1 // Copyright (c) 2009-2010 Satoshi Nakamoto
2 // Copyright (c) 2009-2013 The Bitcoin developers
3 // Distributed under the MIT/X11 software license, see the accompanying
4 // file COPYING or http://www.opensource.org/licenses/mit-license.php.
6 #if defined(HAVE_CONFIG_H)
7 #include "bitcoin-config.h"
10 #include "chainparams.h"
15 #include "ui_interface.h"
27 #include <miniupnpc/miniwget.h>
28 #include <miniupnpc/miniupnpc.h>
29 #include <miniupnpc/upnpcommands.h>
30 #include <miniupnpc/upnperrors.h>
33 // Dump addresses to peers.dat every 15 minutes (900s)
34 #define DUMP_ADDRESSES_INTERVAL 900
35 #if !defined(HAVE_MSG_NOSIGNAL)
36 #define MSG_NOSIGNAL 0
40 using namespace boost;
42 static const int MAX_OUTBOUND_CONNECTIONS = 8;
44 bool OpenNetworkConnection(const CAddress& addrConnect, CSemaphoreGrant *grantOutbound = NULL, const char *strDest = NULL, bool fOneShot = false);
47 struct LocalServiceInfo {
53 // Global state variables
55 bool fDiscover = true;
56 uint64 nLocalServices = NODE_NETWORK;
57 static CCriticalSection cs_mapLocalHost;
58 static map<CNetAddr, LocalServiceInfo> mapLocalHost;
59 static bool vfReachable[NET_MAX] = {};
60 static bool vfLimited[NET_MAX] = {};
61 static CNode* pnodeLocalHost = NULL;
62 static CNode* pnodeSync = NULL;
63 uint64 nLocalHostNonce = 0;
64 static std::vector<SOCKET> vhListenSocket;
66 int nMaxConnections = 125;
68 vector<CNode*> vNodes;
69 CCriticalSection cs_vNodes;
70 map<CInv, CDataStream> mapRelay;
71 deque<pair<int64, CInv> > vRelayExpiration;
72 CCriticalSection cs_mapRelay;
73 limitedmap<CInv, int64> mapAlreadyAskedFor(MAX_INV_SZ);
75 static deque<string> vOneShots;
76 CCriticalSection cs_vOneShots;
78 set<CNetAddr> setservAddNodeAddresses;
79 CCriticalSection cs_setservAddNodeAddresses;
81 vector<std::string> vAddedNodes;
82 CCriticalSection cs_vAddedNodes;
84 static CSemaphore *semOutbound = NULL;
86 // Signals for message handling
87 static CNodeSignals g_signals;
88 CNodeSignals& GetNodeSignals() { return g_signals; }
90 void AddOneShot(string strDest)
93 vOneShots.push_back(strDest);
96 unsigned short GetListenPort()
98 return (unsigned short)(GetArg("-port", Params().GetDefaultPort()));
101 // find 'best' local address for a particular peer
102 bool GetLocal(CService& addr, const CNetAddr *paddrPeer)
108 int nBestReachability = -1;
110 LOCK(cs_mapLocalHost);
111 for (map<CNetAddr, LocalServiceInfo>::iterator it = mapLocalHost.begin(); it != mapLocalHost.end(); it++)
113 int nScore = (*it).second.nScore;
114 int nReachability = (*it).first.GetReachabilityFrom(paddrPeer);
115 if (nReachability > nBestReachability || (nReachability == nBestReachability && nScore > nBestScore))
117 addr = CService((*it).first, (*it).second.nPort);
118 nBestReachability = nReachability;
123 return nBestScore >= 0;
126 // get best local address for a particular peer as a CAddress
127 CAddress GetLocalAddress(const CNetAddr *paddrPeer)
129 CAddress ret(CService("0.0.0.0",0),0);
131 if (GetLocal(addr, paddrPeer))
133 ret = CAddress(addr);
134 ret.nServices = nLocalServices;
135 ret.nTime = GetAdjustedTime();
140 bool RecvLine(SOCKET hSocket, string& strLine)
146 int nBytes = recv(hSocket, &c, 1, 0);
154 if (strLine.size() >= 9000)
157 else if (nBytes <= 0)
159 boost::this_thread::interruption_point();
162 int nErr = WSAGetLastError();
163 if (nErr == WSAEMSGSIZE)
165 if (nErr == WSAEWOULDBLOCK || nErr == WSAEINTR || nErr == WSAEINPROGRESS)
171 if (!strLine.empty())
176 LogPrint("net", "socket closed\n");
182 int nErr = WSAGetLastError();
183 LogPrint("net", "recv failed: %d\n", nErr);
190 // used when scores of local addresses may have changed
191 // pushes better local address to peers
192 void static AdvertizeLocal()
195 BOOST_FOREACH(CNode* pnode, vNodes)
197 if (pnode->fSuccessfullyConnected)
199 CAddress addrLocal = GetLocalAddress(&pnode->addr);
200 if (addrLocal.IsRoutable() && (CService)addrLocal != (CService)pnode->addrLocal)
202 pnode->PushAddress(addrLocal);
203 pnode->addrLocal = addrLocal;
209 void SetReachable(enum Network net, bool fFlag)
211 LOCK(cs_mapLocalHost);
212 vfReachable[net] = fFlag;
213 if (net == NET_IPV6 && fFlag)
214 vfReachable[NET_IPV4] = true;
217 // learn a new local address
218 bool AddLocal(const CService& addr, int nScore)
220 if (!addr.IsRoutable())
223 if (!fDiscover && nScore < LOCAL_MANUAL)
229 LogPrintf("AddLocal(%s,%i)\n", addr.ToString().c_str(), nScore);
232 LOCK(cs_mapLocalHost);
233 bool fAlready = mapLocalHost.count(addr) > 0;
234 LocalServiceInfo &info = mapLocalHost[addr];
235 if (!fAlready || nScore >= info.nScore) {
236 info.nScore = nScore + (fAlready ? 1 : 0);
237 info.nPort = addr.GetPort();
239 SetReachable(addr.GetNetwork());
247 bool AddLocal(const CNetAddr &addr, int nScore)
249 return AddLocal(CService(addr, GetListenPort()), nScore);
252 /** Make a particular network entirely off-limits (no automatic connects to it) */
253 void SetLimited(enum Network net, bool fLimited)
255 if (net == NET_UNROUTABLE)
257 LOCK(cs_mapLocalHost);
258 vfLimited[net] = fLimited;
261 bool IsLimited(enum Network net)
263 LOCK(cs_mapLocalHost);
264 return vfLimited[net];
267 bool IsLimited(const CNetAddr &addr)
269 return IsLimited(addr.GetNetwork());
272 /** vote for a local address */
273 bool SeenLocal(const CService& addr)
276 LOCK(cs_mapLocalHost);
277 if (mapLocalHost.count(addr) == 0)
279 mapLocalHost[addr].nScore++;
287 /** check whether a given address is potentially local */
288 bool IsLocal(const CService& addr)
290 LOCK(cs_mapLocalHost);
291 return mapLocalHost.count(addr) > 0;
294 /** check whether a given address is in a network we can probably connect to */
295 bool IsReachable(const CNetAddr& addr)
297 LOCK(cs_mapLocalHost);
298 enum Network net = addr.GetNetwork();
299 return vfReachable[net] && !vfLimited[net];
302 bool GetMyExternalIP2(const CService& addrConnect, const char* pszGet, const char* pszKeyword, CNetAddr& ipRet)
305 if (!ConnectSocket(addrConnect, hSocket))
306 return error("GetMyExternalIP() : connection to %s failed", addrConnect.ToString().c_str());
308 send(hSocket, pszGet, strlen(pszGet), MSG_NOSIGNAL);
311 while (RecvLine(hSocket, strLine))
313 if (strLine.empty()) // HTTP response is separated from headers by blank line
317 if (!RecvLine(hSocket, strLine))
319 closesocket(hSocket);
322 if (pszKeyword == NULL)
324 if (strLine.find(pszKeyword) != string::npos)
326 strLine = strLine.substr(strLine.find(pszKeyword) + strlen(pszKeyword));
330 closesocket(hSocket);
331 if (strLine.find("<") != string::npos)
332 strLine = strLine.substr(0, strLine.find("<"));
333 strLine = strLine.substr(strspn(strLine.c_str(), " \t\n\r"));
334 while (strLine.size() > 0 && isspace(strLine[strLine.size()-1]))
335 strLine.resize(strLine.size()-1);
336 CService addr(strLine,0,true);
337 LogPrintf("GetMyExternalIP() received [%s] %s\n", strLine.c_str(), addr.ToString().c_str());
338 if (!addr.IsValid() || !addr.IsRoutable())
344 closesocket(hSocket);
345 return error("GetMyExternalIP() : connection closed");
348 bool GetMyExternalIP(CNetAddr& ipRet)
350 CService addrConnect;
352 const char* pszKeyword;
354 for (int nLookup = 0; nLookup <= 1; nLookup++)
355 for (int nHost = 1; nHost <= 2; nHost++)
357 // We should be phasing out our use of sites like these. If we need
358 // replacements, we should ask for volunteers to put this simple
359 // php file on their web server that prints the client IP:
360 // <?php echo $_SERVER["REMOTE_ADDR"]; ?>
363 addrConnect = CService("91.198.22.70", 80); // checkip.dyndns.org
367 CService addrIP("checkip.dyndns.org", 80, true);
368 if (addrIP.IsValid())
369 addrConnect = addrIP;
372 pszGet = "GET / HTTP/1.1\r\n"
373 "Host: checkip.dyndns.org\r\n"
374 "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"
375 "Connection: close\r\n"
378 pszKeyword = "Address:";
382 addrConnect = CService("74.208.43.192", 80); // www.showmyip.com
386 CService addrIP("www.showmyip.com", 80, true);
387 if (addrIP.IsValid())
388 addrConnect = addrIP;
391 pszGet = "GET /simple/ HTTP/1.1\r\n"
392 "Host: www.showmyip.com\r\n"
393 "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"
394 "Connection: close\r\n"
397 pszKeyword = NULL; // Returns just IP address
400 if (GetMyExternalIP2(addrConnect, pszGet, pszKeyword, ipRet))
407 void ThreadGetMyExternalIP()
409 CNetAddr addrLocalHost;
410 if (GetMyExternalIP(addrLocalHost))
412 LogPrintf("GetMyExternalIP() returned %s\n", addrLocalHost.ToStringIP().c_str());
413 AddLocal(addrLocalHost, LOCAL_HTTP);
421 void AddressCurrentlyConnected(const CService& addr)
423 addrman.Connected(addr);
429 uint64 CNode::nTotalBytesRecv = 0;
430 uint64 CNode::nTotalBytesSent = 0;
431 CCriticalSection CNode::cs_totalBytesRecv;
432 CCriticalSection CNode::cs_totalBytesSent;
434 CNode* FindNode(const CNetAddr& ip)
437 BOOST_FOREACH(CNode* pnode, vNodes)
438 if ((CNetAddr)pnode->addr == ip)
443 CNode* FindNode(std::string addrName)
446 BOOST_FOREACH(CNode* pnode, vNodes)
447 if (pnode->addrName == addrName)
452 CNode* FindNode(const CService& addr)
455 BOOST_FOREACH(CNode* pnode, vNodes)
456 if ((CService)pnode->addr == addr)
461 CNode* ConnectNode(CAddress addrConnect, const char *pszDest)
463 if (pszDest == NULL) {
464 if (IsLocal(addrConnect))
467 // Look for an existing connection
468 CNode* pnode = FindNode((CService)addrConnect);
478 LogPrint("net", "trying connection %s lastseen=%.1fhrs\n",
479 pszDest ? pszDest : addrConnect.ToString().c_str(),
480 pszDest ? 0 : (double)(GetAdjustedTime() - addrConnect.nTime)/3600.0);
484 if (pszDest ? ConnectSocketByName(addrConnect, hSocket, pszDest, Params().GetDefaultPort()) : ConnectSocket(addrConnect, hSocket))
486 addrman.Attempt(addrConnect);
488 LogPrint("net", "connected %s\n", pszDest ? pszDest : addrConnect.ToString().c_str());
490 // Set to non-blocking
493 if (ioctlsocket(hSocket, FIONBIO, &nOne) == SOCKET_ERROR)
494 LogPrintf("ConnectSocket() : ioctlsocket non-blocking setting failed, error %d\n", WSAGetLastError());
496 if (fcntl(hSocket, F_SETFL, O_NONBLOCK) == SOCKET_ERROR)
497 LogPrintf("ConnectSocket() : fcntl non-blocking setting failed, error %d\n", errno);
501 CNode* pnode = new CNode(hSocket, addrConnect, pszDest ? pszDest : "", false);
506 vNodes.push_back(pnode);
509 pnode->nTimeConnected = GetTime();
518 void CNode::CloseSocketDisconnect()
521 if (hSocket != INVALID_SOCKET)
523 LogPrint("net", "disconnecting node %s\n", addrName.c_str());
524 closesocket(hSocket);
525 hSocket = INVALID_SOCKET;
528 // in case this fails, we'll empty the recv buffer when the CNode is deleted
529 TRY_LOCK(cs_vRecvMsg, lockRecv);
533 // if this was the sync node, we'll need a new one
534 if (this == pnodeSync)
538 void CNode::Cleanup()
543 void CNode::PushVersion()
545 int nBestHeight = g_signals.GetHeight().get_value_or(0);
547 /// when NTP implemented, change to just nTime = GetAdjustedTime()
548 int64 nTime = (fInbound ? GetAdjustedTime() : GetTime());
549 CAddress addrYou = (addr.IsRoutable() && !IsProxy(addr) ? addr : CAddress(CService("0.0.0.0",0)));
550 CAddress addrMe = GetLocalAddress(&addr);
551 RAND_bytes((unsigned char*)&nLocalHostNonce, sizeof(nLocalHostNonce));
552 LogPrint("net", "send version message: version %d, blocks=%d, us=%s, them=%s, peer=%s\n", PROTOCOL_VERSION, nBestHeight, addrMe.ToString().c_str(), addrYou.ToString().c_str(), addr.ToString().c_str());
553 PushMessage("version", PROTOCOL_VERSION, nLocalServices, nTime, addrYou, addrMe,
554 nLocalHostNonce, FormatSubVersion(CLIENT_NAME, CLIENT_VERSION, std::vector<string>()), nBestHeight, true);
561 std::map<CNetAddr, int64> CNode::setBanned;
562 CCriticalSection CNode::cs_setBanned;
564 void CNode::ClearBanned()
569 bool CNode::IsBanned(CNetAddr ip)
571 bool fResult = false;
574 std::map<CNetAddr, int64>::iterator i = setBanned.find(ip);
575 if (i != setBanned.end())
577 int64 t = (*i).second;
585 bool CNode::Misbehaving(int howmuch)
589 LogPrintf("Warning: Local node %s misbehaving (delta: %d)!\n", addrName.c_str(), howmuch);
593 nMisbehavior += howmuch;
594 if (nMisbehavior >= GetArg("-banscore", 100))
596 int64 banTime = GetTime()+GetArg("-bantime", 60*60*24); // Default 24-hour ban
597 LogPrintf("Misbehaving: %s (%d -> %d) DISCONNECTING\n", addr.ToString().c_str(), nMisbehavior-howmuch, nMisbehavior);
600 if (setBanned[addr] < banTime)
601 setBanned[addr] = banTime;
603 CloseSocketDisconnect();
606 LogPrintf("Misbehaving: %s (%d -> %d)\n", addr.ToString().c_str(), nMisbehavior-howmuch, nMisbehavior);
611 #define X(name) stats.name = name
612 void CNode::copyStats(CNodeStats &stats)
626 stats.fSyncNode = (this == pnodeSync);
628 // It is common for nodes with good ping times to suddenly become lagged,
629 // due to a new block arriving or other large transfer.
630 // Merely reporting pingtime might fool the caller into thinking the node was still responsive,
631 // since pingtime does not update until the ping is complete, which might take a while.
632 // So, if a ping is taking an unusually long time in flight,
633 // the caller can immediately detect that this is happening.
634 int64 nPingUsecWait = 0;
635 if ((0 != nPingNonceSent) && (0 != nPingUsecStart)) {
636 nPingUsecWait = GetTimeMicros() - nPingUsecStart;
639 // Raw ping time is in microseconds, but show it to user as whole seconds (Bitcoin users should be well used to small numbers with many decimal places by now :)
640 stats.dPingTime = (((double)nPingUsecTime) / 1e6);
641 stats.dPingWait = (((double)nPingUsecWait) / 1e6);
645 // requires LOCK(cs_vRecvMsg)
646 bool CNode::ReceiveMsgBytes(const char *pch, unsigned int nBytes)
650 // get current incomplete message, or create a new one
651 if (vRecvMsg.empty() ||
652 vRecvMsg.back().complete())
653 vRecvMsg.push_back(CNetMessage(SER_NETWORK, nRecvVersion));
655 CNetMessage& msg = vRecvMsg.back();
657 // absorb network data
660 handled = msg.readHeader(pch, nBytes);
662 handled = msg.readData(pch, nBytes);
674 int CNetMessage::readHeader(const char *pch, unsigned int nBytes)
676 // copy data to temporary parsing buffer
677 unsigned int nRemaining = 24 - nHdrPos;
678 unsigned int nCopy = std::min(nRemaining, nBytes);
680 memcpy(&hdrbuf[nHdrPos], pch, nCopy);
683 // if header incomplete, exit
687 // deserialize to CMessageHeader
691 catch (std::exception &e) {
695 // reject messages larger than MAX_SIZE
696 if (hdr.nMessageSize > MAX_SIZE)
699 // switch state to reading message data
701 vRecv.resize(hdr.nMessageSize);
706 int CNetMessage::readData(const char *pch, unsigned int nBytes)
708 unsigned int nRemaining = hdr.nMessageSize - nDataPos;
709 unsigned int nCopy = std::min(nRemaining, nBytes);
711 memcpy(&vRecv[nDataPos], pch, nCopy);
725 // requires LOCK(cs_vSend)
726 void SocketSendData(CNode *pnode)
728 std::deque<CSerializeData>::iterator it = pnode->vSendMsg.begin();
730 while (it != pnode->vSendMsg.end()) {
731 const CSerializeData &data = *it;
732 assert(data.size() > pnode->nSendOffset);
733 int nBytes = send(pnode->hSocket, &data[pnode->nSendOffset], data.size() - pnode->nSendOffset, MSG_NOSIGNAL | MSG_DONTWAIT);
735 pnode->nLastSend = GetTime();
736 pnode->nSendBytes += nBytes;
737 pnode->nSendOffset += nBytes;
738 pnode->RecordBytesSent(nBytes);
739 if (pnode->nSendOffset == data.size()) {
740 pnode->nSendOffset = 0;
741 pnode->nSendSize -= data.size();
744 // could not send full message; stop sending more
750 int nErr = WSAGetLastError();
751 if (nErr != WSAEWOULDBLOCK && nErr != WSAEMSGSIZE && nErr != WSAEINTR && nErr != WSAEINPROGRESS)
753 LogPrintf("socket send error %d\n", nErr);
754 pnode->CloseSocketDisconnect();
757 // couldn't send anything at all
762 if (it == pnode->vSendMsg.end()) {
763 assert(pnode->nSendOffset == 0);
764 assert(pnode->nSendSize == 0);
766 pnode->vSendMsg.erase(pnode->vSendMsg.begin(), it);
769 static list<CNode*> vNodesDisconnected;
771 void ThreadSocketHandler()
773 unsigned int nPrevNodeCount = 0;
781 // Disconnect unused nodes
782 vector<CNode*> vNodesCopy = vNodes;
783 BOOST_FOREACH(CNode* pnode, vNodesCopy)
785 if (pnode->fDisconnect ||
786 (pnode->GetRefCount() <= 0 && pnode->vRecvMsg.empty() && pnode->nSendSize == 0 && pnode->ssSend.empty()))
788 // remove from vNodes
789 vNodes.erase(remove(vNodes.begin(), vNodes.end(), pnode), vNodes.end());
791 // release outbound grant (if any)
792 pnode->grantOutbound.Release();
794 // close socket and cleanup
795 pnode->CloseSocketDisconnect();
798 // hold in disconnected pool until all refs are released
799 if (pnode->fNetworkNode || pnode->fInbound)
801 vNodesDisconnected.push_back(pnode);
806 // Delete disconnected nodes
807 list<CNode*> vNodesDisconnectedCopy = vNodesDisconnected;
808 BOOST_FOREACH(CNode* pnode, vNodesDisconnectedCopy)
810 // wait until threads are done using it
811 if (pnode->GetRefCount() <= 0)
813 bool fDelete = false;
815 TRY_LOCK(pnode->cs_vSend, lockSend);
818 TRY_LOCK(pnode->cs_vRecvMsg, lockRecv);
821 TRY_LOCK(pnode->cs_inventory, lockInv);
829 vNodesDisconnected.remove(pnode);
835 if(vNodes.size() != nPrevNodeCount) {
836 nPrevNodeCount = vNodes.size();
837 uiInterface.NotifyNumConnectionsChanged(nPrevNodeCount);
842 // Find which sockets have data to receive
844 struct timeval timeout;
846 timeout.tv_usec = 50000; // frequency to poll pnode->vSend
853 FD_ZERO(&fdsetError);
854 SOCKET hSocketMax = 0;
855 bool have_fds = false;
857 BOOST_FOREACH(SOCKET hListenSocket, vhListenSocket) {
858 FD_SET(hListenSocket, &fdsetRecv);
859 hSocketMax = max(hSocketMax, hListenSocket);
864 BOOST_FOREACH(CNode* pnode, vNodes)
866 if (pnode->hSocket == INVALID_SOCKET)
868 FD_SET(pnode->hSocket, &fdsetError);
869 hSocketMax = max(hSocketMax, pnode->hSocket);
872 // Implement the following logic:
873 // * If there is data to send, select() for sending data. As this only
874 // happens when optimistic write failed, we choose to first drain the
875 // write buffer in this case before receiving more. This avoids
876 // needlessly queueing received data, if the remote peer is not themselves
877 // receiving data. This means properly utilizing TCP flow control signalling.
878 // * Otherwise, if there is no (complete) message in the receive buffer,
879 // or there is space left in the buffer, select() for receiving data.
880 // * (if neither of the above applies, there is certainly one message
881 // in the receiver buffer ready to be processed).
882 // Together, that means that at least one of the following is always possible,
883 // so we don't deadlock:
884 // * We send some data.
885 // * We wait for data to be received (and disconnect after timeout).
886 // * We process a message in the buffer (message handler thread).
888 TRY_LOCK(pnode->cs_vSend, lockSend);
889 if (lockSend && !pnode->vSendMsg.empty()) {
890 FD_SET(pnode->hSocket, &fdsetSend);
895 TRY_LOCK(pnode->cs_vRecvMsg, lockRecv);
897 pnode->vRecvMsg.empty() || !pnode->vRecvMsg.front().complete() ||
898 pnode->GetTotalRecvSize() <= ReceiveFloodSize()))
899 FD_SET(pnode->hSocket, &fdsetRecv);
904 int nSelect = select(have_fds ? hSocketMax + 1 : 0,
905 &fdsetRecv, &fdsetSend, &fdsetError, &timeout);
906 boost::this_thread::interruption_point();
908 if (nSelect == SOCKET_ERROR)
912 int nErr = WSAGetLastError();
913 LogPrintf("socket select error %d\n", nErr);
914 for (unsigned int i = 0; i <= hSocketMax; i++)
915 FD_SET(i, &fdsetRecv);
918 FD_ZERO(&fdsetError);
919 MilliSleep(timeout.tv_usec/1000);
924 // Accept new connections
926 BOOST_FOREACH(SOCKET hListenSocket, vhListenSocket)
927 if (hListenSocket != INVALID_SOCKET && FD_ISSET(hListenSocket, &fdsetRecv))
930 struct sockaddr_storage sockaddr;
932 struct sockaddr sockaddr;
934 socklen_t len = sizeof(sockaddr);
935 SOCKET hSocket = accept(hListenSocket, (struct sockaddr*)&sockaddr, &len);
939 if (hSocket != INVALID_SOCKET)
940 if (!addr.SetSockAddr((const struct sockaddr*)&sockaddr))
941 LogPrintf("Warning: Unknown socket family\n");
945 BOOST_FOREACH(CNode* pnode, vNodes)
950 if (hSocket == INVALID_SOCKET)
952 int nErr = WSAGetLastError();
953 if (nErr != WSAEWOULDBLOCK)
954 LogPrintf("socket error accept failed: %d\n", nErr);
956 else if (nInbound >= nMaxConnections - MAX_OUTBOUND_CONNECTIONS)
959 LOCK(cs_setservAddNodeAddresses);
960 if (!setservAddNodeAddresses.count(addr))
961 closesocket(hSocket);
964 else if (CNode::IsBanned(addr))
966 LogPrintf("connection from %s dropped (banned)\n", addr.ToString().c_str());
967 closesocket(hSocket);
971 LogPrint("net", "accepted connection %s\n", addr.ToString().c_str());
972 CNode* pnode = new CNode(hSocket, addr, "", true);
976 vNodes.push_back(pnode);
983 // Service each socket
985 vector<CNode*> vNodesCopy;
989 BOOST_FOREACH(CNode* pnode, vNodesCopy)
992 BOOST_FOREACH(CNode* pnode, vNodesCopy)
994 boost::this_thread::interruption_point();
999 if (pnode->hSocket == INVALID_SOCKET)
1001 if (FD_ISSET(pnode->hSocket, &fdsetRecv) || FD_ISSET(pnode->hSocket, &fdsetError))
1003 TRY_LOCK(pnode->cs_vRecvMsg, lockRecv);
1007 // typical socket buffer is 8K-64K
1008 char pchBuf[0x10000];
1009 int nBytes = recv(pnode->hSocket, pchBuf, sizeof(pchBuf), MSG_DONTWAIT);
1012 if (!pnode->ReceiveMsgBytes(pchBuf, nBytes))
1013 pnode->CloseSocketDisconnect();
1014 pnode->nLastRecv = GetTime();
1015 pnode->nRecvBytes += nBytes;
1016 pnode->RecordBytesRecv(nBytes);
1018 else if (nBytes == 0)
1020 // socket closed gracefully
1021 if (!pnode->fDisconnect)
1022 LogPrint("net", "socket closed\n");
1023 pnode->CloseSocketDisconnect();
1025 else if (nBytes < 0)
1028 int nErr = WSAGetLastError();
1029 if (nErr != WSAEWOULDBLOCK && nErr != WSAEMSGSIZE && nErr != WSAEINTR && nErr != WSAEINPROGRESS)
1031 if (!pnode->fDisconnect)
1032 LogPrintf("socket recv error %d\n", nErr);
1033 pnode->CloseSocketDisconnect();
1043 if (pnode->hSocket == INVALID_SOCKET)
1045 if (FD_ISSET(pnode->hSocket, &fdsetSend))
1047 TRY_LOCK(pnode->cs_vSend, lockSend);
1049 SocketSendData(pnode);
1053 // Inactivity checking
1055 if (pnode->vSendMsg.empty())
1056 pnode->nLastSendEmpty = GetTime();
1057 if (GetTime() - pnode->nTimeConnected > 60)
1059 if (pnode->nLastRecv == 0 || pnode->nLastSend == 0)
1061 LogPrint("net", "socket no message in first 60 seconds, %d %d\n", pnode->nLastRecv != 0, pnode->nLastSend != 0);
1062 pnode->fDisconnect = true;
1064 else if (GetTime() - pnode->nLastSend > 90*60 && GetTime() - pnode->nLastSendEmpty > 90*60)
1066 LogPrintf("socket not sending\n");
1067 pnode->fDisconnect = true;
1069 else if (GetTime() - pnode->nLastRecv > 90*60)
1071 LogPrintf("socket inactivity timeout\n");
1072 pnode->fDisconnect = true;
1078 BOOST_FOREACH(CNode* pnode, vNodesCopy)
1095 void ThreadMapPort()
1097 std::string port = strprintf("%u", GetListenPort());
1098 const char * multicastif = 0;
1099 const char * minissdpdpath = 0;
1100 struct UPNPDev * devlist = 0;
1103 #ifndef UPNPDISCOVER_SUCCESS
1105 devlist = upnpDiscover(2000, multicastif, minissdpdpath, 0);
1109 devlist = upnpDiscover(2000, multicastif, minissdpdpath, 0, 0, &error);
1112 struct UPNPUrls urls;
1113 struct IGDdatas data;
1116 r = UPNP_GetValidIGD(devlist, &urls, &data, lanaddr, sizeof(lanaddr));
1120 char externalIPAddress[40];
1121 r = UPNP_GetExternalIPAddress(urls.controlURL, data.first.servicetype, externalIPAddress);
1122 if(r != UPNPCOMMAND_SUCCESS)
1123 LogPrintf("UPnP: GetExternalIPAddress() returned %d\n", r);
1126 if(externalIPAddress[0])
1128 LogPrintf("UPnP: ExternalIPAddress = %s\n", externalIPAddress);
1129 AddLocal(CNetAddr(externalIPAddress), LOCAL_UPNP);
1132 LogPrintf("UPnP: GetExternalIPAddress failed.\n");
1136 string strDesc = "Bitcoin " + FormatFullVersion();
1140 #ifndef UPNPDISCOVER_SUCCESS
1142 r = UPNP_AddPortMapping(urls.controlURL, data.first.servicetype,
1143 port.c_str(), port.c_str(), lanaddr, strDesc.c_str(), "TCP", 0);
1146 r = UPNP_AddPortMapping(urls.controlURL, data.first.servicetype,
1147 port.c_str(), port.c_str(), lanaddr, strDesc.c_str(), "TCP", 0, "0");
1150 if(r!=UPNPCOMMAND_SUCCESS)
1151 LogPrintf("AddPortMapping(%s, %s, %s) failed with code %d (%s)\n",
1152 port.c_str(), port.c_str(), lanaddr, r, strupnperror(r));
1154 LogPrintf("UPnP Port Mapping successful.\n");;
1156 MilliSleep(20*60*1000); // Refresh every 20 minutes
1159 catch (boost::thread_interrupted)
1161 r = UPNP_DeletePortMapping(urls.controlURL, data.first.servicetype, port.c_str(), "TCP", 0);
1162 LogPrintf("UPNP_DeletePortMapping() returned : %d\n", r);
1163 freeUPNPDevlist(devlist); devlist = 0;
1164 FreeUPNPUrls(&urls);
1168 LogPrintf("No valid UPnP IGDs found\n");
1169 freeUPNPDevlist(devlist); devlist = 0;
1171 FreeUPNPUrls(&urls);
1175 void MapPort(bool fUseUPnP)
1177 static boost::thread* upnp_thread = NULL;
1182 upnp_thread->interrupt();
1183 upnp_thread->join();
1186 upnp_thread = new boost::thread(boost::bind(&TraceThread<void (*)()>, "upnp", &ThreadMapPort));
1188 else if (upnp_thread) {
1189 upnp_thread->interrupt();
1190 upnp_thread->join();
1199 // Intentionally left blank.
1208 void ThreadDNSAddressSeed()
1210 const vector<CDNSSeedData> &vSeeds = Params().DNSSeeds();
1213 LogPrintf("Loading addresses from DNS seeds (could take a while)\n");
1215 BOOST_FOREACH(const CDNSSeedData &seed, vSeeds) {
1216 if (HaveNameProxy()) {
1217 AddOneShot(seed.host);
1219 vector<CNetAddr> vIPs;
1220 vector<CAddress> vAdd;
1221 if (LookupHost(seed.host.c_str(), vIPs))
1223 BOOST_FOREACH(CNetAddr& ip, vIPs)
1225 int nOneDay = 24*3600;
1226 CAddress addr = CAddress(CService(ip, Params().GetDefaultPort()));
1227 addr.nTime = GetTime() - 3*nOneDay - GetRand(4*nOneDay); // use a random age between 3 and 7 days old
1228 vAdd.push_back(addr);
1232 addrman.Add(vAdd, CNetAddr(seed.name, true));
1236 LogPrintf("%d addresses found from DNS seeds\n", found);
1250 void DumpAddresses()
1252 int64 nStart = GetTimeMillis();
1257 LogPrint("net", "Flushed %d addresses to peers.dat %"PRI64d"ms\n",
1258 addrman.size(), GetTimeMillis() - nStart);
1261 void static ProcessOneShot()
1266 if (vOneShots.empty())
1268 strDest = vOneShots.front();
1269 vOneShots.pop_front();
1272 CSemaphoreGrant grant(*semOutbound, true);
1274 if (!OpenNetworkConnection(addr, &grant, strDest.c_str(), true))
1275 AddOneShot(strDest);
1279 void ThreadOpenConnections()
1281 // Connect to specific addresses
1282 if (mapArgs.count("-connect") && mapMultiArgs["-connect"].size() > 0)
1284 for (int64 nLoop = 0;; nLoop++)
1287 BOOST_FOREACH(string strAddr, mapMultiArgs["-connect"])
1290 OpenNetworkConnection(addr, NULL, strAddr.c_str());
1291 for (int i = 0; i < 10 && i < nLoop; i++)
1300 // Initiate network connections
1301 int64 nStart = GetTime();
1308 CSemaphoreGrant grant(*semOutbound);
1309 boost::this_thread::interruption_point();
1311 // Add seed nodes if DNS seeds are all down (an infrastructure attack?).
1312 if (addrman.size() == 0 && (GetTime() - nStart > 60)) {
1313 static bool done = false;
1315 LogPrintf("Adding fixed seed nodes as DNS doesn't seem to be available.\n");
1316 addrman.Add(Params().FixedSeeds(), CNetAddr("127.0.0.1"));
1322 // Choose an address to connect to based on most recently seen
1324 CAddress addrConnect;
1326 // Only connect out to one peer per network group (/16 for IPv4).
1327 // Do this here so we don't have to critsect vNodes inside mapAddresses critsect.
1329 set<vector<unsigned char> > setConnected;
1332 BOOST_FOREACH(CNode* pnode, vNodes) {
1333 if (!pnode->fInbound) {
1334 setConnected.insert(pnode->addr.GetGroup());
1340 int64 nANow = GetAdjustedTime();
1345 // use an nUnkBias between 10 (no outgoing connections) and 90 (8 outgoing connections)
1346 CAddress addr = addrman.Select(10 + min(nOutbound,8)*10);
1348 // if we selected an invalid address, restart
1349 if (!addr.IsValid() || setConnected.count(addr.GetGroup()) || IsLocal(addr))
1352 // If we didn't find an appropriate destination after trying 100 addresses fetched from addrman,
1353 // stop this loop, and let the outer loop run again (which sleeps, adds seed nodes, recalculates
1354 // already-connected network ranges, ...) before trying new addrman addresses.
1359 if (IsLimited(addr))
1362 // only consider very recently tried nodes after 30 failed attempts
1363 if (nANow - addr.nLastTry < 600 && nTries < 30)
1366 // do not allow non-default ports, unless after 50 invalid addresses selected already
1367 if (addr.GetPort() != Params().GetDefaultPort() && nTries < 50)
1374 if (addrConnect.IsValid())
1375 OpenNetworkConnection(addrConnect, &grant);
1379 void ThreadOpenAddedConnections()
1382 LOCK(cs_vAddedNodes);
1383 vAddedNodes = mapMultiArgs["-addnode"];
1386 if (HaveNameProxy()) {
1388 list<string> lAddresses(0);
1390 LOCK(cs_vAddedNodes);
1391 BOOST_FOREACH(string& strAddNode, vAddedNodes)
1392 lAddresses.push_back(strAddNode);
1394 BOOST_FOREACH(string& strAddNode, lAddresses) {
1396 CSemaphoreGrant grant(*semOutbound);
1397 OpenNetworkConnection(addr, &grant, strAddNode.c_str());
1400 MilliSleep(120000); // Retry every 2 minutes
1404 for (unsigned int i = 0; true; i++)
1406 list<string> lAddresses(0);
1408 LOCK(cs_vAddedNodes);
1409 BOOST_FOREACH(string& strAddNode, vAddedNodes)
1410 lAddresses.push_back(strAddNode);
1413 list<vector<CService> > lservAddressesToAdd(0);
1414 BOOST_FOREACH(string& strAddNode, lAddresses)
1416 vector<CService> vservNode(0);
1417 if(Lookup(strAddNode.c_str(), vservNode, Params().GetDefaultPort(), fNameLookup, 0))
1419 lservAddressesToAdd.push_back(vservNode);
1421 LOCK(cs_setservAddNodeAddresses);
1422 BOOST_FOREACH(CService& serv, vservNode)
1423 setservAddNodeAddresses.insert(serv);
1427 // Attempt to connect to each IP for each addnode entry until at least one is successful per addnode entry
1428 // (keeping in mind that addnode entries can have many IPs if fNameLookup)
1431 BOOST_FOREACH(CNode* pnode, vNodes)
1432 for (list<vector<CService> >::iterator it = lservAddressesToAdd.begin(); it != lservAddressesToAdd.end(); it++)
1433 BOOST_FOREACH(CService& addrNode, *(it))
1434 if (pnode->addr == addrNode)
1436 it = lservAddressesToAdd.erase(it);
1441 BOOST_FOREACH(vector<CService>& vserv, lservAddressesToAdd)
1443 CSemaphoreGrant grant(*semOutbound);
1444 OpenNetworkConnection(CAddress(vserv[i % vserv.size()]), &grant);
1447 MilliSleep(120000); // Retry every 2 minutes
1451 // if successful, this moves the passed grant to the constructed node
1452 bool OpenNetworkConnection(const CAddress& addrConnect, CSemaphoreGrant *grantOutbound, const char *strDest, bool fOneShot)
1455 // Initiate outbound network connection
1457 boost::this_thread::interruption_point();
1459 if (IsLocal(addrConnect) ||
1460 FindNode((CNetAddr)addrConnect) || CNode::IsBanned(addrConnect) ||
1461 FindNode(addrConnect.ToStringIPPort().c_str()))
1463 if (strDest && FindNode(strDest))
1466 CNode* pnode = ConnectNode(addrConnect, strDest);
1467 boost::this_thread::interruption_point();
1472 grantOutbound->MoveTo(pnode->grantOutbound);
1473 pnode->fNetworkNode = true;
1475 pnode->fOneShot = true;
1481 // for now, use a very simple selection metric: the node from which we received
1483 double static NodeSyncScore(const CNode *pnode) {
1484 return -pnode->nLastRecv;
1487 void static StartSync(const vector<CNode*> &vNodes) {
1488 CNode *pnodeNewSync = NULL;
1489 double dBestScore = 0;
1491 int nBestHeight = g_signals.GetHeight().get_value_or(0);
1493 // Iterate over all nodes
1494 BOOST_FOREACH(CNode* pnode, vNodes) {
1495 // check preconditions for allowing a sync
1496 if (!pnode->fClient && !pnode->fOneShot &&
1497 !pnode->fDisconnect && pnode->fSuccessfullyConnected &&
1498 (pnode->nStartingHeight > (nBestHeight - 144)) &&
1499 (pnode->nVersion < NOBLKS_VERSION_START || pnode->nVersion >= NOBLKS_VERSION_END)) {
1500 // if ok, compare node's score with the best so far
1501 double dScore = NodeSyncScore(pnode);
1502 if (pnodeNewSync == NULL || dScore > dBestScore) {
1503 pnodeNewSync = pnode;
1504 dBestScore = dScore;
1508 // if a new sync candidate was found, start sync!
1510 pnodeNewSync->fStartSync = true;
1511 pnodeSync = pnodeNewSync;
1515 void ThreadMessageHandler()
1517 SetThreadPriority(THREAD_PRIORITY_BELOW_NORMAL);
1520 bool fHaveSyncNode = false;
1522 vector<CNode*> vNodesCopy;
1525 vNodesCopy = vNodes;
1526 BOOST_FOREACH(CNode* pnode, vNodesCopy) {
1528 if (pnode == pnodeSync)
1529 fHaveSyncNode = true;
1534 StartSync(vNodesCopy);
1536 // Poll the connected nodes for messages
1537 CNode* pnodeTrickle = NULL;
1538 if (!vNodesCopy.empty())
1539 pnodeTrickle = vNodesCopy[GetRand(vNodesCopy.size())];
1540 BOOST_FOREACH(CNode* pnode, vNodesCopy)
1542 if (pnode->fDisconnect)
1547 TRY_LOCK(pnode->cs_vRecvMsg, lockRecv);
1549 if (!g_signals.ProcessMessages(pnode))
1550 pnode->CloseSocketDisconnect();
1552 boost::this_thread::interruption_point();
1556 TRY_LOCK(pnode->cs_vSend, lockSend);
1558 g_signals.SendMessages(pnode, pnode == pnodeTrickle);
1560 boost::this_thread::interruption_point();
1565 BOOST_FOREACH(CNode* pnode, vNodesCopy)
1578 bool BindListenPort(const CService &addrBind, string& strError)
1583 // Create socket for listening for incoming connections
1585 struct sockaddr_storage sockaddr;
1587 struct sockaddr sockaddr;
1589 socklen_t len = sizeof(sockaddr);
1590 if (!addrBind.GetSockAddr((struct sockaddr*)&sockaddr, &len))
1592 strError = strprintf("Error: bind address family for %s not supported", addrBind.ToString().c_str());
1593 LogPrintf("%s\n", strError.c_str());
1597 SOCKET hListenSocket = socket(((struct sockaddr*)&sockaddr)->sa_family, SOCK_STREAM, IPPROTO_TCP);
1598 if (hListenSocket == INVALID_SOCKET)
1600 strError = strprintf("Error: Couldn't open socket for incoming connections (socket returned error %d)", WSAGetLastError());
1601 LogPrintf("%s\n", strError.c_str());
1606 // Different way of disabling SIGPIPE on BSD
1607 setsockopt(hListenSocket, SOL_SOCKET, SO_NOSIGPIPE, (void*)&nOne, sizeof(int));
1611 // Allow binding if the port is still in TIME_WAIT state after
1612 // the program was closed and restarted. Not an issue on windows.
1613 setsockopt(hListenSocket, SOL_SOCKET, SO_REUSEADDR, (void*)&nOne, sizeof(int));
1618 // Set to non-blocking, incoming connections will also inherit this
1619 if (ioctlsocket(hListenSocket, FIONBIO, (u_long*)&nOne) == SOCKET_ERROR)
1621 if (fcntl(hListenSocket, F_SETFL, O_NONBLOCK) == SOCKET_ERROR)
1624 strError = strprintf("Error: Couldn't set properties on socket for incoming connections (error %d)", WSAGetLastError());
1625 LogPrintf("%s\n", strError.c_str());
1630 // some systems don't have IPV6_V6ONLY but are always v6only; others do have the option
1631 // and enable it by default or not. Try to enable it, if possible.
1632 if (addrBind.IsIPv6()) {
1635 setsockopt(hListenSocket, IPPROTO_IPV6, IPV6_V6ONLY, (const char*)&nOne, sizeof(int));
1637 setsockopt(hListenSocket, IPPROTO_IPV6, IPV6_V6ONLY, (void*)&nOne, sizeof(int));
1641 int nProtLevel = 10 /* PROTECTION_LEVEL_UNRESTRICTED */;
1642 int nParameterId = 23 /* IPV6_PROTECTION_LEVEl */;
1643 // this call is allowed to fail
1644 setsockopt(hListenSocket, IPPROTO_IPV6, nParameterId, (const char*)&nProtLevel, sizeof(int));
1649 if (::bind(hListenSocket, (struct sockaddr*)&sockaddr, len) == SOCKET_ERROR)
1651 int nErr = WSAGetLastError();
1652 if (nErr == WSAEADDRINUSE)
1653 strError = strprintf(_("Unable to bind to %s on this computer. Bitcoin is probably already running."), addrBind.ToString().c_str());
1655 strError = strprintf(_("Unable to bind to %s on this computer (bind returned error %d, %s)"), addrBind.ToString().c_str(), nErr, strerror(nErr));
1656 LogPrintf("%s\n", strError.c_str());
1659 LogPrintf("Bound to %s\n", addrBind.ToString().c_str());
1661 // Listen for incoming connections
1662 if (listen(hListenSocket, SOMAXCONN) == SOCKET_ERROR)
1664 strError = strprintf("Error: Listening for incoming connections failed (listen returned error %d)", WSAGetLastError());
1665 LogPrintf("%s\n", strError.c_str());
1669 vhListenSocket.push_back(hListenSocket);
1671 if (addrBind.IsRoutable() && fDiscover)
1672 AddLocal(addrBind, LOCAL_BIND);
1677 void static Discover()
1683 // Get local host IP
1684 char pszHostName[1000] = "";
1685 if (gethostname(pszHostName, sizeof(pszHostName)) != SOCKET_ERROR)
1687 vector<CNetAddr> vaddr;
1688 if (LookupHost(pszHostName, vaddr))
1690 BOOST_FOREACH (const CNetAddr &addr, vaddr)
1692 AddLocal(addr, LOCAL_IF);
1697 // Get local host ip
1698 struct ifaddrs* myaddrs;
1699 if (getifaddrs(&myaddrs) == 0)
1701 for (struct ifaddrs* ifa = myaddrs; ifa != NULL; ifa = ifa->ifa_next)
1703 if (ifa->ifa_addr == NULL) continue;
1704 if ((ifa->ifa_flags & IFF_UP) == 0) continue;
1705 if (strcmp(ifa->ifa_name, "lo") == 0) continue;
1706 if (strcmp(ifa->ifa_name, "lo0") == 0) continue;
1707 if (ifa->ifa_addr->sa_family == AF_INET)
1709 struct sockaddr_in* s4 = (struct sockaddr_in*)(ifa->ifa_addr);
1710 CNetAddr addr(s4->sin_addr);
1711 if (AddLocal(addr, LOCAL_IF))
1712 LogPrintf("IPv4 %s: %s\n", ifa->ifa_name, addr.ToString().c_str());
1715 else if (ifa->ifa_addr->sa_family == AF_INET6)
1717 struct sockaddr_in6* s6 = (struct sockaddr_in6*)(ifa->ifa_addr);
1718 CNetAddr addr(s6->sin6_addr);
1719 if (AddLocal(addr, LOCAL_IF))
1720 LogPrintf("IPv6 %s: %s\n", ifa->ifa_name, addr.ToString().c_str());
1724 freeifaddrs(myaddrs);
1728 // Don't use external IPv4 discovery, when -onlynet="IPv6"
1729 if (!IsLimited(NET_IPV4))
1730 boost::thread(boost::bind(&TraceThread<void (*)()>, "ext-ip", &ThreadGetMyExternalIP));
1733 void StartNode(boost::thread_group& threadGroup)
1735 if (semOutbound == NULL) {
1736 // initialize semaphore
1737 int nMaxOutbound = min(MAX_OUTBOUND_CONNECTIONS, nMaxConnections);
1738 semOutbound = new CSemaphore(nMaxOutbound);
1741 if (pnodeLocalHost == NULL)
1742 pnodeLocalHost = new CNode(INVALID_SOCKET, CAddress(CService("127.0.0.1", 0), nLocalServices));
1750 if (!GetBoolArg("-dnsseed", true))
1751 LogPrintf("DNS seeding disabled\n");
1753 threadGroup.create_thread(boost::bind(&TraceThread<void (*)()>, "dnsseed", &ThreadDNSAddressSeed));
1756 // Map ports with UPnP
1757 MapPort(GetBoolArg("-upnp", USE_UPNP));
1760 // Send and receive from sockets, accept connections
1761 threadGroup.create_thread(boost::bind(&TraceThread<void (*)()>, "net", &ThreadSocketHandler));
1763 // Initiate outbound connections from -addnode
1764 threadGroup.create_thread(boost::bind(&TraceThread<void (*)()>, "addcon", &ThreadOpenAddedConnections));
1766 // Initiate outbound connections
1767 threadGroup.create_thread(boost::bind(&TraceThread<void (*)()>, "opencon", &ThreadOpenConnections));
1770 threadGroup.create_thread(boost::bind(&TraceThread<void (*)()>, "msghand", &ThreadMessageHandler));
1772 // Dump network addresses
1773 threadGroup.create_thread(boost::bind(&LoopForever<void (*)()>, "dumpaddr", &DumpAddresses, DUMP_ADDRESSES_INTERVAL * 1000));
1778 LogPrintf("StopNode()\n");
1781 for (int i=0; i<MAX_OUTBOUND_CONNECTIONS; i++)
1782 semOutbound->post();
1798 BOOST_FOREACH(CNode* pnode, vNodes)
1799 if (pnode->hSocket != INVALID_SOCKET)
1800 closesocket(pnode->hSocket);
1801 BOOST_FOREACH(SOCKET hListenSocket, vhListenSocket)
1802 if (hListenSocket != INVALID_SOCKET)
1803 if (closesocket(hListenSocket) == SOCKET_ERROR)
1804 LogPrintf("closesocket(hListenSocket) failed with error %d\n", WSAGetLastError());
1806 // clean up some globals (to help leak detection)
1807 BOOST_FOREACH(CNode *pnode, vNodes)
1809 BOOST_FOREACH(CNode *pnode, vNodesDisconnected)
1812 vNodesDisconnected.clear();
1815 delete pnodeLocalHost;
1816 pnodeLocalHost = NULL;
1819 // Shutdown Windows Sockets
1824 instance_of_cnetcleanup;
1832 void RelayTransaction(const CTransaction& tx, const uint256& hash)
1834 CDataStream ss(SER_NETWORK, PROTOCOL_VERSION);
1837 RelayTransaction(tx, hash, ss);
1840 void RelayTransaction(const CTransaction& tx, const uint256& hash, const CDataStream& ss)
1842 CInv inv(MSG_TX, hash);
1845 // Expire old relay messages
1846 while (!vRelayExpiration.empty() && vRelayExpiration.front().first < GetTime())
1848 mapRelay.erase(vRelayExpiration.front().second);
1849 vRelayExpiration.pop_front();
1852 // Save original serialized message so newer versions are preserved
1853 mapRelay.insert(std::make_pair(inv, ss));
1854 vRelayExpiration.push_back(std::make_pair(GetTime() + 15 * 60, inv));
1857 BOOST_FOREACH(CNode* pnode, vNodes)
1859 if(!pnode->fRelayTxes)
1861 LOCK(pnode->cs_filter);
1864 if (pnode->pfilter->IsRelevantAndUpdate(tx, hash))
1865 pnode->PushInventory(inv);
1867 pnode->PushInventory(inv);
1871 void CNode::RecordBytesRecv(uint64 bytes)
1873 LOCK(cs_totalBytesRecv);
1874 nTotalBytesRecv += bytes;
1877 void CNode::RecordBytesSent(uint64 bytes)
1879 LOCK(cs_totalBytesSent);
1880 nTotalBytesSent += bytes;
1883 uint64 CNode::GetTotalBytesRecv()
1885 LOCK(cs_totalBytesRecv);
1886 return nTotalBytesRecv;
1889 uint64 CNode::GetTotalBytesSent()
1891 LOCK(cs_totalBytesSent);
1892 return nTotalBytesSent;