BIP 数据类型解析

图片.png

通道

开通道

[10:03:03.309]   0x3178 : <<< ComType =  40,Cmd Num = 1, CmdQuallifier = 3>>>
[10:03:03.309]   0x3178 : SM_RESP_FETCH: SAT mode =  1,Cmd Type = 0x40\n
[10:03:03.309]   0x3178 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:03.309]   0x3178 : d0 1c 81 03 01 40 03 82 02 81
[10:03:03.309]   0x3178 : 82 35 01 03 39 02 00 ff 3c 03
[10:03:03.309]   0x3178 : 02 63 d3 3e 05 21 b7 e6 65 c8
[10:03:03.310]   0x3178 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:03.310]   0x3178 : Got API_SIM_FETCH_IND The command ID = [0x40]\n
[10:03:03.310]   0x3178 : nCmdNum : 1\n
[10:03:03.310]   0x3178 : pOffset[0] = 35, nLength = 19, lengthAI = 0
[10:03:03.310]   0x3178 : pOffset[0] = 35, bearerdes.Length = 1
[10:03:03.310]   0x3179 : 1. FetchOpenChannel: nLength = 19(7)
[10:03:03.310]   0x3179 : 2. FetchOpenChannel: nLength = 19(7)
[10:03:03.310]   0x3179 : 3. FetchOpenChannel: nLength = 19(7)
[10:03:03.310]   0x3179 : 4. FetchOpenChannel: nLength = 19(7)
[10:03:03.310]   0x3179 : 5. FetchOpenChannel: nLength = 19(12)
[10:03:03.310]   0x3179 : nMemsize = 5c
[10:03:03.310]   0x3179 : *pOpenChannel = 821521a0, end of struct of a address = 821521f0, alphaiden.Length = 0
[10:03:03.310]   0x3179 : 1nMemsize
[10:03:03.310]   0x3179 : 2nMemsize
[10:03:03.310]   0x3179 : 3nMemsize
[10:03:03.310]   0x3179 : 4nMemsize
[10:03:03.310]   0x3179 : 5nMemsize
[10:03:03.310]   0x3179 : FetchOpenChannel Bearer Type: OPEN_CHANNEL_BEARER_DEFAULT(1, should be equal 1)
[10:03:03.310]   0x3179 : FetchOpenChannel: p->BufferSize = 255, networkname.Length = 0
[10:03:03.310]   0x3179 : userlogin.Length: 0
[10:03:03.310]   0x3179 : userpassword.Length: 0
[10:03:03.310]   0x3179 : TCP
[10:03:03.310]   0x3179 : PortNumber: 25555
[10:03:03.310]   0x3179 : p->DestAddressType: 33
[10:03:03.310]   0x3179 : IPv4
[10:03:03.310]   0x3179 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:03.310]   0x3179 : b7 e6 65 c8
[10:03:03.310]   0x3179 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:03.310]   0x3179 : end of pOffset = 821521fc
[10:03:03.310]   0x3179 : CFW_PostNotifyEvent  APP_CFW_UTI=100\n
[10:03:03.310]   0x3179 : CSW --->MMI, EV_CFW_SAT_CMDTYPE_IND , SIM ID:0\n
[10:03:03.310]   0x3179 : WhickKindOfNotifyEvent,  APP_CFW_UTIn = 0x100\n

发送数据

[10:03:03.837]   0x3530 : UINT32 Dispatch(),  nServiceId = 0x2\n
[10:03:03.837]   0x3530 : ActiveAONum[1] nServiceID[2]\n
[10:03:03.837]   0x3530 : CFW_SatResponseProc nSimID[0] CmdType[0x40]\n
[10:03:03.837]   0x3530 : <<< ComType =  43,Cmd Num = 1, CmdQuallifier = 1>>>
[10:03:03.837]   0x3530 : SM_RESP_FETCH: SAT mode =  1,Cmd Type = 0x43\n
[10:03:03.837]   0x3530 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:03.837]   0x3530 : d0 32 81 03 01 43 01 82 02 81
[10:03:03.837]   0x3530 : 21 36 27 74 0a 22 18 05 ff ff
[10:03:03.837]   0x3531 : f1 40 73 05 19 75 19 02 71 00
[10:03:03.837]   0x3531 : 00 14 0e b0 00 b0 a8 3b 9c 1a
[10:03:03.837]   0x3531 : e6 5b be 5b ea 4d e5 91 6a ca
[10:03:03.837]   0x3531 : 79 39
[10:03:03.837]   0x3531 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:03.837]   0x3531 : Got API_SIM_FETCH_IND The command ID = [0x43]\n
[10:03:03.837]   0x3531 : nCmdNum : 1\n
[10:03:03.837]   0x3531 : pOffset[0] = 36, nLength = 41, lengthAI = 0
[10:03:03.837]   0x3531 : fetchSendData: lengthDL = 41
[10:03:03.837]   0x3531 : fetchSendData: pSendData = 82133f40, nMemsize = 0x38
[10:03:03.837]   0x3531 : *pSendData = 821527f0, end of struct of a address = 82152800, alphaiden.Length = 0
[10:03:03.837]   0x3531 : 1nMemsize
[10:03:03.837]   0x3531 : channeldata.Length = 27
[10:03:03.837]   0x3531 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:03.837]   0x3531 : 74 0a 22 18 05 ff ff f1 40 73
[10:03:03.837]   0x3531 : 05 19 75 19 02 71 00 00 14 0e
[10:03:03.880]   0x3531 : b0 00 b0 a8 3b 9c 1a e6 5b be
[10:03:03.880]   0x3531 : 5b ea 4d e5 91 6a ca 79 39
[10:03:03.880]   0x3531 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:03.880]   0x3531 : end of pOffset = 82152828
[10:03:03.880]   0x3531 : CFW_PostNotifyEvent  APP_CFW_UTI=0\n
[10:03:03.880]   0x3531 : WhichNotifyService ID : 0x1397 \n
[10:03:03.880]   0x3532 : CSW --->MMI, EV_CFW_SAT_CMDTYPE_IND , SIM ID:0\n
[10:03:03.880]   0x3532 : CFW_SetAoProcCode ,state CurrentState: 0x0; nProcCode: 0x4\n
[10:03:03.881]   0x3532 : FREE UTI = 0\n
[10:03:03.881]   0x3532 : CFW_UnRegisterAO 1 0x2  ,\n
[10:03:03.881]   0x3532 : CFW_UnRegisterAO ao_name: CFW_SatResponseProc\n
[10:03:03.881]   0x3532 : CFW_UnRegisterAO 5\n
[10:03:03.881]   0x3532 : Process nEventId[a0694]\n
[10:03:03.881]   0x3532 : WhickKindOfNotifyEvent,  APP_CFW_UTIn = 0x0\n
[10:03:03.881]   0x3532 : CFW_AoScheduler(),  nNotifyID=0xff \n
[10:03:03.881]   0x3532 : AT get event: 0x00001397/0x00000043/0x00000000/0x00000000
[10:03:03.881]   0x3532 : -->EV_CFW_SAT_CMDTYPE_IND \n
[10:03:03.881]   0x3532 : P1[0x43] P2[0x0] nUTI[0] nType[0x0] nFlag[0]\n
[10:03:03.881]   0x3532 : SAT_AsyncEventProcess: nParam3 :0x0
[10:03:03.881]   0x3532 : SAT_AsyncEventProcess: nEventId = 5015, nType:0x0\n
[10:03:03.881]   0x3532 : nMessage == ^STN: 67
[10:03:03.881]   0x3532 : AT CMD0 return=5 result=10 size=8: ^STN: 67
[10:03:03.881]   0x3532 : AT CMD0 urc len=8: ^STN: 67
[10:03:03.881]   0x3532 : AT UART2 write: len=2
[10:03:03.881]   0x3533 : AT UART2 write: len=8
[10:03:03.881]   0x3533 : AT UART2 write: len=2
[10:03:03.881]   0x3533 : ======pCfwEvent->nParam1=67
[10:03:03.881]   0x3533 : Get SEND DATA!, bip_command = 67
[10:03:03.881]   0x3533 : Send data: bip_type = 1, bip_protocol = 6!
[10:03:03.881]   0x3533 : bip_qualifier = 3!
[10:03:03.881]   0x3533 : on demand link establishment/automatic reconnection
[10:03:03.881]   0x3533 : AT_BipProcess: bip_status = 4
[10:03:03.881]   0x3533 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:03.881]   0x3533 : 74 0a 22 18 05 ff ff f1 40 73
[10:03:03.881]   0x3533 : 05 19 75 19 02 71 00 00 14 0e
[10:03:03.881]   0x3533 : b0 00 b0 a8 3b 9c 1a e6 5b be
[10:03:03.881]   0x3533 : 5b ea 4d e5 91 6a ca 79 39
[10:03:03.881]   0x3533 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:03.881]   0x3534 : aps: nEventId == EV_INTER_APS_TCPIP_REQ\n
[10:03:03.881]   0x3534 : data_output : CSW_TCPIP_MALLOC  success   !!!\n
[10:03:03.881]   0x3534 : data_output :   rfAckSeqno   0x0
[10:03:03.881]   0x3534 : CFW_GprsSendData() begin, SimID:0, cid: 1 \r\n

关闭通道

[10:03:04.623]   0x3842 : ActiveAONum[1] nServiceID[2]\n
[10:03:04.666]   0x3842 : CFW_SatResponseProc nSimID[0] CmdType[0x43]\n
[10:03:04.666]   0x3842 : <<< ComType =  41,Cmd Num = 1, CmdQuallifier = 0>>>
[10:03:04.666]   0x3842 : SM_RESP_FETCH: SAT mode =  1,Cmd Type = 0x41\n
[10:03:04.666]   0x3842 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:04.666]   0x3842 : d0 09 81 03 01 41 00 82 02 81
[10:03:04.666]   0x3842 : 21
[10:03:04.666]   0x3842 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:04.666]   0x3842 : Got API_SIM_FETCH_IND The command ID = [0x41]\n
[10:03:04.666]   0x3842 : nCmdNum : 1\n
[10:03:04.666]   0x3843 : riscv action(0x2), DFE status(0x7fff), pll Status(0x0)
[10:03:04.666]   0x3843 : TxPowerOn API@ Frequency 1817600, Band 8, target sf 9005, Counter-TA -7, Power 13
[10:03:04.666]   0x3843 : SYS: TX RF power on power 13
[10:03:04.666]   0x3843 : pOffset + nIndex = -2112646563
[10:03:04.666]   0x3843 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:04.666]   0x3843 : d0 09 81 03 01 41 00 82 02 81
[10:03:04.666]   0x3843 : 21 fd 0a 88 38 92 13 82 01 87
[10:03:04.666]   0x3843 : 18 00 08 00 00 00 88 04 0a 00
[10:03:04.666]   0x3844 : 00 00 00 00 00 fd 00 00 38 92
[10:03:04.666]   0x3844 : 13 82 cf e3 0a 88 10 2c 18 00
[10:03:04.666]   0x3844 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:04.666]   0x3844 : pOffset[0] = fd, nLength = 0, lengthAI = 0
[10:03:04.666]   0x3844 : *pCloseChannel = 821528b4, end of struct of a address = 821528c0, alphaiden.Length = 0
[10:03:04.666]   0x3844 : 1nMemsize
[10:03:04.666]   0x3844 : end of pOffset = 821528c0
[10:03:04.666]   0x3844 : Get CLOSE CHANNEL!
[10:03:04.666]   0x3844 : CFW_PostNotifyEvent  APP_CFW_UTI=0\n
[10:03:04.666]   0x3844 : WhichNotifyService ID : 0x1397 \n
[10:03:04.666]   0x3844 : CSW --->MMI, EV_CFW_SAT_CMDTYPE_IND , SIM ID:0\n
[10:03:04.666]   0x3844 : CFW_SetAoProcCode ,state CurrentState: 0x0; nProcCode: 0x4\n
[10:03:04.666]   0x3844 : FREE UTI = 0\n
[10:03:04.666]   0x3844 : CFW_UnRegisterAO 1 0x2  ,\n
[10:03:04.666]   0x3844 : CFW_UnRegisterAO ao_name: CFW_SatResponseProc\n
[10:03:04.666]   0x3844 : CFW_UnRegisterAO 5\n
[10:03:04.666]   0x3844 : Process nEventId[a0694]\n
[10:03:04.666]   0x3844 : WhickKindOfNotifyEvent,  APP_CFW_UTIn = 0x0\n
[10:03:04.666]   0x3844 : CFW_AoScheduler(),  nNotifyID=0xff \n
[10:03:04.666]   0x3844 : AT get event: 0x00001397/0x00000041/0x00000000/0x00000000
[10:03:04.666]   0x3844 : -->EV_CFW_SAT_CMDTYPE_IND \n
[10:03:04.666]   0x3844 : P1[0x41] P2[0x0] nUTI[0] nType[0x0] nFlag[0]\n
[10:03:04.666]   0x3845 : SAT_AsyncEventProcess: nParam3 :0x0
[10:03:04.666]   0x3845 : SAT_AsyncEventProcess: nEventId = 5015, nType:0x0\n
[10:03:04.666]   0x3845 : nMessage == ^STN: 65
[10:03:04.666]   0x3845 : AT CMD0 return=5 result=10 size=8: ^STN: 65
[10:03:04.666]   0x3845 : AT CMD0 urc len=8: ^STN: 65
[10:03:04.666]   0x3845 : AT UART2 write: len=2
[10:03:04.666]   0x3845 : AT UART2 write: len=8
[10:03:04.666]   0x3845 : AT UART2 write: len=2
[10:03:04.666]   0x3845 : ======pCfwEvent->nParam1=65
[10:03:04.666]   0x3845 : CFW_GprsAct: GprsCidSavedInApp[0x0]: 0x0\r\n
[10:03:04.666]   0x3845 : CFW_GprsAct cid = 0x0, state = 0x0, nUTI = 0x0\n
[10:03:04.666]   0x3845 : ERROR !CID is INVALID\r\n
[10:03:04.666]   0x3845 : Response to CLOSE CHANNEL!
[10:03:04.666]   0x3845 : CFW_SatResponse nCmdType 41 nStatus 0 nItemId 0 InputStrLen 0 nSimID[0]\n
[10:03:04.666]   0x3845 : CFW_RegisterAo NewAO: 0x821528fc pfnAoProc 0x88154401 nSimID 0, ao_name: CFW_SatResponseProc, timeStamp: 0x3e3122\n
[10:03:04.666]   0x3846 : CFW_ProcessAoProcCode 821528fc\n
[10:03:04.666]   0x3846 : Malloc Doing Qu Node 8215294c nServID 2\n
[10:03:04.666]   0x3846 : CFW_SetAoProcCode nServID 2\n
[10:03:04.666]   0x3846 : TriggerStateMachine Begin nSevID 2\n
[10:03:04.666]   0x3846 : CFW_SatResponseProc nSimID[0] CmdType[0x41]\n
[10:03:04.666]   0x3846 : send SAT Response: nSAT_CmdType = 0x41\n
[10:03:04.666]   0x3846 : send SAT Response: nSAT_Status = 0x0\n
[10:03:04.666]   0x3846 : pSimTerminalResponesReq->NbByte = 12\n
[10:03:04.666]   0x3846 : ==================TRACE MEMORY BLOCK=====================>>
[10:03:04.666]   0x3846 : 01 03 01 41 00 02 02 82 81 03
[10:03:04.666]   0x3846 : 01 00
[10:03:04.666]   0x3846 : ==================TRACE MEMORY BLOCK=====================<<
[10:03:04.666]   0x3846 : CFW_SendSclMessage nSimID:0x0  0xa0612 0xa0614\n

指令解析

开通道

序号原始备注(值作为参考)明文
1d0
Proactive UICC command Tag
D0
1、0xd0=208
21c
Length
(A+B+C+D+E+F+G+H+I+J+K+L+M+N)
1C
1、0x1c=28
381
03
01
40
03
Command details
X103014003
1、0x81 03 01 40 03=
482
02
81
82
Device identities
X2028182
1、0x82 02 81 82 =
5-Alpha identifier
-
6-Icon identifier
-
735
01
03
Bearer description
X50103
1、0x35 01 03
839
02
00
ff
Buffer size
X90200FF
1、39 02 00 ff=
9-Network Access Name
-
10-Other address (local address)
-
11-Text String (User login)
-
12-Text String (User password)
-
133c
03
02
63
d3
UICC/terminal interface transport level
XC03XX YYYY
备注:XX: 01 UDP 协议 02 TCP 协议
模式由 Terminal Profile 指令中获取的
第 17 字节 bit1 和 bit2 决定 [5]。
YYYY:服务器端口号,参考 2F03 文件及表 9-3
1、3c 03=
2、0x02=
3、0x63 d3=25555
143e
05
21
b7
e6
65
c8
Data destination address
XE0521XXXXXXXX
服务器 IP 地址,参考 2F03 文件及表 9-3
1、0x3e 05 21=
2、0xb7 e6 65 c8=183.230.101.200
15-Text Attribute
-
16-Frame Identifier
-

发送数据

序号原始备注(值作为参考)明文
1d0
Proactive UICC command Tag
D0
1、0xd0=208
232
Length
(A+B+C+D+E+F+G)
XX 后续数据长度
1、0x32=50
381
03
01
43
01
Command details
X103014301
1、0x81 03 01 43 01=
482
02
81
21
Device identities
X20281XX
1、0x82 02 81 21 =
5-Alpha identifier
-
6-Icon identifier
-
736 27
74
0a
22 18 05 ff ff f1 40 73 05 19
75
19
02
71
00
00 14
0e
b0 00 b0
a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39
Channel data
B6XXYY..YY
1、B6
2、XX 后续的数据长度
3、74Tag
4、0a 后续数据长度
5、22 18 05 ff ff f1 40 73 05 19 eid
6、75Tag
7、19 后续数据长度
8、02 UDHL 信息标识长度
9、71 IEIb 安全头标识
10、00 IEIDLb 信息长度
11、00 14 RPL 后续数据长度, 从 RHL 到最后
12、0e RHL 响应报文头长度,从 TAR 开始到 CC(包含 CC)的长度
13、b0 00 b0 TAR 物联网写卡应用
a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39 加密部分需要 kic 解密
00 00 00 01 35 04 00 4B 4C 2A 5B 40 80 00 00 00 解密后内容
14、00 00 00 01 35 CNTR 计数器
15、04 PCNTR 计数器
16、00 Response Status
17、4B 4C 2A 5B CC MAC 校验
18、40 命令类型
19、80 00 00 00 结束标志
1、0x36=
2、0x27=39
3、0x74=
4、0x0a=10
5、0x22 18 05 ff ff f1 40 73 05 19=221805FFFFF140730519
6、0x75=
7、0x19=25
8、0x02=
9、0x71=
10、0x00=
11、0x00 14=20
12、0x0e=14
13、0xb0 00 b0=
a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39 加密部分需要 kic 解密
00 00 00 01 35 04 00 4B 4C 2A 5B 40 80 00 00 00 解密后内容
14、0x00 00 00 01 35=
15、0x04=
16、0x00=
17、0x4B 4C 2A 5B=
18、0x40=
19、0x80 00 00 00=
15-Text Attribute
-
16-Frame Identifier
-

关闭通道

序号原始备注(值作为参考)明文
1d0
Proactive UICC command Tag
D0
1、0xd0=208
209
Length
(A+B+C+D+E+F)
09
1、0x09=9
381
03
01
41
00
Command details
X103014100
1、0x81 03 01 41 00=
482
02
81
82
Device identities
X20281XX
XX: 终端回复 Open Channel 的 Terminal Response 的 Channel ID 号
1、0x82 02 81 82 =
5-Alpha identifier
-
6-Icon identifier
-
7-Text Attribute
-
8-Frame Identifier
-

备注:

本条记录的eid:
221805FFFFF140730519
对应KIC:(明文)
3615B44C047FCD3601DBC09D39A79857

收到的数据

序号原始备注(值作为参考)明文
174
0a
22 18 05 ff ff f1 40 73 05 19
75
19
02
71
00
00 14
0e
b0 00 b0
a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39
Channel data
3、74Tag
4、0a 后续数据长度
5、22 18 05 ff ff f1 40 73 05 19 eid
6、75Tag
7、19 后续数据长度
8、02 UDHL 信息标识长度
9、71 IEIb 安全头标识
10、00 IEIDLb 信息长度
11、00 14 RPL 后续数据长度, 从 RHL 到最后
12、0e RHL 响应报文头长度,从 TAR 开始到 CC(包含 CC)的长度
13、b0 00 b0 TAR 物联网写卡应用
a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39 加密部分需要 kic 解密
00 00 00 01 35 04 00 4B 4C 2A 5B 40 80 00 00 00 解密后内容
14、00 00 00 01 35 CNTR 计数器
15、04 PCNTR 计数器
16、00 Response Status
17、4B 4C 2A 5B CC MAC 校验
18、40 命令类型
19、80 00 00 00 结束标志
3、0x74=
4、0x0a=10
5、0x22 18 05 ff ff f1 40 73 05 19=221805FFFFF140730519
6、0x75=
7、0x19=25
8、0x02=
9、0x71=
10、0x00=
11、0x00 14=20
12、0x0e=14
13、0xb0 00 b0=
a8 3b 9c 1a e6 5b be 5b ea 4d e5 91 6a ca 79 39 加密部分需要 kic 解密
00 00 00 01 35 04 00 4B 4C 2A 5B 40 80 00 00 00 解密后内容
14、0x00 00 00 01 35=
15、0x04=
16、0x00=
17、0x4B 4C 2A 5B=
18、0x40=
19、0x80 00 00 00=

上一篇 抽检短信
短信写卡目录
下一篇 写卡失败原因分析