mirror of
https://github.com/DarkflameUniverse/DarkflameServer.git
synced 2024-11-22 21:47:24 +00:00
0545adfac3
Have fun!
5353 lines
205 KiB
C++
5353 lines
205 KiB
C++
/// \file
|
|
///
|
|
/// This file is part of RakNet Copyright 2003 Kevin Jenkins.
|
|
///
|
|
/// Usage of RakNet is subject to the appropriate license agreement.
|
|
/// Creative Commons Licensees are subject to the
|
|
/// license found at
|
|
/// http://creativecommons.org/licenses/by-nc/2.5/
|
|
/// Single application licensees are subject to the license found at
|
|
/// http://www.jenkinssoftware.com/SingleApplicationLicense.html
|
|
/// Custom license users are subject to the terms therein.
|
|
/// GPL license users are subject to the GNU General Public
|
|
/// License as published by the Free
|
|
/// Software Foundation; either version 2 of the License, or (at your
|
|
/// option) any later version.
|
|
|
|
#include "RakNetDefines.h"
|
|
#include "RakPeer.h"
|
|
#include "RakNetTypes.h"
|
|
|
|
#ifdef _WIN32
|
|
#elif defined(_PS3)
|
|
#define closesocket socketclose
|
|
#else
|
|
#define closesocket close
|
|
#include <unistd.h>
|
|
#endif
|
|
|
|
#include <ctype.h> // toupper
|
|
#include <string.h>
|
|
#include "GetTime.h"
|
|
#include "MessageIdentifiers.h"
|
|
#include "DS_HuffmanEncodingTree.h"
|
|
#include "Rand.h"
|
|
#include "PluginInterface.h"
|
|
#include "StringCompressor.h"
|
|
#include "StringTable.h"
|
|
#include "NetworkIDObject.h"
|
|
#include "RakNetTypes.h"
|
|
#include "SHA1.h"
|
|
#include "RakSleep.h"
|
|
#include "RouterInterface.h"
|
|
#include "RakAssert.h"
|
|
|
|
#include "NetworkIDManager.h"
|
|
#include "DataBlockEncryptor.h"
|
|
|
|
RAK_THREAD_DECLARATION(UpdateNetworkLoop);
|
|
|
|
|
|
#if !defined ( __APPLE__ ) && !defined ( __APPLE_CC__ )
|
|
#include <stdlib.h> // malloc
|
|
#endif
|
|
|
|
#ifdef _XBOX360
|
|
//
|
|
#elif defined(_WIN32)
|
|
//
|
|
#else
|
|
/*
|
|
#include <alloca.h> // Console 2
|
|
#include <stdlib.h>
|
|
extern bool _extern_Console2LoadModules(void);
|
|
extern int _extern_Console2GetConnectionStatus(void);
|
|
extern int _extern_Console2GetLobbyStatus(void);
|
|
//extern bool Console2StartupFluff(unsigned int *);
|
|
extern void Console2ShutdownFluff(void);
|
|
//extern unsigned int Console2ActivateConnection(unsigned int, void *);
|
|
//extern bool Console2BlockOnEstablished(void);
|
|
extern void Console2GetIPAndPort(unsigned int, char *, unsigned short *, unsigned int );
|
|
//extern void Console2DeactivateConnection(unsigned int, unsigned int);
|
|
*/
|
|
#endif
|
|
|
|
// Note to self - if I change this it might affect RECIPIENT_OFFLINE_MESSAGE_INTERVAL in Natpunchthrough.cpp
|
|
static const int MAX_OPEN_CONNECTION_REQUESTS=8;
|
|
static const int TIME_BETWEEN_OPEN_CONNECTION_REQUESTS=500;
|
|
|
|
#ifdef _MSC_VER
|
|
#pragma warning( push )
|
|
#endif
|
|
|
|
using namespace RakNet;
|
|
|
|
int SystemAddressAndIndexComp( const SystemAddress &key, const SystemAddressAndIndex &data )
|
|
{
|
|
if (key < data.systemAddress)
|
|
return -1;
|
|
if (key==data.systemAddress)
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
// On a Little-endian machine the RSA key and message are mangled, but we're
|
|
// trying to be friendly to the little endians, so we do byte order
|
|
// mangling on Big-Endian machines. Note that this mangling is independent
|
|
// of the byte order used on the network (which also defaults to little-end).
|
|
#ifdef HOST_ENDIAN_IS_BIG
|
|
void __inline BSWAPCPY(unsigned char *dest, unsigned char *source, int bytesize)
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( (bytesize % 4 == 0)&&(bytesize)&& "Something is wrong with your exponent or modulus size.");
|
|
#endif
|
|
int i;
|
|
for (i=0; i<bytesize; i+=4)
|
|
{
|
|
dest[i] = source[i+3];
|
|
dest[i+1] = source[i+2];
|
|
dest[i+2] = source[i+1];
|
|
dest[i+3] = source[i];
|
|
}
|
|
}
|
|
void __inline BSWAPSELF(unsigned char *source, int bytesize)
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( (bytesize % 4 == 0)&&(bytesize)&& "Something is wrong with your exponent or modulus size.");
|
|
#endif
|
|
int i;
|
|
unsigned char a, b;
|
|
for (i=0; i<bytesize; i+=4)
|
|
{
|
|
a = source[i];
|
|
b = source[i+1];
|
|
source[i] = source[i+3];
|
|
source[i+1] = source[i+2];
|
|
source[i+2] = b;
|
|
source[i+3] = a;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
static const unsigned int SYN_COOKIE_OLD_RANDOM_NUMBER_DURATION = 10000;
|
|
static const unsigned int MAX_OFFLINE_DATA_LENGTH=400; // I set this because I limit ID_CONNECTION_REQUEST to 512 bytes, and the password is appended to that packet.
|
|
|
|
// Used to distinguish between offline messages with data, and messages from the reliability layer
|
|
// Should be different than any message that could result from messages from the reliability layer
|
|
static const int OFFLINE_MESSAGE_DATA_ID[4]={ (int) 0xFF00FF00, (int) 0xFEFEFEFE, (int) 0xFDFDFDFD, (int) 0x12345678};
|
|
|
|
//#define _DO_PRINTF
|
|
|
|
// UPDATE_THREAD_POLL_TIME is how often the update thread will poll to see
|
|
// if receive wasn't called within UPDATE_THREAD_UPDATE_TIME. If it wasn't called within that time,
|
|
// the updating thread will activate and take over network communication until Receive is called again.
|
|
//static const unsigned int UPDATE_THREAD_UPDATE_TIME=30;
|
|
//static const unsigned int UPDATE_THREAD_POLL_TIME=30;
|
|
|
|
//#define _TEST_AES
|
|
|
|
Packet *AllocPacket(unsigned dataSize)
|
|
{
|
|
Packet *p = (Packet *)rakMalloc(sizeof(Packet)+dataSize);
|
|
p->data=(unsigned char*)p+sizeof(Packet);
|
|
p->length=dataSize;
|
|
p->bitSize=BITS_TO_BYTES(dataSize);
|
|
p->deleteData=false;
|
|
return p;
|
|
}
|
|
|
|
Packet *AllocPacket(unsigned dataSize, unsigned char *data)
|
|
{
|
|
Packet *p = (Packet *)rakMalloc(sizeof(Packet));
|
|
p->data=data;
|
|
p->length=dataSize;
|
|
p->bitSize=BITS_TO_BYTES(dataSize);
|
|
p->deleteData=true;
|
|
return p;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Constructor
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
RakPeer::RakPeer()
|
|
{
|
|
StringCompressor::AddReference();
|
|
RakNet::StringTable::AddReference();
|
|
|
|
#if !defined(_XBOX360) && !defined(_WIN32_WCE)
|
|
usingSecurity = false;
|
|
#endif
|
|
memset( frequencyTable, 0, sizeof( unsigned int ) * 256 );
|
|
rawBytesSent = rawBytesReceived = compressedBytesSent = compressedBytesReceived = 0;
|
|
outputTree = inputTree = 0;
|
|
defaultMTUSize = DEFAULT_MTU_SIZE;
|
|
trackFrequencyTable = false;
|
|
maximumIncomingConnections = 0;
|
|
maximumNumberOfPeers = 0;
|
|
//remoteSystemListSize=0;
|
|
remoteSystemList = 0;
|
|
bytesSentPerSecond = bytesReceivedPerSecond = 0;
|
|
endThreads = true;
|
|
isMainLoopThreadActive = false;
|
|
// isRecvfromThreadActive=false;
|
|
occasionalPing = false;
|
|
connectionSockets = 0;
|
|
connectionSocketsLength=0;
|
|
mySystemAddress = UNASSIGNED_SYSTEM_ADDRESS;
|
|
allowConnectionResponseIPMigration = false;
|
|
blockOnRPCReply=false;
|
|
//incomingPasswordLength=outgoingPasswordLength=0;
|
|
incomingPasswordLength=0;
|
|
router=0;
|
|
splitMessageProgressInterval=0;
|
|
unreliableTimeout=0;
|
|
networkIDManager=0;
|
|
maxOutgoingBPS=0;
|
|
firstExternalID=UNASSIGNED_SYSTEM_ADDRESS;
|
|
|
|
#ifdef _DEBUG
|
|
// Wait longer to disconnect in debug so I don't get disconnected while tracing
|
|
defaultTimeoutTime=30000;
|
|
#else
|
|
defaultTimeoutTime=10000;
|
|
#endif
|
|
|
|
|
|
#if defined (_WIN32) && defined(USE_WAIT_FOR_MULTIPLE_EVENTS)
|
|
recvEvent = INVALID_HANDLE_VALUE;
|
|
#endif
|
|
|
|
#ifndef _RELEASE
|
|
_maxSendBPS=0.0;
|
|
_minExtraPing=0;
|
|
_extraPingVariance=0;
|
|
#endif
|
|
|
|
#if defined(_PS3)
|
|
// console2ContextId=-1;
|
|
#endif
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Destructor
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
RakPeer::~RakPeer()
|
|
{
|
|
// unsigned i;
|
|
|
|
// Free the ban list.
|
|
ClearBanList();
|
|
|
|
Shutdown( 0, 0);
|
|
|
|
|
|
StringCompressor::RemoveReference();
|
|
RakNet::StringTable::RemoveReference();
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
/// \brief Starts the network threads, opens the listen port.
|
|
/// You must call this before calling Connect().
|
|
/// Multiple calls while already active are ignored. To call this function again with different settings, you must first call Shutdown().
|
|
/// \note Call SetMaximumIncomingConnections if you want to accept incoming connections
|
|
/// \note Set _RAKNET_THREADSAFE in RakNetDefines.h if you want to call RakNet functions from multiple threads (not recommended, as it is much slower and RakNet is already asynchronous).
|
|
/// \param[in] maxConnections The maximum number of connections between this instance of RakPeer and another instance of RakPeer. Required so the network can preallocate and for thread safety. A pure client would set this to 1. A pure server would set it to the number of allowed clients.- A hybrid would set it to the sum of both types of connections
|
|
/// \param[in] localPort The port to listen for connections on.
|
|
/// \param[in] _threadSleepTimer How many ms to Sleep each internal update cycle (30 to give the game priority, 0 for regular (recommended)
|
|
/// \param[in] socketDescriptors An array of SocketDescriptor structures to force RakNet to listen on a particular IP address or port (or both). Each SocketDescriptor will represent one unique socket. Do not pass redundant structures. To listen on a specific port, you can pass &socketDescriptor, 1SocketDescriptor(myPort,0); such as for a server. For a client, it is usually OK to just pass SocketDescriptor();
|
|
/// \param[in] socketDescriptorCount The size of the \a socketDescriptors array. Pass 1 if you are not sure what to pass.
|
|
/// \return False on failure (can't create socket or thread), true on success.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::Startup( unsigned short maxConnections, int _threadSleepTimer, SocketDescriptor *socketDescriptors, unsigned socketDescriptorCount )
|
|
{
|
|
if (IsActive())
|
|
return false;
|
|
|
|
RakAssert(socketDescriptors && socketDescriptorCount>=1);
|
|
|
|
if (socketDescriptors==0 || socketDescriptorCount<1)
|
|
return false;
|
|
|
|
unsigned i;
|
|
//unsigned short localPort;
|
|
//localPort=socketDescriptors[0].port;
|
|
|
|
assert( maxConnections > 0 );
|
|
|
|
if ( maxConnections <= 0 )
|
|
return false;
|
|
|
|
for (i=0; i<connectionSocketsLength; i++)
|
|
closesocket(connectionSockets[i]);
|
|
if (connectionSockets)
|
|
delete [] connectionSockets;
|
|
connectionSocketsLength=0;
|
|
|
|
connectionSockets=new SOCKET[socketDescriptorCount];
|
|
for (i=0; i<socketDescriptorCount; i++)
|
|
{
|
|
connectionSockets[i] = SocketLayer::Instance()->CreateBoundSocket( socketDescriptors[i].port, true, socketDescriptors[i].hostAddress );
|
|
if (connectionSockets[i]==(SOCKET)-1)
|
|
{
|
|
unsigned int j;
|
|
for (j=0; j < i; j++)
|
|
closesocket(connectionSockets[j]);
|
|
if (connectionSockets)
|
|
delete [] connectionSockets;
|
|
connectionSocketsLength=0;
|
|
connectionSockets=0;
|
|
return false;
|
|
}
|
|
}
|
|
|
|
connectionSocketsLength=socketDescriptorCount;
|
|
|
|
#if defined (_WIN32) && defined(USE_WAIT_FOR_MULTIPLE_EVENTS)
|
|
if (_threadSleepTimer>0)
|
|
{
|
|
recvEvent=CreateEvent(0,FALSE,FALSE,0);
|
|
for (i=0; i<socketDescriptorCount; i++)
|
|
WSAEventSelect(connectionSockets[i],recvEvent,FD_READ);
|
|
}
|
|
#endif
|
|
|
|
if ( maximumNumberOfPeers == 0 )
|
|
{
|
|
// Don't allow more incoming connections than we have peers.
|
|
if ( maximumIncomingConnections > maxConnections )
|
|
maximumIncomingConnections = maxConnections;
|
|
|
|
maximumNumberOfPeers = maxConnections;
|
|
// 04/19/2006 - Don't overallocate because I'm no longer allowing connected pings.
|
|
// The disconnects are not consistently processed and the process was sloppy and complicated.
|
|
// Allocate 10% extra to handle new connections from players trying to connect when the server is full
|
|
//remoteSystemListSize = maxConnections;// * 11 / 10 + 1;
|
|
|
|
// remoteSystemList in Single thread
|
|
//remoteSystemList = new RemoteSystemStruct[ remoteSystemListSize ];
|
|
remoteSystemList = new RemoteSystemStruct[ maximumNumberOfPeers ];
|
|
|
|
|
|
for ( i = 0; i < maximumNumberOfPeers; i++ )
|
|
//for ( i = 0; i < remoteSystemListSize; i++ )
|
|
{
|
|
// remoteSystemList in Single thread
|
|
remoteSystemList[ i ].isActive = false;
|
|
remoteSystemList[ i ].systemAddress = UNASSIGNED_SYSTEM_ADDRESS;
|
|
remoteSystemList[ i ].myExternalSystemAddress = UNASSIGNED_SYSTEM_ADDRESS;
|
|
remoteSystemList[ i ].connectMode=RemoteSystemStruct::NO_ACTION;
|
|
#ifndef _RELEASE
|
|
remoteSystemList[ i ].reliabilityLayer.ApplyNetworkSimulator(_maxSendBPS, _minExtraPing, _extraPingVariance);
|
|
#endif
|
|
}
|
|
|
|
// Clear the lookup table. Safe to call from the user thread since the network thread is now stopped
|
|
remoteSystemLookup.Clear();
|
|
}
|
|
|
|
// For histogram statistics
|
|
// nextReadBytesTime=0;
|
|
// lastSentBytes=lastReceivedBytes=0;
|
|
|
|
if ( endThreads )
|
|
{
|
|
// lastUserUpdateCycle = 0;
|
|
|
|
// Reset the frequency table that we use to save outgoing data
|
|
memset( frequencyTable, 0, sizeof( unsigned int ) * 256 );
|
|
|
|
// Reset the statistical data
|
|
rawBytesSent = rawBytesReceived = compressedBytesSent = compressedBytesReceived = 0;
|
|
|
|
updateCycleIsRunning = false;
|
|
endThreads = false;
|
|
// Create the threads
|
|
threadSleepTimer = _threadSleepTimer;
|
|
|
|
ClearBufferedCommands();
|
|
|
|
#if !defined(_XBOX360)
|
|
char ipList[ 10 ][ 16 ];
|
|
SocketLayer::Instance()->GetMyIP( ipList );
|
|
mySystemAddress.port = SocketLayer::Instance()->GetLocalPort(connectionSockets[0]);
|
|
if (socketDescriptors[0].hostAddress==0 || socketDescriptors[0].hostAddress[0]==0)
|
|
mySystemAddress.binaryAddress = inet_addr( ipList[ 0 ] );
|
|
else
|
|
mySystemAddress.binaryAddress = inet_addr( socketDescriptors[0].hostAddress );
|
|
#else
|
|
mySystemAddress=UNASSIGNED_SYSTEM_ADDRESS;
|
|
#endif
|
|
|
|
if ( isMainLoopThreadActive == false )
|
|
{
|
|
int errorCode = RakNet::RakThread::Create(UpdateNetworkLoop, this);
|
|
|
|
if ( errorCode != 0 )
|
|
{
|
|
Shutdown( 0, 0 );
|
|
return false;
|
|
}
|
|
}
|
|
|
|
// Wait for the threads to activate. When they are active they will set these variables to true
|
|
|
|
while ( isMainLoopThreadActive == false )
|
|
RakSleep(10);
|
|
}
|
|
|
|
for (i=0; i < messageHandlerList.Size(); i++)
|
|
{
|
|
messageHandlerList[i]->OnStartup(this);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Must be called while offline
|
|
// Secures connections though a combination of SHA1, AES128, SYN Cookies, and RSA to prevent
|
|
// connection spoofing, replay attacks, data eavesdropping, packet tampering, and MitM attacks.
|
|
// There is a significant amount of processing and a slight amount of bandwidth
|
|
// overhead for this feature.
|
|
//
|
|
// If you accept connections, you must call this or else secure connections will not be enabled
|
|
// for incoming connections.
|
|
// If you are connecting to another system, you can call this with values for the
|
|
// (e and p,q) public keys before connecting to prevent MitM
|
|
//
|
|
// Parameters:
|
|
// pubKeyE, pubKeyN - A pointer to the public keys from the RSACrypt class. See the Encryption sample
|
|
// privKeyP, privKeyQ - Private keys generated from the RSACrypt class. See the Encryption sample
|
|
// If the private keys are 0, then a new key will be generated when this function is called
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::InitializeSecurity(const char *pubKeyE, const char *pubKeyN, const char *privKeyP, const char *privKeyQ )
|
|
{
|
|
#if !defined(_XBOX360) && !defined(_WIN32_WCE)
|
|
if ( endThreads == false )
|
|
return ;
|
|
|
|
// Setting the client key is e,n,
|
|
// Setting the server key is p,q
|
|
if ( //( privKeyP && privKeyQ && ( pubKeyE || pubKeyN ) ) ||
|
|
//( pubKeyE && pubKeyN && ( privKeyP || privKeyQ ) ) ||
|
|
( privKeyP && privKeyQ == 0 ) ||
|
|
( privKeyQ && privKeyP == 0 ) ||
|
|
( pubKeyE && pubKeyN == 0 ) ||
|
|
( pubKeyN && pubKeyE == 0 ) )
|
|
{
|
|
// Invalid parameters
|
|
assert( 0 );
|
|
}
|
|
|
|
seedMT( (unsigned int) RakNet::GetTime() );
|
|
|
|
GenerateSYNCookieRandomNumber();
|
|
|
|
usingSecurity = true;
|
|
|
|
if ( privKeyP == 0 && privKeyQ == 0 && pubKeyE == 0 && pubKeyN == 0 )
|
|
{
|
|
keysLocallyGenerated = true;
|
|
rsacrypt.generateKeys();
|
|
}
|
|
|
|
else
|
|
{
|
|
if ( pubKeyE && pubKeyN )
|
|
{
|
|
// Save public keys
|
|
memcpy( ( char* ) & publicKeyE, pubKeyE, sizeof( publicKeyE ) );
|
|
memcpy( publicKeyN, pubKeyN, sizeof( publicKeyN ) );
|
|
}
|
|
|
|
if ( privKeyP && privKeyQ )
|
|
{
|
|
BIGHALFSIZE( RSA_BIT_SIZE, p );
|
|
BIGHALFSIZE( RSA_BIT_SIZE, q );
|
|
memcpy( p, privKeyP, sizeof( p ) );
|
|
memcpy( q, privKeyQ, sizeof( q ) );
|
|
// Save private keys
|
|
rsacrypt.setPrivateKey( p, q );
|
|
}
|
|
|
|
keysLocallyGenerated = false;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description
|
|
// Must be called while offline
|
|
// Disables all security.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::DisableSecurity( void )
|
|
{
|
|
#if !defined(_XBOX360) && !defined(_WIN32_WCE)
|
|
if ( endThreads == false )
|
|
return ;
|
|
|
|
usingSecurity = false;
|
|
#endif
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::AddToSecurityExceptionList(const char *ip)
|
|
{
|
|
securityExceptionMutex.Lock();
|
|
securityExceptionList.Insert(RakString(ip));
|
|
securityExceptionMutex.Unlock();
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::RemoveFromSecurityExceptionList(const char *ip)
|
|
{
|
|
if (securityExceptionList.Size()==0)
|
|
return;
|
|
|
|
if (ip==0)
|
|
{
|
|
securityExceptionMutex.Lock();
|
|
securityExceptionList.Clear(false);
|
|
securityExceptionMutex.Unlock();
|
|
}
|
|
else
|
|
{
|
|
unsigned i=0;
|
|
securityExceptionMutex.Lock();
|
|
while (i < securityExceptionList.Size())
|
|
{
|
|
if (securityExceptionList[i].IPAddressMatch(ip))
|
|
{
|
|
securityExceptionList[i]=securityExceptionList[securityExceptionList.Size()-1];
|
|
securityExceptionList.RemoveAtIndex(securityExceptionList.Size()-1);
|
|
}
|
|
else
|
|
i++;
|
|
}
|
|
securityExceptionMutex.Unlock();
|
|
}
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::IsInSecurityExceptionList(const char *ip)
|
|
{
|
|
if (securityExceptionList.Size()==0)
|
|
return false;
|
|
|
|
unsigned i=0;
|
|
securityExceptionMutex.Lock();
|
|
for (; i < securityExceptionList.Size(); i++)
|
|
{
|
|
if (securityExceptionList[i].IPAddressMatch(ip))
|
|
{
|
|
securityExceptionMutex.Unlock();
|
|
return true;
|
|
}
|
|
}
|
|
securityExceptionMutex.Unlock();
|
|
return false;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Sets how many incoming connections are allowed. If this is less than the number of players currently connected, no
|
|
// more players will be allowed to connect. If this is greater than the maximum number of peers allowed, it will be reduced
|
|
// to the maximum number of peers allowed. Defaults to 0.
|
|
//
|
|
// Parameters:
|
|
// numberAllowed - Maximum number of incoming connections allowed.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SetMaximumIncomingConnections( unsigned short numberAllowed )
|
|
{
|
|
maximumIncomingConnections = numberAllowed;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Returns the maximum number of incoming connections, which is always <= maxConnections
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
unsigned short RakPeer::GetMaximumIncomingConnections( void ) const
|
|
{
|
|
return maximumIncomingConnections;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
/// Returns how many open connections there are at this time
|
|
/// \return the number of open connections
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
unsigned short RakPeer::NumberOfConnections(void) const
|
|
{
|
|
unsigned short i, count=0;
|
|
for (i=0; i < maximumNumberOfPeers; i++)
|
|
if (remoteSystemList[i].isActive)
|
|
count++;
|
|
return count;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Sets the password incoming connections must match in the call to Connect (defaults to none)
|
|
// Pass 0 to passwordData to specify no password
|
|
//
|
|
// Parameters:
|
|
// passwordData: A data block that incoming connections must match. This can be just a password, or can be a stream of data.
|
|
// - Specify 0 for no password data
|
|
// passwordDataLength: The length in bytes of passwordData
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SetIncomingPassword( const char* passwordData, int passwordDataLength )
|
|
{
|
|
//if (passwordDataLength > MAX_OFFLINE_DATA_LENGTH)
|
|
// passwordDataLength=MAX_OFFLINE_DATA_LENGTH;
|
|
|
|
if (passwordDataLength > 255)
|
|
passwordDataLength=255;
|
|
|
|
if (passwordData==0)
|
|
passwordDataLength=0;
|
|
|
|
// Not threadsafe but it's not important enough to lock. Who is going to change the password a lot during runtime?
|
|
// It won't overflow at least because incomingPasswordLength is an unsigned char
|
|
if (passwordDataLength>0)
|
|
memcpy(incomingPassword, passwordData, passwordDataLength);
|
|
incomingPasswordLength=(unsigned char)passwordDataLength;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::GetIncomingPassword( char* passwordData, int *passwordDataLength )
|
|
{
|
|
if (passwordData==0)
|
|
{
|
|
*passwordDataLength=incomingPasswordLength;
|
|
return;
|
|
}
|
|
|
|
if (*passwordDataLength > incomingPasswordLength)
|
|
*passwordDataLength=incomingPasswordLength;
|
|
|
|
if (*passwordDataLength>0)
|
|
memcpy(passwordData, incomingPassword, *passwordDataLength);
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Call this to connect to the specified host (ip or domain name) and server port.
|
|
// Calling Connect and not calling SetMaximumIncomingConnections acts as a dedicated client. Calling both acts as a true peer.
|
|
// This is a non-blocking connection. You know the connection is successful when IsConnected() returns true
|
|
// or receive gets a packet with the type identifier ID_CONNECTION_ACCEPTED. If the connection is not
|
|
// successful, such as rejected connection or no response then neither of these things will happen.
|
|
// Requires that you first call Initialize
|
|
//
|
|
// Parameters:
|
|
// host: Either a dotted IP address or a domain name
|
|
// remotePort: Which port to connect to on the remote machine.
|
|
// passwordData: A data block that must match the data block on the server. This can be just a password, or can be a stream of data
|
|
// passwordDataLength: The length in bytes of passwordData
|
|
//
|
|
// Returns:
|
|
// True on successful initiation. False on incorrect parameters, internal error, or too many existing peers
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::Connect( const char* host, unsigned short remotePort, const char *passwordData, int passwordDataLength, unsigned connectionSocketIndex )
|
|
{
|
|
// If endThreads is true here you didn't call Startup() first.
|
|
if ( host == 0 || endThreads || connectionSocketIndex>=connectionSocketsLength )
|
|
return false;
|
|
|
|
if (passwordDataLength>255)
|
|
passwordDataLength=255;
|
|
|
|
if (passwordData==0)
|
|
passwordDataLength=0;
|
|
|
|
// Not threadsafe but it's not important enough to lock. Who is going to change the password a lot during runtime?
|
|
// It won't overflow at least because outgoingPasswordLength is an unsigned char
|
|
// if (passwordDataLength>0)
|
|
// memcpy(outgoingPassword, passwordData, passwordDataLength);
|
|
// outgoingPasswordLength=(unsigned char) passwordDataLength;
|
|
|
|
if ( host[ 0 ] < '0' || host[ 0 ] > '9' )
|
|
{
|
|
#if !defined(_XBOX360)
|
|
host = ( char* ) SocketLayer::Instance()->DomainNameToIP( host );
|
|
#else
|
|
return false;
|
|
#endif
|
|
if (host==0)
|
|
return false;
|
|
}
|
|
|
|
// Connecting to ourselves in the same instance of the program?
|
|
if ( ( strcmp( host, "127.0.0.1" ) == 0 || strcmp( host, "0.0.0.0" ) == 0 ) && remotePort == mySystemAddress.port )
|
|
return false;
|
|
|
|
return SendConnectionRequest( host, remotePort, passwordData, passwordDataLength, connectionSocketIndex, 0 );
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
|
|
/*
|
|
bool RakPeer::Console2LoadModules(void)
|
|
{
|
|
#if defined(_PS3)
|
|
if (_extern_Console2LoadModules()==false)
|
|
{
|
|
|
|
return false;
|
|
}
|
|
#endif
|
|
return true;
|
|
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
|
|
int RakPeer::Console2GetConnectionStatus(void)
|
|
{
|
|
#if defined(_PS3)
|
|
return _extern_Console2GetConnectionStatus();
|
|
#else
|
|
return 0;
|
|
#endif
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
|
|
int RakPeer::Console2GetLobbyStatus(void)
|
|
{
|
|
#if defined(_PS3)
|
|
return _extern_Console2GetLobbyStatus();
|
|
#else
|
|
return 0;
|
|
#endif
|
|
}
|
|
*/
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
|
|
/*
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
/// \brief Connect to the specified network ID (Platform specific console function)
|
|
/// \param[in] networkServiceId Network ID structure for the online service
|
|
/// \param[in] passwordData A data block that must match the data block on the server passed to SetIncomingPassword. This can be a string or can be a stream of data. Use 0 for no password.
|
|
/// \param[in] passwordDataLength The length in bytes of passwordData
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::Console2LobbyConnect( void *networkServiceId, const char *passwordData, int passwordDataLength )
|
|
{
|
|
#if defined (_PS3_LOBBY)
|
|
// If endThreads is true here you didn't call Startup() first.
|
|
if ( endThreads )
|
|
return false;
|
|
|
|
if (passwordDataLength>255)
|
|
passwordDataLength=255;
|
|
|
|
if (passwordData==0)
|
|
passwordDataLength=0;
|
|
|
|
int connectionId = Console2ActivateConnection(console2ContextId, networkServiceId);
|
|
bool success = Console2BlockOnEstablished();
|
|
if (success==false)
|
|
return false;
|
|
char host[26];
|
|
unsigned short remotePort;
|
|
Console2GetIPAndPort(console2ContextId, host, &remotePort, connectionId);
|
|
return SendConnectionRequest( host, remotePort, passwordData, passwordDataLength, 0, connectionId );
|
|
#else
|
|
return false;
|
|
#endif
|
|
}
|
|
*/
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Stops the network threads and close all connections. Multiple calls are ok.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::Shutdown( unsigned int blockDuration, unsigned char orderingChannel )
|
|
{
|
|
unsigned i,j;
|
|
bool anyActive;
|
|
RakNetTime startWaitingTime;
|
|
// SystemAddress systemAddress;
|
|
RakNetTime time;
|
|
//unsigned short systemListSize = remoteSystemListSize; // This is done for threading reasons
|
|
unsigned short systemListSize = maximumNumberOfPeers;
|
|
|
|
if ( blockDuration > 0 )
|
|
{
|
|
for ( i = 0; i < systemListSize; i++ )
|
|
{
|
|
// remoteSystemList in user thread
|
|
if (remoteSystemList[i].isActive)
|
|
NotifyAndFlagForShutdown(remoteSystemList[i].systemAddress, false, orderingChannel);
|
|
}
|
|
|
|
time = RakNet::GetTime();
|
|
startWaitingTime = time;
|
|
while ( time - startWaitingTime < blockDuration )
|
|
{
|
|
anyActive=false;
|
|
for (j=0; j < systemListSize; j++)
|
|
{
|
|
// remoteSystemList in user thread
|
|
if (remoteSystemList[j].isActive)
|
|
{
|
|
anyActive=true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
// If this system is out of packets to send, then stop waiting
|
|
if ( anyActive==false )
|
|
break;
|
|
|
|
// This will probably cause the update thread to run which will probably
|
|
// send the disconnection notification
|
|
|
|
RakSleep(15);
|
|
time = RakNet::GetTime();
|
|
}
|
|
}
|
|
|
|
for (i=0; i < messageHandlerList.Size(); i++)
|
|
{
|
|
messageHandlerList[i]->OnShutdown(this);
|
|
}
|
|
|
|
|
|
while ( isMainLoopThreadActive )
|
|
{
|
|
endThreads = true;
|
|
RakSleep(15);
|
|
}
|
|
|
|
// remoteSystemList in Single thread
|
|
for ( i = 0; i < systemListSize; i++ )
|
|
{
|
|
// Reserve this reliability layer for ourselves
|
|
remoteSystemList[ i ].isActive = false;
|
|
|
|
// Remove any remaining packets
|
|
remoteSystemList[ i ].reliabilityLayer.Reset(false);
|
|
}
|
|
|
|
// Clear the lookup table. Safe to call from the user thread since the network thread is now stopped
|
|
remoteSystemLookup.Clear();
|
|
|
|
// Setting maximumNumberOfPeers to 0 allows remoteSystemList to be reallocated in Initialize.
|
|
// Setting remoteSystemListSize prevents threads from accessing the reliability layer
|
|
maximumNumberOfPeers = 0;
|
|
//remoteSystemListSize = 0;
|
|
|
|
// Free any packets the user didn't deallocate
|
|
Packet **packet;
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[transferToPacketQueue_Mutex].Lock();
|
|
#endif
|
|
packet=packetSingleProducerConsumer.ReadLock();
|
|
while (packet)
|
|
{
|
|
DeallocatePacket(*packet);
|
|
packetSingleProducerConsumer.ReadUnlock();
|
|
packet=packetSingleProducerConsumer.ReadLock();
|
|
}
|
|
packetSingleProducerConsumer.Clear();
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[transferToPacketQueue_Mutex].Unlock();
|
|
#endif
|
|
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[packetPool_Mutex].Lock();
|
|
#endif
|
|
for (i=0; i < packetPool.Size(); i++)
|
|
DeallocatePacket(packetPool[i]);
|
|
packetPool.Clear();
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[packetPool_Mutex].Unlock();
|
|
#endif
|
|
|
|
blockOnRPCReply=false;
|
|
|
|
for (i=0; i<connectionSocketsLength; i++)
|
|
closesocket(connectionSockets[i]);
|
|
if (connectionSockets)
|
|
delete [] connectionSockets;
|
|
connectionSockets=0;
|
|
connectionSocketsLength=0;
|
|
|
|
ClearBufferedCommands();
|
|
bytesSentPerSecond = bytesReceivedPerSecond = 0;
|
|
|
|
ClearRequestedConnectionList();
|
|
|
|
#if defined (_WIN32) && defined(USE_WAIT_FOR_MULTIPLE_EVENTS)
|
|
if (recvEvent!=INVALID_HANDLE_VALUE)
|
|
{
|
|
CloseHandle( recvEvent );
|
|
recvEvent = INVALID_HANDLE_VALUE;
|
|
}
|
|
#endif
|
|
|
|
// Clear out the reliability layer list in case we want to reallocate it in a successive call to Init.
|
|
RemoteSystemStruct * temp = remoteSystemList;
|
|
remoteSystemList = 0;
|
|
delete [] temp;
|
|
|
|
#if defined(_PS3)
|
|
// if (console2ContextId!=-1)
|
|
// Console2ShutdownFluff(console2ContextId);
|
|
// console2ContextId=-1;
|
|
//Console2ShutdownFluff();
|
|
#endif
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Returns true if the network threads are running
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
inline bool RakPeer::IsActive( void ) const
|
|
{
|
|
return endThreads == false;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Fills the array remoteSystems with the systemAddress of all the systems we are connected to
|
|
//
|
|
// Parameters:
|
|
// remoteSystems (out): An array of SystemAddress structures to be filled with the SystemAddresss of the systems we are connected to
|
|
// - pass 0 to remoteSystems to only get the number of systems we are connected to
|
|
// numberOfSystems (int, out): As input, the size of remoteSystems array. As output, the number of elements put into the array
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::GetConnectionList( SystemAddress *remoteSystems, unsigned short *numberOfSystems ) const
|
|
{
|
|
int count, index;
|
|
count=0;
|
|
|
|
if ( remoteSystemList == 0 || endThreads == true )
|
|
{
|
|
*numberOfSystems = 0;
|
|
return false;
|
|
}
|
|
|
|
// This is called a lot so I unrolled the loop
|
|
if ( remoteSystems )
|
|
{
|
|
// remoteSystemList in user thread
|
|
//for ( count = 0, index = 0; index < remoteSystemListSize; ++index )
|
|
for ( count = 0, index = 0; index < maximumNumberOfPeers; ++index )
|
|
if ( remoteSystemList[ index ].isActive && remoteSystemList[ index ].connectMode==RemoteSystemStruct::CONNECTED)
|
|
{
|
|
if ( count < *numberOfSystems )
|
|
remoteSystems[ count ] = remoteSystemList[ index ].systemAddress;
|
|
|
|
++count;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// remoteSystemList in user thread
|
|
//for ( count = 0, index = 0; index < remoteSystemListSize; ++index )
|
|
for ( count = 0, index = 0; index < maximumNumberOfPeers; ++index )
|
|
if ( remoteSystemList[ index ].isActive && remoteSystemList[ index ].connectMode==RemoteSystemStruct::CONNECTED)
|
|
++count;
|
|
}
|
|
|
|
*numberOfSystems = ( unsigned short ) count;
|
|
|
|
return true;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Sends a block of data to the specified system that you are connected to.
|
|
// This function only works while the client is connected (Use the Connect function).
|
|
// The first byte should be a message identifier starting at ID_USER_PACKET_ENUM
|
|
//
|
|
// Parameters:
|
|
// data: The block of data to send
|
|
// length: The size in bytes of the data to send
|
|
// bitStream: The bitstream to send
|
|
// priority: What priority level to send on.
|
|
// reliability: How reliability to send this data
|
|
// orderingChannel: When using ordered or sequenced packets, what channel to order these on.
|
|
// - Packets are only ordered relative to other packets on the same stream
|
|
// systemAddress: Who to send this packet to, or in the case of broadcasting who not to send it to. Use UNASSIGNED_SYSTEM_ADDRESS to specify none
|
|
// broadcast: True to send this packet to all connected systems. If true, then systemAddress specifies who not to send the packet to.
|
|
// Returns:
|
|
// False if we are not connected to the specified recipient. True otherwise
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::Send( const char *data, const int length, PacketPriority priority, PacketReliability reliability, char orderingChannel, SystemAddress systemAddress, bool broadcast )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( data && length > 0 );
|
|
#endif
|
|
|
|
if ( data == 0 || length < 0 )
|
|
return false;
|
|
|
|
if ( remoteSystemList == 0 || endThreads == true )
|
|
return false;
|
|
|
|
if ( broadcast == false && systemAddress == UNASSIGNED_SYSTEM_ADDRESS )
|
|
return false;
|
|
|
|
if (broadcast==false && router && IsConnected(systemAddress)==false)
|
|
{
|
|
return router->Send(data, BYTES_TO_BITS(length), priority, reliability, orderingChannel, systemAddress);
|
|
}
|
|
else
|
|
{
|
|
SendBuffered(data, length*8, priority, reliability, orderingChannel, systemAddress, broadcast, RemoteSystemStruct::NO_ACTION);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool RakPeer::Send( const RakNet::BitStream * bitStream, PacketPriority priority, PacketReliability reliability, char orderingChannel, SystemAddress systemAddress, bool broadcast )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( bitStream->GetNumberOfBytesUsed() > 0 );
|
|
#endif
|
|
|
|
if ( bitStream->GetNumberOfBytesUsed() == 0 )
|
|
return false;
|
|
|
|
if ( remoteSystemList == 0 || endThreads == true )
|
|
return false;
|
|
|
|
if ( broadcast == false && systemAddress == UNASSIGNED_SYSTEM_ADDRESS )
|
|
return false;
|
|
|
|
if (broadcast==false && router && IsConnected(systemAddress)==false)
|
|
{
|
|
return router->Send((const char*)bitStream->GetData(), bitStream->GetNumberOfBitsUsed(), priority, reliability, orderingChannel, systemAddress);
|
|
}
|
|
else
|
|
{
|
|
// Sends need to be buffered and processed in the update thread because the systemAddress associated with the reliability layer can change,
|
|
// from that thread, resulting in a send to the wrong player! While I could mutex the systemAddress, that is much slower than doing this
|
|
SendBuffered((const char*)bitStream->GetData(), bitStream->GetNumberOfBitsUsed(), priority, reliability, orderingChannel, systemAddress, broadcast, RemoteSystemStruct::NO_ACTION);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
/// Sends multiple blocks of data, concatenating them automatically.
|
|
///
|
|
/// This is equivalent to:
|
|
/// RakNet::BitStream bs;
|
|
/// bs.WriteAlignedBytes(block1, blockLength1);
|
|
/// bs.WriteAlignedBytes(block2, blockLength2);
|
|
/// bs.WriteAlignedBytes(block3, blockLength3);
|
|
/// Send(&bs, ...)
|
|
///
|
|
/// This function only works while the connected
|
|
/// \param[in] data An array of pointers to blocks of data
|
|
/// \param[in] lengths An array of integers indicating the length of each block of data
|
|
/// \param[in] numParameters Length of the arrays data and lengths
|
|
/// \param[in] priority What priority level to send on. See PacketPriority.h
|
|
/// \param[in] reliability How reliability to send this data. See PacketPriority.h
|
|
/// \param[in] orderingChannel When using ordered or sequenced messages, what channel to order these on. Messages are only ordered relative to other messages on the same stream
|
|
/// \param[in] systemAddress Who to send this packet to, or in the case of broadcasting who not to send it to. Use UNASSIGNED_SYSTEM_ADDRESS to specify none
|
|
/// \param[in] broadcast True to send this packet to all connected systems. If true, then systemAddress specifies who not to send the packet to.
|
|
/// \return False if we are not connected to the specified recipient. True otherwise
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::SendList( char **data, const int *lengths, const int numParameters, PacketPriority priority, PacketReliability reliability, char orderingChannel, SystemAddress systemAddress, bool broadcast )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( data );
|
|
#endif
|
|
|
|
if ( data == 0 || lengths == 0 )
|
|
return false;
|
|
|
|
if ( remoteSystemList == 0 || endThreads == true )
|
|
return false;
|
|
|
|
if (numParameters==0)
|
|
return false;
|
|
|
|
if (lengths==0)
|
|
return false;
|
|
|
|
if ( broadcast == false && systemAddress == UNASSIGNED_SYSTEM_ADDRESS )
|
|
return false;
|
|
|
|
SendBufferedList(data, lengths, numParameters, priority, reliability, orderingChannel, systemAddress, broadcast, RemoteSystemStruct::NO_ACTION);
|
|
|
|
return true;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Gets a packet from the incoming packet queue. Use DeallocatePacket to deallocate the packet after you are done with it. Packets must be deallocated in the same order they are received.
|
|
// Check the Packet struct at the top of CoreNetworkStructures.h for the format of the struct
|
|
//
|
|
// Returns:
|
|
// 0 if no packets are waiting to be handled, otherwise an allocated packet
|
|
// If the client is not active this will also return 0, as all waiting packets are flushed when the client is Disconnected
|
|
// This also updates all memory blocks associated with synchronized memory and distributed objects
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
Packet* RakPeer::Receive( void )
|
|
{
|
|
Packet *packet = ReceiveIgnoreRPC();
|
|
while (packet && (packet->data[ 0 ] == ID_RPC || (packet->length>sizeof(unsigned char)+sizeof(RakNetTime) && packet->data[0]==ID_TIMESTAMP && packet->data[sizeof(unsigned char)+sizeof(RakNetTime)]==ID_RPC)))
|
|
{
|
|
// Do RPC calls from the user thread, not the network update thread
|
|
// If we are currently blocking on an RPC reply, send ID_RPC to the blocker to handle rather than handling RPCs automatically
|
|
HandleRPCPacket( ( char* ) packet->data, packet->length, packet->systemAddress );
|
|
DeallocatePacket( packet );
|
|
|
|
packet = ReceiveIgnoreRPC();
|
|
}
|
|
|
|
return packet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Internal - Gets a packet without checking for RPCs
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
#ifdef _MSC_VER
|
|
#pragma warning( disable : 4701 ) // warning C4701: local variable <variable name> may be used without having been initialized
|
|
#endif
|
|
Packet* RakPeer::ReceiveIgnoreRPC( void )
|
|
{
|
|
if ( !( IsActive() ) )
|
|
return 0;
|
|
|
|
Packet *packet;
|
|
Packet **threadPacket;
|
|
PluginReceiveResult pluginResult;
|
|
|
|
int offset;
|
|
unsigned int i;
|
|
|
|
for (i=0; i < messageHandlerList.Size(); i++)
|
|
{
|
|
messageHandlerList[i]->Update(this);
|
|
}
|
|
|
|
do
|
|
{
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[transferToPacketQueue_Mutex].Lock();
|
|
#endif
|
|
// Take all the messages off the queue so if the user pushes them back they are really pushed back, and not just at the end of the immediate write
|
|
threadPacket=packetSingleProducerConsumer.ReadLock();
|
|
while (threadPacket)
|
|
{
|
|
packet=*threadPacket;
|
|
packetSingleProducerConsumer.ReadUnlock();
|
|
threadPacket=packetSingleProducerConsumer.ReadLock();
|
|
packetPool.Push(packet);
|
|
}
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[transferToPacketQueue_Mutex].Unlock();
|
|
#endif
|
|
|
|
#ifdef _MSC_VER
|
|
#pragma warning( disable : 4127 ) // warning C4127: conditional expression is constant
|
|
#endif
|
|
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[packetPool_Mutex].Lock();
|
|
#endif
|
|
if (packetPool.Size()==0)
|
|
{
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[packetPool_Mutex].Unlock();
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
packet = packetPool.Pop();
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[packetPool_Mutex].Unlock();
|
|
#endif
|
|
if ( ( packet->length >= sizeof(unsigned char) + sizeof( RakNetTime ) ) &&
|
|
( (unsigned char) packet->data[ 0 ] == ID_TIMESTAMP ) )
|
|
{
|
|
offset = sizeof(unsigned char);
|
|
ShiftIncomingTimestamp( packet->data + offset, packet->systemAddress );
|
|
}
|
|
if ( (unsigned char) packet->data[ 0 ] == ID_RPC_REPLY )
|
|
{
|
|
HandleRPCReplyPacket( ( char* ) packet->data, packet->length, packet->systemAddress );
|
|
DeallocatePacket( packet );
|
|
packet=0; // Will do the loop again and get another packet
|
|
}
|
|
else
|
|
{
|
|
for (i=0; i < messageHandlerList.Size(); i++)
|
|
{
|
|
pluginResult=messageHandlerList[i]->OnReceive(this, packet);
|
|
if (pluginResult==RR_STOP_PROCESSING_AND_DEALLOCATE)
|
|
{
|
|
DeallocatePacket( packet );
|
|
packet=0; // Will do the loop again and get another packet
|
|
break; // break out of the enclosing for
|
|
}
|
|
else if (pluginResult==RR_STOP_PROCESSING)
|
|
{
|
|
packet=0;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
} while(packet==0);
|
|
|
|
#ifdef _DEBUG
|
|
assert( packet->data );
|
|
#endif
|
|
|
|
return packet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Call this to deallocate a packet returned by Receive, in the same order returned to you from Receive
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::DeallocatePacket( Packet *packet )
|
|
{
|
|
if ( packet == 0 )
|
|
return;
|
|
|
|
if (packet->deleteData)
|
|
rakFree(packet->data);
|
|
rakFree(packet);
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Return the total number of connections we are allowed
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
unsigned short RakPeer::GetMaximumNumberOfPeers( void ) const
|
|
{
|
|
return maximumNumberOfPeers;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Register a C function as available for calling as a remote procedure call
|
|
//
|
|
// Parameters:
|
|
// uniqueID: A string of only letters to identify this procedure. Recommended you use the macro CLASS_MEMBER_ID for class member functions
|
|
// functionName(...): The name of the C function or C++ singleton to be used as a function pointer
|
|
// This can be called whether the client is active or not, and registered functions stay registered unless unregistered with
|
|
// UnregisterAsRemoteProcedureCall
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::RegisterAsRemoteProcedureCall( const char* uniqueID, void ( *functionPointer ) ( RPCParameters *rpcParms ) )
|
|
{
|
|
if ( uniqueID == 0 || uniqueID[ 0 ] == 0 || functionPointer == 0 )
|
|
return;
|
|
|
|
rpcMap.AddIdentifierWithFunction(uniqueID, (void*)functionPointer, false);
|
|
|
|
/*
|
|
char uppercaseUniqueID[ 256 ];
|
|
|
|
int counter = 0;
|
|
|
|
while ( uniqueID[ counter ] )
|
|
{
|
|
uppercaseUniqueID[ counter ] = ( char ) toupper( uniqueID[ counter ] );
|
|
counter++;
|
|
}
|
|
|
|
uppercaseUniqueID[ counter ] = 0;
|
|
|
|
// Each id must be unique
|
|
//#ifdef _DEBUG
|
|
// assert( rpcTree.IsIn( RPCNode( uppercaseUniqueID, functionName ) ) == false );
|
|
//#endif
|
|
|
|
if (rpcTree.IsIn( RPCNode( uppercaseUniqueID, functionName ) ))
|
|
return;
|
|
|
|
rpcTree.Add( RPCNode( uppercaseUniqueID, functionName ) );
|
|
*/
|
|
}
|
|
|
|
void RakPeer::RegisterClassMemberRPC( const char* uniqueID, void *functionPointer )
|
|
{
|
|
if ( uniqueID == 0 || uniqueID[ 0 ] == 0 || functionPointer == 0 )
|
|
return;
|
|
|
|
rpcMap.AddIdentifierWithFunction(uniqueID, functionPointer, true);
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Unregisters a C function as available for calling as a remote procedure call that was formerly registered
|
|
// with RegisterAsRemoteProcedureCall
|
|
//
|
|
// Parameters:
|
|
// uniqueID: A null terminated string to identify this procedure. Must match the parameter
|
|
// passed to RegisterAsRemoteProcedureCall
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::UnregisterAsRemoteProcedureCall( const char* uniqueID )
|
|
{
|
|
if ( uniqueID == 0 || uniqueID[ 0 ] == 0 )
|
|
return;
|
|
|
|
// Don't call this while running because if you remove RPCs and add them they will not match the indices on the other systems anymore
|
|
#ifdef _DEBUG
|
|
assert(IsActive()==false);
|
|
//assert( strlen( uniqueID ) < 256 );
|
|
#endif
|
|
|
|
rpcMap.RemoveNode(uniqueID);
|
|
|
|
/*
|
|
char uppercaseUniqueID[ 256 ];
|
|
|
|
strcpy( uppercaseUniqueID, uniqueID );
|
|
|
|
int counter = 0;
|
|
|
|
while ( uniqueID[ counter ] )
|
|
{
|
|
uppercaseUniqueID[ counter ] = ( char ) toupper( uniqueID[ counter ] );
|
|
counter++;
|
|
}
|
|
|
|
uppercaseUniqueID[ counter ] = 0;
|
|
|
|
// Unique ID must exist
|
|
#ifdef _DEBUG
|
|
assert( rpcTree.IsIn( RPCNode( uppercaseUniqueID, 0 ) ) == true );
|
|
#endif
|
|
|
|
rpcTree.Del( RPCNode( uppercaseUniqueID, 0 ) );
|
|
*/
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SetNetworkIDManager( NetworkIDManager *manager )
|
|
{
|
|
networkIDManager=manager;
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
NetworkIDManager *RakPeer::GetNetworkIDManager(void) const
|
|
{
|
|
return networkIDManager;
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::RPC( const char* uniqueID, const char *data, BitSize_t bitLength, PacketPriority priority, PacketReliability reliability, char orderingChannel, SystemAddress systemAddress, bool broadcast, RakNetTime *includedTimestamp, NetworkID networkID, RakNet::BitStream *replyFromTarget )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( uniqueID && uniqueID[ 0 ] );
|
|
assert(orderingChannel >=0 && orderingChannel < 32);
|
|
#endif
|
|
|
|
if ( uniqueID == 0 )
|
|
return false;
|
|
|
|
if ( strlen( uniqueID ) > 256 )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 );
|
|
#endif
|
|
return false; // Unique ID is too long
|
|
}
|
|
if (replyFromTarget && blockOnRPCReply==true)
|
|
{
|
|
// TODO - this should be fixed eventually
|
|
// Prevent a bug where function A calls B (blocking) which calls C back on the sender, which calls D, and C is blocking.
|
|
// blockOnRPCReply is a shared variable so making it unset would unset both blocks, rather than the lowest on the callstack
|
|
// Fix by tracking which function the reply is for.
|
|
return false;
|
|
}
|
|
|
|
unsigned *sendList;
|
|
// bool callerAllocationDataUsed;
|
|
unsigned sendListSize;
|
|
|
|
// All this code modifies bcs->data and bcs->numberOfBitsToSend in order to transform an RPC request into an actual packet for SendImmediate
|
|
RPCIndex rpcIndex; // Index into the list of RPC calls so we know what number to encode in the packet
|
|
// char *userData; // RPC ID (the name of it) and a pointer to the data sent by the user
|
|
// int extraBuffer; // How many data bytes were allocated to hold the RPC header
|
|
unsigned remoteSystemIndex, sendListIndex; // Iterates into the list of remote systems
|
|
// int dataBlockAllocationLength; // Total number of bytes to allocate for the packet
|
|
// char *writeTarget; // Used to hold either a block of allocated data or the externally allocated data
|
|
|
|
sendListSize=0;
|
|
bool routeSend;
|
|
routeSend=false;
|
|
|
|
if (broadcast==false)
|
|
{
|
|
#if !defined(_XBOX360)
|
|
sendList=(unsigned *)alloca(sizeof(unsigned));
|
|
#else
|
|
sendList = (unsigned int*) rakMalloc(sizeof(unsigned));
|
|
#endif
|
|
remoteSystemIndex=GetIndexFromSystemAddress( systemAddress, false );
|
|
if (remoteSystemIndex!=(unsigned)-1 &&
|
|
remoteSystemList[remoteSystemIndex].isActive &&
|
|
remoteSystemList[remoteSystemIndex].connectMode!=RemoteSystemStruct::DISCONNECT_ASAP &&
|
|
remoteSystemList[remoteSystemIndex].connectMode!=RemoteSystemStruct::DISCONNECT_ASAP_SILENTLY &&
|
|
remoteSystemList[remoteSystemIndex].connectMode!=RemoteSystemStruct::DISCONNECT_ON_NO_ACK)
|
|
{
|
|
sendList[0]=remoteSystemIndex;
|
|
sendListSize=1;
|
|
}
|
|
else if (router)
|
|
routeSend=true;
|
|
}
|
|
else
|
|
{
|
|
#if !defined(_XBOX360)
|
|
sendList=(unsigned *)alloca(sizeof(unsigned)*maximumNumberOfPeers);
|
|
#else
|
|
sendList = (unsigned int*) rakMalloc(sizeof(unsigned)*maximumNumberOfPeers);
|
|
#endif
|
|
|
|
for ( remoteSystemIndex = 0; remoteSystemIndex < maximumNumberOfPeers; remoteSystemIndex++ )
|
|
{
|
|
if ( remoteSystemList[ remoteSystemIndex ].isActive && remoteSystemList[ remoteSystemIndex ].systemAddress != systemAddress )
|
|
sendList[sendListSize++]=remoteSystemIndex;
|
|
}
|
|
}
|
|
|
|
if (sendListSize==0 && routeSend==false)
|
|
{
|
|
#if defined(_XBOX360)
|
|
rakFree(sendList);
|
|
#endif
|
|
|
|
return false;
|
|
}
|
|
if (routeSend)
|
|
sendListSize=1;
|
|
|
|
RakNet::BitStream outgoingBitStream;
|
|
// remoteSystemList in network thread
|
|
for (sendListIndex=0; sendListIndex < (unsigned)sendListSize; sendListIndex++)
|
|
{
|
|
outgoingBitStream.ResetWritePointer(); // Let us write at the start of the data block, rather than at the end
|
|
|
|
if (includedTimestamp)
|
|
{
|
|
outgoingBitStream.Write((MessageID)ID_TIMESTAMP);
|
|
outgoingBitStream.Write(*includedTimestamp);
|
|
}
|
|
outgoingBitStream.Write((MessageID)ID_RPC);
|
|
if (routeSend)
|
|
rpcIndex=UNDEFINED_RPC_INDEX;
|
|
else
|
|
rpcIndex=remoteSystemList[sendList[sendListIndex]].rpcMap.GetIndexFromFunctionName(uniqueID); // Lots of trouble but we can only use remoteSystem->[whatever] in this thread so that is why this command was buffered
|
|
if (rpcIndex!=UNDEFINED_RPC_INDEX)
|
|
{
|
|
// We have an RPC name to an index mapping, so write the index
|
|
outgoingBitStream.Write(false);
|
|
outgoingBitStream.WriteCompressed(rpcIndex);
|
|
}
|
|
else
|
|
{
|
|
// No mapping, so write the encoded RPC name
|
|
outgoingBitStream.Write(true);
|
|
stringCompressor->EncodeString(uniqueID, 256, &outgoingBitStream);
|
|
}
|
|
outgoingBitStream.Write((bool) ((replyFromTarget!=0)==true));
|
|
outgoingBitStream.WriteCompressed( bitLength );
|
|
if (networkID==UNASSIGNED_NETWORK_ID)
|
|
{
|
|
// No object ID
|
|
outgoingBitStream.Write(false);
|
|
}
|
|
else
|
|
{
|
|
// Encode an object ID. This will use pointer to class member RPC
|
|
outgoingBitStream.Write(true);
|
|
outgoingBitStream.Write(networkID);
|
|
}
|
|
|
|
|
|
if ( bitLength > 0 )
|
|
outgoingBitStream.WriteBits( (const unsigned char *) data, bitLength, false ); // Last param is false to write the raw data originally from another bitstream, rather than shifting from user data
|
|
else
|
|
outgoingBitStream.WriteCompressed( ( unsigned int ) 0 );
|
|
|
|
if (routeSend)
|
|
router->Send((const char*)outgoingBitStream.GetData(), outgoingBitStream.GetNumberOfBitsUsed(), priority,reliability,orderingChannel,systemAddress);
|
|
else
|
|
Send(&outgoingBitStream, priority, reliability, orderingChannel, remoteSystemList[sendList[sendListIndex]].systemAddress, false);
|
|
}
|
|
|
|
#if defined(_XBOX360)
|
|
delete [] sendList;
|
|
#endif
|
|
|
|
if (replyFromTarget)
|
|
{
|
|
blockOnRPCReply=true;
|
|
// 04/20/06 Just do this transparently.
|
|
// We have to be able to read blocking packets out of order. Otherwise, if two systems were to send blocking RPC calls to each other at the same time,
|
|
// and they also had ordered packets waiting before the block, it would be impossible to unblock.
|
|
// assert(reliability==RELIABLE || reliability==UNRELIABLE);
|
|
replyFromTargetBS=replyFromTarget;
|
|
replyFromTargetPlayer=systemAddress;
|
|
replyFromTargetBroadcast=broadcast;
|
|
}
|
|
|
|
// Do not enter this loop on blockOnRPCReply because it is a global which could be set to true by an RPC higher on the callstack, where one RPC was called while waiting for another RPC
|
|
if (replyFromTarget)
|
|
// if (blockOnRPCReply)
|
|
{
|
|
// Packet *p;
|
|
RakNetTime stopWaitingTime=RakNet::GetTime()+30000;
|
|
// RPCIndex arrivedRPCIndex;
|
|
// char uniqueIdentifier[256];
|
|
if (reliability==UNRELIABLE)
|
|
if (systemAddress==UNASSIGNED_SYSTEM_ADDRESS)
|
|
stopWaitingTime=RakNet::GetTime()+1500; // Lets guess the ave. ping is 500. Not important to be very accurate
|
|
else
|
|
stopWaitingTime=RakNet::GetTime()+GetAveragePing(systemAddress)*3;
|
|
|
|
// For reliable messages, block until we get a reply or the connection is lost
|
|
// For unreliable messages, block until we get a reply, the connection is lost, or 3X the ping passes
|
|
while (blockOnRPCReply &&
|
|
((reliability==RELIABLE || reliability==RELIABLE_ORDERED || reliability==RELIABLE_SEQUENCED) ||
|
|
RakNet::GetTime() < stopWaitingTime))
|
|
{
|
|
|
|
RakSleep(30);
|
|
|
|
if (routeSend==false && ValidSendTarget(systemAddress, broadcast)==false)
|
|
return false;
|
|
|
|
unsigned i;
|
|
i=0;
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[packetPool_Mutex].Lock();
|
|
#endif
|
|
|
|
// Scan for RPC reply packets to break out of this loop
|
|
while (i < packetPool.Size())
|
|
{
|
|
if ((unsigned char) packetPool[i]->data[ 0 ] == ID_RPC_REPLY )
|
|
{
|
|
HandleRPCReplyPacket( ( char* ) packetPool[i]->data, packetPool[i]->length, packetPool[i]->systemAddress );
|
|
DeallocatePacket( packetPool[i] );
|
|
packetPool.RemoveAtIndex(i);
|
|
}
|
|
else
|
|
i++;
|
|
}
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[packetPool_Mutex].Unlock();
|
|
#endif
|
|
|
|
PushBackPacket(ReceiveIgnoreRPC(), false);
|
|
|
|
|
|
// I might not support processing other RPCs while blocking on one due to complexities I can't control
|
|
// Problem is FuncA calls FuncB which calls back to the sender FuncC. Sometimes it is desirable to call FuncC before returning a return value
|
|
// from FuncB - sometimes not. There is also a problem with recursion where FuncA calls FuncB which calls FuncA - sometimes valid if
|
|
// a different control path is taken in FuncA. (This can take many different forms)
|
|
/*
|
|
// Same as Receive, but doesn't automatically do RPCs
|
|
p = ReceiveIgnoreRPC();
|
|
if (p)
|
|
{
|
|
// Process all RPC calls except for those calling the function we are currently blocking in (to prevent recursion).
|
|
if ( p->data[ 0 ] == ID_RPC )
|
|
{
|
|
RakNet::BitStream temp((unsigned char *) p->data, p->length, false);
|
|
RPCNode *rpcNode;
|
|
temp.IgnoreBits(8);
|
|
bool nameIsEncoded;
|
|
temp.Read(nameIsEncoded);
|
|
if (nameIsEncoded)
|
|
{
|
|
stringCompressor->DecodeString((char*)uniqueIdentifier, 256, &temp);
|
|
}
|
|
else
|
|
{
|
|
temp.ReadCompressed( arrivedRPCIndex );
|
|
rpcNode=rpcMap.GetNodeFromIndex( arrivedRPCIndex );
|
|
if (rpcNode==0)
|
|
{
|
|
// Invalid RPC format
|
|
#ifdef _DEBUG
|
|
assert(0);
|
|
#endif
|
|
DeallocatePacket(p);
|
|
continue;
|
|
}
|
|
else
|
|
strcpy(uniqueIdentifier, rpcNode->uniqueIdentifier);
|
|
}
|
|
|
|
if (strcmp(uniqueIdentifier, uniqueID)!=0)
|
|
{
|
|
HandleRPCPacket( ( char* ) p->data, p->length, p->systemAddress );
|
|
DeallocatePacket(p);
|
|
}
|
|
else
|
|
{
|
|
PushBackPacket(p, false);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
PushBackPacket(p, false);
|
|
}
|
|
}
|
|
*/
|
|
}
|
|
|
|
blockOnRPCReply=false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
#ifdef _MSC_VER
|
|
#pragma warning( disable : 4701 ) // warning C4701: local variable <variable name> may be used without having been initialized
|
|
#endif
|
|
bool RakPeer::RPC( const char* uniqueID, const RakNet::BitStream *bitStream, PacketPriority priority, PacketReliability reliability, char orderingChannel, SystemAddress systemAddress, bool broadcast, RakNetTime *includedTimestamp, NetworkID networkID, RakNet::BitStream *replyFromTarget )
|
|
{
|
|
if (bitStream)
|
|
return RPC(uniqueID, (const char*) bitStream->GetData(), bitStream->GetNumberOfBitsUsed(), priority, reliability, orderingChannel, systemAddress, broadcast, includedTimestamp, networkID, replyFromTarget);
|
|
else
|
|
return RPC(uniqueID, 0,0, priority, reliability, orderingChannel, systemAddress, broadcast, includedTimestamp, networkID, replyFromTarget);
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Close the connection to another host (if we initiated the connection it will disconnect, if they did it will kick them out).
|
|
//
|
|
// Parameters:
|
|
// target: Which connection to close
|
|
// sendDisconnectionNotification: True to send ID_DISCONNECTION_NOTIFICATION to the recipient. False to close it silently.
|
|
// channel: If blockDuration > 0, the disconnect packet will be sent on this channel
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::CloseConnection( const SystemAddress target, bool sendDisconnectionNotification, unsigned char orderingChannel )
|
|
{
|
|
CloseConnectionInternal(target, sendDisconnectionNotification, false, orderingChannel);
|
|
|
|
// This only be called from the user thread, for the user shutting down.
|
|
// From the network thread, this should occur because of ID_DISCONNECTION_NOTIFICATION and ID_CONNECTION_LOST
|
|
unsigned j;
|
|
for (j=0; j < messageHandlerList.Size(); j++)
|
|
{
|
|
messageHandlerList[j]->OnCloseConnection(this, target);
|
|
}
|
|
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Returns if a particular systemAddress is connected to us
|
|
// \param[in] systemAddress The SystemAddress we are referring to
|
|
// \return True if this system is connected and active, false otherwise.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::IsConnected( const SystemAddress systemAddress, bool includeInProgress, bool includeDisconnecting )
|
|
{
|
|
int index;
|
|
index = GetIndexFromSystemAddress(systemAddress, false);
|
|
return index!=-1 && remoteSystemList[index].isActive &&
|
|
(((includeInProgress && (remoteSystemList[index].connectMode==RemoteSystemStruct::REQUESTED_CONNECTION ||
|
|
remoteSystemList[index].connectMode==RemoteSystemStruct::HANDLING_CONNECTION_REQUEST ||
|
|
remoteSystemList[index].connectMode==RemoteSystemStruct::UNVERIFIED_SENDER ||
|
|
remoteSystemList[index].connectMode==RemoteSystemStruct::SET_ENCRYPTION_ON_MULTIPLE_16_BYTE_PACKET))
|
|
||
|
|
(includeDisconnecting && (
|
|
remoteSystemList[index].connectMode==RemoteSystemStruct::DISCONNECT_ASAP ||
|
|
remoteSystemList[index].connectMode==RemoteSystemStruct::DISCONNECT_ASAP_SILENTLY ||
|
|
remoteSystemList[index].connectMode==RemoteSystemStruct::DISCONNECT_ON_NO_ACK))
|
|
||
|
|
remoteSystemList[index].connectMode==RemoteSystemStruct::CONNECTED))
|
|
;
|
|
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Given a systemAddress, returns an index from 0 to the maximum number of players allowed - 1.
|
|
//
|
|
// Parameters
|
|
// systemAddress - The systemAddress to search for
|
|
//
|
|
// Returns
|
|
// An integer from 0 to the maximum number of peers -1, or -1 if that player is not found
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
int RakPeer::GetIndexFromSystemAddress( const SystemAddress systemAddress )
|
|
{
|
|
return GetIndexFromSystemAddress(systemAddress, false);
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// This function is only useful for looping through all players.
|
|
//
|
|
// Parameters
|
|
// index - an integer between 0 and the maximum number of players allowed - 1.
|
|
//
|
|
// Returns
|
|
// A valid systemAddress or UNASSIGNED_SYSTEM_ADDRESS if no such player at that index
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
SystemAddress RakPeer::GetSystemAddressFromIndex( int index )
|
|
{
|
|
// remoteSystemList in user thread
|
|
//if ( index >= 0 && index < remoteSystemListSize )
|
|
if ( index >= 0 && index < maximumNumberOfPeers )
|
|
if (remoteSystemList[index].isActive && remoteSystemList[ index ].connectMode==RakPeer::RemoteSystemStruct::CONNECTED) // Don't give the user players that aren't fully connected, since sends will fail
|
|
return remoteSystemList[ index ].systemAddress;
|
|
|
|
return UNASSIGNED_SYSTEM_ADDRESS;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Bans an IP from connecting. Banned IPs persist between connections.
|
|
//
|
|
// Parameters
|
|
// IP - Dotted IP address. Can use * as a wildcard, such as 128.0.0.* will ban
|
|
// All IP addresses starting with 128.0.0
|
|
// milliseconds - how many ms for a temporary ban. Use 0 for a permanent ban
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::AddToBanList( const char *IP, RakNetTime milliseconds )
|
|
{
|
|
unsigned index;
|
|
RakNetTime time = RakNet::GetTime();
|
|
|
|
if ( IP == 0 || IP[ 0 ] == 0 || strlen( IP ) > 15 )
|
|
return ;
|
|
|
|
// If this guy is already in the ban list, do nothing
|
|
index = 0;
|
|
|
|
banListMutex.Lock();
|
|
|
|
for ( ; index < banList.Size(); index++ )
|
|
{
|
|
if ( strcmp( IP, banList[ index ]->IP ) == 0 )
|
|
{
|
|
// Already in the ban list. Just update the time
|
|
if (milliseconds==0)
|
|
banList[ index ]->timeout=0; // Infinite
|
|
else
|
|
banList[ index ]->timeout=time+milliseconds;
|
|
banListMutex.Unlock();
|
|
return;
|
|
}
|
|
}
|
|
|
|
banListMutex.Unlock();
|
|
|
|
BanStruct *banStruct = new BanStruct;
|
|
banStruct->IP = (char*) rakMalloc( 16 );
|
|
if (milliseconds==0)
|
|
banStruct->timeout=0; // Infinite
|
|
else
|
|
banStruct->timeout=time+milliseconds;
|
|
strcpy( banStruct->IP, IP );
|
|
banListMutex.Lock();
|
|
banList.Insert( banStruct );
|
|
banListMutex.Unlock();
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Allows a previously banned IP to connect.
|
|
//
|
|
// Parameters
|
|
// IP - Dotted IP address. Can use * as a wildcard, such as 128.0.0.* will ban
|
|
// All IP addresses starting with 128.0.0
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::RemoveFromBanList( const char *IP )
|
|
{
|
|
unsigned index;
|
|
BanStruct *temp;
|
|
|
|
if ( IP == 0 || IP[ 0 ] == 0 || strlen( IP ) > 15 )
|
|
return ;
|
|
|
|
index = 0;
|
|
temp=0;
|
|
|
|
banListMutex.Lock();
|
|
|
|
for ( ; index < banList.Size(); index++ )
|
|
{
|
|
if ( strcmp( IP, banList[ index ]->IP ) == 0 )
|
|
{
|
|
temp = banList[ index ];
|
|
banList[ index ] = banList[ banList.Size() - 1 ];
|
|
banList.RemoveAtIndex( banList.Size() - 1 );
|
|
break;
|
|
}
|
|
}
|
|
|
|
banListMutex.Unlock();
|
|
|
|
if (temp)
|
|
{
|
|
rakFree(temp->IP);
|
|
delete temp;
|
|
}
|
|
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Allows all previously banned IPs to connect.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::ClearBanList( void )
|
|
{
|
|
unsigned index;
|
|
index = 0;
|
|
banListMutex.Lock();
|
|
|
|
for ( ; index < banList.Size(); index++ )
|
|
{
|
|
rakFree(banList[ index ]->IP);
|
|
delete [] banList[ index ];
|
|
}
|
|
|
|
banList.Clear();
|
|
|
|
banListMutex.Unlock();
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Determines if a particular IP is banned.
|
|
//
|
|
// Parameters
|
|
// IP - Complete dotted IP address
|
|
//
|
|
// Returns
|
|
// True if IP matches any IPs in the ban list, accounting for any wildcards.
|
|
// False otherwise.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::IsBanned( const char *IP )
|
|
{
|
|
unsigned banListIndex, characterIndex;
|
|
RakNetTime time;
|
|
BanStruct *temp;
|
|
|
|
if ( IP == 0 || IP[ 0 ] == 0 || strlen( IP ) > 15 )
|
|
return false;
|
|
|
|
banListIndex = 0;
|
|
|
|
if ( banList.Size() == 0 )
|
|
return false; // Skip the mutex if possible
|
|
|
|
time = RakNet::GetTime();
|
|
|
|
banListMutex.Lock();
|
|
|
|
while ( banListIndex < banList.Size() )
|
|
{
|
|
if (banList[ banListIndex ]->timeout>0 && banList[ banListIndex ]->timeout<time)
|
|
{
|
|
// Delete expired ban
|
|
temp = banList[ banListIndex ];
|
|
banList[ banListIndex ] = banList[ banList.Size() - 1 ];
|
|
banList.RemoveAtIndex( banList.Size() - 1 );
|
|
rakFree(temp->IP);
|
|
delete temp;
|
|
}
|
|
else
|
|
{
|
|
characterIndex = 0;
|
|
|
|
#ifdef _MSC_VER
|
|
#pragma warning( disable : 4127 ) // warning C4127: conditional expression is constant
|
|
#endif
|
|
while ( true )
|
|
{
|
|
if ( banList[ banListIndex ]->IP[ characterIndex ] == IP[ characterIndex ] )
|
|
{
|
|
// Equal characters
|
|
|
|
if ( IP[ characterIndex ] == 0 )
|
|
{
|
|
banListMutex.Unlock();
|
|
// End of the string and the strings match
|
|
|
|
return true;
|
|
}
|
|
|
|
characterIndex++;
|
|
}
|
|
|
|
else
|
|
{
|
|
if ( banList[ banListIndex ]->IP[ characterIndex ] == 0 || IP[ characterIndex ] == 0 )
|
|
{
|
|
// End of one of the strings
|
|
break;
|
|
}
|
|
|
|
// Characters do not match
|
|
if ( banList[ banListIndex ]->IP[ characterIndex ] == '*' )
|
|
{
|
|
banListMutex.Unlock();
|
|
|
|
// Domain is banned.
|
|
return true;
|
|
}
|
|
|
|
// Characters do not match and it is not a *
|
|
break;
|
|
}
|
|
}
|
|
|
|
banListIndex++;
|
|
}
|
|
}
|
|
|
|
banListMutex.Unlock();
|
|
|
|
// No match found.
|
|
return false;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Send a ping to the specified connected system.
|
|
//
|
|
// Parameters:
|
|
// target - who to ping
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::Ping( const SystemAddress target )
|
|
{
|
|
PingInternal(target, false, UNRELIABLE);
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Send a ping to the specified unconnected system.
|
|
// The remote system, if it is Initialized, will respond with ID_PONG.
|
|
// The final ping time will be encoded in the following sizeof(RakNetTime) bytes. (Default is 4 bytes - See __GET_TIME_64BIT in RakNetTypes.h
|
|
//
|
|
// Parameters:
|
|
// host: Either a dotted IP address or a domain name. Can be 255.255.255.255 for LAN broadcast.
|
|
// remotePort: Which port to connect to on the remote machine.
|
|
// onlyReplyOnAcceptingConnections: Only request a reply if the remote system has open connections
|
|
// connectionSocketIndex Index into the array of socket descriptors passed to socketDescriptors in RakPeer::Startup() to send on.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::Ping( const char* host, unsigned short remotePort, bool onlyReplyOnAcceptingConnections, unsigned connectionSocketIndex )
|
|
{
|
|
if ( host == 0 )
|
|
return;
|
|
|
|
// If this assert hits then Startup wasn't called or the call failed.
|
|
RakAssert(connectionSocketIndex < connectionSocketsLength);
|
|
|
|
// if ( IsActive() == false )
|
|
// return;
|
|
|
|
if ( host[ 0 ] < '0' || host[ 0 ] > '9' )
|
|
{
|
|
#if !defined(_XBOX360)
|
|
host = ( char* ) SocketLayer::Instance()->DomainNameToIP( host );
|
|
#else
|
|
return;
|
|
#endif
|
|
}
|
|
|
|
SystemAddress systemAddress;
|
|
systemAddress.SetBinaryAddress(host);
|
|
systemAddress.port=remotePort;
|
|
|
|
RakNet::BitStream bitStream( sizeof(unsigned char) + sizeof(RakNetTime) );
|
|
if ( onlyReplyOnAcceptingConnections )
|
|
bitStream.Write((MessageID)ID_PING_OPEN_CONNECTIONS);
|
|
else
|
|
bitStream.Write((MessageID)ID_PING);
|
|
|
|
bitStream.Write(RakNet::GetTime());
|
|
|
|
bitStream.WriteAlignedBytes((const unsigned char*) OFFLINE_MESSAGE_DATA_ID, sizeof(OFFLINE_MESSAGE_DATA_ID));
|
|
|
|
unsigned i;
|
|
for (i=0; i < messageHandlerList.Size(); i++)
|
|
messageHandlerList[i]->OnDirectSocketSend((const char*)bitStream.GetData(), bitStream.GetNumberOfBitsUsed(), systemAddress);
|
|
// No timestamp for 255.255.255.255
|
|
SocketLayer::Instance()->SendTo( connectionSockets[connectionSocketIndex], (const char*)bitStream.GetData(), (int) bitStream.GetNumberOfBytesUsed(), ( char* ) host, remotePort );
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Returns the average of all ping times read for a specified target
|
|
//
|
|
// Parameters:
|
|
// target - whose time to read
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
int RakPeer::GetAveragePing( const SystemAddress systemAddress )
|
|
{
|
|
int sum, quantity;
|
|
RemoteSystemStruct *remoteSystem = GetRemoteSystemFromSystemAddress( systemAddress, false, false );
|
|
|
|
if ( remoteSystem == 0 )
|
|
return -1;
|
|
|
|
for ( sum = 0, quantity = 0; quantity < PING_TIMES_ARRAY_SIZE; quantity++ )
|
|
{
|
|
if ( remoteSystem->pingAndClockDifferential[ quantity ].pingTime == 65535 )
|
|
break;
|
|
else
|
|
sum += remoteSystem->pingAndClockDifferential[ quantity ].pingTime;
|
|
}
|
|
|
|
if ( quantity > 0 )
|
|
return sum / quantity;
|
|
else
|
|
return -1;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Returns the last ping time read for the specific player or -1 if none read yet
|
|
//
|
|
// Parameters:
|
|
// target - whose time to read
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
int RakPeer::GetLastPing( const SystemAddress systemAddress ) const
|
|
{
|
|
RemoteSystemStruct * remoteSystem = GetRemoteSystemFromSystemAddress( systemAddress, false, false );
|
|
|
|
if ( remoteSystem == 0 )
|
|
return -1;
|
|
|
|
return (int)(remoteSystem->reliabilityLayer.GetAckPing()/(RakNetTimeNS)1000);
|
|
|
|
// if ( remoteSystem->pingAndClockDifferentialWriteIndex == 0 )
|
|
// return remoteSystem->pingAndClockDifferential[ PING_TIMES_ARRAY_SIZE - 1 ].pingTime;
|
|
// else
|
|
// return remoteSystem->pingAndClockDifferential[ remoteSystem->pingAndClockDifferentialWriteIndex - 1 ].pingTime;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Returns the lowest ping time read or -1 if none read yet
|
|
//
|
|
// Parameters:
|
|
// target - whose time to read
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
int RakPeer::GetLowestPing( const SystemAddress systemAddress ) const
|
|
{
|
|
RemoteSystemStruct * remoteSystem = GetRemoteSystemFromSystemAddress( systemAddress, false, false );
|
|
|
|
if ( remoteSystem == 0 )
|
|
return -1;
|
|
|
|
return remoteSystem->lowestPing;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Ping the remote systems every so often. This is off by default
|
|
// This will work anytime
|
|
//
|
|
// Parameters:
|
|
// doPing - True to start occasional pings. False to stop them.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SetOccasionalPing( bool doPing )
|
|
{
|
|
occasionalPing = doPing;
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Length should be under 400 bytes, as a security measure against flood attacks
|
|
// Sets the data to send with an (LAN server discovery) /(offline ping) response
|
|
// See the Ping sample project for how this is used.
|
|
// data: a block of data to store, or 0 for none
|
|
// length: The length of data in bytes, or 0 for none
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SetOfflinePingResponse( const char *data, const unsigned int length )
|
|
{
|
|
assert(length < 400);
|
|
|
|
rakPeerMutexes[ offlinePingResponse_Mutex ].Lock();
|
|
offlinePingResponse.Reset();
|
|
|
|
if ( data && length > 0 )
|
|
offlinePingResponse.Write( data, length );
|
|
|
|
rakPeerMutexes[ offlinePingResponse_Mutex ].Unlock();
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Returns pointers to a copy of the data passed to SetOfflinePingResponse
|
|
// \param[out] data A pointer to a copy of the data passed to \a SetOfflinePingResponse()
|
|
// \param[out] length A pointer filled in with the length parameter passed to SetOfflinePingResponse()
|
|
// \sa SetOfflinePingResponse
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::GetOfflinePingResponse( char **data, unsigned int *length )
|
|
{
|
|
rakPeerMutexes[ offlinePingResponse_Mutex ].Lock();
|
|
*data = (char*) offlinePingResponse.GetData();
|
|
*length = (int) offlinePingResponse.GetNumberOfBytesUsed();
|
|
rakPeerMutexes[ offlinePingResponse_Mutex ].Unlock();
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Return the unique SystemAddress that represents you on the the network
|
|
// Note that unlike in previous versions, this is a struct and is not sequential
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
SystemAddress RakPeer::GetInternalID( const SystemAddress systemAddress ) const
|
|
{
|
|
if (systemAddress==UNASSIGNED_SYSTEM_ADDRESS)
|
|
return mySystemAddress;
|
|
else
|
|
{
|
|
#if !defined(_XBOX360)
|
|
// SystemAddress returnValue;
|
|
RemoteSystemStruct * remoteSystem = GetRemoteSystemFromSystemAddress( systemAddress, false, true );
|
|
if (remoteSystem==0)
|
|
return UNASSIGNED_SYSTEM_ADDRESS;
|
|
if (connectionSockets==0)
|
|
return UNASSIGNED_SYSTEM_ADDRESS;
|
|
|
|
return remoteSystem->theirInternalSystemAddress;
|
|
/*
|
|
sockaddr_in sa;
|
|
socklen_t len = sizeof(sa);
|
|
if (getsockname(connectionSockets[remoteSystem->connectionSocketIndex], (sockaddr*)&sa, &len)!=0)
|
|
return UNASSIGNED_SYSTEM_ADDRESS;
|
|
returnValue.port=ntohs(sa.sin_port);
|
|
returnValue.binaryAddress=sa.sin_addr.s_addr;
|
|
return returnValue;
|
|
*/
|
|
#else
|
|
return UNASSIGNED_SYSTEM_ADDRESS;
|
|
#endif
|
|
}
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Return the unique address identifier that represents you on the the network and is based on your external
|
|
// IP / port (the IP / port the specified player uses to communicate with you)
|
|
// Note that unlike in previous versions, this is a struct and is not sequential
|
|
//
|
|
// Parameters:
|
|
// target: Which remote system you are referring to for your external ID
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
SystemAddress RakPeer::GetExternalID( const SystemAddress target ) const
|
|
{
|
|
unsigned i;
|
|
SystemAddress inactiveExternalId;
|
|
|
|
inactiveExternalId=UNASSIGNED_SYSTEM_ADDRESS;
|
|
|
|
if (target==UNASSIGNED_SYSTEM_ADDRESS)
|
|
return firstExternalID;
|
|
|
|
// First check for active connection with this systemAddress
|
|
for ( i = 0; i < maximumNumberOfPeers; i++ )
|
|
{
|
|
if (remoteSystemList[ i ].systemAddress == target )
|
|
{
|
|
if ( remoteSystemList[ i ].isActive )
|
|
return remoteSystemList[ i ].myExternalSystemAddress;
|
|
else if (remoteSystemList[ i ].myExternalSystemAddress!=UNASSIGNED_SYSTEM_ADDRESS)
|
|
inactiveExternalId=remoteSystemList[ i ].myExternalSystemAddress;
|
|
}
|
|
}
|
|
|
|
return inactiveExternalId;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Set the time, in MS, to use before considering ourselves disconnected after not being able to deliver a reliable packet
|
|
// \param[in] time Time, in MS
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SetTimeoutTime( RakNetTime timeMS, const SystemAddress target )
|
|
{
|
|
if (target==UNASSIGNED_SYSTEM_ADDRESS)
|
|
{
|
|
defaultTimeoutTime=timeMS;
|
|
|
|
unsigned i;
|
|
for ( i = 0; i < maximumNumberOfPeers; i++ )
|
|
{
|
|
if (remoteSystemList[ i ].isActive)
|
|
{
|
|
if ( remoteSystemList[ i ].isActive )
|
|
remoteSystemList[ i ].reliabilityLayer.SetTimeoutTime(timeMS);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
RemoteSystemStruct * remoteSystem = GetRemoteSystemFromSystemAddress( target, false, true );
|
|
|
|
if ( remoteSystem != 0 )
|
|
remoteSystem->reliabilityLayer.SetTimeoutTime(timeMS);
|
|
}
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Change the MTU size in order to improve performance when sending large packets
|
|
// This can only be called when not connected.
|
|
// A too high of value will cause packets not to arrive at worst and be fragmented at best.
|
|
// A too low of value will split packets unnecessarily.
|
|
//
|
|
// Parameters:
|
|
// size: Set according to the following table:
|
|
// 1500. The largest Ethernet packet size
|
|
// This is the typical setting for non-PPPoE, non-VPN connections. The default value for NETGEAR routers, adapters and switches.
|
|
// 1492. The size PPPoE prefers.
|
|
// 1472. Maximum size to use for pinging. (Bigger packets are fragmented.)
|
|
// 1468. The size DHCP prefers.
|
|
// 1460. Usable by AOL if you don't have large email attachments, etc.
|
|
// 1430. The size VPN and PPTP prefer.
|
|
// 1400. Maximum size for AOL DSL.
|
|
// 576. Typical value to connect to dial-up ISPs. (Default)
|
|
//
|
|
// Returns:
|
|
// False on failure (we are connected). True on success. Maximum allowed size is MAXIMUM_MTU_SIZE
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::SetMTUSize( int size )
|
|
{
|
|
if ( IsActive() )
|
|
return false;
|
|
|
|
if ( size < 512 )
|
|
size = 512;
|
|
else if ( size > MAXIMUM_MTU_SIZE )
|
|
size = MAXIMUM_MTU_SIZE;
|
|
|
|
defaultMTUSize = size;
|
|
|
|
return true;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Returns the current MTU size
|
|
//
|
|
// Returns:
|
|
// The MTU sized specified in SetMTUSize
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
int RakPeer::GetMTUSize( const SystemAddress target ) const
|
|
{
|
|
if (target!=UNASSIGNED_SYSTEM_ADDRESS)
|
|
{
|
|
RemoteSystemStruct *rss=GetRemoteSystemFromSystemAddress(target, false, true);
|
|
if (rss)
|
|
return rss->MTUSize;
|
|
}
|
|
return defaultMTUSize;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Returns the number of IP addresses we have
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
unsigned int RakPeer::GetNumberOfAddresses( void )
|
|
{
|
|
#if !defined(_XBOX360)
|
|
char ipList[ 10 ][ 16 ];
|
|
memset( ipList, 0, sizeof( char ) * 16 * 10 );
|
|
SocketLayer::Instance()->GetMyIP( ipList );
|
|
|
|
int i = 0;
|
|
|
|
while ( ipList[ i ][ 0 ] )
|
|
i++;
|
|
|
|
return i;
|
|
#else
|
|
assert(0);
|
|
return 0;
|
|
#endif
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Returns an IP address at index 0 to GetNumberOfAddresses-1
|
|
// \param[in] index index into the list of IP addresses
|
|
// \return The local IP address at this index
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
const char* RakPeer::GetLocalIP( unsigned int index )
|
|
{
|
|
#if !defined(_XBOX360)
|
|
static char ipList[ 10 ][ 16 ];
|
|
|
|
if ( index >= 10 )
|
|
index = 9;
|
|
|
|
memset( ipList, 0, sizeof( char ) * 16 * 10 );
|
|
|
|
SocketLayer::Instance()->GetMyIP( ipList );
|
|
|
|
return ipList[ index ];
|
|
#else
|
|
assert(0);
|
|
return 0;
|
|
#endif
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Is this a local IP?
|
|
// \param[in] An IP address to check
|
|
// \return True if this is one of the IP addresses returned by GetLocalIP
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::IsLocalIP( const char *ip )
|
|
{
|
|
if (ip==0 || ip[0]==0)
|
|
return false;
|
|
|
|
if (strcmp(ip, "127.0.0.1")==0)
|
|
return true;
|
|
|
|
#if !defined(_XBOX360)
|
|
int num = GetNumberOfAddresses();
|
|
int i;
|
|
for (i=0; i < num; i++)
|
|
{
|
|
if (strcmp(ip, GetLocalIP(i))==0)
|
|
return true;
|
|
}
|
|
#else
|
|
RakAssert(0);
|
|
#endif
|
|
return false;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Allow or disallow connection responses from any IP. Normally this should be false, but may be necessary
|
|
// when connection to servers with multiple IP addresses
|
|
//
|
|
// Parameters:
|
|
// allow - True to allow this behavior, false to not allow. Defaults to false. Value persists between connections
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::AllowConnectionResponseIPMigration( bool allow )
|
|
{
|
|
allowConnectionResponseIPMigration = allow;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Sends a one byte message ID_ADVERTISE_SYSTEM to the remote unconnected system.
|
|
// This will tell the remote system our external IP outside the LAN, and can be used for NAT punch through
|
|
//
|
|
// Requires:
|
|
// The sender and recipient must already be started via a successful call to Initialize
|
|
//
|
|
// host: Either a dotted IP address or a domain name
|
|
// remotePort: Which port to connect to on the remote machine.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::AdvertiseSystem( const char *host, unsigned short remotePort, const char *data, int dataLength, unsigned connectionSocketIndex )
|
|
{
|
|
return SendOutOfBand(host, remotePort, ID_ADVERTISE_SYSTEM, data, dataLength, connectionSocketIndex );
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Controls how often to return ID_DOWNLOAD_PROGRESS for large message downloads.
|
|
// ID_DOWNLOAD_PROGRESS is returned to indicate a new partial message chunk, roughly the MTU size, has arrived
|
|
// As it can be slow or cumbersome to get this notification for every chunk, you can set the interval at which it is returned.
|
|
// Defaults to 0 (never return this notification)
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SetSplitMessageProgressInterval(int interval)
|
|
{
|
|
RakAssert(interval>=0);
|
|
splitMessageProgressInterval=interval;
|
|
for ( unsigned short i = 0; i < maximumNumberOfPeers; i++ )
|
|
remoteSystemList[ i ].reliabilityLayer.SetSplitMessageProgressInterval(splitMessageProgressInterval);
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Set how long to wait before giving up on sending an unreliable message
|
|
// Useful if the network is clogged up.
|
|
// Set to 0 or less to never timeout. Defaults to 0.
|
|
// timeoutMS How many ms to wait before simply not sending an unreliable message.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SetUnreliableTimeout(RakNetTime timeoutMS)
|
|
{
|
|
RakAssert(timeoutMS>=0);
|
|
unreliableTimeout=timeoutMS;
|
|
for ( unsigned short i = 0; i < maximumNumberOfPeers; i++ )
|
|
remoteSystemList[ i ].reliabilityLayer.SetUnreliableTimeout(unreliableTimeout);
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
/// Send a message to host, with the IP socket option TTL set to 3
|
|
/// This message will not reach the host, but will open the router.
|
|
/// Used for NAT-Punchthrough
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SendTTL( const char* host, unsigned short remotePort, int ttl, unsigned connectionSocketIndex )
|
|
{
|
|
char fakeData[2];
|
|
fakeData[0]=0;
|
|
fakeData[1]=1;
|
|
SocketLayer::Instance()->SendToTTL( connectionSockets[connectionSocketIndex], (char*)fakeData, 2, (char*) host, remotePort, ttl );
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Enables or disables our tracking of bytes input to and output from the network.
|
|
// This is required to get a frequency table, which is used to generate a new compression layer.
|
|
// You can call this at any time - however you SHOULD only call it when disconnected. Otherwise you will only track
|
|
// part of the values sent over the network.
|
|
// This value persists between connect calls and defaults to false (no frequency tracking)
|
|
//
|
|
// Parameters:
|
|
// doCompile - true to track bytes. Defaults to false
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SetCompileFrequencyTable( bool doCompile )
|
|
{
|
|
trackFrequencyTable = doCompile;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Returns the frequency of outgoing bytes into outputFrequencyTable
|
|
// The purpose is to save to file as either a master frequency table from a sample game session for passing to
|
|
// GenerateCompressionLayer(false)
|
|
// You should only call this when disconnected.
|
|
// Requires that you first enable data frequency tracking by calling SetCompileFrequencyTable(true)
|
|
//
|
|
// Parameters:
|
|
// outputFrequencyTable (out): The frequency of each corresponding byte
|
|
//
|
|
// Returns:
|
|
// Ffalse (failure) if connected or if frequency table tracking is not enabled. Otherwise true (success)
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::GetOutgoingFrequencyTable( unsigned int outputFrequencyTable[ 256 ] )
|
|
{
|
|
if ( IsActive() )
|
|
return false;
|
|
|
|
if ( trackFrequencyTable == false )
|
|
return false;
|
|
|
|
memcpy( outputFrequencyTable, frequencyTable, sizeof( unsigned int ) * 256 );
|
|
|
|
return true;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Generates the compression layer from the input frequency table.
|
|
// You should call this twice - once with inputLayer as true and once as false.
|
|
// The frequency table passed here with inputLayer=true should match the frequency table on the recipient with inputLayer=false.
|
|
// Likewise, the frequency table passed here with inputLayer=false should match the frequency table on the recipient with inputLayer=true
|
|
// Calling this function when there is an existing layer will overwrite the old layer
|
|
// You should only call this when disconnected
|
|
//
|
|
// Parameters:
|
|
// inputFrequencyTable: The frequency table returned from GetSendFrequencyTable(...)
|
|
// inputLayer - Whether inputFrequencyTable represents incoming data from other systems (true) or outgoing data from this system (false)
|
|
//
|
|
// Returns:
|
|
// False on failure (we are connected). True otherwise
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::GenerateCompressionLayer( unsigned int inputFrequencyTable[ 256 ], bool inputLayer )
|
|
{
|
|
if ( IsActive() )
|
|
return false;
|
|
|
|
DeleteCompressionLayer( inputLayer );
|
|
|
|
if ( inputLayer )
|
|
{
|
|
inputTree = new HuffmanEncodingTree;
|
|
inputTree->GenerateFromFrequencyTable( inputFrequencyTable );
|
|
}
|
|
|
|
else
|
|
{
|
|
outputTree = new HuffmanEncodingTree;
|
|
outputTree->GenerateFromFrequencyTable( inputFrequencyTable );
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Deletes the output or input layer as specified. This is not necessary to call and is only valuable for freeing memory
|
|
// You should only call this when disconnected
|
|
//
|
|
// Parameters:
|
|
// inputLayer - Specifies the corresponding compression layer generated by GenerateCompressionLayer.
|
|
//
|
|
// Returns:
|
|
// False on failure (we are connected). True otherwise
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::DeleteCompressionLayer( bool inputLayer )
|
|
{
|
|
if ( IsActive() )
|
|
return false;
|
|
|
|
if ( inputLayer )
|
|
{
|
|
if ( inputTree )
|
|
{
|
|
delete inputTree;
|
|
inputTree = 0;
|
|
}
|
|
}
|
|
|
|
else
|
|
{
|
|
if ( outputTree )
|
|
{
|
|
delete outputTree;
|
|
outputTree = 0;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Returns:
|
|
// The compression ratio. A low compression ratio is good. Compression is for outgoing data
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
float RakPeer::GetCompressionRatio( void ) const
|
|
{
|
|
if ( rawBytesSent > 0 )
|
|
{
|
|
return ( float ) compressedBytesSent / ( float ) rawBytesSent;
|
|
}
|
|
|
|
else
|
|
return 0.0f;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Returns:
|
|
// The decompression ratio. A high decompression ratio is good. Decompression is for incoming data
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
float RakPeer::GetDecompressionRatio( void ) const
|
|
{
|
|
if ( rawBytesReceived > 0 )
|
|
{
|
|
return ( float ) compressedBytesReceived / ( float ) rawBytesReceived;
|
|
}
|
|
|
|
else
|
|
return 0.0f;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Attatches a Plugin interface to run code automatically on message receipt in the Receive call
|
|
//
|
|
// \param messageHandler Pointer to a plugin to attach
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::AttachPlugin( PluginInterface *plugin )
|
|
{
|
|
if (messageHandlerList.GetIndexOf(plugin)==MAX_UNSIGNED_LONG)
|
|
{
|
|
messageHandlerList.Insert(plugin);
|
|
plugin->OnAttach(this);
|
|
}
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Detaches a Plugin interface to run code automatically on message receipt
|
|
//
|
|
// \param messageHandler Pointer to a plugin to detach
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::DetachPlugin( PluginInterface *plugin )
|
|
{
|
|
if (plugin==0)
|
|
return;
|
|
|
|
unsigned int index;
|
|
index = messageHandlerList.GetIndexOf(plugin);
|
|
if (index!=MAX_UNSIGNED_LONG)
|
|
{
|
|
messageHandlerList[index]->OnDetach(this);
|
|
// Unordered list so delete from end for speed
|
|
messageHandlerList[index]=messageHandlerList[messageHandlerList.Size()-1];
|
|
messageHandlerList.RemoveFromEnd();
|
|
}
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Put a packet back at the end of the receive queue in case you don't want to deal with it immediately
|
|
//
|
|
// packet The packet you want to push back.
|
|
// pushAtHead True to push the packet so that the next receive call returns it. False to push it at the end of the queue (obviously pushing it at the end makes the packets out of order)
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::PushBackPacket( Packet *packet, bool pushAtHead)
|
|
{
|
|
if (packet==0)
|
|
return;
|
|
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[packetPool_Mutex].Lock();
|
|
#endif
|
|
RakAssert(packet);
|
|
if (pushAtHead)
|
|
packetPool.PushAtHead(packet);
|
|
else
|
|
packetPool.Push(packet);
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[packetPool_Mutex].Unlock();
|
|
#endif
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SetRouterInterface( RouterInterface *routerInterface )
|
|
{
|
|
router=routerInterface;
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::RemoveRouterInterface( RouterInterface *routerInterface )
|
|
{
|
|
if (router==routerInterface)
|
|
router=0;
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
Packet* RakPeer::AllocatePacket(unsigned dataSize)
|
|
{
|
|
return AllocPacket(dataSize);
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Adds simulated ping and packet loss to the outgoing data flow.
|
|
// To simulate bi-directional ping and packet loss, you should call this on both the sender and the recipient, with half the total ping and maxSendBPS value on each.
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::ApplyNetworkSimulator( double maxSendBPS, unsigned short minExtraPing, unsigned short extraPingVariance)
|
|
{
|
|
#ifndef _RELEASE
|
|
if (remoteSystemList)
|
|
{
|
|
unsigned short i;
|
|
for (i=0; i < maximumNumberOfPeers; i++)
|
|
//for (i=0; i < remoteSystemListSize; i++)
|
|
remoteSystemList[i].reliabilityLayer.ApplyNetworkSimulator(maxSendBPS, minExtraPing, extraPingVariance);
|
|
}
|
|
|
|
_maxSendBPS=maxSendBPS;
|
|
_minExtraPing=minExtraPing;
|
|
_extraPingVariance=extraPingVariance;
|
|
#endif
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
|
|
void RakPeer::SetPerConnectionOutgoingBandwidthLimit( unsigned maxBitsPerSecond )
|
|
{
|
|
maxOutgoingBPS=maxBitsPerSecond;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Returns if you previously called ApplyNetworkSimulator
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::IsNetworkSimulatorActive( void )
|
|
{
|
|
#ifndef _RELEASE
|
|
return _maxSendBPS>0 || _minExtraPing>0 || _extraPingVariance>0;
|
|
#else
|
|
return false;
|
|
#endif
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// For internal use
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
char *RakPeer::GetRPCString( const char *data, const BitSize_t bitSize, const SystemAddress systemAddress)
|
|
{
|
|
bool nameIsEncoded=false;
|
|
static char uniqueIdentifier[256];
|
|
RPCIndex rpcIndex;
|
|
RPCMap *_rpcMap;
|
|
RakNet::BitStream rpcDecode((unsigned char*) data, BITS_TO_BYTES(bitSize), false);
|
|
rpcDecode.IgnoreBits(8);
|
|
if (data[0]==ID_TIMESTAMP)
|
|
rpcDecode.IgnoreBits(sizeof(unsigned char)+sizeof(RakNetTime));
|
|
rpcDecode.Read(nameIsEncoded);
|
|
if (nameIsEncoded)
|
|
{
|
|
stringCompressor->DecodeString((char*)uniqueIdentifier, 256, &rpcDecode);
|
|
}
|
|
else
|
|
{
|
|
rpcDecode.ReadCompressed( rpcIndex );
|
|
RPCNode *rpcNode;
|
|
|
|
if (systemAddress==UNASSIGNED_SYSTEM_ADDRESS)
|
|
_rpcMap=&rpcMap;
|
|
else
|
|
{
|
|
RemoteSystemStruct *rss=GetRemoteSystemFromSystemAddress(systemAddress, false, true);
|
|
if (rss)
|
|
_rpcMap=&(rss->rpcMap);
|
|
else
|
|
_rpcMap=0;
|
|
}
|
|
|
|
if (_rpcMap)
|
|
rpcNode = _rpcMap->GetNodeFromIndex(rpcIndex);
|
|
else
|
|
rpcNode=0;
|
|
|
|
if (_rpcMap && rpcNode)
|
|
strcpy((char*)uniqueIdentifier, rpcNode->uniqueIdentifier);
|
|
else
|
|
strcpy((char*)uniqueIdentifier, "[UNKNOWN]");
|
|
}
|
|
|
|
return uniqueIdentifier;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
|
|
bool RakPeer::SendOutOfBand(const char *host, unsigned short remotePort, MessageID header, const char *data, unsigned int dataLength, unsigned connectionSocketIndex )
|
|
{
|
|
if ( IsActive() == false )
|
|
return false;
|
|
|
|
if (host==0)
|
|
return false;
|
|
|
|
// If this assert hits then Startup wasn't called or the call failed.
|
|
RakAssert(connectionSocketIndex < connectionSocketsLength);
|
|
|
|
// This is a security measure. Don't send data longer than this value
|
|
assert(dataLength <= MAX_OFFLINE_DATA_LENGTH);
|
|
assert(dataLength>=0);
|
|
|
|
if ( host[ 0 ] < '0' || host[ 0 ] > '9' )
|
|
{
|
|
#if !defined(_XBOX360)
|
|
host = ( char* ) SocketLayer::Instance()->DomainNameToIP( host );
|
|
#else
|
|
return;
|
|
#endif
|
|
}
|
|
|
|
if (host==0)
|
|
return false;
|
|
|
|
SystemAddress systemAddress;
|
|
systemAddress.SetBinaryAddress(host);
|
|
systemAddress.port=remotePort;
|
|
|
|
RakNet::BitStream bitStream;
|
|
bitStream.Write(header);
|
|
|
|
if (dataLength>0)
|
|
{
|
|
bitStream.WriteAlignedBytes((const unsigned char*) OFFLINE_MESSAGE_DATA_ID, sizeof(OFFLINE_MESSAGE_DATA_ID));
|
|
bitStream.Write(data, dataLength);
|
|
}
|
|
else
|
|
bitStream.Write((unsigned char)0); // Pad
|
|
|
|
unsigned i;
|
|
for (i=0; i < messageHandlerList.Size(); i++)
|
|
messageHandlerList[i]->OnDirectSocketSend((const char*)bitStream.GetData(), bitStream.GetNumberOfBitsUsed(), systemAddress);
|
|
SocketLayer::Instance()->SendTo( connectionSockets[connectionSocketIndex], (const char*)bitStream.GetData(), (int) bitStream.GetNumberOfBytesUsed(), ( char* ) host, remotePort );
|
|
|
|
return true;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
RakNetStatistics * const RakPeer::GetStatistics( const SystemAddress systemAddress )
|
|
{
|
|
if (systemAddress==UNASSIGNED_SYSTEM_ADDRESS)
|
|
{
|
|
bool firstWrite=false;
|
|
static RakNetStatistics sum;
|
|
RakNetStatistics *systemStats;
|
|
// Return a crude sum
|
|
for ( unsigned short i = 0; i < maximumNumberOfPeers; i++ )
|
|
{
|
|
if (remoteSystemList[ i ].isActive)
|
|
{
|
|
systemStats=remoteSystemList[ i ].reliabilityLayer.GetStatistics();
|
|
|
|
if (firstWrite==false)
|
|
{
|
|
memcpy(&sum, systemStats, sizeof(RakNetStatistics));
|
|
firstWrite=true;
|
|
}
|
|
else
|
|
sum+=*systemStats;
|
|
}
|
|
}
|
|
return ∑
|
|
}
|
|
else
|
|
{
|
|
RemoteSystemStruct * rss;
|
|
rss = GetRemoteSystemFromSystemAddress( systemAddress, false, false );
|
|
if ( rss && endThreads==false )
|
|
return rss->reliabilityLayer.GetStatistics();
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
int RakPeer::GetIndexFromSystemAddress( const SystemAddress systemAddress, bool calledFromNetworkThread )
|
|
{
|
|
unsigned i;
|
|
|
|
if ( systemAddress == UNASSIGNED_SYSTEM_ADDRESS )
|
|
return -1;
|
|
|
|
if (calledFromNetworkThread)
|
|
{
|
|
bool objectExists;
|
|
unsigned index;
|
|
index = remoteSystemLookup.GetIndexFromKey(systemAddress, &objectExists);
|
|
if (objectExists)
|
|
{
|
|
assert(remoteSystemList[remoteSystemLookup[index].index].systemAddress==systemAddress);
|
|
return remoteSystemLookup[index].index;
|
|
}
|
|
else
|
|
return -1;
|
|
}
|
|
else
|
|
{
|
|
// remoteSystemList in user and network thread
|
|
for ( i = 0; i < maximumNumberOfPeers; i++ )
|
|
if ( remoteSystemList[ i ].isActive && remoteSystemList[ i ].systemAddress == systemAddress )
|
|
return i;
|
|
|
|
// If no active results found, try previously active results.
|
|
for ( i = 0; i < maximumNumberOfPeers; i++ )
|
|
if ( remoteSystemList[ i ].systemAddress == systemAddress )
|
|
return i;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::SendConnectionRequest( const char* host, unsigned short remotePort, const char *passwordData, int passwordDataLength, unsigned connectionSocketIndex, unsigned int extraData )
|
|
{
|
|
assert(passwordDataLength <= 256);
|
|
SystemAddress systemAddress;
|
|
systemAddress.SetBinaryAddress(host);
|
|
systemAddress.port=remotePort;
|
|
|
|
// Already connected?
|
|
if (GetRemoteSystemFromSystemAddress(systemAddress, false, true))
|
|
return false;
|
|
|
|
|
|
RequestedConnectionStruct *rcs = (RequestedConnectionStruct *) rakMalloc(sizeof(RequestedConnectionStruct));
|
|
|
|
/*
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[requestedConnectionList_Mutex].Lock();
|
|
#endif
|
|
RequestedConnectionStruct *rcs = requestedConnectionList.WriteLock();
|
|
*/
|
|
|
|
rcs->systemAddress=systemAddress;
|
|
rcs->nextRequestTime=RakNet::GetTime();
|
|
rcs->requestsMade=0;
|
|
rcs->data=0;
|
|
rcs->extraData=extraData;
|
|
rcs->socketIndex=connectionSocketIndex;
|
|
rcs->actionToTake=RequestedConnectionStruct::CONNECT;
|
|
memcpy(rcs->outgoingPassword, passwordData, passwordDataLength);
|
|
rcs->outgoingPasswordLength=(unsigned char) passwordDataLength;
|
|
|
|
/*
|
|
requestedConnectionList.WriteUnlock();
|
|
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[requestedConnectionList_Mutex].Unlock();
|
|
#endif
|
|
*/
|
|
|
|
// Return false if already pending, else push on queue
|
|
unsigned int i=0;
|
|
requestedConnectionQueueMutex.Lock();
|
|
for (; i < requestedConnectionQueue.Size(); i++)
|
|
{
|
|
if (requestedConnectionQueue[i]->systemAddress==systemAddress)
|
|
{
|
|
requestedConnectionQueueMutex.Unlock();
|
|
rakFree(rcs);
|
|
return false;
|
|
}
|
|
}
|
|
requestedConnectionQueue.Push(rcs);
|
|
requestedConnectionQueueMutex.Unlock();
|
|
|
|
return true;
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
RakPeer::RemoteSystemStruct *RakPeer::GetRemoteSystemFromSystemAddress( const SystemAddress systemAddress, bool calledFromNetworkThread, bool onlyActive ) const
|
|
{
|
|
unsigned i;
|
|
|
|
if ( systemAddress == UNASSIGNED_SYSTEM_ADDRESS )
|
|
return 0;
|
|
|
|
if (calledFromNetworkThread)
|
|
{
|
|
bool objectExists;
|
|
unsigned index;
|
|
index = remoteSystemLookup.GetIndexFromKey(systemAddress, &objectExists);
|
|
if (objectExists)
|
|
{
|
|
#ifdef _DEBUG
|
|
assert(remoteSystemList[ remoteSystemLookup[index].index ].systemAddress==systemAddress);
|
|
#endif
|
|
return remoteSystemList + remoteSystemLookup[index].index;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
int deadConnectionIndex=-1;
|
|
|
|
// Active connections take priority. But if there are no active connections, return the first systemAddress match found
|
|
for ( i = 0; i < maximumNumberOfPeers; i++ )
|
|
{
|
|
if (remoteSystemList[ i ].systemAddress == systemAddress)
|
|
{
|
|
if ( remoteSystemList[ i ].isActive )
|
|
return remoteSystemList + i;
|
|
else if (deadConnectionIndex==-1)
|
|
deadConnectionIndex=i;
|
|
}
|
|
}
|
|
|
|
if (deadConnectionIndex!=-1 && onlyActive==false)
|
|
return remoteSystemList + deadConnectionIndex;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::ParseConnectionRequestPacket( RakPeer::RemoteSystemStruct *remoteSystem, SystemAddress systemAddress, const char *data, int byteSize )
|
|
{
|
|
// If we are full tell the sender.
|
|
if ( !AllowIncomingConnections() )
|
|
{
|
|
unsigned char c = ID_NO_FREE_INCOMING_CONNECTIONS;
|
|
SendImmediate(( char* ) & c, sizeof( char )*8, SYSTEM_PRIORITY, RELIABLE, 0, systemAddress, false, false, RakNet::GetTimeNS());
|
|
remoteSystem->connectMode=RemoteSystemStruct::DISCONNECT_ASAP_SILENTLY;
|
|
}
|
|
else
|
|
{
|
|
const char *password = data + sizeof(unsigned char);
|
|
int passwordLength = byteSize - sizeof(unsigned char);
|
|
|
|
if ( incomingPasswordLength == passwordLength &&
|
|
memcmp( password, incomingPassword, incomingPasswordLength ) == 0 )
|
|
{
|
|
remoteSystem->connectMode=RemoteSystemStruct::HANDLING_CONNECTION_REQUEST;
|
|
|
|
#if !defined(_XBOX360)
|
|
if ( usingSecurity == false ||
|
|
IsInSecurityExceptionList(systemAddress.ToString(false)))
|
|
#endif
|
|
{
|
|
#ifdef _TEST_AES
|
|
unsigned char AESKey[ 16 ];
|
|
// Save the AES key
|
|
for ( i = 0; i < 16; i++ )
|
|
AESKey[ i ] = i;
|
|
|
|
OnConnectionRequest( remoteSystem, AESKey, true );
|
|
#else
|
|
// Connect this player assuming we have open slots
|
|
OnConnectionRequest( remoteSystem, 0, false );
|
|
#endif
|
|
}
|
|
#if !defined(_XBOX360)
|
|
else
|
|
SecuredConnectionResponse( systemAddress );
|
|
#endif
|
|
}
|
|
else
|
|
{
|
|
// This one we only send once since we don't care if it arrives.
|
|
unsigned char c = ID_INVALID_PASSWORD;
|
|
SendImmediate(( char* ) & c, sizeof( char )*8, SYSTEM_PRIORITY, RELIABLE, 0, systemAddress, false, false, RakNet::GetTimeNS());
|
|
remoteSystem->connectMode=RemoteSystemStruct::DISCONNECT_ASAP_SILENTLY;
|
|
}
|
|
}
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::OnConnectionRequest( RakPeer::RemoteSystemStruct *remoteSystem, unsigned char *AESKey, bool setAESKey )
|
|
{
|
|
// Already handled by caller
|
|
//if ( AllowIncomingConnections() )
|
|
{
|
|
SendConnectionRequestAccepted(remoteSystem);
|
|
|
|
// Don't set secure connections immediately because we need the ack from the remote system to know ID_CONNECTION_REQUEST_ACCEPTED
|
|
// As soon as a 16 byte packet arrives, we will turn on AES. This works because all encrypted packets are multiples of 16 and the
|
|
// packets I happen to be sending are less than 16 bytes
|
|
remoteSystem->setAESKey=setAESKey;
|
|
if ( setAESKey )
|
|
{
|
|
memcpy(remoteSystem->AESKey, AESKey, 16);
|
|
remoteSystem->connectMode=RemoteSystemStruct::SET_ENCRYPTION_ON_MULTIPLE_16_BYTE_PACKET;
|
|
}
|
|
}
|
|
/*
|
|
else
|
|
{
|
|
unsigned char c = ID_NO_FREE_INCOMING_CONNECTIONS;
|
|
//SocketLayer::Instance()->SendTo( connectionSocket, ( char* ) & c, sizeof( char ), systemAddress.binaryAddress, systemAddress.port );
|
|
|
|
SendImmediate((char*)&c, sizeof(c)*8, SYSTEM_PRIORITY, RELIABLE, 0, remoteSystem->systemAddress, false, false, RakNet::GetTimeNS());
|
|
remoteSystem->connectMode=RemoteSystemStruct::DISCONNECT_ASAP_SILENTLY;
|
|
}
|
|
*/
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SendConnectionRequestAccepted(RakPeer::RemoteSystemStruct *remoteSystem)
|
|
{
|
|
RakNet::BitStream bitStream(sizeof(unsigned char)+sizeof(unsigned short)+sizeof(unsigned int)+sizeof(unsigned short)+sizeof(SystemIndex)+sizeof(SystemAddress));
|
|
bitStream.Write((MessageID)ID_CONNECTION_REQUEST_ACCEPTED);
|
|
bitStream.Write(remoteSystem->systemAddress.binaryAddress);
|
|
bitStream.Write(remoteSystem->systemAddress.port);
|
|
bitStream.Write(( SystemIndex ) GetIndexFromSystemAddress( remoteSystem->systemAddress, true ));
|
|
bitStream.Write(mySystemAddress.binaryAddress);
|
|
bitStream.Write(mySystemAddress.port);
|
|
|
|
SendImmediate((char*)bitStream.GetData(), bitStream.GetNumberOfBitsUsed(), SYSTEM_PRIORITY, RELIABLE, 0, remoteSystem->systemAddress, false, false, RakNet::GetTimeNS());
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::NotifyAndFlagForShutdown( const SystemAddress systemAddress, bool performImmediate, unsigned char orderingChannel )
|
|
{
|
|
RakNet::BitStream temp( sizeof(unsigned char) );
|
|
temp.Write( (MessageID)ID_DISCONNECTION_NOTIFICATION );
|
|
if (performImmediate)
|
|
{
|
|
SendImmediate((char*)temp.GetData(), temp.GetNumberOfBitsUsed(), LOW_PRIORITY, RELIABLE_ORDERED, orderingChannel, systemAddress, false, false, RakNet::GetTimeNS());
|
|
RemoteSystemStruct *rss=GetRemoteSystemFromSystemAddress(systemAddress, true, true);
|
|
rss->connectMode=RemoteSystemStruct::DISCONNECT_ASAP;
|
|
}
|
|
else
|
|
{
|
|
SendBuffered((const char*)temp.GetData(), temp.GetNumberOfBitsUsed(), LOW_PRIORITY, RELIABLE_ORDERED, orderingChannel, systemAddress, false, RemoteSystemStruct::DISCONNECT_ASAP);
|
|
}
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
unsigned short RakPeer::GetNumberOfRemoteInitiatedConnections( void ) const
|
|
{
|
|
unsigned short i, numberOfIncomingConnections;
|
|
|
|
if ( remoteSystemList == 0 || endThreads == true )
|
|
return 0;
|
|
|
|
numberOfIncomingConnections = 0;
|
|
|
|
// remoteSystemList in network thread
|
|
for ( i = 0; i < maximumNumberOfPeers; i++ )
|
|
//for ( i = 0; i < remoteSystemListSize; i++ )
|
|
{
|
|
if ( remoteSystemList[ i ].isActive && remoteSystemList[ i ].weInitiatedTheConnection == false && remoteSystemList[i].connectMode==RemoteSystemStruct::CONNECTED)
|
|
numberOfIncomingConnections++;
|
|
}
|
|
|
|
return numberOfIncomingConnections;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
RakPeer::RemoteSystemStruct * RakPeer::AssignSystemAddressToRemoteSystemList( const SystemAddress systemAddress, RemoteSystemStruct::ConnectMode connectionMode, unsigned connectionSocketIndex )
|
|
{
|
|
RemoteSystemStruct * remoteSystem;
|
|
unsigned i,j;
|
|
RakNetTime time = RakNet::GetTime();
|
|
#ifdef _DEBUG
|
|
assert(systemAddress!=UNASSIGNED_SYSTEM_ADDRESS);
|
|
#endif
|
|
|
|
// remoteSystemList in user thread
|
|
for ( i = 0; i < maximumNumberOfPeers; i++ )
|
|
//for ( i = 0; i < remoteSystemListSize; i++ )
|
|
{
|
|
if ( remoteSystemList[ i ].isActive==false )
|
|
{
|
|
remoteSystem=remoteSystemList+i;
|
|
remoteSystem->rpcMap.Clear();
|
|
remoteSystem->systemAddress = systemAddress;
|
|
remoteSystem->MTUSize=defaultMTUSize;
|
|
remoteSystem->isActive=true; // This one line causes future incoming packets to go through the reliability layer
|
|
remoteSystem->reliabilityLayer.SetSplitMessageProgressInterval(splitMessageProgressInterval);
|
|
remoteSystem->reliabilityLayer.SetUnreliableTimeout(unreliableTimeout);
|
|
remoteSystem->reliabilityLayer.SetTimeoutTime(defaultTimeoutTime);
|
|
remoteSystem->reliabilityLayer.SetEncryptionKey( 0 );
|
|
remoteSystem->connectionSocketIndex=connectionSocketIndex;
|
|
|
|
for ( j = 0; j < (unsigned) PING_TIMES_ARRAY_SIZE; j++ )
|
|
{
|
|
remoteSystem->pingAndClockDifferential[ j ].pingTime = 65535;
|
|
remoteSystem->pingAndClockDifferential[ j ].clockDifferential = 0;
|
|
}
|
|
|
|
remoteSystem->connectMode=connectionMode;
|
|
remoteSystem->pingAndClockDifferentialWriteIndex = 0;
|
|
remoteSystem->lowestPing = 65535;
|
|
remoteSystem->nextPingTime = 0; // Ping immediately
|
|
remoteSystem->weInitiatedTheConnection = false;
|
|
remoteSystem->connectionTime = time;
|
|
remoteSystem->myExternalSystemAddress = UNASSIGNED_SYSTEM_ADDRESS;
|
|
remoteSystem->setAESKey=false;
|
|
remoteSystem->lastReliableSend=time;
|
|
|
|
// Reserve this reliability layer for ourselves.
|
|
remoteSystem->reliabilityLayer.Reset(true);
|
|
|
|
/// Add this player to the lookup tree
|
|
SystemAddressAndIndex systemAddressAndIndex;
|
|
systemAddressAndIndex.systemAddress=systemAddress;
|
|
systemAddressAndIndex.index=i;
|
|
remoteSystemLookup.Insert(systemAddress,systemAddressAndIndex, true);
|
|
|
|
return remoteSystem;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Adjust the first four bytes (treated as unsigned int) of the pointer
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::ShiftIncomingTimestamp( unsigned char *data, SystemAddress systemAddress ) const
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( IsActive() );
|
|
assert( data );
|
|
#endif
|
|
|
|
RakNet::BitStream timeBS( data, sizeof(RakNetTime), false);
|
|
RakNetTime encodedTimestamp;
|
|
timeBS.Read(encodedTimestamp);
|
|
|
|
encodedTimestamp = encodedTimestamp - GetBestClockDifferential( systemAddress );
|
|
timeBS.SetWriteOffset(0);
|
|
timeBS.Write(encodedTimestamp);
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Thanks to Chris Taylor (cat02e@fsu.edu) for the improved timestamping algorithm
|
|
RakNetTime RakPeer::GetBestClockDifferential( const SystemAddress systemAddress ) const
|
|
{
|
|
int counter, lowestPingSoFar;
|
|
RakNetTime clockDifferential;
|
|
RemoteSystemStruct *remoteSystem = GetRemoteSystemFromSystemAddress( systemAddress, true, true );
|
|
|
|
if ( remoteSystem == 0 )
|
|
return 0;
|
|
|
|
lowestPingSoFar = 65535;
|
|
|
|
clockDifferential = 0;
|
|
|
|
for ( counter = 0; counter < PING_TIMES_ARRAY_SIZE; counter++ )
|
|
{
|
|
if ( remoteSystem->pingAndClockDifferential[ counter ].pingTime == 65535 )
|
|
break;
|
|
|
|
if ( remoteSystem->pingAndClockDifferential[ counter ].pingTime < lowestPingSoFar )
|
|
{
|
|
clockDifferential = remoteSystem->pingAndClockDifferential[ counter ].clockDifferential;
|
|
lowestPingSoFar = remoteSystem->pingAndClockDifferential[ counter ].pingTime;
|
|
}
|
|
}
|
|
|
|
return clockDifferential;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
// Description:
|
|
// Handles an RPC packet. If you get a packet with the ID ID_RPC you should pass it to this function
|
|
//
|
|
// Parameters:
|
|
// packet - A packet returned from Receive with the ID ID_RPC
|
|
//
|
|
// Returns:
|
|
// true on success, false on a bad packet or an unregistered function
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
#ifdef _MSC_VER
|
|
#pragma warning( disable : 4701 ) // warning C4701: local variable <variable name> may be used without having been initialized
|
|
#endif
|
|
bool RakPeer::HandleRPCPacket( const char *data, int length, SystemAddress systemAddress )
|
|
{
|
|
// RPC BitStream format is
|
|
// ID_RPC - unsigned char
|
|
// Unique identifier string length - unsigned char
|
|
// The unique ID - string with each letter in upper case, subtracted by 'A' and written in 5 bits.
|
|
// Number of bits of the data (int)
|
|
// The data
|
|
|
|
RakNet::BitStream incomingBitStream( (unsigned char *) data, length, false );
|
|
char uniqueIdentifier[ 256 ];
|
|
// BitSize_t bitLength;
|
|
unsigned char *userData;
|
|
//bool hasTimestamp;
|
|
bool nameIsEncoded, networkIDIsEncoded;
|
|
RPCIndex rpcIndex;
|
|
RPCNode *node;
|
|
RPCParameters rpcParms;
|
|
NetworkID networkID;
|
|
bool blockingCommand;
|
|
RakNet::BitStream replyToSender;
|
|
rpcParms.replyToSender=&replyToSender;
|
|
|
|
rpcParms.recipient=this;
|
|
rpcParms.sender=systemAddress;
|
|
|
|
// Note to self - if I change this format then I have to change the PacketLogger class too
|
|
incomingBitStream.IgnoreBits(8);
|
|
if (data[0]==ID_TIMESTAMP)
|
|
{
|
|
incomingBitStream.IgnoreBits(8*(sizeof(RakNetTime)+sizeof(MessageID)));
|
|
memcpy(&rpcParms.remoteTimestamp, data+sizeof(MessageID), sizeof(RakNetTime));
|
|
}
|
|
else
|
|
rpcParms.remoteTimestamp=0;
|
|
if ( incomingBitStream.Read( nameIsEncoded ) == false )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 ); // bitstream was not long enough. Some kind of internal error
|
|
#endif
|
|
return false;
|
|
}
|
|
|
|
if (nameIsEncoded)
|
|
{
|
|
if ( stringCompressor->DecodeString(uniqueIdentifier, 256, &incomingBitStream) == false )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 ); // bitstream was not long enough. Some kind of internal error
|
|
#endif
|
|
return false;
|
|
}
|
|
|
|
rpcIndex = rpcMap.GetIndexFromFunctionName(uniqueIdentifier);
|
|
}
|
|
else
|
|
{
|
|
if ( incomingBitStream.ReadCompressed( rpcIndex ) == false )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 ); // bitstream was not long enough. Some kind of internal error
|
|
#endif
|
|
return false;
|
|
}
|
|
}
|
|
if ( incomingBitStream.Read( blockingCommand ) == false )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 ); // bitstream was not long enough. Some kind of internal error
|
|
#endif
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
if ( incomingBitStream.Read( rpcParms.hasTimestamp ) == false )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 ); // bitstream was not long enough. Some kind of internal error
|
|
#endif
|
|
return false;
|
|
}
|
|
*/
|
|
|
|
if ( incomingBitStream.ReadCompressed( rpcParms.numberOfBitsOfData ) == false )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 ); // bitstream was not long enough. Some kind of internal error
|
|
#endif
|
|
return false;
|
|
}
|
|
|
|
if ( incomingBitStream.Read( networkIDIsEncoded ) == false )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 ); // bitstream was not long enough. Some kind of internal error
|
|
#endif
|
|
return false;
|
|
}
|
|
|
|
if (networkIDIsEncoded)
|
|
{
|
|
if ( incomingBitStream.Read( networkID ) == false )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 ); // bitstream was not long enough. Some kind of internal error
|
|
#endif
|
|
return false;
|
|
}
|
|
}
|
|
|
|
if (rpcIndex==UNDEFINED_RPC_INDEX)
|
|
{
|
|
// Unregistered function
|
|
RakAssert(0);
|
|
return false;
|
|
}
|
|
|
|
node = rpcMap.GetNodeFromIndex(rpcIndex);
|
|
if (node==0)
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 ); // Should never happen except perhaps from threading errors? No harm in checking anyway
|
|
#endif
|
|
return false;
|
|
}
|
|
|
|
// Make sure the call type matches - if this is a pointer to a class member then networkID must be defined. Otherwise it must not be defined
|
|
if (node->isPointerToMember==true && networkIDIsEncoded==false)
|
|
{
|
|
// If this hits then this pointer was registered as a class member function but the packet does not have an NetworkID.
|
|
// Most likely this means this system registered a function with REGISTER_CLASS_MEMBER_RPC and the remote system called it
|
|
// using the unique ID for a function registered with REGISTER_STATIC_RPC.
|
|
assert(0);
|
|
return false;
|
|
}
|
|
|
|
if (node->isPointerToMember==false && networkIDIsEncoded==true)
|
|
{
|
|
// If this hits then this pointer was not registered as a class member function but the packet does have an NetworkID.
|
|
// Most likely this means this system registered a function with REGISTER_STATIC_RPC and the remote system called it
|
|
// using the unique ID for a function registered with REGISTER_CLASS_MEMBER_RPC.
|
|
assert(0);
|
|
return false;
|
|
}
|
|
|
|
if (nameIsEncoded && GetRemoteSystemFromSystemAddress(systemAddress, false, true))
|
|
{
|
|
// Send ID_RPC_MAPPING to the sender so they know what index to use next time
|
|
RakNet::BitStream rpcMapBitStream;
|
|
rpcMapBitStream.Write((MessageID)ID_RPC_MAPPING);
|
|
stringCompressor->EncodeString(node->uniqueIdentifier, 256, &rpcMapBitStream);
|
|
rpcMapBitStream.WriteCompressed(rpcIndex);
|
|
SendBuffered( (const char*)rpcMapBitStream.GetData(), rpcMapBitStream.GetNumberOfBitsUsed(), HIGH_PRIORITY, UNRELIABLE, 0, systemAddress, false, RemoteSystemStruct::NO_ACTION );
|
|
}
|
|
|
|
rpcParms.functionName=node->uniqueIdentifier;
|
|
|
|
// Call the function
|
|
if ( rpcParms.numberOfBitsOfData == 0 )
|
|
{
|
|
rpcParms.input=0;
|
|
if (networkIDIsEncoded)
|
|
{
|
|
// If this assert hits, you tried to use object member RPC but didn't call RakPeer::SetNetworkIDManager first as required.
|
|
RakAssert(networkIDManager);
|
|
if (networkIDManager)
|
|
{
|
|
void *object = networkIDManager->GET_OBJECT_FROM_ID(networkID);
|
|
if (object)
|
|
(node->memberFunctionPointer(object, &rpcParms));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
node->staticFunctionPointer( &rpcParms );
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if ( incomingBitStream.GetNumberOfUnreadBits() == 0 )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 );
|
|
#endif
|
|
return false; // No data was appended!
|
|
}
|
|
|
|
// We have to copy into a new data chunk because the user data might not be byte aligned.
|
|
bool usedAlloca=false;
|
|
#if !defined(_XBOX360)
|
|
if (BITS_TO_BYTES( incomingBitStream.GetNumberOfUnreadBits() ) < MAX_ALLOCA_STACK_ALLOCATION)
|
|
{
|
|
userData = ( unsigned char* ) alloca( (size_t) BITS_TO_BYTES( incomingBitStream.GetNumberOfUnreadBits() ) );
|
|
usedAlloca=true;
|
|
}
|
|
else
|
|
#endif
|
|
userData = (unsigned char*) rakMalloc((size_t) BITS_TO_BYTES(incomingBitStream.GetNumberOfUnreadBits()));
|
|
|
|
|
|
// The false means read out the internal representation of the bitstream data rather than
|
|
// aligning it as we normally would with user data. This is so the end user can cast the data received
|
|
// into a bitstream for reading
|
|
if ( incomingBitStream.ReadBits( ( unsigned char* ) userData, rpcParms.numberOfBitsOfData, false ) == false )
|
|
{
|
|
#ifdef _DEBUG
|
|
assert( 0 );
|
|
#endif
|
|
#if defined(_XBOX360)
|
|
rakFree(userData);
|
|
#endif
|
|
|
|
return false; // Not enough data to read
|
|
}
|
|
|
|
// if ( rpcParms.hasTimestamp )
|
|
// ShiftIncomingTimestamp( userData, systemAddress );
|
|
|
|
// Call the function callback
|
|
rpcParms.input=userData;
|
|
if (networkIDIsEncoded)
|
|
{
|
|
// If this assert hits, you tried to use object member RPC but didn't call RakPeer::SetNetworkIDManager first as required.
|
|
RakAssert(networkIDManager);
|
|
if (networkIDManager)
|
|
{
|
|
void *object = networkIDManager->GET_OBJECT_FROM_ID(networkID);
|
|
if (object)
|
|
(node->memberFunctionPointer(object, &rpcParms));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
node->staticFunctionPointer( &rpcParms );
|
|
}
|
|
|
|
|
|
if (usedAlloca==false)
|
|
rakFree(userData);
|
|
}
|
|
|
|
if (blockingCommand)
|
|
{
|
|
RakNet::BitStream reply;
|
|
reply.Write((MessageID)ID_RPC_REPLY);
|
|
reply.Write((char*)replyToSender.GetData(), replyToSender.GetNumberOfBytesUsed());
|
|
Send(&reply, HIGH_PRIORITY, RELIABLE, 0, systemAddress, false);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
/**
|
|
* Handles an RPC reply packet. This is data returned from an RPC call
|
|
*
|
|
* \param data A packet returned from Receive with the ID ID_RPC
|
|
* \param length The size of the packet data
|
|
* \param systemAddress The sender of the packet
|
|
*
|
|
* \return true on success, false on a bad packet or an unregistered function
|
|
*/
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::HandleRPCReplyPacket( const char *data, int length, SystemAddress systemAddress )
|
|
{
|
|
if (blockOnRPCReply)
|
|
{
|
|
if ((systemAddress==replyFromTargetPlayer && replyFromTargetBroadcast==false) ||
|
|
(systemAddress!=replyFromTargetPlayer && replyFromTargetBroadcast==true))
|
|
{
|
|
replyFromTargetBS->Write(data+1, length-1);
|
|
blockOnRPCReply=false;
|
|
}
|
|
}
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::GenerateSYNCookieRandomNumber( void )
|
|
{
|
|
#if !defined(_XBOX360) && !defined(_WIN32_WCE)
|
|
unsigned int number;
|
|
int i;
|
|
memcpy( oldRandomNumber, newRandomNumber, sizeof( newRandomNumber ) );
|
|
|
|
for ( i = 0; i < (int) sizeof( newRandomNumber ); i += (int) sizeof( number ) )
|
|
{
|
|
number = randomMT();
|
|
memcpy( newRandomNumber + i, ( char* ) & number, sizeof( number ) );
|
|
}
|
|
|
|
randomNumberExpirationTime = RakNet::GetTime() + SYN_COOKIE_OLD_RANDOM_NUMBER_DURATION;
|
|
#endif
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SecuredConnectionResponse( const SystemAddress systemAddress )
|
|
{
|
|
#if !defined(_XBOX360) && !defined(_WIN32_WCE)
|
|
CSHA1 sha1;
|
|
RSA_BIT_SIZE n;
|
|
big::u32 e;
|
|
unsigned char connectionRequestResponse[ 1 + sizeof( big::u32 ) + sizeof( RSA_BIT_SIZE ) + 20 ];
|
|
connectionRequestResponse[ 0 ] = ID_SECURED_CONNECTION_RESPONSE;
|
|
|
|
if ( randomNumberExpirationTime < RakNet::GetTime() )
|
|
GenerateSYNCookieRandomNumber();
|
|
|
|
// Hash the SYN-Cookie
|
|
// s2c syn-cookie = SHA1_HASH(source ip address + source port + random number)
|
|
sha1.Reset();
|
|
sha1.Update( ( unsigned char* ) & systemAddress.binaryAddress, sizeof( systemAddress.binaryAddress ) );
|
|
sha1.Update( ( unsigned char* ) & systemAddress.port, sizeof( systemAddress.port ) );
|
|
sha1.Update( ( unsigned char* ) & ( newRandomNumber ), 20 );
|
|
sha1.Final();
|
|
|
|
// Write the cookie
|
|
memcpy( connectionRequestResponse + 1, sha1.GetHash(), 20 );
|
|
|
|
// Write the public keys
|
|
rsacrypt.getPublicKey( e, n );
|
|
#ifdef HOST_ENDIAN_IS_BIG
|
|
// Mangle the keys on a Big-endian machine before sending
|
|
BSWAPCPY( (unsigned char *)(connectionRequestResponse + 1 + 20),
|
|
(unsigned char *)&e, sizeof( big::u32 ) );
|
|
BSWAPCPY( (unsigned char *)(connectionRequestResponse + 1 + 20 + sizeof( big::u32 ) ),
|
|
(unsigned char *)n, sizeof( RSA_BIT_SIZE ) );
|
|
#else
|
|
memcpy( connectionRequestResponse + 1 + 20, ( char* ) & e, sizeof( big::u32 ) );
|
|
memcpy( connectionRequestResponse + 1 + 20 + sizeof( big::u32 ), n, sizeof( RSA_BIT_SIZE ) );
|
|
#endif
|
|
|
|
// s2c public key, syn-cookie
|
|
//SocketLayer::Instance()->SendTo( connectionSocket, ( char* ) connectionRequestResponse, 1 + sizeof( big::u32 ) + sizeof( RSA_BIT_SIZE ) + 20, systemAddress.binaryAddress, systemAddress.port );
|
|
// All secure connection requests are unreliable because the entire process needs to be restarted if any part fails.
|
|
// Connection requests are resent periodically
|
|
SendImmediate(( char* ) connectionRequestResponse, (1 + sizeof( big::u32 ) + sizeof( RSA_BIT_SIZE ) + 20) *8, SYSTEM_PRIORITY, UNRELIABLE, 0, systemAddress, false, false, RakNet::GetTimeNS());
|
|
#endif
|
|
}
|
|
|
|
void RakPeer::SecuredConnectionConfirmation( RakPeer::RemoteSystemStruct * remoteSystem, char* data )
|
|
{
|
|
#if !defined(_XBOX360) && !defined(_WIN32_WCE)
|
|
int i, j;
|
|
unsigned char randomNumber[ 20 ];
|
|
unsigned int number;
|
|
//bool doSend;
|
|
Packet *packet;
|
|
big::u32 e;
|
|
RSA_BIT_SIZE n, message, encryptedMessage;
|
|
big::RSACrypt<RSA_BIT_SIZE> privKeyPncrypt;
|
|
|
|
// Make sure that we still want to connect
|
|
if (remoteSystem->connectMode!=RemoteSystemStruct::REQUESTED_CONNECTION)
|
|
return;
|
|
|
|
// Copy out e and n
|
|
#ifdef HOST_ENDIAN_IS_BIG
|
|
BSWAPCPY( (unsigned char *)&e, (unsigned char *)(data + 1 + 20), sizeof( big::u32 ) );
|
|
BSWAPCPY( (unsigned char *)n, (unsigned char *)(data + 1 + 20 + sizeof( big::u32 )), sizeof( RSA_BIT_SIZE ) );
|
|
#else
|
|
memcpy( ( char* ) & e, data + 1 + 20, sizeof( big::u32 ) );
|
|
memcpy( n, data + 1 + 20 + sizeof( big::u32 ), sizeof( RSA_BIT_SIZE ) );
|
|
#endif
|
|
|
|
// If we preset a size and it doesn't match, or the keys do not match, then tell the user
|
|
if ( usingSecurity == true && keysLocallyGenerated == false )
|
|
{
|
|
if ( memcmp( ( char* ) & e, ( char* ) & publicKeyE, sizeof( big::u32 ) ) != 0 ||
|
|
memcmp( n, publicKeyN, sizeof( RSA_BIT_SIZE ) ) != 0 )
|
|
{
|
|
packet=AllocPacket(1);
|
|
packet->data[ 0 ] = ID_RSA_PUBLIC_KEY_MISMATCH;
|
|
packet->bitSize = sizeof( char ) * 8;
|
|
packet->systemAddress = remoteSystem->systemAddress;
|
|
packet->systemIndex = ( SystemIndex ) GetIndexFromSystemAddress( packet->systemAddress, true );
|
|
AddPacketToProducer(packet);
|
|
remoteSystem->connectMode=RemoteSystemStruct::DISCONNECT_ASAP_SILENTLY;
|
|
return;
|
|
}
|
|
}
|
|
|
|
// Create a random number
|
|
for ( i = 0; i < (int) sizeof( randomNumber ); i += (int) sizeof( number ) )
|
|
{
|
|
number = randomMT();
|
|
memcpy( randomNumber + i, ( char* ) & number, sizeof( number ) );
|
|
}
|
|
|
|
memset( message, 0, sizeof( message ) );
|
|
assert( sizeof( message ) >= sizeof( randomNumber ) );
|
|
|
|
#ifdef HOST_ENDIAN_IS_BIG
|
|
// Scramble the plaintext message (the random number)
|
|
BSWAPCPY( (unsigned char *)message, randomNumber, sizeof(randomNumber) );
|
|
#else
|
|
memcpy( message, randomNumber, sizeof( randomNumber ) );
|
|
#endif
|
|
privKeyPncrypt.setPublicKey( e, n );
|
|
privKeyPncrypt.encrypt( message, encryptedMessage );
|
|
#ifdef HOST_ENDIAN_IS_BIG
|
|
// A big-endian machine needs to scramble the byte order of an outgoing (encrypted) message
|
|
BSWAPSELF( (unsigned char *)encryptedMessage, sizeof( RSA_BIT_SIZE ) );
|
|
#endif
|
|
|
|
/*
|
|
rakPeerMutexes[ RakPeer::requestedConnections_MUTEX ].Lock();
|
|
for ( i = 0; i < ( int ) requestedConnectionsList.Size(); i++ )
|
|
{
|
|
if ( requestedConnectionsList[ i ]->systemAddress == systemAddress )
|
|
{
|
|
doSend = true;
|
|
// Generate the AES key
|
|
|
|
for ( j = 0; j < 16; j++ )
|
|
requestedConnectionsList[ i ]->AESKey[ j ] = data[ 1 + j ] ^ randomNumber[ j ];
|
|
|
|
requestedConnectionsList[ i ]->setAESKey = true;
|
|
|
|
break;
|
|
}
|
|
}
|
|
rakPeerMutexes[ RakPeer::requestedConnections_MUTEX ].Unlock();
|
|
*/
|
|
|
|
// Take the remote system's AESKey (SynCookie) and XOR with our random number.
|
|
for ( j = 0; j < 16; j++ )
|
|
remoteSystem->AESKey[ j ] = data[ 1 + j ] ^ randomNumber[ j ];
|
|
remoteSystem->setAESKey = true;
|
|
|
|
// if ( doSend )
|
|
// {
|
|
char reply[ 1 + 20 + sizeof( RSA_BIT_SIZE ) ];
|
|
// c2s RSA(random number), same syn-cookie
|
|
reply[ 0 ] = ID_SECURED_CONNECTION_CONFIRMATION;
|
|
memcpy( reply + 1, data + 1, 20 ); // Copy the syn-cookie
|
|
memcpy( reply + 1 + 20, encryptedMessage, sizeof( RSA_BIT_SIZE ) ); // Copy the encoded random number
|
|
|
|
//SocketLayer::Instance()->SendTo( connectionSocket, reply, 1 + 20 + sizeof( RSA_BIT_SIZE ), systemAddress.binaryAddress, systemAddress.port );
|
|
// All secure connection requests are unreliable because the entire process needs to be restarted if any part fails.
|
|
// Connection requests are resent periodically
|
|
SendImmediate((char*)reply, (1 + 20 + sizeof( RSA_BIT_SIZE )) * 8, SYSTEM_PRIORITY, UNRELIABLE, 0, remoteSystem->systemAddress, false, false, RakNet::GetTimeNS());
|
|
// }
|
|
|
|
#endif
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::AllowIncomingConnections(void) const
|
|
{
|
|
return GetNumberOfRemoteInitiatedConnections() < GetMaximumIncomingConnections();
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::PingInternal( const SystemAddress target, bool performImmediate, PacketReliability reliability )
|
|
{
|
|
if ( IsActive() == false )
|
|
return ;
|
|
|
|
RakNet::BitStream bitStream(sizeof(unsigned char)+sizeof(RakNetTime));
|
|
bitStream.Write((MessageID)ID_INTERNAL_PING);
|
|
RakNetTimeNS currentTimeNS = RakNet::GetTimeNS();
|
|
RakNetTime currentTime = RakNet::GetTime();
|
|
bitStream.Write(currentTime);
|
|
if (performImmediate)
|
|
SendImmediate( (char*)bitStream.GetData(), bitStream.GetNumberOfBitsUsed(), SYSTEM_PRIORITY, reliability, 0, target, false, false, currentTimeNS );
|
|
else
|
|
Send( &bitStream, SYSTEM_PRIORITY, reliability, 0, target, false );
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::CloseConnectionInternal( const SystemAddress target, bool sendDisconnectionNotification, bool performImmediate, unsigned char orderingChannel )
|
|
{
|
|
unsigned i;
|
|
|
|
#ifdef _DEBUG
|
|
assert(orderingChannel < 32);
|
|
#endif
|
|
|
|
if (target==UNASSIGNED_SYSTEM_ADDRESS)
|
|
return;
|
|
|
|
if ( remoteSystemList == 0 || endThreads == true )
|
|
return;
|
|
|
|
// Cancel pending connection attempt, if there is one
|
|
i=0;
|
|
bool unlock=true;
|
|
requestedConnectionQueueMutex.Lock();
|
|
while (i < requestedConnectionQueue.Size())
|
|
{
|
|
if (requestedConnectionQueue[i]->systemAddress==target)
|
|
{
|
|
requestedConnectionQueueMutex.Unlock();
|
|
rakFree(requestedConnectionQueue[i]);
|
|
requestedConnectionQueue.RemoveAtIndex(i);
|
|
unlock=false;
|
|
break;
|
|
}
|
|
else
|
|
i++;
|
|
}
|
|
if (unlock)
|
|
requestedConnectionQueueMutex.Unlock();
|
|
|
|
if (sendDisconnectionNotification)
|
|
{
|
|
NotifyAndFlagForShutdown(target, performImmediate, orderingChannel);
|
|
}
|
|
else
|
|
{
|
|
if (performImmediate)
|
|
{
|
|
i = 0;
|
|
// remoteSystemList in user thread
|
|
for ( ; i < maximumNumberOfPeers; i++ )
|
|
//for ( ; i < remoteSystemListSize; i++ )
|
|
{
|
|
if ( remoteSystemList[ i ].isActive && remoteSystemList[ i ].systemAddress == target )
|
|
{
|
|
// Found the index to stop
|
|
remoteSystemList[ i ].isActive=false;
|
|
|
|
// Reserve this reliability layer for ourselves
|
|
//remoteSystemList[ i ].systemAddress = UNASSIGNED_SYSTEM_ADDRESS;
|
|
|
|
// Clear any remaining messages
|
|
remoteSystemList[ i ].reliabilityLayer.Reset(false);
|
|
|
|
#if defined(_PS3)
|
|
//Console2DeactivateConnection(console2ContextId, remoteSystemList[ i ].connectionId);
|
|
#endif
|
|
|
|
// Remove from the lookup list
|
|
remoteSystemLookup.Remove(target);
|
|
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
BufferedCommandStruct *bcs;
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[bufferedCommands_Mutex].Lock();
|
|
#endif
|
|
bcs=bufferedCommands.WriteLock();
|
|
bcs->command=BufferedCommandStruct::BCS_CLOSE_CONNECTION;
|
|
bcs->systemAddress=target;
|
|
bcs->data=0;
|
|
bcs->orderingChannel=orderingChannel;
|
|
bufferedCommands.WriteUnlock();
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[bufferedCommands_Mutex].Unlock();
|
|
#endif
|
|
}
|
|
}
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::ValidSendTarget(SystemAddress systemAddress, bool broadcast)
|
|
{
|
|
unsigned remoteSystemIndex;
|
|
|
|
// remoteSystemList in user thread. This is slow so only do it in debug
|
|
for ( remoteSystemIndex = 0; remoteSystemIndex < maximumNumberOfPeers; remoteSystemIndex++ )
|
|
//for ( remoteSystemIndex = 0; remoteSystemIndex < remoteSystemListSize; remoteSystemIndex++ )
|
|
{
|
|
if ( remoteSystemList[ remoteSystemIndex ].isActive &&
|
|
remoteSystemList[ remoteSystemIndex ].connectMode==RakPeer::RemoteSystemStruct::CONNECTED && // Not fully connected players are not valid user-send targets because the reliability layer wasn't reset yet
|
|
( ( broadcast == false && remoteSystemList[ remoteSystemIndex ].systemAddress == systemAddress ) ||
|
|
( broadcast == true && remoteSystemList[ remoteSystemIndex ].systemAddress != systemAddress ) )
|
|
)
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SendBuffered( const char *data, BitSize_t numberOfBitsToSend, PacketPriority priority, PacketReliability reliability, char orderingChannel, SystemAddress systemAddress, bool broadcast, RemoteSystemStruct::ConnectMode connectionMode )
|
|
{
|
|
BufferedCommandStruct *bcs;
|
|
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[bufferedCommands_Mutex].Lock();
|
|
#endif
|
|
bcs=bufferedCommands.WriteLock();
|
|
bcs->data = (char*) rakMalloc( (size_t) BITS_TO_BYTES(numberOfBitsToSend) ); // Making a copy doesn't lose efficiency because I tell the reliability layer to use this allocation for its own copy
|
|
if (bcs->data==0)
|
|
{
|
|
notifyOutOfMemory(__FILE__, __LINE__);
|
|
bufferedCommands.WriteUnlock();
|
|
return;
|
|
}
|
|
memcpy(bcs->data, data, (size_t) BITS_TO_BYTES(numberOfBitsToSend));
|
|
bcs->numberOfBitsToSend=numberOfBitsToSend;
|
|
bcs->priority=priority;
|
|
bcs->reliability=reliability;
|
|
bcs->orderingChannel=orderingChannel;
|
|
bcs->systemAddress=systemAddress;
|
|
bcs->broadcast=broadcast;
|
|
bcs->connectionMode=connectionMode;
|
|
bcs->command=BufferedCommandStruct::BCS_SEND;
|
|
bufferedCommands.WriteUnlock();
|
|
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[bufferedCommands_Mutex].Unlock();
|
|
#endif
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::SendBufferedList( char **data, const int *lengths, const int numParameters, PacketPriority priority, PacketReliability reliability, char orderingChannel, SystemAddress systemAddress, bool broadcast, RemoteSystemStruct::ConnectMode connectionMode )
|
|
{
|
|
BufferedCommandStruct *bcs;
|
|
unsigned int totalLength=0;
|
|
unsigned int lengthOffset;
|
|
int i;
|
|
for (i=0; i < numParameters; i++)
|
|
{
|
|
if (lengths[i]>0)
|
|
totalLength+=lengths[i];
|
|
}
|
|
if (totalLength==0)
|
|
return;
|
|
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[bufferedCommands_Mutex].Lock();
|
|
#endif
|
|
bcs=bufferedCommands.WriteLock();
|
|
bcs->data = (char*) rakMalloc( (size_t) totalLength ); // Making a copy doesn't lose efficiency because I tell the reliability layer to use this allocation for its own copy
|
|
if (bcs->data==0)
|
|
{
|
|
notifyOutOfMemory(__FILE__, __LINE__);
|
|
bufferedCommands.WriteUnlock();
|
|
return;
|
|
}
|
|
for (i=0, lengthOffset=0; i < numParameters; i++)
|
|
{
|
|
if (lengths[i]>0)
|
|
{
|
|
memcpy(bcs->data+lengthOffset, data[i], lengths[i]);
|
|
lengthOffset+=lengths[i];
|
|
}
|
|
}
|
|
bcs->numberOfBitsToSend=BYTES_TO_BITS(totalLength);
|
|
bcs->priority=priority;
|
|
bcs->reliability=reliability;
|
|
bcs->orderingChannel=orderingChannel;
|
|
bcs->systemAddress=systemAddress;
|
|
bcs->broadcast=broadcast;
|
|
bcs->connectionMode=connectionMode;
|
|
bcs->command=BufferedCommandStruct::BCS_SEND;
|
|
bufferedCommands.WriteUnlock();
|
|
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[bufferedCommands_Mutex].Unlock();
|
|
#endif
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::SendImmediate( char *data, BitSize_t numberOfBitsToSend, PacketPriority priority, PacketReliability reliability, char orderingChannel, SystemAddress systemAddress, bool broadcast, bool useCallerDataAllocation, RakNetTimeNS currentTime )
|
|
{
|
|
unsigned *sendList;
|
|
unsigned sendListSize;
|
|
bool callerDataAllocationUsed;
|
|
unsigned remoteSystemIndex, sendListIndex; // Iterates into the list of remote systems
|
|
unsigned numberOfBytesUsed = (unsigned) BITS_TO_BYTES(numberOfBitsToSend);
|
|
callerDataAllocationUsed=false;
|
|
|
|
sendListSize=0;
|
|
|
|
// 03/06/06 - If broadcast is false, use the optimized version of GetIndexFromSystemAddress
|
|
if (broadcast==false)
|
|
{
|
|
#if !defined(_XBOX360)
|
|
sendList=(unsigned *)alloca(sizeof(unsigned));
|
|
#else
|
|
sendList = (unsigned *) rakMalloc(sizeof(unsigned));
|
|
#endif
|
|
remoteSystemIndex=GetIndexFromSystemAddress( systemAddress, true );
|
|
if (remoteSystemIndex!=(unsigned)-1 &&
|
|
remoteSystemList[remoteSystemIndex].isActive &&
|
|
remoteSystemList[remoteSystemIndex].connectMode!=RemoteSystemStruct::DISCONNECT_ASAP &&
|
|
remoteSystemList[remoteSystemIndex].connectMode!=RemoteSystemStruct::DISCONNECT_ASAP_SILENTLY &&
|
|
remoteSystemList[remoteSystemIndex].connectMode!=RemoteSystemStruct::DISCONNECT_ON_NO_ACK)
|
|
{
|
|
sendList[0]=remoteSystemIndex;
|
|
sendListSize=1;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
#if !defined(_XBOX360)
|
|
//sendList=(unsigned *)alloca(sizeof(unsigned)*remoteSystemListSize);
|
|
sendList=(unsigned *)alloca(sizeof(unsigned)*maximumNumberOfPeers);
|
|
#else
|
|
//sendList = new unsigned[remoteSystemListSize];
|
|
sendList = (unsigned *) rakMalloc(sizeof(unsigned)*maximumNumberOfPeers);
|
|
#endif
|
|
|
|
// remoteSystemList in network thread
|
|
for ( remoteSystemIndex = 0; remoteSystemIndex < maximumNumberOfPeers; remoteSystemIndex++ )
|
|
//for ( remoteSystemIndex = 0; remoteSystemIndex < remoteSystemListSize; remoteSystemIndex++ )
|
|
{
|
|
if ( remoteSystemList[ remoteSystemIndex ].isActive && remoteSystemList[ remoteSystemIndex ].systemAddress != systemAddress && remoteSystemList[ remoteSystemIndex ].systemAddress != UNASSIGNED_SYSTEM_ADDRESS )
|
|
sendList[sendListSize++]=remoteSystemIndex;
|
|
}
|
|
}
|
|
|
|
if (sendListSize==0)
|
|
{
|
|
#if defined(_XBOX360)
|
|
rakFree(sendList);
|
|
#endif
|
|
return false;
|
|
}
|
|
|
|
for (sendListIndex=0; sendListIndex < sendListSize; sendListIndex++)
|
|
{
|
|
if ( trackFrequencyTable )
|
|
{
|
|
unsigned i;
|
|
// Store output frequency
|
|
for (i=0 ; i < numberOfBytesUsed; i++ )
|
|
frequencyTable[ (unsigned char)(data[i]) ]++;
|
|
rawBytesSent += numberOfBytesUsed;
|
|
}
|
|
|
|
if ( outputTree )
|
|
{
|
|
RakNet::BitStream bitStreamCopy( numberOfBytesUsed );
|
|
outputTree->EncodeArray( (unsigned char*) data, numberOfBytesUsed, &bitStreamCopy );
|
|
compressedBytesSent += (unsigned int) bitStreamCopy.GetNumberOfBytesUsed();
|
|
remoteSystemList[sendList[sendListIndex]].reliabilityLayer.Send( (char*) bitStreamCopy.GetData(), bitStreamCopy.GetNumberOfBitsUsed(), priority, reliability, orderingChannel, true, remoteSystemList[sendList[sendListIndex]].MTUSize, currentTime );
|
|
}
|
|
else
|
|
{
|
|
// Send may split the packet and thus deallocate data. Don't assume data is valid if we use the callerAllocationData
|
|
bool useData = useCallerDataAllocation && callerDataAllocationUsed==false && sendListIndex+1==sendListSize;
|
|
remoteSystemList[sendList[sendListIndex]].reliabilityLayer.Send( data, numberOfBitsToSend, priority, reliability, orderingChannel, useData==false, remoteSystemList[sendList[sendListIndex]].MTUSize, currentTime );
|
|
if (useData)
|
|
callerDataAllocationUsed=true;
|
|
}
|
|
|
|
if (reliability==RELIABLE || reliability==RELIABLE_ORDERED || reliability==RELIABLE_SEQUENCED)
|
|
remoteSystemList[sendList[sendListIndex]].lastReliableSend=(RakNetTime)(currentTime/(RakNetTimeNS)1000);
|
|
}
|
|
|
|
#if defined(_XBOX360)
|
|
rakFree(sendList);
|
|
#endif
|
|
|
|
// Return value only meaningful if true was passed for useCallerDataAllocation. Means the reliability layer used that data copy, so the caller should not deallocate it
|
|
return callerDataAllocationUsed;
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::ClearBufferedCommands(void)
|
|
{
|
|
BufferedCommandStruct *bcs;
|
|
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[bufferedCommands_Mutex].Lock();
|
|
#endif
|
|
while ((bcs=bufferedCommands.ReadLock())!=0)
|
|
{
|
|
if (bcs->data)
|
|
rakFree(bcs->data);
|
|
|
|
bufferedCommands.ReadUnlock();
|
|
}
|
|
bufferedCommands.Clear();
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[bufferedCommands_Mutex].Unlock();
|
|
#endif
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void RakPeer::ClearRequestedConnectionList(void)
|
|
{
|
|
/*
|
|
RequestedConnectionStruct *rcs;
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[requestedConnectionList_Mutex].Lock();
|
|
#endif
|
|
while ((rcs=requestedConnectionList.ReadLock())!=0)
|
|
{
|
|
if (rcs->data)
|
|
rakFree(rcs->data);
|
|
#if defined(_PS3)
|
|
//Console2DeactivateConnection(console2ContextId, rcs->extraData);
|
|
#endif
|
|
requestedConnectionList.ReadUnlock();
|
|
}
|
|
requestedConnectionList.Clear();
|
|
#ifdef _RAKNET_THREADSAFE
|
|
rakPeerMutexes[requestedConnectionList_Mutex].Unlock();
|
|
#endif
|
|
*/
|
|
|
|
DataStructures::Queue<RequestedConnectionStruct*> freeQueue;
|
|
requestedConnectionQueueMutex.Lock();
|
|
while (requestedConnectionQueue.Size())
|
|
freeQueue.Push(requestedConnectionQueue.Pop());
|
|
requestedConnectionQueueMutex.Unlock();
|
|
unsigned i;
|
|
for (i=0; i < freeQueue.Size(); i++)
|
|
rakFree(freeQueue[i]);
|
|
}
|
|
inline void RakPeer::AddPacketToProducer(Packet *p)
|
|
{
|
|
Packet **packetPtr=packetSingleProducerConsumer.WriteLock();
|
|
*packetPtr=p;
|
|
packetSingleProducerConsumer.WriteUnlock();
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void ProcessPortUnreachable( unsigned int binaryAddress, unsigned short port, RakPeer *rakPeer )
|
|
{
|
|
(void) binaryAddress;
|
|
(void) port;
|
|
(void) rakPeer;
|
|
|
|
}
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
void ProcessNetworkPacket( const unsigned int binaryAddress, const unsigned short port, const char *data, const int length, RakPeer *rakPeer, unsigned connectionSocketIndex )
|
|
{
|
|
Packet *packet;
|
|
SystemAddress systemAddress;
|
|
unsigned i;
|
|
RakPeer::RemoteSystemStruct *remoteSystem;
|
|
systemAddress.binaryAddress = binaryAddress;
|
|
systemAddress.port = port;
|
|
|
|
#if !defined(_XBOX360)
|
|
if (rakPeer->IsBanned( systemAddress.ToString(false) ))
|
|
{
|
|
for (i=0; i < rakPeer->messageHandlerList.Size(); i++)
|
|
rakPeer->messageHandlerList[i]->OnDirectSocketReceive(data, length*8, systemAddress);
|
|
|
|
char c[2];
|
|
c[0] = ID_CONNECTION_BANNED;
|
|
c[1] = 0; // Pad, some routers apparently block 1 byte packets
|
|
|
|
unsigned i;
|
|
for (i=0; i < rakPeer->messageHandlerList.Size(); i++)
|
|
rakPeer->messageHandlerList[i]->OnDirectSocketSend((char*)&c, 16, systemAddress);
|
|
SocketLayer::Instance()->SendTo( rakPeer->connectionSockets[connectionSocketIndex], (char*)&c, 2, systemAddress.binaryAddress, systemAddress.port );
|
|
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
// We didn't check this datagram to see if it came from a connected system or not yet.
|
|
// Therefore, this datagram must be under 17 bits - otherwise it may be normal network traffic as the min size for a raknet send is 17 bits
|
|
if ((unsigned char)(data)[0] == (MessageID)ID_OPEN_CONNECTION_REPLY && (size_t) length <= sizeof(unsigned char)*2)
|
|
{
|
|
for (i=0; i < rakPeer->messageHandlerList.Size(); i++)
|
|
rakPeer->messageHandlerList[i]->OnDirectSocketReceive(data, length*8, systemAddress);
|
|
|
|
RakPeer::RequestedConnectionStruct *rcs;
|
|
bool unlock=true;
|
|
unsigned i;
|
|
rakPeer->requestedConnectionQueueMutex.Lock();
|
|
for (i=0; i < rakPeer->requestedConnectionQueue.Size(); i++)
|
|
{
|
|
rcs=rakPeer->requestedConnectionQueue[i];
|
|
if (rcs->systemAddress==systemAddress)
|
|
{
|
|
rakPeer->requestedConnectionQueueMutex.Unlock();
|
|
unlock=false;
|
|
|
|
assert(rcs->actionToTake==RakPeer::RequestedConnectionStruct::CONNECT);
|
|
// You might get this when already connected because of cross-connections
|
|
remoteSystem=rakPeer->GetRemoteSystemFromSystemAddress( systemAddress, true, true );
|
|
if (remoteSystem==0)
|
|
remoteSystem=rakPeer->AssignSystemAddressToRemoteSystemList(systemAddress, RakPeer::RemoteSystemStruct::UNVERIFIED_SENDER, connectionSocketIndex);
|
|
|
|
if (remoteSystem)
|
|
{
|
|
RakNetTimeNS time = RakNet::GetTimeNS();
|
|
remoteSystem->weInitiatedTheConnection=true;
|
|
remoteSystem->connectMode=RakPeer::RemoteSystemStruct::REQUESTED_CONNECTION;
|
|
|
|
RakNet::BitStream temp;
|
|
temp.Write( (MessageID)ID_CONNECTION_REQUEST );
|
|
if ( rcs->outgoingPasswordLength > 0 )
|
|
temp.Write( ( char* ) rcs->outgoingPassword, rcs->outgoingPasswordLength );
|
|
|
|
rakPeer->SendImmediate((char*)temp.GetData(), temp.GetNumberOfBitsUsed(), SYSTEM_PRIORITY, RELIABLE, 0, systemAddress, false, false, time );
|
|
}
|
|
else
|
|
{
|
|
// Failed, no connections available anymore
|
|
packet=AllocPacket(sizeof( char ));
|
|
packet->data[ 0 ] = ID_CONNECTION_ATTEMPT_FAILED; // Attempted a connection and couldn't
|
|
packet->bitSize = ( sizeof( char ) * 8);
|
|
packet->systemAddress = rcs->systemAddress;
|
|
packet->systemIndex = 65535;
|
|
rakPeer->AddPacketToProducer(packet);
|
|
}
|
|
|
|
|
|
rakPeer->requestedConnectionQueue.RemoveAtIndex(i);
|
|
rakFree(rcs);
|
|
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (unlock)
|
|
rakPeer->requestedConnectionQueueMutex.Unlock();
|
|
|
|
return;
|
|
|
|
/*
|
|
// Verify that we were waiting for this
|
|
// bool acceptOpenConnection;
|
|
// int actionToTake=0;
|
|
// char data[MAX_OFFLINE_DATA_LENGTH];
|
|
RakPeer::RequestedConnectionStruct *rcsFirst, *rcs;
|
|
rcsFirst = rakPeer->requestedConnectionList.ReadLock();
|
|
rcs=rcsFirst;
|
|
// acceptOpenConnection=false;
|
|
while (rcs)
|
|
{
|
|
// Scan through the requested connection queue and process any elements whose systemAddress matches the player we just got this packet from.
|
|
// If it is the first element in the queue, remove it from the queue. Otherwise, set the systemAddress to UNASSIGNED_SYSTEM_ADDRESS to cancel it out of order.
|
|
if (rcs->systemAddress==systemAddress)
|
|
{
|
|
// Go ahead and process this request
|
|
// acceptOpenConnection=true;
|
|
|
|
// Store the action (may be multiple actions to take at once)
|
|
// actionToTake|=(int)rcs->actionToTake;
|
|
assert(rcs->actionToTake==RakPeer::RequestedConnectionStruct::CONNECT);
|
|
|
|
// You might get this when already connected because of cross-connections
|
|
remoteSystem=rakPeer->GetRemoteSystemFromSystemAddress( systemAddress, true, true );
|
|
if (remoteSystem==0)
|
|
remoteSystem=rakPeer->AssignSystemAddressToRemoteSystemList(systemAddress, RakPeer::RemoteSystemStruct::UNVERIFIED_SENDER, connectionSocketIndex);
|
|
|
|
if (remoteSystem)
|
|
{
|
|
RakNetTimeNS time = RakNet::GetTimeNS();
|
|
remoteSystem->weInitiatedTheConnection=true;
|
|
remoteSystem->connectMode=RakPeer::RemoteSystemStruct::REQUESTED_CONNECTION;
|
|
|
|
RakNet::BitStream temp;
|
|
temp.Write( (MessageID)ID_CONNECTION_REQUEST );
|
|
if ( rcs->outgoingPasswordLength > 0 )
|
|
temp.Write( ( char* ) rcs->outgoingPassword, rcs->outgoingPasswordLength );
|
|
|
|
rakPeer->SendImmediate((char*)temp.GetData(), temp.GetNumberOfBitsUsed(), SYSTEM_PRIORITY, RELIABLE, 0, systemAddress, false, false, time );
|
|
}
|
|
else
|
|
{
|
|
// Failed, no connections available anymore
|
|
packet=AllocPacket(sizeof( char ));
|
|
packet->data[ 0 ] = ID_CONNECTION_ATTEMPT_FAILED; // Attempted a connection and couldn't
|
|
packet->bitSize = ( sizeof( char ) * 8);
|
|
packet->systemAddress = rcs->systemAddress;
|
|
packet->systemIndex = 65535;
|
|
rakPeer->AddPacketToProducer(packet);
|
|
}
|
|
if (rcs==rcsFirst)
|
|
{
|
|
// Delete the head of the queue
|
|
rakPeer->requestedConnectionList.ReadUnlock();
|
|
rcsFirst=rakPeer->requestedConnectionList.ReadLock();
|
|
rcs=rcsFirst;
|
|
continue;
|
|
}
|
|
else
|
|
{
|
|
// Cancel this out of order element of the queue - we are handling it now.
|
|
rcs->systemAddress=UNASSIGNED_SYSTEM_ADDRESS;
|
|
}
|
|
}
|
|
|
|
rcs=rakPeer->requestedConnectionList.ReadLock();
|
|
}
|
|
|
|
// Go back to the current head of the queue
|
|
if (rcsFirst)
|
|
rakPeer->requestedConnectionList.CancelReadLock(rcsFirst);
|
|
|
|
return;
|
|
*/
|
|
}
|
|
else if (((unsigned char)(data)[0] == (MessageID)ID_CONNECTION_ATTEMPT_FAILED ||
|
|
(unsigned char)(data)[0] == (MessageID)ID_NO_FREE_INCOMING_CONNECTIONS ||
|
|
(unsigned char)(data)[0] == (MessageID)ID_ALREADY_CONNECTED ||
|
|
(unsigned char)(data)[0] == (MessageID)ID_CONNECTION_BANNED)
|
|
&& (size_t) length <= sizeof(unsigned char)*2)
|
|
{
|
|
RakPeer::RequestedConnectionStruct *rcs;
|
|
bool unlock=true;
|
|
bool connectionAttemptCancelled=false;
|
|
unsigned i;
|
|
rakPeer->requestedConnectionQueueMutex.Lock();
|
|
for (i=0; i < rakPeer->requestedConnectionQueue.Size(); i++)
|
|
{
|
|
rcs=rakPeer->requestedConnectionQueue[i];
|
|
if (rcs->actionToTake==RakPeer::RequestedConnectionStruct::CONNECT && rcs->systemAddress==systemAddress)
|
|
{
|
|
rakPeer->requestedConnectionQueueMutex.Unlock();
|
|
unlock=false;
|
|
|
|
connectionAttemptCancelled=true;
|
|
#if defined(_PS3)
|
|
//Console2DeactivateConnection(rakPeer->console2ContextId, rcs->extraData);
|
|
#endif
|
|
|
|
rakPeer->requestedConnectionQueue.RemoveAtIndex(i);
|
|
rakFree(rcs);
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (unlock)
|
|
rakPeer->requestedConnectionQueueMutex.Unlock();
|
|
|
|
/*
|
|
// Remove the connection attempt from the buffered commands
|
|
RakPeer::RequestedConnectionStruct *rcsFirst, *rcs;
|
|
rcsFirst = rakPeer->requestedConnectionList.ReadLock();
|
|
rcs=rcsFirst;
|
|
bool connectionAttemptCancelled=false;
|
|
while (rcs)
|
|
{
|
|
if (rcs->actionToTake==RakPeer::RequestedConnectionStruct::CONNECT && rcs->systemAddress==systemAddress)
|
|
{
|
|
connectionAttemptCancelled=true;
|
|
#if defined(_PS3)
|
|
//Console2DeactivateConnection(rakPeer->console2ContextId, rcs->extraData);
|
|
#endif
|
|
if (rcs==rcsFirst)
|
|
{
|
|
rakPeer->requestedConnectionList.ReadUnlock();
|
|
rcsFirst=rakPeer->requestedConnectionList.ReadLock();
|
|
rcs=rcsFirst;
|
|
}
|
|
else
|
|
{
|
|
// Hole in the middle
|
|
rcs->systemAddress=UNASSIGNED_SYSTEM_ADDRESS;
|
|
rcs=rakPeer->requestedConnectionList.ReadLock();
|
|
}
|
|
|
|
continue;
|
|
}
|
|
|
|
rcs=rakPeer->requestedConnectionList.ReadLock();
|
|
}
|
|
|
|
if (rcsFirst)
|
|
rakPeer->requestedConnectionList.CancelReadLock(rcsFirst);
|
|
*/
|
|
|
|
if (connectionAttemptCancelled)
|
|
{
|
|
// Tell user of connection attempt failed
|
|
packet=AllocPacket(sizeof( char ));
|
|
packet->data[ 0 ] = data[0]; // Attempted a connection and couldn't
|
|
packet->bitSize = ( sizeof( char ) * 8);
|
|
packet->systemAddress = systemAddress;
|
|
packet->systemIndex = 65535;
|
|
rakPeer->AddPacketToProducer(packet);
|
|
}
|
|
}
|
|
// We didn't check this datagram to see if it came from a connected system or not yet.
|
|
// Therefore, this datagram must be under 17 bits - otherwise it may be normal network traffic as the min size for a raknet send is 17 bits
|
|
else if ((unsigned char)(data)[0] == ID_OPEN_CONNECTION_REQUEST && length == sizeof(unsigned char)*2)
|
|
{
|
|
//printf("%i:IOCR, ", __LINE__);
|
|
|
|
for (i=0; i < rakPeer->messageHandlerList.Size(); i++)
|
|
rakPeer->messageHandlerList[i]->OnDirectSocketReceive(data, length*8, systemAddress);
|
|
|
|
// If this guy is already connected and they initiated the connection, ignore the connection request
|
|
RakPeer::RemoteSystemStruct *rss = rakPeer->GetRemoteSystemFromSystemAddress( systemAddress, true, true );
|
|
if (rss==0 || rss->weInitiatedTheConnection==true)
|
|
{
|
|
// Assign new remote system
|
|
if (rss==0)
|
|
rss=rakPeer->AssignSystemAddressToRemoteSystemList(systemAddress, RakPeer::RemoteSystemStruct::UNVERIFIED_SENDER, connectionSocketIndex);
|
|
|
|
unsigned char c[2];
|
|
if (rss) // If this guy is already connected remote system will be 0
|
|
c[0] = ID_OPEN_CONNECTION_REPLY;
|
|
else
|
|
c[0] = ID_NO_FREE_INCOMING_CONNECTIONS;
|
|
c[1] = 0; // Pad, some routers apparently block 1 byte packets
|
|
|
|
unsigned i;
|
|
for (i=0; i < rakPeer->messageHandlerList.Size(); i++)
|
|
rakPeer->messageHandlerList[i]->OnDirectSocketSend((char*)&c, 16, systemAddress);
|
|
SocketLayer::Instance()->SendTo( rakPeer->connectionSockets[connectionSocketIndex], (char*)&c, 2, systemAddress.binaryAddress, systemAddress.port );
|
|
|
|
return;
|
|
}
|
|
else if (rss!=0)
|
|
{
|
|
char c[2];
|
|
|
|
// If this is an existing connection, and they are already fully connected (not in progress), reply with connection attempt failed
|
|
if (rss->connectMode==RakPeer::RemoteSystemStruct::CONNECTED ||
|
|
rss->connectMode==RakPeer::RemoteSystemStruct::DISCONNECT_ASAP ||
|
|
rss->connectMode==RakPeer::RemoteSystemStruct::DISCONNECT_ASAP_SILENTLY)
|
|
{
|
|
c[0] = ID_ALREADY_CONNECTED;
|
|
c[1] = 0; // Pad, some routers apparently block 1 byte packets
|
|
unsigned i;
|
|
for (i=0; i < rakPeer->messageHandlerList.Size(); i++)
|
|
rakPeer->messageHandlerList[i]->OnDirectSocketSend((char*)&c, 16, systemAddress);
|
|
SocketLayer::Instance()->SendTo( rakPeer->connectionSockets[connectionSocketIndex], (char*)&c, 2, systemAddress.binaryAddress, systemAddress.port );
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// int i=0;
|
|
}
|
|
}
|
|
|
|
// The reason for all this is that the reliability layer has no way to tell between offline messages that arrived late for a player that is now connected,
|
|
// and a regular encoding. So I insert OFFLINE_MESSAGE_DATA_ID into the stream, the encoding of which is essentially impossible to hit by random chance
|
|
// This only needs to be done for offline messages that carry data, since other messages are two bytes which are guaranteed not to be from the reliability layer anyway
|
|
bool isOfflineMessage;
|
|
if (length <=2)
|
|
{
|
|
isOfflineMessage=true;
|
|
}
|
|
else if (
|
|
((unsigned char)data[0] == ID_PING ||
|
|
(unsigned char)data[0] == ID_PING_OPEN_CONNECTIONS) &&
|
|
length == sizeof(unsigned char) + sizeof(RakNetTime) + sizeof(OFFLINE_MESSAGE_DATA_ID))
|
|
{
|
|
isOfflineMessage=memcmp(data+sizeof(unsigned char) + sizeof(RakNetTime), OFFLINE_MESSAGE_DATA_ID, sizeof(OFFLINE_MESSAGE_DATA_ID))==0;
|
|
}
|
|
else if ((unsigned char)data[0] == ID_PONG && (size_t) length >= sizeof(unsigned char) + sizeof(RakNetTime) + sizeof(OFFLINE_MESSAGE_DATA_ID))
|
|
{
|
|
isOfflineMessage=memcmp(data+sizeof(unsigned char) + sizeof(RakNetTime), OFFLINE_MESSAGE_DATA_ID, sizeof(OFFLINE_MESSAGE_DATA_ID))==0;
|
|
}
|
|
else if (((unsigned char)data[0] == ID_ADVERTISE_SYSTEM || (unsigned char)data[0] == ID_OUT_OF_BAND_INTERNAL) &&
|
|
(size_t) length >= sizeof(unsigned char) + sizeof(OFFLINE_MESSAGE_DATA_ID))
|
|
{
|
|
isOfflineMessage=memcmp(data+sizeof(unsigned char), OFFLINE_MESSAGE_DATA_ID, sizeof(OFFLINE_MESSAGE_DATA_ID))==0;
|
|
}
|
|
else
|
|
{
|
|
isOfflineMessage=false;
|
|
}
|
|
|
|
// See if this datagram came from a connected system
|
|
remoteSystem = rakPeer->GetRemoteSystemFromSystemAddress( systemAddress, true, true );
|
|
if ( isOfflineMessage==false && remoteSystem )
|
|
{
|
|
if (remoteSystem->connectMode==RakPeer::RemoteSystemStruct::SET_ENCRYPTION_ON_MULTIPLE_16_BYTE_PACKET && (length & 15)==0) // & 15 = mod 16
|
|
{
|
|
// Test the key before setting it
|
|
unsigned int newLength;
|
|
char output[ MAXIMUM_MTU_SIZE ];
|
|
DataBlockEncryptor testEncryptor;
|
|
testEncryptor.SetKey(remoteSystem->AESKey);
|
|
if ( testEncryptor.Decrypt( ( unsigned char* ) data, length, (unsigned char*) output,&newLength ) == true )
|
|
remoteSystem->reliabilityLayer.SetEncryptionKey( remoteSystem->AESKey );
|
|
}
|
|
|
|
// Handle regular incoming data
|
|
// HandleSocketReceiveFromConnectedPlayer is only safe to be called from the same thread as Update, which is this thread
|
|
if ( isOfflineMessage==false)
|
|
{
|
|
if (remoteSystem->reliabilityLayer.HandleSocketReceiveFromConnectedPlayer( data, length, systemAddress, rakPeer->messageHandlerList, remoteSystem->MTUSize ) == false)
|
|
{
|
|
// These kinds of packets may have been duplicated and incorrectly determined to be
|
|
// cheat packets. Anything else really is a cheat packet
|
|
if ( !(
|
|
( (unsigned char)data[0] == ID_CONNECTION_BANNED && length <= 2 ) ||
|
|
( (unsigned char)data[0] == ID_OPEN_CONNECTION_REQUEST && length <= 2 ) ||
|
|
( (unsigned char)data[0] == ID_OPEN_CONNECTION_REPLY && length <= 2 ) ||
|
|
( (unsigned char)data[0] == ID_CONNECTION_ATTEMPT_FAILED && length <= 2 ) ||
|
|
( (unsigned char)data[0] == ID_ALREADY_CONNECTED && length <= 2 ))
|
|
)
|
|
{
|
|
// Unknown message. Could be caused by old out of order stuff from unconnected or no longer connected systems, etc.
|
|
packet=AllocPacket(1);
|
|
packet->data[ 0 ] = ID_MODIFIED_PACKET;
|
|
packet->bitSize = sizeof( char ) * 8;
|
|
packet->systemAddress = systemAddress;
|
|
packet->systemIndex = ( SystemIndex ) rakPeer->GetIndexFromSystemAddress( systemAddress, true );
|
|
rakPeer->AddPacketToProducer(packet);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
for (i=0; i < rakPeer->messageHandlerList.Size(); i++)
|
|
rakPeer->messageHandlerList[i]->OnDirectSocketReceive(data, length*8, systemAddress);
|
|
|
|
if (length > 512)
|
|
{
|
|
#if !defined(_XBOX360)
|
|
// Flood attack? Unknown systems should never send more than a small amount of data. Do a short ban
|
|
rakPeer->AddToBanList(systemAddress.ToString(false), 10000);
|
|
#endif
|
|
return;
|
|
}
|
|
|
|
// These are all messages from unconnected systems. Messages here can be any size, but are never processed from connected systems.
|
|
if ( ( (unsigned char) data[ 0 ] == ID_PING_OPEN_CONNECTIONS
|
|
|| (unsigned char)(data)[0] == ID_PING) && length == sizeof(unsigned char)+sizeof(RakNetTime)+sizeof(OFFLINE_MESSAGE_DATA_ID) )
|
|
{
|
|
if ( (unsigned char)(data)[0] == ID_PING ||
|
|
rakPeer->AllowIncomingConnections() ) // Open connections with players
|
|
{
|
|
#if !defined(_XBOX360)
|
|
RakNet::BitStream inBitStream( (unsigned char *) data, length, false );
|
|
inBitStream.IgnoreBits(8);
|
|
RakNetTime sendPingTime;
|
|
inBitStream.Read(sendPingTime);
|
|
|
|
RakNet::BitStream outBitStream;
|
|
outBitStream.Write((MessageID)ID_PONG); // Should be named ID_UNCONNECTED_PONG eventually
|
|
outBitStream.Write(sendPingTime);
|
|
outBitStream.WriteAlignedBytes((const unsigned char*) OFFLINE_MESSAGE_DATA_ID, sizeof(OFFLINE_MESSAGE_DATA_ID));
|
|
|
|
rakPeer->rakPeerMutexes[ RakPeer::offlinePingResponse_Mutex ].Lock();
|
|
// They are connected, so append offline ping data
|
|
outBitStream.Write( (char*)rakPeer->offlinePingResponse.GetData(), rakPeer->offlinePingResponse.GetNumberOfBytesUsed() );
|
|
rakPeer->rakPeerMutexes[ RakPeer::offlinePingResponse_Mutex ].Unlock();
|
|
|
|
unsigned i;
|
|
for (i=0; i < rakPeer->messageHandlerList.Size(); i++)
|
|
rakPeer->messageHandlerList[i]->OnDirectSocketSend((const char*)outBitStream.GetData(), outBitStream.GetNumberOfBytesUsed(), systemAddress);
|
|
|
|
SocketLayer::Instance()->SendTo( rakPeer->connectionSockets[connectionSocketIndex], (const char*)outBitStream.GetData(), (unsigned int) outBitStream.GetNumberOfBytesUsed(), systemAddress.ToString(false) , systemAddress.port );
|
|
#endif
|
|
}
|
|
}
|
|
// UNCONNECTED MESSAGE Pong with no data.
|
|
else if ((unsigned char) data[ 0 ] == ID_PONG && (size_t) length >= sizeof(unsigned char)+sizeof(RakNetTime)+sizeof(OFFLINE_MESSAGE_DATA_ID) && (size_t) length < sizeof(unsigned char)+sizeof(RakNetTime)+sizeof(OFFLINE_MESSAGE_DATA_ID)+MAX_OFFLINE_DATA_LENGTH)
|
|
{
|
|
if ((size_t) length > sizeof(unsigned char)+sizeof(RakNetTime)+sizeof(OFFLINE_MESSAGE_DATA_ID))
|
|
{
|
|
// Skip OFFLINE_MESSAGE_DATA_ID after the timestamp
|
|
packet=AllocPacket(length-sizeof(OFFLINE_MESSAGE_DATA_ID));
|
|
memcpy(packet->data, data, sizeof(unsigned char)+sizeof(RakNetTime));
|
|
memcpy(packet->data+sizeof(unsigned char)+sizeof(RakNetTime), data+sizeof(unsigned char)+sizeof(RakNetTime)+sizeof(OFFLINE_MESSAGE_DATA_ID), length-sizeof(unsigned char)-sizeof(RakNetTime)-sizeof(OFFLINE_MESSAGE_DATA_ID));
|
|
}
|
|
else
|
|
{
|
|
packet=AllocPacket(length);
|
|
memcpy(packet->data, data, length);
|
|
}
|
|
packet->bitSize = BYTES_TO_BITS(length);
|
|
packet->systemAddress = systemAddress;
|
|
packet->systemIndex = ( SystemIndex ) rakPeer->GetIndexFromSystemAddress( systemAddress, true );
|
|
rakPeer->AddPacketToProducer(packet);
|
|
}
|
|
else if (((unsigned char) data[ 0 ] == ID_ADVERTISE_SYSTEM || (unsigned char) data[ 0 ] == ID_OUT_OF_BAND_INTERNAL) &&
|
|
length >= 2 && (size_t) length < MAX_OFFLINE_DATA_LENGTH+sizeof(OFFLINE_MESSAGE_DATA_ID)+1)
|
|
{
|
|
if ((size_t) length <= sizeof(OFFLINE_MESSAGE_DATA_ID)+1)
|
|
{
|
|
packet=AllocPacket(length);
|
|
memcpy(packet->data, data, length);
|
|
}
|
|
else
|
|
{
|
|
// Skip OFFLINE_MESSAGE_DATA_ID data after the first byte
|
|
packet=AllocPacket(length-sizeof(OFFLINE_MESSAGE_DATA_ID));
|
|
packet->data[0]=data[ 0 ];
|
|
memcpy(packet->data+1, data+sizeof(OFFLINE_MESSAGE_DATA_ID)+1, length-sizeof(OFFLINE_MESSAGE_DATA_ID)-1);
|
|
}
|
|
|
|
packet->bitSize = BYTES_TO_BITS(packet->length);
|
|
packet->systemAddress = systemAddress;
|
|
packet->systemIndex = ( SystemIndex ) rakPeer->GetIndexFromSystemAddress( systemAddress, true );
|
|
rakPeer->AddPacketToProducer(packet);
|
|
}
|
|
}
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
bool RakPeer::RunUpdateCycle( void )
|
|
{
|
|
RakPeer::RemoteSystemStruct * remoteSystem;
|
|
unsigned remoteSystemIndex;
|
|
Packet *packet;
|
|
RakNetTime ping, lastPing;
|
|
// int currentSentBytes,currentReceivedBytes;
|
|
// unsigned numberOfBytesUsed;
|
|
BitSize_t numberOfBitsUsed;
|
|
//SystemAddress authoritativeClientSystemAddress;
|
|
BitSize_t bitSize;
|
|
unsigned int byteSize;
|
|
unsigned char *data;
|
|
int errorCode;
|
|
int gotData;
|
|
RakNetTimeNS timeNS;
|
|
RakNetTime timeMS;
|
|
SystemAddress systemAddress;
|
|
BufferedCommandStruct *bcs;
|
|
bool callerDataAllocationUsed;
|
|
RakNetStatistics *rnss;
|
|
unsigned connectionSocketIndex;
|
|
|
|
for (connectionSocketIndex=0; connectionSocketIndex < connectionSocketsLength; connectionSocketIndex++)
|
|
{
|
|
do
|
|
{
|
|
// Read a packet
|
|
gotData = SocketLayer::Instance()->RecvFrom( connectionSockets[connectionSocketIndex], this, &errorCode, connectionSocketIndex );
|
|
|
|
if ( gotData == -1 )
|
|
{
|
|
#ifdef _WIN32
|
|
if ( errorCode == WSAECONNRESET )
|
|
{
|
|
gotData=false;
|
|
// 11/14/05 - RecvFrom now calls HandlePortUnreachable rather than PushPortRefused
|
|
//PushPortRefused( UNASSIGNED_SYSTEM_ADDRESS );
|
|
//closesocket(peer->connectionSocket);
|
|
|
|
//peer->connectionSocket = SocketLayer::Instance()->CreateBoundSocket(peer->mySystemAddress.port, true);
|
|
}
|
|
else
|
|
if ( errorCode != 0 && endThreads == false )
|
|
{
|
|
#ifdef _DO_PRINTF
|
|
printf( "Server RecvFrom critical failure!\n" );
|
|
#endif
|
|
// Some kind of critical error
|
|
// peer->isRecvfromThreadActive=false;
|
|
endThreads = true;
|
|
Shutdown( 0, 0 );
|
|
return false;
|
|
}
|
|
|
|
#else
|
|
if ( errorCode == -1 )
|
|
{
|
|
// isRecvfromThreadActive=false;
|
|
endThreads = true;
|
|
Shutdown( 0 );
|
|
return false;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
if ( endThreads )
|
|
return false;
|
|
}
|
|
while ( gotData>0 ); // Read until there is nothing left
|
|
}
|
|
|
|
timeNS=0;
|
|
timeMS=0;
|
|
|
|
// Process all the deferred user thread Send and connect calls
|
|
while ((bcs=bufferedCommands.ReadLock())!=0)
|
|
{
|
|
if (bcs->command==BufferedCommandStruct::BCS_SEND)
|
|
{
|
|
// GetTime is a very slow call so do it once and as late as possible
|
|
if (timeNS==0)
|
|
timeNS = RakNet::GetTimeNS();
|
|
|
|
callerDataAllocationUsed=SendImmediate((char*)bcs->data, bcs->numberOfBitsToSend, bcs->priority, bcs->reliability, bcs->orderingChannel, bcs->systemAddress, bcs->broadcast, true, timeNS);
|
|
if ( callerDataAllocationUsed==false )
|
|
rakFree(bcs->data);
|
|
|
|
// Set the new connection state AFTER we call sendImmediate in case we are setting it to a disconnection state, which does not allow further sends
|
|
if (bcs->connectionMode!=RemoteSystemStruct::NO_ACTION && bcs->systemAddress!=UNASSIGNED_SYSTEM_ADDRESS)
|
|
{
|
|
remoteSystem=GetRemoteSystemFromSystemAddress( bcs->systemAddress, true, true );
|
|
if (remoteSystem)
|
|
remoteSystem->connectMode=bcs->connectionMode;
|
|
}
|
|
}
|
|
else if (bcs->command==BufferedCommandStruct::BCS_CLOSE_CONNECTION)
|
|
CloseConnectionInternal(bcs->systemAddress, false, true, bcs->orderingChannel);
|
|
|
|
#ifdef _DEBUG
|
|
bcs->data=0;
|
|
#endif
|
|
|
|
bufferedCommands.ReadUnlock();
|
|
}
|
|
|
|
if (requestedConnectionQueue.IsEmpty()==false)
|
|
{
|
|
if (timeNS==0)
|
|
{
|
|
timeNS = RakNet::GetTimeNS();
|
|
timeMS = (RakNetTime)(timeNS/(RakNetTimeNS)1000);
|
|
}
|
|
|
|
bool condition1, condition2;
|
|
RequestedConnectionStruct *rcs;
|
|
unsigned requestedConnectionQueueIndex=0;
|
|
requestedConnectionQueueMutex.Lock();
|
|
while (requestedConnectionQueueIndex < requestedConnectionQueue.Size())
|
|
{
|
|
rcs = requestedConnectionQueue[requestedConnectionQueueIndex];
|
|
requestedConnectionQueueMutex.Unlock();
|
|
if (rcs->nextRequestTime < timeMS)
|
|
{
|
|
condition1=rcs->requestsMade==MAX_OPEN_CONNECTION_REQUESTS;
|
|
condition2=(bool)((rcs->systemAddress==UNASSIGNED_SYSTEM_ADDRESS)==1);
|
|
// If too many requests made or a hole then remove this if possible, otherwise invalidate it
|
|
if (condition1 || condition2)
|
|
{
|
|
if (rcs->data)
|
|
{
|
|
rakFree(rcs->data);
|
|
rcs->data=0;
|
|
}
|
|
|
|
if (condition1 && !condition2 && rcs->actionToTake==RequestedConnectionStruct::CONNECT)
|
|
{
|
|
#if defined(_PS3)
|
|
//Console2DeactivateConnection(console2ContextId, rcs->extraData);
|
|
#endif
|
|
// Tell user of connection attempt failed
|
|
packet=AllocPacket(sizeof( char ));
|
|
packet->data[ 0 ] = ID_CONNECTION_ATTEMPT_FAILED; // Attempted a connection and couldn't
|
|
packet->bitSize = ( sizeof( char ) * 8);
|
|
packet->systemAddress = rcs->systemAddress;
|
|
packet->systemIndex = 65535;
|
|
AddPacketToProducer(packet);
|
|
}
|
|
|
|
rakFree(rcs);
|
|
requestedConnectionQueue.RemoveAtIndex(requestedConnectionQueueIndex);
|
|
}
|
|
else
|
|
{
|
|
|
|
rcs->requestsMade++;
|
|
rcs->nextRequestTime=timeMS+TIME_BETWEEN_OPEN_CONNECTION_REQUESTS;
|
|
char c[2];
|
|
c[0] = ID_OPEN_CONNECTION_REQUEST;
|
|
c[1] = 0; // Pad - apparently some routers block 1 byte packets
|
|
|
|
//printf("%i:IOCR, ", __LINE__);
|
|
|
|
unsigned i;
|
|
for (i=0; i < messageHandlerList.Size(); i++)
|
|
messageHandlerList[i]->OnDirectSocketSend((char*)&c, 16, rcs->systemAddress);
|
|
SocketLayer::Instance()->SendTo( connectionSockets[rcs->socketIndex], (char*)&c, 2, rcs->systemAddress.binaryAddress, rcs->systemAddress.port );
|
|
|
|
requestedConnectionQueueIndex++;
|
|
}
|
|
}
|
|
else
|
|
requestedConnectionQueueIndex++;
|
|
|
|
requestedConnectionQueueMutex.Lock();
|
|
}
|
|
requestedConnectionQueueMutex.Unlock();
|
|
}
|
|
|
|
/*
|
|
// Process connection attempts
|
|
RequestedConnectionStruct *rcsFirst, *rcs;
|
|
bool condition1, condition2;
|
|
rcsFirst = requestedConnectionList.ReadLock();
|
|
rcs=rcsFirst;
|
|
while (rcs)
|
|
{
|
|
if (timeNS==0)
|
|
{
|
|
timeNS = RakNet::GetTimeNS();
|
|
timeMS = (RakNetTime)(timeNS/(RakNetTimeNS)1000);
|
|
}
|
|
|
|
if (rcs->nextRequestTime < timeMS)
|
|
{
|
|
condition1=rcs->requestsMade==MAX_OPEN_CONNECTION_REQUESTS;
|
|
condition2=(bool)((rcs->systemAddress==UNASSIGNED_SYSTEM_ADDRESS)==1);
|
|
// If too many requests made or a hole then remove this if possible, otherwise invalidate it
|
|
if (condition1 || condition2)
|
|
{
|
|
if (rcs->data)
|
|
{
|
|
rakFree(rcs->data);
|
|
rcs->data=0;
|
|
}
|
|
|
|
if (condition1 && !condition2 && rcs->actionToTake==RequestedConnectionStruct::CONNECT)
|
|
{
|
|
#if defined(_PS3)
|
|
//Console2DeactivateConnection(console2ContextId, rcs->extraData);
|
|
#endif
|
|
// Tell user of connection attempt failed
|
|
packet=AllocPacket(sizeof( char ));
|
|
packet->data[ 0 ] = ID_CONNECTION_ATTEMPT_FAILED; // Attempted a connection and couldn't
|
|
packet->bitSize = ( sizeof( char ) * 8);
|
|
packet->systemAddress = rcs->systemAddress;
|
|
packet->systemIndex = 65535;
|
|
AddPacketToProducer(packet);
|
|
}
|
|
|
|
// Remove this if possible
|
|
if (rcs==rcsFirst)
|
|
{
|
|
requestedConnectionList.ReadUnlock();
|
|
rcsFirst = requestedConnectionList.ReadLock();
|
|
rcs=rcsFirst;
|
|
}
|
|
else
|
|
{
|
|
// Hole in the middle
|
|
rcs->systemAddress=UNASSIGNED_SYSTEM_ADDRESS;
|
|
rcs=requestedConnectionList.ReadLock();
|
|
}
|
|
|
|
continue;
|
|
}
|
|
|
|
rcs->requestsMade++;
|
|
rcs->nextRequestTime=timeMS+TIME_BETWEEN_OPEN_CONNECTION_REQUESTS;
|
|
char c[2];
|
|
c[0] = ID_OPEN_CONNECTION_REQUEST;
|
|
c[1] = 0; // Pad - apparently some routers block 1 byte packets
|
|
|
|
//printf("%i:IOCR, ", __LINE__);
|
|
|
|
unsigned i;
|
|
for (i=0; i < messageHandlerList.Size(); i++)
|
|
messageHandlerList[i]->OnDirectSocketSend((char*)&c, 16, rcs->systemAddress);
|
|
SocketLayer::Instance()->SendTo( connectionSockets[rcs->socketIndex], (char*)&c, 2, rcs->systemAddress.binaryAddress, rcs->systemAddress.port );
|
|
}
|
|
|
|
rcs=requestedConnectionList.ReadLock();
|
|
}
|
|
|
|
if (rcsFirst)
|
|
requestedConnectionList.CancelReadLock(rcsFirst);
|
|
*/
|
|
|
|
|
|
// remoteSystemList in network thread
|
|
for ( remoteSystemIndex = 0; remoteSystemIndex < maximumNumberOfPeers; ++remoteSystemIndex )
|
|
//for ( remoteSystemIndex = 0; remoteSystemIndex < remoteSystemListSize; ++remoteSystemIndex )
|
|
{
|
|
// I'm using systemAddress from remoteSystemList but am not locking it because this loop is called very frequently and it doesn't
|
|
// matter if we miss or do an extra update. The reliability layers themselves never care which player they are associated with
|
|
//systemAddress = remoteSystemList[ remoteSystemIndex ].systemAddress;
|
|
// Allow the systemAddress for this remote system list to change. We don't care if it changes now.
|
|
// remoteSystemList[ remoteSystemIndex ].allowSystemAddressAssigment=true;
|
|
if ( remoteSystemList[ remoteSystemIndex ].isActive )
|
|
{
|
|
systemAddress = remoteSystemList[ remoteSystemIndex ].systemAddress;
|
|
RakAssert(systemAddress!=UNASSIGNED_SYSTEM_ADDRESS);
|
|
|
|
// Found an active remote system
|
|
remoteSystem = remoteSystemList + remoteSystemIndex;
|
|
// Update is only safe to call from the same thread that calls HandleSocketReceiveFromConnectedPlayer,
|
|
// which is this thread
|
|
|
|
if (timeNS==0)
|
|
{
|
|
timeNS = RakNet::GetTimeNS();
|
|
timeMS = (RakNetTime)(timeNS/(RakNetTimeNS)1000);
|
|
//printf("timeNS = %I64i timeMS=%i\n", timeNS, timeMS);
|
|
}
|
|
|
|
|
|
if (timeMS > remoteSystem->lastReliableSend && timeMS-remoteSystem->lastReliableSend > 5000 && remoteSystem->connectMode==RemoteSystemStruct::CONNECTED)
|
|
{
|
|
// If no reliable packets are waiting for an ack, do a one byte reliable send so that disconnections are noticed
|
|
rnss=remoteSystem->reliabilityLayer.GetStatistics();
|
|
if (rnss->messagesOnResendQueue==0)
|
|
{
|
|
PingInternal( systemAddress, true, RELIABLE );
|
|
/*
|
|
unsigned char keepAlive=ID_DETECT_LOST_CONNECTIONS;
|
|
SendImmediate((char*)&keepAlive,8,LOW_PRIORITY, RELIABLE, 0, remoteSystem->systemAddress, false, false, timeNS);
|
|
*/
|
|
//remoteSystem->lastReliableSend=timeMS+remoteSystem->reliabilityLayer.GetTimeoutTime();
|
|
remoteSystem->lastReliableSend=timeMS;
|
|
}
|
|
}
|
|
|
|
/*
|
|
// Keep data on the send buffer if the connection is throughput is changing to determine the new throughput
|
|
// Stop doing this when there are no longer throughput changes
|
|
// Only done for new connections to determine the starting bandwidth
|
|
if (timeMS-remoteSystem->connectionTime < 60000 && // Newly connected
|
|
remoteSystem->connectMode==RemoteSystemStruct::CONNECTED &&
|
|
(remoteSystem->reliabilityLayer.GetLastTimeBetweenPacketsIncrease()==0 ||
|
|
timeNS-remoteSystem->reliabilityLayer.GetLastTimeBetweenPacketsIncrease()>(RakNetTimeNS)2000000 // Throughput did not decrease recently
|
|
))
|
|
{
|
|
// if (remoteSystem->reliabilityLayer.IsReliableOutgoingDataWaiting()==false) // No other data waiting to go out
|
|
if (remoteSystem->reliabilityLayer.IsOutgoingDataWaiting()==false)
|
|
{
|
|
// Send a dummy reliable packet to measure throughput
|
|
unsigned char keepAlive=ID_DETECT_LOST_CONNECTIONS;
|
|
SendImmediate((char*)&keepAlive,8,LOW_PRIORITY, RELIABLE, 0, remoteSystem->systemAddress, false, false, timeNS);
|
|
}
|
|
|
|
remoteSystem->reliabilityLayer.SetDoFastThroughputReactions(true);
|
|
}
|
|
else
|
|
{
|
|
remoteSystem->reliabilityLayer.SetDoFastThroughputReactions(false);
|
|
}
|
|
*/
|
|
|
|
remoteSystem->reliabilityLayer.Update( connectionSockets[remoteSystem->connectionSocketIndex], systemAddress, remoteSystem->MTUSize, timeNS, maxOutgoingBPS, messageHandlerList ); // systemAddress only used for the internet simulator test
|
|
|
|
// Check for failure conditions
|
|
if ( remoteSystem->reliabilityLayer.IsDeadConnection() ||
|
|
((remoteSystem->connectMode==RemoteSystemStruct::DISCONNECT_ASAP || remoteSystem->connectMode==RemoteSystemStruct::DISCONNECT_ASAP_SILENTLY) && remoteSystem->reliabilityLayer.IsOutgoingDataWaiting()==false) ||
|
|
(remoteSystem->connectMode==RemoteSystemStruct::DISCONNECT_ON_NO_ACK && (remoteSystem->reliabilityLayer.AreAcksWaiting()==false || remoteSystem->reliabilityLayer.AckTimeout(timeNS)==true)) ||
|
|
((
|
|
(remoteSystem->connectMode==RemoteSystemStruct::REQUESTED_CONNECTION ||
|
|
remoteSystem->connectMode==RemoteSystemStruct::HANDLING_CONNECTION_REQUEST ||
|
|
remoteSystem->connectMode==RemoteSystemStruct::UNVERIFIED_SENDER ||
|
|
remoteSystem->connectMode==RemoteSystemStruct::SET_ENCRYPTION_ON_MULTIPLE_16_BYTE_PACKET)
|
|
&& timeMS > remoteSystem->connectionTime && timeMS - remoteSystem->connectionTime > 10000))
|
|
)
|
|
{
|
|
// printf("timeMS=%i remoteSystem->connectionTime=%i\n", timeMS, remoteSystem->connectionTime );
|
|
|
|
// Failed. Inform the user?
|
|
// TODO - RakNet 4.0 - Return a different message identifier for DISCONNECT_ASAP_SILENTLY and DISCONNECT_ASAP than for DISCONNECT_ON_NO_ACK
|
|
// The first two mean we called CloseConnection(), the last means the other system sent us ID_DISCONNECTION_NOTIFICATION
|
|
if (remoteSystem->connectMode==RemoteSystemStruct::CONNECTED || remoteSystem->connectMode==RemoteSystemStruct::REQUESTED_CONNECTION
|
|
|| remoteSystem->connectMode==RemoteSystemStruct::DISCONNECT_ASAP_SILENTLY || remoteSystem->connectMode==RemoteSystemStruct::DISCONNECT_ASAP || remoteSystem->connectMode==RemoteSystemStruct::DISCONNECT_ON_NO_ACK)
|
|
{
|
|
|
|
// RakNet::BitStream undeliveredMessages;
|
|
// remoteSystem->reliabilityLayer.GetUndeliveredMessages(&undeliveredMessages,remoteSystem->MTUSize);
|
|
|
|
// packet=AllocPacket(sizeof( char ) + undeliveredMessages.GetNumberOfBytesUsed());
|
|
packet=AllocPacket(sizeof( char ));
|
|
if (remoteSystem->connectMode==RemoteSystemStruct::REQUESTED_CONNECTION)
|
|
packet->data[ 0 ] = ID_CONNECTION_ATTEMPT_FAILED; // Attempted a connection and couldn't
|
|
else if (remoteSystem->connectMode==RemoteSystemStruct::CONNECTED)
|
|
packet->data[ 0 ] = ID_CONNECTION_LOST; // DeadConnection
|
|
else
|
|
packet->data[ 0 ] = ID_DISCONNECTION_NOTIFICATION; // DeadConnection
|
|
|
|
// memcpy(packet->data+1, undeliveredMessages.GetData(), undeliveredMessages.GetNumberOfBytesUsed());
|
|
|
|
packet->systemAddress = systemAddress;
|
|
packet->systemIndex = ( SystemIndex ) remoteSystemIndex;
|
|
|
|
AddPacketToProducer(packet);
|
|
}
|
|
// else connection shutting down, don't bother telling the user
|
|
|
|
#ifdef _DO_PRINTF
|
|
printf("Connection dropped for player %i:%i\n", systemAddress.binaryAddress, systemAddress.port);
|
|
#endif
|
|
CloseConnectionInternal( systemAddress, false, true, 0 );
|
|
continue;
|
|
}
|
|
|
|
// Did the reliability layer detect a modified packet?
|
|
if ( remoteSystem->reliabilityLayer.IsCheater() )
|
|
{
|
|
packet=AllocPacket(sizeof(char));
|
|
packet->bitSize=8;
|
|
packet->data[ 0 ] = (MessageID)ID_MODIFIED_PACKET;
|
|
packet->systemAddress = systemAddress;
|
|
packet->systemIndex = ( SystemIndex ) remoteSystemIndex;
|
|
AddPacketToProducer(packet);
|
|
continue;
|
|
}
|
|
|
|
// Ping this guy if it is time to do so
|
|
if ( remoteSystem->connectMode==RemoteSystemStruct::CONNECTED && timeMS > remoteSystem->nextPingTime && ( occasionalPing || remoteSystem->lowestPing == (unsigned short)-1 ) )
|
|
{
|
|
remoteSystem->nextPingTime = timeMS + 5000;
|
|
PingInternal( systemAddress, true, UNRELIABLE );
|
|
}
|
|
|
|
// Find whoever has the lowest player ID
|
|
//if (systemAddress < authoritativeClientSystemAddress)
|
|
// authoritativeClientSystemAddress=systemAddress;
|
|
|
|
// Does the reliability layer have any packets waiting for us?
|
|
// To be thread safe, this has to be called in the same thread as HandleSocketReceiveFromConnectedPlayer
|
|
bitSize = remoteSystem->reliabilityLayer.Receive( &data );
|
|
|
|
while ( bitSize > 0 )
|
|
{
|
|
// These types are for internal use and should never arrive from a network packet
|
|
if (data[0]==ID_CONNECTION_ATTEMPT_FAILED || data[0]==ID_MODIFIED_PACKET)
|
|
{
|
|
RakAssert(0);
|
|
continue;
|
|
}
|
|
|
|
// Put the input through compression if necessary
|
|
if ( inputTree )
|
|
{
|
|
RakNet::BitStream dataBitStream( MAXIMUM_MTU_SIZE );
|
|
// Since we are decompressing input, we need to copy to a bitstream, decompress, then copy back to a probably
|
|
// larger data block. It's slow, but the user should have known that anyway
|
|
dataBitStream.Reset();
|
|
dataBitStream.WriteAlignedBytes( ( unsigned char* ) data, BITS_TO_BYTES( bitSize ) );
|
|
rawBytesReceived += (unsigned int) dataBitStream.GetNumberOfBytesUsed();
|
|
|
|
// numberOfBytesUsed = dataBitStream.GetNumberOfBytesUsed();
|
|
numberOfBitsUsed = dataBitStream.GetNumberOfBitsUsed();
|
|
//rawBytesReceived += numberOfBytesUsed;
|
|
// Decompress the input data.
|
|
|
|
if (numberOfBitsUsed>0)
|
|
{
|
|
unsigned char *dataCopy = (unsigned char*) rakMalloc( (unsigned int) dataBitStream.GetNumberOfBytesUsed() );
|
|
memcpy( dataCopy, dataBitStream.GetData(), (size_t) dataBitStream.GetNumberOfBytesUsed() );
|
|
dataBitStream.Reset();
|
|
inputTree->DecodeArray( dataCopy, numberOfBitsUsed, &dataBitStream );
|
|
compressedBytesReceived += (unsigned int) dataBitStream.GetNumberOfBytesUsed();
|
|
rakFree(dataCopy);
|
|
|
|
byteSize = (unsigned int) dataBitStream.GetNumberOfBytesUsed();
|
|
|
|
if ( byteSize > BITS_TO_BYTES( bitSize ) ) // Probably the case - otherwise why decompress?
|
|
{
|
|
rakFree (data);
|
|
data = (unsigned char*) rakMalloc( (size_t) byteSize );
|
|
}
|
|
memcpy( data, dataBitStream.GetData(), byteSize );
|
|
}
|
|
else
|
|
byteSize=0;
|
|
}
|
|
else
|
|
// Fast and easy - just use the data that was returned
|
|
byteSize = (unsigned int) BITS_TO_BYTES( bitSize );
|
|
|
|
// For unknown senders we only accept a few specific packets
|
|
if (remoteSystem->connectMode==RemoteSystemStruct::UNVERIFIED_SENDER)
|
|
{
|
|
if ( (unsigned char)(data)[0] == ID_CONNECTION_REQUEST )
|
|
{
|
|
ParseConnectionRequestPacket(remoteSystem, systemAddress, (const char*)data, byteSize);
|
|
rakFree(data);
|
|
}
|
|
else
|
|
{
|
|
CloseConnectionInternal( systemAddress, false, true, 0 );
|
|
#ifdef _DO_PRINTF
|
|
printf("Temporarily banning %i:%i for sending nonsense data\n", systemAddress.binaryAddress, systemAddress.port);
|
|
#endif
|
|
#if !defined(_XBOX360)
|
|
AddToBanList(systemAddress.ToString(false), remoteSystem->reliabilityLayer.GetTimeoutTime());
|
|
#endif
|
|
|
|
rakFree(data);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// However, if we are connected we still take a connection request in case both systems are trying to connect to each other
|
|
// at the same time
|
|
if ( (unsigned char)(data)[0] == ID_CONNECTION_REQUEST )
|
|
{
|
|
// 04/27/06 This is wrong. With cross connections, we can both have initiated the connection are in state REQUESTED_CONNECTION
|
|
// 04/28/06 Downgrading connections from connected will close the connection due to security at ((remoteSystem->connectMode!=RemoteSystemStruct::CONNECTED && time > remoteSystem->connectionTime && time - remoteSystem->connectionTime > 10000))
|
|
if (remoteSystem->connectMode==RemoteSystemStruct::REQUESTED_CONNECTION)
|
|
{
|
|
ParseConnectionRequestPacket(remoteSystem, systemAddress, (const char*)data, byteSize);
|
|
}
|
|
else
|
|
{
|
|
// Got a connection request message from someone we are already connected to. Just reply normally.
|
|
// This can happen due to race conditions with the fully connected mesh
|
|
SendConnectionRequestAccepted(remoteSystem);
|
|
}
|
|
rakFree(data);
|
|
}
|
|
else if ( (unsigned char) data[ 0 ] == ID_NEW_INCOMING_CONNECTION && byteSize == sizeof(unsigned char)+sizeof(unsigned int)+sizeof(unsigned short)+sizeof(unsigned int)+sizeof(unsigned short) )
|
|
{
|
|
if (remoteSystem->connectMode==RemoteSystemStruct::HANDLING_CONNECTION_REQUEST ||
|
|
remoteSystem->connectMode==RemoteSystemStruct::REQUESTED_CONNECTION ||
|
|
remoteSystem->connectMode==RemoteSystemStruct::SET_ENCRYPTION_ON_MULTIPLE_16_BYTE_PACKET ||
|
|
systemAddress==mySystemAddress) // local system connect
|
|
{
|
|
remoteSystem->connectMode=RemoteSystemStruct::CONNECTED;
|
|
PingInternal( systemAddress, true, UNRELIABLE );
|
|
|
|
RakNet::BitStream inBitStream((unsigned char *) data, byteSize, false);
|
|
SystemAddress bsSystemAddress;
|
|
|
|
inBitStream.IgnoreBits(8);
|
|
inBitStream.Read(bsSystemAddress.binaryAddress);
|
|
inBitStream.Read(bsSystemAddress.port);
|
|
inBitStream.Read(remoteSystem->theirInternalSystemAddress);
|
|
|
|
// Overwrite the data in the packet
|
|
// NewIncomingConnectionStruct newIncomingConnectionStruct;
|
|
// RakNet::BitStream nICS_BS( data, NewIncomingConnectionStruct_Size, false );
|
|
// newIncomingConnectionStruct.Deserialize( nICS_BS );
|
|
|
|
remoteSystem->myExternalSystemAddress = bsSystemAddress;
|
|
|
|
firstExternalID=bsSystemAddress;
|
|
|
|
// Send this info down to the game
|
|
packet=AllocPacket(byteSize, data);
|
|
packet->bitSize = bitSize;
|
|
packet->systemAddress = systemAddress;
|
|
packet->systemIndex = ( SystemIndex ) remoteSystemIndex;
|
|
AddPacketToProducer(packet);
|
|
}
|
|
else
|
|
{
|
|
// Ignore, already connected
|
|
rakFree(data);
|
|
}
|
|
}
|
|
else if ( (unsigned char) data[ 0 ] == ID_CONNECTED_PONG && byteSize == sizeof(unsigned char)+sizeof(RakNetTime)*2 )
|
|
{
|
|
RakNetTime sendPingTime, sendPongTime;
|
|
|
|
// Copy into the ping times array the current time - the value returned
|
|
// First extract the sent ping
|
|
RakNet::BitStream inBitStream( (unsigned char *) data, byteSize, false );
|
|
//PingStruct ps;
|
|
//ps.Deserialize(psBS);
|
|
inBitStream.IgnoreBits(8);
|
|
inBitStream.Read(sendPingTime);
|
|
inBitStream.Read(sendPongTime);
|
|
|
|
timeNS = RakNet::GetTimeNS(); // Update the time value to be accurate
|
|
timeMS = (RakNetTime)(timeNS/(RakNetTimeNS)1000);
|
|
if (timeMS > sendPingTime)
|
|
ping = timeMS - sendPingTime;
|
|
else
|
|
ping=0;
|
|
lastPing = remoteSystem->pingAndClockDifferential[ remoteSystem->pingAndClockDifferentialWriteIndex ].pingTime;
|
|
|
|
// Ignore super high spikes in the average
|
|
if ( lastPing <= 0 || ( ( ping < ( lastPing * 3 ) ) && ping < 1200 ) )
|
|
{
|
|
remoteSystem->pingAndClockDifferential[ remoteSystem->pingAndClockDifferentialWriteIndex ].pingTime = ( unsigned short ) ping;
|
|
// Thanks to Chris Taylor (cat02e@fsu.edu) for the improved timestamping algorithm
|
|
// Divide each integer by 2, rather than the sum by 2, to prevent overflow
|
|
remoteSystem->pingAndClockDifferential[ remoteSystem->pingAndClockDifferentialWriteIndex ].clockDifferential = sendPongTime - ( timeMS/2 + sendPingTime/2 );
|
|
|
|
if ( remoteSystem->lowestPing == (unsigned short)-1 || remoteSystem->lowestPing > (int) ping )
|
|
remoteSystem->lowestPing = (unsigned short) ping;
|
|
|
|
// Reliability layer calculates its own ping
|
|
// Most packets should arrive by the ping time.
|
|
//assert(ping < 10000); // Sanity check - could hit due to negative pings causing the var to overflow
|
|
//remoteSystem->reliabilityLayer.SetPing( (unsigned short) ping );
|
|
|
|
if ( ++( remoteSystem->pingAndClockDifferentialWriteIndex ) == PING_TIMES_ARRAY_SIZE )
|
|
remoteSystem->pingAndClockDifferentialWriteIndex = 0;
|
|
}
|
|
|
|
rakFree(data);
|
|
}
|
|
else if ( (unsigned char)data[0] == ID_INTERNAL_PING && byteSize == sizeof(unsigned char)+sizeof(RakNetTime) )
|
|
{
|
|
RakNet::BitStream inBitStream( (unsigned char *) data, byteSize, false );
|
|
inBitStream.IgnoreBits(8);
|
|
RakNetTime sendPingTime;
|
|
inBitStream.Read(sendPingTime);
|
|
|
|
RakNet::BitStream outBitStream;
|
|
outBitStream.Write((MessageID)ID_CONNECTED_PONG);
|
|
outBitStream.Write(sendPingTime);
|
|
timeMS = RakNet::GetTime();
|
|
timeNS = RakNet::GetTimeNS();
|
|
outBitStream.Write(timeMS);
|
|
SendImmediate( (char*)outBitStream.GetData(), outBitStream.GetNumberOfBitsUsed(), SYSTEM_PRIORITY, UNRELIABLE, 0, systemAddress, false, false, timeNS );
|
|
|
|
rakFree(data);
|
|
}
|
|
else if ( (unsigned char) data[ 0 ] == ID_DISCONNECTION_NOTIFICATION )
|
|
{
|
|
// We shouldn't close the connection immediately because we need to ack the ID_DISCONNECTION_NOTIFICATION
|
|
remoteSystem->connectMode=RemoteSystemStruct::DISCONNECT_ON_NO_ACK;
|
|
rakFree(data);
|
|
|
|
// AddPacketToProducer(packet);
|
|
}
|
|
else if ( (unsigned char) data[ 0 ] == ID_RPC_MAPPING )
|
|
{
|
|
RakNet::BitStream inBitStream( (unsigned char *) data, byteSize, false );
|
|
RPCIndex index;
|
|
char output[256];
|
|
inBitStream.IgnoreBits(8);
|
|
stringCompressor->DecodeString(output, 255, &inBitStream);
|
|
inBitStream.ReadCompressed(index);
|
|
remoteSystem->rpcMap.AddIdentifierAtIndex((char*)output,index);
|
|
rakFree(data);
|
|
}
|
|
#if !defined(_XBOX360) && !defined(_WIN32_WCE)
|
|
else if ( (unsigned char)(data)[0] == ID_SECURED_CONNECTION_RESPONSE &&
|
|
byteSize == 1 + sizeof( big::u32 ) + sizeof( RSA_BIT_SIZE ) + 20 )
|
|
{
|
|
SecuredConnectionConfirmation( remoteSystem, (char*)data );
|
|
rakFree(data);
|
|
}
|
|
else if ( (unsigned char)(data)[0] == ID_SECURED_CONNECTION_CONFIRMATION &&
|
|
byteSize == 1 + 20 + sizeof( RSA_BIT_SIZE ) )
|
|
{
|
|
CSHA1 sha1;
|
|
bool confirmedHash, newRandNumber;
|
|
|
|
confirmedHash = false;
|
|
|
|
// Hash the SYN-Cookie
|
|
// s2c syn-cookie = SHA1_HASH(source ip address + source port + random number)
|
|
sha1.Reset();
|
|
sha1.Update( ( unsigned char* ) & systemAddress.binaryAddress, sizeof( systemAddress.binaryAddress ) );
|
|
sha1.Update( ( unsigned char* ) & systemAddress.port, sizeof( systemAddress.port ) );
|
|
sha1.Update( ( unsigned char* ) & ( newRandomNumber ), 20 );
|
|
sha1.Final();
|
|
|
|
newRandNumber = false;
|
|
|
|
// Confirm if
|
|
//syn-cookie ?= HASH(source ip address + source port + last random number)
|
|
//syn-cookie ?= HASH(source ip address + source port + current random number)
|
|
if ( memcmp( sha1.GetHash(), data + 1, 20 ) == 0 )
|
|
{
|
|
confirmedHash = true;
|
|
}
|
|
else
|
|
{
|
|
sha1.Reset();
|
|
sha1.Update( ( unsigned char* ) & systemAddress.binaryAddress, sizeof( systemAddress.binaryAddress ) );
|
|
sha1.Update( ( unsigned char* ) & systemAddress.port, sizeof( systemAddress.port ) );
|
|
sha1.Update( ( unsigned char* ) & ( oldRandomNumber ), 20 );
|
|
sha1.Final();
|
|
|
|
if ( memcmp( sha1.GetHash(), data + 1, 20 ) == 0 )
|
|
confirmedHash = true;
|
|
}
|
|
if ( confirmedHash )
|
|
{
|
|
int i;
|
|
unsigned char AESKey[ 16 ];
|
|
RSA_BIT_SIZE message, encryptedMessage;
|
|
|
|
// On connection accept, AES key is c2s RSA_Decrypt(random number) XOR s2c syn-cookie
|
|
// Get the random number first
|
|
#ifdef HOST_ENDIAN_IS_BIG
|
|
BSWAPCPY( (unsigned char *) encryptedMessage, (unsigned char *)(data + 1 + 20), sizeof( RSA_BIT_SIZE ) );
|
|
#else
|
|
memcpy( encryptedMessage, data + 1 + 20, sizeof( RSA_BIT_SIZE ) );
|
|
#endif
|
|
rsacrypt.decrypt( encryptedMessage, message );
|
|
#ifdef HOST_ENDIAN_IS_BIG
|
|
BSWAPSELF( (unsigned char *) message, sizeof( RSA_BIT_SIZE ) );
|
|
#endif
|
|
|
|
// Save the AES key
|
|
for ( i = 0; i < 16; i++ )
|
|
AESKey[ i ] = data[ 1 + i ] ^ ( ( unsigned char* ) ( message ) ) [ i ];
|
|
|
|
// Connect this player assuming we have open slots
|
|
OnConnectionRequest( remoteSystem, AESKey, true );
|
|
}
|
|
rakFree(data);
|
|
}
|
|
#endif // #if !defined(_XBOX360) && !defined(_WIN32_WCE)
|
|
else if ( (unsigned char)(data)[0] == ID_DETECT_LOST_CONNECTIONS && byteSize == sizeof(unsigned char) )
|
|
{
|
|
// Do nothing
|
|
rakFree(data);
|
|
}
|
|
else if ( (unsigned char)(data)[0] == ID_CONNECTION_REQUEST_ACCEPTED )
|
|
{
|
|
if (byteSize == sizeof(MessageID)+sizeof(unsigned int)+sizeof(unsigned short)+sizeof(SystemIndex)+sizeof(unsigned int)+sizeof(unsigned short))
|
|
{
|
|
// Make sure this connection accept is from someone we wanted to connect to
|
|
bool allowConnection, alreadyConnected;
|
|
|
|
if (remoteSystem->connectMode==RemoteSystemStruct::HANDLING_CONNECTION_REQUEST ||
|
|
remoteSystem->connectMode==RemoteSystemStruct::REQUESTED_CONNECTION ||
|
|
allowConnectionResponseIPMigration)
|
|
allowConnection=true;
|
|
else
|
|
allowConnection=false;
|
|
|
|
if (remoteSystem->connectMode==RemoteSystemStruct::HANDLING_CONNECTION_REQUEST)
|
|
alreadyConnected=true;
|
|
else
|
|
alreadyConnected=false;
|
|
|
|
if ( allowConnection )
|
|
{
|
|
SystemAddress externalID;
|
|
SystemIndex systemIndex;
|
|
SystemAddress internalID;
|
|
|
|
RakNet::BitStream inBitStream((unsigned char *) data, byteSize, false);
|
|
inBitStream.IgnoreBits(8); // ID_CONNECTION_REQUEST_ACCEPTED
|
|
// inBitStream.Read(remotePort);
|
|
inBitStream.Read(externalID.binaryAddress);
|
|
inBitStream.Read(externalID.port);
|
|
inBitStream.Read(systemIndex);
|
|
inBitStream.Read(internalID.binaryAddress);
|
|
inBitStream.Read(internalID.port);
|
|
|
|
// Find a free remote system struct to use
|
|
// RakNet::BitStream casBitS(data, byteSize, false);
|
|
// ConnectionAcceptStruct cas;
|
|
// cas.Deserialize(casBitS);
|
|
// systemAddress.port = remotePort;
|
|
|
|
// The remote system told us our external IP, so save it
|
|
remoteSystem->myExternalSystemAddress = externalID;
|
|
remoteSystem->theirInternalSystemAddress = internalID;
|
|
remoteSystem->connectMode=RemoteSystemStruct::CONNECTED;
|
|
|
|
firstExternalID=externalID;
|
|
|
|
if (alreadyConnected==false)
|
|
{
|
|
// Use the stored encryption key
|
|
if (remoteSystem->setAESKey)
|
|
remoteSystem->reliabilityLayer.SetEncryptionKey( remoteSystem->AESKey );
|
|
else
|
|
remoteSystem->reliabilityLayer.SetEncryptionKey( 0 );
|
|
}
|
|
|
|
// Send the connection request complete to the game
|
|
packet=AllocPacket(byteSize, data);
|
|
packet->bitSize = byteSize * 8;
|
|
packet->systemAddress = systemAddress;
|
|
packet->systemIndex = ( SystemIndex ) GetIndexFromSystemAddress( systemAddress, true );
|
|
AddPacketToProducer(packet);
|
|
|
|
RakNet::BitStream outBitStream(sizeof(unsigned char)+sizeof(unsigned int)+sizeof(unsigned short)+sizeof(unsigned int)+sizeof(unsigned short));
|
|
outBitStream.Write((MessageID)ID_NEW_INCOMING_CONNECTION);
|
|
outBitStream.Write(systemAddress.binaryAddress);
|
|
outBitStream.Write(systemAddress.port);
|
|
outBitStream.Write(mySystemAddress.binaryAddress);
|
|
outBitStream.Write(mySystemAddress.port);
|
|
// We turned on encryption with SetEncryptionKey. This pads packets to up to 16 bytes.
|
|
// As soon as a 16 byte packet arrives on the remote system, we will turn on AES. This works because all encrypted packets are multiples of 16 and the
|
|
// packets I happen to be sending before this are less than 16 bytes. Otherwise there is no way to know if a packet that arrived is
|
|
// encrypted or not so the other side won't know to turn on encryption or not.
|
|
SendImmediate( (char*)outBitStream.GetData(), outBitStream.GetNumberOfBitsUsed(), SYSTEM_PRIORITY, RELIABLE, 0, systemAddress, false, false, RakNet::GetTimeNS() );
|
|
|
|
if (alreadyConnected==false)
|
|
{
|
|
PingInternal( systemAddress, true, UNRELIABLE );
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Ignore, already connected
|
|
rakFree(data);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Version mismatch error?
|
|
RakAssert(0);
|
|
rakFree(data);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// What do I do if I get a message from a system, before I am fully connected?
|
|
// I can either ignore it or give it to the user
|
|
// It seems like giving it to the user is a better option
|
|
if (data[0]>=(MessageID)ID_RPC &&
|
|
remoteSystem->isActive
|
|
/*
|
|
(remoteSystem->connectMode==RemoteSystemStruct::CONNECTED ||
|
|
remoteSystem->connectMode==RemoteSystemStruct::DISCONNECT_ASAP ||
|
|
remoteSystem->connectMode==RemoteSystemStruct::DISCONNECT_ASAP_SILENTLY ||
|
|
remoteSystem->connectMode==RemoteSystemStruct::DISCONNECT_ON_NO_ACK)
|
|
*/
|
|
)
|
|
{
|
|
packet=AllocPacket(byteSize, data);
|
|
packet->bitSize = bitSize;
|
|
packet->systemAddress = systemAddress;
|
|
packet->systemIndex = ( SystemIndex ) remoteSystemIndex;
|
|
AddPacketToProducer(packet);
|
|
}
|
|
else
|
|
{
|
|
rakFree(data);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Does the reliability layer have any more packets waiting for us?
|
|
// To be thread safe, this has to be called in the same thread as HandleSocketReceiveFromConnectedPlayer
|
|
bitSize = remoteSystem->reliabilityLayer.Receive( &data );
|
|
}
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
|
|
RAK_THREAD_DECLARATION(UpdateNetworkLoop)
|
|
{
|
|
RakPeer * rakPeer = ( RakPeer * ) arguments;
|
|
|
|
// 11/15/05 - this is slower than Sleep()
|
|
#ifdef _WIN32
|
|
#if (_WIN32_WINNT >= 0x0400) || (_WIN32_WINDOWS > 0x0400)
|
|
// Lets see if these timers give better performance than Sleep
|
|
HANDLE timerHandle;
|
|
LARGE_INTEGER dueTime;
|
|
|
|
if ( rakPeer->threadSleepTimer <= 0 )
|
|
rakPeer->threadSleepTimer = 1;
|
|
|
|
// 2nd parameter of false means synchronization timer instead of manual-reset timer
|
|
timerHandle = CreateWaitableTimer( NULL, FALSE, 0 );
|
|
|
|
assert( timerHandle );
|
|
|
|
dueTime.QuadPart = -10000 * rakPeer->threadSleepTimer; // 10000 is 1 ms?
|
|
|
|
BOOL success = SetWaitableTimer( timerHandle, &dueTime, rakPeer->threadSleepTimer, NULL, NULL, FALSE );
|
|
|
|
assert( success );
|
|
|
|
#endif
|
|
#endif
|
|
|
|
#ifdef _RAKNET_THREADSAFE
|
|
#pragma message("-- RakNet: _RAKNET_THREADSAFE defined. Safe to use multiple threads on the same instance of RakPeer (Slow!). --")
|
|
#else
|
|
#pragma message("-- RakNet: _RAKNET_THREADSAFE not defined. Do NOT use multiple threads on the same instance of RakPeer (Fast!). --")
|
|
#endif
|
|
|
|
rakPeer->isMainLoopThreadActive = true;
|
|
|
|
while ( rakPeer->endThreads == false )
|
|
{
|
|
rakPeer->RunUpdateCycle();
|
|
|
|
// #if ((_WIN32_WINNT >= 0x0400) || (_WIN32_WINDOWS > 0x0400)) &&
|
|
#if defined(USE_WAIT_FOR_MULTIPLE_EVENTS) && defined(_WIN32)
|
|
#pragma message("-- RakNet: Using WaitForSingleObject. Comment out USE_WAIT_FOR_MULTIPLE_EVENTS in RakNetDefines.h if you want to use Sleep instead. --")
|
|
|
|
if (rakPeer->threadSleepTimer>0)
|
|
{
|
|
WSAWaitForMultipleEvents(1,&rakPeer->recvEvent,FALSE,rakPeer->threadSleepTimer,FALSE);
|
|
}
|
|
else
|
|
RakSleep(0);
|
|
|
|
#else // ((_WIN32_WINNT >= 0x0400) || (_WIN32_WINDOWS > 0x0400)) && defined(USE_WAIT_FOR_MULTIPLE_EVENTS)
|
|
#pragma message("-- RakNet: Using Sleep(). Uncomment USE_WAIT_FOR_MULTIPLE_EVENTS in RakNetDefines.h if you want to use WaitForSingleObject instead. --")
|
|
|
|
RakSleep( rakPeer->threadSleepTimer );
|
|
#endif
|
|
}
|
|
|
|
rakPeer->isMainLoopThreadActive = false;
|
|
|
|
#ifdef _WIN32
|
|
#if (_WIN32_WINNT >= 0x0400) || (_WIN32_WINDOWS > 0x0400)
|
|
CloseHandle(timerHandle);
|
|
#endif
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
|
|
#ifdef _MSC_VER
|
|
#pragma warning( pop )
|
|
#endif
|