2025-03-08 16:10:00 -05:00
|
|
|
use std::{
|
|
|
|
fs::write,
|
|
|
|
io::Cursor,
|
|
|
|
time::{SystemTime, UNIX_EPOCH},
|
|
|
|
};
|
2025-03-08 13:58:24 -05:00
|
|
|
|
2025-03-08 21:54:03 -05:00
|
|
|
use binrw::{BinRead, BinWrite, binrw};
|
2025-03-15 20:36:39 -04:00
|
|
|
use tokio::{io::AsyncWriteExt, net::TcpStream};
|
2025-03-08 16:10:00 -05:00
|
|
|
|
2025-03-08 22:03:28 -05:00
|
|
|
use crate::{
|
2025-03-09 11:07:01 -04:00
|
|
|
common::read_string,
|
2025-03-09 12:00:58 -04:00
|
|
|
compression::decompress,
|
2025-03-08 23:24:09 -05:00
|
|
|
encryption::{decrypt, encrypt},
|
|
|
|
ipc::IPCSegment,
|
2025-03-10 21:31:21 -04:00
|
|
|
oodle::FFXIVOodle,
|
2025-03-08 22:03:28 -05:00
|
|
|
};
|
2025-03-08 21:13:00 -05:00
|
|
|
|
2025-03-08 14:09:57 -05:00
|
|
|
#[binrw]
|
|
|
|
#[brw(repr = u16)]
|
|
|
|
#[derive(Debug)]
|
2025-03-10 21:31:21 -04:00
|
|
|
pub enum ConnectionType {
|
2025-03-08 15:33:58 -05:00
|
|
|
None = 0x0,
|
|
|
|
Zone = 0x1,
|
|
|
|
Chat = 0x2,
|
2025-03-08 14:09:57 -05:00
|
|
|
Lobby = 0x3,
|
|
|
|
}
|
|
|
|
|
2025-03-08 16:08:25 -05:00
|
|
|
#[binrw]
|
2025-03-08 21:53:10 -05:00
|
|
|
#[brw(import(size: u32, encryption_key: Option<&[u8]>))]
|
2025-03-08 16:08:25 -05:00
|
|
|
#[derive(Debug, Clone)]
|
2025-03-08 23:24:09 -05:00
|
|
|
pub enum SegmentType {
|
2025-03-08 16:08:25 -05:00
|
|
|
// Client->Server Packets
|
2025-03-10 21:31:21 -04:00
|
|
|
#[brw(magic = 0x1u32)]
|
|
|
|
InitializeSession {
|
|
|
|
#[brw(pad_before = 4)]
|
|
|
|
#[brw(pad_after = 48)] // TODO: probably not empty?
|
|
|
|
player_id: u32,
|
|
|
|
},
|
2025-03-08 14:38:31 -05:00
|
|
|
#[brw(magic = 0x9u32)]
|
|
|
|
InitializeEncryption {
|
2025-03-08 15:27:28 -05:00
|
|
|
#[brw(pad_before = 36)] // empty
|
2025-03-11 21:52:46 -04:00
|
|
|
#[brw(pad_size_to = 32)]
|
|
|
|
#[br(count = 32)]
|
2025-03-08 14:38:31 -05:00
|
|
|
#[br(map = read_string)]
|
|
|
|
#[bw(ignore)]
|
|
|
|
phrase: String,
|
|
|
|
|
2025-03-11 21:52:46 -04:00
|
|
|
#[brw(pad_before = 32)]
|
2025-03-08 15:27:28 -05:00
|
|
|
#[brw(pad_after = 512)] // empty
|
|
|
|
key: [u8; 4],
|
2025-03-08 14:38:31 -05:00
|
|
|
},
|
2025-03-08 16:08:25 -05:00
|
|
|
#[brw(magic = 0x3u32)]
|
2025-03-08 23:07:55 -05:00
|
|
|
Ipc {
|
2025-03-08 16:08:25 -05:00
|
|
|
#[br(parse_with = decrypt, args(size, encryption_key))]
|
2025-03-08 21:53:10 -05:00
|
|
|
#[bw(write_with = encrypt, args(size, encryption_key))]
|
2025-03-08 16:08:25 -05:00
|
|
|
data: IPCSegment,
|
|
|
|
},
|
2025-03-08 21:23:33 -05:00
|
|
|
#[brw(magic = 0x7u32)]
|
|
|
|
KeepAlive { id: u32, timestamp: u32 },
|
2025-03-08 16:08:25 -05:00
|
|
|
|
|
|
|
// Server->Client Packets
|
2025-03-10 21:31:21 -04:00
|
|
|
#[brw(magic = 0xAu32)]
|
2025-03-08 15:27:28 -05:00
|
|
|
InitializationEncryptionResponse {
|
|
|
|
#[br(count = 0x280)]
|
2025-03-11 21:56:29 -04:00
|
|
|
#[brw(pad_size_to = 640)]
|
2025-03-08 16:10:00 -05:00
|
|
|
data: Vec<u8>,
|
2025-03-08 16:08:25 -05:00
|
|
|
},
|
2025-03-10 21:31:21 -04:00
|
|
|
#[brw(magic = 0x8u32)]
|
2025-03-08 21:23:33 -05:00
|
|
|
KeepAliveResponse { id: u32, timestamp: u32 },
|
2025-03-10 21:31:21 -04:00
|
|
|
#[brw(magic = 0x2u32)]
|
|
|
|
ZoneInitialize {
|
|
|
|
#[brw(pad_after = 36)]
|
|
|
|
player_id: u32,
|
|
|
|
},
|
2025-03-08 14:38:31 -05:00
|
|
|
}
|
|
|
|
|
2025-03-09 11:07:01 -04:00
|
|
|
#[binrw]
|
|
|
|
#[brw(repr = u8)]
|
2025-03-11 23:52:55 -04:00
|
|
|
#[derive(Debug, PartialEq)]
|
2025-03-09 12:00:58 -04:00
|
|
|
pub enum CompressionType {
|
2025-03-09 11:07:01 -04:00
|
|
|
Uncompressed = 0,
|
|
|
|
Oodle = 2,
|
|
|
|
}
|
|
|
|
|
2025-03-08 14:09:57 -05:00
|
|
|
#[binrw]
|
|
|
|
#[derive(Debug)]
|
2025-03-09 12:00:58 -04:00
|
|
|
pub struct PacketHeader {
|
|
|
|
pub unk1: u64,
|
|
|
|
pub unk2: u64,
|
|
|
|
pub timestamp: u64,
|
|
|
|
pub size: u32,
|
|
|
|
pub connection_type: ConnectionType,
|
|
|
|
pub segment_count: u16,
|
|
|
|
pub unk3: u8,
|
2025-03-11 21:33:43 -04:00
|
|
|
pub compression_type: CompressionType,
|
2025-03-09 12:00:58 -04:00
|
|
|
pub unk4: u16,
|
2025-03-11 21:33:43 -04:00
|
|
|
pub uncompressed_size: u32,
|
2025-03-08 14:38:31 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#[binrw]
|
2025-03-08 21:53:10 -05:00
|
|
|
#[brw(import(encryption_key: Option<&[u8]>))]
|
2025-03-08 15:27:28 -05:00
|
|
|
#[derive(Debug, Clone)]
|
2025-03-08 23:24:09 -05:00
|
|
|
pub struct PacketSegment {
|
2025-03-08 15:27:28 -05:00
|
|
|
#[bw(calc = self.calc_size())]
|
2025-03-10 21:31:21 -04:00
|
|
|
#[br(dbg)]
|
2025-03-08 23:24:09 -05:00
|
|
|
pub size: u32,
|
2025-03-10 21:31:21 -04:00
|
|
|
#[br(dbg)]
|
2025-03-08 23:24:09 -05:00
|
|
|
pub source_actor: u32,
|
2025-03-10 21:31:21 -04:00
|
|
|
#[br(dbg)]
|
2025-03-08 23:24:09 -05:00
|
|
|
pub target_actor: u32,
|
2025-03-08 21:53:10 -05:00
|
|
|
#[brw(args(size, encryption_key))]
|
2025-03-10 21:31:21 -04:00
|
|
|
#[br(dbg)]
|
2025-03-08 23:24:09 -05:00
|
|
|
pub segment_type: SegmentType,
|
2025-03-08 14:38:31 -05:00
|
|
|
}
|
|
|
|
|
2025-03-08 15:27:28 -05:00
|
|
|
impl PacketSegment {
|
|
|
|
fn calc_size(&self) -> u32 {
|
|
|
|
let header = std::mem::size_of::<u32>() * 4;
|
2025-03-08 21:54:03 -05:00
|
|
|
header as u32
|
2025-03-08 16:10:00 -05:00
|
|
|
+ match &self.segment_type {
|
|
|
|
SegmentType::InitializeEncryption { .. } => 616,
|
|
|
|
SegmentType::InitializationEncryptionResponse { .. } => 640,
|
2025-03-08 23:07:55 -05:00
|
|
|
SegmentType::Ipc { data } => data.calc_size(),
|
2025-03-10 21:31:21 -04:00
|
|
|
SegmentType::KeepAlive { .. } => 0x8,
|
2025-03-08 21:23:33 -05:00
|
|
|
SegmentType::KeepAliveResponse { .. } => 0x8,
|
2025-03-10 21:31:21 -04:00
|
|
|
SegmentType::ZoneInitialize { .. } => 40,
|
|
|
|
SegmentType::InitializeSession { .. } => todo!(),
|
2025-03-08 21:54:03 -05:00
|
|
|
}
|
2025-03-08 15:27:28 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2025-03-08 14:38:31 -05:00
|
|
|
#[binrw]
|
2025-03-10 21:31:21 -04:00
|
|
|
#[brw(import(oodle: &mut FFXIVOodle, encryption_key: Option<&[u8]>))]
|
2025-03-08 14:38:31 -05:00
|
|
|
#[derive(Debug)]
|
|
|
|
struct Packet {
|
2025-03-09 11:07:01 -04:00
|
|
|
#[br(dbg)]
|
2025-03-08 14:38:31 -05:00
|
|
|
header: PacketHeader,
|
2025-03-08 21:53:10 -05:00
|
|
|
#[bw(args(encryption_key))]
|
2025-03-10 21:31:21 -04:00
|
|
|
#[br(parse_with = decompress, args(oodle, &header, encryption_key,))]
|
|
|
|
#[br(dbg)]
|
2025-03-08 14:38:31 -05:00
|
|
|
segments: Vec<PacketSegment>,
|
2025-03-08 14:09:57 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn dump(msg: &str, data: &[u8]) {
|
2025-03-08 23:07:55 -05:00
|
|
|
write("packet.bin", data).unwrap();
|
2025-03-08 14:09:57 -05:00
|
|
|
panic!("{msg} Dumped to packet.bin.");
|
|
|
|
}
|
|
|
|
|
2025-03-08 23:24:09 -05:00
|
|
|
pub async fn send_packet(
|
2025-03-15 20:36:39 -04:00
|
|
|
socket: &mut TcpStream,
|
2025-03-08 23:24:09 -05:00
|
|
|
segments: &[PacketSegment],
|
2025-03-10 21:31:21 -04:00
|
|
|
state: &mut State,
|
2025-03-11 23:52:55 -04:00
|
|
|
compression_type: CompressionType,
|
2025-03-08 23:24:09 -05:00
|
|
|
) {
|
2025-03-08 15:27:28 -05:00
|
|
|
let timestamp: u64 = SystemTime::now()
|
|
|
|
.duration_since(UNIX_EPOCH)
|
|
|
|
.expect("Failed to get UNIX timestamp!")
|
|
|
|
.as_millis()
|
|
|
|
.try_into()
|
|
|
|
.unwrap();
|
|
|
|
|
2025-03-11 23:52:55 -04:00
|
|
|
let mut segments_buffer = Cursor::new(Vec::new());
|
2025-03-08 15:27:28 -05:00
|
|
|
for segment in segments {
|
2025-03-11 23:52:55 -04:00
|
|
|
segment
|
|
|
|
.write_le_args(
|
|
|
|
&mut segments_buffer,
|
|
|
|
(state.client_key.as_ref().map(|s: &[u8; 16]| s.as_slice()),),
|
|
|
|
)
|
|
|
|
.unwrap();
|
2025-03-08 15:27:28 -05:00
|
|
|
}
|
|
|
|
|
2025-03-11 23:52:55 -04:00
|
|
|
let segments_buffer = segments_buffer.into_inner();
|
|
|
|
|
|
|
|
let mut uncompressed_size = 0;
|
|
|
|
let data = match compression_type {
|
|
|
|
CompressionType::Uncompressed => segments_buffer,
|
|
|
|
CompressionType::Oodle => {
|
|
|
|
uncompressed_size = segments_buffer.len();
|
|
|
|
state.clientbound_oodle.encode(segments_buffer)
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let size = std::mem::size_of::<PacketHeader>() + data.len();
|
|
|
|
|
2025-03-08 15:27:28 -05:00
|
|
|
let header = PacketHeader {
|
2025-03-08 16:39:13 -05:00
|
|
|
unk1: 0xE2465DFF41A05252, // wtf?
|
|
|
|
unk2: 0x75C4997B4D642A7F, // wtf? x2
|
2025-03-08 15:27:28 -05:00
|
|
|
timestamp,
|
2025-03-11 23:52:55 -04:00
|
|
|
size: size as u32,
|
2025-03-08 15:27:28 -05:00
|
|
|
connection_type: ConnectionType::Lobby,
|
|
|
|
segment_count: segments.len() as u16,
|
|
|
|
unk3: 0,
|
2025-03-11 23:52:55 -04:00
|
|
|
compression_type,
|
2025-03-08 15:27:28 -05:00
|
|
|
unk4: 0,
|
2025-03-11 23:52:55 -04:00
|
|
|
uncompressed_size: uncompressed_size as u32,
|
2025-03-08 15:27:28 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
let mut cursor = Cursor::new(Vec::new());
|
2025-03-11 23:52:55 -04:00
|
|
|
header.write_le(&mut cursor).unwrap();
|
|
|
|
std::io::Write::write_all(&mut cursor, &data).unwrap();
|
2025-03-08 15:27:28 -05:00
|
|
|
|
|
|
|
let buffer = cursor.into_inner();
|
|
|
|
|
|
|
|
tracing::info!("Wrote response packet to outpacket.bin");
|
2025-03-08 23:07:55 -05:00
|
|
|
write("outpacket.bin", &buffer).unwrap();
|
2025-03-08 15:27:28 -05:00
|
|
|
|
|
|
|
socket
|
2025-03-08 23:07:55 -05:00
|
|
|
.write_all(&buffer)
|
2025-03-08 15:27:28 -05:00
|
|
|
.await
|
|
|
|
.expect("Failed to write packet!");
|
|
|
|
}
|
|
|
|
|
2025-03-08 16:08:25 -05:00
|
|
|
// temporary
|
|
|
|
pub struct State {
|
2025-03-08 16:10:00 -05:00
|
|
|
pub client_key: Option<[u8; 16]>,
|
2025-03-09 11:01:06 -04:00
|
|
|
pub session_id: Option<String>,
|
2025-03-11 23:52:55 -04:00
|
|
|
pub serverbound_oodle: FFXIVOodle,
|
|
|
|
pub clientbound_oodle: FFXIVOodle,
|
2025-03-08 16:08:25 -05:00
|
|
|
}
|
2025-03-08 14:09:57 -05:00
|
|
|
|
2025-03-10 21:31:21 -04:00
|
|
|
pub async fn parse_packet(data: &[u8], state: &mut State) -> (Vec<PacketSegment>, ConnectionType) {
|
2025-03-08 16:08:25 -05:00
|
|
|
let mut cursor = Cursor::new(data);
|
2025-03-08 15:29:38 -05:00
|
|
|
|
2025-03-08 16:10:00 -05:00
|
|
|
match Packet::read_le_args(
|
|
|
|
&mut cursor,
|
2025-03-10 21:31:21 -04:00
|
|
|
(
|
2025-03-11 23:52:55 -04:00
|
|
|
&mut state.serverbound_oodle,
|
2025-03-10 21:31:21 -04:00
|
|
|
state.client_key.as_ref().map(|s: &[u8; 16]| s.as_slice()),
|
|
|
|
),
|
2025-03-08 16:10:00 -05:00
|
|
|
) {
|
2025-03-08 15:29:38 -05:00
|
|
|
Ok(packet) => {
|
|
|
|
println!("{:#?}", packet);
|
|
|
|
|
2025-03-12 18:44:05 -04:00
|
|
|
// don't really think this works like I think it does'
|
|
|
|
/*if packet.header.size as usize != data.len() {
|
2025-03-08 15:29:38 -05:00
|
|
|
dump(
|
|
|
|
"Packet size mismatch between what we're given and the header!",
|
2025-03-08 16:10:00 -05:00
|
|
|
data,
|
2025-03-08 15:29:38 -05:00
|
|
|
);
|
2025-03-12 18:44:05 -04:00
|
|
|
}*/
|
2025-03-08 15:29:38 -05:00
|
|
|
|
2025-03-10 21:31:21 -04:00
|
|
|
(packet.segments, packet.header.connection_type)
|
2025-03-08 16:10:00 -05:00
|
|
|
}
|
2025-03-08 15:29:38 -05:00
|
|
|
Err(err) => {
|
|
|
|
println!("{err}");
|
|
|
|
dump("Failed to parse packet!", data);
|
2025-03-08 23:24:09 -05:00
|
|
|
|
2025-03-10 21:31:21 -04:00
|
|
|
(Vec::new(), ConnectionType::None)
|
2025-03-08 16:10:00 -05:00
|
|
|
}
|
2025-03-08 15:27:28 -05:00
|
|
|
}
|
|
|
|
}
|
2025-03-08 23:24:09 -05:00
|
|
|
|
2025-03-15 20:36:39 -04:00
|
|
|
pub async fn send_keep_alive(socket: &mut TcpStream, state: &mut State, id: u32, timestamp: u32) {
|
2025-03-08 23:24:09 -05:00
|
|
|
let response_packet = PacketSegment {
|
|
|
|
source_actor: 0,
|
|
|
|
target_actor: 0,
|
|
|
|
segment_type: SegmentType::KeepAliveResponse { id, timestamp },
|
|
|
|
};
|
2025-03-11 23:52:55 -04:00
|
|
|
send_packet(
|
|
|
|
socket,
|
|
|
|
&[response_packet],
|
|
|
|
state,
|
|
|
|
CompressionType::Uncompressed,
|
|
|
|
)
|
|
|
|
.await;
|
2025-03-08 23:24:09 -05:00
|
|
|
}
|
2025-03-11 21:52:46 -04:00
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
|
|
|
|
2025-03-11 21:56:29 -04:00
|
|
|
/// Ensure that the packet size as reported matches up with what we write
|
2025-03-11 21:52:46 -04:00
|
|
|
#[test]
|
|
|
|
fn test_packet_sizes() {
|
2025-03-11 21:56:29 -04:00
|
|
|
let packet_types = [
|
|
|
|
SegmentType::InitializeEncryption {
|
|
|
|
phrase: String::new(),
|
|
|
|
key: [0; 4],
|
|
|
|
},
|
|
|
|
SegmentType::InitializationEncryptionResponse { data: Vec::new() },
|
|
|
|
SegmentType::KeepAlive {
|
|
|
|
id: 0,
|
|
|
|
timestamp: 0,
|
|
|
|
},
|
|
|
|
SegmentType::KeepAliveResponse {
|
|
|
|
id: 0,
|
|
|
|
timestamp: 0,
|
|
|
|
},
|
|
|
|
];
|
2025-03-11 21:52:46 -04:00
|
|
|
|
|
|
|
for packet in &packet_types {
|
|
|
|
let mut cursor = Cursor::new(Vec::new());
|
|
|
|
|
|
|
|
let packet_segment = PacketSegment {
|
|
|
|
source_actor: 0,
|
|
|
|
target_actor: 0,
|
|
|
|
segment_type: packet.clone(),
|
|
|
|
};
|
|
|
|
packet_segment.write_le(&mut cursor).unwrap();
|
|
|
|
|
|
|
|
let buffer = cursor.into_inner();
|
|
|
|
|
|
|
|
assert_eq!(buffer.len(), packet_segment.calc_size() as usize);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|