2018-01-26 18:04:13 +00:00
|
|
|
package network
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/sha256"
|
|
|
|
"encoding/binary"
|
|
|
|
"errors"
|
|
|
|
"io"
|
|
|
|
)
|
|
|
|
|
2018-01-26 20:39:34 +00:00
|
|
|
const (
|
|
|
|
// The minimum size of a valid message.
|
|
|
|
minMessageSize = 24
|
|
|
|
)
|
|
|
|
|
|
|
|
// NetMode type that is compatible with netModes below.
|
|
|
|
type NetMode uint32
|
|
|
|
|
|
|
|
// String implements the stringer interface.
|
|
|
|
func (n NetMode) String() string {
|
|
|
|
switch n {
|
|
|
|
case ModeDevNet:
|
|
|
|
return "devnet"
|
|
|
|
case ModeTestNet:
|
|
|
|
return "testnet"
|
|
|
|
case ModeMainNet:
|
|
|
|
return "mainnet"
|
|
|
|
default:
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-26 18:04:13 +00:00
|
|
|
// Values used for the magic field, according to the docs.
|
|
|
|
const (
|
2018-01-26 20:39:34 +00:00
|
|
|
ModeMainNet NetMode = 0x00746e41 // 7630401
|
|
|
|
ModeTestNet = 0x74746e41 // 1953787457
|
|
|
|
ModeDevNet = 56753 // docker privnet
|
2018-01-26 18:04:13 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Message is the complete message send between nodes.
|
|
|
|
//
|
|
|
|
// Size Field DataType Description
|
|
|
|
// ------------------------------------------------------
|
|
|
|
// 4 Magic uint32 Protocol ID
|
|
|
|
// 12 Command char[12] Command
|
|
|
|
// 4 length uint32 Length of payload
|
|
|
|
// 4 Checksum uint32 Checksum
|
|
|
|
// length Payload uint8[length] Content of message
|
|
|
|
type Message struct {
|
2018-01-26 20:39:34 +00:00
|
|
|
Magic NetMode
|
2018-01-26 18:04:13 +00:00
|
|
|
// Command is utf8 code, of which the length is 12 bytes,
|
|
|
|
// the extra part is filled with 0.
|
|
|
|
Command []byte
|
|
|
|
// Length of the payload
|
|
|
|
Length uint32
|
|
|
|
// Checksum is the first 4 bytes of the value that two times SHA256
|
|
|
|
// hash of the payload
|
|
|
|
Checksum uint32
|
|
|
|
// Payload send with the message.
|
|
|
|
Payload []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
type commandType string
|
|
|
|
|
|
|
|
// valid commands used to send between nodes.
|
|
|
|
const (
|
|
|
|
cmdVersion commandType = "version"
|
|
|
|
cmdVerack = "verack"
|
|
|
|
cmdGetAddr = "getaddr"
|
|
|
|
cmdAddr = "addr"
|
|
|
|
cmdGetHeaders = "getheaders"
|
|
|
|
cmdHeaders = "headers"
|
|
|
|
cmdGetBlocks = "getblocks"
|
|
|
|
cmdInv = "inv"
|
|
|
|
cmdGetData = "getdata"
|
|
|
|
cmdBlock = "block"
|
|
|
|
cmdTX = "tx"
|
|
|
|
)
|
|
|
|
|
2018-01-26 20:39:34 +00:00
|
|
|
func newMessage(magic NetMode, cmd commandType, payload []byte) *Message {
|
2018-01-26 18:04:13 +00:00
|
|
|
sum := sumSHA256(sumSHA256(payload))[:4]
|
|
|
|
sumuint32 := binary.LittleEndian.Uint32(sum)
|
|
|
|
|
|
|
|
return &Message{
|
|
|
|
Magic: magic,
|
|
|
|
Command: cmdToByteSlice(cmd),
|
|
|
|
Length: uint32(len(payload)),
|
|
|
|
Checksum: sumuint32,
|
|
|
|
Payload: payload,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Converts the 12 byte command slice to a commandType.
|
|
|
|
func (m *Message) commandType() commandType {
|
|
|
|
cmd := string(bytes.TrimRight(m.Command, "\x00"))
|
|
|
|
switch cmd {
|
|
|
|
case "version":
|
|
|
|
return cmdVersion
|
|
|
|
case "verack":
|
|
|
|
return cmdVerack
|
2018-01-27 07:37:07 +00:00
|
|
|
case "getaddr":
|
|
|
|
return cmdGetAddr
|
2018-01-26 18:04:13 +00:00
|
|
|
case "addr":
|
|
|
|
return cmdAddr
|
|
|
|
case "getheaders":
|
|
|
|
return cmdGetHeaders
|
|
|
|
case "header":
|
|
|
|
return cmdHeaders
|
|
|
|
case "getblocks":
|
|
|
|
return cmdGetBlocks
|
|
|
|
case "inv":
|
|
|
|
return cmdInv
|
|
|
|
case "getdata":
|
|
|
|
return cmdGetData
|
|
|
|
case "block":
|
|
|
|
return cmdBlock
|
|
|
|
case "tx":
|
|
|
|
return cmdTX
|
|
|
|
default:
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// decode a Message from the given reader.
|
|
|
|
func (m *Message) decode(r io.Reader) error {
|
|
|
|
// 24 bytes for the fixed sized fields.
|
2018-01-26 20:39:34 +00:00
|
|
|
buf := make([]byte, minMessageSize)
|
2018-01-26 18:04:13 +00:00
|
|
|
if _, err := r.Read(buf); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-01-26 20:39:34 +00:00
|
|
|
m.Magic = NetMode(binary.LittleEndian.Uint32(buf[0:4]))
|
2018-01-26 18:04:13 +00:00
|
|
|
m.Command = buf[4:16]
|
|
|
|
m.Length = binary.LittleEndian.Uint32(buf[16:20])
|
|
|
|
m.Checksum = binary.LittleEndian.Uint32(buf[20:24])
|
|
|
|
|
|
|
|
payload := make([]byte, m.Length)
|
|
|
|
if _, err := r.Read(payload); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Compare the checksum of the payload.
|
|
|
|
if !compareChecksum(m.Checksum, payload) {
|
|
|
|
return errors.New("checksum mismatch error")
|
|
|
|
}
|
|
|
|
|
|
|
|
m.Payload = payload
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// encode a Message to any given io.Writer.
|
|
|
|
func (m *Message) encode(w io.Writer) error {
|
|
|
|
// 24 bytes for the fixed sized fields + the length of the payload.
|
2018-01-26 20:39:34 +00:00
|
|
|
buf := make([]byte, minMessageSize+m.Length)
|
2018-01-26 18:04:13 +00:00
|
|
|
|
2018-01-26 20:39:34 +00:00
|
|
|
binary.LittleEndian.PutUint32(buf[0:4], uint32(m.Magic))
|
2018-01-26 18:04:13 +00:00
|
|
|
copy(buf[4:16], m.Command)
|
|
|
|
binary.LittleEndian.PutUint32(buf[16:20], m.Length)
|
|
|
|
binary.LittleEndian.PutUint32(buf[20:24], m.Checksum)
|
|
|
|
copy(buf[24:len(buf)], m.Payload)
|
|
|
|
|
|
|
|
_, err := w.Write(buf)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Message) decodePayload() (interface{}, error) {
|
|
|
|
switch m.commandType() {
|
|
|
|
case cmdVersion:
|
|
|
|
v := &Version{}
|
|
|
|
if err := v.decode(m.Payload); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return v, nil
|
|
|
|
}
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Version payload description.
|
|
|
|
//
|
|
|
|
// Size Field DataType Description
|
|
|
|
// ---------------------------------------------------------------------------------------------
|
|
|
|
// 4 Version uint32 Version of protocol, 0 for now
|
|
|
|
// 8 Services uint64 The service provided by the node is currently 1
|
|
|
|
// 4 Timestamp uint32 Current time
|
|
|
|
// 2 Port uint16 Port that the server is listening on, it's 0 if not used.
|
|
|
|
// 4 Nonce uint32 It's used to distinguish the node from public IP
|
|
|
|
// ? UserAgent varstr Client ID
|
|
|
|
// 4 StartHeight uint32 Height of block chain
|
|
|
|
// 1 Relay bool Whether to receive and forward
|
|
|
|
type Version struct {
|
|
|
|
// currently the version of the protocol is 0
|
|
|
|
Version uint32
|
|
|
|
// currently 1
|
|
|
|
Services uint64
|
|
|
|
// timestamp
|
|
|
|
Timestamp uint32
|
|
|
|
// port this server is listening on
|
|
|
|
Port uint16
|
|
|
|
// it's used to distinguish the node from public IP
|
|
|
|
Nonce uint32
|
|
|
|
// client id
|
|
|
|
UserAgent []byte // ?
|
|
|
|
// Height of the block chain
|
|
|
|
StartHeight uint32
|
|
|
|
// Whether to receive and forward
|
|
|
|
Relay bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func newVersionPayload(p uint16, ua string, h uint32, r bool) *Version {
|
|
|
|
return &Version{
|
|
|
|
Version: 0,
|
|
|
|
Services: 1,
|
|
|
|
Timestamp: 12345,
|
|
|
|
Port: p,
|
2018-01-27 07:37:07 +00:00
|
|
|
Nonce: 19110,
|
2018-01-26 18:04:13 +00:00
|
|
|
UserAgent: []byte(ua),
|
|
|
|
StartHeight: 0,
|
|
|
|
Relay: r,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *Version) decode(b []byte) error {
|
|
|
|
// Fixed fields have a total of 27 bytes. We substract this size
|
|
|
|
// with the total buffer length to know the length of the user agent.
|
|
|
|
lenUA := len(b) - 27
|
|
|
|
|
|
|
|
p.Version = binary.LittleEndian.Uint32(b[0:4])
|
|
|
|
p.Services = binary.LittleEndian.Uint64(b[4:12])
|
|
|
|
p.Timestamp = binary.LittleEndian.Uint32(b[12:16])
|
|
|
|
// FIXME: port's byteorder should be big endian according to the docs.
|
|
|
|
// but when connecting to the privnet docker image it's little endian.
|
|
|
|
p.Port = binary.LittleEndian.Uint16(b[16:18])
|
|
|
|
p.Nonce = binary.LittleEndian.Uint32(b[18:22])
|
|
|
|
p.UserAgent = b[22 : 22+lenUA]
|
|
|
|
curlen := 22 + lenUA
|
|
|
|
p.StartHeight = binary.LittleEndian.Uint32(b[curlen : curlen+4])
|
|
|
|
p.Relay = b[len(b)-1 : len(b)][0] == 1
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *Version) encode() ([]byte, error) {
|
|
|
|
// 27 bytes for the fixed size fields + the length of the user agent
|
|
|
|
// which is kinda variable, according to the docs.
|
|
|
|
buf := make([]byte, 27+len(p.UserAgent))
|
|
|
|
|
|
|
|
binary.LittleEndian.PutUint32(buf[0:4], p.Version)
|
|
|
|
binary.LittleEndian.PutUint64(buf[4:12], p.Services)
|
|
|
|
binary.LittleEndian.PutUint32(buf[12:16], p.Timestamp)
|
|
|
|
// FIXME: byte order (little / big)?
|
|
|
|
binary.LittleEndian.PutUint16(buf[16:18], p.Port)
|
|
|
|
binary.LittleEndian.PutUint32(buf[18:22], p.Nonce)
|
|
|
|
copy(buf[22:22+len(p.UserAgent)], p.UserAgent) //
|
|
|
|
curLen := 22 + len(p.UserAgent)
|
|
|
|
binary.LittleEndian.PutUint32(buf[curLen:curLen+4], p.StartHeight)
|
|
|
|
|
|
|
|
// yikes
|
|
|
|
var b []byte
|
|
|
|
if p.Relay {
|
|
|
|
b = []byte{1}
|
|
|
|
} else {
|
|
|
|
b = []byte{0}
|
|
|
|
}
|
|
|
|
|
|
|
|
copy(buf[curLen+4:len(buf)], b)
|
|
|
|
|
|
|
|
return buf, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// convert a command (string) to a byte slice filled with 0 bytes till
|
|
|
|
// size 12.
|
|
|
|
func cmdToByteSlice(cmd commandType) []byte {
|
|
|
|
cmdLen := len(cmd)
|
|
|
|
if cmdLen > 12 {
|
|
|
|
panic("exceeded command max length of size 12")
|
|
|
|
}
|
|
|
|
|
|
|
|
// The command can have max 12 bytes, rest is filled with 0.
|
|
|
|
b := []byte(cmd)
|
|
|
|
for i := 0; i < 12-cmdLen; i++ {
|
|
|
|
b = append(b, byte('\x00'))
|
|
|
|
}
|
|
|
|
|
|
|
|
return b
|
|
|
|
}
|
|
|
|
|
|
|
|
func sumSHA256(b []byte) []byte {
|
|
|
|
h := sha256.New()
|
|
|
|
h.Write(b)
|
|
|
|
return h.Sum(nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
func compareChecksum(have uint32, b []byte) bool {
|
|
|
|
sum := sumSHA256(sumSHA256(b))[:4]
|
|
|
|
want := binary.LittleEndian.Uint32(sum)
|
|
|
|
return have == want
|
|
|
|
}
|