mod_AccessAuth.cpp 51 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539
  1. #include "stdafx.h"
  2. #include "SpBase.h"
  3. #include "mod_AccessAuth.h"
  4. #include "RVCComm.h"
  5. #include "access_basefun.h"
  6. #include <fileutil.h>
  7. #include <iniutil.h>
  8. #include <cmath>
  9. #include "Event.h"
  10. #include "comm.h"
  11. #include "CommEntityRestful.hpp"
  12. #include "TokenKeeper_client_g.h"
  13. using namespace TokenKeeper;
  14. #include "PinPad_client_g.h"
  15. using namespace PinPad;
  16. #ifdef RVC_OS_WIN
  17. #include "WMIDeviceQuery.h"
  18. #include <WinCrypt.h>
  19. #include <Strsafe.h>
  20. #include "DeviceBaseClass.h"
  21. #include "MyBase64.h"
  22. #else
  23. #include "DeviceBaseClass.h"
  24. #endif
  25. extern int HexBuf2StrBuf(PBYTE hexBuf, char** strBuf, DWORD len);
  26. extern int StrBuf2HexBuf(LPCTSTR strBuf, PBYTE* hexBuf);
  27. struct InitializerInitMKTask : ITaskSp
  28. {
  29. CAccessAuthFSM* m_fsm;
  30. CAccessAuthEntity* m_entity;
  31. InitializerInitMKTask(CAccessAuthFSM* fsm, CAccessAuthEntity* entity) :m_fsm(fsm), m_entity(entity) {}
  32. void Process()
  33. {
  34. CSystemStaticInfo si;
  35. m_fsm->GetEntityBase()->GetFunction()->GetSystemStaticInfo(si);
  36. CInitlizerMKReq instanceReq;//oiltest dev module count
  37. bool initFlag = m_entity->SendInitMKReqACS(instanceReq);
  38. if (!initFlag)
  39. {
  40. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")("连接密码键盘异常");
  41. m_entity->EndInitMK(ERR_ACCESSAUTH_CONNECT_PINPAD, "连接密码键盘异常,请检查");//,待完善细化错误码oiltest
  42. return;
  43. }
  44. if (m_fsm->containsChinese(m_fsm->GetmAccessAuthHost().GetData()))
  45. {
  46. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, CSimpleStringA::Format("初始化服务连接失败,URL含中文。").GetData());
  47. return;
  48. }
  49. auto tmkpair = m_entity->GenerateTmkToKMC();
  50. instanceReq.encRandom = tmkpair.first;
  51. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("iniTerminalInfo: %s", instanceReq.iniTerminalInfo.c_str());
  52. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("auth:%s", instanceReq.auth.c_str());
  53. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curEdkKeyCheck: %s", instanceReq.curEdkKeyCheck.c_str());
  54. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curKeyIndex: %s", instanceReq.curKeyIndex.c_str());
  55. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("curTpkKeyCheck: %s", instanceReq.curTpkKeyCheck.c_str());
  56. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("encRandom: %s", instanceReq.encRandom.c_str());
  57. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("publicKey: %s", instanceReq.publicKey.c_str());
  58. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("terminalNo: %s", instanceReq.terminalNo.c_str());
  59. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("terminalVersion: %s", instanceReq.terminalVersion.c_str());
  60. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("user: %s", instanceReq.user.c_str());
  61. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("loginWay: %d", instanceReq.loginWay);
  62. CInitlizerMKAns instanceAns;
  63. HttpClientResponseResult result;
  64. HttpClientRequestConfig config(HttpRequestMethod::POST, m_entity->GetInitUrl().GetData(), &SpGetToken);
  65. config.SetChildUri("/api/v6/initmk");
  66. SP::Module::Restful::FulfillRequestJsonBody(&config, instanceReq);
  67. RestfulClient client = RestfulClient::getInstance();
  68. config.PreDo();
  69. client.Do(&config, &result);
  70. if (result.ResponseOK()) {
  71. SP::Module::Restful::CommResponseJson responseStatus;
  72. SP::Module::Restful::GetStatusFromDebranchResponse(result.content, responseStatus);
  73. if (!responseStatus.IsOperatedOK()) {
  74. CSimpleStringA errMsg = CSimpleStringA::Format("%s|%s", responseStatus.errorCode.c_str(), responseStatus.errorMsg.c_str());
  75. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("initmk failed: %s", errMsg.GetData());
  76. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, errMsg.GetData());
  77. }
  78. else {
  79. //服务端返回成功再将数据写入AcessAuthourization.ini
  80. CSmartPointer<IConfigInfo> pConfig;
  81. auto rc = m_entity->GetFunction()->OpenConfig(Config_Run, pConfig);
  82. rc = pConfig->WriteConfigValue("TerminalPD", "PrivateKey", m_entity->m_privateKey);
  83. if (rc != Error_Succeed) {
  84. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("write pri key failed.");
  85. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, "私钥写入失败,请重新初始化。");
  86. return;
  87. }
  88. if (m_entity->HasPinPad()) {
  89. const bool testResult = SP::Module::Restful::ExtractDataFromDebranchResponse(result.content, instanceAns);
  90. if (m_entity->LoadKeysToPinPadACS(tmkpair.second, instanceAns.TPK, instanceAns.EDK, instanceAns.keyIndex, instanceAns.tpkKeyCheck, instanceAns.edkKeyCheck) == Error_Succeed) {
  91. m_entity->EndInitMK(Error_Succeed, "");
  92. }
  93. else {
  94. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")("连接密码键盘异常");
  95. m_entity->EndInitMK(ERR_ACCESSAUTH_CONNECT_PINPAD, "密钥加载失败,请检查密码键盘连接。");//,待完善细化错误码oiltest
  96. }
  97. }
  98. else {
  99. m_entity->EndInitMK(Error_Succeed, "");
  100. }
  101. }
  102. }
  103. else {
  104. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("post wk failed: %s", result.WhatError().c_str());
  105. m_entity->EndInitMK(ERR_INITIALIZER_EXCEPTION, CSimpleStringA::Format("初始化服务连接失败。%s", result.WhatError().c_str()).GetData());
  106. }
  107. }
  108. };
  109. struct GetTermSysInfoTask : ITaskSp
  110. {
  111. CAccessAuthEntity* m_entity;
  112. GetTermSysInfoTask(CAccessAuthEntity* entity) :m_entity(entity) {}
  113. void Process()
  114. {
  115. m_entity->GetHardWareInfo();
  116. }
  117. };
  118. typedef struct _REG_TZI_FORMAT
  119. {
  120. LONG Bias;
  121. LONG StandardBias;
  122. LONG DaylightBias;
  123. SYSTEMTIME StandardDate;
  124. SYSTEMTIME DaylightDate;
  125. } REG_TZI_FORMAT;
  126. void CAccessAuthSession::Handle_Regist(SpOnewayCallContext<AccessAuthService_Regist_Info>::Pointer ctx)
  127. {
  128. DbgToBeidou(ctx->link, __FUNCTION__)();
  129. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_Regist");
  130. m_pEntity->Regist();
  131. }
  132. void CAccessAuthSession::Handle_UpdateWK(SpOnewayCallContext<AccessAuthService_UpdateWK_Info>::Pointer ctx)
  133. {
  134. DbgToBeidou(ctx->link, __FUNCTION__)();
  135. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_UpdateWK");
  136. m_pEntity->UpdateWK();
  137. }
  138. void CAccessAuthSession::Handle_InitializeNew(SpReqAnsContext<AccessAuthService_InitializeNew_Req, AccessAuthService_InitializeNew_Ans>::Pointer ctx)
  139. {
  140. DbgToBeidou(ctx->link, __FUNCTION__)();
  141. DbgWithLink(LOG_LEVEL_INFO, ctx->link.checkEmpty() ? LOG_TYPE_SYSTEM : LOG_TYPE_USER).setAPI(__FUNCTION__)("Handle_InitializeNew");
  142. m_pEntity->m_ctx = ctx;
  143. m_pEntity->m_strUserID = ctx->Req.strUserID.GetData();
  144. m_pEntity->m_strPassword = ctx->Req.strPassword.GetData();
  145. m_pEntity->BeginInitMKACS();
  146. }
  147. void CAccessAuthSession::Handle_InitDev(SpReqAnsContext<AccessAuthService_InitDev_Req, AccessAuthService_InitDev_Ans>::Pointer ctx)
  148. {
  149. DbgToBeidou(ctx->link, __FUNCTION__)();
  150. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_USER).setAPI(__FUNCTION__)("call Handle_InitDev");
  151. m_pEntity->InitDevice(ctx);
  152. }
  153. void CAccessAuthSession::Handle_GetNetMsg(SpReqAnsContext<AccessAuthService_GetNetMsg_Req, AccessAuthService_GetNetMsg_Ans>::Pointer ctx)
  154. {
  155. DbgToBeidou(ctx->link, __FUNCTION__)();
  156. m_pEntity->GetNetMsg(ctx);
  157. }
  158. void CAccessAuthEntity::OnStarted()
  159. {
  160. //设置时区为北京标准时区
  161. if (!SetLocalTimeZoneByKeyName("China Standard Time", FALSE))
  162. {
  163. m_FSM.doWarnMsg(ERR_ACCESSAUTH_SETTIMEZONE,GetOutPutStr("%s%s","设置时区错误","False").c_str());
  164. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5202")(GetOutPutStr("%s%s", "设置时区错误", "False").c_str());
  165. }
  166. m_FSM.Init(this);
  167. CSimpleStringA strErrMsg;
  168. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  169. memset(&m_info,0, sizeof(CSystemStaticInfo));
  170. auto rc = GetFunction()->GetSystemStaticInfo(m_info);
  171. if (rc != Error_Succeed)
  172. {
  173. strErrMsg = "GetSystemStaticInfo fail";
  174. SetAuthErrMsg((const char*)strErrMsg);
  175. m_FSM.doWarnMsg(ERR_ACCESSAUTH_GET_SYSTEM_STATIC_INFO,
  176. GetOutPutStr("%s%08X", "获取系统静态信息错误", rc).c_str(), strErrMsg.GetData());
  177. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)(GetOutPutStr("%s%08X", "获取系统静态信息错误", rc).c_str());
  178. }
  179. CSmartPointer<GetTermSysInfoTask> getTermSysInfoTask = new GetTermSysInfoTask(this);
  180. GetFunction()->PostThreadPoolTask(getTermSysInfoTask.GetRawPointer());
  181. }
  182. void CAccessAuthEntity::OnPreStart(CAutoArray<CSimpleStringA> strArgs,CSmartPointer<ITransactionContext> pTransactionContext)
  183. {
  184. ErrorCodeEnum Error = Error_Succeed;
  185. pTransactionContext->SendAnswer(Error) ;
  186. }
  187. void CAccessAuthEntity::OnPreClose(EntityCloseCauseEnum eCloseCause,CSmartPointer<ITransactionContext> pTransactionContext)
  188. {
  189. m_FSM.PostExitEvent();
  190. pTransactionContext->SendAnswer(Error_Succeed);
  191. }
  192. void CAccessAuthEntity::OnSysVarEvent(const char *pszKey, const char *pszValue,const char *pszOldValue,const char *pszEntityName)
  193. {
  194. }
  195. // 开始准入
  196. ErrorCodeEnum CAccessAuthEntity::Regist()
  197. {
  198. m_FSM.PostEventFIFO(new FSMEvent(CAccessAuthFSM::Event_StartRegist));
  199. return Error_Succeed;
  200. }
  201. string CAccessAuthEntity::ByteArrayToHexStr(BYTE *pBuf, int nBufLen)
  202. {
  203. char szBuf[1024];
  204. memset(szBuf, 0, sizeof(szBuf));
  205. for(int i=0; i<nBufLen; i++)
  206. {
  207. BYTE b1 = (pBuf[i] >> 4) & 0x0F;
  208. BYTE b2 = pBuf[i] & 0x0F;
  209. if (b1 <= 9)
  210. szBuf[i*2] = '0' + b1;
  211. else
  212. szBuf[i*2] = 'A' + b1 - 10;
  213. if (b2 <= 9)
  214. szBuf[i*2+1] = '0' + b2;
  215. else
  216. szBuf[i*2+1] = 'A' + b2 - 10;
  217. }
  218. return szBuf;
  219. }
  220. // 生成临时SM2密钥对
  221. DWORD CAccessAuthEntity::CreateSM2KeyPair(CBlob &pubKey, CBlob &priKey)
  222. {
  223. int nPubKeyLen = 256;
  224. int nPriKeyLen = 256;
  225. pubKey.Alloc(nPubKeyLen);
  226. priKey.Alloc(nPriKeyLen);
  227. if (!::CreateSM2KeyPair((BYTE*)(pubKey.m_pData), &nPubKeyLen, (BYTE*)(priKey.m_pData), &nPriKeyLen))
  228. {
  229. SetAuthErrMsg("创建SM2密钥对失败");
  230. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  231. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CREATE_RSA_KEY_PAIR,
  232. GetOutPutStr("%s%s","CreateRsaKeyPair","False").c_str(), true, "创建SM2密钥对失败");
  233. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("创建SM2密钥对失败");
  234. return ERR_ACCESSAUTH_CREATE_RSA_KEY_PAIR;
  235. }
  236. pubKey.Resize(nPubKeyLen);
  237. priKey.Resize(nPriKeyLen);
  238. return Error_Succeed;
  239. }
  240. // 保存到令牌管理实体中
  241. DWORD CAccessAuthEntity::SaveSM2KeyPair(const CBlob &pubKey, const CBlob &priKey)
  242. {
  243. LOG_FUNCTION();
  244. CSimpleStringA strErrMsg;
  245. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  246. TokenService_ClientBase *pTokenServiceClient = new TokenService_ClientBase(this);
  247. DWORD rc = pTokenServiceClient->Connect();
  248. if (rc != Error_Succeed)
  249. {
  250. strErrMsg = "连接令牌管理实体失败";
  251. SetAuthErrMsg(strErrMsg.GetData());
  252. rc = ERR_ACCESSAUTH_CONNECT_TOKEN_SERVICE;
  253. m_FSM.doWarnMsg(rc,
  254. "连接令牌管理实体失败", true);
  255. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5206")
  256. (GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", strErrMsg.GetData()).c_str());
  257. pTokenServiceClient->SafeDelete();
  258. }
  259. else
  260. {
  261. TokenService_SetKeyPair_Req req;
  262. req.pub_key = pubKey;
  263. req.pri_key = priKey;
  264. TokenService_SetKeyPair_Ans ans;
  265. rc = pTokenServiceClient->SetKeyPair(req, ans, 3000);
  266. pTokenServiceClient->GetFunction()->CloseSession();
  267. if (rc != Error_Succeed)
  268. {
  269. strErrMsg = "保存密钥对失败";
  270. SetAuthErrMsg(strErrMsg.GetData());
  271. rc = ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_KEYS;
  272. m_FSM.doWarnMsg(rc,
  273. "保存密钥对失败", true);
  274. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5207")
  275. (GetOutPutStr("%s%08X%s%s", "SetKeyPair", rc, "strErrMsg", strErrMsg.GetData()).c_str());
  276. }
  277. }
  278. return rc;
  279. }
  280. ErrorCodeEnum CAccessAuthEntity::SaveTokenAndSharedSK(const CBlob &token, const CBlob &sharedSK)
  281. {
  282. LOG_FUNCTION();
  283. CSimpleStringA strErrMsg;
  284. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  285. TokenService_ClientBase *pTokenServiceClient = new TokenService_ClientBase(this);
  286. ErrorCodeEnum rc = pTokenServiceClient->Connect();
  287. if (rc != Error_Succeed)
  288. {
  289. strErrMsg = "连接令牌管理实体失败";
  290. SetAuthErrMsg(strErrMsg.GetData());
  291. string outStr = GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", strErrMsg.GetData());
  292. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_TOKEN_SERVICE, outStr.c_str());
  293. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  294. pTokenServiceClient->SafeDelete();
  295. }
  296. else
  297. {
  298. TokenService_SetToken_Req req = {};
  299. req.token = token;
  300. TokenService_SetToken_Ans ans;
  301. rc = pTokenServiceClient->SetToken(req, ans, 5000);
  302. if (rc == Error_Succeed)
  303. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM).setAPI("SetToken")
  304. ("save token succ, token: [%s]", ByteArrayToHexStr((BYTE*)token.m_pData, token.m_iLength).c_str());
  305. else
  306. {
  307. strErrMsg = "保存令牌失败";
  308. SetAuthErrMsg(strErrMsg.GetData());
  309. string outStr = GetOutPutStr("%s%08X%s%s", "SetToken", rc, "strErrMsg", strErrMsg.GetData());
  310. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_TOKEN, outStr.c_str());
  311. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  312. }
  313. TokenService_SetSharedSK_Req req2 = {};
  314. req2.ssk = sharedSK;
  315. TokenService_SetSharedSK_Ans ans2 = {};
  316. rc = pTokenServiceClient->SetSharedSK(req2, ans2, 5000);
  317. if (rc != Error_Succeed)
  318. {
  319. strErrMsg = "保存会话密钥失败";
  320. SetAuthErrMsg(strErrMsg.GetData());
  321. string outStr = GetOutPutStr("%s%08X%s%s", "SetSharedSK", rc, "strErrMsg", strErrMsg.GetData());
  322. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_TOKEN_SERVICE_SET_SHAREKEY, outStr.c_str());
  323. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(outStr.c_str());
  324. }
  325. pTokenServiceClient->GetFunction()->CloseSession();
  326. }
  327. return rc;
  328. }
  329. bool CAccessAuthEntity::HasPinPad()
  330. {
  331. CSimpleStringA strErrMsg;
  332. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  333. //oilyang@20210514
  334. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  335. {
  336. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("MachineType[%s], not exist pinpad", m_info.strMachineType.GetData());
  337. return false;
  338. }
  339. else
  340. {
  341. // 其它VTM机型,全部有内置密码键盘
  342. return true;
  343. }
  344. }
  345. // 1:3des only; 2: sm4 only; 3: both 3des and sm4
  346. // 由当前已初始化的密钥文件决定,兼容旧版本终端
  347. int CAccessAuthEntity::GetPinPadCapability()
  348. {
  349. LOG_FUNCTION();
  350. int nCapability = 0;
  351. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  352. return nCapability;
  353. PinPadService_ClientBase *pPinPad = new PinPadService_ClientBase(this);
  354. auto rc = pPinPad->Connect();
  355. if (rc == Error_Succeed)
  356. {
  357. PinPadService_QueryFunc_Req req;
  358. PinPadService_QueryFunc_Ans ans;
  359. rc = pPinPad->QueryFunc(req, ans, 3000);
  360. if (rc == Error_Succeed)
  361. {
  362. nCapability = ans.encryptkey;
  363. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("QueryFunc from pinpad succ, nCapability[%d]", nCapability);
  364. }
  365. else if (rc != Error_DevNotAvailable)
  366. {
  367. SetAuthErrMsg("从PinPad获取主密钥类型失败");
  368. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  369. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_PINPAD,
  370. GetOutPutStr("%s%s%s%s", "QueryFunc", "False", "AuthErrMsg", "从PinPad获取主密钥类型失败").c_str());
  371. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5205")
  372. (GetOutPutStr("%s%s%s%s", "QueryFunc", "False", "AuthErrMsg", "从PinPad获取主密钥类型失败").c_str());
  373. }
  374. pPinPad->GetFunction()->CloseSession();
  375. }
  376. else
  377. {
  378. SetAuthErrMsg("连接PinPad实体失败");
  379. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  380. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_PINPAD,
  381. GetOutPutStr("%s%08X%s%s", "Connect", rc,"AuthErrMsg", "连接PinPad实体失败").c_str());
  382. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)(GetOutPutStr("%s%08X%s%s", "Connect", rc, "AuthErrMsg", "连接PinPad实体失败").c_str());
  383. pPinPad->SafeDelete();
  384. }
  385. return nCapability;
  386. }
  387. void CAccessAuthEntity::printPasswdError(const string& strErrMsg){
  388. SetAuthErrMsg(strErrMsg.c_str());
  389. GetFunction()->SetSysVar("AuthErrMsg", strErrMsg.c_str(), true);
  390. m_FSM.doWarnMsg( ERROR_ACCESSAUTH_OPENCRYPTCONTEXT, strErrMsg.c_str(),true, strErrMsg);
  391. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA520C")(strErrMsg.c_str());
  392. }
  393. int Char2Int(char * ch) {
  394. int num = 0;
  395. for (int i = 0;i < strlen(ch);i++) {
  396. num += ((int)(ch[i] - '0')) * pow((float)10, (float)(strlen(ch) - i - 1));
  397. }
  398. return num;
  399. }
  400. bool CAccessAuthEntity::SaveAuthKey(BYTE *pKey)
  401. {
  402. memset(m_AuthSessionKey, 0, 140);
  403. CSimpleStringA runInfoPath, iniPath;
  404. auto rc = GetFunction()->GetPath("runinfo", runInfoPath);
  405. if (rc != Error_Succeed) {
  406. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("GetPath runinfo error=%d.", rc);
  407. return false;
  408. }
  409. char privateKey[BUF_SIZE] = { 0 };
  410. iniPath = runInfoPath + SPLIT_SLASH_STR "runcfg" SPLIT_SLASH_STR "AccessAuthorization.ini";
  411. char* tmp = inifile_read_str(iniPath.GetData(), "TerminalPD", "PrivateKey", "");
  412. strcpy(privateKey, tmp);
  413. delete tmp;
  414. if (strlen(privateKey) <= 0) {
  415. iniPath = runInfoPath + SPLIT_SLASH_STR "runcfg" SPLIT_SLASH_STR "Initializer.ini";
  416. char* tmp2 = inifile_read_str(iniPath.GetData(), "TerminalPD", "PrivateKey", "");
  417. strcpy(privateKey, tmp2);
  418. delete tmp2;
  419. if (strlen(privateKey) <= 0)
  420. {
  421. printPasswdError("私钥为空,请重置秘钥进行初始化");
  422. return false;
  423. }
  424. }
  425. int decodedPrivateKeyLen;
  426. char* pDecodedPrivateKey = Hex2Str(privateKey, decodedPrivateKeyLen);
  427. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("privateKey len:%d, decodedPrivateKeyLen=%d", strlen(privateKey), decodedPrivateKeyLen);
  428. char pDecryptPrivateKey[BUF_SIZE] = { 0 };
  429. int decryprtLen = BUF_SIZE;
  430. if (!DecWithSM4_ECB("s5da69gnh4!963@6s5da69gnh4!963@6", (BYTE*)pDecodedPrivateKey, decodedPrivateKeyLen, (BYTE*)pDecryptPrivateKey, &decryprtLen)) {
  431. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("DecWithSM4_ECB decrypt privateKey error. SM4解密私钥失败");
  432. printPasswdError("终端初始化未完成,请重置秘钥进行初始化");
  433. delete[] pDecodedPrivateKey;
  434. return false;
  435. }
  436. delete[] pDecodedPrivateKey;
  437. char pPlainKey[KEY_SIZE];
  438. int plainKeyLen = KEY_SIZE;
  439. char pKeyLen[4] = { 0 };
  440. memcpy(pKeyLen, pKey, 4);
  441. int kenLen = Char2Int(pKeyLen);
  442. char* pEncodeKey = Str2Hex((char*)pKey, kenLen + 4);
  443. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("kenLen=%d", kenLen);
  444. delete pEncodeKey;
  445. char* key = new char[kenLen + 1];
  446. memset(key, 0, kenLen + 1);
  447. memcpy(key, pKey + 4, kenLen);
  448. if (!DecWithSM2PriKey((BYTE*)key, kenLen, (BYTE*)pPlainKey, &plainKeyLen, (BYTE*)pDecryptPrivateKey, decryprtLen)) {
  449. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("使用私钥解密失败!");
  450. printPasswdError("终端初始化未完成,请重置秘钥进行初始化");
  451. return false;
  452. }
  453. if (plainKeyLen != KEY_SIZE) {
  454. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setAPI("SaveAuthVerAndKey")("私钥解密后的会话密钥长度不等于16!");
  455. }
  456. memcpy(m_AuthSessionKey, pPlainKey, KEY_SIZE);
  457. return true;
  458. }
  459. static BYTE* ConvertHexStrToBytes(const char *pszStr)
  460. {
  461. if (pszStr == NULL || strlen(pszStr) == 0)
  462. return NULL;
  463. int nLen = strlen(pszStr) / 2;
  464. BYTE *pRet = (BYTE*)malloc(nLen);
  465. memset(pRet, 0, nLen);
  466. for (int i = 0; i < nLen; i++)
  467. {
  468. int nTmp(0);
  469. if (sscanf(&pszStr[i * 2], "%2X", &nTmp) != 1)
  470. {
  471. free(pRet);
  472. return NULL;
  473. }
  474. pRet[i] = (BYTE)nTmp;
  475. }
  476. return pRet;
  477. }
  478. // 使用密钥加密
  479. ErrorCodeEnum CAccessAuthEntity::EncryptDataWithKey(const CBlob &raw, CBlob &enc, BYTE* key)
  480. {
  481. LOG_FUNCTION();
  482. //这里不需要delete,由CBlob析构函数去执行
  483. BYTE* pEncData = new BYTE[1024];
  484. int pEncDataSize = 1024;
  485. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pEncDataSize=%d", pEncDataSize);
  486. char* pPlainInfo = Str2Hex((char*)raw.m_pData, raw.m_iLength);
  487. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("raw Length=%d", raw.m_iLength);
  488. delete[] pPlainInfo;
  489. if (!EncWithSM4_ECB(key, (BYTE*)(raw.m_pData), raw.m_iLength, pEncData, &pEncDataSize)) {
  490. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("会话密钥加密准入信息失败!");
  491. SetAuthErrMsg("会话密钥加密准入信息失败");
  492. return Error_Unexpect;
  493. }
  494. enc.Attach(pEncData,pEncDataSize);
  495. char* tmp = Str2Hex((char*)pEncData, pEncDataSize);
  496. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pEncData size:%d", pEncDataSize);
  497. delete[] tmp;
  498. tmp = Str2Hex((char*)enc.m_pData, enc.m_iLength);
  499. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("EncWithSM4_ECB data size:%d", enc.m_iLength);
  500. delete[] tmp;
  501. return Error_Succeed;
  502. }
  503. static char* ConvertBytesToHexStr(BYTE *pBuf, int nLen)
  504. {
  505. char *pRet = (char*)malloc(nLen * 2 + 1);
  506. memset(pRet, 0, nLen * 2 + 1);
  507. char *p = pRet;
  508. for (int i = 0; i < nLen; i++)
  509. {
  510. BYTE b = pBuf[i];
  511. BYTE l = (b >> 4) & 0x0F;
  512. if (l >= 10)
  513. *p = l - 10 + 'A';
  514. else
  515. *p = l + '0';
  516. p++;
  517. BYTE r = b & 0x0F;
  518. if (r >= 10)
  519. *p = r - 10 + 'A';
  520. else
  521. *p = r + '0';
  522. p++;
  523. }
  524. return pRet;
  525. }
  526. // 生成RSA密钥对,并导出公钥
  527. bool CAccessAuthEntity::GetTerminalPublicKey(BYTE* pBuf, int& nBufLen, string& pubkey)
  528. {
  529. LOG_FUNCTION();
  530. CSimpleString runInfoPath;
  531. auto rc = GetFunction()->GetPath("runinfo", runInfoPath);
  532. if (rc != Error_Succeed) {
  533. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("GetPath runinfo error=%d.", rc);
  534. return false;
  535. }
  536. runInfoPath += SPLIT_SLASH_STR "runcfg" SPLIT_SLASH_STR;
  537. #ifdef RVC_OS_WIN
  538. DWORD dwAttr = GetFileAttributes(runInfoPath.GetData());
  539. if (dwAttr == 0xFFFFFFFF) //目录不存在则创建
  540. {
  541. if (!CreateDirectory(runInfoPath.GetData(), NULL))
  542. {
  543. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Create %s dir failed!", runInfoPath.GetData());
  544. }
  545. }
  546. #else
  547. if (!dir_is_exist(runInfoPath.GetData()))
  548. {
  549. if (dir_create(runInfoPath.GetData()) != 0)
  550. {
  551. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Create %s dir failed!", runInfoPath.GetData());
  552. }
  553. }
  554. #endif // RVC_OS_WIN
  555. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Dir=%s", runInfoPath.GetData());
  556. CSmartPointer<IConfigInfo> pConfig;
  557. rc = GetFunction()->OpenConfig(Config_Run, pConfig);
  558. if (rc != Error_Succeed) {
  559. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("OpenConfig Config_Run error=%d.", rc);
  560. return false;
  561. }
  562. CSimpleString publicKey;
  563. rc = pConfig->ReadConfigValue("TerminalPD", "PublicKey", publicKey);
  564. if (rc != Error_Succeed || publicKey.IsNullOrEmpty()) {
  565. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("ReadConfig publicKey error=%d or publicKey is NULL.", rc);
  566. }
  567. BYTE btPublicKey[BUF_SIZE] = { 0 }, btPrivateKey[BUF_SIZE] = { 0 };
  568. int iPublicKeyLen = sizeof(btPublicKey);
  569. int iPrivateKeyLen = sizeof(btPrivateKey);
  570. if (!::CreateSM2KeyPair(btPublicKey, &iPublicKeyLen, btPrivateKey, &iPrivateKeyLen)) {
  571. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("Create SM2 key pair error.");
  572. return false;
  573. }
  574. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("iPublicKeyLen=%d,iPrivateKeyLen=%d", iPublicKeyLen, iPrivateKeyLen);
  575. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("[btPublicKey=%s]", (char*)btPublicKey);
  576. char* pEncode = Str2Hex((char*)btPublicKey, iPublicKeyLen);
  577. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pEncode=%s,%d", pEncode, strlen(pEncode));
  578. /*rc = pConfig->WriteConfigValue("TerminalPD", "PublicKey", pEncode);
  579. assert(rc == Error_Succeed);*/
  580. m_publicKey = pEncode;
  581. pubkey = pEncode;
  582. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("write public key success.");
  583. BYTE pCryptPrivateKey[BUF_SIZE] = { 0 };
  584. int cryptPrivateKeyLen = BUF_SIZE;
  585. if (!EncWithSM4_ECB("s5da69gnh4!963@6s5da69gnh4!963@6", btPrivateKey, iPrivateKeyLen, pCryptPrivateKey, &cryptPrivateKeyLen)) {
  586. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("sm4 crypt privateKey error.");
  587. /*rc = pConfig->WriteConfigValue("TerminalPD", "PublicKey", "");*/
  588. m_publicKey = "";
  589. delete[] pEncode;
  590. return false;
  591. }
  592. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("sm4 encrypt pri key success.");
  593. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("cryptPrivateKeyLen=%d", cryptPrivateKeyLen);
  594. char* pEncodedCryptPrivateKey = Str2Hex((char*)pCryptPrivateKey, cryptPrivateKeyLen);
  595. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("encode pri key success.");
  596. m_privateKey = pEncodedCryptPrivateKey;
  597. /*//不在这里写入私钥,将逻辑修改到函数外部,等服务端返回成功后再写入私钥
  598. rc = pConfig->WriteConfigValue("TerminalPD", "PrivateKey", pEncodedCryptPrivateKey);
  599. if (rc != Error_Succeed) {
  600. rc = pConfig->WriteConfigValue("TerminalPD", "PublicKey", "");
  601. delete[] pEncodedCryptPrivateKey;
  602. return false;
  603. }
  604. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("write pri key success.");*/
  605. publicKey = pEncode;
  606. delete[] pEncode;
  607. delete[] pEncodedCryptPrivateKey;
  608. char* pDecode = Hex2Str(publicKey.GetData(), nBufLen);
  609. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pDecode=[%s],len=%d", pDecode, nBufLen);
  610. memcpy(pBuf, pDecode, nBufLen);
  611. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("GetTerminalPublicKey")("pBuf[0]=%02X,nBufLen=%d", pBuf[0], nBufLen);
  612. return true;
  613. }
  614. //oilyang@20210510 嵌入"bool CAccessAuthEntity::HasPinPad()"的逻辑
  615. // 返回1:只有PinPadID;2:只有DeviceID;3:两者都有;0:没有;-1表示失败
  616. ErrorCodeEnum CAccessAuthEntity::GetPinPadModel(CSimpleStringA& pinpadModel, bool& bPinPadOnline)
  617. {
  618. bPinPadOnline = false;
  619. CSimpleStringA strErrMsg;
  620. CSmartPointer<IEntityFunction> spFunction = this->GetFunction();
  621. std::map<std::string, std::string> errInfo;
  622. //oilyang@20210514
  623. if (!IsMachineTypeConfigurePinPad(m_info.strMachineType))
  624. {
  625. pinpadModel = "";
  626. return Error_Succeed;
  627. }
  628. ErrorCodeEnum nRet = Error_Unexpect;
  629. auto pPinPadClient = new PinPadService_ClientBase(this);
  630. bool bPinPadID = false;
  631. bool bDeviceID = false;
  632. bool bVendor = false;
  633. bool bBluetooth = false;
  634. CSimpleStringA strVendor;
  635. CSimpleStringA strBluetoothID;
  636. CSimpleStringA strPID;
  637. CSimpleStringA strMID;
  638. auto rc = 0;
  639. if ((rc = pPinPadClient->Connect()) == Error_Succeed)
  640. {
  641. //初始错误信息
  642. errInfo["errcode"] = "RTA5205";
  643. errInfo["msg"] = "调用PinPad发生错误";
  644. errInfo["getLastErr"] = GetLastError();
  645. pinpadModel = generateJsonStr(errInfo).second.c_str();
  646. PinPadService_GetDevInfo_Req req = {};
  647. PinPadService_GetDevInfo_Ans ans = {};
  648. rc = pPinPadClient->GetDevInfo(req, ans, 3000);
  649. if (rc == Error_Succeed)
  650. {
  651. bPinPadOnline = true;
  652. nRet = Error_Succeed;
  653. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pinpad model: %s", ans.model.GetData());
  654. // CM = V2.0#PM = V1.0#MID = 75500001#PID = 12345678#FWID = V1234567#Vendor = nantian
  655. // 密码键盘ID,PID,8到16字节; 设备ID,MID,8到16字节; 固件版本号,FWID,8字节
  656. pinpadModel = ans.model;
  657. }
  658. else if(rc == Error_NotInit)
  659. {
  660. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pinpad NOT INIT!, state: %d", ans.state);
  661. strErrMsg = "PinPad打开失败";
  662. SetAuthErrMsg(strErrMsg.GetData());
  663. string outStr = GetOutPutStr("%s%08X%s%s", "GetDevInfo", rc, "strErrMsg", strErrMsg.GetData());
  664. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_PINPAD, outStr.c_str());
  665. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5205")(outStr.c_str());
  666. return nRet;
  667. }
  668. else
  669. {
  670. strErrMsg = "调用PinPad实体的GetDevInfo方法失败";
  671. SetAuthErrMsg(strErrMsg.GetData());
  672. string outStr = GetOutPutStr("%s%08X%s%s", "GetDevInfo", rc, "strErrMsg", strErrMsg.GetData());
  673. m_FSM.doWarnMsg(ERR_ACCESSAUTH_FROM_PINPAD, outStr.c_str());
  674. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5205")(outStr.c_str());
  675. return nRet;
  676. }
  677. pPinPadClient->GetFunction()->CloseSession();
  678. }
  679. else if (rc == Error_NetBroken)
  680. {
  681. strErrMsg = "PinPad实体未启动, 连接密码键盘失败";
  682. SetAuthErrMsg((const char*)strErrMsg);
  683. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_PINPAD_UNLOAD,
  684. GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", "PinPad实体未启动, 连接密码键盘失败").c_str());
  685. pPinPadClient->SafeDelete();
  686. errInfo["errcode"] = "RTA5218";
  687. errInfo["msg"] = "PinPad实体未启动";
  688. errInfo["getLastErr"] = GetLastError();
  689. pinpadModel = generateJsonStr(errInfo).second.c_str();
  690. return nRet;
  691. }
  692. else
  693. {
  694. strErrMsg = "连接PinPad实体失败";
  695. SetAuthErrMsg((const char*)strErrMsg);
  696. m_FSM.doWarnMsg(ERR_ACCESSAUTH_CONNECT_PINPAD,
  697. GetOutPutStr("%s%08X%s%s", "Connect", rc, "strErrMsg", "连接PinPad实体失败").c_str());
  698. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5204")("连接密码键盘异常");
  699. pPinPadClient->SafeDelete();
  700. errInfo["errcode"] = "RTA5204";
  701. errInfo["msg"] = "PinPad实体启动成功,但连接PinPad实体失败";
  702. errInfo["getLastErr"] = GetLastError();
  703. pinpadModel = generateJsonStr(errInfo).second.c_str();
  704. return nRet; //此时nRet = -1, pinpad调用失败
  705. }
  706. pPinPadClient = NULL;
  707. return nRet;
  708. }
  709. wstring CAccessAuthEntity::ANSIToUnicode(const string& str)
  710. {
  711. int len = 0;
  712. len = str.length();
  713. int unicodeLen = ::MultiByteToWideChar(CP_ACP,
  714. 0,
  715. str.c_str(),
  716. -1,
  717. NULL,
  718. 0);
  719. wchar_t * pUnicode;
  720. pUnicode = new wchar_t[unicodeLen+1];
  721. memset(pUnicode,0,(unicodeLen+1)*sizeof(wchar_t));
  722. ::MultiByteToWideChar( CP_ACP,
  723. 0,
  724. str.c_str(),
  725. -1,
  726. (LPWSTR)pUnicode,
  727. unicodeLen);
  728. wstring rt;
  729. rt = (wchar_t*)pUnicode;
  730. delete pUnicode;
  731. return rt;
  732. }
  733. //China Standard Time
  734. BOOL CAccessAuthEntity::SetLocalTimeZoneByKeyName(const TCHAR* szTimeZoneKeyName, BOOL isDaylightSavingTime)
  735. {
  736. #ifdef RVC_OS_WIN
  737. HKEY hKey;
  738. LONG ErrorCode;
  739. TCHAR szSubKey[256];
  740. TCHAR szStandardName[32];
  741. TCHAR szDaylightName[32];
  742. REG_TZI_FORMAT regTZI;
  743. DWORD dwByteLen;
  744. // 检测入口参数
  745. if ((szTimeZoneKeyName == NULL) || (strlen(szTimeZoneKeyName) == 0))
  746. {
  747. // 时区标识符不能为空
  748. return FALSE;
  749. }
  750. StringCchCopy(szSubKey, 256, TEXT("Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\"));
  751. StringCchCat(szSubKey, 256, szTimeZoneKeyName);
  752. ErrorCode = RegOpenKeyEx(HKEY_LOCAL_MACHINE, szSubKey, 0, KEY_QUERY_VALUE, &hKey);
  753. if (ErrorCode != ERROR_SUCCESS)
  754. {
  755. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegOpenKeyEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time fail");
  756. return FALSE;
  757. }
  758. // 标准名
  759. dwByteLen = sizeof(szStandardName);
  760. ErrorCode = RegQueryValueEx(hKey, TEXT("Std"), NULL, NULL, reinterpret_cast<LPBYTE>(&szStandardName), &dwByteLen);
  761. if (ErrorCode != ERROR_SUCCESS)
  762. {
  763. RegCloseKey(hKey);
  764. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\Std fail");
  765. return FALSE;
  766. }
  767. // 夏时制名
  768. dwByteLen = sizeof(szDaylightName);
  769. ErrorCode = RegQueryValueEx(hKey, TEXT("Dlt"), NULL, NULL, reinterpret_cast<LPBYTE>(&szDaylightName), &dwByteLen);
  770. if (ErrorCode != ERROR_SUCCESS)
  771. {
  772. RegCloseKey(hKey);
  773. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\Dlt fail");
  774. return FALSE;
  775. }
  776. // 时区信息
  777. dwByteLen = sizeof(regTZI);
  778. ErrorCode = RegQueryValueEx(hKey, TEXT("TZI"), NULL, NULL, reinterpret_cast<LPBYTE>(&regTZI), &dwByteLen);
  779. RegCloseKey(hKey);
  780. if ((ErrorCode != ERROR_SUCCESS) || (dwByteLen > sizeof(regTZI)))
  781. {
  782. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("RegQueryValueEx Software\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\China Standard Time\\TZI fail");
  783. return FALSE;
  784. }
  785. // 开启权限
  786. HANDLE hToken;
  787. TOKEN_PRIVILEGES tkp;
  788. BOOL isOK;
  789. if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &hToken))
  790. {
  791. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("OpenProcessToken Standard Time\\Dlt fail");
  792. return FALSE;
  793. }
  794. LookupPrivilegeValue(NULL, SE_TIME_ZONE_NAME, &tkp.Privileges[0].Luid);
  795. tkp.PrivilegeCount = 1;
  796. tkp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
  797. AdjustTokenPrivileges(hToken, FALSE, &tkp, 0, (PTOKEN_PRIVILEGES)NULL, 0);
  798. if (GetLastError() != ERROR_SUCCESS)
  799. {
  800. CloseHandle(hToken);
  801. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("AdjustTokenPrivileges fail");
  802. return FALSE;
  803. }
  804. // 设置新时区
  805. DYNAMIC_TIME_ZONE_INFORMATION tzi;
  806. tzi.Bias = regTZI.Bias;
  807. tzi.StandardDate = regTZI.StandardDate;
  808. tzi.StandardBias = regTZI.StandardBias;
  809. tzi.DaylightDate = regTZI.DaylightDate;
  810. tzi.DaylightBias = regTZI.DaylightBias;
  811. tzi.DynamicDaylightTimeDisabled = !isDaylightSavingTime;
  812. wcscpy(tzi.StandardName, ANSIToUnicode(szStandardName).c_str());
  813. wcscpy(tzi.DaylightName, ANSIToUnicode(szDaylightName).c_str());
  814. wcscpy(tzi.TimeZoneKeyName, ANSIToUnicode(szTimeZoneKeyName).c_str());
  815. isOK = SetDynamicTimeZoneInformation(&tzi); // 设置动态时区
  816. if (!isOK)
  817. {
  818. DbgWithLink(LOG_LEVEL_DEBUG, LOG_TYPE_SYSTEM)("SetDynamicTimeZoneInformation fail");
  819. }
  820. // 关闭权限
  821. tkp.Privileges[0].Attributes = 0;
  822. AdjustTokenPrivileges(hToken, FALSE, &tkp, 0, (PTOKEN_PRIVILEGES)NULL, 0);
  823. CloseHandle(hToken);
  824. return isOK;
  825. #else
  826. //temporarily not relased at linux
  827. return TRUE;
  828. #endif // RVC_OS_WIN
  829. }
  830. bool CAccessAuthEntity::IsMachineTypeConfigurePinPad(CSimpleStringA strMachineType)
  831. {
  832. CSmartPointer<IConfigInfo> spConfig;
  833. ErrorCodeEnum Error = GetFunction()->OpenConfig(Config_CenterSetting, spConfig);
  834. CSimpleStringA mcType = CSimpleStringA("CoreBootList.") + strMachineType;
  835. CSimpleStringA loaderConifg("");
  836. ErrorCodeEnum errCode = spConfig->ReadConfigValue("VtmLoader", mcType.GetData(), loaderConifg);
  837. if (errCode != Error_Succeed)
  838. {
  839. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("Get VtmLoader config failed!");
  840. }
  841. if (string(loaderConifg.GetData()).find("PinPad") != string::npos) //集中配置配了启动pinpad实体
  842. {
  843. return true;
  844. }
  845. else
  846. {
  847. return false;
  848. }
  849. }
  850. void CAccessAuthEntity::UpdateWK()
  851. {
  852. m_FSM.UpdateWK();
  853. }
  854. void CAccessAuthEntity::BeginInitMKACS()
  855. {
  856. LOG_FUNCTION();
  857. // 1:3des only; 2: sm4 only; 3: both 3des and sm4
  858. int nCapability = GetPinPadCapability();
  859. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("pinpad capability: %d", nCapability);
  860. CSmartPointer<IConfigInfo> spConfig;
  861. ErrorCodeEnum Error = GetFunction()->OpenConfig(Config_CenterSetting, spConfig);
  862. if (Error_Succeed == Error)
  863. {
  864. Error = spConfig->ReadConfigValue("AccessAuthorization", "HostInitUrl", m_strInitUrl);
  865. if (Error_Succeed != Error)
  866. {
  867. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("get InitUrl from CenterSetting failed");
  868. return;
  869. }
  870. } else {
  871. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("open InitUrl from CenterSetting.ini failed");
  872. return;
  873. }
  874. CSmartPointer<InitializerInitMKTask> initUpdateWKTask = new InitializerInitMKTask(&this->m_FSM, this);
  875. GetFunction()->PostThreadPoolTask(initUpdateWKTask.GetRawPointer());
  876. }
  877. bool CAccessAuthEntity::SendInitMKReqACS(CInitlizerMKReq& initMKReq)
  878. {
  879. LOG_FUNCTION();
  880. CSmartPointer<IEntityFunction> pFunc = GetFunction();
  881. ErrorCodeEnum nRet = Error_Unexpect;
  882. CBlob encInfo;
  883. char* hexStr = "21009872C31CBC00D0C8F421D09CF707";
  884. BYTE key[KEY_SIZE] = { 0 };
  885. memcpy(key, ConvertHexStrToBytes(hexStr), KEY_SIZE);
  886. //char key[KEY_SIZE] = { 0 };
  887. //memcpy(key, "1234567890123456234", KEY_SIZE);
  888. nRet = (ErrorCodeEnum)m_FSM.GetEncTerminalInfoWithKey(encInfo, key);
  889. if (nRet != Error_Succeed)
  890. {
  891. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("GetEncTerminalInfo failed:%d", nRet);
  892. return false;
  893. }
  894. char* pTmp = Str2Hex((char*)encInfo.m_pData, encInfo.m_iLength);
  895. initMKReq.iniTerminalInfo = pTmp;
  896. CSystemStaticInfo si;
  897. pFunc->GetSystemStaticInfo(si);
  898. initMKReq.terminalVersion = si.InstallVersion.ToString();
  899. initMKReq.terminalNo = si.strTerminalID.GetData();
  900. BYTE xPublicKey[148];
  901. int nBufLen = sizeof(xPublicKey);
  902. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("SendInitMKReqACS")("开始获取公钥。。。");
  903. memset(xPublicKey, 0, nBufLen);
  904. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("SendInitMKReqACS")("nBufLen=%d", nBufLen);
  905. if (!GetTerminalPublicKey(xPublicKey, nBufLen, initMKReq.publicKey))
  906. {
  907. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_PUBKEY,
  908. GetOutPutStr("%s%s", "GetTerminalPublicKey", "False").c_str());
  909. return false;
  910. }
  911. initMKReq.user = m_strUserID.GetData();
  912. if (!m_strUserID.IsNullOrEmpty() && !m_strPassword.IsNullOrEmpty())
  913. {
  914. LogWarn(Severity_Low, Error_Succeed, AccessAuthorization_UserErrorCode_Init_From_ClosePage, "Init by ClosePage.");
  915. initMKReq.loginWay = 1;
  916. }
  917. else
  918. {
  919. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("no need to call login again as User Desktop have logined.");
  920. initMKReq.loginWay = 0;
  921. }
  922. PinPadService_ClientBase* pPinPad = new PinPadService_ClientBase(this);
  923. auto errRc = pPinPad->Connect();
  924. if (errRc == Error_Succeed)
  925. {
  926. PinPadService_GetCheckCode_Req req = {};
  927. PinPadService_GetCheckCode_Ans ans = {};
  928. req.mSN.Init(1);
  929. req.wSN.Init(1);
  930. req.mSN[0] = 1;
  931. req.wSN[0] = 0;
  932. errRc = (*pPinPad)(EntityResource::getLink().upgradeLink())->GetCheckCode(req, ans, 10000);
  933. if (errRc == Error_Succeed)
  934. {
  935. initMKReq.curTpkKeyCheck = ans.checkcode[0].GetData();
  936. initMKReq.curKeyIndex = ans.index[0].GetData();
  937. }
  938. else
  939. {
  940. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("Get keyChek && keyIndex failed.");
  941. }
  942. pPinPad->GetFunction()->CloseSession();
  943. }
  944. else
  945. {
  946. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("connect to pinpad failed.error code:%d", errRc);
  947. }
  948. return true;
  949. }
  950. void CAccessAuthEntity::EndInitMK(DWORD rc, const char *pszErrMsg)
  951. {
  952. LOG_FUNCTION();
  953. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("EndInitMK:rc:%d,errMsg:%s", rc, pszErrMsg);
  954. GetFunction()->KillTimer(22);
  955. m_strLastErrMsg = pszErrMsg;
  956. if (rc != Error_Succeed)
  957. {
  958. LogWarn(Severity_Middle, Error_Unexpect, rc,
  959. GetOutPutStr("%s%08X%s%s", "EndInitMK", rc,"pszErrMsg", pszErrMsg).c_str());
  960. GetFunction()->ShowFatalError(pszErrMsg);
  961. }
  962. else
  963. {
  964. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("初始化成功。。。");
  965. }
  966. m_eErrNum = rc;
  967. bool bSuc = rc == Error_Succeed;
  968. // 通知UI窗口
  969. if (m_ctx != NULL) {
  970. m_ctx->Ans.Errcode = rc;
  971. m_ctx->Ans.ErrMsg = m_strLastErrMsg;
  972. m_ctx->Answer(Error_Succeed);
  973. }
  974. }
  975. ErrorCodeEnum CAccessAuthEntity::LoadKeysToPinPadACS(string TMK, string TPK, string EDK, string index, string tpkCheck, string edkCheck)
  976. {
  977. LOG_FUNCTION();
  978. //加载到密码键盘
  979. PinPadService_ClientBase* pPinPad = new PinPadService_ClientBase(this);
  980. auto rc = pPinPad->Connect();
  981. if (rc == Error_Succeed)
  982. {
  983. PinPadService_LoadKeysSM_Req req = {};
  984. req.initializeflag = true;
  985. req.smflag = 1;
  986. req.masterkey = TMK.c_str();
  987. req.workingkey1 = TPK.c_str();
  988. req.workingkey2 = EDK.c_str();
  989. req.reserved3 = index.c_str();
  990. req.reserved4 = tpkCheck.c_str();
  991. if (!req.initializeflag) DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM).setAPI("LoadKeysToPinPadACS")("initializeflag is false");
  992. PinPadService_LoadKeysSM_Ans ans = {};
  993. rc = pPinPad->LoadKeysSM(req, ans, 30000);
  994. if (rc != Error_Succeed)
  995. {
  996. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("load sm key to pinpad failed.");
  997. return Error_Unexpect;
  998. }
  999. pPinPad->GetFunction()->CloseSession();
  1000. }
  1001. else
  1002. {
  1003. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("connect to pinpad failed %x", rc);
  1004. return Error_Unexpect;
  1005. }
  1006. return Error_Succeed;
  1007. }
  1008. DWORD CAccessAuthEntity::InitDevice(SpReqAnsContext<AccessAuthService_InitDev_Req, AccessAuthService_InitDev_Ans>::Pointer& ctx)
  1009. {
  1010. return m_FSM.InitDevice(ctx);
  1011. }
  1012. void CAccessAuthEntity::GetNetMsg(SpReqAnsContext<AccessAuthService_GetNetMsg_Req, AccessAuthService_GetNetMsg_Ans>::Pointer& ctx)
  1013. {
  1014. m_FSM.GetNetMsg(ctx);
  1015. return;
  1016. }
  1017. bool CAccessAuthEntity::GenerateRandomNum()
  1018. {
  1019. LOG_FUNCTION();
  1020. const int MAX_KEY_SIZE = 256;
  1021. //get public key-->send random number --> set working key
  1022. int ret1, ret2, ret3, ret4;
  1023. unsigned int ram[4];
  1024. #ifdef RVC_OS_WIN
  1025. ret1 = rand_s(&ram[0]);
  1026. ret2 = rand_s(&ram[1]);
  1027. ret3 = rand_s(&ram[2]);
  1028. ret4 = rand_s(&ram[3]);
  1029. if ((ret1 != 0) || (ret2 != 0) || (ret3 != 0) || (ret4 != 0))
  1030. return false;
  1031. ZeroMemory(m_btRam, 16);
  1032. #else
  1033. ram[0] = rand();
  1034. ram[1] = rand();
  1035. ram[2] = rand();
  1036. ram[3] = rand();
  1037. memset(m_btRam, 0, 16);
  1038. #endif // RVC_OS_WIN
  1039. for (int i = 0, j = 0; j < 4; ++j)
  1040. {
  1041. m_btRam[i + 0] = ((ram[j] & 0xff000000) >> 24);
  1042. m_btRam[i + 1] = ((ram[j] & 0x00ff0000) >> 16);
  1043. m_btRam[i + 2] = ((ram[j] & 0x0000ff00) >> 8);
  1044. m_btRam[i + 3] = (ram[j] & 0x000000ff);
  1045. i += 4;
  1046. }
  1047. return true;
  1048. }
  1049. pair<string, string> CAccessAuthEntity::GenerateTmkToKMC()
  1050. {
  1051. LOG_FUNCTION();
  1052. if (!GenerateRandomNum())
  1053. return make_pair("", "");
  1054. #ifdef DEVOPS_ON_ST /*DevOps流水线编译,ST环境*/
  1055. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  1056. #elif defined(DEVOPS_ON_UAT)/*DevOps流水线编译,UAT环境*/
  1057. CSimpleStringA tmpPubKey = "040AEC50A1FC9C5E9B1162FE4520C9E18E6F471A3F6DB77B147F0A464B5BFD0EDBE08AE8377C458CA204456E7A86568AAA9240F1C843E47988A6A197B232539DC8";
  1058. #elif defined(DEVOPS_ON_PRD)/*DevOps流水线编译,PRD环境*/
  1059. CSimpleStringA tmpPubKey = "04E0A4FDA2484A1A0FAB0844F59110AEB7A08D314B5E451E816FC0E78CBA383B461474E1167B86FC48D704CB482DD5164A73AB9E019CCE26EE382B89C394B5ACE1";
  1060. #elif defined(DEVOPS_ON_DEV)/*DevOps流水线编译,Dev环境*/
  1061. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  1062. #else/*本地编译等非DevOps环境编译的版本*/
  1063. CSimpleStringA tmpPubKey = "0445FAF2B721207A39A9F3DEE3B3D89E2EF8924882968D31FC54FDA4F41D3D94AED4DA1B3C38B17193AD2952BD24407B7C01A80E65630A2FAD5073691613EAA814";
  1064. #endif
  1065. return EncryptedByPubKey(tmpPubKey);
  1066. }
  1067. pair<string, string> CAccessAuthEntity::EncryptedByPubKey(CSimpleStringA pubKey, bool bNeed04Head)
  1068. {
  1069. LOG_FUNCTION();
  1070. if (pubKey.GetLength() <= 0)
  1071. return make_pair("", "");
  1072. PCHAR strRam = new CHAR[512];
  1073. memset(strRam, 0, 512);
  1074. memcpy(strRam, &(m_btRam[0]), 16);
  1075. HexBuf2StrBuf((PBYTE)m_btRam, &strRam, 16);
  1076. const int MAX_KEY_SIZE = 256;
  1077. char random_enc_bypbk[MAX_KEY_SIZE];
  1078. memset(random_enc_bypbk, 0, MAX_KEY_SIZE);
  1079. //公钥加密随机数
  1080. int outMsgLen = MAX_KEY_SIZE;
  1081. PBYTE pxxKey = new BYTE[256];
  1082. PBYTE pOldPubKey = new BYTE[256];
  1083. memset(pOldPubKey, 0, 256);
  1084. memset(pxxKey, 0, 256);
  1085. int size = StrBuf2HexBuf(pubKey.GetData(), &pOldPubKey);
  1086. if (bNeed04Head)
  1087. {
  1088. pxxKey[0] = 0x04;
  1089. memcpy(pxxKey + 1, pOldPubKey, size);
  1090. }
  1091. else
  1092. memcpy(pxxKey, pOldPubKey, 65);
  1093. int retSM2 = EncWithSM2PubKey((unsigned char*)m_btRam, 16, (unsigned char*)random_enc_bypbk, &outMsgLen, (unsigned char*)pxxKey, 65);
  1094. if (!retSM2 || outMsgLen != 113)
  1095. {
  1096. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("EncWithSM2PubKey failed outMsgLen:%d.", outMsgLen);
  1097. return make_pair("", "");
  1098. }
  1099. PBYTE tmp_enc_bypbk = new BYTE[112];
  1100. memset(tmp_enc_bypbk, 0, 112);
  1101. if (bNeed04Head)
  1102. {
  1103. memcpy(tmp_enc_bypbk, &(random_enc_bypbk[1]), 112);
  1104. }
  1105. else
  1106. {
  1107. memcpy(tmp_enc_bypbk, &(random_enc_bypbk[1]), 64);
  1108. memcpy(tmp_enc_bypbk + 64, &(random_enc_bypbk[97]), 16);
  1109. memcpy(tmp_enc_bypbk + 80, &(random_enc_bypbk[65]), 32);
  1110. }
  1111. PCHAR pBlock = new CHAR[512];
  1112. memset(pBlock, 0, 512);
  1113. BYTE tmpRandomEnc[512];
  1114. memset(tmpRandomEnc, 0, 512);
  1115. memcpy(tmpRandomEnc, &(tmp_enc_bypbk[0]), outMsgLen - 1);
  1116. size = HexBuf2StrBuf((PBYTE)tmpRandomEnc, &pBlock, 112);
  1117. return make_pair(pBlock, strRam);
  1118. }
  1119. void CAccessAuthEntity::GetHardWareInfo()
  1120. {
  1121. std::map<std::string, std::string> errInfo;
  1122. //oilyang@20231008 to get system info from runcfg first
  1123. //no matter calculating from runcfg succeed or not,we also get system info from system api for update runcfg
  1124. bool bGetFromRunCfg = false;
  1125. CSimpleString csInfo, strErrMsg, strRet;
  1126. CSmartPointer<IConfigInfo> pConfigRun;
  1127. ErrorCodeEnum eErr = GetFunction()->OpenConfig(Config_Run, pConfigRun);
  1128. if (eErr == Error_Succeed && pConfigRun->ReadConfigValue("system", "info", csInfo) == Error_Succeed && !csInfo.IsNullOrEmpty()) {
  1129. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("read device info from runcfg: [%s]", csInfo.GetData());
  1130. CAutoArray<CSimpleStringA> sysInfo = csInfo.Split('|');
  1131. if (sysInfo.GetCount() == 3)
  1132. {
  1133. m_cpuId = sysInfo[0];
  1134. m_mainBoardId = sysInfo[1];
  1135. m_hardDiskId = sysInfo[2];
  1136. bGetFromRunCfg = true;
  1137. m_iGetTermSysInfo = 1;
  1138. }
  1139. else
  1140. {
  1141. m_iGetTermSysInfo = -1;
  1142. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setAPI("GetTerminalFingerPrint")("get sm3 hash as fingerprint fail");
  1143. }
  1144. }
  1145. else
  1146. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("GetTermSysInfo, OpenConfig Config_Run error=%d.", eErr);
  1147. #ifdef RVC_OS_LINUX
  1148. char szTmp[1024] = {};
  1149. string strTmp;
  1150. int nTmpBufLen = 1024;
  1151. CSimpleStringA runInfoPath;
  1152. auto rc = GetFunction()->GetPath("runinfo", runInfoPath);
  1153. if (rc != Error_Succeed) {
  1154. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("GetPath runinfo error=%d.", rc);
  1155. return;
  1156. }
  1157. runInfoPath += SPLIT_SLASH_STR "runcfg";
  1158. //CPU
  1159. if (!get_cpu_id_by_system(strTmp, runInfoPath.GetData()))
  1160. {
  1161. if (!bGetFromRunCfg)
  1162. {
  1163. errInfo["errcode"] = "RTA5213";
  1164. errInfo["msg"] = "调用系统api获取CPU序号失败";
  1165. errInfo["getLastErr"] = GetLastError();
  1166. m_cpuId = generateJsonStr(errInfo).second.c_str();
  1167. m_iGetTermSysInfo = -1;
  1168. }
  1169. strErrMsg = CSimpleStringA::Format("查询CPU ID失败,请重启机器并重新初始化");
  1170. SetAuthErrMsg((const char*)strErrMsg);
  1171. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1172. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1173. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5213")
  1174. (GetOutPutStr("%s%s", "Processor", "False").c_str());
  1175. return;
  1176. }
  1177. m_cpuId = strTmp.c_str();
  1178. strRet = strTmp.c_str();
  1179. strTmp.clear();
  1180. //主板
  1181. if (!get_board_serial_by_system(strTmp, runInfoPath.GetData()))
  1182. {
  1183. if (!bGetFromRunCfg)
  1184. {
  1185. errInfo["errcode"] = "RTA5214";
  1186. errInfo["msg"] = "调用系统api获取主板ID号失败";
  1187. errInfo["getLastErr"] = GetLastError();
  1188. m_mainBoardId = generateJsonStr(errInfo).second.c_str();
  1189. m_iGetTermSysInfo = -1;
  1190. }
  1191. strErrMsg = CSimpleStringA::Format("查询主板序列号失败, 请重启机器并重新初始化");
  1192. SetAuthErrMsg((const char*)strErrMsg);
  1193. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1194. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1195. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5214")
  1196. (GetOutPutStr("%s%s", "BaseBoard", "False").c_str());
  1197. return;
  1198. }
  1199. m_mainBoardId = strTmp.c_str();
  1200. strRet += "|";
  1201. strRet += strTmp.c_str();
  1202. //硬盘
  1203. vector<string> diskArr;
  1204. int errCode = 0;
  1205. if (!get_disk_serial_by_system(diskArr, errCode, runInfoPath.GetData()))
  1206. {
  1207. if (!bGetFromRunCfg)
  1208. {
  1209. errInfo["errcode"] = "RTA5215";
  1210. errInfo["msg"] = "调用系统api获取硬盘ID号失败";
  1211. errInfo["getLastErr"] = GetLastError();
  1212. m_hardDiskId = generateJsonStr(errInfo).second.c_str();
  1213. m_iGetTermSysInfo = -1;
  1214. }
  1215. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("get_disk_serial_by_system errCode:%d", errCode);
  1216. strErrMsg = CSimpleStringA::Format("查询磁盘序列号失败, 请重启机器并重新初始化");
  1217. SetAuthErrMsg((const char*)strErrMsg);
  1218. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1219. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1220. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5215")
  1221. (GetOutPutStr("%s%s", "DiskDrive", "False").c_str());
  1222. return;
  1223. }
  1224. strRet += "|";
  1225. strTmp = "";
  1226. vector<string>::iterator it = diskArr.begin();
  1227. while (it != diskArr.end()) {
  1228. strTmp += *it;
  1229. it++;
  1230. }
  1231. strRet += strTmp.c_str();
  1232. m_hardDiskId = strTmp.c_str();
  1233. #else
  1234. ULONGLONG ullStart = GetTickCount64();
  1235. char szTmp[1024] = {};
  1236. int nTmpBufLen = 1024;
  1237. if (!QueryWMIDevice(Processor, "ProcessorId", szTmp, &nTmpBufLen))
  1238. {
  1239. if (!bGetFromRunCfg)
  1240. {
  1241. errInfo["errcode"] = "RTA5213";
  1242. errInfo["msg"] = "调用系统api获取CPU序号失败";
  1243. errInfo["getLastErr"] = GetLastError();
  1244. m_cpuId = generateJsonStr(errInfo).second.c_str();
  1245. m_iGetTermSysInfo = -1;
  1246. }
  1247. strErrMsg = CSimpleStringA::Format("查询 cpu id 失败: %d, 请尝试重启应用", GetLastError());
  1248. SetAuthErrMsg((const char*)strErrMsg);
  1249. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1250. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1251. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5213")
  1252. (GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "Processor", GetLastError()).c_str());
  1253. return;
  1254. }
  1255. strRet = szTmp;
  1256. m_cpuId = szTmp;
  1257. nTmpBufLen = 1024;
  1258. memset(szTmp, 0, sizeof(szTmp));
  1259. if (!QueryWMIDevice(BaseBoard, "SerialNumber", szTmp, &nTmpBufLen))
  1260. {
  1261. if (!bGetFromRunCfg)
  1262. {
  1263. errInfo["errcode"] = "RTA5214";
  1264. errInfo["msg"] = "调用系统api获取主板ID号失败";
  1265. errInfo["getLastErr"] = GetLastError();
  1266. m_mainBoardId = generateJsonStr(errInfo).second.c_str();
  1267. m_iGetTermSysInfo = -1;
  1268. }
  1269. strErrMsg = CSimpleStringA::Format("查询 baseboard sn 失败: %d, 请尝试重启应用", GetLastError());
  1270. SetAuthErrMsg((const char*)strErrMsg);
  1271. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1272. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1273. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5214")
  1274. (GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "BaseBoard", GetLastError()).c_str());
  1275. return;
  1276. }
  1277. strRet += "|";
  1278. strRet += szTmp;
  1279. m_mainBoardId = szTmp;
  1280. nTmpBufLen = 1024;
  1281. memset(szTmp, 0, sizeof(szTmp));
  1282. if (!QueryWMIDevice(DiskDrive, "SerialNumber", szTmp, &nTmpBufLen))
  1283. {
  1284. if (!bGetFromRunCfg)
  1285. {
  1286. errInfo["errcode"] = "RTA5215";
  1287. errInfo["msg"] = "调用系统api获取硬盘ID号失败";
  1288. errInfo["getLastErr"] = GetLastError();
  1289. m_hardDiskId = generateJsonStr(errInfo).second.c_str();
  1290. m_iGetTermSysInfo = -1;
  1291. }
  1292. strErrMsg = CSimpleStringA::Format("查询 harddisk sn 失败: %d, 请尝试重启应用", GetLastError());
  1293. SetAuthErrMsg((const char*)strErrMsg);
  1294. LogWarn(Severity_Middle, Error_Unexpect, ERR_ACCESSAUTH_GET_TERMINAL_FINGERPRINT,
  1295. GetOutPutStr("%s%s%s%d", "QueryWMIDevice", "False", "DiskDrive", GetLastError()).c_str());
  1296. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5215")
  1297. (GetOutPutStr("%s%s", "DiskDrive", "False").c_str());
  1298. return;
  1299. }
  1300. strRet += "|";
  1301. strRet += szTmp;
  1302. m_hardDiskId = szTmp;
  1303. ULONGLONG ullEnd = GetTickCount64();
  1304. if (ullEnd - ullStart > 5000)
  1305. {
  1306. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM).setResultCode("RTA5201")
  1307. ("获取系统信息耗时过长:%d秒", (ullEnd - ullStart) / 1000);
  1308. LogWarn(Severity_Middle, Error_Unexpect, AccessAuthorization_UserErrorCode_GetTermCostTooLong,
  1309. CSimpleStringA::Format("获取系统信息耗时过长:%d秒", (ullEnd - ullStart) / 1000));
  1310. }
  1311. #endif // RVC_OS_LINUX
  1312. if (!bGetFromRunCfg || csInfo.Compare(strRet) != 0)
  1313. {
  1314. eErr = pConfigRun->WriteConfigValue("system", "info", strRet.GetData());
  1315. DbgWithLink(LOG_LEVEL_WARN, LOG_TYPE_SYSTEM)("device info changed,before[%s],current[%s],write to runcfg:%d"
  1316. , csInfo.GetData(), strRet.GetData(), eErr);
  1317. }
  1318. else
  1319. DbgWithLink(LOG_LEVEL_INFO, LOG_TYPE_SYSTEM)("device info: [%s]", strRet.GetData());
  1320. m_iGetTermSysInfo = 1;
  1321. return;
  1322. }
  1323. SP_BEGIN_ENTITY_MAP()
  1324. SP_ENTITY(CAccessAuthEntity)
  1325. SP_END_ENTITY_MAP()