Skip to content

Commit

Permalink
Make packet key sources description flow better
Browse files Browse the repository at this point in the history
  • Loading branch information
friedkeenan committed Jan 15, 2023
1 parent 0fe53bb commit 9f6474e
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,4 +33,4 @@ These secrets include:
- The auth key.
- After the client sends the handshake packet to the server, the server then responds with a packet containing an "auth token". This is an integer that is used again when the client sends the login packet. The client XOR's the auth token with the hardcoded "auth key", resulting in a ciphered token, which is then sent to the server in the login packet.
- The packet key sources.
- Certain packets within Transformice's network protocol are encrypted, for example the login packet. The particular cipher varies per packet, but the keys used are derived from an array of integers called the "packet key sources". These integers are combined with a key name, a string (e.g. "identification"), to obtain the actual key used to encrypt a packet.
- Certain packets within Transformice's network protocol are encrypted, for example the login packet. The particular cipher varies per packet, but the keys used are derived from an array of integers called the "packet key sources". These integers are combined with a key name, e.g. "identification", to obtain the actual key used to encrypt a packet.

0 comments on commit 9f6474e

Please sign in to comment.