mirror of
https://github.com/apprenticeharper/DeDRM_tools
synced 2024-12-27 09:58:59 +01:00
a186ae1c5a
With needed prc library mistakenly left off last commit
168 lines
5.1 KiB
Python
168 lines
5.1 KiB
Python
#!/usr/bin/python
|
|
# The Kindleizer v0.2. Copyright (c) 2007, 2009 Igor Skochinsky <skochinsky@mail.ru>
|
|
# This script enables encrypted Mobipocket books to be readable by Kindle
|
|
# History:
|
|
# 0.1 initial release
|
|
# 0.2 fixed corrupted metadata issue (thanks to Mark Peek)
|
|
|
|
import prc, sys, struct
|
|
|
|
if sys.hexversion >= 0x3000000:
|
|
print "This script is incompatible with Python 3.x. Please install Python 2.6.x from python.org"
|
|
sys.exit(2)
|
|
|
|
from binascii import hexlify
|
|
|
|
def strByte(s,off=0):
|
|
return struct.unpack(">B",s[off])[0];
|
|
|
|
def strSWord(s,off=0):
|
|
return struct.unpack(">h",s[off:off+2])[0];
|
|
|
|
def strWord(s,off=0):
|
|
return struct.unpack(">H",s[off:off+2])[0];
|
|
|
|
def strDWord(s,off=0):
|
|
return struct.unpack(">L",s[off:off+4])[0];
|
|
|
|
def strPutDWord(s,off,i):
|
|
return s[:off]+struct.pack(">L",i)+s[off+4:];
|
|
|
|
keyvec1 = "\x72\x38\x33\xB0\xB4\xF2\xE3\xCA\xDF\x09\x01\xD6\xE2\xE0\x3F\x96"
|
|
|
|
#implementation of Pukall Cipher 1
|
|
def PC1(key, src, decryption=True):
|
|
sum1 = 0;
|
|
sum2 = 0;
|
|
keyXorVal = 0;
|
|
if len(key)!=16:
|
|
print "Bad key length!"
|
|
return None
|
|
wkey = []
|
|
for i in xrange(8):
|
|
wkey.append(ord(key[i*2])<<8 | ord(key[i*2+1]))
|
|
|
|
dst = ""
|
|
for i in xrange(len(src)):
|
|
temp1 = 0;
|
|
byteXorVal = 0;
|
|
for j in xrange(8):
|
|
temp1 ^= wkey[j]
|
|
sum2 = (sum2+j)*20021 + sum1
|
|
sum1 = (temp1*346)&0xFFFF
|
|
sum2 = (sum2+sum1)&0xFFFF
|
|
temp1 = (temp1*20021+1)&0xFFFF
|
|
byteXorVal ^= temp1 ^ sum2
|
|
|
|
curByte = ord(src[i])
|
|
if not decryption:
|
|
keyXorVal = curByte * 257;
|
|
curByte = ((curByte ^ (byteXorVal >> 8)) ^ byteXorVal) & 0xFF
|
|
if decryption:
|
|
keyXorVal = curByte * 257;
|
|
for j in xrange(8):
|
|
wkey[j] ^= keyXorVal;
|
|
|
|
dst+=chr(curByte)
|
|
|
|
return dst
|
|
|
|
def find_key(rec0, pid):
|
|
off1 = strDWord(rec0, 0xA8)
|
|
if off1==0xFFFFFFFF or off1==0:
|
|
print "No DRM"
|
|
return None
|
|
size1 = strDWord(rec0, 0xB0)
|
|
cnt = strDWord(rec0, 0xAC)
|
|
flag = strDWord(rec0, 0xB4)
|
|
|
|
temp_key = PC1(keyvec1, pid.ljust(16,'\0'), False)
|
|
cksum = 0
|
|
#print pid, "->", hexlify(temp_key)
|
|
for i in xrange(len(temp_key)):
|
|
cksum += ord(temp_key[i])
|
|
cksum &= 0xFF
|
|
temp_key = temp_key.ljust(16,'\0')
|
|
#print "pid cksum: %02X"%cksum
|
|
|
|
#print "Key records: %02X-%02X, count: %d, flag: %02X"%(off1, off1+size1, cnt, flag)
|
|
iOff = off1
|
|
drm_key = None
|
|
for i in xrange(cnt):
|
|
dwCheck = strDWord(rec0, iOff)
|
|
dwSize = strDWord(rec0, iOff+4)
|
|
dwType = strDWord(rec0, iOff+8)
|
|
nCksum = strByte(rec0, iOff+0xC)
|
|
#print "Key record %d: check=%08X, size=%d, type=%d, cksum=%02X"%(i, dwCheck, dwSize, dwType, nCksum)
|
|
if nCksum==cksum:
|
|
drmInfo = PC1(temp_key, rec0[iOff+0x10:iOff+0x30])
|
|
dw0, dw4, dw18, dw1c = struct.unpack(">II16xII", drmInfo)
|
|
#print "Decrypted drmInfo:", "%08X, %08X, %s, %08X, %08X"%(dw0, dw4, hexlify(drmInfo[0x8:0x18]), dw18, dw1c)
|
|
#print "Decrypted drmInfo:", hexlify(drmInfo)
|
|
if dw0==dwCheck:
|
|
print "Found the matching record; setting the CustomDRM flag for Kindle"
|
|
drmInfo = strPutDWord(drmInfo,4,(dw4|0x800))
|
|
dw0, dw4, dw18, dw1c = struct.unpack(">II16xII", drmInfo)
|
|
#print "Updated drmInfo:", "%08X, %08X, %s, %08X, %08X"%(dw0, dw4, hexlify(drmInfo[0x8:0x18]), dw18, dw1c)
|
|
return rec0[:iOff+0x10] + PC1(temp_key, drmInfo, False) + rec0[iOff+0x30:]
|
|
iOff += dwSize
|
|
return None
|
|
|
|
def replaceext(filename, newext):
|
|
nameparts = filename.split(".")
|
|
if len(nameparts)>1:
|
|
return (".".join(nameparts[:-1]))+newext
|
|
else:
|
|
return nameparts[0]+newext
|
|
|
|
def main(fname, pid):
|
|
if len(pid)==10 and pid[-3]=='*':
|
|
pid = pid[:-2]
|
|
if len(pid)!=8 or pid[-1]!='*':
|
|
print "PID is not valid! (should be in format AAAAAAA*DD)"
|
|
return 3
|
|
db = prc.File(fname)
|
|
#print dir(db)
|
|
if db.getDBInfo()["creator"]!='MOBI':
|
|
print "Not a Mobi file!"
|
|
return 1
|
|
rec0 = db.getRecord(0)[0]
|
|
enc = strSWord(rec0, 0xC)
|
|
print "Encryption:", enc
|
|
if enc!=2:
|
|
print "Unknown encryption type"
|
|
return 1
|
|
|
|
if len(rec0)<0x28 or rec0[0x10:0x14] != 'MOBI':
|
|
print "bad file format"
|
|
return 1
|
|
print "Mobi publication type:", strDWord(rec0, 0x18)
|
|
formatVer = strDWord(rec0, 0x24)
|
|
print "Mobi format version:", formatVer
|
|
last_rec = strWord(rec0, 8)
|
|
dwE0 = 0
|
|
if formatVer>=4:
|
|
new_rec0 = find_key(rec0, pid)
|
|
if new_rec0:
|
|
db.setRecordIdx(0,new_rec0)
|
|
else:
|
|
print "PID doesn't match this file"
|
|
return 2
|
|
else:
|
|
print "Wrong Mobi format version"
|
|
return 1
|
|
|
|
outfname = replaceext(fname, ".azw")
|
|
if outfname==fname:
|
|
outfname = replaceext(fname, "_fixed.azw")
|
|
db.save(outfname)
|
|
print "Output written to "+outfname
|
|
return 0
|
|
|
|
print "The Kindleizer v0.2. Copyright (c) 2007, 2009 Igor Skochinsky"
|
|
if len(sys.argv)<3:
|
|
print "Fixes encrypted Mobipocket books to be readable by Kindle"
|
|
print "Usage: kindlefix.py file.mobi PID"
|
|
else:
|
|
fname = sys.argv[1]
|
|
sys.exit(main(fname, sys.argv[2]))
|