raze-gles/polymer/eduke32/build/src/mmulti_unstable.c
terminx 98a359f3e1 Clean out tree... misc changes
git-svn-id: https://svn.eduke32.com/eduke32@1465 1a8010ca-5511-0410-912e-c29ae57300e0
2009-07-24 02:31:34 +00:00

2172 lines
63 KiB
C
Raw Blame History

/*
* "Build Engine & Tools" Copyright (c) 1993-1997 Ken Silverman
* Ken Silverman's official web site: "http://www.advsys.net/ken"
* See the included license file "BUILDLIC.TXT" for license info.
* This file has been modified from Ken Silverman's original release
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <stdarg.h>
#include <ctype.h>
#include <time.h>
#include "mmulti_unstable.h"
// #include <enet/enet.h>
#include "compat.h"
#include "baselayer.h"
//STL
//#include <vector>
//#include "buildqueue.h"
// #include "platform.h"
#ifdef _WIN32
#define PLATFORM_WIN32 1
#else
#define PLATFORM_UNIX 1
#include <sys/time.h>
static int32_t GetTickCount(void)
{
struct timeval tv;
int32_t ti;
if (gettimeofday(&tv,NULL) < 0) return 0;
// tv is sec.usec, GTC gives msec
ti = tv.tv_sec * 1000;
ti += tv.tv_usec / 1000;
return ti;
}
#endif
#define UDP_NETWORKING 1
#include "pragmas.h"
#define MAXPLAYERS 16
#define BAKSIZ 16384
#define SIMULATEERRORS 0
#define SHOWSENDPACKETS 0
#define SHOWGETPACKETS 0
#define PRINTERRORS 0
#define updatecrc16(crc,dat) crc = (((crc<<8)&65535)^crctable[((((uint16_t)crc)>>8)&65535)^dat])
static int32_t incnt[MAXPLAYERS], outcntplc[MAXPLAYERS], outcntend[MAXPLAYERS];
static char errorgotnum[MAXPLAYERS];
static char errorfixnum[MAXPLAYERS];
static char errorresendnum[MAXPLAYERS];
#if (PRINTERRORS)
static char lasterrorgotnum[MAXPLAYERS];
#endif
int32_t crctable[256];
int32_t tmpmax[8]; //addfaz variable addition (you could probs think of something better)
int32_t itmp = 0; //addfaz router fix STUN
static uint8_t lastpacket[576];
char inlastpacket = 0;
static int32_t lastpacketfrom, lastpacketleng;
extern int32_t totalclock; /* MUST EXTERN 1 ANNOYING VARIABLE FROM GAME */
static int32_t timeoutcount = 60, resendagaincount = 4, lastsendtime[MAXPLAYERS];
int32_t natfree; //NatFree mode flag
static int16_t bakpacketptr[MAXPLAYERS][256], bakpacketlen[MAXPLAYERS][256];
static uint16_t bakpacketbuf[BAKSIZ];
static int32_t bakpacketplc = 0;
int32_t myconnectindex, numplayers;
int32_t connecthead, connectpoint2[MAXPLAYERS];
char syncstate = 0;
#define MAXPACKETSIZE 2048
#define PACKET_START_GAME 0x1337
enum commit_cmd_t
{
COMMIT_CMD_SEND = 1,
COMMIT_CMD_GET = 2,
COMMIT_CMD_SENDTOALL = 3,
COMMIT_CMD_SENDTOALLOTHERS = 4,
COMMIT_CMD_SCORE = 5,
};
typedef struct gcomtype_t
{
int16_t command; /* 1-send, 2-get */
int16_t other; /* dest for send, set by get (-1 = no packet) */
int16_t numbytes;
int16_t myconnectindex;
int16_t numplayers;
int16_t filler;
char buffer[MAXPACKETSIZE];
} gcomtype;
static gcomtype *gcom;
/*
//
// Packet queue data structs
//
typedef struct packet_wrapper
{
unsigned long packetnumber;
gcomtype packet;
} PACKETWRAPPER;
typedef PACKETWRAPPER packet_buffer;
unsigned long currentpacketnumber[MAXPLAYERS];
//
// Packet Buffer
//
packet_buffer pBuff[256];
*/
/*
typedef struct
{
char buffer[MAXPACKETSIZE];
}PACKET;
*/
//typedef std::vector<PACKET> PacketQueue;
static struct allowed_addr_t
{
int32_t host;
uint16_t port;
} allowed_addresses[MAXPLAYERS]; /* only respond to these IPs. */
// Queue of out going packets.
//PacketQueue outgoingPacketQueue;
//outgoingPacketQueue.reserve(128);
gcomtype *init_network_transport(int32_t argc, char **argv);
void deinit_network_transport(gcomtype *gcom);
//void callcommit(void);
void mmulti_dosendpackets(int32_t other);
static void initcrc(void)
{
int32_t i, j, k, a;
for (j=0; j<256; j++) /* Calculate CRC table */
{
k = (j<<8); a = 0;
for (i=7; i>=0; i--)
{
if (((k^a)&0x8000) > 0)
a = ((a<<1)&65535) ^ 0x1021; /* 0x1021 = genpoly */
else
a = ((a<<1)&65535);
k = ((k<<1)&65535);
}
crctable[j] = (a&65535);
}
}
int32_t getcrc(char *buffer, int32_t bufleng)
{
int32_t i, j;
j = 0;
for (i=bufleng-1; i>=0; i--) updatecrc16(j,buffer[i]);
return(j&65535);
}
void mmulti_initmultiplayers(int32_t argc, char **argv)
{
int32_t i;
UNREFERENCED_PARAMETER(argc);
initcrc();
for (i=0; i<MAXPLAYERS; i++)
{
incnt[i] = 0L;
outcntplc[i] = 0L;
outcntend[i] = 0L;
bakpacketlen[i][255] = -1;
allowed_addresses[i].host = 0;
allowed_addresses[i].port = 0;
}
// clear out the packet ordering
// memset(&currentpacketnumber, 0, sizeof(unsigned long) * MAXPLAYERS);
#if 0
for (i = argc - 1; i > 0; i--)
{
const char *arg = argv[i];
char ch = *arg;
if ((ch == '-') || (ch == '/'))
{
if (Bstrcasecmp(arg + 1, "net") == 0)
break;
}
}
#endif
if (!argc)
{
// initprintf("network: No configuration file specified!\n");
numplayers = 1; myconnectindex = 0;
connecthead = 0; connectpoint2[0] = -1;
return;
}
gcom = init_network_transport(argc, argv);
if (gcom == NULL)
{
initprintf("Network transport initialization failed. Aborting...\n");
numplayers = 1; myconnectindex = 0;
connecthead = 0; connectpoint2[0] = -1;
return;
}
numplayers = gcom->numplayers;
myconnectindex = gcom->myconnectindex-1;
#if (SIMULATEERRORS != 0)
srand(myconnectindex*24572457+345356);
#endif
connecthead = 0;
for (i=0; i<numplayers-1; i++) connectpoint2[i] = i+1;
connectpoint2[numplayers-1] = -1;
for (i=0; i<numplayers; i++) lastsendtime[i] = totalclock;
}
void mmulti_dosendpackets(int32_t other)
{
int32_t i, j, k, messleng;
uint16_t dacrc;
if (outcntplc[other] == outcntend[other]) return;
#if (PRINTERRORS)
if (errorgotnum[other] > lasterrorgotnum[other])
{
lasterrorgotnum[other]++;
initprintf(" MeWant %ld",incnt[other]&255);
}
#endif
if (outcntplc[other]+1 == outcntend[other])
{ /* Send 1 sub-packet */
k = 0;
gcom->buffer[k++] = (outcntplc[other]&255);
gcom->buffer[k++] = (errorgotnum[other]&7)+((errorresendnum[other]&7)<<3);
gcom->buffer[k++] = (incnt[other]&255);
j = bakpacketptr[other][outcntplc[other]&255];
messleng = bakpacketlen[other][outcntplc[other]&255];
for (i=0; i<messleng; i++)
gcom->buffer[k++] = bakpacketbuf[(i+j)&(BAKSIZ-1)];
outcntplc[other]++;
}
else
{ /* Send 2 sub-packets */
k = 0;
gcom->buffer[k++] = (outcntplc[other]&255);
gcom->buffer[k++] = (errorgotnum[other]&7)+((errorresendnum[other]&7)<<3)+128;
gcom->buffer[k++] = (incnt[other]&255);
/* First half-packet */
j = bakpacketptr[other][outcntplc[other]&255];
messleng = bakpacketlen[other][outcntplc[other]&255];
gcom->buffer[k++] = (uint8_t)(messleng&255);
gcom->buffer[k++] = (uint8_t)(messleng>>8);
for (i=0; i<messleng; i++)
gcom->buffer[k++] = bakpacketbuf[(i+j)&(BAKSIZ-1)];
outcntplc[other]++;
/* Second half-packet */
j = bakpacketptr[other][outcntplc[other]&255];
messleng = bakpacketlen[other][outcntplc[other]&255];
for (i=0; i<messleng; i++)
gcom->buffer[k++] = bakpacketbuf[(i+j)&(BAKSIZ-1)];
outcntplc[other]++;
}
dacrc = getcrc(gcom->buffer,(int16_t)k);
gcom->buffer[k++] = (dacrc&255);
gcom->buffer[k++] = (dacrc>>8);
gcom->other = other+1;
gcom->numbytes = k;
#if (SHOWSENDPACKETS)
initprintf("Send(%ld): ",gcom->other);
for (i=0; i<gcom->numbytes; i++) initprintf("%2x ",gcom->buffer[i]);
initprintf("\n");
#endif
#if (SIMULATEERRORS != 0)
if (!(rand()&SIMULATEERRORS)) gcom->buffer[rand()%gcom->numbytes] = (rand()&255);
if (rand()&SIMULATEERRORS)
#endif
{
gcom->command = COMMIT_CMD_SEND;
callcommit();
}
}
void mmulti_sendpacket(int32_t other, char *bufptr, int32_t messleng)
{
int32_t i = 0;
int32_t j = 0;
if (numplayers < 2) return;
i = 0;
if (bakpacketlen[other][(outcntend[other]-1)&255] == messleng)
{
j = bakpacketptr[other][(outcntend[other]-1)&255];
for (i=messleng-1; i>=0; i--)
if (bakpacketbuf[(i+j)&(BAKSIZ-1)] != bufptr[i]) break;
}
bakpacketlen[other][outcntend[other]&255] = messleng;
if (i < 0) /* Point to last packet to save space on bakpacketbuf */
bakpacketptr[other][outcntend[other]&255] = j;
else
{
bakpacketptr[other][outcntend[other]&255] = bakpacketplc;
for (i=0; i<messleng; i++)
bakpacketbuf[(bakpacketplc+i)&(BAKSIZ-1)] = bufptr[i];
bakpacketplc = ((bakpacketplc+messleng)&(BAKSIZ-1));
}
outcntend[other]++;
lastsendtime[other] = totalclock;
mmulti_dosendpackets(other);
}
void mmulti_setpackettimeout(int32_t datimeoutcount, int32_t daresendagaincount)
{
UNREFERENCED_PARAMETER(datimeoutcount);
UNREFERENCED_PARAMETER(daresendagaincount);
// Don't do this it keeps '/f4' from working
// Though /f4 feels weird on my mouse.... slugish is the word...
/*
int32_t i;
timeoutcount = datimeoutcount;
resendagaincount = daresendagaincount;
for(i=0;i<numplayers;i++) lastsendtime[i] = totalclock;
*/
}
void mmulti_uninitmultiplayers(void)
{
deinit_network_transport(gcom);
gcom = NULL;
}
typedef enum
{
udpmode_peer,
udpmode_server,
udpmode_client
} udpmode_t;
static udpmode_t udpmode = udpmode_peer;
void mmulti_sendlogon(void)
{
}
void mmulti_sendlogoff(void)
{
int32_t i;
char tempbuf[2];
tempbuf[0] = 255;
tempbuf[1] = myconnectindex;
for (i=connecthead; i>=0; i=connectpoint2[i])
{
if (i != myconnectindex)
mmulti_sendpacket(i,tempbuf,2L);
if ((udpmode == udpmode_client) && (myconnectindex != connecthead)) break; //slaves in M/S mode only send to master
}
}
int32_t mmulti_getoutputcirclesize(void)
{
return(0);
}
int32_t mmulti_getpacket(int32_t *other, char *bufptr)
{
int32_t i, messleng;
uint16_t dacrc;
if (numplayers < 2 || gcom == NULL) return(0);
for (i=connecthead; i>=0; i=connectpoint2[i])
{
if (i != myconnectindex)
{
// FIXME: this is probably not so great
if (udpmode != udpmode_peer) mmulti_dosendpackets(i);
if (totalclock < lastsendtime[i]) lastsendtime[i] = totalclock;
if (totalclock > lastsendtime[i]+timeoutcount)
{
#if (PRINTERRORS)
initprintf(" TimeOut!");
#endif
errorgotnum[i] = errorfixnum[i]+1;
if ((outcntplc[i] == outcntend[i]) && (outcntplc[i] > 0))
{ outcntplc[i]--; lastsendtime[i] = totalclock; }
else
lastsendtime[i] += resendagaincount;
mmulti_dosendpackets(i);
/* } */
}
}
if ((udpmode == udpmode_client) && (myconnectindex != connecthead)) break; //slaves in M/S mode only send to master
}
if (inlastpacket != 0)
{
/* 2ND half of good double-packet */
inlastpacket = 0;
*other = lastpacketfrom;
Bmemcpy(bufptr,lastpacket,lastpacketleng);
return(lastpacketleng);
}
gcom->command = COMMIT_CMD_GET;
callcommit();
#if (SHOWGETPACKETS)
if (gcom->other != -1)
{
initprintf(" Get(%ld): ",gcom->other);
for (i=0; i<gcom->numbytes; i++) initprintf("%2x ",gcom->buffer[i]);
initprintf("\n");
}
#endif
if (gcom->other < 0) return(0);
*other = gcom->other-1;
messleng = gcom->numbytes;
dacrc = ((uint16_t)gcom->buffer[messleng-2]);
dacrc += (((uint16_t)gcom->buffer[messleng-1])<<8);
if (dacrc != getcrc(gcom->buffer,(int16_t)(messleng-2))) /* CRC check */
{
#if (PRINTERRORS)
initprintf("\n%ld CRC",gcom->buffer[0]);
#endif
errorgotnum[*other] = errorfixnum[*other]+1;
return(0);
}
while ((errorfixnum[*other]&7) != ((gcom->buffer[1]>>3)&7))
errorfixnum[*other]++;
if ((gcom->buffer[1]&7) != (errorresendnum[*other]&7))
{
errorresendnum[*other]++;
outcntplc[*other] = (outcntend[*other]&0xffffff00)+gcom->buffer[2];
if (outcntplc[*other] > outcntend[*other]) outcntplc[*other] -= 256;
}
if (gcom->buffer[0] != (incnt[*other]&255)) /* CNT check */
{
if (((incnt[*other]-gcom->buffer[0])&255) > 32)
{
errorgotnum[*other] = errorfixnum[*other]+1;
#if (PRINTERRORS)
initprintf("\n%ld CNT",gcom->buffer[0]);
#endif
}
#if (PRINTERRORS)
else
{
if (!(gcom->buffer[1]&128)) /* single else double packet */
initprintf("\n%ld cnt",gcom->buffer[0]);
else
{
if (((gcom->buffer[0]+1)&255) == (incnt[*other]&255))
{
/* GOOD! Take second half of double packet */
#if (PRINTERRORS)
initprintf("\n%ld-%ld .<2E> ",gcom->buffer[0],(gcom->buffer[0]+1)&255);
#endif
messleng = ((int32_t)gcom->buffer[3]) + (((int32_t)gcom->buffer[4])<<8);
lastpacketleng = gcom->numbytes-7-messleng;
Bmemcpy(bufptr,&gcom->buffer[messleng+5],lastpacketleng);
incnt[*other]++;
return(lastpacketleng);
}
else
initprintf("\n%ld-%ld cnt ",gcom->buffer[0],(gcom->buffer[0]+1)&255);
}
}
#endif
return(0);
}
/* PACKET WAS GOOD! */
if ((gcom->buffer[1]&128) == 0) /* Single packet */
{
#if (PRINTERRORS)
initprintf("\n%ld <20> ",gcom->buffer[0]);
#endif
messleng = gcom->numbytes-5;
Bmemcpy(bufptr,&gcom->buffer[3],messleng);
incnt[*other]++;
return(messleng);
}
/* Double packet */
#if (PRINTERRORS)
initprintf("\n%ld-%ld <20><> ",gcom->buffer[0],(gcom->buffer[0]+1)&255);
#endif
messleng = ((int32_t)gcom->buffer[3]) + (((int32_t)gcom->buffer[4])<<8);
lastpacketleng = gcom->numbytes-7-messleng;
inlastpacket = 1; lastpacketfrom = *other;
Bmemcpy(bufptr,&gcom->buffer[5],messleng);
Bmemcpy(lastpacket,&gcom->buffer[messleng+5],lastpacketleng);
incnt[*other] += 2;
return(messleng);
}
void mmulti_flushpackets()
{
#if 1
int32_t i;
if (numplayers < 2) return;
do
{
gcom->command = COMMIT_CMD_GET;
callcommit();
}
while (gcom->other >= 0);
for (i=connecthead; i>=0; i=connectpoint2[i])
{
incnt[i] = 0L;
outcntplc[i] = 0L;
outcntend[i] = 0L;
errorgotnum[i] = 0;
errorfixnum[i] = 0;
errorresendnum[i] = 0;
lastsendtime[i] = totalclock;
}
#endif
}
void mmulti_generic(int32_t other, char *bufptr, int32_t messleng, int32_t command)
{
if (numplayers < 2) return;
gcom->command = command;
gcom->numbytes = min(messleng,MAXPACKETSIZE);
copybuf(bufptr,gcom->buffer,(gcom->numbytes+3)>>2);
gcom->other = other+1;
callcommit();
}
#if PLATFORM_WIN32
# include <winsock.h>
# define EWOULDBLOCK WSAEWOULDBLOCK
# define ECONNREFUSED WSAECONNRESET
# define socklen_t size_t
# define netstrerror() win32netstrerror()
# define neterrno() WSAGetLastError()
# define sockettype SOCKET
# define socketclose(x) closesocket(x)
#else
# include <sys/types.h>
# include <sys/socket.h>
# include <netinet/in.h>
# include <arpa/inet.h>
# include <netdb.h>
# include <sys/uio.h>
# include <sys/ioctl.h>
# include <sys/time.h>
# include <errno.h>
# include <fcntl.h>
# include <time.h>
# define netstrerror() strerror(errno)
# define neterrno() errno
# define sockettype int32_t
# define socketclose(x) close(x)
# ifndef MSG_ERRQUEUE /* legacy glibc header workaround... */
# define MSG_ERRQUEUE 0x2000
# endif
#endif
#define SOCKET_SHUTDOWN_BOTH 2
#include "cache1d.h" /* kopen4load for cfg file. */
#define IPSEG1(ip) ((((uint32_t) ip) & 0xFF000000) >> 24)
#define IPSEG2(ip) ((((uint32_t) ip) & 0x00FF0000) >> 16)
#define IPSEG3(ip) ((((uint32_t) ip) & 0x0000FF00) >> 8)
#define IPSEG4(ip) ((((uint32_t) ip) & 0x000000FF) )
#define BUILD_DEFAULT_UDP_PORT 23513 /* eh...why not? */
#define CLIENT_POLL_DELAY 5000 /* ms between pings at peer-to-peer startup. */
#define HEADER_PEER_GREETING 245
static sockettype udpsocket = -1;
static uint16_t udpport = BUILD_DEFAULT_UDP_PORT;
#if PLATFORM_WIN32
/*
* Figure out what the last failing Win32 API call was, and
* generate a human-readable string for the error message.
*
* The return value is a static buffer that is overwritten with
* each call to this function.
*
* Code lifted from PhysicsFS: http://icculus.org/physfs/
*/
static const char *win32netstrerror(void)
{
static TCHAR msgbuf[255];
TCHAR *ptr = msgbuf;
FormatMessage(
FORMAT_MESSAGE_FROM_SYSTEM |
FORMAT_MESSAGE_IGNORE_INSERTS,
NULL,
WSAGetLastError(), /*GetLastError(),*/
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), /* Default language */
msgbuf,
sizeof(msgbuf) / sizeof(TCHAR),
NULL
);
/* chop off newlines. */
for (ptr = msgbuf; *ptr; ptr++)
{
if ((*ptr == '\n') || (*ptr == '\r'))
{
*ptr = ' ';
break;
} /* if */
} /* for */
return((const char *) msgbuf);
} /* win32strerror */
#endif
static char *static_ipstring(int32_t ip)
{
static char s[16];
Bsprintf(s, "%u.%u.%u.%u", IPSEG1(ip), IPSEG2(ip), IPSEG3(ip), IPSEG4(ip));
return(s);
}
static int32_t send_udp_packet(int32_t ip, uint16_t port, void *pkt, size_t pktsize)
{
/* !!! FIXME: See if this would ever block. */
/* !!! FIXME: See if this would send a partial packet. */
struct sockaddr_in addr;
int32_t rc;
addr.sin_family = AF_INET;
addr.sin_addr.s_addr = htonl(ip);
addr.sin_port = htons(port);
rc = sendto(udpsocket, pkt, pktsize, 0,
(struct sockaddr *) &addr, sizeof(addr));
if (rc != (int32_t) pktsize)
{
initprintf("sendto err rc==%d when sending %d to %s:%d [%s].\n",
rc, (int32_t) pktsize, static_ipstring(ip), (int32_t) port,
netstrerror());
return(0);
}
/*initprintf("Sent %d byte packet to %s:%d\n", (int32_t) pktsize, static_ipstring(ip), (int32_t) port);*/
return(1);
}
static void process_udp_send_queue(void)
{
/* Fill this in if the non-blocking socket becomes an issue. */
}
static int32_t get_udp_packet(int32_t *ip, uint16_t *_port, void *pkt, size_t pktsize)
{
int32_t err = 0;
struct sockaddr_in addr;
uint16_t port;
socklen_t fromlen = sizeof(addr);
int32_t valid = 0;
int32_t i;
/* FIXME: Will this ever receive a partial packet? */
int32_t rc = recvfrom(udpsocket, pkt, pktsize, 0, (struct sockaddr *) &addr,
#ifdef _WIN32
(int32_t *)&fromlen);
#else
(uint32_t *)&fromlen);
#endif
if (rc == -1)
err = neterrno();
#if !PLATFORM_WIN32
/* !!! FIXME: Linux specific? */
if (rc == -1) /* fill in the addr structure on error... */
{
socklen_t l = sizeof(addr);
recvfrom(udpsocket, NULL, 0, MSG_ERRQUEUE,
(struct sockaddr *) &addr, &l);
}
#endif
*ip = ntohl(addr.sin_addr.s_addr);
port = ntohs(addr.sin_port);
if (_port)
*_port = port;
/*
* Reject packets from unallowed IPs. Prevents (ha) DoS attacks and
* other confusion...
*/
if (gcom == NULL)
{
if (natfree) //if stun is enabled
{
if ((allowed_addresses[itmp].host == *ip)
&& (allowed_addresses[itmp].port == port))
{
valid = 1; //only accept packets from the current player (itmp) and no one else
}
else
{
return 0; //reject packets from other players
}
}
else
{
valid = 1;
}
}
else
{
for (i = 1; i <= gcom->numplayers; i++)
{
if ((allowed_addresses[i].host == *ip)
&& (allowed_addresses[i].port == port))
{
valid = i;
//initprintf ("Packet received from %s:%d\n",static_ipstring(*ip), (int32_t) port);
break;
}
}
}
/*if (!valid)
{
static int32_t unallowed_ip_spam = 0;
if (unallowed_ip_spam <= 100)
{
initprintf("Packet received from unallowed IP %s:%d\n",
static_ipstring(*ip), (int32_t) port);
if (unallowed_ip_spam == 100)
initprintf("(Disabling further unallowed IP spam.)\n");
unallowed_ip_spam++;
}
return(0);
} */
if (rc == -1)
{
if ((err == EAGAIN) || (err == EWOULDBLOCK))
rc = 0;
else if (err == ECONNREFUSED) //"connection reset by peer" in winsock
{
// This means that we sent a packet to an unopened port, and
// it responded by telling us to piss off. Take them out of the
// allowed list. We check gcom so that we don't worry about this
// during detection when game might still be loading elsewhere.
if (gcom != NULL)
{
allowed_addresses[valid].host = 0;
initprintf("%s:%d refused packets. Removed from game.\n",
static_ipstring(*ip), (int32_t) port);
}
// !!! FIXME: Actually boot player, too.
}
else
{
initprintf("recvfrom err rc==%d when getting %d from %s:%d [%s].\n",
rc, (int32_t) pktsize, static_ipstring(*ip), (int32_t) port,
netstrerror());
}
}
//else initprintf("Got %d byte packet from %s:%d\n", (int32_t) rc, static_ipstring(*ip), (int32_t) port);
//initprintf( "IP from client %d", *ip);
return(rc);
}
static char *read_whole_file(const char *cfgfile)
{
char *buf;
int32_t len, rc;
int32_t handle;
if (cfgfile == NULL)
return(NULL);
handle = kopen4load((char *)cfgfile, 0);
if (handle == -1)
{
// initprintf("ERROR: Failed to open config file [%s].\n", cfgfile);
return(NULL);
}
len = kfilelength(handle);
buf = (char *) malloc(len + 2);
if (!buf)
{
kclose(handle);
return(NULL);
}
rc = kread(handle, buf, len);
kclose(handle);
if (rc != len)
{
free(buf);
return(NULL);
}
buf[len] = '\0';
buf[len+1] = '\0';
return(buf);
}
static char *get_token(char **ptr)
{
char *retval;
char *p = *ptr;
if (*p == '\0')
return(NULL);
while ((*p != '\0') && (isspace(*p)))
p++;
if (*p == '\0') /* nothing but whitespace. */
return(NULL);
retval = p;
while ((*p != '\0') && (!isspace(*p)))
p++;
*p = '\0';
*ptr = p + 1;
/*initprintf("Got token [%s].\n", retval);*/
return(retval);
}
static int32_t set_socket_blockmode(int32_t onOrOff)
{
uint32_t flags;
int32_t rc = 0;
/* set socket to be (non-)blocking. */
#if PLATFORM_WIN32
flags = (onOrOff) ? 0 : 1;
rc = (ioctlsocket(udpsocket, FIONBIO, (void *) &flags) == 0);
#else
flags = fcntl(udpsocket, F_GETFL, 0);
if ((signed)flags != -1)
{
if (onOrOff)
flags &= ~O_NONBLOCK;
else
flags |= O_NONBLOCK;
rc = (fcntl(udpsocket, F_SETFL, flags) == 0);
}
#endif
if (!rc)
{
initprintf("set socket %sblocking failed: %s\n",
((onOrOff) ? "" : "non-"), netstrerror());
}
return(rc);
}
static int32_t set_socket_broadcast(int32_t onOrOff)
{
int32_t f = (onOrOff) ? 1 : 0;
int32_t rc;
/* give socket clearance to broadcast. */
rc = setsockopt(udpsocket, SOL_SOCKET, SO_BROADCAST, (char *)(&f), sizeof(f)) == 0;
if (!rc)
{
initprintf("%sset SO_BROADCAST failed: %s\n",
((onOrOff) ? "" : "un"), netstrerror());
}
return(rc);
}
static int32_t open_udp_socket(int32_t ip, int32_t port)
{
struct sockaddr_in addr;
// initprintf("Setting up UDP interface %s:%d...\n", static_ipstring(ip), port);
if (natfree)
{
//initprintf("Stun is currently %s\n", (natfree) ? "Enabled":"Disabled");
initprintf("network: Stun enabled\n");
}
udpsocket = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP);
if ((signed)udpsocket == -1)
{
initprintf("network: socket creation failed: %s\n", netstrerror());
return(0);
}
if (!set_socket_blockmode(0))
return(0);
#if !PLATFORM_WIN32
{
/* !!! FIXME: Might be Linux (not Unix, not BSD, not WinSock) specific. */
int32_t flags = 1;
setsockopt(udpsocket, IPPROTO_IP, IP_RECVERR, &flags, sizeof(flags));
}
#endif
memset(&addr, '\0', sizeof(addr));
addr.sin_family = AF_INET;
addr.sin_addr.s_addr = htonl(ip);
addr.sin_port = htons((uint16_t)port);
if (bind(udpsocket, (struct sockaddr *) &addr, sizeof(addr)) == -1)
{
initprintf("network: socket binding failed: %s\n", netstrerror());
return(0);
}
return(1);
}
typedef struct peergreeting_t
{
char dummy1; /* so these don't confuse game after load. */
char dummy2; /* so these don't confuse game after load. */
char dummy3; /* so these don't confuse game after load. */
char header; /* always HEADER_PEER_GREETING (245). */
uint16_t id;
} PacketPeerGreeting;
static void send_peer_greeting(int32_t ip, uint16_t port, int16_t myid)
{
PacketPeerGreeting packet;
memset(&packet, '\0', sizeof(packet));
packet.header = HEADER_PEER_GREETING;
packet.id = B_SWAP16(myid);
send_udp_packet(ip, port, &packet, sizeof(packet));
}
/* server init. */
static int32_t wait_for_other_players(gcomtype *gcom, int32_t myip)
{
PacketPeerGreeting packet;
uint16_t my_id = 1; // we're always 1 so we sort as the first player
int32_t i, j;
int32_t rc;
int32_t ip;
uint16_t port;
uint16_t heard_from[MAXPLAYERS];
int32_t max;
int32_t remaining;
memset(heard_from, '\0', sizeof(heard_from));
remaining = max = gcom->numplayers - 1;
initprintf("Waiting for %d player%s...\n", remaining, remaining==1 ? "":"s");
if (remaining == 0)
{
initprintf("Hmmm... don't have time to play with myself!\n");
return(0);
}
while (remaining && !quitevent)
{
handleevents();
idle();
process_udp_send_queue();
rc = get_udp_packet(&ip, &port, &packet, sizeof(packet));
//this is so we don't get unexpected packet errors from players already heard from
if ((rc > 0) && (ip) && ((ip != myip) || (port != udpport)))
{
char *ipstr = static_ipstring(ip);
if (rc != sizeof(packet))
{
initprintf("network: Missized packet or fragment from %s:%i ?!\n", ipstr, port);
continue;
}
else if (packet.header != HEADER_PEER_GREETING)
{
initprintf("network: Unexpected packet type from %s:%i ?!\n", ipstr, port);
continue;
}
for (i = 0; i < max; i++)
{
if (!heard_from[i] || heard_from[i] == B_SWAP16(packet.id))
break;
}
if (i == max)
initprintf("network: Disallowed player %s:%d ?!\n", ipstr, port);
else if (heard_from[i] == 0)
{
packet.id = B_SWAP16(packet.id);
heard_from[i] = packet.id;
allowed_addresses[i].host = ip; /* bcast needs this. */
allowed_addresses[i].port = port;
remaining--;
initprintf("%s:%i (id 0x%X) connected, %d player%s left.\n",
ipstr, (unsigned)port ,(int32_t) packet.id,
remaining, remaining == 1 ? "" : "s");
/* make sure they've heard from us at all... */
/* !!! FIXME: Could be fatal if packet is dropped... */
send_peer_greeting(allowed_addresses[i].host,
allowed_addresses[i].port,
my_id);
}
}
}
if (quitevent)
{
initprintf("network: Connection attempt aborted.\n");
return(0);
}
// found all the clients expected so relay all greetings
for (j=max; j>=0; j--)
if (allowed_addresses[j].host)
{
int32_t ii;
// send another copy of our greeting just in case they missed it
send_peer_greeting(allowed_addresses[j].host,
allowed_addresses[j].port,
my_id);
for (ii = 0; ii < max; ii++)
send_peer_greeting(allowed_addresses[j].host,
allowed_addresses[j].port,
heard_from[ii]);
// greeting with 0x1337 id starts the game for clients
send_peer_greeting(allowed_addresses[j].host,
allowed_addresses[j].port,
PACKET_START_GAME);
}
/* ok, now everyone is talking to you. Sort them into player numbers... */
heard_from[max] = my_id; /* so we sort, too... */
allowed_addresses[max].host = myip;
allowed_addresses[max].port = udpport;
do
{
remaining = 0;
for (i = 0; i < max; i++)
{
if (heard_from[i] == heard_from[i+1]) /* blah. */
{
initprintf("network: ERROR: Two players have the same random ID!\n");
initprintf("network: ERROR: Please restart the game to generate new IDs.\n");
return(0);
}
else if (heard_from[i] > heard_from[i+1])
{
int32_t tmpi;
int16_t tmps;
tmps = heard_from[i];
heard_from[i] = heard_from[i+1];
heard_from[i+1] = tmps;
tmpi = allowed_addresses[i].host;
allowed_addresses[i].host = allowed_addresses[i+1].host;
allowed_addresses[i+1].host = tmpi;
tmps = allowed_addresses[i].port;
allowed_addresses[i].port = allowed_addresses[i+1].port;
allowed_addresses[i+1].port = tmps;
remaining = 1; /* yay for bubble sorting! */
}
}
}
while (remaining);
/*
* Now we're sorted. But, the local player is referred to by both his
* player number and player index ZERO, so bump everyone up one to
* their actual index and fill in local player as item zero.
*/
memmove(&allowed_addresses[1], &allowed_addresses[0],
sizeof(allowed_addresses) - sizeof(allowed_addresses[0]));
allowed_addresses[0].host = myip;
gcom->myconnectindex = 0;
for (i = 1; i <= gcom->numplayers; i++)
{
ip = (allowed_addresses[i].host);
if (ip == myip)
{
if (udpport == allowed_addresses[i].port)
gcom->myconnectindex = i;
}
initprintf("network: player #%i at %s:%i\n", i,static_ipstring(ip),allowed_addresses[i].port);
}
// assert(gcom->myconnectindex);
initprintf("network: We are player #%i\n", gcom->myconnectindex);
return(1);
}
/* client init. */
static int32_t connect_to_server(gcomtype *gcom, int32_t myip)
{
PacketPeerGreeting packet;
uint16_t my_id = 0;
int32_t i;
int32_t rc;
int32_t ip;
uint16_t port;
int32_t first_send = 1;
uint16_t heard_from[MAXPLAYERS];
uint32_t resendat;
int32_t max;
int32_t remaining;
memset(heard_from, '\0', sizeof(heard_from));
gcom->numplayers = 2;
while (my_id == 0) /* player number is based on id, low to high. */
{
my_id = (unsigned short)GetTickCount();
// my_id = (uint16_t) rand();
}
initprintf("network: Using 0x%X as client ID\n", my_id);
resendat = getticks();
remaining = max = gcom->numplayers - 1;
initprintf("network: Waiting for %d player%s...\n", remaining, remaining==1 ? "":"s");
if (remaining == 0)
{
initprintf("Hmmm... don't have time to play with myself!\n");
return(0);
}
while (remaining && !quitevent)
{
handleevents();
if (resendat <= getticks())
{
for (i = 0; (i < max) || natfree ; i++)
{
//only checking one player at a time works
//this is where special formatting of allow lines comes in
if (!heard_from[i])
{
initprintf("network: %s %s:%d...\n",first_send?"Connecting to":"Retrying",
static_ipstring(allowed_addresses[i].host),allowed_addresses[i].port);
send_peer_greeting(allowed_addresses[i].host,
allowed_addresses[i].port,
my_id);
}
}
first_send = 0;
resendat += CLIENT_POLL_DELAY;
}
idle();
process_udp_send_queue();
rc = get_udp_packet(&ip, &port, &packet, sizeof(packet));
//this is so we don't get unexpected packet errors from players already heard from
if ((rc > 0) && (ip) && ((ip != myip) || (port != udpport)))
{
char *ipstr = static_ipstring(ip);
if (rc != sizeof(packet))
{
initprintf("network: Missized packet or fragment from %s:%i ?!\n", ipstr, port);
continue;
}
else if (packet.header != HEADER_PEER_GREETING)
{
initprintf("network: Unexpected packet type from %s:%i ?!\n", ipstr, port);
continue;
}
for (i=0; i<MAXPLAYERS; i++)
if (!heard_from[i] || heard_from[i] == B_SWAP16(packet.id)) break; // only increase once
// greeting with 0x1337 id starts the game
if (B_SWAP16(packet.id) == PACKET_START_GAME)
{
remaining = 0;
continue;
}
// packet.id == 1 is always the server
else if (heard_from[i] == 0 && B_SWAP16(packet.id) == 1)
{
packet.id = B_SWAP16(packet.id);
heard_from[i] = packet.id;
initprintf("network: Connected to %s:%i\n",
ipstr, (unsigned)port);
initprintf("network: Waiting for server to launch game\n");
}
else
{
if (heard_from[i] == 0 && B_SWAP16(packet.id) != my_id)
{
packet.id = B_SWAP16(packet.id);
heard_from[i] = packet.id;
initprintf("network: New player with id 0x%X\n",
(int32_t) packet.id);
gcom->numplayers++;
max++;
}
}
}
}
if (quitevent)
{
initprintf("network: Connection attempt aborted.\n");
return(0);
}
/* ok, now everyone is talking to you. Sort them into player numbers... */
heard_from[max] = my_id; /* so we sort, too... */
allowed_addresses[max].host = myip;
allowed_addresses[max].port = udpport;
do
{
remaining = 0;
for (i = 0; i < max; i++)
{
if (heard_from[i] == heard_from[i+1]) /* blah. */
{
initprintf("network: ERROR: Two players have the same random ID!\n");
initprintf("network: ERROR: Please restart the game to generate new IDs.\n");
return(0);
}
else if (heard_from[i] > heard_from[i+1])
{
int32_t tmpi;
int16_t tmps;
tmps = heard_from[i];
heard_from[i] = heard_from[i+1];
heard_from[i+1] = tmps;
tmpi = allowed_addresses[i].host;
allowed_addresses[i].host = allowed_addresses[i+1].host;
allowed_addresses[i+1].host = tmpi;
tmps = allowed_addresses[i].port;
allowed_addresses[i].port = allowed_addresses[i+1].port;
allowed_addresses[i+1].port = tmps;
remaining = 1; /* yay for bubble sorting! */
}
}
}
while (remaining);
/*
* Now we're sorted. But, the local player is referred to by both his
* player number and player index ZERO, so bump everyone up one to
* their actual index and fill in local player as item zero.
*/
memmove(&allowed_addresses[1], &allowed_addresses[0],
sizeof(allowed_addresses) - sizeof(allowed_addresses[0]));
allowed_addresses[0].host = myip;
gcom->myconnectindex = 0;
for (i = 1; i <= gcom->numplayers; i++)
{
ip = (allowed_addresses[i].host);
if (ip == myip)
{
if (udpport == allowed_addresses[i].port)
gcom->myconnectindex = i;
}
// initprintf("network: player #%i with id %d\n",i,heard_from[i]);
}
// assert(gcom->myconnectindex);
// initprintf("network: We are player #%i\n", gcom->myconnectindex);
return(1);
}
/* peer to peer init. */
static int32_t connect_to_everyone(gcomtype *gcom, int32_t myip, int32_t bcast)
{
PacketPeerGreeting packet;
uint16_t my_id = 0;
int32_t i;
int32_t rc;
int32_t ip;
uint16_t port;
int32_t first_send = 1;
uint16_t heard_from[MAXPLAYERS];
uint32_t resendat;
int32_t max;
int32_t remaining;
if (bcast)
{
if (gcom->numplayers > 1)
{
initprintf("network: Error: can't do both 'broadcast' and 'allow'.\n");
return(0);
}
if (!set_socket_broadcast(1))
return(0);
gcom->numplayers = bcast + 1;
}
memset(heard_from, '\0', sizeof(heard_from));
while (my_id == 0) /* player number is based on id, low to high. */
{
/* struct timeval tv;
gettimeofday(&tv, NULL);
my_id = (unsigned short)tv.tv_usec; //HACK */
my_id = (uint16_t) rand();
}
initprintf("network: Using 0x%X as client ID\n", my_id);
resendat = getticks();
remaining = max = gcom->numplayers - 1;
initprintf("Waiting for %d player%s...\n", remaining, remaining==1 ? "":"s");
if (remaining == 0)
{
initprintf("Hmmm... don't have time to play with myself!\n");
return(0);
}
while (remaining && !quitevent)
{
handleevents();
if (resendat <= getticks())
{
if (bcast)
{
initprintf("%sroadcasting greeting...\n", first_send ? "B":"Reb");
/* !!! FIXME: This is...probably not right. */
send_peer_greeting(0xFFFFFFFF, udpport, my_id);
}
else
{
for (i = 0; (i < max) || natfree ; i++)
{
//only checking one player at a time works
//this is where special formatting of allow lines comes in
if (natfree)
{
i = itmp; //addfaz router fix
}
if (!heard_from[i])
{
initprintf("network: %s %s:%d...\n",first_send?"Connecting to":"Retrying",
static_ipstring(allowed_addresses[i].host),allowed_addresses[i].port);
send_peer_greeting(allowed_addresses[i].host,
allowed_addresses[i].port,
my_id);
}
// If this is stun-enabled then don't loop.
if (natfree)
{
break;
}
}
}
first_send = 0;
resendat += CLIENT_POLL_DELAY;
}
idle();
process_udp_send_queue();
rc = get_udp_packet(&ip, &port, &packet, sizeof(packet));
//this is so we don't get unexpected packet errors from players already heard from
if (natfree)
{
//addfaz router/stun addition *Start*
//this is so we are not dealing with players already heard from.
for (i = 0; i < max; i++)
{
if (ip == allowed_addresses[i].host &&
port == allowed_addresses[i].port)
{
if (heard_from[i] != 0) //if we've heard from player already.
{
rc = 0;
}
}
}
//addfaz router/stun addition *End*
}
if ((rc > 0) && (ip) && ((ip != myip) || (port != udpport)))
{
char *ipstr = static_ipstring(ip);
for (i = 0; i < max; i++)
{
////addfaz NAT addition *START*////
if (natfree)
{
if (tmpmax[i] != 1)
{
if (allowed_addresses[i].host == ip)
{
if (allowed_addresses[i].port != port)
{
initprintf("network: Port number for player %d changed from %d to %d.\n",i,allowed_addresses[i].port,port);
/* initprintf("Different player Port Number detected. %s:%i\n",ipstr,
allowed_addresses[i].port);
initprintf("Changed to %s:%i, player may be behind a firewall.\n", ipstr, port); //addfaz NAT addition */
allowed_addresses[i].port = port;
}
}
}
}
////addfaz NAT addition *END*////
if ((ip == allowed_addresses[i].host) &&
(port == allowed_addresses[i].port)) //addfaz NAT line addition
{
break;
}
if ((bcast) && (allowed_addresses[i].host == 0))
break; /* select this slot. */
}
if (i == max)
initprintf("network: Disallowed player %s:%d ?!\n", ipstr, port);
else if (rc != sizeof(packet))
initprintf("network: Missized packet or fragment from %s:%i ?!\n", ipstr, port);
else if (packet.header != HEADER_PEER_GREETING)
initprintf("network: Unexpected packet type from %s:%i ?!\n", ipstr, port);
else if (heard_from[i] == 0)
{
packet.id = B_SWAP16(packet.id);
heard_from[i] = packet.id;
allowed_addresses[i].host = ip; /* bcast needs this. */
allowed_addresses[i].port = port;
remaining--;
initprintf("network: Connected to %s:%i (id 0x%X). %d player%s left.\n",
ipstr, port ,(int32_t) packet.id,
remaining, remaining == 1 ? "" : "s");
/* make sure they've heard from us at all... */
/* !!! FIXME: Could be fatal if packet is dropped... */
send_peer_greeting(allowed_addresses[i].host,
allowed_addresses[i].port,
my_id);
if (natfree)
{
itmp++; //addfaz router/stun addition (goto next player)
}
else
{
tmpmax[i] = 1; //addfaz line addition
}
}
}
}
if (quitevent)
{
initprintf("network: Connection attempt aborted.\n");
return(0);
}
/* ok, now everyone is talking to you. Sort them into player numbers... */
heard_from[max] = my_id; /* so we sort, too... */
allowed_addresses[max].host = myip;
allowed_addresses[max].port = udpport;
do
{
remaining = 0;
for (i = 0; i < max; i++)
{
if (heard_from[i] == heard_from[i+1]) /* blah. */
{
initprintf("network: ERROR: Two players have the same random ID!\n");
initprintf("network: ERROR: Please restart the game to generate new IDs.\n");
return(0);
}
else if (heard_from[i] > heard_from[i+1])
{
int32_t tmpi;
int16_t tmps;
tmps = heard_from[i];
heard_from[i] = heard_from[i+1];
heard_from[i+1] = tmps;
tmpi = allowed_addresses[i].host;
allowed_addresses[i].host = allowed_addresses[i+1].host;
allowed_addresses[i+1].host = tmpi;
tmps = allowed_addresses[i].port;
allowed_addresses[i].port = allowed_addresses[i+1].port;
allowed_addresses[i+1].port = tmps;
remaining = 1; /* yay for bubble sorting! */
}
}
}
while (remaining);
/*
* Now we're sorted. But, the local player is referred to by both his
* player number and player index ZERO, so bump everyone up one to
* their actual index and fill in local player as item zero.
*/
memmove(&allowed_addresses[1], &allowed_addresses[0],
sizeof(allowed_addresses) - sizeof(allowed_addresses[0]));
allowed_addresses[0].host = myip;
gcom->myconnectindex = 0;
for (i = 1; i <= gcom->numplayers; i++)
{
ip = (allowed_addresses[i].host);
if (ip == myip)
{
if (udpport == allowed_addresses[i].port)
gcom->myconnectindex = i;
}
initprintf("network: player #%i at %s:%i\n", i,static_ipstring(ip),allowed_addresses[i].port);
}
// assert(gcom->myconnectindex);
initprintf("network: We are player #%i\n", gcom->myconnectindex);
/*
* Ok, we should have specific IPs and ports for all players, and
* therefore shouldn't broadcast anymore. Disable permission to do so,
* just in case, so we aren't flooding the LAN with broadcasted packets.
*/
set_socket_broadcast(0);
return(1);
}
static int32_t parse_ip(const char *str, int32_t *ip)
{
int32_t ip1, ip2, ip3, ip4;
if (Bstrcasecmp(str, "any") == 0)
{
*ip = 0;
return(1);
}
if (sscanf(str, "%d.%d.%d.%d", &ip1, &ip2, &ip3, &ip4) != 4)
{
initprintf("\"%s\" is not a valid IP address.\n", str);
return(0);
}
/* we _should_ check that 0 <= ip? <= 255, but it'll fail later anyhow. */
*ip = (((ip1 & 0xFF) << 24) |
((ip2 & 0xFF) << 16) |
((ip3 & 0xFF) << 8) |
((ip4 & 0xFF)));
return(1);
}
static int32_t parse_interface(char *str, int32_t *ip, uint16_t *udpport)
{
char *ptr = strchr(str, ':');
if (ptr) /* portnum specified? */
*ptr = '\0';
if (!parse_ip(str, ip))
return(0);
*udpport = BUILD_DEFAULT_UDP_PORT;
if (ptr != NULL) /* port specified? */
{
ptr++;
if (Bstrcasecmp(ptr, "any") == 0)
*udpport = 0;
else
*udpport = (int16_t) atoi(ptr);
}
return(1);
}
static int32_t initialize_sockets(void)
{
#if PLATFORM_WIN32
int32_t rc;
WSADATA data;
// initprintf("initializing WinSock...\n");
rc = WSAStartup(0x0101, &data);
if (rc != 0)
{
initprintf("WinSock failed to initialize! [err==%d].\n", rc);
return(0);
}
else
{
/* initprintf("WinSock initialized.\n");
initprintf(" - Caller uses version %d.%d, highest supported is %d.%d.\n",
data.wVersion >> 8, data.wVersion & 0xFF,
data.wHighVersion >> 8, data.wHighVersion & 0xFF);
initprintf(" - Implementation description: [%s].\n", data.szDescription);
initprintf(" - System status: [%s].\n", data.szSystemStatus);
initprintf(" - Max sockets: %d.\n", data.iMaxSockets);
initprintf(" - Max UDP datagram size: %d.\n", data.iMaxUdpDg); */
}
#endif
return(1);
}
static void deinitialize_sockets(void)
{
#if PLATFORM_WIN32
WSACleanup();
#endif
}
int32_t isvalidipaddress(char *st)
{
int32_t i, bcnt, num;
bcnt = 0; num = 0;
for (i=0; st[i]; i++)
{
if (st[i] == '.') { bcnt++; num = 0; continue; }
if (st[i] == ':')
{
if (bcnt != 3) return(0);
num = 0;
for (i++; st[i]; i++)
{
if ((st[i] >= '0') && (st[i] <= '9'))
{ num = num*10+st[i]-'0'; if (num >= 65536) return(0); }
else return(0);
}
return(1);
}
if ((st[i] >= '0') && (st[i] <= '9'))
{ num = num*10+st[i]-'0'; if (num >= 256) return(0); }
}
return(bcnt == 3);
}
static int32_t parse_udp_config(int32_t argc, char **argv, gcomtype *gcom)
{
char *buf;
char *tok;
char *ptr;
int32_t ip = 0; /* interface */
int32_t bcast = 0;
buf = read_whole_file(argv[0]); /* we must free this. */
if (buf == NULL)
{
// do JF-style argv parsing here
int32_t i, j, daindex;
int32_t danetmode = 255;
char *st;
daindex = 0;
// if (!argv) return 0;
// go looking for the port, if specified
for (i=0; i<argc; i++)
{
if (argv[i][0] != '-' && argv[i][0] != '/') continue;
if ((argv[i][1] == 'p' || argv[i][1] == 'P') && argv[i][2])
{
char *p;
j = strtol(argv[i]+2, &p, 10);
if (!(*p) && j > 1024 && j<65535) udpport = j;
initprintf("network: Using port %d\n", udpport);
}
}
for (i=0; i<argc; i++)
{
if ((argv[i][0] == '-') || (argv[i][0] == '/'))
{
if ((argv[i][1] == 'N') || (argv[i][1] == 'n') || (argv[i][1] == 'I') || (argv[i][1] == 'i'))
{
gcom->numplayers = 1;
if (argv[i][2] == '0')
{
danetmode = 0;
udpmode = udpmode_client;
if ((argv[i][3] == ':') && (argv[i][4] >= '0') && (argv[i][4] <= '9'))
{
udpmode = udpmode_server;
gcom->numplayers = (argv[i][4]-'0');
if ((argv[i][5] >= '0') && (argv[i][5] <= '9')) gcom->numplayers = gcom->numplayers*10+(argv[i][5]-'0');
initprintf("network: %d-player game server\n", gcom->numplayers--);
}
initprintf("network: Master-slave mode\n");
}
else if (argv[i][2] == '1')
{
danetmode = 1;
udpmode = udpmode_peer;
myconnectindex = daindex;
// daindex++;
initprintf("network: Peer-to-peer mode\n");
}
continue;
}
else if ((argv[i][1] == 'P') || (argv[i][1] == 'p')) continue;
}
st = strdup(argv[i]);
if (!st) break;
if (isvalidipaddress(st))
{
// if ((danetmode == 1) && (daindex == myconnectindex)) daindex++;
parse_interface(st, &allowed_addresses[daindex].host, &allowed_addresses[daindex].port);
initprintf("network: Player %d at %s:%d\n",daindex,st,allowed_addresses[daindex].port);
daindex++;
}
else
{
struct hostent * lph;
uint16_t pt = BUILD_DEFAULT_UDP_PORT;
for (j=0; st[j]; j++)
if (st[j] == ':')
{ pt = (uint16_t)atol(&st[j+1]); st[j] = 0; break; }
if ((lph = gethostbyname(st)))
{
// if ((danetmode == 1) && (daindex == myconnectindex)) daindex++;
allowed_addresses[daindex].host = ntohl(*(int32_t *)lph->h_addr);
allowed_addresses[daindex].port = pt;
initprintf("network: Player %d at %s:%d (%s)\n",daindex,
inet_ntoa(*(struct in_addr *)lph->h_addr),pt,argv[i]);
daindex++;
}
else initprintf("network: Failed resolving %s\n",argv[i]);
}
free(st);
}
if ((danetmode == 255) && (daindex)) { gcom->numplayers = 2; udpmode = udpmode_client; } //an IP w/o /n# defaults to /n0
// if ((numplayers >= 2) && (daindex) && (!danetmode)) myconnectindex = 1;
if (daindex > gcom->numplayers) gcom->numplayers = daindex;
}
else
{
initprintf("network: Using '%s' as configuration file\n", argv[0]);
ptr = buf;
while ((tok = get_token(&ptr)) != NULL)
{
int32_t bogus = 1;
if (Bstrcasecmp(tok, "interface") == 0)
{
if ((tok = get_token(&ptr)) &&
(parse_interface(tok, &ip, &udpport)))
{
bogus = 0;
}
initprintf("network: Using interface %s:%d\n",
static_ipstring(ip), (int32_t) udpport);
}
else if (Bstrcasecmp(tok, "mode") == 0)
{
if ((tok = get_token(&ptr)) != NULL)
{
bogus = 0;
if (Bstrcasecmp(tok, "server") == 0)
udpmode = udpmode_server;
else if (Bstrcasecmp(tok, "client") == 0)
udpmode = udpmode_client;
else if (Bstrcasecmp(tok, "peer") == 0)
udpmode = udpmode_peer;
else
bogus = 1;
if (!bogus)
initprintf("You want to be in [%s] mode\n", tok);
}
}
else if (Bstrcasecmp(tok, "broadcast") == 0)
{
if ((tok = get_token(&ptr)) != NULL)
{
bcast = atoi(tok);
if (bcast > MAXPLAYERS - 1)
{
initprintf("WARNING: Too many broadcast players.\n");
bcast = MAXPLAYERS - 1;
}
bogus = 0;
}
}
else if (Bstrcasecmp(tok, "allow") == 0)
{
int32_t host;
uint16_t port=BUILD_DEFAULT_UDP_PORT;
if ((tok = get_token(&ptr)) != NULL)
{
if (gcom->numplayers >= MAXPLAYERS - 1)
initprintf("WARNING: Too many allowed IP addresses.\n");
else if (parse_interface(tok, &host, &port))
{
allowed_addresses[gcom->numplayers].host = host;
allowed_addresses[gcom->numplayers].port = port;
gcom->numplayers++;
bogus = 0;
}
}
}
else if (Bstrcasecmp(tok, "players") == 0)
{
if ((tok = get_token(&ptr)) != NULL)
{
bogus = 0;
if (udpmode == udpmode_server)
gcom->numplayers = atoi(tok)-1;
else
bogus = 1;
}
}
if (bogus)
initprintf("bogus token! [%s]\n", tok);
}
free(buf);
}
if (open_udp_socket(ip, udpport))
{
gcom->numplayers++; /* that's you. */
if (udpmode == udpmode_server)
return(wait_for_other_players(gcom, ip));
else if (udpmode == udpmode_client)
return(connect_to_server(gcom, ip));
else if (udpmode == udpmode_peer)
return(connect_to_everyone(gcom, ip, bcast));
initprintf("wtf?!"); /* Should be handled by a udpmode above... */
// assert(0);
}
return(0);
}
gcomtype *init_network_transport(int32_t argc, char **argv)
{
gcomtype *retval;
// initprintf("\n\nUDP NETWORK TRANSPORT INITIALIZING...\n");
if (!initialize_sockets())
return(NULL);
srand(time(NULL));
retval = (gcomtype *)malloc(sizeof(gcomtype));
if (retval != NULL)
{
int32_t rc;
// char *cfgfile = ARGV[argpos];
memset(retval, '\0', sizeof(gcomtype));
memset(allowed_addresses, '\0', sizeof(allowed_addresses));
udpsocket = -1;
udpport = BUILD_DEFAULT_UDP_PORT;
udpmode = udpmode_peer;
rc = parse_udp_config(argc, argv, retval);
if (!rc)
{
free(retval);
deinit_network_transport(NULL);
return(NULL);
}
// retval->gametype = 3; /* gametype: 1-serial,2-modem,3-net */
}
return(retval);
}
void deinit_network_transport(gcomtype *gcom)
{
// initprintf("\n\nUDP NETWORK TRANSPORT DEINITIALIZING...\n");
if (gcom != NULL)
{
initprintf(" ...freeing gcom structure...\n");
free(gcom);
}
if ((signed)udpsocket != -1)
{
initprintf(" ...closing socket...\n");
set_socket_blockmode(1); /* block while socket drains. */
shutdown(udpsocket, SOCKET_SHUTDOWN_BOTH);
socketclose(udpsocket);
udpsocket = -1;
}
deinitialize_sockets();
initprintf("UDP networking uninitialized successfully.\n");
}
void callcommit(void)
{
int32_t ip, i, rc;
uint16_t port;
if ((signed)udpsocket == -1)
return;
process_udp_send_queue();
switch (gcom->command)
{
case COMMIT_CMD_GET:
rc = get_udp_packet(&ip, &port, gcom->buffer, sizeof(gcom->buffer));
if (rc > 0)
{
gcom->numbytes = rc; /* size of new packet. */
for (i = 1; i <= gcom->numplayers; i++)
{
if ((allowed_addresses[i].host == ip) &&
(allowed_addresses[i].port == port))
{
gcom->other = i;
return;
}
}
/* if you manage to hit this, it'll report no packet avail. */
}
gcom->numbytes = 0;
gcom->other = -1; /* no packet available. */
break;
case COMMIT_CMD_SEND:
if ((gcom->other < 0) || (gcom->other > gcom->numplayers))
{
initprintf("NET TRANSPORT ERROR: send to player out of range\n");
return;
}
ip = allowed_addresses[gcom->other].host;
if (ip == 0) /* dropped player? */
return;
port = allowed_addresses[gcom->other].port;
if (!send_udp_packet(ip, port, gcom->buffer, gcom->numbytes))
{
initprintf("NET TRANSPORT ERROR: send failed to %s:%d\n",
static_ipstring(ip), (int32_t) port);
}
break;
case COMMIT_CMD_SENDTOALL:
/* skip player zero, 'cause that's a duplicate of local IP. */
for (i = 1; i <= gcom->numplayers; i++)
{
ip = allowed_addresses[i].host;
if (ip == 0) /* dropped player? */
continue;
port = allowed_addresses[i].port;
if (!send_udp_packet(ip, port, gcom->buffer, gcom->numbytes))
{
initprintf("NET TRANSPORT ERROR: send failed to %s:%d\n",
static_ipstring(ip), (int32_t) port);
}
}
break;
case COMMIT_CMD_SENDTOALLOTHERS:
/* skip player zero, 'cause that's a duplicate of local IP. */
for (i = 1; i <= gcom->numplayers; i++)
{
if (i == gcom->myconnectindex) /* local player. */
continue;
ip = allowed_addresses[i].host;
if (ip == 0) /* dropped player? */
continue;
port = allowed_addresses[i].port;
if (!send_udp_packet(ip, port, gcom->buffer, gcom->numbytes))
{
initprintf("NET TRANSPORT ERROR: send failed to %s:%d\n",
static_ipstring(ip), (int32_t) port);
}
}
break;
/* ?!
case COMMIT_CMD_SCORE:
break;
*/
default:
initprintf("NET TRANSPORT ERROR: Unknown command %d\n", gcom->command);
gcom->other = -1; /* oh well. */
break;
}
}
/* end of mmulti.c ... */