BIP 数据类型解析
通道
开通道
[10:03:03.309] 0x3178 : <<< ComType = 40,Cmd Num = 1, CmdQuallifier = 3>>>
[10:03:03.309] 0x3178 : SM_RESP_FETCH: SAT mode = 1,Cmd Type = 0x40\n
[10:03:03.309] 0x3178 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:03.309] 0x3178 : d0 1c 81 03 01 40 03 82 02 81
[10:03:03.309] 0x3178 : 82 35 01 03 39 02 00 ff 3c 03
[10:03:03.309] 0x3178 : 02 63 d3 3e 05 21 b7 e6 65 c8
[10:03:03.310] 0x3178 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:03.310] 0x3178 : Got API_SIM_FETCH_IND The command ID = [0x40]\n
[10:03:03.310] 0x3178 : nCmdNum : 1\n
[10:03:03.310] 0x3178 : pOffset[0] = 35, nLength = 19, lengthAI = 0
[10:03:03.310] 0x3178 : pOffset[0] = 35, bearerdes.Length = 1
[10:03:03.310] 0x3179 : 1. FetchOpenChannel: nLength = 19(7)
[10:03:03.310] 0x3179 : 2. FetchOpenChannel: nLength = 19(7)
[10:03:03.310] 0x3179 : 3. FetchOpenChannel: nLength = 19(7)
[10:03:03.310] 0x3179 : 4. FetchOpenChannel: nLength = 19(7)
[10:03:03.310] 0x3179 : 5. FetchOpenChannel: nLength = 19(12)
[10:03:03.310] 0x3179 : nMemsize = 5c
[10:03:03.310] 0x3179 : *pOpenChannel = 821521a0, end of struct of a address = 821521f0, alphaiden.Length = 0
[10:03:03.310] 0x3179 : 1nMemsize
[10:03:03.310] 0x3179 : 2nMemsize
[10:03:03.310] 0x3179 : 3nMemsize
[10:03:03.310] 0x3179 : 4nMemsize
[10:03:03.310] 0x3179 : 5nMemsize
[10:03:03.310] 0x3179 : FetchOpenChannel Bearer Type: OPEN_CHANNEL_BEARER_DEFAULT(1, should be equal 1)
[10:03:03.310] 0x3179 : FetchOpenChannel: p->BufferSize = 255, networkname.Length = 0
[10:03:03.310] 0x3179 : userlogin.Length: 0
[10:03:03.310] 0x3179 : userpassword.Length: 0
[10:03:03.310] 0x3179 : TCP
[10:03:03.310] 0x3179 : PortNumber: 25555
[10:03:03.310] 0x3179 : p->DestAddressType: 33
[10:03:03.310] 0x3179 : IPv4
[10:03:03.310] 0x3179 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:03.310] 0x3179 : b7 e6 65 c8
[10:03:03.310] 0x3179 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:03.310] 0x3179 : end of pOffset = 821521fc
[10:03:03.310] 0x3179 : CFW_PostNotifyEvent APP_CFW_UTI=100\n
[10:03:03.310] 0x3179 : CSW --->MMI, EV_CFW_SAT_CMDTYPE_IND , SIM ID:0\n
[10:03:03.310] 0x3179 : WhickKindOfNotifyEvent, APP_CFW_UTIn = 0x100\n
发送数据
[10:03:03.837] 0x3530 : UINT32 Dispatch(), nServiceId = 0x2\n
[10:03:03.837] 0x3530 : ActiveAONum[1] nServiceID[2]\n
[10:03:03.837] 0x3530 : CFW_SatResponseProc nSimID[0] CmdType[0x40]\n
[10:03:03.837] 0x3530 : <<< ComType = 43,Cmd Num = 1, CmdQuallifier = 1>>>
[10:03:03.837] 0x3530 : SM_RESP_FETCH: SAT mode = 1,Cmd Type = 0x43\n
[10:03:03.837] 0x3530 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:03.837] 0x3530 : d0 32 81 03 01 43 01 82 02 81
[10:03:03.837] 0x3530 : 21 36 27 74 0a 22 18 05 ff ff
[10:03:03.837] 0x3531 : f1 40 73 05 19 75 19 02 71 00
[10:03:03.837] 0x3531 : 00 14 0e b0 00 b0 a8 3b 9c 1a
[10:03:03.837] 0x3531 : e6 5b be 5b ea 4d e5 91 6a ca
[10:03:03.837] 0x3531 : 79 39
[10:03:03.837] 0x3531 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:03.837] 0x3531 : Got API_SIM_FETCH_IND The command ID = [0x43]\n
[10:03:03.837] 0x3531 : nCmdNum : 1\n
[10:03:03.837] 0x3531 : pOffset[0] = 36, nLength = 41, lengthAI = 0
[10:03:03.837] 0x3531 : fetchSendData: lengthDL = 41
[10:03:03.837] 0x3531 : fetchSendData: pSendData = 82133f40, nMemsize = 0x38
[10:03:03.837] 0x3531 : *pSendData = 821527f0, end of struct of a address = 82152800, alphaiden.Length = 0
[10:03:03.837] 0x3531 : 1nMemsize
[10:03:03.837] 0x3531 : channeldata.Length = 27
[10:03:03.837] 0x3531 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:03.837] 0x3531 : 74 0a 22 18 05 ff ff f1 40 73
[10:03:03.837] 0x3531 : 05 19 75 19 02 71 00 00 14 0e
[10:03:03.880] 0x3531 : b0 00 b0 a8 3b 9c 1a e6 5b be
[10:03:03.880] 0x3531 : 5b ea 4d e5 91 6a ca 79 39
[10:03:03.880] 0x3531 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:03.880] 0x3531 : end of pOffset = 82152828
[10:03:03.880] 0x3531 : CFW_PostNotifyEvent APP_CFW_UTI=0\n
[10:03:03.880] 0x3531 : WhichNotifyService ID : 0x1397 \n
[10:03:03.880] 0x3532 : CSW --->MMI, EV_CFW_SAT_CMDTYPE_IND , SIM ID:0\n
[10:03:03.880] 0x3532 : CFW_SetAoProcCode ,state CurrentState: 0x0; nProcCode: 0x4\n
[10:03:03.881] 0x3532 : FREE UTI = 0\n
[10:03:03.881] 0x3532 : CFW_UnRegisterAO 1 0x2 ,\n
[10:03:03.881] 0x3532 : CFW_UnRegisterAO ao_name: CFW_SatResponseProc\n
[10:03:03.881] 0x3532 : CFW_UnRegisterAO 5\n
[10:03:03.881] 0x3532 : Process nEventId[a0694]\n
[10:03:03.881] 0x3532 : WhickKindOfNotifyEvent, APP_CFW_UTIn = 0x0\n
[10:03:03.881] 0x3532 : CFW_AoScheduler(), nNotifyID=0xff \n
[10:03:03.881] 0x3532 : AT get event: 0x00001397/0x00000043/0x00000000/0x00000000
[10:03:03.881] 0x3532 : -->EV_CFW_SAT_CMDTYPE_IND \n
[10:03:03.881] 0x3532 : P1[0x43] P2[0x0] nUTI[0] nType[0x0] nFlag[0]\n
[10:03:03.881] 0x3532 : SAT_AsyncEventProcess: nParam3 :0x0
[10:03:03.881] 0x3532 : SAT_AsyncEventProcess: nEventId = 5015, nType:0x0\n
[10:03:03.881] 0x3532 : nMessage == ^STN: 67
[10:03:03.881] 0x3532 : AT CMD0 return=5 result=10 size=8: ^STN: 67
[10:03:03.881] 0x3532 : AT CMD0 urc len=8: ^STN: 67
[10:03:03.881] 0x3532 : AT UART2 write: len=2
[10:03:03.881] 0x3533 : AT UART2 write: len=8
[10:03:03.881] 0x3533 : AT UART2 write: len=2
[10:03:03.881] 0x3533 : ======pCfwEvent->nParam1=67
[10:03:03.881] 0x3533 : Get SEND DATA!, bip_command = 67
[10:03:03.881] 0x3533 : Send data: bip_type = 1, bip_protocol = 6!
[10:03:03.881] 0x3533 : bip_qualifier = 3!
[10:03:03.881] 0x3533 : on demand link establishment/automatic reconnection
[10:03:03.881] 0x3533 : AT_BipProcess: bip_status = 4
[10:03:03.881] 0x3533 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:03.881] 0x3533 : 74 0a 22 18 05 ff ff f1 40 73
[10:03:03.881] 0x3533 : 05 19 75 19 02 71 00 00 14 0e
[10:03:03.881] 0x3533 : b0 00 b0 a8 3b 9c 1a e6 5b be
[10:03:03.881] 0x3533 : 5b ea 4d e5 91 6a ca 79 39
[10:03:03.881] 0x3533 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:03.881] 0x3534 : aps: nEventId == EV_INTER_APS_TCPIP_REQ\n
[10:03:03.881] 0x3534 : data_output : CSW_TCPIP_MALLOC success !!!\n
[10:03:03.881] 0x3534 : data_output : rfAckSeqno 0x0
[10:03:03.881] 0x3534 : CFW_GprsSendData() begin, SimID:0, cid: 1 \r\n
关闭通道
[10:03:04.623] 0x3842 : ActiveAONum[1] nServiceID[2]\n
[10:03:04.666] 0x3842 : CFW_SatResponseProc nSimID[0] CmdType[0x43]\n
[10:03:04.666] 0x3842 : <<< ComType = 41,Cmd Num = 1, CmdQuallifier = 0>>>
[10:03:04.666] 0x3842 : SM_RESP_FETCH: SAT mode = 1,Cmd Type = 0x41\n
[10:03:04.666] 0x3842 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:04.666] 0x3842 : d0 09 81 03 01 41 00 82 02 81
[10:03:04.666] 0x3842 : 21
[10:03:04.666] 0x3842 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:04.666] 0x3842 : Got API_SIM_FETCH_IND The command ID = [0x41]\n
[10:03:04.666] 0x3842 : nCmdNum : 1\n
[10:03:04.666] 0x3843 : riscv action(0x2), DFE status(0x7fff), pll Status(0x0)
[10:03:04.666] 0x3843 : TxPowerOn API@ Frequency 1817600, Band 8, target sf 9005, Counter-TA -7, Power 13
[10:03:04.666] 0x3843 : SYS: TX RF power on power 13
[10:03:04.666] 0x3843 : pOffset + nIndex = -2112646563
[10:03:04.666] 0x3843 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:04.666] 0x3843 : d0 09 81 03 01 41 00 82 02 81
[10:03:04.666] 0x3843 : 21 fd 0a 88 38 92 13 82 01 87
[10:03:04.666] 0x3843 : 18 00 08 00 00 00 88 04 0a 00
[10:03:04.666] 0x3844 : 00 00 00 00 00 fd 00 00 38 92
[10:03:04.666] 0x3844 : 13 82 cf e3 0a 88 10 2c 18 00
[10:03:04.666] 0x3844 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:04.666] 0x3844 : pOffset[0] = fd, nLength = 0, lengthAI = 0
[10:03:04.666] 0x3844 : *pCloseChannel = 821528b4, end of struct of a address = 821528c0, alphaiden.Length = 0
[10:03:04.666] 0x3844 : 1nMemsize
[10:03:04.666] 0x3844 : end of pOffset = 821528c0
[10:03:04.666] 0x3844 : Get CLOSE CHANNEL!
[10:03:04.666] 0x3844 : CFW_PostNotifyEvent APP_CFW_UTI=0\n
[10:03:04.666] 0x3844 : WhichNotifyService ID : 0x1397 \n
[10:03:04.666] 0x3844 : CSW --->MMI, EV_CFW_SAT_CMDTYPE_IND , SIM ID:0\n
[10:03:04.666] 0x3844 : CFW_SetAoProcCode ,state CurrentState: 0x0; nProcCode: 0x4\n
[10:03:04.666] 0x3844 : FREE UTI = 0\n
[10:03:04.666] 0x3844 : CFW_UnRegisterAO 1 0x2 ,\n
[10:03:04.666] 0x3844 : CFW_UnRegisterAO ao_name: CFW_SatResponseProc\n
[10:03:04.666] 0x3844 : CFW_UnRegisterAO 5\n
[10:03:04.666] 0x3844 : Process nEventId[a0694]\n
[10:03:04.666] 0x3844 : WhickKindOfNotifyEvent, APP_CFW_UTIn = 0x0\n
[10:03:04.666] 0x3844 : CFW_AoScheduler(), nNotifyID=0xff \n
[10:03:04.666] 0x3844 : AT get event: 0x00001397/0x00000041/0x00000000/0x00000000
[10:03:04.666] 0x3844 : -->EV_CFW_SAT_CMDTYPE_IND \n
[10:03:04.666] 0x3844 : P1[0x41] P2[0x0] nUTI[0] nType[0x0] nFlag[0]\n
[10:03:04.666] 0x3845 : SAT_AsyncEventProcess: nParam3 :0x0
[10:03:04.666] 0x3845 : SAT_AsyncEventProcess: nEventId = 5015, nType:0x0\n
[10:03:04.666] 0x3845 : nMessage == ^STN: 65
[10:03:04.666] 0x3845 : AT CMD0 return=5 result=10 size=8: ^STN: 65
[10:03:04.666] 0x3845 : AT CMD0 urc len=8: ^STN: 65
[10:03:04.666] 0x3845 : AT UART2 write: len=2
[10:03:04.666] 0x3845 : AT UART2 write: len=8
[10:03:04.666] 0x3845 : AT UART2 write: len=2
[10:03:04.666] 0x3845 : ======pCfwEvent->nParam1=65
[10:03:04.666] 0x3845 : CFW_GprsAct: GprsCidSavedInApp[0x0]: 0x0\r\n
[10:03:04.666] 0x3845 : CFW_GprsAct cid = 0x0, state = 0x0, nUTI = 0x0\n
[10:03:04.666] 0x3845 : ERROR !CID is INVALID\r\n
[10:03:04.666] 0x3845 : Response to CLOSE CHANNEL!
[10:03:04.666] 0x3845 : CFW_SatResponse nCmdType 41 nStatus 0 nItemId 0 InputStrLen 0 nSimID[0]\n
[10:03:04.666] 0x3845 : CFW_RegisterAo NewAO: 0x821528fc pfnAoProc 0x88154401 nSimID 0, ao_name: CFW_SatResponseProc, timeStamp: 0x3e3122\n
[10:03:04.666] 0x3846 : CFW_ProcessAoProcCode 821528fc\n
[10:03:04.666] 0x3846 : Malloc Doing Qu Node 8215294c nServID 2\n
[10:03:04.666] 0x3846 : CFW_SetAoProcCode nServID 2\n
[10:03:04.666] 0x3846 : TriggerStateMachine Begin nSevID 2\n
[10:03:04.666] 0x3846 : CFW_SatResponseProc nSimID[0] CmdType[0x41]\n
[10:03:04.666] 0x3846 : send SAT Response: nSAT_CmdType = 0x41\n
[10:03:04.666] 0x3846 : send SAT Response: nSAT_Status = 0x0\n
[10:03:04.666] 0x3846 : pSimTerminalResponesReq->NbByte = 12\n
[10:03:04.666] 0x3846 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:04.666] 0x3846 : 01 03 01 41 00 02 02 82 81 03
[10:03:04.666] 0x3846 : 01 00
[10:03:04.666] 0x3846 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:04.666] 0x3846 : CFW_SendSclMessage nSimID:0x0 0xa0612 0xa0614\n
指令解析
开通道
序号 | 原始 | 备注(值作为参考) | 明文 |
---|---|---|---|
1 | d0 | Proactive UICC command Tag D0 | 1、0xd0=208 |
2 | 1c | Length (A+B+C+D+E+F+G+H+I+J+K+L+M+N) 1C | 1、0x1c=28 |
3 | 81 03 01 40 03 | Command details X103014003 | 1、0x81 03 01 40 03= |
4 | 82 02 81 82 | Device identities X2028182 | 1、0x82 02 81 82 = |
5 | - | Alpha identifier - | |
6 | - | Icon identifier - | |
7 | 35 01 03 | Bearer description X50103 | 1、0x35 01 03 |
8 | 39 02 00 ff | Buffer size X90200FF | 1、39 02 00 ff= |
9 | - | Network Access Name - | |
10 | - | Other address (local address) - | |
11 | - | Text String (User login) - | |
12 | - | Text String (User password) - | |
13 | 3c 03 02 63 d3 | UICC/terminal interface transport level XC03XX YYYY 备注:XX: 01 UDP 协议 02 TCP 协议 模式由 Terminal Profile 指令中获取的 第 17 字节 bit1 和 bit2 决定 [5]。 YYYY:服务器端口号,参考 2F03 文件及表 9-3 | 1、3c 03= 2、0x02= 3、0x63 d3=25555 |
14 | 3e 05 21 b7 e6 65 c8 | Data destination address XE0521XXXXXXXX 服务器 IP 地址,参考 2F03 文件及表 9-3 | 1、0x3e 05 21= 2、0xb7 e6 65 c8=183.230.101.200 |
15 | - | Text Attribute - | |
16 | - | Frame Identifier - |
发送数据
序号 | 原始 | 备注(值作为参考) | 明文 |
---|---|---|---|
1 | d0 | Proactive UICC command Tag D0 | 1、0xd0=208 |
2 | 32 | Length (A+B+C+D+E+F+G) XX 后续数据长度 | 1、0x32=50 |
3 | 81 03 01 43 01 | Command details X103014301 | 1、0x81 03 01 43 01= |
4 | 82 02 81 21 | Device identities X20281XX | 1、0x82 02 81 21 = |
5 | - | Alpha identifier - | |
6 | - | Icon identifier - | |
7 | 36 27 74 0a 22 18 05 ff ff f1 40 73 05 19 75 19 02 71 00 00 14 0e b0 00 b0 a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39 | Channel data B6XXYY..YY 1、B6 2、XX 后续的数据长度 3、74Tag 4、0a 后续数据长度 5、22 18 05 ff ff f1 40 73 05 19 eid 6、75Tag 7、19 后续数据长度 8、02 UDHL 信息标识长度 9、71 IEIb 安全头标识 10、00 IEIDLb 信息长度 11、00 14 RPL 后续数据长度, 从 RHL 到最后 12、0e RHL 响应报文头长度,从 TAR 开始到 CC(包含 CC)的长度 13、b0 00 b0 TAR 物联网写卡应用 a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39 加密部分需要 kic 解密 00 00 00 01 35 04 00 4B 4C 2A 5B 40 80 00 00 00 解密后内容 14、00 00 00 01 35 CNTR 计数器 15、04 PCNTR 计数器 16、00 Response Status 17、4B 4C 2A 5B CC MAC 校验 18、40 命令类型 19、80 00 00 00 结束标志 | 1、0x36= 2、0x27=39 3、0x74= 4、0x0a=10 5、0x22 18 05 ff ff f1 40 73 05 19=221805FFFFF140730519 6、0x75= 7、0x19=25 8、0x02= 9、0x71= 10、0x00= 11、0x00 14=20 12、0x0e=14 13、0xb0 00 b0= a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39 加密部分需要 kic 解密 00 00 00 01 35 04 00 4B 4C 2A 5B 40 80 00 00 00 解密后内容 14、0x00 00 00 01 35= 15、0x04= 16、0x00= 17、0x4B 4C 2A 5B= 18、0x40= 19、0x80 00 00 00= |
15 | - | Text Attribute - | |
16 | - | Frame Identifier - |
关闭通道
序号 | 原始 | 备注(值作为参考) | 明文 |
---|---|---|---|
1 | d0 | Proactive UICC command Tag D0 | 1、0xd0=208 |
2 | 09 | Length (A+B+C+D+E+F) 09 | 1、0x09=9 |
3 | 81 03 01 41 00 | Command details X103014100 | 1、0x81 03 01 41 00= |
4 | 82 02 81 82 | Device identities X20281XX XX: 终端回复 Open Channel 的 Terminal Response 的 Channel ID 号 | 1、0x82 02 81 82 = |
5 | - | Alpha identifier - | |
6 | - | Icon identifier - | |
7 | - | Text Attribute - | |
8 | - | Frame Identifier - |
备注:
本条记录的eid:
221805FFFFF140730519
对应KIC:(明文)
3615B44C047FCD3601DBC09D39A79857
收到的数据
序号 | 原始 | 备注(值作为参考) | 明文 |
---|---|---|---|
1 | 74 0a 22 18 05 ff ff f1 40 73 05 19 75 19 02 71 00 00 14 0e b0 00 b0 a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39 | Channel data 3、74Tag 4、0a 后续数据长度 5、22 18 05 ff ff f1 40 73 05 19 eid 6、75Tag 7、19 后续数据长度 8、02 UDHL 信息标识长度 9、71 IEIb 安全头标识 10、00 IEIDLb 信息长度 11、00 14 RPL 后续数据长度, 从 RHL 到最后 12、0e RHL 响应报文头长度,从 TAR 开始到 CC(包含 CC)的长度 13、b0 00 b0 TAR 物联网写卡应用 a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39 加密部分需要 kic 解密 00 00 00 01 35 04 00 4B 4C 2A 5B 40 80 00 00 00 解密后内容 14、00 00 00 01 35 CNTR 计数器 15、04 PCNTR 计数器 16、00 Response Status 17、4B 4C 2A 5B CC MAC 校验 18、40 命令类型 19、80 00 00 00 结束标志 | 3、0x74= 4、0x0a=10 5、0x22 18 05 ff ff f1 40 73 05 19=221805FFFFF140730519 6、0x75= 7、0x19=25 8、0x02= 9、0x71= 10、0x00= 11、0x00 14=20 12、0x0e=14 13、0xb0 00 b0= a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39 加密部分需要 kic 解密 00 00 00 01 35 04 00 4B 4C 2A 5B 40 80 00 00 00 解密后内容 14、0x00 00 00 01 35= 15、0x04= 16、0x00= 17、0x4B 4C 2A 5B= 18、0x40= 19、0x80 00 00 00= |