CMD AUTH RECONNECT CHALLENGE Server: Difference between revisions
Jump to navigation
Jump to search
m (Add link to opcode) |
(Add example packets) |
||
Line 28: | Line 28: | ||
For all versions, if the result is not [[Login_Packet_Results|SUCCESS]] (0x00) the packet is 2 bytes. If the result is SUCCESS the packet is 34 bytes. | For all versions, if the result is not [[Login_Packet_Results|SUCCESS]] (0x00) the packet is 2 bytes. If the result is SUCCESS the packet is 34 bytes. | ||
= Example Packet = | |||
Below is complete packet sent from a {{Template:Sandbox/PrettyVersion|expansionlevel=1|build=1.12.1.5875}} client. The values are explained as comments. This can be used for verifying packet parser implementations. | |||
char bytes[] = | |||
0x02, // Opcode: CMD_AUTH_RECONNECT_CHALLENGE | |||
0x00, // result: SUCCESS | |||
0xa9, 0x14, 0x99, 0x52, 0xa5, 0x32, 0x31, 0x5d, 0x27, 0x7a, 0x00, 0xe8, 0x5a, | |||
0xda, 0xbb, 0x75, // Challenge data | |||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | |||
0x00, 0x00, 0x00, 0x00, 0x00, // Checksum data (unused for 1.12) | |||
}; | |||
{{Login Packet Categories}} | {{Login Packet Categories}} |
Latest revision as of 18:54, 16 August 2021
CMD_AUTH_RECONNECT_CHALLENGE_Server is a Login Packet sent by the server after receiving a CMD_AUTH_RECONNECT_CHALLENGE_Client. It is followed by a CMD_AUTH_RECONNECT_PROOF_Client from the client.
Packet Layout
Offset | Size / Endianness | Type | Name | Description |
---|---|---|---|---|
Header | ||||
0x0 | 1 / - | uint8 | command | 0x02 for CMD_AUTH_RECONNECT_CHALLENGE |
0x1 | 1 / - | uint8 | result | The fields below are only included if this is SUCCESS (0x0). |
Body | ||||
0x2 | 16 / Little | char[16] | challenge_data | Random data, used as challenge data. |
0x12 | 16 / - | char[16] | checksum_salt | No longer used by client after 1.12. Can be all zeros. |
Size
For all versions, if the result is not SUCCESS (0x00) the packet is 2 bytes. If the result is SUCCESS the packet is 34 bytes.
Example Packet
Below is complete packet sent from a (1.12.1.5875) client. The values are explained as comments. This can be used for verifying packet parser implementations.
char bytes[] = 0x02, // Opcode: CMD_AUTH_RECONNECT_CHALLENGE 0x00, // result: SUCCESS 0xa9, 0x14, 0x99, 0x52, 0xa5, 0x32, 0x31, 0x5d, 0x27, 0x7a, 0x00, 0xe8, 0x5a, 0xda, 0xbb, 0x75, // Challenge data 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // Checksum data (unused for 1.12) };