1
Fork 0
mirror of https://github.com/redstrate/Kawari.git synced 2025-04-25 00:17:45 +00:00

Split up and move lobby packet handling

This commit is contained in:
Joshua Goins 2025-03-08 23:24:09 -05:00
parent ca5fa8e8b9
commit 0c5c784d0f
2 changed files with 302 additions and 272 deletions

View file

@ -1,6 +1,13 @@
use kawari::packet::{State, parse_packet}; use std::cmp::min;
use tokio::io::AsyncReadExt; use std::time::{SystemTime, UNIX_EPOCH};
use tokio::net::TcpListener;
use kawari::encryption::{blowfish_encode, generate_encryption_key};
use kawari::ipc::{CharacterDetails, IPCOpCode, IPCSegment, IPCStructData, Server, ServiceAccount};
use kawari::packet::{
PacketSegment, SegmentType, State, parse_packet, send_keep_alive, send_packet,
};
use tokio::io::{AsyncReadExt, WriteHalf};
use tokio::net::{TcpListener, TcpStream};
#[tokio::main] #[tokio::main]
async fn main() { async fn main() {
@ -22,9 +29,269 @@ async fn main() {
let n = read.read(&mut buf).await.expect("Failed to read data!"); let n = read.read(&mut buf).await.expect("Failed to read data!");
if n != 0 { if n != 0 {
parse_packet(&mut write, &buf[..n], &mut state).await; let segments = parse_packet(&buf[..n], &mut state).await;
for segment in &segments {
match &segment.segment_type {
SegmentType::InitializeEncryption { phrase, key } => {
initialize_encryption(&mut write, &mut state, phrase, key).await;
}
SegmentType::Ipc { data } => match &data.data {
IPCStructData::ClientVersionInfo {
session_id,
version_info,
} => {
tracing::info!(
"Client {session_id} ({version_info}) logging in!"
);
send_account_list(&mut write, &state).await;
}
IPCStructData::RequestCharacterList { sequence } => {
tracing::info!("Client is requesting character list...");
send_lobby_info(&mut write, &state, *sequence).await;
}
_ => {
panic!("The server is recieving a IPC response packet!")
}
},
SegmentType::KeepAlive { id, timestamp } => {
send_keep_alive(&mut write, &state, *id, *timestamp).await
}
_ => {
panic!("The server is recieving a response packet!")
}
}
}
} }
} }
}); });
} }
} }
async fn initialize_encryption(
socket: &mut WriteHalf<TcpStream>,
state: &mut State,
phrase: &str,
key: &[u8; 4],
) {
// Generate an encryption key for this client
state.client_key = Some(generate_encryption_key(key, phrase));
let mut data = 0xE0003C2Au32.to_le_bytes().to_vec();
data.resize(0x280, 0);
unsafe {
let result = blowfish_encode(state.client_key.unwrap().as_ptr(), 16, data.as_ptr(), 0x280);
data = std::slice::from_raw_parts(result, 0x280).to_vec();
}
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::InitializationEncryptionResponse { data },
};
send_packet(socket, &[response_packet], state).await;
}
async fn send_account_list(socket: &mut WriteHalf<TcpStream>, state: &State) {
let timestamp: u32 = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("Failed to get UNIX timestamp!")
.as_secs()
.try_into()
.unwrap();
// send the client the service account list
let mut service_accounts = [ServiceAccount {
id: 0x002E4A2B,
unk1: 0,
index: 0,
name: "FINAL FANTASY XIV".to_string(),
}]
.to_vec();
// add any empty boys
service_accounts.resize(8, ServiceAccount::default());
let service_account_list = IPCStructData::LobbyServiceAccountList {
sequence: 0,
num_service_accounts: service_accounts.len() as u8,
unk1: 3,
unk2: 0x99,
service_accounts: service_accounts.to_vec(),
};
let ipc = IPCSegment {
unk1: 0,
unk2: 0,
op_code: IPCOpCode::LobbyServiceAccountList,
server_id: 0,
timestamp,
data: service_account_list,
};
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::Ipc { data: ipc },
};
send_packet(socket, &[response_packet], state).await;
}
async fn send_lobby_info(socket: &mut WriteHalf<TcpStream>, state: &State, sequence: u64) {
let timestamp: u32 = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("Failed to get UNIX timestamp!")
.as_secs()
.try_into()
.unwrap();
let mut packets = Vec::new();
// send them the character list
{
let mut servers = [Server {
id: 21,
index: 0,
flags: 0,
icon: 0,
name: "KAWARI".to_string(),
}]
.to_vec();
// add any empty boys
servers.resize(6, Server::default());
let lobby_server_list = IPCStructData::LobbyServerList {
sequence: 0,
unk1: 1,
offset: 0,
num_servers: 1,
servers,
};
let ipc = IPCSegment {
unk1: 0,
unk2: 0,
op_code: IPCOpCode::LobbyServerList,
server_id: 0,
timestamp,
data: lobby_server_list,
};
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::Ipc { data: ipc },
};
packets.push(response_packet);
}
// send them the retainer list
{
let lobby_retainer_list = IPCStructData::LobbyRetainerList { unk1: 1 };
let ipc = IPCSegment {
unk1: 0,
unk2: 0,
op_code: IPCOpCode::LobbyRetainerList,
server_id: 0,
timestamp,
data: lobby_retainer_list,
};
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::Ipc { data: ipc },
};
packets.push(response_packet);
}
send_packet(socket, &packets, state).await;
// now send them the character list
{
let mut characters = vec![CharacterDetails {
id: 0,
content_id: 11111111111111111,
index: 0,
server_id: 21,
server_id1: 21,
unk1: [0; 16],
character_name: "test".to_string(),
character_server_name: "test".to_string(),
character_server_name1: "test".to_string(),
character_detail_json: "test".to_string(),
unk2: [0; 20],
}];
// add any empty boys
characters.resize(2, CharacterDetails::default());
for i in 0..4 {
let mut characters_in_packet = Vec::new();
for _ in 0..min(characters.len(), 2) {
characters_in_packet.push(characters.swap_remove(0));
}
let lobby_character_list = if i == 3 {
// On the last packet, add the account-wide information
IPCStructData::LobbyCharacterList {
sequence,
counter: (i * 4) + 1, // TODO: why the + 1 here?
num_in_packet: characters_in_packet.len() as u8,
unk1: 0,
unk2: 0,
unk3: 0,
unk4: 128,
unk5: [0; 7],
unk6: 0,
veteran_rank: 0,
unk7: 0,
days_subscribed: 0,
remaining_days: 0,
days_to_next_rank: 0,
max_characters_on_world: 20,
unk8: 8,
entitled_expansion: 4,
characters: characters_in_packet,
}
} else {
IPCStructData::LobbyCharacterList {
sequence,
counter: i * 4,
num_in_packet: characters_in_packet.len() as u8,
unk1: 0,
unk2: 0,
unk3: 0,
unk4: 0,
unk5: [0; 7],
unk6: 0,
veteran_rank: 0,
unk7: 0,
days_subscribed: 0,
remaining_days: 0,
days_to_next_rank: 0,
max_characters_on_world: 0,
unk8: 0,
entitled_expansion: 0,
characters: characters_in_packet,
}
};
let ipc = IPCSegment {
unk1: 0,
unk2: 0,
op_code: IPCOpCode::LobbyCharacterList,
server_id: 0,
timestamp,
data: lobby_character_list,
};
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::Ipc { data: ipc },
};
send_packet(socket, &[response_packet], state).await;
}
}
}

View file

@ -1,5 +1,4 @@
use std::{ use std::{
cmp::min,
fs::write, fs::write,
io::Cursor, io::Cursor,
time::{SystemTime, UNIX_EPOCH}, time::{SystemTime, UNIX_EPOCH},
@ -13,8 +12,8 @@ use tokio::{
use crate::{ use crate::{
common::{read_bool_from, read_string, write_bool_as}, common::{read_bool_from, read_string, write_bool_as},
encryption::{blowfish_encode, decrypt, encrypt, generate_encryption_key}, encryption::{decrypt, encrypt},
ipc::{CharacterDetails, IPCOpCode, IPCSegment, IPCStructData, Server, ServiceAccount}, ipc::IPCSegment,
}; };
#[binrw] #[binrw]
@ -30,7 +29,7 @@ enum ConnectionType {
#[binrw] #[binrw]
#[brw(import(size: u32, encryption_key: Option<&[u8]>))] #[brw(import(size: u32, encryption_key: Option<&[u8]>))]
#[derive(Debug, Clone)] #[derive(Debug, Clone)]
enum SegmentType { pub enum SegmentType {
// Client->Server Packets // Client->Server Packets
#[brw(magic = 0x9u32)] #[brw(magic = 0x9u32)]
InitializeEncryption { InitializeEncryption {
@ -82,13 +81,13 @@ struct PacketHeader {
#[binrw] #[binrw]
#[brw(import(encryption_key: Option<&[u8]>))] #[brw(import(encryption_key: Option<&[u8]>))]
#[derive(Debug, Clone)] #[derive(Debug, Clone)]
struct PacketSegment { pub struct PacketSegment {
#[bw(calc = self.calc_size())] #[bw(calc = self.calc_size())]
size: u32, pub size: u32,
source_actor: u32, pub source_actor: u32,
target_actor: u32, pub target_actor: u32,
#[brw(args(size, encryption_key))] #[brw(args(size, encryption_key))]
segment_type: SegmentType, pub segment_type: SegmentType,
} }
impl PacketSegment { impl PacketSegment {
@ -120,7 +119,11 @@ fn dump(msg: &str, data: &[u8]) {
panic!("{msg} Dumped to packet.bin."); panic!("{msg} Dumped to packet.bin.");
} }
async fn send_packet(socket: &mut WriteHalf<TcpStream>, segments: &[PacketSegment], state: &State) { pub async fn send_packet(
socket: &mut WriteHalf<TcpStream>,
segments: &[PacketSegment],
state: &State,
) {
let timestamp: u64 = SystemTime::now() let timestamp: u64 = SystemTime::now()
.duration_since(UNIX_EPOCH) .duration_since(UNIX_EPOCH)
.expect("Failed to get UNIX timestamp!") .expect("Failed to get UNIX timestamp!")
@ -175,7 +178,7 @@ pub struct State {
pub client_key: Option<[u8; 16]>, pub client_key: Option<[u8; 16]>,
} }
pub async fn parse_packet(socket: &mut WriteHalf<TcpStream>, data: &[u8], state: &mut State) { pub async fn parse_packet(data: &[u8], state: &mut State) -> Vec<PacketSegment> {
let mut cursor = Cursor::new(data); let mut cursor = Cursor::new(data);
match Packet::read_le_args( match Packet::read_le_args(
@ -192,267 +195,27 @@ pub async fn parse_packet(socket: &mut WriteHalf<TcpStream>, data: &[u8], state:
); );
} }
for segment in &packet.segments { packet.segments
match &segment.segment_type {
SegmentType::InitializeEncryption { phrase, key } => {
// Generate an encryption key for this client
state.client_key = Some(generate_encryption_key(key, phrase));
let mut data = 0xE0003C2Au32.to_le_bytes().to_vec();
data.resize(0x280, 0);
unsafe {
let result = blowfish_encode(
state.client_key.unwrap().as_ptr(),
16,
data.as_ptr(),
0x280,
);
data = std::slice::from_raw_parts(result, 0x280).to_vec();
}
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::InitializationEncryptionResponse { data },
};
send_packet(socket, &[response_packet], state).await;
}
SegmentType::Ipc { data } => {
match &data.data {
IPCStructData::ClientVersionInfo {
session_id,
version_info,
} => {
tracing::info!("Client {session_id} ({version_info}) logging in!");
let timestamp: u32 = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("Failed to get UNIX timestamp!")
.as_secs()
.try_into()
.unwrap();
// send the client the service account list
let mut service_accounts = [ServiceAccount {
id: 0x002E4A2B,
unk1: 0,
index: 0,
name: "FINAL FANTASY XIV".to_string(),
}]
.to_vec();
// add any empty boys
service_accounts.resize(8, ServiceAccount::default());
let service_account_list = IPCStructData::LobbyServiceAccountList {
sequence: 0,
num_service_accounts: service_accounts.len() as u8,
unk1: 3,
unk2: 0x99,
service_accounts: service_accounts.to_vec(),
};
let ipc = IPCSegment {
unk1: 0,
unk2: 0,
op_code: IPCOpCode::LobbyServiceAccountList,
server_id: 0,
timestamp,
data: service_account_list,
};
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::Ipc { data: ipc },
};
send_packet(socket, &[response_packet], state).await;
}
IPCStructData::RequestCharacterList { sequence } => {
tracing::info!("Client is requesting character list...");
let timestamp: u32 = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("Failed to get UNIX timestamp!")
.as_secs()
.try_into()
.unwrap();
let mut packets = Vec::new();
// send them the character list
{
let mut servers = [Server {
id: 21,
index: 0,
flags: 0,
icon: 0,
name: "KAWARI".to_string(),
}]
.to_vec();
// add any empty boys
servers.resize(6, Server::default());
let lobby_server_list = IPCStructData::LobbyServerList {
sequence: 0,
unk1: 1,
offset: 0,
num_servers: 1,
servers,
};
let ipc = IPCSegment {
unk1: 0,
unk2: 0,
op_code: IPCOpCode::LobbyServerList,
server_id: 0,
timestamp,
data: lobby_server_list,
};
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::Ipc { data: ipc },
};
packets.push(response_packet);
}
// send them the retainer list
{
let lobby_retainer_list =
IPCStructData::LobbyRetainerList { unk1: 1 };
let ipc = IPCSegment {
unk1: 0,
unk2: 0,
op_code: IPCOpCode::LobbyRetainerList,
server_id: 0,
timestamp,
data: lobby_retainer_list,
};
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::Ipc { data: ipc },
};
packets.push(response_packet);
}
send_packet(socket, &packets, state).await;
// now send them the character list
{
let mut characters = vec![CharacterDetails {
id: 0,
content_id: 11111111111111111,
index: 0,
server_id: 21,
server_id1: 21,
unk1: [0; 16],
character_name: "test".to_string(),
character_server_name: "test".to_string(),
character_server_name1: "test".to_string(),
character_detail_json: "test".to_string(),
unk2: [0; 20],
}];
// add any empty boys
characters.resize(2, CharacterDetails::default());
for i in 0..4 {
let mut characters_in_packet = Vec::new();
for _ in 0..min(characters.len(), 2) {
characters_in_packet.push(characters.swap_remove(0));
}
let lobby_character_list = if i == 3 {
// On the last packet, add the account-wide information
IPCStructData::LobbyCharacterList {
sequence: *sequence,
counter: (i * 4) + 1, // TODO: why the + 1 here?
num_in_packet: characters_in_packet.len() as u8,
unk1: 0,
unk2: 0,
unk3: 0,
unk4: 128,
unk5: [0; 7],
unk6: 0,
veteran_rank: 0,
unk7: 0,
days_subscribed: 0,
remaining_days: 0,
days_to_next_rank: 0,
max_characters_on_world: 20,
unk8: 8,
entitled_expansion: 4,
characters: characters_in_packet,
}
} else {
IPCStructData::LobbyCharacterList {
sequence: *sequence,
counter: i * 4,
num_in_packet: characters_in_packet.len() as u8,
unk1: 0,
unk2: 0,
unk3: 0,
unk4: 0,
unk5: [0; 7],
unk6: 0,
veteran_rank: 0,
unk7: 0,
days_subscribed: 0,
remaining_days: 0,
days_to_next_rank: 0,
max_characters_on_world: 0,
unk8: 0,
entitled_expansion: 0,
characters: characters_in_packet,
}
};
let ipc = IPCSegment {
unk1: 0,
unk2: 0,
op_code: IPCOpCode::LobbyCharacterList,
server_id: 0,
timestamp,
data: lobby_character_list,
};
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::Ipc { data: ipc },
};
send_packet(socket, &[response_packet], state).await;
}
}
}
_ => {
panic!("The server is recieving a IPC response packet!")
}
}
}
SegmentType::KeepAlive { id, timestamp } => {
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::KeepAliveResponse {
id: *id,
timestamp: *timestamp,
},
};
send_packet(socket, &[response_packet], state).await;
}
_ => {
panic!("The server is recieving a response packet!")
}
}
}
} }
Err(err) => { Err(err) => {
println!("{err}"); println!("{err}");
dump("Failed to parse packet!", data); dump("Failed to parse packet!", data);
Vec::new()
} }
} }
} }
pub async fn send_keep_alive(
socket: &mut WriteHalf<TcpStream>,
state: &State,
id: u32,
timestamp: u32,
) {
let response_packet = PacketSegment {
source_actor: 0,
target_actor: 0,
segment_type: SegmentType::KeepAliveResponse { id, timestamp },
};
send_packet(socket, &[response_packet], state).await;
}