Last active
June 4, 2024 04:33
-
-
Save luckylittle/4d8a9fc425d5b943c504c37a09c203f2 to your computer and use it in GitHub Desktop.
Patched k4mobidedrm/kfxdedrm
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# k4mobidedrm.py | |
# Copyright © 2008-2020 by Apprentice Harper et al. | |
__license__ = 'GPL v3' | |
__version__ = '6.0' | |
# Engine to remove drm from Kindle and Mobipocket ebooks | |
# for personal use for archiving and converting your ebooks | |
# PLEASE DO NOT PIRATE EBOOKS! | |
# We want all authors and publishers, and ebook stores to live | |
# long and prosperous lives but at the same time we just want to | |
# be able to read OUR books on whatever device we want and to keep | |
# readable for a long, long time | |
# This borrows very heavily from works by CMBDTC, IHeartCabbages, skindle, | |
# unswindle, DarkReverser, ApprenticeAlf, and many many others | |
# Special thanks to The Dark Reverser for MobiDeDrm and CMBDTC for cmbdtc_dump | |
# from which this script borrows most unashamedly. | |
# Changelog | |
# 1.0 - Name change to k4mobidedrm. Adds Mac support, Adds plugin code | |
# 1.1 - Adds support for additional kindle.info files | |
# 1.2 - Better error handling for older Mobipocket | |
# 1.3 - Don't try to decrypt Topaz books | |
# 1.7 - Add support for Topaz books and Kindle serial numbers. Split code. | |
# 1.9 - Tidy up after Topaz, minor exception changes | |
# 2.1 - Topaz fix and filename sanitizing | |
# 2.2 - Topaz Fix and minor Mac code fix | |
# 2.3 - More Topaz fixes | |
# 2.4 - K4PC/Mac key generation fix | |
# 2.6 - Better handling of non-K4PC/Mac ebooks | |
# 2.7 - Better trailing bytes handling in mobidedrm | |
# 2.8 - Moved parsing of kindle.info files to mac & pc util files. | |
# 3.1 - Updated for new calibre interface. Now __init__ in plugin. | |
# 3.5 - Now support Kindle for PC/Mac 1.6 | |
# 3.6 - Even better trailing bytes handling in mobidedrm | |
# 3.7 - Add support for Amazon Print Replica ebooks. | |
# 3.8 - Improved Topaz support | |
# 4.1 - Improved Topaz support and faster decryption with alfcrypto | |
# 4.2 - Added support for Amazon's KF8 format ebooks | |
# 4.4 - Linux calls to Wine added, and improved configuration dialog | |
# 4.5 - Linux works again without Wine. Some Mac key file search changes | |
# 4.6 - First attempt to handle unicode properly | |
# 4.7 - Added timing reports, and changed search for Mac key files | |
# 4.8 - Much better unicode handling, matching the updated inept and ignoble scripts | |
# - Moved back into plugin, __init__ in plugin now only contains plugin code. | |
# 4.9 - Missed some invalid characters in cleanup_name | |
# 5.0 - Extraction of info from Kindle for PC/Mac moved into kindlekey.py | |
# - tweaked GetDecryptedBook interface to leave passed parameters unchanged | |
# 5.1 - moved unicode_argv call inside main for Windows DeDRM compatibility | |
# 5.2 - Fixed error in command line processing of unicode arguments | |
# 5.3 - Changed Android support to allow passing of backup .ab files | |
# 5.4 - Recognise KFX files masquerading as azw, even if we can't decrypt them yet. | |
# 5.5 - Added GPL v3 licence explicitly. | |
# 5.6 - Invoke KFXZipBook to handle zipped KFX files | |
# 5.7 - Revamp cleanup_name | |
# 6.0 - Added Python 3 compatibility for calibre 5.0 | |
import sys, os, re | |
import csv | |
import getopt | |
import re | |
import traceback | |
import time | |
try: | |
import html.entities as htmlentitydefs | |
except: | |
import htmlentitydefs | |
import json | |
#@@CALIBRE_COMPAT_CODE_START@@ | |
import sys, os | |
# Explicitly allow importing everything ... | |
if os.path.dirname(os.path.dirname(os.path.abspath(__file__))) not in sys.path: | |
sys.path.insert(0, os.path.dirname(os.path.dirname(os.path.abspath(__file__)))) | |
if os.path.dirname(os.path.abspath(__file__)) not in sys.path: | |
sys.path.insert(0, os.path.dirname(os.path.abspath(__file__))) | |
# Bugfix for Calibre < 5: | |
if "calibre" in sys.modules and sys.version_info[0] == 2: | |
from calibre.utils.config import config_dir | |
if os.path.join(config_dir, "plugins", "DeDRM.zip") not in sys.path: | |
sys.path.insert(0, os.path.join(config_dir, "plugins", "DeDRM.zip")) | |
# Explicitly set the package identifier so we are allowed to import stuff ... | |
#__package__ = "DeDRM_plugin" | |
#@@CALIBRE_COMPAT_CODE_END@@ | |
class DrmException(Exception): | |
pass | |
import mobidedrm | |
import topazextract | |
import kgenpids | |
import androidkindlekey | |
import kfxdedrm | |
from utilities import SafeUnbuffered | |
from argv_utils import unicode_argv | |
# cleanup unicode filenames | |
# borrowed from calibre from calibre/src/calibre/__init__.py | |
# added in removal of control (<32) chars | |
# and removal of . at start and end | |
# and with some (heavily edited) code from Paul Durrant's kindlenamer.py | |
# and some improvements suggested by jhaisley | |
def cleanup_name(name): | |
# substitute filename unfriendly characters | |
name = name.replace("<","[").replace(">","]").replace(" : "," – ").replace(": "," – ").replace(":","—").replace("/","_").replace("\\","_").replace("|","_").replace("\"","\'").replace("*","_").replace("?","") | |
# white space to single space, delete leading and trailing while space | |
name = re.sub(r"\s", " ", name).strip() | |
# delete control characters | |
name = "".join(char for char in name if ord(char)>=32) | |
# delete non-ascii characters | |
name = "".join(char for char in name if ord(char)<=126) | |
# remove leading dots | |
while len(name)>0 and name[0] == ".": | |
name = name[1:] | |
# remove trailing dots (Windows doesn't like them) | |
while name.endswith("."): | |
name = name[:-1] | |
if len(name)==0: | |
name="DecryptedBook" | |
return name | |
# must be passed unicode | |
def unescape(text): | |
def fixup(m): | |
text = m.group(0) | |
if text[:2] == "&#": | |
# character reference | |
try: | |
if text[:3] == "&#x": | |
return chr(int(text[3:-1], 16)) | |
else: | |
return chr(int(text[2:-1])) | |
except ValueError: | |
pass | |
else: | |
# named entity | |
try: | |
text = chr(htmlentitydefs.name2codepoint[text[1:-1]]) | |
except KeyError: | |
pass | |
return text # leave as is | |
return re.sub("&#?\\w+;", fixup, text) | |
def GetDecryptedBook(infile, kDatabases, androidFiles, serials, pids, starttime = time.time()): | |
# handle the obvious cases at the beginning | |
if not os.path.isfile(infile): | |
raise DrmException("Input file does not exist.") | |
mobi = True | |
unzipd = False | |
magic8 = open(infile,'rb').read(8) | |
if magic8 == b'\xeaDRMION\xee': | |
## raise DrmException("The .kfx DRMION file cannot be decrypted by itself. A .kfx-zip archive containing a DRM voucher is required.") | |
unzipd = True | |
else: | |
magic3 = magic8[:3] | |
if magic3 == b'TPZ': | |
mobi = False | |
if unzipd: | |
mb = kfxdedrm.KFXZipBook(infile, False) | |
elif magic8[:4] == b'PK\x03\x04': | |
mb = kfxdedrm.KFXZipBook(infile, True) | |
elif mobi: | |
mb = mobidedrm.MobiBook(infile) | |
else: | |
mb = topazextract.TopazBook(infile) | |
try: | |
bookname = unescape(mb.getBookTitle()) | |
print("Decrypting {1} ebook: {0}".format(bookname, mb.getBookType())) | |
except: | |
print("Decrypting {0} ebook.".format(mb.getBookType())) | |
# copy list of pids | |
totalpids = list(pids) | |
# extend list of serials with serials from android databases | |
for aFile in androidFiles: | |
serials.extend(androidkindlekey.get_serials(aFile)) | |
# extend PID list with book-specific PIDs from seriala and kDatabases | |
md1, md2 = mb.getPIDMetaInfo() | |
totalpids.extend(kgenpids.getPidList(md1, md2, serials, kDatabases)) | |
# remove any duplicates | |
totalpids = list(set(totalpids)) | |
print("Found {1:d} keys to try after {0:.1f} seconds".format(time.time()-starttime, len(totalpids))) | |
#print totalpids | |
try: | |
mb.processBook(totalpids) | |
except: | |
mb.cleanup() | |
raise | |
print("Decryption succeeded after {0:.1f} seconds".format(time.time()-starttime)) | |
return mb | |
# kDatabaseFiles is a list of files created by kindlekey | |
def decryptBook(infile, outdir, kDatabaseFiles, androidFiles, serials, pids): | |
starttime = time.time() | |
kDatabases = [] | |
for dbfile in kDatabaseFiles: | |
kindleDatabase = {} | |
try: | |
with open(dbfile, 'r') as keyfilein: | |
kindleDatabase = json.loads(keyfilein.read()) | |
kDatabases.append([dbfile,kindleDatabase]) | |
except Exception as e: | |
print("Error getting database from file {0:s}: {1:s}".format(dbfile,e)) | |
traceback.print_exc() | |
try: | |
book = GetDecryptedBook(infile, kDatabases, androidFiles, serials, pids, starttime) | |
except Exception as e: | |
print("Error decrypting book after {1:.1f} seconds: {0}".format(e.args[0],time.time()-starttime)) | |
traceback.print_exc() | |
return 1 | |
# Try to infer a reasonable name | |
orig_fn_root = os.path.splitext(os.path.basename(infile))[0] | |
if ( | |
re.match('^B[A-Z0-9]{9}(_EBOK|_EBSP|_sample)?$', orig_fn_root) or | |
re.match('^[0-9A-F-]{36}$', orig_fn_root) | |
): # Kindle for PC / Mac / Android / Fire / iOS | |
clean_title = cleanup_name(book.getBookTitle()) | |
outfilename = "{}_{}".format(orig_fn_root, clean_title) | |
else: # E Ink Kindle, which already uses a reasonable name | |
outfilename = orig_fn_root | |
# avoid excessively long file names | |
if len(outfilename)>150: | |
outfilename = outfilename[:99]+"--"+outfilename[-49:] | |
outfilename = outfilename+"_nodrm" | |
outfile = os.path.join(outdir, outfilename + book.getBookExtension()) | |
book.getFile(outfile) | |
print("Saved decrypted book {1:s} after {0:.1f} seconds".format(time.time()-starttime, outfilename)) | |
if book.getBookType()=="Topaz": | |
zipname = os.path.join(outdir, outfilename + "_SVG.zip") | |
book.getSVGZip(zipname) | |
print("Saved SVG ZIP Archive for {1:s} after {0:.1f} seconds".format(time.time()-starttime, outfilename)) | |
# remove internal temporary directory of Topaz pieces | |
book.cleanup() | |
return 0 | |
def usage(progname): | |
print("Removes DRM protection from Mobipocket, Amazon KF8, Amazon Print Replica and Amazon Topaz ebooks") | |
print("Usage:") | |
print(" {0} [-k <kindle.k4i>] [-p <comma separated PIDs>] [-s <comma separated Kindle serial numbers>] [ -a <AmazonSecureStorage.xml|backup.ab> ] <infile> <outdir>".format(progname)) | |
# | |
# Main | |
# | |
def cli_main(): | |
argv=unicode_argv("k4mobidedrm.py") | |
progname = os.path.basename(argv[0]) | |
print("K4MobiDeDrm v{0}.\nCopyright © 2008-2020 Apprentice Harper et al.".format(__version__)) | |
try: | |
opts, args = getopt.getopt(argv[1:], "k:p:s:a:h") | |
except getopt.GetoptError as err: | |
print("Error in options or arguments: {0}".format(err.args[0])) | |
usage(progname) | |
sys.exit(2) | |
if len(args)<2: | |
usage(progname) | |
sys.exit(2) | |
infile = args[0] | |
outdir = args[1] | |
kDatabaseFiles = [] | |
androidFiles = [] | |
serials = [] | |
pids = [] | |
for o, a in opts: | |
if o == "-h": | |
usage(progname) | |
sys.exit(0) | |
if o == "-k": | |
if a == None : | |
raise DrmException("Invalid parameter for -k") | |
kDatabaseFiles.append(a) | |
if o == "-p": | |
if a == None : | |
raise DrmException("Invalid parameter for -p") | |
pids = a.encode('utf-8').split(b',') | |
if o == "-s": | |
if a == None : | |
raise DrmException("Invalid parameter for -s") | |
serials = a.split(',') | |
if o == '-a': | |
if a == None: | |
raise DrmException("Invalid parameter for -a") | |
androidFiles.append(a) | |
return decryptBook(infile, outdir, kDatabaseFiles, androidFiles, serials, pids) | |
if __name__ == '__main__': | |
sys.stdout=SafeUnbuffered(sys.stdout) | |
sys.stderr=SafeUnbuffered(sys.stderr) | |
sys.exit(cli_main()) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# Engine to remove drm from Kindle KFX ebooks | |
# 2.0 - Python 3 for calibre 5.0 | |
# 2.1 - Some fixes for debugging | |
# 2.1.1 - Whitespace! | |
import os | |
import shutil | |
import traceback | |
import zipfile | |
from io import BytesIO | |
try: | |
from ion import DrmIon, DrmIonVoucher | |
except: | |
from calibre_plugins.dedrm.ion import DrmIon, DrmIonVoucher | |
__license__ = 'GPL v3' | |
__version__ = '2.0' | |
class KFXZipBook: | |
def __init__(self, infile, zipd): | |
self.infile = infile | |
self.zipd = zipd | |
self.voucher = None | |
self.decrypted = {} | |
def getPIDMetaInfo(self): | |
return (None, None) | |
def processBook(self, totalpids): | |
if not self.zipd: | |
with open(self.infile, 'rb') as book: | |
data = book.read() | |
if self.voucher is None: | |
self.decrypt_voucher(totalpids) | |
print("Decrypting KFX DRMION: {0}".format(self.infile)) | |
fname = os.path.basename(self.infile) | |
outfile = BytesIO() | |
DrmIon(BytesIO(data[8:-8]), lambda name: self.voucher).parse(outfile) | |
self.decrypted[fname] = outfile.getvalue() | |
else: | |
with zipfile.ZipFile(self.infile, 'r') as zf: | |
for filename in zf.namelist(): | |
with zf.open(filename) as fh: | |
data = fh.read(8) | |
if data != b'\xeaDRMION\xee': | |
continue | |
data += fh.read() | |
if self.voucher is None: | |
self.decrypt_voucher(totalpids) | |
print("Decrypting KFX DRMION: {0}".format(filename)) | |
outfile = BytesIO() | |
DrmIon(BytesIO(data[8:-8]), lambda name: self.voucher).parse(outfile) | |
self.decrypted[filename] = outfile.getvalue() | |
if not self.decrypted: | |
print("The .kfx-zip archive does not contain an encrypted DRMION file") | |
def decrypt_voucher(self, totalpids): | |
filename = '' | |
if not self.zipd: | |
import fnmatch | |
dname = os.path.dirname(self.infile) | |
for file in os.listdir(dname): | |
if fnmatch.fnmatch(file, '*.voucher'): | |
filename = file | |
if filename is None: | |
raise Exception('Cannot find voucher file in ' + dname) | |
with open(os.path.join(dname, filename), "rb") as fh: | |
data = fh.read() | |
else: | |
with zipfile.ZipFile(self.infile, 'r') as zf: | |
for info in zf.infolist(): | |
with zf.open(info.filename) as fh: | |
data = fh.read(4) | |
if data != b'\xe0\x01\x00\xea': | |
continue | |
data += fh.read() | |
filename = info.filename | |
if b'ProtectedData' in data: | |
break # found DRM voucher | |
else: | |
raise Exception("The .kfx-zip archive contains an encrypted DRMION file without a DRM voucher") | |
print("Decrypting KFX DRM voucher: {0}".format(filename)) | |
for pid in [''] + totalpids: | |
# Belt and braces. PIDs should be unicode strings, but just in case... | |
if isinstance(pid, bytes): | |
pid = pid.decode('ascii') | |
for dsn_len,secret_len in [(0,0), (16,0), (16,40), (32,40), (40,0), (40,40)]: | |
if len(pid) == dsn_len + secret_len: | |
break # split pid into DSN and account secret | |
else: | |
continue | |
try: | |
voucher = DrmIonVoucher(BytesIO(data), pid[:dsn_len], pid[dsn_len:]) | |
voucher.parse() | |
voucher.decryptvoucher() | |
break | |
except: | |
traceback.print_exc() | |
pass | |
else: | |
raise Exception("Failed to decrypt KFX DRM voucher with any key") | |
print("KFX DRM voucher successfully decrypted") | |
license_type = voucher.getlicensetype() | |
if license_type != "Purchase": | |
#raise Exception(("This book is licensed as {0}. " | |
# 'These tools are intended for use on purchased books.').format(license_type)) | |
print("Warning: This book is licensed as {0}. " | |
"These tools are intended for use on purchased books. Continuing ...".format(license_type)) | |
self.voucher = voucher | |
def getBookTitle(self): | |
return os.path.splitext(os.path.split(self.infile)[1])[0] | |
def getBookExtension(self): | |
return '.kfx-zip' | |
def getBookType(self): | |
return 'KFX-ZIP' | |
def cleanup(self): | |
pass | |
def getFile(self, outpath): | |
if not self.decrypted: | |
shutil.copyfile(self.infile, outpath) | |
else: | |
if not self.zipd: | |
dname = os.path.dirname(self.infile) | |
with zipfile.ZipFile( outpath, 'w') as zof: | |
for file in os.listdir(dname): | |
with open(os.path.join(dname, file), "rb") as fh: | |
zof.writestr(file, self.decrypted.get(file, fh.read())) | |
else: | |
with zipfile.ZipFile(self.infile, 'r') as zif: | |
with zipfile.ZipFile(outpath, 'w') as zof: | |
for info in zif.infolist(): | |
zof.writestr(info, self.decrypted.get(info.filename, zif.read(info.filename))) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment