2019-11-06 22:12:15 -05:00
|
|
|
package mpq
|
2019-10-24 09:31:59 -04:00
|
|
|
|
|
|
|
import (
|
2019-11-07 17:35:25 -05:00
|
|
|
"bufio"
|
2019-10-24 09:31:59 -04:00
|
|
|
"encoding/binary"
|
|
|
|
"errors"
|
|
|
|
"log"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"strings"
|
2019-11-01 00:21:39 -04:00
|
|
|
|
2019-11-06 22:12:15 -05:00
|
|
|
"github.com/OpenDiablo2/OpenDiablo2/resourcepaths"
|
2019-10-24 09:31:59 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// MPQ represents an MPQ archive
|
|
|
|
type MPQ struct {
|
2019-10-31 21:17:13 -04:00
|
|
|
FileName string
|
2019-10-24 09:31:59 -04:00
|
|
|
File *os.File
|
2019-10-25 19:37:04 -04:00
|
|
|
HashTableEntries []HashTableEntry
|
|
|
|
BlockTableEntries []BlockTableEntry
|
|
|
|
Data Data
|
2019-10-24 09:31:59 -04:00
|
|
|
}
|
|
|
|
|
2019-10-25 19:37:04 -04:00
|
|
|
// Data Represents a MPQ file
|
|
|
|
type Data struct {
|
2019-10-24 09:31:59 -04:00
|
|
|
Magic [4]byte
|
|
|
|
HeaderSize uint32
|
|
|
|
ArchiveSize uint32
|
|
|
|
FormatVersion uint16
|
|
|
|
BlockSize uint16
|
|
|
|
HashTableOffset uint32
|
|
|
|
BlockTableOffset uint32
|
|
|
|
HashTableEntries uint32
|
|
|
|
BlockTableEntries uint32
|
|
|
|
}
|
|
|
|
|
2019-10-25 19:37:04 -04:00
|
|
|
// HashTableEntry represents a hashed file entry in the MPQ file
|
|
|
|
type HashTableEntry struct { // 16 bytes
|
2019-10-24 09:31:59 -04:00
|
|
|
NamePartA uint32
|
|
|
|
NamePartB uint32
|
|
|
|
Locale uint16
|
|
|
|
Platform uint16
|
|
|
|
BlockIndex uint32
|
|
|
|
}
|
|
|
|
|
2019-11-01 00:21:39 -04:00
|
|
|
type PatchInfo struct {
|
|
|
|
Length uint32 // Length of patch info header, in bytes
|
|
|
|
Flags uint32 // Flags. 0x80000000 = MD5 (?)
|
|
|
|
DataSize uint32 // Uncompressed size of the patch file
|
|
|
|
Md5 [16]byte // MD5 of the entire patch file after decompression
|
|
|
|
}
|
|
|
|
|
2019-10-25 19:37:04 -04:00
|
|
|
// FileFlag represents flags for a file record in the MPQ archive
|
|
|
|
type FileFlag uint32
|
2019-10-24 09:31:59 -04:00
|
|
|
|
|
|
|
const (
|
2019-10-26 20:09:33 -04:00
|
|
|
// FileImplode - File is compressed using PKWARE Data compression library
|
|
|
|
FileImplode FileFlag = 0x00000100
|
|
|
|
// FileCompress - File is compressed using combination of compression methods
|
|
|
|
FileCompress FileFlag = 0x00000200
|
|
|
|
// FileEncrypted - The file is encrypted
|
|
|
|
FileEncrypted FileFlag = 0x00010000
|
|
|
|
// FileFixKey - The decryption key for the file is altered according to the position of the file in the archive
|
|
|
|
FileFixKey FileFlag = 0x00020000
|
|
|
|
// FilePatchFile - The file contains incremental patch for an existing file in base MPQ
|
|
|
|
FilePatchFile FileFlag = 0x00100000
|
|
|
|
// FileSingleUnit - Instead of being divided to 0x1000-bytes blocks, the file is stored as single unit
|
|
|
|
FileSingleUnit FileFlag = 0x01000000
|
2019-10-24 09:31:59 -04:00
|
|
|
// FileDeleteMarker - File is a deletion marker, indicating that the file no longer exists. This is used to allow patch
|
|
|
|
// archives to delete files present in lower-priority archives in the search chain. The file usually
|
|
|
|
// has length of 0 or 1 byte and its name is a hash
|
2019-10-25 19:37:04 -04:00
|
|
|
FileDeleteMarker FileFlag = 0x02000000
|
2019-10-26 20:09:33 -04:00
|
|
|
// FileSectorCrc - File has checksums for each sector. Ignored if file is not compressed or imploded.
|
|
|
|
FileSectorCrc FileFlag = 0x04000000
|
|
|
|
// FileExists - Set if file exists, reset when the file was deleted
|
|
|
|
FileExists FileFlag = 0x80000000
|
2019-10-24 09:31:59 -04:00
|
|
|
)
|
|
|
|
|
2019-10-25 19:37:04 -04:00
|
|
|
// BlockTableEntry represents an entry in the block table
|
|
|
|
type BlockTableEntry struct { // 16 bytes
|
2019-10-24 09:31:59 -04:00
|
|
|
FilePosition uint32
|
|
|
|
CompressedFileSize uint32
|
|
|
|
UncompressedFileSize uint32
|
2019-10-25 19:37:04 -04:00
|
|
|
Flags FileFlag
|
2019-10-24 09:31:59 -04:00
|
|
|
// Local Stuff...
|
|
|
|
FileName string
|
|
|
|
EncryptionSeed uint32
|
|
|
|
}
|
|
|
|
|
|
|
|
// HasFlag returns true if the specified flag is present
|
2019-10-25 19:37:04 -04:00
|
|
|
func (v BlockTableEntry) HasFlag(flag FileFlag) bool {
|
2019-10-24 09:31:59 -04:00
|
|
|
return (v.Flags & flag) != 0
|
|
|
|
}
|
|
|
|
|
2019-10-25 19:37:04 -04:00
|
|
|
// Load loads an MPQ file and returns a MPQ structure
|
|
|
|
func Load(fileName string) (MPQ, error) {
|
2019-10-31 21:17:13 -04:00
|
|
|
result := MPQ{
|
|
|
|
FileName: fileName,
|
|
|
|
}
|
2019-10-24 09:31:59 -04:00
|
|
|
file, err := os.Open(fileName)
|
|
|
|
if err != nil {
|
|
|
|
return MPQ{}, err
|
|
|
|
}
|
|
|
|
result.File = file
|
|
|
|
err = result.readHeader()
|
|
|
|
if err != nil {
|
|
|
|
return MPQ{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *MPQ) readHeader() error {
|
|
|
|
err := binary.Read(v.File, binary.LittleEndian, &v.Data)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if string(v.Data.Magic[:]) != "MPQ\x1A" {
|
|
|
|
return errors.New("invalid mpq header")
|
|
|
|
}
|
|
|
|
v.loadHashTable()
|
|
|
|
v.loadBlockTable()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *MPQ) loadHashTable() {
|
2019-10-26 20:09:33 -04:00
|
|
|
_, err := v.File.Seek(int64(v.Data.HashTableOffset), 0)
|
|
|
|
if err != nil {
|
|
|
|
log.Panic(err)
|
|
|
|
}
|
2019-10-24 09:31:59 -04:00
|
|
|
hashData := make([]uint32, v.Data.HashTableEntries*4)
|
2019-10-26 20:09:33 -04:00
|
|
|
err = binary.Read(v.File, binary.LittleEndian, &hashData)
|
|
|
|
if err != nil {
|
|
|
|
log.Panic(err)
|
|
|
|
}
|
2019-10-24 09:31:59 -04:00
|
|
|
decrypt(hashData, hashString("(hash table)", 3))
|
|
|
|
for i := uint32(0); i < v.Data.HashTableEntries; i++ {
|
2019-10-25 19:37:04 -04:00
|
|
|
v.HashTableEntries = append(v.HashTableEntries, HashTableEntry{
|
2019-10-24 09:31:59 -04:00
|
|
|
NamePartA: hashData[i*4],
|
|
|
|
NamePartB: hashData[(i*4)+1],
|
|
|
|
// TODO: Verify that we're grabbing the right high/lo word for the vars below
|
|
|
|
Locale: uint16(hashData[(i*4)+2] >> 16),
|
|
|
|
Platform: uint16(hashData[(i*4)+2] & 0xFFFF),
|
|
|
|
BlockIndex: hashData[(i*4)+3],
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *MPQ) loadBlockTable() {
|
2019-10-26 20:09:33 -04:00
|
|
|
_, err := v.File.Seek(int64(v.Data.BlockTableOffset), 0)
|
|
|
|
if err != nil {
|
|
|
|
log.Panic(err)
|
|
|
|
}
|
2019-10-24 09:31:59 -04:00
|
|
|
blockData := make([]uint32, v.Data.BlockTableEntries*4)
|
2019-10-26 20:09:33 -04:00
|
|
|
err = binary.Read(v.File, binary.LittleEndian, &blockData)
|
|
|
|
if err != nil {
|
|
|
|
log.Panic(err)
|
|
|
|
}
|
2019-10-24 09:31:59 -04:00
|
|
|
decrypt(blockData, hashString("(block table)", 3))
|
|
|
|
for i := uint32(0); i < v.Data.BlockTableEntries; i++ {
|
2019-10-25 19:37:04 -04:00
|
|
|
v.BlockTableEntries = append(v.BlockTableEntries, BlockTableEntry{
|
2019-10-24 09:31:59 -04:00
|
|
|
FilePosition: blockData[(i * 4)],
|
|
|
|
CompressedFileSize: blockData[(i*4)+1],
|
|
|
|
UncompressedFileSize: blockData[(i*4)+2],
|
2019-10-25 19:37:04 -04:00
|
|
|
Flags: FileFlag(blockData[(i*4)+3]),
|
2019-10-24 09:31:59 -04:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func decrypt(data []uint32, seed uint32) {
|
|
|
|
seed2 := uint32(0xeeeeeeee)
|
|
|
|
|
|
|
|
for i := 0; i < len(data); i++ {
|
|
|
|
seed2 += CryptoBuffer[0x400+(seed&0xff)]
|
|
|
|
result := data[i]
|
|
|
|
result ^= seed + seed2
|
|
|
|
|
|
|
|
seed = ((^seed << 21) + 0x11111111) | (seed >> 11)
|
|
|
|
seed2 = result + seed2 + (seed2 << 5) + 3
|
|
|
|
data[i] = result
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func decryptBytes(data []byte, seed uint32) {
|
|
|
|
seed2 := uint32(0xEEEEEEEE)
|
|
|
|
for i := 0; i < len(data)-3; i += 4 {
|
|
|
|
seed2 += CryptoBuffer[0x400+(seed&0xFF)]
|
|
|
|
result := binary.LittleEndian.Uint32(data[i : i+4])
|
|
|
|
result ^= seed + seed2
|
|
|
|
seed = ((^seed << 21) + 0x11111111) | (seed >> 11)
|
|
|
|
seed2 = result + seed2 + (seed2 << 5) + 3
|
|
|
|
|
|
|
|
data[i+0] = uint8(result & 0xff)
|
|
|
|
data[i+1] = uint8((result >> 8) & 0xff)
|
|
|
|
data[i+2] = uint8((result >> 16) & 0xff)
|
|
|
|
data[i+3] = uint8((result >> 24) & 0xff)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func hashString(key string, hashType uint32) uint32 {
|
|
|
|
|
|
|
|
seed1 := uint32(0x7FED7FED)
|
|
|
|
seed2 := uint32(0xEEEEEEEE)
|
|
|
|
|
|
|
|
/* prepare seeds. */
|
|
|
|
for _, char := range strings.ToUpper(key) {
|
|
|
|
seed1 = CryptoBuffer[(hashType*0x100)+uint32(char)] ^ (seed1 + seed2)
|
|
|
|
seed2 = uint32(char) + seed1 + seed2 + (seed2 << 5) + 3
|
|
|
|
}
|
|
|
|
return seed1
|
|
|
|
}
|
|
|
|
|
2019-10-25 19:37:04 -04:00
|
|
|
func (v MPQ) getFileHashEntry(fileName string) (HashTableEntry, error) {
|
2019-10-24 09:31:59 -04:00
|
|
|
hashA := hashString(fileName, 1)
|
|
|
|
hashB := hashString(fileName, 2)
|
|
|
|
|
|
|
|
for idx, hashEntry := range v.HashTableEntries {
|
|
|
|
if hashEntry.NamePartA != hashA || hashEntry.NamePartB != hashB {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
return v.HashTableEntries[idx], nil
|
|
|
|
}
|
2019-10-25 19:37:04 -04:00
|
|
|
return HashTableEntry{}, errors.New("file not found")
|
2019-10-24 09:31:59 -04:00
|
|
|
}
|
|
|
|
|
2019-10-25 19:37:04 -04:00
|
|
|
// GetFileBlockData gets a block table entry
|
|
|
|
func (v MPQ) GetFileBlockData(fileName string) (BlockTableEntry, error) {
|
2019-11-06 22:12:15 -05:00
|
|
|
fileName = strings.ReplaceAll(fileName, "{LANG}", resourcepaths.LanguageCode)
|
2019-10-24 09:31:59 -04:00
|
|
|
fileEntry, err := v.getFileHashEntry(fileName)
|
2019-11-07 17:26:36 -05:00
|
|
|
if err != nil || fileEntry.BlockIndex >= uint32(len(v.BlockTableEntries)) {
|
2019-10-25 19:37:04 -04:00
|
|
|
return BlockTableEntry{}, err
|
2019-10-24 09:31:59 -04:00
|
|
|
}
|
|
|
|
return v.BlockTableEntries[fileEntry.BlockIndex], nil
|
|
|
|
}
|
|
|
|
|
2019-10-26 20:09:33 -04:00
|
|
|
// Close closes the MPQ file
|
2019-10-24 09:31:59 -04:00
|
|
|
func (v *MPQ) Close() {
|
2019-10-26 20:09:33 -04:00
|
|
|
err := v.File.Close()
|
|
|
|
if err != nil {
|
|
|
|
log.Panic(err)
|
|
|
|
}
|
2019-10-24 09:31:59 -04:00
|
|
|
}
|
|
|
|
|
2019-11-01 00:21:39 -04:00
|
|
|
func (v MPQ) FileExists(fileName string) bool {
|
|
|
|
_, err := v.getFileHashEntry(fileName)
|
|
|
|
return err == nil
|
|
|
|
}
|
|
|
|
|
2019-10-24 09:31:59 -04:00
|
|
|
// ReadFile reads a file from the MPQ and returns a memory stream
|
|
|
|
func (v MPQ) ReadFile(fileName string) ([]byte, error) {
|
2019-11-06 22:12:15 -05:00
|
|
|
fileName = strings.ReplaceAll(fileName, "{LANG}", resourcepaths.LanguageCode)
|
2019-10-25 19:37:04 -04:00
|
|
|
fileBlockData, err := v.GetFileBlockData(fileName)
|
2019-10-24 09:31:59 -04:00
|
|
|
if err != nil {
|
2019-11-01 00:21:39 -04:00
|
|
|
return []byte{}, err
|
2019-10-24 09:31:59 -04:00
|
|
|
}
|
|
|
|
fileBlockData.FileName = strings.ToLower(fileName)
|
|
|
|
fileBlockData.calculateEncryptionSeed()
|
2019-10-25 19:37:04 -04:00
|
|
|
mpqStream := CreateStream(v, fileBlockData, fileName)
|
2019-10-24 09:31:59 -04:00
|
|
|
buffer := make([]byte, fileBlockData.UncompressedFileSize)
|
|
|
|
mpqStream.Read(buffer, 0, fileBlockData.UncompressedFileSize)
|
|
|
|
return buffer, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadTextFile reads a file and returns it as a string
|
|
|
|
func (v MPQ) ReadTextFile(fileName string) (string, error) {
|
2019-11-06 22:12:15 -05:00
|
|
|
fileName = strings.ReplaceAll(fileName, "{LANG}", resourcepaths.LanguageCode)
|
2019-10-24 09:31:59 -04:00
|
|
|
data, err := v.ReadFile(fileName)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return string(data), nil
|
|
|
|
}
|
|
|
|
|
2019-10-25 19:37:04 -04:00
|
|
|
func (v *BlockTableEntry) calculateEncryptionSeed() {
|
2019-10-24 09:31:59 -04:00
|
|
|
fileName := path.Base(v.FileName)
|
|
|
|
v.EncryptionSeed = hashString(fileName, 3)
|
2019-10-26 20:09:33 -04:00
|
|
|
if !v.HasFlag(FileFixKey) {
|
2019-10-24 09:31:59 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
v.EncryptionSeed = (v.EncryptionSeed + v.FilePosition) ^ v.UncompressedFileSize
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetFileList returns the list of files in this MPQ
|
|
|
|
func (v MPQ) GetFileList() ([]string, error) {
|
|
|
|
data, err := v.ReadFile("(listfile)")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-11-07 17:35:25 -05:00
|
|
|
raw := strings.TrimRight(string(data), "\x00")
|
|
|
|
s := bufio.NewScanner(strings.NewReader(raw))
|
|
|
|
var filePaths []string
|
|
|
|
for s.Scan() {
|
|
|
|
filePath := s.Text()
|
|
|
|
filePaths = append(filePaths, filePath)
|
|
|
|
}
|
|
|
|
return filePaths, nil
|
2019-10-24 09:31:59 -04:00
|
|
|
}
|