2021-09-13 12:54:06 +00:00
|
|
|
# Copyright (c) 2020-2021 Status Research & Development GmbH
|
|
|
|
# Licensed and distributed under either of
|
|
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
|
|
|
|
{.push raises: [Defect].}
|
|
|
|
|
|
|
|
import
|
|
|
|
std/[monotimes],
|
|
|
|
faststreams,
|
2021-12-10 15:28:00 +00:00
|
|
|
chronos,
|
2022-06-17 20:45:37 +00:00
|
|
|
stew/[endians2, results, objects, arrayops],
|
2021-09-13 12:54:06 +00:00
|
|
|
../p2p/discoveryv5/random2
|
|
|
|
|
2022-06-17 20:45:37 +00:00
|
|
|
export results, random2
|
2021-09-13 12:54:06 +00:00
|
|
|
|
2021-12-20 12:14:50 +00:00
|
|
|
const
|
2021-12-10 15:28:00 +00:00
|
|
|
minimalHeaderSize = 20
|
2021-12-15 12:35:17 +00:00
|
|
|
minimalHeaderSizeWithSelectiveAck = 26
|
2021-12-10 15:28:00 +00:00
|
|
|
protocolVersion = 1
|
|
|
|
zeroMoment = Moment.init(0, Nanosecond)
|
2021-12-15 12:35:17 +00:00
|
|
|
acksArrayLength: uint8 = 4
|
2021-09-13 12:54:06 +00:00
|
|
|
|
2021-12-20 12:14:50 +00:00
|
|
|
type
|
2021-09-13 12:54:06 +00:00
|
|
|
PacketType* = enum
|
|
|
|
ST_DATA = 0,
|
|
|
|
ST_FIN = 1,
|
|
|
|
ST_STATE = 2,
|
|
|
|
ST_RESET = 3,
|
|
|
|
ST_SYN = 4
|
|
|
|
|
|
|
|
MicroSeconds = uint32
|
|
|
|
|
2022-01-07 09:38:36 +00:00
|
|
|
PacketHeaderV1* = object
|
2021-09-13 12:54:06 +00:00
|
|
|
pType*: PacketType
|
|
|
|
version*: uint8
|
|
|
|
extension*: uint8
|
|
|
|
connectionId*: uint16
|
|
|
|
timestamp*: MicroSeconds
|
2021-10-15 11:38:51 +00:00
|
|
|
# This is the difference between the local time, at the time the last packet
|
|
|
|
# was received, and the timestamp in this last received packet
|
2021-09-13 12:54:06 +00:00
|
|
|
timestampDiff*: MicroSeconds
|
2021-10-15 11:38:51 +00:00
|
|
|
# The window size is the number of bytes currently in-flight, i.e. sent but not acked
|
2021-11-12 09:58:49 +00:00
|
|
|
# When sending packets, this should be set to the number of bytes left in the socket's receive buffer.
|
2021-09-13 12:54:06 +00:00
|
|
|
wndSize*: uint32
|
|
|
|
seqNr*: uint16
|
2021-10-15 11:38:51 +00:00
|
|
|
# sequence number the sender of the packet last received in the other direction
|
2021-09-13 12:54:06 +00:00
|
|
|
ackNr*: uint16
|
|
|
|
|
2022-01-04 08:52:38 +00:00
|
|
|
SelectiveAckExtension* = object
|
|
|
|
acks*: array[4, byte]
|
2021-12-15 12:35:17 +00:00
|
|
|
|
2021-09-13 12:54:06 +00:00
|
|
|
Packet* = object
|
|
|
|
header*: PacketHeaderV1
|
2021-12-15 12:35:17 +00:00
|
|
|
eack*: Option[SelectiveAckExtension]
|
2021-09-13 12:54:06 +00:00
|
|
|
payload*: seq[uint8]
|
|
|
|
|
2021-12-10 15:28:00 +00:00
|
|
|
TimeStampInfo* = object
|
|
|
|
moment*: Moment
|
|
|
|
timestamp*: uint32
|
|
|
|
|
2021-09-13 12:54:06 +00:00
|
|
|
# Important timing assumptions for utp protocol here:
|
|
|
|
# 1. Microsecond precisions
|
|
|
|
# 2. Monotonicity
|
|
|
|
# Reference lib have a lot of checks to assume that this is monotonic on
|
|
|
|
# every system, and warnings when monotonic clock is not avaialable.
|
2021-12-20 12:14:50 +00:00
|
|
|
proc getMonoTimestamp*(): TimeStampInfo =
|
2021-12-10 15:28:00 +00:00
|
|
|
let currentMoment = Moment.now()
|
|
|
|
|
|
|
|
# Casting this value from int64 to uin32, my lead to some sudden spikes in
|
|
|
|
# timestamp numeric values i.e it is possible that timestamp can suddenly change
|
|
|
|
# from 4294967296 to for example 10, this may lead to sudden spikes in
|
|
|
|
# calculated delays
|
|
|
|
# uTP implementation is resistant to those spikes are as it keeps history of
|
|
|
|
# few last delays on uses smallest one for calculating ledbat window.
|
|
|
|
# so any outlier huge value will be ignored
|
2021-12-20 12:14:50 +00:00
|
|
|
#
|
2021-12-10 15:28:00 +00:00
|
|
|
let timestamp = uint32((currentMoment - zeroMoment).microseconds())
|
|
|
|
TimeStampInfo(moment: currentMoment, timestamp: timestamp)
|
2021-09-13 12:54:06 +00:00
|
|
|
|
|
|
|
# Simple generator, not useful for cryptography
|
2022-06-17 20:45:37 +00:00
|
|
|
proc randUint16*(rng: var HmacDrbgContext): uint16 =
|
2021-09-13 12:54:06 +00:00
|
|
|
uint16(rand(rng, int(high(uint16))))
|
|
|
|
|
|
|
|
# Simple generator, not useful for cryptography
|
2022-06-17 20:45:37 +00:00
|
|
|
proc randUint32*(rng: var HmacDrbgContext): uint32 =
|
2021-09-13 12:54:06 +00:00
|
|
|
uint32(rand(rng, int(high(uint32))))
|
|
|
|
|
|
|
|
proc encodeTypeVer(h: PacketHeaderV1): uint8 =
|
|
|
|
var typeVer = 0'u8
|
|
|
|
let typeOrd = uint8(ord(h.pType))
|
|
|
|
typeVer = (typeVer and 0xf0) or (h.version and 0xf)
|
|
|
|
typeVer = (typeVer and 0xf) or (typeOrd shl 4)
|
|
|
|
typeVer
|
|
|
|
|
2021-10-06 09:36:37 +00:00
|
|
|
proc encodeHeaderStream(s: var OutputStream, h: PacketHeaderV1) =
|
2021-09-13 12:54:06 +00:00
|
|
|
try:
|
2021-10-06 09:36:37 +00:00
|
|
|
s.write(encodeTypeVer(h))
|
|
|
|
s.write(h.extension)
|
|
|
|
s.write(h.connectionId.toBytesBE())
|
|
|
|
s.write(h.timestamp.toBytesBE())
|
|
|
|
s.write(h.timestampDiff.toBytesBE())
|
|
|
|
s.write(h.wndSize.toBytesBE())
|
|
|
|
s.write(h.seqNr.toBytesBE())
|
|
|
|
s.write(h.ackNr.toBytesBE())
|
2021-09-13 12:54:06 +00:00
|
|
|
except IOError as e:
|
2021-10-06 09:36:37 +00:00
|
|
|
# This should not happen in case of in-memory streams
|
2021-09-13 12:54:06 +00:00
|
|
|
raiseAssert e.msg
|
|
|
|
|
2021-12-15 12:35:17 +00:00
|
|
|
proc encodeExtensionStream(s: var OutputStream, e: SelectiveAckExtension) =
|
|
|
|
try:
|
|
|
|
# writing 0 as there is not further extensions after selectiv ack
|
|
|
|
s.write(0'u8)
|
|
|
|
s.write(acksArrayLength)
|
|
|
|
s.write(e.acks)
|
|
|
|
except IOError as e:
|
|
|
|
# This should not happen in case of in-memory streams
|
|
|
|
raiseAssert e.msg
|
|
|
|
|
2021-09-13 12:54:06 +00:00
|
|
|
proc encodePacket*(p: Packet): seq[byte] =
|
2021-10-06 09:36:37 +00:00
|
|
|
var s = memoryOutput().s
|
2021-09-13 12:54:06 +00:00
|
|
|
try:
|
2021-10-06 09:36:37 +00:00
|
|
|
encodeHeaderStream(s, p.header)
|
2021-12-15 12:35:17 +00:00
|
|
|
if (p.eack.isSome()):
|
|
|
|
encodeExtensionStream(s, p.eack.unsafeGet())
|
2021-09-13 12:54:06 +00:00
|
|
|
if (len(p.payload) > 0):
|
2021-10-06 09:36:37 +00:00
|
|
|
s.write(p.payload)
|
|
|
|
s.getOutput()
|
2021-09-13 12:54:06 +00:00
|
|
|
except IOError as e:
|
2021-10-06 09:36:37 +00:00
|
|
|
# This should not happen in case of in-memory streams
|
2021-09-13 12:54:06 +00:00
|
|
|
raiseAssert e.msg
|
2021-12-20 12:14:50 +00:00
|
|
|
|
2021-09-13 12:54:06 +00:00
|
|
|
proc decodePacket*(bytes: openArray[byte]): Result[Packet, string] =
|
2021-12-15 12:35:17 +00:00
|
|
|
let receivedBytesLength = len(bytes)
|
|
|
|
if receivedBytesLength < minimalHeaderSize:
|
2021-09-13 12:54:06 +00:00
|
|
|
return err("invalid header size")
|
|
|
|
|
|
|
|
let version = bytes[0] and 0xf
|
|
|
|
if version != protocolVersion:
|
|
|
|
return err("invalid packet version")
|
2021-12-20 12:14:50 +00:00
|
|
|
|
2021-09-13 12:54:06 +00:00
|
|
|
var kind: PacketType
|
|
|
|
if not checkedEnumAssign(kind, (bytes[0] shr 4)):
|
|
|
|
return err("Invalid message type")
|
2021-12-20 12:14:50 +00:00
|
|
|
|
2021-12-15 12:35:17 +00:00
|
|
|
let extensionByte = bytes[1]
|
|
|
|
|
|
|
|
if (not (extensionByte == 0 or extensionByte == 1)):
|
|
|
|
return err("Invalid extension type")
|
|
|
|
|
2021-09-13 12:54:06 +00:00
|
|
|
let header =
|
|
|
|
PacketHeaderV1(
|
|
|
|
pType: kind,
|
|
|
|
version: version,
|
2021-12-15 12:35:17 +00:00
|
|
|
extension: extensionByte,
|
2021-10-06 09:36:37 +00:00
|
|
|
connection_id: fromBytesBE(uint16, bytes.toOpenArray(2, 3)),
|
|
|
|
timestamp: fromBytesBE(uint32, bytes.toOpenArray(4, 7)),
|
|
|
|
timestamp_diff: fromBytesBE(uint32, bytes.toOpenArray(8, 11)),
|
|
|
|
wnd_size: fromBytesBE(uint32, bytes.toOpenArray(12, 15)),
|
|
|
|
seq_nr: fromBytesBE(uint16, bytes.toOpenArray(16, 17)),
|
|
|
|
ack_nr: fromBytesBE(uint16, bytes.toOpenArray(18, 19)),
|
2021-09-13 12:54:06 +00:00
|
|
|
)
|
2021-12-20 12:14:50 +00:00
|
|
|
|
2021-12-15 12:35:17 +00:00
|
|
|
if extensionByte == 0:
|
|
|
|
# packet without any extensions
|
|
|
|
let payload =
|
|
|
|
if (receivedBytesLength == minimalHeaderSize):
|
|
|
|
@[]
|
|
|
|
else:
|
2021-12-28 07:08:05 +00:00
|
|
|
bytes[minimalHeaderSize..^1]
|
2021-12-15 12:35:17 +00:00
|
|
|
|
|
|
|
return ok(Packet(header: header, eack: none[SelectiveAckExtension](), payload: payload))
|
|
|
|
else:
|
|
|
|
# packet with selective ack extension
|
|
|
|
if (receivedBytesLength < minimalHeaderSizeWithSelectiveAck):
|
|
|
|
return err("Packet too short for selective ack extension")
|
2021-12-20 12:14:50 +00:00
|
|
|
|
2021-12-15 12:35:17 +00:00
|
|
|
let nextExtension = bytes[20]
|
|
|
|
let extLength = bytes[21]
|
|
|
|
|
|
|
|
# As selective ack is only supported extension the byte for nextExtension
|
|
|
|
# must be equal to 0.
|
|
|
|
# As for extLength, specificaiton says that it must be at least 4, and in multiples of 4
|
|
|
|
# but reference implementation always uses 4 bytes bit mask which makes sense
|
|
|
|
# as 4byte bit mask is able to ack 32 packets in the future which is more than enough
|
|
|
|
if (nextExtension != 0 or extLength != 4):
|
|
|
|
return err("Bad format of selective ack extension")
|
2021-12-20 12:14:50 +00:00
|
|
|
|
2021-12-15 12:35:17 +00:00
|
|
|
|
|
|
|
let extension = SelectiveAckExtension(
|
2021-12-28 07:08:05 +00:00
|
|
|
acks: toArray(4, bytes.toOpenArray(22, 25))
|
2021-12-20 12:14:50 +00:00
|
|
|
)
|
2021-12-15 12:35:17 +00:00
|
|
|
|
|
|
|
let payload =
|
|
|
|
if (receivedBytesLength == minimalHeaderSizeWithSelectiveAck):
|
|
|
|
@[]
|
|
|
|
else:
|
2021-12-28 07:08:05 +00:00
|
|
|
bytes[minimalHeaderSizeWithSelectiveAck..^1]
|
2021-09-13 12:54:06 +00:00
|
|
|
|
2021-12-15 12:35:17 +00:00
|
|
|
return ok(Packet(header: header, eack: some(extension), payload: payload))
|
2021-09-13 12:54:06 +00:00
|
|
|
|
2021-12-10 09:18:00 +00:00
|
|
|
proc modifyTimeStampAndAckNr*(packetBytes: var seq[byte], newTimestamp: uint32, newAckNr: uint16) =
|
|
|
|
## Modifies timestamp and ack nr of already encoded packets. Those fields should be
|
|
|
|
## filled right before sending, so when re-sending the packet we would like to update
|
|
|
|
## it without decoding and re-encoding the packet once again
|
|
|
|
doAssert(len(packetBytes) >= minimalHeaderSize)
|
|
|
|
packetBytes[4..7] = toBytesBE(newTimestamp)
|
|
|
|
packetBytes[18..19] = toBytesBE(newAckNr)
|
|
|
|
|
2021-09-13 12:54:06 +00:00
|
|
|
# connectionId - should be random not already used number
|
|
|
|
# bufferSize - should be pre configured initial buffer size for socket
|
2021-10-11 12:16:06 +00:00
|
|
|
# SYN packets are special, and should have the receive ID in the connid field,
|
|
|
|
# instead of conn_id_send.
|
|
|
|
proc synPacket*(seqNr: uint16, rcvConnectionId: uint16, bufferSize: uint32): Packet =
|
2021-09-13 12:54:06 +00:00
|
|
|
let h = PacketHeaderV1(
|
|
|
|
pType: ST_SYN,
|
|
|
|
version: protocolVersion,
|
|
|
|
extension: 0'u8,
|
2021-10-11 12:16:06 +00:00
|
|
|
connectionId: rcvConnectionId,
|
2021-12-10 15:28:00 +00:00
|
|
|
timestamp: getMonoTimestamp().timestamp,
|
2021-09-13 12:54:06 +00:00
|
|
|
timestampDiff: 0'u32,
|
|
|
|
wndSize: bufferSize,
|
2021-10-11 12:16:06 +00:00
|
|
|
seqNr: seqNr,
|
2021-09-13 12:54:06 +00:00
|
|
|
# Initialy we did not receive any acks
|
|
|
|
ackNr: 0'u16
|
|
|
|
)
|
|
|
|
|
2021-12-15 12:35:17 +00:00
|
|
|
Packet(header: h, eack: none[SelectiveAckExtension](), payload: @[])
|
|
|
|
|
|
|
|
proc ackPacket*(
|
|
|
|
seqNr: uint16,
|
|
|
|
sndConnectionId: uint16,
|
|
|
|
ackNr: uint16,
|
|
|
|
bufferSize: uint32,
|
|
|
|
timestampDiff: uint32,
|
|
|
|
acksBitmask: Option[array[4, byte]] = none[array[4, byte]]()
|
2021-12-20 12:14:50 +00:00
|
|
|
): Packet =
|
2021-12-15 12:35:17 +00:00
|
|
|
|
|
|
|
let (extensionByte, extensionData) =
|
|
|
|
if acksBitmask.isSome():
|
|
|
|
(1'u8, some(SelectiveAckExtension(acks: acksBitmask.unsafeGet())))
|
|
|
|
else:
|
|
|
|
(0'u8, none[SelectiveAckExtension]())
|
2021-10-11 12:16:06 +00:00
|
|
|
|
|
|
|
let h = PacketHeaderV1(
|
|
|
|
pType: ST_STATE,
|
|
|
|
version: protocolVersion,
|
2021-12-15 12:35:17 +00:00
|
|
|
extension: extensionByte,
|
2021-10-11 12:16:06 +00:00
|
|
|
connectionId: sndConnectionId,
|
2021-12-10 15:28:00 +00:00
|
|
|
timestamp: getMonoTimestamp().timestamp,
|
2021-12-09 09:52:21 +00:00
|
|
|
timestampDiff: timestampDiff,
|
2021-10-11 12:16:06 +00:00
|
|
|
wndSize: bufferSize,
|
|
|
|
seqNr: seqNr,
|
|
|
|
ackNr: ackNr
|
|
|
|
)
|
2021-12-15 12:35:17 +00:00
|
|
|
|
|
|
|
Packet(header: h, eack: extensionData, payload: @[])
|
2021-10-19 11:36:57 +00:00
|
|
|
|
2021-12-09 09:52:21 +00:00
|
|
|
proc dataPacket*(
|
|
|
|
seqNr: uint16,
|
|
|
|
sndConnectionId: uint16,
|
|
|
|
ackNr: uint16,
|
|
|
|
bufferSize: uint32,
|
|
|
|
payload: seq[byte],
|
|
|
|
timestampDiff: uint32
|
2021-12-20 12:14:50 +00:00
|
|
|
): Packet =
|
2021-10-19 11:36:57 +00:00
|
|
|
let h = PacketHeaderV1(
|
|
|
|
pType: ST_DATA,
|
|
|
|
version: protocolVersion,
|
|
|
|
# data packets always have extension field set to 0
|
|
|
|
extension: 0'u8,
|
|
|
|
connectionId: sndConnectionId,
|
2021-12-10 15:28:00 +00:00
|
|
|
timestamp: getMonoTimestamp().timestamp,
|
2021-12-09 09:52:21 +00:00
|
|
|
timestampDiff: timestampDiff,
|
2021-10-19 11:36:57 +00:00
|
|
|
wndSize: bufferSize,
|
|
|
|
seqNr: seqNr,
|
|
|
|
ackNr: ackNr
|
|
|
|
)
|
2021-12-20 12:14:50 +00:00
|
|
|
|
2021-12-15 12:35:17 +00:00
|
|
|
Packet(header: h, eack: none[SelectiveAckExtension](), payload: payload)
|
2021-11-05 08:41:41 +00:00
|
|
|
|
2021-12-20 12:14:50 +00:00
|
|
|
proc resetPacket*(seqNr: uint16, sndConnectionId: uint16, ackNr: uint16): Packet =
|
2021-11-05 08:41:41 +00:00
|
|
|
let h = PacketHeaderV1(
|
|
|
|
pType: ST_RESET,
|
|
|
|
version: protocolVersion,
|
|
|
|
# data packets always have extension field set to 0
|
|
|
|
extension: 0'u8,
|
|
|
|
connectionId: sndConnectionId,
|
2021-12-10 15:28:00 +00:00
|
|
|
timestamp: getMonoTimestamp().timestamp,
|
2021-12-09 09:52:21 +00:00
|
|
|
# reset packet informs remote about lack of state for given connection, therefore
|
|
|
|
# we do not inform remote about its delay.
|
|
|
|
timestampDiff: 0,
|
2021-11-05 08:41:41 +00:00
|
|
|
wndSize: 0,
|
|
|
|
seqNr: seqNr,
|
|
|
|
ackNr: ackNr
|
|
|
|
)
|
2021-12-20 12:14:50 +00:00
|
|
|
|
2021-12-15 12:35:17 +00:00
|
|
|
Packet(header: h, eack: none[SelectiveAckExtension](), payload: @[])
|
2021-11-09 14:29:59 +00:00
|
|
|
|
2021-12-09 09:52:21 +00:00
|
|
|
proc finPacket*(
|
|
|
|
seqNr: uint16,
|
|
|
|
sndConnectionId: uint16,
|
|
|
|
ackNr: uint16,
|
|
|
|
bufferSize: uint32,
|
|
|
|
timestampDiff: uint32
|
2021-12-20 12:14:50 +00:00
|
|
|
): Packet =
|
2021-11-09 14:29:59 +00:00
|
|
|
let h = PacketHeaderV1(
|
|
|
|
pType: ST_FIN,
|
|
|
|
version: protocolVersion,
|
|
|
|
# fin packets always have extension field set to 0
|
|
|
|
extension: 0'u8,
|
|
|
|
connectionId: sndConnectionId,
|
2021-12-10 15:28:00 +00:00
|
|
|
timestamp: getMonoTimestamp().timestamp,
|
2021-12-09 09:52:21 +00:00
|
|
|
timestampDiff: timestampDiff,
|
2021-11-09 14:29:59 +00:00
|
|
|
wndSize: bufferSize,
|
|
|
|
seqNr: seqNr,
|
|
|
|
ackNr: ackNr
|
|
|
|
)
|
2021-12-20 12:14:50 +00:00
|
|
|
|
2021-12-15 12:35:17 +00:00
|
|
|
Packet(header: h, eack: none[SelectiveAckExtension](), payload: @[])
|