-
Notifications
You must be signed in to change notification settings - Fork 1
/
beacon.py
651 lines (557 loc) · 30.3 KB
/
beacon.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
import os
import sys
import struct
import bluetooth._bluetooth as bluez
from AESCipher import AESCipher
"""
Python handler to send/receive SmartBeacon with SmartBeacon Protocol.
SmartBeacon can be seen as an upper layer on an AltBeacon-like standard (this was done to avoid compatibility issue).
"""
"""
BlueZ usage resource:
https://people.csail.mit.edu/albert/bluez-intro/x682.html
SmartBeacon wire-format:
02 # Number of bytes that follow in *first* AD structure (used for flag specification)
01 # Flags AD type # Flags of Advertisment event types (see the following list)
# connectable: a scanner can start a connection after be notified by this event
# scannable: a scanner can start a scan request after receving one of these
# undirected: broadcast trasmission, no Bluetooth address is specified
# payload: can contain user-defined data in payload unlike a directed packet
1A # Flags value 0x1A = (000) 11010 # Flags used for letting know controller capabilities
bit 0 (OFF) LE Limited Discoverable Mode
bit 1 (ON) LE General Discoverable Mode
bit 2 (OFF) BR/EDR Not Supported
bit 3 (ON) Simultaneous LE and BR/EDR to Same Device Capable (controller)
bit 4 (ON) Simultaneous LE and BR/EDR to Same Device Capable (Host)
bit 5,6,7 unused
1B # 0x1B = 27, Number of bytes that follow in second (and last) AD structure (Used for transmitting data)
FF # Manufacturer specific data AD type
88 88 # Company identifier code (0x8888 == SmartBeaconCompany)
BE # Byte 0 of AltBeacon advertisement indicator
AC # Byte 1 of AltBeacon advertisement indicator
XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX # Encrypted_payload (AES CBC 256)
The 16byte encrypted_payload can be defined as follow (Big endian and starting from left)
0:7 (8Byte) # Counter
8:14 (6Byte) # Command
15:16 (2Byte) # RES1, RES2 (Reserved) (set to 0 if not needed)
YY YY # major == user_id
ZZ ZZ # minor == obj_id
c5 # The 2's complement of the calibrated Tx Power (windowing system for bnetter throuput?)
# The following terms are used many times, use this as resource.
# Dict:
# hci_sock is an open HCI socket
# OGF is the Opcode Group Field
# OCF is the Opcode Command Field
# cmd_pkt contains the command parameters
# Note1: For the Link Control commands, the OGF is defined as 0x01. For the LE Controller Commands, the OGF code is defined as 0x08.
# Note2: the reversed byte order of BLE(multibyte values in BLE packets are in little-endian).
"""
LE_META_EVENT = 0x3e
LE_PUBLIC_ADDRESS = 0x00
LE_RANDOM_ADDRESS = 0x01
LE_SET_SCAN_PARAMETERS_CP_SIZE = 7
OGF_LE_CTL = 0x08
OCF_LE_SET_SCAN_PARAMETERS = 0x000B
OCF_LE_SET_ADVERTISING_PARAMETERS = 0x0006
OCF_LE_SET_SCAN_ENABLE = 0x000C
OCF_LE_CREATE_CONN = 0x000D
OCF_LE_SET_ADVERTISING_DATA = 0x0008
OCF_LE_SET_ADVERTISING_ENABLE = 0x000A
LE_ROLE_MASTER = 0x00
LE_ROLE_SLAVE = 0x01
# The host computer can send commands to the microcontroller, and the microcontroller generates events to indicate command responses and other status changes.
# Subevents of LE_META_EVENT
EVT_LE_CONN_COMPLETE = 0x01
EVT_LE_ADVERTISING_REPORT = 0x02
EVT_LE_CONN_UPDATE_COMPLETE = 0x03
EVT_LE_READ_REMOTE_USED_FEATURES_COMPLETE = 0x04
# Advertisment event types
ADV_IND = 0x00 # connectable undirected advertising event
ADV_DIRECT_IND = 0x01 # connectable directed advertising event
ADV_SCAN_IND = 0x02
ADV_NONCONN_IND = 0x03 # non-connectable undirected advertising event
SCAN_REQ = 0x03 # scan request
ADV_SCAN_RSP = 0x04 # scan response
CONNECT_REQ = 0x05 # connection request
ADV_DISCOVER_IND = 0x06 # scannable undirected advertising
BEACON_TYPE_CODE = 0xBEAC # Alt Beacon identifier
ADV_TYPE_MANUFACTURER_SPECIFIC_DATA = 0xFF
COMPANY_ID = 0x8888
ADV_RSSI_VALUE = -59
class BeaconPi(object):
"""A general class useful for handling beacon"""
def __init__(self, device_id=0):
self.device_id = device_id
def open_socket(self):
self.hci_sock = bluez.hci_open_dev(self.device_id)
return self.hci_sock
@staticmethod
def generate_random_bytes(len):
return os.urandom(len)
@staticmethod
def printpacket(pkt):
"""Print the packet in readable hex format"""
ret_str = ""
for byte in pkt:
ret_str += ("%02x " % struct.unpack("B", bytes([byte]))[0])
return ret_str
# print("%02x " %i for i in struct.unpack("B", bytes([byte])))
@staticmethod
def packet2str(pkt):
"""Return the packet in readable hex format from binary"""
return pkt.hex()
def start_le_scan(self):
"""Enable LE scan."""
self._switch_le_scan_enable(0x01)
def stop_le_scan(self):
"""Disable LE scan."""
self._switch_le_scan_enable(0x00)
def _switch_le_scan_enable(self, le_scan_enable, filter_duplicates=0x00):
"""Send LE SET SCAN ENABLE hci command to the current hci_socket.
@params
LE_Scan_Enable: 0x00 to disable or 0x01 to enable
filter_duplicates: 0x00 duplicate filtering disabled, 0x01 duplicate filtering enabled
Note: when filtering is turned on, the scanner only filters advertisements by DEVICE ADDRESS,
so even if the advertising data is changed, it will not get passed to the application.
"""
if le_scan_enable != 0x00 and le_scan_enable != 0x01:
raise ValueError("The argument enable_byte can assume just two values: 0x01 or 0x00")
if filter_duplicates != 0x00 and filter_duplicates != 0x01:
raise ValueError("The argument filter_duplicates can assume just two values: 0x01 or 0x00")
# Create the structure needed for the parameters of the LE SET SCAN ENABLE hci command
cmd_pkt = struct.pack("<BB", le_scan_enable, filter_duplicates) # LittleEndian(unsigned char, unsigned char)
# In BlueZ, hci_send_cmd is used to transmit a command to the microcontroller.
# A command consists of a Opcode Group Field that specifies the general category the command falls into, an Opcode Command Field that specifies the actual command, and a series of command parameters.
bluez.hci_send_cmd(self.hci_sock, OGF_LE_CTL, OCF_LE_SET_SCAN_ENABLE, cmd_pkt)
# Response? return status: 0x00 if command was successful!
def hci_le_set_scan_parameters(self):
"""Set the parameters needed for a scan"""
# old_filter = hci_sock.getsockopt(bluez.SOL_HCI, bluez.HCI_FILTER, 14) # when restore the filter?
le_scan_type = 0x00 # Passive Scanning. No scanning PDUs shall be sent (default)
le_scan_interval = 0x0010 # Range: 0x0004 to 0x4000 Default: 0x0010 (10 ms), Time = N * 0.625 ms
le_scan_window = 0x0010 # Duration of the LE scan. LE_Scan_Window <= LE_Scan_Interval
own_address_type = 0x01 # 0x01 - Random Device Address, 0x00 - Public Device Address (default)
scanning_filter_policy = 0x00 # Accept all adv packets except directed adv packets not addressed to this device (default)
cmd_pkt = struct.pack("<BHHBB", le_scan_type, le_scan_interval, le_scan_window, own_address_type, scanning_filter_policy)
res = bluez.hci_send_cmd(self.hci_sock, OGF_LE_CTL, OCF_LE_SET_SCAN_PARAMETERS, cmd_pkt)
return res
# Response?return status: 0x00LE_Set_Scan_Parameters command succeeded.
# Note: when the user needs to receive the data as fast as possible, make sure that scanning window is more than the advertising interval + 10ms to guarantee discovery.
def hci_set_advertising_parameters(self):
"""Set the parameters needed for a (quick/slow) scan"""
advertising_interval_min = 0x00A0 # Minimum advertising interval for undirected and low duty cycle directed advertising.
advertising_interval_max = 0x00A8 # Maximum advertising interval, Range: 0x0020 to 0x4000|Default: N = 0x0800 (1.28 s)|Time = N * 0.625 ms|Time Range: 20 ms to 10.24 s
advertising_type = ADV_NONCONN_IND # Advertising Type([un]Connactable/[un]directed/...)
own_address_type, peer_address_type = 0x00, 0x00 # 0x00 public, 0x01 random
channels_map = 0x07
filter_policy = 0x00
cmd_pkt = struct.pack("<HHBBB", advertising_interval_min, advertising_interval_max, advertising_type, own_address_type, peer_address_type)
cmd_pkt += struct.pack("<6B", 0x00, 0x00, 0x00, 0x00, 0x00, 0x00) # Peer_addr =00000
cmd_pkt += struct.pack("<BB", channels_map, filter_policy) # All channels
res = bluez.hci_send_cmd(self.hci_sock, OGF_LE_CTL, OCF_LE_SET_ADVERTISING_PARAMETERS, cmd_pkt)
return res
# Response?return status: 0x00LE_Set_Scan_Parameters command succeeded.
# Note: If the advertising interval range provided by the Host (Advertising_Interval_Min, Advertising_Interval_Max) is outside the advertising interval range supported by the Controller, then the Controller shall return the Unsupported Feature or Parameter Value (0x11) error code.
def le_handle_connection_complete(self, pkt):
status, handle, role, peer_bdaddr_type = struct.unpack("<BHBB", pkt[0:5])
device_address = self.packed_bdaddr_to_string(pkt[5:11])
interval, latency, supervision_timeout, master_clock_accuracy = struct.unpack("<HHHB", pkt[11:])
def get_packed_bdaddr(self, address_str):
"""Return a byte packed address from a string form(AA:BB:..)"""
address_bytelist = []
addr = address_str.split(':')
addr.reverse() # Needed for LittleEndian encoding.
for b in addr:
address_bytelist.append(int(b, 16))
return struct.pack("<BBBBBB", *address_bytelist)
@staticmethod
def packed_bdaddr_to_string(address_byte):
"""Return a MAC address in str form, from a byte object"""
return ':'.join('%02x' % i for i in struct.unpack("<BBBBBB", bytes(address_byte[::-1])))
# TODO maybe use: bluez.ba2str, str2ba ?
def hci_le_parse_event(self, pkt):
"""Parse a BLE packet.
Returns a dictionary which contains the event id, length and packet type,
and others additional key/value pairs that represent the parsed content
of the packet in binary and string form.
"""
result = {}
# (HCI packetype, Event, parameterLenght)
# HCI packettype codes (ptype):HCI Command = 0x01, syncronous Data = 0x02, Event = 0x04
hci_packet_type, event, param_len = struct.unpack("<BBB", pkt[:3])
result["packet_type"] = hci_packet_type
result["bluetooth_event_id"] = event
result["packet_length"] = param_len
result["full_packet_str"] = self.packet_as_hex_string(pkt)
result["full_packet_bin"] = pkt
# print(result)
# We check only for BLE events
if event == LE_META_EVENT:
# We are looking for a beacon( BLE Advertisement)
# EVT_LE_META_EVENT is the event name related to it
result["bluetooth_event_name"] = "EVT_LE_META_EVENT"
result.update(self._handle_le_meta_event(pkt[3:]))
elif event == bluez.EVT_NUM_COMP_PKTS:
result["bluetooth_event_name"] = "EVT_NUM_COMP_PKTS"
# result.update(_handle_num_completed_packets(pkt[3:]))
elif event == bluez.EVT_INQUIRY_RESULT_WITH_RSSI:
result["bluetooth_event_name"] = "EVT_INQUIRY_RESULT_WITH_RSSI"
# result.update(_handle_inquiry_result_with_rssi(pkt[3:]))
elif event == bluez.EVT_INQUIRY_RESULT:
result["bluetooth_event_name"] = "EVT_INQUIRY_RESULT"
# result.update(_handle_inquiry_result(pkt[3:]))
elif event == bluez.EVT_DISCONN_COMPLETE:
result["bluetooth_event_name"] = "EVT_DISCONN_COMPLETE"
# result.update(_handle_disconn_complete(pkt[3:]))
elif event == bluez.EVT_CMD_STATUS:
result["bluetooth_event_name"] = "EVT_CMD_STATUS"
# result.update(_handle_command_status(pkt[3:]))
elif event == bluez.EVT_CMD_COMPLETE:
result["bluetooth_event_name"] = "EVT_CMD_COMPLETE"
# result.update(_handle_command_complete(pkt[3:]))
elif event == bluez.EVT_INQUIRY_COMPLETE:
result["bluetooth_event_name"] = "EVT_INQUIRY_COMPLETE"
else:
result["bluetooth_event_name"] = "UNKNOWN"
return result
def _handle_le_meta_event(self, pkt):
result = {}
subevent, = struct.unpack("B", bytes([pkt[0]]))
result["bluetooth_le_subevent_id"] = subevent
pkt = pkt[1:]
if subevent == EVT_LE_ADVERTISING_REPORT:
result["bluetooth_le_subevent_name"] = "EVT_LE_ADVERTISING_REPORT"
result.update(self._handle_le_advertising_report(pkt))
elif subevent == EVT_LE_CONN_COMPLETE:
result["bluetooth_le_subevent_name"] = "EVT_LE_CONN_COMPLETE"
# result.update(_handle_le_connection_complete(pkt))
elif subevent == EVT_LE_CONN_UPDATE_COMPLETE:
result["bluetooth_le_subevent_name"] = "EVT_LE_CONN_UPDATE_COMPLETE"
# raise NotImplementedError("EVT_LE_CONN_UPDATE_COMPLETE")
elif subevent == EVT_LE_READ_REMOTE_USED_FEATURES_COMPLETE:
result["bluetooth_le_subevent_name"] = \
"EVT_LE_READ_REMOTE_USED_FEATURES_COMPLETE"
# result.update(_handle_le_read_remote_used_features(pkt))
else:
result["bluetooth_le_subevent_name"] = "UNKNOWN"
return result
def _handle_le_advertising_report(self, pkt):
result = {}
num_reports = struct.unpack("<B", bytes([pkt[0]]))[0]
report_pkt_offset = 0
result["number_of_advertising_reports"] = num_reports
result["advertising_reports"] = []
for i in range(0, num_reports):
report = {}
report_event_type = struct.unpack("<B", bytes([pkt[report_pkt_offset + 1]]))[0]
report["report_type_id"] = report_event_type
bdaddr_type = struct.unpack("<B", bytes([pkt[report_pkt_offset + 2]]))[0]
report["peer_bluetooth_address_type"] = bdaddr_type
device_addr = self.packed_bdaddr_to_string(
pkt[report_pkt_offset + 3:report_pkt_offset + 9])
report["peer_bluetooth_address"] = device_addr.upper()
report["peer_bluetooth_address_s"] = \
self.space_bt_address(report["peer_bluetooth_address"])
report_data_length, = struct.unpack("<B", bytes([pkt[report_pkt_offset + 9]]))
report["report_metadata_length"] = report_data_length
if report_event_type == ADV_IND:
report["report_type_string"] = "LE_ADV_IND"
elif report_event_type == ADV_DIRECT_IND:
report["report_type_string"] = "LE_ADV_DIRECT_IND"
elif report_event_type == ADV_DISCOVER_IND:
report["report_type_string"] = "LE_ADV_SCAN_IND"
elif report_event_type == ADV_NONCONN_IND:
# this should be the case of altbeacon
report["report_type_string"] = "LE_ADV_NONCONN_IND"
elif report_event_type == ADV_SCAN_RSP:
report["report_type_string"] = "LE_ADV_SCAN_RSP"
else:
report["report_type_string"] = "UNKNOWN"
if report_data_length > 0:
report["payload_binary"] = \
(pkt[report_pkt_offset + 10:report_pkt_offset + 10 + report_data_length + 1])
report["payload"] = self.packet_as_hex_string(report["payload_binary"], True, True)
# Parse the data payload after proximity_type
report["payload_data"] = report["payload_binary"][6:]
report["payload_encrypted_data"] = report["payload_data"][:report_pkt_offset - 7]
major, = struct.unpack(">H", bytes(pkt[report_pkt_offset - 7: report_pkt_offset - 5]))
minor, = struct.unpack(">H", bytes(pkt[report_pkt_offset - 5: report_pkt_offset - 3]))
report["major"] = major
report["minor"] = minor
txpower_2_complement, = struct.unpack("b", bytes([pkt[report_pkt_offset - 2]]))
# Each report length is (2 (event type, bdaddr type) + 6 (the address)
# + 1 (data length field) + data length + 1 (rssi)) bytes long.
report_pkt_offset = report_pkt_offset + 10 + report_data_length + 1
rssi, = struct.unpack("<b", bytes([pkt[report_pkt_offset - 1]]))
report["rssi"] = rssi
if self.verify_beacon_packet(report):
result["advertising_reports"].append(report)
return result
@staticmethod
def get_companyid(pkt):
# 2 bytes as Little Endian
return struct.unpack("<H", bytes(pkt))[0]
@staticmethod
def get_beacon_type(pkt):
# 2 bytes Big Endian
return struct.unpack(">H", bytes(pkt))[0]
def verify_beacon_packet(self, report):
result = False
# check payload length (28byte)
if (report["report_metadata_length"] != 28):
return result
# check Company ID (= 0x8888) $4,5:7
if (struct.unpack("<B", bytes([report["payload_binary"][1]]))[0] !=
ADV_TYPE_MANUFACTURER_SPECIFIC_DATA):
return result
if (self.get_companyid(report["payload_binary"][2:4]) != COMPANY_ID):
return result
if (self.get_beacon_type(report["payload_binary"][4:6]) != BEACON_TYPE_CODE):
return result
if len(report["payload_encrypted_data"]) != 16: # AES blocksize, fake_check TODO
return result
# 6:28 DataPayload
result = True
return result
def parse_events(self, restore_filter=False):
"""Method used to parse an event, save it just if matching our filter.
"""
if restore_filter:
old_filter = self.hci_sock.getsockopt(bluez.SOL_HCI, bluez.HCI_FILTER, 14)
flt = bluez.hci_filter_new()
bluez.hci_filter_all_events(flt)
bluez.hci_filter_set_ptype(flt, bluez.HCI_EVENT_PKT)
self.hci_sock.setsockopt(bluez.SOL_HCI, bluez.HCI_FILTER, flt)
filtered_reports = []
pkt = self.hci_sock.recv(255)
# Analyze what is received and parse usefull data
parsed_packet = self.hci_le_parse_event(pkt)
if ("bluetooth_le_subevent_name" in parsed_packet) and (parsed_packet["bluetooth_le_subevent_name"] == 'EVT_LE_ADVERTISING_REPORT'):
for report in parsed_packet["advertising_reports"]:
# self.print_report(report, pkt)
# If match our format we should save them
if self.verify_beacon_packet(report):
filtered_reports.append(report)
if restore_filter:
self.hci_sock.setsockopt(bluez.SOL_HCI, bluez.HCI_FILTER, old_filter)
return filtered_reports
# No needed TODO
def decrypt_payload(self, pkt, aes_key, aes_iv):
#aes_key = b'\x9b\xd9\xcd\xf6\xbe+\x9dX\xfb\xd2\xef>\xd87i\xa0\xca\xf5o\xd0\xac\xc3\xe0R\xf0z\xfa\xb8\xdd\x01?E'
#aes_iv = b'\xef\xaa)\x9fHQ\x0f\x04\x18\x1e\xb5;B\xff\x1c\x01'
aesc = AESCipher(aes_key)
aesc.set_iv(aes_iv)
decrypted_bytes = aesc.decrypt(pkt)
# decrypted_bytes.hex()
return decrypted_bytes
# No needed TODO
def encrypt_payload(self, pkt, aes_key, aes_iv):
#aes_key = b'\x9b\xd9\xcd\xf6\xbe+\x9dX\xfb\xd2\xef>\xd87i\xa0\xca\xf5o\xd0\xac\xc3\xe0R\xf0z\xfa\xb8\xdd\x01?E'
#aes_iv = b'\xef\xaa)\x9fHQ\x0f\x04\x18\x1e\xb5;B\xff\x1c\x01'
aesc = AESCipher(aes_key)
aesc.set_iv(aes_iv)
encrypted_bytes = aesc.encrypt(pkt)
return encrypted_bytes
def packet_as_hex_string(self, pkt, spacing=False, capitalize=False):
packet = ""
space = ""
if spacing:
space = " "
for b in pkt:
packet = packet + "%02x" % struct.unpack("<B", bytes([b]))[0] + space
if capitalize:
packet = packet.upper()
return packet
def space_bt_address(self, bt_address):
return ' '.join(bt_address.split(':'))
def print_report(self, report, pkt):
print("----------------------------------------------------")
print("Found BLE device:", report['peer_bluetooth_address'])
print("Raw Advertising Packet:")
print(self.packet_as_hex_string(pkt, True, True))
print("")
for k, v in report.items():
if k == "payload_binary":
continue
print("\t%s: %s" % (k, v))
print("")
def le_set_advertising_data(self, adv_data, enc_params):
"""Call the LE SET ADVERTISING DATA hci istruction.
This should be called to set the data to advertise."""
# Change filter/mode TODO
# LE Set Advertising Data ->
AD_TOT_LEN = 0x1f
AD_LENGHT_FLAG = 0x02
AD_TYPE_FLAG = 0x01
# list of ADTYPE: https://www.bluetooth.com/specifications/assigned-numbers/generic-access-profile
AD_DATA_FLAG = 12 # Flags data LE General Discoverable
''' # Flags value 12 = 0xc = 000 000110 (#bit: 765 43210)
bit 0 (OFF) LE Limited Discoverable Mode
bit 1 (ON) LE General Discoverable Mode
bit 2 (ON) BR/EDR Not Supported
bit 3 (OFF) Simultaneous LE and BR/EDR to Same Device Capable (controller)
bit 4 (OFF) Simultaneous LE and BR/EDR to Same Device Capable (Host)
'''
adv_header_flags = struct.pack(">BBBB", AD_TOT_LEN, AD_LENGHT_FLAG, AD_TYPE_FLAG, AD_DATA_FLAG)
AD_DATA_LEN = 27 # Lenght of advertisement (for ALTBeaconstandard = 0x1b)
cmd_pkt = struct.pack(">BB", AD_DATA_LEN, ADV_TYPE_MANUFACTURER_SPECIFIC_DATA)
cmd_pkt += struct.pack("<H", COMPANY_ID)
cmd_pkt += struct.pack(">H", BEACON_TYPE_CODE)
# Custom values begins here
cmd_data_payload = struct.pack(">Q", adv_data["counter"])
cmd_data_payload += struct.pack(">BBBh", adv_data["cmd_type"], adv_data["cmd_class"], adv_data["cmd_opcode"],
adv_data["cmd_params"])
cmd_data_payload += adv_data.get("bitmap", struct.pack("B", (0xFF)))
cmd_data_payload += struct.pack(">B", adv_data.get("RES1", 0x00))
cmd_data_payload += struct.pack(">B", adv_data.get("RES2", 0x00))
cmd_data_payload_enc = self.encrypt_payload(cmd_data_payload, enc_params["aes_key"], enc_params["aes_iv"])
# Add the encrypted payload
cmd_pkt += cmd_data_payload_enc
cmd_pkt += struct.pack(">H", adv_data["user_id"])
cmd_pkt += struct.pack(">H", adv_data["obj_id"])
cmd_pkt += struct.pack(">bB", ADV_RSSI_VALUE, 0x00) # Last byte is manufacturer reserved
cmd_pkt = adv_header_flags + cmd_pkt
# print(cmd_pkt.hex()) # TODELETE
return bluez.hci_send_cmd(self.hci_sock, OGF_LE_CTL, OCF_LE_SET_ADVERTISING_DATA, cmd_pkt)
def le_set_hello_broadcast(self, adv_data):
"""Call the LE SET ADVERTISING DATA hci istruction.
@params:
adv_data = {"ack":[True|False],
"partial_iv":[12B RandomIV],
"obj_id": [2B obj_id]
"user_id": [2B user_id ONLY FOR ACK]}
This should be called to spam hello_message used for WiFi auth"""
# Change filter/mode TODO
# LE Set Advertising Data ->
AD_TOT_LEN = 0x1f
AD_LENGHT_FLAG = 0x02
AD_TYPE_FLAG = 0x01
AD_DATA_FLAG = 12
adv_header_flags = struct.pack(">BBBB", AD_TOT_LEN, AD_LENGHT_FLAG, AD_TYPE_FLAG, AD_DATA_FLAG)
AD_DATA_LEN = 27
cmd_pkt = struct.pack(">BB", AD_DATA_LEN, ADV_TYPE_MANUFACTURER_SPECIFIC_DATA)
cmd_pkt += struct.pack("<H", COMPANY_ID)
cmd_pkt += struct.pack(">H", BEACON_TYPE_CODE)
# Custom values begins here (after BEAC identifier)
if adv_data.get("ack", False): # If is an ack to helloBro. first 4Byte are all ones
cmd_id = 0xFFFFFFFF
else:
cmd_id = 0x00
cmd_pkt += struct.pack(">I", cmd_id)
cmd_pkt += adv_data["partial_iv"]
cmd_pkt += struct.pack(">H", adv_data.get("user_id", 0xFFFF)) # Note: if is an ack, this 2 bytes are user_id, otherwise 0xFFFF (all user)
cmd_pkt += struct.pack(">H", adv_data["obj_id"])
iv = cmd_pkt[-16:]
cmd_pkt += struct.pack(">bB", ADV_RSSI_VALUE, 0x00)
cmd_pkt = adv_header_flags + cmd_pkt
print("***** HelloBroad PACKEt *****")
print(cmd_pkt.hex()) # TODELETE
if bluez.hci_send_cmd(self.hci_sock, OGF_LE_CTL, OCF_LE_SET_ADVERTISING_DATA, cmd_pkt) == 0x00:
return iv # Save IV on upper class if needed
# Seems ok
def le_set_wifi_password_broadcast(self, adv_data, enc_params):
"""Call the LE SET ADVERTISING DATA hci istruction.
@params:
adv_data = {
"wifipassword":[16B] (ascii encoded),
"obj_id": [2B obj_id]
"user_id": [2B user_id ONLY FOR ACK]}
enc_params = {
"aes_key": [16B]
"aes_iv": [16B]
}
This should be called to spam hello_message used for WiFi auth"""
# Change filter/mode TODO
# LE Set Advertising Data ->
AD_TOT_LEN = 0x1f
AD_LENGHT_FLAG = 0x02
AD_TYPE_FLAG = 0x01
AD_DATA_FLAG = 12
adv_header_flags = struct.pack(">BBBB", AD_TOT_LEN, AD_LENGHT_FLAG, AD_TYPE_FLAG, AD_DATA_FLAG)
AD_DATA_LEN = 27
cmd_pkt = struct.pack(">BB", AD_DATA_LEN, ADV_TYPE_MANUFACTURER_SPECIFIC_DATA)
cmd_pkt += struct.pack("<H", COMPANY_ID)
cmd_pkt += struct.pack(">H", BEACON_TYPE_CODE)
# Custom values begins here (after BEAC identifier)
cmd_data_payload = adv_data["wifipassword"]
wifipassword = cmd_data_payload
cmd_data_payload_enc = self.encrypt_payload(cmd_data_payload, enc_params["aes_key"], enc_params["aes_iv"])
cmd_pkt += cmd_data_payload_enc
cmd_pkt += struct.pack(">H", adv_data.get("user_id")) # Note: if is an ack, this 2 bytes are user_id, otherwise 0xFFFF (all user)
cmd_pkt += struct.pack(">H", adv_data["obj_id"])
cmd_pkt += struct.pack(">bB", ADV_RSSI_VALUE, 0x00) # Last byte is manufacturer reserved
cmd_pkt = adv_header_flags + cmd_pkt
print("***** Wifipassword PACKEt *****")
print(cmd_pkt.hex()) # TODELETE
if bluez.hci_send_cmd(self.hci_sock, OGF_LE_CTL, OCF_LE_SET_ADVERTISING_DATA, cmd_pkt) == 0x00:
return wifipassword
#TOCHECK!!! #TODO
def le_set_advertising_status(self, enable=True):
"""Call LE SET ADVERTISING ENABLE from hci_sock.
This should be called to enable the broadcast of SmartBeacon
after setting the advertising with le_set_advertising_data()"""
if enable:
enable_byte = 0x01
else:
enable_byte = 0x00
# Create the structure needed for the parameters of the LE SET ADVERTISING hci command
cmd_pkt = struct.pack("<B", enable_byte) # LittleEndian(unsigned char, unsigned char)
return bluez.hci_send_cmd(self.hci_sock, OGF_LE_CTL, OCF_LE_SET_ADVERTISING_ENABLE, cmd_pkt)
# Response? return status: 0x00 if command was successful!
def send_ack(self, user_id, counter, aes_key, aes_iv):
adv_data = {"counter": counter, "cmd_type": 0xFF, "cmd_class": 0xFF, "cmd_opcode": 0xFF, "cmd_params": user_id,
"user_id": user_id, "obj_id": 0x00}
#TODO add the obj_id parameter
# Need to disable scan?
enc_params = {"aes_key": aes_key, "aes_iv": aes_iv}
self.le_set_advertising_data(adv_data, enc_params)
# Need to reenable scan?
# Need to REMOVE ADVERTISING DATA after some time
# getsockopt(level, optname[, buflen]) -- get socket options\n\
"""
* params: (int) device number
* effect: opens and binds a new HCI socket
* return: a PySocketSockObject, or NULL on failure
"""
# http://dev.ti.com/tirex/content/simplelink_academy_cc2640r2sdk_1_12_01_16/modules/ble_scan_adv_basic/ble_scan_adv_basic.html
# https://raw.githubusercontent.com/jmleglise/mylittle-domoticz/master/Presence-detection-beacon/check_beacon_presence.py
# https://books.google.it/books?id=3nCuDgAAQBAJ&pg=PA198&lpg=PA198&dq=hci+protocol+META+EVENT&source=bl&ots=rLU4o_v7na&sig=4IE82kPP5vfr-ShewNbIuqD_K3g&hl=it&sa=X&ved=0ahUKEwiZldihnuzZAhWiDcAKHZPmAD4Q6AEILDAA#v=onepage&q=hci%20protocol%20META%20EVENT&f=false
# http://rrbluetoothx.blogspot.it/2016/
"""
# Raw avertise packet data from Bluez scan
# Packet Type (1byte) + BT Event ID (1byte) + Packet Length (1byte) +
# BLE sub-Event ID (1byte) + Number of Advertising reports (1byte) +
# Report type ID (1byte) + BT Address Type (1byte) + BT Address (6byte) +
# Data Length (1byte) + Data ((Data Length)byte) + RSSI (1byte)
#
# Packet Type = 0x04
# BT Event ID = EVT_LE_META_EVENT = 0x3E (BLE events)
# (All LE commands result in a metaevent, specified by BLE sub-Event ID)
# BLE sub-Event ID = {
# EVT_LE_CONN_COMPLETE = 0x01
# EVT_LE_ADVERTISING_REPORT = 0x02
# EVT_LE_CONN_UPDATE_COMPLETE = 0x03
# EVT_LE_READ_REMOTE_USED_FEATURES_COMPLETE = 0x04
# EVT_LE_LTK_REQUEST = 0x05
# }
# Number of Advertising reports = 0x01 (normally)
# Report type ID = {
# LE_ADV_IND = 0x00
# LE_ADV_DIRECT_IND = 0x01
# LE_ADV_SCAN_IND = 0x02
# LE_ADV_NONCONN_IND = 0x03
# LE_ADV_SCAN_RSP = 0x04
# }
# BT Address Type = {
# LE_PUBLIC_ADDRESS = 0x00
# LE_RANDOM_ADDRESS = 0x01
# }
# Data Length = 0x00 - 0x1F
# * Maximum Data Length of an advertising packet = 0x1F
"""
"""
sudo hciconfig hci0 up
sudo hcitool -i hci0 cmd 0x08 0x0008 1e 02 01 1a 1a ff 4c 00 02 15 e2 c5 6d b5 df fb 48 d2 b0 60 d0 f5 a7 10 96 e0 00 00 00 00 c5 00 00 00 00 00 00 00 00 00 00 00 00 00
sudo hcitool -i hci0 cmd 0x08 0x0006 A0 00 A0 00 03 00 00 00 00 00 00 00 00 07 00
sudo hcitool -i hci0 cmd 0x08 0x000a 01
"""