mirror of
https://github.com/MCCTeam/Minecraft-Console-Client
synced 2025-10-14 21:22:49 +00:00
264 lines
10 KiB
C#
264 lines
10 KiB
C#
using System;
|
|
using System.Collections.Generic;
|
|
using System.Security.Cryptography;
|
|
using System.Text;
|
|
using MinecraftClient.Protocol.Handlers;
|
|
using MinecraftClient.Protocol.Message;
|
|
using static MinecraftClient.Protocol.Message.LastSeenMessageList;
|
|
using Newtonsoft.Json.Linq;
|
|
|
|
namespace MinecraftClient.Protocol.ProfileKey
|
|
{
|
|
static class KeyUtils
|
|
{
|
|
private static readonly SHA256 sha256Hash = SHA256.Create();
|
|
|
|
private static readonly string certificates = "https://api.minecraftservices.com/player/certificates";
|
|
|
|
public static PlayerKeyPair? GetNewProfileKeys(string accessToken, bool isYggdrasil)
|
|
{
|
|
ProxiedWebRequest.Response? response = null;
|
|
try
|
|
{
|
|
if (!isYggdrasil) {
|
|
var request = new ProxiedWebRequest(certificates)
|
|
{
|
|
Accept = "application/json"
|
|
};
|
|
request.Headers.Add("Authorization", string.Format("Bearer {0}", accessToken));
|
|
|
|
response = request.Post("application/json", "");
|
|
|
|
if (Settings.Config.Logging.DebugMessages)
|
|
{
|
|
ConsoleIO.WriteLine(response.Body.ToString());
|
|
}
|
|
}
|
|
|
|
// see https://github.com/yushijinhun/authlib-injector/blob/da910956eaa30d2f6c2c457222d188aeb53b0d1f/src/main/java/moe/yushi/authlibinjector/httpd/ProfileKeyFilter.java#L49
|
|
// POST to "https://api.minecraftservices.com/player/certificates" with authlib-injector will get a dummy response
|
|
string jsonString = isYggdrasil ? MakeDummyResponse() : response!.Body;
|
|
Json.JSONData json = Json.ParseJson(jsonString);
|
|
// Error here
|
|
PublicKey publicKey = new(pemKey: json.Properties["keyPair"].Properties["publicKey"].StringValue,
|
|
sig: json.Properties["publicKeySignature"].StringValue,
|
|
sigV2: json.Properties["publicKeySignatureV2"].StringValue);
|
|
|
|
PrivateKey privateKey = new(pemKey: json.Properties["keyPair"].Properties["privateKey"].StringValue);
|
|
|
|
return new PlayerKeyPair(publicKey, privateKey,
|
|
expiresAt: json.Properties["expiresAt"].StringValue,
|
|
refreshedAfter: json.Properties["refreshedAfter"].StringValue);
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
int code = response == null ? 0 : response.StatusCode;
|
|
ConsoleIO.WriteLineFormatted("§cFetch profile key failed: HttpCode = " + code + ", Error = " + e.Message);
|
|
if (Settings.Config.Logging.DebugMessages)
|
|
{
|
|
ConsoleIO.WriteLineFormatted("§c" + e.StackTrace);
|
|
}
|
|
return null;
|
|
}
|
|
}
|
|
|
|
public static byte[] DecodePemKey(string key, string prefix, string suffix)
|
|
{
|
|
int i = key.IndexOf(prefix);
|
|
if (i != -1)
|
|
{
|
|
i += prefix.Length;
|
|
int j = key.IndexOf(suffix, i);
|
|
key = key[i..j];
|
|
}
|
|
key = key.Replace("\r", string.Empty);
|
|
key = key.Replace("\n", string.Empty);
|
|
return Convert.FromBase64String(key);
|
|
}
|
|
|
|
public static byte[] ComputeHash(byte[] data)
|
|
{
|
|
return sha256Hash.ComputeHash(data);
|
|
}
|
|
|
|
public static byte[] GetSignatureData(string message, Guid uuid, DateTimeOffset timestamp, ref byte[] salt)
|
|
{
|
|
List<byte> data = new();
|
|
|
|
data.AddRange(salt);
|
|
|
|
data.AddRange(uuid.ToBigEndianBytes());
|
|
|
|
byte[] timestampByte = BitConverter.GetBytes(timestamp.ToUnixTimeSeconds());
|
|
Array.Reverse(timestampByte);
|
|
data.AddRange(timestampByte);
|
|
|
|
data.AddRange(Encoding.UTF8.GetBytes(message));
|
|
|
|
return data.ToArray();
|
|
}
|
|
|
|
public static byte[] GetSignatureData(string message, DateTimeOffset timestamp, ref byte[] salt, LastSeenMessageList lastSeenMessages)
|
|
{
|
|
List<byte> data = new();
|
|
|
|
data.AddRange(salt);
|
|
|
|
byte[] timestampByte = BitConverter.GetBytes(timestamp.ToUnixTimeSeconds());
|
|
Array.Reverse(timestampByte);
|
|
data.AddRange(timestampByte);
|
|
|
|
data.AddRange(Encoding.UTF8.GetBytes(message));
|
|
|
|
data.Add(70);
|
|
|
|
lastSeenMessages.WriteForSign(data);
|
|
|
|
return data.ToArray();
|
|
}
|
|
|
|
public static byte[] GetSignatureData_1_19_3(string message, Guid playerUuid, Guid chatUuid, int messageIndex, DateTimeOffset timestamp, ref byte[] salt, AcknowledgedMessage[] lastSeenMessages)
|
|
{
|
|
List<byte> data = new();
|
|
|
|
// net.minecraft.network.message.SignedMessage#update
|
|
data.AddRange(DataTypes.GetInt(1));
|
|
|
|
// message link
|
|
// net.minecraft.network.message.MessageLink#update
|
|
data.AddRange(DataTypes.GetUUID(playerUuid));
|
|
data.AddRange(DataTypes.GetUUID(chatUuid));
|
|
data.AddRange(DataTypes.GetInt(messageIndex));
|
|
|
|
// message body
|
|
// net.minecraft.network.message.MessageBody#update
|
|
data.AddRange(salt);
|
|
data.AddRange(DataTypes.GetLong(timestamp.ToUnixTimeSeconds()));
|
|
byte[] messageBytes = Encoding.UTF8.GetBytes(message);
|
|
data.AddRange(DataTypes.GetInt(messageBytes.Length));
|
|
data.AddRange(messageBytes);
|
|
data.AddRange(DataTypes.GetInt(lastSeenMessages.Length));
|
|
foreach (AcknowledgedMessage ack in lastSeenMessages)
|
|
data.AddRange(ack.signature);
|
|
|
|
return data.ToArray();
|
|
}
|
|
|
|
public static byte[] GetSignatureData(byte[]? precedingSignature, Guid sender, byte[] bodySign)
|
|
{
|
|
List<byte> data = new();
|
|
|
|
if (precedingSignature != null)
|
|
data.AddRange(precedingSignature);
|
|
|
|
data.AddRange(sender.ToBigEndianBytes());
|
|
|
|
data.AddRange(bodySign);
|
|
|
|
return data.ToArray();
|
|
}
|
|
|
|
public static byte[] GetSignatureData(string message, DateTimeOffset timestamp, ref byte[] salt, int messageCount, Guid sender, Guid sessionUuid)
|
|
{
|
|
List<byte> data = new();
|
|
|
|
// TODO!
|
|
byte[] unknownInt1 = BitConverter.GetBytes(1);
|
|
Array.Reverse(unknownInt1);
|
|
data.AddRange(unknownInt1);
|
|
|
|
data.AddRange(sender.ToBigEndianBytes());
|
|
data.AddRange(sessionUuid.ToBigEndianBytes());
|
|
|
|
byte[] msgCountByte = BitConverter.GetBytes(messageCount);
|
|
Array.Reverse(msgCountByte);
|
|
data.AddRange(msgCountByte);
|
|
data.AddRange(salt);
|
|
|
|
byte[] timestampByte = BitConverter.GetBytes(timestamp.ToUnixTimeSeconds());
|
|
Array.Reverse(timestampByte);
|
|
data.AddRange(timestampByte);
|
|
|
|
byte[] msgByte = Encoding.UTF8.GetBytes(message);
|
|
byte[] msgLengthByte = BitConverter.GetBytes(msgByte.Length);
|
|
Array.Reverse(msgLengthByte);
|
|
data.AddRange(msgLengthByte);
|
|
data.AddRange(msgByte);
|
|
|
|
byte[] unknownInt2 = BitConverter.GetBytes(0);
|
|
Array.Reverse(unknownInt2);
|
|
data.AddRange(unknownInt2);
|
|
|
|
return data.ToArray();
|
|
}
|
|
|
|
// https://github.com/mono/mono/blob/master/mcs/class/System.Json/System.Json/JsonValue.cs
|
|
public static string EscapeString(string src)
|
|
{
|
|
StringBuilder sb = new();
|
|
|
|
int start = 0;
|
|
for (int i = 0; i < src.Length; i++)
|
|
{
|
|
char c = src[i];
|
|
bool needEscape = c < 32 || c == '"' || c == '\\';
|
|
// Broken lead surrogate
|
|
needEscape = needEscape || c >= '\uD800' && c <= '\uDBFF' &&
|
|
(i == src.Length - 1 || src[i + 1] < '\uDC00' || src[i + 1] > '\uDFFF');
|
|
// Broken tail surrogate
|
|
needEscape = needEscape || c >= '\uDC00' && c <= '\uDFFF' &&
|
|
(i == 0 || src[i - 1] < '\uD800' || src[i - 1] > '\uDBFF');
|
|
// To produce valid JavaScript
|
|
needEscape = needEscape || c == '\u2028' || c == '\u2029';
|
|
|
|
if (needEscape)
|
|
{
|
|
sb.Append(src, start, i - start);
|
|
switch (src[i])
|
|
{
|
|
case '\b': sb.Append("\\b"); break;
|
|
case '\f': sb.Append("\\f"); break;
|
|
case '\n': sb.Append("\\n"); break;
|
|
case '\r': sb.Append("\\r"); break;
|
|
case '\t': sb.Append("\\t"); break;
|
|
case '\"': sb.Append("\\\""); break;
|
|
case '\\': sb.Append("\\\\"); break;
|
|
default:
|
|
sb.Append("\\u");
|
|
sb.Append(((int)src[i]).ToString("x04"));
|
|
break;
|
|
}
|
|
start = i + 1;
|
|
}
|
|
|
|
}
|
|
sb.Append(src, start, src.Length - start);
|
|
return sb.ToString();
|
|
}
|
|
|
|
public static string MakeDummyResponse()
|
|
{
|
|
RSACryptoServiceProvider rsa = new RSACryptoServiceProvider(2048);
|
|
var mimePublicKey = Convert.ToBase64String(rsa.ExportSubjectPublicKeyInfo());
|
|
var mimePrivateKey = Convert.ToBase64String(rsa.ExportPkcs8PrivateKey());
|
|
string publicKeyPEM = $"-----BEGIN RSA PUBLIC KEY-----\n{mimePublicKey}\n-----END RSA PUBLIC KEY-----\n";
|
|
string privateKeyPEM = $"-----BEGIN RSA PRIVATE KEY-----\n{mimePrivateKey}\n-----END RSA PRIVATE KEY-----\n";
|
|
DateTime now = DateTime.UtcNow;
|
|
DateTime expiresAt = now.AddHours(48);
|
|
DateTime refreshedAfter = now.AddHours(36);
|
|
JObject response = new JObject();
|
|
JObject keyPairObj = new JObject
|
|
{
|
|
{ "privateKey", privateKeyPEM },
|
|
{ "publicKey", publicKeyPEM }
|
|
};
|
|
response.Add("keyPair", keyPairObj);
|
|
response.Add("publicKeySignature", "AA==");
|
|
response.Add("publicKeySignatureV2", "AA==");
|
|
string format = "yyyy-MM-ddTHH:mm:ss.ffffffZ";
|
|
response.Add("expiresAt", expiresAt.ToString(format));
|
|
response.Add("refreshedAfter", refreshedAfter.ToString(format));
|
|
return response.ToString();
|
|
}
|
|
}
|
|
}
|