# 解密从 HDD 抓包得到的数据
# 兼容 PRiSM 和 CN 2024
# 仅用于分析

import base64
import zlib
from Crypto.Cipher import AES
from Crypto.Util.Padding import unpad, pad

# 密钥和 IV
# CN 2024
aesKey2024 = "n7bx6:@Fg_:2;5E89Phy7AyIcpxEQ:R@"
aesIV2024 = ";;KjR1C3hgB1ovXa"

# 国际服 PRiSM
aesKeyPrism = "A;mv5YUpHBK3YxTy5KB^[;5]C2AL50Bq"
aesIVPrism = "9FM:sd9xA91X14v]"

class AESPKCS7:
    # 实现了 maimai 通讯所用的 AES 加密的类
    def __init__(self, key: str, iv: str):
        self.key = key.encode('utf-8')
        self.iv = iv.encode('utf-8')
        self.mode = AES.MODE_CBC
    # 加密
    def encrypt(self, content: bytes) -> bytes:
        cipher = AES.new(self.key, self.mode, self.iv)
        content_padded = pad(content, AES.block_size)
        encrypted_bytes = cipher.encrypt(content_padded)
        return encrypted_bytes
    # 解密
    def decrypt(self, encrypted_content: bytes) -> str:
        cipher = AES.new(self.key, self.mode, self.iv)
        decrypted_padded = cipher.decrypt(encrypted_content)
        decrypted = unpad(decrypted_padded, AES.block_size)
        return decrypted

def main_sdga():
    # 填入你的想解密的数据的 base64 编码
    base64_encoded_data = "KSGm2qo7qVHz1wrK15PckYC5/kLjKcTtEXOgHeHt1Xn6DPdo3pltoPLADHpe8+Wq"

    aes = AESPKCS7(aesKeyPrism, aesIVPrism)

    # 首先解码 base64
    decodedData = base64.b64decode(base64_encoded_data)
    # 然后解密数据,PRiSM 是先压缩再加密(which is 正确做法)
    decryptedData = aes.decrypt(decodedData)
    # 解压数据
    decompressedData = zlib.decompress(decryptedData)
    
    print(str(decompressedData))

def main_sdgb():
    # 填入你的想解密的数据的 base64 编码
    base64_encoded_data = "eJyrTVvpuGwCR32OdodwtVXZ7/Ofmfhin7k/K61q3XNoad1rAPGwECU="

    aes = AESPKCS7(aesKey2024, aesIV2024)

    # 首先解码 base64
    decodedData = base64.b64decode(base64_encoded_data)
    # 然后解压数据,CN 2024 是加密后再压缩(纯傻逼
    decompressedData = zlib.decompress(decodedData)
    # 最后解密数据
    decryptedData = aes.decrypt(decompressedData)

    print(str(decryptedData))


if __name__ == "__main__":
    main_sdga()