
Ref: http://www.eathena.ws/board/index.php?showtopic=129766 The rest of the TURBO related errors are about the HEAD defines having to be at the start of a block because they contain a variable declaration. (i won't fix these) git-svn-id: https://svn.code.sf.net/p/rathena/svn/trunk@9611 54d463be-8e91-2dee-dedb-b68131a5f0ec
1240 lines
32 KiB
C
1240 lines
32 KiB
C
// Copyright (c) Athena Dev Teams - Licensed under GNU GPL
|
||
// For more information, see LICENCE in the main folder
|
||
|
||
#include <stdio.h>
|
||
#include <stdlib.h>
|
||
#include <sys/types.h>
|
||
|
||
#ifdef __WIN32
|
||
#define WIN32_LEAN_AND_MEAN
|
||
#include <windows.h>
|
||
#include <winsock.h>
|
||
#include <io.h>
|
||
#else
|
||
#include <errno.h>
|
||
#include <sys/socket.h>
|
||
#include <netinet/in.h>
|
||
#include <netinet/tcp.h>
|
||
#include <net/if.h>
|
||
#include <unistd.h>
|
||
#include <sys/time.h>
|
||
#include <sys/ioctl.h>
|
||
#include <netdb.h>
|
||
#include <arpa/inet.h>
|
||
|
||
#ifndef SIOCGIFCONF
|
||
#include <sys/sockio.h> // SIOCGIFCONF on Solaris, maybe others? [Shinomori]
|
||
#endif
|
||
#endif
|
||
|
||
// portability layer
|
||
#ifdef _WIN32
|
||
typedef int socklen_t;
|
||
|
||
#define s_errno WSAGetLastError()
|
||
#define S_ENOTSOCK WSAENOTSOCK
|
||
#define S_EWOULDBLOCK WSAEWOULDBLOCK
|
||
#define S_ECONNABORTED WSAECONNABORTED
|
||
#else
|
||
#define SOCKET_ERROR -1
|
||
#define INVALID_SOCKET -1
|
||
#define ioctlsocket ioctl
|
||
#define closesocket close
|
||
|
||
#define s_errno errno
|
||
#define S_ENOTSOCK EBADF
|
||
#define S_EWOULDBLOCK EAGAIN
|
||
#define S_ECONNABORTED ECONNABORTED
|
||
#endif
|
||
|
||
#include <fcntl.h>
|
||
#include <string.h>
|
||
|
||
#include "../common/socket.h"
|
||
#include "../common/mmo.h"
|
||
#include "../common/timer.h"
|
||
#include "../common/malloc.h"
|
||
#include "../common/showmsg.h"
|
||
|
||
fd_set readfds;
|
||
int fd_max;
|
||
time_t last_tick;
|
||
time_t stall_time = 60;
|
||
int ip_rules = 1;
|
||
|
||
#ifndef TCP_FRAME_LEN
|
||
#define TCP_FRAME_LEN 1024
|
||
#endif
|
||
|
||
static int mode_neg=1;
|
||
static size_t frame_size=TCP_FRAME_LEN;
|
||
|
||
#ifndef MINICORE
|
||
enum {
|
||
ACO_DENY_ALLOW=0,
|
||
ACO_ALLOW_DENY,
|
||
ACO_MUTUAL_FAILTURE,
|
||
};
|
||
|
||
static struct _access_control *access_allow;
|
||
static struct _access_control *access_deny;
|
||
static int access_order=ACO_DENY_ALLOW;
|
||
static int access_allownum=0;
|
||
static int access_denynum=0;
|
||
static int access_debug=0;
|
||
static int ddos_count = 10;
|
||
static int ddos_interval = 3000;
|
||
static int ddos_autoreset = 600*1000;
|
||
#endif
|
||
|
||
|
||
// values derived from freya
|
||
// a player that send more than 2k is probably a hacker without be parsed
|
||
// biggest known packet: S 0153 <len>.w <emblem data>.?B -> 24x24 256 color .bmp (0153 + len.w + 1618/1654/1756 bytes)
|
||
size_t rfifo_size = (16*1024);
|
||
size_t wfifo_size = (16*1024);
|
||
|
||
#define CONVIP(ip) ip&0xFF,(ip>>8)&0xFF,(ip>>16)&0xFF,ip>>24
|
||
|
||
struct socket_data *session[FD_SETSIZE];
|
||
|
||
static int null_parse(int fd);
|
||
static int (*default_func_parse)(int) = null_parse;
|
||
|
||
static int null_console_parse(char *buf);
|
||
static int (*default_console_parse)(char*) = null_console_parse;
|
||
#ifndef MINICORE
|
||
static int connect_check(unsigned int ip);
|
||
#else
|
||
#define connect_check(n) 1
|
||
#endif
|
||
|
||
/*======================================
|
||
* CORE : Set function
|
||
*--------------------------------------
|
||
*/
|
||
void set_defaultparse(int (*defaultparse)(int))
|
||
{
|
||
default_func_parse = defaultparse;
|
||
}
|
||
|
||
void set_nonblocking(int fd, int yes)
|
||
{
|
||
// I don't think we need this
|
||
// TCP_NODELAY BOOL Disables the Nagle algorithm for send coalescing.
|
||
if(mode_neg)
|
||
setsockopt(fd,IPPROTO_TCP,TCP_NODELAY,(char *)&yes,sizeof yes);
|
||
|
||
// FIONBIO Use with a nonzero argp parameter to enable the nonblocking mode of socket s.
|
||
// The argp parameter is zero if nonblocking is to be disabled.
|
||
if (ioctlsocket(fd, FIONBIO, &yes) != 0)
|
||
ShowError("Couldn't set the socket to non-blocking mode (code %d)!\n", s_errno);
|
||
}
|
||
|
||
static void setsocketopts(int fd)
|
||
{
|
||
int yes = 1; // reuse fix
|
||
#ifndef WIN32
|
||
// set SO_REAUSEADDR to true, unix only. on windows this option causes
|
||
// the previous owner of the socket to give up, which is not desirable
|
||
// in most cases, neither compatible with unix.
|
||
setsockopt(fd,SOL_SOCKET,SO_REUSEADDR,(char *)&yes,sizeof(yes));
|
||
#ifdef SO_REUSEPORT
|
||
setsockopt(fd,SOL_SOCKET,SO_REUSEPORT,(char *)&yes,sizeof(yes));
|
||
#endif
|
||
#endif
|
||
setsockopt(fd,IPPROTO_TCP,TCP_NODELAY,(char *)&yes,sizeof(yes));
|
||
// setsockopt(fd, SOL_SOCKET, SO_SNDBUF, (char *) &wfifo_size , sizeof(rfifo_size ));
|
||
// setsockopt(fd, SOL_SOCKET, SO_RCVBUF, (char *) &rfifo_size , sizeof(rfifo_size ));
|
||
#ifdef __WIN32
|
||
{ //set SO_LINGER option (from Freya)
|
||
//(http://msdn.microsoft.com/library/default.asp?url=/library/en-us/winsock/winsock/closesocket_2.asp)
|
||
struct linger opt;
|
||
opt.l_onoff = 1;
|
||
opt.l_linger = 0;
|
||
if (setsockopt(fd, SOL_SOCKET, SO_LINGER, (char*)&opt, sizeof(opt)))
|
||
ShowWarning("setsocketopts: Unable to set SO_LINGER mode for connection %d!\n",fd);
|
||
}
|
||
#endif
|
||
}
|
||
|
||
/*======================================
|
||
* CORE : Socket Sub Function
|
||
*--------------------------------------
|
||
*/
|
||
static void set_eof(int fd)
|
||
{ //Marks a connection eof and invokes the parse_function to disconnect it right away. [Skotlex]
|
||
if (session_isActive(fd))
|
||
session[fd]->eof=1;
|
||
}
|
||
|
||
static int recv_to_fifo(int fd)
|
||
{
|
||
int len;
|
||
|
||
if( (fd < 0) || (fd >= FD_SETSIZE) || (NULL == session[fd]) || (session[fd]->eof) )
|
||
return -1;
|
||
|
||
len = recv(fd, (char *) session[fd]->rdata + session[fd]->rdata_size, RFIFOSPACE(fd), 0);
|
||
|
||
if (len == SOCKET_ERROR) {
|
||
if (s_errno == S_ECONNABORTED) {
|
||
ShowWarning("recv_to_fifo: Software caused connection abort on session #%d\n", fd);
|
||
FD_CLR(fd, &readfds); //Remove the socket so the select() won't hang on it.
|
||
}
|
||
if (s_errno != S_EWOULDBLOCK) {
|
||
//ShowDebug("recv_to_fifo: error %d, ending connection #%d\n", s_errno, fd);
|
||
set_eof(fd);
|
||
}
|
||
return 0;
|
||
}
|
||
|
||
if (len <= 0) { //Normal connection end.
|
||
set_eof(fd);
|
||
return 0;
|
||
}
|
||
|
||
session[fd]->rdata_size += len;
|
||
session[fd]->rdata_tick = last_tick;
|
||
return 0;
|
||
}
|
||
|
||
static int send_from_fifo(int fd)
|
||
{
|
||
int len;
|
||
|
||
if( !session_isValid(fd) )
|
||
return -1;
|
||
|
||
if (session[fd]->wdata_size == 0)
|
||
return 0;
|
||
|
||
len = send(fd, (const char *) session[fd]->wdata, session[fd]->wdata_size, 0);
|
||
|
||
if (len == SOCKET_ERROR) {
|
||
if (s_errno == S_ECONNABORTED) {
|
||
ShowWarning("send_from_fifo: Software caused connection abort on session #%d\n", fd);
|
||
session[fd]->wdata_size = 0; //Clear the send queue as we can't send anymore. [Skotlex]
|
||
set_eof(fd);
|
||
FD_CLR(fd, &readfds); //Remove the socket so the select() won't hang on it.
|
||
}
|
||
if (s_errno != S_EWOULDBLOCK) {
|
||
//ShowDebug("send_from_fifo: error %d, ending connection #%d\n", s_errno, fd);
|
||
session[fd]->wdata_size = 0; //Clear the send queue as we can't send anymore. [Skotlex]
|
||
set_eof(fd);
|
||
}
|
||
return 0;
|
||
}
|
||
|
||
//{ int i; ShowMessage("send %d : ",fd); for(i=0;i<len;i++){ ShowMessage("%02x ",session[fd]->wdata[i]); } ShowMessage("\n");}
|
||
if(len > 0) {
|
||
if((size_t)len < session[fd]->wdata_size)
|
||
memmove(session[fd]->wdata, session[fd]->wdata + len, session[fd]->wdata_size - len);
|
||
|
||
session[fd]->wdata_size -= len;
|
||
}
|
||
|
||
return 0;
|
||
}
|
||
|
||
/// Best effort
|
||
/// There's no warranty that the data will be sent.
|
||
void flush_fifo(int fd)
|
||
{
|
||
if(session[fd] != NULL && session[fd]->func_send == send_from_fifo)
|
||
send_from_fifo(fd);
|
||
}
|
||
|
||
void flush_fifos(void)
|
||
{
|
||
int i;
|
||
for(i=1;i<fd_max;i++)
|
||
if(session[i] != NULL &&
|
||
session[i]->func_send == send_from_fifo)
|
||
send_from_fifo(i);
|
||
}
|
||
|
||
static int null_parse(int fd)
|
||
{
|
||
ShowMessage("null_parse : %d\n",fd);
|
||
session[fd]->rdata_pos = session[fd]->rdata_size; //RFIFOSKIP(fd, RFIFOREST(fd)); simplify calculation
|
||
return 0;
|
||
}
|
||
|
||
/*======================================
|
||
* CORE : Socket Function
|
||
*--------------------------------------
|
||
*/
|
||
|
||
static int connect_client(int listen_fd)
|
||
{
|
||
int fd;
|
||
struct sockaddr_in client_address;
|
||
socklen_t len;
|
||
//ShowMessage("connect_client : %d\n",listen_fd);
|
||
|
||
len=sizeof(client_address);
|
||
|
||
fd = accept(listen_fd,(struct sockaddr*)&client_address,&len);
|
||
if ( fd == INVALID_SOCKET ) {
|
||
ShowError("accept failed (code %i)!\n", s_errno);
|
||
return -1;
|
||
}
|
||
|
||
if(fd_max<=fd) fd_max=fd+1;
|
||
|
||
setsocketopts(fd);
|
||
set_nonblocking(fd, 1);
|
||
|
||
if (ip_rules && !connect_check(*(unsigned int*)(&client_address.sin_addr))) {
|
||
do_close(fd);
|
||
return -1;
|
||
} else
|
||
FD_SET(fd,&readfds);
|
||
|
||
CREATE(session[fd], struct socket_data, 1);
|
||
CREATE(session[fd]->rdata, unsigned char, rfifo_size);
|
||
CREATE(session[fd]->wdata, unsigned char, wfifo_size);
|
||
|
||
session[fd]->max_rdata = rfifo_size;
|
||
session[fd]->max_wdata = wfifo_size;
|
||
session[fd]->func_recv = recv_to_fifo;
|
||
session[fd]->func_send = send_from_fifo;
|
||
session[fd]->func_parse = (session[listen_fd]->func_parse) ? session[listen_fd]->func_parse : default_func_parse;
|
||
session[fd]->client_addr = client_address;
|
||
session[fd]->rdata_tick = last_tick;
|
||
session[fd]->type = SESSION_UNKNOWN; // undefined type
|
||
|
||
//ShowMessage("new_session : %d %d\n",fd,session[fd]->eof);
|
||
return fd;
|
||
}
|
||
|
||
int make_listen_bind(long ip,int port)
|
||
{
|
||
struct sockaddr_in server_address;
|
||
int fd;
|
||
int result;
|
||
|
||
fd = (int)socket( AF_INET, SOCK_STREAM, 0 );
|
||
|
||
if (fd == INVALID_SOCKET) {
|
||
ShowError("socket() creation failed (code %d)!\n", fd, s_errno);
|
||
exit(1);
|
||
}
|
||
|
||
setsocketopts(fd);
|
||
set_nonblocking(fd, 1);
|
||
|
||
server_address.sin_family = AF_INET;
|
||
server_address.sin_addr.s_addr = ip;
|
||
server_address.sin_port = htons((unsigned short)port);
|
||
|
||
result = bind(fd, (struct sockaddr*)&server_address, sizeof(server_address));
|
||
if( result == SOCKET_ERROR ) {
|
||
ShowError("bind failed (socket %d, code %d)!\n", fd, s_errno);
|
||
exit(1);
|
||
}
|
||
result = listen( fd, 5 );
|
||
if( result == SOCKET_ERROR ) {
|
||
ShowError("listen failed (socket %d, code %d)!\n", fd, s_errno);
|
||
exit(1);
|
||
}
|
||
if ( fd < 0 || fd > FD_SETSIZE )
|
||
{ //Crazy error that can happen in Windows? (info from Freya)
|
||
ShowFatalError("listen() returned invalid fd %d!\n",fd);
|
||
exit(1);
|
||
}
|
||
|
||
if(fd_max<=fd) fd_max=fd+1;
|
||
FD_SET(fd, &readfds );
|
||
|
||
CREATE(session[fd], struct socket_data, 1);
|
||
|
||
session[fd]->func_recv = connect_client;
|
||
|
||
return fd;
|
||
}
|
||
|
||
int make_listen_port(int port)
|
||
{
|
||
return make_listen_bind(INADDR_ANY,port);
|
||
}
|
||
|
||
// Console Reciever [Wizputer]
|
||
int console_recieve(int i)
|
||
{
|
||
int n;
|
||
char *buf;
|
||
|
||
CREATE(buf, char, 64);
|
||
|
||
n = read(0, buf , 64);
|
||
if ( n < 0 )
|
||
ShowError("Console input read error\n");
|
||
else
|
||
{
|
||
ShowNotice ("Sorry, the console is currently non-functional.\n");
|
||
// session[0]->func_console(buf);
|
||
}
|
||
|
||
aFree(buf);
|
||
return 0;
|
||
}
|
||
|
||
void set_defaultconsoleparse(int (*defaultparse)(char*))
|
||
{
|
||
default_console_parse = defaultparse;
|
||
}
|
||
|
||
static int null_console_parse(char *buf)
|
||
{
|
||
ShowMessage("null_console_parse : %s\n",buf);
|
||
return 0;
|
||
}
|
||
|
||
// function parse table
|
||
// To-do: -- use dynamic arrays
|
||
// -- add a register_parse_func();
|
||
struct func_parse_table func_parse_table[SESSION_MAX];
|
||
|
||
int default_func_check (struct socket_data *sd) { return 1; }
|
||
|
||
void func_parse_check (struct socket_data *sd)
|
||
{
|
||
int i;
|
||
for (i = SESSION_HTTP; i < SESSION_MAX; i++) {
|
||
if (func_parse_table[i].func &&
|
||
func_parse_table[i].check &&
|
||
func_parse_table[i].check(sd) != 0)
|
||
{
|
||
sd->type = i;
|
||
sd->func_parse = func_parse_table[i].func;
|
||
return;
|
||
}
|
||
}
|
||
|
||
// undefined -- treat as raw socket (using default parse)
|
||
sd->type = SESSION_RAW;
|
||
}
|
||
|
||
// Console Input [Wizputer]
|
||
int start_console(void) {
|
||
|
||
//Until a better plan is came up with... can't be using session[0] anymore! [Skotlex]
|
||
ShowNotice("The console is currently nonfunctional.\n");
|
||
return 0;
|
||
|
||
FD_SET(0,&readfds);
|
||
|
||
if (!session[0]) { // dummy socket already uses fd 0
|
||
CREATE(session[0], struct socket_data, 1);
|
||
}
|
||
malloc_set(session[0],0,sizeof(*session[0]));
|
||
|
||
session[0]->func_recv = console_recieve;
|
||
session[0]->func_console = default_console_parse;
|
||
|
||
return 0;
|
||
}
|
||
|
||
int make_connection(long ip,int port)
|
||
{
|
||
struct sockaddr_in server_address;
|
||
int fd;
|
||
int result;
|
||
|
||
fd = (int)socket( AF_INET, SOCK_STREAM, 0 );
|
||
|
||
if (fd == INVALID_SOCKET) {
|
||
ShowError("socket() creation failed (code %d)!\n", fd, s_errno);
|
||
return -1;
|
||
}
|
||
|
||
setsocketopts(fd);
|
||
|
||
server_address.sin_family = AF_INET;
|
||
server_address.sin_addr.s_addr = ip;
|
||
server_address.sin_port = htons((unsigned short)port);
|
||
|
||
ShowStatus("Connecting to %d.%d.%d.%d:%i\n",
|
||
(ip)&0xFF,(ip>>8)&0xFF,(ip>>16)&0xFF,(ip>>24)&0xFF,port);
|
||
|
||
result = connect(fd, (struct sockaddr *)(&server_address), sizeof(struct sockaddr_in));
|
||
if( result == SOCKET_ERROR ) {
|
||
ShowError("connect failed (socket %d, code %d)!\n", fd, s_errno);
|
||
do_close(fd);
|
||
return -1;
|
||
}
|
||
//Now the socket can be made non-blocking. [Skotlex]
|
||
set_nonblocking(fd, 1);
|
||
|
||
if (fd_max <= fd)
|
||
fd_max = fd + 1;
|
||
FD_SET(fd,&readfds);
|
||
|
||
CREATE(session[fd], struct socket_data, 1);
|
||
CREATE(session[fd]->rdata, unsigned char, rfifo_size);
|
||
CREATE(session[fd]->wdata, unsigned char, wfifo_size);
|
||
|
||
session[fd]->max_rdata = rfifo_size;
|
||
session[fd]->max_wdata = wfifo_size;
|
||
session[fd]->func_recv = recv_to_fifo;
|
||
session[fd]->func_send = send_from_fifo;
|
||
session[fd]->func_parse = default_func_parse;
|
||
session[fd]->rdata_tick = last_tick;
|
||
|
||
return fd;
|
||
}
|
||
|
||
void free_session_mem(int fd)
|
||
{
|
||
if (session[fd]){
|
||
if (session[fd]->rdata)
|
||
aFree(session[fd]->rdata);
|
||
if (session[fd]->wdata)
|
||
aFree(session[fd]->wdata);
|
||
if (session[fd]->session_data)
|
||
aFree(session[fd]->session_data);
|
||
aFree(session[fd]);
|
||
session[fd] = NULL;
|
||
}
|
||
}
|
||
|
||
int delete_session(int fd)
|
||
{
|
||
if (fd <= 0 || fd >= FD_SETSIZE)
|
||
return -1;
|
||
FD_CLR(fd, &readfds);
|
||
free_session_mem(fd);
|
||
//ShowMessage("delete_session:%d\n",fd);
|
||
return 0;
|
||
}
|
||
|
||
int realloc_fifo(int fd,unsigned int rfifo_size,unsigned int wfifo_size)
|
||
{
|
||
if( !session_isValid(fd) )
|
||
return 0;
|
||
|
||
if( session[fd]->max_rdata != rfifo_size && session[fd]->rdata_size < rfifo_size){
|
||
RECREATE(session[fd]->rdata, unsigned char, rfifo_size);
|
||
session[fd]->max_rdata = rfifo_size;
|
||
}
|
||
|
||
if( session[fd]->max_wdata != wfifo_size && session[fd]->wdata_size < wfifo_size){
|
||
RECREATE(session[fd]->wdata, unsigned char, wfifo_size);
|
||
session[fd]->max_wdata = wfifo_size;
|
||
}
|
||
return 0;
|
||
}
|
||
|
||
int realloc_writefifo(int fd, size_t addition)
|
||
{
|
||
size_t newsize;
|
||
|
||
if( !session_isValid(fd) ) // might not happen
|
||
return 0;
|
||
|
||
if( session[fd]->wdata_size + addition > session[fd]->max_wdata )
|
||
{ // grow rule; grow in multiples of wfifo_size
|
||
newsize = wfifo_size;
|
||
while( session[fd]->wdata_size + addition > newsize ) newsize += newsize;
|
||
}
|
||
else if( session[fd]->max_wdata>=FIFOSIZE_SERVERLINK) {
|
||
//Inter-server adjust. [Skotlex]
|
||
if ((session[fd]->wdata_size+addition)*4 < session[fd]->max_wdata)
|
||
newsize = session[fd]->max_wdata/2;
|
||
else
|
||
return 0; //No change
|
||
} else if( session[fd]->max_wdata>wfifo_size &&
|
||
(session[fd]->wdata_size+addition)*4 < session[fd]->max_wdata )
|
||
{ // shrink rule, shrink by 2 when only a quater of the fifo is used, don't shrink below 4*addition
|
||
newsize = session[fd]->max_wdata/2;
|
||
}
|
||
else // no change
|
||
return 0;
|
||
|
||
RECREATE(session[fd]->wdata, unsigned char, newsize);
|
||
session[fd]->max_wdata = newsize;
|
||
|
||
return 0;
|
||
}
|
||
|
||
int WFIFOSET(int fd,int len)
|
||
{
|
||
size_t newreserve;
|
||
struct socket_data *s = session[fd];
|
||
|
||
if( !session_isValid(fd) || s->wdata == NULL )
|
||
return 0;
|
||
|
||
// we have written len bytes to the buffer already before calling WFIFOSET
|
||
if(s->wdata_size+len > s->max_wdata)
|
||
{ // actually there was a buffer overflow already
|
||
unsigned char *sin_addr = (unsigned char *)&s->client_addr.sin_addr;
|
||
ShowFatalError("socket: Buffer Overflow. Connection %d (%d.%d.%d.%d) has written %d bytes on a %d/%d bytes buffer.\n", fd,
|
||
sin_addr[0], sin_addr[1], sin_addr[2], sin_addr[3], len, s->wdata_size, s->max_wdata);
|
||
ShowDebug("Likely command that caused it: 0x%x\n",
|
||
(*(unsigned short*)(s->wdata+s->wdata_size)));
|
||
// no other chance, make a better fifo model
|
||
exit(1);
|
||
}
|
||
|
||
s->wdata_size += len;
|
||
// always keep a wfifo_size reserve in the buffer
|
||
// For inter-server connections, let the reserve be 1/4th of the link size.
|
||
newreserve = s->wdata_size + (s->max_wdata>=FIFOSIZE_SERVERLINK?FIFOSIZE_SERVERLINK/4:wfifo_size);
|
||
|
||
if(s->wdata_size >= frame_size)
|
||
send_from_fifo(fd);
|
||
|
||
// realloc after sending
|
||
// readfifo does not need to be realloced at all
|
||
// Even the inter-server buffer may need reallocating! [Skotlex]
|
||
realloc_writefifo(fd, newreserve);
|
||
|
||
return 0;
|
||
}
|
||
|
||
int do_sendrecv(int next)
|
||
{
|
||
fd_set rfd,efd; //Added the Error Set so that such sockets can be made eof. They are the same as the rfd for now. [Skotlex]
|
||
struct sockaddr_in addr_check;
|
||
struct timeval timeout;
|
||
int ret,i,size;
|
||
|
||
last_tick = time(0);
|
||
|
||
|
||
//PRESEND Need to do this to ensure that the clients get something to do
|
||
//which hopefully will cause them to send packets. [Meruru]
|
||
for (i = 1; i < fd_max; i++)
|
||
{
|
||
if(!session[i])
|
||
continue;
|
||
|
||
if(session[i]->wdata_size && session[i]->func_send)
|
||
session[i]->func_send(i);
|
||
}
|
||
|
||
timeout.tv_sec = next/1000;
|
||
timeout.tv_usec = next%1000*1000;
|
||
|
||
for(memcpy(&rfd, &readfds, sizeof(rfd)),
|
||
memcpy(&efd, &readfds, sizeof(efd));
|
||
(ret = select(fd_max, &rfd, NULL, &efd, &timeout))<0;
|
||
memcpy(&rfd, &readfds, sizeof(rfd)),
|
||
memcpy(&efd, &readfds, sizeof(efd)))
|
||
{
|
||
if(s_errno != S_ENOTSOCK)
|
||
return 0;
|
||
|
||
//Well then the error is due to a bad socket. Lets find and remove it
|
||
//and try again
|
||
for(i = 1; i < fd_max; i++)
|
||
{
|
||
if(!session[i])
|
||
{
|
||
if (FD_ISSET(i, &readfds)) {
|
||
ShowError("Deleting non-cleared session %d\n", i);
|
||
FD_CLR(i, &readfds);
|
||
}
|
||
continue;
|
||
}
|
||
|
||
//check the validity of the socket. Does what the last thing did
|
||
//just alot faster [Meruru]
|
||
size = sizeof(struct sockaddr);
|
||
if(getsockname(i,(struct sockaddr*)&addr_check,&size)<0)
|
||
if(s_errno == S_ENOTSOCK)
|
||
{
|
||
ShowError("Deleting invalid session %d\n", i);
|
||
//So the code can react accordingly
|
||
session[i]->eof = 1;
|
||
if(session[i]->func_parse)
|
||
session[i]->func_parse(i);
|
||
free_session_mem(i); //free the bad session
|
||
continue;
|
||
}
|
||
|
||
if (!FD_ISSET(i, &readfds))
|
||
FD_SET(i,&readfds);
|
||
ret = i;
|
||
}
|
||
fd_max = ret;
|
||
}
|
||
|
||
//ok under windows to use FD_ISSET is FUCKING stupid
|
||
//because windows uses an array so lets do them part by part [Meruru]
|
||
#ifdef _WIN32
|
||
//Do the socket sets. Unlike linux which uses a bit mask windows uses
|
||
//a array. So calls to FS_ISSET are SLOW AS SHIT. So we have to do
|
||
//a special case for them which actually turns out ok [Meruru]
|
||
for(i=0;i<(int)rfd.fd_count;i++)
|
||
{
|
||
if(session[rfd.fd_array[i]] &&
|
||
session[rfd.fd_array[i]]->func_recv)
|
||
session[rfd.fd_array[i]]->func_recv(rfd.fd_array[i]);
|
||
}
|
||
for(i=0;i<(int)efd.fd_count;i++) {
|
||
ShowDebug("do_sendrecv: Connection error on Session %d.\n", efd.fd_array[i]);
|
||
set_eof(efd.fd_array[i]);
|
||
}
|
||
|
||
for (i = 1; i < fd_max; i++)
|
||
{
|
||
if(!session[i])
|
||
continue;
|
||
|
||
//POSTSEND: Does write EVER BLOCK? NO!! not unless WE ARE CURRENTLY SENDING SOMETHING
|
||
//Or just have opened a connection and dont know if its ready
|
||
//And since eA isn't multi threaded and all the sockets are non blocking THIS ISNT A PROBLEM! [Meruru]
|
||
|
||
if(session[i]->wdata_size && session[i]->func_send)
|
||
session[i]->func_send(i);
|
||
|
||
if(session[i]->eof) //func_send can't free a session, this is safe.
|
||
{ //Finally, even if there is no data to parse, connections signalled eof should be closed, so we call parse_func [Skotlex]
|
||
if (session[i]->func_parse)
|
||
session[i]->func_parse(i); //This should close the session inmediately.
|
||
}
|
||
}
|
||
|
||
#else //where under linux its just a bit check so its smart [Meruru]
|
||
|
||
for (i = 1; i < fd_max; i++){
|
||
if(!session[i])
|
||
continue;
|
||
|
||
if(FD_ISSET(i,&efd)){
|
||
//ShowMessage("error:%d\n",i);
|
||
ShowDebug("do_sendrecv: Connection error on Session %d.\n", i);
|
||
set_eof(i);
|
||
continue;
|
||
}
|
||
|
||
if(FD_ISSET(i,&rfd)){
|
||
//ShowMessage("read:%d\n",i);
|
||
if(session[i]->func_recv)
|
||
session[i]->func_recv(i);
|
||
}
|
||
|
||
//Does write EVER BLOCK. NO not unless WE ARE CURRENTALLY SENDING SOMETHING
|
||
//And sence eA isnt multi threaded THIS ISNT A PROBLEM!
|
||
if(session[i]->wdata_size && session[i]->func_send)
|
||
session[i]->func_send(i);
|
||
|
||
if(session[i]->eof)
|
||
{ //Finally, even if there is no data to parse, connections signalled eof should be closed, so we call parse_func [Skotlex]
|
||
if (session[i]->func_parse)
|
||
session[i]->func_parse(i); //This should close the session inmediately.
|
||
}
|
||
}
|
||
#endif
|
||
|
||
return 0;
|
||
}
|
||
|
||
int do_parsepacket(void)
|
||
{
|
||
int i;
|
||
struct socket_data *sd;
|
||
for(i = 1; i < fd_max; i++){
|
||
sd = session[i];
|
||
if(!sd)
|
||
continue;
|
||
if (sd->rdata_tick && DIFF_TICK(last_tick,sd->rdata_tick) > stall_time) {
|
||
ShowInfo ("Session #%d timed out\n", i);
|
||
sd->eof = 1;
|
||
}
|
||
if(sd->rdata_size == 0 && sd->eof == 0)
|
||
continue;
|
||
if(sd->func_parse){
|
||
if(sd->type == SESSION_UNKNOWN)
|
||
func_parse_check(sd);
|
||
if(sd->type != SESSION_UNKNOWN)
|
||
sd->func_parse(i);
|
||
if(!session[i])
|
||
continue;
|
||
/* after parse, check client's RFIFO size to know if there is an invalid packet (too big and not parsed) */
|
||
if (session[i]->rdata_size == rfifo_size && session[i]->max_rdata == rfifo_size) {
|
||
session[i]->eof = 1;
|
||
continue;
|
||
}
|
||
}
|
||
RFIFOFLUSH(i);
|
||
}
|
||
return 0;
|
||
}
|
||
|
||
/* DDoS <20>U<EFBFBD><55><EFBFBD><EFBFBD> */
|
||
#ifndef MINICORE
|
||
struct _access_control {
|
||
unsigned int ip;
|
||
unsigned int mask;
|
||
};
|
||
|
||
struct _connect_history {
|
||
struct _connect_history *next;
|
||
struct _connect_history *prev;
|
||
int status;
|
||
int count;
|
||
unsigned int ip;
|
||
unsigned int tick;
|
||
};
|
||
static struct _connect_history *connect_history[0x10000];
|
||
static int connect_check_(unsigned int ip);
|
||
|
||
// <20>ڑ<EFBFBD><DA91>ł<EFBFBD><C582>邩<EFBFBD>ǂ<EFBFBD><C782><EFBFBD><EFBFBD>̊m<CC8A>F
|
||
// false : <20>ڑ<EFBFBD>OK
|
||
// true : <20>ڑ<EFBFBD>NG
|
||
static int connect_check(unsigned int ip) {
|
||
int result = connect_check_(ip);
|
||
if(access_debug) {
|
||
ShowMessage("connect_check: Connection from %d.%d.%d.%d %s\n",
|
||
CONVIP(ip),result ? "allowed." : "denied!");
|
||
}
|
||
return result;
|
||
}
|
||
|
||
static int connect_check_(unsigned int ip) {
|
||
struct _connect_history *hist = connect_history[ip & 0xFFFF];
|
||
struct _connect_history *hist_new;
|
||
int i,is_allowip = 0,is_denyip = 0,connect_ok = 0;
|
||
|
||
// allow , deny <20><><EFBFBD>X<EFBFBD>g<EFBFBD>ɓ<EFBFBD><C993><EFBFBD><EFBFBD>Ă<EFBFBD><C482>邩<EFBFBD>m<EFBFBD>F
|
||
for(i = 0;i < access_allownum; i++) {
|
||
if((ip & access_allow[i].mask) == (access_allow[i].ip & access_allow[i].mask)) {
|
||
if(access_debug) {
|
||
ShowMessage("connect_check: Found match from allow list:%d.%d.%d.%d IP:%d.%d.%d.%d Mask:%d.%d.%d.%d\n",
|
||
CONVIP(ip),
|
||
CONVIP(access_allow[i].ip),
|
||
CONVIP(access_allow[i].mask));
|
||
}
|
||
is_allowip = 1;
|
||
break;
|
||
}
|
||
}
|
||
for(i = 0;i < access_denynum; i++) {
|
||
if((ip & access_deny[i].mask) == (access_deny[i].ip & access_deny[i].mask)) {
|
||
if(access_debug) {
|
||
ShowMessage("connect_check: Found match from deny list:%d.%d.%d.%d IP:%d.%d.%d.%d Mask:%d.%d.%d.%d\n",
|
||
CONVIP(ip),
|
||
CONVIP(access_deny[i].ip),
|
||
CONVIP(access_deny[i].mask));
|
||
}
|
||
is_denyip = 1;
|
||
break;
|
||
}
|
||
}
|
||
// <20>R<EFBFBD>l<EFBFBD>N<EFBFBD>g<EFBFBD>o<EFBFBD><6F><EFBFBD>邩<EFBFBD>ǂ<EFBFBD><C782><EFBFBD><EFBFBD>m<EFBFBD>F
|
||
// connect_ok
|
||
// 0 : <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ɋ<EFBFBD><C98B><EFBFBD>
|
||
// 1 : <20>c<EFBFBD><63><EFBFBD>C<EFBFBD>`<60>F<EFBFBD>b<EFBFBD>N<EFBFBD>̌<EFBFBD><CC8C>ʎ<EFBFBD><CA8E><EFBFBD>
|
||
// 2 : <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ɋ<EFBFBD><C98B><EFBFBD>
|
||
switch(access_order) {
|
||
case ACO_DENY_ALLOW:
|
||
default:
|
||
if(is_allowip) {
|
||
connect_ok = 2;
|
||
} else if(is_denyip) {
|
||
connect_ok = 0;
|
||
} else {
|
||
connect_ok = 1;
|
||
}
|
||
break;
|
||
case ACO_ALLOW_DENY:
|
||
if(is_denyip) {
|
||
connect_ok = 0;
|
||
} else if(is_allowip) {
|
||
connect_ok = 2;
|
||
} else {
|
||
connect_ok = 1;
|
||
}
|
||
break;
|
||
case ACO_MUTUAL_FAILTURE:
|
||
if(is_allowip) {
|
||
connect_ok = 2;
|
||
} else {
|
||
connect_ok = 0;
|
||
}
|
||
break;
|
||
}
|
||
|
||
// <20>ڑ<EFBFBD><DA91><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ׂ<F092B282>
|
||
while(hist) {
|
||
if(ip == hist->ip) {
|
||
// <20><><EFBFBD><EFBFBD>IP<49><50><EFBFBD><EFBFBD>
|
||
if(hist->status) {
|
||
// ban <20>t<EFBFBD><74><EFBFBD>O<EFBFBD><4F><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ă<EFBFBD>
|
||
return (connect_ok == 2 ? 1 : 0);
|
||
} else if(DIFF_TICK(gettick(),hist->tick) < ddos_interval) {
|
||
// ddos_interval<61>b<EFBFBD>ȓ<EFBFBD><C893>Ƀ<EFBFBD><C983>N<EFBFBD>G<EFBFBD>X<EFBFBD>g<EFBFBD>L<EFBFBD><4C>
|
||
hist->tick = gettick();
|
||
if(hist->count++ >= ddos_count) {
|
||
// ddos <20>U<EFBFBD><55><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>o
|
||
hist->status = 1;
|
||
ShowWarning("connect_check: DDOS Attack detected from %d.%d.%d.%d!\n",
|
||
CONVIP(ip));
|
||
return (connect_ok == 2 ? 1 : 0);
|
||
} else {
|
||
return connect_ok;
|
||
}
|
||
} else {
|
||
// ddos_interval<61>b<EFBFBD>ȓ<EFBFBD><C893>Ƀ<EFBFBD><C983>N<EFBFBD>G<EFBFBD>X<EFBFBD>g<EFBFBD><67><EFBFBD><EFBFBD><EFBFBD>̂Ń^<5E>C<EFBFBD>}<7D>[<5B>N<EFBFBD><4E><EFBFBD>A
|
||
hist->tick = gettick();
|
||
hist->count = 0;
|
||
return connect_ok;
|
||
}
|
||
}
|
||
hist = hist->next;
|
||
}
|
||
// IP<49><50><EFBFBD>X<EFBFBD>g<EFBFBD>ɖ<EFBFBD><C996><EFBFBD><EFBFBD>̂ŐV<C590>K<EFBFBD>쐬
|
||
hist_new = (struct _connect_history *) aCalloc(1,sizeof(struct _connect_history));
|
||
hist_new->ip = ip;
|
||
hist_new->tick = gettick();
|
||
if(connect_history[ip & 0xFFFF] != NULL) {
|
||
hist = connect_history[ip & 0xFFFF];
|
||
hist->prev = hist_new;
|
||
hist_new->next = hist;
|
||
}
|
||
connect_history[ip & 0xFFFF] = hist_new;
|
||
return connect_ok;
|
||
}
|
||
|
||
static int connect_check_clear(int tid,unsigned int tick,int id,int data) {
|
||
int i;
|
||
int clear = 0;
|
||
int list = 0;
|
||
struct _connect_history *hist , *hist2;
|
||
for(i = 0;i < 0x10000 ; i++) {
|
||
hist = connect_history[i];
|
||
while(hist) {
|
||
if ((DIFF_TICK(tick,hist->tick) > ddos_interval * 3 && !hist->status) ||
|
||
(DIFF_TICK(tick,hist->tick) > ddos_autoreset && hist->status)) {
|
||
// clear data
|
||
hist2 = hist->next;
|
||
if(hist->prev) {
|
||
hist->prev->next = hist->next;
|
||
} else {
|
||
connect_history[i] = hist->next;
|
||
}
|
||
if(hist->next) {
|
||
hist->next->prev = hist->prev;
|
||
}
|
||
aFree(hist);
|
||
hist = hist2;
|
||
clear++;
|
||
} else {
|
||
hist = hist->next;
|
||
}
|
||
list++;
|
||
}
|
||
}
|
||
if(access_debug) {
|
||
ShowMessage("connect_check_clear: Cleared %d of %d from IP list.\n", clear, list);
|
||
}
|
||
return list;
|
||
}
|
||
|
||
// IP<49>}<7D>X<EFBFBD>N<EFBFBD>`<60>F<EFBFBD>b<EFBFBD>N
|
||
int access_ipmask(const char *str,struct _access_control* acc)
|
||
{
|
||
unsigned int mask=0,i=0,m,ip, a0,a1,a2,a3;
|
||
if( !strcmp(str,"all") ) {
|
||
ip = 0;
|
||
mask = 0;
|
||
} else {
|
||
if( sscanf(str,"%d.%d.%d.%d%n",&a0,&a1,&a2,&a3,&i)!=4 || i==0) {
|
||
ShowError("access_ipmask: Unknown format %s!\n",str);
|
||
return 0;
|
||
}
|
||
ip = (a3 << 24) | (a2 << 16) | (a1 << 8) | a0;
|
||
|
||
if(sscanf(str+i,"/%d.%d.%d.%d",&a0,&a1,&a2,&a3)==4 ){
|
||
mask = (a3 << 24) | (a2 << 16) | (a1 << 8) | a0;
|
||
} else if(sscanf(str+i,"/%d",&m) == 1) {
|
||
for(i=0;i<m;i++) {
|
||
mask = (mask >> 1) | 0x80000000;
|
||
}
|
||
mask = ntohl(mask);
|
||
} else {
|
||
mask = 0xFFFFFFFF;
|
||
}
|
||
}
|
||
if(access_debug) {
|
||
ShowMessage("access_ipmask: Loaded IP:%d.%d.%d.%d mask:%d.%d.%d.%d\n",
|
||
CONVIP(ip), CONVIP(mask));
|
||
}
|
||
acc->ip = ip;
|
||
acc->mask = mask;
|
||
return 1;
|
||
}
|
||
#endif
|
||
|
||
int socket_config_read(const char *cfgName) {
|
||
int i;
|
||
char line[1024],w1[1024],w2[1024];
|
||
FILE *fp;
|
||
|
||
fp=fopen(cfgName, "r");
|
||
if(fp==NULL){
|
||
ShowError("File not found: %s\n", cfgName);
|
||
return 1;
|
||
}
|
||
while(fgets(line,1020,fp)){
|
||
if(line[0] == '/' && line[1] == '/')
|
||
continue;
|
||
i=sscanf(line,"%[^:]: %[^\r\n]",w1,w2);
|
||
if(i!=2)
|
||
continue;
|
||
if(strcmpi(w1,"stall_time")==0){
|
||
stall_time = atoi(w2);
|
||
#ifndef MINICORE
|
||
} else if(strcmpi(w1,"enable_ip_rules")==0){
|
||
if(strcmpi(w2,"yes")==0)
|
||
ip_rules = 1;
|
||
else if(strcmpi(w2,"no")==0)
|
||
ip_rules = 0;
|
||
else ip_rules = atoi(w2);
|
||
} else if(strcmpi(w1,"order")==0){
|
||
access_order=atoi(w2);
|
||
if(strcmpi(w2,"deny,allow")==0) access_order=ACO_DENY_ALLOW;
|
||
if(strcmpi(w2,"allow,deny")==0) access_order=ACO_ALLOW_DENY;
|
||
if(strcmpi(w2,"mutual-failure")==0) access_order=ACO_MUTUAL_FAILTURE;
|
||
} else if(strcmpi(w1,"allow")==0){
|
||
access_allow = (struct _access_control *) aRealloc(access_allow,(access_allownum+1)*sizeof(struct _access_control));
|
||
if(access_ipmask(w2,&access_allow[access_allownum])) {
|
||
access_allownum++;
|
||
}
|
||
} else if(strcmpi(w1,"deny")==0){
|
||
access_deny = (struct _access_control *) aRealloc(access_deny,(access_denynum+1)*sizeof(struct _access_control));
|
||
if(access_ipmask(w2,&access_deny[access_denynum])) {
|
||
access_denynum++;
|
||
}
|
||
} else if(!strcmpi(w1,"ddos_interval")){
|
||
ddos_interval = atoi(w2);
|
||
} else if(!strcmpi(w1,"ddos_count")){
|
||
ddos_count = atoi(w2);
|
||
} else if(!strcmpi(w1,"ddos_autoreset")){
|
||
ddos_autoreset = atoi(w2);
|
||
} else if(!strcmpi(w1,"debug")){
|
||
if(strcmpi(w2,"yes")==0)
|
||
access_debug = 1;
|
||
else if(strcmpi(w2,"no")==0)
|
||
access_debug = 0;
|
||
else access_debug = atoi(w2);
|
||
#endif
|
||
} else if (strcmpi(w1, "mode_neg") == 0)
|
||
{
|
||
if(strcmpi(w2,"yes")==0)
|
||
mode_neg = 1;
|
||
else if(strcmpi(w2,"no")==0)
|
||
mode_neg = 0;
|
||
else mode_neg = atoi(w2);
|
||
} else if (strcmpi(w1, "frame_size") == 0)
|
||
frame_size = (size_t)strtoul(w2, NULL, 10);
|
||
else if (strcmpi(w1, "import") == 0)
|
||
socket_config_read(w2);
|
||
}
|
||
fclose(fp);
|
||
return 0;
|
||
}
|
||
|
||
int RFIFOSKIP(int fd,int len)
|
||
{
|
||
struct socket_data *s;
|
||
|
||
if ( !session_isActive(fd) ) //Nullpo error here[Kevin]
|
||
return 0;
|
||
|
||
s = session[fd];
|
||
|
||
if ( s->rdata_size - s->rdata_pos - len < 0 ) {
|
||
//fprintf(stderr,"too many skip\n");
|
||
//exit(1);
|
||
//better than a COMPLETE program abort // TEST! :)
|
||
ShowError("too many skip (%d) now skipped: %d (FD: %d)\n", len, RFIFOREST(fd), fd);
|
||
len = RFIFOREST(fd);
|
||
}
|
||
s->rdata_pos = s->rdata_pos+len;
|
||
return 0;
|
||
}
|
||
|
||
|
||
unsigned int addr_[16]; // ip addresses of local host (host byte order)
|
||
unsigned int naddr_ = 0; // # of ip addresses
|
||
|
||
void socket_final (void)
|
||
{
|
||
int i;
|
||
#ifndef MINICORE
|
||
struct _connect_history *hist , *hist2;
|
||
for(i = 0; i < 0x10000; i++) {
|
||
hist = connect_history[i];
|
||
while(hist) {
|
||
hist2 = hist->next;
|
||
aFree(hist);
|
||
hist = hist2;
|
||
}
|
||
}
|
||
if (access_allow)
|
||
aFree(access_allow);
|
||
if (access_deny)
|
||
aFree(access_deny);
|
||
#endif
|
||
|
||
for (i = 1; i < fd_max; i++) {
|
||
if(session[i])
|
||
delete_session(i);
|
||
}
|
||
|
||
// session[0] <20>̃_<CC83>~<7E>[<5B>f<EFBFBD>[<5B>^<5E><><EFBFBD>폜
|
||
aFree(session[0]->rdata);
|
||
aFree(session[0]->wdata);
|
||
aFree(session[0]);
|
||
}
|
||
|
||
//Closes a socket.
|
||
//Needed to simplify shutdown code as well as manage the subtle differences in socket management from Windows and *nix.
|
||
void do_close(int fd)
|
||
{
|
||
//We don't really care if these closing functions return an error, we are just shutting down and not reusing this socket.
|
||
#ifdef __WIN32
|
||
// shutdown(fd, SD_BOTH); //FIXME: Shutdown requires winsock2.h! What would be the proper shutting down method for winsock1?
|
||
flush_fifo(fd); // try to send what's left (although it might not succeed since it's a nonblocking socket)
|
||
#endif
|
||
closesocket(fd);
|
||
if (session[fd]) delete_session(fd);
|
||
}
|
||
|
||
void socket_init (void)
|
||
{
|
||
char *SOCKET_CONF_FILENAME = "conf/packet_athena.conf";
|
||
#ifdef __WIN32
|
||
char** a;
|
||
unsigned int i;
|
||
char fullhost[255];
|
||
struct hostent* hent;
|
||
|
||
/* Start up the windows networking */
|
||
WORD version_wanted = MAKEWORD(1, 1); //Demand at least WinSocket version 1.1 (from Freya)
|
||
WSADATA wsaData;
|
||
|
||
if ( WSAStartup(version_wanted, &wsaData) != 0 ) {
|
||
ShowFatalError("SYSERR: WinSock not available!\n");
|
||
exit(1);
|
||
}
|
||
|
||
if(gethostname(fullhost, sizeof(fullhost)) == SOCKET_ERROR) {
|
||
ShowError("Ugg.. no hostname defined!\n");
|
||
return;
|
||
}
|
||
|
||
// XXX This should look up the local IP addresses in the registry
|
||
// instead of calling gethostbyname. However, the way IP addresses
|
||
// are stored in the registry is annoyingly complex, so I'll leave
|
||
// this as T.B.D.
|
||
hent = gethostbyname(fullhost);
|
||
if (hent == NULL) {
|
||
ShowError("Cannot resolve our own hostname to a IP address");
|
||
return;
|
||
}
|
||
|
||
a = hent->h_addr_list;
|
||
for(i = 0; a[i] != 0 && i < 16; ++i) {
|
||
unsigned long addr1 = ntohl(*(unsigned long*) a[i]);
|
||
addr_[i] = addr1;
|
||
}
|
||
naddr_ = i;
|
||
#else
|
||
int pos;
|
||
int fdes = socket(AF_INET, SOCK_STREAM, 0);
|
||
char buf[16 * sizeof(struct ifreq)];
|
||
struct ifconf ic;
|
||
|
||
// The ioctl call will fail with Invalid Argument if there are more
|
||
// interfaces than will fit in the buffer
|
||
ic.ifc_len = sizeof(buf);
|
||
ic.ifc_buf = buf;
|
||
if(ioctl(fdes, SIOCGIFCONF, &ic) == -1) {
|
||
ShowError("SIOCGIFCONF failed!\n");
|
||
return;
|
||
}
|
||
|
||
for(pos = 0; pos < ic.ifc_len;)
|
||
{
|
||
struct ifreq * ir = (struct ifreq *) (ic.ifc_buf + pos);
|
||
|
||
struct sockaddr_in * a = (struct sockaddr_in *) &(ir->ifr_addr);
|
||
|
||
if(a->sin_family == AF_INET) {
|
||
u_long ad = ntohl(a->sin_addr.s_addr);
|
||
if(ad != INADDR_LOOPBACK && ad != INADDR_ANY) {
|
||
addr_[naddr_ ++] = ad;
|
||
if(naddr_ == 16)
|
||
break;
|
||
}
|
||
}
|
||
|
||
#if defined(_AIX) || defined(__APPLE__)
|
||
pos += ir->ifr_addr.sa_len; // For when we port athena to run on Mac's :)
|
||
pos += sizeof(ir->ifr_name);
|
||
#else
|
||
pos += sizeof(struct ifreq);
|
||
#endif
|
||
}
|
||
#endif
|
||
|
||
FD_ZERO(&readfds);
|
||
|
||
socket_config_read(SOCKET_CONF_FILENAME);
|
||
|
||
// initialise last send-receive tick
|
||
last_tick = time(0);
|
||
|
||
// session[0] Was for the console (whatever that was?), but is now currently used for disconnected sessions of the map
|
||
// server, and as such, should hold enough buffer (it is a vacuum so to speak) as it is never flushed. [Skotlex]
|
||
CREATE(session[0], struct socket_data, 1);
|
||
CREATE(session[0]->rdata, unsigned char, 2*rfifo_size);
|
||
CREATE(session[0]->wdata, unsigned char, 2*wfifo_size);
|
||
session[0]->max_rdata = 2*rfifo_size;
|
||
session[0]->max_wdata = 2*wfifo_size;
|
||
|
||
malloc_set(func_parse_table, 0, sizeof(func_parse_table));
|
||
func_parse_table[SESSION_RAW].check = default_func_check;
|
||
func_parse_table[SESSION_RAW].func = default_func_parse;
|
||
|
||
#ifndef MINICORE
|
||
// <20>Ƃ肠<C682><E882A0><EFBFBD><EFBFBD><EFBFBD>T<EFBFBD><54><EFBFBD><EFBFBD><EFBFBD>Ƃɕs<C995>v<EFBFBD>ȃf<C883>[<5B>^<5E><><EFBFBD>폜<EFBFBD><ED8F9C><EFBFBD><EFBFBD>
|
||
add_timer_func_list(connect_check_clear, "connect_check_clear");
|
||
add_timer_interval(gettick()+1000,connect_check_clear,0,0,300*1000);
|
||
#endif
|
||
}
|
||
|
||
|
||
bool session_isValid(int fd)
|
||
{ //End of Exam has pointed out that fd==0 is actually an unconnected session! [Skotlex]
|
||
//But this is not so true, it is used... for... something. The console uses it, would this not cause problems? [Skotlex]
|
||
return ( (fd>0) && (fd<FD_SETSIZE) && (NULL!=session[fd]) );
|
||
}
|
||
|
||
bool session_isActive(int fd)
|
||
{
|
||
return ( session_isValid(fd) && !session[fd]->eof );
|
||
}
|
||
|
||
in_addr_t resolve_hostbyname(char* hostname, unsigned char *ip, char *ip_str) {
|
||
struct hostent *h = gethostbyname(hostname);
|
||
char ip_buf[16];
|
||
unsigned char ip2[4];
|
||
if (!h) return 0;
|
||
if (ip == NULL) ip = ip2;
|
||
ip[0] = (unsigned char) h->h_addr[0];
|
||
ip[1] = (unsigned char) h->h_addr[1];
|
||
ip[2] = (unsigned char) h->h_addr[2];
|
||
ip[3] = (unsigned char) h->h_addr[3];
|
||
if (ip_str == NULL) ip_str = ip_buf;
|
||
sprintf(ip_str, "%d.%d.%d.%d", ip[0], ip[1], ip[2], ip[3]);
|
||
return inet_addr(ip_str);
|
||
}
|