#!/usr/bin/env python3 import hashlib import hmac import struct import aes from kmsBase import kmsBase from kmsRequestV5 import kmsRequestV5 from structure import Structure class kmsRequestV6(kmsRequestV5): class DecryptedResponse(Structure): class Message(Structure): commonHdr = () structure = ( ('response', ':', kmsBase.kmsResponseStruct), ('keys', '16s'), ('hash', '32s'), ('hwid', '8s'), ('xorSalts', '16s'), ) commonHdr = () structure = ( ('message', ':', Message), ('hmac', '16s'), ) key = bytearray([ 0xA9, 0x4A, 0x41, 0x95, 0xE2, 0x01, 0x43, 0x2D, 0x9B, 0xCB, 0x46, 0x04, 0x05, 0xD8, 0x4A, 0x21 ]) v6 = True ver = 6 def encryptResponse(self, request, decrypted, response): randomSalt = self.getRandomSalt() result = hashlib.sha256(randomSalt).digest() SaltC = bytearray(request['message']['salt'].encode('latin-1')) DSaltC = bytearray(decrypted['salt'].encode('latin-1')) randomStuff = bytearray(16) for i in range(0,16): randomStuff[i] = (SaltC[i] ^ DSaltC[i] ^ randomSalt[i]) & 0xff # XorSalts XorSalts = bytearray(16) for i in range (0, 16): XorSalts[i] = (SaltC[i] ^ DSaltC[i]) & 0xff message = self.DecryptedResponse.Message() message['response'] = response message['keys'] = randomStuff message['hash'] = result message['xorSalts'] = XorSalts message['hwid'] = self.config['hwid'] # SaltS SaltS = self.getRandomSalt() moo = aes.AESModeOfOperation() moo.aes.v6 = True decry = moo.decrypt(SaltS, 16, moo.ModeOfOperation["CBC"], self.key, moo.aes.KeySize["SIZE_128"], SaltS) # DSaltS DSaltS = bytearray(decry) # HMacMsg HMacMsg = bytearray(16) for i in range(0,16): HMacMsg[i] = (SaltS[i] ^ DSaltS[i]) & 0xff HMacMsg.extend(str(message).encode('latin-1')) # HMacKey requestTime = decrypted['request']['requestTime'] HMacKey = self.getMACKey(requestTime) HMac = hmac.new(HMacKey, HMacMsg, hashlib.sha256) digest = HMac.digest() responsedata = self.DecryptedResponse() responsedata['message'] = message responsedata['hmac'] = digest[16:] padded = aes.append_PKCS7_padding(str(responsedata).encode('latin-1')) mode, orig_len, crypted = moo.encrypt(padded, moo.ModeOfOperation["CBC"], self.key, moo.aes.KeySize["SIZE_128"], SaltS) return SaltS.decode('latin-1').encode('latin-1'), crypted def getMACKey(self, t): c1 = 0x00000022816889BD c2 = 0x000000208CBAB5ED c3 = 0x3156CD5AC628477A i1 = (t // c1) & 0xFFFFFFFFFFFFFFFF i2 = (i1 * c2) & 0xFFFFFFFFFFFFFFFF seed = (i2 + c3) & 0xFFFFFFFFFFFFFFFF sha256 = hashlib.sha256() sha256.update(struct.pack("