Skasowanie części makr

This commit is contained in:
yanczi 2025-12-23 22:08:29 +01:00
parent f9ea960cf0
commit bfc6c1811d
6 changed files with 13 additions and 45 deletions

View file

@ -22,7 +22,6 @@
CreateCargo::CreateCargo() CreateCargo::CreateCargo()
: signature(fl::sigpak) : signature(fl::sigpak)
, extension(fl::extpak) , extension(fl::extpak)
, version(VERSION)
, methodFlags(0) , methodFlags(0)
, xxhState(XXH64_createState()) , xxhState(XXH64_createState())
, offset(0) , offset(0)
@ -133,11 +132,11 @@ bool CreateCargo::GetFileList(const std::string& path)
{ {
if (FindOnTheList(zipList, fileRef) || CheckFileExtension(fileRef, zipList)) if (FindOnTheList(zipList, fileRef) || CheckFileExtension(fileRef, zipList))
{ {
pc.parameter = FindOnTheList(encList, fileRef) || CheckFileExtension(fileRef, encList) ? FILE_FLAG_ZIPENC : FILE_FLAG_COMPRESS; pc.parameter = FindOnTheList(encList, fileRef) || CheckFileExtension(fileRef, encList) ? flag::ezd : flag::zip;
} }
else else
{ {
pc.parameter = FindOnTheList(encList, fileRef) || CheckFileExtension(fileRef, encList) ? FILE_FLAG_ENCRYPT : FILE_FLAG_RAW; pc.parameter = FindOnTheList(encList, fileRef) || CheckFileExtension(fileRef, encList) ? flag::enc : flag::raw;
} }
pc.path = PathToUnixLike(tmpPath); pc.path = PathToUnixLike(tmpPath);
std::cout << pc.path << " - " << pc.parameter << std::endl; std::cout << pc.path << " - " << pc.parameter << std::endl;

View file

@ -72,7 +72,6 @@ public:
private: private:
const std::string signature; const std::string signature;
const std::string extension; const std::string extension;
const signed char version;
uint8_t methodFlags; uint8_t methodFlags;

View file

@ -22,28 +22,6 @@
#include <cstdint> #include <cstdint>
#include <string> #include <string>
#define EXTENSION "pak"
#define SIGNATURE "XPAK"
#define SIGNATURE_KEY_FILE "XKEY"
#define VERSION 0x03
// WielkoϾ pojedynczego bloku strumienia
#define CHUNK_STREAM_512KB 524288 // 512KB
#define CHUNK_STREAM_16MB 16777216 // 16MB
#define CHUNK_STREAM_256MB 268435456 // 256MB
// Rozmiar pojedynczego bloku
#define CHUNK_BLOCK_SIZE 131072 // 128KB
#define FILE_FLAG_RAW 0x00
#define FILE_FLAG_COMPRESS 0x0F
#define FILE_FLAG_ENCRYPT 0xF0
#define FILE_FLAG_ZIPENC 0xFF
#define FILE_FLAG_FILTERING 0xAB
//Prgoram title //Prgoram title
#define PROGRAM_TITLE "eXtendet PAK" #define PROGRAM_TITLE "eXtendet PAK"
#define PROGRAM_VERSION "v0.5" #define PROGRAM_VERSION "v0.5"

View file

@ -67,9 +67,6 @@ void EncryptionManager::generateKeys()
void EncryptionManager::saveKey(const std::string& path, bool hpp) void EncryptionManager::saveKey(const std::string& path, bool hpp)
{ {
const std::string sig = SIGNATURE_KEY_FILE;
const int8_t ver = VERSION;
// Wygeneruj time stamp // Wygeneruj time stamp
std::time_t now = std::time(nullptr); std::time_t now = std::time(nullptr);
const int time = static_cast<int>(now); const int time = static_cast<int>(now);
@ -78,14 +75,13 @@ void EncryptionManager::saveKey(const std::string& path, bool hpp)
std::vector<char> keyVec(reinterpret_cast<const char*>(key.data()), std::vector<char> keyVec(reinterpret_cast<const char*>(key.data()),
reinterpret_cast<const char*>(key.data()) + key.size()); reinterpret_cast<const char*>(key.data()) + key.size());
const uint64_t crcKey = XXH64(keyVec.data(), keyVec.size(), VERSION); const uint64_t crcKey = XXH64(keyVec.data(), keyVec.size(), 0);
// Zapisz ten œmietnik do pliku KEY // Zapisz ten œmietnik do pliku KEY
std::ofstream file(path + ".key", std::ios::binary); std::ofstream file(path + ".key", std::ios::binary);
if (!file) { std::cout << "Failed to save encryption key to file" << std::endl; } if (!file) { std::cout << "Failed to save encryption key to file" << std::endl; }
file.write(sig.data(), sig.length()); file.write(fl::sigkey.data(), fl::sigkey.length());
file.write(reinterpret_cast<const char*>(&ver), sizeof(ver));
file.write(reinterpret_cast<const char*>(&time), sizeof(time)); file.write(reinterpret_cast<const char*>(&time), sizeof(time));
file.write(reinterpret_cast<const char*>(keyVec.data()), keyVec.size()); file.write(reinterpret_cast<const char*>(keyVec.data()), keyVec.size());
file.write(reinterpret_cast<const char*>(&crcKey), sizeof(crcKey)); file.write(reinterpret_cast<const char*>(&crcKey), sizeof(crcKey));
@ -137,18 +133,15 @@ std::string EncryptionManager::toHex(const unsigned char* data, size_t len)
void EncryptionManager::loadKey(const std::string& path) void EncryptionManager::loadKey(const std::string& path)
{ {
std::ifstream file(path + ".key", std::ios::binary); std::ifstream file(path + ".key", std::ios::binary);
std::vector<char> sig(fl::sigkey.size());
const std::string signature = SIGNATURE_KEY_FILE;
std::vector<char> sig(signature.size());
int8_t ver; int8_t ver;
int time; int time;
// Wczytaj // Wczytaj
file.read(sig.data(), sig.size()); file.read(sig.data(), sig.size());
file.read(reinterpret_cast<char*>(&ver), sizeof(ver));
// SprawdŸ czy plik klucza jest poprawny // SprawdŸ czy plik klucza jest poprawny
if (std::string(sig.begin(), sig.end()) != signature || ver != VERSION) if (std::string(sig.begin(), sig.end()) != fl::sigkey)
{ {
throw std::runtime_error("Invalid key file!"); throw std::runtime_error("Invalid key file!");
} }
@ -161,7 +154,7 @@ void EncryptionManager::loadKey(const std::string& path)
file.read(reinterpret_cast<char*>(&crcKey), sizeof(crcKey)); file.read(reinterpret_cast<char*>(&crcKey), sizeof(crcKey));
// SprawdŸ integralnoœæ klucza // SprawdŸ integralnoœæ klucza
if (XXH64(keyVec.data(), keyVec.size(), VERSION) != crcKey) if (XXH64(keyVec.data(), keyVec.size(), 0) != crcKey)
{ {
throw std::runtime_error("Key integrity error!"); throw std::runtime_error("Key integrity error!");
} }

View file

@ -23,7 +23,7 @@ ExtractCargo::ExtractCargo()
:filesLen(0) :filesLen(0)
, tablePosition(0) , tablePosition(0)
, xxhState(XXH64_createState()) , xxhState(XXH64_createState())
, signature(SIGNATURE) , signature(fl::sigpak)
{ {
// TODO Auto-generated constructor stub // TODO Auto-generated constructor stub
XXH64_reset(xxhState, 0); XXH64_reset(xxhState, 0);

View file

@ -59,8 +59,7 @@ bool ViewCargo::ViewFiles(const std::string& path)
uint64_t tabPos = 0; uint64_t tabPos = 0;
uint32_t tabSize = 0; uint32_t tabSize = 0;
const std::string signature = SIGNATURE; std::vector<char> magic(fl::sigpak.length());
std::vector<char> magic(signature.length());
int8_t cargoVer = 0; int8_t cargoVer = 0;
std::ifstream cargo(path, std::ios::binary); std::ifstream cargo(path, std::ios::binary);
@ -82,7 +81,7 @@ bool ViewCargo::ViewFiles(const std::string& path)
cargo.read(reinterpret_cast<char*>(&tabSize), sizeof(tabSize)); cargo.read(reinterpret_cast<char*>(&tabSize), sizeof(tabSize));
//SprawdŸ czy kontener ma poprawn¹ sygnature //SprawdŸ czy kontener ma poprawn¹ sygnature
if (std::string(magic.begin(), magic.end()) != signature) if (std::string(magic.begin(), magic.end()) != fl::sigpak)
{ {
std::cerr << "Error: Corrupted Cargo" << std::endl; std::cerr << "Error: Corrupted Cargo" << std::endl;
cargo.close(); cargo.close();
@ -129,15 +128,15 @@ void ViewCargo::ShowFile(const std::string& file, const uint8_t& flag)
// Ustawianie checkboxów // Ustawianie checkboxów
switch (flag) switch (flag)
{ {
case FILE_FLAG_COMPRESS: case flag::zip:
compresedCheck = "[x]"; compresedCheck = "[x]";
break; break;
case FILE_FLAG_ENCRYPT: case flag::enc:
encryptedCheck = "[x]"; encryptedCheck = "[x]";
break; break;
case FILE_FLAG_ZIPENC: case flag::ezd:
compresedCheck = "[x]"; compresedCheck = "[x]";
encryptedCheck = "[x]"; encryptedCheck = "[x]";
break; break;