# -*- coding: utf-8 -*- import base64 import binascii import re import pycurl from Crypto.Cipher import AES from pyload.plugins.internal.Crypter import Crypter from pyload.utils import html_unescape class LinkCryptWs(Crypter): __name__ = "LinkCryptWs" __type__ = "crypter" __version__ = "0.05" __pattern__ = r'http://(?:www\.)?linkcrypt\.ws/(dir|container)/(?P\w+)' __description__ = """LinkCrypt.ws decrypter plugin""" __license__ = "GPLv3" __authors__ = [("kagenoshin", "kagenoshin[AT]gmx[DOT]ch"), ("glukgluk", None)] JK_KEY = "jk" CRYPTED_KEY = "crypted" def setup(self): self.html = None self.fileid = None self.captcha = False self.package = None self.preferred_sources = ['cnl', 'web', 'dlc', 'rsdf', 'ccf', ] #['cnl', 'rsdf', 'ccf', 'dlc', 'web'] def prepare(self): # Init self.package = pyfile.package() self.fileid = re.match(self.__pattern__, pyfile.url).group('ID') self.req.cj.setCookie(".linkcrypt.ws", "language", "en") # Request package self.req.http.c.setopt(pycurl.USERAGENT, "Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; rv:11.0) like Gecko") #: better chance to not get those key-captchas self.html = self.load(self.pyfile.url) def decrypt(self, pyfile): #check if we have js if not self.js: self.fail(_("Missing JS Engine")) package_found = None self.prepare() if not self.isOnline(): self.offline() if self.isKeyCaptchaProtected(): self.retry(4, 30, _("Can't handle Key-Captcha")) if self.isCaptchaProtected(): self.captcha = True self.unlockCaptchaProtection() self.handleCaptchaErrors() # Check for protection if self.isPasswordProtected(): self.unlockPasswordProtection() self.handleErrors() # get unrar password self.getunrarpw() # Get package name and folder package_name, folder_name = self.getPackageInfo() #get the container definitions from script section self.get_container_html() # Extract package links package_links = [] for type_ in self.preferred_sources: links = self.handleLinkSource(type_) if links: if isinstance(links, list): package_links.extend(links) else: package_found = True break # Pack if package_links: self.packages = [(package_name, package_links, folder_name)] elif package_found: self.core.api.deletePackages([self.package.id]) def isOnline(self): if "Linkcrypt.ws // Error 404" in self.html: self.logDebug("folder doesen't exist anymore") return False else: return True def isPasswordProtected(self): if "Authorizing" in self.html: self.logDebug("Links are password protected") return True else: return False def isCaptchaProtected(self): if 'id="captcha">' in self.html: self.logDebug("Links are captcha protected") return True else: return False def isKeyCaptchaProtected(self): if re.search(r'Key[ -]', self.html, re.I): return True else: return False def unlockPasswordProtection(self): password = self.getPassword() if password: self.logDebug("Submitting password [%s] for protected links" % password) self.html = self.load(self.pyfile.url, post={"password": password, 'x': "0", 'y': "0"}) else: self.fail(_("Folder is password protected")) def unlockCaptchaProtection(self): captcha_url = re.search(r']*?>.*?<\s*?input.*?src="([^"]*?)"', self.html, re.I | re.S).group(1) captcha_code = self.decryptCaptcha(captcha_url, forceUser=True, imgtype="gif", result_type='positional') self.html = self.load(self.pyfile.url, post={"x": captcha_code[0], "y": captcha_code[1]}) def getPackageInfo(self): name = self.pyfile.package().name folder = self.pyfile.package().folder self.logDebug("Defaulting to pyfile name [%s] and folder [%s] for package" % (name, folder)) return name, folder def getunrarpw(self): sitein = self.html indexi = sitein.find("|source|") + 8 indexe = sitein.find("|",indexi) unrarpw = sitein[indexi:indexe] if not (unrarpw == "Password" or "Dateipasswort") : self.logDebug("File password set to: [%s]"% unrarpw) self.pyfile.package().password = unrarpw def handleErrors(self): if self.isPasswordProtected(): self.fail(_("Incorrect password")) def handleCaptchaErrors(self): if self.captcha: if "Your choice was wrong!" in self.html: self.invalidCaptcha() self.retry() else: self.correctCaptcha() def handleLinkSource(self, type_): if type_ == 'cnl': return self.handleCNL2() elif type_ == 'web': return self.handleWebLinks() elif type_ in ('rsdf', 'ccf', 'dlc'): return self.handleContainer(type_) else: self.error(_("Unknown source type: %s") % type_) def handleWebLinks(self): self.logDebug("Search for Web links ") package_links = [] pattern = r'
]*?>.*?]*?value="([^"]*?)"[^>]*?name="file"' ids = re.findall(pattern, self.html, re.I | re.S) self.logDebug("Decrypting %d Web links" % len(ids)) for idx, weblink_id in enumerate(ids): try: self.logDebug("Decrypting Web link %d, %s" % (idx + 1, weblink_id)) res = self.load("http://linkcrypt.ws/out.html", post = {'file':weblink_id}) indexs = res.find("window.location =") + 19 indexe = res.find('"', indexs) link2 = res[indexs:indexe] self.logDebug(link2) link2 = html_unescape(link2) package_links.append(link2) except Exception, detail: self.logDebug("Error decrypting Web link %s, %s" % (weblink_id, detail)) return package_links def get_container_html(self): self.container_html = [] script = re.search(r']*?>(.*?)