use std::{ fs::write, io::Cursor, time::{SystemTime, UNIX_EPOCH}, }; use binrw::{BinRead, BinWrite, binrw}; use tokio::{io::AsyncWriteExt, net::TcpStream}; use crate::{ common::read_string, compression::decompress, encryption::{decrypt, encrypt}, ipc::IPCSegment, oodle::FFXIVOodle, }; #[binrw] #[brw(repr = u16)] #[derive(Debug)] pub enum ConnectionType { None = 0x0, Zone = 0x1, Chat = 0x2, Lobby = 0x3, } #[binrw] #[brw(import(size: u32, encryption_key: Option<&[u8]>))] #[derive(Debug, Clone)] pub enum SegmentType { // Client->Server Packets #[brw(magic = 0x1u32)] InitializeSession { #[brw(pad_before = 4)] #[brw(pad_after = 48)] // TODO: probably not empty? player_id: u32, }, #[brw(magic = 0x9u32)] InitializeEncryption { #[brw(pad_before = 36)] // empty #[brw(pad_size_to = 32)] #[br(count = 32)] #[br(map = read_string)] #[bw(ignore)] phrase: String, #[brw(pad_before = 32)] #[brw(pad_after = 512)] // empty key: [u8; 4], }, #[brw(magic = 0x3u32)] Ipc { #[br(parse_with = decrypt, args(size, encryption_key))] #[bw(write_with = encrypt, args(size, encryption_key))] data: IPCSegment, }, #[brw(magic = 0x7u32)] KeepAlive { id: u32, timestamp: u32 }, // Server->Client Packets #[brw(magic = 0xAu32)] InitializationEncryptionResponse { #[br(count = 0x280)] #[brw(pad_size_to = 640)] data: Vec, }, #[brw(magic = 0x8u32)] KeepAliveResponse { id: u32, timestamp: u32 }, #[brw(magic = 0x2u32)] ZoneInitialize { player_id: u32, #[brw(pad_after = 32)] timestamp: u32, }, } #[binrw] #[brw(repr = u8)] #[derive(Debug, PartialEq)] pub enum CompressionType { Uncompressed = 0, Oodle = 2, } #[binrw] #[derive(Debug)] pub struct PacketHeader { pub unk1: u64, pub unk2: u64, pub timestamp: u64, pub size: u32, pub connection_type: ConnectionType, pub segment_count: u16, pub unk3: u8, pub compression_type: CompressionType, pub unk4: u16, pub uncompressed_size: u32, } #[binrw] #[brw(import(encryption_key: Option<&[u8]>))] #[derive(Debug, Clone)] pub struct PacketSegment { #[bw(calc = self.calc_size())] #[br(dbg)] pub size: u32, #[br(dbg)] pub source_actor: u32, #[br(dbg)] pub target_actor: u32, #[brw(args(size, encryption_key))] #[br(dbg)] pub segment_type: SegmentType, } impl PacketSegment { fn calc_size(&self) -> u32 { let header = std::mem::size_of::() * 4; header as u32 + match &self.segment_type { SegmentType::InitializeEncryption { .. } => 616, SegmentType::InitializationEncryptionResponse { .. } => 640, SegmentType::Ipc { data } => data.calc_size(), SegmentType::KeepAlive { .. } => 0x8, SegmentType::KeepAliveResponse { .. } => 0x8, SegmentType::ZoneInitialize { .. } => 40, SegmentType::InitializeSession { .. } => todo!(), } } } #[binrw] #[brw(import(oodle: &mut FFXIVOodle, encryption_key: Option<&[u8]>))] #[derive(Debug)] struct Packet { #[br(dbg)] header: PacketHeader, #[bw(args(encryption_key))] #[br(parse_with = decompress, args(oodle, &header, encryption_key,))] #[br(dbg)] segments: Vec, } fn dump(msg: &str, data: &[u8]) { write("packet.bin", data).unwrap(); panic!("{msg} Dumped to packet.bin."); } pub async fn send_packet( socket: &mut TcpStream, segments: &[PacketSegment], state: &mut State, compression_type: CompressionType, ) { let timestamp: u64 = SystemTime::now() .duration_since(UNIX_EPOCH) .expect("Failed to get UNIX timestamp!") .as_millis() .try_into() .unwrap(); let mut segments_buffer = Cursor::new(Vec::new()); for segment in segments { segment .write_le_args( &mut segments_buffer, (state.client_key.as_ref().map(|s: &[u8; 16]| s.as_slice()),), ) .unwrap(); } let segments_buffer = segments_buffer.into_inner(); let mut uncompressed_size = 0; let data = match compression_type { CompressionType::Uncompressed => segments_buffer, CompressionType::Oodle => { uncompressed_size = segments_buffer.len(); state.clientbound_oodle.encode(segments_buffer) } }; let size = std::mem::size_of::() + data.len(); let header = PacketHeader { unk1: 0xE2465DFF41A05252, // wtf? unk2: 0x75C4997B4D642A7F, // wtf? x2 timestamp, size: size as u32, connection_type: ConnectionType::Lobby, segment_count: segments.len() as u16, unk3: 0, compression_type, unk4: 0, uncompressed_size: uncompressed_size as u32, }; let mut cursor = Cursor::new(Vec::new()); header.write_le(&mut cursor).unwrap(); std::io::Write::write_all(&mut cursor, &data).unwrap(); let buffer = cursor.into_inner(); tracing::info!("Wrote response packet to outpacket.bin"); write("outpacket.bin", &buffer).unwrap(); socket .write_all(&buffer) .await .expect("Failed to write packet!"); } // temporary pub struct State { pub client_key: Option<[u8; 16]>, pub session_id: Option, pub serverbound_oodle: FFXIVOodle, pub clientbound_oodle: FFXIVOodle, } pub async fn parse_packet(data: &[u8], state: &mut State) -> (Vec, ConnectionType) { let mut cursor = Cursor::new(data); match Packet::read_le_args( &mut cursor, ( &mut state.serverbound_oodle, state.client_key.as_ref().map(|s: &[u8; 16]| s.as_slice()), ), ) { Ok(packet) => { println!("{:#?}", packet); // don't really think this works like I think it does' /*if packet.header.size as usize != data.len() { dump( "Packet size mismatch between what we're given and the header!", data, ); }*/ (packet.segments, packet.header.connection_type) } Err(err) => { println!("{err}"); dump("Failed to parse packet!", data); (Vec::new(), ConnectionType::None) } } } pub async fn send_keep_alive(socket: &mut TcpStream, state: &mut State, id: u32, timestamp: u32) { let response_packet = PacketSegment { source_actor: 0, target_actor: 0, segment_type: SegmentType::KeepAliveResponse { id, timestamp }, }; send_packet( socket, &[response_packet], state, CompressionType::Uncompressed, ) .await; } #[cfg(test)] mod tests { use super::*; /// Ensure that the packet size as reported matches up with what we write #[test] fn test_packet_sizes() { let packet_types = [ SegmentType::InitializeEncryption { phrase: String::new(), key: [0; 4], }, SegmentType::InitializationEncryptionResponse { data: Vec::new() }, SegmentType::KeepAlive { id: 0, timestamp: 0, }, SegmentType::KeepAliveResponse { id: 0, timestamp: 0, }, ]; for packet in &packet_types { let mut cursor = Cursor::new(Vec::new()); let packet_segment = PacketSegment { source_actor: 0, target_actor: 0, segment_type: packet.clone(), }; packet_segment.write_le(&mut cursor).unwrap(); let buffer = cursor.into_inner(); assert_eq!(buffer.len(), packet_segment.calc_size() as usize); } } }