pyztk/zk/base.py

260 lines
8.1 KiB
Python
Raw Normal View History

2016-05-23 13:50:54 +07:00
# -*- coding: utf-8 -*-
from struct import pack, unpack
from socket import socket, AF_INET, SOCK_DGRAM
from zk import const
class ZK(object):
__data_recv = None
def __init__(self, ip, port=4370, timeout=5):
self.__address = (ip, port)
self.__sock = socket(AF_INET, SOCK_DGRAM)
self.__sock.settimeout(timeout)
2016-05-23 23:59:43 +07:00
def __create_header(self, command, checksum=0, session_id=0, reply_id=65534, command_string=''):
2016-05-23 13:50:54 +07:00
'''
Puts a the parts that make up a packet together and packs them into a byte string
'''
2016-05-23 23:59:43 +07:00
buf = pack('HHHH', command, checksum, session_id, reply_id) + command_string
2016-05-23 13:50:54 +07:00
buf = unpack('8B'+'%sB' % len(command_string), buf)
2016-05-23 23:59:43 +07:00
checksum = unpack('H', self.__create_checksum(buf))[0]
2016-05-23 13:50:54 +07:00
reply_id += 1
if reply_id >= const.USHRT_MAX:
reply_id -= const.USHRT_MAX
2016-05-23 23:59:43 +07:00
buf = pack('HHHH', command, checksum, session_id, reply_id)
2016-05-23 13:50:54 +07:00
return buf + command_string
def __create_checksum(self, p):
'''
2016-05-23 23:59:43 +07:00
Calculates the checksum of the packet to be sent to the time clock
2016-05-23 13:50:54 +07:00
Copied from zkemsdk.c
'''
l = len(p)
2016-05-23 23:59:43 +07:00
checksum = 0
2016-05-23 13:50:54 +07:00
while l > 1:
2016-05-23 23:59:43 +07:00
checksum += unpack('H', pack('BB', p[0], p[1]))[0]
2016-05-23 13:50:54 +07:00
p = p[2:]
2016-05-23 23:59:43 +07:00
if checksum > const.USHRT_MAX:
checksum -= const.USHRT_MAX
2016-05-23 13:50:54 +07:00
l -= 2
if l:
2016-05-23 23:59:43 +07:00
checksum = checksum + p[-1]
2016-05-23 13:50:54 +07:00
2016-05-23 23:59:43 +07:00
while checksum > const.USHRT_MAX:
checksum -= const.USHRT_MAX
2016-05-23 13:50:54 +07:00
2016-05-23 23:59:43 +07:00
checksum = ~checksum
2016-05-23 13:50:54 +07:00
2016-05-23 23:59:43 +07:00
while checksum < 0:
checksum += const.USHRT_MAX
2016-05-23 13:50:54 +07:00
2016-05-23 23:59:43 +07:00
return pack('H', checksum)
def __send_command(self, command, checksum=0, command_string='', response_size=8):
try:
buf = self.__create_header(command, checksum, self.__sesion_id, self.__reply_id, command_string)
self.__sending_packet(buf)
self.__receive_packet(response_size)
if self.__response == const.CMD_ACK_OK:
return {
'status': True,
'code': self.__response,
'message': 'success',
'data': self.__data_recv
}
else:
return {
'status': False,
'code': self.__response,
'message': 'failed',
'data': self.__data_recv
}
except Exception, e:
return {
'status': False,
'code': const.CMD_ACK_ERROR,
'message': str(e),
'data': ''
}
2016-05-23 13:50:54 +07:00
def __sending_packet(self, buf):
self.__sock.sendto(buf, self.__address)
2016-05-23 21:00:43 +07:00
def __receive_packet(self, buf_size):
self.__data_recv = self.__sock.recv(buf_size)
2016-05-23 13:50:54 +07:00
@property
def __response(self):
'''
Checks a returned packet to see if it returned `CMD_ACK_OK` indicating success
'''
return unpack('HHHH', self.__data_recv[:8])[0]
@property
def __sesion_id(self):
2016-05-23 23:59:43 +07:00
if not self.__data_recv:
return 0
2016-05-23 13:50:54 +07:00
return unpack('HHHH', self.__data_recv[:8])[2]
@property
def __reply_id(self):
2016-05-23 23:59:43 +07:00
if not self.__data_recv:
return const.USHRT_MAX - 1
2016-05-23 13:50:54 +07:00
return unpack('HHHH', self.__data_recv[:8])[3]
def connect(self):
'''
connect to device
'''
command = const.CMD_CONNECT
2016-05-23 23:59:43 +07:00
cmd_response = self.__send_command(command)
cmd_response['data'] = ''
if cmd_response.get('status'):
cmd_response['message'] = 'connected'
return cmd_response
else:
return cmd_response
2016-05-23 13:50:54 +07:00
def disconnect(self):
'''
diconnect from connected device
'''
command = const.CMD_EXIT
2016-05-23 23:59:43 +07:00
cmd_response = self.__send_command(command)
cmd_response['data'] = ''
if cmd_response.get('status'):
cmd_response['message'] = 'disconnected'
return cmd_response
else:
return cmd_response
2016-05-23 13:55:09 +07:00
2016-05-23 14:41:39 +07:00
def get_firmware_version(self):
command = const.CMD_GET_VERSION
2016-05-23 23:59:43 +07:00
cmd_response = self.__send_command(command, response_size=1024)
if cmd_response.get('status'):
cmd_response['data'] = cmd_response.get('data')[8:].strip('\x00|\x01\x10x')
return cmd_response
else:
cmd_response['data'] = ''
return cmd_response
2016-05-23 14:41:39 +07:00
2016-05-23 13:55:09 +07:00
def restart(self):
'''
shutdown device
'''
command = const.CMD_RESTART
2016-05-23 23:59:43 +07:00
cmd_response = self.__send_command(command)
cmd_response['data'] = ''
if cmd_response.get('status'):
cmd_response['message'] = 'device restarted'
return cmd_response
else:
return cmd_response
2016-05-23 13:55:09 +07:00
def power_off(self):
'''
shutdown device
'''
command = const.CMD_POWEROFF
2016-05-23 23:59:43 +07:00
cmd_response = self.__send_command(command)
cmd_response['data'] = ''
if cmd_response.get('status'):
cmd_response['message'] = 'device turning off'
return cmd_response
else:
return cmd_response
2016-05-23 21:00:43 +07:00
2016-05-24 21:49:04 +07:00
def disable_device(self):
command = const.CMD_DISABLEDEVICE
cmd_response = self.__send_command(command)
cmd_response['data'] = ''
if cmd_response.get('status'):
cmd_response['message'] = 'device disabled'
return cmd_response
else:
return cmd_response
def enable_device(self):
command = const.CMD_ENABLEDEVICE
cmd_response = self.__send_command(command)
cmd_response['data'] = ''
if cmd_response.get('status'):
cmd_response['message'] = 'device enabled'
return cmd_response
else:
return cmd_response
2016-05-23 23:59:43 +07:00
# def __get_size_user(self):
# """Checks a returned packet to see if it returned CMD_PREPARE_DATA,
# indicating that data packets are to be sent
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# Returns the amount of bytes that are going to be sent"""
# response = self.__response
# if response == const.CMD_PREPARE_DATA:
# size = unpack('I', self.__data_recv[8:12])[0]
# return size
# else:
# return 0
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# def get_users(self):
# command = const.CMD_USERTEMP_RRQ
# command_string = chr(5)
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# try:
# buf = self.__create_header(command=command, session_id=self.__sesion_id, reply_id=self.__reply_id, command_string=command_string)
# self.__sending_packet(buf)
# self.__receive_packet(1024)
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# bytes = self.__get_size_user()
# userdata = []
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# if bytes:
# while bytes > 0:
# data_recv, addr = self.__sock.recvfrom(1032)
# userdata.append(data_recv)
# bytes -= 1024
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# self.__receive_packet(8)
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# users = {}
# if len(userdata) > 0:
# # The first 4 bytes don't seem to be related to the user
# for x in xrange(len(userdata)):
# if x > 0:
# userdata[x] = userdata[x][8:]
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# userdata = ''.join(userdata)
# userdata = userdata[11:]
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# while len(userdata) > 72:
# uid, role, password, name, userid = unpack( '2s2s8s28sx31s', userdata.ljust(72)[:72])
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# uid = int( uid.encode("hex"), 16)
# # Clean up some messy characters from the user name
# password = password.split('\x00', 1)[0]
# password = unicode(password.strip('\x00|\x01\x10x'), errors='ignore')
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# userid = unicode(userid.strip('\x00|\x01\x10x'), errors='ignore')
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# name = name.split('\x00', 1)[0]
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# if not name:
# name = uid
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# users[uid] = (userid, name, int( role.encode("hex"), 16 ), password)
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# userdata = userdata[72:]
2016-05-23 22:42:45 +07:00
2016-05-23 23:59:43 +07:00
# return users
# except Exception, e:
# return (False, e)
2016-05-23 21:00:43 +07:00