2010-11-20 10:37:14 +00:00
|
|
|
/* (c) Magnus Auvinen. See licence.txt in the root of the distribution for more information. */
|
|
|
|
/* If you are missing that file, acquire a complete release at teeworlds.com. */
|
2009-10-27 14:38:53 +00:00
|
|
|
#include <base/system.h>
|
|
|
|
|
2011-12-29 22:36:53 +00:00
|
|
|
#include <engine/console.h>
|
2011-04-09 06:41:31 +00:00
|
|
|
|
2015-03-04 08:38:34 +00:00
|
|
|
#include "config.h"
|
2011-12-29 22:36:53 +00:00
|
|
|
#include "netban.h"
|
|
|
|
#include "network.h"
|
2015-03-04 08:38:34 +00:00
|
|
|
#include <engine/external/md5/md5.h>
|
2015-08-14 16:33:42 +00:00
|
|
|
#include <engine/message.h>
|
|
|
|
#include <engine/shared/protocol.h>
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2015-08-13 08:58:47 +00:00
|
|
|
const int DummyMapCrc = 0xF2774639;
|
|
|
|
static const unsigned char g_aDummyMapData[] = {0x44, 0x41, 0x54, 0x41, 0x4, 0x0, 0x0, 0x0, 0xd0, 0x0, 0x0, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5, 0xed, 0xe1, 0xc7, 0x80, 0x80, 0x80, 0x80, 0x0, 0x80, 0x80, 0x80, 0x0, 0x0, 0x5, 0x0, 0x48, 0x0, 0x0, 0x0, 0x50, 0x74, 0xae, 0x57, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff, 0xff, 0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff, 0xff, 0x0, 0x0, 0x0, 0x0, 0xe5, 0xed, 0xe1, 0xc7, 0x80, 0x80, 0x80, 0x80, 0x0, 0x80, 0x80, 0x80};
|
|
|
|
|
2015-08-12 20:43:37 +00:00
|
|
|
static SECURITY_TOKEN ToSecurityToken(const unsigned char* pData)
|
|
|
|
{
|
|
|
|
return (int)pData[0] | (pData[1] << 8) | (pData[2] << 16) | (pData[3] << 24);
|
|
|
|
}
|
|
|
|
|
2011-12-29 22:36:53 +00:00
|
|
|
bool CNetServer::Open(NETADDR BindAddr, CNetBan *pNetBan, int MaxClients, int MaxClientsPerIP, int Flags)
|
2009-10-27 14:38:53 +00:00
|
|
|
{
|
|
|
|
// zero out the whole structure
|
|
|
|
mem_zero(this, sizeof(*this));
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2009-10-27 14:38:53 +00:00
|
|
|
// open socket
|
|
|
|
m_Socket = net_udp_create(BindAddr);
|
2011-03-28 18:11:28 +00:00
|
|
|
if(!m_Socket.type)
|
2009-10-27 14:38:53 +00:00
|
|
|
return false;
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2011-12-29 22:36:53 +00:00
|
|
|
m_pNetBan = pNetBan;
|
|
|
|
|
2009-10-27 14:38:53 +00:00
|
|
|
// clamp clients
|
|
|
|
m_MaxClients = MaxClients;
|
|
|
|
if(m_MaxClients > NET_MAX_CLIENTS)
|
|
|
|
m_MaxClients = NET_MAX_CLIENTS;
|
|
|
|
if(m_MaxClients < 1)
|
|
|
|
m_MaxClients = 1;
|
2010-06-03 12:48:32 +00:00
|
|
|
|
|
|
|
m_MaxClientsPerIP = MaxClientsPerIP;
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2015-03-05 23:53:59 +00:00
|
|
|
secure_random_fill(m_SecurityTokenSeed, sizeof(m_SecurityTokenSeed));
|
|
|
|
|
2009-10-27 14:38:53 +00:00
|
|
|
for(int i = 0; i < NET_MAX_CLIENTS; i++)
|
2012-04-20 19:39:49 +00:00
|
|
|
m_aSlots[i].m_Connection.Init(m_Socket, true);
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2009-10-27 14:38:53 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
int CNetServer::SetCallbacks(NETFUNC_NEWCLIENT pfnNewClient, NETFUNC_DELCLIENT pfnDelClient, void *pUser)
|
|
|
|
{
|
|
|
|
m_pfnNewClient = pfnNewClient;
|
|
|
|
m_pfnDelClient = pfnDelClient;
|
|
|
|
m_UserPtr = pUser;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-08-13 08:58:47 +00:00
|
|
|
int CNetServer::SetCallbacks(NETFUNC_NEWCLIENT pfnNewClient, NETFUNC_NEWCLIENT_NOAUTH pfnNewClientNoAuth, NETFUNC_DELCLIENT pfnDelClient, void *pUser)
|
|
|
|
{
|
|
|
|
m_pfnNewClient = pfnNewClient;
|
|
|
|
m_pfnNewClientNoAuth = pfnNewClientNoAuth;
|
|
|
|
m_pfnDelClient = pfnDelClient;
|
|
|
|
m_UserPtr = pUser;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-10-27 14:38:53 +00:00
|
|
|
int CNetServer::Close()
|
|
|
|
{
|
2010-05-29 07:25:38 +00:00
|
|
|
// TODO: implement me
|
2009-10-27 14:38:53 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int CNetServer::Drop(int ClientID, const char *pReason)
|
|
|
|
{
|
2010-05-29 07:25:38 +00:00
|
|
|
// TODO: insert lots of checks here
|
2011-05-04 23:43:27 +00:00
|
|
|
/*NETADDR Addr = ClientAddr(ClientID);
|
2009-10-27 14:38:53 +00:00
|
|
|
|
2011-05-04 23:43:27 +00:00
|
|
|
dbg_msg("net_server", "client dropped. cid=%d ip=%d.%d.%d.%d reason=\"%s\"",
|
2009-10-27 14:38:53 +00:00
|
|
|
ClientID,
|
|
|
|
Addr.ip[0], Addr.ip[1], Addr.ip[2], Addr.ip[3],
|
|
|
|
pReason
|
2010-08-17 22:06:00 +00:00
|
|
|
);*/
|
|
|
|
if(m_pfnDelClient)
|
|
|
|
m_pfnDelClient(ClientID, pReason, m_UserPtr);
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2009-10-27 14:38:53 +00:00
|
|
|
m_aSlots[ClientID].m_Connection.Disconnect(pReason);
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2009-10-27 14:38:53 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int CNetServer::Update()
|
|
|
|
{
|
|
|
|
for(int i = 0; i < MaxClients(); i++)
|
|
|
|
{
|
|
|
|
m_aSlots[i].m_Connection.Update();
|
2014-08-09 15:25:29 +00:00
|
|
|
if(m_aSlots[i].m_Connection.State() == NET_CONNSTATE_ERROR &&
|
2014-08-09 16:08:00 +00:00
|
|
|
(!m_aSlots[i].m_Connection.m_TimeoutProtected ||
|
2014-08-11 20:22:01 +00:00
|
|
|
!m_aSlots[i].m_Connection.m_TimeoutSituation))
|
2013-09-09 19:53:13 +00:00
|
|
|
{
|
2014-08-09 13:37:10 +00:00
|
|
|
Drop(i, m_aSlots[i].m_Connection.ErrorString());
|
2013-09-09 19:53:13 +00:00
|
|
|
}
|
2009-10-27 14:38:53 +00:00
|
|
|
}
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2009-10-27 14:38:53 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-08-12 20:43:37 +00:00
|
|
|
SECURITY_TOKEN CNetServer::GetToken(const NETADDR &Addr)
|
|
|
|
{
|
|
|
|
md5_state_t md5;
|
|
|
|
md5_byte_t digest[16];
|
|
|
|
SECURITY_TOKEN SecurityToken;
|
|
|
|
md5_init(&md5);
|
|
|
|
|
|
|
|
md5_append(&md5, (unsigned char*)m_SecurityTokenSeed, sizeof(m_SecurityTokenSeed));
|
|
|
|
md5_append(&md5, (unsigned char*)&Addr, sizeof(Addr));
|
|
|
|
|
|
|
|
md5_finish(&md5, digest);
|
|
|
|
SecurityToken = *(SECURITY_TOKEN*)digest;
|
|
|
|
|
|
|
|
if (SecurityToken == NET_SECURITY_TOKEN_UNKNOWN ||
|
|
|
|
SecurityToken == NET_SECURITY_TOKEN_UNSUPPORTED)
|
|
|
|
SecurityToken = 1;
|
|
|
|
|
|
|
|
return SecurityToken;
|
|
|
|
}
|
|
|
|
|
|
|
|
void CNetServer::SendControl(NETADDR &Addr, int ControlMsg, const void *pExtra, int ExtraSize, SECURITY_TOKEN SecurityToken)
|
|
|
|
{
|
|
|
|
CNetBase::SendControlMsg(m_Socket, &Addr, 0, ControlMsg, pExtra, ExtraSize, SecurityToken);
|
|
|
|
}
|
|
|
|
|
|
|
|
int CNetServer::NumClientsWithAddr(NETADDR Addr)
|
|
|
|
{
|
|
|
|
NETADDR ThisAddr = Addr, OtherAddr;
|
|
|
|
|
|
|
|
int FoundAddr = 0;
|
|
|
|
ThisAddr.port = 0;
|
|
|
|
|
|
|
|
for(int i = 0; i < MaxClients(); ++i)
|
|
|
|
{
|
|
|
|
if(m_aSlots[i].m_Connection.State() == NET_CONNSTATE_OFFLINE)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
OtherAddr = *m_aSlots[i].m_Connection.PeerAddress();
|
|
|
|
OtherAddr.port = 0;
|
|
|
|
if(!net_addr_comp(&ThisAddr, &OtherAddr))
|
|
|
|
FoundAddr++;
|
|
|
|
}
|
|
|
|
|
|
|
|
return FoundAddr;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-08-13 08:58:47 +00:00
|
|
|
int CNetServer::TryAcceptClient(NETADDR &Addr, SECURITY_TOKEN SecurityToken, bool NoAuth)
|
2015-08-12 20:43:37 +00:00
|
|
|
{
|
2015-08-13 08:58:47 +00:00
|
|
|
if (g_Config.m_Debug)
|
|
|
|
dbg_msg("security", "try to accept client");
|
|
|
|
|
2015-08-12 20:43:37 +00:00
|
|
|
// check for sv_max_clients_per_ip
|
|
|
|
if (NumClientsWithAddr(Addr) + 1 > m_MaxClientsPerIP)
|
|
|
|
{
|
|
|
|
char aBuf[128];
|
|
|
|
str_format(aBuf, sizeof(aBuf), "Only %d players with the same IP are allowed", m_MaxClientsPerIP);
|
|
|
|
CNetBase::SendControlMsg(m_Socket, &Addr, 0, NET_CTRLMSG_CLOSE, aBuf, sizeof(aBuf), SecurityToken);
|
|
|
|
return -1; // failed to add client
|
|
|
|
}
|
|
|
|
|
|
|
|
int Slot = -1;
|
|
|
|
for(int i = 0; i < MaxClients(); i++)
|
|
|
|
{
|
|
|
|
if(m_aSlots[i].m_Connection.State() == NET_CONNSTATE_OFFLINE)
|
|
|
|
{
|
|
|
|
Slot = i;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Slot == -1)
|
|
|
|
{
|
|
|
|
const char FullMsg[] = "This server is full";
|
|
|
|
CNetBase::SendControlMsg(m_Socket, &Addr, 0, NET_CTRLMSG_CLOSE, FullMsg, sizeof(FullMsg), SecurityToken);
|
|
|
|
|
|
|
|
return -1; // failed to add client
|
|
|
|
}
|
|
|
|
|
|
|
|
// init connection slot
|
|
|
|
m_aSlots[Slot].m_Connection.DirectInit(Addr, SecurityToken);
|
|
|
|
|
2015-08-13 08:58:47 +00:00
|
|
|
if (g_Config.m_Debug)
|
|
|
|
{
|
|
|
|
char aAddrStr[NETADDR_MAXSTRSIZE];
|
|
|
|
net_addr_str(&Addr, aAddrStr, sizeof(aAddrStr), true);
|
|
|
|
dbg_msg("security", "Client accepted %s", aAddrStr);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if (NoAuth)
|
|
|
|
m_pfnNewClientNoAuth(Slot, m_UserPtr);
|
|
|
|
else
|
2015-08-12 20:43:37 +00:00
|
|
|
m_pfnNewClient(Slot, m_UserPtr);
|
|
|
|
|
|
|
|
return Slot; // done
|
|
|
|
}
|
|
|
|
|
2015-08-13 08:58:47 +00:00
|
|
|
void CNetServer::SendMsgs(NETADDR &Addr, const CMsgPacker *Msgs[], int num)
|
|
|
|
{
|
|
|
|
CNetPacketConstruct m_Construct;
|
|
|
|
mem_zero(&m_Construct, sizeof(m_Construct));
|
|
|
|
unsigned char *pChunkData = &m_Construct.m_aChunkData[m_Construct.m_DataSize];
|
|
|
|
|
|
|
|
for (int i = 0; i < num; i++)
|
|
|
|
{
|
|
|
|
const CMsgPacker *pMsg = Msgs[i];
|
|
|
|
CNetChunkHeader Header;
|
|
|
|
Header.m_Flags = 0;
|
|
|
|
Header.m_Size = pMsg->Size();
|
|
|
|
Header.m_Sequence = 0;
|
|
|
|
pChunkData = Header.Pack(pChunkData);
|
|
|
|
mem_copy(pChunkData, pMsg->Data(), pMsg->Size());
|
|
|
|
*((unsigned char*)pChunkData) <<= 1;
|
|
|
|
*((unsigned char*)pChunkData) |= 1;
|
|
|
|
pChunkData += pMsg->Size();
|
|
|
|
m_Construct.m_NumChunks++;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
m_Construct.m_DataSize = (int)(pChunkData-m_Construct.m_aChunkData);
|
|
|
|
CNetBase::SendPacket(m_Socket, &Addr, &m_Construct, GetToken(Addr));
|
|
|
|
}
|
|
|
|
|
|
|
|
// connection-less msg packet without token-support
|
|
|
|
void CNetServer::OnPreConnMsg(NETADDR &Addr, CNetPacketConstruct &Packet)
|
2015-08-12 20:43:37 +00:00
|
|
|
{
|
2015-08-13 08:58:47 +00:00
|
|
|
bool IsCtrl = Packet.m_Flags&NET_PACKETFLAG_CONTROL;
|
|
|
|
int CtrlMsg = m_RecvUnpacker.m_Data.m_aChunkData[0];
|
|
|
|
|
|
|
|
if (IsCtrl && CtrlMsg == NET_CTRLMSG_CONNECT)
|
|
|
|
{
|
|
|
|
// simulate accept
|
|
|
|
SendControl(Addr, NET_CTRLMSG_CONNECTACCEPT, SECURITY_TOKEN_MAGIC,
|
|
|
|
sizeof(SECURITY_TOKEN_MAGIC), NET_SECURITY_TOKEN_UNSUPPORTED);
|
|
|
|
|
|
|
|
// Begin vanilla compatible token handshake
|
|
|
|
// The idea is to pack a security token in the gametick
|
|
|
|
// parameter of NETMSG_SNAPEMPTY. The Client then will
|
|
|
|
// return the token/gametick in NETMSG_INPUT, allowing
|
|
|
|
// us to validate the token.
|
|
|
|
// https://github.com/eeeee/ddnet/commit/b8e40a244af4e242dc568aa34854c5754c75a39a
|
|
|
|
|
|
|
|
// Before we can send NETMSG_SNAPEMPTY, the client needs
|
|
|
|
// to load a map, otherwise it might crash. The map
|
|
|
|
// should be as small as is possible and directly available
|
|
|
|
// to the client. Therefor a dummy map is sent in the same
|
|
|
|
// packet.
|
|
|
|
|
|
|
|
// send mapchange + map data + con_ready + 3 x empty snap (with token)
|
|
|
|
CMsgPacker MapChangeMsg(NETMSG_MAP_CHANGE);
|
|
|
|
|
|
|
|
MapChangeMsg.AddString("dummy", 0);
|
|
|
|
MapChangeMsg.AddInt(DummyMapCrc);
|
|
|
|
MapChangeMsg.AddInt(sizeof(g_aDummyMapData));
|
|
|
|
|
|
|
|
CMsgPacker MapDataMsg(NETMSG_MAP_DATA);
|
|
|
|
|
|
|
|
MapDataMsg.AddInt(1); // last chunk
|
|
|
|
MapDataMsg.AddInt(DummyMapCrc); // crc
|
|
|
|
MapDataMsg.AddInt(0); // chunk index
|
|
|
|
MapDataMsg.AddInt(sizeof(g_aDummyMapData)); // map size
|
|
|
|
MapDataMsg.AddRaw(g_aDummyMapData, sizeof(g_aDummyMapData)); // map data
|
|
|
|
|
|
|
|
CMsgPacker ConReadyMsg(NETMSG_CON_READY);
|
|
|
|
|
|
|
|
CMsgPacker SnapEmptyMsg(NETMSG_SNAPEMPTY);
|
|
|
|
SECURITY_TOKEN SecurityToken = GetVanillaToken(Addr);
|
|
|
|
SnapEmptyMsg.AddInt((int)SecurityToken);
|
|
|
|
SnapEmptyMsg.AddInt((int)SecurityToken + 1);
|
|
|
|
|
|
|
|
// send all chunks/msgs in one packet
|
|
|
|
const CMsgPacker *Msgs[] = {&MapChangeMsg, &MapDataMsg, &ConReadyMsg,
|
|
|
|
&SnapEmptyMsg, &SnapEmptyMsg, &SnapEmptyMsg};
|
|
|
|
SendMsgs(Addr, Msgs, 6);
|
|
|
|
}
|
|
|
|
else if(!IsCtrl)
|
|
|
|
{
|
|
|
|
CNetChunkHeader h;
|
|
|
|
|
|
|
|
unsigned char *pData = Packet.m_aChunkData;
|
|
|
|
pData = h.Unpack(pData);
|
|
|
|
CUnpacker Unpacker;
|
|
|
|
Unpacker.Reset(pData, h.m_Size);
|
|
|
|
int Msg = Unpacker.GetInt() >> 1;
|
|
|
|
|
|
|
|
if (Msg == NETMSG_INPUT)
|
|
|
|
{
|
|
|
|
SECURITY_TOKEN SecurityToken = Unpacker.GetInt();
|
|
|
|
if (SecurityToken == GetVanillaToken(Addr))
|
|
|
|
{
|
|
|
|
if (g_Config.m_Debug)
|
|
|
|
dbg_msg("security", "token correct (vanilla handshake)");
|
|
|
|
// try to accept client skipping auth state
|
|
|
|
TryAcceptClient(Addr, NET_SECURITY_TOKEN_UNSUPPORTED, true);
|
|
|
|
}
|
|
|
|
else if (g_Config.m_Debug)
|
|
|
|
dbg_msg("security", "invalid token (vanilla handshake)");
|
|
|
|
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (g_Config.m_Debug)
|
|
|
|
{
|
|
|
|
dbg_msg("security", "invalid preconn msg %d", Msg);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-08-12 20:43:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void CNetServer::OnTokenCtrlMsg(NETADDR &Addr, int ControlMsg, const CNetPacketConstruct &Packet)
|
|
|
|
{
|
|
|
|
if (ClientExists(Addr))
|
|
|
|
return; // silently ignore
|
|
|
|
|
|
|
|
|
|
|
|
if (ControlMsg == NET_CTRLMSG_CONNECT)
|
|
|
|
{
|
|
|
|
bool SupportsToken = Packet.m_DataSize >=
|
|
|
|
(int)(1 + sizeof(SECURITY_TOKEN_MAGIC) + sizeof(SECURITY_TOKEN));
|
|
|
|
|
|
|
|
if (SupportsToken)
|
|
|
|
{
|
|
|
|
// response connection request with token
|
|
|
|
SECURITY_TOKEN Token = GetToken(Addr);
|
|
|
|
SendControl(Addr, NET_CTRLMSG_CONNECTACCEPT, SECURITY_TOKEN_MAGIC, sizeof(SECURITY_TOKEN_MAGIC), Token);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (ControlMsg == NET_CTRLMSG_ACCEPT && Packet.m_DataSize == 1 + sizeof(SECURITY_TOKEN))
|
|
|
|
{
|
|
|
|
SECURITY_TOKEN Token = ToSecurityToken(&Packet.m_aChunkData[1]);
|
|
|
|
if (Token == GetToken(Addr))
|
|
|
|
{
|
|
|
|
// correct token
|
|
|
|
// try to accept client
|
|
|
|
TryAcceptClient(Addr, Token);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// invalid token
|
|
|
|
if (g_Config.m_Debug)
|
|
|
|
dbg_msg("security", "invalid token");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CNetServer::ClientExists(const NETADDR &Addr)
|
|
|
|
{
|
|
|
|
for(int i = 0; i < MaxClients(); i++)
|
|
|
|
{
|
|
|
|
if(m_aSlots[i].m_Connection.State() != NET_CONNSTATE_OFFLINE &&
|
|
|
|
net_addr_comp(m_aSlots[i].m_Connection.PeerAddress(), &Addr) == 0)
|
|
|
|
{
|
|
|
|
// found
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// doesn't exist
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2009-10-27 14:38:53 +00:00
|
|
|
/*
|
|
|
|
TODO: chopp up this function into smaller working parts
|
|
|
|
*/
|
|
|
|
int CNetServer::Recv(CNetChunk *pChunk)
|
|
|
|
{
|
|
|
|
while(1)
|
|
|
|
{
|
|
|
|
NETADDR Addr;
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2010-05-29 07:25:38 +00:00
|
|
|
// check for a chunk
|
2009-10-27 14:38:53 +00:00
|
|
|
if(m_RecvUnpacker.FetchChunk(pChunk))
|
|
|
|
return 1;
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2010-05-29 07:25:38 +00:00
|
|
|
// TODO: empty the recvinfo
|
2009-10-27 14:38:53 +00:00
|
|
|
int Bytes = net_udp_recv(m_Socket, &Addr, m_RecvUnpacker.m_aBuffer, NET_MAX_PACKETSIZE);
|
|
|
|
|
2010-05-29 07:25:38 +00:00
|
|
|
// no more packets for now
|
2009-10-27 14:38:53 +00:00
|
|
|
if(Bytes <= 0)
|
|
|
|
break;
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2013-07-31 03:36:52 +00:00
|
|
|
// check if we just should drop the packet
|
|
|
|
char aBuf[128];
|
|
|
|
if(NetBan() && NetBan()->IsBanned(&Addr, aBuf, sizeof(aBuf)))
|
|
|
|
{
|
|
|
|
// banned, reply with a message
|
2015-03-04 08:38:34 +00:00
|
|
|
CNetBase::SendControlMsg(m_Socket, &Addr, 0, NET_CTRLMSG_CLOSE, aBuf, str_length(aBuf)+1, NET_SECURITY_TOKEN_UNSUPPORTED);
|
2013-07-31 03:36:52 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool Found = false;
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2013-07-31 03:36:52 +00:00
|
|
|
if(CNetBase::UnpackPacket(m_RecvUnpacker.m_aBuffer, Bytes, &m_RecvUnpacker.m_Data) == 0)
|
|
|
|
{
|
2009-10-27 14:38:53 +00:00
|
|
|
if(m_RecvUnpacker.m_Data.m_Flags&NET_PACKETFLAG_CONNLESS)
|
|
|
|
{
|
|
|
|
pChunk->m_Flags = NETSENDFLAG_CONNLESS;
|
|
|
|
pChunk->m_ClientID = -1;
|
|
|
|
pChunk->m_Address = Addr;
|
|
|
|
pChunk->m_DataSize = m_RecvUnpacker.m_Data.m_DataSize;
|
|
|
|
pChunk->m_pData = m_RecvUnpacker.m_Data.m_aChunkData;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
else
|
2011-04-13 18:37:12 +00:00
|
|
|
{
|
2015-08-12 20:43:37 +00:00
|
|
|
// normal packet, find matching slot
|
|
|
|
bool Found = false;
|
|
|
|
for(int i = 0; i < MaxClients(); i++)
|
2009-10-27 14:38:53 +00:00
|
|
|
{
|
2015-08-12 20:43:37 +00:00
|
|
|
if(net_addr_comp(m_aSlots[i].m_Connection.PeerAddress(), &Addr) == 0)
|
2009-10-27 14:38:53 +00:00
|
|
|
{
|
2015-08-12 20:43:37 +00:00
|
|
|
if(m_aSlots[i].m_Connection.State() == NET_CONNSTATE_OFFLINE ||
|
|
|
|
m_aSlots[i].m_Connection.State() == NET_CONNSTATE_ERROR)
|
|
|
|
continue;
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2015-08-12 20:43:37 +00:00
|
|
|
Found = true;
|
|
|
|
if(m_aSlots[i].m_Connection.Feed(&m_RecvUnpacker.m_Data, &Addr))
|
2009-10-27 14:38:53 +00:00
|
|
|
{
|
2015-08-12 20:43:37 +00:00
|
|
|
if(m_RecvUnpacker.m_Data.m_DataSize)
|
|
|
|
m_RecvUnpacker.Start(&Addr, &m_aSlots[i].m_Connection, i);
|
2009-10-27 14:38:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-08-12 20:43:37 +00:00
|
|
|
|
|
|
|
if (!Found)
|
2009-10-27 14:38:53 +00:00
|
|
|
{
|
2015-08-12 20:43:37 +00:00
|
|
|
if(m_RecvUnpacker.m_Data.m_Flags&NET_PACKETFLAG_CONTROL &&
|
|
|
|
m_RecvUnpacker.m_Data.m_DataSize > 1)
|
|
|
|
// got control msg with extra size (should support token)
|
|
|
|
OnTokenCtrlMsg(Addr, m_RecvUnpacker.m_Data.m_aChunkData[0], m_RecvUnpacker.m_Data);
|
|
|
|
else
|
|
|
|
// got connection-less ctrl or sys msg
|
|
|
|
OnPreConnMsg(Addr, m_RecvUnpacker.m_Data);
|
2009-10-27 14:38:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int CNetServer::Send(CNetChunk *pChunk)
|
|
|
|
{
|
|
|
|
if(pChunk->m_DataSize >= NET_MAX_PAYLOAD)
|
|
|
|
{
|
|
|
|
dbg_msg("netserver", "packet payload too big. %d. dropping packet", pChunk->m_DataSize);
|
|
|
|
return -1;
|
|
|
|
}
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2009-10-27 14:38:53 +00:00
|
|
|
if(pChunk->m_Flags&NETSENDFLAG_CONNLESS)
|
|
|
|
{
|
2010-05-29 07:25:38 +00:00
|
|
|
// send connectionless packet
|
2009-10-27 14:38:53 +00:00
|
|
|
CNetBase::SendPacketConnless(m_Socket, &pChunk->m_Address, pChunk->m_pData, pChunk->m_DataSize);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
int Flags = 0;
|
|
|
|
dbg_assert(pChunk->m_ClientID >= 0, "errornous client id");
|
|
|
|
dbg_assert(pChunk->m_ClientID < MaxClients(), "errornous client id");
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2009-10-27 14:38:53 +00:00
|
|
|
if(pChunk->m_Flags&NETSENDFLAG_VITAL)
|
|
|
|
Flags = NET_CHUNKFLAG_VITAL;
|
2011-04-13 18:37:12 +00:00
|
|
|
|
2010-05-29 07:25:38 +00:00
|
|
|
if(m_aSlots[pChunk->m_ClientID].m_Connection.QueueChunk(Flags, pChunk->m_DataSize, pChunk->m_pData) == 0)
|
|
|
|
{
|
|
|
|
if(pChunk->m_Flags&NETSENDFLAG_FLUSH)
|
|
|
|
m_aSlots[pChunk->m_ClientID].m_Connection.Flush();
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-11-17 01:27:28 +00:00
|
|
|
//Drop(pChunk->m_ClientID, "Error sending data");
|
2010-05-29 07:25:38 +00:00
|
|
|
}
|
2009-10-27 14:38:53 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-06-03 12:48:32 +00:00
|
|
|
void CNetServer::SetMaxClientsPerIP(int Max)
|
|
|
|
{
|
|
|
|
// clamp
|
|
|
|
if(Max < 1)
|
|
|
|
Max = 1;
|
|
|
|
else if(Max > NET_MAX_CLIENTS)
|
|
|
|
Max = NET_MAX_CLIENTS;
|
|
|
|
|
|
|
|
m_MaxClientsPerIP = Max;
|
|
|
|
}
|
2014-08-09 15:25:29 +00:00
|
|
|
|
|
|
|
bool CNetServer::SetTimedOut(int ClientID, int OrigID)
|
|
|
|
{
|
|
|
|
if (m_aSlots[ClientID].m_Connection.State() != NET_CONNSTATE_ERROR)
|
|
|
|
return false;
|
|
|
|
|
2015-03-06 06:33:01 +00:00
|
|
|
m_aSlots[ClientID].m_Connection.SetTimedOut(ClientAddr(OrigID), m_aSlots[OrigID].m_Connection.SeqSequence(), m_aSlots[OrigID].m_Connection.AckSequence(), m_aSlots[OrigID].m_Connection.SecurityToken());
|
2014-08-09 15:25:29 +00:00
|
|
|
m_aSlots[OrigID].m_Connection.Reset();
|
|
|
|
return true;
|
|
|
|
}
|
2014-08-09 16:08:00 +00:00
|
|
|
|
|
|
|
void CNetServer::SetTimeoutProtected(int ClientID)
|
|
|
|
{
|
|
|
|
m_aSlots[ClientID].m_Connection.m_TimeoutProtected = true;
|
|
|
|
}
|
2014-08-17 03:04:37 +00:00
|
|
|
|
|
|
|
int CNetServer::ResetErrorString(int ClientID)
|
|
|
|
{
|
|
|
|
m_aSlots[ClientID].m_Connection.ResetErrorString();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *CNetServer::ErrorString(int ClientID)
|
|
|
|
{
|
|
|
|
return m_aSlots[ClientID].m_Connection.ErrorString();
|
|
|
|
}
|