2020-09-27 04:54:49 -06:00
|
|
|
#!/usr/bin/env python3
|
2013-01-19 07:50:57 -07:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
2020-09-27 04:54:49 -06:00
|
|
|
# ignoblekeygen.py
|
2020-09-26 14:22:47 -06:00
|
|
|
# Copyright © 2009-2020 i♥cabbages, Apprentice Harper et al.
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
# Released under the terms of the GNU General Public Licence, version 3
|
|
|
|
# <http://www.gnu.org/licenses/>
|
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
# Windows users: Before running this program, you must first install Python.
|
|
|
|
# We recommend ActiveState Python 2.7.X for Windows (x86) from
|
|
|
|
# http://www.activestate.com/activepython/downloads.
|
|
|
|
# You must also install PyCrypto from
|
|
|
|
# http://www.voidspace.org.uk/python/modules.shtml#pycrypto
|
|
|
|
# (make certain to install the version for Python 2.7).
|
|
|
|
# Then save this script file as ignoblekeygen.pyw and double-click on it to run it.
|
2013-01-19 07:50:57 -07:00
|
|
|
#
|
2013-10-02 12:59:40 -06:00
|
|
|
# Mac OS X users: Save this script file as ignoblekeygen.pyw. You can run this
|
|
|
|
# program from the command line (python ignoblekeygen.pyw) or by double-clicking
|
2013-01-19 07:50:57 -07:00
|
|
|
# it when it has been associated with PythonLauncher.
|
|
|
|
|
|
|
|
# Revision history:
|
|
|
|
# 1 - Initial release
|
2013-10-02 12:59:40 -06:00
|
|
|
# 2 - Add OS X support by using OpenSSL when available (taken/modified from ineptepub v5)
|
|
|
|
# 2.1 - Allow Windows versions of libcrypto to be found
|
|
|
|
# 2.2 - On Windows try PyCrypto first and then OpenSSL next
|
|
|
|
# 2.3 - Modify interface to allow use of import
|
|
|
|
# 2.4 - Improvements to UI and now works in plugins
|
|
|
|
# 2.5 - Additional improvement for unicode and plugin support
|
|
|
|
# 2.6 - moved unicode_argv call inside main for Windows DeDRM compatibility
|
|
|
|
# 2.7 - Work if TkInter is missing
|
2015-08-02 04:09:35 -06:00
|
|
|
# 2.8 - Fix bug in stand-alone use (import tkFileDialog)
|
2020-09-26 14:22:47 -06:00
|
|
|
# 3.0 - Added Python 3 compatibility for calibre 5.0
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
"""
|
2013-10-02 12:59:40 -06:00
|
|
|
Generate Barnes & Noble EPUB user key from name and credit card number.
|
2013-01-19 07:50:57 -07:00
|
|
|
"""
|
|
|
|
|
|
|
|
__license__ = 'GPL v3'
|
2020-09-26 14:22:47 -06:00
|
|
|
__version__ = "3.0"
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
import sys
|
|
|
|
import os
|
2013-10-02 12:59:40 -06:00
|
|
|
import hashlib
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
# Wrap a stream so that output gets flushed immediately
|
|
|
|
# and also make sure that any unicode strings get
|
|
|
|
# encoded using "replace" before writing them.
|
|
|
|
class SafeUnbuffered:
|
|
|
|
def __init__(self, stream):
|
|
|
|
self.stream = stream
|
|
|
|
self.encoding = stream.encoding
|
|
|
|
if self.encoding == None:
|
|
|
|
self.encoding = "utf-8"
|
|
|
|
def write(self, data):
|
2020-09-26 14:22:47 -06:00
|
|
|
if isinstance(data,bytes):
|
2013-01-19 07:50:57 -07:00
|
|
|
data = data.encode(self.encoding,"replace")
|
|
|
|
self.stream.write(data)
|
|
|
|
self.stream.flush()
|
|
|
|
def __getattr__(self, attr):
|
|
|
|
return getattr(self.stream, attr)
|
|
|
|
|
2013-03-20 04:23:54 -06:00
|
|
|
try:
|
|
|
|
from calibre.constants import iswindows, isosx
|
|
|
|
except:
|
|
|
|
iswindows = sys.platform.startswith('win')
|
|
|
|
isosx = sys.platform.startswith('darwin')
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
def unicode_argv():
|
|
|
|
if iswindows:
|
|
|
|
# Uses shell32.GetCommandLineArgvW to get sys.argv as a list of Unicode
|
|
|
|
# strings.
|
|
|
|
|
|
|
|
# Versions 2.x of Python don't support Unicode in sys.argv on
|
|
|
|
# Windows, with the underlying Windows API instead replacing multi-byte
|
2013-10-02 12:59:40 -06:00
|
|
|
# characters with '?'. So use shell32.GetCommandLineArgvW to get sys.argv
|
|
|
|
# as a list of Unicode strings and encode them as utf-8
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
from ctypes import POINTER, byref, cdll, c_int, windll
|
|
|
|
from ctypes.wintypes import LPCWSTR, LPWSTR
|
|
|
|
|
|
|
|
GetCommandLineW = cdll.kernel32.GetCommandLineW
|
|
|
|
GetCommandLineW.argtypes = []
|
|
|
|
GetCommandLineW.restype = LPCWSTR
|
|
|
|
|
|
|
|
CommandLineToArgvW = windll.shell32.CommandLineToArgvW
|
|
|
|
CommandLineToArgvW.argtypes = [LPCWSTR, POINTER(c_int)]
|
|
|
|
CommandLineToArgvW.restype = POINTER(LPWSTR)
|
|
|
|
|
|
|
|
cmd = GetCommandLineW()
|
|
|
|
argc = c_int(0)
|
|
|
|
argv = CommandLineToArgvW(cmd, byref(argc))
|
|
|
|
if argc.value > 0:
|
|
|
|
# Remove Python executable and commands if present
|
|
|
|
start = argc.value - len(sys.argv)
|
|
|
|
return [argv[i] for i in
|
2020-09-26 14:22:47 -06:00
|
|
|
range(start, argc.value)]
|
2013-10-02 12:59:40 -06:00
|
|
|
# if we don't have any arguments at all, just pass back script name
|
|
|
|
# this should never happen
|
2020-09-27 04:54:49 -06:00
|
|
|
return ["ignoblekeygen.py"]
|
2013-01-19 07:50:57 -07:00
|
|
|
else:
|
|
|
|
argvencoding = sys.stdin.encoding
|
|
|
|
if argvencoding == None:
|
|
|
|
argvencoding = "utf-8"
|
2020-09-26 14:22:47 -06:00
|
|
|
return argv
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
class IGNOBLEError(Exception):
|
2013-01-19 07:50:57 -07:00
|
|
|
pass
|
|
|
|
|
|
|
|
def _load_crypto_libcrypto():
|
|
|
|
from ctypes import CDLL, POINTER, c_void_p, c_char_p, c_int, c_long, \
|
|
|
|
Structure, c_ulong, create_string_buffer, cast
|
|
|
|
from ctypes.util import find_library
|
|
|
|
|
|
|
|
if iswindows:
|
|
|
|
libcrypto = find_library('libeay32')
|
|
|
|
else:
|
|
|
|
libcrypto = find_library('crypto')
|
|
|
|
|
|
|
|
if libcrypto is None:
|
2013-10-02 12:59:40 -06:00
|
|
|
raise IGNOBLEError('libcrypto not found')
|
2013-01-19 07:50:57 -07:00
|
|
|
libcrypto = CDLL(libcrypto)
|
|
|
|
|
|
|
|
AES_MAXNR = 14
|
|
|
|
|
|
|
|
c_char_pp = POINTER(c_char_p)
|
|
|
|
c_int_p = POINTER(c_int)
|
|
|
|
|
|
|
|
class AES_KEY(Structure):
|
|
|
|
_fields_ = [('rd_key', c_long * (4 * (AES_MAXNR + 1))),
|
|
|
|
('rounds', c_int)]
|
|
|
|
AES_KEY_p = POINTER(AES_KEY)
|
|
|
|
|
|
|
|
def F(restype, name, argtypes):
|
|
|
|
func = getattr(libcrypto, name)
|
|
|
|
func.restype = restype
|
|
|
|
func.argtypes = argtypes
|
|
|
|
return func
|
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
AES_set_encrypt_key = F(c_int, 'AES_set_encrypt_key',
|
2013-01-19 07:50:57 -07:00
|
|
|
[c_char_p, c_int, AES_KEY_p])
|
|
|
|
AES_cbc_encrypt = F(None, 'AES_cbc_encrypt',
|
|
|
|
[c_char_p, c_char_p, c_ulong, AES_KEY_p, c_char_p,
|
|
|
|
c_int])
|
|
|
|
|
|
|
|
class AES(object):
|
2013-10-02 12:59:40 -06:00
|
|
|
def __init__(self, userkey, iv):
|
2013-01-19 07:50:57 -07:00
|
|
|
self._blocksize = len(userkey)
|
2013-10-02 12:59:40 -06:00
|
|
|
self._iv = iv
|
2013-01-19 07:50:57 -07:00
|
|
|
key = self._key = AES_KEY()
|
2013-10-02 12:59:40 -06:00
|
|
|
rv = AES_set_encrypt_key(userkey, len(userkey) * 8, key)
|
2013-01-19 07:50:57 -07:00
|
|
|
if rv < 0:
|
2013-10-02 12:59:40 -06:00
|
|
|
raise IGNOBLEError('Failed to initialize AES Encrypt key')
|
2013-01-19 07:50:57 -07:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
def encrypt(self, data):
|
2013-01-19 07:50:57 -07:00
|
|
|
out = create_string_buffer(len(data))
|
2013-10-02 12:59:40 -06:00
|
|
|
rv = AES_cbc_encrypt(data, out, len(data), self._key, self._iv, 1)
|
2013-01-19 07:50:57 -07:00
|
|
|
if rv == 0:
|
2013-10-02 12:59:40 -06:00
|
|
|
raise IGNOBLEError('AES encryption failed')
|
2013-01-19 07:50:57 -07:00
|
|
|
return out.raw
|
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
return AES
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
def _load_crypto_pycrypto():
|
|
|
|
from Crypto.Cipher import AES as _AES
|
|
|
|
|
|
|
|
class AES(object):
|
2013-10-02 12:59:40 -06:00
|
|
|
def __init__(self, key, iv):
|
|
|
|
self._aes = _AES.new(key, _AES.MODE_CBC, iv)
|
2013-01-19 07:50:57 -07:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
def encrypt(self, data):
|
|
|
|
return self._aes.encrypt(data)
|
2013-01-19 07:50:57 -07:00
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
return AES
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
def _load_crypto():
|
2013-10-02 12:59:40 -06:00
|
|
|
AES = None
|
2013-01-19 07:50:57 -07:00
|
|
|
cryptolist = (_load_crypto_libcrypto, _load_crypto_pycrypto)
|
|
|
|
if sys.platform.startswith('win'):
|
|
|
|
cryptolist = (_load_crypto_pycrypto, _load_crypto_libcrypto)
|
|
|
|
for loader in cryptolist:
|
|
|
|
try:
|
2013-10-02 12:59:40 -06:00
|
|
|
AES = loader()
|
2013-01-19 07:50:57 -07:00
|
|
|
break
|
2013-10-02 12:59:40 -06:00
|
|
|
except (ImportError, IGNOBLEError):
|
2013-01-19 07:50:57 -07:00
|
|
|
pass
|
2013-10-02 12:59:40 -06:00
|
|
|
return AES
|
|
|
|
|
|
|
|
AES = _load_crypto()
|
|
|
|
|
|
|
|
def normalize_name(name):
|
|
|
|
return ''.join(x for x in name.lower() if x != ' ')
|
|
|
|
|
|
|
|
|
|
|
|
def generate_key(name, ccn):
|
|
|
|
# remove spaces and case from name and CC numbers.
|
2020-09-26 14:22:47 -06:00
|
|
|
if type(name)==bytes:
|
2013-10-02 12:59:40 -06:00
|
|
|
name = name.encode('utf-8')
|
2020-09-26 14:22:47 -06:00
|
|
|
if type(ccn)==bytes:
|
2013-10-02 12:59:40 -06:00
|
|
|
ccn = ccn.encode('utf-8')
|
|
|
|
|
|
|
|
name = normalize_name(name) + '\x00'
|
|
|
|
ccn = normalize_name(ccn) + '\x00'
|
|
|
|
|
|
|
|
name_sha = hashlib.sha1(name).digest()[:16]
|
|
|
|
ccn_sha = hashlib.sha1(ccn).digest()[:16]
|
|
|
|
both_sha = hashlib.sha1(name + ccn).digest()
|
|
|
|
aes = AES(ccn_sha, name_sha)
|
|
|
|
crypt = aes.encrypt(both_sha + ('\x0c' * 0x0c))
|
|
|
|
userkey = hashlib.sha1(crypt).digest()
|
|
|
|
return userkey.encode('base64')
|
|
|
|
|
|
|
|
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
|
2013-03-26 10:38:18 -06:00
|
|
|
def cli_main():
|
2013-04-05 10:44:48 -06:00
|
|
|
sys.stdout=SafeUnbuffered(sys.stdout)
|
|
|
|
sys.stderr=SafeUnbuffered(sys.stderr)
|
2013-03-26 10:38:18 -06:00
|
|
|
argv=unicode_argv()
|
2013-01-19 07:50:57 -07:00
|
|
|
progname = os.path.basename(argv[0])
|
2013-10-02 12:59:40 -06:00
|
|
|
if AES is None:
|
2019-06-24 10:49:38 -06:00
|
|
|
print("%s: This script requires OpenSSL or PyCrypto, which must be installed " \
|
2013-10-02 12:59:40 -06:00
|
|
|
"separately. Read the top-of-script comment for details." % \
|
2019-06-24 10:49:38 -06:00
|
|
|
(progname,))
|
2013-10-02 12:59:40 -06:00
|
|
|
return 1
|
2013-01-19 07:50:57 -07:00
|
|
|
if len(argv) != 4:
|
2020-09-27 04:54:49 -06:00
|
|
|
print("usage: {0} <Name> <CC#> <keyfileout.b64>".format(progname))
|
2013-01-19 07:50:57 -07:00
|
|
|
return 1
|
2013-10-02 12:59:40 -06:00
|
|
|
name, ccn, keypath = argv[1:]
|
|
|
|
userkey = generate_key(name, ccn)
|
|
|
|
open(keypath,'wb').write(userkey)
|
|
|
|
return 0
|
|
|
|
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
def gui_main():
|
2013-04-05 10:44:48 -06:00
|
|
|
try:
|
|
|
|
import Tkinter
|
|
|
|
import Tkconstants
|
|
|
|
import tkMessageBox
|
2015-08-02 04:09:35 -06:00
|
|
|
import tkFileDialog
|
2013-04-05 10:44:48 -06:00
|
|
|
import traceback
|
|
|
|
except:
|
|
|
|
return cli_main()
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
class DecryptionDialog(Tkinter.Frame):
|
|
|
|
def __init__(self, root):
|
|
|
|
Tkinter.Frame.__init__(self, root, border=5)
|
2020-09-27 04:54:49 -06:00
|
|
|
self.status = Tkinter.Label(self, text="Enter parameters")
|
2013-01-19 07:50:57 -07:00
|
|
|
self.status.pack(fill=Tkconstants.X, expand=1)
|
|
|
|
body = Tkinter.Frame(self)
|
|
|
|
body.pack(fill=Tkconstants.X, expand=1)
|
|
|
|
sticky = Tkconstants.E + Tkconstants.W
|
|
|
|
body.grid_columnconfigure(1, weight=2)
|
2020-09-27 04:54:49 -06:00
|
|
|
Tkinter.Label(body, text="Account Name").grid(row=0)
|
2013-10-02 12:59:40 -06:00
|
|
|
self.name = Tkinter.Entry(body, width=40)
|
|
|
|
self.name.grid(row=0, column=1, sticky=sticky)
|
2020-09-27 04:54:49 -06:00
|
|
|
Tkinter.Label(body, text="CC#").grid(row=1)
|
2013-10-02 12:59:40 -06:00
|
|
|
self.ccn = Tkinter.Entry(body, width=40)
|
|
|
|
self.ccn.grid(row=1, column=1, sticky=sticky)
|
2020-09-27 04:54:49 -06:00
|
|
|
Tkinter.Label(body, text="Output file").grid(row=2)
|
2013-10-02 12:59:40 -06:00
|
|
|
self.keypath = Tkinter.Entry(body, width=40)
|
|
|
|
self.keypath.grid(row=2, column=1, sticky=sticky)
|
2020-09-27 04:54:49 -06:00
|
|
|
self.keypath.insert(2, "bnepubkey.b64")
|
|
|
|
button = Tkinter.Button(body, text="...", command=self.get_keypath)
|
2013-01-19 07:50:57 -07:00
|
|
|
button.grid(row=2, column=2)
|
|
|
|
buttons = Tkinter.Frame(self)
|
|
|
|
buttons.pack()
|
|
|
|
botton = Tkinter.Button(
|
2020-09-27 04:54:49 -06:00
|
|
|
buttons, text="Generate", width=10, command=self.generate)
|
2013-01-19 07:50:57 -07:00
|
|
|
botton.pack(side=Tkconstants.LEFT)
|
|
|
|
Tkinter.Frame(buttons, width=10).pack(side=Tkconstants.LEFT)
|
|
|
|
button = Tkinter.Button(
|
2020-09-27 04:54:49 -06:00
|
|
|
buttons, text="Quit", width=10, command=self.quit)
|
2013-01-19 07:50:57 -07:00
|
|
|
button.pack(side=Tkconstants.RIGHT)
|
|
|
|
|
|
|
|
def get_keypath(self):
|
2013-10-02 12:59:40 -06:00
|
|
|
keypath = tkFileDialog.asksaveasfilename(
|
2020-09-27 04:54:49 -06:00
|
|
|
parent=None, title="Select B&N ePub key file to produce",
|
|
|
|
defaultextension=".b64",
|
2013-10-02 12:59:40 -06:00
|
|
|
filetypes=[('base64-encoded files', '.b64'),
|
2013-01-19 07:50:57 -07:00
|
|
|
('All Files', '.*')])
|
|
|
|
if keypath:
|
|
|
|
keypath = os.path.normpath(keypath)
|
|
|
|
self.keypath.delete(0, Tkconstants.END)
|
|
|
|
self.keypath.insert(0, keypath)
|
|
|
|
return
|
|
|
|
|
2013-10-02 12:59:40 -06:00
|
|
|
def generate(self):
|
|
|
|
name = self.name.get()
|
|
|
|
ccn = self.ccn.get()
|
2013-01-19 07:50:57 -07:00
|
|
|
keypath = self.keypath.get()
|
2013-10-02 12:59:40 -06:00
|
|
|
if not name:
|
2020-09-27 04:54:49 -06:00
|
|
|
self.status['text'] = "Name not specified"
|
2013-01-19 07:50:57 -07:00
|
|
|
return
|
2013-10-02 12:59:40 -06:00
|
|
|
if not ccn:
|
2020-09-27 04:54:49 -06:00
|
|
|
self.status['text'] = "Credit card number not specified"
|
2013-01-19 07:50:57 -07:00
|
|
|
return
|
2013-10-02 12:59:40 -06:00
|
|
|
if not keypath:
|
2020-09-27 04:54:49 -06:00
|
|
|
self.status['text'] = "Output keyfile path not specified"
|
2013-01-19 07:50:57 -07:00
|
|
|
return
|
2020-09-27 04:54:49 -06:00
|
|
|
self.status['text'] = "Generating..."
|
2013-01-19 07:50:57 -07:00
|
|
|
try:
|
2013-10-02 12:59:40 -06:00
|
|
|
userkey = generate_key(name, ccn)
|
2020-09-26 14:22:47 -06:00
|
|
|
except Exception as e:
|
2020-09-27 04:54:49 -06:00
|
|
|
self.status['text'] = "Error: (0}".format(e.args[0])
|
2013-01-19 07:50:57 -07:00
|
|
|
return
|
2013-10-02 12:59:40 -06:00
|
|
|
open(keypath,'wb').write(userkey)
|
2020-09-27 04:54:49 -06:00
|
|
|
self.status['text'] = "Keyfile successfully generated"
|
2013-01-19 07:50:57 -07:00
|
|
|
|
|
|
|
root = Tkinter.Tk()
|
2013-10-02 12:59:40 -06:00
|
|
|
if AES is None:
|
|
|
|
root.withdraw()
|
|
|
|
tkMessageBox.showerror(
|
|
|
|
"Ignoble EPUB Keyfile Generator",
|
|
|
|
"This script requires OpenSSL or PyCrypto, which must be installed "
|
|
|
|
"separately. Read the top-of-script comment for details.")
|
|
|
|
return 1
|
2020-09-27 04:54:49 -06:00
|
|
|
root.title("Barnes & Noble ePub Keyfile Generator v.{0}".format(__version__))
|
2013-01-19 07:50:57 -07:00
|
|
|
root.resizable(True, False)
|
|
|
|
root.minsize(300, 0)
|
|
|
|
DecryptionDialog(root).pack(fill=Tkconstants.X, expand=1)
|
|
|
|
root.mainloop()
|
|
|
|
return 0
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
if len(sys.argv) > 1:
|
|
|
|
sys.exit(cli_main())
|
|
|
|
sys.exit(gui_main())
|