Files @ r25655:1030dcb7eb52
Branch filter:

Location: cpp/openttd-patchpack/source/src/network/network_udp.cpp - annotation

rubidium42
Codechange: convert printf DEBUG statements to fmt Debug statements
  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
r12768:980ae0491352
r12768:980ae0491352
r12768:980ae0491352
r12768:980ae0491352
r12768:980ae0491352
r12768:980ae0491352
r12768:980ae0491352
r6121:a8ff6abe7fb2
r6121:a8ff6abe7fb2
r6121:a8ff6abe7fb2
r6121:a8ff6abe7fb2
r6121:a8ff6abe7fb2
r6121:a8ff6abe7fb2
r6121:a8ff6abe7fb2
r5584:545d748cc681
r8140:9424f012f6a2
r8139:4fc34c1bc2fb
r14248:a9050881acd7
r25289:7c44ede418ad
r5584:545d748cc681
r10828:d8d68d002525
r5584:545d748cc681
r14248:a9050881acd7
r8132:f5cfeb0d46c0
r10208:ef8fcc3dc4ca
r23587:821735a25dec
r9451:01b0b6cc547f
r15579:ec523aee641f
r16664:0a9a4431500f
r16664:0a9a4431500f
r23586:11b470d4cee6
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r21383:942c32fb8b0e
r21383:942c32fb8b0e
r11584:8dbc3c7df3bd
r11584:8dbc3c7df3bd
r11584:8dbc3c7df3bd
r24952:3017eb59bf1a
r24952:3017eb59bf1a
r22218:6e72d9a8f3d2
r5584:545d748cc681
r25169:d36f2d41209f
r25169:d36f2d41209f
r25169:d36f2d41209f
r25169:d36f2d41209f
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25458:3aaccd46b7fa
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25458:3aaccd46b7fa
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25655:1030dcb7eb52
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r18895:278eef2e977c
r18895:278eef2e977c
r25388:32b23efdcf4e
r18895:278eef2e977c
r18895:278eef2e977c
r18895:278eef2e977c
r25388:32b23efdcf4e
r18895:278eef2e977c
r18895:278eef2e977c
r25390:7b2cc712ea32
r25396:b4291ae45d23
r18895:278eef2e977c
r18895:278eef2e977c
r25170:5ff0708cecdc
r23586:11b470d4cee6
r18895:278eef2e977c
r25388:32b23efdcf4e
r18895:278eef2e977c
r25170:5ff0708cecdc
r18895:278eef2e977c
r18895:278eef2e977c
r18895:278eef2e977c
r18895:278eef2e977c
r25388:32b23efdcf4e
r18895:278eef2e977c
r18895:278eef2e977c
r25388:32b23efdcf4e
r18895:278eef2e977c
r25388:32b23efdcf4e
r25388:32b23efdcf4e
r18895:278eef2e977c
r18895:278eef2e977c
r18895:278eef2e977c
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r17641:a80e43fd2f5e
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r23506:bba4d0c6d70d
r23506:bba4d0c6d70d
r5619:40c6c3e3d5f7
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r11606:d8d6a74590cd
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5584:545d748cc681
r17621:78f5210393b8
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r25655:1030dcb7eb52
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r11637:3f8eca297664
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r17621:78f5210393b8
r11584:8dbc3c7df3bd
r11584:8dbc3c7df3bd
r25655:1030dcb7eb52
r11584:8dbc3c7df3bd
r11584:8dbc3c7df3bd
r5619:40c6c3e3d5f7
r5584:545d748cc681
r17641:a80e43fd2f5e
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r23506:bba4d0c6d70d
r23506:bba4d0c6d70d
r23506:bba4d0c6d70d
r5619:40c6c3e3d5f7
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r11593:8dd431018ab1
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r17621:78f5210393b8
r5584:545d748cc681
r11363:6906c490a00e
r9451:01b0b6cc547f
r5584:545d748cc681
r9451:01b0b6cc547f
r9451:01b0b6cc547f
r5898:2191f99d1ffb
r25385:ad6834a4b5cc
r5584:545d748cc681
r11363:6906c490a00e
r5898:2191f99d1ffb
r5584:545d748cc681
r25655:1030dcb7eb52
r5584:545d748cc681
r5584:545d748cc681
r17621:78f5210393b8
r5584:545d748cc681
r11363:6906c490a00e
r5584:545d748cc681
r5584:545d748cc681
r5898:2191f99d1ffb
r5584:545d748cc681
r5584:545d748cc681
r5900:b72b667bb359
r11968:c7807caba8df
r5584:545d748cc681
r10457:8667446e8fd4
r10457:8667446e8fd4
r10457:8667446e8fd4
r5584:545d748cc681
r16664:0a9a4431500f
r16664:0a9a4431500f
r16664:0a9a4431500f
r16664:0a9a4431500f
r25243:8deed94703f6
r16664:0a9a4431500f
r25243:8deed94703f6
r16664:0a9a4431500f
r16664:0a9a4431500f
r16664:0a9a4431500f
r16664:0a9a4431500f
r16664:0a9a4431500f
r25243:8deed94703f6
r23953:ba75d2f3b530
r16664:0a9a4431500f
r16664:0a9a4431500f
r16664:0a9a4431500f
r25243:8deed94703f6
r25243:8deed94703f6
r16664:0a9a4431500f
r25243:8deed94703f6
r16664:0a9a4431500f
r16664:0a9a4431500f
r16664:0a9a4431500f
r16664:0a9a4431500f
r16664:0a9a4431500f
r16664:0a9a4431500f
r16664:0a9a4431500f
r10207:a1fc2f2a33db
r23953:ba75d2f3b530
r5584:545d748cc681
r16664:0a9a4431500f
r5584:545d748cc681
r5584:545d748cc681
r5898:2191f99d1ffb
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r25270:0e1af506fef0
r5584:545d748cc681
r5584:545d748cc681
r25270:0e1af506fef0
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r17621:78f5210393b8
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r9146:d873efafcd56
r5584:545d748cc681
r25655:1030dcb7eb52
r5584:545d748cc681
r5900:b72b667bb359
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r14690:62b9ac91fd94
r5584:545d748cc681
r5584:545d748cc681
r25289:7c44ede418ad
r5584:545d748cc681
r5584:545d748cc681
r16246:b0e8840a555e
r23607:36c15679007d
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r14690:62b9ac91fd94
r24597:afde5721a3b6
r25270:0e1af506fef0
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5898:2191f99d1ffb
r5900:b72b667bb359
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r14701:3d820af7badc
r25289:7c44ede418ad
r5900:b72b667bb359
r5584:545d748cc681
r5584:545d748cc681
r5898:2191f99d1ffb
r5584:545d748cc681
r5584:545d748cc681
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r17641:a80e43fd2f5e
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r23506:bba4d0c6d70d
r23506:bba4d0c6d70d
r23506:bba4d0c6d70d
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r17621:78f5210393b8
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r11363:6906c490a00e
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r25655:1030dcb7eb52
r5619:40c6c3e3d5f7
r11363:6906c490a00e
r25388:32b23efdcf4e
r5619:40c6c3e3d5f7
r25292:6323f849890a
r14186:5477bcdd03f5
r25292:6323f849890a
r25289:7c44ede418ad
r25292:6323f849890a
r25292:6323f849890a
r25292:6323f849890a
r25292:6323f849890a
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r23607:36c15679007d
r14701:3d820af7badc
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5898:2191f99d1ffb
r5619:40c6c3e3d5f7
r5900:b72b667bb359
r5619:40c6c3e3d5f7
r25289:7c44ede418ad
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r25388:32b23efdcf4e
r25388:32b23efdcf4e
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r11611:ffe270ad19c0
r25396:b4291ae45d23
r11611:ffe270ad19c0
r5619:40c6c3e3d5f7
r19182:8f0b5a1acb1c
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r17621:78f5210393b8
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r11604:033abec750d4
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r11604:033abec750d4
r5619:40c6c3e3d5f7
r11604:033abec750d4
r10822:adfba97cb1d1
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r11611:ffe270ad19c0
r5624:8f8d1f8d3a74
r5624:8f8d1f8d3a74
r5624:8f8d1f8d3a74
r11611:ffe270ad19c0
r25388:32b23efdcf4e
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r5584:545d748cc681
r17621:78f5210393b8
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r25655:1030dcb7eb52
r5584:545d748cc681
r5900:b72b667bb359
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r14690:62b9ac91fd94
r5584:545d748cc681
r25289:7c44ede418ad
r25621:b453557b6e79
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r25621:b453557b6e79
r5584:545d748cc681
r17403:bbaee031fd60
r5584:545d748cc681
r5584:545d748cc681
r24209:155ba259d4af
r24209:155ba259d4af
r24209:155ba259d4af
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r17641:a80e43fd2f5e
r5619:40c6c3e3d5f7
r5584:545d748cc681
r23536:ce42deb0b32d
r5898:2191f99d1ffb
r5584:545d748cc681
r25655:1030dcb7eb52
r5584:545d748cc681
r23536:ce42deb0b32d
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r17641:a80e43fd2f5e
r6247:96e840dbefcc
r5584:545d748cc681
r5898:2191f99d1ffb
r11545:27d3f758c0c0
r5584:545d748cc681
r11363:6906c490a00e
r5900:b72b667bb359
r11604:033abec750d4
r5584:545d748cc681
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r5584:545d748cc681
r25655:1030dcb7eb52
r5584:545d748cc681
r5584:545d748cc681
r17641:a80e43fd2f5e
r6247:96e840dbefcc
r5584:545d748cc681
r11363:6906c490a00e
r5584:545d748cc681
r5584:545d748cc681
r25655:1030dcb7eb52
r5584:545d748cc681
r25170:5ff0708cecdc
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r23587:821735a25dec
r5584:545d748cc681
r25655:1030dcb7eb52
r5584:545d748cc681
r5584:545d748cc681
r11545:27d3f758c0c0
r5584:545d748cc681
r5584:545d748cc681
r5898:2191f99d1ffb
r5584:545d748cc681
r5900:b72b667bb359
r9420:7c6f91f6791c
r10824:4036289a0b3d
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r10824:4036289a0b3d
r10824:4036289a0b3d
r11637:3f8eca297664
r11637:3f8eca297664
r11637:3f8eca297664
r11637:3f8eca297664
r11637:3f8eca297664
r10824:4036289a0b3d
r10824:4036289a0b3d
r10824:4036289a0b3d
r10824:4036289a0b3d
r23607:36c15679007d
r23587:821735a25dec
r10824:4036289a0b3d
r10824:4036289a0b3d
r10824:4036289a0b3d
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r23587:821735a25dec
r10824:4036289a0b3d
r10824:4036289a0b3d
r11545:27d3f758c0c0
r10824:4036289a0b3d
r25655:1030dcb7eb52
r10824:4036289a0b3d
r11843:07fb5d356fc9
r11843:07fb5d356fc9
r11843:07fb5d356fc9
r25655:1030dcb7eb52
r25655:1030dcb7eb52
r25655:1030dcb7eb52
r25655:1030dcb7eb52
r11843:07fb5d356fc9
r11843:07fb5d356fc9
r25655:1030dcb7eb52
r25655:1030dcb7eb52
r25655:1030dcb7eb52
r25655:1030dcb7eb52
r25655:1030dcb7eb52
r11843:07fb5d356fc9
r11843:07fb5d356fc9
r10824:4036289a0b3d
r10824:4036289a0b3d
r10824:4036289a0b3d
r10824:4036289a0b3d
r10824:4036289a0b3d
r10824:4036289a0b3d
r11584:8dbc3c7df3bd
r10824:4036289a0b3d
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r5584:545d748cc681
r5584:545d748cc681
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r17641:a80e43fd2f5e
r6247:96e840dbefcc
r5584:545d748cc681
r24952:3017eb59bf1a
r22218:6e72d9a8f3d2
r5584:545d748cc681
r15542:f6c6d0f8689e
r5584:545d748cc681
r24952:3017eb59bf1a
r24952:3017eb59bf1a
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r24952:3017eb59bf1a
r15542:f6c6d0f8689e
r5584:545d748cc681
r22218:6e72d9a8f3d2
r22218:6e72d9a8f3d2
r24952:3017eb59bf1a
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r24952:3017eb59bf1a
r5584:545d748cc681
r23607:36c15679007d
r23587:821735a25dec
r10824:4036289a0b3d
r5584:545d748cc681
r5584:545d748cc681
r17641:a80e43fd2f5e
r6247:96e840dbefcc
r5584:545d748cc681
r11608:fbeed55c850b
r25170:5ff0708cecdc
r11608:fbeed55c850b
r25655:1030dcb7eb52
r25170:5ff0708cecdc
r10476:e0a6350eb358
r25170:5ff0708cecdc
r11593:8dd431018ab1
r25170:5ff0708cecdc
r11629:97018c71b598
r11593:8dd431018ab1
r11629:97018c71b598
r25170:5ff0708cecdc
r11606:d8d6a74590cd
r23517:1a32c3c14728
r11629:97018c71b598
r25170:5ff0708cecdc
r5584:545d748cc681
r5584:545d748cc681
r5584:545d748cc681
r25169:d36f2d41209f
r25169:d36f2d41209f
r25169:d36f2d41209f
r25169:d36f2d41209f
r25169:d36f2d41209f
r25169:d36f2d41209f
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r5584:545d748cc681
r5584:545d748cc681
r17641:a80e43fd2f5e
r11606:d8d6a74590cd
r5619:40c6c3e3d5f7
r25458:3aaccd46b7fa
r25458:3aaccd46b7fa
r25458:3aaccd46b7fa
r11606:d8d6a74590cd
r11606:d8d6a74590cd
r11606:d8d6a74590cd
r25655:1030dcb7eb52
r5619:40c6c3e3d5f7
r5619:40c6c3e3d5f7
r18892:ba984148392c
r18892:ba984148392c
r18892:ba984148392c
r18892:ba984148392c
r25170:5ff0708cecdc
r25170:5ff0708cecdc
r18892:ba984148392c
r25170:5ff0708cecdc
r18892:ba984148392c
r18892:ba984148392c
r18892:ba984148392c
/*
 * This file is part of OpenTTD.
 * OpenTTD is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 2.
 * OpenTTD is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
 * See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with OpenTTD. If not, see <http://www.gnu.org/licenses/>.
 */

/**
 * @file network_udp.cpp This file handles the UDP related communication.
 *
 * This is the GameServer <-> MasterServer and GameServer <-> GameClient
 * communication before the game is being joined.
 */

#include "../stdafx.h"
#include "../date_func.h"
#include "../map_func.h"
#include "../debug.h"
#include "core/game_info.h"
#include "network_gamelist.h"
#include "network_internal.h"
#include "network_udp.h"
#include "network.h"
#include "../core/endian_func.hpp"
#include "../company_base.h"
#include "../thread.h"
#include "../rev.h"
#include "../newgrf_text.h"
#include "../strings_func.h"
#include "table/strings.h"
#include <mutex>

#include "core/udp.h"

#include "../safeguards.h"

/** Session key to register ourselves to the master server */
static uint64 _session_key = 0;

static const std::chrono::minutes ADVERTISE_NORMAL_INTERVAL(15); ///< interval between advertising.
static const std::chrono::seconds ADVERTISE_RETRY_INTERVAL(10); ///< re-advertise when no response after this amount of time.
static const uint32 ADVERTISE_RETRY_TIMES     =              3; ///< give up re-advertising after this much failed retries

static bool _network_udp_server;         ///< Is the UDP server started?
static uint16 _network_udp_broadcast;    ///< Timeout for the UDP broadcasts.
static uint8 _network_advertise_retries; ///< The number of advertisement retries we did.

/** Some information about a socket, which exists before the actual socket has been created to provide locking and the likes. */
struct UDPSocket {
	const std::string name;                     ///< The name of the socket.
	std::mutex mutex;                           ///< Mutex for everything that (indirectly) touches the sockets within the handler.
	NetworkUDPSocketHandler *socket;            ///< The actual socket, which may be nullptr when not initialized yet.
	std::atomic<int> receive_iterations_locked; ///< The number of receive iterations the mutex was locked.

	UDPSocket(const std::string &name_) : name(name_), socket(nullptr) {}

	void CloseSocket()
	{
		std::lock_guard<std::mutex> lock(mutex);
		socket->CloseSocket();
		delete socket;
		socket = nullptr;
	}

	void ReceivePackets()
	{
		std::unique_lock<std::mutex> lock(mutex, std::defer_lock);
		if (!lock.try_lock()) {
			if (++receive_iterations_locked % 32 == 0) {
				Debug(net, 0, "{} background UDP loop processing appears to be blocked. Your OS may be low on UDP send buffers.", name);
			}
			return;
		}

		receive_iterations_locked.store(0);
		socket->ReceivePackets();
	}
};

static UDPSocket _udp_client("Client"); ///< udp client socket
static UDPSocket _udp_server("Server"); ///< udp server socket
static UDPSocket _udp_master("Master"); ///< udp master socket

/**
 * Helper function doing the actual work for querying the server.
 * @param connection_string The address of the server.
 * @param needs_mutex Whether we need to acquire locks when sending the packet or not.
 * @param manually Whether the address was entered manually.
 */
static void DoNetworkUDPQueryServer(const std::string &connection_string, bool needs_mutex, bool manually)
{
	/* Clear item in gamelist */
	NetworkGameList *item = new NetworkGameList(connection_string, manually);
	item->info.server_name = connection_string;
	NetworkGameListAddItemDelayed(item);

	std::unique_lock<std::mutex> lock(_udp_client.mutex, std::defer_lock);
	if (needs_mutex) lock.lock();
	/* Init the packet */
	NetworkAddress address = NetworkAddress(ParseConnectionString(connection_string, NETWORK_DEFAULT_PORT));
	Packet p(PACKET_UDP_CLIENT_FIND_SERVER);
	if (_udp_client.socket != nullptr) _udp_client.socket->SendPacket(&p, &address);
}

/**
 * Query a specific server.
 * @param connection_string The address of the server.
 * @param manually Whether the address was entered manually.
 */
void NetworkUDPQueryServer(const std::string &connection_string, bool manually)
{
	if (!StartNewThread(nullptr, "ottd:udp-query", &DoNetworkUDPQueryServer, std::move(connection_string), true, std::move(manually))) {
		DoNetworkUDPQueryServer(connection_string, true, manually);
	}
}

///*** Communication with the masterserver ***/

/** Helper class for connecting to the master server. */
class MasterNetworkUDPSocketHandler : public NetworkUDPSocketHandler {
protected:
	void Receive_MASTER_ACK_REGISTER(Packet *p, NetworkAddress *client_addr) override;
	void Receive_MASTER_SESSION_KEY(Packet *p, NetworkAddress *client_addr) override;
public:
	/**
	 * Create the socket.
	 * @param addresses The addresses to bind on.
	 */
	MasterNetworkUDPSocketHandler(NetworkAddressList *addresses) : NetworkUDPSocketHandler(addresses) {}
	virtual ~MasterNetworkUDPSocketHandler() {}
};

void MasterNetworkUDPSocketHandler::Receive_MASTER_ACK_REGISTER(Packet *p, NetworkAddress *client_addr)
{
	_network_advertise_retries = 0;
	Debug(net, 3, "Advertising on master server successful ({})", NetworkAddress::AddressFamilyAsString(client_addr->GetAddress()->ss_family));

	/* We are advertised, but we don't want to! */
	if (!_settings_client.network.server_advertise) NetworkUDPRemoveAdvertise(false);
}

void MasterNetworkUDPSocketHandler::Receive_MASTER_SESSION_KEY(Packet *p, NetworkAddress *client_addr)
{
	_session_key = p->Recv_uint64();
	Debug(net, 6, "Received new session key from master server ({})", NetworkAddress::AddressFamilyAsString(client_addr->GetAddress()->ss_family));
}

///*** Communication with clients (we are server) ***/

/** Helper class for handling all server side communication. */
class ServerNetworkUDPSocketHandler : public NetworkUDPSocketHandler {
protected:
	void Receive_CLIENT_FIND_SERVER(Packet *p, NetworkAddress *client_addr) override;
	void Receive_CLIENT_DETAIL_INFO(Packet *p, NetworkAddress *client_addr) override;
	void Receive_CLIENT_GET_NEWGRFS(Packet *p, NetworkAddress *client_addr) override;
public:
	/**
	 * Create the socket.
	 * @param addresses The addresses to bind on.
	 */
	ServerNetworkUDPSocketHandler(NetworkAddressList *addresses) : NetworkUDPSocketHandler(addresses) {}
	virtual ~ServerNetworkUDPSocketHandler() {}
};

void ServerNetworkUDPSocketHandler::Receive_CLIENT_FIND_SERVER(Packet *p, NetworkAddress *client_addr)
{
	/* Just a fail-safe.. should never happen */
	if (!_network_udp_server) {
		return;
	}

	Packet packet(PACKET_UDP_SERVER_RESPONSE);
	SerializeNetworkGameInfo(&packet, GetCurrentNetworkServerGameInfo());

	/* Let the client know that we are here */
	this->SendPacket(&packet, client_addr);

	Debug(net, 7, "Queried from {}", client_addr->GetHostname());
}

void ServerNetworkUDPSocketHandler::Receive_CLIENT_DETAIL_INFO(Packet *p, NetworkAddress *client_addr)
{
	/* Just a fail-safe.. should never happen */
	if (!_network_udp_server) return;

	Packet packet(PACKET_UDP_SERVER_DETAIL_INFO);

	/* Send the amount of active companies */
	packet.Send_uint8 (NETWORK_COMPANY_INFO_VERSION);
	packet.Send_uint8 ((uint8)Company::GetNumItems());

	/* Fetch the latest version of the stats */
	NetworkCompanyStats company_stats[MAX_COMPANIES];
	NetworkPopulateCompanyStats(company_stats);

	/* The minimum company information "blob" size. */
	static const uint MIN_CI_SIZE = 54;
	uint max_cname_length = NETWORK_COMPANY_NAME_LENGTH;

	if (!packet.CanWriteToPacket(Company::GetNumItems() * (MIN_CI_SIZE + NETWORK_COMPANY_NAME_LENGTH))) {
		/* Assume we can at least put the company information in the packets. */
		assert(packet.CanWriteToPacket(Company::GetNumItems() * MIN_CI_SIZE));

		/* At this moment the company names might not fit in the
		 * packet. Check whether that is really the case. */

		for (;;) {
			size_t required = 0;
			for (const Company *company : Company::Iterate()) {
				char company_name[NETWORK_COMPANY_NAME_LENGTH];
				SetDParam(0, company->index);
				GetString(company_name, STR_COMPANY_NAME, company_name + max_cname_length - 1);
				required += MIN_CI_SIZE;
				required += strlen(company_name);
			}
			if (packet.CanWriteToPacket(required)) break;

			/* Try again, with slightly shorter strings. */
			assert(max_cname_length > 0);
			max_cname_length--;
		}
	}

	/* Go through all the companies */
	for (const Company *company : Company::Iterate()) {
		/* Send the information */
		this->SendCompanyInformation(&packet, company, &company_stats[company->index], max_cname_length);
	}

	this->SendPacket(&packet, client_addr);
}

/**
 * A client has requested the names of some NewGRFs.
 *
 * Replying this can be tricky as we have a limit of UDP_MTU bytes
 * in the reply packet and we can send up to 100 bytes per NewGRF
 * (GRF ID, MD5sum and NETWORK_GRF_NAME_LENGTH bytes for the name).
 * As UDP_MTU is _much_ less than 100 * NETWORK_MAX_GRF_COUNT, it
 * could be that a packet overflows. To stop this we only reply
 * with the first N NewGRFs so that if the first N + 1 NewGRFs
 * would be sent, the packet overflows.
 * in_reply and in_reply_count are used to keep a list of GRFs to
 * send in the reply.
 */
void ServerNetworkUDPSocketHandler::Receive_CLIENT_GET_NEWGRFS(Packet *p, NetworkAddress *client_addr)
{
	uint8 num_grfs;
	uint i;

	const GRFConfig *in_reply[NETWORK_MAX_GRF_COUNT];
	uint8 in_reply_count = 0;
	size_t packet_len = 0;

	Debug(net, 7, "NewGRF data request from {}", client_addr->GetAddressAsString());

	num_grfs = p->Recv_uint8 ();
	if (num_grfs > NETWORK_MAX_GRF_COUNT) return;

	for (i = 0; i < num_grfs; i++) {
		GRFIdentifier c;
		const GRFConfig *f;

		DeserializeGRFIdentifier(p, &c);

		/* Find the matching GRF file */
		f = FindGRFConfig(c.grfid, FGCM_EXACT, c.md5sum);
		if (f == nullptr) continue; // The GRF is unknown to this server

		/* If the reply might exceed the size of the packet, only reply
		 * the current list and do not send the other data.
		 * The name could be an empty string, if so take the filename. */
		packet_len += sizeof(c.grfid) + sizeof(c.md5sum) +
				std::min(strlen(f->GetName()) + 1, (size_t)NETWORK_GRF_NAME_LENGTH);
		if (packet_len > UDP_MTU - 4) { // 4 is 3 byte header + grf count in reply
			break;
		}
		in_reply[in_reply_count] = f;
		in_reply_count++;
	}

	if (in_reply_count == 0) return;

	Packet packet(PACKET_UDP_SERVER_NEWGRFS);
	packet.Send_uint8(in_reply_count);
	for (i = 0; i < in_reply_count; i++) {
		char name[NETWORK_GRF_NAME_LENGTH];

		/* The name could be an empty string, if so take the filename */
		strecpy(name, in_reply[i]->GetName(), lastof(name));
		SerializeGRFIdentifier(&packet, &in_reply[i]->ident);
		packet.Send_string(name);
	}

	this->SendPacket(&packet, client_addr);
}

///*** Communication with servers (we are client) ***/

/** Helper class for handling all client side communication. */
class ClientNetworkUDPSocketHandler : public NetworkUDPSocketHandler {
protected:
	void Receive_SERVER_RESPONSE(Packet *p, NetworkAddress *client_addr) override;
	void Receive_MASTER_RESPONSE_LIST(Packet *p, NetworkAddress *client_addr) override;
	void Receive_SERVER_NEWGRFS(Packet *p, NetworkAddress *client_addr) override;
public:
	virtual ~ClientNetworkUDPSocketHandler() {}
};

void ClientNetworkUDPSocketHandler::Receive_SERVER_RESPONSE(Packet *p, NetworkAddress *client_addr)
{
	NetworkGameList *item;

	/* Just a fail-safe.. should never happen */
	if (_network_udp_server) return;

	Debug(net, 3, "Server response from {}", client_addr->GetAddressAsString());

	/* Find next item */
	item = NetworkGameListAddItem(client_addr->GetAddressAsString(false));

	/* Clear any existing GRFConfig chain. */
	ClearGRFConfigList(&item->info.grfconfig);
	/* Retrieve the NetworkGameInfo from the packet. */
	DeserializeNetworkGameInfo(p, &item->info);
	/* Check for compatability with the client. */
	CheckGameCompatibility(item->info);
	/* Ensure we consider the server online. */
	item->online = true;

	{
		/* Checks whether there needs to be a request for names of GRFs and makes
		 * the request if necessary. GRFs that need to be requested are the GRFs
		 * that do not exist on the clients system and we do not have the name
		 * resolved of, i.e. the name is still UNKNOWN_GRF_NAME_PLACEHOLDER.
		 * The in_request array and in_request_count are used so there is no need
		 * to do a second loop over the GRF list, which can be relatively expensive
		 * due to the string comparisons. */
		const GRFConfig *in_request[NETWORK_MAX_GRF_COUNT];
		const GRFConfig *c;
		uint in_request_count = 0;

		for (c = item->info.grfconfig; c != nullptr; c = c->next) {
			if (c->status != GCS_NOT_FOUND || strcmp(c->GetName(), UNKNOWN_GRF_NAME_PLACEHOLDER) != 0) continue;
			in_request[in_request_count] = c;
			in_request_count++;
		}

		if (in_request_count > 0) {
			/* There are 'unknown' GRFs, now send a request for them */
			uint i;
			Packet packet(PACKET_UDP_CLIENT_GET_NEWGRFS);

			packet.Send_uint8(in_request_count);
			for (i = 0; i < in_request_count; i++) {
				SerializeGRFIdentifier(&packet, &in_request[i]->ident);
			}

			NetworkAddress address = NetworkAddress(ParseConnectionString(item->connection_string, NETWORK_DEFAULT_PORT));
			this->SendPacket(&packet, &address);
		}
	}

	if (client_addr->GetAddress()->ss_family == AF_INET6) {
		item->info.server_name.append(" (IPv6)");
	}

	UpdateNetworkGameWindow();
}

void ClientNetworkUDPSocketHandler::Receive_MASTER_RESPONSE_LIST(Packet *p, NetworkAddress *client_addr)
{
	/* packet begins with the protocol version (uint8)
	 * then an uint16 which indicates how many
	 * ip:port pairs are in this packet, after that
	 * an uint32 (ip) and an uint16 (port) for each pair.
	 */

	ServerListType type = (ServerListType)(p->Recv_uint8() - 1);

	if (type < SLT_END) {
		for (int i = p->Recv_uint16(); i != 0 ; i--) {
			sockaddr_storage addr_storage;
			memset(&addr_storage, 0, sizeof(addr_storage));

			if (type == SLT_IPv4) {
				addr_storage.ss_family = AF_INET;
				((sockaddr_in*)&addr_storage)->sin_addr.s_addr = TO_LE32(p->Recv_uint32());
			} else {
				assert(type == SLT_IPv6);
				addr_storage.ss_family = AF_INET6;
				byte *addr = (byte*)&((sockaddr_in6*)&addr_storage)->sin6_addr;
				for (uint i = 0; i < sizeof(in6_addr); i++) *addr++ = p->Recv_uint8();
			}
			NetworkAddress addr(addr_storage, type == SLT_IPv4 ? sizeof(sockaddr_in) : sizeof(sockaddr_in6));
			addr.SetPort(p->Recv_uint16());

			/* Somehow we reached the end of the packet */
			if (this->HasClientQuit()) return;

			DoNetworkUDPQueryServer(addr.GetAddressAsString(false), false, false);
		}
	}
}

/** The return of the client's request of the names of some NewGRFs */
void ClientNetworkUDPSocketHandler::Receive_SERVER_NEWGRFS(Packet *p, NetworkAddress *client_addr)
{
	uint8 num_grfs;
	uint i;

	Debug(net, 7, "NewGRF data reply from {}", client_addr->GetAddressAsString());

	num_grfs = p->Recv_uint8 ();
	if (num_grfs > NETWORK_MAX_GRF_COUNT) return;

	for (i = 0; i < num_grfs; i++) {
		GRFIdentifier c;

		DeserializeGRFIdentifier(p, &c);
		std::string name = p->Recv_string(NETWORK_GRF_NAME_LENGTH);

		/* An empty name is not possible under normal circumstances
		 * and causes problems when showing the NewGRF list. */
		if (name.empty()) continue;

		/* Try to find the GRFTextWrapper for the name of this GRF ID and MD5sum tuple.
		 * If it exists and not resolved yet, then name of the fake GRF is
		 * overwritten with the name from the reply. */
		GRFTextWrapper unknown_name = FindUnknownGRFName(c.grfid, c.md5sum, false);
		if (unknown_name && strcmp(GetGRFStringFromGRFText(unknown_name), UNKNOWN_GRF_NAME_PLACEHOLDER) == 0) {
			AddGRFTextToList(unknown_name, name);
		}
	}
}

/** Broadcast to all ips */
static void NetworkUDPBroadCast(NetworkUDPSocketHandler *socket)
{
	for (NetworkAddress &addr : _broadcast_list) {
		Packet p(PACKET_UDP_CLIENT_FIND_SERVER);

		Debug(net, 5, "Broadcasting to {}", addr.GetHostname());

		socket->SendPacket(&p, &addr, true, true);
	}
}


/** Request the the server-list from the master server */
void NetworkUDPQueryMasterServer()
{
	Packet p(PACKET_UDP_CLIENT_GET_LIST);
	NetworkAddress out_addr(NETWORK_MASTER_SERVER_HOST, NETWORK_MASTER_SERVER_PORT);

	/* packet only contains protocol version */
	p.Send_uint8(NETWORK_MASTER_SERVER_VERSION);
	p.Send_uint8(SLT_AUTODETECT);

	std::lock_guard<std::mutex> lock(_udp_client.mutex);
	_udp_client.socket->SendPacket(&p, &out_addr, true);

	Debug(net, 6, "Master server queried at {}", out_addr.GetAddressAsString());
}

/** Find all servers */
void NetworkUDPSearchGame()
{
	/* We are still searching.. */
	if (_network_udp_broadcast > 0) return;

	Debug(net, 3, "Searching server");

	NetworkUDPBroadCast(_udp_client.socket);
	_network_udp_broadcast = 300; // Stay searching for 300 ticks
}

/**
 * Thread entry point for de-advertising.
 */
static void NetworkUDPRemoveAdvertiseThread()
{
	Debug(net, 3, "Removing advertise from master server");

	/* Find somewhere to send */
	NetworkAddress out_addr(NETWORK_MASTER_SERVER_HOST, NETWORK_MASTER_SERVER_PORT);

	/* Send the packet */
	Packet p(PACKET_UDP_SERVER_UNREGISTER);
	/* Packet is: Version, server_port */
	p.Send_uint8 (NETWORK_MASTER_SERVER_VERSION);
	p.Send_uint16(_settings_client.network.server_port);

	std::lock_guard<std::mutex> lock(_udp_master.mutex);
	if (_udp_master.socket != nullptr) _udp_master.socket->SendPacket(&p, &out_addr, true);
}

/**
 * Remove our advertise from the master-server.
 * @param blocking whether to wait until the removal has finished.
 */
void NetworkUDPRemoveAdvertise(bool blocking)
{
	/* Check if we are advertising */
	if (!_networking || !_network_server || !_network_udp_server) return;

	if (blocking || !StartNewThread(nullptr, "ottd:udp-advert", &NetworkUDPRemoveAdvertiseThread)) {
		NetworkUDPRemoveAdvertiseThread();
	}
}

/**
 * Thread entry point for advertising.
 */
static void NetworkUDPAdvertiseThread()
{
	/* Find somewhere to send */
	NetworkAddress out_addr(NETWORK_MASTER_SERVER_HOST, NETWORK_MASTER_SERVER_PORT);

	Debug(net, 3, "Advertising to master server");

	/* Add a bit more messaging when we cannot get a session key */
	static byte session_key_retries = 0;
	if (_session_key == 0 && session_key_retries++ == 2) {
		Debug(net, 0, "Advertising to the master server is failing");
		Debug(net, 0, "  we are not receiving the session key from the server");
		Debug(net, 0, "  please allow udp packets from {} to you to be delivered", out_addr.GetAddressAsString(false));
		Debug(net, 0, "  please allow udp packets from you to {} to be delivered", out_addr.GetAddressAsString(false));
	}
	if (_session_key != 0 && _network_advertise_retries == 0) {
		Debug(net, 0, "Advertising to the master server is failing");
		Debug(net, 0, "  we are not receiving the acknowledgement from the server");
		Debug(net, 0, "  this usually means that the master server cannot reach us");
		Debug(net, 0, "  please allow udp and tcp packets to port {} to be delivered", _settings_client.network.server_port);
		Debug(net, 0, "  please allow udp and tcp packets from port {} to be delivered", _settings_client.network.server_port);
	}

	/* Send the packet */
	Packet p(PACKET_UDP_SERVER_REGISTER);
	/* Packet is: WELCOME_MESSAGE, Version, server_port */
	p.Send_string(NETWORK_MASTER_SERVER_WELCOME_MESSAGE);
	p.Send_uint8 (NETWORK_MASTER_SERVER_VERSION);
	p.Send_uint16(_settings_client.network.server_port);
	p.Send_uint64(_session_key);

	std::lock_guard<std::mutex> lock(_udp_master.mutex);
	if (_udp_master.socket != nullptr) _udp_master.socket->SendPacket(&p, &out_addr, true);
}

/**
 * Register us to the master server
 *   This function checks if it needs to send an advertise
 */
void NetworkUDPAdvertise()
{
	static std::chrono::steady_clock::time_point _last_advertisement = {}; ///< The last time we performed an advertisement.

	/* Check if we should send an advertise */
	if (!_networking || !_network_server || !_network_udp_server || !_settings_client.network.server_advertise) return;

	if (_network_need_advertise) {
		/* Forced advertisement. */
		_network_need_advertise = false;
		_network_advertise_retries = ADVERTISE_RETRY_TIMES;
	} else {
		/* Only send once every ADVERTISE_NORMAL_INTERVAL ticks */
		if (_network_advertise_retries == 0) {
			if (std::chrono::steady_clock::now() <= _last_advertisement + ADVERTISE_NORMAL_INTERVAL) return;

			_network_advertise_retries = ADVERTISE_RETRY_TIMES;
		} else {
			/* An actual retry. */
			if (std::chrono::steady_clock::now() <= _last_advertisement + ADVERTISE_RETRY_INTERVAL) return;
		}
	}

	_network_advertise_retries--;
	_last_advertisement = std::chrono::steady_clock::now();

	if (!StartNewThread(nullptr, "ottd:udp-advert", &NetworkUDPAdvertiseThread)) {
		NetworkUDPAdvertiseThread();
	}
}

/** Initialize the whole UDP bit. */
void NetworkUDPInitialize()
{
	/* If not closed, then do it. */
	if (_udp_server.socket != nullptr) NetworkUDPClose();

	Debug(net, 3, "Initializing UDP listeners");
	assert(_udp_client.socket == nullptr && _udp_server.socket == nullptr && _udp_master.socket == nullptr);

	std::scoped_lock lock(_udp_client.mutex, _udp_server.mutex, _udp_master.mutex);

	_udp_client.socket = new ClientNetworkUDPSocketHandler();

	NetworkAddressList server;
	GetBindAddresses(&server, _settings_client.network.server_port);
	_udp_server.socket = new ServerNetworkUDPSocketHandler(&server);

	server.clear();
	GetBindAddresses(&server, 0);
	_udp_master.socket = new MasterNetworkUDPSocketHandler(&server);

	_network_udp_server = false;
	_network_udp_broadcast = 0;
	_network_advertise_retries = 0;
}

/** Start the listening of the UDP server component. */
void NetworkUDPServerListen()
{
	std::lock_guard<std::mutex> lock(_udp_server.mutex);
	_network_udp_server = _udp_server.socket->Listen();
}

/** Close all UDP related stuff. */
void NetworkUDPClose()
{
	_udp_client.CloseSocket();
	_udp_server.CloseSocket();
	_udp_master.CloseSocket();

	_network_udp_server = false;
	_network_udp_broadcast = 0;
	Debug(net, 5, "Closed UDP listeners");
}

/** Receive the UDP packets. */
void NetworkBackgroundUDPLoop()
{
	if (_network_udp_server) {
		_udp_server.ReceivePackets();
		_udp_master.ReceivePackets();
	} else {
		_udp_client.ReceivePackets();
		if (_network_udp_broadcast > 0) _network_udp_broadcast--;
	}
}