX_SIZE);
- cipher = ciphers;
- }
- #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
- if (argDoGroups) {
- if (SetupSupportedGroups(argShowVerbose) != 0) {
- goto exit;
- }
- }
- #endif
- /* for server or client side only, only 1 thread is allowed */
- if (argServerOnly || argClientOnly) {
- argThreadPairs = 1;
- }
- #ifdef SINGLE_THREADED
- else {
- fprintf(stderr, "Threading is not enabled, so please use -s or -c to indicate side\n");
- Usage();
- ret = MY_EX_USAGE; goto exit;
- }
- #endif
- /* Allocate test info array */
- theadInfo = (info_t*)XMALLOC(sizeof(info_t) * (size_t)argThreadPairs, NULL,
- DYNAMIC_TYPE_TMP_BUFFER);
- if (theadInfo == NULL) {
- ret = MEMORY_E; goto exit;
- }
- XMEMSET(theadInfo, 0, sizeof(info_t) * (size_t)argThreadPairs);
- #ifndef NO_WOLFSSL_SERVER
- /* Use same listen socket to avoid timing issues between client and server */
- if (argServerOnly && !argLocalMem) {
- /* Setup TLS server listener */
- #ifdef WOLFSSL_DTLS
- ret = SetupSocketAndListen(&listenFd, argPort, doDTLS);
- #else
- ret = SetupSocketAndListen(&listenFd, argPort, 0);
- #endif
- if (ret != 0) {
- goto exit;
- }
- }
- #endif
- #if defined(WOLFSSL_DTLS) && !defined(NO_WOLFSSL_SERVER)
- if (doDTLS) {
- if (argLocalMem) {
- fprintf(stderr, "tls_bench hasn't yet supported DTLS with local memory.\n");
- ret = MY_EX_USAGE; goto exit;
- }
- if (option_p && argTestPacketSize > TEST_DTLS_PACKET_SIZE){
- fprintf(stderr, "Invalid packet size %d\n", argTestPacketSize);
- Usage();
- ret = MY_EX_USAGE; goto exit;
- } else {
- /* argTestPacketSize would be default for tcp packet */
- if (argTestPacketSize >= TEST_PACKET_SIZE)
- argTestPacketSize = TEST_DTLS_PACKET_SIZE;
- }
- }
- #endif
- fprintf(stderr, "Running TLS Benchmarks...\n");
- /* parse by : */
- while ((cipher != NULL) && (cipher[0] != '\0')) {
- #if ! (defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES))
- const char *gname = "N/A";
- #endif
- next_cipher = strchr(cipher, ':');
- if (next_cipher != NULL) {
- cipher[next_cipher - cipher] = '\0';
- }
- if (argShowVerbose) {
- fprintf(stderr, "Cipher: %s\n", cipher);
- }
- #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
- for (group_index = 0; groups[group_index].name != NULL; group_index++) {
- const char *gname = theadInfo[0].group == 0 ? "N/A"
- : groups[group_index].name;
- if (argDoGroups && groups[group_index].group == 0) {
- /* Skip unsupported group. */
- continue;
- }
- #endif
- for (i=0; i<argThreadPairs; i++) {
- info = &theadInfo[i];
- XMEMSET(info, 0, sizeof(info_t));
- info->host = argHost;
- info->port = argPort + (word32)i; /* threads must have separate ports */
- info->cipher = cipher;
- #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
- if (argDoGroups && XSTRNCMP(theadInfo[0].cipher, "TLS13", 5) == 0) {
- info->group = groups[group_index].group;
- }
- else
- #endif
- {
- info->group = 0;
- }
- info->packetSize = argTestPacketSize;
- info->runTimeSec = argRuntimeSec;
- info->maxSize = argTestMaxSize;
- info->showPeerInfo = argShowPeerInfo;
- info->showVerbose = argShowVerbose;
- #ifndef NO_WOLFSSL_SERVER
- info->listenFd = listenFd;
- #endif
- info->client.sockFd = -1;
- info->server.sockFd = -1;
- #ifdef WOLFSSL_DTLS
- info->doDTLS = doDTLS;
- #ifndef SINGLE_THREADED
- info->serverReady = 0;
- if (argServerOnly || argClientOnly) {
- info->clientOrserverOnly = 1;
- }
- #endif
- #endif
- if (argClientOnly) {
- #if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && !defined(SINGLE_THREADED)
- /* to avoid to wait server forever */
- info->serverListening = 1;
- #endif
- #ifndef NO_WOLFSSL_CLIENT
- ret = bench_tls_client(info);
- #endif
- }
- else if (argServerOnly) {
- #ifndef NO_WOLFSSL_SERVER
- ret = bench_tls_server(info);
- #endif
- }
- else {
- #if !defined(SINGLE_THREADED) && defined(WOLFSSL_THREAD_NO_JOIN)
- info->useLocalMem = argLocalMem;
- #ifdef WOLFSSL_DTLS
- THREAD_CHECK_RET(wc_InitMutex(&info->dtls_mutex));
- THREAD_CHECK_RET(wolfSSL_CondInit(&info->dtls_cond));
- #endif
- THREAD_CHECK_RET(wolfSSL_CondInit(&info->to_server.cond));
- THREAD_CHECK_RET(wolfSSL_CondInit(&info->to_client.cond));
- THREAD_CHECK_RET(
- wolfSSL_NewThreadNoJoin(server_thread, info));
- THREAD_CHECK_RET(
- wolfSSL_NewThreadNoJoin(client_thread, info));
- #endif
- }
- }
- #ifndef SINGLE_THREADED
- /* For threading, wait for completion */
- if (!argClientOnly && !argServerOnly) {
- /* Wait until threads are marked done */
- do {
- doShutdown = 1;
- for (i = 0; i < argThreadPairs; ++i) {
- info = &theadInfo[i];
- if (!info->to_client.done || !info->to_server.done) {
- doShutdown = 0;
- XSLEEP_MS(1000); /* Allow other threads to run */
- }
- }
- } while (!doShutdown);
- if (argShowVerbose) {
- fprintf(stderr, "Shutdown complete\n");
- }
- }
- #endif /* !SINGLE_THREADED */
- if (argShowVerbose) {
- /* print results */
- for (i = 0; i < argThreadPairs; ++i) {
- info = &theadInfo[i];
- fprintf(stderr, "\nThread %d\n", i);
- #ifndef NO_WOLFSSL_SERVER
- if (!argClientOnly) {
- print_stats(&info->server_stats, "Server", info->cipher,
- gname, 1);
- }
- #endif
- #ifndef NO_WOLFSSL_CLIENT
- if (!argServerOnly) {
- print_stats(&info->client_stats, "Client", info->cipher,
- gname, 1);
- }
- #endif
- }
- }
- /* print combined results for more than one thread */
- XMEMSET(&cli_comb, 0, sizeof(cli_comb));
- XMEMSET(&srv_comb, 0, sizeof(srv_comb));
- for (i = 0; i < argThreadPairs; ++i) {
- info = &theadInfo[i];
- cli_comb.connCount += info->client_stats.connCount;
- srv_comb.connCount += info->server_stats.connCount;
- cli_comb.connTime += info->client_stats.connTime;
- srv_comb.connTime += info->server_stats.connTime;
- cli_comb.rxTotal += info->client_stats.rxTotal;
- srv_comb.rxTotal += info->server_stats.rxTotal;
- cli_comb.rxTime += info->client_stats.rxTime;
- srv_comb.rxTime += info->server_stats.rxTime;
- cli_comb.txTotal += info->client_stats.txTotal;
- srv_comb.txTotal += info->server_stats.txTotal;
- cli_comb.txTime += info->client_stats.txTime;
- srv_comb.txTime += info->server_stats.txTime;
- }
- if (argShowVerbose) {
- fprintf(stderr, "Totals for %d Threads\n", argThreadPairs);
- }
- else {
- fprintf(stderr, "%-6s %-33s %-25s %11s %9s %9s %9s %9s %9s %17s %15s\n",
- "Side", "Cipher", "Group", "Total Bytes", "Num Conns", "Rx ms", "Tx ms",
- "Rx MB/s", "Tx MB/s", "Connect Total ms", "Connect Avg ms");
- #ifndef NO_WOLFSSL_SERVER
- if (!argClientOnly) {
- print_stats(&srv_comb, "Server", theadInfo[0].cipher, gname,
- 0);
- }
- #endif
- #ifndef NO_WOLFSSL_CLIENT
- if (!argServerOnly) {
- print_stats(&cli_comb, "Client", theadInfo[0].cipher, gname,
- 0);
- }
- #endif
- }
- #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
- if (!argDoGroups || theadInfo[0].group == 0) {
- /* We only needed to do this once because they don't want to
- * benchmarks groups or this isn't a TLS 1.3 cipher. */
- break;
- }
- }
- #endif
- /* target next cipher */
- cipher = (next_cipher != NULL) ? (next_cipher + 1) : NULL;
- } /* while */
- exit:
- #ifndef NO_WOLFSSL_SERVER
- if (argServerOnly && !argLocalMem) {
- /* Close server listener */
- CloseAndCleanupListenSocket(&listenFd);
- }
- #endif
- /* Cleanup the wolfSSL environment */
- wolfSSL_Cleanup();
- /* Free theadInfo array */
- XFREE(theadInfo, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- /* Free cipher list */
- XFREE(ciphers, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- /* Return reporting a success */
- if (args) {
- ((func_args*)args)->return_code = ret;
- }
- return ret;
- }
- #endif /* (!NO_WOLFSSL_CLIENT || !NO_WOLFSSL_SERVER) && !WOLFCRYPT_ONLY && USE_WOLFSSL_IO */
- #ifndef NO_MAIN_DRIVER
- int main(int argc, char** argv)
- {
- func_args args;
- args.argc = argc;
- args.argv = argv;
- args.return_code = 0;
- #if (!defined(NO_WOLFSSL_CLIENT) || !defined(NO_WOLFSSL_SERVER)) && \
- !defined(WOLFCRYPT_ONLY) && defined(USE_WOLFSSL_IO)
- bench_tls(&args);
- #endif
- return args.return_code;
- }
- #endif /* !NO_MAIN_DRIVER */
|