/* * "Build Engine & Tools" Copyright (c) 1993-1997 Ken Silverman * Ken Silverman's official web site: "http://www.advsys.net/ken" * See the included license file "BUILDLIC.TXT" for license info. * This file has been modified from Ken Silverman's original release */ #include #include #include #include #include #include #include "mmulti_unstable.h" // #include #include "compat.h" #include "baselayer.h" //STL //#include //#include "buildqueue.h" // #include "platform.h" #ifdef _WIN32 #define PLATFORM_WIN32 1 #else #define PLATFORM_UNIX 1 #endif #define UDP_NETWORKING 1 #include "pragmas.h" #define MAXPLAYERS 16 #define BAKSIZ 16384 #define SIMULATEERRORS 0 #define SHOWSENDPACKETS 0 #define SHOWGETPACKETS 0 #define PRINTERRORS 0 #define updatecrc16(crc,dat) crc = (((crc<<8)&65535)^crctable[((((uint16_t)crc)>>8)&65535)^dat]) static int32_t incnt[MAXPLAYERS], outcntplc[MAXPLAYERS], outcntend[MAXPLAYERS]; static char errorgotnum[MAXPLAYERS]; static char errorfixnum[MAXPLAYERS]; static char errorresendnum[MAXPLAYERS]; #if (PRINTERRORS) static char lasterrorgotnum[MAXPLAYERS]; #endif int32_t crctable[256]; int32_t tmpmax[8]; //addfaz variable addition (you could probs think of something better) int32_t itmp = 0; //addfaz router fix STUN static uint8_t lastpacket[576]; char inlastpacket = 0; static int32_t lastpacketfrom, lastpacketleng; extern int32_t totalclock; /* MUST EXTERN 1 ANNOYING VARIABLE FROM GAME */ static int32_t timeoutcount = 60, resendagaincount = 4, lastsendtime[MAXPLAYERS]; int32_t natfree; //NatFree mode flag static int16_t bakpacketptr[MAXPLAYERS][256], bakpacketlen[MAXPLAYERS][256]; static uint16_t bakpacketbuf[BAKSIZ]; static int32_t bakpacketplc = 0; int32_t myconnectindex, numplayers; int32_t connecthead, connectpoint2[MAXPLAYERS]; char syncstate = 0; #define MAXPACKETSIZE 2048 #define PACKET_START_GAME 0x1337 enum commit_cmd_t { COMMIT_CMD_SEND = 1, COMMIT_CMD_GET = 2, COMMIT_CMD_SENDTOALL = 3, COMMIT_CMD_SENDTOALLOTHERS = 4, COMMIT_CMD_SCORE = 5, }; typedef struct gcomtype_t { int16_t command; /* 1-send, 2-get */ int16_t other; /* dest for send, set by get (-1 = no packet) */ int16_t numbytes; int16_t myconnectindex; int16_t numplayers; int16_t filler; char buffer[MAXPACKETSIZE]; } gcomtype; static gcomtype *gcom; /* // // Packet queue data structs // typedef struct packet_wrapper { unsigned long packetnumber; gcomtype packet; } PACKETWRAPPER; typedef PACKETWRAPPER packet_buffer; unsigned long currentpacketnumber[MAXPLAYERS]; // // Packet Buffer // packet_buffer pBuff[256]; */ /* typedef struct { char buffer[MAXPACKETSIZE]; }PACKET; */ //typedef std::vector PacketQueue; static struct allowed_addr_t { int32_t host; uint16_t port; } allowed_addresses[MAXPLAYERS]; /* only respond to these IPs. */ // Queue of out going packets. //PacketQueue outgoingPacketQueue; //outgoingPacketQueue.reserve(128); gcomtype *init_network_transport(int32_t argc, char **argv); void deinit_network_transport(gcomtype *gcom); //void callcommit(void); void mmulti_dosendpackets(int32_t other); void initcrc(void) { int32_t i, j, k, a; for (j=0; j<256; j++) /* Calculate CRC table */ { k = (j<<8); a = 0; for (i=7; i>=0; i--) { if (((k^a)&0x8000) > 0) a = ((a<<1)&65535) ^ 0x1021; /* 0x1021 = genpoly */ else a = ((a<<1)&65535); k = ((k<<1)&65535); } crctable[j] = (a&65535); } } int32_t getcrc(char *buffer, int32_t bufleng) { int32_t i, j; j = 0; for (i=bufleng-1; i>=0; i--) updatecrc16(j,buffer[i]); return(j&65535); } void mmulti_initmultiplayers(int32_t argc, char **argv) { int32_t i; UNREFERENCED_PARAMETER(argc); initcrc(); for (i=0; i 0; i--) { const char *arg = argv[i]; char ch = *arg; if ((ch == '-') || (ch == '/')) { if (Bstrcasecmp(arg + 1, "net") == 0) break; } } #endif if (!argc) { // initprintf("network: No configuration file specified!\n"); numplayers = 1; myconnectindex = 0; connecthead = 0; connectpoint2[0] = -1; return; } gcom = init_network_transport(argc, argv); if (gcom == NULL) { initprintf("Network transport initialization failed. Aborting...\n"); numplayers = 1; myconnectindex = 0; connecthead = 0; connectpoint2[0] = -1; return; } numplayers = gcom->numplayers; myconnectindex = gcom->myconnectindex-1; #if (SIMULATEERRORS != 0) srand(myconnectindex*24572457+345356); #endif connecthead = 0; for (i=0; i lasterrorgotnum[other]) { lasterrorgotnum[other]++; initprintf(" MeWant %ld",incnt[other]&255); } #endif if (outcntplc[other]+1 == outcntend[other]) { /* Send 1 sub-packet */ k = 0; gcom->buffer[k++] = (outcntplc[other]&255); gcom->buffer[k++] = (errorgotnum[other]&7)+((errorresendnum[other]&7)<<3); gcom->buffer[k++] = (incnt[other]&255); j = bakpacketptr[other][outcntplc[other]&255]; messleng = bakpacketlen[other][outcntplc[other]&255]; for (i=0; ibuffer[k++] = bakpacketbuf[(i+j)&(BAKSIZ-1)]; outcntplc[other]++; } else { /* Send 2 sub-packets */ k = 0; gcom->buffer[k++] = (outcntplc[other]&255); gcom->buffer[k++] = (errorgotnum[other]&7)+((errorresendnum[other]&7)<<3)+128; gcom->buffer[k++] = (incnt[other]&255); /* First half-packet */ j = bakpacketptr[other][outcntplc[other]&255]; messleng = bakpacketlen[other][outcntplc[other]&255]; gcom->buffer[k++] = (uint8_t)(messleng&255); gcom->buffer[k++] = (uint8_t)(messleng>>8); for (i=0; ibuffer[k++] = bakpacketbuf[(i+j)&(BAKSIZ-1)]; outcntplc[other]++; /* Second half-packet */ j = bakpacketptr[other][outcntplc[other]&255]; messleng = bakpacketlen[other][outcntplc[other]&255]; for (i=0; ibuffer[k++] = bakpacketbuf[(i+j)&(BAKSIZ-1)]; outcntplc[other]++; } dacrc = getcrc(gcom->buffer,(int16_t)k); gcom->buffer[k++] = (dacrc&255); gcom->buffer[k++] = (dacrc>>8); gcom->other = other+1; gcom->numbytes = k; #if (SHOWSENDPACKETS) initprintf("Send(%ld): ",gcom->other); for (i=0; inumbytes; i++) initprintf("%2x ",gcom->buffer[i]); initprintf("\n"); #endif #if (SIMULATEERRORS != 0) if (!(rand()&SIMULATEERRORS)) gcom->buffer[rand()%gcom->numbytes] = (rand()&255); if (rand()&SIMULATEERRORS) #endif { gcom->command = COMMIT_CMD_SEND; callcommit(); } } void mmulti_sendpacket(int32_t other, char *bufptr, int32_t messleng) { int32_t i = 0; int32_t j = 0; if (numplayers < 2) return; i = 0; if (bakpacketlen[other][(outcntend[other]-1)&255] == messleng) { j = bakpacketptr[other][(outcntend[other]-1)&255]; for (i=messleng-1; i>=0; i--) if (bakpacketbuf[(i+j)&(BAKSIZ-1)] != bufptr[i]) break; } bakpacketlen[other][outcntend[other]&255] = messleng; if (i < 0) /* Point to last packet to save space on bakpacketbuf */ bakpacketptr[other][outcntend[other]&255] = j; else { bakpacketptr[other][outcntend[other]&255] = bakpacketplc; for (i=0; i=0; i=connectpoint2[i]) { if (i != myconnectindex) mmulti_sendpacket(i,tempbuf,2L); if ((udpmode == udpmode_client) && (myconnectindex != connecthead)) break; //slaves in M/S mode only send to master } } int32_t mmulti_getoutputcirclesize(void) { return(0); } int32_t mmulti_getpacket(int32_t *other, char *bufptr) { int32_t i, messleng; uint16_t dacrc; if (numplayers < 2 || gcom == NULL) return(0); for (i=connecthead; i>=0; i=connectpoint2[i]) { if (i != myconnectindex) { // FIXME: this is probably not so great if (udpmode != udpmode_peer) mmulti_dosendpackets(i); if (totalclock < lastsendtime[i]) lastsendtime[i] = totalclock; if (totalclock > lastsendtime[i]+timeoutcount) { #if (PRINTERRORS) initprintf(" TimeOut!"); #endif errorgotnum[i] = errorfixnum[i]+1; if ((outcntplc[i] == outcntend[i]) && (outcntplc[i] > 0)) { outcntplc[i]--; lastsendtime[i] = totalclock; } else lastsendtime[i] += resendagaincount; mmulti_dosendpackets(i); /* } */ } } if ((udpmode == udpmode_client) && (myconnectindex != connecthead)) break; //slaves in M/S mode only send to master } if (inlastpacket != 0) { /* 2ND half of good double-packet */ inlastpacket = 0; *other = lastpacketfrom; memcpy(bufptr,lastpacket,lastpacketleng); return(lastpacketleng); } gcom->command = COMMIT_CMD_GET; callcommit(); #if (SHOWGETPACKETS) if (gcom->other != -1) { initprintf(" Get(%ld): ",gcom->other); for (i=0; inumbytes; i++) initprintf("%2x ",gcom->buffer[i]); initprintf("\n"); } #endif if (gcom->other < 0) return(0); *other = gcom->other-1; messleng = gcom->numbytes; dacrc = ((uint16_t)gcom->buffer[messleng-2]); dacrc += (((uint16_t)gcom->buffer[messleng-1])<<8); if (dacrc != getcrc(gcom->buffer,(int16_t)(messleng-2))) /* CRC check */ { #if (PRINTERRORS) initprintf("\n%ld CRC",gcom->buffer[0]); #endif errorgotnum[*other] = errorfixnum[*other]+1; return(0); } while ((errorfixnum[*other]&7) != ((gcom->buffer[1]>>3)&7)) errorfixnum[*other]++; if ((gcom->buffer[1]&7) != (errorresendnum[*other]&7)) { errorresendnum[*other]++; outcntplc[*other] = (outcntend[*other]&0xffffff00)+gcom->buffer[2]; if (outcntplc[*other] > outcntend[*other]) outcntplc[*other] -= 256; } if (gcom->buffer[0] != (incnt[*other]&255)) /* CNT check */ { if (((incnt[*other]-gcom->buffer[0])&255) > 32) { errorgotnum[*other] = errorfixnum[*other]+1; #if (PRINTERRORS) initprintf("\n%ld CNT",gcom->buffer[0]); #endif } #if (PRINTERRORS) else { if (!(gcom->buffer[1]&128)) /* single else double packet */ initprintf("\n%ld cnt",gcom->buffer[0]); else { if (((gcom->buffer[0]+1)&255) == (incnt[*other]&255)) { /* GOOD! Take second half of double packet */ #if (PRINTERRORS) initprintf("\n%ld-%ld .û ",gcom->buffer[0],(gcom->buffer[0]+1)&255); #endif messleng = ((int32_t)gcom->buffer[3]) + (((int32_t)gcom->buffer[4])<<8); lastpacketleng = gcom->numbytes-7-messleng; memcpy(bufptr,&gcom->buffer[messleng+5],lastpacketleng); incnt[*other]++; return(lastpacketleng); } else initprintf("\n%ld-%ld cnt ",gcom->buffer[0],(gcom->buffer[0]+1)&255); } } #endif return(0); } /* PACKET WAS GOOD! */ if ((gcom->buffer[1]&128) == 0) /* Single packet */ { #if (PRINTERRORS) initprintf("\n%ld û ",gcom->buffer[0]); #endif messleng = gcom->numbytes-5; memcpy(bufptr,&gcom->buffer[3],messleng); incnt[*other]++; return(messleng); } /* Double packet */ #if (PRINTERRORS) initprintf("\n%ld-%ld ûû ",gcom->buffer[0],(gcom->buffer[0]+1)&255); #endif messleng = ((int32_t)gcom->buffer[3]) + (((int32_t)gcom->buffer[4])<<8); lastpacketleng = gcom->numbytes-7-messleng; inlastpacket = 1; lastpacketfrom = *other; memcpy(bufptr,&gcom->buffer[5],messleng); memcpy(lastpacket,&gcom->buffer[messleng+5],lastpacketleng); incnt[*other] += 2; return(messleng); } void mmulti_flushpackets() { #if 1 int32_t i; if (numplayers < 2) return; do { gcom->command = COMMIT_CMD_GET; callcommit(); } while (gcom->other >= 0); for (i=connecthead; i>=0; i=connectpoint2[i]) { incnt[i] = 0L; outcntplc[i] = 0L; outcntend[i] = 0L; errorgotnum[i] = 0; errorfixnum[i] = 0; errorresendnum[i] = 0; lastsendtime[i] = totalclock; } #endif } void mmulti_generic(int32_t other, char *bufptr, int32_t messleng, int32_t command) { if (numplayers < 2) return; gcom->command = command; gcom->numbytes = min(messleng,MAXPACKETSIZE); copybuf(bufptr,gcom->buffer,(gcom->numbytes+3)>>2); gcom->other = other+1; callcommit(); } #if PLATFORM_WIN32 # include # define EWOULDBLOCK WSAEWOULDBLOCK # define ECONNREFUSED WSAECONNRESET # define socklen_t size_t # define netstrerror() win32netstrerror() # define neterrno() WSAGetLastError() # define sockettype SOCKET # define socketclose(x) closesocket(x) #else # include # include # include # include # include # include # include # include # include # include # include # define netstrerror() strerror(errno) # define neterrno() errno # define sockettype int32_t # define socketclose(x) close(x) # ifndef MSG_ERRQUEUE /* legacy glibc header workaround... */ # define MSG_ERRQUEUE 0x2000 # endif #endif #define SOCKET_SHUTDOWN_BOTH 2 #include "cache1d.h" /* kopen4load for cfg file. */ #define IPSEG1(ip) ((((uint32_t) ip) & 0xFF000000) >> 24) #define IPSEG2(ip) ((((uint32_t) ip) & 0x00FF0000) >> 16) #define IPSEG3(ip) ((((uint32_t) ip) & 0x0000FF00) >> 8) #define IPSEG4(ip) ((((uint32_t) ip) & 0x000000FF) ) #define BUILD_DEFAULT_UDP_PORT 23513 /* eh...why not? */ #define CLIENT_POLL_DELAY 5000 /* ms between pings at peer-to-peer startup. */ #define HEADER_PEER_GREETING 245 static sockettype udpsocket = -1; static uint16_t udpport = BUILD_DEFAULT_UDP_PORT; #if PLATFORM_WIN32 /* * Figure out what the last failing Win32 API call was, and * generate a human-readable string for the error message. * * The return value is a static buffer that is overwritten with * each call to this function. * * Code lifted from PhysicsFS: http://icculus.org/physfs/ */ static const char *win32netstrerror(void) { static TCHAR msgbuf[255]; TCHAR *ptr = msgbuf; FormatMessage( FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS, NULL, WSAGetLastError(), /*GetLastError(),*/ MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), /* Default language */ msgbuf, sizeof(msgbuf) / sizeof(TCHAR), NULL ); /* chop off newlines. */ for (ptr = msgbuf; *ptr; ptr++) { if ((*ptr == '\n') || (*ptr == '\r')) { *ptr = ' '; break; } /* if */ } /* for */ return((const char *) msgbuf); } /* win32strerror */ #endif static char *static_ipstring(int32_t ip) { static char s[16]; Bsprintf(s, "%u.%u.%u.%u", IPSEG1(ip), IPSEG2(ip), IPSEG3(ip), IPSEG4(ip)); return(s); } static int32_t send_udp_packet(int32_t ip, uint16_t port, void *pkt, size_t pktsize) { /* !!! FIXME: See if this would ever block. */ /* !!! FIXME: See if this would send a partial packet. */ struct sockaddr_in addr; int32_t rc; addr.sin_family = AF_INET; addr.sin_addr.s_addr = htonl(ip); addr.sin_port = htons(port); rc = sendto(udpsocket, pkt, pktsize, 0, (struct sockaddr *) &addr, sizeof(addr)); if (rc != (int32_t) pktsize) { initprintf("sendto err rc==%d when sending %d to %s:%d [%s].\n", rc, (int32_t) pktsize, static_ipstring(ip), (int32_t) port, netstrerror()); return(0); } /*initprintf("Sent %d byte packet to %s:%d\n", (int32_t) pktsize, static_ipstring(ip), (int32_t) port);*/ return(1); } static void process_udp_send_queue(void) { /* Fill this in if the non-blocking socket becomes an issue. */ } static int32_t get_udp_packet(int32_t *ip, uint16_t *_port, void *pkt, size_t pktsize) { int32_t err = 0; struct sockaddr_in addr; uint16_t port; socklen_t fromlen = sizeof(addr); int32_t valid = 0; int32_t i; /* FIXME: Will this ever receive a partial packet? */ int32_t rc = recvfrom(udpsocket, pkt, pktsize, 0, (struct sockaddr *) &addr, #ifdef _WIN32 (int32_t *)&fromlen); #else (uint32_t *)&fromlen); #endif if (rc == -1) err = neterrno(); #if !PLATFORM_WIN32 /* !!! FIXME: Linux specific? */ if (rc == -1) /* fill in the addr structure on error... */ { socklen_t l = sizeof(addr); recvfrom(udpsocket, NULL, 0, MSG_ERRQUEUE, (struct sockaddr *) &addr, &l); } #endif *ip = ntohl(addr.sin_addr.s_addr); port = ntohs(addr.sin_port); if (_port) *_port = port; /* * Reject packets from unallowed IPs. Prevents (ha) DoS attacks and * other confusion... */ if (gcom == NULL) { if (natfree) //if stun is enabled { if ((allowed_addresses[itmp].host == *ip) && (allowed_addresses[itmp].port == port)) { valid = 1; //only accept packets from the current player (itmp) and no one else } else { return 0; //reject packets from other players } } else { valid = 1; } } else { for (i = 1; i <= gcom->numplayers; i++) { if ((allowed_addresses[i].host == *ip) && (allowed_addresses[i].port == port)) { valid = i; //initprintf ("Packet received from %s:%d\n",static_ipstring(*ip), (int32_t) port); break; } } } /*if (!valid) { static int32_t unallowed_ip_spam = 0; if (unallowed_ip_spam <= 100) { initprintf("Packet received from unallowed IP %s:%d\n", static_ipstring(*ip), (int32_t) port); if (unallowed_ip_spam == 100) initprintf("(Disabling further unallowed IP spam.)\n"); unallowed_ip_spam++; } return(0); } */ if (rc == -1) { if ((err == EAGAIN) || (err == EWOULDBLOCK)) rc = 0; else if (err == ECONNREFUSED) //"connection reset by peer" in winsock { // This means that we sent a packet to an unopened port, and // it responded by telling us to piss off. Take them out of the // allowed list. We check gcom so that we don't worry about this // during detection when game might still be loading elsewhere. if (gcom != NULL) { allowed_addresses[valid].host = 0; initprintf("%s:%d refused packets. Removed from game.\n", static_ipstring(*ip), (int32_t) port); } // !!! FIXME: Actually boot player, too. } else { initprintf("recvfrom err rc==%d when getting %d from %s:%d [%s].\n", rc, (int32_t) pktsize, static_ipstring(*ip), (int32_t) port, netstrerror()); } } //else initprintf("Got %d byte packet from %s:%d\n", (int32_t) rc, static_ipstring(*ip), (int32_t) port); //initprintf( "IP from client %d", *ip); return(rc); } static char *read_whole_file(const char *cfgfile) { char *buf; int32_t len, rc; int32_t handle; if (cfgfile == NULL) return(NULL); handle = kopen4load((char *)cfgfile, 0); if (handle == -1) { // initprintf("ERROR: Failed to open config file [%s].\n", cfgfile); return(NULL); } len = kfilelength(handle); buf = (char *) malloc(len + 2); if (!buf) { kclose(handle); return(NULL); } rc = kread(handle, buf, len); kclose(handle); if (rc != len) { free(buf); return(NULL); } buf[len] = '\0'; buf[len+1] = '\0'; return(buf); } static char *get_token(char **ptr) { char *retval; char *p = *ptr; if (*p == '\0') return(NULL); while ((*p != '\0') && (isspace(*p))) p++; if (*p == '\0') /* nothing but whitespace. */ return(NULL); retval = p; while ((*p != '\0') && (!isspace(*p))) p++; *p = '\0'; *ptr = p + 1; /*initprintf("Got token [%s].\n", retval);*/ return(retval); } static int32_t set_socket_blockmode(int32_t onOrOff) { uint32_t flags; int32_t rc = 0; /* set socket to be (non-)blocking. */ #if PLATFORM_WIN32 flags = (onOrOff) ? 0 : 1; rc = (ioctlsocket(udpsocket, FIONBIO, (void *) &flags) == 0); #else flags = fcntl(udpsocket, F_GETFL, 0); if ((signed)flags != -1) { if (onOrOff) flags &= ~O_NONBLOCK; else flags |= O_NONBLOCK; rc = (fcntl(udpsocket, F_SETFL, flags) == 0); } #endif if (!rc) { initprintf("set socket %sblocking failed: %s\n", ((onOrOff) ? "" : "non-"), netstrerror()); } return(rc); } static int32_t set_socket_broadcast(int32_t onOrOff) { int32_t f = (onOrOff) ? 1 : 0; int32_t rc; /* give socket clearance to broadcast. */ rc = setsockopt(udpsocket, SOL_SOCKET, SO_BROADCAST, (char *)(&f), sizeof(f)) == 0; if (!rc) { initprintf("%sset SO_BROADCAST failed: %s\n", ((onOrOff) ? "" : "un"), netstrerror()); } return(rc); } static int32_t open_udp_socket(int32_t ip, int32_t port) { struct sockaddr_in addr; // initprintf("Setting up UDP interface %s:%d...\n", static_ipstring(ip), port); if (natfree) { //initprintf("Stun is currently %s\n", (natfree) ? "Enabled":"Disabled"); initprintf("network: Stun enabled\n"); } udpsocket = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP); if ((signed)udpsocket == -1) { initprintf("network: socket creation failed: %s\n", netstrerror()); return(0); } if (!set_socket_blockmode(0)) return(0); #if !PLATFORM_WIN32 { /* !!! FIXME: Might be Linux (not Unix, not BSD, not WinSock) specific. */ int32_t flags = 1; setsockopt(udpsocket, IPPROTO_IP, IP_RECVERR, &flags, sizeof(flags)); } #endif memset(&addr, '\0', sizeof(addr)); addr.sin_family = AF_INET; addr.sin_addr.s_addr = htonl(ip); addr.sin_port = htons((uint16_t)port); if (bind(udpsocket, (struct sockaddr *) &addr, sizeof(addr)) == -1) { initprintf("network: socket binding failed: %s\n", netstrerror()); return(0); } return(1); } typedef struct peergreeting_t { char dummy1; /* so these don't confuse game after load. */ char dummy2; /* so these don't confuse game after load. */ char dummy3; /* so these don't confuse game after load. */ char header; /* always HEADER_PEER_GREETING (245). */ uint16_t id; } PacketPeerGreeting; static void send_peer_greeting(int32_t ip, uint16_t port, int16_t myid) { PacketPeerGreeting packet; memset(&packet, '\0', sizeof(packet)); packet.header = HEADER_PEER_GREETING; packet.id = B_SWAP16(myid); send_udp_packet(ip, port, &packet, sizeof(packet)); } /* server init. */ static int32_t wait_for_other_players(gcomtype *gcom, int32_t myip) { PacketPeerGreeting packet; uint16_t my_id = 1; // we're always 1 so we sort as the first player int32_t i, j; int32_t rc; int32_t ip; uint16_t port; uint16_t heard_from[MAXPLAYERS]; int32_t max; int32_t remaining; memset(heard_from, '\0', sizeof(heard_from)); remaining = max = gcom->numplayers - 1; initprintf("Waiting for %d player%s...\n", remaining, remaining==1 ? "":"s"); if (remaining == 0) { initprintf("Hmmm... don't have time to play with myself!\n"); return(0); } while (remaining && !quitevent) { handleevents(); idle(); process_udp_send_queue(); rc = get_udp_packet(&ip, &port, &packet, sizeof(packet)); //this is so we don't get unexpected packet errors from players already heard from if ((rc > 0) && (ip) && ((ip != myip) || (port != udpport))) { char *ipstr = static_ipstring(ip); if (rc != sizeof(packet)) { initprintf("network: Missized packet or fragment from %s:%i ?!\n", ipstr, port); continue; } else if (packet.header != HEADER_PEER_GREETING) { initprintf("network: Unexpected packet type from %s:%i ?!\n", ipstr, port); continue; } for (i = 0; i < max; i++) { if (!heard_from[i] || heard_from[i] == B_SWAP16(packet.id)) break; } if (i == max) initprintf("network: Disallowed player %s:%d ?!\n", ipstr, port); else if (heard_from[i] == 0) { packet.id = B_SWAP16(packet.id); heard_from[i] = packet.id; allowed_addresses[i].host = ip; /* bcast needs this. */ allowed_addresses[i].port = port; remaining--; initprintf("%s:%i (id 0x%X) connected, %d player%s left.\n", ipstr, (unsigned)port ,(int32_t) packet.id, remaining, remaining == 1 ? "" : "s"); /* make sure they've heard from us at all... */ /* !!! FIXME: Could be fatal if packet is dropped... */ send_peer_greeting(allowed_addresses[i].host, allowed_addresses[i].port, my_id); } } } if (quitevent) { initprintf("network: Connection attempt aborted.\n"); return(0); } // found all the clients expected so relay all greetings for (j=max; j>=0; j--) if (allowed_addresses[j].host) { int32_t ii; // send another copy of our greeting just in case they missed it send_peer_greeting(allowed_addresses[j].host, allowed_addresses[j].port, my_id); for (ii = 0; ii < max; ii++) send_peer_greeting(allowed_addresses[j].host, allowed_addresses[j].port, heard_from[ii]); // greeting with 0x1337 id starts the game for clients send_peer_greeting(allowed_addresses[j].host, allowed_addresses[j].port, PACKET_START_GAME); } /* ok, now everyone is talking to you. Sort them into player numbers... */ heard_from[max] = my_id; /* so we sort, too... */ allowed_addresses[max].host = myip; allowed_addresses[max].port = udpport; do { remaining = 0; for (i = 0; i < max; i++) { if (heard_from[i] == heard_from[i+1]) /* blah. */ { initprintf("network: ERROR: Two players have the same random ID!\n"); initprintf("network: ERROR: Please restart the game to generate new IDs.\n"); return(0); } else if (heard_from[i] > heard_from[i+1]) { int32_t tmpi; int16_t tmps; tmps = heard_from[i]; heard_from[i] = heard_from[i+1]; heard_from[i+1] = tmps; tmpi = allowed_addresses[i].host; allowed_addresses[i].host = allowed_addresses[i+1].host; allowed_addresses[i+1].host = tmpi; tmps = allowed_addresses[i].port; allowed_addresses[i].port = allowed_addresses[i+1].port; allowed_addresses[i+1].port = tmps; remaining = 1; /* yay for bubble sorting! */ } } } while (remaining); /* * Now we're sorted. But, the local player is referred to by both his * player number and player index ZERO, so bump everyone up one to * their actual index and fill in local player as item zero. */ memmove(&allowed_addresses[1], &allowed_addresses[0], sizeof(allowed_addresses) - sizeof(allowed_addresses[0])); allowed_addresses[0].host = myip; gcom->myconnectindex = 0; for (i = 1; i <= gcom->numplayers; i++) { ip = (allowed_addresses[i].host); if (ip == myip) { if (udpport == allowed_addresses[i].port) gcom->myconnectindex = i; } initprintf("network: player #%i at %s:%i\n", i,static_ipstring(ip),allowed_addresses[i].port); } // assert(gcom->myconnectindex); initprintf("network: We are player #%i\n", gcom->myconnectindex); return(1); } /* client init. */ static int32_t connect_to_server(gcomtype *gcom, int32_t myip) { PacketPeerGreeting packet; uint16_t my_id = 0; int32_t i; int32_t rc; int32_t ip; uint16_t port; int32_t first_send = 1; uint16_t heard_from[MAXPLAYERS]; uint32_t resendat; int32_t max; int32_t remaining; memset(heard_from, '\0', sizeof(heard_from)); gcom->numplayers = 2; while (my_id == 0) /* player number is based on id, low to high. */ { /* struct timeval tv; gettimeofday(&tv, NULL); my_id = (unsigned short)tv.tv_usec; //HACK */ my_id = (uint16_t) rand(); } initprintf("network: Using 0x%X as client ID\n", my_id); resendat = getticks(); remaining = max = gcom->numplayers - 1; initprintf("network: Waiting for %d player%s...\n", remaining, remaining==1 ? "":"s"); if (remaining == 0) { initprintf("Hmmm... don't have time to play with myself!\n"); return(0); } while (remaining && !quitevent) { handleevents(); if (resendat <= getticks()) { for (i = 0; (i < max) || natfree ; i++) { //only checking one player at a time works //this is where special formatting of allow lines comes in if (!heard_from[i]) { initprintf("network: %s %s:%d...\n",first_send?"Connecting to":"Retrying", static_ipstring(allowed_addresses[i].host),allowed_addresses[i].port); send_peer_greeting(allowed_addresses[i].host, allowed_addresses[i].port, my_id); } } first_send = 0; resendat += CLIENT_POLL_DELAY; } idle(); process_udp_send_queue(); rc = get_udp_packet(&ip, &port, &packet, sizeof(packet)); //this is so we don't get unexpected packet errors from players already heard from if ((rc > 0) && (ip) && ((ip != myip) || (port != udpport))) { char *ipstr = static_ipstring(ip); if (rc != sizeof(packet)) { initprintf("network: Missized packet or fragment from %s:%i ?!\n", ipstr, port); continue; } else if (packet.header != HEADER_PEER_GREETING) { initprintf("network: Unexpected packet type from %s:%i ?!\n", ipstr, port); continue; } for (i=0; inumplayers++; max++; } } } } if (quitevent) { initprintf("network: Connection attempt aborted.\n"); return(0); } /* ok, now everyone is talking to you. Sort them into player numbers... */ heard_from[max] = my_id; /* so we sort, too... */ allowed_addresses[max].host = myip; allowed_addresses[max].port = udpport; do { remaining = 0; for (i = 0; i < max; i++) { if (heard_from[i] == heard_from[i+1]) /* blah. */ { initprintf("network: ERROR: Two players have the same random ID!\n"); initprintf("network: ERROR: Please restart the game to generate new IDs.\n"); return(0); } else if (heard_from[i] > heard_from[i+1]) { int32_t tmpi; int16_t tmps; tmps = heard_from[i]; heard_from[i] = heard_from[i+1]; heard_from[i+1] = tmps; tmpi = allowed_addresses[i].host; allowed_addresses[i].host = allowed_addresses[i+1].host; allowed_addresses[i+1].host = tmpi; tmps = allowed_addresses[i].port; allowed_addresses[i].port = allowed_addresses[i+1].port; allowed_addresses[i+1].port = tmps; remaining = 1; /* yay for bubble sorting! */ } } } while (remaining); /* * Now we're sorted. But, the local player is referred to by both his * player number and player index ZERO, so bump everyone up one to * their actual index and fill in local player as item zero. */ memmove(&allowed_addresses[1], &allowed_addresses[0], sizeof(allowed_addresses) - sizeof(allowed_addresses[0])); allowed_addresses[0].host = myip; gcom->myconnectindex = 0; for (i = 1; i <= gcom->numplayers; i++) { ip = (allowed_addresses[i].host); if (ip == myip) { if (udpport == allowed_addresses[i].port) gcom->myconnectindex = i; } // initprintf("network: player #%i with id %d\n",i,heard_from[i]); } // assert(gcom->myconnectindex); // initprintf("network: We are player #%i\n", gcom->myconnectindex); return(1); } /* peer to peer init. */ static int32_t connect_to_everyone(gcomtype *gcom, int32_t myip, int32_t bcast) { PacketPeerGreeting packet; uint16_t my_id = 0; int32_t i; int32_t rc; int32_t ip; uint16_t port; int32_t first_send = 1; uint16_t heard_from[MAXPLAYERS]; uint32_t resendat; int32_t max; int32_t remaining; if (bcast) { if (gcom->numplayers > 1) { initprintf("network: Error: can't do both 'broadcast' and 'allow'.\n"); return(0); } if (!set_socket_broadcast(1)) return(0); gcom->numplayers = bcast + 1; } memset(heard_from, '\0', sizeof(heard_from)); while (my_id == 0) /* player number is based on id, low to high. */ { /* struct timeval tv; gettimeofday(&tv, NULL); my_id = (unsigned short)tv.tv_usec; //HACK */ my_id = (uint16_t) rand(); } initprintf("network: Using 0x%X as client ID\n", my_id); resendat = getticks(); remaining = max = gcom->numplayers - 1; initprintf("Waiting for %d player%s...\n", remaining, remaining==1 ? "":"s"); if (remaining == 0) { initprintf("Hmmm... don't have time to play with myself!\n"); return(0); } while (remaining && !quitevent) { handleevents(); if (resendat <= getticks()) { if (bcast) { initprintf("%sroadcasting greeting...\n", first_send ? "B":"Reb"); /* !!! FIXME: This is...probably not right. */ send_peer_greeting(0xFFFFFFFF, udpport, my_id); } else { for (i = 0; (i < max) || natfree ; i++) { //only checking one player at a time works //this is where special formatting of allow lines comes in if (natfree) { i = itmp; //addfaz router fix } if (!heard_from[i]) { initprintf("network: %s %s:%d...\n",first_send?"Connecting to":"Retrying", static_ipstring(allowed_addresses[i].host),allowed_addresses[i].port); send_peer_greeting(allowed_addresses[i].host, allowed_addresses[i].port, my_id); } // If this is stun-enabled then don't loop. if (natfree) { break; } } } first_send = 0; resendat += CLIENT_POLL_DELAY; } idle(); process_udp_send_queue(); rc = get_udp_packet(&ip, &port, &packet, sizeof(packet)); //this is so we don't get unexpected packet errors from players already heard from if (natfree) { //addfaz router/stun addition *Start* //this is so we are not dealing with players already heard from. for (i = 0; i < max; i++) { if (ip == allowed_addresses[i].host && port == allowed_addresses[i].port) { if (heard_from[i] != 0) //if we've heard from player already. { rc = 0; } } } //addfaz router/stun addition *End* } if ((rc > 0) && (ip) && ((ip != myip) || (port != udpport))) { char *ipstr = static_ipstring(ip); for (i = 0; i < max; i++) { ////addfaz NAT addition *START*//// if (natfree) { if (tmpmax[i] != 1) { if (allowed_addresses[i].host == ip) { if (allowed_addresses[i].port != port) { initprintf("network: Port number for player %d changed from %d to %d.\n",i,allowed_addresses[i].port,port); /* initprintf("Different player Port Number detected. %s:%i\n",ipstr, allowed_addresses[i].port); initprintf("Changed to %s:%i, player may be behind a firewall.\n", ipstr, port); //addfaz NAT addition */ allowed_addresses[i].port = port; } } } } ////addfaz NAT addition *END*//// if ((ip == allowed_addresses[i].host) && (port == allowed_addresses[i].port)) //addfaz NAT line addition { break; } if ((bcast) && (allowed_addresses[i].host == 0)) break; /* select this slot. */ } if (i == max) initprintf("network: Disallowed player %s:%d ?!\n", ipstr, port); else if (rc != sizeof(packet)) initprintf("network: Missized packet or fragment from %s:%i ?!\n", ipstr, port); else if (packet.header != HEADER_PEER_GREETING) initprintf("network: Unexpected packet type from %s:%i ?!\n", ipstr, port); else if (heard_from[i] == 0) { packet.id = B_SWAP16(packet.id); heard_from[i] = packet.id; allowed_addresses[i].host = ip; /* bcast needs this. */ allowed_addresses[i].port = port; remaining--; initprintf("network: Connected to %s:%i (id 0x%X). %d player%s left.\n", ipstr, port ,(int32_t) packet.id, remaining, remaining == 1 ? "" : "s"); /* make sure they've heard from us at all... */ /* !!! FIXME: Could be fatal if packet is dropped... */ send_peer_greeting(allowed_addresses[i].host, allowed_addresses[i].port, my_id); if (natfree) { itmp++; //addfaz router/stun addition (goto next player) } else { tmpmax[i] = 1; //addfaz line addition } } } } if (quitevent) { initprintf("network: Connection attempt aborted.\n"); return(0); } /* ok, now everyone is talking to you. Sort them into player numbers... */ heard_from[max] = my_id; /* so we sort, too... */ allowed_addresses[max].host = myip; allowed_addresses[max].port = udpport; do { remaining = 0; for (i = 0; i < max; i++) { if (heard_from[i] == heard_from[i+1]) /* blah. */ { initprintf("network: ERROR: Two players have the same random ID!\n"); initprintf("network: ERROR: Please restart the game to generate new IDs.\n"); return(0); } else if (heard_from[i] > heard_from[i+1]) { int32_t tmpi; int16_t tmps; tmps = heard_from[i]; heard_from[i] = heard_from[i+1]; heard_from[i+1] = tmps; tmpi = allowed_addresses[i].host; allowed_addresses[i].host = allowed_addresses[i+1].host; allowed_addresses[i+1].host = tmpi; tmps = allowed_addresses[i].port; allowed_addresses[i].port = allowed_addresses[i+1].port; allowed_addresses[i+1].port = tmps; remaining = 1; /* yay for bubble sorting! */ } } } while (remaining); /* * Now we're sorted. But, the local player is referred to by both his * player number and player index ZERO, so bump everyone up one to * their actual index and fill in local player as item zero. */ memmove(&allowed_addresses[1], &allowed_addresses[0], sizeof(allowed_addresses) - sizeof(allowed_addresses[0])); allowed_addresses[0].host = myip; gcom->myconnectindex = 0; for (i = 1; i <= gcom->numplayers; i++) { ip = (allowed_addresses[i].host); if (ip == myip) { if (udpport == allowed_addresses[i].port) gcom->myconnectindex = i; } initprintf("network: player #%i at %s:%i\n", i,static_ipstring(ip),allowed_addresses[i].port); } // assert(gcom->myconnectindex); initprintf("network: We are player #%i\n", gcom->myconnectindex); /* * Ok, we should have specific IPs and ports for all players, and * therefore shouldn't broadcast anymore. Disable permission to do so, * just in case, so we aren't flooding the LAN with broadcasted packets. */ set_socket_broadcast(0); return(1); } static int32_t parse_ip(const char *str, int32_t *ip) { int32_t ip1, ip2, ip3, ip4; if (Bstrcasecmp(str, "any") == 0) { *ip = 0; return(1); } if (sscanf(str, "%d.%d.%d.%d", &ip1, &ip2, &ip3, &ip4) != 4) { initprintf("\"%s\" is not a valid IP address.\n", str); return(0); } /* we _should_ check that 0 <= ip? <= 255, but it'll fail later anyhow. */ *ip = (((ip1 & 0xFF) << 24) | ((ip2 & 0xFF) << 16) | ((ip3 & 0xFF) << 8) | ((ip4 & 0xFF))); return(1); } static int32_t parse_interface(char *str, int32_t *ip, uint16_t *udpport) { char *ptr = strchr(str, ':'); if (ptr) /* portnum specified? */ *ptr = '\0'; if (!parse_ip(str, ip)) return(0); *udpport = BUILD_DEFAULT_UDP_PORT; if (ptr != NULL) /* port specified? */ { ptr++; if (Bstrcasecmp(ptr, "any") == 0) *udpport = 0; else *udpport = (int16_t) atoi(ptr); } return(1); } static int32_t initialize_sockets(void) { #if PLATFORM_WIN32 int32_t rc; WSADATA data; // initprintf("initializing WinSock...\n"); rc = WSAStartup(0x0101, &data); if (rc != 0) { initprintf("WinSock failed to initialize! [err==%d].\n", rc); return(0); } else { /* initprintf("WinSock initialized.\n"); initprintf(" - Caller uses version %d.%d, highest supported is %d.%d.\n", data.wVersion >> 8, data.wVersion & 0xFF, data.wHighVersion >> 8, data.wHighVersion & 0xFF); initprintf(" - Implementation description: [%s].\n", data.szDescription); initprintf(" - System status: [%s].\n", data.szSystemStatus); initprintf(" - Max sockets: %d.\n", data.iMaxSockets); initprintf(" - Max UDP datagram size: %d.\n", data.iMaxUdpDg); */ } #endif return(1); } static void deinitialize_sockets(void) { #if PLATFORM_WIN32 WSACleanup(); #endif } int32_t isvalidipaddress(char *st) { int32_t i, bcnt, num; bcnt = 0; num = 0; for (i=0; st[i]; i++) { if (st[i] == '.') { bcnt++; num = 0; continue; } if (st[i] == ':') { if (bcnt != 3) return(0); num = 0; for (i++; st[i]; i++) { if ((st[i] >= '0') && (st[i] <= '9')) { num = num*10+st[i]-'0'; if (num >= 65536) return(0); } else return(0); } return(1); } if ((st[i] >= '0') && (st[i] <= '9')) { num = num*10+st[i]-'0'; if (num >= 256) return(0); } } return(bcnt == 3); } static int32_t parse_udp_config(int32_t argc, char **argv, gcomtype *gcom) { char *buf; char *tok; char *ptr; int32_t ip = 0; /* interface */ int32_t bcast = 0; buf = read_whole_file(argv[0]); /* we must free this. */ if (buf == NULL) { // do JF-style argv parsing here int32_t i, j, daindex; int32_t danetmode = 255; char *st; daindex = 0; // if (!argv) return 0; // go looking for the port, if specified for (i=0; i 1024 && j<65535) udpport = j; initprintf("network: Using port %d\n", udpport); } } for (i=0; inumplayers = 1; if (argv[i][2] == '0') { danetmode = 0; udpmode = udpmode_client; if ((argv[i][3] == ':') && (argv[i][4] >= '0') && (argv[i][4] <= '9')) { udpmode = udpmode_server; gcom->numplayers = (argv[i][4]-'0'); if ((argv[i][5] >= '0') && (argv[i][5] <= '9')) gcom->numplayers = gcom->numplayers*10+(argv[i][5]-'0'); initprintf("network: %d-player game server\n", gcom->numplayers--); } initprintf("network: Master-slave mode\n"); } else if (argv[i][2] == '1') { danetmode = 1; udpmode = udpmode_peer; myconnectindex = daindex; // daindex++; initprintf("network: Peer-to-peer mode\n"); } continue; } else if ((argv[i][1] == 'P') || (argv[i][1] == 'p')) continue; } st = strdup(argv[i]); if (!st) break; if (isvalidipaddress(st)) { // if ((danetmode == 1) && (daindex == myconnectindex)) daindex++; parse_interface(st, &allowed_addresses[daindex].host, &allowed_addresses[daindex].port); initprintf("network: Player %d at %s:%d\n",daindex,st,allowed_addresses[daindex].port); daindex++; } else { struct hostent * lph; uint16_t pt = BUILD_DEFAULT_UDP_PORT; for (j=0; st[j]; j++) if (st[j] == ':') { pt = (uint16_t)atol(&st[j+1]); st[j] = 0; break; } if ((lph = gethostbyname(st))) { // if ((danetmode == 1) && (daindex == myconnectindex)) daindex++; allowed_addresses[daindex].host = ntohl(*(int32_t *)lph->h_addr); allowed_addresses[daindex].port = pt; initprintf("network: Player %d at %s:%d (%s)\n",daindex, inet_ntoa(*(struct in_addr *)lph->h_addr),pt,argv[i]); daindex++; } else initprintf("network: Failed resolving %s\n",argv[i]); } free(st); } if ((danetmode == 255) && (daindex)) { gcom->numplayers = 2; udpmode = udpmode_client; } //an IP w/o /n# defaults to /n0 // if ((numplayers >= 2) && (daindex) && (!danetmode)) myconnectindex = 1; if (daindex > gcom->numplayers) gcom->numplayers = daindex; } else { initprintf("network: Using '%s' as configuration file\n", argv[0]); ptr = buf; while ((tok = get_token(&ptr)) != NULL) { int32_t bogus = 1; if (Bstrcasecmp(tok, "interface") == 0) { if ((tok = get_token(&ptr)) && (parse_interface(tok, &ip, &udpport))) { bogus = 0; } initprintf("network: Using interface %s:%d\n", static_ipstring(ip), (int32_t) udpport); } else if (Bstrcasecmp(tok, "mode") == 0) { if ((tok = get_token(&ptr)) != NULL) { bogus = 0; if (Bstrcasecmp(tok, "server") == 0) udpmode = udpmode_server; else if (Bstrcasecmp(tok, "client") == 0) udpmode = udpmode_client; else if (Bstrcasecmp(tok, "peer") == 0) udpmode = udpmode_peer; else bogus = 1; if (!bogus) initprintf("You want to be in [%s] mode\n", tok); } } else if (Bstrcasecmp(tok, "broadcast") == 0) { if ((tok = get_token(&ptr)) != NULL) { bcast = atoi(tok); if (bcast > MAXPLAYERS - 1) { initprintf("WARNING: Too many broadcast players.\n"); bcast = MAXPLAYERS - 1; } bogus = 0; } } else if (Bstrcasecmp(tok, "allow") == 0) { int32_t host; uint16_t port=BUILD_DEFAULT_UDP_PORT; if ((tok = get_token(&ptr)) != NULL) { if (gcom->numplayers >= MAXPLAYERS - 1) initprintf("WARNING: Too many allowed IP addresses.\n"); else if (parse_interface(tok, &host, &port)) { allowed_addresses[gcom->numplayers].host = host; allowed_addresses[gcom->numplayers].port = port; gcom->numplayers++; bogus = 0; } } } else if (Bstrcasecmp(tok, "players") == 0) { if ((tok = get_token(&ptr)) != NULL) { bogus = 0; if (udpmode == udpmode_server) gcom->numplayers = atoi(tok)-1; else bogus = 1; } } if (bogus) initprintf("bogus token! [%s]\n", tok); } free(buf); } if (open_udp_socket(ip, udpport)) { gcom->numplayers++; /* that's you. */ if (udpmode == udpmode_server) return(wait_for_other_players(gcom, ip)); else if (udpmode == udpmode_client) return(connect_to_server(gcom, ip)); else if (udpmode == udpmode_peer) return(connect_to_everyone(gcom, ip, bcast)); initprintf("wtf?!"); /* Should be handled by a udpmode above... */ // assert(0); } return(0); } gcomtype *init_network_transport(int32_t argc, char **argv) { gcomtype *retval; // initprintf("\n\nUDP NETWORK TRANSPORT INITIALIZING...\n"); if (!initialize_sockets()) return(NULL); srand(time(NULL)); retval = (gcomtype *)malloc(sizeof(gcomtype)); if (retval != NULL) { int32_t rc; // char *cfgfile = ARGV[argpos]; memset(retval, '\0', sizeof(gcomtype)); memset(allowed_addresses, '\0', sizeof(allowed_addresses)); udpsocket = -1; udpport = BUILD_DEFAULT_UDP_PORT; udpmode = udpmode_peer; rc = parse_udp_config(argc, argv, retval); if (!rc) { free(retval); deinit_network_transport(NULL); return(NULL); } // retval->gametype = 3; /* gametype: 1-serial,2-modem,3-net */ } return(retval); } void deinit_network_transport(gcomtype *gcom) { // initprintf("\n\nUDP NETWORK TRANSPORT DEINITIALIZING...\n"); if (gcom != NULL) { initprintf(" ...freeing gcom structure...\n"); free(gcom); } if ((signed)udpsocket != -1) { initprintf(" ...closing socket...\n"); set_socket_blockmode(1); /* block while socket drains. */ shutdown(udpsocket, SOCKET_SHUTDOWN_BOTH); socketclose(udpsocket); udpsocket = -1; } deinitialize_sockets(); initprintf("UDP networking uninitialized successfully.\n"); } void callcommit(void) { int32_t ip, i, rc; uint16_t port; if ((signed)udpsocket == -1) return; process_udp_send_queue(); switch (gcom->command) { case COMMIT_CMD_GET: rc = get_udp_packet(&ip, &port, gcom->buffer, sizeof(gcom->buffer)); if (rc > 0) { gcom->numbytes = rc; /* size of new packet. */ for (i = 1; i <= gcom->numplayers; i++) { if ((allowed_addresses[i].host == ip) && (allowed_addresses[i].port == port)) { gcom->other = i; return; } } /* if you manage to hit this, it'll report no packet avail. */ } gcom->numbytes = 0; gcom->other = -1; /* no packet available. */ break; case COMMIT_CMD_SEND: if ((gcom->other < 0) || (gcom->other > gcom->numplayers)) { initprintf("NET TRANSPORT ERROR: send to player out of range\n"); return; } ip = allowed_addresses[gcom->other].host; if (ip == 0) /* dropped player? */ return; port = allowed_addresses[gcom->other].port; if (!send_udp_packet(ip, port, gcom->buffer, gcom->numbytes)) { initprintf("NET TRANSPORT ERROR: send failed to %s:%d\n", static_ipstring(ip), (int32_t) port); } break; case COMMIT_CMD_SENDTOALL: /* skip player zero, 'cause that's a duplicate of local IP. */ for (i = 1; i <= gcom->numplayers; i++) { ip = allowed_addresses[i].host; if (ip == 0) /* dropped player? */ continue; port = allowed_addresses[i].port; if (!send_udp_packet(ip, port, gcom->buffer, gcom->numbytes)) { initprintf("NET TRANSPORT ERROR: send failed to %s:%d\n", static_ipstring(ip), (int32_t) port); } } break; case COMMIT_CMD_SENDTOALLOTHERS: /* skip player zero, 'cause that's a duplicate of local IP. */ for (i = 1; i <= gcom->numplayers; i++) { if (i == gcom->myconnectindex) /* local player. */ continue; ip = allowed_addresses[i].host; if (ip == 0) /* dropped player? */ continue; port = allowed_addresses[i].port; if (!send_udp_packet(ip, port, gcom->buffer, gcom->numbytes)) { initprintf("NET TRANSPORT ERROR: send failed to %s:%d\n", static_ipstring(ip), (int32_t) port); } } break; /* ?! case COMMIT_CMD_SCORE: break; */ default: initprintf("NET TRANSPORT ERROR: Unknown command %d\n", gcom->command); gcom->other = -1; /* oh well. */ break; } } /* end of mmulti.c ... */