X-Git-Url: http://git.code-monkey.de/?a=blobdiff_plain;f=resources%2Flib%2FMSL.py;h=71f1810a46ce4670732b46f1098688727531111b;hb=465712e1d4368f223d522f178934f16e044fbb1a;hp=83ae2e7abfe2b34cfff46f67f3fc4bc0ff4ff196;hpb=26c305a4ecab0366fa05d1d4c3bc9ee24d170029;p=plugin.video.netflix.git diff --git a/resources/lib/MSL.py b/resources/lib/MSL.py index 83ae2e7..71f1810 100644 --- a/resources/lib/MSL.py +++ b/resources/lib/MSL.py @@ -5,21 +5,17 @@ import os import pprint import random from StringIO import StringIO -from hmac import HMAC -import hashlib import requests import zlib import time -from Crypto.PublicKey import RSA -from Crypto.Cipher import PKCS1_OAEP -from Crypto.Cipher import AES -from Crypto.Random import get_random_bytes -# from Crypto.Hash import HMAC, SHA256 -from Crypto.Util import Padding +from Cryptodome.PublicKey import RSA +from Cryptodome.Cipher import PKCS1_OAEP +from Cryptodome.Cipher import AES +from Cryptodome.Random import get_random_bytes +from Crypto.Hash import HMAC, SHA256 +from Cryptodome.Util import Padding import xml.etree.ElementTree as ET -from common import log -from common import ADDONUSERDATA pp = pprint.PrettyPrinter(indent=4) @@ -49,33 +45,40 @@ class MSL: 'license': 'http://www.netflix.com/api/msl/NFCDCH-LX/cadmium/license' } - def __init__(self, email, password): + def __init__(self, email, password, kodi_helper): """ The Constructor checks for already existing crypto Keys. If they exist it will load the existing keys """ self.email = email self.password = password + self.kodi_helper = kodi_helper try: - os.mkdir(ADDONUSERDATA) + os.mkdir(self.kodi_helper.msl_data_path) except OSError: pass - if self.file_exists('msl_data.json'): + if self.file_exists(self.kodi_helper.msl_data_path, 'msl_data.json'): + self.kodi_helper.log(msg='MSL Data exists. Use old Tokens.') self.__load_msl_data() self.handshake_performed = True - elif self.file_exists('rsa_key.bin'): - log('RSA Keys do already exist load old ones') + elif self.file_exists(self.kodi_helper.msl_data_path, 'rsa_key.bin'): + self.kodi_helper.log(msg='RSA Keys do already exist load old ones') self.__load_rsa_keys() self.__perform_key_handshake() else: - log('Create new RSA Keys') + self.kodi_helper.log(msg='Create new RSA Keys') # Create new Key Pair and save self.rsa_key = RSA.generate(2048) self.__save_rsa_keys() self.__perform_key_handshake() def load_manifest(self, viewable_id): + """ + Loads the manifets for the given viewable_id and returns a mpd-XML-Manifest + :param viewable_id: The id of of the viewable + :return: MPD XML Manifest or False if no success + """ manifest_request_data = { 'method': 'manifest', 'lookupType': 'PREPARE', @@ -107,38 +110,28 @@ class MSL: 'uiVersion': 'akira' } request_data = self.__generate_msl_request_data(manifest_request_data) - resp = self.session.post(self.endpoints['manifest'], request_data) - try: + # if the json() does not fail we have an error because the manifest response is a chuncked json response resp.json() - log('MANIFEST RESPONE JSON: '+resp.text) + self.kodi_helper.log(msg='Error getting Manifest: '+resp.text) + return False except ValueError: - # Maybe we have a CHUNKED response + # json() failed so parse the chunked response + self.kodi_helper.log(msg='Got chunked Manifest Response: ' + resp.text) resp = self.__parse_chunked_msl_response(resp.text) + self.kodi_helper.log(msg='Parsed chunked Response: ' + json.dumps(resp)) data = self.__decrypt_payload_chunk(resp['payloads'][0]) - # pprint.pprint(data) return self.__tranform_to_dash(data) - def get_license(self, challenge, sid): - """ - std::time_t t = std::time(0); // t is an integer type - licenseRequestData["clientTime"] = (int)t; - //licenseRequestData["challengeBase64"] = challengeStr; - licenseRequestData["licenseType"] = "STANDARD"; - licenseRequestData["playbackContextId"] = playbackContextId;//"E1-BQFRAAELEB32o6Se-GFvjwEIbvDydEtfj6zNzEC3qwfweEPAL3gTHHT2V8rS_u1Mc3mw5BWZrUlKYIu4aArdjN8z_Z8t62E5jRjLMdCKMsVhlSJpiQx0MNW4aGqkYz-1lPh85Quo4I_mxVBG5lgd166B5NDizA8."; - licenseRequestData["drmContextIds"] = Json::arrayValue; - licenseRequestData["drmContextIds"].append(drmContextId); - - :param viewable_id: - :param challenge: - :param kid: - :return: + Requests and returns a license for the given challenge and sid + :param challenge: The base64 encoded challenge + :param sid: The sid paired to the challengew + :return: Base64 representation of the license key or False if no success """ - license_request_data = { 'method': 'license', 'licenseType': 'STANDARD', @@ -160,18 +153,19 @@ class MSL: resp = self.session.post(self.endpoints['license'], request_data) try: + # If is valid json the request for the licnese failed resp.json() - log('LICENSE RESPONE JSON: '+resp.text) + self.kodi_helper.log(msg='Error getting license: '+resp.text) + return False except ValueError: - # Maybe we have a CHUNKED response + # json() failed so we have a chunked json response resp = self.__parse_chunked_msl_response(resp.text) data = self.__decrypt_payload_chunk(resp['payloads'][0]) - # pprint.pprint(data) if data['success'] is True: return data['result']['licenses'][0]['data'] else: - return '' - + self.kodi_helper.log(msg='Error getting license: ' + json.dumps(data)) + return False def __decrypt_payload_chunk(self, payloadchunk): payloadchunk = json.JSONDecoder().decode(payloadchunk) @@ -196,7 +190,7 @@ class MSL: def __tranform_to_dash(self, manifest): - self.save_file('manifest.json', json.dumps(manifest)) + self.save_file(self.kodi_helper.msl_data_path, 'manifest.json', json.dumps(manifest)) manifest = manifest['result']['viewables'][0] self.last_playback_context = manifest['playbackContextId'] @@ -208,15 +202,13 @@ class MSL: if len(manifest['psshb64']) >= 1: pssh = manifest['psshb64'][0] - + seconds = manifest['runtime']/1000 + duration = "PT"+str(seconds)+".00S" root = ET.Element('MPD') root.attrib['xmlns'] = 'urn:mpeg:dash:schema:mpd:2011' root.attrib['xmlns:cenc'] = 'urn:mpeg:cenc:2013' - - - seconds = manifest['runtime']/1000 - duration = "PT"+str(seconds)+".00S" + root.attrib['mediaPresentationDuration'] = duration period = ET.SubElement(root, 'Period', start='PT0S', duration=duration) @@ -233,7 +225,7 @@ class MSL: rep = ET.SubElement(video_adaption_set, 'Representation', width=str(downloadable['width']), height=str(downloadable['height']), - bandwidth=str(downloadable['bitrate']*8*1024), + bandwidth=str(downloadable['bitrate']*1024), codecs='h264', mimeType='video/mp4') @@ -254,7 +246,7 @@ class MSL: for downloadable in audio_track['downloadables']: rep = ET.SubElement(audio_adaption_set, 'Representation', codecs='aac', - bandwidth=str(downloadable['bitrate'] * 8 * 1024), + bandwidth=str(downloadable['bitrate']*1024), mimeType='audio/mp4') #AudioChannel Config @@ -332,21 +324,7 @@ class MSL: 'signature': self.__sign(first_payload_encryption_envelope), } - - # Create Second Payload - second_payload = { - "messageid": self.current_message_id, - "data": "", - "endofmsg": True, - "sequencenumber": 2 - } - second_payload_encryption_envelope = self.__encrypt(json.dumps(second_payload)) - second_payload_chunk = { - 'payload': base64.standard_b64encode(second_payload_encryption_envelope), - 'signature': base64.standard_b64encode(self.__sign(second_payload_encryption_envelope)), - } - - request_data = json.dumps(header) + json.dumps(first_payload_chunk) # + json.dumps(second_payload_chunk) + request_data = json.dumps(header) + json.dumps(first_payload_chunk) return request_data @@ -433,18 +411,18 @@ class MSL: encryption_envelope['ciphertext'] = base64.standard_b64encode(ciphertext) return json.dumps(encryption_envelope) - def __sign(self, text): - #signature = hmac.new(self.sign_key, text, hashlib.sha256).digest() - signature = HMAC(self.sign_key, text, hashlib.sha256).digest() - - # hmac = HMAC.new(self.sign_key, digestmod=SHA256) - # hmac.update(text) + def __sign(self, text): + """ + Calculates the HMAC signature for the given text with the current sign key and SHA256 + :param text: + :return: Base64 encoded signature + """ + signature = HMAC.new(self.sign_key, text, SHA256).digest() return base64.standard_b64encode(signature) def __perform_key_handshake(self): - header = self.__generate_msl_header(is_key_request=True, is_handshake=True, compressionalgo="", encrypt=False) request = { 'entityauthdata': { @@ -456,21 +434,20 @@ class MSL: 'headerdata': base64.standard_b64encode(header), 'signature': '', } - log('Key Handshake Request:') - log(json.dumps(request)) - + self.kodi_helper.log(msg='Key Handshake Request:') + self.kodi_helper.log(msg=json.dumps(request)) resp = self.session.post(self.endpoints['manifest'], json.dumps(request, sort_keys=True)) if resp.status_code == 200: resp = resp.json() if 'errordata' in resp: - log('Key Exchange failed') - log(base64.standard_b64decode(resp['errordata'])) + self.kodi_helper.log(msg='Key Exchange failed') + self.kodi_helper.log(msg=base64.standard_b64decode(resp['errordata'])) return False self.__parse_crypto_keys(json.JSONDecoder().decode(base64.standard_b64decode(resp['headerdata']))) else: - log('Key Exchange failed') - log(resp.text) + self.kodi_helper.log(msg='Key Exchange failed') + self.kodi_helper.log(msg=resp.text) def __parse_crypto_keys(self, headerdata): self.__set_master_token(headerdata['keyresponsedata']['mastertoken']) @@ -491,7 +468,7 @@ class MSL: self.handshake_performed = True def __load_msl_data(self): - msl_data = json.JSONDecoder().decode(self.load_file('msl_data.json')) + msl_data = json.JSONDecoder().decode(self.load_file(self.kodi_helper.msl_data_path, 'msl_data.json')) self.__set_master_token(msl_data['tokens']['mastertoken']) self.encryption_key = base64.standard_b64decode(msl_data['encryption_key']) self.sign_key = base64.standard_b64decode(msl_data['sign_key']) @@ -509,50 +486,49 @@ class MSL: } } serialized_data = json.JSONEncoder().encode(data) - self.save_file('msl_data.json', serialized_data) + self.save_file(self.kodi_helper.msl_data_path, 'msl_data.json', serialized_data) def __set_master_token(self, master_token): self.mastertoken = master_token - self.sequence_number = json.JSONDecoder().decode(base64.standard_b64decode(master_token['tokendata']))[ - 'sequencenumber'] + self.sequence_number = json.JSONDecoder().decode(base64.standard_b64decode(master_token['tokendata']))['sequencenumber'] def __load_rsa_keys(self): - loaded_key = self.load_file('rsa_key.bin') + loaded_key = self.load_file(self.kodi_helper.msl_data_path, 'rsa_key.bin') self.rsa_key = RSA.importKey(loaded_key) def __save_rsa_keys(self): - log('Save RSA Keys') + self.kodi_helper.log(msg='Save RSA Keys') # Get the DER Base64 of the keys encrypted_key = self.rsa_key.exportKey() - self.save_file('rsa_key.bin', encrypted_key) + self.save_file(self.kodi_helper.msl_data_path, 'rsa_key.bin', encrypted_key) @staticmethod - def file_exists(filename): + def file_exists(msl_data_path, filename): """ Checks if a given file exists :param filename: The filename :return: True if so """ - return os.path.isfile(ADDONUSERDATA + filename) + return os.path.isfile(msl_data_path + filename) @staticmethod - def save_file(filename, content): + def save_file(msl_data_path, filename, content): """ Saves the given content under given filename :param filename: The filename :param content: The content of the file """ - with open(ADDONUSERDATA + filename, 'w') as file_: + with open(msl_data_path + filename, 'w') as file_: file_.write(content) file_.flush() @staticmethod - def load_file(filename): + def load_file(msl_data_path, filename): """ Loads the content of a given filename :param filename: The file to load :return: The content of the file """ - with open(ADDONUSERDATA + filename) as file_: + with open(msl_data_path + filename) as file_: file_content = file_.read() return file_content