From a82e9da90a3f437557b71f82e6ee1781ee3e6f99 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Matteo=20=E2=84=B1an?= Date: Tue, 14 May 2019 22:03:53 +0200 Subject: [PATCH] Delete kmsRequestV6.py --- py3-kms/kmsRequestV6.py | 105 ---------------------------------------- 1 file changed, 105 deletions(-) delete mode 100644 py3-kms/kmsRequestV6.py diff --git a/py3-kms/kmsRequestV6.py b/py3-kms/kmsRequestV6.py deleted file mode 100644 index 52db4b3..0000000 --- a/py3-kms/kmsRequestV6.py +++ /dev/null @@ -1,105 +0,0 @@ -#!/usr/bin/env python3 - -import hashlib -import hmac -import struct - -import aes -from kmsBase import kmsBase -from kmsRequestV5 import kmsRequestV5 -from structure import Structure - -class kmsRequestV6(kmsRequestV5): - class DecryptedResponse(Structure): - class Message(Structure): - commonHdr = () - structure = ( - ('response', ':', kmsBase.kmsResponseStruct), - ('keys', '16s'), - ('hash', '32s'), - ('hwid', '8s'), - ('xorSalts', '16s'), - ) - - commonHdr = () - structure = ( - ('message', ':', Message), - ('hmac', '16s'), - ) - - key = bytearray([ 0xA9, 0x4A, 0x41, 0x95, 0xE2, 0x01, 0x43, 0x2D, 0x9B, 0xCB, 0x46, 0x04, 0x05, 0xD8, 0x4A, 0x21 ]) - - v6 = True - - ver = 6 - - def encryptResponse(self, request, decrypted, response): - randomSalt = self.getRandomSalt() - result = hashlib.sha256(randomSalt).digest() - - SaltC = bytearray(request['message']['salt'].encode('latin-1')) - DSaltC = bytearray(decrypted['salt'].encode('latin-1')) - - randomStuff = bytearray(16) - for i in range(0,16): - randomStuff[i] = (SaltC[i] ^ DSaltC[i] ^ randomSalt[i]) & 0xff - - # XorSalts - XorSalts = bytearray(16) - for i in range (0, 16): - XorSalts[i] = (SaltC[i] ^ DSaltC[i]) & 0xff - - message = self.DecryptedResponse.Message() - message['response'] = response - message['keys'] = randomStuff - message['hash'] = result - message['xorSalts'] = XorSalts - message['hwid'] = self.config['hwid'] - - # SaltS - SaltS = self.getRandomSalt() - - moo = aes.AESModeOfOperation() - moo.aes.v6 = True - decry = moo.decrypt(SaltS, 16, moo.ModeOfOperation["CBC"], self.key, moo.aes.KeySize["SIZE_128"], SaltS) - - # DSaltS - DSaltS = bytearray(decry) - - # HMacMsg - HMacMsg = bytearray(16) - for i in range(0,16): - HMacMsg[i] = (SaltS[i] ^ DSaltS[i]) & 0xff - HMacMsg.extend(str(message).encode('latin-1')) - - # HMacKey - requestTime = decrypted['request']['requestTime'] - HMacKey = self.getMACKey(requestTime) - HMac = hmac.new(HMacKey, HMacMsg, hashlib.sha256) - digest = HMac.digest() - - responsedata = self.DecryptedResponse() - responsedata['message'] = message - responsedata['hmac'] = digest[16:] - - padded = aes.append_PKCS7_padding(str(responsedata).encode('latin-1')) - mode, orig_len, crypted = moo.encrypt(padded, moo.ModeOfOperation["CBC"], self.key, moo.aes.KeySize["SIZE_128"], SaltS) - - return SaltS.decode('latin-1').encode('latin-1'), crypted - - - def getMACKey(self, t): - c1 = 0x00000022816889BD - c2 = 0x000000208CBAB5ED - c3 = 0x3156CD5AC628477A - - i1 = (t // c1) & 0xFFFFFFFFFFFFFFFF - i2 = (i1 * c2) & 0xFFFFFFFFFFFFFFFF - seed = (i2 + c3) & 0xFFFFFFFFFFFFFFFF - - sha256 = hashlib.sha256() - sha256.update(struct.pack("