6#include <bitcoin-build-config.h>
35#include <util/threadinterrupt.h>
48#include <unordered_map>
58static_assert (MAX_BLOCK_RELAY_ONLY_ANCHORS <= static_cast<size_t>(
MAX_BLOCK_RELAY_ONLY_CONNECTIONS),
"MAX_BLOCK_RELAY_ONLY_ANCHORS must not exceed MAX_BLOCK_RELAY_ONLY_CONNECTIONS.");
135 m_addr_fetches.push_back(strDest);
141 for (
const std::string& bind_arg :
gArgs.
GetArgs(
"-bind")) {
142 constexpr uint16_t dummy_port = 0;
144 const std::optional<CService> bind_addr{
Lookup(bind_arg, dummy_port,
false)};
145 if (bind_addr.has_value() && bind_addr->GetPort() != dummy_port)
return bind_addr->GetPort();
150 for (
const std::string& whitebind_arg :
gArgs.
GetArgs(
"-whitebind")) {
167 if (!
fListen)
return std::nullopt;
169 std::optional<CService> addr;
171 int nBestReachability = -1;
174 for (
const auto& [local_addr, local_service_info] : mapLocalHost) {
182 const int nScore{local_service_info.nScore};
183 const int nReachability{local_addr.GetReachabilityFrom(peer.
addr)};
184 if (nReachability > nBestReachability || (nReachability == nBestReachability && nScore > nBestScore)) {
185 addr.emplace(
CService{local_addr, local_service_info.nPort});
186 nBestReachability = nReachability;
195static std::vector<CAddress>
ConvertSeeds(
const std::vector<uint8_t> &vSeedsIn)
201 const auto one_week{7 * 24h};
202 std::vector<CAddress> vSeedsOut;
211 vSeedsOut.push_back(addr);
228 const auto it = mapLocalHost.find(addr);
229 return (it != mapLocalHost.end()) ? it->second.nScore : 0;
250 if (
node.IsInboundConn()) {
259 addrLocal.SetIP(
node.GetAddrLocal());
262 if (addrLocal.IsRoutable()) {
273 return mapLocalHost.clear();
281 if (!addr.IsRoutable())
291 LogInfo(
"AddLocal(%s,%i)\n", addr.ToStringAddrPort(), nScore);
296 const auto [it, is_newly_added] = mapLocalHost.emplace(addr,
LocalServiceInfo());
298 if (is_newly_added || nScore >= info.
nScore) {
299 info.
nScore = nScore + (is_newly_added ? 0 : 1);
300 info.
nPort = addr.GetPort();
319 mapLocalHost.erase(addr);
326 const auto it = mapLocalHost.find(addr);
327 if (it == mapLocalHost.end())
return false;
337 return mapLocalHost.contains(addr);
343 return std::ranges::any_of(m_nodes, [&host](
CNode*
node) {
return node->m_addr_name == host; });
349 return std::ranges::any_of(m_nodes, [&addr_port](
CNode*
node) {
return node->addr == addr_port; });
355 return std::ranges::any_of(m_nodes, [&addr](
CNode*
node) {
return node->addr == addr; });
361 for (
const CNode* pnode : m_nodes) {
370 if (!pnode->fSuccessfullyConnected && !pnode->IsInboundConn() && !pnode->IsPrivateBroadcastConn() &&
371 pnode->GetLocalNonce() ==
nonce)
381 bool use_v2transport,
382 const std::optional<Proxy>& proxy_override)
388 if (pszDest ==
nullptr) {
403 Ticks<HoursDouble>(pszDest ? 0h : Now<NodeSeconds>() - addrConnect.
nTime));
406 const uint16_t default_port{pszDest !=
nullptr ?
GetDefaultPort(pszDest) :
410 std::vector<CAddress> connect_to{};
413 if (!resolved.empty()) {
417 for (
const auto& r : resolved) {
430 connect_to.push_back(addrConnect);
434 connect_to.push_back(addrConnect);
438 connect_to.push_back(addrConnect);
442 std::unique_ptr<Sock> sock;
445 std::unique_ptr<i2p::sam::Session> i2p_transient_session;
447 for (
auto& target_addr : connect_to) {
448 if (target_addr.IsValid()) {
449 const std::optional<Proxy> use_proxy{
450 proxy_override.has_value() ? proxy_override :
GetProxy(target_addr.GetNetwork()),
452 bool proxyConnectionFailed =
false;
454 if (target_addr.IsI2P() && use_proxy) {
456 bool connected{
false};
462 connected =
m_i2p_sam_session->Connect(target_addr, conn, proxyConnectionFailed);
466 if (m_unused_i2p_sessions.empty()) {
467 i2p_transient_session =
470 i2p_transient_session.swap(m_unused_i2p_sessions.front());
471 m_unused_i2p_sessions.pop();
474 connected = i2p_transient_session->Connect(target_addr, conn, proxyConnectionFailed);
478 m_unused_i2p_sessions.emplace(i2p_transient_session.release());
484 sock = std::move(conn.
sock);
487 }
else if (use_proxy) {
488 LogDebug(
BCLog::PROXY,
"Using proxy: %s to connect to %s\n", use_proxy->ToString(), target_addr.ToStringAddrPort());
489 sock =
ConnectThroughProxy(*use_proxy, target_addr.ToStringAddr(), target_addr.GetPort(), proxyConnectionFailed);
494 if (!proxyConnectionFailed) {
497 addrman.get().Attempt(target_addr, fCountFailure);
499 }
else if (pszDest) {
502 uint16_t port{default_port};
504 bool proxyConnectionFailed;
524 .
Write(target_addr.GetNetClass())
536 pszDest ? pszDest :
"",
542 .i2p_sam_session = std::move(i2p_transient_session),
570 TicksSinceEpoch<std::chrono::seconds>(
m_connected));
572 m_i2p_sam_session.reset();
576 for (
const auto& subnet : ranges) {
577 if (addr.has_value() && subnet.m_subnet.Match(addr.value())) {
600 if (
Assume(!m_addr_local.IsValid())) {
601 m_addr_local = addrLocalIn;
616#define X(name) stats.name = name
639 X(mapSendBytesPerMsgType);
644 X(mapRecvBytesPerMsgType);
669 nRecvBytes += msg_bytes.size();
670 while (msg_bytes.size() > 0) {
679 bool reject_message{
false};
681 if (reject_message) {
690 auto i = mapRecvBytesPerMsgType.find(
msg.m_type);
691 if (i == mapRecvBytesPerMsgType.end()) {
694 assert(i != mapRecvBytesPerMsgType.end());
695 i->second +=
msg.m_raw_message_size;
739 unsigned int nCopy = std::min<unsigned int>(nRemaining, msg_bytes.size());
741 memcpy(&hdrbuf[nHdrPos], msg_bytes.data(), nCopy);
752 catch (
const std::exception&) {
780 unsigned int nRemaining = hdr.nMessageSize - nDataPos;
781 unsigned int nCopy = std::min<unsigned int>(nRemaining, msg_bytes.size());
783 if (vRecv.size() < nDataPos + nCopy) {
785 vRecv.resize(std::min(hdr.nMessageSize, nDataPos + nCopy + 256 * 1024));
788 hasher.Write(msg_bytes.first(nCopy));
789 memcpy(&vRecv[nDataPos], msg_bytes.data(), nCopy);
799 if (data_hash.IsNull())
800 hasher.Finalize(data_hash);
808 reject_message =
false;
814 msg.m_type = hdr.GetMessageType();
816 msg.m_message_size = hdr.nMessageSize;
826 LogDebug(
BCLog::NET,
"Header error: Wrong checksum (%s, %u bytes), expected %s was %s, peer=%d\n",
831 reject_message =
true;
832 }
else if (!hdr.IsMessageTypeValid()) {
835 reject_message =
true;
848 if (m_sending_header || m_bytes_sent < m_message_to_send.data.size())
return false;
858 m_header_to_send.clear();
862 m_message_to_send = std::move(
msg);
863 m_sending_header =
true;
872 if (m_sending_header) {
873 return {std::span{m_header_to_send}.subspan(m_bytes_sent),
876 have_next_message || !m_message_to_send.data.empty(),
877 m_message_to_send.m_type
880 return {std::span{m_message_to_send.data}.subspan(m_bytes_sent),
884 m_message_to_send.m_type
893 m_bytes_sent += bytes_sent;
894 if (m_sending_header && m_bytes_sent == m_header_to_send.size()) {
896 m_sending_header =
false;
898 }
else if (!m_sending_header && m_bytes_sent == m_message_to_send.data.size()) {
910 return m_message_to_send.GetMemoryUsage();
920const std::array<std::string, 33> V2_MESSAGE_IDS = {
959 std::unordered_map<std::string, uint8_t> m_map;
962 V2MessageMap() noexcept
964 for (
size_t i = 1; i < std::size(V2_MESSAGE_IDS); ++i) {
965 m_map.emplace(V2_MESSAGE_IDS[i], i);
969 std::optional<uint8_t> operator()(
const std::string& message_name)
const noexcept
971 auto it = m_map.find(message_name);
972 if (it == m_map.end())
return std::nullopt;
977const V2MessageMap V2_MESSAGE_MAP;
979std::vector<uint8_t> GenerateRandomGarbage() noexcept
981 std::vector<uint8_t>
ret;
994 Assume(m_send_buffer.empty());
998 std::copy(m_send_garbage.begin(), m_send_garbage.end(), m_send_buffer.begin() +
EllSwiftPubKey::size());
1003 : m_cipher{key, ent32},
1004 m_initiating{initiating},
1006 m_v1_fallback{nodeid},
1007 m_recv_state{initiating ?
RecvState::KEY : RecvState::KEY_MAYBE_V1},
1008 m_send_garbage{std::move(garbage)},
1009 m_send_state{initiating ? SendState::AWAITING_KEY : SendState::MAYBE_V1}
1011 Assume(m_send_garbage.size() <= MAX_GARBAGE_LEN);
1015 StartSendingHandshake();
1027 switch (m_recv_state) {
1028 case RecvState::KEY_MAYBE_V1:
1032 Assume(recv_state == RecvState::GARB_GARBTERM);
1034 case RecvState::GARB_GARBTERM:
1038 Assume(recv_state == RecvState::APP);
1040 case RecvState::APP:
1041 Assume(recv_state == RecvState::APP_READY);
1043 case RecvState::APP_READY:
1044 Assume(recv_state == RecvState::APP);
1051 m_recv_state = recv_state;
1058 switch (m_send_state) {
1059 case SendState::MAYBE_V1:
1060 Assume(send_state == SendState::V1 || send_state == SendState::AWAITING_KEY);
1062 case SendState::AWAITING_KEY:
1063 Assume(send_state == SendState::READY);
1065 case SendState::READY:
1071 m_send_state = send_state;
1092 std::array<uint8_t, V1_PREFIX_LEN> v1_prefix = {0, 0, 0, 0,
'v',
'e',
'r',
's',
'i',
'o',
'n', 0, 0, 0, 0, 0};
1093 std::copy(std::begin(
Params().MessageStart()), std::end(
Params().MessageStart()), v1_prefix.begin());
1094 Assume(m_recv_buffer.size() <= v1_prefix.size());
1095 if (!std::equal(m_recv_buffer.begin(), m_recv_buffer.end(), v1_prefix.begin())) {
1102 }
else if (m_recv_buffer.size() == v1_prefix.size()) {
1105 std::span<const uint8_t> feedback{m_recv_buffer};
1109 Assume(feedback.empty());
1134 static constexpr std::array<uint8_t, 12> MATCH = {
'v',
'e',
'r',
's',
'i',
'o',
'n', 0, 0, 0, 0, 0};
1135 static constexpr size_t OFFSET = std::tuple_size_v<MessageStartChars>;
1136 if (!
m_initiating && m_recv_buffer.size() >= OFFSET + MATCH.size()) {
1137 if (std::equal(MATCH.begin(), MATCH.end(), m_recv_buffer.begin() + OFFSET)) {
1139 HexStr(std::span(m_recv_buffer).first(OFFSET)));
1155 m_recv_buffer.clear();
1189 m_recv_aad = std::move(m_recv_buffer);
1191 m_recv_buffer.clear();
1217 static constexpr size_t MAX_CONTENTS_LEN =
1224 if (m_recv_len > MAX_CONTENTS_LEN) {
1232 m_recv_decode_buffer.resize(m_recv_len);
1251 switch (m_recv_state) {
1280 switch (m_recv_state) {
1330 static constexpr size_t MAX_RESERVE_AHEAD = 256 * 1024;
1333 if (m_recv_state == RecvState::V1)
return m_v1_fallback.ReceivedBytes(msg_bytes);
1339 while (!msg_bytes.empty()) {
1341 size_t max_read = GetMaxBytesToProcess();
1344 if (m_recv_buffer.size() + std::min(msg_bytes.size(), max_read) > m_recv_buffer.capacity()) {
1345 switch (m_recv_state) {
1346 case RecvState::KEY_MAYBE_V1:
1348 case RecvState::GARB_GARBTERM:
1354 case RecvState::APP: {
1360 size_t alloc_add = std::min(max_read, msg_bytes.size() + MAX_RESERVE_AHEAD);
1361 m_recv_buffer.reserve(m_recv_buffer.size() + alloc_add);
1364 case RecvState::APP_READY:
1366 Assume(m_recv_buffer.empty());
1376 max_read = std::min(msg_bytes.size(), max_read);
1378 m_recv_buffer.insert(m_recv_buffer.end(),
UCharCast(msg_bytes.data()),
UCharCast(msg_bytes.data() + max_read));
1379 msg_bytes = msg_bytes.subspan(max_read);
1382 switch (m_recv_state) {
1383 case RecvState::KEY_MAYBE_V1:
1384 ProcessReceivedMaybeV1Bytes();
1385 if (m_recv_state == RecvState::V1)
return true;
1389 if (!ProcessReceivedKeyBytes())
return false;
1392 case RecvState::GARB_GARBTERM:
1393 if (!ProcessReceivedGarbageBytes())
return false;
1397 case RecvState::APP:
1398 if (!ProcessReceivedPacketBytes())
return false;
1401 case RecvState::APP_READY:
1418 if (contents.size() == 0)
return std::nullopt;
1419 uint8_t first_byte = contents[0];
1420 contents = contents.subspan(1);
1422 if (first_byte != 0) {
1424 if (first_byte < std::size(V2_MESSAGE_IDS)) {
1426 return V2_MESSAGE_IDS[first_byte];
1429 return std::nullopt;
1434 return std::nullopt;
1437 size_t msg_type_len{0};
1440 if (contents[msg_type_len] <
' ' || contents[msg_type_len] > 0x7F) {
1445 std::string
ret{
reinterpret_cast<const char*
>(contents.data()), msg_type_len};
1448 if (contents[msg_type_len] != 0)
return {};
1460 if (m_recv_state == RecvState::V1)
return m_v1_fallback.GetReceivedMessage(time, reject_message);
1462 Assume(m_recv_state == RecvState::APP_READY);
1463 std::span<const uint8_t> contents{m_recv_decode_buffer};
1464 auto msg_type = GetMessageType(contents);
1469 reject_message =
false;
1470 msg.m_type = std::move(*msg_type);
1472 msg.m_message_size = contents.size();
1473 msg.m_recv.resize(contents.size());
1474 std::copy(contents.begin(), contents.end(),
UCharCast(
msg.m_recv.data()));
1476 LogDebug(
BCLog::NET,
"V2 transport error: invalid message type (%u bytes contents), peer=%d\n", m_recv_decode_buffer.size(), m_nodeid);
1477 reject_message =
true;
1480 SetReceiveState(RecvState::APP);
1489 if (m_send_state == SendState::V1)
return m_v1_fallback.SetMessageToSend(
msg);
1493 if (!(m_send_state == SendState::READY && m_send_buffer.empty()))
return false;
1495 std::vector<uint8_t> contents;
1496 auto short_message_id = V2_MESSAGE_MAP(
msg.m_type);
1497 if (short_message_id) {
1498 contents.resize(1 +
msg.data.size());
1499 contents[0] = *short_message_id;
1500 std::copy(
msg.data.begin(),
msg.data.end(), contents.begin() + 1);
1505 std::copy(
msg.m_type.begin(),
msg.m_type.end(), contents.data() + 1);
1511 m_send_type =
msg.m_type;
1521 if (m_send_state == SendState::V1)
return m_v1_fallback.GetBytesToSend(have_next_message);
1523 if (m_send_state == SendState::MAYBE_V1)
Assume(m_send_buffer.empty());
1524 Assume(m_send_pos <= m_send_buffer.size());
1526 std::span{m_send_buffer}.subspan(m_send_pos),
1529 have_next_message && m_send_state == SendState::READY,
1538 if (m_send_state == SendState::V1)
return m_v1_fallback.MarkBytesSent(bytes_sent);
1540 if (m_send_state == SendState::AWAITING_KEY && m_send_pos == 0 && bytes_sent > 0) {
1544 m_send_pos += bytes_sent;
1545 Assume(m_send_pos <= m_send_buffer.size());
1547 m_sent_v1_header_worth =
true;
1550 if (m_send_pos == m_send_buffer.size()) {
1567 if (!m_recv_buffer.empty())
return false;
1570 return m_sent_v1_header_worth;
1605 auto it =
node.vSendMsg.begin();
1606 size_t nSentSize = 0;
1607 bool data_left{
false};
1608 std::optional<bool> expected_more;
1611 if (it !=
node.vSendMsg.end()) {
1615 size_t memusage = it->GetMemoryUsage();
1616 if (
node.m_transport->SetMessageToSend(*it)) {
1622 const auto& [
data, more, msg_type] =
node.m_transport->GetBytesToSend(it !=
node.vSendMsg.end());
1626 if (expected_more.has_value())
Assume(!
data.empty() == *expected_more);
1627 expected_more = more;
1628 data_left = !
data.empty();
1630 if (!
data.empty()) {
1648 node.nSendBytes += nBytes;
1650 node.m_transport->MarkBytesSent(nBytes);
1652 if (!msg_type.empty()) {
1653 node.AccountForSentBytes(msg_type, nBytes);
1655 nSentSize += nBytes;
1656 if ((
size_t)nBytes !=
data.size()) {
1666 node.CloseSocketDisconnect();
1675 if (it ==
node.vSendMsg.end()) {
1678 node.vSendMsg.erase(
node.vSendMsg.begin(), it);
1679 return {nSentSize, data_left};
1694 std::vector<NodeEvictionCandidate> vEvictionCandidates;
1699 if (
node->fDisconnect)
1703 .m_connected =
node->m_connected,
1704 .m_min_ping_time =
node->m_min_ping_time,
1705 .m_last_block_time =
node->m_last_block_time,
1706 .m_last_tx_time =
node->m_last_tx_time,
1707 .fRelevantServices =
node->m_has_all_wanted_services,
1708 .m_relay_txs =
node->m_relays_txs.load(),
1709 .fBloomFilter =
node->m_bloom_filter_loaded.load(),
1710 .nKeyedNetGroup =
node->nKeyedNetGroup,
1711 .prefer_evict =
node->m_prefer_evict,
1712 .m_is_local =
node->addr.IsLocal(),
1713 .m_network =
node->ConnectedThroughNetwork(),
1715 .m_conn_type =
node->m_conn_type,
1717 vEvictionCandidates.push_back(candidate);
1720 const std::optional<NodeId> node_id_to_evict =
SelectNodeToEvict(std::move(vEvictionCandidates));
1721 if (!node_id_to_evict) {
1725 for (
CNode* pnode : m_nodes) {
1726 if (pnode->GetId() == *node_id_to_evict) {
1727 LogDebug(
BCLog::NET,
"selected %s connection for eviction, %s", pnode->ConnectionTypeAsString(), pnode->DisconnectMsg());
1730 pnode->m_addr_name.c_str(),
1731 pnode->ConnectionTypeAsString().c_str(),
1732 pnode->ConnectedThroughNetwork(),
1733 TicksSinceEpoch<std::chrono::seconds>(pnode->m_connected));
1734 pnode->fDisconnect =
true;
1744 struct sockaddr_storage sockaddr;
1745 socklen_t len =
sizeof(sockaddr);
1746 auto sock = hListenSocket.
sock->Accept((
struct sockaddr*)&sockaddr, &len);
1757 if (!addr.
SetSockAddr((
const struct sockaddr*)&sockaddr, len)) {
1788 for (
const CNode* pnode : m_nodes) {
1789 if (pnode->IsInboundConn()) nInbound++;
1798 if (!sock->IsSelectable()) {
1806 if (sock->SetSockOpt(IPPROTO_TCP, TCP_NODELAY, &on,
sizeof(on)) ==
SOCKET_ERROR) {
1807 LogDebug(
BCLog::NET,
"connection from %s: unable to set TCP_NODELAY, continuing anyway\n",
1831 LogDebug(
BCLog::NET,
"failed to find an eviction candidate - connection dropped (full)\n");
1861 .prefer_evict = discouraged,
1866 m_msgproc->InitializeNode(*pnode, local_services);
1869 m_nodes.push_back(pnode);
1887 std::optional<int> max_connections;
1888 switch (conn_type) {
1909 return std::count_if(m_nodes.begin(), m_nodes.end(), [conn_type](
CNode*
node) { return node->m_conn_type == conn_type; }););
1912 if (max_connections != std::nullopt && existing_connections >= max_connections)
return false;
1916 if (!grant)
return false;
1929 decltype(m_reconnections) reconnections_to_add;
1935 if (!network_active) {
1937 for (
CNode* pnode : m_nodes) {
1938 if (!pnode->fDisconnect) {
1940 pnode->fDisconnect =
true;
1946 std::vector<CNode*> nodes_copy = m_nodes;
1947 for (
CNode* pnode : nodes_copy)
1949 if (pnode->fDisconnect)
1952 m_nodes.erase(remove(m_nodes.begin(), m_nodes.end(), pnode), m_nodes.end());
1957 if (network_active && pnode->m_transport->ShouldReconnectV1()) {
1958 reconnections_to_add.push_back({
1959 .addr_connect = pnode->addr,
1960 .grant = std::move(pnode->grantOutbound),
1961 .destination = pnode->m_dest,
1962 .conn_type = pnode->m_conn_type,
1963 .use_v2transport =
false});
1964 LogDebug(
BCLog::NET,
"retrying with v1 transport protocol for peer=%d\n", pnode->GetId());
1968 pnode->grantOutbound.Release();
1971 pnode->CloseSocketDisconnect();
1974 if (pnode->IsManualOrFullOutboundConn()) --m_network_conn_counts[pnode->addr.GetNetwork()];
1985 for (
CNode* pnode : nodes_disconnected_copy)
1988 if (pnode->GetRefCount() <= 0) {
1997 m_reconnections.splice(m_reconnections.end(), std::move(reconnections_to_add));
2008 nodes_size = m_nodes.size();
2027 const auto last_send{
node.m_last_send.load()};
2028 const auto last_recv{
node.m_last_recv.load()};
2035 if (!has_received || !has_sent) {
2036 std::string has_never;
2037 if (!has_received) has_never +=
", never received from peer";
2038 if (!has_sent) has_never +=
", never sent to peer";
2040 "socket no message in first %i seconds%s, %s",
2043 node.DisconnectMsg()
2050 "socket sending timeout: %is, %s", Ticks<std::chrono::seconds>(now - last_send),
2051 node.DisconnectMsg()
2058 "socket receive timeout: %is, %s", Ticks<std::chrono::seconds>(now - last_recv),
2059 node.DisconnectMsg()
2064 if (!
node.fSuccessfullyConnected) {
2081 events_per_sock.emplace(hListenSocket.sock,
Sock::Events{Sock::RECV});
2084 for (
CNode* pnode : nodes) {
2085 bool select_recv = !pnode->fPauseRecv;
2088 LOCK(pnode->cs_vSend);
2092 const auto& [to_send, more, _msg_type] = pnode->m_transport->GetBytesToSend(!pnode->vSendMsg.empty());
2093 select_send = !to_send.empty() || more;
2095 if (!select_recv && !select_send)
continue;
2097 LOCK(pnode->m_sock_mutex);
2098 if (pnode->m_sock) {
2100 events_per_sock.emplace(pnode->m_sock,
Sock::Events{event});
2104 return events_per_sock;
2124 if (events_per_sock.empty() || !events_per_sock.begin()->first->WaitMany(timeout, events_per_sock)) {
2143 for (
CNode* pnode : nodes) {
2151 bool recvSet =
false;
2152 bool sendSet =
false;
2153 bool errorSet =
false;
2155 LOCK(pnode->m_sock_mutex);
2156 if (!pnode->m_sock) {
2159 const auto it = events_per_sock.find(pnode->m_sock);
2160 if (it != events_per_sock.end()) {
2163 errorSet = it->second.occurred &
Sock::ERR;
2180 if (data_left) recvSet =
false;
2184 if (recvSet || errorSet)
2187 uint8_t pchBuf[0x10000];
2190 LOCK(pnode->m_sock_mutex);
2191 if (!pnode->m_sock) {
2194 nBytes = pnode->m_sock->Recv(pchBuf,
sizeof(pchBuf),
MSG_DONTWAIT);
2198 bool notify =
false;
2199 if (!pnode->ReceiveMsgBytes({pchBuf, (size_t)nBytes}, notify)) {
2201 "receiving message bytes failed, %s",
2202 pnode->DisconnectMsg()
2204 pnode->CloseSocketDisconnect();
2208 pnode->MarkReceivedMsgsForProcessing();
2212 else if (nBytes == 0)
2215 if (!pnode->fDisconnect) {
2218 pnode->CloseSocketDisconnect();
2220 else if (nBytes < 0)
2226 if (!pnode->fDisconnect) {
2229 pnode->CloseSocketDisconnect();
2246 const auto it = events_per_sock.find(listen_socket.sock);
2247 if (it != events_per_sock.end() && it->second.occurred &
Sock::RECV) {
2268 fMsgProcWake =
true;
2275 int outbound_connection_count = 0;
2279 constexpr std::chrono::seconds SEEDNODE_TIMEOUT = 30
s;
2280 LogInfo(
"-seednode enabled. Trying the provided seeds for %d seconds before defaulting to the dnsseeds.\n", SEEDNODE_TIMEOUT.count());
2289 LogInfo(
"Couldn't connect to enough peers via seed nodes. Handing fetch logic to the DNS seeds.\n");
2295 LogInfo(
"P2P peers available. Finished fetching data from seed nodes.\n");
2303 std::shuffle(seeds.begin(), seeds.end(), rng);
2304 int seeds_right_now = 0;
2308 seeds_right_now = seeds.size();
2309 }
else if (
addrman.get().Size() == 0) {
2313 seeds_right_now = seeds.size();
2333 for (
const std::string& seed : seeds) {
2334 if (seeds_right_now == 0) {
2337 if (
addrman.get().Size() > 0) {
2338 LogInfo(
"Waiting %d seconds before querying DNS seeds.\n", seeds_wait_time.count());
2339 std::chrono::seconds to_wait = seeds_wait_time;
2340 while (to_wait.count() > 0) {
2350 LogInfo(
"%d addresses found from DNS seeds\n", found);
2351 LogInfo(
"P2P peers available. Finished DNS seeding.\n");
2353 LogInfo(
"P2P peers available. Skipped DNS seeding.\n");
2365 LogInfo(
"Waiting for network to be reactivated before querying DNS seeds.\n");
2371 LogInfo(
"Loading addresses from DNS seed %s\n", seed);
2377 std::vector<CAddress> vAdd;
2379 std::string host =
strprintf(
"x%x.%s", requiredServiceBits, seed);
2388 unsigned int nMaxIPs = 32;
2389 const auto addresses{
LookupHost(host, nMaxIPs,
true)};
2390 if (!addresses.empty()) {
2394 vAdd.push_back(addr);
2397 addrman.get().Add(vAdd, resolveSource);
2407 LogInfo(
"%d addresses found from DNS seeds\n", found);
2409 LogInfo(
"Skipping DNS seeds. Enough peers have been found\n");
2415 const auto start{SteadyClock::now()};
2420 addrman.get().Size(), Ticks<std::chrono::milliseconds>(SteadyClock::now() - start));
2427 std::string strDest;
2430 if (m_addr_fetches.empty())
2432 strDest = m_addr_fetches.front();
2433 m_addr_fetches.pop_front();
2453 LogDebug(
BCLog::NET,
"setting try another outbound peer=%s\n", flag ?
"true" :
"false");
2470 for (
const CNode* pnode : m_nodes) {
2471 if (pnode->fSuccessfullyConnected && pnode->IsFullOutboundConn()) ++nRelevant;
2487 int full_outbound_peers = 0;
2490 for (
const CNode* pnode : m_nodes) {
2491 if (pnode->fSuccessfullyConnected && !pnode->fDisconnect && pnode->IsFullOutboundConn()) {
2492 ++full_outbound_peers;
2503 int block_relay_peers = 0;
2506 for (
const CNode* pnode : m_nodes) {
2507 if (pnode->fSuccessfullyConnected && !pnode->fDisconnect && pnode->IsBlockOnlyConn()) {
2508 ++block_relay_peers;
2517 std::unordered_set<Network> networks{};
2518 for (
int n = 0; n <
NET_MAX; n++) {
2522 networks.insert(net);
2531 return m_network_conn_counts[net] > 1;
2542 for (
const auto net : nets) {
2560 if (!connect.empty())
2565 for (int64_t nLoop = 0;; nLoop++)
2567 for (
const std::string& strAddr : connect)
2571 for (
int i = 0; i < 10 && i < nLoop; i++)
2586 auto start = GetTime<std::chrono::microseconds>();
2594 const bool use_seednodes{!
gArgs.
GetArgs(
"-seednode").empty()};
2597 bool add_addr_fetch{
addrman.get().Size() == 0 && !seed_nodes.empty()};
2598 constexpr std::chrono::seconds ADD_NEXT_SEEDNODE = 10
s;
2600 if (!add_fixed_seeds) {
2601 LogInfo(
"Fixed seeds are disabled\n");
2605 if (add_addr_fetch) {
2606 add_addr_fetch =
false;
2610 if (
addrman.get().Size() == 0) {
2611 LogInfo(
"Empty addrman, adding seednode (%s) to addrfetch\n", seed);
2613 LogInfo(
"Couldn't connect to peers from addrman after %d seconds. Adding seednode (%s) to addrfetch\n", ADD_NEXT_SEEDNODE.count(), seed);
2631 if (add_fixed_seeds && !fixed_seed_networks.empty()) {
2636 bool add_fixed_seeds_now =
false;
2638 if (GetTime<std::chrono::seconds>() > start + std::chrono::minutes{1}) {
2639 add_fixed_seeds_now =
true;
2640 LogInfo(
"Adding fixed seeds as 60 seconds have passed and addrman is empty for at least one reachable network\n");
2644 else if (!dnsseed && !use_seednodes) {
2646 if (m_added_node_params.empty()) {
2647 add_fixed_seeds_now =
true;
2648 LogInfo(
"Adding fixed seeds as -dnsseed=0 (or IPv4/IPv6 connections are disabled via -onlynet) and neither -addnode nor -seednode are provided\n");
2652 if (add_fixed_seeds_now) {
2660 seed_addrs.erase(std::remove_if(seed_addrs.begin(), seed_addrs.end(),
2661 [&fixed_seed_networks](
const CAddress& addr) { return !fixed_seed_networks.contains(addr.GetNetwork()); }),
2665 addrman.get().Add(seed_addrs, local);
2666 add_fixed_seeds =
false;
2667 LogInfo(
"Added %d fixed seeds from reachable networks.\n", seed_addrs.size());
2677 int nOutboundFullRelay = 0;
2678 int nOutboundBlockRelay = 0;
2679 int outbound_privacy_network_peers = 0;
2680 std::set<std::vector<unsigned char>> outbound_ipv46_peer_netgroups;
2684 for (
const CNode* pnode : m_nodes) {
2685 if (pnode->IsFullOutboundConn()) nOutboundFullRelay++;
2686 if (pnode->IsBlockOnlyConn()) nOutboundBlockRelay++;
2689 switch (pnode->m_conn_type) {
2703 const CAddress address{pnode->addr};
2704 if (address.IsTor() || address.IsI2P() || address.IsCJDNS()) {
2712 ++outbound_privacy_network_peers;
2723 add_addr_fetch =
true;
2728 auto now = GetTime<std::chrono::microseconds>();
2729 bool anchor =
false;
2730 bool fFeeler =
false;
2731 std::optional<Network> preferred_net;
2777 }
else if (now > next_feeler) {
2783 now > next_extra_network_peer &&
2797 addrman.get().ResolveCollisions();
2828 std::tie(addr, addr_last_try) =
addrman.get().SelectTriedCollision();
2833 std::tie(addr, addr_last_try) =
addrman.get().Select(
true, reachable_nets);
2842 std::tie(addr, addr_last_try) =
addrman.get().Select(
true, reachable_nets);
2849 std::tie(addr, addr_last_try) = preferred_net.has_value()
2850 ?
addrman.get().Select(
false, {*preferred_net})
2851 :
addrman.get().Select(
false, reachable_nets);
2869 if (current_time - addr_last_try < 10min && nTries < 30) {
2891 LogDebug(
BCLog::NET,
"Not making automatic %s%s connection to %s peer selected for manual (addnode) connection%s\n",
2892 preferred_net.has_value() ?
"network-specific " :
"",
2917 const bool count_failures{((int)outbound_ipv46_peer_netgroups.size() + outbound_privacy_network_peers) >= std::min(
m_max_automatic_connections - 1, 2)};
2928 std::vector<CAddress>
ret;
2930 for (
const CNode* pnode : m_nodes) {
2931 if (pnode->IsBlockOnlyConn()) {
2932 ret.push_back(pnode->addr);
2943 std::vector<AddedNodeInfo>
ret;
2945 std::list<AddedNodeParams> lAddresses(0);
2948 ret.reserve(m_added_node_params.size());
2949 std::copy(m_added_node_params.cbegin(), m_added_node_params.cend(), std::back_inserter(lAddresses));
2954 std::map<CService, bool> mapConnected;
2955 std::map<std::string, std::pair<bool, CService>> mapConnectedByName;
2958 for (
const CNode* pnode : m_nodes) {
2959 if (pnode->addr.IsValid()) {
2960 mapConnected[pnode->addr] = pnode->IsInboundConn();
2962 std::string addrName{pnode->m_addr_name};
2963 if (!addrName.empty()) {
2964 mapConnectedByName[std::move(addrName)] = std::make_pair(pnode->IsInboundConn(),
static_cast<const CService&
>(pnode->addr));
2969 for (
const auto& addr : lAddresses) {
2972 if (service.IsValid()) {
2974 auto it = mapConnected.find(service);
2975 if (it != mapConnected.end()) {
2976 if (!include_connected) {
2979 addedNode.resolvedAddress = service;
2980 addedNode.fConnected =
true;
2981 addedNode.fInbound = it->second;
2985 auto it = mapConnectedByName.find(addr.m_added_node);
2986 if (it != mapConnectedByName.end()) {
2987 if (!include_connected) {
2990 addedNode.resolvedAddress = it->second.second;
2991 addedNode.fConnected =
true;
2992 addedNode.fInbound = it->second.first;
2995 ret.emplace_back(std::move(addedNode));
3037 const char* pszDest,
3039 bool use_v2transport,
3040 const std::optional<Proxy>& proxy_override)
3056 bool banned_or_discouraged =
m_banman && (
m_banman->IsDiscouraged(addrConnect) ||
m_banman->IsBanned(addrConnect));
3073 m_nodes.push_back(pnode);
3092 std::optional<Proxy> clearnet_proxy;
3098 if (clearnet_proxy.has_value()) {
3112 return std::nullopt;
3117 proxy = clearnet_proxy;
3124 return m_num_to_open;
3130 m_num_to_open.notify_all();
3135 size_t current_value{m_num_to_open.load()};
3138 new_value = current_value > n ? current_value - n : 0;
3139 }
while (!m_num_to_open.compare_exchange_strong(current_value, new_value));
3145 m_num_to_open.wait(0);
3150 if (m_outbound_tor_ok_at_least_once.load()) {
3155 return std::nullopt;
3168 bool fMoreWork =
false;
3176 for (
CNode* pnode : snap.Nodes()) {
3177 if (pnode->fDisconnect)
3182 fMoreWork |= (fMoreNodeWork && !pnode->fPauseSend);
3197 fMsgProcWake =
false;
3205 static constexpr auto err_wait_begin = 1
s;
3206 static constexpr auto err_wait_cap = 5min;
3207 auto err_wait = err_wait_begin;
3209 bool advertising_listen_addr =
false;
3212 auto SleepOnFailure = [&]() {
3214 if (err_wait < err_wait_cap) {
3222 if (advertising_listen_addr && conn.
me.
IsValid()) {
3224 advertising_listen_addr =
false;
3230 if (!advertising_listen_addr) {
3232 advertising_listen_addr =
true;
3242 err_wait = err_wait_begin;
3251 size_t addrman_num_bad_addresses{0};
3267 std::optional<Proxy> proxy;
3269 if (!net.has_value()) {
3270 LogWarning(
"Unable to open -privatebroadcast connections: neither Tor nor I2P is reachable");
3275 const auto [addr,
_] =
addrman.get().Select(
false, {net.value()});
3277 if (!addr.IsValid() ||
IsLocal(addr)) {
3278 ++addrman_num_bad_addresses;
3279 if (addrman_num_bad_addresses > 100) {
3285 addrman_num_bad_addresses = 0;
3287 auto target_str{addr.ToStringAddrPort()};
3288 if (proxy.has_value()) {
3289 target_str +=
" through the proxy at " + proxy->ToString();
3296 std::move(conn_max_grant),
3305 if (remaining == 0) {
3308 LogDebug(
BCLog::PRIVBROADCAST,
"Failed to connect to %s, will retry to a different address; remaining connections to open: %d", target_str, remaining);
3320 struct sockaddr_storage sockaddr;
3321 socklen_t len =
sizeof(sockaddr);
3322 if (!addrBind.
GetSockAddr((
struct sockaddr*)&sockaddr, &len))
3338 if (sock->SetSockOpt(SOL_SOCKET, SO_REUSEADDR, &nOne,
sizeof(
int)) ==
SOCKET_ERROR) {
3347 if (sock->SetSockOpt(IPPROTO_IPV6, IPV6_V6ONLY, &nOne,
sizeof(
int)) ==
SOCKET_ERROR) {
3353 int nProtLevel = PROTECTION_LEVEL_UNRESTRICTED;
3354 if (sock->SetSockOpt(IPPROTO_IPV6, IPV6_PROTECTION_LEVEL, &nProtLevel,
sizeof(
int)) ==
SOCKET_ERROR) {
3361 if (sock->Bind(
reinterpret_cast<struct sockaddr*
>(&sockaddr), len) ==
SOCKET_ERROR) {
3364 strError =
strprintf(
_(
"Unable to bind to %s on this computer. %s is probably already running."), addrBind.
ToStringAddrPort(), CLIENT_NAME);
3391 LogInfo(
"%s: %s\n", __func__, addr.ToStringAddr());
3398 LogInfo(
"%s: %s\n", __func__, active);
3416 bool network_active,
3417 std::shared_ptr<CThreadInterrupt> interrupt_net)
3434 return nLastNodeId.fetch_add(1, std::memory_order_relaxed);
3469 for (
const auto& addrBind : options.
vBinds) {
3474 for (
const auto& addrBind : options.
vWhiteBinds) {
3479 for (
const auto& addr_bind : options.
onion_binds) {
3491 struct in_addr inaddr_any;
3492 inaddr_any.s_addr = htonl(INADDR_ANY);
3509 _(
"Failed to listen on any port. Use -listen=0 if you want this."),
3523 std::vector<std::string> seed_nodes = connOptions.
vSeedNodes;
3524 if (!seed_nodes.empty()) {
3534 LogInfo(
"%i block-relay-only anchors will be tried for connections.\n",
m_anchors.size());
3561 fMsgProcWake =
false;
3568 LogInfo(
"DNS seeding disabled\n");
3578 _(
"Cannot provide specific connections and have addrman find outgoing connections at the same time."),
3586 [
this, connect = connOptions.
m_specified_outgoing, seed_nodes = std::move(seed_nodes)] { ThreadOpenConnections(connect, seed_nodes); });
3637 (*m_interrupt_net)();
3696 std::vector<CNode*> nodes;
3698 for (
CNode* pnode : nodes) {
3700 pnode->CloseSocketDisconnect();
3729 std::vector<CAddress> addresses =
addrman.get().GetAddr(max_addresses, max_pct, network, filtered);
3731 addresses.erase(std::remove_if(addresses.begin(), addresses.end(),
3732 [
this](
const CAddress& addr){return m_banman->IsDiscouraged(addr) || m_banman->IsBanned(addr);}),
3741 const auto current_time = GetTime<std::chrono::microseconds>();
3779 const bool resolved_is_valid{resolved.
IsValid()};
3782 for (
const auto& it : m_added_node_params) {
3786 m_added_node_params.push_back(add);
3793 for (
auto it = m_added_node_params.begin(); it != m_added_node_params.end(); ++it) {
3794 if (
node == it->m_added_node) {
3795 m_added_node_params.erase(it);
3808 return (m_added_node_params.size() < 24
3809 && std::any_of(m_added_node_params.cbegin(), m_added_node_params.cend(),
3810 [&](
const auto& p) { return p.m_added_node == addr_str || p.m_added_node == addr_port_str; }));
3817 return m_nodes.size();
3820 for (
const auto& pnode : m_nodes) {
3833 return mapLocalHost;
3847 vstats.reserve(m_nodes.size());
3848 for (
CNode* pnode : m_nodes) {
3849 vstats.emplace_back();
3850 pnode->CopyStats(vstats.back());
3851 vstats.back().m_mapped_as =
GetMappedAS(pnode->addr);
3858 auto it = std::ranges::find_if(m_nodes, [&strNode](
CNode*
node) {
return node->m_addr_name == strNode; });
3859 if (it != m_nodes.end()) {
3862 node->fDisconnect =
true;
3871 bool disconnected =
false;
3873 for (
CNode* pnode : m_nodes) {
3874 if (subnet.
Match(pnode->addr)) {
3876 pnode->fDisconnect =
true;
3877 disconnected =
true;
3880 return disconnected;
3892 for(
CNode* pnode : m_nodes) {
3893 if (
id == pnode->GetId()) {
3895 pnode->fDisconnect =
true;
3912 nTotalBytesSent += bytes;
3914 const auto now = GetTime<std::chrono::seconds>();
3918 nMaxOutboundCycleStartTime = now;
3919 nMaxOutboundTotalBytesSentInCycle = 0;
3922 nMaxOutboundTotalBytesSentInCycle += bytes;
3951 if (nMaxOutboundCycleStartTime.count() == 0)
3955 const auto now = GetTime<std::chrono::seconds>();
3956 return (cycleEndTime < now) ? 0
s : cycleEndTime - now;
3966 if (historicalBlockServingLimit)
3999 return nTotalBytesSent;
4009 if (use_v2transport) {
4010 return std::make_unique<V2Transport>(
id, !inbound);
4012 return std::make_unique<V1Transport>(
id);
4017 std::shared_ptr<Sock> sock,
4019 uint64_t nKeyedNetGroupIn,
4020 uint64_t nLocalHostNonceIn,
4022 const std::string& addrNameIn,
4025 uint64_t network_key,
4028 m_permission_flags{node_opts.permission_flags},
4032 addrBind{addrBindIn},
4033 m_addr_name{addrNameIn.empty() ? addr.ToStringAddrPort() : addrNameIn},
4035 m_inbound_onion{inbound_onion},
4036 m_prefer_evict{node_opts.prefer_evict},
4037 nKeyedNetGroup{nKeyedNetGroupIn},
4038 m_network_key{network_key},
4039 m_conn_type{conn_type_in},
4041 nLocalHostNonce{nLocalHostNonceIn},
4042 m_recv_flood_size{node_opts.recv_flood_size},
4043 m_i2p_sam_session{
std::move(node_opts.i2p_sam_session)}
4048 mapRecvBytesPerMsgType[
msg] = 0;
4063 size_t nSizeAdded = 0;
4067 nSizeAdded +=
msg.GetMemoryUsage();
4071 m_msg_process_queue.splice(m_msg_process_queue.end(),
vRecvMsg);
4072 m_msg_process_queue_size += nSizeAdded;
4079 if (m_msg_process_queue.empty())
return std::nullopt;
4081 std::list<CNetMessage> msgs;
4083 msgs.splice(msgs.begin(), m_msg_process_queue, m_msg_process_queue.begin());
4084 m_msg_process_queue_size -= msgs.front().GetMemoryUsage();
4087 return std::make_pair(std::move(msgs.front()), !m_msg_process_queue.empty());
4122 size_t nMessageSize =
msg.data.size();
4137 size_t nBytesSent = 0;
4142 const auto& [to_send, more, _msg_type] =
4144 const bool queue_was_empty{to_send.empty() && pnode->vSendMsg.empty()};
4147 pnode->m_send_memusage +=
msg.GetMemoryUsage();
4150 pnode->vSendMsg.push_back(std::move(
msg));
4159 if (queue_was_empty && more) {
4170 CNode* found =
nullptr;
4172 for (
auto&& pnode : m_nodes) {
4173 if(pnode->
GetId() ==
id) {
4200 decltype(m_reconnections) todo;
4203 if (m_reconnections.empty())
break;
4204 todo.splice(todo.end(), m_reconnections, m_reconnections.begin());
4207 auto& item = *todo.begin();
4214 std::move(item.grant),
4215 item.destination.empty() ?
nullptr : item.destination.c_str(),
4217 item.use_v2transport);
4225 std::vector<CNetAddr> clearnet_addrs;
4226 clearnet_addrs.reserve(v4_addrs.size() + v6_addrs.size());
4227 std::transform(v4_addrs.begin(), v4_addrs.end(), std::back_inserter(clearnet_addrs),
4228 [](
const CAddress& addr) { return static_cast<CNetAddr>(addr); });
4229 std::transform(v6_addrs.begin(), v6_addrs.end(), std::back_inserter(clearnet_addrs),
4230 [](
const CAddress& addr) { return static_cast<CNetAddr>(addr); });
4236 const std::string& msg_type,
4237 std::span<const unsigned char>
data,
4244 auto now = GetTime<std::chrono::microseconds>();
4248 std::replace(clean_addr.begin(), clean_addr.end(),
':',
'_');
4251 fs::create_directories(base_path);
4253 fs::path path = base_path / (is_incoming ?
"msgs_recv.dat" :
"msgs_sent.dat");
4257 f << std::span{msg_type};
4261 uint32_t size =
data.size();
4265 if (f.fclose() != 0) {
4266 throw std::ios_base::failure(
4271std::function<void(
const CAddress& addr,
4272 const std::string& msg_type,
4273 std::span<const unsigned char>
data,
bool DumpPeerAddresses(const ArgsManager &args, const AddrMan &addr)
std::vector< CAddress > ReadAnchors(const fs::path &anchors_db_path)
Read the anchor IP address database (anchors.dat)
void DumpAnchors(const fs::path &anchors_db_path, const std::vector< CAddress > &anchors)
Dump the anchor IP address database (anchors.dat)
const CChainParams & Params()
Return the currently selected parameters.
#define Assume(val)
Assume is the identity function.
Stochastic address manager.
std::vector< std::string > GetArgs(const std::string &strArg) const EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
Return a vector of strings of the given argument.
fs::path GetDataDirNet() const EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
Get data directory path with appended network identifier.
int64_t GetIntArg(const std::string &strArg, int64_t nDefault) const EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
bool GetBoolArg(const std::string &strArg, bool fDefault) const EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
Return boolean argument or default value.
Non-refcounted RAII wrapper for FILE*.
bool Decrypt(std::span< const std::byte > input, std::span< const std::byte > aad, bool &ignore, std::span< std::byte > contents) noexcept
Decrypt a packet.
std::span< const std::byte > GetSendGarbageTerminator() const noexcept
Get the Garbage Terminator to send.
static constexpr unsigned GARBAGE_TERMINATOR_LEN
unsigned DecryptLength(std::span< const std::byte > input) noexcept
Decrypt the length of a packet.
std::span< const std::byte > GetSessionID() const noexcept
Get the Session ID.
const EllSwiftPubKey & GetOurPubKey() const noexcept
Retrieve our public key.
std::span< const std::byte > GetReceiveGarbageTerminator() const noexcept
Get the expected Garbage Terminator to receive.
static constexpr unsigned LENGTH_LEN
static constexpr unsigned EXPANSION
void Initialize(const EllSwiftPubKey &their_pubkey, bool initiator, bool self_decrypt=false) noexcept
Initialize when the other side's public key is received.
void Encrypt(std::span< const std::byte > contents, std::span< const std::byte > aad, bool ignore, std::span< std::byte > output) noexcept
Encrypt a packet.
A CService with information about it as peer.
ServiceFlags nServices
Serialized as uint64_t in V1, and as CompactSize in V2.
NodeSeconds nTime
Always included in serialization. The behavior is unspecified if the value is not representable as ui...
static constexpr SerParams V2_NETWORK
CChainParams defines various tweakable parameters of a given instance of the Bitcoin system.
const MessageStartChars & MessageStart() const
uint16_t GetDefaultPort() const
const std::vector< std::string > & DNSSeeds() const
Return the list of hostnames to look up for DNS seeds.
const std::vector< uint8_t > & FixedSeeds() const
RAII helper to atomically create a copy of m_nodes and add a reference to each of the nodes.
std::atomic_bool m_outbound_tor_ok_at_least_once
Remember if we ever established at least one outbound connection to a Tor peer, including sending and...
void NumToOpenAdd(size_t n)
Increment the number of new connections of type ConnectionType::PRIVATE_BROADCAST to be opened by CCo...
std::optional< Proxy > ProxyForIPv4or6() const
Check if private broadcast can be done to IPv4 or IPv6 peers and if so via which proxy.
size_t NumToOpenSub(size_t n)
Decrement the number of new connections of type ConnectionType::PRIVATE_BROADCAST to be opened by CCo...
void NumToOpenWait() const
Wait for the number of needed connections to become greater than 0.
size_t NumToOpen() const
Get the pending number of connections to open.
std::optional< Network > PickNetwork(std::optional< Proxy > &proxy) const
Choose a network to open a connection to.
std::counting_semaphore m_sem_conn_max
Semaphore used to guard against opening too many connections.
void AcceptConnection(const ListenSocket &hListenSocket) EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
std::unordered_set< Network > GetReachableEmptyNetworks() const
Return reachable networks for which we have no addresses in addrman and therefore may require loading...
std::condition_variable condMsgProc
std::thread threadMessageHandler
void PerformReconnections() EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex
Attempt reconnections, if m_reconnections non-empty.
bool MaybePickPreferredNetwork(std::optional< Network > &network) EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
Search for a "preferred" network, a reachable network to which we currently don't have any OUTBOUND_F...
std::reference_wrapper< AddrMan > addrman
void StopNodes() EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex
void DisconnectNodes() EXCLUSIVE_LOCKS_REQUIRED(!m_reconnections_mutex
m_max_outbound_full_relay
void DeleteNode(CNode *pnode)
void ThreadI2PAcceptIncoming() EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
void Stop() EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex
static constexpr size_t MAX_UNUSED_I2P_SESSIONS_SIZE
Cap on the size of m_unused_i2p_sessions, to ensure it does not unexpectedly use too much memory.
bool GetTryNewOutboundPeer() const
const bool use_v2transport(GetLocalServices() &NODE_P2P_V2)
class CConnman::PrivateBroadcast m_private_broadcast
uint16_t GetDefaultPort(Network net) const
bool AlreadyConnectedToAddress(const CNetAddr &addr) const EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
Determine whether we're already connected to a given address.
bool ShouldRunInactivityChecks(const CNode &node, NodeClock::time_point now) const
Return true if we should disconnect the peer for failing an inactivity check.
std::thread threadI2PAcceptIncoming
std::vector< CAddress > GetAddresses(CNode &requestor, size_t max_addresses, size_t max_pct)
Return addresses from the per-requestor cache.
void SetTryNewOutboundPeer(bool flag)
std::atomic< bool > flagInterruptMsgProc
void Interrupt() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc)
std::map< CNetAddr, LocalServiceInfo > getNetLocalAddresses() const
void ThreadDNSAddressSeed() EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex
std::vector< CAddress > GetCurrentBlockRelayOnlyConns() const EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
Return vector of current BLOCK_RELAY peers.
bool AlreadyConnectedToAddressPort(const CService &addr_port) const EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
Determine whether we're already connected to a given address:port.
std::atomic< NodeId > nLastNodeId
bool AlreadyConnectedToHost(std::string_view host) const EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
Determine whether we're already connected to a given "host:port".
void WakeMessageHandler() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc)
bool OutboundTargetReached(bool historicalBlockServingLimit) const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex)
check if the outbound target is reached if param historicalBlockServingLimit is set true,...
void SocketHandlerListening(const Sock::EventsPerSock &events_per_sock) EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
Accept incoming connections, one from each read-ready listening socket.
uint64_t GetMaxOutboundTarget() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex)
std::thread threadDNSAddressSeed
bool AddConnection(const std::string &address, ConnectionType conn_type, bool use_v2transport) EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex
Attempts to open a connection.
void SocketHandlerConnected(const std::vector< CNode * > &nodes, const Sock::EventsPerSock &events_per_sock) EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex
Do the read/write for connected sockets that are ready for IO.
void StartExtraBlockRelayPeers()
const NetGroupManager & m_netgroupman
std::vector< CAddress > m_anchors
Addresses that were saved during the previous clean shutdown.
std::chrono::seconds GetMaxOutboundTimeframe() const
uint64_t CalculateKeyedNetGroup(const CNetAddr &ad) const
unsigned int nPrevNodeCount
void AddWhitelistPermissionFlags(NetPermissionFlags &flags, std::optional< CNetAddr > addr, const std::vector< NetWhitelistPermissions > &ranges) const
ServiceFlags GetLocalServices() const
Used to convey which local services we are offering peers during node connection.
bool AddNode(const AddedNodeParams &add) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex)
std::vector< AddedNodeInfo > GetAddedNodeInfo(bool include_connected) const EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex
CNode * ConnectNode(CAddress addrConnect, const char *pszDest, bool fCountFailure, ConnectionType conn_type, bool use_v2transport, const std::optional< Proxy > &proxy_override) EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex
Open a new P2P connection.
std::atomic_bool m_try_another_outbound_peer
flag for deciding to connect to an extra outbound peer, in excess of m_max_outbound_full_relay This t...
bool InitBinds(const Options &options)
vWhitelistedRangeOutgoing
void AddAddrFetch(const std::string &strDest) EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex)
std::vector< ListenSocket > vhListenSocket
bool AttemptToEvictConnection() EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
Try to find a connection to evict when the node is full.
CSipHasher GetDeterministicRandomizer(uint64_t id) const
Get a unique deterministic randomizer.
Mutex m_total_bytes_sent_mutex
void ThreadOpenAddedConnections() EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex
bool Bind(const CService &addr, unsigned int flags, NetPermissionFlags permissions)
std::thread threadOpenConnections
void ThreadPrivateBroadcast() EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex
uint32_t GetMappedAS(const CNetAddr &addr) const
void ProcessAddrFetch() EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex
Mutex m_addr_fetches_mutex
Mutex m_reconnections_mutex
Mutex protecting m_reconnections.
bool Start(CScheduler &scheduler, const Options &options) EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex
const uint64_t nSeed0
SipHasher seeds for deterministic randomness.
std::chrono::seconds GetMaxOutboundTimeLeftInCycle_() const EXCLUSIVE_LOCKS_REQUIRED(m_total_bytes_sent_mutex)
returns the time left in the current max outbound cycle in case of no limit, it will always return 0
uint64_t GetTotalBytesRecv() const
std::pair< size_t, bool > SocketSendData(CNode &node) const EXCLUSIVE_LOCKS_REQUIRED(node.cs_vSend)
(Try to) send data from node's vSendMsg.
m_max_outbound_block_relay
static bool NodeFullyConnected(const CNode *pnode)
std::unique_ptr< std::counting_semaphore<> > semOutbound
const CChainParams & m_params
void SetNetworkActive(bool active)
bool MultipleManualOrFullOutboundConns(Network net) const EXCLUSIVE_LOCKS_REQUIRED(m_nodes_mutex)
bool AddedNodesContain(const CAddress &addr) const EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex)
bool InactivityCheck(const CNode &node, NodeClock::time_point now) const
Return true if the peer is inactive and should be disconnected.
std::chrono::seconds GetMaxOutboundTimeLeftInCycle() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex)
const std::shared_ptr< CThreadInterrupt > m_interrupt_net
This is signaled when network activity should cease.
void CreateNodeFromAcceptedSocket(std::unique_ptr< Sock > &&sock, NetPermissionFlags permission_flags, const CService &addr_bind, const CService &addr) EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
Create a CNode object from a socket that has just been accepted and add the node to the m_nodes membe...
void ThreadOpenConnections(std::vector< std::string > connect, std::span< const std::string > seed_nodes) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex
void GetNodeStats(std::vector< CNodeStats > &vstats) const EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
bool ForNode(NodeId id, std::function< bool(CNode *pnode)> func) EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
m_max_automatic_connections
std::thread threadPrivateBroadcast
bool RemoveAddedNode(std::string_view node) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex)
bool fAddressesInitialized
std::vector< CAddress > GetAddressesUnsafe(size_t max_addresses, size_t max_pct, std::optional< Network > network, bool filtered=true) const
Return randomly selected addresses.
void NotifyNumConnectionsChanged() EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
int GetExtraBlockRelayCount() const EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
std::thread threadOpenAddedConnections
bool DisconnectNode(std::string_view node) EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
Mutex m_added_nodes_mutex
vWhitelistedRangeIncoming
void ThreadSocketHandler() EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex
void RecordBytesSent(uint64_t bytes) EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex)
void ThreadMessageHandler() EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex
void Init(const Options &connOptions) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex
Mutex m_unused_i2p_sessions_mutex
Mutex protecting m_i2p_sam_sessions.
uint64_t GetTotalBytesSent() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex)
std::unique_ptr< std::counting_semaphore<> > semAddnode
size_t GetNodeCount(ConnectionDirection) const EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
void RecordBytesRecv(uint64_t bytes)
int GetExtraFullOutboundCount() const EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
uint64_t GetOutboundTargetBytesLeft() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex)
response the bytes left in the current max outbound cycle in case of no limit, it will always respons...
void SocketHandler() EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex
Check connected and listening sockets for IO readiness and process them accordingly.
void PushMessage(CNode *pnode, CSerializedNetMsg &&msg) EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex)
std::list< CNode * > m_nodes_disconnected
std::unique_ptr< i2p::sam::Session > m_i2p_sam_session
I2P SAM session.
std::map< uint64_t, CachedAddrResponse > m_addr_response_caches
Addr responses stored in different caches per (network, local socket) prevent cross-network node iden...
bool CheckIncomingNonce(uint64_t nonce) EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
Sock::EventsPerSock GenerateWaitSockets(std::span< CNode *const > nodes)
Generate a collection of sockets to check for IO readiness.
std::atomic< uint64_t > nTotalBytesRecv
std::atomic< bool > fNetworkActive
AssertLockNotHeld(m_reconnections_mutex)
std::atomic_bool m_start_extra_block_relay_peers
flag for initiating extra block-relay-only peer connections.
CConnman(uint64_t seed0, uint64_t seed1, AddrMan &addrman, const NetGroupManager &netgroupman, const CChainParams ¶ms, bool network_active=true, std::shared_ptr< CThreadInterrupt > interrupt_net=std::make_shared< CThreadInterrupt >())
std::thread threadSocketHandler
int GetFullOutboundConnCount() const EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex)
bool BindListenPort(const CService &bindAddr, bilingual_str &strError, NetPermissionFlags permissions)
bool OpenNetworkConnection(const CAddress &addrConnect, bool fCountFailure, CountingSemaphoreGrant<> &&grant_outbound, const char *pszDest, ConnectionType conn_type, bool use_v2transport, const std::optional< Proxy > &proxy_override=std::nullopt) EXCLUSIVE_LOCKS_REQUIRED(!m_nodes_mutex
Open a new P2P connection and initialize it with the PeerManager at m_msgproc.
An encapsulated private key.
Network GetNetClass() const
std::string ToStringAddr() const
std::vector< unsigned char > GetAddrBytes() const
bool IsPrivacyNet() const
Whether this object is a privacy network.
bool SetSpecial(std::string_view addr)
Parse a Tor or I2P address and set this object to it.
bool SetInternal(const std::string &name)
Create an "internal" address that represents a name or FQDN.
enum Network GetNetwork() const
Transport protocol agnostic message container.
size_t GetMemoryUsage() const noexcept
Compute total memory usage of this object (own memory + any dynamic memory).
DataStream m_recv
received message data
Information about a peer.
std::atomic< int > nVersion
bool IsInboundConn() const
CountingSemaphoreGrant grantOutbound
std::atomic_bool fPauseRecv
std::string LogPeer() const
Helper function to log the peer id, optionally including IP address.
std::atomic< NodeClock::duration > m_last_ping_time
Last measured round-trip duration. Used only for stats.
const std::string m_addr_name
bool IsConnectedThroughPrivacyNet() const
Whether this peer connected through a privacy network.
void CopyStats(CNodeStats &stats) EXCLUSIVE_LOCKS_REQUIRED(!m_subver_mutex
std::string ConnectionTypeAsString() const
std::atomic< bool > m_bip152_highbandwidth_to
std::list< CNetMessage > vRecvMsg
std::atomic< bool > m_bip152_highbandwidth_from
std::atomic_bool fSuccessfullyConnected
fSuccessfullyConnected is set to true on receiving VERACK from the peer.
bool ReceiveMsgBytes(std::span< const uint8_t > msg_bytes, bool &complete) EXCLUSIVE_LOCKS_REQUIRED(!cs_vRecv)
Receive bytes from the buffer and deserialize them into messages.
void SetAddrLocal(const CService &addrLocalIn) EXCLUSIVE_LOCKS_REQUIRED(!m_addr_local_mutex)
May not be called more than once.
const NodeClock::time_point m_connected
Unix epoch time at peer connection.
std::atomic< NodeClock::time_point > m_last_recv
CNode(NodeId id, std::shared_ptr< Sock > sock, const CAddress &addrIn, uint64_t nKeyedNetGroupIn, uint64_t nLocalHostNonceIn, const CService &addrBindIn, const std::string &addrNameIn, ConnectionType conn_type_in, bool inbound_onion, uint64_t network_key, CNodeOptions &&node_opts={})
void MarkReceivedMsgsForProcessing() EXCLUSIVE_LOCKS_REQUIRED(!m_msg_process_queue_mutex)
Move all messages from the received queue to the processing queue.
const uint64_t m_network_key
Network key used to prevent fingerprinting our node across networks.
std::atomic_bool fPauseSend
std::string DisconnectMsg() const
Helper function to log disconnects.
std::atomic< NodeClock::duration > m_min_ping_time
Lowest measured round-trip duration.
std::optional< std::pair< CNetMessage, bool > > PollMessage() EXCLUSIVE_LOCKS_REQUIRED(!m_msg_process_queue_mutex)
Poll the next message from the processing queue of this connection.
Mutex m_msg_process_queue_mutex
std::atomic< NodeClock::time_point > m_last_send
const ConnectionType m_conn_type
Network ConnectedThroughNetwork() const
Get network the peer connected through.
const size_t m_recv_flood_size
bool IsManualOrFullOutboundConn() const
bool IsPrivateBroadcastConn() const
const std::unique_ptr< Transport > m_transport
Transport serializer/deserializer.
const NetPermissionFlags m_permission_flags
const bool m_inbound_onion
Whether this peer is an inbound onion, i.e. connected via our Tor onion service.
std::atomic< std::chrono::seconds > m_last_block_time
UNIX epoch time of the last block received from this peer that we had not yet seen (e....
std::atomic_bool fDisconnect
std::atomic< std::chrono::seconds > m_last_tx_time
UNIX epoch time of the last transaction received from this peer that we had not yet seen (e....
CService GetAddrLocal() const EXCLUSIVE_LOCKS_REQUIRED(!m_addr_local_mutex)
void CloseSocketDisconnect() EXCLUSIVE_LOCKS_REQUIRED(!m_sock_mutex)
std::string m_session_id
BIP324 session id string in hex, if any.
TransportProtocolType m_transport_type
Transport protocol type.
Simple class for background tasks that should be run periodically or once "after a while".
void scheduleEvery(Function f, std::chrono::milliseconds delta) EXCLUSIVE_LOCKS_REQUIRED(!newTaskMutex)
Repeat f until the scheduler is stopped.
A combination of a network address (CNetAddr) and a (TCP) port.
bool SetSockAddr(const struct sockaddr *paddr, socklen_t addrlen)
Set CService from a network sockaddr.
sa_family_t GetSAFamily() const
Get the address family.
bool GetSockAddr(struct sockaddr *paddr, socklen_t *addrlen) const
Obtain the IPv4/6 socket address this represents.
std::string ToStringAddrPort() const
General SipHash-2-4 implementation.
uint64_t Finalize() const
Compute the 64-bit SipHash-2-4 of the data written so far.
CSipHasher & Write(uint64_t data)
Hash a 64-bit integer worth of data.
std::string ToString() const
bool Match(const CNetAddr &addr) const
std::chrono::steady_clock Clock
RAII-style semaphore lock.
Double ended buffer combining vector and stream-like interfaces.
size_t GetMemoryUsage() const noexcept
Compute total memory usage of this object (own memory + any dynamic memory).
void fillrand(std::span< std::byte > output) noexcept
Fill a byte span with random bytes.
Different type to mark Mutex at global scope.
static Mutex g_msgproc_mutex
Mutex for anything that is only accessed via the msg processing thread.
bool UsingASMap() const
Indicates whether ASMap is being used for clearnet bucketing.
void ASMapHealthCheck(const std::vector< CNetAddr > &clearnet_addrs) const
Analyze and log current health of ASMap based buckets.
std::vector< unsigned char > GetGroup(const CNetAddr &address) const
Get the canonical identifier of the network group for address.
uint32_t GetMappedAS(const CNetAddr &address) const
Get the autonomous system on the BGP path to address.
NetPermissionFlags m_flags
static void AddFlag(NetPermissionFlags &flags, NetPermissionFlags f)
static void ClearFlag(NetPermissionFlags &flags, NetPermissionFlags f)
ClearFlag is only called with f == NetPermissionFlags::Implicit.
static bool HasFlag(NetPermissionFlags flags, NetPermissionFlags f)
static bool TryParse(const std::string &str, NetWhitebindPermissions &output, bilingual_str &error)
Wrapper that overrides the GetParams() function of a stream.
Tp rand_uniform_delay(const Tp &time, typename Tp::duration range) noexcept
Return the time point advanced by a uniform random duration.
Chrono::duration rand_uniform_duration(typename Chrono::duration range) noexcept
Generate a uniform random duration in the range from 0 (inclusive) to range (exclusive).
I randrange(I range) noexcept
Generate a random integer in the range [0..range), with range > 0.
std::chrono::microseconds rand_exp_duration(std::chrono::microseconds mean) noexcept
Return a duration sampled from an exponential distribution (https://en.wikipedia.org/wiki/Exponential...
uint64_t randbits(int bits) noexcept
Generate a random (bits)-bit integer.
std::unordered_set< Network > All() const EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
bool Contains(Network net) const EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
static constexpr Event SEND
If passed to Wait(), then it will wait for readiness to send to the socket.
static constexpr Event ERR
Ignored if passed to Wait(), but could be set in the occurred events if an exceptional condition has ...
static constexpr Event RECV
If passed to Wait(), then it will wait for readiness to read from the socket.
std::unordered_map< std::shared_ptr< const Sock >, Events, HashSharedPtrSock, EqualSharedPtrSock > EventsPerSock
On which socket to wait for what events in WaitMany().
Minimal stream for reading from an existing byte array by std::span.
std::tuple< std::span< const uint8_t >, bool, const std::string & > BytesToSend
Return type for GetBytesToSend, consisting of:
CNetMessage GetReceivedMessage(NodeClock::time_point time, bool &reject_message) override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Retrieve a completed message from transport.
bool SetMessageToSend(CSerializedNetMsg &msg) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Set the next message to send.
Info GetInfo() const noexcept override
Retrieve information about this transport.
int readData(std::span< const uint8_t > msg_bytes) EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex)
Mutex m_send_mutex
Lock for sending state.
const MessageStartChars m_magic_bytes
size_t GetSendMemoryUsage() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Return the memory usage of this transport attributable to buffered data to send.
const uint256 & GetMessageHash() const EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex)
void MarkBytesSent(size_t bytes_sent) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Report how many bytes returned by the last GetBytesToSend() have been sent.
int readHeader(std::span< const uint8_t > msg_bytes) EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex)
bool CompleteInternal() const noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex)
bool ReceivedBytes(std::span< const uint8_t > &msg_bytes) override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Feed wire bytes to the transport.
V1Transport(NodeId node_id) noexcept
BytesToSend GetBytesToSend(bool have_next_message) const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Get bytes to send on the wire, if any, along with other information about it.
void Reset() EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex)
Mutex m_recv_mutex
Lock for receive state.
bool ReceivedMessageComplete() const override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Returns true if the current message is complete (so GetReceivedMessage can be called).
void MarkBytesSent(size_t bytes_sent) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Report how many bytes returned by the last GetBytesToSend() have been sent.
static constexpr uint32_t MAX_GARBAGE_LEN
const NodeId m_nodeid
NodeId (for debug logging).
size_t GetMaxBytesToProcess() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex)
Determine how many received bytes can be processed in one go (not allowed in V1 state).
BIP324Cipher m_cipher
Cipher state.
size_t GetSendMemoryUsage() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Return the memory usage of this transport attributable to buffered data to send.
void ProcessReceivedMaybeV1Bytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex
Process bytes in m_recv_buffer, while in KEY_MAYBE_V1 state.
SendState
State type that controls the sender side.
@ READY
Normal sending state.
@ AWAITING_KEY
Waiting for the other side's public key.
@ V1
This transport is using v1 fallback.
V1Transport m_v1_fallback
Encapsulate a V1Transport to fall back to.
static constexpr size_t V1_PREFIX_LEN
The length of the V1 prefix to match bytes initially received by responders with to determine if thei...
void StartSendingHandshake() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_send_mutex)
Put our public key + garbage in the send buffer.
bool ProcessReceivedPacketBytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex)
Process bytes in m_recv_buffer, while in VERSION/APP state.
CNetMessage GetReceivedMessage(NodeClock::time_point time, bool &reject_message) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Retrieve a completed message from transport.
bool ProcessReceivedKeyBytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex
Process bytes in m_recv_buffer, while in KEY state.
const bool m_initiating
Whether we are the initiator side.
Info GetInfo() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Retrieve information about this transport.
BytesToSend GetBytesToSend(bool have_next_message) const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Get bytes to send on the wire, if any, along with other information about it.
void SetReceiveState(RecvState recv_state) noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex)
Change the receive state.
bool ProcessReceivedGarbageBytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex)
Process bytes in m_recv_buffer, while in GARB_GARBTERM state.
bool ReceivedMessageComplete() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Returns true if the current message is complete (so GetReceivedMessage can be called).
static constexpr std::array< std::byte, 0 > VERSION_CONTENTS
Contents of the version packet to send.
static std::optional< std::string > GetMessageType(std::span< const uint8_t > &contents) noexcept
Given a packet's contents, find the message type (if valid), and strip it from contents.
bool ReceivedBytes(std::span< const uint8_t > &msg_bytes) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex
Feed wire bytes to the transport.
bool ShouldReconnectV1() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex
Whether upon disconnections, a reconnect with V1 is warranted.
bool SetMessageToSend(CSerializedNetMsg &msg) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Set the next message to send.
V2Transport(NodeId nodeid, bool initiating) noexcept
Construct a V2 transport with securely generated random keys.
RecvState
State type that defines the current contents of the receive buffer and/or how the next received bytes...
@ GARB_GARBTERM
Garbage and garbage terminator.
@ V1
Nothing (this transport is using v1 fallback).
@ KEY_MAYBE_V1
(Responder only) either v2 public key or v1 header.
@ APP_READY
Nothing (an application packet is available for GetMessage()).
void SetSendState(SendState send_state) noexcept EXCLUSIVE_LOCKS_REQUIRED(m_send_mutex)
Change the send state.
constexpr unsigned char * begin()
Implements a drop-in replacement for std::vector<T> which stores up to N elements directly (without h...
void push_back(const T &value)
#define WSAGetLastError()
#define COMPAT_IN6ADDR_ANY_INIT
std::string ConnectionTypeAsString(ConnectionType conn_type)
Convert ConnectionType enum to a string value.
ConnectionType
Different types of connections to a peer.
@ PRIVATE_BROADCAST
Private broadcast connections are short-lived and only opened to privacy networks (Tor,...
@ BLOCK_RELAY
We use block-relay-only connections to help prevent against partition attacks.
@ MANUAL
We open manual connections to addresses that users explicitly requested via the addnode RPC or the -a...
@ OUTBOUND_FULL_RELAY
These are the default connections that we use to connect with the network.
@ FEELER
Feeler connections are short-lived connections made to check that a node is alive.
@ INBOUND
Inbound connections are those initiated by a peer.
@ ADDR_FETCH
AddrFetch connections are short lived connections used to solicit addresses from peers.
@ V1
Unencrypted, plaintext protocol.
@ DETECTING
Peer could be v1 or v2.
static const unsigned int MAX_BLOCK_SERIALIZED_SIZE
The maximum allowed size for a serialized block, in bytes (only for buffer size limits)
uint32_t ReadLE32(const B *ptr)
static CService ip(uint32_t i)
std::optional< NodeId > SelectNodeToEvict(std::vector< NodeEvictionCandidate > &&vEvictionCandidates)
Select an inbound peer to evict after filtering out (protecting) peers having distinct,...
static path u8path(std::string_view utf8_str)
static std::string PathToString(const path &path)
Convert path object to a byte string.
uint256 Hash(const T &in1)
Compute the 256-bit hash of an object.
std::string HexStr(const std::span< const uint8_t > s)
Convert a span of bytes to a lower-case hexadecimal string.
CKey GenerateRandomKey(bool compressed) noexcept
#define LogDebug(category,...)
constexpr const char * FILTERCLEAR
The filterclear message tells the receiving peer to remove a previously-set bloom filter.
constexpr const char * FEEFILTER
The feefilter message tells the receiving peer not to inv us any txs which do not meet the specified ...
constexpr const char * GETBLOCKS
The getblocks message requests an inv message that provides block header hashes starting from a parti...
constexpr const char * HEADERS
The headers message sends one or more block headers to a node which previously requested certain head...
constexpr const char * ADDR
The addr (IP address) message relays connection information for peers on the network.
constexpr const char * GETBLOCKTXN
Contains a BlockTransactionsRequest Peer should respond with "blocktxn" message.
constexpr const char * CMPCTBLOCK
Contains a CBlockHeaderAndShortTxIDs object - providing a header and list of "short txids".
constexpr const char * CFCHECKPT
cfcheckpt is a response to a getcfcheckpt request containing a vector of evenly spaced filter headers...
constexpr const char * GETCFILTERS
getcfilters requests compact filters for a range of blocks.
constexpr const char * PONG
The pong message replies to a ping message, proving to the pinging node that the ponging node is stil...
constexpr const char * BLOCKTXN
Contains a BlockTransactions.
constexpr const char * CFHEADERS
cfheaders is a response to a getcfheaders request containing a filter header and a vector of filter h...
constexpr const char * PING
The ping message is sent periodically to help confirm that the receiving peer is still connected.
constexpr const char * FILTERLOAD
The filterload message tells the receiving peer to filter all relayed transactions and requested merk...
constexpr const char * ADDRV2
The addrv2 message relays connection information for peers on the network just like the addr message,...
constexpr const char * VERACK
The verack message acknowledges a previously-received version message, informing the connecting node ...
constexpr const char * GETHEADERS
The getheaders message requests a headers message that provides block headers starting from a particu...
constexpr const char * FILTERADD
The filteradd message tells the receiving peer to add a single element to a previously-set bloom filt...
constexpr const char * CFILTER
cfilter is a response to a getcfilters request containing a single compact filter.
constexpr const char * GETDATA
The getdata message requests one or more data objects from another node.
constexpr const char * SENDCMPCT
Contains a 1-byte bool and 8-byte LE version number.
constexpr const char * GETCFCHECKPT
getcfcheckpt requests evenly spaced compact filter headers, enabling parallelized download and valida...
constexpr const char * INV
The inv message (inventory message) transmits one or more inventories of objects known to the transmi...
constexpr const char * TX
The tx message transmits a single transaction.
constexpr const char * MEMPOOL
The mempool message requests the TXIDs of transactions that the receiving node has verified as valid ...
constexpr const char * NOTFOUND
The notfound message is a reply to a getdata message which requested an object the receiving node doe...
constexpr const char * MERKLEBLOCK
The merkleblock message is a reply to a getdata message which requested a block using the inventory t...
constexpr const char * BLOCK
The block message transmits a single serialized block.
constexpr const char * GETCFHEADERS
getcfheaders requests a compact filter header and the filter hashes for a range of blocks,...
constexpr const char * VERSION
The version message provides information about the transmitting node to the receiving node at the beg...
FILE * fopen(const fs::path &p, const char *mode)
static size_t DynamicUsage(const int8_t &v)
Dynamic memory usage for built-in types is zero.
static const unsigned char VERSION[]
void TraceThread(std::string_view thread_name, std::function< void()> thread_func)
A wrapper for do-something-once thread functions.
static constexpr int DNSSEEDS_TO_QUERY_AT_ONCE
Number of DNS seeds to query when the number of connections is low.
bool IsLocal(const CService &addr)
check whether a given address is potentially local
static const uint64_t RANDOMIZER_ID_NETGROUP
static const uint64_t SELECT_TIMEOUT_MILLISECONDS
static const uint64_t RANDOMIZER_ID_NETWORKKEY
void RemoveLocal(const CService &addr)
BindFlags
Used to pass flags to the Bind() function.
@ BF_DONT_ADVERTISE
Do not call AddLocal() for our special addresses, e.g., for incoming Tor connections,...
static const uint64_t RANDOMIZER_ID_LOCALHOSTNONCE
static constexpr std::chrono::minutes DUMP_PEERS_INTERVAL
static constexpr auto EXTRA_NETWORK_PEER_INTERVAL
Frequency to attempt extra connections to reachable networks we're not connected to yet.
static constexpr int SEED_OUTBOUND_CONNECTION_THRESHOLD
Minimum number of outbound connections under which we will keep fetching our address seeds.
bool AddLocal(const CService &addr_, int nScore)
static constexpr auto FEELER_SLEEP_WINDOW
static constexpr int DNSSEEDS_DELAY_PEER_THRESHOLD
static constexpr size_t MAX_BLOCK_RELAY_ONLY_ANCHORS
Maximum number of block-relay-only anchor connections.
static bool IsPeerAddrLocalGood(CNode *pnode)
static constexpr std::chrono::seconds DNSSEEDS_DELAY_FEW_PEERS
How long to delay before querying DNS seeds.
std::string strSubVersion
Subversion as sent to the P2P network in version messages.
std::optional< CService > GetLocalAddrForPeer(CNode &node)
Returns a local address that we should advertise to this peer.
const std::string NET_MESSAGE_TYPE_OTHER
TRACEPOINT_SEMAPHORE(net, closed_connection)
static std::unique_ptr< Transport > MakeTransport(NodeId id, bool use_v2transport, bool inbound) noexcept
const char *const ANCHORS_DATABASE_FILENAME
Anchor IP address database file name.
static std::vector< CAddress > ConvertSeeds(const std::vector< uint8_t > &vSeedsIn)
Convert the serialized seeds into usable address objects.
static void CaptureMessageToFile(const CAddress &addr, const std::string &msg_type, std::span< const unsigned char > data, bool is_incoming)
CService GetLocalAddress(const CNode &peer)
GlobalMutex g_maplocalhost_mutex
std::map< CNetAddr, LocalServiceInfo > mapLocalHost GUARDED_BY(g_maplocalhost_mutex)
static std::optional< CService > GetLocal(const CNode &peer)
std::function< void(const CAddress &addr, const std::string &msg_type, std::span< const unsigned char > data, bool is_incoming)> CaptureMessage
Defaults to CaptureMessageToFile(), but can be overridden by unit tests.
static constexpr std::chrono::minutes DNSSEEDS_DELAY_MANY_PEERS
static int GetnScore(const CService &addr)
static bool IsOutboundMessageAllowedInPrivateBroadcast(std::string_view type) noexcept
Private broadcast connections only need to send certain message types.
static CNetCleanup instance_of_cnetcleanup
static constexpr std::chrono::seconds MAX_UPLOAD_TIMEFRAME
The default timeframe for -maxuploadtarget.
void Discover()
Look up IP addresses from all interfaces on the machine and add them to the list of local addresses t...
bool SeenLocal(const CService &addr)
vote for a local address
static constexpr bool DEFAULT_PRIVATE_BROADCAST
Default for -privatebroadcast.
static constexpr std::chrono::minutes TIMEOUT_INTERVAL
Time after which to disconnect, after waiting for a ping response (or inactivity).
static constexpr bool DEFAULT_FIXEDSEEDS
static const unsigned int MAX_PROTOCOL_MESSAGE_LENGTH
Maximum length of incoming protocol messages (no message over 4 MB is currently acceptable).
static constexpr auto EXTRA_BLOCK_RELAY_ONLY_PEER_INTERVAL
Run the extra block-relay-only connection loop once every 5 minutes.
static constexpr bool DEFAULT_FORCEDNSSEED
static constexpr bool DEFAULT_DNSSEED
static constexpr std::chrono::hours ASMAP_HEALTH_CHECK_INTERVAL
Interval for ASMap Health Check.
static constexpr auto FEELER_INTERVAL
Run the feeler connection loop once every 2 minutes.
static const int MAX_OUTBOUND_FULL_RELAY_CONNECTIONS
Maximum number of automatic outgoing nodes over which we'll relay everything (blocks,...
static const int MAX_BLOCK_RELAY_ONLY_CONNECTIONS
Maximum number of block-relay-only outgoing connections.
static constexpr uint16_t I2P_SAM31_PORT
SAM 3.1 and earlier do not support specifying ports and force the port to 0.
@ NET_MAX
Dummy value to indicate the number of NET_* constants.
@ NET_ONION
TOR (v2 or v3)
@ NET_UNROUTABLE
Addresses from these networks are not publicly routable on the global Internet.
@ NET_INTERNAL
A set of addresses that represent the hash of a string or FQDN.
std::optional< Proxy > GetNameProxy()
std::unique_ptr< Sock > ConnectDirectly(const CService &dest, bool manual_connection)
Create a socket and try to connect to the specified service.
std::vector< CNetAddr > LookupHost(const std::string &name, unsigned int nMaxSolutions, bool fAllowLookup, DNSLookupFn dns_lookup_function)
Resolve a host string to its corresponding network addresses.
std::string GetNetworkName(enum Network net)
CThreadInterrupt g_socks5_interrupt
Interrupt SOCKS5 reads or writes.
CService GetBindAddress(const Sock &sock)
Get the bind address for a socket as CService.
std::vector< CService > Lookup(const std::string &name, uint16_t portDefault, bool fAllowLookup, unsigned int nMaxSolutions, DNSLookupFn dns_lookup_function)
Resolve a service string to its corresponding service.
CService MaybeFlipIPv6toCJDNS(const CService &service)
If an IPv6 address belongs to the address range used by the CJDNS network and the CJDNS network is re...
ReachableNets g_reachable_nets
std::unique_ptr< Sock > ConnectThroughProxy(const Proxy &proxy, const std::string &dest, uint16_t port, bool &proxy_connection_failed)
Connect to a specified destination service through a SOCKS5 proxy by first connecting to the SOCKS5 p...
std::function< std::unique_ptr< Sock >(int, int, int)> CreateSock
Socket factory.
CService LookupNumeric(const std::string &name, uint16_t portDefault, DNSLookupFn dns_lookup_function)
Resolve a service string with a numeric IP to its first corresponding service.
bool IsBadPort(uint16_t port)
Determine if a port is "bad" from the perspective of attempting to connect to a node on that port.
std::optional< Proxy > GetProxy(enum Network net)
std::vector< CNetAddr > GetLocalAddresses()
Return all local non-loopback IPv4 and IPv6 network addresses.
const std::array ALL_NET_MESSAGE_TYPES
All known message types (see above).
constexpr ServiceFlags SeedsServiceFlags()
State independent service flags.
ServiceFlags
nServices flags
static bool MayHaveUsefulAddressDB(ServiceFlags services)
Checks if a peer with the given service flags may be capable of having a robust address-storage DB.
void RandAddEvent(const uint32_t event_info) noexcept
Gathers entropy from the low bits of the time at which events occur.
uint256 GetRandHash() noexcept
Generate a random uint256.
void ser_writedata32(Stream &s, uint32_t obj)
static constexpr uint64_t MAX_SIZE
The maximum size of a serialized object in bytes or number of elements (for eg vectors) when the size...
void ser_writedata64(Stream &s, uint64_t obj)
std::string NetworkErrorString(int err)
Return readable error string for a network error code.
auto MakeByteSpan(const V &v) noexcept
constexpr auto MakeUCharSpan(const V &v) -> decltype(UCharSpanCast(std::span{v}))
Like the std::span constructor, but for (const) unsigned char member types only.
T & SpanPopBack(std::span< T > &span)
A span is an object that can refer to a contiguous sequence of objects.
auto MakeWritableByteSpan(V &&v) noexcept
unsigned char * UCharCast(char *c)
Cache responses to addr requests to minimize privacy leak.
std::chrono::microseconds m_cache_entry_expiration
std::vector< CAddress > m_addrs_response_cache
void AddSocketPermissionFlags(NetPermissionFlags &flags) const
std::shared_ptr< Sock > sock
std::vector< NetWhitebindPermissions > vWhiteBinds
std::vector< CService > onion_binds
std::vector< std::string > m_specified_outgoing
std::vector< CService > vBinds
bool m_i2p_accept_incoming
std::vector< std::string > vSeedNodes
bool m_use_addrman_outgoing
bool bind_on_any
True if the user did not specify -bind= or -whitebind= and thus we should bind on 0....
NetPermissionFlags permission_flags
std::vector< unsigned char > data
size_t GetMemoryUsage() const noexcept
Compute total memory usage of this object (own memory + any dynamic memory).
An ElligatorSwift-encoded public key.
static constexpr size_t size()
Version of the system clock that is mockable in the context of tests (via NodeClockContext or SetMock...
static time_point now() noexcept
Return current system time or mocked time, if set.
std::chrono::time_point< NodeClock > time_point
static constexpr time_point epoch
Auxiliary requested/occurred events to wait for in WaitMany().
std::optional< uint256 > session_id
TransportProtocolType transport_type
An established connection with another peer.
std::unique_ptr< Sock > sock
Connected socket.
CService me
Our I2P address.
CService peer
The peer's I2P address.
#define WAIT_LOCK(cs, name)
#define AssertLockNotHeld(cs)
#define WITH_LOCK(cs, code)
Run code while locking a mutex.
#define EXCLUSIVE_LOCKS_REQUIRED(...)
#define TRACEPOINT(context,...)
consteval auto _(util::TranslatedLiteral str)
bilingual_str Untranslated(std::string original)
Mark a bilingual_str as untranslated.
bool SplitHostPort(std::string_view in, uint16_t &portOut, std::string &hostOut)
Splits socket address string into host string and port value.
std::string SanitizeString(std::string_view str, int rule)
Remove unsafe chars.
constexpr int64_t count_seconds(std::chrono::seconds t)
std::chrono::time_point< NodeClock, std::chrono::seconds > NodeSeconds
void ClearShrink(V &v) noexcept
Clear a vector (or std::deque) and release its allocated memory.