| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601 | /* *  SSL/TLS stress testing program * *  Copyright (C) 2006-2010, Brainspark B.V. * *  This file is part of PolarSSL (http://www.polarssl.org) *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> * *  All rights reserved. * *  This program is free software; you can redistribute it and/or modify *  it under the terms of the GNU General Public License as published by *  the Free Software Foundation; either version 2 of the License, or *  (at your option) any later version. * *  This program is distributed in the hope that it will be useful, *  but WITHOUT ANY WARRANTY; without even the implied warranty of *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the *  GNU General Public License for more details. * *  You should have received a copy of the GNU General Public License along *  with this program; if not, write to the Free Software Foundation, Inc., *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. */#ifndef _CRT_SECURE_NO_DEPRECATE#define _CRT_SECURE_NO_DEPRECATE 1#endif#include <string.h>#include <stdlib.h>#ifdef PRINTF_STDLIB#include <stdio.h>#endif#ifdef PRINTF_CUSTOM#include "tinystdio.h"#endif#include "polarssl/config.h"#include "polarssl/net.h"#include "polarssl/ssl.h"#include "polarssl/havege.h"#include "polarssl/timing.h"#include "polarssl/certs.h"#define OPMODE_NONE             0#define OPMODE_CLIENT           1#define OPMODE_SERVER           2#define IOMODE_BLOCK            0#define IOMODE_NONBLOCK         1#define COMMAND_READ            1#define COMMAND_WRITE           2#define COMMAND_BOTH            3#define DFL_OPMODE              OPMODE_NONE#define DFL_IOMODE              IOMODE_BLOCK#define DFL_SERVER_NAME         "localhost"#define DFL_SERVER_PORT         4433#define DFL_COMMAND             COMMAND_READ#define DFL_BUFFER_SIZE         1024#define DFL_MAX_BYTES           0#define DFL_DEBUG_LEVEL         0#define DFL_CONN_TIMEOUT        0#define DFL_MAX_CONNECTIONS     0#define DFL_SESSION_REUSE       1#define DFL_SESSION_LIFETIME    86400#define DFL_FORCE_CIPHER        0/* * server-specific data */char *dhm_G = "4";char *dhm_P = "E4004C1F94182000103D883A448B3F802CE4B44A83301270002C20D0321CFD00" \"11CCEF784C26A400F43DFB901BCA7538F2C6B176001CF5A0FD16D2C48B1D0C1C" \"F6AC8E1DA6BCC3B4E1F96B0564965300FFA1D0B601EB2800F489AA512C4B248C" \"01F76949A60BB7F00A40B1EAB64BDD48E8A700D60B7F1200FA8E77B0A979DABF";int server_fd = -1;/* * global options */struct options{    int opmode;                 /* operation mode (client or server)    */    int iomode;                 /* I/O mode (blocking or non-blocking)  */    char *server_name;          /* hostname of the server (client only) */    int server_port;            /* port on which the ssl service runs   */    int command;                /* what to do: read or write operation  */    int buffer_size;            /* size of the send/receive buffer      */    int max_bytes;              /* max. # of bytes before a reconnect   */    int debug_level;            /* level of debugging                   */    int conn_timeout;           /* max. delay before a reconnect        */    int max_connections;        /* max. number of reconnections         */    int session_reuse;          /* flag to reuse the keying material    */    int session_lifetime;       /* if reached, session data is expired  */    int force_ciphersuite[2];   /* protocol/ciphersuite to use, or all  */};/* * Although this PRNG has good statistical properties (eg. passes * DIEHARD), it is not cryptographically secure. */unsigned long int lcppm5( unsigned long int *state ){    unsigned long int u, v;    u = v = state[4] ^ 1;    state[u & 3] ^= u;    u ^= (v << 12) ^ (v >> 12);    u ^= v * state[0]; v >>= 8;    u ^= v * state[1]; v >>= 8;    u ^= v * state[2]; v >>= 8;    u ^= v * state[3];    u &= 0xFFFFFFFF;    state[4] = u;    return( u );}void my_debug( void *ctx, int level, const char *str ){    if( level < ((struct options *) ctx)->debug_level )        fprintf( stderr, "%s", str );}#if !defined(POLARSSL_BIGNUM_C) || !defined(POLARSSL_HAVEGE_C) ||   \    !defined(POLARSSL_SSL_TLS_C) || !defined(POLARSSL_SSL_SRV_C) || \    !defined(POLARSSL_SSL_CLI_C) || !defined(POLARSSL_NET_C) ||     \    !defined(POLARSSL_RSA_C)int main( void ){    printf("POLARSSL_BIGNUM_C and/or POLARSSL_HAVEGE_C and/or "           "POLARSSL_SSL_TLS_C and/or POLARSSL_SSL_SRV_C and/or "           "POLARSSL_SSL_CLI_C and/or POLARSSL_NET_C and/or "           "POLARSSL_RSA_C not defined.\n");    return( 0 );}#else/* * perform a single SSL connection */static int ssl_test( struct options *opt ){    int ret, i;    int client_fd;    int bytes_to_read;    int bytes_to_write;    int offset_to_read = 0;    int offset_to_write = 0;    long int nb_read;    long int nb_written;    unsigned long read_state[5];    unsigned long write_state[5];    unsigned char *read_buf = NULL;    unsigned char *write_buf = NULL;    struct hr_time t;    havege_state hs;    ssl_context ssl;    ssl_session ssn;    x509_cert srvcert;    rsa_context rsa;    ret = 1;    havege_init( &hs );    get_timer( &t, 1 );    memset( read_state, 0, sizeof( read_state ) );    memset( write_state, 0, sizeof( write_state ) );    memset( &srvcert, 0, sizeof( x509_cert ) );    memset( &rsa, 0, sizeof( rsa_context ) );    if( opt->opmode == OPMODE_CLIENT )    {        if( ( ret = net_connect( &client_fd, opt->server_name,                                             opt->server_port ) ) != 0 )        {            printf( "  ! net_connect returned %d\n\n", ret );            return( ret );        }        if( ( ret = ssl_init( &ssl ) ) != 0 )        {            printf( "  ! ssl_init returned %d\n\n", ret );            return( ret );        }        ssl_set_endpoint( &ssl, SSL_IS_CLIENT );    }    if( opt->opmode == OPMODE_SERVER )    {#if !defined(POLARSSL_CERTS_C)        printf("POLARSSL_CERTS_C not defined.\n");        goto exit;#else        ret =  x509parse_crt( &srvcert, (unsigned char *) test_srv_crt,                              strlen( test_srv_crt ) );        if( ret != 0 )        {            printf( "  !  x509parse_crt returned %d\n\n", ret );            goto exit;        }        ret =  x509parse_crt( &srvcert, (unsigned char *) test_ca_crt,                              strlen( test_ca_crt ) );        if( ret != 0 )        {            printf( "  !  x509parse_crt returned %d\n\n", ret );            goto exit;        }        ret =  x509parse_key( &rsa, (unsigned char *) test_srv_key,                              strlen( test_srv_key ), NULL, 0 );        if( ret != 0 )        {            printf( "  !  x509parse_key returned %d\n\n", ret );            goto exit;        }#endif        if( server_fd < 0 )        {            if( ( ret = net_bind( &server_fd, NULL,                                   opt->server_port ) ) != 0 )            {                printf( "  ! net_bind returned %d\n\n", ret );                return( ret );            }        }        if( ( ret = net_accept( server_fd, &client_fd, NULL ) ) != 0 )        {            printf( "  ! net_accept returned %d\n\n", ret );            return( ret );        }        if( ( ret = ssl_init( &ssl ) ) != 0 )        {            printf( "  ! ssl_init returned %d\n\n", ret );            return( ret );        }        ssl_set_endpoint( &ssl, SSL_IS_SERVER );        ssl_set_dh_param( &ssl, dhm_P, dhm_G );        ssl_set_ca_chain( &ssl, srvcert.next, NULL, NULL );        ssl_set_own_cert( &ssl, &srvcert, &rsa );    }    ssl_set_authmode( &ssl, SSL_VERIFY_NONE );    ssl_set_rng( &ssl, havege_rand, &hs );    ssl_set_dbg( &ssl, my_debug, opt );    ssl_set_bio( &ssl, net_recv, &client_fd,                       net_send, &client_fd );    ssl_set_session( &ssl, opt->session_reuse,                           opt->session_lifetime, &ssn );    if( opt->force_ciphersuite[0] == DFL_FORCE_CIPHER )          ssl_set_ciphersuites( &ssl, ssl_default_ciphersuites );    else  ssl_set_ciphersuites( &ssl, opt->force_ciphersuite );    if( opt->iomode == IOMODE_NONBLOCK )        net_set_nonblock( client_fd );     read_buf = (unsigned char *) malloc( opt->buffer_size );    write_buf = (unsigned char *) malloc( opt->buffer_size );    if( read_buf == NULL || write_buf == NULL )    {        printf( "  ! malloc(%d bytes) failed\n\n", opt->buffer_size );        goto exit;    }    nb_read = bytes_to_read = 0;    nb_written = bytes_to_write = 0;    while( 1 )    {        if( opt->command & COMMAND_WRITE )        {            if( bytes_to_write == 0 )            {                while( bytes_to_write == 0 )                    bytes_to_write = rand() % opt->buffer_size;                for( i = 0; i < bytes_to_write; i++ )                    write_buf[i] = (unsigned char) lcppm5( write_state );                offset_to_write = 0;            }            ret = ssl_write( &ssl, write_buf + offset_to_write,                             bytes_to_write );            if( ret >= 0 )            {                nb_written += ret;                bytes_to_write  -= ret;                offset_to_write += ret;            }            if( ret == POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY ||                ret == POLARSSL_ERR_NET_CONN_RESET )            {                ret = 0;                goto exit;            }            if( ret < 0 && ret != POLARSSL_ERR_NET_WANT_READ &&                ret != POLARSSL_ERR_NET_WANT_WRITE )            {                printf( "  ! ssl_write returned %d\n\n", ret );                break;            }        }        if( opt->command & COMMAND_READ )        {            if( bytes_to_read == 0 )            {                bytes_to_read = rand() % opt->buffer_size;                offset_to_read = 0;            }            ret = ssl_read( &ssl, read_buf + offset_to_read,                            bytes_to_read );            if( ret >= 0 )            {                for( i = 0; i < ret; i++ )                {                    if( read_buf[offset_to_read + i] !=                        (unsigned char) lcppm5( read_state ) )                    {                        ret = 1;                        printf( "  ! plaintext mismatch\n\n" );                        goto exit;                    }                }                nb_read += ret;                bytes_to_read -= ret;                offset_to_read += ret;            }            if( ret == POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY ||                ret == POLARSSL_ERR_NET_CONN_RESET )            {                ret = 0;                goto exit;            }            if( ret < 0 && ret != POLARSSL_ERR_NET_WANT_READ &&                ret != POLARSSL_ERR_NET_WANT_WRITE )            {                printf( "  ! ssl_read returned %d\n\n", ret );                break;            }        }        ret = 0;        if( opt->max_bytes != 0 &&            ( opt->max_bytes <= nb_read ||              opt->max_bytes <= nb_written ) )            break;        if( opt->conn_timeout != 0 &&            opt->conn_timeout <= (int) get_timer( &t, 0 ) )            break;    }exit:    fflush( stdout );    if( read_buf != NULL )        free( read_buf );    if( write_buf != NULL )        free( write_buf );    ssl_close_notify( &ssl );    x509_free( &srvcert );    rsa_free( &rsa );    ssl_free( &ssl );    net_close( client_fd );    return( ret );}#define USAGE \    "\n usage: ssl_test opmode=<> command=<>...\n"               \    "\n acceptable parameters:\n"                                \    "    opmode=client/server        default: <none>\n"          \    "    iomode=block/nonblock       default: block\n"           \    "    server_name=%%s              default: localhost\n"      \    "    server_port=%%d              default: 4433\n"           \    "    command=read/write/both     default: read\n"            \    "    buffer_size=%%d (bytes)      default: 1024\n"           \    "    max_bytes=%%d (bytes)        default: 0 (no limit)\n"   \    "    debug_level=%%d              default: 0 (disabled)\n"   \    "    conn_timeout=%%d (ms)        default: 0 (no timeout)\n" \    "    max_connections=%%d          default: 0 (no limit)\n"   \    "    session_reuse=on/off        default: on (enabled)\n"    \    "    session_lifetime=%%d (s)     default: 86400\n"          \    "    force_ciphersuite=<name>    default: all enabled\n"     \    " acceptable ciphersuite names:\n" int main( int argc, char *argv[] ){    int i, j, n;    const int *list;    int ret = 1;    int nb_conn;    char *p, *q;    struct options opt;    if( argc == 1 )    {    usage:        printf( USAGE );                list = ssl_list_ciphersuites();        while( *list )        {            printf("    %s\n", ssl_get_ciphersuite_name( *list ) );            list++;        }        printf("\n");        goto exit;    }    opt.opmode                  = DFL_OPMODE;    opt.iomode                  = DFL_IOMODE;    opt.server_name             = DFL_SERVER_NAME;    opt.server_port             = DFL_SERVER_PORT;    opt.command                 = DFL_COMMAND;    opt.buffer_size             = DFL_BUFFER_SIZE;    opt.max_bytes               = DFL_MAX_BYTES;    opt.debug_level             = DFL_DEBUG_LEVEL;    opt.conn_timeout            = DFL_CONN_TIMEOUT;    opt.max_connections         = DFL_MAX_CONNECTIONS;    opt.session_reuse           = DFL_SESSION_REUSE;    opt.session_lifetime        = DFL_SESSION_LIFETIME;    opt.force_ciphersuite[0]    = DFL_FORCE_CIPHER;    for( i = 1; i < argc; i++ )    {        n = strlen( argv[i] );        for( j = 0; j < n; j++ )        {            if( argv[i][j] >= 'A' && argv[i][j] <= 'Z' )                argv[i][j] |= 0x20;        }        p = argv[i];        if( ( q = strchr( p, '=' ) ) == NULL )            continue;        *q++ = '\0';        if( strcmp( p, "opmode" ) == 0 )        {            if( strcmp( q, "client" ) == 0 )                opt.opmode = OPMODE_CLIENT;            else            if( strcmp( q, "server" ) == 0 )                opt.opmode = OPMODE_SERVER;            else goto usage;        }        if( strcmp( p, "iomode" ) == 0 )        {            if( strcmp( q, "block" ) == 0 )                opt.iomode = IOMODE_BLOCK;            else            if( strcmp( q, "nonblock" ) == 0 )                opt.iomode = IOMODE_NONBLOCK;            else goto usage;        }        if( strcmp( p, "server_name" ) == 0 )            opt.server_name = q;        if( strcmp( p, "server_port" ) == 0 )        {            opt.server_port = atoi( q );            if( opt.server_port < 1 || opt.server_port > 65535 )                goto usage;        }        if( strcmp( p, "command" ) == 0 )        {            if( strcmp( q, "read" ) == 0 )                opt.command = COMMAND_READ;            else            if( strcmp( q, "write" ) == 0 )                opt.command = COMMAND_WRITE;            else            if( strcmp( q, "both" ) == 0 )            {                opt.iomode  = IOMODE_NONBLOCK;                opt.command = COMMAND_BOTH;            }            else goto usage;        }        if( strcmp( p, "buffer_size" ) == 0 )        {            opt.buffer_size = atoi( q );            if( opt.buffer_size < 1 || opt.buffer_size > 1048576 )                goto usage;        }        if( strcmp( p, "max_bytes" ) == 0 )            opt.max_bytes = atoi( q );        if( strcmp( p, "debug_level" ) == 0 )            opt.debug_level = atoi( q );        if( strcmp( p, "conn_timeout" ) == 0 )            opt.conn_timeout = atoi( q );        if( strcmp( p, "max_connections" ) == 0 )            opt.max_connections = atoi( q );        if( strcmp( p, "session_reuse" ) == 0 )        {            if( strcmp( q, "on" ) == 0 )                opt.session_reuse = 1;            else            if( strcmp( q, "off" ) == 0 )                opt.session_reuse = 0;            else                goto usage;        }        if( strcmp( p, "session_lifetime" ) == 0 )            opt.session_lifetime = atoi( q );        if( strcmp( p, "force_ciphersuite" ) == 0 )        {            opt.force_ciphersuite[0] = -1;            opt.force_ciphersuite[0] = ssl_get_ciphersuite_id( q );            if( opt.force_ciphersuite[0] <= 0 )                goto usage;            opt.force_ciphersuite[1] = 0;        }    }    switch( opt.opmode )    {        case OPMODE_CLIENT:            break;        case OPMODE_SERVER:            break;        default:            goto usage;    }    nb_conn = 0;    do {        nb_conn++;        ret = ssl_test( &opt );        if( opt.max_connections != 0 &&            opt.max_connections <= nb_conn )            break;    }    while( ret == 0 );exit:#ifdef WIN32    printf( "  Press Enter to exit this program.\n" );    fflush( stdout ); getchar();#endif    return( ret );}#endif /* POLARSSL_BIGNUM_C && POLARSSL_HAVEGE_C && POLARSSL_SSL_TLS_C &&          POLARSSL_SSL_SRV_C && POLARSSL_SSL_CLI_C && POLARSSL_NET_C &&          POLARSSL_RSA_C */
 |