AccessAuthConn.cpp 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568
  1. #include "stdafx.h"
  2. #include "AccessAuthConn.h"
  3. #include "mod_AccessAuth.h"
  4. #include "GetDevInfoHelper.h"
  5. #include "comm.h"
  6. #include "access_basefun.h"
  7. #ifdef RVC_OS_WIN
  8. #pragma comment(lib, "crypt32.lib")
  9. #include <windows.h>
  10. #include <Wincrypt.h>
  11. #endif // RVC_OS_WIN
  12. #include "Event.h"
  13. #include <fstream>
  14. using namespace std;
  15. #define MY_ENCODING_TYPE (PKCS_7_ASN_ENCODING | X509_ASN_ENCODING)
  16. //oiltest need to public function
  17. CAccessAuthConn::CAccessAuthConn(CEntityBase *pEntity, CAccessAuthFSM *pFSM)
  18. :SpSecureClient(pEntity), m_pFSM(pFSM)
  19. {
  20. }
  21. CAccessAuthConn::~CAccessAuthConn()
  22. {
  23. }
  24. void CAccessAuthConn::OnDisconnect()
  25. {
  26. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("connection disconnected");
  27. }
  28. static inline bool is_base64(unsigned char c)
  29. {
  30. return (isalnum(c) || (c == '+') || (c == '/'));
  31. }
  32. int base64_decode(const unsigned char * pEncodedString, long lEncodedLen,
  33. unsigned char * pBytesDecoded, long &lDecodedLen)
  34. {
  35. static const std::string base64_chars =
  36. "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
  37. "abcdefghijklmnopqrstuvwxyz"
  38. "0123456789+/";
  39. unsigned char * pBytesDecodedStart = pBytesDecoded;
  40. const long lENCODEDLEN = lEncodedLen;
  41. int i = 0;
  42. int j = 0;
  43. int in_ = 0;
  44. unsigned char char_array_4[4], char_array_3[3];
  45. while (lEncodedLen-- && (pEncodedString[in_] != '='))
  46. {
  47. if (!is_base64(pEncodedString[in_]))
  48. {
  49. if (0x0D == pEncodedString[in_] || 0x0A == pEncodedString[in_])
  50. {
  51. in_++;
  52. continue;
  53. }
  54. return -1;
  55. }
  56. char_array_4[i++] = pEncodedString[in_]; in_++;
  57. if (i == 4) {
  58. for (i = 0; i <4; i++)
  59. char_array_4[i] = base64_chars.find(char_array_4[i]);
  60. char_array_3[0] = (char_array_4[0] << 2) + ((char_array_4[1] & 0x30) >> 4);
  61. char_array_3[1] = ((char_array_4[1] & 0xf) << 4) + ((char_array_4[2] & 0x3c) >> 2);
  62. char_array_3[2] = ((char_array_4[2] & 0x3) << 6) + char_array_4[3];
  63. for (i = 0; (i < 3); i++)
  64. {
  65. *pBytesDecoded = char_array_3[i];
  66. ++pBytesDecoded;
  67. }
  68. i = 0;
  69. }
  70. }
  71. if (i) {
  72. for (j = i; j <4; j++)
  73. char_array_4[j] = 0;
  74. for (j = 0; j <4; j++)
  75. char_array_4[j] = base64_chars.find(char_array_4[j]);
  76. char_array_3[0] = (char_array_4[0] << 2) + ((char_array_4[1] & 0x30) >> 4);
  77. char_array_3[1] = ((char_array_4[1] & 0xf) << 4) + ((char_array_4[2] & 0x3c) >> 2);
  78. char_array_3[2] = ((char_array_4[2] & 0x3) << 6) + char_array_4[3];
  79. for (j = 0; (j < i - 1); j++)
  80. {
  81. *pBytesDecoded = char_array_3[j];
  82. ++pBytesDecoded;
  83. }
  84. }
  85. *pBytesDecoded = 0;
  86. lDecodedLen = pBytesDecoded - pBytesDecodedStart;
  87. return 0;
  88. }
  89. //同步时间
  90. DWORD CAccessAuthConn::SendSyncTimePackage()
  91. {
  92. assert(IsConnectionOK());
  93. SyncTimeReq req;
  94. memset(&req, 0, sizeof(req));
  95. CSystemStaticInfo si;
  96. m_pEntity->GetFunction()->GetSystemStaticInfo(si);
  97. // 设备号
  98. strncpy(&req.szTerminalNo[0], (const char*)si.strTerminalID, sizeof(req.szTerminalNo) - 1);
  99. // 终端时间
  100. req.dwCurTime = (DWORD)CSmallDateTime::GetNow();
  101. SyncTimeReq2 req2;
  102. req2.isSm = 1;
  103. CSmartPointer<IPackage> package = CreateNewPackage("SyncTime");
  104. package->AddStruct("SYNC_R1", false, false, (BYTE*)&req, sizeof(req));
  105. package->AddStruct("SYNC_R2", false, false, (BYTE*)&req2, sizeof(req2));
  106. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("send sync time package");
  107. return SendPackage(package) == "" ? Error_Unexpect : Error_Succeed;
  108. }
  109. DWORD CAccessAuthConn::SendSyncTimePackageNew()
  110. {
  111. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("SendSyncTimePackageNew");
  112. assert(IsConnectionOK());
  113. DWORD dwSysCode, dwUserCode;
  114. string strErrMsg;
  115. DWORD rc = Error_Succeed;
  116. SyncTimeReq req;
  117. memset(&req, 0, sizeof(req));
  118. CSystemStaticInfo si;
  119. m_pEntity->GetFunction()->GetSystemStaticInfo(si);
  120. // 设备号
  121. strncpy(&req.szTerminalNo[0], (const char*)si.strTerminalID, sizeof(req.szTerminalNo) - 1);
  122. // 终端时间
  123. req.dwCurTime = (DWORD)CSmallDateTime::GetNow();
  124. CSmartPointer<IPackage> package = CreateNewPackage("SyncTime");
  125. package->AddStruct("SYNC_R1", false, false, (BYTE*)&req, sizeof(req));
  126. if (SendPackage(package) == "")
  127. {
  128. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("send sync time package failed");
  129. return Error_Unexpect;
  130. }
  131. else
  132. {
  133. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("send sync time package success");
  134. }
  135. CSmartPointer<IPackage> pRecvPkg = ReceivePackage(5);
  136. if (pRecvPkg == NULL)
  137. {
  138. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("ReceivePackage failed, don't revceive SyncTime ans");
  139. return Error_Unexpect;
  140. }
  141. if (pRecvPkg->GetErrMsg(dwSysCode, dwUserCode, strErrMsg))
  142. {
  143. rc = dwUserCode;
  144. m_pFSM->doWarnMsg(dwUserCode, GetOutPutStr("%s%08X%s%s", "GetErrMsg", dwUserCode, "strErrMsg", strErrMsg.c_str()).c_str());
  145. }
  146. else
  147. {
  148. int nRetLen = pRecvPkg->GetStructLen("SYNC_A1");
  149. if (nRetLen >0)
  150. {
  151. assert(nRetLen == sizeof(SyncTimeAns));
  152. SyncTimeAns ret;
  153. memset(&ret, 0, sizeof(ret));
  154. int nArrayNum(0);
  155. int nBufLen = sizeof(ret);
  156. pRecvPkg->GetStructData("SYNC_A1", (BYTE*)&ret, &nBufLen, &nArrayNum);
  157. // 比较终端和服务器时间, 时差小于3分钟不纠正
  158. DWORD dwTimeDiff = ret.nTimeDiff;
  159. if (dwTimeDiff > 180)
  160. {
  161. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("time diff is too large (%ds), sync time now", dwTimeDiff);
  162. CSmallDateTime dtServerTime(CSmallDateTime::GetNow() + dwTimeDiff);
  163. SYSTEMTIME stServerTime = dtServerTime.ToSystemTime();
  164. #ifdef RVC_OS_WIN
  165. if (SetLocalTime(&stServerTime))
  166. #else
  167. get_system_time();
  168. if(set_system_time_by_sec((int)dwTimeDiff))
  169. #endif // RVC_OS_WIN
  170. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("sync time with server succeed, server time: [%s]", (const char*)dtServerTime.ToTimeString());
  171. else
  172. {
  173. m_pFSM->doWarnMsg(ERR_ACCESSAUTH_SET_LOCALE_TIME, GetOutPutStr("%s%s", "stServerTime", dtServerTime.ToTimeString()).c_str());
  174. rc = ERR_ACCESSAUTH_SET_LOCALE_TIME;
  175. }
  176. }
  177. else
  178. {
  179. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("time diff is acceptable (%ds)", dwTimeDiff);
  180. }
  181. }
  182. else
  183. {
  184. m_pFSM->doWarnMsg(ERR_ACCESSAUTH_SYNC_TIME, GetOutPutStr("%s%d", "GetStructLen", nRetLen).c_str());
  185. rc = ERR_ACCESSAUTH_SYNC_TIME;
  186. }
  187. }
  188. return rc;
  189. }
  190. DWORD CAccessAuthConn::HandleSyncTimeRet(const CSmartPointer<IPackage> &pRecvPkg)
  191. {
  192. LOG_FUNCTION();
  193. DWORD dwSysCode, dwUserCode;
  194. string strErrMsg;
  195. DWORD rc = Error_Succeed;
  196. int nAuthVersion = 1; // 默认使用KMC准入
  197. BYTE *pSessionKey = NULL;
  198. return rc;
  199. }
  200. DWORD CAccessAuthConn::SendInitDevicePackage(SpReqAnsContext<AccessAuthService_InitDev_Req, AccessAuthService_InitDev_Ans>::Pointer &ctx)
  201. {
  202. assert(IsConnectionOK());
  203. InitDeviceReq req;
  204. memset(&req, 0, sizeof(req));
  205. strncpy(req.vtmCR1, (const char*)ctx->Req.EncR1, sizeof(req.vtmCR1));
  206. strncpy(req.R2, (const char*)ctx->Req.R2, sizeof(req.R2));
  207. strncpy(req.vtmCR3, (const char*)ctx->Req.EncR3, sizeof(req.vtmCR3));
  208. strncpy(req.CDevPubKey, (const char*)ctx->Req.EncDevPubKey, sizeof(req.CDevPubKey));
  209. strncpy(req.Verdor, (const char*)ctx->Req.Vendor, sizeof(req.Verdor));
  210. CSmartPointer<IPackage> package = CreateNewPackage("InitDev");
  211. package->AddStruct("InitDevR", false, false, (BYTE*)&req, sizeof(req));
  212. InitDeviceReq0 req0;
  213. req0.isSM = 1;
  214. package->AddStruct("SMSyn", false, false, (BYTE*)& req0, sizeof(req0));
  215. if (SendPackage(package) == "")
  216. {
  217. m_pFSM->doWarnMsg(ERR_ACCESSAUTH_INIT_DEV_SEND_PKG, GetOutPutStr("%s%s", "发送初始化设备数据包失败", "").c_str());
  218. return ERR_ACCESSAUTH_INIT_DEV_SEND_PKG;
  219. }
  220. else
  221. {
  222. //Dbg("send init device req succ, CR1:%s, R2:%s, CR3:%s, CDevPubKey:%s", (const char*)ctx->Req.EncR1,
  223. // (const char*)ctx->Req.R2, (const char*)ctx->Req.EncR3, (const char*)ctx->Req.EncDevPubKey);
  224. m_ctxInitDev = ctx;
  225. return Error_Succeed;
  226. }
  227. }
  228. DWORD CAccessAuthConn::HandleInitDeviceRet(const CSmartPointer<IPackage> &pRecvPkg)
  229. {
  230. DWORD dwSysCode, dwUserCode;
  231. string strErrMsg;
  232. ErrorCodeEnum rc = Error_Succeed;
  233. if (pRecvPkg->GetErrMsg(dwSysCode, dwUserCode, strErrMsg))
  234. {
  235. rc = (ErrorCodeEnum)dwSysCode;
  236. m_pFSM->doWarnMsg(ERR_ACCESSAUTH_INIT_DEV, GetOutPutStr("%s%08X%s%s", "初始化设备错误", rc,"strErrMsg", strErrMsg.c_str()).c_str());
  237. }
  238. else if (m_ctxInitDev == NULL)
  239. {
  240. Dbg("m_ctxInitDev is NULL");
  241. rc = Error_Unexpect;
  242. }
  243. else
  244. {
  245. int nRetLen = pRecvPkg->GetStructLen("InitDevA");
  246. if (nRetLen > 0)
  247. {
  248. assert(nRetLen == sizeof(InitDeviceAns));
  249. InitDeviceAns ret;
  250. memset(&ret, 0, sizeof(ret));
  251. int nArrayNum(0);
  252. int nBufLen = sizeof(ret);
  253. pRecvPkg->GetStructData("InitDevA", (BYTE*)&ret, &nBufLen, &nArrayNum);
  254. Dbg("init device succ");
  255. //Dbg("init device ret, R1:%s, CR2:%s, R3:%s", ret.R1, ret.CR2, ret.R3);
  256. m_ctxInitDev->Ans.R1 = ret.R1;
  257. m_ctxInitDev->Ans.EncR2 = ret.CR2;
  258. m_ctxInitDev->Ans.R3 = ret.R3;
  259. }
  260. else
  261. {
  262. m_pFSM->doWarnMsg(ERR_ACCESSAUTH_INIT_DEV, GetOutPutStr("%s%d", "GetStructLen", nRetLen).c_str());
  263. rc = Error_Bug;
  264. }
  265. }
  266. if (m_ctxInitDev != NULL)
  267. {
  268. m_ctxInitDev->Answer(rc);
  269. m_ctxInitDev.Clear();
  270. }
  271. return rc;
  272. }
  273. //上报状态
  274. DWORD CAccessAuthConn::SendReportStatePackage(const char*pszEventType, DWORD dwErrCode, const char *pszErrMsg)
  275. {
  276. auto pFunc = m_pEntity->GetFunction();
  277. CSystemStaticInfo ssInfo;
  278. pFunc->GetSystemStaticInfo(ssInfo);
  279. ReportStateReq req = {};
  280. strncpy(req.TerminalNo, ssInfo.strTerminalID, sizeof(req.TerminalNo) - 1);
  281. strncpy(req.EventType, pszEventType, sizeof(req.EventType) - 1);
  282. req.ErrorCode = dwErrCode;
  283. if (pszErrMsg != NULL)
  284. strncpy(req.ErrorMsg, pszErrMsg, sizeof(req.ErrorMsg) - 1);
  285. auto package = CreateNewPackage("RepState");
  286. package->AddStruct("REPSTA_R", false, false, (BYTE*)&req, sizeof(req));
  287. return SendPackage(package) != "" ? Error_Succeed : Error_Unexpect;
  288. }
  289. DWORD CAccessAuthConn::HandleReportStateRet(const CSmartPointer<IPackage> &pRecvPkg)
  290. {
  291. DWORD rc = Error_Succeed;
  292. DWORD dwSysCode, dwUserCode;
  293. string strErrMsg;
  294. if (pRecvPkg->GetErrMsg(dwSysCode, dwUserCode, strErrMsg))
  295. {
  296. rc = dwUserCode;
  297. m_pFSM->doWarnMsg(rc, strErrMsg);
  298. }
  299. return rc;
  300. }
  301. //同步锁定状态
  302. DWORD CAccessAuthConn::SendLockStatePackage()
  303. {
  304. LockStateReq req = {0};
  305. auto pFunc = m_pEntity->GetFunction();
  306. CSystemStaticInfo info;
  307. DWORD rc = pFunc->GetSystemStaticInfo(info);
  308. if (rc != Error_Succeed)
  309. {
  310. m_pFSM->doWarnMsg(ERR_ACCESSAUTH_GET_SYSTEM_STATIC_INFO, GetOutPutStr("%s%08X", "GetSystemStaticInfo", rc).c_str());
  311. return ERR_ACCESSAUTH_GET_SYSTEM_STATIC_INFO;
  312. }
  313. strncpy(req.TerminalNo, (const char*)info.strTerminalID, sizeof(req.TerminalNo)-1);
  314. CSmartPointer<IPackage> pkt = CreateNewPackage("LockSta");
  315. pkt->AddStruct("LockStateReq", false, false, (LPBYTE)&req, sizeof(LockStateReq));
  316. if (SendPackage(pkt) == "")
  317. {
  318. m_pFSM->doWarnMsg(ERR_ACCESSAUTH_LOCK_SEND_PKG, GetOutPutStr("%s%08X", "SendLockStatePackage", Error_Unexpect).c_str());
  319. return ERR_ACCESSAUTH_LOCK_SEND_PKG;
  320. }
  321. else
  322. {
  323. Dbg("send Lock State req success");
  324. }
  325. return Error_Succeed;
  326. }
  327. DWORD CAccessAuthConn::HandleLockStateRet(const CSmartPointer<IPackage> &pRecvPkg)
  328. {
  329. DWORD rc = Error_Succeed;
  330. DWORD dwSysCode, dwUserCode;
  331. string strErrMsg;
  332. if (pRecvPkg->GetErrMsg(dwSysCode, dwUserCode, strErrMsg))
  333. {
  334. rc = dwUserCode;
  335. ((CAccessAuthEntity*)m_pEntity)->SetAuthErrMsg(strErrMsg.c_str());
  336. CSmartPointer<IEntityFunction> spFunction = m_pEntity->GetFunction();
  337. spFunction->SetSysVar("AuthErrMsg", strErrMsg.c_str(), true);
  338. m_pFSM->doWarnMsg(rc, GetOutPutStr("%s%08X%s%s", "GetErrMsg", rc,"AuthErrMsg", strErrMsg.c_str()).c_str());
  339. return rc;
  340. }
  341. int nLen = pRecvPkg->GetStructLen("LockStateAns");
  342. if (nLen > 0)
  343. {
  344. BYTE *pBuf = new BYTE[nLen];
  345. memset(pBuf, 0, nLen);
  346. int nArrayNum = 0;
  347. if (pRecvPkg->GetStructData("LockStateAns", pBuf, &nLen, &nArrayNum))
  348. {
  349. Dbg("收到LockStateAns");
  350. LockStateAns * pRet = (LockStateAns*)pBuf;
  351. int nState = pRet->LockState;
  352. Dbg("nLockState[%d]",nState);
  353. //设置系统变量LockState, 0,正常;1,锁定;2,罚出;(准入服务返回,6:罚出 7:锁定)
  354. CSmartPointer<IEntityFunction> spFunction = m_pEntity->GetFunction();
  355. if (6 == nState)
  356. {
  357. spFunction->SetSysVar("LockState", "2", true);
  358. }
  359. else if (7 == nState)
  360. {
  361. spFunction->SetSysVar("LockState", "1", true);
  362. }
  363. }
  364. else
  365. {
  366. m_pFSM->doWarnMsg(ERR_ACCESSAUTH_LOCK_STATE, GetOutPutStr("%s%s", "GetStructLen", "False").c_str());
  367. return ERR_ACCESSAUTH_LOCK_STATE;
  368. }
  369. delete pBuf;
  370. }
  371. else
  372. {
  373. m_pFSM->doWarnMsg(ERR_ACCESSAUTH_LOCK_STATE, GetOutPutStr("%s%s%s%d", "GetStructData", "False","nLen", nLen).c_str());
  374. return ERR_ACCESSAUTH_LOCK_STATE;
  375. }
  376. return rc;
  377. }
  378. DWORD CAccessAuthConn::SendCheckMD5Package(const char* pMD5Value)
  379. {
  380. assert(IsConnectionOK());
  381. CheckMD5Req req;
  382. memset(&req, 0, sizeof(req));
  383. CSimpleStringA strMD5Value = pMD5Value;
  384. Dbg("MD5[%s]", strMD5Value.GetData());
  385. CSystemStaticInfo si;
  386. m_pEntity->GetFunction()->GetSystemStaticInfo(si);
  387. strncpy(&req.TerminalNo[0], (const char*)si.strTerminalID, sizeof(req.TerminalNo)-1);// 设备号
  388. strncpy(req.MD5Value, strMD5Value, 16);//MD5值
  389. CSmartPointer<IPackage> pkt = CreateNewPackage("CheckMD5");
  390. pkt->AddStruct("MD5REQ", false, false, (BYTE*)&req, sizeof(req));
  391. Dbg("send check MD5 request now");
  392. return SendPackage(pkt) != "" ? Error_Succeed : Error_Unexpect;
  393. }
  394. DWORD CAccessAuthConn::SendUpdateMD5Package(const char* pMD5Value)
  395. {
  396. assert(IsConnectionOK());
  397. CheckMD5Req req;
  398. memset(&req, 0, sizeof(req));
  399. CSimpleStringA strMD5Value = pMD5Value;
  400. Dbg("MD5[%s]", strMD5Value.GetData());
  401. CSystemStaticInfo si;
  402. m_pEntity->GetFunction()->GetSystemStaticInfo(si);
  403. strncpy(&req.TerminalNo[0], (const char*)si.strTerminalID, sizeof(req.TerminalNo)-1);// 设备号
  404. strncpy(req.MD5Value, strMD5Value, 16);//MD5值
  405. CSmartPointer<IPackage> pkt = CreateNewPackage("UpdMD5");
  406. pkt->AddStruct("MD5REQ", false, false, (BYTE*)&req, sizeof(req));
  407. Dbg("send update MD5 request now");
  408. return SendPackage(pkt) != "" ? Error_Succeed : Error_Unexpect;
  409. }
  410. DWORD CAccessAuthConn::HandleCheckMD5Ret(const CSmartPointer<IPackage> &pRecvPkg)
  411. {
  412. ErrorCodeEnum rc = Error_Succeed;
  413. DWORD dwSysCode, dwUserCode;
  414. string strErrMsg;
  415. /*if (pRecvPkg->GetErrMsg(dwSysCode, dwUserCode, strErrMsg))
  416. {
  417. rc = (ErrorCodeEnum)dwSysCode;
  418. m_pFSM->doWarnMsg(dwUserCode, strErrMsg);
  419. CSmartPointer<IEntityFunction> spFunction = m_pEntity->GetFunction();
  420. }
  421. m_pFSM->PostEventFIFO(new FSMEvent(rc==Error_Succeed ? CAccessAuthFSM::Event_CheckMD5Succ:CAccessAuthFSM::Event_CheckMD5Fail));*/
  422. return rc;
  423. }
  424. DWORD CAccessAuthConn::HandleUpdateMD5Ret(const CSmartPointer<IPackage> &pRecvPkg)
  425. {
  426. ErrorCodeEnum rc = Error_Succeed;
  427. DWORD dwSysCode, dwUserCode;
  428. string strErrMsg;
  429. return rc;
  430. }
  431. DWORD CAccessAuthConn::HandleLockState(int nState)
  432. {
  433. Dbg("%s:lock state: %d", __FUNCTION__, nState);
  434. DWORD rc = Error_Succeed;
  435. //设置系统变量LockState, 0,正常;1,锁定;2,罚出;(准入服务返回,6:罚出 7:锁定)
  436. CSmartPointer<IEntityFunction> spFunction = m_pEntity->GetFunction();
  437. if (6 == nState)
  438. {
  439. rc = spFunction->SetSysVar("LockState", "2", true);
  440. ((CAccessAuthEntity*)m_pEntity)->SetAuthErrMsg("终端已罚出");
  441. }
  442. else if (7 == nState)
  443. {
  444. rc = spFunction->SetSysVar("LockState", "1", true);
  445. ((CAccessAuthEntity*)m_pEntity)->SetAuthErrMsg("终端已锁定");
  446. }
  447. return rc;
  448. }
  449. DWORD CAccessAuthConn::GetDeviceInfo(CEntityBase* pCallerEntity, const CSimpleStringA& devDeviceName,
  450. CSimpleStringA& strModel, CSimpleStringA& strVendor, CSimpleStringA& strVersion)
  451. {
  452. CSmartPointer<IConfigInfo> pConfig;
  453. DWORD rc = pCallerEntity->GetFunction()->OpenConfig(Config_Root, pConfig);
  454. if (rc == Error_Succeed)
  455. {
  456. CSimpleStringA strSection = CSimpleStringA("Device.") + devDeviceName;
  457. pConfig->ReadConfigValue(strSection, "Vendor", strVendor);
  458. pConfig->ReadConfigValue(strSection, "Version", strVersion);
  459. strModel = devDeviceName;
  460. if (!strVendor.IsNullOrEmpty())
  461. {
  462. strModel += ".";
  463. strModel += strVendor;
  464. }
  465. if (!strVersion.IsNullOrEmpty())
  466. {
  467. strModel += ".";
  468. strModel += strVersion;
  469. }
  470. }
  471. return rc;
  472. }