Files
@ r25655:1030dcb7eb52
Branch filter:
Location: cpp/openttd-patchpack/source/src/network/network_udp.cpp - annotation
r25655:1030dcb7eb52
22.1 KiB
text/x-c
Codechange: convert printf DEBUG statements to fmt Debug statements
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 | r12768:980ae0491352 r12768:980ae0491352 r12768:980ae0491352 r12768:980ae0491352 r12768:980ae0491352 r12768:980ae0491352 r12768:980ae0491352 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r5584:545d748cc681 r8140:9424f012f6a2 r8139:4fc34c1bc2fb r14248:a9050881acd7 r25289:7c44ede418ad r5584:545d748cc681 r10828:d8d68d002525 r5584:545d748cc681 r14248:a9050881acd7 r8132:f5cfeb0d46c0 r10208:ef8fcc3dc4ca r23587:821735a25dec r9451:01b0b6cc547f r15579:ec523aee641f r16664:0a9a4431500f r16664:0a9a4431500f r23586:11b470d4cee6 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r21383:942c32fb8b0e r21383:942c32fb8b0e r11584:8dbc3c7df3bd r11584:8dbc3c7df3bd r11584:8dbc3c7df3bd r24952:3017eb59bf1a r24952:3017eb59bf1a r22218:6e72d9a8f3d2 r5584:545d748cc681 r25169:d36f2d41209f r25169:d36f2d41209f r25169:d36f2d41209f r25169:d36f2d41209f r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25458:3aaccd46b7fa r25170:5ff0708cecdc r25170:5ff0708cecdc r25458:3aaccd46b7fa r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25655:1030dcb7eb52 r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r25170:5ff0708cecdc r18895:278eef2e977c r18895:278eef2e977c r25388:32b23efdcf4e r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r25388:32b23efdcf4e r18895:278eef2e977c r18895:278eef2e977c r25390:7b2cc712ea32 r25396:b4291ae45d23 r18895:278eef2e977c r18895:278eef2e977c r25170:5ff0708cecdc r23586:11b470d4cee6 r18895:278eef2e977c r25388:32b23efdcf4e r18895:278eef2e977c r25170:5ff0708cecdc r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r25388:32b23efdcf4e r18895:278eef2e977c r18895:278eef2e977c r25388:32b23efdcf4e r18895:278eef2e977c r25388:32b23efdcf4e r25388:32b23efdcf4e r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17641:a80e43fd2f5e r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r23506:bba4d0c6d70d r23506:bba4d0c6d70d r5619:40c6c3e3d5f7 r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r11606:d8d6a74590cd r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5584:545d748cc681 r17621:78f5210393b8 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r25655:1030dcb7eb52 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11637:3f8eca297664 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17621:78f5210393b8 r11584:8dbc3c7df3bd r11584:8dbc3c7df3bd r25655:1030dcb7eb52 r11584:8dbc3c7df3bd r11584:8dbc3c7df3bd r5619:40c6c3e3d5f7 r5584:545d748cc681 r17641:a80e43fd2f5e r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r23506:bba4d0c6d70d r23506:bba4d0c6d70d r23506:bba4d0c6d70d r5619:40c6c3e3d5f7 r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r11593:8dd431018ab1 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17621:78f5210393b8 r5584:545d748cc681 r11363:6906c490a00e r9451:01b0b6cc547f r5584:545d748cc681 r9451:01b0b6cc547f r9451:01b0b6cc547f r5898:2191f99d1ffb r25385:ad6834a4b5cc r5584:545d748cc681 r11363:6906c490a00e r5898:2191f99d1ffb r5584:545d748cc681 r25655:1030dcb7eb52 r5584:545d748cc681 r5584:545d748cc681 r17621:78f5210393b8 r5584:545d748cc681 r11363:6906c490a00e r5584:545d748cc681 r5584:545d748cc681 r5898:2191f99d1ffb r5584:545d748cc681 r5584:545d748cc681 r5900:b72b667bb359 r11968:c7807caba8df r5584:545d748cc681 r10457:8667446e8fd4 r10457:8667446e8fd4 r10457:8667446e8fd4 r5584:545d748cc681 r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r25243:8deed94703f6 r16664:0a9a4431500f r25243:8deed94703f6 r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r25243:8deed94703f6 r23953:ba75d2f3b530 r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r25243:8deed94703f6 r25243:8deed94703f6 r16664:0a9a4431500f r25243:8deed94703f6 r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r10207:a1fc2f2a33db r23953:ba75d2f3b530 r5584:545d748cc681 r16664:0a9a4431500f r5584:545d748cc681 r5584:545d748cc681 r5898:2191f99d1ffb r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r25270:0e1af506fef0 r5584:545d748cc681 r5584:545d748cc681 r25270:0e1af506fef0 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r17621:78f5210393b8 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r9146:d873efafcd56 r5584:545d748cc681 r25655:1030dcb7eb52 r5584:545d748cc681 r5900:b72b667bb359 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r14690:62b9ac91fd94 r5584:545d748cc681 r5584:545d748cc681 r25289:7c44ede418ad r5584:545d748cc681 r5584:545d748cc681 r16246:b0e8840a555e r23607:36c15679007d r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r14690:62b9ac91fd94 r24597:afde5721a3b6 r25270:0e1af506fef0 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5898:2191f99d1ffb r5900:b72b667bb359 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r14701:3d820af7badc r25289:7c44ede418ad r5900:b72b667bb359 r5584:545d748cc681 r5584:545d748cc681 r5898:2191f99d1ffb r5584:545d748cc681 r5584:545d748cc681 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17641:a80e43fd2f5e r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r23506:bba4d0c6d70d r23506:bba4d0c6d70d r23506:bba4d0c6d70d r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17621:78f5210393b8 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11363:6906c490a00e r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r25655:1030dcb7eb52 r5619:40c6c3e3d5f7 r11363:6906c490a00e r25388:32b23efdcf4e r5619:40c6c3e3d5f7 r25292:6323f849890a r14186:5477bcdd03f5 r25292:6323f849890a r25289:7c44ede418ad r25292:6323f849890a r25292:6323f849890a r25292:6323f849890a r25292:6323f849890a r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r23607:36c15679007d r14701:3d820af7badc r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5898:2191f99d1ffb r5619:40c6c3e3d5f7 r5900:b72b667bb359 r5619:40c6c3e3d5f7 r25289:7c44ede418ad r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r25388:32b23efdcf4e r25388:32b23efdcf4e r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11611:ffe270ad19c0 r25396:b4291ae45d23 r11611:ffe270ad19c0 r5619:40c6c3e3d5f7 r19182:8f0b5a1acb1c r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17621:78f5210393b8 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11604:033abec750d4 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11604:033abec750d4 r5619:40c6c3e3d5f7 r11604:033abec750d4 r10822:adfba97cb1d1 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r5624:8f8d1f8d3a74 r5624:8f8d1f8d3a74 r5624:8f8d1f8d3a74 r11611:ffe270ad19c0 r25388:32b23efdcf4e r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5584:545d748cc681 r17621:78f5210393b8 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r25655:1030dcb7eb52 r5584:545d748cc681 r5900:b72b667bb359 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r14690:62b9ac91fd94 r5584:545d748cc681 r25289:7c44ede418ad r25621:b453557b6e79 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r25621:b453557b6e79 r5584:545d748cc681 r17403:bbaee031fd60 r5584:545d748cc681 r5584:545d748cc681 r24209:155ba259d4af r24209:155ba259d4af r24209:155ba259d4af r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r5619:40c6c3e3d5f7 r5584:545d748cc681 r23536:ce42deb0b32d r5898:2191f99d1ffb r5584:545d748cc681 r25655:1030dcb7eb52 r5584:545d748cc681 r23536:ce42deb0b32d r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r6247:96e840dbefcc r5584:545d748cc681 r5898:2191f99d1ffb r11545:27d3f758c0c0 r5584:545d748cc681 r11363:6906c490a00e r5900:b72b667bb359 r11604:033abec750d4 r5584:545d748cc681 r25170:5ff0708cecdc r25170:5ff0708cecdc r5584:545d748cc681 r25655:1030dcb7eb52 r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r6247:96e840dbefcc r5584:545d748cc681 r11363:6906c490a00e r5584:545d748cc681 r5584:545d748cc681 r25655:1030dcb7eb52 r5584:545d748cc681 r25170:5ff0708cecdc r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r23587:821735a25dec r5584:545d748cc681 r25655:1030dcb7eb52 r5584:545d748cc681 r5584:545d748cc681 r11545:27d3f758c0c0 r5584:545d748cc681 r5584:545d748cc681 r5898:2191f99d1ffb r5584:545d748cc681 r5900:b72b667bb359 r9420:7c6f91f6791c r10824:4036289a0b3d r25170:5ff0708cecdc r25170:5ff0708cecdc r10824:4036289a0b3d r10824:4036289a0b3d r11637:3f8eca297664 r11637:3f8eca297664 r11637:3f8eca297664 r11637:3f8eca297664 r11637:3f8eca297664 r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r23607:36c15679007d r23587:821735a25dec r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r23587:821735a25dec r10824:4036289a0b3d r10824:4036289a0b3d r11545:27d3f758c0c0 r10824:4036289a0b3d r25655:1030dcb7eb52 r10824:4036289a0b3d r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r25655:1030dcb7eb52 r25655:1030dcb7eb52 r25655:1030dcb7eb52 r25655:1030dcb7eb52 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r25655:1030dcb7eb52 r25655:1030dcb7eb52 r25655:1030dcb7eb52 r25655:1030dcb7eb52 r25655:1030dcb7eb52 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r11584:8dbc3c7df3bd r10824:4036289a0b3d r25170:5ff0708cecdc r25170:5ff0708cecdc r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r6247:96e840dbefcc r5584:545d748cc681 r24952:3017eb59bf1a r22218:6e72d9a8f3d2 r5584:545d748cc681 r15542:f6c6d0f8689e r5584:545d748cc681 r24952:3017eb59bf1a r24952:3017eb59bf1a r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r24952:3017eb59bf1a r15542:f6c6d0f8689e r5584:545d748cc681 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r24952:3017eb59bf1a r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r24952:3017eb59bf1a r5584:545d748cc681 r23607:36c15679007d r23587:821735a25dec r10824:4036289a0b3d r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r6247:96e840dbefcc r5584:545d748cc681 r11608:fbeed55c850b r25170:5ff0708cecdc r11608:fbeed55c850b r25655:1030dcb7eb52 r25170:5ff0708cecdc r10476:e0a6350eb358 r25170:5ff0708cecdc r11593:8dd431018ab1 r25170:5ff0708cecdc r11629:97018c71b598 r11593:8dd431018ab1 r11629:97018c71b598 r25170:5ff0708cecdc r11606:d8d6a74590cd r23517:1a32c3c14728 r11629:97018c71b598 r25170:5ff0708cecdc r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r25169:d36f2d41209f r25169:d36f2d41209f r25169:d36f2d41209f r25169:d36f2d41209f r25169:d36f2d41209f r25169:d36f2d41209f r25170:5ff0708cecdc r25170:5ff0708cecdc r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r11606:d8d6a74590cd r5619:40c6c3e3d5f7 r25458:3aaccd46b7fa r25458:3aaccd46b7fa r25458:3aaccd46b7fa r11606:d8d6a74590cd r11606:d8d6a74590cd r11606:d8d6a74590cd r25655:1030dcb7eb52 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r18892:ba984148392c r18892:ba984148392c r18892:ba984148392c r18892:ba984148392c r25170:5ff0708cecdc r25170:5ff0708cecdc r18892:ba984148392c r25170:5ff0708cecdc r18892:ba984148392c r18892:ba984148392c r18892:ba984148392c | /*
* This file is part of OpenTTD.
* OpenTTD is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 2.
* OpenTTD is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
* See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with OpenTTD. If not, see <http://www.gnu.org/licenses/>.
*/
/**
* @file network_udp.cpp This file handles the UDP related communication.
*
* This is the GameServer <-> MasterServer and GameServer <-> GameClient
* communication before the game is being joined.
*/
#include "../stdafx.h"
#include "../date_func.h"
#include "../map_func.h"
#include "../debug.h"
#include "core/game_info.h"
#include "network_gamelist.h"
#include "network_internal.h"
#include "network_udp.h"
#include "network.h"
#include "../core/endian_func.hpp"
#include "../company_base.h"
#include "../thread.h"
#include "../rev.h"
#include "../newgrf_text.h"
#include "../strings_func.h"
#include "table/strings.h"
#include <mutex>
#include "core/udp.h"
#include "../safeguards.h"
/** Session key to register ourselves to the master server */
static uint64 _session_key = 0;
static const std::chrono::minutes ADVERTISE_NORMAL_INTERVAL(15); ///< interval between advertising.
static const std::chrono::seconds ADVERTISE_RETRY_INTERVAL(10); ///< re-advertise when no response after this amount of time.
static const uint32 ADVERTISE_RETRY_TIMES = 3; ///< give up re-advertising after this much failed retries
static bool _network_udp_server; ///< Is the UDP server started?
static uint16 _network_udp_broadcast; ///< Timeout for the UDP broadcasts.
static uint8 _network_advertise_retries; ///< The number of advertisement retries we did.
/** Some information about a socket, which exists before the actual socket has been created to provide locking and the likes. */
struct UDPSocket {
const std::string name; ///< The name of the socket.
std::mutex mutex; ///< Mutex for everything that (indirectly) touches the sockets within the handler.
NetworkUDPSocketHandler *socket; ///< The actual socket, which may be nullptr when not initialized yet.
std::atomic<int> receive_iterations_locked; ///< The number of receive iterations the mutex was locked.
UDPSocket(const std::string &name_) : name(name_), socket(nullptr) {}
void CloseSocket()
{
std::lock_guard<std::mutex> lock(mutex);
socket->CloseSocket();
delete socket;
socket = nullptr;
}
void ReceivePackets()
{
std::unique_lock<std::mutex> lock(mutex, std::defer_lock);
if (!lock.try_lock()) {
if (++receive_iterations_locked % 32 == 0) {
Debug(net, 0, "{} background UDP loop processing appears to be blocked. Your OS may be low on UDP send buffers.", name);
}
return;
}
receive_iterations_locked.store(0);
socket->ReceivePackets();
}
};
static UDPSocket _udp_client("Client"); ///< udp client socket
static UDPSocket _udp_server("Server"); ///< udp server socket
static UDPSocket _udp_master("Master"); ///< udp master socket
/**
* Helper function doing the actual work for querying the server.
* @param connection_string The address of the server.
* @param needs_mutex Whether we need to acquire locks when sending the packet or not.
* @param manually Whether the address was entered manually.
*/
static void DoNetworkUDPQueryServer(const std::string &connection_string, bool needs_mutex, bool manually)
{
/* Clear item in gamelist */
NetworkGameList *item = new NetworkGameList(connection_string, manually);
item->info.server_name = connection_string;
NetworkGameListAddItemDelayed(item);
std::unique_lock<std::mutex> lock(_udp_client.mutex, std::defer_lock);
if (needs_mutex) lock.lock();
/* Init the packet */
NetworkAddress address = NetworkAddress(ParseConnectionString(connection_string, NETWORK_DEFAULT_PORT));
Packet p(PACKET_UDP_CLIENT_FIND_SERVER);
if (_udp_client.socket != nullptr) _udp_client.socket->SendPacket(&p, &address);
}
/**
* Query a specific server.
* @param connection_string The address of the server.
* @param manually Whether the address was entered manually.
*/
void NetworkUDPQueryServer(const std::string &connection_string, bool manually)
{
if (!StartNewThread(nullptr, "ottd:udp-query", &DoNetworkUDPQueryServer, std::move(connection_string), true, std::move(manually))) {
DoNetworkUDPQueryServer(connection_string, true, manually);
}
}
///*** Communication with the masterserver ***/
/** Helper class for connecting to the master server. */
class MasterNetworkUDPSocketHandler : public NetworkUDPSocketHandler {
protected:
void Receive_MASTER_ACK_REGISTER(Packet *p, NetworkAddress *client_addr) override;
void Receive_MASTER_SESSION_KEY(Packet *p, NetworkAddress *client_addr) override;
public:
/**
* Create the socket.
* @param addresses The addresses to bind on.
*/
MasterNetworkUDPSocketHandler(NetworkAddressList *addresses) : NetworkUDPSocketHandler(addresses) {}
virtual ~MasterNetworkUDPSocketHandler() {}
};
void MasterNetworkUDPSocketHandler::Receive_MASTER_ACK_REGISTER(Packet *p, NetworkAddress *client_addr)
{
_network_advertise_retries = 0;
Debug(net, 3, "Advertising on master server successful ({})", NetworkAddress::AddressFamilyAsString(client_addr->GetAddress()->ss_family));
/* We are advertised, but we don't want to! */
if (!_settings_client.network.server_advertise) NetworkUDPRemoveAdvertise(false);
}
void MasterNetworkUDPSocketHandler::Receive_MASTER_SESSION_KEY(Packet *p, NetworkAddress *client_addr)
{
_session_key = p->Recv_uint64();
Debug(net, 6, "Received new session key from master server ({})", NetworkAddress::AddressFamilyAsString(client_addr->GetAddress()->ss_family));
}
///*** Communication with clients (we are server) ***/
/** Helper class for handling all server side communication. */
class ServerNetworkUDPSocketHandler : public NetworkUDPSocketHandler {
protected:
void Receive_CLIENT_FIND_SERVER(Packet *p, NetworkAddress *client_addr) override;
void Receive_CLIENT_DETAIL_INFO(Packet *p, NetworkAddress *client_addr) override;
void Receive_CLIENT_GET_NEWGRFS(Packet *p, NetworkAddress *client_addr) override;
public:
/**
* Create the socket.
* @param addresses The addresses to bind on.
*/
ServerNetworkUDPSocketHandler(NetworkAddressList *addresses) : NetworkUDPSocketHandler(addresses) {}
virtual ~ServerNetworkUDPSocketHandler() {}
};
void ServerNetworkUDPSocketHandler::Receive_CLIENT_FIND_SERVER(Packet *p, NetworkAddress *client_addr)
{
/* Just a fail-safe.. should never happen */
if (!_network_udp_server) {
return;
}
Packet packet(PACKET_UDP_SERVER_RESPONSE);
SerializeNetworkGameInfo(&packet, GetCurrentNetworkServerGameInfo());
/* Let the client know that we are here */
this->SendPacket(&packet, client_addr);
Debug(net, 7, "Queried from {}", client_addr->GetHostname());
}
void ServerNetworkUDPSocketHandler::Receive_CLIENT_DETAIL_INFO(Packet *p, NetworkAddress *client_addr)
{
/* Just a fail-safe.. should never happen */
if (!_network_udp_server) return;
Packet packet(PACKET_UDP_SERVER_DETAIL_INFO);
/* Send the amount of active companies */
packet.Send_uint8 (NETWORK_COMPANY_INFO_VERSION);
packet.Send_uint8 ((uint8)Company::GetNumItems());
/* Fetch the latest version of the stats */
NetworkCompanyStats company_stats[MAX_COMPANIES];
NetworkPopulateCompanyStats(company_stats);
/* The minimum company information "blob" size. */
static const uint MIN_CI_SIZE = 54;
uint max_cname_length = NETWORK_COMPANY_NAME_LENGTH;
if (!packet.CanWriteToPacket(Company::GetNumItems() * (MIN_CI_SIZE + NETWORK_COMPANY_NAME_LENGTH))) {
/* Assume we can at least put the company information in the packets. */
assert(packet.CanWriteToPacket(Company::GetNumItems() * MIN_CI_SIZE));
/* At this moment the company names might not fit in the
* packet. Check whether that is really the case. */
for (;;) {
size_t required = 0;
for (const Company *company : Company::Iterate()) {
char company_name[NETWORK_COMPANY_NAME_LENGTH];
SetDParam(0, company->index);
GetString(company_name, STR_COMPANY_NAME, company_name + max_cname_length - 1);
required += MIN_CI_SIZE;
required += strlen(company_name);
}
if (packet.CanWriteToPacket(required)) break;
/* Try again, with slightly shorter strings. */
assert(max_cname_length > 0);
max_cname_length--;
}
}
/* Go through all the companies */
for (const Company *company : Company::Iterate()) {
/* Send the information */
this->SendCompanyInformation(&packet, company, &company_stats[company->index], max_cname_length);
}
this->SendPacket(&packet, client_addr);
}
/**
* A client has requested the names of some NewGRFs.
*
* Replying this can be tricky as we have a limit of UDP_MTU bytes
* in the reply packet and we can send up to 100 bytes per NewGRF
* (GRF ID, MD5sum and NETWORK_GRF_NAME_LENGTH bytes for the name).
* As UDP_MTU is _much_ less than 100 * NETWORK_MAX_GRF_COUNT, it
* could be that a packet overflows. To stop this we only reply
* with the first N NewGRFs so that if the first N + 1 NewGRFs
* would be sent, the packet overflows.
* in_reply and in_reply_count are used to keep a list of GRFs to
* send in the reply.
*/
void ServerNetworkUDPSocketHandler::Receive_CLIENT_GET_NEWGRFS(Packet *p, NetworkAddress *client_addr)
{
uint8 num_grfs;
uint i;
const GRFConfig *in_reply[NETWORK_MAX_GRF_COUNT];
uint8 in_reply_count = 0;
size_t packet_len = 0;
Debug(net, 7, "NewGRF data request from {}", client_addr->GetAddressAsString());
num_grfs = p->Recv_uint8 ();
if (num_grfs > NETWORK_MAX_GRF_COUNT) return;
for (i = 0; i < num_grfs; i++) {
GRFIdentifier c;
const GRFConfig *f;
DeserializeGRFIdentifier(p, &c);
/* Find the matching GRF file */
f = FindGRFConfig(c.grfid, FGCM_EXACT, c.md5sum);
if (f == nullptr) continue; // The GRF is unknown to this server
/* If the reply might exceed the size of the packet, only reply
* the current list and do not send the other data.
* The name could be an empty string, if so take the filename. */
packet_len += sizeof(c.grfid) + sizeof(c.md5sum) +
std::min(strlen(f->GetName()) + 1, (size_t)NETWORK_GRF_NAME_LENGTH);
if (packet_len > UDP_MTU - 4) { // 4 is 3 byte header + grf count in reply
break;
}
in_reply[in_reply_count] = f;
in_reply_count++;
}
if (in_reply_count == 0) return;
Packet packet(PACKET_UDP_SERVER_NEWGRFS);
packet.Send_uint8(in_reply_count);
for (i = 0; i < in_reply_count; i++) {
char name[NETWORK_GRF_NAME_LENGTH];
/* The name could be an empty string, if so take the filename */
strecpy(name, in_reply[i]->GetName(), lastof(name));
SerializeGRFIdentifier(&packet, &in_reply[i]->ident);
packet.Send_string(name);
}
this->SendPacket(&packet, client_addr);
}
///*** Communication with servers (we are client) ***/
/** Helper class for handling all client side communication. */
class ClientNetworkUDPSocketHandler : public NetworkUDPSocketHandler {
protected:
void Receive_SERVER_RESPONSE(Packet *p, NetworkAddress *client_addr) override;
void Receive_MASTER_RESPONSE_LIST(Packet *p, NetworkAddress *client_addr) override;
void Receive_SERVER_NEWGRFS(Packet *p, NetworkAddress *client_addr) override;
public:
virtual ~ClientNetworkUDPSocketHandler() {}
};
void ClientNetworkUDPSocketHandler::Receive_SERVER_RESPONSE(Packet *p, NetworkAddress *client_addr)
{
NetworkGameList *item;
/* Just a fail-safe.. should never happen */
if (_network_udp_server) return;
Debug(net, 3, "Server response from {}", client_addr->GetAddressAsString());
/* Find next item */
item = NetworkGameListAddItem(client_addr->GetAddressAsString(false));
/* Clear any existing GRFConfig chain. */
ClearGRFConfigList(&item->info.grfconfig);
/* Retrieve the NetworkGameInfo from the packet. */
DeserializeNetworkGameInfo(p, &item->info);
/* Check for compatability with the client. */
CheckGameCompatibility(item->info);
/* Ensure we consider the server online. */
item->online = true;
{
/* Checks whether there needs to be a request for names of GRFs and makes
* the request if necessary. GRFs that need to be requested are the GRFs
* that do not exist on the clients system and we do not have the name
* resolved of, i.e. the name is still UNKNOWN_GRF_NAME_PLACEHOLDER.
* The in_request array and in_request_count are used so there is no need
* to do a second loop over the GRF list, which can be relatively expensive
* due to the string comparisons. */
const GRFConfig *in_request[NETWORK_MAX_GRF_COUNT];
const GRFConfig *c;
uint in_request_count = 0;
for (c = item->info.grfconfig; c != nullptr; c = c->next) {
if (c->status != GCS_NOT_FOUND || strcmp(c->GetName(), UNKNOWN_GRF_NAME_PLACEHOLDER) != 0) continue;
in_request[in_request_count] = c;
in_request_count++;
}
if (in_request_count > 0) {
/* There are 'unknown' GRFs, now send a request for them */
uint i;
Packet packet(PACKET_UDP_CLIENT_GET_NEWGRFS);
packet.Send_uint8(in_request_count);
for (i = 0; i < in_request_count; i++) {
SerializeGRFIdentifier(&packet, &in_request[i]->ident);
}
NetworkAddress address = NetworkAddress(ParseConnectionString(item->connection_string, NETWORK_DEFAULT_PORT));
this->SendPacket(&packet, &address);
}
}
if (client_addr->GetAddress()->ss_family == AF_INET6) {
item->info.server_name.append(" (IPv6)");
}
UpdateNetworkGameWindow();
}
void ClientNetworkUDPSocketHandler::Receive_MASTER_RESPONSE_LIST(Packet *p, NetworkAddress *client_addr)
{
/* packet begins with the protocol version (uint8)
* then an uint16 which indicates how many
* ip:port pairs are in this packet, after that
* an uint32 (ip) and an uint16 (port) for each pair.
*/
ServerListType type = (ServerListType)(p->Recv_uint8() - 1);
if (type < SLT_END) {
for (int i = p->Recv_uint16(); i != 0 ; i--) {
sockaddr_storage addr_storage;
memset(&addr_storage, 0, sizeof(addr_storage));
if (type == SLT_IPv4) {
addr_storage.ss_family = AF_INET;
((sockaddr_in*)&addr_storage)->sin_addr.s_addr = TO_LE32(p->Recv_uint32());
} else {
assert(type == SLT_IPv6);
addr_storage.ss_family = AF_INET6;
byte *addr = (byte*)&((sockaddr_in6*)&addr_storage)->sin6_addr;
for (uint i = 0; i < sizeof(in6_addr); i++) *addr++ = p->Recv_uint8();
}
NetworkAddress addr(addr_storage, type == SLT_IPv4 ? sizeof(sockaddr_in) : sizeof(sockaddr_in6));
addr.SetPort(p->Recv_uint16());
/* Somehow we reached the end of the packet */
if (this->HasClientQuit()) return;
DoNetworkUDPQueryServer(addr.GetAddressAsString(false), false, false);
}
}
}
/** The return of the client's request of the names of some NewGRFs */
void ClientNetworkUDPSocketHandler::Receive_SERVER_NEWGRFS(Packet *p, NetworkAddress *client_addr)
{
uint8 num_grfs;
uint i;
Debug(net, 7, "NewGRF data reply from {}", client_addr->GetAddressAsString());
num_grfs = p->Recv_uint8 ();
if (num_grfs > NETWORK_MAX_GRF_COUNT) return;
for (i = 0; i < num_grfs; i++) {
GRFIdentifier c;
DeserializeGRFIdentifier(p, &c);
std::string name = p->Recv_string(NETWORK_GRF_NAME_LENGTH);
/* An empty name is not possible under normal circumstances
* and causes problems when showing the NewGRF list. */
if (name.empty()) continue;
/* Try to find the GRFTextWrapper for the name of this GRF ID and MD5sum tuple.
* If it exists and not resolved yet, then name of the fake GRF is
* overwritten with the name from the reply. */
GRFTextWrapper unknown_name = FindUnknownGRFName(c.grfid, c.md5sum, false);
if (unknown_name && strcmp(GetGRFStringFromGRFText(unknown_name), UNKNOWN_GRF_NAME_PLACEHOLDER) == 0) {
AddGRFTextToList(unknown_name, name);
}
}
}
/** Broadcast to all ips */
static void NetworkUDPBroadCast(NetworkUDPSocketHandler *socket)
{
for (NetworkAddress &addr : _broadcast_list) {
Packet p(PACKET_UDP_CLIENT_FIND_SERVER);
Debug(net, 5, "Broadcasting to {}", addr.GetHostname());
socket->SendPacket(&p, &addr, true, true);
}
}
/** Request the the server-list from the master server */
void NetworkUDPQueryMasterServer()
{
Packet p(PACKET_UDP_CLIENT_GET_LIST);
NetworkAddress out_addr(NETWORK_MASTER_SERVER_HOST, NETWORK_MASTER_SERVER_PORT);
/* packet only contains protocol version */
p.Send_uint8(NETWORK_MASTER_SERVER_VERSION);
p.Send_uint8(SLT_AUTODETECT);
std::lock_guard<std::mutex> lock(_udp_client.mutex);
_udp_client.socket->SendPacket(&p, &out_addr, true);
Debug(net, 6, "Master server queried at {}", out_addr.GetAddressAsString());
}
/** Find all servers */
void NetworkUDPSearchGame()
{
/* We are still searching.. */
if (_network_udp_broadcast > 0) return;
Debug(net, 3, "Searching server");
NetworkUDPBroadCast(_udp_client.socket);
_network_udp_broadcast = 300; // Stay searching for 300 ticks
}
/**
* Thread entry point for de-advertising.
*/
static void NetworkUDPRemoveAdvertiseThread()
{
Debug(net, 3, "Removing advertise from master server");
/* Find somewhere to send */
NetworkAddress out_addr(NETWORK_MASTER_SERVER_HOST, NETWORK_MASTER_SERVER_PORT);
/* Send the packet */
Packet p(PACKET_UDP_SERVER_UNREGISTER);
/* Packet is: Version, server_port */
p.Send_uint8 (NETWORK_MASTER_SERVER_VERSION);
p.Send_uint16(_settings_client.network.server_port);
std::lock_guard<std::mutex> lock(_udp_master.mutex);
if (_udp_master.socket != nullptr) _udp_master.socket->SendPacket(&p, &out_addr, true);
}
/**
* Remove our advertise from the master-server.
* @param blocking whether to wait until the removal has finished.
*/
void NetworkUDPRemoveAdvertise(bool blocking)
{
/* Check if we are advertising */
if (!_networking || !_network_server || !_network_udp_server) return;
if (blocking || !StartNewThread(nullptr, "ottd:udp-advert", &NetworkUDPRemoveAdvertiseThread)) {
NetworkUDPRemoveAdvertiseThread();
}
}
/**
* Thread entry point for advertising.
*/
static void NetworkUDPAdvertiseThread()
{
/* Find somewhere to send */
NetworkAddress out_addr(NETWORK_MASTER_SERVER_HOST, NETWORK_MASTER_SERVER_PORT);
Debug(net, 3, "Advertising to master server");
/* Add a bit more messaging when we cannot get a session key */
static byte session_key_retries = 0;
if (_session_key == 0 && session_key_retries++ == 2) {
Debug(net, 0, "Advertising to the master server is failing");
Debug(net, 0, " we are not receiving the session key from the server");
Debug(net, 0, " please allow udp packets from {} to you to be delivered", out_addr.GetAddressAsString(false));
Debug(net, 0, " please allow udp packets from you to {} to be delivered", out_addr.GetAddressAsString(false));
}
if (_session_key != 0 && _network_advertise_retries == 0) {
Debug(net, 0, "Advertising to the master server is failing");
Debug(net, 0, " we are not receiving the acknowledgement from the server");
Debug(net, 0, " this usually means that the master server cannot reach us");
Debug(net, 0, " please allow udp and tcp packets to port {} to be delivered", _settings_client.network.server_port);
Debug(net, 0, " please allow udp and tcp packets from port {} to be delivered", _settings_client.network.server_port);
}
/* Send the packet */
Packet p(PACKET_UDP_SERVER_REGISTER);
/* Packet is: WELCOME_MESSAGE, Version, server_port */
p.Send_string(NETWORK_MASTER_SERVER_WELCOME_MESSAGE);
p.Send_uint8 (NETWORK_MASTER_SERVER_VERSION);
p.Send_uint16(_settings_client.network.server_port);
p.Send_uint64(_session_key);
std::lock_guard<std::mutex> lock(_udp_master.mutex);
if (_udp_master.socket != nullptr) _udp_master.socket->SendPacket(&p, &out_addr, true);
}
/**
* Register us to the master server
* This function checks if it needs to send an advertise
*/
void NetworkUDPAdvertise()
{
static std::chrono::steady_clock::time_point _last_advertisement = {}; ///< The last time we performed an advertisement.
/* Check if we should send an advertise */
if (!_networking || !_network_server || !_network_udp_server || !_settings_client.network.server_advertise) return;
if (_network_need_advertise) {
/* Forced advertisement. */
_network_need_advertise = false;
_network_advertise_retries = ADVERTISE_RETRY_TIMES;
} else {
/* Only send once every ADVERTISE_NORMAL_INTERVAL ticks */
if (_network_advertise_retries == 0) {
if (std::chrono::steady_clock::now() <= _last_advertisement + ADVERTISE_NORMAL_INTERVAL) return;
_network_advertise_retries = ADVERTISE_RETRY_TIMES;
} else {
/* An actual retry. */
if (std::chrono::steady_clock::now() <= _last_advertisement + ADVERTISE_RETRY_INTERVAL) return;
}
}
_network_advertise_retries--;
_last_advertisement = std::chrono::steady_clock::now();
if (!StartNewThread(nullptr, "ottd:udp-advert", &NetworkUDPAdvertiseThread)) {
NetworkUDPAdvertiseThread();
}
}
/** Initialize the whole UDP bit. */
void NetworkUDPInitialize()
{
/* If not closed, then do it. */
if (_udp_server.socket != nullptr) NetworkUDPClose();
Debug(net, 3, "Initializing UDP listeners");
assert(_udp_client.socket == nullptr && _udp_server.socket == nullptr && _udp_master.socket == nullptr);
std::scoped_lock lock(_udp_client.mutex, _udp_server.mutex, _udp_master.mutex);
_udp_client.socket = new ClientNetworkUDPSocketHandler();
NetworkAddressList server;
GetBindAddresses(&server, _settings_client.network.server_port);
_udp_server.socket = new ServerNetworkUDPSocketHandler(&server);
server.clear();
GetBindAddresses(&server, 0);
_udp_master.socket = new MasterNetworkUDPSocketHandler(&server);
_network_udp_server = false;
_network_udp_broadcast = 0;
_network_advertise_retries = 0;
}
/** Start the listening of the UDP server component. */
void NetworkUDPServerListen()
{
std::lock_guard<std::mutex> lock(_udp_server.mutex);
_network_udp_server = _udp_server.socket->Listen();
}
/** Close all UDP related stuff. */
void NetworkUDPClose()
{
_udp_client.CloseSocket();
_udp_server.CloseSocket();
_udp_master.CloseSocket();
_network_udp_server = false;
_network_udp_broadcast = 0;
Debug(net, 5, "Closed UDP listeners");
}
/** Receive the UDP packets. */
void NetworkBackgroundUDPLoop()
{
if (_network_udp_server) {
_udp_server.ReceivePackets();
_udp_master.ReceivePackets();
} else {
_udp_client.ReceivePackets();
if (_network_udp_broadcast > 0) _network_udp_broadcast--;
}
}
|