# Copyright (c) 2020-2021 Status Research & Development GmbH # Licensed and distributed under either of # * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT). # * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0). # at your option. This file may not be copied, modified, or distributed except according to those terms. {.push raises: [Defect].} import std/[monotimes], faststreams, chronos, stew/[endians2, results, objects, arrayops], bearssl, ../p2p/discoveryv5/random2 export results const minimalHeaderSize = 20 minimalHeaderSizeWithSelectiveAck = 26 protocolVersion = 1 zeroMoment = Moment.init(0, Nanosecond) acksArrayLength: uint8 = 4 type PacketType* = enum ST_DATA = 0, ST_FIN = 1, ST_STATE = 2, ST_RESET = 3, ST_SYN = 4 MicroSeconds = uint32 PacketHeaderV1 = object pType*: PacketType version*: uint8 extension*: uint8 connectionId*: uint16 timestamp*: MicroSeconds # This is the difference between the local time, at the time the last packet # was received, and the timestamp in this last received packet timestampDiff*: MicroSeconds # The window size is the number of bytes currently in-flight, i.e. sent but not acked # When sending packets, this should be set to the number of bytes left in the socket's receive buffer. wndSize*: uint32 seqNr*: uint16 # sequence number the sender of the packet last received in the other direction ackNr*: uint16 SelectiveAckExtension* = object acks*: array[4, byte] Packet* = object header*: PacketHeaderV1 eack*: Option[SelectiveAckExtension] payload*: seq[uint8] TimeStampInfo* = object moment*: Moment timestamp*: uint32 # Important timing assumptions for utp protocol here: # 1. Microsecond precisions # 2. Monotonicity # Reference lib have a lot of checks to assume that this is monotonic on # every system, and warnings when monotonic clock is not avaialable. proc getMonoTimestamp*(): TimeStampInfo = let currentMoment = Moment.now() # Casting this value from int64 to uin32, my lead to some sudden spikes in # timestamp numeric values i.e it is possible that timestamp can suddenly change # from 4294967296 to for example 10, this may lead to sudden spikes in # calculated delays # uTP implementation is resistant to those spikes are as it keeps history of # few last delays on uses smallest one for calculating ledbat window. # so any outlier huge value will be ignored # let timestamp = uint32((currentMoment - zeroMoment).microseconds()) TimeStampInfo(moment: currentMoment, timestamp: timestamp) # Simple generator, not useful for cryptography proc randUint16*(rng: var BrHmacDrbgContext): uint16 = uint16(rand(rng, int(high(uint16)))) # Simple generator, not useful for cryptography proc randUint32*(rng: var BrHmacDrbgContext): uint32 = uint32(rand(rng, int(high(uint32)))) proc encodeTypeVer(h: PacketHeaderV1): uint8 = var typeVer = 0'u8 let typeOrd = uint8(ord(h.pType)) typeVer = (typeVer and 0xf0) or (h.version and 0xf) typeVer = (typeVer and 0xf) or (typeOrd shl 4) typeVer proc encodeHeaderStream(s: var OutputStream, h: PacketHeaderV1) = try: s.write(encodeTypeVer(h)) s.write(h.extension) s.write(h.connectionId.toBytesBE()) s.write(h.timestamp.toBytesBE()) s.write(h.timestampDiff.toBytesBE()) s.write(h.wndSize.toBytesBE()) s.write(h.seqNr.toBytesBE()) s.write(h.ackNr.toBytesBE()) except IOError as e: # This should not happen in case of in-memory streams raiseAssert e.msg proc encodeExtensionStream(s: var OutputStream, e: SelectiveAckExtension) = try: # writing 0 as there is not further extensions after selectiv ack s.write(0'u8) s.write(acksArrayLength) s.write(e.acks) except IOError as e: # This should not happen in case of in-memory streams raiseAssert e.msg proc encodePacket*(p: Packet): seq[byte] = var s = memoryOutput().s try: encodeHeaderStream(s, p.header) if (p.eack.isSome()): encodeExtensionStream(s, p.eack.unsafeGet()) if (len(p.payload) > 0): s.write(p.payload) s.getOutput() except IOError as e: # This should not happen in case of in-memory streams raiseAssert e.msg proc decodePacket*(bytes: openArray[byte]): Result[Packet, string] = let receivedBytesLength = len(bytes) if receivedBytesLength < minimalHeaderSize: return err("invalid header size") let version = bytes[0] and 0xf if version != protocolVersion: return err("invalid packet version") var kind: PacketType if not checkedEnumAssign(kind, (bytes[0] shr 4)): return err("Invalid message type") let extensionByte = bytes[1] if (not (extensionByte == 0 or extensionByte == 1)): return err("Invalid extension type") let header = PacketHeaderV1( pType: kind, version: version, extension: extensionByte, connection_id: fromBytesBE(uint16, bytes.toOpenArray(2, 3)), timestamp: fromBytesBE(uint32, bytes.toOpenArray(4, 7)), timestamp_diff: fromBytesBE(uint32, bytes.toOpenArray(8, 11)), wnd_size: fromBytesBE(uint32, bytes.toOpenArray(12, 15)), seq_nr: fromBytesBE(uint16, bytes.toOpenArray(16, 17)), ack_nr: fromBytesBE(uint16, bytes.toOpenArray(18, 19)), ) if extensionByte == 0: # packet without any extensions let payload = if (receivedBytesLength == minimalHeaderSize): @[] else: bytes[minimalHeaderSize..^1] return ok(Packet(header: header, eack: none[SelectiveAckExtension](), payload: payload)) else: # packet with selective ack extension if (receivedBytesLength < minimalHeaderSizeWithSelectiveAck): return err("Packet too short for selective ack extension") let nextExtension = bytes[20] let extLength = bytes[21] # As selective ack is only supported extension the byte for nextExtension # must be equal to 0. # As for extLength, specificaiton says that it must be at least 4, and in multiples of 4 # but reference implementation always uses 4 bytes bit mask which makes sense # as 4byte bit mask is able to ack 32 packets in the future which is more than enough if (nextExtension != 0 or extLength != 4): return err("Bad format of selective ack extension") let extension = SelectiveAckExtension( acks: toArray(4, bytes.toOpenArray(22, 25)) ) let payload = if (receivedBytesLength == minimalHeaderSizeWithSelectiveAck): @[] else: bytes[minimalHeaderSizeWithSelectiveAck..^1] return ok(Packet(header: header, eack: some(extension), payload: payload)) proc modifyTimeStampAndAckNr*(packetBytes: var seq[byte], newTimestamp: uint32, newAckNr: uint16) = ## Modifies timestamp and ack nr of already encoded packets. Those fields should be ## filled right before sending, so when re-sending the packet we would like to update ## it without decoding and re-encoding the packet once again doAssert(len(packetBytes) >= minimalHeaderSize) packetBytes[4..7] = toBytesBE(newTimestamp) packetBytes[18..19] = toBytesBE(newAckNr) # connectionId - should be random not already used number # bufferSize - should be pre configured initial buffer size for socket # SYN packets are special, and should have the receive ID in the connid field, # instead of conn_id_send. proc synPacket*(seqNr: uint16, rcvConnectionId: uint16, bufferSize: uint32): Packet = let h = PacketHeaderV1( pType: ST_SYN, version: protocolVersion, extension: 0'u8, connectionId: rcvConnectionId, timestamp: getMonoTimestamp().timestamp, timestampDiff: 0'u32, wndSize: bufferSize, seqNr: seqNr, # Initialy we did not receive any acks ackNr: 0'u16 ) Packet(header: h, eack: none[SelectiveAckExtension](), payload: @[]) proc ackPacket*( seqNr: uint16, sndConnectionId: uint16, ackNr: uint16, bufferSize: uint32, timestampDiff: uint32, acksBitmask: Option[array[4, byte]] = none[array[4, byte]]() ): Packet = let (extensionByte, extensionData) = if acksBitmask.isSome(): (1'u8, some(SelectiveAckExtension(acks: acksBitmask.unsafeGet()))) else: (0'u8, none[SelectiveAckExtension]()) let h = PacketHeaderV1( pType: ST_STATE, version: protocolVersion, extension: extensionByte, connectionId: sndConnectionId, timestamp: getMonoTimestamp().timestamp, timestampDiff: timestampDiff, wndSize: bufferSize, seqNr: seqNr, ackNr: ackNr ) Packet(header: h, eack: extensionData, payload: @[]) proc dataPacket*( seqNr: uint16, sndConnectionId: uint16, ackNr: uint16, bufferSize: uint32, payload: seq[byte], timestampDiff: uint32 ): Packet = let h = PacketHeaderV1( pType: ST_DATA, version: protocolVersion, # data packets always have extension field set to 0 extension: 0'u8, connectionId: sndConnectionId, timestamp: getMonoTimestamp().timestamp, timestampDiff: timestampDiff, wndSize: bufferSize, seqNr: seqNr, ackNr: ackNr ) Packet(header: h, eack: none[SelectiveAckExtension](), payload: payload) proc resetPacket*(seqNr: uint16, sndConnectionId: uint16, ackNr: uint16): Packet = let h = PacketHeaderV1( pType: ST_RESET, version: protocolVersion, # data packets always have extension field set to 0 extension: 0'u8, connectionId: sndConnectionId, timestamp: getMonoTimestamp().timestamp, # reset packet informs remote about lack of state for given connection, therefore # we do not inform remote about its delay. timestampDiff: 0, wndSize: 0, seqNr: seqNr, ackNr: ackNr ) Packet(header: h, eack: none[SelectiveAckExtension](), payload: @[]) proc finPacket*( seqNr: uint16, sndConnectionId: uint16, ackNr: uint16, bufferSize: uint32, timestampDiff: uint32 ): Packet = let h = PacketHeaderV1( pType: ST_FIN, version: protocolVersion, # fin packets always have extension field set to 0 extension: 0'u8, connectionId: sndConnectionId, timestamp: getMonoTimestamp().timestamp, timestampDiff: timestampDiff, wndSize: bufferSize, seqNr: seqNr, ackNr: ackNr ) Packet(header: h, eack: none[SelectiveAckExtension](), payload: @[])