mod_AccessAuth.cpp 51 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540
  1. #include "stdafx.h"
  2. #include "SpBase.h"
  3. #include "mod_AccessAuth.h"
  4. #include "RVCComm.h"
  5. #include "access_basefun.h"
  6. #include <fileutil.h>
  7. #include <iniutil.h>
  8. #include <cmath>
  9. #include "Event.h"
  10. #include "comm.h"
  11. #include "CommEntityRestful.hpp"
  12. #include "TokenKeeper_client_g.h"
  13. using namespace TokenKeeper;
  14. #include "PinPad_client_g.h"
  15. using namespace PinPad;
  16. #ifdef RVC_OS_WIN
  17. #include "WMIDeviceQuery.h"
  18. #include <WinCrypt.h>
  19. #include <Strsafe.h>
  20. #include "DeviceBaseClass.h"
  21. #include "MyBase64.h"
  22. #else
  23. #include "DeviceBaseClass.h"
  24. #endif
  25. extern int HexBuf2StrBuf(PBYTE hexBuf, char** strBuf, DWORD len);
  26. extern int StrBuf2HexBuf(LPCTSTR strBuf, PBYTE* hexBuf);
  27. struct InitializerInitMKTask : ITaskSp
  28. {
  29. CAccessAuthFSM* m_fsm;
  30. CAccessAuthEntity* m_entity;
  31. InitializerInitMKTask(CAccessAuthFSM* fsm, CAccessAuthEntity* entity) :m_fsm(fsm), m_entity(entity) {}
  32. void Process()
  33. {
  34. CSystemStaticInfo si;
  35. m_fsm->GetEntityBase()->GetFunction()->GetSystemStaticInfo(si);
  36. CInitlizerMKReq instanceReq;//oiltest dev module count
  37. bool initFlag = m_entity->SendInitMKReqACS(instanceReq);
  38. if (!initFlag)
  39. {
  40. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")("连接密码键盘异常");
  41. m_entity->EndInitMK(ERR_ACCESSAUTH_CONNECT_PINPAD, "连接密码键盘异常,请检查");//,待完善细化错误码oiltest
  42. return;
  43. }
  44. if (m_fsm->containsChinese(m_fsm->GetmAccessAuthHost().GetData()))
  45. {
  46. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, CSimpleStringA::Format("初始化服务连接失败,URL含中文。").GetData());
  47. return;
  48. }
  49. auto tmkpair = m_entity->GenerateTmkToKMC();
  50. instanceReq.encRandom = tmkpair.first;
  51. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("iniTerminalInfo: %s", instanceReq.iniTerminalInfo.c_str());
  52. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("auth:%s", instanceReq.auth.c_str());
  53. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curEdkKeyCheck: %s", instanceReq.curEdkKeyCheck.c_str());
  54. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curKeyIndex: %s", instanceReq.curKeyIndex.c_str());
  55. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curTpkKeyCheck: %s", instanceReq.curTpkKeyCheck.c_str());
  56. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("encRandom: %s", instanceReq.encRandom.c_str());
  57. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("publicKey: %s", instanceReq.publicKey.c_str());
  58. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("terminalNo: %s", instanceReq.terminalNo.c_str());
  59. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("terminalVersion: %s", instanceReq.terminalVersion.c_str());
  60. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("user: %s", instanceReq.user.c_str());
  61. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("loginWay: %d", instanceReq.loginWay);
  62. CInitlizerMKAns instanceAns;
  63. HttpClientResponseResult result;
  64. HttpClientRequestConfig config(HttpRequestMethod::POST, m_entity->GetInitUrl().GetData(), &SpGetToken);
  65. config.SetChildUri("/api/v6/initmk");
  66. SP::Module::Restful::FulfillRequestJsonBody(&config, instanceReq);
  67. RestfulClient client = RestfulClient::getInstance();
  68. config.PreDo();
  69. client.Do(&config, &result);
  70. if (result.ResponseOK()) {
  71. SP::Module::Restful::CommResponseJson responseStatus;
  72. SP::Module::Restful::GetStatusFromDebranchResponse(result.content, responseStatus);
  73. if (!responseStatus.IsOperatedOK()) {
  74. CSimpleStringA errMsg = CSimpleStringA::Format("%s|%s", responseStatus.errorCode.c_str(), responseStatus.errorMsg.c_str());
  75. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("initmk failed: %s", errMsg.GetData());
  76. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, errMsg.GetData());
  77. }
  78. else {
  79. //服务端返回成功再将数据写入AcessAuthourization.ini
  80. CSmartPointer<IConfigInfo> pConfig;
  81. auto rc = m_entity->GetFunction()->OpenConfig(Config_Run, pConfig);
  82. rc = pConfig->WriteConfigValue("TerminalPD", "PrivateKey", m_entity->m_privateKey);
  83. if (rc != Error_Succeed) {
  84. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("write pri key failed.");
  85. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, "私钥写入失败,请重新初始化。");
  86. return;
  87. }
  88. if (m_entity->HasPinPad()) {
  89. const bool testResult = SP::Module::Restful::ExtractDataFromDebranchResponse(result.content, instanceAns);
  90. if (m_entity->LoadKeysToPinPadACS(tmkpair.second, instanceAns.TPK, instanceAns.EDK, instanceAns.keyIndex, instanceAns.tpkKeyCheck, instanceAns.edkKeyCheck) == Error_Succeed) {
  91. m_entity->EndInitMK(Error_Succeed, "");
  92. }
  93. else {
  94. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")("连接密码键盘异常");
  95. m_entity->EndInitMK(ERR_ACCESSAUTH_CONNECT_PINPAD, "密钥加载失败,请检查密码键盘连接。");//,待完善细化错误码oiltest
  96. }
  97. }
  98. else {
  99. m_entity->EndInitMK(Error_Succeed, "");
  100. }
  101. }
  102. }
  103. else {
  104. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("post wk failed: %s", result.WhatError().c_str());
  105. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, CSimpleStringA::Format("初始化服务连接失败。%s", result.WhatError().c_str()).GetData());
  106. }
  107. }
  108. };
  109. struct GetTermSysInfoTask : ITaskSp
  110. {
  111. CAccessAuthEntity* m_entity;
  112. GetTermSysInfoTask(CAccessAuthEntity* entity) :m_entity(entity) {}
  113. void Process()
  114. {
  115. m_entity->GetHardWareInfo();
  116. }
  117. };
  118. typedef struct _REG_TZI_FORMAT
  119. {
  120. LONG Bias;
  121. LONG StandardBias;
  122. LONG DaylightBias;
  123. SYSTEMTIME StandardDate;
  124. SYSTEMTIME DaylightDate;
  125. } REG_TZI_FORMAT;
  126. void CAccessAuthSession::Handle_Regist(SpOnewayCallContext<AccessAuthService_Regist_Info>::Pointer ctx)
  127. {
  128. DbgToBeidou(ctx->link, __FUNCTION__)();
  129. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_Regist");
  130. m_pEntity->Regist();
  131. }
  132. void CAccessAuthSession::Handle_UpdateWK(SpOnewayCallContext<AccessAuthService_UpdateWK_Info>::Pointer ctx)
  133. {
  134. DbgToBeidou(ctx->link, __FUNCTION__)();
  135. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_UpdateWK");
  136. m_pEntity->UpdateWK();
  137. }
  138. void CAccessAuthSession::Handle_InitializeNew(SpReqAnsContext<AccessAuthService_InitializeNew_Req, AccessAuthService_InitializeNew_Ans>::Pointer ctx)
  139. {
  140. DbgToBeidou(ctx->link, __FUNCTION__)();
  141. DbgWithLink(LOG_LEVEL_INFO, ctx->link.checkEmpty() ? LOG_TYPE_SYSTEM : LOG_TYPE_USER).setAPI(__FUNCTION__)("Handle_InitializeNew");
  142. m_pEntity->m_ctx = ctx;
  143. m_pEntity->m_strUserID = ctx->Req.strUserID.GetData();
  144. m_pEntity->m_strPassword = ctx->Req.strPassword.GetData();
  145. m_pEntity->BeginInitMKACS();
  146. }
  147. void CAccessAuthSession::Handle_InitDev(SpReqAnsContext<AccessAuthService_InitDev_Req, AccessAuthService_InitDev_Ans>::Pointer ctx)
  148. {
  149. DbgToBeidou(ctx->link, __FUNCTION__)();
  150. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_InitDev");
  151. m_pEntity->InitDevice(ctx);
  152. }
  153. void CAccessAuthSession::Handle_GetNetMsg(SpReqAnsContext<AccessAuthService_GetNetMsg_Req, AccessAuthService_GetNetMsg_Ans>::Pointer ctx)
  154. {
  155. DbgToBeidou(ctx->link, __FUNCTION__)();
  156. m_pEntity->GetNetMsg(ctx);
  157. }
  158. void CAccessAuthEntity::OnStarted()
  159. {
  160. //设置时区为北京标准时区
  161. if (!SetLocalTimeZoneByKeyName("China Standard Time", FALSE))
  162. {
  163. m_FSM.doWarnMsg(ERR_ACCESSAUTH_SETTIMEZONE,GetOutPutStr("%s%s","设置时区错误","False").c_str());
  164. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5202")(GetOutPutStr("%s%s", "设置时区错误", "False").c_str());
  165. }
  166. m_FSM.Init(this);
  167. CSimpleStringA strErrMsg;
  168. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  169. memset(&m_info,0, sizeof(CSystemStaticInfo));
  170. auto rc = GetFunction()->GetSystemStaticInfo(m_info);
  171. if (rc != Error_Succeed)
  172. {
  173. strErrMsg = "GetSystemStaticInfo fail";
  174. SetAuthErrMsg((const char*)strErrMsg);
  175. m_FSM.doWarnMsg(ERR_ACCESSAUTH_GET_SYSTEM_STATIC_INFO,
  176. GetOutPutStr("%s%08X", "获取系统静态信息错误", rc).c_str(), strErrMsg.GetData());
  177. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)(GetOutPutStr("%s%08X", "获取系统静态信息错误", rc).c_str());
  178. }
  179. CSmartPointer<GetTermSysInfoTask> getTermSysInfoTask = new GetTermSysInfoTask(this);
  180. GetFunction()->PostThreadPoolTask(getTermSysInfoTask.GetRawPointer());
  181. }
  182. void CAccessAuthEntity::OnPreStart(CAutoArray<CSimpleStringA> strArgs,CSmartPointer<ITransactionContext> pTransactionContext)
  183. {
  184. ErrorCodeEnum Error = Error_Succeed;
  185. pTransactionContext->SendAnswer(Error) ;
  186. }
  187. void CAccessAuthEntity::OnPreClose(EntityCloseCauseEnum eCloseCause,CSmartPointer<ITransactionContext> pTransactionContext)
  188. {
  189. m_FSM.PostExitEvent();
  190. pTransactionContext->SendAnswer(Error_Succeed);
  191. }
  192. void CAccessAuthEntity::OnSysVarEvent(const char *pszKey, const char *pszValue,const char *pszOldValue,const char *pszEntityName)
  193. {
  194. }
  195. // 开始准入
  196. ErrorCodeEnum CAccessAuthEntity::Regist()
  197. {
  198. m_FSM.PostEventFIFO(new FSMEvent(CAccessAuthFSM::Event_StartRegist));
  199. return Error_Succeed;
  200. }
  201. string CAccessAuthEntity::ByteArrayToHexStr(BYTE *pBuf, int nBufLen)
  202. {
  203. char szBuf[1024];
  204. memset(szBuf, 0, sizeof(szBuf));
  205. for(int i=0; i<nBufLen; i++)
  206. {
  207. BYTE b1 = (pBuf[i] >> 4) & 0x0F;
  208. BYTE b2 = pBuf[i] & 0x0F;
  209. if (b1 <= 9)
  210. szBuf[i*2] = '0' + b1;
  211. else
  212. szBuf[i*2] = 'A' + b1 - 10;
  213. if (b2 <= 9)
  214. szBuf[i*2+1] = '0' + b2;
  215. else
  216. szBuf[i*2+1] = 'A' + b2 - 10;
  217. }
  218. return szBuf;
  219. }
  220. // 生成临时SM2密钥对
  221. DWORD CAccessAuthEntity::CreateSM2KeyPair(CBlob &pubKey, CBlob &priKey)
  222. {
  223. int nPubKeyLen = 256;
  224. int nPriKeyLen = 256;
  225. pubKey.Alloc(nPubKeyLen);
  226. priKey.Alloc(nPriKeyLen);
  227. if (!::CreateSM2KeyPair((BYTE*)(pubKey.m_pData), &nPubKeyLen, (BYTE*)(priKey.m_pData), &nPriKeyLen))
  228. {
  229. SetAuthErrMsg("创建SM2密钥对失败");
  230. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  231. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CREATE_RSA_KEY_PAIR,
  232. GetOutPutStr("%s%s","CreateRsaKeyPair","False").c_str(), true, "创建SM2密钥对失败");
  233. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("创建SM2密钥对失败");
  234. return ERR_ACCESSAUTH_CREATE_RSA_KEY_PAIR;
  235. }
  236. pubKey.Resize(nPubKeyLen);
  237. priKey.Resize(nPriKeyLen);
  238. return Error_Succeed;
  239. }
  240. // 保存到令牌管理实体中
  241. DWORD CAccessAuthEntity::SaveSM2KeyPair(const CBlob &pubKey, const CBlob &priKey)
  242. {
  243. LOG_FUNCTION();
  244. CSimpleStringA strErrMsg;
  245. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  246. TokenService_ClientBase *pTokenServiceClient = new TokenService_ClientBase(this);
  247. DWORD rc = pTokenServiceClient->Connect();
  248. if (rc != Error_Succeed)
  249. {
  250. strErrMsg = "连接令牌管理实体失败";
  251. SetAuthErrMsg(strErrMsg.GetData());
  252. rc = ERR_ACCESSAUTH_CONNECT_TOKEN_SERVICE;
  253. m_FSM.doWarnMsg(rc,
  254. "连接令牌管理实体失败", true);
  255. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5206")
  256. (GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", strErrMsg.GetData()).c_str());
  257. pTokenServiceClient->SafeDelete();
  258. }
  259. else
  260. {
  261. TokenService_SetKeyPair_Req req;
  262. req.pub_key = pubKey;
  263. req.pri_key = priKey;
  264. TokenService_SetKeyPair_Ans ans;
  265. rc = pTokenServiceClient->SetKeyPair(req, ans, 3000);
  266. pTokenServiceClient->GetFunction()->CloseSession();
  267. if (rc != Error_Succeed)
  268. {
  269. strErrMsg = "保存密钥对失败";
  270. SetAuthErrMsg(strErrMsg.GetData());
  271. rc = ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_KEYS;
  272. m_FSM.doWarnMsg(rc,
  273. "保存密钥对失败", true);
  274. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5207")
  275. (GetOutPutStr("%s%08X%s%s", "SetKeyPair", rc, "strErrMsg", strErrMsg.GetData()).c_str());
  276. }
  277. }
  278. return rc;
  279. }
  280. ErrorCodeEnum CAccessAuthEntity::SaveTokenAndSharedSK(const CBlob &token, const CBlob &sharedSK)
  281. {
  282. LOG_FUNCTION();
  283. CSimpleStringA strErrMsg;
  284. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  285. TokenService_ClientBase *pTokenServiceClient = new TokenService_ClientBase(this);
  286. ErrorCodeEnum rc = pTokenServiceClient->Connect();
  287. if (rc != Error_Succeed)
  288. {
  289. strErrMsg = "连接令牌管理实体失败";
  290. SetAuthErrMsg(strErrMsg.GetData());
  291. string outStr = GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", strErrMsg.GetData());
  292. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_TOKEN_SERVICE, outStr.c_str());
  293. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  294. pTokenServiceClient->SafeDelete();
  295. }
  296. else
  297. {
  298. TokenService_SetToken_Req req = {};
  299. req.token = token;
  300. TokenService_SetToken_Ans ans;
  301. rc = pTokenServiceClient->SetToken(req, ans, 5000);
  302. if (rc == Error_Succeed)
  303. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM).setAPI("SetToken")
  304. ("save token succ, token: [%s]", ByteArrayToHexStr((BYTE*)token.m_pData, token.m_iLength).c_str());
  305. else
  306. {
  307. strErrMsg = "保存令牌失败";
  308. SetAuthErrMsg(strErrMsg.GetData());
  309. string outStr = GetOutPutStr("%s%08X%s%s", "SetToken", rc, "strErrMsg", strErrMsg.GetData());
  310. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_TOKEN, outStr.c_str());
  311. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  312. }
  313. TokenService_SetSharedSK_Req req2 = {};
  314. req2.ssk = sharedSK;
  315. TokenService_SetSharedSK_Ans ans2 = {};
  316. rc = pTokenServiceClient->SetSharedSK(req2, ans2, 5000);
  317. if (rc != Error_Succeed)
  318. {
  319. strErrMsg = "保存会话密钥失败";
  320. SetAuthErrMsg(strErrMsg.GetData());
  321. string outStr = GetOutPutStr("%s%08X%s%s", "SetSharedSK", rc, "strErrMsg", strErrMsg.GetData());
  322. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_SHAREKEY, outStr.c_str());
  323. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  324. }
  325. pTokenServiceClient->GetFunction()->CloseSession();
  326. }
  327. return rc;
  328. }
  329. bool CAccessAuthEntity::HasPinPad()
  330. {
  331. CSimpleStringA strErrMsg;
  332. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  333. //oilyang@20210514
  334. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  335. {
  336. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("MachineType[%s], not exist pinpad", m_info.strMachineType.GetData());
  337. return false;
  338. }
  339. else
  340. {
  341. // 其它VTM机型,全部有内置密码键盘
  342. return true;
  343. }
  344. }
  345. // 1:3des only; 2: sm4 only; 3: both 3des and sm4
  346. // 由当前已初始化的密钥文件决定,兼容旧版本终端
  347. int CAccessAuthEntity::GetPinPadCapability()
  348. {
  349. LOG_FUNCTION();
  350. int nCapability = 0;
  351. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  352. return nCapability;
  353. PinPadService_ClientBase *pPinPad = new PinPadService_ClientBase(this);
  354. auto rc = pPinPad->Connect();
  355. if (rc == Error_Succeed)
  356. {
  357. PinPadService_QueryFunc_Req req;
  358. PinPadService_QueryFunc_Ans ans;
  359. rc = pPinPad->QueryFunc(req, ans, 3000);
  360. if (rc == Error_Succeed)
  361. {
  362. nCapability = ans.encryptkey;
  363. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("QueryFunc from pinpad succ, nCapability[%d]", nCapability);
  364. }
  365. else if (rc != Error_DevNotAvailable)
  366. {
  367. SetAuthErrMsg("从PinPad获取主密钥类型失败");
  368. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  369. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_PINPAD,
  370. GetOutPutStr("%s%s%s%s", "QueryFunc", "False", "AuthErrMsg", "从PinPad获取主密钥类型失败").c_str());
  371. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5205")
  372. (GetOutPutStr("%s%s%s%s", "QueryFunc", "False", "AuthErrMsg", "从PinPad获取主密钥类型失败").c_str());
  373. }
  374. pPinPad->GetFunction()->CloseSession();
  375. }
  376. else
  377. {
  378. SetAuthErrMsg("连接PinPad实体失败");
  379. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  380. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_PINPAD,
  381. GetOutPutStr("%s%08X%s%s", "Connect", rc,"AuthErrMsg", "连接PinPad实体失败").c_str());
  382. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(GetOutPutStr("%s%08X%s%s", "Connect", rc, "AuthErrMsg", "连接PinPad实体失败").c_str());
  383. pPinPad->SafeDelete();
  384. }
  385. return nCapability;
  386. }
  387. void CAccessAuthEntity::printPasswdError(const string& strErrMsg){
  388. SetAuthErrMsg(strErrMsg.c_str());
  389. GetFunction()->SetSysVar("AuthErrMsg", strErrMsg.c_str(), true);
  390. m_FSM.doWarnMsg( ERROR_ACCESSAUTH_OPENCRYPTCONTEXT, strErrMsg.c_str(),true, strErrMsg);
  391. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA520C")(strErrMsg.c_str());
  392. }
  393. int Char2Int(char * ch) {
  394. int num = 0;
  395. for (int i = 0;i < strlen(ch);i++) {
  396. num += ((int)(ch[i] - '0')) * pow((float)10, (float)(strlen(ch) - i - 1));
  397. }
  398. return num;
  399. }
  400. bool CAccessAuthEntity::SaveAuthKey(BYTE *pKey)
  401. {
  402. memset(m_AuthSessionKey, 0, 140);
  403. CSimpleStringA runInfoPath, iniPath;
  404. auto rc = GetFunction()->GetPath("runinfo", runInfoPath);
  405. if (rc != Error_Succeed) {
  406. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("GetPath runinfo error=%d.", rc);
  407. return false;
  408. }
  409. char privateKey[BUF_SIZE] = { 0 };
  410. iniPath = runInfoPath + SPLIT_SLASH_STR "runcfg" SPLIT_SLASH_STR "AccessAuthorization.ini";
  411. char* tmp = inifile_read_str(iniPath.GetData(), "TerminalPD", "PrivateKey", "");
  412. strcpy(privateKey, tmp);
  413. delete tmp;
  414. if (strlen(privateKey) <= 0) {
  415. iniPath = runInfoPath + SPLIT_SLASH_STR "runcfg" SPLIT_SLASH_STR "Initializer.ini";
  416. char* tmp2 = inifile_read_str(iniPath.GetData(), "TerminalPD", "PrivateKey", "");
  417. strcpy(privateKey, tmp2);
  418. delete tmp2;
  419. if (strlen(privateKey) <= 0)
  420. {
  421. printPasswdError("私钥为空,请重置秘钥进行初始化");
  422. return false;
  423. }
  424. }
  425. int decodedPrivateKeyLen;
  426. char* pDecodedPrivateKey = Hex2Str(privateKey, decodedPrivateKeyLen);
  427. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("privateKey len:%d, decodedPrivateKeyLen=%d", strlen(privateKey), decodedPrivateKeyLen);
  428. char pDecryptPrivateKey[BUF_SIZE] = { 0 };
  429. int decryprtLen = BUF_SIZE;
  430. if (!DecWithSM4_ECB("s5da69gnh4!963@6s5da69gnh4!963@6", (BYTE*)pDecodedPrivateKey, decodedPrivateKeyLen, (BYTE*)pDecryptPrivateKey, &decryprtLen)) {
  431. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("DecWithSM4_ECB decrypt privateKey error. SM4解密私钥失败");
  432. printPasswdError("终端初始化未完成,请重置秘钥进行初始化");
  433. delete[] pDecodedPrivateKey;
  434. return false;
  435. }
  436. delete[] pDecodedPrivateKey;
  437. char pPlainKey[KEY_SIZE];
  438. int plainKeyLen = KEY_SIZE;
  439. char pKeyLen[4] = { 0 };
  440. memcpy(pKeyLen, pKey, 4);
  441. int kenLen = Char2Int(pKeyLen);
  442. char* pEncodeKey = Str2Hex((char*)pKey, kenLen + 4);
  443. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("kenLen=%d", kenLen);
  444. delete pEncodeKey;
  445. char* key = new char[kenLen + 1];
  446. memset(key, 0, kenLen + 1);
  447. memcpy(key, pKey + 4, kenLen);
  448. if (!DecWithSM2PriKey((BYTE*)key, kenLen, (BYTE*)pPlainKey, &plainKeyLen, (BYTE*)pDecryptPrivateKey, decryprtLen)) {
  449. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("使用私钥解密失败!");
  450. printPasswdError("终端初始化未完成,请重置秘钥进行初始化");
  451. return false;
  452. }
  453. if (plainKeyLen != KEY_SIZE) {
  454. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setAPI("SaveAuthVerAndKey")("私钥解密后的会话密钥长度不等于16!");
  455. }
  456. memcpy(m_AuthSessionKey, pPlainKey, KEY_SIZE);
  457. return true;
  458. }
  459. static BYTE* ConvertHexStrToBytes(const char *pszStr)
  460. {
  461. if (pszStr == NULL || strlen(pszStr) == 0)
  462. return NULL;
  463. int nLen = strlen(pszStr) / 2;
  464. BYTE *pRet = (BYTE*)malloc(nLen);
  465. memset(pRet, 0, nLen);
  466. for (int i = 0; i < nLen; i++)
  467. {
  468. int nTmp(0);
  469. if (sscanf(&pszStr[i * 2], "%2X", &nTmp) != 1)
  470. {
  471. free(pRet);
  472. return NULL;
  473. }
  474. pRet[i] = (BYTE)nTmp;
  475. }
  476. return pRet;
  477. }
  478. // 使用密钥加密
  479. ErrorCodeEnum CAccessAuthEntity::EncryptDataWithKey(const CBlob &raw, CBlob &enc, BYTE* key)
  480. {
  481. LOG_FUNCTION();
  482. //这里不需要delete,由CBlob析构函数去执行
  483. BYTE* pEncData = new BYTE[1024];
  484. int pEncDataSize = 1024;
  485. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pEncDataSize=%d", pEncDataSize);
  486. char* pPlainInfo = Str2Hex((char*)raw.m_pData, raw.m_iLength);
  487. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("raw Length=%d", raw.m_iLength);
  488. delete[] pPlainInfo;
  489. if (!EncWithSM4_ECB(key, (BYTE*)(raw.m_pData), raw.m_iLength, pEncData, &pEncDataSize)) {
  490. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("会话密钥加密准入信息失败!");
  491. SetAuthErrMsg("会话密钥加密准入信息失败");
  492. return Error_Unexpect;
  493. }
  494. enc.Attach(pEncData,pEncDataSize);
  495. char* tmp = Str2Hex((char*)pEncData, pEncDataSize);
  496. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pEncData size:%d", pEncDataSize);
  497. delete[] tmp;
  498. tmp = Str2Hex((char*)enc.m_pData, enc.m_iLength);
  499. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("EncWithSM4_ECB data size:%d", enc.m_iLength);
  500. delete[] tmp;
  501. return Error_Succeed;
  502. }
  503. static char* ConvertBytesToHexStr(BYTE *pBuf, int nLen)
  504. {
  505. char *pRet = (char*)malloc(nLen * 2 + 1);
  506. memset(pRet, 0, nLen * 2 + 1);
  507. char *p = pRet;
  508. for (int i = 0; i < nLen; i++)
  509. {
  510. BYTE b = pBuf[i];
  511. BYTE l = (b >> 4) & 0x0F;
  512. if (l >= 10)
  513. *p = l - 10 + 'A';
  514. else
  515. *p = l + '0';
  516. p++;
  517. BYTE r = b & 0x0F;
  518. if (r >= 10)
  519. *p = r - 10 + 'A';
  520. else
  521. *p = r + '0';
  522. p++;
  523. }
  524. return pRet;
  525. }
  526. // 生成RSA密钥对,并导出公钥
  527. bool CAccessAuthEntity::GetTerminalPublicKey(BYTE* pBuf, int& nBufLen, string& pubkey)
  528. {
  529. LOG_FUNCTION();
  530. CSimpleString runInfoPath;
  531. auto rc = GetFunction()->GetPath("runinfo", runInfoPath);
  532. if (rc != Error_Succeed) {
  533. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("GetPath runinfo error=%d.", rc);
  534. return false;
  535. }
  536. runInfoPath += SPLIT_SLASH_STR "runcfg" SPLIT_SLASH_STR;
  537. #ifdef RVC_OS_WIN
  538. DWORD dwAttr = GetFileAttributes(runInfoPath.GetData());
  539. if (dwAttr == 0xFFFFFFFF) //目录不存在则创建
  540. {
  541. if (!CreateDirectory(runInfoPath.GetData(), NULL))
  542. {
  543. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Create %s dir failed!", runInfoPath.GetData());
  544. }
  545. }
  546. #else
  547. if (!dir_is_exist(runInfoPath.GetData()))
  548. {
  549. if (dir_create(runInfoPath.GetData()) != 0)
  550. {
  551. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Create %s dir failed!", runInfoPath.GetData());
  552. }
  553. }
  554. #endif // RVC_OS_WIN
  555. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Dir=%s", runInfoPath.GetData());
  556. CSmartPointer<IConfigInfo> pConfig;
  557. rc = GetFunction()->OpenConfig(Config_Run, pConfig);
  558. if (rc != Error_Succeed) {
  559. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("OpenConfig Config_Run error=%d.", rc);
  560. return false;
  561. }
  562. CSimpleString publicKey;
  563. rc = pConfig->ReadConfigValue("TerminalPD", "PublicKey", publicKey);
  564. if (rc != Error_Succeed || publicKey.IsNullOrEmpty()) {
  565. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("ReadConfig publicKey error=%d or publicKey is NULL.", rc);
  566. }
  567. BYTE btPublicKey[BUF_SIZE] = { 0 }, btPrivateKey[BUF_SIZE] = { 0 };
  568. int iPublicKeyLen = sizeof(btPublicKey);
  569. int iPrivateKeyLen = sizeof(btPrivateKey);
  570. if (!::CreateSM2KeyPair(btPublicKey, &iPublicKeyLen, btPrivateKey, &iPrivateKeyLen)) {
  571. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Create SM2 key pair error.");
  572. return false;
  573. }
  574. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("iPublicKeyLen=%d,iPrivateKeyLen=%d", iPublicKeyLen, iPrivateKeyLen);
  575. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("[btPublicKey=%s]", (char*)btPublicKey);
  576. char* pEncode = Str2Hex((char*)btPublicKey, iPublicKeyLen);
  577. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pEncode=%s,%d", pEncode, strlen(pEncode));
  578. /*rc = pConfig->WriteConfigValue("TerminalPD", "PublicKey", pEncode);
  579. assert(rc == Error_Succeed);*/
  580. m_publicKey = pEncode;
  581. pubkey = pEncode;
  582. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("write public key success.");
  583. BYTE pCryptPrivateKey[BUF_SIZE] = { 0 };
  584. int cryptPrivateKeyLen = BUF_SIZE;
  585. if (!EncWithSM4_ECB("s5da69gnh4!963@6s5da69gnh4!963@6", btPrivateKey, iPrivateKeyLen, pCryptPrivateKey, &cryptPrivateKeyLen)) {
  586. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("sm4 crypt privateKey error.");
  587. /*rc = pConfig->WriteConfigValue("TerminalPD", "PublicKey", "");*/
  588. m_publicKey = "";
  589. delete[] pEncode;
  590. return false;
  591. }
  592. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("sm4 encrypt pri key success.");
  593. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("cryptPrivateKeyLen=%d", cryptPrivateKeyLen);
  594. char* pEncodedCryptPrivateKey = Str2Hex((char*)pCryptPrivateKey, cryptPrivateKeyLen);
  595. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("encode pri key success.");
  596. m_privateKey = pEncodedCryptPrivateKey;
  597. /*//不在这里写入私钥,将逻辑修改到函数外部,等服务端返回成功后再写入私钥
  598. rc = pConfig->WriteConfigValue("TerminalPD", "PrivateKey", pEncodedCryptPrivateKey);
  599. if (rc != Error_Succeed) {
  600. rc = pConfig->WriteConfigValue("TerminalPD", "PublicKey", "");
  601. delete[] pEncodedCryptPrivateKey;
  602. return false;
  603. }
  604. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("write pri key success.");*/
  605. publicKey = pEncode;
  606. delete[] pEncode;
  607. delete[] pEncodedCryptPrivateKey;
  608. char* pDecode = Hex2Str(publicKey.GetData(), nBufLen);
  609. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pDecode=[%s],len=%d", pDecode, nBufLen);
  610. memcpy(pBuf, pDecode, nBufLen);
  611. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pBuf[0]=%02X,nBufLen=%d", pBuf[0], nBufLen);
  612. return true;
  613. }
  614. //oilyang@20210510 嵌入"bool CAccessAuthEntity::HasPinPad()"的逻辑
  615. // 返回1:只有PinPadID;2:只有DeviceID;3:两者都有;0:没有;-1表示失败
  616. ErrorCodeEnum CAccessAuthEntity::GetPinPadModel(CSimpleStringA& pinpadModel, bool& bPinPadOnline)
  617. {
  618. bPinPadOnline = false;
  619. CSimpleStringA strErrMsg;
  620. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  621. std::map<std::string, std::string> errInfo;
  622. //oilyang@20210514
  623. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  624. {
  625. pinpadModel = "";
  626. return Error_Succeed;
  627. }
  628. ErrorCodeEnum nRet = Error_Unexpect;
  629. auto pPinPadClient = new PinPadService_ClientBase(this);
  630. bool bPinPadID = false;
  631. bool bDeviceID = false;
  632. bool bVendor = false;
  633. bool bBluetooth = false;
  634. CSimpleStringA strVendor;
  635. CSimpleStringA strBluetoothID;
  636. CSimpleStringA strPID;
  637. CSimpleStringA strMID;
  638. auto rc = 0;
  639. if ((rc = pPinPadClient->Connect()) == Error_Succeed)
  640. {
  641. //初始错误信息
  642. errInfo["errcode"] = "RTA5205";
  643. errInfo["msg"] = "调用PinPad发生错误";
  644. errInfo["getLastErr"] = GetLastError();
  645. pinpadModel = generateJsonStr(errInfo).second.c_str();
  646. PinPadService_GetDevInfo_Req req = {};
  647. PinPadService_GetDevInfo_Ans ans = {};
  648. rc = pPinPadClient->GetDevInfo(req, ans, 3000);
  649. if (rc == Error_Succeed)
  650. {
  651. bPinPadOnline = true;
  652. nRet = Error_Succeed;
  653. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pinpad model: %s", ans.model.GetData());
  654. // CM = V2.0#PM = V1.0#MID = 75500001#PID = 12345678#FWID = V1234567#Vendor = nantian
  655. // 密码键盘ID,PID,8到16字节; 设备ID,MID,8到16字节; 固件版本号,FWID,8字节
  656. pinpadModel = ans.model;
  657. }
  658. else if(rc == Error_NotInit)
  659. {
  660. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pinpad NOT INIT!, state: %d", ans.state);
  661. strErrMsg = "PinPad打开失败";
  662. SetAuthErrMsg(strErrMsg.GetData());
  663. string outStr = GetOutPutStr("%s%08X%s%s", "GetDevInfo", rc, "strErrMsg", strErrMsg.GetData());
  664. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_PINPAD, outStr.c_str());
  665. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5205")(outStr.c_str());
  666. return nRet;
  667. }
  668. else
  669. {
  670. strErrMsg = "调用PinPad实体的GetDevInfo方法失败";
  671. SetAuthErrMsg(strErrMsg.GetData());
  672. string outStr = GetOutPutStr("%s%08X%s%s", "GetDevInfo", rc, "strErrMsg", strErrMsg.GetData());
  673. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_PINPAD, outStr.c_str());
  674. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5205")(outStr.c_str());
  675. return nRet;
  676. }
  677. pPinPadClient->GetFunction()->CloseSession();
  678. }
  679. else if (rc == Error_NetBroken)
  680. {
  681. strErrMsg = "PinPad实体未启动, 连接密码键盘失败";
  682. SetAuthErrMsg((const char*)strErrMsg);
  683. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_PINPAD_UNLOAD,
  684. GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", "PinPad实体未启动, 连接密码键盘失败").c_str());
  685. pPinPadClient->SafeDelete();
  686. errInfo["errcode"] = "RTA5218";
  687. errInfo["msg"] = "PinPad实体未启动";
  688. errInfo["getLastErr"] = GetLastError();
  689. pinpadModel = generateJsonStr(errInfo).second.c_str();
  690. return nRet;
  691. }
  692. else
  693. {
  694. strErrMsg = "连接PinPad实体失败";
  695. SetAuthErrMsg((const char*)strErrMsg);
  696. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_PINPAD,
  697. GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", "连接PinPad实体失败").c_str());
  698. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")("连接密码键盘异常");
  699. pPinPadClient->SafeDelete();
  700. errInfo["errcode"] = "RTA5204";
  701. errInfo["msg"] = "PinPad实体启动成功,但连接PinPad实体失败";
  702. errInfo["getLastErr"] = GetLastError();
  703. pinpadModel = generateJsonStr(errInfo).second.c_str();
  704. return nRet; //此时nRet = -1, pinpad调用失败
  705. }
  706. pPinPadClient = NULL;
  707. return nRet;
  708. }
  709. wstring CAccessAuthEntity::ANSIToUnicode(const string& str)
  710. {
  711. int len = 0;
  712. len = str.length();
  713. int unicodeLen = ::MultiByteToWideChar(CP_ACP,
  714. 0,
  715. str.c_str(),
  716. -1,
  717. NULL,
  718. 0);
  719. wchar_t * pUnicode;
  720. pUnicode = new wchar_t[unicodeLen+1];
  721. memset(pUnicode,0,(unicodeLen+1)*sizeof(wchar_t));
  722. ::MultiByteToWideChar( CP_ACP,
  723. 0,
  724. str.c_str(),
  725. -1,
  726. (LPWSTR)pUnicode,
  727. unicodeLen);
  728. wstring rt;
  729. rt = (wchar_t*)pUnicode;
  730. delete pUnicode;
  731. return rt;
  732. }
  733. //China Standard Time
  734. BOOL CAccessAuthEntity::SetLocalTimeZoneByKeyName(const TCHAR* szTimeZoneKeyName, BOOL isDaylightSavingTime)
  735. {
  736. #ifdef RVC_OS_WIN
  737. HKEY hKey;
  738. LONG ErrorCode;
  739. TCHAR szSubKey[256];
  740. TCHAR szStandardName[32];
  741. TCHAR szDaylightName[32];
  742. REG_TZI_FORMAT regTZI;
  743. DWORD dwByteLen;
  744. // 检测入口参数
  745. if ((szTimeZoneKeyName == NULL) || (strlen(szTimeZoneKeyName) == 0))
  746. {
  747. // 时区标识符不能为空
  748. return FALSE;
  749. }
  750. StringCchCopy(szSubKey, 256, TEXT("Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\"));
  751. StringCchCat(szSubKey, 256, szTimeZoneKeyName);
  752. ErrorCode = RegOpenKeyEx(HKEY_LOCAL_MACHINE, szSubKey, 0, KEY_QUERY_VALUE, &hKey);
  753. if (ErrorCode != ERROR_SUCCESS)
  754. {
  755. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegOpenKeyEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time fail");
  756. return FALSE;
  757. }
  758. // 标准名
  759. dwByteLen = sizeof(szStandardName);
  760. ErrorCode = RegQueryValueEx(hKey, TEXT("Std"), NULL, NULL, reinterpret_cast<LPBYTE>(&szStandardName), &dwByteLen);
  761. if (ErrorCode != ERROR_SUCCESS)
  762. {
  763. RegCloseKey(hKey);
  764. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\Std fail");
  765. return FALSE;
  766. }
  767. // 夏时制名
  768. dwByteLen = sizeof(szDaylightName);
  769. ErrorCode = RegQueryValueEx(hKey, TEXT("Dlt"), NULL, NULL, reinterpret_cast<LPBYTE>(&szDaylightName), &dwByteLen);
  770. if (ErrorCode != ERROR_SUCCESS)
  771. {
  772. RegCloseKey(hKey);
  773. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\Dlt fail");
  774. return FALSE;
  775. }
  776. // 时区信息
  777. dwByteLen = sizeof(regTZI);
  778. ErrorCode = RegQueryValueEx(hKey, TEXT("TZI"), NULL, NULL, reinterpret_cast<LPBYTE>(&regTZI), &dwByteLen);
  779. RegCloseKey(hKey);
  780. if ((ErrorCode != ERROR_SUCCESS) || (dwByteLen > sizeof(regTZI)))
  781. {
  782. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\TZI fail");
  783. return FALSE;
  784. }
  785. // 开启权限
  786. HANDLE hToken;
  787. TOKEN_PRIVILEGES tkp;
  788. BOOL isOK;
  789. if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &hToken))
  790. {
  791. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("OpenProcessToken Standard Time\\Dlt fail");
  792. return FALSE;
  793. }
  794. LookupPrivilegeValue(NULL, SE_TIME_ZONE_NAME, &tkp.Privileges[0].Luid);
  795. tkp.PrivilegeCount = 1;
  796. tkp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
  797. AdjustTokenPrivileges(hToken, FALSE, &tkp, 0, (PTOKEN_PRIVILEGES)NULL, 0);
  798. if (GetLastError() != ERROR_SUCCESS)
  799. {
  800. CloseHandle(hToken);
  801. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("AdjustTokenPrivileges fail");
  802. return FALSE;
  803. }
  804. // 设置新时区
  805. DYNAMIC_TIME_ZONE_INFORMATION tzi;
  806. tzi.Bias = regTZI.Bias;
  807. tzi.StandardDate = regTZI.StandardDate;
  808. tzi.StandardBias = regTZI.StandardBias;
  809. tzi.DaylightDate = regTZI.DaylightDate;
  810. tzi.DaylightBias = regTZI.DaylightBias;
  811. tzi.DynamicDaylightTimeDisabled = !isDaylightSavingTime;
  812. wcscpy(tzi.StandardName, ANSIToUnicode(szStandardName).c_str());
  813. wcscpy(tzi.DaylightName, ANSIToUnicode(szDaylightName).c_str());
  814. wcscpy(tzi.TimeZoneKeyName, ANSIToUnicode(szTimeZoneKeyName).c_str());
  815. isOK = SetDynamicTimeZoneInformation(&tzi); // 设置动态时区
  816. if (!isOK)
  817. {
  818. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("SetDynamicTimeZoneInformation fail");
  819. }
  820. // 关闭权限
  821. tkp.Privileges[0].Attributes = 0;
  822. AdjustTokenPrivileges(hToken, FALSE, &tkp, 0, (PTOKEN_PRIVILEGES)NULL, 0);
  823. CloseHandle(hToken);
  824. return isOK;
  825. #else
  826. //temporarily not relased at linux
  827. return TRUE;
  828. #endif // RVC_OS_WIN
  829. }
  830. bool CAccessAuthEntity::IsMachineTypeConfigurePinPad(CSimpleStringA strMachineType)
  831. {
  832. CSmartPointer<IConfigInfo> spConfig;
  833. ErrorCodeEnum Error = GetFunction()->OpenConfig(Config_CenterSetting, spConfig);
  834. CSimpleStringA mcType = CSimpleStringA("CoreBootList.") + strMachineType;
  835. CSimpleStringA loaderConifg("");
  836. ErrorCodeEnum errCode = spConfig->ReadConfigValue("VtmLoader", mcType.GetData(), loaderConifg);
  837. if (errCode != Error_Succeed)
  838. {
  839. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("Get VtmLoader config failed!");
  840. }
  841. if (string(loaderConifg.GetData()).find("PinPad") != string::npos) //集中配置配了启动pinpad实体
  842. {
  843. return true;
  844. }
  845. else
  846. {
  847. return false;
  848. }
  849. }
  850. void CAccessAuthEntity::UpdateWK()
  851. {
  852. m_FSM.UpdateWK();
  853. }
  854. void CAccessAuthEntity::BeginInitMKACS()
  855. {
  856. LOG_FUNCTION();
  857. // 1:3des only; 2: sm4 only; 3: both 3des and sm4
  858. int nCapability = GetPinPadCapability();
  859. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pinpad capability: %d", nCapability);
  860. CSmartPointer<IConfigInfo> spConfig;
  861. ErrorCodeEnum Error = GetFunction()->OpenConfig(Config_CenterSetting, spConfig);
  862. if (Error_Succeed == Error)
  863. {
  864. Error = spConfig->ReadConfigValue("AccessAuthorization", "HostInitUrl", m_strInitUrl);
  865. if (Error_Succeed != Error)
  866. {
  867. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("get InitUrl from CenterSetting failed");
  868. return;
  869. }
  870. } else {
  871. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("open InitUrl from CenterSetting.ini failed");
  872. return;
  873. }
  874. CSmartPointer<InitializerInitMKTask> initUpdateWKTask = new InitializerInitMKTask(&this->m_FSM, this);
  875. GetFunction()->PostThreadPoolTask(initUpdateWKTask.GetRawPointer());
  876. }
  877. bool CAccessAuthEntity::SendInitMKReqACS(CInitlizerMKReq& initMKReq)
  878. {
  879. LOG_FUNCTION();
  880. CSmartPointer<IEntityFunction> pFunc = GetFunction();
  881. ErrorCodeEnum nRet = Error_Unexpect;
  882. CBlob encInfo;
  883. char* hexStr = "21009872C31CBC00D0C8F421D09CF707";
  884. BYTE key[KEY_SIZE] = { 0 };
  885. memcpy(key, ConvertHexStrToBytes(hexStr), KEY_SIZE);
  886. //char key[KEY_SIZE] = { 0 };
  887. //memcpy(key, "1234567890123456234", KEY_SIZE);
  888. nRet = (ErrorCodeEnum)m_FSM.GetEncTerminalInfoWithKey(encInfo, key);
  889. if (nRet != Error_Succeed)
  890. {
  891. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("GetEncTerminalInfo failed:%d", nRet);
  892. return false;
  893. }
  894. char* pTmp = Str2Hex((char*)encInfo.m_pData, encInfo.m_iLength);
  895. initMKReq.iniTerminalInfo = pTmp;
  896. CSystemStaticInfo si;
  897. pFunc->GetSystemStaticInfo(si);
  898. initMKReq.terminalVersion = si.InstallVersion.ToString();
  899. initMKReq.terminalNo = si.strTerminalID.GetData();
  900. BYTE xPublicKey[148];
  901. int nBufLen = sizeof(xPublicKey);
  902. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("SendInitMKReqACS")("开始获取公钥。。。");
  903. memset(xPublicKey, 0, nBufLen);
  904. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("SendInitMKReqACS")("nBufLen=%d", nBufLen);
  905. if (!GetTerminalPublicKey(xPublicKey, nBufLen, initMKReq.publicKey))
  906. {
  907. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_PUBKEY,
  908. GetOutPutStr("%s%s", "GetTerminalPublicKey", "False").c_str());
  909. return false;
  910. }
  911. initMKReq.user = m_strUserID.GetData();
  912. if (!m_strUserID.IsNullOrEmpty() && !m_strPassword.IsNullOrEmpty())
  913. {
  914. LogWarn(Severity_Low, Error_Succeed, AccessAuthorization_UserErrorCode_Init_From_ClosePage, "Init by ClosePage.");
  915. initMKReq.loginWay = 1;
  916. }
  917. else
  918. {
  919. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("no need to call login again as User Desktop have logined.");
  920. initMKReq.loginWay = 0;
  921. }
  922. PinPadService_ClientBase* pPinPad = new PinPadService_ClientBase(this);
  923. auto errRc = pPinPad->Connect();
  924. if (errRc == Error_Succeed)
  925. {
  926. PinPadService_GetCheckCode_Req req = {};
  927. PinPadService_GetCheckCode_Ans ans = {};
  928. req.mSN.Init(1);
  929. req.wSN.Init(1);
  930. req.mSN[0] = 1;
  931. req.wSN[0] = 0;
  932. errRc = (*pPinPad)(EntityResource::getLink().upgradeLink())->GetCheckCode(req, ans, 10000);
  933. if (errRc == Error_Succeed)
  934. {
  935. initMKReq.curTpkKeyCheck = ans.checkcode[0].GetData();
  936. initMKReq.curKeyIndex = ans.index[0].GetData();
  937. }
  938. else
  939. {
  940. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("Get keyChek && keyIndex failed.");
  941. }
  942. pPinPad->GetFunction()->CloseSession();
  943. }
  944. else
  945. {
  946. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("connect to pinpad failed.error code:%d", errRc);
  947. }
  948. return true;
  949. }
  950. void CAccessAuthEntity::EndInitMK(DWORD rc, const char *pszErrMsg)
  951. {
  952. LOG_FUNCTION();
  953. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setLogCode(AccessAuthService_LogCode_InitializeNew)
  954. ("EndInitMK:rc:%d,errMsg:%s", rc, pszErrMsg);
  955. GetFunction()->KillTimer(22);
  956. m_strLastErrMsg = pszErrMsg;
  957. if (rc != Error_Succeed)
  958. {
  959. LogWarn(Severity_Middle, Error_Unexpect, rc,
  960. GetOutPutStr("%s%08X%s%s", "EndInitMK", rc,"pszErrMsg", pszErrMsg).c_str());
  961. GetFunction()->ShowFatalError(pszErrMsg);
  962. }
  963. else
  964. {
  965. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("初始化成功。。。");
  966. }
  967. m_eErrNum = rc;
  968. bool bSuc = rc == Error_Succeed;
  969. // 通知UI窗口
  970. if (m_ctx != NULL) {
  971. m_ctx->Ans.Errcode = rc;
  972. m_ctx->Ans.ErrMsg = m_strLastErrMsg;
  973. m_ctx->Answer(Error_Succeed);
  974. }
  975. }
  976. ErrorCodeEnum CAccessAuthEntity::LoadKeysToPinPadACS(string TMK, string TPK, string EDK, string index, string tpkCheck, string edkCheck)
  977. {
  978. LOG_FUNCTION();
  979. //加载到密码键盘
  980. PinPadService_ClientBase* pPinPad = new PinPadService_ClientBase(this);
  981. auto rc = pPinPad->Connect();
  982. if (rc == Error_Succeed)
  983. {
  984. PinPadService_LoadKeysSM_Req req = {};
  985. req.initializeflag = true;
  986. req.smflag = 1;
  987. req.masterkey = TMK.c_str();
  988. req.workingkey1 = TPK.c_str();
  989. req.workingkey2 = EDK.c_str();
  990. req.reserved3 = index.c_str();
  991. req.reserved4 = tpkCheck.c_str();
  992. if (!req.initializeflag) DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("LoadKeysToPinPadACS")("initializeflag is false");
  993. PinPadService_LoadKeysSM_Ans ans = {};
  994. rc = pPinPad->LoadKeysSM(req, ans, 30000);
  995. if (rc != Error_Succeed)
  996. {
  997. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("load sm key to pinpad failed.");
  998. return Error_Unexpect;
  999. }
  1000. pPinPad->GetFunction()->CloseSession();
  1001. }
  1002. else
  1003. {
  1004. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("connect to pinpad failed %x", rc);
  1005. return Error_Unexpect;
  1006. }
  1007. return Error_Succeed;
  1008. }
  1009. DWORD CAccessAuthEntity::InitDevice(SpReqAnsContext<AccessAuthService_InitDev_Req, AccessAuthService_InitDev_Ans>::Pointer& ctx)
  1010. {
  1011. return m_FSM.InitDevice(ctx);
  1012. }
  1013. void CAccessAuthEntity::GetNetMsg(SpReqAnsContext<AccessAuthService_GetNetMsg_Req, AccessAuthService_GetNetMsg_Ans>::Pointer& ctx)
  1014. {
  1015. m_FSM.GetNetMsg(ctx);
  1016. return;
  1017. }
  1018. bool CAccessAuthEntity::GenerateRandomNum()
  1019. {
  1020. LOG_FUNCTION();
  1021. const int MAX_KEY_SIZE = 256;
  1022. //get public key-->send random number --> set working key
  1023. int ret1, ret2, ret3, ret4;
  1024. unsigned int ram[4];
  1025. #ifdef RVC_OS_WIN
  1026. ret1 = rand_s(&ram[0]);
  1027. ret2 = rand_s(&ram[1]);
  1028. ret3 = rand_s(&ram[2]);
  1029. ret4 = rand_s(&ram[3]);
  1030. if ((ret1 != 0) || (ret2 != 0) || (ret3 != 0) || (ret4 != 0))
  1031. return false;
  1032. ZeroMemory(m_btRam, 16);
  1033. #else
  1034. ram[0] = rand();
  1035. ram[1] = rand();
  1036. ram[2] = rand();
  1037. ram[3] = rand();
  1038. memset(m_btRam, 0, 16);
  1039. #endif // RVC_OS_WIN
  1040. for (int i = 0, j = 0; j < 4; ++j)
  1041. {
  1042. m_btRam[i + 0] = ((ram[j] & 0xff000000) >> 24);
  1043. m_btRam[i + 1] = ((ram[j] & 0x00ff0000) >> 16);
  1044. m_btRam[i + 2] = ((ram[j] & 0x0000ff00) >> 8);
  1045. m_btRam[i + 3] = (ram[j] & 0x000000ff);
  1046. i += 4;
  1047. }
  1048. return true;
  1049. }
  1050. pair<string, string> CAccessAuthEntity::GenerateTmkToKMC()
  1051. {
  1052. LOG_FUNCTION();
  1053. if (!GenerateRandomNum())
  1054. return make_pair("", "");
  1055. #ifdef DEVOPS_ON_ST /*DevOps流水线编译,ST环境*/
  1056. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  1057. #elif defined(DEVOPS_ON_UAT)/*DevOps流水线编译,UAT环境*/
  1058. CSimpleStringA tmpPubKey = "040AEC50A1FC9C5E9B1162FE4520C9E18E6F471A3F6DB77B147F0A464B5BFD0EDBE08AE8377C458CA204456E7A86568AAA9240F1C843E47988A6A197B232539DC8";
  1059. #elif defined(DEVOPS_ON_PRD)/*DevOps流水线编译,PRD环境*/
  1060. CSimpleStringA tmpPubKey = "04E0A4FDA2484A1A0FAB0844F59110AEB7A08D314B5E451E816FC0E78CBA383B461474E1167B86FC48D704CB482DD5164A73AB9E019CCE26EE382B89C394B5ACE1";
  1061. #elif defined(DEVOPS_ON_DEV)/*DevOps流水线编译,Dev环境*/
  1062. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  1063. #else/*本地编译等非DevOps环境编译的版本*/
  1064. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  1065. #endif
  1066. return EncryptedByPubKey(tmpPubKey);
  1067. }
  1068. pair<string, string> CAccessAuthEntity::EncryptedByPubKey(CSimpleStringA pubKey, bool bNeed04Head)
  1069. {
  1070. LOG_FUNCTION();
  1071. if (pubKey.GetLength() <= 0)
  1072. return make_pair("", "");
  1073. PCHAR strRam = new CHAR[512];
  1074. memset(strRam, 0, 512);
  1075. memcpy(strRam, &(m_btRam[0]), 16);
  1076. HexBuf2StrBuf((PBYTE)m_btRam, &strRam, 16);
  1077. const int MAX_KEY_SIZE = 256;
  1078. char random_enc_bypbk[MAX_KEY_SIZE];
  1079. memset(random_enc_bypbk, 0, MAX_KEY_SIZE);
  1080. //公钥加密随机数
  1081. int outMsgLen = MAX_KEY_SIZE;
  1082. PBYTE pxxKey = new BYTE[256];
  1083. PBYTE pOldPubKey = new BYTE[256];
  1084. memset(pOldPubKey, 0, 256);
  1085. memset(pxxKey, 0, 256);
  1086. int size = StrBuf2HexBuf(pubKey.GetData(), &pOldPubKey);
  1087. if (bNeed04Head)
  1088. {
  1089. pxxKey[0] = 0x04;
  1090. memcpy(pxxKey + 1, pOldPubKey, size);
  1091. }
  1092. else
  1093. memcpy(pxxKey, pOldPubKey, 65);
  1094. int retSM2 = EncWithSM2PubKey((unsigned char*)m_btRam, 16, (unsigned char*)random_enc_bypbk, &outMsgLen, (unsigned char*)pxxKey, 65);
  1095. if (!retSM2 || outMsgLen != 113)
  1096. {
  1097. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("EncWithSM2PubKey failed outMsgLen:%d.", outMsgLen);
  1098. return make_pair("", "");
  1099. }
  1100. PBYTE tmp_enc_bypbk = new BYTE[112];
  1101. memset(tmp_enc_bypbk, 0, 112);
  1102. if (bNeed04Head)
  1103. {
  1104. memcpy(tmp_enc_bypbk, &(random_enc_bypbk[1]), 112);
  1105. }
  1106. else
  1107. {
  1108. memcpy(tmp_enc_bypbk, &(random_enc_bypbk[1]), 64);
  1109. memcpy(tmp_enc_bypbk + 64, &(random_enc_bypbk[97]), 16);
  1110. memcpy(tmp_enc_bypbk + 80, &(random_enc_bypbk[65]), 32);
  1111. }
  1112. PCHAR pBlock = new CHAR[512];
  1113. memset(pBlock, 0, 512);
  1114. BYTE tmpRandomEnc[512];
  1115. memset(tmpRandomEnc, 0, 512);
  1116. memcpy(tmpRandomEnc, &(tmp_enc_bypbk[0]), outMsgLen - 1);
  1117. size = HexBuf2StrBuf((PBYTE)tmpRandomEnc, &pBlock, 112);
  1118. return make_pair(pBlock, strRam);
  1119. }
  1120. void CAccessAuthEntity::GetHardWareInfo()
  1121. {
  1122. std::map<std::string, std::string> errInfo;
  1123. //oilyang@20231008 to get system info from runcfg first
  1124. //no matter calculating from runcfg succeed or not,we also get system info from system api for update runcfg
  1125. bool bGetFromRunCfg = false;
  1126. CSimpleString csInfo, strErrMsg, strRet;
  1127. CSmartPointer<IConfigInfo> pConfigRun;
  1128. ErrorCodeEnum eErr = GetFunction()->OpenConfig(Config_Run, pConfigRun);
  1129. if (eErr == Error_Succeed && pConfigRun->ReadConfigValue("system", "info", csInfo) == Error_Succeed && !csInfo.IsNullOrEmpty()) {
  1130. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("read device info from runcfg: [%s]", csInfo.GetData());
  1131. CAutoArray<CSimpleStringA> sysInfo = csInfo.Split('|');
  1132. if (sysInfo.GetCount() == 3)
  1133. {
  1134. m_cpuId = sysInfo[0];
  1135. m_mainBoardId = sysInfo[1];
  1136. m_hardDiskId = sysInfo[2];
  1137. bGetFromRunCfg = true;
  1138. m_iGetTermSysInfo = 1;
  1139. }
  1140. else
  1141. {
  1142. m_iGetTermSysInfo = -1;
  1143. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setAPI("GetTerminalFingerPrint")("get sm3 hash as fingerprint fail");
  1144. }
  1145. }
  1146. else
  1147. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("GetTermSysInfo, OpenConfig Config_Run error=%d.", eErr);
  1148. #ifdef RVC_OS_LINUX
  1149. char szTmp[1024] = {};
  1150. string strTmp;
  1151. int nTmpBufLen = 1024;
  1152. CSimpleStringA runInfoPath;
  1153. auto rc = GetFunction()->GetPath("runinfo", runInfoPath);
  1154. if (rc != Error_Succeed) {
  1155. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("GetPath runinfo error=%d.", rc);
  1156. return;
  1157. }
  1158. runInfoPath += SPLIT_SLASH_STR "runcfg";
  1159. //CPU
  1160. if (!get_cpu_id_by_system(strTmp, runInfoPath.GetData()))
  1161. {
  1162. if (!bGetFromRunCfg)
  1163. {
  1164. errInfo["errcode"] = "RTA5213";
  1165. errInfo["msg"] = "调用系统api获取CPU序号失败";
  1166. errInfo["getLastErr"] = GetLastError();
  1167. m_cpuId = generateJsonStr(errInfo).second.c_str();
  1168. m_iGetTermSysInfo = -1;
  1169. }
  1170. strErrMsg = CSimpleStringA::Format("查询CPU ID失败,请重启机器并重新初始化");
  1171. SetAuthErrMsg((const char*)strErrMsg);
  1172. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1173. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1174. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5213")
  1175. (GetOutPutStr("%s%s", "Processor", "False").c_str());
  1176. return;
  1177. }
  1178. m_cpuId = strTmp.c_str();
  1179. strRet = strTmp.c_str();
  1180. strTmp.clear();
  1181. //主板
  1182. if (!get_board_serial_by_system(strTmp, runInfoPath.GetData()))
  1183. {
  1184. if (!bGetFromRunCfg)
  1185. {
  1186. errInfo["errcode"] = "RTA5214";
  1187. errInfo["msg"] = "调用系统api获取主板ID号失败";
  1188. errInfo["getLastErr"] = GetLastError();
  1189. m_mainBoardId = generateJsonStr(errInfo).second.c_str();
  1190. m_iGetTermSysInfo = -1;
  1191. }
  1192. strErrMsg = CSimpleStringA::Format("查询主板序列号失败, 请重启机器并重新初始化");
  1193. SetAuthErrMsg((const char*)strErrMsg);
  1194. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1195. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1196. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5214")
  1197. (GetOutPutStr("%s%s", "BaseBoard", "False").c_str());
  1198. return;
  1199. }
  1200. m_mainBoardId = strTmp.c_str();
  1201. strRet += "|";
  1202. strRet += strTmp.c_str();
  1203. //硬盘
  1204. vector<string> diskArr;
  1205. int errCode = 0;
  1206. if (!get_disk_serial_by_system(diskArr, errCode, runInfoPath.GetData()))
  1207. {
  1208. if (!bGetFromRunCfg)
  1209. {
  1210. errInfo["errcode"] = "RTA5215";
  1211. errInfo["msg"] = "调用系统api获取硬盘ID号失败";
  1212. errInfo["getLastErr"] = GetLastError();
  1213. m_hardDiskId = generateJsonStr(errInfo).second.c_str();
  1214. m_iGetTermSysInfo = -1;
  1215. }
  1216. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("get_disk_serial_by_system errCode:%d", errCode);
  1217. strErrMsg = CSimpleStringA::Format("查询磁盘序列号失败, 请重启机器并重新初始化");
  1218. SetAuthErrMsg((const char*)strErrMsg);
  1219. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1220. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1221. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5215")
  1222. (GetOutPutStr("%s%s", "DiskDrive", "False").c_str());
  1223. return;
  1224. }
  1225. strRet += "|";
  1226. strTmp = "";
  1227. vector<string>::iterator it = diskArr.begin();
  1228. while (it != diskArr.end()) {
  1229. strTmp += *it;
  1230. it++;
  1231. }
  1232. strRet += strTmp.c_str();
  1233. m_hardDiskId = strTmp.c_str();
  1234. #else
  1235. ULONGLONG ullStart = GetTickCount64();
  1236. char szTmp[1024] = {};
  1237. int nTmpBufLen = 1024;
  1238. if (!QueryWMIDevice(Processor, "ProcessorId", szTmp, &nTmpBufLen))
  1239. {
  1240. if (!bGetFromRunCfg)
  1241. {
  1242. errInfo["errcode"] = "RTA5213";
  1243. errInfo["msg"] = "调用系统api获取CPU序号失败";
  1244. errInfo["getLastErr"] = GetLastError();
  1245. m_cpuId = generateJsonStr(errInfo).second.c_str();
  1246. m_iGetTermSysInfo = -1;
  1247. }
  1248. strErrMsg = CSimpleStringA::Format("查询 cpu id 失败: %d, 请尝试重启应用", GetLastError());
  1249. SetAuthErrMsg((const char*)strErrMsg);
  1250. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1251. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1252. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5213")
  1253. (GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1254. return;
  1255. }
  1256. strRet = szTmp;
  1257. m_cpuId = szTmp;
  1258. nTmpBufLen = 1024;
  1259. memset(szTmp, 0, sizeof(szTmp));
  1260. if (!QueryWMIDevice(BaseBoard, "SerialNumber", szTmp, &nTmpBufLen))
  1261. {
  1262. if (!bGetFromRunCfg)
  1263. {
  1264. errInfo["errcode"] = "RTA5214";
  1265. errInfo["msg"] = "调用系统api获取主板ID号失败";
  1266. errInfo["getLastErr"] = GetLastError();
  1267. m_mainBoardId = generateJsonStr(errInfo).second.c_str();
  1268. m_iGetTermSysInfo = -1;
  1269. }
  1270. strErrMsg = CSimpleStringA::Format("查询 baseboard sn 失败: %d, 请尝试重启应用", GetLastError());
  1271. SetAuthErrMsg((const char*)strErrMsg);
  1272. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1273. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1274. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5214")
  1275. (GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1276. return;
  1277. }
  1278. strRet += "|";
  1279. strRet += szTmp;
  1280. m_mainBoardId = szTmp;
  1281. nTmpBufLen = 1024;
  1282. memset(szTmp, 0, sizeof(szTmp));
  1283. if (!QueryWMIDevice(DiskDrive, "SerialNumber", szTmp, &nTmpBufLen))
  1284. {
  1285. if (!bGetFromRunCfg)
  1286. {
  1287. errInfo["errcode"] = "RTA5215";
  1288. errInfo["msg"] = "调用系统api获取硬盘ID号失败";
  1289. errInfo["getLastErr"] = GetLastError();
  1290. m_hardDiskId = generateJsonStr(errInfo).second.c_str();
  1291. m_iGetTermSysInfo = -1;
  1292. }
  1293. strErrMsg = CSimpleStringA::Format("查询 harddisk sn 失败: %d, 请尝试重启应用", GetLastError());
  1294. SetAuthErrMsg((const char*)strErrMsg);
  1295. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1296. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "DiskDrive", GetLastError()).c_str());
  1297. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5215")
  1298. (GetOutPutStr("%s%s", "DiskDrive", "False").c_str());
  1299. return;
  1300. }
  1301. strRet += "|";
  1302. strRet += szTmp;
  1303. m_hardDiskId = szTmp;
  1304. ULONGLONG ullEnd = GetTickCount64();
  1305. if (ullEnd - ullStart > 5000)
  1306. {
  1307. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5201")
  1308. ("获取系统信息耗时过长:%d秒", (ullEnd - ullStart) / 1000);
  1309. LogWarn(Severity_Middle, Error_Unexpect, AccessAuthorization_UserErrorCode_GetTermCostTooLong,
  1310. CSimpleStringA::Format("获取系统信息耗时过长:%d秒", (ullEnd - ullStart) / 1000));
  1311. }
  1312. #endif // RVC_OS_LINUX
  1313. if (!bGetFromRunCfg || csInfo.Compare(strRet) != 0)
  1314. {
  1315. eErr = pConfigRun->WriteConfigValue("system", "info", strRet.GetData());
  1316. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("device info changed,before[%s],current[%s],write to runcfg:%d"
  1317. , csInfo.GetData(), strRet.GetData(), eErr);
  1318. }
  1319. else
  1320. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("device info: [%s]", strRet.GetData());
  1321. m_iGetTermSysInfo = 1;
  1322. return;
  1323. }
  1324. SP_BEGIN_ENTITY_MAP()
  1325. SP_ENTITY(CAccessAuthEntity)
  1326. SP_END_ENTITY_MAP()