mirror of
https://github.com/Q3Rally-Team/rallyunlimited-engine.git
synced 2024-11-22 04:12:11 +00:00
2259 lines
60 KiB
C
2259 lines
60 KiB
C
/*
|
|
===========================================================================
|
|
Copyright (C) 1999-2005 Id Software, Inc.
|
|
|
|
This file is part of Quake III Arena source code.
|
|
|
|
Quake III Arena source code is free software; you can redistribute it
|
|
and/or modify it under the terms of the GNU General Public License as
|
|
published by the Free Software Foundation; either version 2 of the License,
|
|
or (at your option) any later version.
|
|
|
|
Quake III Arena source code is distributed in the hope that it will be
|
|
useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with Quake III Arena source code; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
===========================================================================
|
|
*/
|
|
// sv_client.c -- server code for dealing with clients
|
|
|
|
#include "server.h"
|
|
|
|
static void SV_CloseDownload( client_t *cl );
|
|
|
|
//
|
|
// Server-side Stateless Challenges
|
|
// backported from https://github.com/JACoders/OpenJK/pull/832
|
|
//
|
|
|
|
#define TS_SHIFT 14 // ~16 seconds to reply to the challenge
|
|
|
|
/*
|
|
=================
|
|
SV_CreateChallenge
|
|
|
|
Create an unforgeable, temporal challenge for the given client address
|
|
=================
|
|
*/
|
|
static int SV_CreateChallenge( int timestamp, const netadr_t *from )
|
|
{
|
|
int challenge;
|
|
|
|
// Create an unforgeable, temporal challenge for this client using HMAC(secretKey, clientParams + timestamp)
|
|
// Use first 4 bytes of the HMAC digest as an int (client only deals with numeric challenges)
|
|
// The most-significant bit stores whether the timestamp is odd or even. This lets later verification code handle the
|
|
// case where the engine timestamp has incremented between the time this challenge is sent and the client replies.
|
|
challenge = Com_MD5Addr( from, timestamp );
|
|
challenge &= 0x7FFFFFFF;
|
|
challenge |= (unsigned int)(timestamp & 0x1) << 31;
|
|
|
|
return challenge;
|
|
}
|
|
|
|
|
|
/*
|
|
=================
|
|
SV_CreateChallenge
|
|
|
|
Verify a challenge received by the client matches the expected challenge
|
|
=================
|
|
*/
|
|
static qboolean SV_VerifyChallenge( int receivedChallenge, const netadr_t *from )
|
|
{
|
|
int currentTimestamp = svs.time >> TS_SHIFT;
|
|
int currentPeriod = currentTimestamp & 0x1;
|
|
|
|
// Use the current timestamp for verification if the current period matches the client challenge's period.
|
|
// Otherwise, use the previous timestamp in case the current timestamp incremented in the time between the
|
|
// client being sent a challenge and the client's reply that's being verified now.
|
|
int challengePeriod = ((unsigned int)receivedChallenge >> 31) & 0x1;
|
|
int challengeTimestamp = currentTimestamp - ( currentPeriod ^ challengePeriod );
|
|
|
|
int expectedChallenge = SV_CreateChallenge( challengeTimestamp, from );
|
|
|
|
return (receivedChallenge == expectedChallenge) ? qtrue : qfalse;
|
|
}
|
|
|
|
|
|
/*
|
|
=================
|
|
SV_InitChallenger
|
|
=================
|
|
*/
|
|
void SV_InitChallenger( void )
|
|
{
|
|
Com_MD5Init();
|
|
}
|
|
|
|
|
|
/*
|
|
=================
|
|
SV_GetChallenge
|
|
|
|
A "getchallenge" OOB command has been received
|
|
Returns a challenge number that can be used
|
|
in a subsequent connectResponse command.
|
|
We do this to prevent denial of service attacks that
|
|
flood the server with invalid connection IPs. With a
|
|
challenge, they must give a valid IP address.
|
|
|
|
If we are authorizing, a challenge request will cause a packet
|
|
to be sent to the authorize server.
|
|
|
|
When an authorizeip is returned, a challenge response will be
|
|
sent to that ip.
|
|
|
|
ioquake3: we added a possibility for clients to add a challenge
|
|
to their packets, to make it more difficult for malicious servers
|
|
to hi-jack client connections.
|
|
Also, the auth stuff is completely disabled for com_standalone games
|
|
as well as IPv6 connections, since there is no way to use the
|
|
v4-only auth server for these new types of connections.
|
|
=================
|
|
*/
|
|
void SV_GetChallenge( const netadr_t *from ) {
|
|
int challenge;
|
|
int clientChallenge;
|
|
|
|
// ignore if we are in single player
|
|
#ifndef DEDICATED
|
|
if ( Cvar_VariableIntegerValue( "g_gametype" ) == GT_SINGLE_PLAYER || Cvar_VariableIntegerValue("ui_singlePlayerActive")) {
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
// Prevent using getchallenge as an amplifier
|
|
if ( SVC_RateLimitAddress( from, 10, 1000 ) ) {
|
|
if ( com_developer->integer ) {
|
|
Com_Printf( "SV_GetChallenge: rate limit from %s exceeded, dropping request\n",
|
|
NET_AdrToString( from ) );
|
|
}
|
|
return;
|
|
}
|
|
|
|
// Create a unique challenge for this client without storing state on the server
|
|
challenge = SV_CreateChallenge( svs.time >> TS_SHIFT, from );
|
|
|
|
if ( Cmd_Argc() < 2 ) {
|
|
// legacy client query, don't send unneeded information
|
|
NET_OutOfBandPrint( NS_SERVER, from, "challengeResponse %i", challenge );
|
|
} else {
|
|
int sv_proto = com_protocol->integer;
|
|
if ( sv_proto == DEFAULT_PROTOCOL_VERSION ) {
|
|
// we support new protocol features by default
|
|
sv_proto = NEW_PROTOCOL_VERSION;
|
|
}
|
|
|
|
// Grab the client's challenge to echo back (if given)
|
|
clientChallenge = atoi( Cmd_Argv( 1 ) );
|
|
|
|
NET_OutOfBandPrint( NS_SERVER, from, "challengeResponse %i %i %i",
|
|
challenge, clientChallenge, sv_proto );
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_IsBanned
|
|
|
|
Check whether a certain address is banned
|
|
==================
|
|
*/
|
|
#ifdef USE_BANS
|
|
|
|
static qboolean SV_IsBanned( const netadr_t *from, qboolean isexception )
|
|
{
|
|
int index;
|
|
serverBan_t *curban;
|
|
|
|
if(!isexception)
|
|
{
|
|
// If this is a query for a ban, first check whether the client is excepted
|
|
if(SV_IsBanned(from, qtrue))
|
|
return qfalse;
|
|
}
|
|
|
|
for(index = 0; index < serverBansCount; index++)
|
|
{
|
|
curban = &serverBans[index];
|
|
|
|
if(curban->isexception == isexception)
|
|
{
|
|
if(NET_CompareBaseAdrMask(&curban->ip, from, curban->subnet))
|
|
return qtrue;
|
|
}
|
|
}
|
|
|
|
return qfalse;
|
|
}
|
|
#endif
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_SetClientTLD
|
|
==================
|
|
*/
|
|
#pragma pack(push,1)
|
|
|
|
typedef struct iprange_s {
|
|
uint32_t from;
|
|
uint32_t to;
|
|
} iprange_t;
|
|
|
|
typedef struct iprange_tld_s {
|
|
char tld[2];
|
|
} iprange_tld_t;
|
|
|
|
#pragma pack(pop)
|
|
|
|
static qboolean ipdb_loaded;
|
|
static iprange_t *ipdb_range;
|
|
static iprange_tld_t *ipdb_tld;
|
|
static int num_tlds;
|
|
|
|
typedef struct tld_info_s {
|
|
const char *tld;
|
|
const char *country;
|
|
} tld_info_t;
|
|
|
|
static const tld_info_t tld_info[] = {
|
|
#include "tlds.h"
|
|
};
|
|
|
|
/*
|
|
==================
|
|
SV_FreeIP4DB
|
|
==================
|
|
*/
|
|
void SV_FreeIP4DB( void )
|
|
{
|
|
if ( ipdb_range )
|
|
Z_Free( ipdb_range );
|
|
|
|
ipdb_loaded = qfalse;
|
|
ipdb_range = NULL;
|
|
ipdb_tld = NULL;
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_LoadIP4DB
|
|
|
|
Loads geoip database into memory
|
|
==================
|
|
*/
|
|
static qboolean SV_LoadIP4DB( const char *filename )
|
|
{
|
|
fileHandle_t fh = FS_INVALID_HANDLE;
|
|
uint32_t last_ip;
|
|
void *buf;
|
|
int len, i;
|
|
|
|
len = FS_SV_FOpenFileRead( filename, &fh );
|
|
|
|
if ( len <= 0 )
|
|
{
|
|
if ( fh != FS_INVALID_HANDLE )
|
|
FS_FCloseFile( fh );
|
|
return qfalse;
|
|
}
|
|
|
|
if ( len % 10 ) // should be a power of IP4:IP4:TLD2
|
|
{
|
|
Com_DPrintf( "%s(%s): invalid file size %i\n", __func__, filename, len );
|
|
if ( fh != FS_INVALID_HANDLE )
|
|
FS_FCloseFile( fh );
|
|
return qfalse;
|
|
}
|
|
|
|
SV_FreeIP4DB();
|
|
|
|
buf = Z_Malloc( len );
|
|
|
|
FS_Read( buf, len, fh );
|
|
FS_FCloseFile( fh );
|
|
|
|
// check integrity of loaded database
|
|
last_ip = 0;
|
|
num_tlds = len / 10;
|
|
|
|
// database format:
|
|
// [range1][range2]...[rangeN]
|
|
// [tld1][tld2]...[tldN]
|
|
|
|
ipdb_range = (iprange_t*)buf;
|
|
ipdb_tld = (iprange_tld_t*)(ipdb_range + num_tlds);
|
|
|
|
for ( i = 0; i < num_tlds; i++ )
|
|
{
|
|
#ifdef Q3_LITTLE_ENDIAN
|
|
ipdb_range[i].from = LongSwap( ipdb_range[i].from );
|
|
ipdb_range[i].to = LongSwap( ipdb_range[i].to );
|
|
#endif
|
|
if ( last_ip && last_ip >= ipdb_range[i].from )
|
|
break;
|
|
if ( ipdb_range[i].from > ipdb_range[i].to )
|
|
break;
|
|
if ( ipdb_tld[i].tld[0] < 'A' || ipdb_tld[i].tld[0] > 'Z' || ipdb_tld[i].tld[1] < 'A' || ipdb_tld[i].tld[1] > 'Z' )
|
|
break;
|
|
last_ip = ipdb_range[i].to;
|
|
}
|
|
|
|
if ( i != num_tlds ) {
|
|
Com_Printf( S_COLOR_YELLOW "invalid ip4db entry #%i: range=[%08x..%08x], tld=%c%c\n",
|
|
i, ipdb_range[i].from, ipdb_range[i].to, ipdb_tld[i].tld[0], ipdb_tld[i].tld[1] );
|
|
SV_FreeIP4DB();
|
|
return qtrue; // to not try to load it again
|
|
}
|
|
|
|
Com_Printf( "ip4db: %i entries loaded\n", num_tlds );
|
|
return qtrue;
|
|
}
|
|
|
|
|
|
static void SV_SetTLD( char *str, const netadr_t *from, qboolean isLAN )
|
|
{
|
|
const iprange_t *e;
|
|
int lo, hi, m;
|
|
uint32_t ip;
|
|
|
|
str[0] = '\0';
|
|
|
|
if ( sv_clientTLD->integer == 0 )
|
|
return;
|
|
|
|
if ( isLAN )
|
|
{
|
|
strcpy( str, "**" );
|
|
return;
|
|
}
|
|
|
|
if ( from->type != NA_IP ) // ipv4-only
|
|
return;
|
|
|
|
if ( !ipdb_loaded )
|
|
ipdb_loaded = SV_LoadIP4DB( "ip4db.dat" );
|
|
|
|
if ( !ipdb_range )
|
|
return;
|
|
|
|
lo = 0;
|
|
hi = num_tlds;
|
|
|
|
// big-endian to host-endian
|
|
#ifdef Q3_LITTLE_ENDIAN
|
|
ip = from->ipv._4[3] | from->ipv._4[2] << 8 | from->ipv._4[1] << 16 | from->ipv._4[0] << 24;
|
|
#else
|
|
ip = from->ipv._4[0] | from->ipv._4[1] << 8 | from->ipv._4[2] << 16 | from->ipv._4[3] << 24;
|
|
#endif
|
|
|
|
// binary search
|
|
while ( lo <= hi )
|
|
{
|
|
m = ( lo + hi ) / 2;
|
|
e = ipdb_range + m;
|
|
if ( ip >= e->from && ip <= e->to )
|
|
{
|
|
const iprange_tld_t *tld = ipdb_tld + m;
|
|
str[0] = tld->tld[0];
|
|
str[1] = tld->tld[1];
|
|
str[2] = '\0';
|
|
return;
|
|
}
|
|
|
|
if ( e->from > ip )
|
|
hi = m - 1;
|
|
else
|
|
lo = m + 1;
|
|
}
|
|
}
|
|
|
|
|
|
static int seqs[ MAX_CLIENTS ];
|
|
|
|
static void SV_SaveSequences( void ) {
|
|
int i;
|
|
for ( i = 0; i < sv_maxclients->integer; i++ ) {
|
|
seqs[i] = svs.clients[i].reliableSequence;
|
|
}
|
|
}
|
|
|
|
|
|
static void SV_InjectLocation( const char *tld, const char *country ) {
|
|
const char *cmd;
|
|
char *str;
|
|
int i, n;
|
|
for ( i = 0; i < sv_maxclients->integer; i++ ) {
|
|
if ( seqs[i] != svs.clients[i].reliableSequence ) {
|
|
for ( n = seqs[i]; n != svs.clients[i].reliableSequence + 1; n++ ) {
|
|
cmd = svs.clients[i].reliableCommands[n & (MAX_RELIABLE_COMMANDS-1)];
|
|
str = strstr( cmd, "connected\n\"" );
|
|
if ( str && str[11] == '\0' && str < cmd + 512 ) {
|
|
if ( *tld == '\0' )
|
|
sprintf( str, S_COLOR_WHITE "connected (%s)\n\"", country );
|
|
else
|
|
sprintf( str, S_COLOR_WHITE "connected (" S_COLOR_RED "%s" S_COLOR_WHITE ", %s)\n\"", tld, country );
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
static const char *SV_FindCountry( const char *tld ) {
|
|
int i;
|
|
|
|
if ( *tld == '\0' )
|
|
return "Unknown Location";
|
|
|
|
for ( i = 0; i < ARRAY_LEN( tld_info ); i++ ) {
|
|
if ( !strcmp( tld, tld_info[i].tld ) ) {
|
|
return tld_info[i].country;
|
|
}
|
|
}
|
|
|
|
return "Unknown Location";
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_DirectConnect
|
|
|
|
A "connect" OOB command has been received
|
|
==================
|
|
*/
|
|
void SV_DirectConnect( const netadr_t *from ) {
|
|
static rateLimit_t bucket;
|
|
char userinfo[MAX_INFO_STRING], tld[3];
|
|
int i, n;
|
|
client_t *cl, *newcl;
|
|
//sharedEntity_t *ent;
|
|
int clientNum;
|
|
int qport;
|
|
int challenge;
|
|
const char *password;
|
|
int startIndex;
|
|
intptr_t denied;
|
|
int count;
|
|
int cl_proto, sv_proto;
|
|
const char *ip, *info, *v;
|
|
qboolean compat;
|
|
qboolean longstr;
|
|
|
|
Com_DPrintf( "SVC_DirectConnect()\n" );
|
|
|
|
#ifdef USE_BANS
|
|
// Check whether this client is banned.
|
|
if(SV_IsBanned(from, qfalse))
|
|
{
|
|
NET_OutOfBandPrint(NS_SERVER, &from, "print\nYou are banned from this server.\n");
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
// Prevent using connect as an amplifier
|
|
if ( SVC_RateLimitAddress( from, 10, 1000 ) ) {
|
|
if ( com_developer->integer ) {
|
|
Com_Printf( "SV_DirectConnect: rate limit from %s exceeded, dropping request\n",
|
|
NET_AdrToString( from ) );
|
|
}
|
|
return;
|
|
}
|
|
|
|
// check for concurrent connections
|
|
for ( i = 0, n = 0; i < sv_maxclients->integer; i++ ) {
|
|
const netadr_t *addr = &svs.clients[ i ].netchan.remoteAddress;
|
|
if ( addr->type != NA_BOT && NET_CompareBaseAdr( addr, from ) ) {
|
|
if ( svs.clients[ i ].state >= CS_CONNECTED && !svs.clients[ i ].justConnected ) {
|
|
if ( ++n >= sv_maxclientsPerIP->integer ) {
|
|
// avoid excessive outgoing traffic
|
|
if ( !SVC_RateLimit( &bucket, 10, 200 ) ) {
|
|
NET_OutOfBandPrint( NS_SERVER, from, "print\nToo many connections.\n" );
|
|
}
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// verify challenge in first place
|
|
info = Cmd_Argv( 1 );
|
|
v = Info_ValueForKey( info, "challenge" );
|
|
if ( *v == '\0' )
|
|
{
|
|
if ( !SVC_RateLimit( &bucket, 10, 200 ) )
|
|
{
|
|
NET_OutOfBandPrint( NS_SERVER, from, "print\nMissing challenge in userinfo.\n" );
|
|
}
|
|
return;
|
|
}
|
|
challenge = atoi( v );
|
|
|
|
// see if the challenge is valid (localhost clients don't need to challenge)
|
|
if ( !NET_IsLocalAddress( from ) )
|
|
{
|
|
// Verify the received challenge against the expected challenge
|
|
if ( !SV_VerifyChallenge( challenge, from ) )
|
|
{
|
|
// avoid excessive outgoing traffic
|
|
if ( !SVC_RateLimit( &bucket, 10, 200 ) )
|
|
{
|
|
NET_OutOfBandPrint( NS_SERVER, from, "print\nIncorrect challenge, please reconnect.\n" );
|
|
}
|
|
return;
|
|
}
|
|
}
|
|
|
|
Q_strncpyz( userinfo, info, sizeof( userinfo ) );
|
|
|
|
v = Info_ValueForKey( userinfo, "protocol" );
|
|
if ( *v == '\0' )
|
|
{
|
|
if ( !SVC_RateLimit( &bucket, 10, 200 ) )
|
|
{
|
|
NET_OutOfBandPrint( NS_SERVER, from, "print\nMissing protocol in userinfo.\n" );
|
|
}
|
|
return;
|
|
}
|
|
cl_proto = atoi( v );
|
|
|
|
sv_proto = com_protocol->integer;
|
|
if ( sv_proto == DEFAULT_PROTOCOL_VERSION )
|
|
{
|
|
// we support new protocol features by default
|
|
sv_proto = NEW_PROTOCOL_VERSION;
|
|
}
|
|
|
|
if ( cl_proto <= OLD_PROTOCOL_VERSION )
|
|
compat = qtrue;
|
|
else
|
|
{
|
|
if ( cl_proto != sv_proto )
|
|
{
|
|
// avoid excessive outgoing traffic
|
|
if ( !SVC_RateLimit( &bucket, 10, 200 ) )
|
|
{
|
|
NET_OutOfBandPrint( NS_SERVER, from, "print\nServer uses protocol version %i "
|
|
"(yours is %i).\n", sv_proto, cl_proto );
|
|
}
|
|
Com_DPrintf( " rejected connect from version %i\n", cl_proto );
|
|
return;
|
|
}
|
|
compat = qfalse;
|
|
}
|
|
|
|
v = Info_ValueForKey( userinfo, "qport" );
|
|
if ( *v == '\0' )
|
|
{
|
|
if ( !SVC_RateLimit( &bucket, 10, 200 ) )
|
|
{
|
|
NET_OutOfBandPrint( NS_SERVER, from, "print\nMissing qport in userinfo.\n" );
|
|
}
|
|
return;
|
|
}
|
|
qport = atoi( Info_ValueForKey( userinfo, "qport" ) );
|
|
|
|
// if "client" is present in userinfo and it is a modern client
|
|
// then assume it can properly decode long strings and protocol extensions
|
|
if ( !compat && *Info_ValueForKey( userinfo, "client" ) != '\0' ) {
|
|
longstr = qtrue;
|
|
} else {
|
|
longstr = qfalse;
|
|
if ( com_protocolCompat ) {
|
|
// enforce dm68-compatible stream for other clients
|
|
compat = qtrue;
|
|
}
|
|
}
|
|
|
|
// we don't need these keys after connection, release some space in userinfo
|
|
Info_RemoveKey( userinfo, "challenge" );
|
|
Info_RemoveKey( userinfo, "qport" );
|
|
Info_RemoveKey( userinfo, "protocol" );
|
|
Info_RemoveKey( userinfo, "client" );
|
|
|
|
// don't let "ip" overflow userinfo string
|
|
if ( NET_IsLocalAddress( from ) )
|
|
ip = "localhost";
|
|
else
|
|
ip = NET_AdrToString( from );
|
|
|
|
if ( !Info_SetValueForKey( userinfo, "ip", ip ) ) {
|
|
// avoid excessive outgoing traffic
|
|
if ( !SVC_RateLimit( &bucket, 10, 200 ) ) {
|
|
NET_OutOfBandPrint( NS_SERVER, from, "print\nUserinfo string length exceeded. "
|
|
"Try removing setu cvars from your config.\n" );
|
|
}
|
|
return;
|
|
}
|
|
|
|
// run userinfo filter
|
|
SV_SetTLD( tld, from, Sys_IsLANAddress( from ) );
|
|
Info_SetValueForKey( userinfo, "tld", tld );
|
|
v = SV_RunFilters( userinfo, from );
|
|
if ( *v != '\0' ) {
|
|
NET_OutOfBandPrint( NS_SERVER, from, "print\n%s\n", v );
|
|
Com_DPrintf( "Engine rejected a connection: %s.\n", v );
|
|
return;
|
|
}
|
|
|
|
// restore burst capacity
|
|
SVC_RateRestoreBurstAddress( from, 10, 1000 );
|
|
|
|
// quick reject
|
|
newcl = NULL;
|
|
for ( i = 0, cl = svs.clients ; i < sv_maxclients->integer ; i++, cl++ ) {
|
|
if ( NET_CompareAdr( from, &cl->netchan.remoteAddress ) ) {
|
|
int elapsed = svs.time - cl->lastConnectTime;
|
|
if ( elapsed < ( sv_reconnectlimit->integer * 1000 ) && elapsed >= 0 ) {
|
|
int remains = ( ( sv_reconnectlimit->integer * 1000 ) - elapsed + 999 ) / 1000;
|
|
if ( com_developer->integer ) {
|
|
Com_Printf( "%s:reconnect rejected : too soon\n", NET_AdrToString( from ) );
|
|
}
|
|
// avoid excessive outgoing traffic
|
|
if ( !SVC_RateLimit( &bucket, 10, 200 ) ) {
|
|
NET_OutOfBandPrint( NS_SERVER, from, "print\nReconnecting, please wait %i second%s.\n",
|
|
remains, (remains != 1) ? "s" : "" );
|
|
}
|
|
return;
|
|
}
|
|
newcl = cl; // we may reuse this slot
|
|
break;
|
|
}
|
|
}
|
|
|
|
// if there is already a slot for this ip, reuse it
|
|
for ( i = 0, cl = svs.clients ; i < sv_maxclients->integer ; i++, cl++ ) {
|
|
if ( cl->state == CS_FREE ) {
|
|
continue;
|
|
}
|
|
if ( NET_CompareAdr( from, &cl->netchan.remoteAddress ) && cl->netchan.qport == qport ) {
|
|
// both qport and netport should match for a reconnecting client
|
|
Com_Printf( "%s:reconnect\n", NET_AdrToString( from ) );
|
|
newcl = cl;
|
|
|
|
// this doesn't work because it nukes the players userinfo
|
|
|
|
// // disconnect the client from the game first so any flags the
|
|
// // player might have are dropped
|
|
// VM_Call( gvm, GAME_CLIENT_DISCONNECT, 1, newcl - svs.clients );
|
|
//
|
|
goto gotnewcl;
|
|
}
|
|
}
|
|
|
|
// find a client slot
|
|
// if "sv_privateClients" is set > 0, then that number
|
|
// of client slots will be reserved for connections that
|
|
// have "password" set to the value of "sv_privatePassword"
|
|
// Info requests will report the maxclients as if the private
|
|
// slots didn't exist, to prevent people from trying to connect
|
|
// to a full server.
|
|
// This is to allow us to reserve a couple slots here on our
|
|
// servers so we can play without having to kick people.
|
|
|
|
// check for privateClient password
|
|
password = Info_ValueForKey( userinfo, "password" );
|
|
if ( *password && !strcmp( password, sv_privatePassword->string ) ) {
|
|
startIndex = 0;
|
|
} else {
|
|
// skip past the reserved slots
|
|
startIndex = sv_privateClients->integer;
|
|
}
|
|
|
|
if ( newcl && newcl >= svs.clients + startIndex && newcl->state == CS_FREE ) {
|
|
Com_Printf( "%s: reuse slot %i\n", NET_AdrToString( from ), (int)(newcl - svs.clients) );
|
|
goto gotnewcl;
|
|
}
|
|
|
|
// select least used free slot
|
|
n = 0;
|
|
newcl = NULL;
|
|
for ( i = startIndex; i < sv_maxclients->integer ; i++ ) {
|
|
cl = &svs.clients[i];
|
|
if ( cl->state == CS_FREE && ( newcl == NULL || svs.time - cl->lastDisconnectTime > n ) ) {
|
|
n = svs.time - cl->lastDisconnectTime;
|
|
newcl = cl;
|
|
}
|
|
}
|
|
|
|
if ( !newcl ) {
|
|
if ( NET_IsLocalAddress( from ) ) {
|
|
count = 0;
|
|
for ( i = startIndex; i < sv_maxclients->integer ; i++ ) {
|
|
cl = &svs.clients[i];
|
|
if (cl->netchan.remoteAddress.type == NA_BOT) {
|
|
count++;
|
|
}
|
|
}
|
|
// if they're all bots
|
|
if (count >= sv_maxclients->integer - startIndex) {
|
|
SV_DropClient(&svs.clients[sv_maxclients->integer - 1], "only bots on server");
|
|
newcl = &svs.clients[sv_maxclients->integer - 1];
|
|
}
|
|
else {
|
|
Com_Error( ERR_DROP, "server is full on local connect" );
|
|
return;
|
|
}
|
|
}
|
|
else {
|
|
NET_OutOfBandPrint( NS_SERVER, from, "print\nServer is full.\n" );
|
|
Com_DPrintf ("Rejected a connection.\n");
|
|
return;
|
|
}
|
|
}
|
|
|
|
gotnewcl:
|
|
// build a new connection
|
|
// accept the new client
|
|
// this is the only place a client_t is ever initialized
|
|
// we got a newcl, so reset the reliableSequence and reliableAcknowledge
|
|
Com_Memset( newcl, 0, sizeof( *newcl ) );
|
|
clientNum = newcl - svs.clients;
|
|
#if 0 // skip this until CS_PRIMED
|
|
//ent = SV_GentityNum( clientNum );
|
|
//newcl->gentity = ent;
|
|
#endif
|
|
|
|
// save the challenge
|
|
newcl->challenge = challenge;
|
|
|
|
// save the address
|
|
newcl->compat = compat;
|
|
Netchan_Setup( NS_SERVER, &newcl->netchan, from, qport, challenge, compat );
|
|
|
|
// init the netchan queue
|
|
newcl->netchan_end_queue = &newcl->netchan_start_queue;
|
|
|
|
// save the userinfo
|
|
Q_strncpyz( newcl->userinfo, userinfo, sizeof(newcl->userinfo) );
|
|
|
|
newcl->longstr = longstr;
|
|
|
|
strcpy( newcl->tld, tld );
|
|
newcl->country = SV_FindCountry( newcl->tld );
|
|
|
|
SV_UserinfoChanged( newcl, qtrue, qfalse ); // update userinfo, do not run filter
|
|
|
|
if ( sv_clientTLD->integer ) {
|
|
SV_SaveSequences();
|
|
}
|
|
|
|
// get the game a chance to reject this connection or modify the userinfo
|
|
denied = VM_Call( gvm, 3, GAME_CLIENT_CONNECT, clientNum, qtrue, qfalse ); // firstTime = qtrue
|
|
if ( denied ) {
|
|
// we can't just use VM_ArgPtr, because that is only valid inside a VM_Call
|
|
const char *str = GVM_ArgPtr( denied );
|
|
|
|
NET_OutOfBandPrint( NS_SERVER, from, "print\n%s\n", str );
|
|
Com_DPrintf( "Game rejected a connection: %s.\n", str );
|
|
return;
|
|
}
|
|
|
|
if ( sv_clientTLD->integer ) {
|
|
SV_InjectLocation( newcl->tld, newcl->country );
|
|
}
|
|
|
|
// send the connect packet to the client
|
|
if ( longstr /*&& !compat*/ ) {
|
|
NET_OutOfBandPrint( NS_SERVER, from, "connectResponse %d %d", challenge, sv_proto );
|
|
} else {
|
|
NET_OutOfBandPrint( NS_SERVER, from, "connectResponse %d", challenge );
|
|
}
|
|
|
|
Com_DPrintf( "Going from CS_FREE to CS_CONNECTED for %s\n", newcl->name );
|
|
|
|
newcl->state = CS_CONNECTED;
|
|
newcl->lastSnapshotTime = svs.time - 9999; // generate a snapshot immediately
|
|
newcl->lastPacketTime = svs.time;
|
|
newcl->lastConnectTime = svs.time;
|
|
newcl->lastDisconnectTime = svs.time;
|
|
|
|
SVC_RateRestoreToxicAddress( &newcl->netchan.remoteAddress, 10, 1000 );
|
|
newcl->justConnected = qtrue;
|
|
|
|
// when we receive the first packet from the client, we will
|
|
// notice that it is from a different serverid and that the
|
|
// gamestate message was not just sent, forcing a retransmit
|
|
newcl->gamestateMessageNum = newcl->messageAcknowledge - 1; // force gamestate retransmit
|
|
|
|
// if this was the first client on the server, or the last client
|
|
// the server can hold, send a heartbeat to the master.
|
|
count = 0;
|
|
for (i=0,cl=svs.clients ; i < sv_maxclients->integer ; i++,cl++) {
|
|
if ( svs.clients[i].state >= CS_CONNECTED ) {
|
|
count++;
|
|
}
|
|
}
|
|
if ( count == 1 || count == sv_maxclients->integer ) {
|
|
SV_Heartbeat_f();
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
=====================
|
|
SV_FreeClient
|
|
|
|
Destructor for data allocated in a client structure
|
|
=====================
|
|
*/
|
|
void SV_FreeClient(client_t *client)
|
|
{
|
|
SV_Netchan_FreeQueue(client);
|
|
SV_CloseDownload(client);
|
|
}
|
|
|
|
|
|
/*
|
|
=====================
|
|
SV_DropClient
|
|
|
|
Called when the player is totally leaving the server, either willingly
|
|
or unwillingly. This is NOT called if the entire server is quitting
|
|
or crashing -- SV_FinalMessage() will handle that
|
|
=====================
|
|
*/
|
|
void SV_DropClient( client_t *drop, const char *reason ) {
|
|
char name[ MAX_NAME_LENGTH ];
|
|
qboolean isBot;
|
|
int i;
|
|
|
|
if ( drop->state == CS_ZOMBIE ) {
|
|
return; // already dropped
|
|
}
|
|
|
|
isBot = drop->netchan.remoteAddress.type == NA_BOT;
|
|
|
|
Q_strncpyz( name, drop->name, sizeof( name ) ); // for further DPrintf() because drop->name will be nuked in SV_SetUserinfo()
|
|
|
|
// Free all allocated data on the client structure
|
|
SV_FreeClient( drop );
|
|
|
|
// tell everyone why they got dropped
|
|
if ( reason ) {
|
|
SV_SendServerCommand( NULL, "print \"%s" S_COLOR_WHITE " %s\n\"", name, reason );
|
|
}
|
|
|
|
// call the prog function for removing a client
|
|
// this will remove the body, among other things
|
|
VM_Call( gvm, 1, GAME_CLIENT_DISCONNECT, drop - svs.clients );
|
|
|
|
// add the disconnect command
|
|
if ( reason ) {
|
|
SV_SendServerCommand( drop, "disconnect \"%s\"", reason );
|
|
}
|
|
|
|
if ( isBot ) {
|
|
SV_BotFreeClient( drop - svs.clients );
|
|
}
|
|
|
|
// nuke user info
|
|
SV_SetUserinfo( drop - svs.clients, "" );
|
|
|
|
drop->justConnected = qfalse;
|
|
|
|
drop->lastDisconnectTime = svs.time;
|
|
|
|
if ( isBot ) {
|
|
// bots shouldn't go zombie, as there's no real net connection.
|
|
drop->state = CS_FREE;
|
|
} else {
|
|
Com_DPrintf( "Going to CS_ZOMBIE for %s\n", name );
|
|
drop->state = CS_ZOMBIE; // become free in a few seconds
|
|
}
|
|
|
|
if ( !reason ) {
|
|
return;
|
|
}
|
|
|
|
// if this was the last client on the server, send a heartbeat
|
|
// to the master so it is known the server is empty
|
|
// send a heartbeat now so the master will get up to date info
|
|
for ( i = 0 ; i < sv_maxclients->integer ; i++ ) {
|
|
if ( svs.clients[i].state >= CS_CONNECTED ) {
|
|
break;
|
|
}
|
|
}
|
|
if ( i == sv_maxclients->integer ) {
|
|
SV_Heartbeat_f();
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
================
|
|
SV_RemainingGameState
|
|
|
|
estimates free space available for additional systeminfo keys
|
|
================
|
|
*/
|
|
int SV_RemainingGameState( void )
|
|
{
|
|
int len;
|
|
int start, i;
|
|
entityState_t nullstate;
|
|
const svEntity_t *svEnt;
|
|
msg_t msg;
|
|
byte msgBuffer[ MAX_MSGLEN_BUF ];
|
|
|
|
MSG_Init( &msg, msgBuffer, MAX_MSGLEN );
|
|
|
|
MSG_WriteLong( &msg, 7 ); // last client command
|
|
|
|
for ( i = 0; i < 256; i++ ) // simulate dummy client commands
|
|
MSG_WriteByte( &msg, i & 127 );
|
|
|
|
// send the gamestate
|
|
MSG_WriteByte( &msg, svc_gamestate );
|
|
MSG_WriteLong( &msg, 7 ); // client->reliableSequence
|
|
|
|
// write the configstrings
|
|
for ( start = 0 ; start < MAX_CONFIGSTRINGS ; start++ ) {
|
|
if ( start == CS_SERVERINFO ) {
|
|
MSG_WriteByte( &msg, svc_configstring );
|
|
MSG_WriteShort( &msg, start );
|
|
MSG_WriteBigString( &msg, Cvar_InfoString( CVAR_SERVERINFO, NULL ) );
|
|
continue;
|
|
}
|
|
if ( start == CS_SYSTEMINFO ) {
|
|
MSG_WriteByte( &msg, svc_configstring );
|
|
MSG_WriteShort( &msg, start );
|
|
MSG_WriteBigString( &msg, Cvar_InfoString_Big( CVAR_SYSTEMINFO, NULL ) );
|
|
continue;
|
|
}
|
|
if ( sv.configstrings[start][0] ) {
|
|
MSG_WriteByte( &msg, svc_configstring );
|
|
MSG_WriteShort( &msg, start );
|
|
MSG_WriteBigString( &msg, sv.configstrings[start] );
|
|
}
|
|
}
|
|
|
|
// write the baselines
|
|
Com_Memset( &nullstate, 0, sizeof( nullstate ) );
|
|
for ( start = 0 ; start < MAX_GENTITIES; start++ ) {
|
|
if ( !sv.baselineUsed[ start ] ) {
|
|
continue;
|
|
}
|
|
svEnt = &sv.svEntities[ start ];
|
|
MSG_WriteByte( &msg, svc_baseline );
|
|
MSG_WriteDeltaEntity( &msg, &nullstate, &svEnt->baseline, qtrue );
|
|
}
|
|
|
|
MSG_WriteByte( &msg, svc_EOF );
|
|
|
|
MSG_WriteLong( &msg, 7 ); // client num
|
|
|
|
// write the checksum feed
|
|
MSG_WriteLong( &msg, sv.checksumFeed );
|
|
|
|
// finalize packet
|
|
MSG_WriteByte( &msg, svc_EOF );
|
|
|
|
len = PAD( msg.bit, 8 ) / 8;
|
|
|
|
// reserve some space for potential userinfo expansion
|
|
len += 512;
|
|
|
|
return MAX_MSGLEN - len;
|
|
}
|
|
|
|
|
|
/*
|
|
================
|
|
SV_SendClientGameState
|
|
|
|
Sends the first message from the server to a connected client.
|
|
This will be sent on the initial connection and upon each new map load.
|
|
|
|
It will be resent if the client acknowledges a later message but has
|
|
the wrong gamestate.
|
|
================
|
|
*/
|
|
static void SV_SendClientGameState( client_t *client ) {
|
|
int start;
|
|
entityState_t nullstate;
|
|
const svEntity_t *svEnt;
|
|
msg_t msg;
|
|
byte msgBuffer[ MAX_MSGLEN_BUF ];
|
|
|
|
Com_DPrintf( "SV_SendClientGameState() for %s\n", client->name );
|
|
|
|
if ( client->state != CS_PRIMED ) {
|
|
Com_DPrintf( "Going from CS_CONNECTED to CS_PRIMED for %s\n", client->name );
|
|
}
|
|
client->state = CS_PRIMED;
|
|
|
|
client->pureAuthentic = qfalse;
|
|
client->gotCP = qfalse;
|
|
|
|
// to start generating delta for packet entities
|
|
client->gentity = SV_GentityNum( client - svs.clients );
|
|
|
|
// when we receive the first packet from the client, we will
|
|
// notice that it is from a different serverid and that the
|
|
// gamestate message was not just sent, forcing a retransmit
|
|
client->gamestateMessageNum = client->netchan.outgoingSequence;
|
|
|
|
MSG_Init( &msg, msgBuffer, MAX_MSGLEN );
|
|
|
|
// NOTE, MRE: all server->client messages now acknowledge
|
|
// let the client know which reliable clientCommands we have received
|
|
MSG_WriteLong( &msg, client->lastClientCommand );
|
|
|
|
// send any server commands waiting to be sent first.
|
|
// we have to do this cause we send the client->reliableSequence
|
|
// with a gamestate and it sets the clc.serverCommandSequence at
|
|
// the client side
|
|
SV_UpdateServerCommandsToClient( client, &msg );
|
|
|
|
// send the gamestate
|
|
MSG_WriteByte( &msg, svc_gamestate );
|
|
MSG_WriteLong( &msg, client->reliableSequence );
|
|
|
|
// write the configstrings
|
|
for ( start = 0 ; start < MAX_CONFIGSTRINGS ; start++ ) {
|
|
if (sv.configstrings[start][0]) {
|
|
MSG_WriteByte( &msg, svc_configstring );
|
|
MSG_WriteShort( &msg, start );
|
|
MSG_WriteBigString( &msg, sv.configstrings[start] );
|
|
}
|
|
}
|
|
|
|
// write the baselines
|
|
Com_Memset( &nullstate, 0, sizeof( nullstate ) );
|
|
for ( start = 0 ; start < MAX_GENTITIES; start++ ) {
|
|
if ( !sv.baselineUsed[ start ] ) {
|
|
continue;
|
|
}
|
|
svEnt = &sv.svEntities[ start ];
|
|
MSG_WriteByte( &msg, svc_baseline );
|
|
MSG_WriteDeltaEntity( &msg, &nullstate, &svEnt->baseline, qtrue );
|
|
}
|
|
|
|
MSG_WriteByte( &msg, svc_EOF );
|
|
|
|
MSG_WriteLong( &msg, client - svs.clients );
|
|
|
|
// write the checksum feed
|
|
MSG_WriteLong( &msg, sv.checksumFeed );
|
|
|
|
// it is important to handle gamestate overflow
|
|
// but at this stage client can't process any reliable commands
|
|
// so at least try to inform him in console and release connection slot
|
|
if ( msg.overflowed ) {
|
|
if ( client->netchan.remoteAddress.type == NA_LOOPBACK ) {
|
|
Com_Error( ERR_DROP, "gamestate overflow" );
|
|
} else {
|
|
NET_OutOfBandPrint( NS_SERVER, &client->netchan.remoteAddress, "print\n" S_COLOR_RED "SERVER ERROR: gamestate overflow\n" );
|
|
SV_DropClient( client, "gamestate overflow" );
|
|
}
|
|
return;
|
|
}
|
|
|
|
// deliver this to the client
|
|
SV_SendMessageToClient( &msg, client );
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_ClientEnterWorld
|
|
==================
|
|
*/
|
|
void SV_ClientEnterWorld( client_t *client, usercmd_t *cmd ) {
|
|
int clientNum;
|
|
sharedEntity_t *ent;
|
|
|
|
Com_DPrintf( "Going from CS_PRIMED to CS_ACTIVE for %s\n", client->name );
|
|
client->state = CS_ACTIVE;
|
|
|
|
// resend all configstrings using the cs commands since these are
|
|
// no longer sent when the client is CS_PRIMED
|
|
SV_UpdateConfigstrings( client );
|
|
|
|
// set up the entity for the client
|
|
clientNum = client - svs.clients;
|
|
ent = SV_GentityNum( clientNum );
|
|
ent->s.number = clientNum;
|
|
client->gentity = ent;
|
|
|
|
client->deltaMessage = client->netchan.outgoingSequence - (PACKET_BACKUP + 1); // force delta reset
|
|
client->lastSnapshotTime = svs.time - 9999; // generate a snapshot immediately
|
|
|
|
if(cmd)
|
|
memcpy(&client->lastUsercmd, cmd, sizeof(client->lastUsercmd));
|
|
else
|
|
memset(&client->lastUsercmd, '\0', sizeof(client->lastUsercmd));
|
|
|
|
// call the game begin function
|
|
VM_Call( gvm, 1, GAME_CLIENT_BEGIN, client - svs.clients );
|
|
}
|
|
|
|
|
|
/*
|
|
============================================================
|
|
|
|
CLIENT COMMAND EXECUTION
|
|
|
|
============================================================
|
|
*/
|
|
|
|
/*
|
|
==================
|
|
SV_CloseDownload
|
|
|
|
clear/free any download vars
|
|
==================
|
|
*/
|
|
static void SV_CloseDownload( client_t *cl ) {
|
|
int i;
|
|
|
|
// EOF
|
|
if ( cl->download != FS_INVALID_HANDLE ) {
|
|
FS_FCloseFile( cl->download );
|
|
cl->download = FS_INVALID_HANDLE;
|
|
}
|
|
|
|
*cl->downloadName = '\0';
|
|
|
|
// Free the temporary buffer space
|
|
for (i = 0; i < MAX_DOWNLOAD_WINDOW; i++) {
|
|
if (cl->downloadBlocks[i]) {
|
|
Z_Free( cl->downloadBlocks[i] );
|
|
cl->downloadBlocks[i] = NULL;
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_StopDownload_f
|
|
|
|
Abort a download if in progress
|
|
==================
|
|
*/
|
|
static void SV_StopDownload_f( client_t *cl ) {
|
|
if (*cl->downloadName)
|
|
Com_DPrintf( "clientDownload: %d : file \"%s\" aborted\n", (int) (cl - svs.clients), cl->downloadName );
|
|
|
|
SV_CloseDownload( cl );
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_DoneDownload_f
|
|
|
|
Downloads are finished
|
|
==================
|
|
*/
|
|
static void SV_DoneDownload_f( client_t *cl ) {
|
|
if ( cl->state == CS_ACTIVE )
|
|
return;
|
|
|
|
Com_DPrintf( "clientDownload: %s Done\n", cl->name);
|
|
|
|
// resend the game state to update any clients that entered during the download
|
|
SV_SendClientGameState( cl );
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_NextDownload_f
|
|
|
|
The argument will be the last acknowledged block from the client, it should be
|
|
the same as cl->downloadClientBlock
|
|
==================
|
|
*/
|
|
static void SV_NextDownload_f( client_t *cl )
|
|
{
|
|
int block = atoi( Cmd_Argv(1) );
|
|
|
|
if (block == cl->downloadClientBlock) {
|
|
Com_DPrintf( "clientDownload: %d : client acknowledge of block %d\n", (int) (cl - svs.clients), block );
|
|
|
|
// Find out if we are done. A zero-length block indicates EOF
|
|
if (cl->downloadBlockSize[cl->downloadClientBlock % MAX_DOWNLOAD_WINDOW] == 0) {
|
|
Com_Printf( "clientDownload: %d : file \"%s\" completed\n", (int) (cl - svs.clients), cl->downloadName );
|
|
SV_CloseDownload( cl );
|
|
return;
|
|
}
|
|
|
|
cl->downloadSendTime = svs.time;
|
|
cl->downloadClientBlock++;
|
|
return;
|
|
}
|
|
// We aren't getting an acknowledge for the correct block, drop the client
|
|
// FIXME: this is bad... the client will never parse the disconnect message
|
|
// because the cgame isn't loaded yet
|
|
SV_DropClient( cl, "broken download" );
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_BeginDownload_f
|
|
==================
|
|
*/
|
|
static void SV_BeginDownload_f( client_t *cl ) {
|
|
|
|
// Kill any existing download
|
|
SV_CloseDownload( cl );
|
|
|
|
// cl->downloadName is non-zero now, SV_WriteDownloadToClient will see this and open
|
|
// the file itself
|
|
Q_strncpyz( cl->downloadName, Cmd_Argv(1), sizeof(cl->downloadName) );
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_WriteDownloadToClient
|
|
|
|
Check to see if the client wants a file, open it if needed and start pumping the client
|
|
Fill up msg with data, return number of download blocks added
|
|
==================
|
|
*/
|
|
static int SV_WriteDownloadToClient( client_t *cl )
|
|
{
|
|
int curindex;
|
|
int unreferenced = 1;
|
|
char errorMessage[1024];
|
|
char pakbuf[MAX_QPATH], *pakptr;
|
|
int numRefPaks;
|
|
msg_t msg;
|
|
byte msgBuffer[MAX_DOWNLOAD_BLKSIZE*2+8];
|
|
|
|
if ( cl->download == FS_INVALID_HANDLE ) {
|
|
qboolean idPack = qfalse;
|
|
qboolean missionPack = qfalse;
|
|
// Chop off filename extension.
|
|
Q_strncpyz( pakbuf, cl->downloadName, sizeof( pakbuf ) );
|
|
pakptr = strrchr( pakbuf, '.' );
|
|
|
|
if(pakptr)
|
|
{
|
|
*pakptr = '\0';
|
|
|
|
// Check for pk3 filename extension
|
|
if ( !Q_stricmp( pakptr + 1, "pk3" ) )
|
|
{
|
|
// Check whether the file appears in the list of referenced
|
|
// paks to prevent downloading of arbitrary files.
|
|
Cmd_TokenizeStringIgnoreQuotes( sv_referencedPakNames->string );
|
|
numRefPaks = Cmd_Argc();
|
|
|
|
for(curindex = 0; curindex < numRefPaks; curindex++)
|
|
{
|
|
if(!FS_FilenameCompare(Cmd_Argv(curindex), pakbuf))
|
|
{
|
|
unreferenced = 0;
|
|
|
|
// now that we know the file is referenced,
|
|
// check whether it's legal to download it.
|
|
missionPack = FS_idPak(pakbuf, BASETA, NUM_TA_PAKS);
|
|
idPack = missionPack || FS_idPak(pakbuf, BASEGAME, NUM_ID_PAKS);
|
|
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
cl->download = FS_INVALID_HANDLE;
|
|
|
|
// We open the file here
|
|
if ( !(sv_allowDownload->integer & DLF_ENABLE) ||
|
|
(sv_allowDownload->integer & DLF_NO_UDP) ||
|
|
idPack || unreferenced ||
|
|
( cl->downloadSize = FS_SV_FOpenFileRead( cl->downloadName, &cl->download ) ) < 0 ) {
|
|
|
|
// cannot auto-download file
|
|
if(unreferenced)
|
|
{
|
|
Com_Printf("clientDownload: %d : \"%s\" is not referenced and cannot be downloaded.\n", (int) (cl - svs.clients), cl->downloadName);
|
|
Com_sprintf(errorMessage, sizeof(errorMessage), "File \"%s\" is not referenced and cannot be downloaded.", cl->downloadName);
|
|
}
|
|
else if (idPack) {
|
|
Com_Printf("clientDownload: %d : \"%s\" cannot download id pk3 files\n", (int) (cl - svs.clients), cl->downloadName);
|
|
if (missionPack) {
|
|
Com_sprintf(errorMessage, sizeof(errorMessage), "Cannot autodownload Team Arena file \"%s\"\n"
|
|
"The Team Arena mission pack can be found in your local game store.", cl->downloadName);
|
|
}
|
|
else {
|
|
Com_sprintf(errorMessage, sizeof(errorMessage), "Cannot autodownload id pk3 file \"%s\"", cl->downloadName);
|
|
}
|
|
}
|
|
else if ( !(sv_allowDownload->integer & DLF_ENABLE) ||
|
|
(sv_allowDownload->integer & DLF_NO_UDP) ) {
|
|
|
|
Com_Printf("clientDownload: %d : \"%s\" download disabled\n", (int) (cl - svs.clients), cl->downloadName);
|
|
if (sv_pure->integer) {
|
|
Com_sprintf(errorMessage, sizeof(errorMessage), "Could not download \"%s\" because autodownloading is disabled on the server.\n\n"
|
|
"You will need to get this file elsewhere before you "
|
|
"can connect to this pure server.\n", cl->downloadName);
|
|
} else {
|
|
Com_sprintf(errorMessage, sizeof(errorMessage), "Could not download \"%s\" because autodownloading is disabled on the server.\n\n"
|
|
"The server you are connecting to is not a pure server, "
|
|
"set autodownload to No in your settings and you might be "
|
|
"able to join the game anyway.\n", cl->downloadName);
|
|
}
|
|
} else {
|
|
// NOTE TTimo this is NOT supposed to happen unless bug in our filesystem scheme?
|
|
// if the pk3 is referenced, it must have been found somewhere in the filesystem
|
|
Com_Printf("clientDownload: %d : \"%s\" file not found on server\n", (int) (cl - svs.clients), cl->downloadName);
|
|
Com_sprintf(errorMessage, sizeof(errorMessage), "File \"%s\" not found on server for autodownloading.\n", cl->downloadName);
|
|
}
|
|
|
|
MSG_Init( &msg, msgBuffer, sizeof( msgBuffer ) - 8 );
|
|
MSG_WriteLong( &msg, cl->lastClientCommand );
|
|
|
|
MSG_WriteByte( &msg, svc_download );
|
|
MSG_WriteShort( &msg, 0 ); // client is expecting block zero
|
|
MSG_WriteLong( &msg, -1 ); // illegal file size
|
|
MSG_WriteString( &msg, errorMessage );
|
|
|
|
MSG_WriteByte( &msg, svc_EOF );
|
|
SV_Netchan_Transmit( cl, &msg );
|
|
|
|
*cl->downloadName = '\0';
|
|
|
|
if ( cl->download != FS_INVALID_HANDLE ) {
|
|
FS_FCloseFile( cl->download );
|
|
cl->download = FS_INVALID_HANDLE;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
Com_Printf( "clientDownload: %d : beginning \"%s\"\n", (int) (cl - svs.clients), cl->downloadName );
|
|
|
|
// Init
|
|
cl->downloadCurrentBlock = cl->downloadClientBlock = cl->downloadXmitBlock = 0;
|
|
cl->downloadCount = 0;
|
|
cl->downloadEOF = qfalse;
|
|
}
|
|
|
|
// Perform any reads that we need to
|
|
while (cl->downloadCurrentBlock - cl->downloadClientBlock < MAX_DOWNLOAD_WINDOW &&
|
|
cl->downloadSize != cl->downloadCount) {
|
|
|
|
curindex = (cl->downloadCurrentBlock % MAX_DOWNLOAD_WINDOW);
|
|
|
|
if (!cl->downloadBlocks[curindex])
|
|
cl->downloadBlocks[curindex] = Z_Malloc( MAX_DOWNLOAD_BLKSIZE );
|
|
|
|
cl->downloadBlockSize[curindex] = FS_Read( cl->downloadBlocks[curindex], MAX_DOWNLOAD_BLKSIZE, cl->download );
|
|
|
|
if (cl->downloadBlockSize[curindex] < 0) {
|
|
// EOF right now
|
|
cl->downloadCount = cl->downloadSize;
|
|
break;
|
|
}
|
|
|
|
cl->downloadCount += cl->downloadBlockSize[curindex];
|
|
|
|
// Load in next block
|
|
cl->downloadCurrentBlock++;
|
|
}
|
|
|
|
// Check to see if we have eof condition and add the EOF block
|
|
if (cl->downloadCount == cl->downloadSize &&
|
|
!cl->downloadEOF &&
|
|
cl->downloadCurrentBlock - cl->downloadClientBlock < MAX_DOWNLOAD_WINDOW) {
|
|
|
|
cl->downloadBlockSize[cl->downloadCurrentBlock % MAX_DOWNLOAD_WINDOW] = 0;
|
|
cl->downloadCurrentBlock++;
|
|
|
|
cl->downloadEOF = qtrue; // We have added the EOF block
|
|
}
|
|
|
|
if (cl->downloadClientBlock == cl->downloadCurrentBlock)
|
|
return 0; // Nothing to transmit
|
|
|
|
// Write out the next section of the file, if we have already reached our window,
|
|
// automatically start retransmitting
|
|
if (cl->downloadXmitBlock == cl->downloadCurrentBlock)
|
|
{
|
|
// We have transmitted the complete window, should we start resending?
|
|
if (svs.time - cl->downloadSendTime > 1000)
|
|
cl->downloadXmitBlock = cl->downloadClientBlock;
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
// Send current block
|
|
curindex = (cl->downloadXmitBlock % MAX_DOWNLOAD_WINDOW);
|
|
|
|
MSG_Init( &msg, msgBuffer, sizeof( msgBuffer ) - 8 );
|
|
MSG_WriteLong( &msg, cl->lastClientCommand );
|
|
|
|
MSG_WriteByte( &msg, svc_download );
|
|
MSG_WriteShort( &msg, cl->downloadXmitBlock );
|
|
|
|
// block zero is special, contains file size
|
|
if ( cl->downloadXmitBlock == 0 )
|
|
MSG_WriteLong( &msg, cl->downloadSize );
|
|
|
|
MSG_WriteShort( &msg, cl->downloadBlockSize[curindex] );
|
|
|
|
// Write the block
|
|
if ( cl->downloadBlockSize[curindex] > 0 )
|
|
MSG_WriteData( &msg, cl->downloadBlocks[curindex], cl->downloadBlockSize[curindex] );
|
|
|
|
MSG_WriteByte( &msg, svc_EOF );
|
|
SV_Netchan_Transmit( cl, &msg );
|
|
|
|
Com_DPrintf( "clientDownload: %d : writing block %d\n", (int) (cl - svs.clients), cl->downloadXmitBlock );
|
|
|
|
// Move on to the next block
|
|
// It will get sent with next snap shot. The rate will keep us in line.
|
|
cl->downloadXmitBlock++;
|
|
cl->downloadSendTime = svs.time;
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_SendQueuedMessages
|
|
|
|
Send one round of fragments, or queued messages to all clients that have data pending.
|
|
Return the shortest time interval for sending next packet to client
|
|
==================
|
|
*/
|
|
int SV_SendQueuedMessages( void )
|
|
{
|
|
int i, retval = -1, nextFragT;
|
|
client_t *cl;
|
|
|
|
for( i = 0; i < sv_maxclients->integer; i++ )
|
|
{
|
|
cl = &svs.clients[i];
|
|
|
|
if ( cl->state )
|
|
{
|
|
nextFragT = SV_RateMsec(cl);
|
|
|
|
if(!nextFragT)
|
|
nextFragT = SV_Netchan_TransmitNextFragment(cl);
|
|
|
|
if(nextFragT >= 0 && (retval == -1 || retval > nextFragT))
|
|
retval = nextFragT;
|
|
}
|
|
}
|
|
|
|
return retval;
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_SendDownloadMessages
|
|
|
|
Send one round of download messages to all clients
|
|
==================
|
|
*/
|
|
int SV_SendDownloadMessages( void )
|
|
{
|
|
int i, numDLs = 0;
|
|
client_t *cl;
|
|
|
|
for( i = 0; i < sv_maxclients->integer; i++ )
|
|
{
|
|
cl = &svs.clients[ i ];
|
|
if ( cl->state >= CS_CONNECTED && *cl->downloadName )
|
|
{
|
|
numDLs += SV_WriteDownloadToClient( cl );
|
|
}
|
|
}
|
|
|
|
return numDLs;
|
|
}
|
|
|
|
|
|
/*
|
|
=================
|
|
SV_Disconnect_f
|
|
|
|
The client is going to disconnect, so remove the connection immediately FIXME: move to game?
|
|
=================
|
|
*/
|
|
static void SV_Disconnect_f( client_t *cl ) {
|
|
SV_DropClient( cl, "disconnected" );
|
|
}
|
|
|
|
|
|
/*
|
|
=================
|
|
SV_VerifyPaks_f
|
|
|
|
If we are pure, disconnect the client if they do no meet the following conditions:
|
|
|
|
1. the first two checksums match our view of cgame and ui
|
|
2. there are no any additional checksums that we do not have
|
|
|
|
This routine would be a bit simpler with a goto but i abstained
|
|
|
|
=================
|
|
*/
|
|
static void SV_VerifyPaks_f( client_t *cl ) {
|
|
int nChkSum1, nChkSum2, nClientPaks, i, j, nCurArg;
|
|
int nClientChkSum[512];
|
|
const char *pArg;
|
|
qboolean bGood = qtrue;
|
|
|
|
// if we are pure, we "expect" the client to load certain things from
|
|
// certain pk3 files, namely we want the client to have loaded the
|
|
// ui and cgame that we think should be loaded based on the pure setting
|
|
//
|
|
if ( sv_pure->integer != 0 ) {
|
|
|
|
nChkSum1 = nChkSum2 = 0;
|
|
|
|
// we run the game, so determine which cgame and ui the client "should" be running
|
|
bGood = FS_FileIsInPAK( "vm/cgame.qvm", &nChkSum1, NULL );
|
|
bGood &= FS_FileIsInPAK( "vm/ui.qvm", &nChkSum2, NULL );
|
|
|
|
nClientPaks = Cmd_Argc();
|
|
|
|
if ( nClientPaks > ARRAY_LEN( nClientChkSum ) )
|
|
nClientPaks = ARRAY_LEN( nClientChkSum );
|
|
|
|
// start at arg 2 ( skip serverId cl_paks )
|
|
nCurArg = 1;
|
|
|
|
pArg = Cmd_Argv(nCurArg++);
|
|
if ( !*pArg ) {
|
|
bGood = qfalse;
|
|
}
|
|
else
|
|
{
|
|
// https://zerowing.idsoftware.com/bugzilla/show_bug.cgi?id=475
|
|
// we may get incoming cp sequences from a previous checksumFeed, which we need to ignore
|
|
// since serverId is a frame count, it always goes up
|
|
if ( atoi( pArg ) - sv.checksumFeedServerId < 0 )
|
|
{
|
|
Com_DPrintf( "ignoring outdated cp command from client %s\n", cl->name );
|
|
return;
|
|
}
|
|
}
|
|
|
|
// we basically use this while loop to avoid using 'goto' :)
|
|
while (bGood) {
|
|
|
|
// must be at least 6: "cl_paks cgame ui @ firstref ... numChecksums"
|
|
// numChecksums is encoded
|
|
if (nClientPaks < 6) {
|
|
bGood = qfalse;
|
|
break;
|
|
}
|
|
// verify first to be the cgame checksum
|
|
pArg = Cmd_Argv(nCurArg++);
|
|
if ( !*pArg || *pArg == '@' || atoi(pArg) != nChkSum1 ) {
|
|
bGood = qfalse;
|
|
break;
|
|
}
|
|
// verify the second to be the ui checksum
|
|
pArg = Cmd_Argv(nCurArg++);
|
|
if ( !*pArg || *pArg == '@' || atoi(pArg) != nChkSum2 ) {
|
|
bGood = qfalse;
|
|
break;
|
|
}
|
|
// should be sitting at the delimeter now
|
|
pArg = Cmd_Argv(nCurArg++);
|
|
if (*pArg != '@') {
|
|
bGood = qfalse;
|
|
break;
|
|
}
|
|
// store checksums since tokenization is not re-entrant
|
|
for (i = 0; nCurArg < nClientPaks; i++) {
|
|
nClientChkSum[i] = atoi(Cmd_Argv(nCurArg++));
|
|
}
|
|
|
|
// store number to compare against (minus one cause the last is the number of checksums)
|
|
nClientPaks = i - 1;
|
|
|
|
// make sure none of the client check sums are the same
|
|
// so the client can't send 5 the same checksums
|
|
for (i = 0; i < nClientPaks; i++) {
|
|
for (j = 0; j < nClientPaks; j++) {
|
|
if (i == j)
|
|
continue;
|
|
if (nClientChkSum[i] == nClientChkSum[j]) {
|
|
bGood = qfalse;
|
|
break;
|
|
}
|
|
}
|
|
if (bGood == qfalse)
|
|
break;
|
|
}
|
|
if (bGood == qfalse)
|
|
break;
|
|
|
|
// check if the client has provided any pure checksums of pk3 files not loaded by the server
|
|
for ( i = 0; i < nClientPaks; i++ ) {
|
|
if ( !FS_IsPureChecksum( nClientChkSum[i] ) ) {
|
|
bGood = qfalse;
|
|
break;
|
|
}
|
|
}
|
|
if ( bGood == qfalse ) {
|
|
break;
|
|
}
|
|
|
|
// check if the number of checksums was correct
|
|
nChkSum1 = sv.checksumFeed;
|
|
for (i = 0; i < nClientPaks; i++) {
|
|
nChkSum1 ^= nClientChkSum[i];
|
|
}
|
|
nChkSum1 ^= nClientPaks;
|
|
if (nChkSum1 != nClientChkSum[nClientPaks]) {
|
|
bGood = qfalse;
|
|
break;
|
|
}
|
|
|
|
// break out
|
|
break;
|
|
}
|
|
|
|
cl->gotCP = qtrue;
|
|
|
|
if ( bGood ) {
|
|
cl->pureAuthentic = qtrue;
|
|
} else {
|
|
cl->pureAuthentic = qfalse;
|
|
cl->lastSnapshotTime = svs.time - 9999; // generate a snapshot immediately
|
|
cl->state = CS_ZOMBIE; // skip delta generation
|
|
SV_SendClientSnapshot( cl );
|
|
cl->state = CS_ACTIVE;
|
|
SV_DropClient( cl, "Unpure client detected. Invalid .PK3 files referenced!" );
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
=================
|
|
SV_ResetPureClient_f
|
|
=================
|
|
*/
|
|
static void SV_ResetPureClient_f( client_t *cl ) {
|
|
cl->pureAuthentic = qfalse;
|
|
cl->gotCP = qfalse;
|
|
}
|
|
|
|
|
|
/*
|
|
=================
|
|
SV_UserinfoChanged
|
|
|
|
Pull specific info from a newly changed userinfo string
|
|
into a more C friendly form.
|
|
=================
|
|
*/
|
|
void SV_UserinfoChanged( client_t *cl, qboolean updateUserinfo, qboolean runFilter ) {
|
|
char buf[ MAX_NAME_LENGTH ];
|
|
const char *val;
|
|
const char *ip;
|
|
int i;
|
|
|
|
if ( cl->netchan.remoteAddress.type == NA_BOT ) {
|
|
cl->lastSnapshotTime = svs.time - 9999; // generate a snapshot immediately
|
|
cl->snapshotMsec = 1000 / sv_fps->integer;
|
|
cl->rate = 0;
|
|
return;
|
|
}
|
|
|
|
// rate command
|
|
|
|
// if the client is on the same subnet as the server and we aren't running an
|
|
// internet public server, assume they don't need a rate choke
|
|
if ( cl->netchan.remoteAddress.type == NA_LOOPBACK || ( cl->netchan.isLANAddress && com_dedicated->integer != 2 && sv_lanForceRate->integer ) ) {
|
|
cl->rate = 0; // lans should not rate limit
|
|
} else {
|
|
val = Info_ValueForKey( cl->userinfo, "rate" );
|
|
if ( val[0] )
|
|
cl->rate = atoi( val );
|
|
else
|
|
cl->rate = 10000; // was 3000
|
|
|
|
if ( sv_maxRate->integer ) {
|
|
if ( cl->rate > sv_maxRate->integer )
|
|
cl->rate = sv_maxRate->integer;
|
|
}
|
|
|
|
if ( sv_minRate->integer ) {
|
|
if ( cl->rate < sv_minRate->integer )
|
|
cl->rate = sv_minRate->integer;
|
|
}
|
|
}
|
|
|
|
// snaps command
|
|
val = Info_ValueForKey( cl->userinfo, "snaps" );
|
|
if ( val[0] && !NET_IsLocalAddress( &cl->netchan.remoteAddress ) )
|
|
i = atoi( val );
|
|
else
|
|
i = sv_fps->integer; // sync with server
|
|
|
|
// range check
|
|
if ( i < 1 )
|
|
i = 1;
|
|
else if ( i > sv_fps->integer )
|
|
i = sv_fps->integer;
|
|
|
|
i = 1000 / i; // from FPS to milliseconds
|
|
|
|
if ( i != cl->snapshotMsec )
|
|
{
|
|
// Reset last sent snapshot so we avoid desync between server frame time and snapshot send time
|
|
cl->lastSnapshotTime = svs.time - 9999; // generate a snapshot immediately
|
|
cl->snapshotMsec = i;
|
|
}
|
|
|
|
if ( !updateUserinfo )
|
|
return;
|
|
|
|
// name for C code
|
|
val = Info_ValueForKey( cl->userinfo, "name" );
|
|
// truncate if it is too long as it may cause memory corruption in OSP mod
|
|
if ( gvm->forceDataMask && strlen( val ) >= sizeof( buf ) ) {
|
|
Q_strncpyz( buf, val, sizeof( buf ) );
|
|
Info_SetValueForKey( cl->userinfo, "name", buf );
|
|
val = buf;
|
|
}
|
|
Q_strncpyz( cl->name, val, sizeof( cl->name ) );
|
|
|
|
val = Info_ValueForKey( cl->userinfo, "handicap" );
|
|
if ( val[0] ) {
|
|
i = atoi( val );
|
|
if ( i <= 0 || i > 100 || strlen( val ) > 4 ) {
|
|
Info_SetValueForKey( cl->userinfo, "handicap", "100" );
|
|
}
|
|
}
|
|
|
|
// TTimo
|
|
// maintain the IP information
|
|
// the banning code relies on this being consistently present
|
|
if ( NET_IsLocalAddress( &cl->netchan.remoteAddress ) )
|
|
ip = "localhost";
|
|
else
|
|
ip = NET_AdrToString( &cl->netchan.remoteAddress );
|
|
|
|
if ( !Info_SetValueForKey( cl->userinfo, "ip", ip ) )
|
|
SV_DropClient( cl, "userinfo string length exceeded" );
|
|
|
|
Info_SetValueForKey( cl->userinfo, "tld", cl->tld );
|
|
|
|
if ( runFilter )
|
|
{
|
|
val = SV_RunFilters( cl->userinfo, &cl->netchan.remoteAddress );
|
|
if ( *val != '\0' )
|
|
{
|
|
SV_DropClient( cl, val );
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_UpdateUserinfo_f
|
|
==================
|
|
*/
|
|
static void SV_UpdateUserinfo_f( client_t *cl ) {
|
|
const char *info;
|
|
|
|
info = Cmd_Argv( 1 );
|
|
|
|
if ( Cmd_Argc() != 2 || *info == '\0' ) {
|
|
// this is something erroneous, client should never send that
|
|
return;
|
|
}
|
|
|
|
Q_strncpyz( cl->userinfo, info, sizeof( cl->userinfo ) );
|
|
|
|
SV_UserinfoChanged( cl, qtrue, qtrue ); // update userinfo, run filter
|
|
// call prog code to allow overrides
|
|
VM_Call( gvm, 1, GAME_CLIENT_USERINFO_CHANGED, cl - svs.clients );
|
|
}
|
|
|
|
extern int SV_Strlen( const char *str );
|
|
|
|
/*
|
|
==================
|
|
SV_PrintLocations_f
|
|
==================
|
|
*/
|
|
void SV_PrintLocations_f( client_t *client ) {
|
|
int i, len;
|
|
client_t *cl;
|
|
int max_namelength;
|
|
int max_ctrylength;
|
|
char line[128];
|
|
char buf[1400-4-8], *s;
|
|
char filln[MAX_NAME_LENGTH];
|
|
char fillc[64];
|
|
|
|
if ( !svs.clients )
|
|
return;
|
|
|
|
max_namelength = 4; // strlen( "name" )
|
|
max_ctrylength = 7; // strlen( "country" )
|
|
|
|
// first pass: save and determine max.lengths of name/address fields
|
|
for ( i = 0, cl = svs.clients ; i < sv_maxclients->integer ; i++, cl++ )
|
|
{
|
|
if ( cl->state == CS_FREE )
|
|
continue;
|
|
|
|
len = SV_Strlen( cl->name );// name length without color sequences
|
|
if ( len > max_namelength )
|
|
max_namelength = len;
|
|
|
|
len = strlen( cl->country );
|
|
if ( len > max_ctrylength )
|
|
max_ctrylength = len;
|
|
}
|
|
|
|
s = buf; *s = '\0';
|
|
memset( filln, '-', max_namelength ); filln[max_namelength] = '\0';
|
|
memset( fillc, '-', max_ctrylength ); fillc[max_ctrylength] = '\0';
|
|
// Start this on a new line to be viewed properly in console
|
|
s = Q_stradd( s, "\n" );
|
|
Com_sprintf( line, sizeof( line ), "ID %-*s CC Country\n", max_namelength, "Name" );
|
|
s = Q_stradd( s, line );
|
|
Com_sprintf( line, sizeof( line ), "-- %s -- %s\n", filln, fillc );
|
|
s = Q_stradd( s, line );
|
|
|
|
for ( i = 0, cl = svs.clients ; i < sv_maxclients->integer ; i++, cl++ )
|
|
{
|
|
if ( cl->state == CS_FREE )
|
|
continue;
|
|
|
|
len = Com_sprintf( line, sizeof( line ), "%2i %s%-*s" S_COLOR_WHITE " %2s %s\n",
|
|
i, cl->name, max_namelength-SV_Strlen(cl->name), "", cl->tld, cl->country );
|
|
|
|
if ( s - buf + len >= sizeof( buf )-1 ) // flush accumulated buffer
|
|
{
|
|
if ( client )
|
|
NET_OutOfBandPrint( NS_SERVER, &client->netchan.remoteAddress, "print\n%s", buf );
|
|
else
|
|
Com_Printf( "%s", buf );
|
|
|
|
s = buf; *s = '\0';
|
|
}
|
|
|
|
s = Q_stradd( s, line );
|
|
}
|
|
|
|
if ( buf[0] )
|
|
{
|
|
if ( client )
|
|
NET_OutOfBandPrint( NS_SERVER, &client->netchan.remoteAddress, "print\n%s", buf );
|
|
else
|
|
Com_Printf( "%s", buf );
|
|
}
|
|
}
|
|
|
|
|
|
typedef struct {
|
|
const char *name;
|
|
void (*func)( client_t *cl );
|
|
} ucmd_t;
|
|
|
|
static const ucmd_t ucmds[] = {
|
|
{"userinfo", SV_UpdateUserinfo_f},
|
|
{"disconnect", SV_Disconnect_f},
|
|
{"cp", SV_VerifyPaks_f},
|
|
{"vdr", SV_ResetPureClient_f},
|
|
{"download", SV_BeginDownload_f},
|
|
{"nextdl", SV_NextDownload_f},
|
|
{"stopdl", SV_StopDownload_f},
|
|
{"donedl", SV_DoneDownload_f},
|
|
{"locations", SV_PrintLocations_f},
|
|
|
|
{NULL, NULL}
|
|
};
|
|
|
|
|
|
/*
|
|
================
|
|
SV_FloodProtect
|
|
================
|
|
*/
|
|
static qboolean SV_FloodProtect( client_t *cl ) {
|
|
if ( sv_floodProtect->integer ) {
|
|
return SVC_RateLimit( &cl->cmd_rate, 8, 500 );
|
|
} else {
|
|
return qfalse;
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_ExecuteClientCommand
|
|
|
|
Also called by bot code
|
|
==================
|
|
*/
|
|
qboolean SV_ExecuteClientCommand( client_t *cl, const char *s ) {
|
|
const ucmd_t *ucmd;
|
|
qboolean bFloodProtect;
|
|
|
|
Cmd_TokenizeString( s );
|
|
|
|
// malicious users may try using too many string commands
|
|
// to lag other players. If we decide that we want to stall
|
|
// the command, we will stop processing the rest of the packet,
|
|
// including the usercmd. This causes flooders to lag themselves
|
|
// but not other people
|
|
|
|
// We don't do this when the client hasn't been active yet since it's
|
|
// normal to spam a lot of commands when downloading
|
|
bFloodProtect = cl->netchan.remoteAddress.type != NA_BOT && cl->state >= CS_ACTIVE;
|
|
|
|
// see if it is a server level command
|
|
for ( ucmd = ucmds; ucmd->name; ucmd++ ) {
|
|
if ( !strcmp( Cmd_Argv(0), ucmd->name ) ) {
|
|
if ( ucmd->func == SV_UpdateUserinfo_f ) {
|
|
if ( bFloodProtect ) {
|
|
if ( SVC_RateLimit( &cl->info_rate, 5, 1000 ) ) {
|
|
return qfalse; // lag flooder
|
|
}
|
|
}
|
|
} else if ( ucmd->func == SV_PrintLocations_f && !sv_clientTLD->integer ) {
|
|
continue; // bypass this command to the gamecode
|
|
}
|
|
ucmd->func( cl );
|
|
bFloodProtect = qfalse;
|
|
break;
|
|
}
|
|
}
|
|
|
|
#ifndef DEDICATED
|
|
if ( !com_cl_running->integer && bFloodProtect && SV_FloodProtect( cl ) ) {
|
|
#else
|
|
if ( bFloodProtect && SV_FloodProtect( cl ) ) {
|
|
#endif
|
|
// ignore any other text messages from this client but let them keep playing
|
|
Com_DPrintf( "client text ignored for %s: %s\n", cl->name, Cmd_Argv(0) );
|
|
} else {
|
|
// pass unknown strings to the game
|
|
if ( !ucmd->name && sv.state == SS_GAME && cl->state >= CS_PRIMED ) {
|
|
if ( gvm->forceDataMask )
|
|
Cmd_Args_Sanitize( "\n\r;" ); // handle ';' for OSP
|
|
else
|
|
Cmd_Args_Sanitize( "\n\r" );
|
|
VM_Call( gvm, 1, GAME_CLIENT_COMMAND, cl - svs.clients );
|
|
}
|
|
}
|
|
|
|
return qtrue;
|
|
}
|
|
|
|
|
|
/*
|
|
===============
|
|
SV_ClientCommand
|
|
===============
|
|
*/
|
|
static qboolean SV_ClientCommand( client_t *cl, msg_t *msg ) {
|
|
int seq;
|
|
const char *s;
|
|
|
|
seq = MSG_ReadLong( msg );
|
|
s = MSG_ReadString( msg );
|
|
|
|
// see if we have already executed it
|
|
if ( seq - cl->lastClientCommand <= 0 ) {
|
|
return qtrue;
|
|
}
|
|
|
|
Com_DPrintf( "clientCommand: %s : %i : %s\n", cl->name, seq, s );
|
|
|
|
// drop the connection if we have somehow lost commands
|
|
if ( seq - cl->lastClientCommand > 1 ) {
|
|
Com_Printf( "Client %s lost %i clientCommands\n", cl->name, seq - cl->lastClientCommand - 1 );
|
|
SV_DropClient( cl, "Lost reliable commands" );
|
|
return qfalse;
|
|
}
|
|
|
|
if ( !SV_ExecuteClientCommand( cl, s ) ) {
|
|
return qfalse;
|
|
}
|
|
|
|
cl->lastClientCommand = seq;
|
|
Q_strncpyz( cl->lastClientCommandString, s, sizeof( cl->lastClientCommandString ) );
|
|
|
|
return qtrue; // continue procesing
|
|
}
|
|
|
|
|
|
//==================================================================================
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_ClientThink
|
|
|
|
Also called by bot code
|
|
==================
|
|
*/
|
|
void SV_ClientThink (client_t *cl, usercmd_t *cmd) {
|
|
cl->lastUsercmd = *cmd;
|
|
|
|
if ( cl->state != CS_ACTIVE ) {
|
|
return; // may have been kicked during the last usercmd
|
|
}
|
|
|
|
VM_Call( gvm, 1, GAME_CLIENT_THINK, cl - svs.clients );
|
|
}
|
|
|
|
|
|
/*
|
|
==================
|
|
SV_UserMove
|
|
|
|
The message usually contains all the movement commands
|
|
that were in the last three packets, so that the information
|
|
in dropped packets can be recovered.
|
|
|
|
On very fast clients, there may be multiple usercmd packed into
|
|
each of the backup packets.
|
|
==================
|
|
*/
|
|
static void SV_UserMove( client_t *cl, msg_t *msg, qboolean delta ) {
|
|
int i, key;
|
|
int cmdCount;
|
|
static const usercmd_t nullcmd = { 0 };
|
|
usercmd_t cmds[MAX_PACKET_USERCMDS], *cmd;
|
|
const usercmd_t *oldcmd;
|
|
|
|
if ( delta ) {
|
|
cl->deltaMessage = cl->messageAcknowledge;
|
|
} else {
|
|
cl->deltaMessage = cl->netchan.outgoingSequence - ( PACKET_BACKUP + 1 ); // force delta reset
|
|
}
|
|
|
|
cmdCount = MSG_ReadByte( msg );
|
|
|
|
if ( cmdCount < 1 ) {
|
|
Com_Printf( "cmdCount < 1\n" );
|
|
return;
|
|
}
|
|
|
|
if ( cmdCount > MAX_PACKET_USERCMDS ) {
|
|
Com_Printf( "cmdCount > MAX_PACKET_USERCMDS\n" );
|
|
return;
|
|
}
|
|
|
|
// use the checksum feed in the key
|
|
key = sv.checksumFeed;
|
|
// also use the message acknowledge
|
|
key ^= cl->messageAcknowledge;
|
|
// also use the last acknowledged server command in the key
|
|
key ^= MSG_HashKey(cl->reliableCommands[ cl->reliableAcknowledge & (MAX_RELIABLE_COMMANDS-1) ], 32);
|
|
|
|
oldcmd = &nullcmd;
|
|
for ( i = 0 ; i < cmdCount ; i++ ) {
|
|
cmd = &cmds[i];
|
|
MSG_ReadDeltaUsercmdKey( msg, key, oldcmd, cmd );
|
|
oldcmd = cmd;
|
|
}
|
|
|
|
// save time for ping calculation
|
|
if ( cl->frames[ cl->messageAcknowledge & PACKET_MASK ].messageAcked == 0 ) {
|
|
cl->frames[ cl->messageAcknowledge & PACKET_MASK ].messageAcked = Sys_Milliseconds();
|
|
}
|
|
|
|
// if this is the first usercmd we have received
|
|
// this gamestate, put the client into the world
|
|
if ( cl->state == CS_PRIMED ) {
|
|
if ( sv_pure->integer != 0 && !cl->gotCP ) {
|
|
// we didn't get a cp yet, don't assume anything and just send the gamestate all over again
|
|
if ( !SVC_RateLimit( &cl->gamestate_rate, 4, 1000 ) ) {
|
|
Com_DPrintf( "%s: didn't get cp command, resending gamestate\n", cl->name );
|
|
SV_SendClientGameState( cl );
|
|
}
|
|
return;
|
|
}
|
|
SV_ClientEnterWorld( cl, &cmds[0] );
|
|
// the moves can be processed normally
|
|
}
|
|
|
|
// a bad cp command was sent, drop the client
|
|
if ( sv_pure->integer != 0 && !cl->pureAuthentic ) {
|
|
SV_DropClient( cl, "Cannot validate pure client!" );
|
|
return;
|
|
}
|
|
|
|
if ( cl->state != CS_ACTIVE ) {
|
|
cl->deltaMessage = cl->netchan.outgoingSequence - ( PACKET_BACKUP + 1 ); // force delta reset
|
|
return;
|
|
}
|
|
|
|
// usually, the first couple commands will be duplicates
|
|
// of ones we have previously received, but the servertimes
|
|
// in the commands will cause them to be immediately discarded
|
|
for ( i = 0; i < cmdCount; i++ ) {
|
|
// if this is a cmd from before a map_restart ignore it
|
|
if ( cmds[i].serverTime - cmds[cmdCount-1].serverTime > 0 ) {
|
|
continue;
|
|
}
|
|
// extremely lagged or cmd from before a map_restart
|
|
//if ( cmds[i].serverTime > svs.time + 3000 ) {
|
|
// continue;
|
|
//}
|
|
// don't execute if this is an old cmd which is already executed
|
|
// these old cmds are included when cl_packetdup > 0
|
|
//if ( cmds[i].serverTime <= cl->lastUsercmd.serverTime ) {
|
|
if ( cmds[i].serverTime - cl->lastUsercmd.serverTime <= 0 ) {
|
|
continue;
|
|
}
|
|
SV_ClientThink( cl, &cmds[ i ] );
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
===========================================================================
|
|
|
|
USER CMD EXECUTION
|
|
|
|
===========================================================================
|
|
*/
|
|
|
|
/*
|
|
===================
|
|
SV_ExecuteClientMessage
|
|
|
|
Parse a client packet
|
|
===================
|
|
*/
|
|
void SV_ExecuteClientMessage( client_t *cl, msg_t *msg ) {
|
|
int c;
|
|
int serverId;
|
|
int reliableAcknowledge;
|
|
|
|
MSG_Bitstream( msg );
|
|
|
|
serverId = MSG_ReadLong( msg );
|
|
|
|
cl->messageAcknowledge = MSG_ReadLong( msg );
|
|
|
|
//if ( cl->messageAcknowledge < 0 ) {
|
|
if ( cl->netchan.outgoingSequence - cl->messageAcknowledge <= 0 ) {
|
|
// usually only hackers create messages like this
|
|
// it is more annoying for them to let them hanging
|
|
#ifdef _DEBUG
|
|
SV_DropClient( cl, "DEBUG: illegible client message" );
|
|
#endif
|
|
return;
|
|
}
|
|
|
|
reliableAcknowledge = MSG_ReadLong( msg );
|
|
|
|
if ( cl->reliableSequence - reliableAcknowledge < 0 ) {
|
|
#ifdef _DEBUG
|
|
SV_DropClient( cl, "DEBUG: illegible client message" );
|
|
#endif
|
|
return;
|
|
}
|
|
|
|
// NOTE: when the client message is fux0red the acknowledgement numbers
|
|
// can be out of range, this could cause the server to send thousands of server
|
|
// commands which the server thinks are not yet acknowledged in SV_UpdateServerCommandsToClient
|
|
if ( cl->reliableSequence - reliableAcknowledge > MAX_RELIABLE_COMMANDS ) {
|
|
// usually only hackers create messages like this
|
|
// it is more annoying for them to let them hanging
|
|
#ifdef _DEBUG
|
|
SV_DropClient( cl, "DEBUG: illegible client message" );
|
|
#else
|
|
Com_Printf( S_COLOR_YELLOW "WARNING: dropping %i commands from %s\n", cl->reliableSequence - cl->reliableAcknowledge, cl->name );
|
|
#endif
|
|
cl->reliableAcknowledge = cl->reliableSequence;
|
|
return;
|
|
}
|
|
|
|
cl->reliableAcknowledge = reliableAcknowledge;
|
|
|
|
cl->justConnected = qfalse;
|
|
|
|
// if this is a usercmd from a previous gamestate,
|
|
// ignore it or retransmit the current gamestate
|
|
//
|
|
// if the client was downloading, let it stay at whatever serverId and
|
|
// gamestate it was at. This allows it to keep downloading even when
|
|
// the gamestate changes. After the download is finished, we'll
|
|
// notice and send it a new game state
|
|
//
|
|
// https://zerowing.idsoftware.com/bugzilla/show_bug.cgi?id=536
|
|
// don't drop as long as previous command was a nextdl, after a dl is done, downloadName is set back to ""
|
|
// but we still need to read the next message to move to next download or send gamestate
|
|
// I don't like this hack though, it must have been working fine at some point, suspecting the fix is somewhere else
|
|
if ( serverId != sv.serverId && !*cl->downloadName && !strstr(cl->lastClientCommandString, "nextdl") ) {
|
|
// TTimo - use a comparison here to catch multiple map_restart
|
|
if ( serverId - sv.restartedServerId >= 0 && serverId - sv.serverId < 0 ) {
|
|
// they just haven't caught the \map_restart yet
|
|
Com_DPrintf( "%s: ignoring pre map_restart / outdated client message\n", cl->name );
|
|
return;
|
|
}
|
|
// if we can tell that the client has dropped the last gamestate we sent them, resend it
|
|
if ( cl->state != CS_ACTIVE && cl->messageAcknowledge - cl->gamestateMessageNum > 0 ) {
|
|
if ( !SVC_RateLimit( &cl->gamestate_rate, 4, 1000 ) ) {
|
|
if ( cl->gentity )
|
|
Com_DPrintf( "%s: dropped gamestate, resending\n", cl->name );
|
|
SV_SendClientGameState( cl );
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
|
|
// this client has acknowledged the new gamestate so it's
|
|
// safe to start sending it the real time again
|
|
if( cl->oldServerTime && serverId == sv.serverId ){
|
|
Com_DPrintf( "%s acknowledged gamestate\n", cl->name );
|
|
cl->oldServerTime = 0;
|
|
}
|
|
|
|
// read optional clientCommand strings
|
|
do {
|
|
c = MSG_ReadByte( msg );
|
|
if ( c != clc_clientCommand ) {
|
|
break;
|
|
}
|
|
if ( !SV_ClientCommand( cl, msg ) ) {
|
|
return; // we couldn't execute it because of the flood protection
|
|
}
|
|
if ( cl->state == CS_ZOMBIE ) {
|
|
return; // disconnect command
|
|
}
|
|
} while ( 1 );
|
|
|
|
// read the usercmd_t
|
|
if ( c == clc_move ) {
|
|
SV_UserMove( cl, msg, qtrue );
|
|
} else if ( c == clc_moveNoDelta ) {
|
|
SV_UserMove( cl, msg, qfalse );
|
|
} else if ( c != clc_EOF ) {
|
|
Com_Printf( "WARNING: bad command byte %i for client %i\n", c, (int) (cl - svs.clients) );
|
|
}
|
|
// if ( msg->readcount != msg->cursize ) {
|
|
// Com_Printf( "WARNING: Junk at end of packet for client %i\n", cl - svs.clients );
|
|
// }
|
|
}
|