summaryrefslogtreecommitdiff
path: root/csgo-loader/csgo-server/Networking/TCPServer.cpp
blob: 725bf1a4cac907804bf92a2a11bb5072be626dd2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
#include <Networking/TCPServer.hpp>

namespace Networking {
	void TCPConnection::Close() {
		printf("[<=] %s disconnected!\n", m_IpAddress);

		if(m_Socket)
			closesocket(m_Socket);
	}
	
	// We will only receive up to 256 bytes per cycle.
	constexpr int BufferSize = 256;

	void TCPConnection::SendRawBytes(ByteArray &Bytes) {
		// Send data.
		int32_t Result = send(m_Socket, (char *)Bytes.data(), (int)Bytes.size(), 0);

		printf("[=>] Sending %zd bytes to %s.\n", Bytes.size(), m_IpAddress);

		if(Result == -1)
			printf("[=>] Failed to send %zd bytes to %s. (Socket %04Ix)\n", Bytes.size(), m_IpAddress, m_Socket);
	}

	ByteArray TCPConnection::ReceiveRawBytes() {
		ByteArray	ReceivedBytes;
		uint8_t		RecvBuffer[BufferSize];

		// Attempt to receive a packet.
		while(true) {
			int32_t Received = recv(m_Socket, (char*)RecvBuffer, BufferSize, 0);

			// No more bytes left to receive.
			if(Received < 0)
				break;

			// Emplace all received bytes.
			for(int n = 0; n < Received; ++n) {
				ReceivedBytes.push_back(RecvBuffer[n]);
			}

			// No more bytes left to receive.
			if(Received < BufferSize)
				break;
		}

		printf("[<=] Received %zd bytes from %s.\n", ReceivedBytes.size(), m_IpAddress);

		return ReceivedBytes;
	}

	void TCPConnection::SendBytes(ByteArray &Bytes) {
		// Encrypt outgoing data.
		ByteArray Encrypted = m_Encryption.Encrypt(Bytes);

		SendRawBytes(Encrypted);
	}

	ByteArray TCPConnection::ReceiveBytes() {
		ByteArray ReceivedBytes = ReceiveRawBytes();

		// Decrypt incoming data.
		ByteArray Decrypted = m_Encryption.Decrypt(ReceivedBytes);

		return Decrypted;
	}

	bool TCPServer::Start(uint16_t ServerPort) {
		const int32_t version = 0x101;

		// Initialise WinSocks.
		if(WSAStartup(version, &m_WinSocks))
			return false;

		// Create an IPv4 socket.
		m_Socket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);

		if(m_Socket == INVALID_SOCKET)
			return false;

		// Set up server context.
		m_Context.sin_addr.s_addr = INADDR_ANY;
		m_Context.sin_family      = AF_INET;
		m_Context.sin_port        = htons(ServerPort);

		int32_t Bind = bind(m_Socket, (sockaddr *)&m_Context, sizeof sockaddr_in);
	
		if(Bind == INVALID_SOCKET)
			return false;

		// Start listening.
		printf("[INFO] Server listening on port %d.\n", ServerPort);
		listen(m_Socket, 1);

		return true;
	}

	void TCPServer::AcceptConnection() {
		sockaddr_in IncomingConnection;
		int32_t     AddressLength = sizeof IncomingConnection;

		// Accept the incoming connection.
		SOCKET IncomingSocket = accept(m_Socket, (sockaddr *)&IncomingConnection, &AddressLength);

		if(IncomingSocket != INVALID_SOCKET) {
			Wrapper::Encryption Encryption;
			
			// Initialise encryption context.
			Encryption.Start();

			// Attempt handshake with client.
			TCPConnection Connection(IncomingSocket, inet_ntoa(IncomingConnection.sin_addr), Encryption);

			ByteArray EncryptionKey = Connection.GetEncryptionKey();
			Connection.SendRawBytes(EncryptionKey);

			// Detach a thread to handle the connection.
			std::thread thread([&] {
				m_ConnectionHandler(Connection);
				Connection.Close();
			});
			thread.detach();
		}
	}
}