2012-11-20 06:28:12 -07:00
|
|
|
#!/usr/bin/env python
|
2012-12-19 06:48:11 -07:00
|
|
|
# -*- coding: utf-8 -*-
|
2012-11-20 06:28:12 -07:00
|
|
|
|
|
|
|
from __future__ import with_statement
|
2013-10-02 12:59:40 -06:00
|
|
|
import sys
|
|
|
|
import os, csv
|
|
|
|
import binascii
|
|
|
|
import zlib
|
|
|
|
import re
|
2012-11-20 06:28:12 -07:00
|
|
|
from struct import pack, unpack, unpack_from
|
2013-10-02 12:59:40 -06:00
|
|
|
import traceback
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
class DrmException(Exception):
|
|
|
|
pass
|
2012-11-20 06:28:12 -07:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
global charMap1
|
|
|
|
global charMap3
|
|
|
|
global charMap4
|
2013-04-05 10:44:48 -06:00
|
|
|
|
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
charMap1 = 'n5Pr6St7Uv8Wx9YzAb0Cd1Ef2Gh3Jk4M'
|
|
|
|
charMap3 = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/'
|
|
|
|
charMap4 = 'ABCDEFGHIJKLMNPQRSTUVWXYZ123456789'
|
2012-11-20 06:28:12 -07:00
|
|
|
|
|
|
|
# crypto digestroutines
|
|
|
|
import hashlib
|
|
|
|
|
|
|
|
def MD5(message):
|
|
|
|
ctx = hashlib.md5()
|
|
|
|
ctx.update(message)
|
|
|
|
return ctx.digest()
|
|
|
|
|
|
|
|
def SHA1(message):
|
|
|
|
ctx = hashlib.sha1()
|
|
|
|
ctx.update(message)
|
|
|
|
return ctx.digest()
|
|
|
|
|
|
|
|
|
|
|
|
# Encode the bytes in data with the characters in map
|
|
|
|
def encode(data, map):
|
2012-12-19 06:48:11 -07:00
|
|
|
result = ''
|
2012-11-20 06:28:12 -07:00
|
|
|
for char in data:
|
|
|
|
value = ord(char)
|
|
|
|
Q = (value ^ 0x80) // len(map)
|
|
|
|
R = value % len(map)
|
|
|
|
result += map[Q]
|
|
|
|
result += map[R]
|
|
|
|
return result
|
|
|
|
|
|
|
|
# Hash the bytes in data and then encode the digest with the characters in map
|
|
|
|
def encodeHash(data,map):
|
|
|
|
return encode(MD5(data),map)
|
|
|
|
|
|
|
|
# Decode the string in data with the characters in map. Returns the decoded bytes
|
|
|
|
def decode(data,map):
|
2012-12-19 06:48:11 -07:00
|
|
|
result = ''
|
2012-11-20 06:28:12 -07:00
|
|
|
for i in range (0,len(data)-1,2):
|
|
|
|
high = map.find(data[i])
|
|
|
|
low = map.find(data[i+1])
|
|
|
|
if (high == -1) or (low == -1) :
|
|
|
|
break
|
|
|
|
value = (((high * len(map)) ^ 0x80) & 0xFF) + low
|
2012-12-19 06:48:11 -07:00
|
|
|
result += pack('B',value)
|
2012-11-20 06:28:12 -07:00
|
|
|
return result
|
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
#
|
|
|
|
# PID generation routines
|
|
|
|
#
|
2012-11-20 06:28:12 -07:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# Returns two bit at offset from a bit field
|
|
|
|
def getTwoBitsFromBitField(bitField,offset):
|
|
|
|
byteNumber = offset // 4
|
|
|
|
bitPosition = 6 - 2*(offset % 4)
|
|
|
|
return ord(bitField[byteNumber]) >> bitPosition & 3
|
|
|
|
|
|
|
|
# Returns the six bits at offset from a bit field
|
|
|
|
def getSixBitsFromBitField(bitField,offset):
|
|
|
|
offset *= 3
|
|
|
|
value = (getTwoBitsFromBitField(bitField,offset) <<4) + (getTwoBitsFromBitField(bitField,offset+1) << 2) +getTwoBitsFromBitField(bitField,offset+2)
|
|
|
|
return value
|
|
|
|
|
|
|
|
# 8 bits to six bits encoding from hash to generate PID string
|
|
|
|
def encodePID(hash):
|
|
|
|
global charMap3
|
|
|
|
PID = ''
|
|
|
|
for position in range (0,8):
|
|
|
|
PID += charMap3[getSixBitsFromBitField(hash,position)]
|
|
|
|
return PID
|
|
|
|
|
|
|
|
# Encryption table used to generate the device PID
|
|
|
|
def generatePidEncryptionTable() :
|
|
|
|
table = []
|
|
|
|
for counter1 in range (0,0x100):
|
|
|
|
value = counter1
|
|
|
|
for counter2 in range (0,8):
|
|
|
|
if (value & 1 == 0) :
|
|
|
|
value = value >> 1
|
|
|
|
else :
|
|
|
|
value = value >> 1
|
|
|
|
value = value ^ 0xEDB88320
|
|
|
|
table.append(value)
|
|
|
|
return table
|
|
|
|
|
|
|
|
# Seed value used to generate the device PID
|
|
|
|
def generatePidSeed(table,dsn) :
|
|
|
|
value = 0
|
|
|
|
for counter in range (0,4) :
|
|
|
|
index = (ord(dsn[counter]) ^ value) &0xFF
|
|
|
|
value = (value >> 8) ^ table[index]
|
|
|
|
return value
|
|
|
|
|
|
|
|
# Generate the device PID
|
|
|
|
def generateDevicePID(table,dsn,nbRoll):
|
|
|
|
global charMap4
|
|
|
|
seed = generatePidSeed(table,dsn)
|
|
|
|
pidAscii = ''
|
|
|
|
pid = [(seed >>24) &0xFF,(seed >> 16) &0xff,(seed >> 8) &0xFF,(seed) & 0xFF,(seed>>24) & 0xFF,(seed >> 16) &0xff,(seed >> 8) &0xFF,(seed) & 0xFF]
|
|
|
|
index = 0
|
|
|
|
for counter in range (0,nbRoll):
|
|
|
|
pid[index] = pid[index] ^ ord(dsn[counter])
|
|
|
|
index = (index+1) %8
|
|
|
|
for counter in range (0,8):
|
|
|
|
index = ((((pid[counter] >>5) & 3) ^ pid[counter]) & 0x1f) + (pid[counter] >> 7)
|
|
|
|
pidAscii += charMap4[index]
|
|
|
|
return pidAscii
|
|
|
|
|
|
|
|
def crc32(s):
|
|
|
|
return (~binascii.crc32(s,-1))&0xFFFFFFFF
|
|
|
|
|
|
|
|
# convert from 8 digit PID to 10 digit PID with checksum
|
|
|
|
def checksumPid(s):
|
|
|
|
global charMap4
|
|
|
|
crc = crc32(s)
|
|
|
|
crc = crc ^ (crc >> 16)
|
|
|
|
res = s
|
|
|
|
l = len(charMap4)
|
|
|
|
for i in (0,1):
|
|
|
|
b = crc & 0xff
|
|
|
|
pos = (b // l) ^ (b % l)
|
|
|
|
res += charMap4[pos%l]
|
|
|
|
crc >>= 8
|
|
|
|
return res
|
|
|
|
|
|
|
|
|
|
|
|
# old kindle serial number to fixed pid
|
|
|
|
def pidFromSerial(s, l):
|
|
|
|
global charMap4
|
|
|
|
crc = crc32(s)
|
|
|
|
arr1 = [0]*l
|
|
|
|
for i in xrange(len(s)):
|
|
|
|
arr1[i%l] ^= ord(s[i])
|
|
|
|
crc_bytes = [crc >> 24 & 0xff, crc >> 16 & 0xff, crc >> 8 & 0xff, crc & 0xff]
|
|
|
|
for i in xrange(l):
|
|
|
|
arr1[i] ^= crc_bytes[i&3]
|
|
|
|
pid = ""
|
|
|
|
for i in xrange(l):
|
|
|
|
b = arr1[i] & 0xff
|
|
|
|
pid+=charMap4[(b >> 7) + ((b >> 5 & 3) ^ (b & 0x1f))]
|
|
|
|
return pid
|
|
|
|
|
|
|
|
|
|
|
|
# Parse the EXTH header records and use the Kindle serial number to calculate the book pid.
|
|
|
|
def getKindlePids(rec209, token, serialnum):
|
|
|
|
pids=[]
|
|
|
|
|
|
|
|
if isinstance(serialnum,unicode):
|
|
|
|
serialnum = serialnum.encode('ascii')
|
|
|
|
|
|
|
|
# Compute book PID
|
|
|
|
pidHash = SHA1(serialnum+rec209+token)
|
|
|
|
bookPID = encodePID(pidHash)
|
|
|
|
bookPID = checksumPid(bookPID)
|
|
|
|
pids.append(bookPID)
|
|
|
|
|
|
|
|
# compute fixed pid for old pre 2.5 firmware update pid as well
|
|
|
|
kindlePID = pidFromSerial(serialnum, 7) + "*"
|
|
|
|
kindlePID = checksumPid(kindlePID)
|
|
|
|
pids.append(kindlePID)
|
|
|
|
|
|
|
|
return pids
|
|
|
|
|
|
|
|
|
|
|
|
# parse the Kindleinfo file to calculate the book pid.
|
|
|
|
|
|
|
|
keynames = ['kindle.account.tokens','kindle.cookie.item','eulaVersionAccepted','login_date','kindle.token.item','login','kindle.key.item','kindle.name.info','kindle.device.info', 'MazamaRandomNumber']
|
|
|
|
|
|
|
|
def getK4Pids(rec209, token, kindleDatabase):
|
|
|
|
global charMap1
|
|
|
|
pids = []
|
2012-11-20 06:28:12 -07:00
|
|
|
|
|
|
|
try:
|
2013-10-02 12:59:40 -06:00
|
|
|
# Get the Mazama Random number
|
|
|
|
MazamaRandomNumber = (kindleDatabase[1])['MazamaRandomNumber'].decode('hex').encode('ascii')
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# Get the kindle account token
|
|
|
|
kindleAccountToken = (kindleDatabase[1])['kindle.account.tokens'].decode('hex').encode('ascii')
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# Get the IDString used to decode the Kindle Info file
|
|
|
|
IDString = (kindleDatabase[1])['IDString'].decode('hex').encode('ascii')
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# Get the UserName stored when the Kindle Info file was decoded
|
|
|
|
UserName = (kindleDatabase[1])['UserName'].decode('hex').encode('ascii')
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
except KeyError:
|
|
|
|
print u"Keys not found in the database {0}.".format(kindleDatabase[0])
|
|
|
|
return pids
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# Get the ID string used
|
|
|
|
encodedIDString = encodeHash(IDString,charMap1)
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# Get the current user name
|
|
|
|
encodedUsername = encodeHash(UserName,charMap1)
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# concat, hash and encode to calculate the DSN
|
|
|
|
DSN = encode(SHA1(MazamaRandomNumber+encodedIDString+encodedUsername),charMap1)
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# Compute the device PID (for which I can tell, is used for nothing).
|
|
|
|
table = generatePidEncryptionTable()
|
|
|
|
devicePID = generateDevicePID(table,DSN,4)
|
|
|
|
devicePID = checksumPid(devicePID)
|
|
|
|
pids.append(devicePID)
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# Compute book PIDs
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# book pid
|
|
|
|
pidHash = SHA1(DSN+kindleAccountToken+rec209+token)
|
|
|
|
bookPID = encodePID(pidHash)
|
|
|
|
bookPID = checksumPid(bookPID)
|
|
|
|
pids.append(bookPID)
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# variant 1
|
|
|
|
pidHash = SHA1(kindleAccountToken+rec209+token)
|
|
|
|
bookPID = encodePID(pidHash)
|
|
|
|
bookPID = checksumPid(bookPID)
|
|
|
|
pids.append(bookPID)
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# variant 2
|
|
|
|
pidHash = SHA1(DSN+rec209+token)
|
|
|
|
bookPID = encodePID(pidHash)
|
|
|
|
bookPID = checksumPid(bookPID)
|
|
|
|
pids.append(bookPID)
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
return pids
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
def getPidList(md1, md2, serials=[], kDatabases=[]):
|
|
|
|
pidlst = []
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
if kDatabases is None:
|
|
|
|
kDatabases = []
|
|
|
|
if serials is None:
|
|
|
|
serials = []
|
2013-03-20 04:23:54 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
for kDatabase in kDatabases:
|
2012-11-20 06:28:12 -07:00
|
|
|
try:
|
2013-10-02 12:59:40 -06:00
|
|
|
pidlst.extend(getK4Pids(md1, md2, kDatabase))
|
|
|
|
except Exception, e:
|
|
|
|
print u"Error getting PIDs from database {0}: {1}".format(kDatabase[0],e.args[0])
|
|
|
|
traceback.print_exc()
|
2013-04-05 10:44:48 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
for serialnum in serials:
|
|
|
|
try:
|
|
|
|
pidlst.extend(getKindlePids(md1, md2, serialnum))
|
|
|
|
except Exception, e:
|
|
|
|
print u"Error getting PIDs from serial number {0}: {1}".format(serialnum ,e.args[0])
|
|
|
|
traceback.print_exc()
|
2013-03-20 04:23:54 -06:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
return pidlst
|