Editing Mod protocol
From EMule Wiki
Warning: The database has been locked for maintenance, so you will not be able to save your edits right now. You may wish to cut-n-paste the text into a text file and save it for later.
The administrator who locked it offered this explanation: site maintenance
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
− | = Under construction = | + | =Under construction = |
THIS IS NOT FINAL.. feel free to edit. | THIS IS NOT FINAL.. feel free to edit. | ||
== Introduction == | == Introduction == | ||
− | |||
− | + | Modprot is needed for more clean protocol extensions by eMule modders.... | |
− | + | The main idea is to set a bit in CT_EMULE_MISCOPTIONS2 in the initial hello. If that bit is set and receive by e eMule mod that is capable of processing extensions then that mod will send the options it is cabpale of in the response. and the first cleitn will also send back the protocol extensions it is capable of. | |
− | + | Important: | |
− | + | Clients that are not capable of processing the mod protocol(like official eMule/amule) will not set the mod bit in CT_EMULE_MISCOPTIONS2 and will never receive extended protocol information. | |
− | All mod communication is to be done over the OP_MODPROT/OP_MODPACKEDPROT | + | == Documentation == |
− | When a hello(answer) with a set mod bit is received | + | All mod communication is to be done over the OP_MODPROT/OP_MODPACKEDPROT, |
− | ConnectionEstablished | + | When a hello(answer) with a set mod bit is received ConnectionEstablished is to be delayed, and instead the mod info packet with the opcode OP_MODINFO is ti be sent, |
+ | ConnectionEstablished is to be triggered when the mod info packet is received. | ||
<pre> | <pre> | ||
A B | A B | ||
− | Hello ---> MB Set (see | + | Hello ---> MB Set (see ModBit is set) |
MB Set <--- Hello Answer | MB Set <--- Hello Answer | ||
ConEst <--- MInfo (Mod Info) | ConEst <--- MInfo (Mod Info) | ||
MInfo ---> ConEst (call ConnectionEstablished) | MInfo ---> ConEst (call ConnectionEstablished) | ||
</pre> | </pre> | ||
− | The mod info packet | + | The mod info packet have to contain eEmuleTags that announces supported features: |
<pre> | <pre> | ||
<uint 32> tag count | <uint 32> tag count | ||
Line 32: | Line 32: | ||
<emule tag n> | <emule tag n> | ||
</pre> | </pre> | ||
− | + | Only mod features are allowed to use that what was announces by both sides, | |
− | + | after the capability exchange all reminding opcodes > 0x01 (0x01 is mod info packet) are allowed to be used by clients in any way they want. | |
All further communication is not part of this specification. | All further communication is not part of this specification. | ||
== Protocol == | == Protocol == | ||
− | |||
− | + | === Hello === | |
+ | |||
+ | Set the modbit ot in in CT_EMULE_MISCOPTIONS2 | ||
in baseclient.cpp, void CUpDownClient::SendHelloTypePacket(CSafeMemFile* data) | in baseclient.cpp, void CUpDownClient::SendHelloTypePacket(CSafeMemFile* data) | ||
Line 48: | Line 49: | ||
const UINT uSupportLargeFiles = 1; | const UINT uSupportLargeFiles = 1; | ||
const UINT uExtMultiPacket = 1; | const UINT uExtMultiPacket = 1; | ||
− | + | const UINT uReserved = 1; // mod bit | |
− | const UINT | + | |
const UINT uSupportsCryptLayer = thePrefs.IsClientCryptLayerSupported() ? 1 : 0; | const UINT uSupportsCryptLayer = thePrefs.IsClientCryptLayerSupported() ? 1 : 0; | ||
const UINT uRequestsCryptLayer = thePrefs.IsClientCryptLayerRequested() ? 1 : 0; | const UINT uRequestsCryptLayer = thePrefs.IsClientCryptLayerRequested() ? 1 : 0; | ||
Line 61: | Line 61: | ||
(uRequestsCryptLayer << 8) | | (uRequestsCryptLayer << 8) | | ||
(uSupportsCryptLayer << 7) | | (uSupportsCryptLayer << 7) | | ||
− | ( | + | (uReserved << 6) | |
(uExtMultiPacket << 5) | | (uExtMultiPacket << 5) | | ||
(uSupportLargeFiles << 4) | | (uSupportLargeFiles << 4) | | ||
Line 69: | Line 69: | ||
</pre> | </pre> | ||
− | |||
− | + | === Process hello. === | |
baseclient.cpp bool CUpDownClient::ProcessHelloTypePacket(CSafeMemFile* data) | baseclient.cpp bool CUpDownClient::ProcessHelloTypePacket(CSafeMemFile* data) | ||
Line 90: | Line 89: | ||
m_fRequestsCryptLayer = (temptag.GetInt() >> 8) & 0x01; | m_fRequestsCryptLayer = (temptag.GetInt() >> 8) & 0x01; | ||
m_fSupportsCryptLayer = (temptag.GetInt() >> 7) & 0x01; | m_fSupportsCryptLayer = (temptag.GetInt() >> 7) & 0x01; | ||
− | + | m_NeoModProtVersion = (temptag.GetInt() >> 6) & 0x01; // modbit NEO: NMP - [NeoModProt] <-- Xanatos -- | |
− | + | ||
m_fExtMultiPacket = (temptag.GetInt() >> 5) & 0x01; | m_fExtMultiPacket = (temptag.GetInt() >> 5) & 0x01; | ||
m_fSupportsLargeFiles = (temptag.GetInt() >> 4) & 0x01; | m_fSupportsLargeFiles = (temptag.GetInt() >> 4) & 0x01; | ||
Line 102: | Line 100: | ||
</pre> | </pre> | ||
− | == | + | |
+ | ==Send hello answer and modprot info == | ||
+ | |||
Listensocket.cpp bool CClientReqSocket::ProcessPacket(const BYTE* packet, uint32 size, UINT opcode) | Listensocket.cpp bool CClientReqSocket::ProcessPacket(const BYTE* packet, uint32 size, UINT opcode) | ||
Line 118: | Line 118: | ||
− | Example of | + | Example of sendmoinfopacket: |
<pre> | <pre> | ||
void CUpDownClient::SendModInfoPacket(){ | void CUpDownClient::SendModInfoPacket(){ | ||
− | if (socket == NULL){ | + | if (socket == NULL){ |
ASSERT(0); | ASSERT(0); | ||
return; | return; | ||
Line 129: | Line 129: | ||
CSafeMemFile data(128); | CSafeMemFile data(128); | ||
− | + | uint32 tagcount=2+1; | |
− | + | ||
− | + | #ifdef NATTUNNELING // NEO: NATT - [NatTraversal] | |
+ | if(theApp.IsFirewalled() && Kademlia::CKademlia::IsConnected()) | ||
+ | tagcount += 1; | ||
+ | #endif //NATTUNNELING // NEO: NATT END | ||
− | |||
− | |||
data.WriteUInt32(tagcount); // nr. of tags | data.WriteUInt32(tagcount); // nr. of tags | ||
− | CTag | + | |
+ | |||
+ | /************************************************************************************ | ||
+ | * Note: The meaning of the bit fields in the current sample * | ||
+ | * have to be reworked for the final release version numbers are almost useless, * | ||
+ | * support (or newver version) should be anounced only by single bit flags * | ||
+ | ************************************************************************************/ | ||
+ | |||
+ | #ifdef NATTUNNELING // NEO: NATT - [NatTraversal] | ||
+ | const UINT uNatT = NeoPrefs.IsNatTraversalEnabled(); | ||
+ | #endif //NATTUNNELING // NEO: NATT END | ||
+ | uint32 uNeoFeatures = | ||
+ | // ((0 & 0xff) << 24) | // Unused | ||
+ | // ((0 & 0x0f) << 20) | // Reserved | ||
+ | #ifdef NATTUNNELING // NEO: NATT - [NatTraversal] | ||
+ | // ((0 & 0x03) << 18) | // Reserved for nat-t | ||
+ | ((1 & 0x01) << 17) | // NEO: RTP - [ReuseTCPPort] | ||
+ | ((uNatT & 0x01) << 16) | // Support Nat Traversal | ||
+ | // ((0 & 0x01) << 15) | // NEO: XSB - [XSBuddy] | ||
+ | #endif //NATTUNNELING // NEO: NATT END | ||
+ | ((1 & 0x07) << 12) | // NEO: NXS - [NeoXS] | ||
+ | // ((0 & 0x03) << 10) | // Reserved | ||
+ | ((1 & 0x01) << 9 ) | // LowID UDP Ping Support (notifyes a fix form xman1 that allow the remote low ID to use udp reasks) // NEO: MOD - [NewUploadState] | ||
+ | ((1 & 0x01) << 8 ) | // Unsolicited Part Status (allows our client ro recieve filestatus at any time) // NEO: USPS - [UnSolicitedPartStatus] | ||
+ | // ((0 & 0x0f) << 4 ) | // Reserved | ||
+ | ((0 & 0x0f) << 0 ); | ||
+ | CTag tagNeoModProt(CT_NEO_FEATURES, uNeoFeatures); | ||
+ | tagNeoModProt.WriteTagToFile(&data); | ||
+ | |||
+ | uint32 nSCT = NeoPrefs.UseSubChunkTransfer() ? 1 : 0; // version 4 bit | ||
+ | uint32 ICSv2 = NeoPrefs.UseIncompletePartStatus() ? 2 : 0; // version 3 bit | ||
+ | // X-ToDo: | ||
+ | //uint32 RPS = NeoPrefs.UseRealPartStatus() ? 1 : 0; // version 3 bit | ||
+ | //uint32 HPS = NeoPrefs.UseRealPartStatus() ? 1 : 0; // flag 1 bit | ||
+ | //uint32 BPS = NeoPrefs.UseRealPartStatus() ? 1 : 0; // flag 1 bit | ||
+ | |||
+ | uint32 uFileStatus = | ||
+ | // ((0 & 0xff) << 24) | // unused | ||
+ | // ((0 & 0xff) << 16) | // reserved | ||
+ | // ((BPS & 0x01) << 15) | // RPS Flag Blocked Parts | ||
+ | // ((HPS & 0x01) << 14) | // RPS Flag Hiden Parts | ||
+ | // ((RPS & 0x07) << 11) | // RPS VErsion | ||
+ | ((ICSv2 & 0x07) << 8 ) | // ICSv2 Version | ||
+ | // ((0 & 0x0f) << 4 ) | // reserved | ||
+ | ((nSCT & 0x0f) << 0 ); // SCT version | ||
+ | CTag tagPartStatus(CT_EXT_FILESTATUS,uFileStatus); | ||
tagPartStatus.WriteNewEd2kTag(&data); | tagPartStatus.WriteNewEd2kTag(&data); | ||
− | // | + | #ifdef NATTUNNELING // NEO: NATT - [NatTraversal] |
− | // | + | if(theApp.IsFirewalled() && Kademlia::CKademlia::IsConnected()) |
− | CTag tagMyMail("Mod: | + | { |
+ | // Note: to connect a cleint over his buddy or to request a calback we need not only his buddy IP/Port but also his Buddy ID | ||
+ | // So to get this realy to work we need to transmitt the buddy ID to | ||
+ | Kademlia::CUInt128 uBuddyID(true); | ||
+ | uBuddyID.Xor(Kademlia::CKademlia::GetPrefs()->GetKadID()); | ||
+ | byte cID[16]; | ||
+ | uBuddyID.ToByteArray(cID); | ||
+ | CTag tagBuddyID(CT_EMULE_BUDDYID, cID); | ||
+ | tagBuddyID.WriteNewEd2kTag(&data); | ||
+ | } | ||
+ | #endif //NATTUNNELING // NEO: NATT END | ||
+ | |||
+ | // Named tag test begin | ||
+ | LPCTSTR FunnyStr[3]; | ||
+ | FunnyStr[0] = _T("Vote for the Pirate Party of your country"); | ||
+ | FunnyStr[1] = _T("Have a nice day ;)"); | ||
+ | FunnyStr[2] = _T("Confucius says: If you dont upload 10 GB/day good will punish you"); | ||
+ | CTag tagMyMail("Mod:Hello",FunnyStr[rand()%ARRSIZE(FunnyStr)]); | ||
tagMyMail.WriteNewEd2kTag(&data); | tagMyMail.WriteNewEd2kTag(&data); | ||
− | + | // Named tag test end | |
− | // | + | |
− | |||
Packet* packet = new Packet(&data,OP_MODPROT); | Packet* packet = new Packet(&data,OP_MODPROT); | ||
packet->opcode = OP_MODINFOPACKET; | packet->opcode = OP_MODINFOPACKET; | ||
Line 152: | Line 213: | ||
DebugSend("OP__ModInfoPacket", this); | DebugSend("OP__ModInfoPacket", this); | ||
theStats.AddUpDataOverheadOther(packet->size); | theStats.AddUpDataOverheadOther(packet->size); | ||
− | socket->SendPacket(packet,true,true); | + | socket->SendPacket(packet,true,true); |
} | } | ||
</pre> | </pre> | ||
− | === | + | === delay ConnectionEstablished & send mod info packet === |
listensocket.cpp | listensocket.cpp | ||
− | |||
<pre> | <pre> | ||
+ | bool CClientReqSocket::ProcessPacket(const BYTE* packet, uint32 size, UINT opcode) | ||
+ | { | ||
+ | try | ||
+ | { | ||
+ | try | ||
+ | { | ||
+ | if (!client && opcode != OP_HELLO) | ||
+ | { | ||
+ | theStats.AddDownDataOverheadOther(size); | ||
+ | throw GetResString(IDS_ERR_NOHELLO); | ||
+ | } | ||
+ | else if (client && opcode != OP_HELLO && opcode != OP_HELLOANSWER) | ||
+ | client->CheckHandshakeFinished(); | ||
+ | switch(opcode) | ||
+ | { | ||
case OP_HELLOANSWER: | case OP_HELLOANSWER: | ||
{ | { | ||
Line 171: | Line 246: | ||
// NEO: NMP - [NeoModProt] -- Xanatos --> | // NEO: NMP - [NeoModProt] -- Xanatos --> | ||
− | if(client-> | + | if(client->GetNeoModProtVersion() == 0) |
// we will start the SUI when we recieve the mod info packet | // we will start the SUI when we recieve the mod info packet | ||
// NEO: NMP END <-- Xanatos -- | // NEO: NMP END <-- Xanatos -- | ||
− | + | ||
− | + | // start secure identification, if | |
− | + | // - we have received OP_EMULEINFO and OP_HELLOANSWER (old eMule) | |
− | + | // - we have received eMule-OP_HELLOANSWER (new eMule) | |
− | + | if (client->GetInfoPacketsReceived() == IP_BOTH) | |
− | + | client->InfoPacketsReceived(); | |
− | + | ||
if (client) | if (client) | ||
{ | { | ||
// NEO: NMP - [NeoModProt] -- Xanatos --> | // NEO: NMP - [NeoModProt] -- Xanatos --> | ||
− | if (client-> | + | if (client->GetNeoModProtVersion()) |
− | client->SendModInfoPacket(); | + | client->SendModInfoPacket(); |
− | else // we | + | else // we will call ConnectionEstablished when we recieve the Mod Info |
− | + | ||
// NEO: NMP END <-- Xanatos -- | // NEO: NMP END <-- Xanatos -- | ||
{ | { | ||
Line 197: | Line 270: | ||
break; | break; | ||
} | } | ||
− | |||
− | |||
− | |||
− | |||
− | |||
case OP_HELLO: | case OP_HELLO: | ||
{ | { | ||
− | [..................] | + | theStats.AddDownDataOverheadOther(size); |
+ | |||
+ | [...........................] | ||
+ | |||
+ | client->SendHelloAnswer(); | ||
if (client) | if (client) | ||
{ | { | ||
// NEO: NMP - [NeoModProt] -- Xanatos --> | // NEO: NMP - [NeoModProt] -- Xanatos --> | ||
− | if(client-> | + | if(client->GetNeoModProtVersion()) |
− | client->SendModInfoPacket(); | + | client->SendModInfoPacket(); |
− | else // we | + | else // we will call ConnectionEstablished when we recieve the Mod Info |
− | + | ||
// NEO: NMP END <-- Xanatos -- | // NEO: NMP END <-- Xanatos -- | ||
client->ConnectionEstablished(); | client->ConnectionEstablished(); | ||
Line 221: | Line 292: | ||
{ | { | ||
// NEO: NMP - [NeoModProt] -- Xanatos --> | // NEO: NMP - [NeoModProt] -- Xanatos --> | ||
− | |||
// we will start the SUI when we recieve the mod info packet | // we will start the SUI when we recieve the mod info packet | ||
+ | if(client->GetNeoModProtVersion() == 0) | ||
// NEO: NMP END <-- Xanatos -- | // NEO: NMP END <-- Xanatos -- | ||
− | |||
− | + | // start secure identification, if | |
− | + | // - we have received eMule-OP_HELLO (new eMule) | |
− | + | if (client->GetInfoPacketsReceived() == IP_BOTH) | |
− | + | client->InfoPacketsReceived(); | |
− | + | ||
if( client->GetKadPort() ) | if( client->GetKadPort() ) | ||
Line 237: | Line 306: | ||
break; | break; | ||
} | } | ||
+ | |||
</pre> | </pre> | ||
− | === | + | === process modinfo packet === |
listensocket.cpp | listensocket.cpp | ||
Line 298: | Line 368: | ||
CSafeMemFile data(pachPacket, nSize); | CSafeMemFile data(pachPacket, nSize); | ||
− | |||
uint32 tagcount = data.ReadUInt32(); | uint32 tagcount = data.ReadUInt32(); | ||
if (bDbgInfo) | if (bDbgInfo) | ||
m_strModInfo.AppendFormat(_T(" Tags=%u"), (UINT)tagcount); | m_strModInfo.AppendFormat(_T(" Tags=%u"), (UINT)tagcount); | ||
− | |||
for (uint32 i = 0; i < tagcount; i++) | for (uint32 i = 0; i < tagcount; i++) | ||
{ | { | ||
CTag temptag(&data, false); | CTag temptag(&data, false); | ||
− | switch (temptag.GetNameID()) | + | switch (temptag.GetNameID()) |
{ | { | ||
− | case | + | case CT_NEO_FEATURES: |
− | if (temptag. | + | if (temptag.IsInt()){ |
− | + | // = (uint8)(temptag.GetInt() >> 24) & 0xff; | |
− | else if (bDbgInfo) | + | // = (uint8)(temptag.GetInt() >> 20) & 0x0f; |
− | + | #ifdef NATTUNNELING // NEO: NATT - [NatTraversal] | |
+ | // = (uint8)(temptag.GetInt() >> 18) & 0x03; | ||
+ | m_PublicPortReport = (uint8)(temptag.GetInt() >> 17) & 0x01; // NEO: RTP - [ReuseTCPPort] | ||
+ | m_SupportsNatTraversal = (uint8)(temptag.GetInt() >> 16) & 0x01; | ||
+ | // = (uint8)(temptag.GetInt() >> 15) & 0x01; // NEO: XSB - [XSBuddy] | ||
+ | #endif //NATTUNNELING // NEO: NATT END | ||
+ | m_NeoXSVersion = (uint8)(temptag.GetInt() >> 12) & 0x07; // NEO: NXS - [NeoXS] | ||
+ | // = (uint8)(temptag.GetInt() >> 10) & 0x03; | ||
+ | m_LowIDUDPPingSupport = (uint8)(temptag.GetInt() >> 9 ) & 0x01; | ||
+ | m_UnsolicitedPartStatus = (uint8)(temptag.GetInt() >> 8 ) & 0x01; | ||
+ | // = (uint8)(temptag.GetInt() >> 4 ) & 0x0f; | ||
+ | // = (uint8)(temptag.GetInt() >> 0 ) & 0x0f; | ||
+ | }else if (bDbgInfo) | ||
+ | m_strHelloInfo.AppendFormat(_T("\n ***UnkType=%s"), temptag.GetFullInfo()); | ||
break; | break; | ||
+ | case CT_EXT_FILESTATUS: | ||
+ | if (temptag.IsInt()){ | ||
+ | |||
+ | // X-ToDo | ||
+ | // = (uint8)(temptag.GetInt() >> 24) & 0xff; | ||
+ | // = (uint8)(temptag.GetInt() >> 16) & 0xff; | ||
+ | //uint8 BlockedPartStatus = (uint8)(temptag.GetInt() >> 15) & 0x01; | ||
+ | //uint8 HidenPartStatus = (uint8)(temptag.GetInt() >> 14) & 0x01; | ||
+ | //uint8 RealPartStatusVer = (uint8)(temptag.GetInt() >> 11) & 0x07; | ||
+ | m_IncompletePartVer = (uint8)(temptag.GetInt() >> 8 ) & 0x07; | ||
+ | // = (uint8)(temptag.GetInt() >> 4 ) & 0x0f; | ||
+ | m_SubChunksVer = (uint8)(temptag.GetInt() >> 0 ) & 0x0f; | ||
+ | |||
+ | //ASSERT(BlockedPartStatus || HidenPartStatus || !RealPartStatusVer); | ||
+ | // Note: RPC version without one or booth RPS flags is invalid, | ||
+ | // the cleint must always say wha is he doint gith the parts 'blocking and hiding' or 'only hiding', | ||
+ | // or he can booth depanding on the situation | ||
+ | // Booth RPS versions have always teh same version as the writing functions are identical | ||
+ | // just other opcodes are used and other part states notifyed | ||
+ | //if(BlockedPartStatus) | ||
+ | // m_BlockedPartStatusVer = RealPartStatusVer; | ||
+ | //if(HidenPartStatus) | ||
+ | // m_HidenPartStatusVer = RealPartStatusVer; | ||
+ | |||
+ | }else if (bDbgInfo) | ||
+ | m_strModInfo.AppendFormat(_T("\n ***UnkType=%s"), temptag.GetFullInfo()); | ||
+ | break; | ||
+ | #ifdef NATTUNNELING // NEO: NATT - [NatTraversal] | ||
+ | case CT_EMULE_BUDDYID: | ||
+ | if(temptag.IsHash()) | ||
+ | { | ||
+ | SetBuddyID(temptag.GetHash()); | ||
+ | } | ||
+ | else{ | ||
+ | if (bDbgInfo) | ||
+ | m_strModInfo.AppendFormat(_T("\n ***UnkType=%s"), temptag.GetFullInfo()); | ||
+ | } | ||
+ | break; | ||
+ | #endif //NATTUNNELING // NEO: NATT END | ||
default: | default: | ||
− | // | + | // Named tag test begin |
if(strcmp(temptag.GetName(),"Mod:Hello") == 0) | if(strcmp(temptag.GetName(),"Mod:Hello") == 0) | ||
{ | { | ||
Line 324: | Line 444: | ||
} | } | ||
else | else | ||
+ | // Named tag test end | ||
if (bDbgInfo) | if (bDbgInfo) | ||
Line 329: | Line 450: | ||
} | } | ||
} | } | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
</pre> | </pre> | ||
− | |||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | === proces mod data example === | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
Line 367: | Line 475: | ||
<pre> | <pre> | ||
// NEO: NMP - [NeoModProt] -- Xanatos --> | // NEO: NMP - [NeoModProt] -- Xanatos --> | ||
− | |||
case OP_MODPACKEDPROT: | case OP_MODPACKEDPROT: | ||
if (!packet->UnPackPacket()){ | if (!packet->UnPackPacket()){ | ||
Line 387: | Line 494: | ||
try | try | ||
{ | { | ||
− | |||
if (!client) | if (!client) | ||
{ | { | ||
Line 396: | Line 502: | ||
ASSERT_VALID(client); | ASSERT_VALID(client); | ||
− | switch(opcode) | + | switch(opcode) |
{ | { | ||
− | |||
case OP_MODINFOPACKET: | case OP_MODINFOPACKET: | ||
{ | { | ||
Line 405: | Line 510: | ||
theStats.AddDownDataOverheadOther(uRawSize); | theStats.AddDownDataOverheadOther(uRawSize); | ||
− | if(client-> | + | if(client->GetNeoModProtVersion() == 0) |
throw CString(_T("Recieved Neo Mod Info Packet from a cleint whitch doe snot support this feature!")); | throw CString(_T("Recieved Neo Mod Info Packet from a cleint whitch doe snot support this feature!")); | ||
− | |||
client->ProcessModInfoPacket(packet,size); | client->ProcessModInfoPacket(packet,size); | ||
Line 421: | Line 525: | ||
} | } | ||
− | default: | + | default: |
− | + | ||
theStats.AddDownDataOverheadOther(uRawSize); | theStats.AddDownDataOverheadOther(uRawSize); | ||
PacketToDebugLogLine(_T("ModProt"), packet, size, opcode); | PacketToDebugLogLine(_T("ModProt"), packet, size, opcode); | ||
Line 449: | Line 552: | ||
} | } | ||
return true; | return true; | ||
− | + | } | |
// NEO: NMP END <-- Xanatos -- | // NEO: NMP END <-- Xanatos -- | ||
</pre> | </pre> | ||
− | |||
− | + | == backward compatibility == | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | Modstring is still send and replied in hello packet to maintain backward compatibility However a opcode for modstring will be defined for those who alos want to move it to the mod protocol | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | |||
− | |||
− | |||
− | + | == OPCODES== | |
<pre> | <pre> | ||
− | + | OP_MODPROT 0x57 | |
− | + | OP_MODPACKEDPROT 0x58 | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | OP_MODPROT | + | |
− | OP_MODPACKEDPROT | + | |
OP_MODINFOPACKET 0x01 | OP_MODINFOPACKET 0x01 | ||
</pre> | </pre> | ||
− | == | + | == TAGS defines == |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
{| style="font-size: 85%; text-align: Left;Border="1"; | {| style="font-size: 85%; text-align: Left;Border="1"; | ||
! rowspan=2 | TAGNAME | ! rowspan=2 | TAGNAME | ||
Line 557: | Line 582: | ||
|MISC_PROTOCOL_EXTENSIONS | |MISC_PROTOCOL_EXTENSIONS | ||
| 'M' 4D | | 'M' 4D | ||
− | | | + | |(etc..) |
− | + | ||
|- | |- | ||
− | | | + | |FILE_STATUS_EXTENSIONS |
− | | ' | + | | 'S' 53 |
− | | | + | |(SCT, ICS, etc..) |
− | + | ||
|- | |- | ||
− | | | + | |NEO_PROTOCOL_EXTENSIONS |
− | | ' | + | |'N' 4E |
− | | | + | |(NatT, NeoXS, etc..) |
− | + | ||
|- | |- | ||
− | | | + | |EMULE_BUDDYID |
| '@' 40 | | '@' 40 | ||
− | | | + | |(for NatT by david xanatos|- |
− | | | + | |
|- | |- | ||
− | | | + | |CT_MOD_VERSION |
− | | ' | + | | 'U' 0x55 |
− | | | + | | Modstring. Modstring MUST be sent either in hello OR Modprotocol (note that sending it in mod protocol is not backward compatible) |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
|- | |- | ||
+ | |||
|} | |} | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== See also == | == See also == | ||
References to emule protocol... | References to emule protocol... | ||
− |