123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298 |
- /* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/.
- *
- * Copyright 2014-2018 (c) Fraunhofer IOSB (Author: Julius Pfrommer)
- * Copyright 2017 (c) Florian Palm
- * Copyright 2017 (c) Stefan Profanter, fortiss GmbH
- * Copyright 2017 (c) Mark Giraud, Fraunhofer IOSB
- */
- #ifndef UA_SECURECHANNEL_H_
- #define UA_SECURECHANNEL_H_
- #include <open62541/plugin/log.h>
- #include <open62541/plugin/securitypolicy.h>
- #include <open62541/transport_generated.h>
- #include <open62541/types.h>
- #include "open62541_queue.h"
- #include "ua_connection_internal.h"
- _UA_BEGIN_DECLS
- #define UA_SECURE_CONVERSATION_MESSAGE_HEADER_LENGTH 12
- #define UA_SECURE_MESSAGE_HEADER_LENGTH 24
- /* Thread-local variables to force failure modes during testing */
- #ifdef UA_ENABLE_UNIT_TEST_FAILURE_HOOKS
- extern UA_StatusCode decrypt_verifySignatureFailure;
- extern UA_StatusCode sendAsym_sendFailure;
- extern UA_StatusCode processSym_seqNumberFailure;
- #endif
- /* The Session implementation differs between client and server. Still, it is
- * expected that the Session structure begins with the SessionHeader. This is
- * the interface that will be used by the SecureChannel. The lifecycle of
- * Sessions is independent of the underlying SecureChannel. But every Session
- * can be attached to only one SecureChannel. */
- typedef struct UA_SessionHeader {
- LIST_ENTRY(UA_SessionHeader) pointers;
- UA_NodeId authenticationToken;
- UA_SecureChannel *channel; /* The pointer back to the SecureChannel in the session. */
- } UA_SessionHeader;
- /* For chunked requests */
- typedef struct UA_ChunkPayload {
- SIMPLEQ_ENTRY(UA_ChunkPayload) pointers;
- UA_ByteString bytes;
- UA_Boolean copied; /* Do the bytes point to a buffer from the network or was
- memory allocated for the chunk separately */
- } UA_ChunkPayload;
- /* Receieved messages. Process them only in order. The Chunk payload has all
- * headers and the padding stripped out. The payload begins at the
- * ExtensionObject prefix.*/
- typedef struct UA_Message {
- TAILQ_ENTRY(UA_Message) pointers;
- UA_UInt32 requestId;
- UA_MessageType messageType;
- SIMPLEQ_HEAD(pp, UA_ChunkPayload) chunkPayloads;
- size_t chunkPayloadsSize; /* No of chunks received so far */
- size_t messageSize; /* Total length of the chunks received so far */
- UA_Boolean final; /* All chunks for the message have been received */
- } UA_Message;
- typedef enum {
- UA_SECURECHANNELSTATE_FRESH,
- UA_SECURECHANNELSTATE_OPEN,
- UA_SECURECHANNELSTATE_CLOSED
- } UA_SecureChannelState;
- typedef TAILQ_HEAD(UA_MessageQueue, UA_Message) UA_MessageQueue;
- struct UA_SecureChannel {
- UA_SecureChannelState state;
- UA_MessageSecurityMode securityMode;
- /* We use three tokens because when switching tokens the client is allowed to accept
- * messages with the old token for up to 25% of the lifetime after the token would have timed out.
- * For messages that are sent, the new token is already used, which is contained in the securityToken
- * variable. The nextSecurityToken variable holds a newly issued token, that will be automatically
- * revolved into the securityToken variable. This could be done with two variables, but would require
- * greater changes to the current code. This could be done in the future after the client and networking
- * structure has been reworked, which would make this easier to implement. */
- UA_ChannelSecurityToken securityToken; /* the channelId is contained in the securityToken */
- UA_ChannelSecurityToken nextSecurityToken;
- UA_ChannelSecurityToken previousSecurityToken;
- /* The endpoint and context of the channel */
- const UA_SecurityPolicy *securityPolicy;
- void *channelContext; /* For interaction with the security policy */
- UA_Connection *connection;
- /* Asymmetric encryption info */
- UA_ByteString remoteCertificate;
- UA_Byte remoteCertificateThumbprint[20]; /* The thumbprint of the remote certificate */
- /* Symmetric encryption info */
- UA_ByteString remoteNonce;
- UA_ByteString localNonce;
- UA_UInt32 receiveSequenceNumber;
- UA_UInt32 sendSequenceNumber;
- LIST_HEAD(, UA_SessionHeader) sessions;
- UA_MessageQueue messages;
- };
- void UA_SecureChannel_init(UA_SecureChannel *channel);
- void UA_SecureChannel_close(UA_SecureChannel *channel);
- UA_StatusCode
- UA_SecureChannel_setSecurityPolicy(UA_SecureChannel *channel,
- const UA_SecurityPolicy *securityPolicy,
- const UA_ByteString *remoteCertificate);
- /* Remove (partially) received unprocessed messages */
- void UA_SecureChannel_deleteMessages(UA_SecureChannel *channel);
- void UA_SecureChannel_deleteMembers(UA_SecureChannel *channel);
- /* Generates new keys and sets them in the channel context */
- UA_StatusCode
- UA_SecureChannel_generateNewKeys(UA_SecureChannel* channel);
- /* Wrapper function for generating a local nonce for the supplied channel. Uses
- * the random generator of the channels security policy to allocate and generate
- * a nonce with the specified length. */
- UA_StatusCode
- UA_SecureChannel_generateLocalNonce(UA_SecureChannel *channel);
- UA_SessionHeader *
- UA_SecureChannel_getSession(UA_SecureChannel *channel,
- const UA_NodeId *authenticationToken);
- UA_StatusCode
- UA_SecureChannel_revolveTokens(UA_SecureChannel *channel);
- /**
- * Sending Messages
- * ---------------- */
- UA_StatusCode
- UA_SecureChannel_sendAsymmetricOPNMessage(UA_SecureChannel *channel, UA_UInt32 requestId,
- const void *content, const UA_DataType *contentType);
- UA_StatusCode
- UA_SecureChannel_sendSymmetricMessage(UA_SecureChannel *channel, UA_UInt32 requestId,
- UA_MessageType messageType, void *payload,
- const UA_DataType *payloadType);
- /* The MessageContext is forwarded into the encoding layer so that we can send
- * chunks before continuing to encode. This lets us reuse a fixed chunk-sized
- * messages buffer. */
- typedef struct {
- UA_SecureChannel *channel;
- UA_UInt32 requestId;
- UA_UInt32 messageType;
- UA_UInt16 chunksSoFar;
- size_t messageSizeSoFar;
- UA_ByteString messageBuffer;
- UA_Byte *buf_pos;
- const UA_Byte *buf_end;
- UA_Boolean final;
- } UA_MessageContext;
- /* Start the context of a new symmetric message. */
- UA_StatusCode
- UA_MessageContext_begin(UA_MessageContext *mc, UA_SecureChannel *channel,
- UA_UInt32 requestId, UA_MessageType messageType);
- /* Encode the content and send out full chunks. If the return code is good, then
- * the ChunkInfo contains encoded content that has not been sent. If the return
- * code is bad, then the ChunkInfo has been cleaned up internally. */
- UA_StatusCode
- UA_MessageContext_encode(UA_MessageContext *mc, const void *content,
- const UA_DataType *contentType);
- /* Sends a symmetric message already encoded in the context. The context is
- * cleaned up, also in case of errors. */
- UA_StatusCode
- UA_MessageContext_finish(UA_MessageContext *mc);
- /* To be used when a failure occures when a MessageContext is open. Note that
- * the _encode and _finish methods will clean up internally. _abort can be run
- * on a MessageContext that has already been cleaned up before. */
- void
- UA_MessageContext_abort(UA_MessageContext *mc);
- /**
- * Receive Message
- * --------------- */
- /* Decrypt a chunk and add it to the message. Create a new message if necessary. */
- UA_StatusCode
- UA_SecureChannel_decryptAddChunk(UA_SecureChannel *channel, const UA_ByteString *chunk,
- UA_Boolean allowPreviousToken);
- /* The network buffer is about to be cleared. Copy all chunks that point into
- * the network buffer into dedicated memory. */
- UA_StatusCode
- UA_SecureChannel_persistIncompleteMessages(UA_SecureChannel *channel);
- typedef void
- (UA_ProcessMessageCallback)(void *application, UA_SecureChannel *channel,
- UA_MessageType messageType, UA_UInt32 requestId,
- const UA_ByteString *message);
- /* Process received complete messages in-order. The callback function is called
- * with the complete message body if the message is complete. The message is
- * removed afterwards.
- *
- * Symmetric callback is ERR, MSG, CLO only
- * Asymmetric callback is OPN only
- *
- * @param channel the channel the chunks were received on.
- * @param application data pointer to application specific data that gets passed
- * on to the callback function.
- * @param callback the callback function that gets called with the complete
- * message body, once a final chunk is processed.
- * @return Returns if an irrecoverable error occured. Maybe close the channel. */
- UA_StatusCode
- UA_SecureChannel_processCompleteMessages(UA_SecureChannel *channel, void *application,
- UA_ProcessMessageCallback callback);
- /**
- * Log Helper
- * ----------
- * C99 requires at least one element for the variadic argument. If the log
- * statement has no variable arguments, supply an additional NULL. It will be
- * ignored by printf.
- *
- * We have to jump through some hoops to enable the use of format strings
- * without arguments since (pedantic) C99 does not allow variadic macros with
- * zero arguments. So we add a dummy argument that is not printed (%.0s is
- * string of length zero). */
- #define UA_LOG_TRACE_CHANNEL_INTERNAL(LOGGER, CHANNEL, MSG, ...) \
- UA_LOG_TRACE(LOGGER, UA_LOGCATEGORY_SECURECHANNEL, \
- "Connection %i | SecureChannel %i | " MSG "%.0s", \
- ((CHANNEL)->connection ? (int)((CHANNEL)->connection->sockfd) : 0), \
- (CHANNEL)->securityToken.channelId, __VA_ARGS__)
- #define UA_LOG_TRACE_CHANNEL(LOGGER, CHANNEL, ...) \
- UA_MACRO_EXPAND(UA_LOG_TRACE_CHANNEL_INTERNAL(LOGGER, CHANNEL, __VA_ARGS__, ""))
- #define UA_LOG_DEBUG_CHANNEL_INTERNAL(LOGGER, CHANNEL, MSG, ...) \
- UA_LOG_DEBUG(LOGGER, UA_LOGCATEGORY_SECURECHANNEL, \
- "Connection %i | SecureChannel %i | " MSG "%.0s", \
- ((CHANNEL)->connection ? (int)((CHANNEL)->connection->sockfd) : 0), \
- (CHANNEL)->securityToken.channelId, __VA_ARGS__)
- #define UA_LOG_DEBUG_CHANNEL(LOGGER, CHANNEL, ...) \
- UA_MACRO_EXPAND(UA_LOG_DEBUG_CHANNEL_INTERNAL(LOGGER, CHANNEL, __VA_ARGS__, ""))
- #define UA_LOG_INFO_CHANNEL_INTERNAL(LOGGER, CHANNEL, MSG, ...) \
- UA_LOG_INFO(LOGGER, UA_LOGCATEGORY_SECURECHANNEL, \
- "Connection %i | SecureChannel %i | " MSG "%.0s", \
- ((CHANNEL)->connection ? (int)((CHANNEL)->connection->sockfd) : 0), \
- (CHANNEL)->securityToken.channelId, __VA_ARGS__)
- #define UA_LOG_INFO_CHANNEL(LOGGER, CHANNEL, ...) \
- UA_MACRO_EXPAND(UA_LOG_INFO_CHANNEL_INTERNAL(LOGGER, CHANNEL, __VA_ARGS__, ""))
- #define UA_LOG_WARNING_CHANNEL_INTERNAL(LOGGER, CHANNEL, MSG, ...) \
- UA_LOG_WARNING(LOGGER, UA_LOGCATEGORY_SECURECHANNEL, \
- "Connection %i | SecureChannel %i | " MSG "%.0s", \
- ((CHANNEL)->connection ? (int)((CHANNEL)->connection->sockfd) : 0), \
- (CHANNEL)->securityToken.channelId, __VA_ARGS__)
- #define UA_LOG_WARNING_CHANNEL(LOGGER, CHANNEL, ...) \
- UA_MACRO_EXPAND(UA_LOG_WARNING_CHANNEL_INTERNAL(LOGGER, CHANNEL, __VA_ARGS__, ""))
- #define UA_LOG_ERROR_CHANNEL_INTERNAL(LOGGER, CHANNEL, MSG, ...) \
- UA_LOG_ERROR(LOGGER, UA_LOGCATEGORY_SECURECHANNEL, \
- "Connection %i | SecureChannel %i | " MSG "%.0s", \
- ((CHANNEL)->connection ? (int)((CHANNEL)->connection->sockfd) : 0), \
- (CHANNEL)->securityToken.channelId, __VA_ARGS__)
- #define UA_LOG_ERROR_CHANNEL(LOGGER, CHANNEL, ...) \
- UA_MACRO_EXPAND(UA_LOG_ERROR_CHANNEL_INTERNAL(LOGGER, CHANNEL, __VA_ARGS__, ""))
- #define UA_LOG_FATAL_CHANNEL_INTERNAL(LOGGER, CHANNEL, MSG, ...) \
- UA_LOG_FATAL(LOGGER, UA_LOGCATEGORY_SECURECHANNEL, \
- "Connection %i | SecureChannel %i | " MSG "%.0s", \
- ((CHANNEL)->connection ? (CHANNEL)->connection->sockfd : 0), \
- (CHANNEL)->securityToken.channelId, __VA_ARGS__)
- #define UA_LOG_FATAL_CHANNEL(LOGGER, CHANNEL, ...) \
- UA_MACRO_EXPAND(UA_LOG_FATAL_CHANNEL_INTERNAL(LOGGER, CHANNEL, __VA_ARGS__, ""))
- _UA_END_DECLS
- #endif /* UA_SECURECHANNEL_H_ */
|