packet_peer_udp_winsock.cpp 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299
  1. /*************************************************************************/
  2. /* packet_peer_udp_winsock.cpp */
  3. /*************************************************************************/
  4. /* This file is part of: */
  5. /* GODOT ENGINE */
  6. /* https://godotengine.org */
  7. /*************************************************************************/
  8. /* Copyright (c) 2007-2019 Juan Linietsky, Ariel Manzur. */
  9. /* Copyright (c) 2014-2019 Godot Engine contributors (cf. AUTHORS.md) */
  10. /* */
  11. /* Permission is hereby granted, free of charge, to any person obtaining */
  12. /* a copy of this software and associated documentation files (the */
  13. /* "Software"), to deal in the Software without restriction, including */
  14. /* without limitation the rights to use, copy, modify, merge, publish, */
  15. /* distribute, sublicense, and/or sell copies of the Software, and to */
  16. /* permit persons to whom the Software is furnished to do so, subject to */
  17. /* the following conditions: */
  18. /* */
  19. /* The above copyright notice and this permission notice shall be */
  20. /* included in all copies or substantial portions of the Software. */
  21. /* */
  22. /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */
  23. /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */
  24. /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.*/
  25. /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */
  26. /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */
  27. /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */
  28. /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */
  29. /*************************************************************************/
  30. #ifdef WINDOWS_ENABLED
  31. #include "packet_peer_udp_winsock.h"
  32. #include <winsock2.h>
  33. #include <ws2tcpip.h>
  34. #include "drivers/unix/socket_helpers.h"
  35. int PacketPeerUDPWinsock::get_available_packet_count() const {
  36. Error err = const_cast<PacketPeerUDPWinsock *>(this)->_poll(false);
  37. if (err != OK)
  38. return 0;
  39. return queue_count;
  40. }
  41. Error PacketPeerUDPWinsock::get_packet(const uint8_t **r_buffer, int &r_buffer_size) {
  42. Error err = const_cast<PacketPeerUDPWinsock *>(this)->_poll(false);
  43. if (err != OK)
  44. return err;
  45. if (queue_count == 0)
  46. return ERR_UNAVAILABLE;
  47. uint32_t size;
  48. uint8_t type;
  49. rb.read(&type, 1, true);
  50. if (type == IP::TYPE_IPV4) {
  51. uint8_t ip[4];
  52. rb.read(ip, 4, true);
  53. packet_ip.set_ipv4(ip);
  54. } else {
  55. uint8_t ip[16];
  56. rb.read(ip, 16, true);
  57. packet_ip.set_ipv6(ip);
  58. };
  59. rb.read((uint8_t *)&packet_port, 4, true);
  60. rb.read((uint8_t *)&size, 4, true);
  61. rb.read(packet_buffer, size, true);
  62. --queue_count;
  63. *r_buffer = packet_buffer;
  64. r_buffer_size = size;
  65. return OK;
  66. }
  67. Error PacketPeerUDPWinsock::put_packet(const uint8_t *p_buffer, int p_buffer_size) {
  68. ERR_FAIL_COND_V(!peer_addr.is_valid(), ERR_UNCONFIGURED);
  69. if (sock_type == IP::TYPE_NONE)
  70. sock_type = peer_addr.is_ipv4() ? IP::TYPE_IPV4 : IP::TYPE_IPV6;
  71. int sock = _get_socket();
  72. ERR_FAIL_COND_V(sock == -1, FAILED);
  73. struct sockaddr_storage addr;
  74. size_t addr_size = _set_sockaddr(&addr, peer_addr, peer_port, sock_type);
  75. _set_sock_blocking(blocking);
  76. errno = 0;
  77. int err;
  78. while ((err = sendto(sock, (const char *)p_buffer, p_buffer_size, 0, (struct sockaddr *)&addr, addr_size)) != p_buffer_size) {
  79. if (WSAGetLastError() != WSAEWOULDBLOCK) {
  80. return FAILED;
  81. } else if (!blocking) {
  82. return ERR_UNAVAILABLE;
  83. }
  84. }
  85. return OK;
  86. }
  87. int PacketPeerUDPWinsock::get_max_packet_size() const {
  88. return 512; // uhm maybe not
  89. }
  90. void PacketPeerUDPWinsock::_set_sock_blocking(bool p_blocking) {
  91. if (sock_blocking == p_blocking)
  92. return;
  93. sock_blocking = p_blocking;
  94. unsigned long par = sock_blocking ? 0 : 1;
  95. if (ioctlsocket(sockfd, FIONBIO, &par)) {
  96. perror("setting non-block mode");
  97. //close();
  98. //return -1;
  99. };
  100. }
  101. Error PacketPeerUDPWinsock::listen(int p_port, const IP_Address &p_bind_address, int p_recv_buffer_size) {
  102. ERR_FAIL_COND_V(sockfd != -1, ERR_ALREADY_IN_USE);
  103. ERR_FAIL_COND_V(!p_bind_address.is_valid() && !p_bind_address.is_wildcard(), ERR_INVALID_PARAMETER);
  104. sock_type = IP::TYPE_ANY;
  105. if (p_bind_address.is_valid())
  106. sock_type = p_bind_address.is_ipv4() ? IP::TYPE_IPV4 : IP::TYPE_IPV6;
  107. int sock = _get_socket();
  108. if (sock == -1)
  109. return ERR_CANT_CREATE;
  110. struct sockaddr_storage addr = { 0 };
  111. size_t addr_size = _set_listen_sockaddr(&addr, p_port, sock_type, IP_Address());
  112. if (bind(sock, (struct sockaddr *)&addr, addr_size) == -1) {
  113. close();
  114. return ERR_UNAVAILABLE;
  115. }
  116. printf("UDP Connection listening on port %i\n", p_port);
  117. rb.resize(nearest_shift(p_recv_buffer_size));
  118. return OK;
  119. }
  120. void PacketPeerUDPWinsock::close() {
  121. if (sockfd != -1)
  122. ::closesocket(sockfd);
  123. sockfd = -1;
  124. sock_type = IP::TYPE_NONE;
  125. rb.resize(16);
  126. queue_count = 0;
  127. }
  128. Error PacketPeerUDPWinsock::wait() {
  129. return _poll(true);
  130. }
  131. Error PacketPeerUDPWinsock::_poll(bool p_wait) {
  132. if (sockfd == -1) {
  133. return FAILED;
  134. }
  135. _set_sock_blocking(p_wait);
  136. struct sockaddr_storage from = { 0 };
  137. int len = sizeof(struct sockaddr_storage);
  138. int ret;
  139. while ((ret = recvfrom(sockfd, (char *)recv_buffer, MIN((int)sizeof(recv_buffer), MAX(rb.space_left() - 24, 0)), 0, (struct sockaddr *)&from, &len)) > 0) {
  140. uint32_t port = 0;
  141. if (from.ss_family == AF_INET) {
  142. uint8_t type = (uint8_t)IP::TYPE_IPV4;
  143. rb.write(&type, 1);
  144. struct sockaddr_in *sin_from = (struct sockaddr_in *)&from;
  145. rb.write((uint8_t *)&sin_from->sin_addr, 4);
  146. port = ntohs(sin_from->sin_port);
  147. } else if (from.ss_family == AF_INET6) {
  148. uint8_t type = (uint8_t)IP::TYPE_IPV6;
  149. rb.write(&type, 1);
  150. struct sockaddr_in6 *s6_from = (struct sockaddr_in6 *)&from;
  151. rb.write((uint8_t *)&s6_from->sin6_addr, 16);
  152. port = ntohs(s6_from->sin6_port);
  153. } else {
  154. // WARN_PRINT("Ignoring packet with unknown address family");
  155. uint8_t type = (uint8_t)IP::TYPE_NONE;
  156. rb.write(&type, 1);
  157. };
  158. rb.write((uint8_t *)&port, 4);
  159. rb.write((uint8_t *)&ret, 4);
  160. rb.write(recv_buffer, ret);
  161. len = sizeof(struct sockaddr_storage);
  162. ++queue_count;
  163. if (p_wait)
  164. break;
  165. };
  166. if (ret == SOCKET_ERROR) {
  167. int error = WSAGetLastError();
  168. if (error == WSAEWOULDBLOCK) {
  169. // Expected when doing non-blocking sockets, retry later.
  170. } else if (error == WSAECONNRESET) {
  171. // If the remote target does not accept messages, this error may occur, but is harmless.
  172. // Once the remote target gets available, this message will disappear for new messages.
  173. } else {
  174. close();
  175. return FAILED;
  176. }
  177. }
  178. if (ret == 0) {
  179. close();
  180. return FAILED;
  181. };
  182. return OK;
  183. }
  184. bool PacketPeerUDPWinsock::is_listening() const {
  185. return sockfd != -1;
  186. }
  187. IP_Address PacketPeerUDPWinsock::get_packet_address() const {
  188. return packet_ip;
  189. }
  190. int PacketPeerUDPWinsock::get_packet_port() const {
  191. return packet_port;
  192. }
  193. int PacketPeerUDPWinsock::_get_socket() {
  194. ERR_FAIL_COND_V(sock_type == IP::TYPE_NONE, -1);
  195. if (sockfd != -1)
  196. return sockfd;
  197. sockfd = _socket_create(sock_type, SOCK_DGRAM, IPPROTO_UDP);
  198. if (sockfd != -1)
  199. _set_sock_blocking(false);
  200. return sockfd;
  201. }
  202. void PacketPeerUDPWinsock::set_dest_address(const IP_Address &p_address, int p_port) {
  203. peer_addr = p_address;
  204. peer_port = p_port;
  205. }
  206. void PacketPeerUDPWinsock::make_default() {
  207. PacketPeerUDP::_create = PacketPeerUDPWinsock::_create;
  208. };
  209. PacketPeerUDP *PacketPeerUDPWinsock::_create() {
  210. return memnew(PacketPeerUDPWinsock);
  211. };
  212. PacketPeerUDPWinsock::PacketPeerUDPWinsock() {
  213. blocking = true;
  214. sock_blocking = true;
  215. sockfd = -1;
  216. packet_port = 0;
  217. queue_count = 0;
  218. peer_port = 0;
  219. sock_type = IP::TYPE_NONE;
  220. rb.resize(16);
  221. }
  222. PacketPeerUDPWinsock::~PacketPeerUDPWinsock() {
  223. close();
  224. }
  225. #endif