1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
|
//! Chat signing, used in Minecraft to allow for messages to be reported.
use std::time::{SystemTime, UNIX_EPOCH};
use azalea_buf::AzBuf;
use rsa::{
RsaPrivateKey,
signature::{RandomizedSigner, SignatureEncoding},
};
use sha2::Sha256;
use uuid::Uuid;
#[derive(AzBuf, Clone, Debug)]
pub struct SaltSignaturePair {
pub salt: u64,
pub signature: Vec<u8>,
}
#[derive(AzBuf, Clone, Debug, PartialEq)]
pub struct MessageSignature {
pub bytes: [u8; 256],
}
#[derive(AzBuf, Clone, Debug, PartialEq)]
pub struct SignedMessageHeader {
pub previous_signature: Option<MessageSignature>,
pub sender: Uuid,
}
/// Generates a random u64 to use as a salt
pub fn make_salt() -> u64 {
rand::random()
}
pub struct SignChatMessageOptions {
pub account_uuid: Uuid,
pub chat_session_uuid: Uuid,
pub message_index: u32,
/// Can be acquired with [`make_salt`].
pub salt: u64,
/// The current time that we're sending the message at.
pub timestamp: SystemTime,
/// The message that we're sending in chat.
pub message: String,
pub private_key: RsaPrivateKey,
}
pub fn sign_chat_message(opts: &SignChatMessageOptions) -> MessageSignature {
let mut data_to_sign = Vec::new();
// always 1 for some reason
1i32.azalea_write(&mut data_to_sign).unwrap();
// player uuid
opts.account_uuid.azalea_write(&mut data_to_sign).unwrap();
// chat session uuid
opts.chat_session_uuid
.azalea_write(&mut data_to_sign)
.unwrap();
// message index
opts.message_index.azalea_write(&mut data_to_sign).unwrap();
// salt
opts.salt.azalea_write(&mut data_to_sign).unwrap();
// timestamp as seconds
let seconds_since_epoch = opts
.timestamp
.duration_since(UNIX_EPOCH)
.expect("timestamp must be after epoch")
.as_secs();
seconds_since_epoch.azalea_write(&mut data_to_sign).unwrap();
// message length as u32
let message_len: u32 = opts.message.len().try_into().unwrap();
message_len.azalea_write(&mut data_to_sign).unwrap();
// message bytes
data_to_sign.extend_from_slice(opts.message.as_bytes());
// last seen messages length
0i32.azalea_write(&mut data_to_sign).unwrap();
// signatures of last seen messages
// ... not implemented yet
let signing_key = rsa::pkcs1v15::SigningKey::<Sha256>::new(opts.private_key.clone());
let mut rng = rand::rng();
let signature = signing_key
.sign_with_rng(&mut rng, &data_to_sign)
.to_bytes();
MessageSignature {
bytes: signature
.as_ref()
.try_into()
.expect("signature must be 256 bytes"),
}
}
|