2000-04-13 09:19:23 +00:00
|
|
|
/*
|
|
|
|
* echoping : uses the TCP echo service to measure (roughly) response times.
|
|
|
|
*
|
2001-02-20 21:06:37 +00:00
|
|
|
* Written by Stephane Bortzmeyer <bortz@users.sourceforge.net>. See
|
|
|
|
* the AUTHORS file for other contributors.
|
2000-04-13 09:19:23 +00:00
|
|
|
*
|
2000-06-25 14:05:33 +00:00
|
|
|
* $Id$
|
2001-02-20 21:48:39 +00:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2000-04-13 09:19:23 +00:00
|
|
|
|
|
|
|
char *progname;
|
|
|
|
unsigned short timeout_flag;
|
|
|
|
|
|
|
|
#include "echoping.h"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* An option to define only if you want to drive echoping from another
|
|
|
|
* process. Useless but harmless otherwise. In practice, while OSF/1 is happy
|
|
|
|
* with it, SunOS refuses to use fflush on a NULL and Linux fails.
|
|
|
|
*/
|
|
|
|
#undef FLUSH_OUTPUT
|
|
|
|
|
|
|
|
/* Global variables for main and printstats */
|
|
|
|
|
|
|
|
int return_code = 0;
|
|
|
|
unsigned int number = 1;
|
|
|
|
struct timeval max, min, total, median, temp;
|
|
|
|
unsigned int successes, attempts = 0;
|
|
|
|
unsigned int size = DEFLINE;
|
|
|
|
unsigned int j = 0;
|
|
|
|
struct result
|
2000-09-27 05:38:29 +00:00
|
|
|
{
|
|
|
|
unsigned short valid;
|
|
|
|
struct timeval timevalue;
|
|
|
|
};
|
2000-04-13 09:19:23 +00:00
|
|
|
struct result results[MAXNUMBER];
|
|
|
|
struct timeval good_results[MAXNUMBER];
|
|
|
|
extern int tvcmp ();
|
|
|
|
|
2000-04-17 11:36:29 +00:00
|
|
|
int
|
2000-04-13 09:19:23 +00:00
|
|
|
main (argc, argv)
|
|
|
|
int argc;
|
|
|
|
char *argv[];
|
|
|
|
{
|
|
|
|
extern char *optarg;
|
|
|
|
extern int optind;
|
|
|
|
|
|
|
|
signed char ch;
|
|
|
|
|
|
|
|
int sockfd;
|
2000-11-05 13:25:41 +00:00
|
|
|
FILE *files = NULL;
|
2000-11-04 12:36:37 +00:00
|
|
|
CHANNEL channel;
|
2000-04-13 09:19:23 +00:00
|
|
|
struct hostent *hostptr;
|
|
|
|
struct sockaddr_in serv_addr;
|
|
|
|
struct sockaddr_in udp_cli_addr; /* client's Internet socket
|
|
|
|
* addr */
|
2000-09-27 05:38:29 +00:00
|
|
|
struct servent *sp = NULL;
|
2000-04-13 09:19:23 +00:00
|
|
|
int verbose = FALSE;
|
|
|
|
char *server_address;
|
|
|
|
u_int addr;
|
|
|
|
struct in_addr *ptr;
|
2000-09-27 05:38:29 +00:00
|
|
|
int n, nr = 0;
|
2001-02-11 21:09:35 +00:00
|
|
|
int rc;
|
|
|
|
#ifdef OPENSSL
|
2001-02-20 21:48:39 +00:00
|
|
|
int sslcode;
|
2001-02-14 10:08:48 +00:00
|
|
|
char rand_file[MAXLINE];
|
2001-02-11 21:09:35 +00:00
|
|
|
#endif
|
2000-04-13 09:19:23 +00:00
|
|
|
char *sendline, recvline[MAXLINE + 1];
|
|
|
|
#ifdef ICP
|
|
|
|
char retcode[DEFLINE];
|
|
|
|
int length;
|
|
|
|
#endif
|
|
|
|
struct timeval newtv, oldtv;
|
|
|
|
void printstats ();
|
|
|
|
|
2001-02-23 12:30:31 +00:00
|
|
|
#ifdef HAVE_USLEEP
|
|
|
|
double wait = 1.0;
|
|
|
|
#else
|
2000-04-13 09:19:23 +00:00
|
|
|
unsigned int wait = 1;
|
2001-02-23 12:30:31 +00:00
|
|
|
#endif
|
2000-04-13 09:19:23 +00:00
|
|
|
unsigned char fill = ' ';
|
|
|
|
unsigned short fill_requested = 0;
|
|
|
|
unsigned int i = 0;
|
|
|
|
|
|
|
|
void to_alarm (); /* our alarm() signal handler */
|
|
|
|
void interrupted ();
|
|
|
|
unsigned int timeout = 10;
|
|
|
|
unsigned short timeout_requested = 0;
|
|
|
|
unsigned short size_requested = 0;
|
|
|
|
char *url = "";
|
|
|
|
short port = 0;
|
|
|
|
char *text_port = malloc (6);
|
|
|
|
#if USE_SIGACTION
|
|
|
|
struct sigaction mysigaction;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
char *port_name = ECHO_TCP_PORT;
|
|
|
|
unsigned short port_to_use = USE_ECHO;
|
|
|
|
unsigned short http = 0;
|
2000-09-27 05:38:29 +00:00
|
|
|
unsigned short smtp = 0;
|
2000-04-13 09:19:23 +00:00
|
|
|
unsigned short udp = 0;
|
|
|
|
unsigned short icp = 0;
|
2001-03-06 16:46:00 +00:00
|
|
|
|
|
|
|
unsigned short nocache = 0;
|
|
|
|
|
2000-04-13 09:19:23 +00:00
|
|
|
#ifdef ICP
|
|
|
|
icp_opcode opcode = ICP_OP_QUERY;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
unsigned short ttcp = 0;
|
|
|
|
unsigned short tcp = 0;
|
2000-11-04 12:36:37 +00:00
|
|
|
unsigned short ssl = 0;
|
2000-04-13 09:19:23 +00:00
|
|
|
|
|
|
|
unsigned short stop_at_newlines = 1;
|
|
|
|
|
2000-11-04 12:36:37 +00:00
|
|
|
#ifdef OPENSSL
|
|
|
|
SSL_METHOD *meth;
|
2001-01-25 15:20:16 +00:00
|
|
|
SSL_CTX *ctx = NULL;
|
|
|
|
SSL *sslh = NULL;
|
2000-11-04 12:36:37 +00:00
|
|
|
#endif
|
|
|
|
|
2001-02-20 21:48:39 +00:00
|
|
|
int priority;
|
|
|
|
int priority_requested = 0;
|
|
|
|
int tos;
|
|
|
|
int tos_requested = 0;
|
|
|
|
char *arg_end;
|
|
|
|
|
2000-04-13 09:19:23 +00:00
|
|
|
null_timeval.tv_sec = 0;
|
|
|
|
null_timeval.tv_usec = 0;
|
|
|
|
max_timeval.tv_sec = 1000000000;
|
|
|
|
max_timeval.tv_usec = 999999;
|
|
|
|
|
|
|
|
return_code = 0;
|
|
|
|
number = 1;
|
|
|
|
total = null_timeval;
|
|
|
|
median = null_timeval;
|
|
|
|
max = null_timeval;
|
|
|
|
min = max_timeval;
|
|
|
|
|
|
|
|
for (i = 0; i <= MAXNUMBER; i++)
|
|
|
|
{
|
|
|
|
results[i].valid = 0;
|
|
|
|
}
|
|
|
|
progname = argv[0];
|
2001-03-06 16:46:00 +00:00
|
|
|
while ((ch = getopt (argc, argv, "vs:n:w:dch:i:rut:f:SCp:P:aA")) != EOF)
|
2000-04-13 09:19:23 +00:00
|
|
|
{
|
|
|
|
switch (ch)
|
|
|
|
{
|
|
|
|
case 'v':
|
|
|
|
verbose = TRUE;
|
|
|
|
break;
|
|
|
|
case 'r':
|
|
|
|
ttcp = 1;
|
|
|
|
break;
|
|
|
|
case 'u':
|
|
|
|
udp = 1;
|
|
|
|
break;
|
2000-11-04 12:36:37 +00:00
|
|
|
case 'C':
|
|
|
|
ssl = 1;
|
|
|
|
break;
|
2000-04-13 09:19:23 +00:00
|
|
|
case 'd':
|
|
|
|
port_name = DISCARD_TCP_PORT;
|
|
|
|
port_to_use = USE_DISCARD;
|
|
|
|
break;
|
|
|
|
case 'c':
|
|
|
|
port_name = CHARACTER_GENERATOR_TCP_PORT;
|
|
|
|
port_to_use = USE_CHARGEN;
|
|
|
|
stop_at_newlines = 0;
|
|
|
|
break;
|
|
|
|
case 'i':
|
2000-11-06 14:14:14 +00:00
|
|
|
port_name = DEFAULT_ICP_UDP_PORT;
|
2000-04-13 09:19:23 +00:00
|
|
|
port_to_use = USE_ICP;
|
|
|
|
udp = 1;
|
|
|
|
icp = 1;
|
|
|
|
url = optarg;
|
|
|
|
break;
|
|
|
|
case 'h':
|
2000-11-05 12:55:04 +00:00
|
|
|
port_name = DEFAULT_HTTP_TCP_PORT;
|
2000-04-13 09:19:23 +00:00
|
|
|
port_to_use = USE_HTTP;
|
|
|
|
http = 1;
|
|
|
|
url = optarg;
|
|
|
|
break;
|
2001-03-06 16:46:00 +00:00
|
|
|
case 'a':
|
|
|
|
nocache = 1;
|
|
|
|
break;
|
|
|
|
case 'A':
|
|
|
|
nocache = 2;
|
|
|
|
break;
|
2000-04-13 09:19:23 +00:00
|
|
|
case 'f':
|
|
|
|
fill = *optarg;
|
|
|
|
fill_requested = 1;
|
|
|
|
break;
|
2000-09-27 05:38:29 +00:00
|
|
|
case 'S':
|
|
|
|
port_name = "smtp";
|
|
|
|
port_to_use = USE_SMTP;
|
|
|
|
smtp = 1;
|
|
|
|
break;
|
2001-02-20 21:48:39 +00:00
|
|
|
case 'p':
|
|
|
|
priority = (int) strtol (optarg, &arg_end, 0);
|
|
|
|
if (arg_end == optarg || arg_end == '\0')
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: socket priority (-p) should be numeric.\n",
|
|
|
|
progname);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
priority_requested = 1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'P':
|
|
|
|
tos = (int) strtol (optarg, &arg_end, 0);
|
|
|
|
if (arg_end == optarg || arg_end == '\0')
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: IP type of service (-P) should be "
|
|
|
|
"numeric.\n", progname);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
tos_requested = 1;
|
|
|
|
}
|
|
|
|
break;
|
2000-04-13 09:19:23 +00:00
|
|
|
case 's':
|
|
|
|
size = atoi (optarg);
|
|
|
|
if (size > MAXLINE)
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: packet size too large, max is %d.\n",
|
|
|
|
progname, MAXLINE);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
if (size <= 0)
|
|
|
|
{
|
2000-09-27 05:38:29 +00:00
|
|
|
(void) fprintf (stderr, "%s: illegal packet size.\n", progname);
|
2000-04-13 09:19:23 +00:00
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
size_requested = 1;
|
|
|
|
break;
|
|
|
|
case 't':
|
|
|
|
timeout = atoi (optarg);
|
|
|
|
timeout_requested = 1;
|
|
|
|
if (size <= 0)
|
|
|
|
{
|
2000-09-27 05:38:29 +00:00
|
|
|
(void) fprintf (stderr, "%s: illegal timeout.\n", progname);
|
2000-04-13 09:19:23 +00:00
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'n':
|
|
|
|
number = atoi (optarg);
|
|
|
|
if (number > MAXNUMBER)
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
2000-09-27 05:38:29 +00:00
|
|
|
"%s: number of iterations too large, max is %d.\n",
|
2000-04-13 09:19:23 +00:00
|
|
|
progname, MAXNUMBER);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
if (number <= 0)
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
2000-09-27 05:38:29 +00:00
|
|
|
"%s: illegal number of iterations.\n",
|
|
|
|
progname);
|
2000-04-13 09:19:23 +00:00
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'w':
|
2001-02-23 12:30:31 +00:00
|
|
|
#ifdef HAVE_USLEEP
|
|
|
|
wait = atof (optarg);
|
|
|
|
#else
|
2000-04-13 09:19:23 +00:00
|
|
|
wait = atoi (optarg);
|
2001-02-23 12:30:31 +00:00
|
|
|
#endif
|
2000-04-13 09:19:23 +00:00
|
|
|
if (wait <= 0)
|
|
|
|
/* atoi returns zero when there is an error. So we cannot use
|
|
|
|
'-w 0' to specify no waiting. */
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: illegal waiting time.\n", progname);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
usage ();
|
|
|
|
}
|
|
|
|
}
|
2000-09-27 05:38:29 +00:00
|
|
|
if (udp && ((port_to_use == USE_CHARGEN) ||
|
|
|
|
(port_to_use == USE_HTTP) || (port_to_use == USE_SMTP)))
|
2000-04-13 09:19:23 +00:00
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
2000-09-27 05:38:29 +00:00
|
|
|
"%s: I don't know how to use this port with UDP.\n",
|
|
|
|
progname);
|
2000-04-13 09:19:23 +00:00
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
Version 2.1 now allows global timeouts for TCP connections
|
|
|
|
*
|
|
|
|
if (!udp && (timeout_requested))
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: Time out ignored for TCP connections.\n", progname);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
*/
|
2000-09-27 05:38:29 +00:00
|
|
|
if ((http || smtp) && (fill_requested))
|
2000-04-13 09:19:23 +00:00
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
2000-09-27 05:38:29 +00:00
|
|
|
"%s: Filling incompatible with HTTP connections.\n",
|
|
|
|
progname);
|
2000-04-13 09:19:23 +00:00
|
|
|
exit (1);
|
|
|
|
}
|
2000-04-17 14:31:25 +00:00
|
|
|
#ifndef USE_TTCP
|
2000-04-13 09:19:23 +00:00
|
|
|
if (ttcp)
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: not compiled with T/TCP support.\n", progname);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
#endif
|
2000-11-04 12:36:37 +00:00
|
|
|
#ifndef OPENSSL
|
|
|
|
if (ssl)
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: not compiled with SSL support.\n", progname);
|
|
|
|
exit (1);
|
2001-01-25 15:20:16 +00:00
|
|
|
}
|
2000-11-04 12:36:37 +00:00
|
|
|
#endif
|
2000-04-13 09:19:23 +00:00
|
|
|
#ifndef HTTP
|
|
|
|
if (http)
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: Not compiled with HTTP support.\n", progname);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
#endif
|
2000-09-27 05:38:29 +00:00
|
|
|
#ifndef SMTP
|
|
|
|
if (smtp)
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: Not compiled with SMTP support.\n", progname);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
#endif
|
2000-04-13 09:19:23 +00:00
|
|
|
#ifndef ICP
|
|
|
|
if (icp)
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: Not compiled with ICP support.\n", progname);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
#endif
|
2000-09-27 05:38:29 +00:00
|
|
|
if ((http || smtp) && size_requested)
|
2000-04-13 09:19:23 +00:00
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
2000-09-27 05:38:29 +00:00
|
|
|
"%s: %s and message size specification are incompatible.\n",
|
|
|
|
http ? "HTTP" : "SMTP", progname);
|
2000-04-13 09:19:23 +00:00
|
|
|
exit (1);
|
|
|
|
}
|
2000-11-05 12:55:04 +00:00
|
|
|
if (ssl && !http)
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
2001-01-25 15:20:16 +00:00
|
|
|
"%s: SSL is only supported for HTTP requests.\n",
|
|
|
|
progname);
|
2000-11-05 12:55:04 +00:00
|
|
|
exit (1);
|
|
|
|
}
|
2000-04-13 09:19:23 +00:00
|
|
|
if (udp && ttcp)
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: UDP and T/TCP are incompatible.\n", progname);
|
|
|
|
exit (1);
|
|
|
|
}
|
2000-11-05 12:55:04 +00:00
|
|
|
if (ssl && http)
|
|
|
|
{
|
|
|
|
port_name = DEFAULT_HTTPS_TCP_PORT;
|
|
|
|
}
|
2001-02-20 21:48:39 +00:00
|
|
|
#ifndef USE_TOS
|
2001-03-02 20:47:47 +00:00
|
|
|
if (tos_requested)
|
2001-02-20 21:48:39 +00:00
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: Not compiled with Type Of Service support.\n",
|
|
|
|
progname);
|
|
|
|
exit (1);
|
|
|
|
}
|
2001-03-02 20:47:47 +00:00
|
|
|
#endif
|
|
|
|
#ifndef USE_PRIORITY
|
|
|
|
if (priority_requested)
|
|
|
|
{
|
|
|
|
(void) fprintf (stderr,
|
|
|
|
"%s: Not compiled with socket priority support.\n",
|
|
|
|
progname);
|
|
|
|
exit (1);
|
|
|
|
}
|
2001-02-20 21:48:39 +00:00
|
|
|
#endif
|
2000-04-13 09:19:23 +00:00
|
|
|
if (!udp && !ttcp)
|
|
|
|
{
|
|
|
|
tcp = 1;
|
|
|
|
}
|
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
if (argc != 1)
|
|
|
|
{
|
|
|
|
usage ();
|
|
|
|
}
|
|
|
|
if (verbose)
|
|
|
|
{
|
|
|
|
printf ("\nThis is %s, version %s.\n\n", progname, VERSION);
|
|
|
|
}
|
|
|
|
server = argv[0];
|
|
|
|
#ifdef HTTP
|
|
|
|
if (http || icp)
|
|
|
|
{
|
|
|
|
if (icp)
|
|
|
|
{
|
|
|
|
find_server_and_port (server, &port, port_name);
|
|
|
|
if (port == 0)
|
|
|
|
port = 3130;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
find_server_and_port (server, &port, port_name);
|
|
|
|
if (port == 0)
|
|
|
|
port = 80;
|
|
|
|
}
|
|
|
|
|
|
|
|
sprintf (text_port, "(port %d)", ntohs (port));
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
signal (SIGINT, interrupted);
|
|
|
|
if ((addr = inet_addr (server)) == INADDR_NONE)
|
|
|
|
{
|
|
|
|
if ((hostptr = gethostbyname (server)) == NULL)
|
|
|
|
{
|
|
|
|
err_quit ("gethostbyname error for host: %s %s",
|
|
|
|
server, sys_err_str ());
|
|
|
|
}
|
2000-09-27 05:38:29 +00:00
|
|
|
server_address = *(hostptr->h_addr_list); /* First item of the
|
|
|
|
* list */
|
2000-04-13 09:19:23 +00:00
|
|
|
/*
|
|
|
|
* addr = (u_long) *server_address;
|
|
|
|
*/
|
|
|
|
/* ptr.s_addr = addr; */
|
|
|
|
ptr = (struct in_addr *) server_address; /* hostptr->h_addr_list
|
|
|
|
* points actually to
|
|
|
|
* u_longs, not strings */
|
|
|
|
addr = ptr->s_addr;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ptr = (struct in_addr *) malloc (sizeof (struct in_addr));
|
|
|
|
ptr->s_addr = addr;
|
|
|
|
}
|
2000-09-27 05:38:29 +00:00
|
|
|
if (!http && !icp) /* Already find */
|
2000-04-13 09:19:23 +00:00
|
|
|
{
|
|
|
|
if (!udp)
|
|
|
|
{
|
|
|
|
if ((sp = getservbyname (port_name, "tcp")) == NULL)
|
|
|
|
{
|
|
|
|
err_quit ("tcp_open: unknown service: %s/tcp", port_name);
|
|
|
|
}
|
|
|
|
}
|
2000-09-27 05:38:29 +00:00
|
|
|
else
|
2000-04-13 09:19:23 +00:00
|
|
|
{
|
|
|
|
if ((sp = getservbyname (port_name, "udp")) == NULL)
|
|
|
|
{
|
|
|
|
err_quit ("tcp_open: unknown service: %s/udp", port_name);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Fill in the structure "serv_addr" with the address of the server
|
|
|
|
* that we want to connect with.
|
|
|
|
*/
|
|
|
|
|
|
|
|
bzero ((char *) &serv_addr, sizeof (serv_addr));
|
|
|
|
serv_addr.sin_family = AF_INET;
|
|
|
|
serv_addr.sin_addr.s_addr = addr;
|
|
|
|
if (!http && !icp)
|
|
|
|
{
|
|
|
|
serv_addr.sin_port = sp->s_port;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
serv_addr.sin_port = port;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef HTTP
|
|
|
|
if (http)
|
|
|
|
{
|
2001-03-06 16:46:00 +00:00
|
|
|
sendline =
|
|
|
|
make_http_sendline (url, server, (int) ntohs (port), nocache);
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
2000-09-27 05:38:29 +00:00
|
|
|
#ifdef SMTP
|
|
|
|
if (smtp)
|
|
|
|
{
|
2001-03-06 16:46:00 +00:00
|
|
|
sendline = "QUIT\r\n"; /* Surprises some SMTP servers which log
|
|
|
|
a frightening NOQUEUE. Anyone knows
|
|
|
|
better? */
|
2000-09-27 05:38:29 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
2000-04-13 09:19:23 +00:00
|
|
|
#ifdef ICP
|
|
|
|
if (icp)
|
|
|
|
{
|
|
|
|
sendline = make_icp_sendline (url, &addr, opcode, &length);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
if (!fill_requested)
|
|
|
|
{
|
2000-09-27 05:38:29 +00:00
|
|
|
sendline = random_string (size);
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
sendline = (char *) malloc (size);
|
|
|
|
for (i = 0; i < size; i++)
|
|
|
|
sendline[i] = fill;
|
|
|
|
}
|
2000-07-23 13:02:27 +00:00
|
|
|
n = strlen (sendline);
|
2000-04-13 09:19:23 +00:00
|
|
|
|
2000-11-04 12:36:37 +00:00
|
|
|
#ifdef OPENSSL
|
2001-01-25 15:20:16 +00:00
|
|
|
if (ssl)
|
|
|
|
{
|
|
|
|
SSL_load_error_strings ();
|
|
|
|
SSLeay_add_ssl_algorithms ();
|
2001-02-14 10:08:48 +00:00
|
|
|
/* The following RAND_ calls are only for systems insecure
|
|
|
|
enough to fail to have /dev/urandom. Bug #132001 */
|
2001-02-20 21:48:39 +00:00
|
|
|
RAND_file_name (rand_file, sizeof (rand_file));
|
2001-02-14 10:08:48 +00:00
|
|
|
RAND_write_file (rand_file);
|
|
|
|
RAND_load_file (rand_file, 1024);
|
2001-01-25 15:20:16 +00:00
|
|
|
meth = SSLv2_client_method ();
|
|
|
|
if ((ctx = SSL_CTX_new (meth)) == NULL)
|
|
|
|
err_sys ("Cannot create a new SSL context");
|
|
|
|
}
|
2000-11-04 12:36:37 +00:00
|
|
|
#endif
|
|
|
|
|
2000-04-13 09:19:23 +00:00
|
|
|
for (i = 1; i <= number; i++)
|
|
|
|
{
|
|
|
|
|
|
|
|
attempts++;
|
2001-02-11 21:09:35 +00:00
|
|
|
#ifdef OPENSSL
|
|
|
|
if (ssl)
|
|
|
|
/* Despite what the OpenSSL documentation says, we must
|
|
|
|
allocate a new SSL structure at each iteration, otherwise,
|
|
|
|
*some* SSL servers fail at the second iteration with:
|
|
|
|
error:1406D0D9:SSL routines:GET_SERVER_HELLO:reuse cert type not zero
|
|
|
|
Bug #130151 */
|
|
|
|
if ((sslh = SSL_new (ctx)) == NULL)
|
|
|
|
err_sys ("Cannot initialize SSL context");
|
|
|
|
#endif
|
2000-04-13 09:19:23 +00:00
|
|
|
if (!udp)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Open a TCP socket (an Internet stream socket).
|
|
|
|
*/
|
|
|
|
|
|
|
|
if ((sockfd = socket (AF_INET, SOCK_STREAM, 0)) < 0)
|
|
|
|
err_sys ("Can't open stream socket");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if ((sockfd = socket (AF_INET, SOCK_DGRAM, 0)) < 0)
|
|
|
|
err_sys ("Can't open datagram socket");
|
|
|
|
/* Bind socket for reply. Not necessary? */
|
|
|
|
bzero ((char *) &udp_cli_addr, sizeof (udp_cli_addr));
|
|
|
|
udp_cli_addr.sin_family = AF_INET;
|
|
|
|
udp_cli_addr.sin_addr.s_addr = htonl (INADDR_ANY);
|
|
|
|
udp_cli_addr.sin_port = htons (0);
|
|
|
|
if (bind (sockfd, (struct sockaddr *) &udp_cli_addr,
|
|
|
|
sizeof (udp_cli_addr)) < 0)
|
|
|
|
{
|
|
|
|
err_sys ("bind error");
|
|
|
|
}
|
|
|
|
}
|
2001-03-02 20:47:47 +00:00
|
|
|
#ifdef USE_PRIORITY
|
2001-02-20 21:48:39 +00:00
|
|
|
if (priority_requested)
|
|
|
|
{
|
|
|
|
if (verbose)
|
|
|
|
{
|
|
|
|
printf ("Setting socket priority to %d (0x%02x)\n",
|
|
|
|
priority, (unsigned int) priority);
|
|
|
|
}
|
|
|
|
if (setsockopt (sockfd,
|
|
|
|
SOL_SOCKET,
|
|
|
|
SO_PRIORITY,
|
|
|
|
(void *) &priority, (socklen_t) sizeof (priority)))
|
|
|
|
{
|
|
|
|
err_sys ("Failed setting socket priority");
|
|
|
|
}
|
|
|
|
}
|
2001-03-02 20:47:47 +00:00
|
|
|
#endif
|
|
|
|
#if USE_TOS
|
2001-02-20 21:48:39 +00:00
|
|
|
if (tos_requested)
|
|
|
|
{
|
|
|
|
if (verbose)
|
|
|
|
{
|
|
|
|
printf ("Setting IP type of service octet to %d (0x%02x)\n",
|
|
|
|
tos, (unsigned int) tos);
|
|
|
|
}
|
|
|
|
if (setsockopt (sockfd,
|
|
|
|
SOL_IP,
|
|
|
|
IP_TOS, (void *) &tos, (socklen_t) sizeof (tos)))
|
|
|
|
{
|
|
|
|
err_sys ("Failed setting IP type of service octet");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2000-04-13 09:19:23 +00:00
|
|
|
if (verbose)
|
|
|
|
{
|
|
|
|
if (tcp)
|
|
|
|
{
|
2000-09-27 05:38:29 +00:00
|
|
|
printf
|
|
|
|
("Trying to connect to internet address %s %s to transmit %u bytes...\n",
|
|
|
|
inet_ntoa (*ptr), (port == 0 ? "" : text_port), n);
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
#ifdef ICP
|
|
|
|
if (icp)
|
|
|
|
{
|
2000-09-27 05:38:29 +00:00
|
|
|
printf
|
|
|
|
("Trying to send an ICP packet of %u bytes to the internet address %s...\n",
|
|
|
|
length, inet_ntoa (*ptr));
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
else
|
|
|
|
{
|
|
|
|
printf ("Trying to send %u bytes to internet address %s...\n",
|
|
|
|
size, inet_ntoa (*ptr));
|
|
|
|
}
|
|
|
|
#ifdef FLUSH_OUTPUT
|
|
|
|
if (fflush ((FILE *) NULL) != 0)
|
|
|
|
{
|
|
|
|
err_sys ("I cannot flush");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
if (tcp && timeout_requested) /* echoping's timeout has a different semantic in TCP and UDP */
|
|
|
|
{
|
|
|
|
#ifdef USE_SIGACTION
|
|
|
|
mysigaction.sa_handler = to_alarm;
|
|
|
|
sigemptyset (&mysigaction.sa_mask);
|
|
|
|
/* Default behavior doesn't seem portable? */
|
|
|
|
#ifdef SA_INTERRUPT
|
|
|
|
mysigaction.sa_flags = SA_INTERRUPT;
|
|
|
|
#else
|
|
|
|
mysigaction.sa_flags = (int) 0;
|
|
|
|
#endif
|
|
|
|
if ((sigaction (SIGALRM, &mysigaction, NULL)) < 0)
|
|
|
|
err_sys ("Cannot set signal handler");
|
|
|
|
#else
|
|
|
|
signal (SIGALRM, to_alarm);
|
|
|
|
#endif
|
|
|
|
timeout_flag = 0; /* for signal handler */
|
|
|
|
alarm (timeout);
|
|
|
|
}
|
|
|
|
(void) gettimeofday (&oldtv, (struct timezone *) NULL);
|
|
|
|
if (!ttcp && !icp)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Connect to the server.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (connect (sockfd, (struct sockaddr *) &serv_addr,
|
|
|
|
sizeof (serv_addr)) < 0)
|
|
|
|
{
|
|
|
|
if ((errno == EINTR) && (timeout_flag))
|
|
|
|
{
|
|
|
|
printf ("Timeout while connecting\n");
|
|
|
|
continue;
|
|
|
|
#ifdef FLUSH_OUTPUT
|
|
|
|
if (fflush ((FILE *) NULL) != 0)
|
|
|
|
{
|
|
|
|
err_sys ("I cannot flush");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
else
|
|
|
|
err_sys ("Can't connect to server");
|
|
|
|
}
|
|
|
|
if (verbose && tcp)
|
|
|
|
{
|
|
|
|
printf ("Connected...\n");
|
|
|
|
#ifdef FLUSH_OUTPUT
|
|
|
|
if (fflush ((FILE *) NULL) != 0)
|
|
|
|
{
|
|
|
|
err_sys ("I cannot flush");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
2001-01-25 15:20:16 +00:00
|
|
|
if (!udp && !ssl)
|
|
|
|
if ((files = fdopen (sockfd, "r")) == NULL)
|
|
|
|
err_sys ("Cannot fdopen");
|
2000-11-04 12:36:37 +00:00
|
|
|
#ifdef OPENSSL
|
2001-01-25 15:20:16 +00:00
|
|
|
if (ssl)
|
|
|
|
{
|
|
|
|
SSL_set_fd (sslh, sockfd);
|
|
|
|
if (SSL_connect (sslh) == -1)
|
|
|
|
if ((errno == EINTR) && (timeout_flag))
|
|
|
|
{
|
|
|
|
printf ("Timeout while starting SSL\n");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (verbose)
|
|
|
|
printf ("SSL connection using %s\n", SSL_get_cipher (sslh));
|
|
|
|
/* We could check the server's certificate or other funny
|
|
|
|
things */
|
|
|
|
}
|
2000-11-04 12:36:37 +00:00
|
|
|
#endif
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
/* Not T/TCP */
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* No initial connection */
|
|
|
|
}
|
|
|
|
if ((port_to_use == USE_ECHO) || (port_to_use == USE_DISCARD) ||
|
2000-09-27 05:38:29 +00:00
|
|
|
(port_to_use == USE_HTTP) || (port_to_use == USE_ICP) ||
|
|
|
|
(port_to_use == USE_SMTP))
|
2000-04-13 09:19:23 +00:00
|
|
|
{
|
2000-04-17 14:31:25 +00:00
|
|
|
#ifdef USE_TTCP
|
2000-04-13 09:19:23 +00:00
|
|
|
if (ttcp)
|
|
|
|
{
|
|
|
|
if (sendto (sockfd, sendline, n, MSG_EOF,
|
2000-09-27 05:38:29 +00:00
|
|
|
(struct sockaddr *) &serv_addr,
|
|
|
|
sizeof (serv_addr)) != n)
|
2000-04-13 09:19:23 +00:00
|
|
|
err_sys ("sendto error on socket");
|
|
|
|
if (verbose)
|
|
|
|
{
|
|
|
|
printf ("T/TCP connection done\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
if (!udp)
|
|
|
|
{
|
2001-01-25 15:20:16 +00:00
|
|
|
if (!ssl)
|
|
|
|
{
|
|
|
|
/* Write something to the server */
|
|
|
|
if (writen (sockfd, sendline, n) != n)
|
|
|
|
{
|
|
|
|
if ((nr < 0 || nr != n) && timeout_flag)
|
|
|
|
{
|
|
|
|
nr = n;
|
|
|
|
printf ("Timeout while writing\n");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
err_sys ("writen error on socket");
|
|
|
|
}
|
|
|
|
}
|
2000-11-04 12:36:37 +00:00
|
|
|
#ifdef OPENSSL
|
2001-01-25 15:20:16 +00:00
|
|
|
else
|
|
|
|
{
|
2001-02-11 21:09:35 +00:00
|
|
|
if ((rc = SSL_write (sslh, sendline, n)) != n)
|
2000-09-27 05:38:29 +00:00
|
|
|
{
|
2001-01-25 15:20:16 +00:00
|
|
|
if ((nr < 0 || nr != n) && timeout_flag)
|
|
|
|
{
|
|
|
|
nr = n;
|
|
|
|
printf ("Timeout while writing\n");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2001-02-11 21:09:35 +00:00
|
|
|
sslcode = ERR_get_error ();
|
|
|
|
err_sys ("SSL_write error on socket: %s",
|
|
|
|
ERR_error_string (sslcode, NULL));
|
2001-01-25 15:20:16 +00:00
|
|
|
}
|
2000-09-27 05:38:29 +00:00
|
|
|
}
|
|
|
|
}
|
2000-11-04 12:36:37 +00:00
|
|
|
#endif
|
2001-02-20 21:48:39 +00:00
|
|
|
/* Write something to the server */
|
|
|
|
if (writen (sockfd, sendline, n) != n)
|
|
|
|
{
|
|
|
|
if ((nr < 0 || nr != n) && timeout_flag)
|
|
|
|
{
|
|
|
|
nr = n;
|
|
|
|
printf ("Timeout while writing\n");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
err_sys ("writen error on socket");
|
|
|
|
}
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
#ifdef ICP
|
|
|
|
if (icp)
|
|
|
|
{
|
|
|
|
if (sendto (sockfd, sendline, length, 0,
|
|
|
|
&serv_addr, sizeof (serv_addr)) != length)
|
|
|
|
err_sys ("sendto error on socket");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
/*
|
|
|
|
* if (sendto(sockfd, sendline, n, 0,
|
|
|
|
* &serv_addr, sizeof(serv_addr)) != n)
|
|
|
|
* err_sys("sendto error on socket");
|
|
|
|
*/
|
|
|
|
if (send (sockfd, sendline, n, 0) != n)
|
|
|
|
err_sys ("send error on socket");
|
|
|
|
}
|
|
|
|
if (verbose)
|
|
|
|
{
|
|
|
|
#ifdef ICP
|
|
|
|
if (icp)
|
|
|
|
printf ("Sent (%d bytes)...\n", length);
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
printf ("Sent (%d bytes)...\n", n);
|
|
|
|
|
|
|
|
#ifdef FLUSH_OUTPUT
|
|
|
|
if (fflush ((FILE *) NULL) != 0)
|
|
|
|
{
|
|
|
|
err_sys ("I cannot flush");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ((port_to_use == USE_ECHO) || (port_to_use == USE_CHARGEN) ||
|
2000-09-27 05:38:29 +00:00
|
|
|
(port_to_use == USE_HTTP) || (port_to_use == USE_ICP) ||
|
|
|
|
(port_to_use == USE_SMTP))
|
2000-04-13 09:19:23 +00:00
|
|
|
{
|
|
|
|
if (!udp)
|
|
|
|
{
|
2000-09-27 05:38:29 +00:00
|
|
|
if (!http && !smtp)
|
2000-04-13 09:19:23 +00:00
|
|
|
{
|
|
|
|
/* Read from the server */
|
2000-11-04 12:36:37 +00:00
|
|
|
nr = readline (files, recvline, n, stop_at_newlines);
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
#ifdef HTTP
|
2000-09-27 05:38:29 +00:00
|
|
|
else if (http)
|
2000-04-13 09:19:23 +00:00
|
|
|
{
|
2001-01-25 15:20:16 +00:00
|
|
|
if (!ssl)
|
2000-11-04 12:36:37 +00:00
|
|
|
channel.fs = files;
|
|
|
|
#ifdef OPENSSL
|
2001-01-25 15:20:16 +00:00
|
|
|
else
|
|
|
|
channel.ssl = sslh;
|
2000-11-04 12:36:37 +00:00
|
|
|
#endif
|
|
|
|
nr = read_from_server (channel, ssl);
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
2000-09-27 05:38:29 +00:00
|
|
|
#endif
|
|
|
|
#ifdef SMTP
|
|
|
|
else if (smtp)
|
|
|
|
{
|
2000-11-04 12:36:37 +00:00
|
|
|
nr = smtp_read_response_from_server (files);
|
2000-09-27 05:38:29 +00:00
|
|
|
}
|
2000-04-13 09:19:23 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
#ifdef USE_SIGACTION
|
|
|
|
mysigaction.sa_handler = to_alarm;
|
|
|
|
sigemptyset (&mysigaction.sa_mask);
|
|
|
|
#ifdef SA_INTERRUPT
|
|
|
|
mysigaction.sa_flags = SA_INTERRUPT;
|
|
|
|
#else
|
|
|
|
mysigaction.sa_flags = (int) 0;
|
|
|
|
#endif
|
|
|
|
if ((sigaction (SIGALRM, &mysigaction, NULL)) < 0)
|
|
|
|
err_sys ("Cannot set signal handler");
|
|
|
|
#else
|
2000-07-24 11:31:56 +00:00
|
|
|
signal (SIGALRM, to_alarm);
|
2000-04-13 09:19:23 +00:00
|
|
|
#endif
|
|
|
|
timeout_flag = 0; /* for signal handler */
|
|
|
|
alarm (timeout);
|
|
|
|
#ifdef ICP
|
|
|
|
if (icp)
|
|
|
|
{
|
|
|
|
nr = recv_icp (sockfd, recvline, retcode);
|
|
|
|
if (verbose)
|
|
|
|
{
|
|
|
|
printf ("%s\n", retcode);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
#endif
|
|
|
|
nr = recv (sockfd, recvline, n, 0);
|
|
|
|
/*
|
|
|
|
* nr = recvfrom(sockfd, recvline, n, 0,
|
|
|
|
* (struct sockaddr *) 0, (int *) 0);
|
|
|
|
* recvfrom fails on SunOS on connected
|
|
|
|
* sockets.
|
|
|
|
*/
|
|
|
|
/*
|
2001-01-25 15:20:16 +00:00
|
|
|
* Todo: in UDP, we should loop to read: we
|
2000-04-13 09:19:23 +00:00
|
|
|
* can have several reads necessary.
|
|
|
|
*/
|
|
|
|
alarm (0);
|
|
|
|
if ((nr < 0) && (errno == EINTR) && (timeout_flag))
|
|
|
|
{
|
|
|
|
nr = n;
|
|
|
|
printf ("Timeout\n");
|
|
|
|
#ifdef FLUSH_OUTPUT
|
|
|
|
if (fflush ((FILE *) NULL) != 0)
|
|
|
|
{
|
|
|
|
err_sys ("I cannot flush");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
#ifdef ICP
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
2000-09-27 05:38:29 +00:00
|
|
|
if (!http && !icp && !smtp)
|
2000-04-13 09:19:23 +00:00
|
|
|
{
|
|
|
|
if ((nr < 0 || nr != n) && timeout_flag)
|
|
|
|
/* if ((nr < 0 || nr != n) && (errno == EINTR) && timeout_flag) */
|
|
|
|
{
|
2000-09-27 05:38:29 +00:00
|
|
|
printf ("Timeout while reading (%d byte(s) read)\n",
|
|
|
|
(nr == -1) ? 0 : nr);
|
2000-04-13 09:19:23 +00:00
|
|
|
nr = n;
|
|
|
|
#ifdef FLUSH_OUTPUT
|
|
|
|
if (fflush ((FILE *) NULL) != 0)
|
|
|
|
{
|
|
|
|
err_sys ("I cannot flush");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (nr < 0 || nr != n)
|
2000-09-27 05:38:29 +00:00
|
|
|
err_sys ("readline error: %d bytes read, %d bytes requested",
|
|
|
|
nr, n);
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
/* This is HTTP */
|
|
|
|
{
|
|
|
|
if ((nr < 0) && (errno == EINTR) && (timeout_flag))
|
|
|
|
{
|
2000-09-27 05:38:29 +00:00
|
|
|
printf ("Timeout while reading (%d byte(s) read)\n",
|
|
|
|
(nr == -1) ? 0 : nr);
|
2000-04-13 09:19:23 +00:00
|
|
|
#ifdef FLUSH_OUTPUT
|
|
|
|
if (fflush ((FILE *) NULL) != 0)
|
|
|
|
{
|
|
|
|
err_sys ("I cannot flush");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
continue;
|
|
|
|
}
|
2000-09-27 05:38:29 +00:00
|
|
|
if (nr < 0)
|
|
|
|
{
|
|
|
|
err_ret ("Error reading HTTP reply");
|
|
|
|
}
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
if (verbose)
|
|
|
|
printf ("%d bytes read from server.\n", nr);
|
|
|
|
}
|
|
|
|
/* That's all, folks */
|
2001-02-11 21:09:35 +00:00
|
|
|
if (http)
|
|
|
|
{
|
2001-01-26 14:37:57 +00:00
|
|
|
#ifdef OPENSSL
|
2001-02-11 21:09:35 +00:00
|
|
|
if (ssl)
|
|
|
|
SSL_shutdown (channel.ssl);
|
|
|
|
else
|
2001-01-26 14:37:57 +00:00
|
|
|
#endif
|
2001-02-11 21:09:35 +00:00
|
|
|
fclose (channel.fs);
|
|
|
|
}
|
2000-04-13 09:19:23 +00:00
|
|
|
close (sockfd);
|
|
|
|
|
|
|
|
(void) gettimeofday (&newtv, (struct timezone *) NULL);
|
|
|
|
if (tcp)
|
|
|
|
alarm (0);
|
|
|
|
temp = newtv;
|
|
|
|
tvsub (&temp, &oldtv);
|
|
|
|
if (!timeout_flag)
|
|
|
|
{
|
|
|
|
tvadd (&total, &temp);
|
|
|
|
|
|
|
|
/* Check */
|
|
|
|
if (port_to_use == USE_ECHO)
|
|
|
|
{
|
|
|
|
if (strcmp (sendline, recvline) != 0)
|
|
|
|
{
|
|
|
|
printf (" I wrote:\n%s\n", sendline);
|
|
|
|
printf (" and I got back:\n%s\n", recvline);
|
|
|
|
err_quit ("Strange server");
|
|
|
|
}
|
|
|
|
if (verbose)
|
|
|
|
{
|
|
|
|
printf ("Checked\n");
|
|
|
|
#ifdef FLUSH_OUTPUT
|
|
|
|
if (fflush ((FILE *) NULL) != 0)
|
|
|
|
{
|
|
|
|
err_sys ("I cannot flush");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (port_to_use == USE_CHARGEN)
|
|
|
|
{
|
|
|
|
sendline = CHARGENERATED;
|
|
|
|
recvline[strlen (sendline)] = 0;
|
|
|
|
if (strcmp (sendline, recvline) != 0)
|
|
|
|
{
|
2001-01-25 15:20:16 +00:00
|
|
|
/* Todo: it does not work if the size is lower than the
|
2000-04-13 09:19:23 +00:00
|
|
|
length of CHARGENERATED */
|
|
|
|
printf (" I got back:\n%s\n", recvline);
|
|
|
|
printf (" instead of the most common:\n%s\n", sendline);
|
|
|
|
err_ret ("Strange server");
|
|
|
|
}
|
|
|
|
if (verbose)
|
|
|
|
{
|
|
|
|
printf ("Checked\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
tvsub (&newtv, &oldtv);
|
|
|
|
tvmin (&min, &newtv);
|
|
|
|
tvmax (&max, &newtv);
|
|
|
|
printf ("Elapsed time: %d.%06d seconds\n",
|
|
|
|
(int) newtv.tv_sec, (int) newtv.tv_usec);
|
|
|
|
#ifdef FLUSH_OUTPUT
|
|
|
|
if (fflush ((FILE *) NULL) != 0)
|
|
|
|
{
|
|
|
|
err_sys ("I cannot flush");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
results[i - 1].valid = 1;
|
|
|
|
results[i - 1].timevalue = newtv;
|
|
|
|
successes++;
|
|
|
|
}
|
|
|
|
if (number > 1)
|
|
|
|
{
|
2000-11-07 18:28:45 +00:00
|
|
|
#ifdef OPENSSL
|
2001-01-25 15:20:16 +00:00
|
|
|
if (ssl)
|
2000-11-07 18:28:45 +00:00
|
|
|
{
|
2001-02-11 21:09:35 +00:00
|
|
|
/* SSL_clear (sslh); No, we have to free. Bug #130151 */
|
|
|
|
SSL_free (sslh);
|
2001-01-25 15:20:16 +00:00
|
|
|
}
|
2000-11-07 18:28:45 +00:00
|
|
|
#endif
|
2001-02-23 12:30:31 +00:00
|
|
|
#ifdef HAVE_USLEEP
|
|
|
|
usleep (wait * 1000000);
|
|
|
|
#else
|
2000-04-13 09:19:23 +00:00
|
|
|
sleep (wait);
|
2001-02-23 12:30:31 +00:00
|
|
|
#endif
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
printstats ();
|
|
|
|
if (successes >= 1)
|
|
|
|
exit (0);
|
|
|
|
else
|
|
|
|
exit (1);
|
2001-02-11 21:09:35 +00:00
|
|
|
/* It would be nice to clean here (SSL, etc) */
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
printstats ()
|
|
|
|
{
|
|
|
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/* if ((number > 1) && ((!udp) || (successes > 0))) { */
|
|
|
|
if (successes > 1)
|
|
|
|
{
|
|
|
|
printf ("---\n");
|
|
|
|
if (successes < attempts)
|
|
|
|
printf ("Warning: %d message(s) lost (%d %%)\n", attempts - successes,
|
|
|
|
((attempts - successes) * 100) / attempts);
|
|
|
|
printf ("Minimum time: %d.%06d seconds (%.0f bytes per sec.)\n",
|
2000-09-27 05:38:29 +00:00
|
|
|
(int) min.tv_sec, (int) min.tv_usec,
|
|
|
|
(double) size / tv2double (min));
|
2000-04-13 09:19:23 +00:00
|
|
|
printf ("Maximum time: %d.%06d seconds (%.0f bytes per sec.)\n",
|
2000-09-27 05:38:29 +00:00
|
|
|
(int) max.tv_sec, (int) max.tv_usec,
|
|
|
|
(double) size / tv2double (max));
|
2000-04-13 09:19:23 +00:00
|
|
|
tvavg (&total, successes);
|
|
|
|
printf ("Average time: %d.%06d seconds (%.0f bytes per sec.)\n",
|
2000-09-27 05:38:29 +00:00
|
|
|
(int) total.tv_sec, (int) total.tv_usec,
|
|
|
|
(double) size / tv2double (total));
|
2000-04-13 09:19:23 +00:00
|
|
|
/* The number of bytes/second, as printed above, is not really
|
|
|
|
meaningful: size does not reflect the number of bytes exchanged.
|
|
|
|
With echo, N = 2*size, with discard, N = size, with http, N = size + (response)... */
|
|
|
|
for (i = 0; i < number; i++)
|
|
|
|
{
|
|
|
|
if (results[i].valid)
|
|
|
|
good_results[j++] = results[i].timevalue;
|
|
|
|
}
|
2001-01-25 15:20:16 +00:00
|
|
|
if (successes != j) /* Todo: bug! */
|
2000-04-13 09:19:23 +00:00
|
|
|
err_quit ("successes (%d) is different from j (%d)", successes, j);
|
|
|
|
qsort (good_results, successes, sizeof (struct timeval), tvcmp);
|
|
|
|
/*
|
|
|
|
* for (i = 1; i <= number; i++) { printf("---\nTime %d th:
|
|
|
|
* %d.%06d seconds\n", i, results[i-1].tv_sec,
|
|
|
|
* results[i-1].tv_usec); }
|
|
|
|
*/
|
|
|
|
if ((successes % 2) == 1)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* printf("Searching good_results[%d]\n", (successes
|
|
|
|
* + 1) / 2 - 1);
|
|
|
|
*/
|
|
|
|
median = good_results[((successes + 1) / 2 - 1)];
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* printf("Searching good_results[%d] and [%d]\n",
|
|
|
|
* (successes / 2) - 1, successes / 2);
|
|
|
|
*/
|
|
|
|
tvadd (&median, &good_results[(successes / 2) - 1]);
|
|
|
|
tvadd (&median, &good_results[successes / 2]);
|
|
|
|
tvavg (&median, 2);
|
|
|
|
}
|
|
|
|
printf ("Median time: %d.%06d seconds (%.0f bytes per sec.)\n",
|
2000-09-27 05:38:29 +00:00
|
|
|
(int) median.tv_sec, (int) median.tv_usec,
|
|
|
|
(double) size / tv2double (median));
|
2000-04-13 09:19:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Signal handler for timeouts (SIGALRM). This function is called when the
|
|
|
|
* alarm() value that was set counts down to zero. This indicates that we
|
|
|
|
* haven't received a response from the server to the last datagram we sent.
|
|
|
|
* All we do is set a flag and return from the signal handler. The occurrence
|
|
|
|
* of the signal interrupts the recvfrom() system call (errno = EINTR) above,
|
|
|
|
* and we then check the timeout_flag flag.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
to_alarm ()
|
|
|
|
{
|
|
|
|
timeout_flag = 1; /* set flag for function above */
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
interrupted ()
|
|
|
|
{
|
|
|
|
printf ("Interrupted by user\n");
|
|
|
|
printstats ();
|
|
|
|
exit (1);
|
|
|
|
}
|