hap_client 0.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +55 -0
- data/.ruby-version +1 -0
- data/Gemfile +3 -0
- data/LICENSE +21 -0
- data/README.md +2 -0
- data/Rakefile +11 -0
- data/hap_client.gemspec +29 -0
- data/lib/hap_client/encryption_request.rb +71 -0
- data/lib/hap_client/log.rb +40 -0
- data/lib/hap_client/pairing.rb +379 -0
- data/lib/hap_client/parser.rb +35 -0
- data/lib/hap_client/request.rb +68 -0
- data/lib/hap_client/version.rb +3 -0
- data/lib/hap_client.rb +134 -0
- metadata +169 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA256:
|
3
|
+
metadata.gz: 1563b1509e5f1e6f88c06ecdf588fdd43c75dddb82e3b3dbeb1090d4bcc9146b
|
4
|
+
data.tar.gz: e6968e093e0b00a77e4c046783dfecaa86aeefe2f10a5ecd224000e99d48cb33
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 017ca3ba5512e19e51ddc1031f5f478d1cf40bf564593a06ddc0dded6cc25156ab6c9c2e0d53a38a11956b47118c427c285669767467ee7617faaa6af613c7b5
|
7
|
+
data.tar.gz: 7ede4a9834f3d7e1fe4f66b2bd3ec9c83b4e9ff332a7fd82e415f3ee89a41e72e77fdb04efda19f73d52edb0b8415cac7c7b0129a85909d9eb93e08fdf3a06f1
|
data/.gitignore
ADDED
@@ -0,0 +1,55 @@
|
|
1
|
+
*.gem
|
2
|
+
*.rbc
|
3
|
+
Gemfile.lock
|
4
|
+
/.config
|
5
|
+
/coverage/
|
6
|
+
/InstalledFiles
|
7
|
+
/pkg/
|
8
|
+
/spec/reports/
|
9
|
+
/spec/examples.txt
|
10
|
+
/test/tmp/
|
11
|
+
/test/version_tmp/
|
12
|
+
/tmp/
|
13
|
+
|
14
|
+
# Used by dotenv library to load environment variables.
|
15
|
+
# .env
|
16
|
+
|
17
|
+
## Specific to RubyMotion:
|
18
|
+
.dat*
|
19
|
+
.repl_history
|
20
|
+
build/
|
21
|
+
*.bridgesupport
|
22
|
+
build-iPhoneOS/
|
23
|
+
build-iPhoneSimulator/
|
24
|
+
|
25
|
+
## Specific to RubyMotion (use of CocoaPods):
|
26
|
+
#
|
27
|
+
# We recommend against adding the Pods directory to your .gitignore. However
|
28
|
+
# you should judge for yourself, the pros and cons are mentioned at:
|
29
|
+
# https://guides.cocoapods.org/using/using-cocoapods.html#should-i-check-the-pods-directory-into-source-control
|
30
|
+
#
|
31
|
+
# vendor/Pods/
|
32
|
+
|
33
|
+
## Documentation cache and generated files:
|
34
|
+
/.yardoc/
|
35
|
+
/_yardoc/
|
36
|
+
/doc/
|
37
|
+
/rdoc/
|
38
|
+
|
39
|
+
## Environment normalization:
|
40
|
+
/.bundle/
|
41
|
+
/vendor/bundle
|
42
|
+
/lib/bundler/man/
|
43
|
+
|
44
|
+
# for a library or gem, you might want to ignore these files since the code is
|
45
|
+
# intended to run in multiple environments; otherwise, check them in:
|
46
|
+
# Gemfile.lock
|
47
|
+
# .ruby-version
|
48
|
+
.ruby-gemset
|
49
|
+
|
50
|
+
# unless supporting rvm < 1.11.0 or doing something fancy, ignore this:
|
51
|
+
.rvmrc
|
52
|
+
|
53
|
+
# Emacs
|
54
|
+
*~
|
55
|
+
.#*
|
data/.ruby-version
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
ruby-2.5.1
|
data/Gemfile
ADDED
data/LICENSE
ADDED
@@ -0,0 +1,21 @@
|
|
1
|
+
MIT License
|
2
|
+
|
3
|
+
Copyright (c) 2018 Seluxit
|
4
|
+
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
6
|
+
of this software and associated documentation files (the "Software"), to deal
|
7
|
+
in the Software without restriction, including without limitation the rights
|
8
|
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
9
|
+
copies of the Software, and to permit persons to whom the Software is
|
10
|
+
furnished to do so, subject to the following conditions:
|
11
|
+
|
12
|
+
The above copyright notice and this permission notice shall be included in all
|
13
|
+
copies or substantial portions of the Software.
|
14
|
+
|
15
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
16
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
17
|
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
18
|
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
19
|
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
20
|
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
21
|
+
SOFTWARE.
|
data/README.md
ADDED
data/Rakefile
ADDED
@@ -0,0 +1,11 @@
|
|
1
|
+
$LOAD_PATH.unshift File.expand_path("../lib", __FILE__)
|
2
|
+
require "hap_client/version"
|
3
|
+
|
4
|
+
task :build do
|
5
|
+
system "gem build hap_client.gemspec"
|
6
|
+
end
|
7
|
+
|
8
|
+
task :release => :build do
|
9
|
+
system "gem push hap_client-#{HapClient::VERSION}.gem"
|
10
|
+
system "rm hap_client-#{HapClient::VERSION}.gem"
|
11
|
+
end
|
data/hap_client.gemspec
ADDED
@@ -0,0 +1,29 @@
|
|
1
|
+
lib = File.expand_path('../lib/', __FILE__)
|
2
|
+
$:.unshift lib unless $:.include?(lib)
|
3
|
+
|
4
|
+
require 'hap_client/version'
|
5
|
+
|
6
|
+
Gem::Specification.new do |s|
|
7
|
+
s.name = 'hap_client'
|
8
|
+
s.version = HapClient::VERSION
|
9
|
+
s.date = '2018-06-15'
|
10
|
+
s.summary = "HAP client"
|
11
|
+
s.description = "Ruby Gem for Apple Homekit Client"
|
12
|
+
s.authors = ["Andreas Bomholtz"]
|
13
|
+
s.email = 'andreas@seluxit.com'
|
14
|
+
s.files = `git ls-files -z`.split("\x0").reject do |f|
|
15
|
+
f.match(%r{^(test|spec|features)/})
|
16
|
+
end
|
17
|
+
s.homepage = 'http://github.com/Seluxit/hap_client'
|
18
|
+
s.license = 'MIT'
|
19
|
+
|
20
|
+
s.add_dependency "eventmachine", '~> 1.2'
|
21
|
+
s.add_dependency "http_parser.rb", '~> 0.6'
|
22
|
+
s.add_dependency "json", '~> 2.1'
|
23
|
+
s.add_dependency 'ruby_home', '0.1.2'
|
24
|
+
s.add_dependency "ruby_home-srp", '1.2.0'
|
25
|
+
|
26
|
+
s.add_development_dependency 'bundler', '~> 1.16'
|
27
|
+
s.add_development_dependency 'rake', '~> 12.3'
|
28
|
+
s.add_development_dependency 'rspec', '~> 3.0'
|
29
|
+
end
|
@@ -0,0 +1,71 @@
|
|
1
|
+
module HAP
|
2
|
+
module EncryptionRequest
|
3
|
+
AAD_LENGTH_BYTES = 2
|
4
|
+
AUTHENTICATE_TAG_LENGTH_BYTES = 16
|
5
|
+
|
6
|
+
attr_reader :encryption_count, :decryption_count
|
7
|
+
|
8
|
+
def encryption_ready?()
|
9
|
+
return !@controller_to_accessory_key.nil?
|
10
|
+
end
|
11
|
+
|
12
|
+
private
|
13
|
+
|
14
|
+
def encrypt(data)
|
15
|
+
@encryption_count ||= 0
|
16
|
+
|
17
|
+
data.chars.each_slice(1024).map(&:join).map do |message|
|
18
|
+
additional_data = [message.length].pack('v')
|
19
|
+
|
20
|
+
chacha20poly1305ietf = RubyHome::HAP::Crypto::ChaCha20Poly1305.new(@controller_to_accessory_key)
|
21
|
+
encrypted_data = chacha20poly1305ietf.encrypt(encryption_nonce, message, additional_data)
|
22
|
+
increment_encryption_count!
|
23
|
+
|
24
|
+
[additional_data, encrypted_data].join
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
def decrypt(data)
|
29
|
+
@decryption_count ||= 0
|
30
|
+
decrypted_data = []
|
31
|
+
read_pointer = 0
|
32
|
+
|
33
|
+
while read_pointer < data.length
|
34
|
+
little_endian_length_of_encrypted_data = data[read_pointer...read_pointer+AAD_LENGTH_BYTES]
|
35
|
+
length_of_encrypted_data = little_endian_length_of_encrypted_data.unpack('v').first
|
36
|
+
read_pointer += AAD_LENGTH_BYTES
|
37
|
+
|
38
|
+
message = data[read_pointer...read_pointer+length_of_encrypted_data]
|
39
|
+
read_pointer += length_of_encrypted_data
|
40
|
+
|
41
|
+
auth_tag = data[read_pointer...read_pointer+AUTHENTICATE_TAG_LENGTH_BYTES]
|
42
|
+
read_pointer += AUTHENTICATE_TAG_LENGTH_BYTES
|
43
|
+
|
44
|
+
ciphertext = message + auth_tag
|
45
|
+
additional_data = little_endian_length_of_encrypted_data
|
46
|
+
chacha20poly1305ietf = RubyHome::HAP::Crypto::ChaCha20Poly1305.new(@accessory_to_controller_key)
|
47
|
+
decrypted_data << chacha20poly1305ietf.decrypt(decryption_nonce, ciphertext, additional_data)
|
48
|
+
|
49
|
+
increment_decryption_count!
|
50
|
+
end
|
51
|
+
|
52
|
+
decrypted_data.join
|
53
|
+
end
|
54
|
+
|
55
|
+
def increment_encryption_count!
|
56
|
+
@encryption_count += 1
|
57
|
+
end
|
58
|
+
|
59
|
+
def encryption_nonce
|
60
|
+
RubyHome::HAP::HexPad.pad([encryption_count].pack('Q<'))
|
61
|
+
end
|
62
|
+
|
63
|
+
def increment_decryption_count!
|
64
|
+
@decryption_count += 1
|
65
|
+
end
|
66
|
+
|
67
|
+
def decryption_nonce
|
68
|
+
RubyHome::HAP::HexPad.pad([decryption_count].pack('Q<'))
|
69
|
+
end
|
70
|
+
end
|
71
|
+
end
|
@@ -0,0 +1,40 @@
|
|
1
|
+
require 'logger'
|
2
|
+
|
3
|
+
module HAP
|
4
|
+
module Log
|
5
|
+
LOG_LVL = ENV['DEBUG'] ? :debug : :info
|
6
|
+
|
7
|
+
def init_log()
|
8
|
+
@log = Logger.new(STDOUT,
|
9
|
+
level: LOG_LVL,
|
10
|
+
progname: self,
|
11
|
+
formatter: proc {|severity, datetime, progname, msg|
|
12
|
+
"[#{datetime}][#{progname}] #{severity}: #{msg}\n"
|
13
|
+
})
|
14
|
+
end
|
15
|
+
|
16
|
+
def fatal(msg)
|
17
|
+
@log.fatal(msg)
|
18
|
+
end
|
19
|
+
|
20
|
+
def error(msg)
|
21
|
+
@log.error(msg)
|
22
|
+
end
|
23
|
+
|
24
|
+
def warn(msg)
|
25
|
+
@log.warn(msg)
|
26
|
+
end
|
27
|
+
|
28
|
+
def info(msg)
|
29
|
+
@log.info(msg)
|
30
|
+
end
|
31
|
+
|
32
|
+
def debug(msg)
|
33
|
+
@log.debug(msg)
|
34
|
+
end
|
35
|
+
|
36
|
+
def log_debug?
|
37
|
+
@log.debug?
|
38
|
+
end
|
39
|
+
end
|
40
|
+
end
|
@@ -0,0 +1,379 @@
|
|
1
|
+
require 'ruby_home/device_id'
|
2
|
+
require 'ruby_home/hap/tlv'
|
3
|
+
require 'ruby_home/hap/hex_pad'
|
4
|
+
require 'ruby_home/hap/crypto/chacha20poly1305'
|
5
|
+
require 'hkdf'
|
6
|
+
require 'ruby_home/hap/crypto/hkdf'
|
7
|
+
require 'ruby_home-srp'
|
8
|
+
require 'ed25519'
|
9
|
+
require 'x25519'
|
10
|
+
|
11
|
+
class PairingError < StandardError
|
12
|
+
end
|
13
|
+
|
14
|
+
module HAP
|
15
|
+
module Pairing
|
16
|
+
ERROR_NAMES = {
|
17
|
+
1 => 'kTLVError_Unknown',
|
18
|
+
2 => 'kTLVError_Authentication',
|
19
|
+
3 => 'kTLVError_Backoff',
|
20
|
+
4 => 'kTLVError_MaxPeers',
|
21
|
+
5 => 'kTLVError_MaxTries',
|
22
|
+
6 => 'kTLVError_Unavailable',
|
23
|
+
7 => 'kTLVError_Busy',
|
24
|
+
}.freeze
|
25
|
+
ERROR_TYPES = ERROR_NAMES.invert.freeze
|
26
|
+
|
27
|
+
def pair_setup(password, &block)
|
28
|
+
info("Pair Setup Step 1/3")
|
29
|
+
@mode = :pair_setup
|
30
|
+
@password = password
|
31
|
+
srp_start_request()
|
32
|
+
|
33
|
+
if block_given?
|
34
|
+
@pair_setup_callback = block
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
def pair_verify(&block)
|
39
|
+
info("Pair Verify 1/2")
|
40
|
+
@mode = :pair_verify
|
41
|
+
verify_start_request()
|
42
|
+
|
43
|
+
if block_given?
|
44
|
+
@pair_verify_callback = block
|
45
|
+
end
|
46
|
+
end
|
47
|
+
|
48
|
+
private
|
49
|
+
|
50
|
+
def pair_setup_parse(data)
|
51
|
+
begin
|
52
|
+
response = check_tlv_response(data)
|
53
|
+
|
54
|
+
case response['kTLVType_State']
|
55
|
+
when 2
|
56
|
+
info("Pair Setup Step 2/3")
|
57
|
+
srp_verify_request(response, @password)
|
58
|
+
when 4
|
59
|
+
srp_verify(response)
|
60
|
+
|
61
|
+
info("Pair Setup Step 3/3")
|
62
|
+
srp_exchange_request()
|
63
|
+
when 6
|
64
|
+
info("Verifying Server Exchange")
|
65
|
+
srp_exchange_verify(response)
|
66
|
+
|
67
|
+
call_pair_setup_callback(true)
|
68
|
+
else
|
69
|
+
error("Unknown Pair Setup State: #{response['kTLVType_State']}")
|
70
|
+
end
|
71
|
+
rescue PairingError => e
|
72
|
+
error("Pair Setup Error: #{e}")
|
73
|
+
call_pair_setup_callback(false, e.to_s)
|
74
|
+
end
|
75
|
+
end
|
76
|
+
|
77
|
+
def call_pair_setup_callback(status, data=nil)
|
78
|
+
if @pair_setup_callback
|
79
|
+
t = @pair_setup_callback
|
80
|
+
@pair_setup_callback = nil
|
81
|
+
t.call(status, data)
|
82
|
+
end
|
83
|
+
end
|
84
|
+
|
85
|
+
def srp_start_request()
|
86
|
+
debug("Pair Setup SRP Start Request")
|
87
|
+
data = RubyHome::HAP::TLV.encode({
|
88
|
+
'kTLVType_State' => 0x01,
|
89
|
+
'kTLVType_Method' => 0x00
|
90
|
+
})
|
91
|
+
post("/pair-setup", "application/pairing+tlv8", data)
|
92
|
+
end
|
93
|
+
|
94
|
+
def srp_verify_request(response, password)
|
95
|
+
debug("Pair Setup SRP Verify Request")
|
96
|
+
|
97
|
+
username = 'Pair-Setup'
|
98
|
+
debug("Using #{password} to pair with device")
|
99
|
+
|
100
|
+
# convert bin variables to hex strings
|
101
|
+
salt = bin_to_hex(response["kTLVType_Salt"])
|
102
|
+
serverPublicKey = bin_to_hex(response["kTLVType_PublicKey"])
|
103
|
+
|
104
|
+
debug("Generating Client Public/Private Keys")
|
105
|
+
@srp_client = RubyHome::SRP::Client.new(3072)
|
106
|
+
clientPublicKey = hex_to_bin(@srp_client.start_authentication())
|
107
|
+
|
108
|
+
debug("Process Challenge from Server")
|
109
|
+
client_M = hex_to_bin(@srp_client.process_challenge(username, password, salt, serverPublicKey))
|
110
|
+
|
111
|
+
debug("Send Client Proof to Server")
|
112
|
+
data = RubyHome::HAP::TLV.encode({
|
113
|
+
'kTLVType_Proof' => client_M,
|
114
|
+
'kTLVType_PublicKey' => clientPublicKey,
|
115
|
+
'kTLVType_State' => 3,
|
116
|
+
'kTLVType_Method' => 0
|
117
|
+
})
|
118
|
+
|
119
|
+
# Save session key
|
120
|
+
@srp_session_key = @srp_client.K
|
121
|
+
|
122
|
+
post("/pair-setup", "application/pairing+tlv8", data)
|
123
|
+
end
|
124
|
+
|
125
|
+
def srp_verify(response)
|
126
|
+
debug("Verifying Server Proof")
|
127
|
+
serverProof = bin_to_hex(response['kTLVType_Proof'])
|
128
|
+
|
129
|
+
unless @srp_client.verify(serverProof)
|
130
|
+
raise PairingError, "Failed to verify server proof"
|
131
|
+
end
|
132
|
+
|
133
|
+
@srp_client = nil
|
134
|
+
end
|
135
|
+
|
136
|
+
def srp_exchange_request()
|
137
|
+
debug("Pair Setup SRP Exchange Request")
|
138
|
+
|
139
|
+
debug("Generate Longterm key")
|
140
|
+
@signature_key = Ed25519::SigningKey.generate.to_bytes.unpack1('H*')
|
141
|
+
@signing_key = Ed25519::SigningKey.new([@signature_key].pack('H*'))
|
142
|
+
|
143
|
+
debug("Generating device id")
|
144
|
+
@client_id = RubyHome::DeviceID.generate()
|
145
|
+
|
146
|
+
debug("Generating Encryption key")
|
147
|
+
hkdf = RubyHome::HAP::Crypto::HKDF.new(info: 'Pair-Setup-Encrypt-Info', salt: 'Pair-Setup-Encrypt-Salt')
|
148
|
+
key = hkdf.encrypt(@srp_session_key)
|
149
|
+
@chacha20poly1305ietf = RubyHome::HAP::Crypto::ChaCha20Poly1305.new(key)
|
150
|
+
|
151
|
+
debug("Generating ClientX")
|
152
|
+
hkdf = RubyHome::HAP::Crypto::HKDF.new(info: 'Pair-Setup-Controller-Sign-Info', salt: 'Pair-Setup-Controller-Sign-Salt')
|
153
|
+
clientX = hkdf.encrypt(@srp_session_key)
|
154
|
+
|
155
|
+
debug("Generating ClientInfo")
|
156
|
+
clientLTPK = @signing_key.verify_key.to_bytes
|
157
|
+
clientInfo = [
|
158
|
+
clientX.unpack1('H*'),
|
159
|
+
@client_id.unpack1('H*'),
|
160
|
+
clientLTPK.unpack1('H*')
|
161
|
+
].join
|
162
|
+
|
163
|
+
debug("Generating Client Signature")
|
164
|
+
clientSignature = @signing_key.sign([clientInfo].pack('H*'))
|
165
|
+
|
166
|
+
debug("Generating Encrypted Data")
|
167
|
+
subtlv = RubyHome::HAP::TLV.encode({
|
168
|
+
'kTLVType_Identifier' => @client_id,
|
169
|
+
'kTLVType_PublicKey' => clientLTPK,
|
170
|
+
'kTLVType_Signature' => clientSignature
|
171
|
+
})
|
172
|
+
nonce = RubyHome::HAP::HexPad.pad('PS-Msg05')
|
173
|
+
encrypted_data = @chacha20poly1305ietf.encrypt(nonce, subtlv)
|
174
|
+
|
175
|
+
debug("Sending Encrypted Request to Server")
|
176
|
+
data = RubyHome::HAP::TLV.encode({
|
177
|
+
'kTLVType_State' => 5,
|
178
|
+
'kTLVType_EncryptedData' => encrypted_data
|
179
|
+
})
|
180
|
+
post("/pair-setup", "application/pairing+tlv8", data)
|
181
|
+
end
|
182
|
+
|
183
|
+
def srp_exchange_verify(response)
|
184
|
+
debug("Decrypting Server Response")
|
185
|
+
encrypted_data = response['kTLVType_EncryptedData']
|
186
|
+
nonce = RubyHome::HAP::HexPad.pad('PS-Msg06')
|
187
|
+
|
188
|
+
decrypted_data = @chacha20poly1305ietf.decrypt(nonce, encrypted_data)
|
189
|
+
unpacked_decrypted_data = RubyHome::HAP::TLV.read(decrypted_data)
|
190
|
+
@chacha20poly1305ietf = nil
|
191
|
+
|
192
|
+
debug("Verifying Server Signature")
|
193
|
+
@serverPairingId = unpacked_decrypted_data['kTLVType_Identifier']
|
194
|
+
serverSignature = unpacked_decrypted_data['kTLVType_Signature']
|
195
|
+
@accessoryltpk = unpacked_decrypted_data['kTLVType_PublicKey']
|
196
|
+
|
197
|
+
hkdf = RubyHome::HAP::Crypto::HKDF.new(info: 'Pair-Setup-Accessory-Sign-Info', salt: 'Pair-Setup-Accessory-Sign-Salt')
|
198
|
+
accessoryx = hkdf.encrypt(@srp_session_key)
|
199
|
+
|
200
|
+
accessoryinfo = [
|
201
|
+
accessoryx.unpack1('H*'),
|
202
|
+
@serverPairingId.unpack1('H*'),
|
203
|
+
@accessoryltpk.unpack1('H*')
|
204
|
+
].join
|
205
|
+
verify_key = RbNaCl::Signatures::Ed25519::VerifyKey.new(@accessoryltpk)
|
206
|
+
|
207
|
+
begin
|
208
|
+
if verify_key.verify(serverSignature, [accessoryinfo].pack('H*'))
|
209
|
+
info("Pairing Success! Server Pairing ID: #{@serverPairingId}")
|
210
|
+
else
|
211
|
+
error("Failed to verify Server Signature")
|
212
|
+
raise PairingError, "Failed to verify Server Signature"
|
213
|
+
end
|
214
|
+
rescue RbNaCl::BadSignatureError
|
215
|
+
error("Failed to verify Server Signature")
|
216
|
+
raise PairingError, "Failed to verify Server Signature"
|
217
|
+
end
|
218
|
+
end
|
219
|
+
|
220
|
+
def pair_verify_parse(data)
|
221
|
+
begin
|
222
|
+
response = check_tlv_response(data)
|
223
|
+
|
224
|
+
case response['kTLVType_State']
|
225
|
+
when 2
|
226
|
+
info("Pair Verify 2/2")
|
227
|
+
verify_finish_request(response)
|
228
|
+
when 4
|
229
|
+
verify_finish_verify()
|
230
|
+
@mode = :paired
|
231
|
+
|
232
|
+
call_pair_verify_callback(true)
|
233
|
+
else
|
234
|
+
error("Unknown Pair Verify State: #{response['kTLVType_State']}")
|
235
|
+
end
|
236
|
+
rescue PairingError => e
|
237
|
+
error("Pair Verify Error: #{e}")
|
238
|
+
call_pair_verify_callback(false, e.to_s)
|
239
|
+
end
|
240
|
+
end
|
241
|
+
|
242
|
+
def call_pair_verify_callback(status, data=nil)
|
243
|
+
if @pair_verify_callback
|
244
|
+
t = @pair_verify_callback
|
245
|
+
@pair_verify_callback = nil
|
246
|
+
t.call(status, data)
|
247
|
+
end
|
248
|
+
end
|
249
|
+
|
250
|
+
def verify_start_request()
|
251
|
+
debug("Generating new Session Public/Private Keys")
|
252
|
+
@client_secret_key = X25519::Scalar.generate
|
253
|
+
@client_public_key = @client_secret_key.public_key.to_bytes
|
254
|
+
|
255
|
+
debug("Sending verify Request to Server")
|
256
|
+
data = RubyHome::HAP::TLV.encode({
|
257
|
+
'kTLVType_State' => 1,
|
258
|
+
'kTLVType_PublicKey' => @client_public_key
|
259
|
+
})
|
260
|
+
post("/pair-verify", "application/pairing+tlv8", data)
|
261
|
+
end
|
262
|
+
|
263
|
+
def verify_finish_request(response)
|
264
|
+
debug("Generating shared secret")
|
265
|
+
server_public_key = X25519::MontgomeryU.new(response['kTLVType_PublicKey'])
|
266
|
+
@shared_secret = @client_secret_key.multiply(server_public_key).to_bytes
|
267
|
+
|
268
|
+
debug("Generating session key")
|
269
|
+
hkdf = RubyHome::HAP::Crypto::HKDF.new(info: 'Pair-Verify-Encrypt-Info', salt: 'Pair-Verify-Encrypt-Salt')
|
270
|
+
session_key = hkdf.encrypt(@shared_secret)
|
271
|
+
|
272
|
+
debug("Decrypting data")
|
273
|
+
subtlv = response['kTLVType_EncryptedData']
|
274
|
+
chacha20poly1305ietf = RubyHome::HAP::Crypto::ChaCha20Poly1305.new(session_key)
|
275
|
+
nonce = RubyHome::HAP::HexPad.pad('PV-Msg02')
|
276
|
+
decrypted_data = chacha20poly1305ietf.decrypt(nonce, subtlv)
|
277
|
+
decrypted_data = RubyHome::HAP::TLV.read(decrypted_data)
|
278
|
+
|
279
|
+
debug("Verifying Server Signature")
|
280
|
+
server_device_id = decrypted_data['kTLVType_Identifier']
|
281
|
+
serverSignature = decrypted_data['kTLVType_Signature']
|
282
|
+
|
283
|
+
accessoryinfo = [
|
284
|
+
server_public_key.to_bytes.unpack1('H*'),
|
285
|
+
server_device_id.unpack1('H*'),
|
286
|
+
@client_public_key.unpack1('H*')
|
287
|
+
].join
|
288
|
+
verify_key = RbNaCl::Signatures::Ed25519::VerifyKey.new(@accessoryltpk)
|
289
|
+
|
290
|
+
begin
|
291
|
+
if !verify_key.verify(serverSignature, [accessoryinfo].pack('H*'))
|
292
|
+
error("Server signature INVALID!")
|
293
|
+
raise PairingError, "Server signature INVALID!"
|
294
|
+
end
|
295
|
+
rescue RbNaCl::BadSignatureError
|
296
|
+
error("Server signature INVALID!")
|
297
|
+
raise PairingError, "Server signature INVALID!"
|
298
|
+
end
|
299
|
+
|
300
|
+
debug("Generating Client Info")
|
301
|
+
clientInfo = [
|
302
|
+
@client_public_key.unpack1('H*'),
|
303
|
+
@client_id.unpack1('H*'),
|
304
|
+
server_public_key.to_bytes.unpack1('H*')
|
305
|
+
].join
|
306
|
+
|
307
|
+
debug("Generating Client Signature")
|
308
|
+
clientSignature = @signing_key.sign([clientInfo].pack('H*'))
|
309
|
+
|
310
|
+
debug("Generating Encrypted Data")
|
311
|
+
subtlv = RubyHome::HAP::TLV.encode({
|
312
|
+
'kTLVType_Identifier' => @client_id,
|
313
|
+
'kTLVType_Signature' => clientSignature
|
314
|
+
})
|
315
|
+
|
316
|
+
chacha20poly1305ietf = RubyHome::HAP::Crypto::ChaCha20Poly1305.new(session_key)
|
317
|
+
nonce = RubyHome::HAP::HexPad.pad('PV-Msg03')
|
318
|
+
encrypted_data = chacha20poly1305ietf.encrypt(nonce, subtlv)
|
319
|
+
|
320
|
+
debug("Sending Encrypted Request to Server")
|
321
|
+
data = RubyHome::HAP::TLV.encode({
|
322
|
+
'kTLVType_State' => 3,
|
323
|
+
'kTLVType_EncryptedData' => encrypted_data
|
324
|
+
})
|
325
|
+
|
326
|
+
post("/pair-verify", "application/pairing+tlv8", data)
|
327
|
+
end
|
328
|
+
|
329
|
+
def verify_finish_verify()
|
330
|
+
hkdf = RubyHome::HAP::Crypto::HKDF.new(info: 'Control-Write-Encryption-Key', salt: 'Control-Salt')
|
331
|
+
@controller_to_accessory_key = hkdf.encrypt(@shared_secret)
|
332
|
+
|
333
|
+
hkdf = RubyHome::HAP::Crypto::HKDF.new(info: 'Control-Read-Encryption-Key', salt: 'Control-Salt')
|
334
|
+
@accessory_to_controller_key = hkdf.encrypt(@shared_secret)
|
335
|
+
|
336
|
+
@shared_secret = nil
|
337
|
+
|
338
|
+
info("Pair Verify Complete")
|
339
|
+
end
|
340
|
+
|
341
|
+
def get_pairing_context()
|
342
|
+
{
|
343
|
+
'client_id' => @client_id,
|
344
|
+
'signature_key' => @signature_key,
|
345
|
+
'accessoryltpk' => @accessoryltpk.unpack1('H*')
|
346
|
+
}
|
347
|
+
end
|
348
|
+
|
349
|
+
def set_pairing_context(context)
|
350
|
+
context = JSON.parse(context) if context.is_a?(String)
|
351
|
+
@client_id = context['client_id']
|
352
|
+
@signature_key = context['signature_key']
|
353
|
+
@accessoryltpk = hex_to_bin(context['accessoryltpk'])
|
354
|
+
|
355
|
+
@signing_key = Ed25519::SigningKey.new([@signature_key].pack('H*'))
|
356
|
+
end
|
357
|
+
|
358
|
+
def check_tlv_response(data)
|
359
|
+
data = RubyHome::HAP::TLV.read(data)
|
360
|
+
|
361
|
+
debug("Response: " + data.to_s)
|
362
|
+
|
363
|
+
if data['kTLVType_Error']
|
364
|
+
error("Failed to pair: #{data}")
|
365
|
+
raise PairingError, ERROR_NAMES[data['kTLVType_Error']]
|
366
|
+
end
|
367
|
+
|
368
|
+
return data
|
369
|
+
end
|
370
|
+
|
371
|
+
def bin_to_hex(s)
|
372
|
+
s.unpack('H*')[0]
|
373
|
+
end
|
374
|
+
|
375
|
+
def hex_to_bin(s)
|
376
|
+
s.scan(/../).map { |x| x.hex.chr }.join
|
377
|
+
end
|
378
|
+
end
|
379
|
+
end
|
@@ -0,0 +1,35 @@
|
|
1
|
+
require 'http/parser'
|
2
|
+
|
3
|
+
module HAP
|
4
|
+
module Parser
|
5
|
+
def init_parser
|
6
|
+
@parser = Http::Parser.new(self)
|
7
|
+
end
|
8
|
+
|
9
|
+
def receive_data(data)
|
10
|
+
if encryption_ready?
|
11
|
+
data = decrypt(data)
|
12
|
+
end
|
13
|
+
|
14
|
+
@parser << data
|
15
|
+
end
|
16
|
+
|
17
|
+
def on_message_begin
|
18
|
+
@headers = nil
|
19
|
+
@body = ''
|
20
|
+
end
|
21
|
+
|
22
|
+
def on_headers_complete(headers)
|
23
|
+
@headers = headers
|
24
|
+
end
|
25
|
+
|
26
|
+
def on_body(chunk)
|
27
|
+
@body << chunk
|
28
|
+
end
|
29
|
+
|
30
|
+
def on_message_complete
|
31
|
+
parse_message(@body)
|
32
|
+
end
|
33
|
+
|
34
|
+
end
|
35
|
+
end
|
@@ -0,0 +1,68 @@
|
|
1
|
+
require_relative 'encryption_request'
|
2
|
+
|
3
|
+
module HAP
|
4
|
+
module Request
|
5
|
+
include EncryptionRequest
|
6
|
+
|
7
|
+
def get(url)
|
8
|
+
request("GET", url)
|
9
|
+
end
|
10
|
+
|
11
|
+
def post(url, type, data)
|
12
|
+
request("POST", url, type, data)
|
13
|
+
end
|
14
|
+
|
15
|
+
def put(url, type, data)
|
16
|
+
request("PUT", url, type, data)
|
17
|
+
end
|
18
|
+
|
19
|
+
private
|
20
|
+
|
21
|
+
def request(method, url, type=nil, data=nil)
|
22
|
+
req = method + " " + url + " HTTP/1.1\r\n"
|
23
|
+
req << "Host: homekit\r\n"
|
24
|
+
|
25
|
+
if type
|
26
|
+
req << "Content-Type: " + type + "\r\n"
|
27
|
+
end
|
28
|
+
if data
|
29
|
+
req << "Content-Length: " + data.length.to_s + "\r\n"
|
30
|
+
end
|
31
|
+
req << "\r\n"
|
32
|
+
|
33
|
+
if log_debug?
|
34
|
+
if data
|
35
|
+
if data[0] == '{'
|
36
|
+
debug(req + data.to_s)
|
37
|
+
else
|
38
|
+
debug(req + RubyHome::HAP::TLV.read(data).to_s)
|
39
|
+
end
|
40
|
+
else
|
41
|
+
debug(req)
|
42
|
+
end
|
43
|
+
end
|
44
|
+
|
45
|
+
if data
|
46
|
+
req << data.to_s
|
47
|
+
end
|
48
|
+
|
49
|
+
if encryption_ready?
|
50
|
+
encrypt(req).each do |r|
|
51
|
+
if @socket.nil?
|
52
|
+
send_data(r)
|
53
|
+
else
|
54
|
+
@socket.write(r)
|
55
|
+
end
|
56
|
+
end
|
57
|
+
else
|
58
|
+
if @socket.nil?
|
59
|
+
send_data(req)
|
60
|
+
else
|
61
|
+
@socket.write(req)
|
62
|
+
end
|
63
|
+
end
|
64
|
+
|
65
|
+
init_parser()
|
66
|
+
end
|
67
|
+
end
|
68
|
+
end
|
data/lib/hap_client.rb
ADDED
@@ -0,0 +1,134 @@
|
|
1
|
+
require 'json'
|
2
|
+
|
3
|
+
require_relative 'hap_client/log'
|
4
|
+
require_relative 'hap_client/parser'
|
5
|
+
require_relative 'hap_client/request'
|
6
|
+
require_relative 'hap_client/pairing'
|
7
|
+
|
8
|
+
module HAP
|
9
|
+
module Client
|
10
|
+
include Log
|
11
|
+
include Parser
|
12
|
+
include Request
|
13
|
+
include Pairing
|
14
|
+
|
15
|
+
def initialize
|
16
|
+
@name = "Unknown Client"
|
17
|
+
@mode = :init
|
18
|
+
@values = {}
|
19
|
+
init_log()
|
20
|
+
end
|
21
|
+
|
22
|
+
def set_value(aid, iid, value)
|
23
|
+
info("Set Value #{aid}:#{iid} to #{value}")
|
24
|
+
data = {
|
25
|
+
"characteristics" => [{
|
26
|
+
"aid" => aid,
|
27
|
+
"iid" => iid,
|
28
|
+
"value" => value
|
29
|
+
}]
|
30
|
+
}
|
31
|
+
|
32
|
+
put("/characteristics", "application/hap+json", JSON.generate(data))
|
33
|
+
end
|
34
|
+
|
35
|
+
def subscribe(aid, iid)
|
36
|
+
info("Subscribe to #{aid} #{iid}")
|
37
|
+
data = {
|
38
|
+
"characteristics" => [{
|
39
|
+
"aid" => aid,
|
40
|
+
"iid" => iid,
|
41
|
+
"ev" => "true"
|
42
|
+
}]
|
43
|
+
}
|
44
|
+
|
45
|
+
put("/characteristics", "application/hap+json", JSON.generate(data))
|
46
|
+
end
|
47
|
+
|
48
|
+
def subscribe_to_all()
|
49
|
+
@values.each do |service|
|
50
|
+
service.each do |val|
|
51
|
+
if val[:perms].include?("ev")
|
52
|
+
subscribe(val[:aid], val[:iid])
|
53
|
+
end
|
54
|
+
end
|
55
|
+
end
|
56
|
+
end
|
57
|
+
|
58
|
+
def get_accessories(&block)
|
59
|
+
info("Get Accessories")
|
60
|
+
get("/")
|
61
|
+
|
62
|
+
if block_given?
|
63
|
+
@callback = block
|
64
|
+
end
|
65
|
+
end
|
66
|
+
|
67
|
+
def to_s
|
68
|
+
@name
|
69
|
+
end
|
70
|
+
|
71
|
+
private
|
72
|
+
|
73
|
+
def parse_message(data)
|
74
|
+
case @mode
|
75
|
+
when :pair_setup
|
76
|
+
pair_setup_parse(data)
|
77
|
+
when :pair_verify
|
78
|
+
pair_verify_parse(data)
|
79
|
+
else
|
80
|
+
if !data.nil? and data != ""
|
81
|
+
data = parse_accessories(data)
|
82
|
+
end
|
83
|
+
|
84
|
+
if @callback
|
85
|
+
t = @callback
|
86
|
+
@callback = nil
|
87
|
+
t.call(data)
|
88
|
+
end
|
89
|
+
end
|
90
|
+
end
|
91
|
+
|
92
|
+
def parse_accessories(data)
|
93
|
+
data = JSON.parse(data, :symbolize_names=>true)
|
94
|
+
|
95
|
+
services = data[:accessories][0][:services]
|
96
|
+
|
97
|
+
services.each do |service|
|
98
|
+
@values[service[:type]] = {}
|
99
|
+
|
100
|
+
parse_characteristics(service)
|
101
|
+
end
|
102
|
+
|
103
|
+
return data
|
104
|
+
end
|
105
|
+
|
106
|
+
def parse_characteristics(service)
|
107
|
+
service[:characteristics].each do |char|
|
108
|
+
val = char[:value]
|
109
|
+
|
110
|
+
@values[service[:type]][char[:type]] = {
|
111
|
+
:aid => char[:aid],
|
112
|
+
:iid => char[:iid],
|
113
|
+
:perms => char[:perms},
|
114
|
+
:value => val
|
115
|
+
}
|
116
|
+
|
117
|
+
if service[:type] == "3E"
|
118
|
+
case char[:type]
|
119
|
+
when "20"
|
120
|
+
@manufacturer = val
|
121
|
+
when "21"
|
122
|
+
@model = val
|
123
|
+
when "23"
|
124
|
+
@name = val
|
125
|
+
when "30"
|
126
|
+
@serial = val
|
127
|
+
when "52"
|
128
|
+
@version = val
|
129
|
+
end
|
130
|
+
end
|
131
|
+
end
|
132
|
+
end
|
133
|
+
end
|
134
|
+
end
|
metadata
ADDED
@@ -0,0 +1,169 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: hap_client
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.0.2
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Andreas Bomholtz
|
8
|
+
autorequire:
|
9
|
+
bindir: bin
|
10
|
+
cert_chain: []
|
11
|
+
date: 2018-06-15 00:00:00.000000000 Z
|
12
|
+
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
name: eventmachine
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
16
|
+
requirements:
|
17
|
+
- - "~>"
|
18
|
+
- !ruby/object:Gem::Version
|
19
|
+
version: '1.2'
|
20
|
+
type: :runtime
|
21
|
+
prerelease: false
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
23
|
+
requirements:
|
24
|
+
- - "~>"
|
25
|
+
- !ruby/object:Gem::Version
|
26
|
+
version: '1.2'
|
27
|
+
- !ruby/object:Gem::Dependency
|
28
|
+
name: http_parser.rb
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
30
|
+
requirements:
|
31
|
+
- - "~>"
|
32
|
+
- !ruby/object:Gem::Version
|
33
|
+
version: '0.6'
|
34
|
+
type: :runtime
|
35
|
+
prerelease: false
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
37
|
+
requirements:
|
38
|
+
- - "~>"
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: '0.6'
|
41
|
+
- !ruby/object:Gem::Dependency
|
42
|
+
name: json
|
43
|
+
requirement: !ruby/object:Gem::Requirement
|
44
|
+
requirements:
|
45
|
+
- - "~>"
|
46
|
+
- !ruby/object:Gem::Version
|
47
|
+
version: '2.1'
|
48
|
+
type: :runtime
|
49
|
+
prerelease: false
|
50
|
+
version_requirements: !ruby/object:Gem::Requirement
|
51
|
+
requirements:
|
52
|
+
- - "~>"
|
53
|
+
- !ruby/object:Gem::Version
|
54
|
+
version: '2.1'
|
55
|
+
- !ruby/object:Gem::Dependency
|
56
|
+
name: ruby_home
|
57
|
+
requirement: !ruby/object:Gem::Requirement
|
58
|
+
requirements:
|
59
|
+
- - '='
|
60
|
+
- !ruby/object:Gem::Version
|
61
|
+
version: 0.1.2
|
62
|
+
type: :runtime
|
63
|
+
prerelease: false
|
64
|
+
version_requirements: !ruby/object:Gem::Requirement
|
65
|
+
requirements:
|
66
|
+
- - '='
|
67
|
+
- !ruby/object:Gem::Version
|
68
|
+
version: 0.1.2
|
69
|
+
- !ruby/object:Gem::Dependency
|
70
|
+
name: ruby_home-srp
|
71
|
+
requirement: !ruby/object:Gem::Requirement
|
72
|
+
requirements:
|
73
|
+
- - '='
|
74
|
+
- !ruby/object:Gem::Version
|
75
|
+
version: 1.2.0
|
76
|
+
type: :runtime
|
77
|
+
prerelease: false
|
78
|
+
version_requirements: !ruby/object:Gem::Requirement
|
79
|
+
requirements:
|
80
|
+
- - '='
|
81
|
+
- !ruby/object:Gem::Version
|
82
|
+
version: 1.2.0
|
83
|
+
- !ruby/object:Gem::Dependency
|
84
|
+
name: bundler
|
85
|
+
requirement: !ruby/object:Gem::Requirement
|
86
|
+
requirements:
|
87
|
+
- - "~>"
|
88
|
+
- !ruby/object:Gem::Version
|
89
|
+
version: '1.16'
|
90
|
+
type: :development
|
91
|
+
prerelease: false
|
92
|
+
version_requirements: !ruby/object:Gem::Requirement
|
93
|
+
requirements:
|
94
|
+
- - "~>"
|
95
|
+
- !ruby/object:Gem::Version
|
96
|
+
version: '1.16'
|
97
|
+
- !ruby/object:Gem::Dependency
|
98
|
+
name: rake
|
99
|
+
requirement: !ruby/object:Gem::Requirement
|
100
|
+
requirements:
|
101
|
+
- - "~>"
|
102
|
+
- !ruby/object:Gem::Version
|
103
|
+
version: '12.3'
|
104
|
+
type: :development
|
105
|
+
prerelease: false
|
106
|
+
version_requirements: !ruby/object:Gem::Requirement
|
107
|
+
requirements:
|
108
|
+
- - "~>"
|
109
|
+
- !ruby/object:Gem::Version
|
110
|
+
version: '12.3'
|
111
|
+
- !ruby/object:Gem::Dependency
|
112
|
+
name: rspec
|
113
|
+
requirement: !ruby/object:Gem::Requirement
|
114
|
+
requirements:
|
115
|
+
- - "~>"
|
116
|
+
- !ruby/object:Gem::Version
|
117
|
+
version: '3.0'
|
118
|
+
type: :development
|
119
|
+
prerelease: false
|
120
|
+
version_requirements: !ruby/object:Gem::Requirement
|
121
|
+
requirements:
|
122
|
+
- - "~>"
|
123
|
+
- !ruby/object:Gem::Version
|
124
|
+
version: '3.0'
|
125
|
+
description: Ruby Gem for Apple Homekit Client
|
126
|
+
email: andreas@seluxit.com
|
127
|
+
executables: []
|
128
|
+
extensions: []
|
129
|
+
extra_rdoc_files: []
|
130
|
+
files:
|
131
|
+
- ".gitignore"
|
132
|
+
- ".ruby-version"
|
133
|
+
- Gemfile
|
134
|
+
- LICENSE
|
135
|
+
- README.md
|
136
|
+
- Rakefile
|
137
|
+
- hap_client.gemspec
|
138
|
+
- lib/hap_client.rb
|
139
|
+
- lib/hap_client/encryption_request.rb
|
140
|
+
- lib/hap_client/log.rb
|
141
|
+
- lib/hap_client/pairing.rb
|
142
|
+
- lib/hap_client/parser.rb
|
143
|
+
- lib/hap_client/request.rb
|
144
|
+
- lib/hap_client/version.rb
|
145
|
+
homepage: http://github.com/Seluxit/hap_client
|
146
|
+
licenses:
|
147
|
+
- MIT
|
148
|
+
metadata: {}
|
149
|
+
post_install_message:
|
150
|
+
rdoc_options: []
|
151
|
+
require_paths:
|
152
|
+
- lib
|
153
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
154
|
+
requirements:
|
155
|
+
- - ">="
|
156
|
+
- !ruby/object:Gem::Version
|
157
|
+
version: '0'
|
158
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
159
|
+
requirements:
|
160
|
+
- - ">="
|
161
|
+
- !ruby/object:Gem::Version
|
162
|
+
version: '0'
|
163
|
+
requirements: []
|
164
|
+
rubyforge_project:
|
165
|
+
rubygems_version: 2.7.6
|
166
|
+
signing_key:
|
167
|
+
specification_version: 4
|
168
|
+
summary: HAP client
|
169
|
+
test_files: []
|