Created
January 11, 2015 22:51
-
-
Save smealum/008e24537ddde7db528c to your computer and use it in GitHub Desktop.
ninjhax stuff
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import os | |
import sys | |
import struct | |
import ctypes | |
import compress | |
#compress.py from https://github.com/magical/nlzss/blob/master/compress.py | |
#slightly modified padding | |
def getWord(b, k, n=4): | |
return sum(list(map(lambda c: b[k+c]<<(c*8),range(n)))) | |
def loadSP(fn): | |
f=open(fn,"rb") | |
P=[] | |
for i in range(18): | |
P.append(struct.unpack("I",f.read(4))[0]) | |
S=[[],[],[],[]] | |
for i in range(4): | |
for j in range(256): | |
S[i].append(struct.unpack("I",f.read(4))[0]) | |
f.close() | |
return S, P | |
# 2 functions stolen from http://felipetonello.com/scripts/python/blowfish.txt | |
def F(S, P, xl): | |
a = (xl & 0xFF000000) >> 24 | |
b = (xl & 0x00FF0000) >> 16 | |
c = (xl & 0x0000FF00) >> 8 | |
d = xl & 0x000000FF | |
return ((S[0][a] + S[1][b]) ^ S[2][c]) + S[3][d]; | |
def cipher(S, P, xl, xr, direction): | |
if direction == 0: #ENCRYPT | |
for i in range (16): | |
xl = xl ^ P[i] | |
xr = F(S,P,xl) ^ xr | |
xl, xr = xr, xl | |
xl, xr = xr, xl | |
xr = xr ^ P[16] | |
xl = xl ^ P[17] | |
else: #DECRYPT | |
for i in range (17, 1, -1): | |
xl = xl ^ P[i] | |
xr = F(S,P,xl) ^ xr | |
xl, xr = xr, xl | |
xl, xr = xr, xl | |
xr = xr ^ P[1] | |
xl = xl ^ P[0] | |
return xl, xr | |
def encrypt(din,dout): | |
l=len(din) | |
for k in range(0,l,8): | |
l=getWord(din,k) | |
r=getWord(din,k+4) | |
ret=cipher(S,P,l,r,0) | |
dout[(k):(k+4)]=struct.pack("I",ret[0]&0xFFFFFFFF) | |
dout[(k+4):(k+8)]=struct.pack("I",ret[1]&0xFFFFFFFF) | |
def calcCRC(d): | |
l=len(d) | |
R3=0x04C11DB7 | |
R0=0xFFFFFFFF | |
for R2 in range(l): | |
R1=d[R2] | |
R0=R0^(R1<<24) | |
for R1 in range(8): | |
if R0&0x80000000==0: | |
R0=R0<<1 | |
else: | |
R0=R3^(R0<<1) | |
R0=R0&0xFFFFFFFF | |
return ctypes.c_uint(~R0).value | |
path="./" | |
if len(sys.argv)>2: | |
path=sys.argv[2] | |
data=bytearray(open(sys.argv[1],"rb").read()) | |
padding=compress.compress(data, open("tmp","wb")) | |
cdata=bytearray(open("tmp","rb").read()) | |
crc=calcCRC(cdata[0:(len(cdata)-padding)]) | |
data=bytearray(len(cdata)+7) | |
data[0x7:(0x7+len(cdata))]=cdata[:] | |
data[0x3]=(crc)&0xFF | |
data[0x4]=(crc>>8)&0xFF | |
data[0x5]=(crc>>16)&0xFF | |
data[0x6]=(crc>>24)&0xFF | |
#data[0x1] and data[0x2] : unused ? | |
data[0x0]=0x80|(padding&0x7) | |
dataOut=data[:] | |
(S,P)=loadSP(path+"/blowfish_processed.bin") | |
encrypt(data,dataOut) | |
#weird quirk | |
l=len(dataOut) | |
v=dataOut[0x00] | |
dataOut[0x00]=dataOut[0x01] | |
dataOut[0x01]=dataOut[l-1] | |
dataOut[l-1]=v | |
open("tmp","wb").write(dataOut) | |
# os.system(path+"/qrcode.exe -8 -o "+sys.argv[1]+".png < tmp") |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment