This repository was archived by the owner on Jun 8, 2020. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdecode.py
107 lines (94 loc) · 3.93 KB
/
decode.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
'''
Decode a directory, and copy it to external path.
'''
import os
import json
import argparse
import subprocess
import shutil
import sys
import dbdecrypt
DEPENDENT_PATH = "./dep"
TEMP_PATH = "./temp/"
EXTERNAL_PATH = "./runtime/external"
def resolve_exec_name(filename, isexe=True):
return "%s%s" % (filename, ".exe" if os.name == "nt" and isexe else "")
class SIFDecrypter:
def __init__(self):
self.args = self.init_arg_parser()
def init_arg_parser(self):
parser = argparse.ArgumentParser(description="Decode a directory of game resources and copy it to external path.")
parser.add_argument("--dependent-path", metavar="PATH", default=DEPENDENT_PATH)
parser.add_argument("--temp-path", metavar="PATH", default=TEMP_PATH, required=True)
parser.add_argument("--external-path", metavar="PATH", default=EXTERNAL_PATH)
parser.add_argument("--db-decrypt-keys", metavar="JSON", type=json.loads)
parser.add_argument("--no-remove", action="store_true")
return parser.parse_args()
def resolve_exec_name(self, filename, isexe=True):
dependent_path = self.args.dependent_path
exec_name = resolve_exec_name(filename, isexe)
realpath = os.path.realpath(os.path.join(dependent_path, exec_name))
if not os.path.exists(realpath):
raise FileNotFoundError(realpath)
return realpath
def decrypt_texture(self, filepath):
subprocess.call([self.resolve_exec_name("Itsudemo"), "-i", filepath])
def decrypt_json(self, filepath):
subprocess.call([self.resolve_exec_name("jbcc-dump"), "-o", filepath, filepath])
def decrypt_file(self, filepath):
if os.path.getsize(filepath) > 0:
subprocess.call([self.resolve_exec_name("HonokaMiku"), filepath])
_root, _ext = os.path.splitext(filepath)
if _ext == ".texb":
self.decrypt_texture(filepath)
os.remove(filepath)
elif _ext == ".imag":
os.remove(filepath)
elif _ext == ".json":
self.decrypt_json(filepath)
elif _ext == ".db_":
try:
dbdecrypt.decrypt(filepath, self.args["db_decrypt_keys"])
except Exception as e:
print("Catch error: ", e, file=sys.stderr)
elif _ext == ".lua":
proc = subprocess.Popen(["java", "-jar", self.resolve_exec_name("unluac.jar", False), filepath], stdout=subprocess.PIPE)
output = proc.stdout.read()
with open(filepath, "wb") as f:
f.write(output)
elif _ext == ".png":
pass
else:
pass
else:
os.remove(filepath)
def decrypt(self):
'''
Main decode function
'''
#decrypter = SIFDecrypter()
temp_path = self.args.temp_path
external_path = self.args.external_path
for root, dirs, paths in os.walk(temp_path):
rel_path = os.path.relpath(root, temp_path)
for _path in paths:
self.decrypt_file(os.path.realpath(os.path.join(root, _path)))
pass
if not os.path.exists(external_path):
os.mkdir(external_path)
for root, dirs, paths in os.walk(temp_path):
# make corresponding dirs
rel_path = os.path.relpath(root, temp_path)
for _dir in dirs:
external_dir = os.path.join(external_path, rel_path, _dir)
if not os.path.exists(external_dir):
os.mkdir(external_dir)
for _path in paths:
src_path = os.path.join(temp_path, rel_path, _path)
dest_path = os.path.join(external_path, rel_path, _path)
shutil.copy2(src_path, dest_path)
# shutil.rmtree(temp_path)
if __name__ == "__main__":
decrypter = SIFDecrypter()
decrypter.decrypt()
pass