Skip to content

Commit c373f15

Browse files
authored
(credits to weebzo) Added Missing Features
Added Missing Features
2 parents d41f9e9 + c70866f commit c373f15

File tree

1 file changed

+120
-18
lines changed

1 file changed

+120
-18
lines changed

keyauth.py

Lines changed: 120 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ def __init__(self, name, ownerid, secret, version):
3636
self.version = version
3737

3838
sessionid = enckey = ""
39+
initialized = False
3940

4041
def init(self):
4142

@@ -60,7 +61,7 @@ def init(self):
6061

6162
response = encryption.decrypt(response, self.secret, init_iv)
6263
json = jsond.loads(response)
63-
64+
6465
if json["message"] == "invalidver":
6566
if json["download"] != "":
6667
print("New Version Available")
@@ -76,8 +77,12 @@ def init(self):
7677
sys.exit()
7778

7879
self.sessionid = json["sessionid"]
80+
self.initialized = True
81+
82+
7983

8084
def register(self, user, password, license, hwid=None):
85+
self.checkinit()
8186
if hwid is None:
8287
hwid = others.get_hwid()
8388

@@ -108,7 +113,7 @@ def register(self, user, password, license, hwid=None):
108113
sys.exit()
109114

110115
def upgrade(self, user, license):
111-
116+
self.checkinit()
112117
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
113118

114119
post_data = {
@@ -134,6 +139,7 @@ def upgrade(self, user, license):
134139
sys.exit()
135140

136141
def login(self, user, password, hwid=None):
142+
self.checkinit()
137143
if hwid is None:
138144
hwid = others.get_hwid()
139145

@@ -164,6 +170,7 @@ def login(self, user, password, hwid=None):
164170
sys.exit()
165171

166172
def license(self, key, hwid=None):
173+
self.checkinit()
167174
if hwid is None:
168175
hwid = others.get_hwid()
169176

@@ -192,7 +199,7 @@ def license(self, key, hwid=None):
192199
sys.exit()
193200

194201
def var(self, name):
195-
202+
self.checkinit()
196203
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
197204

198205
post_data = {
@@ -217,51 +224,100 @@ def var(self, name):
217224
time.sleep(5)
218225
sys.exit()
219226

220-
def file(self, fileid):
221-
227+
def getvar(self, var_name):
228+
self.checkinit()
222229
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
223230

224231
post_data = {
225-
"type": binascii.hexlify(("file").encode()),
226-
"fileid": encryption.encrypt(fileid, self.enckey, init_iv),
232+
"type": binascii.hexlify(("getvar").encode()),
233+
"var": encryption.encrypt(var_name, self.enckey, init_iv),
227234
"sessionid": binascii.hexlify(self.sessionid.encode()),
228235
"name": binascii.hexlify(self.name.encode()),
229236
"ownerid": binascii.hexlify(self.ownerid.encode()),
230237
"init_iv": init_iv
231238
}
232-
233239
response = self.__do_request(post_data)
234-
235240
response = encryption.decrypt(response, self.enckey, init_iv)
236-
237241
json = jsond.loads(response)
238242

239-
if not json["success"]:
243+
if json["success"]:
244+
return json["response"]
245+
else:
240246
print(json["message"])
241247
time.sleep(5)
242248
sys.exit()
243-
return binascii.unhexlify(json["contents"])
244-
245-
def check(self):
249+
250+
def setvar(self, var_name, var_data):
251+
self.checkinit()
246252
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
247253
post_data = {
248-
"type": binascii.hexlify(("check").encode()),
254+
"type": binascii.hexlify(("setvar").encode()),
255+
"var": encryption.encrypt(var_name, self.enckey, init_iv),
256+
"data": encryption.encrypt(var_data, self.enckey, init_iv),
249257
"sessionid": binascii.hexlify(self.sessionid.encode()),
250258
"name": binascii.hexlify(self.name.encode()),
251259
"ownerid": binascii.hexlify(self.ownerid.encode()),
252260
"init_iv": init_iv
253261
}
254262
response = self.__do_request(post_data)
263+
response = encryption.decrypt(response, self.enckey, init_iv)
264+
json = jsond.loads(response)
265+
266+
if json["success"]:
267+
return True
268+
else:
269+
print(json["message"])
270+
time.sleep(5)
271+
sys.exit()
255272

273+
def ban(self):
274+
self.checkinit()
275+
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
276+
post_data = {
277+
"type": binascii.hexlify(("ban").encode()),
278+
"sessionid": binascii.hexlify(self.sessionid.encode()),
279+
"name": binascii.hexlify(self.name.encode()),
280+
"ownerid": binascii.hexlify(self.ownerid.encode()),
281+
"init_iv": init_iv
282+
}
283+
response = self.__do_request(post_data)
256284
response = encryption.decrypt(response, self.enckey, init_iv)
257285
json = jsond.loads(response)
286+
258287
if json["success"]:
259288
return True
260289
else:
261-
return False
290+
print(json["message"])
291+
time.sleep(5)
292+
sys.exit()
262293

263-
def webhook(self, webid, param):
294+
def file(self, fileid):
295+
self.checkinit()
296+
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
297+
298+
post_data = {
299+
"type": binascii.hexlify(("file").encode()),
300+
"fileid": encryption.encrypt(fileid, self.enckey, init_iv),
301+
"sessionid": binascii.hexlify(self.sessionid.encode()),
302+
"name": binascii.hexlify(self.name.encode()),
303+
"ownerid": binascii.hexlify(self.ownerid.encode()),
304+
"init_iv": init_iv
305+
}
264306

307+
response = self.__do_request(post_data)
308+
309+
response = encryption.decrypt(response, self.enckey, init_iv)
310+
311+
json = jsond.loads(response)
312+
313+
if not json["success"]:
314+
print(json["message"])
315+
time.sleep(5)
316+
sys.exit()
317+
return binascii.unhexlify(json["contents"])
318+
319+
def webhook(self, webid, param):
320+
self.checkinit()
265321
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
266322

267323
post_data = {
@@ -286,8 +342,48 @@ def webhook(self, webid, param):
286342
time.sleep(5)
287343
sys.exit()
288344

289-
def log(self, message):
345+
def check(self):
346+
self.checkinit()
347+
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
348+
post_data = {
349+
"type": binascii.hexlify(("check").encode()),
350+
"sessionid": binascii.hexlify(self.sessionid.encode()),
351+
"name": binascii.hexlify(self.name.encode()),
352+
"ownerid": binascii.hexlify(self.ownerid.encode()),
353+
"init_iv": init_iv
354+
}
355+
response = self.__do_request(post_data)
356+
357+
response = encryption.decrypt(response, self.enckey, init_iv)
358+
json = jsond.loads(response)
359+
if json["success"]:
360+
return True
361+
else:
362+
return False
363+
364+
def checkblacklist(self):
365+
self.checkinit()
366+
hwid = others.get_hwid()
367+
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
368+
post_data = {
369+
"type": binascii.hexlify(("checkblacklist").encode()),
370+
"hwid": encryption.encrypt(hwid, self.enckey, init_iv),
371+
"sessionid": binascii.hexlify(self.sessionid.encode()),
372+
"name": binascii.hexlify(self.name.encode()),
373+
"ownerid": binascii.hexlify(self.ownerid.encode()),
374+
"init_iv": init_iv
375+
}
376+
response = self.__do_request(post_data)
290377

378+
response = encryption.decrypt(response, self.enckey, init_iv)
379+
json = jsond.loads(response)
380+
if json["success"]:
381+
return True
382+
else:
383+
return False
384+
385+
def log(self, message):
386+
self.checkinit()
291387
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
292388

293389
post_data = {
@@ -302,6 +398,11 @@ def log(self, message):
302398

303399
self.__do_request(post_data)
304400

401+
def checkinit(self):
402+
if not self.initialized:
403+
print("Initialize first, in order to use the functions")
404+
sys.exit()
405+
305406
def __do_request(self, post_data):
306407

307408
rq_out = requests.post(
@@ -326,6 +427,7 @@ def __load_user_data(self, data):
326427
self.user_data.subcription = data["subscriptions"][0]["subscription"]
327428

328429

430+
329431
class others:
330432
@staticmethod
331433
def get_hwid():

0 commit comments

Comments
 (0)