From ab47c1d3f93c60299240bf0f073f46a346fa90e6 Mon Sep 17 00:00:00 2001 From: PlexSheep Date: Thu, 27 Apr 2023 16:08:15 +0200 Subject: [PATCH] formating --- plexcryptool/authur1.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/plexcryptool/authur1.py b/plexcryptool/authur1.py index 256405a..9a1f120 100755 --- a/plexcryptool/authur1.py +++ b/plexcryptool/authur1.py @@ -225,7 +225,7 @@ def test_extension_attack(): """ Test the attack against a known last state """ - key = bytearray(0x13377331.to_bytes(16)) + key = bytearray(0x133773310000.to_bytes(16)) message = bytearray("1234".encode()) ext_message = bytearray("EXT".encode()) # we need to bruteforce this, skip for the test @@ -235,7 +235,7 @@ def test_extension_attack(): message.extend(ext_message) validated_mic = keyed_hash(message, key) assert validated_mic == forged_mic, "forged mic\n%sis not valid\n%s" % ( forged_mic.hex(), validated_mic.hex() ) - print("Manual extension attack with known last internal state works\n(%s == %s)" % (forged_mic.hex(), validated_mic.hex())) + print("Manual extension attack with known last internal state works (%s == %s)" % (forged_mic.hex(), validated_mic.hex()))