2010-08-29 18:58:15 +02:00
// Copyright (c) 2009-2010 Satoshi Nakamoto
2012-02-07 17:28:30 +01:00
// Copyright (c) 2009-2012 The Bitcoin developers
2010-08-29 18:58:15 +02:00
// Distributed under the MIT/X11 software license, see the accompanying
2012-05-18 16:02:28 +02:00
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
2010-08-29 18:58:15 +02:00
2011-05-14 21:30:15 +02:00
# include "irc.h"
2011-05-14 22:57:34 +02:00
# include "db.h"
2011-05-14 23:20:30 +02:00
# include "net.h"
2011-05-15 23:52:31 +02:00
# include "init.h"
2011-05-16 00:08:35 +02:00
# include "strlcpy.h"
2012-01-04 23:39:45 +01:00
# include "addrman.h"
2012-04-15 22:10:54 +02:00
# include "ui_interface.h"
2010-08-29 18:58:15 +02:00
2011-10-07 17:02:21 +02:00
# ifdef WIN32
2011-07-02 03:59:37 +02:00
# include <string.h>
# endif
2011-03-26 13:01:27 +01:00
# ifdef USE_UPNP
# include <miniupnpc/miniwget.h>
# include <miniupnpc/miniupnpc.h>
# include <miniupnpc/upnpcommands.h>
# include <miniupnpc/upnperrors.h>
# endif
2011-05-15 09:11:04 +02:00
using namespace std ;
using namespace boost ;
2010-08-29 18:58:15 +02:00
static const int MAX_OUTBOUND_CONNECTIONS = 8 ;
void ThreadMessageHandler2 ( void * parg ) ;
void ThreadSocketHandler2 ( void * parg ) ;
void ThreadOpenConnections2 ( void * parg ) ;
2011-12-17 01:48:03 +01:00
void ThreadOpenAddedConnections2 ( void * parg ) ;
2011-03-26 13:01:27 +01:00
# ifdef USE_UPNP
void ThreadMapPort2 ( void * parg ) ;
# endif
2011-11-21 18:25:00 +01:00
void ThreadDNSAddressSeed2 ( void * parg ) ;
2012-05-10 18:44:07 +02:00
bool OpenNetworkConnection ( const CAddress & addrConnect , CSemaphoreGrant * grantOutbound = NULL , const char * strDest = NULL , bool fOneShot = false ) ;
2010-08-29 18:58:15 +02:00
2012-05-13 00:41:24 +02:00
struct LocalServiceInfo {
int nScore ;
int nPort ;
} ;
2010-08-29 18:58:15 +02:00
//
// Global state variables
//
bool fClient = false ;
2012-05-24 19:02:21 +02:00
bool fDiscover = true ;
bool fUseUPnP = false ;
2011-12-21 22:33:19 +01:00
uint64 nLocalServices = ( fClient ? 0 : NODE_NETWORK ) ;
2012-04-10 20:22:04 +02:00
static CCriticalSection cs_mapLocalHost ;
2012-05-13 00:41:24 +02:00
static map < CNetAddr , LocalServiceInfo > mapLocalHost ;
2012-04-10 20:22:04 +02:00
static bool vfReachable [ NET_MAX ] = { } ;
2012-05-04 16:46:22 +02:00
static bool vfLimited [ NET_MAX ] = { } ;
2011-08-11 13:41:01 +02:00
static CNode * pnodeLocalHost = NULL ;
2011-12-21 22:33:19 +01:00
uint64 nLocalHostNonce = 0 ;
2012-02-07 19:42:29 +01:00
array < int , THREAD_MAX > vnThreadsRunning ;
2012-05-11 15:28:59 +02:00
static std : : vector < SOCKET > vhListenSocket ;
2012-01-04 23:39:45 +01:00
CAddrMan addrman ;
2010-08-29 18:58:15 +02:00
vector < CNode * > vNodes ;
CCriticalSection cs_vNodes ;
map < CInv , CDataStream > mapRelay ;
2011-12-21 22:33:19 +01:00
deque < pair < int64 , CInv > > vRelayExpiration ;
2010-08-29 18:58:15 +02:00
CCriticalSection cs_mapRelay ;
2011-12-21 22:33:19 +01:00
map < CInv , int64 > mapAlreadyAskedFor ;
2010-08-29 18:58:15 +02:00
2012-04-24 02:15:00 +02:00
static deque < string > vOneShots ;
CCriticalSection cs_vOneShots ;
2010-08-29 18:58:15 +02:00
2011-12-17 01:48:03 +01:00
set < CNetAddr > setservAddNodeAddresses ;
CCriticalSection cs_setservAddNodeAddresses ;
2012-05-10 18:44:07 +02:00
static CSemaphore * semOutbound = NULL ;
2010-08-29 18:58:15 +02:00
2012-04-24 02:15:00 +02:00
void AddOneShot ( string strDest )
{
LOCK ( cs_vOneShots ) ;
vOneShots . push_back ( strDest ) ;
}
2011-04-21 16:45:08 +02:00
unsigned short GetListenPort ( )
{
return ( unsigned short ) ( GetArg ( " -port " , GetDefaultPort ( ) ) ) ;
}
2010-08-29 18:58:15 +02:00
void CNode : : PushGetBlocks ( CBlockIndex * pindexBegin , uint256 hashEnd )
{
// Filter out duplicate requests
if ( pindexBegin = = pindexLastGetBlocksBegin & & hashEnd = = hashLastGetBlocksEnd )
return ;
pindexLastGetBlocksBegin = pindexBegin ;
hashLastGetBlocksEnd = hashEnd ;
PushMessage ( " getblocks " , CBlockLocator ( pindexBegin ) , hashEnd ) ;
}
2012-02-12 13:45:24 +01:00
// find 'best' local address for a particular peer
2012-05-10 20:35:13 +02:00
bool GetLocal ( CService & addr , const CNetAddr * paddrPeer )
2012-02-12 13:45:24 +01:00
{
2012-05-24 19:02:21 +02:00
if ( fNoListen )
2012-02-12 13:45:24 +01:00
return false ;
2010-08-29 18:58:15 +02:00
2012-05-13 00:41:24 +02:00
int nBestScore = - 1 ;
2012-02-12 13:45:24 +01:00
int nBestReachability = - 1 ;
{
LOCK ( cs_mapLocalHost ) ;
2012-05-13 00:41:24 +02:00
for ( map < CNetAddr , LocalServiceInfo > : : iterator it = mapLocalHost . begin ( ) ; it ! = mapLocalHost . end ( ) ; it + + )
2012-02-12 13:45:24 +01:00
{
2012-05-13 00:41:24 +02:00
int nScore = ( * it ) . second . nScore ;
2012-02-12 13:45:24 +01:00
int nReachability = ( * it ) . first . GetReachabilityFrom ( paddrPeer ) ;
2012-05-13 00:41:24 +02:00
if ( nReachability > nBestReachability | | ( nReachability = = nBestReachability & & nScore > nBestScore ) )
2012-02-12 13:45:24 +01:00
{
2012-05-13 00:41:24 +02:00
addr = CService ( ( * it ) . first , ( * it ) . second . nPort ) ;
2012-02-12 13:45:24 +01:00
nBestReachability = nReachability ;
2012-05-13 00:41:24 +02:00
nBestScore = nScore ;
2012-02-12 13:45:24 +01:00
}
}
}
2012-05-13 00:41:24 +02:00
return nBestScore > = 0 ;
2012-02-12 13:45:24 +01:00
}
2010-08-29 18:58:15 +02:00
2012-02-12 13:45:24 +01:00
// get best local address for a particular peer as a CAddress
CAddress GetLocalAddress ( const CNetAddr * paddrPeer )
{
CAddress ret ( CService ( " 0.0.0.0 " , 0 ) , 0 ) ;
2012-05-10 20:35:13 +02:00
CService addr ;
2012-02-12 13:45:24 +01:00
if ( GetLocal ( addr , paddrPeer ) )
{
2012-05-10 20:35:13 +02:00
ret = CAddress ( addr ) ;
2012-02-12 13:45:24 +01:00
ret . nServices = nLocalServices ;
ret . nTime = GetAdjustedTime ( ) ;
}
return ret ;
}
2010-08-29 18:58:15 +02:00
2012-02-19 19:05:41 +01:00
bool RecvLine ( SOCKET hSocket , string & strLine )
{
strLine = " " ;
loop
{
char c ;
int nBytes = recv ( hSocket , & c , 1 , 0 ) ;
if ( nBytes > 0 )
{
if ( c = = ' \n ' )
continue ;
if ( c = = ' \r ' )
return true ;
strLine + = c ;
if ( strLine . size ( ) > = 9000 )
return true ;
}
else if ( nBytes < = 0 )
{
if ( fShutdown )
return false ;
if ( nBytes < 0 )
{
int nErr = WSAGetLastError ( ) ;
if ( nErr = = WSAEMSGSIZE )
continue ;
if ( nErr = = WSAEWOULDBLOCK | | nErr = = WSAEINTR | | nErr = = WSAEINPROGRESS )
{
Sleep ( 10 ) ;
continue ;
}
}
if ( ! strLine . empty ( ) )
return true ;
if ( nBytes = = 0 )
{
// socket closed
printf ( " socket closed \n " ) ;
return false ;
}
else
{
// socket error
int nErr = WSAGetLastError ( ) ;
printf ( " recv failed: %d \n " , nErr ) ;
return false ;
}
}
}
}
2012-02-12 13:45:24 +01:00
// used when scores of local addresses may have changed
// pushes better local address to peers
void static AdvertizeLocal ( )
{
LOCK ( cs_vNodes ) ;
BOOST_FOREACH ( CNode * pnode , vNodes )
{
if ( pnode - > fSuccessfullyConnected )
{
CAddress addrLocal = GetLocalAddress ( & pnode - > addr ) ;
2012-05-10 20:35:13 +02:00
if ( addrLocal . IsRoutable ( ) & & ( CService ) addrLocal ! = ( CService ) pnode - > addrLocal )
2012-02-12 13:45:24 +01:00
{
pnode - > PushAddress ( addrLocal ) ;
pnode - > addrLocal = addrLocal ;
}
}
}
}
2012-05-01 21:04:07 +02:00
void SetReachable ( enum Network net , bool fFlag )
{
LOCK ( cs_mapLocalHost ) ;
vfReachable [ net ] = fFlag ;
if ( net = = NET_IPV6 & & fFlag )
vfReachable [ NET_IPV4 ] = true ;
}
2012-02-12 13:45:24 +01:00
// learn a new local address
2012-05-10 20:35:13 +02:00
bool AddLocal ( const CService & addr , int nScore )
2012-02-12 13:45:24 +01:00
{
if ( ! addr . IsRoutable ( ) )
return false ;
2012-05-24 19:02:21 +02:00
if ( ! fDiscover & & nScore < LOCAL_MANUAL )
2012-05-13 14:11:53 +02:00
return false ;
2012-05-13 23:50:49 +02:00
if ( IsLimited ( addr ) )
2012-05-13 15:11:51 +02:00
return false ;
2012-02-12 13:45:24 +01:00
printf ( " AddLocal(%s,%i) \n " , addr . ToString ( ) . c_str ( ) , nScore ) ;
{
LOCK ( cs_mapLocalHost ) ;
2012-05-13 00:41:24 +02:00
bool fAlready = mapLocalHost . count ( addr ) > 0 ;
LocalServiceInfo & info = mapLocalHost [ addr ] ;
if ( ! fAlready | | nScore > = info . nScore ) {
info . nScore = nScore ;
info . nPort = addr . GetPort ( ) + ( fAlready ? 1 : 0 ) ;
}
2012-05-01 21:04:07 +02:00
SetReachable ( addr . GetNetwork ( ) ) ;
2012-02-12 13:45:24 +01:00
}
AdvertizeLocal ( ) ;
return true ;
}
2012-05-13 01:26:14 +02:00
bool AddLocal ( const CNetAddr & addr , int nScore )
2012-05-10 20:35:13 +02:00
{
2012-05-13 01:26:14 +02:00
return AddLocal ( CService ( addr , GetListenPort ( ) ) , nScore ) ;
2012-05-10 20:35:13 +02:00
}
2012-05-04 16:46:22 +02:00
/** Make a particular network entirely off-limits (no automatic connects to it) */
void SetLimited ( enum Network net , bool fLimited )
{
2012-05-14 17:15:58 +02:00
if ( net = = NET_UNROUTABLE )
return ;
2012-05-04 16:46:22 +02:00
LOCK ( cs_mapLocalHost ) ;
vfLimited [ net ] = fLimited ;
}
2012-05-14 17:15:58 +02:00
bool IsLimited ( enum Network net )
2012-05-04 16:46:22 +02:00
{
LOCK ( cs_mapLocalHost ) ;
2012-05-14 17:15:58 +02:00
return vfLimited [ net ] ;
}
bool IsLimited ( const CNetAddr & addr )
{
return IsLimited ( addr . GetNetwork ( ) ) ;
2012-05-04 16:46:22 +02:00
}
/** vote for a local address */
2012-05-10 20:35:13 +02:00
bool SeenLocal ( const CService & addr )
2012-02-12 13:45:24 +01:00
{
{
LOCK ( cs_mapLocalHost ) ;
if ( mapLocalHost . count ( addr ) = = 0 )
return false ;
2012-05-13 00:41:24 +02:00
mapLocalHost [ addr ] . nScore + + ;
2012-02-12 13:45:24 +01:00
}
AdvertizeLocal ( ) ;
return true ;
}
2012-05-04 16:46:22 +02:00
/** check whether a given address is potentially local */
2012-05-10 20:35:13 +02:00
bool IsLocal ( const CService & addr )
2012-02-12 13:45:24 +01:00
{
LOCK ( cs_mapLocalHost ) ;
return mapLocalHost . count ( addr ) > 0 ;
}
2010-08-29 18:58:15 +02:00
2012-05-04 16:46:22 +02:00
/** check whether a given address is in a network we can probably connect to */
2012-04-10 20:22:04 +02:00
bool IsReachable ( const CNetAddr & addr )
{
LOCK ( cs_mapLocalHost ) ;
2012-05-04 16:46:22 +02:00
enum Network net = addr . GetNetwork ( ) ;
return vfReachable [ net ] & & ! vfLimited [ net ] ;
2012-04-10 20:22:04 +02:00
}
2010-08-29 18:58:15 +02:00
2012-01-03 23:33:31 +01:00
bool GetMyExternalIP2 ( const CService & addrConnect , const char * pszGet , const char * pszKeyword , CNetAddr & ipRet )
2010-08-29 18:58:15 +02:00
{
SOCKET hSocket ;
if ( ! ConnectSocket ( addrConnect , hSocket ) )
return error ( " GetMyExternalIP() : connection to % s failed " , addrConnect.ToString().c_str()) ;
send ( hSocket , pszGet , strlen ( pszGet ) , MSG_NOSIGNAL ) ;
string strLine ;
while ( RecvLine ( hSocket , strLine ) )
{
2010-11-15 22:37:33 +01:00
if ( strLine . empty ( ) ) // HTTP response is separated from headers by blank line
2010-08-29 18:58:15 +02:00
{
loop
{
if ( ! RecvLine ( hSocket , strLine ) )
{
closesocket ( hSocket ) ;
return false ;
}
2010-11-15 22:37:33 +01:00
if ( pszKeyword = = NULL )
break ;
2012-04-15 22:47:24 +02:00
if ( strLine . find ( pszKeyword ) ! = string : : npos )
2010-08-29 18:58:15 +02:00
{
strLine = strLine . substr ( strLine . find ( pszKeyword ) + strlen ( pszKeyword ) ) ;
break ;
}
}
closesocket ( hSocket ) ;
2012-04-15 22:47:24 +02:00
if ( strLine . find ( " < " ) ! = string : : npos )
2010-08-29 18:58:15 +02:00
strLine = strLine . substr ( 0 , strLine . find ( " < " ) ) ;
strLine = strLine . substr ( strspn ( strLine . c_str ( ) , " \t \n \r " ) ) ;
while ( strLine . size ( ) > 0 & & isspace ( strLine [ strLine . size ( ) - 1 ] ) )
strLine . resize ( strLine . size ( ) - 1 ) ;
2012-01-03 23:33:31 +01:00
CService addr ( strLine , 0 , true ) ;
2010-08-29 18:58:15 +02:00
printf ( " GetMyExternalIP() received [%s] %s \n " , strLine . c_str ( ) , addr . ToString ( ) . c_str ( ) ) ;
2012-01-03 23:33:31 +01:00
if ( ! addr . IsValid ( ) | | ! addr . IsRoutable ( ) )
2010-08-29 18:58:15 +02:00
return false ;
2012-01-03 23:33:31 +01:00
ipRet . SetIP ( addr ) ;
2010-08-29 18:58:15 +02:00
return true ;
}
}
closesocket ( hSocket ) ;
return error ( " GetMyExternalIP() : connection closed " ) ;
}
2010-12-15 23:43:51 +01:00
// We now get our external IP from the IRC server first and only use this as a backup
2012-01-03 23:33:31 +01:00
bool GetMyExternalIP ( CNetAddr & ipRet )
2010-08-29 18:58:15 +02:00
{
2012-01-17 02:12:35 +01:00
CService addrConnect ;
2010-08-29 18:58:15 +02:00
const char * pszGet ;
const char * pszKeyword ;
for ( int nLookup = 0 ; nLookup < = 1 ; nLookup + + )
for ( int nHost = 1 ; nHost < = 2 ; nHost + + )
{
2010-12-15 23:43:51 +01:00
// We should be phasing out our use of sites like these. If we need
// replacements, we should ask for volunteers to put this simple
// php file on their webserver that prints the client IP:
// <?php echo $_SERVER["REMOTE_ADDR"]; ?>
2010-08-29 18:58:15 +02:00
if ( nHost = = 1 )
{
2012-01-17 02:12:35 +01:00
addrConnect = CService ( " 91.198.22.70 " , 80 ) ; // checkip.dyndns.org
2010-08-29 18:58:15 +02:00
if ( nLookup = = 1 )
{
2012-01-03 23:33:31 +01:00
CService addrIP ( " checkip.dyndns.org " , 80 , true ) ;
2011-05-02 15:34:42 +02:00
if ( addrIP . IsValid ( ) )
addrConnect = addrIP ;
2010-08-29 18:58:15 +02:00
}
2010-11-19 21:22:46 +01:00
pszGet = " GET / HTTP/1.1 \r \n "
" Host: checkip.dyndns.org \r \n "
" User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1) \r \n "
2010-08-29 18:58:15 +02:00
" Connection: close \r \n "
" \r \n " ;
2010-11-19 21:22:46 +01:00
pszKeyword = " Address: " ;
2010-08-29 18:58:15 +02:00
}
else if ( nHost = = 2 )
{
2012-01-17 02:12:35 +01:00
addrConnect = CService ( " 74.208.43.192 " , 80 ) ; // www.showmyip.com
2010-08-29 18:58:15 +02:00
if ( nLookup = = 1 )
{
2012-01-03 23:33:31 +01:00
CService addrIP ( " www.showmyip.com " , 80 , true ) ;
2011-05-02 15:34:42 +02:00
if ( addrIP . IsValid ( ) )
addrConnect = addrIP ;
2010-08-29 18:58:15 +02:00
}
2010-11-19 21:22:46 +01:00
pszGet = " GET /simple/ HTTP/1.1 \r \n "
" Host: www.showmyip.com \r \n "
2010-08-29 18:58:15 +02:00
" User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1) \r \n "
" Connection: close \r \n "
" \r \n " ;
2010-11-19 21:22:46 +01:00
pszKeyword = NULL ; // Returns just IP address
2010-08-29 18:58:15 +02:00
}
if ( GetMyExternalIP2 ( addrConnect , pszGet , pszKeyword , ipRet ) )
return true ;
}
return false ;
}
2010-12-15 23:43:51 +01:00
void ThreadGetMyExternalIP ( void * parg )
{
2012-06-24 17:03:57 +02:00
// Make this thread recognisable as the message handling thread
RenameThread ( " bitcoin-ext-ip " ) ;
2012-02-12 13:45:24 +01:00
CNetAddr addrLocalHost ;
2012-01-03 23:33:31 +01:00
if ( GetMyExternalIP ( addrLocalHost ) )
2010-12-15 23:43:51 +01:00
{
printf ( " GetMyExternalIP() returned %s \n " , addrLocalHost . ToStringIP ( ) . c_str ( ) ) ;
2012-02-12 13:45:24 +01:00
AddLocal ( addrLocalHost , LOCAL_HTTP ) ;
2010-12-15 23:43:51 +01:00
}
}
2010-08-29 18:58:15 +02:00
2012-01-03 23:33:31 +01:00
void AddressCurrentlyConnected ( const CService & addr )
2010-08-29 18:58:15 +02:00
{
2012-01-04 23:39:45 +01:00
addrman . Connected ( addr ) ;
2010-08-29 18:58:15 +02:00
}
2012-01-03 23:33:31 +01:00
CNode * FindNode ( const CNetAddr & ip )
2010-08-29 18:58:15 +02:00
{
{
2012-04-06 18:39:12 +02:00
LOCK ( cs_vNodes ) ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodes )
2012-01-03 23:33:31 +01:00
if ( ( CNetAddr ) pnode - > addr = = ip )
2010-08-29 18:58:15 +02:00
return ( pnode ) ;
}
return NULL ;
}
2012-04-19 17:38:03 +02:00
CNode * FindNode ( std : : string addrName )
{
LOCK ( cs_vNodes ) ;
BOOST_FOREACH ( CNode * pnode , vNodes )
if ( pnode - > addrName = = addrName )
return ( pnode ) ;
return NULL ;
}
2012-01-03 23:33:31 +01:00
CNode * FindNode ( const CService & addr )
2010-08-29 18:58:15 +02:00
{
{
2012-04-06 18:39:12 +02:00
LOCK ( cs_vNodes ) ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodes )
2012-01-03 23:33:31 +01:00
if ( ( CService ) pnode - > addr = = addr )
2010-08-29 18:58:15 +02:00
return ( pnode ) ;
}
return NULL ;
}
2012-04-19 17:38:03 +02:00
CNode * ConnectNode ( CAddress addrConnect , const char * pszDest , int64 nTimeout )
2010-08-29 18:58:15 +02:00
{
2012-04-24 02:15:00 +02:00
if ( pszDest = = NULL ) {
2012-02-12 13:45:24 +01:00
if ( IsLocal ( addrConnect ) )
2012-04-19 17:38:03 +02:00
return NULL ;
2010-08-29 18:58:15 +02:00
2012-04-19 17:38:03 +02:00
// Look for an existing connection
CNode * pnode = FindNode ( ( CService ) addrConnect ) ;
if ( pnode )
{
if ( nTimeout ! = 0 )
pnode - > AddRef ( nTimeout ) ;
else
pnode - > AddRef ( ) ;
return pnode ;
}
2010-08-29 18:58:15 +02:00
}
2012-04-19 17:38:03 +02:00
2010-08-29 18:58:15 +02:00
/// debug print
2012-01-04 23:39:45 +01:00
printf ( " trying connection %s lastseen=%.1fhrs \n " ,
2012-04-19 17:38:03 +02:00
pszDest ? pszDest : addrConnect . ToString ( ) . c_str ( ) ,
2012-05-17 22:58:05 +02:00
pszDest ? 0 : ( double ) ( GetAdjustedTime ( ) - addrConnect . nTime ) / 3600.0 ) ;
2010-08-29 18:58:15 +02:00
// Connect
SOCKET hSocket ;
2012-04-19 17:38:03 +02:00
if ( pszDest ? ConnectSocketByName ( addrConnect , hSocket , pszDest , GetDefaultPort ( ) ) : ConnectSocket ( addrConnect , hSocket ) )
2010-08-29 18:58:15 +02:00
{
2012-04-19 17:38:03 +02:00
addrman . Attempt ( addrConnect ) ;
2010-08-29 18:58:15 +02:00
/// debug print
2012-04-19 17:38:03 +02:00
printf ( " connected %s \n " , pszDest ? pszDest : addrConnect . ToString ( ) . c_str ( ) ) ;
2010-08-29 18:58:15 +02:00
// Set to nonblocking
2011-10-07 17:02:21 +02:00
# ifdef WIN32
2010-08-29 18:58:15 +02:00
u_long nOne = 1 ;
if ( ioctlsocket ( hSocket , FIONBIO , & nOne ) = = SOCKET_ERROR )
printf ( " ConnectSocket() : ioctlsocket nonblocking setting failed, error %d \n " , WSAGetLastError ( ) ) ;
# else
if ( fcntl ( hSocket , F_SETFL , O_NONBLOCK ) = = SOCKET_ERROR )
printf ( " ConnectSocket() : fcntl nonblocking setting failed, error %d \n " , errno ) ;
# endif
// Add node
2012-04-19 17:38:03 +02:00
CNode * pnode = new CNode ( hSocket , addrConnect , pszDest ? pszDest : " " , false ) ;
2010-08-29 18:58:15 +02:00
if ( nTimeout ! = 0 )
pnode - > AddRef ( nTimeout ) ;
else
pnode - > AddRef ( ) ;
2012-04-19 17:38:03 +02:00
2012-04-06 18:39:12 +02:00
{
LOCK ( cs_vNodes ) ;
2010-08-29 18:58:15 +02:00
vNodes . push_back ( pnode ) ;
2012-04-06 18:39:12 +02:00
}
2010-08-29 18:58:15 +02:00
pnode - > nTimeConnected = GetTime ( ) ;
return pnode ;
}
else
{
return NULL ;
}
}
void CNode : : CloseSocketDisconnect ( )
{
fDisconnect = true ;
if ( hSocket ! = INVALID_SOCKET )
{
2012-04-19 17:38:03 +02:00
printf ( " disconnecting node %s \n " , addrName . c_str ( ) ) ;
2010-08-29 18:58:15 +02:00
closesocket ( hSocket ) ;
hSocket = INVALID_SOCKET ;
2012-03-18 04:03:24 +01:00
vRecv . clear ( ) ;
2010-08-29 18:58:15 +02:00
}
}
void CNode : : Cleanup ( )
{
}
2011-12-16 22:26:14 +01:00
void CNode : : PushVersion ( )
{
/// when NTP implemented, change to just nTime = GetAdjustedTime()
2011-12-21 22:33:19 +01:00
int64 nTime = ( fInbound ? GetAdjustedTime ( ) : GetTime ( ) ) ;
2012-05-24 19:02:21 +02:00
CAddress addrYou = ( addr . IsRoutable ( ) & & ! IsProxy ( addr ) ? addr : CAddress ( CService ( " 0.0.0.0 " , 0 ) ) ) ;
2012-02-12 13:45:24 +01:00
CAddress addrMe = GetLocalAddress ( & addr ) ;
2011-12-16 22:26:14 +01:00
RAND_bytes ( ( unsigned char * ) & nLocalHostNonce , sizeof ( nLocalHostNonce ) ) ;
2012-05-01 22:03:51 +02:00
printf ( " send version message: version %d, blocks=%d, us=%s, them=%s, peer=%s \n " , PROTOCOL_VERSION , nBestHeight , addrMe . ToString ( ) . c_str ( ) , addrYou . ToString ( ) . c_str ( ) , addr . ToString ( ) . c_str ( ) ) ;
2011-12-16 22:26:14 +01:00
PushMessage ( " version " , PROTOCOL_VERSION , nLocalServices , nTime , addrYou , addrMe ,
nLocalHostNonce , FormatSubVersion ( CLIENT_NAME , CLIENT_VERSION , std : : vector < string > ( ) ) , nBestHeight ) ;
}
2012-01-03 23:33:31 +01:00
std : : map < CNetAddr , int64 > CNode : : setBanned ;
2011-09-06 22:09:04 +02:00
CCriticalSection CNode : : cs_setBanned ;
void CNode : : ClearBanned ( )
{
setBanned . clear ( ) ;
}
2012-01-03 23:33:31 +01:00
bool CNode : : IsBanned ( CNetAddr ip )
2011-09-06 22:09:04 +02:00
{
bool fResult = false ;
{
2012-04-06 18:39:12 +02:00
LOCK ( cs_setBanned ) ;
2012-01-03 23:33:31 +01:00
std : : map < CNetAddr , int64 > : : iterator i = setBanned . find ( ip ) ;
2011-09-06 22:09:04 +02:00
if ( i ! = setBanned . end ( ) )
{
2011-12-21 22:33:19 +01:00
int64 t = ( * i ) . second ;
2011-09-06 22:09:04 +02:00
if ( GetTime ( ) < t )
fResult = true ;
}
}
return fResult ;
}
bool CNode : : Misbehaving ( int howmuch )
{
if ( addr . IsLocal ( ) )
{
2012-04-19 17:38:03 +02:00
printf ( " Warning: local node %s misbehaving \n " , addrName . c_str ( ) ) ;
2011-09-06 22:09:04 +02:00
return false ;
}
nMisbehavior + = howmuch ;
if ( nMisbehavior > = GetArg ( " -banscore " , 100 ) )
{
2011-12-21 22:33:19 +01:00
int64 banTime = GetTime ( ) + GetArg ( " -bantime " , 60 * 60 * 24 ) ; // Default 24-hour ban
2012-04-06 18:39:12 +02:00
{
LOCK ( cs_setBanned ) ;
2012-01-03 23:33:31 +01:00
if ( setBanned [ addr ] < banTime )
setBanned [ addr ] = banTime ;
2012-04-06 18:39:12 +02:00
}
2011-09-06 22:09:04 +02:00
CloseSocketDisconnect ( ) ;
2012-04-19 17:38:03 +02:00
printf ( " Disconnected %s for misbehavior (score=%d) \n " , addrName . c_str ( ) , nMisbehavior ) ;
2011-09-06 22:09:04 +02:00
return true ;
}
return false ;
}
2012-06-29 23:24:53 +02:00
# undef X
# define X(name) stats.name = name
void CNode : : copyStats ( CNodeStats & stats )
{
X ( nServices ) ;
X ( nLastSend ) ;
X ( nLastRecv ) ;
X ( nTimeConnected ) ;
X ( addrName ) ;
X ( nVersion ) ;
X ( strSubVer ) ;
X ( fInbound ) ;
X ( nReleaseTime ) ;
X ( nStartingHeight ) ;
X ( nMisbehavior ) ;
}
# undef X
2010-08-29 18:58:15 +02:00
void ThreadSocketHandler ( void * parg )
{
IMPLEMENT_RANDOMIZE_STACK ( ThreadSocketHandler ( parg ) ) ;
2012-06-24 17:03:57 +02:00
// Make this thread recognisable as the networking thread
2012-06-30 17:14:28 +02:00
RenameThread ( " bitcoin-net " ) ;
2012-06-24 17:03:57 +02:00
2010-08-29 18:58:15 +02:00
try
{
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_SOCKETHANDLER ] + + ;
2010-08-29 18:58:15 +02:00
ThreadSocketHandler2 ( parg ) ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_SOCKETHANDLER ] - - ;
2010-08-29 18:58:15 +02:00
}
catch ( std : : exception & e ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_SOCKETHANDLER ] - - ;
2010-08-29 18:58:15 +02:00
PrintException ( & e , " ThreadSocketHandler() " ) ;
} catch ( . . . ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_SOCKETHANDLER ] - - ;
2010-08-29 18:58:15 +02:00
throw ; // support pthread_cancel()
}
2012-05-17 19:52:38 +02:00
printf ( " ThreadSocketHandler exited \n " ) ;
2010-08-29 18:58:15 +02:00
}
void ThreadSocketHandler2 ( void * parg )
{
printf ( " ThreadSocketHandler started \n " ) ;
list < CNode * > vNodesDisconnected ;
2012-04-22 20:01:25 +02:00
unsigned int nPrevNodeCount = 0 ;
2010-08-29 18:58:15 +02:00
loop
{
//
// Disconnect nodes
//
{
2012-04-06 18:39:12 +02:00
LOCK ( cs_vNodes ) ;
2010-08-29 18:58:15 +02:00
// Disconnect unused nodes
vector < CNode * > vNodesCopy = vNodes ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodesCopy )
2010-08-29 18:58:15 +02:00
{
if ( pnode - > fDisconnect | |
( pnode - > GetRefCount ( ) < = 0 & & pnode - > vRecv . empty ( ) & & pnode - > vSend . empty ( ) ) )
{
// remove from vNodes
vNodes . erase ( remove ( vNodes . begin ( ) , vNodes . end ( ) , pnode ) , vNodes . end ( ) ) ;
2012-05-10 18:44:07 +02:00
// release outbound grant (if any)
pnode - > grantOutbound . Release ( ) ;
2012-04-04 16:01:57 +02:00
2010-08-29 18:58:15 +02:00
// close socket and cleanup
pnode - > CloseSocketDisconnect ( ) ;
pnode - > Cleanup ( ) ;
// hold in disconnected pool until all refs are released
pnode - > nReleaseTime = max ( pnode - > nReleaseTime , GetTime ( ) + 15 * 60 ) ;
if ( pnode - > fNetworkNode | | pnode - > fInbound )
pnode - > Release ( ) ;
vNodesDisconnected . push_back ( pnode ) ;
}
}
// Delete disconnected nodes
list < CNode * > vNodesDisconnectedCopy = vNodesDisconnected ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodesDisconnectedCopy )
2010-08-29 18:58:15 +02:00
{
// wait until threads are done using it
if ( pnode - > GetRefCount ( ) < = 0 )
{
bool fDelete = false ;
2012-04-06 18:39:12 +02:00
{
TRY_LOCK ( pnode - > cs_vSend , lockSend ) ;
if ( lockSend )
{
TRY_LOCK ( pnode - > cs_vRecv , lockRecv ) ;
if ( lockRecv )
{
TRY_LOCK ( pnode - > cs_mapRequests , lockReq ) ;
if ( lockReq )
{
TRY_LOCK ( pnode - > cs_inventory , lockInv ) ;
if ( lockInv )
fDelete = true ;
}
}
}
}
2010-08-29 18:58:15 +02:00
if ( fDelete )
{
vNodesDisconnected . remove ( pnode ) ;
delete pnode ;
}
}
}
}
if ( vNodes . size ( ) ! = nPrevNodeCount )
{
nPrevNodeCount = vNodes . size ( ) ;
2012-05-06 19:40:58 +02:00
uiInterface . NotifyNumConnectionsChanged ( vNodes . size ( ) ) ;
2010-08-29 18:58:15 +02:00
}
//
// Find which sockets have data to receive
//
struct timeval timeout ;
timeout . tv_sec = 0 ;
timeout . tv_usec = 50000 ; // frequency to poll pnode->vSend
fd_set fdsetRecv ;
fd_set fdsetSend ;
fd_set fdsetError ;
FD_ZERO ( & fdsetRecv ) ;
FD_ZERO ( & fdsetSend ) ;
FD_ZERO ( & fdsetError ) ;
SOCKET hSocketMax = 0 ;
2010-12-22 14:08:00 +01:00
2012-05-11 15:28:59 +02:00
BOOST_FOREACH ( SOCKET hListenSocket , vhListenSocket ) {
2010-12-22 14:08:00 +01:00
FD_SET ( hListenSocket , & fdsetRecv ) ;
2012-05-11 15:28:59 +02:00
hSocketMax = max ( hSocketMax , hListenSocket ) ;
}
2010-08-29 18:58:15 +02:00
{
2012-04-06 18:39:12 +02:00
LOCK ( cs_vNodes ) ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodes )
2010-08-29 18:58:15 +02:00
{
2011-06-24 20:09:24 +02:00
if ( pnode - > hSocket = = INVALID_SOCKET )
2010-08-29 18:58:15 +02:00
continue ;
FD_SET ( pnode - > hSocket , & fdsetRecv ) ;
FD_SET ( pnode - > hSocket , & fdsetError ) ;
hSocketMax = max ( hSocketMax , pnode - > hSocket ) ;
2012-04-06 18:39:12 +02:00
{
TRY_LOCK ( pnode - > cs_vSend , lockSend ) ;
if ( lockSend & & ! pnode - > vSend . empty ( ) )
2010-08-29 18:58:15 +02:00
FD_SET ( pnode - > hSocket , & fdsetSend ) ;
2012-04-06 18:39:12 +02:00
}
2010-08-29 18:58:15 +02:00
}
}
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_SOCKETHANDLER ] - - ;
2010-08-29 18:58:15 +02:00
int nSelect = select ( hSocketMax + 1 , & fdsetRecv , & fdsetSend , & fdsetError , & timeout ) ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_SOCKETHANDLER ] + + ;
2010-08-29 18:58:15 +02:00
if ( fShutdown )
return ;
if ( nSelect = = SOCKET_ERROR )
{
int nErr = WSAGetLastError ( ) ;
2012-05-08 23:02:48 +02:00
if ( hSocketMax ! = INVALID_SOCKET )
2011-06-07 00:48:37 +02:00
{
printf ( " socket select error %d \n " , nErr ) ;
2012-04-15 22:52:09 +02:00
for ( unsigned int i = 0 ; i < = hSocketMax ; i + + )
2011-06-07 00:48:37 +02:00
FD_SET ( i , & fdsetRecv ) ;
}
2010-08-29 18:58:15 +02:00
FD_ZERO ( & fdsetSend ) ;
FD_ZERO ( & fdsetError ) ;
Sleep ( timeout . tv_usec / 1000 ) ;
}
//
// Accept new connections
//
2012-05-11 15:28:59 +02:00
BOOST_FOREACH ( SOCKET hListenSocket , vhListenSocket )
2010-12-22 14:08:00 +01:00
if ( hListenSocket ! = INVALID_SOCKET & & FD_ISSET ( hListenSocket , & fdsetRecv ) )
2010-08-29 18:58:15 +02:00
{
2012-03-31 17:58:25 +02:00
# ifdef USE_IPV6
2012-05-11 15:28:59 +02:00
struct sockaddr_storage sockaddr ;
2012-03-31 17:58:25 +02:00
# else
2012-05-11 15:28:59 +02:00
struct sockaddr sockaddr ;
2012-03-31 17:58:25 +02:00
# endif
2010-08-29 18:58:15 +02:00
socklen_t len = sizeof ( sockaddr ) ;
SOCKET hSocket = accept ( hListenSocket , ( struct sockaddr * ) & sockaddr , & len ) ;
2012-02-15 20:56:29 +01:00
CAddress addr ;
2011-01-23 09:08:09 +01:00
int nInbound = 0 ;
2012-02-15 20:56:29 +01:00
if ( hSocket ! = INVALID_SOCKET )
2012-05-11 15:28:59 +02:00
if ( ! addr . SetSockAddr ( ( const struct sockaddr * ) & sockaddr ) )
printf ( " warning: unknown socket family \n " ) ;
2012-02-15 20:56:29 +01:00
2012-04-06 18:39:12 +02:00
{
LOCK ( cs_vNodes ) ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodes )
2012-04-06 18:39:12 +02:00
if ( pnode - > fInbound )
nInbound + + ;
}
2012-02-15 20:56:29 +01:00
2010-08-29 18:58:15 +02:00
if ( hSocket = = INVALID_SOCKET )
{
if ( WSAGetLastError ( ) ! = WSAEWOULDBLOCK )
printf ( " socket error accept failed: %d \n " , WSAGetLastError ( ) ) ;
}
2011-02-16 20:43:04 +01:00
else if ( nInbound > = GetArg ( " -maxconnections " , 125 ) - MAX_OUTBOUND_CONNECTIONS )
2010-08-29 18:58:15 +02:00
{
2012-04-06 18:39:12 +02:00
{
LOCK ( cs_setservAddNodeAddresses ) ;
2011-12-17 01:48:03 +01:00
if ( ! setservAddNodeAddresses . count ( addr ) )
closesocket ( hSocket ) ;
2012-04-06 18:39:12 +02:00
}
2010-08-29 18:58:15 +02:00
}
2012-01-03 23:33:31 +01:00
else if ( CNode : : IsBanned ( addr ) )
2011-09-06 22:09:04 +02:00
{
2012-03-05 19:33:24 +01:00
printf ( " connection from %s dropped (banned) \n " , addr . ToString ( ) . c_str ( ) ) ;
2011-09-06 22:09:04 +02:00
closesocket ( hSocket ) ;
}
2010-08-29 18:58:15 +02:00
else
{
2011-05-02 15:34:42 +02:00
printf ( " accepted connection %s \n " , addr . ToString ( ) . c_str ( ) ) ;
2012-04-19 17:38:03 +02:00
CNode * pnode = new CNode ( hSocket , addr , " " , true ) ;
2010-08-29 18:58:15 +02:00
pnode - > AddRef ( ) ;
2012-04-06 18:39:12 +02:00
{
LOCK ( cs_vNodes ) ;
2010-08-29 18:58:15 +02:00
vNodes . push_back ( pnode ) ;
2012-04-06 18:39:12 +02:00
}
2010-08-29 18:58:15 +02:00
}
}
//
// Service each socket
//
vector < CNode * > vNodesCopy ;
{
2012-04-06 18:39:12 +02:00
LOCK ( cs_vNodes ) ;
2010-08-29 18:58:15 +02:00
vNodesCopy = vNodes ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodesCopy )
2010-08-29 18:58:15 +02:00
pnode - > AddRef ( ) ;
}
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodesCopy )
2010-08-29 18:58:15 +02:00
{
if ( fShutdown )
return ;
//
// Receive
//
if ( pnode - > hSocket = = INVALID_SOCKET )
continue ;
if ( FD_ISSET ( pnode - > hSocket , & fdsetRecv ) | | FD_ISSET ( pnode - > hSocket , & fdsetError ) )
{
2012-04-06 18:39:12 +02:00
TRY_LOCK ( pnode - > cs_vRecv , lockRecv ) ;
if ( lockRecv )
2010-08-29 18:58:15 +02:00
{
CDataStream & vRecv = pnode - > vRecv ;
unsigned int nPos = vRecv . size ( ) ;
2011-06-30 23:29:44 +02:00
if ( nPos > ReceiveBufferSize ( ) ) {
2010-08-29 18:58:15 +02:00
if ( ! pnode - > fDisconnect )
2011-02-16 19:18:11 +01:00
printf ( " socket recv flood control disconnect (%d bytes) \n " , vRecv . size ( ) ) ;
2010-08-29 18:58:15 +02:00
pnode - > CloseSocketDisconnect ( ) ;
}
2011-02-16 19:18:11 +01:00
else {
// typical socket buffer is 8K-64K
char pchBuf [ 0x10000 ] ;
int nBytes = recv ( pnode - > hSocket , pchBuf , sizeof ( pchBuf ) , MSG_DONTWAIT ) ;
if ( nBytes > 0 )
2010-08-29 18:58:15 +02:00
{
2011-02-16 19:18:11 +01:00
vRecv . resize ( nPos + nBytes ) ;
memcpy ( & vRecv [ nPos ] , pchBuf , nBytes ) ;
pnode - > nLastRecv = GetTime ( ) ;
}
else if ( nBytes = = 0 )
{
// socket closed gracefully
2010-08-29 18:58:15 +02:00
if ( ! pnode - > fDisconnect )
2011-02-16 19:18:11 +01:00
printf ( " socket closed \n " ) ;
2010-08-29 18:58:15 +02:00
pnode - > CloseSocketDisconnect ( ) ;
}
2011-02-16 19:18:11 +01:00
else if ( nBytes < 0 )
{
// error
int nErr = WSAGetLastError ( ) ;
if ( nErr ! = WSAEWOULDBLOCK & & nErr ! = WSAEMSGSIZE & & nErr ! = WSAEINTR & & nErr ! = WSAEINPROGRESS )
{
if ( ! pnode - > fDisconnect )
printf ( " socket recv error %d \n " , nErr ) ;
pnode - > CloseSocketDisconnect ( ) ;
}
}
2010-08-29 18:58:15 +02:00
}
}
}
//
// Send
//
if ( pnode - > hSocket = = INVALID_SOCKET )
continue ;
if ( FD_ISSET ( pnode - > hSocket , & fdsetSend ) )
{
2012-04-06 18:39:12 +02:00
TRY_LOCK ( pnode - > cs_vSend , lockSend ) ;
if ( lockSend )
2010-08-29 18:58:15 +02:00
{
CDataStream & vSend = pnode - > vSend ;
if ( ! vSend . empty ( ) )
{
int nBytes = send ( pnode - > hSocket , & vSend [ 0 ] , vSend . size ( ) , MSG_NOSIGNAL | MSG_DONTWAIT ) ;
if ( nBytes > 0 )
{
vSend . erase ( vSend . begin ( ) , vSend . begin ( ) + nBytes ) ;
pnode - > nLastSend = GetTime ( ) ;
}
else if ( nBytes < 0 )
{
// error
int nErr = WSAGetLastError ( ) ;
if ( nErr ! = WSAEWOULDBLOCK & & nErr ! = WSAEMSGSIZE & & nErr ! = WSAEINTR & & nErr ! = WSAEINPROGRESS )
{
printf ( " socket send error %d \n " , nErr ) ;
pnode - > CloseSocketDisconnect ( ) ;
}
}
}
}
}
//
// Inactivity checking
//
if ( pnode - > vSend . empty ( ) )
pnode - > nLastSendEmpty = GetTime ( ) ;
if ( GetTime ( ) - pnode - > nTimeConnected > 60 )
{
if ( pnode - > nLastRecv = = 0 | | pnode - > nLastSend = = 0 )
{
printf ( " socket no message in first 60 seconds, %d %d \n " , pnode - > nLastRecv ! = 0 , pnode - > nLastSend ! = 0 ) ;
pnode - > fDisconnect = true ;
}
else if ( GetTime ( ) - pnode - > nLastSend > 90 * 60 & & GetTime ( ) - pnode - > nLastSendEmpty > 90 * 60 )
{
printf ( " socket not sending \n " ) ;
pnode - > fDisconnect = true ;
}
else if ( GetTime ( ) - pnode - > nLastRecv > 90 * 60 )
{
printf ( " socket inactivity timeout \n " ) ;
pnode - > fDisconnect = true ;
}
}
}
{
2012-04-06 18:39:12 +02:00
LOCK ( cs_vNodes ) ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodesCopy )
2010-08-29 18:58:15 +02:00
pnode - > Release ( ) ;
}
Sleep ( 10 ) ;
}
}
2011-03-26 13:01:27 +01:00
# ifdef USE_UPNP
void ThreadMapPort ( void * parg )
{
IMPLEMENT_RANDOMIZE_STACK ( ThreadMapPort ( parg ) ) ;
2012-06-24 17:03:57 +02:00
// Make this thread recognisable as the UPnP thread
2012-06-30 17:14:28 +02:00
RenameThread ( " bitcoin-UPnP " ) ;
2012-06-24 17:03:57 +02:00
2011-03-26 13:01:27 +01:00
try
{
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_UPNP ] + + ;
2011-03-26 13:01:27 +01:00
ThreadMapPort2 ( parg ) ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_UPNP ] - - ;
2011-03-26 13:01:27 +01:00
}
catch ( std : : exception & e ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_UPNP ] - - ;
2011-03-26 13:01:27 +01:00
PrintException ( & e , " ThreadMapPort() " ) ;
} catch ( . . . ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_UPNP ] - - ;
2011-03-26 13:01:27 +01:00
PrintException ( NULL , " ThreadMapPort() " ) ;
}
2012-05-17 19:52:38 +02:00
printf ( " ThreadMapPort exited \n " ) ;
2011-03-26 13:01:27 +01:00
}
void ThreadMapPort2 ( void * parg )
{
printf ( " ThreadMapPort started \n " ) ;
char port [ 6 ] ;
2011-04-21 16:45:08 +02:00
sprintf ( port , " %d " , GetListenPort ( ) ) ;
2011-03-26 13:01:27 +01:00
const char * multicastif = 0 ;
const char * minissdpdpath = 0 ;
struct UPNPDev * devlist = 0 ;
char lanaddr [ 64 ] ;
2011-12-10 17:52:50 +01:00
# ifndef UPNPDISCOVER_SUCCESS
/* miniupnpc 1.5 */
devlist = upnpDiscover ( 2000 , multicastif , minissdpdpath , 0 ) ;
# else
/* miniupnpc 1.6 */
int error = 0 ;
2011-08-12 00:20:07 +02:00
devlist = upnpDiscover ( 2000 , multicastif , minissdpdpath , 0 , 0 , & error ) ;
2011-12-10 17:52:50 +01:00
# endif
2011-03-26 13:01:27 +01:00
struct UPNPUrls urls ;
struct IGDdatas data ;
int r ;
2011-04-16 20:35:45 +02:00
r = UPNP_GetValidIGD ( devlist , & urls , & data , lanaddr , sizeof ( lanaddr ) ) ;
if ( r = = 1 )
2011-03-26 13:01:27 +01:00
{
2012-05-24 19:02:21 +02:00
if ( fDiscover ) {
2012-02-10 04:41:42 +01:00
char externalIPAddress [ 40 ] ;
r = UPNP_GetExternalIPAddress ( urls . controlURL , data . first . servicetype , externalIPAddress ) ;
if ( r ! = UPNPCOMMAND_SUCCESS )
printf ( " UPnP: GetExternalIPAddress() returned %d \n " , r ) ;
else
{
if ( externalIPAddress [ 0 ] )
{
printf ( " UPnP: ExternalIPAddress = %s \n " , externalIPAddress ) ;
2012-02-19 20:44:35 +01:00
AddLocal ( CNetAddr ( externalIPAddress ) , LOCAL_UPNP ) ;
2012-02-10 04:41:42 +01:00
}
else
printf ( " UPnP: GetExternalIPAddress failed. \n " ) ;
}
}
2011-08-01 16:34:59 +02:00
string strDesc = " Bitcoin " + FormatFullVersion ( ) ;
2011-12-10 17:52:50 +01:00
# ifndef UPNPDISCOVER_SUCCESS
2012-01-31 23:36:25 +01:00
/* miniupnpc 1.5 */
2011-12-10 17:52:50 +01:00
r = UPNP_AddPortMapping ( urls . controlURL , data . first . servicetype ,
2012-01-14 12:14:36 +01:00
port , port , lanaddr , strDesc . c_str ( ) , " TCP " , 0 ) ;
2011-12-10 17:52:50 +01:00
# else
2012-01-31 23:36:25 +01:00
/* miniupnpc 1.6 */
2011-03-26 13:01:27 +01:00
r = UPNP_AddPortMapping ( urls . controlURL , data . first . servicetype ,
2012-01-14 12:14:36 +01:00
port , port , lanaddr , strDesc . c_str ( ) , " TCP " , 0 , " 0 " ) ;
2011-12-10 17:52:50 +01:00
# endif
2011-08-12 00:20:07 +02:00
2011-03-26 13:01:27 +01:00
if ( r ! = UPNPCOMMAND_SUCCESS )
printf ( " AddPortMapping(%s, %s, %s) failed with code %d (%s) \n " ,
port , port , lanaddr , r , strupnperror ( r ) ) ;
else
printf ( " UPnP Port Mapping successful. \n " ) ;
2012-01-31 23:36:25 +01:00
int i = 1 ;
2011-03-26 13:01:27 +01:00
loop {
if ( fShutdown | | ! fUseUPnP )
{
r = UPNP_DeletePortMapping ( urls . controlURL , data . first . servicetype , port , " TCP " , 0 ) ;
printf ( " UPNP_DeletePortMapping() returned : %d \n " , r ) ;
freeUPNPDevlist ( devlist ) ; devlist = 0 ;
FreeUPNPUrls ( & urls ) ;
return ;
}
2012-01-31 23:36:25 +01:00
if ( i % 600 = = 0 ) // Refresh every 20 minutes
{
# ifndef UPNPDISCOVER_SUCCESS
/* miniupnpc 1.5 */
r = UPNP_AddPortMapping ( urls . controlURL , data . first . servicetype ,
port , port , lanaddr , strDesc . c_str ( ) , " TCP " , 0 ) ;
# else
/* miniupnpc 1.6 */
r = UPNP_AddPortMapping ( urls . controlURL , data . first . servicetype ,
port , port , lanaddr , strDesc . c_str ( ) , " TCP " , 0 , " 0 " ) ;
# endif
if ( r ! = UPNPCOMMAND_SUCCESS )
printf ( " AddPortMapping(%s, %s, %s) failed with code %d (%s) \n " ,
port , port , lanaddr , r , strupnperror ( r ) ) ;
else
printf ( " UPnP Port Mapping successful. \n " ) ; ;
}
2011-03-26 13:01:27 +01:00
Sleep ( 2000 ) ;
2012-01-31 23:36:25 +01:00
i + + ;
2011-03-26 13:01:27 +01:00
}
} else {
printf ( " No valid UPnP IGDs found \n " ) ;
freeUPNPDevlist ( devlist ) ; devlist = 0 ;
2011-04-16 20:35:45 +02:00
if ( r ! = 0 )
FreeUPNPUrls ( & urls ) ;
2011-03-26 13:01:27 +01:00
loop {
2011-04-15 00:37:50 +02:00
if ( fShutdown | | ! fUseUPnP )
2011-03-26 13:01:27 +01:00
return ;
Sleep ( 2000 ) ;
}
}
}
2012-05-24 19:02:21 +02:00
void MapPort ( )
2011-03-26 13:01:27 +01:00
{
2012-02-07 19:42:29 +01:00
if ( fUseUPnP & & vnThreadsRunning [ THREAD_UPNP ] < 1 )
2011-03-26 13:01:27 +01:00
{
if ( ! CreateThread ( ThreadMapPort , NULL ) )
printf ( " Error: ThreadMapPort(ThreadMapPort) failed \n " ) ;
}
}
2011-08-09 18:38:17 +02:00
# else
2012-05-24 19:02:21 +02:00
void MapPort ( )
2011-08-09 18:38:17 +02:00
{
// Intentionally left blank.
}
2011-03-26 13:01:27 +01:00
# endif
2012-01-04 23:39:45 +01:00
// DNS seeds
// Each pair gives a source name and a seed name.
// The first name is used as information source for addrman.
// The second name should resolve to a list of seed addresses.
static const char * strDNSSeed [ ] [ 2 ] = {
{ " bitcoin.sipa.be " , " seed.bitcoin.sipa.be " } ,
2012-07-11 16:55:30 +02:00
{ " bluematt.me " , " dnsseed.bluematt.me " } ,
2012-01-04 23:39:45 +01:00
{ " dashjr.org " , " dnsseed.bitcoin.dashjr.org " } ,
2012-07-11 16:55:30 +02:00
{ " xf2.org " , " bitseed.xf2.org " } ,
2011-03-09 04:40:50 +01:00
} ;
2010-08-29 18:58:15 +02:00
2011-11-21 18:25:00 +01:00
void ThreadDNSAddressSeed ( void * parg )
2011-03-09 04:40:50 +01:00
{
2011-11-21 18:25:00 +01:00
IMPLEMENT_RANDOMIZE_STACK ( ThreadDNSAddressSeed ( parg ) ) ;
2012-06-24 17:03:57 +02:00
// Make this thread recognisable as the DNS seeding thread
RenameThread ( " bitcoin-dnsseed " ) ;
2011-11-21 18:25:00 +01:00
try
{
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_DNSSEED ] + + ;
2011-11-21 18:25:00 +01:00
ThreadDNSAddressSeed2 ( parg ) ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_DNSSEED ] - - ;
2011-11-21 18:25:00 +01:00
}
catch ( std : : exception & e ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_DNSSEED ] - - ;
2011-11-21 18:25:00 +01:00
PrintException ( & e , " ThreadDNSAddressSeed() " ) ;
} catch ( . . . ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_DNSSEED ] - - ;
2011-11-21 18:25:00 +01:00
throw ; // support pthread_cancel()
}
2012-05-17 19:52:38 +02:00
printf ( " ThreadDNSAddressSeed exited \n " ) ;
2011-11-21 18:25:00 +01:00
}
void ThreadDNSAddressSeed2 ( void * parg )
{
printf ( " ThreadDNSAddressSeed started \n " ) ;
2011-03-09 04:40:50 +01:00
int found = 0 ;
2011-07-01 02:09:51 +02:00
if ( ! fTestNet )
{
printf ( " Loading addresses from DNS seeds (could take a while) \n " ) ;
2011-03-09 04:40:50 +01:00
2012-04-15 22:52:09 +02:00
for ( unsigned int seed_idx = 0 ; seed_idx < ARRAYLEN ( strDNSSeed ) ; seed_idx + + ) {
2012-05-24 19:02:21 +02:00
if ( GetNameProxy ( ) ) {
2012-04-24 02:15:00 +02:00
AddOneShot ( strDNSSeed [ seed_idx ] [ 1 ] ) ;
2012-04-19 17:38:03 +02:00
} else {
vector < CNetAddr > vaddr ;
vector < CAddress > vAdd ;
if ( LookupHost ( strDNSSeed [ seed_idx ] [ 1 ] , vaddr ) )
2011-05-02 15:34:42 +02:00
{
2012-04-19 17:38:03 +02:00
BOOST_FOREACH ( CNetAddr & ip , vaddr )
{
int nOneDay = 24 * 3600 ;
CAddress addr = CAddress ( CService ( ip , GetDefaultPort ( ) ) ) ;
addr . nTime = GetTime ( ) - 3 * nOneDay - GetRand ( 4 * nOneDay ) ; // use a random age between 3 and 7 days old
vAdd . push_back ( addr ) ;
found + + ;
}
2011-05-02 15:34:42 +02:00
}
2012-04-19 17:38:03 +02:00
addrman . Add ( vAdd , CNetAddr ( strDNSSeed [ seed_idx ] [ 0 ] , true ) ) ;
2011-03-09 04:40:50 +01:00
}
}
}
2011-03-09 04:55:29 +01:00
printf ( " %d addresses found from DNS seeds \n " , found ) ;
2011-03-09 04:40:50 +01:00
}
2010-08-29 18:58:15 +02:00
2011-11-21 18:25:00 +01:00
2010-08-29 18:58:15 +02:00
unsigned int pnSeed [ ] =
{
2012-01-19 07:54:14 +01:00
0x959bd347 , 0xf8de42b2 , 0x73bc0518 , 0xea6edc50 , 0x21b00a4d , 0xc725b43d , 0xd665464d , 0x1a2a770e ,
0x27c93946 , 0x65b2fa46 , 0xb80ae255 , 0x66b3b446 , 0xb1877a3e , 0x6ee89e3e , 0xc3175b40 , 0x2a01a83c ,
0x95b1363a , 0xa079ad3d , 0xe6ca801f , 0x027f4f4a , 0x34f7f03a , 0xf790f04a , 0x16ca801f , 0x2f4d5e40 ,
0x3a4d5e40 , 0xc43a322e , 0xc8159753 , 0x14d4724c , 0x7919a118 , 0xe0bdb34e , 0x68a16b2e , 0xff64b44d ,
0x6099115b , 0x9b57b05b , 0x7bd1b4ad , 0xdf95944f , 0x29d2b73d , 0xafa8db79 , 0xe247ba41 , 0x24078348 ,
0xf722f03c , 0x33567ebc , 0xace64ed4 , 0x984d3932 , 0xb5f34e55 , 0x27b7024d , 0x94579247 , 0x8894042e ,
0x9357d34c , 0x1063c24b , 0xcaa228b1 , 0xa3c5a8b2 , 0x5dc64857 , 0xa2c23643 , 0xa8369a54 , 0x31203077 ,
0x00707c5c , 0x09fc0b3a , 0x272e9e2e , 0xf80f043e , 0x9449ca3e , 0x5512c33e , 0xd106b555 , 0xe8024157 ,
0xe288ec29 , 0xc79c5461 , 0xafb63932 , 0xdb02ab4b , 0x0e512777 , 0x8a145a4c , 0xb201ff4f , 0x5e09314b ,
0xcd9bfbcd , 0x1c023765 , 0x4394e75c , 0xa728bd4d , 0x65331552 , 0xa98420b1 , 0x89ecf559 , 0x6e80801f ,
0xf404f118 , 0xefd62b51 , 0x05918346 , 0x9b186d5f , 0xacabab46 , 0xf912e255 , 0xc188ea62 , 0xcc55734e ,
0xc668064d , 0xd77a4558 , 0x46201c55 , 0xf17dfc80 , 0xf7142f2e , 0x87bfb718 , 0x8aa54fb2 , 0xc451d518 ,
0xc4ae8831 , 0x8dd44d55 , 0x5bbd206c , 0x64536b5d , 0x5c667e60 , 0x3b064242 , 0xfe963a42 , 0xa28e6dc8 ,
0xe8a9604a , 0xc989464e , 0xd124a659 , 0x50065140 , 0xa44dfe5e , 0x1079e655 , 0x3fb986d5 , 0x47895b18 ,
0x7d3ce4ad , 0x4561ba50 , 0x296eec62 , 0x255b41ad , 0xaed35ec9 , 0x55556f12 , 0xc7d3154d , 0x3297b65d ,
0x8930121f , 0xabf42e4e , 0x4a29e044 , 0x1212685d , 0x676c1e40 , 0xce009744 , 0x383a8948 , 0xa2dbd0ad ,
0xecc2564d , 0x07dbc252 , 0x887ee24b , 0x5171644c , 0x6bb798c1 , 0x847f495d , 0x4cbb7145 , 0x3bb81c32 ,
0x45eb262e , 0xc8015a4e , 0x250a361b , 0xf694f946 , 0xd64a183e , 0xd4f1dd59 , 0x8f20ffd4 , 0x51d9e55c ,
0x09521763 , 0x5e02002e , 0x32c8074d , 0xe685762e , 0x8290b0bc , 0x762a922e , 0xfc5ee754 , 0x83a24829 ,
0x775b224d , 0x6295bb4d , 0x38ec0555 , 0xbffbba50 , 0xe5560260 , 0x86b16a7c , 0xd372234e , 0x49a3c24b ,
0x2f6a171f , 0x4d75ed60 , 0xae94115b , 0xcb543744 , 0x63080c59 , 0x3f9c724c , 0xc977ce18 , 0x532efb18 ,
0x69dc3b2e , 0x5f94d929 , 0x1732bb4d , 0x9c814b4d , 0xe6b3762e , 0xc024f662 , 0x8face35b , 0x6b5b044d ,
0x798c7b57 , 0x79a6b44c , 0x067d3057 , 0xf9e94e5f , 0x91cbe15b , 0x71405eb2 , 0x2662234e , 0xcbcc4a6d ,
0xbf69d54b , 0xa79b4e55 , 0xec6d3e51 , 0x7c0b3c02 , 0x60f83653 , 0x24c1e15c , 0x1110b62e , 0x10350f59 ,
0xa56f1d55 , 0x3509e7a9 , 0xeb128354 , 0x14268e2e , 0x934e28bc , 0x8e32692e , 0x8331a21f , 0x3e633932 ,
0xc812b12e , 0xc684bf2e , 0x80112d2e , 0xe0ddc96c , 0xc630ca4a , 0x5c09b3b2 , 0x0b580518 , 0xc8e9d54b ,
0xd169aa43 , 0x17d0d655 , 0x1d029963 , 0x7ff87559 , 0xcb701f1f , 0x6fa3e85d , 0xe45e9a54 , 0xf05d1802 ,
0x44d03b2e , 0x837b692e , 0xccd4354e , 0x3d6da13c , 0x3423084d , 0xf707c34a , 0x55f6db3a , 0xad26e442 ,
0x6233a21f , 0x09e80e59 , 0x8caeb54d , 0xbe870941 , 0xb407d20e , 0x20b51018 , 0x56fb152e , 0x460d2a4e ,
0xbb9a2946 , 0x560eb12e , 0xed83dd29 , 0xd6724f53 , 0xa50aafb8 , 0x451346d9 , 0x88348e2e , 0x7312fead ,
0x8ecaf96f , 0x1bda4e5f , 0xf1671e40 , 0x3c8c3e3b , 0x4716324d , 0xdde24ede , 0xf98cd17d , 0xa91d4644 ,
0x28124eb2 , 0x147d5129 , 0xd022042e , 0x61733d3b , 0xad0d5e02 , 0x8ce2932e , 0xe5c18502 , 0x549c1e32 ,
0x9685801f , 0x86e217ad , 0xd948214b , 0x4110f462 , 0x3a2e894e , 0xbd35492e , 0x87e0d558 , 0x64b8ef7d ,
0x7c3eb962 , 0x72a84b3e , 0x7cd667c9 , 0x28370a2e , 0x4bc60e7b , 0x6fc1ec60 , 0x14a6983f , 0x86739a4b ,
0x46954e5f , 0x32e2e15c , 0x2e9326cf , 0xe5801c5e , 0x379607b2 , 0x32151145 , 0xf0e39744 , 0xacb54c55 ,
0xa37dfb60 , 0x83b55cc9 , 0x388f7ca5 , 0x15034f5f , 0x3e94965b , 0x68e0ffad , 0x35280f59 , 0x8fe190cf ,
0x7c6ba5b2 , 0xa5e9db43 , 0x4ee1fc60 , 0xd9d94e5f , 0x04040677 , 0x0ea9b35e , 0x5961f14f , 0x67fda063 ,
0xa48a5a31 , 0xc6524e55 , 0x283d325e , 0x3f37515f , 0x96b94b3e , 0xacce620e , 0x6481cc5b , 0xa4a06d4b ,
0x9e95d2d9 , 0xe40c03d5 , 0xc2f4514b , 0xb79aad44 , 0xf64be843 , 0xb2064070 , 0xfca00455 , 0x429dfa4e ,
0x2323f173 , 0xeda4185e , 0xabd5227d , 0x9efd4d58 , 0xb1104758 , 0x4811e955 , 0xbd9ab355 , 0xe921f44b ,
0x9f166dce , 0x09e279b2 , 0xe0c9ac7b , 0x7901a5ad , 0xa145d4b0 , 0x79104671 , 0xec31e35a , 0x4fe0b555 ,
0xc7d9cbad , 0xad057f55 , 0xe94cc759 , 0x7fe0b043 , 0xe4529f2e , 0x0d4dd4b2 , 0x9f11a54d , 0x031e2e4e ,
0xe6014f5f , 0x11d1ca6c , 0x26bd7f61 , 0xeb86854f , 0x4d347b57 , 0x116bbe2e , 0xdba7234e , 0x7bcbfd2e ,
0x174dd4b2 , 0x6686762e , 0xb089ba50 , 0xc6258246 , 0x087e767b , 0xc4a8cb4a , 0x595dba50 , 0x7f0ae502 ,
0x7b1dbd5a , 0xa0603492 , 0x57d1af4b , 0x9e21ffd4 , 0x6393064d , 0x7407376e , 0xe484762e , 0x122a4e53 ,
0x4a37aa43 , 0x3888a6be , 0xee77864e , 0x039c8dd5 , 0x688d89af , 0x0e988f62 , 0x08218246 , 0xfc2f8246 ,
0xd1d97040 , 0xd64cd4b2 , 0x5ae4a6b8 , 0x7d0de9bc , 0x8d304d61 , 0x06c5c672 , 0xa4c8bd4d , 0xe0fd373b ,
0x575ebe4d , 0x72d26277 , 0x55570f55 , 0x77b154d9 , 0xe214293a , 0xfc740f4b , 0xfe3f6a57 , 0xa9c55f02 ,
0xae4054db , 0x2394d918 , 0xb511b24a , 0xb8741ab2 , 0x0758e65e , 0xc7b5795b , 0xb0a30a4c , 0xaf7f170c ,
0xf3b4762e , 0x8179576d , 0x738a1581 , 0x4b95b64c , 0x9829b618 , 0x1bea932e , 0x7bdeaa4b , 0xcb5e0281 ,
0x65618f54 , 0x0658474b , 0x27066acf , 0x40556d65 , 0x7d204d53 , 0xf28bc244 , 0xdce23455 , 0xadc0ff54 ,
0x3863c948 , 0xcee34e5f , 0xdeb85e02 , 0x2ed17a61 , 0x6a7b094d , 0x7f0cfc40 , 0x59603f54 , 0x3220afbc ,
0xb5dfd962 , 0x125d21c0 , 0x13f8d243 , 0xacfefb4e , 0x86c2c147 , 0x3d8bbd59 , 0xbd02a21f , 0x2593042e ,
0xc6a17a7c , 0x28925861 , 0xb487ed44 , 0xb5f4fd6d , 0x90c28a45 , 0x5a14f74d , 0x43d71b4c , 0x728ebb5d ,
0x885bf950 , 0x08134dd0 , 0x38ec046e , 0xc575684b , 0x50082d2e , 0xa2f47757 , 0x270f86ae , 0xf3ff6462 ,
0x10ed3f4e , 0x4b58d462 , 0xe01ce23e , 0x8c5b092e , 0x63e52f4e , 0x22c1e85d , 0xa908f54e , 0x8591624f ,
0x2c0fb94e , 0xa280ba3c , 0xb6f41b4c , 0x24f9aa47 , 0x27201647 , 0x3a3ea6dc , 0xa14fc3be , 0x3c34bdd5 ,
0x5b8d4f5b , 0xaadeaf4b , 0xc71cab50 , 0x15697a4c , 0x9a1a734c , 0x2a037d81 , 0x2590bd59 , 0x48ec2741 ,
0x53489c5b , 0x7f00314b , 0x2170d362 , 0xf2e92542 , 0x42c10b44 , 0x98f0f118 , 0x883a3456 , 0x099a932e ,
0xea38f7bc , 0x644e9247 , 0xbb61b62e , 0x30e0863d , 0x5f51be54 , 0x207215c7 , 0x5f306c45 , 0xaa7f3932 ,
0x98da7d45 , 0x4e339b59 , 0x2e411581 , 0xa808f618 , 0xad2c0c59 , 0x54476741 , 0x09e99fd1 , 0x5db8f752 ,
0xc16df8bd , 0x1dd4b44f , 0x106edf2e , 0x9e15c180 , 0x2ad6b56f , 0x633a5332 , 0xff33787c , 0x077cb545 ,
0x6610be6d , 0x75aad2c4 , 0x72fb4d5b , 0xe81e0f59 , 0x576f6332 , 0x47333373 , 0x351ed783 , 0x2d90fb50 ,
0x8d5e0f6c , 0x5b27a552 , 0xdb293ebb , 0xe55ef950 , 0x4b133ad8 , 0x75df975a , 0x7b6a8740 , 0xa899464b ,
0xfab15161 , 0x10f8b64d , 0xd055ea4d , 0xee8e146b , 0x4b14afb8 , 0x4bc1c44a , 0x9b961dcc , 0xd111ff43 ,
0xfca0b745 , 0xc800e412 , 0x0afad9d1 , 0xf751c350 , 0xf9f0cccf , 0xa290a545 , 0x8ef13763 , 0x7ec70d59 ,
0x2b066acf , 0x65496c45 , 0xade02c1b , 0xae6eb077 , 0x92c1e65b , 0xc064e6a9 , 0xc649e56d , 0x5287a243 ,
0x36de4f5b , 0x5b1df6ad , 0x65c39a59 , 0xdba805b2 , 0x20067aa8 , 0x6457e56d , 0x3cee26cf , 0xfd3ff26d ,
0x04f86d4a , 0x06b8e048 , 0xa93bcd5c , 0x91135852 , 0xbe90a643 , 0x8fa0094d , 0x06d8215f , 0x2677094d ,
0xd735685c , 0x164a00c9 , 0x5209ac5f , 0xa9564c5c , 0x3b504f5f , 0xcc826bd0 , 0x4615042e , 0x5fe13b4a ,
0x8c81b86d , 0x879ab68c , 0x1de564b8 , 0x434487d8 , 0x2dcb1b63 , 0x82ab524a , 0xb0676abb , 0xa13d9c62 ,
0xdbb5b86d , 0x5b7f4b59 , 0xaddfb44d , 0xad773532 , 0x3997054c , 0x72cebd89 , 0xb194544c , 0xc5b8046e ,
0x6e1adeb2 , 0xaa5abb51 , 0xefb54b44 , 0x15efc54f , 0xe9f1bc4d , 0x5f401b6c , 0x97f018ad , 0xc82f9252 ,
0x2cdc762e , 0x8e52e56d , 0x1827175e , 0x9b7d7d80 , 0xb2ad6845 , 0x51065140 , 0x71180a18 , 0x5b27006c ,
0x0621e255 , 0x721cbe58 , 0x670c0cb8 , 0xf8bd715d , 0xe0bdc5d9 , 0xed843501 , 0x4b84554d , 0x7f1a18bc ,
0x53bcaf47 , 0x5729d35f , 0xf0dda246 , 0x22382bd0 , 0x4d641fb0 , 0x316afcde , 0x50a22f1f , 0x73608046 ,
0xc461d84a , 0xb2dbe247 ,
2010-08-29 18:58:15 +02:00
} ;
2012-01-04 23:39:45 +01:00
void DumpAddresses ( )
{
2012-05-17 04:11:19 +02:00
int64 nStart = GetTimeMillis ( ) ;
2012-01-04 23:39:45 +01:00
CAddrDB adb ;
2012-05-17 04:11:19 +02:00
adb . Write ( addrman ) ;
printf ( " Flushed %d addresses to peers.dat % " PRI64d " ms \n " ,
addrman . size ( ) , GetTimeMillis ( ) - nStart ) ;
2012-01-04 23:39:45 +01:00
}
2010-08-29 18:58:15 +02:00
2012-01-04 23:39:45 +01:00
void ThreadDumpAddress2 ( void * parg )
{
vnThreadsRunning [ THREAD_DUMPADDRESS ] + + ;
while ( ! fShutdown )
{
DumpAddresses ( ) ;
vnThreadsRunning [ THREAD_DUMPADDRESS ] - - ;
Sleep ( 100000 ) ;
vnThreadsRunning [ THREAD_DUMPADDRESS ] + + ;
}
vnThreadsRunning [ THREAD_DUMPADDRESS ] - - ;
}
void ThreadDumpAddress ( void * parg )
{
IMPLEMENT_RANDOMIZE_STACK ( ThreadDumpAddress ( parg ) ) ;
2012-06-24 17:03:57 +02:00
// Make this thread recognisable as the address dumping thread
RenameThread ( " bitcoin-adrdump " ) ;
2012-01-04 23:39:45 +01:00
try
{
ThreadDumpAddress2 ( parg ) ;
}
catch ( std : : exception & e ) {
PrintException ( & e , " ThreadDumpAddress() " ) ;
}
2012-05-17 19:52:38 +02:00
printf ( " ThreadDumpAddress exited \n " ) ;
2012-01-04 23:39:45 +01:00
}
2010-08-29 18:58:15 +02:00
void ThreadOpenConnections ( void * parg )
{
IMPLEMENT_RANDOMIZE_STACK ( ThreadOpenConnections ( parg ) ) ;
2012-06-24 17:03:57 +02:00
// Make this thread recognisable as the connection opening thread
RenameThread ( " bitcoin-opencon " ) ;
2010-08-29 18:58:15 +02:00
try
{
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_OPENCONNECTIONS ] + + ;
2010-08-29 18:58:15 +02:00
ThreadOpenConnections2 ( parg ) ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_OPENCONNECTIONS ] - - ;
2010-08-29 18:58:15 +02:00
}
catch ( std : : exception & e ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_OPENCONNECTIONS ] - - ;
2010-08-29 18:58:15 +02:00
PrintException ( & e , " ThreadOpenConnections() " ) ;
} catch ( . . . ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_OPENCONNECTIONS ] - - ;
2010-08-29 18:58:15 +02:00
PrintException ( NULL , " ThreadOpenConnections() " ) ;
}
2012-05-17 19:52:38 +02:00
printf ( " ThreadOpenConnections exited \n " ) ;
2010-08-29 18:58:15 +02:00
}
2012-04-24 02:15:00 +02:00
void static ProcessOneShot ( )
{
string strDest ;
{
LOCK ( cs_vOneShots ) ;
if ( vOneShots . empty ( ) )
return ;
strDest = vOneShots . front ( ) ;
vOneShots . pop_front ( ) ;
}
CAddress addr ;
2012-05-10 18:44:07 +02:00
CSemaphoreGrant grant ( * semOutbound , true ) ;
if ( grant ) {
if ( ! OpenNetworkConnection ( addr , & grant , strDest . c_str ( ) , true ) )
AddOneShot ( strDest ) ;
}
2012-04-24 02:15:00 +02:00
}
2010-08-29 18:58:15 +02:00
void ThreadOpenConnections2 ( void * parg )
{
printf ( " ThreadOpenConnections started \n " ) ;
// Connect to specific addresses
if ( mapArgs . count ( " -connect " ) )
{
2011-12-21 22:33:19 +01:00
for ( int64 nLoop = 0 ; ; nLoop + + )
2010-08-29 18:58:15 +02:00
{
2012-04-24 02:15:00 +02:00
ProcessOneShot ( ) ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( string strAddr , mapMultiArgs [ " -connect " ] )
2010-08-29 18:58:15 +02:00
{
2012-04-24 02:15:00 +02:00
CAddress addr ;
2012-05-10 18:44:07 +02:00
OpenNetworkConnection ( addr , NULL , strAddr . c_str ( ) ) ;
2010-08-29 18:58:15 +02:00
for ( int i = 0 ; i < 10 & & i < nLoop ; i + + )
{
Sleep ( 500 ) ;
if ( fShutdown )
return ;
}
}
}
}
// Initiate network connections
2011-12-21 22:33:19 +01:00
int64 nStart = GetTime ( ) ;
2010-08-29 18:58:15 +02:00
loop
{
2012-04-24 02:15:00 +02:00
ProcessOneShot ( ) ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_OPENCONNECTIONS ] - - ;
2010-08-29 18:58:15 +02:00
Sleep ( 500 ) ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_OPENCONNECTIONS ] + + ;
2012-02-15 21:17:15 +01:00
if ( fShutdown )
return ;
2012-05-10 18:44:07 +02:00
2012-04-04 16:01:57 +02:00
vnThreadsRunning [ THREAD_OPENCONNECTIONS ] - - ;
2012-05-10 18:44:07 +02:00
CSemaphoreGrant grant ( * semOutbound ) ;
2012-04-04 16:01:57 +02:00
vnThreadsRunning [ THREAD_OPENCONNECTIONS ] + + ;
if ( fShutdown )
return ;
2010-08-29 18:58:15 +02:00
2012-01-04 23:39:45 +01:00
// Add seed nodes if IRC isn't working
2012-05-24 19:02:21 +02:00
if ( addrman . size ( ) = = 0 & & ( GetTime ( ) - nStart > 60 ) & & ! fTestNet )
2012-01-03 01:28:15 +01:00
{
2012-01-04 23:39:45 +01:00
std : : vector < CAddress > vAdd ;
2012-04-15 22:52:09 +02:00
for ( unsigned int i = 0 ; i < ARRAYLEN ( pnSeed ) ; i + + )
2010-08-29 18:58:15 +02:00
{
2012-01-03 01:28:15 +01:00
// It'll only connect to one or two seed nodes because once it connects,
// it'll get a pile of addresses with newer timestamps.
// Seed nodes are given a random 'last seen time' of between one and two
// weeks ago.
const int64 nOneWeek = 7 * 24 * 60 * 60 ;
2012-01-03 23:33:31 +01:00
struct in_addr ip ;
memcpy ( & ip , & pnSeed [ i ] , sizeof ( ip ) ) ;
CAddress addr ( CService ( ip , GetDefaultPort ( ) ) ) ;
2012-01-03 01:28:15 +01:00
addr . nTime = GetTime ( ) - GetRand ( nOneWeek ) - nOneWeek ;
2012-01-04 23:39:45 +01:00
vAdd . push_back ( addr ) ;
2010-08-29 18:58:15 +02:00
}
2012-01-04 23:39:45 +01:00
addrman . Add ( vAdd , CNetAddr ( " 127.0.0.1 " ) ) ;
2010-08-29 18:58:15 +02:00
}
//
// Choose an address to connect to based on most recently seen
//
CAddress addrConnect ;
2012-07-02 02:23:26 +02:00
// Only connect out to one peer per network group (/16 for IPv4).
2010-08-29 18:58:15 +02:00
// Do this here so we don't have to critsect vNodes inside mapAddresses critsect.
2012-05-10 18:44:07 +02:00
int nOutbound = 0 ;
2012-01-03 23:33:31 +01:00
set < vector < unsigned char > > setConnected ;
2012-04-06 18:39:12 +02:00
{
LOCK ( cs_vNodes ) ;
2012-05-10 18:44:07 +02:00
BOOST_FOREACH ( CNode * pnode , vNodes ) {
2012-07-02 02:23:26 +02:00
if ( ! pnode - > fInbound ) {
setConnected . insert ( pnode - > addr . GetGroup ( ) ) ;
2012-05-10 18:44:07 +02:00
nOutbound + + ;
2012-07-02 02:23:26 +02:00
}
2012-05-10 18:44:07 +02:00
}
2012-04-06 18:39:12 +02:00
}
2010-08-29 18:58:15 +02:00
2011-12-21 22:33:19 +01:00
int64 nANow = GetAdjustedTime ( ) ;
2011-10-04 05:41:47 +02:00
2012-01-04 23:39:45 +01:00
int nTries = 0 ;
loop
2010-08-29 18:58:15 +02:00
{
2012-01-04 23:39:45 +01:00
// use an nUnkBias between 10 (no outgoing connections) and 90 (8 outgoing connections)
CAddress addr = addrman . Select ( 10 + min ( nOutbound , 8 ) * 10 ) ;
2010-08-29 18:58:15 +02:00
2012-01-04 23:39:45 +01:00
// if we selected an invalid address, restart
2012-03-31 17:58:25 +02:00
if ( ! addr . IsValid ( ) | | setConnected . count ( addr . GetGroup ( ) ) | | IsLocal ( addr ) )
2012-01-04 23:39:45 +01:00
break ;
2010-08-29 18:58:15 +02:00
2012-01-04 23:39:45 +01:00
nTries + + ;
2010-08-29 18:58:15 +02:00
2012-05-04 16:46:22 +02:00
if ( IsLimited ( addr ) )
continue ;
2012-01-04 23:39:45 +01:00
// only consider very recently tried nodes after 30 failed attempts
if ( nANow - addr . nLastTry < 600 & & nTries < 30 )
continue ;
// do not allow non-default ports, unless after 50 invalid addresses selected already
if ( addr . GetPort ( ) ! = GetDefaultPort ( ) & & nTries < 50 )
continue ;
addrConnect = addr ;
break ;
2010-08-29 18:58:15 +02:00
}
if ( addrConnect . IsValid ( ) )
2012-05-10 18:44:07 +02:00
OpenNetworkConnection ( addrConnect , & grant ) ;
2010-08-29 18:58:15 +02:00
}
}
2011-12-17 01:48:03 +01:00
void ThreadOpenAddedConnections ( void * parg )
{
IMPLEMENT_RANDOMIZE_STACK ( ThreadOpenAddedConnections ( parg ) ) ;
2012-06-24 17:03:57 +02:00
// Make this thread recognisable as the connection opening thread
RenameThread ( " bitcoin-opencon " ) ;
2011-12-17 01:48:03 +01:00
try
{
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_ADDEDCONNECTIONS ] + + ;
2011-12-17 01:48:03 +01:00
ThreadOpenAddedConnections2 ( parg ) ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_ADDEDCONNECTIONS ] - - ;
2011-12-17 01:48:03 +01:00
}
catch ( std : : exception & e ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_ADDEDCONNECTIONS ] - - ;
2011-12-17 01:48:03 +01:00
PrintException ( & e , " ThreadOpenAddedConnections() " ) ;
} catch ( . . . ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_ADDEDCONNECTIONS ] - - ;
2011-12-17 01:48:03 +01:00
PrintException ( NULL , " ThreadOpenAddedConnections() " ) ;
}
2012-05-17 19:52:38 +02:00
printf ( " ThreadOpenAddedConnections exited \n " ) ;
2011-12-17 01:48:03 +01:00
}
void ThreadOpenAddedConnections2 ( void * parg )
{
printf ( " ThreadOpenAddedConnections started \n " ) ;
if ( mapArgs . count ( " -addnode " ) = = 0 )
return ;
2012-05-24 19:02:21 +02:00
if ( GetNameProxy ( ) ) {
2012-04-19 17:38:03 +02:00
while ( ! fShutdown ) {
BOOST_FOREACH ( string & strAddNode , mapMultiArgs [ " -addnode " ] ) {
CAddress addr ;
2012-05-10 18:44:07 +02:00
CSemaphoreGrant grant ( * semOutbound ) ;
OpenNetworkConnection ( addr , & grant , strAddNode . c_str ( ) ) ;
2012-04-19 17:38:03 +02:00
Sleep ( 500 ) ;
}
vnThreadsRunning [ THREAD_ADDEDCONNECTIONS ] - - ;
Sleep ( 120000 ) ; // Retry every 2 minutes
vnThreadsRunning [ THREAD_ADDEDCONNECTIONS ] + + ;
}
return ;
}
2011-12-17 01:48:03 +01:00
vector < vector < CService > > vservAddressesToAdd ( 0 ) ;
BOOST_FOREACH ( string & strAddNode , mapMultiArgs [ " -addnode " ] )
{
vector < CService > vservNode ( 0 ) ;
2012-04-19 17:38:03 +02:00
if ( Lookup ( strAddNode . c_str ( ) , vservNode , GetDefaultPort ( ) , fNameLookup , 0 ) )
2011-12-17 01:48:03 +01:00
{
vservAddressesToAdd . push_back ( vservNode ) ;
2012-04-06 18:39:12 +02:00
{
LOCK ( cs_setservAddNodeAddresses ) ;
2011-12-17 01:48:03 +01:00
BOOST_FOREACH ( CService & serv , vservNode )
setservAddNodeAddresses . insert ( serv ) ;
2012-04-06 18:39:12 +02:00
}
2011-12-17 01:48:03 +01:00
}
}
loop
{
vector < vector < CService > > vservConnectAddresses = vservAddressesToAdd ;
// Attempt to connect to each IP for each addnode entry until at least one is successful per addnode entry
2012-04-19 17:38:03 +02:00
// (keeping in mind that addnode entries can have many IPs if fNameLookup)
2012-04-06 18:39:12 +02:00
{
LOCK ( cs_vNodes ) ;
2011-12-17 01:48:03 +01:00
BOOST_FOREACH ( CNode * pnode , vNodes )
for ( vector < vector < CService > > : : iterator it = vservConnectAddresses . begin ( ) ; it ! = vservConnectAddresses . end ( ) ; it + + )
BOOST_FOREACH ( CService & addrNode , * ( it ) )
if ( pnode - > addr = = addrNode )
{
it = vservConnectAddresses . erase ( it ) ;
it - - ;
break ;
}
2012-04-06 18:39:12 +02:00
}
2011-12-17 01:48:03 +01:00
BOOST_FOREACH ( vector < CService > & vserv , vservConnectAddresses )
{
2012-05-10 18:44:07 +02:00
CSemaphoreGrant grant ( * semOutbound ) ;
OpenNetworkConnection ( CAddress ( * ( vserv . begin ( ) ) ) , & grant ) ;
2011-12-17 01:48:03 +01:00
Sleep ( 500 ) ;
if ( fShutdown )
return ;
}
if ( fShutdown )
return ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_ADDEDCONNECTIONS ] - - ;
2011-12-17 01:48:03 +01:00
Sleep ( 120000 ) ; // Retry every 2 minutes
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_ADDEDCONNECTIONS ] + + ;
2011-12-17 01:48:03 +01:00
if ( fShutdown )
return ;
}
}
2012-05-10 18:44:07 +02:00
// if succesful, this moves the passed grant to the constructed node
bool OpenNetworkConnection ( const CAddress & addrConnect , CSemaphoreGrant * grantOutbound , const char * strDest , bool fOneShot )
2010-08-29 18:58:15 +02:00
{
//
// Initiate outbound network connection
//
if ( fShutdown )
return false ;
2012-04-19 17:38:03 +02:00
if ( ! strDest )
2012-02-12 13:45:24 +01:00
if ( IsLocal ( addrConnect ) | |
FindNode ( ( CNetAddr ) addrConnect ) | | CNode : : IsBanned ( addrConnect ) | |
2012-04-19 17:38:03 +02:00
FindNode ( addrConnect . ToStringIPPort ( ) . c_str ( ) ) )
return false ;
if ( strDest & & FindNode ( strDest ) )
2010-08-29 18:58:15 +02:00
return false ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_OPENCONNECTIONS ] - - ;
2012-04-19 17:38:03 +02:00
CNode * pnode = ConnectNode ( addrConnect , strDest ) ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_OPENCONNECTIONS ] + + ;
2010-08-29 18:58:15 +02:00
if ( fShutdown )
return false ;
if ( ! pnode )
return false ;
2012-05-10 18:44:07 +02:00
if ( grantOutbound )
grantOutbound - > MoveTo ( pnode - > grantOutbound ) ;
2010-08-29 18:58:15 +02:00
pnode - > fNetworkNode = true ;
2012-04-24 02:15:00 +02:00
if ( fOneShot )
pnode - > fOneShot = true ;
2010-08-29 18:58:15 +02:00
return true ;
}
void ThreadMessageHandler ( void * parg )
{
IMPLEMENT_RANDOMIZE_STACK ( ThreadMessageHandler ( parg ) ) ;
2012-06-24 17:03:57 +02:00
// Make this thread recognisable as the message handling thread
RenameThread ( " bitcoin-msghand " ) ;
2010-08-29 18:58:15 +02:00
try
{
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_MESSAGEHANDLER ] + + ;
2010-08-29 18:58:15 +02:00
ThreadMessageHandler2 ( parg ) ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_MESSAGEHANDLER ] - - ;
2010-08-29 18:58:15 +02:00
}
catch ( std : : exception & e ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_MESSAGEHANDLER ] - - ;
2010-08-29 18:58:15 +02:00
PrintException ( & e , " ThreadMessageHandler() " ) ;
} catch ( . . . ) {
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_MESSAGEHANDLER ] - - ;
2010-08-29 18:58:15 +02:00
PrintException ( NULL , " ThreadMessageHandler() " ) ;
}
2012-05-17 19:52:38 +02:00
printf ( " ThreadMessageHandler exited \n " ) ;
2010-08-29 18:58:15 +02:00
}
void ThreadMessageHandler2 ( void * parg )
{
printf ( " ThreadMessageHandler started \n " ) ;
SetThreadPriority ( THREAD_PRIORITY_BELOW_NORMAL ) ;
while ( ! fShutdown )
{
vector < CNode * > vNodesCopy ;
{
2012-04-06 18:39:12 +02:00
LOCK ( cs_vNodes ) ;
2010-08-29 18:58:15 +02:00
vNodesCopy = vNodes ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodesCopy )
2010-08-29 18:58:15 +02:00
pnode - > AddRef ( ) ;
}
// Poll the connected nodes for messages
CNode * pnodeTrickle = NULL ;
if ( ! vNodesCopy . empty ( ) )
pnodeTrickle = vNodesCopy [ GetRand ( vNodesCopy . size ( ) ) ] ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodesCopy )
2010-08-29 18:58:15 +02:00
{
// Receive messages
2012-04-06 18:39:12 +02:00
{
TRY_LOCK ( pnode - > cs_vRecv , lockRecv ) ;
if ( lockRecv )
ProcessMessages ( pnode ) ;
}
2010-08-29 18:58:15 +02:00
if ( fShutdown )
return ;
// Send messages
2012-04-06 18:39:12 +02:00
{
TRY_LOCK ( pnode - > cs_vSend , lockSend ) ;
if ( lockSend )
SendMessages ( pnode , pnode = = pnodeTrickle ) ;
}
2010-08-29 18:58:15 +02:00
if ( fShutdown )
return ;
}
{
2012-04-06 18:39:12 +02:00
LOCK ( cs_vNodes ) ;
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodesCopy )
2010-08-29 18:58:15 +02:00
pnode - > Release ( ) ;
}
2010-09-09 03:00:40 +02:00
// Wait and allow messages to bunch up.
// Reduce vnThreadsRunning so StopNode has permission to exit while
// we're sleeping, but we must always check fShutdown after doing this.
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_MESSAGEHANDLER ] - - ;
2010-08-29 18:58:15 +02:00
Sleep ( 100 ) ;
2010-09-08 21:24:32 +02:00
if ( fRequestShutdown )
2012-06-11 07:40:14 +02:00
StartShutdown ( ) ;
2012-02-07 19:42:29 +01:00
vnThreadsRunning [ THREAD_MESSAGEHANDLER ] + + ;
2010-08-29 18:58:15 +02:00
if ( fShutdown )
return ;
}
}
2012-05-11 15:28:59 +02:00
bool BindListenPort ( const CService & addrBind , string & strError )
2010-08-29 18:58:15 +02:00
{
strError = " " ;
int nOne = 1 ;
2011-10-07 17:02:21 +02:00
# ifdef WIN32
2010-08-29 18:58:15 +02:00
// Initialize Windows Sockets
WSADATA wsadata ;
int ret = WSAStartup ( MAKEWORD ( 2 , 2 ) , & wsadata ) ;
if ( ret ! = NO_ERROR )
{
strError = strprintf ( " Error: TCP/IP socket library failed to start (WSAStartup returned error %d) " , ret ) ;
printf ( " %s \n " , strError . c_str ( ) ) ;
return false ;
}
# endif
// Create socket for listening for incoming connections
2012-03-31 17:58:25 +02:00
# ifdef USE_IPV6
2012-05-11 15:28:59 +02:00
struct sockaddr_storage sockaddr ;
2012-03-31 17:58:25 +02:00
# else
2012-05-11 15:28:59 +02:00
struct sockaddr sockaddr ;
2012-03-31 17:58:25 +02:00
# endif
2012-05-11 15:28:59 +02:00
socklen_t len = sizeof ( sockaddr ) ;
if ( ! addrBind . GetSockAddr ( ( struct sockaddr * ) & sockaddr , & len ) )
{
strError = strprintf ( " Error: bind address family for %s not supported " , addrBind . ToString ( ) . c_str ( ) ) ;
printf ( " %s \n " , strError . c_str ( ) ) ;
return false ;
}
SOCKET hListenSocket = socket ( ( ( struct sockaddr * ) & sockaddr ) - > sa_family , SOCK_STREAM , IPPROTO_TCP ) ;
2010-08-29 18:58:15 +02:00
if ( hListenSocket = = INVALID_SOCKET )
{
strError = strprintf ( " Error: Couldn't open socket for incoming connections (socket returned error %d) " , WSAGetLastError ( ) ) ;
printf ( " %s \n " , strError . c_str ( ) ) ;
return false ;
}
2011-08-07 18:18:05 +02:00
# ifdef SO_NOSIGPIPE
2010-08-29 18:58:15 +02:00
// Different way of disabling SIGPIPE on BSD
setsockopt ( hListenSocket , SOL_SOCKET , SO_NOSIGPIPE , ( void * ) & nOne , sizeof ( int ) ) ;
# endif
2011-10-07 17:02:21 +02:00
# ifndef WIN32
2010-08-29 18:58:15 +02:00
// Allow binding if the port is still in TIME_WAIT state after
// the program was closed and restarted. Not an issue on windows.
setsockopt ( hListenSocket , SOL_SOCKET , SO_REUSEADDR , ( void * ) & nOne , sizeof ( int ) ) ;
# endif
2012-05-11 15:28:59 +02:00
2011-10-07 17:02:21 +02:00
# ifdef WIN32
2010-08-29 18:58:15 +02:00
// Set to nonblocking, incoming connections will also inherit this
if ( ioctlsocket ( hListenSocket , FIONBIO , ( u_long * ) & nOne ) = = SOCKET_ERROR )
# else
if ( fcntl ( hListenSocket , F_SETFL , O_NONBLOCK ) = = SOCKET_ERROR )
# endif
{
strError = strprintf ( " Error: Couldn't set properties on socket for incoming connections (error %d) " , WSAGetLastError ( ) ) ;
printf ( " %s \n " , strError . c_str ( ) ) ;
return false ;
}
2012-03-31 17:58:25 +02:00
# ifdef USE_IPV6
2012-05-11 15:28:59 +02:00
// some systems don't have IPV6_V6ONLY but are always v6only; others do have the option
// and enable it by default or not. Try to enable it, if possible.
if ( addrBind . IsIPv6 ( ) ) {
# ifdef IPV6_V6ONLY
setsockopt ( hListenSocket , IPPROTO_IPV6 , IPV6_V6ONLY , ( void * ) & nOne , sizeof ( int ) ) ;
2012-03-31 17:58:25 +02:00
# endif
2012-05-11 15:28:59 +02:00
# ifdef WIN32
int nProtLevel = 10 /* PROTECTION_LEVEL_UNRESTRICTED */ ;
int nParameterId = 23 /* IPV6_PROTECTION_LEVEl */ ;
// this call is allowed to fail
setsockopt ( hListenSocket , IPPROTO_IPV6 , nParameterId , ( const char * ) & nProtLevel , sizeof ( int ) ) ;
# endif
}
# endif
if ( : : bind ( hListenSocket , ( struct sockaddr * ) & sockaddr , len ) = = SOCKET_ERROR )
2010-08-29 18:58:15 +02:00
{
int nErr = WSAGetLastError ( ) ;
if ( nErr = = WSAEADDRINUSE )
2012-05-16 15:34:29 +02:00
strError = strprintf ( _ ( " Unable to bind to %s on this computer. Bitcoin is probably already running. " ) , addrBind . ToString ( ) . c_str ( ) ) ;
2010-08-29 18:58:15 +02:00
else
2012-05-11 15:28:59 +02:00
strError = strprintf ( _ ( " Unable to bind to %s on this computer (bind returned error %d, %s) " ) , addrBind . ToString ( ) . c_str ( ) , nErr , strerror ( nErr ) ) ;
2010-08-29 18:58:15 +02:00
printf ( " %s \n " , strError . c_str ( ) ) ;
return false ;
}
2012-05-11 15:28:59 +02:00
printf ( " Bound to %s \n " , addrBind . ToString ( ) . c_str ( ) ) ;
2010-08-29 18:58:15 +02:00
// Listen for incoming connections
if ( listen ( hListenSocket , SOMAXCONN ) = = SOCKET_ERROR )
{
strError = strprintf ( " Error: Listening for incoming connections failed (listen returned error %d) " , WSAGetLastError ( ) ) ;
printf ( " %s \n " , strError . c_str ( ) ) ;
return false ;
}
2012-05-11 15:28:59 +02:00
vhListenSocket . push_back ( hListenSocket ) ;
2012-05-24 19:02:21 +02:00
if ( addrBind . IsRoutable ( ) & & fDiscover )
2012-05-11 15:28:59 +02:00
AddLocal ( addrBind , LOCAL_BIND ) ;
2010-08-29 18:58:15 +02:00
return true ;
}
2012-02-19 20:44:35 +01:00
void static Discover ( )
2010-08-29 18:58:15 +02:00
{
2012-05-24 19:02:21 +02:00
if ( ! fDiscover )
2012-02-19 20:44:35 +01:00
return ;
2010-08-29 18:58:15 +02:00
2011-10-07 17:02:21 +02:00
# ifdef WIN32
2010-08-29 18:58:15 +02:00
// Get local host ip
char pszHostName [ 1000 ] = " " ;
if ( gethostname ( pszHostName , sizeof ( pszHostName ) ) ! = SOCKET_ERROR )
{
2012-01-03 23:33:31 +01:00
vector < CNetAddr > vaddr ;
if ( LookupHost ( pszHostName , vaddr ) )
2012-05-01 01:44:59 +02:00
{
2012-01-03 23:33:31 +01:00
BOOST_FOREACH ( const CNetAddr & addr , vaddr )
2012-05-01 01:44:59 +02:00
{
2012-02-12 13:45:24 +01:00
AddLocal ( addr , LOCAL_IF ) ;
2012-05-01 01:44:59 +02:00
}
}
2010-08-29 18:58:15 +02:00
}
# else
// Get local host ip
struct ifaddrs * myaddrs ;
if ( getifaddrs ( & myaddrs ) = = 0 )
{
for ( struct ifaddrs * ifa = myaddrs ; ifa ! = NULL ; ifa = ifa - > ifa_next )
{
if ( ifa - > ifa_addr = = NULL ) continue ;
if ( ( ifa - > ifa_flags & IFF_UP ) = = 0 ) continue ;
if ( strcmp ( ifa - > ifa_name , " lo " ) = = 0 ) continue ;
if ( strcmp ( ifa - > ifa_name , " lo0 " ) = = 0 ) continue ;
if ( ifa - > ifa_addr - > sa_family = = AF_INET )
{
struct sockaddr_in * s4 = ( struct sockaddr_in * ) ( ifa - > ifa_addr ) ;
2012-02-12 13:45:24 +01:00
CNetAddr addr ( s4 - > sin_addr ) ;
2012-03-31 17:58:25 +02:00
if ( AddLocal ( addr , LOCAL_IF ) )
2012-05-13 00:40:30 +02:00
printf ( " IPv4 %s: %s \n " , ifa - > ifa_name , addr . ToString ( ) . c_str ( ) ) ;
2010-08-29 18:58:15 +02:00
}
2012-03-31 17:58:25 +02:00
# ifdef USE_IPV6
2010-08-29 18:58:15 +02:00
else if ( ifa - > ifa_addr - > sa_family = = AF_INET6 )
{
struct sockaddr_in6 * s6 = ( struct sockaddr_in6 * ) ( ifa - > ifa_addr ) ;
2012-02-12 13:45:24 +01:00
CNetAddr addr ( s6 - > sin6_addr ) ;
2012-03-31 17:58:25 +02:00
if ( AddLocal ( addr , LOCAL_IF ) )
2012-05-13 00:40:30 +02:00
printf ( " IPv6 %s: %s \n " , ifa - > ifa_name , addr . ToString ( ) . c_str ( ) ) ;
2010-08-29 18:58:15 +02:00
}
2012-03-31 17:58:25 +02:00
# endif
2010-08-29 18:58:15 +02:00
}
freeifaddrs ( myaddrs ) ;
}
# endif
2012-05-24 19:02:21 +02:00
CreateThread ( ThreadGetMyExternalIP , NULL ) ;
2012-02-19 20:44:35 +01:00
}
void StartNode ( void * parg )
{
2012-06-24 17:03:57 +02:00
// Make this thread recognisable as the startup thread
2012-06-30 17:14:28 +02:00
RenameThread ( " bitcoin-start " ) ;
2012-06-24 17:03:57 +02:00
2012-05-10 18:44:07 +02:00
if ( semOutbound = = NULL ) {
// initialize semaphore
int nMaxOutbound = min ( MAX_OUTBOUND_CONNECTIONS , ( int ) GetArg ( " -maxconnections " , 125 ) ) ;
semOutbound = new CSemaphore ( nMaxOutbound ) ;
}
2012-02-19 20:44:35 +01:00
if ( pnodeLocalHost = = NULL )
pnodeLocalHost = new CNode ( INVALID_SOCKET , CAddress ( CService ( " 127.0.0.1 " , 0 ) , nLocalServices ) ) ;
Discover ( ) ;
2010-08-29 18:58:15 +02:00
//
// Start threads
//
2012-02-06 20:35:57 +01:00
if ( ! GetBoolArg ( " -dnsseed " , true ) )
2011-11-21 18:25:00 +01:00
printf ( " DNS seeding disabled \n " ) ;
else
if ( ! CreateThread ( ThreadDNSAddressSeed , NULL ) )
printf ( " Error: CreateThread(ThreadDNSAddressSeed) failed \n " ) ;
2011-03-26 13:01:27 +01:00
// Map ports with UPnP
2012-05-24 19:02:21 +02:00
if ( fUseUPnP )
MapPort ( ) ;
2011-03-26 13:01:27 +01:00
2010-08-29 18:58:15 +02:00
// Get addresses from IRC and advertise ours
if ( ! CreateThread ( ThreadIRCSeed , NULL ) )
printf ( " Error: CreateThread(ThreadIRCSeed) failed \n " ) ;
// Send and receive from sockets, accept connections
2011-10-04 05:45:42 +02:00
if ( ! CreateThread ( ThreadSocketHandler , NULL ) )
printf ( " Error: CreateThread(ThreadSocketHandler) failed \n " ) ;
2010-08-29 18:58:15 +02:00
2011-12-17 01:48:03 +01:00
// Initiate outbound connections from -addnode
if ( ! CreateThread ( ThreadOpenAddedConnections , NULL ) )
printf ( " Error: CreateThread(ThreadOpenAddedConnections) failed \n " ) ;
2010-08-29 18:58:15 +02:00
// Initiate outbound connections
if ( ! CreateThread ( ThreadOpenConnections , NULL ) )
printf ( " Error: CreateThread(ThreadOpenConnections) failed \n " ) ;
// Process messages
if ( ! CreateThread ( ThreadMessageHandler , NULL ) )
printf ( " Error: CreateThread(ThreadMessageHandler) failed \n " ) ;
2012-01-04 23:39:45 +01:00
// Dump network addresses
if ( ! CreateThread ( ThreadDumpAddress , NULL ) )
printf ( " Error; CreateThread(ThreadDumpAddress) failed \n " ) ;
2010-08-29 18:58:15 +02:00
// Generate coins in the background
2012-02-16 21:00:16 +01:00
GenerateBitcoins ( GetBoolArg ( " -gen " , false ) , pwalletMain ) ;
2010-08-29 18:58:15 +02:00
}
bool StopNode ( )
{
printf ( " StopNode() \n " ) ;
fShutdown = true ;
nTransactionsUpdated + + ;
2011-12-21 22:33:19 +01:00
int64 nStart = GetTime ( ) ;
2012-05-12 17:44:14 +02:00
if ( semOutbound )
for ( int i = 0 ; i < MAX_OUTBOUND_CONNECTIONS ; i + + )
semOutbound - > post ( ) ;
2012-02-07 19:42:29 +01:00
do
2010-08-29 18:58:15 +02:00
{
2012-02-07 19:42:29 +01:00
int nThreadsRunning = 0 ;
for ( int n = 0 ; n < THREAD_MAX ; n + + )
nThreadsRunning + = vnThreadsRunning [ n ] ;
if ( nThreadsRunning = = 0 )
break ;
2010-08-29 18:58:15 +02:00
if ( GetTime ( ) - nStart > 20 )
break ;
Sleep ( 20 ) ;
2012-02-07 19:42:29 +01:00
} while ( true ) ;
if ( vnThreadsRunning [ THREAD_SOCKETHANDLER ] > 0 ) printf ( " ThreadSocketHandler still running \n " ) ;
if ( vnThreadsRunning [ THREAD_OPENCONNECTIONS ] > 0 ) printf ( " ThreadOpenConnections still running \n " ) ;
if ( vnThreadsRunning [ THREAD_MESSAGEHANDLER ] > 0 ) printf ( " ThreadMessageHandler still running \n " ) ;
if ( vnThreadsRunning [ THREAD_MINER ] > 0 ) printf ( " ThreadBitcoinMiner still running \n " ) ;
2012-04-15 02:35:58 +02:00
if ( vnThreadsRunning [ THREAD_RPCLISTENER ] > 0 ) printf ( " ThreadRPCListener still running \n " ) ;
if ( vnThreadsRunning [ THREAD_RPCHANDLER ] > 0 ) printf ( " ThreadsRPCServer still running \n " ) ;
2012-05-24 19:02:21 +02:00
# ifdef USE_UPNP
if ( vnThreadsRunning [ THREAD_UPNP ] > 0 ) printf ( " ThreadMapPort still running \n " ) ;
# endif
2012-02-07 19:42:29 +01:00
if ( vnThreadsRunning [ THREAD_DNSSEED ] > 0 ) printf ( " ThreadDNSAddressSeed still running \n " ) ;
if ( vnThreadsRunning [ THREAD_ADDEDCONNECTIONS ] > 0 ) printf ( " ThreadOpenAddedConnections still running \n " ) ;
2012-01-04 23:39:45 +01:00
if ( vnThreadsRunning [ THREAD_DUMPADDRESS ] > 0 ) printf ( " ThreadDumpAddresses still running \n " ) ;
2012-04-15 02:35:58 +02:00
while ( vnThreadsRunning [ THREAD_MESSAGEHANDLER ] > 0 | | vnThreadsRunning [ THREAD_RPCHANDLER ] > 0 )
2010-08-29 18:58:15 +02:00
Sleep ( 20 ) ;
Sleep ( 50 ) ;
2012-01-04 23:39:45 +01:00
DumpAddresses ( ) ;
2010-08-29 18:58:15 +02:00
return true ;
}
class CNetCleanup
{
public :
CNetCleanup ( )
{
}
~ CNetCleanup ( )
{
// Close sockets
2011-05-15 09:11:04 +02:00
BOOST_FOREACH ( CNode * pnode , vNodes )
2010-08-29 18:58:15 +02:00
if ( pnode - > hSocket ! = INVALID_SOCKET )
closesocket ( pnode - > hSocket ) ;
2012-05-11 15:28:59 +02:00
BOOST_FOREACH ( SOCKET hListenSocket , vhListenSocket )
if ( hListenSocket ! = INVALID_SOCKET )
if ( closesocket ( hListenSocket ) = = SOCKET_ERROR )
printf ( " closesocket(hListenSocket) failed with error %d \n " , WSAGetLastError ( ) ) ;
2010-08-29 18:58:15 +02:00
2011-10-07 17:02:21 +02:00
# ifdef WIN32
2010-08-29 18:58:15 +02:00
// Shutdown Windows Sockets
WSACleanup ( ) ;
# endif
}
}
instance_of_cnetcleanup ;