mirror of
https://github.com/MCCTeam/Minecraft-Console-Client
synced 2025-10-14 21:22:49 +00:00
Added MCC Source Code v1.5.2
Minecraft Console Client is now on GitHub!
This commit is contained in:
parent
bb02f5b76d
commit
e6f2ef4e4f
16 changed files with 3116 additions and 0 deletions
203
MinecraftClient/Crypto.cs
Normal file
203
MinecraftClient/Crypto.cs
Normal file
|
|
@ -0,0 +1,203 @@
|
|||
using System;
|
||||
using System.Collections.Generic;
|
||||
using System.Linq;
|
||||
using System.Text;
|
||||
using System.Security.Cryptography;
|
||||
using java.security;
|
||||
using java.security.spec;
|
||||
using javax.crypto;
|
||||
using javax.crypto.spec;
|
||||
using Org.BouncyCastle.Crypto;
|
||||
using Org.BouncyCastle.Crypto.Parameters;
|
||||
|
||||
namespace MinecraftClient
|
||||
{
|
||||
/// <summary>
|
||||
/// Cryptographic functions ported from Minecraft Source Code (Java). Decompiled with MCP. Copy, paste, little adjustements.
|
||||
/// </summary>
|
||||
|
||||
public class Crypto
|
||||
{
|
||||
public static PublicKey GenerateRSAPublicKey(byte[] key)
|
||||
{
|
||||
X509EncodedKeySpec localX509EncodedKeySpec = new X509EncodedKeySpec(key);
|
||||
KeyFactory localKeyFactory = KeyFactory.getInstance("RSA");
|
||||
return localKeyFactory.generatePublic(localX509EncodedKeySpec);
|
||||
}
|
||||
|
||||
public static SecretKey GenerateAESPrivateKey()
|
||||
{
|
||||
CipherKeyGenerator var0 = new CipherKeyGenerator();
|
||||
var0.Init(new KeyGenerationParameters(new Org.BouncyCastle.Security.SecureRandom(), 128));
|
||||
return new SecretKeySpec(var0.GenerateKey(), "AES");
|
||||
}
|
||||
|
||||
public static byte[] getServerHash(String toencode, PublicKey par1PublicKey, SecretKey par2SecretKey)
|
||||
{
|
||||
return digest("SHA-1", new byte[][] { Encoding.GetEncoding("iso-8859-1").GetBytes(toencode), par2SecretKey.getEncoded(), par1PublicKey.getEncoded() });
|
||||
}
|
||||
|
||||
public static byte[] Encrypt(Key par0Key, byte[] par1ArrayOfByte)
|
||||
{
|
||||
return func_75885_a(1, par0Key, par1ArrayOfByte);
|
||||
}
|
||||
|
||||
private static byte[] digest(String par0Str, byte[][] par1ArrayOfByte)
|
||||
{
|
||||
MessageDigest var2 = MessageDigest.getInstance(par0Str);
|
||||
byte[][] var3 = par1ArrayOfByte;
|
||||
int var4 = par1ArrayOfByte.Length;
|
||||
|
||||
for (int var5 = 0; var5 < var4; ++var5)
|
||||
{
|
||||
byte[] var6 = var3[var5];
|
||||
var2.update(var6);
|
||||
}
|
||||
|
||||
return var2.digest();
|
||||
}
|
||||
private static byte[] func_75885_a(int par0, Key par1Key, byte[] par2ArrayOfByte)
|
||||
{
|
||||
try
|
||||
{
|
||||
return cypherencrypt(par0, par1Key.getAlgorithm(), par1Key).doFinal(par2ArrayOfByte);
|
||||
}
|
||||
catch (IllegalBlockSizeException var4)
|
||||
{
|
||||
var4.printStackTrace();
|
||||
}
|
||||
catch (BadPaddingException var5)
|
||||
{
|
||||
var5.printStackTrace();
|
||||
}
|
||||
|
||||
Console.Error.WriteLine("Cipher data failed!");
|
||||
return null;
|
||||
}
|
||||
private static Cipher cypherencrypt(int par0, String par1Str, Key par2Key)
|
||||
{
|
||||
try
|
||||
{
|
||||
Cipher var3 = Cipher.getInstance(par1Str);
|
||||
var3.init(par0, par2Key);
|
||||
return var3;
|
||||
}
|
||||
catch (InvalidKeyException var4)
|
||||
{
|
||||
var4.printStackTrace();
|
||||
}
|
||||
catch (NoSuchAlgorithmException var5)
|
||||
{
|
||||
var5.printStackTrace();
|
||||
}
|
||||
catch (NoSuchPaddingException var6)
|
||||
{
|
||||
var6.printStackTrace();
|
||||
}
|
||||
|
||||
Console.Error.WriteLine("Cipher creation failed!");
|
||||
return null;
|
||||
}
|
||||
|
||||
public static AesStream SwitchToAesMode(System.IO.Stream stream, Key key)
|
||||
{
|
||||
return new AesStream(stream, key.getEncoded());
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// An encrypted stream using AES
|
||||
/// </summary>
|
||||
|
||||
public class AesStream : System.IO.Stream
|
||||
{
|
||||
CryptoStream enc;
|
||||
CryptoStream dec;
|
||||
public AesStream(System.IO.Stream stream, byte[] key)
|
||||
{
|
||||
BaseStream = stream;
|
||||
enc = new CryptoStream(stream, GenerateAES(key).CreateEncryptor(), CryptoStreamMode.Write);
|
||||
dec = new CryptoStream(stream, GenerateAES(key).CreateDecryptor(), CryptoStreamMode.Read);
|
||||
}
|
||||
public System.IO.Stream BaseStream { get; set; }
|
||||
|
||||
public override bool CanRead
|
||||
{
|
||||
get { return true; }
|
||||
}
|
||||
|
||||
public override bool CanSeek
|
||||
{
|
||||
get { return false; }
|
||||
}
|
||||
|
||||
public override bool CanWrite
|
||||
{
|
||||
get { return true; }
|
||||
}
|
||||
|
||||
public override void Flush()
|
||||
{
|
||||
BaseStream.Flush();
|
||||
}
|
||||
|
||||
public override long Length
|
||||
{
|
||||
get { throw new NotSupportedException(); }
|
||||
}
|
||||
|
||||
public override long Position
|
||||
{
|
||||
get
|
||||
{
|
||||
throw new NotSupportedException();
|
||||
}
|
||||
set
|
||||
{
|
||||
throw new NotSupportedException();
|
||||
}
|
||||
}
|
||||
|
||||
public override int ReadByte()
|
||||
{
|
||||
return dec.ReadByte();
|
||||
}
|
||||
|
||||
public override int Read(byte[] buffer, int offset, int count)
|
||||
{
|
||||
return dec.Read(buffer, offset, count);
|
||||
}
|
||||
|
||||
public override long Seek(long offset, System.IO.SeekOrigin origin)
|
||||
{
|
||||
throw new NotSupportedException();
|
||||
}
|
||||
|
||||
public override void SetLength(long value)
|
||||
{
|
||||
throw new NotSupportedException();
|
||||
}
|
||||
|
||||
public override void WriteByte(byte b)
|
||||
{
|
||||
enc.WriteByte(b);
|
||||
}
|
||||
|
||||
public override void Write(byte[] buffer, int offset, int count)
|
||||
{
|
||||
enc.Write(buffer, offset, count);
|
||||
}
|
||||
|
||||
private RijndaelManaged GenerateAES(byte[] key)
|
||||
{
|
||||
RijndaelManaged cipher = new RijndaelManaged();
|
||||
cipher.Mode = CipherMode.CFB;
|
||||
cipher.Padding = PaddingMode.None;
|
||||
cipher.KeySize = 128;
|
||||
cipher.FeedbackSize = 8;
|
||||
cipher.Key = key;
|
||||
cipher.IV = key;
|
||||
return cipher;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue