1
1
mirror of https://github.com/OpenDiablo2/OpenDiablo2 synced 2024-11-17 01:51:14 -05:00
OpenDiablo2/mpq/MPQ.go

299 lines
8.4 KiB
Go
Raw Normal View History

2019-11-06 22:12:15 -05:00
package mpq
2019-10-24 09:31:59 -04:00
import (
2019-11-07 17:35:25 -05:00
"bufio"
2019-10-24 09:31:59 -04:00
"encoding/binary"
"errors"
"log"
"os"
"path"
"strings"
2019-11-06 22:12:15 -05:00
"github.com/OpenDiablo2/OpenDiablo2/resourcepaths"
2019-10-24 09:31:59 -04:00
)
// MPQ represents an MPQ archive
type MPQ struct {
FileName string
2019-10-24 09:31:59 -04:00
File *os.File
2019-10-25 19:37:04 -04:00
HashTableEntries []HashTableEntry
BlockTableEntries []BlockTableEntry
Data Data
2019-10-24 09:31:59 -04:00
}
2019-10-25 19:37:04 -04:00
// Data Represents a MPQ file
type Data struct {
2019-10-24 09:31:59 -04:00
Magic [4]byte
HeaderSize uint32
ArchiveSize uint32
FormatVersion uint16
BlockSize uint16
HashTableOffset uint32
BlockTableOffset uint32
HashTableEntries uint32
BlockTableEntries uint32
}
2019-10-25 19:37:04 -04:00
// HashTableEntry represents a hashed file entry in the MPQ file
type HashTableEntry struct { // 16 bytes
2019-10-24 09:31:59 -04:00
NamePartA uint32
NamePartB uint32
Locale uint16
Platform uint16
BlockIndex uint32
}
type PatchInfo struct {
Length uint32 // Length of patch info header, in bytes
Flags uint32 // Flags. 0x80000000 = MD5 (?)
DataSize uint32 // Uncompressed size of the patch file
Md5 [16]byte // MD5 of the entire patch file after decompression
}
2019-10-25 19:37:04 -04:00
// FileFlag represents flags for a file record in the MPQ archive
type FileFlag uint32
2019-10-24 09:31:59 -04:00
const (
2019-10-26 20:09:33 -04:00
// FileImplode - File is compressed using PKWARE Data compression library
FileImplode FileFlag = 0x00000100
// FileCompress - File is compressed using combination of compression methods
FileCompress FileFlag = 0x00000200
// FileEncrypted - The file is encrypted
FileEncrypted FileFlag = 0x00010000
// FileFixKey - The decryption key for the file is altered according to the position of the file in the archive
FileFixKey FileFlag = 0x00020000
// FilePatchFile - The file contains incremental patch for an existing file in base MPQ
FilePatchFile FileFlag = 0x00100000
// FileSingleUnit - Instead of being divided to 0x1000-bytes blocks, the file is stored as single unit
FileSingleUnit FileFlag = 0x01000000
2019-10-24 09:31:59 -04:00
// FileDeleteMarker - File is a deletion marker, indicating that the file no longer exists. This is used to allow patch
// archives to delete files present in lower-priority archives in the search chain. The file usually
// has length of 0 or 1 byte and its name is a hash
2019-10-25 19:37:04 -04:00
FileDeleteMarker FileFlag = 0x02000000
2019-10-26 20:09:33 -04:00
// FileSectorCrc - File has checksums for each sector. Ignored if file is not compressed or imploded.
FileSectorCrc FileFlag = 0x04000000
// FileExists - Set if file exists, reset when the file was deleted
FileExists FileFlag = 0x80000000
2019-10-24 09:31:59 -04:00
)
2019-10-25 19:37:04 -04:00
// BlockTableEntry represents an entry in the block table
type BlockTableEntry struct { // 16 bytes
2019-10-24 09:31:59 -04:00
FilePosition uint32
CompressedFileSize uint32
UncompressedFileSize uint32
2019-10-25 19:37:04 -04:00
Flags FileFlag
2019-10-24 09:31:59 -04:00
// Local Stuff...
FileName string
EncryptionSeed uint32
}
// HasFlag returns true if the specified flag is present
2019-10-25 19:37:04 -04:00
func (v BlockTableEntry) HasFlag(flag FileFlag) bool {
2019-10-24 09:31:59 -04:00
return (v.Flags & flag) != 0
}
2019-10-25 19:37:04 -04:00
// Load loads an MPQ file and returns a MPQ structure
func Load(fileName string) (MPQ, error) {
result := MPQ{
FileName: fileName,
}
2019-10-24 09:31:59 -04:00
file, err := os.Open(fileName)
if err != nil {
return MPQ{}, err
}
result.File = file
err = result.readHeader()
if err != nil {
return MPQ{}, err
}
return result, nil
}
func (v *MPQ) readHeader() error {
err := binary.Read(v.File, binary.LittleEndian, &v.Data)
if err != nil {
return err
}
if string(v.Data.Magic[:]) != "MPQ\x1A" {
return errors.New("invalid mpq header")
}
v.loadHashTable()
v.loadBlockTable()
return nil
}
func (v *MPQ) loadHashTable() {
2019-10-26 20:09:33 -04:00
_, err := v.File.Seek(int64(v.Data.HashTableOffset), 0)
if err != nil {
log.Panic(err)
}
2019-10-24 09:31:59 -04:00
hashData := make([]uint32, v.Data.HashTableEntries*4)
2019-10-26 20:09:33 -04:00
err = binary.Read(v.File, binary.LittleEndian, &hashData)
if err != nil {
log.Panic(err)
}
2019-10-24 09:31:59 -04:00
decrypt(hashData, hashString("(hash table)", 3))
for i := uint32(0); i < v.Data.HashTableEntries; i++ {
2019-10-25 19:37:04 -04:00
v.HashTableEntries = append(v.HashTableEntries, HashTableEntry{
2019-10-24 09:31:59 -04:00
NamePartA: hashData[i*4],
NamePartB: hashData[(i*4)+1],
// TODO: Verify that we're grabbing the right high/lo word for the vars below
Locale: uint16(hashData[(i*4)+2] >> 16),
Platform: uint16(hashData[(i*4)+2] & 0xFFFF),
BlockIndex: hashData[(i*4)+3],
})
}
}
func (v *MPQ) loadBlockTable() {
2019-10-26 20:09:33 -04:00
_, err := v.File.Seek(int64(v.Data.BlockTableOffset), 0)
if err != nil {
log.Panic(err)
}
2019-10-24 09:31:59 -04:00
blockData := make([]uint32, v.Data.BlockTableEntries*4)
2019-10-26 20:09:33 -04:00
err = binary.Read(v.File, binary.LittleEndian, &blockData)
if err != nil {
log.Panic(err)
}
2019-10-24 09:31:59 -04:00
decrypt(blockData, hashString("(block table)", 3))
for i := uint32(0); i < v.Data.BlockTableEntries; i++ {
2019-10-25 19:37:04 -04:00
v.BlockTableEntries = append(v.BlockTableEntries, BlockTableEntry{
2019-10-24 09:31:59 -04:00
FilePosition: blockData[(i * 4)],
CompressedFileSize: blockData[(i*4)+1],
UncompressedFileSize: blockData[(i*4)+2],
2019-10-25 19:37:04 -04:00
Flags: FileFlag(blockData[(i*4)+3]),
2019-10-24 09:31:59 -04:00
})
}
}
func decrypt(data []uint32, seed uint32) {
seed2 := uint32(0xeeeeeeee)
for i := 0; i < len(data); i++ {
seed2 += CryptoBuffer[0x400+(seed&0xff)]
result := data[i]
result ^= seed + seed2
seed = ((^seed << 21) + 0x11111111) | (seed >> 11)
seed2 = result + seed2 + (seed2 << 5) + 3
data[i] = result
}
}
func decryptBytes(data []byte, seed uint32) {
seed2 := uint32(0xEEEEEEEE)
for i := 0; i < len(data)-3; i += 4 {
seed2 += CryptoBuffer[0x400+(seed&0xFF)]
result := binary.LittleEndian.Uint32(data[i : i+4])
result ^= seed + seed2
seed = ((^seed << 21) + 0x11111111) | (seed >> 11)
seed2 = result + seed2 + (seed2 << 5) + 3
data[i+0] = uint8(result & 0xff)
data[i+1] = uint8((result >> 8) & 0xff)
data[i+2] = uint8((result >> 16) & 0xff)
data[i+3] = uint8((result >> 24) & 0xff)
}
}
func hashString(key string, hashType uint32) uint32 {
seed1 := uint32(0x7FED7FED)
seed2 := uint32(0xEEEEEEEE)
/* prepare seeds. */
for _, char := range strings.ToUpper(key) {
seed1 = CryptoBuffer[(hashType*0x100)+uint32(char)] ^ (seed1 + seed2)
seed2 = uint32(char) + seed1 + seed2 + (seed2 << 5) + 3
}
return seed1
}
2019-10-25 19:37:04 -04:00
func (v MPQ) getFileHashEntry(fileName string) (HashTableEntry, error) {
2019-10-24 09:31:59 -04:00
hashA := hashString(fileName, 1)
hashB := hashString(fileName, 2)
for idx, hashEntry := range v.HashTableEntries {
if hashEntry.NamePartA != hashA || hashEntry.NamePartB != hashB {
continue
}
return v.HashTableEntries[idx], nil
}
2019-10-25 19:37:04 -04:00
return HashTableEntry{}, errors.New("file not found")
2019-10-24 09:31:59 -04:00
}
2019-10-25 19:37:04 -04:00
// GetFileBlockData gets a block table entry
func (v MPQ) GetFileBlockData(fileName string) (BlockTableEntry, error) {
2019-11-06 22:12:15 -05:00
fileName = strings.ReplaceAll(fileName, "{LANG}", resourcepaths.LanguageCode)
2019-10-24 09:31:59 -04:00
fileEntry, err := v.getFileHashEntry(fileName)
if err != nil || fileEntry.BlockIndex >= uint32(len(v.BlockTableEntries)) {
2019-10-25 19:37:04 -04:00
return BlockTableEntry{}, err
2019-10-24 09:31:59 -04:00
}
return v.BlockTableEntries[fileEntry.BlockIndex], nil
}
2019-10-26 20:09:33 -04:00
// Close closes the MPQ file
2019-10-24 09:31:59 -04:00
func (v *MPQ) Close() {
2019-10-26 20:09:33 -04:00
err := v.File.Close()
if err != nil {
log.Panic(err)
}
2019-10-24 09:31:59 -04:00
}
func (v MPQ) FileExists(fileName string) bool {
_, err := v.getFileHashEntry(fileName)
return err == nil
}
2019-10-24 09:31:59 -04:00
// ReadFile reads a file from the MPQ and returns a memory stream
func (v MPQ) ReadFile(fileName string) ([]byte, error) {
2019-11-06 22:12:15 -05:00
fileName = strings.ReplaceAll(fileName, "{LANG}", resourcepaths.LanguageCode)
2019-10-25 19:37:04 -04:00
fileBlockData, err := v.GetFileBlockData(fileName)
2019-10-24 09:31:59 -04:00
if err != nil {
return []byte{}, err
2019-10-24 09:31:59 -04:00
}
fileBlockData.FileName = strings.ToLower(fileName)
fileBlockData.calculateEncryptionSeed()
2019-10-25 19:37:04 -04:00
mpqStream := CreateStream(v, fileBlockData, fileName)
2019-10-24 09:31:59 -04:00
buffer := make([]byte, fileBlockData.UncompressedFileSize)
mpqStream.Read(buffer, 0, fileBlockData.UncompressedFileSize)
return buffer, nil
}
// ReadTextFile reads a file and returns it as a string
func (v MPQ) ReadTextFile(fileName string) (string, error) {
2019-11-06 22:12:15 -05:00
fileName = strings.ReplaceAll(fileName, "{LANG}", resourcepaths.LanguageCode)
2019-10-24 09:31:59 -04:00
data, err := v.ReadFile(fileName)
if err != nil {
return "", err
}
return string(data), nil
}
2019-10-25 19:37:04 -04:00
func (v *BlockTableEntry) calculateEncryptionSeed() {
2019-10-24 09:31:59 -04:00
fileName := path.Base(v.FileName)
v.EncryptionSeed = hashString(fileName, 3)
2019-10-26 20:09:33 -04:00
if !v.HasFlag(FileFixKey) {
2019-10-24 09:31:59 -04:00
return
}
v.EncryptionSeed = (v.EncryptionSeed + v.FilePosition) ^ v.UncompressedFileSize
}
// GetFileList returns the list of files in this MPQ
func (v MPQ) GetFileList() ([]string, error) {
data, err := v.ReadFile("(listfile)")
if err != nil {
return nil, err
}
2019-11-07 17:35:25 -05:00
raw := strings.TrimRight(string(data), "\x00")
s := bufio.NewScanner(strings.NewReader(raw))
var filePaths []string
for s.Scan() {
filePath := s.Text()
filePaths = append(filePaths, filePath)
}
return filePaths, nil
2019-10-24 09:31:59 -04:00
}