368 lines
11 KiB
Python
368 lines
11 KiB
Python
# -*- coding: utf-8 -*-
|
|
from struct import pack, unpack
|
|
from socket import socket, AF_INET, SOCK_DGRAM
|
|
|
|
from zk import const
|
|
from zk.user import User
|
|
|
|
class ZK(object):
|
|
|
|
is_connect = False
|
|
|
|
__data_recv = None
|
|
__sesion_id = 0
|
|
__reply_id = 0
|
|
|
|
def __init__(self, ip, port=4370, timeout=60):
|
|
self.__address = (ip, port)
|
|
self.__sock = socket(AF_INET, SOCK_DGRAM)
|
|
self.__sock.settimeout(timeout)
|
|
|
|
def __create_header(self, command, command_string, checksum, session_id, reply_id):
|
|
'''
|
|
Puts a the parts that make up a packet together and packs them into a byte string
|
|
'''
|
|
buf = pack('HHHH', command, checksum, session_id, reply_id) + command_string
|
|
buf = unpack('8B'+'%sB' % len(command_string), buf)
|
|
checksum = unpack('H', self.__create_checksum(buf))[0]
|
|
reply_id += 1
|
|
if reply_id >= const.USHRT_MAX:
|
|
reply_id -= const.USHRT_MAX
|
|
|
|
buf = pack('HHHH', command, checksum, session_id, reply_id)
|
|
return buf + command_string
|
|
|
|
def __create_checksum(self, p):
|
|
'''
|
|
Calculates the checksum of the packet to be sent to the time clock
|
|
Copied from zkemsdk.c
|
|
'''
|
|
l = len(p)
|
|
checksum = 0
|
|
while l > 1:
|
|
checksum += unpack('H', pack('BB', p[0], p[1]))[0]
|
|
p = p[2:]
|
|
if checksum > const.USHRT_MAX:
|
|
checksum -= const.USHRT_MAX
|
|
l -= 2
|
|
if l:
|
|
checksum = checksum + p[-1]
|
|
|
|
while checksum > const.USHRT_MAX:
|
|
checksum -= const.USHRT_MAX
|
|
|
|
checksum = ~checksum
|
|
|
|
while checksum < 0:
|
|
checksum += const.USHRT_MAX
|
|
|
|
return pack('H', checksum)
|
|
|
|
def __send_command(self, command, command_string, checksum, session_id, reply_id, response_size):
|
|
buf = self.__create_header(command, command_string, checksum, session_id, reply_id)
|
|
self.__sock.sendto(buf, self.__address)
|
|
self.__data_recv = self.__sock.recv(response_size)
|
|
self.__response = unpack('HHHH', self.__data_recv[:8])[0]
|
|
self.__reply_id = unpack('HHHH', self.__data_recv[:8])[3]
|
|
|
|
if self.__response in [const.CMD_ACK_OK, const.CMD_PREPARE_DATA]:
|
|
return {
|
|
'status': True,
|
|
'code': self.__response
|
|
}
|
|
else:
|
|
return {
|
|
'status': False,
|
|
'code': self.__response
|
|
}
|
|
|
|
def __get_data_size(self):
|
|
"""Checks a returned packet to see if it returned CMD_PREPARE_DATA,
|
|
indicating that data packets are to be sent
|
|
|
|
Returns the amount of bytes that are going to be sent"""
|
|
response = self.__response
|
|
if response == const.CMD_PREPARE_DATA:
|
|
size = unpack('I', self.__data_recv[8:12])[0]
|
|
return size
|
|
else:
|
|
return 0
|
|
|
|
def connect(self):
|
|
'''
|
|
connect to device
|
|
'''
|
|
|
|
command = const.CMD_CONNECT
|
|
command_string = ''
|
|
checksum = 0
|
|
session_id = 0
|
|
reply_id = const.USHRT_MAX - 1
|
|
response_size = 8
|
|
|
|
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
|
|
if cmd_response.get('status'):
|
|
self.is_connect = True
|
|
# set the session id
|
|
self.__sesion_id = unpack('HHHH', self.__data_recv[:8])[2]
|
|
return True
|
|
else:
|
|
raise Exception("Invalid response")
|
|
|
|
def disconnect(self):
|
|
'''
|
|
diconnect from connected device
|
|
'''
|
|
|
|
command = const.CMD_EXIT
|
|
command_string = ''
|
|
checksum = 0
|
|
session_id = self.__sesion_id
|
|
reply_id = self.__reply_id
|
|
response_size = 8
|
|
|
|
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
|
|
if cmd_response.get('status'):
|
|
return True
|
|
else:
|
|
raise Exception("Invalid response")
|
|
|
|
def disable_device(self):
|
|
'''
|
|
disable (lock) connected device, make sure no activity when process run
|
|
'''
|
|
|
|
command = const.CMD_DISABLEDEVICE
|
|
command_string = ''
|
|
checksum = 0
|
|
session_id = self.__sesion_id
|
|
reply_id = self.__reply_id
|
|
response_size = 8
|
|
|
|
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
|
|
if cmd_response.get('status'):
|
|
return True
|
|
else:
|
|
raise Exception("Invalid response")
|
|
|
|
def enable_device(self):
|
|
'''
|
|
re-enable connected device
|
|
'''
|
|
|
|
command = const.CMD_ENABLEDEVICE
|
|
command_string = ''
|
|
checksum = 0
|
|
session_id = self.__sesion_id
|
|
reply_id = self.__reply_id
|
|
response_size = 8
|
|
|
|
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
|
|
if cmd_response.get('status'):
|
|
return True
|
|
else:
|
|
raise Exception("Invalid response")
|
|
|
|
def get_firmware_version(self):
|
|
'''
|
|
get firmware version name
|
|
'''
|
|
|
|
command = const.CMD_GET_VERSION
|
|
command_string = ''
|
|
checksum = 0
|
|
session_id = self.__sesion_id
|
|
reply_id = self.__reply_id
|
|
response_size = 1024
|
|
|
|
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
|
|
if cmd_response.get('status'):
|
|
firmware_version = self.__data_recv[8:].strip('\x00|\x01\x10x')
|
|
return firmware_version
|
|
else:
|
|
raise Exception("Invalid response")
|
|
|
|
def restart(self):
|
|
'''
|
|
restart connected device
|
|
'''
|
|
|
|
command = const.CMD_RESTART
|
|
command_string = ''
|
|
checksum = 0
|
|
session_id = self.__sesion_id
|
|
reply_id = self.__reply_id
|
|
response_size = 8
|
|
|
|
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
|
|
if cmd_response.get('status'):
|
|
return True
|
|
else:
|
|
raise Exception("Invalid response")
|
|
|
|
def power_off(self):
|
|
'''
|
|
shutdown connected device
|
|
'''
|
|
|
|
command = const.CMD_POWEROFF
|
|
command_string = ''
|
|
checksum = 0
|
|
session_id = self.__sesion_id
|
|
reply_id = self.__reply_id
|
|
response_size = 8
|
|
|
|
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
|
|
if cmd_response.get('status'):
|
|
return True
|
|
else:
|
|
raise Exception("Invalid response")
|
|
|
|
def test_voice(self):
|
|
'''
|
|
play test voice
|
|
'''
|
|
|
|
command = const.CMD_TESTVOICE
|
|
command_string = ''
|
|
checksum = 0
|
|
session_id = self.__sesion_id
|
|
reply_id = self.__reply_id
|
|
response_size = 8
|
|
|
|
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
|
|
if cmd_response.get('status'):
|
|
return True
|
|
else:
|
|
raise Exception("Invalid response")
|
|
|
|
def set_user(self, uid, name, privilege, password='', group_id='', user_id=''):
|
|
'''
|
|
create or update user by uid
|
|
'''
|
|
|
|
command = const.CMD_USER_WRQ
|
|
|
|
uid = chr(uid % 256) + chr(uid >> 8)
|
|
if privilege not in [const.USER_DEFAULT, const.USER_ADMIN]:
|
|
privilege = const.USER_DEFAULT
|
|
privilege = chr(privilege)
|
|
|
|
command_string = pack('2sc8s28sc7sx24s', uid, privilege, password, name, chr(0), group_id, user_id)
|
|
checksum = 0
|
|
session_id = self.__sesion_id
|
|
reply_id = self.__reply_id
|
|
response_size = 1024
|
|
|
|
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
|
|
if cmd_response.get('status'):
|
|
return True
|
|
else:
|
|
raise Exception("Invalid response")
|
|
|
|
def get_users(self):
|
|
'''
|
|
get all users
|
|
'''
|
|
|
|
command = const.CMD_USERTEMP_RRQ
|
|
command_string = ''
|
|
checksum = 0
|
|
session_id = self.__sesion_id
|
|
reply_id = self.__reply_id
|
|
response_size = 1024
|
|
|
|
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
|
|
users = []
|
|
if cmd_response.get('status'):
|
|
if cmd_response.get('code') == const.CMD_PREPARE_DATA:
|
|
bytes = self.__get_data_size()
|
|
userdata = []
|
|
while bytes > 0:
|
|
data_recv = self.__sock.recv(1032)
|
|
userdata.append(data_recv)
|
|
bytes -= 1024
|
|
|
|
data_recv = self.__sock.recv(8)
|
|
response = unpack('HHHH', data_recv[:8])[0]
|
|
if response == const.CMD_ACK_OK:
|
|
if userdata:
|
|
# The first 4 bytes don't seem to be related to the user
|
|
for x in xrange(len(userdata)):
|
|
if x > 0:
|
|
userdata[x] = userdata[x][8:]
|
|
|
|
userdata = ''.join(userdata)
|
|
userdata = userdata[11:]
|
|
while len(userdata) >= 72:
|
|
uid, privilege, password, name, sparator, group_id, user_id = unpack( '2s2s8s28sc7sx23s', userdata.ljust(72)[:72])
|
|
u1 = int( uid[0].encode("hex"), 16)
|
|
u2 = int( uid[1].encode("hex"), 16)
|
|
|
|
uid = u2 + (u1*256)
|
|
name = unicode(name.strip('\x00|\x01\x10x'), errors='ignore')
|
|
privilege = int(privilege.encode("hex"), 16)
|
|
password = unicode(password.strip('\x00|\x01\x10x'), errors='ignore')
|
|
group_id = unicode(group_id.strip('\x00|\x01\x10x'), errors='ignore')
|
|
user_id = unicode(user_id.strip('\x00|\x01\x10x'), errors='ignore')
|
|
|
|
user = User(uid, name, privilege, password, group_id, user_id)
|
|
users.append(user)
|
|
|
|
userdata = userdata[72:]
|
|
else:
|
|
raise Exception("Invalid response")
|
|
|
|
return users
|
|
|
|
def cancel_capture(self):
|
|
'''
|
|
cancel capturing finger
|
|
'''
|
|
|
|
command = const.CMD_CANCELCAPTURE
|
|
cmd_response = self.__send_command(command=command)
|
|
print cmd_response
|
|
|
|
def verify_user(self):
|
|
'''
|
|
verify finger
|
|
'''
|
|
|
|
command = const.CMD_STARTVERIFY
|
|
# uid = chr(uid % 256) + chr(uid >> 8)
|
|
cmd_response = self.__send_command(command=command)
|
|
print cmd_response
|
|
|
|
def enroll_user(self, uid):
|
|
'''
|
|
start enroll user
|
|
'''
|
|
|
|
command = const.CMD_STARTENROLL
|
|
uid = chr(uid % 256) + chr(uid >> 8)
|
|
command_string = pack('2s', uid)
|
|
cmd_response = self.__send_command(command=command, command_string=command_string)
|
|
print cmd_response
|
|
|
|
def clear_user(self):
|
|
'''
|
|
Not implemented yet
|
|
'''
|
|
|
|
pass
|
|
|
|
def get_attendance(self):
|
|
'''
|
|
Not implemented yet
|
|
'''
|
|
|
|
pass
|
|
|
|
def clear_attendance(self):
|
|
'''
|
|
Not implemented yet
|
|
'''
|
|
|
|
pass
|