11import json as jsond # json
22
3- import time # sleep before exit
3+ import time # sleep before exit
44
55import binascii # hex encoding
66
1313from Crypto .Util .Padding import pad , unpad
1414# aes + padding, sha256
1515
16- import webbrowser , platform , subprocess , datetime , datetime , sys , os
16+ import webbrowser
17+ import platform
18+ import subprocess
19+ import datetime
20+ import datetime
21+ import sys
22+ import os
1723
1824from requests_toolbelt .adapters .fingerprint import FingerprintAdapter
1925
@@ -27,7 +33,7 @@ def __init__(self, name, ownerid, secret, version):
2733 self .ownerid = ownerid
2834
2935 self .secret = secret
30-
36+
3137 self .version = version
3238
3339 sessionid = enckey = ""
@@ -62,10 +68,11 @@ def init(self):
6268 sys .exit ()
6369
6470 self .sessionid = json ["sessionid" ]
65-
71+
6672 def register (self , user , password , license , hwid = None ):
67- if hwid is None : hwid = others .get_hwid ()
68-
73+ if hwid is None :
74+ hwid = others .get_hwid ()
75+
6976 init_iv = SHA256 .new (str (uuid4 ())[:8 ].encode ()).hexdigest ()
7077
7178 post_data = {
@@ -91,16 +98,16 @@ def register(self, user, password, license, hwid=None):
9198 else :
9299 print (json ["message" ])
93100 sys .exit ()
94-
101+
95102 def upgrade (self , user , license ):
96-
103+
97104 init_iv = SHA256 .new (str (uuid4 ())[:8 ].encode ()).hexdigest ()
98105
99106 post_data = {
100107 "type" : binascii .hexlify (("upgrade" ).encode ()),
101108 "username" : encryption .encrypt (user , self .enckey , init_iv ),
102109 "key" : encryption .encrypt (license , self .enckey , init_iv ),
103- "sessionid" : binascii .hexlify (self .sessionid .encode ()),
110+ "sessionid" : binascii .hexlify (self .sessionid .encode ()),
104111 "name" : binascii .hexlify (self .name .encode ()),
105112 "ownerid" : binascii .hexlify (self .ownerid .encode ()),
106113 "init_iv" : init_iv
@@ -117,18 +124,19 @@ def upgrade(self, user, license):
117124 else :
118125 print (json ["message" ])
119126 sys .exit ()
120-
127+
121128 def login (self , user , password , hwid = None ):
122- if hwid is None : hwid = others .get_hwid ()
123-
129+ if hwid is None :
130+ hwid = others .get_hwid ()
131+
124132 init_iv = SHA256 .new (str (uuid4 ())[:8 ].encode ()).hexdigest ()
125133
126134 post_data = {
127135 "type" : binascii .hexlify (("login" ).encode ()),
128136 "username" : encryption .encrypt (user , self .enckey , init_iv ),
129137 "pass" : encryption .encrypt (password , self .enckey , init_iv ),
130138 "hwid" : encryption .encrypt (hwid , self .enckey , init_iv ),
131- "sessionid" : binascii .hexlify (self .sessionid .encode ()),
139+ "sessionid" : binascii .hexlify (self .sessionid .encode ()),
132140 "name" : binascii .hexlify (self .name .encode ()),
133141 "ownerid" : binascii .hexlify (self .ownerid .encode ()),
134142 "init_iv" : init_iv
@@ -147,15 +155,16 @@ def login(self, user, password, hwid=None):
147155 sys .exit ()
148156
149157 def license (self , key , hwid = None ):
150- if hwid is None : hwid = others .get_hwid ()
151-
158+ if hwid is None :
159+ hwid = others .get_hwid ()
160+
152161 init_iv = SHA256 .new (str (uuid4 ())[:8 ].encode ()).hexdigest ()
153162
154163 post_data = {
155164 "type" : binascii .hexlify (("license" ).encode ()),
156165 "key" : encryption .encrypt (key , self .enckey , init_iv ),
157166 "hwid" : encryption .encrypt (hwid , self .enckey , init_iv ),
158- "sessionid" : binascii .hexlify (self .sessionid .encode ()),
167+ "sessionid" : binascii .hexlify (self .sessionid .encode ()),
159168 "name" : binascii .hexlify (self .name .encode ()),
160169 "ownerid" : binascii .hexlify (self .ownerid .encode ()),
161170 "init_iv" : init_iv
@@ -173,9 +182,9 @@ def license(self, key, hwid=None):
173182 else :
174183 print (json ["message" ])
175184 sys .exit ()
176-
185+
177186 def var (self , name ):
178-
187+
179188 init_iv = SHA256 .new (str (uuid4 ())[:8 ].encode ()).hexdigest ()
180189
181190 post_data = {
@@ -199,9 +208,9 @@ def var(self, name):
199208 print (json ["message" ])
200209 time .sleep (5 )
201210 sys .exit ()
202-
211+
203212 def file (self , fileid ):
204-
213+
205214 init_iv = SHA256 .new (str (uuid4 ())[:8 ].encode ()).hexdigest ()
206215
207216 post_data = {
@@ -226,7 +235,7 @@ def file(self, fileid):
226235 return binascii .unhexlify (json ["contents" ])
227236
228237 def webhook (self , webid , param ):
229-
238+
230239 init_iv = SHA256 .new (str (uuid4 ())[:8 ].encode ()).hexdigest ()
231240
232241 post_data = {
@@ -253,7 +262,7 @@ def webhook(self, webid, param):
253262 sys .exit ()
254263
255264 def log (self , message ):
256-
265+
257266 init_iv = SHA256 .new (str (uuid4 ())[:8 ].encode ()).hexdigest ()
258267
259268 post_data = {
@@ -272,7 +281,7 @@ def __do_request(self, post_data):
272281 headers = {"User-Agent" : "KeyAuth" }
273282
274283 rq_out = requests .post (
275- "https://keyauth.com/api/1.0/" , data = post_data , headers = headers
284+ "https://keyauth.com/api/1.0/" , data = post_data , headers = headers , verify = "keyauth.crt"
276285 )
277286
278287 return rq_out .text
@@ -295,7 +304,8 @@ def get_hwid():
295304 if platform .system () != "Windows" :
296305 return "None"
297306
298- cmd = subprocess .Popen ("wmic useraccount where name='%username%' get sid" , stdout = subprocess .PIPE , shell = True )
307+ cmd = subprocess .Popen (
308+ "wmic useraccount where name='%username%' get sid" , stdout = subprocess .PIPE , shell = True )
299309
300310 (suppost_sid , error ) = cmd .communicate ()
301311
0 commit comments