1
Fork 0
mirror of https://github.com/redstrate/Kawari.git synced 2025-05-20 17:47:46 +00:00
kawari/src/packet.rs

316 lines
8 KiB
Rust
Raw Normal View History

use std::{
fs::write,
io::Cursor,
time::{SystemTime, UNIX_EPOCH},
};
2025-03-08 13:58:24 -05:00
use binrw::{BinRead, BinWrite, binrw};
use tokio::{
io::{AsyncWriteExt, WriteHalf},
net::TcpStream,
};
use crate::{
common::read_string,
compression::decompress,
encryption::{decrypt, encrypt},
ipc::IPCSegment,
oodle::FFXIVOodle,
};
2025-03-08 14:09:57 -05:00
#[binrw]
#[brw(repr = u16)]
#[derive(Debug)]
pub enum ConnectionType {
2025-03-08 15:33:58 -05:00
None = 0x0,
Zone = 0x1,
Chat = 0x2,
2025-03-08 14:09:57 -05:00
Lobby = 0x3,
}
#[binrw]
#[brw(import(size: u32, encryption_key: Option<&[u8]>))]
#[derive(Debug, Clone)]
pub enum SegmentType {
// Client->Server Packets
#[brw(magic = 0x1u32)]
InitializeSession {
#[brw(pad_before = 4)]
#[brw(pad_after = 48)] // TODO: probably not empty?
player_id: u32,
},
#[brw(magic = 0x9u32)]
InitializeEncryption {
#[brw(pad_before = 36)] // empty
#[brw(pad_size_to = 32)]
#[br(count = 32)]
#[br(map = read_string)]
#[bw(ignore)]
phrase: String,
#[brw(pad_before = 32)]
#[brw(pad_after = 512)] // empty
key: [u8; 4],
},
#[brw(magic = 0x3u32)]
2025-03-08 23:07:55 -05:00
Ipc {
#[br(parse_with = decrypt, args(size, encryption_key))]
#[bw(write_with = encrypt, args(size, encryption_key))]
data: IPCSegment,
},
#[brw(magic = 0x7u32)]
KeepAlive { id: u32, timestamp: u32 },
// Server->Client Packets
#[brw(magic = 0xAu32)]
InitializationEncryptionResponse {
#[br(count = 0x280)]
#[brw(pad_size_to = 640)]
data: Vec<u8>,
},
#[brw(magic = 0x8u32)]
KeepAliveResponse { id: u32, timestamp: u32 },
#[brw(magic = 0x2u32)]
ZoneInitialize {
#[brw(pad_after = 36)]
player_id: u32,
},
}
#[binrw]
#[brw(repr = u8)]
#[derive(Debug, PartialEq)]
pub enum CompressionType {
Uncompressed = 0,
Oodle = 2,
}
2025-03-08 14:09:57 -05:00
#[binrw]
#[derive(Debug)]
pub struct PacketHeader {
pub unk1: u64,
pub unk2: u64,
pub timestamp: u64,
pub size: u32,
pub connection_type: ConnectionType,
pub segment_count: u16,
pub unk3: u8,
2025-03-11 21:33:43 -04:00
pub compression_type: CompressionType,
pub unk4: u16,
2025-03-11 21:33:43 -04:00
pub uncompressed_size: u32,
}
#[binrw]
#[brw(import(encryption_key: Option<&[u8]>))]
#[derive(Debug, Clone)]
pub struct PacketSegment {
#[bw(calc = self.calc_size())]
#[br(dbg)]
pub size: u32,
#[br(dbg)]
pub source_actor: u32,
#[br(dbg)]
pub target_actor: u32,
#[brw(args(size, encryption_key))]
#[br(dbg)]
pub segment_type: SegmentType,
}
impl PacketSegment {
fn calc_size(&self) -> u32 {
let header = std::mem::size_of::<u32>() * 4;
header as u32
+ match &self.segment_type {
SegmentType::InitializeEncryption { .. } => 616,
SegmentType::InitializationEncryptionResponse { .. } => 640,
2025-03-08 23:07:55 -05:00
SegmentType::Ipc { data } => data.calc_size(),
SegmentType::KeepAlive { .. } => 0x8,
SegmentType::KeepAliveResponse { .. } => 0x8,
SegmentType::ZoneInitialize { .. } => 40,
SegmentType::InitializeSession { .. } => todo!(),
}
}
}
#[binrw]
#[brw(import(oodle: &mut FFXIVOodle, encryption_key: Option<&[u8]>))]
#[derive(Debug)]
struct Packet {
#[br(dbg)]
header: PacketHeader,
#[bw(args(encryption_key))]
#[br(parse_with = decompress, args(oodle, &header, encryption_key,))]
#[br(dbg)]
segments: Vec<PacketSegment>,
2025-03-08 14:09:57 -05:00
}
fn dump(msg: &str, data: &[u8]) {
2025-03-08 23:07:55 -05:00
write("packet.bin", data).unwrap();
2025-03-08 14:09:57 -05:00
panic!("{msg} Dumped to packet.bin.");
}
pub async fn send_packet(
socket: &mut WriteHalf<TcpStream>,
segments: &[PacketSegment],
state: &mut State,
compression_type: CompressionType,
) {
let timestamp: u64 = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("Failed to get UNIX timestamp!")
.as_millis()
.try_into()
.unwrap();
let mut segments_buffer = Cursor::new(Vec::new());
for segment in segments {
segment
.write_le_args(
&mut segments_buffer,
(state.client_key.as_ref().map(|s: &[u8; 16]| s.as_slice()),),
)
.unwrap();
}
let segments_buffer = segments_buffer.into_inner();
let mut uncompressed_size = 0;
let data = match compression_type {
CompressionType::Uncompressed => segments_buffer,
CompressionType::Oodle => {
uncompressed_size = segments_buffer.len();
state.clientbound_oodle.encode(segments_buffer)
}
};
let size = std::mem::size_of::<PacketHeader>() + data.len();
let header = PacketHeader {
2025-03-08 16:39:13 -05:00
unk1: 0xE2465DFF41A05252, // wtf?
unk2: 0x75C4997B4D642A7F, // wtf? x2
timestamp,
size: size as u32,
connection_type: ConnectionType::Lobby,
segment_count: segments.len() as u16,
unk3: 0,
compression_type,
unk4: 0,
uncompressed_size: uncompressed_size as u32,
};
let mut cursor = Cursor::new(Vec::new());
header.write_le(&mut cursor).unwrap();
std::io::Write::write_all(&mut cursor, &data).unwrap();
let buffer = cursor.into_inner();
tracing::info!("Wrote response packet to outpacket.bin");
2025-03-08 23:07:55 -05:00
write("outpacket.bin", &buffer).unwrap();
socket
2025-03-08 23:07:55 -05:00
.write_all(&buffer)
.await
.expect("Failed to write packet!");
}
// temporary
pub struct State {
pub client_key: Option<[u8; 16]>,
pub session_id: Option<String>,
pub serverbound_oodle: FFXIVOodle,
pub clientbound_oodle: FFXIVOodle,
pub player_id: Option<u32>,
}
2025-03-08 14:09:57 -05:00
pub async fn parse_packet(data: &[u8], state: &mut State) -> (Vec<PacketSegment>, ConnectionType) {
let mut cursor = Cursor::new(data);
match Packet::read_le_args(
&mut cursor,
(
&mut state.serverbound_oodle,
state.client_key.as_ref().map(|s: &[u8; 16]| s.as_slice()),
),
) {
Ok(packet) => {
println!("{:#?}", packet);
// don't really think this works like I think it does'
/*if packet.header.size as usize != data.len() {
dump(
"Packet size mismatch between what we're given and the header!",
data,
);
}*/
(packet.segments, packet.header.connection_type)
}
Err(err) => {
println!("{err}");
dump("Failed to parse packet!", data);
(Vec::new(), ConnectionType::None)
}
}
}
pub async fn send_keep_alive(
socket: &mut WriteHalf<TcpStream>,
state: &mut State,
id: u32,
timestamp: u32,
) {
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::KeepAliveResponse { id, timestamp },
};
send_packet(
socket,
&[response_packet],
state,
CompressionType::Uncompressed,
)
.await;
}
#[cfg(test)]
mod tests {
use super::*;
/// Ensure that the packet size as reported matches up with what we write
#[test]
fn test_packet_sizes() {
let packet_types = [
SegmentType::InitializeEncryption {
phrase: String::new(),
key: [0; 4],
},
SegmentType::InitializationEncryptionResponse { data: Vec::new() },
SegmentType::KeepAlive {
id: 0,
timestamp: 0,
},
SegmentType::KeepAliveResponse {
id: 0,
timestamp: 0,
},
];
for packet in &packet_types {
let mut cursor = Cursor::new(Vec::new());
let packet_segment = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: packet.clone(),
};
packet_segment.write_le(&mut cursor).unwrap();
let buffer = cursor.into_inner();
assert_eq!(buffer.len(), packet_segment.calc_size() as usize);
}
}
}