1
Fork 0
mirror of https://github.com/redstrate/Kawari.git synced 2025-05-20 17:47:46 +00:00
kawari/src/packet.rs

397 lines
12 KiB
Rust
Raw Normal View History

use std::{
ffi::CString,
fs::write,
io::Cursor,
time::{SystemTime, UNIX_EPOCH},
};
2025-03-08 13:58:24 -05:00
use binrw::{BinRead, BinResult, BinWrite, binrw, helpers::until_eof};
use tokio::{
io::{AsyncWriteExt, WriteHalf},
net::TcpStream,
};
use crate::encryption::{decrypt, encrypt, generate_encryption_key};
2025-03-08 14:09:57 -05:00
pub(crate) fn read_bool_from<T: std::convert::From<u8> + std::cmp::PartialEq>(x: T) -> bool {
x == T::from(1u8)
}
pub(crate) fn write_bool_as<T: std::convert::From<u8>>(x: &bool) -> T {
if *x { T::from(1u8) } else { T::from(0u8) }
}
pub(crate) fn read_string(byte_stream: Vec<u8>) -> String {
let str = String::from_utf8(byte_stream).unwrap();
str.trim_matches(char::from(0)).to_string() // trim \0 from the end of strings
}
pub(crate) fn write_string(str: &String) -> Vec<u8> {
let c_string = CString::new(&**str).unwrap();
c_string.as_bytes_with_nul().to_vec()
}
#[link(name = "FFXIVBlowfish")]
unsafe extern "C" {
pub fn blowfish_encode(
key: *const u8,
keybytes: u32,
pInput: *const u8,
lSize: u32,
) -> *const u8;
pub fn blowfish_decode(
key: *const u8,
keybytes: u32,
pInput: *const u8,
lSize: u32,
) -> *const u8;
}
2025-03-08 14:09:57 -05:00
#[binrw]
#[brw(repr = u16)]
#[derive(Debug)]
enum ConnectionType {
2025-03-08 15:33:58 -05:00
None = 0x0,
Zone = 0x1,
Chat = 0x2,
2025-03-08 14:09:57 -05:00
Lobby = 0x3,
}
#[binrw]
#[derive(Debug, Clone)]
struct ServiceAccount {
id: u32,
unk1: u32,
index: u32,
#[bw(pad_size_to = 0x44)]
#[br(count = 0x44)]
#[br(map = read_string)]
#[bw(map = write_string)]
name: String,
}
#[binrw]
#[br(import(magic: u16))]
#[derive(Debug, Clone)]
enum IPCOpCode {
// Client->Server IPC
#[br(pre_assert(magic == 0x5u16))]
ClientVersionInfo {
#[brw(pad_before = 18)] // full of nonsense i don't understand yet
#[br(count = 64)]
#[br(map = read_string)]
#[bw(ignore)]
session_id: String,
#[brw(pad_before = 8)] // empty
#[br(count = 128)]
#[br(map = read_string)]
#[bw(ignore)]
version_info: String,
// unknown stuff at the end, it's not completely empty'
},
// Server->Client IPC
//#[br(pre_assert(magic == 0x000C))]
LobbyServiceAccountList {
sequence: u64,
#[brw(pad_before = 4)]
num_service_accounts: u8,
unk1: u8,
#[brw(pad_after = 4)]
unk2: u8,
#[br(count = 8)]
service_accounts: Vec<ServiceAccount>,
},
}
#[binrw]
#[derive(Debug, Clone)]
struct IPCSegment {
2025-03-08 16:39:13 -05:00
unk1: u8,
unk2: u8,
op_code: u16,
#[brw(pad_before = 2)] // empty
server_id: u16,
timestamp: u32,
#[brw(pad_before = 4)]
#[br(args(op_code))]
pub data: IPCOpCode,
}
impl IPCSegment {
fn calc_size(&self) -> u32 {
let header = 16;
return header
+ match self.data {
IPCOpCode::ClientVersionInfo { .. } => todo!(),
IPCOpCode::LobbyServiceAccountList { .. } => 19,
};
}
}
#[binrw]
#[brw(import(size: u32, encryption_key: Option<&[u8]>))]
#[derive(Debug, Clone)]
enum SegmentType {
// Client->Server Packets
#[brw(magic = 0x9u32)]
InitializeEncryption {
#[brw(pad_before = 36)] // empty
#[br(count = 64)]
#[br(map = read_string)]
#[bw(ignore)]
phrase: String,
#[brw(pad_after = 512)] // empty
key: [u8; 4],
},
#[brw(magic = 0x3u32)]
IPC {
#[br(parse_with = decrypt, args(size, encryption_key))]
#[bw(write_with = encrypt, args(size, encryption_key))]
data: IPCSegment,
},
#[brw(magic = 0x7u32)]
KeepAlive { id: u32, timestamp: u32 },
// Server->Client Packets
#[brw(magic = 0x0Au32)]
InitializationEncryptionResponse {
#[br(count = 0x280)]
data: Vec<u8>,
},
#[brw(magic = 0x08u32)]
KeepAliveResponse { id: u32, timestamp: u32 },
}
2025-03-08 14:09:57 -05:00
#[binrw]
#[derive(Debug)]
struct PacketHeader {
unk1: u64,
unk2: u64,
timestamp: u64,
size: u32,
connection_type: ConnectionType,
segment_count: u16,
2025-03-08 14:09:57 -05:00
unk3: u8,
#[br(map = read_bool_from::<u8>)]
#[bw(map = write_bool_as::<u8>)]
compressed: bool,
unk4: u16,
unk5: u32, // iolite says the size after oodle decompression
}
#[binrw]
#[brw(import(encryption_key: Option<&[u8]>))]
#[derive(Debug, Clone)]
struct PacketSegment {
#[bw(calc = self.calc_size())]
size: u32,
source_actor: u32,
target_actor: u32,
#[brw(args(size, encryption_key))]
segment_type: SegmentType,
}
impl PacketSegment {
fn calc_size(&self) -> u32 {
let header = std::mem::size_of::<u32>() * 4;
return header as u32
+ match &self.segment_type {
SegmentType::InitializeEncryption { .. } => 616,
SegmentType::InitializationEncryptionResponse { .. } => 640,
SegmentType::IPC { data } => data.calc_size(),
SegmentType::KeepAlive { .. } => todo!(),
SegmentType::KeepAliveResponse { .. } => 0x8,
};
}
}
#[binrw]
#[brw(import(encryption_key: Option<&[u8]>))]
#[derive(Debug)]
struct Packet {
header: PacketHeader,
#[br(count = header.segment_count, args { inner: (encryption_key,) })]
#[bw(args(encryption_key))]
segments: Vec<PacketSegment>,
2025-03-08 14:09:57 -05:00
}
fn dump(msg: &str, data: &[u8]) {
2025-03-08 13:58:24 -05:00
write("packet.bin", data);
2025-03-08 14:09:57 -05:00
panic!("{msg} Dumped to packet.bin.");
}
async fn send_packet(socket: &mut WriteHalf<TcpStream>, segments: &[PacketSegment], state: &State) {
let timestamp: u64 = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("Failed to get UNIX timestamp!")
.as_millis()
.try_into()
.unwrap();
let mut total_segment_size = 0;
for segment in segments {
total_segment_size += segment.calc_size();
}
let header = PacketHeader {
2025-03-08 16:39:13 -05:00
unk1: 0xE2465DFF41A05252, // wtf?
unk2: 0x75C4997B4D642A7F, // wtf? x2
timestamp,
size: std::mem::size_of::<PacketHeader>() as u32 + total_segment_size,
connection_type: ConnectionType::Lobby,
segment_count: segments.len() as u16,
unk3: 0,
compressed: false,
unk4: 0,
unk5: 0,
};
let packet = Packet {
header,
segments: segments.to_vec(),
};
let mut cursor = Cursor::new(Vec::new());
packet.write_le_args(
&mut cursor,
(state.client_key.as_ref().map(|s: &[u8; 16]| s.as_slice()),),
);
let buffer = cursor.into_inner();
tracing::info!("Wrote response packet to outpacket.bin");
write("outpacket.bin", &buffer);
socket
.write(&buffer)
.await
.expect("Failed to write packet!");
}
// temporary
pub struct State {
pub client_key: Option<[u8; 16]>,
}
2025-03-08 14:09:57 -05:00
pub async fn parse_packet(socket: &mut WriteHalf<TcpStream>, data: &[u8], state: &mut State) {
let mut cursor = Cursor::new(data);
match Packet::read_le_args(
&mut cursor,
(state.client_key.as_ref().map(|s: &[u8; 16]| s.as_slice()),),
) {
Ok(packet) => {
println!("{:#?}", packet);
if packet.header.size as usize != data.len() {
dump(
"Packet size mismatch between what we're given and the header!",
data,
);
}
for segment in &packet.segments {
match &segment.segment_type {
SegmentType::InitializeEncryption { phrase, key } => {
// Generate an encryption key for this client
state.client_key = Some(generate_encryption_key(key, phrase));
2025-03-08 16:39:13 -05:00
let mut data = 0xE0003C2Au32.to_le_bytes().to_vec();
data.resize(0x280, 0);
unsafe {
let result = blowfish_encode(
state.client_key.unwrap().as_ptr(),
16,
data.as_ptr(),
0x280,
);
data = std::slice::from_raw_parts(result, 0x280).to_vec();
}
2025-03-08 16:39:13 -05:00
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::InitializationEncryptionResponse { data },
};
send_packet(socket, &[response_packet], state).await;
}
SegmentType::IPC { data } => {
match &data.data {
IPCOpCode::ClientVersionInfo {
session_id,
version_info,
} => {
tracing::info!("Client {session_id} ({version_info}) logging in!");
let timestamp: u32 = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("Failed to get UNIX timestamp!")
.as_secs()
.try_into()
.unwrap();
// send the client the service account list
let service_accounts = [ServiceAccount {
id: 0x002E4A2B,
unk1: 0,
index: 0,
name: "Test Service Account".to_string(),
}];
let service_account_list = IPCOpCode::LobbyServiceAccountList {
sequence: 0,
num_service_accounts: service_accounts.len() as u8,
unk1: 3,
unk2: 0x99,
service_accounts: service_accounts.to_vec(),
};
let ipc = IPCSegment {
unk1: 0,
unk2: 0,
op_code: 0xC, // FIXME: use enum pls
server_id: 0,
timestamp,
data: service_account_list,
};
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::IPC { data: ipc },
};
send_packet(socket, &[response_packet], state).await;
}
_ => {
panic!("The server is recieving a IPC response packet!")
}
}
}
SegmentType::KeepAlive { id, timestamp } => {
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::KeepAliveResponse {
id: *id,
timestamp: *timestamp,
},
};
send_packet(socket, &[response_packet], state).await;
}
_ => {
panic!("The server is recieving a response packet!")
}
}
}
}
Err(err) => {
println!("{err}");
dump("Failed to parse packet!", data);
}
}
}