xref: /openbsd-src/usr.bin/tcpbench/tcpbench.c (revision a5e7e684d8f3304d0b66320ddecd6b4fcac407ac)
1*a5e7e684Sbluhm /*	$OpenBSD: tcpbench.c,v 1.73 2024/12/30 21:19:29 bluhm Exp $	*/
267e76cbaSbluhm 
3438193baSdjm /*
4438193baSdjm  * Copyright (c) 2008 Damien Miller <djm@mindrot.org>
5654afd03Sclaudio  * Copyright (c) 2011 Christiano F. Haesbaert <haesbaert@haesbaert.org>
6438193baSdjm  *
7438193baSdjm  * Permission to use, copy, modify, and distribute this software for any
8438193baSdjm  * purpose with or without fee is hereby granted, provided that the above
9438193baSdjm  * copyright notice and this permission notice appear in all copies.
10438193baSdjm  *
11438193baSdjm  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12438193baSdjm  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13438193baSdjm  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14438193baSdjm  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15438193baSdjm  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16438193baSdjm  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17438193baSdjm  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18438193baSdjm  */
19438193baSdjm 
20438193baSdjm #include <sys/types.h>
21438193baSdjm #include <sys/time.h>
22438193baSdjm #include <sys/socket.h>
23438193baSdjm #include <sys/socketvar.h>
24296aab8eSclaudio #include <sys/resource.h>
25654afd03Sclaudio #include <sys/queue.h>
2633ed67eeSclaudio #include <sys/un.h>
27438193baSdjm 
28438193baSdjm #include <net/route.h>
29438193baSdjm 
30438193baSdjm #include <netinet/in.h>
31438193baSdjm #include <netinet/ip.h>
32438193baSdjm #include <netinet/tcp.h>
33438193baSdjm #include <netinet/tcp_timer.h>
34438193baSdjm #include <netinet/tcp_fsm.h>
35438193baSdjm #include <netinet/in_pcb.h>
36438193baSdjm #include <netinet/tcp_var.h>
37438193baSdjm 
38438193baSdjm #include <arpa/inet.h>
39438193baSdjm 
40438193baSdjm #include <unistd.h>
41438193baSdjm #include <limits.h>
42438193baSdjm #include <stdlib.h>
43438193baSdjm #include <stdio.h>
44438193baSdjm #include <string.h>
45438193baSdjm #include <errno.h>
46654afd03Sclaudio #include <event.h>
47438193baSdjm #include <netdb.h>
48438193baSdjm #include <signal.h>
49438193baSdjm #include <err.h>
50438193baSdjm #include <fcntl.h>
51438193baSdjm #include <poll.h>
52b2e783b6Sderaadt #include <paths.h>
536fb15185Sprocter #include <math.h>
5467fb5732Sjan #include <tls.h>
5567fb5732Sjan 
5667fb5732Sjan #include <openssl/evp.h>
5767fb5732Sjan #include <openssl/rsa.h>
5867fb5732Sjan #include <openssl/pem.h>
5967fb5732Sjan #include <openssl/x509.h>
60438193baSdjm 
61438193baSdjm #define DEFAULT_PORT "12345"
62438193baSdjm #define DEFAULT_STATS_INTERVAL 1000 /* ms */
63654afd03Sclaudio #define DEFAULT_BUF (256 * 1024)
64654afd03Sclaudio #define DEFAULT_UDP_PKT (1500 - 28) /* TODO don't hardcode this */
65654afd03Sclaudio #define TCP_MODE !ptb->uflag
66654afd03Sclaudio #define UDP_MODE ptb->uflag
67296aab8eSclaudio #define MAX_FD 1024
68438193baSdjm 
69654afd03Sclaudio /* Our tcpbench globals */
70654afd03Sclaudio struct {
716b0ee4efSbluhm 	int	  Dflag;	/* Socket debug */
727847109bSbluhm 	int	  Sflag;	/* Socket buffer size */
73654afd03Sclaudio 	u_int	  rflag;	/* Report rate (ms) */
74654afd03Sclaudio 	int	  sflag;	/* True if server */
7520e2e75bShaesbaert 	int	  Tflag;	/* ToS if != -1 */
76654afd03Sclaudio 	int	  vflag;	/* Verbose */
77654afd03Sclaudio 	int	  uflag;	/* UDP mode */
7833ed67eeSclaudio 	int	  Uflag;	/* UNIX (AF_LOCAL) mode */
7933ed67eeSclaudio 	int	  Rflag;	/* randomize client write size */
80654afd03Sclaudio 	char	**kvars;	/* Kvm enabled vars */
81654afd03Sclaudio 	char	 *dummybuf;	/* IO buffer */
82654afd03Sclaudio 	size_t	  dummybuf_len;	/* IO buffer len */
8367fb5732Sjan 	struct tls_config *tls_cfg;
84654afd03Sclaudio } tcpbench, *ptb;
85438193baSdjm 
86f9df48a7Shaesbaert struct tcpservsock {
87f9df48a7Shaesbaert 	struct event ev;
88f9df48a7Shaesbaert 	struct event evt;
89f9df48a7Shaesbaert 	int fd;
90f9df48a7Shaesbaert };
91f9df48a7Shaesbaert 
92654afd03Sclaudio /* stats for a single tcp connection, udp uses only one  */
93438193baSdjm struct statctx {
94654afd03Sclaudio 	TAILQ_ENTRY(statctx) entry;
95296aab8eSclaudio 	struct timeval t_start, t_last;
96438193baSdjm 	unsigned long long bytes;
97654afd03Sclaudio 	int fd;
98654afd03Sclaudio 	char *buf;
99654afd03Sclaudio 	size_t buflen;
100654afd03Sclaudio 	struct event ev;
101654afd03Sclaudio 	/* TCP only */
102f9df48a7Shaesbaert 	struct tcpservsock *tcp_ts;
103654afd03Sclaudio 	/* UDP only */
104654afd03Sclaudio 	u_long udp_slice_pkts;
10567fb5732Sjan 	/* TLS context */
10667fb5732Sjan 	struct tls *tls;
107438193baSdjm };
108438193baSdjm 
10967fb5732Sjan char *tls_ciphers;
11067fb5732Sjan char *tls_protocols;
1116fb15185Sprocter struct statctx *udp_sc; /* singleton */
1126fb15185Sprocter 
113654afd03Sclaudio static void	signal_handler(int, short, void *);
114654afd03Sclaudio static void	saddr_ntop(const struct sockaddr *, socklen_t, char *, size_t);
115654afd03Sclaudio static void	set_slice_timer(int);
116654afd03Sclaudio static void	print_tcp_header(void);
117654afd03Sclaudio static void	list_kvars(void);
118654afd03Sclaudio static void	check_kvar(const char *);
119654afd03Sclaudio static char **	check_prepare_kvars(char *);
120654afd03Sclaudio static void	stats_prepare(struct statctx *);
1216fb15185Sprocter static void	summary_display(void);
122654afd03Sclaudio static void	tcp_stats_display(unsigned long long, long double, float,
1239bbabc61Sclaudio     struct statctx *, struct tcp_info *);
124654afd03Sclaudio static void	tcp_process_slice(int, short, void *);
125654afd03Sclaudio static void	tcp_server_handle_sc(int, short, void *);
126a556b9dbSbluhm static int	timeout_tls(int, struct tls *, int (*)(struct tls *));
127654afd03Sclaudio static void	tcp_server_accept(int, short, void *);
1286fb15185Sprocter static void	server_init(struct addrinfo *);
129654afd03Sclaudio static void	client_handle_sc(int, short, void *);
1306fb15185Sprocter static void	client_init(struct addrinfo *, int, struct addrinfo *);
131654afd03Sclaudio static int	clock_gettime_tv(clockid_t, struct timeval *);
132654afd03Sclaudio static void	udp_server_handle_sc(int, short, void *);
133654afd03Sclaudio static void	udp_process_slice(int, short, void *);
13420e2e75bShaesbaert static int	map_tos(char *, int *);
1356fb15185Sprocter static void	quit(int, short, void *);
1366fb15185Sprocter static void	wrapup(int);
137a556b9dbSbluhm static int	process_tls_opt(char *);
1386fb15185Sprocter 
139296aab8eSclaudio /*
140296aab8eSclaudio  * We account the mainstats here, that is the stats
141296aab8eSclaudio  * for all connections, all variables starting with slice
142296aab8eSclaudio  * are used to account information for the timeslice
143296aab8eSclaudio  * between each output. Peak variables record the highest
144296aab8eSclaudio  * between all slices so far.
145296aab8eSclaudio  */
146296aab8eSclaudio static struct {
1476fb15185Sprocter 	struct timeval t_first;		/* first connect / packet */
1486fb15185Sprocter 	unsigned long long total_bytes; /* bytes since t_first */
1496fb15185Sprocter 	unsigned long long n_slices;	/* slices since start */
1506fb15185Sprocter 	unsigned long long slice_bytes; /* bytes since slice reset */
151296aab8eSclaudio 	long double peak_mbps;		/* peak mbps so far */
1526fb15185Sprocter 	long double floor_mbps;		/* floor mbps so far */
1536fb15185Sprocter 	long double mean_mbps;		/* mean mbps so far */
1546fb15185Sprocter 	long double nvariance_mbps;     /* for online std dev */
155296aab8eSclaudio 	int nconns;		        /* connected clients */
156654afd03Sclaudio 	struct event timer;		/* process timer */
1576fb15185Sprocter 	const char *host;               /* remote server for display */
158296aab8eSclaudio } mainstats;
159296aab8eSclaudio 
160654afd03Sclaudio /* When adding variables, also add to tcp_stats_display() */
161438193baSdjm static const char *allowed_kvars[] = {
1629bbabc61Sclaudio 	"last_ack_recv",
1639bbabc61Sclaudio 	"last_ack_sent",
1649bbabc61Sclaudio 	"last_data_recv",
1659bbabc61Sclaudio 	"last_data_sent",
1669bbabc61Sclaudio 	"max_sndwnd",
1679bbabc61Sclaudio 	"options",
1689bbabc61Sclaudio 	"rcv_adv",
1699bbabc61Sclaudio 	"rcv_mss",
1709bbabc61Sclaudio 	"rcv_nxt",
1719bbabc61Sclaudio 	"rcv_ooopack",
1729bbabc61Sclaudio 	"rcv_space",
1739bbabc61Sclaudio 	"rcv_up",
1749bbabc61Sclaudio 	"rcv_wscale",
1759bbabc61Sclaudio 	"rfbuf_cnt",
1769bbabc61Sclaudio 	"rfbuf_ts",
1779bbabc61Sclaudio 	"rtt",
1789bbabc61Sclaudio 	"rttmin",
1799bbabc61Sclaudio 	"rttvar",
1809bbabc61Sclaudio 	"snd_cwnd",
1819bbabc61Sclaudio 	"snd_max",
1829bbabc61Sclaudio 	"snd_mss",
1839bbabc61Sclaudio 	"snd_nxt",
1849bbabc61Sclaudio 	"snd_rexmitpack",
1859bbabc61Sclaudio 	"snd_ssthresh",
1869bbabc61Sclaudio 	"snd_una",
1879bbabc61Sclaudio 	"snd_wl1",
1889bbabc61Sclaudio 	"snd_wl2",
1899bbabc61Sclaudio 	"snd_wnd",
1909bbabc61Sclaudio 	"snd_wscale",
1919bbabc61Sclaudio 	"snd_zerowin",
1929bbabc61Sclaudio 	"so_rcv_sb_cc",
1939bbabc61Sclaudio 	"so_rcv_sb_hiwat",
1949bbabc61Sclaudio 	"so_rcv_sb_lowat",
1959bbabc61Sclaudio 	"so_rcv_sb_wat",
1969bbabc61Sclaudio 	"so_snd_sb_cc",
1979bbabc61Sclaudio 	"so_snd_sb_hiwat",
1989bbabc61Sclaudio 	"so_snd_sb_lowat",
1999bbabc61Sclaudio 	"so_snd_sb_wat",
2009bbabc61Sclaudio 	"ts_recent",
2019bbabc61Sclaudio 	"ts_recent_age",
202438193baSdjm 	NULL
203438193baSdjm };
204438193baSdjm 
205654afd03Sclaudio TAILQ_HEAD(, statctx) sc_queue;
206438193baSdjm 
207438193baSdjm static void __dead
208438193baSdjm usage(void)
209438193baSdjm {
210438193baSdjm 	fprintf(stderr,
2115a6aa24dSjmc 	    "usage: tcpbench -l\n"
21267fb5732Sjan 	    "       tcpbench [-46cDRUuv] [-B buf] [-b sourceaddr] [-k kvars] [-n connections]\n"
213*a5e7e684Sbluhm 	    "                [-p port] [-r interval] [-S space] [-T keyword] [-t secs]\n"
214*a5e7e684Sbluhm 	    "                [-V rtable] hostname\n"
215*a5e7e684Sbluhm 	    "       tcpbench -s [-46cDUuv] [-B buf] [-C certfile -K keyfile] [-k kvars]\n"
216*a5e7e684Sbluhm 	    "                [-p port] [-r interval] [-S space] [-T keyword] [-V rtable]\n"
217*a5e7e684Sbluhm 	    "                [hostname]\n");
218438193baSdjm 	exit(1);
219438193baSdjm }
220438193baSdjm 
221438193baSdjm static void
222654afd03Sclaudio signal_handler(int sig, short event, void *bula)
223654afd03Sclaudio {
224654afd03Sclaudio 	/*
225654afd03Sclaudio 	 * signal handler rules don't apply, libevent decouples for us
226654afd03Sclaudio 	 */
227654afd03Sclaudio 	switch (sig) {
2285ca842b4Ssthen 	case SIGINFO:
2295ca842b4Ssthen 		printf("\n");
2305ca842b4Ssthen 		wrapup(-1);
2315ca842b4Ssthen 		break;
232654afd03Sclaudio 	case SIGINT:
2336fb15185Sprocter 		printf("\n");
2346fb15185Sprocter 		wrapup(0);
2356fb15185Sprocter 		break;		/* NOTREACHED */
236654afd03Sclaudio 	case SIGTERM:
237654afd03Sclaudio 	case SIGHUP:
238654afd03Sclaudio 		warnx("Terminated by signal %d", sig);
2396fb15185Sprocter 		wrapup(0);
240654afd03Sclaudio 		break;		/* NOTREACHED */
241654afd03Sclaudio 	default:
242654afd03Sclaudio 		errx(1, "unexpected signal %d", sig);
243654afd03Sclaudio 		break;		/* NOTREACHED */
244654afd03Sclaudio 	}
245654afd03Sclaudio }
246654afd03Sclaudio 
247654afd03Sclaudio static void
248438193baSdjm saddr_ntop(const struct sockaddr *addr, socklen_t alen, char *buf, size_t len)
249438193baSdjm {
250438193baSdjm 	char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV];
251438193baSdjm 	int herr;
252438193baSdjm 
25333ed67eeSclaudio 	if (addr->sa_family == AF_UNIX) {
25433ed67eeSclaudio 		struct sockaddr_un *sun = (struct sockaddr_un *)addr;
25533ed67eeSclaudio 		snprintf(buf, len, "%s", sun->sun_path);
25633ed67eeSclaudio 		return;
25733ed67eeSclaudio 	}
258ef1e8199Sdjm 	if ((herr = getnameinfo(addr, alen, hbuf, sizeof(hbuf),
259ef1e8199Sdjm 	    pbuf, sizeof(pbuf), NI_NUMERICHOST|NI_NUMERICSERV)) != 0) {
260438193baSdjm 		if (herr == EAI_SYSTEM)
261438193baSdjm 			err(1, "getnameinfo");
262438193baSdjm 		else
263438193baSdjm 			errx(1, "getnameinfo: %s", gai_strerror(herr));
264438193baSdjm 	}
265438193baSdjm 	snprintf(buf, len, "[%s]:%s", hbuf, pbuf);
266438193baSdjm }
267438193baSdjm 
268438193baSdjm static void
269654afd03Sclaudio set_slice_timer(int on)
270654afd03Sclaudio {
271654afd03Sclaudio 	struct timeval tv;
272654afd03Sclaudio 
273654afd03Sclaudio 	if (ptb->rflag == 0)
274654afd03Sclaudio 		return;
275654afd03Sclaudio 
276654afd03Sclaudio 	if (on) {
277654afd03Sclaudio 		if (evtimer_pending(&mainstats.timer, NULL))
278654afd03Sclaudio 			return;
279654afd03Sclaudio 		/* XXX Is there a better way to do this ? */
280654afd03Sclaudio 		tv.tv_sec = ptb->rflag / 1000;
281654afd03Sclaudio 		tv.tv_usec = (ptb->rflag % 1000) * 1000;
282654afd03Sclaudio 
283654afd03Sclaudio 		evtimer_add(&mainstats.timer, &tv);
284654afd03Sclaudio 	} else if (evtimer_pending(&mainstats.timer, NULL))
285654afd03Sclaudio 		evtimer_del(&mainstats.timer);
286654afd03Sclaudio }
287654afd03Sclaudio 
288654afd03Sclaudio static int
289654afd03Sclaudio clock_gettime_tv(clockid_t clock_id, struct timeval *tv)
290654afd03Sclaudio {
291654afd03Sclaudio 	struct timespec ts;
292654afd03Sclaudio 
293654afd03Sclaudio 	if (clock_gettime(clock_id, &ts) == -1)
294654afd03Sclaudio 		return (-1);
295654afd03Sclaudio 
296654afd03Sclaudio 	TIMESPEC_TO_TIMEVAL(tv, &ts);
297654afd03Sclaudio 
298654afd03Sclaudio 	return (0);
299654afd03Sclaudio }
300654afd03Sclaudio 
301654afd03Sclaudio static void
302654afd03Sclaudio print_tcp_header(void)
303296aab8eSclaudio {
304296aab8eSclaudio 	char **kv;
305296aab8eSclaudio 
30671134256Sbluhm 	if (ptb->rflag == 0)
30771134256Sbluhm 		return;
30871134256Sbluhm 
309296aab8eSclaudio 	printf("%12s %14s %12s %8s ", "elapsed_ms", "bytes", "mbps",
310296aab8eSclaudio 	    "bwidth");
311654afd03Sclaudio 	for (kv = ptb->kvars;  ptb->kvars != NULL && *kv != NULL; kv++)
312654afd03Sclaudio 		printf("%s%s", kv != ptb->kvars ? "," : "", *kv);
313296aab8eSclaudio 	printf("\n");
314296aab8eSclaudio }
315296aab8eSclaudio 
316296aab8eSclaudio static void
317438193baSdjm check_kvar(const char *var)
318438193baSdjm {
31934e9b7a0Sderaadt 	u_int i;
320438193baSdjm 
321438193baSdjm 	for (i = 0; allowed_kvars[i] != NULL; i++)
322438193baSdjm 		if (strcmp(allowed_kvars[i], var) == 0)
323438193baSdjm 			return;
324438193baSdjm 	errx(1, "Unrecognised kvar: %s", var);
325438193baSdjm }
326438193baSdjm 
327438193baSdjm static void
328438193baSdjm list_kvars(void)
329438193baSdjm {
33034e9b7a0Sderaadt 	u_int i;
331438193baSdjm 
332a5d9417bShaesbaert 	printf("Supported kernel variables:\n");
333438193baSdjm 	for (i = 0; allowed_kvars[i] != NULL; i++)
334a5d9417bShaesbaert 		printf("\t%s\n", allowed_kvars[i]);
335438193baSdjm }
336438193baSdjm 
337438193baSdjm static char **
338438193baSdjm check_prepare_kvars(char *list)
339438193baSdjm {
340438193baSdjm 	char *item, **ret = NULL;
34134e9b7a0Sderaadt 	u_int n = 0;
342438193baSdjm 
343438193baSdjm 	while ((item = strsep(&list, ", \t\n")) != NULL) {
344438193baSdjm 		check_kvar(item);
3456abf19f2Slteo 		if ((ret = reallocarray(ret, (++n + 1), sizeof(*ret))) == NULL)
3460285356aSbenno 			err(1, "reallocarray(kvars)");
347438193baSdjm 		if ((ret[n - 1] = strdup(item)) == NULL)
3480285356aSbenno 			err(1, "strdup");
349438193baSdjm 		ret[n] = NULL;
350438193baSdjm 	}
351654afd03Sclaudio 	return (ret);
352438193baSdjm }
353438193baSdjm 
354438193baSdjm static void
355654afd03Sclaudio stats_prepare(struct statctx *sc)
356438193baSdjm {
357654afd03Sclaudio 	sc->buf = ptb->dummybuf;
358654afd03Sclaudio 	sc->buflen = ptb->dummybuf_len;
359654afd03Sclaudio 
360654afd03Sclaudio 	if (clock_gettime_tv(CLOCK_MONOTONIC, &sc->t_start) == -1)
361654afd03Sclaudio 		err(1, "clock_gettime_tv");
362438193baSdjm 	sc->t_last = sc->t_start;
3636fb15185Sprocter 	if (!timerisset(&mainstats.t_first))
3646fb15185Sprocter 		mainstats.t_first = sc->t_start;
3656fb15185Sprocter }
366654afd03Sclaudio 
3676fb15185Sprocter static void
3686fb15185Sprocter summary_display(void)
3696fb15185Sprocter {
3706fb15185Sprocter 	struct timeval t_cur, t_diff;
3716fb15185Sprocter 	long double std_dev;
3726fb15185Sprocter 	unsigned long long total_elapsed;
3736fb15185Sprocter 	char *direction;
3746fb15185Sprocter 
3756fb15185Sprocter 	if (!ptb->sflag) {
3766fb15185Sprocter 		direction = "sent";
3776fb15185Sprocter 		printf("--- %s tcpbench statistics ---\n", mainstats.host);
3786fb15185Sprocter 	} else {
3796fb15185Sprocter 		direction = "received";
3806fb15185Sprocter 		printf("--- tcpbench server statistics ---\n");
3816fb15185Sprocter 	}
3826fb15185Sprocter 
3836fb15185Sprocter 	std_dev = sqrtl(mainstats.nvariance_mbps / mainstats.n_slices);
3846fb15185Sprocter 
3856fb15185Sprocter 	if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
3866fb15185Sprocter 		err(1, "clock_gettime_tv");
3876fb15185Sprocter 	timersub(&t_cur, &mainstats.t_first, &t_diff);
3886fb15185Sprocter 	total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
3896fb15185Sprocter 
3906fb15185Sprocter 	printf("%llu bytes %s over %.3Lf seconds\n",
3916fb15185Sprocter 	    mainstats.total_bytes, direction, total_elapsed/1000.0L);
3926fb15185Sprocter 	printf("bandwidth min/avg/max/std-dev = %.3Lf/%.3Lf/%.3Lf/%.3Lf Mbps\n",
3936fb15185Sprocter 	    mainstats.floor_mbps, mainstats.mean_mbps, mainstats.peak_mbps,
3946fb15185Sprocter 	    std_dev);
395438193baSdjm }
396438193baSdjm 
397438193baSdjm static void
398654afd03Sclaudio tcp_stats_display(unsigned long long total_elapsed, long double mbps,
3999bbabc61Sclaudio     float bwperc, struct statctx *sc, struct tcp_info *tcpi)
400296aab8eSclaudio {
401296aab8eSclaudio 	int j;
402296aab8eSclaudio 
403296aab8eSclaudio 	printf("%12llu %14llu %12.3Lf %7.2f%% ", total_elapsed, sc->bytes,
404296aab8eSclaudio 	    mbps, bwperc);
405438193baSdjm 
406654afd03Sclaudio 	if (ptb->kvars != NULL) {
407654afd03Sclaudio 		for (j = 0; ptb->kvars[j] != NULL; j++) {
408296aab8eSclaudio #define S(a) #a
409296aab8eSclaudio #define P(b, v, f)							\
4109bbabc61Sclaudio 			if (strcmp(ptb->kvars[j], S(v)) == 0) {		\
4119bbabc61Sclaudio 				printf("%s"f, j > 0 ? "," : "", b->tcpi_##v); \
412438193baSdjm 				continue;				\
413438193baSdjm 			}
4149bbabc61Sclaudio 			P(tcpi, last_ack_recv, "%u")
4159bbabc61Sclaudio 			P(tcpi, last_ack_sent, "%u")
4169bbabc61Sclaudio 			P(tcpi, last_data_recv, "%u")
4179bbabc61Sclaudio 			P(tcpi, last_data_sent, "%u")
4189bbabc61Sclaudio 			P(tcpi, max_sndwnd, "%u")
4199bbabc61Sclaudio 			P(tcpi, options, "%hhu")
4209bbabc61Sclaudio 			P(tcpi, rcv_adv, "%u")
4219bbabc61Sclaudio 			P(tcpi, rcv_mss, "%u")
4229bbabc61Sclaudio 			P(tcpi, rcv_nxt, "%u")
4239bbabc61Sclaudio 			P(tcpi, rcv_ooopack, "%u")
4249bbabc61Sclaudio 			P(tcpi, rcv_space, "%u")
4259bbabc61Sclaudio 			P(tcpi, rcv_up, "%u")
4269bbabc61Sclaudio 			P(tcpi, rcv_wscale, "%hhu")
4279bbabc61Sclaudio 			P(tcpi, rfbuf_cnt, "%u")
4289bbabc61Sclaudio 			P(tcpi, rfbuf_ts, "%u")
4299bbabc61Sclaudio 			P(tcpi, rtt, "%u")
4309bbabc61Sclaudio 			P(tcpi, rttmin, "%u")
4319bbabc61Sclaudio 			P(tcpi, rttvar, "%u")
4329bbabc61Sclaudio 			P(tcpi, snd_cwnd, "%u")
4339bbabc61Sclaudio 			P(tcpi, snd_max, "%u")
4349bbabc61Sclaudio 			P(tcpi, snd_mss, "%u")
4359bbabc61Sclaudio 			P(tcpi, snd_nxt, "%u")
4369bbabc61Sclaudio 			P(tcpi, snd_rexmitpack, "%u")
4379bbabc61Sclaudio 			P(tcpi, snd_ssthresh, "%u")
4389bbabc61Sclaudio 			P(tcpi, snd_una, "%u")
4399bbabc61Sclaudio 			P(tcpi, snd_wl1, "%u")
4409bbabc61Sclaudio 			P(tcpi, snd_wl2, "%u")
4419bbabc61Sclaudio 			P(tcpi, snd_wnd, "%u")
4429bbabc61Sclaudio 			P(tcpi, snd_wscale, "%hhu")
4439bbabc61Sclaudio 			P(tcpi, snd_zerowin, "%u")
4449bbabc61Sclaudio 			P(tcpi, so_rcv_sb_cc, "%u")
4459bbabc61Sclaudio 			P(tcpi, so_rcv_sb_hiwat, "%u")
4469bbabc61Sclaudio 			P(tcpi, so_rcv_sb_lowat, "%u")
4479bbabc61Sclaudio 			P(tcpi, so_rcv_sb_wat, "%u")
4489bbabc61Sclaudio 			P(tcpi, so_snd_sb_cc, "%u")
4499bbabc61Sclaudio 			P(tcpi, so_snd_sb_hiwat, "%u")
4509bbabc61Sclaudio 			P(tcpi, so_snd_sb_lowat, "%u")
4519bbabc61Sclaudio 			P(tcpi, so_snd_sb_wat, "%u")
4529bbabc61Sclaudio 			P(tcpi, ts_recent, "%u")
4539bbabc61Sclaudio 			P(tcpi, ts_recent_age, "%u")
454296aab8eSclaudio #undef S
455438193baSdjm #undef P
456438193baSdjm 		}
457438193baSdjm 	}
458438193baSdjm 	printf("\n");
459438193baSdjm }
460438193baSdjm 
461438193baSdjm static void
462654afd03Sclaudio tcp_process_slice(int fd, short event, void *bula)
463438193baSdjm {
464296aab8eSclaudio 	unsigned long long total_elapsed, since_last;
4656fb15185Sprocter 	long double mbps, old_mean_mbps, slice_mbps = 0;
466296aab8eSclaudio 	float bwperc;
467654afd03Sclaudio 	struct statctx *sc;
468296aab8eSclaudio 	struct timeval t_cur, t_diff;
4699bbabc61Sclaudio 	struct tcp_info tcpi;
4709bbabc61Sclaudio 	socklen_t tcpilen;
471296aab8eSclaudio 
4726fb15185Sprocter 	if (TAILQ_EMPTY(&sc_queue))
4736fb15185Sprocter 		return; /* don't pollute stats */
4746fb15185Sprocter 
4756fb15185Sprocter 	mainstats.n_slices++;
4766fb15185Sprocter 
477654afd03Sclaudio 	TAILQ_FOREACH(sc, &sc_queue, entry) {
478654afd03Sclaudio 		if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
479654afd03Sclaudio 			err(1, "clock_gettime_tv");
4809bbabc61Sclaudio 		if (ptb->kvars != NULL) { /* process kernel stats */
4819bbabc61Sclaudio 			tcpilen = sizeof(tcpi);
4829bbabc61Sclaudio 			if (getsockopt(sc->fd, IPPROTO_TCP, TCP_INFO,
4839bbabc61Sclaudio 			    &tcpi, &tcpilen) == -1)
4849bbabc61Sclaudio 				err(1, "get tcp_info");
4859bbabc61Sclaudio 		}
486654afd03Sclaudio 
487296aab8eSclaudio 		timersub(&t_cur, &sc->t_start, &t_diff);
488296aab8eSclaudio 		total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
489296aab8eSclaudio 		timersub(&t_cur, &sc->t_last, &t_diff);
490296aab8eSclaudio 		since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
4919b3d3828Sstsp 		if (since_last == 0)
4929b3d3828Sstsp 			continue;
493296aab8eSclaudio 		bwperc = (sc->bytes * 100.0) / mainstats.slice_bytes;
494296aab8eSclaudio 		mbps = (sc->bytes * 8) / (since_last * 1000.0);
495296aab8eSclaudio 		slice_mbps += mbps;
496296aab8eSclaudio 
4979bbabc61Sclaudio 		tcp_stats_display(total_elapsed, mbps, bwperc, sc, &tcpi);
498296aab8eSclaudio 
499296aab8eSclaudio 		sc->t_last = t_cur;
500296aab8eSclaudio 		sc->bytes = 0;
501296aab8eSclaudio 	}
502296aab8eSclaudio 
503296aab8eSclaudio 	/* process stats for this slice */
504296aab8eSclaudio 	if (slice_mbps > mainstats.peak_mbps)
505296aab8eSclaudio 		mainstats.peak_mbps = slice_mbps;
5066fb15185Sprocter 	if (slice_mbps < mainstats.floor_mbps)
5076fb15185Sprocter 		mainstats.floor_mbps = slice_mbps;
5086fb15185Sprocter 	old_mean_mbps = mainstats.mean_mbps;
5096fb15185Sprocter 	mainstats.mean_mbps += (slice_mbps - mainstats.mean_mbps) /
5106fb15185Sprocter 				mainstats.n_slices;
5116fb15185Sprocter 
5126fb15185Sprocter 	/* "Welford's method" for online variance
5136fb15185Sprocter 	 * see Knuth, TAoCP Volume 2, 3rd edn., p232 */
5146fb15185Sprocter 	mainstats.nvariance_mbps += (slice_mbps - old_mean_mbps) *
5156fb15185Sprocter 				    (slice_mbps - mainstats.mean_mbps);
5166fb15185Sprocter 
517654afd03Sclaudio 	printf("Conn: %3d Mbps: %12.3Lf Peak Mbps: %12.3Lf Avg Mbps: %12.3Lf\n",
518654afd03Sclaudio 	    mainstats.nconns, slice_mbps, mainstats.peak_mbps,
5199321d4d4Shaesbaert 	    mainstats.nconns ? slice_mbps / mainstats.nconns : 0);
520654afd03Sclaudio 
5216fb15185Sprocter 	mainstats.slice_bytes = 0;
522654afd03Sclaudio 	set_slice_timer(mainstats.nconns > 0);
523296aab8eSclaudio }
524296aab8eSclaudio 
525654afd03Sclaudio static void
5266fb15185Sprocter udp_process_slice(int fd, short event, void *bula)
527296aab8eSclaudio {
5283e667f11Shaesbaert 	unsigned long long total_elapsed, since_last, pps;
5296fb15185Sprocter 	long double old_mean_mbps, slice_mbps;
530654afd03Sclaudio 	struct timeval t_cur, t_diff;
531654afd03Sclaudio 
5326fb15185Sprocter 	mainstats.n_slices++;
5336fb15185Sprocter 
534654afd03Sclaudio 	if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
535654afd03Sclaudio 		err(1, "clock_gettime_tv");
5366fb15185Sprocter 
5376fb15185Sprocter 	timersub(&t_cur, &udp_sc->t_start, &t_diff);
538654afd03Sclaudio 	total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
5396fb15185Sprocter 
5406fb15185Sprocter 	timersub(&t_cur, &udp_sc->t_last, &t_diff);
541654afd03Sclaudio 	since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
5429b3d3828Sstsp 	if (since_last == 0)
5439b3d3828Sstsp 		return;
5446fb15185Sprocter 
5456fb15185Sprocter 	slice_mbps = (udp_sc->bytes * 8) / (since_last * 1000.0);
5466fb15185Sprocter 	pps = (udp_sc->udp_slice_pkts * 1000) / since_last;
5476fb15185Sprocter 
548654afd03Sclaudio 	if (slice_mbps > mainstats.peak_mbps)
549654afd03Sclaudio 		mainstats.peak_mbps = slice_mbps;
5506fb15185Sprocter 	if (slice_mbps < mainstats.floor_mbps)
5516fb15185Sprocter 		mainstats.floor_mbps = slice_mbps;
5526fb15185Sprocter 	old_mean_mbps = mainstats.mean_mbps;
5536fb15185Sprocter 	mainstats.mean_mbps += (slice_mbps - mainstats.mean_mbps) /
5546fb15185Sprocter 				mainstats.n_slices;
5556fb15185Sprocter 
5566fb15185Sprocter 	/* "Welford's method" for online variance
5576fb15185Sprocter 	 * see Knuth, TAoCP Volume 2, 3rd edn., p232 */
5586fb15185Sprocter 	mainstats.nvariance_mbps += (slice_mbps - old_mean_mbps) *
5596fb15185Sprocter 				    (slice_mbps - mainstats.mean_mbps);
5606fb15185Sprocter 
5613e667f11Shaesbaert 	printf("Elapsed: %11llu Mbps: %11.3Lf Peak Mbps: %11.3Lf %s PPS: %7llu\n",
562654afd03Sclaudio 	    total_elapsed, slice_mbps, mainstats.peak_mbps,
563654afd03Sclaudio 	    ptb->sflag ? "Rx" : "Tx", pps);
564654afd03Sclaudio 
565654afd03Sclaudio 	/* Clean up this slice time */
5666fb15185Sprocter 	udp_sc->t_last = t_cur;
5676fb15185Sprocter 	udp_sc->bytes = 0;
5686fb15185Sprocter 	udp_sc->udp_slice_pkts = 0;
5696fb15185Sprocter 
5706fb15185Sprocter 	mainstats.slice_bytes = 0;
571654afd03Sclaudio 	set_slice_timer(1);
572654afd03Sclaudio }
573654afd03Sclaudio 
574654afd03Sclaudio static void
5756fb15185Sprocter udp_server_handle_sc(int fd, short event, void *bula)
576654afd03Sclaudio {
5776fb15185Sprocter 	static int first_read = 1;
578654afd03Sclaudio 	ssize_t n;
579654afd03Sclaudio 
580654afd03Sclaudio 	n = read(fd, ptb->dummybuf, ptb->dummybuf_len);
581654afd03Sclaudio 	if (n == 0)
582654afd03Sclaudio 		return;
583654afd03Sclaudio 	else if (n == -1) {
584730d2df4Shaesbaert 		if (errno != EINTR && errno != EWOULDBLOCK)
585654afd03Sclaudio 			warn("fd %d read error", fd);
586654afd03Sclaudio 		return;
587654afd03Sclaudio 	}
588654afd03Sclaudio 
589654afd03Sclaudio 	if (ptb->vflag >= 3)
590654afd03Sclaudio 		fprintf(stderr, "read: %zd bytes\n", n);
5916fb15185Sprocter 	if (first_read) {
5926fb15185Sprocter 		first_read = 0;
5936fb15185Sprocter 		stats_prepare(udp_sc);
594654afd03Sclaudio 		set_slice_timer(1);
5956fb15185Sprocter 	}
596654afd03Sclaudio 	/* Account packet */
5976fb15185Sprocter 	udp_sc->udp_slice_pkts++;
5986fb15185Sprocter 	udp_sc->bytes += n;
5996fb15185Sprocter 	mainstats.slice_bytes += n;
6006fb15185Sprocter 	mainstats.total_bytes += n;
601654afd03Sclaudio }
602654afd03Sclaudio 
603654afd03Sclaudio static void
604654afd03Sclaudio tcp_server_handle_sc(int fd, short event, void *v_sc)
605654afd03Sclaudio {
606654afd03Sclaudio 	struct statctx *sc = v_sc;
607438193baSdjm 	ssize_t n;
608438193baSdjm 
60967fb5732Sjan 	if (sc->tls)
61067fb5732Sjan 		n = tls_read(sc->tls, sc->buf, sc->buflen);
61167fb5732Sjan 	else
612654afd03Sclaudio 		n = read(sc->fd, sc->buf, sc->buflen);
613296aab8eSclaudio 	if (n == -1) {
61467fb5732Sjan 		if (sc->tls)
61567fb5732Sjan 			err(1, "tls_read: %s", tls_error(sc->tls));
616730d2df4Shaesbaert 		if (errno != EINTR && errno != EWOULDBLOCK)
617654afd03Sclaudio 			warn("fd %d read error", sc->fd);
618654afd03Sclaudio 		return;
619654afd03Sclaudio 	} else if (n == 0) {
620654afd03Sclaudio 		if (ptb->vflag)
621654afd03Sclaudio 			fprintf(stderr, "%8d closed by remote end\n", sc->fd);
622f9df48a7Shaesbaert 
623f9df48a7Shaesbaert 		TAILQ_REMOVE(&sc_queue, sc, entry);
624f9df48a7Shaesbaert 
6257d5f8838Ssthen 		event_del(&sc->ev);
626654afd03Sclaudio 		close(sc->fd);
627f9df48a7Shaesbaert 
628f9df48a7Shaesbaert 		/* Some file descriptors are available again. */
629f9df48a7Shaesbaert 		if (evtimer_pending(&sc->tcp_ts->evt, NULL)) {
630f9df48a7Shaesbaert 			evtimer_del(&sc->tcp_ts->evt);
631f9df48a7Shaesbaert 			event_add(&sc->tcp_ts->ev, NULL);
632f9df48a7Shaesbaert 		}
633f9df48a7Shaesbaert 
634654afd03Sclaudio 		free(sc);
635654afd03Sclaudio 		mainstats.nconns--;
636654afd03Sclaudio 		return;
637438193baSdjm 	}
638654afd03Sclaudio 	if (ptb->vflag >= 3)
639438193baSdjm 		fprintf(stderr, "read: %zd bytes\n", n);
640654afd03Sclaudio 	sc->bytes += n;
641654afd03Sclaudio 	mainstats.slice_bytes += n;
6426fb15185Sprocter 	mainstats.total_bytes += n;
643438193baSdjm }
644438193baSdjm 
645a556b9dbSbluhm static int
64667fb5732Sjan timeout_tls(int s, struct tls *tls_ctx, int (*func)(struct tls *))
64767fb5732Sjan {
64867fb5732Sjan 	struct pollfd pfd;
64967fb5732Sjan 	int ret;
65067fb5732Sjan 
65167fb5732Sjan 	while ((ret = func(tls_ctx)) != 0) {
65267fb5732Sjan 		if (ret == TLS_WANT_POLLIN)
65367fb5732Sjan 			pfd.events = POLLIN;
65467fb5732Sjan 		else if (ret == TLS_WANT_POLLOUT)
65567fb5732Sjan 			pfd.events = POLLOUT;
65667fb5732Sjan 		else
65767fb5732Sjan 			break;
65867fb5732Sjan 		pfd.fd = s;
65967fb5732Sjan 		if ((ret = poll(&pfd, 1, -1)) == 1)
66067fb5732Sjan 			continue;
66167fb5732Sjan 		else if (ret == 0) {
66267fb5732Sjan 			errno = ETIMEDOUT;
66367fb5732Sjan 			ret = -1;
66467fb5732Sjan 			break;
66567fb5732Sjan 		} else
66667fb5732Sjan 			err(1, "poll failed");
66767fb5732Sjan 	}
66867fb5732Sjan 
66967fb5732Sjan 	return ret;
67067fb5732Sjan }
67167fb5732Sjan 
672654afd03Sclaudio static void
673f9df48a7Shaesbaert tcp_server_accept(int fd, short event, void *arg)
674654afd03Sclaudio {
675f9df48a7Shaesbaert 	struct tcpservsock *ts = arg;
67619b0653eSchl 	int sock;
677654afd03Sclaudio 	struct statctx *sc;
678654afd03Sclaudio 	struct sockaddr_storage ss;
679654afd03Sclaudio 	socklen_t sslen;
680de1f7a69Sbluhm 	char tmp[NI_MAXHOST + 2 + NI_MAXSERV];
68167fb5732Sjan 	static struct tls *tls = NULL;
68267fb5732Sjan 
68367fb5732Sjan 	if (ptb->tls_cfg && tls == NULL) {
68467fb5732Sjan 		tls = tls_server();
68567fb5732Sjan 		if (tls == NULL)
68667fb5732Sjan 			err(1, "Unable to create TLS context.");
68767fb5732Sjan 		if (tls_configure(tls, ptb->tls_cfg) == -1)
68867fb5732Sjan 			errx(1, "tls_configure: %s", tls_error(tls));
68967fb5732Sjan 	}
690654afd03Sclaudio 
691654afd03Sclaudio 	sslen = sizeof(ss);
692f9df48a7Shaesbaert 
693f9df48a7Shaesbaert 	event_add(&ts->ev, NULL);
694f9df48a7Shaesbaert 	if (event & EV_TIMEOUT)
695f9df48a7Shaesbaert 		return;
6965f13b87eSguenther 	if ((sock = accept4(fd, (struct sockaddr *)&ss, &sslen, SOCK_NONBLOCK))
6975f13b87eSguenther 	    == -1) {
698f9df48a7Shaesbaert 		/*
699f9df48a7Shaesbaert 		 * Pause accept if we are out of file descriptors, or
700f9df48a7Shaesbaert 		 * libevent will haunt us here too.
701f9df48a7Shaesbaert 		 */
702f9df48a7Shaesbaert 		if (errno == ENFILE || errno == EMFILE) {
703f9df48a7Shaesbaert 			struct timeval evtpause = { 1, 0 };
704f9df48a7Shaesbaert 
705f9df48a7Shaesbaert 			event_del(&ts->ev);
706f9df48a7Shaesbaert 			evtimer_add(&ts->evt, &evtpause);
70762e3c252Sderaadt 		} else if (errno != EWOULDBLOCK && errno != EINTR &&
70862e3c252Sderaadt 		    errno != ECONNABORTED)
709654afd03Sclaudio 			warn("accept");
710654afd03Sclaudio 		return;
711654afd03Sclaudio 	}
712654afd03Sclaudio 	saddr_ntop((struct sockaddr *)&ss, sslen,
713654afd03Sclaudio 	    tmp, sizeof(tmp));
71420e2e75bShaesbaert 	if (ptb->Tflag != -1 && ss.ss_family == AF_INET) {
71520e2e75bShaesbaert 		if (setsockopt(sock, IPPROTO_IP, IP_TOS,
71620e2e75bShaesbaert 		    &ptb->Tflag, sizeof(ptb->Tflag)))
71720e2e75bShaesbaert 			err(1, "setsockopt IP_TOS");
71820e2e75bShaesbaert 	}
71920e2e75bShaesbaert 	if (ptb->Tflag != -1 && ss.ss_family == AF_INET6) {
72020e2e75bShaesbaert 		if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
72120e2e75bShaesbaert 		    &ptb->Tflag, sizeof(ptb->Tflag)))
72220e2e75bShaesbaert 			err(1, "setsockopt IPV6_TCLASS");
72320e2e75bShaesbaert 	}
724654afd03Sclaudio 	/* Alloc client structure and register reading callback */
725654afd03Sclaudio 	if ((sc = calloc(1, sizeof(*sc))) == NULL)
726654afd03Sclaudio 		err(1, "calloc");
727f9df48a7Shaesbaert 	sc->tcp_ts = ts;
728654afd03Sclaudio 	sc->fd = sock;
729654afd03Sclaudio 	stats_prepare(sc);
73067fb5732Sjan 	if (tls && tls_accept_socket(tls, &sc->tls, sc->fd) == -1)
73167fb5732Sjan 		err(1, "tls_accept_socket: %s", tls_error(tls));
7326fb15185Sprocter 
733654afd03Sclaudio 	event_set(&sc->ev, sc->fd, EV_READ | EV_PERSIST,
734654afd03Sclaudio 	    tcp_server_handle_sc, sc);
735654afd03Sclaudio 	event_add(&sc->ev, NULL);
736654afd03Sclaudio 	TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
7376fb15185Sprocter 
738654afd03Sclaudio 	mainstats.nconns++;
7399321d4d4Shaesbaert 	if (mainstats.nconns == 1)
7409321d4d4Shaesbaert 		set_slice_timer(1);
741654afd03Sclaudio 	if (ptb->vflag)
742146e9595Shaesbaert 		fprintf(stderr, "Accepted connection from %s, fd = %d\n",
743146e9595Shaesbaert 		    tmp, sc->fd);
744654afd03Sclaudio }
745654afd03Sclaudio 
746654afd03Sclaudio static void
7476fb15185Sprocter server_init(struct addrinfo *aitop)
748438193baSdjm {
749296aab8eSclaudio 	int sock, on = 1;
750438193baSdjm 	struct addrinfo *ai;
751654afd03Sclaudio 	struct event *ev;
752f9df48a7Shaesbaert 	struct tcpservsock *ts;
753296aab8eSclaudio 	nfds_t lnfds;
754438193baSdjm 
755296aab8eSclaudio 	lnfds = 0;
756438193baSdjm 	for (ai = aitop; ai != NULL; ai = ai->ai_next) {
757de1f7a69Sbluhm 		char tmp[NI_MAXHOST + 2 + NI_MAXSERV];
758de1f7a69Sbluhm 
759438193baSdjm 		saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, sizeof(tmp));
760654afd03Sclaudio 		if (ptb->vflag)
761654afd03Sclaudio 			fprintf(stderr, "Try to bind to %s\n", tmp);
762438193baSdjm 		if ((sock = socket(ai->ai_family, ai->ai_socktype,
763438193baSdjm 		    ai->ai_protocol)) == -1) {
764438193baSdjm 			if (ai->ai_next == NULL)
765438193baSdjm 				err(1, "socket");
766654afd03Sclaudio 			if (ptb->vflag)
767438193baSdjm 				warn("socket");
768438193baSdjm 			continue;
769438193baSdjm 		}
7706b0ee4efSbluhm 		if (ptb->Dflag) {
7716b0ee4efSbluhm 			if (setsockopt(sock, SOL_SOCKET, SO_DEBUG,
7726b0ee4efSbluhm 			    &ptb->Dflag, sizeof(ptb->Dflag)))
7736b0ee4efSbluhm 				err(1, "setsockopt SO_DEBUG");
7746b0ee4efSbluhm 		}
77520e2e75bShaesbaert 		if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
77620e2e75bShaesbaert 			if (setsockopt(sock, IPPROTO_IP, IP_TOS,
77720e2e75bShaesbaert 			    &ptb->Tflag, sizeof(ptb->Tflag)))
77820e2e75bShaesbaert 				err(1, "setsockopt IP_TOS");
77920e2e75bShaesbaert 		}
78020e2e75bShaesbaert 		if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
78120e2e75bShaesbaert 			if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
78220e2e75bShaesbaert 			    &ptb->Tflag, sizeof(ptb->Tflag)))
78320e2e75bShaesbaert 				err(1, "setsockopt IPV6_TCLASS");
78420e2e75bShaesbaert 		}
785438193baSdjm 		if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
786438193baSdjm 		    &on, sizeof(on)) == -1)
787438193baSdjm 			warn("reuse port");
788438193baSdjm 		if (bind(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
789438193baSdjm 			if (ai->ai_next == NULL)
790438193baSdjm 				err(1, "bind");
791654afd03Sclaudio 			if (ptb->vflag)
792438193baSdjm 				warn("bind");
793438193baSdjm 			close(sock);
794438193baSdjm 			continue;
795438193baSdjm 		}
796654afd03Sclaudio 		if (ptb->Sflag) {
797438193baSdjm 			if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
798654afd03Sclaudio 			    &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
7997847109bSbluhm 				warn("set receive socket buffer size");
800438193baSdjm 		}
801654afd03Sclaudio 		if (TCP_MODE) {
802438193baSdjm 			if (listen(sock, 64) == -1) {
803438193baSdjm 				if (ai->ai_next == NULL)
804438193baSdjm 					err(1, "listen");
805654afd03Sclaudio 				if (ptb->vflag)
806438193baSdjm 					warn("listen");
807438193baSdjm 				close(sock);
808438193baSdjm 				continue;
809438193baSdjm 			}
810654afd03Sclaudio 		}
811f9df48a7Shaesbaert 		if (UDP_MODE) {
812654afd03Sclaudio 			if ((ev = calloc(1, sizeof(*ev))) == NULL)
813654afd03Sclaudio 				err(1, "calloc");
814654afd03Sclaudio 			event_set(ev, sock, EV_READ | EV_PERSIST,
8156fb15185Sprocter 			    udp_server_handle_sc, NULL);
816654afd03Sclaudio 			event_add(ev, NULL);
817f9df48a7Shaesbaert 		} else {
818f9df48a7Shaesbaert 			if ((ts = calloc(1, sizeof(*ts))) == NULL)
819f9df48a7Shaesbaert 				err(1, "calloc");
820f9df48a7Shaesbaert 
821f9df48a7Shaesbaert 			ts->fd = sock;
822f9df48a7Shaesbaert 			evtimer_set(&ts->evt, tcp_server_accept, ts);
823f9df48a7Shaesbaert 			event_set(&ts->ev, ts->fd, EV_READ,
824f9df48a7Shaesbaert 			    tcp_server_accept, ts);
825f9df48a7Shaesbaert 			event_add(&ts->ev, NULL);
826f9df48a7Shaesbaert 		}
827654afd03Sclaudio 		if (ptb->vflag >= 3)
828654afd03Sclaudio 			fprintf(stderr, "bound to fd %d\n", sock);
829296aab8eSclaudio 		lnfds++;
830438193baSdjm 	}
83133ed67eeSclaudio 	if (!ptb->Uflag)
832438193baSdjm 		freeaddrinfo(aitop);
833296aab8eSclaudio 	if (lnfds == 0)
834438193baSdjm 		errx(1, "No working listen addresses found");
835296aab8eSclaudio }
836438193baSdjm 
837296aab8eSclaudio static void
838654afd03Sclaudio client_handle_sc(int fd, short event, void *v_sc)
839296aab8eSclaudio {
840654afd03Sclaudio 	struct statctx *sc = v_sc;
841654afd03Sclaudio 	ssize_t n;
84233ed67eeSclaudio 	size_t blen = sc->buflen;
843296aab8eSclaudio 
84433ed67eeSclaudio 	if (ptb->Rflag)
84533ed67eeSclaudio 		blen = arc4random_uniform(blen) + 1;
84667fb5732Sjan 
84767fb5732Sjan 	if (sc->tls)
84867fb5732Sjan 		n = tls_write(sc->tls, sc->buf, blen);
84967fb5732Sjan 	else
85067fb5732Sjan 		n = write(sc->fd, sc->buf, blen);
85167fb5732Sjan 	if (n == -1) {
85267fb5732Sjan 		if (sc->tls)
85367fb5732Sjan 			warn("tls_write: %s", tls_error(sc->tls));
854730d2df4Shaesbaert 		if (errno == EINTR || errno == EWOULDBLOCK ||
855654afd03Sclaudio 		    (UDP_MODE && errno == ENOBUFS))
856730d2df4Shaesbaert 			return;
8576fb15185Sprocter 		warn("write");
8586fb15185Sprocter 		wrapup(1);
859296aab8eSclaudio 	}
860654afd03Sclaudio 	if (TCP_MODE && n == 0) {
861146e9595Shaesbaert 		fprintf(stderr, "Remote end closed connection");
8626fb15185Sprocter 		wrapup(1);
863438193baSdjm 	}
864654afd03Sclaudio 	if (ptb->vflag >= 3)
865146e9595Shaesbaert 		fprintf(stderr, "write: %zd bytes\n", n);
866654afd03Sclaudio 	sc->bytes += n;
867654afd03Sclaudio 	mainstats.slice_bytes += n;
8686fb15185Sprocter 	mainstats.total_bytes += n;
869654afd03Sclaudio 	if (UDP_MODE)
870654afd03Sclaudio 		sc->udp_slice_pkts++;
871654afd03Sclaudio }
872438193baSdjm 
873654afd03Sclaudio static void
8746fb15185Sprocter client_init(struct addrinfo *aitop, int nconn, struct addrinfo *aib)
875438193baSdjm {
876654afd03Sclaudio 	struct statctx *sc;
8770895ecf3Sclaudio 	struct addrinfo *ai;
878ea0bc011Sclaudio 	int i, r, sock;
87998487596Shenning 
88098487596Shenning 	for (i = 0; i < nconn; i++) {
881438193baSdjm 		for (sock = -1, ai = aitop; ai != NULL; ai = ai->ai_next) {
882de1f7a69Sbluhm 			char tmp[NI_MAXHOST + 2 + NI_MAXSERV];
883de1f7a69Sbluhm 
88498487596Shenning 			saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp,
88598487596Shenning 			    sizeof(tmp));
886654afd03Sclaudio 			if (ptb->vflag && i == 0)
887438193baSdjm 				fprintf(stderr, "Trying %s\n", tmp);
888438193baSdjm 			if ((sock = socket(ai->ai_family, ai->ai_socktype,
889438193baSdjm 			    ai->ai_protocol)) == -1) {
890438193baSdjm 				if (ai->ai_next == NULL)
891438193baSdjm 					err(1, "socket");
892654afd03Sclaudio 				if (ptb->vflag)
893438193baSdjm 					warn("socket");
894438193baSdjm 				continue;
895438193baSdjm 			}
8966b0ee4efSbluhm 			if (ptb->Dflag) {
8976b0ee4efSbluhm 				if (setsockopt(sock, SOL_SOCKET, SO_DEBUG,
8986b0ee4efSbluhm 				    &ptb->Dflag, sizeof(ptb->Dflag)))
8996b0ee4efSbluhm 					err(1, "setsockopt SO_DEBUG");
9006b0ee4efSbluhm 			}
901aba69134Shaesbaert 			if (aib != NULL) {
902aba69134Shaesbaert 				saddr_ntop(aib->ai_addr, aib->ai_addrlen,
903aba69134Shaesbaert 				    tmp, sizeof(tmp));
904aba69134Shaesbaert 				if (ptb->vflag)
905aba69134Shaesbaert 					fprintf(stderr,
906aba69134Shaesbaert 					    "Try to bind to %s\n", tmp);
907aba69134Shaesbaert 				if (bind(sock, (struct sockaddr *)aib->ai_addr,
908aba69134Shaesbaert 				    aib->ai_addrlen) == -1)
909aba69134Shaesbaert 					err(1, "bind");
910aba69134Shaesbaert 			}
91120e2e75bShaesbaert 			if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
91220e2e75bShaesbaert 				if (setsockopt(sock, IPPROTO_IP, IP_TOS,
91320e2e75bShaesbaert 				    &ptb->Tflag, sizeof(ptb->Tflag)))
91420e2e75bShaesbaert 					err(1, "setsockopt IP_TOS");
91520e2e75bShaesbaert 			}
91620e2e75bShaesbaert 			if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
91720e2e75bShaesbaert 				if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
91820e2e75bShaesbaert 				    &ptb->Tflag, sizeof(ptb->Tflag)))
91920e2e75bShaesbaert 					err(1, "setsockopt IPV6_TCLASS");
92020e2e75bShaesbaert 			}
921654afd03Sclaudio 			if (ptb->Sflag) {
922438193baSdjm 				if (setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
923654afd03Sclaudio 				    &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
9247847109bSbluhm 					warn("set send socket buffer size");
925438193baSdjm 			}
926438193baSdjm 			if (connect(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
927438193baSdjm 				if (ai->ai_next == NULL)
928438193baSdjm 					err(1, "connect");
929654afd03Sclaudio 				if (ptb->vflag)
930438193baSdjm 					warn("connect");
931438193baSdjm 				close(sock);
932438193baSdjm 				sock = -1;
933438193baSdjm 				continue;
934438193baSdjm 			}
935438193baSdjm 			break;
936438193baSdjm 		}
937438193baSdjm 		if (sock == -1)
938438193baSdjm 			errx(1, "No host found");
939b62beb87Skrw 		if ((r = fcntl(sock, F_GETFL)) == -1)
940438193baSdjm 			err(1, "fcntl(F_GETFL)");
941438193baSdjm 		r |= O_NONBLOCK;
942438193baSdjm 		if (fcntl(sock, F_SETFL, r) == -1)
943438193baSdjm 			err(1, "fcntl(F_SETFL, O_NONBLOCK)");
944654afd03Sclaudio 		/* Alloc and prepare stats */
945654afd03Sclaudio 		if (TCP_MODE) {
946654afd03Sclaudio 			if ((sc = calloc(1, sizeof(*sc))) == NULL)
947654afd03Sclaudio 				err(1, "calloc");
9486fb15185Sprocter 		} else
9496fb15185Sprocter 			sc = udp_sc;
9506fb15185Sprocter 
951654afd03Sclaudio 		sc->fd = sock;
95267fb5732Sjan 
95367fb5732Sjan 		if (ptb->tls_cfg) {
95467fb5732Sjan 			sc->tls = tls_client();
95567fb5732Sjan 			if (sc->tls == NULL)
95667fb5732Sjan 				err(1, "Unable to create TLS context.");
95767fb5732Sjan 
95867fb5732Sjan 			if (tls_configure(sc->tls, ptb->tls_cfg) == -1)
95967fb5732Sjan 				errx(1, "tls_configure: %s",
96067fb5732Sjan 				    tls_error(sc->tls));
96167fb5732Sjan 
96267fb5732Sjan 			if (tls_connect_socket(sc->tls, sc->fd,
96367fb5732Sjan 			    mainstats.host) == -1)
96467fb5732Sjan 				errx(1, "tls_connect_socket: %s",
96567fb5732Sjan 				    tls_error(sc->tls));
96667fb5732Sjan 			if (timeout_tls(sc->fd, sc->tls, tls_handshake) == -1) {
96767fb5732Sjan 				const char *errstr;
96867fb5732Sjan 
96967fb5732Sjan 				if ((errstr = tls_error(sc->tls)) == NULL)
97067fb5732Sjan 					errstr = strerror(errno);
97167fb5732Sjan 				errx(1, "tls handshake failed (%s)", errstr);
97267fb5732Sjan 			}
97367fb5732Sjan 		}
97467fb5732Sjan 
975654afd03Sclaudio 		stats_prepare(sc);
9766fb15185Sprocter 
977654afd03Sclaudio 		event_set(&sc->ev, sc->fd, EV_WRITE | EV_PERSIST,
978654afd03Sclaudio 		    client_handle_sc, sc);
979654afd03Sclaudio 		event_add(&sc->ev, NULL);
980654afd03Sclaudio 		TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
9816fb15185Sprocter 
982654afd03Sclaudio 		mainstats.nconns++;
9839321d4d4Shaesbaert 		if (mainstats.nconns == 1)
9849321d4d4Shaesbaert 			set_slice_timer(1);
98598487596Shenning 	}
98633ed67eeSclaudio 	if (!ptb->Uflag)
9870895ecf3Sclaudio 		freeaddrinfo(aitop);
988000a3a19Shaesbaert 	if (aib != NULL)
989000a3a19Shaesbaert 		freeaddrinfo(aib);
99098487596Shenning 
991654afd03Sclaudio 	if (ptb->vflag && nconn > 1)
992fd17a288Shaesbaert 		fprintf(stderr, "%d connections established\n",
993fd17a288Shaesbaert 		    mainstats.nconns);
994ea0bc011Sclaudio }
995ea0bc011Sclaudio 
99620e2e75bShaesbaert static int
99720e2e75bShaesbaert map_tos(char *s, int *val)
99820e2e75bShaesbaert {
99920e2e75bShaesbaert 	/* DiffServ Codepoints and other TOS mappings */
100020e2e75bShaesbaert 	const struct toskeywords {
100120e2e75bShaesbaert 		const char	*keyword;
100220e2e75bShaesbaert 		int		 val;
100320e2e75bShaesbaert 	} *t, toskeywords[] = {
100420e2e75bShaesbaert 		{ "af11",		IPTOS_DSCP_AF11 },
100520e2e75bShaesbaert 		{ "af12",		IPTOS_DSCP_AF12 },
100620e2e75bShaesbaert 		{ "af13",		IPTOS_DSCP_AF13 },
100720e2e75bShaesbaert 		{ "af21",		IPTOS_DSCP_AF21 },
100820e2e75bShaesbaert 		{ "af22",		IPTOS_DSCP_AF22 },
100920e2e75bShaesbaert 		{ "af23",		IPTOS_DSCP_AF23 },
101020e2e75bShaesbaert 		{ "af31",		IPTOS_DSCP_AF31 },
101120e2e75bShaesbaert 		{ "af32",		IPTOS_DSCP_AF32 },
101220e2e75bShaesbaert 		{ "af33",		IPTOS_DSCP_AF33 },
101320e2e75bShaesbaert 		{ "af41",		IPTOS_DSCP_AF41 },
101420e2e75bShaesbaert 		{ "af42",		IPTOS_DSCP_AF42 },
101520e2e75bShaesbaert 		{ "af43",		IPTOS_DSCP_AF43 },
101620e2e75bShaesbaert 		{ "critical",		IPTOS_PREC_CRITIC_ECP },
101720e2e75bShaesbaert 		{ "cs0",		IPTOS_DSCP_CS0 },
101820e2e75bShaesbaert 		{ "cs1",		IPTOS_DSCP_CS1 },
101920e2e75bShaesbaert 		{ "cs2",		IPTOS_DSCP_CS2 },
102020e2e75bShaesbaert 		{ "cs3",		IPTOS_DSCP_CS3 },
102120e2e75bShaesbaert 		{ "cs4",		IPTOS_DSCP_CS4 },
102220e2e75bShaesbaert 		{ "cs5",		IPTOS_DSCP_CS5 },
102320e2e75bShaesbaert 		{ "cs6",		IPTOS_DSCP_CS6 },
102420e2e75bShaesbaert 		{ "cs7",		IPTOS_DSCP_CS7 },
102520e2e75bShaesbaert 		{ "ef",			IPTOS_DSCP_EF },
102620e2e75bShaesbaert 		{ "inetcontrol",	IPTOS_PREC_INTERNETCONTROL },
102720e2e75bShaesbaert 		{ "lowdelay",		IPTOS_LOWDELAY },
102820e2e75bShaesbaert 		{ "netcontrol",		IPTOS_PREC_NETCONTROL },
102920e2e75bShaesbaert 		{ "reliability",	IPTOS_RELIABILITY },
103020e2e75bShaesbaert 		{ "throughput",		IPTOS_THROUGHPUT },
103120e2e75bShaesbaert 		{ NULL,			-1 },
103220e2e75bShaesbaert 	};
103320e2e75bShaesbaert 
103420e2e75bShaesbaert 	for (t = toskeywords; t->keyword != NULL; t++) {
103520e2e75bShaesbaert 		if (strcmp(s, t->keyword) == 0) {
103620e2e75bShaesbaert 			*val = t->val;
103720e2e75bShaesbaert 			return (1);
103820e2e75bShaesbaert 		}
103920e2e75bShaesbaert 	}
104020e2e75bShaesbaert 
104120e2e75bShaesbaert 	return (0);
104220e2e75bShaesbaert }
104320e2e75bShaesbaert 
1044eaf1d82aShenning static void
1045eaf1d82aShenning quit(int sig, short event, void *arg)
1046eaf1d82aShenning {
10476fb15185Sprocter 	wrapup(0);
10486fb15185Sprocter }
10496fb15185Sprocter 
10506fb15185Sprocter static void
10516fb15185Sprocter wrapup(int err)
10526fb15185Sprocter {
10536fb15185Sprocter 	const int transfers = timerisset(&mainstats.t_first);
10546fb15185Sprocter 	const int stats = (mainstats.floor_mbps != INFINITY);
10556fb15185Sprocter 
10566fb15185Sprocter 	if (transfers) {
10576fb15185Sprocter 		if (!stats) {
10586fb15185Sprocter 			if (UDP_MODE)
10596fb15185Sprocter 				udp_process_slice(0, 0, NULL);
10606fb15185Sprocter 			else
10616fb15185Sprocter 				tcp_process_slice(0, 0, NULL);
10626fb15185Sprocter 		}
10636fb15185Sprocter 
10646fb15185Sprocter 		summary_display();
10656fb15185Sprocter 	}
10666fb15185Sprocter 
10675ca842b4Ssthen 	if (err != -1)
10686fb15185Sprocter 		exit(err);
1069eaf1d82aShenning }
1070eaf1d82aShenning 
1071a556b9dbSbluhm static int
107267fb5732Sjan process_tls_opt(char *s)
107367fb5732Sjan {
107467fb5732Sjan 	size_t len;
107567fb5732Sjan 	char *v;
107667fb5732Sjan 
107767fb5732Sjan 	const struct tlskeywords {
107867fb5732Sjan 		const char	 *keyword;
107967fb5732Sjan 		char		**value;
108067fb5732Sjan 	} *t, tlskeywords[] = {
108167fb5732Sjan 		{ "ciphers",	&tls_ciphers },
108267fb5732Sjan 		{ "protocols",	&tls_protocols },
108367fb5732Sjan 		{ NULL,		NULL },
108467fb5732Sjan 	};
108567fb5732Sjan 
108667fb5732Sjan 	len = strlen(s);
108767fb5732Sjan 	if ((v = strchr(s, '=')) != NULL) {
108867fb5732Sjan 		len = v - s;
108967fb5732Sjan 		v++;
109067fb5732Sjan 	}
109167fb5732Sjan 
109267fb5732Sjan 	for (t = tlskeywords; t->keyword != NULL; t++) {
109367fb5732Sjan 		if (strlen(t->keyword) == len &&
109467fb5732Sjan 		    strncmp(s, t->keyword, len) == 0) {
109567fb5732Sjan 			if (v == NULL)
109667fb5732Sjan 				errx(1, "invalid tls value `%s'", s);
109767fb5732Sjan 			*t->value = v;
109867fb5732Sjan 			return 1;
109967fb5732Sjan 		}
110067fb5732Sjan 	}
110167fb5732Sjan 	return 0;
110267fb5732Sjan }
110367fb5732Sjan 
110467fb5732Sjan int
1105438193baSdjm main(int argc, char **argv)
1106438193baSdjm {
1107eaf1d82aShenning 	struct timeval tv;
11083b94b2cfShaesbaert 	unsigned int secs, rtable;
1109a4dd491bStobhe 	char *tmp;
1110aba69134Shaesbaert 	struct addrinfo *aitop, *aib, hints;
1111296aab8eSclaudio 	const char *errstr;
1112296aab8eSclaudio 	struct rlimit rl;
111367fb5732Sjan 	int ch, herr, nconn, usetls = 0;
11149f39e938Sdlg 	int family = PF_UNSPEC;
1115aba69134Shaesbaert 	const char *host = NULL, *port = DEFAULT_PORT, *srcbind = NULL;
11165ca842b4Ssthen 	struct event ev_sigint, ev_sigterm, ev_sighup, ev_siginfo, ev_progtimer;
111733ed67eeSclaudio 	struct sockaddr_un sock_un;
111867fb5732Sjan 	char *crtfile = NULL, *keyfile = NULL;
111967fb5732Sjan 	uint8_t *crt = NULL, *key = NULL;
112067fb5732Sjan 	size_t key_size, crt_size;
1121438193baSdjm 
1122654afd03Sclaudio 	/* Init world */
1123b9a887b6Smillert 	setvbuf(stdout, NULL, _IOLBF, 0);
1124654afd03Sclaudio 	ptb = &tcpbench;
1125654afd03Sclaudio 	ptb->dummybuf_len = 0;
11266b0ee4efSbluhm 	ptb->Dflag = 0;
112733ed67eeSclaudio 	ptb->Sflag = ptb->sflag = ptb->vflag = ptb->Rflag = ptb->Uflag = 0;
1128654afd03Sclaudio 	ptb->kvars = NULL;
1129654afd03Sclaudio 	ptb->rflag = DEFAULT_STATS_INTERVAL;
113020e2e75bShaesbaert 	ptb->Tflag = -1;
113167fb5732Sjan 	ptb->tls_cfg = NULL;
1132654afd03Sclaudio 	nconn = 1;
1133aba69134Shaesbaert 	aib = NULL;
1134eaf1d82aShenning 	secs = 0;
1135296aab8eSclaudio 
113667fb5732Sjan 	while ((ch = getopt(argc, argv, "46b:B:cC:Dhlk:K:n:p:Rr:sS:t:T:uUvV:"))
11376b0ee4efSbluhm 	    != -1) {
1138438193baSdjm 		switch (ch) {
11399f39e938Sdlg 		case '4':
11409f39e938Sdlg 			family = PF_INET;
11419f39e938Sdlg 			break;
11429f39e938Sdlg 		case '6':
11439f39e938Sdlg 			family = PF_INET6;
11449f39e938Sdlg 			break;
1145aba69134Shaesbaert 		case 'b':
1146aba69134Shaesbaert 			srcbind = optarg;
1147aba69134Shaesbaert 			break;
114867fb5732Sjan 		case 'c':
114967fb5732Sjan 			usetls = 1;
115067fb5732Sjan 			break;
115167fb5732Sjan 		case 'C':
115267fb5732Sjan 			crtfile = optarg;
115367fb5732Sjan 			break;
11546b0ee4efSbluhm 		case 'D':
11556b0ee4efSbluhm 			ptb->Dflag = 1;
11566b0ee4efSbluhm 			break;
1157438193baSdjm 		case 'l':
1158438193baSdjm 			list_kvars();
1159438193baSdjm 			exit(0);
1160438193baSdjm 		case 'k':
1161438193baSdjm 			if ((tmp = strdup(optarg)) == NULL)
116223ac3066Sbenno 				err(1, "strdup");
1163654afd03Sclaudio 			ptb->kvars = check_prepare_kvars(tmp);
1164438193baSdjm 			free(tmp);
1165438193baSdjm 			break;
116667fb5732Sjan 		case 'K':
116767fb5732Sjan 			keyfile = optarg;
116867fb5732Sjan 			break;
116933ed67eeSclaudio 		case 'R':
117033ed67eeSclaudio 			ptb->Rflag = 1;
117133ed67eeSclaudio 			break;
1172438193baSdjm 		case 'r':
1173654afd03Sclaudio 			ptb->rflag = strtonum(optarg, 0, 60 * 60 * 24 * 1000,
1174438193baSdjm 			    &errstr);
1175438193baSdjm 			if (errstr != NULL)
1176438193baSdjm 				errx(1, "statistics interval is %s: %s",
1177438193baSdjm 				    errstr, optarg);
1178438193baSdjm 			break;
1179438193baSdjm 		case 'p':
1180438193baSdjm 			port = optarg;
1181438193baSdjm 			break;
1182438193baSdjm 		case 's':
1183654afd03Sclaudio 			ptb->sflag = 1;
1184438193baSdjm 			break;
1185438193baSdjm 		case 'S':
1186654afd03Sclaudio 			ptb->Sflag = strtonum(optarg, 0, 1024*1024*1024,
1187438193baSdjm 			    &errstr);
1188438193baSdjm 			if (errstr != NULL)
11897847109bSbluhm 				errx(1, "socket buffer size is %s: %s",
1190438193baSdjm 				    errstr, optarg);
1191438193baSdjm 			break;
1192438193baSdjm 		case 'B':
1193654afd03Sclaudio 			ptb->dummybuf_len = strtonum(optarg, 0, 1024*1024*1024,
1194438193baSdjm 			    &errstr);
1195438193baSdjm 			if (errstr != NULL)
1196438193baSdjm 				errx(1, "read/write buffer size is %s: %s",
1197438193baSdjm 				    errstr, optarg);
1198438193baSdjm 			break;
1199438193baSdjm 		case 'v':
1200654afd03Sclaudio 			ptb->vflag++;
1201438193baSdjm 			break;
12021cbc9dd8Sclaudio 		case 'V':
12033b94b2cfShaesbaert 			rtable = (unsigned int)strtonum(optarg, 0,
12041cbc9dd8Sclaudio 			    RT_TABLEID_MAX, &errstr);
12051cbc9dd8Sclaudio 			if (errstr)
12068bb39f08Sguenther 				errx(1, "rtable value is %s: %s",
12071cbc9dd8Sclaudio 				    errstr, optarg);
12083b94b2cfShaesbaert 			if (setrtable(rtable) == -1)
12093b94b2cfShaesbaert 				err(1, "setrtable");
12101cbc9dd8Sclaudio 			break;
121198487596Shenning 		case 'n':
121298487596Shenning 			nconn = strtonum(optarg, 0, 65535, &errstr);
121398487596Shenning 			if (errstr != NULL)
121498487596Shenning 				errx(1, "number of connections is %s: %s",
121598487596Shenning 				    errstr, optarg);
121698487596Shenning 			break;
1217654afd03Sclaudio 		case 'u':
1218654afd03Sclaudio 			ptb->uflag = 1;
1219654afd03Sclaudio 			break;
122033ed67eeSclaudio 		case 'U':
122133ed67eeSclaudio 			ptb->Uflag = 1;
122233ed67eeSclaudio 			break;
122320e2e75bShaesbaert 		case 'T':
122467fb5732Sjan 			if (process_tls_opt(optarg))
122567fb5732Sjan 				break;
122620e2e75bShaesbaert 			if (map_tos(optarg, &ptb->Tflag))
122720e2e75bShaesbaert 				break;
122820e2e75bShaesbaert 			errstr = NULL;
122920e2e75bShaesbaert 			if (strlen(optarg) > 1 && optarg[0] == '0' &&
123020e2e75bShaesbaert 			    optarg[1] == 'x')
123120e2e75bShaesbaert 				ptb->Tflag = (int)strtol(optarg, NULL, 16);
123220e2e75bShaesbaert 			else
123320e2e75bShaesbaert 				ptb->Tflag = (int)strtonum(optarg, 0, 255,
123420e2e75bShaesbaert 				    &errstr);
123520e2e75bShaesbaert 			if (ptb->Tflag == -1 || ptb->Tflag > 255 || errstr)
123620e2e75bShaesbaert 				errx(1, "illegal tos value %s", optarg);
123720e2e75bShaesbaert 			break;
1238eaf1d82aShenning 		case 't':
1239eaf1d82aShenning 			secs = strtonum(optarg, 1, UINT_MAX, &errstr);
1240eaf1d82aShenning 			if (errstr != NULL)
1241eaf1d82aShenning 				errx(1, "secs is %s: %s",
1242eaf1d82aShenning 				    errstr, optarg);
1243eaf1d82aShenning 			break;
1244438193baSdjm 		case 'h':
1245438193baSdjm 		default:
1246438193baSdjm 			usage();
1247438193baSdjm 		}
1248438193baSdjm 	}
1249438193baSdjm 
12509bbabc61Sclaudio 	if (pledge("stdio unveil rpath dns inet unix id", NULL) == -1)
1251c60600c6Sbenno 		err(1, "pledge");
1252c60600c6Sbenno 
1253438193baSdjm 	argv += optind;
1254438193baSdjm 	argc -= optind;
125533ed67eeSclaudio 	if ((argc != (ptb->sflag && !ptb->Uflag ? 0 : 1)) ||
125667fb5732Sjan 	    (UDP_MODE && (ptb->kvars || nconn != 1 || usetls)))
1257438193baSdjm 		usage();
125898487596Shenning 
125967fb5732Sjan 	if (ptb->sflag && usetls && (crtfile == NULL || keyfile == NULL))
126067fb5732Sjan 		usage();
126167fb5732Sjan 
126267fb5732Sjan 	if (crtfile != NULL && keyfile != NULL) {
126367fb5732Sjan 		if ((crt = tls_load_file(crtfile, &crt_size, NULL)) == NULL)
126467fb5732Sjan 			err(1, "tls_load_file");
126567fb5732Sjan 		if ((key = tls_load_file(keyfile, &key_size, NULL)) == NULL)
126667fb5732Sjan 			err(1, "tls_load_file");
126767fb5732Sjan 	}
126867fb5732Sjan 
1269b2e783b6Sderaadt 	if (!ptb->sflag || ptb->Uflag)
12706fb15185Sprocter 		mainstats.host = host = argv[0];
1271b2e783b6Sderaadt 
1272b2e783b6Sderaadt 	if (ptb->Uflag)
1273b2e783b6Sderaadt 		if (unveil(host, "rwc") == -1)
1274bc5a8259Sbeck 			err(1, "unveil %s", host);
1275b2e783b6Sderaadt 
127633ed67eeSclaudio 	if (pledge("stdio id dns inet unix", NULL) == -1)
1277c60600c6Sbenno 		err(1, "pledge");
1278c60600c6Sbenno 
1279654afd03Sclaudio 	/*
1280654afd03Sclaudio 	 * Rationale,
1281654afd03Sclaudio 	 * If TCP, use a big buffer with big reads/writes.
1282654afd03Sclaudio 	 * If UDP, use a big buffer in server and a buffer the size of a
1283654afd03Sclaudio 	 * ethernet packet.
1284654afd03Sclaudio 	 */
1285654afd03Sclaudio 	if (!ptb->dummybuf_len) {
1286654afd03Sclaudio 		if (ptb->sflag || TCP_MODE)
1287654afd03Sclaudio 			ptb->dummybuf_len = DEFAULT_BUF;
1288654afd03Sclaudio 		else
1289654afd03Sclaudio 			ptb->dummybuf_len = DEFAULT_UDP_PKT;
1290654afd03Sclaudio 	}
1291438193baSdjm 
1292438193baSdjm 	bzero(&hints, sizeof(hints));
12939f39e938Sdlg 	hints.ai_family = family;
1294aba69134Shaesbaert 	if (UDP_MODE) {
1295654afd03Sclaudio 		hints.ai_socktype = SOCK_DGRAM;
1296aba69134Shaesbaert 		hints.ai_protocol = IPPROTO_UDP;
129793463c32Shaesbaert 	} else {
1298438193baSdjm 		hints.ai_socktype = SOCK_STREAM;
1299aba69134Shaesbaert 		hints.ai_protocol = IPPROTO_TCP;
1300aba69134Shaesbaert 	}
130133ed67eeSclaudio 	if (ptb->Uflag) {
130233ed67eeSclaudio 		hints.ai_family = AF_UNIX;
130333ed67eeSclaudio 		hints.ai_protocol = 0;
130433ed67eeSclaudio 		sock_un.sun_family = AF_UNIX;
130533ed67eeSclaudio 		if (strlcpy(sock_un.sun_path, host, sizeof(sock_un.sun_path)) >=
130633ed67eeSclaudio 		    sizeof(sock_un.sun_path))
130733ed67eeSclaudio 			errx(1, "socket name '%s' too long", host);
130833ed67eeSclaudio 		hints.ai_addr = (struct sockaddr *)&sock_un;
130933ed67eeSclaudio 		hints.ai_addrlen = sizeof(sock_un);
131033ed67eeSclaudio 		aitop = &hints;
131133ed67eeSclaudio 	} else {
1312654afd03Sclaudio 		if (ptb->sflag)
131398487596Shenning 			hints.ai_flags = AI_PASSIVE;
1314aba69134Shaesbaert 		if (srcbind != NULL) {
1315aba69134Shaesbaert 			hints.ai_flags |= AI_NUMERICHOST;
1316aba69134Shaesbaert 			herr = getaddrinfo(srcbind, NULL, &hints, &aib);
1317aba69134Shaesbaert 			hints.ai_flags &= ~AI_NUMERICHOST;
1318aba69134Shaesbaert 			if (herr != 0) {
1319aba69134Shaesbaert 				if (herr == EAI_SYSTEM)
1320aba69134Shaesbaert 					err(1, "getaddrinfo");
1321aba69134Shaesbaert 				else
132233ed67eeSclaudio 					errx(1, "getaddrinfo: %s",
132333ed67eeSclaudio 					    gai_strerror(herr));
1324aba69134Shaesbaert 			}
1325aba69134Shaesbaert 		}
1326438193baSdjm 		if ((herr = getaddrinfo(host, port, &hints, &aitop)) != 0) {
1327438193baSdjm 			if (herr == EAI_SYSTEM)
1328438193baSdjm 				err(1, "getaddrinfo");
1329438193baSdjm 			else
13300895ecf3Sclaudio 				errx(1, "getaddrinfo: %s", gai_strerror(herr));
1331438193baSdjm 		}
133233ed67eeSclaudio 	}
1333438193baSdjm 
133433ed67eeSclaudio 	if (pledge("stdio id inet unix", NULL) == -1)
1335c60600c6Sbenno 		err(1, "pledge");
1336c60600c6Sbenno 
1337296aab8eSclaudio 	if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1338296aab8eSclaudio 		err(1, "getrlimit");
1339296aab8eSclaudio 	if (rl.rlim_cur < MAX_FD)
1340296aab8eSclaudio 		rl.rlim_cur = MAX_FD;
1341296aab8eSclaudio 	if (setrlimit(RLIMIT_NOFILE, &rl))
1342296aab8eSclaudio 		err(1, "setrlimit");
1343296aab8eSclaudio 	if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1344296aab8eSclaudio 		err(1, "getrlimit");
1345296aab8eSclaudio 
134633ed67eeSclaudio 	if (pledge("stdio inet unix", NULL) == -1)
1347c60600c6Sbenno 		err(1, "pledge");
1348c60600c6Sbenno 
134967fb5732Sjan 	if (usetls) {
135067fb5732Sjan 		uint32_t protocols = 0;
135167fb5732Sjan 
135267fb5732Sjan 		if ((ptb->tls_cfg = tls_config_new()) == NULL)
135367fb5732Sjan 			errx(1, "unable to allocate TLS config");
135467fb5732Sjan 
135567fb5732Sjan 		if (ptb->sflag) {
135667fb5732Sjan 			if (tls_config_set_key_mem(ptb->tls_cfg, key,
135767fb5732Sjan 			    key_size) == -1)
135867fb5732Sjan 				errx(1, "%s", tls_config_error(ptb->tls_cfg));
135967fb5732Sjan 			if (tls_config_set_cert_mem(ptb->tls_cfg, crt,
136067fb5732Sjan 			    crt_size) == -1)
136167fb5732Sjan 				errx(1, "%s", tls_config_error(ptb->tls_cfg));
136267fb5732Sjan 		} else {
136367fb5732Sjan 			/* Don't check server certificate. */
136467fb5732Sjan 			tls_config_insecure_noverifyname(ptb->tls_cfg);
136567fb5732Sjan 			tls_config_insecure_noverifycert(ptb->tls_cfg);
136667fb5732Sjan 		}
136767fb5732Sjan 
136867fb5732Sjan 		if (tls_config_parse_protocols(&protocols, tls_protocols) == -1)
136967fb5732Sjan 			errx(1, "invalid TLS protocols `%s'", tls_protocols);
137067fb5732Sjan 		if (tls_config_set_protocols(ptb->tls_cfg, protocols) == -1)
137167fb5732Sjan 			errx(1, "%s", tls_config_error(ptb->tls_cfg));
137267fb5732Sjan 		if (tls_config_set_ciphers(ptb->tls_cfg, tls_ciphers) == -1)
137367fb5732Sjan 			errx(1, "%s", tls_config_error(ptb->tls_cfg));
137467fb5732Sjan 	}
137567fb5732Sjan 
1376654afd03Sclaudio 	/* Init world */
1377654afd03Sclaudio 	TAILQ_INIT(&sc_queue);
1378654afd03Sclaudio 	if ((ptb->dummybuf = malloc(ptb->dummybuf_len)) == NULL)
1379654afd03Sclaudio 		err(1, "malloc");
1380654afd03Sclaudio 	arc4random_buf(ptb->dummybuf, ptb->dummybuf_len);
1381438193baSdjm 
13826fb15185Sprocter 	timerclear(&mainstats.t_first);
13836fb15185Sprocter 	mainstats.floor_mbps = INFINITY;
13846fb15185Sprocter 
1385654afd03Sclaudio 	/* Setup libevent and signals */
1386654afd03Sclaudio 	event_init();
1387654afd03Sclaudio 	signal_set(&ev_sigterm, SIGTERM, signal_handler, NULL);
1388654afd03Sclaudio 	signal_set(&ev_sighup, SIGHUP, signal_handler, NULL);
1389654afd03Sclaudio 	signal_set(&ev_sigint, SIGINT, signal_handler, NULL);
13905ca842b4Ssthen 	signal_set(&ev_siginfo, SIGINFO, signal_handler, NULL);
1391654afd03Sclaudio 	signal_add(&ev_sigint, NULL);
1392654afd03Sclaudio 	signal_add(&ev_sigterm, NULL);
1393654afd03Sclaudio 	signal_add(&ev_sighup, NULL);
13945ca842b4Ssthen 	signal_add(&ev_siginfo, NULL);
1395654afd03Sclaudio 	signal(SIGPIPE, SIG_IGN);
1396654afd03Sclaudio 
139793463c32Shaesbaert 	if (UDP_MODE) {
139893463c32Shaesbaert 		if ((udp_sc = calloc(1, sizeof(*udp_sc))) == NULL)
139993463c32Shaesbaert 			err(1, "calloc");
140093463c32Shaesbaert 		udp_sc->fd = -1;
14016fb15185Sprocter 		evtimer_set(&mainstats.timer, udp_process_slice, NULL);
140293463c32Shaesbaert 	} else {
140393463c32Shaesbaert 		print_tcp_header();
1404654afd03Sclaudio 		evtimer_set(&mainstats.timer, tcp_process_slice, NULL);
140593463c32Shaesbaert 	}
1406654afd03Sclaudio 
140793463c32Shaesbaert 	if (ptb->sflag)
14086fb15185Sprocter 		server_init(aitop);
1409eaf1d82aShenning 	else {
1410eaf1d82aShenning 		if (secs > 0) {
1411eaf1d82aShenning 			timerclear(&tv);
1412eaf1d82aShenning 			tv.tv_sec = secs + 1;
1413eaf1d82aShenning 			evtimer_set(&ev_progtimer, quit, NULL);
1414eaf1d82aShenning 			evtimer_add(&ev_progtimer, &tv);
1415eaf1d82aShenning 		}
14166fb15185Sprocter 		client_init(aitop, nconn, aib);
1417c60600c6Sbenno 
14189bbabc61Sclaudio 		if (pledge("stdio inet", NULL) == -1)
1419c60600c6Sbenno 			err(1, "pledge");
1420eaf1d82aShenning 	}
1421654afd03Sclaudio 
1422654afd03Sclaudio 	/* libevent main loop*/
1423654afd03Sclaudio 	event_dispatch();
1424654afd03Sclaudio 
1425654afd03Sclaudio 	return (0);
1426438193baSdjm }
1427