Files
@ r23747:51ed0eb3338a
Branch filter:
Location: cpp/openttd-patchpack/source/src/network/network_udp.cpp - annotation
r23747:51ed0eb3338a
23.9 KiB
text/x-c
Update: Translations from eints
hungarian: 7 changes by Brumi
hungarian: 7 changes by Brumi
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 | r5584:545d748cc681 r5584:545d748cc681 r12768:980ae0491352 r12768:980ae0491352 r12768:980ae0491352 r12768:980ae0491352 r12768:980ae0491352 r12768:980ae0491352 r12768:980ae0491352 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r6121:a8ff6abe7fb2 r5584:545d748cc681 r8140:9424f012f6a2 r8139:4fc34c1bc2fb r14248:a9050881acd7 r5584:545d748cc681 r10828:d8d68d002525 r5584:545d748cc681 r14248:a9050881acd7 r8132:f5cfeb0d46c0 r10208:ef8fcc3dc4ca r23587:821735a25dec r9451:01b0b6cc547f r15579:ec523aee641f r16664:0a9a4431500f r16664:0a9a4431500f r23586:11b470d4cee6 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r21383:942c32fb8b0e r21383:942c32fb8b0e r19944:25a78576fb5e r23586:11b470d4cee6 r10824:4036289a0b3d r11584:8dbc3c7df3bd r11584:8dbc3c7df3bd r11584:8dbc3c7df3bd r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r5584:545d748cc681 r23607:36c15679007d r23607:36c15679007d r23607:36c15679007d r5619:40c6c3e3d5f7 r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r23587:821735a25dec r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r23587:821735a25dec r23587:821735a25dec r23587:821735a25dec r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r23586:11b470d4cee6 r23586:11b470d4cee6 r18895:278eef2e977c r18895:278eef2e977c r23607:36c15679007d r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r23607:36c15679007d r23587:821735a25dec r18895:278eef2e977c r18895:278eef2e977c r18895:278eef2e977c r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17641:a80e43fd2f5e r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r23506:bba4d0c6d70d r23506:bba4d0c6d70d r5619:40c6c3e3d5f7 r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r11606:d8d6a74590cd r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5584:545d748cc681 r17621:78f5210393b8 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11843:07fb5d356fc9 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11637:3f8eca297664 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17621:78f5210393b8 r11584:8dbc3c7df3bd r11584:8dbc3c7df3bd r11843:07fb5d356fc9 r11584:8dbc3c7df3bd r11584:8dbc3c7df3bd r5619:40c6c3e3d5f7 r5584:545d748cc681 r17641:a80e43fd2f5e r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r23506:bba4d0c6d70d r23506:bba4d0c6d70d r23506:bba4d0c6d70d r5619:40c6c3e3d5f7 r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r11593:8dd431018ab1 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17621:78f5210393b8 r5584:545d748cc681 r11363:6906c490a00e r9451:01b0b6cc547f r5584:545d748cc681 r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r12152:73f8f013b6e2 r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r11968:c7807caba8df r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r9451:01b0b6cc547f r10310:bfae42dc59ac r10310:bfae42dc59ac r23272:79ac2e685f22 r5584:545d748cc681 r5898:2191f99d1ffb r16618:d89f0c3f42e7 r5584:545d748cc681 r11363:6906c490a00e r5898:2191f99d1ffb r5584:545d748cc681 r11843:07fb5d356fc9 r5584:545d748cc681 r5584:545d748cc681 r17621:78f5210393b8 r5584:545d748cc681 r11363:6906c490a00e r5584:545d748cc681 r5584:545d748cc681 r5898:2191f99d1ffb r5584:545d748cc681 r5584:545d748cc681 r5900:b72b667bb359 r11968:c7807caba8df r5584:545d748cc681 r10457:8667446e8fd4 r10457:8667446e8fd4 r10457:8667446e8fd4 r5584:545d748cc681 r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16720:4795a317517c r16664:0a9a4431500f r16720:4795a317517c r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16720:4795a317517c r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16676:c0ecc916dfe7 r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r16664:0a9a4431500f r10207:a1fc2f2a33db r10207:a1fc2f2a33db r10207:a1fc2f2a33db r5584:545d748cc681 r16664:0a9a4431500f r5584:545d748cc681 r5584:545d748cc681 r5898:2191f99d1ffb r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r17621:78f5210393b8 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r9146:d873efafcd56 r5584:545d748cc681 r11545:27d3f758c0c0 r5584:545d748cc681 r5900:b72b667bb359 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r14690:62b9ac91fd94 r5584:545d748cc681 r5584:545d748cc681 r16618:d89f0c3f42e7 r5584:545d748cc681 r5584:545d748cc681 r16246:b0e8840a555e r23607:36c15679007d r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r14690:62b9ac91fd94 r14701:3d820af7badc r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5898:2191f99d1ffb r5900:b72b667bb359 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r14701:3d820af7badc r16618:d89f0c3f42e7 r5900:b72b667bb359 r5584:545d748cc681 r5584:545d748cc681 r5898:2191f99d1ffb r5584:545d748cc681 r5584:545d748cc681 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17641:a80e43fd2f5e r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r23506:bba4d0c6d70d r23506:bba4d0c6d70d r23506:bba4d0c6d70d r23506:bba4d0c6d70d r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17621:78f5210393b8 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11363:6906c490a00e r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11545:27d3f758c0c0 r5619:40c6c3e3d5f7 r11363:6906c490a00e r11546:a4422f41f18b r5619:40c6c3e3d5f7 r14186:5477bcdd03f5 r16618:d89f0c3f42e7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r23607:36c15679007d r6229:a69564e4eb2e r14701:3d820af7badc r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5898:2191f99d1ffb r5619:40c6c3e3d5f7 r5900:b72b667bb359 r5619:40c6c3e3d5f7 r16618:d89f0c3f42e7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11546:a4422f41f18b r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11611:ffe270ad19c0 r21387:4ac1de161213 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r6178:fc8bd2bde93a r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r19182:8f0b5a1acb1c r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17621:78f5210393b8 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11604:033abec750d4 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r11604:033abec750d4 r5619:40c6c3e3d5f7 r11604:033abec750d4 r10822:adfba97cb1d1 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r11611:ffe270ad19c0 r5624:8f8d1f8d3a74 r5624:8f8d1f8d3a74 r5624:8f8d1f8d3a74 r11611:ffe270ad19c0 r23587:821735a25dec r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5584:545d748cc681 r17621:78f5210393b8 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r11545:27d3f758c0c0 r5584:545d748cc681 r5900:b72b667bb359 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r14690:62b9ac91fd94 r5584:545d748cc681 r16618:d89f0c3f42e7 r5900:b72b667bb359 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5638:174d9d13ce21 r5584:545d748cc681 r17403:bbaee031fd60 r5584:545d748cc681 r5584:545d748cc681 r17403:bbaee031fd60 r23607:36c15679007d r17403:bbaee031fd60 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5619:40c6c3e3d5f7 r5584:545d748cc681 r5619:40c6c3e3d5f7 r16246:b0e8840a555e r23607:36c15679007d r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r17403:bbaee031fd60 r17403:bbaee031fd60 r17403:bbaee031fd60 r6424:17d8688db313 r5584:545d748cc681 r17403:bbaee031fd60 r17403:bbaee031fd60 r17403:bbaee031fd60 r17403:bbaee031fd60 r17403:bbaee031fd60 r17403:bbaee031fd60 r17403:bbaee031fd60 r18637:6db0bce1fa51 r18637:6db0bce1fa51 r18637:6db0bce1fa51 r5584:545d748cc681 r7931:4c17a74c399e r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r5619:40c6c3e3d5f7 r5584:545d748cc681 r23536:ce42deb0b32d r5898:2191f99d1ffb r5584:545d748cc681 r23536:ce42deb0b32d r5584:545d748cc681 r23536:ce42deb0b32d r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r6247:96e840dbefcc r5584:545d748cc681 r5898:2191f99d1ffb r11545:27d3f758c0c0 r5584:545d748cc681 r11363:6906c490a00e r5900:b72b667bb359 r11604:033abec750d4 r5584:545d748cc681 r11597:39dbd2f0af04 r5584:545d748cc681 r11545:27d3f758c0c0 r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r6247:96e840dbefcc r5584:545d748cc681 r11363:6906c490a00e r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r23587:821735a25dec r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r11545:27d3f758c0c0 r5584:545d748cc681 r5584:545d748cc681 r5898:2191f99d1ffb r5584:545d748cc681 r5900:b72b667bb359 r9420:7c6f91f6791c r10824:4036289a0b3d r23586:11b470d4cee6 r23607:36c15679007d r10824:4036289a0b3d r10824:4036289a0b3d r11637:3f8eca297664 r11637:3f8eca297664 r11637:3f8eca297664 r11637:3f8eca297664 r11637:3f8eca297664 r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r23607:36c15679007d r23587:821735a25dec r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r23587:821735a25dec r10824:4036289a0b3d r10824:4036289a0b3d r11545:27d3f758c0c0 r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r11866:1634084f9199 r11866:1634084f9199 r11843:07fb5d356fc9 r11843:07fb5d356fc9 r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r10824:4036289a0b3d r11584:8dbc3c7df3bd r10824:4036289a0b3d r23586:11b470d4cee6 r23607:36c15679007d r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r17641:a80e43fd2f5e r6247:96e840dbefcc r5584:545d748cc681 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r5584:545d748cc681 r15542:f6c6d0f8689e r5584:545d748cc681 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r22218:6e72d9a8f3d2 r15542:f6c6d0f8689e r5584:545d748cc681 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r22218:6e72d9a8f3d2 r5584:545d748cc681 r23607:36c15679007d r23587:821735a25dec r10824:4036289a0b3d r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r6247:96e840dbefcc r5584:545d748cc681 r11608:fbeed55c850b r23607:36c15679007d r11608:fbeed55c850b r11606:d8d6a74590cd r23607:36c15679007d r10476:e0a6350eb358 r23586:11b470d4cee6 r11593:8dd431018ab1 r11629:97018c71b598 r11629:97018c71b598 r11593:8dd431018ab1 r11629:97018c71b598 r11593:8dd431018ab1 r11606:d8d6a74590cd r23517:1a32c3c14728 r11629:97018c71b598 r11606:d8d6a74590cd r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r5584:545d748cc681 r17641:a80e43fd2f5e r11606:d8d6a74590cd r5619:40c6c3e3d5f7 r23586:11b470d4cee6 r11606:d8d6a74590cd r11606:d8d6a74590cd r11606:d8d6a74590cd r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r23607:36c15679007d r23607:36c15679007d r23607:36c15679007d r11606:d8d6a74590cd r11606:d8d6a74590cd r11606:d8d6a74590cd r11606:d8d6a74590cd r5619:40c6c3e3d5f7 r5619:40c6c3e3d5f7 r18892:ba984148392c r18892:ba984148392c r18892:ba984148392c r23586:11b470d4cee6 r18893:421fa7b4f246 r18892:ba984148392c r18892:ba984148392c r18892:ba984148392c r18892:ba984148392c r18892:ba984148392c r18892:ba984148392c r18892:ba984148392c r18892:ba984148392c | /* $Id$ */
/*
* This file is part of OpenTTD.
* OpenTTD is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 2.
* OpenTTD is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
* See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with OpenTTD. If not, see <http://www.gnu.org/licenses/>.
*/
/**
* @file network_udp.cpp This file handles the UDP related communication.
*
* This is the GameServer <-> MasterServer and GameServer <-> GameClient
* communication before the game is being joined.
*/
#include "../stdafx.h"
#include "../date_func.h"
#include "../map_func.h"
#include "../debug.h"
#include "network_gamelist.h"
#include "network_internal.h"
#include "network_udp.h"
#include "network.h"
#include "../core/endian_func.hpp"
#include "../company_base.h"
#include "../thread.h"
#include "../rev.h"
#include "../newgrf_text.h"
#include "../strings_func.h"
#include "table/strings.h"
#include <mutex>
#include "core/udp.h"
#include "../safeguards.h"
/** Mutex for all out threaded udp resolution and such. */
static std::mutex _network_udp_mutex;
/** Session key to register ourselves to the master server */
static uint64 _session_key = 0;
static const uint32 ADVERTISE_NORMAL_INTERVAL = 15 * 60 * 1000; ///< interval between advertising in ms (15 minutes)
static const uint32 ADVERTISE_RETRY_INTERVAL = 10 * 1000; ///< re-advertise when no response after this many ms (10 seconds)
static const uint32 ADVERTISE_RETRY_TIMES = 3; ///< give up re-advertising after this much failed retries
NetworkUDPSocketHandler *_udp_client_socket = nullptr; ///< udp client socket
NetworkUDPSocketHandler *_udp_server_socket = nullptr; ///< udp server socket
NetworkUDPSocketHandler *_udp_master_socket = nullptr; ///< udp master socket
/**
* Helper function doing the actual work for querying the server.
* @param address The address of the server.
* @param needs_mutex Whether we need to acquire locks when sending the packet or not.
* @param manually Whether the address was entered manually.
*/
static void DoNetworkUDPQueryServer(NetworkAddress &address, bool needs_mutex, bool manually)
{
/* Clear item in gamelist */
NetworkGameList *item = CallocT<NetworkGameList>(1);
address.GetAddressAsString(item->info.server_name, lastof(item->info.server_name));
strecpy(item->info.hostname, address.GetHostname(), lastof(item->info.hostname));
item->address = address;
item->manually = manually;
NetworkGameListAddItemDelayed(item);
std::unique_lock<std::mutex> lock(_network_udp_mutex, std::defer_lock);
if (needs_mutex) lock.lock();
/* Init the packet */
Packet p(PACKET_UDP_CLIENT_FIND_SERVER);
if (_udp_client_socket != nullptr) _udp_client_socket->SendPacket(&p, &address);
}
/**
* Query a specific server.
* @param address The address of the server.
* @param manually Whether the address was entered manually.
*/
void NetworkUDPQueryServer(NetworkAddress address, bool manually)
{
if (address.IsResolved() || !StartNewThread(nullptr, "ottd:udp-query", &DoNetworkUDPQueryServer, std::move(address), true, std::move(manually))) {
DoNetworkUDPQueryServer(address, true, manually);
}
}
///*** Communication with the masterserver ***/
/** Helper class for connecting to the master server. */
class MasterNetworkUDPSocketHandler : public NetworkUDPSocketHandler {
protected:
void Receive_MASTER_ACK_REGISTER(Packet *p, NetworkAddress *client_addr) override;
void Receive_MASTER_SESSION_KEY(Packet *p, NetworkAddress *client_addr) override;
public:
/**
* Create the socket.
* @param addresses The addresses to bind on.
*/
MasterNetworkUDPSocketHandler(NetworkAddressList *addresses) : NetworkUDPSocketHandler(addresses) {}
virtual ~MasterNetworkUDPSocketHandler() {}
};
void MasterNetworkUDPSocketHandler::Receive_MASTER_ACK_REGISTER(Packet *p, NetworkAddress *client_addr)
{
_network_advertise_retries = 0;
DEBUG(net, 2, "[udp] advertising on master server successful (%s)", NetworkAddress::AddressFamilyAsString(client_addr->GetAddress()->ss_family));
/* We are advertised, but we don't want to! */
if (!_settings_client.network.server_advertise) NetworkUDPRemoveAdvertise(false);
}
void MasterNetworkUDPSocketHandler::Receive_MASTER_SESSION_KEY(Packet *p, NetworkAddress *client_addr)
{
_session_key = p->Recv_uint64();
DEBUG(net, 2, "[udp] received new session key from master server (%s)", NetworkAddress::AddressFamilyAsString(client_addr->GetAddress()->ss_family));
}
///*** Communication with clients (we are server) ***/
/** Helper class for handling all server side communication. */
class ServerNetworkUDPSocketHandler : public NetworkUDPSocketHandler {
protected:
void Receive_CLIENT_FIND_SERVER(Packet *p, NetworkAddress *client_addr) override;
void Receive_CLIENT_DETAIL_INFO(Packet *p, NetworkAddress *client_addr) override;
void Receive_CLIENT_GET_NEWGRFS(Packet *p, NetworkAddress *client_addr) override;
public:
/**
* Create the socket.
* @param addresses The addresses to bind on.
*/
ServerNetworkUDPSocketHandler(NetworkAddressList *addresses) : NetworkUDPSocketHandler(addresses) {}
virtual ~ServerNetworkUDPSocketHandler() {}
};
void ServerNetworkUDPSocketHandler::Receive_CLIENT_FIND_SERVER(Packet *p, NetworkAddress *client_addr)
{
/* Just a fail-safe.. should never happen */
if (!_network_udp_server) {
return;
}
NetworkGameInfo ngi;
/* Update some game_info */
ngi.clients_on = _network_game_info.clients_on;
ngi.start_date = ConvertYMDToDate(_settings_game.game_creation.starting_year, 0, 1);
ngi.server_lang = _settings_client.network.server_lang;
ngi.use_password = !StrEmpty(_settings_client.network.server_password);
ngi.clients_max = _settings_client.network.max_clients;
ngi.companies_on = (byte)Company::GetNumItems();
ngi.companies_max = _settings_client.network.max_companies;
ngi.spectators_on = NetworkSpectatorCount();
ngi.spectators_max = _settings_client.network.max_spectators;
ngi.game_date = _date;
ngi.map_width = MapSizeX();
ngi.map_height = MapSizeY();
ngi.map_set = _settings_game.game_creation.landscape;
ngi.dedicated = _network_dedicated;
ngi.grfconfig = _grfconfig;
strecpy(ngi.map_name, _network_game_info.map_name, lastof(ngi.map_name));
strecpy(ngi.server_name, _settings_client.network.server_name, lastof(ngi.server_name));
strecpy(ngi.server_revision, GetNetworkRevisionString(), lastof(ngi.server_revision));
Packet packet(PACKET_UDP_SERVER_RESPONSE);
this->SendNetworkGameInfo(&packet, &ngi);
/* Let the client know that we are here */
this->SendPacket(&packet, client_addr);
DEBUG(net, 2, "[udp] queried from %s", client_addr->GetHostname());
}
void ServerNetworkUDPSocketHandler::Receive_CLIENT_DETAIL_INFO(Packet *p, NetworkAddress *client_addr)
{
/* Just a fail-safe.. should never happen */
if (!_network_udp_server) return;
Packet packet(PACKET_UDP_SERVER_DETAIL_INFO);
/* Send the amount of active companies */
packet.Send_uint8 (NETWORK_COMPANY_INFO_VERSION);
packet.Send_uint8 ((uint8)Company::GetNumItems());
/* Fetch the latest version of the stats */
NetworkCompanyStats company_stats[MAX_COMPANIES];
NetworkPopulateCompanyStats(company_stats);
/* The minimum company information "blob" size. */
static const uint MIN_CI_SIZE = 54;
uint max_cname_length = NETWORK_COMPANY_NAME_LENGTH;
if (Company::GetNumItems() * (MIN_CI_SIZE + NETWORK_COMPANY_NAME_LENGTH) >= (uint)SEND_MTU - packet.size) {
/* Assume we can at least put the company information in the packets. */
assert(Company::GetNumItems() * MIN_CI_SIZE < (uint)SEND_MTU - packet.size);
/* At this moment the company names might not fit in the
* packet. Check whether that is really the case. */
for (;;) {
int free = SEND_MTU - packet.size;
Company *company;
FOR_ALL_COMPANIES(company) {
char company_name[NETWORK_COMPANY_NAME_LENGTH];
SetDParam(0, company->index);
GetString(company_name, STR_COMPANY_NAME, company_name + max_cname_length - 1);
free -= MIN_CI_SIZE;
free -= (int)strlen(company_name);
}
if (free >= 0) break;
/* Try again, with slightly shorter strings. */
assert(max_cname_length > 0);
max_cname_length--;
}
}
Company *company;
/* Go through all the companies */
FOR_ALL_COMPANIES(company) {
/* Send the information */
this->SendCompanyInformation(&packet, company, &company_stats[company->index], max_cname_length);
}
this->SendPacket(&packet, client_addr);
}
/**
* A client has requested the names of some NewGRFs.
*
* Replying this can be tricky as we have a limit of SEND_MTU bytes
* in the reply packet and we can send up to 100 bytes per NewGRF
* (GRF ID, MD5sum and NETWORK_GRF_NAME_LENGTH bytes for the name).
* As SEND_MTU is _much_ less than 100 * NETWORK_MAX_GRF_COUNT, it
* could be that a packet overflows. To stop this we only reply
* with the first N NewGRFs so that if the first N + 1 NewGRFs
* would be sent, the packet overflows.
* in_reply and in_reply_count are used to keep a list of GRFs to
* send in the reply.
*/
void ServerNetworkUDPSocketHandler::Receive_CLIENT_GET_NEWGRFS(Packet *p, NetworkAddress *client_addr)
{
uint8 num_grfs;
uint i;
const GRFConfig *in_reply[NETWORK_MAX_GRF_COUNT];
uint8 in_reply_count = 0;
size_t packet_len = 0;
DEBUG(net, 6, "[udp] newgrf data request from %s", client_addr->GetAddressAsString());
num_grfs = p->Recv_uint8 ();
if (num_grfs > NETWORK_MAX_GRF_COUNT) return;
for (i = 0; i < num_grfs; i++) {
GRFIdentifier c;
const GRFConfig *f;
this->ReceiveGRFIdentifier(p, &c);
/* Find the matching GRF file */
f = FindGRFConfig(c.grfid, FGCM_EXACT, c.md5sum);
if (f == nullptr) continue; // The GRF is unknown to this server
/* If the reply might exceed the size of the packet, only reply
* the current list and do not send the other data.
* The name could be an empty string, if so take the filename. */
packet_len += sizeof(c.grfid) + sizeof(c.md5sum) +
min(strlen(f->GetName()) + 1, (size_t)NETWORK_GRF_NAME_LENGTH);
if (packet_len > SEND_MTU - 4) { // 4 is 3 byte header + grf count in reply
break;
}
in_reply[in_reply_count] = f;
in_reply_count++;
}
if (in_reply_count == 0) return;
Packet packet(PACKET_UDP_SERVER_NEWGRFS);
packet.Send_uint8(in_reply_count);
for (i = 0; i < in_reply_count; i++) {
char name[NETWORK_GRF_NAME_LENGTH];
/* The name could be an empty string, if so take the filename */
strecpy(name, in_reply[i]->GetName(), lastof(name));
this->SendGRFIdentifier(&packet, &in_reply[i]->ident);
packet.Send_string(name);
}
this->SendPacket(&packet, client_addr);
}
///*** Communication with servers (we are client) ***/
/** Helper class for handling all client side communication. */
class ClientNetworkUDPSocketHandler : public NetworkUDPSocketHandler {
protected:
void Receive_SERVER_RESPONSE(Packet *p, NetworkAddress *client_addr) override;
void Receive_MASTER_RESPONSE_LIST(Packet *p, NetworkAddress *client_addr) override;
void Receive_SERVER_NEWGRFS(Packet *p, NetworkAddress *client_addr) override;
void HandleIncomingNetworkGameInfoGRFConfig(GRFConfig *config) override;
public:
virtual ~ClientNetworkUDPSocketHandler() {}
};
void ClientNetworkUDPSocketHandler::Receive_SERVER_RESPONSE(Packet *p, NetworkAddress *client_addr)
{
NetworkGameList *item;
/* Just a fail-safe.. should never happen */
if (_network_udp_server) return;
DEBUG(net, 4, "[udp] server response from %s", client_addr->GetAddressAsString());
/* Find next item */
item = NetworkGameListAddItem(*client_addr);
ClearGRFConfigList(&item->info.grfconfig);
this->ReceiveNetworkGameInfo(p, &item->info);
item->info.compatible = true;
{
/* Checks whether there needs to be a request for names of GRFs and makes
* the request if necessary. GRFs that need to be requested are the GRFs
* that do not exist on the clients system and we do not have the name
* resolved of, i.e. the name is still UNKNOWN_GRF_NAME_PLACEHOLDER.
* The in_request array and in_request_count are used so there is no need
* to do a second loop over the GRF list, which can be relatively expensive
* due to the string comparisons. */
const GRFConfig *in_request[NETWORK_MAX_GRF_COUNT];
const GRFConfig *c;
uint in_request_count = 0;
for (c = item->info.grfconfig; c != nullptr; c = c->next) {
if (c->status == GCS_NOT_FOUND) item->info.compatible = false;
if (c->status != GCS_NOT_FOUND || strcmp(c->GetName(), UNKNOWN_GRF_NAME_PLACEHOLDER) != 0) continue;
in_request[in_request_count] = c;
in_request_count++;
}
if (in_request_count > 0) {
/* There are 'unknown' GRFs, now send a request for them */
uint i;
Packet packet(PACKET_UDP_CLIENT_GET_NEWGRFS);
packet.Send_uint8(in_request_count);
for (i = 0; i < in_request_count; i++) {
this->SendGRFIdentifier(&packet, &in_request[i]->ident);
}
this->SendPacket(&packet, &item->address);
}
}
if (item->info.hostname[0] == '\0') {
seprintf(item->info.hostname, lastof(item->info.hostname), "%s", client_addr->GetHostname());
}
if (client_addr->GetAddress()->ss_family == AF_INET6) {
strecat(item->info.server_name, " (IPv6)", lastof(item->info.server_name));
}
/* Check if we are allowed on this server based on the revision-match */
item->info.version_compatible = IsNetworkCompatibleVersion(item->info.server_revision);
item->info.compatible &= item->info.version_compatible; // Already contains match for GRFs
item->online = true;
UpdateNetworkGameWindow();
}
void ClientNetworkUDPSocketHandler::Receive_MASTER_RESPONSE_LIST(Packet *p, NetworkAddress *client_addr)
{
/* packet begins with the protocol version (uint8)
* then an uint16 which indicates how many
* ip:port pairs are in this packet, after that
* an uint32 (ip) and an uint16 (port) for each pair.
*/
ServerListType type = (ServerListType)(p->Recv_uint8() - 1);
if (type < SLT_END) {
for (int i = p->Recv_uint16(); i != 0 ; i--) {
sockaddr_storage addr_storage;
memset(&addr_storage, 0, sizeof(addr_storage));
if (type == SLT_IPv4) {
addr_storage.ss_family = AF_INET;
((sockaddr_in*)&addr_storage)->sin_addr.s_addr = TO_LE32(p->Recv_uint32());
} else {
assert(type == SLT_IPv6);
addr_storage.ss_family = AF_INET6;
byte *addr = (byte*)&((sockaddr_in6*)&addr_storage)->sin6_addr;
for (uint i = 0; i < sizeof(in6_addr); i++) *addr++ = p->Recv_uint8();
}
NetworkAddress addr(addr_storage, type == SLT_IPv4 ? sizeof(sockaddr_in) : sizeof(sockaddr_in6));
addr.SetPort(p->Recv_uint16());
/* Somehow we reached the end of the packet */
if (this->HasClientQuit()) return;
DoNetworkUDPQueryServer(addr, false, false);
}
}
}
/** The return of the client's request of the names of some NewGRFs */
void ClientNetworkUDPSocketHandler::Receive_SERVER_NEWGRFS(Packet *p, NetworkAddress *client_addr)
{
uint8 num_grfs;
uint i;
DEBUG(net, 6, "[udp] newgrf data reply from %s", client_addr->GetAddressAsString());
num_grfs = p->Recv_uint8 ();
if (num_grfs > NETWORK_MAX_GRF_COUNT) return;
for (i = 0; i < num_grfs; i++) {
char name[NETWORK_GRF_NAME_LENGTH];
GRFIdentifier c;
this->ReceiveGRFIdentifier(p, &c);
p->Recv_string(name, sizeof(name));
/* An empty name is not possible under normal circumstances
* and causes problems when showing the NewGRF list. */
if (StrEmpty(name)) continue;
/* Try to find the GRFTextWrapper for the name of this GRF ID and MD5sum tuple.
* If it exists and not resolved yet, then name of the fake GRF is
* overwritten with the name from the reply. */
GRFTextWrapper *unknown_name = FindUnknownGRFName(c.grfid, c.md5sum, false);
if (unknown_name != nullptr && strcmp(GetGRFStringFromGRFText(unknown_name->text), UNKNOWN_GRF_NAME_PLACEHOLDER) == 0) {
AddGRFTextToList(&unknown_name->text, name);
}
}
}
void ClientNetworkUDPSocketHandler::HandleIncomingNetworkGameInfoGRFConfig(GRFConfig *config)
{
/* Find the matching GRF file */
const GRFConfig *f = FindGRFConfig(config->ident.grfid, FGCM_EXACT, config->ident.md5sum);
if (f == nullptr) {
/* Don't know the GRF, so mark game incompatible and the (possibly)
* already resolved name for this GRF (another server has sent the
* name of the GRF already */
config->name->Release();
config->name = FindUnknownGRFName(config->ident.grfid, config->ident.md5sum, true);
config->name->AddRef();
config->status = GCS_NOT_FOUND;
} else {
config->filename = f->filename;
config->name->Release();
config->name = f->name;
config->name->AddRef();
config->info->Release();
config->info = f->info;
config->info->AddRef();
config->url->Release();
config->url = f->url;
config->url->AddRef();
}
SetBit(config->flags, GCF_COPY);
}
/** Broadcast to all ips */
static void NetworkUDPBroadCast(NetworkUDPSocketHandler *socket)
{
for (NetworkAddress &addr : _broadcast_list) {
Packet p(PACKET_UDP_CLIENT_FIND_SERVER);
DEBUG(net, 4, "[udp] broadcasting to %s", addr.GetHostname());
socket->SendPacket(&p, &addr, true, true);
}
}
/** Request the the server-list from the master server */
void NetworkUDPQueryMasterServer()
{
Packet p(PACKET_UDP_CLIENT_GET_LIST);
NetworkAddress out_addr(NETWORK_MASTER_SERVER_HOST, NETWORK_MASTER_SERVER_PORT);
/* packet only contains protocol version */
p.Send_uint8(NETWORK_MASTER_SERVER_VERSION);
p.Send_uint8(SLT_AUTODETECT);
_udp_client_socket->SendPacket(&p, &out_addr, true);
DEBUG(net, 2, "[udp] master server queried at %s", out_addr.GetAddressAsString());
}
/** Find all servers */
void NetworkUDPSearchGame()
{
/* We are still searching.. */
if (_network_udp_broadcast > 0) return;
DEBUG(net, 0, "[udp] searching server");
NetworkUDPBroadCast(_udp_client_socket);
_network_udp_broadcast = 300; // Stay searching for 300 ticks
}
/**
* Thread entry point for de-advertising.
*/
static void NetworkUDPRemoveAdvertiseThread()
{
DEBUG(net, 1, "[udp] removing advertise from master server");
/* Find somewhere to send */
NetworkAddress out_addr(NETWORK_MASTER_SERVER_HOST, NETWORK_MASTER_SERVER_PORT);
/* Send the packet */
Packet p(PACKET_UDP_SERVER_UNREGISTER);
/* Packet is: Version, server_port */
p.Send_uint8 (NETWORK_MASTER_SERVER_VERSION);
p.Send_uint16(_settings_client.network.server_port);
std::lock_guard<std::mutex> lock(_network_udp_mutex);
if (_udp_master_socket != nullptr) _udp_master_socket->SendPacket(&p, &out_addr, true);
}
/**
* Remove our advertise from the master-server.
* @param blocking whether to wait until the removal has finished.
*/
void NetworkUDPRemoveAdvertise(bool blocking)
{
/* Check if we are advertising */
if (!_networking || !_network_server || !_network_udp_server) return;
if (blocking || !StartNewThread(nullptr, "ottd:udp-advert", &NetworkUDPRemoveAdvertiseThread)) {
NetworkUDPRemoveAdvertiseThread();
}
}
/**
* Thread entry point for advertising.
*/
static void NetworkUDPAdvertiseThread()
{
/* Find somewhere to send */
NetworkAddress out_addr(NETWORK_MASTER_SERVER_HOST, NETWORK_MASTER_SERVER_PORT);
DEBUG(net, 1, "[udp] advertising to master server");
/* Add a bit more messaging when we cannot get a session key */
static byte session_key_retries = 0;
if (_session_key == 0 && session_key_retries++ == 2) {
DEBUG(net, 0, "[udp] advertising to the master server is failing");
DEBUG(net, 0, "[udp] we are not receiving the session key from the server");
DEBUG(net, 0, "[udp] please allow udp packets from %s to you to be delivered", out_addr.GetAddressAsString(false));
DEBUG(net, 0, "[udp] please allow udp packets from you to %s to be delivered", out_addr.GetAddressAsString(false));
}
if (_session_key != 0 && _network_advertise_retries == 0) {
DEBUG(net, 0, "[udp] advertising to the master server is failing");
DEBUG(net, 0, "[udp] we are not receiving the acknowledgement from the server");
DEBUG(net, 0, "[udp] this usually means that the master server cannot reach us");
DEBUG(net, 0, "[udp] please allow udp and tcp packets to port %u to be delivered", _settings_client.network.server_port);
DEBUG(net, 0, "[udp] please allow udp and tcp packets from port %u to be delivered", _settings_client.network.server_port);
}
/* Send the packet */
Packet p(PACKET_UDP_SERVER_REGISTER);
/* Packet is: WELCOME_MESSAGE, Version, server_port */
p.Send_string(NETWORK_MASTER_SERVER_WELCOME_MESSAGE);
p.Send_uint8 (NETWORK_MASTER_SERVER_VERSION);
p.Send_uint16(_settings_client.network.server_port);
p.Send_uint64(_session_key);
std::lock_guard<std::mutex> lock(_network_udp_mutex);
if (_udp_master_socket != nullptr) _udp_master_socket->SendPacket(&p, &out_addr, true);
}
/**
* Register us to the master server
* This function checks if it needs to send an advertise
*/
void NetworkUDPAdvertise()
{
static uint32 _last_advertisement = 0; ///< The time of the last advertisement (used to check for wrapping of time)
static uint32 _next_advertisement = 0; ///< The next time we should perform a normal advertisement.
static uint32 _next_retry = 0; ///< The next time we should perform a retry of an advertisement.
/* Check if we should send an advertise */
if (!_networking || !_network_server || !_network_udp_server || !_settings_client.network.server_advertise) return;
if (_network_need_advertise || _realtime_tick < _last_advertisement) {
/* Forced advertisement, or a wrapping of time in which case we determine the advertisement/retry times again. */
_network_need_advertise = false;
_network_advertise_retries = ADVERTISE_RETRY_TIMES;
} else {
/* Only send once every ADVERTISE_NORMAL_INTERVAL ticks */
if (_network_advertise_retries == 0) {
if (_realtime_tick <= _next_advertisement) return;
_network_advertise_retries = ADVERTISE_RETRY_TIMES;
} else {
/* An actual retry. */
if (_realtime_tick <= _next_retry) return;
}
}
_network_advertise_retries--;
_last_advertisement = _realtime_tick;
_next_advertisement = _realtime_tick + ADVERTISE_NORMAL_INTERVAL;
_next_retry = _realtime_tick + ADVERTISE_RETRY_INTERVAL;
/* Make sure we do not have an overflow when checking these; when time wraps, we simply force an advertisement. */
if (_next_advertisement < _last_advertisement) _next_advertisement = UINT32_MAX;
if (_next_retry < _last_advertisement) _next_retry = UINT32_MAX;
if (!StartNewThread(nullptr, "ottd:udp-advert", &NetworkUDPAdvertiseThread)) {
NetworkUDPAdvertiseThread();
}
}
/** Initialize the whole UDP bit. */
void NetworkUDPInitialize()
{
/* If not closed, then do it. */
if (_udp_server_socket != nullptr) NetworkUDPClose();
DEBUG(net, 1, "[udp] initializing listeners");
assert(_udp_client_socket == nullptr && _udp_server_socket == nullptr && _udp_master_socket == nullptr);
std::lock_guard<std::mutex> lock(_network_udp_mutex);
_udp_client_socket = new ClientNetworkUDPSocketHandler();
NetworkAddressList server;
GetBindAddresses(&server, _settings_client.network.server_port);
_udp_server_socket = new ServerNetworkUDPSocketHandler(&server);
server.clear();
GetBindAddresses(&server, 0);
_udp_master_socket = new MasterNetworkUDPSocketHandler(&server);
_network_udp_server = false;
_network_udp_broadcast = 0;
}
/** Close all UDP related stuff. */
void NetworkUDPClose()
{
std::lock_guard<std::mutex> lock(_network_udp_mutex);
_udp_server_socket->Close();
_udp_master_socket->Close();
_udp_client_socket->Close();
delete _udp_client_socket;
delete _udp_server_socket;
delete _udp_master_socket;
_udp_client_socket = nullptr;
_udp_server_socket = nullptr;
_udp_master_socket = nullptr;
_network_udp_server = false;
_network_udp_broadcast = 0;
DEBUG(net, 1, "[udp] closed listeners");
}
/** Receive the UDP packets. */
void NetworkBackgroundUDPLoop()
{
std::lock_guard<std::mutex> lock(_network_udp_mutex);
if (_network_udp_server) {
_udp_server_socket->ReceivePackets();
_udp_master_socket->ReceivePackets();
} else {
_udp_client_socket->ReceivePackets();
if (_network_udp_broadcast > 0) _network_udp_broadcast--;
}
}
|