Skip to content

Commit 4f7b50c

Browse files
authored
Added missing features
Added Ban function Added Get/set user var function Added Check Blacklist function Added Init Checks
1 parent fa03c40 commit 4f7b50c

File tree

1 file changed

+88
-10
lines changed

1 file changed

+88
-10
lines changed

keyauth.py

Lines changed: 88 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -61,16 +61,6 @@ def init(self):
6161

6262
response = encryption.decrypt(response, self.secret, init_iv)
6363
json = jsond.loads(response)
64-
65-
if json["message"] == "invalidver":
66-
if json["download"] != "":
67-
print("New Version Available")
68-
download_link = json["download"]
69-
os.system(f"start {download_link}")
70-
sys.exit()
71-
else:
72-
print("Invalid Version, Contact owner to add download link to latest app version")
73-
sys.exit()
7464

7565
if json["message"] == "invalidver":
7666
if json["download"] != "":
@@ -89,6 +79,8 @@ def init(self):
8979
self.sessionid = json["sessionid"]
9080
self.initialized = True
9181

82+
83+
9284
def register(self, user, password, license, hwid=None):
9385
self.checkinit()
9486
if hwid is None:
@@ -232,6 +224,71 @@ def var(self, name):
232224
time.sleep(5)
233225
sys.exit()
234226

227+
def getvar(self, var_name):
228+
self.checkinit()
229+
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
230+
231+
post_data = {
232+
"type": binascii.hexlify(("getvar").encode()),
233+
"var": encryption.encrypt(var_name, self.enckey, init_iv),
234+
"sessionid": binascii.hexlify(self.sessionid.encode()),
235+
"name": binascii.hexlify(self.name.encode()),
236+
"ownerid": binascii.hexlify(self.ownerid.encode()),
237+
"init_iv": init_iv
238+
}
239+
response = self.__do_request(post_data)
240+
response = encryption.decrypt(response, self.enckey, init_iv)
241+
json = jsond.loads(response)
242+
243+
if json["success"]:
244+
return json["response"]
245+
else:
246+
print(json["message"])
247+
time.sleep(5)
248+
sys.exit()
249+
250+
def setvar(self, var_name, var_data):
251+
self.checkinit()
252+
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
253+
post_data = {
254+
"type": binascii.hexlify(("setvar").encode()),
255+
"var": encryption.encrypt(var_name, self.enckey, init_iv),
256+
"data": encryption.encrypt(var_data, self.enckey, init_iv),
257+
"sessionid": binascii.hexlify(self.sessionid.encode()),
258+
"name": binascii.hexlify(self.name.encode()),
259+
"ownerid": binascii.hexlify(self.ownerid.encode()),
260+
"init_iv": init_iv
261+
}
262+
response = self.__do_request(post_data)
263+
response = encryption.decrypt(response, self.enckey, init_iv)
264+
265+
if json["success"]:
266+
return True
267+
else:
268+
print(json["message"])
269+
time.sleep(5)
270+
sys.exit()
271+
272+
def ban(self):
273+
self.checkinit()
274+
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
275+
post_data = {
276+
"type": binascii.hexlify(("ban").encode()),
277+
"sessionid": binascii.hexlify(self.sessionid.encode()),
278+
"name": binascii.hexlify(self.name.encode()),
279+
"ownerid": binascii.hexlify(self.ownerid.encode()),
280+
"init_iv": init_iv
281+
}
282+
response = self.__do_request(post_data)
283+
response = encryption.decrypt(response, self.enckey, init_iv)
284+
285+
if json["success"]:
286+
return True
287+
else:
288+
print(json["message"])
289+
time.sleep(5)
290+
sys.exit()
291+
235292
def file(self, fileid):
236293
self.checkinit()
237294
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
@@ -302,6 +359,26 @@ def check(self):
302359
else:
303360
return False
304361

362+
def checkblacklist(self):
363+
self.checkinit()
364+
hwid = others.get_hwid()
365+
init_iv = SHA256.new(str(uuid4())[:8].encode()).hexdigest()
366+
post_data = {
367+
"type": binascii.hexlify(("checkblacklist").encode()),
368+
"hwid": encryption.encrypt(hwid, self.enckey, init_iv),
369+
"sessionid": binascii.hexlify(self.sessionid.encode()),
370+
"name": binascii.hexlify(self.name.encode()),
371+
"ownerid": binascii.hexlify(self.ownerid.encode()),
372+
"init_iv": init_iv
373+
}
374+
response = self.__do_request(post_data)
375+
376+
response = encryption.decrypt(response, self.enckey, init_iv)
377+
json = jsond.loads(response)
378+
if json["success"]:
379+
return True
380+
else:
381+
return False
305382

306383
def log(self, message):
307384
self.checkinit()
@@ -348,6 +425,7 @@ def __load_user_data(self, data):
348425
self.user_data.subcription = data["subscriptions"][0]["subscription"]
349426

350427

428+
351429
class others:
352430
@staticmethod
353431
def get_hwid():

0 commit comments

Comments
 (0)