2025-03-08 16:10:00 -05:00
|
|
|
use std::{
|
2025-03-08 23:07:55 -05:00
|
|
|
cmp::min,
|
2025-03-08 16:10:00 -05:00
|
|
|
fs::write,
|
|
|
|
io::Cursor,
|
|
|
|
time::{SystemTime, UNIX_EPOCH},
|
|
|
|
};
|
2025-03-08 13:58:24 -05:00
|
|
|
|
2025-03-08 21:54:03 -05:00
|
|
|
use binrw::{BinRead, BinWrite, binrw};
|
2025-03-08 16:10:00 -05:00
|
|
|
use tokio::{
|
|
|
|
io::{AsyncWriteExt, WriteHalf},
|
|
|
|
net::TcpStream,
|
|
|
|
};
|
|
|
|
|
2025-03-08 22:03:28 -05:00
|
|
|
use crate::{
|
2025-03-08 22:05:20 -05:00
|
|
|
common::{read_bool_from, read_string, write_bool_as},
|
2025-03-08 22:03:28 -05:00
|
|
|
encryption::{blowfish_encode, decrypt, encrypt, generate_encryption_key},
|
2025-03-08 22:55:47 -05:00
|
|
|
ipc::{CharacterDetails, IPCOpCode, IPCSegment, IPCStructData, Server, ServiceAccount},
|
2025-03-08 22:03:28 -05:00
|
|
|
};
|
2025-03-08 21:13:00 -05:00
|
|
|
|
2025-03-08 14:09:57 -05:00
|
|
|
#[binrw]
|
|
|
|
#[brw(repr = u16)]
|
|
|
|
#[derive(Debug)]
|
|
|
|
enum ConnectionType {
|
2025-03-08 15:33:58 -05:00
|
|
|
None = 0x0,
|
|
|
|
Zone = 0x1,
|
|
|
|
Chat = 0x2,
|
2025-03-08 14:09:57 -05:00
|
|
|
Lobby = 0x3,
|
|
|
|
}
|
|
|
|
|
2025-03-08 16:08:25 -05:00
|
|
|
#[binrw]
|
2025-03-08 21:53:10 -05:00
|
|
|
#[brw(import(size: u32, encryption_key: Option<&[u8]>))]
|
2025-03-08 16:08:25 -05:00
|
|
|
#[derive(Debug, Clone)]
|
2025-03-08 14:38:31 -05:00
|
|
|
enum SegmentType {
|
2025-03-08 16:08:25 -05:00
|
|
|
// Client->Server Packets
|
2025-03-08 14:38:31 -05:00
|
|
|
#[brw(magic = 0x9u32)]
|
|
|
|
InitializeEncryption {
|
2025-03-08 15:27:28 -05:00
|
|
|
#[brw(pad_before = 36)] // empty
|
2025-03-08 14:38:31 -05:00
|
|
|
#[br(count = 64)]
|
|
|
|
#[br(map = read_string)]
|
|
|
|
#[bw(ignore)]
|
|
|
|
phrase: String,
|
|
|
|
|
2025-03-08 15:27:28 -05:00
|
|
|
#[brw(pad_after = 512)] // empty
|
|
|
|
key: [u8; 4],
|
2025-03-08 14:38:31 -05:00
|
|
|
},
|
2025-03-08 16:08:25 -05:00
|
|
|
#[brw(magic = 0x3u32)]
|
2025-03-08 23:07:55 -05:00
|
|
|
Ipc {
|
2025-03-08 16:08:25 -05:00
|
|
|
#[br(parse_with = decrypt, args(size, encryption_key))]
|
2025-03-08 21:53:10 -05:00
|
|
|
#[bw(write_with = encrypt, args(size, encryption_key))]
|
2025-03-08 16:08:25 -05:00
|
|
|
data: IPCSegment,
|
|
|
|
},
|
2025-03-08 21:23:33 -05:00
|
|
|
#[brw(magic = 0x7u32)]
|
|
|
|
KeepAlive { id: u32, timestamp: u32 },
|
2025-03-08 16:08:25 -05:00
|
|
|
|
|
|
|
// Server->Client Packets
|
2025-03-08 15:27:28 -05:00
|
|
|
#[brw(magic = 0x0Au32)]
|
|
|
|
InitializationEncryptionResponse {
|
|
|
|
#[br(count = 0x280)]
|
2025-03-08 16:10:00 -05:00
|
|
|
data: Vec<u8>,
|
2025-03-08 16:08:25 -05:00
|
|
|
},
|
2025-03-08 21:23:33 -05:00
|
|
|
#[brw(magic = 0x08u32)]
|
|
|
|
KeepAliveResponse { id: u32, timestamp: u32 },
|
2025-03-08 14:38:31 -05:00
|
|
|
}
|
|
|
|
|
2025-03-08 14:09:57 -05:00
|
|
|
#[binrw]
|
|
|
|
#[derive(Debug)]
|
|
|
|
struct PacketHeader {
|
|
|
|
unk1: u64,
|
|
|
|
unk2: u64,
|
|
|
|
timestamp: u64,
|
|
|
|
size: u32,
|
|
|
|
connection_type: ConnectionType,
|
2025-03-08 14:38:31 -05:00
|
|
|
segment_count: u16,
|
2025-03-08 14:09:57 -05:00
|
|
|
unk3: u8,
|
|
|
|
#[br(map = read_bool_from::<u8>)]
|
|
|
|
#[bw(map = write_bool_as::<u8>)]
|
|
|
|
compressed: bool,
|
2025-03-08 14:38:31 -05:00
|
|
|
unk4: u16,
|
|
|
|
unk5: u32, // iolite says the size after oodle decompression
|
|
|
|
}
|
|
|
|
|
|
|
|
#[binrw]
|
2025-03-08 21:53:10 -05:00
|
|
|
#[brw(import(encryption_key: Option<&[u8]>))]
|
2025-03-08 15:27:28 -05:00
|
|
|
#[derive(Debug, Clone)]
|
2025-03-08 14:38:31 -05:00
|
|
|
struct PacketSegment {
|
2025-03-08 15:27:28 -05:00
|
|
|
#[bw(calc = self.calc_size())]
|
2025-03-08 14:38:31 -05:00
|
|
|
size: u32,
|
|
|
|
source_actor: u32,
|
|
|
|
target_actor: u32,
|
2025-03-08 21:53:10 -05:00
|
|
|
#[brw(args(size, encryption_key))]
|
2025-03-08 14:38:31 -05:00
|
|
|
segment_type: SegmentType,
|
|
|
|
}
|
|
|
|
|
2025-03-08 15:27:28 -05:00
|
|
|
impl PacketSegment {
|
|
|
|
fn calc_size(&self) -> u32 {
|
|
|
|
let header = std::mem::size_of::<u32>() * 4;
|
2025-03-08 21:54:03 -05:00
|
|
|
header as u32
|
2025-03-08 16:10:00 -05:00
|
|
|
+ match &self.segment_type {
|
|
|
|
SegmentType::InitializeEncryption { .. } => 616,
|
|
|
|
SegmentType::InitializationEncryptionResponse { .. } => 640,
|
2025-03-08 23:07:55 -05:00
|
|
|
SegmentType::Ipc { data } => data.calc_size(),
|
2025-03-08 21:23:33 -05:00
|
|
|
SegmentType::KeepAlive { .. } => todo!(),
|
|
|
|
SegmentType::KeepAliveResponse { .. } => 0x8,
|
2025-03-08 21:54:03 -05:00
|
|
|
}
|
2025-03-08 15:27:28 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2025-03-08 14:38:31 -05:00
|
|
|
#[binrw]
|
2025-03-08 21:53:10 -05:00
|
|
|
#[brw(import(encryption_key: Option<&[u8]>))]
|
2025-03-08 14:38:31 -05:00
|
|
|
#[derive(Debug)]
|
|
|
|
struct Packet {
|
|
|
|
header: PacketHeader,
|
2025-03-08 16:08:25 -05:00
|
|
|
#[br(count = header.segment_count, args { inner: (encryption_key,) })]
|
2025-03-08 21:53:10 -05:00
|
|
|
#[bw(args(encryption_key))]
|
2025-03-08 14:38:31 -05:00
|
|
|
segments: Vec<PacketSegment>,
|
2025-03-08 14:09:57 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn dump(msg: &str, data: &[u8]) {
|
2025-03-08 23:07:55 -05:00
|
|
|
write("packet.bin", data).unwrap();
|
2025-03-08 14:09:57 -05:00
|
|
|
panic!("{msg} Dumped to packet.bin.");
|
|
|
|
}
|
|
|
|
|
2025-03-08 21:53:10 -05:00
|
|
|
async fn send_packet(socket: &mut WriteHalf<TcpStream>, segments: &[PacketSegment], state: &State) {
|
2025-03-08 15:27:28 -05:00
|
|
|
let timestamp: u64 = SystemTime::now()
|
|
|
|
.duration_since(UNIX_EPOCH)
|
|
|
|
.expect("Failed to get UNIX timestamp!")
|
|
|
|
.as_millis()
|
|
|
|
.try_into()
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
let mut total_segment_size = 0;
|
|
|
|
for segment in segments {
|
|
|
|
total_segment_size += segment.calc_size();
|
|
|
|
}
|
|
|
|
|
|
|
|
let header = PacketHeader {
|
2025-03-08 16:39:13 -05:00
|
|
|
unk1: 0xE2465DFF41A05252, // wtf?
|
|
|
|
unk2: 0x75C4997B4D642A7F, // wtf? x2
|
2025-03-08 15:27:28 -05:00
|
|
|
timestamp,
|
|
|
|
size: std::mem::size_of::<PacketHeader>() as u32 + total_segment_size,
|
|
|
|
connection_type: ConnectionType::Lobby,
|
|
|
|
segment_count: segments.len() as u16,
|
|
|
|
unk3: 0,
|
|
|
|
compressed: false,
|
|
|
|
unk4: 0,
|
|
|
|
unk5: 0,
|
|
|
|
};
|
|
|
|
|
|
|
|
let packet = Packet {
|
|
|
|
header,
|
|
|
|
segments: segments.to_vec(),
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut cursor = Cursor::new(Vec::new());
|
2025-03-08 23:07:55 -05:00
|
|
|
packet
|
|
|
|
.write_le_args(
|
|
|
|
&mut cursor,
|
|
|
|
(state.client_key.as_ref().map(|s: &[u8; 16]| s.as_slice()),),
|
|
|
|
)
|
|
|
|
.unwrap();
|
2025-03-08 15:27:28 -05:00
|
|
|
|
|
|
|
let buffer = cursor.into_inner();
|
|
|
|
|
|
|
|
tracing::info!("Wrote response packet to outpacket.bin");
|
2025-03-08 23:07:55 -05:00
|
|
|
write("outpacket.bin", &buffer).unwrap();
|
2025-03-08 15:27:28 -05:00
|
|
|
|
|
|
|
socket
|
2025-03-08 23:07:55 -05:00
|
|
|
.write_all(&buffer)
|
2025-03-08 15:27:28 -05:00
|
|
|
.await
|
|
|
|
.expect("Failed to write packet!");
|
|
|
|
}
|
|
|
|
|
2025-03-08 16:08:25 -05:00
|
|
|
// temporary
|
|
|
|
pub struct State {
|
2025-03-08 16:10:00 -05:00
|
|
|
pub client_key: Option<[u8; 16]>,
|
2025-03-08 16:08:25 -05:00
|
|
|
}
|
2025-03-08 14:09:57 -05:00
|
|
|
|
2025-03-08 16:08:25 -05:00
|
|
|
pub async fn parse_packet(socket: &mut WriteHalf<TcpStream>, data: &[u8], state: &mut State) {
|
|
|
|
let mut cursor = Cursor::new(data);
|
2025-03-08 15:29:38 -05:00
|
|
|
|
2025-03-08 16:10:00 -05:00
|
|
|
match Packet::read_le_args(
|
|
|
|
&mut cursor,
|
|
|
|
(state.client_key.as_ref().map(|s: &[u8; 16]| s.as_slice()),),
|
|
|
|
) {
|
2025-03-08 15:29:38 -05:00
|
|
|
Ok(packet) => {
|
|
|
|
println!("{:#?}", packet);
|
|
|
|
|
|
|
|
if packet.header.size as usize != data.len() {
|
|
|
|
dump(
|
|
|
|
"Packet size mismatch between what we're given and the header!",
|
2025-03-08 16:10:00 -05:00
|
|
|
data,
|
2025-03-08 15:29:38 -05:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
for segment in &packet.segments {
|
|
|
|
match &segment.segment_type {
|
|
|
|
SegmentType::InitializeEncryption { phrase, key } => {
|
|
|
|
// Generate an encryption key for this client
|
2025-03-08 16:08:25 -05:00
|
|
|
state.client_key = Some(generate_encryption_key(key, phrase));
|
2025-03-08 15:29:38 -05:00
|
|
|
|
2025-03-08 16:39:13 -05:00
|
|
|
let mut data = 0xE0003C2Au32.to_le_bytes().to_vec();
|
2025-03-08 15:29:38 -05:00
|
|
|
data.resize(0x280, 0);
|
|
|
|
|
2025-03-08 21:13:00 -05:00
|
|
|
unsafe {
|
|
|
|
let result = blowfish_encode(
|
|
|
|
state.client_key.unwrap().as_ptr(),
|
|
|
|
16,
|
|
|
|
data.as_ptr(),
|
|
|
|
0x280,
|
|
|
|
);
|
|
|
|
data = std::slice::from_raw_parts(result, 0x280).to_vec();
|
|
|
|
}
|
2025-03-08 16:39:13 -05:00
|
|
|
|
2025-03-08 15:29:38 -05:00
|
|
|
let response_packet = PacketSegment {
|
|
|
|
source_actor: 0,
|
|
|
|
target_actor: 0,
|
2025-03-08 16:10:00 -05:00
|
|
|
segment_type: SegmentType::InitializationEncryptionResponse { data },
|
2025-03-08 15:29:38 -05:00
|
|
|
};
|
2025-03-08 21:53:10 -05:00
|
|
|
send_packet(socket, &[response_packet], state).await;
|
2025-03-08 16:10:00 -05:00
|
|
|
}
|
2025-03-08 23:07:55 -05:00
|
|
|
SegmentType::Ipc { data } => {
|
2025-03-08 21:53:10 -05:00
|
|
|
match &data.data {
|
2025-03-08 22:03:28 -05:00
|
|
|
IPCStructData::ClientVersionInfo {
|
2025-03-08 21:53:10 -05:00
|
|
|
session_id,
|
|
|
|
version_info,
|
|
|
|
} => {
|
|
|
|
tracing::info!("Client {session_id} ({version_info}) logging in!");
|
|
|
|
|
|
|
|
let timestamp: u32 = SystemTime::now()
|
|
|
|
.duration_since(UNIX_EPOCH)
|
|
|
|
.expect("Failed to get UNIX timestamp!")
|
|
|
|
.as_secs()
|
|
|
|
.try_into()
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
// send the client the service account list
|
2025-03-08 22:17:26 -05:00
|
|
|
let mut service_accounts = [ServiceAccount {
|
2025-03-08 21:53:10 -05:00
|
|
|
id: 0x002E4A2B,
|
|
|
|
unk1: 0,
|
|
|
|
index: 0,
|
2025-03-08 22:17:26 -05:00
|
|
|
name: "FINAL FANTASY XIV".to_string(),
|
2025-03-08 22:55:47 -05:00
|
|
|
}]
|
|
|
|
.to_vec();
|
2025-03-08 22:17:26 -05:00
|
|
|
// add any empty boys
|
|
|
|
service_accounts.resize(8, ServiceAccount::default());
|
2025-03-08 21:53:10 -05:00
|
|
|
|
2025-03-08 22:03:28 -05:00
|
|
|
let service_account_list = IPCStructData::LobbyServiceAccountList {
|
2025-03-08 21:53:10 -05:00
|
|
|
sequence: 0,
|
|
|
|
num_service_accounts: service_accounts.len() as u8,
|
|
|
|
unk1: 3,
|
|
|
|
unk2: 0x99,
|
|
|
|
service_accounts: service_accounts.to_vec(),
|
|
|
|
};
|
|
|
|
|
|
|
|
let ipc = IPCSegment {
|
|
|
|
unk1: 0,
|
|
|
|
unk2: 0,
|
2025-03-08 22:03:28 -05:00
|
|
|
op_code: IPCOpCode::LobbyServiceAccountList,
|
2025-03-08 21:53:10 -05:00
|
|
|
server_id: 0,
|
|
|
|
timestamp,
|
|
|
|
data: service_account_list,
|
|
|
|
};
|
|
|
|
|
|
|
|
let response_packet = PacketSegment {
|
|
|
|
source_actor: 0,
|
|
|
|
target_actor: 0,
|
2025-03-08 23:07:55 -05:00
|
|
|
segment_type: SegmentType::Ipc { data: ipc },
|
2025-03-08 21:53:10 -05:00
|
|
|
};
|
|
|
|
send_packet(socket, &[response_packet], state).await;
|
|
|
|
}
|
2025-03-08 22:55:47 -05:00
|
|
|
IPCStructData::RequestCharacterList { sequence } => {
|
|
|
|
tracing::info!("Client is requesting character list...");
|
|
|
|
|
|
|
|
let timestamp: u32 = SystemTime::now()
|
|
|
|
.duration_since(UNIX_EPOCH)
|
|
|
|
.expect("Failed to get UNIX timestamp!")
|
|
|
|
.as_secs()
|
|
|
|
.try_into()
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
let mut packets = Vec::new();
|
|
|
|
// send them the character list
|
|
|
|
{
|
|
|
|
let mut servers = [Server {
|
|
|
|
id: 21,
|
|
|
|
index: 0,
|
|
|
|
flags: 0,
|
|
|
|
icon: 0,
|
|
|
|
name: "KAWARI".to_string(),
|
|
|
|
}]
|
|
|
|
.to_vec();
|
|
|
|
// add any empty boys
|
|
|
|
servers.resize(6, Server::default());
|
|
|
|
|
|
|
|
let lobby_server_list = IPCStructData::LobbyServerList {
|
|
|
|
sequence: 0,
|
|
|
|
unk1: 1,
|
|
|
|
offset: 0,
|
|
|
|
num_servers: 1,
|
|
|
|
servers,
|
|
|
|
};
|
|
|
|
|
|
|
|
let ipc = IPCSegment {
|
|
|
|
unk1: 0,
|
|
|
|
unk2: 0,
|
|
|
|
op_code: IPCOpCode::LobbyServerList,
|
|
|
|
server_id: 0,
|
|
|
|
timestamp,
|
|
|
|
data: lobby_server_list,
|
|
|
|
};
|
|
|
|
|
|
|
|
let response_packet = PacketSegment {
|
|
|
|
source_actor: 0,
|
|
|
|
target_actor: 0,
|
2025-03-08 23:07:55 -05:00
|
|
|
segment_type: SegmentType::Ipc { data: ipc },
|
2025-03-08 22:55:47 -05:00
|
|
|
};
|
|
|
|
packets.push(response_packet);
|
|
|
|
}
|
|
|
|
|
|
|
|
// send them the retainer list
|
|
|
|
{
|
|
|
|
let lobby_retainer_list =
|
|
|
|
IPCStructData::LobbyRetainerList { unk1: 1 };
|
|
|
|
|
|
|
|
let ipc = IPCSegment {
|
|
|
|
unk1: 0,
|
|
|
|
unk2: 0,
|
|
|
|
op_code: IPCOpCode::LobbyRetainerList,
|
|
|
|
server_id: 0,
|
|
|
|
timestamp,
|
|
|
|
data: lobby_retainer_list,
|
|
|
|
};
|
|
|
|
|
|
|
|
let response_packet = PacketSegment {
|
|
|
|
source_actor: 0,
|
|
|
|
target_actor: 0,
|
2025-03-08 23:07:55 -05:00
|
|
|
segment_type: SegmentType::Ipc { data: ipc },
|
2025-03-08 22:55:47 -05:00
|
|
|
};
|
|
|
|
packets.push(response_packet);
|
|
|
|
}
|
|
|
|
|
|
|
|
send_packet(socket, &packets, state).await;
|
|
|
|
|
|
|
|
// now send them the character list
|
|
|
|
{
|
|
|
|
let mut characters = vec![CharacterDetails {
|
|
|
|
id: 0,
|
|
|
|
content_id: 11111111111111111,
|
|
|
|
index: 0,
|
|
|
|
server_id: 21,
|
|
|
|
server_id1: 21,
|
|
|
|
unk1: [0; 16],
|
|
|
|
character_name: "test".to_string(),
|
|
|
|
character_server_name: "test".to_string(),
|
|
|
|
character_server_name1: "test".to_string(),
|
|
|
|
character_detail_json: "test".to_string(),
|
|
|
|
unk2: [0; 20],
|
|
|
|
}];
|
|
|
|
// add any empty boys
|
|
|
|
characters.resize(2, CharacterDetails::default());
|
|
|
|
|
|
|
|
for i in 0..4 {
|
|
|
|
let mut characters_in_packet = Vec::new();
|
|
|
|
for _ in 0..min(characters.len(), 2) {
|
|
|
|
characters_in_packet.push(characters.swap_remove(0));
|
|
|
|
}
|
|
|
|
|
|
|
|
let lobby_character_list = if i == 3 {
|
|
|
|
// On the last packet, add the account-wide information
|
|
|
|
IPCStructData::LobbyCharacterList {
|
|
|
|
sequence: *sequence,
|
|
|
|
counter: (i * 4) + 1, // TODO: why the + 1 here?
|
|
|
|
num_in_packet: characters_in_packet.len() as u8,
|
|
|
|
unk1: 0,
|
|
|
|
unk2: 0,
|
|
|
|
unk3: 0,
|
|
|
|
unk4: 128,
|
|
|
|
unk5: [0; 7],
|
|
|
|
unk6: 0,
|
|
|
|
veteran_rank: 0,
|
|
|
|
unk7: 0,
|
|
|
|
days_subscribed: 0,
|
|
|
|
remaining_days: 0,
|
|
|
|
days_to_next_rank: 0,
|
|
|
|
max_characters_on_world: 20,
|
|
|
|
unk8: 8,
|
|
|
|
entitled_expansion: 4,
|
|
|
|
characters: characters_in_packet,
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
IPCStructData::LobbyCharacterList {
|
|
|
|
sequence: *sequence,
|
|
|
|
counter: i * 4,
|
|
|
|
num_in_packet: characters_in_packet.len() as u8,
|
|
|
|
unk1: 0,
|
|
|
|
unk2: 0,
|
|
|
|
unk3: 0,
|
|
|
|
unk4: 0,
|
|
|
|
unk5: [0; 7],
|
|
|
|
unk6: 0,
|
|
|
|
veteran_rank: 0,
|
|
|
|
unk7: 0,
|
|
|
|
days_subscribed: 0,
|
|
|
|
remaining_days: 0,
|
|
|
|
days_to_next_rank: 0,
|
|
|
|
max_characters_on_world: 0,
|
|
|
|
unk8: 0,
|
|
|
|
entitled_expansion: 0,
|
|
|
|
characters: characters_in_packet,
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let ipc = IPCSegment {
|
|
|
|
unk1: 0,
|
|
|
|
unk2: 0,
|
|
|
|
op_code: IPCOpCode::LobbyCharacterList,
|
|
|
|
server_id: 0,
|
|
|
|
timestamp,
|
|
|
|
data: lobby_character_list,
|
|
|
|
};
|
|
|
|
|
|
|
|
let response_packet = PacketSegment {
|
|
|
|
source_actor: 0,
|
|
|
|
target_actor: 0,
|
2025-03-08 23:07:55 -05:00
|
|
|
segment_type: SegmentType::Ipc { data: ipc },
|
2025-03-08 22:55:47 -05:00
|
|
|
};
|
|
|
|
send_packet(socket, &[response_packet], state).await;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2025-03-08 21:53:10 -05:00
|
|
|
_ => {
|
|
|
|
panic!("The server is recieving a IPC response packet!")
|
|
|
|
}
|
|
|
|
}
|
2025-03-08 16:10:00 -05:00
|
|
|
}
|
2025-03-08 21:23:33 -05:00
|
|
|
SegmentType::KeepAlive { id, timestamp } => {
|
|
|
|
let response_packet = PacketSegment {
|
|
|
|
source_actor: 0,
|
|
|
|
target_actor: 0,
|
|
|
|
segment_type: SegmentType::KeepAliveResponse {
|
|
|
|
id: *id,
|
|
|
|
timestamp: *timestamp,
|
|
|
|
},
|
|
|
|
};
|
2025-03-08 21:53:10 -05:00
|
|
|
send_packet(socket, &[response_packet], state).await;
|
2025-03-08 21:23:33 -05:00
|
|
|
}
|
|
|
|
_ => {
|
|
|
|
panic!("The server is recieving a response packet!")
|
|
|
|
}
|
2025-03-08 15:29:38 -05:00
|
|
|
}
|
2025-03-08 15:27:28 -05:00
|
|
|
}
|
2025-03-08 16:10:00 -05:00
|
|
|
}
|
2025-03-08 15:29:38 -05:00
|
|
|
Err(err) => {
|
|
|
|
println!("{err}");
|
|
|
|
dump("Failed to parse packet!", data);
|
2025-03-08 16:10:00 -05:00
|
|
|
}
|
2025-03-08 15:27:28 -05:00
|
|
|
}
|
|
|
|
}
|