| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853 | // This code is derived from jcifs smb client library <jcifs at samba dot org>// Ported by J. Arturo <webmaster at komodosoft dot net>//  // This library is free software; you can redistribute it and/or// modify it under the terms of the GNU Lesser General Public// License as published by the Free Software Foundation; either// version 2.1 of the License, or (at your option) any later version.// // This library is distributed in the hope that it will be useful,// but WITHOUT ANY WARRANTY; without even the implied warranty of// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU// Lesser General Public License for more details.// // You should have received a copy of the GNU Lesser General Public// License along with this library; if not, write to the Free Software// Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USAusing System;using SharpCifs.Util;using SharpCifs.Util.Sharpen;namespace SharpCifs.Smb{    /// <summary>This class stores and encrypts NTLM user credentials.</summary>    /// <remarks>    /// This class stores and encrypts NTLM user credentials. The default    /// credentials are retrieved from the <tt>jcifs.smb.client.domain</tt>,    /// <tt>jcifs.smb.client.username</tt>, and <tt>jcifs.smb.client.password</tt>    /// properties.    /// <p>    /// Read <a href="../../../authhandler.html">jCIFS Exceptions and    /// NtlmAuthenticator</a> for related information.    /// </remarks>    public sealed class NtlmPasswordAuthentication : Principal    {        private static readonly int LmCompatibility            = Config.GetInt("jcifs.smb.lmCompatibility", 3);        private static readonly Random Random = new Random();        private static LogStream _log = LogStream.GetInstance();        private static readonly byte[] S8 =        {            unchecked(unchecked(0x4b)),            unchecked(unchecked(0x47)),            unchecked(unchecked(0x53)),            unchecked(unchecked(0x21)),            unchecked(unchecked(0x40)),            unchecked(unchecked(0x23)),            unchecked(unchecked(0x24)),            unchecked(unchecked(0x25))        };        // KGS!@#$%        private static void E(byte[] key, byte[] data, byte[] e)        {            byte[] key7 = new byte[7];            byte[] e8 = new byte[8];            for (int i = 0; i < key.Length / 7; i++)            {                Array.Copy(key, i * 7, key7, 0, 7);                DES des = new DES(key7);                des.Encrypt(data, e8);                Array.Copy(e8, 0, e, i * 8, 8);            }        }        internal static string DefaultDomain;        internal static string DefaultUsername;        internal static string DefaultPassword;        internal static readonly string Blank = string.Empty;        public static readonly NtlmPasswordAuthentication Anonymous            = new NtlmPasswordAuthentication(string.Empty, string.Empty, string.Empty);        internal static void InitDefaults()        {            if (DefaultDomain != null)            {                return;            }            DefaultDomain = Config.GetProperty("jcifs.smb.client.domain", "?");            DefaultUsername = Config.GetProperty("jcifs.smb.client.username", "GUEST");            DefaultPassword = Config.GetProperty("jcifs.smb.client.password", Blank);        }        /// <summary>        /// Generate the ANSI DES hash for the password associated with these credentials.        /// </summary>        /// <remarks>        /// Generate the ANSI DES hash for the password associated with these credentials.        /// </remarks>        public static byte[] GetPreNtlmResponse(string password, byte[] challenge)        {            byte[] p14 = new byte[14];            byte[] p21 = new byte[21];            byte[] p24 = new byte[24];            byte[] passwordBytes;            try            {                passwordBytes = Runtime.GetBytesForString(password.ToUpper(), SmbConstants.OemEncoding);            }            catch (UnsupportedEncodingException uee)            {                throw new RuntimeException("Try setting jcifs.encoding=US-ASCII", uee);            }            int passwordLength = passwordBytes.Length;            // Only encrypt the first 14 bytes of the password for Pre 0.12 NT LM            if (passwordLength > 14)            {                passwordLength = 14;            }            Array.Copy(passwordBytes, 0, p14, 0, passwordLength);            E(p14, S8, p21);            E(p21, challenge, p24);            return p24;        }        /// <summary>        /// Generate the Unicode MD4 hash for the password associated with these credentials.        /// </summary>        /// <remarks>        /// Generate the Unicode MD4 hash for the password associated with these credentials.        /// </remarks>        public static byte[] GetNtlmResponse(string password, byte[] challenge)        {            byte[] uni = null;            byte[] p21 = new byte[21];            byte[] p24 = new byte[24];            try            {                uni = Runtime.GetBytesForString(password, SmbConstants.UniEncoding);            }            catch (UnsupportedEncodingException uee)            {                if (_log.Level > 0)                {                    Runtime.PrintStackTrace(uee, _log);                }            }            Md4 md4 = new Md4();            md4.Update(uni);            try            {                md4.Digest(p21, 0, 16);            }            catch (Exception ex)            {                if (_log.Level > 0)                {                    Runtime.PrintStackTrace(ex, _log);                }            }            E(p21, challenge, p24);            return p24;        }        /// <summary>Creates the LMv2 response for the supplied information.</summary>        /// <remarks>Creates the LMv2 response for the supplied information.</remarks>        /// <param name="domain">The domain in which the username exists.</param>        /// <param name="user">The username.</param>        /// <param name="password">The user's password.</param>        /// <param name="challenge">The server challenge.</param>        /// <param name="clientChallenge">The client challenge (nonce).</param>        public static byte[] GetLMv2Response(string domain,                                             string user,                                             string password,                                             byte[] challenge,                                             byte[] clientChallenge)        {            try            {                byte[] hash = new byte[16];                byte[] response = new byte[24];                // The next 2-1/2 lines of this should be placed with nTOWFv1 in place of password                Md4 md4 = new Md4();                md4.Update(Runtime.GetBytesForString(password, SmbConstants.UniEncoding));                Hmact64 hmac = new Hmact64(md4.Digest());                hmac.Update(Runtime.GetBytesForString(user.ToUpper(), SmbConstants.UniEncoding));                hmac.Update(Runtime.GetBytesForString(domain.ToUpper(), SmbConstants.UniEncoding));                hmac = new Hmact64(hmac.Digest());                hmac.Update(challenge);                hmac.Update(clientChallenge);                hmac.Digest(response, 0, 16);                Array.Copy(clientChallenge, 0, response, 16, 8);                return response;            }            catch (Exception ex)            {                if (_log.Level > 0)                {                    Runtime.PrintStackTrace(ex, _log);                }                return null;            }        }        public static byte[] GetNtlm2Response(byte[] nTowFv1,                                              byte[] serverChallenge,                                              byte[] clientChallenge)        {            byte[] sessionHash = new byte[8];            try            {                MessageDigest md5;                md5 = MessageDigest.GetInstance("MD5");                md5.Update(serverChallenge);                md5.Update(clientChallenge, 0, 8);                Array.Copy(md5.Digest(), 0, sessionHash, 0, 8);            }            catch (Exception gse)            {                if (_log.Level > 0)                {                    Runtime.PrintStackTrace(gse, _log);                }                throw new RuntimeException("MD5", gse);            }            byte[] key = new byte[21];            Array.Copy(nTowFv1, 0, key, 0, 16);            byte[] ntResponse = new byte[24];            E(key, sessionHash, ntResponse);            return ntResponse;        }        public static byte[] NtowFv1(string password)        {            if (password == null)            {                throw new RuntimeException("Password parameter is required");            }            try            {                Md4 md4 = new Md4();                md4.Update(Runtime.GetBytesForString(password, SmbConstants.UniEncoding));                return md4.Digest();            }            catch (UnsupportedEncodingException uee)            {                throw new RuntimeException(uee.Message);            }        }        public static byte[] NtowFv2(string domain, string username, string password)        {            try            {                Md4 md4 = new Md4();                md4.Update(Runtime.GetBytesForString(password, SmbConstants.UniEncoding));                Hmact64 hmac = new Hmact64(md4.Digest());                hmac.Update(Runtime.GetBytesForString(username.ToUpper(), SmbConstants.UniEncoding));                hmac.Update(Runtime.GetBytesForString(domain, SmbConstants.UniEncoding));                return hmac.Digest();            }            catch (UnsupportedEncodingException uee)            {                throw new RuntimeException(uee.Message);            }        }        internal static byte[] ComputeResponse(byte[] responseKey,                                               byte[] serverChallenge,                                               byte[] clientData,                                               int offset,                                               int length)        {            Hmact64 hmac = new Hmact64(responseKey);            hmac.Update(serverChallenge);            hmac.Update(clientData, offset, length);            byte[] mac = hmac.Digest();            byte[] ret = new byte[mac.Length + clientData.Length];            Array.Copy(mac, 0, ret, 0, mac.Length);            Array.Copy(clientData, 0, ret, mac.Length, clientData.Length);            return ret;        }        public static byte[] GetLMv2Response(byte[] responseKeyLm,                                             byte[] serverChallenge,                                             byte[] clientChallenge)        {            return ComputeResponse(responseKeyLm,                                   serverChallenge,                                   clientChallenge,                                   0,                                   clientChallenge.Length);        }        public static byte[] GetNtlMv2Response(byte[] responseKeyNt,                                               byte[] serverChallenge,                                               byte[] clientChallenge,                                               long nanos1601,                                               byte[] targetInfo)        {            int targetInfoLength = targetInfo != null                                        ? targetInfo.Length                                        : 0;            byte[] temp = new byte[28 + targetInfoLength + 4];            Encdec.Enc_uint32le(unchecked(0x00000101), temp, 0);            // Header            Encdec.Enc_uint32le(unchecked(0x00000000), temp, 4);            // Reserved            Encdec.Enc_uint64le(nanos1601, temp, 8);            Array.Copy(clientChallenge, 0, temp, 16, 8);            Encdec.Enc_uint32le(unchecked(0x00000000), temp, 24);            // Unknown            if (targetInfo != null)            {                Array.Copy(targetInfo, 0, temp, 28, targetInfoLength);            }            Encdec.Enc_uint32le(unchecked(0x00000000), temp, 28 + targetInfoLength);            // mystery bytes!            return ComputeResponse(responseKeyNt,                                   serverChallenge,                                   temp,                                   0,                                   temp.Length);        }        internal static readonly NtlmPasswordAuthentication Null            = new NtlmPasswordAuthentication(string.Empty, string.Empty, string.Empty);        internal static readonly NtlmPasswordAuthentication Guest            = new NtlmPasswordAuthentication("?", "GUEST", string.Empty);        internal static readonly NtlmPasswordAuthentication Default            = new NtlmPasswordAuthentication(null);        internal string Domain;        internal string Username;        internal string Password;        internal byte[] AnsiHash;        internal byte[] UnicodeHash;        internal bool HashesExternal;        internal byte[] ClientChallenge;        internal byte[] Challenge;        /// <summary>        /// Create an <tt>NtlmPasswordAuthentication</tt> object from the userinfo        /// component of an SMB URL like "<tt>domain;user:pass</tt>".        /// </summary>        /// <remarks>        /// Create an <tt>NtlmPasswordAuthentication</tt> object from the userinfo        /// component of an SMB URL like "<tt>domain;user:pass</tt>". This constructor        /// is used internally be jCIFS when parsing SMB URLs.        /// </remarks>        public NtlmPasswordAuthentication(string userInfo)        {            Domain = Username = Password = null;            if (userInfo != null)            {                try                {                    userInfo = Unescape(userInfo);                }                catch (UnsupportedEncodingException)                {                }                int i;                int u;                int end;                char c;                end = userInfo.Length;                for (i = 0, u = 0; i < end; i++)                {                    c = userInfo[i];                    if (c == ';')                    {                        Domain = Runtime.Substring(userInfo, 0, i);                        u = i + 1;                    }                    else                    {                        if (c == ':')                        {                            Password = Runtime.Substring(userInfo, i + 1);                            break;                        }                    }                }                Username = Runtime.Substring(userInfo, u, i);            }            InitDefaults();            if (Domain == null)            {                Domain = DefaultDomain;            }            if (Username == null)            {                Username = DefaultUsername;            }            if (Password == null)            {                Password = DefaultPassword;            }        }        /// <summary>        /// Create an <tt>NtlmPasswordAuthentication</tt> object from a        /// domain, username, and password.        /// </summary>        /// <remarks>        /// Create an <tt>NtlmPasswordAuthentication</tt> object from a        /// domain, username, and password. Parameters that are <tt>null</tt>        /// will be substituted with <tt>jcifs.smb.client.domain</tt>,        /// <tt>jcifs.smb.client.username</tt>, <tt>jcifs.smb.client.password</tt>        /// property values.        /// </remarks>        public NtlmPasswordAuthentication(string domain, string username, string password)        {            int ci;            if (username != null)            {                ci = username.IndexOf('@');                if (ci > 0)                {                    domain = Runtime.Substring(username, ci + 1);                    username = Runtime.Substring(username, 0, ci);                }                else                {                    ci = username.IndexOf('\\');                    if (ci > 0)                    {                        domain = Runtime.Substring(username, 0, ci);                        username = Runtime.Substring(username, ci + 1);                    }                }            }            this.Domain = domain;            this.Username = username;            this.Password = password;            InitDefaults();            if (domain == null)            {                this.Domain = DefaultDomain;            }            if (username == null)            {                this.Username = DefaultUsername;            }            if (password == null)            {                this.Password = DefaultPassword;            }        }        /// <summary>        /// Create an <tt>NtlmPasswordAuthentication</tt> object with raw password        /// hashes.        /// </summary>        /// <remarks>        /// Create an <tt>NtlmPasswordAuthentication</tt> object with raw password        /// hashes. This is used exclusively by the <tt>jcifs.http.NtlmSsp</tt>        /// class which is in turn used by NTLM HTTP authentication functionality.        /// </remarks>        public NtlmPasswordAuthentication(string domain,                                          string username,                                          byte[] challenge,                                          byte[] ansiHash,                                          byte[] unicodeHash)        {            if (domain == null                || username == null                || ansiHash == null                || unicodeHash == null)            {                throw new ArgumentException("External credentials cannot be null");            }            this.Domain = domain;            this.Username = username;            Password = null;            this.Challenge = challenge;            this.AnsiHash = ansiHash;            this.UnicodeHash = unicodeHash;            HashesExternal = true;        }        /// <summary>Returns the domain.</summary>        /// <remarks>Returns the domain.</remarks>        public string GetDomain()        {            return Domain;        }        /// <summary>Returns the username.</summary>        /// <remarks>Returns the username.</remarks>        public string GetUsername()        {            return Username;        }        /// <summary>        /// Returns the password in plain text or <tt>null</tt> if the raw password        /// hashes were used to construct this <tt>NtlmPasswordAuthentication</tt>        /// object which will be the case when NTLM HTTP Authentication is        /// used.        /// </summary>        /// <remarks>        /// Returns the password in plain text or <tt>null</tt> if the raw password        /// hashes were used to construct this <tt>NtlmPasswordAuthentication</tt>        /// object which will be the case when NTLM HTTP Authentication is        /// used. There is no way to retrieve a users password in plain text unless        /// it is supplied by the user at runtime.        /// </remarks>        public string GetPassword()        {            return Password;        }        /// <summary>        /// Return the domain and username in the format:        /// <tt>domain\\username</tt>.        /// </summary>        /// <remarks>        /// Return the domain and username in the format:        /// <tt>domain\\username</tt>. This is equivalent to <tt>toString()</tt>.        /// </remarks>        public new string GetName()        {            bool d = Domain.Length > 0 && Domain.Equals("?") == false;            return d                    ? Domain + "\\" + Username                    : Username;        }        /// <summary>        /// Computes the 24 byte ANSI password hash given the 8 byte server challenge.        /// </summary>        /// <remarks>        /// Computes the 24 byte ANSI password hash given the 8 byte server challenge.        /// </remarks>        public byte[] GetAnsiHash(byte[] challenge)        {            if (HashesExternal)            {                return AnsiHash;            }            switch (LmCompatibility)            {                case 0:                case 1:                    {                        return GetPreNtlmResponse(Password, challenge);                    }                case 2:                    {                        return GetNtlmResponse(Password, challenge);                    }                case 3:                case 4:                case 5:                    {                        if (ClientChallenge == null)                        {                            ClientChallenge = new byte[8];                            Random.NextBytes(ClientChallenge);                        }                        return GetLMv2Response(Domain,                                               Username,                                               Password,                                               challenge,                                               ClientChallenge);                    }                default:                    {                        return GetPreNtlmResponse(Password, challenge);                    }            }        }        /// <summary>        /// Computes the 24 byte Unicode password hash given the 8 byte server challenge.        /// </summary>        /// <remarks>        /// Computes the 24 byte Unicode password hash given the 8 byte server challenge.        /// </remarks>        public byte[] GetUnicodeHash(byte[] challenge)        {            if (HashesExternal)            {                return UnicodeHash;            }            switch (LmCompatibility)            {                case 0:                case 1:                case 2:                    {                        return GetNtlmResponse(Password, challenge);                    }                case 3:                case 4:                case 5:                    {                        return new byte[0];                    }                default:                    {                        return GetNtlmResponse(Password, challenge);                    }            }        }        /// <exception cref="SharpCifs.Smb.SmbException"></exception>        public byte[] GetSigningKey(byte[] challenge)        {            switch (LmCompatibility)            {                case 0:                case 1:                case 2:                    {                        byte[] signingKey = new byte[40];                        GetUserSessionKey(challenge, signingKey, 0);                        Array.Copy(GetUnicodeHash(challenge), 0, signingKey, 16, 24);                        return signingKey;                    }                case 3:                case 4:                case 5:                    {                        throw new SmbException(                            "NTLMv2 requires extended security "                            + "(jcifs.smb.client.useExtendedSecurity must be true "                            + "if jcifs.smb.lmCompatibility >= 3)");                    }            }            return null;        }        /// <summary>Returns the effective user session key.</summary>        /// <remarks>Returns the effective user session key.</remarks>        /// <param name="challenge">The server challenge.</param>        /// <returns>        /// A <code>byte[]</code> containing the effective user session key,        /// used in SMB MAC signing and NTLMSSP signing and sealing.        /// </returns>        public byte[] GetUserSessionKey(byte[] challenge)        {            if (HashesExternal)            {                return null;            }            byte[] key = new byte[16];            try            {                GetUserSessionKey(challenge, key, 0);            }            catch (Exception ex)            {                if (_log.Level > 0)                {                    Runtime.PrintStackTrace(ex, _log);                }            }            return key;        }        /// <summary>Calculates the effective user session key.</summary>        /// <remarks>Calculates the effective user session key.</remarks>        /// <param name="challenge">The server challenge.</param>        /// <param name="dest">        /// The destination array in which the user session key will be        /// placed.        /// </param>        /// <param name="offset">        /// The offset in the destination array at which the        /// session key will start.        /// </param>        /// <exception cref="SharpCifs.Smb.SmbException"></exception>        internal void GetUserSessionKey(byte[] challenge, byte[] dest, int offset)        {            if (HashesExternal)            {                return;            }            try            {                Md4 md4 = new Md4();                md4.Update(Runtime.GetBytesForString(Password, SmbConstants.UniEncoding));                switch (LmCompatibility)                {                    case 0:                    case 1:                    case 2:                        {                            md4.Update(md4.Digest());                            md4.Digest(dest, offset, 16);                            break;                        }                    case 3:                    case 4:                    case 5:                        {                            if (ClientChallenge == null)                            {                                ClientChallenge = new byte[8];                                Random.NextBytes(ClientChallenge);                            }                            Hmact64 hmac = new Hmact64(md4.Digest());                            hmac.Update(Runtime.GetBytesForString(Username.ToUpper(),                                        SmbConstants.UniEncoding));                            hmac.Update(Runtime.GetBytesForString(Domain.ToUpper(),                                        SmbConstants.UniEncoding));                            byte[] ntlmv2Hash = hmac.Digest();                            hmac = new Hmact64(ntlmv2Hash);                            hmac.Update(challenge);                            hmac.Update(ClientChallenge);                            Hmact64 userKey = new Hmact64(ntlmv2Hash);                            userKey.Update(hmac.Digest());                            userKey.Digest(dest, offset, 16);                            break;                        }                    default:                        {                            md4.Update(md4.Digest());                            md4.Digest(dest, offset, 16);                            break;                        }                }            }            catch (Exception e)            {                throw new SmbException(string.Empty, e);            }        }        /// <summary>        /// Compares two <tt>NtlmPasswordAuthentication</tt> objects for        /// equality.        /// </summary>        /// <remarks>        /// Compares two <tt>NtlmPasswordAuthentication</tt> objects for        /// equality. Two <tt>NtlmPasswordAuthentication</tt> objects are equal if        /// their caseless domain and username fields are equal and either both hashes are external and they are equal or both internally supplied passwords are equal. If one <tt>NtlmPasswordAuthentication</tt> object has external hashes (meaning negotiated via NTLM HTTP Authentication) and the other does not they will not be equal. This is technically not correct however the server 8 byte challage would be required to compute and compare the password hashes but that it not available with this method.        /// </remarks>        public override bool Equals(object obj)        {            if (obj is NtlmPasswordAuthentication)            {                NtlmPasswordAuthentication ntlm = (NtlmPasswordAuthentication)obj;                if (ntlm.Domain.ToUpper().Equals(Domain.ToUpper())                    && ntlm.Username.ToUpper().Equals(Username.ToUpper()))                {                    if (HashesExternal && ntlm.HashesExternal)                    {                        return Arrays.Equals(AnsiHash, ntlm.AnsiHash)                               && Arrays.Equals(UnicodeHash, ntlm.UnicodeHash);                    }                    if (!HashesExternal && Password.Equals(ntlm.Password))                    {                        return true;                    }                }            }            return false;        }        /// <summary>Return the upcased username hash code.</summary>        /// <remarks>Return the upcased username hash code.</remarks>        public override int GetHashCode()        {            return GetName().ToUpper().GetHashCode();        }        /// <summary>        /// Return the domain and username in the format:        /// <tt>domain\\username</tt>.        /// </summary>        /// <remarks>        /// Return the domain and username in the format:        /// <tt>domain\\username</tt>. This is equivalent to <tt>getName()</tt>.        /// </remarks>        public override string ToString()        {            return GetName();        }        /// <exception cref="System.FormatException"></exception>        /// <exception cref="UnsupportedEncodingException"></exception>        internal static string Unescape(string str)        {            char ch;            int i;            int j;            int state;            int len;            char[] @out;            byte[] b = new byte[1];            if (str == null)            {                return null;            }            len = str.Length;            @out = new char[len];            state = 0;            for (i = j = 0; i < len; i++)            {                switch (state)                {                    case 0:                        {                            ch = str[i];                            if (ch == '%')                            {                                state = 1;                            }                            else                            {                                @out[j++] = ch;                            }                            break;                        }                    case 1:                        {                            b[0] = unchecked(                                (byte)(                                    Convert.ToInt32(Runtime.Substring(str, i, i + 2), 16)                                    & unchecked(0xFF)                                )                            );                            @out[j++] = (Runtime.GetStringForBytes(b, 0, 1, "ASCII"))[0];                            i++;                            state = 0;                            break;                        }                }            }            return new string(@out, 0, j);        }    }}
 |