2010-08-29 09:58:15 -07:00
|
|
|
// Copyright (c) 2009-2010 Satoshi Nakamoto
|
2014-12-16 17:47:57 -08:00
|
|
|
// Copyright (c) 2009-2014 The Bitcoin Core developers
|
2022-05-11 16:23:09 -07:00
|
|
|
// Copyright (c) 2016-2022 The Zcash developers
|
2014-12-12 20:09:33 -08:00
|
|
|
// Distributed under the MIT software license, see the accompanying
|
2019-07-18 07:16:09 -07:00
|
|
|
// file COPYING or https://www.opensource.org/licenses/mit-license.php .
|
2013-04-12 22:13:08 -07:00
|
|
|
|
2011-05-15 00:11:04 -07:00
|
|
|
#ifndef BITCOIN_NET_H
|
|
|
|
#define BITCOIN_NET_H
|
|
|
|
|
2016-04-15 21:13:15 -07:00
|
|
|
#include "addrdb.h"
|
2013-04-12 22:13:08 -07:00
|
|
|
#include "bloom.h"
|
|
|
|
#include "compat.h"
|
2017-03-01 07:54:22 -08:00
|
|
|
#include "fs.h"
|
2013-04-12 22:13:08 -07:00
|
|
|
#include "limitedmap.h"
|
|
|
|
#include "netbase.h"
|
|
|
|
#include "protocol.h"
|
2014-06-26 05:41:53 -07:00
|
|
|
#include "random.h"
|
2014-10-22 12:08:30 -07:00
|
|
|
#include "streams.h"
|
2013-04-12 22:13:08 -07:00
|
|
|
#include "sync.h"
|
|
|
|
#include "uint256.h"
|
2018-10-22 15:51:11 -07:00
|
|
|
#include "util/strencodings.h"
|
2020-07-10 10:34:53 -07:00
|
|
|
#include "chainparams.h"
|
2013-04-12 22:13:08 -07:00
|
|
|
|
2016-05-20 09:19:26 -07:00
|
|
|
#include <atomic>
|
2011-05-15 00:11:04 -07:00
|
|
|
#include <deque>
|
2013-04-12 22:13:08 -07:00
|
|
|
#include <stdint.h>
|
2011-05-15 00:11:04 -07:00
|
|
|
|
2011-10-07 08:02:21 -07:00
|
|
|
#ifndef WIN32
|
2011-05-15 00:11:04 -07:00
|
|
|
#include <arpa/inet.h>
|
|
|
|
#endif
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2013-04-12 22:13:08 -07:00
|
|
|
#include <boost/signals2/signal.hpp>
|
2013-06-06 00:04:33 -07:00
|
|
|
|
2020-07-24 16:34:17 -07:00
|
|
|
#include <tracing.h>
|
|
|
|
|
2013-04-12 22:13:08 -07:00
|
|
|
class CAddrMan;
|
2010-08-29 09:58:15 -07:00
|
|
|
class CBlockIndex;
|
2015-04-02 09:04:59 -07:00
|
|
|
class CScheduler;
|
2013-04-12 22:13:08 -07:00
|
|
|
class CNode;
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2013-04-12 22:13:08 -07:00
|
|
|
namespace boost {
|
|
|
|
class thread_group;
|
2014-06-24 05:17:43 -07:00
|
|
|
} // namespace boost
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2013-10-14 15:34:20 -07:00
|
|
|
/** Time between pings automatically sent out for latency probing and keepalive (in seconds). */
|
|
|
|
static const int PING_INTERVAL = 2 * 60;
|
|
|
|
/** Time after which to disconnect, after waiting for a ping response (or inactivity). */
|
|
|
|
static const int TIMEOUT_INTERVAL = 20 * 60;
|
2013-04-12 22:13:08 -07:00
|
|
|
/** The maximum number of entries in an 'inv' protocol message */
|
|
|
|
static const unsigned int MAX_INV_SZ = 50000;
|
2014-11-21 03:22:11 -08:00
|
|
|
/** The maximum number of new addresses to accumulate before announcing. */
|
|
|
|
static const unsigned int MAX_ADDR_TO_SEND = 1000;
|
2021-06-30 11:52:40 -07:00
|
|
|
/** The maximum rate of address records we're willing to process on average. Can be bypassed using
|
|
|
|
* the NetPermissionFlags::Addr permission. */
|
|
|
|
static constexpr double MAX_ADDR_RATE_PER_SECOND{0.1};
|
|
|
|
/** The soft limit of the address processing token bucket (the regular MAX_ADDR_RATE_PER_SECOND
|
|
|
|
* based increments won't go above this, but the MAX_ADDR_TO_SEND increment following GETADDR
|
|
|
|
* is exempt from this limit. */
|
|
|
|
static constexpr size_t MAX_ADDR_PROCESSING_TOKEN_BUCKET{MAX_ADDR_TO_SEND};
|
2015-03-05 04:01:22 -08:00
|
|
|
/** Maximum length of incoming protocol messages (no message over 2 MiB is currently acceptable). */
|
|
|
|
static const unsigned int MAX_PROTOCOL_MESSAGE_LENGTH = 2 * 1024 * 1024;
|
2015-07-31 09:05:42 -07:00
|
|
|
/** Maximum length of strSubVer in `version` message */
|
|
|
|
static const unsigned int MAX_SUBVERSION_LENGTH = 256;
|
2014-05-29 04:02:22 -07:00
|
|
|
/** -listen default */
|
|
|
|
static const bool DEFAULT_LISTEN = true;
|
2014-09-09 00:18:05 -07:00
|
|
|
/** The maximum number of entries in mapAskFor */
|
|
|
|
static const size_t MAPASKFOR_MAX_SZ = MAX_INV_SZ;
|
2015-11-22 17:54:23 -08:00
|
|
|
/** The maximum number of entries in setAskFor (larger due to getdata latency)*/
|
|
|
|
static const size_t SETASKFOR_MAX_SZ = 2 * MAX_INV_SZ;
|
2015-08-01 10:41:21 -07:00
|
|
|
/** The maximum number of peer connections to maintain. */
|
|
|
|
static const unsigned int DEFAULT_MAX_PEER_CONNECTIONS = 125;
|
2015-11-05 15:05:06 -08:00
|
|
|
/** The default for -maxuploadtarget. 0 = Unlimited */
|
|
|
|
static const uint64_t DEFAULT_MAX_UPLOAD_TARGET = 0;
|
2015-11-14 04:47:53 -08:00
|
|
|
/** Default for blocks only*/
|
|
|
|
static const bool DEFAULT_BLOCKSONLY = false;
|
2020-04-21 17:15:06 -07:00
|
|
|
/**
|
|
|
|
* The period before a network upgrade activates, where connections to upgrading peers are preferred (in blocks).
|
|
|
|
* This was three days for upgrades up to and including Blossom, and is 1.5 days from Heartwood onward.
|
|
|
|
*/
|
|
|
|
static const int NETWORK_UPGRADE_PEER_PREFERENCE_BLOCK_PERIOD = 1728;
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2015-06-27 12:21:41 -07:00
|
|
|
static const bool DEFAULT_FORCEDNSSEED = false;
|
|
|
|
static const size_t DEFAULT_MAXRECEIVEBUFFER = 5 * 1000;
|
|
|
|
static const size_t DEFAULT_MAXSENDBUFFER = 1 * 1000;
|
|
|
|
|
|
|
|
// NOTE: When adjusting this, update rpcnet:setban's help ("24h")
|
|
|
|
static const unsigned int DEFAULT_MISBEHAVING_BANTIME = 60 * 60 * 24; // Default 24-hour ban
|
|
|
|
|
2014-08-20 20:17:21 -07:00
|
|
|
unsigned int ReceiveFloodSize();
|
|
|
|
unsigned int SendBufferSize();
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2015-05-31 06:36:44 -07:00
|
|
|
void AddOneShot(const std::string& strDest);
|
2012-01-03 14:33:31 -08:00
|
|
|
void AddressCurrentlyConnected(const CService& addr);
|
|
|
|
CNode* FindNode(const CNetAddr& ip);
|
2015-05-25 11:03:51 -07:00
|
|
|
CNode* FindNode(const CSubNet& subNet);
|
2014-07-24 07:29:41 -07:00
|
|
|
CNode* FindNode(const std::string& addrName);
|
2012-01-03 14:33:31 -08:00
|
|
|
CNode* FindNode(const CService& ip);
|
2014-05-24 02:14:52 -07:00
|
|
|
CNode* ConnectNode(CAddress addrConnect, const char *pszDest = NULL);
|
2014-05-09 15:39:49 -07:00
|
|
|
bool OpenNetworkConnection(const CAddress& addrConnect, CSemaphoreGrant *grantOutbound = NULL, const char *strDest = NULL, bool fOneShot = false);
|
2012-05-12 16:26:14 -07:00
|
|
|
unsigned short GetListenPort();
|
2014-06-21 04:34:36 -07:00
|
|
|
bool BindListenPort(const CService &bindAddr, std::string& strError, bool fWhitelisted = false);
|
2015-04-02 09:04:59 -07:00
|
|
|
void StartNode(boost::thread_group& threadGroup, CScheduler& scheduler);
|
2010-08-29 09:58:15 -07:00
|
|
|
bool StopNode();
|
2012-11-15 15:20:26 -08:00
|
|
|
void SocketSendData(CNode *pnode);
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2013-11-17 16:25:17 -08:00
|
|
|
typedef int NodeId;
|
|
|
|
|
2015-03-05 04:01:01 -08:00
|
|
|
struct CombinerAll
|
|
|
|
{
|
|
|
|
typedef bool result_type;
|
|
|
|
|
|
|
|
template<typename I>
|
|
|
|
bool operator()(I first, I last) const
|
|
|
|
{
|
|
|
|
while (first != last) {
|
|
|
|
if (!(*first)) return false;
|
|
|
|
++first;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2013-06-05 20:21:41 -07:00
|
|
|
// Signals for message handling
|
|
|
|
struct CNodeSignals
|
|
|
|
{
|
2013-10-10 14:07:44 -07:00
|
|
|
boost::signals2::signal<int ()> GetHeight;
|
2020-07-10 10:34:53 -07:00
|
|
|
boost::signals2::signal<bool (const CChainParams&, CNode*), CombinerAll> ProcessMessages;
|
2015-04-08 11:20:00 -07:00
|
|
|
boost::signals2::signal<bool (const Consensus::Params&, CNode*), CombinerAll> SendMessages;
|
2013-11-17 16:25:17 -08:00
|
|
|
boost::signals2::signal<void (NodeId, const CNode*)> InitializeNode;
|
|
|
|
boost::signals2::signal<void (NodeId)> FinalizeNode;
|
2013-06-05 20:21:41 -07:00
|
|
|
};
|
|
|
|
|
2013-11-17 16:25:17 -08:00
|
|
|
|
2013-06-05 20:21:41 -07:00
|
|
|
CNodeSignals& GetNodeSignals();
|
2013-01-07 08:07:51 -08:00
|
|
|
|
|
|
|
|
2012-02-12 04:45:24 -08:00
|
|
|
enum
|
|
|
|
{
|
2012-05-10 11:35:13 -07:00
|
|
|
LOCAL_NONE, // unknown
|
|
|
|
LOCAL_IF, // address a local interface listens on
|
2012-05-11 06:28:59 -07:00
|
|
|
LOCAL_BIND, // address explicit bound to
|
2017-07-03 00:57:05 -07:00
|
|
|
LOCAL_UPNP, // unused (was: address reported by UPnP)
|
2012-05-10 11:35:13 -07:00
|
|
|
LOCAL_MANUAL, // address explicitly specified (-externalip=)
|
2012-02-19 11:44:35 -08:00
|
|
|
|
|
|
|
LOCAL_MAX
|
2012-02-12 04:45:24 -08:00
|
|
|
};
|
|
|
|
|
2014-07-20 23:32:25 -07:00
|
|
|
bool IsPeerAddrLocalGood(CNode *pnode);
|
|
|
|
void AdvertizeLocal(CNode *pnode);
|
2012-05-04 07:46:22 -07:00
|
|
|
void SetLimited(enum Network net, bool fLimited = true);
|
2012-05-14 08:15:58 -07:00
|
|
|
bool IsLimited(enum Network net);
|
2012-05-04 07:46:22 -07:00
|
|
|
bool IsLimited(const CNetAddr& addr);
|
2012-05-10 11:35:13 -07:00
|
|
|
bool AddLocal(const CService& addr, int nScore = LOCAL_NONE);
|
2012-05-12 16:26:14 -07:00
|
|
|
bool AddLocal(const CNetAddr& addr, int nScore = LOCAL_NONE);
|
2015-09-08 08:48:45 -07:00
|
|
|
bool RemoveLocal(const CService& addr);
|
2012-05-10 11:35:13 -07:00
|
|
|
bool SeenLocal(const CService& addr);
|
|
|
|
bool IsLocal(const CService& addr);
|
|
|
|
bool GetLocal(CService &addr, const CNetAddr *paddrPeer = NULL);
|
2014-07-30 06:31:36 -07:00
|
|
|
bool IsReachable(enum Network net);
|
2012-04-10 11:22:04 -07:00
|
|
|
bool IsReachable(const CNetAddr &addr);
|
2012-02-12 04:45:24 -08:00
|
|
|
CAddress GetLocalAddress(const CNetAddr *paddrPeer = NULL);
|
|
|
|
|
2012-04-10 11:22:04 -07:00
|
|
|
|
2012-05-24 10:02:21 -07:00
|
|
|
extern bool fDiscover;
|
2014-05-29 03:33:17 -07:00
|
|
|
extern bool fListen;
|
2013-04-12 22:13:08 -07:00
|
|
|
extern uint64_t nLocalServices;
|
|
|
|
extern uint64_t nLocalHostNonce;
|
2012-01-04 14:39:45 -08:00
|
|
|
extern CAddrMan addrman;
|
2014-11-16 03:19:23 -08:00
|
|
|
|
2015-08-13 17:32:57 -07:00
|
|
|
/** Maximum number of connections to simultaneously allow (aka connection slots) */
|
2013-04-25 15:46:47 -07:00
|
|
|
extern int nMaxConnections;
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2011-05-15 00:11:04 -07:00
|
|
|
extern std::vector<CNode*> vNodes;
|
2010-08-29 09:58:15 -07:00
|
|
|
extern CCriticalSection cs_vNodes;
|
2021-09-08 16:43:59 -07:00
|
|
|
extern limitedmap<WTxId, int64_t> mapAlreadyAskedFor;
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2012-07-02 10:55:16 -07:00
|
|
|
extern std::vector<std::string> vAddedNodes;
|
|
|
|
extern CCriticalSection cs_vAddedNodes;
|
|
|
|
|
2013-11-17 16:25:17 -08:00
|
|
|
extern NodeId nLastNodeId;
|
|
|
|
extern CCriticalSection cs_nLastNodeId;
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2015-07-31 09:05:42 -07:00
|
|
|
/** Subversion as sent to the P2P network in `version` messages */
|
|
|
|
extern std::string strSubVersion;
|
|
|
|
|
2014-05-05 04:22:28 -07:00
|
|
|
struct LocalServiceInfo {
|
|
|
|
int nScore;
|
|
|
|
int nPort;
|
|
|
|
};
|
|
|
|
|
|
|
|
extern CCriticalSection cs_mapLocalHost;
|
2014-06-04 03:52:15 -07:00
|
|
|
extern std::map<CNetAddr, LocalServiceInfo> mapLocalHost;
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2012-06-29 14:24:53 -07:00
|
|
|
class CNodeStats
|
|
|
|
{
|
|
|
|
public:
|
2013-11-17 16:25:17 -08:00
|
|
|
NodeId nodeid;
|
2013-04-12 22:13:08 -07:00
|
|
|
uint64_t nServices;
|
2015-11-20 15:51:44 -08:00
|
|
|
bool fRelayTxes;
|
2013-04-12 22:13:08 -07:00
|
|
|
int64_t nLastSend;
|
|
|
|
int64_t nLastRecv;
|
|
|
|
int64_t nTimeConnected;
|
2014-12-15 02:06:15 -08:00
|
|
|
int64_t nTimeOffset;
|
2012-06-29 14:24:53 -07:00
|
|
|
std::string addrName;
|
|
|
|
int nVersion;
|
2013-11-26 03:52:21 -08:00
|
|
|
std::string cleanSubVer;
|
2012-06-29 14:24:53 -07:00
|
|
|
bool fInbound;
|
|
|
|
int nStartingHeight;
|
2013-04-12 22:13:08 -07:00
|
|
|
uint64_t nSendBytes;
|
|
|
|
uint64_t nRecvBytes;
|
2014-06-21 04:34:36 -07:00
|
|
|
bool fWhitelisted;
|
2013-08-22 04:34:33 -07:00
|
|
|
double dPingTime;
|
|
|
|
double dPingWait;
|
2013-08-21 22:50:19 -07:00
|
|
|
std::string addrLocal;
|
2012-06-29 14:24:53 -07:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2012-11-15 16:41:12 -08:00
|
|
|
class CNetMessage {
|
|
|
|
public:
|
|
|
|
bool in_data; // parsing header (false) or data (true)
|
|
|
|
|
|
|
|
CDataStream hdrbuf; // partially received header
|
|
|
|
CMessageHeader hdr; // complete header
|
|
|
|
unsigned int nHdrPos;
|
|
|
|
|
|
|
|
CDataStream vRecv; // received message data
|
|
|
|
unsigned int nDataPos;
|
|
|
|
|
2014-07-06 07:06:46 -07:00
|
|
|
int64_t nTime; // time (in microseconds) of message receipt.
|
|
|
|
|
2014-10-27 17:24:31 -07:00
|
|
|
CNetMessage(const CMessageHeader::MessageStartChars& pchMessageStartIn, int nTypeIn, int nVersionIn) : hdrbuf(nTypeIn, nVersionIn), hdr(pchMessageStartIn), vRecv(nTypeIn, nVersionIn) {
|
2012-11-15 16:41:12 -08:00
|
|
|
hdrbuf.resize(24);
|
|
|
|
in_data = false;
|
|
|
|
nHdrPos = 0;
|
|
|
|
nDataPos = 0;
|
2014-07-06 07:06:46 -07:00
|
|
|
nTime = 0;
|
2012-11-15 16:41:12 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
bool complete() const
|
|
|
|
{
|
|
|
|
if (!in_data)
|
|
|
|
return false;
|
|
|
|
return (hdr.nMessageSize == nDataPos);
|
|
|
|
}
|
|
|
|
|
|
|
|
void SetVersion(int nVersionIn)
|
|
|
|
{
|
|
|
|
hdrbuf.SetVersion(nVersionIn);
|
|
|
|
vRecv.SetVersion(nVersionIn);
|
|
|
|
}
|
|
|
|
|
|
|
|
int readHeader(const char *pch, unsigned int nBytes);
|
|
|
|
int readData(const char *pch, unsigned int nBytes);
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2012-03-26 07:48:23 -07:00
|
|
|
/** Information about a peer */
|
2010-08-29 09:58:15 -07:00
|
|
|
class CNode
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
// socket
|
2017-02-06 09:20:16 -08:00
|
|
|
std::atomic<uint64_t> nServices;
|
2010-08-29 09:58:15 -07:00
|
|
|
SOCKET hSocket;
|
2013-03-24 08:52:24 -07:00
|
|
|
CDataStream ssSend;
|
2021-01-04 17:08:22 -08:00
|
|
|
std::string strSendCommand; // Current command being assembled in ssSend
|
2013-03-24 08:52:24 -07:00
|
|
|
size_t nSendSize; // total size of all vSendMsg entries
|
|
|
|
size_t nSendOffset; // offset inside the first vSendMsg already sent
|
2013-04-12 22:13:08 -07:00
|
|
|
uint64_t nSendBytes;
|
2013-03-24 08:52:24 -07:00
|
|
|
std::deque<CSerializeData> vSendMsg;
|
2010-08-29 09:58:15 -07:00
|
|
|
CCriticalSection cs_vSend;
|
2017-02-06 11:05:45 -08:00
|
|
|
CCriticalSection cs_hSocket;
|
2017-02-05 23:34:57 -08:00
|
|
|
CCriticalSection cs_vRecv;
|
2012-11-15 16:41:12 -08:00
|
|
|
|
2016-12-24 11:34:20 -08:00
|
|
|
CCriticalSection cs_sendProcessing;
|
|
|
|
|
2013-03-29 15:49:38 -07:00
|
|
|
std::deque<CInv> vRecvGetData;
|
2013-02-28 16:41:28 -08:00
|
|
|
std::deque<CNetMessage> vRecvMsg;
|
2012-11-15 16:41:12 -08:00
|
|
|
CCriticalSection cs_vRecvMsg;
|
2013-04-12 22:13:08 -07:00
|
|
|
uint64_t nRecvBytes;
|
2012-11-15 16:41:12 -08:00
|
|
|
int nRecvVersion;
|
|
|
|
|
2017-02-05 23:34:57 -08:00
|
|
|
std::atomic<int64_t> nLastSend;
|
|
|
|
std::atomic<int64_t> nLastRecv;
|
2017-02-06 08:42:49 -08:00
|
|
|
const int64_t nTimeConnected;
|
2017-02-05 23:34:57 -08:00
|
|
|
std::atomic<int64_t> nTimeOffset;
|
2016-05-25 06:38:32 -07:00
|
|
|
const CAddress addr;
|
2010-08-29 09:58:15 -07:00
|
|
|
int nVersion;
|
2014-01-11 09:14:29 -08:00
|
|
|
// strSubVer is whatever byte array we read from the wire. However, this field is intended
|
2013-11-26 03:52:21 -08:00
|
|
|
// to be printed out, displayed to humans in various forms and so on. So we sanitize it and
|
|
|
|
// store the sanitized version in cleanSubVer. The original should be used when dealing with
|
|
|
|
// the network or wire types and the cleaned string used when displayed or logged.
|
|
|
|
std::string strSubVer, cleanSubVer;
|
2017-02-06 09:08:31 -08:00
|
|
|
CCriticalSection cs_SubVer; // used for both cleanSubVer and strSubVer
|
2014-06-21 04:34:36 -07:00
|
|
|
bool fWhitelisted; // This peer can bypass DoS banning.
|
2012-04-23 17:15:00 -07:00
|
|
|
bool fOneShot;
|
2010-08-29 09:58:15 -07:00
|
|
|
bool fClient;
|
|
|
|
bool fInbound;
|
|
|
|
bool fNetworkNode;
|
|
|
|
bool fSuccessfullyConnected;
|
2016-11-25 18:03:12 -08:00
|
|
|
std::atomic_bool fDisconnect;
|
2012-08-20 18:10:25 -07:00
|
|
|
// We use fRelayTxes for two purposes -
|
|
|
|
// a) it allows us to not relay tx invs before receiving the peer's version message
|
2015-04-28 07:48:28 -07:00
|
|
|
// b) the peer may tell us in its version message that we should not relay tx invs
|
2015-11-14 05:12:31 -08:00
|
|
|
// unless it loads a bloom filter.
|
2016-04-20 00:05:23 -07:00
|
|
|
bool fRelayTxes; //protected by cs_filter
|
2016-04-10 18:09:34 -07:00
|
|
|
bool fSentAddr;
|
2012-05-10 09:44:07 -07:00
|
|
|
CSemaphoreGrant grantOutbound;
|
2012-08-12 20:26:29 -07:00
|
|
|
CCriticalSection cs_filter;
|
|
|
|
CBloomFilter* pfilter;
|
2013-11-17 16:25:17 -08:00
|
|
|
NodeId id;
|
2017-02-05 23:34:57 -08:00
|
|
|
std::atomic<int> nRefCount;
|
2016-05-23 00:21:05 -07:00
|
|
|
|
2016-05-25 06:38:32 -07:00
|
|
|
const uint64_t nKeyedNetGroup;
|
2016-05-23 00:21:05 -07:00
|
|
|
|
2020-12-15 17:37:17 -08:00
|
|
|
// Stored so we can pass a pointer to it across the Rust FFI for span.
|
|
|
|
std::string idStr;
|
2020-07-24 16:34:17 -07:00
|
|
|
|
|
|
|
tracing::Span span;
|
2013-03-28 16:43:31 -07:00
|
|
|
protected:
|
2011-09-06 13:09:04 -07:00
|
|
|
|
|
|
|
// Denial-of-service detection/prevention
|
2012-07-25 17:48:39 -07:00
|
|
|
// Key is IP address, value is banned-until-time
|
2015-06-26 12:38:33 -07:00
|
|
|
static banmap_t setBanned;
|
2011-09-06 13:09:04 -07:00
|
|
|
static CCriticalSection cs_setBanned;
|
2015-06-19 06:27:37 -07:00
|
|
|
static bool setBannedIsDirty;
|
2011-09-06 13:09:04 -07:00
|
|
|
|
2014-06-21 04:34:36 -07:00
|
|
|
// Whitelisted ranges. Any node connecting from these is automatically
|
|
|
|
// whitelisted (as well as those connecting to whitelisted binds).
|
|
|
|
static std::vector<CSubNet> vWhitelistedRange;
|
|
|
|
static CCriticalSection cs_vWhitelistedRange;
|
|
|
|
|
2013-10-27 23:28:00 -07:00
|
|
|
// Basic fuzz-testing
|
|
|
|
void Fuzz(int nChance); // modifies ssSend
|
|
|
|
|
2010-08-29 09:58:15 -07:00
|
|
|
public:
|
|
|
|
uint256 hashContinue;
|
2017-02-06 09:15:30 -08:00
|
|
|
std::atomic<int> nStartingHeight;
|
2010-08-29 09:58:15 -07:00
|
|
|
|
|
|
|
// flood relay
|
2011-05-15 00:11:04 -07:00
|
|
|
std::vector<CAddress> vAddrToSend;
|
2015-04-25 13:25:44 -07:00
|
|
|
CRollingBloomFilter addrKnown;
|
2010-08-29 09:58:15 -07:00
|
|
|
bool fGetAddr;
|
2011-05-15 00:11:04 -07:00
|
|
|
std::set<uint256> setKnown;
|
2015-04-08 11:20:00 -07:00
|
|
|
int64_t nNextAddrSend;
|
|
|
|
int64_t nNextLocalAddrSend;
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2021-06-30 11:52:40 -07:00
|
|
|
/** Number of addr messages that can be processed from this peer. Start at 1 to
|
|
|
|
* permit self-announcement. */
|
|
|
|
double m_addr_token_bucket{1.0};
|
|
|
|
/** When m_addr_token_bucket was last updated */
|
|
|
|
int64_t m_addr_token_timestamp{GetTimeMicros()};
|
|
|
|
|
2010-08-29 09:58:15 -07:00
|
|
|
// inventory based relay
|
2015-11-29 01:52:51 -08:00
|
|
|
CRollingBloomFilter filterInventoryKnown;
|
2016-04-07 04:57:36 -07:00
|
|
|
// Set of transaction ids we still have to announce.
|
|
|
|
// They are sorted by the mempool before relay, so the order is not important.
|
|
|
|
std::set<uint256> setInventoryTxToSend;
|
|
|
|
// List of block ids we still have announce.
|
|
|
|
// There is no final sorting before sending, as they are always sent immediately
|
|
|
|
// and in the order requested.
|
|
|
|
std::vector<uint256> vInventoryBlockToSend;
|
2010-08-29 09:58:15 -07:00
|
|
|
CCriticalSection cs_inventory;
|
2021-09-08 16:43:59 -07:00
|
|
|
std::set<WTxId> setAskFor;
|
2013-04-12 22:13:08 -07:00
|
|
|
std::multimap<int64_t, CInv> mapAskFor;
|
2015-04-08 11:20:00 -07:00
|
|
|
int64_t nNextInvSend;
|
2016-04-08 07:26:41 -07:00
|
|
|
// Used for BIP35 mempool sending, also protected by cs_inventory
|
|
|
|
bool fSendMempool;
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2016-05-20 09:19:26 -07:00
|
|
|
// Last time a "MEMPOOL" request was serviced.
|
|
|
|
std::atomic<int64_t> timeLastMempoolReq;
|
2013-10-14 15:34:20 -07:00
|
|
|
// Ping time measurement:
|
|
|
|
// The pong reply we're expecting, or 0 if no pong expected.
|
2017-02-05 23:34:57 -08:00
|
|
|
std::atomic<uint64_t> nPingNonceSent;
|
2013-10-14 15:34:20 -07:00
|
|
|
// Time (in usec) the last ping was sent, or 0 if no ping was ever sent.
|
2017-02-05 23:34:57 -08:00
|
|
|
std::atomic<int64_t> nPingUsecStart;
|
2013-10-14 15:34:20 -07:00
|
|
|
// Last measured round-trip time.
|
2017-02-05 23:34:57 -08:00
|
|
|
std::atomic<int64_t> nPingUsecTime;
|
2015-08-13 02:31:46 -07:00
|
|
|
// Best measured round-trip time.
|
2017-02-05 23:34:57 -08:00
|
|
|
std::atomic<int64_t> nMinPingUsecTime;
|
2013-10-14 15:34:20 -07:00
|
|
|
// Whether a ping is requested.
|
2017-02-05 23:34:57 -08:00
|
|
|
std::atomic<bool> fPingQueued;
|
2014-01-11 09:14:29 -08:00
|
|
|
|
2015-05-31 06:36:44 -07:00
|
|
|
CNode(SOCKET hSocketIn, const CAddress &addrIn, const std::string &addrNameIn = "", bool fInboundIn = false);
|
2014-08-20 20:17:21 -07:00
|
|
|
~CNode();
|
2010-08-29 09:58:15 -07:00
|
|
|
|
|
|
|
private:
|
2013-08-22 09:09:32 -07:00
|
|
|
// Network usage totals
|
|
|
|
static CCriticalSection cs_totalBytesRecv;
|
|
|
|
static CCriticalSection cs_totalBytesSent;
|
2013-04-12 22:13:08 -07:00
|
|
|
static uint64_t nTotalBytesRecv;
|
|
|
|
static uint64_t nTotalBytesSent;
|
2013-08-22 09:09:32 -07:00
|
|
|
|
2015-09-02 08:03:27 -07:00
|
|
|
// outbound limit & stats
|
|
|
|
static uint64_t nMaxOutboundTotalBytesSentInCycle;
|
|
|
|
static uint64_t nMaxOutboundCycleStartTime;
|
|
|
|
static uint64_t nMaxOutboundLimit;
|
|
|
|
static uint64_t nMaxOutboundTimeframe;
|
|
|
|
|
2010-08-29 09:58:15 -07:00
|
|
|
CNode(const CNode&);
|
|
|
|
void operator=(const CNode&);
|
2013-08-22 09:09:32 -07:00
|
|
|
|
2016-05-25 06:38:32 -07:00
|
|
|
static uint64_t CalculateKeyedNetGroup(const CAddress& ad);
|
2016-05-23 00:21:05 -07:00
|
|
|
|
2017-02-06 09:04:34 -08:00
|
|
|
|
|
|
|
mutable CCriticalSection cs_addrName;
|
|
|
|
std::string addrName;
|
2017-02-06 09:18:51 -08:00
|
|
|
|
|
|
|
CService addrLocal;
|
|
|
|
mutable CCriticalSection cs_addrLocal;
|
2010-08-29 09:58:15 -07:00
|
|
|
public:
|
|
|
|
|
2020-12-15 17:37:17 -08:00
|
|
|
// Regenerate the span for this CNode. This re-queries the log filter to see
|
|
|
|
// if the span should be enabled, and re-collects the logged variables.
|
|
|
|
void ReloadTracingSpan();
|
|
|
|
|
2013-11-17 16:25:17 -08:00
|
|
|
NodeId GetId() const {
|
|
|
|
return id;
|
|
|
|
}
|
2010-08-29 09:58:15 -07:00
|
|
|
|
|
|
|
int GetRefCount()
|
|
|
|
{
|
2013-03-28 16:43:31 -07:00
|
|
|
assert(nRefCount >= 0);
|
|
|
|
return nRefCount;
|
2010-08-29 09:58:15 -07:00
|
|
|
}
|
|
|
|
|
2012-11-15 16:41:12 -08:00
|
|
|
// requires LOCK(cs_vRecvMsg)
|
|
|
|
unsigned int GetTotalRecvSize()
|
|
|
|
{
|
|
|
|
unsigned int total = 0;
|
2017-06-01 18:18:57 -07:00
|
|
|
for (const CNetMessage &msg : vRecvMsg)
|
2013-02-28 16:41:28 -08:00
|
|
|
total += msg.vRecv.size() + 24;
|
2012-11-15 16:41:12 -08:00
|
|
|
return total;
|
|
|
|
}
|
|
|
|
|
|
|
|
// requires LOCK(cs_vRecvMsg)
|
|
|
|
bool ReceiveMsgBytes(const char *pch, unsigned int nBytes);
|
|
|
|
|
|
|
|
// requires LOCK(cs_vRecvMsg)
|
|
|
|
void SetRecvVersion(int nVersionIn)
|
|
|
|
{
|
|
|
|
nRecvVersion = nVersionIn;
|
2017-06-01 18:18:57 -07:00
|
|
|
for (CNetMessage &msg : vRecvMsg)
|
2013-02-28 16:41:28 -08:00
|
|
|
msg.SetVersion(nVersionIn);
|
2012-11-15 16:41:12 -08:00
|
|
|
}
|
|
|
|
|
2017-02-06 09:18:51 -08:00
|
|
|
CService GetAddrLocal() const;
|
|
|
|
//! May not be called more than once
|
|
|
|
void SetAddrLocal(const CService& addrLocalIn);
|
|
|
|
|
2013-03-28 16:43:31 -07:00
|
|
|
CNode* AddRef()
|
2010-08-29 09:58:15 -07:00
|
|
|
{
|
2013-03-28 16:43:31 -07:00
|
|
|
nRefCount++;
|
2010-08-29 09:58:15 -07:00
|
|
|
return this;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Release()
|
|
|
|
{
|
|
|
|
nRefCount--;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void AddAddressKnown(const CAddress& addr)
|
|
|
|
{
|
2015-04-25 13:25:44 -07:00
|
|
|
addrKnown.insert(addr.GetKey());
|
2010-08-29 09:58:15 -07:00
|
|
|
}
|
|
|
|
|
2016-10-13 07:19:20 -07:00
|
|
|
void PushAddress(const CAddress& addr, FastRandomContext &insecure_rand)
|
2010-08-29 09:58:15 -07:00
|
|
|
{
|
|
|
|
// Known checking here is only to save space from duplicates.
|
|
|
|
// SendMessages will filter it again for knowns that were added
|
|
|
|
// after addresses were pushed.
|
2015-04-25 13:25:44 -07:00
|
|
|
if (addr.IsValid() && !addrKnown.contains(addr.GetKey())) {
|
2014-11-21 03:22:11 -08:00
|
|
|
if (vAddrToSend.size() >= MAX_ADDR_TO_SEND) {
|
2017-02-25 12:16:58 -08:00
|
|
|
vAddrToSend[insecure_rand.randrange(vAddrToSend.size())] = addr;
|
2014-11-21 03:22:11 -08:00
|
|
|
} else {
|
|
|
|
vAddrToSend.push_back(addr);
|
|
|
|
}
|
|
|
|
}
|
2010-08-29 09:58:15 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-09-08 16:43:59 -07:00
|
|
|
void AddKnownTx(const WTxId& wtxid)
|
2010-08-29 09:58:15 -07:00
|
|
|
{
|
2012-04-06 09:39:12 -07:00
|
|
|
{
|
|
|
|
LOCK(cs_inventory);
|
2021-09-08 16:43:59 -07:00
|
|
|
filterInventoryKnown.insert(wtxid.ToBytes());
|
2012-04-06 09:39:12 -07:00
|
|
|
}
|
2010-08-29 09:58:15 -07:00
|
|
|
}
|
|
|
|
|
2021-09-08 16:43:59 -07:00
|
|
|
void PushTxInventory(const WTxId& wtxid)
|
2010-08-29 09:58:15 -07:00
|
|
|
{
|
2016-04-07 04:57:36 -07:00
|
|
|
LOCK(cs_inventory);
|
2021-09-08 16:43:59 -07:00
|
|
|
if (!filterInventoryKnown.contains(wtxid.ToBytes())) {
|
|
|
|
setInventoryTxToSend.insert(wtxid.hash);
|
2012-04-06 09:39:12 -07:00
|
|
|
}
|
2010-08-29 09:58:15 -07:00
|
|
|
}
|
|
|
|
|
2020-06-18 12:19:12 -07:00
|
|
|
void PushBlockInventory(const uint256& hash)
|
|
|
|
{
|
|
|
|
LOCK(cs_inventory);
|
|
|
|
vInventoryBlockToSend.push_back(hash);
|
|
|
|
}
|
|
|
|
|
2014-08-20 20:17:21 -07:00
|
|
|
void AskFor(const CInv& inv);
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2012-11-10 18:51:50 -08:00
|
|
|
// TODO: Document the postcondition of this function. Is cs_vSend locked?
|
2014-08-20 20:17:21 -07:00
|
|
|
void BeginMessage(const char* pszCommand) EXCLUSIVE_LOCK_FUNCTION(cs_vSend);
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2012-11-10 18:51:50 -08:00
|
|
|
// TODO: Document the precondition of this function. Is cs_vSend locked?
|
2014-08-20 20:17:21 -07:00
|
|
|
void AbortMessage() UNLOCK_FUNCTION(cs_vSend);
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2012-11-10 18:51:50 -08:00
|
|
|
// TODO: Document the precondition of this function. Is cs_vSend locked?
|
2014-08-20 20:17:21 -07:00
|
|
|
void EndMessage() UNLOCK_FUNCTION(cs_vSend);
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2011-12-16 13:26:14 -08:00
|
|
|
void PushVersion();
|
2011-01-24 07:42:17 -08:00
|
|
|
|
2010-08-29 09:58:15 -07:00
|
|
|
|
|
|
|
void PushMessage(const char* pszCommand)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
|
|
|
EndMessage();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 08:52:24 -07:00
|
|
|
ssSend << a1;
|
2010-08-29 09:58:15 -07:00
|
|
|
EndMessage();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 08:52:24 -07:00
|
|
|
ssSend << a1 << a2;
|
2010-08-29 09:58:15 -07:00
|
|
|
EndMessage();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 08:52:24 -07:00
|
|
|
ssSend << a1 << a2 << a3;
|
2010-08-29 09:58:15 -07:00
|
|
|
EndMessage();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 08:52:24 -07:00
|
|
|
ssSend << a1 << a2 << a3 << a4;
|
2010-08-29 09:58:15 -07:00
|
|
|
EndMessage();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 08:52:24 -07:00
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5;
|
2010-08-29 09:58:15 -07:00
|
|
|
EndMessage();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5, const T6& a6)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 08:52:24 -07:00
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5 << a6;
|
2010-08-29 09:58:15 -07:00
|
|
|
EndMessage();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6, typename T7>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5, const T6& a6, const T7& a7)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 08:52:24 -07:00
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5 << a6 << a7;
|
2010-08-29 09:58:15 -07:00
|
|
|
EndMessage();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6, typename T7, typename T8>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5, const T6& a6, const T7& a7, const T8& a8)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 08:52:24 -07:00
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5 << a6 << a7 << a8;
|
2010-08-29 09:58:15 -07:00
|
|
|
EndMessage();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6, typename T7, typename T8, typename T9>
|
|
|
|
void PushMessage(const char* pszCommand, const T1& a1, const T2& a2, const T3& a3, const T4& a4, const T5& a5, const T6& a6, const T7& a7, const T8& a8, const T9& a9)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
BeginMessage(pszCommand);
|
2013-03-24 08:52:24 -07:00
|
|
|
ssSend << a1 << a2 << a3 << a4 << a5 << a6 << a7 << a8 << a9;
|
2010-08-29 09:58:15 -07:00
|
|
|
EndMessage();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
AbortMessage();
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void CloseSocketDisconnect();
|
2011-09-06 13:09:04 -07:00
|
|
|
|
|
|
|
// Denial-of-service detection/prevention
|
|
|
|
// The idea is to detect peers that are behaving
|
|
|
|
// badly and disconnect/ban them, but do it in a
|
|
|
|
// one-coding-mistake-won't-shatter-the-entire-network
|
|
|
|
// way.
|
|
|
|
// IMPORTANT: There should be nothing I can give a
|
|
|
|
// node that it will forward on that will make that
|
|
|
|
// node's peers drop it. If there is, an attacker
|
|
|
|
// can isolate a node and/or try to split the network.
|
|
|
|
// Dropping a node for sending stuff that is invalid
|
|
|
|
// now but might be valid in a later version is also
|
|
|
|
// dangerous, because it can cause a network split
|
|
|
|
// between nodes running old code and nodes running
|
|
|
|
// new code.
|
|
|
|
static void ClearBanned(); // needed for unit testing
|
2012-01-03 14:33:31 -08:00
|
|
|
static bool IsBanned(CNetAddr ip);
|
2015-05-25 11:03:51 -07:00
|
|
|
static bool IsBanned(CSubNet subnet);
|
2015-06-26 12:38:33 -07:00
|
|
|
static void Ban(const CNetAddr &ip, const BanReason &banReason, int64_t bantimeoffset = 0, bool sinceUnixEpoch = false);
|
|
|
|
static void Ban(const CSubNet &subNet, const BanReason &banReason, int64_t bantimeoffset = 0, bool sinceUnixEpoch = false);
|
2015-05-19 01:07:23 -07:00
|
|
|
static bool Unban(const CNetAddr &ip);
|
2015-05-25 11:03:51 -07:00
|
|
|
static bool Unban(const CSubNet &ip);
|
2015-06-26 12:38:33 -07:00
|
|
|
static void GetBanned(banmap_t &banmap);
|
|
|
|
static void SetBanned(const banmap_t &banmap);
|
2015-06-19 06:27:37 -07:00
|
|
|
|
|
|
|
//!check is the banlist has unwritten changes
|
|
|
|
static bool BannedSetIsDirty();
|
|
|
|
//!set the "dirty" flag for the banlist
|
|
|
|
static void SetBannedSetDirty(bool dirty=true);
|
2021-11-12 02:02:19 -08:00
|
|
|
//!clean unused entries (if bantime has expired)
|
2015-06-19 06:27:37 -07:00
|
|
|
static void SweepBanned();
|
2015-05-19 01:07:23 -07:00
|
|
|
|
2012-06-29 14:24:53 -07:00
|
|
|
void copyStats(CNodeStats &stats);
|
2013-08-22 09:09:32 -07:00
|
|
|
|
2014-06-21 04:34:36 -07:00
|
|
|
static bool IsWhitelistedRange(const CNetAddr &ip);
|
|
|
|
static void AddWhitelistedRange(const CSubNet &subnet);
|
|
|
|
|
2013-08-22 09:09:32 -07:00
|
|
|
// Network stats
|
2013-04-12 22:13:08 -07:00
|
|
|
static void RecordBytesRecv(uint64_t bytes);
|
|
|
|
static void RecordBytesSent(uint64_t bytes);
|
2013-08-22 09:09:32 -07:00
|
|
|
|
2013-04-12 22:13:08 -07:00
|
|
|
static uint64_t GetTotalBytesRecv();
|
|
|
|
static uint64_t GetTotalBytesSent();
|
2015-09-02 08:03:27 -07:00
|
|
|
|
|
|
|
//!set the max outbound target in bytes
|
2020-08-13 13:17:51 -07:00
|
|
|
static void SetMaxOutboundTarget(uint64_t targetSpacing, uint64_t limit);
|
2015-09-02 08:03:27 -07:00
|
|
|
static uint64_t GetMaxOutboundTarget();
|
|
|
|
|
|
|
|
//!set the timeframe for the max outbound target
|
|
|
|
static void SetMaxOutboundTimeframe(uint64_t timeframe);
|
|
|
|
static uint64_t GetMaxOutboundTimeframe();
|
|
|
|
|
|
|
|
//!check if the outbound target is reached
|
|
|
|
// if param historicalBlockServingLimit is set true, the function will
|
|
|
|
// response true if the limit for serving historical blocks has been reached
|
2020-03-06 20:55:37 -08:00
|
|
|
static bool OutboundTargetReached(uint64_t targetSpacing, bool historicalBlockServingLimit);
|
2015-09-02 08:03:27 -07:00
|
|
|
|
|
|
|
//!response the bytes left in the current max outbound cycle
|
|
|
|
// in case of no limit, it will always response 0
|
|
|
|
static uint64_t GetOutboundTargetBytesLeft();
|
|
|
|
|
2020-08-13 13:38:15 -07:00
|
|
|
//!response the time in seconds left in the current max outbound cycle
|
|
|
|
// in case of no limit, it will always respond with 0
|
2015-09-02 08:03:27 -07:00
|
|
|
static uint64_t GetMaxOutboundTimeLeftInCycle();
|
2017-02-06 09:04:34 -08:00
|
|
|
std::string GetAddrName() const;
|
|
|
|
//! Sets the addrName only if it was not previously set
|
|
|
|
void MaybeSetAddrName(const std::string& addrNameIn);
|
2010-08-29 09:58:15 -07:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
2012-08-12 20:26:30 -07:00
|
|
|
class CTransaction;
|
2014-06-09 01:02:00 -07:00
|
|
|
void RelayTransaction(const CTransaction& tx);
|
2010-08-29 09:58:15 -07:00
|
|
|
|
2013-11-29 07:33:34 -08:00
|
|
|
|
2015-04-08 11:20:00 -07:00
|
|
|
/** Return a timestamp in the future (in microseconds) for exponentially distributed events. */
|
|
|
|
int64_t PoissonNextSend(int64_t nNow, int average_interval_seconds);
|
|
|
|
|
2014-08-28 13:21:03 -07:00
|
|
|
#endif // BITCOIN_NET_H
|