You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
275 lines
6.9 KiB
275 lines
6.9 KiB
package main
|
|
|
|
import (
|
|
"LoRaMoteMock/packets"
|
|
"crypto/aes"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"fmt"
|
|
"github.com/brocaar/lorawan"
|
|
"github.com/pkg/errors"
|
|
"io/ioutil"
|
|
"math/rand"
|
|
"syscall"
|
|
"time"
|
|
)
|
|
|
|
func GetRandomHexString(length int) string{
|
|
str := "0123456789abcdef"
|
|
bytes := []byte(str)
|
|
result := []byte{}
|
|
r := rand.New(rand.NewSource(time.Now().UnixNano()))
|
|
for i := 0; i < length; i++ {
|
|
result = append(result, bytes[r.Intn(len(bytes))])
|
|
}
|
|
return string(result)
|
|
}
|
|
|
|
func BytesToString(b []byte) string {
|
|
_,err := syscall.UTF16FromString(string(b))
|
|
if err == nil {
|
|
return string(b)
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func newTLSConfig(cafile, certFile, certKeyFile string) (*tls.Config, error) {
|
|
if cafile == "" && certFile == "" && certKeyFile == "" {
|
|
return nil, nil
|
|
}
|
|
|
|
tlsConfig := &tls.Config{}
|
|
|
|
// Import trusted certificates from CAfile.pem.
|
|
if cafile != "" {
|
|
cacert, err := ioutil.ReadFile(cafile)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
certpool := x509.NewCertPool()
|
|
certpool.AppendCertsFromPEM(cacert)
|
|
|
|
tlsConfig.RootCAs = certpool // RootCAs = certs used to verify server cert.
|
|
}
|
|
|
|
// Import certificate and the key
|
|
if certFile != "" && certKeyFile != "" {
|
|
kp, err := tls.LoadX509KeyPair(certFile, certKeyFile)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
tlsConfig.Certificates = []tls.Certificate{kp}
|
|
}
|
|
|
|
return tlsConfig, nil
|
|
}
|
|
|
|
func BuildUpData(gatewayId,devAddr, appSKey,nwkSKey string,
|
|
fCnt uint32,fPort,dr,ch uint8,freq,lsnr float64,
|
|
mType lorawan.MType,fCtrl lorawan.FCtrl,rssi int16,
|
|
userData []byte) (*packets.PushDataPacket,*lorawan.PHYPayload,error) {
|
|
var gatewayMac lorawan.EUI64
|
|
if err := gatewayMac.UnmarshalText([]byte(gatewayId)); err != nil {
|
|
return nil,nil,err
|
|
}
|
|
now := time.Now().Round(time.Second)
|
|
compactTS := packets.CompactTime(now)
|
|
tmms := int64(time.Second / time.Millisecond)
|
|
|
|
var phy lorawan.PHYPayload
|
|
phy.MHDR.MType = mType
|
|
phy.MHDR.Major = lorawan.LoRaWANR1
|
|
var mac lorawan.MACPayload
|
|
if err := mac.FHDR.DevAddr.UnmarshalText([]byte(devAddr)); err != nil {
|
|
return nil,nil,err
|
|
}
|
|
mac.FHDR.FCtrl = fCtrl
|
|
mac.FHDR.FCnt = fCnt
|
|
mac.FPort = &fPort
|
|
var dataPayload lorawan.DataPayload
|
|
if err := dataPayload.UnmarshalBinary(true, userData); err != nil {
|
|
return nil,nil,err
|
|
}
|
|
mac.FRMPayload = []lorawan.Payload{&dataPayload}
|
|
phy.MACPayload = &mac
|
|
var aesKey lorawan.AES128Key
|
|
if err := aesKey.UnmarshalText([]byte(appSKey));err != nil {
|
|
return nil,nil,err
|
|
}
|
|
if err := phy.EncryptFRMPayload(aesKey);err != nil {
|
|
return nil,nil,err
|
|
}
|
|
if err := aesKey.UnmarshalText([]byte(nwkSKey));err != nil {
|
|
return nil,nil,err
|
|
}
|
|
sf :=[...]string{"SF12","SF11","SF10","SF9","SF8","SF7"}
|
|
if err := phy.SetUplinkDataMIC(lorawan.LoRaWAN1_0, 0, dr, ch, aesKey, aesKey);err != nil {
|
|
return nil,nil,err
|
|
}
|
|
data,err := phy.MarshalBinary();
|
|
if err != nil {
|
|
return nil,nil,err
|
|
}
|
|
|
|
return &packets.PushDataPacket{
|
|
ProtocolVersion: packets.ProtocolVersion2,
|
|
RandomToken: uint16(rand.Uint32()),
|
|
GatewayMAC: gatewayMac,
|
|
Payload: packets.PushDataPayload{
|
|
RXPK: []packets.RXPK{
|
|
{
|
|
Time: &compactTS,
|
|
Tmst: 708016819,
|
|
Tmms: &tmms,
|
|
Freq: freq,
|
|
Chan: ch,
|
|
RFCh: 1,
|
|
Stat: 1,
|
|
Modu: "LORA",
|
|
DatR: packets.DatR{LoRa: sf[dr]+"BW125"},
|
|
CodR: "4/5",
|
|
RSSI: rssi,
|
|
LSNR: lsnr,
|
|
Size: uint16(len(data)),
|
|
Data: data,
|
|
},
|
|
},
|
|
},
|
|
},&phy,nil
|
|
}
|
|
|
|
|
|
func BuildJoin(gatewayId,appEui,devEui,appKey string,dr,ch uint8,
|
|
freq,lsnr float64,rssi int16,devNonce lorawan.DevNonce) (*packets.PushDataPacket,*lorawan.PHYPayload,error) {
|
|
if dr > 5 || dr < 0 {
|
|
return nil,nil,errors.New("dr exceed limit")
|
|
}
|
|
var gatewayMac lorawan.EUI64
|
|
if err := gatewayMac.UnmarshalText([]byte(gatewayId));err != nil{
|
|
return nil,nil,err
|
|
}
|
|
now := time.Now().Round(time.Second)
|
|
compactTS := packets.CompactTime(now)
|
|
tmms := int64(time.Second / time.Millisecond)
|
|
|
|
var phy lorawan.PHYPayload
|
|
phy.MHDR.MType = lorawan.JoinRequest
|
|
phy.MHDR.Major = lorawan.LoRaWANR1
|
|
var DevEUI lorawan.EUI64
|
|
if err := DevEUI.UnmarshalText([]byte(devEui));err != nil{
|
|
return nil,nil,err
|
|
}
|
|
var joinEUI lorawan.EUI64
|
|
if err := joinEUI.UnmarshalText([]byte(appEui));err != nil{
|
|
return nil,nil,err
|
|
}
|
|
phy.MACPayload = &lorawan.JoinRequestPayload{
|
|
DevEUI: DevEUI,
|
|
JoinEUI: joinEUI,
|
|
DevNonce: devNonce,
|
|
}
|
|
var aesKey lorawan.AES128Key
|
|
if err := aesKey.UnmarshalText([]byte(appKey));err != nil{
|
|
return nil,nil,err
|
|
}
|
|
sf :=[...]string{"SF12","SF11","SF10","SF9","SF8","SF7"}
|
|
if err := phy.SetUplinkJoinMIC(aesKey);err != nil{
|
|
return nil,nil,err
|
|
}
|
|
data,err := phy.MarshalBinary()
|
|
if err != nil {
|
|
return nil,nil,err
|
|
}
|
|
return &packets.PushDataPacket{
|
|
ProtocolVersion: packets.ProtocolVersion2,
|
|
RandomToken: uint16(rand.Uint32()),
|
|
GatewayMAC: gatewayMac,
|
|
Payload: packets.PushDataPayload{
|
|
RXPK: []packets.RXPK{
|
|
{
|
|
Time: &compactTS,
|
|
Tmst: 708016819,
|
|
Tmms: &tmms,
|
|
Freq: freq,
|
|
Chan: ch,
|
|
RFCh: 1,
|
|
Stat: 1,
|
|
Modu: "LORA",
|
|
DatR: packets.DatR{LoRa: sf[dr]+"BW125"},
|
|
CodR: "4/5",
|
|
RSSI: rssi,
|
|
LSNR: lsnr,
|
|
Size: uint16(len(data)),
|
|
Data: data,
|
|
},
|
|
},
|
|
},
|
|
},&phy,nil
|
|
}
|
|
|
|
// getNwkSKey returns the network session key.
|
|
func getNwkSKey(appkey lorawan.AES128Key, netID lorawan.NetID, joinNonce lorawan.JoinNonce, devNonce lorawan.DevNonce) (lorawan.AES128Key, error) {
|
|
return getSKey(0x01, appkey, netID, joinNonce, devNonce)
|
|
}
|
|
|
|
// getAppSKey returns the application session key.
|
|
func getAppSKey(appkey lorawan.AES128Key, netID lorawan.NetID, joinNonce lorawan.JoinNonce, devNonce lorawan.DevNonce) (lorawan.AES128Key, error) {
|
|
return getSKey(0x02, appkey, netID, joinNonce, devNonce)
|
|
}
|
|
|
|
func getSKey(typ byte, nwkKey lorawan.AES128Key, netID lorawan.NetID,joinNonce lorawan.JoinNonce, devNonce lorawan.DevNonce) (lorawan.AES128Key, error) {
|
|
var key lorawan.AES128Key
|
|
b := make([]byte, 16)
|
|
b[0] = typ
|
|
|
|
netIDB, err := netID.MarshalBinary()
|
|
if err != nil {
|
|
return key, errors.Wrap(err, "marshal binary error")
|
|
}
|
|
|
|
joinNonceB, err := joinNonce.MarshalBinary()
|
|
if err != nil {
|
|
return key, errors.Wrap(err, "marshal binary error")
|
|
}
|
|
|
|
devNonceB, err := devNonce.MarshalBinary()
|
|
if err != nil {
|
|
return key, errors.Wrap(err, "marshal binary error")
|
|
}
|
|
|
|
copy(b[1:4], joinNonceB)
|
|
copy(b[4:7], netIDB)
|
|
copy(b[7:9], devNonceB)
|
|
|
|
block, err := aes.NewCipher(nwkKey[:])
|
|
if err != nil {
|
|
return key, err
|
|
}
|
|
if block.BlockSize() != len(b) {
|
|
return key, fmt.Errorf("block-size of %d bytes is expected", len(b))
|
|
}
|
|
block.Encrypt(key[:], b)
|
|
|
|
return key, nil
|
|
}
|
|
|
|
func MarshalFRMPayload(p *lorawan.MACPayload) ([]byte, error) {
|
|
var out []byte
|
|
var b []byte
|
|
var err error
|
|
for _, fp := range p.FRMPayload {
|
|
if mac, ok := fp.(*lorawan.MACCommand); ok {
|
|
if p.FPort == nil || (p.FPort != nil && *p.FPort != 0) {
|
|
return []byte{}, errors.New("lorawan: a MAC command is only allowed when FPort=0")
|
|
}
|
|
b, err = mac.MarshalBinary()
|
|
} else {
|
|
b, err = fp.MarshalBinary()
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
out = append(out, b...)
|
|
}
|
|
return out, nil
|
|
}
|
|
|