CMD AUTH RECONNECT CHALLENGE Server
Jump to navigation
Jump to search
CMD_AUTH_RECONNECT_CHALLENGE_Server is a Login Packet sent by the server after receiving a CMD_AUTH_RECONNECT_CHALLENGE_Client. It is followed by a CMD_AUTH_RECONNECT_PROOF_Client from the client.
Packet Layout
Offset | Size / Endianness | Type | Name | Description |
---|---|---|---|---|
Header | ||||
0x0 | 1 / - | uint8 | command | 0x02 for CMD_AUTH_RECONNECT_CHALLENGE |
0x1 | 1 / - | uint8 | result | The fields below are only included if this is SUCCESS (0x0). |
Body | ||||
0x2 | 16 / Little | char[16] | challenge_data | Random data, used as challenge data. |
0x12 | 16 / - | char[16] | checksum_salt | No longer used by client after 1.12. Can be all zeros. |
Size
For all versions, if the result is not SUCCESS (0x00) the packet is 2 bytes. If the result is SUCCESS the packet is 34 bytes.
Example Packet
Below is complete packet sent from a (1.12.1.5875) client. The values are explained as comments. This can be used for verifying packet parser implementations.
char bytes[] = 0x02, // Opcode: CMD_AUTH_RECONNECT_CHALLENGE 0x00, // result: SUCCESS 0xa9, 0x14, 0x99, 0x52, 0xa5, 0x32, 0x31, 0x5d, 0x27, 0x7a, 0x00, 0xe8, 0x5a, 0xda, 0xbb, 0x75, // Challenge data 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // Checksum data (unused for 1.12) };