2010-08-29 18:58:15 +02:00
|
|
|
// Copyright (c) 2009-2010 Satoshi Nakamoto
|
2015-12-13 14:51:43 +01:00
|
|
|
// Copyright (c) 2009-2015 The Bitcoin Core developers
|
2014-12-13 05:09:33 +01:00
|
|
|
// Distributed under the MIT software license, see the accompanying
|
2012-05-18 16:02:28 +02:00
|
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
2013-04-13 07:13:08 +02:00
|
|
|
|
2011-05-15 09:11:04 +02:00
|
|
|
#ifndef BITCOIN_NET_H
|
|
|
|
#define BITCOIN_NET_H
|
|
|
|
|
2013-04-13 07:13:08 +02:00
|
|
|
#include "bloom.h"
|
|
|
|
#include "compat.h"
|
|
|
|
#include "limitedmap.h"
|
|
|
|
#include "netbase.h"
|
|
|
|
#include "protocol.h"
|
2014-06-26 14:41:53 +02:00
|
|
|
#include "random.h"
|
2014-10-22 21:08:30 +02:00
|
|
|
#include "streams.h"
|
2013-04-13 07:13:08 +02:00
|
|
|
#include "sync.h"
|
|
|
|
#include "uint256.h"
|
2016-12-04 21:33:39 +01:00
|
|
|
#include "util.h"
|
2013-04-13 07:13:08 +02:00
|
|
|
|
2011-05-15 09:11:04 +02:00
|
|
|
#include <deque>
|
2013-04-13 07:13:08 +02:00
|
|
|
#include <stdint.h>
|
2011-05-15 09:11:04 +02:00
|
|
|
|
2011-10-07 17:02:21 +02:00
|
|
|
#ifndef WIN32
|
2011-05-15 09:11:04 +02:00
|
|
|
#include <arpa/inet.h>
|
|
|
|
#endif
|
2010-08-29 18:58:15 +02:00
|
|
|
|
Split up util.cpp/h
Split up util.cpp/h into:
- string utilities (hex, base32, base64): no internal dependencies, no dependency on boost (apart from foreach)
- money utilities (parsesmoney, formatmoney)
- time utilities (gettime*, sleep, format date):
- and the rest (logging, argument parsing, config file parsing)
The latter is basically the environment and OS handling,
and is stripped of all utility functions, so we may want to
rename it to something else than util.cpp/h for clarity (Matt suggested
osinterface).
Breaks dependency of sha256.cpp on all the things pulled in by util.
2014-08-21 16:11:09 +02:00
|
|
|
#include <boost/filesystem/path.hpp>
|
2013-04-13 07:13:08 +02:00
|
|
|
#include <boost/foreach.hpp>
|
|
|
|
#include <boost/signals2/signal.hpp>
|
2013-06-06 09:04:33 +02:00
|
|
|
|
2013-04-13 07:13:08 +02:00
|
|
|
class CAddrMan;
|
2015-04-02 18:04:59 +02:00
|
|
|
class CScheduler;
|
2013-04-13 07:13:08 +02:00
|
|
|
class CNode;
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2013-04-13 07:13:08 +02:00
|
|
|
namespace boost {
|
|
|
|
class thread_group;
|
2014-06-24 14:17:43 +02:00
|
|
|
} // namespace boost
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2013-10-15 00:34:20 +02:00
|
|
|
/** Time between pings automatically sent out for latency probing and keepalive (in seconds). */
|
|
|
|
static const int PING_INTERVAL = 2 * 60;
|
|
|
|
/** Time after which to disconnect, after waiting for a ping response (or inactivity). */
|
|
|
|
static const int TIMEOUT_INTERVAL = 20 * 60;
|
2017-01-19 20:06:32 +01:00
|
|
|
/** Minimum time between warnings printed to log. */
|
|
|
|
static const int WARNING_INTERVAL = 10 * 60;
|
2013-04-13 07:13:08 +02:00
|
|
|
/** The maximum number of entries in an 'inv' protocol message */
|
|
|
|
static const unsigned int MAX_INV_SZ = 50000;
|
2014-11-21 12:22:11 +01:00
|
|
|
/** The maximum number of new addresses to accumulate before announcing. */
|
|
|
|
static const unsigned int MAX_ADDR_TO_SEND = 1000;
|
2015-03-05 13:01:22 +01:00
|
|
|
/** Maximum length of incoming protocol messages (no message over 2 MiB is currently acceptable). */
|
|
|
|
static const unsigned int MAX_PROTOCOL_MESSAGE_LENGTH = 2 * 1024 * 1024;
|
2015-07-31 18:05:42 +02:00
|
|
|
/** Maximum length of strSubVer in `version` message */
|
|
|
|
static const unsigned int MAX_SUBVERSION_LENGTH = 256;
|
2014-05-29 13:02:22 +02:00
|
|
|
/** -listen default */
|
|
|
|
static const bool DEFAULT_LISTEN = true;
|
2014-05-05 21:06:14 +02:00
|
|
|
/** -upnp default */
|
|
|
|
#ifdef USE_UPNP
|
|
|
|
static const bool DEFAULT_UPNP = USE_UPNP;
|
|
|
|
#else
|
|
|
|
static const bool DEFAULT_UPNP = false;
|
|
|
|
#endif
|
2014-09-09 09:18:05 +02:00
|
|
|
/** The maximum number of entries in mapAskFor */
|
|
|
|
static const size_t MAPASKFOR_MAX_SZ = MAX_INV_SZ;
|
2015-11-23 02:54:23 +01:00
|
|
|
/** The maximum number of entries in setAskFor (larger due to getdata latency)*/
|
|
|
|
static const size_t SETASKFOR_MAX_SZ = 2 * MAX_INV_SZ;
|
2015-08-01 19:41:21 +02:00
|
|
|
/** The maximum number of peer connections to maintain. */
|
|
|
|
static const unsigned int DEFAULT_MAX_PEER_CONNECTIONS = 125;
|
2015-11-06 00:05:06 +01:00
|
|
|
/** The default for -maxuploadtarget. 0 = Unlimited */
|
|
|
|
static const uint64_t DEFAULT_MAX_UPLOAD_TARGET = 0;
|
2015-11-14 13:47:53 +01:00
|
|
|
/** Default for blocks only*/
|
|
|
|
static const bool DEFAULT_BLOCKSONLY = false;
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2015-06-27 21:21:41 +02:00
|
|
|
static const bool DEFAULT_FORCEDNSSEED = false;
|
|
|
|
static const size_t DEFAULT_MAXRECEIVEBUFFER = 5 * 1000;
|
|
|
|
static const size_t DEFAULT_MAXSENDBUFFER = 1 * 1000;
|
|
|
|
|
2017-07-05 05:45:23 +02:00
|
|
|
static const ServiceFlags REQUIRED_SERVICES = NODE_NETWORK;
|
|
|
|
|
2015-06-27 21:21:41 +02:00
|
|
|
// NOTE: When adjusting this, update rpcnet:setban's help ("24h")
|
|
|
|
static const unsigned int DEFAULT_MISBEHAVING_BANTIME = 60 * 60 * 24; // Default 24-hour ban
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2014-08-21 05:17:21 +02:00
|
|
|
unsigned int ReceiveFloodSize();
|
|
|
|
unsigned int SendBufferSize();
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2015-05-31 15:36:44 +02:00
|
|
|
void AddOneShot(const std::string& strDest);
|
2012-01-03 23:33:31 +01:00
|
|
|
void AddressCurrentlyConnected(const CService& addr);
|
|
|
|
CNode* FindNode(const CNetAddr& ip);
|
2015-05-25 20:03:51 +02:00
|
|
|
CNode* FindNode(const CSubNet& subNet);
|
2014-07-24 16:29:41 +02:00
|
|
|
CNode* FindNode(const std::string& addrName);
|
2012-01-03 23:33:31 +01:00
|
|
|
CNode* FindNode(const CService& ip);
|
2016-07-30 13:05:41 +02:00
|
|
|
// fConnectToMasternode should be 'true' only if you want this node to allow to connect to itself
|
|
|
|
// and/or you want it to be disconnected on CMasternodeMan::ProcessMasternodeConnections()
|
|
|
|
CNode* ConnectNode(CAddress addrConnect, const char *pszDest = NULL, bool fConnectToMasternode = false);
|
2014-05-10 00:39:49 +02:00
|
|
|
bool OpenNetworkConnection(const CAddress& addrConnect, CSemaphoreGrant *grantOutbound = NULL, const char *strDest = NULL, bool fOneShot = false);
|
2013-03-07 04:31:26 +01:00
|
|
|
void MapPort(bool fUseUPnP);
|
2012-05-13 01:26:14 +02:00
|
|
|
unsigned short GetListenPort();
|
2014-06-21 13:34:36 +02:00
|
|
|
bool BindListenPort(const CService &bindAddr, std::string& strError, bool fWhitelisted = false);
|
2015-04-02 18:04:59 +02:00
|
|
|
void StartNode(boost::thread_group& threadGroup, CScheduler& scheduler);
|
2010-08-29 18:58:15 +02:00
|
|
|
bool StopNode();
|
2012-11-16 00:20:26 +01:00
|
|
|
void SocketSendData(CNode *pnode);
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2013-11-18 01:25:17 +01:00
|
|
|
typedef int NodeId;
|
|
|
|
|
2015-03-05 13:01:01 +01:00
|
|
|
struct CombinerAll
|
|
|
|
{
|
|
|
|
typedef bool result_type;
|
|
|
|
|
|
|
|
template<typename I>
|
|
|
|
bool operator()(I first, I last) const
|
|
|
|
{
|
|
|
|
while (first != last) {
|
|
|
|
if (!(*first)) return false;
|
|
|
|
++first;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2013-06-06 05:21:41 +02:00
|
|
|
// Signals for message handling
|
|
|
|
struct CNodeSignals
|
|
|
|
{
|
2013-10-10 23:07:44 +02:00
|
|
|
boost::signals2::signal<int ()> GetHeight;
|
2015-03-05 13:01:01 +01:00
|
|
|
boost::signals2::signal<bool (CNode*), CombinerAll> ProcessMessages;
|
2015-04-08 20:20:00 +02:00
|
|
|
boost::signals2::signal<bool (CNode*), CombinerAll> SendMessages;
|
2013-11-18 01:25:17 +01:00
|
|
|
boost::signals2::signal<void (NodeId, const CNode*)> InitializeNode;
|
|
|
|
boost::signals2::signal<void (NodeId)> FinalizeNode;
|
2013-06-06 05:21:41 +02:00
|
|
|
};
|
|
|
|
|
2013-11-18 01:25:17 +01:00
|
|
|
|
2013-06-06 05:21:41 +02:00
|
|
|
CNodeSignals& GetNodeSignals();
|
2013-01-07 17:07:51 +01:00
|
|
|
|
|
|
|
|
2012-02-12 13:45:24 +01:00
|
|
|
enum
|
|
|
|
{
|
2012-05-10 20:35:13 +02:00
|
|
|
LOCAL_NONE, // unknown
|
|
|
|
LOCAL_IF, // address a local interface listens on
|
2012-05-11 15:28:59 +02:00
|
|
|
LOCAL_BIND, // address explicit bound to
|
2012-05-10 20:35:13 +02:00
|
|
|
LOCAL_UPNP, // address reported by UPnP
|
|
|
|
LOCAL_MANUAL, // address explicitly specified (-externalip=)
|
2012-02-19 20:44:35 +01:00
|
|
|
|
|
|
|
LOCAL_MAX
|
2012-02-12 13:45:24 +01:00
|
|
|
};
|
|
|
|
|
2014-07-21 08:32:25 +02:00
|
|
|
bool IsPeerAddrLocalGood(CNode *pnode);
|
2016-02-12 19:35:32 +01:00
|
|
|
void AdvertiseLocal(CNode *pnode);
|
2012-05-04 16:46:22 +02:00
|
|
|
void SetLimited(enum Network net, bool fLimited = true);
|
2012-05-14 17:15:58 +02:00
|
|
|
bool IsLimited(enum Network net);
|
2012-05-04 16:46:22 +02:00
|
|
|
bool IsLimited(const CNetAddr& addr);
|
2012-05-10 20:35:13 +02:00
|
|
|
bool AddLocal(const CService& addr, int nScore = LOCAL_NONE);
|
2012-05-13 01:26:14 +02:00
|
|
|
bool AddLocal(const CNetAddr& addr, int nScore = LOCAL_NONE);
|
2015-09-08 17:48:45 +02:00
|
|
|
bool RemoveLocal(const CService& addr);
|
2012-05-10 20:35:13 +02:00
|
|
|
bool SeenLocal(const CService& addr);
|
|
|
|
bool IsLocal(const CService& addr);
|
|
|
|
bool GetLocal(CService &addr, const CNetAddr *paddrPeer = NULL);
|
2014-07-30 15:31:36 +02:00
|
|
|
bool IsReachable(enum Network net);
|
2012-04-10 20:22:04 +02:00
|
|
|
bool IsReachable(const CNetAddr &addr);
|
2012-02-12 13:45:24 +01:00
|
|
|
CAddress GetLocalAddress(const CNetAddr *paddrPeer = NULL);
|
|
|
|
|
2012-04-10 20:22:04 +02:00
|
|
|
|
2012-05-24 19:02:21 +02:00
|
|
|
extern bool fDiscover;
|
2014-05-29 12:33:17 +02:00
|
|
|
extern bool fListen;
|
2017-07-05 05:45:23 +02:00
|
|
|
extern ServiceFlags nLocalServices;
|
2013-04-13 07:13:08 +02:00
|
|
|
extern uint64_t nLocalHostNonce;
|
2012-01-04 23:39:45 +01:00
|
|
|
extern CAddrMan addrman;
|
2014-11-16 12:19:23 +01:00
|
|
|
|
|
|
|
/** Maximum number of connections to simultaneously allow (aka connection slots) */
|
2013-04-26 00:46:47 +02:00
|
|
|
extern int nMaxConnections;
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2011-05-15 09:11:04 +02:00
|
|
|
extern std::vector<CNode*> vNodes;
|
2010-08-29 18:58:15 +02:00
|
|
|
extern CCriticalSection cs_vNodes;
|
2011-05-15 09:11:04 +02:00
|
|
|
extern std::map<CInv, CDataStream> mapRelay;
|
2013-04-13 07:13:08 +02:00
|
|
|
extern std::deque<std::pair<int64_t, CInv> > vRelayExpiration;
|
2010-08-29 18:58:15 +02:00
|
|
|
extern CCriticalSection cs_mapRelay;
|
2016-04-11 18:52:29 +02:00
|
|
|
extern limitedmap<uint256, int64_t> mapAlreadyAskedFor;
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2012-07-02 19:55:16 +02:00
|
|
|
extern std::vector<std::string> vAddedNodes;
|
|
|
|
extern CCriticalSection cs_vAddedNodes;
|
|
|
|
|
2013-11-18 01:25:17 +01:00
|
|
|
extern NodeId nLastNodeId;
|
|
|
|
extern CCriticalSection cs_nLastNodeId;
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2015-07-31 18:05:42 +02:00
|
|
|
/** Subversion as sent to the P2P network in `version` messages */
|
|
|
|
extern std::string strSubVersion;
|
|
|
|
|
2014-05-05 13:22:28 +02:00
|
|
|
struct LocalServiceInfo {
|
|
|
|
int nScore;
|
|
|
|
int nPort;
|
|
|
|
};
|
|
|
|
|
|
|
|
extern CCriticalSection cs_mapLocalHost;
|
2014-06-04 12:52:15 +02:00
|
|
|
extern std::map<CNetAddr, LocalServiceInfo> mapLocalHost;
|
2017-06-29 03:51:10 +02:00
|
|
|
typedef std::map<std::string, uint64_t> mapMsgCmdSize; //command, total bytes
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2012-06-29 23:24:53 +02:00
|
|
|
class CNodeStats
|
|
|
|
{
|
|
|
|
public:
|
2013-11-18 01:25:17 +01:00
|
|
|
NodeId nodeid;
|
2017-07-05 05:45:23 +02:00
|
|
|
ServiceFlags nServices;
|
2015-11-21 00:51:44 +01:00
|
|
|
bool fRelayTxes;
|
2013-04-13 07:13:08 +02:00
|
|
|
int64_t nLastSend;
|
|
|
|
int64_t nLastRecv;
|
|
|
|
int64_t nTimeConnected;
|
2014-12-15 11:06:15 +01:00
|
|
|
int64_t nTimeOffset;
|
2012-06-29 23:24:53 +02:00
|
|
|
std::string addrName;
|
|
|
|
int nVersion;
|
2013-11-26 12:52:21 +01:00
|
|
|
std::string cleanSubVer;
|
2012-06-29 23:24:53 +02:00
|
|
|
bool fInbound;
|
|
|
|
int nStartingHeight;
|
2013-04-13 07:13:08 +02:00
|
|
|
uint64_t nSendBytes;
|
2017-06-29 03:51:10 +02:00
|
|
|
mapMsgCmdSize mapSendBytesPerMsgCmd;
|
2013-04-13 07:13:08 +02:00
|
|
|
uint64_t nRecvBytes;
|
2017-06-29 03:51:10 +02:00
|
|
|
mapMsgCmdSize mapRecvBytesPerMsgCmd;
|
2014-06-21 13:34:36 +02:00
|
|
|
bool fWhitelisted;
|
2013-08-22 13:34:33 +02:00
|
|
|
double dPingTime;
|
|
|
|
double dPingWait;
|
2015-09-03 22:06:13 +02:00
|
|
|
double dPingMin;
|
2013-08-22 07:50:19 +02:00
|
|
|
std::string addrLocal;
|
2012-06-29 23:24:53 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2012-11-16 01:41:12 +01:00
|
|
|
class CNetMessage {
|
|
|
|
public:
|
|
|
|
bool in_data; // parsing header (false) or data (true)
|
|
|
|
|
|
|
|
CDataStream hdrbuf; // partially received header
|
|
|
|
CMessageHeader hdr; // complete header
|
|
|
|
unsigned int nHdrPos;
|
|
|
|
|
|
|
|
CDataStream vRecv; // received message data
|
|
|
|
unsigned int nDataPos;
|
|
|
|
|
2014-07-06 16:06:46 +02:00
|
|
|
int64_t nTime; // time (in microseconds) of message receipt.
|
|
|
|
|
2014-10-28 01:24:31 +01:00
|
|
|
CNetMessage(const CMessageHeader::MessageStartChars& pchMessageStartIn, int nTypeIn, int nVersionIn) : hdrbuf(nTypeIn, nVersionIn), hdr(pchMessageStartIn), vRecv(nTypeIn, nVersionIn) {
|
2012-11-16 01:41:12 +01:00
|
|
|
hdrbuf.resize(24);
|
|
|
|
in_data = false;
|
|
|
|
nHdrPos = 0;
|
|
|
|
nDataPos = 0;
|
2014-07-06 16:06:46 +02:00
|
|
|
nTime = 0;
|
2012-11-16 01:41:12 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
bool complete() const
|
|
|
|
{
|
|
|
|
if (!in_data)
|
|
|
|
return false;
|
|
|
|
return (hdr.nMessageSize == nDataPos);
|
|
|
|
}
|
|
|
|
|
|
|
|
void SetVersion(int nVersionIn)
|
|
|
|
{
|
|
|
|
hdrbuf.SetVersion(nVersionIn);
|
|
|
|
vRecv.SetVersion(nVersionIn);
|
|
|
|
}
|
|
|
|
|
|
|
|
int readHeader(const char *pch, unsigned int nBytes);
|
|
|
|
int readData(const char *pch, unsigned int nBytes);
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-06-26 21:38:33 +02:00
|
|
|
typedef enum BanReason
|
|
|
|
{
|
|
|
|
BanReasonUnknown = 0,
|
|
|
|
BanReasonNodeMisbehaving = 1,
|
|
|
|
BanReasonManuallyAdded = 2
|
|
|
|
} BanReason;
|
2012-11-16 01:41:12 +01:00
|
|
|
|
2015-06-26 21:38:33 +02:00
|
|
|
class CBanEntry
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
static const int CURRENT_VERSION=1;
|
|
|
|
int nVersion;
|
|
|
|
int64_t nCreateTime;
|
|
|
|
int64_t nBanUntil;
|
|
|
|
uint8_t banReason;
|
|
|
|
|
|
|
|
CBanEntry()
|
|
|
|
{
|
|
|
|
SetNull();
|
|
|
|
}
|
|
|
|
|
|
|
|
CBanEntry(int64_t nCreateTimeIn)
|
|
|
|
{
|
|
|
|
SetNull();
|
|
|
|
nCreateTime = nCreateTimeIn;
|
|
|
|
}
|
2012-11-16 01:41:12 +01:00
|
|
|
|
2015-06-26 21:38:33 +02:00
|
|
|
ADD_SERIALIZE_METHODS;
|
|
|
|
|
|
|
|
template <typename Stream, typename Operation>
|
|
|
|
inline void SerializationOp(Stream& s, Operation ser_action, int nType, int nVersion) {
|
|
|
|
READWRITE(this->nVersion);
|
|
|
|
nVersion = this->nVersion;
|
|
|
|
READWRITE(nCreateTime);
|
|
|
|
READWRITE(nBanUntil);
|
|
|
|
READWRITE(banReason);
|
|
|
|
}
|
2012-11-16 01:41:12 +01:00
|
|
|
|
2015-06-26 21:38:33 +02:00
|
|
|
void SetNull()
|
|
|
|
{
|
|
|
|
nVersion = CBanEntry::CURRENT_VERSION;
|
|
|
|
nCreateTime = 0;
|
|
|
|
nBanUntil = 0;
|
|
|
|
banReason = BanReasonUnknown;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string banReasonToString()
|
|
|
|
{
|
|
|
|
switch (banReason) {
|
|
|
|
case BanReasonNodeMisbehaving:
|
2016-02-05 00:15:20 +01:00
|
|
|
return "node misbehaving";
|
2015-06-26 21:38:33 +02:00
|
|
|
case BanReasonManuallyAdded:
|
|
|
|
return "manually added";
|
|
|
|
default:
|
|
|
|
return "unknown";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
2012-11-16 01:41:12 +01:00
|
|
|
|
2015-06-26 21:38:33 +02:00
|
|
|
typedef std::map<CSubNet, CBanEntry> banmap_t;
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2012-03-26 16:48:23 +02:00
|
|
|
/** Information about a peer */
|
2010-08-29 18:58:15 +02:00
|
|
|
class CNode
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
// socket
|
2017-07-05 05:45:23 +02:00
|
|
|
ServiceFlags nServices;
|
|
|
|
ServiceFlags nServicesExpected;
|
2010-08-29 18:58:15 +02:00
|
|
|
SOCKET hSocket;
|
2013-03-24 16:52:24 +01:00
|
|
|
CDataStream ssSend;
|
|
|
|
size_t nSendSize; // total size of all vSendMsg entries
|
|
|
|
size_t nSendOffset; // offset inside the first vSendMsg already sent
|
2013-04-13 07:13:08 +02:00
|
|
|
uint64_t nSendBytes;
|
2013-03-24 16:52:24 +01:00
|
|
|
std::deque<CSerializeData> vSendMsg;
|
2010-08-29 18:58:15 +02:00
|
|
|
CCriticalSection cs_vSend;
|
2012-11-16 01:41:12 +01:00
|
|
|
|
2013-03-29 23:49:38 +01:00
|
|
|
std::deque<CInv> vRecvGetData;
|
2013-03-01 01:41:28 +01:00
|
|
|
std::deque<CNetMessage> vRecvMsg;
|
2012-11-16 01:41:12 +01:00
|
|
|
CCriticalSection cs_vRecvMsg;
|
2013-04-13 07:13:08 +02:00
|
|
|
uint64_t nRecvBytes;
|
2012-11-16 01:41:12 +01:00
|
|
|
int nRecvVersion;
|
|
|
|
|
2013-04-13 07:13:08 +02:00
|
|
|
int64_t nLastSend;
|
|
|
|
int64_t nLastRecv;
|
|
|
|
int64_t nTimeConnected;
|
2014-12-15 11:06:15 +01:00
|
|
|
int64_t nTimeOffset;
|
2017-01-19 20:06:32 +01:00
|
|
|
int64_t nLastWarningTime;
|
2010-08-29 18:58:15 +02:00
|
|
|
CAddress addr;
|
2012-04-19 17:38:03 +02:00
|
|
|
std::string addrName;
|
2012-05-10 20:35:13 +02:00
|
|
|
CService addrLocal;
|
2017-01-19 20:06:32 +01:00
|
|
|
int nNumWarningsSkipped;
|
2010-08-29 18:58:15 +02:00
|
|
|
int nVersion;
|
2014-01-11 18:14:29 +01:00
|
|
|
// strSubVer is whatever byte array we read from the wire. However, this field is intended
|
2013-11-26 12:52:21 +01:00
|
|
|
// to be printed out, displayed to humans in various forms and so on. So we sanitize it and
|
|
|
|
// store the sanitized version in cleanSubVer. The original should be used when dealing with
|
|
|
|
// the network or wire types and the cleaned string used when displayed or logged.
|
|
|
|
std::string strSubVer, cleanSubVer;
|
2014-06-21 13:34:36 +02:00
|
|
|
bool fWhitelisted; // This peer can bypass DoS banning.
|
2012-04-24 02:15:00 +02:00
|
|
|
bool fOneShot;
|
2010-08-29 18:58:15 +02:00
|
|
|
bool fClient;
|
|
|
|
bool fInbound;
|
|
|
|
bool fNetworkNode;
|
|
|
|
bool fSuccessfullyConnected;
|
|
|
|
bool fDisconnect;
|
2012-08-21 03:10:25 +02:00
|
|
|
// We use fRelayTxes for two purposes -
|
|
|
|
// a) it allows us to not relay tx invs before receiving the peer's version message
|
2015-04-28 16:48:28 +02:00
|
|
|
// b) the peer may tell us in its version message that we should not relay tx invs
|
2015-11-14 14:12:31 +01:00
|
|
|
// unless it loads a bloom filter.
|
2012-08-21 03:10:25 +02:00
|
|
|
bool fRelayTxes;
|
2016-07-30 13:05:41 +02:00
|
|
|
// If 'true' this node will be disconnected on CMasternodeMan::ProcessMasternodeConnections()
|
|
|
|
bool fMasternode;
|
2012-05-10 18:44:07 +02:00
|
|
|
CSemaphoreGrant grantOutbound;
|
2017-01-21 20:03:55 +01:00
|
|
|
CSemaphoreGrant grantMasternodeOutbound;
|
2012-08-13 05:26:29 +02:00
|
|
|
CCriticalSection cs_filter;
|
|
|
|
CBloomFilter* pfilter;
|
2010-08-29 18:58:15 +02:00
|
|
|
int nRefCount;
|
2013-11-18 01:25:17 +01:00
|
|
|
NodeId id;
|
2013-03-29 00:43:31 +01:00
|
|
|
protected:
|
2011-09-06 22:09:04 +02:00
|
|
|
|
|
|
|
// Denial-of-service detection/prevention
|
2012-07-26 02:48:39 +02:00
|
|
|
// Key is IP address, value is banned-until-time
|
2015-06-26 21:38:33 +02:00
|
|
|
static banmap_t setBanned;
|
2011-09-06 22:09:04 +02:00
|
|
|
static CCriticalSection cs_setBanned;
|
2015-06-19 15:27:37 +02:00
|
|
|
static bool setBannedIsDirty;
|
2011-09-06 22:09:04 +02:00
|
|
|
|
2014-06-21 13:34:36 +02:00
|
|
|
// Whitelisted ranges. Any node connecting from these is automatically
|
|
|
|
// whitelisted (as well as those connecting to whitelisted binds).
|
|
|
|
static std::vector<CSubNet> vWhitelistedRange;
|
|
|
|
static CCriticalSection cs_vWhitelistedRange;
|
|
|
|
|
2017-06-29 03:51:10 +02:00
|
|
|
mapMsgCmdSize mapSendBytesPerMsgCmd;
|
|
|
|
mapMsgCmdSize mapRecvBytesPerMsgCmd;
|
|
|
|
|
2013-10-28 07:28:00 +01:00
|
|
|
// Basic fuzz-testing
|
|
|
|
void Fuzz(int nChance); // modifies ssSend
|
|
|
|
|
2010-08-29 18:58:15 +02:00
|
|
|
public:
|
|
|
|
uint256 hashContinue;
|
|
|
|
int nStartingHeight;
|
|
|
|
|
|
|
|
// flood relay
|
2011-05-15 09:11:04 +02:00
|
|
|
std::vector<CAddress> vAddrToSend;
|
2015-04-25 22:25:44 +02:00
|
|
|
CRollingBloomFilter addrKnown;
|
2010-08-29 18:58:15 +02:00
|
|
|
bool fGetAddr;
|
2011-05-15 09:11:04 +02:00
|
|
|
std::set<uint256> setKnown;
|
2015-04-08 20:20:00 +02:00
|
|
|
int64_t nNextAddrSend;
|
|
|
|
int64_t nNextLocalAddrSend;
|
2010-08-29 18:58:15 +02:00
|
|
|
|
|
|
|
// inventory based relay
|
2015-11-26 06:25:30 +01:00
|
|
|
CRollingBloomFilter filterInventoryKnown;
|
2011-05-15 09:11:04 +02:00
|
|
|
std::vector<CInv> vInventoryToSend;
|
2010-08-29 18:58:15 +02:00
|
|
|
CCriticalSection cs_inventory;
|
2014-07-16 23:31:41 +02:00
|
|
|
std::set<uint256> setAskFor;
|
2013-04-13 07:13:08 +02:00
|
|
|
std::multimap<int64_t, CInv> mapAskFor;
|
2015-04-08 20:20:00 +02:00
|
|
|
int64_t nNextInvSend;
|
2014-11-18 22:16:32 +01:00
|
|
|
// Used for headers announcements - unfiltered blocks to relay
|
|
|
|
// Also protected by cs_inventory
|
|
|
|
std::vector<uint256> vBlockHashesToAnnounce;
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2017-07-12 13:13:38 +02:00
|
|
|
// Block and TXN accept times
|
|
|
|
std::atomic<int64_t> nLastBlockTime;
|
|
|
|
std::atomic<int64_t> nLastTXTime;
|
|
|
|
|
2013-10-15 00:34:20 +02:00
|
|
|
// Ping time measurement:
|
|
|
|
// The pong reply we're expecting, or 0 if no pong expected.
|
2013-04-13 07:13:08 +02:00
|
|
|
uint64_t nPingNonceSent;
|
2013-10-15 00:34:20 +02:00
|
|
|
// Time (in usec) the last ping was sent, or 0 if no ping was ever sent.
|
2013-04-13 07:13:08 +02:00
|
|
|
int64_t nPingUsecStart;
|
2013-10-15 00:34:20 +02:00
|
|
|
// Last measured round-trip time.
|
2013-04-13 07:13:08 +02:00
|
|
|
int64_t nPingUsecTime;
|
2015-08-13 11:31:46 +02:00
|
|
|
// Best measured round-trip time.
|
|
|
|
int64_t nMinPingUsecTime;
|
2013-10-15 00:34:20 +02:00
|
|
|
// Whether a ping is requested.
|
2013-08-22 13:34:33 +02:00
|
|
|
bool fPingQueued;
|
2014-01-11 18:14:29 +01:00
|
|
|
|
2017-03-13 07:29:16 +01:00
|
|
|
std::vector<unsigned char> vchKeyedNetGroup;
|
|
|
|
|
2016-07-30 13:05:41 +02:00
|
|
|
CNode(SOCKET hSocketIn, const CAddress &addrIn, const std::string &addrNameIn = "", bool fInboundIn = false, bool fNetworkNodeIn = false);
|
2014-08-21 05:17:21 +02:00
|
|
|
~CNode();
|
2010-08-29 18:58:15 +02:00
|
|
|
|
|
|
|
private:
|
2013-08-22 18:09:32 +02:00
|
|
|
// Network usage totals
|
|
|
|
static CCriticalSection cs_totalBytesRecv;
|
|
|
|
static CCriticalSection cs_totalBytesSent;
|
2013-04-13 07:13:08 +02:00
|
|
|
static uint64_t nTotalBytesRecv;
|
|
|
|
static uint64_t nTotalBytesSent;
|
2013-08-22 18:09:32 +02:00
|
|
|
|
2015-09-02 17:03:27 +02:00
|
|
|
// outbound limit & stats
|
|
|
|
static uint64_t nMaxOutboundTotalBytesSentInCycle;
|
|
|
|
static uint64_t nMaxOutboundCycleStartTime;
|
|
|
|
static uint64_t nMaxOutboundLimit;
|
|
|
|
static uint64_t nMaxOutboundTimeframe;
|
|
|
|
|
2017-03-13 07:29:16 +01:00
|
|
|
// Secret key for computing keyed net groups
|
|
|
|
static std::vector<unsigned char> vchSecretKey;
|
|
|
|
|
2017-02-05 17:45:36 +01:00
|
|
|
CCriticalSection cs_nRefCount;
|
|
|
|
|
2010-08-29 18:58:15 +02:00
|
|
|
CNode(const CNode&);
|
|
|
|
void operator=(const CNode&);
|
2013-08-22 18:09:32 +02:00
|
|
|
|
2010-08-29 18:58:15 +02:00
|
|
|
public:
|
|
|
|
|
2013-11-18 01:25:17 +01:00
|
|
|
NodeId GetId() const {
|
|
|
|
return id;
|
|
|
|
}
|
2010-08-29 18:58:15 +02:00
|
|
|
|
|
|
|
int GetRefCount()
|
|
|
|
{
|
2017-02-05 17:45:36 +01:00
|
|
|
LOCK(cs_nRefCount);
|
2013-03-29 00:43:31 +01:00
|
|
|
assert(nRefCount >= 0);
|
|
|
|
return nRefCount;
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
|
2012-11-16 01:41:12 +01:00
|
|
|
// requires LOCK(cs_vRecvMsg)
|
|
|
|
unsigned int GetTotalRecvSize()
|
|
|
|
{
|
|
|
|
unsigned int total = 0;
|
2013-10-15 12:13:54 +02:00
|
|
|
BOOST_FOREACH(const CNetMessage &msg, vRecvMsg)
|
2013-03-01 01:41:28 +01:00
|
|
|
total += msg.vRecv.size() + 24;
|
2012-11-16 01:41:12 +01:00
|
|
|
return total;
|
|
|
|
}
|
|
|
|
|
|
|
|
// requires LOCK(cs_vRecvMsg)
|
|
|
|
bool ReceiveMsgBytes(const char *pch, unsigned int nBytes);
|
|
|
|
|
|
|
|
// requires LOCK(cs_vRecvMsg)
|
|
|
|
void SetRecvVersion(int nVersionIn)
|
|
|
|
{
|
|
|
|
nRecvVersion = nVersionIn;
|
2013-03-01 01:41:28 +01:00
|
|
|
BOOST_FOREACH(CNetMessage &msg, vRecvMsg)
|
|
|
|
msg.SetVersion(nVersionIn);
|
2012-11-16 01:41:12 +01:00
|
|
|
}
|
|
|
|
|
2013-03-29 00:43:31 +01:00
|
|
|
CNode* AddRef()
|
2010-08-29 18:58:15 +02:00
|
|
|
{
|
2017-02-05 17:45:36 +01:00
|
|
|
LOCK(cs_nRefCount);
|
2013-03-29 00:43:31 +01:00
|
|
|
nRefCount++;
|
2010-08-29 18:58:15 +02:00
|
|
|
return this;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Release()
|
|
|
|
{
|
2017-02-05 17:45:36 +01:00
|
|
|
LOCK(cs_nRefCount);
|
2010-08-29 18:58:15 +02:00
|
|
|
nRefCount--;
|
2017-02-04 19:47:38 +01:00
|
|
|
assert(nRefCount >= 0);
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void AddAddressKnown(const CAddress& addr)
|
|
|
|
{
|
2015-04-25 22:25:44 +02:00
|
|
|
addrKnown.insert(addr.GetKey());
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void PushAddress(const CAddress& addr)
|
|
|
|
{
|
|
|
|
// Known checking here is only to save space from duplicates.
|
|
|
|
// SendMessages will filter it again for knowns that were added
|
|
|
|
// after addresses were pushed.
|
2015-04-25 22:25:44 +02:00
|
|
|
if (addr.IsValid() && !addrKnown.contains(addr.GetKey())) {
|
2014-11-21 12:22:11 +01:00
|
|
|
if (vAddrToSend.size() >= MAX_ADDR_TO_SEND) {
|
|
|
|
vAddrToSend[insecure_rand() % vAddrToSend.size()] = addr;
|
|
|
|
} else {
|
|
|
|
vAddrToSend.push_back(addr);
|
|
|
|
}
|
|
|
|
}
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void AddInventoryKnown(const CInv& inv)
|
|
|
|
{
|
2012-04-06 18:39:12 +02:00
|
|
|
{
|
|
|
|
LOCK(cs_inventory);
|
2015-11-26 06:25:30 +01:00
|
|
|
filterInventoryKnown.insert(inv.hash);
|
2012-04-06 18:39:12 +02:00
|
|
|
}
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void PushInventory(const CInv& inv)
|
|
|
|
{
|
2012-04-06 18:39:12 +02:00
|
|
|
{
|
|
|
|
LOCK(cs_inventory);
|
2016-12-04 21:33:39 +01:00
|
|
|
if (inv.type == MSG_TX && filterInventoryKnown.contains(inv.hash)) {
|
|
|
|
LogPrint("net", "PushInventory -- filtered inv: %s peer=%d\n", inv.ToString(), id);
|
2015-11-26 06:25:30 +01:00
|
|
|
return;
|
2016-12-04 21:33:39 +01:00
|
|
|
}
|
|
|
|
LogPrint("net", "PushInventory -- inv: %s peer=%d\n", inv.ToString(), id);
|
2015-11-26 06:25:30 +01:00
|
|
|
vInventoryToSend.push_back(inv);
|
2012-04-06 18:39:12 +02:00
|
|
|
}
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
|
2014-11-18 22:16:32 +01:00
|
|
|
void PushBlockHash(const uint256 &hash)
|
|
|
|
{
|
|
|
|
LOCK(cs_inventory);
|
|
|
|
vBlockHashesToAnnounce.push_back(hash);
|
|
|
|
}
|
|
|
|
|
2014-08-21 05:17:21 +02:00
|
|
|
void AskFor(const CInv& inv);
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2012-11-11 03:51:50 +01:00
|
|
|
// TODO: Document the postcondition of this function. Is cs_vSend locked?
|
2014-08-21 05:17:21 +02:00
|
|
|
void BeginMessage(const char* pszCommand) EXCLUSIVE_LOCK_FUNCTION(cs_vSend);
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2012-11-11 03:51:50 +01:00
|
|
|
// TODO: Document the precondition of this function. Is cs_vSend locked?
|
2014-08-21 05:17:21 +02:00
|
|
|
void AbortMessage() UNLOCK_FUNCTION(cs_vSend);
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2012-11-11 03:51:50 +01:00
|
|
|
// TODO: Document the precondition of this function. Is cs_vSend locked?
|
2017-06-29 03:51:10 +02:00
|
|
|
void EndMessage(const char* pszCommand) UNLOCK_FUNCTION(cs_vSend);
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2011-12-16 22:26:14 +01:00
|
|
|
void PushVersion();
|
2011-01-24 16:42:17 +01:00
|
|
|
|
2010-08-29 18:58:15 +02:00
|
|
|
|
|
|
|
void PushMessage(const char* pszCommand)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 16:52:24 +01:00
|
|
|
ssSend << a1;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 16:52:24 +01:00
|
|
|
ssSend << a1 << a2;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 16:52:24 +01:00
|
|
|
ssSend << a1 << a2 << a3;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 16:52:24 +01:00
|
|
|
ssSend << a1 << a2 << a3 << a4;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 16:52:24 +01:00
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5, const T6& a6)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 16:52:24 +01:00
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5 << a6;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6, typename T7>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5, const T6& a6, const T7& a7)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 16:52:24 +01:00
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5 << a6 << a7;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6, typename T7, typename T8>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5, const T6& a6, const T7& a7, const T8& a8)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 16:52:24 +01:00
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5 << a6 << a7 << a8;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6, typename T7, typename T8, typename T9>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5, const T6& a6, const T7& a7, const T8& a8, const T9& a9)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 16:52:24 +01:00
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5 << a6 << a7 << a8 << a9;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2010-08-29 18:58:15 +02:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
2014-12-09 02:17:57 +01:00
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6, typename T7, typename T8, typename T9, typename T10>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5, const T6& a6, const T7& a7, const T8& a8, const T9& a9, const T10& a10)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5 << a6 << a7 << a8 << a9 << a10;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2014-12-09 02:17:57 +01:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-16 20:01:11 +01:00
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6, typename T7, typename T8, typename T9, typename T10, typename T11>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5, const T6& a6, const T7& a7, const T8& a8, const T9& a9, const T10& a10, const T11& a11)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5 << a6 << a7 << a8 << a9 << a10 << a11;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2015-03-16 20:01:11 +01:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6, typename T7, typename T8, typename T9, typename T10, typename T11, typename T12>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5, const T6& a6, const T7& a7, const T8& a8, const T9& a9, const T10& a10, const T11& a11, const T12& a12)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5 << a6 << a7 << a8 << a9 << a10 << a11 << a12;
|
2017-06-29 03:51:10 +02:00
|
|
|
EndMessage(pszCommand);
|
2015-03-16 20:01:11 +01:00
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
2014-12-09 02:17:57 +01:00
|
|
|
|
2010-08-29 18:58:15 +02:00
|
|
|
void CloseSocketDisconnect();
|
2011-09-06 22:09:04 +02:00
|
|
|
|
|
|
|
// Denial-of-service detection/prevention
|
|
|
|
// The idea is to detect peers that are behaving
|
|
|
|
// badly and disconnect/ban them, but do it in a
|
|
|
|
// one-coding-mistake-won't-shatter-the-entire-network
|
|
|
|
// way.
|
|
|
|
// IMPORTANT: There should be nothing I can give a
|
|
|
|
// node that it will forward on that will make that
|
|
|
|
// node's peers drop it. If there is, an attacker
|
|
|
|
// can isolate a node and/or try to split the network.
|
|
|
|
// Dropping a node for sending stuff that is invalid
|
|
|
|
// now but might be valid in a later version is also
|
|
|
|
// dangerous, because it can cause a network split
|
|
|
|
// between nodes running old code and nodes running
|
|
|
|
// new code.
|
|
|
|
static void ClearBanned(); // needed for unit testing
|
2012-01-03 23:33:31 +01:00
|
|
|
static bool IsBanned(CNetAddr ip);
|
2015-05-25 20:03:51 +02:00
|
|
|
static bool IsBanned(CSubNet subnet);
|
2015-06-26 21:38:33 +02:00
|
|
|
static void Ban(const CNetAddr &ip, const BanReason &banReason, int64_t bantimeoffset = 0, bool sinceUnixEpoch = false);
|
|
|
|
static void Ban(const CSubNet &subNet, const BanReason &banReason, int64_t bantimeoffset = 0, bool sinceUnixEpoch = false);
|
2015-05-19 10:07:23 +02:00
|
|
|
static bool Unban(const CNetAddr &ip);
|
2015-05-25 20:03:51 +02:00
|
|
|
static bool Unban(const CSubNet &ip);
|
2015-06-26 21:38:33 +02:00
|
|
|
static void GetBanned(banmap_t &banmap);
|
|
|
|
static void SetBanned(const banmap_t &banmap);
|
2015-06-19 15:27:37 +02:00
|
|
|
|
|
|
|
//!check is the banlist has unwritten changes
|
|
|
|
static bool BannedSetIsDirty();
|
|
|
|
//!set the "dirty" flag for the banlist
|
|
|
|
static void SetBannedSetDirty(bool dirty=true);
|
2015-08-09 01:17:27 +02:00
|
|
|
//!clean unused entries (if bantime has expired)
|
2015-06-19 15:27:37 +02:00
|
|
|
static void SweepBanned();
|
2015-05-19 10:07:23 +02:00
|
|
|
|
2012-06-29 23:24:53 +02:00
|
|
|
void copyStats(CNodeStats &stats);
|
2013-08-22 18:09:32 +02:00
|
|
|
|
2014-06-21 13:34:36 +02:00
|
|
|
static bool IsWhitelistedRange(const CNetAddr &ip);
|
|
|
|
static void AddWhitelistedRange(const CSubNet &subnet);
|
|
|
|
|
2013-08-22 18:09:32 +02:00
|
|
|
// Network stats
|
2013-04-13 07:13:08 +02:00
|
|
|
static void RecordBytesRecv(uint64_t bytes);
|
|
|
|
static void RecordBytesSent(uint64_t bytes);
|
2013-08-22 18:09:32 +02:00
|
|
|
|
2013-04-13 07:13:08 +02:00
|
|
|
static uint64_t GetTotalBytesRecv();
|
|
|
|
static uint64_t GetTotalBytesSent();
|
2015-09-02 17:03:27 +02:00
|
|
|
|
|
|
|
//!set the max outbound target in bytes
|
|
|
|
static void SetMaxOutboundTarget(uint64_t limit);
|
|
|
|
static uint64_t GetMaxOutboundTarget();
|
|
|
|
|
|
|
|
//!set the timeframe for the max outbound target
|
|
|
|
static void SetMaxOutboundTimeframe(uint64_t timeframe);
|
|
|
|
static uint64_t GetMaxOutboundTimeframe();
|
|
|
|
|
|
|
|
//!check if the outbound target is reached
|
|
|
|
// if param historicalBlockServingLimit is set true, the function will
|
|
|
|
// response true if the limit for serving historical blocks has been reached
|
|
|
|
static bool OutboundTargetReached(bool historicalBlockServingLimit);
|
|
|
|
|
|
|
|
//!response the bytes left in the current max outbound cycle
|
|
|
|
// in case of no limit, it will always response 0
|
|
|
|
static uint64_t GetOutboundTargetBytesLeft();
|
|
|
|
|
|
|
|
//!response the time in second left in the current max outbound cycle
|
|
|
|
// in case of no limit, it will always response 0
|
|
|
|
static uint64_t GetMaxOutboundTimeLeftInCycle();
|
2017-03-13 07:29:16 +01:00
|
|
|
|
|
|
|
static std::vector<unsigned char> CalculateKeyedNetGroup(CAddress& address);
|
2010-08-29 18:58:15 +02:00
|
|
|
};
|
|
|
|
|
2015-05-25 22:59:38 +02:00
|
|
|
class CExplicitNetCleanup
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
static void callCleanup();
|
|
|
|
};
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2012-08-13 05:26:30 +02:00
|
|
|
class CTransaction;
|
2014-06-09 10:02:00 +02:00
|
|
|
void RelayTransaction(const CTransaction& tx);
|
|
|
|
void RelayTransaction(const CTransaction& tx, const CDataStream& ss);
|
2015-07-08 02:37:23 +02:00
|
|
|
void RelayInv(CInv &inv, const int minProtoVersion = MIN_PEER_PROTO_VERSION);
|
2010-08-29 18:58:15 +02:00
|
|
|
|
2013-11-29 16:33:34 +01:00
|
|
|
/** Access to the (IP) address database (peers.dat) */
|
|
|
|
class CAddrDB
|
|
|
|
{
|
|
|
|
private:
|
|
|
|
boost::filesystem::path pathAddr;
|
|
|
|
public:
|
|
|
|
CAddrDB();
|
|
|
|
bool Write(const CAddrMan& addr);
|
|
|
|
bool Read(CAddrMan& addr);
|
2017-07-05 02:40:22 +02:00
|
|
|
bool Read(CAddrMan& addr, CDataStream& ssPeers);
|
2013-11-29 16:33:34 +01:00
|
|
|
};
|
|
|
|
|
2015-06-19 15:27:37 +02:00
|
|
|
/** Access to the banlist database (banlist.dat) */
|
|
|
|
class CBanDB
|
|
|
|
{
|
|
|
|
private:
|
|
|
|
boost::filesystem::path pathBanlist;
|
|
|
|
public:
|
|
|
|
CBanDB();
|
2015-06-26 21:38:33 +02:00
|
|
|
bool Write(const banmap_t& banSet);
|
|
|
|
bool Read(banmap_t& banSet);
|
2015-06-19 15:27:37 +02:00
|
|
|
};
|
|
|
|
|
2015-04-08 20:20:00 +02:00
|
|
|
/** Return a timestamp in the future (in microseconds) for exponentially distributed events. */
|
|
|
|
int64_t PoissonNextSend(int64_t nNow, int average_interval_seconds);
|
|
|
|
|
2017-03-05 20:16:12 +01:00
|
|
|
std::vector<CNode*> CopyNodeVector();
|
|
|
|
|
|
|
|
void ReleaseNodeVector(const std::vector<CNode*>& vecNodes);
|
|
|
|
|
2014-08-28 22:21:03 +02:00
|
|
|
#endif // BITCOIN_NET_H
|