mirror of
https://github.com/ZDoom/Raze.git
synced 2024-11-17 09:51:28 +00:00
d79f544c22
git-svn-id: https://svn.eduke32.com/eduke32@1132 1a8010ca-5511-0410-912e-c29ae57300e0
2199 lines
64 KiB
C
2199 lines
64 KiB
C
/*
|
||
* "Build Engine & Tools" Copyright (c) 1993-1997 Ken Silverman
|
||
* Ken Silverman's official web site: "http://www.advsys.net/ken"
|
||
* See the included license file "BUILDLIC.TXT" for license info.
|
||
* This file has been modified from Ken Silverman's original release
|
||
*/
|
||
|
||
#include <stdio.h>
|
||
#include <stdlib.h>
|
||
#include <string.h>
|
||
#include <stdarg.h>
|
||
#include <ctype.h>
|
||
#include <time.h>
|
||
#include <sys/time.h> //HACK, for id generation
|
||
|
||
#include "mmulti_unstable.h"
|
||
// #include <enet/enet.h>
|
||
#include "compat.h"
|
||
#include "baselayer.h"
|
||
|
||
|
||
//STL
|
||
//#include <vector>
|
||
//#include "buildqueue.h"
|
||
|
||
// #include "platform.h"
|
||
|
||
#ifdef _WIN32
|
||
#define PLATFORM_WIN32 1
|
||
#else
|
||
#define PLATFORM_UNIX 1
|
||
#endif
|
||
|
||
#define UDP_NETWORKING 1
|
||
|
||
#include "pragmas.h"
|
||
|
||
#define MAXPLAYERS 16
|
||
#define BAKSIZ 16384
|
||
#define SIMULATEERRORS 0
|
||
#define SHOWSENDPACKETS 0
|
||
#define SHOWGETPACKETS 0
|
||
#define PRINTERRORS 0
|
||
|
||
#define updatecrc16(crc,dat) crc = (((crc<<8)&65535)^crctable[((((unsigned short)crc)>>8)&65535)^dat])
|
||
|
||
static int incnt[MAXPLAYERS], outcntplc[MAXPLAYERS], outcntend[MAXPLAYERS];
|
||
static char errorgotnum[MAXPLAYERS];
|
||
static char errorfixnum[MAXPLAYERS];
|
||
static char errorresendnum[MAXPLAYERS];
|
||
#if (PRINTERRORS)
|
||
static char lasterrorgotnum[MAXPLAYERS];
|
||
#endif
|
||
|
||
int crctable[256];
|
||
int tmpmax[8]; //addfaz variable addition (you could probs think of something better)
|
||
int itmp = 0; //addfaz router fix STUN
|
||
|
||
static char lastpacket[576], inlastpacket = 0;
|
||
static int lastpacketfrom, lastpacketleng;
|
||
|
||
extern int totalclock; /* MUST EXTERN 1 ANNOYING VARIABLE FROM GAME */
|
||
static int timeoutcount = 60, resendagaincount = 4, lastsendtime[MAXPLAYERS];
|
||
|
||
int natfree; //NatFree mode flag
|
||
|
||
static short bakpacketptr[MAXPLAYERS][256], bakpacketlen[MAXPLAYERS][256];
|
||
static char bakpacketbuf[BAKSIZ];
|
||
static int bakpacketplc = 0;
|
||
|
||
int myconnectindex, numplayers;
|
||
int connecthead, connectpoint2[MAXPLAYERS];
|
||
char syncstate = 0;
|
||
|
||
#define MAXPACKETSIZE 2048
|
||
typedef struct
|
||
{
|
||
short intnum; /* communication between Game and the driver */
|
||
short command; /* 1-send, 2-get */
|
||
short other; /* dest for send, set by get (-1 = no packet) */
|
||
short numbytes;
|
||
short myconnectindex;
|
||
short numplayers;
|
||
short gametype; /* gametype: 1-serial,2-modem,3-net */
|
||
short filler;
|
||
char buffer[MAXPACKETSIZE];
|
||
intptr_t longcalladdress;
|
||
} gcomtype;
|
||
static gcomtype *gcom;
|
||
|
||
/*
|
||
//
|
||
// Packet queue data structs
|
||
//
|
||
typedef struct packet_wrapper
|
||
{
|
||
unsigned long packetnumber;
|
||
gcomtype packet;
|
||
} PACKETWRAPPER;
|
||
|
||
typedef PACKETWRAPPER packet_buffer;
|
||
|
||
unsigned long currentpacketnumber[MAXPLAYERS];
|
||
|
||
//
|
||
// Packet Buffer
|
||
//
|
||
packet_buffer pBuff[256];
|
||
*/
|
||
|
||
|
||
/*
|
||
typedef struct
|
||
{
|
||
unsigned char buffer[MAXPACKETSIZE];
|
||
}PACKET;
|
||
*/
|
||
|
||
//typedef std::vector<PACKET> PacketQueue;
|
||
|
||
enum ECommitCMDs
|
||
{
|
||
COMMIT_CMD_SEND = 1,
|
||
COMMIT_CMD_GET = 2,
|
||
COMMIT_CMD_SENDTOALL = 3,
|
||
COMMIT_CMD_SENDTOALLOTHERS = 4,
|
||
COMMIT_CMD_SCORE = 5,
|
||
};
|
||
|
||
|
||
// Queue of out going packets.
|
||
//PacketQueue outgoingPacketQueue;
|
||
//outgoingPacketQueue.reserve(128);
|
||
|
||
gcomtype *init_network_transport(int argc, char **argv);
|
||
void deinit_network_transport(gcomtype *gcom);
|
||
//void callcommit(void);
|
||
void dosendpackets(int other);
|
||
|
||
|
||
void initcrc(void)
|
||
{
|
||
int i, j, k, a;
|
||
|
||
for (j=0;j<256;j++) /* Calculate CRC table */
|
||
{
|
||
k = (j<<8); a = 0;
|
||
for (i=7;i>=0;i--)
|
||
{
|
||
if (((k^a)&0x8000) > 0)
|
||
a = ((a<<1)&65535) ^ 0x1021; /* 0x1021 = genpoly */
|
||
else
|
||
a = ((a<<1)&65535);
|
||
k = ((k<<1)&65535);
|
||
}
|
||
crctable[j] = (a&65535);
|
||
}
|
||
}
|
||
|
||
|
||
int getcrc(char *buffer, int bufleng)
|
||
{
|
||
int i, j;
|
||
|
||
j = 0;
|
||
for (i=bufleng-1;i>=0;i--) updatecrc16(j,buffer[i]);
|
||
return(j&65535);
|
||
}
|
||
|
||
void initmultiplayers(int argc, char **argv)
|
||
{
|
||
int i;
|
||
|
||
UNREFERENCED_PARAMETER(argc);
|
||
|
||
initcrc();
|
||
for (i=0;i<MAXPLAYERS;i++)
|
||
{
|
||
incnt[i] = 0L;
|
||
outcntplc[i] = 0L;
|
||
outcntend[i] = 0L;
|
||
bakpacketlen[i][255] = -1;
|
||
}
|
||
|
||
// clear out the packet ordering
|
||
// memset(¤tpacketnumber, 0, sizeof(unsigned long) * MAXPLAYERS);
|
||
#if 0
|
||
for (i = argc - 1; i > 0; i--)
|
||
{
|
||
const char *arg = argv[i];
|
||
char ch = *arg;
|
||
if ((ch == '-') || (ch == '/'))
|
||
{
|
||
if (Bstrcasecmp(arg + 1, "net") == 0)
|
||
break;
|
||
}
|
||
}
|
||
#endif
|
||
|
||
if (!argc)
|
||
{
|
||
initprintf("mmulti_unstable: No configuration file specified!\n");
|
||
numplayers = 1; myconnectindex = 0;
|
||
connecthead = 0; connectpoint2[0] = -1;
|
||
return;
|
||
}
|
||
|
||
gcom = init_network_transport(argc, argv);
|
||
if (gcom == NULL)
|
||
{
|
||
initprintf("Network transport initialization failed. Aborting...\n");
|
||
numplayers = 1; myconnectindex = 0;
|
||
connecthead = 0; connectpoint2[0] = -1;
|
||
return;
|
||
}
|
||
|
||
numplayers = gcom->numplayers;
|
||
myconnectindex = gcom->myconnectindex-1;
|
||
#if (SIMULATEERRORS != 0)
|
||
srand(myconnectindex*24572457+345356);
|
||
#endif
|
||
connecthead = 0;
|
||
for (i=0;i<numplayers-1;i++) connectpoint2[i] = i+1;
|
||
connectpoint2[numplayers-1] = -1;
|
||
|
||
for (i=0;i<numplayers;i++) lastsendtime[i] = totalclock;
|
||
}
|
||
|
||
|
||
void dosendpackets(int other)
|
||
{
|
||
int i, j, k, messleng;
|
||
unsigned short dacrc;
|
||
|
||
if (outcntplc[other] == outcntend[other]) return;
|
||
|
||
#if (PRINTERRORS)
|
||
if (errorgotnum[other] > lasterrorgotnum[other])
|
||
{
|
||
lasterrorgotnum[other]++;
|
||
initprintf(" MeWant %ld",incnt[other]&255);
|
||
}
|
||
#endif
|
||
|
||
if (outcntplc[other]+1 == outcntend[other])
|
||
{ /* Send 1 sub-packet */
|
||
k = 0;
|
||
gcom->buffer[k++] = (outcntplc[other]&255);
|
||
gcom->buffer[k++] = (errorgotnum[other]&7)+((errorresendnum[other]&7)<<3);
|
||
gcom->buffer[k++] = (incnt[other]&255);
|
||
|
||
j = bakpacketptr[other][outcntplc[other]&255];
|
||
messleng = bakpacketlen[other][outcntplc[other]&255];
|
||
for (i=0;i<messleng;i++)
|
||
gcom->buffer[k++] = bakpacketbuf[(i+j)&(BAKSIZ-1)];
|
||
outcntplc[other]++;
|
||
}
|
||
else
|
||
{ /* Send 2 sub-packets */
|
||
k = 0;
|
||
gcom->buffer[k++] = (outcntplc[other]&255);
|
||
gcom->buffer[k++] = (errorgotnum[other]&7)+((errorresendnum[other]&7)<<3)+128;
|
||
gcom->buffer[k++] = (incnt[other]&255);
|
||
|
||
/* First half-packet */
|
||
j = bakpacketptr[other][outcntplc[other]&255];
|
||
messleng = bakpacketlen[other][outcntplc[other]&255];
|
||
gcom->buffer[k++] = (char)(messleng&255);
|
||
gcom->buffer[k++] = (char)(messleng>>8);
|
||
for (i=0;i<messleng;i++)
|
||
gcom->buffer[k++] = bakpacketbuf[(i+j)&(BAKSIZ-1)];
|
||
outcntplc[other]++;
|
||
|
||
/* Second half-packet */
|
||
j = bakpacketptr[other][outcntplc[other]&255];
|
||
messleng = bakpacketlen[other][outcntplc[other]&255];
|
||
for (i=0;i<messleng;i++)
|
||
gcom->buffer[k++] = bakpacketbuf[(i+j)&(BAKSIZ-1)];
|
||
outcntplc[other]++;
|
||
|
||
}
|
||
|
||
dacrc = getcrc(gcom->buffer,(short)k);
|
||
gcom->buffer[k++] = (dacrc&255);
|
||
gcom->buffer[k++] = (dacrc>>8);
|
||
|
||
gcom->other = other+1;
|
||
gcom->numbytes = k;
|
||
|
||
#if (SHOWSENDPACKETS)
|
||
initprintf("Send(%ld): ",gcom->other);
|
||
for (i=0;i<gcom->numbytes;i++) initprintf("%2x ",gcom->buffer[i]);
|
||
initprintf("\n");
|
||
#endif
|
||
|
||
#if (SIMULATEERRORS != 0)
|
||
if (!(rand()&SIMULATEERRORS)) gcom->buffer[rand()%gcom->numbytes] = (rand()&255);
|
||
if (rand()&SIMULATEERRORS)
|
||
#endif
|
||
{
|
||
gcom->command = COMMIT_CMD_SEND;
|
||
callcommit();
|
||
}
|
||
}
|
||
|
||
|
||
void sendpacket(int other, char *bufptr, int messleng)
|
||
{
|
||
int i = 0;
|
||
int j = 0;
|
||
|
||
if (numplayers < 2) return;
|
||
|
||
i = 0;
|
||
if (bakpacketlen[other][(outcntend[other]-1)&255] == messleng)
|
||
{
|
||
j = bakpacketptr[other][(outcntend[other]-1)&255];
|
||
for (i=messleng-1;i>=0;i--)
|
||
if (bakpacketbuf[(i+j)&(BAKSIZ-1)] != bufptr[i]) break;
|
||
}
|
||
bakpacketlen[other][outcntend[other]&255] = messleng;
|
||
|
||
if (i < 0) /* Point to last packet to save space on bakpacketbuf */
|
||
bakpacketptr[other][outcntend[other]&255] = j;
|
||
else
|
||
{
|
||
bakpacketptr[other][outcntend[other]&255] = bakpacketplc;
|
||
for (i=0;i<messleng;i++)
|
||
bakpacketbuf[(bakpacketplc+i)&(BAKSIZ-1)] = bufptr[i];
|
||
bakpacketplc = ((bakpacketplc+messleng)&(BAKSIZ-1));
|
||
}
|
||
outcntend[other]++;
|
||
|
||
lastsendtime[other] = totalclock;
|
||
dosendpackets(other);
|
||
}
|
||
|
||
|
||
void setpackettimeout(int datimeoutcount, int daresendagaincount)
|
||
{
|
||
UNREFERENCED_PARAMETER(datimeoutcount);
|
||
UNREFERENCED_PARAMETER(daresendagaincount);
|
||
// Don't do this it keeps '/f4' from working
|
||
// Though /f4 feels weird on my mouse.... slugish is the word...
|
||
/*
|
||
int i;
|
||
|
||
timeoutcount = datimeoutcount;
|
||
resendagaincount = daresendagaincount;
|
||
for(i=0;i<numplayers;i++) lastsendtime[i] = totalclock;
|
||
*/
|
||
}
|
||
|
||
|
||
void uninitmultiplayers(void)
|
||
{
|
||
deinit_network_transport(gcom);
|
||
gcom = NULL;
|
||
}
|
||
|
||
typedef enum
|
||
{
|
||
udpmode_peer,
|
||
udpmode_server,
|
||
udpmode_client
|
||
} udpmodes;
|
||
static udpmodes udpmode = udpmode_peer;
|
||
|
||
void sendlogon(void)
|
||
{
|
||
}
|
||
|
||
void sendlogoff(void)
|
||
{
|
||
int i;
|
||
char tempbuf[2];
|
||
|
||
tempbuf[0] = 255;
|
||
tempbuf[1] = myconnectindex;
|
||
for (i=connecthead;i>=0;i=connectpoint2[i])
|
||
{
|
||
if (i != myconnectindex)
|
||
sendpacket(i,tempbuf,2L);
|
||
if ((udpmode == udpmode_client) && (myconnectindex != connecthead)) break; //slaves in M/S mode only send to master
|
||
}
|
||
}
|
||
|
||
int getoutputcirclesize(void)
|
||
{
|
||
return(0);
|
||
}
|
||
|
||
void setsocket(int newsocket)
|
||
{
|
||
UNREFERENCED_PARAMETER(newsocket);
|
||
}
|
||
|
||
|
||
int getpacket(int *other, char *bufptr)
|
||
{
|
||
int i, messleng;
|
||
unsigned short dacrc;
|
||
|
||
if (numplayers < 2 || gcom == NULL) return(0);
|
||
|
||
for (i=connecthead;i>=0;i=connectpoint2[i])
|
||
{
|
||
if (i != myconnectindex)
|
||
{
|
||
// FIXME: this is probably not so great
|
||
if (udpmode != udpmode_peer) dosendpackets(i);
|
||
if (totalclock < lastsendtime[i]) lastsendtime[i] = totalclock;
|
||
if (totalclock > lastsendtime[i]+timeoutcount)
|
||
{
|
||
#if (PRINTERRORS)
|
||
initprintf(" TimeOut!");
|
||
#endif
|
||
errorgotnum[i] = errorfixnum[i]+1;
|
||
|
||
if ((outcntplc[i] == outcntend[i]) && (outcntplc[i] > 0))
|
||
{ outcntplc[i]--; lastsendtime[i] = totalclock; }
|
||
else
|
||
lastsendtime[i] += resendagaincount;
|
||
dosendpackets(i);
|
||
/* } */
|
||
}
|
||
}
|
||
if ((udpmode == udpmode_client) && (myconnectindex != connecthead)) break; //slaves in M/S mode only send to master
|
||
}
|
||
|
||
if (inlastpacket != 0)
|
||
{
|
||
/* 2ND half of good double-packet */
|
||
inlastpacket = 0;
|
||
*other = lastpacketfrom;
|
||
memcpy(bufptr,lastpacket,lastpacketleng);
|
||
return(lastpacketleng);
|
||
}
|
||
|
||
gcom->command = COMMIT_CMD_GET;
|
||
callcommit();
|
||
|
||
#if (SHOWGETPACKETS)
|
||
if (gcom->other != -1)
|
||
{
|
||
initprintf(" Get(%ld): ",gcom->other);
|
||
for (i=0;i<gcom->numbytes;i++) initprintf("%2x ",gcom->buffer[i]);
|
||
initprintf("\n");
|
||
}
|
||
#endif
|
||
|
||
if (gcom->other < 0) return(0);
|
||
*other = gcom->other-1;
|
||
|
||
messleng = gcom->numbytes;
|
||
|
||
dacrc = ((unsigned short)gcom->buffer[messleng-2]);
|
||
dacrc += (((unsigned short)gcom->buffer[messleng-1])<<8);
|
||
if (dacrc != getcrc(gcom->buffer,(short)(messleng-2))) /* CRC check */
|
||
{
|
||
#if (PRINTERRORS)
|
||
initprintf("\n%ld CRC",gcom->buffer[0]);
|
||
#endif
|
||
errorgotnum[*other] = errorfixnum[*other]+1;
|
||
return(0);
|
||
}
|
||
|
||
while ((errorfixnum[*other]&7) != ((gcom->buffer[1]>>3)&7))
|
||
errorfixnum[*other]++;
|
||
|
||
if ((gcom->buffer[1]&7) != (errorresendnum[*other]&7))
|
||
{
|
||
errorresendnum[*other]++;
|
||
outcntplc[*other] = (outcntend[*other]&0xffffff00)+gcom->buffer[2];
|
||
if (outcntplc[*other] > outcntend[*other]) outcntplc[*other] -= 256;
|
||
}
|
||
|
||
if (gcom->buffer[0] != (incnt[*other]&255)) /* CNT check */
|
||
{
|
||
if (((incnt[*other]-gcom->buffer[0])&255) > 32)
|
||
{
|
||
errorgotnum[*other] = errorfixnum[*other]+1;
|
||
#if (PRINTERRORS)
|
||
initprintf("\n%ld CNT",gcom->buffer[0]);
|
||
#endif
|
||
}
|
||
#if (PRINTERRORS)
|
||
else
|
||
{
|
||
if (!(gcom->buffer[1]&128)) /* single else double packet */
|
||
initprintf("\n%ld cnt",gcom->buffer[0]);
|
||
else
|
||
{
|
||
if (((gcom->buffer[0]+1)&255) == (incnt[*other]&255))
|
||
{
|
||
/* GOOD! Take second half of double packet */
|
||
#if (PRINTERRORS)
|
||
initprintf("\n%ld-%ld .<2E> ",gcom->buffer[0],(gcom->buffer[0]+1)&255);
|
||
#endif
|
||
messleng = ((int)gcom->buffer[3]) + (((int)gcom->buffer[4])<<8);
|
||
lastpacketleng = gcom->numbytes-7-messleng;
|
||
memcpy(bufptr,&gcom->buffer[messleng+5],lastpacketleng);
|
||
incnt[*other]++;
|
||
return(lastpacketleng);
|
||
}
|
||
else
|
||
initprintf("\n%ld-%ld cnt ",gcom->buffer[0],(gcom->buffer[0]+1)&255);
|
||
}
|
||
}
|
||
#endif
|
||
return(0);
|
||
}
|
||
|
||
/* PACKET WAS GOOD! */
|
||
if ((gcom->buffer[1]&128) == 0) /* Single packet */
|
||
{
|
||
#if (PRINTERRORS)
|
||
initprintf("\n%ld <20> ",gcom->buffer[0]);
|
||
#endif
|
||
|
||
messleng = gcom->numbytes-5;
|
||
|
||
memcpy(bufptr,&gcom->buffer[3],messleng);
|
||
|
||
incnt[*other]++;
|
||
return(messleng);
|
||
}
|
||
|
||
/* Double packet */
|
||
#if (PRINTERRORS)
|
||
initprintf("\n%ld-%ld <20><> ",gcom->buffer[0],(gcom->buffer[0]+1)&255);
|
||
#endif
|
||
|
||
messleng = ((int)gcom->buffer[3]) + (((int)gcom->buffer[4])<<8);
|
||
lastpacketleng = gcom->numbytes-7-messleng;
|
||
inlastpacket = 1; lastpacketfrom = *other;
|
||
|
||
memcpy(bufptr,&gcom->buffer[5],messleng);
|
||
memcpy(lastpacket,&gcom->buffer[messleng+5],lastpacketleng);
|
||
|
||
incnt[*other] += 2;
|
||
return(messleng);
|
||
}
|
||
|
||
void flushpackets()
|
||
{
|
||
#if 0
|
||
int i;
|
||
|
||
if (numplayers < 2) return;
|
||
|
||
do
|
||
{
|
||
gcom->command = COMMIT_CMD_GET;
|
||
callcommit();
|
||
}
|
||
while (gcom->other >= 0);
|
||
|
||
for (i=connecthead;i>=0;i=connectpoint2[i])
|
||
{
|
||
incnt[i] = 0L;
|
||
outcntplc[i] = 0L;
|
||
outcntend[i] = 0L;
|
||
errorgotnum[i] = 0;
|
||
errorfixnum[i] = 0;
|
||
errorresendnum[i] = 0;
|
||
lastsendtime[i] = totalclock;
|
||
}
|
||
#endif
|
||
}
|
||
|
||
void genericmultifunction(int other, char *bufptr, int messleng, int command)
|
||
{
|
||
if (numplayers < 2) return;
|
||
|
||
gcom->command = command;
|
||
gcom->numbytes = min(messleng,MAXPACKETSIZE);
|
||
copybuf(bufptr,gcom->buffer,(gcom->numbytes+3)>>2);
|
||
gcom->other = other+1;
|
||
callcommit();
|
||
|
||
}
|
||
|
||
#if UDP_NETWORKING
|
||
|
||
#if PLATFORM_WIN32
|
||
# include <winsock.h>
|
||
# define EWOULDBLOCK WSAEWOULDBLOCK
|
||
# define ECONNREFUSED WSAECONNRESET
|
||
# define socklen_t size_t
|
||
# define netstrerror() win32netstrerror()
|
||
# define neterrno() WSAGetLastError()
|
||
# define sockettype SOCKET
|
||
# define socketclose(x) closesocket(x)
|
||
#else
|
||
# include <sys/types.h>
|
||
# include <sys/socket.h>
|
||
# include <netinet/in.h>
|
||
# include <arpa/inet.h>
|
||
# include <netdb.h>
|
||
# include <sys/uio.h>
|
||
# include <sys/ioctl.h>
|
||
# include <sys/time.h>
|
||
# include <errno.h>
|
||
# include <fcntl.h>
|
||
# include <time.h>
|
||
# define netstrerror() strerror(errno)
|
||
# define neterrno() errno
|
||
# define sockettype int
|
||
# define socketclose(x) close(x)
|
||
# ifndef MSG_ERRQUEUE /* legacy glibc header workaround... */
|
||
# define MSG_ERRQUEUE 0x2000
|
||
# endif
|
||
#endif
|
||
|
||
#define SOCKET_SHUTDOWN_BOTH 2
|
||
|
||
#include "cache1d.h" /* kopen4load for cfg file. */
|
||
|
||
#define IPSEG1(ip) ((((unsigned int) ip) & 0xFF000000) >> 24)
|
||
#define IPSEG2(ip) ((((unsigned int) ip) & 0x00FF0000) >> 16)
|
||
#define IPSEG3(ip) ((((unsigned int) ip) & 0x0000FF00) >> 8)
|
||
#define IPSEG4(ip) ((((unsigned int) ip) & 0x000000FF) )
|
||
|
||
#define MAX_PLAYERS 16
|
||
#define BUILD_DEFAULT_UDP_PORT 23513 /* eh...why not? */
|
||
#define CLIENT_POLL_DELAY 5000 /* ms between pings at peer-to-peer startup. */
|
||
#define HEADER_PEER_GREETING 245
|
||
|
||
static sockettype udpsocket = -1;
|
||
static short udpport = BUILD_DEFAULT_UDP_PORT;
|
||
|
||
static struct
|
||
{
|
||
int host;
|
||
short port;
|
||
} allowed_addresses[MAX_PLAYERS]; /* only respond to these IPs. */
|
||
|
||
#if PLATFORM_WIN32
|
||
/*
|
||
* Figure out what the last failing Win32 API call was, and
|
||
* generate a human-readable string for the error message.
|
||
*
|
||
* The return value is a static buffer that is overwritten with
|
||
* each call to this function.
|
||
*
|
||
* Code lifted from PhysicsFS: http://icculus.org/physfs/
|
||
*/
|
||
static const char *win32netstrerror(void)
|
||
{
|
||
static TCHAR msgbuf[255];
|
||
TCHAR *ptr = msgbuf;
|
||
|
||
FormatMessage(
|
||
FORMAT_MESSAGE_FROM_SYSTEM |
|
||
FORMAT_MESSAGE_IGNORE_INSERTS,
|
||
NULL,
|
||
WSAGetLastError(), /*GetLastError(),*/
|
||
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), /* Default language */
|
||
msgbuf,
|
||
sizeof(msgbuf) / sizeof(TCHAR),
|
||
NULL
|
||
);
|
||
|
||
/* chop off newlines. */
|
||
for (ptr = msgbuf; *ptr; ptr++)
|
||
{
|
||
if ((*ptr == '\n') || (*ptr == '\r'))
|
||
{
|
||
*ptr = ' ';
|
||
break;
|
||
} /* if */
|
||
} /* for */
|
||
|
||
return((const char *) msgbuf);
|
||
} /* win32strerror */
|
||
#endif
|
||
|
||
static char *static_ipstring(int ip)
|
||
{
|
||
static char s[16];
|
||
sprintf(s, "%u.%u.%u.%u", IPSEG1(ip), IPSEG2(ip), IPSEG3(ip), IPSEG4(ip));
|
||
return(s);
|
||
}
|
||
|
||
|
||
static int send_udp_packet(int ip, short port, void *pkt, size_t pktsize)
|
||
{
|
||
/* !!! FIXME: See if this would ever block. */
|
||
/* !!! FIXME: See if this would send a partial packet. */
|
||
struct sockaddr_in addr;
|
||
int rc;
|
||
|
||
addr.sin_family = AF_INET;
|
||
addr.sin_addr.s_addr = htonl(ip);
|
||
addr.sin_port = htons(port);
|
||
|
||
rc = sendto(udpsocket, pkt, pktsize, 0,
|
||
(struct sockaddr *) &addr, sizeof(addr));
|
||
|
||
if (rc != (int) pktsize)
|
||
{
|
||
initprintf("sendto err rc==%d when sending %d to %s:%d [%s].\n",
|
||
rc, (int) pktsize, static_ipstring(ip), (int) port,
|
||
netstrerror());
|
||
return(0);
|
||
}
|
||
|
||
/*initprintf("Sent %d byte packet to %s:%d\n", (int) pktsize, static_ipstring(ip), (int) port);*/
|
||
|
||
return(1);
|
||
}
|
||
|
||
|
||
static void process_udp_send_queue(void)
|
||
{
|
||
/* Fill this in if the non-blocking socket becomes an issue. */
|
||
}
|
||
|
||
|
||
static int get_udp_packet(int *ip, short *_port, void *pkt, size_t pktsize)
|
||
{
|
||
int err = 0;
|
||
struct sockaddr_in addr;
|
||
short port;
|
||
socklen_t fromlen = sizeof(addr);
|
||
int valid = 0;
|
||
int i;
|
||
|
||
/* FIXME: Will this ever receive a partial packet? */
|
||
int rc = recvfrom(udpsocket, pkt, pktsize, 0, (struct sockaddr *) &addr,
|
||
#ifdef _WIN32
|
||
(int *)&fromlen);
|
||
#else
|
||
(unsigned int *)&fromlen);
|
||
#endif
|
||
|
||
if (rc == -1)
|
||
err = neterrno();
|
||
|
||
#if !PLATFORM_WIN32
|
||
/* !!! FIXME: Linux specific? */
|
||
if (rc == -1) /* fill in the addr structure on error... */
|
||
{
|
||
socklen_t l = sizeof(addr);
|
||
recvfrom(udpsocket, NULL, 0, MSG_ERRQUEUE,
|
||
(struct sockaddr *) &addr, &l);
|
||
}
|
||
#endif
|
||
|
||
*ip = ntohl(addr.sin_addr.s_addr);
|
||
port = ntohs(addr.sin_port);
|
||
if (_port)
|
||
*_port = port;
|
||
|
||
/*
|
||
* Reject packets from unallowed IPs. Prevents (ha) DoS attacks and
|
||
* other confusion...
|
||
*/
|
||
if (gcom == NULL)
|
||
{
|
||
if (natfree) //if stun is enabled
|
||
{
|
||
if ((allowed_addresses[itmp].host == *ip)
|
||
&& (allowed_addresses[itmp].port == port))
|
||
{
|
||
valid = 1; //only accept packets from the current player (itmp) and no one else
|
||
}
|
||
else
|
||
{
|
||
return 0; //reject packets from other players
|
||
}
|
||
}
|
||
else
|
||
{
|
||
valid = 1;
|
||
}
|
||
}
|
||
else
|
||
{
|
||
for (i = 1; i <= gcom->numplayers; i++)
|
||
{
|
||
if ((allowed_addresses[i].host == *ip)
|
||
&& (allowed_addresses[i].port == port))
|
||
|
||
{
|
||
valid = i;
|
||
|
||
//initprintf ("Packet received from %s:%d\n",static_ipstring(*ip), (int) port);
|
||
|
||
break;
|
||
}
|
||
|
||
}
|
||
}
|
||
|
||
/*if (!valid)
|
||
{
|
||
|
||
static int unallowed_ip_spam = 0;
|
||
if (unallowed_ip_spam <= 100)
|
||
{
|
||
initprintf("Packet received from unallowed IP %s:%d\n",
|
||
static_ipstring(*ip), (int) port);
|
||
if (unallowed_ip_spam == 100)
|
||
initprintf("(Disabling further unallowed IP spam.)\n");
|
||
unallowed_ip_spam++;
|
||
}
|
||
|
||
return(0);
|
||
} */
|
||
|
||
if (rc == -1)
|
||
{
|
||
if ((err == EAGAIN) || (err == EWOULDBLOCK))
|
||
rc = 0;
|
||
|
||
else if (err == ECONNREFUSED) //"connection reset by peer" in winsock
|
||
{
|
||
|
||
// This means that we sent a packet to an unopened port, and
|
||
// it responded by telling us to piss off. Take them out of the
|
||
// allowed list. We check gcom so that we don't worry about this
|
||
// during detection when game might still be loading elsewhere.
|
||
|
||
if (gcom != NULL)
|
||
{
|
||
allowed_addresses[valid].host = 0;
|
||
initprintf("%s:%d refused packets. Removed from game.\n",
|
||
static_ipstring(*ip), (int) port);
|
||
}
|
||
// !!! FIXME: Actually boot player, too.
|
||
}
|
||
|
||
else
|
||
{
|
||
initprintf("recvfrom err rc==%d when getting %d from %s:%d [%s].\n",
|
||
rc, (int) pktsize, static_ipstring(*ip), (int) port,
|
||
netstrerror());
|
||
}
|
||
}
|
||
//else initprintf("Got %d byte packet from %s:%d\n", (int) rc, static_ipstring(*ip), (int) port);
|
||
//initprintf( "IP from client %d", *ip);
|
||
return(rc);
|
||
}
|
||
|
||
|
||
static char *read_whole_file(const char *cfgfile)
|
||
{
|
||
char *buf;
|
||
int len, rc;
|
||
int handle;
|
||
|
||
if (cfgfile == NULL)
|
||
return(NULL);
|
||
|
||
handle = kopen4load((char *)cfgfile, 0);
|
||
if (handle == -1)
|
||
{
|
||
// initprintf("ERROR: Failed to open config file [%s].\n", cfgfile);
|
||
return(NULL);
|
||
}
|
||
|
||
len = kfilelength(handle);
|
||
buf = (char *) malloc(len + 2);
|
||
if (!buf)
|
||
{
|
||
kclose(handle);
|
||
return(NULL);
|
||
}
|
||
|
||
rc = kread(handle, buf, len);
|
||
kclose(handle);
|
||
if (rc != len)
|
||
{
|
||
free(buf);
|
||
return(NULL);
|
||
}
|
||
|
||
buf[len] = '\0';
|
||
buf[len+1] = '\0';
|
||
return(buf);
|
||
}
|
||
|
||
static char *get_token(char **ptr)
|
||
{
|
||
char *retval;
|
||
char *p = *ptr;
|
||
if (*p == '\0')
|
||
return(NULL);
|
||
|
||
while ((*p != '\0') && (isspace(*p)))
|
||
p++;
|
||
|
||
if (*p == '\0') /* nothing but whitespace. */
|
||
return(NULL);
|
||
|
||
retval = p;
|
||
while ((*p != '\0') && (!isspace(*p)))
|
||
p++;
|
||
|
||
*p = '\0';
|
||
*ptr = p + 1;
|
||
|
||
/*initprintf("Got token [%s].\n", retval);*/
|
||
return(retval);
|
||
}
|
||
|
||
static int set_socket_blockmode(int onOrOff)
|
||
{
|
||
unsigned int flags;
|
||
int rc = 0;
|
||
|
||
/* set socket to be (non-)blocking. */
|
||
|
||
#if PLATFORM_WIN32
|
||
flags = (onOrOff) ? 0 : 1;
|
||
rc = (ioctlsocket(udpsocket, FIONBIO, (void *) &flags) == 0);
|
||
#else
|
||
flags = fcntl(udpsocket, F_GETFL, 0);
|
||
if ((signed)flags != -1)
|
||
{
|
||
if (onOrOff)
|
||
flags &= ~O_NONBLOCK;
|
||
else
|
||
flags |= O_NONBLOCK;
|
||
rc = (fcntl(udpsocket, F_SETFL, flags) == 0);
|
||
}
|
||
#endif
|
||
|
||
if (!rc)
|
||
{
|
||
initprintf("set socket %sblocking failed: %s\n",
|
||
((onOrOff) ? "" : "non-"), netstrerror());
|
||
}
|
||
|
||
return(rc);
|
||
}
|
||
|
||
|
||
static int set_socket_broadcast(int onOrOff)
|
||
{
|
||
int f = (onOrOff) ? 1 : 0;
|
||
int rc;
|
||
|
||
/* give socket clearance to broadcast. */
|
||
rc = setsockopt(udpsocket, SOL_SOCKET, SO_BROADCAST, (char *)(&f), sizeof(f)) == 0;
|
||
if (!rc)
|
||
{
|
||
initprintf("%sset SO_BROADCAST failed: %s\n",
|
||
((onOrOff) ? "" : "un"), netstrerror());
|
||
}
|
||
|
||
return(rc);
|
||
}
|
||
|
||
|
||
static int open_udp_socket(int ip, int port)
|
||
{
|
||
struct sockaddr_in addr;
|
||
|
||
// initprintf("Setting up UDP interface %s:%d...\n", static_ipstring(ip), port);
|
||
if (natfree)
|
||
{
|
||
//initprintf("Stun is currently %s\n", (natfree) ? "Enabled":"Disabled");
|
||
initprintf("mmulti_unstable: Stun enabled\n");
|
||
}
|
||
|
||
udpsocket = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
||
if ((signed)udpsocket == -1)
|
||
{
|
||
initprintf("socket creation failed: %s\n", netstrerror());
|
||
return(0);
|
||
}
|
||
|
||
if (!set_socket_blockmode(0))
|
||
return(0);
|
||
|
||
#if !PLATFORM_WIN32
|
||
{
|
||
/* !!! FIXME: Might be Linux (not Unix, not BSD, not WinSock) specific. */
|
||
int flags = 1;
|
||
setsockopt(udpsocket, SOL_IP, IP_RECVERR, &flags, sizeof(flags));
|
||
}
|
||
#endif
|
||
|
||
memset(&addr, '\0', sizeof(addr));
|
||
addr.sin_family = AF_INET;
|
||
addr.sin_addr.s_addr = htonl(ip);
|
||
addr.sin_port = htons((unsigned short)port);
|
||
if (bind(udpsocket, (struct sockaddr *) &addr, sizeof(addr)) == -1)
|
||
{
|
||
initprintf("socket binding failed: %s\n", netstrerror());
|
||
return(0);
|
||
}
|
||
|
||
return(1);
|
||
}
|
||
|
||
typedef struct
|
||
{
|
||
unsigned char dummy1; /* so these don't confuse game after load. */
|
||
unsigned char dummy2; /* so these don't confuse game after load. */
|
||
unsigned char dummy3; /* so these don't confuse game after load. */
|
||
unsigned char header; /* always HEADER_PEER_GREETING (245). */
|
||
unsigned short id;
|
||
} PacketPeerGreeting;
|
||
|
||
|
||
static void send_peer_greeting(int ip, short port, short myid)
|
||
{
|
||
PacketPeerGreeting packet;
|
||
memset(&packet, '\0', sizeof(packet));
|
||
packet.header = HEADER_PEER_GREETING;
|
||
packet.id = B_SWAP16(myid);
|
||
send_udp_packet(ip, port, &packet, sizeof(packet));
|
||
}
|
||
|
||
/* server init. */
|
||
static int wait_for_other_players(gcomtype *gcom, int myip)
|
||
{
|
||
PacketPeerGreeting packet;
|
||
unsigned short my_id = 1;
|
||
int i, j;
|
||
int rc;
|
||
int ip;
|
||
short port;
|
||
unsigned short heard_from[MAX_PLAYERS];
|
||
int max;
|
||
int remaining;
|
||
|
||
memset(heard_from, '\0', sizeof(heard_from));
|
||
|
||
remaining = max = gcom->numplayers - 1;
|
||
|
||
initprintf("Waiting for %d player%s...\n", remaining, remaining==1 ? "":"s");
|
||
if (remaining == 0)
|
||
{
|
||
initprintf("Hmmm... don't have time to play with myself!\n");
|
||
return(0);
|
||
}
|
||
|
||
while (remaining && !quitevent)
|
||
{
|
||
handleevents();
|
||
|
||
idle();
|
||
|
||
process_udp_send_queue();
|
||
|
||
rc = get_udp_packet(&ip, &port, &packet, sizeof(packet));
|
||
|
||
//this is so we don't get unexpected packet errors from players already heard from
|
||
|
||
if ((rc > 0) && (ip) && ((ip != myip) || (port != udpport)))
|
||
{
|
||
char *ipstr = static_ipstring(ip);
|
||
|
||
if (rc != sizeof(packet))
|
||
{
|
||
initprintf("mmulti_unstable: Missized packet or fragment from %s:%i ?!\n", ipstr, port);
|
||
continue;
|
||
}
|
||
else if (packet.header != HEADER_PEER_GREETING)
|
||
{
|
||
initprintf("mmulti_unstable: Unexpected packet type from %s:%i ?!\n", ipstr, port);
|
||
continue;
|
||
}
|
||
|
||
for (i = 0; i < max; i++)
|
||
{
|
||
if (!heard_from[i] || heard_from[i] == B_SWAP16(packet.id))
|
||
break;
|
||
}
|
||
|
||
if (i == max)
|
||
initprintf("mmulti_unstable: Disallowed player %s:%d ?!\n", ipstr, port);
|
||
else if (heard_from[i] == 0)
|
||
{
|
||
packet.id = B_SWAP16(packet.id);
|
||
heard_from[i] = packet.id;
|
||
allowed_addresses[i].host = ip; /* bcast needs this. */
|
||
allowed_addresses[i].port = port;
|
||
remaining--;
|
||
|
||
initprintf("%s:%i (id 0x%X) connected, %d player%s left.\n",
|
||
ipstr, port ,(int) packet.id,
|
||
remaining, remaining == 1 ? "" : "s");
|
||
|
||
/* make sure they've heard from us at all... */
|
||
/* !!! FIXME: Could be fatal if packet is dropped... */
|
||
|
||
send_peer_greeting(allowed_addresses[i].host,
|
||
allowed_addresses[i].port,
|
||
my_id);
|
||
|
||
// resend greeting to other clients so they get ID for sorting
|
||
/* for (j=i;j>=0;j--)
|
||
{
|
||
int ii;
|
||
for (ii = 1; ii < max; ii++)
|
||
send_peer_greeting(allowed_addresses[j].host,
|
||
allowed_addresses[j].port,
|
||
heard_from[ii]);
|
||
|
||
send_peer_greeting(allowed_addresses[j].host,
|
||
allowed_addresses[j].port,
|
||
heard_from[i]);
|
||
}*/
|
||
}
|
||
}
|
||
}
|
||
|
||
if (quitevent)
|
||
{
|
||
initprintf("Connection attempt aborted.\n");
|
||
return(0);
|
||
}
|
||
|
||
// found all the clients expected so send them our greeting
|
||
for (j=max;j>=0;j--)
|
||
if (allowed_addresses[j].host)
|
||
{
|
||
int ii;
|
||
for (ii = 0; ii < max; ii++)
|
||
send_peer_greeting(allowed_addresses[j].host,
|
||
allowed_addresses[j].port,
|
||
heard_from[ii]);
|
||
|
||
send_peer_greeting(allowed_addresses[j].host,
|
||
allowed_addresses[j].port,
|
||
1337);
|
||
}
|
||
|
||
/* ok, now everyone is talking to you. Sort them into player numbers... */
|
||
|
||
heard_from[max] = my_id; /* so we sort, too... */
|
||
allowed_addresses[max].host = myip;
|
||
allowed_addresses[max].port = udpport;
|
||
|
||
do
|
||
{
|
||
remaining = 0;
|
||
for (i = 0; i < max; i++)
|
||
{
|
||
if (heard_from[i] == heard_from[i+1]) /* blah. */
|
||
{
|
||
initprintf("mmulti_unstable: ERROR: Two players have the same random ID!\n");
|
||
initprintf("mmulti_unstable: ERROR: Please restart the game to generate new IDs.\n");
|
||
return(0);
|
||
}
|
||
|
||
else if (heard_from[i] > heard_from[i+1])
|
||
{
|
||
int tmpi;
|
||
short tmps;
|
||
|
||
tmps = heard_from[i];
|
||
heard_from[i] = heard_from[i+1];
|
||
heard_from[i+1] = tmps;
|
||
|
||
tmpi = allowed_addresses[i].host;
|
||
allowed_addresses[i].host = allowed_addresses[i+1].host;
|
||
allowed_addresses[i+1].host = tmpi;
|
||
|
||
tmps = allowed_addresses[i].port;
|
||
allowed_addresses[i].port = allowed_addresses[i+1].port;
|
||
allowed_addresses[i+1].port = tmps;
|
||
|
||
remaining = 1; /* yay for bubble sorting! */
|
||
}
|
||
}
|
||
}
|
||
while (remaining);
|
||
|
||
/*
|
||
* Now we're sorted. But, the local player is referred to by both his
|
||
* player number and player index ZERO, so bump everyone up one to
|
||
* their actual index and fill in local player as item zero.
|
||
*/
|
||
|
||
memmove(&allowed_addresses[1], &allowed_addresses[0],
|
||
sizeof(allowed_addresses) - sizeof(allowed_addresses[0]));
|
||
allowed_addresses[0].host = myip;
|
||
|
||
gcom->myconnectindex = 0;
|
||
for (i = 1; i <= gcom->numplayers; i++)
|
||
{
|
||
ip = (allowed_addresses[i].host);
|
||
|
||
|
||
if (ip == myip)
|
||
{
|
||
if (udpport == allowed_addresses[i].port)
|
||
gcom->myconnectindex = i;
|
||
}
|
||
|
||
initprintf("mmulti_unstable: player #%i at %s:%i\n", i,static_ipstring(ip),allowed_addresses[i].port);
|
||
}
|
||
// assert(gcom->myconnectindex);
|
||
|
||
initprintf("mmulti_unstable: We are player #%i\n", gcom->myconnectindex);
|
||
|
||
return(1);
|
||
}
|
||
|
||
/* client init. */
|
||
static int connect_to_server(gcomtype *gcom, int myip)
|
||
{
|
||
PacketPeerGreeting packet;
|
||
unsigned short my_id = 0;
|
||
int i;
|
||
int rc;
|
||
int ip;
|
||
short port;
|
||
int first_send = 1;
|
||
unsigned short heard_from[MAX_PLAYERS];
|
||
unsigned int resendat;
|
||
int max;
|
||
int remaining;
|
||
|
||
memset(heard_from, '\0', sizeof(heard_from));
|
||
|
||
gcom->numplayers = 2;
|
||
|
||
while (my_id == 0) /* player number is based on id, low to high. */
|
||
{
|
||
struct timeval tv;
|
||
gettimeofday(&tv, NULL);
|
||
my_id = (unsigned short)tv.tv_usec; //HACK
|
||
}
|
||
|
||
initprintf("mmulti_unstable: Using 0x%X as client ID\n", my_id);
|
||
|
||
resendat = getticks();
|
||
remaining = max = gcom->numplayers - 1;
|
||
|
||
initprintf("Waiting for %d player%s...\n", remaining, remaining==1 ? "":"s");
|
||
if (remaining == 0)
|
||
{
|
||
initprintf("Hmmm... don't have time to play with myself!\n");
|
||
return(0);
|
||
}
|
||
|
||
while (remaining && !quitevent)
|
||
{
|
||
handleevents();
|
||
|
||
if (resendat <= getticks())
|
||
{
|
||
for (i = 0; (i < max) || natfree ; i++)
|
||
{
|
||
|
||
//only checking one player at a time works
|
||
//this is where special formatting of allow lines comes in
|
||
if (!heard_from[i])
|
||
{
|
||
initprintf("%s %s:%d...\n",first_send?"Connecting to":"Retrying",
|
||
static_ipstring(allowed_addresses[i].host),allowed_addresses[i].port);
|
||
|
||
send_peer_greeting(allowed_addresses[i].host,
|
||
allowed_addresses[i].port,
|
||
my_id);
|
||
}
|
||
}
|
||
first_send = 0;
|
||
resendat += CLIENT_POLL_DELAY;
|
||
}
|
||
|
||
idle();
|
||
process_udp_send_queue();
|
||
|
||
rc = get_udp_packet(&ip, &port, &packet, sizeof(packet));
|
||
|
||
//this is so we don't get unexpected packet errors from players already heard from
|
||
|
||
if ((rc > 0) && (ip) && ((ip != myip) || (port != udpport)))
|
||
{
|
||
char *ipstr = static_ipstring(ip);
|
||
|
||
if (rc != sizeof(packet))
|
||
{
|
||
initprintf("mmulti_unstable: Missized packet or fragment from %s:%i ?!\n", ipstr, port);
|
||
continue;
|
||
}
|
||
else if (packet.header != HEADER_PEER_GREETING)
|
||
{
|
||
initprintf("mmulti_unstable: Unexpected packet type from %s:%i ?!\n", ipstr, port);
|
||
continue;
|
||
}
|
||
|
||
for (i=0;i<MAX_PLAYERS;i++)
|
||
if (!heard_from[i] || heard_from[i] == B_SWAP16(packet.id)) break; // only increase once
|
||
|
||
if (B_SWAP16(packet.id) == 1337)
|
||
{
|
||
remaining = 0;
|
||
continue;
|
||
}
|
||
else if (heard_from[i] == 0 && B_SWAP16(packet.id) == 1)
|
||
{
|
||
packet.id = B_SWAP16(packet.id);
|
||
heard_from[i] = packet.id;
|
||
// allowed_addresses[i].host = ip; /* bcast needs this. */
|
||
// allowed_addresses[i].port = port;
|
||
|
||
initprintf("Connected to %s:%i\n",
|
||
ipstr, port);
|
||
initprintf("Waiting for server to launch game\n");
|
||
}
|
||
else
|
||
{
|
||
// for (i=0;i<MAX_PLAYERS;i++)
|
||
{
|
||
if (heard_from[i] == 0 && B_SWAP16(packet.id) != my_id)
|
||
{
|
||
packet.id = B_SWAP16(packet.id);
|
||
heard_from[i] = packet.id;
|
||
|
||
initprintf("New player with id 0x%X\n",
|
||
(int) packet.id);
|
||
gcom->numplayers++;
|
||
max++;
|
||
// initprintf("max %d np %d\n",max,gcom->numplayers);
|
||
}
|
||
}
|
||
}
|
||
}
|
||
}
|
||
|
||
if (quitevent)
|
||
{
|
||
initprintf("Connection attempt aborted.\n");
|
||
return(0);
|
||
}
|
||
|
||
/* ok, now everyone is talking to you. Sort them into player numbers... */
|
||
|
||
heard_from[max] = my_id; /* so we sort, too... */
|
||
allowed_addresses[max].host = myip;
|
||
allowed_addresses[max].port = udpport;
|
||
|
||
do
|
||
{
|
||
remaining = 0;
|
||
for (i = 0; i < max; i++)
|
||
{
|
||
if (heard_from[i] == heard_from[i+1]) /* blah. */
|
||
{
|
||
initprintf("mmulti_unstable: ERROR: Two players have the same random ID!\n");
|
||
initprintf("mmulti_unstable: ERROR: Please restart the game to generate new IDs.\n");
|
||
return(0);
|
||
}
|
||
|
||
else if (heard_from[i] > heard_from[i+1])
|
||
{
|
||
int tmpi;
|
||
short tmps;
|
||
|
||
tmps = heard_from[i];
|
||
heard_from[i] = heard_from[i+1];
|
||
heard_from[i+1] = tmps;
|
||
|
||
tmpi = allowed_addresses[i].host;
|
||
allowed_addresses[i].host = allowed_addresses[i+1].host;
|
||
allowed_addresses[i+1].host = tmpi;
|
||
|
||
tmps = allowed_addresses[i].port;
|
||
allowed_addresses[i].port = allowed_addresses[i+1].port;
|
||
allowed_addresses[i+1].port = tmps;
|
||
|
||
remaining = 1; /* yay for bubble sorting! */
|
||
}
|
||
}
|
||
}
|
||
while (remaining);
|
||
|
||
/*
|
||
* Now we're sorted. But, the local player is referred to by both his
|
||
* player number and player index ZERO, so bump everyone up one to
|
||
* their actual index and fill in local player as item zero.
|
||
*/
|
||
|
||
memmove(&allowed_addresses[1], &allowed_addresses[0],
|
||
sizeof(allowed_addresses) - sizeof(allowed_addresses[0]));
|
||
allowed_addresses[0].host = myip;
|
||
|
||
gcom->myconnectindex = 0;
|
||
for (i = 1; i <= gcom->numplayers; i++)
|
||
{
|
||
ip = (allowed_addresses[i].host);
|
||
|
||
if (ip == myip)
|
||
{
|
||
if (udpport == allowed_addresses[i].port)
|
||
gcom->myconnectindex = i;
|
||
}
|
||
|
||
initprintf("mmulti_unstable: player #%i with id %d\n", i,heard_from[i]);
|
||
}
|
||
// assert(gcom->myconnectindex);
|
||
|
||
initprintf("mmulti_unstable: We are player #%i\n", gcom->myconnectindex);
|
||
|
||
return(1);
|
||
}
|
||
|
||
|
||
/* peer to peer init. */
|
||
static int connect_to_everyone(gcomtype *gcom, int myip, int bcast)
|
||
{
|
||
PacketPeerGreeting packet;
|
||
unsigned short my_id = 0;
|
||
int i;
|
||
int rc;
|
||
int ip;
|
||
short port;
|
||
int first_send = 1;
|
||
unsigned short heard_from[MAX_PLAYERS];
|
||
unsigned int resendat;
|
||
int max;
|
||
int remaining;
|
||
|
||
if (bcast)
|
||
{
|
||
if (gcom->numplayers > 1)
|
||
{
|
||
initprintf("mmulti_unstable: Error: can't do both 'broadcast' and 'allow'.\n");
|
||
return(0);
|
||
}
|
||
|
||
if (!set_socket_broadcast(1))
|
||
return(0);
|
||
|
||
gcom->numplayers = bcast + 1;
|
||
}
|
||
|
||
memset(heard_from, '\0', sizeof(heard_from));
|
||
|
||
while (my_id == 0) /* player number is based on id, low to high. */
|
||
{
|
||
struct timeval tv;
|
||
gettimeofday(&tv, NULL);
|
||
my_id = (unsigned short)tv.tv_usec; //HACK
|
||
}
|
||
|
||
|
||
initprintf("mmulti_unstable: Using 0x%X as client ID\n", my_id);
|
||
|
||
resendat = getticks();
|
||
remaining = max = gcom->numplayers - 1;
|
||
|
||
initprintf("Waiting for %d player%s...\n", remaining, remaining==1 ? "":"s");
|
||
if (remaining == 0)
|
||
{
|
||
initprintf("Hmmm... don't have time to play with myself!\n");
|
||
return(0);
|
||
}
|
||
|
||
while (remaining && !quitevent)
|
||
{
|
||
handleevents();
|
||
|
||
if (resendat <= getticks())
|
||
{
|
||
if (bcast)
|
||
{
|
||
initprintf("%sroadcasting greeting...\n", first_send ? "B":"Reb");
|
||
/* !!! FIXME: This is...probably not right. */
|
||
send_peer_greeting(0xFFFFFFFF, udpport, my_id);
|
||
}
|
||
else
|
||
{
|
||
for (i = 0; (i < max) || natfree ; i++)
|
||
{
|
||
|
||
//only checking one player at a time works
|
||
//this is where special formatting of allow lines comes in
|
||
if (natfree)
|
||
{
|
||
i = itmp; //addfaz router fix
|
||
}
|
||
|
||
if (!heard_from[i])
|
||
{
|
||
initprintf("%s %s:%d...\n",first_send?"Connecting to":"Retrying",
|
||
static_ipstring(allowed_addresses[i].host),allowed_addresses[i].port);
|
||
|
||
send_peer_greeting(allowed_addresses[i].host,
|
||
allowed_addresses[i].port,
|
||
my_id);
|
||
}
|
||
|
||
// If this is stun-enabled then don't loop.
|
||
if (natfree)
|
||
{
|
||
break;
|
||
}
|
||
}
|
||
}
|
||
first_send = 0;
|
||
resendat += CLIENT_POLL_DELAY;
|
||
}
|
||
|
||
idle();
|
||
process_udp_send_queue();
|
||
|
||
rc = get_udp_packet(&ip, &port, &packet, sizeof(packet));
|
||
|
||
//this is so we don't get unexpected packet errors from players already heard from
|
||
|
||
if (natfree)
|
||
{
|
||
//addfaz router/stun addition *Start*
|
||
//this is so we are not dealing with players already heard from.
|
||
for (i = 0; i < max; i++)
|
||
{
|
||
if (ip == allowed_addresses[i].host &&
|
||
port == allowed_addresses[i].port)
|
||
{
|
||
if (heard_from[i] != 0) //if we've heard from player already.
|
||
{
|
||
rc = 0;
|
||
}
|
||
}
|
||
}
|
||
//addfaz router/stun addition *End*
|
||
}
|
||
|
||
|
||
if ((rc > 0) && (ip) && ((ip != myip) || (port != udpport)))
|
||
{
|
||
char *ipstr = static_ipstring(ip);
|
||
|
||
for (i = 0; i < max; i++)
|
||
{
|
||
|
||
////addfaz NAT addition *START*////
|
||
if (natfree)
|
||
{
|
||
if (tmpmax[i] != 1)
|
||
{
|
||
if (allowed_addresses[i].host == ip)
|
||
{
|
||
if (allowed_addresses[i].port != port)
|
||
{
|
||
initprintf("mmulti_unstable: Port number for player %d changed from %d to %d.\n",i,allowed_addresses[i].port,port);
|
||
/* initprintf("Different player Port Number detected. %s:%i\n",ipstr,
|
||
allowed_addresses[i].port);
|
||
initprintf("Changed to %s:%i, player may be behind a firewall.\n", ipstr, port); //addfaz NAT addition */
|
||
allowed_addresses[i].port = port;
|
||
}
|
||
}
|
||
}
|
||
}
|
||
////addfaz NAT addition *END*////
|
||
|
||
if ((ip == allowed_addresses[i].host) &&
|
||
(port == allowed_addresses[i].port)) //addfaz NAT line addition
|
||
{
|
||
break;
|
||
}
|
||
|
||
if ((bcast) && (allowed_addresses[i].host == 0))
|
||
break; /* select this slot. */
|
||
|
||
}
|
||
|
||
if (i == max)
|
||
initprintf("mmulti_unstable: Disallowed player %s:%d ?!\n", ipstr, port);
|
||
|
||
else if (rc != sizeof(packet))
|
||
initprintf("mmulti_unstable: Missized packet or fragment from %s:%i ?!\n", ipstr, port);
|
||
|
||
else if (packet.header != HEADER_PEER_GREETING)
|
||
initprintf("mmulti_unstable: Unexpected packet type from %s:%i ?!\n", ipstr, port);
|
||
|
||
else if (heard_from[i] == 0)
|
||
{
|
||
packet.id = B_SWAP16(packet.id);
|
||
heard_from[i] = packet.id;
|
||
allowed_addresses[i].host = ip; /* bcast needs this. */
|
||
allowed_addresses[i].port = port;
|
||
remaining--;
|
||
|
||
initprintf("Connected to %s:%i (id 0x%X). %d player%s to go.\n",
|
||
ipstr, port ,(int) packet.id,
|
||
remaining, remaining == 1 ? "" : "s");
|
||
|
||
/* make sure they've heard from us at all... */
|
||
/* !!! FIXME: Could be fatal if packet is dropped... */
|
||
send_peer_greeting(allowed_addresses[i].host,
|
||
allowed_addresses[i].port,
|
||
my_id);
|
||
|
||
if (natfree)
|
||
{
|
||
itmp++; //addfaz router/stun addition (goto next player)
|
||
}
|
||
else
|
||
{
|
||
tmpmax[i] = 1; //addfaz line addition
|
||
}
|
||
}
|
||
}
|
||
}
|
||
|
||
if (quitevent)
|
||
{
|
||
initprintf("Connection attempt aborted.\n");
|
||
return(0);
|
||
}
|
||
|
||
/* ok, now everyone is talking to you. Sort them into player numbers... */
|
||
|
||
heard_from[max] = my_id; /* so we sort, too... */
|
||
allowed_addresses[max].host = myip;
|
||
allowed_addresses[max].port = udpport;
|
||
|
||
do
|
||
{
|
||
remaining = 0;
|
||
for (i = 0; i < max; i++)
|
||
{
|
||
if (heard_from[i] == heard_from[i+1]) /* blah. */
|
||
{
|
||
initprintf("mmulti_unstable: ERROR: Two players have the same random ID!\n");
|
||
initprintf("mmulti_unstable: ERROR: Please restart the game to generate new IDs.\n");
|
||
return(0);
|
||
}
|
||
|
||
else if (heard_from[i] > heard_from[i+1])
|
||
{
|
||
int tmpi;
|
||
short tmps;
|
||
|
||
tmps = heard_from[i];
|
||
heard_from[i] = heard_from[i+1];
|
||
heard_from[i+1] = tmps;
|
||
|
||
tmpi = allowed_addresses[i].host;
|
||
allowed_addresses[i].host = allowed_addresses[i+1].host;
|
||
allowed_addresses[i+1].host = tmpi;
|
||
|
||
tmps = allowed_addresses[i].port;
|
||
allowed_addresses[i].port = allowed_addresses[i+1].port;
|
||
allowed_addresses[i+1].port = tmps;
|
||
|
||
remaining = 1; /* yay for bubble sorting! */
|
||
}
|
||
}
|
||
}
|
||
while (remaining);
|
||
|
||
/*
|
||
* Now we're sorted. But, the local player is referred to by both his
|
||
* player number and player index ZERO, so bump everyone up one to
|
||
* their actual index and fill in local player as item zero.
|
||
*/
|
||
|
||
memmove(&allowed_addresses[1], &allowed_addresses[0],
|
||
sizeof(allowed_addresses) - sizeof(allowed_addresses[0]));
|
||
allowed_addresses[0].host = myip;
|
||
|
||
gcom->myconnectindex = 0;
|
||
for (i = 1; i <= gcom->numplayers; i++)
|
||
{
|
||
ip = (allowed_addresses[i].host);
|
||
|
||
|
||
if (ip == myip)
|
||
{
|
||
if (udpport == allowed_addresses[i].port)
|
||
gcom->myconnectindex = i;
|
||
}
|
||
|
||
initprintf("mmulti_unstable: player #%i at %s:%i\n", i,static_ipstring(ip),allowed_addresses[i].port);
|
||
}
|
||
// assert(gcom->myconnectindex);
|
||
|
||
initprintf("mmulti_unstable: We are player #%i\n", gcom->myconnectindex);
|
||
|
||
/*
|
||
* Ok, we should have specific IPs and ports for all players, and
|
||
* therefore shouldn't broadcast anymore. Disable permission to do so,
|
||
* just in case, so we aren't flooding the LAN with broadcasted packets.
|
||
*/
|
||
set_socket_broadcast(0);
|
||
|
||
return(1);
|
||
}
|
||
|
||
static int parse_ip(const char *str, int *ip)
|
||
{
|
||
int ip1, ip2, ip3, ip4;
|
||
|
||
if (Bstrcasecmp(str, "any") == 0)
|
||
{
|
||
*ip = 0;
|
||
return(1);
|
||
}
|
||
|
||
if (sscanf(str, "%d.%d.%d.%d", &ip1, &ip2, &ip3, &ip4) != 4)
|
||
{
|
||
initprintf("\"%s\" is not a valid IP address.\n", str);
|
||
return(0);
|
||
}
|
||
|
||
/* we _should_ check that 0 <= ip? <= 255, but it'll fail later anyhow. */
|
||
|
||
*ip = (((ip1 & 0xFF) << 24) |
|
||
((ip2 & 0xFF) << 16) |
|
||
((ip3 & 0xFF) << 8) |
|
||
((ip4 & 0xFF)));
|
||
|
||
return(1);
|
||
}
|
||
|
||
static int parse_interface(char *str, int *ip, short *udpport)
|
||
{
|
||
char *ptr = strchr(str, ':');
|
||
if (ptr) /* portnum specified? */
|
||
*ptr = '\0';
|
||
|
||
if (!parse_ip(str, ip))
|
||
return(0);
|
||
|
||
*udpport = BUILD_DEFAULT_UDP_PORT;
|
||
if (ptr != NULL) /* port specified? */
|
||
{
|
||
ptr++;
|
||
if (Bstrcasecmp(ptr, "any") == 0)
|
||
*udpport = 0;
|
||
else
|
||
*udpport = (short) atoi(ptr);
|
||
}
|
||
|
||
return(1);
|
||
}
|
||
|
||
static int initialize_sockets(void)
|
||
{
|
||
#if PLATFORM_WIN32
|
||
int rc;
|
||
WSADATA data;
|
||
// initprintf("initializing WinSock...\n");
|
||
rc = WSAStartup(0x0101, &data);
|
||
if (rc != 0)
|
||
{
|
||
initprintf("WinSock failed to initialize! [err==%d].\n", rc);
|
||
return(0);
|
||
}
|
||
else
|
||
{
|
||
/* initprintf("WinSock initialized.\n");
|
||
initprintf(" - Caller uses version %d.%d, highest supported is %d.%d.\n",
|
||
data.wVersion >> 8, data.wVersion & 0xFF,
|
||
data.wHighVersion >> 8, data.wHighVersion & 0xFF);
|
||
initprintf(" - Implementation description: [%s].\n", data.szDescription);
|
||
initprintf(" - System status: [%s].\n", data.szSystemStatus);
|
||
initprintf(" - Max sockets: %d.\n", data.iMaxSockets);
|
||
initprintf(" - Max UDP datagram size: %d.\n", data.iMaxUdpDg); */
|
||
}
|
||
#endif
|
||
|
||
return(1);
|
||
}
|
||
|
||
static void deinitialize_sockets(void)
|
||
{
|
||
#if PLATFORM_WIN32
|
||
WSACleanup();
|
||
#endif
|
||
}
|
||
|
||
int isvalidipaddress(char *st)
|
||
{
|
||
int i, bcnt, num;
|
||
|
||
bcnt = 0; num = 0;
|
||
for (i=0;st[i];i++)
|
||
{
|
||
if (st[i] == '.') { bcnt++; num = 0; continue; }
|
||
if (st[i] == ':')
|
||
{
|
||
if (bcnt != 3) return(0);
|
||
num = 0;
|
||
for (i++;st[i];i++)
|
||
{
|
||
if ((st[i] >= '0') && (st[i] <= '9'))
|
||
{ num = num*10+st[i]-'0'; if (num >= 65536) return(0); }
|
||
else return(0);
|
||
}
|
||
return(1);
|
||
}
|
||
if ((st[i] >= '0') && (st[i] <= '9'))
|
||
{ num = num*10+st[i]-'0'; if (num >= 256) return(0); }
|
||
|
||
}
|
||
return(bcnt == 3);
|
||
}
|
||
|
||
static int parse_udp_config(int argc, char **argv, gcomtype *gcom)
|
||
{
|
||
char *buf;
|
||
char *tok;
|
||
char *ptr;
|
||
int ip = 0; /* interface */
|
||
int bcast = 0;
|
||
|
||
buf = read_whole_file(argv[0]); /* we must free this. */
|
||
if (buf == NULL)
|
||
{
|
||
// do JF-style argv parsing here
|
||
int i, j, daindex;
|
||
int danetmode = 255;
|
||
char *st;
|
||
|
||
daindex = 0;
|
||
|
||
// if (!argv) return 0;
|
||
// go looking for the port, if specified
|
||
for (i=0;i<argc;i++)
|
||
{
|
||
if (argv[i][0] != '-' && argv[i][0] != '/') continue;
|
||
if ((argv[i][1] == 'p' || argv[i][1] == 'P') && argv[i][2])
|
||
{
|
||
char *p;
|
||
j = strtol(argv[i]+2, &p, 10);
|
||
if (!(*p) && j > 1024 && j<65535) udpport = j;
|
||
|
||
initprintf("mmulti_unstable: Using port %d\n", udpport);
|
||
}
|
||
}
|
||
|
||
for (i=0;i<argc;i++)
|
||
{
|
||
//if (((argv[i][0] == '/') || (argv[i][0] == '-')) &&
|
||
// ((argv[i][1] == 'N') || (argv[i][1] == 'n')) &&
|
||
// ((argv[i][2] == 'E') || (argv[i][2] == 'e')) &&
|
||
// ((argv[i][3] == 'T') || (argv[i][3] == 't')) &&
|
||
// (!argv[i][4]))
|
||
// { foundnet = 1; continue; }
|
||
//if (!foundnet) continue;
|
||
|
||
if ((argv[i][0] == '-') || (argv[i][0] == '/'))
|
||
{
|
||
if ((argv[i][1] == 'N') || (argv[i][1] == 'n') || (argv[i][1] == 'I') || (argv[i][1] == 'i'))
|
||
{
|
||
gcom->numplayers = 1;
|
||
if (argv[i][2] == '0')
|
||
{
|
||
danetmode = 0;
|
||
udpmode = udpmode_client;
|
||
if ((argv[i][3] == ':') && (argv[i][4] >= '0') && (argv[i][4] <= '9'))
|
||
{
|
||
udpmode = udpmode_server;
|
||
gcom->numplayers = (argv[i][4]-'0');
|
||
if ((argv[i][5] >= '0') && (argv[i][5] <= '9')) gcom->numplayers = gcom->numplayers*10+(argv[i][5]-'0');
|
||
gcom->numplayers--;
|
||
initprintf("mmulti_unstable: %d-player game server\n", gcom->numplayers);
|
||
}
|
||
initprintf("mmulti_unstable: Master-slave mode\n");
|
||
}
|
||
else if (argv[i][2] == '1')
|
||
{
|
||
danetmode = 1;
|
||
udpmode = udpmode_peer;
|
||
myconnectindex = daindex;
|
||
// daindex++;
|
||
initprintf("mmulti_unstable: Peer-to-peer mode\n");
|
||
}
|
||
continue;
|
||
}
|
||
else if ((argv[i][1] == 'P') || (argv[i][1] == 'p')) continue;
|
||
}
|
||
|
||
st = strdup(argv[i]); if (!st) break;
|
||
if (isvalidipaddress(st))
|
||
{
|
||
// if ((danetmode == 1) && (daindex == myconnectindex)) daindex++;
|
||
/* for (j=0;st[j];j++)
|
||
{
|
||
if (st[j] == ':')
|
||
{ allowed_addresses[daindex].port = htons((unsigned short)atol(&st[j+1])); st[j] = 0; break; }
|
||
}
|
||
allowed_addresses[daindex].host = inet_addr(st); */
|
||
parse_interface(st, &allowed_addresses[daindex].host, &allowed_addresses[daindex].port);
|
||
initprintf("mmulti_unstable: Player %d at %s:%d\n",daindex,st,allowed_addresses[daindex].port);
|
||
daindex++;
|
||
}
|
||
/* else
|
||
{
|
||
struct hostent * lph;
|
||
unsigned short pt = BUILD_DEFAULT_UDP_PORT;
|
||
|
||
for (j=0;st[j];j++)
|
||
if (st[j] == ':')
|
||
{ pt = (unsigned short)atol(&st[j+1]); st[j] = 0; break; }
|
||
if ((lph = gethostbyname(st)))
|
||
{
|
||
if ((danetmode == 1) && (daindex == myconnectindex)) daindex++;
|
||
allowed_addresses[daindex].host = *(int *)lph->h_addr;
|
||
allowed_addresses[daindex].port = pt;
|
||
initprintf("mmulti: Player %d at %s:%d (%s)\n",daindex,
|
||
inet_ntoa(*(struct in_addr *)lph->h_addr),ntohs(pt),argv[i]);
|
||
daindex++;
|
||
}
|
||
else initprintf("mmulti: Failed resolving %s\n",argv[i]);
|
||
} */
|
||
free(st);
|
||
}
|
||
if ((danetmode == 255) && (daindex)) { gcom->numplayers = 2; udpmode = udpmode_client; } //an IP w/o /n# defaults to /n0
|
||
// if ((numplayers >= 2) && (daindex) && (!danetmode)) myconnectindex = 1;
|
||
if (daindex > gcom->numplayers) gcom->numplayers = daindex;
|
||
}
|
||
else
|
||
{
|
||
initprintf("mmulti_unstable: Using '%s' as configuration file\n", argv[0]);
|
||
|
||
ptr = buf;
|
||
while ((tok = get_token(&ptr)) != NULL)
|
||
{
|
||
int bogus = 1;
|
||
|
||
if (Bstrcasecmp(tok, "interface") == 0)
|
||
{
|
||
if ((tok = get_token(&ptr)) &&
|
||
(parse_interface(tok, &ip, &udpport)))
|
||
{
|
||
bogus = 0;
|
||
}
|
||
initprintf("mmulti_unstable: Using interface %s:%d\n",
|
||
static_ipstring(ip), (int) udpport);
|
||
}
|
||
|
||
else if (Bstrcasecmp(tok, "mode") == 0)
|
||
{
|
||
if ((tok = get_token(&ptr)) != NULL)
|
||
{
|
||
bogus = 0;
|
||
if (Bstrcasecmp(tok, "server") == 0)
|
||
udpmode = udpmode_server;
|
||
else if (Bstrcasecmp(tok, "client") == 0)
|
||
udpmode = udpmode_client;
|
||
else if (Bstrcasecmp(tok, "peer") == 0)
|
||
udpmode = udpmode_peer;
|
||
else
|
||
bogus = 1;
|
||
|
||
if (!bogus)
|
||
initprintf("You want to be in [%s] mode\n", tok);
|
||
}
|
||
}
|
||
|
||
else if (Bstrcasecmp(tok, "broadcast") == 0)
|
||
{
|
||
if ((tok = get_token(&ptr)) != NULL)
|
||
{
|
||
bcast = atoi(tok);
|
||
if (bcast > MAX_PLAYERS - 1)
|
||
{
|
||
initprintf("WARNING: Too many broadcast players.\n");
|
||
bcast = MAX_PLAYERS - 1;
|
||
}
|
||
|
||
bogus = 0;
|
||
}
|
||
}
|
||
|
||
else if (Bstrcasecmp(tok, "allow") == 0)
|
||
{
|
||
int host;
|
||
short port=BUILD_DEFAULT_UDP_PORT;
|
||
if ((tok = get_token(&ptr)) != NULL)
|
||
{
|
||
if (gcom->numplayers >= MAX_PLAYERS - 1)
|
||
initprintf("WARNING: Too many allowed IP addresses.\n");
|
||
|
||
else if (parse_interface(tok, &host, &port))
|
||
{
|
||
allowed_addresses[gcom->numplayers].host = host;
|
||
allowed_addresses[gcom->numplayers].port = port;
|
||
gcom->numplayers++;
|
||
bogus = 0;
|
||
}
|
||
}
|
||
}
|
||
|
||
else if (Bstrcasecmp(tok, "players") == 0)
|
||
{
|
||
if ((tok = get_token(&ptr)) != NULL)
|
||
{
|
||
bogus = 0;
|
||
if (udpmode == udpmode_server)
|
||
gcom->numplayers = atoi(tok)-1;
|
||
else
|
||
bogus = 1;
|
||
}
|
||
}
|
||
|
||
if (bogus)
|
||
initprintf("bogus token! [%s]\n", tok);
|
||
}
|
||
|
||
free(buf);
|
||
}
|
||
|
||
if (open_udp_socket(ip, udpport))
|
||
{
|
||
gcom->numplayers++; /* that's you. */
|
||
if (udpmode == udpmode_server)
|
||
return(wait_for_other_players(gcom, ip));
|
||
else if (udpmode == udpmode_client)
|
||
return(connect_to_server(gcom, ip));
|
||
else if (udpmode == udpmode_peer)
|
||
return(connect_to_everyone(gcom, ip, bcast));
|
||
|
||
initprintf("wtf?!"); /* Should be handled by a udpmode above... */
|
||
// assert(0);
|
||
}
|
||
|
||
return(0);
|
||
}
|
||
|
||
|
||
gcomtype *init_network_transport(int argc, char **argv)
|
||
{
|
||
gcomtype *retval;
|
||
|
||
// initprintf("\n\nUDP NETWORK TRANSPORT INITIALIZING...\n");
|
||
|
||
if (!initialize_sockets())
|
||
return(NULL);
|
||
|
||
srand(time(NULL));
|
||
|
||
retval = (gcomtype *)malloc(sizeof(gcomtype));
|
||
if (retval != NULL)
|
||
{
|
||
int rc;
|
||
// char *cfgfile = ARGV[argpos];
|
||
|
||
memset(retval, '\0', sizeof(gcomtype));
|
||
memset(allowed_addresses, '\0', sizeof(allowed_addresses));
|
||
udpsocket = -1;
|
||
udpport = BUILD_DEFAULT_UDP_PORT;
|
||
udpmode = udpmode_peer;
|
||
|
||
rc = parse_udp_config(argc, argv, retval);
|
||
|
||
if (!rc)
|
||
{
|
||
free(retval);
|
||
deinit_network_transport(NULL);
|
||
return(NULL);
|
||
}
|
||
retval->gametype = 3; /* gametype: 1-serial,2-modem,3-net */
|
||
}
|
||
|
||
return(retval);
|
||
}
|
||
|
||
|
||
void deinit_network_transport(gcomtype *gcom)
|
||
{
|
||
// initprintf("\n\nUDP NETWORK TRANSPORT DEINITIALIZING...\n");
|
||
|
||
if (gcom != NULL)
|
||
{
|
||
initprintf(" ...freeing gcom structure...\n");
|
||
free(gcom);
|
||
}
|
||
|
||
if ((signed)udpsocket != -1)
|
||
{
|
||
initprintf(" ...closing socket...\n");
|
||
set_socket_blockmode(1); /* block while socket drains. */
|
||
shutdown(udpsocket, SOCKET_SHUTDOWN_BOTH);
|
||
socketclose(udpsocket);
|
||
udpsocket = -1;
|
||
}
|
||
|
||
deinitialize_sockets();
|
||
|
||
initprintf("UDP net deinitialized successfully.\n");
|
||
}
|
||
|
||
|
||
void callcommit(void)
|
||
{
|
||
int ip, i, rc;
|
||
short port;
|
||
|
||
if ((signed)udpsocket == -1)
|
||
return;
|
||
|
||
process_udp_send_queue();
|
||
|
||
switch (gcom->command)
|
||
{
|
||
case COMMIT_CMD_GET:
|
||
rc = get_udp_packet(&ip, &port, gcom->buffer, sizeof(gcom->buffer));
|
||
if (rc > 0)
|
||
{
|
||
gcom->numbytes = rc; /* size of new packet. */
|
||
for (i = 1; i <= gcom->numplayers; i++)
|
||
{
|
||
if ((allowed_addresses[i].host == ip) &&
|
||
(allowed_addresses[i].port == port))
|
||
{
|
||
gcom->other = i;
|
||
return;
|
||
}
|
||
}
|
||
/* if you manage to hit this, it'll report no packet avail. */
|
||
}
|
||
|
||
gcom->numbytes = 0;
|
||
gcom->other = -1; /* no packet available. */
|
||
break;
|
||
|
||
case COMMIT_CMD_SEND:
|
||
if ((gcom->other < 0) || (gcom->other > gcom->numplayers))
|
||
{
|
||
initprintf("NET TRANSPORT ERROR: send to player out of range\n");
|
||
return;
|
||
}
|
||
|
||
ip = allowed_addresses[gcom->other].host;
|
||
if (ip == 0) /* dropped player? */
|
||
return;
|
||
|
||
port = allowed_addresses[gcom->other].port;
|
||
|
||
if (!send_udp_packet(ip, port, gcom->buffer, gcom->numbytes))
|
||
{
|
||
initprintf("NET TRANSPORT ERROR: send failed to %s:%d\n",
|
||
static_ipstring(ip), (int) port);
|
||
}
|
||
break;
|
||
|
||
case COMMIT_CMD_SENDTOALL:
|
||
/* skip player zero, 'cause that's a duplicate of local IP. */
|
||
for (i = 1; i <= gcom->numplayers; i++)
|
||
{
|
||
ip = allowed_addresses[i].host;
|
||
if (ip == 0) /* dropped player? */
|
||
continue;
|
||
|
||
port = allowed_addresses[i].port;
|
||
|
||
if (!send_udp_packet(ip, port, gcom->buffer, gcom->numbytes))
|
||
{
|
||
initprintf("NET TRANSPORT ERROR: send failed to %s:%d\n",
|
||
static_ipstring(ip), (int) port);
|
||
}
|
||
}
|
||
break;
|
||
|
||
case COMMIT_CMD_SENDTOALLOTHERS:
|
||
/* skip player zero, 'cause that's a duplicate of local IP. */
|
||
for (i = 1; i <= gcom->numplayers; i++)
|
||
{
|
||
if (i == gcom->myconnectindex) /* local player. */
|
||
continue;
|
||
|
||
ip = allowed_addresses[i].host;
|
||
if (ip == 0) /* dropped player? */
|
||
continue;
|
||
|
||
port = allowed_addresses[i].port;
|
||
|
||
if (!send_udp_packet(ip, port, gcom->buffer, gcom->numbytes))
|
||
{
|
||
initprintf("NET TRANSPORT ERROR: send failed to %s:%d\n",
|
||
static_ipstring(ip), (int) port);
|
||
}
|
||
}
|
||
break;
|
||
|
||
/* ?!
|
||
case COMMIT_CMD_SCORE:
|
||
break;
|
||
*/
|
||
|
||
default:
|
||
initprintf("NET TRANSPORT ERROR: Unknown command %d\n", gcom->command);
|
||
gcom->other = -1; /* oh well. */
|
||
break;
|
||
}
|
||
}
|
||
|
||
#else
|
||
#error Please define a network transport for your platform.
|
||
#endif
|
||
|
||
/* end of mmulti.c ... */
|
||
|