| /* |
| * iperf, Copyright (c) 2014-2022, The Regents of the University of |
| * California, through Lawrence Berkeley National Laboratory (subject |
| * to receipt of any required approvals from the U.S. Dept. of |
| * Energy). All rights reserved. |
| * |
| * If you have questions about your rights to use or distribute this |
| * software, please contact Berkeley Lab's Technology Transfer |
| * Department at TTD@lbl.gov. |
| * |
| * NOTICE. This software is owned by the U.S. Department of Energy. |
| * As such, the U.S. Government has been granted for itself and others |
| * acting on its behalf a paid-up, nonexclusive, irrevocable, |
| * worldwide license in the Software to reproduce, prepare derivative |
| * works, and perform publicly and display publicly. Beginning five |
| * (5) years after the date permission to assert copyright is obtained |
| * from the U.S. Department of Energy, and subject to any subsequent |
| * five (5) year renewals, the U.S. Government is granted for itself |
| * and others acting on its behalf a paid-up, nonexclusive, |
| * irrevocable, worldwide license in the Software to reproduce, |
| * prepare derivative works, distribute copies to the public, perform |
| * publicly and display publicly, and to permit others to do so. |
| * |
| * This code is distributed under a BSD style license, see the LICENSE file |
| * for complete information. |
| */ |
| #ifndef _GNU_SOURCE |
| # define _GNU_SOURCE |
| #endif |
| #define __USE_GNU |
| |
| #include "iperf_config.h" |
| |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <time.h> |
| #include <getopt.h> |
| #include <errno.h> |
| #include <signal.h> |
| #include <unistd.h> |
| #include <assert.h> |
| #include <fcntl.h> |
| #include <sys/socket.h> |
| #include <sys/types.h> |
| #include <netinet/in.h> |
| #include <arpa/inet.h> |
| #include <netdb.h> |
| #ifdef HAVE_STDINT_H |
| #include <stdint.h> |
| #endif |
| #include <sys/time.h> |
| #include <sys/resource.h> |
| #include <sys/mman.h> |
| #include <sys/stat.h> |
| #include <sched.h> |
| #include <setjmp.h> |
| #include <stdarg.h> |
| #include <math.h> |
| |
| #if defined(HAVE_CPUSET_SETAFFINITY) |
| #include <sys/param.h> |
| #include <sys/cpuset.h> |
| #endif /* HAVE_CPUSET_SETAFFINITY */ |
| |
| #if defined(__CYGWIN__) || defined(_WIN32) || defined(_WIN64) || defined(__WINDOWS__) |
| #define CPU_SETSIZE __CPU_SETSIZE |
| #endif /* __CYGWIN__, _WIN32, _WIN64, __WINDOWS__ */ |
| |
| #if defined(HAVE_SETPROCESSAFFINITYMASK) |
| #include <Windows.h> |
| #endif /* HAVE_SETPROCESSAFFINITYMASK */ |
| |
| #include "net.h" |
| #include "iperf.h" |
| #include "iperf_api.h" |
| #include "iperf_udp.h" |
| #include "iperf_tcp.h" |
| #if defined(HAVE_SCTP_H) |
| #include "iperf_sctp.h" |
| #endif /* HAVE_SCTP_H */ |
| #include "timer.h" |
| |
| #include "cjson.h" |
| #include "units.h" |
| #include "iperf_util.h" |
| #include "iperf_locale.h" |
| #include "version.h" |
| #if defined(HAVE_SSL) |
| #include <openssl/bio.h> |
| #include <openssl/err.h> |
| #include "iperf_auth.h" |
| #endif /* HAVE_SSL */ |
| |
| /* Forwards. */ |
| static int send_parameters(struct iperf_test *test); |
| static int get_parameters(struct iperf_test *test); |
| static int send_results(struct iperf_test *test); |
| static int get_results(struct iperf_test *test); |
| static int diskfile_send(struct iperf_stream *sp); |
| static int diskfile_recv(struct iperf_stream *sp); |
| static int JSON_write(int fd, cJSON *json); |
| static void print_interval_results(struct iperf_test *test, struct iperf_stream *sp, cJSON *json_interval_streams); |
| static cJSON *JSON_read(int fd); |
| |
| |
| /*************************** Print usage functions ****************************/ |
| |
| void |
| usage() |
| { |
| fputs(usage_shortstr, stderr); |
| } |
| |
| |
| void |
| usage_long(FILE *f) |
| { |
| fprintf(f, usage_longstr, DEFAULT_NO_MSG_RCVD_TIMEOUT, UDP_RATE / (1024*1024), DEFAULT_PACING_TIMER, DURATION, DEFAULT_TCP_BLKSIZE / 1024, DEFAULT_UDP_BLKSIZE); |
| } |
| |
| |
| void warning(const char *str) |
| { |
| fprintf(stderr, "warning: %s\n", str); |
| } |
| |
| |
| /************** Getter routines for some fields inside iperf_test *************/ |
| |
| int |
| iperf_get_verbose(struct iperf_test *ipt) |
| { |
| return ipt->verbose; |
| } |
| |
| int |
| iperf_get_control_socket(struct iperf_test *ipt) |
| { |
| return ipt->ctrl_sck; |
| } |
| |
| int |
| iperf_get_control_socket_mss(struct iperf_test *ipt) |
| { |
| return ipt->ctrl_sck_mss; |
| } |
| |
| int |
| iperf_get_test_omit(struct iperf_test *ipt) |
| { |
| return ipt->omit; |
| } |
| |
| int |
| iperf_get_test_duration(struct iperf_test *ipt) |
| { |
| return ipt->duration; |
| } |
| |
| uint64_t |
| iperf_get_test_rate(struct iperf_test *ipt) |
| { |
| return ipt->settings->rate; |
| } |
| |
| uint64_t |
| iperf_get_test_bitrate_limit(struct iperf_test *ipt) |
| { |
| return ipt->settings->bitrate_limit; |
| } |
| |
| double |
| iperf_get_test_bitrate_limit_interval(struct iperf_test *ipt) |
| { |
| return ipt->settings->bitrate_limit_interval; |
| } |
| |
| int |
| iperf_get_test_bitrate_limit_stats_per_interval(struct iperf_test *ipt) |
| { |
| return ipt->settings->bitrate_limit_stats_per_interval; |
| } |
| |
| uint64_t |
| iperf_get_test_fqrate(struct iperf_test *ipt) |
| { |
| return ipt->settings->fqrate; |
| } |
| |
| int |
| iperf_get_test_pacing_timer(struct iperf_test *ipt) |
| { |
| return ipt->settings->pacing_timer; |
| } |
| |
| uint64_t |
| iperf_get_test_bytes(struct iperf_test *ipt) |
| { |
| return (uint64_t) ipt->settings->bytes; |
| } |
| |
| uint64_t |
| iperf_get_test_blocks(struct iperf_test *ipt) |
| { |
| return (uint64_t) ipt->settings->blocks; |
| } |
| |
| int |
| iperf_get_test_burst(struct iperf_test *ipt) |
| { |
| return ipt->settings->burst; |
| } |
| |
| char |
| iperf_get_test_role(struct iperf_test *ipt) |
| { |
| return ipt->role; |
| } |
| |
| int |
| iperf_get_test_reverse(struct iperf_test *ipt) |
| { |
| return ipt->reverse; |
| } |
| |
| int |
| iperf_get_test_blksize(struct iperf_test *ipt) |
| { |
| return ipt->settings->blksize; |
| } |
| |
| FILE * |
| iperf_get_test_outfile (struct iperf_test *ipt) |
| { |
| return ipt->outfile; |
| } |
| |
| int |
| iperf_get_test_socket_bufsize(struct iperf_test *ipt) |
| { |
| return ipt->settings->socket_bufsize; |
| } |
| |
| double |
| iperf_get_test_reporter_interval(struct iperf_test *ipt) |
| { |
| return ipt->reporter_interval; |
| } |
| |
| double |
| iperf_get_test_stats_interval(struct iperf_test *ipt) |
| { |
| return ipt->stats_interval; |
| } |
| |
| int |
| iperf_get_test_num_streams(struct iperf_test *ipt) |
| { |
| return ipt->num_streams; |
| } |
| |
| int |
| iperf_get_test_timestamps(struct iperf_test *ipt) |
| { |
| return ipt->timestamps; |
| } |
| |
| const char * |
| iperf_get_test_timestamp_format(struct iperf_test *ipt) |
| { |
| return ipt->timestamp_format; |
| } |
| |
| int |
| iperf_get_test_repeating_payload(struct iperf_test *ipt) |
| { |
| return ipt->repeating_payload; |
| } |
| |
| int |
| iperf_get_test_bind_port(struct iperf_test *ipt) |
| { |
| return ipt->bind_port; |
| } |
| |
| int |
| iperf_get_test_server_port(struct iperf_test *ipt) |
| { |
| return ipt->server_port; |
| } |
| |
| char* |
| iperf_get_test_server_hostname(struct iperf_test *ipt) |
| { |
| return ipt->server_hostname; |
| } |
| |
| char* |
| iperf_get_test_template(struct iperf_test *ipt) |
| { |
| return ipt->tmp_template; |
| } |
| |
| int |
| iperf_get_test_protocol_id(struct iperf_test *ipt) |
| { |
| return ipt->protocol->id; |
| } |
| |
| int |
| iperf_get_test_json_output(struct iperf_test *ipt) |
| { |
| return ipt->json_output; |
| } |
| |
| char * |
| iperf_get_test_json_output_string(struct iperf_test *ipt) |
| { |
| return ipt->json_output_string; |
| } |
| |
| int |
| iperf_get_test_zerocopy(struct iperf_test *ipt) |
| { |
| return ipt->zerocopy; |
| } |
| |
| int |
| iperf_get_test_get_server_output(struct iperf_test *ipt) |
| { |
| return ipt->get_server_output; |
| } |
| |
| char |
| iperf_get_test_unit_format(struct iperf_test *ipt) |
| { |
| return ipt->settings->unit_format; |
| } |
| |
| char * |
| iperf_get_test_bind_address(struct iperf_test *ipt) |
| { |
| return ipt->bind_address; |
| } |
| |
| char * |
| iperf_get_test_bind_dev(struct iperf_test *ipt) |
| { |
| return ipt->bind_dev; |
| } |
| |
| int |
| iperf_get_test_udp_counters_64bit(struct iperf_test *ipt) |
| { |
| return ipt->udp_counters_64bit; |
| } |
| |
| int |
| iperf_get_test_one_off(struct iperf_test *ipt) |
| { |
| return ipt->one_off; |
| } |
| |
| int |
| iperf_get_test_tos(struct iperf_test *ipt) |
| { |
| return ipt->settings->tos; |
| } |
| |
| char * |
| iperf_get_test_extra_data(struct iperf_test *ipt) |
| { |
| return ipt->extra_data; |
| } |
| |
| static const char iperf_version[] = IPERF_VERSION; |
| char * |
| iperf_get_iperf_version(void) |
| { |
| return (char*)iperf_version; |
| } |
| |
| int |
| iperf_get_test_no_delay(struct iperf_test *ipt) |
| { |
| return ipt->no_delay; |
| } |
| |
| int |
| iperf_get_test_connect_timeout(struct iperf_test *ipt) |
| { |
| return ipt->settings->connect_timeout; |
| } |
| |
| int |
| iperf_get_test_idle_timeout(struct iperf_test *ipt) |
| { |
| return ipt->settings->idle_timeout; |
| } |
| |
| int |
| iperf_get_dont_fragment(struct iperf_test *ipt) |
| { |
| return ipt->settings->dont_fragment; |
| } |
| |
| struct iperf_time* |
| iperf_get_test_rcv_timeout(struct iperf_test *ipt) |
| { |
| return &ipt->settings->rcv_timeout; |
| } |
| |
| char* |
| iperf_get_test_congestion_control(struct iperf_test* ipt) |
| { |
| return ipt->congestion; |
| } |
| |
| int |
| iperf_get_test_mss(struct iperf_test *ipt) |
| { |
| return ipt->settings->mss; |
| } |
| |
| /************** Setter routines for some fields inside iperf_test *************/ |
| |
| void |
| iperf_set_verbose(struct iperf_test *ipt, int verbose) |
| { |
| ipt->verbose = verbose; |
| } |
| |
| void |
| iperf_set_control_socket(struct iperf_test *ipt, int ctrl_sck) |
| { |
| ipt->ctrl_sck = ctrl_sck; |
| } |
| |
| void |
| iperf_set_test_omit(struct iperf_test *ipt, int omit) |
| { |
| ipt->omit = omit; |
| } |
| |
| void |
| iperf_set_test_duration(struct iperf_test *ipt, int duration) |
| { |
| ipt->duration = duration; |
| } |
| |
| void |
| iperf_set_test_reporter_interval(struct iperf_test *ipt, double reporter_interval) |
| { |
| ipt->reporter_interval = reporter_interval; |
| } |
| |
| void |
| iperf_set_test_stats_interval(struct iperf_test *ipt, double stats_interval) |
| { |
| ipt->stats_interval = stats_interval; |
| } |
| |
| void |
| iperf_set_test_state(struct iperf_test *ipt, signed char state) |
| { |
| ipt->state = state; |
| } |
| |
| void |
| iperf_set_test_blksize(struct iperf_test *ipt, int blksize) |
| { |
| ipt->settings->blksize = blksize; |
| } |
| |
| void |
| iperf_set_test_logfile(struct iperf_test *ipt, const char *logfile) |
| { |
| ipt->logfile = strdup(logfile); |
| } |
| |
| void |
| iperf_set_test_rate(struct iperf_test *ipt, uint64_t rate) |
| { |
| ipt->settings->rate = rate; |
| } |
| |
| void |
| iperf_set_test_bitrate_limit_maximum(struct iperf_test *ipt, uint64_t total_rate) |
| { |
| ipt->settings->bitrate_limit = total_rate; |
| } |
| |
| void |
| iperf_set_test_bitrate_limit_interval(struct iperf_test *ipt, uint64_t bitrate_limit_interval) |
| { |
| ipt->settings->bitrate_limit_interval = bitrate_limit_interval; |
| } |
| |
| void |
| iperf_set_test_bitrate_limit_stats_per_interval(struct iperf_test *ipt, uint64_t bitrate_limit_stats_per_interval) |
| { |
| ipt->settings->bitrate_limit_stats_per_interval = bitrate_limit_stats_per_interval; |
| } |
| |
| void |
| iperf_set_test_fqrate(struct iperf_test *ipt, uint64_t fqrate) |
| { |
| ipt->settings->fqrate = fqrate; |
| } |
| |
| void |
| iperf_set_test_pacing_timer(struct iperf_test *ipt, int pacing_timer) |
| { |
| ipt->settings->pacing_timer = pacing_timer; |
| } |
| |
| void |
| iperf_set_test_bytes(struct iperf_test *ipt, uint64_t bytes) |
| { |
| ipt->settings->bytes = (iperf_size_t) bytes; |
| } |
| |
| void |
| iperf_set_test_blocks(struct iperf_test *ipt, uint64_t blocks) |
| { |
| ipt->settings->blocks = (iperf_size_t) blocks; |
| } |
| |
| void |
| iperf_set_test_burst(struct iperf_test *ipt, int burst) |
| { |
| ipt->settings->burst = burst; |
| } |
| |
| void |
| iperf_set_test_bind_port(struct iperf_test *ipt, int bind_port) |
| { |
| ipt->bind_port = bind_port; |
| } |
| |
| void |
| iperf_set_test_server_port(struct iperf_test *ipt, int srv_port) |
| { |
| ipt->server_port = srv_port; |
| } |
| |
| void |
| iperf_set_test_socket_bufsize(struct iperf_test *ipt, int socket_bufsize) |
| { |
| ipt->settings->socket_bufsize = socket_bufsize; |
| } |
| |
| void |
| iperf_set_test_num_streams(struct iperf_test *ipt, int num_streams) |
| { |
| ipt->num_streams = num_streams; |
| } |
| |
| void |
| iperf_set_test_repeating_payload(struct iperf_test *ipt, int repeating_payload) |
| { |
| ipt->repeating_payload = repeating_payload; |
| } |
| |
| void |
| iperf_set_test_timestamps(struct iperf_test *ipt, int timestamps) |
| { |
| ipt->timestamps = timestamps; |
| } |
| |
| void |
| iperf_set_test_timestamp_format(struct iperf_test *ipt, const char *tf) |
| { |
| ipt->timestamp_format = strdup(tf); |
| } |
| |
| static void |
| check_sender_has_retransmits(struct iperf_test *ipt) |
| { |
| if (ipt->mode != RECEIVER && ipt->protocol->id == Ptcp && has_tcpinfo_retransmits()) |
| ipt->sender_has_retransmits = 1; |
| else |
| ipt->sender_has_retransmits = 0; |
| } |
| |
| void |
| iperf_set_test_role(struct iperf_test *ipt, char role) |
| { |
| ipt->role = role; |
| if (!ipt->reverse) { |
| if (ipt->bidirectional) |
| ipt->mode = BIDIRECTIONAL; |
| else if (role == 'c') |
| ipt->mode = SENDER; |
| else if (role == 's') |
| ipt->mode = RECEIVER; |
| } else { |
| if (role == 'c') |
| ipt->mode = RECEIVER; |
| else if (role == 's') |
| ipt->mode = SENDER; |
| } |
| check_sender_has_retransmits(ipt); |
| } |
| |
| void |
| iperf_set_test_server_hostname(struct iperf_test *ipt, const char *server_hostname) |
| { |
| ipt->server_hostname = strdup(server_hostname); |
| } |
| |
| void |
| iperf_set_test_template(struct iperf_test *ipt, const char *tmp_template) |
| { |
| ipt->tmp_template = strdup(tmp_template); |
| } |
| |
| void |
| iperf_set_test_reverse(struct iperf_test *ipt, int reverse) |
| { |
| ipt->reverse = reverse; |
| if (!ipt->reverse) { |
| if (ipt->role == 'c') |
| ipt->mode = SENDER; |
| else if (ipt->role == 's') |
| ipt->mode = RECEIVER; |
| } else { |
| if (ipt->role == 'c') |
| ipt->mode = RECEIVER; |
| else if (ipt->role == 's') |
| ipt->mode = SENDER; |
| } |
| check_sender_has_retransmits(ipt); |
| } |
| |
| void |
| iperf_set_test_json_output(struct iperf_test *ipt, int json_output) |
| { |
| ipt->json_output = json_output; |
| } |
| |
| int |
| iperf_has_zerocopy( void ) |
| { |
| return has_sendfile(); |
| } |
| |
| void |
| iperf_set_test_zerocopy(struct iperf_test *ipt, int zerocopy) |
| { |
| ipt->zerocopy = (zerocopy && has_sendfile()); |
| } |
| |
| void |
| iperf_set_test_get_server_output(struct iperf_test *ipt, int get_server_output) |
| { |
| ipt->get_server_output = get_server_output; |
| } |
| |
| void |
| iperf_set_test_unit_format(struct iperf_test *ipt, char unit_format) |
| { |
| ipt->settings->unit_format = unit_format; |
| } |
| |
| #if defined(HAVE_SSL) |
| void |
| iperf_set_test_client_username(struct iperf_test *ipt, const char *client_username) |
| { |
| ipt->settings->client_username = strdup(client_username); |
| } |
| |
| void |
| iperf_set_test_client_password(struct iperf_test *ipt, const char *client_password) |
| { |
| ipt->settings->client_password = strdup(client_password); |
| } |
| |
| void |
| iperf_set_test_client_rsa_pubkey(struct iperf_test *ipt, const char *client_rsa_pubkey_base64) |
| { |
| ipt->settings->client_rsa_pubkey = load_pubkey_from_base64(client_rsa_pubkey_base64); |
| } |
| |
| void |
| iperf_set_test_server_authorized_users(struct iperf_test *ipt, const char *server_authorized_users) |
| { |
| ipt->server_authorized_users = strdup(server_authorized_users); |
| } |
| |
| void |
| iperf_set_test_server_skew_threshold(struct iperf_test *ipt, int server_skew_threshold) |
| { |
| ipt->server_skew_threshold = server_skew_threshold; |
| } |
| |
| void |
| iperf_set_test_server_rsa_privkey(struct iperf_test *ipt, const char *server_rsa_privkey_base64) |
| { |
| ipt->server_rsa_private_key = load_privkey_from_base64(server_rsa_privkey_base64); |
| } |
| #endif // HAVE_SSL |
| |
| void |
| iperf_set_test_bind_address(struct iperf_test *ipt, const char *bnd_address) |
| { |
| ipt->bind_address = strdup(bnd_address); |
| } |
| |
| void |
| iperf_set_test_bind_dev(struct iperf_test *ipt, char *bnd_dev) |
| { |
| ipt->bind_dev = strdup(bnd_dev); |
| } |
| |
| void |
| iperf_set_test_udp_counters_64bit(struct iperf_test *ipt, int udp_counters_64bit) |
| { |
| ipt->udp_counters_64bit = udp_counters_64bit; |
| } |
| |
| void |
| iperf_set_test_one_off(struct iperf_test *ipt, int one_off) |
| { |
| ipt->one_off = one_off; |
| } |
| |
| void |
| iperf_set_test_tos(struct iperf_test *ipt, int tos) |
| { |
| ipt->settings->tos = tos; |
| } |
| |
| void |
| iperf_set_test_extra_data(struct iperf_test *ipt, const char *dat) |
| { |
| ipt->extra_data = strdup(dat); |
| } |
| |
| void |
| iperf_set_test_bidirectional(struct iperf_test* ipt, int bidirectional) |
| { |
| ipt->bidirectional = bidirectional; |
| if (bidirectional) |
| ipt->mode = BIDIRECTIONAL; |
| else |
| iperf_set_test_reverse(ipt, ipt->reverse); |
| } |
| |
| void |
| iperf_set_test_no_delay(struct iperf_test* ipt, int no_delay) |
| { |
| ipt->no_delay = no_delay; |
| } |
| |
| void |
| iperf_set_test_connect_timeout(struct iperf_test* ipt, int ct) |
| { |
| ipt->settings->connect_timeout = ct; |
| } |
| |
| void |
| iperf_set_test_idle_timeout(struct iperf_test* ipt, int to) |
| { |
| ipt->settings->idle_timeout = to; |
| } |
| |
| void |
| iperf_set_dont_fragment(struct iperf_test* ipt, int dnf) |
| { |
| ipt->settings->dont_fragment = dnf; |
| } |
| |
| void |
| iperf_set_test_rcv_timeout(struct iperf_test* ipt, struct iperf_time* to) |
| { |
| ipt->settings->rcv_timeout.secs = to->secs; |
| ipt->settings->rcv_timeout.usecs = to->usecs; |
| } |
| |
| void |
| iperf_set_test_congestion_control(struct iperf_test* ipt, char* cc) |
| { |
| ipt->congestion = strdup(cc); |
| } |
| |
| void |
| iperf_set_test_mss(struct iperf_test *ipt, int mss) |
| { |
| ipt->settings->mss = mss; |
| } |
| |
| /********************** Get/set test protocol structure ***********************/ |
| |
| struct protocol * |
| get_protocol(struct iperf_test *test, int prot_id) |
| { |
| struct protocol *prot; |
| |
| SLIST_FOREACH(prot, &test->protocols, protocols) { |
| if (prot->id == prot_id) |
| break; |
| } |
| |
| if (prot == NULL) |
| i_errno = IEPROTOCOL; |
| |
| return prot; |
| } |
| |
| int |
| set_protocol(struct iperf_test *test, int prot_id) |
| { |
| struct protocol *prot = NULL; |
| |
| SLIST_FOREACH(prot, &test->protocols, protocols) { |
| if (prot->id == prot_id) { |
| test->protocol = prot; |
| check_sender_has_retransmits(test); |
| return 0; |
| } |
| } |
| |
| i_errno = IEPROTOCOL; |
| return -1; |
| } |
| |
| |
| /************************** Iperf callback functions **************************/ |
| |
| void |
| iperf_on_new_stream(struct iperf_stream *sp) |
| { |
| connect_msg(sp); |
| } |
| |
| void |
| iperf_on_test_start(struct iperf_test *test) |
| { |
| if (test->json_output) { |
| cJSON_AddItemToObject(test->json_start, "test_start", iperf_json_printf("protocol: %s num_streams: %d blksize: %d omit: %d duration: %d bytes: %d blocks: %d reverse: %d tos: %d target_bitrate: %d", test->protocol->name, (int64_t) test->num_streams, (int64_t) test->settings->blksize, (int64_t) test->omit, (int64_t) test->duration, (int64_t) test->settings->bytes, (int64_t) test->settings->blocks, test->reverse?(int64_t)1:(int64_t)0, (int64_t) test->settings->tos, (int64_t) test->settings->rate)); |
| } else { |
| if (test->verbose) { |
| if (test->settings->bytes) |
| iperf_printf(test, test_start_bytes, test->protocol->name, test->num_streams, test->settings->blksize, test->omit, test->settings->bytes, test->settings->tos); |
| else if (test->settings->blocks) |
| iperf_printf(test, test_start_blocks, test->protocol->name, test->num_streams, test->settings->blksize, test->omit, test->settings->blocks, test->settings->tos); |
| else |
| iperf_printf(test, test_start_time, test->protocol->name, test->num_streams, test->settings->blksize, test->omit, test->duration, test->settings->tos); |
| } |
| } |
| } |
| |
| /* This converts an IPv6 string address from IPv4-mapped format into regular |
| ** old IPv4 format, which is easier on the eyes of network veterans. |
| ** |
| ** If the v6 address is not v4-mapped it is left alone. |
| */ |
| static void |
| mapped_v4_to_regular_v4(char *str) |
| { |
| char *prefix = "::ffff:"; |
| int prefix_len; |
| |
| prefix_len = strlen(prefix); |
| if (strncmp(str, prefix, prefix_len) == 0) { |
| int str_len = strlen(str); |
| memmove(str, str + prefix_len, str_len - prefix_len + 1); |
| } |
| } |
| |
| void |
| iperf_on_connect(struct iperf_test *test) |
| { |
| time_t now_secs; |
| const char* rfc1123_fmt = "%a, %d %b %Y %H:%M:%S %Z"; |
| char now_str[100]; |
| char ipr[INET6_ADDRSTRLEN]; |
| int port; |
| struct sockaddr_storage sa; |
| struct sockaddr_in *sa_inP; |
| struct sockaddr_in6 *sa_in6P; |
| socklen_t len; |
| |
| now_secs = time((time_t*) 0); |
| (void) strftime(now_str, sizeof(now_str), rfc1123_fmt, gmtime(&now_secs)); |
| if (test->json_output) |
| cJSON_AddItemToObject(test->json_start, "timestamp", iperf_json_printf("time: %s timesecs: %d", now_str, (int64_t) now_secs)); |
| else if (test->verbose) |
| iperf_printf(test, report_time, now_str); |
| |
| if (test->role == 'c') { |
| if (test->json_output) |
| cJSON_AddItemToObject(test->json_start, "connecting_to", iperf_json_printf("host: %s port: %d", test->server_hostname, (int64_t) test->server_port)); |
| else { |
| iperf_printf(test, report_connecting, test->server_hostname, test->server_port); |
| if (test->reverse) |
| iperf_printf(test, report_reverse, test->server_hostname); |
| } |
| } else { |
| len = sizeof(sa); |
| getpeername(test->ctrl_sck, (struct sockaddr *) &sa, &len); |
| if (getsockdomain(test->ctrl_sck) == AF_INET) { |
| sa_inP = (struct sockaddr_in *) &sa; |
| inet_ntop(AF_INET, &sa_inP->sin_addr, ipr, sizeof(ipr)); |
| port = ntohs(sa_inP->sin_port); |
| } else { |
| sa_in6P = (struct sockaddr_in6 *) &sa; |
| inet_ntop(AF_INET6, &sa_in6P->sin6_addr, ipr, sizeof(ipr)); |
| port = ntohs(sa_in6P->sin6_port); |
| } |
| mapped_v4_to_regular_v4(ipr); |
| if (test->json_output) |
| cJSON_AddItemToObject(test->json_start, "accepted_connection", iperf_json_printf("host: %s port: %d", ipr, (int64_t) port)); |
| else |
| iperf_printf(test, report_accepted, ipr, port); |
| } |
| if (test->json_output) { |
| cJSON_AddStringToObject(test->json_start, "cookie", test->cookie); |
| if (test->protocol->id == SOCK_STREAM) { |
| if (test->settings->mss) |
| cJSON_AddNumberToObject(test->json_start, "tcp_mss", test->settings->mss); |
| else { |
| cJSON_AddNumberToObject(test->json_start, "tcp_mss_default", test->ctrl_sck_mss); |
| } |
| } |
| cJSON_AddNumberToObject(test->json_start, "target_bitrate", test->settings->rate); |
| } else if (test->verbose) { |
| iperf_printf(test, report_cookie, test->cookie); |
| if (test->protocol->id == SOCK_STREAM) { |
| if (test->settings->mss) |
| iperf_printf(test, " TCP MSS: %d\n", test->settings->mss); |
| else { |
| iperf_printf(test, " TCP MSS: %d (default)\n", test->ctrl_sck_mss); |
| } |
| } |
| if (test->settings->rate) |
| iperf_printf(test, " Target Bitrate: %"PRIu64"\n", test->settings->rate); |
| } |
| } |
| |
| void |
| iperf_on_test_finish(struct iperf_test *test) |
| { |
| } |
| |
| |
| /******************************************************************************/ |
| |
| /* |
| * iperf_parse_hostname tries to split apart a string into hostname % |
| * interface parts, which are returned in **p and **p1, if they |
| * exist. If the %interface part is detected, and it's not an IPv6 |
| * link local address, then returns 1, else returns 0. |
| * |
| * Modifies the string pointed to by spec in-place due to the use of |
| * strtok(3). The caller should strdup(3) or otherwise copy the string |
| * if an unmodified copy is needed. |
| */ |
| int |
| iperf_parse_hostname(struct iperf_test *test, char *spec, char **p, char **p1) { |
| struct in6_addr ipv6_addr; |
| |
| // Format is <addr>[%<device>] |
| if ((*p = strtok(spec, "%")) != NULL && |
| (*p1 = strtok(NULL, "%")) != NULL) { |
| |
| /* |
| * If an IPv6 literal for a link-local address, then |
| * tell the caller to leave the "%" in the hostname. |
| */ |
| if (inet_pton(AF_INET6, *p, &ipv6_addr) == 1 && |
| IN6_IS_ADDR_LINKLOCAL(&ipv6_addr)) { |
| if (test->debug) { |
| iperf_printf(test, "IPv6 link-local address literal detected\n"); |
| } |
| return 0; |
| } |
| /* |
| * Other kind of address or FQDN. The interface name after |
| * "%" is a shorthand for --bind-dev. |
| */ |
| else { |
| if (test->debug) { |
| iperf_printf(test, "p %s p1 %s\n", *p, *p1); |
| } |
| return 1; |
| } |
| } |
| else { |
| if (test->debug) { |
| iperf_printf(test, "noparse\n"); |
| } |
| return 0; |
| } |
| } |
| |
| int |
| iperf_parse_arguments(struct iperf_test *test, int argc, char **argv) |
| { |
| static struct option longopts[] = |
| { |
| {"port", required_argument, NULL, 'p'}, |
| {"format", required_argument, NULL, 'f'}, |
| {"interval", required_argument, NULL, 'i'}, |
| {"daemon", no_argument, NULL, 'D'}, |
| {"one-off", no_argument, NULL, '1'}, |
| {"verbose", no_argument, NULL, 'V'}, |
| {"json", no_argument, NULL, 'J'}, |
| {"version", no_argument, NULL, 'v'}, |
| {"server", no_argument, NULL, 's'}, |
| {"client", required_argument, NULL, 'c'}, |
| {"udp", no_argument, NULL, 'u'}, |
| {"bitrate", required_argument, NULL, 'b'}, |
| {"bandwidth", required_argument, NULL, 'b'}, |
| {"server-bitrate-limit", required_argument, NULL, OPT_SERVER_BITRATE_LIMIT}, |
| {"time", required_argument, NULL, 't'}, |
| {"bytes", required_argument, NULL, 'n'}, |
| {"blockcount", required_argument, NULL, 'k'}, |
| {"length", required_argument, NULL, 'l'}, |
| {"parallel", required_argument, NULL, 'P'}, |
| {"reverse", no_argument, NULL, 'R'}, |
| {"bidir", no_argument, NULL, OPT_BIDIRECTIONAL}, |
| {"window", required_argument, NULL, 'w'}, |
| {"bind", required_argument, NULL, 'B'}, |
| #if defined(HAVE_SO_BINDTODEVICE) |
| {"bind-dev", required_argument, NULL, OPT_BIND_DEV}, |
| #endif /* HAVE_SO_BINDTODEVICE */ |
| {"cport", required_argument, NULL, OPT_CLIENT_PORT}, |
| {"set-mss", required_argument, NULL, 'M'}, |
| {"no-delay", no_argument, NULL, 'N'}, |
| {"version4", no_argument, NULL, '4'}, |
| {"version6", no_argument, NULL, '6'}, |
| {"tos", required_argument, NULL, 'S'}, |
| {"dscp", required_argument, NULL, OPT_DSCP}, |
| {"extra-data", required_argument, NULL, OPT_EXTRA_DATA}, |
| #if defined(HAVE_FLOWLABEL) |
| {"flowlabel", required_argument, NULL, 'L'}, |
| #endif /* HAVE_FLOWLABEL */ |
| {"zerocopy", no_argument, NULL, 'Z'}, |
| {"omit", required_argument, NULL, 'O'}, |
| {"file", required_argument, NULL, 'F'}, |
| {"repeating-payload", no_argument, NULL, OPT_REPEATING_PAYLOAD}, |
| {"timestamps", optional_argument, NULL, OPT_TIMESTAMPS}, |
| #if defined(HAVE_CPU_AFFINITY) |
| {"affinity", required_argument, NULL, 'A'}, |
| #endif /* HAVE_CPU_AFFINITY */ |
| {"title", required_argument, NULL, 'T'}, |
| #if defined(HAVE_TCP_CONGESTION) |
| {"congestion", required_argument, NULL, 'C'}, |
| {"linux-congestion", required_argument, NULL, 'C'}, |
| #endif /* HAVE_TCP_CONGESTION */ |
| #if defined(HAVE_SCTP_H) |
| {"sctp", no_argument, NULL, OPT_SCTP}, |
| {"nstreams", required_argument, NULL, OPT_NUMSTREAMS}, |
| {"xbind", required_argument, NULL, 'X'}, |
| #endif |
| {"pidfile", required_argument, NULL, 'I'}, |
| {"logfile", required_argument, NULL, OPT_LOGFILE}, |
| {"forceflush", no_argument, NULL, OPT_FORCEFLUSH}, |
| {"get-server-output", no_argument, NULL, OPT_GET_SERVER_OUTPUT}, |
| {"udp-counters-64bit", no_argument, NULL, OPT_UDP_COUNTERS_64BIT}, |
| {"no-fq-socket-pacing", no_argument, NULL, OPT_NO_FQ_SOCKET_PACING}, |
| #if defined(HAVE_DONT_FRAGMENT) |
| {"dont-fragment", no_argument, NULL, OPT_DONT_FRAGMENT}, |
| #endif /* HAVE_DONT_FRAGMENT */ |
| #if defined(HAVE_SSL) |
| {"username", required_argument, NULL, OPT_CLIENT_USERNAME}, |
| {"rsa-public-key-path", required_argument, NULL, OPT_CLIENT_RSA_PUBLIC_KEY}, |
| {"rsa-private-key-path", required_argument, NULL, OPT_SERVER_RSA_PRIVATE_KEY}, |
| {"authorized-users-path", required_argument, NULL, OPT_SERVER_AUTHORIZED_USERS}, |
| {"time-skew-threshold", required_argument, NULL, OPT_SERVER_SKEW_THRESHOLD}, |
| #endif /* HAVE_SSL */ |
| {"fq-rate", required_argument, NULL, OPT_FQ_RATE}, |
| {"pacing-timer", required_argument, NULL, OPT_PACING_TIMER}, |
| {"connect-timeout", required_argument, NULL, OPT_CONNECT_TIMEOUT}, |
| {"idle-timeout", required_argument, NULL, OPT_IDLE_TIMEOUT}, |
| {"rcv-timeout", required_argument, NULL, OPT_RCV_TIMEOUT}, |
| {"snd-timeout", required_argument, NULL, OPT_SND_TIMEOUT}, |
| {"debug", optional_argument, NULL, 'd'}, |
| {"help", no_argument, NULL, 'h'}, |
| {NULL, 0, NULL, 0} |
| }; |
| int flag; |
| int portno; |
| int blksize; |
| int server_flag, client_flag, rate_flag, duration_flag, rcv_timeout_flag, snd_timeout_flag; |
| char *endptr; |
| #if defined(HAVE_CPU_AFFINITY) |
| char* comma; |
| #endif /* HAVE_CPU_AFFINITY */ |
| char* slash; |
| char *p, *p1; |
| struct xbind_entry *xbe; |
| double farg; |
| int rcv_timeout_in = 0; |
| |
| blksize = 0; |
| server_flag = client_flag = rate_flag = duration_flag = rcv_timeout_flag = snd_timeout_flag =0; |
| #if defined(HAVE_SSL) |
| char *client_username = NULL, *client_rsa_public_key = NULL, *server_rsa_private_key = NULL; |
| #endif /* HAVE_SSL */ |
| |
| while ((flag = getopt_long(argc, argv, "p:f:i:D1VJvsc:ub:t:n:k:l:P:Rw:B:M:N46S:L:ZO:F:A:T:C:dI:hX:", longopts, NULL)) != -1) { |
| switch (flag) { |
| case 'p': |
| portno = atoi(optarg); |
| if (portno < 1 || portno > 65535) { |
| i_errno = IEBADPORT; |
| return -1; |
| } |
| test->server_port = portno; |
| break; |
| case 'f': |
| if (!optarg) { |
| i_errno = IEBADFORMAT; |
| return -1; |
| } |
| test->settings->unit_format = *optarg; |
| if (test->settings->unit_format == 'k' || |
| test->settings->unit_format == 'K' || |
| test->settings->unit_format == 'm' || |
| test->settings->unit_format == 'M' || |
| test->settings->unit_format == 'g' || |
| test->settings->unit_format == 'G' || |
| test->settings->unit_format == 't' || |
| test->settings->unit_format == 'T') { |
| break; |
| } |
| else { |
| i_errno = IEBADFORMAT; |
| return -1; |
| } |
| break; |
| case 'i': |
| /* XXX: could potentially want separate stat collection and reporting intervals, |
| but just set them to be the same for now */ |
| test->stats_interval = test->reporter_interval = atof(optarg); |
| if ((test->stats_interval < MIN_INTERVAL || test->stats_interval > MAX_INTERVAL) && test->stats_interval != 0) { |
| i_errno = IEINTERVAL; |
| return -1; |
| } |
| break; |
| case 'D': |
| test->daemon = 1; |
| server_flag = 1; |
| break; |
| case '1': |
| test->one_off = 1; |
| server_flag = 1; |
| break; |
| case 'V': |
| test->verbose = 1; |
| break; |
| case 'J': |
| test->json_output = 1; |
| break; |
| case 'v': |
| printf("%s (cJSON %s)\n%s\n%s\n", version, cJSON_Version(), get_system_info(), |
| get_optional_features()); |
| exit(0); |
| case 's': |
| if (test->role == 'c') { |
| i_errno = IESERVCLIENT; |
| return -1; |
| } |
| iperf_set_test_role(test, 's'); |
| break; |
| case 'c': |
| if (test->role == 's') { |
| i_errno = IESERVCLIENT; |
| return -1; |
| } |
| iperf_set_test_role(test, 'c'); |
| iperf_set_test_server_hostname(test, optarg); |
| |
| if (iperf_parse_hostname(test, optarg, &p, &p1)) { |
| #if defined(HAVE_SO_BINDTODEVICE) |
| /* Get rid of the hostname we saved earlier. */ |
| free(iperf_get_test_server_hostname(test)); |
| iperf_set_test_server_hostname(test, p); |
| iperf_set_test_bind_dev(test, p1); |
| #else /* HAVE_SO_BINDTODEVICE */ |
| i_errno = IEBINDDEVNOSUPPORT; |
| return -1; |
| #endif /* HAVE_SO_BINDTODEVICE */ |
| } |
| break; |
| case 'u': |
| set_protocol(test, Pudp); |
| client_flag = 1; |
| break; |
| case OPT_SCTP: |
| #if defined(HAVE_SCTP_H) |
| set_protocol(test, Psctp); |
| client_flag = 1; |
| break; |
| #else /* HAVE_SCTP_H */ |
| i_errno = IEUNIMP; |
| return -1; |
| #endif /* HAVE_SCTP_H */ |
| |
| case OPT_NUMSTREAMS: |
| #if defined(linux) || defined(__FreeBSD__) |
| test->settings->num_ostreams = unit_atoi(optarg); |
| client_flag = 1; |
| #else /* linux */ |
| i_errno = IEUNIMP; |
| return -1; |
| #endif /* linux */ |
| case 'b': |
| slash = strchr(optarg, '/'); |
| if (slash) { |
| *slash = '\0'; |
| ++slash; |
| test->settings->burst = atoi(slash); |
| if (test->settings->burst <= 0 || |
| test->settings->burst > MAX_BURST) { |
| i_errno = IEBURST; |
| return -1; |
| } |
| } |
| test->settings->rate = unit_atof_rate(optarg); |
| rate_flag = 1; |
| client_flag = 1; |
| break; |
| case OPT_SERVER_BITRATE_LIMIT: |
| slash = strchr(optarg, '/'); |
| if (slash) { |
| *slash = '\0'; |
| ++slash; |
| test->settings->bitrate_limit_interval = atof(slash); |
| if (test->settings->bitrate_limit_interval != 0 && /* Using same Max/Min limits as for Stats Interval */ |
| (test->settings->bitrate_limit_interval < MIN_INTERVAL || test->settings->bitrate_limit_interval > MAX_INTERVAL) ) { |
| i_errno = IETOTALINTERVAL; |
| return -1; |
| } |
| } |
| test->settings->bitrate_limit = unit_atof_rate(optarg); |
| server_flag = 1; |
| break; |
| case 't': |
| test->duration = atoi(optarg); |
| if (test->duration > MAX_TIME) { |
| i_errno = IEDURATION; |
| return -1; |
| } |
| duration_flag = 1; |
| client_flag = 1; |
| break; |
| case 'n': |
| test->settings->bytes = unit_atoi(optarg); |
| client_flag = 1; |
| break; |
| case 'k': |
| test->settings->blocks = unit_atoi(optarg); |
| client_flag = 1; |
| break; |
| case 'l': |
| blksize = unit_atoi(optarg); |
| client_flag = 1; |
| break; |
| case 'P': |
| test->num_streams = atoi(optarg); |
| if (test->num_streams > MAX_STREAMS) { |
| i_errno = IENUMSTREAMS; |
| return -1; |
| } |
| client_flag = 1; |
| break; |
| case 'R': |
| if (test->bidirectional) { |
| i_errno = IEREVERSEBIDIR; |
| return -1; |
| } |
| iperf_set_test_reverse(test, 1); |
| client_flag = 1; |
| break; |
| case OPT_BIDIRECTIONAL: |
| if (test->reverse) { |
| i_errno = IEREVERSEBIDIR; |
| return -1; |
| } |
| iperf_set_test_bidirectional(test, 1); |
| client_flag = 1; |
| break; |
| case 'w': |
| // XXX: This is a socket buffer, not specific to TCP |
| // Do sanity checks as double-precision floating point |
| // to avoid possible integer overflows. |
| farg = unit_atof(optarg); |
| if (farg > (double) MAX_TCP_BUFFER) { |
| i_errno = IEBUFSIZE; |
| return -1; |
| } |
| test->settings->socket_bufsize = (int) farg; |
| client_flag = 1; |
| break; |
| |
| case 'B': |
| iperf_set_test_bind_address(test, optarg); |
| |
| if (iperf_parse_hostname(test, optarg, &p, &p1)) { |
| #if defined(HAVE_SO_BINDTODEVICE) |
| /* Get rid of the hostname we saved earlier. */ |
| free(iperf_get_test_bind_address(test)); |
| iperf_set_test_bind_address(test, p); |
| iperf_set_test_bind_dev(test, p1); |
| #else /* HAVE_SO_BINDTODEVICE */ |
| i_errno = IEBINDDEVNOSUPPORT; |
| return -1; |
| #endif /* HAVE_SO_BINDTODEVICE */ |
| } |
| break; |
| #if defined (HAVE_SO_BINDTODEVICE) |
| case OPT_BIND_DEV: |
| iperf_set_test_bind_dev(test, optarg); |
| break; |
| #endif /* HAVE_SO_BINDTODEVICE */ |
| case OPT_CLIENT_PORT: |
| portno = atoi(optarg); |
| if (portno < 1 || portno > 65535) { |
| i_errno = IEBADPORT; |
| return -1; |
| } |
| test->bind_port = portno; |
| break; |
| case 'M': |
| test->settings->mss = atoi(optarg); |
| if (test->settings->mss > MAX_MSS) { |
| i_errno = IEMSS; |
| return -1; |
| } |
| client_flag = 1; |
| break; |
| case 'N': |
| test->no_delay = 1; |
| client_flag = 1; |
| break; |
| case '4': |
| test->settings->domain = AF_INET; |
| break; |
| case '6': |
| test->settings->domain = AF_INET6; |
| break; |
| case 'S': |
| test->settings->tos = strtol(optarg, &endptr, 0); |
| if (endptr == optarg || |
| test->settings->tos < 0 || |
| test->settings->tos > 255) { |
| i_errno = IEBADTOS; |
| return -1; |
| } |
| client_flag = 1; |
| break; |
| case OPT_DSCP: |
| test->settings->tos = parse_qos(optarg); |
| if(test->settings->tos < 0) { |
| i_errno = IEBADTOS; |
| return -1; |
| } |
| client_flag = 1; |
| break; |
| case OPT_EXTRA_DATA: |
| test->extra_data = strdup(optarg); |
| client_flag = 1; |
| break; |
| case 'L': |
| #if defined(HAVE_FLOWLABEL) |
| test->settings->flowlabel = strtol(optarg, &endptr, 0); |
| if (endptr == optarg || |
| test->settings->flowlabel < 1 || test->settings->flowlabel > 0xfffff) { |
| i_errno = IESETFLOW; |
| return -1; |
| } |
| client_flag = 1; |
| #else /* HAVE_FLOWLABEL */ |
| i_errno = IEUNIMP; |
| return -1; |
| #endif /* HAVE_FLOWLABEL */ |
| break; |
| case 'X': |
| xbe = (struct xbind_entry *)malloc(sizeof(struct xbind_entry)); |
| if (!xbe) { |
| i_errno = IESETSCTPBINDX; |
| return -1; |
| } |
| memset(xbe, 0, sizeof(*xbe)); |
| xbe->name = strdup(optarg); |
| if (!xbe->name) { |
| i_errno = IESETSCTPBINDX; |
| return -1; |
| } |
| TAILQ_INSERT_TAIL(&test->xbind_addrs, xbe, link); |
| break; |
| case 'Z': |
| if (!has_sendfile()) { |
| i_errno = IENOSENDFILE; |
| return -1; |
| } |
| test->zerocopy = 1; |
| client_flag = 1; |
| break; |
| case OPT_REPEATING_PAYLOAD: |
| test->repeating_payload = 1; |
| client_flag = 1; |
| break; |
| case OPT_TIMESTAMPS: |
| iperf_set_test_timestamps(test, 1); |
| if (optarg) { |
| iperf_set_test_timestamp_format(test, optarg); |
| } |
| else { |
| iperf_set_test_timestamp_format(test, TIMESTAMP_FORMAT); |
| } |
| break; |
| case 'O': |
| test->omit = atoi(optarg); |
| if (test->omit < 0 || test->omit > 60) { |
| i_errno = IEOMIT; |
| return -1; |
| } |
| client_flag = 1; |
| break; |
| case 'F': |
| test->diskfile_name = optarg; |
| break; |
| case OPT_IDLE_TIMEOUT: |
| test->settings->idle_timeout = atoi(optarg); |
| if (test->settings->idle_timeout < 1 || test->settings->idle_timeout > MAX_TIME) { |
| i_errno = IEIDLETIMEOUT; |
| return -1; |
| } |
| server_flag = 1; |
| break; |
| case OPT_RCV_TIMEOUT: |
| rcv_timeout_in = atoi(optarg); |
| if (rcv_timeout_in < MIN_NO_MSG_RCVD_TIMEOUT || rcv_timeout_in > MAX_TIME * SEC_TO_mS) { |
| i_errno = IERCVTIMEOUT; |
| return -1; |
| } |
| test->settings->rcv_timeout.secs = rcv_timeout_in / SEC_TO_mS; |
| test->settings->rcv_timeout.usecs = (rcv_timeout_in % SEC_TO_mS) * mS_TO_US; |
| rcv_timeout_flag = 1; |
| break; |
| #if defined(HAVE_TCP_USER_TIMEOUT) |
| case OPT_SND_TIMEOUT: |
| test->settings->snd_timeout = atoi(optarg); |
| if (test->settings->snd_timeout < 0 || test->settings->snd_timeout > MAX_TIME * SEC_TO_mS) { |
| i_errno = IESNDTIMEOUT; |
| return -1; |
| } |
| snd_timeout_flag = 1; |
| break; |
| #endif /* HAVE_TCP_USER_TIMEOUT */ |
| case 'A': |
| #if defined(HAVE_CPU_AFFINITY) |
| test->affinity = strtol(optarg, &endptr, 0); |
| if (endptr == optarg || |
| test->affinity < 0 || test->affinity > 1024) { |
| i_errno = IEAFFINITY; |
| return -1; |
| } |
| comma = strchr(optarg, ','); |
| if (comma != NULL) { |
| test->server_affinity = atoi(comma+1); |
| if (test->server_affinity < 0 || test->server_affinity > 1024) { |
| i_errno = IEAFFINITY; |
| return -1; |
| } |
| client_flag = 1; |
| } |
| #else /* HAVE_CPU_AFFINITY */ |
| i_errno = IEUNIMP; |
| return -1; |
| #endif /* HAVE_CPU_AFFINITY */ |
| break; |
| case 'T': |
| test->title = strdup(optarg); |
| client_flag = 1; |
| break; |
| case 'C': |
| #if defined(HAVE_TCP_CONGESTION) |
| test->congestion = strdup(optarg); |
| client_flag = 1; |
| #else /* HAVE_TCP_CONGESTION */ |
| i_errno = IEUNIMP; |
| return -1; |
| #endif /* HAVE_TCP_CONGESTION */ |
| break; |
| case 'd': |
| test->debug = 1; |
| test->debug_level = DEBUG_LEVEL_MAX; |
| if (optarg) { |
| test->debug_level = atoi(optarg); |
| if (test->debug_level < 0) |
| test->debug_level = DEBUG_LEVEL_MAX; |
| } |
| break; |
| case 'I': |
| test->pidfile = strdup(optarg); |
| break; |
| case OPT_LOGFILE: |
| test->logfile = strdup(optarg); |
| break; |
| case OPT_FORCEFLUSH: |
| test->forceflush = 1; |
| break; |
| case OPT_GET_SERVER_OUTPUT: |
| test->get_server_output = 1; |
| client_flag = 1; |
| break; |
| case OPT_UDP_COUNTERS_64BIT: |
| test->udp_counters_64bit = 1; |
| break; |
| case OPT_NO_FQ_SOCKET_PACING: |
| #if defined(HAVE_SO_MAX_PACING_RATE) |
| printf("Warning: --no-fq-socket-pacing is deprecated\n"); |
| test->settings->fqrate = 0; |
| client_flag = 1; |
| #else /* HAVE_SO_MAX_PACING_RATE */ |
| i_errno = IEUNIMP; |
| return -1; |
| #endif |
| break; |
| case OPT_FQ_RATE: |
| #if defined(HAVE_SO_MAX_PACING_RATE) |
| test->settings->fqrate = unit_atof_rate(optarg); |
| client_flag = 1; |
| #else /* HAVE_SO_MAX_PACING_RATE */ |
| i_errno = IEUNIMP; |
| return -1; |
| #endif |
| break; |
| #if defined(HAVE_DONT_FRAGMENT) |
| case OPT_DONT_FRAGMENT: |
| test->settings->dont_fragment = 1; |
| client_flag = 1; |
| break; |
| #endif /* HAVE_DONT_FRAGMENT */ |
| #if defined(HAVE_SSL) |
| case OPT_CLIENT_USERNAME: |
| client_username = strdup(optarg); |
| break; |
| case OPT_CLIENT_RSA_PUBLIC_KEY: |
| client_rsa_public_key = strdup(optarg); |
| break; |
| case OPT_SERVER_RSA_PRIVATE_KEY: |
| server_rsa_private_key = strdup(optarg); |
| break; |
| case OPT_SERVER_AUTHORIZED_USERS: |
| test->server_authorized_users = strdup(optarg); |
| break; |
| case OPT_SERVER_SKEW_THRESHOLD: |
| test->server_skew_threshold = atoi(optarg); |
| if(test->server_skew_threshold <= 0){ |
| i_errno = IESKEWTHRESHOLD; |
| return -1; |
| } |
| break; |
| #endif /* HAVE_SSL */ |
| case OPT_PACING_TIMER: |
| test->settings->pacing_timer = unit_atoi(optarg); |
| client_flag = 1; |
| break; |
| case OPT_CONNECT_TIMEOUT: |
| test->settings->connect_timeout = unit_atoi(optarg); |
| client_flag = 1; |
| break; |
| case 'h': |
| usage_long(stdout); |
| exit(0); |
| default: |
| usage_long(stderr); |
| exit(1); |
| } |
| } |
| |
| /* Check flag / role compatibility. */ |
| if (test->role == 'c' && server_flag) { |
| i_errno = IESERVERONLY; |
| return -1; |
| } |
| if (test->role == 's' && client_flag) { |
| i_errno = IECLIENTONLY; |
| return -1; |
| } |
| |
| #if defined(HAVE_SSL) |
| |
| if (test->role == 's' && (client_username || client_rsa_public_key)){ |
| i_errno = IECLIENTONLY; |
| return -1; |
| } else if (test->role == 'c' && (client_username || client_rsa_public_key) && |
| !(client_username && client_rsa_public_key)) { |
| i_errno = IESETCLIENTAUTH; |
| return -1; |
| } else if (test->role == 'c' && (client_username && client_rsa_public_key)){ |
| |
| char *client_password = NULL; |
| size_t s; |
| /* Need to copy env var, so we can do a common free */ |
| if ((client_password = getenv("IPERF3_PASSWORD")) != NULL) |
| client_password = strdup(client_password); |
| else if (iperf_getpass(&client_password, &s, stdin) < 0){ |
| i_errno = IESETCLIENTAUTH; |
| return -1; |
| } |
| if (test_load_pubkey_from_file(client_rsa_public_key) < 0){ |
| iperf_err(test, "%s\n", ERR_error_string(ERR_get_error(), NULL)); |
| i_errno = IESETCLIENTAUTH; |
| return -1; |
| } |
| |
| test->settings->client_username = client_username; |
| test->settings->client_password = client_password; |
| test->settings->client_rsa_pubkey = load_pubkey_from_file(client_rsa_public_key); |
| free(client_rsa_public_key); |
| client_rsa_public_key = NULL; |
| } |
| |
| if (test->role == 'c' && (server_rsa_private_key || test->server_authorized_users)){ |
| i_errno = IESERVERONLY; |
| return -1; |
| } else if (test->role == 'c' && (test->server_skew_threshold != 0)){ |
| i_errno = IESERVERONLY; |
| return -1; |
| } else if (test->role == 'c' && rcv_timeout_flag && test->mode == SENDER){ |
| i_errno = IERVRSONLYRCVTIMEOUT; |
| return -1; |
| } else if (test->role == 's' && (server_rsa_private_key || test->server_authorized_users) && |
| !(server_rsa_private_key && test->server_authorized_users)) { |
| i_errno = IESETSERVERAUTH; |
| return -1; |
| } else if (test->role == 's' && server_rsa_private_key) { |
| test->server_rsa_private_key = load_privkey_from_file(server_rsa_private_key); |
| if (test->server_rsa_private_key == NULL){ |
| iperf_err(test, "%s\n", ERR_error_string(ERR_get_error(), NULL)); |
| i_errno = IESETSERVERAUTH; |
| return -1; |
| } |
| free(server_rsa_private_key); |
| server_rsa_private_key = NULL; |
| |
| if(test->server_skew_threshold == 0){ |
| // Set default value for time skew threshold |
| test->server_skew_threshold=10; |
| } |
| } |
| |
| #endif //HAVE_SSL |
| if (blksize == 0) { |
| if (test->protocol->id == Pudp) |
| blksize = 0; /* try to dynamically determine from MSS */ |
| else if (test->protocol->id == Psctp) |
| blksize = DEFAULT_SCTP_BLKSIZE; |
| else |
| blksize = DEFAULT_TCP_BLKSIZE; |
| } |
| if ((test->protocol->id != Pudp && blksize <= 0) |
| || blksize > MAX_BLOCKSIZE) { |
| i_errno = IEBLOCKSIZE; |
| return -1; |
| } |
| if (test->protocol->id == Pudp && |
| (blksize > 0 && |
| (blksize < MIN_UDP_BLOCKSIZE || blksize > MAX_UDP_BLOCKSIZE))) { |
| i_errno = IEUDPBLOCKSIZE; |
| return -1; |
| } |
| test->settings->blksize = blksize; |
| |
| if (!rate_flag) |
| test->settings->rate = test->protocol->id == Pudp ? UDP_RATE : 0; |
| |
| /* if no bytes or blocks specified, nor a duration_flag, and we have -F, |
| ** get the file-size as the bytes count to be transferred |
| */ |
| if (test->settings->bytes == 0 && |
| test->settings->blocks == 0 && |
| ! duration_flag && |
| test->diskfile_name != (char*) 0 && |
| test->role == 'c' |
| ){ |
| struct stat st; |
| if( stat(test->diskfile_name, &st) == 0 ){ |
| iperf_size_t file_bytes = st.st_size; |
| test->settings->bytes = file_bytes; |
| if (test->debug) |
| printf("End condition set to file-size: %"PRIu64" bytes\n", test->settings->bytes); |
| } |
| // if failing to read file stat, it should fallback to default duration mode |
| } |
| |
| if ((test->settings->bytes != 0 || test->settings->blocks != 0) && ! duration_flag) |
| test->duration = 0; |
| |
| /* Disallow specifying multiple test end conditions. The code actually |
| ** works just fine without this prohibition. As soon as any one of the |
| ** three possible end conditions is met, the test ends. So this check |
| ** could be removed if desired. |
| */ |
| if ((duration_flag && test->settings->bytes != 0) || |
| (duration_flag && test->settings->blocks != 0) || |
| (test->settings->bytes != 0 && test->settings->blocks != 0)) { |
| i_errno = IEENDCONDITIONS; |
| return -1; |
| } |
| |
| /* For subsequent calls to getopt */ |
| #ifdef __APPLE__ |
| optreset = 1; |
| #endif |
| optind = 0; |
| |
| if ((test->role != 'c') && (test->role != 's')) { |
| i_errno = IENOROLE; |
| return -1; |
| } |
| |
| /* Set Total-rate average interval to multiplicity of State interval */ |
| if (test->settings->bitrate_limit_interval != 0) { |
| test->settings->bitrate_limit_stats_per_interval = |
| (test->settings->bitrate_limit_interval <= test->stats_interval ? |
| 1 : round(test->settings->bitrate_limit_interval/test->stats_interval) ); |
| } |
| |
| /* Show warning if JSON output is used with explicit report format */ |
| if ((test->json_output) && (test->settings->unit_format != 'a')) { |
| warning("Report format (-f) flag ignored with JSON output (-J)"); |
| } |
| |
| /* Show warning if JSON output is used with verbose or debug flags */ |
| if (test->json_output && test->verbose) { |
| warning("Verbose output (-v) may interfere with JSON output (-J)"); |
| } |
| if (test->json_output && test->debug) { |
| warning("Debug output (-d) may interfere with JSON output (-J)"); |
| } |
| |
| return 0; |
| } |
| |
| /* |
| * Open the file specified by test->logfile and set test->outfile to its' FD. |
| */ |
| int iperf_open_logfile(struct iperf_test *test) |
| { |
| test->outfile = fopen(test->logfile, "a+"); |
| if (test->outfile == NULL) { |
| i_errno = IELOGFILE; |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| void iperf_close_logfile(struct iperf_test *test) |
| { |
| if (test->outfile && test->outfile != stdout) { |
| fclose(test->outfile); |
| test->outfile = NULL; |
| } |
| } |
| |
| int |
| iperf_set_send_state(struct iperf_test *test, signed char state) |
| { |
| if (test->ctrl_sck >= 0) { |
| test->state = state; |
| if (Nwrite(test->ctrl_sck, (char*) &state, sizeof(state), Ptcp) < 0) { |
| i_errno = IESENDMESSAGE; |
| return -1; |
| } |
| } |
| return 0; |
| } |
| |
| void |
| iperf_check_throttle(struct iperf_stream *sp, struct iperf_time *nowP) |
| { |
| struct iperf_time temp_time; |
| double seconds; |
| uint64_t bits_per_second; |
| |
| if (sp->test->done || sp->test->settings->rate == 0) |
| return; |
| iperf_time_diff(&sp->result->start_time_fixed, nowP, &temp_time); |
| seconds = iperf_time_in_secs(&temp_time); |
| bits_per_second = sp->result->bytes_sent * 8 / seconds; |
| if (bits_per_second < sp->test->settings->rate) { |
| sp->green_light = 1; |
| FD_SET(sp->socket, &sp->test->write_set); |
| } else { |
| sp->green_light = 0; |
| FD_CLR(sp->socket, &sp->test->write_set); |
| } |
| } |
| |
| /* Verify that average traffic is not greater than the specified limit */ |
| void |
| iperf_check_total_rate(struct iperf_test *test, iperf_size_t last_interval_bytes_transferred) |
| { |
| double seconds; |
| uint64_t bits_per_second; |
| iperf_size_t total_bytes; |
| int i; |
| |
| if (test->done || test->settings->bitrate_limit == 0) // Continue only if check should be done |
| return; |
| |
| /* Add last inetrval's transferred bytes to the array */ |
| if (++test->bitrate_limit_last_interval_index >= test->settings->bitrate_limit_stats_per_interval) |
| test->bitrate_limit_last_interval_index = 0; |
| test->bitrate_limit_intervals_traffic_bytes[test->bitrate_limit_last_interval_index] = last_interval_bytes_transferred; |
| |
| /* Ensure that enough stats periods passed to allow averaging throughput */ |
| test->bitrate_limit_stats_count += 1; |
| if (test->bitrate_limit_stats_count < test->settings->bitrate_limit_stats_per_interval) |
| return; |
| |
| /* Calculating total bytes traffic to be averaged */ |
| for (total_bytes = 0, i = 0; i < test->settings->bitrate_limit_stats_per_interval; i++) { |
| total_bytes += test->bitrate_limit_intervals_traffic_bytes[i]; |
| } |
| |
| seconds = test->stats_interval * test->settings->bitrate_limit_stats_per_interval; |
| bits_per_second = total_bytes * 8 / seconds; |
| if (test->debug) { |
| iperf_printf(test,"Interval %" PRIu64 " - throughput %" PRIu64 " bps (limit %" PRIu64 ")\n", test->bitrate_limit_stats_count, bits_per_second, test->settings->bitrate_limit); |
| } |
| |
| if (bits_per_second > test->settings->bitrate_limit) { |
| if (iperf_get_verbose(test)) |
| iperf_err(test, "Total throughput of %" PRIu64 " bps exceeded %" PRIu64 " bps limit", bits_per_second, test->settings->bitrate_limit); |
| test->bitrate_limit_exceeded = 1; |
| } |
| } |
| |
| int |
| iperf_send(struct iperf_test *test, fd_set *write_setP) |
| { |
| register int multisend, r, streams_active; |
| register struct iperf_stream *sp; |
| struct iperf_time now; |
| int no_throttle_check; |
| |
| /* Can we do multisend mode? */ |
| if (test->settings->burst != 0) |
| multisend = test->settings->burst; |
| else if (test->settings->rate == 0) |
| multisend = test->multisend; |
| else |
| multisend = 1; /* nope */ |
| |
| /* Should bitrate throttle be checked for every send */ |
| no_throttle_check = test->settings->rate != 0 && test->settings->burst == 0; |
| |
| for (; multisend > 0; --multisend) { |
| if (no_throttle_check) |
| iperf_time_now(&now); |
| streams_active = 0; |
| SLIST_FOREACH(sp, &test->streams, streams) { |
| if ((sp->green_light && sp->sender && |
| (write_setP == NULL || FD_ISSET(sp->socket, write_setP)))) { |
| if (multisend > 1 && test->settings->bytes != 0 && test->bytes_sent >= test->settings->bytes) |
| break; |
| if (multisend > 1 && test->settings->blocks != 0 && test->blocks_sent >= test->settings->blocks) |
| break; |
| if ((r = sp->snd(sp)) < 0) { |
| if (r == NET_SOFTERROR) |
| break; |
| i_errno = IESTREAMWRITE; |
| return r; |
| } |
| streams_active = 1; |
| test->bytes_sent += r; |
| if (!sp->pending_size) |
| ++test->blocks_sent; |
| if (no_throttle_check) |
| iperf_check_throttle(sp, &now); |
| } |
| } |
| if (!streams_active) |
| break; |
| } |
| if (!no_throttle_check) { /* Throttle check if was not checked for each send */ |
| iperf_time_now(&now); |
| SLIST_FOREACH(sp, &test->streams, streams) |
| if (sp->sender) |
| iperf_check_throttle(sp, &now); |
| } |
| if (write_setP != NULL) |
| SLIST_FOREACH(sp, &test->streams, streams) |
| if (FD_ISSET(sp->socket, write_setP)) |
| FD_CLR(sp->socket, write_setP); |
| |
| return 0; |
| } |
| |
| int |
| iperf_recv(struct iperf_test *test, fd_set *read_setP) |
| { |
| int r; |
| struct iperf_stream *sp; |
| |
| SLIST_FOREACH(sp, &test->streams, streams) { |
| if (FD_ISSET(sp->socket, read_setP) && !sp->sender) { |
| if ((r = sp->rcv(sp)) < 0) { |
| i_errno = IESTREAMREAD; |
| return r; |
| } |
| test->bytes_received += r; |
| ++test->blocks_received; |
| FD_CLR(sp->socket, read_setP); |
| } |
| } |
| |
| return 0; |
| } |
| |
| int |
| iperf_init_test(struct iperf_test *test) |
| { |
| struct iperf_time now; |
| struct iperf_stream *sp; |
| |
| if (test->protocol->init) { |
| if (test->protocol->init(test) < 0) |
| return -1; |
| } |
| |
| /* Init each stream. */ |
| if (iperf_time_now(&now) < 0) { |
| i_errno = IEINITTEST; |
| return -1; |
| } |
| SLIST_FOREACH(sp, &test->streams, streams) { |
| sp->result->start_time = sp->result->start_time_fixed = now; |
| } |
| |
| if (test->on_test_start) |
| test->on_test_start(test); |
| |
| return 0; |
| } |
| |
| static void |
| send_timer_proc(TimerClientData client_data, struct iperf_time *nowP) |
| { |
| struct iperf_stream *sp = client_data.p; |
| |
| /* All we do here is set or clear the flag saying that this stream may |
| ** be sent to. The actual sending gets done in the send proc, after |
| ** checking the flag. |
| */ |
| iperf_check_throttle(sp, nowP); |
| } |
| |
| int |
| iperf_create_send_timers(struct iperf_test * test) |
| { |
| struct iperf_time now; |
| struct iperf_stream *sp; |
| TimerClientData cd; |
| |
| if (iperf_time_now(&now) < 0) { |
| i_errno = IEINITTEST; |
| return -1; |
| } |
| SLIST_FOREACH(sp, &test->streams, streams) { |
| sp->green_light = 1; |
| if (test->settings->rate != 0 && sp->sender) { |
| cd.p = sp; |
| sp->send_timer = tmr_create(NULL, send_timer_proc, cd, test->settings->pacing_timer, 1); |
| if (sp->send_timer == NULL) { |
| i_errno = IEINITTEST; |
| return -1; |
| } |
| } |
| } |
| return 0; |
| } |
| |
| #if defined(HAVE_SSL) |
| int test_is_authorized(struct iperf_test *test){ |
| if ( !(test->server_rsa_private_key && test->server_authorized_users)) { |
| return 0; |
| } |
| |
| if (test->settings->authtoken){ |
| char *username = NULL, *password = NULL; |
| time_t ts; |
| int rc = decode_auth_setting(test->debug, test->settings->authtoken, test->server_rsa_private_key, &username, &password, &ts); |
| if (rc) { |
| return -1; |
| } |
| int ret = check_authentication(username, password, ts, test->server_authorized_users, test->server_skew_threshold); |
| if (ret == 0){ |
| if (test->debug) { |
| iperf_printf(test, report_authentication_succeeded, username, ts); |
| } |
| free(username); |
| free(password); |
| return 0; |
| } else { |
| if (test->debug) { |
| iperf_printf(test, report_authentication_failed, username, ts); |
| } |
| free(username); |
| free(password); |
| return -1; |
| } |
| } |
| return -1; |
| } |
| #endif //HAVE_SSL |
| |
| /** |
| * iperf_exchange_parameters - handles the param_Exchange part for client |
| * |
| */ |
| |
| int |
| iperf_exchange_parameters(struct iperf_test *test) |
| { |
| int s; |
| int32_t err; |
| |
| if (test->role == 'c') { |
| |
| if (send_parameters(test) < 0) |
| return -1; |
| |
| } else { |
| |
| if (get_parameters(test) < 0) |
| return -1; |
| |
| #if defined(HAVE_SSL) |
| if (test_is_authorized(test) < 0){ |
| if (iperf_set_send_state(test, SERVER_ERROR) != 0) |
| return -1; |
| i_errno = IEAUTHTEST; |
| err = htonl(i_errno); |
| if (Nwrite(test->ctrl_sck, (char*) &err, sizeof(err), Ptcp) < 0) { |
| i_errno = IECTRLWRITE; |
| return -1; |
| } |
| return -1; |
| } |
| #endif //HAVE_SSL |
| |
| if ((s = test->protocol->listen(test)) < 0) { |
| if (iperf_set_send_state(test, SERVER_ERROR) != 0) |
| return -1; |
| err = htonl(i_errno); |
| if (Nwrite(test->ctrl_sck, (char*) &err, sizeof(err), Ptcp) < 0) { |
| i_errno = IECTRLWRITE; |
| return -1; |
| } |
| err = htonl(errno); |
| if (Nwrite(test->ctrl_sck, (char*) &err, sizeof(err), Ptcp) < 0) { |
| i_errno = IECTRLWRITE; |
| return -1; |
| } |
| return -1; |
| } |
| |
| FD_SET(s, &test->read_set); |
| test->max_fd = (s > test->max_fd) ? s : test->max_fd; |
| test->prot_listener = s; |
| |
| // Send the control message to create streams and start the test |
| if (iperf_set_send_state(test, CREATE_STREAMS) != 0) |
| return -1; |
| |
| } |
| |
| return 0; |
| } |
| |
| /*************************************************************/ |
| |
| int |
| iperf_exchange_results(struct iperf_test *test) |
| { |
| if (test->role == 'c') { |
| /* Send results to server. */ |
| if (send_results(test) < 0) |
| return -1; |
| /* Get server results. */ |
| if (get_results(test) < 0) |
| return -1; |
| } else { |
| /* Get client results. */ |
| if (get_results(test) < 0) |
| return -1; |
| /* Send results to client. */ |
| if (send_results(test) < 0) |
| return -1; |
| } |
| return 0; |
| } |
| |
| /*************************************************************/ |
| |
| static int |
| send_parameters(struct iperf_test *test) |
| { |
| int r = 0; |
| cJSON *j; |
| |
| j = cJSON_CreateObject(); |
| if (j == NULL) { |
| i_errno = IESENDPARAMS; |
| r = -1; |
| } else { |
| if (test->protocol->id == Ptcp) |
| cJSON_AddTrueToObject(j, "tcp"); |
| else if (test->protocol->id == Pudp) |
| cJSON_AddTrueToObject(j, "udp"); |
| else if (test->protocol->id == Psctp) |
| cJSON_AddTrueToObject(j, "sctp"); |
| cJSON_AddNumberToObject(j, "omit", test->omit); |
| if (test->server_affinity != -1) |
| cJSON_AddNumberToObject(j, "server_affinity", test->server_affinity); |
| cJSON_AddNumberToObject(j, "time", test->duration); |
| cJSON_AddNumberToObject(j, "num", test->settings->bytes); |
| cJSON_AddNumberToObject(j, "blockcount", test->settings->blocks); |
| if (test->settings->mss) |
| cJSON_AddNumberToObject(j, "MSS", test->settings->mss); |
| if (test->no_delay) |
| cJSON_AddTrueToObject(j, "nodelay"); |
| cJSON_AddNumberToObject(j, "parallel", test->num_streams); |
| if (test->reverse) |
| cJSON_AddTrueToObject(j, "reverse"); |
| if (test->bidirectional) |
| cJSON_AddTrueToObject(j, "bidirectional"); |
| if (test->settings->socket_bufsize) |
| cJSON_AddNumberToObject(j, "window", test->settings->socket_bufsize); |
| if (test->settings->blksize) |
| cJSON_AddNumberToObject(j, "len", test->settings->blksize); |
| if (test->settings->rate) |
| cJSON_AddNumberToObject(j, "bandwidth", test->settings->rate); |
| if (test->settings->fqrate) |
| cJSON_AddNumberToObject(j, "fqrate", test->settings->fqrate); |
| if (test->settings->pacing_timer) |
| cJSON_AddNumberToObject(j, "pacing_timer", test->settings->pacing_timer); |
| if (test->settings->burst) |
| cJSON_AddNumberToObject(j, "burst", test->settings->burst); |
| if (test->settings->tos) |
| cJSON_AddNumberToObject(j, "TOS", test->settings->tos); |
| if (test->settings->flowlabel) |
| cJSON_AddNumberToObject(j, "flowlabel", test->settings->flowlabel); |
| if (test->title) |
| cJSON_AddStringToObject(j, "title", test->title); |
| if (test->extra_data) |
| cJSON_AddStringToObject(j, "extra_data", test->extra_data); |
| if (test->congestion) |
| cJSON_AddStringToObject(j, "congestion", test->congestion); |
| if (test->congestion_used) |
| cJSON_AddStringToObject(j, "congestion_used", test->congestion_used); |
| if (test->get_server_output) |
| cJSON_AddNumberToObject(j, "get_server_output", iperf_get_test_get_server_output(test)); |
| if (test->udp_counters_64bit) |
| cJSON_AddNumberToObject(j, "udp_counters_64bit", iperf_get_test_udp_counters_64bit(test)); |
| if (test->repeating_payload) |
| cJSON_AddNumberToObject(j, "repeating_payload", test->repeating_payload); |
| if (test->zerocopy) |
| cJSON_AddNumberToObject(j, "zerocopy", test->zerocopy); |
| #if defined(HAVE_DONT_FRAGMENT) |
| if (test->settings->dont_fragment) |
| cJSON_AddNumberToObject(j, "dont_fragment", test->settings->dont_fragment); |
| #endif /* HAVE_DONT_FRAGMENT */ |
| #if defined(HAVE_SSL) |
| /* Send authentication parameters */ |
| if (test->settings->client_username && test->settings->client_password && test->settings->client_rsa_pubkey){ |
| int rc = encode_auth_setting(test->settings->client_username, test->settings->client_password, test->settings->client_rsa_pubkey, &test->settings->authtoken); |
| |
| if (rc) { |
| cJSON_Delete(j); |
| i_errno = IESENDPARAMS; |
| return -1; |
| } |
| |
| cJSON_AddStringToObject(j, "authtoken", test->settings->authtoken); |
| } |
| #endif // HAVE_SSL |
| cJSON_AddStringToObject(j, "client_version", IPERF_VERSION); |
| |
| if (test->debug) { |
| char *str = cJSON_Print(j); |
| printf("send_parameters:\n%s\n", str); |
| cJSON_free(str); |
| } |
| |
| if (JSON_write(test->ctrl_sck, j) < 0) { |
| i_errno = IESENDPARAMS; |
| r = -1; |
| } |
| cJSON_Delete(j); |
| } |
| return r; |
| } |
| |
| /*************************************************************/ |
| |
| static int |
| get_parameters(struct iperf_test *test) |
| { |
| int r = 0; |
| cJSON *j; |
| cJSON *j_p; |
| |
| j = JSON_read(test->ctrl_sck); |
| if (j == NULL) { |
| i_errno = IERECVPARAMS; |
| r = -1; |
| } else { |
| if (test->debug) { |
| char *str; |
| str = cJSON_Print(j); |
| printf("get_parameters:\n%s\n", str ); |
| cJSON_free(str); |
| } |
| |
| if ((j_p = cJSON_GetObjectItem(j, "tcp")) != NULL) |
| set_protocol(test, Ptcp); |
| if ((j_p = cJSON_GetObjectItem(j, "udp")) != NULL) |
| set_protocol(test, Pudp); |
| if ((j_p = cJSON_GetObjectItem(j, "sctp")) != NULL) |
| set_protocol(test, Psctp); |
| if ((j_p = cJSON_GetObjectItem(j, "omit")) != NULL) |
| test->omit = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "server_affinity")) != NULL) |
| test->server_affinity = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "time")) != NULL) |
| test->duration = j_p->valueint; |
| test->settings->bytes = 0; |
| if ((j_p = cJSON_GetObjectItem(j, "num")) != NULL) |
| test->settings->bytes = j_p->valueint; |
| test->settings->blocks = 0; |
| if ((j_p = cJSON_GetObjectItem(j, "blockcount")) != NULL) |
| test->settings->blocks = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "MSS")) != NULL) |
| test->settings->mss = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "nodelay")) != NULL) |
| test->no_delay = 1; |
| if ((j_p = cJSON_GetObjectItem(j, "parallel")) != NULL) |
| test->num_streams = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "reverse")) != NULL) |
| iperf_set_test_reverse(test, 1); |
| if ((j_p = cJSON_GetObjectItem(j, "bidirectional")) != NULL) |
| iperf_set_test_bidirectional(test, 1); |
| if ((j_p = cJSON_GetObjectItem(j, "window")) != NULL) |
| test->settings->socket_bufsize = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "len")) != NULL) |
| test->settings->blksize = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "bandwidth")) != NULL) |
| test->settings->rate = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "fqrate")) != NULL) |
| test->settings->fqrate = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "pacing_timer")) != NULL) |
| test->settings->pacing_timer = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "burst")) != NULL) |
| test->settings->burst = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "TOS")) != NULL) |
| test->settings->tos = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "flowlabel")) != NULL) |
| test->settings->flowlabel = j_p->valueint; |
| if ((j_p = cJSON_GetObjectItem(j, "title")) != NULL) |
| test->title = strdup(j_p->valuestring); |
| if ((j_p = cJSON_GetObjectItem(j, "extra_data")) != NULL) |
| test->extra_data = strdup(j_p->valuestring); |
| if ((j_p = cJSON_GetObjectItem(j, "congestion")) != NULL) |
| test->congestion = strdup(j_p->valuestring); |
| if ((j_p = cJSON_GetObjectItem(j, "congestion_used")) != NULL) |
| test->congestion_used = strdup(j_p->valuestring); |
| if ((j_p = cJSON_GetObjectItem(j, "get_server_output")) != NULL) |
| iperf_set_test_get_server_output(test, 1); |
| if ((j_p = cJSON_GetObjectItem(j, "udp_counters_64bit")) != NULL) |
| iperf_set_test_udp_counters_64bit(test, 1); |
| if ((j_p = cJSON_GetObjectItem(j, "repeating_payload")) != NULL) |
| test->repeating_payload = 1; |
| if ((j_p = cJSON_GetObjectItem(j, "zerocopy")) != NULL) |
| test->zerocopy = j_p->valueint; |
| #if defined(HAVE_DONT_FRAGMENT) |
| if ((j_p = cJSON_GetObjectItem(j, "dont_fragment")) != NULL) |
| test->settings->dont_fragment = j_p->valueint; |
| #endif /* HAVE_DONT_FRAGMENT */ |
| #if defined(HAVE_SSL) |
| if ((j_p = cJSON_GetObjectItem(j, "authtoken")) != NULL) |
| test->settings->authtoken = strdup(j_p->valuestring); |
| #endif //HAVE_SSL |
| if (test->mode && test->protocol->id == Ptcp && has_tcpinfo_retransmits()) |
| test->sender_has_retransmits = 1; |
| if (test->settings->rate) |
| cJSON_AddNumberToObject(test->json_start, "target_bitrate", test->settings->rate); |
| cJSON_Delete(j); |
| } |
| return r; |
| } |
| |
| /*************************************************************/ |
| |
| static int |
| send_results(struct iperf_test *test) |
| { |
| int r = 0; |
| cJSON *j; |
| cJSON *j_streams; |
| struct iperf_stream *sp; |
| cJSON *j_stream; |
| int sender_has_retransmits; |
| iperf_size_t bytes_transferred; |
| int retransmits; |
| struct iperf_time temp_time; |
| double start_time, end_time; |
| |
| j = cJSON_CreateObject(); |
| if (j == NULL) { |
| i_errno = IEPACKAGERESULTS; |
| r = -1; |
| } else { |
| cJSON_AddNumberToObject(j, "cpu_util_total", test->cpu_util[0]); |
| cJSON_AddNumberToObject(j, "cpu_util_user", test->cpu_util[1]); |
| cJSON_AddNumberToObject(j, "cpu_util_system", test->cpu_util[2]); |
| if ( test->mode == RECEIVER ) |
| sender_has_retransmits = -1; |
| else |
| sender_has_retransmits = test->sender_has_retransmits; |
| cJSON_AddNumberToObject(j, "sender_has_retransmits", sender_has_retransmits); |
| if ( test->congestion_used ) { |
| cJSON_AddStringToObject(j, "congestion_used", test->congestion_used); |
| } |
| |
| /* If on the server and sending server output, then do this */ |
| if (test->role == 's' && test->get_server_output) { |
| if (test->json_output) { |
| /* Add JSON output */ |
| cJSON_AddItemReferenceToObject(j, "server_output_json", test->json_top); |
| } |
| else { |
| /* Add textual output */ |
| size_t buflen = 0; |
| |
| /* Figure out how much room we need to hold the complete output string */ |
| struct iperf_textline *t; |
| TAILQ_FOREACH(t, &(test->server_output_list), textlineentries) { |
| buflen += strlen(t->line); |
| } |
| |
| /* Allocate and build it up from the component lines */ |
| char *output = calloc(buflen + 1, 1); |
| TAILQ_FOREACH(t, &(test->server_output_list), textlineentries) { |
| strncat(output, t->line, buflen); |
| buflen -= strlen(t->line); |
| } |
| |
| cJSON_AddStringToObject(j, "server_output_text", output); |
| free(output); |
| } |
| } |
| |
| j_streams = cJSON_CreateArray(); |
| if (j_streams == NULL) { |
| i_errno = IEPACKAGERESULTS; |
| r = -1; |
| } else { |
| cJSON_AddItemToObject(j, "streams", j_streams); |
| SLIST_FOREACH(sp, &test->streams, streams) { |
| j_stream = cJSON_CreateObject(); |
| if (j_stream == NULL) { |
| i_errno = IEPACKAGERESULTS; |
| r = -1; |
| } else { |
| cJSON_AddItemToArray(j_streams, j_stream); |
| bytes_transferred = sp->sender ? (sp->result->bytes_sent - sp->result->bytes_sent_omit) : sp->result->bytes_received; |
| retransmits = (sp->sender && test->sender_has_retransmits) ? sp->result->stream_retrans : -1; |
| cJSON_AddNumberToObject(j_stream, "id", sp->id); |
| cJSON_AddNumberToObject(j_stream, "bytes", bytes_transferred); |
| cJSON_AddNumberToObject(j_stream, "retransmits", retransmits); |
| cJSON_AddNumberToObject(j_stream, "jitter", sp->jitter); |
| cJSON_AddNumberToObject(j_stream, "errors", sp->cnt_error); |
| cJSON_AddNumberToObject(j_stream, "packets", sp->packet_count); |
| |
| iperf_time_diff(&sp->result->start_time, &sp->result->start_time, &temp_time); |
| start_time = iperf_time_in_secs(&temp_time); |
| iperf_time_diff(&sp->result->start_time, &sp->result->end_time, &temp_time); |
| end_time = iperf_time_in_secs(&temp_time); |
| cJSON_AddNumberToObject(j_stream, "start_time", start_time); |
| cJSON_AddNumberToObject(j_stream, "end_time", end_time); |
| |
| } |
| } |
| if (r == 0 && test->debug) { |
| char *str = cJSON_Print(j); |
| printf("send_results\n%s\n", str); |
| cJSON_free(str); |
| } |
| if (r == 0 && JSON_write(test->ctrl_sck, j) < 0) { |
| i_errno = IESENDRESULTS; |
| r = -1; |
| } |
| } |
| cJSON_Delete(j); |
| } |
| return r; |
| } |
| |
| /*************************************************************/ |
| |
| static int |
| get_results(struct iperf_test *test) |
| { |
| int r = 0; |
| cJSON *j; |
| cJSON *j_cpu_util_total; |
| cJSON *j_cpu_util_user; |
| cJSON *j_cpu_util_system; |
| cJSON *j_remote_congestion_used; |
| cJSON *j_sender_has_retransmits; |
| int result_has_retransmits; |
| cJSON *j_streams; |
| int n, i; |
| cJSON *j_stream; |
| cJSON *j_id; |
| cJSON *j_bytes; |
| cJSON *j_retransmits; |
| cJSON *j_jitter; |
| cJSON *j_errors; |
| cJSON *j_packets; |
| cJSON *j_server_output; |
| cJSON *j_start_time, *j_end_time; |
| int sid, cerror, pcount; |
| double jitter; |
| iperf_size_t bytes_transferred; |
| int retransmits; |
| struct iperf_stream *sp; |
| |
| j = JSON_read(test->ctrl_sck); |
| if (j == NULL) { |
| i_errno = IERECVRESULTS; |
| r = -1; |
| } else { |
| j_cpu_util_total = cJSON_GetObjectItem(j, "cpu_util_total"); |
| j_cpu_util_user = cJSON_GetObjectItem(j, "cpu_util_user"); |
| j_cpu_util_system = cJSON_GetObjectItem(j, "cpu_util_system"); |
| j_sender_has_retransmits = cJSON_GetObjectItem(j, "sender_has_retransmits"); |
| if (j_cpu_util_total == NULL || j_cpu_util_user == NULL || j_cpu_util_system == NULL || j_sender_has_retransmits == NULL) { |
| i_errno = IERECVRESULTS; |
| r = -1; |
| } else { |
| if (test->debug) { |
| char *str = cJSON_Print(j); |
| printf("get_results\n%s\n", str); |
| cJSON_free(str); |
| } |
| |
| test->remote_cpu_util[0] = j_cpu_util_total->valuedouble; |
| test->remote_cpu_util[1] = j_cpu_util_user->valuedouble; |
| test->remote_cpu_util[2] = j_cpu_util_system->valuedouble; |
| result_has_retransmits = j_sender_has_retransmits->valueint; |
| if ( test->mode == RECEIVER ) { |
| test->sender_has_retransmits = result_has_retransmits; |
| test->other_side_has_retransmits = 0; |
| } |
| else if ( test->mode == BIDIRECTIONAL ) |
| test->other_side_has_retransmits = result_has_retransmits; |
| |
| j_streams = cJSON_GetObjectItem(j, "streams"); |
| if (j_streams == NULL) { |
| i_errno = IERECVRESULTS; |
| r = -1; |
| } else { |
| n = cJSON_GetArraySize(j_streams); |
| for (i=0; i<n; ++i) { |
| j_stream = cJSON_GetArrayItem(j_streams, i); |
| if (j_stream == NULL) { |
| i_errno = IERECVRESULTS; |
| r = -1; |
| } else { |
| j_id = cJSON_GetObjectItem(j_stream, "id"); |
| j_bytes = cJSON_GetObjectItem(j_stream, "bytes"); |
| j_retransmits = cJSON_GetObjectItem(j_stream, "retransmits"); |
| j_jitter = cJSON_GetObjectItem(j_stream, "jitter"); |
| j_errors = cJSON_GetObjectItem(j_stream, "errors"); |
| j_packets = cJSON_GetObjectItem(j_stream, "packets"); |
| j_start_time = cJSON_GetObjectItem(j_stream, "start_time"); |
| j_end_time = cJSON_GetObjectItem(j_stream, "end_time"); |
| if (j_id == NULL || j_bytes == NULL || j_retransmits == NULL || j_jitter == NULL || j_errors == NULL || j_packets == NULL) { |
| i_errno = IERECVRESULTS; |
| r = -1; |
| } else { |
| sid = j_id->valueint; |
| bytes_transferred = j_bytes->valueint; |
| retransmits = j_retransmits->valueint; |
| jitter = j_jitter->valuedouble; |
| cerror = j_errors->valueint; |
| pcount = j_packets->valueint; |
| SLIST_FOREACH(sp, &test->streams, streams) |
| if (sp->id == sid) break; |
| if (sp == NULL) { |
| i_errno = IESTREAMID; |
| r = -1; |
| } else { |
| if (sp->sender) { |
| sp->jitter = jitter; |
| sp->cnt_error = cerror; |
| sp->peer_packet_count = pcount; |
| sp->result->bytes_received = bytes_transferred; |
| /* |
| * We have to handle the possibility that |
| * start_time and end_time might not be |
| * available; this is the case for older (pre-3.2) |
| * servers. |
| * |
| * We need to have result structure members to hold |
| * the both sides' start_time and end_time. |
| */ |
| if (j_start_time && j_end_time) { |
| sp->result->receiver_time = j_end_time->valuedouble - j_start_time->valuedouble; |
| } |
| else { |
| sp->result->receiver_time = 0.0; |
| } |
| } else { |
| sp->peer_packet_count = pcount; |
| sp->result->bytes_sent = bytes_transferred; |
| sp->result->stream_retrans = retransmits; |
| if (j_start_time && j_end_time) { |
| sp->result->sender_time = j_end_time->valuedouble - j_start_time->valuedouble; |
| } |
| else { |
| sp->result->sender_time = 0.0; |
| } |
| } |
| } |
| } |
| } |
| } |
| /* |
| * If we're the client and we're supposed to get remote results, |
| * look them up and process accordingly. |
| */ |
| if (test->role == 'c' && iperf_get_test_get_server_output(test)) { |
| /* Look for JSON. If we find it, grab the object so it doesn't get deleted. */ |
| j_server_output = cJSON_DetachItemFromObject(j, "server_output_json"); |
| if (j_server_output != NULL) { |
| test->json_server_output = j_server_output; |
| } |
| else { |
| /* No JSON, look for textual output. Make a copy of the text for later. */ |
| j_server_output = cJSON_GetObjectItem(j, "server_output_text"); |
| if (j_server_output != NULL) { |
| test->server_output_text = strdup(j_server_output->valuestring); |
| } |
| } |
| } |
| } |
| } |
| |
| j_remote_congestion_used = cJSON_GetObjectItem(j, "congestion_used"); |
| if (j_remote_congestion_used != NULL) { |
| test->remote_congestion_used = strdup(j_remote_congestion_used->valuestring); |
| } |
| |
| cJSON_Delete(j); |
| } |
| return r; |
| } |
| |
| /*************************************************************/ |
| |
| static int |
| JSON_write(int fd, cJSON *json) |
| { |
| uint32_t hsize, nsize; |
| char *str; |
| int r = 0; |
| |
| str = cJSON_PrintUnformatted(json); |
| if (str == NULL) |
| r = -1; |
| else { |
| hsize = strlen(str); |
| nsize = htonl(hsize); |
| if (Nwrite(fd, (char*) &nsize, sizeof(nsize), Ptcp) < 0) |
| r = -1; |
| else { |
| if (Nwrite(fd, str, hsize, Ptcp) < 0) |
| r = -1; |
| } |
| cJSON_free(str); |
| } |
| return r; |
| } |
| |
| /*************************************************************/ |
| |
| static cJSON * |
| JSON_read(int fd) |
| { |
| uint32_t hsize, nsize; |
| char *str; |
| cJSON *json = NULL; |
| int rc; |
| |
| /* |
| * Read a four-byte integer, which is the length of the JSON to follow. |
| * Then read the JSON into a buffer and parse it. Return a parsed JSON |
| * structure, NULL if there was an error. |
| */ |
| if (Nread(fd, (char*) &nsize, sizeof(nsize), Ptcp) >= 0) { |
| hsize = ntohl(nsize); |
| /* Allocate a buffer to hold the JSON */ |
| str = (char *) calloc(sizeof(char), hsize+1); /* +1 for trailing null */ |
| if (str != NULL) { |
| rc = Nread(fd, str, hsize, Ptcp); |
| if (rc >= 0) { |
| /* |
| * We should be reading in the number of bytes corresponding to the |
| * length in that 4-byte integer. If we don't the socket might have |
| * prematurely closed. Only do the JSON parsing if we got the |
| * correct number of bytes. |
| */ |
| if (rc == hsize) { |
| json = cJSON_Parse(str); |
| } |
| else { |
| printf("WARNING: Size of data read does not correspond to offered length\n"); |
| } |
| } |
| } |
| free(str); |
| } |
| return json; |
| } |
| |
| /*************************************************************/ |
| /** |
| * add_to_interval_list -- adds new interval to the interval_list |
| */ |
| |
| void |
| add_to_interval_list(struct iperf_stream_result * rp, struct iperf_interval_results * new) |
| { |
| struct iperf_interval_results *irp; |
| |
| irp = (struct iperf_interval_results *) malloc(sizeof(struct iperf_interval_results)); |
| memcpy(irp, new, sizeof(struct iperf_interval_results)); |
| TAILQ_INSERT_TAIL(&rp->interval_results, irp, irlistentries); |
| } |
| |
| |
| /************************************************************/ |
| |
| /** |
| * connect_msg -- displays connection message |
| * denoting sender/receiver details |
| * |
| */ |
| |
| void |
| connect_msg(struct iperf_stream *sp) |
| { |
| char ipl[INET6_ADDRSTRLEN], ipr[INET6_ADDRSTRLEN]; |
| int lport, rport; |
| |
| if (getsockdomain(sp->socket) == AF_INET) { |
| inet_ntop(AF_INET, (void *) &((struct sockaddr_in *) &sp->local_addr)->sin_addr, ipl, sizeof(ipl)); |
| mapped_v4_to_regular_v4(ipl); |
| inet_ntop(AF_INET, (void *) &((struct sockaddr_in *) &sp->remote_addr)->sin_addr, ipr, sizeof(ipr)); |
| mapped_v4_to_regular_v4(ipr); |
| lport = ntohs(((struct sockaddr_in *) &sp->local_addr)->sin_port); |
| rport = ntohs(((struct sockaddr_in *) &sp->remote_addr)->sin_port); |
| } else { |
| inet_ntop(AF_INET6, (void *) &((struct sockaddr_in6 *) &sp->local_addr)->sin6_addr, ipl, sizeof(ipl)); |
| mapped_v4_to_regular_v4(ipl); |
| inet_ntop(AF_INET6, (void *) &((struct sockaddr_in6 *) &sp->remote_addr)->sin6_addr, ipr, sizeof(ipr)); |
| mapped_v4_to_regular_v4(ipr); |
| lport = ntohs(((struct sockaddr_in6 *) &sp->local_addr)->sin6_port); |
| rport = ntohs(((struct sockaddr_in6 *) &sp->remote_addr)->sin6_port); |
| } |
| |
| if (sp->test->json_output) |
| cJSON_AddItemToArray(sp->test->json_connected, iperf_json_printf("socket: %d local_host: %s local_port: %d remote_host: %s remote_port: %d", (int64_t) sp->socket, ipl, (int64_t) lport, ipr, (int64_t) rport)); |
| else |
| iperf_printf(sp->test, report_connected, sp->socket, ipl, lport, ipr, rport); |
| } |
| |
| |
| /**************************************************************************/ |
| |
| struct iperf_test * |
| iperf_new_test() |
| { |
| struct iperf_test *test; |
| |
| test = (struct iperf_test *) malloc(sizeof(struct iperf_test)); |
| if (!test) { |
| i_errno = IENEWTEST; |
| return NULL; |
| } |
| /* initialize everything to zero */ |
| memset(test, 0, sizeof(struct iperf_test)); |
| |
| test->settings = (struct iperf_settings *) malloc(sizeof(struct iperf_settings)); |
| if (!test->settings) { |
| free(test); |
| i_errno = IENEWTEST; |
| return NULL; |
| } |
| memset(test->settings, 0, sizeof(struct iperf_settings)); |
| |
| test->bitrate_limit_intervals_traffic_bytes = (iperf_size_t *) malloc(sizeof(iperf_size_t) * MAX_INTERVAL); |
| if (!test->bitrate_limit_intervals_traffic_bytes) { |
| free(test->settings); |
| free(test); |
| i_errno = IENEWTEST; |
| return NULL; |
| } |
| memset(test->bitrate_limit_intervals_traffic_bytes, 0, sizeof(sizeof(iperf_size_t) * MAX_INTERVAL)); |
| |
| /* By default all output goes to stdout */ |
| test->outfile = stdout; |
| |
| return test; |
| } |
| |
| /**************************************************************************/ |
| |
| struct protocol * |
| protocol_new(void) |
| { |
| struct protocol *proto; |
| |
| proto = malloc(sizeof(struct protocol)); |
| if(!proto) { |
| return NULL; |
| } |
| memset(proto, 0, sizeof(struct protocol)); |
| |
| return proto; |
| } |
| |
| void |
| protocol_free(struct protocol *proto) |
| { |
| free(proto); |
| } |
| |
| /**************************************************************************/ |
| int |
| iperf_defaults(struct iperf_test *testp) |
| { |
| struct protocol *tcp, *udp; |
| #if defined(HAVE_SCTP_H) |
| struct protocol *sctp; |
| #endif /* HAVE_SCTP_H */ |
| |
| testp->omit = OMIT; |
| testp->duration = DURATION; |
| testp->diskfile_name = (char*) 0; |
| testp->affinity = -1; |
| testp->server_affinity = -1; |
| TAILQ_INIT(&testp->xbind_addrs); |
| #if defined(HAVE_CPUSET_SETAFFINITY) |
| CPU_ZERO(&testp->cpumask); |
| #endif /* HAVE_CPUSET_SETAFFINITY */ |
| testp->title = NULL; |
| testp->extra_data = NULL; |
| testp->congestion = NULL; |
| testp->congestion_used = NULL; |
| testp->remote_congestion_used = NULL; |
| testp->server_port = PORT; |
| testp->ctrl_sck = -1; |
| testp->listener = -1; |
| testp->prot_listener = -1; |
| testp->other_side_has_retransmits = 0; |
| |
| testp->stats_callback = iperf_stats_callback; |
| testp->reporter_callback = iperf_reporter_callback; |
| |
| testp->stats_interval = testp->reporter_interval = 1; |
| testp->num_streams = 1; |
| |
| testp->settings->domain = AF_UNSPEC; |
| testp->settings->unit_format = 'a'; |
| testp->settings->socket_bufsize = 0; /* use autotuning */ |
| testp->settings->blksize = DEFAULT_TCP_BLKSIZE; |
| testp->settings->rate = 0; |
| testp->settings->bitrate_limit = 0; |
| testp->settings->bitrate_limit_interval = 5; |
| testp->settings->bitrate_limit_stats_per_interval = 0; |
| testp->settings->fqrate = 0; |
| testp->settings->pacing_timer = DEFAULT_PACING_TIMER; |
| testp->settings->burst = 0; |
| testp->settings->mss = 0; |
| testp->settings->bytes = 0; |
| testp->settings->blocks = 0; |
| testp->settings->connect_timeout = -1; |
| testp->settings->rcv_timeout.secs = DEFAULT_NO_MSG_RCVD_TIMEOUT / SEC_TO_mS; |
| testp->settings->rcv_timeout.usecs = (DEFAULT_NO_MSG_RCVD_TIMEOUT % SEC_TO_mS) * mS_TO_US; |
| testp->zerocopy = 0; |
| |
| memset(testp->cookie, 0, COOKIE_SIZE); |
| |
| testp->multisend = 10; /* arbitrary */ |
| |
| /* Set up protocol list */ |
| SLIST_INIT(&testp->streams); |
| SLIST_INIT(&testp->protocols); |
| |
| tcp = protocol_new(); |
| if (!tcp) |
| return -1; |
| |
| tcp->id = Ptcp; |
| tcp->name = "TCP"; |
| tcp->accept = iperf_tcp_accept; |
| tcp->listen = iperf_tcp_listen; |
| tcp->connect = iperf_tcp_connect; |
| tcp->send = iperf_tcp_send; |
| tcp->recv = iperf_tcp_recv; |
| tcp->init = NULL; |
| SLIST_INSERT_HEAD(&testp->protocols, tcp, protocols); |
| |
| udp = protocol_new(); |
| if (!udp) { |
| protocol_free(tcp); |
| return -1; |
| } |
| |
| udp->id = Pudp; |
| udp->name = "UDP"; |
| udp->accept = iperf_udp_accept; |
| udp->listen = iperf_udp_listen; |
| udp->connect = iperf_udp_connect; |
| udp->send = iperf_udp_send; |
| udp->recv = iperf_udp_recv; |
| udp->init = iperf_udp_init; |
| SLIST_INSERT_AFTER(tcp, udp, protocols); |
| |
| set_protocol(testp, Ptcp); |
| |
| #if defined(HAVE_SCTP_H) |
| sctp = protocol_new(); |
| if (!sctp) { |
| protocol_free(tcp); |
| protocol_free(udp); |
| return -1; |
| } |
| |
| sctp->id = Psctp; |
| sctp->name = "SCTP"; |
| sctp->accept = iperf_sctp_accept; |
| sctp->listen = iperf_sctp_listen; |
| sctp->connect = iperf_sctp_connect; |
| sctp->send = iperf_sctp_send; |
| sctp->recv = iperf_sctp_recv; |
| sctp->init = iperf_sctp_init; |
| |
| SLIST_INSERT_AFTER(udp, sctp, protocols); |
| #endif /* HAVE_SCTP_H */ |
| |
| testp->on_new_stream = iperf_on_new_stream; |
| testp->on_test_start = iperf_on_test_start; |
| testp->on_connect = iperf_on_connect; |
| testp->on_test_finish = iperf_on_test_finish; |
| |
| TAILQ_INIT(&testp->server_output_list); |
| |
| return 0; |
| } |
| |
| |
| /**************************************************************************/ |
| void |
| iperf_free_test(struct iperf_test *test) |
| { |
| struct protocol *prot; |
| struct iperf_stream *sp; |
| |
| /* Free streams */ |
| while (!SLIST_EMPTY(&test->streams)) { |
| sp = SLIST_FIRST(&test->streams); |
| SLIST_REMOVE_HEAD(&test->streams, streams); |
| iperf_free_stream(sp); |
| } |
| if (test->server_hostname) |
| free(test->server_hostname); |
| if (test->tmp_template) |
| free(test->tmp_template); |
| if (test->bind_address) |
| free(test->bind_address); |
| if (test->bind_dev) |
| free(test->bind_dev); |
| if (!TAILQ_EMPTY(&test->xbind_addrs)) { |
| struct xbind_entry *xbe; |
| |
| while (!TAILQ_EMPTY(&test->xbind_addrs)) { |
| xbe = TAILQ_FIRST(&test->xbind_addrs); |
| TAILQ_REMOVE(&test->xbind_addrs, xbe, link); |
| if (xbe->ai) |
| freeaddrinfo(xbe->ai); |
| free(xbe->name); |
| free(xbe); |
| } |
| } |
| #if defined(HAVE_SSL) |
| |
| if (test->server_rsa_private_key) |
| EVP_PKEY_free(test->server_rsa_private_key); |
| |