[Add] FishNet
This commit is contained in:
+305
@@ -0,0 +1,305 @@
|
||||
//
|
||||
// CryptoConvert.cs - Crypto Convertion Routines
|
||||
//
|
||||
// Author:
|
||||
// Sebastien Pouliot <sebastien@ximian.com>
|
||||
//
|
||||
// (C) 2003 Motus Technologies Inc. (http://www.motus.com)
|
||||
// Copyright (C) 2004-2006 Novell Inc. (http://www.novell.com)
|
||||
//
|
||||
// Permission is hereby granted, free of charge, to any person obtaining
|
||||
// a copy of this software and associated documentation files (the
|
||||
// "Software"), to deal in the Software without restriction, including
|
||||
// without limitation the rights to use, copy, modify, merge, publish,
|
||||
// distribute, sublicense, and/or sell copies of the Software, and to
|
||||
// permit persons to whom the Software is furnished to do so, subject to
|
||||
// the following conditions:
|
||||
//
|
||||
// The above copyright notice and this permission notice shall be
|
||||
// included in all copies or substantial portions of the Software.
|
||||
//
|
||||
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
//
|
||||
|
||||
using System;
|
||||
using System.Security.Cryptography;
|
||||
|
||||
namespace MonoFN.Security.Cryptography
|
||||
{
|
||||
internal static class CryptoConvert
|
||||
{
|
||||
private static int ToInt32LE(byte[] bytes, int offset)
|
||||
{
|
||||
return (bytes[offset + 3] << 24) | (bytes[offset + 2] << 16) | (bytes[offset + 1] << 8) | bytes[offset];
|
||||
}
|
||||
|
||||
private static uint ToUInt32LE(byte[] bytes, int offset)
|
||||
{
|
||||
return (uint)((bytes[offset + 3] << 24) | (bytes[offset + 2] << 16) | (bytes[offset + 1] << 8) | bytes[offset]);
|
||||
}
|
||||
|
||||
private static byte[] GetBytesLE(int val)
|
||||
{
|
||||
return new byte[]
|
||||
{
|
||||
(byte)(val & 0xff),
|
||||
(byte)((val >> 8) & 0xff),
|
||||
(byte)((val >> 16) & 0xff),
|
||||
(byte)((val >> 24) & 0xff)
|
||||
};
|
||||
}
|
||||
|
||||
private static byte[] Trim(byte[] array)
|
||||
{
|
||||
for (int i = 0; i < array.Length; i++)
|
||||
{
|
||||
if (array[i] != 0x00)
|
||||
{
|
||||
byte[] result = new byte [array.Length - i];
|
||||
Buffer.BlockCopy(array, i, result, 0, result.Length);
|
||||
return result;
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
private static RSA FromCapiPrivateKeyBlob(byte[] blob, int offset)
|
||||
{
|
||||
RSAParameters rsap = new();
|
||||
try
|
||||
{
|
||||
if (blob[offset] != 0x07 || // PRIVATEKEYBLOB (0x07)
|
||||
blob[offset + 1] != 0x02 || // Version (0x02)
|
||||
blob[offset + 2] != 0x00 || // Reserved (word)
|
||||
blob[offset + 3] != 0x00 || ToUInt32LE(blob, offset + 8) != 0x32415352) // DWORD magic = RSA2
|
||||
throw new CryptographicException("Invalid blob header");
|
||||
|
||||
// ALGID (CALG_RSA_SIGN, CALG_RSA_KEYX, ...)
|
||||
// int algId = ToInt32LE (blob, offset+4);
|
||||
|
||||
// DWORD bitlen
|
||||
int bitLen = ToInt32LE(blob, offset + 12);
|
||||
|
||||
// DWORD public exponent
|
||||
byte[] exp = new byte [4];
|
||||
Buffer.BlockCopy(blob, offset + 16, exp, 0, 4);
|
||||
Array.Reverse(exp);
|
||||
rsap.Exponent = Trim(exp);
|
||||
|
||||
int pos = offset + 20;
|
||||
// BYTE modulus[rsapubkey.bitlen/8];
|
||||
int byteLen = bitLen >> 3;
|
||||
rsap.Modulus = new byte [byteLen];
|
||||
Buffer.BlockCopy(blob, pos, rsap.Modulus, 0, byteLen);
|
||||
Array.Reverse(rsap.Modulus);
|
||||
pos += byteLen;
|
||||
|
||||
// BYTE prime1[rsapubkey.bitlen/16];
|
||||
int byteHalfLen = byteLen >> 1;
|
||||
rsap.P = new byte [byteHalfLen];
|
||||
Buffer.BlockCopy(blob, pos, rsap.P, 0, byteHalfLen);
|
||||
Array.Reverse(rsap.P);
|
||||
pos += byteHalfLen;
|
||||
|
||||
// BYTE prime2[rsapubkey.bitlen/16];
|
||||
rsap.Q = new byte [byteHalfLen];
|
||||
Buffer.BlockCopy(blob, pos, rsap.Q, 0, byteHalfLen);
|
||||
Array.Reverse(rsap.Q);
|
||||
pos += byteHalfLen;
|
||||
|
||||
// BYTE exponent1[rsapubkey.bitlen/16];
|
||||
rsap.DP = new byte [byteHalfLen];
|
||||
Buffer.BlockCopy(blob, pos, rsap.DP, 0, byteHalfLen);
|
||||
Array.Reverse(rsap.DP);
|
||||
pos += byteHalfLen;
|
||||
|
||||
// BYTE exponent2[rsapubkey.bitlen/16];
|
||||
rsap.DQ = new byte [byteHalfLen];
|
||||
Buffer.BlockCopy(blob, pos, rsap.DQ, 0, byteHalfLen);
|
||||
Array.Reverse(rsap.DQ);
|
||||
pos += byteHalfLen;
|
||||
|
||||
// BYTE coefficient[rsapubkey.bitlen/16];
|
||||
rsap.InverseQ = new byte [byteHalfLen];
|
||||
Buffer.BlockCopy(blob, pos, rsap.InverseQ, 0, byteHalfLen);
|
||||
Array.Reverse(rsap.InverseQ);
|
||||
pos += byteHalfLen;
|
||||
|
||||
// ok, this is hackish but CryptoAPI support it so...
|
||||
// note: only works because CRT is used by default
|
||||
// http://bugzilla.ximian.com/show_bug.cgi?id=57941
|
||||
rsap.D = new byte [byteLen]; // must be allocated
|
||||
if (pos + byteLen + offset <= blob.Length)
|
||||
{
|
||||
// BYTE privateExponent[rsapubkey.bitlen/8];
|
||||
Buffer.BlockCopy(blob, pos, rsap.D, 0, byteLen);
|
||||
Array.Reverse(rsap.D);
|
||||
}
|
||||
}
|
||||
catch (Exception e)
|
||||
{
|
||||
throw new CryptographicException("Invalid blob.", e);
|
||||
}
|
||||
|
||||
RSA rsa = null;
|
||||
try
|
||||
{
|
||||
rsa = RSA.Create();
|
||||
rsa.ImportParameters(rsap);
|
||||
}
|
||||
catch (CryptographicException)
|
||||
{
|
||||
// this may cause problem when this code is run under
|
||||
// the SYSTEM identity on Windows (e.g. ASP.NET). See
|
||||
// http://bugzilla.ximian.com/show_bug.cgi?id=77559
|
||||
bool throws = false;
|
||||
try
|
||||
{
|
||||
CspParameters csp = new();
|
||||
csp.Flags = CspProviderFlags.UseMachineKeyStore;
|
||||
rsa = new RSACryptoServiceProvider(csp);
|
||||
rsa.ImportParameters(rsap);
|
||||
}
|
||||
catch
|
||||
{
|
||||
throws = true;
|
||||
}
|
||||
|
||||
if (throws)
|
||||
{
|
||||
// rethrow original, not the latter, exception if this fails
|
||||
throw;
|
||||
}
|
||||
}
|
||||
return rsa;
|
||||
}
|
||||
|
||||
private static RSA FromCapiPublicKeyBlob(byte[] blob, int offset)
|
||||
{
|
||||
try
|
||||
{
|
||||
if (blob[offset] != 0x06 || // PUBLICKEYBLOB (0x06)
|
||||
blob[offset + 1] != 0x02 || // Version (0x02)
|
||||
blob[offset + 2] != 0x00 || // Reserved (word)
|
||||
blob[offset + 3] != 0x00 || ToUInt32LE(blob, offset + 8) != 0x31415352) // DWORD magic = RSA1
|
||||
throw new CryptographicException("Invalid blob header");
|
||||
|
||||
// ALGID (CALG_RSA_SIGN, CALG_RSA_KEYX, ...)
|
||||
// int algId = ToInt32LE (blob, offset+4);
|
||||
|
||||
// DWORD bitlen
|
||||
int bitLen = ToInt32LE(blob, offset + 12);
|
||||
|
||||
// DWORD public exponent
|
||||
RSAParameters rsap = new();
|
||||
rsap.Exponent = new byte [3];
|
||||
rsap.Exponent[0] = blob[offset + 18];
|
||||
rsap.Exponent[1] = blob[offset + 17];
|
||||
rsap.Exponent[2] = blob[offset + 16];
|
||||
|
||||
int pos = offset + 20;
|
||||
// BYTE modulus[rsapubkey.bitlen/8];
|
||||
int byteLen = bitLen >> 3;
|
||||
rsap.Modulus = new byte [byteLen];
|
||||
Buffer.BlockCopy(blob, pos, rsap.Modulus, 0, byteLen);
|
||||
Array.Reverse(rsap.Modulus);
|
||||
|
||||
RSA rsa = null;
|
||||
try
|
||||
{
|
||||
rsa = RSA.Create();
|
||||
rsa.ImportParameters(rsap);
|
||||
}
|
||||
catch (CryptographicException)
|
||||
{
|
||||
// this may cause problem when this code is run under
|
||||
// the SYSTEM identity on Windows (e.g. ASP.NET). See
|
||||
// http://bugzilla.ximian.com/show_bug.cgi?id=77559
|
||||
CspParameters csp = new();
|
||||
csp.Flags = CspProviderFlags.UseMachineKeyStore;
|
||||
rsa = new RSACryptoServiceProvider(csp);
|
||||
rsa.ImportParameters(rsap);
|
||||
}
|
||||
return rsa;
|
||||
}
|
||||
catch (Exception e)
|
||||
{
|
||||
throw new CryptographicException("Invalid blob.", e);
|
||||
}
|
||||
}
|
||||
|
||||
// PRIVATEKEYBLOB
|
||||
// PUBLICKEYBLOB
|
||||
public static RSA FromCapiKeyBlob(byte[] blob)
|
||||
{
|
||||
return FromCapiKeyBlob(blob, 0);
|
||||
}
|
||||
|
||||
public static RSA FromCapiKeyBlob(byte[] blob, int offset)
|
||||
{
|
||||
if (blob == null)
|
||||
throw new ArgumentNullException("blob");
|
||||
if (offset >= blob.Length)
|
||||
throw new ArgumentException("blob is too small.");
|
||||
|
||||
switch (blob[offset])
|
||||
{
|
||||
case 0x00:
|
||||
// this could be a public key inside an header
|
||||
// like "sn -e" would produce
|
||||
if (blob[offset + 12] == 0x06)
|
||||
{
|
||||
return FromCapiPublicKeyBlob(blob, offset + 12);
|
||||
}
|
||||
break;
|
||||
case 0x06:
|
||||
return FromCapiPublicKeyBlob(blob, offset);
|
||||
case 0x07:
|
||||
return FromCapiPrivateKeyBlob(blob, offset);
|
||||
}
|
||||
throw new CryptographicException("Unknown blob format.");
|
||||
}
|
||||
|
||||
public static byte[] ToCapiPublicKeyBlob(RSA rsa)
|
||||
{
|
||||
RSAParameters p = rsa.ExportParameters(false);
|
||||
int keyLength = p.Modulus.Length; // in bytes
|
||||
byte[] blob = new byte [20 + keyLength];
|
||||
|
||||
blob[0] = 0x06; // Type - PUBLICKEYBLOB (0x06)
|
||||
blob[1] = 0x02; // Version - Always CUR_BLOB_VERSION (0x02)
|
||||
// [2], [3] // RESERVED - Always 0
|
||||
blob[5] = 0x24; // ALGID - Always 00 24 00 00 (for CALG_RSA_SIGN)
|
||||
blob[8] = 0x52; // Magic - RSA1 (ASCII in hex)
|
||||
blob[9] = 0x53;
|
||||
blob[10] = 0x41;
|
||||
blob[11] = 0x31;
|
||||
|
||||
byte[] bitlen = GetBytesLE(keyLength << 3);
|
||||
blob[12] = bitlen[0]; // bitlen
|
||||
blob[13] = bitlen[1];
|
||||
blob[14] = bitlen[2];
|
||||
blob[15] = bitlen[3];
|
||||
|
||||
// public exponent (DWORD)
|
||||
int pos = 16;
|
||||
int n = p.Exponent.Length;
|
||||
while (n > 0)
|
||||
blob[pos++] = p.Exponent[--n];
|
||||
// modulus
|
||||
pos = 20;
|
||||
byte[] part = p.Modulus;
|
||||
int len = part.Length;
|
||||
Array.Reverse(part, 0, len);
|
||||
Buffer.BlockCopy(part, 0, blob, pos, len);
|
||||
pos += len;
|
||||
return blob;
|
||||
}
|
||||
}
|
||||
}
|
||||
+18
@@ -0,0 +1,18 @@
|
||||
fileFormatVersion: 2
|
||||
guid: 40b945bb6ba518c4b8ce54b5e54a06b5
|
||||
MonoImporter:
|
||||
externalObjects: {}
|
||||
serializedVersion: 2
|
||||
defaultReferences: []
|
||||
executionOrder: 0
|
||||
icon: {instanceID: 0}
|
||||
userData:
|
||||
assetBundleName:
|
||||
assetBundleVariant:
|
||||
AssetOrigin:
|
||||
serializedVersion: 1
|
||||
productId: 207815
|
||||
packageName: 'FishNet: Networking Evolved'
|
||||
packageVersion: 4.6.22R
|
||||
assetPath: Assets/FishNet/CodeGenerating/cecil-0.11.4/Mono.Security.Cryptography/CryptoConvert.cs
|
||||
uploadId: 866910
|
||||
+212
@@ -0,0 +1,212 @@
|
||||
//
|
||||
// Author:
|
||||
// Jb Evain (jbevain@gmail.com)
|
||||
//
|
||||
// Copyright (c) 2008 - 2015 Jb Evain
|
||||
// Copyright (c) 2008 - 2011 Novell, Inc.
|
||||
//
|
||||
// Licensed under the MIT/X11 license.
|
||||
//
|
||||
|
||||
using MonoFN.Cecil.PE;
|
||||
using MonoFN.Security.Cryptography;
|
||||
using System;
|
||||
using System.IO;
|
||||
using System.Reflection;
|
||||
using System.Runtime.Serialization;
|
||||
using System.Security.Cryptography;
|
||||
|
||||
namespace MonoFN.Cecil
|
||||
{
|
||||
// Most of this code has been adapted
|
||||
// from Jeroen Frijters' fantastic work
|
||||
// in IKVM.Reflection.Emit. Thanks!
|
||||
|
||||
internal static class CryptoService
|
||||
{
|
||||
public static byte[] GetPublicKey(WriterParameters parameters)
|
||||
{
|
||||
using (RSA rsa = parameters.CreateRSA())
|
||||
{
|
||||
byte[] cspBlob = CryptoConvert.ToCapiPublicKeyBlob(rsa);
|
||||
byte[] publicKey = new byte [12 + cspBlob.Length];
|
||||
Buffer.BlockCopy(cspBlob, 0, publicKey, 12, cspBlob.Length);
|
||||
// The first 12 bytes are documented at:
|
||||
// http://msdn.microsoft.com/library/en-us/cprefadd/html/grfungethashfromfile.asp
|
||||
// ALG_ID - Signature
|
||||
publicKey[1] = 36;
|
||||
// ALG_ID - Hash
|
||||
publicKey[4] = 4;
|
||||
publicKey[5] = 128;
|
||||
// Length of Public Key (in bytes)
|
||||
publicKey[8] = (byte)(cspBlob.Length >> 0);
|
||||
publicKey[9] = (byte)(cspBlob.Length >> 8);
|
||||
publicKey[10] = (byte)(cspBlob.Length >> 16);
|
||||
publicKey[11] = (byte)(cspBlob.Length >> 24);
|
||||
return publicKey;
|
||||
}
|
||||
}
|
||||
|
||||
public static void StrongName(Stream stream, ImageWriter writer, WriterParameters parameters)
|
||||
{
|
||||
int strong_name_pointer;
|
||||
|
||||
byte[] strong_name = CreateStrongName(parameters, HashStream(stream, writer, out strong_name_pointer));
|
||||
PatchStrongName(stream, strong_name_pointer, strong_name);
|
||||
}
|
||||
|
||||
private static void PatchStrongName(Stream stream, int strong_name_pointer, byte[] strong_name)
|
||||
{
|
||||
stream.Seek(strong_name_pointer, SeekOrigin.Begin);
|
||||
stream.Write(strong_name, 0, strong_name.Length);
|
||||
}
|
||||
|
||||
private static byte[] CreateStrongName(WriterParameters parameters, byte[] hash)
|
||||
{
|
||||
const string hash_algo = "SHA1";
|
||||
|
||||
using (RSA rsa = parameters.CreateRSA())
|
||||
{
|
||||
RSAPKCS1SignatureFormatter formatter = new(rsa);
|
||||
formatter.SetHashAlgorithm(hash_algo);
|
||||
|
||||
byte[] signature = formatter.CreateSignature(hash);
|
||||
Array.Reverse(signature);
|
||||
|
||||
return signature;
|
||||
}
|
||||
}
|
||||
|
||||
private static byte[] HashStream(Stream stream, ImageWriter writer, out int strong_name_pointer)
|
||||
{
|
||||
const int buffer_size = 8192;
|
||||
|
||||
Section text = writer.text;
|
||||
int header_size = (int)writer.GetHeaderSize();
|
||||
int text_section_pointer = (int)text.PointerToRawData;
|
||||
DataDirectory strong_name_directory = writer.GetStrongNameSignatureDirectory();
|
||||
|
||||
if (strong_name_directory.Size == 0)
|
||||
throw new InvalidOperationException();
|
||||
|
||||
strong_name_pointer = (int)(text_section_pointer + (strong_name_directory.VirtualAddress - text.VirtualAddress));
|
||||
int strong_name_length = (int)strong_name_directory.Size;
|
||||
|
||||
SHA1Managed sha1 = new();
|
||||
byte[] buffer = new byte [buffer_size];
|
||||
using (CryptoStream crypto_stream = new(Stream.Null, sha1, CryptoStreamMode.Write))
|
||||
{
|
||||
stream.Seek(0, SeekOrigin.Begin);
|
||||
CopyStreamChunk(stream, crypto_stream, buffer, header_size);
|
||||
|
||||
stream.Seek(text_section_pointer, SeekOrigin.Begin);
|
||||
CopyStreamChunk(stream, crypto_stream, buffer, (int)strong_name_pointer - text_section_pointer);
|
||||
|
||||
stream.Seek(strong_name_length, SeekOrigin.Current);
|
||||
CopyStreamChunk(stream, crypto_stream, buffer, (int)(stream.Length - (strong_name_pointer + strong_name_length)));
|
||||
}
|
||||
|
||||
return sha1.Hash;
|
||||
}
|
||||
|
||||
private static void CopyStreamChunk(Stream stream, Stream dest_stream, byte[] buffer, int length)
|
||||
{
|
||||
while (length > 0)
|
||||
{
|
||||
int read = stream.Read(buffer, 0, Math.Min(buffer.Length, length));
|
||||
dest_stream.Write(buffer, 0, read);
|
||||
length -= read;
|
||||
}
|
||||
}
|
||||
|
||||
public static byte[] ComputeHash(string file)
|
||||
{
|
||||
if (!File.Exists(file))
|
||||
return Empty<byte>.Array;
|
||||
|
||||
using (FileStream stream = new(file, FileMode.Open, FileAccess.Read, FileShare.Read))
|
||||
{
|
||||
return ComputeHash(stream);
|
||||
}
|
||||
}
|
||||
|
||||
public static byte[] ComputeHash(Stream stream)
|
||||
{
|
||||
const int buffer_size = 8192;
|
||||
|
||||
SHA1Managed sha1 = new();
|
||||
byte[] buffer = new byte [buffer_size];
|
||||
|
||||
using (CryptoStream crypto_stream = new(Stream.Null, sha1, CryptoStreamMode.Write))
|
||||
{
|
||||
CopyStreamChunk(stream, crypto_stream, buffer, (int)stream.Length);
|
||||
}
|
||||
|
||||
return sha1.Hash;
|
||||
}
|
||||
|
||||
public static byte[] ComputeHash(params ByteBuffer[] buffers)
|
||||
{
|
||||
SHA1Managed sha1 = new();
|
||||
|
||||
using (CryptoStream crypto_stream = new(Stream.Null, sha1, CryptoStreamMode.Write))
|
||||
{
|
||||
for (int i = 0; i < buffers.Length; i++)
|
||||
{
|
||||
crypto_stream.Write(buffers[i].buffer, 0, buffers[i].length);
|
||||
}
|
||||
}
|
||||
|
||||
return sha1.Hash;
|
||||
}
|
||||
|
||||
public static Guid ComputeGuid(byte[] hash)
|
||||
{
|
||||
// From corefx/src/System.Reflection.Metadata/src/System/Reflection/Metadata/BlobContentId.cs
|
||||
byte[] guid = new byte [16];
|
||||
Buffer.BlockCopy(hash, 0, guid, 0, 16);
|
||||
|
||||
// modify the guid data so it decodes to the form of a "random" guid ala rfc4122
|
||||
guid[7] = (byte)((guid[7] & 0x0f) | (4 << 4));
|
||||
guid[8] = (byte)((guid[8] & 0x3f) | (2 << 6));
|
||||
|
||||
return new(guid);
|
||||
}
|
||||
}
|
||||
|
||||
internal static partial class Mixin
|
||||
{
|
||||
public static RSA CreateRSA(this WriterParameters writer_parameters)
|
||||
{
|
||||
byte[] key;
|
||||
string key_container;
|
||||
|
||||
if (writer_parameters.StrongNameKeyBlob != null)
|
||||
return CryptoConvert.FromCapiKeyBlob(writer_parameters.StrongNameKeyBlob);
|
||||
|
||||
if (writer_parameters.StrongNameKeyContainer != null)
|
||||
key_container = writer_parameters.StrongNameKeyContainer;
|
||||
else if (!TryGetKeyContainer(writer_parameters.StrongNameKeyPair, out key, out key_container))
|
||||
return CryptoConvert.FromCapiKeyBlob(key);
|
||||
|
||||
CspParameters parameters = new()
|
||||
{
|
||||
Flags = CspProviderFlags.UseMachineKeyStore,
|
||||
KeyContainerName = key_container,
|
||||
KeyNumber = 2
|
||||
};
|
||||
|
||||
return new RSACryptoServiceProvider(parameters);
|
||||
}
|
||||
|
||||
private static bool TryGetKeyContainer(ISerializable key_pair, out byte[] key, out string key_container)
|
||||
{
|
||||
SerializationInfo info = new(typeof(StrongNameKeyPair), new FormatterConverter());
|
||||
key_pair.GetObjectData(info, new());
|
||||
|
||||
key = (byte[])info.GetValue("_keyPairArray", typeof(byte[]));
|
||||
key_container = info.GetString("_keyPairContainer");
|
||||
return key_container != null;
|
||||
}
|
||||
}
|
||||
}
|
||||
+18
@@ -0,0 +1,18 @@
|
||||
fileFormatVersion: 2
|
||||
guid: c49085888b0afc047af3a03b536acdc2
|
||||
MonoImporter:
|
||||
externalObjects: {}
|
||||
serializedVersion: 2
|
||||
defaultReferences: []
|
||||
executionOrder: 0
|
||||
icon: {instanceID: 0}
|
||||
userData:
|
||||
assetBundleName:
|
||||
assetBundleVariant:
|
||||
AssetOrigin:
|
||||
serializedVersion: 1
|
||||
productId: 207815
|
||||
packageName: 'FishNet: Networking Evolved'
|
||||
packageVersion: 4.6.22R
|
||||
assetPath: Assets/FishNet/CodeGenerating/cecil-0.11.4/Mono.Security.Cryptography/CryptoService.cs
|
||||
uploadId: 866910
|
||||
Reference in New Issue
Block a user