2020-09-27 04:54:49 -06:00
#!/usr/bin/env python3
2013-03-20 04:23:54 -06:00
# -*- coding: utf-8 -*-
2017-07-04 00:05:51 -06:00
# __init__.py for DeDRM_plugin
2020-06-18 00:42:41 -06:00
# Copyright © 2008-2020 Apprentice Harper et al.
2017-07-04 00:05:51 -06:00
2013-03-20 04:23:54 -06:00
__license__ = ' GPL v3 '
2021-04-11 09:43:16 -06:00
__version__ = ' 7.2.1 '
2013-03-20 04:23:54 -06:00
__docformat__ = ' restructuredtext en '
# Released under the terms of the GNU General Public Licence, version 3
# <http://www.gnu.org/licenses/>
#
# All credit given to i♥cabbages and The Dark Reverser for the original standalone scripts.
# We had the much easier job of converting them to a calibre plugin.
#
# This plugin is meant to decrypt eReader PDBs, Adobe Adept ePubs, Barnes & Noble ePubs,
2020-06-18 00:42:41 -06:00
# Adobe Adept PDFs, Amazon Kindle and Mobipocket files without having
# to install any dependencies... other than having calibre installed, of course.
2013-03-20 04:23:54 -06:00
#
# Configuration:
# Check out the plugin's configuration settings by clicking the "Customize plugin"
# button when you have the "DeDRM" plugin highlighted (under Preferences->
# Plugins->File type plugins). Once you have the configuration dialog open, you'll
# see a Help link on the top right-hand side.
#
# Revision history:
# 6.0.0 - Initial release
2013-03-26 10:38:18 -06:00
# 6.0.1 - Bug Fixes for Windows App, Kindle for Mac and Windows Adobe Digital Editions
2013-04-08 09:47:22 -06:00
# 6.0.2 - Restored call to Wine to get Kindle for PC keys, added for ADE
# 6.0.3 - Fixes for Kindle for Mac and Windows non-ascii user names
2013-04-10 04:50:10 -06:00
# 6.0.4 - Fixes for stand-alone scripts and applications
# and pdb files in plugin and initial conversion of prefs.
2013-10-02 12:59:40 -06:00
# 6.0.5 - Fix a key issue
2013-05-18 12:37:05 -06:00
# 6.0.6 - Fix up an incorrect function call
2013-10-02 12:59:40 -06:00
# 6.0.7 - Error handling for incomplete PDF metadata
# 6.0.8 - Fixes a Wine key issue and topaz support
2015-03-07 14:18:50 -07:00
# 6.0.9 - Ported to work with newer versions of Calibre (moved to Qt5). Still supports older Qt4 versions.
2014-12-08 14:23:07 -07:00
# 6.1.0 - Fixed multiple books import problem and PDF import with no key problem
2015-03-09 01:38:31 -06:00
# 6.2.0 - Support for getting B&N key from nook Study log. Fix for UTF-8 filenames in Adobe ePubs.
# Fix for not copying needed files. Fix for getting default Adobe key for PDFs
2015-03-25 01:26:33 -06:00
# 6.2.1 - Fix for non-ascii Windows user names
2015-06-30 10:27:33 -06:00
# 6.2.2 - Added URL method for B&N/nook books
2015-03-17 11:49:30 -06:00
# 6.3.0 - Added in Kindle for Android serial number solution
2015-08-02 04:09:35 -06:00
# 6.3.1 - Version number bump for clarity
2015-08-04 00:18:33 -06:00
# 6.3.2 - Fixed Kindle for Android help file
2015-08-12 11:35:21 -06:00
# 6.3.3 - Bug fix for Kindle for PC support
2015-09-03 00:51:10 -06:00
# 6.3.4 - Fixes for Kindle for Android, Linux, and Kobo 3.17
2016-01-10 23:44:44 -07:00
# 6.3.5 - Fixes for Linux, and Kobo 3.19 and more logging
2016-01-14 10:15:43 -07:00
# 6.3.6 - Fixes for ADE ePub and PDF introduced in 6.3.5
2016-03-13 06:00:57 -06:00
# 6.4.0 - Updated for new Kindle for PC encryption
2016-04-13 11:39:13 -06:00
# 6.4.1 - Fix for some new tags in Topaz ebooks.
2016-04-18 10:39:17 -06:00
# 6.4.2 - Fix for more new tags in Topaz ebooks and very small Topaz ebooks
2016-04-25 10:49:06 -06:00
# 6.4.3 - Fix for error that only appears when not in debug mode
# Also includes fix for Macs with bonded ethernet ports
2016-08-05 10:34:52 -06:00
# 6.5.0 - Big update to Macintosh app
# Fix for some more 'new' tags in Topaz ebooks.
# Fix an error in wineutils.py
2016-08-09 23:40:48 -06:00
# 6.5.1 - Updated version number, added PDF check for DRM-free documents
2016-09-29 00:00:11 -06:00
# 6.5.2 - Another Topaz fix
2017-01-12 00:24:42 -07:00
# 6.5.3 - Warn about KFX files explicitly
2017-06-26 23:50:24 -06:00
# 6.5.4 - Mac App Fix, improve PDF decryption, handle latest tcl changes in ActivePython
2017-07-04 00:05:51 -06:00
# 6.5.5 - Finally a fix for the Windows non-ASCII user names.
2018-04-05 11:30:37 -06:00
# 6.6.0 - Add kfx and kfx-zip as supported file types (also invoke this plugin if the original
2018-03-12 18:32:41 -06:00
# imported format was azw8 since that may be converted to kfx)
2018-06-02 09:47:00 -06:00
# 6.6.1 - Thanks to wzyboy for a fix for stand-alone tools, and the new folder structure.
2018-12-02 04:51:51 -07:00
# 6.6.2 - revamp of folders to get Mac OS X app working. Updated to 64-bit app. Various fixes.
2019-03-30 09:02:40 -06:00
# 6.6.3 - More cleanup of kindle book names and start of support for .kinf2018
2020-02-16 03:12:25 -07:00
# 6.7.0 - Handle new library in calibre.
2020-06-18 00:42:41 -06:00
# 6.8.0 - Full support for .kinf2018 and new KFX encryption (Kindle for PC/Mac 2.5+)
2020-12-30 05:14:04 -07:00
# 6.8.1 - Kindle key fix for Mac OS X Big Sur
# 7.0.0 - Switched to Python 3 for calibre 5.0. Thanks to all who contributed
# 7.0.1 - More Python 3 changes. Adobe PDF decryption should now work in some cases
2021-01-03 09:01:14 -07:00
# 7.0.2 - More Python 3 changes. Adobe PDF decryption should now work on PC too.
2021-01-03 09:11:02 -07:00
# 7.0.3 - More Python 3 changes. Integer division in ineptpdf.py
2021-02-21 07:35:49 -07:00
# 7.1.0 - Full release for calibre 5.x
2021-04-11 08:28:33 -06:00
# 7.2.0 - Update for latest KFX changes, and Python 3 Obok fixes.
2021-04-11 09:43:16 -06:00
# 7.2.1 - Whitespace!
2013-03-20 04:23:54 -06:00
"""
Decrypt DRMed ebooks .
"""
2020-09-27 04:54:49 -06:00
PLUGIN_NAME = " DeDRM "
2020-11-29 08:54:45 -07:00
PLUGIN_VERSION_TUPLE = tuple ( [ int ( x ) for x in __version__ . split ( " . " ) ] )
2020-09-27 04:54:49 -06:00
PLUGIN_VERSION = " . " . join ( [ str ( x ) for x in PLUGIN_VERSION_TUPLE ] )
2013-03-20 04:23:54 -06:00
# Include an html helpfile in the plugin's zipfile with the following name.
RESOURCE_NAME = PLUGIN_NAME + ' _Help.htm '
2020-09-26 14:22:47 -06:00
import codecs
2013-03-20 04:23:54 -06:00
import sys , os , re
import time
import zipfile
import traceback
from zipfile import ZipFile
class DeDRMError ( Exception ) :
pass
from calibre . customize import FileTypePlugin
from calibre . constants import iswindows , isosx
from calibre . gui2 import is_ok_to_use_qt
from calibre . utils . config import config_dir
# Wrap a stream so that output gets flushed immediately
# and also make sure that any unicode strings get safely
# encoded using "replace" before writing them.
class SafeUnbuffered :
def __init__ ( self , stream ) :
self . stream = stream
self . encoding = stream . encoding
if self . encoding == None :
self . encoding = " utf-8 "
def write ( self , data ) :
2020-09-27 04:54:49 -06:00
if isinstance ( data , str ) :
2013-03-20 04:23:54 -06:00
data = data . encode ( self . encoding , " replace " )
2016-04-25 10:49:06 -06:00
try :
2020-09-27 04:54:49 -06:00
self . stream . buffer . write ( data )
self . stream . buffer . flush ( )
2016-04-25 10:49:06 -06:00
except :
# We can do nothing if a write fails
pass
2013-03-20 04:23:54 -06:00
def __getattr__ ( self , attr ) :
return getattr ( self . stream , attr )
class DeDRM ( FileTypePlugin ) :
name = PLUGIN_NAME
2020-09-27 04:54:49 -06:00
description = " Removes DRM from Amazon Kindle, Adobe Adept (including Kobo), Barnes & Noble, Mobipocket and eReader ebooks. Credit given to i♥cabbages and The Dark Reverser for the original stand-alone scripts. "
2013-03-20 04:23:54 -06:00
supported_platforms = [ ' linux ' , ' osx ' , ' windows ' ]
2020-09-27 04:54:49 -06:00
author = " Apprentice Alf, Aprentice Harper, The Dark Reverser and i♥cabbages "
2013-03-20 04:23:54 -06:00
version = PLUGIN_VERSION_TUPLE
2020-09-27 04:54:49 -06:00
minimum_calibre_version = ( 5 , 0 , 0 ) # Python 3.
2018-03-12 18:32:41 -06:00
file_types = set ( [ ' epub ' , ' pdf ' , ' pdb ' , ' prc ' , ' mobi ' , ' pobi ' , ' azw ' , ' azw1 ' , ' azw3 ' , ' azw4 ' , ' azw8 ' , ' tpz ' , ' kfx ' , ' kfx-zip ' ] )
2013-03-20 04:23:54 -06:00
on_import = True
2020-09-20 14:43:23 -06:00
on_preprocess = True
2013-03-20 04:23:54 -06:00
priority = 600
2015-03-09 01:38:31 -06:00
def initialize ( self ) :
2013-03-20 04:23:54 -06:00
"""
2014-12-08 14:23:07 -07:00
Dynamic modules can ' t be imported/loaded from a zipfile.
So this routine will extract the appropriate
2013-03-20 04:23:54 -06:00
library for the target OS and copy it to the ' alfcrypto ' subdirectory of
calibre ' s configuration directory. That ' alfcrypto ' directory is then
inserted into the syspath ( as the very first entry ) in the run function
so the CDLL stuff will work in the alfcrypto . py script .
2014-12-08 14:23:07 -07:00
The extraction only happens once per version of the plugin
2015-03-09 01:38:31 -06:00
Also perform upgrade of preferences once per version
2013-03-20 04:23:54 -06:00
"""
try :
2020-09-27 04:54:49 -06:00
self . pluginsdir = os . path . join ( config_dir , " plugins " )
2013-03-20 04:23:54 -06:00
if not os . path . exists ( self . pluginsdir ) :
os . mkdir ( self . pluginsdir )
2020-09-27 04:54:49 -06:00
self . maindir = os . path . join ( self . pluginsdir , " DeDRM " )
2013-03-20 04:23:54 -06:00
if not os . path . exists ( self . maindir ) :
os . mkdir ( self . maindir )
2020-09-27 04:54:49 -06:00
self . helpdir = os . path . join ( self . maindir , " help " )
2013-03-20 04:23:54 -06:00
if not os . path . exists ( self . helpdir ) :
os . mkdir ( self . helpdir )
2020-09-27 04:54:49 -06:00
self . alfdir = os . path . join ( self . maindir , " libraryfiles " )
2013-03-20 04:23:54 -06:00
if not os . path . exists ( self . alfdir ) :
os . mkdir ( self . alfdir )
2014-12-08 14:23:07 -07:00
# only continue if we've never run this version of the plugin before
self . verdir = os . path . join ( self . maindir , PLUGIN_VERSION )
if not os . path . exists ( self . verdir ) :
2015-03-09 01:38:31 -06:00
if iswindows :
2020-09-27 04:54:49 -06:00
names = [ " alfcrypto.dll " , " alfcrypto64.dll " ]
2015-03-09 01:38:31 -06:00
elif isosx :
2020-09-27 04:54:49 -06:00
names = [ " libalfcrypto.dylib " ]
2015-03-09 01:38:31 -06:00
else :
2020-09-27 04:54:49 -06:00
names = [ " libalfcrypto32.so " , " libalfcrypto64.so " , " kindlekey.py " , " adobekey.py " , " subasyncio.py " ]
2015-03-09 01:38:31 -06:00
lib_dict = self . load_resources ( names )
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Copying needed library files from plugin ' s zip " . format ( PLUGIN_NAME , PLUGIN_VERSION ) )
2015-03-09 01:38:31 -06:00
2014-12-08 14:23:07 -07:00
for entry , data in lib_dict . items ( ) :
file_path = os . path . join ( self . alfdir , entry )
2015-03-09 01:38:31 -06:00
try :
os . remove ( file_path )
except :
pass
2013-03-20 04:23:54 -06:00
2015-03-09 01:38:31 -06:00
try :
open ( file_path , ' wb ' ) . write ( data )
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when copying needed library files " . format ( PLUGIN_NAME , PLUGIN_VERSION ) )
2015-03-09 01:38:31 -06:00
traceback . print_exc ( )
pass
2014-12-08 14:23:07 -07:00
2015-03-09 01:38:31 -06:00
# convert old preferences, if necessary.
from calibre_plugins . dedrm . prefs import convertprefs
convertprefs ( )
2014-12-08 14:23:07 -07:00
2015-03-09 01:38:31 -06:00
# mark that this version has been initialized
os . mkdir ( self . verdir )
2020-09-26 14:22:47 -06:00
except Exception as e :
2014-12-08 14:23:07 -07:00
traceback . print_exc ( )
2015-03-09 01:38:31 -06:00
raise
2014-12-08 14:23:07 -07:00
2013-03-20 04:23:54 -06:00
def ePubDecrypt ( self , path_to_ebook ) :
# Create a TemporaryPersistent file to work with.
# Check original epub archive for zip errors.
import calibre_plugins . dedrm . zipfix
2020-09-27 04:54:49 -06:00
inf = self . temporary_file ( " .epub " )
2013-03-20 04:23:54 -06:00
try :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Verifying zip archive integrity " . format ( PLUGIN_NAME , PLUGIN_VERSION ) )
2013-03-20 04:23:54 -06:00
fr = zipfix . fixZip ( path_to_ebook , inf . name )
fr . fix ( )
2020-09-26 14:22:47 -06:00
except Exception as e :
2020-09-27 04:54:49 -06:00
print ( " {0} v {1} : Error \' {2} \' when checking zip archive " . format ( PLUGIN_NAME , PLUGIN_VERSION , e . args [ 0 ] ) )
2013-03-20 04:23:54 -06:00
raise Exception ( e )
# import the decryption keys
2013-04-05 10:44:48 -06:00
import calibre_plugins . dedrm . prefs as prefs
dedrmprefs = prefs . DeDRM_Prefs ( )
2013-03-20 04:23:54 -06:00
# import the Barnes & Noble ePub handler
import calibre_plugins . dedrm . ignobleepub as ignobleepub
2013-04-05 10:44:48 -06:00
2013-03-20 04:23:54 -06:00
#check the book
if ignobleepub . ignobleBook ( inf . name ) :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : “ {2} ” is a secure Barnes & Noble ePub " . format ( PLUGIN_NAME , PLUGIN_VERSION , os . path . basename ( path_to_ebook ) ) )
2013-03-20 04:23:54 -06:00
# Attempt to decrypt epub with each encryption key (generated or provided).
2013-04-05 10:44:48 -06:00
for keyname , userkey in dedrmprefs [ ' bandnkeys ' ] . items ( ) :
2020-10-14 09:23:49 -06:00
keyname_masked = " " . join ( ( " X " if ( x . isdigit ( ) ) else x ) for x in keyname )
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Trying Encryption key {2:s} " . format ( PLUGIN_NAME , PLUGIN_VERSION , keyname_masked ) )
2020-09-27 04:54:49 -06:00
of = self . temporary_file ( " .epub " )
2013-03-20 04:23:54 -06:00
# Give the user key, ebook and TemporaryPersistent file to the decryption function.
2015-03-09 01:38:31 -06:00
try :
result = ignobleepub . decryptBook ( userkey , inf . name , of . name )
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when trying to decrypt after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
traceback . print_exc ( )
result = 1
2013-03-20 04:23:54 -06:00
of . close ( )
if result == 0 :
# Decryption was successful.
# Return the modified PersistentTemporary file to calibre.
return of . name
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Failed to decrypt with key {2:s} after {3:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , keyname_masked , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
2015-03-09 01:38:31 -06:00
# perhaps we should see if we can get a key from a log file
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Looking for new NOOK Study Keys after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
# get the default NOOK Study keys
defaultkeys = [ ]
try :
if iswindows or isosx :
from calibre_plugins . dedrm . ignoblekey import nookkeys
defaultkeys = nookkeys ( )
else : # linux
2020-09-27 04:54:49 -06:00
from . wineutils import WineGetKeys
2015-03-09 01:38:31 -06:00
2020-09-27 04:54:49 -06:00
scriptpath = os . path . join ( self . alfdir , " ignoblekey.py " )
defaultkeys = WineGetKeys ( scriptpath , " .b64 " , dedrmprefs [ ' adobewineprefix ' ] )
2015-03-09 01:38:31 -06:00
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when getting default NOOK Study Key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
traceback . print_exc ( )
newkeys = [ ]
for keyvalue in defaultkeys :
if keyvalue not in dedrmprefs [ ' bandnkeys ' ] . values ( ) :
newkeys . append ( keyvalue )
if len ( newkeys ) > 0 :
try :
for i , userkey in enumerate ( newkeys ) :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Trying a new default key " . format ( PLUGIN_NAME , PLUGIN_VERSION ) )
2015-03-09 01:38:31 -06:00
2020-09-27 04:54:49 -06:00
of = self . temporary_file ( " .epub " )
2015-03-09 01:38:31 -06:00
# Give the user key, ebook and TemporaryPersistent file to the decryption function.
try :
result = ignobleepub . decryptBook ( userkey , inf . name , of . name )
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when trying to decrypt after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
traceback . print_exc ( )
result = 1
of . close ( )
if result == 0 :
# Decryption was a success
# Store the new successful key in the defaults
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Saving a new default key " . format ( PLUGIN_NAME , PLUGIN_VERSION ) )
2015-03-09 01:38:31 -06:00
try :
2015-06-30 10:27:33 -06:00
dedrmprefs . addnamedvaluetoprefs ( ' bandnkeys ' , ' nook_Study_key ' , keyvalue )
2015-03-09 01:38:31 -06:00
dedrmprefs . writeprefs ( )
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Saved a new default key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception saving a new default key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
traceback . print_exc ( )
# Return the modified PersistentTemporary file to calibre.
return of . name
2020-09-27 04:54:49 -06:00
print ( " {0} v {1} : Failed to decrypt with new default key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2020-09-26 14:22:47 -06:00
except Exception as e :
2015-03-09 01:38:31 -06:00
pass
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Ultimately failed to decrypt after {2:.1f} seconds. Read the FAQs at Harper ' s repository: https://github.com/apprenticeharper/DeDRM_tools/blob/master/FAQs.md " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2020-09-27 04:54:49 -06:00
raise DeDRMError ( " {0} v {1} : Ultimately failed to decrypt after {2:.1f} seconds. Read the FAQs at Harper ' s repository: https://github.com/apprenticeharper/DeDRM_tools/blob/master/FAQs.md " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
# import the Adobe Adept ePub handler
import calibre_plugins . dedrm . ineptepub as ineptepub
if ineptepub . adeptBook ( inf . name ) :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : {2} is a secure Adobe Adept ePub " . format ( PLUGIN_NAME , PLUGIN_VERSION , os . path . basename ( path_to_ebook ) ) )
2013-03-20 04:23:54 -06:00
# Attempt to decrypt epub with each encryption key (generated or provided).
2013-04-05 10:44:48 -06:00
for keyname , userkeyhex in dedrmprefs [ ' adeptkeys ' ] . items ( ) :
2020-09-26 14:22:47 -06:00
userkey = codecs . decode ( userkeyhex , ' hex ' )
2020-09-27 04:54:49 -06:00
print ( " {0} v {1} : Trying Encryption key {2:s} " . format ( PLUGIN_NAME , PLUGIN_VERSION , keyname ) )
of = self . temporary_file ( " .epub " )
2013-03-20 04:23:54 -06:00
# Give the user key, ebook and TemporaryPersistent file to the decryption function.
try :
result = ineptepub . decryptBook ( userkey , inf . name , of . name )
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when decrypting after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
traceback . print_exc ( )
2013-03-20 04:23:54 -06:00
result = 1
2016-01-10 23:44:44 -07:00
try :
of . close ( )
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception closing temporary file after {2:.1f} seconds. Ignored. " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
if result == 0 :
# Decryption was successful.
# Return the modified PersistentTemporary file to calibre.
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Decrypted with key {2:s} after {3:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , keyname , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
return of . name
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Failed to decrypt with key {2:s} after {3:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , keyname , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
# perhaps we need to get a new default ADE key
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Looking for new default Adobe Digital Editions Keys after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
2013-04-05 10:44:48 -06:00
# get the default Adobe keys
defaultkeys = [ ]
2013-03-20 04:23:54 -06:00
2013-04-05 10:44:48 -06:00
try :
if iswindows or isosx :
from calibre_plugins . dedrm . adobekey import adeptkeys
2021-11-15 02:47:09 -07:00
defaultkeys , defaultnames = adeptkeys ( )
2013-04-05 10:44:48 -06:00
else : # linux
2020-09-27 04:54:49 -06:00
from . wineutils import WineGetKeys
2013-03-20 04:23:54 -06:00
2020-09-27 04:54:49 -06:00
scriptpath = os . path . join ( self . alfdir , " adobekey.py " )
2021-11-15 02:47:09 -07:00
defaultkeys , defaultnames = WineGetKeys ( scriptpath , " .der " , dedrmprefs [ ' adobewineprefix ' ] )
2013-03-20 04:23:54 -06:00
2013-06-11 12:41:21 -06:00
self . default_key = defaultkeys [ 0 ]
2013-04-05 10:44:48 -06:00
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when getting default Adobe Key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-04-05 10:44:48 -06:00
traceback . print_exc ( )
2020-10-14 09:23:49 -06:00
self . default_key = " "
2013-03-20 04:23:54 -06:00
2013-04-05 10:44:48 -06:00
newkeys = [ ]
2021-11-15 02:47:09 -07:00
newnames = [ ]
idx = 0
2013-04-05 10:44:48 -06:00
for keyvalue in defaultkeys :
2020-09-27 04:54:49 -06:00
if codecs . encode ( keyvalue , ' hex ' ) . decode ( ' ascii ' ) not in dedrmprefs [ ' adeptkeys ' ] . values ( ) :
2013-04-05 10:44:48 -06:00
newkeys . append ( keyvalue )
2021-11-15 02:47:09 -07:00
newnames . append ( defaultnames [ idx ] )
idx + = 1
2013-04-05 10:44:48 -06:00
if len ( newkeys ) > 0 :
try :
for i , userkey in enumerate ( newkeys ) :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Trying a new default key " . format ( PLUGIN_NAME , PLUGIN_VERSION ) )
2020-09-27 04:54:49 -06:00
of = self . temporary_file ( " .epub " )
2013-04-05 10:44:48 -06:00
# Give the user key, ebook and TemporaryPersistent file to the decryption function.
try :
result = ineptepub . decryptBook ( userkey , inf . name , of . name )
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when decrypting after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
traceback . print_exc ( )
2013-04-05 10:44:48 -06:00
result = 1
of . close ( )
if result == 0 :
# Decryption was a success
# Store the new successful key in the defaults
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Saving a new default key " . format ( PLUGIN_NAME , PLUGIN_VERSION ) )
2013-03-20 04:23:54 -06:00
try :
2021-11-15 02:47:09 -07:00
dedrmprefs . addnamedvaluetoprefs ( ' adeptkeys ' , ' default_key_uuid_ ' + newnames [ i ] , codecs . encode ( userkey , ' hex ' ) . decode ( ' ascii ' ) )
2013-04-05 10:44:48 -06:00
dedrmprefs . writeprefs ( )
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Saved a new default key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when saving a new default key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-04-05 10:44:48 -06:00
traceback . print_exc ( )
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Decrypted with new default key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-04-05 10:44:48 -06:00
# Return the modified PersistentTemporary file to calibre.
return of . name
2020-09-27 04:54:49 -06:00
print ( " {0} v {1} : Failed to decrypt with new default key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2020-09-26 14:22:47 -06:00
except Exception as e :
2020-09-27 04:54:49 -06:00
print ( " {0} v {1} : Unexpected Exception trying a new default key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2017-07-04 00:05:51 -06:00
traceback . print_exc ( )
2013-04-05 10:44:48 -06:00
pass
2013-03-20 04:23:54 -06:00
# Something went wrong with decryption.
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Ultimately failed to decrypt after {2:.1f} seconds. Read the FAQs at Harper ' s repository: https://github.com/apprenticeharper/DeDRM_tools/blob/master/FAQs.md " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2020-09-27 04:54:49 -06:00
raise DeDRMError ( " {0} v {1} : Ultimately failed to decrypt after {2:.1f} seconds. Read the FAQs at Harper ' s repository: https://github.com/apprenticeharper/DeDRM_tools/blob/master/FAQs.md " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
# Not a Barnes & Noble nor an Adobe Adept
# Import the fixed epub.
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : “ {2} ” is neither an Adobe Adept nor a Barnes & Noble encrypted ePub " . format ( PLUGIN_NAME , PLUGIN_VERSION , os . path . basename ( path_to_ebook ) ) )
2020-09-27 04:54:49 -06:00
raise DeDRMError ( " {0} v {1} : Couldn ' t decrypt after {2:.1f} seconds. DRM free perhaps? " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
def PDFDecrypt ( self , path_to_ebook ) :
2013-04-05 10:44:48 -06:00
import calibre_plugins . dedrm . prefs as prefs
2013-03-20 04:23:54 -06:00
import calibre_plugins . dedrm . ineptpdf
2013-04-05 10:44:48 -06:00
dedrmprefs = prefs . DeDRM_Prefs ( )
2013-03-20 04:23:54 -06:00
# Attempt to decrypt epub with each encryption key (generated or provided).
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : {2} is a PDF ebook " . format ( PLUGIN_NAME , PLUGIN_VERSION , os . path . basename ( path_to_ebook ) ) )
2013-04-05 10:44:48 -06:00
for keyname , userkeyhex in dedrmprefs [ ' adeptkeys ' ] . items ( ) :
2020-11-29 05:39:04 -07:00
userkey = codecs . decode ( userkeyhex , ' hex ' )
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Trying Encryption key {2:s} " . format ( PLUGIN_NAME , PLUGIN_VERSION , keyname ) )
2020-09-27 04:54:49 -06:00
of = self . temporary_file ( " .pdf " )
2013-03-20 04:23:54 -06:00
# Give the user key, ebook and TemporaryPersistent file to the decryption function.
try :
result = ineptpdf . decryptBook ( userkey , path_to_ebook , of . name )
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when decrypting after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
traceback . print_exc ( )
2013-03-20 04:23:54 -06:00
result = 1
of . close ( )
if result == 0 :
# Decryption was successful.
# Return the modified PersistentTemporary file to calibre.
return of . name
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Failed to decrypt with key {2:s} after {3:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , keyname , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
2014-12-08 14:23:07 -07:00
# perhaps we need to get a new default ADE key
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Looking for new default Adobe Digital Editions Keys after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
2014-12-08 14:23:07 -07:00
# get the default Adobe keys
defaultkeys = [ ]
2013-03-20 04:23:54 -06:00
2015-03-09 01:38:31 -06:00
try :
if iswindows or isosx :
from calibre_plugins . dedrm . adobekey import adeptkeys
2013-03-20 04:23:54 -06:00
2021-11-15 02:47:09 -07:00
defaultkeys , defaultnames = adeptkeys ( )
2015-03-09 01:38:31 -06:00
else : # linux
2020-09-27 04:54:49 -06:00
from . wineutils import WineGetKeys
2013-03-20 04:23:54 -06:00
2020-09-27 04:54:49 -06:00
scriptpath = os . path . join ( self . alfdir , " adobekey.py " )
2021-11-15 02:47:09 -07:00
defaultkeys , defaultnames = WineGetKeys ( scriptpath , " .der " , dedrmprefs [ ' adobewineprefix ' ] )
2015-03-09 01:38:31 -06:00
self . default_key = defaultkeys [ 0 ]
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when getting default Adobe Key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
traceback . print_exc ( )
2020-10-14 09:23:49 -06:00
self . default_key = " "
2013-03-20 04:23:54 -06:00
2014-12-08 14:23:07 -07:00
newkeys = [ ]
2021-11-15 02:47:09 -07:00
newnames = [ ]
idx = 0
2014-12-08 14:23:07 -07:00
for keyvalue in defaultkeys :
2020-11-29 05:39:04 -07:00
if codecs . encode ( keyvalue , ' hex ' ) not in dedrmprefs [ ' adeptkeys ' ] . values ( ) :
2014-12-08 14:23:07 -07:00
newkeys . append ( keyvalue )
2021-11-15 02:47:09 -07:00
newnames . append ( defaultnames [ idx ] )
idx + = 1
2013-04-05 10:44:48 -06:00
2014-12-08 14:23:07 -07:00
if len ( newkeys ) > 0 :
try :
for i , userkey in enumerate ( newkeys ) :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Trying a new default key " . format ( PLUGIN_NAME , PLUGIN_VERSION ) )
2020-09-27 04:54:49 -06:00
of = self . temporary_file ( " .pdf " )
2014-12-08 14:23:07 -07:00
# Give the user key, ebook and TemporaryPersistent file to the decryption function.
try :
2015-03-09 01:38:31 -06:00
result = ineptpdf . decryptBook ( userkey , path_to_ebook , of . name )
2014-12-08 14:23:07 -07:00
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when decrypting after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
traceback . print_exc ( )
2014-12-08 14:23:07 -07:00
result = 1
of . close ( )
if result == 0 :
# Decryption was a success
# Store the new successful key in the defaults
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Saving a new default key " . format ( PLUGIN_NAME , PLUGIN_VERSION ) )
2013-04-05 10:44:48 -06:00
try :
2021-11-15 02:47:09 -07:00
dedrmprefs . addnamedvaluetoprefs ( ' adeptkeys ' , ' default_key_uuid_ ' + newnames [ i ] , codecs . encode ( userkey , ' hex ' ) . decode ( ' ascii ' ) )
2014-12-08 14:23:07 -07:00
dedrmprefs . writeprefs ( )
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Saved a new default key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-04-05 10:44:48 -06:00
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when saving a new default key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2014-12-08 14:23:07 -07:00
traceback . print_exc ( )
# Return the modified PersistentTemporary file to calibre.
return of . name
2013-04-05 10:44:48 -06:00
2020-09-27 04:54:49 -06:00
print ( " {0} v {1} : Failed to decrypt with new default key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2020-09-26 14:22:47 -06:00
except Exception as e :
2014-12-08 14:23:07 -07:00
pass
2013-03-20 04:23:54 -06:00
# Something went wrong with decryption.
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Ultimately failed to decrypt after {2:.1f} seconds. Read the FAQs at Harper ' s repository: https://github.com/apprenticeharper/DeDRM_tools/blob/master/FAQs.md " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2020-09-27 04:54:49 -06:00
raise DeDRMError ( " {0} v {1} : Ultimately failed to decrypt after {2:.1f} seconds. Read the FAQs at Harper ' s repository: https://github.com/apprenticeharper/DeDRM_tools/blob/master/FAQs.md " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
2013-04-05 10:44:48 -06:00
2013-03-20 04:23:54 -06:00
def KindleMobiDecrypt ( self , path_to_ebook ) :
# add the alfcrypto directory to sys.path so alfcrypto.py
# will be able to locate the custom lib(s) for CDLL import.
sys . path . insert ( 0 , self . alfdir )
# Had to move this import here so the custom libs can be
# extracted to the appropriate places beforehand these routines
# look for them.
2013-04-05 10:44:48 -06:00
import calibre_plugins . dedrm . prefs as prefs
2013-03-20 04:23:54 -06:00
import calibre_plugins . dedrm . k4mobidedrm
2013-04-05 10:44:48 -06:00
dedrmprefs = prefs . DeDRM_Prefs ( )
pids = dedrmprefs [ ' pids ' ]
serials = dedrmprefs [ ' serials ' ]
2015-07-29 11:11:19 -06:00
for android_serials_list in dedrmprefs [ ' androidkeys ' ] . values ( ) :
#print android_serials_list
serials . extend ( android_serials_list )
#print serials
androidFiles = [ ]
2020-09-27 04:54:49 -06:00
kindleDatabases = list ( dedrmprefs [ ' kindlekeys ' ] . items ( ) )
2013-03-20 04:23:54 -06:00
try :
2015-07-29 11:11:19 -06:00
book = k4mobidedrm . GetDecryptedBook ( path_to_ebook , kindleDatabases , androidFiles , serials , pids , self . starttime )
2020-09-26 14:22:47 -06:00
except Exception as e :
2013-03-20 04:23:54 -06:00
decoded = False
# perhaps we need to get a new default Kindle for Mac/PC key
2013-04-05 10:44:48 -06:00
defaultkeys = [ ]
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Failed to decrypt with error: {2} " . format ( PLUGIN_NAME , PLUGIN_VERSION , e . args [ 0 ] ) )
print ( " {0} v {1} : Looking for new default Kindle Key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-04-05 10:44:48 -06:00
try :
if iswindows or isosx :
from calibre_plugins . dedrm . kindlekey import kindlekeys
2013-03-20 04:23:54 -06:00
2013-04-05 10:44:48 -06:00
defaultkeys = kindlekeys ( )
else : # linux
2020-09-27 04:54:49 -06:00
from . wineutils import WineGetKeys
2013-04-05 10:44:48 -06:00
2020-09-27 04:54:49 -06:00
scriptpath = os . path . join ( self . alfdir , " kindlekey.py " )
defaultkeys = WineGetKeys ( scriptpath , " .k4i " , dedrmprefs [ ' kindlewineprefix ' ] )
2013-04-05 10:44:48 -06:00
except :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Exception when getting default Kindle Key after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2015-03-09 01:38:31 -06:00
traceback . print_exc ( )
2013-04-05 10:44:48 -06:00
pass
newkeys = { }
for i , keyvalue in enumerate ( defaultkeys ) :
2020-09-27 04:54:49 -06:00
keyname = " default_key_ {0:d} " . format ( i + 1 )
2013-04-05 10:44:48 -06:00
if keyvalue not in dedrmprefs [ ' kindlekeys ' ] . values ( ) :
newkeys [ keyname ] = keyvalue
if len ( newkeys ) > 0 :
2020-09-27 04:54:49 -06:00
print ( " {0} v {1} : Found {2} new {3} " . format ( PLUGIN_NAME , PLUGIN_VERSION , len ( newkeys ) , " key " if len ( newkeys ) == 1 else " keys " ) )
2013-03-20 04:23:54 -06:00
try :
2020-09-27 04:54:49 -06:00
book = k4mobidedrm . GetDecryptedBook ( path_to_ebook , list ( newkeys . items ( ) ) , [ ] , [ ] , [ ] , self . starttime )
2013-04-05 10:44:48 -06:00
decoded = True
# store the new successful keys in the defaults
2020-09-27 04:54:49 -06:00
print ( " {0} v {1} : Saving {2} new {3} " . format ( PLUGIN_NAME , PLUGIN_VERSION , len ( newkeys ) , " key " if len ( newkeys ) == 1 else " keys " ) )
2013-04-05 10:44:48 -06:00
for keyvalue in newkeys . values ( ) :
dedrmprefs . addnamedvaluetoprefs ( ' kindlekeys ' , ' default_key ' , keyvalue )
dedrmprefs . writeprefs ( )
2020-09-26 14:22:47 -06:00
except Exception as e :
2013-04-05 10:44:48 -06:00
pass
2013-03-20 04:23:54 -06:00
if not decoded :
#if you reached here then no luck raise and exception
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Ultimately failed to decrypt after {2:.1f} seconds. Read the FAQs at Harper ' s repository: https://github.com/apprenticeharper/DeDRM_tools/blob/master/FAQs.md " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2020-09-27 04:54:49 -06:00
raise DeDRMError ( " {0} v {1} : Ultimately failed to decrypt after {2:.1f} seconds. Read the FAQs at Harper ' s repository: https://github.com/apprenticeharper/DeDRM_tools/blob/master/FAQs.md " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
of = self . temporary_file ( book . getBookExtension ( ) )
book . getFile ( of . name )
of . close ( )
book . cleanup ( )
return of . name
def eReaderDecrypt ( self , path_to_ebook ) :
2013-04-05 10:44:48 -06:00
import calibre_plugins . dedrm . prefs as prefs
2013-03-20 04:23:54 -06:00
import calibre_plugins . dedrm . erdr2pml
2013-04-10 04:50:10 -06:00
dedrmprefs = prefs . DeDRM_Prefs ( )
2013-03-20 04:23:54 -06:00
# Attempt to decrypt epub with each encryption key (generated or provided).
2013-04-05 10:44:48 -06:00
for keyname , userkey in dedrmprefs [ ' ereaderkeys ' ] . items ( ) :
2020-10-14 09:23:49 -06:00
keyname_masked = " " . join ( ( " X " if ( x . isdigit ( ) ) else x ) for x in keyname )
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Trying Encryption key {2:s} " . format ( PLUGIN_NAME , PLUGIN_VERSION , keyname_masked ) )
2020-09-27 04:54:49 -06:00
of = self . temporary_file ( " .pmlz " )
2013-03-20 04:23:54 -06:00
# Give the userkey, ebook and TemporaryPersistent file to the decryption function.
2020-11-29 05:39:04 -07:00
result = erdr2pml . decryptBook ( path_to_ebook , of . name , True , codecs . decode ( userkey , ' hex ' ) )
2013-03-20 04:23:54 -06:00
of . close ( )
# Decryption was successful return the modified PersistentTemporary
# file to Calibre's import process.
if result == 0 :
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Successfully decrypted with key {2:s} after {3:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , keyname_masked , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
return of . name
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Failed to decrypt with key {2:s} after {3:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , keyname_masked , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Ultimately failed to decrypt after {2:.1f} seconds. Read the FAQs at Harper ' s repository: https://github.com/apprenticeharper/DeDRM_tools/blob/master/FAQs.md " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2020-09-27 04:54:49 -06:00
raise DeDRMError ( " {0} v {1} : Ultimately failed to decrypt after {2:.1f} seconds. Read the FAQs at Harper ' s repository: https://github.com/apprenticeharper/DeDRM_tools/blob/master/FAQs.md " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
def run ( self , path_to_ebook ) :
# make sure any unicode output gets converted safely with 'replace'
sys . stdout = SafeUnbuffered ( sys . stdout )
sys . stderr = SafeUnbuffered ( sys . stderr )
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Trying to decrypt {2} " . format ( PLUGIN_NAME , PLUGIN_VERSION , os . path . basename ( path_to_ebook ) ) )
2013-03-20 04:23:54 -06:00
self . starttime = time . time ( )
booktype = os . path . splitext ( path_to_ebook ) [ 1 ] . lower ( ) [ 1 : ]
2018-03-12 18:32:41 -06:00
if booktype in [ ' prc ' , ' mobi ' , ' pobi ' , ' azw ' , ' azw1 ' , ' azw3 ' , ' azw4 ' , ' tpz ' , ' kfx-zip ' ] :
2013-03-20 04:23:54 -06:00
# Kindle/Mobipocket
decrypted_ebook = self . KindleMobiDecrypt ( path_to_ebook )
elif booktype == ' pdb ' :
# eReader
decrypted_ebook = self . eReaderDecrypt ( path_to_ebook )
pass
elif booktype == ' pdf ' :
# Adobe Adept PDF (hopefully)
decrypted_ebook = self . PDFDecrypt ( path_to_ebook )
pass
elif booktype == ' epub ' :
# Adobe Adept or B&N ePub
decrypted_ebook = self . ePubDecrypt ( path_to_ebook )
else :
2020-09-26 14:22:47 -06:00
print ( " Unknown booktype {0} . Passing back to calibre unchanged " . format ( booktype ) )
2013-03-20 04:23:54 -06:00
return path_to_ebook
2020-09-26 14:22:47 -06:00
print ( " {0} v {1} : Finished after {2:.1f} seconds " . format ( PLUGIN_NAME , PLUGIN_VERSION , time . time ( ) - self . starttime ) )
2013-03-20 04:23:54 -06:00
return decrypted_ebook
def is_customizable ( self ) :
# return true to allow customization via the Plugin->Preferences.
return True
def config_widget ( self ) :
import calibre_plugins . dedrm . config as config
2013-04-05 10:44:48 -06:00
return config . ConfigWidget ( self . plugin_path , self . alfdir )
2013-03-20 04:23:54 -06:00
def save_settings ( self , config_widget ) :
config_widget . save_settings ( )