#include #include #include #include #include //#include #include "../json/writer.h" #include "Peer.h" #include "Config.h" #include "Application.h" #include "Conversion.h" #include "SerializedTransaction.h" #include "utils.h" // Node has this long to verify its identity from connection accepted or connection attempt. #define NODE_VERIFY_SECONDS 15 Peer::Peer(boost::asio::io_service& io_service, boost::asio::ssl::context& ctx) : mSocketSsl(io_service, ctx), mVerifyTimer(io_service) { } void Peer::handle_write(const boost::system::error_code& error, size_t bytes_transferred) { #ifdef DEBUG if(error) std::cerr << "Peer::handle_write Error: " << error << " bytes: " << bytes_transferred << std::endl; else std::cerr << "Peer::handle_write bytes: "<< bytes_transferred << std::endl; #endif mSendingPacket=PackedMessage::pointer(); if(error) { detach(); return; } if(!mSendQ.empty()) { PackedMessage::pointer packet=mSendQ.front(); if(packet) { sendPacketForce(packet); mSendQ.pop_front(); } } } void Peer::detach() { boost::system::error_code ecCancel; (void) mVerifyTimer.cancel(); mSendQ.clear(); // mSocketSsl.close(); if (!mIpPort.first.empty()) { theApp->getConnectionPool().peerDisconnected(shared_from_this(), mIpPort, mNodePublic); mIpPort.first.clear(); } } void Peer::handleVerifyTimer(const boost::system::error_code& ecResult) { if (ecResult == boost::asio::error::operation_aborted) { // Timer canceled because deadline no longer needed. // std::cerr << "Deadline cancelled." << std::endl; nothing(); // Aborter is done. } else if (ecResult) { std::cerr << "Peer verify timer error: " << std::endl; // Can't do anything sound. abort(); } else { std::cerr << "Peer failed to verify in time." << std::endl; detach(); } } // Begin trying to connect. We are not connected till we know and accept peer's public key. // Only takes IP addresses (not domains). void Peer::connect(const std::string strIp, int iPort) { int iPortAct = iPort < 0 ? SYSTEM_PEER_PORT : iPort; // XXX Should not print IP if not known sane. std::cerr << "Peer::connect: " << strIp << " " << iPort << std::endl; mIpPort = make_pair(strIp, iPort); boost::asio::ip::tcp::resolver::query query(strIp, boost::lexical_cast(iPortAct), boost::asio::ip::resolver_query_base::numeric_host|boost::asio::ip::resolver_query_base::numeric_service); boost::asio::ip::tcp::resolver resolver(theApp->getIOService()); boost::system::error_code err; boost::asio::ip::tcp::resolver::iterator itrEndpoint = resolver.resolve(query, err); if (err || itrEndpoint == boost::asio::ip::tcp::resolver::iterator()) { std::cerr << "Peer::connect: Bad IP" << std::endl; detach(); } else { mVerifyTimer.expires_from_now(boost::posix_time::seconds(NODE_VERIFY_SECONDS), err); mVerifyTimer.async_wait(boost::bind(&Peer::handleVerifyTimer, shared_from_this(), boost::asio::placeholders::error)); if (err) { std::cerr << "Peer::connect: Failed to set timer." << std::endl; detach(); } } if (!err) { std::cerr << "Peer::connect: Connectting: " << mIpPort.first << " " << mIpPort.second << std::endl; boost::asio::async_connect( mSocketSsl.lowest_layer(), itrEndpoint, boost::bind( &Peer::handleConnect, shared_from_this(), boost::asio::placeholders::error, boost::asio::placeholders::iterator)); } } // We have an ecrypted connection to the peer. // Have it say who it is so we know to avoid redundant connections. // Establish that it really who we are talking to by having it sign a connection detail. // XXX Also need to establish no man in the middle attack is in progress. void Peer::handleStart(const boost::system::error_code& error) { if (error) { std::cerr << "Peer::handleStart: failed:" << error << std::endl; detach(); } else { start_read_header(); sendHello(); } } // Connect as client. void Peer::handleConnect(const boost::system::error_code& error, boost::asio::ip::tcp::resolver::iterator it) { if (error) { std::cerr << "Socket Connect failed:" << error << std::endl; detach(); } else { std::cerr << "Socket Connected." << std::endl; mSocketSsl.lowest_layer().set_option(boost::asio::ip::tcp::no_delay(true)); mSocketSsl.set_verify_mode(boost::asio::ssl::verify_none); mSocketSsl.async_handshake(boost::asio::ssl::stream::client, boost::bind(&Peer::handleStart, shared_from_this(), boost::asio::placeholders::error)); } } // Connect as server. void Peer::connected(const boost::system::error_code& error) { boost::asio::ip::tcp::endpoint ep = mSocketSsl.lowest_layer().remote_endpoint(); int iPort = ep.port(); std::string strIp = ep.address().to_string(); if (iPort == SYSTEM_PEER_PORT) iPort = -1; std::cerr << "Remote peer: accept: " << strIp << " " << iPort << std::endl; if (error) { std::cerr << "Remote peer: accept error: " << error << std::endl; detach(); } else if (!theApp->getConnectionPool().peerRegister(shared_from_this(), strIp, iPort)) { std::cerr << "Remote peer: rejecting." << std::endl; // XXX Reject with a rejection message: already connected detach(); } else { // Not redundant ip and port, add to connection list. std::cerr << "Remote peer: accepted." << std::endl; //BOOST_LOG_TRIVIAL(info) << "Connected to Peer."; mIpPort = make_pair(strIp, iPort); mSocketSsl.lowest_layer().set_option(boost::asio::ip::tcp::no_delay(true)); mSocketSsl.set_verify_mode(boost::asio::ssl::verify_none); mSocketSsl.async_handshake(boost::asio::ssl::stream::server, boost::bind(&Peer::handleStart, shared_from_this(), boost::asio::placeholders::error)); } } void Peer::sendPacketForce(PackedMessage::pointer packet) { mSendingPacket=packet; boost::asio::async_write(mSocketSsl, boost::asio::buffer(packet->getBuffer()), boost::bind(&Peer::handle_write, shared_from_this(), boost::asio::placeholders::error, boost::asio::placeholders::bytes_transferred)); } void Peer::sendPacket(PackedMessage::pointer packet) { if(packet) { if(mSendingPacket) { mSendQ.push_back(packet); } else { sendPacketForce(packet); } } } void Peer::start_read_header() { #ifdef DEBUG std::cerr << "SRH" << std::endl; #endif mReadbuf.clear(); mReadbuf.resize(HEADER_SIZE); boost::asio::async_read(mSocketSsl, boost::asio::buffer(mReadbuf), boost::bind(&Peer::handle_read_header, shared_from_this(), boost::asio::placeholders::error)); } void Peer::start_read_body(unsigned msg_len) { // m_readbuf already contains the header in its first HEADER_SIZE // bytes. Expand it to fit in the body as well, and start async // read into the body. // mReadbuf.resize(HEADER_SIZE + msg_len); boost::asio::async_read(mSocketSsl, boost::asio::buffer(&mReadbuf[HEADER_SIZE], msg_len), boost::bind(&Peer::handle_read_body, shared_from_this(), boost::asio::placeholders::error)); } void Peer::handle_read_header(const boost::system::error_code& error) { if (!error) { unsigned msg_len = PackedMessage::getLength(mReadbuf); // WRITEME: Compare to maximum message length, abort if too large if(msg_len>(32*1024*1024)) { detach(); return; } start_read_body(msg_len); } else { detach(); std::cerr << "Peer::handle_read_header: Error: " << error << std::endl; //else BOOST_LOG_TRIVIAL(info) << "Error: " << error; } } void Peer::handle_read_body(const boost::system::error_code& error) { if (!error) { processReadBuffer(); start_read_header(); } else { detach(); std::cerr << "Peer::handle_read_body: Error: " << error << std::endl; //else BOOST_LOG_TRIVIAL(info) << "Error: " << error; } } void Peer::processReadBuffer() { int type=PackedMessage::getType(mReadbuf); #ifdef DEBUG std::cerr << "PRB(" << type << "), len=" << (mReadbuf.size()-HEADER_SIZE) << std::endl; #endif if (mIpPort.first.empty() == (type == newcoin::mtHELLO)) { // If not connectted, only accept mtHELLO. Otherwise, don't accept mtHELLO. std::cerr << "Wrong message type: " << type << std::endl; detach(); } else { switch(type) { case newcoin::mtHELLO: { newcoin::TMHello msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvHello(msg); else std::cerr << "parse error: " << type << std::endl; //else BOOST_LOG_TRIVIAL(info) << "Error: " << error; } break; case newcoin::mtERROR_MSG: { newcoin::TMErrorMsg msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvErrorMessage(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtPING: { newcoin::TMPing msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvPing(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtGET_CONTACTS: { newcoin::TMGetContacts msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvGetContacts(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtCONTACT: { newcoin::TMContact msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvContact(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtSEARCH_TRANSACTION: { newcoin::TMSearchTransaction msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvSearchTransaction(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtGET_ACCOUNT: { newcoin::TMGetAccount msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvGetAccount(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtACCOUNT: { newcoin::TMAccount msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvAccount(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtTRANSACTION: { newcoin::TMTransaction msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvTransaction(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtGET_LEDGER: { newcoin::TMGetLedger msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvGetLedger(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtLEDGER: { newcoin::TMLedgerData msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvLedger(msg); else std::cerr << "parse error: " << type << std::endl; } break; #if 0 case newcoin::mtPROPOSE_LEDGER: { newcoin::TM msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recv(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtCLOSE_LEDGER: { newcoin::TM msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recv(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtGET_VALIDATION: { newcoin::TM msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recv(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtVALIDATION: { newcoin::TM msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recv(msg); else std::cerr << "parse error: " << type << std::endl; } break; #endif case newcoin::mtGET_OBJECT: { newcoin::TMGetObjectByHash msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvGetObjectByHash(msg); else std::cerr << "parse error: " << type << std::endl; } break; case newcoin::mtOBJECT: { newcoin::TMObjectByHash msg; if(msg.ParseFromArray(&mReadbuf[HEADER_SIZE], mReadbuf.size() - HEADER_SIZE)) recvObjectByHash(msg); else std::cerr << "parse error: " << type << std::endl; } break; default: std::cerr << "Unknown Msg: " << type << std::endl; //else BOOST_LOG_TRIVIAL(info) << "Error: " << error; } } } void Peer::recvHello(newcoin::TMHello& packet) { #ifdef DEBUG std::cerr << "Recv(Hello) v=" << packet.version() << ", index=" << packet.ledgerindex() << std::endl; #endif bool bDetach = true; if (mNodePublic.isValid()) { std::cerr << "Recv(Hello): Disconnect: Extraneous node public key." << std::endl; } else if (!mNodePublic.setNodePublic(packet.nodepublic())) { std::cerr << "Recv(Hello): Disconnect: Bad node public key." << std::endl; } else if (!theApp->getConnectionPool().peerConnected(shared_from_this(), mNodePublic)) { // Already connected, self, or some other reason. std::cerr << "Recv(Hello): Disconnect: Extraneous connection." << std::endl; } else { // Successful connection. // XXX Set timer: connection is in grace period to be useful. // XXX Set timer: connection idle (idle may vary depending on connection type.) // XXX Only kill if verified no man-in-the-middle. (void) mVerifyTimer.cancel(); bDetach = false; } if (bDetach) { mNodePublic.clear(); detach(); } } void Peer::recvTransaction(newcoin::TMTransaction& packet) { #ifdef DEBUG std::cerr << "Got transaction from peer" << std::endl; #endif Transaction::pointer tx; try { std::string rawTx = packet.rawtransaction(); Serializer s(std::vector(rawTx.begin(), rawTx.end())); SerializerIterator sit(s); SerializedTransaction::pointer stx = boost::make_shared(boost::ref(sit), -1); tx = boost::make_shared(stx, true); if (tx->getStatus() == INVALID) throw(0); } catch (...) { #ifdef DEBUG std::cerr << "Transaction from peer fails validity tests" << std::endl; Json::StyledStreamWriter w; w.write(std::cerr, tx->getJson(true)); #endif return; } tx = theApp->getOPs().processTransaction(tx, this); if(tx->getStatus()!=INCLUDED) { // transaction wasn't accepted into ledger #ifdef DEBUG std::cerr << "Transaction from peer won't go in ledger" << std::endl; #endif } } void Peer::recvValidation(newcoin::TMValidation& packet) { } void Peer::recvGetValidation(newcoin::TMGetValidations& packet) { } void Peer::recvContact(newcoin::TMContact& packet) { } void Peer::recvGetContacts(newcoin::TMGetContacts& packet) { } void Peer::recvIndexedObject(newcoin::TMIndexedObject& packet) { } void Peer::recvGetObjectByHash(newcoin::TMGetObjectByHash& packet) { } void Peer::recvObjectByHash(newcoin::TMObjectByHash& packet) { } void Peer::recvPing(newcoin::TMPing& packet) { } void Peer::recvErrorMessage(newcoin::TMErrorMsg& packet) { } void Peer::recvSearchTransaction(newcoin::TMSearchTransaction& packet) { } void Peer::recvGetAccount(newcoin::TMGetAccount& packet) { } void Peer::recvAccount(newcoin::TMAccount& packet) { } void Peer::recvGetLedger(newcoin::TMGetLedger& packet) { // Figure out what ledger they want Ledger::pointer ledger; if(packet.has_ledgerhash()) { uint256 ledgerhash; if(packet.ledgerhash().size()!=32) { punishPeer(PP_INVALID_REQUEST); return; } memcpy(&ledgerhash, packet.ledgerhash().data(), 32); ledger=theApp->getMasterLedger().getLedgerByHash(ledgerhash); } else if(packet.has_ledgerseq()) ledger=theApp->getMasterLedger().getLedgerBySeq(packet.ledgerseq()); else if(packet.has_ltype() && (packet.ltype()==newcoin::ltCURRENT) ) ledger=theApp->getMasterLedger().getCurrentLedger(); else if(packet.has_ltype() && (packet.ltype()==newcoin::ltCLOSING) ) { ledger=theApp->getMasterLedger().getClosingLedger(); } else if(packet.has_ltype() && (packet.ltype()==newcoin::ltCLOSED) ) { ledger=theApp->getMasterLedger().getClosingLedger(); if(ledger && !ledger->isClosed()) ledger=theApp->getMasterLedger().getLedgerBySeq(ledger->getLedgerSeq()-1); } else { punishPeer(PP_INVALID_REQUEST); return; } if( (!ledger) || (packet.has_ledgerseq() && (packet.ledgerseq()!=ledger->getLedgerSeq())) ) { punishPeer(PP_UNKNOWN_REQUEST); return; } // Figure out what information they want newcoin::TMLedgerData* data=new newcoin::TMLedgerData; uint256 lHash=ledger->getHash(); data->set_ledgerhash(lHash.begin(), lHash.size()); data->set_ledgerseq(ledger->getLedgerSeq()); data->set_type(packet.itype()); if(packet.itype()==newcoin::liBASE) { Serializer nData(116); ledger->addRaw(nData); newcoin::TMLedgerNode* node=data->add_nodes(); node->set_nodedata(nData.getDataPtr(), nData.getLength()); } else if ( (packet.itype()==newcoin::liTX_NODE) || (packet.itype()==newcoin::liAS_NODE) ) { SHAMap::pointer map=(packet.itype()==newcoin::liTX_NODE) ? ledger->peekTransactionMap() : ledger->peekAccountStateMap(); if(!map) return; if(packet.nodeids_size()==0) { punishPeer(PP_INVALID_REQUEST); return; } for(int i=0; i nodeIDs; std::list > rawNodes; if(map->getNodeFat(mn, nodeIDs, rawNodes)) { std::vector::iterator nodeIDIterator; std::list >::iterator rawNodeIterator; for(nodeIDIterator=nodeIDs.begin(), rawNodeIterator=rawNodes.begin(); nodeIDIterator!=nodeIDs.end(); ++nodeIDIterator, ++rawNodeIterator) { newcoin::TMLedgerNode* node=data->add_nodes(); Serializer nID(33); nodeIDIterator->addIDRaw(nID); node->set_nodeid(nID.getDataPtr(), nID.getLength()); node->set_nodedata(&rawNodeIterator->front(), rawNodeIterator->size()); } } } } else { punishPeer(PP_INVALID_REQUEST); return; } PackedMessage::pointer oPacket=boost::make_shared (PackedMessage::MessagePointer(data), newcoin::mtLEDGER); sendPacket(oPacket); } void Peer::recvLedger(newcoin::TMLedgerData& packet) { if(!theApp->getMasterLedgerAcquire().gotLedgerData(packet)) punishPeer(PP_UNWANTED_DATA); } std::vector Peer::getSessionCookie() { // get session information we can sign // (both sides get the same information, neither side controls it) SSL* ssl = mSocketSsl.native_handle(); if (!ssl) throw std::runtime_error("No underlying connection"); // Get both finished messages unsigned char s1[1024], s2[1024]; int l1 = SSL_get_finished(ssl, s1, 1024); int l2 = SSL_get_finished(ssl, s2, 1024); if ((l1 < 16) || (l2 < 16)) throw std::runtime_error("Connection setup not complete"); // Hash them and XOR the results unsigned char sha1[32], sha2[32]; SHA512(s1, l1, sha1); SHA512(s2, l2, sha2); for(int i=0; i<32; i++) sha1[i]^=sha2[i]; return std::vector(sha1, sha1+33); } void Peer::sendHello() { // XXX Start timer for hello required by. newcoin::TMHello* h=new newcoin::TMHello(); // set up parameters h->set_version(theConfig.VERSION); h->set_ledgerindex(theApp->getOPs().getCurrentLedgerID()); h->set_nettime(theApp->getOPs().getNetworkTime()); h->set_nodepublic(theApp->getWallet().getNodePublic().humanNodePublic()); h->set_ipv4port(theConfig.PEER_PORT); Ledger::pointer closingLedger=theApp->getMasterLedger().getClosingLedger(); if(closingLedger->isClosed()) { Serializer s(128); closingLedger->addRaw(s); h->set_closedledger(s.getDataPtr(), s.getLength()); } PackedMessage::pointer packet=boost::make_shared (PackedMessage::MessagePointer(h), newcoin::mtHELLO); sendPacket(packet); } void Peer::punishPeer(PeerPunish) { } Json::Value Peer::getJson() { Json::Value ret(Json::objectValue); ret["ip"] = mIpPort.first; ret["port"] = mIpPort.second; ret["public_key"] = mNodePublic.ToString(); return ret; } #if 0 /* PackedMessage::pointer Peer::createFullLedger(Ledger::pointer ledger) { if(ledger) { // TODO: newcoin::FullLedger* fullLedger=new newcoin::FullLedger(); ledger-> } return(PackedMessage::pointer()); }*/ PackedMessage::pointer Peer::createLedgerProposal(Ledger::pointer ledger) { uint256& hash=ledger->getHash(); newcoin::ProposeLedger* prop=new newcoin::ProposeLedger(); prop->set_ledgerindex(ledger->getIndex()); prop->set_hash(hash.begin(), hash.GetSerializeSize()); prop->set_numtransactions(ledger->getNumTransactions()); PackedMessage::pointer packet=boost::make_shared (PackedMessage::MessagePointer(prop), newcoin::PROPOSE_LEDGER); return(packet); } PackedMessage::pointer Peer::createValidation(Ledger::pointer ledger) { uint256 hash=ledger->getHash(); uint256 sig=ledger->getSignature(); newcoin::Validation* valid=new newcoin::Validation(); valid->set_ledgerindex(ledger->getIndex()); valid->set_hash(hash.begin(), hash.GetSerializeSize()); valid->set_seqnum(ledger->getValidSeqNum()); valid->set_sig(sig.begin(), sig.GetSerializeSize()); valid->set_hanko(theConfig.HANKO); PackedMessage::pointer packet=boost::make_shared (PackedMessage::MessagePointer(valid), newcoin::VALIDATION); return(packet); } PackedMessage::pointer Peer::createGetFullLedger(uint256& hash) { newcoin::GetFullLedger* gfl=new newcoin::GetFullLedger(); gfl->set_hash(hash.begin(), hash.GetSerializeSize()); PackedMessage::pointer packet=boost::make_shared (PackedMessage::MessagePointer(gfl), newcoin::GET_FULL_LEDGER); return(packet); } void Peer::sendLedgerProposal(Ledger::pointer ledger) { PackedMessage::pointer packet=Peer::createLedgerProposal(ledger); sendPacket(packet); } void Peer::sendFullLedger(Ledger::pointer ledger) { if(ledger) { PackedMessage::pointer packet( new PackedMessage(PackedMessage::MessagePointer(ledger->createFullLedger()), newcoin::FULL_LEDGER)); sendPacket(packet); } } void Peer::sendGetFullLedger(uint256& hash) { PackedMessage::pointer packet=createGetFullLedger(hash); sendPacket(packet); } void Peer::receiveHello(newcoin::Hello& packet) { // TODO:6 add this guy to your KNL } void Peer::receiveGetFullLedger(newcoin::GetFullLedger& gfl) { sendFullLedger(theApp->getLedgerMaster().getLedger(protobufTo256(gfl.hash()))); } void Peer::receiveValidation(newcoin::Validation& validation) { theApp->getValidationCollection().addValidation(validation); } void Peer::receiveGetValidations(newcoin::GetValidations& request) { vector validations; theApp->getValidationCollection().getValidations(request.ledgerindex(), validations); if(validations.size()) { BOOST_FOREACH(newcoin::Validation& valid, validations) { PackedMessage::pointer packet=boost::make_shared (PackedMessage::MessagePointer(new newcoin::Validation(valid)), newcoin::VALIDATION)); sendPacket(packet); } } } void Peer::receiveTransaction(TransactionPtr trans) { // add to the correct transaction bundle and relay if we need to if(theApp->getLedgerMaster().addTransaction(trans)) { // broadcast it to other Peers ConnectionPool& pool=theApp->getConnectionPool(); PackedMessage::pointer packet=boost::make_shread (PackedMessage::MessagePointer(new newcoin::Transaction(*(trans.get()))), newcoin::TRANSACTION); pool.relayMessage(this, packet); } else { std::cerr << "Invalid transaction: " << trans->from() << std::endl; } } void Peer::receiveProposeLedger(newcoin::ProposeLedger& packet) { theApp->getLedgerMaster().checkLedgerProposal(shared_from_this(), packet); } void Peer::receiveFullLedger(newcoin::FullLedger& packet) { theApp->getLedgerMaster().addFullLedger(packet); } void Peer::connectTo(KnownNode& node) { tcp::endpoint endpoint( address::from_string(node.mIP), node.mPort); mSocket.async_connect(endpoint, boost::bind(&Peer::connected, this, boost::asio::placeholders::error) ); } #endif // vim:ts=4