1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
#[cfg(feature="payload")]
use blowfish::{
Blowfish,
cipher::{
BlockDecryptMut, KeyInit,
generic_array::GenericArray,
},
};
use byteorder::{ByteOrder, LittleEndian};
#[cfg(feature="payload")]
fn blowfish_decrypt(cipher: &[u8], key: &[u8], depad: bool) -> Vec<u8> {
assert_eq!(cipher.len()%8, 0);
assert_ne!(cipher.len(), 0);
let mut data_store = vec![0; cipher.len()];
let mut decrypt = Blowfish::<byteorder::BigEndian>::new_from_slice(&key).unwrap();
for i in (0..data_store.len()).step_by(8) {
decrypt.decrypt_block_b2b_mut(
GenericArray::from_slice(&cipher[i..i+8]),
GenericArray::from_mut_slice(&mut data_store[i..i+8])
);
}
if depad {
let depad_size = data_store[data_store.len()-1] as usize;
assert_eq!(data_store.len() >= depad_size, true);
data_store.resize(data_store.len()-depad_size, 0);
}
data_store
}
#[derive(Debug)]
pub struct PayloadHeader {
match_id: u64,
match_length: u32,
keyframe_count: u32,
chunk_count: u32,
end_startup_chunk_id: u32,
start_game_chunk_id: u32,
keyframe_interval: u32,
encryption_key_length: u16,
encryption_key: Vec<u8>,
}
impl PayloadHeader {
pub fn id(&self) -> u64 { self.match_id }
pub fn duration(&self) -> u32 { self.match_length }
pub fn keyframe_count(&self) -> u32 { self.keyframe_count }
pub fn chunk_count(&self) -> u32 { self.chunk_count }
pub fn load_end_chunk(&self) -> u32 { self.end_startup_chunk_id }
pub fn game_start_chunk(&self) -> u32 { self.start_game_chunk_id }
pub fn keyframe_interval(&self) -> u32 { self.keyframe_interval }
pub fn encryption_key(&self) -> &str { std::str::from_utf8(&self.encryption_key[..]).unwrap() }
#[cfg(feature="payload")]
pub(crate) fn segment_encryption_key(&self) -> Vec<u8> {
let key = base64::decode(&self.encryption_key).unwrap();
blowfish_decrypt(&key[..], self.match_id.to_string().as_bytes(), true)
}
pub(crate) fn from_raw_section(data: &[u8]) -> PayloadHeader {
PayloadHeader {
match_id: LittleEndian::read_u64(&data[..8]),
match_length: LittleEndian::read_u32(&data[8..12]),
keyframe_count: LittleEndian::read_u32(&data[12..16]),
chunk_count: LittleEndian::read_u32(&data[16..20]),
end_startup_chunk_id: LittleEndian::read_u32(&data[20..24]),
start_game_chunk_id: LittleEndian::read_u32(&data[24..28]),
keyframe_interval: LittleEndian::read_u32(&data[28..32]),
encryption_key_length: LittleEndian::read_u16(&data[32..34]),
encryption_key: data[(34 as usize)..((34+LittleEndian::read_u16(&data[32..34])) as usize)].to_vec(),
}
}
}
impl std::fmt::Display for PayloadHeader {
fn fmt(&self, f: &mut std::fmt::Formatter) -> std::fmt::Result {
write!(
f,
concat!(
"Match ID: {0}\n",
"Match Length: {1} ms\n",
"Keyframe count: {2}\n",
"Last loading Chunk: {3}\n",
"First game chunk: {4}\n",
"Total chunk count: {5}\n",
"Keyframe interval: {6}\n",
"Encryption key ({7} chars): {8:?}",
),
self.match_id,
self.match_length,
self.keyframe_count,
self.start_game_chunk_id,
self.end_startup_chunk_id,
self.chunk_count,
self.keyframe_interval,
self.encryption_key_length,
std::str::from_utf8(&self.encryption_key[..]).unwrap(),
)
}
}