1 // Copyright (c) 2009-2010 Satoshi Nakamoto
2 // Copyright (c) 2011 The Bitcoin developers
3 // Copyright (c) 2011-2012 The PPCoin developers
4 // Distributed under the MIT/X11 software license, see the accompanying
5 // file license.txt or http://www.opensource.org/licenses/mit-license.php.
19 #include <miniupnpc/miniwget.h>
20 #include <miniupnpc/miniupnpc.h>
21 #include <miniupnpc/upnpcommands.h>
22 #include <miniupnpc/upnperrors.h>
26 using namespace boost;
28 static const int MAX_OUTBOUND_CONNECTIONS = 8;
30 void ThreadMessageHandler2(void* parg);
31 void ThreadSocketHandler2(void* parg);
32 void ThreadOpenConnections2(void* parg);
34 void ThreadMapPort2(void* parg);
36 void ThreadDNSAddressSeed2(void* parg);
37 bool OpenNetworkConnection(const CAddress& addrConnect);
44 // Global state variables
47 bool fAllowDNS = false;
48 uint64 nLocalServices = (fClient ? 0 : NODE_NETWORK);
49 CAddress addrLocalHost("0.0.0.0", 0, false, nLocalServices);
50 CAddress addrSeenByPeer("0.0.0.0", 0, false, nLocalServices);
51 static CNode* pnodeLocalHost = NULL;
52 uint64 nLocalHostNonce = 0;
53 array<int, 10> vnThreadsRunning;
54 static SOCKET hListenSocket = INVALID_SOCKET;
56 vector<CNode*> vNodes;
57 CCriticalSection cs_vNodes;
58 map<vector<unsigned char>, CAddress> mapAddresses;
59 CCriticalSection cs_mapAddresses;
60 map<CInv, CDataStream> mapRelay;
61 deque<pair<int64, CInv> > vRelayExpiration;
62 CCriticalSection cs_mapRelay;
63 map<CInv, int64> mapAlreadyAskedFor;
66 int fUseProxy = false;
67 int nConnectTimeout = 5000;
68 CAddress addrProxy("127.0.0.1",9050);
73 unsigned short GetListenPort()
75 return (unsigned short)(GetArg("-port", GetDefaultPort()));
78 void CNode::PushGetBlocks(CBlockIndex* pindexBegin, uint256 hashEnd)
80 // Filter out duplicate requests
81 if (pindexBegin == pindexLastGetBlocksBegin && hashEnd == hashLastGetBlocksEnd)
83 pindexLastGetBlocksBegin = pindexBegin;
84 hashLastGetBlocksEnd = hashEnd;
86 PushMessage("getblocks", CBlockLocator(pindexBegin), hashEnd);
93 bool ConnectSocket(const CAddress& addrConnect, SOCKET& hSocketRet, int nTimeout)
95 hSocketRet = INVALID_SOCKET;
97 SOCKET hSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
98 if (hSocket == INVALID_SOCKET)
102 setsockopt(hSocket, SOL_SOCKET, SO_NOSIGPIPE, (void*)&set, sizeof(int));
105 bool fProxy = (fUseProxy && addrConnect.IsRoutable());
106 struct sockaddr_in sockaddr = (fProxy ? addrProxy.GetSockAddr() : addrConnect.GetSockAddr());
109 u_long fNonblock = 1;
110 if (ioctlsocket(hSocket, FIONBIO, &fNonblock) == SOCKET_ERROR)
112 int fFlags = fcntl(hSocket, F_GETFL, 0);
113 if (fcntl(hSocket, F_SETFL, fFlags | O_NONBLOCK) == -1)
116 closesocket(hSocket);
121 if (connect(hSocket, (struct sockaddr*)&sockaddr, sizeof(sockaddr)) == SOCKET_ERROR)
123 // WSAEINVAL is here because some legacy version of winsock uses it
124 if (WSAGetLastError() == WSAEINPROGRESS || WSAGetLastError() == WSAEWOULDBLOCK || WSAGetLastError() == WSAEINVAL)
126 struct timeval timeout;
127 timeout.tv_sec = nTimeout / 1000;
128 timeout.tv_usec = (nTimeout % 1000) * 1000;
132 FD_SET(hSocket, &fdset);
133 int nRet = select(hSocket + 1, NULL, &fdset, NULL, &timeout);
136 printf("connection timeout\n");
137 closesocket(hSocket);
140 if (nRet == SOCKET_ERROR)
142 printf("select() for connection failed: %i\n",WSAGetLastError());
143 closesocket(hSocket);
146 socklen_t nRetSize = sizeof(nRet);
148 if (getsockopt(hSocket, SOL_SOCKET, SO_ERROR, (char*)(&nRet), &nRetSize) == SOCKET_ERROR)
150 if (getsockopt(hSocket, SOL_SOCKET, SO_ERROR, &nRet, &nRetSize) == SOCKET_ERROR)
153 printf("getsockopt() for connection failed: %i\n",WSAGetLastError());
154 closesocket(hSocket);
159 printf("connect() failed after select(): %s\n",strerror(nRet));
160 closesocket(hSocket);
165 else if (WSAGetLastError() != WSAEISCONN)
170 printf("connect() failed: %i\n",WSAGetLastError());
171 closesocket(hSocket);
177 this isn't even strictly necessary
178 CNode::ConnectNode immediately turns the socket back to non-blocking
179 but we'll turn it back to blocking just in case
183 if (ioctlsocket(hSocket, FIONBIO, &fNonblock) == SOCKET_ERROR)
185 fFlags = fcntl(hSocket, F_GETFL, 0);
186 if (fcntl(hSocket, F_SETFL, fFlags & !O_NONBLOCK) == SOCKET_ERROR)
189 closesocket(hSocket);
195 printf("proxy connecting %s\n", addrConnect.ToString().c_str());
196 char pszSocks4IP[] = "\4\1\0\0\0\0\0\0user";
197 memcpy(pszSocks4IP + 2, &addrConnect.port, 2);
198 memcpy(pszSocks4IP + 4, &addrConnect.ip, 4);
199 char* pszSocks4 = pszSocks4IP;
200 int nSize = sizeof(pszSocks4IP);
202 int ret = send(hSocket, pszSocks4, nSize, MSG_NOSIGNAL);
205 closesocket(hSocket);
206 return error("Error sending to proxy");
209 if (recv(hSocket, pchRet, 8, 0) != 8)
211 closesocket(hSocket);
212 return error("Error reading proxy response");
214 if (pchRet[1] != 0x5a)
216 closesocket(hSocket);
217 if (pchRet[1] != 0x5b)
218 printf("ERROR: Proxy returned error %d\n", pchRet[1]);
221 printf("proxy connected %s\n", addrConnect.ToString().c_str());
224 hSocketRet = hSocket;
228 // portDefault is in host order
229 bool Lookup(const char *pszName, vector<CAddress>& vaddr, int nServices, int nMaxSolutions, bool fAllowLookup, int portDefault, bool fAllowPort)
234 int port = portDefault;
237 strlcpy(psz, pszName, sizeof(psz));
240 char* pszColon = strrchr(psz+1,':');
241 char *pszPortEnd = NULL;
242 int portParsed = pszColon ? strtoul(pszColon+1, &pszPortEnd, 10) : 0;
243 if (pszColon && pszPortEnd && pszPortEnd[0] == 0)
245 if (psz[0] == '[' && pszColon[-1] == ']')
247 // Future: enable IPv6 colon-notation inside []
254 if (port < 0 || port > USHRT_MAX)
259 unsigned int addrIP = inet_addr(pszHost);
260 if (addrIP != INADDR_NONE)
262 // valid IP address passed
263 vaddr.push_back(CAddress(addrIP, port, nServices));
270 struct hostent* phostent = gethostbyname(pszHost);
274 if (phostent->h_addrtype != AF_INET)
277 char** ppAddr = phostent->h_addr_list;
278 while (*ppAddr != NULL && vaddr.size() != nMaxSolutions)
280 CAddress addr(((struct in_addr*)ppAddr[0])->s_addr, port, nServices);
282 vaddr.push_back(addr);
286 return (vaddr.size() > 0);
289 // portDefault is in host order
290 bool Lookup(const char *pszName, CAddress& addr, int nServices, bool fAllowLookup, int portDefault, bool fAllowPort)
292 vector<CAddress> vaddr;
293 bool fRet = Lookup(pszName, vaddr, nServices, 1, fAllowLookup, portDefault, fAllowPort);
299 bool GetMyExternalIP2(const CAddress& addrConnect, const char* pszGet, const char* pszKeyword, unsigned int& ipRet)
302 if (!ConnectSocket(addrConnect, hSocket))
303 return error("GetMyExternalIP() : connection to %s failed", addrConnect.ToString().c_str());
305 send(hSocket, pszGet, strlen(pszGet), MSG_NOSIGNAL);
308 while (RecvLine(hSocket, strLine))
310 if (strLine.empty()) // HTTP response is separated from headers by blank line
314 if (!RecvLine(hSocket, strLine))
316 closesocket(hSocket);
319 if (pszKeyword == NULL)
321 if (strLine.find(pszKeyword) != -1)
323 strLine = strLine.substr(strLine.find(pszKeyword) + strlen(pszKeyword));
327 closesocket(hSocket);
328 if (strLine.find("<") != -1)
329 strLine = strLine.substr(0, strLine.find("<"));
330 strLine = strLine.substr(strspn(strLine.c_str(), " \t\n\r"));
331 while (strLine.size() > 0 && isspace(strLine[strLine.size()-1]))
332 strLine.resize(strLine.size()-1);
333 CAddress addr(strLine,0,true);
334 printf("GetMyExternalIP() received [%s] %s\n", strLine.c_str(), addr.ToString().c_str());
335 if (addr.ip == 0 || addr.ip == INADDR_NONE || !addr.IsRoutable())
341 closesocket(hSocket);
342 return error("GetMyExternalIP() : connection closed");
345 // We now get our external IP from the IRC server first and only use this as a backup
346 bool GetMyExternalIP(unsigned int& ipRet)
348 CAddress addrConnect;
350 const char* pszKeyword;
355 for (int nLookup = 0; nLookup <= 1; nLookup++)
356 for (int nHost = 1; nHost <= 2; nHost++)
358 // We should be phasing out our use of sites like these. If we need
359 // replacements, we should ask for volunteers to put this simple
360 // php file on their webserver that prints the client IP:
361 // <?php echo $_SERVER["REMOTE_ADDR"]; ?>
364 addrConnect = CAddress("91.198.22.70",80); // checkip.dyndns.org
368 CAddress addrIP("checkip.dyndns.org", 80, true);
369 if (addrIP.IsValid())
370 addrConnect = addrIP;
373 pszGet = "GET / HTTP/1.1\r\n"
374 "Host: checkip.dyndns.org\r\n"
375 "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"
376 "Connection: close\r\n"
379 pszKeyword = "Address:";
383 addrConnect = CAddress("74.208.43.192", 80); // www.showmyip.com
387 CAddress addrIP("www.showmyip.com", 80, true);
388 if (addrIP.IsValid())
389 addrConnect = addrIP;
392 pszGet = "GET /simple/ HTTP/1.1\r\n"
393 "Host: www.showmyip.com\r\n"
394 "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"
395 "Connection: close\r\n"
398 pszKeyword = NULL; // Returns just IP address
401 if (GetMyExternalIP2(addrConnect, pszGet, pszKeyword, ipRet))
408 void ThreadGetMyExternalIP(void* parg)
410 // Wait for IRC to get it first - disabled with ppcoin
411 if (false && !GetBoolArg("-noirc"))
413 for (int i = 0; i < 2 * 60; i++)
416 if (fGotExternalIP || fShutdown)
421 // Fallback in case IRC fails to get it
422 if (GetMyExternalIP(addrLocalHost.ip))
424 printf("GetMyExternalIP() returned %s\n", addrLocalHost.ToStringIP().c_str());
425 if (addrLocalHost.IsRoutable())
427 // If we already connected to a few before we had our IP, go back and addr them.
428 // setAddrKnown automatically filters any duplicate sends.
429 CAddress addr(addrLocalHost);
430 addr.nTime = GetAdjustedTime();
431 CRITICAL_BLOCK(cs_vNodes)
432 BOOST_FOREACH(CNode* pnode, vNodes)
433 pnode->PushAddress(addr);
442 bool AddAddress(CAddress addr, int64 nTimePenalty, CAddrDB *pAddrDB)
444 if (!addr.IsRoutable())
446 if (addr.ip == addrLocalHost.ip)
448 addr.nTime = max((int64)0, (int64)addr.nTime - nTimePenalty);
449 bool fUpdated = false;
451 CAddress addrFound = addr;
453 CRITICAL_BLOCK(cs_mapAddresses)
455 map<vector<unsigned char>, CAddress>::iterator it = mapAddresses.find(addr.GetKey());
456 if (it == mapAddresses.end())
459 printf("AddAddress(%s)\n", addr.ToString().c_str());
460 mapAddresses.insert(make_pair(addr.GetKey(), addr));
466 addrFound = (*it).second;
467 if ((addrFound.nServices | addr.nServices) != addrFound.nServices)
469 // Services have been added
470 addrFound.nServices |= addr.nServices;
473 bool fCurrentlyOnline = (GetAdjustedTime() - addr.nTime < 24 * 60 * 60);
474 int64 nUpdateInterval = (fCurrentlyOnline ? 60 * 60 : 24 * 60 * 60);
475 if (addrFound.nTime < addr.nTime - nUpdateInterval)
477 // Periodically update most recently seen time
478 addrFound.nTime = addr.nTime;
483 // There is a nasty deadlock bug if this is done inside the cs_mapAddresses
485 // Thread 1: begin db transaction (locks inside-db-mutex)
486 // then AddAddress (locks cs_mapAddresses)
487 // Thread 2: AddAddress (locks cs_mapAddresses)
488 // ... then db operation hangs waiting for inside-db-mutex
492 pAddrDB->WriteAddress(addrFound);
494 CAddrDB().WriteAddress(addrFound);
499 void AddressCurrentlyConnected(const CAddress& addr)
501 CRITICAL_BLOCK(cs_mapAddresses)
503 // Only if it's been published already
504 map<vector<unsigned char>, CAddress>::iterator it = mapAddresses.find(addr.GetKey());
505 if (it != mapAddresses.end())
507 CAddress& addrFound = (*it).second;
508 int64 nUpdateInterval = 20 * 60;
509 if (addrFound.nTime < GetAdjustedTime() - nUpdateInterval)
511 // Periodically update most recently seen time
512 addrFound.nTime = GetAdjustedTime();
514 addrdb.WriteAddress(addrFound);
524 void AbandonRequests(void (*fn)(void*, CDataStream&), void* param1)
526 // If the dialog might get closed before the reply comes back,
527 // call this in the destructor so it doesn't get called after it's deleted.
528 CRITICAL_BLOCK(cs_vNodes)
530 BOOST_FOREACH(CNode* pnode, vNodes)
532 CRITICAL_BLOCK(pnode->cs_mapRequests)
534 for (map<uint256, CRequestTracker>::iterator mi = pnode->mapRequests.begin(); mi != pnode->mapRequests.end();)
536 CRequestTracker& tracker = (*mi).second;
537 if (tracker.fn == fn && tracker.param1 == param1)
538 pnode->mapRequests.erase(mi++);
554 // Subscription methods for the broadcast and subscription system.
555 // Channel numbers are message numbers, i.e. MSG_TABLE and MSG_PRODUCT.
557 // The subscription system uses a meet-in-the-middle strategy.
558 // With 100,000 nodes, if senders broadcast to 1000 random nodes and receivers
559 // subscribe to 1000 random nodes, 99.995% (1 - 0.99^1000) of messages will get through.
562 bool AnySubscribed(unsigned int nChannel)
564 if (pnodeLocalHost->IsSubscribed(nChannel))
566 CRITICAL_BLOCK(cs_vNodes)
567 BOOST_FOREACH(CNode* pnode, vNodes)
568 if (pnode->IsSubscribed(nChannel))
573 bool CNode::IsSubscribed(unsigned int nChannel)
575 if (nChannel >= vfSubscribe.size())
577 return vfSubscribe[nChannel];
580 void CNode::Subscribe(unsigned int nChannel, unsigned int nHops)
582 if (nChannel >= vfSubscribe.size())
585 if (!AnySubscribed(nChannel))
588 CRITICAL_BLOCK(cs_vNodes)
589 BOOST_FOREACH(CNode* pnode, vNodes)
591 pnode->PushMessage("subscribe", nChannel, nHops);
594 vfSubscribe[nChannel] = true;
597 void CNode::CancelSubscribe(unsigned int nChannel)
599 if (nChannel >= vfSubscribe.size())
602 // Prevent from relaying cancel if wasn't subscribed
603 if (!vfSubscribe[nChannel])
605 vfSubscribe[nChannel] = false;
607 if (!AnySubscribed(nChannel))
609 // Relay subscription cancel
610 CRITICAL_BLOCK(cs_vNodes)
611 BOOST_FOREACH(CNode* pnode, vNodes)
613 pnode->PushMessage("sub-cancel", nChannel);
625 CNode* FindNode(unsigned int ip)
627 CRITICAL_BLOCK(cs_vNodes)
629 BOOST_FOREACH(CNode* pnode, vNodes)
630 if (pnode->addr.ip == ip)
636 CNode* FindNode(CAddress addr)
638 CRITICAL_BLOCK(cs_vNodes)
640 BOOST_FOREACH(CNode* pnode, vNodes)
641 if (pnode->addr == addr)
647 CNode* ConnectNode(CAddress addrConnect, int64 nTimeout)
649 if (addrConnect.ip == addrLocalHost.ip)
652 // Look for an existing connection
653 CNode* pnode = FindNode(addrConnect.ip);
657 pnode->AddRef(nTimeout);
664 printf("trying connection %s lastseen=%.1fhrs lasttry=%.1fhrs\n",
665 addrConnect.ToString().c_str(),
666 (double)(addrConnect.nTime - GetAdjustedTime())/3600.0,
667 (double)(addrConnect.nLastTry - GetAdjustedTime())/3600.0);
669 CRITICAL_BLOCK(cs_mapAddresses)
670 mapAddresses[addrConnect.GetKey()].nLastTry = GetAdjustedTime();
674 if (ConnectSocket(addrConnect, hSocket))
677 printf("connected %s\n", addrConnect.ToString().c_str());
679 // Set to nonblocking
682 if (ioctlsocket(hSocket, FIONBIO, &nOne) == SOCKET_ERROR)
683 printf("ConnectSocket() : ioctlsocket nonblocking setting failed, error %d\n", WSAGetLastError());
685 if (fcntl(hSocket, F_SETFL, O_NONBLOCK) == SOCKET_ERROR)
686 printf("ConnectSocket() : fcntl nonblocking setting failed, error %d\n", errno);
690 CNode* pnode = new CNode(hSocket, addrConnect, false);
692 pnode->AddRef(nTimeout);
695 CRITICAL_BLOCK(cs_vNodes)
696 vNodes.push_back(pnode);
698 pnode->nTimeConnected = GetTime();
707 void CNode::CloseSocketDisconnect()
710 if (hSocket != INVALID_SOCKET)
713 printf("%s ", DateTimeStrFormat("%x %H:%M:%S", GetTime()).c_str());
714 printf("disconnecting node %s\n", addr.ToString().c_str());
715 closesocket(hSocket);
716 hSocket = INVALID_SOCKET;
720 void CNode::Cleanup()
722 // All of a nodes broadcasts and subscriptions are automatically torn down
723 // when it goes down, so a node has to stay up to keep its broadcast going.
725 // Cancel subscriptions
726 for (unsigned int nChannel = 0; nChannel < vfSubscribe.size(); nChannel++)
727 if (vfSubscribe[nChannel])
728 CancelSubscribe(nChannel);
732 std::map<unsigned int, int64> CNode::setBanned;
733 CCriticalSection CNode::cs_setBanned;
735 void CNode::ClearBanned()
740 bool CNode::IsBanned(unsigned int ip)
742 bool fResult = false;
743 CRITICAL_BLOCK(cs_setBanned)
745 std::map<unsigned int, int64>::iterator i = setBanned.find(ip);
746 if (i != setBanned.end())
748 int64 t = (*i).second;
756 bool CNode::Misbehaving(int howmuch)
760 printf("Warning: local node %s misbehaving\n", addr.ToString().c_str());
764 nMisbehavior += howmuch;
765 if (nMisbehavior >= GetArg("-banscore", 100))
767 int64 banTime = GetTime()+GetArg("-bantime", 60*60*24); // Default 24-hour ban
768 CRITICAL_BLOCK(cs_setBanned)
769 if (setBanned[addr.ip] < banTime)
770 setBanned[addr.ip] = banTime;
771 CloseSocketDisconnect();
772 printf("Disconnected %s for misbehavior (score=%d)\n", addr.ToString().c_str(), nMisbehavior);
789 void ThreadSocketHandler(void* parg)
791 IMPLEMENT_RANDOMIZE_STACK(ThreadSocketHandler(parg));
794 vnThreadsRunning[0]++;
795 ThreadSocketHandler2(parg);
796 vnThreadsRunning[0]--;
798 catch (std::exception& e) {
799 vnThreadsRunning[0]--;
800 PrintException(&e, "ThreadSocketHandler()");
802 vnThreadsRunning[0]--;
803 throw; // support pthread_cancel()
805 printf("ThreadSocketHandler exiting\n");
808 void ThreadSocketHandler2(void* parg)
810 printf("ThreadSocketHandler started\n");
811 list<CNode*> vNodesDisconnected;
812 int nPrevNodeCount = 0;
819 CRITICAL_BLOCK(cs_vNodes)
821 // Disconnect unused nodes
822 vector<CNode*> vNodesCopy = vNodes;
823 BOOST_FOREACH(CNode* pnode, vNodesCopy)
825 if (pnode->fDisconnect ||
826 (pnode->GetRefCount() <= 0 && pnode->vRecv.empty() && pnode->vSend.empty()))
828 // remove from vNodes
829 vNodes.erase(remove(vNodes.begin(), vNodes.end(), pnode), vNodes.end());
831 // close socket and cleanup
832 pnode->CloseSocketDisconnect();
835 // hold in disconnected pool until all refs are released
836 pnode->nReleaseTime = max(pnode->nReleaseTime, GetTime() + 15 * 60);
837 if (pnode->fNetworkNode || pnode->fInbound)
839 vNodesDisconnected.push_back(pnode);
843 // Delete disconnected nodes
844 list<CNode*> vNodesDisconnectedCopy = vNodesDisconnected;
845 BOOST_FOREACH(CNode* pnode, vNodesDisconnectedCopy)
847 // wait until threads are done using it
848 if (pnode->GetRefCount() <= 0)
850 bool fDelete = false;
851 TRY_CRITICAL_BLOCK(pnode->cs_vSend)
852 TRY_CRITICAL_BLOCK(pnode->cs_vRecv)
853 TRY_CRITICAL_BLOCK(pnode->cs_mapRequests)
854 TRY_CRITICAL_BLOCK(pnode->cs_inventory)
858 vNodesDisconnected.remove(pnode);
864 if (vNodes.size() != nPrevNodeCount)
866 nPrevNodeCount = vNodes.size();
872 // Find which sockets have data to receive
874 struct timeval timeout;
876 timeout.tv_usec = 50000; // frequency to poll pnode->vSend
883 FD_ZERO(&fdsetError);
884 SOCKET hSocketMax = 0;
886 if(hListenSocket != INVALID_SOCKET)
887 FD_SET(hListenSocket, &fdsetRecv);
888 hSocketMax = max(hSocketMax, hListenSocket);
889 CRITICAL_BLOCK(cs_vNodes)
891 BOOST_FOREACH(CNode* pnode, vNodes)
893 if (pnode->hSocket == INVALID_SOCKET)
895 FD_SET(pnode->hSocket, &fdsetRecv);
896 FD_SET(pnode->hSocket, &fdsetError);
897 hSocketMax = max(hSocketMax, pnode->hSocket);
898 TRY_CRITICAL_BLOCK(pnode->cs_vSend)
899 if (!pnode->vSend.empty())
900 FD_SET(pnode->hSocket, &fdsetSend);
904 vnThreadsRunning[0]--;
905 int nSelect = select(hSocketMax + 1, &fdsetRecv, &fdsetSend, &fdsetError, &timeout);
906 vnThreadsRunning[0]++;
909 if (nSelect == SOCKET_ERROR)
911 int nErr = WSAGetLastError();
914 printf("socket select error %d\n", nErr);
915 for (int i = 0; i <= hSocketMax; i++)
916 FD_SET(i, &fdsetRecv);
919 FD_ZERO(&fdsetError);
920 Sleep(timeout.tv_usec/1000);
925 // Accept new connections
927 if (hListenSocket != INVALID_SOCKET && FD_ISSET(hListenSocket, &fdsetRecv))
929 struct sockaddr_in sockaddr;
930 socklen_t len = sizeof(sockaddr);
931 SOCKET hSocket = accept(hListenSocket, (struct sockaddr*)&sockaddr, &len);
932 CAddress addr(sockaddr);
935 CRITICAL_BLOCK(cs_vNodes)
936 BOOST_FOREACH(CNode* pnode, vNodes)
939 if (hSocket == INVALID_SOCKET)
941 if (WSAGetLastError() != WSAEWOULDBLOCK)
942 printf("socket error accept failed: %d\n", WSAGetLastError());
944 else if (nInbound >= GetArg("-maxconnections", 125) - MAX_OUTBOUND_CONNECTIONS)
946 closesocket(hSocket);
948 else if (CNode::IsBanned(addr.ip))
950 printf("connetion from %s dropped (banned)\n", addr.ToString().c_str());
951 closesocket(hSocket);
955 printf("accepted connection %s\n", addr.ToString().c_str());
956 CNode* pnode = new CNode(hSocket, addr, true);
958 CRITICAL_BLOCK(cs_vNodes)
959 vNodes.push_back(pnode);
965 // Service each socket
967 vector<CNode*> vNodesCopy;
968 CRITICAL_BLOCK(cs_vNodes)
971 BOOST_FOREACH(CNode* pnode, vNodesCopy)
974 BOOST_FOREACH(CNode* pnode, vNodesCopy)
982 if (pnode->hSocket == INVALID_SOCKET)
984 if (FD_ISSET(pnode->hSocket, &fdsetRecv) || FD_ISSET(pnode->hSocket, &fdsetError))
986 TRY_CRITICAL_BLOCK(pnode->cs_vRecv)
988 CDataStream& vRecv = pnode->vRecv;
989 unsigned int nPos = vRecv.size();
991 if (nPos > ReceiveBufferSize()) {
992 if (!pnode->fDisconnect)
993 printf("socket recv flood control disconnect (%d bytes)\n", vRecv.size());
994 pnode->CloseSocketDisconnect();
997 // typical socket buffer is 8K-64K
998 char pchBuf[0x10000];
999 int nBytes = recv(pnode->hSocket, pchBuf, sizeof(pchBuf), MSG_DONTWAIT);
1002 vRecv.resize(nPos + nBytes);
1003 memcpy(&vRecv[nPos], pchBuf, nBytes);
1004 pnode->nLastRecv = GetTime();
1006 else if (nBytes == 0)
1008 // socket closed gracefully
1009 if (!pnode->fDisconnect)
1010 printf("socket closed\n");
1011 pnode->CloseSocketDisconnect();
1013 else if (nBytes < 0)
1016 int nErr = WSAGetLastError();
1017 if (nErr != WSAEWOULDBLOCK && nErr != WSAEMSGSIZE && nErr != WSAEINTR && nErr != WSAEINPROGRESS)
1019 if (!pnode->fDisconnect)
1020 printf("socket recv error %d\n", nErr);
1021 pnode->CloseSocketDisconnect();
1031 if (pnode->hSocket == INVALID_SOCKET)
1033 if (FD_ISSET(pnode->hSocket, &fdsetSend))
1035 TRY_CRITICAL_BLOCK(pnode->cs_vSend)
1037 CDataStream& vSend = pnode->vSend;
1040 int nBytes = send(pnode->hSocket, &vSend[0], vSend.size(), MSG_NOSIGNAL | MSG_DONTWAIT);
1043 vSend.erase(vSend.begin(), vSend.begin() + nBytes);
1044 pnode->nLastSend = GetTime();
1046 else if (nBytes < 0)
1049 int nErr = WSAGetLastError();
1050 if (nErr != WSAEWOULDBLOCK && nErr != WSAEMSGSIZE && nErr != WSAEINTR && nErr != WSAEINPROGRESS)
1052 printf("socket send error %d\n", nErr);
1053 pnode->CloseSocketDisconnect();
1056 if (vSend.size() > SendBufferSize()) {
1057 if (!pnode->fDisconnect)
1058 printf("socket send flood control disconnect (%d bytes)\n", vSend.size());
1059 pnode->CloseSocketDisconnect();
1066 // Inactivity checking
1068 if (pnode->vSend.empty())
1069 pnode->nLastSendEmpty = GetTime();
1070 if (GetTime() - pnode->nTimeConnected > 60)
1072 if (pnode->nLastRecv == 0 || pnode->nLastSend == 0)
1074 printf("socket no message in first 60 seconds, %d %d\n", pnode->nLastRecv != 0, pnode->nLastSend != 0);
1075 pnode->fDisconnect = true;
1077 else if (GetTime() - pnode->nLastSend > 90*60 && GetTime() - pnode->nLastSendEmpty > 90*60)
1079 printf("socket not sending\n");
1080 pnode->fDisconnect = true;
1082 else if (GetTime() - pnode->nLastRecv > 90*60)
1084 printf("socket inactivity timeout\n");
1085 pnode->fDisconnect = true;
1089 CRITICAL_BLOCK(cs_vNodes)
1091 BOOST_FOREACH(CNode* pnode, vNodesCopy)
1108 void ThreadMapPort(void* parg)
1110 IMPLEMENT_RANDOMIZE_STACK(ThreadMapPort(parg));
1113 vnThreadsRunning[5]++;
1114 ThreadMapPort2(parg);
1115 vnThreadsRunning[5]--;
1117 catch (std::exception& e) {
1118 vnThreadsRunning[5]--;
1119 PrintException(&e, "ThreadMapPort()");
1121 vnThreadsRunning[5]--;
1122 PrintException(NULL, "ThreadMapPort()");
1124 printf("ThreadMapPort exiting\n");
1127 void ThreadMapPort2(void* parg)
1129 printf("ThreadMapPort started\n");
1132 sprintf(port, "%d", GetListenPort());
1134 const char * rootdescurl = 0;
1135 const char * multicastif = 0;
1136 const char * minissdpdpath = 0;
1137 struct UPNPDev * devlist = 0;
1140 #ifndef UPNPDISCOVER_SUCCESS
1142 devlist = upnpDiscover(2000, multicastif, minissdpdpath, 0);
1146 devlist = upnpDiscover(2000, multicastif, minissdpdpath, 0, 0, &error);
1149 struct UPNPUrls urls;
1150 struct IGDdatas data;
1153 r = UPNP_GetValidIGD(devlist, &urls, &data, lanaddr, sizeof(lanaddr));
1158 string strDesc = "Bitcoin " + FormatFullVersion();
1159 #ifndef UPNPDISCOVER_SUCCESS
1161 r = UPNP_AddPortMapping(urls.controlURL, data.first.servicetype,
1162 port, port, lanaddr, strDesc.c_str(), "TCP", 0);
1165 r = UPNP_AddPortMapping(urls.controlURL, data.first.servicetype,
1166 port, port, lanaddr, strDesc.c_str(), "TCP", 0, "0");
1169 if(r!=UPNPCOMMAND_SUCCESS)
1170 printf("AddPortMapping(%s, %s, %s) failed with code %d (%s)\n",
1171 port, port, lanaddr, r, strupnperror(r));
1173 printf("UPnP Port Mapping successful.\n");
1175 if (fShutdown || !fUseUPnP)
1177 r = UPNP_DeletePortMapping(urls.controlURL, data.first.servicetype, port, "TCP", 0);
1178 printf("UPNP_DeletePortMapping() returned : %d\n", r);
1179 freeUPNPDevlist(devlist); devlist = 0;
1180 FreeUPNPUrls(&urls);
1186 printf("No valid UPnP IGDs found\n");
1187 freeUPNPDevlist(devlist); devlist = 0;
1189 FreeUPNPUrls(&urls);
1191 if (fShutdown || !fUseUPnP)
1198 void MapPort(bool fMapPort)
1200 if (fUseUPnP != fMapPort)
1202 fUseUPnP = fMapPort;
1203 WriteSetting("fUseUPnP", fUseUPnP);
1205 if (fUseUPnP && vnThreadsRunning[5] < 1)
1207 if (!CreateThread(ThreadMapPort, NULL))
1208 printf("Error: ThreadMapPort(ThreadMapPort) failed\n");
1212 void MapPort(bool /* unused fMapPort */)
1214 // Intentionally left blank.
1226 // testnet dns seed begins with 't', all else are ppcoin dns seeds.
1227 static const char *strDNSSeed[] = {
1228 "ppcseed.zapto.org",
1232 void ThreadDNSAddressSeed(void* parg)
1234 IMPLEMENT_RANDOMIZE_STACK(ThreadDNSAddressSeed(parg));
1237 vnThreadsRunning[6]++;
1238 ThreadDNSAddressSeed2(parg);
1239 vnThreadsRunning[6]--;
1241 catch (std::exception& e) {
1242 vnThreadsRunning[6]--;
1243 PrintException(&e, "ThreadDNSAddressSeed()");
1245 vnThreadsRunning[6]--;
1246 throw; // support pthread_cancel()
1248 printf("ThreadDNSAddressSeed exiting\n");
1251 void ThreadDNSAddressSeed2(void* parg)
1253 printf("ThreadDNSAddressSeed started\n");
1256 if (true /*!fTestNet*/) // ppcoin enables dns seeding with testnet too
1258 printf("Loading addresses from DNS seeds (could take a while)\n");
1262 for (int seed_idx = 0; seed_idx < ARRAYLEN(strDNSSeed); seed_idx++) {
1263 if (fTestNet && strDNSSeed[seed_idx][0] != 't') continue;
1264 if ((!fTestNet) && strDNSSeed[seed_idx][0] == 't') continue;
1266 vector<CAddress> vaddr;
1267 if (Lookup(strDNSSeed[seed_idx], vaddr, NODE_NETWORK, -1, true))
1269 BOOST_FOREACH (CAddress& addr, vaddr)
1271 if (addr.GetByte(3) != 127)
1274 AddAddress(addr, 0, &addrDB);
1281 addrDB.TxnCommit(); // Save addresses (it's ok if this fails)
1284 printf("%d addresses found from DNS seeds\n", found);
1298 unsigned int pnSeed[] =
1305 void ThreadOpenConnections(void* parg)
1307 IMPLEMENT_RANDOMIZE_STACK(ThreadOpenConnections(parg));
1310 vnThreadsRunning[1]++;
1311 ThreadOpenConnections2(parg);
1312 vnThreadsRunning[1]--;
1314 catch (std::exception& e) {
1315 vnThreadsRunning[1]--;
1316 PrintException(&e, "ThreadOpenConnections()");
1318 vnThreadsRunning[1]--;
1319 PrintException(NULL, "ThreadOpenConnections()");
1321 printf("ThreadOpenConnections exiting\n");
1324 void ThreadOpenConnections2(void* parg)
1326 printf("ThreadOpenConnections started\n");
1328 // Connect to specific addresses
1329 if (mapArgs.count("-connect"))
1331 for (int64 nLoop = 0;; nLoop++)
1333 BOOST_FOREACH(string strAddr, mapMultiArgs["-connect"])
1335 CAddress addr(strAddr, fAllowDNS);
1337 OpenNetworkConnection(addr);
1338 for (int i = 0; i < 10 && i < nLoop; i++)
1348 // Connect to manually added nodes first
1349 if (mapArgs.count("-addnode"))
1351 BOOST_FOREACH(string strAddr, mapMultiArgs["-addnode"])
1353 CAddress addr(strAddr, fAllowDNS);
1356 OpenNetworkConnection(addr);
1364 // Initiate network connections
1365 int64 nStart = GetTime();
1368 // Limit outbound connections
1369 vnThreadsRunning[1]--;
1374 CRITICAL_BLOCK(cs_vNodes)
1375 BOOST_FOREACH(CNode* pnode, vNodes)
1376 if (!pnode->fInbound)
1378 int nMaxOutboundConnections = MAX_OUTBOUND_CONNECTIONS;
1379 nMaxOutboundConnections = min(nMaxOutboundConnections, (int)GetArg("-maxconnections", 125));
1380 if (nOutbound < nMaxOutboundConnections)
1386 vnThreadsRunning[1]++;
1390 CRITICAL_BLOCK(cs_mapAddresses)
1392 // Add seed nodes if IRC isn't working
1393 bool fTOR = (fUseProxy && addrProxy.port == htons(9050));
1394 if (mapAddresses.empty() && (GetTime() - nStart > 60 || fTOR) && !fTestNet)
1396 for (int i = 0; i < ARRAYLEN(pnSeed); i++)
1398 // It'll only connect to one or two seed nodes because once it connects,
1399 // it'll get a pile of addresses with newer timestamps.
1400 // Seed nodes are given a random 'last seen time' of between one and two
1402 const int64 nOneWeek = 7*24*60*60;
1404 addr.ip = pnSeed[i];
1405 addr.nTime = GetTime()-GetRand(nOneWeek)-nOneWeek;
1413 // Choose an address to connect to based on most recently seen
1415 CAddress addrConnect;
1416 int64 nBest = INT64_MIN;
1418 // Only connect to one address per a.b.?.? range.
1419 // Do this here so we don't have to critsect vNodes inside mapAddresses critsect.
1420 set<unsigned int> setConnected;
1421 CRITICAL_BLOCK(cs_vNodes)
1422 BOOST_FOREACH(CNode* pnode, vNodes)
1423 setConnected.insert(pnode->addr.ip & 0x0000ffff);
1425 int64 nANow = GetAdjustedTime();
1427 CRITICAL_BLOCK(cs_mapAddresses)
1429 BOOST_FOREACH(const PAIRTYPE(vector<unsigned char>, CAddress)& item, mapAddresses)
1431 const CAddress& addr = item.second;
1432 if (addr.ip == addrLocalHost.ip || !addr.IsIPv4() || !addr.IsValid() || setConnected.count(addr.ip & 0x0000ffff))
1434 int64 nSinceLastSeen = nANow - addr.nTime;
1435 int64 nSinceLastTry = nANow - addr.nLastTry;
1437 // Randomize the order in a deterministic way, putting the standard port first
1438 int64 nRandomizer = (uint64)(nStart * 4951 + addr.nLastTry * 9567851 + addr.ip * 7789) % (2 * 60 * 60);
1439 if (addr.port != htons(GetDefaultPort()))
1440 nRandomizer += 2 * 60 * 60;
1442 // Last seen Base retry frequency
1451 // 365 days 93 hours
1452 int64 nDelay = (int64)(3600.0 * sqrt(fabs((double)nSinceLastSeen) / 3600.0) + nRandomizer);
1454 // Fast reconnect for one hour after last seen
1455 if (nSinceLastSeen < 60 * 60)
1458 // Limit retry frequency
1459 if (nSinceLastTry < nDelay)
1462 // If we have IRC, we'll be notified when they first come online,
1463 // and again every 24 hours by the refresh broadcast.
1464 if (nGotIRCAddresses > 0 && vNodes.size() >= 2 && nSinceLastSeen > 24 * 60 * 60)
1467 // Only try the old stuff if we don't have enough connections
1468 if (vNodes.size() >= 8 && nSinceLastSeen > 24 * 60 * 60)
1471 // If multiple addresses are ready, prioritize by time since
1472 // last seen and time since last tried.
1473 int64 nScore = min(nSinceLastTry, (int64)24 * 60 * 60) - nSinceLastSeen - nRandomizer;
1482 if (addrConnect.IsValid())
1483 OpenNetworkConnection(addrConnect);
1487 bool OpenNetworkConnection(const CAddress& addrConnect)
1490 // Initiate outbound network connection
1494 if (addrConnect.ip == addrLocalHost.ip || !addrConnect.IsIPv4() ||
1495 FindNode(addrConnect.ip) || CNode::IsBanned(addrConnect.ip))
1498 vnThreadsRunning[1]--;
1499 CNode* pnode = ConnectNode(addrConnect);
1500 vnThreadsRunning[1]++;
1505 pnode->fNetworkNode = true;
1517 void ThreadMessageHandler(void* parg)
1519 IMPLEMENT_RANDOMIZE_STACK(ThreadMessageHandler(parg));
1522 vnThreadsRunning[2]++;
1523 ThreadMessageHandler2(parg);
1524 vnThreadsRunning[2]--;
1526 catch (std::exception& e) {
1527 vnThreadsRunning[2]--;
1528 PrintException(&e, "ThreadMessageHandler()");
1530 vnThreadsRunning[2]--;
1531 PrintException(NULL, "ThreadMessageHandler()");
1533 printf("ThreadMessageHandler exiting\n");
1536 void ThreadMessageHandler2(void* parg)
1538 printf("ThreadMessageHandler started\n");
1539 SetThreadPriority(THREAD_PRIORITY_BELOW_NORMAL);
1542 vector<CNode*> vNodesCopy;
1543 CRITICAL_BLOCK(cs_vNodes)
1545 vNodesCopy = vNodes;
1546 BOOST_FOREACH(CNode* pnode, vNodesCopy)
1550 // Poll the connected nodes for messages
1551 CNode* pnodeTrickle = NULL;
1552 if (!vNodesCopy.empty())
1553 pnodeTrickle = vNodesCopy[GetRand(vNodesCopy.size())];
1554 BOOST_FOREACH(CNode* pnode, vNodesCopy)
1557 TRY_CRITICAL_BLOCK(pnode->cs_vRecv)
1558 ProcessMessages(pnode);
1563 TRY_CRITICAL_BLOCK(pnode->cs_vSend)
1564 SendMessages(pnode, pnode == pnodeTrickle);
1569 CRITICAL_BLOCK(cs_vNodes)
1571 BOOST_FOREACH(CNode* pnode, vNodesCopy)
1575 // Wait and allow messages to bunch up.
1576 // Reduce vnThreadsRunning so StopNode has permission to exit while
1577 // we're sleeping, but we must always check fShutdown after doing this.
1578 vnThreadsRunning[2]--;
1580 if (fRequestShutdown)
1582 vnThreadsRunning[2]++;
1593 bool BindListenPort(string& strError)
1597 addrLocalHost.port = htons(GetListenPort());
1600 // Initialize Windows Sockets
1602 int ret = WSAStartup(MAKEWORD(2,2), &wsadata);
1603 if (ret != NO_ERROR)
1605 strError = strprintf("Error: TCP/IP socket library failed to start (WSAStartup returned error %d)", ret);
1606 printf("%s\n", strError.c_str());
1611 // Create socket for listening for incoming connections
1612 hListenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
1613 if (hListenSocket == INVALID_SOCKET)
1615 strError = strprintf("Error: Couldn't open socket for incoming connections (socket returned error %d)", WSAGetLastError());
1616 printf("%s\n", strError.c_str());
1621 // Different way of disabling SIGPIPE on BSD
1622 setsockopt(hListenSocket, SOL_SOCKET, SO_NOSIGPIPE, (void*)&nOne, sizeof(int));
1626 // Allow binding if the port is still in TIME_WAIT state after
1627 // the program was closed and restarted. Not an issue on windows.
1628 setsockopt(hListenSocket, SOL_SOCKET, SO_REUSEADDR, (void*)&nOne, sizeof(int));
1632 // Set to nonblocking, incoming connections will also inherit this
1633 if (ioctlsocket(hListenSocket, FIONBIO, (u_long*)&nOne) == SOCKET_ERROR)
1635 if (fcntl(hListenSocket, F_SETFL, O_NONBLOCK) == SOCKET_ERROR)
1638 strError = strprintf("Error: Couldn't set properties on socket for incoming connections (error %d)", WSAGetLastError());
1639 printf("%s\n", strError.c_str());
1643 // The sockaddr_in structure specifies the address family,
1644 // IP address, and port for the socket that is being bound
1645 struct sockaddr_in sockaddr;
1646 memset(&sockaddr, 0, sizeof(sockaddr));
1647 sockaddr.sin_family = AF_INET;
1648 sockaddr.sin_addr.s_addr = INADDR_ANY; // bind to all IPs on this computer
1649 sockaddr.sin_port = htons(GetListenPort());
1650 if (::bind(hListenSocket, (struct sockaddr*)&sockaddr, sizeof(sockaddr)) == SOCKET_ERROR)
1652 int nErr = WSAGetLastError();
1653 if (nErr == WSAEADDRINUSE)
1654 strError = strprintf(_("Unable to bind to port %d on this computer. Bitcoin is probably already running."), ntohs(sockaddr.sin_port));
1656 strError = strprintf("Error: Unable to bind to port %d on this computer (bind returned error %d)", ntohs(sockaddr.sin_port), nErr);
1657 printf("%s\n", strError.c_str());
1660 printf("Bound to port %d\n", ntohs(sockaddr.sin_port));
1662 // Listen for incoming connections
1663 if (listen(hListenSocket, SOMAXCONN) == SOCKET_ERROR)
1665 strError = strprintf("Error: Listening for incoming connections failed (listen returned error %d)", WSAGetLastError());
1666 printf("%s\n", strError.c_str());
1673 void StartNode(void* parg)
1675 if (pnodeLocalHost == NULL)
1676 pnodeLocalHost = new CNode(INVALID_SOCKET, CAddress("127.0.0.1", 0, false, nLocalServices));
1679 // Get local host ip
1680 char pszHostName[1000] = "";
1681 if (gethostname(pszHostName, sizeof(pszHostName)) != SOCKET_ERROR)
1683 vector<CAddress> vaddr;
1684 if (Lookup(pszHostName, vaddr, nLocalServices, -1, true))
1685 BOOST_FOREACH (const CAddress &addr, vaddr)
1686 if (addr.GetByte(3) != 127)
1688 addrLocalHost = addr;
1693 // Get local host ip
1694 struct ifaddrs* myaddrs;
1695 if (getifaddrs(&myaddrs) == 0)
1697 for (struct ifaddrs* ifa = myaddrs; ifa != NULL; ifa = ifa->ifa_next)
1699 if (ifa->ifa_addr == NULL) continue;
1700 if ((ifa->ifa_flags & IFF_UP) == 0) continue;
1701 if (strcmp(ifa->ifa_name, "lo") == 0) continue;
1702 if (strcmp(ifa->ifa_name, "lo0") == 0) continue;
1704 if (ifa->ifa_addr->sa_family == AF_INET)
1706 struct sockaddr_in* s4 = (struct sockaddr_in*)(ifa->ifa_addr);
1707 if (inet_ntop(ifa->ifa_addr->sa_family, (void*)&(s4->sin_addr), pszIP, sizeof(pszIP)) != NULL)
1708 printf("ipv4 %s: %s\n", ifa->ifa_name, pszIP);
1710 // Take the first IP that isn't loopback 127.x.x.x
1711 CAddress addr(*(unsigned int*)&s4->sin_addr, GetListenPort(), nLocalServices);
1712 if (addr.IsValid() && addr.GetByte(3) != 127)
1714 addrLocalHost = addr;
1718 else if (ifa->ifa_addr->sa_family == AF_INET6)
1720 struct sockaddr_in6* s6 = (struct sockaddr_in6*)(ifa->ifa_addr);
1721 if (inet_ntop(ifa->ifa_addr->sa_family, (void*)&(s6->sin6_addr), pszIP, sizeof(pszIP)) != NULL)
1722 printf("ipv6 %s: %s\n", ifa->ifa_name, pszIP);
1725 freeifaddrs(myaddrs);
1728 printf("addrLocalHost = %s\n", addrLocalHost.ToString().c_str());
1730 if (fUseProxy || mapArgs.count("-connect") || fNoListen)
1732 // Proxies can't take incoming connections
1733 addrLocalHost.ip = CAddress("0.0.0.0").ip;
1734 printf("addrLocalHost = %s\n", addrLocalHost.ToString().c_str());
1738 CreateThread(ThreadGetMyExternalIP, NULL);
1745 if (GetBoolArg("-nodnsseed"))
1746 printf("DNS seeding disabled\n");
1748 if (!CreateThread(ThreadDNSAddressSeed, NULL))
1749 printf("Error: CreateThread(ThreadDNSAddressSeed) failed\n");
1751 // Map ports with UPnP
1755 // Get addresses from IRC and advertise ours
1756 // if (!CreateThread(ThreadIRCSeed, NULL))
1757 // printf("Error: CreateThread(ThreadIRCSeed) failed\n");
1758 // IRC disabled with ppcoin
1759 printf("IRC seeding/communication disabled\n");
1761 // Send and receive from sockets, accept connections
1762 if (!CreateThread(ThreadSocketHandler, NULL))
1763 printf("Error: CreateThread(ThreadSocketHandler) failed\n");
1765 // Initiate outbound connections
1766 if (!CreateThread(ThreadOpenConnections, NULL))
1767 printf("Error: CreateThread(ThreadOpenConnections) failed\n");
1770 if (!CreateThread(ThreadMessageHandler, NULL))
1771 printf("Error: CreateThread(ThreadMessageHandler) failed\n");
1773 // Generate coins in the background
1774 GenerateBitcoins(fGenerateBitcoins, pwalletMain);
1779 printf("StopNode()\n");
1781 nTransactionsUpdated++;
1782 int64 nStart = GetTime();
1783 while (vnThreadsRunning[0] > 0 || vnThreadsRunning[2] > 0 || vnThreadsRunning[3] > 0 || vnThreadsRunning[4] > 0
1785 || vnThreadsRunning[5] > 0
1789 if (GetTime() - nStart > 20)
1793 if (vnThreadsRunning[0] > 0) printf("ThreadSocketHandler still running\n");
1794 if (vnThreadsRunning[1] > 0) printf("ThreadOpenConnections still running\n");
1795 if (vnThreadsRunning[2] > 0) printf("ThreadMessageHandler still running\n");
1796 if (vnThreadsRunning[3] > 0) printf("ThreadBitcoinMiner still running\n");
1797 if (vnThreadsRunning[4] > 0) printf("ThreadRPCServer still running\n");
1798 if (fHaveUPnP && vnThreadsRunning[5] > 0) printf("ThreadMapPort still running\n");
1799 if (vnThreadsRunning[6] > 0) printf("ThreadDNSAddressSeed still running\n");
1800 while (vnThreadsRunning[2] > 0 || vnThreadsRunning[4] > 0)
1816 BOOST_FOREACH(CNode* pnode, vNodes)
1817 if (pnode->hSocket != INVALID_SOCKET)
1818 closesocket(pnode->hSocket);
1819 if (hListenSocket != INVALID_SOCKET)
1820 if (closesocket(hListenSocket) == SOCKET_ERROR)
1821 printf("closesocket(hListenSocket) failed with error %d\n", WSAGetLastError());
1824 // Shutdown Windows Sockets
1829 instance_of_cnetcleanup;