4654 lines
153 KiB
C
4654 lines
153 KiB
C
/*
|
|
* iperf, Copyright (c) 2014-2021, The Regents of the University of
|
|
* California, through Lawrence Berkeley National Laboratory (subject
|
|
* to receipt of any required approvals from the U.S. Dept. of
|
|
* Energy). All rights reserved.
|
|
*
|
|
* If you have questions about your rights to use or distribute this
|
|
* software, please contact Berkeley Lab's Technology Transfer
|
|
* Department at TTD@lbl.gov.
|
|
*
|
|
* NOTICE. This software is owned by the U.S. Department of Energy.
|
|
* As such, the U.S. Government has been granted for itself and others
|
|
* acting on its behalf a paid-up, nonexclusive, irrevocable,
|
|
* worldwide license in the Software to reproduce, prepare derivative
|
|
* works, and perform publicly and display publicly. Beginning five
|
|
* (5) years after the date permission to assert copyright is obtained
|
|
* from the U.S. Department of Energy, and subject to any subsequent
|
|
* five (5) year renewals, the U.S. Government is granted for itself
|
|
* and others acting on its behalf a paid-up, nonexclusive,
|
|
* irrevocable, worldwide license in the Software to reproduce,
|
|
* prepare derivative works, distribute copies to the public, perform
|
|
* publicly and display publicly, and to permit others to do so.
|
|
*
|
|
* This code is distributed under a BSD style license, see the LICENSE file
|
|
* for complete information.
|
|
*/
|
|
#ifndef _GNU_SOURCE
|
|
# define _GNU_SOURCE
|
|
#endif
|
|
#define __USE_GNU
|
|
|
|
#include "iperf_config.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <time.h>
|
|
#include <getopt.h>
|
|
#include <errno.h>
|
|
#include <signal.h>
|
|
#include <unistd.h>
|
|
#include <assert.h>
|
|
#include <fcntl.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/types.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <netdb.h>
|
|
#ifdef HAVE_STDINT_H
|
|
#include <stdint.h>
|
|
#endif
|
|
#include <sys/time.h>
|
|
#include <sys/resource.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/stat.h>
|
|
#include <sched.h>
|
|
#include <setjmp.h>
|
|
#include <stdarg.h>
|
|
#include <math.h>
|
|
|
|
#if defined(HAVE_CPUSET_SETAFFINITY)
|
|
#include <sys/param.h>
|
|
#include <sys/cpuset.h>
|
|
#endif /* HAVE_CPUSET_SETAFFINITY */
|
|
|
|
#if defined(__CYGWIN__) || defined(_WIN32) || defined(_WIN64) || defined(__WINDOWS__)
|
|
#define CPU_SETSIZE __CPU_SETSIZE
|
|
#endif /* __CYGWIN__, _WIN32, _WIN64, __WINDOWS__ */
|
|
|
|
#if defined(HAVE_SETPROCESSAFFINITYMASK)
|
|
#include <Windows.h>
|
|
#endif /* HAVE_SETPROCESSAFFINITYMASK */
|
|
|
|
#include "net.h"
|
|
#include "iperf.h"
|
|
#include "iperf_api.h"
|
|
#include "iperf_udp.h"
|
|
#include "iperf_tcp.h"
|
|
#if defined(HAVE_SCTP_H)
|
|
#include "iperf_sctp.h"
|
|
#endif /* HAVE_SCTP_H */
|
|
#include "timer.h"
|
|
|
|
#include "cjson.h"
|
|
#include "units.h"
|
|
#include "iperf_util.h"
|
|
#include "iperf_locale.h"
|
|
#include "version.h"
|
|
#if defined(HAVE_SSL)
|
|
#include <openssl/bio.h>
|
|
#include <openssl/err.h>
|
|
#include "iperf_auth.h"
|
|
#endif /* HAVE_SSL */
|
|
|
|
/* Forwards. */
|
|
static int send_parameters(struct iperf_test *test);
|
|
static int get_parameters(struct iperf_test *test);
|
|
static int send_results(struct iperf_test *test);
|
|
static int get_results(struct iperf_test *test);
|
|
static int diskfile_send(struct iperf_stream *sp);
|
|
static int diskfile_recv(struct iperf_stream *sp);
|
|
static int JSON_write(int fd, cJSON *json);
|
|
static void print_interval_results(struct iperf_test *test, struct iperf_stream *sp, cJSON *json_interval_streams);
|
|
static cJSON *JSON_read(int fd);
|
|
|
|
|
|
/*************************** Print usage functions ****************************/
|
|
|
|
void
|
|
usage()
|
|
{
|
|
fputs(usage_shortstr, stderr);
|
|
}
|
|
|
|
|
|
void
|
|
usage_long(FILE *f)
|
|
{
|
|
fprintf(f, usage_longstr, DEFAULT_NO_MSG_RCVD_TIMEOUT, UDP_RATE / (1024*1024), DEFAULT_PACING_TIMER, DURATION, DEFAULT_TCP_BLKSIZE / 1024, DEFAULT_UDP_BLKSIZE);
|
|
}
|
|
|
|
|
|
void warning(const char *str)
|
|
{
|
|
fprintf(stderr, "warning: %s\n", str);
|
|
}
|
|
|
|
|
|
/************** Getter routines for some fields inside iperf_test *************/
|
|
|
|
int
|
|
iperf_get_verbose(struct iperf_test *ipt)
|
|
{
|
|
return ipt->verbose;
|
|
}
|
|
|
|
int
|
|
iperf_get_control_socket(struct iperf_test *ipt)
|
|
{
|
|
return ipt->ctrl_sck;
|
|
}
|
|
|
|
int
|
|
iperf_get_control_socket_mss(struct iperf_test *ipt)
|
|
{
|
|
return ipt->ctrl_sck_mss;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_omit(struct iperf_test *ipt)
|
|
{
|
|
return ipt->omit;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_duration(struct iperf_test *ipt)
|
|
{
|
|
return ipt->duration;
|
|
}
|
|
|
|
uint64_t
|
|
iperf_get_test_rate(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->rate;
|
|
}
|
|
|
|
uint64_t
|
|
iperf_get_test_bitrate_limit(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->bitrate_limit;
|
|
}
|
|
|
|
double
|
|
iperf_get_test_bitrate_limit_interval(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->bitrate_limit_interval;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_bitrate_limit_stats_per_interval(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->bitrate_limit_stats_per_interval;
|
|
}
|
|
|
|
uint64_t
|
|
iperf_get_test_fqrate(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->fqrate;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_pacing_timer(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->pacing_timer;
|
|
}
|
|
|
|
uint64_t
|
|
iperf_get_test_bytes(struct iperf_test *ipt)
|
|
{
|
|
return (uint64_t) ipt->settings->bytes;
|
|
}
|
|
|
|
uint64_t
|
|
iperf_get_test_blocks(struct iperf_test *ipt)
|
|
{
|
|
return (uint64_t) ipt->settings->blocks;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_burst(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->burst;
|
|
}
|
|
|
|
char
|
|
iperf_get_test_role(struct iperf_test *ipt)
|
|
{
|
|
return ipt->role;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_reverse(struct iperf_test *ipt)
|
|
{
|
|
return ipt->reverse;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_blksize(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->blksize;
|
|
}
|
|
|
|
FILE *
|
|
iperf_get_test_outfile (struct iperf_test *ipt)
|
|
{
|
|
return ipt->outfile;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_socket_bufsize(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->socket_bufsize;
|
|
}
|
|
|
|
double
|
|
iperf_get_test_reporter_interval(struct iperf_test *ipt)
|
|
{
|
|
return ipt->reporter_interval;
|
|
}
|
|
|
|
double
|
|
iperf_get_test_stats_interval(struct iperf_test *ipt)
|
|
{
|
|
return ipt->stats_interval;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_num_streams(struct iperf_test *ipt)
|
|
{
|
|
return ipt->num_streams;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_timestamps(struct iperf_test *ipt)
|
|
{
|
|
return ipt->timestamps;
|
|
}
|
|
|
|
const char *
|
|
iperf_get_test_timestamp_format(struct iperf_test *ipt)
|
|
{
|
|
return ipt->timestamp_format;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_repeating_payload(struct iperf_test *ipt)
|
|
{
|
|
return ipt->repeating_payload;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_server_port(struct iperf_test *ipt)
|
|
{
|
|
return ipt->server_port;
|
|
}
|
|
|
|
char*
|
|
iperf_get_test_server_hostname(struct iperf_test *ipt)
|
|
{
|
|
return ipt->server_hostname;
|
|
}
|
|
|
|
char*
|
|
iperf_get_test_template(struct iperf_test *ipt)
|
|
{
|
|
return ipt->tmp_template;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_protocol_id(struct iperf_test *ipt)
|
|
{
|
|
return ipt->protocol->id;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_json_output(struct iperf_test *ipt)
|
|
{
|
|
return ipt->json_output;
|
|
}
|
|
|
|
char *
|
|
iperf_get_test_json_output_string(struct iperf_test *ipt)
|
|
{
|
|
return ipt->json_output_string;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_zerocopy(struct iperf_test *ipt)
|
|
{
|
|
return ipt->zerocopy;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_get_server_output(struct iperf_test *ipt)
|
|
{
|
|
return ipt->get_server_output;
|
|
}
|
|
|
|
char
|
|
iperf_get_test_unit_format(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->unit_format;
|
|
}
|
|
|
|
char *
|
|
iperf_get_test_bind_address(struct iperf_test *ipt)
|
|
{
|
|
return ipt->bind_address;
|
|
}
|
|
|
|
char *
|
|
iperf_get_test_bind_dev(struct iperf_test *ipt)
|
|
{
|
|
return ipt->bind_dev;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_udp_counters_64bit(struct iperf_test *ipt)
|
|
{
|
|
return ipt->udp_counters_64bit;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_one_off(struct iperf_test *ipt)
|
|
{
|
|
return ipt->one_off;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_tos(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->tos;
|
|
}
|
|
|
|
char *
|
|
iperf_get_test_extra_data(struct iperf_test *ipt)
|
|
{
|
|
return ipt->extra_data;
|
|
}
|
|
|
|
static const char iperf_version[] = IPERF_VERSION;
|
|
char *
|
|
iperf_get_iperf_version(void)
|
|
{
|
|
return (char*)iperf_version;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_no_delay(struct iperf_test *ipt)
|
|
{
|
|
return ipt->no_delay;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_connect_timeout(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->connect_timeout;
|
|
}
|
|
|
|
int
|
|
iperf_get_test_idle_timeout(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->idle_timeout;
|
|
}
|
|
|
|
int
|
|
iperf_get_dont_fragment(struct iperf_test *ipt)
|
|
{
|
|
return ipt->settings->dont_fragment;
|
|
}
|
|
|
|
struct iperf_time*
|
|
iperf_get_test_rcv_timeout(struct iperf_test *ipt)
|
|
{
|
|
return &ipt->settings->rcv_timeout;
|
|
}
|
|
|
|
char*
|
|
iperf_get_test_congestion_control(struct iperf_test* ipt)
|
|
{
|
|
return ipt->congestion;
|
|
}
|
|
|
|
/************** Setter routines for some fields inside iperf_test *************/
|
|
|
|
void
|
|
iperf_set_verbose(struct iperf_test *ipt, int verbose)
|
|
{
|
|
ipt->verbose = verbose;
|
|
}
|
|
|
|
void
|
|
iperf_set_control_socket(struct iperf_test *ipt, int ctrl_sck)
|
|
{
|
|
ipt->ctrl_sck = ctrl_sck;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_omit(struct iperf_test *ipt, int omit)
|
|
{
|
|
ipt->omit = omit;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_duration(struct iperf_test *ipt, int duration)
|
|
{
|
|
ipt->duration = duration;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_reporter_interval(struct iperf_test *ipt, double reporter_interval)
|
|
{
|
|
ipt->reporter_interval = reporter_interval;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_stats_interval(struct iperf_test *ipt, double stats_interval)
|
|
{
|
|
ipt->stats_interval = stats_interval;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_state(struct iperf_test *ipt, signed char state)
|
|
{
|
|
ipt->state = state;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_blksize(struct iperf_test *ipt, int blksize)
|
|
{
|
|
ipt->settings->blksize = blksize;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_logfile(struct iperf_test *ipt, const char *logfile)
|
|
{
|
|
ipt->logfile = strdup(logfile);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_rate(struct iperf_test *ipt, uint64_t rate)
|
|
{
|
|
ipt->settings->rate = rate;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_bitrate_limit_maximum(struct iperf_test *ipt, uint64_t total_rate)
|
|
{
|
|
ipt->settings->bitrate_limit = total_rate;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_bitrate_limit_interval(struct iperf_test *ipt, uint64_t bitrate_limit_interval)
|
|
{
|
|
ipt->settings->bitrate_limit_interval = bitrate_limit_interval;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_bitrate_limit_stats_per_interval(struct iperf_test *ipt, uint64_t bitrate_limit_stats_per_interval)
|
|
{
|
|
ipt->settings->bitrate_limit_stats_per_interval = bitrate_limit_stats_per_interval;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_fqrate(struct iperf_test *ipt, uint64_t fqrate)
|
|
{
|
|
ipt->settings->fqrate = fqrate;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_pacing_timer(struct iperf_test *ipt, int pacing_timer)
|
|
{
|
|
ipt->settings->pacing_timer = pacing_timer;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_bytes(struct iperf_test *ipt, uint64_t bytes)
|
|
{
|
|
ipt->settings->bytes = (iperf_size_t) bytes;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_blocks(struct iperf_test *ipt, uint64_t blocks)
|
|
{
|
|
ipt->settings->blocks = (iperf_size_t) blocks;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_burst(struct iperf_test *ipt, int burst)
|
|
{
|
|
ipt->settings->burst = burst;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_server_port(struct iperf_test *ipt, int srv_port)
|
|
{
|
|
ipt->server_port = srv_port;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_socket_bufsize(struct iperf_test *ipt, int socket_bufsize)
|
|
{
|
|
ipt->settings->socket_bufsize = socket_bufsize;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_num_streams(struct iperf_test *ipt, int num_streams)
|
|
{
|
|
ipt->num_streams = num_streams;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_repeating_payload(struct iperf_test *ipt, int repeating_payload)
|
|
{
|
|
ipt->repeating_payload = repeating_payload;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_timestamps(struct iperf_test *ipt, int timestamps)
|
|
{
|
|
ipt->timestamps = timestamps;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_timestamp_format(struct iperf_test *ipt, const char *tf)
|
|
{
|
|
ipt->timestamp_format = strdup(tf);
|
|
}
|
|
|
|
static void
|
|
check_sender_has_retransmits(struct iperf_test *ipt)
|
|
{
|
|
if (ipt->mode != RECEIVER && ipt->protocol->id == Ptcp && has_tcpinfo_retransmits())
|
|
ipt->sender_has_retransmits = 1;
|
|
else
|
|
ipt->sender_has_retransmits = 0;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_role(struct iperf_test *ipt, char role)
|
|
{
|
|
ipt->role = role;
|
|
if (!ipt->reverse) {
|
|
if (ipt->bidirectional)
|
|
ipt->mode = BIDIRECTIONAL;
|
|
else if (role == 'c')
|
|
ipt->mode = SENDER;
|
|
else if (role == 's')
|
|
ipt->mode = RECEIVER;
|
|
} else {
|
|
if (role == 'c')
|
|
ipt->mode = RECEIVER;
|
|
else if (role == 's')
|
|
ipt->mode = SENDER;
|
|
}
|
|
check_sender_has_retransmits(ipt);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_server_hostname(struct iperf_test *ipt, const char *server_hostname)
|
|
{
|
|
ipt->server_hostname = strdup(server_hostname);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_template(struct iperf_test *ipt, const char *tmp_template)
|
|
{
|
|
ipt->tmp_template = strdup(tmp_template);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_reverse(struct iperf_test *ipt, int reverse)
|
|
{
|
|
ipt->reverse = reverse;
|
|
if (!ipt->reverse) {
|
|
if (ipt->role == 'c')
|
|
ipt->mode = SENDER;
|
|
else if (ipt->role == 's')
|
|
ipt->mode = RECEIVER;
|
|
} else {
|
|
if (ipt->role == 'c')
|
|
ipt->mode = RECEIVER;
|
|
else if (ipt->role == 's')
|
|
ipt->mode = SENDER;
|
|
}
|
|
check_sender_has_retransmits(ipt);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_json_output(struct iperf_test *ipt, int json_output)
|
|
{
|
|
ipt->json_output = json_output;
|
|
}
|
|
|
|
int
|
|
iperf_has_zerocopy( void )
|
|
{
|
|
return has_sendfile();
|
|
}
|
|
|
|
void
|
|
iperf_set_test_zerocopy(struct iperf_test *ipt, int zerocopy)
|
|
{
|
|
ipt->zerocopy = (zerocopy && has_sendfile());
|
|
}
|
|
|
|
void
|
|
iperf_set_test_get_server_output(struct iperf_test *ipt, int get_server_output)
|
|
{
|
|
ipt->get_server_output = get_server_output;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_unit_format(struct iperf_test *ipt, char unit_format)
|
|
{
|
|
ipt->settings->unit_format = unit_format;
|
|
}
|
|
|
|
#if defined(HAVE_SSL)
|
|
void
|
|
iperf_set_test_client_username(struct iperf_test *ipt, const char *client_username)
|
|
{
|
|
ipt->settings->client_username = strdup(client_username);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_client_password(struct iperf_test *ipt, const char *client_password)
|
|
{
|
|
ipt->settings->client_password = strdup(client_password);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_client_rsa_pubkey(struct iperf_test *ipt, const char *client_rsa_pubkey_base64)
|
|
{
|
|
ipt->settings->client_rsa_pubkey = load_pubkey_from_base64(client_rsa_pubkey_base64);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_server_authorized_users(struct iperf_test *ipt, const char *server_authorized_users)
|
|
{
|
|
ipt->server_authorized_users = strdup(server_authorized_users);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_server_skew_threshold(struct iperf_test *ipt, int server_skew_threshold)
|
|
{
|
|
ipt->server_skew_threshold = server_skew_threshold;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_server_rsa_privkey(struct iperf_test *ipt, const char *server_rsa_privkey_base64)
|
|
{
|
|
ipt->server_rsa_private_key = load_privkey_from_base64(server_rsa_privkey_base64);
|
|
}
|
|
#endif // HAVE_SSL
|
|
|
|
void
|
|
iperf_set_test_bind_address(struct iperf_test *ipt, const char *bnd_address)
|
|
{
|
|
ipt->bind_address = strdup(bnd_address);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_bind_dev(struct iperf_test *ipt, char *bnd_dev)
|
|
{
|
|
ipt->bind_dev = strdup(bnd_dev);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_udp_counters_64bit(struct iperf_test *ipt, int udp_counters_64bit)
|
|
{
|
|
ipt->udp_counters_64bit = udp_counters_64bit;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_one_off(struct iperf_test *ipt, int one_off)
|
|
{
|
|
ipt->one_off = one_off;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_tos(struct iperf_test *ipt, int tos)
|
|
{
|
|
ipt->settings->tos = tos;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_extra_data(struct iperf_test *ipt, const char *dat)
|
|
{
|
|
ipt->extra_data = strdup(dat);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_bidirectional(struct iperf_test* ipt, int bidirectional)
|
|
{
|
|
ipt->bidirectional = bidirectional;
|
|
if (bidirectional)
|
|
ipt->mode = BIDIRECTIONAL;
|
|
else
|
|
iperf_set_test_reverse(ipt, ipt->reverse);
|
|
}
|
|
|
|
void
|
|
iperf_set_test_no_delay(struct iperf_test* ipt, int no_delay)
|
|
{
|
|
ipt->no_delay = no_delay;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_connect_timeout(struct iperf_test* ipt, int ct)
|
|
{
|
|
ipt->settings->connect_timeout = ct;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_idle_timeout(struct iperf_test* ipt, int to)
|
|
{
|
|
ipt->settings->idle_timeout = to;
|
|
}
|
|
|
|
void
|
|
iperf_set_dont_fragment(struct iperf_test* ipt, int dnf)
|
|
{
|
|
ipt->settings->dont_fragment = dnf;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_rcv_timeout(struct iperf_test* ipt, struct iperf_time* to)
|
|
{
|
|
ipt->settings->rcv_timeout.secs = to->secs;
|
|
ipt->settings->rcv_timeout.usecs = to->usecs;
|
|
}
|
|
|
|
void
|
|
iperf_set_test_congestion_control(struct iperf_test* ipt, char* cc)
|
|
{
|
|
ipt->congestion = strdup(cc);
|
|
}
|
|
|
|
|
|
/********************** Get/set test protocol structure ***********************/
|
|
|
|
struct protocol *
|
|
get_protocol(struct iperf_test *test, int prot_id)
|
|
{
|
|
struct protocol *prot;
|
|
|
|
SLIST_FOREACH(prot, &test->protocols, protocols) {
|
|
if (prot->id == prot_id)
|
|
break;
|
|
}
|
|
|
|
if (prot == NULL)
|
|
i_errno = IEPROTOCOL;
|
|
|
|
return prot;
|
|
}
|
|
|
|
int
|
|
set_protocol(struct iperf_test *test, int prot_id)
|
|
{
|
|
struct protocol *prot = NULL;
|
|
|
|
SLIST_FOREACH(prot, &test->protocols, protocols) {
|
|
if (prot->id == prot_id) {
|
|
test->protocol = prot;
|
|
check_sender_has_retransmits(test);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
i_errno = IEPROTOCOL;
|
|
return -1;
|
|
}
|
|
|
|
|
|
/************************** Iperf callback functions **************************/
|
|
|
|
void
|
|
iperf_on_new_stream(struct iperf_stream *sp)
|
|
{
|
|
connect_msg(sp);
|
|
}
|
|
|
|
void
|
|
iperf_on_test_start(struct iperf_test *test)
|
|
{
|
|
if (test->json_output) {
|
|
cJSON_AddItemToObject(test->json_start, "test_start", iperf_json_printf("protocol: %s num_streams: %d blksize: %d omit: %d duration: %d bytes: %d blocks: %d reverse: %d tos: %d target_bitrate: %d", test->protocol->name, (int64_t) test->num_streams, (int64_t) test->settings->blksize, (int64_t) test->omit, (int64_t) test->duration, (int64_t) test->settings->bytes, (int64_t) test->settings->blocks, test->reverse?(int64_t)1:(int64_t)0, (int64_t) test->settings->tos, (int64_t) test->settings->rate));
|
|
} else {
|
|
if (test->verbose) {
|
|
if (test->settings->bytes)
|
|
iperf_printf(test, test_start_bytes, test->protocol->name, test->num_streams, test->settings->blksize, test->omit, test->settings->bytes, test->settings->tos);
|
|
else if (test->settings->blocks)
|
|
iperf_printf(test, test_start_blocks, test->protocol->name, test->num_streams, test->settings->blksize, test->omit, test->settings->blocks, test->settings->tos);
|
|
else
|
|
iperf_printf(test, test_start_time, test->protocol->name, test->num_streams, test->settings->blksize, test->omit, test->duration, test->settings->tos);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* This converts an IPv6 string address from IPv4-mapped format into regular
|
|
** old IPv4 format, which is easier on the eyes of network veterans.
|
|
**
|
|
** If the v6 address is not v4-mapped it is left alone.
|
|
*/
|
|
static void
|
|
mapped_v4_to_regular_v4(char *str)
|
|
{
|
|
char *prefix = "::ffff:";
|
|
int prefix_len;
|
|
|
|
prefix_len = strlen(prefix);
|
|
if (strncmp(str, prefix, prefix_len) == 0) {
|
|
int str_len = strlen(str);
|
|
memmove(str, str + prefix_len, str_len - prefix_len + 1);
|
|
}
|
|
}
|
|
|
|
void
|
|
iperf_on_connect(struct iperf_test *test)
|
|
{
|
|
time_t now_secs;
|
|
const char* rfc1123_fmt = "%a, %d %b %Y %H:%M:%S %Z";
|
|
char now_str[100];
|
|
char ipr[INET6_ADDRSTRLEN];
|
|
int port;
|
|
struct sockaddr_storage sa;
|
|
struct sockaddr_in *sa_inP;
|
|
struct sockaddr_in6 *sa_in6P;
|
|
socklen_t len;
|
|
|
|
now_secs = time((time_t*) 0);
|
|
(void) strftime(now_str, sizeof(now_str), rfc1123_fmt, gmtime(&now_secs));
|
|
if (test->json_output)
|
|
cJSON_AddItemToObject(test->json_start, "timestamp", iperf_json_printf("time: %s timesecs: %d", now_str, (int64_t) now_secs));
|
|
else if (test->verbose)
|
|
iperf_printf(test, report_time, now_str);
|
|
|
|
if (test->role == 'c') {
|
|
if (test->json_output)
|
|
cJSON_AddItemToObject(test->json_start, "connecting_to", iperf_json_printf("host: %s port: %d", test->server_hostname, (int64_t) test->server_port));
|
|
else {
|
|
iperf_printf(test, report_connecting, test->server_hostname, test->server_port);
|
|
if (test->reverse)
|
|
iperf_printf(test, report_reverse, test->server_hostname);
|
|
}
|
|
} else {
|
|
len = sizeof(sa);
|
|
getpeername(test->ctrl_sck, (struct sockaddr *) &sa, &len);
|
|
if (getsockdomain(test->ctrl_sck) == AF_INET) {
|
|
sa_inP = (struct sockaddr_in *) &sa;
|
|
inet_ntop(AF_INET, &sa_inP->sin_addr, ipr, sizeof(ipr));
|
|
port = ntohs(sa_inP->sin_port);
|
|
} else {
|
|
sa_in6P = (struct sockaddr_in6 *) &sa;
|
|
inet_ntop(AF_INET6, &sa_in6P->sin6_addr, ipr, sizeof(ipr));
|
|
port = ntohs(sa_in6P->sin6_port);
|
|
}
|
|
mapped_v4_to_regular_v4(ipr);
|
|
if (test->json_output)
|
|
cJSON_AddItemToObject(test->json_start, "accepted_connection", iperf_json_printf("host: %s port: %d", ipr, (int64_t) port));
|
|
else
|
|
iperf_printf(test, report_accepted, ipr, port);
|
|
}
|
|
if (test->json_output) {
|
|
cJSON_AddStringToObject(test->json_start, "cookie", test->cookie);
|
|
if (test->protocol->id == SOCK_STREAM) {
|
|
if (test->settings->mss)
|
|
cJSON_AddNumberToObject(test->json_start, "tcp_mss", test->settings->mss);
|
|
else {
|
|
cJSON_AddNumberToObject(test->json_start, "tcp_mss_default", test->ctrl_sck_mss);
|
|
}
|
|
}
|
|
cJSON_AddNumberToObject(test->json_start, "target_bitrate", test->settings->rate);
|
|
} else if (test->verbose) {
|
|
iperf_printf(test, report_cookie, test->cookie);
|
|
if (test->protocol->id == SOCK_STREAM) {
|
|
if (test->settings->mss)
|
|
iperf_printf(test, " TCP MSS: %d\n", test->settings->mss);
|
|
else {
|
|
iperf_printf(test, " TCP MSS: %d (default)\n", test->ctrl_sck_mss);
|
|
}
|
|
}
|
|
if (test->settings->rate)
|
|
iperf_printf(test, " Target Bitrate: %"PRIu64"\n", test->settings->rate);
|
|
}
|
|
}
|
|
|
|
void
|
|
iperf_on_test_finish(struct iperf_test *test)
|
|
{
|
|
}
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
int
|
|
iperf_parse_arguments(struct iperf_test *test, int argc, char **argv)
|
|
{
|
|
static struct option longopts[] =
|
|
{
|
|
{"port", required_argument, NULL, 'p'},
|
|
{"format", required_argument, NULL, 'f'},
|
|
{"interval", required_argument, NULL, 'i'},
|
|
{"daemon", no_argument, NULL, 'D'},
|
|
{"one-off", no_argument, NULL, '1'},
|
|
{"verbose", no_argument, NULL, 'V'},
|
|
{"json", no_argument, NULL, 'J'},
|
|
{"version", no_argument, NULL, 'v'},
|
|
{"server", no_argument, NULL, 's'},
|
|
{"client", required_argument, NULL, 'c'},
|
|
{"udp", no_argument, NULL, 'u'},
|
|
{"bitrate", required_argument, NULL, 'b'},
|
|
{"bandwidth", required_argument, NULL, 'b'},
|
|
{"server-bitrate-limit", required_argument, NULL, OPT_SERVER_BITRATE_LIMIT},
|
|
{"time", required_argument, NULL, 't'},
|
|
{"bytes", required_argument, NULL, 'n'},
|
|
{"blockcount", required_argument, NULL, 'k'},
|
|
{"length", required_argument, NULL, 'l'},
|
|
{"parallel", required_argument, NULL, 'P'},
|
|
{"reverse", no_argument, NULL, 'R'},
|
|
{"bidir", no_argument, NULL, OPT_BIDIRECTIONAL},
|
|
{"window", required_argument, NULL, 'w'},
|
|
{"bind", required_argument, NULL, 'B'},
|
|
#if defined(HAVE_SO_BINDTODEVICE)
|
|
{"bind-dev", required_argument, NULL, OPT_BIND_DEV},
|
|
#endif /* HAVE_SO_BINDTODEVICE */
|
|
{"cport", required_argument, NULL, OPT_CLIENT_PORT},
|
|
{"set-mss", required_argument, NULL, 'M'},
|
|
{"no-delay", no_argument, NULL, 'N'},
|
|
{"version4", no_argument, NULL, '4'},
|
|
{"version6", no_argument, NULL, '6'},
|
|
{"tos", required_argument, NULL, 'S'},
|
|
{"dscp", required_argument, NULL, OPT_DSCP},
|
|
{"extra-data", required_argument, NULL, OPT_EXTRA_DATA},
|
|
#if defined(HAVE_FLOWLABEL)
|
|
{"flowlabel", required_argument, NULL, 'L'},
|
|
#endif /* HAVE_FLOWLABEL */
|
|
{"zerocopy", no_argument, NULL, 'Z'},
|
|
{"omit", required_argument, NULL, 'O'},
|
|
{"file", required_argument, NULL, 'F'},
|
|
{"repeating-payload", no_argument, NULL, OPT_REPEATING_PAYLOAD},
|
|
{"timestamps", optional_argument, NULL, OPT_TIMESTAMPS},
|
|
#if defined(HAVE_CPU_AFFINITY)
|
|
{"affinity", required_argument, NULL, 'A'},
|
|
#endif /* HAVE_CPU_AFFINITY */
|
|
{"title", required_argument, NULL, 'T'},
|
|
#if defined(HAVE_TCP_CONGESTION)
|
|
{"congestion", required_argument, NULL, 'C'},
|
|
{"linux-congestion", required_argument, NULL, 'C'},
|
|
#endif /* HAVE_TCP_CONGESTION */
|
|
#if defined(HAVE_SCTP_H)
|
|
{"sctp", no_argument, NULL, OPT_SCTP},
|
|
{"nstreams", required_argument, NULL, OPT_NUMSTREAMS},
|
|
{"xbind", required_argument, NULL, 'X'},
|
|
#endif
|
|
{"pidfile", required_argument, NULL, 'I'},
|
|
{"logfile", required_argument, NULL, OPT_LOGFILE},
|
|
{"forceflush", no_argument, NULL, OPT_FORCEFLUSH},
|
|
{"get-server-output", no_argument, NULL, OPT_GET_SERVER_OUTPUT},
|
|
{"udp-counters-64bit", no_argument, NULL, OPT_UDP_COUNTERS_64BIT},
|
|
{"no-fq-socket-pacing", no_argument, NULL, OPT_NO_FQ_SOCKET_PACING},
|
|
#if defined(HAVE_DONT_FRAGMENT)
|
|
{"dont-fragment", no_argument, NULL, OPT_DONT_FRAGMENT},
|
|
#endif /* HAVE_DONT_FRAGMENT */
|
|
#if defined(HAVE_SSL)
|
|
{"username", required_argument, NULL, OPT_CLIENT_USERNAME},
|
|
{"rsa-public-key-path", required_argument, NULL, OPT_CLIENT_RSA_PUBLIC_KEY},
|
|
{"rsa-private-key-path", required_argument, NULL, OPT_SERVER_RSA_PRIVATE_KEY},
|
|
{"authorized-users-path", required_argument, NULL, OPT_SERVER_AUTHORIZED_USERS},
|
|
{"time-skew-threshold", required_argument, NULL, OPT_SERVER_SKEW_THRESHOLD},
|
|
#endif /* HAVE_SSL */
|
|
{"fq-rate", required_argument, NULL, OPT_FQ_RATE},
|
|
{"pacing-timer", required_argument, NULL, OPT_PACING_TIMER},
|
|
{"connect-timeout", required_argument, NULL, OPT_CONNECT_TIMEOUT},
|
|
{"idle-timeout", required_argument, NULL, OPT_IDLE_TIMEOUT},
|
|
{"rcv-timeout", required_argument, NULL, OPT_RCV_TIMEOUT},
|
|
{"debug", no_argument, NULL, 'd'},
|
|
{"help", no_argument, NULL, 'h'},
|
|
{NULL, 0, NULL, 0}
|
|
};
|
|
int flag;
|
|
int portno;
|
|
int blksize;
|
|
int server_flag, client_flag, rate_flag, duration_flag, rcv_timeout_flag;
|
|
char *endptr;
|
|
#if defined(HAVE_CPU_AFFINITY)
|
|
char* comma;
|
|
#endif /* HAVE_CPU_AFFINITY */
|
|
char* slash;
|
|
struct xbind_entry *xbe;
|
|
double farg;
|
|
int rcv_timeout_in = 0;
|
|
|
|
blksize = 0;
|
|
server_flag = client_flag = rate_flag = duration_flag = rcv_timeout_flag = 0;
|
|
#if defined(HAVE_SSL)
|
|
char *client_username = NULL, *client_rsa_public_key = NULL, *server_rsa_private_key = NULL;
|
|
#endif /* HAVE_SSL */
|
|
|
|
while ((flag = getopt_long(argc, argv, "p:f:i:D1VJvsc:ub:t:n:k:l:P:Rw:B:M:N46S:L:ZO:F:A:T:C:dI:hX:", longopts, NULL)) != -1) {
|
|
switch (flag) {
|
|
case 'p':
|
|
portno = atoi(optarg);
|
|
if (portno < 1 || portno > 65535) {
|
|
i_errno = IEBADPORT;
|
|
return -1;
|
|
}
|
|
test->server_port = portno;
|
|
break;
|
|
case 'f':
|
|
if (!optarg) {
|
|
i_errno = IEBADFORMAT;
|
|
return -1;
|
|
}
|
|
test->settings->unit_format = *optarg;
|
|
if (test->settings->unit_format == 'k' ||
|
|
test->settings->unit_format == 'K' ||
|
|
test->settings->unit_format == 'm' ||
|
|
test->settings->unit_format == 'M' ||
|
|
test->settings->unit_format == 'g' ||
|
|
test->settings->unit_format == 'G' ||
|
|
test->settings->unit_format == 't' ||
|
|
test->settings->unit_format == 'T') {
|
|
break;
|
|
}
|
|
else {
|
|
i_errno = IEBADFORMAT;
|
|
return -1;
|
|
}
|
|
break;
|
|
case 'i':
|
|
/* XXX: could potentially want separate stat collection and reporting intervals,
|
|
but just set them to be the same for now */
|
|
test->stats_interval = test->reporter_interval = atof(optarg);
|
|
if ((test->stats_interval < MIN_INTERVAL || test->stats_interval > MAX_INTERVAL) && test->stats_interval != 0) {
|
|
i_errno = IEINTERVAL;
|
|
return -1;
|
|
}
|
|
break;
|
|
case 'D':
|
|
test->daemon = 1;
|
|
server_flag = 1;
|
|
break;
|
|
case '1':
|
|
test->one_off = 1;
|
|
server_flag = 1;
|
|
break;
|
|
case 'V':
|
|
test->verbose = 1;
|
|
break;
|
|
case 'J':
|
|
test->json_output = 1;
|
|
break;
|
|
case 'v':
|
|
printf("%s (cJSON %s)\n%s\n%s\n", version, cJSON_Version(), get_system_info(),
|
|
get_optional_features());
|
|
exit(0);
|
|
case 's':
|
|
if (test->role == 'c') {
|
|
i_errno = IESERVCLIENT;
|
|
return -1;
|
|
}
|
|
iperf_set_test_role(test, 's');
|
|
break;
|
|
case 'c':
|
|
if (test->role == 's') {
|
|
i_errno = IESERVCLIENT;
|
|
return -1;
|
|
}
|
|
iperf_set_test_role(test, 'c');
|
|
iperf_set_test_server_hostname(test, optarg);
|
|
break;
|
|
case 'u':
|
|
set_protocol(test, Pudp);
|
|
client_flag = 1;
|
|
break;
|
|
case OPT_SCTP:
|
|
#if defined(HAVE_SCTP_H)
|
|
set_protocol(test, Psctp);
|
|
client_flag = 1;
|
|
break;
|
|
#else /* HAVE_SCTP_H */
|
|
i_errno = IEUNIMP;
|
|
return -1;
|
|
#endif /* HAVE_SCTP_H */
|
|
|
|
case OPT_NUMSTREAMS:
|
|
#if defined(linux) || defined(__FreeBSD__)
|
|
test->settings->num_ostreams = unit_atoi(optarg);
|
|
client_flag = 1;
|
|
#else /* linux */
|
|
i_errno = IEUNIMP;
|
|
return -1;
|
|
#endif /* linux */
|
|
case 'b':
|
|
slash = strchr(optarg, '/');
|
|
if (slash) {
|
|
*slash = '\0';
|
|
++slash;
|
|
test->settings->burst = atoi(slash);
|
|
if (test->settings->burst <= 0 ||
|
|
test->settings->burst > MAX_BURST) {
|
|
i_errno = IEBURST;
|
|
return -1;
|
|
}
|
|
}
|
|
test->settings->rate = unit_atof_rate(optarg);
|
|
rate_flag = 1;
|
|
client_flag = 1;
|
|
break;
|
|
case OPT_SERVER_BITRATE_LIMIT:
|
|
slash = strchr(optarg, '/');
|
|
if (slash) {
|
|
*slash = '\0';
|
|
++slash;
|
|
test->settings->bitrate_limit_interval = atof(slash);
|
|
if (test->settings->bitrate_limit_interval != 0 && /* Using same Max/Min limits as for Stats Interval */
|
|
(test->settings->bitrate_limit_interval < MIN_INTERVAL || test->settings->bitrate_limit_interval > MAX_INTERVAL) ) {
|
|
i_errno = IETOTALINTERVAL;
|
|
return -1;
|
|
}
|
|
}
|
|
test->settings->bitrate_limit = unit_atof_rate(optarg);
|
|
server_flag = 1;
|
|
break;
|
|
case 't':
|
|
test->duration = atoi(optarg);
|
|
if (test->duration > MAX_TIME) {
|
|
i_errno = IEDURATION;
|
|
return -1;
|
|
}
|
|
duration_flag = 1;
|
|
client_flag = 1;
|
|
break;
|
|
case 'n':
|
|
test->settings->bytes = unit_atoi(optarg);
|
|
client_flag = 1;
|
|
break;
|
|
case 'k':
|
|
test->settings->blocks = unit_atoi(optarg);
|
|
client_flag = 1;
|
|
break;
|
|
case 'l':
|
|
blksize = unit_atoi(optarg);
|
|
client_flag = 1;
|
|
break;
|
|
case 'P':
|
|
test->num_streams = atoi(optarg);
|
|
if (test->num_streams > MAX_STREAMS) {
|
|
i_errno = IENUMSTREAMS;
|
|
return -1;
|
|
}
|
|
client_flag = 1;
|
|
break;
|
|
case 'R':
|
|
if (test->bidirectional) {
|
|
i_errno = IEREVERSEBIDIR;
|
|
return -1;
|
|
}
|
|
iperf_set_test_reverse(test, 1);
|
|
client_flag = 1;
|
|
break;
|
|
case OPT_BIDIRECTIONAL:
|
|
if (test->reverse) {
|
|
i_errno = IEREVERSEBIDIR;
|
|
return -1;
|
|
}
|
|
iperf_set_test_bidirectional(test, 1);
|
|
client_flag = 1;
|
|
break;
|
|
case 'w':
|
|
// XXX: This is a socket buffer, not specific to TCP
|
|
// Do sanity checks as double-precision floating point
|
|
// to avoid possible integer overflows.
|
|
farg = unit_atof(optarg);
|
|
if (farg > (double) MAX_TCP_BUFFER) {
|
|
i_errno = IEBUFSIZE;
|
|
return -1;
|
|
}
|
|
test->settings->socket_bufsize = (int) farg;
|
|
client_flag = 1;
|
|
break;
|
|
case 'B':
|
|
test->bind_address = strdup(optarg);
|
|
break;
|
|
#if defined (HAVE_SO_BINDTODEVICE)
|
|
case OPT_BIND_DEV:
|
|
test->bind_dev = strdup(optarg);
|
|
break;
|
|
#endif /* HAVE_SO_BINDTODEVICE */
|
|
case OPT_CLIENT_PORT:
|
|
portno = atoi(optarg);
|
|
if (portno < 1 || portno > 65535) {
|
|
i_errno = IEBADPORT;
|
|
return -1;
|
|
}
|
|
test->bind_port = portno;
|
|
break;
|
|
case 'M':
|
|
test->settings->mss = atoi(optarg);
|
|
if (test->settings->mss > MAX_MSS) {
|
|
i_errno = IEMSS;
|
|
return -1;
|
|
}
|
|
client_flag = 1;
|
|
break;
|
|
case 'N':
|
|
test->no_delay = 1;
|
|
client_flag = 1;
|
|
break;
|
|
case '4':
|
|
test->settings->domain = AF_INET;
|
|
break;
|
|
case '6':
|
|
test->settings->domain = AF_INET6;
|
|
break;
|
|
case 'S':
|
|
test->settings->tos = strtol(optarg, &endptr, 0);
|
|
if (endptr == optarg ||
|
|
test->settings->tos < 0 ||
|
|
test->settings->tos > 255) {
|
|
i_errno = IEBADTOS;
|
|
return -1;
|
|
}
|
|
client_flag = 1;
|
|
break;
|
|
case OPT_DSCP:
|
|
test->settings->tos = parse_qos(optarg);
|
|
if(test->settings->tos < 0) {
|
|
i_errno = IEBADTOS;
|
|
return -1;
|
|
}
|
|
client_flag = 1;
|
|
break;
|
|
case OPT_EXTRA_DATA:
|
|
test->extra_data = strdup(optarg);
|
|
client_flag = 1;
|
|
break;
|
|
case 'L':
|
|
#if defined(HAVE_FLOWLABEL)
|
|
test->settings->flowlabel = strtol(optarg, &endptr, 0);
|
|
if (endptr == optarg ||
|
|
test->settings->flowlabel < 1 || test->settings->flowlabel > 0xfffff) {
|
|
i_errno = IESETFLOW;
|
|
return -1;
|
|
}
|
|
client_flag = 1;
|
|
#else /* HAVE_FLOWLABEL */
|
|
i_errno = IEUNIMP;
|
|
return -1;
|
|
#endif /* HAVE_FLOWLABEL */
|
|
break;
|
|
case 'X':
|
|
xbe = (struct xbind_entry *)malloc(sizeof(struct xbind_entry));
|
|
if (!xbe) {
|
|
i_errno = IESETSCTPBINDX;
|
|
return -1;
|
|
}
|
|
memset(xbe, 0, sizeof(*xbe));
|
|
xbe->name = strdup(optarg);
|
|
if (!xbe->name) {
|
|
i_errno = IESETSCTPBINDX;
|
|
return -1;
|
|
}
|
|
TAILQ_INSERT_TAIL(&test->xbind_addrs, xbe, link);
|
|
break;
|
|
case 'Z':
|
|
if (!has_sendfile()) {
|
|
i_errno = IENOSENDFILE;
|
|
return -1;
|
|
}
|
|
test->zerocopy = 1;
|
|
client_flag = 1;
|
|
break;
|
|
case OPT_REPEATING_PAYLOAD:
|
|
test->repeating_payload = 1;
|
|
client_flag = 1;
|
|
break;
|
|
case OPT_TIMESTAMPS:
|
|
iperf_set_test_timestamps(test, 1);
|
|
if (optarg) {
|
|
iperf_set_test_timestamp_format(test, optarg);
|
|
}
|
|
else {
|
|
iperf_set_test_timestamp_format(test, TIMESTAMP_FORMAT);
|
|
}
|
|
break;
|
|
case 'O':
|
|
test->omit = atoi(optarg);
|
|
if (test->omit < 0 || test->omit > 60) {
|
|
i_errno = IEOMIT;
|
|
return -1;
|
|
}
|
|
client_flag = 1;
|
|
break;
|
|
case 'F':
|
|
test->diskfile_name = optarg;
|
|
break;
|
|
case OPT_IDLE_TIMEOUT:
|
|
test->settings->idle_timeout = atoi(optarg);
|
|
if (test->settings->idle_timeout < 1 || test->settings->idle_timeout > MAX_TIME) {
|
|
i_errno = IEIDLETIMEOUT;
|
|
return -1;
|
|
}
|
|
server_flag = 1;
|
|
break;
|
|
case OPT_RCV_TIMEOUT:
|
|
rcv_timeout_in = atoi(optarg);
|
|
if (rcv_timeout_in < MIN_NO_MSG_RCVD_TIMEOUT || rcv_timeout_in > MAX_TIME * SEC_TO_mS) {
|
|
i_errno = IERCVTIMEOUT;
|
|
return -1;
|
|
}
|
|
test->settings->rcv_timeout.secs = rcv_timeout_in / SEC_TO_mS;
|
|
test->settings->rcv_timeout.usecs = (rcv_timeout_in % SEC_TO_mS) * mS_TO_US;
|
|
rcv_timeout_flag = 1;
|
|
break;
|
|
case 'A':
|
|
#if defined(HAVE_CPU_AFFINITY)
|
|
test->affinity = strtol(optarg, &endptr, 0);
|
|
if (endptr == optarg ||
|
|
test->affinity < 0 || test->affinity > 1024) {
|
|
i_errno = IEAFFINITY;
|
|
return -1;
|
|
}
|
|
comma = strchr(optarg, ',');
|
|
if (comma != NULL) {
|
|
test->server_affinity = atoi(comma+1);
|
|
if (test->server_affinity < 0 || test->server_affinity > 1024) {
|
|
i_errno = IEAFFINITY;
|
|
return -1;
|
|
}
|
|
client_flag = 1;
|
|
}
|
|
#else /* HAVE_CPU_AFFINITY */
|
|
i_errno = IEUNIMP;
|
|
return -1;
|
|
#endif /* HAVE_CPU_AFFINITY */
|
|
break;
|
|
case 'T':
|
|
test->title = strdup(optarg);
|
|
client_flag = 1;
|
|
break;
|
|
case 'C':
|
|
#if defined(HAVE_TCP_CONGESTION)
|
|
test->congestion = strdup(optarg);
|
|
client_flag = 1;
|
|
#else /* HAVE_TCP_CONGESTION */
|
|
i_errno = IEUNIMP;
|
|
return -1;
|
|
#endif /* HAVE_TCP_CONGESTION */
|
|
break;
|
|
case 'd':
|
|
test->debug = 1;
|
|
break;
|
|
case 'I':
|
|
test->pidfile = strdup(optarg);
|
|
break;
|
|
case OPT_LOGFILE:
|
|
test->logfile = strdup(optarg);
|
|
break;
|
|
case OPT_FORCEFLUSH:
|
|
test->forceflush = 1;
|
|
break;
|
|
case OPT_GET_SERVER_OUTPUT:
|
|
test->get_server_output = 1;
|
|
client_flag = 1;
|
|
break;
|
|
case OPT_UDP_COUNTERS_64BIT:
|
|
test->udp_counters_64bit = 1;
|
|
break;
|
|
case OPT_NO_FQ_SOCKET_PACING:
|
|
#if defined(HAVE_SO_MAX_PACING_RATE)
|
|
printf("Warning: --no-fq-socket-pacing is deprecated\n");
|
|
test->settings->fqrate = 0;
|
|
client_flag = 1;
|
|
#else /* HAVE_SO_MAX_PACING_RATE */
|
|
i_errno = IEUNIMP;
|
|
return -1;
|
|
#endif
|
|
break;
|
|
case OPT_FQ_RATE:
|
|
#if defined(HAVE_SO_MAX_PACING_RATE)
|
|
test->settings->fqrate = unit_atof_rate(optarg);
|
|
client_flag = 1;
|
|
#else /* HAVE_SO_MAX_PACING_RATE */
|
|
i_errno = IEUNIMP;
|
|
return -1;
|
|
#endif
|
|
break;
|
|
#if defined(HAVE_DONT_FRAGMENT)
|
|
case OPT_DONT_FRAGMENT:
|
|
test->settings->dont_fragment = 1;
|
|
client_flag = 1;
|
|
break;
|
|
#endif /* HAVE_DONT_FRAGMENT */
|
|
#if defined(HAVE_SSL)
|
|
case OPT_CLIENT_USERNAME:
|
|
client_username = strdup(optarg);
|
|
break;
|
|
case OPT_CLIENT_RSA_PUBLIC_KEY:
|
|
client_rsa_public_key = strdup(optarg);
|
|
break;
|
|
case OPT_SERVER_RSA_PRIVATE_KEY:
|
|
server_rsa_private_key = strdup(optarg);
|
|
break;
|
|
case OPT_SERVER_AUTHORIZED_USERS:
|
|
test->server_authorized_users = strdup(optarg);
|
|
break;
|
|
case OPT_SERVER_SKEW_THRESHOLD:
|
|
test->server_skew_threshold = atoi(optarg);
|
|
if(test->server_skew_threshold <= 0){
|
|
i_errno = IESKEWTHRESHOLD;
|
|
return -1;
|
|
}
|
|
break;
|
|
#endif /* HAVE_SSL */
|
|
case OPT_PACING_TIMER:
|
|
test->settings->pacing_timer = unit_atoi(optarg);
|
|
client_flag = 1;
|
|
break;
|
|
case OPT_CONNECT_TIMEOUT:
|
|
test->settings->connect_timeout = unit_atoi(optarg);
|
|
client_flag = 1;
|
|
break;
|
|
case 'h':
|
|
usage_long(stdout);
|
|
exit(0);
|
|
default:
|
|
usage_long(stderr);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
/* Check flag / role compatibility. */
|
|
if (test->role == 'c' && server_flag) {
|
|
i_errno = IESERVERONLY;
|
|
return -1;
|
|
}
|
|
if (test->role == 's' && client_flag) {
|
|
i_errno = IECLIENTONLY;
|
|
return -1;
|
|
}
|
|
|
|
#if defined(HAVE_SSL)
|
|
|
|
if (test->role == 's' && (client_username || client_rsa_public_key)){
|
|
i_errno = IECLIENTONLY;
|
|
return -1;
|
|
} else if (test->role == 'c' && (client_username || client_rsa_public_key) &&
|
|
!(client_username && client_rsa_public_key)) {
|
|
i_errno = IESETCLIENTAUTH;
|
|
return -1;
|
|
} else if (test->role == 'c' && (client_username && client_rsa_public_key)){
|
|
|
|
char *client_password = NULL;
|
|
size_t s;
|
|
/* Need to copy env var, so we can do a common free */
|
|
if ((client_password = getenv("IPERF3_PASSWORD")) != NULL)
|
|
client_password = strdup(client_password);
|
|
else if (iperf_getpass(&client_password, &s, stdin) < 0){
|
|
i_errno = IESETCLIENTAUTH;
|
|
return -1;
|
|
}
|
|
if (test_load_pubkey_from_file(client_rsa_public_key) < 0){
|
|
iperf_err(test, "%s\n", ERR_error_string(ERR_get_error(), NULL));
|
|
i_errno = IESETCLIENTAUTH;
|
|
return -1;
|
|
}
|
|
|
|
test->settings->client_username = client_username;
|
|
test->settings->client_password = client_password;
|
|
test->settings->client_rsa_pubkey = load_pubkey_from_file(client_rsa_public_key);
|
|
free(client_rsa_public_key);
|
|
client_rsa_public_key = NULL;
|
|
}
|
|
|
|
if (test->role == 'c' && (server_rsa_private_key || test->server_authorized_users)){
|
|
i_errno = IESERVERONLY;
|
|
return -1;
|
|
} else if (test->role == 'c' && (test->server_skew_threshold != 0)){
|
|
i_errno = IESERVERONLY;
|
|
return -1;
|
|
} else if (test->role == 'c' && rcv_timeout_flag && test->mode == SENDER){
|
|
i_errno = IERVRSONLYRCVTIMEOUT;
|
|
return -1;
|
|
} else if (test->role == 's' && (server_rsa_private_key || test->server_authorized_users) &&
|
|
!(server_rsa_private_key && test->server_authorized_users)) {
|
|
i_errno = IESETSERVERAUTH;
|
|
return -1;
|
|
} else if (test->role == 's' && server_rsa_private_key) {
|
|
test->server_rsa_private_key = load_privkey_from_file(server_rsa_private_key);
|
|
if (test->server_rsa_private_key == NULL){
|
|
iperf_err(test, "%s\n", ERR_error_string(ERR_get_error(), NULL));
|
|
i_errno = IESETSERVERAUTH;
|
|
return -1;
|
|
}
|
|
free(server_rsa_private_key);
|
|
server_rsa_private_key = NULL;
|
|
|
|
if(test->server_skew_threshold == 0){
|
|
// Set default value for time skew threshold
|
|
test->server_skew_threshold=10;
|
|
}
|
|
}
|
|
|
|
#endif //HAVE_SSL
|
|
if (blksize == 0) {
|
|
if (test->protocol->id == Pudp)
|
|
blksize = 0; /* try to dynamically determine from MSS */
|
|
else if (test->protocol->id == Psctp)
|
|
blksize = DEFAULT_SCTP_BLKSIZE;
|
|
else
|
|
blksize = DEFAULT_TCP_BLKSIZE;
|
|
}
|
|
if ((test->protocol->id != Pudp && blksize <= 0)
|
|
|| blksize > MAX_BLOCKSIZE) {
|
|
i_errno = IEBLOCKSIZE;
|
|
return -1;
|
|
}
|
|
if (test->protocol->id == Pudp &&
|
|
(blksize > 0 &&
|
|
(blksize < MIN_UDP_BLOCKSIZE || blksize > MAX_UDP_BLOCKSIZE))) {
|
|
i_errno = IEUDPBLOCKSIZE;
|
|
return -1;
|
|
}
|
|
test->settings->blksize = blksize;
|
|
|
|
if (!rate_flag)
|
|
test->settings->rate = test->protocol->id == Pudp ? UDP_RATE : 0;
|
|
|
|
/* if no bytes or blocks specified, nor a duration_flag, and we have -F,
|
|
** get the file-size as the bytes count to be transferred
|
|
*/
|
|
if (test->settings->bytes == 0 &&
|
|
test->settings->blocks == 0 &&
|
|
! duration_flag &&
|
|
test->diskfile_name != (char*) 0 &&
|
|
test->role == 'c'
|
|
){
|
|
struct stat st;
|
|
if( stat(test->diskfile_name, &st) == 0 ){
|
|
iperf_size_t file_bytes = st.st_size;
|
|
test->settings->bytes = file_bytes;
|
|
if (test->debug)
|
|
printf("End condition set to file-size: %d bytes\n", test->settings->bytes);
|
|
}
|
|
// if failing to read file stat, it should fallback to default duration mode
|
|
}
|
|
|
|
if ((test->settings->bytes != 0 || test->settings->blocks != 0) && ! duration_flag)
|
|
test->duration = 0;
|
|
|
|
/* Disallow specifying multiple test end conditions. The code actually
|
|
** works just fine without this prohibition. As soon as any one of the
|
|
** three possible end conditions is met, the test ends. So this check
|
|
** could be removed if desired.
|
|
*/
|
|
if ((duration_flag && test->settings->bytes != 0) ||
|
|
(duration_flag && test->settings->blocks != 0) ||
|
|
(test->settings->bytes != 0 && test->settings->blocks != 0)) {
|
|
i_errno = IEENDCONDITIONS;
|
|
return -1;
|
|
}
|
|
|
|
/* For subsequent calls to getopt */
|
|
#ifdef __APPLE__
|
|
optreset = 1;
|
|
#endif
|
|
optind = 0;
|
|
|
|
if ((test->role != 'c') && (test->role != 's')) {
|
|
i_errno = IENOROLE;
|
|
return -1;
|
|
}
|
|
|
|
/* Set Total-rate average interval to multiplicity of State interval */
|
|
if (test->settings->bitrate_limit_interval != 0) {
|
|
test->settings->bitrate_limit_stats_per_interval =
|
|
(test->settings->bitrate_limit_interval <= test->stats_interval ?
|
|
1 : round(test->settings->bitrate_limit_interval/test->stats_interval) );
|
|
}
|
|
|
|
/* Show warning if JSON output is used with explicit report format */
|
|
if ((test->json_output) && (test->settings->unit_format != 'a')) {
|
|
warning("Report format (-f) flag ignored with JSON output (-J)");
|
|
}
|
|
|
|
/* Show warning if JSON output is used with verbose or debug flags */
|
|
if (test->json_output && test->verbose) {
|
|
warning("Verbose output (-v) may interfere with JSON output (-J)");
|
|
}
|
|
if (test->json_output && test->debug) {
|
|
warning("Debug output (-d) may interfere with JSON output (-J)");
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Open the file specified by test->logfile and set test->outfile to its' FD.
|
|
*/
|
|
int iperf_open_logfile(struct iperf_test *test)
|
|
{
|
|
test->outfile = fopen(test->logfile, "a+");
|
|
if (test->outfile == NULL) {
|
|
i_errno = IELOGFILE;
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
iperf_set_send_state(struct iperf_test *test, signed char state)
|
|
{
|
|
if (test->ctrl_sck >= 0) {
|
|
test->state = state;
|
|
if (Nwrite(test->ctrl_sck, (char*) &state, sizeof(state), Ptcp) < 0) {
|
|
i_errno = IESENDMESSAGE;
|
|
return -1;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
void
|
|
iperf_check_throttle(struct iperf_stream *sp, struct iperf_time *nowP)
|
|
{
|
|
struct iperf_time temp_time;
|
|
double seconds;
|
|
uint64_t bits_per_second;
|
|
|
|
if (sp->test->done || sp->test->settings->rate == 0)
|
|
return;
|
|
iperf_time_diff(&sp->result->start_time_fixed, nowP, &temp_time);
|
|
seconds = iperf_time_in_secs(&temp_time);
|
|
bits_per_second = sp->result->bytes_sent * 8 / seconds;
|
|
if (bits_per_second < sp->test->settings->rate) {
|
|
sp->green_light = 1;
|
|
FD_SET(sp->socket, &sp->test->write_set);
|
|
} else {
|
|
sp->green_light = 0;
|
|
FD_CLR(sp->socket, &sp->test->write_set);
|
|
}
|
|
}
|
|
|
|
/* Verify that average traffic is not greater than the specified limit */
|
|
void
|
|
iperf_check_total_rate(struct iperf_test *test, iperf_size_t last_interval_bytes_transferred)
|
|
{
|
|
double seconds;
|
|
uint64_t bits_per_second;
|
|
iperf_size_t total_bytes;
|
|
int i;
|
|
|
|
if (test->done || test->settings->bitrate_limit == 0) // Continue only if check should be done
|
|
return;
|
|
|
|
/* Add last inetrval's transferred bytes to the array */
|
|
if (++test->bitrate_limit_last_interval_index >= test->settings->bitrate_limit_stats_per_interval)
|
|
test->bitrate_limit_last_interval_index = 0;
|
|
test->bitrate_limit_intervals_traffic_bytes[test->bitrate_limit_last_interval_index] = last_interval_bytes_transferred;
|
|
|
|
/* Ensure that enough stats periods passed to allow averaging throughput */
|
|
test->bitrate_limit_stats_count += 1;
|
|
if (test->bitrate_limit_stats_count < test->settings->bitrate_limit_stats_per_interval)
|
|
return;
|
|
|
|
/* Calculating total bytes traffic to be averaged */
|
|
for (total_bytes = 0, i = 0; i < test->settings->bitrate_limit_stats_per_interval; i++) {
|
|
total_bytes += test->bitrate_limit_intervals_traffic_bytes[i];
|
|
}
|
|
|
|
seconds = test->stats_interval * test->settings->bitrate_limit_stats_per_interval;
|
|
bits_per_second = total_bytes * 8 / seconds;
|
|
if (test->debug) {
|
|
iperf_printf(test,"Interval %" PRIu64 " - throughput %" PRIu64 " bps (limit %" PRIu64 ")\n", test->bitrate_limit_stats_count, bits_per_second, test->settings->bitrate_limit);
|
|
}
|
|
|
|
if (bits_per_second > test->settings->bitrate_limit) {
|
|
if (iperf_get_verbose(test))
|
|
iperf_err(test, "Total throughput of %" PRIu64 " bps exceeded %" PRIu64 " bps limit", bits_per_second, test->settings->bitrate_limit);
|
|
test->bitrate_limit_exceeded = 1;
|
|
}
|
|
}
|
|
|
|
int
|
|
iperf_send(struct iperf_test *test, fd_set *write_setP)
|
|
{
|
|
register int multisend, r, streams_active;
|
|
register struct iperf_stream *sp;
|
|
struct iperf_time now;
|
|
int no_throttle_check;
|
|
|
|
/* Can we do multisend mode? */
|
|
if (test->settings->burst != 0)
|
|
multisend = test->settings->burst;
|
|
else if (test->settings->rate == 0)
|
|
multisend = test->multisend;
|
|
else
|
|
multisend = 1; /* nope */
|
|
|
|
/* Should bitrate throttle be checked for every send */
|
|
no_throttle_check = test->settings->rate != 0 && test->settings->burst == 0;
|
|
|
|
for (; multisend > 0; --multisend) {
|
|
if (no_throttle_check)
|
|
iperf_time_now(&now);
|
|
streams_active = 0;
|
|
SLIST_FOREACH(sp, &test->streams, streams) {
|
|
if ((sp->green_light && sp->sender &&
|
|
(write_setP == NULL || FD_ISSET(sp->socket, write_setP)))) {
|
|
if (multisend > 1 && test->settings->bytes != 0 && test->bytes_sent >= test->settings->bytes)
|
|
break;
|
|
if (multisend > 1 && test->settings->blocks != 0 && test->blocks_sent >= test->settings->blocks)
|
|
break;
|
|
if ((r = sp->snd(sp)) < 0) {
|
|
if (r == NET_SOFTERROR)
|
|
break;
|
|
i_errno = IESTREAMWRITE;
|
|
return r;
|
|
}
|
|
streams_active = 1;
|
|
test->bytes_sent += r;
|
|
if (!sp->pending_size)
|
|
++test->blocks_sent;
|
|
if (no_throttle_check)
|
|
iperf_check_throttle(sp, &now);
|
|
}
|
|
}
|
|
if (!streams_active)
|
|
break;
|
|
}
|
|
if (!no_throttle_check) { /* Throttle check if was not checked for each send */
|
|
iperf_time_now(&now);
|
|
SLIST_FOREACH(sp, &test->streams, streams)
|
|
if (sp->sender)
|
|
iperf_check_throttle(sp, &now);
|
|
}
|
|
if (write_setP != NULL)
|
|
SLIST_FOREACH(sp, &test->streams, streams)
|
|
if (FD_ISSET(sp->socket, write_setP))
|
|
FD_CLR(sp->socket, write_setP);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
iperf_recv(struct iperf_test *test, fd_set *read_setP)
|
|
{
|
|
int r;
|
|
struct iperf_stream *sp;
|
|
|
|
SLIST_FOREACH(sp, &test->streams, streams) {
|
|
if (FD_ISSET(sp->socket, read_setP) && !sp->sender) {
|
|
if ((r = sp->rcv(sp)) < 0) {
|
|
i_errno = IESTREAMREAD;
|
|
return r;
|
|
}
|
|
test->bytes_received += r;
|
|
++test->blocks_received;
|
|
FD_CLR(sp->socket, read_setP);
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
iperf_init_test(struct iperf_test *test)
|
|
{
|
|
struct iperf_time now;
|
|
struct iperf_stream *sp;
|
|
|
|
if (test->protocol->init) {
|
|
if (test->protocol->init(test) < 0)
|
|
return -1;
|
|
}
|
|
|
|
/* Init each stream. */
|
|
if (iperf_time_now(&now) < 0) {
|
|
i_errno = IEINITTEST;
|
|
return -1;
|
|
}
|
|
SLIST_FOREACH(sp, &test->streams, streams) {
|
|
sp->result->start_time = sp->result->start_time_fixed = now;
|
|
}
|
|
|
|
if (test->on_test_start)
|
|
test->on_test_start(test);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
send_timer_proc(TimerClientData client_data, struct iperf_time *nowP)
|
|
{
|
|
struct iperf_stream *sp = client_data.p;
|
|
|
|
/* All we do here is set or clear the flag saying that this stream may
|
|
** be sent to. The actual sending gets done in the send proc, after
|
|
** checking the flag.
|
|
*/
|
|
iperf_check_throttle(sp, nowP);
|
|
}
|
|
|
|
int
|
|
iperf_create_send_timers(struct iperf_test * test)
|
|
{
|
|
struct iperf_time now;
|
|
struct iperf_stream *sp;
|
|
TimerClientData cd;
|
|
|
|
if (iperf_time_now(&now) < 0) {
|
|
i_errno = IEINITTEST;
|
|
return -1;
|
|
}
|
|
SLIST_FOREACH(sp, &test->streams, streams) {
|
|
sp->green_light = 1;
|
|
if (test->settings->rate != 0 && sp->sender) {
|
|
cd.p = sp;
|
|
sp->send_timer = tmr_create(NULL, send_timer_proc, cd, test->settings->pacing_timer, 1);
|
|
if (sp->send_timer == NULL) {
|
|
i_errno = IEINITTEST;
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
#if defined(HAVE_SSL)
|
|
int test_is_authorized(struct iperf_test *test){
|
|
if ( !(test->server_rsa_private_key && test->server_authorized_users)) {
|
|
return 0;
|
|
}
|
|
|
|
if (test->settings->authtoken){
|
|
char *username = NULL, *password = NULL;
|
|
time_t ts;
|
|
int rc = decode_auth_setting(test->debug, test->settings->authtoken, test->server_rsa_private_key, &username, &password, &ts);
|
|
if (rc) {
|
|
return -1;
|
|
}
|
|
int ret = check_authentication(username, password, ts, test->server_authorized_users, test->server_skew_threshold);
|
|
if (ret == 0){
|
|
if (test->debug) {
|
|
iperf_printf(test, report_authentication_succeeded, username, ts);
|
|
}
|
|
free(username);
|
|
free(password);
|
|
return 0;
|
|
} else {
|
|
if (test->debug) {
|
|
iperf_printf(test, report_authentication_failed, username, ts);
|
|
}
|
|
free(username);
|
|
free(password);
|
|
return -1;
|
|
}
|
|
}
|
|
return -1;
|
|
}
|
|
#endif //HAVE_SSL
|
|
|
|
/**
|
|
* iperf_exchange_parameters - handles the param_Exchange part for client
|
|
*
|
|
*/
|
|
|
|
int
|
|
iperf_exchange_parameters(struct iperf_test *test)
|
|
{
|
|
int s;
|
|
int32_t err;
|
|
|
|
if (test->role == 'c') {
|
|
|
|
if (send_parameters(test) < 0)
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
if (get_parameters(test) < 0)
|
|
return -1;
|
|
|
|
#if defined(HAVE_SSL)
|
|
if (test_is_authorized(test) < 0){
|
|
if (iperf_set_send_state(test, SERVER_ERROR) != 0)
|
|
return -1;
|
|
i_errno = IEAUTHTEST;
|
|
err = htonl(i_errno);
|
|
if (Nwrite(test->ctrl_sck, (char*) &err, sizeof(err), Ptcp) < 0) {
|
|
i_errno = IECTRLWRITE;
|
|
return -1;
|
|
}
|
|
return -1;
|
|
}
|
|
#endif //HAVE_SSL
|
|
|
|
if ((s = test->protocol->listen(test)) < 0) {
|
|
if (iperf_set_send_state(test, SERVER_ERROR) != 0)
|
|
return -1;
|
|
err = htonl(i_errno);
|
|
if (Nwrite(test->ctrl_sck, (char*) &err, sizeof(err), Ptcp) < 0) {
|
|
i_errno = IECTRLWRITE;
|
|
return -1;
|
|
}
|
|
err = htonl(errno);
|
|
if (Nwrite(test->ctrl_sck, (char*) &err, sizeof(err), Ptcp) < 0) {
|
|
i_errno = IECTRLWRITE;
|
|
return -1;
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
FD_SET(s, &test->read_set);
|
|
test->max_fd = (s > test->max_fd) ? s : test->max_fd;
|
|
test->prot_listener = s;
|
|
|
|
// Send the control message to create streams and start the test
|
|
if (iperf_set_send_state(test, CREATE_STREAMS) != 0)
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*************************************************************/
|
|
|
|
int
|
|
iperf_exchange_results(struct iperf_test *test)
|
|
{
|
|
if (test->role == 'c') {
|
|
/* Send results to server. */
|
|
if (send_results(test) < 0)
|
|
return -1;
|
|
/* Get server results. */
|
|
if (get_results(test) < 0)
|
|
return -1;
|
|
} else {
|
|
/* Get client results. */
|
|
if (get_results(test) < 0)
|
|
return -1;
|
|
/* Send results to client. */
|
|
if (send_results(test) < 0)
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/*************************************************************/
|
|
|
|
static int
|
|
send_parameters(struct iperf_test *test)
|
|
{
|
|
int r = 0;
|
|
cJSON *j;
|
|
|
|
j = cJSON_CreateObject();
|
|
if (j == NULL) {
|
|
i_errno = IESENDPARAMS;
|
|
r = -1;
|
|
} else {
|
|
if (test->protocol->id == Ptcp)
|
|
cJSON_AddTrueToObject(j, "tcp");
|
|
else if (test->protocol->id == Pudp)
|
|
cJSON_AddTrueToObject(j, "udp");
|
|
else if (test->protocol->id == Psctp)
|
|
cJSON_AddTrueToObject(j, "sctp");
|
|
cJSON_AddNumberToObject(j, "omit", test->omit);
|
|
if (test->server_affinity != -1)
|
|
cJSON_AddNumberToObject(j, "server_affinity", test->server_affinity);
|
|
cJSON_AddNumberToObject(j, "time", test->duration);
|
|
if (test->settings->bytes)
|
|
cJSON_AddNumberToObject(j, "num", test->settings->bytes);
|
|
if (test->settings->blocks)
|
|
cJSON_AddNumberToObject(j, "blockcount", test->settings->blocks);
|
|
if (test->settings->mss)
|
|
cJSON_AddNumberToObject(j, "MSS", test->settings->mss);
|
|
if (test->no_delay)
|
|
cJSON_AddTrueToObject(j, "nodelay");
|
|
cJSON_AddNumberToObject(j, "parallel", test->num_streams);
|
|
if (test->reverse)
|
|
cJSON_AddTrueToObject(j, "reverse");
|
|
if (test->bidirectional)
|
|
cJSON_AddTrueToObject(j, "bidirectional");
|
|
if (test->settings->socket_bufsize)
|
|
cJSON_AddNumberToObject(j, "window", test->settings->socket_bufsize);
|
|
if (test->settings->blksize)
|
|
cJSON_AddNumberToObject(j, "len", test->settings->blksize);
|
|
if (test->settings->rate)
|
|
cJSON_AddNumberToObject(j, "bandwidth", test->settings->rate);
|
|
if (test->settings->fqrate)
|
|
cJSON_AddNumberToObject(j, "fqrate", test->settings->fqrate);
|
|
if (test->settings->pacing_timer)
|
|
cJSON_AddNumberToObject(j, "pacing_timer", test->settings->pacing_timer);
|
|
if (test->settings->burst)
|
|
cJSON_AddNumberToObject(j, "burst", test->settings->burst);
|
|
if (test->settings->tos)
|
|
cJSON_AddNumberToObject(j, "TOS", test->settings->tos);
|
|
if (test->settings->flowlabel)
|
|
cJSON_AddNumberToObject(j, "flowlabel", test->settings->flowlabel);
|
|
if (test->title)
|
|
cJSON_AddStringToObject(j, "title", test->title);
|
|
if (test->extra_data)
|
|
cJSON_AddStringToObject(j, "extra_data", test->extra_data);
|
|
if (test->congestion)
|
|
cJSON_AddStringToObject(j, "congestion", test->congestion);
|
|
if (test->congestion_used)
|
|
cJSON_AddStringToObject(j, "congestion_used", test->congestion_used);
|
|
if (test->get_server_output)
|
|
cJSON_AddNumberToObject(j, "get_server_output", iperf_get_test_get_server_output(test));
|
|
if (test->udp_counters_64bit)
|
|
cJSON_AddNumberToObject(j, "udp_counters_64bit", iperf_get_test_udp_counters_64bit(test));
|
|
if (test->repeating_payload)
|
|
cJSON_AddNumberToObject(j, "repeating_payload", test->repeating_payload);
|
|
#if defined(HAVE_DONT_FRAGMENT)
|
|
if (test->settings->dont_fragment)
|
|
cJSON_AddNumberToObject(j, "dont_fragment", test->settings->dont_fragment);
|
|
#endif /* HAVE_DONT_FRAGMENT */
|
|
#if defined(HAVE_SSL)
|
|
/* Send authentication parameters */
|
|
if (test->settings->client_username && test->settings->client_password && test->settings->client_rsa_pubkey){
|
|
int rc = encode_auth_setting(test->settings->client_username, test->settings->client_password, test->settings->client_rsa_pubkey, &test->settings->authtoken);
|
|
|
|
if (rc) {
|
|
cJSON_Delete(j);
|
|
i_errno = IESENDPARAMS;
|
|
return -1;
|
|
}
|
|
|
|
cJSON_AddStringToObject(j, "authtoken", test->settings->authtoken);
|
|
}
|
|
#endif // HAVE_SSL
|
|
cJSON_AddStringToObject(j, "client_version", IPERF_VERSION);
|
|
|
|
if (test->debug) {
|
|
char *str = cJSON_Print(j);
|
|
printf("send_parameters:\n%s\n", str);
|
|
cJSON_free(str);
|
|
}
|
|
|
|
if (JSON_write(test->ctrl_sck, j) < 0) {
|
|
i_errno = IESENDPARAMS;
|
|
r = -1;
|
|
}
|
|
cJSON_Delete(j);
|
|
}
|
|
return r;
|
|
}
|
|
|
|
/*************************************************************/
|
|
|
|
static int
|
|
get_parameters(struct iperf_test *test)
|
|
{
|
|
int r = 0;
|
|
cJSON *j;
|
|
cJSON *j_p;
|
|
|
|
j = JSON_read(test->ctrl_sck);
|
|
if (j == NULL) {
|
|
i_errno = IERECVPARAMS;
|
|
r = -1;
|
|
} else {
|
|
if (test->debug) {
|
|
char *str;
|
|
str = cJSON_Print(j);
|
|
printf("get_parameters:\n%s\n", str );
|
|
cJSON_free(str);
|
|
}
|
|
|
|
if ((j_p = cJSON_GetObjectItem(j, "tcp")) != NULL)
|
|
set_protocol(test, Ptcp);
|
|
if ((j_p = cJSON_GetObjectItem(j, "udp")) != NULL)
|
|
set_protocol(test, Pudp);
|
|
if ((j_p = cJSON_GetObjectItem(j, "sctp")) != NULL)
|
|
set_protocol(test, Psctp);
|
|
if ((j_p = cJSON_GetObjectItem(j, "omit")) != NULL)
|
|
test->omit = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "server_affinity")) != NULL)
|
|
test->server_affinity = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "time")) != NULL)
|
|
test->duration = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "num")) != NULL)
|
|
test->settings->bytes = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "blockcount")) != NULL)
|
|
test->settings->blocks = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "MSS")) != NULL)
|
|
test->settings->mss = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "nodelay")) != NULL)
|
|
test->no_delay = 1;
|
|
if ((j_p = cJSON_GetObjectItem(j, "parallel")) != NULL)
|
|
test->num_streams = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "reverse")) != NULL)
|
|
iperf_set_test_reverse(test, 1);
|
|
if ((j_p = cJSON_GetObjectItem(j, "bidirectional")) != NULL)
|
|
iperf_set_test_bidirectional(test, 1);
|
|
if ((j_p = cJSON_GetObjectItem(j, "window")) != NULL)
|
|
test->settings->socket_bufsize = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "len")) != NULL)
|
|
test->settings->blksize = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "bandwidth")) != NULL)
|
|
test->settings->rate = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "fqrate")) != NULL)
|
|
test->settings->fqrate = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "pacing_timer")) != NULL)
|
|
test->settings->pacing_timer = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "burst")) != NULL)
|
|
test->settings->burst = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "TOS")) != NULL)
|
|
test->settings->tos = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "flowlabel")) != NULL)
|
|
test->settings->flowlabel = j_p->valueint;
|
|
if ((j_p = cJSON_GetObjectItem(j, "title")) != NULL)
|
|
test->title = strdup(j_p->valuestring);
|
|
if ((j_p = cJSON_GetObjectItem(j, "extra_data")) != NULL)
|
|
test->extra_data = strdup(j_p->valuestring);
|
|
if ((j_p = cJSON_GetObjectItem(j, "congestion")) != NULL)
|
|
test->congestion = strdup(j_p->valuestring);
|
|
if ((j_p = cJSON_GetObjectItem(j, "congestion_used")) != NULL)
|
|
test->congestion_used = strdup(j_p->valuestring);
|
|
if ((j_p = cJSON_GetObjectItem(j, "get_server_output")) != NULL)
|
|
iperf_set_test_get_server_output(test, 1);
|
|
if ((j_p = cJSON_GetObjectItem(j, "udp_counters_64bit")) != NULL)
|
|
iperf_set_test_udp_counters_64bit(test, 1);
|
|
if ((j_p = cJSON_GetObjectItem(j, "repeating_payload")) != NULL)
|
|
test->repeating_payload = 1;
|
|
#if defined(HAVE_DONT_FRAGMENT)
|
|
if ((j_p = cJSON_GetObjectItem(j, "dont_fragment")) != NULL)
|
|
test->settings->dont_fragment = j_p->valueint;
|
|
#endif /* HAVE_DONT_FRAGMENT */
|
|
#if defined(HAVE_SSL)
|
|
if ((j_p = cJSON_GetObjectItem(j, "authtoken")) != NULL)
|
|
test->settings->authtoken = strdup(j_p->valuestring);
|
|
#endif //HAVE_SSL
|
|
if (test->mode && test->protocol->id == Ptcp && has_tcpinfo_retransmits())
|
|
test->sender_has_retransmits = 1;
|
|
if (test->settings->rate)
|
|
cJSON_AddNumberToObject(test->json_start, "target_bitrate", test->settings->rate);
|
|
cJSON_Delete(j);
|
|
}
|
|
return r;
|
|
}
|
|
|
|
/*************************************************************/
|
|
|
|
static int
|
|
send_results(struct iperf_test *test)
|
|
{
|
|
int r = 0;
|
|
cJSON *j;
|
|
cJSON *j_streams;
|
|
struct iperf_stream *sp;
|
|
cJSON *j_stream;
|
|
int sender_has_retransmits;
|
|
iperf_size_t bytes_transferred;
|
|
int retransmits;
|
|
struct iperf_time temp_time;
|
|
double start_time, end_time;
|
|
|
|
j = cJSON_CreateObject();
|
|
if (j == NULL) {
|
|
i_errno = IEPACKAGERESULTS;
|
|
r = -1;
|
|
} else {
|
|
cJSON_AddNumberToObject(j, "cpu_util_total", test->cpu_util[0]);
|
|
cJSON_AddNumberToObject(j, "cpu_util_user", test->cpu_util[1]);
|
|
cJSON_AddNumberToObject(j, "cpu_util_system", test->cpu_util[2]);
|
|
if ( test->mode == RECEIVER )
|
|
sender_has_retransmits = -1;
|
|
else
|
|
sender_has_retransmits = test->sender_has_retransmits;
|
|
cJSON_AddNumberToObject(j, "sender_has_retransmits", sender_has_retransmits);
|
|
if ( test->congestion_used ) {
|
|
cJSON_AddStringToObject(j, "congestion_used", test->congestion_used);
|
|
}
|
|
|
|
/* If on the server and sending server output, then do this */
|
|
if (test->role == 's' && test->get_server_output) {
|
|
if (test->json_output) {
|
|
/* Add JSON output */
|
|
cJSON_AddItemReferenceToObject(j, "server_output_json", test->json_top);
|
|
}
|
|
else {
|
|
/* Add textual output */
|
|
size_t buflen = 0;
|
|
|
|
/* Figure out how much room we need to hold the complete output string */
|
|
struct iperf_textline *t;
|
|
TAILQ_FOREACH(t, &(test->server_output_list), textlineentries) {
|
|
buflen += strlen(t->line);
|
|
}
|
|
|
|
/* Allocate and build it up from the component lines */
|
|
char *output = calloc(buflen + 1, 1);
|
|
TAILQ_FOREACH(t, &(test->server_output_list), textlineentries) {
|
|
strncat(output, t->line, buflen);
|
|
buflen -= strlen(t->line);
|
|
}
|
|
|
|
cJSON_AddStringToObject(j, "server_output_text", output);
|
|
free(output);
|
|
}
|
|
}
|
|
|
|
j_streams = cJSON_CreateArray();
|
|
if (j_streams == NULL) {
|
|
i_errno = IEPACKAGERESULTS;
|
|
r = -1;
|
|
} else {
|
|
cJSON_AddItemToObject(j, "streams", j_streams);
|
|
SLIST_FOREACH(sp, &test->streams, streams) {
|
|
j_stream = cJSON_CreateObject();
|
|
if (j_stream == NULL) {
|
|
i_errno = IEPACKAGERESULTS;
|
|
r = -1;
|
|
} else {
|
|
cJSON_AddItemToArray(j_streams, j_stream);
|
|
bytes_transferred = sp->sender ? (sp->result->bytes_sent - sp->result->bytes_sent_omit) : sp->result->bytes_received;
|
|
retransmits = (sp->sender && test->sender_has_retransmits) ? sp->result->stream_retrans : -1;
|
|
cJSON_AddNumberToObject(j_stream, "id", sp->id);
|
|
cJSON_AddNumberToObject(j_stream, "bytes", bytes_transferred);
|
|
cJSON_AddNumberToObject(j_stream, "retransmits", retransmits);
|
|
cJSON_AddNumberToObject(j_stream, "jitter", sp->jitter);
|
|
cJSON_AddNumberToObject(j_stream, "errors", sp->cnt_error);
|
|
cJSON_AddNumberToObject(j_stream, "packets", sp->packet_count);
|
|
|
|
iperf_time_diff(&sp->result->start_time, &sp->result->start_time, &temp_time);
|
|
start_time = iperf_time_in_secs(&temp_time);
|
|
iperf_time_diff(&sp->result->start_time, &sp->result->end_time, &temp_time);
|
|
end_time = iperf_time_in_secs(&temp_time);
|
|
cJSON_AddNumberToObject(j_stream, "start_time", start_time);
|
|
cJSON_AddNumberToObject(j_stream, "end_time", end_time);
|
|
|
|
}
|
|
}
|
|
if (r == 0 && test->debug) {
|
|
char *str = cJSON_Print(j);
|
|
printf("send_results\n%s\n", str);
|
|
cJSON_free(str);
|
|
}
|
|
if (r == 0 && JSON_write(test->ctrl_sck, j) < 0) {
|
|
i_errno = IESENDRESULTS;
|
|
r = -1;
|
|
}
|
|
}
|
|
cJSON_Delete(j);
|
|
}
|
|
return r;
|
|
}
|
|
|
|
/*************************************************************/
|
|
|
|
static int
|
|
get_results(struct iperf_test *test)
|
|
{
|
|
int r = 0;
|
|
cJSON *j;
|
|
cJSON *j_cpu_util_total;
|
|
cJSON *j_cpu_util_user;
|
|
cJSON *j_cpu_util_system;
|
|
cJSON *j_remote_congestion_used;
|
|
cJSON *j_sender_has_retransmits;
|
|
int result_has_retransmits;
|
|
cJSON *j_streams;
|
|
int n, i;
|
|
cJSON *j_stream;
|
|
cJSON *j_id;
|
|
cJSON *j_bytes;
|
|
cJSON *j_retransmits;
|
|
cJSON *j_jitter;
|
|
cJSON *j_errors;
|
|
cJSON *j_packets;
|
|
cJSON *j_server_output;
|
|
cJSON *j_start_time, *j_end_time;
|
|
int sid, cerror, pcount;
|
|
double jitter;
|
|
iperf_size_t bytes_transferred;
|
|
int retransmits;
|
|
struct iperf_stream *sp;
|
|
|
|
j = JSON_read(test->ctrl_sck);
|
|
if (j == NULL) {
|
|
i_errno = IERECVRESULTS;
|
|
r = -1;
|
|
} else {
|
|
j_cpu_util_total = cJSON_GetObjectItem(j, "cpu_util_total");
|
|
j_cpu_util_user = cJSON_GetObjectItem(j, "cpu_util_user");
|
|
j_cpu_util_system = cJSON_GetObjectItem(j, "cpu_util_system");
|
|
j_sender_has_retransmits = cJSON_GetObjectItem(j, "sender_has_retransmits");
|
|
if (j_cpu_util_total == NULL || j_cpu_util_user == NULL || j_cpu_util_system == NULL || j_sender_has_retransmits == NULL) {
|
|
i_errno = IERECVRESULTS;
|
|
r = -1;
|
|
} else {
|
|
if (test->debug) {
|
|
char *str = cJSON_Print(j);
|
|
printf("get_results\n%s\n", str);
|
|
cJSON_free(str);
|
|
}
|
|
|
|
test->remote_cpu_util[0] = j_cpu_util_total->valuedouble;
|
|
test->remote_cpu_util[1] = j_cpu_util_user->valuedouble;
|
|
test->remote_cpu_util[2] = j_cpu_util_system->valuedouble;
|
|
result_has_retransmits = j_sender_has_retransmits->valueint;
|
|
if ( test->mode == RECEIVER ) {
|
|
test->sender_has_retransmits = result_has_retransmits;
|
|
test->other_side_has_retransmits = 0;
|
|
}
|
|
else if ( test->mode == BIDIRECTIONAL )
|
|
test->other_side_has_retransmits = result_has_retransmits;
|
|
|
|
j_streams = cJSON_GetObjectItem(j, "streams");
|
|
if (j_streams == NULL) {
|
|
i_errno = IERECVRESULTS;
|
|
r = -1;
|
|
} else {
|
|
n = cJSON_GetArraySize(j_streams);
|
|
for (i=0; i<n; ++i) {
|
|
j_stream = cJSON_GetArrayItem(j_streams, i);
|
|
if (j_stream == NULL) {
|
|
i_errno = IERECVRESULTS;
|
|
r = -1;
|
|
} else {
|
|
j_id = cJSON_GetObjectItem(j_stream, "id");
|
|
j_bytes = cJSON_GetObjectItem(j_stream, "bytes");
|
|
j_retransmits = cJSON_GetObjectItem(j_stream, "retransmits");
|
|
j_jitter = cJSON_GetObjectItem(j_stream, "jitter");
|
|
j_errors = cJSON_GetObjectItem(j_stream, "errors");
|
|
j_packets = cJSON_GetObjectItem(j_stream, "packets");
|
|
j_start_time = cJSON_GetObjectItem(j_stream, "start_time");
|
|
j_end_time = cJSON_GetObjectItem(j_stream, "end_time");
|
|
if (j_id == NULL || j_bytes == NULL || j_retransmits == NULL || j_jitter == NULL || j_errors == NULL || j_packets == NULL) {
|
|
i_errno = IERECVRESULTS;
|
|
r = -1;
|
|
} else {
|
|
sid = j_id->valueint;
|
|
bytes_transferred = j_bytes->valueint;
|
|
retransmits = j_retransmits->valueint;
|
|
jitter = j_jitter->valuedouble;
|
|
cerror = j_errors->valueint;
|
|
pcount = j_packets->valueint;
|
|
SLIST_FOREACH(sp, &test->streams, streams)
|
|
if (sp->id == sid) break;
|
|
if (sp == NULL) {
|
|
i_errno = IESTREAMID;
|
|
r = -1;
|
|
} else {
|
|
if (sp->sender) {
|
|
sp->jitter = jitter;
|
|
sp->cnt_error = cerror;
|
|
sp->peer_packet_count = pcount;
|
|
sp->result->bytes_received = bytes_transferred;
|
|
/*
|
|
* We have to handle the possibility that
|
|
* start_time and end_time might not be
|
|
* available; this is the case for older (pre-3.2)
|
|
* servers.
|
|
*
|
|
* We need to have result structure members to hold
|
|
* the both sides' start_time and end_time.
|
|
*/
|
|
if (j_start_time && j_end_time) {
|
|
sp->result->receiver_time = j_end_time->valuedouble - j_start_time->valuedouble;
|
|
}
|
|
else {
|
|
sp->result->receiver_time = 0.0;
|
|
}
|
|
} else {
|
|
sp->peer_packet_count = pcount;
|
|
sp->result->bytes_sent = bytes_transferred;
|
|
sp->result->stream_retrans = retransmits;
|
|
if (j_start_time && j_end_time) {
|
|
sp->result->sender_time = j_end_time->valuedouble - j_start_time->valuedouble;
|
|
}
|
|
else {
|
|
sp->result->sender_time = 0.0;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
/*
|
|
* If we're the client and we're supposed to get remote results,
|
|
* look them up and process accordingly.
|
|
*/
|
|
if (test->role == 'c' && iperf_get_test_get_server_output(test)) {
|
|
/* Look for JSON. If we find it, grab the object so it doesn't get deleted. */
|
|
j_server_output = cJSON_DetachItemFromObject(j, "server_output_json");
|
|
if (j_server_output != NULL) {
|
|
test->json_server_output = j_server_output;
|
|
}
|
|
else {
|
|
/* No JSON, look for textual output. Make a copy of the text for later. */
|
|
j_server_output = cJSON_GetObjectItem(j, "server_output_text");
|
|
if (j_server_output != NULL) {
|
|
test->server_output_text = strdup(j_server_output->valuestring);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
j_remote_congestion_used = cJSON_GetObjectItem(j, "congestion_used");
|
|
if (j_remote_congestion_used != NULL) {
|
|
test->remote_congestion_used = strdup(j_remote_congestion_used->valuestring);
|
|
}
|
|
|
|
cJSON_Delete(j);
|
|
}
|
|
return r;
|
|
}
|
|
|
|
/*************************************************************/
|
|
|
|
static int
|
|
JSON_write(int fd, cJSON *json)
|
|
{
|
|
uint32_t hsize, nsize;
|
|
char *str;
|
|
int r = 0;
|
|
|
|
str = cJSON_PrintUnformatted(json);
|
|
if (str == NULL)
|
|
r = -1;
|
|
else {
|
|
hsize = strlen(str);
|
|
nsize = htonl(hsize);
|
|
if (Nwrite(fd, (char*) &nsize, sizeof(nsize), Ptcp) < 0)
|
|
r = -1;
|
|
else {
|
|
if (Nwrite(fd, str, hsize, Ptcp) < 0)
|
|
r = -1;
|
|
}
|
|
cJSON_free(str);
|
|
}
|
|
return r;
|
|
}
|
|
|
|
/*************************************************************/
|
|
|
|
static cJSON *
|
|
JSON_read(int fd)
|
|
{
|
|
uint32_t hsize, nsize;
|
|
char *str;
|
|
cJSON *json = NULL;
|
|
int rc;
|
|
|
|
/*
|
|
* Read a four-byte integer, which is the length of the JSON to follow.
|
|
* Then read the JSON into a buffer and parse it. Return a parsed JSON
|
|
* structure, NULL if there was an error.
|
|
*/
|
|
if (Nread(fd, (char*) &nsize, sizeof(nsize), Ptcp) >= 0) {
|
|
hsize = ntohl(nsize);
|
|
/* Allocate a buffer to hold the JSON */
|
|
str = (char *) calloc(sizeof(char), hsize+1); /* +1 for trailing null */
|
|
if (str != NULL) {
|
|
rc = Nread(fd, str, hsize, Ptcp);
|
|
if (rc >= 0) {
|
|
/*
|
|
* We should be reading in the number of bytes corresponding to the
|
|
* length in that 4-byte integer. If we don't the socket might have
|
|
* prematurely closed. Only do the JSON parsing if we got the
|
|
* correct number of bytes.
|
|
*/
|
|
if (rc == hsize) {
|
|
json = cJSON_Parse(str);
|
|
}
|
|
else {
|
|
printf("WARNING: Size of data read does not correspond to offered length\n");
|
|
}
|
|
}
|
|
}
|
|
free(str);
|
|
}
|
|
return json;
|
|
}
|
|
|
|
/*************************************************************/
|
|
/**
|
|
* add_to_interval_list -- adds new interval to the interval_list
|
|
*/
|
|
|
|
void
|
|
add_to_interval_list(struct iperf_stream_result * rp, struct iperf_interval_results * new)
|
|
{
|
|
struct iperf_interval_results *irp;
|
|
|
|
irp = (struct iperf_interval_results *) malloc(sizeof(struct iperf_interval_results));
|
|
memcpy(irp, new, sizeof(struct iperf_interval_results));
|
|
TAILQ_INSERT_TAIL(&rp->interval_results, irp, irlistentries);
|
|
}
|
|
|
|
|
|
/************************************************************/
|
|
|
|
/**
|
|
* connect_msg -- displays connection message
|
|
* denoting sender/receiver details
|
|
*
|
|
*/
|
|
|
|
void
|
|
connect_msg(struct iperf_stream *sp)
|
|
{
|
|
char ipl[INET6_ADDRSTRLEN], ipr[INET6_ADDRSTRLEN];
|
|
int lport, rport;
|
|
|
|
if (getsockdomain(sp->socket) == AF_INET) {
|
|
inet_ntop(AF_INET, (void *) &((struct sockaddr_in *) &sp->local_addr)->sin_addr, ipl, sizeof(ipl));
|
|
mapped_v4_to_regular_v4(ipl);
|
|
inet_ntop(AF_INET, (void *) &((struct sockaddr_in *) &sp->remote_addr)->sin_addr, ipr, sizeof(ipr));
|
|
mapped_v4_to_regular_v4(ipr);
|
|
lport = ntohs(((struct sockaddr_in *) &sp->local_addr)->sin_port);
|
|
rport = ntohs(((struct sockaddr_in *) &sp->remote_addr)->sin_port);
|
|
} else {
|
|
inet_ntop(AF_INET6, (void *) &((struct sockaddr_in6 *) &sp->local_addr)->sin6_addr, ipl, sizeof(ipl));
|
|
mapped_v4_to_regular_v4(ipl);
|
|
inet_ntop(AF_INET6, (void *) &((struct sockaddr_in6 *) &sp->remote_addr)->sin6_addr, ipr, sizeof(ipr));
|
|
mapped_v4_to_regular_v4(ipr);
|
|
lport = ntohs(((struct sockaddr_in6 *) &sp->local_addr)->sin6_port);
|
|
rport = ntohs(((struct sockaddr_in6 *) &sp->remote_addr)->sin6_port);
|
|
}
|
|
|
|
if (sp->test->json_output)
|
|
cJSON_AddItemToArray(sp->test->json_connected, iperf_json_printf("socket: %d local_host: %s local_port: %d remote_host: %s remote_port: %d", (int64_t) sp->socket, ipl, (int64_t) lport, ipr, (int64_t) rport));
|
|
else
|
|
iperf_printf(sp->test, report_connected, sp->socket, ipl, lport, ipr, rport);
|
|
}
|
|
|
|
|
|
/**************************************************************************/
|
|
|
|
struct iperf_test *
|
|
iperf_new_test()
|
|
{
|
|
struct iperf_test *test;
|
|
|
|
test = (struct iperf_test *) malloc(sizeof(struct iperf_test));
|
|
if (!test) {
|
|
i_errno = IENEWTEST;
|
|
return NULL;
|
|
}
|
|
/* initialize everything to zero */
|
|
memset(test, 0, sizeof(struct iperf_test));
|
|
|
|
test->settings = (struct iperf_settings *) malloc(sizeof(struct iperf_settings));
|
|
if (!test->settings) {
|
|
free(test);
|
|
i_errno = IENEWTEST;
|
|
return NULL;
|
|
}
|
|
memset(test->settings, 0, sizeof(struct iperf_settings));
|
|
|
|
test->bitrate_limit_intervals_traffic_bytes = (iperf_size_t *) malloc(sizeof(iperf_size_t) * MAX_INTERVAL);
|
|
if (!test->bitrate_limit_intervals_traffic_bytes) {
|
|
free(test);
|
|
i_errno = IENEWTEST;
|
|
return NULL;
|
|
}
|
|
memset(test->bitrate_limit_intervals_traffic_bytes, 0, sizeof(sizeof(iperf_size_t) * MAX_INTERVAL));
|
|
|
|
/* By default all output goes to stdout */
|
|
test->outfile = stdout;
|
|
|
|
return test;
|
|
}
|
|
|
|
/**************************************************************************/
|
|
|
|
struct protocol *
|
|
protocol_new(void)
|
|
{
|
|
struct protocol *proto;
|
|
|
|
proto = malloc(sizeof(struct protocol));
|
|
if(!proto) {
|