diff options
author | Loek Le Blansch <loek@pipeframe.xyz> | 2024-08-19 16:31:30 +0200 |
---|---|---|
committer | Loek Le Blansch <loek@pipeframe.xyz> | 2024-08-19 16:31:30 +0200 |
commit | e834c884e0f123420c094daa848b69ebb703754d (patch) | |
tree | ce32e71e722b3a4ae5fc4ae7f29380227296b853 /docs | |
parent | b901e2feaa871cea58d9d507e6c0fcc81fadf1d6 (diff) |
WIP more dissect + notes
Diffstat (limited to 'docs')
-rw-r--r-- | docs/notes.md | 58 |
1 files changed, 45 insertions, 13 deletions
diff --git a/docs/notes.md b/docs/notes.md index 5da8efe..3473ee4 100644 --- a/docs/notes.md +++ b/docs/notes.md @@ -81,10 +81,12 @@ sufficiently advanced local multiplayer emulation. source: <https://git.pipeframe.xyz/fork/melonDS> +[masscat-nifi]: <https://web.archive.org/web/20090202194241/http://masscat.afraid.org/ninds/proto_info.php> + - melonDS @ Config > Wifi settings "Local multiplayer features do not use the same network protocols as online play" - comment @ src/Wifi.cpp:46 "multiplayer host TX sequence" - references to `RFTransfer_Type{2,3}` @ <https://www.problemkaputt.de/gbatek.htm#dswifirfchip> -- nintendo ds ni-fi protocol @ <https://web.archive.org/web/20090202194241/http://masscat.afraid.org/ninds/proto_info.php> +- nintendo ds ni-fi protocol @ [masscat-nifi] - melonDS emulates actual 802.11b frames - the protocol does not appear to be encrypted: @@ -92,7 +94,8 @@ source: <https://git.pipeframe.xyz/fork/melonDS> the string `lork` is visible as plain text in the hexdump (offset 0x0056), which appears to be some kind of 16-bit encoding of the username set on the - emulator used to capture these packets + emulator used to capture these packets (this is likely UCS-2 and not UTF-16 + as suggested by [masscat-nifi] which specifies UCS-2). - The messages are not sent as single packets. The Ni-Fi protocol appears to set up a constant stream, and messages are sent across multiple frames. - A full height filled-in message results in 64 packets (with Wireshark filter @@ -114,7 +117,8 @@ source: <https://git.pipeframe.xyz/fork/melonDS> ![](../assets/pictochat-msg-height-1-4.png) ![](../assets/pictochat-msg-height-5-draw.png) -- Message content is likely only cropped when displaying +- In addition to being cropped before sending, the message border appears to + mask the drawing: ![](../assets/pictochat-msg-crop.png) ![](../assets/pictochat-msg-crop-lork2.png) @@ -132,12 +136,14 @@ source: <https://git.pipeframe.xyz/fork/melonDS> (except the bottom and corners) that can not be filled in. The bottom border is correctly displayed for received messages, but the edit field has an additional row of pixels that directly touch the message border on the - bottom. + bottom which is not visible in the received version of the message (i.e. is + being masked). - When any message is cloned, additional pixels that were masked on the top screen become visible again in the edit field. This includes the bottom row of pixels, as well as the two rows of pixels shown in the single line message picture. - - The drawable area (including obstructed top-left corner) is 228x80 pixels + - The **apparent** drawable area (including obstructed top-left corner) is + 228x80 pixels. Observed package counts (no resends) for messages of different sizes: |draw area|display height|packet#| @@ -158,10 +164,9 @@ Notable: - Messages that draw below line 1 while keeping line 1 empty can't be cropped to utilize line 1 as the username label is in the way. The captured packet counts suggest that the content of line 1 is still sent (although empty). -- The messages are cropped twice: - * (destructive) *before* sending, as suggested by the packet counts - * (non-destructive or display only) when displayed in the message log on - the top screen +- The messages are cropped *before* sending, as suggested by the packet counts +- The message content is masked when displayed in the message log on the top + screen ### Message content @@ -175,9 +180,9 @@ Notable: 0xe004 at offset 0x0026, while resends have a value of 0xf000 instead. - There are a lot of messages with length 0xaa (170), these appear to include a random 32-bit value at offset 0x0046. -- The message content (suspected bitmap-like format) appears to be sent - unencrypted (patterns of 0x0 and 0x1 nibbles clearly visible in hexdump). -- 0x004d - 0x00ec appears to be used to send the actual message content: +- The message content appears to be sent unencrypted (patterns of 0x0 and 0x1 + nibbles clearly visible in hexdump). +- Offset 0x004d - 0x00ec appears to be used to send the actual message content: ![](../assets/pictochat-msg-crop-lork2.png) ![](../assets/ws-msg-fill-top.png) @@ -272,6 +277,32 @@ type 2 exclusively. (Bottom Wireshark window is the room host, top window shows type != 2 Ni-Fi messages from the system that joined later) +## Drawing format + +- The drawings appear to be split into 8x8 sprite tiles. TODO: pixel order + within tiles + TODO: sprite ordering (likely both reading order). + +### Palette + +|idx|hex| +|-|-| +|0|transparent (white)| +|1|`#000000` <b style="color: #000000">■</b>| +|2|`#d3cbc3` <b style="color: #d3cbc3">■</b>| +|3|`#eb00eb` <b style="color: #eb00eb">■</b>| +|4|`#fb008a` <b style="color: #fb008a">■</b>| +|5|`#fb0028` <b style="color: #fb0028">■</b>| +|6|`#fb4900` <b style="color: #fb4900">■</b>| +|7|`#fba200` <b style="color: #fba200">■</b>| +|8|`#e3f300` <b style="color: #e3f300">■</b>| +|9|`#82fb00` <b style="color: #82fb00">■</b>| +|a|`#10fb20` <b style="color: #10fb20">■</b>| +|b|`#00fbba` <b style="color: #00fbba">■</b>| +|c|`#00c3fb` <b style="color: #00c3fb">■</b>| +|d|`#0079fb` <b style="color: #0079fb">■</b>| +|e|`#0030fb` <b style="color: #0030fb">■</b>| +|f|`#2800fb` <b style="color: #2800fb">■</b>| + ## Unsure/notes - Is the endianness of the DS properly emulated? @@ -290,5 +321,6 @@ messages from the system that joined later) * resolution * pixel ordering * palette color indices (pixels are 1 nibble) -- what types of pictochat packets are there? +- what types of pictochat packets are there? (i.e. how are room join/leave + events broadcast?) |