1*a5e7e684Sbluhm /* $OpenBSD: tcpbench.c,v 1.73 2024/12/30 21:19:29 bluhm Exp $ */ 267e76cbaSbluhm 3438193baSdjm /* 4438193baSdjm * Copyright (c) 2008 Damien Miller <djm@mindrot.org> 5654afd03Sclaudio * Copyright (c) 2011 Christiano F. Haesbaert <haesbaert@haesbaert.org> 6438193baSdjm * 7438193baSdjm * Permission to use, copy, modify, and distribute this software for any 8438193baSdjm * purpose with or without fee is hereby granted, provided that the above 9438193baSdjm * copyright notice and this permission notice appear in all copies. 10438193baSdjm * 11438193baSdjm * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 12438193baSdjm * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 13438193baSdjm * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 14438193baSdjm * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 15438193baSdjm * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 16438193baSdjm * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 17438193baSdjm * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 18438193baSdjm */ 19438193baSdjm 20438193baSdjm #include <sys/types.h> 21438193baSdjm #include <sys/time.h> 22438193baSdjm #include <sys/socket.h> 23438193baSdjm #include <sys/socketvar.h> 24296aab8eSclaudio #include <sys/resource.h> 25654afd03Sclaudio #include <sys/queue.h> 2633ed67eeSclaudio #include <sys/un.h> 27438193baSdjm 28438193baSdjm #include <net/route.h> 29438193baSdjm 30438193baSdjm #include <netinet/in.h> 31438193baSdjm #include <netinet/ip.h> 32438193baSdjm #include <netinet/tcp.h> 33438193baSdjm #include <netinet/tcp_timer.h> 34438193baSdjm #include <netinet/tcp_fsm.h> 35438193baSdjm #include <netinet/in_pcb.h> 36438193baSdjm #include <netinet/tcp_var.h> 37438193baSdjm 38438193baSdjm #include <arpa/inet.h> 39438193baSdjm 40438193baSdjm #include <unistd.h> 41438193baSdjm #include <limits.h> 42438193baSdjm #include <stdlib.h> 43438193baSdjm #include <stdio.h> 44438193baSdjm #include <string.h> 45438193baSdjm #include <errno.h> 46654afd03Sclaudio #include <event.h> 47438193baSdjm #include <netdb.h> 48438193baSdjm #include <signal.h> 49438193baSdjm #include <err.h> 50438193baSdjm #include <fcntl.h> 51438193baSdjm #include <poll.h> 52b2e783b6Sderaadt #include <paths.h> 536fb15185Sprocter #include <math.h> 5467fb5732Sjan #include <tls.h> 5567fb5732Sjan 5667fb5732Sjan #include <openssl/evp.h> 5767fb5732Sjan #include <openssl/rsa.h> 5867fb5732Sjan #include <openssl/pem.h> 5967fb5732Sjan #include <openssl/x509.h> 60438193baSdjm 61438193baSdjm #define DEFAULT_PORT "12345" 62438193baSdjm #define DEFAULT_STATS_INTERVAL 1000 /* ms */ 63654afd03Sclaudio #define DEFAULT_BUF (256 * 1024) 64654afd03Sclaudio #define DEFAULT_UDP_PKT (1500 - 28) /* TODO don't hardcode this */ 65654afd03Sclaudio #define TCP_MODE !ptb->uflag 66654afd03Sclaudio #define UDP_MODE ptb->uflag 67296aab8eSclaudio #define MAX_FD 1024 68438193baSdjm 69654afd03Sclaudio /* Our tcpbench globals */ 70654afd03Sclaudio struct { 716b0ee4efSbluhm int Dflag; /* Socket debug */ 727847109bSbluhm int Sflag; /* Socket buffer size */ 73654afd03Sclaudio u_int rflag; /* Report rate (ms) */ 74654afd03Sclaudio int sflag; /* True if server */ 7520e2e75bShaesbaert int Tflag; /* ToS if != -1 */ 76654afd03Sclaudio int vflag; /* Verbose */ 77654afd03Sclaudio int uflag; /* UDP mode */ 7833ed67eeSclaudio int Uflag; /* UNIX (AF_LOCAL) mode */ 7933ed67eeSclaudio int Rflag; /* randomize client write size */ 80654afd03Sclaudio char **kvars; /* Kvm enabled vars */ 81654afd03Sclaudio char *dummybuf; /* IO buffer */ 82654afd03Sclaudio size_t dummybuf_len; /* IO buffer len */ 8367fb5732Sjan struct tls_config *tls_cfg; 84654afd03Sclaudio } tcpbench, *ptb; 85438193baSdjm 86f9df48a7Shaesbaert struct tcpservsock { 87f9df48a7Shaesbaert struct event ev; 88f9df48a7Shaesbaert struct event evt; 89f9df48a7Shaesbaert int fd; 90f9df48a7Shaesbaert }; 91f9df48a7Shaesbaert 92654afd03Sclaudio /* stats for a single tcp connection, udp uses only one */ 93438193baSdjm struct statctx { 94654afd03Sclaudio TAILQ_ENTRY(statctx) entry; 95296aab8eSclaudio struct timeval t_start, t_last; 96438193baSdjm unsigned long long bytes; 97654afd03Sclaudio int fd; 98654afd03Sclaudio char *buf; 99654afd03Sclaudio size_t buflen; 100654afd03Sclaudio struct event ev; 101654afd03Sclaudio /* TCP only */ 102f9df48a7Shaesbaert struct tcpservsock *tcp_ts; 103654afd03Sclaudio /* UDP only */ 104654afd03Sclaudio u_long udp_slice_pkts; 10567fb5732Sjan /* TLS context */ 10667fb5732Sjan struct tls *tls; 107438193baSdjm }; 108438193baSdjm 10967fb5732Sjan char *tls_ciphers; 11067fb5732Sjan char *tls_protocols; 1116fb15185Sprocter struct statctx *udp_sc; /* singleton */ 1126fb15185Sprocter 113654afd03Sclaudio static void signal_handler(int, short, void *); 114654afd03Sclaudio static void saddr_ntop(const struct sockaddr *, socklen_t, char *, size_t); 115654afd03Sclaudio static void set_slice_timer(int); 116654afd03Sclaudio static void print_tcp_header(void); 117654afd03Sclaudio static void list_kvars(void); 118654afd03Sclaudio static void check_kvar(const char *); 119654afd03Sclaudio static char ** check_prepare_kvars(char *); 120654afd03Sclaudio static void stats_prepare(struct statctx *); 1216fb15185Sprocter static void summary_display(void); 122654afd03Sclaudio static void tcp_stats_display(unsigned long long, long double, float, 1239bbabc61Sclaudio struct statctx *, struct tcp_info *); 124654afd03Sclaudio static void tcp_process_slice(int, short, void *); 125654afd03Sclaudio static void tcp_server_handle_sc(int, short, void *); 126a556b9dbSbluhm static int timeout_tls(int, struct tls *, int (*)(struct tls *)); 127654afd03Sclaudio static void tcp_server_accept(int, short, void *); 1286fb15185Sprocter static void server_init(struct addrinfo *); 129654afd03Sclaudio static void client_handle_sc(int, short, void *); 1306fb15185Sprocter static void client_init(struct addrinfo *, int, struct addrinfo *); 131654afd03Sclaudio static int clock_gettime_tv(clockid_t, struct timeval *); 132654afd03Sclaudio static void udp_server_handle_sc(int, short, void *); 133654afd03Sclaudio static void udp_process_slice(int, short, void *); 13420e2e75bShaesbaert static int map_tos(char *, int *); 1356fb15185Sprocter static void quit(int, short, void *); 1366fb15185Sprocter static void wrapup(int); 137a556b9dbSbluhm static int process_tls_opt(char *); 1386fb15185Sprocter 139296aab8eSclaudio /* 140296aab8eSclaudio * We account the mainstats here, that is the stats 141296aab8eSclaudio * for all connections, all variables starting with slice 142296aab8eSclaudio * are used to account information for the timeslice 143296aab8eSclaudio * between each output. Peak variables record the highest 144296aab8eSclaudio * between all slices so far. 145296aab8eSclaudio */ 146296aab8eSclaudio static struct { 1476fb15185Sprocter struct timeval t_first; /* first connect / packet */ 1486fb15185Sprocter unsigned long long total_bytes; /* bytes since t_first */ 1496fb15185Sprocter unsigned long long n_slices; /* slices since start */ 1506fb15185Sprocter unsigned long long slice_bytes; /* bytes since slice reset */ 151296aab8eSclaudio long double peak_mbps; /* peak mbps so far */ 1526fb15185Sprocter long double floor_mbps; /* floor mbps so far */ 1536fb15185Sprocter long double mean_mbps; /* mean mbps so far */ 1546fb15185Sprocter long double nvariance_mbps; /* for online std dev */ 155296aab8eSclaudio int nconns; /* connected clients */ 156654afd03Sclaudio struct event timer; /* process timer */ 1576fb15185Sprocter const char *host; /* remote server for display */ 158296aab8eSclaudio } mainstats; 159296aab8eSclaudio 160654afd03Sclaudio /* When adding variables, also add to tcp_stats_display() */ 161438193baSdjm static const char *allowed_kvars[] = { 1629bbabc61Sclaudio "last_ack_recv", 1639bbabc61Sclaudio "last_ack_sent", 1649bbabc61Sclaudio "last_data_recv", 1659bbabc61Sclaudio "last_data_sent", 1669bbabc61Sclaudio "max_sndwnd", 1679bbabc61Sclaudio "options", 1689bbabc61Sclaudio "rcv_adv", 1699bbabc61Sclaudio "rcv_mss", 1709bbabc61Sclaudio "rcv_nxt", 1719bbabc61Sclaudio "rcv_ooopack", 1729bbabc61Sclaudio "rcv_space", 1739bbabc61Sclaudio "rcv_up", 1749bbabc61Sclaudio "rcv_wscale", 1759bbabc61Sclaudio "rfbuf_cnt", 1769bbabc61Sclaudio "rfbuf_ts", 1779bbabc61Sclaudio "rtt", 1789bbabc61Sclaudio "rttmin", 1799bbabc61Sclaudio "rttvar", 1809bbabc61Sclaudio "snd_cwnd", 1819bbabc61Sclaudio "snd_max", 1829bbabc61Sclaudio "snd_mss", 1839bbabc61Sclaudio "snd_nxt", 1849bbabc61Sclaudio "snd_rexmitpack", 1859bbabc61Sclaudio "snd_ssthresh", 1869bbabc61Sclaudio "snd_una", 1879bbabc61Sclaudio "snd_wl1", 1889bbabc61Sclaudio "snd_wl2", 1899bbabc61Sclaudio "snd_wnd", 1909bbabc61Sclaudio "snd_wscale", 1919bbabc61Sclaudio "snd_zerowin", 1929bbabc61Sclaudio "so_rcv_sb_cc", 1939bbabc61Sclaudio "so_rcv_sb_hiwat", 1949bbabc61Sclaudio "so_rcv_sb_lowat", 1959bbabc61Sclaudio "so_rcv_sb_wat", 1969bbabc61Sclaudio "so_snd_sb_cc", 1979bbabc61Sclaudio "so_snd_sb_hiwat", 1989bbabc61Sclaudio "so_snd_sb_lowat", 1999bbabc61Sclaudio "so_snd_sb_wat", 2009bbabc61Sclaudio "ts_recent", 2019bbabc61Sclaudio "ts_recent_age", 202438193baSdjm NULL 203438193baSdjm }; 204438193baSdjm 205654afd03Sclaudio TAILQ_HEAD(, statctx) sc_queue; 206438193baSdjm 207438193baSdjm static void __dead 208438193baSdjm usage(void) 209438193baSdjm { 210438193baSdjm fprintf(stderr, 2115a6aa24dSjmc "usage: tcpbench -l\n" 21267fb5732Sjan " tcpbench [-46cDRUuv] [-B buf] [-b sourceaddr] [-k kvars] [-n connections]\n" 213*a5e7e684Sbluhm " [-p port] [-r interval] [-S space] [-T keyword] [-t secs]\n" 214*a5e7e684Sbluhm " [-V rtable] hostname\n" 215*a5e7e684Sbluhm " tcpbench -s [-46cDUuv] [-B buf] [-C certfile -K keyfile] [-k kvars]\n" 216*a5e7e684Sbluhm " [-p port] [-r interval] [-S space] [-T keyword] [-V rtable]\n" 217*a5e7e684Sbluhm " [hostname]\n"); 218438193baSdjm exit(1); 219438193baSdjm } 220438193baSdjm 221438193baSdjm static void 222654afd03Sclaudio signal_handler(int sig, short event, void *bula) 223654afd03Sclaudio { 224654afd03Sclaudio /* 225654afd03Sclaudio * signal handler rules don't apply, libevent decouples for us 226654afd03Sclaudio */ 227654afd03Sclaudio switch (sig) { 2285ca842b4Ssthen case SIGINFO: 2295ca842b4Ssthen printf("\n"); 2305ca842b4Ssthen wrapup(-1); 2315ca842b4Ssthen break; 232654afd03Sclaudio case SIGINT: 2336fb15185Sprocter printf("\n"); 2346fb15185Sprocter wrapup(0); 2356fb15185Sprocter break; /* NOTREACHED */ 236654afd03Sclaudio case SIGTERM: 237654afd03Sclaudio case SIGHUP: 238654afd03Sclaudio warnx("Terminated by signal %d", sig); 2396fb15185Sprocter wrapup(0); 240654afd03Sclaudio break; /* NOTREACHED */ 241654afd03Sclaudio default: 242654afd03Sclaudio errx(1, "unexpected signal %d", sig); 243654afd03Sclaudio break; /* NOTREACHED */ 244654afd03Sclaudio } 245654afd03Sclaudio } 246654afd03Sclaudio 247654afd03Sclaudio static void 248438193baSdjm saddr_ntop(const struct sockaddr *addr, socklen_t alen, char *buf, size_t len) 249438193baSdjm { 250438193baSdjm char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; 251438193baSdjm int herr; 252438193baSdjm 25333ed67eeSclaudio if (addr->sa_family == AF_UNIX) { 25433ed67eeSclaudio struct sockaddr_un *sun = (struct sockaddr_un *)addr; 25533ed67eeSclaudio snprintf(buf, len, "%s", sun->sun_path); 25633ed67eeSclaudio return; 25733ed67eeSclaudio } 258ef1e8199Sdjm if ((herr = getnameinfo(addr, alen, hbuf, sizeof(hbuf), 259ef1e8199Sdjm pbuf, sizeof(pbuf), NI_NUMERICHOST|NI_NUMERICSERV)) != 0) { 260438193baSdjm if (herr == EAI_SYSTEM) 261438193baSdjm err(1, "getnameinfo"); 262438193baSdjm else 263438193baSdjm errx(1, "getnameinfo: %s", gai_strerror(herr)); 264438193baSdjm } 265438193baSdjm snprintf(buf, len, "[%s]:%s", hbuf, pbuf); 266438193baSdjm } 267438193baSdjm 268438193baSdjm static void 269654afd03Sclaudio set_slice_timer(int on) 270654afd03Sclaudio { 271654afd03Sclaudio struct timeval tv; 272654afd03Sclaudio 273654afd03Sclaudio if (ptb->rflag == 0) 274654afd03Sclaudio return; 275654afd03Sclaudio 276654afd03Sclaudio if (on) { 277654afd03Sclaudio if (evtimer_pending(&mainstats.timer, NULL)) 278654afd03Sclaudio return; 279654afd03Sclaudio /* XXX Is there a better way to do this ? */ 280654afd03Sclaudio tv.tv_sec = ptb->rflag / 1000; 281654afd03Sclaudio tv.tv_usec = (ptb->rflag % 1000) * 1000; 282654afd03Sclaudio 283654afd03Sclaudio evtimer_add(&mainstats.timer, &tv); 284654afd03Sclaudio } else if (evtimer_pending(&mainstats.timer, NULL)) 285654afd03Sclaudio evtimer_del(&mainstats.timer); 286654afd03Sclaudio } 287654afd03Sclaudio 288654afd03Sclaudio static int 289654afd03Sclaudio clock_gettime_tv(clockid_t clock_id, struct timeval *tv) 290654afd03Sclaudio { 291654afd03Sclaudio struct timespec ts; 292654afd03Sclaudio 293654afd03Sclaudio if (clock_gettime(clock_id, &ts) == -1) 294654afd03Sclaudio return (-1); 295654afd03Sclaudio 296654afd03Sclaudio TIMESPEC_TO_TIMEVAL(tv, &ts); 297654afd03Sclaudio 298654afd03Sclaudio return (0); 299654afd03Sclaudio } 300654afd03Sclaudio 301654afd03Sclaudio static void 302654afd03Sclaudio print_tcp_header(void) 303296aab8eSclaudio { 304296aab8eSclaudio char **kv; 305296aab8eSclaudio 30671134256Sbluhm if (ptb->rflag == 0) 30771134256Sbluhm return; 30871134256Sbluhm 309296aab8eSclaudio printf("%12s %14s %12s %8s ", "elapsed_ms", "bytes", "mbps", 310296aab8eSclaudio "bwidth"); 311654afd03Sclaudio for (kv = ptb->kvars; ptb->kvars != NULL && *kv != NULL; kv++) 312654afd03Sclaudio printf("%s%s", kv != ptb->kvars ? "," : "", *kv); 313296aab8eSclaudio printf("\n"); 314296aab8eSclaudio } 315296aab8eSclaudio 316296aab8eSclaudio static void 317438193baSdjm check_kvar(const char *var) 318438193baSdjm { 31934e9b7a0Sderaadt u_int i; 320438193baSdjm 321438193baSdjm for (i = 0; allowed_kvars[i] != NULL; i++) 322438193baSdjm if (strcmp(allowed_kvars[i], var) == 0) 323438193baSdjm return; 324438193baSdjm errx(1, "Unrecognised kvar: %s", var); 325438193baSdjm } 326438193baSdjm 327438193baSdjm static void 328438193baSdjm list_kvars(void) 329438193baSdjm { 33034e9b7a0Sderaadt u_int i; 331438193baSdjm 332a5d9417bShaesbaert printf("Supported kernel variables:\n"); 333438193baSdjm for (i = 0; allowed_kvars[i] != NULL; i++) 334a5d9417bShaesbaert printf("\t%s\n", allowed_kvars[i]); 335438193baSdjm } 336438193baSdjm 337438193baSdjm static char ** 338438193baSdjm check_prepare_kvars(char *list) 339438193baSdjm { 340438193baSdjm char *item, **ret = NULL; 34134e9b7a0Sderaadt u_int n = 0; 342438193baSdjm 343438193baSdjm while ((item = strsep(&list, ", \t\n")) != NULL) { 344438193baSdjm check_kvar(item); 3456abf19f2Slteo if ((ret = reallocarray(ret, (++n + 1), sizeof(*ret))) == NULL) 3460285356aSbenno err(1, "reallocarray(kvars)"); 347438193baSdjm if ((ret[n - 1] = strdup(item)) == NULL) 3480285356aSbenno err(1, "strdup"); 349438193baSdjm ret[n] = NULL; 350438193baSdjm } 351654afd03Sclaudio return (ret); 352438193baSdjm } 353438193baSdjm 354438193baSdjm static void 355654afd03Sclaudio stats_prepare(struct statctx *sc) 356438193baSdjm { 357654afd03Sclaudio sc->buf = ptb->dummybuf; 358654afd03Sclaudio sc->buflen = ptb->dummybuf_len; 359654afd03Sclaudio 360654afd03Sclaudio if (clock_gettime_tv(CLOCK_MONOTONIC, &sc->t_start) == -1) 361654afd03Sclaudio err(1, "clock_gettime_tv"); 362438193baSdjm sc->t_last = sc->t_start; 3636fb15185Sprocter if (!timerisset(&mainstats.t_first)) 3646fb15185Sprocter mainstats.t_first = sc->t_start; 3656fb15185Sprocter } 366654afd03Sclaudio 3676fb15185Sprocter static void 3686fb15185Sprocter summary_display(void) 3696fb15185Sprocter { 3706fb15185Sprocter struct timeval t_cur, t_diff; 3716fb15185Sprocter long double std_dev; 3726fb15185Sprocter unsigned long long total_elapsed; 3736fb15185Sprocter char *direction; 3746fb15185Sprocter 3756fb15185Sprocter if (!ptb->sflag) { 3766fb15185Sprocter direction = "sent"; 3776fb15185Sprocter printf("--- %s tcpbench statistics ---\n", mainstats.host); 3786fb15185Sprocter } else { 3796fb15185Sprocter direction = "received"; 3806fb15185Sprocter printf("--- tcpbench server statistics ---\n"); 3816fb15185Sprocter } 3826fb15185Sprocter 3836fb15185Sprocter std_dev = sqrtl(mainstats.nvariance_mbps / mainstats.n_slices); 3846fb15185Sprocter 3856fb15185Sprocter if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1) 3866fb15185Sprocter err(1, "clock_gettime_tv"); 3876fb15185Sprocter timersub(&t_cur, &mainstats.t_first, &t_diff); 3886fb15185Sprocter total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000; 3896fb15185Sprocter 3906fb15185Sprocter printf("%llu bytes %s over %.3Lf seconds\n", 3916fb15185Sprocter mainstats.total_bytes, direction, total_elapsed/1000.0L); 3926fb15185Sprocter printf("bandwidth min/avg/max/std-dev = %.3Lf/%.3Lf/%.3Lf/%.3Lf Mbps\n", 3936fb15185Sprocter mainstats.floor_mbps, mainstats.mean_mbps, mainstats.peak_mbps, 3946fb15185Sprocter std_dev); 395438193baSdjm } 396438193baSdjm 397438193baSdjm static void 398654afd03Sclaudio tcp_stats_display(unsigned long long total_elapsed, long double mbps, 3999bbabc61Sclaudio float bwperc, struct statctx *sc, struct tcp_info *tcpi) 400296aab8eSclaudio { 401296aab8eSclaudio int j; 402296aab8eSclaudio 403296aab8eSclaudio printf("%12llu %14llu %12.3Lf %7.2f%% ", total_elapsed, sc->bytes, 404296aab8eSclaudio mbps, bwperc); 405438193baSdjm 406654afd03Sclaudio if (ptb->kvars != NULL) { 407654afd03Sclaudio for (j = 0; ptb->kvars[j] != NULL; j++) { 408296aab8eSclaudio #define S(a) #a 409296aab8eSclaudio #define P(b, v, f) \ 4109bbabc61Sclaudio if (strcmp(ptb->kvars[j], S(v)) == 0) { \ 4119bbabc61Sclaudio printf("%s"f, j > 0 ? "," : "", b->tcpi_##v); \ 412438193baSdjm continue; \ 413438193baSdjm } 4149bbabc61Sclaudio P(tcpi, last_ack_recv, "%u") 4159bbabc61Sclaudio P(tcpi, last_ack_sent, "%u") 4169bbabc61Sclaudio P(tcpi, last_data_recv, "%u") 4179bbabc61Sclaudio P(tcpi, last_data_sent, "%u") 4189bbabc61Sclaudio P(tcpi, max_sndwnd, "%u") 4199bbabc61Sclaudio P(tcpi, options, "%hhu") 4209bbabc61Sclaudio P(tcpi, rcv_adv, "%u") 4219bbabc61Sclaudio P(tcpi, rcv_mss, "%u") 4229bbabc61Sclaudio P(tcpi, rcv_nxt, "%u") 4239bbabc61Sclaudio P(tcpi, rcv_ooopack, "%u") 4249bbabc61Sclaudio P(tcpi, rcv_space, "%u") 4259bbabc61Sclaudio P(tcpi, rcv_up, "%u") 4269bbabc61Sclaudio P(tcpi, rcv_wscale, "%hhu") 4279bbabc61Sclaudio P(tcpi, rfbuf_cnt, "%u") 4289bbabc61Sclaudio P(tcpi, rfbuf_ts, "%u") 4299bbabc61Sclaudio P(tcpi, rtt, "%u") 4309bbabc61Sclaudio P(tcpi, rttmin, "%u") 4319bbabc61Sclaudio P(tcpi, rttvar, "%u") 4329bbabc61Sclaudio P(tcpi, snd_cwnd, "%u") 4339bbabc61Sclaudio P(tcpi, snd_max, "%u") 4349bbabc61Sclaudio P(tcpi, snd_mss, "%u") 4359bbabc61Sclaudio P(tcpi, snd_nxt, "%u") 4369bbabc61Sclaudio P(tcpi, snd_rexmitpack, "%u") 4379bbabc61Sclaudio P(tcpi, snd_ssthresh, "%u") 4389bbabc61Sclaudio P(tcpi, snd_una, "%u") 4399bbabc61Sclaudio P(tcpi, snd_wl1, "%u") 4409bbabc61Sclaudio P(tcpi, snd_wl2, "%u") 4419bbabc61Sclaudio P(tcpi, snd_wnd, "%u") 4429bbabc61Sclaudio P(tcpi, snd_wscale, "%hhu") 4439bbabc61Sclaudio P(tcpi, snd_zerowin, "%u") 4449bbabc61Sclaudio P(tcpi, so_rcv_sb_cc, "%u") 4459bbabc61Sclaudio P(tcpi, so_rcv_sb_hiwat, "%u") 4469bbabc61Sclaudio P(tcpi, so_rcv_sb_lowat, "%u") 4479bbabc61Sclaudio P(tcpi, so_rcv_sb_wat, "%u") 4489bbabc61Sclaudio P(tcpi, so_snd_sb_cc, "%u") 4499bbabc61Sclaudio P(tcpi, so_snd_sb_hiwat, "%u") 4509bbabc61Sclaudio P(tcpi, so_snd_sb_lowat, "%u") 4519bbabc61Sclaudio P(tcpi, so_snd_sb_wat, "%u") 4529bbabc61Sclaudio P(tcpi, ts_recent, "%u") 4539bbabc61Sclaudio P(tcpi, ts_recent_age, "%u") 454296aab8eSclaudio #undef S 455438193baSdjm #undef P 456438193baSdjm } 457438193baSdjm } 458438193baSdjm printf("\n"); 459438193baSdjm } 460438193baSdjm 461438193baSdjm static void 462654afd03Sclaudio tcp_process_slice(int fd, short event, void *bula) 463438193baSdjm { 464296aab8eSclaudio unsigned long long total_elapsed, since_last; 4656fb15185Sprocter long double mbps, old_mean_mbps, slice_mbps = 0; 466296aab8eSclaudio float bwperc; 467654afd03Sclaudio struct statctx *sc; 468296aab8eSclaudio struct timeval t_cur, t_diff; 4699bbabc61Sclaudio struct tcp_info tcpi; 4709bbabc61Sclaudio socklen_t tcpilen; 471296aab8eSclaudio 4726fb15185Sprocter if (TAILQ_EMPTY(&sc_queue)) 4736fb15185Sprocter return; /* don't pollute stats */ 4746fb15185Sprocter 4756fb15185Sprocter mainstats.n_slices++; 4766fb15185Sprocter 477654afd03Sclaudio TAILQ_FOREACH(sc, &sc_queue, entry) { 478654afd03Sclaudio if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1) 479654afd03Sclaudio err(1, "clock_gettime_tv"); 4809bbabc61Sclaudio if (ptb->kvars != NULL) { /* process kernel stats */ 4819bbabc61Sclaudio tcpilen = sizeof(tcpi); 4829bbabc61Sclaudio if (getsockopt(sc->fd, IPPROTO_TCP, TCP_INFO, 4839bbabc61Sclaudio &tcpi, &tcpilen) == -1) 4849bbabc61Sclaudio err(1, "get tcp_info"); 4859bbabc61Sclaudio } 486654afd03Sclaudio 487296aab8eSclaudio timersub(&t_cur, &sc->t_start, &t_diff); 488296aab8eSclaudio total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000; 489296aab8eSclaudio timersub(&t_cur, &sc->t_last, &t_diff); 490296aab8eSclaudio since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000; 4919b3d3828Sstsp if (since_last == 0) 4929b3d3828Sstsp continue; 493296aab8eSclaudio bwperc = (sc->bytes * 100.0) / mainstats.slice_bytes; 494296aab8eSclaudio mbps = (sc->bytes * 8) / (since_last * 1000.0); 495296aab8eSclaudio slice_mbps += mbps; 496296aab8eSclaudio 4979bbabc61Sclaudio tcp_stats_display(total_elapsed, mbps, bwperc, sc, &tcpi); 498296aab8eSclaudio 499296aab8eSclaudio sc->t_last = t_cur; 500296aab8eSclaudio sc->bytes = 0; 501296aab8eSclaudio } 502296aab8eSclaudio 503296aab8eSclaudio /* process stats for this slice */ 504296aab8eSclaudio if (slice_mbps > mainstats.peak_mbps) 505296aab8eSclaudio mainstats.peak_mbps = slice_mbps; 5066fb15185Sprocter if (slice_mbps < mainstats.floor_mbps) 5076fb15185Sprocter mainstats.floor_mbps = slice_mbps; 5086fb15185Sprocter old_mean_mbps = mainstats.mean_mbps; 5096fb15185Sprocter mainstats.mean_mbps += (slice_mbps - mainstats.mean_mbps) / 5106fb15185Sprocter mainstats.n_slices; 5116fb15185Sprocter 5126fb15185Sprocter /* "Welford's method" for online variance 5136fb15185Sprocter * see Knuth, TAoCP Volume 2, 3rd edn., p232 */ 5146fb15185Sprocter mainstats.nvariance_mbps += (slice_mbps - old_mean_mbps) * 5156fb15185Sprocter (slice_mbps - mainstats.mean_mbps); 5166fb15185Sprocter 517654afd03Sclaudio printf("Conn: %3d Mbps: %12.3Lf Peak Mbps: %12.3Lf Avg Mbps: %12.3Lf\n", 518654afd03Sclaudio mainstats.nconns, slice_mbps, mainstats.peak_mbps, 5199321d4d4Shaesbaert mainstats.nconns ? slice_mbps / mainstats.nconns : 0); 520654afd03Sclaudio 5216fb15185Sprocter mainstats.slice_bytes = 0; 522654afd03Sclaudio set_slice_timer(mainstats.nconns > 0); 523296aab8eSclaudio } 524296aab8eSclaudio 525654afd03Sclaudio static void 5266fb15185Sprocter udp_process_slice(int fd, short event, void *bula) 527296aab8eSclaudio { 5283e667f11Shaesbaert unsigned long long total_elapsed, since_last, pps; 5296fb15185Sprocter long double old_mean_mbps, slice_mbps; 530654afd03Sclaudio struct timeval t_cur, t_diff; 531654afd03Sclaudio 5326fb15185Sprocter mainstats.n_slices++; 5336fb15185Sprocter 534654afd03Sclaudio if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1) 535654afd03Sclaudio err(1, "clock_gettime_tv"); 5366fb15185Sprocter 5376fb15185Sprocter timersub(&t_cur, &udp_sc->t_start, &t_diff); 538654afd03Sclaudio total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000; 5396fb15185Sprocter 5406fb15185Sprocter timersub(&t_cur, &udp_sc->t_last, &t_diff); 541654afd03Sclaudio since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000; 5429b3d3828Sstsp if (since_last == 0) 5439b3d3828Sstsp return; 5446fb15185Sprocter 5456fb15185Sprocter slice_mbps = (udp_sc->bytes * 8) / (since_last * 1000.0); 5466fb15185Sprocter pps = (udp_sc->udp_slice_pkts * 1000) / since_last; 5476fb15185Sprocter 548654afd03Sclaudio if (slice_mbps > mainstats.peak_mbps) 549654afd03Sclaudio mainstats.peak_mbps = slice_mbps; 5506fb15185Sprocter if (slice_mbps < mainstats.floor_mbps) 5516fb15185Sprocter mainstats.floor_mbps = slice_mbps; 5526fb15185Sprocter old_mean_mbps = mainstats.mean_mbps; 5536fb15185Sprocter mainstats.mean_mbps += (slice_mbps - mainstats.mean_mbps) / 5546fb15185Sprocter mainstats.n_slices; 5556fb15185Sprocter 5566fb15185Sprocter /* "Welford's method" for online variance 5576fb15185Sprocter * see Knuth, TAoCP Volume 2, 3rd edn., p232 */ 5586fb15185Sprocter mainstats.nvariance_mbps += (slice_mbps - old_mean_mbps) * 5596fb15185Sprocter (slice_mbps - mainstats.mean_mbps); 5606fb15185Sprocter 5613e667f11Shaesbaert printf("Elapsed: %11llu Mbps: %11.3Lf Peak Mbps: %11.3Lf %s PPS: %7llu\n", 562654afd03Sclaudio total_elapsed, slice_mbps, mainstats.peak_mbps, 563654afd03Sclaudio ptb->sflag ? "Rx" : "Tx", pps); 564654afd03Sclaudio 565654afd03Sclaudio /* Clean up this slice time */ 5666fb15185Sprocter udp_sc->t_last = t_cur; 5676fb15185Sprocter udp_sc->bytes = 0; 5686fb15185Sprocter udp_sc->udp_slice_pkts = 0; 5696fb15185Sprocter 5706fb15185Sprocter mainstats.slice_bytes = 0; 571654afd03Sclaudio set_slice_timer(1); 572654afd03Sclaudio } 573654afd03Sclaudio 574654afd03Sclaudio static void 5756fb15185Sprocter udp_server_handle_sc(int fd, short event, void *bula) 576654afd03Sclaudio { 5776fb15185Sprocter static int first_read = 1; 578654afd03Sclaudio ssize_t n; 579654afd03Sclaudio 580654afd03Sclaudio n = read(fd, ptb->dummybuf, ptb->dummybuf_len); 581654afd03Sclaudio if (n == 0) 582654afd03Sclaudio return; 583654afd03Sclaudio else if (n == -1) { 584730d2df4Shaesbaert if (errno != EINTR && errno != EWOULDBLOCK) 585654afd03Sclaudio warn("fd %d read error", fd); 586654afd03Sclaudio return; 587654afd03Sclaudio } 588654afd03Sclaudio 589654afd03Sclaudio if (ptb->vflag >= 3) 590654afd03Sclaudio fprintf(stderr, "read: %zd bytes\n", n); 5916fb15185Sprocter if (first_read) { 5926fb15185Sprocter first_read = 0; 5936fb15185Sprocter stats_prepare(udp_sc); 594654afd03Sclaudio set_slice_timer(1); 5956fb15185Sprocter } 596654afd03Sclaudio /* Account packet */ 5976fb15185Sprocter udp_sc->udp_slice_pkts++; 5986fb15185Sprocter udp_sc->bytes += n; 5996fb15185Sprocter mainstats.slice_bytes += n; 6006fb15185Sprocter mainstats.total_bytes += n; 601654afd03Sclaudio } 602654afd03Sclaudio 603654afd03Sclaudio static void 604654afd03Sclaudio tcp_server_handle_sc(int fd, short event, void *v_sc) 605654afd03Sclaudio { 606654afd03Sclaudio struct statctx *sc = v_sc; 607438193baSdjm ssize_t n; 608438193baSdjm 60967fb5732Sjan if (sc->tls) 61067fb5732Sjan n = tls_read(sc->tls, sc->buf, sc->buflen); 61167fb5732Sjan else 612654afd03Sclaudio n = read(sc->fd, sc->buf, sc->buflen); 613296aab8eSclaudio if (n == -1) { 61467fb5732Sjan if (sc->tls) 61567fb5732Sjan err(1, "tls_read: %s", tls_error(sc->tls)); 616730d2df4Shaesbaert if (errno != EINTR && errno != EWOULDBLOCK) 617654afd03Sclaudio warn("fd %d read error", sc->fd); 618654afd03Sclaudio return; 619654afd03Sclaudio } else if (n == 0) { 620654afd03Sclaudio if (ptb->vflag) 621654afd03Sclaudio fprintf(stderr, "%8d closed by remote end\n", sc->fd); 622f9df48a7Shaesbaert 623f9df48a7Shaesbaert TAILQ_REMOVE(&sc_queue, sc, entry); 624f9df48a7Shaesbaert 6257d5f8838Ssthen event_del(&sc->ev); 626654afd03Sclaudio close(sc->fd); 627f9df48a7Shaesbaert 628f9df48a7Shaesbaert /* Some file descriptors are available again. */ 629f9df48a7Shaesbaert if (evtimer_pending(&sc->tcp_ts->evt, NULL)) { 630f9df48a7Shaesbaert evtimer_del(&sc->tcp_ts->evt); 631f9df48a7Shaesbaert event_add(&sc->tcp_ts->ev, NULL); 632f9df48a7Shaesbaert } 633f9df48a7Shaesbaert 634654afd03Sclaudio free(sc); 635654afd03Sclaudio mainstats.nconns--; 636654afd03Sclaudio return; 637438193baSdjm } 638654afd03Sclaudio if (ptb->vflag >= 3) 639438193baSdjm fprintf(stderr, "read: %zd bytes\n", n); 640654afd03Sclaudio sc->bytes += n; 641654afd03Sclaudio mainstats.slice_bytes += n; 6426fb15185Sprocter mainstats.total_bytes += n; 643438193baSdjm } 644438193baSdjm 645a556b9dbSbluhm static int 64667fb5732Sjan timeout_tls(int s, struct tls *tls_ctx, int (*func)(struct tls *)) 64767fb5732Sjan { 64867fb5732Sjan struct pollfd pfd; 64967fb5732Sjan int ret; 65067fb5732Sjan 65167fb5732Sjan while ((ret = func(tls_ctx)) != 0) { 65267fb5732Sjan if (ret == TLS_WANT_POLLIN) 65367fb5732Sjan pfd.events = POLLIN; 65467fb5732Sjan else if (ret == TLS_WANT_POLLOUT) 65567fb5732Sjan pfd.events = POLLOUT; 65667fb5732Sjan else 65767fb5732Sjan break; 65867fb5732Sjan pfd.fd = s; 65967fb5732Sjan if ((ret = poll(&pfd, 1, -1)) == 1) 66067fb5732Sjan continue; 66167fb5732Sjan else if (ret == 0) { 66267fb5732Sjan errno = ETIMEDOUT; 66367fb5732Sjan ret = -1; 66467fb5732Sjan break; 66567fb5732Sjan } else 66667fb5732Sjan err(1, "poll failed"); 66767fb5732Sjan } 66867fb5732Sjan 66967fb5732Sjan return ret; 67067fb5732Sjan } 67167fb5732Sjan 672654afd03Sclaudio static void 673f9df48a7Shaesbaert tcp_server_accept(int fd, short event, void *arg) 674654afd03Sclaudio { 675f9df48a7Shaesbaert struct tcpservsock *ts = arg; 67619b0653eSchl int sock; 677654afd03Sclaudio struct statctx *sc; 678654afd03Sclaudio struct sockaddr_storage ss; 679654afd03Sclaudio socklen_t sslen; 680de1f7a69Sbluhm char tmp[NI_MAXHOST + 2 + NI_MAXSERV]; 68167fb5732Sjan static struct tls *tls = NULL; 68267fb5732Sjan 68367fb5732Sjan if (ptb->tls_cfg && tls == NULL) { 68467fb5732Sjan tls = tls_server(); 68567fb5732Sjan if (tls == NULL) 68667fb5732Sjan err(1, "Unable to create TLS context."); 68767fb5732Sjan if (tls_configure(tls, ptb->tls_cfg) == -1) 68867fb5732Sjan errx(1, "tls_configure: %s", tls_error(tls)); 68967fb5732Sjan } 690654afd03Sclaudio 691654afd03Sclaudio sslen = sizeof(ss); 692f9df48a7Shaesbaert 693f9df48a7Shaesbaert event_add(&ts->ev, NULL); 694f9df48a7Shaesbaert if (event & EV_TIMEOUT) 695f9df48a7Shaesbaert return; 6965f13b87eSguenther if ((sock = accept4(fd, (struct sockaddr *)&ss, &sslen, SOCK_NONBLOCK)) 6975f13b87eSguenther == -1) { 698f9df48a7Shaesbaert /* 699f9df48a7Shaesbaert * Pause accept if we are out of file descriptors, or 700f9df48a7Shaesbaert * libevent will haunt us here too. 701f9df48a7Shaesbaert */ 702f9df48a7Shaesbaert if (errno == ENFILE || errno == EMFILE) { 703f9df48a7Shaesbaert struct timeval evtpause = { 1, 0 }; 704f9df48a7Shaesbaert 705f9df48a7Shaesbaert event_del(&ts->ev); 706f9df48a7Shaesbaert evtimer_add(&ts->evt, &evtpause); 70762e3c252Sderaadt } else if (errno != EWOULDBLOCK && errno != EINTR && 70862e3c252Sderaadt errno != ECONNABORTED) 709654afd03Sclaudio warn("accept"); 710654afd03Sclaudio return; 711654afd03Sclaudio } 712654afd03Sclaudio saddr_ntop((struct sockaddr *)&ss, sslen, 713654afd03Sclaudio tmp, sizeof(tmp)); 71420e2e75bShaesbaert if (ptb->Tflag != -1 && ss.ss_family == AF_INET) { 71520e2e75bShaesbaert if (setsockopt(sock, IPPROTO_IP, IP_TOS, 71620e2e75bShaesbaert &ptb->Tflag, sizeof(ptb->Tflag))) 71720e2e75bShaesbaert err(1, "setsockopt IP_TOS"); 71820e2e75bShaesbaert } 71920e2e75bShaesbaert if (ptb->Tflag != -1 && ss.ss_family == AF_INET6) { 72020e2e75bShaesbaert if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS, 72120e2e75bShaesbaert &ptb->Tflag, sizeof(ptb->Tflag))) 72220e2e75bShaesbaert err(1, "setsockopt IPV6_TCLASS"); 72320e2e75bShaesbaert } 724654afd03Sclaudio /* Alloc client structure and register reading callback */ 725654afd03Sclaudio if ((sc = calloc(1, sizeof(*sc))) == NULL) 726654afd03Sclaudio err(1, "calloc"); 727f9df48a7Shaesbaert sc->tcp_ts = ts; 728654afd03Sclaudio sc->fd = sock; 729654afd03Sclaudio stats_prepare(sc); 73067fb5732Sjan if (tls && tls_accept_socket(tls, &sc->tls, sc->fd) == -1) 73167fb5732Sjan err(1, "tls_accept_socket: %s", tls_error(tls)); 7326fb15185Sprocter 733654afd03Sclaudio event_set(&sc->ev, sc->fd, EV_READ | EV_PERSIST, 734654afd03Sclaudio tcp_server_handle_sc, sc); 735654afd03Sclaudio event_add(&sc->ev, NULL); 736654afd03Sclaudio TAILQ_INSERT_TAIL(&sc_queue, sc, entry); 7376fb15185Sprocter 738654afd03Sclaudio mainstats.nconns++; 7399321d4d4Shaesbaert if (mainstats.nconns == 1) 7409321d4d4Shaesbaert set_slice_timer(1); 741654afd03Sclaudio if (ptb->vflag) 742146e9595Shaesbaert fprintf(stderr, "Accepted connection from %s, fd = %d\n", 743146e9595Shaesbaert tmp, sc->fd); 744654afd03Sclaudio } 745654afd03Sclaudio 746654afd03Sclaudio static void 7476fb15185Sprocter server_init(struct addrinfo *aitop) 748438193baSdjm { 749296aab8eSclaudio int sock, on = 1; 750438193baSdjm struct addrinfo *ai; 751654afd03Sclaudio struct event *ev; 752f9df48a7Shaesbaert struct tcpservsock *ts; 753296aab8eSclaudio nfds_t lnfds; 754438193baSdjm 755296aab8eSclaudio lnfds = 0; 756438193baSdjm for (ai = aitop; ai != NULL; ai = ai->ai_next) { 757de1f7a69Sbluhm char tmp[NI_MAXHOST + 2 + NI_MAXSERV]; 758de1f7a69Sbluhm 759438193baSdjm saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, sizeof(tmp)); 760654afd03Sclaudio if (ptb->vflag) 761654afd03Sclaudio fprintf(stderr, "Try to bind to %s\n", tmp); 762438193baSdjm if ((sock = socket(ai->ai_family, ai->ai_socktype, 763438193baSdjm ai->ai_protocol)) == -1) { 764438193baSdjm if (ai->ai_next == NULL) 765438193baSdjm err(1, "socket"); 766654afd03Sclaudio if (ptb->vflag) 767438193baSdjm warn("socket"); 768438193baSdjm continue; 769438193baSdjm } 7706b0ee4efSbluhm if (ptb->Dflag) { 7716b0ee4efSbluhm if (setsockopt(sock, SOL_SOCKET, SO_DEBUG, 7726b0ee4efSbluhm &ptb->Dflag, sizeof(ptb->Dflag))) 7736b0ee4efSbluhm err(1, "setsockopt SO_DEBUG"); 7746b0ee4efSbluhm } 77520e2e75bShaesbaert if (ptb->Tflag != -1 && ai->ai_family == AF_INET) { 77620e2e75bShaesbaert if (setsockopt(sock, IPPROTO_IP, IP_TOS, 77720e2e75bShaesbaert &ptb->Tflag, sizeof(ptb->Tflag))) 77820e2e75bShaesbaert err(1, "setsockopt IP_TOS"); 77920e2e75bShaesbaert } 78020e2e75bShaesbaert if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) { 78120e2e75bShaesbaert if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS, 78220e2e75bShaesbaert &ptb->Tflag, sizeof(ptb->Tflag))) 78320e2e75bShaesbaert err(1, "setsockopt IPV6_TCLASS"); 78420e2e75bShaesbaert } 785438193baSdjm if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, 786438193baSdjm &on, sizeof(on)) == -1) 787438193baSdjm warn("reuse port"); 788438193baSdjm if (bind(sock, ai->ai_addr, ai->ai_addrlen) != 0) { 789438193baSdjm if (ai->ai_next == NULL) 790438193baSdjm err(1, "bind"); 791654afd03Sclaudio if (ptb->vflag) 792438193baSdjm warn("bind"); 793438193baSdjm close(sock); 794438193baSdjm continue; 795438193baSdjm } 796654afd03Sclaudio if (ptb->Sflag) { 797438193baSdjm if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF, 798654afd03Sclaudio &ptb->Sflag, sizeof(ptb->Sflag)) == -1) 7997847109bSbluhm warn("set receive socket buffer size"); 800438193baSdjm } 801654afd03Sclaudio if (TCP_MODE) { 802438193baSdjm if (listen(sock, 64) == -1) { 803438193baSdjm if (ai->ai_next == NULL) 804438193baSdjm err(1, "listen"); 805654afd03Sclaudio if (ptb->vflag) 806438193baSdjm warn("listen"); 807438193baSdjm close(sock); 808438193baSdjm continue; 809438193baSdjm } 810654afd03Sclaudio } 811f9df48a7Shaesbaert if (UDP_MODE) { 812654afd03Sclaudio if ((ev = calloc(1, sizeof(*ev))) == NULL) 813654afd03Sclaudio err(1, "calloc"); 814654afd03Sclaudio event_set(ev, sock, EV_READ | EV_PERSIST, 8156fb15185Sprocter udp_server_handle_sc, NULL); 816654afd03Sclaudio event_add(ev, NULL); 817f9df48a7Shaesbaert } else { 818f9df48a7Shaesbaert if ((ts = calloc(1, sizeof(*ts))) == NULL) 819f9df48a7Shaesbaert err(1, "calloc"); 820f9df48a7Shaesbaert 821f9df48a7Shaesbaert ts->fd = sock; 822f9df48a7Shaesbaert evtimer_set(&ts->evt, tcp_server_accept, ts); 823f9df48a7Shaesbaert event_set(&ts->ev, ts->fd, EV_READ, 824f9df48a7Shaesbaert tcp_server_accept, ts); 825f9df48a7Shaesbaert event_add(&ts->ev, NULL); 826f9df48a7Shaesbaert } 827654afd03Sclaudio if (ptb->vflag >= 3) 828654afd03Sclaudio fprintf(stderr, "bound to fd %d\n", sock); 829296aab8eSclaudio lnfds++; 830438193baSdjm } 83133ed67eeSclaudio if (!ptb->Uflag) 832438193baSdjm freeaddrinfo(aitop); 833296aab8eSclaudio if (lnfds == 0) 834438193baSdjm errx(1, "No working listen addresses found"); 835296aab8eSclaudio } 836438193baSdjm 837296aab8eSclaudio static void 838654afd03Sclaudio client_handle_sc(int fd, short event, void *v_sc) 839296aab8eSclaudio { 840654afd03Sclaudio struct statctx *sc = v_sc; 841654afd03Sclaudio ssize_t n; 84233ed67eeSclaudio size_t blen = sc->buflen; 843296aab8eSclaudio 84433ed67eeSclaudio if (ptb->Rflag) 84533ed67eeSclaudio blen = arc4random_uniform(blen) + 1; 84667fb5732Sjan 84767fb5732Sjan if (sc->tls) 84867fb5732Sjan n = tls_write(sc->tls, sc->buf, blen); 84967fb5732Sjan else 85067fb5732Sjan n = write(sc->fd, sc->buf, blen); 85167fb5732Sjan if (n == -1) { 85267fb5732Sjan if (sc->tls) 85367fb5732Sjan warn("tls_write: %s", tls_error(sc->tls)); 854730d2df4Shaesbaert if (errno == EINTR || errno == EWOULDBLOCK || 855654afd03Sclaudio (UDP_MODE && errno == ENOBUFS)) 856730d2df4Shaesbaert return; 8576fb15185Sprocter warn("write"); 8586fb15185Sprocter wrapup(1); 859296aab8eSclaudio } 860654afd03Sclaudio if (TCP_MODE && n == 0) { 861146e9595Shaesbaert fprintf(stderr, "Remote end closed connection"); 8626fb15185Sprocter wrapup(1); 863438193baSdjm } 864654afd03Sclaudio if (ptb->vflag >= 3) 865146e9595Shaesbaert fprintf(stderr, "write: %zd bytes\n", n); 866654afd03Sclaudio sc->bytes += n; 867654afd03Sclaudio mainstats.slice_bytes += n; 8686fb15185Sprocter mainstats.total_bytes += n; 869654afd03Sclaudio if (UDP_MODE) 870654afd03Sclaudio sc->udp_slice_pkts++; 871654afd03Sclaudio } 872438193baSdjm 873654afd03Sclaudio static void 8746fb15185Sprocter client_init(struct addrinfo *aitop, int nconn, struct addrinfo *aib) 875438193baSdjm { 876654afd03Sclaudio struct statctx *sc; 8770895ecf3Sclaudio struct addrinfo *ai; 878ea0bc011Sclaudio int i, r, sock; 87998487596Shenning 88098487596Shenning for (i = 0; i < nconn; i++) { 881438193baSdjm for (sock = -1, ai = aitop; ai != NULL; ai = ai->ai_next) { 882de1f7a69Sbluhm char tmp[NI_MAXHOST + 2 + NI_MAXSERV]; 883de1f7a69Sbluhm 88498487596Shenning saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, 88598487596Shenning sizeof(tmp)); 886654afd03Sclaudio if (ptb->vflag && i == 0) 887438193baSdjm fprintf(stderr, "Trying %s\n", tmp); 888438193baSdjm if ((sock = socket(ai->ai_family, ai->ai_socktype, 889438193baSdjm ai->ai_protocol)) == -1) { 890438193baSdjm if (ai->ai_next == NULL) 891438193baSdjm err(1, "socket"); 892654afd03Sclaudio if (ptb->vflag) 893438193baSdjm warn("socket"); 894438193baSdjm continue; 895438193baSdjm } 8966b0ee4efSbluhm if (ptb->Dflag) { 8976b0ee4efSbluhm if (setsockopt(sock, SOL_SOCKET, SO_DEBUG, 8986b0ee4efSbluhm &ptb->Dflag, sizeof(ptb->Dflag))) 8996b0ee4efSbluhm err(1, "setsockopt SO_DEBUG"); 9006b0ee4efSbluhm } 901aba69134Shaesbaert if (aib != NULL) { 902aba69134Shaesbaert saddr_ntop(aib->ai_addr, aib->ai_addrlen, 903aba69134Shaesbaert tmp, sizeof(tmp)); 904aba69134Shaesbaert if (ptb->vflag) 905aba69134Shaesbaert fprintf(stderr, 906aba69134Shaesbaert "Try to bind to %s\n", tmp); 907aba69134Shaesbaert if (bind(sock, (struct sockaddr *)aib->ai_addr, 908aba69134Shaesbaert aib->ai_addrlen) == -1) 909aba69134Shaesbaert err(1, "bind"); 910aba69134Shaesbaert } 91120e2e75bShaesbaert if (ptb->Tflag != -1 && ai->ai_family == AF_INET) { 91220e2e75bShaesbaert if (setsockopt(sock, IPPROTO_IP, IP_TOS, 91320e2e75bShaesbaert &ptb->Tflag, sizeof(ptb->Tflag))) 91420e2e75bShaesbaert err(1, "setsockopt IP_TOS"); 91520e2e75bShaesbaert } 91620e2e75bShaesbaert if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) { 91720e2e75bShaesbaert if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS, 91820e2e75bShaesbaert &ptb->Tflag, sizeof(ptb->Tflag))) 91920e2e75bShaesbaert err(1, "setsockopt IPV6_TCLASS"); 92020e2e75bShaesbaert } 921654afd03Sclaudio if (ptb->Sflag) { 922438193baSdjm if (setsockopt(sock, SOL_SOCKET, SO_SNDBUF, 923654afd03Sclaudio &ptb->Sflag, sizeof(ptb->Sflag)) == -1) 9247847109bSbluhm warn("set send socket buffer size"); 925438193baSdjm } 926438193baSdjm if (connect(sock, ai->ai_addr, ai->ai_addrlen) != 0) { 927438193baSdjm if (ai->ai_next == NULL) 928438193baSdjm err(1, "connect"); 929654afd03Sclaudio if (ptb->vflag) 930438193baSdjm warn("connect"); 931438193baSdjm close(sock); 932438193baSdjm sock = -1; 933438193baSdjm continue; 934438193baSdjm } 935438193baSdjm break; 936438193baSdjm } 937438193baSdjm if (sock == -1) 938438193baSdjm errx(1, "No host found"); 939b62beb87Skrw if ((r = fcntl(sock, F_GETFL)) == -1) 940438193baSdjm err(1, "fcntl(F_GETFL)"); 941438193baSdjm r |= O_NONBLOCK; 942438193baSdjm if (fcntl(sock, F_SETFL, r) == -1) 943438193baSdjm err(1, "fcntl(F_SETFL, O_NONBLOCK)"); 944654afd03Sclaudio /* Alloc and prepare stats */ 945654afd03Sclaudio if (TCP_MODE) { 946654afd03Sclaudio if ((sc = calloc(1, sizeof(*sc))) == NULL) 947654afd03Sclaudio err(1, "calloc"); 9486fb15185Sprocter } else 9496fb15185Sprocter sc = udp_sc; 9506fb15185Sprocter 951654afd03Sclaudio sc->fd = sock; 95267fb5732Sjan 95367fb5732Sjan if (ptb->tls_cfg) { 95467fb5732Sjan sc->tls = tls_client(); 95567fb5732Sjan if (sc->tls == NULL) 95667fb5732Sjan err(1, "Unable to create TLS context."); 95767fb5732Sjan 95867fb5732Sjan if (tls_configure(sc->tls, ptb->tls_cfg) == -1) 95967fb5732Sjan errx(1, "tls_configure: %s", 96067fb5732Sjan tls_error(sc->tls)); 96167fb5732Sjan 96267fb5732Sjan if (tls_connect_socket(sc->tls, sc->fd, 96367fb5732Sjan mainstats.host) == -1) 96467fb5732Sjan errx(1, "tls_connect_socket: %s", 96567fb5732Sjan tls_error(sc->tls)); 96667fb5732Sjan if (timeout_tls(sc->fd, sc->tls, tls_handshake) == -1) { 96767fb5732Sjan const char *errstr; 96867fb5732Sjan 96967fb5732Sjan if ((errstr = tls_error(sc->tls)) == NULL) 97067fb5732Sjan errstr = strerror(errno); 97167fb5732Sjan errx(1, "tls handshake failed (%s)", errstr); 97267fb5732Sjan } 97367fb5732Sjan } 97467fb5732Sjan 975654afd03Sclaudio stats_prepare(sc); 9766fb15185Sprocter 977654afd03Sclaudio event_set(&sc->ev, sc->fd, EV_WRITE | EV_PERSIST, 978654afd03Sclaudio client_handle_sc, sc); 979654afd03Sclaudio event_add(&sc->ev, NULL); 980654afd03Sclaudio TAILQ_INSERT_TAIL(&sc_queue, sc, entry); 9816fb15185Sprocter 982654afd03Sclaudio mainstats.nconns++; 9839321d4d4Shaesbaert if (mainstats.nconns == 1) 9849321d4d4Shaesbaert set_slice_timer(1); 98598487596Shenning } 98633ed67eeSclaudio if (!ptb->Uflag) 9870895ecf3Sclaudio freeaddrinfo(aitop); 988000a3a19Shaesbaert if (aib != NULL) 989000a3a19Shaesbaert freeaddrinfo(aib); 99098487596Shenning 991654afd03Sclaudio if (ptb->vflag && nconn > 1) 992fd17a288Shaesbaert fprintf(stderr, "%d connections established\n", 993fd17a288Shaesbaert mainstats.nconns); 994ea0bc011Sclaudio } 995ea0bc011Sclaudio 99620e2e75bShaesbaert static int 99720e2e75bShaesbaert map_tos(char *s, int *val) 99820e2e75bShaesbaert { 99920e2e75bShaesbaert /* DiffServ Codepoints and other TOS mappings */ 100020e2e75bShaesbaert const struct toskeywords { 100120e2e75bShaesbaert const char *keyword; 100220e2e75bShaesbaert int val; 100320e2e75bShaesbaert } *t, toskeywords[] = { 100420e2e75bShaesbaert { "af11", IPTOS_DSCP_AF11 }, 100520e2e75bShaesbaert { "af12", IPTOS_DSCP_AF12 }, 100620e2e75bShaesbaert { "af13", IPTOS_DSCP_AF13 }, 100720e2e75bShaesbaert { "af21", IPTOS_DSCP_AF21 }, 100820e2e75bShaesbaert { "af22", IPTOS_DSCP_AF22 }, 100920e2e75bShaesbaert { "af23", IPTOS_DSCP_AF23 }, 101020e2e75bShaesbaert { "af31", IPTOS_DSCP_AF31 }, 101120e2e75bShaesbaert { "af32", IPTOS_DSCP_AF32 }, 101220e2e75bShaesbaert { "af33", IPTOS_DSCP_AF33 }, 101320e2e75bShaesbaert { "af41", IPTOS_DSCP_AF41 }, 101420e2e75bShaesbaert { "af42", IPTOS_DSCP_AF42 }, 101520e2e75bShaesbaert { "af43", IPTOS_DSCP_AF43 }, 101620e2e75bShaesbaert { "critical", IPTOS_PREC_CRITIC_ECP }, 101720e2e75bShaesbaert { "cs0", IPTOS_DSCP_CS0 }, 101820e2e75bShaesbaert { "cs1", IPTOS_DSCP_CS1 }, 101920e2e75bShaesbaert { "cs2", IPTOS_DSCP_CS2 }, 102020e2e75bShaesbaert { "cs3", IPTOS_DSCP_CS3 }, 102120e2e75bShaesbaert { "cs4", IPTOS_DSCP_CS4 }, 102220e2e75bShaesbaert { "cs5", IPTOS_DSCP_CS5 }, 102320e2e75bShaesbaert { "cs6", IPTOS_DSCP_CS6 }, 102420e2e75bShaesbaert { "cs7", IPTOS_DSCP_CS7 }, 102520e2e75bShaesbaert { "ef", IPTOS_DSCP_EF }, 102620e2e75bShaesbaert { "inetcontrol", IPTOS_PREC_INTERNETCONTROL }, 102720e2e75bShaesbaert { "lowdelay", IPTOS_LOWDELAY }, 102820e2e75bShaesbaert { "netcontrol", IPTOS_PREC_NETCONTROL }, 102920e2e75bShaesbaert { "reliability", IPTOS_RELIABILITY }, 103020e2e75bShaesbaert { "throughput", IPTOS_THROUGHPUT }, 103120e2e75bShaesbaert { NULL, -1 }, 103220e2e75bShaesbaert }; 103320e2e75bShaesbaert 103420e2e75bShaesbaert for (t = toskeywords; t->keyword != NULL; t++) { 103520e2e75bShaesbaert if (strcmp(s, t->keyword) == 0) { 103620e2e75bShaesbaert *val = t->val; 103720e2e75bShaesbaert return (1); 103820e2e75bShaesbaert } 103920e2e75bShaesbaert } 104020e2e75bShaesbaert 104120e2e75bShaesbaert return (0); 104220e2e75bShaesbaert } 104320e2e75bShaesbaert 1044eaf1d82aShenning static void 1045eaf1d82aShenning quit(int sig, short event, void *arg) 1046eaf1d82aShenning { 10476fb15185Sprocter wrapup(0); 10486fb15185Sprocter } 10496fb15185Sprocter 10506fb15185Sprocter static void 10516fb15185Sprocter wrapup(int err) 10526fb15185Sprocter { 10536fb15185Sprocter const int transfers = timerisset(&mainstats.t_first); 10546fb15185Sprocter const int stats = (mainstats.floor_mbps != INFINITY); 10556fb15185Sprocter 10566fb15185Sprocter if (transfers) { 10576fb15185Sprocter if (!stats) { 10586fb15185Sprocter if (UDP_MODE) 10596fb15185Sprocter udp_process_slice(0, 0, NULL); 10606fb15185Sprocter else 10616fb15185Sprocter tcp_process_slice(0, 0, NULL); 10626fb15185Sprocter } 10636fb15185Sprocter 10646fb15185Sprocter summary_display(); 10656fb15185Sprocter } 10666fb15185Sprocter 10675ca842b4Ssthen if (err != -1) 10686fb15185Sprocter exit(err); 1069eaf1d82aShenning } 1070eaf1d82aShenning 1071a556b9dbSbluhm static int 107267fb5732Sjan process_tls_opt(char *s) 107367fb5732Sjan { 107467fb5732Sjan size_t len; 107567fb5732Sjan char *v; 107667fb5732Sjan 107767fb5732Sjan const struct tlskeywords { 107867fb5732Sjan const char *keyword; 107967fb5732Sjan char **value; 108067fb5732Sjan } *t, tlskeywords[] = { 108167fb5732Sjan { "ciphers", &tls_ciphers }, 108267fb5732Sjan { "protocols", &tls_protocols }, 108367fb5732Sjan { NULL, NULL }, 108467fb5732Sjan }; 108567fb5732Sjan 108667fb5732Sjan len = strlen(s); 108767fb5732Sjan if ((v = strchr(s, '=')) != NULL) { 108867fb5732Sjan len = v - s; 108967fb5732Sjan v++; 109067fb5732Sjan } 109167fb5732Sjan 109267fb5732Sjan for (t = tlskeywords; t->keyword != NULL; t++) { 109367fb5732Sjan if (strlen(t->keyword) == len && 109467fb5732Sjan strncmp(s, t->keyword, len) == 0) { 109567fb5732Sjan if (v == NULL) 109667fb5732Sjan errx(1, "invalid tls value `%s'", s); 109767fb5732Sjan *t->value = v; 109867fb5732Sjan return 1; 109967fb5732Sjan } 110067fb5732Sjan } 110167fb5732Sjan return 0; 110267fb5732Sjan } 110367fb5732Sjan 110467fb5732Sjan int 1105438193baSdjm main(int argc, char **argv) 1106438193baSdjm { 1107eaf1d82aShenning struct timeval tv; 11083b94b2cfShaesbaert unsigned int secs, rtable; 1109a4dd491bStobhe char *tmp; 1110aba69134Shaesbaert struct addrinfo *aitop, *aib, hints; 1111296aab8eSclaudio const char *errstr; 1112296aab8eSclaudio struct rlimit rl; 111367fb5732Sjan int ch, herr, nconn, usetls = 0; 11149f39e938Sdlg int family = PF_UNSPEC; 1115aba69134Shaesbaert const char *host = NULL, *port = DEFAULT_PORT, *srcbind = NULL; 11165ca842b4Ssthen struct event ev_sigint, ev_sigterm, ev_sighup, ev_siginfo, ev_progtimer; 111733ed67eeSclaudio struct sockaddr_un sock_un; 111867fb5732Sjan char *crtfile = NULL, *keyfile = NULL; 111967fb5732Sjan uint8_t *crt = NULL, *key = NULL; 112067fb5732Sjan size_t key_size, crt_size; 1121438193baSdjm 1122654afd03Sclaudio /* Init world */ 1123b9a887b6Smillert setvbuf(stdout, NULL, _IOLBF, 0); 1124654afd03Sclaudio ptb = &tcpbench; 1125654afd03Sclaudio ptb->dummybuf_len = 0; 11266b0ee4efSbluhm ptb->Dflag = 0; 112733ed67eeSclaudio ptb->Sflag = ptb->sflag = ptb->vflag = ptb->Rflag = ptb->Uflag = 0; 1128654afd03Sclaudio ptb->kvars = NULL; 1129654afd03Sclaudio ptb->rflag = DEFAULT_STATS_INTERVAL; 113020e2e75bShaesbaert ptb->Tflag = -1; 113167fb5732Sjan ptb->tls_cfg = NULL; 1132654afd03Sclaudio nconn = 1; 1133aba69134Shaesbaert aib = NULL; 1134eaf1d82aShenning secs = 0; 1135296aab8eSclaudio 113667fb5732Sjan while ((ch = getopt(argc, argv, "46b:B:cC:Dhlk:K:n:p:Rr:sS:t:T:uUvV:")) 11376b0ee4efSbluhm != -1) { 1138438193baSdjm switch (ch) { 11399f39e938Sdlg case '4': 11409f39e938Sdlg family = PF_INET; 11419f39e938Sdlg break; 11429f39e938Sdlg case '6': 11439f39e938Sdlg family = PF_INET6; 11449f39e938Sdlg break; 1145aba69134Shaesbaert case 'b': 1146aba69134Shaesbaert srcbind = optarg; 1147aba69134Shaesbaert break; 114867fb5732Sjan case 'c': 114967fb5732Sjan usetls = 1; 115067fb5732Sjan break; 115167fb5732Sjan case 'C': 115267fb5732Sjan crtfile = optarg; 115367fb5732Sjan break; 11546b0ee4efSbluhm case 'D': 11556b0ee4efSbluhm ptb->Dflag = 1; 11566b0ee4efSbluhm break; 1157438193baSdjm case 'l': 1158438193baSdjm list_kvars(); 1159438193baSdjm exit(0); 1160438193baSdjm case 'k': 1161438193baSdjm if ((tmp = strdup(optarg)) == NULL) 116223ac3066Sbenno err(1, "strdup"); 1163654afd03Sclaudio ptb->kvars = check_prepare_kvars(tmp); 1164438193baSdjm free(tmp); 1165438193baSdjm break; 116667fb5732Sjan case 'K': 116767fb5732Sjan keyfile = optarg; 116867fb5732Sjan break; 116933ed67eeSclaudio case 'R': 117033ed67eeSclaudio ptb->Rflag = 1; 117133ed67eeSclaudio break; 1172438193baSdjm case 'r': 1173654afd03Sclaudio ptb->rflag = strtonum(optarg, 0, 60 * 60 * 24 * 1000, 1174438193baSdjm &errstr); 1175438193baSdjm if (errstr != NULL) 1176438193baSdjm errx(1, "statistics interval is %s: %s", 1177438193baSdjm errstr, optarg); 1178438193baSdjm break; 1179438193baSdjm case 'p': 1180438193baSdjm port = optarg; 1181438193baSdjm break; 1182438193baSdjm case 's': 1183654afd03Sclaudio ptb->sflag = 1; 1184438193baSdjm break; 1185438193baSdjm case 'S': 1186654afd03Sclaudio ptb->Sflag = strtonum(optarg, 0, 1024*1024*1024, 1187438193baSdjm &errstr); 1188438193baSdjm if (errstr != NULL) 11897847109bSbluhm errx(1, "socket buffer size is %s: %s", 1190438193baSdjm errstr, optarg); 1191438193baSdjm break; 1192438193baSdjm case 'B': 1193654afd03Sclaudio ptb->dummybuf_len = strtonum(optarg, 0, 1024*1024*1024, 1194438193baSdjm &errstr); 1195438193baSdjm if (errstr != NULL) 1196438193baSdjm errx(1, "read/write buffer size is %s: %s", 1197438193baSdjm errstr, optarg); 1198438193baSdjm break; 1199438193baSdjm case 'v': 1200654afd03Sclaudio ptb->vflag++; 1201438193baSdjm break; 12021cbc9dd8Sclaudio case 'V': 12033b94b2cfShaesbaert rtable = (unsigned int)strtonum(optarg, 0, 12041cbc9dd8Sclaudio RT_TABLEID_MAX, &errstr); 12051cbc9dd8Sclaudio if (errstr) 12068bb39f08Sguenther errx(1, "rtable value is %s: %s", 12071cbc9dd8Sclaudio errstr, optarg); 12083b94b2cfShaesbaert if (setrtable(rtable) == -1) 12093b94b2cfShaesbaert err(1, "setrtable"); 12101cbc9dd8Sclaudio break; 121198487596Shenning case 'n': 121298487596Shenning nconn = strtonum(optarg, 0, 65535, &errstr); 121398487596Shenning if (errstr != NULL) 121498487596Shenning errx(1, "number of connections is %s: %s", 121598487596Shenning errstr, optarg); 121698487596Shenning break; 1217654afd03Sclaudio case 'u': 1218654afd03Sclaudio ptb->uflag = 1; 1219654afd03Sclaudio break; 122033ed67eeSclaudio case 'U': 122133ed67eeSclaudio ptb->Uflag = 1; 122233ed67eeSclaudio break; 122320e2e75bShaesbaert case 'T': 122467fb5732Sjan if (process_tls_opt(optarg)) 122567fb5732Sjan break; 122620e2e75bShaesbaert if (map_tos(optarg, &ptb->Tflag)) 122720e2e75bShaesbaert break; 122820e2e75bShaesbaert errstr = NULL; 122920e2e75bShaesbaert if (strlen(optarg) > 1 && optarg[0] == '0' && 123020e2e75bShaesbaert optarg[1] == 'x') 123120e2e75bShaesbaert ptb->Tflag = (int)strtol(optarg, NULL, 16); 123220e2e75bShaesbaert else 123320e2e75bShaesbaert ptb->Tflag = (int)strtonum(optarg, 0, 255, 123420e2e75bShaesbaert &errstr); 123520e2e75bShaesbaert if (ptb->Tflag == -1 || ptb->Tflag > 255 || errstr) 123620e2e75bShaesbaert errx(1, "illegal tos value %s", optarg); 123720e2e75bShaesbaert break; 1238eaf1d82aShenning case 't': 1239eaf1d82aShenning secs = strtonum(optarg, 1, UINT_MAX, &errstr); 1240eaf1d82aShenning if (errstr != NULL) 1241eaf1d82aShenning errx(1, "secs is %s: %s", 1242eaf1d82aShenning errstr, optarg); 1243eaf1d82aShenning break; 1244438193baSdjm case 'h': 1245438193baSdjm default: 1246438193baSdjm usage(); 1247438193baSdjm } 1248438193baSdjm } 1249438193baSdjm 12509bbabc61Sclaudio if (pledge("stdio unveil rpath dns inet unix id", NULL) == -1) 1251c60600c6Sbenno err(1, "pledge"); 1252c60600c6Sbenno 1253438193baSdjm argv += optind; 1254438193baSdjm argc -= optind; 125533ed67eeSclaudio if ((argc != (ptb->sflag && !ptb->Uflag ? 0 : 1)) || 125667fb5732Sjan (UDP_MODE && (ptb->kvars || nconn != 1 || usetls))) 1257438193baSdjm usage(); 125898487596Shenning 125967fb5732Sjan if (ptb->sflag && usetls && (crtfile == NULL || keyfile == NULL)) 126067fb5732Sjan usage(); 126167fb5732Sjan 126267fb5732Sjan if (crtfile != NULL && keyfile != NULL) { 126367fb5732Sjan if ((crt = tls_load_file(crtfile, &crt_size, NULL)) == NULL) 126467fb5732Sjan err(1, "tls_load_file"); 126567fb5732Sjan if ((key = tls_load_file(keyfile, &key_size, NULL)) == NULL) 126667fb5732Sjan err(1, "tls_load_file"); 126767fb5732Sjan } 126867fb5732Sjan 1269b2e783b6Sderaadt if (!ptb->sflag || ptb->Uflag) 12706fb15185Sprocter mainstats.host = host = argv[0]; 1271b2e783b6Sderaadt 1272b2e783b6Sderaadt if (ptb->Uflag) 1273b2e783b6Sderaadt if (unveil(host, "rwc") == -1) 1274bc5a8259Sbeck err(1, "unveil %s", host); 1275b2e783b6Sderaadt 127633ed67eeSclaudio if (pledge("stdio id dns inet unix", NULL) == -1) 1277c60600c6Sbenno err(1, "pledge"); 1278c60600c6Sbenno 1279654afd03Sclaudio /* 1280654afd03Sclaudio * Rationale, 1281654afd03Sclaudio * If TCP, use a big buffer with big reads/writes. 1282654afd03Sclaudio * If UDP, use a big buffer in server and a buffer the size of a 1283654afd03Sclaudio * ethernet packet. 1284654afd03Sclaudio */ 1285654afd03Sclaudio if (!ptb->dummybuf_len) { 1286654afd03Sclaudio if (ptb->sflag || TCP_MODE) 1287654afd03Sclaudio ptb->dummybuf_len = DEFAULT_BUF; 1288654afd03Sclaudio else 1289654afd03Sclaudio ptb->dummybuf_len = DEFAULT_UDP_PKT; 1290654afd03Sclaudio } 1291438193baSdjm 1292438193baSdjm bzero(&hints, sizeof(hints)); 12939f39e938Sdlg hints.ai_family = family; 1294aba69134Shaesbaert if (UDP_MODE) { 1295654afd03Sclaudio hints.ai_socktype = SOCK_DGRAM; 1296aba69134Shaesbaert hints.ai_protocol = IPPROTO_UDP; 129793463c32Shaesbaert } else { 1298438193baSdjm hints.ai_socktype = SOCK_STREAM; 1299aba69134Shaesbaert hints.ai_protocol = IPPROTO_TCP; 1300aba69134Shaesbaert } 130133ed67eeSclaudio if (ptb->Uflag) { 130233ed67eeSclaudio hints.ai_family = AF_UNIX; 130333ed67eeSclaudio hints.ai_protocol = 0; 130433ed67eeSclaudio sock_un.sun_family = AF_UNIX; 130533ed67eeSclaudio if (strlcpy(sock_un.sun_path, host, sizeof(sock_un.sun_path)) >= 130633ed67eeSclaudio sizeof(sock_un.sun_path)) 130733ed67eeSclaudio errx(1, "socket name '%s' too long", host); 130833ed67eeSclaudio hints.ai_addr = (struct sockaddr *)&sock_un; 130933ed67eeSclaudio hints.ai_addrlen = sizeof(sock_un); 131033ed67eeSclaudio aitop = &hints; 131133ed67eeSclaudio } else { 1312654afd03Sclaudio if (ptb->sflag) 131398487596Shenning hints.ai_flags = AI_PASSIVE; 1314aba69134Shaesbaert if (srcbind != NULL) { 1315aba69134Shaesbaert hints.ai_flags |= AI_NUMERICHOST; 1316aba69134Shaesbaert herr = getaddrinfo(srcbind, NULL, &hints, &aib); 1317aba69134Shaesbaert hints.ai_flags &= ~AI_NUMERICHOST; 1318aba69134Shaesbaert if (herr != 0) { 1319aba69134Shaesbaert if (herr == EAI_SYSTEM) 1320aba69134Shaesbaert err(1, "getaddrinfo"); 1321aba69134Shaesbaert else 132233ed67eeSclaudio errx(1, "getaddrinfo: %s", 132333ed67eeSclaudio gai_strerror(herr)); 1324aba69134Shaesbaert } 1325aba69134Shaesbaert } 1326438193baSdjm if ((herr = getaddrinfo(host, port, &hints, &aitop)) != 0) { 1327438193baSdjm if (herr == EAI_SYSTEM) 1328438193baSdjm err(1, "getaddrinfo"); 1329438193baSdjm else 13300895ecf3Sclaudio errx(1, "getaddrinfo: %s", gai_strerror(herr)); 1331438193baSdjm } 133233ed67eeSclaudio } 1333438193baSdjm 133433ed67eeSclaudio if (pledge("stdio id inet unix", NULL) == -1) 1335c60600c6Sbenno err(1, "pledge"); 1336c60600c6Sbenno 1337296aab8eSclaudio if (getrlimit(RLIMIT_NOFILE, &rl) == -1) 1338296aab8eSclaudio err(1, "getrlimit"); 1339296aab8eSclaudio if (rl.rlim_cur < MAX_FD) 1340296aab8eSclaudio rl.rlim_cur = MAX_FD; 1341296aab8eSclaudio if (setrlimit(RLIMIT_NOFILE, &rl)) 1342296aab8eSclaudio err(1, "setrlimit"); 1343296aab8eSclaudio if (getrlimit(RLIMIT_NOFILE, &rl) == -1) 1344296aab8eSclaudio err(1, "getrlimit"); 1345296aab8eSclaudio 134633ed67eeSclaudio if (pledge("stdio inet unix", NULL) == -1) 1347c60600c6Sbenno err(1, "pledge"); 1348c60600c6Sbenno 134967fb5732Sjan if (usetls) { 135067fb5732Sjan uint32_t protocols = 0; 135167fb5732Sjan 135267fb5732Sjan if ((ptb->tls_cfg = tls_config_new()) == NULL) 135367fb5732Sjan errx(1, "unable to allocate TLS config"); 135467fb5732Sjan 135567fb5732Sjan if (ptb->sflag) { 135667fb5732Sjan if (tls_config_set_key_mem(ptb->tls_cfg, key, 135767fb5732Sjan key_size) == -1) 135867fb5732Sjan errx(1, "%s", tls_config_error(ptb->tls_cfg)); 135967fb5732Sjan if (tls_config_set_cert_mem(ptb->tls_cfg, crt, 136067fb5732Sjan crt_size) == -1) 136167fb5732Sjan errx(1, "%s", tls_config_error(ptb->tls_cfg)); 136267fb5732Sjan } else { 136367fb5732Sjan /* Don't check server certificate. */ 136467fb5732Sjan tls_config_insecure_noverifyname(ptb->tls_cfg); 136567fb5732Sjan tls_config_insecure_noverifycert(ptb->tls_cfg); 136667fb5732Sjan } 136767fb5732Sjan 136867fb5732Sjan if (tls_config_parse_protocols(&protocols, tls_protocols) == -1) 136967fb5732Sjan errx(1, "invalid TLS protocols `%s'", tls_protocols); 137067fb5732Sjan if (tls_config_set_protocols(ptb->tls_cfg, protocols) == -1) 137167fb5732Sjan errx(1, "%s", tls_config_error(ptb->tls_cfg)); 137267fb5732Sjan if (tls_config_set_ciphers(ptb->tls_cfg, tls_ciphers) == -1) 137367fb5732Sjan errx(1, "%s", tls_config_error(ptb->tls_cfg)); 137467fb5732Sjan } 137567fb5732Sjan 1376654afd03Sclaudio /* Init world */ 1377654afd03Sclaudio TAILQ_INIT(&sc_queue); 1378654afd03Sclaudio if ((ptb->dummybuf = malloc(ptb->dummybuf_len)) == NULL) 1379654afd03Sclaudio err(1, "malloc"); 1380654afd03Sclaudio arc4random_buf(ptb->dummybuf, ptb->dummybuf_len); 1381438193baSdjm 13826fb15185Sprocter timerclear(&mainstats.t_first); 13836fb15185Sprocter mainstats.floor_mbps = INFINITY; 13846fb15185Sprocter 1385654afd03Sclaudio /* Setup libevent and signals */ 1386654afd03Sclaudio event_init(); 1387654afd03Sclaudio signal_set(&ev_sigterm, SIGTERM, signal_handler, NULL); 1388654afd03Sclaudio signal_set(&ev_sighup, SIGHUP, signal_handler, NULL); 1389654afd03Sclaudio signal_set(&ev_sigint, SIGINT, signal_handler, NULL); 13905ca842b4Ssthen signal_set(&ev_siginfo, SIGINFO, signal_handler, NULL); 1391654afd03Sclaudio signal_add(&ev_sigint, NULL); 1392654afd03Sclaudio signal_add(&ev_sigterm, NULL); 1393654afd03Sclaudio signal_add(&ev_sighup, NULL); 13945ca842b4Ssthen signal_add(&ev_siginfo, NULL); 1395654afd03Sclaudio signal(SIGPIPE, SIG_IGN); 1396654afd03Sclaudio 139793463c32Shaesbaert if (UDP_MODE) { 139893463c32Shaesbaert if ((udp_sc = calloc(1, sizeof(*udp_sc))) == NULL) 139993463c32Shaesbaert err(1, "calloc"); 140093463c32Shaesbaert udp_sc->fd = -1; 14016fb15185Sprocter evtimer_set(&mainstats.timer, udp_process_slice, NULL); 140293463c32Shaesbaert } else { 140393463c32Shaesbaert print_tcp_header(); 1404654afd03Sclaudio evtimer_set(&mainstats.timer, tcp_process_slice, NULL); 140593463c32Shaesbaert } 1406654afd03Sclaudio 140793463c32Shaesbaert if (ptb->sflag) 14086fb15185Sprocter server_init(aitop); 1409eaf1d82aShenning else { 1410eaf1d82aShenning if (secs > 0) { 1411eaf1d82aShenning timerclear(&tv); 1412eaf1d82aShenning tv.tv_sec = secs + 1; 1413eaf1d82aShenning evtimer_set(&ev_progtimer, quit, NULL); 1414eaf1d82aShenning evtimer_add(&ev_progtimer, &tv); 1415eaf1d82aShenning } 14166fb15185Sprocter client_init(aitop, nconn, aib); 1417c60600c6Sbenno 14189bbabc61Sclaudio if (pledge("stdio inet", NULL) == -1) 1419c60600c6Sbenno err(1, "pledge"); 1420eaf1d82aShenning } 1421654afd03Sclaudio 1422654afd03Sclaudio /* libevent main loop*/ 1423654afd03Sclaudio event_dispatch(); 1424654afd03Sclaudio 1425654afd03Sclaudio return (0); 1426438193baSdjm } 1427