Implement new authentication commands and improve PSK handling

This commit is contained in:
seydx
2026-01-12 02:13:00 +01:00
parent 58d8a86a92
commit 659a042c42
5 changed files with 196 additions and 107 deletions
+82 -12
View File
@@ -352,24 +352,26 @@ func (c *Client) doKAuth() error {
fmt.Printf("[Wyze] K10001 received, status=%d\n", status)
}
// Step 3: Send K10002
k10002 := c.buildK10002(challenge, status)
if err := c.conn.SendIOCtrl(tutk.KCmdChallengeResp, k10002); err != nil {
return fmt.Errorf("wyze: K10002 send failed: %w", err)
// Step 3: Send K10008
k10008 := c.buildK10008(challenge, status)
if err := c.conn.SendIOCtrl(tutk.KCmdChallengeResp, k10008); err != nil {
return fmt.Errorf("wyze: K10008 send failed: %w", err)
}
// Step 4: Wait for K10003
// Step 4: Wait for K10009
cmdID, data, err = c.conn.RecvIOCtrl(10 * time.Second)
if err != nil {
return fmt.Errorf("wyze: K10003 recv failed: %w", err)
}
if cmdID != tutk.KCmdAuthResult {
return fmt.Errorf("wyze: expected K10003, got K%d", cmdID)
return fmt.Errorf("wyze: K10009 recv failed: %w", err)
}
authResp, err := c.parseK10003(data)
if cmdID != tutk.KCmdAuthSuccess {
return fmt.Errorf("wyze: expected K10009, got K%d", cmdID)
}
authResp, err := c.parseK10009(data)
if err != nil {
return fmt.Errorf("wyze: K10003 parse failed: %w", err)
return fmt.Errorf("wyze: K10009 parse failed: %w", err)
}
// Parse capabilities
@@ -405,11 +407,18 @@ func (c *Client) doKAuth() error {
}
func (c *Client) buildK10000() []byte {
buf := make([]byte, 16)
// 137 = G.711 μ-law (PCMU)
// 138 = G.711 A-law (PCMA)
// 140 = PCM 16-bit
jsonPayload := []byte(`{"cameraInfo":{"audioEncoderList":[137,138,140]}}`)
buf := make([]byte, 16+len(jsonPayload))
buf[0] = 'H'
buf[1] = 'L'
buf[2] = 5
binary.LittleEndian.PutUint16(buf[4:], tutk.KCmdAuth)
binary.LittleEndian.PutUint16(buf[6:], uint16(len(jsonPayload)))
copy(buf[16:], jsonPayload)
return buf
}
@@ -437,6 +446,28 @@ func (c *Client) buildK10002(challenge []byte, status byte) []byte {
return buf
}
func (c *Client) buildK10008(challenge []byte, status byte) []byte {
response := crypto.GenerateChallengeResponse(challenge, c.enr, status)
openUserID := []byte(c.enr)
payloadLen := 16 + 4 + 1 + 1 + 1 + len(openUserID)
buf := make([]byte, 16+payloadLen)
buf[0] = 'H'
buf[1] = 'L'
buf[2] = 5 // Protocol version
binary.LittleEndian.PutUint16(buf[4:], tutk.KCmdAuthWithPayload) // 10008
binary.LittleEndian.PutUint16(buf[6:], uint16(payloadLen))
copy(buf[16:], response[:16]) // Challenge response
copy(buf[32:], c.uid[:4]) // UID prefix
buf[36] = 1 // Video enabled
buf[37] = 1 // Audio enabled
buf[38] = byte(len(openUserID))
copy(buf[39:], openUserID)
return buf
}
func (c *Client) buildK10010(mediaType byte, enabled bool) []byte {
buf := make([]byte, 18)
buf[0] = 'H'
@@ -529,3 +560,42 @@ func (c *Client) parseK10003(data []byte) (*tutk.AuthResponse, error) {
return &tutk.AuthResponse{}, nil
}
func (c *Client) parseK10009(data []byte) (*tutk.AuthResponse, error) {
if c.verbose {
fmt.Printf("[Wyze] parseK10009: received %d bytes\n", len(data))
}
if len(data) < 16 {
return &tutk.AuthResponse{}, nil
}
if data[0] != 'H' || data[1] != 'L' {
return &tutk.AuthResponse{}, nil
}
cmdID := binary.LittleEndian.Uint16(data[4:])
textLen := binary.LittleEndian.Uint16(data[6:])
if cmdID != tutk.KCmdAuthSuccess {
return &tutk.AuthResponse{}, nil
}
if len(data) > 16 && textLen > 0 {
jsonData := data[16:]
for i := range jsonData {
if jsonData[i] == '{' {
var resp tutk.AuthResponse
if err := json.Unmarshal(jsonData[i:], &resp); err == nil {
if c.verbose {
fmt.Printf("[Wyze] parseK10009: parsed JSON\n")
}
return &resp, nil
}
break
}
}
}
return &tutk.AuthResponse{}, nil
}
+8
View File
@@ -56,6 +56,10 @@ func NewProducer(rawURL string) (*Producer, error) {
func (p *Producer) Start() error {
for {
if p.client.verbose {
fmt.Println("[Wyze] Reading packet...")
}
_ = p.client.SetDeadline(time.Now().Add(core.ConnDeadline))
pkt, err := p.client.ReadPacket()
if err != nil {
@@ -136,6 +140,10 @@ func probe(client *Client, sd bool) ([]*core.Media, error) {
var tutkAudioCodec uint16
for {
if client.verbose {
fmt.Println("[Wyze] Probing for codecs...")
}
pkt, err := client.ReadPacket()
if err != nil {
return nil, fmt.Errorf("wyze: probe: %w", err)
+27 -1
View File
@@ -349,7 +349,33 @@ DTLS records are wrapped in IOTC DATA_TX (0x0407) packets for transmission and e
```
Identity: "AUTHPWD_admin"
PSK: SHA256(ENR_string) → 32 bytes
PSK: SHA256(ENR_string) → variable length (see below)
```
#### PSK Length Determination
**CRITICAL**: The TUTK SDK treats the binary PSK as a NULL-terminated C string.
This means the effective PSK length is determined by the first `0x00` byte in the SHA256 hash:
```
hash = SHA256(ENR)
psk_length = position of first 0x00 byte in hash (or 32 if no 0x00)
psk = hash[0:psk_length] + zeros[psk_length:32]
```
**Example 1** - No NULL byte in hash (full 32-byte PSK):
```
ENR: "aKzdqckqZ8HUHFe5"
SHA256: 3e5b96b8d6fc7264b531e1633de9526929d453cb47606c55d574a6e0ef5eb95f
^^ No 0x00 byte → PSK length = 32
```
**Example 2** - NULL byte at position 11 (11-byte PSK):
```
ENR: "GkB9S7cX38GgzSC6"
SHA256: 16549c533b4e9812808f91|00|95f6edf00365266f09ea1e0328df3eee1ce127ed
^^ 0x00 at position 11 → PSK length = 11
PSK: 16549c533b4e9812808f91000000000000000000000000000000000000000000
```
### Nonce Construction
+77 -94
View File
@@ -39,10 +39,9 @@ type FrameAssembler struct {
}
type Conn struct {
udpConn *net.UDPConn
addr *net.UDPAddr
broadcastAddrs []*net.UDPAddr
randomID []byte
udpConn *net.UDPConn
addr *net.UDPAddr
randomID []byte
uid string
authKey string
enr string
@@ -100,14 +99,18 @@ func Dial(host, uid, authKey, enr, mac string, verbose bool) (*Conn, error) {
ctx, cancel := context.WithCancel(context.Background())
hash := sha256.Sum256([]byte(enr))
psk := hash[:]
psk := derivePSK(enr)
if verbose {
hash := sha256.Sum256([]byte(enr))
fmt.Printf("[PSK] ENR: %q → SHA256: %x\n", enr, hash)
fmt.Printf("[PSK] PSK: %x\n", psk)
}
c := &Conn{
udpConn: conn,
addr: &net.UDPAddr{IP: net.ParseIP(host), Port: DefaultPort},
broadcastAddrs: getBroadcastAddrs(DefaultPort, verbose),
randomID: genRandomID(),
udpConn: conn,
addr: &net.UDPAddr{IP: net.ParseIP(host), Port: DefaultPort},
randomID: genRandomID(),
uid: uid,
authKey: authKey,
enr: enr,
@@ -394,8 +397,8 @@ func (c *Conn) discovery() error {
newDiscoPkt := c.buildNewProtoPacket(0, 0, false) // NEW protocol (0xCC51, cmd=0x1002)
if c.verbose {
fmt.Printf("[DISCO] Unified discovery: timeout=%v interval=%v broadcasts=%d\n",
DiscoTimeout, DiscoInterval, len(c.broadcastAddrs))
fmt.Printf("[DISCO] Discovery: target=%s timeout=%v interval=%v\n",
c.addr, DiscoTimeout, DiscoInterval)
fmt.Printf("[DISCO] SessionID=%s\n", hex.EncodeToString(c.sessionID))
fmt.Printf("[OLD] TX Discovery packet (%d bytes):\n%s", len(oldDiscoPkt), hexDump(crypto.ReverseTransCodeBlob(oldDiscoPkt)))
fmt.Printf("[NEW] TX Discovery packet (%d bytes):\n%s", len(newDiscoPkt), hexDump(newDiscoPkt))
@@ -406,12 +409,9 @@ func (c *Conn) discovery() error {
buf := make([]byte, MaxPacketSize)
for time.Now().Before(deadline) {
// Send both discovery packets periodically
if time.Since(lastSend) >= DiscoInterval {
for _, bcast := range c.broadcastAddrs {
c.udpConn.WriteToUDP(oldDiscoPkt, bcast) // OLD protocol
c.udpConn.WriteToUDP(newDiscoPkt, bcast) // NEW protocol
}
c.udpConn.WriteToUDP(oldDiscoPkt, c.addr)
c.udpConn.WriteToUDP(newDiscoPkt, c.addr)
lastSend = time.Now()
}
@@ -424,6 +424,10 @@ func (c *Conn) discovery() error {
return err
}
if !addr.IP.Equal(c.addr.IP) {
continue
}
// Check for NEW protocol response (0xCC51 magic)
if n >= 12 && binary.LittleEndian.Uint16(buf[:2]) == MagicNewProto {
cmd := binary.LittleEndian.Uint16(buf[4:])
@@ -448,8 +452,7 @@ func (c *Conn) discovery() error {
}
if c.verbose {
fmt.Printf("[NEW] Camera detected! ticket=0x%04x sessionID=%s\n",
ticket, hex.EncodeToString(c.sessionID))
fmt.Printf("[NEW] RX Discovery Response seq=1 (%d bytes):\n%s", n, hexDump(buf[:n]))
}
_ = c.udpConn.SetDeadline(time.Time{})
@@ -571,7 +574,8 @@ func (c *Conn) newProtoComplete() error {
if cmd == CmdNewProtoDiscovery && dir == 0xFFFF && seq == 3 {
if c.verbose {
fmt.Printf("[NEW] seq=3 received, discovery complete!\n")
fmt.Printf("[NEW] RX Echo Response seq=3 (%d bytes):\n%s", n, hexDump(buf[:n]))
fmt.Printf("[NEW] Discovery complete!\n")
}
c.addr = addr
return nil
@@ -634,8 +638,13 @@ func (c *Conn) iotcReader() {
return
}
if addr.Port != c.addr.Port || !addr.IP.Equal(c.addr.IP) {
c.addr = addr
if !addr.IP.Equal(c.addr.IP) {
continue
}
// Update port if camera responds from different port
if addr.Port != c.addr.Port {
c.addr.Port = addr.Port
}
// Check for NEW protocol (0xCC51 magic at start)
@@ -823,10 +832,6 @@ func (c *Conn) worker() {
}
func (c *Conn) route(data []byte) {
// [channel][frameType][version_lo][version_hi][seq_lo][seq_hi]...
// channel: 0x03=Audio, 0x05=I-Video, 0x07=P-Video
// frameType: 0x00=cont, 0x05=end, 0x08=I-start, 0x0d=end-44
if len(data) < 2 {
return
}
@@ -1334,6 +1339,17 @@ func (c *Conn) buildNewProtoPacket(seq, ticket uint16, isResponse bool) []byte {
authBytes := h.Sum(nil)
copy(pkt[32:52], authBytes)
if c.verbose {
fmt.Printf("[AUTH] Discovery Auth Debug:\n")
fmt.Printf("[AUTH] ENR: %s\n", c.enr)
fmt.Printf("[AUTH] MAC: %s\n", c.mac)
fmt.Printf("[AUTH] UID: %s\n", c.uid)
fmt.Printf("[AUTH] AuthKey: %x\n", authKey)
fmt.Printf("[AUTH] HMAC Key (UID+AuthKey): %x\n", key)
fmt.Printf("[AUTH] Hash Input (32 bytes): %x\n", pkt[:32])
fmt.Printf("[AUTH] Auth Bytes: %x\n", authBytes)
}
return pkt
}
@@ -1360,14 +1376,25 @@ func (c *Conn) buildNewProtoDTLS(payload []byte, channel byte) []byte {
binary.LittleEndian.PutUint32(pkt[24:], 1) // Always 1 for DTLS wrapper
copy(pkt[NewProtoHeaderSize:], payload)
// Add Auth bytes at the end: HMAC-SHA1(UID+AuthKey, packet_header)
// Add Auth bytes at the end: HMAC-SHA1(UID+AuthKey, header only)
authKey := crypto.CalculateAuthKey(c.enr, c.mac)
key := append([]byte(c.uid), authKey...)
h := hmac.New(sha1.New, key)
h.Write(pkt[:NewProtoHeaderSize]) // Hash the header portion
h.Write(pkt[:NewProtoHeaderSize]) // Hash the header portion only
authBytes := h.Sum(nil)
copy(pkt[NewProtoHeaderSize+len(payload):], authBytes)
if c.verbose {
fmt.Printf("[AUTH] DTLS Auth Debug:\n")
fmt.Printf("[AUTH] ENR: %s\n", c.enr)
fmt.Printf("[AUTH] MAC: %s\n", c.mac)
fmt.Printf("[AUTH] UID: %s\n", c.uid)
fmt.Printf("[AUTH] AuthKey: %x\n", authKey)
fmt.Printf("[AUTH] HMAC Key (UID+AuthKey): %x\n", key)
fmt.Printf("[AUTH] Hash Input (Header 28 bytes): %x\n", pkt[:NewProtoHeaderSize])
fmt.Printf("[AUTH] Auth Bytes: %x\n", authBytes)
}
return pkt
}
@@ -1742,78 +1769,34 @@ func (c *Conn) logAudioTX(frame []byte, codec uint16, payloadLen int, timestampU
}
}
func derivePSK(enr string) []byte {
// TUTK SDK treats the PSK as a NULL-terminated C string, so if SHA256(ENR)
// contains a 0x00 byte, the PSK is truncated at that position.
// This matches iOS Wyze app behavior discovered via Frida instrumentation.
hash := sha256.Sum256([]byte(enr))
// Find first NULL byte - TUTK uses strlen() on binary PSK
pskLen := 32
for i := range 32 {
if hash[i] == 0x00 {
pskLen = i
break
}
}
// Create PSK: bytes up to first 0x00, rest padded with zeros
psk := make([]byte, 32)
copy(psk[:pskLen], hash[:pskLen])
return psk
}
func genRandomID() []byte {
b := make([]byte, 8)
_, _ = rand.Read(b)
return b
}
func getBroadcastAddrs(port int, verbose bool) []*net.UDPAddr {
var addrs []*net.UDPAddr
ifaces, err := net.Interfaces()
if err != nil {
if verbose {
fmt.Printf("[IOTC] Failed to get interfaces: %v\n", err)
}
// Fallback to limited broadcast
return []*net.UDPAddr{{IP: net.IPv4(255, 255, 255, 255), Port: port}}
}
for _, iface := range ifaces {
// Skip loopback and down interfaces
if iface.Flags&net.FlagLoopback != 0 || iface.Flags&net.FlagUp == 0 {
continue
}
ifAddrs, err := iface.Addrs()
if err != nil {
continue
}
for _, addr := range ifAddrs {
ipNet, ok := addr.(*net.IPNet)
if !ok {
continue
}
// Only IPv4
ip4 := ipNet.IP.To4()
if ip4 == nil {
continue
}
// Calculate broadcast address: IP | ~mask
mask := ipNet.Mask
if len(mask) != 4 {
continue
}
broadcast := make(net.IP, 4)
for i := 0; i < 4; i++ {
broadcast[i] = ip4[i] | ^mask[i]
}
bcastAddr := &net.UDPAddr{IP: broadcast, Port: port}
addrs = append(addrs, bcastAddr)
if verbose {
fmt.Printf("[IOTC] Found broadcast address: %s (iface: %s)\n", bcastAddr, iface.Name)
}
}
}
if len(addrs) == 0 {
// Fallback to limited broadcast
if verbose {
fmt.Printf("[IOTC] No broadcast addresses found, using 255.255.255.255\n")
}
return []*net.UDPAddr{{IP: net.IPv4(255, 255, 255, 255), Port: port}}
}
return addrs
}
func hexDump(data []byte) string {
var result string
for i := 0; i < len(data); i += 16 {
+2
View File
@@ -164,6 +164,8 @@ const (
KCmdChallenge = 10001
KCmdChallengeResp = 10002
KCmdAuthResult = 10003
KCmdAuthWithPayload = 10008
KCmdAuthSuccess = 10009
KCmdControlChannel = 10010
KCmdControlChannelResp = 10011
KCmdSetResolution = 10056