xforce / eve-echoes-tools

Collection of tools helping in reverse engineering Eve Echoes
MIT License
70 stars 19 forks source link

Translation index #3

Closed bilhackmac closed 4 years ago

bilhackmac commented 4 years ago

Hi.

First thanks for this tools, it's really awesome.

Maybe I miss something but I don't find a way to use res/staticdata/gettext/msg_index/index.json (once extracted). Values match locales res/staticdata/gettext/<locale>/* but keys doesn't match any objects id.

Have you any idea ?

xforce commented 4 years ago

Take a look at the included text_lookup.py

Basically translations work based on a hash of the chinese text, no object ids.

Hope that helps.

bilhackmac commented 4 years ago

Ok thx, that's work great, I really missed this script.

I had effectively thought of a hash (with only numeric output) but I don't even known murmur3.

And just by curiosity, where do you find seed for mm3 ?

xforce commented 4 years ago

Ok thx, that's work great, I really missed this script.

I had effectively thought of a hash (with only numeric output) but I don't even known murmur3.

And just by curiosity, where do you find seed for mm3 ?

Somewhere in the game code.

bilhackmac commented 4 years ago

Ok. That out of my range.

Thanks a lot