2012-04-21 21:13:50 +00:00
|
|
|
/* RetroArch - A frontend for libretro.
|
2014-01-01 00:50:59 +00:00
|
|
|
* Copyright (C) 2010-2014 - Hans-Kristian Arntzen
|
2016-01-10 03:06:50 +00:00
|
|
|
* Copyright (C) 2011-2016 - Daniel De Matteis
|
2011-02-13 15:40:24 +00:00
|
|
|
*
|
2012-04-21 21:13:50 +00:00
|
|
|
* RetroArch is free software: you can redistribute it and/or modify it under the terms
|
2011-02-13 15:40:24 +00:00
|
|
|
* of the GNU General Public License as published by the Free Software Found-
|
|
|
|
* ation, either version 3 of the License, or (at your option) any later version.
|
|
|
|
*
|
2012-04-21 21:13:50 +00:00
|
|
|
* RetroArch is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
|
2011-02-13 15:40:24 +00:00
|
|
|
* without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE. See the GNU General Public License for more details.
|
|
|
|
*
|
2012-04-21 21:31:57 +00:00
|
|
|
* You should have received a copy of the GNU General Public License along with RetroArch.
|
2011-02-13 15:40:24 +00:00
|
|
|
* If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2011-12-04 17:03:08 +00:00
|
|
|
|
2012-11-15 13:32:06 +00:00
|
|
|
#if defined(_MSC_VER) && !defined(_XBOX)
|
2012-11-15 08:40:31 +00:00
|
|
|
#pragma comment(lib, "ws2_32")
|
2012-11-14 20:01:40 +00:00
|
|
|
#endif
|
|
|
|
|
2015-11-17 23:18:04 +00:00
|
|
|
#include <assert.h>
|
2015-03-20 16:56:00 +00:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2015-09-04 19:11:00 +00:00
|
|
|
|
2015-03-20 16:56:00 +00:00
|
|
|
#include <net/net_compat.h>
|
2016-05-01 19:18:45 +00:00
|
|
|
#include <net/net_socket.h>
|
2015-09-14 01:33:50 +00:00
|
|
|
#include <retro_endianness.h>
|
2015-09-04 19:11:00 +00:00
|
|
|
|
2015-12-23 20:25:28 +00:00
|
|
|
#include "netplay_private.h"
|
2015-12-05 15:41:00 +00:00
|
|
|
|
2016-09-03 05:48:25 +00:00
|
|
|
#include "../../command.h"
|
2016-09-03 05:45:51 +00:00
|
|
|
#include "../../movie.h"
|
2016-09-03 05:51:11 +00:00
|
|
|
#include "../../runloop.h"
|
2016-09-03 05:45:51 +00:00
|
|
|
|
2015-12-05 15:41:00 +00:00
|
|
|
enum
|
|
|
|
{
|
|
|
|
CMD_OPT_ALLOWED_IN_SPECTATE_MODE = 0x1,
|
|
|
|
CMD_OPT_REQUIRE_ACK = 0x2,
|
|
|
|
CMD_OPT_HOST_ONLY = 0x4,
|
|
|
|
CMD_OPT_CLIENT_ONLY = 0x8,
|
|
|
|
CMD_OPT_REQUIRE_SYNC = 0x10
|
|
|
|
};
|
|
|
|
|
2015-12-26 07:10:37 +00:00
|
|
|
void *netplay_data;
|
|
|
|
|
2015-01-09 17:34:00 +00:00
|
|
|
/**
|
|
|
|
* warn_hangup:
|
|
|
|
*
|
|
|
|
* Warns that netplay has disconnected.
|
|
|
|
**/
|
2011-10-05 19:44:17 +00:00
|
|
|
static void warn_hangup(void)
|
|
|
|
{
|
2012-04-21 21:25:32 +00:00
|
|
|
RARCH_WARN("Netplay has disconnected. Will continue without connection ...\n");
|
2015-12-07 14:32:14 +00:00
|
|
|
runloop_msg_queue_push("Netplay has disconnected. Will continue without connection.", 0, 480, false);
|
2011-10-05 19:44:17 +00:00
|
|
|
}
|
|
|
|
|
2015-11-17 23:18:04 +00:00
|
|
|
/**
|
|
|
|
* check_netplay_synched:
|
|
|
|
* @netplay: pointer to the netplay object.
|
|
|
|
* Checks to see if the host and client have synchronized states. Returns true
|
|
|
|
* on success and false on failure.
|
|
|
|
*/
|
|
|
|
bool check_netplay_synched(netplay_t* netplay)
|
|
|
|
{
|
|
|
|
assert(netplay);
|
|
|
|
return netplay->frame_count < (netplay->flip_frame + 2 * UDP_FRAME_PACKETS);
|
|
|
|
}
|
2015-11-17 03:21:12 +00:00
|
|
|
|
2015-12-24 18:23:46 +00:00
|
|
|
static bool netplay_info_cb(netplay_t* netplay, unsigned frames) {
|
2015-12-23 20:25:28 +00:00
|
|
|
return netplay->net_cbs->info_cb(netplay, frames);
|
|
|
|
}
|
|
|
|
|
2015-01-09 17:34:00 +00:00
|
|
|
/**
|
|
|
|
* netplay_should_skip:
|
|
|
|
* @netplay : pointer to netplay object
|
|
|
|
*
|
|
|
|
* If we're fast-forward replaying to resync, check if we
|
|
|
|
* should actually show frame.
|
|
|
|
*
|
|
|
|
* Returns: bool (1) if we should skip this frame, otherwise
|
|
|
|
* false (0).
|
|
|
|
**/
|
2015-01-09 02:21:47 +00:00
|
|
|
static bool netplay_should_skip(netplay_t *netplay)
|
2011-02-13 15:40:24 +00:00
|
|
|
{
|
2015-01-09 02:21:47 +00:00
|
|
|
if (!netplay)
|
|
|
|
return false;
|
|
|
|
return netplay->is_replay && netplay->has_connection;
|
2011-02-13 15:40:24 +00:00
|
|
|
}
|
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
static bool netplay_can_poll(netplay_t *netplay)
|
2011-02-13 15:40:24 +00:00
|
|
|
{
|
2015-01-09 02:21:47 +00:00
|
|
|
if (!netplay)
|
|
|
|
return false;
|
|
|
|
return netplay->can_poll;
|
2011-02-13 15:40:24 +00:00
|
|
|
}
|
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
static bool send_chunk(netplay_t *netplay)
|
2011-02-13 15:40:24 +00:00
|
|
|
{
|
2015-01-09 02:21:47 +00:00
|
|
|
const struct sockaddr *addr = NULL;
|
2015-01-09 17:34:00 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
if (netplay->addr)
|
|
|
|
addr = netplay->addr->ai_addr;
|
|
|
|
else if (netplay->has_client_addr)
|
|
|
|
addr = (const struct sockaddr*)&netplay->their_addr;
|
2011-02-13 15:40:24 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
if (addr)
|
|
|
|
{
|
2015-12-04 10:03:21 +00:00
|
|
|
ssize_t bytes_sent;
|
|
|
|
|
|
|
|
#ifdef HAVE_IPV6
|
|
|
|
bytes_sent = (sendto(netplay->udp_fd, (const char*)netplay->packet_buffer,
|
2015-01-09 02:21:47 +00:00
|
|
|
sizeof(netplay->packet_buffer), 0, addr,
|
2015-12-04 10:03:21 +00:00
|
|
|
sizeof(struct sockaddr_in6)));
|
2015-09-15 03:48:05 +00:00
|
|
|
#else
|
2015-12-04 10:03:21 +00:00
|
|
|
bytes_sent = (sendto(netplay->udp_fd, (const char*)netplay->packet_buffer,
|
|
|
|
sizeof(netplay->packet_buffer), 0, addr,
|
|
|
|
sizeof(struct sockaddr_in)));
|
2015-09-15 03:48:05 +00:00
|
|
|
#endif
|
2015-12-04 10:03:21 +00:00
|
|
|
|
|
|
|
if (bytes_sent != sizeof(netplay->packet_buffer))
|
2015-01-09 02:21:47 +00:00
|
|
|
{
|
|
|
|
warn_hangup();
|
|
|
|
netplay->has_connection = false;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
2012-04-07 09:55:37 +00:00
|
|
|
}
|
|
|
|
|
2015-01-09 17:34:00 +00:00
|
|
|
/**
|
|
|
|
* get_self_input_state:
|
|
|
|
* @netplay : pointer to netplay object
|
|
|
|
*
|
|
|
|
* Grab our own input state and send this over the network.
|
|
|
|
*
|
|
|
|
* Returns: true (1) if successful, otherwise false (0).
|
|
|
|
**/
|
2015-01-09 02:21:47 +00:00
|
|
|
static bool get_self_input_state(netplay_t *netplay)
|
2011-02-13 15:40:24 +00:00
|
|
|
{
|
2016-01-26 20:46:38 +00:00
|
|
|
uint32_t state[UDP_WORDS_PER_FRAME - 1] = {0};
|
|
|
|
struct delta_frame *ptr = &netplay->buffer[netplay->self_ptr];
|
2011-02-13 15:40:24 +00:00
|
|
|
|
2016-05-08 21:12:04 +00:00
|
|
|
if (!input_driver_is_libretro_input_blocked() && netplay->frame_count > 0)
|
2012-01-11 19:50:21 +00:00
|
|
|
{
|
2015-09-29 16:08:33 +00:00
|
|
|
unsigned i;
|
2016-05-08 21:12:04 +00:00
|
|
|
settings_t *settings = config_get_ptr();
|
2015-09-29 16:08:33 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
/* First frame we always give zero input since relying on
|
|
|
|
* input from first frame screws up when we use -F 0. */
|
|
|
|
retro_input_state_t cb = netplay->cbs.state_cb;
|
2015-11-17 04:02:15 +00:00
|
|
|
for (i = 0; i < RARCH_FIRST_CUSTOM_BIND; i++)
|
|
|
|
{
|
|
|
|
int16_t tmp = cb(settings->input.netplay_client_swap_input ?
|
|
|
|
0 : !netplay->port,
|
|
|
|
RETRO_DEVICE_JOYPAD, 0, i);
|
2016-01-26 20:46:38 +00:00
|
|
|
state[0] |= tmp ? 1 << i : 0;
|
2015-11-17 04:02:15 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 20:46:38 +00:00
|
|
|
for (i = 0; i < 2; i++)
|
2015-01-09 02:21:47 +00:00
|
|
|
{
|
2016-01-26 20:46:38 +00:00
|
|
|
int16_t tmp_x = cb(settings->input.netplay_client_swap_input ?
|
|
|
|
0 : !netplay->port,
|
|
|
|
RETRO_DEVICE_ANALOG, i, 0);
|
|
|
|
int16_t tmp_y = cb(settings->input.netplay_client_swap_input ?
|
2015-01-09 02:21:47 +00:00
|
|
|
0 : !netplay->port,
|
2016-01-26 20:46:38 +00:00
|
|
|
RETRO_DEVICE_ANALOG, i, 1);
|
|
|
|
state[1 + i] = (uint16_t)tmp_x | (((uint16_t)tmp_y) << 16);
|
2015-01-09 02:21:47 +00:00
|
|
|
}
|
|
|
|
}
|
2012-01-11 19:50:21 +00:00
|
|
|
|
2016-01-26 20:46:38 +00:00
|
|
|
/* Here we construct the payload format:
|
|
|
|
* frame {
|
|
|
|
* uint32_t frame_number
|
|
|
|
* uint32_t RETRO_DEVICE_JOYPAD state (top 16 bits zero)
|
|
|
|
* uint32_t ANALOG state[0]
|
|
|
|
* uint32_t ANALOG state[1]
|
|
|
|
* }
|
|
|
|
*
|
|
|
|
* payload {
|
|
|
|
* ; To compat packet losses, send input in a sliding window
|
|
|
|
* frame redundancy_frames[UDP_FRAME_PACKETS];
|
|
|
|
* }
|
|
|
|
*/
|
|
|
|
memmove(netplay->packet_buffer, netplay->packet_buffer + UDP_WORDS_PER_FRAME,
|
|
|
|
sizeof (netplay->packet_buffer) - UDP_WORDS_PER_FRAME * sizeof(uint32_t));
|
|
|
|
netplay->packet_buffer[(UDP_FRAME_PACKETS - 1) * UDP_WORDS_PER_FRAME] = htonl(netplay->frame_count);
|
|
|
|
netplay->packet_buffer[(UDP_FRAME_PACKETS - 1) * UDP_WORDS_PER_FRAME + 1] = htonl(state[0]);
|
|
|
|
netplay->packet_buffer[(UDP_FRAME_PACKETS - 1) * UDP_WORDS_PER_FRAME + 2] = htonl(state[1]);
|
|
|
|
netplay->packet_buffer[(UDP_FRAME_PACKETS - 1) * UDP_WORDS_PER_FRAME + 3] = htonl(state[2]);
|
2012-01-21 13:58:39 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
if (!send_chunk(netplay))
|
2012-01-11 19:50:21 +00:00
|
|
|
{
|
2015-01-09 02:21:47 +00:00
|
|
|
warn_hangup();
|
|
|
|
netplay->has_connection = false;
|
|
|
|
return false;
|
2012-01-11 19:50:21 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 20:46:38 +00:00
|
|
|
memcpy(ptr->self_state, state, sizeof(state));
|
2015-04-11 00:49:30 +00:00
|
|
|
netplay->self_ptr = NEXT_PTR(netplay->self_ptr);
|
2015-01-09 02:21:47 +00:00
|
|
|
return true;
|
|
|
|
}
|
2012-01-11 19:50:21 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
static bool netplay_cmd_ack(netplay_t *netplay)
|
|
|
|
{
|
|
|
|
uint32_t cmd = htonl(NETPLAY_CMD_ACK);
|
2016-05-01 21:17:17 +00:00
|
|
|
return socket_send_all_blocking(netplay->fd, &cmd, sizeof(cmd), false);
|
2012-01-11 19:50:21 +00:00
|
|
|
}
|
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
static bool netplay_cmd_nak(netplay_t *netplay)
|
2012-05-31 18:34:33 +00:00
|
|
|
{
|
2015-01-09 02:21:47 +00:00
|
|
|
uint32_t cmd = htonl(NETPLAY_CMD_NAK);
|
2016-05-01 21:17:17 +00:00
|
|
|
return socket_send_all_blocking(netplay->fd, &cmd, sizeof(cmd), false);
|
2015-01-09 02:21:47 +00:00
|
|
|
}
|
2012-05-31 18:34:33 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
static bool netplay_get_response(netplay_t *netplay)
|
|
|
|
{
|
|
|
|
uint32_t response;
|
2015-01-23 18:43:40 +00:00
|
|
|
if (!socket_receive_all_blocking(netplay->fd, &response, sizeof(response)))
|
2015-01-09 02:21:47 +00:00
|
|
|
return false;
|
|
|
|
|
|
|
|
return ntohl(response) == NETPLAY_CMD_ACK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool netplay_get_cmd(netplay_t *netplay)
|
|
|
|
{
|
2015-11-18 00:45:24 +00:00
|
|
|
uint32_t cmd;
|
|
|
|
uint32_t flip_frame;
|
2015-01-09 02:21:47 +00:00
|
|
|
size_t cmd_size;
|
|
|
|
|
2015-01-23 18:43:40 +00:00
|
|
|
if (!socket_receive_all_blocking(netplay->fd, &cmd, sizeof(cmd)))
|
2015-01-09 02:21:47 +00:00
|
|
|
return false;
|
|
|
|
|
2015-12-04 13:30:59 +00:00
|
|
|
cmd = ntohl(cmd);
|
2015-01-09 02:21:47 +00:00
|
|
|
|
|
|
|
cmd_size = cmd & 0xffff;
|
2015-03-16 01:17:04 +00:00
|
|
|
cmd = cmd >> 16;
|
2015-01-09 02:21:47 +00:00
|
|
|
|
|
|
|
switch (cmd)
|
2012-05-31 18:34:33 +00:00
|
|
|
{
|
2015-01-09 02:21:47 +00:00
|
|
|
case NETPLAY_CMD_FLIP_PLAYERS:
|
|
|
|
if (cmd_size != sizeof(uint32_t))
|
|
|
|
{
|
2016-06-28 10:08:30 +00:00
|
|
|
RARCH_ERR("CMD_FLIP_PLAYERS received an unexpected command size.\n");
|
2015-01-09 02:21:47 +00:00
|
|
|
return netplay_cmd_nak(netplay);
|
|
|
|
}
|
2012-05-31 18:34:33 +00:00
|
|
|
|
2016-02-03 16:00:43 +00:00
|
|
|
if (!socket_receive_all_blocking(
|
|
|
|
netplay->fd, &flip_frame, sizeof(flip_frame)))
|
2015-01-09 02:21:47 +00:00
|
|
|
{
|
|
|
|
RARCH_ERR("Failed to receive CMD_FLIP_PLAYERS argument.\n");
|
|
|
|
return netplay_cmd_nak(netplay);
|
|
|
|
}
|
2012-05-31 18:34:33 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
flip_frame = ntohl(flip_frame);
|
|
|
|
|
|
|
|
if (flip_frame < netplay->flip_frame)
|
2015-01-09 02:00:24 +00:00
|
|
|
{
|
2015-01-09 02:21:47 +00:00
|
|
|
RARCH_ERR("Host asked us to flip users in the past. Not possible ...\n");
|
|
|
|
return netplay_cmd_nak(netplay);
|
2015-01-09 02:00:24 +00:00
|
|
|
}
|
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
netplay->flip ^= true;
|
|
|
|
netplay->flip_frame = flip_frame;
|
2012-05-31 18:34:33 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
RARCH_LOG("Netplay users are flipped.\n");
|
2015-12-07 14:32:14 +00:00
|
|
|
runloop_msg_queue_push("Netplay users are flipped.", 1, 180, false);
|
2015-01-09 02:21:47 +00:00
|
|
|
|
|
|
|
return netplay_cmd_ack(netplay);
|
|
|
|
|
2015-11-17 23:18:04 +00:00
|
|
|
case NETPLAY_CMD_SPECTATE:
|
|
|
|
RARCH_ERR("NETPLAY_CMD_SPECTATE unimplemented.\n");
|
|
|
|
return netplay_cmd_nak(netplay);
|
|
|
|
|
|
|
|
case NETPLAY_CMD_DISCONNECT:
|
|
|
|
warn_hangup();
|
|
|
|
return netplay_cmd_ack(netplay);
|
|
|
|
|
|
|
|
case NETPLAY_CMD_LOAD_SAVESTATE:
|
|
|
|
RARCH_ERR("NETPLAY_CMD_LOAD_SAVESTATE unimplemented.\n");
|
|
|
|
return netplay_cmd_nak(netplay);
|
|
|
|
|
|
|
|
case NETPLAY_CMD_PAUSE:
|
2016-05-09 18:51:53 +00:00
|
|
|
command_event(CMD_EVENT_PAUSE, NULL);
|
2015-11-17 23:18:04 +00:00
|
|
|
return netplay_cmd_ack(netplay);
|
|
|
|
|
|
|
|
case NETPLAY_CMD_RESUME:
|
2016-05-09 18:51:53 +00:00
|
|
|
command_event(CMD_EVENT_UNPAUSE, NULL);
|
2015-11-17 23:18:04 +00:00
|
|
|
return netplay_cmd_ack(netplay);
|
|
|
|
|
|
|
|
default: break;
|
2012-05-31 18:34:33 +00:00
|
|
|
}
|
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
RARCH_ERR("Unknown netplay command received.\n");
|
|
|
|
return netplay_cmd_nak(netplay);
|
2012-05-31 18:34:33 +00:00
|
|
|
}
|
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
#define MAX_RETRIES 16
|
|
|
|
#define RETRY_MS 500
|
|
|
|
|
|
|
|
static int poll_input(netplay_t *netplay, bool block)
|
2011-02-13 15:40:24 +00:00
|
|
|
{
|
2016-02-03 16:00:43 +00:00
|
|
|
int max_fd = (netplay->fd > netplay->udp_fd ?
|
|
|
|
netplay->fd : netplay->udp_fd) + 1;
|
2015-04-11 00:49:30 +00:00
|
|
|
struct timeval tv = {0};
|
2015-03-16 01:17:04 +00:00
|
|
|
tv.tv_sec = 0;
|
|
|
|
tv.tv_usec = block ? (RETRY_MS * 1000) : 0;
|
2015-01-09 02:21:47 +00:00
|
|
|
|
|
|
|
do
|
|
|
|
{
|
2015-01-23 19:01:25 +00:00
|
|
|
fd_set fds;
|
2015-01-09 02:21:47 +00:00
|
|
|
/* select() does not take pointer to const struct timeval.
|
|
|
|
* Technically possible for select() to modify tmp_tv, so
|
|
|
|
* we go paranoia mode. */
|
|
|
|
struct timeval tmp_tv = tv;
|
|
|
|
|
2015-01-23 19:01:25 +00:00
|
|
|
netplay->timeout_cnt++;
|
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
FD_ZERO(&fds);
|
|
|
|
FD_SET(netplay->udp_fd, &fds);
|
|
|
|
FD_SET(netplay->fd, &fds);
|
|
|
|
|
2015-01-23 10:44:13 +00:00
|
|
|
if (socket_select(max_fd, &fds, NULL, NULL, &tmp_tv) < 0)
|
2015-01-09 02:21:47 +00:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* Somewhat hacky,
|
|
|
|
* but we aren't using the TCP connection for anything useful atm. */
|
|
|
|
if (FD_ISSET(netplay->fd, &fds) && !netplay_get_cmd(netplay))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (FD_ISSET(netplay->udp_fd, &fds))
|
|
|
|
return 1;
|
|
|
|
|
2015-01-23 19:01:25 +00:00
|
|
|
if (!block)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (!send_chunk(netplay))
|
2015-01-09 02:21:47 +00:00
|
|
|
{
|
|
|
|
warn_hangup();
|
|
|
|
netplay->has_connection = false;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-23 19:01:25 +00:00
|
|
|
RARCH_LOG("Network is stalling, resending packet... Count %u of %d ...\n",
|
|
|
|
netplay->timeout_cnt, MAX_RETRIES);
|
2015-01-09 02:21:47 +00:00
|
|
|
} while ((netplay->timeout_cnt < MAX_RETRIES) && block);
|
|
|
|
|
|
|
|
if (block)
|
|
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool receive_data(netplay_t *netplay, uint32_t *buffer, size_t size)
|
|
|
|
{
|
|
|
|
socklen_t addrlen = sizeof(netplay->their_addr);
|
|
|
|
|
2015-01-23 10:30:13 +00:00
|
|
|
if (recvfrom(netplay->udp_fd, (char*)buffer, size, 0,
|
2015-01-09 02:21:47 +00:00
|
|
|
(struct sockaddr*)&netplay->their_addr, &addrlen) != (ssize_t)size)
|
|
|
|
return false;
|
2015-03-16 01:17:04 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
netplay->has_client_addr = true;
|
2015-03-16 01:17:04 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void parse_packet(netplay_t *netplay, uint32_t *buffer, unsigned size)
|
|
|
|
{
|
|
|
|
unsigned i;
|
2015-01-23 08:00:53 +00:00
|
|
|
|
2016-01-26 20:46:38 +00:00
|
|
|
for (i = 0; i < size * UDP_WORDS_PER_FRAME; i++)
|
2015-01-09 02:21:47 +00:00
|
|
|
buffer[i] = ntohl(buffer[i]);
|
|
|
|
|
|
|
|
for (i = 0; i < size && netplay->read_frame_count <= netplay->frame_count; i++)
|
|
|
|
{
|
2016-01-26 20:46:38 +00:00
|
|
|
uint32_t frame = buffer[UDP_WORDS_PER_FRAME * i + 0];
|
|
|
|
const uint32_t *state = &buffer[UDP_WORDS_PER_FRAME * i + 1];
|
2015-01-09 02:21:47 +00:00
|
|
|
|
2015-01-23 07:51:22 +00:00
|
|
|
if (frame != netplay->read_frame_count)
|
|
|
|
continue;
|
|
|
|
|
2015-04-11 00:49:30 +00:00
|
|
|
netplay->buffer[netplay->read_ptr].is_simulated = false;
|
2016-01-26 20:46:38 +00:00
|
|
|
memcpy(netplay->buffer[netplay->read_ptr].real_input_state, state,
|
|
|
|
sizeof(netplay->buffer[netplay->read_ptr].real_input_state));
|
|
|
|
|
2015-04-11 00:49:30 +00:00
|
|
|
netplay->read_ptr = NEXT_PTR(netplay->read_ptr);
|
2015-01-23 07:51:22 +00:00
|
|
|
netplay->read_frame_count++;
|
|
|
|
netplay->timeout_cnt = 0;
|
2015-01-09 02:21:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* TODO: Somewhat better prediction. :P */
|
|
|
|
static void simulate_input(netplay_t *netplay)
|
|
|
|
{
|
2015-04-11 00:49:30 +00:00
|
|
|
size_t ptr = PREV_PTR(netplay->self_ptr);
|
|
|
|
size_t prev = PREV_PTR(netplay->read_ptr);
|
2015-01-09 02:21:47 +00:00
|
|
|
|
2016-01-26 20:46:38 +00:00
|
|
|
memcpy(netplay->buffer[ptr].simulated_input_state,
|
|
|
|
netplay->buffer[prev].real_input_state,
|
|
|
|
sizeof(netplay->buffer[prev].real_input_state));
|
|
|
|
|
2015-04-11 00:49:30 +00:00
|
|
|
netplay->buffer[ptr].is_simulated = true;
|
|
|
|
netplay->buffer[ptr].used_real = false;
|
2015-01-09 02:21:47 +00:00
|
|
|
}
|
|
|
|
|
2015-01-09 17:34:00 +00:00
|
|
|
/**
|
|
|
|
* netplay_poll:
|
|
|
|
* @netplay : pointer to netplay object
|
|
|
|
*
|
|
|
|
* Polls network to see if we have anything new. If our
|
|
|
|
* network buffer is full, we simply have to block
|
|
|
|
* for new input data.
|
|
|
|
*
|
|
|
|
* Returns: true (1) if successful, otherwise false (0).
|
|
|
|
**/
|
2015-01-09 02:21:47 +00:00
|
|
|
static bool netplay_poll(netplay_t *netplay)
|
|
|
|
{
|
|
|
|
int res;
|
|
|
|
|
|
|
|
if (!netplay->has_connection)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
netplay->can_poll = false;
|
|
|
|
|
|
|
|
if (!get_self_input_state(netplay))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* We skip reading the first frame so the host has a chance to grab
|
|
|
|
* our host info so we don't block forever :') */
|
|
|
|
if (netplay->frame_count == 0)
|
|
|
|
{
|
2015-03-16 01:17:04 +00:00
|
|
|
netplay->buffer[0].used_real = true;
|
|
|
|
netplay->buffer[0].is_simulated = false;
|
2016-02-03 16:00:43 +00:00
|
|
|
|
|
|
|
memset(netplay->buffer[0].real_input_state,
|
|
|
|
0, sizeof(netplay->buffer[0].real_input_state));
|
|
|
|
|
2015-04-11 00:49:30 +00:00
|
|
|
netplay->read_ptr = NEXT_PTR(netplay->read_ptr);
|
2015-01-09 02:21:47 +00:00
|
|
|
netplay->read_frame_count++;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We might have reached the end of the buffer, where we
|
|
|
|
* simply have to block. */
|
|
|
|
res = poll_input(netplay, netplay->other_ptr == netplay->self_ptr);
|
|
|
|
if (res == -1)
|
|
|
|
{
|
|
|
|
netplay->has_connection = false;
|
|
|
|
warn_hangup();
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (res == 1)
|
|
|
|
{
|
|
|
|
uint32_t first_read = netplay->read_frame_count;
|
|
|
|
do
|
|
|
|
{
|
2016-01-26 20:46:38 +00:00
|
|
|
uint32_t buffer[UDP_FRAME_PACKETS * UDP_WORDS_PER_FRAME];
|
2015-01-09 02:21:47 +00:00
|
|
|
if (!receive_data(netplay, buffer, sizeof(buffer)))
|
|
|
|
{
|
|
|
|
warn_hangup();
|
|
|
|
netplay->has_connection = false;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
parse_packet(netplay, buffer, UDP_FRAME_PACKETS);
|
2015-04-11 00:49:30 +00:00
|
|
|
|
|
|
|
} while ((netplay->read_frame_count <= netplay->frame_count) &&
|
2015-01-09 02:21:47 +00:00
|
|
|
poll_input(netplay, (netplay->other_ptr == netplay->self_ptr) &&
|
|
|
|
(first_read == netplay->read_frame_count)) == 1);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Cannot allow this. Should not happen though. */
|
|
|
|
if (netplay->self_ptr == netplay->other_ptr)
|
|
|
|
{
|
|
|
|
warn_hangup();
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (netplay->read_ptr != netplay->self_ptr)
|
|
|
|
simulate_input(netplay);
|
|
|
|
else
|
2015-04-11 00:49:30 +00:00
|
|
|
netplay->buffer[PREV_PTR(netplay->self_ptr)].used_real = true;
|
2015-01-09 02:21:47 +00:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void input_poll_net(void)
|
|
|
|
{
|
2015-12-05 15:41:00 +00:00
|
|
|
netplay_t *netplay = (netplay_t*)netplay_data;
|
2015-01-09 02:21:47 +00:00
|
|
|
if (!netplay_should_skip(netplay) && netplay_can_poll(netplay))
|
|
|
|
netplay_poll(netplay);
|
|
|
|
}
|
|
|
|
|
|
|
|
void video_frame_net(const void *data, unsigned width,
|
|
|
|
unsigned height, size_t pitch)
|
|
|
|
{
|
2015-12-05 15:41:00 +00:00
|
|
|
netplay_t *netplay = (netplay_t*)netplay_data;
|
2015-01-09 02:21:47 +00:00
|
|
|
if (!netplay_should_skip(netplay))
|
|
|
|
netplay->cbs.frame_cb(data, width, height, pitch);
|
|
|
|
}
|
|
|
|
|
|
|
|
void audio_sample_net(int16_t left, int16_t right)
|
|
|
|
{
|
2015-12-05 15:41:00 +00:00
|
|
|
netplay_t *netplay = (netplay_t*)netplay_data;
|
2015-01-09 02:21:47 +00:00
|
|
|
if (!netplay_should_skip(netplay))
|
|
|
|
netplay->cbs.sample_cb(left, right);
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t audio_sample_batch_net(const int16_t *data, size_t frames)
|
|
|
|
{
|
2015-12-05 15:41:00 +00:00
|
|
|
netplay_t *netplay = (netplay_t*)netplay_data;
|
2015-01-09 02:21:47 +00:00
|
|
|
if (!netplay_should_skip(netplay))
|
|
|
|
return netplay->cbs.sample_batch_cb(data, frames);
|
|
|
|
return frames;
|
|
|
|
}
|
|
|
|
|
2015-01-09 17:34:00 +00:00
|
|
|
/**
|
|
|
|
* netplay_is_alive:
|
|
|
|
* @netplay : pointer to netplay object
|
|
|
|
*
|
|
|
|
* Checks if input port/index is controlled by netplay or not.
|
|
|
|
*
|
|
|
|
* Returns: true (1) if alive, otherwise false (0).
|
|
|
|
**/
|
2015-01-09 02:21:47 +00:00
|
|
|
static bool netplay_is_alive(netplay_t *netplay)
|
|
|
|
{
|
|
|
|
if (!netplay)
|
|
|
|
return false;
|
|
|
|
return netplay->has_connection;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool netplay_flip_port(netplay_t *netplay, bool port)
|
|
|
|
{
|
|
|
|
size_t frame = netplay->frame_count;
|
|
|
|
|
|
|
|
if (netplay->flip_frame == 0)
|
|
|
|
return port;
|
|
|
|
|
|
|
|
if (netplay->is_replay)
|
|
|
|
frame = netplay->tmp_frame_count;
|
|
|
|
|
|
|
|
return port ^ netplay->flip ^ (frame < netplay->flip_frame);
|
|
|
|
}
|
|
|
|
|
2016-02-03 16:00:43 +00:00
|
|
|
static int16_t netplay_input_state(netplay_t *netplay,
|
|
|
|
bool port, unsigned device,
|
2015-01-09 02:21:47 +00:00
|
|
|
unsigned idx, unsigned id)
|
|
|
|
{
|
|
|
|
size_t ptr = netplay->is_replay ?
|
2015-04-11 00:49:30 +00:00
|
|
|
netplay->tmp_ptr : PREV_PTR(netplay->self_ptr);
|
2016-01-26 20:46:38 +00:00
|
|
|
|
|
|
|
const uint32_t *curr_input_state = netplay->buffer[ptr].self_state;
|
2015-01-09 02:21:47 +00:00
|
|
|
|
|
|
|
if (netplay->port == (netplay_flip_port(netplay, port) ? 1 : 0))
|
|
|
|
{
|
|
|
|
if (netplay->buffer[ptr].is_simulated)
|
|
|
|
curr_input_state = netplay->buffer[ptr].simulated_input_state;
|
|
|
|
else
|
|
|
|
curr_input_state = netplay->buffer[ptr].real_input_state;
|
|
|
|
}
|
|
|
|
|
2016-01-26 20:46:38 +00:00
|
|
|
switch (device)
|
|
|
|
{
|
|
|
|
case RETRO_DEVICE_JOYPAD:
|
|
|
|
return ((1 << id) & curr_input_state[0]) ? 1 : 0;
|
|
|
|
|
|
|
|
case RETRO_DEVICE_ANALOG:
|
|
|
|
{
|
|
|
|
uint32_t state = curr_input_state[1 + idx];
|
|
|
|
return (int16_t)(uint16_t)(state >> (id * 16));
|
|
|
|
}
|
|
|
|
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
2015-01-09 02:21:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int16_t input_state_net(unsigned port, unsigned device,
|
|
|
|
unsigned idx, unsigned id)
|
|
|
|
{
|
2015-12-05 15:41:00 +00:00
|
|
|
netplay_t *netplay = (netplay_t*)netplay_data;
|
2016-01-29 23:23:22 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
if (netplay_is_alive(netplay))
|
2016-01-29 23:23:22 +00:00
|
|
|
{
|
|
|
|
/* Only two players for now. */
|
|
|
|
if (port > 1)
|
|
|
|
return 0;
|
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
return netplay_input_state(netplay, port, device, idx, id);
|
2016-01-29 23:23:22 +00:00
|
|
|
}
|
2015-01-09 02:21:47 +00:00
|
|
|
return netplay->cbs.state_cb(port, device, idx, id);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef HAVE_SOCKET_LEGACY
|
|
|
|
/* Custom inet_ntop. Win32 doesn't seem to support this ... */
|
2016-05-12 10:03:43 +00:00
|
|
|
void netplay_log_connection(const struct sockaddr_storage *their_addr,
|
2015-01-09 02:21:47 +00:00
|
|
|
unsigned slot, const char *nick)
|
|
|
|
{
|
|
|
|
union
|
|
|
|
{
|
|
|
|
const struct sockaddr_storage *storage;
|
|
|
|
const struct sockaddr_in *v4;
|
|
|
|
const struct sockaddr_in6 *v6;
|
|
|
|
} u;
|
2015-06-12 15:00:37 +00:00
|
|
|
const char *str = NULL;
|
|
|
|
char buf_v4[INET_ADDRSTRLEN] = {0};
|
2015-01-09 02:21:47 +00:00
|
|
|
char buf_v6[INET6_ADDRSTRLEN] = {0};
|
|
|
|
|
2015-01-23 08:00:53 +00:00
|
|
|
u.storage = their_addr;
|
|
|
|
|
2016-05-09 04:46:08 +00:00
|
|
|
switch (their_addr->ss_family)
|
2015-01-09 02:21:47 +00:00
|
|
|
{
|
2016-05-09 04:46:08 +00:00
|
|
|
case AF_INET:
|
|
|
|
{
|
|
|
|
struct sockaddr_in in;
|
2015-01-23 08:00:53 +00:00
|
|
|
|
2016-05-09 04:46:08 +00:00
|
|
|
memset(&in, 0, sizeof(in));
|
2015-01-23 08:00:53 +00:00
|
|
|
|
2016-05-09 04:46:08 +00:00
|
|
|
str = buf_v4;
|
|
|
|
in.sin_family = AF_INET;
|
|
|
|
memcpy(&in.sin_addr, &u.v4->sin_addr, sizeof(struct in_addr));
|
2015-01-09 02:21:47 +00:00
|
|
|
|
2016-05-09 04:46:08 +00:00
|
|
|
getnameinfo((struct sockaddr*)&in, sizeof(struct sockaddr_in),
|
|
|
|
buf_v4, sizeof(buf_v4),
|
|
|
|
NULL, 0, NI_NUMERICHOST);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
{
|
|
|
|
struct sockaddr_in6 in;
|
|
|
|
memset(&in, 0, sizeof(in));
|
2015-01-23 08:00:53 +00:00
|
|
|
|
2016-05-09 04:46:08 +00:00
|
|
|
str = buf_v6;
|
|
|
|
in.sin6_family = AF_INET6;
|
|
|
|
memcpy(&in.sin6_addr, &u.v6->sin6_addr, sizeof(struct in6_addr));
|
2015-01-09 02:21:47 +00:00
|
|
|
|
2016-05-09 04:46:08 +00:00
|
|
|
getnameinfo((struct sockaddr*)&in, sizeof(struct sockaddr_in6),
|
|
|
|
buf_v6, sizeof(buf_v6), NULL, 0, NI_NUMERICHOST);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
2015-01-09 02:21:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (str)
|
|
|
|
{
|
2015-06-12 15:00:37 +00:00
|
|
|
char msg[512] = {0};
|
2015-06-13 01:06:11 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
snprintf(msg, sizeof(msg), "Got connection from: \"%s (%s)\" (#%u)",
|
|
|
|
nick, str, slot);
|
2015-12-07 14:32:14 +00:00
|
|
|
runloop_msg_queue_push(msg, 1, 180, false);
|
2015-01-09 02:21:47 +00:00
|
|
|
RARCH_LOG("%s\n", msg);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static int init_tcp_connection(const struct addrinfo *res,
|
|
|
|
bool server, bool spectate,
|
|
|
|
struct sockaddr *other_addr, socklen_t addr_size)
|
|
|
|
{
|
|
|
|
bool ret = true;
|
2015-04-11 00:49:30 +00:00
|
|
|
int fd = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
|
2015-01-23 08:00:53 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
if (fd < 0)
|
|
|
|
{
|
|
|
|
ret = false;
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (server)
|
|
|
|
{
|
2016-05-01 21:45:59 +00:00
|
|
|
if (socket_connect(fd, (void*)res, false) < 0)
|
2015-01-09 02:21:47 +00:00
|
|
|
{
|
|
|
|
ret = false;
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2016-05-01 20:59:35 +00:00
|
|
|
if ( !socket_bind(fd, (void*)res) ||
|
2015-01-09 02:21:47 +00:00
|
|
|
listen(fd, spectate ? MAX_SPECTATORS : 1) < 0)
|
|
|
|
{
|
|
|
|
ret = false;
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!spectate)
|
|
|
|
{
|
|
|
|
int new_fd = accept(fd, other_addr, &addr_size);
|
|
|
|
if (new_fd < 0)
|
|
|
|
{
|
|
|
|
ret = false;
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2015-01-23 10:36:45 +00:00
|
|
|
socket_close(fd);
|
2015-01-09 02:21:47 +00:00
|
|
|
fd = new_fd;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
end:
|
|
|
|
if (!ret && fd >= 0)
|
|
|
|
{
|
2015-01-23 10:36:45 +00:00
|
|
|
socket_close(fd);
|
2015-01-09 02:21:47 +00:00
|
|
|
fd = -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool init_tcp_socket(netplay_t *netplay, const char *server,
|
|
|
|
uint16_t port, bool spectate)
|
|
|
|
{
|
2015-06-12 15:00:37 +00:00
|
|
|
char port_buf[16] = {0};
|
|
|
|
bool ret = false;
|
2015-01-23 07:51:22 +00:00
|
|
|
const struct addrinfo *tmp_info = NULL;
|
2016-05-01 18:54:30 +00:00
|
|
|
struct addrinfo *res = NULL;
|
|
|
|
struct addrinfo hints = {0};
|
2015-01-09 02:21:47 +00:00
|
|
|
|
2011-02-13 15:40:24 +00:00
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
if (!server)
|
|
|
|
hints.ai_flags = AI_PASSIVE;
|
|
|
|
|
|
|
|
snprintf(port_buf, sizeof(port_buf), "%hu", (unsigned short)port);
|
2015-10-26 02:18:13 +00:00
|
|
|
if (getaddrinfo_retro(server, port_buf, &hints, &res) < 0)
|
2011-02-13 15:40:24 +00:00
|
|
|
return false;
|
|
|
|
|
2011-02-15 16:29:03 +00:00
|
|
|
if (!res)
|
|
|
|
return false;
|
|
|
|
|
2014-09-07 03:47:18 +00:00
|
|
|
/* If "localhost" is used, it is important to check every possible
|
|
|
|
* address for IPv4/IPv6. */
|
2015-01-23 07:51:22 +00:00
|
|
|
tmp_info = res;
|
|
|
|
|
2012-05-31 18:34:33 +00:00
|
|
|
while (tmp_info)
|
2011-02-13 15:40:24 +00:00
|
|
|
{
|
2016-04-10 14:35:25 +00:00
|
|
|
int fd = init_tcp_connection(
|
|
|
|
tmp_info,
|
|
|
|
server,
|
|
|
|
netplay->spectate.enabled,
|
|
|
|
(struct sockaddr*)&netplay->other_addr,
|
|
|
|
sizeof(netplay->other_addr));
|
|
|
|
|
|
|
|
if (fd >= 0)
|
2011-02-13 15:40:24 +00:00
|
|
|
{
|
2012-05-31 18:34:33 +00:00
|
|
|
ret = true;
|
2014-10-01 21:00:05 +00:00
|
|
|
netplay->fd = fd;
|
2012-05-31 18:34:33 +00:00
|
|
|
break;
|
2011-02-13 15:40:24 +00:00
|
|
|
}
|
2012-01-11 18:22:18 +00:00
|
|
|
|
2012-05-31 18:34:33 +00:00
|
|
|
tmp_info = tmp_info->ai_next;
|
2012-01-11 18:22:18 +00:00
|
|
|
}
|
2011-02-13 19:24:54 +00:00
|
|
|
|
2012-05-31 18:34:33 +00:00
|
|
|
if (res)
|
2015-10-26 02:18:13 +00:00
|
|
|
freeaddrinfo_retro(res);
|
2012-01-11 19:50:21 +00:00
|
|
|
|
2012-05-31 18:34:33 +00:00
|
|
|
if (!ret)
|
|
|
|
RARCH_ERR("Failed to set up netplay sockets.\n");
|
2011-02-13 15:40:24 +00:00
|
|
|
|
2012-05-31 18:34:33 +00:00
|
|
|
return ret;
|
2011-02-18 01:01:47 +00:00
|
|
|
}
|
|
|
|
|
2016-05-01 19:05:09 +00:00
|
|
|
static bool init_udp_socket(netplay_t *netplay, const char *server,
|
|
|
|
uint16_t port)
|
|
|
|
{
|
2016-05-01 23:23:42 +00:00
|
|
|
int fd = socket_init((void**)&netplay->addr, port, server, SOCKET_TYPE_DATAGRAM);
|
2014-09-07 03:47:18 +00:00
|
|
|
|
2016-05-01 23:23:42 +00:00
|
|
|
if (fd < 0)
|
2016-05-01 21:01:41 +00:00
|
|
|
goto error;
|
2011-02-18 01:01:47 +00:00
|
|
|
|
2016-05-01 23:23:42 +00:00
|
|
|
netplay->udp_fd = fd;
|
|
|
|
|
2011-02-18 01:01:47 +00:00
|
|
|
if (!server)
|
|
|
|
{
|
2014-09-07 03:47:18 +00:00
|
|
|
/* Not sure if we have to do this for UDP, but hey :) */
|
2016-05-01 21:00:54 +00:00
|
|
|
if (!socket_bind(netplay->udp_fd, (void*)netplay->addr))
|
2011-02-18 01:01:47 +00:00
|
|
|
{
|
2012-04-21 21:25:32 +00:00
|
|
|
RARCH_ERR("Failed to bind socket.\n");
|
2015-01-23 10:36:45 +00:00
|
|
|
socket_close(netplay->udp_fd);
|
2014-10-01 21:00:05 +00:00
|
|
|
netplay->udp_fd = -1;
|
2011-02-18 01:01:47 +00:00
|
|
|
}
|
|
|
|
|
2015-10-26 02:18:13 +00:00
|
|
|
freeaddrinfo_retro(netplay->addr);
|
2014-10-01 21:00:05 +00:00
|
|
|
netplay->addr = NULL;
|
2011-02-18 01:01:47 +00:00
|
|
|
}
|
|
|
|
|
2011-02-13 15:40:24 +00:00
|
|
|
return true;
|
2016-05-01 21:01:41 +00:00
|
|
|
|
|
|
|
error:
|
|
|
|
RARCH_ERR("Failed to initialize socket.\n");
|
|
|
|
return false;
|
2011-02-13 15:40:24 +00:00
|
|
|
}
|
|
|
|
|
2014-10-01 21:00:05 +00:00
|
|
|
static bool init_socket(netplay_t *netplay, const char *server, uint16_t port)
|
2012-01-24 20:00:30 +00:00
|
|
|
{
|
2014-12-21 02:29:52 +00:00
|
|
|
if (!network_init())
|
2012-01-24 20:00:30 +00:00
|
|
|
return false;
|
|
|
|
|
2015-11-18 00:45:24 +00:00
|
|
|
if (!init_tcp_socket(netplay, server, port, netplay->spectate.enabled))
|
2011-02-18 01:01:47 +00:00
|
|
|
return false;
|
2015-11-18 00:45:24 +00:00
|
|
|
if (!netplay->spectate.enabled && !init_udp_socket(netplay, server, port))
|
2012-01-24 20:00:30 +00:00
|
|
|
return false;
|
|
|
|
|
2011-02-18 01:01:47 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-01-09 17:34:00 +00:00
|
|
|
/**
|
|
|
|
* netplay_new:
|
|
|
|
* @server : IP address of server.
|
|
|
|
* @port : Port of server.
|
|
|
|
* @frames : Amount of lag frames.
|
|
|
|
* @cb : Libretro callbacks.
|
|
|
|
* @spectate : If true, enable spectator mode.
|
|
|
|
* @nick : Nickname of user.
|
|
|
|
*
|
|
|
|
* Creates a new netplay handle. A NULL host means we're
|
|
|
|
* hosting (user 1).
|
|
|
|
*
|
|
|
|
* Returns: new netplay handle.
|
|
|
|
**/
|
2015-01-09 02:21:47 +00:00
|
|
|
netplay_t *netplay_new(const char *server, uint16_t port,
|
|
|
|
unsigned frames, const struct retro_callbacks *cb,
|
2015-04-11 00:49:30 +00:00
|
|
|
bool spectate,
|
|
|
|
const char *nick)
|
2011-02-14 15:10:53 +00:00
|
|
|
{
|
2015-04-11 00:49:30 +00:00
|
|
|
netplay_t *netplay = NULL;
|
|
|
|
|
|
|
|
if (frames > UDP_FRAME_PACKETS)
|
|
|
|
frames = UDP_FRAME_PACKETS;
|
|
|
|
|
|
|
|
netplay = (netplay_t*)calloc(1, sizeof(*netplay));
|
2015-01-09 02:21:47 +00:00
|
|
|
if (!netplay)
|
|
|
|
return NULL;
|
2011-02-14 15:10:53 +00:00
|
|
|
|
2015-11-18 00:45:24 +00:00
|
|
|
netplay->fd = -1;
|
|
|
|
netplay->udp_fd = -1;
|
|
|
|
netplay->cbs = *cb;
|
|
|
|
netplay->port = server ? 0 : 1;
|
|
|
|
netplay->spectate.enabled = spectate;
|
2015-12-23 20:25:28 +00:00
|
|
|
netplay->is_server = server == NULL;
|
2015-01-09 02:21:47 +00:00
|
|
|
strlcpy(netplay->nick, nick, sizeof(netplay->nick));
|
2011-02-18 01:01:47 +00:00
|
|
|
|
2015-12-23 20:25:28 +00:00
|
|
|
if(spectate)
|
|
|
|
netplay->net_cbs = netplay_get_cbs_spectate();
|
|
|
|
else
|
|
|
|
netplay->net_cbs = netplay_get_cbs_net();
|
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
if (!init_socket(netplay, server, port))
|
2011-02-18 01:01:47 +00:00
|
|
|
{
|
2015-01-09 02:21:47 +00:00
|
|
|
free(netplay);
|
|
|
|
return NULL;
|
2011-02-18 01:01:47 +00:00
|
|
|
}
|
|
|
|
|
2015-12-24 18:23:46 +00:00
|
|
|
if(!netplay_info_cb(netplay, frames))
|
2015-12-23 20:25:28 +00:00
|
|
|
goto error;
|
2012-01-21 13:00:11 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
return netplay;
|
2012-01-21 13:00:11 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
error:
|
|
|
|
if (netplay->fd >= 0)
|
2015-01-23 10:36:45 +00:00
|
|
|
socket_close(netplay->fd);
|
2015-01-09 02:21:47 +00:00
|
|
|
if (netplay->udp_fd >= 0)
|
2015-01-23 10:36:45 +00:00
|
|
|
socket_close(netplay->udp_fd);
|
2012-01-21 13:00:11 +00:00
|
|
|
|
2015-04-11 00:49:30 +00:00
|
|
|
free(netplay);
|
2015-01-09 02:21:47 +00:00
|
|
|
return NULL;
|
2012-01-21 13:00:11 +00:00
|
|
|
}
|
|
|
|
|
2015-11-17 23:18:04 +00:00
|
|
|
static bool netplay_send_raw_cmd(netplay_t *netplay, uint32_t cmd,
|
2015-01-09 02:21:47 +00:00
|
|
|
const void *data, size_t size)
|
|
|
|
{
|
|
|
|
cmd = (cmd << 16) | (size & 0xffff);
|
|
|
|
cmd = htonl(cmd);
|
2012-01-21 13:00:11 +00:00
|
|
|
|
2016-05-01 21:17:17 +00:00
|
|
|
if (!socket_send_all_blocking(netplay->fd, &cmd, sizeof(cmd), false))
|
2015-01-09 02:21:47 +00:00
|
|
|
return false;
|
2012-01-21 13:00:11 +00:00
|
|
|
|
2016-05-01 21:17:17 +00:00
|
|
|
if (!socket_send_all_blocking(netplay->fd, data, size, false))
|
2015-01-09 02:21:47 +00:00
|
|
|
return false;
|
2012-01-21 13:24:38 +00:00
|
|
|
|
2015-01-09 02:21:47 +00:00
|
|
|
return true;
|
|
|
|
}
|
2012-01-21 13:00:11 +00:00
|
|
|
|
2015-01-09 17:34:00 +00:00
|
|
|
/**
|
2015-11-17 23:18:04 +00:00
|
|
|
* netplay_command:
|
|
|
|
* @netplay : pointer to netplay object
|
|
|
|
* @cmd : command to send
|
|
|
|
* @data : data to send as argument
|
|
|
|
* @sz : size of data
|
|
|
|
* @flags : flags of CMD_OPT_*
|
|
|
|
* @command_str : name of action
|
|
|
|
* @success_msg : message to display upon success
|
|
|
|
*
|
|
|
|
* Sends a single netplay command and waits for response.
|
|
|
|
*/
|
|
|
|
bool netplay_command(netplay_t* netplay, enum netplay_cmd cmd,
|
|
|
|
void* data, size_t sz,
|
|
|
|
uint32_t flags,
|
|
|
|
const char* command_str,
|
|
|
|
const char* success_msg)
|
2012-01-21 13:00:11 +00:00
|
|
|
{
|
2015-11-19 12:03:23 +00:00
|
|
|
char m[256];
|
2015-11-17 23:18:04 +00:00
|
|
|
const char* msg = NULL;
|
|
|
|
bool allowed_spectate = !!(flags & CMD_OPT_ALLOWED_IN_SPECTATE_MODE);
|
|
|
|
bool host_only = !!(flags & CMD_OPT_HOST_ONLY);
|
|
|
|
bool require_sync = !!(flags & CMD_OPT_REQUIRE_SYNC);
|
|
|
|
|
2015-11-19 12:03:23 +00:00
|
|
|
assert(netplay);
|
|
|
|
|
2015-11-18 00:45:24 +00:00
|
|
|
if (netplay->spectate.enabled && !allowed_spectate)
|
2012-01-21 13:00:11 +00:00
|
|
|
{
|
2015-11-17 23:18:04 +00:00
|
|
|
msg = "Cannot %s in spectate mode.";
|
|
|
|
goto error;
|
2012-01-21 13:00:11 +00:00
|
|
|
}
|
|
|
|
|
2015-11-17 23:18:04 +00:00
|
|
|
if (host_only && netplay->port == 0)
|
2012-01-21 13:00:11 +00:00
|
|
|
{
|
2015-11-17 23:18:04 +00:00
|
|
|
msg = "Cannot %s as a client.";
|
2012-01-21 13:00:11 +00:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2015-11-17 23:18:04 +00:00
|
|
|
if(require_sync && check_netplay_synched(netplay))
|
2012-01-21 13:00:11 +00:00
|
|
|
{
|
2015-11-17 23:18:04 +00:00
|
|
|
msg = "Cannot %s while host and client are not in sync.";
|
2012-01-21 13:00:11 +00:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2015-11-17 23:18:04 +00:00
|
|
|
if(netplay_send_raw_cmd(netplay, cmd, data, sz)) {
|
|
|
|
if(netplay_get_response(netplay))
|
2015-12-07 14:32:14 +00:00
|
|
|
runloop_msg_queue_push(success_msg, 1, 180, false);
|
2015-11-17 23:18:04 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
msg = "Failed to send command \"%s\"";
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
2015-11-19 12:03:23 +00:00
|
|
|
|
|
|
|
error:
|
|
|
|
snprintf(m, sizeof(m), msg, command_str);
|
2015-11-17 23:18:04 +00:00
|
|
|
RARCH_WARN("%s\n", m);
|
2015-12-07 14:32:14 +00:00
|
|
|
runloop_msg_queue_push(m, 1, 180, false);
|
2015-11-17 23:18:04 +00:00
|
|
|
return false;
|
|
|
|
}
|
2012-01-21 13:24:38 +00:00
|
|
|
|
2015-11-17 23:18:04 +00:00
|
|
|
/**
|
|
|
|
* netplay_flip_users:
|
|
|
|
* @netplay : pointer to netplay object
|
|
|
|
*
|
|
|
|
* On regular netplay, flip who controls user 1 and 2.
|
|
|
|
**/
|
2016-04-09 01:16:11 +00:00
|
|
|
static void netplay_flip_users(netplay_t *netplay)
|
2015-11-17 23:18:04 +00:00
|
|
|
{
|
2015-11-17 23:35:53 +00:00
|
|
|
uint32_t flip_frame = netplay->frame_count + 2 * UDP_FRAME_PACKETS;
|
|
|
|
uint32_t flip_frame_net = htonl(flip_frame);
|
2015-11-17 23:18:04 +00:00
|
|
|
bool command = netplay_command(
|
|
|
|
netplay, NETPLAY_CMD_FLIP_PLAYERS,
|
|
|
|
&flip_frame_net, sizeof flip_frame_net,
|
|
|
|
CMD_OPT_HOST_ONLY | CMD_OPT_REQUIRE_SYNC,
|
2016-07-21 02:28:29 +00:00
|
|
|
"flip users", "Successfully flipped users.\n");
|
2015-11-17 23:18:04 +00:00
|
|
|
|
|
|
|
if(command)
|
|
|
|
{
|
2015-11-17 23:32:45 +00:00
|
|
|
netplay->flip ^= true;
|
2015-11-17 23:37:43 +00:00
|
|
|
netplay->flip_frame = flip_frame;
|
2012-01-21 13:00:11 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-09 17:34:00 +00:00
|
|
|
/**
|
|
|
|
* netplay_free:
|
|
|
|
* @netplay : pointer to netplay object
|
|
|
|
*
|
|
|
|
* Frees netplay handle.
|
|
|
|
**/
|
2014-10-01 21:00:05 +00:00
|
|
|
void netplay_free(netplay_t *netplay)
|
2011-02-13 15:40:24 +00:00
|
|
|
{
|
2013-10-22 19:26:33 +00:00
|
|
|
unsigned i;
|
2015-01-09 17:34:00 +00:00
|
|
|
|
2015-01-23 10:36:45 +00:00
|
|
|
socket_close(netplay->fd);
|
2011-02-14 15:10:53 +00:00
|
|
|
|
2015-11-18 00:45:24 +00:00
|
|
|
if (netplay->spectate.enabled)
|
2012-01-11 18:22:18 +00:00
|
|
|
{
|
2013-10-22 19:26:33 +00:00
|
|
|
for (i = 0; i < MAX_SPECTATORS; i++)
|
2015-11-18 00:45:24 +00:00
|
|
|
if (netplay->spectate.fds[i] >= 0)
|
|
|
|
socket_close(netplay->spectate.fds[i]);
|
2012-01-11 18:22:18 +00:00
|
|
|
|
2015-11-18 00:45:24 +00:00
|
|
|
free(netplay->spectate.input);
|
2012-01-11 18:22:18 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2015-01-23 10:36:45 +00:00
|
|
|
socket_close(netplay->udp_fd);
|
2012-01-11 18:22:18 +00:00
|
|
|
|
2014-10-01 21:00:05 +00:00
|
|
|
for (i = 0; i < netplay->buffer_size; i++)
|
|
|
|
free(netplay->buffer[i].state);
|
2012-01-11 18:22:18 +00:00
|
|
|
|
2014-10-01 21:00:05 +00:00
|
|
|
free(netplay->buffer);
|
2012-01-11 18:22:18 +00:00
|
|
|
}
|
|
|
|
|
2014-10-01 21:00:05 +00:00
|
|
|
if (netplay->addr)
|
2015-10-26 02:18:13 +00:00
|
|
|
freeaddrinfo_retro(netplay->addr);
|
2012-01-11 18:22:18 +00:00
|
|
|
|
2014-10-01 21:00:05 +00:00
|
|
|
free(netplay);
|
2011-02-13 15:40:24 +00:00
|
|
|
}
|
|
|
|
|
2011-02-14 15:10:53 +00:00
|
|
|
|
2014-10-01 21:00:05 +00:00
|
|
|
static void netplay_set_spectate_input(netplay_t *netplay, int16_t input)
|
2012-01-11 18:22:18 +00:00
|
|
|
{
|
2015-11-18 00:45:24 +00:00
|
|
|
if (netplay->spectate.input_ptr >= netplay->spectate.input_sz)
|
2012-01-11 18:22:18 +00:00
|
|
|
{
|
2015-11-18 00:45:24 +00:00
|
|
|
netplay->spectate.input_sz++;
|
|
|
|
netplay->spectate.input_sz *= 2;
|
|
|
|
netplay->spectate.input = (uint16_t*)realloc(netplay->spectate.input,
|
|
|
|
netplay->spectate.input_sz * sizeof(uint16_t));
|
2012-01-11 18:22:18 +00:00
|
|
|
}
|
|
|
|
|
2015-11-18 00:45:24 +00:00
|
|
|
netplay->spectate.input[netplay->spectate.input_ptr++] = swap_if_big16(input);
|
2012-01-11 18:22:18 +00:00
|
|
|
}
|
|
|
|
|
2014-09-07 03:47:18 +00:00
|
|
|
int16_t input_state_spectate(unsigned port, unsigned device,
|
2014-10-20 17:29:49 +00:00
|
|
|
unsigned idx, unsigned id)
|
2012-01-11 18:22:18 +00:00
|
|
|
{
|
2015-12-05 15:41:00 +00:00
|
|
|
netplay_t *netplay = (netplay_t*)netplay_data;
|
2015-04-11 00:49:30 +00:00
|
|
|
int16_t res = netplay->cbs.state_cb(port, device, idx, id);
|
2015-01-09 02:11:27 +00:00
|
|
|
|
2014-10-01 21:00:05 +00:00
|
|
|
netplay_set_spectate_input(netplay, res);
|
2012-01-11 18:22:18 +00:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2014-10-01 21:00:05 +00:00
|
|
|
static int16_t netplay_get_spectate_input(netplay_t *netplay, bool port,
|
2014-10-20 17:29:49 +00:00
|
|
|
unsigned device, unsigned idx, unsigned id)
|
2012-01-11 18:22:18 +00:00
|
|
|
{
|
|
|
|
int16_t inp;
|
2016-01-28 03:39:38 +00:00
|
|
|
retro_ctx_input_state_info_t input_info;
|
2014-10-01 21:00:05 +00:00
|
|
|
|
2015-01-23 18:43:40 +00:00
|
|
|
if (socket_receive_all_blocking(netplay->fd, (char*)&inp, sizeof(inp)))
|
2012-01-11 18:22:18 +00:00
|
|
|
return swap_if_big16(inp);
|
|
|
|
|
2015-01-09 02:11:27 +00:00
|
|
|
RARCH_ERR("Connection with host was cut.\n");
|
2015-12-07 14:32:14 +00:00
|
|
|
runloop_msg_queue_push("Connection with host was cut.", 1, 180, true);
|
2015-01-09 02:11:27 +00:00
|
|
|
|
2016-01-28 03:39:38 +00:00
|
|
|
input_info.cb = netplay->cbs.state_cb;
|
|
|
|
|
2016-05-07 23:33:57 +00:00
|
|
|
core_set_input_state(&input_info);
|
2016-01-28 03:39:38 +00:00
|
|
|
|
2015-01-09 02:11:27 +00:00
|
|
|
return netplay->cbs.state_cb(port, device, idx, id);
|
2012-01-11 18:22:18 +00:00
|
|
|
}
|
|
|
|
|
2014-09-07 03:47:18 +00:00
|
|
|
int16_t input_state_spectate_client(unsigned port, unsigned device,
|
2014-10-20 17:29:49 +00:00
|
|
|
unsigned idx, unsigned id)
|
2012-01-11 18:22:18 +00:00
|
|
|
{
|
2015-12-05 15:41:00 +00:00
|
|
|
return netplay_get_spectate_input((netplay_t*)netplay_data, port,
|
2015-04-11 00:49:30 +00:00
|
|
|
device, idx, id);
|
2012-01-11 18:22:18 +00:00
|
|
|
}
|
|
|
|
|
2015-01-09 17:34:00 +00:00
|
|
|
/**
|
|
|
|
* netplay_pre_frame:
|
|
|
|
* @netplay : pointer to netplay object
|
|
|
|
*
|
|
|
|
* Pre-frame for Netplay.
|
|
|
|
* Call this before running retro_run().
|
|
|
|
**/
|
2014-10-01 21:00:05 +00:00
|
|
|
void netplay_pre_frame(netplay_t *netplay)
|
2012-01-11 18:22:18 +00:00
|
|
|
{
|
2015-12-23 20:25:28 +00:00
|
|
|
assert(netplay && netplay->net_cbs->pre_frame);
|
|
|
|
netplay->net_cbs->pre_frame(netplay);
|
2012-01-11 18:22:18 +00:00
|
|
|
}
|
|
|
|
|
2015-01-09 17:34:00 +00:00
|
|
|
/**
|
|
|
|
* netplay_post_frame:
|
|
|
|
* @netplay : pointer to netplay object
|
|
|
|
*
|
|
|
|
* Post-frame for Netplay.
|
|
|
|
* We check if we have new input and replay from recorded input.
|
|
|
|
* Call this after running retro_run().
|
|
|
|
**/
|
2014-10-01 21:00:05 +00:00
|
|
|
void netplay_post_frame(netplay_t *netplay)
|
2012-01-11 18:22:18 +00:00
|
|
|
{
|
2015-12-23 20:25:28 +00:00
|
|
|
assert(netplay && netplay->net_cbs->post_frame);
|
|
|
|
netplay->net_cbs->post_frame(netplay);
|
2012-01-11 18:22:18 +00:00
|
|
|
}
|
|
|
|
|
2015-04-11 11:31:33 +00:00
|
|
|
void deinit_netplay(void)
|
|
|
|
{
|
2015-12-05 15:41:00 +00:00
|
|
|
netplay_t *netplay = (netplay_t*)netplay_data;
|
2015-04-11 11:31:33 +00:00
|
|
|
if (netplay)
|
|
|
|
netplay_free(netplay);
|
2015-12-05 15:41:00 +00:00
|
|
|
netplay_data = NULL;
|
2015-04-11 11:31:33 +00:00
|
|
|
}
|
|
|
|
|
2015-04-11 11:29:40 +00:00
|
|
|
/**
|
|
|
|
* init_netplay:
|
|
|
|
*
|
|
|
|
* Initializes netplay.
|
|
|
|
*
|
|
|
|
* If netplay is already initialized, will return false (0).
|
|
|
|
*
|
|
|
|
* Returns: true (1) if successful, otherwise false (0).
|
|
|
|
**/
|
|
|
|
|
|
|
|
bool init_netplay(void)
|
|
|
|
{
|
|
|
|
struct retro_callbacks cbs = {0};
|
|
|
|
settings_t *settings = config_get_ptr();
|
|
|
|
global_t *global = global_get_ptr();
|
|
|
|
|
2016-03-17 23:32:02 +00:00
|
|
|
if (!global->netplay.enable)
|
2015-04-11 11:29:40 +00:00
|
|
|
return false;
|
|
|
|
|
2015-11-30 23:08:02 +00:00
|
|
|
if (bsv_movie_ctl(BSV_MOVIE_CTL_START_PLAYBACK, NULL))
|
2015-04-11 11:29:40 +00:00
|
|
|
{
|
2016-02-03 16:00:43 +00:00
|
|
|
RARCH_WARN("%s\n",
|
|
|
|
msg_hash_to_str(MSG_NETPLAY_FAILED_MOVIE_PLAYBACK_HAS_STARTED));
|
2015-04-11 11:29:40 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-05-07 23:33:57 +00:00
|
|
|
core_set_default_callbacks(&cbs);
|
2015-04-11 11:29:40 +00:00
|
|
|
|
2015-07-27 15:18:10 +00:00
|
|
|
if (*global->netplay.server)
|
2015-04-11 11:29:40 +00:00
|
|
|
{
|
|
|
|
RARCH_LOG("Connecting to netplay host...\n");
|
2015-07-27 15:18:10 +00:00
|
|
|
global->netplay.is_client = true;
|
2015-04-11 11:29:40 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
RARCH_LOG("Waiting for client...\n");
|
|
|
|
|
2015-12-05 15:41:00 +00:00
|
|
|
netplay_data = (netplay_t*)netplay_new(
|
2015-07-27 15:18:10 +00:00
|
|
|
global->netplay.is_client ? global->netplay.server : NULL,
|
|
|
|
global->netplay.port ? global->netplay.port : RARCH_DEFAULT_PORT,
|
|
|
|
global->netplay.sync_frames, &cbs, global->netplay.is_spectate,
|
2015-04-11 11:29:40 +00:00
|
|
|
settings->username);
|
|
|
|
|
2015-12-05 15:41:00 +00:00
|
|
|
if (netplay_data)
|
2015-04-11 11:29:40 +00:00
|
|
|
return true;
|
|
|
|
|
2015-07-27 15:18:10 +00:00
|
|
|
global->netplay.is_client = false;
|
2015-07-02 16:39:57 +00:00
|
|
|
RARCH_WARN("%s\n", msg_hash_to_str(MSG_NETPLAY_FAILED));
|
2015-04-11 11:29:40 +00:00
|
|
|
|
2016-01-29 13:30:09 +00:00
|
|
|
runloop_msg_queue_push(
|
|
|
|
msg_hash_to_str(MSG_NETPLAY_FAILED),
|
2015-04-11 11:29:40 +00:00
|
|
|
0, 180, false);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-12-05 15:24:31 +00:00
|
|
|
bool netplay_driver_ctl(enum rarch_netplay_ctl_state state, void *data)
|
|
|
|
{
|
2015-12-05 15:41:00 +00:00
|
|
|
if (!netplay_data)
|
2015-12-05 15:24:31 +00:00
|
|
|
return false;
|
|
|
|
|
|
|
|
switch (state)
|
|
|
|
{
|
2015-12-05 15:38:24 +00:00
|
|
|
case RARCH_NETPLAY_CTL_IS_DATA_INITED:
|
|
|
|
return true;
|
2015-12-05 15:27:00 +00:00
|
|
|
case RARCH_NETPLAY_CTL_POST_FRAME:
|
2015-12-05 15:41:00 +00:00
|
|
|
netplay_post_frame((netplay_t*)netplay_data);
|
2015-12-05 15:27:00 +00:00
|
|
|
break;
|
|
|
|
case RARCH_NETPLAY_CTL_PRE_FRAME:
|
2015-12-05 15:41:00 +00:00
|
|
|
netplay_pre_frame((netplay_t*)netplay_data);
|
2015-12-05 15:27:00 +00:00
|
|
|
break;
|
2015-12-05 15:24:31 +00:00
|
|
|
case RARCH_NETPLAY_CTL_FLIP_PLAYERS:
|
|
|
|
{
|
|
|
|
bool *state = (bool*)data;
|
|
|
|
if (*state)
|
2016-04-09 01:16:11 +00:00
|
|
|
netplay_flip_users((netplay_t*)netplay_data);
|
2015-12-05 15:24:31 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case RARCH_NETPLAY_CTL_FULLSCREEN_TOGGLE:
|
|
|
|
{
|
|
|
|
bool *state = (bool*)data;
|
|
|
|
if (*state)
|
2016-05-09 18:51:53 +00:00
|
|
|
command_event(CMD_EVENT_FULLSCREEN_TOGGLE, NULL);
|
2015-12-05 15:24:31 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
case RARCH_NETPLAY_CTL_NONE:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|