CMD AUTH RECONNECT CHALLENGE Server: Difference between revisions
Jump to navigation
Jump to search
(Created page with " = Packet Layout = {| class="wikitable" |+ AuthReconnectionChallenge_Server ! Offset ! Size / Endianness ! Type ! Name ! Description |- !colspan="5"| Header |- | 0x0 || 1 / -...") |
(Add example packets) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
[[CMD_AUTH_RECONNECT_CHALLENGE_Server]] is a [[Login Packet]] sent by the server after receiving a [[CMD_AUTH_RECONNECT_CHALLENGE_Client]]. It is followed by a [[CMD_AUTH_RECONNECT_PROOF_Client]] from the client. | |||
= Packet Layout = | = Packet Layout = | ||
Line 12: | Line 14: | ||
!colspan="5"| Header | !colspan="5"| Header | ||
|- | |- | ||
| 0x0 || 1 / - || uint8 || command || | | 0x0 || 1 / - || uint8 || command || 0x02 for [[CMD_AUTH_RECONNECT_CHALLENGE]] | ||
|- | |- | ||
| 0x1 || 1 / - || uint8 || | | 0x1 || 1 / - || uint8 || result || The fields below are only included if this is SUCCESS (0x0). | ||
|- | |- | ||
!colspan="5"| Body | !colspan="5"| Body | ||
Line 22: | Line 24: | ||
| 0x12 || 16 / - || char[16] || checksum_salt || No longer used by client after 1.12. Can be all zeros. | | 0x12 || 16 / - || char[16] || checksum_salt || No longer used by client after 1.12. Can be all zeros. | ||
|} | |} | ||
= Size = | |||
For all versions, if the result is not [[Login_Packet_Results|SUCCESS]] (0x00) the packet is 2 bytes. If the result is SUCCESS the packet is 34 bytes. | |||
= Example Packet = | |||
Below is complete packet sent from a {{Template:Sandbox/PrettyVersion|expansionlevel=1|build=1.12.1.5875}} client. The values are explained as comments. This can be used for verifying packet parser implementations. | |||
char bytes[] = | |||
0x02, // Opcode: CMD_AUTH_RECONNECT_CHALLENGE | |||
0x00, // result: SUCCESS | |||
0xa9, 0x14, 0x99, 0x52, 0xa5, 0x32, 0x31, 0x5d, 0x27, 0x7a, 0x00, 0xe8, 0x5a, | |||
0xda, 0xbb, 0x75, // Challenge data | |||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | |||
0x00, 0x00, 0x00, 0x00, 0x00, // Checksum data (unused for 1.12) | |||
}; | |||
{{Login Packet Categories}} |
Latest revision as of 18:54, 16 August 2021
CMD_AUTH_RECONNECT_CHALLENGE_Server is a Login Packet sent by the server after receiving a CMD_AUTH_RECONNECT_CHALLENGE_Client. It is followed by a CMD_AUTH_RECONNECT_PROOF_Client from the client.
Packet Layout
Offset | Size / Endianness | Type | Name | Description |
---|---|---|---|---|
Header | ||||
0x0 | 1 / - | uint8 | command | 0x02 for CMD_AUTH_RECONNECT_CHALLENGE |
0x1 | 1 / - | uint8 | result | The fields below are only included if this is SUCCESS (0x0). |
Body | ||||
0x2 | 16 / Little | char[16] | challenge_data | Random data, used as challenge data. |
0x12 | 16 / - | char[16] | checksum_salt | No longer used by client after 1.12. Can be all zeros. |
Size
For all versions, if the result is not SUCCESS (0x00) the packet is 2 bytes. If the result is SUCCESS the packet is 34 bytes.
Example Packet
Below is complete packet sent from a (1.12.1.5875) client. The values are explained as comments. This can be used for verifying packet parser implementations.
char bytes[] = 0x02, // Opcode: CMD_AUTH_RECONNECT_CHALLENGE 0x00, // result: SUCCESS 0xa9, 0x14, 0x99, 0x52, 0xa5, 0x32, 0x31, 0x5d, 0x27, 0x7a, 0x00, 0xe8, 0x5a, 0xda, 0xbb, 0x75, // Challenge data 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // Checksum data (unused for 1.12) };