RetroArch/network/netplay/netplay.c

1180 lines
30 KiB
C
Raw Normal View History

2012-04-21 21:13:50 +00:00
/* RetroArch - A frontend for libretro.
2014-01-01 00:50:59 +00:00
* Copyright (C) 2010-2014 - Hans-Kristian Arntzen
2016-01-10 03:06:50 +00:00
* Copyright (C) 2011-2016 - Daniel De Matteis
2011-02-13 15:40:24 +00:00
*
2012-04-21 21:13:50 +00:00
* RetroArch is free software: you can redistribute it and/or modify it under the terms
2011-02-13 15:40:24 +00:00
* of the GNU General Public License as published by the Free Software Found-
* ation, either version 3 of the License, or (at your option) any later version.
*
2012-04-21 21:13:50 +00:00
* RetroArch is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
2011-02-13 15:40:24 +00:00
* without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
* PURPOSE. See the GNU General Public License for more details.
*
2012-04-21 21:31:57 +00:00
* You should have received a copy of the GNU General Public License along with RetroArch.
2011-02-13 15:40:24 +00:00
* If not, see <http://www.gnu.org/licenses/>.
*/
2011-12-04 17:03:08 +00:00
2012-11-15 13:32:06 +00:00
#if defined(_MSC_VER) && !defined(_XBOX)
2012-11-15 08:40:31 +00:00
#pragma comment(lib, "ws2_32")
#endif
2015-11-17 23:18:04 +00:00
#include <assert.h>
#include <stdlib.h>
#include <string.h>
2015-09-04 19:11:00 +00:00
#include <net/net_compat.h>
2016-05-01 19:18:45 +00:00
#include <net/net_socket.h>
#include <retro_endianness.h>
2015-09-04 19:11:00 +00:00
2015-12-23 20:25:28 +00:00
#include "netplay_private.h"
2015-12-05 15:41:00 +00:00
2016-09-03 05:48:25 +00:00
#include "../../command.h"
2016-09-03 05:45:51 +00:00
#include "../../movie.h"
2016-09-03 05:51:11 +00:00
#include "../../runloop.h"
2016-09-03 05:45:51 +00:00
2015-12-05 15:41:00 +00:00
enum
{
CMD_OPT_ALLOWED_IN_SPECTATE_MODE = 0x1,
CMD_OPT_REQUIRE_ACK = 0x2,
CMD_OPT_HOST_ONLY = 0x4,
CMD_OPT_CLIENT_ONLY = 0x8,
CMD_OPT_REQUIRE_SYNC = 0x10
};
2015-12-26 07:10:37 +00:00
void *netplay_data;
2015-01-09 17:34:00 +00:00
/**
* warn_hangup:
*
* Warns that netplay has disconnected.
**/
static void warn_hangup(void)
{
2012-04-21 21:25:32 +00:00
RARCH_WARN("Netplay has disconnected. Will continue without connection ...\n");
2015-12-07 14:32:14 +00:00
runloop_msg_queue_push("Netplay has disconnected. Will continue without connection.", 0, 480, false);
}
2015-11-17 23:18:04 +00:00
/**
* check_netplay_synched:
* @netplay: pointer to the netplay object.
* Checks to see if the host and client have synchronized states. Returns true
* on success and false on failure.
*/
bool check_netplay_synched(netplay_t* netplay)
{
assert(netplay);
return netplay->frame_count < (netplay->flip_frame + 2 * UDP_FRAME_PACKETS);
}
2015-12-24 18:23:46 +00:00
static bool netplay_info_cb(netplay_t* netplay, unsigned frames) {
2015-12-23 20:25:28 +00:00
return netplay->net_cbs->info_cb(netplay, frames);
}
2015-01-09 17:34:00 +00:00
/**
* netplay_should_skip:
* @netplay : pointer to netplay object
*
* If we're fast-forward replaying to resync, check if we
* should actually show frame.
*
* Returns: bool (1) if we should skip this frame, otherwise
* false (0).
**/
static bool netplay_should_skip(netplay_t *netplay)
2011-02-13 15:40:24 +00:00
{
if (!netplay)
return false;
return netplay->is_replay && netplay->has_connection;
2011-02-13 15:40:24 +00:00
}
static bool netplay_can_poll(netplay_t *netplay)
2011-02-13 15:40:24 +00:00
{
if (!netplay)
return false;
return netplay->can_poll;
2011-02-13 15:40:24 +00:00
}
static bool send_chunk(netplay_t *netplay)
2011-02-13 15:40:24 +00:00
{
const struct sockaddr *addr = NULL;
2015-01-09 17:34:00 +00:00
if (netplay->addr)
addr = netplay->addr->ai_addr;
else if (netplay->has_client_addr)
addr = (const struct sockaddr*)&netplay->their_addr;
2011-02-13 15:40:24 +00:00
if (addr)
{
2015-12-04 10:03:21 +00:00
ssize_t bytes_sent;
#ifdef HAVE_IPV6
bytes_sent = (sendto(netplay->udp_fd, (const char*)netplay->packet_buffer,
sizeof(netplay->packet_buffer), 0, addr,
2015-12-04 10:03:21 +00:00
sizeof(struct sockaddr_in6)));
2015-09-15 03:48:05 +00:00
#else
2015-12-04 10:03:21 +00:00
bytes_sent = (sendto(netplay->udp_fd, (const char*)netplay->packet_buffer,
sizeof(netplay->packet_buffer), 0, addr,
sizeof(struct sockaddr_in)));
2015-09-15 03:48:05 +00:00
#endif
2015-12-04 10:03:21 +00:00
if (bytes_sent != sizeof(netplay->packet_buffer))
{
warn_hangup();
netplay->has_connection = false;
return false;
}
}
return true;
2012-04-07 09:55:37 +00:00
}
2015-01-09 17:34:00 +00:00
/**
* get_self_input_state:
* @netplay : pointer to netplay object
*
* Grab our own input state and send this over the network.
*
* Returns: true (1) if successful, otherwise false (0).
**/
static bool get_self_input_state(netplay_t *netplay)
2011-02-13 15:40:24 +00:00
{
uint32_t state[UDP_WORDS_PER_FRAME - 1] = {0};
struct delta_frame *ptr = &netplay->buffer[netplay->self_ptr];
2011-02-13 15:40:24 +00:00
2016-05-08 21:12:04 +00:00
if (!input_driver_is_libretro_input_blocked() && netplay->frame_count > 0)
{
2015-09-29 16:08:33 +00:00
unsigned i;
2016-05-08 21:12:04 +00:00
settings_t *settings = config_get_ptr();
2015-09-29 16:08:33 +00:00
/* First frame we always give zero input since relying on
* input from first frame screws up when we use -F 0. */
retro_input_state_t cb = netplay->cbs.state_cb;
2015-11-17 04:02:15 +00:00
for (i = 0; i < RARCH_FIRST_CUSTOM_BIND; i++)
{
int16_t tmp = cb(settings->input.netplay_client_swap_input ?
0 : !netplay->port,
RETRO_DEVICE_JOYPAD, 0, i);
state[0] |= tmp ? 1 << i : 0;
2015-11-17 04:02:15 +00:00
}
for (i = 0; i < 2; i++)
{
int16_t tmp_x = cb(settings->input.netplay_client_swap_input ?
0 : !netplay->port,
RETRO_DEVICE_ANALOG, i, 0);
int16_t tmp_y = cb(settings->input.netplay_client_swap_input ?
0 : !netplay->port,
RETRO_DEVICE_ANALOG, i, 1);
state[1 + i] = (uint16_t)tmp_x | (((uint16_t)tmp_y) << 16);
}
}
/* Here we construct the payload format:
* frame {
* uint32_t frame_number
* uint32_t RETRO_DEVICE_JOYPAD state (top 16 bits zero)
* uint32_t ANALOG state[0]
* uint32_t ANALOG state[1]
* }
*
* payload {
* ; To compat packet losses, send input in a sliding window
* frame redundancy_frames[UDP_FRAME_PACKETS];
* }
*/
memmove(netplay->packet_buffer, netplay->packet_buffer + UDP_WORDS_PER_FRAME,
sizeof (netplay->packet_buffer) - UDP_WORDS_PER_FRAME * sizeof(uint32_t));
netplay->packet_buffer[(UDP_FRAME_PACKETS - 1) * UDP_WORDS_PER_FRAME] = htonl(netplay->frame_count);
netplay->packet_buffer[(UDP_FRAME_PACKETS - 1) * UDP_WORDS_PER_FRAME + 1] = htonl(state[0]);
netplay->packet_buffer[(UDP_FRAME_PACKETS - 1) * UDP_WORDS_PER_FRAME + 2] = htonl(state[1]);
netplay->packet_buffer[(UDP_FRAME_PACKETS - 1) * UDP_WORDS_PER_FRAME + 3] = htonl(state[2]);
2012-01-21 13:58:39 +00:00
if (!send_chunk(netplay))
{
warn_hangup();
netplay->has_connection = false;
return false;
}
memcpy(ptr->self_state, state, sizeof(state));
2015-04-11 00:49:30 +00:00
netplay->self_ptr = NEXT_PTR(netplay->self_ptr);
return true;
}
static bool netplay_cmd_ack(netplay_t *netplay)
{
uint32_t cmd = htonl(NETPLAY_CMD_ACK);
return socket_send_all_blocking(netplay->fd, &cmd, sizeof(cmd), false);
}
static bool netplay_cmd_nak(netplay_t *netplay)
{
uint32_t cmd = htonl(NETPLAY_CMD_NAK);
return socket_send_all_blocking(netplay->fd, &cmd, sizeof(cmd), false);
}
static bool netplay_get_response(netplay_t *netplay)
{
uint32_t response;
if (!socket_receive_all_blocking(netplay->fd, &response, sizeof(response)))
return false;
return ntohl(response) == NETPLAY_CMD_ACK;
}
static bool netplay_get_cmd(netplay_t *netplay)
{
uint32_t cmd;
uint32_t flip_frame;
size_t cmd_size;
if (!socket_receive_all_blocking(netplay->fd, &cmd, sizeof(cmd)))
return false;
cmd = ntohl(cmd);
cmd_size = cmd & 0xffff;
2015-03-16 01:17:04 +00:00
cmd = cmd >> 16;
switch (cmd)
{
case NETPLAY_CMD_FLIP_PLAYERS:
if (cmd_size != sizeof(uint32_t))
{
2016-06-28 10:08:30 +00:00
RARCH_ERR("CMD_FLIP_PLAYERS received an unexpected command size.\n");
return netplay_cmd_nak(netplay);
}
2016-02-03 16:00:43 +00:00
if (!socket_receive_all_blocking(
netplay->fd, &flip_frame, sizeof(flip_frame)))
{
RARCH_ERR("Failed to receive CMD_FLIP_PLAYERS argument.\n");
return netplay_cmd_nak(netplay);
}
flip_frame = ntohl(flip_frame);
if (flip_frame < netplay->flip_frame)
{
RARCH_ERR("Host asked us to flip users in the past. Not possible ...\n");
return netplay_cmd_nak(netplay);
}
netplay->flip ^= true;
netplay->flip_frame = flip_frame;
RARCH_LOG("Netplay users are flipped.\n");
2015-12-07 14:32:14 +00:00
runloop_msg_queue_push("Netplay users are flipped.", 1, 180, false);
return netplay_cmd_ack(netplay);
2015-11-17 23:18:04 +00:00
case NETPLAY_CMD_SPECTATE:
RARCH_ERR("NETPLAY_CMD_SPECTATE unimplemented.\n");
return netplay_cmd_nak(netplay);
case NETPLAY_CMD_DISCONNECT:
warn_hangup();
return netplay_cmd_ack(netplay);
case NETPLAY_CMD_LOAD_SAVESTATE:
RARCH_ERR("NETPLAY_CMD_LOAD_SAVESTATE unimplemented.\n");
return netplay_cmd_nak(netplay);
case NETPLAY_CMD_PAUSE:
2016-05-09 18:51:53 +00:00
command_event(CMD_EVENT_PAUSE, NULL);
2015-11-17 23:18:04 +00:00
return netplay_cmd_ack(netplay);
case NETPLAY_CMD_RESUME:
2016-05-09 18:51:53 +00:00
command_event(CMD_EVENT_UNPAUSE, NULL);
2015-11-17 23:18:04 +00:00
return netplay_cmd_ack(netplay);
default: break;
}
RARCH_ERR("Unknown netplay command received.\n");
return netplay_cmd_nak(netplay);
}
#define MAX_RETRIES 16
#define RETRY_MS 500
static int poll_input(netplay_t *netplay, bool block)
2011-02-13 15:40:24 +00:00
{
2016-02-03 16:00:43 +00:00
int max_fd = (netplay->fd > netplay->udp_fd ?
netplay->fd : netplay->udp_fd) + 1;
2015-04-11 00:49:30 +00:00
struct timeval tv = {0};
2015-03-16 01:17:04 +00:00
tv.tv_sec = 0;
tv.tv_usec = block ? (RETRY_MS * 1000) : 0;
do
{
2015-01-23 19:01:25 +00:00
fd_set fds;
/* select() does not take pointer to const struct timeval.
* Technically possible for select() to modify tmp_tv, so
* we go paranoia mode. */
struct timeval tmp_tv = tv;
2015-01-23 19:01:25 +00:00
netplay->timeout_cnt++;
FD_ZERO(&fds);
FD_SET(netplay->udp_fd, &fds);
FD_SET(netplay->fd, &fds);
if (socket_select(max_fd, &fds, NULL, NULL, &tmp_tv) < 0)
return -1;
/* Somewhat hacky,
* but we aren't using the TCP connection for anything useful atm. */
if (FD_ISSET(netplay->fd, &fds) && !netplay_get_cmd(netplay))
return -1;
if (FD_ISSET(netplay->udp_fd, &fds))
return 1;
2015-01-23 19:01:25 +00:00
if (!block)
continue;
if (!send_chunk(netplay))
{
warn_hangup();
netplay->has_connection = false;
return -1;
}
2015-01-23 19:01:25 +00:00
RARCH_LOG("Network is stalling, resending packet... Count %u of %d ...\n",
netplay->timeout_cnt, MAX_RETRIES);
} while ((netplay->timeout_cnt < MAX_RETRIES) && block);
if (block)
return -1;
return 0;
}
static bool receive_data(netplay_t *netplay, uint32_t *buffer, size_t size)
{
socklen_t addrlen = sizeof(netplay->their_addr);
if (recvfrom(netplay->udp_fd, (char*)buffer, size, 0,
(struct sockaddr*)&netplay->their_addr, &addrlen) != (ssize_t)size)
return false;
2015-03-16 01:17:04 +00:00
netplay->has_client_addr = true;
2015-03-16 01:17:04 +00:00
return true;
}
static void parse_packet(netplay_t *netplay, uint32_t *buffer, unsigned size)
{
unsigned i;
2015-01-23 08:00:53 +00:00
for (i = 0; i < size * UDP_WORDS_PER_FRAME; i++)
buffer[i] = ntohl(buffer[i]);
for (i = 0; i < size && netplay->read_frame_count <= netplay->frame_count; i++)
{
uint32_t frame = buffer[UDP_WORDS_PER_FRAME * i + 0];
const uint32_t *state = &buffer[UDP_WORDS_PER_FRAME * i + 1];
2015-01-23 07:51:22 +00:00
if (frame != netplay->read_frame_count)
continue;
2015-04-11 00:49:30 +00:00
netplay->buffer[netplay->read_ptr].is_simulated = false;
memcpy(netplay->buffer[netplay->read_ptr].real_input_state, state,
sizeof(netplay->buffer[netplay->read_ptr].real_input_state));
2015-04-11 00:49:30 +00:00
netplay->read_ptr = NEXT_PTR(netplay->read_ptr);
2015-01-23 07:51:22 +00:00
netplay->read_frame_count++;
netplay->timeout_cnt = 0;
}
}
/* TODO: Somewhat better prediction. :P */
static void simulate_input(netplay_t *netplay)
{
2015-04-11 00:49:30 +00:00
size_t ptr = PREV_PTR(netplay->self_ptr);
size_t prev = PREV_PTR(netplay->read_ptr);
memcpy(netplay->buffer[ptr].simulated_input_state,
netplay->buffer[prev].real_input_state,
sizeof(netplay->buffer[prev].real_input_state));
2015-04-11 00:49:30 +00:00
netplay->buffer[ptr].is_simulated = true;
netplay->buffer[ptr].used_real = false;
}
2015-01-09 17:34:00 +00:00
/**
* netplay_poll:
* @netplay : pointer to netplay object
*
* Polls network to see if we have anything new. If our
* network buffer is full, we simply have to block
* for new input data.
*
* Returns: true (1) if successful, otherwise false (0).
**/
static bool netplay_poll(netplay_t *netplay)
{
int res;
if (!netplay->has_connection)
return false;
netplay->can_poll = false;
if (!get_self_input_state(netplay))
return false;
/* We skip reading the first frame so the host has a chance to grab
* our host info so we don't block forever :') */
if (netplay->frame_count == 0)
{
2015-03-16 01:17:04 +00:00
netplay->buffer[0].used_real = true;
netplay->buffer[0].is_simulated = false;
2016-02-03 16:00:43 +00:00
memset(netplay->buffer[0].real_input_state,
0, sizeof(netplay->buffer[0].real_input_state));
2015-04-11 00:49:30 +00:00
netplay->read_ptr = NEXT_PTR(netplay->read_ptr);
netplay->read_frame_count++;
return true;
}
/* We might have reached the end of the buffer, where we
* simply have to block. */
res = poll_input(netplay, netplay->other_ptr == netplay->self_ptr);
if (res == -1)
{
netplay->has_connection = false;
warn_hangup();
return false;
}
if (res == 1)
{
uint32_t first_read = netplay->read_frame_count;
do
{
uint32_t buffer[UDP_FRAME_PACKETS * UDP_WORDS_PER_FRAME];
if (!receive_data(netplay, buffer, sizeof(buffer)))
{
warn_hangup();
netplay->has_connection = false;
return false;
}
parse_packet(netplay, buffer, UDP_FRAME_PACKETS);
2015-04-11 00:49:30 +00:00
} while ((netplay->read_frame_count <= netplay->frame_count) &&
poll_input(netplay, (netplay->other_ptr == netplay->self_ptr) &&
(first_read == netplay->read_frame_count)) == 1);
}
else
{
/* Cannot allow this. Should not happen though. */
if (netplay->self_ptr == netplay->other_ptr)
{
warn_hangup();
return false;
}
}
if (netplay->read_ptr != netplay->self_ptr)
simulate_input(netplay);
else
2015-04-11 00:49:30 +00:00
netplay->buffer[PREV_PTR(netplay->self_ptr)].used_real = true;
return true;
}
void input_poll_net(void)
{
2015-12-05 15:41:00 +00:00
netplay_t *netplay = (netplay_t*)netplay_data;
if (!netplay_should_skip(netplay) && netplay_can_poll(netplay))
netplay_poll(netplay);
}
void video_frame_net(const void *data, unsigned width,
unsigned height, size_t pitch)
{
2015-12-05 15:41:00 +00:00
netplay_t *netplay = (netplay_t*)netplay_data;
if (!netplay_should_skip(netplay))
netplay->cbs.frame_cb(data, width, height, pitch);
}
void audio_sample_net(int16_t left, int16_t right)
{
2015-12-05 15:41:00 +00:00
netplay_t *netplay = (netplay_t*)netplay_data;
if (!netplay_should_skip(netplay))
netplay->cbs.sample_cb(left, right);
}
size_t audio_sample_batch_net(const int16_t *data, size_t frames)
{
2015-12-05 15:41:00 +00:00
netplay_t *netplay = (netplay_t*)netplay_data;
if (!netplay_should_skip(netplay))
return netplay->cbs.sample_batch_cb(data, frames);
return frames;
}
2015-01-09 17:34:00 +00:00
/**
* netplay_is_alive:
* @netplay : pointer to netplay object
*
* Checks if input port/index is controlled by netplay or not.
*
* Returns: true (1) if alive, otherwise false (0).
**/
static bool netplay_is_alive(netplay_t *netplay)
{
if (!netplay)
return false;
return netplay->has_connection;
}
static bool netplay_flip_port(netplay_t *netplay, bool port)
{
size_t frame = netplay->frame_count;
if (netplay->flip_frame == 0)
return port;
if (netplay->is_replay)
frame = netplay->tmp_frame_count;
return port ^ netplay->flip ^ (frame < netplay->flip_frame);
}
2016-02-03 16:00:43 +00:00
static int16_t netplay_input_state(netplay_t *netplay,
bool port, unsigned device,
unsigned idx, unsigned id)
{
size_t ptr = netplay->is_replay ?
2015-04-11 00:49:30 +00:00
netplay->tmp_ptr : PREV_PTR(netplay->self_ptr);
const uint32_t *curr_input_state = netplay->buffer[ptr].self_state;
if (netplay->port == (netplay_flip_port(netplay, port) ? 1 : 0))
{
if (netplay->buffer[ptr].is_simulated)
curr_input_state = netplay->buffer[ptr].simulated_input_state;
else
curr_input_state = netplay->buffer[ptr].real_input_state;
}
switch (device)
{
case RETRO_DEVICE_JOYPAD:
return ((1 << id) & curr_input_state[0]) ? 1 : 0;
case RETRO_DEVICE_ANALOG:
{
uint32_t state = curr_input_state[1 + idx];
return (int16_t)(uint16_t)(state >> (id * 16));
}
default:
return 0;
}
}
int16_t input_state_net(unsigned port, unsigned device,
unsigned idx, unsigned id)
{
2015-12-05 15:41:00 +00:00
netplay_t *netplay = (netplay_t*)netplay_data;
if (netplay_is_alive(netplay))
{
/* Only two players for now. */
if (port > 1)
return 0;
return netplay_input_state(netplay, port, device, idx, id);
}
return netplay->cbs.state_cb(port, device, idx, id);
}
#ifndef HAVE_SOCKET_LEGACY
/* Custom inet_ntop. Win32 doesn't seem to support this ... */
2016-05-12 10:03:43 +00:00
void netplay_log_connection(const struct sockaddr_storage *their_addr,
unsigned slot, const char *nick)
{
union
{
const struct sockaddr_storage *storage;
const struct sockaddr_in *v4;
const struct sockaddr_in6 *v6;
} u;
2015-06-12 15:00:37 +00:00
const char *str = NULL;
char buf_v4[INET_ADDRSTRLEN] = {0};
char buf_v6[INET6_ADDRSTRLEN] = {0};
2015-01-23 08:00:53 +00:00
u.storage = their_addr;
2016-05-09 04:46:08 +00:00
switch (their_addr->ss_family)
{
2016-05-09 04:46:08 +00:00
case AF_INET:
{
struct sockaddr_in in;
2015-01-23 08:00:53 +00:00
2016-05-09 04:46:08 +00:00
memset(&in, 0, sizeof(in));
2015-01-23 08:00:53 +00:00
2016-05-09 04:46:08 +00:00
str = buf_v4;
in.sin_family = AF_INET;
memcpy(&in.sin_addr, &u.v4->sin_addr, sizeof(struct in_addr));
2016-05-09 04:46:08 +00:00
getnameinfo((struct sockaddr*)&in, sizeof(struct sockaddr_in),
buf_v4, sizeof(buf_v4),
NULL, 0, NI_NUMERICHOST);
}
break;
case AF_INET6:
{
struct sockaddr_in6 in;
memset(&in, 0, sizeof(in));
2015-01-23 08:00:53 +00:00
2016-05-09 04:46:08 +00:00
str = buf_v6;
in.sin6_family = AF_INET6;
memcpy(&in.sin6_addr, &u.v6->sin6_addr, sizeof(struct in6_addr));
2016-05-09 04:46:08 +00:00
getnameinfo((struct sockaddr*)&in, sizeof(struct sockaddr_in6),
buf_v6, sizeof(buf_v6), NULL, 0, NI_NUMERICHOST);
}
break;
default:
break;
}
if (str)
{
2015-06-12 15:00:37 +00:00
char msg[512] = {0};
2015-06-13 01:06:11 +00:00
snprintf(msg, sizeof(msg), "Got connection from: \"%s (%s)\" (#%u)",
nick, str, slot);
2015-12-07 14:32:14 +00:00
runloop_msg_queue_push(msg, 1, 180, false);
RARCH_LOG("%s\n", msg);
}
}
#endif
static int init_tcp_connection(const struct addrinfo *res,
bool server, bool spectate,
struct sockaddr *other_addr, socklen_t addr_size)
{
bool ret = true;
2015-04-11 00:49:30 +00:00
int fd = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
2015-01-23 08:00:53 +00:00
if (fd < 0)
{
ret = false;
goto end;
}
if (server)
{
2016-05-01 21:45:59 +00:00
if (socket_connect(fd, (void*)res, false) < 0)
{
ret = false;
goto end;
}
}
else
{
2016-05-01 20:59:35 +00:00
if ( !socket_bind(fd, (void*)res) ||
listen(fd, spectate ? MAX_SPECTATORS : 1) < 0)
{
ret = false;
goto end;
}
if (!spectate)
{
int new_fd = accept(fd, other_addr, &addr_size);
if (new_fd < 0)
{
ret = false;
goto end;
}
socket_close(fd);
fd = new_fd;
}
}
end:
if (!ret && fd >= 0)
{
socket_close(fd);
fd = -1;
}
return fd;
}
static bool init_tcp_socket(netplay_t *netplay, const char *server,
uint16_t port, bool spectate)
{
2015-06-12 15:00:37 +00:00
char port_buf[16] = {0};
bool ret = false;
2015-01-23 07:51:22 +00:00
const struct addrinfo *tmp_info = NULL;
2016-05-01 18:54:30 +00:00
struct addrinfo *res = NULL;
struct addrinfo hints = {0};
2011-02-13 15:40:24 +00:00
hints.ai_socktype = SOCK_STREAM;
if (!server)
hints.ai_flags = AI_PASSIVE;
snprintf(port_buf, sizeof(port_buf), "%hu", (unsigned short)port);
if (getaddrinfo_retro(server, port_buf, &hints, &res) < 0)
2011-02-13 15:40:24 +00:00
return false;
if (!res)
return false;
2014-09-07 03:47:18 +00:00
/* If "localhost" is used, it is important to check every possible
* address for IPv4/IPv6. */
2015-01-23 07:51:22 +00:00
tmp_info = res;
while (tmp_info)
2011-02-13 15:40:24 +00:00
{
2016-04-10 14:35:25 +00:00
int fd = init_tcp_connection(
tmp_info,
server,
netplay->spectate.enabled,
(struct sockaddr*)&netplay->other_addr,
sizeof(netplay->other_addr));
if (fd >= 0)
2011-02-13 15:40:24 +00:00
{
ret = true;
netplay->fd = fd;
break;
2011-02-13 15:40:24 +00:00
}
2012-01-11 18:22:18 +00:00
tmp_info = tmp_info->ai_next;
2012-01-11 18:22:18 +00:00
}
2011-02-13 19:24:54 +00:00
if (res)
freeaddrinfo_retro(res);
if (!ret)
RARCH_ERR("Failed to set up netplay sockets.\n");
2011-02-13 15:40:24 +00:00
return ret;
}
2016-05-01 19:05:09 +00:00
static bool init_udp_socket(netplay_t *netplay, const char *server,
uint16_t port)
{
2016-05-01 23:23:42 +00:00
int fd = socket_init((void**)&netplay->addr, port, server, SOCKET_TYPE_DATAGRAM);
2014-09-07 03:47:18 +00:00
2016-05-01 23:23:42 +00:00
if (fd < 0)
2016-05-01 21:01:41 +00:00
goto error;
2016-05-01 23:23:42 +00:00
netplay->udp_fd = fd;
if (!server)
{
2014-09-07 03:47:18 +00:00
/* Not sure if we have to do this for UDP, but hey :) */
2016-05-01 21:00:54 +00:00
if (!socket_bind(netplay->udp_fd, (void*)netplay->addr))
{
2012-04-21 21:25:32 +00:00
RARCH_ERR("Failed to bind socket.\n");
socket_close(netplay->udp_fd);
netplay->udp_fd = -1;
}
freeaddrinfo_retro(netplay->addr);
netplay->addr = NULL;
}
2011-02-13 15:40:24 +00:00
return true;
2016-05-01 21:01:41 +00:00
error:
RARCH_ERR("Failed to initialize socket.\n");
return false;
2011-02-13 15:40:24 +00:00
}
static bool init_socket(netplay_t *netplay, const char *server, uint16_t port)
{
if (!network_init())
return false;
if (!init_tcp_socket(netplay, server, port, netplay->spectate.enabled))
return false;
if (!netplay->spectate.enabled && !init_udp_socket(netplay, server, port))
return false;
return true;
}
2015-01-09 17:34:00 +00:00
/**
* netplay_new:
* @server : IP address of server.
* @port : Port of server.
* @frames : Amount of lag frames.
* @cb : Libretro callbacks.
* @spectate : If true, enable spectator mode.
* @nick : Nickname of user.
*
* Creates a new netplay handle. A NULL host means we're
* hosting (user 1).
*
* Returns: new netplay handle.
**/
netplay_t *netplay_new(const char *server, uint16_t port,
unsigned frames, const struct retro_callbacks *cb,
2015-04-11 00:49:30 +00:00
bool spectate,
const char *nick)
{
2015-04-11 00:49:30 +00:00
netplay_t *netplay = NULL;
if (frames > UDP_FRAME_PACKETS)
frames = UDP_FRAME_PACKETS;
netplay = (netplay_t*)calloc(1, sizeof(*netplay));
if (!netplay)
return NULL;
netplay->fd = -1;
netplay->udp_fd = -1;
netplay->cbs = *cb;
netplay->port = server ? 0 : 1;
netplay->spectate.enabled = spectate;
2015-12-23 20:25:28 +00:00
netplay->is_server = server == NULL;
strlcpy(netplay->nick, nick, sizeof(netplay->nick));
2015-12-23 20:25:28 +00:00
if(spectate)
netplay->net_cbs = netplay_get_cbs_spectate();
else
netplay->net_cbs = netplay_get_cbs_net();
if (!init_socket(netplay, server, port))
{
free(netplay);
return NULL;
}
2015-12-24 18:23:46 +00:00
if(!netplay_info_cb(netplay, frames))
2015-12-23 20:25:28 +00:00
goto error;
2012-01-21 13:00:11 +00:00
return netplay;
2012-01-21 13:00:11 +00:00
error:
if (netplay->fd >= 0)
socket_close(netplay->fd);
if (netplay->udp_fd >= 0)
socket_close(netplay->udp_fd);
2012-01-21 13:00:11 +00:00
2015-04-11 00:49:30 +00:00
free(netplay);
return NULL;
2012-01-21 13:00:11 +00:00
}
2015-11-17 23:18:04 +00:00
static bool netplay_send_raw_cmd(netplay_t *netplay, uint32_t cmd,
const void *data, size_t size)
{
cmd = (cmd << 16) | (size & 0xffff);
cmd = htonl(cmd);
2012-01-21 13:00:11 +00:00
if (!socket_send_all_blocking(netplay->fd, &cmd, sizeof(cmd), false))
return false;
2012-01-21 13:00:11 +00:00
if (!socket_send_all_blocking(netplay->fd, data, size, false))
return false;
2012-01-21 13:24:38 +00:00
return true;
}
2012-01-21 13:00:11 +00:00
2015-01-09 17:34:00 +00:00
/**
2015-11-17 23:18:04 +00:00
* netplay_command:
* @netplay : pointer to netplay object
* @cmd : command to send
* @data : data to send as argument
* @sz : size of data
* @flags : flags of CMD_OPT_*
* @command_str : name of action
* @success_msg : message to display upon success
*
* Sends a single netplay command and waits for response.
*/
bool netplay_command(netplay_t* netplay, enum netplay_cmd cmd,
void* data, size_t sz,
uint32_t flags,
const char* command_str,
const char* success_msg)
2012-01-21 13:00:11 +00:00
{
2015-11-19 12:03:23 +00:00
char m[256];
2015-11-17 23:18:04 +00:00
const char* msg = NULL;
bool allowed_spectate = !!(flags & CMD_OPT_ALLOWED_IN_SPECTATE_MODE);
bool host_only = !!(flags & CMD_OPT_HOST_ONLY);
bool require_sync = !!(flags & CMD_OPT_REQUIRE_SYNC);
2015-11-19 12:03:23 +00:00
assert(netplay);
if (netplay->spectate.enabled && !allowed_spectate)
2012-01-21 13:00:11 +00:00
{
2015-11-17 23:18:04 +00:00
msg = "Cannot %s in spectate mode.";
goto error;
2012-01-21 13:00:11 +00:00
}
2015-11-17 23:18:04 +00:00
if (host_only && netplay->port == 0)
2012-01-21 13:00:11 +00:00
{
2015-11-17 23:18:04 +00:00
msg = "Cannot %s as a client.";
2012-01-21 13:00:11 +00:00
goto error;
}
2015-11-17 23:18:04 +00:00
if(require_sync && check_netplay_synched(netplay))
2012-01-21 13:00:11 +00:00
{
2015-11-17 23:18:04 +00:00
msg = "Cannot %s while host and client are not in sync.";
2012-01-21 13:00:11 +00:00
goto error;
}
2015-11-17 23:18:04 +00:00
if(netplay_send_raw_cmd(netplay, cmd, data, sz)) {
if(netplay_get_response(netplay))
2015-12-07 14:32:14 +00:00
runloop_msg_queue_push(success_msg, 1, 180, false);
2015-11-17 23:18:04 +00:00
else
{
msg = "Failed to send command \"%s\"";
goto error;
}
}
return true;
2015-11-19 12:03:23 +00:00
error:
snprintf(m, sizeof(m), msg, command_str);
2015-11-17 23:18:04 +00:00
RARCH_WARN("%s\n", m);
2015-12-07 14:32:14 +00:00
runloop_msg_queue_push(m, 1, 180, false);
2015-11-17 23:18:04 +00:00
return false;
}
2012-01-21 13:24:38 +00:00
2015-11-17 23:18:04 +00:00
/**
* netplay_flip_users:
* @netplay : pointer to netplay object
*
* On regular netplay, flip who controls user 1 and 2.
**/
2016-04-09 01:16:11 +00:00
static void netplay_flip_users(netplay_t *netplay)
2015-11-17 23:18:04 +00:00
{
2015-11-17 23:35:53 +00:00
uint32_t flip_frame = netplay->frame_count + 2 * UDP_FRAME_PACKETS;
uint32_t flip_frame_net = htonl(flip_frame);
2015-11-17 23:18:04 +00:00
bool command = netplay_command(
netplay, NETPLAY_CMD_FLIP_PLAYERS,
&flip_frame_net, sizeof flip_frame_net,
CMD_OPT_HOST_ONLY | CMD_OPT_REQUIRE_SYNC,
"flip users", "Successfully flipped users.\n");
2015-11-17 23:18:04 +00:00
if(command)
{
2015-11-17 23:32:45 +00:00
netplay->flip ^= true;
2015-11-17 23:37:43 +00:00
netplay->flip_frame = flip_frame;
2012-01-21 13:00:11 +00:00
}
}
2015-01-09 17:34:00 +00:00
/**
* netplay_free:
* @netplay : pointer to netplay object
*
* Frees netplay handle.
**/
void netplay_free(netplay_t *netplay)
2011-02-13 15:40:24 +00:00
{
2013-10-22 19:26:33 +00:00
unsigned i;
2015-01-09 17:34:00 +00:00
socket_close(netplay->fd);
if (netplay->spectate.enabled)
2012-01-11 18:22:18 +00:00
{
2013-10-22 19:26:33 +00:00
for (i = 0; i < MAX_SPECTATORS; i++)
if (netplay->spectate.fds[i] >= 0)
socket_close(netplay->spectate.fds[i]);
2012-01-11 18:22:18 +00:00
free(netplay->spectate.input);
2012-01-11 18:22:18 +00:00
}
else
{
socket_close(netplay->udp_fd);
2012-01-11 18:22:18 +00:00
for (i = 0; i < netplay->buffer_size; i++)
free(netplay->buffer[i].state);
2012-01-11 18:22:18 +00:00
free(netplay->buffer);
2012-01-11 18:22:18 +00:00
}
if (netplay->addr)
freeaddrinfo_retro(netplay->addr);
2012-01-11 18:22:18 +00:00
free(netplay);
2011-02-13 15:40:24 +00:00
}
static void netplay_set_spectate_input(netplay_t *netplay, int16_t input)
2012-01-11 18:22:18 +00:00
{
if (netplay->spectate.input_ptr >= netplay->spectate.input_sz)
2012-01-11 18:22:18 +00:00
{
netplay->spectate.input_sz++;
netplay->spectate.input_sz *= 2;
netplay->spectate.input = (uint16_t*)realloc(netplay->spectate.input,
netplay->spectate.input_sz * sizeof(uint16_t));
2012-01-11 18:22:18 +00:00
}
netplay->spectate.input[netplay->spectate.input_ptr++] = swap_if_big16(input);
2012-01-11 18:22:18 +00:00
}
2014-09-07 03:47:18 +00:00
int16_t input_state_spectate(unsigned port, unsigned device,
2014-10-20 17:29:49 +00:00
unsigned idx, unsigned id)
2012-01-11 18:22:18 +00:00
{
2015-12-05 15:41:00 +00:00
netplay_t *netplay = (netplay_t*)netplay_data;
2015-04-11 00:49:30 +00:00
int16_t res = netplay->cbs.state_cb(port, device, idx, id);
netplay_set_spectate_input(netplay, res);
2012-01-11 18:22:18 +00:00
return res;
}
static int16_t netplay_get_spectate_input(netplay_t *netplay, bool port,
2014-10-20 17:29:49 +00:00
unsigned device, unsigned idx, unsigned id)
2012-01-11 18:22:18 +00:00
{
int16_t inp;
2016-01-28 03:39:38 +00:00
retro_ctx_input_state_info_t input_info;
if (socket_receive_all_blocking(netplay->fd, (char*)&inp, sizeof(inp)))
2012-01-11 18:22:18 +00:00
return swap_if_big16(inp);
RARCH_ERR("Connection with host was cut.\n");
2015-12-07 14:32:14 +00:00
runloop_msg_queue_push("Connection with host was cut.", 1, 180, true);
2016-01-28 03:39:38 +00:00
input_info.cb = netplay->cbs.state_cb;
2016-05-07 23:33:57 +00:00
core_set_input_state(&input_info);
2016-01-28 03:39:38 +00:00
return netplay->cbs.state_cb(port, device, idx, id);
2012-01-11 18:22:18 +00:00
}
2014-09-07 03:47:18 +00:00
int16_t input_state_spectate_client(unsigned port, unsigned device,
2014-10-20 17:29:49 +00:00
unsigned idx, unsigned id)
2012-01-11 18:22:18 +00:00
{
2015-12-05 15:41:00 +00:00
return netplay_get_spectate_input((netplay_t*)netplay_data, port,
2015-04-11 00:49:30 +00:00
device, idx, id);
2012-01-11 18:22:18 +00:00
}
2015-01-09 17:34:00 +00:00
/**
* netplay_pre_frame:
* @netplay : pointer to netplay object
*
* Pre-frame for Netplay.
* Call this before running retro_run().
**/
void netplay_pre_frame(netplay_t *netplay)
2012-01-11 18:22:18 +00:00
{
2015-12-23 20:25:28 +00:00
assert(netplay && netplay->net_cbs->pre_frame);
netplay->net_cbs->pre_frame(netplay);
2012-01-11 18:22:18 +00:00
}
2015-01-09 17:34:00 +00:00
/**
* netplay_post_frame:
* @netplay : pointer to netplay object
*
* Post-frame for Netplay.
* We check if we have new input and replay from recorded input.
* Call this after running retro_run().
**/
void netplay_post_frame(netplay_t *netplay)
2012-01-11 18:22:18 +00:00
{
2015-12-23 20:25:28 +00:00
assert(netplay && netplay->net_cbs->post_frame);
netplay->net_cbs->post_frame(netplay);
2012-01-11 18:22:18 +00:00
}
2015-04-11 11:31:33 +00:00
void deinit_netplay(void)
{
2015-12-05 15:41:00 +00:00
netplay_t *netplay = (netplay_t*)netplay_data;
2015-04-11 11:31:33 +00:00
if (netplay)
netplay_free(netplay);
2015-12-05 15:41:00 +00:00
netplay_data = NULL;
2015-04-11 11:31:33 +00:00
}
2015-04-11 11:29:40 +00:00
/**
* init_netplay:
*
* Initializes netplay.
*
* If netplay is already initialized, will return false (0).
*
* Returns: true (1) if successful, otherwise false (0).
**/
bool init_netplay(void)
{
struct retro_callbacks cbs = {0};
settings_t *settings = config_get_ptr();
global_t *global = global_get_ptr();
if (!global->netplay.enable)
2015-04-11 11:29:40 +00:00
return false;
2015-11-30 23:08:02 +00:00
if (bsv_movie_ctl(BSV_MOVIE_CTL_START_PLAYBACK, NULL))
2015-04-11 11:29:40 +00:00
{
2016-02-03 16:00:43 +00:00
RARCH_WARN("%s\n",
msg_hash_to_str(MSG_NETPLAY_FAILED_MOVIE_PLAYBACK_HAS_STARTED));
2015-04-11 11:29:40 +00:00
return false;
}
2016-05-07 23:33:57 +00:00
core_set_default_callbacks(&cbs);
2015-04-11 11:29:40 +00:00
2015-07-27 15:18:10 +00:00
if (*global->netplay.server)
2015-04-11 11:29:40 +00:00
{
RARCH_LOG("Connecting to netplay host...\n");
2015-07-27 15:18:10 +00:00
global->netplay.is_client = true;
2015-04-11 11:29:40 +00:00
}
else
RARCH_LOG("Waiting for client...\n");
2015-12-05 15:41:00 +00:00
netplay_data = (netplay_t*)netplay_new(
2015-07-27 15:18:10 +00:00
global->netplay.is_client ? global->netplay.server : NULL,
global->netplay.port ? global->netplay.port : RARCH_DEFAULT_PORT,
global->netplay.sync_frames, &cbs, global->netplay.is_spectate,
2015-04-11 11:29:40 +00:00
settings->username);
2015-12-05 15:41:00 +00:00
if (netplay_data)
2015-04-11 11:29:40 +00:00
return true;
2015-07-27 15:18:10 +00:00
global->netplay.is_client = false;
2015-07-02 16:39:57 +00:00
RARCH_WARN("%s\n", msg_hash_to_str(MSG_NETPLAY_FAILED));
2015-04-11 11:29:40 +00:00
runloop_msg_queue_push(
msg_hash_to_str(MSG_NETPLAY_FAILED),
2015-04-11 11:29:40 +00:00
0, 180, false);
return false;
}
2015-12-05 15:24:31 +00:00
bool netplay_driver_ctl(enum rarch_netplay_ctl_state state, void *data)
{
2015-12-05 15:41:00 +00:00
if (!netplay_data)
2015-12-05 15:24:31 +00:00
return false;
switch (state)
{
case RARCH_NETPLAY_CTL_IS_DATA_INITED:
return true;
case RARCH_NETPLAY_CTL_POST_FRAME:
2015-12-05 15:41:00 +00:00
netplay_post_frame((netplay_t*)netplay_data);
break;
case RARCH_NETPLAY_CTL_PRE_FRAME:
2015-12-05 15:41:00 +00:00
netplay_pre_frame((netplay_t*)netplay_data);
break;
2015-12-05 15:24:31 +00:00
case RARCH_NETPLAY_CTL_FLIP_PLAYERS:
{
bool *state = (bool*)data;
if (*state)
2016-04-09 01:16:11 +00:00
netplay_flip_users((netplay_t*)netplay_data);
2015-12-05 15:24:31 +00:00
}
break;
case RARCH_NETPLAY_CTL_FULLSCREEN_TOGGLE:
{
bool *state = (bool*)data;
if (*state)
2016-05-09 18:51:53 +00:00
command_event(CMD_EVENT_FULLSCREEN_TOGGLE, NULL);
2015-12-05 15:24:31 +00:00
}
break;
default:
case RARCH_NETPLAY_CTL_NONE:
break;
}
return false;
}