Module_Authorize.c 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888
  1. /*
  2. * Module_Authorize.c
  3. *
  4. * Created on: 2021年11月16日
  5. * Author: 7978
  6. */
  7. #include <sys/time.h>
  8. #include <sys/timeb.h>
  9. #include <sys/types.h>
  10. #include <sys/stat.h>
  11. #include <sys/types.h>
  12. #include <sys/ioctl.h>
  13. #include <sys/socket.h>
  14. #include <sys/ipc.h>
  15. #include <sys/shm.h>
  16. #include <sys/shm.h>
  17. #include <sys/mman.h>
  18. #include <linux/can.h>
  19. #include <linux/can/raw.h>
  20. #include <linux/wireless.h>
  21. #include <arpa/inet.h>
  22. #include <netinet/in.h>
  23. #include <unistd.h>
  24. #include <stdarg.h>
  25. #include <stdio.h> /*標準輸入輸出定義*/
  26. #include <stdlib.h> /*標準函數庫定義*/
  27. #include <unistd.h> /*Unix 標準函數定義*/
  28. #include <fcntl.h> /*檔控制定義*/
  29. #include <termios.h> /*PPSIX 終端控制定義*/
  30. #include <errno.h> /*錯誤號定義*/
  31. #include <errno.h>
  32. #include <string.h>
  33. #include <time.h>
  34. #include <ctype.h>
  35. #include <ifaddrs.h>
  36. #include <signal.h>
  37. #include <net/if_arp.h>
  38. #include "../../define.h"
  39. #include "Module_Authorize.h"
  40. #include "Module_EvComm.h"
  41. #include "Config.h"
  42. #include "Common.h"
  43. #define AUTHORIZE_INTERVAL 100000 // unit: 1us
  44. #define AUTHORIZE_WAIT_OCPP_TIMEOUT 30 // unit: 1s
  45. #define SYS_AUTHORIZE_COMP_TIMEOUT 1 // unit: 1s
  46. #define AUTH_TIME_OFFSET_TIME 6 // unit: 1s
  47. #define AUTO_START_CHARGING "AutoStartCharging"
  48. #define DEFAULT_SN "NeedSetupSN"
  49. struct SysConfigAndInfo *ShmSysConfigAndInfo;
  50. ChargerInfoData *ShmChargerInfo;
  51. struct ChargingInfoData *chargingInfo[GENERAL_GUN_QUANTITY];
  52. struct OCPP16Data *ShmOCPP16Data;
  53. struct OCPP20Data *ShmOCPP20Data;
  54. struct timespec _SysAuth_Time;
  55. struct timespec _GunAuth_Time[GENERAL_GUN_QUANTITY];
  56. struct timespec _DispenserAuth_Time[GENERAL_GUN_QUANTITY];
  57. bool _isAutoStart = false;
  58. unsigned char _idType = _Type_ISO14443;
  59. unsigned char _preSysAuthStatus = 0;
  60. unsigned char _preGunAuthStatus[GENERAL_GUN_QUANTITY];
  61. unsigned char _preDispenserAuthStatus[GENERAL_GUN_QUANTITY];
  62. //==========================================
  63. // Init all share memory
  64. //==========================================
  65. int InitShareMemory(void)
  66. {
  67. int result = PASS;
  68. int MeterSMId;
  69. //creat ShmSysConfigAndInfo
  70. if ((MeterSMId = shmget(ShmSysConfigAndInfoKey, sizeof(struct SysConfigAndInfo), 0777)) < 0)
  71. {
  72. #ifdef SystemLogMessage
  73. LOG_ERROR("shmget ShmSysConfigAndInfo NG");
  74. #endif
  75. result = FAIL;
  76. }
  77. else if ((ShmSysConfigAndInfo = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  78. {
  79. #ifdef SystemLogMessage
  80. LOG_ERROR("shmat ShmSysConfigAndInfo NG");
  81. #endif
  82. result = FAIL;
  83. }
  84. else
  85. {
  86. }
  87. if ((MeterSMId = shmget(SM_ChargerInfoKey, sizeof(ChargerInfoData), 0777)) < 0)
  88. {
  89. #ifdef SystemLogMessage
  90. LOG_ERROR("shmat ChargerInfoData NG");
  91. #endif
  92. result = FAIL;
  93. }
  94. else if ((ShmChargerInfo = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  95. {
  96. #ifdef SystemLogMessage
  97. LOG_ERROR("shmat ChargerInfoData NG");
  98. #endif
  99. result = FAIL;
  100. }
  101. if ((MeterSMId = shmget(ShmOcppModuleKey, sizeof(struct OCPP16Data), 0777)) < 0)
  102. {
  103. #ifdef SystemLogMessage
  104. LOG_ERROR("shmat ShmOCPP16Data NG");
  105. #endif
  106. result = FAIL;
  107. }
  108. else if ((ShmOCPP16Data = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  109. {
  110. LOG_ERROR("shmat ShmOCPP16Data NG");
  111. result = FAIL;
  112. }
  113. if ((MeterSMId = shmget(ShmOcpp20ModuleKey, sizeof(struct OCPP20Data), 0777)) < 0)
  114. {
  115. LOG_ERROR("[main]CreatShareMemory:shmget OCPP20Data NG\n");
  116. result = FAIL;
  117. }
  118. else if ((ShmOCPP20Data = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  119. {
  120. LOG_ERROR("[main]CreatShareMemory:shmat OCPP20Data NG\n");
  121. result = FAIL;
  122. }
  123. return result;
  124. }
  125. void InitialConnector(void)
  126. {
  127. for(int i = 0; i < CONNECTOR_QUANTITY; i++)
  128. {
  129. chargingInfo[i] = &ShmSysConfigAndInfo->SysInfo.ConnectorInfo[i].GeneralChargingData;
  130. }
  131. }
  132. void Set_Connector_MiscCommand(int connector, int misc_cmd)
  133. {
  134. ShmChargerInfo->ConnectorMiscReq[connector].CtrlValue |= misc_cmd;
  135. }
  136. //===============================================
  137. // Ocpp Remote Start
  138. //===============================================
  139. bool Is_Ocpp_RemoteStartReq(int gun_index)
  140. {
  141. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_16)
  142. {
  143. return ShmOCPP16Data->CsMsg.bits[gun_index].RemoteStartTransactionReq == YES ? true : false;
  144. }
  145. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_20)
  146. {
  147. return ShmOCPP20Data->CsMsg.bits[gun_index].RequestStartTransactionReq == YES ? true : false;
  148. }
  149. return false;
  150. }
  151. void Clean_Ocpp_RemoteStartReq(int gun_index)
  152. {
  153. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_16)
  154. {
  155. ShmOCPP16Data->CsMsg.bits[gun_index].RemoteStartTransactionReq = false;
  156. return;
  157. }
  158. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_20)
  159. {
  160. ShmOCPP20Data->CsMsg.bits[gun_index].RequestStartTransactionReq = false;
  161. return;
  162. }
  163. }
  164. void Get_Ocpp_RemoteStartIdTag(int gun_index, char *idTag)
  165. {
  166. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_16)
  167. {
  168. strcpy(idTag, (char *)&ShmOCPP16Data->RemoteStartTransaction[gun_index].IdTag[0]);
  169. return;
  170. }
  171. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_20)
  172. {
  173. strcpy(idTag, (char *)&ShmOCPP20Data->RequestStartTransaction[gun_index].idToken.idToken[0]);
  174. return;
  175. }
  176. strcpy(idTag, "");
  177. }
  178. //===============================================
  179. // Ocpp AuthorizeRemoteTxRequests
  180. //===============================================
  181. bool Is_Ocpp_AuthorizeRemoteTxRequests(void)
  182. {
  183. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_16)
  184. {
  185. return strstr((char *)ShmOCPP16Data->ConfigurationTable.CoreProfile[AuthorizeRemoteTxRequests].ItemData, "TRUE") > 0 ? true : false;
  186. }
  187. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_20)
  188. {
  189. return strstr((char *)ShmOCPP20Data->ControllerComponentVariable[AuthCtrlr_AuthorizeRemoteStart].variableAttribute[0].value, "TRUE") > 0 ? true : false;
  190. }
  191. return false;
  192. }
  193. //===============================================
  194. // Ocpp AuthorizeReq
  195. //===============================================
  196. void Set_Ocpp_AuthorizeReq(void)
  197. {
  198. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_16)
  199. {
  200. ShmOCPP16Data->SpMsg.bits.AuthorizeConf = false;
  201. ShmOCPP16Data->SpMsg.bits.AuthorizeReq = true;
  202. return;
  203. }
  204. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_20)
  205. {
  206. ShmOCPP20Data->SpMsg.bits.AuthorizeConf = false;
  207. ShmOCPP20Data->SpMsg.bits.AuthorizeReq = true;
  208. return;
  209. }
  210. }
  211. bool Is_Ocpp_AuthorizeConf(void)
  212. {
  213. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_16)
  214. {
  215. return ShmOCPP16Data->SpMsg.bits.AuthorizeConf == YES ? true : false;
  216. }
  217. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_20)
  218. {
  219. return ShmOCPP20Data->SpMsg.bits.AuthorizeConf == YES ? true : false;
  220. }
  221. return false;
  222. }
  223. bool Is_Ocpp_Authorize_Status(char *status)
  224. {
  225. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_16)
  226. {
  227. return strcmp((char *)ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status, status) == EQUAL ? true : false;
  228. }
  229. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_20)
  230. {
  231. return strcmp((char *)ShmOCPP20Data->Authorize.Response_idTokenInfo.status, status) == EQUAL ? true : false;
  232. }
  233. return false;
  234. }
  235. //===============================================
  236. // Ocpp >Authorize.idToken.type
  237. //===============================================
  238. void Set_Ocpp_AuthorizeIdType(unsigned char type)
  239. {
  240. char *str_IdType[] = {
  241. STR_ID_TYPE_CENTRAL,
  242. STR_ID_TYPE_EMAID,
  243. STR_ID_TYPE_ISO14443,
  244. STR_ID_TYPE_ISO15693,
  245. STR_ID_TYPE_KEYCODE,
  246. STR_ID_TYPE_LOCAL,
  247. STR_ID_TYPE_MAC_ADDRESS,
  248. STR_ID_TYPE_NO_AUTHORIZATION};
  249. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_16)
  250. {
  251. }
  252. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_20)
  253. {
  254. strncpy((char *)ShmOCPP20Data->Authorize.idToken.type, str_IdType[type], sizeof(ShmOCPP20Data->Authorize.idToken.type));
  255. ShmOCPP20Data->Authorize.idToken.type[sizeof(ShmOCPP20Data->Authorize.idToken.type) - 1] = '\0';
  256. }
  257. }
  258. //===============================================
  259. // Ocpp Reserve Now
  260. //===============================================
  261. void Get_Ocpp_ReserveNowIdTag(int gun_index, char *idTag)
  262. {
  263. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_16)
  264. {
  265. strcpy(idTag, (char *)ShmOCPP16Data->ReserveNow[gun_index].IdTag);
  266. return;
  267. }
  268. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_20)
  269. {
  270. strcpy(idTag, (char *)ShmOCPP20Data->ReserveNow[gun_index].idToken.idToken);
  271. return;
  272. }
  273. strcpy(idTag, "");
  274. return;
  275. }
  276. bool Is_Ocpp_ReserveNowIdTag(uint8_t gun_index, char *authIdTag)
  277. {
  278. char ReserveIdTag[32];
  279. Get_Ocpp_ReserveNowIdTag(gun_index, ReserveIdTag);
  280. return strcmp(ReserveIdTag, authIdTag) == EQUAL ? true : false;
  281. }
  282. //===============================================
  283. // Ocpp Freevend Idtag
  284. //===============================================
  285. bool Get_Ocpp_FreevendIdtag(char *idTag)
  286. {
  287. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_16)
  288. {
  289. strcpy(idTag, (char *)ShmOCPP16Data->ConfigurationTable.CoreProfile[FreeVendIdtag].ItemData);
  290. return true;
  291. }
  292. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_20)
  293. {
  294. strcpy(idTag, (char *)ShmOCPP20Data->ControllerComponentVariable[ChargingStation_FreeVendIdtag].variableAttribute[0].value);
  295. return true;
  296. }
  297. strcpy(idTag, "");
  298. return false;
  299. }
  300. //===============================================
  301. // Ocpp EVCCID_PREFIX
  302. //===============================================
  303. void Get_Ocpp_EVCCID_Prefix(char *prefix)
  304. {
  305. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_16)
  306. {
  307. strcpy(prefix, (char *)ShmOCPP16Data->ConfigurationTable.CoreProfile[EVCCID_PREFIX].ItemData);
  308. return;
  309. }
  310. if(ShmSysConfigAndInfo->SysInfo.OcppRunningVer == OCPP_RUNNING_VERSION_20)
  311. {
  312. strcpy(prefix, "");
  313. return;
  314. }
  315. strcpy(prefix, "");
  316. }
  317. void SetAuthorize(AuthorizingInfoData *AuthInfo, unsigned char type)
  318. {
  319. if(AuthInfo->AuthIdType == _Type_MacAddress)
  320. {
  321. char prefix[501];
  322. char evccid[501 + 32];
  323. memset(prefix, 0x00, sizeof(prefix));
  324. memset(evccid, 0x00, sizeof(evccid));
  325. Get_Ocpp_EVCCID_Prefix(prefix);
  326. sprintf(evccid, "%s%s", prefix, (char *)&AuthInfo->AuthId);
  327. AUTH_INFO("*********** EVCCID [%s] ***********", evccid);
  328. }
  329. else if(strcmp((char *)&AuthInfo->AuthId, AUTO_START_CHARGING) == EQUAL)
  330. {
  331. Get_Ocpp_FreevendIdtag((char *)&AuthInfo->AuthId);
  332. _isAutoStart = true;
  333. AUTH_INFO("*********** FreevendId [%s] ***********", (char *)&AuthInfo->AuthId);
  334. }
  335. memcpy(ShmSysConfigAndInfo->SysConfig.UserId, AuthInfo->AuthId, 32);
  336. AuthInfo->AuthStatus = _AuthorizeStatus_Busy;
  337. AuthInfo->AuthType = type;
  338. if(type == _AuthType_RemoteStart)
  339. {
  340. AuthInfo->AuthIdType = _Type_Central;
  341. }
  342. else if(_isAutoStart)
  343. {
  344. AuthInfo->AuthIdType = _Type_NoAuthorization;
  345. }
  346. ShmSysConfigAndInfo->SysInfo.AuthorizedTarget = AuthInfo->AuthTarget;
  347. ShmSysConfigAndInfo->SysInfo.AuthorizedType = type;
  348. _idType = AuthInfo->AuthIdType;
  349. }
  350. void CheckAutoStartChargingToSNToOcpp(void)
  351. {
  352. if(strcmp((char *)&ShmSysConfigAndInfo->SysConfig.UserId, AUTO_START_CHARGING) == EQUAL)
  353. {
  354. int len = strlen((char *)&ShmSysConfigAndInfo->SysConfig.SerialNumber);
  355. if(len > 0 && len < sizeof(ShmSysConfigAndInfo->SysConfig.UserId))
  356. {
  357. strcpy((char *)&ShmSysConfigAndInfo->SysConfig.UserId, (char *)&ShmSysConfigAndInfo->SysConfig.SerialNumber);
  358. }
  359. else
  360. {
  361. strcpy((char *)&ShmSysConfigAndInfo->SysConfig.UserId, DEFAULT_SN);
  362. }
  363. AUTH_INFO("Received Auto Start Charging IdTag, Set SN [%s] To Authorize", ShmSysConfigAndInfo->SysConfig.UserId);
  364. }
  365. }
  366. bool IsRemoteStartRequest(int *connector)
  367. {
  368. AuthorizingInfoData *AuthInfo;
  369. // remote start check
  370. for(int index = 0; index < GENERAL_GUN_QUANTITY; index++)
  371. {
  372. if(Is_Ocpp_RemoteStartReq(index))
  373. {
  374. AuthInfo = &ShmSysConfigAndInfo->SysInfo.ConnectorInfo[index].AuthInfo;
  375. AuthInfo->AuthTarget = index + 1;
  376. Get_Ocpp_RemoteStartIdTag(index, (char *)AuthInfo->AuthId);
  377. SetAuthorize(AuthInfo, _AuthType_RemoteStart);
  378. Clean_Ocpp_RemoteStartReq(index);
  379. AuthInfo->AuthRequest = NO;
  380. *connector = index;
  381. return true;
  382. }
  383. }
  384. return false;
  385. }
  386. bool IsAuthorizingRequest(int *connector)
  387. {
  388. AuthorizingInfoData *AuthInfo;
  389. // connector authorize check
  390. for(int index = 0; index < GENERAL_GUN_QUANTITY; index++)
  391. {
  392. AuthInfo = &ShmSysConfigAndInfo->SysInfo.ConnectorInfo[index].AuthInfo;
  393. if(AuthInfo->AuthStatus == _AuthorizeStatus_Idle && AuthInfo->AuthRequest == YES)
  394. {
  395. if(strlen((char *)AuthInfo->AuthId) > 0)
  396. {
  397. SetAuthorize(AuthInfo, _AuthType_RFID);
  398. AuthInfo->AuthRequest = NO;
  399. *connector = index;
  400. return true;
  401. }
  402. }
  403. }
  404. return false;
  405. }
  406. bool IsDispenserAuthorizingRequest(int *dispenser)
  407. {
  408. AuthorizingInfoData *AuthInfo;
  409. // AUTO_GUN_SELECTION authorize check
  410. for(int index = 0; index < GENERAL_GUN_QUANTITY; index++)
  411. {
  412. AuthInfo = &ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[index].AuthInfo;
  413. if(AuthInfo->AuthStatus == _AuthorizeStatus_Idle && AuthInfo->AuthRequest == YES)
  414. {
  415. if(strlen((char *)AuthInfo->AuthId) > 0)
  416. {
  417. SetAuthorize(AuthInfo, _AuthType_RFID);
  418. AuthInfo->AuthRequest = NO;
  419. *dispenser = index;
  420. return true;
  421. }
  422. }
  423. }
  424. return false;
  425. }
  426. unsigned char Chk_OfflinePolicy(char *idTag)
  427. {
  428. if(ShmSysConfigAndInfo->SysConfig.OfflinePolicy == _OFFLINE_POLICY_NO_CHARGING)
  429. {
  430. AUTH_INFO("*********** Offline Policy [No Charging] ***********");
  431. return _AuthResult_Invalid;
  432. }
  433. else if(ShmSysConfigAndInfo->SysConfig.OfflinePolicy == _OFFLINE_POLICY_FREE_CHARGING)
  434. {
  435. // set authorize pass when offline policy is free charge
  436. AUTH_INFO("*********** Offline Policy [Free Charging] ***********");
  437. return _AuthResult_Valid;
  438. }
  439. else if(ShmSysConfigAndInfo->SysConfig.OfflinePolicy == _OFFLINE_POLICY_LOCAL_LIST)
  440. {
  441. BOOL find = false;
  442. // check white list
  443. for(int i = 0; i < 10; i++)
  444. {
  445. if(strcmp((char *)ShmSysConfigAndInfo->SysConfig.LocalWhiteCard[i], "") != EQUAL)
  446. {
  447. if(strcmp((char *)ShmSysConfigAndInfo->SysConfig.LocalWhiteCard[i], idTag) == EQUAL)
  448. {
  449. find = true;
  450. AUTH_INFO("*********** [White Card OK] ***********");
  451. break;
  452. }
  453. }
  454. }
  455. AUTH_INFO("*********** Local Authorization %s ***********", find ? "OK" : "NG");
  456. if(find)
  457. {
  458. return _AuthResult_Valid;
  459. }
  460. else
  461. {
  462. return _AuthResult_Invalid;
  463. }
  464. }
  465. else
  466. {
  467. AUTH_INFO("*********** [Invalid Policy] ***********");
  468. return _AuthResult_Invalid;
  469. }
  470. return _AuthResult_Invalid;
  471. }
  472. void SysAuthInitial(void)
  473. {
  474. memset(ShmSysConfigAndInfo->SysConfig.UserId, 0x00, 32);
  475. ShmSysConfigAndInfo->SysInfo.AuthorizedDispenser = 0;
  476. ShmSysConfigAndInfo->SysInfo.AuthorizedTarget = 0;
  477. ShmSysConfigAndInfo->SysInfo.AuthorizedType = _AuthResult_None;
  478. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_Idle;
  479. }
  480. void AuthTimeoutProcess(void)
  481. {
  482. int timeout = 0;
  483. for(int index = 0; index < GENERAL_GUN_QUANTITY; index++)
  484. {
  485. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[index].AuthInfo.AuthStatus == _AuthorizeStatus_End)
  486. {
  487. if(_preGunAuthStatus[index] != ShmSysConfigAndInfo->SysInfo.ConnectorInfo[index].AuthInfo.AuthStatus)
  488. {
  489. GetClockTime(&_GunAuth_Time[index]);
  490. }
  491. timeout = ShmSysConfigAndInfo->SysInfo.ConnectorInfo[index].AuthInfo.AuthStatus == _AuthResult_Valid ?
  492. ShmChargerInfo->CabinetMiscValue.ConnectionTimeout : AUTHORIZE_COMPLETED_TIME;
  493. timeout += AUTH_TIME_OFFSET_TIME;
  494. if(GetTimeoutValue(_GunAuth_Time[index]) / uSEC_VAL >= timeout)
  495. {
  496. AUTH_INFO("*********** Gun %d Authorizing Initial ***********", index + 1);
  497. memset(&ShmSysConfigAndInfo->SysInfo.ConnectorInfo[index].AuthInfo, 0x00, sizeof(AuthorizingInfoData));
  498. }
  499. }
  500. _preGunAuthStatus[index] = ShmSysConfigAndInfo->SysInfo.ConnectorInfo[index].AuthInfo.AuthStatus;
  501. }
  502. for(int index = 0; index < GENERAL_GUN_QUANTITY; index++)
  503. {
  504. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[index].AuthInfo.AuthStatus == _AuthorizeStatus_End)
  505. {
  506. if(_preDispenserAuthStatus[index] != ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[index].AuthInfo.AuthStatus)
  507. {
  508. GetClockTime(&_DispenserAuth_Time[index]);
  509. }
  510. timeout = ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[index].AuthInfo.AuthResult == _AuthResult_Valid ?
  511. ShmChargerInfo->CabinetMiscValue.ConnectionTimeout : AUTHORIZE_COMPLETED_TIME;
  512. timeout += AUTH_TIME_OFFSET_TIME;
  513. if(GetTimeoutValue(_DispenserAuth_Time[index]) / uSEC_VAL >= timeout)
  514. {
  515. AUTH_INFO("*********** Dispenser %d Authorizing Initial ***********", index + 1);
  516. memset(&ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[index].AuthInfo, 0x00, sizeof(AuthorizingInfoData));
  517. }
  518. }
  519. _preDispenserAuthStatus[index] = ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[index].AuthInfo.AuthStatus;
  520. }
  521. }
  522. int main(void)
  523. {
  524. int _dispenser = 0, _connector = 0;
  525. unsigned char _authResult = _AuthResult_None;
  526. bool _autoSelection = false;
  527. bool _needOcppAuthorize = false;
  528. bool _keepRun = false;
  529. if(InitShareMemory() == FAIL)
  530. {
  531. #ifdef SystemLogMessage
  532. LOG_ERROR("InitShareMemory NG");
  533. #endif
  534. sleep(5);
  535. return 0;
  536. }
  537. InitialConnector();
  538. _isAutoStart = false;
  539. _idType = _Type_ISO14443;
  540. while(1)
  541. {
  542. _keepRun = false;
  543. AuthTimeoutProcess();
  544. switch(ShmSysConfigAndInfo->SysInfo.AuthorizedStatus)
  545. {
  546. case _AuthorizeStatus_Idle:
  547. if(_preSysAuthStatus != ShmSysConfigAndInfo->SysInfo.AuthorizedStatus)
  548. {
  549. AUTH_INFO("[SysAuthStatus Idle]");
  550. _preSysAuthStatus = ShmSysConfigAndInfo->SysInfo.AuthorizedStatus;
  551. _authResult = _AuthResult_None;
  552. _autoSelection = false;
  553. _isAutoStart = false;
  554. _idType = _Type_ISO14443;
  555. }
  556. if(IsRemoteStartRequest(&_connector))
  557. {
  558. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_Wait;
  559. _keepRun = true;
  560. AUTH_INFO("Gun %d Remote Start Authorize", _connector + 1);
  561. break;
  562. }
  563. if(IsAuthorizingRequest(&_connector))
  564. {
  565. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_Wait;
  566. _keepRun = true;
  567. AUTH_INFO("Gun %d RFID Authorize", _connector + 1);
  568. break;
  569. }
  570. if(IsDispenserAuthorizingRequest(&_dispenser))
  571. {
  572. _autoSelection = true;
  573. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_Wait;
  574. _keepRun = true;
  575. AUTH_INFO("Dispenser %d AutoSelection Authorize", _dispenser + 1);
  576. break;
  577. }
  578. break;
  579. case _AuthorizeStatus_Wait:
  580. if(_preSysAuthStatus != ShmSysConfigAndInfo->SysInfo.AuthorizedStatus)
  581. {
  582. AUTH_INFO("[SysAuthStatus Wait]");
  583. _preSysAuthStatus = ShmSysConfigAndInfo->SysInfo.AuthorizedStatus;
  584. }
  585. _needOcppAuthorize = false;
  586. if(ShmSysConfigAndInfo->SysInfo.AuthorizedType == _AuthType_RemoteStart)
  587. {
  588. if(Is_Ocpp_AuthorizeRemoteTxRequests())
  589. {
  590. _needOcppAuthorize = true;
  591. }
  592. else
  593. {
  594. AUTH_INFO("*********** Gun %d Remote Start Authorizing Bypass ***********",
  595. ShmSysConfigAndInfo->SysInfo.AuthorizedTarget);
  596. _authResult = _AuthResult_Valid;
  597. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_Done;
  598. _keepRun = true;
  599. break;
  600. }
  601. }
  602. else if(ShmSysConfigAndInfo->SysInfo.AuthorizedType == _AuthType_RFID)
  603. {
  604. if(ShmSysConfigAndInfo->SysInfo.OcppConnStatus &&
  605. ShmSysConfigAndInfo->SysConfig.AuthorisationMode == AUTH_MODE_ENABLE &&
  606. !ShmChargerInfo->AuthInfo.AuthMode.bits.AutoStartEnable)
  607. {
  608. _needOcppAuthorize = true;
  609. }
  610. else
  611. {
  612. if(_isAutoStart)
  613. {
  614. if(ShmChargerInfo->AuthInfo.AuthMode.bits.AutoStartEnable ||
  615. ShmSysConfigAndInfo->SysConfig.AuthorisationMode == AUTH_MODE_DISABLE)
  616. {
  617. _authResult = _AuthResult_Valid;
  618. AUTH_INFO("******** [Auto Start Charging Enable] ********");
  619. }
  620. else
  621. {
  622. _authResult = _AuthResult_Invalid;
  623. AUTH_INFO("******** [Auto Start Charging Result Fail] ********");
  624. }
  625. }
  626. else
  627. {
  628. _authResult = Chk_OfflinePolicy((char *)ShmSysConfigAndInfo->SysConfig.UserId);
  629. }
  630. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_Done;
  631. _keepRun = true;
  632. break;
  633. }
  634. }
  635. if(_needOcppAuthorize)
  636. {
  637. //CheckAutoStartChargingToSNToOcpp();
  638. Set_Ocpp_AuthorizeIdType(_idType);
  639. Set_Ocpp_AuthorizeReq();
  640. AUTH_INFO("*********** Set OPCC AuthorizeReq ***********");
  641. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_Busy;
  642. }
  643. break;
  644. case _AuthorizeStatus_Busy:
  645. if(_preSysAuthStatus != ShmSysConfigAndInfo->SysInfo.AuthorizedStatus)
  646. {
  647. AUTH_INFO("[SysAuthStatus Busy]");
  648. _preSysAuthStatus = ShmSysConfigAndInfo->SysInfo.AuthorizedStatus;
  649. GetClockTime(&_SysAuth_Time);
  650. }
  651. if(GetTimeoutValue(_SysAuth_Time) / uSEC_VAL >= AUTHORIZE_WAIT_OCPP_TIMEOUT)
  652. {
  653. AUTH_INFO("*********** Ocpp Authorizing Timeout ***********");
  654. _authResult = _AuthResult_Invalid;
  655. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_Done;
  656. _keepRun = true;
  657. break;
  658. }
  659. else
  660. {
  661. if(ShmSysConfigAndInfo->SysInfo.OcppConnStatus)
  662. {
  663. if(Is_Ocpp_AuthorizeConf())
  664. {
  665. BOOL accept = false;
  666. if(Is_Ocpp_Authorize_Status("Accepted"))
  667. {
  668. accept = true;
  669. }
  670. AUTH_INFO("*********** OCPP Authorize %s ***********", accept ? "OK" : "NG");
  671. _authResult = accept ? _AuthResult_Valid : _AuthResult_Invalid;
  672. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_Done;
  673. _keepRun = true;
  674. break;
  675. }
  676. }
  677. else
  678. {
  679. AUTH_INFO("*********** OCPP Authorize Disconnected ***********");
  680. _authResult = Chk_OfflinePolicy((char *)ShmSysConfigAndInfo->SysConfig.UserId);
  681. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_Done;
  682. _keepRun = true;
  683. break;
  684. }
  685. }
  686. break;
  687. case _AuthorizeStatus_Done:
  688. if(_preSysAuthStatus != ShmSysConfigAndInfo->SysInfo.AuthorizedStatus)
  689. {
  690. AUTH_INFO("[SysAuthStatus Done]");
  691. _preSysAuthStatus = ShmSysConfigAndInfo->SysInfo.AuthorizedStatus;
  692. GetClockTime(&_SysAuth_Time);
  693. }
  694. if(_autoSelection)
  695. {
  696. AUTH_INFO("*********** Dispense %d RFID Authorize %s ***********", _dispenser + 1, _authResult == _AuthResult_Valid ? "OK" : "NG");
  697. if(_authResult == _AuthResult_Valid)
  698. {
  699. if(strcmp((char *)ShmSysConfigAndInfo->SysConfig.UserId, AUTO_START_CHARGING) == EQUAL)
  700. {
  701. sprintf((char*)ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[_dispenser].AuthInfo.AuthId, "%s",
  702. ShmSysConfigAndInfo->SysConfig.SerialNumber);
  703. }
  704. }
  705. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[_dispenser].AuthInfo.AuthResult = _authResult;
  706. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[_dispenser].AuthInfo.AuthStatus = _AuthorizeStatus_End;
  707. }
  708. else
  709. {
  710. unsigned char connector = 0;
  711. connector = ShmSysConfigAndInfo->SysInfo.AuthorizedTarget - 1;
  712. if(chargingInfo[connector]->SystemStatus == S_IDLE && _authResult == _AuthResult_Valid)
  713. {
  714. if(strcmp((char *)ShmSysConfigAndInfo->SysConfig.UserId, AUTO_START_CHARGING) == EQUAL)
  715. {
  716. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%s", ShmSysConfigAndInfo->SysConfig.SerialNumber);
  717. }
  718. memcpy(chargingInfo[connector]->StartUserId, ShmSysConfigAndInfo->SysConfig.UserId, 32);
  719. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[connector].AuthInfo.AuthType == _AuthType_RFID)
  720. {
  721. AUTH_INFO("*********** Gun %d RFID Authorize %s ***********", connector + 1, _authResult == _AuthResult_Valid ? "OK" : "NG");
  722. }
  723. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[connector].AuthInfo.AuthType == _AuthType_RemoteStart)
  724. {
  725. AUTH_INFO("*********** Gun %d RemoteAuthorize %s ***********", connector + 1, _authResult == _AuthResult_Valid ? "OK" : "NG");
  726. Set_Connector_MiscCommand(connector, MISC_CONN_REMOTE_START);
  727. }
  728. }
  729. else if(chargingInfo[connector]->SystemStatus == S_RESERVATION && _authResult == _AuthResult_Valid)
  730. {
  731. _authResult = Is_Ocpp_ReserveNowIdTag(connector, (char *)ShmSysConfigAndInfo->SysInfo.ConnectorInfo[connector].AuthInfo.AuthId) ? _AuthResult_Valid : _AuthResult_Invalid;
  732. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[connector].AuthInfo.AuthType == _AuthType_RFID)
  733. {
  734. AUTH_INFO("*********** Gun %d RFID Reserve Authorize %s ***********", connector + 1, _authResult == _AuthResult_Valid ? "OK" : "NG");
  735. }
  736. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[connector].AuthInfo.AuthType == _AuthType_RemoteStart)
  737. {
  738. AUTH_INFO("*********** Gun %d Reserve RemoteAuthorize %s ***********", connector + 1, _authResult == _AuthResult_Valid ? "OK" : "NG");
  739. Set_Connector_MiscCommand(connector, MISC_CONN_REMOTE_START);
  740. }
  741. }
  742. else if(chargingInfo[connector]->SystemStatus == S_AUTHORIZING && _authResult == _AuthResult_Valid)
  743. {
  744. if(strcmp((char *)chargingInfo[connector]->StartUserId, (char *)ShmSysConfigAndInfo->SysConfig.UserId) == EQUAL)
  745. {
  746. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[connector].AuthInfo.AuthType == _AuthType_RFID)
  747. {
  748. AUTH_INFO("*********** Gun %d RFID Authorize Already OK ***********", connector + 1);
  749. }
  750. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[connector].AuthInfo.AuthType == _AuthType_RemoteStart)
  751. {
  752. AUTH_INFO("*********** Gun %d RemoteAuthorize Already OK ***********", connector + 1);
  753. }
  754. }
  755. else
  756. {
  757. _authResult = _AuthResult_Invalid;
  758. }
  759. }
  760. else
  761. {
  762. AUTH_INFO("*********** Gun %d Authorize %s Status Fail (%d) ***********",
  763. connector + 1, _authResult == _AuthResult_Valid ? "OK But" : "NG Or", chargingInfo[connector]->SystemStatus);
  764. _authResult = _AuthResult_Invalid;
  765. }
  766. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[connector].AuthInfo.AuthResult = _authResult;
  767. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[connector].AuthInfo.AuthStatus = _AuthorizeStatus_End;
  768. }
  769. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_End;
  770. break;
  771. case _AuthorizeStatus_End:
  772. if(_preSysAuthStatus != ShmSysConfigAndInfo->SysInfo.AuthorizedStatus)
  773. {
  774. AUTH_INFO("[SysAuthStatus End]");
  775. _preSysAuthStatus = ShmSysConfigAndInfo->SysInfo.AuthorizedStatus;
  776. GetClockTime(&_SysAuth_Time);
  777. }
  778. if(GetTimeoutValue(_SysAuth_Time) / uSEC_VAL >= SYS_AUTHORIZE_COMP_TIMEOUT)
  779. {
  780. AUTH_INFO("*********** PowerCabinet Authorize Completed ***********");
  781. SysAuthInitial();
  782. }
  783. break;
  784. default:
  785. if(_preSysAuthStatus != ShmSysConfigAndInfo->SysInfo.AuthorizedStatus)
  786. {
  787. AUTH_INFO("[SysAuthStatus Unknown]");
  788. _preSysAuthStatus = ShmSysConfigAndInfo->SysInfo.AuthorizedStatus;
  789. }
  790. ShmSysConfigAndInfo->SysInfo.AuthorizedStatus = _AuthorizeStatus_End;
  791. break;
  792. }
  793. if(!_keepRun)
  794. {
  795. usleep(AUTHORIZE_INTERVAL);
  796. }
  797. }
  798. return 0;
  799. }