mod_AccessAuth.cpp 51 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539
  1. #include "stdafx.h"
  2. #include "SpBase.h"
  3. #include "mod_AccessAuth.h"
  4. #include "RVCComm.h"
  5. #include "access_basefun.h"
  6. #include <fileutil.h>
  7. #include <iniutil.h>
  8. #include <cmath>
  9. #include "Event.h"
  10. #include "comm.h"
  11. #include "CommEntityRestful.hpp"
  12. #include "TokenKeeper_client_g.h"
  13. using namespace TokenKeeper;
  14. #include "PinPad_client_g.h"
  15. using namespace PinPad;
  16. #ifdef RVC_OS_WIN
  17. #include "WMIDeviceQuery.h"
  18. #include <WinCrypt.h>
  19. #include <Strsafe.h>
  20. #include "DeviceBaseClass.h"
  21. #include "MyBase64.h"
  22. #else
  23. #include "DeviceBaseClass.h"
  24. #endif
  25. extern int HexBuf2StrBuf(PBYTE hexBuf, char** strBuf, DWORD len);
  26. extern int StrBuf2HexBuf(LPCTSTR strBuf, PBYTE* hexBuf);
  27. struct InitializerInitMKTask : ITaskSp
  28. {
  29. CAccessAuthFSM* m_fsm;
  30. CAccessAuthEntity* m_entity;
  31. InitializerInitMKTask(CAccessAuthFSM* fsm, CAccessAuthEntity* entity) :m_fsm(fsm), m_entity(entity) {}
  32. void Process()
  33. {
  34. CSystemStaticInfo si;
  35. m_fsm->GetEntityBase()->GetFunction()->GetSystemStaticInfo(si);
  36. CInitlizerMKReq instanceReq;//oiltest dev module count
  37. bool initFlag = m_entity->SendInitMKReqACS(instanceReq);
  38. if (!initFlag)
  39. {
  40. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")("连接密码键盘异常");
  41. m_entity->EndInitMK(ERR_ACCESSAUTH_CONNECT_PINPAD, "连接密码键盘异常,请检查");//,待完善细化错误码oiltest
  42. return;
  43. }
  44. if (m_fsm->containsChinese(m_fsm->GetmAccessAuthHost().GetData()))
  45. {
  46. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, CSimpleStringA::Format("初始化服务连接失败,URL含中文。").GetData());
  47. return;
  48. }
  49. auto tmkpair = m_entity->GenerateTmkToKMC();
  50. instanceReq.encRandom = tmkpair.first;
  51. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("iniTerminalInfo: %s", instanceReq.iniTerminalInfo.c_str());
  52. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("auth:%s", instanceReq.auth.c_str());
  53. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curEdkKeyCheck: %s", instanceReq.curEdkKeyCheck.c_str());
  54. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curKeyIndex: %s", instanceReq.curKeyIndex.c_str());
  55. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curTpkKeyCheck: %s", instanceReq.curTpkKeyCheck.c_str());
  56. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("encRandom: %s", instanceReq.encRandom.c_str());
  57. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("publicKey: %s", instanceReq.publicKey.c_str());
  58. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("terminalNo: %s", instanceReq.terminalNo.c_str());
  59. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("terminalVersion: %s", instanceReq.terminalVersion.c_str());
  60. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("user: %s", instanceReq.user.c_str());
  61. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("loginWay: %d", instanceReq.loginWay);
  62. CInitlizerMKAns instanceAns;
  63. HttpClientResponseResult result;
  64. HttpClientRequestConfig config(HttpRequestMethod::POST, m_entity->GetInitUrl().GetData(), &SpGetToken);
  65. config.SetChildUri("/api/v6/initmk");
  66. SP::Module::Restful::FulfillRequestJsonBody(&config, instanceReq);
  67. RestfulClient client = RestfulClient::getInstance();
  68. PROCESS_LINK_CONTEXT("LR0402502Initmk");
  69. config.PreDo();
  70. client.Do(&config, &result, &nextLink);
  71. if (result.ResponseOK()) {
  72. SP::Module::Restful::CommResponseJson responseStatus;
  73. SP::Module::Restful::GetStatusFromDebranchResponse(result.content, responseStatus);
  74. if (!responseStatus.IsOperatedOK()) {
  75. CSimpleStringA errMsg = CSimpleStringA::Format("%s|%s", responseStatus.errorCode.c_str(), responseStatus.errorMsg.c_str());
  76. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("initmk failed: %s", errMsg.GetData());
  77. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, errMsg.GetData());
  78. }
  79. else {
  80. //服务端返回成功再将数据写入AcessAuthourization.ini
  81. CSmartPointer<IConfigInfo> pConfig;
  82. auto rc = m_entity->GetFunction()->OpenConfig(Config_Run, pConfig);
  83. rc = pConfig->WriteConfigValue("TerminalPD", "PrivateKey", m_entity->m_privateKey);
  84. if (rc != Error_Succeed) {
  85. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("write pri key failed.");
  86. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, "私钥写入失败,请重新初始化。");
  87. return;
  88. }
  89. if (m_entity->HasPinPad()) {
  90. const bool testResult = SP::Module::Restful::ExtractDataFromDebranchResponse(result.content, instanceAns);
  91. if (m_entity->LoadKeysToPinPadACS(tmkpair.second, instanceAns.TPK, instanceAns.EDK, instanceAns.keyIndex, instanceAns.tpkKeyCheck, instanceAns.edkKeyCheck) == Error_Succeed) {
  92. m_entity->EndInitMK(Error_Succeed, "");
  93. }
  94. else {
  95. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")("连接密码键盘异常");
  96. m_entity->EndInitMK(ERR_ACCESSAUTH_CONNECT_PINPAD, "密钥加载失败,请检查密码键盘连接。");//,待完善细化错误码oiltest
  97. }
  98. }
  99. else {
  100. m_entity->EndInitMK(Error_Succeed, "");
  101. }
  102. }
  103. }
  104. else {
  105. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("post wk failed: %s", result.WhatError().c_str());
  106. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, CSimpleStringA::Format("初始化服务连接失败。%s", result.WhatError().c_str()).GetData());
  107. }
  108. }
  109. };
  110. struct GetTermSysInfoTask : ITaskSp
  111. {
  112. CAccessAuthEntity* m_entity;
  113. GetTermSysInfoTask(CAccessAuthEntity* entity) :m_entity(entity) {}
  114. void Process()
  115. {
  116. m_entity->GetHardWareInfo();
  117. }
  118. };
  119. typedef struct _REG_TZI_FORMAT
  120. {
  121. LONG Bias;
  122. LONG StandardBias;
  123. LONG DaylightBias;
  124. SYSTEMTIME StandardDate;
  125. SYSTEMTIME DaylightDate;
  126. } REG_TZI_FORMAT;
  127. void CAccessAuthSession::Handle_Regist(SpOnewayCallContext<AccessAuthService_Regist_Info>::Pointer ctx)
  128. {
  129. DbgToBeidou(ctx->link, __FUNCTION__)();
  130. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_Regist");
  131. m_pEntity->Regist();
  132. }
  133. void CAccessAuthSession::Handle_UpdateWK(SpOnewayCallContext<AccessAuthService_UpdateWK_Info>::Pointer ctx)
  134. {
  135. DbgToBeidou(ctx->link, __FUNCTION__)();
  136. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_UpdateWK");
  137. m_pEntity->UpdateWK();
  138. }
  139. void CAccessAuthSession::Handle_InitializeNew(SpReqAnsContext<AccessAuthService_InitializeNew_Req, AccessAuthService_InitializeNew_Ans>::Pointer ctx)
  140. {
  141. DbgToBeidou(ctx->link, __FUNCTION__)();
  142. DbgWithLink(LOG_LEVEL_INFO, ctx->link.checkEmpty() ? LOG_TYPE_SYSTEM : LOG_TYPE_USER).setAPI(__FUNCTION__)("Handle_InitializeNew");
  143. m_pEntity->m_ctx = ctx;
  144. m_pEntity->m_strUserID = ctx->Req.strUserID.GetData();
  145. m_pEntity->m_strPassword = ctx->Req.strPassword.GetData();
  146. m_pEntity->BeginInitMKACS();
  147. }
  148. void CAccessAuthSession::Handle_InitDev(SpReqAnsContext<AccessAuthService_InitDev_Req, AccessAuthService_InitDev_Ans>::Pointer ctx)
  149. {
  150. DbgToBeidou(ctx->link, __FUNCTION__)();
  151. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_InitDev");
  152. m_pEntity->InitDevice(ctx);
  153. }
  154. void CAccessAuthSession::Handle_GetNetMsg(SpReqAnsContext<AccessAuthService_GetNetMsg_Req, AccessAuthService_GetNetMsg_Ans>::Pointer ctx)
  155. {
  156. DbgToBeidou(ctx->link, __FUNCTION__)();
  157. m_pEntity->GetNetMsg(ctx);
  158. }
  159. void CAccessAuthEntity::OnStarted()
  160. {
  161. //设置时区为北京标准时区
  162. if (!SetLocalTimeZoneByKeyName("China Standard Time", FALSE))
  163. {
  164. m_FSM.doWarnMsg(ERR_ACCESSAUTH_SETTIMEZONE,GetOutPutStr("%s%s","设置时区错误","False").c_str());
  165. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5202")(GetOutPutStr("%s%s", "设置时区错误", "False").c_str());
  166. }
  167. m_FSM.Init(this);
  168. CSimpleStringA strErrMsg;
  169. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  170. memset(&m_info,0, sizeof(CSystemStaticInfo));
  171. auto rc = GetFunction()->GetSystemStaticInfo(m_info);
  172. if (rc != Error_Succeed)
  173. {
  174. strErrMsg = "GetSystemStaticInfo fail";
  175. SetAuthErrMsg((const char*)strErrMsg);
  176. m_FSM.doWarnMsg(ERR_ACCESSAUTH_GET_SYSTEM_STATIC_INFO,
  177. GetOutPutStr("%s%08X", "获取系统静态信息错误", rc).c_str(), strErrMsg.GetData());
  178. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)(GetOutPutStr("%s%08X", "获取系统静态信息错误", rc).c_str());
  179. }
  180. CSmartPointer<GetTermSysInfoTask> getTermSysInfoTask = new GetTermSysInfoTask(this);
  181. GetFunction()->PostThreadPoolTask(getTermSysInfoTask.GetRawPointer());
  182. }
  183. void CAccessAuthEntity::OnPreStart(CAutoArray<CSimpleStringA> strArgs,CSmartPointer<ITransactionContext> pTransactionContext)
  184. {
  185. ErrorCodeEnum Error = Error_Succeed;
  186. pTransactionContext->SendAnswer(Error) ;
  187. }
  188. void CAccessAuthEntity::OnPreClose(EntityCloseCauseEnum eCloseCause,CSmartPointer<ITransactionContext> pTransactionContext)
  189. {
  190. m_FSM.PostExitEvent();
  191. pTransactionContext->SendAnswer(Error_Succeed);
  192. }
  193. void CAccessAuthEntity::OnSysVarEvent(const char *pszKey, const char *pszValue,const char *pszOldValue,const char *pszEntityName)
  194. {
  195. }
  196. // 开始准入
  197. ErrorCodeEnum CAccessAuthEntity::Regist()
  198. {
  199. m_FSM.PostEventFIFO(new FSMEvent(CAccessAuthFSM::Event_StartRegist));
  200. return Error_Succeed;
  201. }
  202. string CAccessAuthEntity::ByteArrayToHexStr(BYTE *pBuf, int nBufLen)
  203. {
  204. char szBuf[1024];
  205. memset(szBuf, 0, sizeof(szBuf));
  206. for(int i=0; i<nBufLen; i++)
  207. {
  208. BYTE b1 = (pBuf[i] >> 4) & 0x0F;
  209. BYTE b2 = pBuf[i] & 0x0F;
  210. if (b1 <= 9)
  211. szBuf[i*2] = '0' + b1;
  212. else
  213. szBuf[i*2] = 'A' + b1 - 10;
  214. if (b2 <= 9)
  215. szBuf[i*2+1] = '0' + b2;
  216. else
  217. szBuf[i*2+1] = 'A' + b2 - 10;
  218. }
  219. return szBuf;
  220. }
  221. // 生成临时SM2密钥对
  222. DWORD CAccessAuthEntity::CreateSM2KeyPair(CBlob &pubKey, CBlob &priKey)
  223. {
  224. int nPubKeyLen = 256;
  225. int nPriKeyLen = 256;
  226. pubKey.Alloc(nPubKeyLen);
  227. priKey.Alloc(nPriKeyLen);
  228. if (!::CreateSM2KeyPair((BYTE*)(pubKey.m_pData), &nPubKeyLen, (BYTE*)(priKey.m_pData), &nPriKeyLen))
  229. {
  230. SetAuthErrMsg("创建SM2密钥对失败");
  231. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  232. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CREATE_RSA_KEY_PAIR,
  233. GetOutPutStr("%s%s","CreateRsaKeyPair","False").c_str(), true, "创建SM2密钥对失败");
  234. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("创建SM2密钥对失败");
  235. return ERR_ACCESSAUTH_CREATE_RSA_KEY_PAIR;
  236. }
  237. pubKey.Resize(nPubKeyLen);
  238. priKey.Resize(nPriKeyLen);
  239. return Error_Succeed;
  240. }
  241. // 保存到令牌管理实体中
  242. DWORD CAccessAuthEntity::SaveSM2KeyPair(const CBlob &pubKey, const CBlob &priKey)
  243. {
  244. LOG_FUNCTION();
  245. CSimpleStringA strErrMsg;
  246. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  247. TokenService_ClientBase *pTokenServiceClient = new TokenService_ClientBase(this);
  248. DWORD rc = pTokenServiceClient->Connect();
  249. if (rc != Error_Succeed)
  250. {
  251. strErrMsg = "连接令牌管理实体失败";
  252. SetAuthErrMsg(strErrMsg.GetData());
  253. rc = ERR_ACCESSAUTH_CONNECT_TOKEN_SERVICE;
  254. m_FSM.doWarnMsg(rc,
  255. "连接令牌管理实体失败", true);
  256. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5206")
  257. (GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", strErrMsg.GetData()).c_str());
  258. pTokenServiceClient->SafeDelete();
  259. }
  260. else
  261. {
  262. TokenService_SetKeyPair_Req req;
  263. req.pub_key = pubKey;
  264. req.pri_key = priKey;
  265. TokenService_SetKeyPair_Ans ans;
  266. rc = pTokenServiceClient->SetKeyPair(req, ans, 3000);
  267. pTokenServiceClient->GetFunction()->CloseSession();
  268. if (rc != Error_Succeed)
  269. {
  270. strErrMsg = "保存密钥对失败";
  271. SetAuthErrMsg(strErrMsg.GetData());
  272. rc = ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_KEYS;
  273. m_FSM.doWarnMsg(rc,
  274. "保存密钥对失败", true);
  275. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5207")
  276. (GetOutPutStr("%s%08X%s%s", "SetKeyPair", rc, "strErrMsg", strErrMsg.GetData()).c_str());
  277. }
  278. }
  279. return rc;
  280. }
  281. ErrorCodeEnum CAccessAuthEntity::SaveTokenAndSharedSK(const CBlob &token, const CBlob &sharedSK)
  282. {
  283. LOG_FUNCTION();
  284. CSimpleStringA strErrMsg;
  285. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  286. TokenService_ClientBase *pTokenServiceClient = new TokenService_ClientBase(this);
  287. ErrorCodeEnum rc = pTokenServiceClient->Connect();
  288. if (rc != Error_Succeed)
  289. {
  290. strErrMsg = "连接令牌管理实体失败";
  291. SetAuthErrMsg(strErrMsg.GetData());
  292. string outStr = GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", strErrMsg.GetData());
  293. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_TOKEN_SERVICE, outStr.c_str());
  294. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  295. pTokenServiceClient->SafeDelete();
  296. }
  297. else
  298. {
  299. TokenService_SetToken_Req req = {};
  300. req.token = token;
  301. TokenService_SetToken_Ans ans;
  302. rc = pTokenServiceClient->SetToken(req, ans, 5000);
  303. if (rc == Error_Succeed)
  304. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM).setAPI("SetToken")
  305. ("save token succ, token: [%s]", ByteArrayToHexStr((BYTE*)token.m_pData, token.m_iLength).c_str());
  306. else
  307. {
  308. strErrMsg = "保存令牌失败";
  309. SetAuthErrMsg(strErrMsg.GetData());
  310. string outStr = GetOutPutStr("%s%08X%s%s", "SetToken", rc, "strErrMsg", strErrMsg.GetData());
  311. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_TOKEN, outStr.c_str());
  312. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  313. }
  314. TokenService_SetSharedSK_Req req2 = {};
  315. req2.ssk = sharedSK;
  316. TokenService_SetSharedSK_Ans ans2 = {};
  317. rc = pTokenServiceClient->SetSharedSK(req2, ans2, 5000);
  318. if (rc != Error_Succeed)
  319. {
  320. strErrMsg = "保存会话密钥失败";
  321. SetAuthErrMsg(strErrMsg.GetData());
  322. string outStr = GetOutPutStr("%s%08X%s%s", "SetSharedSK", rc, "strErrMsg", strErrMsg.GetData());
  323. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_SHAREKEY, outStr.c_str());
  324. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  325. }
  326. pTokenServiceClient->GetFunction()->CloseSession();
  327. }
  328. return rc;
  329. }
  330. bool CAccessAuthEntity::HasPinPad()
  331. {
  332. CSimpleStringA strErrMsg;
  333. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  334. //oilyang@20210514
  335. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  336. {
  337. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("MachineType[%s], not exist pinpad", m_info.strMachineType.GetData());
  338. return false;
  339. }
  340. else
  341. {
  342. // 其它VTM机型,全部有内置密码键盘
  343. return true;
  344. }
  345. }
  346. // 1:3des only; 2: sm4 only; 3: both 3des and sm4
  347. // 由当前已初始化的密钥文件决定,兼容旧版本终端
  348. int CAccessAuthEntity::GetPinPadCapability()
  349. {
  350. LOG_FUNCTION();
  351. int nCapability = 0;
  352. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  353. return nCapability;
  354. PinPadService_ClientBase *pPinPad = new PinPadService_ClientBase(this);
  355. auto rc = pPinPad->Connect();
  356. if (rc == Error_Succeed)
  357. {
  358. PinPadService_QueryFunc_Req req;
  359. PinPadService_QueryFunc_Ans ans;
  360. rc = pPinPad->QueryFunc(req, ans, 3000);
  361. if (rc == Error_Succeed)
  362. {
  363. nCapability = ans.encryptkey;
  364. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("QueryFunc from pinpad succ, nCapability[%d]", nCapability);
  365. }
  366. else if (rc != Error_DevNotAvailable)
  367. {
  368. SetAuthErrMsg("从PinPad获取主密钥类型失败");
  369. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  370. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_PINPAD,
  371. GetOutPutStr("%s%s%s%s", "QueryFunc", "False", "AuthErrMsg", "从PinPad获取主密钥类型失败").c_str());
  372. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5205")
  373. (GetOutPutStr("%s%s%s%s", "QueryFunc", "False", "AuthErrMsg", "从PinPad获取主密钥类型失败").c_str());
  374. }
  375. pPinPad->GetFunction()->CloseSession();
  376. }
  377. else
  378. {
  379. SetAuthErrMsg("连接PinPad实体失败");
  380. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  381. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_PINPAD,
  382. GetOutPutStr("%s%08X%s%s", "Connect", rc,"AuthErrMsg", "连接PinPad实体失败").c_str());
  383. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(GetOutPutStr("%s%08X%s%s", "Connect", rc, "AuthErrMsg", "连接PinPad实体失败").c_str());
  384. pPinPad->SafeDelete();
  385. }
  386. return nCapability;
  387. }
  388. void CAccessAuthEntity::printPasswdError(const string& strErrMsg){
  389. SetAuthErrMsg(strErrMsg.c_str());
  390. GetFunction()->SetSysVar("AuthErrMsg", strErrMsg.c_str(), true);
  391. m_FSM.doWarnMsg( ERROR_ACCESSAUTH_OPENCRYPTCONTEXT, strErrMsg.c_str(),true, strErrMsg);
  392. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA520C")(strErrMsg.c_str());
  393. }
  394. int Char2Int(char * ch) {
  395. int num = 0;
  396. for (int i = 0;i < strlen(ch);i++) {
  397. num += ((int)(ch[i] - '0')) * pow((float)10, (float)(strlen(ch) - i - 1));
  398. }
  399. return num;
  400. }
  401. bool CAccessAuthEntity::SaveAuthKey(BYTE *pKey)
  402. {
  403. memset(m_AuthSessionKey, 0, 140);
  404. CSimpleStringA runInfoPath, iniPath;
  405. auto rc = GetFunction()->GetPath("runinfo", runInfoPath);
  406. if (rc != Error_Succeed) {
  407. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("GetPath runinfo error=%d.", rc);
  408. return false;
  409. }
  410. char privateKey[BUF_SIZE] = { 0 };
  411. iniPath = runInfoPath + SPLIT_SLASH_STR "runcfg" SPLIT_SLASH_STR "AccessAuthorization.ini";
  412. char* tmp = inifile_read_str(iniPath.GetData(), "TerminalPD", "PrivateKey", "");
  413. strcpy(privateKey, tmp);
  414. delete tmp;
  415. if (strlen(privateKey) <= 0) {
  416. iniPath = runInfoPath + SPLIT_SLASH_STR "runcfg" SPLIT_SLASH_STR "Initializer.ini";
  417. char* tmp2 = inifile_read_str(iniPath.GetData(), "TerminalPD", "PrivateKey", "");
  418. strcpy(privateKey, tmp2);
  419. delete tmp2;
  420. if (strlen(privateKey) <= 0)
  421. {
  422. printPasswdError("私钥为空,请重置秘钥进行初始化");
  423. return false;
  424. }
  425. }
  426. int decodedPrivateKeyLen;
  427. char* pDecodedPrivateKey = Hex2Str(privateKey, decodedPrivateKeyLen);
  428. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("privateKey len:%d, decodedPrivateKeyLen=%d", strlen(privateKey), decodedPrivateKeyLen);
  429. char pDecryptPrivateKey[BUF_SIZE] = { 0 };
  430. int decryprtLen = BUF_SIZE;
  431. if (!DecWithSM4_ECB("s5da69gnh4!963@6s5da69gnh4!963@6", (BYTE*)pDecodedPrivateKey, decodedPrivateKeyLen, (BYTE*)pDecryptPrivateKey, &decryprtLen)) {
  432. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("DecWithSM4_ECB decrypt privateKey error. SM4解密私钥失败");
  433. printPasswdError("终端初始化未完成,请重置秘钥进行初始化");
  434. delete[] pDecodedPrivateKey;
  435. return false;
  436. }
  437. delete[] pDecodedPrivateKey;
  438. char pPlainKey[KEY_SIZE];
  439. int plainKeyLen = KEY_SIZE;
  440. char pKeyLen[4] = { 0 };
  441. memcpy(pKeyLen, pKey, 4);
  442. int kenLen = Char2Int(pKeyLen);
  443. char* pEncodeKey = Str2Hex((char*)pKey, kenLen + 4);
  444. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("kenLen=%d", kenLen);
  445. delete pEncodeKey;
  446. char* key = new char[kenLen + 1];
  447. memset(key, 0, kenLen + 1);
  448. memcpy(key, pKey + 4, kenLen);
  449. if (!DecWithSM2PriKey((BYTE*)key, kenLen, (BYTE*)pPlainKey, &plainKeyLen, (BYTE*)pDecryptPrivateKey, decryprtLen)) {
  450. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("使用私钥解密失败!");
  451. printPasswdError("终端初始化未完成,请重置秘钥进行初始化");
  452. return false;
  453. }
  454. if (plainKeyLen != KEY_SIZE) {
  455. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setAPI("SaveAuthVerAndKey")("私钥解密后的会话密钥长度不等于16!");
  456. }
  457. memcpy(m_AuthSessionKey, pPlainKey, KEY_SIZE);
  458. return true;
  459. }
  460. static BYTE* ConvertHexStrToBytes(const char *pszStr)
  461. {
  462. if (pszStr == NULL || strlen(pszStr) == 0)
  463. return NULL;
  464. int nLen = strlen(pszStr) / 2;
  465. BYTE *pRet = (BYTE*)malloc(nLen);
  466. memset(pRet, 0, nLen);
  467. for (int i = 0; i < nLen; i++)
  468. {
  469. int nTmp(0);
  470. if (sscanf(&pszStr[i * 2], "%2X", &nTmp) != 1)
  471. {
  472. free(pRet);
  473. return NULL;
  474. }
  475. pRet[i] = (BYTE)nTmp;
  476. }
  477. return pRet;
  478. }
  479. // 使用密钥加密
  480. ErrorCodeEnum CAccessAuthEntity::EncryptDataWithKey(const CBlob &raw, CBlob &enc, BYTE* key)
  481. {
  482. LOG_FUNCTION();
  483. //这里不需要delete,由CBlob析构函数去执行
  484. BYTE* pEncData = new BYTE[1024];
  485. int pEncDataSize = 1024;
  486. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pEncDataSize=%d", pEncDataSize);
  487. char* pPlainInfo = Str2Hex((char*)raw.m_pData, raw.m_iLength);
  488. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("raw Length=%d", raw.m_iLength);
  489. delete[] pPlainInfo;
  490. if (!EncWithSM4_ECB(key, (BYTE*)(raw.m_pData), raw.m_iLength, pEncData, &pEncDataSize)) {
  491. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("会话密钥加密准入信息失败!");
  492. SetAuthErrMsg("会话密钥加密准入信息失败");
  493. return Error_Unexpect;
  494. }
  495. enc.Attach(pEncData,pEncDataSize);
  496. char* tmp = Str2Hex((char*)pEncData, pEncDataSize);
  497. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pEncData size:%d", pEncDataSize);
  498. delete[] tmp;
  499. tmp = Str2Hex((char*)enc.m_pData, enc.m_iLength);
  500. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("EncWithSM4_ECB data size:%d", enc.m_iLength);
  501. delete[] tmp;
  502. return Error_Succeed;
  503. }
  504. static char* ConvertBytesToHexStr(BYTE *pBuf, int nLen)
  505. {
  506. char *pRet = (char*)malloc(nLen * 2 + 1);
  507. memset(pRet, 0, nLen * 2 + 1);
  508. char *p = pRet;
  509. for (int i = 0; i < nLen; i++)
  510. {
  511. BYTE b = pBuf[i];
  512. BYTE l = (b >> 4) & 0x0F;
  513. if (l >= 10)
  514. *p = l - 10 + 'A';
  515. else
  516. *p = l + '0';
  517. p++;
  518. BYTE r = b & 0x0F;
  519. if (r >= 10)
  520. *p = r - 10 + 'A';
  521. else
  522. *p = r + '0';
  523. p++;
  524. }
  525. return pRet;
  526. }
  527. // 生成RSA密钥对,并导出公钥
  528. bool CAccessAuthEntity::GetTerminalPublicKey(BYTE* pBuf, int& nBufLen, string& pubkey)
  529. {
  530. LOG_FUNCTION();
  531. CSimpleString runInfoPath;
  532. auto rc = GetFunction()->GetPath("runinfo", runInfoPath);
  533. if (rc != Error_Succeed) {
  534. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("GetPath runinfo error=%d.", rc);
  535. return false;
  536. }
  537. runInfoPath += SPLIT_SLASH_STR "runcfg" SPLIT_SLASH_STR;
  538. #ifdef RVC_OS_WIN
  539. DWORD dwAttr = GetFileAttributes(runInfoPath.GetData());
  540. if (dwAttr == 0xFFFFFFFF) //目录不存在则创建
  541. {
  542. if (!CreateDirectory(runInfoPath.GetData(), NULL))
  543. {
  544. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Create %s dir failed!", runInfoPath.GetData());
  545. }
  546. }
  547. #else
  548. if (!dir_is_exist(runInfoPath.GetData()))
  549. {
  550. if (dir_create(runInfoPath.GetData()) != 0)
  551. {
  552. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Create %s dir failed!", runInfoPath.GetData());
  553. }
  554. }
  555. #endif // RVC_OS_WIN
  556. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Dir=%s", runInfoPath.GetData());
  557. CSmartPointer<IConfigInfo> pConfig;
  558. rc = GetFunction()->OpenConfig(Config_Run, pConfig);
  559. if (rc != Error_Succeed) {
  560. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("OpenConfig Config_Run error=%d.", rc);
  561. return false;
  562. }
  563. CSimpleString publicKey;
  564. rc = pConfig->ReadConfigValue("TerminalPD", "PublicKey", publicKey);
  565. if (rc != Error_Succeed || publicKey.IsNullOrEmpty()) {
  566. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("ReadConfig publicKey error=%d or publicKey is NULL.", rc);
  567. }
  568. BYTE btPublicKey[BUF_SIZE] = { 0 }, btPrivateKey[BUF_SIZE] = { 0 };
  569. int iPublicKeyLen = sizeof(btPublicKey);
  570. int iPrivateKeyLen = sizeof(btPrivateKey);
  571. if (!::CreateSM2KeyPair(btPublicKey, &iPublicKeyLen, btPrivateKey, &iPrivateKeyLen)) {
  572. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Create SM2 key pair error.");
  573. return false;
  574. }
  575. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("iPublicKeyLen=%d,iPrivateKeyLen=%d", iPublicKeyLen, iPrivateKeyLen);
  576. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("[btPublicKey=%s]", (char*)btPublicKey);
  577. char* pEncode = Str2Hex((char*)btPublicKey, iPublicKeyLen);
  578. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pEncode=%s,%d", pEncode, strlen(pEncode));
  579. /*rc = pConfig->WriteConfigValue("TerminalPD", "PublicKey", pEncode);
  580. assert(rc == Error_Succeed);*/
  581. m_publicKey = pEncode;
  582. pubkey = pEncode;
  583. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("write public key success.");
  584. BYTE pCryptPrivateKey[BUF_SIZE] = { 0 };
  585. int cryptPrivateKeyLen = BUF_SIZE;
  586. if (!EncWithSM4_ECB("s5da69gnh4!963@6s5da69gnh4!963@6", btPrivateKey, iPrivateKeyLen, pCryptPrivateKey, &cryptPrivateKeyLen)) {
  587. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("sm4 crypt privateKey error.");
  588. /*rc = pConfig->WriteConfigValue("TerminalPD", "PublicKey", "");*/
  589. m_publicKey = "";
  590. delete[] pEncode;
  591. return false;
  592. }
  593. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("sm4 encrypt pri key success.");
  594. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("cryptPrivateKeyLen=%d", cryptPrivateKeyLen);
  595. char* pEncodedCryptPrivateKey = Str2Hex((char*)pCryptPrivateKey, cryptPrivateKeyLen);
  596. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("encode pri key success.");
  597. m_privateKey = pEncodedCryptPrivateKey;
  598. /*//不在这里写入私钥,将逻辑修改到函数外部,等服务端返回成功后再写入私钥
  599. rc = pConfig->WriteConfigValue("TerminalPD", "PrivateKey", pEncodedCryptPrivateKey);
  600. if (rc != Error_Succeed) {
  601. rc = pConfig->WriteConfigValue("TerminalPD", "PublicKey", "");
  602. delete[] pEncodedCryptPrivateKey;
  603. return false;
  604. }
  605. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("write pri key success.");*/
  606. publicKey = pEncode;
  607. delete[] pEncode;
  608. delete[] pEncodedCryptPrivateKey;
  609. char* pDecode = Hex2Str(publicKey.GetData(), nBufLen);
  610. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pDecode=[%s],len=%d", pDecode, nBufLen);
  611. memcpy(pBuf, pDecode, nBufLen);
  612. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pBuf[0]=%02X,nBufLen=%d", pBuf[0], nBufLen);
  613. return true;
  614. }
  615. ErrorCodeEnum CAccessAuthEntity::GetPinPadModel(CSimpleStringA& pinpadModel, bool& bPinPadOnline)
  616. {
  617. bPinPadOnline = false;
  618. int waitMS = 0;
  619. CSmartPointer<IConfigInfo> spConfig;
  620. ErrorCodeEnum Error = GetFunction()->OpenConfig(Config_CenterSetting, spConfig);
  621. ErrorCodeEnum errCode = spConfig->ReadConfigValueInt("AccessAuthorization", "WaitPinPadMS", waitPinPadMS);
  622. if (waitPinPadMS <= 0)
  623. {
  624. waitPinPadMS = DEFALT_WAIT_PINPAD_MS; //默认不等待
  625. }
  626. CSimpleStringA strErrMsg;
  627. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  628. std::map<std::string, std::string> errInfo;
  629. //oilyang@20210514
  630. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  631. {
  632. pinpadModel = "";
  633. return Error_Succeed;
  634. }
  635. ErrorCodeEnum nRet = Error_Unexpect;
  636. ErrorCodeEnum rc = Error_Unexpect;
  637. do
  638. {
  639. auto pPinPadClient = new PinPadService_ClientBase(this);
  640. if ((rc = pPinPadClient->Connect()) == Error_Succeed)
  641. {
  642. PinPadService_GetDevInfo_Req req = {};
  643. PinPadService_GetDevInfo_Ans ans = {};
  644. rc = pPinPadClient->GetDevInfo(req, ans, 3000);
  645. if (rc == Error_Succeed)
  646. {
  647. bPinPadOnline = true;
  648. nRet = Error_Succeed;
  649. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pinpad model: %s", ans.model.GetData());
  650. // CM = V2.0#PM = V1.0#MID = 75500001#PID = 12345678#FWID = V1234567#Vendor = nantian
  651. // 密码键盘ID,PID,8到16字节; 设备ID,MID,8到16字节; 固件版本号,FWID,8字节
  652. pinpadModel = ans.model;
  653. pPinPadClient->GetFunction()->CloseSession();
  654. pPinPadClient->SafeDelete();
  655. pPinPadClient = NULL;
  656. break;
  657. }
  658. pPinPadClient->GetFunction()->CloseSession();
  659. }
  660. pPinPadClient->SafeDelete();
  661. pPinPadClient = NULL;
  662. waitMS += INTERVAL_WAIT_PINPAD_MS;
  663. if (waitPinPadMS > 0) //配置有效时才进行等待,不然直接跳出循环
  664. {
  665. Sleep(INTERVAL_WAIT_PINPAD_MS); //等待200ms
  666. }
  667. }
  668. while (bPinPadOnline == false && waitMS < waitPinPadMS); //获取pinpad成功,或者时间超过阈值跳出
  669. if (rc == Error_NotInit)
  670. {
  671. strErrMsg = "PinPad超时未打开";
  672. SetAuthErrMsg(strErrMsg.GetData());
  673. string outStr = GetOutPutStr("%s%08X%s%s", "GetDevInfo", rc, "strErrMsg", strErrMsg.GetData());
  674. m_FSM.doWarnMsg(ERR_ACCESSAUTH_PINPAD_OPEN_OVERTIME, outStr.c_str());
  675. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")(outStr.c_str());
  676. errInfo["errcode"] = "RTA5204";
  677. errInfo["msg"] = "PinPad超时未打开";
  678. errInfo["getLastErr"] = GetLastError();
  679. pinpadModel = generateJsonStr(errInfo).second.c_str();
  680. }
  681. else if(rc == Error_DevNotAvailable)
  682. {
  683. strErrMsg = "PinPad打开失败";
  684. SetAuthErrMsg(strErrMsg.GetData());
  685. string outStr = GetOutPutStr("%s%08X%s%s", "GetDevInfo", rc, "strErrMsg", strErrMsg.GetData());
  686. m_FSM.doWarnMsg(ERR_ACCESSAUTH_PINPAD_OPEN_FAILED, outStr.c_str());
  687. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5218")(outStr.c_str());
  688. errInfo["errcode"] = "RTA5218";
  689. errInfo["msg"] = "PinPad打开失败";
  690. errInfo["getLastErr"] = GetLastError();
  691. pinpadModel = generateJsonStr(errInfo).second.c_str();
  692. }
  693. else if(rc != Error_Succeed)
  694. {
  695. strErrMsg = "连接PinPad取数据异常";
  696. SetAuthErrMsg(strErrMsg.GetData());
  697. string outStr = GetOutPutStr("%s%08X%s%s", "GetPinPadModel", rc, "strErrMsg", strErrMsg.GetData());
  698. m_FSM.doWarnMsg(ERR_ACCESSAUTH_PINPAD_GETDATA_FAILED, outStr.c_str());
  699. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5205")(outStr.c_str());
  700. errInfo["errcode"] = "RTA5205";
  701. errInfo["msg"] = "连接PinPad取数据异常";
  702. errInfo["getLastErr"] = GetLastError();
  703. pinpadModel = generateJsonStr(errInfo).second.c_str();
  704. }
  705. return nRet;
  706. }
  707. wstring CAccessAuthEntity::ANSIToUnicode(const string& str)
  708. {
  709. int len = 0;
  710. len = str.length();
  711. int unicodeLen = ::MultiByteToWideChar(CP_ACP,
  712. 0,
  713. str.c_str(),
  714. -1,
  715. NULL,
  716. 0);
  717. wchar_t * pUnicode;
  718. pUnicode = new wchar_t[unicodeLen+1];
  719. memset(pUnicode,0,(unicodeLen+1)*sizeof(wchar_t));
  720. ::MultiByteToWideChar( CP_ACP,
  721. 0,
  722. str.c_str(),
  723. -1,
  724. (LPWSTR)pUnicode,
  725. unicodeLen);
  726. wstring rt;
  727. rt = (wchar_t*)pUnicode;
  728. delete pUnicode;
  729. return rt;
  730. }
  731. //China Standard Time
  732. BOOL CAccessAuthEntity::SetLocalTimeZoneByKeyName(const TCHAR* szTimeZoneKeyName, BOOL isDaylightSavingTime)
  733. {
  734. #ifdef RVC_OS_WIN
  735. HKEY hKey;
  736. LONG ErrorCode;
  737. TCHAR szSubKey[256];
  738. TCHAR szStandardName[32];
  739. TCHAR szDaylightName[32];
  740. REG_TZI_FORMAT regTZI;
  741. DWORD dwByteLen;
  742. // 检测入口参数
  743. if ((szTimeZoneKeyName == NULL) || (strlen(szTimeZoneKeyName) == 0))
  744. {
  745. // 时区标识符不能为空
  746. return FALSE;
  747. }
  748. StringCchCopy(szSubKey, 256, TEXT("Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\"));
  749. StringCchCat(szSubKey, 256, szTimeZoneKeyName);
  750. ErrorCode = RegOpenKeyEx(HKEY_LOCAL_MACHINE, szSubKey, 0, KEY_QUERY_VALUE, &hKey);
  751. if (ErrorCode != ERROR_SUCCESS)
  752. {
  753. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegOpenKeyEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time fail");
  754. return FALSE;
  755. }
  756. // 标准名
  757. dwByteLen = sizeof(szStandardName);
  758. ErrorCode = RegQueryValueEx(hKey, TEXT("Std"), NULL, NULL, reinterpret_cast<LPBYTE>(&szStandardName), &dwByteLen);
  759. if (ErrorCode != ERROR_SUCCESS)
  760. {
  761. RegCloseKey(hKey);
  762. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\Std fail");
  763. return FALSE;
  764. }
  765. // 夏时制名
  766. dwByteLen = sizeof(szDaylightName);
  767. ErrorCode = RegQueryValueEx(hKey, TEXT("Dlt"), NULL, NULL, reinterpret_cast<LPBYTE>(&szDaylightName), &dwByteLen);
  768. if (ErrorCode != ERROR_SUCCESS)
  769. {
  770. RegCloseKey(hKey);
  771. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\Dlt fail");
  772. return FALSE;
  773. }
  774. // 时区信息
  775. dwByteLen = sizeof(regTZI);
  776. ErrorCode = RegQueryValueEx(hKey, TEXT("TZI"), NULL, NULL, reinterpret_cast<LPBYTE>(&regTZI), &dwByteLen);
  777. RegCloseKey(hKey);
  778. if ((ErrorCode != ERROR_SUCCESS) || (dwByteLen > sizeof(regTZI)))
  779. {
  780. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\TZI fail");
  781. return FALSE;
  782. }
  783. // 开启权限
  784. HANDLE hToken;
  785. TOKEN_PRIVILEGES tkp;
  786. BOOL isOK;
  787. if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &hToken))
  788. {
  789. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("OpenProcessToken Standard Time\\Dlt fail");
  790. return FALSE;
  791. }
  792. LookupPrivilegeValue(NULL, SE_TIME_ZONE_NAME, &tkp.Privileges[0].Luid);
  793. tkp.PrivilegeCount = 1;
  794. tkp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
  795. AdjustTokenPrivileges(hToken, FALSE, &tkp, 0, (PTOKEN_PRIVILEGES)NULL, 0);
  796. if (GetLastError() != ERROR_SUCCESS)
  797. {
  798. CloseHandle(hToken);
  799. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("AdjustTokenPrivileges fail");
  800. return FALSE;
  801. }
  802. // 设置新时区
  803. DYNAMIC_TIME_ZONE_INFORMATION tzi;
  804. tzi.Bias = regTZI.Bias;
  805. tzi.StandardDate = regTZI.StandardDate;
  806. tzi.StandardBias = regTZI.StandardBias;
  807. tzi.DaylightDate = regTZI.DaylightDate;
  808. tzi.DaylightBias = regTZI.DaylightBias;
  809. tzi.DynamicDaylightTimeDisabled = !isDaylightSavingTime;
  810. wcscpy(tzi.StandardName, ANSIToUnicode(szStandardName).c_str());
  811. wcscpy(tzi.DaylightName, ANSIToUnicode(szDaylightName).c_str());
  812. wcscpy(tzi.TimeZoneKeyName, ANSIToUnicode(szTimeZoneKeyName).c_str());
  813. isOK = SetDynamicTimeZoneInformation(&tzi); // 设置动态时区
  814. if (!isOK)
  815. {
  816. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("SetDynamicTimeZoneInformation fail");
  817. }
  818. // 关闭权限
  819. tkp.Privileges[0].Attributes = 0;
  820. AdjustTokenPrivileges(hToken, FALSE, &tkp, 0, (PTOKEN_PRIVILEGES)NULL, 0);
  821. CloseHandle(hToken);
  822. return isOK;
  823. #else
  824. //temporarily not relased at linux
  825. return TRUE;
  826. #endif // RVC_OS_WIN
  827. }
  828. bool CAccessAuthEntity::IsMachineTypeConfigurePinPad(CSimpleStringA strMachineType)
  829. {
  830. CSmartPointer<IConfigInfo> spConfig;
  831. ErrorCodeEnum Error = GetFunction()->OpenConfig(Config_CenterSetting, spConfig);
  832. CSimpleStringA mcType = CSimpleStringA("CoreBootList.") + strMachineType;
  833. CSimpleStringA loaderConifg("");
  834. ErrorCodeEnum errCode = spConfig->ReadConfigValue("VtmLoader", mcType.GetData(), loaderConifg);
  835. if (errCode != Error_Succeed)
  836. {
  837. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("Get VtmLoader config failed!");
  838. }
  839. if (string(loaderConifg.GetData()).find("PinPad") != string::npos) //集中配置配了启动pinpad实体
  840. {
  841. return true;
  842. }
  843. else
  844. {
  845. return false;
  846. }
  847. }
  848. void CAccessAuthEntity::UpdateWK()
  849. {
  850. m_FSM.UpdateWK();
  851. }
  852. void CAccessAuthEntity::BeginInitMKACS()
  853. {
  854. LOG_FUNCTION();
  855. // 1:3des only; 2: sm4 only; 3: both 3des and sm4
  856. int nCapability = GetPinPadCapability();
  857. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pinpad capability: %d", nCapability);
  858. CSmartPointer<IConfigInfo> spConfig;
  859. ErrorCodeEnum Error = GetFunction()->OpenConfig(Config_CenterSetting, spConfig);
  860. if (Error_Succeed == Error)
  861. {
  862. Error = spConfig->ReadConfigValue("AccessAuthorization", "HostInitUrl", m_strInitUrl);
  863. if (Error_Succeed != Error)
  864. {
  865. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("get InitUrl from CenterSetting failed");
  866. return;
  867. }
  868. } else {
  869. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("open InitUrl from CenterSetting.ini failed");
  870. return;
  871. }
  872. CSmartPointer<InitializerInitMKTask> initUpdateWKTask = new InitializerInitMKTask(&this->m_FSM, this);
  873. GetFunction()->PostThreadPoolTask(initUpdateWKTask.GetRawPointer());
  874. }
  875. bool CAccessAuthEntity::SendInitMKReqACS(CInitlizerMKReq& initMKReq)
  876. {
  877. LOG_FUNCTION();
  878. CSmartPointer<IEntityFunction> pFunc = GetFunction();
  879. ErrorCodeEnum nRet = Error_Unexpect;
  880. CBlob encInfo;
  881. char* hexStr = "21009872C31CBC00D0C8F421D09CF707";
  882. BYTE key[KEY_SIZE] = { 0 };
  883. memcpy(key, ConvertHexStrToBytes(hexStr), KEY_SIZE);
  884. //char key[KEY_SIZE] = { 0 };
  885. //memcpy(key, "1234567890123456234", KEY_SIZE);
  886. nRet = (ErrorCodeEnum)m_FSM.GetEncTerminalInfoWithKey(encInfo, key);
  887. if (nRet != Error_Succeed)
  888. {
  889. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("GetEncTerminalInfo failed:%d", nRet);
  890. return false;
  891. }
  892. char* pTmp = Str2Hex((char*)encInfo.m_pData, encInfo.m_iLength);
  893. initMKReq.iniTerminalInfo = pTmp;
  894. CSystemStaticInfo si;
  895. pFunc->GetSystemStaticInfo(si);
  896. initMKReq.terminalVersion = si.InstallVersion.ToString();
  897. initMKReq.terminalNo = si.strTerminalID.GetData();
  898. BYTE xPublicKey[148];
  899. int nBufLen = sizeof(xPublicKey);
  900. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("SendInitMKReqACS")("开始获取公钥。。。");
  901. memset(xPublicKey, 0, nBufLen);
  902. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("SendInitMKReqACS")("nBufLen=%d", nBufLen);
  903. if (!GetTerminalPublicKey(xPublicKey, nBufLen, initMKReq.publicKey))
  904. {
  905. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_PUBKEY,
  906. GetOutPutStr("%s%s", "GetTerminalPublicKey", "False").c_str());
  907. return false;
  908. }
  909. initMKReq.user = m_strUserID.GetData();
  910. if (!m_strUserID.IsNullOrEmpty() && !m_strPassword.IsNullOrEmpty())
  911. {
  912. LogWarn(Severity_Low, Error_Succeed, AccessAuthorization_UserErrorCode_Init_From_ClosePage, "Init by ClosePage.");
  913. initMKReq.loginWay = 1;
  914. }
  915. else
  916. {
  917. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("no need to call login again as User Desktop have logined.");
  918. initMKReq.loginWay = 0;
  919. }
  920. PinPadService_ClientBase* pPinPad = new PinPadService_ClientBase(this);
  921. auto errRc = pPinPad->Connect();
  922. if (errRc == Error_Succeed)
  923. {
  924. PinPadService_GetCheckCode_Req req = {};
  925. PinPadService_GetCheckCode_Ans ans = {};
  926. req.mSN.Init(1);
  927. req.wSN.Init(1);
  928. req.mSN[0] = 1;
  929. req.wSN[0] = 0;
  930. errRc = (*pPinPad)(EntityResource::getLink().upgradeLink())->GetCheckCode(req, ans, 10000);
  931. if (errRc == Error_Succeed)
  932. {
  933. initMKReq.curTpkKeyCheck = ans.checkcode[0].GetData();
  934. initMKReq.curKeyIndex = ans.index[0].GetData();
  935. }
  936. else
  937. {
  938. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("Get keyChek && keyIndex failed.");
  939. }
  940. pPinPad->GetFunction()->CloseSession();
  941. }
  942. else
  943. {
  944. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("connect to pinpad failed.error code:%d", errRc);
  945. }
  946. return true;
  947. }
  948. void CAccessAuthEntity::EndInitMK(DWORD rc, const char *pszErrMsg)
  949. {
  950. LOG_FUNCTION();
  951. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setLogCode(AccessAuthService_LogCode_InitializeNew)
  952. ("EndInitMK:rc:%d,errMsg:%s", rc, pszErrMsg);
  953. GetFunction()->KillTimer(22);
  954. m_strLastErrMsg = pszErrMsg;
  955. if (rc != Error_Succeed)
  956. {
  957. LogWarn(Severity_Middle, Error_Unexpect, rc,
  958. GetOutPutStr("%s%08X%s%s", "EndInitMK", rc,"pszErrMsg", pszErrMsg).c_str());
  959. GetFunction()->ShowFatalError(pszErrMsg);
  960. }
  961. else
  962. {
  963. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("初始化成功。。。");
  964. }
  965. m_eErrNum = rc;
  966. bool bSuc = rc == Error_Succeed;
  967. // 通知UI窗口
  968. if (m_ctx != NULL) {
  969. m_ctx->Ans.Errcode = rc;
  970. m_ctx->Ans.ErrMsg = m_strLastErrMsg;
  971. m_ctx->Answer(Error_Succeed);
  972. }
  973. }
  974. ErrorCodeEnum CAccessAuthEntity::LoadKeysToPinPadACS(string TMK, string TPK, string EDK, string index, string tpkCheck, string edkCheck)
  975. {
  976. LOG_FUNCTION();
  977. //加载到密码键盘
  978. PinPadService_ClientBase* pPinPad = new PinPadService_ClientBase(this);
  979. auto rc = pPinPad->Connect();
  980. if (rc == Error_Succeed)
  981. {
  982. PinPadService_LoadKeysSM_Req req = {};
  983. req.initializeflag = true;
  984. req.smflag = 1;
  985. req.masterkey = TMK.c_str();
  986. req.workingkey1 = TPK.c_str();
  987. req.workingkey2 = EDK.c_str();
  988. req.reserved3 = index.c_str();
  989. req.reserved4 = tpkCheck.c_str();
  990. if (!req.initializeflag) DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("LoadKeysToPinPadACS")("initializeflag is false");
  991. PinPadService_LoadKeysSM_Ans ans = {};
  992. rc = pPinPad->LoadKeysSM(req, ans, 30000);
  993. if (rc != Error_Succeed)
  994. {
  995. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("load sm key to pinpad failed.");
  996. return Error_Unexpect;
  997. }
  998. pPinPad->GetFunction()->CloseSession();
  999. }
  1000. else
  1001. {
  1002. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("connect to pinpad failed %x", rc);
  1003. return Error_Unexpect;
  1004. }
  1005. return Error_Succeed;
  1006. }
  1007. DWORD CAccessAuthEntity::InitDevice(SpReqAnsContext<AccessAuthService_InitDev_Req, AccessAuthService_InitDev_Ans>::Pointer& ctx)
  1008. {
  1009. return m_FSM.InitDevice(ctx);
  1010. }
  1011. void CAccessAuthEntity::GetNetMsg(SpReqAnsContext<AccessAuthService_GetNetMsg_Req, AccessAuthService_GetNetMsg_Ans>::Pointer& ctx)
  1012. {
  1013. m_FSM.GetNetMsg(ctx);
  1014. return;
  1015. }
  1016. bool CAccessAuthEntity::GenerateRandomNum()
  1017. {
  1018. LOG_FUNCTION();
  1019. const int MAX_KEY_SIZE = 256;
  1020. //get public key-->send random number --> set working key
  1021. int ret1, ret2, ret3, ret4;
  1022. unsigned int ram[4];
  1023. #ifdef RVC_OS_WIN
  1024. ret1 = rand_s(&ram[0]);
  1025. ret2 = rand_s(&ram[1]);
  1026. ret3 = rand_s(&ram[2]);
  1027. ret4 = rand_s(&ram[3]);
  1028. if ((ret1 != 0) || (ret2 != 0) || (ret3 != 0) || (ret4 != 0))
  1029. return false;
  1030. ZeroMemory(m_btRam, 16);
  1031. #else
  1032. ram[0] = rand();
  1033. ram[1] = rand();
  1034. ram[2] = rand();
  1035. ram[3] = rand();
  1036. memset(m_btRam, 0, 16);
  1037. #endif // RVC_OS_WIN
  1038. for (int i = 0, j = 0; j < 4; ++j)
  1039. {
  1040. m_btRam[i + 0] = ((ram[j] & 0xff000000) >> 24);
  1041. m_btRam[i + 1] = ((ram[j] & 0x00ff0000) >> 16);
  1042. m_btRam[i + 2] = ((ram[j] & 0x0000ff00) >> 8);
  1043. m_btRam[i + 3] = (ram[j] & 0x000000ff);
  1044. i += 4;
  1045. }
  1046. return true;
  1047. }
  1048. pair<string, string> CAccessAuthEntity::GenerateTmkToKMC()
  1049. {
  1050. LOG_FUNCTION();
  1051. if (!GenerateRandomNum())
  1052. return make_pair("", "");
  1053. #ifdef DEVOPS_ON_ST /*DevOps流水线编译,ST环境*/
  1054. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  1055. #elif defined(DEVOPS_ON_UAT)/*DevOps流水线编译,UAT环境*/
  1056. CSimpleStringA tmpPubKey = "040AEC50A1FC9C5E9B1162FE4520C9E18E6F471A3F6DB77B147F0A464B5BFD0EDBE08AE8377C458CA204456E7A86568AAA9240F1C843E47988A6A197B232539DC8";
  1057. #elif defined(DEVOPS_ON_PRD)/*DevOps流水线编译,PRD环境*/
  1058. CSimpleStringA tmpPubKey = "04E0A4FDA2484A1A0FAB0844F59110AEB7A08D314B5E451E816FC0E78CBA383B461474E1167B86FC48D704CB482DD5164A73AB9E019CCE26EE382B89C394B5ACE1";
  1059. #elif defined(DEVOPS_ON_DEV)/*DevOps流水线编译,Dev环境*/
  1060. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  1061. #else/*本地编译等非DevOps环境编译的版本*/
  1062. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  1063. #endif
  1064. return EncryptedByPubKey(tmpPubKey);
  1065. }
  1066. pair<string, string> CAccessAuthEntity::EncryptedByPubKey(CSimpleStringA pubKey, bool bNeed04Head)
  1067. {
  1068. LOG_FUNCTION();
  1069. if (pubKey.GetLength() <= 0)
  1070. return make_pair("", "");
  1071. PCHAR strRam = new CHAR[512];
  1072. memset(strRam, 0, 512);
  1073. memcpy(strRam, &(m_btRam[0]), 16);
  1074. HexBuf2StrBuf((PBYTE)m_btRam, &strRam, 16);
  1075. const int MAX_KEY_SIZE = 256;
  1076. char random_enc_bypbk[MAX_KEY_SIZE];
  1077. memset(random_enc_bypbk, 0, MAX_KEY_SIZE);
  1078. //公钥加密随机数
  1079. int outMsgLen = MAX_KEY_SIZE;
  1080. PBYTE pxxKey = new BYTE[256];
  1081. PBYTE pOldPubKey = new BYTE[256];
  1082. memset(pOldPubKey, 0, 256);
  1083. memset(pxxKey, 0, 256);
  1084. int size = StrBuf2HexBuf(pubKey.GetData(), &pOldPubKey);
  1085. if (bNeed04Head)
  1086. {
  1087. pxxKey[0] = 0x04;
  1088. memcpy(pxxKey + 1, pOldPubKey, size);
  1089. }
  1090. else
  1091. memcpy(pxxKey, pOldPubKey, 65);
  1092. int retSM2 = EncWithSM2PubKey((unsigned char*)m_btRam, 16, (unsigned char*)random_enc_bypbk, &outMsgLen, (unsigned char*)pxxKey, 65);
  1093. if (!retSM2 || outMsgLen != 113)
  1094. {
  1095. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("EncWithSM2PubKey failed outMsgLen:%d.", outMsgLen);
  1096. return make_pair("", "");
  1097. }
  1098. PBYTE tmp_enc_bypbk = new BYTE[112];
  1099. memset(tmp_enc_bypbk, 0, 112);
  1100. if (bNeed04Head)
  1101. {
  1102. memcpy(tmp_enc_bypbk, &(random_enc_bypbk[1]), 112);
  1103. }
  1104. else
  1105. {
  1106. memcpy(tmp_enc_bypbk, &(random_enc_bypbk[1]), 64);
  1107. memcpy(tmp_enc_bypbk + 64, &(random_enc_bypbk[97]), 16);
  1108. memcpy(tmp_enc_bypbk + 80, &(random_enc_bypbk[65]), 32);
  1109. }
  1110. PCHAR pBlock = new CHAR[512];
  1111. memset(pBlock, 0, 512);
  1112. BYTE tmpRandomEnc[512];
  1113. memset(tmpRandomEnc, 0, 512);
  1114. memcpy(tmpRandomEnc, &(tmp_enc_bypbk[0]), outMsgLen - 1);
  1115. size = HexBuf2StrBuf((PBYTE)tmpRandomEnc, &pBlock, 112);
  1116. return make_pair(pBlock, strRam);
  1117. }
  1118. void CAccessAuthEntity::GetHardWareInfo()
  1119. {
  1120. std::map<std::string, std::string> errInfo;
  1121. //oilyang@20231008 to get system info from runcfg first
  1122. //no matter calculating from runcfg succeed or not,we also get system info from system api for update runcfg
  1123. bool bGetFromRunCfg = false;
  1124. CSimpleString csInfo, strErrMsg, strRet;
  1125. CSmartPointer<IConfigInfo> pConfigRun;
  1126. ErrorCodeEnum eErr = GetFunction()->OpenConfig(Config_Run, pConfigRun);
  1127. if (eErr == Error_Succeed && pConfigRun->ReadConfigValue("system", "info", csInfo) == Error_Succeed && !csInfo.IsNullOrEmpty()) {
  1128. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("read device info from runcfg: [%s]", csInfo.GetData());
  1129. CAutoArray<CSimpleStringA> sysInfo = csInfo.Split('|');
  1130. if (sysInfo.GetCount() == 3)
  1131. {
  1132. m_cpuId = sysInfo[0];
  1133. m_mainBoardId = sysInfo[1];
  1134. m_hardDiskId = sysInfo[2];
  1135. bGetFromRunCfg = true;
  1136. m_iGetTermSysInfo = 1;
  1137. }
  1138. else
  1139. {
  1140. m_iGetTermSysInfo = -1;
  1141. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setAPI("GetTerminalFingerPrint")("get sm3 hash as fingerprint fail");
  1142. }
  1143. }
  1144. else
  1145. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("GetTermSysInfo, OpenConfig Config_Run error=%d.", eErr);
  1146. #ifdef RVC_OS_LINUX
  1147. char szTmp[1024] = {};
  1148. string strTmp;
  1149. int nTmpBufLen = 1024;
  1150. CSimpleStringA runInfoPath;
  1151. auto rc = GetFunction()->GetPath("runinfo", runInfoPath);
  1152. if (rc != Error_Succeed) {
  1153. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("GetPath runinfo error=%d.", rc);
  1154. return;
  1155. }
  1156. runInfoPath += SPLIT_SLASH_STR "runcfg";
  1157. //CPU
  1158. if (!get_cpu_id_by_system(strTmp, runInfoPath.GetData()))
  1159. {
  1160. if (!bGetFromRunCfg)
  1161. {
  1162. errInfo["errcode"] = "RTA5213";
  1163. errInfo["msg"] = "调用系统api获取CPU序号失败";
  1164. errInfo["getLastErr"] = GetLastError();
  1165. m_cpuId = generateJsonStr(errInfo).second.c_str();
  1166. m_iGetTermSysInfo = -1;
  1167. }
  1168. strErrMsg = CSimpleStringA::Format("查询CPU ID失败,请重启机器并重新初始化");
  1169. SetAuthErrMsg((const char*)strErrMsg);
  1170. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1171. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1172. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5213")
  1173. (GetOutPutStr("%s%s", "Processor", "False").c_str());
  1174. return;
  1175. }
  1176. m_cpuId = strTmp.c_str();
  1177. strRet = strTmp.c_str();
  1178. strTmp.clear();
  1179. //主板
  1180. if (!get_board_serial_by_system(strTmp, runInfoPath.GetData()))
  1181. {
  1182. if (!bGetFromRunCfg)
  1183. {
  1184. errInfo["errcode"] = "RTA5214";
  1185. errInfo["msg"] = "调用系统api获取主板ID号失败";
  1186. errInfo["getLastErr"] = GetLastError();
  1187. m_mainBoardId = generateJsonStr(errInfo).second.c_str();
  1188. m_iGetTermSysInfo = -1;
  1189. }
  1190. strErrMsg = CSimpleStringA::Format("查询主板序列号失败, 请重启机器并重新初始化");
  1191. SetAuthErrMsg((const char*)strErrMsg);
  1192. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1193. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1194. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5214")
  1195. (GetOutPutStr("%s%s", "BaseBoard", "False").c_str());
  1196. return;
  1197. }
  1198. m_mainBoardId = strTmp.c_str();
  1199. strRet += "|";
  1200. strRet += strTmp.c_str();
  1201. //硬盘
  1202. vector<string> diskArr;
  1203. int errCode = 0;
  1204. if (!get_disk_serial_by_system(diskArr, errCode, runInfoPath.GetData()))
  1205. {
  1206. if (!bGetFromRunCfg)
  1207. {
  1208. errInfo["errcode"] = "RTA5215";
  1209. errInfo["msg"] = "调用系统api获取硬盘ID号失败";
  1210. errInfo["getLastErr"] = GetLastError();
  1211. m_hardDiskId = generateJsonStr(errInfo).second.c_str();
  1212. m_iGetTermSysInfo = -1;
  1213. }
  1214. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("get_disk_serial_by_system errCode:%d", errCode);
  1215. strErrMsg = CSimpleStringA::Format("查询磁盘序列号失败, 请重启机器并重新初始化");
  1216. SetAuthErrMsg((const char*)strErrMsg);
  1217. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1218. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1219. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5215")
  1220. (GetOutPutStr("%s%s", "DiskDrive", "False").c_str());
  1221. return;
  1222. }
  1223. strRet += "|";
  1224. strTmp = "";
  1225. vector<string>::iterator it = diskArr.begin();
  1226. while (it != diskArr.end()) {
  1227. strTmp += *it;
  1228. it++;
  1229. }
  1230. strRet += strTmp.c_str();
  1231. m_hardDiskId = strTmp.c_str();
  1232. #else
  1233. ULONGLONG ullStart = GetTickCount64();
  1234. char szTmp[1024] = {};
  1235. int nTmpBufLen = 1024;
  1236. if (!QueryWMIDevice(Processor, "ProcessorId", szTmp, &nTmpBufLen))
  1237. {
  1238. if (!bGetFromRunCfg)
  1239. {
  1240. errInfo["errcode"] = "RTA5213";
  1241. errInfo["msg"] = "调用系统api获取CPU序号失败";
  1242. errInfo["getLastErr"] = GetLastError();
  1243. m_cpuId = generateJsonStr(errInfo).second.c_str();
  1244. m_iGetTermSysInfo = -1;
  1245. }
  1246. strErrMsg = CSimpleStringA::Format("查询 cpu id 失败: %d, 请尝试重启应用", GetLastError());
  1247. SetAuthErrMsg((const char*)strErrMsg);
  1248. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1249. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1250. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5213")
  1251. (GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1252. return;
  1253. }
  1254. strRet = szTmp;
  1255. m_cpuId = szTmp;
  1256. nTmpBufLen = 1024;
  1257. memset(szTmp, 0, sizeof(szTmp));
  1258. if (!QueryWMIDevice(BaseBoard, "SerialNumber", szTmp, &nTmpBufLen))
  1259. {
  1260. if (!bGetFromRunCfg)
  1261. {
  1262. errInfo["errcode"] = "RTA5214";
  1263. errInfo["msg"] = "调用系统api获取主板ID号失败";
  1264. errInfo["getLastErr"] = GetLastError();
  1265. m_mainBoardId = generateJsonStr(errInfo).second.c_str();
  1266. m_iGetTermSysInfo = -1;
  1267. }
  1268. strErrMsg = CSimpleStringA::Format("查询 baseboard sn 失败: %d, 请尝试重启应用", GetLastError());
  1269. SetAuthErrMsg((const char*)strErrMsg);
  1270. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1271. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1272. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5214")
  1273. (GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1274. return;
  1275. }
  1276. strRet += "|";
  1277. strRet += szTmp;
  1278. m_mainBoardId = szTmp;
  1279. nTmpBufLen = 1024;
  1280. memset(szTmp, 0, sizeof(szTmp));
  1281. if (!QueryWMIDevice(DiskDrive, "SerialNumber", szTmp, &nTmpBufLen))
  1282. {
  1283. if (!bGetFromRunCfg)
  1284. {
  1285. errInfo["errcode"] = "RTA5215";
  1286. errInfo["msg"] = "调用系统api获取硬盘ID号失败";
  1287. errInfo["getLastErr"] = GetLastError();
  1288. m_hardDiskId = generateJsonStr(errInfo).second.c_str();
  1289. m_iGetTermSysInfo = -1;
  1290. }
  1291. strErrMsg = CSimpleStringA::Format("查询 harddisk sn 失败: %d, 请尝试重启应用", GetLastError());
  1292. SetAuthErrMsg((const char*)strErrMsg);
  1293. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1294. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "DiskDrive", GetLastError()).c_str());
  1295. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5215")
  1296. (GetOutPutStr("%s%s", "DiskDrive", "False").c_str());
  1297. return;
  1298. }
  1299. strRet += "|";
  1300. strRet += szTmp;
  1301. m_hardDiskId = szTmp;
  1302. ULONGLONG ullEnd = GetTickCount64();
  1303. if (ullEnd - ullStart > 5000)
  1304. {
  1305. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5201")
  1306. ("获取系统信息耗时过长:%d秒", (ullEnd - ullStart) / 1000);
  1307. LogWarn(Severity_Middle, Error_Unexpect, AccessAuthorization_UserErrorCode_GetTermCostTooLong,
  1308. CSimpleStringA::Format("获取系统信息耗时过长:%d秒", (ullEnd - ullStart) / 1000));
  1309. }
  1310. #endif // RVC_OS_LINUX
  1311. if (!bGetFromRunCfg || csInfo.Compare(strRet) != 0)
  1312. {
  1313. eErr = pConfigRun->WriteConfigValue("system", "info", strRet.GetData());
  1314. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("device info changed,before[%s],current[%s],write to runcfg:%d"
  1315. , csInfo.GetData(), strRet.GetData(), eErr);
  1316. }
  1317. else
  1318. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("device info: [%s]", strRet.GetData());
  1319. m_iGetTermSysInfo = 1;
  1320. return;
  1321. }
  1322. SP_BEGIN_ENTITY_MAP()
  1323. SP_ENTITY(CAccessAuthEntity)
  1324. SP_END_ENTITY_MAP()