2019-12-08 22:43:49 +01:00
|
|
|
import binascii
|
|
|
|
import hashlib
|
2021-06-07 07:46:39 +02:00
|
|
|
from typing import Optional
|
|
|
|
from typing_extensions import Final
|
2019-12-08 22:43:49 +01:00
|
|
|
|
|
|
|
from bemani.protocol.lz77 import Lz77
|
|
|
|
from bemani.protocol.binary import BinaryEncoding
|
|
|
|
from bemani.protocol.xml import XmlEncoding
|
|
|
|
from bemani.protocol.node import Node
|
|
|
|
|
|
|
|
|
|
|
|
class EAmuseException(Exception):
|
|
|
|
"""
|
|
|
|
An exception thrown when we encounter an error with E-Amusement encapsulation.
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
|
|
class EAmuseProtocol:
|
|
|
|
"""
|
|
|
|
A wrapper object that encapsulates encoding/decoding the E-Amusement protocol by Konami.
|
|
|
|
"""
|
2021-05-31 20:09:40 +02:00
|
|
|
SHARED_SECRET: Final[bytes] = b'\x69\xD7\x46\x27\xD9\x85\xEE\x21\x87\x16\x15\x70\xD0\x8D\x93\xB1\x24\x55\x03\x5B\x6D\xF0\xD8\x20\x5D\xF5'
|
2019-12-08 22:43:49 +01:00
|
|
|
|
2021-05-31 20:09:40 +02:00
|
|
|
XML: Final[int] = 1
|
|
|
|
BINARY: Final[int] = 2
|
2022-09-09 14:44:29 +02:00
|
|
|
BINARY_DECOMPRESSED: Final[int] = 3
|
2019-12-08 22:43:49 +01:00
|
|
|
|
2021-05-31 20:09:40 +02:00
|
|
|
SHIFT_JIS_LEGACY: Final[str] = "shift-jis-legacy"
|
|
|
|
SHIFT_JIS: Final[str] = "shift-jis"
|
|
|
|
EUC_JP: Final[str] = "euc-jp"
|
|
|
|
UTF_8: Final[str] = "utf-8"
|
|
|
|
ASCII: Final[str] = "ascii"
|
2019-12-08 22:43:49 +01:00
|
|
|
|
|
|
|
def __init__(self) -> None:
|
|
|
|
"""
|
|
|
|
Initialize the object.
|
|
|
|
"""
|
|
|
|
self.last_text_encoding: Optional[str] = None
|
|
|
|
self.last_packet_encoding: Optional[int] = None
|
|
|
|
|
2021-05-31 20:09:40 +02:00
|
|
|
def _rc4_crypt(self, data: bytes, key: bytes) -> bytes:
|
2019-12-08 22:43:49 +01:00
|
|
|
"""
|
|
|
|
Given a data blob and a key blob, perform RC4 encryption/decryption.
|
|
|
|
|
|
|
|
Parameters:
|
|
|
|
data - Binary string representing data to be encrypted/decrypted
|
|
|
|
key - Binary string representing the key to use
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
binary string representing the encrypted/decrypted data
|
|
|
|
"""
|
|
|
|
S = list(range(256))
|
|
|
|
j = 0
|
|
|
|
out = []
|
|
|
|
|
|
|
|
# KSA Phase
|
|
|
|
for i in range(256):
|
|
|
|
j = (j + S[i] + key[i % len(key)]) & 0xFF
|
|
|
|
S[i], S[j] = S[j], S[i]
|
|
|
|
|
|
|
|
# PRGA Phase
|
|
|
|
i = j = 0
|
|
|
|
for char in data:
|
|
|
|
i = (i + 1) & 0xFF
|
|
|
|
j = (j + S[i]) & 0XFF
|
|
|
|
S[i], S[j] = S[j], S[i]
|
|
|
|
out.append(char ^ S[(S[i] + S[j]) & 0xFF])
|
|
|
|
|
|
|
|
return bytes(out)
|
|
|
|
|
2021-05-31 20:08:31 +02:00
|
|
|
def __decrypt(self, encryption_key: Optional[str], data: bytes) -> bytes:
|
2019-12-08 22:43:49 +01:00
|
|
|
"""
|
|
|
|
Given data and an optional encryption key, decrypt the data.
|
|
|
|
|
|
|
|
Parameters:
|
|
|
|
encryption_key - A string encryption key as returned from a HTTP request.
|
|
|
|
Should be in the form 1-xxyyzzww-aabb. If it is None, this
|
|
|
|
performs a null decrypt.
|
|
|
|
data - Binary string representing data to transform.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
binary string representing transformed data
|
|
|
|
"""
|
2021-05-31 20:08:31 +02:00
|
|
|
key: Optional[bytes] = None
|
2019-12-08 22:43:49 +01:00
|
|
|
if encryption_key:
|
|
|
|
# Key is concatenated with the shared secret above
|
|
|
|
version, first, second = encryption_key.split('-')
|
|
|
|
key = binascii.unhexlify((first + second).encode('ascii')) + EAmuseProtocol.SHARED_SECRET
|
|
|
|
|
|
|
|
# Next, key is sent through MD5 to derive the real key
|
|
|
|
m = hashlib.md5()
|
|
|
|
m.update(key)
|
|
|
|
key = m.digest()
|
|
|
|
|
|
|
|
if key:
|
|
|
|
# This is an encrypted old-style packet
|
2021-05-31 20:09:40 +02:00
|
|
|
return self._rc4_crypt(data, key)
|
2019-12-08 22:43:49 +01:00
|
|
|
|
|
|
|
# No encryption
|
|
|
|
return data
|
|
|
|
|
2021-05-31 20:08:31 +02:00
|
|
|
def __encrypt(self, encryption_key: Optional[str], data: bytes) -> bytes:
|
2019-12-08 22:43:49 +01:00
|
|
|
"""
|
|
|
|
Given data and an optional encryption key, encrypt the data.
|
|
|
|
|
|
|
|
Parameters:
|
|
|
|
encryption_key - A string encryption key as returned from a HTTP request.
|
|
|
|
Should be in the form 1-xxyyzzww-aabb. If it is None, this
|
|
|
|
performs a null decrypt.
|
|
|
|
data - Binary string representing data to transform.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
binary string representing transformed data
|
|
|
|
"""
|
|
|
|
# RC4 is symmetric
|
|
|
|
return self.__decrypt(encryption_key, data)
|
|
|
|
|
2021-05-31 20:08:31 +02:00
|
|
|
def __decompress(self, compression: Optional[str], data: bytes) -> bytes:
|
2019-12-08 22:43:49 +01:00
|
|
|
"""
|
|
|
|
Given data and an optional compression scheme, decompress the data.
|
|
|
|
|
|
|
|
Parameters:
|
|
|
|
compression - A string specifying the compression used. Should
|
|
|
|
be of the form 'l7zz' or 'none'. You can also pass in
|
|
|
|
the python value None.
|
|
|
|
data - Binary string representing data to transform.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
binary string representing transformed data
|
|
|
|
"""
|
2021-05-31 20:08:31 +02:00
|
|
|
if compression is None or compression == 'none':
|
|
|
|
# This isn't compressed
|
|
|
|
return data
|
|
|
|
elif compression == 'lz77':
|
|
|
|
# This is a compressed new-style packet
|
|
|
|
lz = Lz77()
|
|
|
|
return lz.decompress(data)
|
|
|
|
else:
|
|
|
|
raise EAmuseException(f'Unknown compression {compression}')
|
2019-12-08 22:43:49 +01:00
|
|
|
|
2021-05-31 20:08:31 +02:00
|
|
|
def __compress(self, compression: Optional[str], data: bytes) -> bytes:
|
2019-12-08 22:43:49 +01:00
|
|
|
"""
|
|
|
|
Given data and an optional compression scheme, compress the data.
|
|
|
|
|
|
|
|
Parameters:
|
|
|
|
compression - A string specifying the compression used. Should
|
|
|
|
be of the form 'l7zz' or 'none'. The python value
|
|
|
|
None will also be recognized as 'none'.
|
|
|
|
data - Binary string representing data to transform.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
binary string representing transformed data
|
|
|
|
"""
|
2021-05-31 20:08:31 +02:00
|
|
|
if compression is None or compression == 'none':
|
|
|
|
# This isn't compressed
|
|
|
|
return data
|
|
|
|
elif compression == 'lz77':
|
|
|
|
# This is a compressed new-style packet
|
|
|
|
lz = Lz77()
|
|
|
|
return lz.compress(data)
|
|
|
|
else:
|
|
|
|
raise EAmuseException(f'Unknown compression {compression}')
|
2019-12-08 22:43:49 +01:00
|
|
|
|
|
|
|
def __decode(self, data: bytes) -> Node:
|
|
|
|
"""
|
|
|
|
Given data, decode the data into a Node tree.
|
|
|
|
|
|
|
|
Parameters:
|
|
|
|
data - Binary string representing data to decode.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Node tree on success or None on failure.
|
|
|
|
"""
|
|
|
|
# Assume it's a binary page
|
|
|
|
binary = BinaryEncoding()
|
|
|
|
ret = binary.decode(data, skip_on_exceptions=True)
|
|
|
|
|
|
|
|
if ret is not None:
|
|
|
|
# We got a result, it was binary
|
|
|
|
self.last_text_encoding = binary.encoding
|
|
|
|
self.last_packet_encoding = EAmuseProtocol.BINARY
|
|
|
|
|
|
|
|
return ret
|
|
|
|
|
|
|
|
# Assume its XML
|
|
|
|
xml = XmlEncoding()
|
|
|
|
ret = xml.decode(data, skip_on_exceptions=True)
|
|
|
|
|
|
|
|
if ret is not None:
|
|
|
|
# We got a result, it was XML
|
|
|
|
self.last_text_encoding = xml.encoding
|
|
|
|
self.last_packet_encoding = EAmuseProtocol.XML
|
|
|
|
|
|
|
|
return ret
|
|
|
|
|
|
|
|
# Couldn't decode
|
|
|
|
raise EAmuseException('Unknown packet encoding')
|
|
|
|
|
|
|
|
def __encode(self, tree: Node, text_encoding: str, packet_encoding: int) -> bytes:
|
|
|
|
"""
|
|
|
|
Given a Node tree, encode the data into the given packet encoding.
|
|
|
|
|
|
|
|
Parameters:
|
|
|
|
tree - A Node object representing the root of the tree to encode.
|
|
|
|
text_encoding - The text encoding for any strings that will be encoded.
|
|
|
|
Should be EAmuseProtocol.SHIFT_JIS, EAmuseProtocol.EUC_JP or
|
|
|
|
EAmuseProtocol.UTF8.
|
|
|
|
packet_encoding - The encoding used for the packet. Should be EAmuseProtocol.XML
|
|
|
|
or EAmuseProtocol.BINARY.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
A string blob representing the encoded packet.
|
|
|
|
"""
|
|
|
|
if packet_encoding == EAmuseProtocol.BINARY:
|
|
|
|
# It's binary, encode it
|
|
|
|
binary = BinaryEncoding()
|
|
|
|
return binary.encode(tree, encoding=text_encoding)
|
2022-09-09 14:44:29 +02:00
|
|
|
elif packet_encoding == EAmuseProtocol.BINARY_DECOMPRESSED:
|
|
|
|
# It's binary, encode it
|
|
|
|
binary = BinaryEncoding()
|
|
|
|
return binary.encode(tree, encoding=text_encoding, compressed=False)
|
2019-12-08 22:43:49 +01:00
|
|
|
elif packet_encoding == EAmuseProtocol.XML:
|
|
|
|
# It's XML, encode it
|
|
|
|
xml = XmlEncoding()
|
|
|
|
return xml.encode(tree, encoding=text_encoding)
|
|
|
|
else:
|
2020-01-07 22:29:07 +01:00
|
|
|
raise EAmuseException(f"Invalid packet encoding {packet_encoding}")
|
2019-12-08 22:43:49 +01:00
|
|
|
|
|
|
|
def decode(self, compression: Optional[str], encryption: Optional[str], data: bytes) -> Node:
|
|
|
|
"""
|
|
|
|
Given a request with optional compression and encryption set, decrypt,
|
|
|
|
decompress and decode the data, returning a parsed tree.
|
|
|
|
|
|
|
|
Parameters:
|
|
|
|
compression - A string specifying the compression type, should be 'lz77' or 'none'.
|
|
|
|
The python value None can also be passed in.
|
|
|
|
encryption - A string specifying the encryption key, or None if no encryption.
|
|
|
|
data - A binary string of data to parse.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
A Node tree structure representing the parsed request, or None on failure.
|
|
|
|
"""
|
|
|
|
data = self.__decrypt(encryption, data)
|
|
|
|
data = self.__decompress(compression, data)
|
|
|
|
return self.__decode(data)
|
|
|
|
|
|
|
|
def encode(
|
|
|
|
self,
|
|
|
|
compression: Optional[str],
|
|
|
|
encryption: Optional[str],
|
|
|
|
tree: Node,
|
|
|
|
text_encoding: Optional[str]=None,
|
|
|
|
packet_encoding: Optional[int]=None,
|
|
|
|
) -> bytes:
|
|
|
|
"""
|
|
|
|
Given a response with optional compression and encryption set, encode, compress
|
|
|
|
and encrypt the data, returning a binary blob suitable for forwarding on a network.
|
|
|
|
|
|
|
|
Parameters:
|
|
|
|
compression - A string specifying the compression type, should be 'lz77' or 'none'.
|
|
|
|
The python value None can also be passed in.
|
|
|
|
encryption - A string specifying the encryption key, or None if no encryption.
|
|
|
|
data - A binary string of data to parse.
|
|
|
|
text_encoding - A text encoding to use. If not provided, uses the text encoding of the
|
|
|
|
last decoded packet. See __encode for values.
|
|
|
|
packet_encpding - A packet encoding to use. If not provided, uses the packet encoding
|
|
|
|
of the last decoded packet. See __encode for values.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
A blob of data representing the encoded packet.
|
|
|
|
"""
|
|
|
|
# Either auto-set response based on request, or explicitly override in parameters
|
|
|
|
if text_encoding is None:
|
|
|
|
text_encoding = self.last_text_encoding
|
|
|
|
if text_encoding is None:
|
|
|
|
raise EAmuseException("Unknown text encoding")
|
|
|
|
|
|
|
|
if packet_encoding is None:
|
|
|
|
packet_encoding = self.last_packet_encoding
|
|
|
|
if packet_encoding is None:
|
|
|
|
raise EAmuseException("Unknown packet encoding")
|
|
|
|
|
|
|
|
# Clear last packet since we sent a response
|
|
|
|
self.last_text_encoding = None
|
|
|
|
self.last_packet_encoding = None
|
|
|
|
|
|
|
|
data = self.__encode(tree, text_encoding, packet_encoding)
|
|
|
|
data = self.__compress(compression, data)
|
|
|
|
return self.__encrypt(encryption, data)
|