DeDRM_tools/DeDRM_plugin/kfxdedrm.py

113 lines
3.6 KiB
Python
Raw Normal View History

#!/usr/bin/env python3
2018-03-13 06:35:52 +06:00
# -*- coding: utf-8 -*-
# Engine to remove drm from Kindle KFX ebooks
# 2.0 - Python 3 for calibre 5.0
2018-03-13 06:35:52 +06:00
import os
import shutil
import zipfile
from io import BytesIO
try:
from ion import DrmIon, DrmIonVoucher
except:
from calibre_plugins.dedrm.ion import DrmIon, DrmIonVoucher
2018-03-13 06:35:52 +06:00
__license__ = 'GPL v3'
__version__ = '2.0'
2018-03-13 06:35:52 +06:00
class KFXZipBook:
def __init__(self, infile):
self.infile = infile
self.voucher = None
self.decrypted = {}
def getPIDMetaInfo(self):
return (None, None)
def processBook(self, totalpids):
with zipfile.ZipFile(self.infile, 'r') as zf:
for filename in zf.namelist():
with zf.open(filename) as fh:
data = fh.read(8)
2020-11-27 20:01:18 +06:00
if data != b'\xeaDRMION\xee':
continue
data += fh.read()
2018-03-13 06:35:52 +06:00
if self.voucher is None:
self.decrypt_voucher(totalpids)
print("Decrypting KFX DRMION: {0}".format(filename))
outfile = BytesIO()
2020-11-28 09:20:53 +06:00
DrmIon(BytesIO(data[8:-8]), lambda name: self.voucher).parse(outfile)
2018-03-13 06:35:52 +06:00
self.decrypted[filename] = outfile.getvalue()
if not self.decrypted:
print("The .kfx-zip archive does not contain an encrypted DRMION file")
2018-03-13 06:35:52 +06:00
def decrypt_voucher(self, totalpids):
with zipfile.ZipFile(self.infile, 'r') as zf:
for info in zf.infolist():
with zf.open(info.filename) as fh:
data = fh.read(4)
2020-11-27 20:01:18 +06:00
if data != b'\xe0\x01\x00\xea':
continue
data += fh.read()
2020-11-27 20:01:18 +06:00
if b'ProtectedData' in data:
2018-03-13 06:35:52 +06:00
break # found DRM voucher
else:
raise Exception("The .kfx-zip archive contains an encrypted DRMION file without a DRM voucher")
2018-03-13 06:35:52 +06:00
print("Decrypting KFX DRM voucher: {0}".format(info.filename))
2018-03-13 06:35:52 +06:00
for pid in [''] + totalpids:
2019-06-15 01:20:56 +06:00
for dsn_len,secret_len in [(0,0), (16,0), (16,40), (32,40), (40,0), (40,40)]:
2018-03-13 06:35:52 +06:00
if len(pid) == dsn_len + secret_len:
break # split pid into DSN and account secret
else:
continue
try:
2020-11-28 09:20:53 +06:00
voucher = DrmIonVoucher(BytesIO(data), pid[:dsn_len], pid[dsn_len:])
2018-03-13 06:35:52 +06:00
voucher.parse()
voucher.decryptvoucher()
break
except:
pass
else:
raise Exception("Failed to decrypt KFX DRM voucher with any key")
2018-03-13 06:35:52 +06:00
print("KFX DRM voucher successfully decrypted")
2018-03-13 06:35:52 +06:00
license_type = voucher.getlicensetype()
if license_type != "Purchase":
raise Exception(("This book is licensed as {0}. "
2018-03-13 06:35:52 +06:00
'These tools are intended for use on purchased books.').format(license_type))
self.voucher = voucher
def getBookTitle(self):
return os.path.splitext(os.path.split(self.infile)[1])[0]
def getBookExtension(self):
return '.kfx-zip'
def getBookType(self):
return 'KFX-ZIP'
def cleanup(self):
pass
def getFile(self, outpath):
if not self.decrypted:
shutil.copyfile(self.infile, outpath)
else:
with zipfile.ZipFile(self.infile, 'r') as zif:
with zipfile.ZipFile(outpath, 'w') as zof:
for info in zif.infolist():
zof.writestr(info, self.decrypted.get(info.filename, zif.read(info.filename)))