hpavkeys.1 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210
  1. .TH hpavkeys 1 "Feb 2015" "plc-utils-2.1.8" "Qualcomm Atheros Powerline Toolkit"
  2. .SH NAME
  3. hpavkeys - HomePlug AV Key Generator
  4. .SH SYNOPSIS
  5. .B hpavkeys
  6. .RI [ options ]
  7. .IR file
  8. .RI [ file ]
  9. [...]
  10. .SH DESCRIPTION
  11. Convert blocks of phrases to encrypted \fBHomePlug AV\fR keys.
  12. Phrases are read from one or more files, converted to either Device Access Keys, Networks Membership Keys or Network Identification Keys and printed on stdout.
  13. By default, only keys are printed, one per line, but both keys and phrases can be printed, one pair per line.
  14. .PP
  15. This program is part of the Qualcomm Atheros Powerline Toolkit.
  16. See the \fBAMP\fR man page for an overview and installation instructions.
  17. .SH BACKGROUND
  18. HomePlug AV technology uses 16-byte binary values, called "keys", for various purposes such as identity and security.
  19. Three keys of interest to users are the Device Access Key (DAK), the Network Memership Key (NMK) and Network Identification Key (NID).
  20. Their purpose is described in the HomePlug AV Specification.
  21. .PP
  22. The HomePlug AV Specification explains how to generate 16-byte binary DAK, NMK and NID values using the SHA-256 algorithm to hash user-supplied ASCII strings, called "pass phrases" in the specification.
  23. HomePlug AV compliant pass phrases have from 12 to 64 7-bit ASCII character values in the range 0x20 to 0x7F.
  24. In some cases, a specified 8-byte salt is added to the pass phrase before computing the 32-byte hash value.
  25. In all cases, the computed hash is then rehashed a specified number of times to produce the final 32-byte value.
  26. The HomePlug AV key is the lower 16-bytes of that value.
  27. .PP
  28. Keys can be any 16-byte binary value but binary values are difficult to remember.
  29. HomePlug AV compliant applications, like the Qualcomm Atheros Device Manager, ask users for a pass phrase that is converted to a 16-byte binary value using a standard hashing algorithm.
  30. In principle, no two phrases will produce the same key and it would be computationally expensive to derive the pass phrase given the key.
  31. Although HomePlug AV software deals directly with the key, users need only remember the pass phrase in order to reproduce the key.
  32. .SH OPTIONS
  33. .TP
  34. .RB - D
  35. Uses HomePlug AV rules to compute Device Access Keys (DAK) from pass phrases read from file or stdin.
  36. A DAK is 16 bytes expressed as 32 hexadecimal digits.
  37. This option over-rides any \fB-M\fR and \fB-N\fR options previously specified on the command line.
  38. .TP
  39. .RB - e
  40. Enforce HomePlug AV length and content rules for phrases.
  41. Non-compliant phrases are reported and ignored.
  42. Compliant phrases are 12 to 64 7-bit ASCII characters in the range 0x20 (SP) through 0x7F (DEL).
  43. Essentially, this includes any character that can be typed on a standard US or UK keyboard, excluding horizontal tab (HT).
  44. Be aware that some command shells intercept and act on special characters instead of passing them to the application.
  45. In such cases, you may need to include meta characters.
  46. .TP
  47. -\fBL\fR \fIlevel\fR
  48. Set security level.
  49. The security level is encoded into the NID.
  50. Level \fB0\fR enables pushbutton pairing.
  51. Level \fB1\fR disables it.
  52. This option has no effect unless a NID is computed.
  53. .TP
  54. .RB - M
  55. Uses HomePlug AV rules to compute Network Membership Keys (NMK) from pass phrases read from file or stdin.
  56. An NMK is 16 bytes expressed as 32 hexadecimal characters.
  57. This option over-rides any \fB-D\fR or \fB-N\fR options previsously specified on the command line.
  58. .TP
  59. .RB - N
  60. Uses HomePlug AV rules to compute Network Identification Keys (NID) from pass phrases read from file or stdin.
  61. An NID is 7 bytes expressed as 14 hexadecimal digits.
  62. This option over-rides any \fB-D\fR or \fB-M\fR options previously specified on the command line.
  63. .TP
  64. .RB - p
  65. Print the password, or pass phrase, used to generate each key after each key on stdout.
  66. One single space seperates the pass phrase from the key string.
  67. The pass phrase consists of all subsequent characters, including spaces, appearing up to the end of the line.
  68. Without this option, only the keys are printed.
  69. .TP
  70. .RB - q
  71. Enable quiet mode which, for this application, has no effect.
  72. This behavior has changed from earlier program versions.
  73. .TP
  74. .RB - v
  75. Enable verbose mode which, for this application, prints the input phrase after each key.
  76. This behavior has changed from earlier program versions.
  77. .TP
  78. .RB - ? ,-- help
  79. Print program help summary on stdout.
  80. This option takes precedence over other options on the command line.
  81. .TP
  82. .RB - ! ,-- version
  83. Print program version information on stdout.
  84. This option takes precedence over other options on the command line.
  85. Use this option when sending screen dumps to Atheros Technical Support so that they know exactly which version of the Linux Toolkit you are using.
  86. .SH ARGUMENTS
  87. .TP
  88. .BR file
  89. Any valid filename.
  90. Each file on the command line is read in turn and output is written to stdout, much like the \fBcat\fR utility.
  91. Input is read from the console when no filenames are specified.
  92. .SH EXAMPLES
  93. The following command reads file \fBexample.keys\fR and prints the SHA256 key for each phrase in that file.
  94. An SHA256 key is 128 bits or 32 bytes expressed as 32 hexadecimal digits.
  95. SHA256 keys are the default output when no key type is specified.
  96. SHA256 is a public domain standard, not a HomePlug AV standard.
  97. .PP
  98. # hpavkeys example.keys
  99. EA41A2383355FA7CA3B467DF0848A8EB9C41591BE53696C5F45DDAF621784F07
  100. 4E76AD8354461437C04EF9B9B242540B6406D782FF2C3FB28AFDAB5B423F88FE
  101. 71C480DF93D6AE2F1EFAD1447C66C9525E316218CF51FC8D9ED832F2DAF18B73
  102. 7257DF11A035A49119FD881F20AA7FE88970F1A034E4BBBF2D50FAB0D0239F25
  103. FAC202F439E47EB5EACF6B9CC4151BF6B2B6E736A79BCAB0F589C63BCB78D16B
  104. .PP
  105. The following command reads file \fBexample.keys\fR and prints the DAK for each phrase in that file.
  106. Input phrases are checked for HomePlugAV compliance and illegal phrases are reported then ignored.
  107. A legal HomePlug pass phrase is 12 to 64 characters consisting of ASCII characters ' ' through '~'.
  108. Essentially, these are the only characters that one can enter on a standard English keyboard.
  109. .PP
  110. # hpavkeys -D example.keys
  111. F084B4E8F6069FF1300C9BDB812367FF
  112. 7A6F36AC0DF1031CF04C5AF8DC0A70F0
  113. 910B3D08D309BCE66452DBB40FDCB551
  114. 309743236F0403C450A718494825FC02
  115. 3C94A168BDF4BC19AA111BAB930171A5
  116. 72D6E17E6756CD778F59FAFC6BF6D2B6
  117. 914EB1D58AB66461A27794BFF648C04F
  118. 7B7C094380A6E26F9F4618884C81DB63
  119. 08AE750B07884E2C380BDCEDBC28D2C8
  120. F8EE1AC7F4234A3F724D21F8B837B547
  121. .PP
  122. The following example reads the same file as above but prints the NMK for each phrase, instead of the DAK.
  123. The keys printed here have different values because the \fBHomePlug AV Specification\fR requires different hash algorithms for the DAK and NMK.
  124. Don't mix them up.
  125. .PP
  126. # hpavkeys -M example.keys
  127. B59319D7E8157BA001B018669CCEE30D
  128. F2B0C7F6C355981EBDD484FF49957420
  129. 54CB8AB1235896E45E6B643C7BF11ADB
  130. 75CD66973ED683E041F8AC37ACA88B58
  131. E20A0A69A3C6326C623202D3F42AF416
  132. 1671D61F305E81BAF000D58AF09888D5
  133. 05EFD9C9452BF8415D84BB1C415EE52A
  134. 56F3C7F539D4F8F5EEC00E63F11A8DEC
  135. 9718D29451897404DA2719CB80CA2ADA
  136. E5A7C020E0889A0265759D80DB3F9834
  137. .PP
  138. The following command reads the same file as above but prints the pass phrase because the \fB-v\fR option is specified. Keys are printed as 32 hex digits then one space then the phrase. Spaces are significant within the phrase. Printed phrases start in column 34 and continue to the end of the line.
  139. .PP
  140. # hpavkeys -M example.keys -v
  141. B59319D7E8157BA001B018669CCEE30D HomePlugAV0123
  142. F2B0C7F6C355981EBDD484FF49957420 01234567890123456789
  143. 54CB8AB1235896E45E6B643C7BF11ADB abcdefghijklmnopqrstuvwxyz
  144. 75CD66973ED683E041F8AC37ACA88B58 I love my dog .
  145. E20A0A69A3C6326C623202D3F42AF416 A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.P.Q.R.S.T.U.V.W.X.Y.Z
  146. 1671D61F305E81BAF000D58AF09888D5 ~!@#$%^&*()_-`{}[]":;'\|<>./?
  147. 05EFD9C9452BF8415D84BB1C415EE52A QWRT-YPSD-FGHJ-KLZX
  148. 56F3C7F539D4F8F5EEC00E63F11A8DEC The quick brown fox jumped over the lazy dog.
  149. 9718D29451897404DA2719CB80CA2ADA Super-Duper Electrosonic Frepitator SSEI43
  150. E5A7C020E0889A0265759D80DB3F9834 A = 3 * (5+2) - 1045
  151. .SH TIPS&TRICKS
  152. The following example illustrates an unusual case where passwords start with dash ("\fB-\fR").
  153. Program \fBhpavkey\fR assumes that the dash is an option prefix which is incorrect in this case.
  154. An error occurs because option \fB-H\fR is illegal.
  155. .PP
  156. # hpavkey -vM -HomePlugAV -HomePlugAV123
  157. hpavkey: Operation canceled: Option 'H' has no meaning
  158. .PP
  159. One solution is to insert the keys verbatim in a password file, in this case \fBpassword.txt\fR, then run program \fBhpavkeys\fR on that file.
  160. .PP
  161. # hpavkeys -vM password.txt
  162. 80B74B14E92A739AD41ACDC377451D1B -HomePlugAV
  163. 1A46BDE6F75209292FDFC4CCE4D19B4E -HomePlugAV123
  164. .SH REFERENCES
  165. See the \fBHomePlug AV Specification\fR for more information on encryption keys, pass phrases and hash algorithms used.
  166. See standard \fBFIPS180-2 sec 5.3.2\fR for more information on SHA256 encoding.
  167. .SH DISCLAIMER
  168. Qualcomm Atheros reserves the right to modify program names, functionality, input format or output format in future toolkit releases without any obligation to notify or compensate toolkit users.
  169. .SH SEE ALSO
  170. .BR hpavkey ( 1 ),
  171. .BR keys ( 1 ),
  172. .BR mac2pw ( 1 ),
  173. .BR mac2pwd ( 1 ),
  174. .BR rkey ( 1 )
  175. .SH CREDITS
  176. Charles Maier <cmaier@qca.qualcomm.com>