mirror of
https://github.com/morgan9e/eTL-downloader
synced 2026-04-14 00:14:34 +09:00
Cleanup
This commit is contained in:
15
README.md
15
README.md
@@ -4,13 +4,22 @@ Download all files from lectures of SNU eTL.
|
|||||||
|
|
||||||
Skips already downloaded files
|
Skips already downloaded files
|
||||||
|
|
||||||
Creates locally saved virtual Passkey to reuse after
|
~~First time registration required, passkey info is stored at `snu_fido.json`.~~
|
||||||
|
|
||||||
First time registration required, passkey info is stored at `snu_fido.json`.
|
Changed to Canvas Login. Please provide your ID and PW in .env as SNU_ID and SNU_PW.
|
||||||
|
|
||||||
|
You may have to add password in Canvas system, from https://myetl.snu.ac.kr/login/canvas
|
||||||
|
|
||||||
|
```
|
||||||
|
#file=./.env
|
||||||
|
|
||||||
|
SNU_ID="2025-01234"
|
||||||
|
SNU_PW="MyVerySecretPassword"
|
||||||
|
```
|
||||||
|
|
||||||
### Usage
|
### Usage
|
||||||
|
|
||||||
From `etl.py`
|
From `main.py`
|
||||||
|
|
||||||
```
|
```
|
||||||
sync_etl(209133, "Computer_Networking")
|
sync_etl(209133, "Computer_Networking")
|
||||||
|
|||||||
326
login.py
326
login.py
@@ -1,326 +0,0 @@
|
|||||||
import requests
|
|
||||||
from Crypto.Util.number import bytes_to_long
|
|
||||||
from binascii import unhexlify
|
|
||||||
import os
|
|
||||||
import json
|
|
||||||
from fastecdsa.curve import P256
|
|
||||||
from fastecdsa.point import Point
|
|
||||||
from seed import seed_cbc_encrypt
|
|
||||||
from base64 import b64decode
|
|
||||||
from Crypto.PublicKey import RSA
|
|
||||||
from Crypto.Cipher import PKCS1_v1_5
|
|
||||||
|
|
||||||
from passkey import VirtPasskeyDevice as Passkey
|
|
||||||
|
|
||||||
class CredStore:
|
|
||||||
def __init__(self):
|
|
||||||
self.store = {}
|
|
||||||
def __getitem__(self, key):
|
|
||||||
return self.store.get(key)
|
|
||||||
def __setitem__(self, key, val):
|
|
||||||
self.store[key] = val
|
|
||||||
self.__dict__[key] = val
|
|
||||||
def get(self, key):
|
|
||||||
return self.__getitem__(key)
|
|
||||||
def put(self, key, val):
|
|
||||||
self.__setitem__(key, val)
|
|
||||||
|
|
||||||
cred = CredStore()
|
|
||||||
|
|
||||||
cred.SNU_ID = ""
|
|
||||||
cred.SNU_NM = ""
|
|
||||||
cred.SNU_PW = ""
|
|
||||||
cred.PASSKEY = os.path.join(os.path.dirname(os.path.abspath(__file__)), "snu_fido.json")
|
|
||||||
|
|
||||||
class Session(requests.Session):
|
|
||||||
def __init__(self):
|
|
||||||
super().__init__()
|
|
||||||
self.default_headers = {
|
|
||||||
"User-Agent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36"
|
|
||||||
}
|
|
||||||
|
|
||||||
def _merge_headers(self, headers):
|
|
||||||
merged = headers.copy() if headers else {}
|
|
||||||
for k, v in self.default_headers.items():
|
|
||||||
if k not in merged:
|
|
||||||
merged[k] = v
|
|
||||||
return merged
|
|
||||||
|
|
||||||
def get(self, url, **kwargs):
|
|
||||||
kwargs["headers"] = self._merge_headers(kwargs.get("headers"))
|
|
||||||
return super().get(url, **kwargs)
|
|
||||||
|
|
||||||
def post(self, url, **kwargs):
|
|
||||||
kwargs["headers"] = self._merge_headers(kwargs.get("headers"))
|
|
||||||
return super().post(url, **kwargs)
|
|
||||||
|
|
||||||
|
|
||||||
def key_init(sess):
|
|
||||||
|
|
||||||
curve = P256
|
|
||||||
n = curve.q
|
|
||||||
byte_length = (n.bit_length() + 7) // 8
|
|
||||||
rand_bytes = os.urandom(byte_length)
|
|
||||||
r = bytes_to_long(rand_bytes)
|
|
||||||
rand = (r % (n - 1)) + 1
|
|
||||||
client_prikey = format(rand, 'x')
|
|
||||||
priv_key_int = int(client_prikey, 16)
|
|
||||||
|
|
||||||
G = Point(curve.gx, curve.gy, curve)
|
|
||||||
client_pub = priv_key_int * G
|
|
||||||
|
|
||||||
client_pubkey_x = format(client_pub.x, '064x')
|
|
||||||
client_pubkey_y = format(client_pub.y, '064x')
|
|
||||||
client_pubkey = client_pubkey_x + client_pubkey_y
|
|
||||||
|
|
||||||
payload = {"user_ec_publickey": client_pubkey}
|
|
||||||
response = sess.post("https://nsso.snu.ac.kr/sso/usr/snu/login/init", data=payload)
|
|
||||||
response_data = response.json()
|
|
||||||
|
|
||||||
svr_qx = response_data["svr_qx"]
|
|
||||||
svr_qy = response_data["svr_qy"]
|
|
||||||
|
|
||||||
svr_qx_int = int(svr_qx, 16)
|
|
||||||
svr_qy_int = int(svr_qy, 16)
|
|
||||||
|
|
||||||
server_point = Point(svr_qx_int, svr_qy_int, curve)
|
|
||||||
shared_point = server_point * priv_key_int
|
|
||||||
|
|
||||||
calkey_x = format(shared_point.x, '064x')
|
|
||||||
calkey_y = format(shared_point.y, '064x')
|
|
||||||
|
|
||||||
client_calkey = calkey_x + calkey_y
|
|
||||||
|
|
||||||
passni_key = unhexlify(client_calkey[:64])
|
|
||||||
passni_iv = unhexlify(client_calkey[64:96])
|
|
||||||
|
|
||||||
return passni_iv, passni_key
|
|
||||||
|
|
||||||
|
|
||||||
def encrypt_login(sess, data):
|
|
||||||
|
|
||||||
passni_iv, passni_key = key_init(sess)
|
|
||||||
encrypt_data = seed_cbc_encrypt(data.encode(), passni_key, passni_iv)
|
|
||||||
return encrypt_data
|
|
||||||
|
|
||||||
|
|
||||||
def sso_register_passkey(sess, passkey = None):
|
|
||||||
print("[*] Credential not found, register new passkey.")
|
|
||||||
|
|
||||||
if not passkey:
|
|
||||||
print(f"[*] Using Passkey store: {cred.PASSKEY}")
|
|
||||||
passkey = Passkey(cred.PASSKEY)
|
|
||||||
|
|
||||||
payload = {"crtfc_type": "fido2", "lang": "ko", "return_url": "https://nsso.snu.ac.kr/sso/usr/snu/mfa/login/view", "lnksys_id": "snu-mfa-sso"}
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/snu/regist/step", data=payload)
|
|
||||||
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/com/ajaxNextKey")
|
|
||||||
next_key = resp.text
|
|
||||||
|
|
||||||
payload = {"next_key": next_key, "sel_user_id": "", "lang": "ko", "user_id": cred.SNU_ID, "user_name": "", "user_birth": ""}
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/snu/com/ajaxUserIdCheck", data=payload)
|
|
||||||
if not (r := resp.json()).get("result"):
|
|
||||||
raise Exception(r)
|
|
||||||
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/com/ajaxNextKey")
|
|
||||||
next_key = resp.text
|
|
||||||
|
|
||||||
payload = {"next_key": next_key, "gubun": "self", "lang": "ko", "crtfc_no": ""}
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/com/ajaxSendMail", data=payload)
|
|
||||||
if not (r := resp.json()).get("result"):
|
|
||||||
raise Exception(r)
|
|
||||||
|
|
||||||
print("[*] 2FA is sent to registered mail.")
|
|
||||||
verif = input("? ")
|
|
||||||
|
|
||||||
payload = {"next_key": next_key, "gubun": "self", "lang": "ko", "crtfc_no": verif}
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/snu/com/ajaxValidCrtfcNo", data=payload)
|
|
||||||
if not (r := resp.json()).get("result"):
|
|
||||||
raise Exception(r)
|
|
||||||
|
|
||||||
payload = {"next_key": next_key, "gubun": "self", "lang": "ko", "crtfc_no": verif}
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/snu/regist/step04/fido2", data=payload)
|
|
||||||
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/com/ajaxNextKey")
|
|
||||||
next_key = resp.text
|
|
||||||
|
|
||||||
payload = {
|
|
||||||
"username": "",
|
|
||||||
"displayName": "",
|
|
||||||
"credentialNickname": "",
|
|
||||||
"authenticatorSelection": {
|
|
||||||
"requireResidentKey": False,
|
|
||||||
"authenticatorAttachment": "platform",
|
|
||||||
"userVerification":"preferred"
|
|
||||||
},
|
|
||||||
"attestation": "direct"
|
|
||||||
}
|
|
||||||
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/fido2/register", json=payload, headers={"Origin": "https://mfalogin.snu.ac.kr"})
|
|
||||||
result = resp.json()
|
|
||||||
if result.get("status") != "ok":
|
|
||||||
raise Exception(result)
|
|
||||||
|
|
||||||
# Register new passkey
|
|
||||||
resp = passkey.create(result, "https://mfalogin.snu.ac.kr")
|
|
||||||
|
|
||||||
data = {
|
|
||||||
"type": resp["type"],
|
|
||||||
"id": resp["id"],
|
|
||||||
"response": {
|
|
||||||
"attestationObject": resp["response"]["attestationObject"],
|
|
||||||
"clientDataJSON": resp["response"]["clientDataJSON"],
|
|
||||||
},
|
|
||||||
"clientExtensionResults": {}
|
|
||||||
}
|
|
||||||
payload = {"register_data": json.dumps(data)}
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/fido2/register/finish", data=payload, headers={"Origin": "https://mfalogin.snu.ac.kr"})
|
|
||||||
|
|
||||||
payload = {"next_key": next_key, "type": "fido2", "lang": "ko"}
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/snu/regist/step05", data=payload)
|
|
||||||
|
|
||||||
print("[*] New passkey registered successfully")
|
|
||||||
|
|
||||||
|
|
||||||
def sso_login(sess = None, agt_resp = None, auth_type = "passkey"):
|
|
||||||
if not sess:
|
|
||||||
sess = Session()
|
|
||||||
|
|
||||||
if not agt_resp:
|
|
||||||
resp = sess.get("https://my.snu.ac.kr/SSOService.do")
|
|
||||||
else:
|
|
||||||
resp = agt_resp
|
|
||||||
|
|
||||||
agt_url = resp.text.split('name="agt_url" value="')[1].split('"')[0]
|
|
||||||
agt_r = resp.text.split('name="agt_r" value="')[1].split('"')[0]
|
|
||||||
agt_id = resp.text.split('name="agt_id" value="')[1].split('"')[0]
|
|
||||||
|
|
||||||
payload = {"agt_url": agt_url, "agt_r": agt_r, "agt_id": agt_id}
|
|
||||||
resp = sess.post("https://nsso.snu.ac.kr/sso/usr/login/link", data=payload)
|
|
||||||
|
|
||||||
if "login_key" in resp.text:
|
|
||||||
|
|
||||||
login_key = resp.text.split('id="login_key" name="login_key" value="')[1].split('"')[0]
|
|
||||||
|
|
||||||
if auth_type == "passkey":
|
|
||||||
key_init(sess)
|
|
||||||
payload = {'user_id': cred.SNU_ID, 'crtfc_type': 'fido2', 'login_key': login_key}
|
|
||||||
resp = sess.post("https://nsso.snu.ac.kr/sso/usr/snu/mfa/login/fido2/ajaxIDTokenCreate", data=payload)
|
|
||||||
result = resp.json()
|
|
||||||
if not result["result"]:
|
|
||||||
raise Exception(result)
|
|
||||||
|
|
||||||
id_token = result["id_token"]
|
|
||||||
|
|
||||||
payload = {"id_token": id_token, "userVerification": "preferred"}
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/fido2/options", json=payload, headers={"origin": "https://nsso.snu.ac.kr"})
|
|
||||||
result = resp.json()
|
|
||||||
|
|
||||||
print(f"[*] Using Passkey store: {cred.PASSKEY}")
|
|
||||||
passkey = Passkey(cred.PASSKEY)
|
|
||||||
|
|
||||||
try:
|
|
||||||
resp = passkey.get(result, "https://nsso.snu.ac.kr")
|
|
||||||
|
|
||||||
except Passkey.CredNotFoundError:
|
|
||||||
try:
|
|
||||||
sso_register_passkey(sess, passkey)
|
|
||||||
resp = passkey.get(result, "https://nsso.snu.ac.kr")
|
|
||||||
except Exception as e:
|
|
||||||
print(f"Unknown error: {e}")
|
|
||||||
exit(1)
|
|
||||||
|
|
||||||
data = {
|
|
||||||
"type": "public-key",
|
|
||||||
"id": resp["id"],
|
|
||||||
"response": {
|
|
||||||
"authenticatorData": resp["response"]["authenticatorData"],
|
|
||||||
"clientDataJSON": resp["response"]["clientDataJSON"],
|
|
||||||
"signature": resp["response"]["signature"]
|
|
||||||
},
|
|
||||||
"clientExtensionResults": {}
|
|
||||||
}
|
|
||||||
|
|
||||||
payload = {"user_data": json.dumps(data), "id_token": id_token}
|
|
||||||
resp = sess.post("https://mfalogin.snu.ac.kr/mfa/user/fido2/auth", data=payload, headers={"origin": "https://nsso.snu.ac.kr"})
|
|
||||||
if not (result := resp.json()).get("result"):
|
|
||||||
raise Exception(result)
|
|
||||||
|
|
||||||
payload = {'login_key': login_key}
|
|
||||||
resp = sess.post("https://nsso.snu.ac.kr/sso/usr/snu/mfa/login/fido2/ajaxUserAuthFido2", data=payload)
|
|
||||||
if not (result := resp.json()).get("result"):
|
|
||||||
raise Exception(result)
|
|
||||||
print(f"[*] Login Success! {resp.json()}")
|
|
||||||
|
|
||||||
elif auth_type in ["sms", "main"]:
|
|
||||||
|
|
||||||
# Login
|
|
||||||
ed = encrypt_login(sess, f'{{"login_id":"{cred.SNU_ID}","login_pwd":"{cred.SNU_PW}"}}')
|
|
||||||
payload = {'user_data': ed.hex(), 'login_key': login_key}
|
|
||||||
resp = sess.post("https://nsso.snu.ac.kr/sso/usr/snu/mfa/login/auth", data=payload)
|
|
||||||
|
|
||||||
# 2FA
|
|
||||||
payload = {'crtfc_type': auth_type, 'login_key': login_key}
|
|
||||||
resp = sess.post("https://nsso.snu.ac.kr/sso/usr/snu/mfa/login/ajaxUserSend", data=payload)
|
|
||||||
|
|
||||||
verif = input("? ")
|
|
||||||
|
|
||||||
payload = {'crtfc_no': verif, 'login_key': login_key, "bypass_check": "true"}
|
|
||||||
resp = sess.post("https://nsso.snu.ac.kr/sso/usr/snu/mfa/login/ajaxUserAuthId", data=payload)
|
|
||||||
|
|
||||||
# Login complete
|
|
||||||
|
|
||||||
payload = {"user_data": "", "page_lang": "", "login_key": login_key, "pwd_type":""}
|
|
||||||
resp = sess.post("https://nsso.snu.ac.kr/sso/usr/snu/login/link", data=payload)
|
|
||||||
|
|
||||||
target = resp.text.split('name="loginForm" method="post" action="')[1].split('"')[0]
|
|
||||||
pni_login_type = resp.text.split('name="pni_login_type" value="')[1].split('"')[0]
|
|
||||||
pni_data = resp.text.split('name="pni_data" value="')[1].split('"')[0]
|
|
||||||
|
|
||||||
payload = {"pni_login_type": pni_login_type, "pni_data": pni_data}
|
|
||||||
resp = sess.post(target, data=payload)
|
|
||||||
|
|
||||||
return resp
|
|
||||||
|
|
||||||
|
|
||||||
def etl_login():
|
|
||||||
|
|
||||||
sess = Session()
|
|
||||||
sso = sess.get("https://etl.snu.ac.kr/passni/sso/spLogin.php")
|
|
||||||
# SSO Login
|
|
||||||
resp = sso_login(sess, agt_resp=sso)
|
|
||||||
|
|
||||||
if "gw-cb.php" not in resp.text:
|
|
||||||
print(resp.text)
|
|
||||||
raise Exception("Login Failed")
|
|
||||||
|
|
||||||
resp = sess.get("https://etl.snu.ac.kr/xn-sso/gw-cb.php")
|
|
||||||
if "iframe.src=" in resp.text:
|
|
||||||
cburl = resp.text.split('iframe.src="')[1].split('"')[0]
|
|
||||||
|
|
||||||
resp = sess.get(cburl)
|
|
||||||
cpar = resp.text.split("window.loginCryption(")[1].split(")")[0]
|
|
||||||
ctstr = cpar.split(",")[0].strip().replace('"',"")
|
|
||||||
pkstr = cpar.split(",")[1].strip().replace('"',"")
|
|
||||||
|
|
||||||
ct = b64decode(ctstr)
|
|
||||||
pk = b64decode(pkstr.split("-----BEGIN RSA PRIVATE KEY-----")[1].split("-----END RSA PRIVATE KEY-----")[0])
|
|
||||||
|
|
||||||
key = RSA.import_key(pk)
|
|
||||||
cipher = PKCS1_v1_5.new(key)
|
|
||||||
pt = cipher.decrypt(ct, b'')
|
|
||||||
|
|
||||||
payload = {
|
|
||||||
"utf8": "✓", "redirect_to_ssl": "1", "after_login_url": "",
|
|
||||||
"pseudonym_session[unique_id]": cred.SNU_NM,
|
|
||||||
"pseudonym_session[password]": pt.decode(),
|
|
||||||
"pseudonym_session[remember_me]": "1"
|
|
||||||
}
|
|
||||||
resp = sess.post("https://myetl.snu.ac.kr/login/canvas", data=payload, headers={"referer": cburl})
|
|
||||||
|
|
||||||
return sess
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
|
||||||
# sso_register_passkey()
|
|
||||||
sso_login()
|
|
||||||
@@ -1,16 +1,17 @@
|
|||||||
import json
|
|
||||||
import urllib.parse
|
|
||||||
import os
|
import os
|
||||||
import sys
|
|
||||||
from datetime import datetime
|
from datetime import datetime
|
||||||
|
from dotenv import load_dotenv
|
||||||
from bs4 import BeautifulSoup as bs
|
from bs4 import BeautifulSoup as bs
|
||||||
import requests
|
import requests
|
||||||
|
import urllib.parse
|
||||||
|
|
||||||
SNU_NM = ""
|
load_dotenv()
|
||||||
SNU_PW = ""
|
|
||||||
|
SNU_ID = os.environ.get("SNU_ID","")
|
||||||
|
SNU_PW = os.environ.get("SNU_PW","")
|
||||||
|
|
||||||
UA = "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36"
|
UA = "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36"
|
||||||
API = "https://myetl.snu.ac.kr/api"
|
BASE = "https://myetl.snu.ac.kr/"
|
||||||
|
|
||||||
class Session(requests.Session):
|
class Session(requests.Session):
|
||||||
def rget(self, url, headers=None):
|
def rget(self, url, headers=None):
|
||||||
@@ -27,31 +28,33 @@ class Session(requests.Session):
|
|||||||
resp = self.get(url, headers=merged_headers)
|
resp = self.get(url, headers=merged_headers)
|
||||||
if resp.status_code != 200:
|
if resp.status_code != 200:
|
||||||
raise requests.HTTPError(f"{resp.status_code}: {resp.text}", response=resp)
|
raise requests.HTTPError(f"{resp.status_code}: {resp.text}", response=resp)
|
||||||
return resp.json()
|
try:
|
||||||
|
return resp.json()
|
||||||
|
except requests.exceptions.JSONDecodeError:
|
||||||
|
return resp.text
|
||||||
|
|
||||||
def etl_login():
|
def etl_login():
|
||||||
sess = Session()
|
sess = Session()
|
||||||
resp = sess.get("https://myetl.snu.ac.kr/login/canvas")
|
resp = sess.get(f"{BASE}/login/canvas")
|
||||||
soup = bs(resp.text, 'html.parser')
|
soup = bs(resp.text, 'html.parser')
|
||||||
form = soup.find('form', {'id': 'login_form'})
|
form = soup.find('form', {'id': 'login_form'})
|
||||||
inputs = form.find_all('input')
|
inputs = form.find_all('input')
|
||||||
payload = {inp.get('name'): inp.get('value', '') for inp in inputs}
|
payload = {inp.get('name'): inp.get('value', '') for inp in inputs}
|
||||||
payload["pseudonym_session[unique_id]"] = SNU_NM
|
payload["pseudonym_session[unique_id]"] = SNU_ID
|
||||||
payload["pseudonym_session[password]"] = SNU_PW
|
payload["pseudonym_session[password]"] = SNU_PW
|
||||||
resp = sess.post("https://myetl.snu.ac.kr/login/canvas", data=payload, headers={"referer": "https://myetl.snu.ac.kr/login/canvas"})
|
resp = sess.post(f"{BASE}/login/canvas", data=payload, headers={"referer": f"{BASE}/login/canvas"})
|
||||||
return sess
|
return sess
|
||||||
|
|
||||||
|
|
||||||
def sync_etl(sess, lecture, name = ""):
|
def sync_courses(sess, lecture, name = ""):
|
||||||
basepath = "./download"
|
basepath = "./download"
|
||||||
root = sess.rget(f"{API}/v1/courses/{lecture}/folders/root")
|
root = sess.rget(f"{BASE}/api/v1/courses/{lecture}/folders/root")
|
||||||
print(f"{root['id']} {root['full_name']}")
|
print(f"{root['id']} {root['full_name']}")
|
||||||
|
|
||||||
def get_subpath(dir, parent = []):
|
def get_subpath(dir, parent = []):
|
||||||
files = []
|
files = []
|
||||||
depth = len(parent)
|
depth = len(parent)
|
||||||
resp = sess.rget(f"{API}/v1/folders/{dir}/files?include%5B%5D=user&include%5B%5D=usage_rights&include%5B%5D=enhanced_preview_url&include%5B%5D=context_asset_string&per_page=200&sort=&order=")
|
resp = sess.rget(f"{BASE}/api/v1/folders/{dir}/files?include%5B%5D=user&include%5B%5D=usage_rights&include%5B%5D=enhanced_preview_url&include%5B%5D=context_asset_string&per_page=200&sort=&order=")
|
||||||
for file in resp:
|
for file in resp:
|
||||||
info = {
|
info = {
|
||||||
'id': file['id'],
|
'id': file['id'],
|
||||||
@@ -66,7 +69,7 @@ def sync_etl(sess, lecture, name = ""):
|
|||||||
|
|
||||||
print(" " * depth + f"|- {info['id']:<7} {info['display_name']:<48} {info['size']} {file['modified_at']}")
|
print(" " * depth + f"|- {info['id']:<7} {info['display_name']:<48} {info['size']} {file['modified_at']}")
|
||||||
|
|
||||||
resp = sess.rget(f"{API}/v1/folders/{dir}/folders?include%5B%5D=user&include%5B%5D=usage_rights&include%5B%5D=enhanced_preview_url&include%5B%5D=context_asset_string&per_page=200&sort=&order=")
|
resp = sess.rget(f"{BASE}/api/v1/folders/{dir}/folders?include%5B%5D=user&include%5B%5D=usage_rights&include%5B%5D=enhanced_preview_url&include%5B%5D=context_asset_string&per_page=200&sort=&order=")
|
||||||
for folder in resp:
|
for folder in resp:
|
||||||
print(" " * depth + f"|- {folder['id']:<7} {folder['name']:<48}")
|
print(" " * depth + f"|- {folder['id']:<7} {folder['name']:<48}")
|
||||||
files += get_subpath(folder["id"], parent + [folder['name']])
|
files += get_subpath(folder["id"], parent + [folder['name']])
|
||||||
@@ -74,13 +77,11 @@ def sync_etl(sess, lecture, name = ""):
|
|||||||
return files
|
return files
|
||||||
|
|
||||||
files = get_subpath(root["id"], [f"{name or lecture}"])
|
files = get_subpath(root["id"], [f"{name or lecture}"])
|
||||||
print()
|
|
||||||
|
|
||||||
for file in files:
|
for file in files:
|
||||||
local_dir = "/".join([i.replace(" ","_") for i in [i for i in file['path'] if i != "unfiled"]])
|
local_dir = "/".join([i.replace(" ","_") for i in [i for i in file['path'] if i != "unfiled"]])
|
||||||
if basepath:
|
if basepath:
|
||||||
local_dir = os.path.join(basepath, local_dir)
|
local_dir = os.path.join(basepath, local_dir)
|
||||||
local_path = os.path.join(local_dir, file['display_name'].replace(" ","+"))
|
local_path = os.path.join(local_dir, file['display_name'].replace(" ","_"))
|
||||||
|
|
||||||
if not os.path.exists(local_dir):
|
if not os.path.exists(local_dir):
|
||||||
os.makedirs(local_dir, exist_ok=True)
|
os.makedirs(local_dir, exist_ok=True)
|
||||||
@@ -89,15 +90,14 @@ def sync_etl(sess, lecture, name = ""):
|
|||||||
local_mtime = os.path.getmtime(local_path)
|
local_mtime = os.path.getmtime(local_path)
|
||||||
local_size = os.path.getsize(local_path)
|
local_size = os.path.getsize(local_path)
|
||||||
if file['mt'] <= local_mtime and file['size'] == local_size:
|
if file['mt'] <= local_mtime and file['size'] == local_size:
|
||||||
# print(f"- Skipping {local_path}")
|
print(f"- Skipping {local_path}")
|
||||||
continue
|
continue
|
||||||
|
|
||||||
print(f"- Download {local_path}")
|
print(f"- Download {local_path}")
|
||||||
try:
|
try:
|
||||||
resp = sess.rget(file['url'])
|
resp = sess.get(file['url'])
|
||||||
with open(local_path, 'wb') as f:
|
with open(local_path, 'wb') as f:
|
||||||
f.write(resp.content)
|
f.write(resp.content)
|
||||||
|
|
||||||
os.utime(local_path, (file['mt'], file['mt']))
|
os.utime(local_path, (file['mt'], file['mt']))
|
||||||
|
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
@@ -107,15 +107,18 @@ def sync_etl(sess, lecture, name = ""):
|
|||||||
|
|
||||||
|
|
||||||
def list_courses(sess):
|
def list_courses(sess):
|
||||||
db_crcs = sess.rget("https://myetl.snu.ac.kr/api/v1/dashboard/dashboard_cards")
|
db_crcs = sess.rget(f"{BASE}/api/v1/dashboard/dashboard_cards")
|
||||||
return db_crcs
|
return db_crcs
|
||||||
# courses = sess.rget(f"{API}/v1/courses?per_page=200")
|
# courses = sess.rget(f"{BASE}/api/v1/courses?per_page=200")
|
||||||
# courses.sort(key = lambda x: x['id'])
|
# courses.sort(key = lambda x: x['id'])
|
||||||
# latest_term = courses[-1]['enrollment_term_id']
|
# latest_term = courses[-1]['enrollment_term_id']
|
||||||
# return [i for i in courses if i.get('enrollment_term_id') == latest_term]
|
# return [i for i in courses if i.get('enrollment_term_id') == latest_term]
|
||||||
|
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
|
if not SNU_ID or not SNU_PW:
|
||||||
|
print("Please set SNU_ID and SNU_PW env variable or in .env")
|
||||||
|
return
|
||||||
sess = etl_login()
|
sess = etl_login()
|
||||||
courses = list_courses(sess)
|
courses = list_courses(sess)
|
||||||
print()
|
print()
|
||||||
@@ -125,7 +128,7 @@ def main():
|
|||||||
print()
|
print()
|
||||||
print("== Downloading ==")
|
print("== Downloading ==")
|
||||||
for c in courses:
|
for c in courses:
|
||||||
sync_etl(sess, c['id'])
|
sync_courses(sess, c['id'], ''.join(c['courseCode'].split(' ')[1:-1]))
|
||||||
|
|
||||||
if __name__=="__main__":
|
if __name__=="__main__":
|
||||||
main()
|
main()
|
||||||
382
passkey.py
382
passkey.py
@@ -1,382 +0,0 @@
|
|||||||
import json
|
|
||||||
import base64
|
|
||||||
import os
|
|
||||||
import time
|
|
||||||
import hashlib
|
|
||||||
import struct
|
|
||||||
import cbor2
|
|
||||||
from Crypto.PublicKey import ECC
|
|
||||||
from Crypto.Signature import DSS
|
|
||||||
from Crypto.Hash import SHA256
|
|
||||||
from typing import Dict, Any, Optional
|
|
||||||
|
|
||||||
import getpass
|
|
||||||
from fido2.hid import CtapHidDevice
|
|
||||||
from fido2.client import Fido2Client, UserInteraction
|
|
||||||
from fido2.webauthn import PublicKeyCredentialCreationOptions, PublicKeyCredentialDescriptor, PublicKeyCredentialRequestOptions
|
|
||||||
from fido2.utils import websafe_encode, websafe_decode
|
|
||||||
|
|
||||||
|
|
||||||
class YubiPasskeyDevice:
|
|
||||||
def __init__(self, dummy = ""):
|
|
||||||
devices = list(CtapHidDevice.list_devices())
|
|
||||||
if not devices:
|
|
||||||
raise Exception("No FIDO2 devices found.")
|
|
||||||
self.device = devices[0]
|
|
||||||
print(f"Using FIDO2 device: {self.device}")
|
|
||||||
|
|
||||||
class InputDataError(Exception):
|
|
||||||
def __init__(self, message="", error_code=None):
|
|
||||||
self.message = f"Input data insufficient or malformed: {message}"
|
|
||||||
self.error_code = error_code
|
|
||||||
super().__init__(self.message)
|
|
||||||
|
|
||||||
def get_client(self, origin):
|
|
||||||
class MyUserInteraction(UserInteraction):
|
|
||||||
def prompt_up(self):
|
|
||||||
print("\nPlease touch your security key...\n")
|
|
||||||
def request_pin(self, permissions, rp_id):
|
|
||||||
print(f"PIN requested for {rp_id}")
|
|
||||||
return getpass.getpass("Enter your security key's PIN: ")
|
|
||||||
|
|
||||||
client = Fido2Client(self.device, origin, user_interaction=MyUserInteraction())
|
|
||||||
return client
|
|
||||||
|
|
||||||
def create(self, create_options, origin = ""):
|
|
||||||
print("WEBAUTHN_START_REGISTER")
|
|
||||||
options = {"publicKey": create_options}
|
|
||||||
|
|
||||||
if not origin:
|
|
||||||
origin = f'https://{options["publicKey"]["rp"]["id"]}'
|
|
||||||
if not origin:
|
|
||||||
raise self.InputDataError("origin")
|
|
||||||
|
|
||||||
client = self.get_client(origin)
|
|
||||||
|
|
||||||
options["publicKey"]["challenge"] = websafe_decode(options["publicKey"]["challenge"])
|
|
||||||
options["publicKey"]["user"]["id"] = websafe_decode(options["publicKey"]["user"]["id"])
|
|
||||||
|
|
||||||
if "excludeCredentials" in options["publicKey"]:
|
|
||||||
for cred in options["publicKey"]["excludeCredentials"]:
|
|
||||||
cred["id"] = websafe_decode(cred["id"])
|
|
||||||
|
|
||||||
pk_create_options = options["publicKey"]
|
|
||||||
challenge = pk_create_options["challenge"]
|
|
||||||
rp = pk_create_options["rp"]
|
|
||||||
user = pk_create_options["user"]
|
|
||||||
pub_key_cred_params = pk_create_options["pubKeyCredParams"]
|
|
||||||
|
|
||||||
pk_options = PublicKeyCredentialCreationOptions(rp, user, challenge, pub_key_cred_params)
|
|
||||||
|
|
||||||
print(f"WEBAUTHN_MAKE_CREDENTIAL(RP={rp})")
|
|
||||||
|
|
||||||
attestation = client.make_credential(pk_options)
|
|
||||||
|
|
||||||
client_data_b64 = attestation.client_data.b64
|
|
||||||
attestation_object = attestation.attestation_object
|
|
||||||
credential = attestation.attestation_object.auth_data.credential_data
|
|
||||||
if not credential:
|
|
||||||
raise Exception()
|
|
||||||
|
|
||||||
result = {
|
|
||||||
"id": websafe_encode(credential.credential_id),
|
|
||||||
"rawId": websafe_encode(credential.credential_id),
|
|
||||||
"type": "public-key",
|
|
||||||
"response": {
|
|
||||||
"attestationObject": websafe_encode(attestation_object),
|
|
||||||
"clientDataJSON": client_data_b64
|
|
||||||
}
|
|
||||||
}
|
|
||||||
print(f"WEBAUTHN_ATTESTATION(ID={result['id']})")
|
|
||||||
return result
|
|
||||||
|
|
||||||
def get(self, get_options, origin = ""):
|
|
||||||
print("WEBAUTHN_START_AUTHENTICATION")
|
|
||||||
options = {"publicKey": get_options}
|
|
||||||
|
|
||||||
if not origin:
|
|
||||||
origin = f'https://{options["publicKey"]["rpId"]}'
|
|
||||||
if not origin:
|
|
||||||
raise self.InputDataError("origin")
|
|
||||||
|
|
||||||
client = self.get_client(origin)
|
|
||||||
|
|
||||||
options["publicKey"]["challenge"] = websafe_decode(options["publicKey"]["challenge"])
|
|
||||||
|
|
||||||
rp_id = options["publicKey"].get("rpId", "webauthn.io")
|
|
||||||
challenge = options["publicKey"]["challenge"]
|
|
||||||
|
|
||||||
if "allowCredentials" in options["publicKey"]:
|
|
||||||
for cred in options["publicKey"]["allowCredentials"]:
|
|
||||||
cred["id"] = websafe_decode(cred["id"])
|
|
||||||
|
|
||||||
allowed = [PublicKeyCredentialDescriptor(cred["type"], cred["id"])
|
|
||||||
for cred in options["publicKey"]["allowCredentials"]]
|
|
||||||
|
|
||||||
pk_options = PublicKeyCredentialRequestOptions(challenge, rp_id=rp_id, allow_credentials=allowed)
|
|
||||||
|
|
||||||
print(f"WEBAUTHN_GET_ASSERTION(RPID={rp_id})")
|
|
||||||
|
|
||||||
assertion_response = client.get_assertion(pk_options)
|
|
||||||
|
|
||||||
assertion = assertion_response.get_response(0)
|
|
||||||
if not assertion.credential_id:
|
|
||||||
raise Exception()
|
|
||||||
|
|
||||||
result = {
|
|
||||||
"id": websafe_encode(assertion.credential_id),
|
|
||||||
"rawId": websafe_encode(assertion.credential_id),
|
|
||||||
"type": "public-key",
|
|
||||||
"response": {
|
|
||||||
"authenticatorData": websafe_encode(assertion.authenticator_data),
|
|
||||||
"clientDataJSON": assertion.client_data.b64,
|
|
||||||
"signature": websafe_encode(assertion.signature),
|
|
||||||
"userHandle": websafe_encode(assertion.user_handle) if assertion.user_handle else None
|
|
||||||
}
|
|
||||||
}
|
|
||||||
print(f"WEBAUTHN_AUTHENTICATION(ID={result['id']})")
|
|
||||||
return result
|
|
||||||
|
|
||||||
|
|
||||||
class VirtPasskeyDevice:
|
|
||||||
def __init__(self, file: str = "passkey.json"):
|
|
||||||
self.file = file
|
|
||||||
self.credentials = {}
|
|
||||||
self._load_credentials()
|
|
||||||
|
|
||||||
class InputDataError(Exception):
|
|
||||||
def __init__(self, message="", error_code=None):
|
|
||||||
super().__init__(f"Input data insufficient or malformed: {message}")
|
|
||||||
|
|
||||||
class CredNotFoundError(Exception):
|
|
||||||
def __init__(self, message="No available credential found", error_code=None):
|
|
||||||
super().__init__(message)
|
|
||||||
|
|
||||||
def _load_credentials(self):
|
|
||||||
if os.path.exists(self.file):
|
|
||||||
try:
|
|
||||||
with open(self.file, 'r') as f:
|
|
||||||
self.credentials = json.load(f)
|
|
||||||
except os.FileNotExistsError:
|
|
||||||
self.credentials = {}
|
|
||||||
|
|
||||||
def _save_credentials(self):
|
|
||||||
with open(self.file, 'w') as f:
|
|
||||||
json.dump(self.credentials, f, indent=4)
|
|
||||||
|
|
||||||
def _create_authenticator_data(self, rp_id: bytes, counter: int = 0,
|
|
||||||
user_present: bool = True,
|
|
||||||
user_verified: bool = True,
|
|
||||||
credential_data: Optional[bytes] = None) -> bytes:
|
|
||||||
|
|
||||||
rp_id_hash = hashlib.sha256(rp_id).digest()
|
|
||||||
|
|
||||||
flags = 0
|
|
||||||
if user_present:
|
|
||||||
flags |= 1 << 0
|
|
||||||
if user_verified:
|
|
||||||
flags |= 1 << 2
|
|
||||||
if credential_data is not None:
|
|
||||||
flags |= 1 << 6
|
|
||||||
|
|
||||||
counter_bytes = struct.pack(">I", counter)
|
|
||||||
|
|
||||||
auth_data = rp_id_hash + bytes([flags]) + counter_bytes
|
|
||||||
|
|
||||||
if credential_data is not None:
|
|
||||||
auth_data += credential_data
|
|
||||||
|
|
||||||
return auth_data
|
|
||||||
|
|
||||||
def _get_public_key_cose(self, key) -> bytes:
|
|
||||||
x = key.pointQ.x.to_bytes(32, byteorder='big')
|
|
||||||
y = key.pointQ.y.to_bytes(32, byteorder='big')
|
|
||||||
cose_key = {1: 2, 3: -7, -1: 1, -2: x, -3: y}
|
|
||||||
return cbor2.dumps(cose_key)
|
|
||||||
|
|
||||||
def _b64url(self, d):
|
|
||||||
if isinstance(d, bytes):
|
|
||||||
return base64.urlsafe_b64encode(d).decode('utf-8').rstrip('=')
|
|
||||||
elif isinstance(d, str):
|
|
||||||
return base64.urlsafe_b64decode(d + "===")
|
|
||||||
|
|
||||||
|
|
||||||
def create(self, data: Dict[str, Any], origin: str = "") -> Dict[str, Any]:
|
|
||||||
challenge = data.get("challenge")
|
|
||||||
if isinstance(challenge, str):
|
|
||||||
challenge = self._b64url(challenge)
|
|
||||||
|
|
||||||
rp = data.get("rp", {})
|
|
||||||
user = data.get("user", {})
|
|
||||||
|
|
||||||
pub_key_params = data.get("pubKeyCredParams", [])
|
|
||||||
|
|
||||||
alg = -7
|
|
||||||
for param in pub_key_params:
|
|
||||||
if param.get('type') == 'public-key' and param.get('alg') == -7:
|
|
||||||
alg = -7
|
|
||||||
break
|
|
||||||
|
|
||||||
if not origin:
|
|
||||||
origin = data.get("origin")
|
|
||||||
if not origin:
|
|
||||||
raise self.InputDataError("origin")
|
|
||||||
|
|
||||||
rp_id = rp.get("id").encode()
|
|
||||||
|
|
||||||
user_id = user.get("id")
|
|
||||||
if isinstance(user_id, str):
|
|
||||||
user_id = self._b64url(user_id)
|
|
||||||
|
|
||||||
key = ECC.generate(curve='P-256')
|
|
||||||
private_key = key.export_key(format='PEM')
|
|
||||||
public_key = key.public_key().export_key(format='PEM') # noqa: F841
|
|
||||||
|
|
||||||
credential_id = os.urandom(16)
|
|
||||||
credential_id_b64 = self._b64url(credential_id)
|
|
||||||
|
|
||||||
cose_pubkey = self._get_public_key_cose(key)
|
|
||||||
|
|
||||||
cred_id_length = struct.pack(">H", len(credential_id))
|
|
||||||
|
|
||||||
aaguid = b'\x00' * 16
|
|
||||||
attested_data = aaguid + cred_id_length + credential_id + cose_pubkey
|
|
||||||
|
|
||||||
auth_data = self._create_authenticator_data(rp_id, counter=0, credential_data=attested_data)
|
|
||||||
|
|
||||||
attestation_obj = {
|
|
||||||
"fmt": "none",
|
|
||||||
"authData": auth_data,
|
|
||||||
"attStmt": {}
|
|
||||||
}
|
|
||||||
attestation_cbor = cbor2.dumps(attestation_obj)
|
|
||||||
|
|
||||||
client_data = {
|
|
||||||
"challenge": self._b64url(challenge),
|
|
||||||
"origin": origin,
|
|
||||||
"type": "webauthn.create",
|
|
||||||
"crossOrigin": False,
|
|
||||||
}
|
|
||||||
|
|
||||||
client_data_json = json.dumps(client_data).encode()
|
|
||||||
|
|
||||||
self.credentials[credential_id_b64] = {
|
|
||||||
"private_key": private_key,
|
|
||||||
"rp_id": self._b64url(rp_id),
|
|
||||||
"user_id": self._b64url(user_id),
|
|
||||||
"user_name": user.get('displayName', ''),
|
|
||||||
"created": int(time.time()),
|
|
||||||
"counter": 0
|
|
||||||
}
|
|
||||||
self._save_credentials()
|
|
||||||
|
|
||||||
response = {
|
|
||||||
"authenticatorAttachment": "cross-platform",
|
|
||||||
"id": credential_id_b64,
|
|
||||||
"rawId": credential_id_b64,
|
|
||||||
"response": {
|
|
||||||
"attestationObject": self._b64url(attestation_cbor),
|
|
||||||
"clientDataJSON": self._b64url(client_data_json),
|
|
||||||
"publicKey": self._b64url(cose_pubkey),
|
|
||||||
"pubKeyAlgo": str(alg),
|
|
||||||
"transports": ["internal"]
|
|
||||||
},
|
|
||||||
"type": "public-key"
|
|
||||||
}
|
|
||||||
return response
|
|
||||||
|
|
||||||
|
|
||||||
def get(self, data: Dict[str, Any], origin: str = "") -> Dict[str, Any]:
|
|
||||||
|
|
||||||
challenge = data.get("challenge")
|
|
||||||
if isinstance(challenge, str):
|
|
||||||
challenge = self._b64url(challenge)
|
|
||||||
|
|
||||||
allowed_credential = data.get("allowCredentials")
|
|
||||||
|
|
||||||
for credential in allowed_credential:
|
|
||||||
credential_id_b64 = credential["id"]
|
|
||||||
if self.credentials.get(credential_id_b64):
|
|
||||||
cred = self.credentials[credential_id_b64]
|
|
||||||
break
|
|
||||||
else:
|
|
||||||
raise self.CredNotFoundError()
|
|
||||||
|
|
||||||
rp_id = data.get("rpId", "").encode('utf-8')
|
|
||||||
if not rp_id:
|
|
||||||
raise self.InputDataError("rp_id")
|
|
||||||
|
|
||||||
if not origin:
|
|
||||||
origin = data.get("origin")
|
|
||||||
if not origin:
|
|
||||||
raise self.InputDataError("origin")
|
|
||||||
|
|
||||||
counter = cred.get("counter", 0) + 1
|
|
||||||
cred["counter"] = counter
|
|
||||||
|
|
||||||
auth_data = self._create_authenticator_data(
|
|
||||||
rp_id=rp_id,
|
|
||||||
counter=counter,
|
|
||||||
user_present=True,
|
|
||||||
user_verified=True
|
|
||||||
)
|
|
||||||
|
|
||||||
client_data = ('{"type":"%s","challenge":"%s","origin":"%s","crossOrigin":false}'
|
|
||||||
% ("webauthn.get", self._b64url(challenge), origin)).encode()
|
|
||||||
client_data_hash = hashlib.sha256(client_data).digest()
|
|
||||||
|
|
||||||
signature_data = auth_data + client_data_hash
|
|
||||||
|
|
||||||
key = ECC.import_key(cred["private_key"])
|
|
||||||
h = SHA256.new(signature_data)
|
|
||||||
signer = DSS.new(key, 'fips-186-3', encoding='der')
|
|
||||||
signature = signer.sign(h)
|
|
||||||
|
|
||||||
self._save_credentials()
|
|
||||||
|
|
||||||
response = {
|
|
||||||
"authenticatorAttachment": "cross-platform",
|
|
||||||
"id": credential_id_b64,
|
|
||||||
"rawId": credential_id_b64,
|
|
||||||
"response": {
|
|
||||||
"authenticatorData": self._b64url(auth_data),
|
|
||||||
"clientDataJSON": self._b64url(client_data),
|
|
||||||
"signature": self._b64url(signature)
|
|
||||||
},
|
|
||||||
"type": "public-key"
|
|
||||||
}
|
|
||||||
return response
|
|
||||||
|
|
||||||
|
|
||||||
Passkey = VirtPasskeyDevice
|
|
||||||
|
|
||||||
|
|
||||||
if __name__=="__main__":
|
|
||||||
import requests
|
|
||||||
|
|
||||||
sess = requests.Session()
|
|
||||||
passkey = Passkey()
|
|
||||||
|
|
||||||
payload = {
|
|
||||||
"algorithms": ["es256"], "attachment": "all", "attestation": "none", "discoverable_credential": "preferred",
|
|
||||||
"hints": [], "user_verification": "preferred", "username": "asdf"
|
|
||||||
}
|
|
||||||
resp = sess.post("https://webauthn.io/registration/options", json=payload)
|
|
||||||
print(resp.json())
|
|
||||||
data = passkey.create(resp.json(), origin="https://webauthn.io")
|
|
||||||
data["rawId"] = data["id"]
|
|
||||||
print(data)
|
|
||||||
resp = sess.post("https://webauthn.io/registration/verification", json={"response": data, "username": "asdf"})
|
|
||||||
print(resp.json())
|
|
||||||
print()
|
|
||||||
|
|
||||||
sess.get("https://webauthn.io/logout")
|
|
||||||
|
|
||||||
payload = {"username":"asdf", "user_verification":"preferred", "hints":[]}
|
|
||||||
resp = sess.post("https://webauthn.io/authentication/options", json=payload, headers={"origin": "https://webauthn.io"})
|
|
||||||
print(resp.json())
|
|
||||||
data = passkey.get(resp.json(), origin="https://webauthn.io")
|
|
||||||
print(data)
|
|
||||||
data["rawId"] = data["id"]
|
|
||||||
resp = sess.post("https://webauthn.io/authentication/verification", json={"response": data, "username": "asdf"})
|
|
||||||
print(resp.json())
|
|
||||||
378
seed.py
378
seed.py
@@ -1,378 +0,0 @@
|
|||||||
from Crypto.Util.Padding import pad
|
|
||||||
import struct
|
|
||||||
|
|
||||||
SS0 = [
|
|
||||||
0x2989a1a8, 0x05858184, 0x16c6d2d4, 0x13c3d3d0, 0x14445054, 0x1d0d111c, 0x2c8ca0ac, 0x25052124,
|
|
||||||
0x1d4d515c, 0x03434340, 0x18081018, 0x1e0e121c, 0x11415150, 0x3cccf0fc, 0x0acac2c8, 0x23436360,
|
|
||||||
0x28082028, 0x04444044, 0x20002020, 0x1d8d919c, 0x20c0e0e0, 0x22c2e2e0, 0x08c8c0c8, 0x17071314,
|
|
||||||
0x2585a1a4, 0x0f8f838c, 0x03030300, 0x3b4b7378, 0x3b8bb3b8, 0x13031310, 0x12c2d2d0, 0x2ecee2ec,
|
|
||||||
0x30407070, 0x0c8c808c, 0x3f0f333c, 0x2888a0a8, 0x32023230, 0x1dcdd1dc, 0x36c6f2f4, 0x34447074,
|
|
||||||
0x2ccce0ec, 0x15859194, 0x0b0b0308, 0x17475354, 0x1c4c505c, 0x1b4b5358, 0x3d8db1bc, 0x01010100,
|
|
||||||
0x24042024, 0x1c0c101c, 0x33437370, 0x18889098, 0x10001010, 0x0cccc0cc, 0x32c2f2f0, 0x19c9d1d8,
|
|
||||||
0x2c0c202c, 0x27c7e3e4, 0x32427270, 0x03838380, 0x1b8b9398, 0x11c1d1d0, 0x06868284, 0x09c9c1c8,
|
|
||||||
0x20406060, 0x10405050, 0x2383a3a0, 0x2bcbe3e8, 0x0d0d010c, 0x3686b2b4, 0x1e8e929c, 0x0f4f434c,
|
|
||||||
0x3787b3b4, 0x1a4a5258, 0x06c6c2c4, 0x38487078, 0x2686a2a4, 0x12021210, 0x2f8fa3ac, 0x15c5d1d4,
|
|
||||||
0x21416160, 0x03c3c3c0, 0x3484b0b4, 0x01414140, 0x12425250, 0x3d4d717c, 0x0d8d818c, 0x08080008,
|
|
||||||
0x1f0f131c, 0x19899198, 0x00000000, 0x19091118, 0x04040004, 0x13435350, 0x37c7f3f4, 0x21c1e1e0,
|
|
||||||
0x3dcdf1fc, 0x36467274, 0x2f0f232c, 0x27072324, 0x3080b0b0, 0x0b8b8388, 0x0e0e020c, 0x2b8ba3a8,
|
|
||||||
0x2282a2a0, 0x2e4e626c, 0x13839390, 0x0d4d414c, 0x29496168, 0x3c4c707c, 0x09090108, 0x0a0a0208,
|
|
||||||
0x3f8fb3bc, 0x2fcfe3ec, 0x33c3f3f0, 0x05c5c1c4, 0x07878384, 0x14041014, 0x3ecef2fc, 0x24446064,
|
|
||||||
0x1eced2dc, 0x2e0e222c, 0x0b4b4348, 0x1a0a1218, 0x06060204, 0x21012120, 0x2b4b6368, 0x26466264,
|
|
||||||
0x02020200, 0x35c5f1f4, 0x12829290, 0x0a8a8288, 0x0c0c000c, 0x3383b3b0, 0x3e4e727c, 0x10c0d0d0,
|
|
||||||
0x3a4a7278, 0x07474344, 0x16869294, 0x25c5e1e4, 0x26062224, 0x00808080, 0x2d8da1ac, 0x1fcfd3dc,
|
|
||||||
0x2181a1a0, 0x30003030, 0x37073334, 0x2e8ea2ac, 0x36063234, 0x15051114, 0x22022220, 0x38083038,
|
|
||||||
0x34c4f0f4, 0x2787a3a4, 0x05454144, 0x0c4c404c, 0x01818180, 0x29c9e1e8, 0x04848084, 0x17879394,
|
|
||||||
0x35053134, 0x0bcbc3c8, 0x0ecec2cc, 0x3c0c303c, 0x31417170, 0x11011110, 0x07c7c3c4, 0x09898188,
|
|
||||||
0x35457174, 0x3bcbf3f8, 0x1acad2d8, 0x38c8f0f8, 0x14849094, 0x19495158, 0x02828280, 0x04c4c0c4,
|
|
||||||
0x3fcff3fc, 0x09494148, 0x39093138, 0x27476364, 0x00c0c0c0, 0x0fcfc3cc, 0x17c7d3d4, 0x3888b0b8,
|
|
||||||
0x0f0f030c, 0x0e8e828c, 0x02424240, 0x23032320, 0x11819190, 0x2c4c606c, 0x1bcbd3d8, 0x2484a0a4,
|
|
||||||
0x34043034, 0x31c1f1f0, 0x08484048, 0x02c2c2c0, 0x2f4f636c, 0x3d0d313c, 0x2d0d212c, 0x00404040,
|
|
||||||
0x3e8eb2bc, 0x3e0e323c, 0x3c8cb0bc, 0x01c1c1c0, 0x2a8aa2a8, 0x3a8ab2b8, 0x0e4e424c, 0x15455154,
|
|
||||||
0x3b0b3338, 0x1cccd0dc, 0x28486068, 0x3f4f737c, 0x1c8c909c, 0x18c8d0d8, 0x0a4a4248, 0x16465254,
|
|
||||||
0x37477374, 0x2080a0a0, 0x2dcde1ec, 0x06464244, 0x3585b1b4, 0x2b0b2328, 0x25456164, 0x3acaf2f8,
|
|
||||||
0x23c3e3e0, 0x3989b1b8, 0x3181b1b0, 0x1f8f939c, 0x1e4e525c, 0x39c9f1f8, 0x26c6e2e4, 0x3282b2b0,
|
|
||||||
0x31013130, 0x2acae2e8, 0x2d4d616c, 0x1f4f535c, 0x24c4e0e4, 0x30c0f0f0, 0x0dcdc1cc, 0x08888088,
|
|
||||||
0x16061214, 0x3a0a3238, 0x18485058, 0x14c4d0d4, 0x22426260, 0x29092128, 0x07070304, 0x33033330,
|
|
||||||
0x28c8e0e8, 0x1b0b1318, 0x05050104, 0x39497178, 0x10809090, 0x2a4a6268, 0x2a0a2228, 0x1a8a9298
|
|
||||||
]
|
|
||||||
|
|
||||||
SS1 = [
|
|
||||||
0x38380830, 0xe828c8e0, 0x2c2d0d21, 0xa42686a2, 0xcc0fcfc3, 0xdc1eced2, 0xb03383b3, 0xb83888b0,
|
|
||||||
0xac2f8fa3, 0x60204060, 0x54154551, 0xc407c7c3, 0x44044440, 0x6c2f4f63, 0x682b4b63, 0x581b4b53,
|
|
||||||
0xc003c3c3, 0x60224262, 0x30330333, 0xb43585b1, 0x28290921, 0xa02080a0, 0xe022c2e2, 0xa42787a3,
|
|
||||||
0xd013c3d3, 0x90118191, 0x10110111, 0x04060602, 0x1c1c0c10, 0xbc3c8cb0, 0x34360632, 0x480b4b43,
|
|
||||||
0xec2fcfe3, 0x88088880, 0x6c2c4c60, 0xa82888a0, 0x14170713, 0xc404c4c0, 0x14160612, 0xf434c4f0,
|
|
||||||
0xc002c2c2, 0x44054541, 0xe021c1e1, 0xd416c6d2, 0x3c3f0f33, 0x3c3d0d31, 0x8c0e8e82, 0x98188890,
|
|
||||||
0x28280820, 0x4c0e4e42, 0xf436c6f2, 0x3c3e0e32, 0xa42585a1, 0xf839c9f1, 0x0c0d0d01, 0xdc1fcfd3,
|
|
||||||
0xd818c8d0, 0x282b0b23, 0x64264662, 0x783a4a72, 0x24270723, 0x2c2f0f23, 0xf031c1f1, 0x70324272,
|
|
||||||
0x40024242, 0xd414c4d0, 0x40014141, 0xc000c0c0, 0x70334373, 0x64274763, 0xac2c8ca0, 0x880b8b83,
|
|
||||||
0xf437c7f3, 0xac2d8da1, 0x80008080, 0x1c1f0f13, 0xc80acac2, 0x2c2c0c20, 0xa82a8aa2, 0x34340430,
|
|
||||||
0xd012c2d2, 0x080b0b03, 0xec2ecee2, 0xe829c9e1, 0x5c1d4d51, 0x94148490, 0x18180810, 0xf838c8f0,
|
|
||||||
0x54174753, 0xac2e8ea2, 0x08080800, 0xc405c5c1, 0x10130313, 0xcc0dcdc1, 0x84068682, 0xb83989b1,
|
|
||||||
0xfc3fcff3, 0x7c3d4d71, 0xc001c1c1, 0x30310131, 0xf435c5f1, 0x880a8a82, 0x682a4a62, 0xb03181b1,
|
|
||||||
0xd011c1d1, 0x20200020, 0xd417c7d3, 0x00020202, 0x20220222, 0x04040400, 0x68284860, 0x70314171,
|
|
||||||
0x04070703, 0xd81bcbd3, 0x9c1d8d91, 0x98198991, 0x60214161, 0xbc3e8eb2, 0xe426c6e2, 0x58194951,
|
|
||||||
0xdc1dcdd1, 0x50114151, 0x90108090, 0xdc1cccd0, 0x981a8a92, 0xa02383a3, 0xa82b8ba3, 0xd010c0d0,
|
|
||||||
0x80018181, 0x0c0f0f03, 0x44074743, 0x181a0a12, 0xe023c3e3, 0xec2ccce0, 0x8c0d8d81, 0xbc3f8fb3,
|
|
||||||
0x94168692, 0x783b4b73, 0x5c1c4c50, 0xa02282a2, 0xa02181a1, 0x60234363, 0x20230323, 0x4c0d4d41,
|
|
||||||
0xc808c8c0, 0x9c1e8e92, 0x9c1c8c90, 0x383a0a32, 0x0c0c0c00, 0x2c2e0e22, 0xb83a8ab2, 0x6c2e4e62,
|
|
||||||
0x9c1f8f93, 0x581a4a52, 0xf032c2f2, 0x90128292, 0xf033c3f3, 0x48094941, 0x78384870, 0xcc0cccc0,
|
|
||||||
0x14150511, 0xf83bcbf3, 0x70304070, 0x74354571, 0x7c3f4f73, 0x34350531, 0x10100010, 0x00030303,
|
|
||||||
0x64244460, 0x6c2d4d61, 0xc406c6c2, 0x74344470, 0xd415c5d1, 0xb43484b0, 0xe82acae2, 0x08090901,
|
|
||||||
0x74364672, 0x18190911, 0xfc3ecef2, 0x40004040, 0x10120212, 0xe020c0e0, 0xbc3d8db1, 0x04050501,
|
|
||||||
0xf83acaf2, 0x00010101, 0xf030c0f0, 0x282a0a22, 0x5c1e4e52, 0xa82989a1, 0x54164652, 0x40034343,
|
|
||||||
0x84058581, 0x14140410, 0x88098981, 0x981b8b93, 0xb03080b0, 0xe425c5e1, 0x48084840, 0x78394971,
|
|
||||||
0x94178793, 0xfc3cccf0, 0x1c1e0e12, 0x80028282, 0x20210121, 0x8c0c8c80, 0x181b0b13, 0x5c1f4f53,
|
|
||||||
0x74374773, 0x54144450, 0xb03282b2, 0x1c1d0d11, 0x24250521, 0x4c0f4f43, 0x00000000, 0x44064642,
|
|
||||||
0xec2dcde1, 0x58184850, 0x50124252, 0xe82bcbe3, 0x7c3e4e72, 0xd81acad2, 0xc809c9c1, 0xfc3dcdf1,
|
|
||||||
0x30300030, 0x94158591, 0x64254561, 0x3c3c0c30, 0xb43686b2, 0xe424c4e0, 0xb83b8bb3, 0x7c3c4c70,
|
|
||||||
0x0c0e0e02, 0x50104050, 0x38390931, 0x24260622, 0x30320232, 0x84048480, 0x68294961, 0x90138393,
|
|
||||||
0x34370733, 0xe427c7e3, 0x24240420, 0xa42484a0, 0xc80bcbc3, 0x50134353, 0x080a0a02, 0x84078783,
|
|
||||||
0xd819c9d1, 0x4c0c4c40, 0x80038383, 0x8c0f8f83, 0xcc0ecec2, 0x383b0b33, 0x480a4a42, 0xb43787b3
|
|
||||||
]
|
|
||||||
|
|
||||||
SS2 = [
|
|
||||||
0xa1a82989, 0x81840585, 0xd2d416c6, 0xd3d013c3, 0x50541444, 0x111c1d0d, 0xa0ac2c8c, 0x21242505,
|
|
||||||
0x515c1d4d, 0x43400343, 0x10181808, 0x121c1e0e, 0x51501141, 0xf0fc3ccc, 0xc2c80aca, 0x63602343,
|
|
||||||
0x20282808, 0x40440444, 0x20202000, 0x919c1d8d, 0xe0e020c0, 0xe2e022c2, 0xc0c808c8, 0x13141707,
|
|
||||||
0xa1a42585, 0x838c0f8f, 0x03000303, 0x73783b4b, 0xb3b83b8b, 0x13101303, 0xd2d012c2, 0xe2ec2ece,
|
|
||||||
0x70703040, 0x808c0c8c, 0x333c3f0f, 0xa0a82888, 0x32303202, 0xd1dc1dcd, 0xf2f436c6, 0x70743444,
|
|
||||||
0xe0ec2ccc, 0x91941585, 0x03080b0b, 0x53541747, 0x505c1c4c, 0x53581b4b, 0xb1bc3d8d, 0x01000101,
|
|
||||||
0x20242404, 0x101c1c0c, 0x73703343, 0x90981888, 0x10101000, 0xc0cc0ccc, 0xf2f032c2, 0xd1d819c9,
|
|
||||||
0x202c2c0c, 0xe3e427c7, 0x72703242, 0x83800383, 0x93981b8b, 0xd1d011c1, 0x82840686, 0xc1c809c9,
|
|
||||||
0x60602040, 0x50501040, 0xa3a02383, 0xe3e82bcb, 0x010c0d0d, 0xb2b43686, 0x929c1e8e, 0x434c0f4f,
|
|
||||||
0xb3b43787, 0x52581a4a, 0xc2c406c6, 0x70783848, 0xa2a42686, 0x12101202, 0xa3ac2f8f, 0xd1d415c5,
|
|
||||||
0x61602141, 0xc3c003c3, 0xb0b43484, 0x41400141, 0x52501242, 0x717c3d4d, 0x818c0d8d, 0x00080808,
|
|
||||||
0x131c1f0f, 0x91981989, 0x00000000, 0x11181909, 0x00040404, 0x53501343, 0xf3f437c7, 0xe1e021c1,
|
|
||||||
0xf1fc3dcd, 0x72743646, 0x232c2f0f, 0x23242707, 0xb0b03080, 0x83880b8b, 0x020c0e0e, 0xa3a82b8b,
|
|
||||||
0xa2a02282, 0x626c2e4e, 0x93901383, 0x414c0d4d, 0x61682949, 0x707c3c4c, 0x01080909, 0x02080a0a,
|
|
||||||
0xb3bc3f8f, 0xe3ec2fcf, 0xf3f033c3, 0xc1c405c5, 0x83840787, 0x10141404, 0xf2fc3ece, 0x60642444,
|
|
||||||
0xd2dc1ece, 0x222c2e0e, 0x43480b4b, 0x12181a0a, 0x02040606, 0x21202101, 0x63682b4b, 0x62642646,
|
|
||||||
0x02000202, 0xf1f435c5, 0x92901282, 0x82880a8a, 0x000c0c0c, 0xb3b03383, 0x727c3e4e, 0xd0d010c0,
|
|
||||||
0x72783a4a, 0x43440747, 0x92941686, 0xe1e425c5, 0x22242606, 0x80800080, 0xa1ac2d8d, 0xd3dc1fcf,
|
|
||||||
0xa1a02181, 0x30303000, 0x33343707, 0xa2ac2e8e, 0x32343606, 0x11141505, 0x22202202, 0x30383808,
|
|
||||||
0xf0f434c4, 0xa3a42787, 0x41440545, 0x404c0c4c, 0x81800181, 0xe1e829c9, 0x80840484, 0x93941787,
|
|
||||||
0x31343505, 0xc3c80bcb, 0xc2cc0ece, 0x303c3c0c, 0x71703141, 0x11101101, 0xc3c407c7, 0x81880989,
|
|
||||||
0x71743545, 0xf3f83bcb, 0xd2d81aca, 0xf0f838c8, 0x90941484, 0x51581949, 0x82800282, 0xc0c404c4,
|
|
||||||
0xf3fc3fcf, 0x41480949, 0x31383909, 0x63642747, 0xc0c000c0, 0xc3cc0fcf, 0xd3d417c7, 0xb0b83888,
|
|
||||||
0x030c0f0f, 0x828c0e8e, 0x42400242, 0x23202303, 0x91901181, 0x606c2c4c, 0xd3d81bcb, 0xa0a42484,
|
|
||||||
0x30343404, 0xf1f031c1, 0x40480848, 0xc2c002c2, 0x636c2f4f, 0x313c3d0d, 0x212c2d0d, 0x40400040,
|
|
||||||
0xb2bc3e8e, 0x323c3e0e, 0xb0bc3c8c, 0xc1c001c1, 0xa2a82a8a, 0xb2b83a8a, 0x424c0e4e, 0x51541545,
|
|
||||||
0x33383b0b, 0xd0dc1ccc, 0x60682848, 0x737c3f4f, 0x909c1c8c, 0xd0d818c8, 0x42480a4a, 0x52541646,
|
|
||||||
0x73743747, 0xa0a02080, 0xe1ec2dcd, 0x42440646, 0xb1b43585, 0x23282b0b, 0x61642545, 0xf2f83aca,
|
|
||||||
0xe3e023c3, 0xb1b83989, 0xb1b03181, 0x939c1f8f, 0x525c1e4e, 0xf1f839c9, 0xe2e426c6, 0xb2b03282,
|
|
||||||
0x31303101, 0xe2e82aca, 0x616c2d4d, 0x535c1f4f, 0xe0e424c4, 0xf0f030c0, 0xc1cc0dcd, 0x80880888,
|
|
||||||
0x12141606, 0x32383a0a, 0x50581848, 0xd0d414c4, 0x62602242, 0x21282909, 0x03040707, 0x33303303,
|
|
||||||
0xe0e828c8, 0x13181b0b, 0x01040505, 0x71783949, 0x90901080, 0x62682a4a, 0x22282a0a, 0x92981a8a
|
|
||||||
]
|
|
||||||
|
|
||||||
SS3 = [
|
|
||||||
0x08303838, 0xc8e0e828, 0x0d212c2d, 0x86a2a426, 0xcfc3cc0f, 0xced2dc1e, 0x83b3b033, 0x88b0b838,
|
|
||||||
0x8fa3ac2f, 0x40606020, 0x45515415, 0xc7c3c407, 0x44404404, 0x4f636c2f, 0x4b63682b, 0x4b53581b,
|
|
||||||
0xc3c3c003, 0x42626022, 0x03333033, 0x85b1b435, 0x09212829, 0x80a0a020, 0xc2e2e022, 0x87a3a427,
|
|
||||||
0xc3d3d013, 0x81919011, 0x01111011, 0x06020406, 0x0c101c1c, 0x8cb0bc3c, 0x06323436, 0x4b43480b,
|
|
||||||
0xcfe3ec2f, 0x88808808, 0x4c606c2c, 0x88a0a828, 0x07131417, 0xc4c0c404, 0x06121416, 0xc4f0f434,
|
|
||||||
0xc2c2c002, 0x45414405, 0xc1e1e021, 0xc6d2d416, 0x0f333c3f, 0x0d313c3d, 0x8e828c0e, 0x88909818,
|
|
||||||
0x08202828, 0x4e424c0e, 0xc6f2f436, 0x0e323c3e, 0x85a1a425, 0xc9f1f839, 0x0d010c0d, 0xcfd3dc1f,
|
|
||||||
0xc8d0d818, 0x0b23282b, 0x46626426, 0x4a72783a, 0x07232427, 0x0f232c2f, 0xc1f1f031, 0x42727032,
|
|
||||||
0x42424002, 0xc4d0d414, 0x41414001, 0xc0c0c000, 0x43737033, 0x47636427, 0x8ca0ac2c, 0x8b83880b,
|
|
||||||
0xc7f3f437, 0x8da1ac2d, 0x80808000, 0x0f131c1f, 0xcac2c80a, 0x0c202c2c, 0x8aa2a82a, 0x04303434,
|
|
||||||
0xc2d2d012, 0x0b03080b, 0xcee2ec2e, 0xc9e1e829, 0x4d515c1d, 0x84909414, 0x08101818, 0xc8f0f838,
|
|
||||||
0x47535417, 0x8ea2ac2e, 0x08000808, 0xc5c1c405, 0x03131013, 0xcdc1cc0d, 0x86828406, 0x89b1b839,
|
|
||||||
0xcff3fc3f, 0x4d717c3d, 0xc1c1c001, 0x01313031, 0xc5f1f435, 0x8a82880a, 0x4a62682a, 0x81b1b031,
|
|
||||||
0xc1d1d011, 0x00202020, 0xc7d3d417, 0x02020002, 0x02222022, 0x04000404, 0x48606828, 0x41717031,
|
|
||||||
0x07030407, 0xcbd3d81b, 0x8d919c1d, 0x89919819, 0x41616021, 0x8eb2bc3e, 0xc6e2e426, 0x49515819,
|
|
||||||
0xcdd1dc1d, 0x41515011, 0x80909010, 0xccd0dc1c, 0x8a92981a, 0x83a3a023, 0x8ba3a82b, 0xc0d0d010,
|
|
||||||
0x81818001, 0x0f030c0f, 0x47434407, 0x0a12181a, 0xc3e3e023, 0xcce0ec2c, 0x8d818c0d, 0x8fb3bc3f,
|
|
||||||
0x86929416, 0x4b73783b, 0x4c505c1c, 0x82a2a022, 0x81a1a021, 0x43636023, 0x03232023, 0x4d414c0d,
|
|
||||||
0xc8c0c808, 0x8e929c1e, 0x8c909c1c, 0x0a32383a, 0x0c000c0c, 0x0e222c2e, 0x8ab2b83a, 0x4e626c2e,
|
|
||||||
0x8f939c1f, 0x4a52581a, 0xc2f2f032, 0x82929012, 0xc3f3f033, 0x49414809, 0x48707838, 0xccc0cc0c,
|
|
||||||
0x05111415, 0xcbf3f83b, 0x40707030, 0x45717435, 0x4f737c3f, 0x05313435, 0x00101010, 0x03030003,
|
|
||||||
0x44606424, 0x4d616c2d, 0xc6c2c406, 0x44707434, 0xc5d1d415, 0x84b0b434, 0xcae2e82a, 0x09010809,
|
|
||||||
0x46727436, 0x09111819, 0xcef2fc3e, 0x40404000, 0x02121012, 0xc0e0e020, 0x8db1bc3d, 0x05010405,
|
|
||||||
0xcaf2f83a, 0x01010001, 0xc0f0f030, 0x0a22282a, 0x4e525c1e, 0x89a1a829, 0x46525416, 0x43434003,
|
|
||||||
0x85818405, 0x04101414, 0x89818809, 0x8b93981b, 0x80b0b030, 0xc5e1e425, 0x48404808, 0x49717839,
|
|
||||||
0x87939417, 0xccf0fc3c, 0x0e121c1e, 0x82828002, 0x01212021, 0x8c808c0c, 0x0b13181b, 0x4f535c1f,
|
|
||||||
0x47737437, 0x44505414, 0x82b2b032, 0x0d111c1d, 0x05212425, 0x4f434c0f, 0x00000000, 0x46424406,
|
|
||||||
0xcde1ec2d, 0x48505818, 0x42525012, 0xcbe3e82b, 0x4e727c3e, 0xcad2d81a, 0xc9c1c809, 0xcdf1fc3d,
|
|
||||||
0x00303030, 0x85919415, 0x45616425, 0x0c303c3c, 0x86b2b436, 0xc4e0e424, 0x8bb3b83b, 0x4c707c3c,
|
|
||||||
0x0e020c0e, 0x40505010, 0x09313839, 0x06222426, 0x02323032, 0x84808404, 0x49616829, 0x83939013,
|
|
||||||
0x07333437, 0xc7e3e427, 0x04202424, 0x84a0a424, 0xcbc3c80b, 0x43535013, 0x0a02080a, 0x87838407,
|
|
||||||
0xc9d1d819, 0x4c404c0c, 0x83838003, 0x8f838c0f, 0xcec2cc0e, 0x0b33383b, 0x4a42480a, 0x87b3b437
|
|
||||||
]
|
|
||||||
|
|
||||||
KC = [
|
|
||||||
0x9e3779b9, 0x3c6ef373, 0x78dde6e6, 0xf1bbcdcc, 0xe3779b99, 0xc6ef3733, 0x8dde6e67, 0x1bbcdccf,
|
|
||||||
0x3779b99e, 0x6ef3733c, 0xdde6e678, 0xbbcdccf1, 0x779b99e3, 0xef3733c6, 0xde6e678d, 0xbcdccf1b
|
|
||||||
]
|
|
||||||
|
|
||||||
BLOCK_SIZE = 16
|
|
||||||
|
|
||||||
def bytes_to_uint32(data, offset=0):
|
|
||||||
return struct.unpack("<I", data[offset:offset+4])[0]
|
|
||||||
|
|
||||||
def uint32_to_bytes(value):
|
|
||||||
return struct.pack("<I", value & 0xFFFFFFFF)
|
|
||||||
|
|
||||||
def get_byte(value, index):
|
|
||||||
return (value >> (index * 8)) & 0xFF
|
|
||||||
|
|
||||||
def endian_change(value):
|
|
||||||
bts = value.to_bytes((value.bit_length() + 7) // 8, byteorder='big') or b'\x00'
|
|
||||||
rv_bts = bts[::-1]
|
|
||||||
return int.from_bytes(rv_bts, byteorder='big')
|
|
||||||
|
|
||||||
def limit_to_uint32(val: int):
|
|
||||||
return bytes_to_uint32(uint32_to_bytes(val))
|
|
||||||
|
|
||||||
def seed_round(l0, l1, r0, r1, key):
|
|
||||||
t0 = r0 ^ key[0]
|
|
||||||
t1 = r1 ^ key[1]
|
|
||||||
t1 ^= t0
|
|
||||||
|
|
||||||
t1 = SS0[get_byte(t1, 0)] ^ SS1[get_byte(t1, 1)] ^ SS2[get_byte(t1, 2)] ^ SS3[get_byte(t1, 3)]
|
|
||||||
t0 += t1
|
|
||||||
|
|
||||||
t0 = SS0[get_byte(t0, 0)] ^ SS1[get_byte(t0, 1)] ^ SS2[get_byte(t0, 2)] ^ SS3[get_byte(t0, 3)]
|
|
||||||
t1 += t0
|
|
||||||
|
|
||||||
t1 = SS0[get_byte(t1, 0)] ^ SS1[get_byte(t1, 1)] ^ SS2[get_byte(t1, 2)] ^ SS3[get_byte(t1, 3)]
|
|
||||||
t0 += t1
|
|
||||||
|
|
||||||
l0 ^= t0
|
|
||||||
l1 ^= t1
|
|
||||||
|
|
||||||
[l0, l1, r0, r1] = \
|
|
||||||
list(map(limit_to_uint32, [l0, l1, r0, r1]))
|
|
||||||
|
|
||||||
return l0, l1, r0, r1
|
|
||||||
|
|
||||||
def round_key_update0(key, loc, a, b, c, d, kc):
|
|
||||||
t0 = a + c - kc
|
|
||||||
t1 = b + kc - d
|
|
||||||
|
|
||||||
key[loc] = SS0[get_byte(t0, 0)] ^ SS1[get_byte(t0, 1)] ^ SS2[get_byte(t0, 2)] ^ SS3[get_byte(t0, 3)]
|
|
||||||
key[loc+1] = SS0[get_byte(t1, 0)] ^ SS1[get_byte(t1, 1)] ^ SS2[get_byte(t1, 2)] ^ SS3[get_byte(t1, 3)]
|
|
||||||
|
|
||||||
t0 = a
|
|
||||||
a = (a >> 8) ^ (b << 24)
|
|
||||||
b = (b >> 8) ^ (t0 << 24)
|
|
||||||
|
|
||||||
[a, b, c, d] = \
|
|
||||||
list(map(limit_to_uint32, [a, b, c, d]))
|
|
||||||
|
|
||||||
return a, b, c, d
|
|
||||||
|
|
||||||
def round_key_update1(key, loc, a, b, c, d, kc):
|
|
||||||
t0 = a + c - kc
|
|
||||||
t1 = b + kc - d
|
|
||||||
|
|
||||||
key[loc] = SS0[get_byte(t0, 0)] ^ SS1[get_byte(t0, 1)] ^ SS2[get_byte(t0, 2)] ^ SS3[get_byte(t0, 3)]
|
|
||||||
key[loc+1] = SS0[get_byte(t1, 0)] ^ SS1[get_byte(t1, 1)] ^ SS2[get_byte(t1, 2)] ^ SS3[get_byte(t1, 3)]
|
|
||||||
|
|
||||||
t0 = c
|
|
||||||
c = (c << 8) ^ (d >> 24)
|
|
||||||
d = (d << 8) ^ (t0 >> 24)
|
|
||||||
|
|
||||||
[a, b, c, d] = \
|
|
||||||
list(map(limit_to_uint32, [a, b, c, d]))
|
|
||||||
|
|
||||||
return a, b, c, d
|
|
||||||
|
|
||||||
def seed_key_schedule(user_key):
|
|
||||||
round_keys = [0] * 32
|
|
||||||
|
|
||||||
a = bytes_to_uint32(user_key, 0)
|
|
||||||
b = bytes_to_uint32(user_key, 4)
|
|
||||||
c = bytes_to_uint32(user_key, 8)
|
|
||||||
d = bytes_to_uint32(user_key, 12)
|
|
||||||
|
|
||||||
a = endian_change(a)
|
|
||||||
b = endian_change(b)
|
|
||||||
c = endian_change(c)
|
|
||||||
d = endian_change(d)
|
|
||||||
|
|
||||||
a, b, c, d = round_key_update0(round_keys, 0, a, b, c, d, KC[0])
|
|
||||||
a, b, c, d = round_key_update1(round_keys, 2, a, b, c, d, KC[1])
|
|
||||||
a, b, c, d = round_key_update0(round_keys, 4, a, b, c, d, KC[2])
|
|
||||||
a, b, c, d = round_key_update1(round_keys, 6, a, b, c, d, KC[3])
|
|
||||||
a, b, c, d = round_key_update0(round_keys, 8, a, b, c, d, KC[4])
|
|
||||||
a, b, c, d = round_key_update1(round_keys, 10, a, b, c, d, KC[5])
|
|
||||||
a, b, c, d = round_key_update0(round_keys, 12, a, b, c, d, KC[6])
|
|
||||||
a, b, c, d = round_key_update1(round_keys, 14, a, b, c, d, KC[7])
|
|
||||||
a, b, c, d = round_key_update0(round_keys, 16, a, b, c, d, KC[8])
|
|
||||||
a, b, c, d = round_key_update1(round_keys, 18, a, b, c, d, KC[9])
|
|
||||||
a, b, c, d = round_key_update0(round_keys, 20, a, b, c, d, KC[10])
|
|
||||||
a, b, c, d = round_key_update1(round_keys, 22, a, b, c, d, KC[11])
|
|
||||||
a, b, c, d = round_key_update0(round_keys, 24, a, b, c, d, KC[12])
|
|
||||||
a, b, c, d = round_key_update1(round_keys, 26, a, b, c, d, KC[13])
|
|
||||||
a, b, c, d = round_key_update0(round_keys, 28, a, b, c, d, KC[14])
|
|
||||||
|
|
||||||
t0 = a + c - KC[15]
|
|
||||||
t1 = b - d + KC[15]
|
|
||||||
round_keys[30] = SS0[get_byte(t0, 0)] ^ SS1[get_byte(t0, 1)] ^ SS2[get_byte(t0, 2)] ^ SS3[get_byte(t0, 3)]
|
|
||||||
round_keys[31] = SS0[get_byte(t1, 0)] ^ SS1[get_byte(t1, 1)] ^ SS2[get_byte(t1, 2)] ^ SS3[get_byte(t1, 3)]
|
|
||||||
|
|
||||||
return round_keys
|
|
||||||
|
|
||||||
|
|
||||||
def seed_encrypt_block(block, round_keys):
|
|
||||||
l0 = bytes_to_uint32(block, 0)
|
|
||||||
l1 = bytes_to_uint32(block, 4)
|
|
||||||
r0 = bytes_to_uint32(block, 8)
|
|
||||||
r1 = bytes_to_uint32(block, 12)
|
|
||||||
|
|
||||||
[l0, l1, r0, r1] = list(map(endian_change, [l0, l1, r0, r1]))
|
|
||||||
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[0:2])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[2:4])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[4:6])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[6:8])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[8:10])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[10:12])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[12:14])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[14:16])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[16:18])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[18:20])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[20:22])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[22:24])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[24:26])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[26:28])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[28:30])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[30:32])
|
|
||||||
|
|
||||||
[l0, l1, r0, r1] = list(map(endian_change, [l0, l1, r0, r1]))
|
|
||||||
|
|
||||||
ciphertext = uint32_to_bytes(r0) + uint32_to_bytes(r1) + uint32_to_bytes(l0) + uint32_to_bytes(l1)
|
|
||||||
return ciphertext
|
|
||||||
|
|
||||||
def seed_decrypt_block(block, round_keys):
|
|
||||||
l0 = bytes_to_uint32(block, 0)
|
|
||||||
l1 = bytes_to_uint32(block, 4)
|
|
||||||
r0 = bytes_to_uint32(block, 8)
|
|
||||||
r1 = bytes_to_uint32(block, 12)
|
|
||||||
|
|
||||||
[l0, l1, r0, r1] = list(map(endian_change, [l0, l1, r0, r1]))
|
|
||||||
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[30:32])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[28:30])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[26:28])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[24:26])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[22:24])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[20:22])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[18:20])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[16:18])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[14:16])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[12:14])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[10:12])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[8:10])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[6:8])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[4:6])
|
|
||||||
l0, l1, r0, r1 = seed_round(l0, l1, r0, r1, round_keys[2:4])
|
|
||||||
r0, r1, l0, l1 = seed_round(r0, r1, l0, l1, round_keys[0:2])
|
|
||||||
|
|
||||||
[l0, l1, r0, r1] = list(map(endian_change, [l0, l1, r0, r1]))
|
|
||||||
|
|
||||||
plaintext = uint32_to_bytes(r0) + uint32_to_bytes(r1) + uint32_to_bytes(l0) + uint32_to_bytes(l1)
|
|
||||||
return plaintext
|
|
||||||
|
|
||||||
BLOCK_SIZE = 16
|
|
||||||
|
|
||||||
def custom_pad(data, block_size):
|
|
||||||
padding_length = block_size - (len(data) % block_size)
|
|
||||||
if padding_length == 0:
|
|
||||||
padding_length = block_size
|
|
||||||
padding = bytes([0] * (padding_length - 1) + [padding_length])
|
|
||||||
return data + padding
|
|
||||||
|
|
||||||
def seed_cbc_encrypt(plaintext, key, iv):
|
|
||||||
padded = pad(plaintext, BLOCK_SIZE)
|
|
||||||
|
|
||||||
round_keys = seed_key_schedule(key)
|
|
||||||
ciphertext = b""
|
|
||||||
prev = iv
|
|
||||||
|
|
||||||
for i in range(0, len(padded), BLOCK_SIZE):
|
|
||||||
block = padded[i:i+BLOCK_SIZE]
|
|
||||||
xored = bytes(a ^ b for a, b in zip(block, prev))
|
|
||||||
cipher_block = seed_encrypt_block(xored, round_keys)
|
|
||||||
ciphertext += cipher_block
|
|
||||||
prev = cipher_block
|
|
||||||
|
|
||||||
return ciphertext
|
|
||||||
|
|
||||||
def seed_cbc_decrypt(ciphertext, key, iv):
|
|
||||||
if len(ciphertext) % BLOCK_SIZE != 0:
|
|
||||||
raise ValueError("Invalid length")
|
|
||||||
|
|
||||||
round_keys = seed_key_schedule(key)
|
|
||||||
plaintext = b""
|
|
||||||
prev = iv
|
|
||||||
for i in range(0, len(ciphertext), BLOCK_SIZE):
|
|
||||||
block = ciphertext[i:i+BLOCK_SIZE]
|
|
||||||
plain_block = seed_decrypt_block(block, round_keys)
|
|
||||||
xored = bytes(a ^ b for a, b in zip(plain_block, prev))
|
|
||||||
plaintext += xored
|
|
||||||
prev = block
|
|
||||||
try:
|
|
||||||
return plaintext[:-plaintext[-1]]
|
|
||||||
except ValueError:
|
|
||||||
print(plaintext)
|
|
||||||
raise ValueError("Invalid padding")
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
user_key = b'0123456789abcdef'
|
|
||||||
print(','.join([hex(i)[2:] for i in user_key]))
|
|
||||||
iv = b'abcdef9876543210'
|
|
||||||
print(','.join([hex(i)[2:] for i in iv]))
|
|
||||||
plaintext = b"Hello, World!"
|
|
||||||
|
|
||||||
print("p:", plaintext)
|
|
||||||
print(','.join([hex(i)[2:] for i in plaintext]))
|
|
||||||
|
|
||||||
ciphertext = seed_cbc_encrypt(plaintext, user_key, iv)
|
|
||||||
print("c:", ciphertext.hex())
|
|
||||||
print(','.join([hex(i)[2:] for i in ciphertext]))
|
|
||||||
|
|
||||||
decrypted = seed_cbc_decrypt(ciphertext, user_key, iv)
|
|
||||||
print("d:", decrypted)
|
|
||||||
Reference in New Issue
Block a user