mod_AccessAuth.cpp 49 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469
  1. #include "stdafx.h"
  2. #include "SpBase.h"
  3. #include "mod_AccessAuth.h"
  4. #include "RVCComm.h"
  5. #include "access_basefun.h"
  6. #include <fileutil.h>
  7. #include <iniutil.h>
  8. #include <cmath>
  9. #include "Event.h"
  10. #include "comm.h"
  11. #include "CommEntityRestful.hpp"
  12. #include "CommEntityUtil.hpp"
  13. #include "TokenKeeper_client_g.h"
  14. using namespace TokenKeeper;
  15. #include "PinPad_client_g.h"
  16. using namespace PinPad;
  17. #ifdef RVC_OS_WIN
  18. #include "WMIDeviceQuery.h"
  19. #include <WinCrypt.h>
  20. #include <Strsafe.h>
  21. #include "MyBase64.h"
  22. #endif
  23. struct InitializerInitMKTask : ITaskSp
  24. {
  25. CAccessAuthFSM* m_fsm;
  26. CAccessAuthEntity* m_entity;
  27. InitializerInitMKTask(CAccessAuthFSM* fsm, CAccessAuthEntity* entity) :m_fsm(fsm), m_entity(entity) {}
  28. void Process()
  29. {
  30. CSystemStaticInfo si;
  31. m_fsm->GetEntityBase()->GetFunction()->GetSystemStaticInfo(si);
  32. CInitlizerMKReq instanceReq;//oiltest dev module count
  33. bool initFlag = m_entity->SendInitMKReqACS(instanceReq);
  34. if (!initFlag)
  35. {
  36. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")("连接密码键盘异常");
  37. m_entity->EndInitMK(ERR_ACCESSAUTH_CONNECT_PINPAD, "连接密码键盘异常,请检查");//,待完善细化错误码oiltest
  38. return;
  39. }
  40. if (m_fsm->containsChinese(m_fsm->GetmAccessAuthHost().GetData()))
  41. {
  42. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, CSimpleStringA::Format("初始化服务连接失败,URL含中文。").GetData());
  43. return;
  44. }
  45. auto tmkpair = m_entity->GenerateTmkToKMC();
  46. instanceReq.encRandom = tmkpair.first;
  47. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("iniTerminalInfo: %s", instanceReq.iniTerminalInfo.c_str());
  48. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("auth:%s", instanceReq.auth.c_str());
  49. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curEdkKeyCheck: %s", instanceReq.curEdkKeyCheck.c_str());
  50. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curKeyIndex: %s", instanceReq.curKeyIndex.c_str());
  51. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curTpkKeyCheck: %s", instanceReq.curTpkKeyCheck.c_str());
  52. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("encRandom: %s", instanceReq.encRandom.c_str());
  53. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("publicKey: %s", instanceReq.publicKey.c_str());
  54. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("terminalNo: %s", instanceReq.terminalNo.c_str());
  55. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("terminalVersion: %s", instanceReq.terminalVersion.c_str());
  56. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("user: %s", instanceReq.user.c_str());
  57. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("loginWay: %d", instanceReq.loginWay);
  58. CInitlizerMKAns instanceAns;
  59. HttpClientResponseResult result;
  60. HttpClientRequestConfig config(HttpRequestMethod::POST, m_entity->GetInitUrl().GetData(), &SpGetToken);
  61. config.SetChildUri("/api/v6/initmk");
  62. SP::Module::Restful::FulfillRequestJsonBody(&config, instanceReq);
  63. RestfulClient client = RestfulClient::getInstance();
  64. PROCESS_LINK_CONTEXT("LR0402502Initmk");
  65. config.PreDo();
  66. client.Do(&config, &result, &nextLink);
  67. if (result.ResponseOK()) {
  68. SP::Module::Restful::CommResponseJson responseStatus;
  69. SP::Module::Restful::GetStatusFromDebranchResponse(result.content, responseStatus);
  70. if (!responseStatus.IsOperatedOK()) {
  71. CSimpleStringA errMsg = CSimpleStringA::Format("%s|%s", responseStatus.errorCode.c_str(), responseStatus.errorMsg.c_str());
  72. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("initmk failed: %s", errMsg.GetData());
  73. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, errMsg.GetData());
  74. }
  75. else {
  76. //服务端返回成功再将数据写入AcessAuthourization.ini
  77. CSmartPointer<IConfigInfo> pConfig;
  78. auto rc = m_entity->GetFunction()->OpenConfig(Config_Run, pConfig);
  79. rc = pConfig->WriteConfigValue("TerminalPD", "PrivateKey", m_entity->m_privateKey);
  80. if (rc != Error_Succeed) {
  81. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("write pri key failed.");
  82. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, "私钥写入失败,请重新初始化。");
  83. return;
  84. }
  85. if (m_entity->HasPinPad()) {
  86. const bool testResult = SP::Module::Restful::ExtractDataFromDebranchResponse(result.content, instanceAns);
  87. if (m_entity->LoadKeysToPinPadACS(tmkpair.second, instanceAns.TPK, instanceAns.EDK, instanceAns.keyIndex, instanceAns.tpkKeyCheck, instanceAns.edkKeyCheck) == Error_Succeed) {
  88. m_entity->EndInitMK(Error_Succeed, "");
  89. }
  90. else {
  91. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")("连接密码键盘异常");
  92. m_entity->EndInitMK(ERR_ACCESSAUTH_CONNECT_PINPAD, "密钥加载失败,请检查密码键盘连接。");//,待完善细化错误码oiltest
  93. }
  94. }
  95. else {
  96. m_entity->EndInitMK(Error_Succeed, "");
  97. }
  98. }
  99. }
  100. else {
  101. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("post wk failed: %s", result.WhatError().c_str());
  102. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, CSimpleStringA::Format("初始化服务连接失败。%s", result.WhatError().c_str()).GetData());
  103. }
  104. }
  105. };
  106. struct GetTermSysInfoTask : ITaskSp
  107. {
  108. CAccessAuthEntity* m_entity;
  109. GetTermSysInfoTask(CAccessAuthEntity* entity) :m_entity(entity) {}
  110. void Process()
  111. {
  112. m_entity->GetHardWareInfo();
  113. }
  114. };
  115. typedef struct _REG_TZI_FORMAT
  116. {
  117. LONG Bias;
  118. LONG StandardBias;
  119. LONG DaylightBias;
  120. SYSTEMTIME StandardDate;
  121. SYSTEMTIME DaylightDate;
  122. } REG_TZI_FORMAT;
  123. void CAccessAuthSession::Handle_Regist(SpOnewayCallContext<AccessAuthService_Regist_Info>::Pointer ctx)
  124. {
  125. DbgToBeidou(ctx->link, __FUNCTION__)();
  126. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_Regist");
  127. m_pEntity->Regist();
  128. }
  129. void CAccessAuthSession::Handle_UpdateWK(SpOnewayCallContext<AccessAuthService_UpdateWK_Info>::Pointer ctx)
  130. {
  131. DbgToBeidou(ctx->link, __FUNCTION__)();
  132. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_UpdateWK");
  133. m_pEntity->UpdateWK();
  134. }
  135. void CAccessAuthSession::Handle_InitializeNew(SpReqAnsContext<AccessAuthService_InitializeNew_Req, AccessAuthService_InitializeNew_Ans>::Pointer ctx)
  136. {
  137. DbgToBeidou(ctx->link, __FUNCTION__)();
  138. DbgWithLink(LOG_LEVEL_INFO, ctx->link.checkEmpty() ? LOG_TYPE_SYSTEM : LOG_TYPE_USER).setAPI(__FUNCTION__)("Handle_InitializeNew");
  139. m_pEntity->m_ctx = ctx;
  140. m_pEntity->m_strUserID = ctx->Req.strUserID.GetData();
  141. m_pEntity->m_strPassword = ctx->Req.strPassword.GetData();
  142. m_pEntity->BeginInitMKACS();
  143. }
  144. void CAccessAuthSession::Handle_InitDev(SpReqAnsContext<AccessAuthService_InitDev_Req, AccessAuthService_InitDev_Ans>::Pointer ctx)
  145. {
  146. DbgToBeidou(ctx->link, __FUNCTION__)();
  147. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_InitDev");
  148. m_pEntity->InitDevice(ctx);
  149. }
  150. void CAccessAuthSession::Handle_GetNetMsg(SpReqAnsContext<AccessAuthService_GetNetMsg_Req, AccessAuthService_GetNetMsg_Ans>::Pointer ctx)
  151. {
  152. DbgToBeidou(ctx->link, __FUNCTION__)();
  153. m_pEntity->GetNetMsg(ctx);
  154. }
  155. void CAccessAuthEntity::OnStarted()
  156. {
  157. //设置时区为北京标准时区
  158. if (!SetLocalTimeZoneByKeyName("China Standard Time", FALSE))
  159. {
  160. m_FSM.doWarnMsg(ERR_ACCESSAUTH_SETTIMEZONE,GetOutPutStr("%s%s","设置时区错误","False").c_str());
  161. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5202")(GetOutPutStr("%s%s", "设置时区错误", "False").c_str());
  162. }
  163. m_FSM.Init(this);
  164. CSimpleStringA strErrMsg;
  165. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  166. auto rc = GetFunction()->GetSystemStaticInfo(m_info);
  167. if (rc != Error_Succeed)
  168. {
  169. strErrMsg = "GetSystemStaticInfo fail";
  170. SetAuthErrMsg((const char*)strErrMsg);
  171. m_FSM.doWarnMsg(ERR_ACCESSAUTH_GET_SYSTEM_STATIC_INFO,
  172. GetOutPutStr("%s%08X", "获取系统静态信息错误", rc).c_str(), strErrMsg.GetData());
  173. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)(GetOutPutStr("%s%08X", "获取系统静态信息错误", rc).c_str());
  174. }
  175. CSmartPointer<GetTermSysInfoTask> getTermSysInfoTask = new GetTermSysInfoTask(this);
  176. GetFunction()->PostThreadPoolTask(getTermSysInfoTask.GetRawPointer());
  177. }
  178. void CAccessAuthEntity::OnPreStart(CAutoArray<CSimpleStringA> strArgs,CSmartPointer<ITransactionContext> pTransactionContext)
  179. {
  180. ErrorCodeEnum Error = Error_Succeed;
  181. pTransactionContext->SendAnswer(Error) ;
  182. }
  183. void CAccessAuthEntity::OnPreClose(EntityCloseCauseEnum eCloseCause,CSmartPointer<ITransactionContext> pTransactionContext)
  184. {
  185. m_FSM.PostExitEvent();
  186. pTransactionContext->SendAnswer(Error_Succeed);
  187. }
  188. void CAccessAuthEntity::OnSysVarEvent(const char *pszKey, const char *pszValue,const char *pszOldValue,const char *pszEntityName)
  189. {
  190. }
  191. // 开始准入
  192. ErrorCodeEnum CAccessAuthEntity::Regist()
  193. {
  194. m_FSM.PostEventFIFO(new FSMEvent(CAccessAuthFSM::Event_StartRegist));
  195. return Error_Succeed;
  196. }
  197. string CAccessAuthEntity::ByteArrayToHexStr(BYTE *pBuf, int nBufLen)
  198. {
  199. char szBuf[1024];
  200. memset(szBuf, 0, sizeof(szBuf));
  201. for(int i=0; i<nBufLen; i++)
  202. {
  203. BYTE b1 = (pBuf[i] >> 4) & 0x0F;
  204. BYTE b2 = pBuf[i] & 0x0F;
  205. if (b1 <= 9)
  206. szBuf[i*2] = '0' + b1;
  207. else
  208. szBuf[i*2] = 'A' + b1 - 10;
  209. if (b2 <= 9)
  210. szBuf[i*2+1] = '0' + b2;
  211. else
  212. szBuf[i*2+1] = 'A' + b2 - 10;
  213. }
  214. return szBuf;
  215. }
  216. // 生成临时SM2密钥对
  217. DWORD CAccessAuthEntity::CreateSM2KeyPair(CBlob &pubKey, CBlob &priKey)
  218. {
  219. int nPubKeyLen = 256;
  220. int nPriKeyLen = 256;
  221. pubKey.Alloc(nPubKeyLen);
  222. priKey.Alloc(nPriKeyLen);
  223. if (!::CreateSM2KeyPair((BYTE*)(pubKey.m_pData), &nPubKeyLen, (BYTE*)(priKey.m_pData), &nPriKeyLen))
  224. {
  225. SetAuthErrMsg("创建SM2密钥对失败");
  226. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  227. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CREATE_RSA_KEY_PAIR,
  228. GetOutPutStr("%s%s","CreateRsaKeyPair","False").c_str(), true, "创建SM2密钥对失败");
  229. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("创建SM2密钥对失败");
  230. return ERR_ACCESSAUTH_CREATE_RSA_KEY_PAIR;
  231. }
  232. pubKey.Resize(nPubKeyLen);
  233. priKey.Resize(nPriKeyLen);
  234. return Error_Succeed;
  235. }
  236. // 保存到令牌管理实体中
  237. DWORD CAccessAuthEntity::SaveSM2KeyPair(const CBlob &pubKey, const CBlob &priKey)
  238. {
  239. LOG_FUNCTION();
  240. CSimpleStringA strErrMsg;
  241. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  242. TokenService_ClientBase *pTokenServiceClient = new TokenService_ClientBase(this);
  243. DWORD rc = pTokenServiceClient->Connect();
  244. if (rc != Error_Succeed)
  245. {
  246. strErrMsg = "连接令牌管理实体失败";
  247. SetAuthErrMsg(strErrMsg.GetData());
  248. rc = ERR_ACCESSAUTH_CONNECT_TOKEN_SERVICE;
  249. m_FSM.doWarnMsg(rc,
  250. "连接令牌管理实体失败", true);
  251. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5206")
  252. (GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", strErrMsg.GetData()).c_str());
  253. pTokenServiceClient->SafeDelete();
  254. }
  255. else
  256. {
  257. TokenService_SetKeyPair_Req req;
  258. req.pub_key = pubKey;
  259. req.pri_key = priKey;
  260. TokenService_SetKeyPair_Ans ans;
  261. rc = pTokenServiceClient->SetKeyPair(req, ans, 3000);
  262. pTokenServiceClient->GetFunction()->CloseSession();
  263. if (rc != Error_Succeed)
  264. {
  265. strErrMsg = "保存密钥对失败";
  266. SetAuthErrMsg(strErrMsg.GetData());
  267. rc = ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_KEYS;
  268. m_FSM.doWarnMsg(rc,
  269. "保存密钥对失败", true);
  270. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5207")
  271. (GetOutPutStr("%s%08X%s%s", "SetKeyPair", rc, "strErrMsg", strErrMsg.GetData()).c_str());
  272. }
  273. }
  274. return rc;
  275. }
  276. ErrorCodeEnum CAccessAuthEntity::SaveTokenAndSharedSK(const CBlob &token, const CBlob &sharedSK)
  277. {
  278. LOG_FUNCTION();
  279. CSimpleStringA strErrMsg;
  280. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  281. TokenService_ClientBase *pTokenServiceClient = new TokenService_ClientBase(this);
  282. ErrorCodeEnum rc = pTokenServiceClient->Connect();
  283. if (rc != Error_Succeed)
  284. {
  285. strErrMsg = "连接令牌管理实体失败";
  286. SetAuthErrMsg(strErrMsg.GetData());
  287. string outStr = GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", strErrMsg.GetData());
  288. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_TOKEN_SERVICE, outStr.c_str());
  289. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  290. pTokenServiceClient->SafeDelete();
  291. }
  292. else
  293. {
  294. TokenService_SetToken_Req req = {};
  295. req.token = token;
  296. TokenService_SetToken_Ans ans;
  297. rc = pTokenServiceClient->SetToken(req, ans, 5000);
  298. if (rc == Error_Succeed)
  299. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM).setAPI("SetToken")
  300. ("save token succ, token: [%s]", ByteArrayToHexStr((BYTE*)token.m_pData, token.m_iLength).c_str());
  301. else
  302. {
  303. strErrMsg = "保存令牌失败";
  304. SetAuthErrMsg(strErrMsg.GetData());
  305. string outStr = GetOutPutStr("%s%08X%s%s", "SetToken", rc, "strErrMsg", strErrMsg.GetData());
  306. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_TOKEN, outStr.c_str());
  307. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  308. }
  309. TokenService_SetSharedSK_Req req2 = {};
  310. req2.ssk = sharedSK;
  311. TokenService_SetSharedSK_Ans ans2 = {};
  312. rc = pTokenServiceClient->SetSharedSK(req2, ans2, 5000);
  313. if (rc != Error_Succeed)
  314. {
  315. strErrMsg = "保存会话密钥失败";
  316. SetAuthErrMsg(strErrMsg.GetData());
  317. string outStr = GetOutPutStr("%s%08X%s%s", "SetSharedSK", rc, "strErrMsg", strErrMsg.GetData());
  318. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_SHAREKEY, outStr.c_str());
  319. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  320. }
  321. pTokenServiceClient->GetFunction()->CloseSession();
  322. }
  323. return rc;
  324. }
  325. bool CAccessAuthEntity::HasPinPad()
  326. {
  327. CSimpleStringA strErrMsg;
  328. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  329. //oilyang@20210514
  330. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  331. {
  332. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("MachineType[%s], not exist pinpad", m_info.strMachineType.GetData());
  333. return false;
  334. }
  335. else
  336. {
  337. // 其它VTM机型,全部有内置密码键盘
  338. return true;
  339. }
  340. }
  341. // 1:3des only; 2: sm4 only; 3: both 3des and sm4
  342. // 由当前已初始化的密钥文件决定,兼容旧版本终端
  343. int CAccessAuthEntity::GetPinPadCapability()
  344. {
  345. LOG_FUNCTION();
  346. int nCapability = 0;
  347. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  348. return nCapability;
  349. PinPadService_ClientBase *pPinPad = new PinPadService_ClientBase(this);
  350. auto rc = pPinPad->Connect();
  351. if (rc == Error_Succeed)
  352. {
  353. PinPadService_QueryFunc_Req req;
  354. PinPadService_QueryFunc_Ans ans;
  355. rc = pPinPad->QueryFunc(req, ans, 3000);
  356. if (rc == Error_Succeed)
  357. {
  358. nCapability = ans.encryptkey;
  359. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("QueryFunc from pinpad succ, nCapability[%d]", nCapability);
  360. }
  361. else if (rc != Error_DevNotAvailable)
  362. {
  363. SetAuthErrMsg("从PinPad获取主密钥类型失败");
  364. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  365. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_PINPAD,
  366. GetOutPutStr("%s%s%s%s", "QueryFunc", "False", "AuthErrMsg", "从PinPad获取主密钥类型失败").c_str());
  367. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5205")
  368. (GetOutPutStr("%s%s%s%s", "QueryFunc", "False", "AuthErrMsg", "从PinPad获取主密钥类型失败").c_str());
  369. }
  370. pPinPad->GetFunction()->CloseSession();
  371. }
  372. else
  373. {
  374. SetAuthErrMsg("连接PinPad实体失败");
  375. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  376. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_PINPAD,
  377. GetOutPutStr("%s%08X%s%s", "Connect", rc,"AuthErrMsg", "连接PinPad实体失败").c_str());
  378. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(GetOutPutStr("%s%08X%s%s", "Connect", rc, "AuthErrMsg", "连接PinPad实体失败").c_str());
  379. pPinPad->SafeDelete();
  380. }
  381. return nCapability;
  382. }
  383. void CAccessAuthEntity::printPasswdError(const string& strErrMsg){
  384. SetAuthErrMsg(strErrMsg.c_str());
  385. GetFunction()->SetSysVar("AuthErrMsg", strErrMsg.c_str());
  386. m_FSM.doWarnMsg( ERROR_ACCESSAUTH_OPENCRYPTCONTEXT, strErrMsg.c_str(),true, strErrMsg);
  387. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA520C")(strErrMsg.c_str());
  388. }
  389. bool CAccessAuthEntity::SaveAuthKey(BYTE *pKey)
  390. {
  391. memset(m_AuthSessionKey, 0, 140);
  392. CSimpleStringA runInfoPath, iniPath;
  393. auto rc = GetFunction()->GetPath("runinfo", runInfoPath);
  394. if (rc != Error_Succeed) {
  395. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("GetPath runinfo error=%d.", rc);
  396. return false;
  397. }
  398. char privateKey[BUF_SIZE] = { 0 };
  399. iniPath = runInfoPath + SPLIT_SLASH_STR "runcfg" SPLIT_SLASH_STR "AccessAuthorization.ini";
  400. char* tmp = inifile_read_str(iniPath.GetData(), "TerminalPD", "PrivateKey", "");
  401. strcpy(privateKey, tmp);
  402. delete tmp;
  403. if (strlen(privateKey) <= 0) {
  404. iniPath = runInfoPath + SPLIT_SLASH_STR "runcfg" SPLIT_SLASH_STR "Initializer.ini";
  405. char* tmp2 = inifile_read_str(iniPath.GetData(), "TerminalPD", "PrivateKey", "");
  406. strcpy(privateKey, tmp2);
  407. delete tmp2;
  408. if (strlen(privateKey) <= 0)
  409. {
  410. printPasswdError("私钥为空,请重置秘钥进行初始化");
  411. return false;
  412. }
  413. }
  414. int decodedPrivateKeyLen;
  415. char* pDecodedPrivateKey = SP::Module::Util::Hex2Str(privateKey, decodedPrivateKeyLen);
  416. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("privateKey len:%d, decodedPrivateKeyLen=%d", strlen(privateKey), decodedPrivateKeyLen);
  417. char pDecryptPrivateKey[BUF_SIZE] = { 0 };
  418. int decryprtLen = BUF_SIZE;
  419. if (!DecWithSM4_ECB("s5da69gnh4!963@6s5da69gnh4!963@6", (BYTE*)pDecodedPrivateKey, decodedPrivateKeyLen, (BYTE*)pDecryptPrivateKey, &decryprtLen)) {
  420. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("DecWithSM4_ECB decrypt privateKey error. SM4解密私钥失败");
  421. printPasswdError("终端初始化未完成,请重置秘钥进行初始化");
  422. delete[] pDecodedPrivateKey;
  423. return false;
  424. }
  425. delete[] pDecodedPrivateKey;
  426. char pPlainKey[KEY_SIZE];
  427. int plainKeyLen = KEY_SIZE;
  428. char pKeyLen[4] = { 0 };
  429. memcpy(pKeyLen, pKey, 4);
  430. int kenLen = SP::Module::Util::Char2Int(pKeyLen);
  431. char* pEncodeKey = SP::Module::Util::Str2Hex((char*)pKey, kenLen + 4);
  432. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("kenLen=%d", kenLen);
  433. delete [] pEncodeKey;
  434. char* key = new char[kenLen + 1];
  435. memset(key, 0, kenLen + 1);
  436. memcpy(key, pKey + 4, kenLen);
  437. if (!DecWithSM2PriKey((BYTE*)key, kenLen, (BYTE*)pPlainKey, &plainKeyLen, (BYTE*)pDecryptPrivateKey, decryprtLen)) {
  438. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("使用私钥解密失败!");
  439. printPasswdError("终端初始化未完成,请重置秘钥进行初始化");
  440. delete[] key;
  441. return false;
  442. }
  443. if (plainKeyLen != KEY_SIZE) {
  444. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setAPI("SaveAuthVerAndKey")("私钥解密后的会话密钥长度不等于16!");
  445. }
  446. memcpy(m_AuthSessionKey, pPlainKey, KEY_SIZE);
  447. delete[] key;
  448. return true;
  449. }
  450. // 使用密钥加密
  451. ErrorCodeEnum CAccessAuthEntity::EncryptDataWithKey(const CBlob &raw, CBlob &enc, BYTE* key)
  452. {
  453. LOG_FUNCTION();
  454. //这里不需要delete,由CBlob析构函数去执行
  455. BYTE* pEncData = new BYTE[1024];
  456. int pEncDataSize = 1024;
  457. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pEncDataSize=%d", pEncDataSize);
  458. char* pPlainInfo = SP::Module::Util::Str2Hex((char*)raw.m_pData, raw.m_iLength);
  459. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("raw Length=%d", raw.m_iLength);
  460. delete[] pPlainInfo;
  461. if (!EncWithSM4_ECB(key, (BYTE*)(raw.m_pData), raw.m_iLength, pEncData, &pEncDataSize)) {
  462. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("会话密钥加密准入信息失败!");
  463. SetAuthErrMsg("会话密钥加密准入信息失败");
  464. return Error_Unexpect;
  465. }
  466. enc.Attach(pEncData,pEncDataSize);
  467. char* tmp = SP::Module::Util::Str2Hex((char*)pEncData, pEncDataSize);
  468. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pEncData size:%d", pEncDataSize);
  469. delete[] tmp;
  470. tmp = SP::Module::Util::Str2Hex((char*)enc.m_pData, enc.m_iLength);
  471. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("EncWithSM4_ECB data size:%d", enc.m_iLength);
  472. delete[] tmp;
  473. return Error_Succeed;
  474. }
  475. // 生成RSA密钥对,并导出公钥
  476. bool CAccessAuthEntity::GetTerminalPublicKey(BYTE* pBuf, int& nBufLen, string& pubkey)
  477. {
  478. LOG_FUNCTION();
  479. CSimpleString runCfgPath(true);
  480. auto rc = GetFunction()->GetPath("RunCfg", runCfgPath);
  481. if (rc != Error_Succeed) {
  482. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("GetPath RunCfg error=%d.", rc);
  483. return false;
  484. }
  485. if (!ExistsDirA(runCfgPath)) {
  486. if (!CreateDirA(runCfgPath, TRUE))
  487. {
  488. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Create %s dir failed!", runCfgPath.GetData());
  489. }
  490. }
  491. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Dir=%s", runCfgPath.GetData());
  492. CSmartPointer<IConfigInfo> pConfig;
  493. rc = GetFunction()->OpenConfig(Config_Run, pConfig);
  494. if (rc != Error_Succeed) {
  495. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("OpenConfig Config_Run error=%d.", rc);
  496. return false;
  497. }
  498. CSimpleString publicKey;
  499. rc = pConfig->ReadConfigValue("TerminalPD", "PublicKey", publicKey);
  500. if (rc != Error_Succeed || publicKey.IsNullOrEmpty()) {
  501. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("ReadConfig publicKey error=%d or publicKey is NULL.", rc);
  502. }
  503. BYTE btPublicKey[BUF_SIZE] = { 0 }, btPrivateKey[BUF_SIZE] = { 0 };
  504. int iPublicKeyLen = sizeof(btPublicKey);
  505. int iPrivateKeyLen = sizeof(btPrivateKey);
  506. if (!::CreateSM2KeyPair(btPublicKey, &iPublicKeyLen, btPrivateKey, &iPrivateKeyLen)) {
  507. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Create SM2 key pair error.");
  508. return false;
  509. }
  510. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("iPublicKeyLen=%d,iPrivateKeyLen=%d", iPublicKeyLen, iPrivateKeyLen);
  511. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("[btPublicKey=%s]", (char*)btPublicKey);
  512. char* pEncode = SP::Module::Util::Str2Hex((char*)btPublicKey, iPublicKeyLen);
  513. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pEncode=%s,%d", pEncode, strlen(pEncode));
  514. m_publicKey = pEncode;
  515. pubkey = pEncode;
  516. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("write public key success.");
  517. BYTE pCryptPrivateKey[BUF_SIZE] = { 0 };
  518. int cryptPrivateKeyLen = BUF_SIZE;
  519. if (!EncWithSM4_ECB("s5da69gnh4!963@6s5da69gnh4!963@6", btPrivateKey, iPrivateKeyLen, pCryptPrivateKey, &cryptPrivateKeyLen)) {
  520. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("sm4 crypt privateKey error.");
  521. /*rc = pConfig->WriteConfigValue("TerminalPD", "PublicKey", "");*/
  522. m_publicKey = "";
  523. delete[] pEncode;
  524. return false;
  525. }
  526. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("sm4 encrypt pri key success.");
  527. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("cryptPrivateKeyLen=%d", cryptPrivateKeyLen);
  528. char* pEncodedCryptPrivateKey = SP::Module::Util::Str2Hex((char*)pCryptPrivateKey, cryptPrivateKeyLen);
  529. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("encode pri key success.");
  530. m_privateKey = pEncodedCryptPrivateKey;
  531. /*//不在这里写入私钥,将逻辑修改到函数外部,等服务端返回成功后再写入私钥
  532. rc = pConfig->WriteConfigValue("TerminalPD", "PrivateKey", pEncodedCryptPrivateKey);
  533. if (rc != Error_Succeed) {
  534. rc = pConfig->WriteConfigValue("TerminalPD", "PublicKey", "");
  535. delete[] pEncodedCryptPrivateKey;
  536. return false;
  537. }
  538. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("write pri key success.");*/
  539. publicKey = pEncode;
  540. delete[] pEncode;
  541. delete[] pEncodedCryptPrivateKey;
  542. char* pDecode = SP::Module::Util::Hex2Str(publicKey.GetData(), nBufLen);
  543. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pDecode=[%s],len=%d", pDecode, nBufLen);
  544. memcpy(pBuf, pDecode, nBufLen);
  545. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pBuf[0]=%02X,nBufLen=%d", pBuf[0], nBufLen);
  546. delete[] pDecode;
  547. return true;
  548. }
  549. ErrorCodeEnum CAccessAuthEntity::GetPinPadModel(CSimpleStringA& pinpadModel, bool& bPinPadOnline)
  550. {
  551. bPinPadOnline = false;
  552. int waitMS = 0;
  553. CSmartPointer<IConfigInfo> spConfig;
  554. ErrorCodeEnum Error = GetFunction()->OpenConfig(Config_CenterSetting, spConfig);
  555. ErrorCodeEnum errCode = spConfig->ReadConfigValueInt("AccessAuthorization", "WaitPinPadMS", waitPinPadMS);
  556. if (waitPinPadMS <= 0)
  557. {
  558. waitPinPadMS = DEFALT_WAIT_PINPAD_MS; //默认不等待
  559. }
  560. CSimpleStringA strErrMsg;
  561. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  562. std::map<std::string, std::string> errInfo;
  563. //oilyang@20210514
  564. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  565. {
  566. pinpadModel = "";
  567. return Error_Succeed;
  568. }
  569. ErrorCodeEnum nRet = Error_Unexpect;
  570. ErrorCodeEnum rc = Error_Unexpect;
  571. do
  572. {
  573. auto pPinPadClient = new PinPadService_ClientBase(this);
  574. if ((rc = pPinPadClient->Connect()) == Error_Succeed)
  575. {
  576. PinPadService_GetDevInfo_Req req = {};
  577. PinPadService_GetDevInfo_Ans ans = {};
  578. rc = pPinPadClient->GetDevInfo(req, ans, 3000);
  579. if (rc == Error_Succeed)
  580. {
  581. bPinPadOnline = true;
  582. nRet = Error_Succeed;
  583. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pinpad model: %s", ans.model.GetData());
  584. // CM = V2.0#PM = V1.0#MID = 75500001#PID = 12345678#FWID = V1234567#Vendor = nantian
  585. // 密码键盘ID,PID,8到16字节; 设备ID,MID,8到16字节; 固件版本号,FWID,8字节
  586. pinpadModel = ans.model;
  587. pPinPadClient->GetFunction()->CloseSession();
  588. pPinPadClient->SafeDelete();
  589. pPinPadClient = NULL;
  590. break;
  591. }
  592. pPinPadClient->GetFunction()->CloseSession();
  593. }
  594. pPinPadClient->SafeDelete();
  595. pPinPadClient = NULL;
  596. waitMS += INTERVAL_WAIT_PINPAD_MS;
  597. if (waitPinPadMS > 0) //配置有效时才进行等待,不然直接跳出循环
  598. {
  599. Sleep(INTERVAL_WAIT_PINPAD_MS); //等待200ms
  600. }
  601. }
  602. while (bPinPadOnline == false && waitMS < waitPinPadMS); //获取pinpad成功,或者时间超过阈值跳出
  603. if (rc == Error_NotInit)
  604. {
  605. strErrMsg = "PinPad超时未打开";
  606. SetAuthErrMsg(strErrMsg.GetData());
  607. string outStr = GetOutPutStr("%s%08X%s%s", "GetDevInfo", rc, "strErrMsg", strErrMsg.GetData());
  608. m_FSM.doWarnMsg(ERR_ACCESSAUTH_PINPAD_OPEN_OVERTIME, outStr.c_str());
  609. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")(outStr.c_str());
  610. errInfo["errcode"] = "RTA5204";
  611. errInfo["msg"] = "PinPad超时未打开";
  612. errInfo["getLastErr"] = to_string(GetLastError());
  613. pinpadModel = generateJsonStr(errInfo).second.c_str();
  614. }
  615. else if(rc == Error_DevNotAvailable)
  616. {
  617. strErrMsg = "PinPad打开失败";
  618. SetAuthErrMsg(strErrMsg.GetData());
  619. string outStr = GetOutPutStr("%s%08X%s%s", "GetDevInfo", rc, "strErrMsg", strErrMsg.GetData());
  620. m_FSM.doWarnMsg(ERR_ACCESSAUTH_PINPAD_OPEN_FAILED, outStr.c_str());
  621. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5218")(outStr.c_str());
  622. errInfo["errcode"] = "RTA5218";
  623. errInfo["msg"] = "PinPad打开失败";
  624. errInfo["getLastErr"] = to_string(GetLastError());
  625. pinpadModel = generateJsonStr(errInfo).second.c_str();
  626. }
  627. else if(rc != Error_Succeed)
  628. {
  629. strErrMsg = "连接PinPad取数据异常";
  630. SetAuthErrMsg(strErrMsg.GetData());
  631. string outStr = GetOutPutStr("%s%08X%s%s", "GetPinPadModel", rc, "strErrMsg", strErrMsg.GetData());
  632. m_FSM.doWarnMsg(ERR_ACCESSAUTH_PINPAD_GETDATA_FAILED, outStr.c_str());
  633. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5205")(outStr.c_str());
  634. errInfo["errcode"] = "RTA5205";
  635. errInfo["msg"] = "连接PinPad取数据异常";
  636. errInfo["getLastErr"] = to_string(GetLastError());
  637. pinpadModel = generateJsonStr(errInfo).second.c_str();
  638. }
  639. return nRet;
  640. }
  641. wstring CAccessAuthEntity::ANSIToUnicode(const string& str)
  642. {
  643. int len = 0;
  644. len = str.length();
  645. int unicodeLen = ::MultiByteToWideChar(CP_ACP,
  646. 0,
  647. str.c_str(),
  648. -1,
  649. NULL,
  650. 0);
  651. wchar_t * pUnicode;
  652. pUnicode = new wchar_t[unicodeLen+1];
  653. memset(pUnicode,0,(unicodeLen+1)*sizeof(wchar_t));
  654. ::MultiByteToWideChar( CP_ACP,
  655. 0,
  656. str.c_str(),
  657. -1,
  658. (LPWSTR)pUnicode,
  659. unicodeLen);
  660. wstring rt;
  661. rt = (wchar_t*)pUnicode;
  662. delete pUnicode;
  663. return rt;
  664. }
  665. //China Standard Time
  666. BOOL CAccessAuthEntity::SetLocalTimeZoneByKeyName(const TCHAR* szTimeZoneKeyName, BOOL isDaylightSavingTime)
  667. {
  668. #ifdef RVC_OS_WIN
  669. HKEY hKey;
  670. LONG ErrorCode;
  671. TCHAR szSubKey[256];
  672. TCHAR szStandardName[32];
  673. TCHAR szDaylightName[32];
  674. REG_TZI_FORMAT regTZI;
  675. DWORD dwByteLen;
  676. // 检测入口参数
  677. if ((szTimeZoneKeyName == NULL) || (strlen(szTimeZoneKeyName) == 0))
  678. {
  679. // 时区标识符不能为空
  680. return FALSE;
  681. }
  682. StringCchCopy(szSubKey, 256, TEXT("Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\"));
  683. StringCchCat(szSubKey, 256, szTimeZoneKeyName);
  684. ErrorCode = RegOpenKeyEx(HKEY_LOCAL_MACHINE, szSubKey, 0, KEY_QUERY_VALUE, &hKey);
  685. if (ErrorCode != ERROR_SUCCESS)
  686. {
  687. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegOpenKeyEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time fail");
  688. return FALSE;
  689. }
  690. // 标准名
  691. dwByteLen = sizeof(szStandardName);
  692. ErrorCode = RegQueryValueEx(hKey, TEXT("Std"), NULL, NULL, reinterpret_cast<LPBYTE>(&szStandardName), &dwByteLen);
  693. if (ErrorCode != ERROR_SUCCESS)
  694. {
  695. RegCloseKey(hKey);
  696. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\Std fail");
  697. return FALSE;
  698. }
  699. // 夏时制名
  700. dwByteLen = sizeof(szDaylightName);
  701. ErrorCode = RegQueryValueEx(hKey, TEXT("Dlt"), NULL, NULL, reinterpret_cast<LPBYTE>(&szDaylightName), &dwByteLen);
  702. if (ErrorCode != ERROR_SUCCESS)
  703. {
  704. RegCloseKey(hKey);
  705. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\Dlt fail");
  706. return FALSE;
  707. }
  708. // 时区信息
  709. dwByteLen = sizeof(regTZI);
  710. ErrorCode = RegQueryValueEx(hKey, TEXT("TZI"), NULL, NULL, reinterpret_cast<LPBYTE>(&regTZI), &dwByteLen);
  711. RegCloseKey(hKey);
  712. if ((ErrorCode != ERROR_SUCCESS) || (dwByteLen > sizeof(regTZI)))
  713. {
  714. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\TZI fail");
  715. return FALSE;
  716. }
  717. // 开启权限
  718. HANDLE hToken;
  719. TOKEN_PRIVILEGES tkp;
  720. BOOL isOK;
  721. if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &hToken))
  722. {
  723. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("OpenProcessToken Standard Time\\Dlt fail");
  724. return FALSE;
  725. }
  726. LookupPrivilegeValue(NULL, SE_TIME_ZONE_NAME, &tkp.Privileges[0].Luid);
  727. tkp.PrivilegeCount = 1;
  728. tkp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
  729. AdjustTokenPrivileges(hToken, FALSE, &tkp, 0, (PTOKEN_PRIVILEGES)NULL, 0);
  730. if (GetLastError() != ERROR_SUCCESS)
  731. {
  732. CloseHandle(hToken);
  733. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("AdjustTokenPrivileges fail");
  734. return FALSE;
  735. }
  736. // 设置新时区
  737. DYNAMIC_TIME_ZONE_INFORMATION tzi;
  738. tzi.Bias = regTZI.Bias;
  739. tzi.StandardDate = regTZI.StandardDate;
  740. tzi.StandardBias = regTZI.StandardBias;
  741. tzi.DaylightDate = regTZI.DaylightDate;
  742. tzi.DaylightBias = regTZI.DaylightBias;
  743. tzi.DynamicDaylightTimeDisabled = !isDaylightSavingTime;
  744. wcscpy(tzi.StandardName, ANSIToUnicode(szStandardName).c_str());
  745. wcscpy(tzi.DaylightName, ANSIToUnicode(szDaylightName).c_str());
  746. wcscpy(tzi.TimeZoneKeyName, ANSIToUnicode(szTimeZoneKeyName).c_str());
  747. isOK = SetDynamicTimeZoneInformation(&tzi); // 设置动态时区
  748. if (!isOK)
  749. {
  750. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("SetDynamicTimeZoneInformation fail");
  751. }
  752. // 关闭权限
  753. tkp.Privileges[0].Attributes = 0;
  754. AdjustTokenPrivileges(hToken, FALSE, &tkp, 0, (PTOKEN_PRIVILEGES)NULL, 0);
  755. CloseHandle(hToken);
  756. return isOK;
  757. #else
  758. //temporarily not relased at linux
  759. return TRUE;
  760. #endif // RVC_OS_WIN
  761. }
  762. bool CAccessAuthEntity::IsMachineTypeConfigurePinPad(const CSimpleStringA& strMachineType)
  763. {
  764. CSmartPointer<IConfigInfo> spConfig;
  765. GetFunction()->OpenConfig(Config_CenterSetting, spConfig);
  766. CSimpleStringA mcType = CSimpleStringA("CoreBootList.") + strMachineType;
  767. CSimpleStringA loaderConifg("");
  768. ErrorCodeEnum errCode = spConfig->ReadConfigValue("VtmLoader", mcType.GetData(), loaderConifg);
  769. if (errCode != Error_Succeed)
  770. {
  771. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("Get VtmLoader config failed!");
  772. }
  773. if (string(loaderConifg.GetData()).find("PinPad") != string::npos) //集中配置配了启动pinpad实体
  774. {
  775. return true;
  776. }
  777. else
  778. {
  779. return false;
  780. }
  781. }
  782. void CAccessAuthEntity::UpdateWK()
  783. {
  784. m_FSM.UpdateWK();
  785. }
  786. void CAccessAuthEntity::BeginInitMKACS()
  787. {
  788. LOG_FUNCTION();
  789. // 1:3des only; 2: sm4 only; 3: both 3des and sm4
  790. int nCapability = GetPinPadCapability();
  791. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pinpad capability: %d", nCapability);
  792. CSmartPointer<IConfigInfo> spConfig;
  793. ErrorCodeEnum Error = GetFunction()->OpenConfig(Config_CenterSetting, spConfig);
  794. if (Error_Succeed == Error)
  795. {
  796. Error = spConfig->ReadConfigValue("AccessAuthorization", "HostInitUrl", m_strInitUrl);
  797. if (Error_Succeed != Error)
  798. {
  799. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("get InitUrl from CenterSetting failed");
  800. return;
  801. }
  802. } else {
  803. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("open InitUrl from CenterSetting.ini failed");
  804. return;
  805. }
  806. CSmartPointer<InitializerInitMKTask> initUpdateWKTask = new InitializerInitMKTask(&this->m_FSM, this);
  807. GetFunction()->PostThreadPoolTask(initUpdateWKTask.GetRawPointer());
  808. }
  809. bool CAccessAuthEntity::SendInitMKReqACS(CInitlizerMKReq& initMKReq)
  810. {
  811. LOG_FUNCTION();
  812. CSmartPointer<IEntityFunction> pFunc = GetFunction();
  813. ErrorCodeEnum nRet = Error_Unexpect;
  814. CBlob encInfo;
  815. char* hexStr = "21009872C31CBC00D0C8F421D09CF707";
  816. BYTE key[KEY_SIZE] = { 0 };
  817. PBYTE btTmp(NULL);
  818. SP::Module::Util::StrBuf2HexBuf(hexStr, &btTmp);
  819. memcpy(key, btTmp, KEY_SIZE);
  820. if (btTmp != NULL) {
  821. delete[] btTmp;
  822. btTmp = NULL;
  823. }
  824. nRet = (ErrorCodeEnum)m_FSM.GetEncTerminalInfoWithKey(encInfo, key);
  825. if (nRet != Error_Succeed)
  826. {
  827. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("GetEncTerminalInfo failed:%d", nRet);
  828. return false;
  829. }
  830. char* pTmp = SP::Module::Util::Str2Hex((char*)encInfo.m_pData, encInfo.m_iLength);
  831. initMKReq.iniTerminalInfo = pTmp;
  832. delete[] pTmp;
  833. CSystemStaticInfo si;
  834. pFunc->GetSystemStaticInfo(si);
  835. initMKReq.terminalVersion = si.InstallVersion.ToString();
  836. initMKReq.terminalNo = si.strTerminalID.GetData();
  837. BYTE xPublicKey[148];
  838. int nBufLen = sizeof(xPublicKey);
  839. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("SendInitMKReqACS")("开始获取公钥。。。");
  840. memset(xPublicKey, 0, nBufLen);
  841. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("SendInitMKReqACS")("nBufLen=%d", nBufLen);
  842. if (!GetTerminalPublicKey(xPublicKey, nBufLen, initMKReq.publicKey))
  843. {
  844. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_PUBKEY,
  845. GetOutPutStr("%s%s", "GetTerminalPublicKey", "False").c_str());
  846. return false;
  847. }
  848. initMKReq.user = m_strUserID.GetData();
  849. if (!m_strUserID.IsNullOrEmpty() && !m_strPassword.IsNullOrEmpty())
  850. {
  851. LogWarn(Severity_Low, Error_Succeed, AccessAuthorization_UserErrorCode_Init_From_ClosePage, "Init by ClosePage.");
  852. initMKReq.loginWay = 1;
  853. }
  854. else
  855. {
  856. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("no need to call login again as User Desktop have logined.");
  857. initMKReq.loginWay = 0;
  858. }
  859. PinPadService_ClientBase* pPinPad = new PinPadService_ClientBase(this);
  860. auto errRc = pPinPad->Connect();
  861. if (errRc == Error_Succeed)
  862. {
  863. PinPadService_GetCheckCode_Req req = {};
  864. PinPadService_GetCheckCode_Ans ans = {};
  865. req.mSN.Init(1);
  866. req.wSN.Init(1);
  867. req.mSN[0] = 1;
  868. req.wSN[0] = 0;
  869. errRc = (*pPinPad)(EntityResource::getLink().upgradeLink())->GetCheckCode(req, ans, 10000);
  870. if (errRc == Error_Succeed)
  871. {
  872. initMKReq.curTpkKeyCheck = ans.checkcode[0].GetData();
  873. initMKReq.curKeyIndex = ans.index[0].GetData();
  874. }
  875. else
  876. {
  877. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("Get keyChek && keyIndex failed.");
  878. }
  879. pPinPad->GetFunction()->CloseSession();
  880. }
  881. else
  882. {
  883. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("connect to pinpad failed.error code:%d", errRc);
  884. }
  885. return true;
  886. }
  887. void CAccessAuthEntity::EndInitMK(DWORD rc, const char *pszErrMsg)
  888. {
  889. LOG_FUNCTION();
  890. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setLogCode(AccessAuthService_LogCode_InitializeNew)
  891. ("EndInitMK:rc:%d,errMsg:%s", rc, pszErrMsg);
  892. GetFunction()->KillTimer(22);
  893. m_strLastErrMsg = pszErrMsg;
  894. if (rc != Error_Succeed)
  895. {
  896. LogWarn(Severity_Middle, Error_Unexpect, rc,
  897. GetOutPutStr("%s%08X%s%s", "EndInitMK", rc,"pszErrMsg", pszErrMsg).c_str());
  898. GetFunction()->ShowFatalError(pszErrMsg);
  899. }
  900. else
  901. {
  902. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("初始化成功。。。");
  903. }
  904. m_eErrNum = rc;
  905. bool bSuc = rc == Error_Succeed;
  906. // 通知UI窗口
  907. if (m_ctx != NULL) {
  908. m_ctx->Ans.Errcode = rc;
  909. m_ctx->Ans.ErrMsg = m_strLastErrMsg;
  910. m_ctx->Answer(Error_Succeed);
  911. }
  912. }
  913. ErrorCodeEnum CAccessAuthEntity::LoadKeysToPinPadACS(string TMK, string TPK, string EDK, string index, string tpkCheck, string edkCheck)
  914. {
  915. LOG_FUNCTION();
  916. //加载到密码键盘
  917. PinPadService_ClientBase* pPinPad = new PinPadService_ClientBase(this);
  918. auto rc = pPinPad->Connect();
  919. if (rc == Error_Succeed)
  920. {
  921. PinPadService_LoadKeysSM_Req req = {};
  922. req.initializeflag = true;
  923. req.smflag = 1;
  924. req.masterkey = TMK.c_str();
  925. req.workingkey1 = TPK.c_str();
  926. req.workingkey2 = EDK.c_str();
  927. req.reserved3 = index.c_str();
  928. req.reserved4 = tpkCheck.c_str();
  929. if (!req.initializeflag) DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("LoadKeysToPinPadACS")("initializeflag is false");
  930. PinPadService_LoadKeysSM_Ans ans = {};
  931. rc = pPinPad->LoadKeysSM(req, ans, 30000);
  932. if (rc != Error_Succeed)
  933. {
  934. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("load sm key to pinpad failed.");
  935. return Error_Unexpect;
  936. }
  937. pPinPad->GetFunction()->CloseSession();
  938. }
  939. else
  940. {
  941. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("connect to pinpad failed %x", rc);
  942. return Error_Unexpect;
  943. }
  944. return Error_Succeed;
  945. }
  946. DWORD CAccessAuthEntity::InitDevice(SpReqAnsContext<AccessAuthService_InitDev_Req, AccessAuthService_InitDev_Ans>::Pointer& ctx)
  947. {
  948. return m_FSM.InitDevice(ctx);
  949. }
  950. void CAccessAuthEntity::GetNetMsg(SpReqAnsContext<AccessAuthService_GetNetMsg_Req, AccessAuthService_GetNetMsg_Ans>::Pointer& ctx)
  951. {
  952. m_FSM.GetNetMsg(ctx);
  953. return;
  954. }
  955. bool CAccessAuthEntity::GenerateRandomNum()
  956. {
  957. LOG_FUNCTION();
  958. const int MAX_KEY_SIZE = 256;
  959. //get public key-->send random number --> set working key
  960. int ret1, ret2, ret3, ret4;
  961. unsigned int ram[4];
  962. #ifdef RVC_OS_WIN
  963. ret1 = rand_s(&ram[0]);
  964. ret2 = rand_s(&ram[1]);
  965. ret3 = rand_s(&ram[2]);
  966. ret4 = rand_s(&ram[3]);
  967. if ((ret1 != 0) || (ret2 != 0) || (ret3 != 0) || (ret4 != 0))
  968. return false;
  969. ZeroMemory(m_btRam, 16);
  970. #else
  971. ram[0] = rand();
  972. ram[1] = rand();
  973. ram[2] = rand();
  974. ram[3] = rand();
  975. memset(m_btRam, 0, 16);
  976. #endif // RVC_OS_WIN
  977. for (int i = 0, j = 0; j < 4; ++j)
  978. {
  979. m_btRam[i + 0] = ((ram[j] & 0xff000000) >> 24);
  980. m_btRam[i + 1] = ((ram[j] & 0x00ff0000) >> 16);
  981. m_btRam[i + 2] = ((ram[j] & 0x0000ff00) >> 8);
  982. m_btRam[i + 3] = (ram[j] & 0x000000ff);
  983. i += 4;
  984. }
  985. return true;
  986. }
  987. pair<string, string> CAccessAuthEntity::GenerateTmkToKMC()
  988. {
  989. LOG_FUNCTION();
  990. if (!GenerateRandomNum())
  991. return make_pair("", "");
  992. #ifdef DEVOPS_ON_ST /*DevOps流水线编译,ST环境*/
  993. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  994. #elif defined(DEVOPS_ON_UAT)/*DevOps流水线编译,UAT环境*/
  995. CSimpleStringA tmpPubKey = "040AEC50A1FC9C5E9B1162FE4520C9E18E6F471A3F6DB77B147F0A464B5BFD0EDBE08AE8377C458CA204456E7A86568AAA9240F1C843E47988A6A197B232539DC8";
  996. #elif defined(DEVOPS_ON_PRD)/*DevOps流水线编译,PRD环境*/
  997. CSimpleStringA tmpPubKey = "04E0A4FDA2484A1A0FAB0844F59110AEB7A08D314B5E451E816FC0E78CBA383B461474E1167B86FC48D704CB482DD5164A73AB9E019CCE26EE382B89C394B5ACE1";
  998. #elif defined(DEVOPS_ON_DEV)/*DevOps流水线编译,Dev环境*/
  999. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  1000. #else/*本地编译等非DevOps环境编译的版本*/
  1001. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  1002. #endif
  1003. return EncryptedByPubKey(tmpPubKey);
  1004. }
  1005. pair<string, string> CAccessAuthEntity::EncryptedByPubKey(CSimpleStringA pubKey, bool bNeed04Head)
  1006. {
  1007. //TODO: New了那么多对象,什么时候Delete?? [Gifur@202585]
  1008. if (pubKey.GetLength() <= 0)
  1009. return make_pair("", "");
  1010. PCHAR strRam = new CHAR[512];
  1011. memset(strRam, 0, 512);
  1012. memcpy(strRam, &(m_btRam[0]), 16);
  1013. SP::Module::Util::HexBuf2StrBuf((PBYTE)m_btRam, &strRam, 16);
  1014. const int MAX_KEY_SIZE = 256;
  1015. char random_enc_bypbk[MAX_KEY_SIZE];
  1016. memset(random_enc_bypbk, 0, MAX_KEY_SIZE);
  1017. //公钥加密随机数
  1018. int outMsgLen = MAX_KEY_SIZE;
  1019. PBYTE pxxKey = new BYTE[256];
  1020. PBYTE pOldPubKey = new BYTE[256];
  1021. memset(pOldPubKey, 0, 256);
  1022. memset(pxxKey, 0, 256);
  1023. int size = SP::Module::Util::StrBuf2HexBuf(pubKey.GetData(), &pOldPubKey);
  1024. if (bNeed04Head)
  1025. {
  1026. pxxKey[0] = 0x04;
  1027. memcpy(pxxKey + 1, pOldPubKey, size);
  1028. }
  1029. else {
  1030. memcpy(pxxKey, pOldPubKey, 65);
  1031. }
  1032. int retSM2 = EncWithSM2PubKey((unsigned char*)m_btRam, 16, (unsigned char*)random_enc_bypbk, &outMsgLen, (unsigned char*)pxxKey, 65);
  1033. if (!retSM2 || outMsgLen != 113)
  1034. {
  1035. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("EncWithSM2PubKey failed outMsgLen:%d.", outMsgLen);
  1036. return make_pair("", "");
  1037. }
  1038. PBYTE tmp_enc_bypbk = new BYTE[112];
  1039. memset(tmp_enc_bypbk, 0, 112);
  1040. if (bNeed04Head)
  1041. {
  1042. memcpy(tmp_enc_bypbk, &(random_enc_bypbk[1]), 112);
  1043. }
  1044. else
  1045. {
  1046. memcpy(tmp_enc_bypbk, &(random_enc_bypbk[1]), 64);
  1047. memcpy(tmp_enc_bypbk + 64, &(random_enc_bypbk[97]), 16);
  1048. memcpy(tmp_enc_bypbk + 80, &(random_enc_bypbk[65]), 32);
  1049. }
  1050. PCHAR pBlock = new CHAR[512];
  1051. memset(pBlock, 0, 512);
  1052. BYTE tmpRandomEnc[512];
  1053. memset(tmpRandomEnc, 0, 512);
  1054. memcpy(tmpRandomEnc, &(tmp_enc_bypbk[0]), outMsgLen - 1);
  1055. size = SP::Module::Util::HexBuf2StrBuf((PBYTE)tmpRandomEnc, &pBlock, 112);
  1056. return make_pair(pBlock, strRam);
  1057. }
  1058. void CAccessAuthEntity::GetHardWareInfo()
  1059. {
  1060. std::map<std::string, std::string> errInfo;
  1061. //oilyang@20231008 to get system info from runcfg first
  1062. //no matter calculating from runcfg succeed or not,we also get system info from system api for update runcfg
  1063. bool bGetFromRunCfg = false;
  1064. CSimpleString csInfo, strErrMsg, strRet;
  1065. CSmartPointer<IConfigInfo> pConfigRun;
  1066. ErrorCodeEnum eErr = GetFunction()->OpenConfig(Config_Run, pConfigRun);
  1067. if (eErr == Error_Succeed && pConfigRun->ReadConfigValue("system", "info", csInfo) == Error_Succeed && !csInfo.IsNullOrEmpty()) {
  1068. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("read device info from runcfg: [%s]", csInfo.GetData());
  1069. CAutoArray<CSimpleStringA> sysInfo = csInfo.Split('|');
  1070. if (sysInfo.GetCount() == 3)
  1071. {
  1072. m_cpuId = sysInfo[0];
  1073. m_mainBoardId = sysInfo[1];
  1074. m_hardDiskId = sysInfo[2];
  1075. bGetFromRunCfg = true;
  1076. m_iGetTermSysInfo = 1;
  1077. }
  1078. else
  1079. {
  1080. m_iGetTermSysInfo = -1;
  1081. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setAPI("GetTerminalFingerPrint")("get sm3 hash as fingerprint fail");
  1082. }
  1083. }
  1084. else
  1085. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("GetTermSysInfo, OpenConfig Config_Run error=%d.", eErr);
  1086. #ifdef RVC_OS_LINUX
  1087. char szTmp[1024] = {};
  1088. string strTmp;
  1089. int nTmpBufLen = 1024;
  1090. CSimpleStringA runInfoPath;
  1091. auto rc = GetFunction()->GetPath("runinfo", runInfoPath);
  1092. if (rc != Error_Succeed) {
  1093. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("GetPath runinfo error=%d.", rc);
  1094. return;
  1095. }
  1096. runInfoPath += SPLIT_SLASH_STR "runcfg";
  1097. //CPU
  1098. if (!get_cpu_id_by_system(strTmp, runInfoPath.GetData()))
  1099. {
  1100. if (!bGetFromRunCfg)
  1101. {
  1102. errInfo["errcode"] = "RTA5213";
  1103. errInfo["msg"] = "调用系统api获取CPU序号失败";
  1104. errInfo["getLastErr"] = to_string(GetLastError());
  1105. m_cpuId = generateJsonStr(errInfo).second.c_str();
  1106. m_iGetTermSysInfo = -1;
  1107. }
  1108. strErrMsg = CSimpleStringA::Format("查询CPU ID失败,请重启机器并重新初始化");
  1109. SetAuthErrMsg((const char*)strErrMsg);
  1110. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1111. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1112. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5213")
  1113. (GetOutPutStr("%s%s", "Processor", "False").c_str());
  1114. return;
  1115. }
  1116. m_cpuId = strTmp.c_str();
  1117. strRet = strTmp.c_str();
  1118. strTmp.clear();
  1119. //主板
  1120. if (!get_board_serial_by_system(strTmp, runInfoPath.GetData()))
  1121. {
  1122. if (!bGetFromRunCfg)
  1123. {
  1124. errInfo["errcode"] = "RTA5214";
  1125. errInfo["msg"] = "调用系统api获取主板ID号失败";
  1126. errInfo["getLastErr"] = to_string(GetLastError());
  1127. m_mainBoardId = generateJsonStr(errInfo).second.c_str();
  1128. m_iGetTermSysInfo = -1;
  1129. }
  1130. strErrMsg = CSimpleStringA::Format("查询主板序列号失败, 请重启机器并重新初始化");
  1131. SetAuthErrMsg((const char*)strErrMsg);
  1132. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1133. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1134. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5214")
  1135. (GetOutPutStr("%s%s", "BaseBoard", "False").c_str());
  1136. return;
  1137. }
  1138. m_mainBoardId = strTmp.c_str();
  1139. strRet += "|";
  1140. strRet += strTmp.c_str();
  1141. //硬盘
  1142. vector<string> diskArr;
  1143. int errCode = 0;
  1144. if (!get_disk_serial_by_system(diskArr, errCode, runInfoPath.GetData()))
  1145. {
  1146. if (!bGetFromRunCfg)
  1147. {
  1148. errInfo["errcode"] = "RTA5215";
  1149. errInfo["msg"] = "调用系统api获取硬盘ID号失败";
  1150. errInfo["getLastErr"] = to_string(GetLastError());
  1151. m_hardDiskId = generateJsonStr(errInfo).second.c_str();
  1152. m_iGetTermSysInfo = -1;
  1153. }
  1154. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("get_disk_serial_by_system errCode:%d", errCode);
  1155. strErrMsg = CSimpleStringA::Format("查询磁盘序列号失败, 请重启机器并重新初始化");
  1156. SetAuthErrMsg((const char*)strErrMsg);
  1157. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1158. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1159. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5215")
  1160. (GetOutPutStr("%s%s", "DiskDrive", "False").c_str());
  1161. return;
  1162. }
  1163. strRet += "|";
  1164. strTmp = "";
  1165. vector<string>::iterator it = diskArr.begin();
  1166. while (it != diskArr.end()) {
  1167. strTmp += *it;
  1168. it++;
  1169. }
  1170. strRet += strTmp.c_str();
  1171. m_hardDiskId = strTmp.c_str();
  1172. #else
  1173. ULONGLONG ullStart = GetTickCount64();
  1174. char szTmp[1024] = {};
  1175. int nTmpBufLen = 1024;
  1176. if (!QueryWMIDevice(Processor, "ProcessorId", szTmp, &nTmpBufLen))
  1177. {
  1178. if (!bGetFromRunCfg)
  1179. {
  1180. errInfo["errcode"] = "RTA5213";
  1181. errInfo["msg"] = "调用系统api获取CPU序号失败";
  1182. errInfo["getLastErr"] = to_string(GetLastError());
  1183. m_cpuId = generateJsonStr(errInfo).second.c_str();
  1184. m_iGetTermSysInfo = -1;
  1185. }
  1186. strErrMsg = CSimpleStringA::Format("查询 cpu id 失败: %d, 请尝试重启应用", GetLastError());
  1187. SetAuthErrMsg((const char*)strErrMsg);
  1188. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1189. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1190. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5213")
  1191. (GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1192. return;
  1193. }
  1194. strRet = szTmp;
  1195. m_cpuId = szTmp;
  1196. nTmpBufLen = 1024;
  1197. memset(szTmp, 0, sizeof(szTmp));
  1198. if (!QueryWMIDevice(BaseBoard, "SerialNumber", szTmp, &nTmpBufLen))
  1199. {
  1200. if (!bGetFromRunCfg)
  1201. {
  1202. errInfo["errcode"] = "RTA5214";
  1203. errInfo["msg"] = "调用系统api获取主板ID号失败";
  1204. errInfo["getLastErr"] = to_string(GetLastError());
  1205. m_mainBoardId = generateJsonStr(errInfo).second.c_str();
  1206. m_iGetTermSysInfo = -1;
  1207. }
  1208. strErrMsg = CSimpleStringA::Format("查询 baseboard sn 失败: %d, 请尝试重启应用", GetLastError());
  1209. SetAuthErrMsg((const char*)strErrMsg);
  1210. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1211. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1212. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5214")
  1213. (GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1214. return;
  1215. }
  1216. strRet += "|";
  1217. strRet += szTmp;
  1218. m_mainBoardId = szTmp;
  1219. nTmpBufLen = 1024;
  1220. memset(szTmp, 0, sizeof(szTmp));
  1221. if (!QueryWMIDevice(DiskDrive, "SerialNumber", szTmp, &nTmpBufLen))
  1222. {
  1223. if (!bGetFromRunCfg)
  1224. {
  1225. errInfo["errcode"] = "RTA5215";
  1226. errInfo["msg"] = "调用系统api获取硬盘ID号失败";
  1227. errInfo["getLastErr"] = to_string(GetLastError());
  1228. m_hardDiskId = generateJsonStr(errInfo).second.c_str();
  1229. m_iGetTermSysInfo = -1;
  1230. }
  1231. strErrMsg = CSimpleStringA::Format("查询 harddisk sn 失败: %d, 请尝试重启应用", GetLastError());
  1232. SetAuthErrMsg((const char*)strErrMsg);
  1233. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1234. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "DiskDrive", GetLastError()).c_str());
  1235. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5215")
  1236. (GetOutPutStr("%s%s", "DiskDrive", "False").c_str());
  1237. return;
  1238. }
  1239. strRet += "|";
  1240. strRet += szTmp;
  1241. m_hardDiskId = szTmp;
  1242. ULONGLONG ullEnd = GetTickCount64();
  1243. if (ullEnd - ullStart > 5000)
  1244. {
  1245. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5201")
  1246. ("获取系统信息耗时过长:%d秒", (ullEnd - ullStart) / 1000);
  1247. LogWarn(Severity_Middle, Error_Unexpect, AccessAuthorization_UserErrorCode_GetTermCostTooLong,
  1248. CSimpleStringA::Format("获取系统信息耗时过长:%d秒", (ullEnd - ullStart) / 1000));
  1249. }
  1250. #endif // RVC_OS_LINUX
  1251. if (!bGetFromRunCfg || csInfo.Compare(strRet) != 0)
  1252. {
  1253. eErr = pConfigRun->WriteConfigValue("system", "info", strRet.GetData());
  1254. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("device info changed,before[%s],current[%s],write to runcfg:%d"
  1255. , csInfo.GetData(), strRet.GetData(), eErr);
  1256. }
  1257. else
  1258. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("device info: [%s]", strRet.GetData());
  1259. m_iGetTermSysInfo = 1;
  1260. return;
  1261. }
  1262. SP_BEGIN_ENTITY_MAP()
  1263. SP_ENTITY(CAccessAuthEntity)
  1264. SP_END_ENTITY_MAP()