Compare commits
93 Commits
623542046a
..
main
| Author | SHA1 | Date | |
|---|---|---|---|
| 4f0ae22d87 | |||
| ef0d19e659 | |||
| 27b8d3b880 | |||
| 3a3f0608a3 | |||
| b5451b5cbe | |||
| 76e9c8eec4 | |||
| 13bb48ccce | |||
| a896bc901f | |||
| d1316e499e | |||
| d2d40e7485 | |||
| 89ff8f34e7 | |||
| 7aea94a60a | |||
| 9dbe4a89c3 | |||
| c8577b5545 | |||
| b8ae9ba743 | |||
| 9637931164 | |||
| 290307aa84 | |||
| f3552ce79c | |||
| 441c49d31a | |||
| e282a10f4d | |||
| 8f6fbbb244 | |||
| 5adf5e6417 | |||
| a421793a54 | |||
| bda519e70a | |||
| b7aa912e1b | |||
| 7db8048469 | |||
| 091418eb53 | |||
| 533b992a45 | |||
| 937734ff7b | |||
| 72c5466ce6 | |||
| 8a828db908 | |||
| 3b461cd845 | |||
| b2dfd9e1e5 | |||
| 448f6b7167 | |||
| ebe2000993 | |||
| 26038a03d1 | |||
| 698ac445e0 | |||
| 45431e29f1 | |||
| 5bd481eb1e | |||
| 4559b9d4ec | |||
| de418a6568 | |||
| 2bf8407640 | |||
| a8b5e0148f | |||
| 50413eb420 | |||
| ea49c39e53 | |||
| f599a9a648 | |||
| b8b24a5c30 | |||
| 4a71bc6f1b | |||
| cfd52b8e05 | |||
| b2ca193aa4 | |||
| 491daebf06 | |||
| 9799c2babe | |||
| 27b8a0e497 | |||
| 3f9409b8c6 | |||
| 1fdc7450cd | |||
| 75338b10ff | |||
| 5e8f059c49 | |||
| 11a9447e05 | |||
| 911c4d199a | |||
| 167e5ee696 | |||
| 7e6797b6c7 | |||
| c8b3104b4b | |||
| 785d4a3ff2 | |||
| c09ce8b02a | |||
| 0af818fc0f | |||
| 6e62bcb1dc | |||
| 1a05ef2742 | |||
| 642c1c80fa | |||
| 32525c1566 | |||
| 75171b4557 | |||
| fe71decd38 | |||
| acfdf7b3ef | |||
| e8d387e520 | |||
| 03a1841b8e | |||
| e61c20bb5a | |||
| 105f8b6df0 | |||
| 0300ced79c | |||
| 83ac8615ba | |||
| 697bff9752 | |||
| 0fa2e0540b | |||
| a1a123054f | |||
| 76d581c419 | |||
| 4f91ab9cff | |||
| e6111f8dbd | |||
| 7ec6e385a0 | |||
| 7427357bc5 | |||
| 6b63d54eb8 | |||
| a3df782245 | |||
| d4650aac84 | |||
| 73b1c95257 | |||
| 93fe999249 | |||
| 393a591485 | |||
| 2b8cbafa19 |
+22
-20
@@ -22,36 +22,31 @@ jobs:
|
||||
if: ${{ github.event_name == 'push' }}
|
||||
shell: bash
|
||||
run: |
|
||||
git fetch --tags || true
|
||||
git fetch --tags --force
|
||||
|
||||
# Determine last tag and log range
|
||||
if git describe --tags --abbrev=0 >/dev/null 2>&1; then
|
||||
LAST_TAG=$(git describe --tags --abbrev=0)
|
||||
if LAST_TAG=$(git describe --tags --abbrev=0 2>/dev/null); then
|
||||
RANGE="${LAST_TAG}..HEAD"
|
||||
else
|
||||
LAST_TAG="v0.1.9"
|
||||
RANGE="HEAD"
|
||||
fi
|
||||
|
||||
# Calculate next version
|
||||
IFS='.' read -r major minor patch <<< "${LAST_TAG#v}"
|
||||
NEW_VERSION="$major.$minor.$((patch + 1))"
|
||||
NEW_TAG="v$NEW_VERSION"
|
||||
|
||||
# Log commits
|
||||
CHANGELOG=$(git log $RANGE --oneline | sed 's/^/* /')
|
||||
[ -z "$CHANGELOG" ] && CHANGELOG="Maintenance build."
|
||||
if [ -z "$CHANGELOG" ]; then
|
||||
CHANGELOG="Re-run of version $NEW_VERSION or maintenance build."
|
||||
fi
|
||||
|
||||
# Tag and push back to Gitea
|
||||
git tag $NEW_TAG
|
||||
git push origin $NEW_TAG
|
||||
|
||||
# Set outputs for next steps
|
||||
echo "version-string=$NEW_VERSION" >> $GITHUB_OUTPUT
|
||||
echo "changelog<<EOF" >> $GITHUB_OUTPUT
|
||||
echo "## What's Changed" >> $GITHUB_OUTPUT
|
||||
echo "$CHANGELOG" >> $GITHUB_OUTPUT
|
||||
echo "EOF" >> $GITHUB_OUTPUT
|
||||
echo "new-tag=v$NEW_VERSION" >> $GITHUB_OUTPUT
|
||||
{
|
||||
echo "changelog<<EOF"
|
||||
echo "## What's Changed"
|
||||
echo "$CHANGELOG"
|
||||
echo "EOF"
|
||||
} >> $GITHUB_OUTPUT
|
||||
|
||||
- name: Setup Tools Cache
|
||||
id: tools-cache
|
||||
@@ -124,11 +119,18 @@ jobs:
|
||||
name: unlocker-build
|
||||
path: unlocker.zip
|
||||
|
||||
- name: Finalize Version and Push Tag
|
||||
if: ${{ github.event_name == 'push' && success() }}
|
||||
run: |
|
||||
git tag ${{ steps.calculate-version.outputs.new-tag }}
|
||||
git push origin ${{ steps.calculate-version.outputs.new-tag }}
|
||||
|
||||
- name: Create Gitea Release
|
||||
if: ${{ github.event_name == 'push' }}
|
||||
if: ${{ github.event_name == 'push' && success() }}
|
||||
uses: akkuman/gitea-release-action@v1
|
||||
with:
|
||||
files: unlocker.zip
|
||||
tag_name: v${{ steps.calculate-version.outputs.version-string }}
|
||||
name: Release v${{ steps.calculate-version.outputs.version-string }}
|
||||
tag_name: ${{ steps.calculate-version.outputs.new-tag }}
|
||||
name: Release ${{ steps.calculate-version.outputs.new-tag }}
|
||||
body: ${{ steps.calculate-version.outputs.changelog }}
|
||||
|
||||
@@ -7,3 +7,6 @@
|
||||
[submodule "vendor/json"]
|
||||
path = vendor/json
|
||||
url = https://github.com/nlohmann/json
|
||||
[submodule "vendor/zlib"]
|
||||
path = vendor/zlib
|
||||
url = https://github.com/madler/zlib
|
||||
|
||||
+33
-9
@@ -76,7 +76,7 @@ add_executable(dbd-unlocker ${UNLOCKER_SOURCES})
|
||||
string(RANDOM LENGTH 12 ALPHABET "abcdefghijklmnopqrstuvwxyz0123456789" RANDOM_EXE_NAME)
|
||||
set_target_properties(dbd-unlocker PROPERTIES OUTPUT_NAME "${RANDOM_EXE_NAME}")
|
||||
|
||||
target_link_libraries(dbd-unlocker PRIVATE dbd-unlocker-warnings OpenSSL::SSL OpenSSL::Crypto nerutils wsock32 ws2_32 wininet crypt32 nlohmann_json)
|
||||
target_link_libraries(dbd-unlocker PRIVATE dbd-unlocker-warnings OpenSSL::SSL OpenSSL::Crypto nerutils wsock32 ws2_32 wininet crypt32 nlohmann_json zlibstatic )
|
||||
|
||||
if(NOT MSVC)
|
||||
target_link_options(dbd-unlocker PRIVATE -static -static-libgcc -static-libstdc++)
|
||||
@@ -97,14 +97,38 @@ add_custom_command(TARGET dbd-unlocker POST_BUILD
|
||||
)
|
||||
|
||||
# ------------------------------
|
||||
# dumper (VS only)
|
||||
# VS only
|
||||
# ------------------------------
|
||||
if(CMAKE_GENERATOR MATCHES "Visual Studio")
|
||||
include_external_msproject(dbd-dumper "${CMAKE_CURRENT_SOURCE_DIR}/src/dumper/dbd-dumper.csproj")
|
||||
include_external_msproject(CUE4Parse "${CMAKE_CURRENT_SOURCE_DIR}/vendor/CUE4Parse/CUE4Parse/CUE4Parse.csproj")
|
||||
set_target_properties(dbd-dumper PROPERTIES VS_PROJECT_TYPE "9A19103F-16F7-4668-BE54-9A1E7A4F7556")
|
||||
set_target_properties(CUE4Parse PROPERTIES VS_PROJECT_TYPE "9A19103F-16F7-4668-BE54-9A1E7A4F7556")
|
||||
add_dependencies(dbd-dumper CUE4Parse)
|
||||
set_property(DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR} PROPERTY VS_STARTUP_PROJECT dbd-unlocker)
|
||||
endif()
|
||||
# ------------------------------
|
||||
# CUE4Parse
|
||||
# ------------------------------
|
||||
set(CUE4PARSE_DIR "${CMAKE_CURRENT_SOURCE_DIR}/vendor/CUE4Parse")
|
||||
|
||||
# CUE4Parse natives
|
||||
set(CUE4PARSE_NATIVE_DIR "${CUE4PARSE_DIR}/CUE4Parse-Natives")
|
||||
add_subdirectory(${CUE4PARSE_NATIVE_DIR})
|
||||
|
||||
# CUE4Parse C#
|
||||
set(CUE4PARSE_NET_DIR "${CUE4PARSE_DIR}/CUE4Parse")
|
||||
set(CUE4PARSE_OUTPUT_DIR "${CUE4PARSE_NET_DIR}/bin/$(Configuration)/net8.0")
|
||||
|
||||
add_custom_target(CUE4Parse-Net
|
||||
COMMAND dotnet build "${CUE4PARSE_NET_DIR}/CUE4Parse.csproj"
|
||||
--configuration $(Configuration)
|
||||
-p:BuildNatives=false
|
||||
-p:SkipNativeBuild=true
|
||||
-p:CMakeExitCode=0
|
||||
--output "${CUE4PARSE_OUTPUT_DIR}"
|
||||
WORKING_DIRECTORY "${CUE4PARSE_NET_DIR}"
|
||||
COMMENT "Building CUE4Parse C# library"
|
||||
)
|
||||
|
||||
# dumper
|
||||
include_external_msproject(dbd-dumper "${CMAKE_CURRENT_SOURCE_DIR}/src/dumper/dbd-dumper.csproj")
|
||||
set_target_properties(dbd-dumper PROPERTIES VS_PROJECT_TYPE "9A19103F-16F7-4668-BE54-9A1E7A4F7556")
|
||||
add_dependencies(dbd-dumper CUE4Parse-Natives CUE4Parse-Net)
|
||||
|
||||
# startup project
|
||||
set_property(DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR} PROPERTY VS_STARTUP_PROJECT dbd-unlocker)
|
||||
endif()
|
||||
@@ -8,3 +8,4 @@ for /r "src" %%f in (*.cpp *.h *.cs) do (
|
||||
|
||||
echo done
|
||||
pause
|
||||
|
||||
File diff suppressed because one or more lines are too long
@@ -0,0 +1,95 @@
|
||||
[
|
||||
"Ace",
|
||||
"Adam",
|
||||
"Ash",
|
||||
"Bear",
|
||||
"Bill",
|
||||
"Bob",
|
||||
"Cannibal",
|
||||
"Chuckles",
|
||||
"Claudette",
|
||||
"Clown",
|
||||
"Demogorgon",
|
||||
"Dwight",
|
||||
"Eric",
|
||||
"Feng",
|
||||
"Ghostface",
|
||||
"Gunslinger",
|
||||
"HillBilly",
|
||||
"Jake",
|
||||
"Jane",
|
||||
"Jeff",
|
||||
"K20",
|
||||
"K21",
|
||||
"K22",
|
||||
"K23",
|
||||
"K24",
|
||||
"K25",
|
||||
"K26",
|
||||
"K27",
|
||||
"K28",
|
||||
"K29",
|
||||
"K30",
|
||||
"K31",
|
||||
"K32",
|
||||
"K33",
|
||||
"K34",
|
||||
"K35",
|
||||
"K36",
|
||||
"K37",
|
||||
"K38",
|
||||
"K39",
|
||||
"K40",
|
||||
"K41",
|
||||
"K42",
|
||||
"Kate",
|
||||
"Killer07",
|
||||
"Laurie",
|
||||
"Legion",
|
||||
"Meg",
|
||||
"Nancy",
|
||||
"Nea",
|
||||
"Nightmare",
|
||||
"Nurse",
|
||||
"Oni",
|
||||
"Pig",
|
||||
"Plague",
|
||||
"Quentin",
|
||||
"S22",
|
||||
"S23",
|
||||
"S24",
|
||||
"S25",
|
||||
"S26",
|
||||
"S27",
|
||||
"S28",
|
||||
"S29",
|
||||
"S30",
|
||||
"S31",
|
||||
"S32",
|
||||
"S33",
|
||||
"S34",
|
||||
"S35",
|
||||
"S36",
|
||||
"S37",
|
||||
"S38",
|
||||
"S39",
|
||||
"S40",
|
||||
"S41",
|
||||
"S42",
|
||||
"S43",
|
||||
"S44",
|
||||
"S45",
|
||||
"S46",
|
||||
"S47",
|
||||
"S48",
|
||||
"S49",
|
||||
"S50",
|
||||
"S51",
|
||||
"Shape",
|
||||
"Smoke",
|
||||
"Spirit",
|
||||
"Steve",
|
||||
"Witch",
|
||||
"Yui",
|
||||
"Zarina"
|
||||
]
|
||||
File diff suppressed because it is too large
Load Diff
+506
@@ -0,0 +1,506 @@
|
||||
[
|
||||
{
|
||||
"name": "halloween",
|
||||
"grdk": "9NJ77BPBRSFH",
|
||||
"egs": "c9d4a48a9576483fb6ba27a99bcb3780",
|
||||
"steam": "530711"
|
||||
},
|
||||
{
|
||||
"name": "fleshAndMud",
|
||||
"grdk": "9NJQTSL5PZJL",
|
||||
"egs": "b18a490a58d548588eb60c2fd6b4c3cc",
|
||||
"steam": "554381"
|
||||
},
|
||||
{
|
||||
"name": "80suitcase",
|
||||
"grdk": "9NF6VS6NVC2P",
|
||||
"egs": "a1f208be98e64c5ea5e946b86f7d19c3",
|
||||
"steam": "530710"
|
||||
},
|
||||
{
|
||||
"name": "bloodletting",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "FFFFFFFFFFFFFFFF",
|
||||
"steam": "639710"
|
||||
},
|
||||
{
|
||||
"name": "bloodstainedSack",
|
||||
"grdk": "9NW55H5J9NH2",
|
||||
"egs": "abc74084457d46f5a51f062f540bdeee",
|
||||
"steam": "554380"
|
||||
},
|
||||
{
|
||||
"name": "Sandman",
|
||||
"grdk": "9NW2X83B4JJV",
|
||||
"egs": "439c3c5df54b468696f880401660d7ad",
|
||||
"steam": "700282"
|
||||
},
|
||||
{
|
||||
"name": "sparkofMadness",
|
||||
"grdk": "9NX58MLKKQWD",
|
||||
"egs": "4b9c8d9424ca4a2899505254ba46b109",
|
||||
"steam": "582600"
|
||||
},
|
||||
{
|
||||
"name": "headCase",
|
||||
"grdk": "9NCLGTXXZ18Q",
|
||||
"egs": "93f4e154df3a4254a0ece7241659d84e",
|
||||
"steam": "577901"
|
||||
},
|
||||
{
|
||||
"name": "lastBreath",
|
||||
"grdk": "0",
|
||||
"egs": "0",
|
||||
"steam": "509060"
|
||||
},
|
||||
{
|
||||
"name": "charityChest",
|
||||
"grdk": "9P1CNFD3MMC7",
|
||||
"egs": "0885718299d640708080b66ddb9dceb1",
|
||||
"steam": "627510"
|
||||
},
|
||||
{
|
||||
"name": "Cannibal",
|
||||
"grdk": "9NKNQ2DZMLZW",
|
||||
"egs": "06f5b0d8cf56445390f14516b28ea5c2",
|
||||
"steam": "700280"
|
||||
},
|
||||
{
|
||||
"name": "GStar2017",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "FFFFFFFFFFFFFFFF",
|
||||
"steam": "750380"
|
||||
},
|
||||
{
|
||||
"name": "ChineseEventOct2017",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "FFFFFFFFFFFFFFFF",
|
||||
"steam": "724650"
|
||||
},
|
||||
{
|
||||
"name": "XboxPerkNov2020",
|
||||
"grdk": "9N2DHTZ1D9CC",
|
||||
"egs": "FFFFFFFFFFFFFFFF",
|
||||
"steam": "-1"
|
||||
},
|
||||
{
|
||||
"name": "BaseGame",
|
||||
"grdk": "9NMS4SFNBGBH",
|
||||
"egs": "daedda2898b74feeac35f222ef02539a",
|
||||
"steam": "381210"
|
||||
},
|
||||
{
|
||||
"name": "ACPack_01",
|
||||
"grdk": "9N4LWJH8J800",
|
||||
"egs": "168d750b4a6f451ca6eb68618a741f2c",
|
||||
"steam": "555"
|
||||
},
|
||||
{
|
||||
"name": "ACPack_02",
|
||||
"grdk": "9NSD3C05HVNM",
|
||||
"egs": "d9ba2a71c7664785a1cfff524edb768c",
|
||||
"steam": "556"
|
||||
},
|
||||
{
|
||||
"name": "ACPack_03",
|
||||
"grdk": "9N6FGJW61X23",
|
||||
"egs": "81c99b3171f941ff9f7915b51e371f05",
|
||||
"steam": "557"
|
||||
},
|
||||
{
|
||||
"name": "ACPack_04",
|
||||
"grdk": "9PLG9SM9GNLM",
|
||||
"egs": "916bfd0101c24561b75e984751e46e95",
|
||||
"steam": "558"
|
||||
},
|
||||
{
|
||||
"name": "ACPack_05",
|
||||
"grdk": "9N310FS0QMG8",
|
||||
"egs": "920f365a9b454af3a9bc675f839bed64",
|
||||
"steam": "559"
|
||||
},
|
||||
{
|
||||
"name": "ACPack_06",
|
||||
"grdk": "9N82ZN5T0VB3",
|
||||
"egs": "87bb22af1b6c4ee19404b34b7321fb4c",
|
||||
"steam": "560"
|
||||
},
|
||||
{
|
||||
"name": "EpicBrillGeneral",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "daedda2898b74feeac35f222ef02539a",
|
||||
"steam": "-1"
|
||||
},
|
||||
{
|
||||
"name": "EpicSilentHillEdition",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "3280c01d39a74adc83be41e3fd74b5d1",
|
||||
"steam": "-1"
|
||||
},
|
||||
{
|
||||
"name": "EpicUltimateEdition",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "7f3b3b5e18f04dd0ac73a98af70dd169",
|
||||
"steam": "-1"
|
||||
},
|
||||
{
|
||||
"name": "EpicBrillFreeWeek",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "a9e88f5bd1a047539c772370f15deb48",
|
||||
"steam": "-1"
|
||||
},
|
||||
{
|
||||
"name": "StoreItem",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "FFFFFFFFFFFFFFFF",
|
||||
"steam": "1"
|
||||
},
|
||||
{
|
||||
"name": "Venus",
|
||||
"grdk": "9NCZMBJCLTJ3",
|
||||
"egs": "29fe12a4cb51431793239261cb1fd8c3",
|
||||
"steam": "2469400"
|
||||
},
|
||||
{
|
||||
"name": "Zodiac",
|
||||
"grdk": "9MZ841F14MXK",
|
||||
"egs": "8fbd0077488b4334ae91de61588870ff",
|
||||
"steam": "2661250"
|
||||
},
|
||||
{
|
||||
"name": "Saturn",
|
||||
"grdk": "9PCSC363JX1B",
|
||||
"egs": "e3ec01697342406c89110b8d117eccaf",
|
||||
"steam": "2294610"
|
||||
},
|
||||
{
|
||||
"name": "EP1",
|
||||
"grdk": "9N343FZ245RD",
|
||||
"egs": "489ff36aa1ba47089591bf623f0af9df",
|
||||
"steam": "1622940"
|
||||
},
|
||||
{
|
||||
"name": "EP2",
|
||||
"grdk": "9NR9FPF9G79L",
|
||||
"egs": "f8c85b036b0c418097f7abf10384c821",
|
||||
"steam": "1622941"
|
||||
},
|
||||
{
|
||||
"name": "Pulcinella",
|
||||
"grdk": "9MTC8NRZLQ5T",
|
||||
"egs": "FFFFFFFFFFFFFFFF",
|
||||
"steam": "-1"
|
||||
},
|
||||
{
|
||||
"name": "Mali",
|
||||
"grdk": "9N29SR96GQS4",
|
||||
"egs": "4f8625dec370441da5fd0a11ff0732d8",
|
||||
"steam": "1009820"
|
||||
},
|
||||
{
|
||||
"name": "DeathGarden",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "FFFFFFFFFFFFFFFF",
|
||||
"steam": "555440"
|
||||
},
|
||||
{
|
||||
"name": "Oman",
|
||||
"grdk": "9NMC8SZPD9GF",
|
||||
"egs": "cd2c0734ab444693884d200be769be0c",
|
||||
"steam": "1089270"
|
||||
},
|
||||
{
|
||||
"name": "Guam",
|
||||
"grdk": "9P0HLNG7X2D0",
|
||||
"egs": "2e8b8ed7a3cd481abcae1f7986153e50",
|
||||
"steam": "799200"
|
||||
},
|
||||
{
|
||||
"name": "Kabuki",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "FFFFFFFFFFFFFFFF",
|
||||
"steam": "-1"
|
||||
},
|
||||
{
|
||||
"name": "Eclair",
|
||||
"grdk": "9NGXBJNF1C13",
|
||||
"egs": "18a5a780992347afa03d190a9c1927f9",
|
||||
"steam": "3103150"
|
||||
},
|
||||
{
|
||||
"name": "Ketchup",
|
||||
"grdk": "9NK4H61J4B39",
|
||||
"egs": "ea868d5b96b94b8ba2c2392d9a8505c0",
|
||||
"steam": "3796620"
|
||||
},
|
||||
{
|
||||
"name": "Wormhole",
|
||||
"grdk": "9NC2M3W7NHB5",
|
||||
"egs": "4ebd4f31838549e38eecb23130e57700",
|
||||
"steam": "2515990"
|
||||
},
|
||||
{
|
||||
"name": "HeritagePack1",
|
||||
"grdk": "9NB4CC8GN5S7",
|
||||
"egs": "c8d9fd67a4184f069c3c080f104b89a4",
|
||||
"steam": "2526530"
|
||||
},
|
||||
{
|
||||
"name": "HeritagePack2",
|
||||
"grdk": "9NGRVV847PN9",
|
||||
"egs": "ac0bf77a00eb43cd822b8ac3690f3731",
|
||||
"steam": "2526540"
|
||||
},
|
||||
{
|
||||
"name": "HeritagePack3",
|
||||
"grdk": "9NP99MKHQHZS",
|
||||
"egs": "b96de0a9a2294e69a6fb0667ef6ddf74",
|
||||
"steam": "2526550"
|
||||
},
|
||||
{
|
||||
"name": "Poutine",
|
||||
"grdk": "9PJ0JD3ZWTBX",
|
||||
"egs": "76d10ee1eacd469797a5d13bddd3850a",
|
||||
"steam": "4318580"
|
||||
},
|
||||
{
|
||||
"name": "Finland",
|
||||
"grdk": "9N2P7KNZ816R",
|
||||
"egs": "18b030008f8847af868aff2f0eaab510",
|
||||
"steam": "750381"
|
||||
},
|
||||
{
|
||||
"name": "WinterEvent2017",
|
||||
"grdk": "0",
|
||||
"egs": "0",
|
||||
"steam": "0"
|
||||
},
|
||||
{
|
||||
"name": "Jerky",
|
||||
"grdk": "9P7GG0L4LJBN",
|
||||
"egs": "e65a462d873046499c01f29910b00b1a",
|
||||
"steam": "3698790"
|
||||
},
|
||||
{
|
||||
"name": "Quiche",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "FFFFFFFFFFFFFFFF",
|
||||
"steam": "-1"
|
||||
},
|
||||
{
|
||||
"name": "Omelet",
|
||||
"grdk": "0",
|
||||
"egs": "0",
|
||||
"steam": "0"
|
||||
},
|
||||
{
|
||||
"name": "Hubble",
|
||||
"grdk": "9N1XTPLC8DGB",
|
||||
"egs": "4eb6bf2cdef2438b924c5d8cd2137cc5",
|
||||
"steam": "1763310"
|
||||
},
|
||||
{
|
||||
"name": "Yerkes",
|
||||
"grdk": "9P0NJ7CS0TM1",
|
||||
"egs": "f1e1bce49652456e85de167fbcc52a6a",
|
||||
"steam": "2656010"
|
||||
},
|
||||
{
|
||||
"name": "Gemini",
|
||||
"grdk": "9PJNHM94SW0S",
|
||||
"egs": "bc146268c50b4716a65a132a70d12c0a",
|
||||
"steam": "1734080"
|
||||
},
|
||||
{
|
||||
"name": "Ukraine",
|
||||
"grdk": "9PK2JHM3C71C",
|
||||
"egs": "9a109c018e17400eae350a423e595107",
|
||||
"steam": "1251000"
|
||||
},
|
||||
{
|
||||
"name": "HeritagePack4",
|
||||
"grdk": "9NVVCQKVPTQR",
|
||||
"egs": "e0d3d8e56d934016be3ebf74c5ecc85e",
|
||||
"steam": "2922730"
|
||||
},
|
||||
{
|
||||
"name": "Aurora",
|
||||
"grdk": "9N02CL4TC7CQ",
|
||||
"egs": "ffda316a960d4f41930027dbe0772e0f",
|
||||
"steam": "1474030"
|
||||
},
|
||||
{
|
||||
"name": "Ion",
|
||||
"grdk": "9NZFJHT080C9",
|
||||
"egs": "9e8f8dace7a243c480c6d6d06ab429c9",
|
||||
"steam": "1804690"
|
||||
},
|
||||
{
|
||||
"name": "Meteor",
|
||||
"grdk": "9PKZR14F59HK",
|
||||
"egs": "511e4db16dc544faa03b8fb6811efcc5",
|
||||
"steam": "1985790"
|
||||
},
|
||||
{
|
||||
"name": "Wales",
|
||||
"grdk": "9NWVSBTG89KQ",
|
||||
"egs": "e7d0828eb497411c813951058d8fd931",
|
||||
"steam": "1324970"
|
||||
},
|
||||
{
|
||||
"name": "WalesCust",
|
||||
"grdk": "9PHV0FJ8HXVJ",
|
||||
"egs": "3280c01d39a74adc83be41e3fd74b5d1",
|
||||
"steam": "1324971"
|
||||
},
|
||||
{
|
||||
"name": "Eclipse",
|
||||
"grdk": "9P29W29LSSG2",
|
||||
"egs": "dbf62759c9cc439699256801ee09095c",
|
||||
"steam": "1634040"
|
||||
},
|
||||
{
|
||||
"name": "ApplePie",
|
||||
"grdk": "9NLCTCL61ZZ2",
|
||||
"egs": "9a0c250555c14679a6208e57d89918d2",
|
||||
"steam": "2661270"
|
||||
},
|
||||
{
|
||||
"name": "Icecream",
|
||||
"grdk": "9NRWN81GQ9CJ",
|
||||
"egs": "cee46f4734a94018be459b5a642f0536",
|
||||
"steam": "3448670"
|
||||
},
|
||||
{
|
||||
"name": "IcecreamCust",
|
||||
"grdk": "9NPTQDMHG1DT",
|
||||
"egs": "71836318753941dd8efb7ab68575005b",
|
||||
"steam": "3605020"
|
||||
},
|
||||
{
|
||||
"name": "Kepler",
|
||||
"grdk": "9PKPS8SDQQM8",
|
||||
"egs": "1f3b9ad501c24864b20a9e6faef38310",
|
||||
"steam": "1899750"
|
||||
},
|
||||
{
|
||||
"name": "Lasagna",
|
||||
"grdk": "9NZJ81G57RGT",
|
||||
"egs": "f7dfa0fab53146358c1f87bc08d00b7c",
|
||||
"steam": "3884020"
|
||||
},
|
||||
{
|
||||
"name": "Yemen",
|
||||
"grdk": "9NFXH0QD1M7C",
|
||||
"egs": "89120707a96a4210a9e23dced174632e",
|
||||
"steam": "1408020"
|
||||
},
|
||||
{
|
||||
"name": "Churros",
|
||||
"grdk": "9PCWX77XPKLP",
|
||||
"egs": "19bb1e99cbaa41b08fa06ddde6befa28",
|
||||
"steam": "2958440"
|
||||
},
|
||||
{
|
||||
"name": "ChurrosCust",
|
||||
"grdk": "9PC5X94ST9QK",
|
||||
"egs": "f5940ef33904476b945229c70c0508b3",
|
||||
"steam": "3002590"
|
||||
},
|
||||
{
|
||||
"name": "Orion",
|
||||
"grdk": "9P47ZQQJM1N4",
|
||||
"egs": "a523401428b54369880fd3e9d343ffe8",
|
||||
"steam": "2102730"
|
||||
},
|
||||
{
|
||||
"name": "OrionCust",
|
||||
"grdk": "9NX0ZCNSRNR1",
|
||||
"egs": "FFFFFFFFFFFFFFFF",
|
||||
"steam": "1"
|
||||
},
|
||||
{
|
||||
"name": "Sweden",
|
||||
"grdk": "9NJG10XN1LGL",
|
||||
"egs": "01bbc39db2f446daab0b283343fc99c8",
|
||||
"steam": "1199880"
|
||||
},
|
||||
{
|
||||
"name": "Donut",
|
||||
"grdk": "9P7BL680J1XZ",
|
||||
"egs": "b12e9ce935c04bda8624a02d5d14ea02",
|
||||
"steam": "3024580"
|
||||
},
|
||||
{
|
||||
"name": "DonutCust",
|
||||
"grdk": "9ZZZZZZZZZZZ",
|
||||
"egs": "FFFFFFFFFFFFFFFF",
|
||||
"steam": "-1"
|
||||
},
|
||||
{
|
||||
"name": "Umbra",
|
||||
"grdk": "9N5390XWCVZ6",
|
||||
"egs": "19e7cf4f9329474fa0a2692a14e37fe2",
|
||||
"steam": "2399750"
|
||||
},
|
||||
{
|
||||
"name": "UmbraCust1",
|
||||
"grdk": "9P4SDDKMV045",
|
||||
"egs": "956738aff598412c9a5247cfc7dae735",
|
||||
"steam": "2405130"
|
||||
},
|
||||
{
|
||||
"name": "UmbraCust2",
|
||||
"grdk": "9NRRQPTBW978",
|
||||
"egs": "7dbb037c212947fc8011d0c934dd89f5",
|
||||
"steam": "2405140"
|
||||
},
|
||||
{
|
||||
"name": "Gelato",
|
||||
"grdk": "9P4PV6KXJGL2",
|
||||
"egs": "80cf38fedc164b2c97d6d9570a9ab2cc",
|
||||
"steam": "3261720"
|
||||
},
|
||||
{
|
||||
"name": "Qatar",
|
||||
"grdk": "9MSMWW173HB5",
|
||||
"egs": "42e370c2688e4e96a7bf67d87a01874a",
|
||||
"steam": "1135280"
|
||||
},
|
||||
{
|
||||
"name": "Comet",
|
||||
"grdk": "9N54CBKZBV44",
|
||||
"egs": "87fafa3c2a724dddb87fb2a5cd350dae",
|
||||
"steam": "1557310"
|
||||
},
|
||||
{
|
||||
"name": "Haiti",
|
||||
"grdk": "9N78HGQN56L7",
|
||||
"egs": "ca6f548dabef4026b804aaa0a606a8fa",
|
||||
"steam": "925750"
|
||||
},
|
||||
{
|
||||
"name": "Nepals",
|
||||
"grdk": "9N55M38QNMCS",
|
||||
"egs": "f8ead4a3752f41e69632bfce9838ca9b",
|
||||
"steam": "1009821"
|
||||
},
|
||||
{
|
||||
"name": "Kenya",
|
||||
"grdk": "9P62QBBJZSD4",
|
||||
"egs": "268cae6e74134dee92198670d7b30bcc",
|
||||
"steam": "971790"
|
||||
},
|
||||
{
|
||||
"name": "Maple",
|
||||
"grdk": "9N7WDS85VBZG",
|
||||
"egs": "8ddd7882dca64a5f80ec9f1bea49892d",
|
||||
"steam": "4019590"
|
||||
},
|
||||
{
|
||||
"name": "Quantum",
|
||||
"grdk": "9N6Z2RG4GSD4",
|
||||
"egs": "f6ac362ab0aa462e894e698682a92801",
|
||||
"steam": "2198470"
|
||||
}
|
||||
]
|
||||
+56
-109
@@ -1,111 +1,58 @@
|
||||
{
|
||||
"Camper": {
|
||||
"Items": [
|
||||
"Father_Key_Card",
|
||||
"FireflyLantern",
|
||||
"Item_Camper_AlexsToolbox",
|
||||
"Item_Camper_AnniversaryToolbox",
|
||||
"Item_Camper_BeigeMap",
|
||||
"Item_Camper_BrokenKey",
|
||||
"Item_Camper_CommodiousToolbox",
|
||||
"Item_Camper_ContaminationSerum",
|
||||
"Item_Camper_DullKey",
|
||||
"Item_Camper_EngineerToolbox",
|
||||
"Item_Camper_FadedMap",
|
||||
"Item_Camper_Firecracker_Anniversary2019",
|
||||
"Item_Camper_Firecracker_Chinese",
|
||||
"Item_Camper_Firecracker_Flashbang",
|
||||
"Item_Camper_Firecracker_WinterEvent",
|
||||
"Item_Camper_Flashlight",
|
||||
"Item_Camper_Flashlight_Anniversary2020",
|
||||
"Item_Camper_Flashlight_Anniversary2022",
|
||||
"Item_Camper_Flashlight_Random",
|
||||
"Item_Camper_Flashlight02",
|
||||
"Item_Camper_Flashlight03",
|
||||
"Item_Camper_Flashlight04",
|
||||
"Item_Camper_JerryCan_Spring2025",
|
||||
"Item_Camper_K29InfectionRemover",
|
||||
"Item_Camper_K32Emp",
|
||||
"Item_Camper_K33Turret",
|
||||
"Item_Camper_K36MagicItem_Boots",
|
||||
"Item_Camper_K36MagicItem_Bracers",
|
||||
"Item_Camper_K36MagicItem_VecnaEye",
|
||||
"Item_Camper_K36MagicItem_VecnaHand",
|
||||
"Item_Camper_Key",
|
||||
"Item_Camper_Key_Random",
|
||||
"Item_Camper_LunarToolbox",
|
||||
"Item_Camper_Map_Random",
|
||||
"Item_Camper_Map_Spring2024",
|
||||
"Item_Camper_MechanicsToolbox",
|
||||
"Item_Camper_MedKit",
|
||||
"Item_Camper_Medkit_Anniversary2020",
|
||||
"Item_Camper_Medkit_Anniversary2022",
|
||||
"Item_Camper_MedKit_Random",
|
||||
"Item_Camper_MedKit02",
|
||||
"Item_Camper_MedKit03",
|
||||
"Item_Camper_MedKit04",
|
||||
"Item_Camper_Medkit05",
|
||||
"Item_Camper_OnryoTape",
|
||||
"Item_Camper_RainbowMap",
|
||||
"Item_Camper_Toolbox",
|
||||
"Item_Camper_Toolbox_Anniversary2022",
|
||||
"Item_Camper_Toolbox_Random",
|
||||
"Item_Camper_VoidBomb_Halloween2024",
|
||||
"Item_Camper_WornoutToolbox",
|
||||
"Item_FragileObject",
|
||||
"Item_LamentConfiguration",
|
||||
"Item_Survivor_CalamariContaminationAntidote",
|
||||
"Item_Survivor_K41Mushroom",
|
||||
"Item_Survivor_MakeshiftFogVial",
|
||||
"Item_Survivor_PrototypeFogVial",
|
||||
"Item_Survivor_VigosFogVial"
|
||||
]
|
||||
},
|
||||
"Slasher": {
|
||||
"Powers": [
|
||||
"Item_Blighted_Serum",
|
||||
"Item_Slasher_Beartrap",
|
||||
"Item_Slasher_Blinker",
|
||||
"Item_Slasher_Chainsaw",
|
||||
"Item_Slasher_CloakBell",
|
||||
"Item_Slasher_DreamInducer",
|
||||
"Item_Slasher_Frenzy",
|
||||
"Item_Slasher_GasBomb",
|
||||
"Item_Slasher_GhostPower",
|
||||
"Item_Slasher_HarpoonRifle",
|
||||
"Item_Slasher_Hatchet",
|
||||
"Item_Slasher_K21Power",
|
||||
"Item_Slasher_K22Power",
|
||||
"Item_Slasher_K24Power",
|
||||
"Item_Slasher_K25Power",
|
||||
"Item_Slasher_K26Power",
|
||||
"Item_Slasher_K27Power",
|
||||
"Item_Slasher_K28Power",
|
||||
"Item_Slasher_K29Power",
|
||||
"Item_Slasher_K30Power",
|
||||
"Item_Slasher_K31Power",
|
||||
"Item_Slasher_K32Power",
|
||||
"Item_Slasher_K33Power",
|
||||
"Item_Slasher_K34Power",
|
||||
"Item_Slasher_K35Power",
|
||||
"Item_Slasher_K36Power",
|
||||
"Item_Slasher_K37Power",
|
||||
"Item_Slasher_K38Power",
|
||||
"Item_Slasher_K39Power",
|
||||
"Item_Slasher_K40Power",
|
||||
"Item_Slasher_K41Power",
|
||||
"Item_Slasher_K42Power",
|
||||
"Item_Slasher_Kanobo",
|
||||
"Item_Slasher_Killer07Item",
|
||||
"Item_Slasher_LFChainsaw",
|
||||
"Item_Slasher_PhantomTrap",
|
||||
"Item_Slasher_PhaseWalker",
|
||||
"Item_Slasher_PlaguePower",
|
||||
"Item_Slasher_QatarKillerPower",
|
||||
"Item_Slasher_ReverseBearTrap",
|
||||
"Item_Slasher_Stalker",
|
||||
"Item_Slasher_ThrowingKnives",
|
||||
"Item_Slasher_TormentMode"
|
||||
]
|
||||
}
|
||||
"Campers": [
|
||||
"FireflyLantern",
|
||||
"Item_Camper_AlexsToolbox",
|
||||
"Item_Camper_AnniversaryToolbox",
|
||||
"Item_Camper_BeigeMap",
|
||||
"Item_Camper_BrokenKey",
|
||||
"Item_Camper_CommodiousToolbox",
|
||||
"Item_Camper_ContaminationSerum",
|
||||
"Item_Camper_DullKey",
|
||||
"Item_Camper_EngineerToolbox",
|
||||
"Item_Camper_FadedMap",
|
||||
"Item_Camper_Firecracker_Anniversary2019",
|
||||
"Item_Camper_Firecracker_Chinese",
|
||||
"Item_Camper_Firecracker_Flashbang",
|
||||
"Item_Camper_Firecracker_WinterEvent",
|
||||
"Item_Camper_Flashlight",
|
||||
"Item_Camper_Flashlight_Anniversary2020",
|
||||
"Item_Camper_Flashlight_Anniversary2022",
|
||||
"Item_Camper_Flashlight_Random",
|
||||
"Item_Camper_Flashlight02",
|
||||
"Item_Camper_Flashlight03",
|
||||
"Item_Camper_Flashlight04",
|
||||
"Item_Camper_JerryCan_Spring2025",
|
||||
"Item_Camper_K29InfectionRemover",
|
||||
"Item_Camper_K32Emp",
|
||||
"Item_Camper_K36MagicItem_Boots",
|
||||
"Item_Camper_K36MagicItem_Bracers",
|
||||
"Item_Camper_K36MagicItem_VecnaEye",
|
||||
"Item_Camper_K36MagicItem_VecnaHand",
|
||||
"Item_Camper_Key",
|
||||
"Item_Camper_Key_Random",
|
||||
"Item_Camper_LunarToolbox",
|
||||
"Item_Camper_Map_Random",
|
||||
"Item_Camper_Map_Spring2024",
|
||||
"Item_Camper_MechanicsToolbox",
|
||||
"Item_Camper_MedKit",
|
||||
"Item_Camper_Medkit_Anniversary2020",
|
||||
"Item_Camper_Medkit_Anniversary2022",
|
||||
"Item_Camper_MedKit_Random",
|
||||
"Item_Camper_MedKit02",
|
||||
"Item_Camper_MedKit03",
|
||||
"Item_Camper_MedKit04",
|
||||
"Item_Camper_Medkit05",
|
||||
"Item_Camper_RainbowMap",
|
||||
"Item_Camper_Toolbox",
|
||||
"Item_Camper_Toolbox_Anniversary2022",
|
||||
"Item_Camper_Toolbox_Random",
|
||||
"Item_Camper_VoidBomb_Halloween2024",
|
||||
"Item_Camper_WornoutToolbox",
|
||||
"Item_FragileObject",
|
||||
"Item_Survivor_CalamariContaminationAntidote",
|
||||
"Item_Survivor_K41Mushroom",
|
||||
"Item_Survivor_MakeshiftFogVial",
|
||||
"Item_Survivor_PrototypeFogVial",
|
||||
"Item_Survivor_VigosFogVial"
|
||||
]
|
||||
}
|
||||
Binary file not shown.
Binary file not shown.
+30
-28
@@ -32,6 +32,36 @@
|
||||
"TanagerWreath"
|
||||
],
|
||||
"Campers": [
|
||||
"BlackSaltStatuette",
|
||||
"BogLaurelSachet",
|
||||
"BoundEnvelope",
|
||||
"ChalkPouch",
|
||||
"CreamChalkPouch",
|
||||
"CrispleafAmaranthSachet",
|
||||
"EscapeCake",
|
||||
"FragrantBogLaurel",
|
||||
"FragrantCrispleafAmaranth",
|
||||
"FragrantPrimroseBlossom",
|
||||
"FragrantSweetWilliam",
|
||||
"FreshBogLaurel",
|
||||
"FreshCrispleafAmaranth",
|
||||
"FreshPrimroseBlossom",
|
||||
"FreshSweetWilliam",
|
||||
"IvoryChalkPouch",
|
||||
"PetrifiedOak",
|
||||
"PrimroseBlossomSachet",
|
||||
"SaltPouch",
|
||||
"SealedEnvelope",
|
||||
"ShinyCoin",
|
||||
"ShroudofBinding",
|
||||
"ShroudofUnion",
|
||||
"SweetWilliamSachet",
|
||||
"TarnishedCoin",
|
||||
"VigosJarOfSaltyLips",
|
||||
"VigosShroud",
|
||||
"WhiteWard"
|
||||
],
|
||||
"All": [
|
||||
"Anniversary2019Offering",
|
||||
"Anniversary2020Offering",
|
||||
"Anniversary2021Offering",
|
||||
@@ -41,33 +71,18 @@
|
||||
"Anniversary2025Offering",
|
||||
"AnnotatedBlueprint",
|
||||
"AzarovKey",
|
||||
"BlackSaltStatuette",
|
||||
"BloodiedBlueprint",
|
||||
"BloodyPartyStreamers",
|
||||
"BogLaurelSachet",
|
||||
"BoundEnvelope",
|
||||
"CattleTag28",
|
||||
"ChalkPouch",
|
||||
"CharredWeddingPhotograph",
|
||||
"ChildrensBook",
|
||||
"ClearReagent",
|
||||
"ColdwindCattleTag81",
|
||||
"CreamChalkPouch",
|
||||
"CrescentMoonBouquet",
|
||||
"CrispleafAmaranthSachet",
|
||||
"DecrepitClapboard",
|
||||
"EclipseThemeOffering",
|
||||
"EmergencyCertificate",
|
||||
"EscapeCake",
|
||||
"FaintReagent",
|
||||
"FragrantBogLaurel",
|
||||
"FragrantCrispleafAmaranth",
|
||||
"FragrantPrimroseBlossom",
|
||||
"FragrantSweetWilliam",
|
||||
"FreshBogLaurel",
|
||||
"FreshCrispleafAmaranth",
|
||||
"FreshPrimroseBlossom",
|
||||
"FreshSweetWilliam",
|
||||
"FullMoonBouquet",
|
||||
"FumingCordage",
|
||||
"FumingWelcomeSign",
|
||||
@@ -79,7 +94,6 @@
|
||||
"HazyReagent",
|
||||
"HeartLocket",
|
||||
"IonThemeOffering",
|
||||
"IvoryChalkPouch",
|
||||
"JapaneseCountrySide",
|
||||
"Jigsawpiece",
|
||||
"KenyaThemeOffering",
|
||||
@@ -91,8 +105,6 @@
|
||||
"NewMoonBouquet",
|
||||
"PaintedRiverRock",
|
||||
"PElliotLunacyTicket",
|
||||
"PetrifiedOak",
|
||||
"PrimroseBlossomSachet",
|
||||
"PsychiatricAssessmentReport",
|
||||
"QatarThemeOffering",
|
||||
"QuantumThemeOffering",
|
||||
@@ -100,30 +112,20 @@
|
||||
"QuicheThemeOffering",
|
||||
"RedMoney",
|
||||
"SacrificalWard",
|
||||
"SaltPouch",
|
||||
"SealedEnvelope",
|
||||
"ShatteredGlasses",
|
||||
"ShinyCoin",
|
||||
"ShreddedPlate",
|
||||
"ShroudofBinding",
|
||||
"ShroudofUnion",
|
||||
"SignedLedgerPage",
|
||||
"Spring2024Offering",
|
||||
"StrodeRealtyKey",
|
||||
"SummerOffering",
|
||||
"SweetWilliamSachet",
|
||||
"TarnishedCoin",
|
||||
"TheLastMask",
|
||||
"ThePiedPiper",
|
||||
"TornBlueprint",
|
||||
"UkraineThemeOffering",
|
||||
"UmbraThemeOffering",
|
||||
"VigosBlueprint",
|
||||
"VigosJarOfSaltyLips",
|
||||
"VigosShroud",
|
||||
"VirginiaPlate",
|
||||
"WalesThemeOffering",
|
||||
"WhiteWard",
|
||||
"Winter2024Offering",
|
||||
"WormholeThemeOffering"
|
||||
]
|
||||
|
||||
@@ -0,0 +1,12 @@
|
||||
public static class Constants
|
||||
{
|
||||
public static readonly string MappingURL = "https://git.neru.rip/neru/UnlockedByDaylight/raw/branch/main/res/mappings/latest-xbox.usmap";
|
||||
|
||||
public static readonly string PackageName = "BehaviourInteractive.DeadbyDaylightWindows";
|
||||
|
||||
public static readonly string AESKey = "0x22B1639B548124925CF7B9CBAA09F9AC295FCF0324586D6B37EE1D42670B39B3";
|
||||
|
||||
public static readonly string[] BlacklistedCustomizationItems = ["NK_Torso01_Crew01Kraken"];
|
||||
|
||||
public static readonly string[] BlacklistedDLCNames = ["development", "steamOnly", "0", "boreal"];
|
||||
}
|
||||
@@ -0,0 +1,40 @@
|
||||
public enum EItemAvailability : byte
|
||||
{
|
||||
Available,
|
||||
Disabled,
|
||||
Retired
|
||||
}
|
||||
|
||||
public enum ECustomizationCategory : byte
|
||||
{
|
||||
None,
|
||||
SurvivorHead,
|
||||
SurvivorTorso,
|
||||
SurvivorLegs,
|
||||
KillerHead,
|
||||
KillerBody,
|
||||
KillerWeapon,
|
||||
Outfits,
|
||||
Charm,
|
||||
Badge,
|
||||
Banner,
|
||||
PortraitBackground
|
||||
}
|
||||
|
||||
public enum EPlayerRole : byte
|
||||
{
|
||||
VE_None,
|
||||
VE_Slasher,
|
||||
VE_Camper,
|
||||
VE_Observer
|
||||
}
|
||||
|
||||
public struct AvailabilityStruct
|
||||
{
|
||||
public EItemAvailability itemAvailability;
|
||||
public string DLCId;
|
||||
public string[] AdditionalDlcIds;
|
||||
public Int32 CloudInventoryId;
|
||||
public string CommunityId;
|
||||
public bool _isLicensed;
|
||||
}
|
||||
@@ -0,0 +1,473 @@
|
||||
using CUE4Parse.Compression;
|
||||
using CUE4Parse.Encryption.Aes;
|
||||
using CUE4Parse.FileProvider;
|
||||
using CUE4Parse.MappingsProvider;
|
||||
using CUE4Parse.UE4.Assets.Exports.Engine;
|
||||
using CUE4Parse.UE4.Assets.Exports.Texture;
|
||||
using CUE4Parse.UE4.Assets.Objects;
|
||||
using CUE4Parse.UE4.Objects.Core.Misc;
|
||||
using CUE4Parse.UE4.Versions;
|
||||
using CUE4Parse.UE4.VirtualFileSystem;
|
||||
using CUE4Parse.Utils;
|
||||
using Microsoft.Win32;
|
||||
using Newtonsoft.Json;
|
||||
class Dumper
|
||||
{
|
||||
private DefaultFileProvider? _provider = null;
|
||||
private IAesVfsReader? _dataPak = null;
|
||||
|
||||
public async Task<bool> InitAsync()
|
||||
{
|
||||
/*
|
||||
* ensure mapping
|
||||
*/
|
||||
string mappingPath;
|
||||
|
||||
string baseDir = AppDomain.CurrentDomain.BaseDirectory;
|
||||
string localMappingPath = Path.GetFullPath(Path.Combine(baseDir, "..", "..", "..", "res", "mappings", "latest-xbox.usmap"));
|
||||
if (File.Exists(localMappingPath))
|
||||
mappingPath = localMappingPath;
|
||||
else
|
||||
{
|
||||
mappingPath = Path.Combine(Path.GetTempPath(), "DeadByDaylight.usmap");
|
||||
bool hasDownloadedMapping = await DownloadMappingFileAsync(Constants.MappingURL, mappingPath);
|
||||
if (!hasDownloadedMapping)
|
||||
return false;
|
||||
}
|
||||
|
||||
/*
|
||||
* compression setup
|
||||
*/
|
||||
ZlibHelper.Initialize();
|
||||
|
||||
var oodlePath = Path.Combine(AppDomain.CurrentDomain.BaseDirectory, OodleHelper.OodleFileName);
|
||||
OodleHelper.Initialize(oodlePath);
|
||||
|
||||
/*
|
||||
* game localization
|
||||
*/
|
||||
var gamePath = getGamePath();
|
||||
if (gamePath == null) return false;
|
||||
|
||||
var pakDir = gamePath + "\\DeadByDaylight\\Content\\Paks";
|
||||
if (!Directory.Exists(pakDir))
|
||||
{
|
||||
Console.WriteLine("PAK dir does not exist. (Invalid install?)");
|
||||
return false;
|
||||
}
|
||||
|
||||
/*
|
||||
* provider setup
|
||||
*/
|
||||
var version = new VersionContainer(EGame.GAME_DeadByDaylight, ETexturePlatform.DesktopMobile);
|
||||
_provider = new DefaultFileProvider(pakDir, SearchOption.TopDirectoryOnly, version);
|
||||
_provider.MappingsContainer = new FileUsmapTypeMappingsProvider(mappingPath);
|
||||
|
||||
_provider.Initialize();
|
||||
_provider.SubmitKey(new FGuid(), new FAesKey(Constants.AESKey));
|
||||
_provider.Mount();
|
||||
|
||||
/*
|
||||
* load db pak
|
||||
*/
|
||||
bool hasDataPak = _provider.TryGetArchive("pakchunk4-WinGDK.utoc", out _dataPak);
|
||||
if (!hasDataPak)
|
||||
{
|
||||
Console.WriteLine("Failed to load pakchunk4-WinGDK.utoc");
|
||||
return false;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
public string? DumpCustomizationItems()
|
||||
{
|
||||
if (_dataPak == null || _provider == null) return null;
|
||||
|
||||
var searchPaths = _dataPak.Files.Keys.Where(x => x.Contains($"/CustomizationItemDB.uasset", StringComparison.OrdinalIgnoreCase)).ToList();
|
||||
|
||||
var characterItems = new List<string>();
|
||||
var outfits = new List<string>();
|
||||
|
||||
foreach (var path in searchPaths)
|
||||
{
|
||||
var cleanPath = path.Contains('.') ? path.Substring(0, path.LastIndexOf('.')) : path;
|
||||
if (_provider.TryLoadPackageObject<UDataTable>(cleanPath, out var dataTable))
|
||||
{
|
||||
foreach (var row in dataTable.RowMap)
|
||||
{
|
||||
/*
|
||||
* props
|
||||
*/
|
||||
var props = row.Value.Properties;
|
||||
|
||||
FPropertyTag? categoryProp = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Category");
|
||||
if (categoryProp == null || categoryProp.Tag == null) continue;
|
||||
|
||||
FPropertyTag? availabilityProp = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Availability");
|
||||
if (availabilityProp == null || availabilityProp.Tag == null) continue;
|
||||
|
||||
FStructFallback? availabilityFallback = availabilityProp.Tag.GetValue<FStructFallback>();
|
||||
if (availabilityFallback == null) continue;
|
||||
|
||||
/*
|
||||
* real data
|
||||
*/
|
||||
string itemName = row.Key.Text;
|
||||
AvailabilityStruct availability = availabilityFallback.MapToStruct<AvailabilityStruct>();
|
||||
ECustomizationCategory category = categoryProp.Tag.GetValue<ECustomizationCategory>();
|
||||
|
||||
/*
|
||||
* sketchy item filtering
|
||||
*/
|
||||
if (availability.DLCId == "development") continue;
|
||||
if (category < ECustomizationCategory.SurvivorHead || category > ECustomizationCategory.KillerWeapon) continue;
|
||||
if (Constants.BlacklistedCustomizationItems.Contains(itemName)) continue;
|
||||
|
||||
/*
|
||||
* storing
|
||||
*/
|
||||
characterItems.Add(itemName);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
searchPaths = _dataPak.Files.Keys.Where(x => x.Contains($"/OutfitDB.uasset", StringComparison.OrdinalIgnoreCase)).ToList();
|
||||
|
||||
foreach (var path in searchPaths)
|
||||
{
|
||||
var cleanPath = path.Contains('.') ? path.Substring(0, path.LastIndexOf('.')) : path;
|
||||
if (_provider.TryLoadPackageObject<UDataTable>(cleanPath, out var dataTable))
|
||||
{
|
||||
foreach (var row in dataTable.RowMap)
|
||||
{
|
||||
/*
|
||||
* props
|
||||
*/
|
||||
var props = row.Value.Properties;
|
||||
|
||||
FPropertyTag? availabilityProp = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Availability");
|
||||
if (availabilityProp == null || availabilityProp.Tag == null) continue;
|
||||
|
||||
FStructFallback? availabilityFallback = availabilityProp.Tag.GetValue<FStructFallback>();
|
||||
if (availabilityFallback == null) continue;
|
||||
|
||||
/*
|
||||
* real data
|
||||
*/
|
||||
string outfitName = row.Key.Text;
|
||||
AvailabilityStruct availability = availabilityFallback.MapToStruct<AvailabilityStruct>();
|
||||
|
||||
if (availability.DLCId == "development")
|
||||
continue;
|
||||
|
||||
outfits.Add(outfitName);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
var customizationsSerialized = new
|
||||
{
|
||||
Items = characterItems.OrderBy(x => x).ToList(),
|
||||
Outfits = outfits.OrderBy(x => x).ToList()
|
||||
};
|
||||
|
||||
return JsonConvert.SerializeObject(customizationsSerialized, Formatting.Indented);
|
||||
}
|
||||
|
||||
public string? DumpItems()
|
||||
{
|
||||
if (_dataPak == null || _provider == null) return null;
|
||||
|
||||
var searchPaths = _dataPak.Files.Keys.Where(x => x.Contains($"/ItemDB.uasset", StringComparison.OrdinalIgnoreCase)).ToList();
|
||||
|
||||
var camperItems = new List<string>();
|
||||
//var slasherPowers = new List<string>();
|
||||
|
||||
foreach (var path in searchPaths)
|
||||
{
|
||||
var cleanPath = path.Contains('.') ? path.Substring(0, path.LastIndexOf('.')) : path;
|
||||
if (_provider.TryLoadPackageObject<UDataTable>(cleanPath, out var dataTable))
|
||||
{
|
||||
foreach (var row in dataTable.RowMap)
|
||||
{
|
||||
/*
|
||||
* props
|
||||
*/
|
||||
var props = row.Value.Properties;
|
||||
|
||||
FPropertyTag? roleProp = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Role");
|
||||
if (roleProp == null || roleProp.Tag == null) continue;
|
||||
|
||||
//FPropertyTag? typeProp = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Type");
|
||||
//if (typeProp == null || typeProp.Tag == null) continue;
|
||||
|
||||
/*
|
||||
* real data
|
||||
*/
|
||||
string itemName = row.Key.Text;
|
||||
EPlayerRole role = roleProp.Tag.GetValue<EPlayerRole>();
|
||||
|
||||
if (role == EPlayerRole.VE_Camper)
|
||||
camperItems.Add(itemName);
|
||||
//else
|
||||
// slasherPowers.Add(itemName);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
var itemsSerialized = new
|
||||
{
|
||||
Campers = camperItems.OrderBy(x => x).ToList()
|
||||
};
|
||||
|
||||
return JsonConvert.SerializeObject(itemsSerialized, Formatting.Indented);
|
||||
}
|
||||
|
||||
public string? DumpAddons()
|
||||
{
|
||||
if (_dataPak == null || _provider == null) return null;
|
||||
|
||||
var searchPaths = _dataPak.Files.Keys.Where(x => x.Contains($"/ItemAddonDB.uasset", StringComparison.OrdinalIgnoreCase)).ToList();
|
||||
|
||||
var camperAddons = new List<string>();
|
||||
var slasherAddons = new List<string>();
|
||||
|
||||
foreach (var path in searchPaths)
|
||||
{
|
||||
var cleanPath = path.Contains('.') ? path.Substring(0, path.LastIndexOf('.')) : path;
|
||||
if (_provider.TryLoadPackageObject<UDataTable>(cleanPath, out var dataTable))
|
||||
{
|
||||
foreach (var row in dataTable.RowMap)
|
||||
{
|
||||
/*
|
||||
* props
|
||||
*/
|
||||
var props = row.Value.Properties;
|
||||
|
||||
FPropertyTag? roleProp = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Role");
|
||||
if (roleProp == null || roleProp.Tag == null) continue;
|
||||
|
||||
/*
|
||||
* real data
|
||||
*/
|
||||
string itemName = row.Key.Text;
|
||||
EPlayerRole role = roleProp.Tag.GetValue<EPlayerRole>();
|
||||
|
||||
if (role == EPlayerRole.VE_Camper)
|
||||
camperAddons.Add(itemName);
|
||||
else
|
||||
slasherAddons.Add(itemName);
|
||||
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
var addonsSerialized = new
|
||||
{
|
||||
Slashers = slasherAddons.OrderBy(x => x).ToList(),
|
||||
Campers = camperAddons.OrderBy(x => x).ToList()
|
||||
};
|
||||
|
||||
return JsonConvert.SerializeObject(addonsSerialized, Formatting.Indented);
|
||||
}
|
||||
|
||||
public string? DumpOfferings()
|
||||
{
|
||||
if (_dataPak == null || _provider == null) return null;
|
||||
|
||||
var searchPaths = _dataPak.Files.Keys.Where(x => x.Contains($"/OfferingDB.uasset", StringComparison.OrdinalIgnoreCase)).ToList();
|
||||
|
||||
var globalOfferings = new List<string>();
|
||||
var camperOfferings = new List<string>();
|
||||
var slasherOfferings = new List<string>();
|
||||
|
||||
foreach (var path in searchPaths)
|
||||
{
|
||||
var cleanPath = path.Contains('.') ? path.Substring(0, path.LastIndexOf('.')) : path;
|
||||
if (_provider.TryLoadPackageObject<UDataTable>(cleanPath, out var dataTable))
|
||||
{
|
||||
foreach (var row in dataTable.RowMap)
|
||||
{
|
||||
/*
|
||||
* props
|
||||
*/
|
||||
var props = row.Value.Properties;
|
||||
|
||||
FPropertyTag? roleProp = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Role");
|
||||
if (roleProp == null || roleProp.Tag == null) continue;
|
||||
|
||||
/*
|
||||
* real data
|
||||
*/
|
||||
string itemName = row.Key.Text;
|
||||
EPlayerRole role = roleProp.Tag.GetValue<EPlayerRole>();
|
||||
|
||||
if (role == EPlayerRole.VE_Camper)
|
||||
camperOfferings.Add(itemName);
|
||||
else if (role == EPlayerRole.VE_Slasher)
|
||||
slasherOfferings.Add(itemName);
|
||||
else
|
||||
globalOfferings.Add(itemName);
|
||||
}
|
||||
}
|
||||
}
|
||||
var offeringsSerialized = new
|
||||
{
|
||||
Slashers = slasherOfferings.OrderBy(x => x).ToList(),
|
||||
Campers = camperOfferings.OrderBy(x => x).ToList(),
|
||||
All = globalOfferings.OrderBy(x => x).ToList()
|
||||
};
|
||||
|
||||
return JsonConvert.SerializeObject(offeringsSerialized, Formatting.Indented);
|
||||
}
|
||||
|
||||
public string? DumpPerks()
|
||||
{
|
||||
if (_dataPak == null || _provider == null) return null;
|
||||
|
||||
var searchPaths = _dataPak.Files.Keys.Where(x => x.Contains($"/PerkDB.uasset", StringComparison.OrdinalIgnoreCase)).ToList();
|
||||
|
||||
var camperPerks = new List<string>();
|
||||
var slasherPerks = new List<string>();
|
||||
|
||||
foreach (var path in searchPaths)
|
||||
{
|
||||
var cleanPath = path.Contains('.') ? path.Substring(0, path.LastIndexOf('.')) : path;
|
||||
if (_provider.TryLoadPackageObject<UDataTable>(cleanPath, out var dataTable))
|
||||
{
|
||||
foreach (var row in dataTable.RowMap)
|
||||
{
|
||||
/*
|
||||
* props
|
||||
*/
|
||||
var props = row.Value.Properties;
|
||||
|
||||
FPropertyTag? roleProp = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Role");
|
||||
if (roleProp == null || roleProp.Tag == null) continue;
|
||||
|
||||
/*
|
||||
* real data
|
||||
*/
|
||||
string itemName = row.Key.Text;
|
||||
EPlayerRole role = roleProp.Tag.GetValue<EPlayerRole>();
|
||||
|
||||
if (role == EPlayerRole.VE_Camper)
|
||||
camperPerks.Add(itemName);
|
||||
else
|
||||
slasherPerks.Add(itemName);
|
||||
}
|
||||
}
|
||||
}
|
||||
var perksSerialized = new
|
||||
{
|
||||
Slashers = slasherPerks.OrderBy(x => x).ToList(),
|
||||
Campers = camperPerks.OrderBy(x => x).ToList()
|
||||
};
|
||||
|
||||
return JsonConvert.SerializeObject(perksSerialized, Formatting.Indented);
|
||||
}
|
||||
|
||||
public struct DLCInfo
|
||||
{
|
||||
public string name;
|
||||
public string? grdk;
|
||||
public string? egs;
|
||||
public string? steam;
|
||||
};
|
||||
|
||||
public string? DumpDLCs()
|
||||
{
|
||||
if (_dataPak == null || _provider == null) return null;
|
||||
|
||||
var searchPaths = _dataPak.Files.Keys.Where(x => x.Contains($"/DlcDB.uasset", StringComparison.OrdinalIgnoreCase)).ToList();
|
||||
|
||||
var dlcs = new List<DLCInfo>();
|
||||
|
||||
foreach (var path in searchPaths)
|
||||
{
|
||||
var cleanPath = path.Contains('.') ? path.Substring(0, path.LastIndexOf('.')) : path;
|
||||
if (_provider.TryLoadPackageObject<UDataTable>(cleanPath, out var dataTable))
|
||||
{
|
||||
foreach (var row in dataTable.RowMap)
|
||||
{
|
||||
/*
|
||||
* props
|
||||
*/
|
||||
var props = row.Value.Properties;
|
||||
|
||||
FPropertyTag? steamIdProp = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "DlcIdSteam");
|
||||
FPropertyTag? grdkIdProp = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "DlcIdGRDK");
|
||||
FPropertyTag? epicIdProp = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "DlcIdEpic");
|
||||
|
||||
/*
|
||||
* real data
|
||||
*/
|
||||
string dlcName = row.Key.Text;
|
||||
if (Constants.BlacklistedDLCNames.Contains(dlcName)) continue;
|
||||
|
||||
string? steamId = null, grdkId = null, epicId = null;
|
||||
|
||||
if (steamIdProp != null && steamIdProp.Tag != null)
|
||||
steamId = steamIdProp.Tag.GetValue<string>();
|
||||
|
||||
if (grdkIdProp != null && grdkIdProp.Tag != null)
|
||||
grdkId = grdkIdProp.Tag.GetValue<string>();
|
||||
|
||||
if (epicIdProp != null && epicIdProp.Tag != null)
|
||||
epicId = epicIdProp.Tag.GetValue<string>();
|
||||
|
||||
var info = new DLCInfo
|
||||
{
|
||||
name = dlcName,
|
||||
steam = steamId,
|
||||
grdk = grdkId,
|
||||
egs = epicId
|
||||
};
|
||||
|
||||
dlcs.Add(info);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return JsonConvert.SerializeObject(dlcs, Formatting.Indented);
|
||||
}
|
||||
private string? getGamePath()
|
||||
{
|
||||
const string packagesPath = @"Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Repository\Packages";
|
||||
|
||||
using var key = Registry.CurrentUser.OpenSubKey(packagesPath);
|
||||
|
||||
if (key == null) return null;
|
||||
string? matchingKeyName = key.GetSubKeyNames()
|
||||
.FirstOrDefault(name => name.StartsWith(Constants.PackageName, StringComparison.OrdinalIgnoreCase));
|
||||
|
||||
if (matchingKeyName != null)
|
||||
{
|
||||
using (RegistryKey? subKey = key.OpenSubKey(matchingKeyName))
|
||||
return subKey?.GetValue("PackageRootFolder")?.ToString();
|
||||
}
|
||||
|
||||
Console.WriteLine("Failed to find game install dir");
|
||||
return null;
|
||||
}
|
||||
private async Task<bool> DownloadMappingFileAsync(string url, string outPath)
|
||||
{
|
||||
try
|
||||
{
|
||||
using (var httpClient = new HttpClient())
|
||||
{
|
||||
var bytes = await httpClient.GetByteArrayAsync(url);
|
||||
Console.WriteLine("Downloading mapping file...");
|
||||
await File.WriteAllBytesAsync(outPath, bytes);
|
||||
Console.WriteLine($"Mapping file downloaded to: {outPath}");
|
||||
return true;
|
||||
}
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
Console.WriteLine($"Error occured while downloading mapping: {ex.Message}");
|
||||
}
|
||||
return false;
|
||||
}
|
||||
}
|
||||
+38
-226
@@ -1,228 +1,40 @@
|
||||
using CUE4Parse.Compression;
|
||||
using CUE4Parse.Encryption.Aes;
|
||||
using CUE4Parse.FileProvider;
|
||||
using CUE4Parse.MappingsProvider;
|
||||
using CUE4Parse.UE4.Assets.Exports.Actor;
|
||||
using CUE4Parse.UE4.Assets.Exports.Engine;
|
||||
using CUE4Parse.UE4.Assets.Exports.Texture;
|
||||
using CUE4Parse.UE4.Assets.Objects.Properties;
|
||||
using CUE4Parse.UE4.Objects.Core.Misc;
|
||||
using CUE4Parse.UE4.Objects.UObject;
|
||||
using CUE4Parse.UE4.Versions;
|
||||
using Newtonsoft.Json;
|
||||
|
||||
class DumpByDaylight
|
||||
int displayError(string err)
|
||||
{
|
||||
private const string _pakDir = "D:\\XboxGames\\Dead By Daylight\\Content\\DeadByDaylight\\Content\\Paks";
|
||||
private const string _aesKey = "0x22B1639B548124925CF7B9CBAA09F9AC295FCF0324586D6B37EE1D42670B39B3";
|
||||
private const string _mappingURL = "https://git.neru.rip/neru/UnlockedByDaylight/raw/branch/main/res/mappings/latest-xbox.usmap";
|
||||
|
||||
public static async Task<string?> DownloadMappingFileAsync(string url, string savePath)
|
||||
{
|
||||
try
|
||||
{
|
||||
using (var httpClient = new HttpClient())
|
||||
{
|
||||
Console.WriteLine("downloading mapping file...");
|
||||
var bytes = await httpClient.GetByteArrayAsync(url);
|
||||
await File.WriteAllBytesAsync(savePath, bytes);
|
||||
Console.WriteLine($"mapping file downloaded to: {savePath}");
|
||||
return savePath;
|
||||
}
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
Console.WriteLine($"failed to download mapping: {ex.Message}");
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
static async Task Main(string[] args)
|
||||
{
|
||||
// mapping
|
||||
string mappingPath = Path.Combine(Path.GetTempPath(), "DeadByDaylight.usmap");
|
||||
string? downloadedMapping = await DownloadMappingFileAsync(_mappingURL, mappingPath);
|
||||
|
||||
if (string.IsNullOrEmpty(downloadedMapping))
|
||||
{
|
||||
Console.WriteLine("failed to download mapping file, press any key to exit");
|
||||
Console.ReadKey();
|
||||
return;
|
||||
}
|
||||
|
||||
ZlibHelper.Initialize();
|
||||
|
||||
var oodlePath = Path.Combine(AppDomain.CurrentDomain.BaseDirectory, OodleHelper.OodleFileName);
|
||||
OodleHelper.Initialize(oodlePath);
|
||||
|
||||
|
||||
// parsing setup
|
||||
var version = new VersionContainer(EGame.GAME_DeadByDaylight, ETexturePlatform.DesktopMobile);
|
||||
var provider = new DefaultFileProvider(_pakDir, SearchOption.TopDirectoryOnly, version);
|
||||
provider.MappingsContainer = new FileUsmapTypeMappingsProvider(downloadedMapping);
|
||||
|
||||
provider.Initialize();
|
||||
provider.SubmitKey(new FGuid(), new FAesKey(_aesKey));
|
||||
provider.Mount();
|
||||
|
||||
Console.WriteLine("\nProvider Initialized. Extracting Databases...");
|
||||
|
||||
var dataPak = provider.GetArchive("pakchunk4-WinGDK.utoc");
|
||||
|
||||
/*
|
||||
* itemdb dump
|
||||
*/
|
||||
var searchPaths = dataPak.Files.Keys.Where(x => x.Contains($"/ItemDB.uasset", StringComparison.OrdinalIgnoreCase)).ToList();
|
||||
var camperItems = new List<string>();
|
||||
|
||||
var slasherPowers = new List<string>();
|
||||
|
||||
foreach (var path in searchPaths)
|
||||
{
|
||||
var cleanPath = path.Contains('.') ? path.Substring(0, path.LastIndexOf('.')) : path;
|
||||
if (provider.TryLoadPackageObject<UDataTable>(cleanPath, out var dataTable))
|
||||
{
|
||||
Console.WriteLine($"getting items / powers from {Path.GetFullPath(path)}");
|
||||
|
||||
foreach (var row in dataTable.RowMap)
|
||||
{
|
||||
var roleProperty = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Role");
|
||||
var typeProperty = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Type");
|
||||
if (typeProperty?.Tag is EnumProperty typeProp && roleProperty?.Tag is EnumProperty roleProp)
|
||||
{
|
||||
string typeName = typeProp.Value.ToString() ?? "null";
|
||||
string roleName = roleProp.Value.ToString() ?? "null";
|
||||
|
||||
if (roleName == "EPlayerRole::VE_Slasher")
|
||||
slasherPowers.Add(row.Key.Text);
|
||||
else
|
||||
camperItems.Add(row.Key.Text);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
var itemsSerialized = new
|
||||
{
|
||||
Camper = new { Items = camperItems.OrderBy(x => x).ToList() },
|
||||
Slasher = new { Powers = slasherPowers.OrderBy(x => x).ToList() }
|
||||
};
|
||||
File.WriteAllText("items.json", JsonConvert.SerializeObject(itemsSerialized, Formatting.Indented));
|
||||
|
||||
/*
|
||||
* addon dump
|
||||
*/
|
||||
searchPaths = dataPak.Files.Keys.Where(x => x.Contains($"/ItemAddonDB.uasset", StringComparison.OrdinalIgnoreCase)).ToList();
|
||||
var camperAddons = new List<string>();
|
||||
var slasherAddons = new List<string>();
|
||||
|
||||
foreach (var path in searchPaths)
|
||||
{
|
||||
var cleanPath = path.Contains('.') ? path.Substring(0, path.LastIndexOf('.')) : path;
|
||||
if (provider.TryLoadPackageObject<UDataTable>(cleanPath, out var dataTable))
|
||||
{
|
||||
Console.WriteLine($"getting item / power addons from {Path.GetFullPath(path)}");
|
||||
|
||||
foreach (var row in dataTable.RowMap)
|
||||
{
|
||||
bool isSlasherAddon = false;
|
||||
var roleProperty = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Role");
|
||||
if (roleProperty?.Tag is EnumProperty roleEnumProp)
|
||||
{
|
||||
string roleName = roleEnumProp.Value.ToString() ?? "null";
|
||||
if (roleName == "EPlayerRole::VE_Slasher")
|
||||
isSlasherAddon = true;
|
||||
}
|
||||
|
||||
if (isSlasherAddon)
|
||||
slasherAddons.Add(row.Key.Text);
|
||||
else
|
||||
camperAddons.Add(row.Key.Text);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
var addonsSerialized = new
|
||||
{
|
||||
Slashers = slasherAddons.OrderBy(x => x).ToList(),
|
||||
Campers = camperAddons.OrderBy(x => x).ToList()
|
||||
};
|
||||
File.WriteAllText("addons.json", JsonConvert.SerializeObject(addonsSerialized, Formatting.Indented));
|
||||
|
||||
/*
|
||||
* offerings
|
||||
*/
|
||||
searchPaths = dataPak.Files.Keys.Where(x => x.Contains($"/OfferingDB.uasset", StringComparison.OrdinalIgnoreCase)).ToList();
|
||||
|
||||
var camperOfferings = new List<string>();
|
||||
var slasherOfferings = new List<string>();
|
||||
|
||||
foreach (var path in searchPaths)
|
||||
{
|
||||
var cleanPath = path.Contains('.') ? path.Substring(0, path.LastIndexOf('.')) : path;
|
||||
if (provider.TryLoadPackageObject<UDataTable>(cleanPath, out var dataTable))
|
||||
{
|
||||
Console.WriteLine($"getting offerings from {Path.GetFullPath(path)}");
|
||||
|
||||
foreach (var row in dataTable.RowMap)
|
||||
{
|
||||
var roleProperty = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Role");
|
||||
if (roleProperty?.Tag is EnumProperty roleEnumProp)
|
||||
{
|
||||
string roleName = roleEnumProp.Value.ToString() ?? "null";
|
||||
if (roleName == "EPlayerRole::VE_Slasher")
|
||||
slasherOfferings.Add(row.Key.Text);
|
||||
else
|
||||
camperOfferings.Add(row.Key.Text);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
var offeringsSerialized = new
|
||||
{
|
||||
Slashers = slasherOfferings.OrderBy(x => x).ToList(),
|
||||
Campers = camperOfferings.OrderBy(x => x).ToList()
|
||||
};
|
||||
File.WriteAllText("offerings.json", JsonConvert.SerializeObject(offeringsSerialized, Formatting.Indented));
|
||||
|
||||
/*
|
||||
* perks
|
||||
*/
|
||||
searchPaths = dataPak.Files.Keys.Where(x => x.Contains($"/PerkDB.uasset", StringComparison.OrdinalIgnoreCase)).ToList();
|
||||
|
||||
var slasherPerks = new List<string>();
|
||||
var camperPerks = new List<string>();
|
||||
|
||||
foreach (var path in searchPaths)
|
||||
{
|
||||
var cleanPath = path.Contains('.') ? path.Substring(0, path.LastIndexOf('.')) : path;
|
||||
if (provider.TryLoadPackageObject<UDataTable>(cleanPath, out var dataTable))
|
||||
{
|
||||
Console.WriteLine($"getting perks from {Path.GetFullPath(path)}");
|
||||
|
||||
foreach (var row in dataTable.RowMap)
|
||||
{
|
||||
var roleProperty = row.Value.Properties.FirstOrDefault(p => p.Name.Text == "Role");
|
||||
if (roleProperty?.Tag is EnumProperty roleEnumProp)
|
||||
{
|
||||
string roleName = roleEnumProp.Value.ToString() ?? "null";
|
||||
if (roleName == "EPlayerRole::VE_Slasher")
|
||||
slasherPerks.Add(row.Key.Text);
|
||||
else
|
||||
camperPerks.Add(row.Key.Text);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
var perksSerialized = new
|
||||
{
|
||||
Slashers = slasherPerks.OrderBy(x => x).ToList(),
|
||||
Campers = camperPerks.OrderBy(x => x).ToList()
|
||||
};
|
||||
File.WriteAllText("perks.json", JsonConvert.SerializeObject(perksSerialized, Formatting.Indented));
|
||||
|
||||
Console.WriteLine("\nAll dumper operations finished. Press any key to Close.");
|
||||
Console.ReadKey();
|
||||
}
|
||||
Console.WriteLine($"Dumper error: {err}");
|
||||
Console.WriteLine("Press any key to exit");
|
||||
Console.ReadKey();
|
||||
return 1;
|
||||
}
|
||||
|
||||
Console.WriteLine("Dumper start");
|
||||
var dumper = new Dumper();
|
||||
|
||||
bool hasInitialized = await dumper.InitAsync();
|
||||
if (!hasInitialized) return displayError("Dumper.InitAsync failed");
|
||||
|
||||
Console.WriteLine("Dumper initialized");
|
||||
|
||||
var dumpTasks = new (Func<string?> dumpFunc, string filename, string description)[]
|
||||
{
|
||||
(dumper.DumpCustomizationItems, "customizations.json", "customizations"),
|
||||
(dumper.DumpItems, "items.json", "items"),
|
||||
(dumper.DumpAddons, "addons.json", "addons"),
|
||||
(dumper.DumpOfferings, "offerings.json", "offerings"),
|
||||
(dumper.DumpPerks, "perks.json", "perks"),
|
||||
(dumper.DumpDLCs, "dlcs.json", "dlcs")
|
||||
};
|
||||
|
||||
foreach (var (dumpFunc, filename, description) in dumpTasks)
|
||||
{
|
||||
string? json = dumpFunc();
|
||||
if (json != null)
|
||||
{
|
||||
File.WriteAllText(filename, json);
|
||||
Console.WriteLine($"Dumped {description}");
|
||||
}
|
||||
else
|
||||
Console.WriteLine($"Failed to dump {description}");
|
||||
}
|
||||
|
||||
Console.WriteLine("Dumper finished");
|
||||
return 0;
|
||||
@@ -0,0 +1,39 @@
|
||||
using CUE4Parse.UE4.Assets.Objects;
|
||||
using System.Reflection;
|
||||
|
||||
public static class StructMapper
|
||||
{
|
||||
public static T MapToStruct<T>(this FStructFallback fallback) where T : struct
|
||||
{
|
||||
object result = new T();
|
||||
var fields = typeof(T).GetFields(BindingFlags.Public | BindingFlags.NonPublic | BindingFlags.Instance);
|
||||
|
||||
foreach (var field in fields)
|
||||
{
|
||||
try
|
||||
{
|
||||
var method = typeof(CUE4Parse.UE4.Assets.Exports.AbstractPropertyHolder)
|
||||
.GetMethods()
|
||||
.FirstOrDefault(m => m.Name == "GetOrDefault" && m.GetGenericArguments().Length == 1);
|
||||
|
||||
if (method != null)
|
||||
{
|
||||
var genericMethod = method.MakeGenericMethod(field.FieldType);
|
||||
|
||||
var value = genericMethod.Invoke(fallback, new object[] { field.Name, null!, StringComparison.Ordinal });
|
||||
|
||||
if (value != null)
|
||||
{
|
||||
field.SetValue(result, value);
|
||||
}
|
||||
}
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
Console.WriteLine($"Mapping failed for {field.Name}: {ex.Message}");
|
||||
}
|
||||
}
|
||||
|
||||
return (T)result;
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,129 @@
|
||||
#include "cachecleaner.h"
|
||||
|
||||
#include <nerutils/log.h>
|
||||
|
||||
#include <filesystem>
|
||||
#include <unordered_set>
|
||||
|
||||
#include <windows.h>
|
||||
#include <shlobj.h>
|
||||
#include <tlhelp32.h>
|
||||
|
||||
CacheCleaner::CacheCleaner() : _running(false), _monitorThread(nullptr) {}
|
||||
|
||||
CacheCleaner::~CacheCleaner()
|
||||
{
|
||||
shutdown();
|
||||
}
|
||||
|
||||
void CacheCleaner::init()
|
||||
{
|
||||
std::string localAppData = getLocalAppDataPath();
|
||||
if (localAppData == "") return Log::error("Failed to get LocalAppData?");
|
||||
|
||||
_cacheDir = localAppData + "\\DeadByDaylight\\Saved\\PersistentDownloadDir";
|
||||
|
||||
// this is pointless but just in case
|
||||
std::filesystem::create_directories(_cacheDir);
|
||||
|
||||
clearFolder(_cacheDir);
|
||||
|
||||
_running = true;
|
||||
//_monitorThread = std::make_unique<std::thread>(&CacheCleaner::monitorLoop, this);
|
||||
}
|
||||
|
||||
void CacheCleaner::shutdown()
|
||||
{
|
||||
if (!_running) return;
|
||||
_running = false;
|
||||
|
||||
if (_monitorThread && _monitorThread->joinable()) _monitorThread->join();
|
||||
}
|
||||
|
||||
std::string CacheCleaner::getLocalAppDataPath()
|
||||
{
|
||||
char buffer[MAX_PATH];
|
||||
if (SHGetFolderPathA(NULL, CSIDL_LOCAL_APPDATA, NULL, 0, buffer) == S_OK)
|
||||
{
|
||||
return std::string(buffer);
|
||||
}
|
||||
return "";
|
||||
}
|
||||
|
||||
void CacheCleaner::clearFolder(std::string& path)
|
||||
{
|
||||
try
|
||||
{
|
||||
for (const auto& entry : std::filesystem::directory_iterator(path))
|
||||
{
|
||||
std::filesystem::remove_all(entry.path());
|
||||
}
|
||||
}
|
||||
catch (...)
|
||||
{
|
||||
}
|
||||
}
|
||||
|
||||
void CacheCleaner::monitorLoop()
|
||||
{
|
||||
HANDLE changeHandle = FindFirstChangeNotificationA(_cacheDir.c_str(), TRUE,
|
||||
FILE_NOTIFY_CHANGE_FILE_NAME | FILE_NOTIFY_CHANGE_DIR_NAME |
|
||||
FILE_NOTIFY_CHANGE_LAST_WRITE);
|
||||
|
||||
if (changeHandle == INVALID_HANDLE_VALUE)
|
||||
{
|
||||
Log::error("Failed to create change notification");
|
||||
_running = false;
|
||||
return;
|
||||
}
|
||||
|
||||
Log::verbose("Cache cleaner monitoring started");
|
||||
|
||||
std::unordered_set<DWORD> previousPids;
|
||||
|
||||
while (_running)
|
||||
{
|
||||
// Wait 2 seconds between checks
|
||||
for (int i = 0; i < 20 && _running; i++)
|
||||
Sleep(100);
|
||||
|
||||
if (!_running) break;
|
||||
|
||||
// Take snapshot and check for new processes in one pass
|
||||
HANDLE hSnapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);
|
||||
if (hSnapshot == INVALID_HANDLE_VALUE) continue;
|
||||
|
||||
PROCESSENTRY32 pe32;
|
||||
pe32.dwSize = sizeof(PROCESSENTRY32);
|
||||
|
||||
std::unordered_set<DWORD> currentPids;
|
||||
|
||||
if (Process32First(hSnapshot, &pe32))
|
||||
{
|
||||
do
|
||||
{
|
||||
DWORD pid = pe32.th32ProcessID;
|
||||
currentPids.insert(pid);
|
||||
|
||||
if (previousPids.find(pid) == previousPids.end())
|
||||
{
|
||||
std::string processName(pe32.szExeFile);
|
||||
|
||||
for (char& c : processName)
|
||||
c = static_cast<char>(tolower(c));
|
||||
|
||||
if (processName.find("deadbydaylight") != std::string::npos)
|
||||
{
|
||||
Log::verbose("New DeadByDaylight process detected (PID: {}), clearing cache", pid);
|
||||
clearFolder(_cacheDir);
|
||||
}
|
||||
}
|
||||
} while (Process32Next(hSnapshot, &pe32));
|
||||
}
|
||||
|
||||
CloseHandle(hSnapshot);
|
||||
previousPids = std::move(currentPids);
|
||||
}
|
||||
|
||||
FindCloseChangeNotification(changeHandle);
|
||||
}
|
||||
@@ -0,0 +1,24 @@
|
||||
#pragma once
|
||||
|
||||
#include <string>
|
||||
#include <atomic>
|
||||
#include <thread>
|
||||
|
||||
class CacheCleaner
|
||||
{
|
||||
public:
|
||||
CacheCleaner();
|
||||
~CacheCleaner();
|
||||
|
||||
void init();
|
||||
void shutdown();
|
||||
|
||||
private:
|
||||
std::string getLocalAppDataPath();
|
||||
void clearFolder(std::string& path);
|
||||
void monitorLoop();
|
||||
|
||||
std::atomic<bool> _running;
|
||||
std::unique_ptr<std::thread> _monitorThread;
|
||||
std::string _cacheDir;
|
||||
};
|
||||
@@ -1,222 +0,0 @@
|
||||
#include "cert_manager.h"
|
||||
#include <nerutils/log.h>
|
||||
#include <openssl/bio.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/x509v3.h>
|
||||
#include <openssl/bn.h>
|
||||
#include <openssl/rsa.h>
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/ssl.h>
|
||||
|
||||
#include <cstdlib>
|
||||
#include <ctime>
|
||||
|
||||
#include <processthreadsapi.h>
|
||||
#include <cstring>
|
||||
|
||||
std::string randomizeString(size_t length)
|
||||
{
|
||||
const char charset[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
|
||||
std::string result;
|
||||
result.resize(length);
|
||||
for (size_t i = 0; i < length; ++i)
|
||||
result[i] = charset[rand() % (sizeof(charset) - 1)];
|
||||
return result;
|
||||
}
|
||||
|
||||
CertManager::CertManager() : _sessionPkey(nullptr) {}
|
||||
|
||||
CertManager::~CertManager()
|
||||
{
|
||||
if (_caPkey) EVP_PKEY_free(_caPkey);
|
||||
if (_caCert) X509_free(_caCert);
|
||||
if (_sessionPkey) EVP_PKEY_free(_sessionPkey);
|
||||
|
||||
for (auto& pair : _hostContexts)
|
||||
SSL_CTX_free(pair.second);
|
||||
}
|
||||
|
||||
bool CertManager::Init()
|
||||
{
|
||||
EVP_PKEY_CTX* pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, nullptr);
|
||||
if (pctx)
|
||||
{
|
||||
EVP_PKEY_keygen_init(pctx);
|
||||
EVP_PKEY_CTX_set_rsa_keygen_bits(pctx, 2048);
|
||||
EVP_PKEY_keygen(pctx, &_sessionPkey);
|
||||
EVP_PKEY_CTX_free(pctx);
|
||||
}
|
||||
|
||||
if (LoadCA())
|
||||
{
|
||||
Log::verbose("Loaded existing CA certificate.");
|
||||
return true;
|
||||
}
|
||||
|
||||
Log::verbose("No CA found. Generating new CA certificate.");
|
||||
return GenerateCA();
|
||||
}
|
||||
|
||||
bool CertManager::LoadCA()
|
||||
{
|
||||
BIO* keyBio = BIO_new_file("ca_key.pem", "r");
|
||||
if (!keyBio) return false;
|
||||
|
||||
_caPkey = PEM_read_bio_PrivateKey(keyBio, nullptr, nullptr, nullptr);
|
||||
BIO_free(keyBio);
|
||||
|
||||
if (!_caPkey) return false;
|
||||
|
||||
BIO* certBio = BIO_new_file("ca_cert.pem", "r");
|
||||
if (!certBio) return false;
|
||||
|
||||
_caCert = PEM_read_bio_X509(certBio, nullptr, nullptr, nullptr);
|
||||
BIO_free(certBio);
|
||||
|
||||
if (!_caCert) return false;
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
bool CertManager::GenerateCA()
|
||||
{
|
||||
srand(static_cast<unsigned int>(time(nullptr)));
|
||||
|
||||
EVP_PKEY_CTX* pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, nullptr);
|
||||
if (!pctx) return false;
|
||||
EVP_PKEY_keygen_init(pctx);
|
||||
EVP_PKEY_CTX_set_rsa_keygen_bits(pctx, 2048);
|
||||
EVP_PKEY_keygen(pctx, &_caPkey);
|
||||
EVP_PKEY_CTX_free(pctx);
|
||||
|
||||
_caCert = X509_new();
|
||||
X509_set_version(_caCert, 2);
|
||||
ASN1_INTEGER_set(X509_get_serialNumber(_caCert), 1);
|
||||
X509_gmtime_adj(X509_get_notBefore(_caCert), 0);
|
||||
X509_gmtime_adj(X509_get_notAfter(_caCert), 31536000L); // 1 year
|
||||
|
||||
std::string org = randomizeString(16);
|
||||
std::string cn = randomizeString(16);
|
||||
|
||||
X509_NAME* name = X509_get_subject_name(_caCert);
|
||||
X509_NAME_add_entry_by_txt(name, "C", MBSTRING_ASC, (unsigned char*)"US", -1, -1, 0);
|
||||
X509_NAME_add_entry_by_txt(name, "O", MBSTRING_ASC, (unsigned char*)org.c_str(), -1, -1, 0);
|
||||
X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_ASC, (unsigned char*)cn.c_str(), -1, -1, 0);
|
||||
X509_set_issuer_name(_caCert, name);
|
||||
X509_set_pubkey(_caCert, _caPkey);
|
||||
|
||||
X509V3_CTX ctxV3;
|
||||
X509V3_set_ctx_nodb(&ctxV3);
|
||||
X509V3_set_ctx(&ctxV3, _caCert, _caCert, nullptr, nullptr, 0);
|
||||
X509_EXTENSION* extCA = X509V3_EXT_conf_nid(nullptr, &ctxV3, NID_basic_constraints, "critical,CA:TRUE");
|
||||
if (extCA)
|
||||
{
|
||||
X509_add_ext(_caCert, extCA, -1);
|
||||
X509_EXTENSION_free(extCA);
|
||||
}
|
||||
|
||||
X509_sign(_caCert, _caPkey, EVP_sha256());
|
||||
|
||||
BIO* keyBioOut = BIO_new_file("ca_key.pem", "w");
|
||||
if (keyBioOut)
|
||||
{
|
||||
PEM_write_bio_PrivateKey(keyBioOut, _caPkey, nullptr, nullptr, 0, nullptr, nullptr);
|
||||
BIO_free(keyBioOut);
|
||||
}
|
||||
|
||||
BIO* certBioOut = BIO_new_file("ca_cert.pem", "w");
|
||||
if (certBioOut)
|
||||
{
|
||||
PEM_write_bio_X509(certBioOut, _caCert);
|
||||
BIO_free(certBioOut);
|
||||
}
|
||||
|
||||
Log::info("Generated new CA key and certificate files. Installing to Windows Root CA store automatically...");
|
||||
|
||||
STARTUPINFOA si;
|
||||
memset(&si, 0, sizeof(si));
|
||||
si.cb = sizeof(si);
|
||||
PROCESS_INFORMATION pi;
|
||||
memset(&pi, 0, sizeof(pi));
|
||||
char cmd[] = "certutil.exe -user -addstore root ca_cert.pem";
|
||||
if (CreateProcessA(NULL, cmd, NULL, NULL, FALSE, CREATE_NO_WINDOW, NULL, NULL, &si, &pi))
|
||||
{
|
||||
WaitForSingleObject(pi.hProcess, INFINITE);
|
||||
CloseHandle(pi.hProcess);
|
||||
CloseHandle(pi.hThread);
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
SSL_CTX* CertManager::CreateHostContext(const std::string& host)
|
||||
{
|
||||
std::lock_guard<std::mutex> lock(_mutex);
|
||||
|
||||
auto it = _hostContexts.find(host);
|
||||
if (it != _hostContexts.end())
|
||||
{
|
||||
return it->second;
|
||||
}
|
||||
|
||||
EVP_PKEY* pkey = _sessionPkey;
|
||||
if (!pkey) return nullptr;
|
||||
|
||||
X509* cert = X509_new();
|
||||
X509_set_version(cert, 2);
|
||||
ASN1_INTEGER_set(X509_get_serialNumber(cert), static_cast<long>(std::hash<std::string>{}(host) & 0x7FFFFFFF));
|
||||
X509_gmtime_adj(X509_get_notBefore(cert), 0);
|
||||
X509_gmtime_adj(X509_get_notAfter(cert), 31536000L);
|
||||
|
||||
std::string dynamicOrg = randomizeString(16);
|
||||
|
||||
X509_NAME* name = X509_get_subject_name(cert);
|
||||
X509_NAME_add_entry_by_txt(name, "C", MBSTRING_ASC, (unsigned char*)"US", -1, -1, 0);
|
||||
X509_NAME_add_entry_by_txt(name, "O", MBSTRING_ASC, (unsigned char*)dynamicOrg.c_str(), -1, -1, 0);
|
||||
X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_ASC, (unsigned char*)(host.c_str()), -1, -1, 0);
|
||||
X509_set_issuer_name(cert, X509_get_subject_name(_caCert));
|
||||
X509_set_pubkey(cert, pkey);
|
||||
|
||||
X509V3_CTX ctxV3;
|
||||
X509V3_set_ctx_nodb(&ctxV3);
|
||||
X509V3_set_ctx(&ctxV3, _caCert, cert, nullptr, nullptr, 0);
|
||||
std::string san = "DNS:" + host;
|
||||
X509_EXTENSION* extSAN = X509V3_EXT_conf_nid(nullptr, &ctxV3, NID_subject_alt_name, san.c_str());
|
||||
if (extSAN)
|
||||
{
|
||||
X509_add_ext(cert, extSAN, -1);
|
||||
X509_EXTENSION_free(extSAN);
|
||||
}
|
||||
|
||||
X509_sign(cert, _caPkey, EVP_sha256());
|
||||
|
||||
SSL_CTX* ctx = SSL_CTX_new(TLS_server_method());
|
||||
|
||||
SSL_CTX_set_alpn_select_cb(
|
||||
ctx,
|
||||
[](SSL* /*ssl*/, const unsigned char** out, unsigned char* outlen, const unsigned char* in, unsigned int inlen,
|
||||
void* /*arg*/) -> int {
|
||||
for (unsigned int i = 0; i < inlen;)
|
||||
{
|
||||
unsigned int len = in[i];
|
||||
if (len == 8 && memcmp(&in[i + 1], "http/1.1", 8) == 0)
|
||||
{
|
||||
*out = &in[i + 1];
|
||||
*outlen = (unsigned char)len;
|
||||
return SSL_TLSEXT_ERR_OK;
|
||||
}
|
||||
i += len + 1;
|
||||
}
|
||||
return SSL_TLSEXT_ERR_NOACK;
|
||||
},
|
||||
nullptr);
|
||||
|
||||
SSL_CTX_use_certificate(ctx, cert);
|
||||
SSL_CTX_use_PrivateKey(ctx, pkey);
|
||||
|
||||
X509_free(cert);
|
||||
|
||||
_hostContexts[host] = ctx;
|
||||
return ctx;
|
||||
}
|
||||
@@ -1,27 +0,0 @@
|
||||
#pragma once
|
||||
|
||||
#include <string>
|
||||
#include <unordered_map>
|
||||
#include <mutex>
|
||||
#include <openssl/ssl.h>
|
||||
|
||||
class CertManager
|
||||
{
|
||||
public:
|
||||
CertManager();
|
||||
~CertManager();
|
||||
|
||||
bool Init();
|
||||
SSL_CTX* CreateHostContext(const std::string& host);
|
||||
|
||||
private:
|
||||
bool GenerateCA();
|
||||
bool LoadCA();
|
||||
|
||||
EVP_PKEY* _caPkey = nullptr;
|
||||
X509* _caCert = nullptr;
|
||||
EVP_PKEY* _sessionPkey = nullptr;
|
||||
|
||||
std::mutex _mutex;
|
||||
std::unordered_map<std::string, SSL_CTX*> _hostContexts;
|
||||
};
|
||||
@@ -0,0 +1,474 @@
|
||||
#include "dbdcrypt.h"
|
||||
|
||||
#include <nerutils/log.h>
|
||||
|
||||
#include <algorithm>
|
||||
#include <cstring>
|
||||
|
||||
#include <zlib.h>
|
||||
|
||||
#include <openssl/types.h>
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/bio.h>
|
||||
#include <openssl/buffer.h>
|
||||
|
||||
std::string DBDCrypt::decrypt(const std::string& data, const std::string& accessKey, PayloadType* outType)
|
||||
{
|
||||
if (outType) *outType = NONE;
|
||||
|
||||
if (data.starts_with("DbdDAQEB"))
|
||||
{
|
||||
if (outType && *outType == NONE) *outType = TYPE_1;
|
||||
return decType1(data, accessKey, outType);
|
||||
}
|
||||
|
||||
if (data.starts_with("DbdDAgAC"))
|
||||
{
|
||||
if (outType && *outType == NONE) *outType = TYPE_2;
|
||||
return decType2(data, accessKey, outType);
|
||||
}
|
||||
|
||||
if (data.starts_with("DbdDAwAC"))
|
||||
{
|
||||
if (outType && *outType == NONE) *outType = TYPE_3;
|
||||
return decType3(data, accessKey, outType);
|
||||
}
|
||||
|
||||
Log::warning("Attempted to decrypt non encrypted string");
|
||||
return data;
|
||||
}
|
||||
|
||||
std::string DBDCrypt::encrypt(const std::string& data, const std::string& accessKey, PayloadType type,
|
||||
std::string keyId)
|
||||
{
|
||||
if (type == TYPE_1)
|
||||
{
|
||||
auto compressed = zLibCompress(data); // Type 1 is UTF-8
|
||||
if (compressed.empty()) return "";
|
||||
|
||||
uint32_t rawSize = (uint32_t)data.size();
|
||||
std::vector<uint8_t> fullPayload(4);
|
||||
std::memcpy(fullPayload.data(), &rawSize, 4);
|
||||
|
||||
fullPayload.insert(fullPayload.end(), compressed.begin(), compressed.end());
|
||||
return "DbdDAQEB" + b64Enc(fullPayload);
|
||||
}
|
||||
|
||||
if (type == TYPE_2)
|
||||
{
|
||||
auto transformedKey = transformCDNKey(CDN_KEY_BASE64);
|
||||
|
||||
std::string utf16Data = utf8ToUtf16(data);
|
||||
for (char& c : utf16Data)
|
||||
c = (char)((unsigned char)c - 1);
|
||||
|
||||
std::vector<uint8_t> padded(utf16Data.begin(), utf16Data.end());
|
||||
|
||||
int padLen = 16 - (padded.size() % 16);
|
||||
if (padLen < 16) padded.insert(padded.end(), padLen, 0);
|
||||
|
||||
auto encryptedBody = aesECBEncrypt(padded, transformedKey);
|
||||
if (encryptedBody.empty()) return "";
|
||||
|
||||
std::vector<uint8_t> fullPayload(encryptedBody.begin(), encryptedBody.end());
|
||||
return "DbdDAgAC" + b64Enc(fullPayload);
|
||||
}
|
||||
|
||||
if (type == TYPE_3)
|
||||
{
|
||||
auto decodedKey = b64Dec(accessKey);
|
||||
if (decodedKey.empty()) return "";
|
||||
|
||||
std::string utf16Data = utf8ToUtf16(data);
|
||||
for (char& c : utf16Data)
|
||||
c = (char)((unsigned char)c - 1);
|
||||
|
||||
std::vector<uint8_t> padded(utf16Data.begin(), utf16Data.end());
|
||||
|
||||
int padLen = 16 - (padded.size() % 16);
|
||||
if (padLen < 16) padded.insert(padded.end(), padLen, 0);
|
||||
|
||||
auto encryptedBody = aesECBEncrypt(padded, decodedKey);
|
||||
|
||||
if (encryptedBody.empty()) return "";
|
||||
|
||||
std::string shiftedId = shiftKeyID(keyId, -1);
|
||||
std::vector<uint8_t> fullData(shiftedId.begin(), shiftedId.end());
|
||||
fullData.push_back(0); // Null terminator
|
||||
fullData.insert(fullData.end(), (uint8_t*)encryptedBody.data(),
|
||||
(uint8_t*)encryptedBody.data() + encryptedBody.size());
|
||||
|
||||
return "DbdDAwAC" + b64Enc(fullData);
|
||||
}
|
||||
|
||||
return std::string();
|
||||
}
|
||||
|
||||
std::string DBDCrypt::decType1(const std::string& data, const std::string& key, PayloadType* outType)
|
||||
{
|
||||
if (data.length() < 8) return data;
|
||||
auto decoded = b64Dec(data.substr(8));
|
||||
if (decoded.size() < 4)
|
||||
{
|
||||
Log::error("Type 1 base64 too short ({})", decoded.size());
|
||||
return "";
|
||||
}
|
||||
|
||||
std::vector<uint8_t> body(decoded.begin() + 4, decoded.end());
|
||||
std::string decompressed = zlibDecompress(body);
|
||||
|
||||
if (decompressed.length() >= 2 && decompressed[1] == '\0') decompressed = utf16ToUtf8(decompressed);
|
||||
|
||||
if (decompressed.starts_with("DbdD")) return decrypt(decompressed, key, outType);
|
||||
return decompressed;
|
||||
}
|
||||
|
||||
std::string DBDCrypt::decType2(const std::string& data, const std::string& key, PayloadType* outType)
|
||||
{
|
||||
if (data.length() < 8) return data;
|
||||
|
||||
auto decoded = b64Dec(data.substr(8));
|
||||
if (decoded.empty()) return "";
|
||||
|
||||
std::vector<uint8_t> body = decoded;
|
||||
|
||||
auto transformedKey = transformCDNKey(CDN_KEY_BASE64);
|
||||
|
||||
std::string decrypted = aesECBDecrypt(body, transformedKey);
|
||||
if (decrypted.empty()) return "";
|
||||
|
||||
for (char& c : decrypted)
|
||||
c = (char)((unsigned char)c + 1);
|
||||
|
||||
if (decrypted.length() >= 2 && decrypted[1] == '\0') decrypted = utf16ToUtf8(decrypted);
|
||||
|
||||
decrypted.erase(std::remove(decrypted.begin(), decrypted.end(), (char)0x01), decrypted.end());
|
||||
decrypted.erase(std::remove(decrypted.begin(), decrypted.end(), (char)0x00), decrypted.end());
|
||||
|
||||
for (size_t offset : {0ULL, 4ULL})
|
||||
{
|
||||
if (offset + 1 < decrypted.size() && (unsigned char)decrypted[offset] == 0x78)
|
||||
{
|
||||
std::vector<uint8_t> zlibPart((uint8_t*)decrypted.data() + offset,
|
||||
(uint8_t*)decrypted.data() + decrypted.size());
|
||||
std::string decompressed = zlibDecompress(zlibPart);
|
||||
if (!decompressed.empty()) return decompressed;
|
||||
}
|
||||
}
|
||||
|
||||
if (decrypted.starts_with("DbdD")) return decrypt(decrypted, key, outType);
|
||||
return decrypted;
|
||||
}
|
||||
|
||||
std::string DBDCrypt::decType3(const std::string& data, const std::string& key, PayloadType* outType)
|
||||
{
|
||||
if (data.length() < 8) return data;
|
||||
|
||||
auto rawKey = b64Dec(key);
|
||||
auto decoded = b64Dec(data.substr(8));
|
||||
if (decoded.empty()) return "";
|
||||
|
||||
auto it = std::find(decoded.begin(), decoded.end(), 0);
|
||||
if (it == decoded.end()) return "";
|
||||
|
||||
std::vector<uint8_t> body(it + 1, decoded.end());
|
||||
|
||||
std::string decrypted = aesECBDecrypt(body, rawKey);
|
||||
if (decrypted.empty())
|
||||
{
|
||||
Log::error("AES decryption failed (body size: {})", body.size());
|
||||
return "";
|
||||
}
|
||||
|
||||
for (char& c : decrypted)
|
||||
c = (char)((unsigned char)c + 1);
|
||||
|
||||
if (decrypted.length() >= 2 && decrypted.at(1) == '\0') decrypted = utf16ToUtf8(decrypted);
|
||||
|
||||
decrypted.erase(std::remove(decrypted.begin(), decrypted.end(), (char)0x01), decrypted.end());
|
||||
decrypted.erase(std::remove(decrypted.begin(), decrypted.end(), (char)0x00), decrypted.end());
|
||||
|
||||
for (size_t offset : {0ULL, 4ULL})
|
||||
{
|
||||
if (offset + 1 < decrypted.size() && (unsigned char)decrypted[offset] == 0x78)
|
||||
{
|
||||
//Log::verbose("nested zlib at offset {}", offset);
|
||||
std::vector<uint8_t> zlibPart((uint8_t*)decrypted.data() + offset,
|
||||
(uint8_t*)decrypted.data() + decrypted.size());
|
||||
std::string decompressed = zlibDecompress(zlibPart);
|
||||
if (!decompressed.empty())
|
||||
{
|
||||
//Log::verbose("nested zlib decompressed, size: {}", decompressed.length());
|
||||
return decompressed;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (decrypted.starts_with("DbdD")) return decrypt(decrypted, key, outType);
|
||||
return decrypted;
|
||||
}
|
||||
|
||||
std::string DBDCrypt::aesECBDecrypt(const std::vector<uint8_t>& cipherText, const std::vector<uint8_t>& key)
|
||||
{
|
||||
if (key.size() < 32) return "";
|
||||
|
||||
EVP_CIPHER_CTX* ctx = EVP_CIPHER_CTX_new();
|
||||
EVP_DecryptInit_ex(ctx, EVP_aes_256_ecb(), NULL, key.data(), NULL);
|
||||
EVP_CIPHER_CTX_set_padding(ctx, 0);
|
||||
|
||||
std::string plaintext;
|
||||
plaintext.resize(cipherText.size());
|
||||
|
||||
int len = 0;
|
||||
if (EVP_DecryptUpdate(ctx, (unsigned char*)plaintext.data(), &len, cipherText.data(), (int)cipherText.size()) != 1)
|
||||
{
|
||||
EVP_CIPHER_CTX_free(ctx);
|
||||
return "";
|
||||
}
|
||||
int outLen = len;
|
||||
|
||||
int finalLen = 0;
|
||||
if (EVP_DecryptFinal_ex(ctx, (unsigned char*)plaintext.data() + len, &finalLen) != 1)
|
||||
{
|
||||
// ignore?
|
||||
}
|
||||
outLen += finalLen;
|
||||
|
||||
EVP_CIPHER_CTX_free(ctx);
|
||||
plaintext.resize(outLen);
|
||||
return plaintext;
|
||||
}
|
||||
|
||||
std::string DBDCrypt::aesECBEncrypt(const std::vector<uint8_t>& plainText, const std::vector<uint8_t>& key)
|
||||
{
|
||||
if (key.size() < 32) return "";
|
||||
|
||||
EVP_CIPHER_CTX* ctx = EVP_CIPHER_CTX_new();
|
||||
EVP_EncryptInit_ex(ctx, EVP_aes_256_ecb(), NULL, key.data(), NULL);
|
||||
EVP_CIPHER_CTX_set_padding(ctx, 0);
|
||||
|
||||
std::string ciphertext;
|
||||
ciphertext.resize(plainText.size() + 16);
|
||||
|
||||
int len = 0;
|
||||
if (EVP_EncryptUpdate(ctx, (unsigned char*)ciphertext.data(), &len, plainText.data(), (int)plainText.size()) != 1)
|
||||
{
|
||||
EVP_CIPHER_CTX_free(ctx);
|
||||
return "";
|
||||
}
|
||||
int outLen = len;
|
||||
|
||||
int finalLen = 0;
|
||||
if (EVP_EncryptFinal_ex(ctx, (unsigned char*)ciphertext.data() + outLen, &finalLen) == 1)
|
||||
{
|
||||
outLen += finalLen;
|
||||
}
|
||||
|
||||
EVP_CIPHER_CTX_free(ctx);
|
||||
ciphertext.resize(outLen);
|
||||
return ciphertext;
|
||||
}
|
||||
|
||||
std::vector<uint8_t> DBDCrypt::b64Dec(const std::string& input)
|
||||
{
|
||||
std::string in = input;
|
||||
std::replace(in.begin(), in.end(), '-', '+');
|
||||
std::replace(in.begin(), in.end(), '_', '/');
|
||||
|
||||
BIO *bio, *b64;
|
||||
int decodeLen = (int)in.length();
|
||||
std::vector<uint8_t> buffer(decodeLen);
|
||||
|
||||
bio = BIO_new_mem_buf(in.data(), decodeLen);
|
||||
b64 = BIO_new(BIO_f_base64());
|
||||
bio = BIO_push(b64, bio);
|
||||
|
||||
BIO_set_flags(bio, BIO_FLAGS_BASE64_NO_NL);
|
||||
int len = BIO_read(bio, buffer.data(), decodeLen);
|
||||
BIO_free_all(bio);
|
||||
|
||||
if (len < 0) return {};
|
||||
buffer.resize(len);
|
||||
return buffer;
|
||||
}
|
||||
|
||||
std::string DBDCrypt::b64Enc(const std::vector<uint8_t>& input)
|
||||
{
|
||||
if (input.empty()) return "";
|
||||
|
||||
BIO *bio, *b64;
|
||||
BUF_MEM* bufferPtr;
|
||||
|
||||
b64 = BIO_new(BIO_f_base64());
|
||||
bio = BIO_new(BIO_s_mem());
|
||||
bio = BIO_push(b64, bio);
|
||||
|
||||
BIO_set_flags(bio, BIO_FLAGS_BASE64_NO_NL);
|
||||
BIO_write(bio, input.data(), (int)input.size());
|
||||
BIO_flush(bio);
|
||||
BIO_get_mem_ptr(bio, &bufferPtr);
|
||||
|
||||
std::string result(bufferPtr->data, bufferPtr->length);
|
||||
BIO_free_all(bio);
|
||||
|
||||
return result;
|
||||
}
|
||||
|
||||
std::string DBDCrypt::zlibDecompress(const std::vector<uint8_t>& compressed)
|
||||
{
|
||||
if (compressed.empty()) return "";
|
||||
|
||||
z_stream strm;
|
||||
strm.zalloc = Z_NULL;
|
||||
strm.zfree = Z_NULL;
|
||||
strm.opaque = Z_NULL;
|
||||
strm.avail_in = (uInt)compressed.size();
|
||||
strm.next_in = (Bytef*)compressed.data();
|
||||
|
||||
if (inflateInit(&strm) != Z_OK) return "";
|
||||
|
||||
std::string result;
|
||||
char buffer[32768];
|
||||
|
||||
do
|
||||
{
|
||||
strm.avail_out = sizeof(buffer);
|
||||
strm.next_out = (Bytef*)buffer;
|
||||
int ret = inflate(&strm, Z_NO_FLUSH);
|
||||
if (ret != Z_OK && ret != Z_STREAM_END)
|
||||
{
|
||||
inflateEnd(&strm);
|
||||
return "";
|
||||
}
|
||||
result.append(buffer, sizeof(buffer) - strm.avail_out);
|
||||
} while (strm.avail_out == 0);
|
||||
|
||||
inflateEnd(&strm);
|
||||
return result;
|
||||
}
|
||||
|
||||
std::vector<uint8_t> DBDCrypt::zLibCompress(const std::string& data)
|
||||
{
|
||||
if (data.empty()) return {};
|
||||
|
||||
z_stream strm;
|
||||
strm.zalloc = Z_NULL;
|
||||
strm.zfree = Z_NULL;
|
||||
strm.opaque = Z_NULL;
|
||||
|
||||
if (deflateInit(&strm, Z_DEFAULT_COMPRESSION) != Z_OK) return {};
|
||||
|
||||
strm.avail_in = (uInt)data.size();
|
||||
strm.next_in = (Bytef*)data.data();
|
||||
|
||||
std::vector<uint8_t> result;
|
||||
uint8_t buffer[32768];
|
||||
|
||||
do
|
||||
{
|
||||
strm.avail_out = sizeof(buffer);
|
||||
strm.next_out = (Bytef*)buffer;
|
||||
deflate(&strm, Z_FINISH);
|
||||
result.insert(result.end(), buffer, buffer + (sizeof(buffer) - strm.avail_out));
|
||||
} while (strm.avail_out == 0);
|
||||
|
||||
deflateEnd(&strm);
|
||||
return result;
|
||||
}
|
||||
|
||||
std::vector<uint8_t> DBDCrypt::transformCDNKey(const std::string& b64CDNKey)
|
||||
{
|
||||
auto encryptedKey = b64Dec(b64CDNKey);
|
||||
std::vector<uint8_t> uuidKey(32, 0);
|
||||
std::memcpy(uuidKey.data(), CDN_UUID, std::min((size_t)32, strlen(CDN_UUID)));
|
||||
|
||||
std::string decrypted = aesECBDecrypt(encryptedKey, uuidKey);
|
||||
std::vector<uint8_t> finalKey(decrypted.begin(), decrypted.end());
|
||||
if (finalKey.size() > 32)
|
||||
finalKey.resize(32);
|
||||
else if (finalKey.size() < 32)
|
||||
finalKey.resize(32, 0);
|
||||
return finalKey;
|
||||
}
|
||||
|
||||
std::string DBDCrypt::shiftKeyID(const std::string& id, int shift)
|
||||
{
|
||||
std::string res = id;
|
||||
for (char& c : res)
|
||||
c = (char)((unsigned char)c + shift);
|
||||
return res;
|
||||
}
|
||||
|
||||
std::string DBDCrypt::utf16ToUtf8(const std::string& utf16)
|
||||
{
|
||||
if (utf16.empty()) return "";
|
||||
std::string utf8;
|
||||
for (size_t i = 0; i < utf16.length(); i += 2)
|
||||
{
|
||||
uint16_t cp = *(uint16_t*)(utf16.data() + i);
|
||||
if (cp == 0) break;
|
||||
if (cp < 0x80)
|
||||
utf8 += (char)cp;
|
||||
else if (cp < 0x800)
|
||||
{
|
||||
utf8 += (char)(0xC0 | (cp >> 6));
|
||||
utf8 += (char)(0x80 | (cp & 0x3F));
|
||||
}
|
||||
else
|
||||
{
|
||||
utf8 += (char)(0xE0 | (cp >> 12));
|
||||
utf8 += (char)(0x80 | ((cp >> 6) & 0x3F));
|
||||
utf8 += (char)(0x80 | (cp & 0x3F));
|
||||
}
|
||||
}
|
||||
return utf8;
|
||||
}
|
||||
|
||||
std::string DBDCrypt::utf8ToUtf16(const std::string& utf8)
|
||||
{
|
||||
if (utf8.empty()) return "";
|
||||
std::string utf16;
|
||||
for (size_t i = 0; i < utf8.length();)
|
||||
{
|
||||
uint32_t cp = 0;
|
||||
unsigned char c = utf8[i];
|
||||
if (c < 0x80)
|
||||
{
|
||||
cp = c;
|
||||
i += 1;
|
||||
}
|
||||
else if (c < 0xE0)
|
||||
{
|
||||
cp = ((c & 0x1F) << 6) | (utf8[i + 1] & 0x3F);
|
||||
i += 2;
|
||||
}
|
||||
else if (c < 0xF0)
|
||||
{
|
||||
cp = ((c & 0x0F) << 12) | ((utf8[i + 1] & 0x3F) << 6) | (utf8[i + 2] & 0x3F);
|
||||
i += 3;
|
||||
}
|
||||
else
|
||||
{
|
||||
cp = ((c & 0x07) << 18) | ((utf8[i + 1] & 0x3F) << 12) | ((utf8[i + 2] & 0x3F) << 6) | (utf8[i + 3] & 0x3F);
|
||||
i += 4;
|
||||
}
|
||||
|
||||
if (cp < 0x10000)
|
||||
{
|
||||
utf16.push_back((char)(cp & 0xFF));
|
||||
utf16.push_back((char)(cp >> 8));
|
||||
}
|
||||
else
|
||||
{
|
||||
cp -= 0x10000;
|
||||
uint16_t high = (uint16_t)(0xD800 | (cp >> 10));
|
||||
uint16_t low = (uint16_t)(0xDC00 | (cp & 0x3FF));
|
||||
|
||||
utf16.push_back((char)(high & 0xFF));
|
||||
utf16.push_back((char)(high >> 8));
|
||||
utf16.push_back((char)(low & 0xFF));
|
||||
utf16.push_back((char)(low >> 8));
|
||||
}
|
||||
}
|
||||
return utf16;
|
||||
}
|
||||
@@ -0,0 +1,52 @@
|
||||
#pragma once
|
||||
|
||||
#include <string>
|
||||
#include <vector>
|
||||
#include <cstdint>
|
||||
|
||||
// 9.5.2_live
|
||||
#define ACCESS_KEY "BGz7nwlRX8QP__fzvqrgpNRVqrlEyuY54vuGVAqDO_g="
|
||||
#define KEY_ID "9.5.2_live"
|
||||
|
||||
/*
|
||||
hardcoded variables (they have been the same since like 2017)
|
||||
*/
|
||||
#define CDN_KEY_BASE64 "lEQWeCt51ET+MIuxdTs7Ig/gzVZP2vdkVZA1BDfz+L0="
|
||||
#define CDN_UUID "6EF35759-454D-4EBC-8041-9A94CB99FD5D"
|
||||
|
||||
class DBDCrypt
|
||||
{
|
||||
public:
|
||||
enum PayloadType
|
||||
{
|
||||
NONE = 0,
|
||||
TYPE_1, // compressed
|
||||
TYPE_2, // CDN
|
||||
TYPE_3 // dyn / accesskey
|
||||
};
|
||||
|
||||
static std::string decrypt(const std::string& data, const std::string& accessKey,
|
||||
PayloadType* outType = nullptr);
|
||||
|
||||
static std::string encrypt(const std::string& data, const std::string& accessKey, PayloadType type,
|
||||
std::string keyId);
|
||||
|
||||
private:
|
||||
static std::string decType1(const std::string& data, const std::string& key, PayloadType* outType);
|
||||
static std::string decType2(const std::string& data, const std::string& key, PayloadType* outType);
|
||||
static std::string decType3(const std::string& data, const std::string& key, PayloadType* outType);
|
||||
|
||||
static std::string aesECBDecrypt(const std::vector<uint8_t>& cipherText, const std::vector<uint8_t>& key);
|
||||
static std::string aesECBEncrypt(const std::vector<uint8_t>& plainText, const std::vector<uint8_t>& key);
|
||||
|
||||
static std::vector<uint8_t> b64Dec(const std::string& input);
|
||||
static std::string b64Enc(const std::vector<uint8_t>& input);
|
||||
|
||||
static std::string zlibDecompress(const std::vector<uint8_t>& compressed);
|
||||
static std::vector<uint8_t> zLibCompress(const std::string& data);
|
||||
|
||||
static std::vector<uint8_t> transformCDNKey(const std::string& b64CDNKey);
|
||||
static std::string shiftKeyID(const std::string& id, int shift);
|
||||
static std::string utf16ToUtf8(const std::string& utf16);
|
||||
static std::string utf8ToUtf16(const std::string& utf8);
|
||||
};
|
||||
+50
-21
@@ -1,38 +1,50 @@
|
||||
#include "proxy.h"
|
||||
#include "spoofing.h"
|
||||
#include "cachecleaner.h"
|
||||
|
||||
#include <nerutils/log.h>
|
||||
|
||||
#include <windows.h>
|
||||
#include <wininet.h>
|
||||
#include <ctime>
|
||||
|
||||
bool setProxy(bool enable, const std::string& proxyAddr)
|
||||
bool setProxyAddress(bool enable, const std::string& proxyAddr)
|
||||
{
|
||||
INTERNET_PER_CONN_OPTION_LIST list;
|
||||
INTERNET_PER_CONN_OPTION options[3];
|
||||
unsigned long listSize = sizeof(INTERNET_PER_CONN_OPTION_LIST);
|
||||
|
||||
ZeroMemory(&list, sizeof(list));
|
||||
ZeroMemory(options, sizeof(options));
|
||||
|
||||
options[0].dwOption = INTERNET_PER_CONN_FLAGS;
|
||||
|
||||
if (enable)
|
||||
{
|
||||
if (proxyAddr.empty()) return false;
|
||||
|
||||
options[0].Value.dwValue = PROXY_TYPE_PROXY | PROXY_TYPE_DIRECT;
|
||||
|
||||
options[1].dwOption = INTERNET_PER_CONN_PROXY_SERVER;
|
||||
options[1].Value.pszValue = const_cast<char*>(proxyAddr.c_str());
|
||||
|
||||
options[2].dwOption = INTERNET_PER_CONN_PROXY_BYPASS;
|
||||
options[2].Value.pszValue = (char*)"<local>";
|
||||
|
||||
list.dwOptionCount = 3;
|
||||
}
|
||||
else
|
||||
{
|
||||
options[0].Value.dwValue = PROXY_TYPE_DIRECT;
|
||||
|
||||
options[1].dwOption = INTERNET_PER_CONN_PROXY_SERVER;
|
||||
options[1].Value.pszValue = const_cast<char*>(proxyAddr.c_str());
|
||||
|
||||
options[2].dwOption = INTERNET_PER_CONN_PROXY_BYPASS;
|
||||
options[2].Value.pszValue = const_cast<char*>("<local>");
|
||||
list.dwOptionCount = 1;
|
||||
}
|
||||
|
||||
list.dwSize = sizeof(INTERNET_PER_CONN_OPTION_LIST);
|
||||
list.pszConnection = NULL;
|
||||
list.dwOptionCount = 3;
|
||||
list.dwOptionError = 0;
|
||||
list.pOptions = options;
|
||||
|
||||
if (!InternetSetOptionA(NULL, INTERNET_OPTION_PER_CONNECTION_OPTION, &list, listSize))
|
||||
if (!InternetSetOption(NULL, INTERNET_OPTION_PER_CONNECTION_OPTION, &list, sizeof(list)))
|
||||
{
|
||||
Log::error("Failed to set proxy options, Err: {}", GetLastError());
|
||||
Log::error("Failed to set proxy options - error: {}", GetLastError());
|
||||
return false;
|
||||
}
|
||||
|
||||
@@ -43,7 +55,8 @@ bool setProxy(bool enable, const std::string& proxyAddr)
|
||||
}
|
||||
|
||||
bool running = true;
|
||||
Proxy* g_Proxy = nullptr;
|
||||
Proxy* proxy = nullptr;
|
||||
CacheCleaner* cleaner = nullptr;
|
||||
|
||||
void cleanup()
|
||||
{
|
||||
@@ -53,14 +66,20 @@ void cleanup()
|
||||
if (cleaned) return;
|
||||
cleaned = true;
|
||||
|
||||
if (g_Proxy)
|
||||
Log::info("Restoring system proxy settings");
|
||||
setProxyAddress(false, "");
|
||||
|
||||
if (proxy)
|
||||
{
|
||||
Log::info("Shutting down proxy");
|
||||
g_Proxy->Shutdown();
|
||||
proxy->shutdown();
|
||||
}
|
||||
|
||||
Log::info("Restoring system proxy settings");
|
||||
setProxy(false, "");
|
||||
if (cleaner)
|
||||
{
|
||||
Log::info("Shutting down cache cleaner");
|
||||
cleaner->shutdown();
|
||||
}
|
||||
}
|
||||
|
||||
BOOL WINAPI consoleHandler(DWORD dwType)
|
||||
@@ -77,6 +96,8 @@ BOOL WINAPI consoleHandler(DWORD dwType)
|
||||
|
||||
int main()
|
||||
{
|
||||
srand(static_cast<unsigned int>(time(NULL)));
|
||||
|
||||
Log::createConsole();
|
||||
SetConsoleCtrlHandler(consoleHandler, TRUE);
|
||||
atexit(cleanup);
|
||||
@@ -87,13 +108,14 @@ int main()
|
||||
proxy setup
|
||||
*/
|
||||
Log::info("Starting proxy");
|
||||
g_Proxy = new Proxy();
|
||||
if (!g_Proxy->Init())
|
||||
proxy = new Proxy();
|
||||
if (!proxy->init())
|
||||
{
|
||||
Log::error("Proxy failed to start");
|
||||
return 1;
|
||||
}
|
||||
setProxy(true, std::format("127.0.0.1:{}", PROXY_PORT));
|
||||
proxy->addWhitelistDomain("bhvrdbd.com");
|
||||
setProxyAddress(true, std::format("127.0.0.1:{}", PROXY_PORT));
|
||||
|
||||
/*
|
||||
Spoofer setup
|
||||
@@ -101,7 +123,14 @@ int main()
|
||||
Log::info("Spoofer init");
|
||||
Spoofer* spoofer = new Spoofer();
|
||||
|
||||
spoofer->init(g_Proxy);
|
||||
spoofer->init(proxy);
|
||||
|
||||
/*
|
||||
cache cleaner setup
|
||||
*/
|
||||
Log::info("Cache cleaner init");
|
||||
cleaner = new CacheCleaner();
|
||||
cleaner->init();
|
||||
|
||||
/*
|
||||
pause
|
||||
|
||||
+692
-530
File diff suppressed because it is too large
Load Diff
+18
-4
@@ -3,9 +3,13 @@
|
||||
#include <thread>
|
||||
#include <atomic>
|
||||
#include <string>
|
||||
#include <vector>
|
||||
#include <queue>
|
||||
#include <mutex>
|
||||
#include <condition_variable>
|
||||
#include <openssl/ssl.h>
|
||||
#include <openssl/err.h>
|
||||
#include "cert_manager.h"
|
||||
#include "ssl.h"
|
||||
#include <nerutils/callback.h>
|
||||
|
||||
/*
|
||||
@@ -13,6 +17,7 @@
|
||||
use random port, test availability
|
||||
*/
|
||||
#define PROXY_PORT 58421
|
||||
#define PROXY_THREAD_COUNT 256
|
||||
|
||||
typedef unsigned __int64 SOCKET;
|
||||
|
||||
@@ -22,12 +27,14 @@ class Proxy
|
||||
Proxy();
|
||||
~Proxy();
|
||||
|
||||
bool Init();
|
||||
void Shutdown();
|
||||
bool init();
|
||||
void shutdown();
|
||||
|
||||
CallbackEvent<std::string&, const std::string&, std::string&> OnClientRequest;
|
||||
CallbackEvent<const std::string&, std::string&, std::string&> OnClientRequest;
|
||||
CallbackEvent<const std::string&, std::string&, std::string&> OnServerResponse;
|
||||
|
||||
void addWhitelistDomain(const std::string& domain);
|
||||
|
||||
private:
|
||||
void loop();
|
||||
void handleClient(SOCKET clientSocket);
|
||||
@@ -39,6 +46,13 @@ class Proxy
|
||||
std::thread _workerThread;
|
||||
std::atomic<bool> _running = false;
|
||||
|
||||
std::vector<std::thread> _poolThreads;
|
||||
std::queue<SOCKET> _clientQueue;
|
||||
std::mutex _queueMutex;
|
||||
std::condition_variable _queueCond;
|
||||
|
||||
CertManager _certManager;
|
||||
SSL_CTX* _clientCtx = nullptr;
|
||||
|
||||
std::vector<std::string> _whitelistDomains;
|
||||
};
|
||||
|
||||
+740
-555
File diff suppressed because it is too large
Load Diff
+46
-6
@@ -5,8 +5,21 @@
|
||||
#include <unordered_set>
|
||||
#include <string>
|
||||
|
||||
#include <mutex>
|
||||
|
||||
#include <nlohmann/json_fwd.hpp>
|
||||
|
||||
#include "dbdcrypt.h"
|
||||
|
||||
struct SpooferConfig
|
||||
{
|
||||
bool spoofCharacterOwnership = true;
|
||||
bool spoofInventory = true;
|
||||
bool spoofCustomization = true;
|
||||
std::string accessKey = ACCESS_KEY;
|
||||
std::string keyId = KEY_ID;
|
||||
};
|
||||
|
||||
class Spoofer
|
||||
{
|
||||
public:
|
||||
@@ -15,29 +28,56 @@ class Spoofer
|
||||
private:
|
||||
void registerListeners(Proxy* proxy);
|
||||
void loadData();
|
||||
void loadConfig();
|
||||
|
||||
void parseCatalog(std::string data);
|
||||
bool parseStackable(std::string data, std::unordered_set<std::string>* camperSet,
|
||||
std::unordered_set<std::string>* slasherSet, std::unordered_set<std::string>* globalSet);
|
||||
bool parseCustomizations(std::string data);
|
||||
|
||||
std::string getRandomItem();
|
||||
int getRandomQuantity();
|
||||
|
||||
void fixBloodweb(nlohmann::json& data);
|
||||
void generateBloodweb(nlohmann::json& data);
|
||||
|
||||
void parseAndDumpCatalog(std::string& data);
|
||||
void modifyCharacterData(nlohmann::json& js);
|
||||
|
||||
void onGetAll(std::string& body);
|
||||
void onInventoryAll(std::string& body);
|
||||
void onMessageList(std::string& body);
|
||||
void onBloodweb(std::string& body, std::string& respHeaders);
|
||||
void onUpdateEntitlements(const std::string& url, std::string& body);
|
||||
|
||||
void onGetAllClient(std::string& body);
|
||||
void onBloodwebClient(std::string& body);
|
||||
void onUpdateEntitlementsClient(const std::string& url, std::string& body);
|
||||
|
||||
void serverResponseHandler(const std::string& url, std::string& body, std::string& respHeaders);
|
||||
void clientRequestHandler(std::string& url, const std::string& body, std::string& reqHeaders);
|
||||
void clientRequestHandler(const std::string& url, std::string& body, std::string& reqHeaders);
|
||||
|
||||
SpooferConfig _config;
|
||||
|
||||
std::unordered_set<std::string> _camperItemIds;
|
||||
std::unordered_set<std::string> _slasherPowerIds;
|
||||
|
||||
std::unordered_set<std::string> _camperOfferingIds;
|
||||
std::unordered_set<std::string> _slasherOfferingIds;
|
||||
std::unordered_set<std::string> _globalOfferingIds;
|
||||
|
||||
std::unordered_set<std::string> _camperAddonIds;
|
||||
std::unordered_set<std::string> _slasherAddonIds;
|
||||
|
||||
std::unordered_set<std::string> _slasherPerkIds;
|
||||
std::unordered_set<std::string> _camperPerkIds;
|
||||
std::unordered_set<std::string> _slasherPerkIds;
|
||||
|
||||
std::unordered_set<std::string> _catalogOutfitIds;
|
||||
std::unordered_set<std::string> _catalogItemIds;
|
||||
|
||||
std::string _lastBloodWebChar = "Ace";
|
||||
std::unordered_set<std::string> _unownedCharacters;
|
||||
std::unordered_set<std::string> _characterList;
|
||||
|
||||
std::unordered_set<std::string> _dlcListGRDK;
|
||||
std::unordered_set<std::string> _dlcListEGS;
|
||||
|
||||
std::string _lastBloodWebChar = "";
|
||||
std::mutex _mtx;
|
||||
};
|
||||
|
||||
@@ -0,0 +1,232 @@
|
||||
#include "ssl.h"
|
||||
#include "utils.h"
|
||||
|
||||
#include <nerutils/log.h>
|
||||
|
||||
#include <openssl/bio.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/x509v3.h>
|
||||
#include <openssl/bn.h>
|
||||
#include <openssl/rsa.h>
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/ssl.h>
|
||||
|
||||
#include <random>
|
||||
#include <cstdlib>
|
||||
#include <ctime>
|
||||
#include <cstring>
|
||||
|
||||
#include <wincrypt.h>
|
||||
#include <processthreadsapi.h>
|
||||
|
||||
template <typename T, void (*f)(T*)> struct Deleter
|
||||
{
|
||||
void operator()(T* p) const { f(p); }
|
||||
};
|
||||
|
||||
using EVP_PKEY_ptr = std::unique_ptr<EVP_PKEY, Deleter<EVP_PKEY, EVP_PKEY_free>>;
|
||||
using X509_ptr = std::unique_ptr<X509, Deleter<X509, X509_free>>;
|
||||
using SSL_CTX_ptr = std::unique_ptr<SSL_CTX, Deleter<SSL_CTX, SSL_CTX_free>>;
|
||||
using BIO_ptr = std::unique_ptr<BIO, Deleter<BIO, BIO_vfree>>;
|
||||
|
||||
CertManager::CertManager() : _caPkey(nullptr), _caCert(nullptr), _sessionPkey(nullptr) {}
|
||||
|
||||
CertManager::~CertManager()
|
||||
{
|
||||
if (_caPkey) EVP_PKEY_free(_caPkey);
|
||||
if (_caCert) X509_free(_caCert);
|
||||
if (_sessionPkey) EVP_PKEY_free(_sessionPkey);
|
||||
|
||||
for (auto& pair : _hostContexts)
|
||||
SSL_CTX_free(pair.second);
|
||||
}
|
||||
|
||||
bool CertManager::init()
|
||||
{
|
||||
EVP_PKEY_CTX* pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, nullptr);
|
||||
if (!pctx) return false;
|
||||
|
||||
EVP_PKEY_keygen_init(pctx);
|
||||
EVP_PKEY_CTX_set_rsa_keygen_bits(pctx, 2048);
|
||||
|
||||
EVP_PKEY* rawPkey = nullptr;
|
||||
if (EVP_PKEY_keygen(pctx, &rawPkey) <= 0)
|
||||
{
|
||||
Log::error("Failed to generate session key");
|
||||
EVP_PKEY_CTX_free(pctx);
|
||||
return false;
|
||||
}
|
||||
_sessionPkey = rawPkey;
|
||||
EVP_PKEY_CTX_free(pctx);
|
||||
|
||||
if (loadCA())
|
||||
{
|
||||
Log::verbose("Loaded existing CA certificate");
|
||||
return true;
|
||||
}
|
||||
|
||||
Log::verbose("No CA found, generating");
|
||||
return generateCA();
|
||||
}
|
||||
|
||||
bool CertManager::loadCA()
|
||||
{
|
||||
std::string path = utils::getExePath();
|
||||
|
||||
BIO_ptr keyBio(BIO_new_file((path + "/key.pem").c_str(), "r"));
|
||||
if (!keyBio) return false;
|
||||
_caPkey = PEM_read_bio_PrivateKey(keyBio.get(), nullptr, nullptr, nullptr);
|
||||
|
||||
BIO_ptr certBio(BIO_new_file((path + "/cert.pem").c_str(), "r"));
|
||||
if (!certBio) return false;
|
||||
_caCert = PEM_read_bio_X509(certBio.get(), nullptr, nullptr, nullptr);
|
||||
|
||||
return (_caPkey && _caCert);
|
||||
}
|
||||
|
||||
void CertManager::installCert(X509* cert)
|
||||
{
|
||||
if (!cert) return;
|
||||
|
||||
/*
|
||||
X509 to DER
|
||||
*/
|
||||
int derLen = i2d_X509(cert, nullptr);
|
||||
if (derLen < 0) return;
|
||||
|
||||
unsigned char* derBuf = new unsigned char[derLen];
|
||||
unsigned char* p = derBuf;
|
||||
i2d_X509(cert, &p);
|
||||
|
||||
PCCERT_CONTEXT certCtx = CertCreateCertificateContext(X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, derBuf, derLen);
|
||||
if (certCtx)
|
||||
{
|
||||
HCERTSTORE rootStore = CertOpenStore(CERT_STORE_PROV_SYSTEM, 0, 0, CERT_SYSTEM_STORE_CURRENT_USER, L"Root");
|
||||
if (rootStore)
|
||||
{
|
||||
BOOL success = CertAddCertificateContextToStore(rootStore, certCtx, CERT_STORE_ADD_REPLACE_EXISTING, NULL);
|
||||
|
||||
if (success)
|
||||
Log::info("CA certificate installed");
|
||||
else
|
||||
Log::error("Failed to install CA certificate");
|
||||
|
||||
CertCloseStore(rootStore, 0);
|
||||
}
|
||||
CertFreeCertificateContext(certCtx);
|
||||
}
|
||||
|
||||
delete[] derBuf;
|
||||
}
|
||||
|
||||
bool CertManager::generateCA()
|
||||
{
|
||||
std::random_device rd;
|
||||
std::mt19937 gen(rd());
|
||||
|
||||
/*
|
||||
key
|
||||
*/
|
||||
EVP_PKEY_CTX* pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, nullptr);
|
||||
EVP_PKEY_keygen_init(pctx);
|
||||
EVP_PKEY_CTX_set_rsa_keygen_bits(pctx, 2048);
|
||||
EVP_PKEY* rawCaKey = nullptr;
|
||||
EVP_PKEY_keygen(pctx, &rawCaKey);
|
||||
_caPkey = rawCaKey;
|
||||
EVP_PKEY_CTX_free(pctx);
|
||||
|
||||
/*
|
||||
cert
|
||||
*/
|
||||
X509_ptr cert(X509_new());
|
||||
X509_set_version(cert.get(), 2);
|
||||
ASN1_INTEGER_set(X509_get_serialNumber(cert.get()), 1);
|
||||
X509_gmtime_adj(X509_get_notBefore(cert.get()), 0);
|
||||
X509_gmtime_adj(X509_get_notAfter(cert.get()), 31536000L); // 1 year
|
||||
|
||||
X509_name_st* subjName = X509_get_subject_name(cert.get());
|
||||
std::string randomCN = utils::randomizeString(16);
|
||||
X509_NAME_add_entry_by_txt(subjName, "CN", MBSTRING_ASC, (unsigned char*)randomCN.c_str(), -1, -1, 0);
|
||||
X509_set_issuer_name(cert.get(), subjName);
|
||||
X509_set_pubkey(cert.get(), _caPkey);
|
||||
|
||||
/*
|
||||
CA constraints
|
||||
*/
|
||||
X509V3_CTX v3ctx;
|
||||
X509V3_set_ctx(&v3ctx, cert.get(), cert.get(), nullptr, nullptr, 0);
|
||||
X509_EXTENSION* ext = X509V3_EXT_conf_nid(nullptr, &v3ctx, NID_basic_constraints, "critical,CA:TRUE");
|
||||
X509_add_ext(cert.get(), ext, -1);
|
||||
X509_EXTENSION_free(ext);
|
||||
|
||||
if (X509_sign(cert.get(), _caPkey, EVP_sha256()) <= 0) return false;
|
||||
|
||||
/*
|
||||
out
|
||||
*/
|
||||
std::string path = utils::getExePath();
|
||||
BIO_ptr kOut(BIO_new_file((path + "/key.pem").c_str(), "w"));
|
||||
PEM_write_bio_PrivateKey(kOut.get(), _caPkey, nullptr, nullptr, 0, nullptr, nullptr);
|
||||
|
||||
BIO_ptr cOut(BIO_new_file((path + "/cert.pem").c_str(), "w"));
|
||||
PEM_write_bio_X509(cOut.get(), cert.get());
|
||||
|
||||
/*
|
||||
install and release
|
||||
*/
|
||||
installCert(cert.get());
|
||||
|
||||
_caCert = cert.release();
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
SSL_CTX* CertManager::createHostContext(const std::string& host)
|
||||
{
|
||||
std::lock_guard<std::mutex> lock(_mutex);
|
||||
if (_hostContexts.count(host)) return _hostContexts[host];
|
||||
|
||||
/*
|
||||
cert base
|
||||
*/
|
||||
X509_ptr cert(X509_new());
|
||||
X509_set_version(cert.get(), 2);
|
||||
|
||||
ASN1_INTEGER_set(X509_get_serialNumber(cert.get()), static_cast<long>(std::hash<std::string>{}(host) & 0x7FFFFFFF));
|
||||
|
||||
X509_gmtime_adj(X509_get_notBefore(cert.get()), 0);
|
||||
X509_gmtime_adj(X509_get_notAfter(cert.get()), 31536000L);
|
||||
|
||||
X509_name_st* subjName = X509_get_subject_name(cert.get());
|
||||
X509_NAME_add_entry_by_txt(subjName, "CN", MBSTRING_ASC, (unsigned char*)host.c_str(), -1, -1, 0);
|
||||
X509_set_issuer_name(cert.get(), X509_get_subject_name(_caCert));
|
||||
X509_set_pubkey(cert.get(), _sessionPkey);
|
||||
|
||||
/*
|
||||
SAN
|
||||
*/
|
||||
X509V3_CTX v3ctx;
|
||||
X509V3_set_ctx(&v3ctx, _caCert, cert.get(), nullptr, nullptr, 0);
|
||||
std::string altName = "DNS:" + host;
|
||||
X509_EXTENSION* ext = X509V3_EXT_conf_nid(nullptr, &v3ctx, NID_subject_alt_name, altName.c_str());
|
||||
X509_add_ext(cert.get(), ext, -1);
|
||||
X509_EXTENSION_free(ext);
|
||||
|
||||
/*
|
||||
sign & ctx load
|
||||
*/
|
||||
if (X509_sign(cert.get(), _caPkey, EVP_sha256()) <= 0) return nullptr;
|
||||
|
||||
SSL_CTX* ctx = SSL_CTX_new(TLS_server_method());
|
||||
if (!ctx) return nullptr;
|
||||
|
||||
if (SSL_CTX_use_certificate(ctx, cert.get()) <= 0 || SSL_CTX_use_PrivateKey(ctx, _sessionPkey) <= 0)
|
||||
{
|
||||
SSL_CTX_free(ctx);
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
_hostContexts[host] = ctx;
|
||||
return ctx;
|
||||
}
|
||||
@@ -0,0 +1,39 @@
|
||||
#pragma once
|
||||
|
||||
#include <string>
|
||||
#include <unordered_map>
|
||||
#include <mutex>
|
||||
|
||||
struct x509_st;
|
||||
struct X509_name_st;
|
||||
struct ssl_st;
|
||||
struct ssl_ctx_st;
|
||||
struct evp_pkey_st;
|
||||
|
||||
typedef struct x509_st X509;
|
||||
typedef struct ssl_st SSL;
|
||||
typedef struct ssl_ctx_st SSL_CTX;
|
||||
typedef struct evp_pkey_st EVP_PKEY;
|
||||
|
||||
class CertManager
|
||||
{
|
||||
public:
|
||||
CertManager();
|
||||
~CertManager();
|
||||
|
||||
bool init();
|
||||
SSL_CTX* createHostContext(const std::string& host);
|
||||
|
||||
private:
|
||||
bool generateCA();
|
||||
bool loadCA();
|
||||
|
||||
void installCert(X509* cert);
|
||||
|
||||
EVP_PKEY* _caPkey = nullptr;
|
||||
X509* _caCert = nullptr;
|
||||
EVP_PKEY* _sessionPkey = nullptr;
|
||||
|
||||
std::mutex _mutex;
|
||||
std::unordered_map<std::string, SSL_CTX*> _hostContexts;
|
||||
};
|
||||
@@ -0,0 +1,24 @@
|
||||
#include "utils.h"
|
||||
|
||||
#include <minwindef.h>
|
||||
#include <libloaderapi.h>
|
||||
|
||||
std::string utils::getExePath()
|
||||
{
|
||||
char buffer[MAX_PATH];
|
||||
GetModuleFileNameA(NULL, buffer, MAX_PATH);
|
||||
std::string path(buffer);
|
||||
size_t pos = path.find_last_of("\\/");
|
||||
if (pos != std::string::npos) return path.substr(0, pos + 1);
|
||||
return "";
|
||||
}
|
||||
|
||||
std::string utils::randomizeString(size_t length)
|
||||
{
|
||||
const char charset[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
|
||||
std::string result;
|
||||
result.resize(length);
|
||||
for (size_t i = 0; i < length; ++i)
|
||||
result[i] = charset[rand() % (sizeof(charset) - 1)];
|
||||
return result;
|
||||
}
|
||||
@@ -0,0 +1,9 @@
|
||||
#pragma once
|
||||
|
||||
#include <string>
|
||||
|
||||
namespace utils
|
||||
{
|
||||
std::string getExePath();
|
||||
std::string randomizeString(size_t length);
|
||||
} // namespace utils
|
||||
Vendored
+6
@@ -1,2 +1,8 @@
|
||||
add_subdirectory(nerutils)
|
||||
add_subdirectory(json)
|
||||
|
||||
set(ZLIB_BUILD_TESTING OFF)
|
||||
set(ZLIB_BUILD_STATIC ON)
|
||||
set(ZLIB_BUILD_SHARED OFF)
|
||||
set(ZLIB_INSTALL OFF)
|
||||
add_subdirectory(zlib)
|
||||
|
||||
Vendored
+1
-1
Submodule vendor/CUE4Parse updated: 839bcc0e82...3bf2d8dfb9
+1
Submodule vendor/zlib added at f9dd6009be
Reference in New Issue
Block a user