View Single Post
  #160  
Old 05-08-2013, 02:23 PM
Furinex Furinex is offline
Sarnak

Furinex's Avatar

Join Date: Apr 2013
Posts: 339
Send a message via AIM to Furinex
Default

Quote:
Originally Posted by August [You must be logged in to view images. Log in or Register.]
And yes what you are doing IS reverse engineering but it is a black-box approach. Something consumes these files and translates it to DirectX (or maybe directx directly consumes them - I don't know?).

If we can find where in the source these files are consumed we should be able to say what each field is and what it does if the code is well documented (hah) or the values do something besides getting directly passed into the graphics engine (directx).

Like I said - I am approaching this from looking at only the the title of this post and a talk with Francesca last night. To me, I would have to imagine that these .edd and .eff files are some kind of serialized datasource that is deserialized by client/server and then acted upon. More than likely there was a tool that serialized the data that verant had and in the end we would still hvae to use the hex editor to get at the values, but at the very least we could get 100% comprehesion of the values.

Well, if something can be done to accomplish this, then I would love to see the result. Also, I would love to see the result of how the spell.eff file (Old spell file) is processed as well, since this file has the classic shielding effect that I cannot reproduce.