ua_server_binary.c 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729
  1. #include "ua_util.h"
  2. #include "ua_server_internal.h"
  3. #include "ua_services.h"
  4. #include "ua_securechannel_manager.h"
  5. #include "ua_session_manager.h"
  6. #include "ua_types_generated_encoding_binary.h"
  7. #include "ua_transport_generated.h"
  8. #include "ua_transport_generated_handling.h"
  9. #include "ua_transport_generated_encoding_binary.h"
  10. /********************/
  11. /* Helper Functions */
  12. /********************/
  13. static void init_response_header(const UA_RequestHeader *p, UA_ResponseHeader *r) {
  14. r->requestHandle = p->requestHandle;
  15. r->timestamp = UA_DateTime_now();
  16. }
  17. static void
  18. sendError(UA_SecureChannel *channel, const UA_ByteString *msg,
  19. size_t offset, const UA_DataType *responseType,
  20. UA_UInt32 requestId, UA_StatusCode error) {
  21. UA_RequestHeader requestHeader;
  22. UA_StatusCode retval = UA_RequestHeader_decodeBinary(msg, &offset, &requestHeader);
  23. if(retval != UA_STATUSCODE_GOOD)
  24. return;
  25. void *response = UA_alloca(responseType->memSize);
  26. UA_init(response, responseType);
  27. UA_ResponseHeader *responseHeader = (UA_ResponseHeader*)response;
  28. init_response_header(&requestHeader, responseHeader);
  29. responseHeader->serviceResult = error;
  30. UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  31. UA_RequestHeader_deleteMembers(&requestHeader);
  32. UA_ResponseHeader_deleteMembers(responseHeader);
  33. }
  34. /* Returns a complete decoded request (without securechannel headers + padding)
  35. or UA_BYTESTRING_NULL */
  36. static UA_ByteString
  37. processChunk(UA_SecureChannel *channel, UA_Server *server,
  38. const UA_TcpMessageHeader *messageHeader, UA_UInt32 requestId,
  39. const UA_ByteString *msg, size_t offset, size_t chunksize,
  40. UA_Boolean *deleteRequest) {
  41. UA_ByteString bytes = UA_BYTESTRING_NULL;
  42. switch(messageHeader->messageTypeAndChunkType & 0xff000000) {
  43. case UA_CHUNKTYPE_INTERMEDIATE:
  44. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Chunk message");
  45. UA_SecureChannel_appendChunk(channel, requestId, msg, offset, chunksize);
  46. break;
  47. case UA_CHUNKTYPE_FINAL:
  48. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Final chunk message");
  49. bytes = UA_SecureChannel_finalizeChunk(channel, requestId, msg, offset,
  50. chunksize, deleteRequest);
  51. break;
  52. case UA_CHUNKTYPE_ABORT:
  53. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Chunk aborted");
  54. UA_SecureChannel_removeChunk(channel, requestId);
  55. break;
  56. default:
  57. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Unknown chunk type");
  58. }
  59. return bytes;
  60. }
  61. static void
  62. getServicePointers(UA_UInt32 requestTypeId, const UA_DataType **requestType,
  63. const UA_DataType **responseType, UA_Service *service,
  64. UA_Boolean *requiresSession) {
  65. switch(requestTypeId - UA_ENCODINGOFFSET_BINARY) {
  66. case UA_NS0ID_GETENDPOINTSREQUEST:
  67. *service = (UA_Service)Service_GetEndpoints;
  68. *requestType = &UA_TYPES[UA_TYPES_GETENDPOINTSREQUEST];
  69. *responseType = &UA_TYPES[UA_TYPES_GETENDPOINTSRESPONSE];
  70. *requiresSession = false;
  71. break;
  72. case UA_NS0ID_FINDSERVERSREQUEST:
  73. *service = (UA_Service)Service_FindServers;
  74. *requestType = &UA_TYPES[UA_TYPES_FINDSERVERSREQUEST];
  75. *responseType = &UA_TYPES[UA_TYPES_FINDSERVERSRESPONSE];
  76. *requiresSession = false;
  77. break;
  78. case UA_NS0ID_CREATESESSIONREQUEST:
  79. *service = (UA_Service)Service_CreateSession;
  80. *requestType = &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST];
  81. *responseType = &UA_TYPES[UA_TYPES_CREATESESSIONRESPONSE];
  82. *requiresSession = false;
  83. break;
  84. case UA_NS0ID_ACTIVATESESSIONREQUEST:
  85. *service = (UA_Service)Service_ActivateSession;
  86. *requestType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST];
  87. *responseType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONRESPONSE];
  88. break;
  89. case UA_NS0ID_CLOSESESSIONREQUEST:
  90. *service = (UA_Service)Service_CloseSession;
  91. *requestType = &UA_TYPES[UA_TYPES_CLOSESESSIONREQUEST];
  92. *responseType = &UA_TYPES[UA_TYPES_CLOSESESSIONRESPONSE];
  93. break;
  94. case UA_NS0ID_READREQUEST:
  95. *service = (UA_Service)Service_Read;
  96. *requestType = &UA_TYPES[UA_TYPES_READREQUEST];
  97. *responseType = &UA_TYPES[UA_TYPES_READRESPONSE];
  98. break;
  99. case UA_NS0ID_WRITEREQUEST:
  100. *service = (UA_Service)Service_Write;
  101. *requestType = &UA_TYPES[UA_TYPES_WRITEREQUEST];
  102. *responseType = &UA_TYPES[UA_TYPES_WRITERESPONSE];
  103. break;
  104. case UA_NS0ID_BROWSEREQUEST:
  105. *service = (UA_Service)Service_Browse;
  106. *requestType = &UA_TYPES[UA_TYPES_BROWSEREQUEST];
  107. *responseType = &UA_TYPES[UA_TYPES_BROWSERESPONSE];
  108. break;
  109. case UA_NS0ID_BROWSENEXTREQUEST:
  110. *service = (UA_Service)Service_BrowseNext;
  111. *requestType = &UA_TYPES[UA_TYPES_BROWSENEXTREQUEST];
  112. *responseType = &UA_TYPES[UA_TYPES_BROWSENEXTRESPONSE];
  113. break;
  114. case UA_NS0ID_REGISTERNODESREQUEST:
  115. *service = (UA_Service)Service_RegisterNodes;
  116. *requestType = &UA_TYPES[UA_TYPES_REGISTERNODESREQUEST];
  117. *responseType = &UA_TYPES[UA_TYPES_REGISTERNODESRESPONSE];
  118. break;
  119. case UA_NS0ID_UNREGISTERNODESREQUEST:
  120. *service = (UA_Service)Service_UnregisterNodes;
  121. *requestType = &UA_TYPES[UA_TYPES_UNREGISTERNODESREQUEST];
  122. *responseType = &UA_TYPES[UA_TYPES_UNREGISTERNODESRESPONSE];
  123. break;
  124. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST:
  125. *service = (UA_Service)Service_TranslateBrowsePathsToNodeIds;
  126. *requestType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSREQUEST];
  127. *responseType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSRESPONSE];
  128. break;
  129. #ifdef UA_ENABLE_SUBSCRIPTIONS
  130. case UA_NS0ID_CREATESUBSCRIPTIONREQUEST:
  131. *service = (UA_Service)Service_CreateSubscription;
  132. *requestType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONREQUEST];
  133. *responseType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONRESPONSE];
  134. break;
  135. case UA_NS0ID_PUBLISHREQUEST:
  136. *requestType = &UA_TYPES[UA_TYPES_PUBLISHREQUEST];
  137. *responseType = &UA_TYPES[UA_TYPES_PUBLISHRESPONSE];
  138. break;
  139. case UA_NS0ID_REPUBLISHREQUEST:
  140. *service = (UA_Service)Service_Republish;
  141. *requestType = &UA_TYPES[UA_TYPES_REPUBLISHREQUEST];
  142. *responseType = &UA_TYPES[UA_TYPES_REPUBLISHRESPONSE];
  143. break;
  144. case UA_NS0ID_MODIFYSUBSCRIPTIONREQUEST:
  145. *service = (UA_Service)Service_ModifySubscription;
  146. *requestType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONREQUEST];
  147. *responseType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONRESPONSE];
  148. break;
  149. case UA_NS0ID_SETPUBLISHINGMODEREQUEST:
  150. *service = (UA_Service)Service_SetPublishingMode;
  151. *requestType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODEREQUEST];
  152. *responseType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODERESPONSE];
  153. break;
  154. case UA_NS0ID_DELETESUBSCRIPTIONSREQUEST:
  155. *service = (UA_Service)Service_DeleteSubscriptions;
  156. *requestType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSREQUEST];
  157. *responseType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSRESPONSE];
  158. break;
  159. case UA_NS0ID_CREATEMONITOREDITEMSREQUEST:
  160. *service = (UA_Service)Service_CreateMonitoredItems;
  161. *requestType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSREQUEST];
  162. *responseType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSRESPONSE];
  163. break;
  164. case UA_NS0ID_DELETEMONITOREDITEMSREQUEST:
  165. *service = (UA_Service)Service_DeleteMonitoredItems;
  166. *requestType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSREQUEST];
  167. *responseType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSRESPONSE];
  168. break;
  169. case UA_NS0ID_MODIFYMONITOREDITEMSREQUEST:
  170. *service = (UA_Service)Service_ModifyMonitoredItems;
  171. *requestType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSREQUEST];
  172. *responseType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSRESPONSE];
  173. break;
  174. case UA_NS0ID_SETMONITORINGMODEREQUEST:
  175. *service = (UA_Service)Service_SetMonitoringMode;
  176. *requestType = &UA_TYPES[UA_TYPES_SETMONITORINGMODEREQUEST];
  177. *responseType = &UA_TYPES[UA_TYPES_SETMONITORINGMODERESPONSE];
  178. break;
  179. #endif
  180. #ifdef UA_ENABLE_METHODCALLS
  181. case UA_NS0ID_CALLREQUEST:
  182. *service = (UA_Service)Service_Call;
  183. *requestType = &UA_TYPES[UA_TYPES_CALLREQUEST];
  184. *responseType = &UA_TYPES[UA_TYPES_CALLRESPONSE];
  185. break;
  186. #endif
  187. #ifdef UA_ENABLE_NODEMANAGEMENT
  188. case UA_NS0ID_ADDNODESREQUEST:
  189. *service = (UA_Service)Service_AddNodes;
  190. *requestType = &UA_TYPES[UA_TYPES_ADDNODESREQUEST];
  191. *responseType = &UA_TYPES[UA_TYPES_ADDNODESRESPONSE];
  192. break;
  193. case UA_NS0ID_ADDREFERENCESREQUEST:
  194. *service = (UA_Service)Service_AddReferences;
  195. *requestType = &UA_TYPES[UA_TYPES_ADDREFERENCESREQUEST];
  196. *responseType = &UA_TYPES[UA_TYPES_ADDREFERENCESRESPONSE];
  197. break;
  198. case UA_NS0ID_DELETENODESREQUEST:
  199. *service = (UA_Service)Service_DeleteNodes;
  200. *requestType = &UA_TYPES[UA_TYPES_DELETENODESREQUEST];
  201. *responseType = &UA_TYPES[UA_TYPES_DELETENODESRESPONSE];
  202. break;
  203. case UA_NS0ID_DELETEREFERENCESREQUEST:
  204. *service = (UA_Service)Service_DeleteReferences;
  205. *requestType = &UA_TYPES[UA_TYPES_DELETEREFERENCESREQUEST];
  206. *responseType = &UA_TYPES[UA_TYPES_DELETEREFERENCESRESPONSE];
  207. break;
  208. #endif
  209. default:
  210. break;
  211. }
  212. }
  213. /*************************/
  214. /* Process Message Types */
  215. /*************************/
  216. /* HEL -> Open up the connection */
  217. static void processHEL(UA_Connection *connection, const UA_ByteString *msg, size_t *offset) {
  218. UA_TcpHelloMessage helloMessage;
  219. if(UA_TcpHelloMessage_decodeBinary(msg, offset, &helloMessage) != UA_STATUSCODE_GOOD) {
  220. connection->close(connection);
  221. return;
  222. }
  223. /* Parameterize the connection */
  224. connection->remoteConf.maxChunkCount = helloMessage.maxChunkCount; /* zero -> unlimited */
  225. connection->remoteConf.maxMessageSize = helloMessage.maxMessageSize; /* zero -> unlimited */
  226. connection->remoteConf.protocolVersion = helloMessage.protocolVersion;
  227. connection->remoteConf.recvBufferSize = helloMessage.receiveBufferSize;
  228. if(connection->localConf.sendBufferSize > helloMessage.receiveBufferSize)
  229. connection->localConf.sendBufferSize = helloMessage.receiveBufferSize;
  230. connection->remoteConf.sendBufferSize = helloMessage.sendBufferSize;
  231. if(connection->localConf.recvBufferSize > helloMessage.sendBufferSize)
  232. connection->localConf.recvBufferSize = helloMessage.sendBufferSize;
  233. connection->state = UA_CONNECTION_ESTABLISHED;
  234. UA_TcpHelloMessage_deleteMembers(&helloMessage);
  235. /* Build acknowledge response */
  236. UA_TcpAcknowledgeMessage ackMessage;
  237. ackMessage.protocolVersion = connection->localConf.protocolVersion;
  238. ackMessage.receiveBufferSize = connection->localConf.recvBufferSize;
  239. ackMessage.sendBufferSize = connection->localConf.sendBufferSize;
  240. ackMessage.maxMessageSize = connection->localConf.maxMessageSize;
  241. ackMessage.maxChunkCount = connection->localConf.maxChunkCount;
  242. UA_TcpMessageHeader ackHeader;
  243. ackHeader.messageTypeAndChunkType = UA_MESSAGETYPE_ACK + UA_CHUNKTYPE_FINAL;
  244. ackHeader.messageSize = 8 + 20; /* ackHeader + ackMessage */
  245. /* Get the send buffer from the network layer */
  246. UA_ByteString ack_msg;
  247. UA_ByteString_init(&ack_msg);
  248. UA_StatusCode retval =
  249. connection->getSendBuffer(connection, connection->localConf.sendBufferSize, &ack_msg);
  250. if(retval != UA_STATUSCODE_GOOD)
  251. return;
  252. /* Encode and send the response */
  253. size_t tmpPos = 0;
  254. UA_TcpMessageHeader_encodeBinary(&ackHeader, &ack_msg, &tmpPos);
  255. UA_TcpAcknowledgeMessage_encodeBinary(&ackMessage, &ack_msg, &tmpPos);
  256. ack_msg.length = ackHeader.messageSize;
  257. connection->send(connection, &ack_msg);
  258. }
  259. /* OPN -> Open up/renew the securechannel */
  260. static void
  261. processOPN(UA_Connection *connection, UA_Server *server,
  262. const UA_ByteString *msg, size_t *offset) {
  263. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  264. connection->close(connection);
  265. return;
  266. }
  267. UA_UInt32 channelId;
  268. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, offset, &channelId);
  269. /* Opening up a channel with a channelid already set */
  270. if(!connection->channel && channelId != 0)
  271. retval |= UA_STATUSCODE_BADREQUESTTYPEINVALID;
  272. /* Renew a channel with the wrong channelid */
  273. if(connection->channel && channelId != connection->channel->securityToken.channelId)
  274. retval |= UA_STATUSCODE_BADREQUESTTYPEINVALID;
  275. UA_AsymmetricAlgorithmSecurityHeader asymHeader;
  276. retval |= UA_AsymmetricAlgorithmSecurityHeader_decodeBinary(msg, offset, &asymHeader);
  277. UA_SequenceHeader seqHeader;
  278. retval |= UA_SequenceHeader_decodeBinary(msg, offset, &seqHeader);
  279. UA_NodeId requestType;
  280. retval |= UA_NodeId_decodeBinary(msg, offset, &requestType);
  281. UA_OpenSecureChannelRequest r;
  282. retval |= UA_OpenSecureChannelRequest_decodeBinary(msg, offset, &r);
  283. /* Could not decode or wrong service type */
  284. if(retval != UA_STATUSCODE_GOOD || requestType.identifier.numeric != 446) {
  285. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  286. UA_NodeId_deleteMembers(&requestType);
  287. UA_OpenSecureChannelRequest_deleteMembers(&r);
  288. connection->close(connection);
  289. return;
  290. }
  291. /* Call the service */
  292. UA_OpenSecureChannelResponse p;
  293. UA_OpenSecureChannelResponse_init(&p);
  294. Service_OpenSecureChannel(server, connection, &r, &p);
  295. UA_OpenSecureChannelRequest_deleteMembers(&r);
  296. UA_SecureChannel *channel = connection->channel;
  297. /* Opening the channel failed */
  298. if(!channel) {
  299. UA_OpenSecureChannelResponse_deleteMembers(&p);
  300. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  301. connection->close(connection);
  302. return;
  303. }
  304. /* Set the starting sequence number */
  305. channel->receiveSequenceNumber = seqHeader.sequenceNumber;
  306. /* Allocate the return message */
  307. UA_ByteString resp_msg;
  308. UA_ByteString_init(&resp_msg);
  309. retval = connection->getSendBuffer(connection, connection->localConf.sendBufferSize, &resp_msg);
  310. if(retval != UA_STATUSCODE_GOOD) {
  311. UA_OpenSecureChannelResponse_deleteMembers(&p);
  312. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  313. connection->close(connection);
  314. return;
  315. }
  316. /* Encode the message after the secureconversationmessageheader */
  317. size_t tmpPos = 12; /* skip the header */
  318. #ifndef UA_ENABLE_MULTITHREADING
  319. seqHeader.sequenceNumber = ++channel->sendSequenceNumber;
  320. #else
  321. seqHeader.sequenceNumber = uatomic_add_return(&channel->sendSequenceNumber, 1);
  322. #endif
  323. retval |= UA_AsymmetricAlgorithmSecurityHeader_encodeBinary(&asymHeader, &resp_msg, &tmpPos); // just mirror back
  324. retval |= UA_SequenceHeader_encodeBinary(&seqHeader, &resp_msg, &tmpPos);
  325. UA_NodeId responseType = UA_NODEID_NUMERIC(0, UA_NS0ID_OPENSECURECHANNELRESPONSE + UA_ENCODINGOFFSET_BINARY);
  326. retval |= UA_NodeId_encodeBinary(&responseType, &resp_msg, &tmpPos);
  327. retval |= UA_OpenSecureChannelResponse_encodeBinary(&p, &resp_msg, &tmpPos);
  328. if(retval != UA_STATUSCODE_GOOD) {
  329. connection->releaseSendBuffer(connection, &resp_msg);
  330. UA_OpenSecureChannelResponse_deleteMembers(&p);
  331. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  332. connection->close(connection);
  333. return;
  334. }
  335. /* Encode the secureconversationmessageheader (cannot fail) and send */
  336. UA_SecureConversationMessageHeader respHeader;
  337. respHeader.messageHeader.messageTypeAndChunkType = UA_MESSAGETYPE_OPN + UA_CHUNKTYPE_FINAL;
  338. respHeader.messageHeader.messageSize = (UA_UInt32)tmpPos;
  339. respHeader.secureChannelId = p.securityToken.channelId;
  340. tmpPos = 0;
  341. UA_SecureConversationMessageHeader_encodeBinary(&respHeader, &resp_msg, &tmpPos);
  342. resp_msg.length = respHeader.messageHeader.messageSize;
  343. connection->send(connection, &resp_msg);
  344. /* Clean up */
  345. UA_OpenSecureChannelResponse_deleteMembers(&p);
  346. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  347. }
  348. static void
  349. processRequest(UA_SecureChannel *channel, UA_Server *server,
  350. UA_UInt32 requestId, const UA_ByteString *msg) {
  351. /* At 0, the nodeid starts... */
  352. size_t ppos = 0;
  353. size_t *offset = &ppos;
  354. /* Decode the nodeid */
  355. UA_NodeId requestTypeId;
  356. UA_StatusCode retval = UA_NodeId_decodeBinary(msg, offset, &requestTypeId);
  357. if(retval != UA_STATUSCODE_GOOD)
  358. return;
  359. /* Store the start-position of the request */
  360. size_t requestPos = *offset;
  361. /* Test if the service type nodeid has the right format */
  362. if(requestTypeId.identifierType != UA_NODEIDTYPE_NUMERIC ||
  363. requestTypeId.namespaceIndex != 0) {
  364. UA_NodeId_deleteMembers(&requestTypeId);
  365. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  366. "Received a non-numeric message type NodeId");
  367. sendError(channel, msg, requestPos, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  368. requestId, UA_STATUSCODE_BADSERVICEUNSUPPORTED);
  369. }
  370. /* Get the service pointers */
  371. UA_Service service = NULL;
  372. const UA_DataType *requestType = NULL;
  373. const UA_DataType *responseType = NULL;
  374. UA_Boolean sessionRequired = true;
  375. getServicePointers(requestTypeId.identifier.numeric, &requestType,
  376. &responseType, &service, &sessionRequired);
  377. if(!requestType) {
  378. if(requestTypeId.identifier.numeric == 787) {
  379. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  380. "Client requested a subscription, " \
  381. "but those are not enabled in the build");
  382. } else {
  383. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Unknown request %i",
  384. requestTypeId.identifier.numeric - UA_ENCODINGOFFSET_BINARY);
  385. }
  386. sendError(channel, msg, requestPos, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  387. requestId, UA_STATUSCODE_BADSERVICEUNSUPPORTED);
  388. return;
  389. }
  390. UA_assert(responseType);
  391. #ifdef UA_ENABLE_NONSTANDARD_STATELESS
  392. /* Stateless extension: Sessions are optional */
  393. sessionRequired = false;
  394. #endif
  395. /* Decode the request */
  396. void *request = UA_alloca(requestType->memSize);
  397. UA_RequestHeader *requestHeader = (UA_RequestHeader*)request;
  398. retval = UA_decodeBinary(msg, offset, request, requestType);
  399. if(retval != UA_STATUSCODE_GOOD) {
  400. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel, "Could not decode the request");
  401. sendError(channel, msg, requestPos, responseType, requestId, retval);
  402. return;
  403. }
  404. /* Prepare the respone */
  405. void *response = UA_alloca(responseType->memSize);
  406. UA_init(response, responseType);
  407. UA_Session *session = NULL; /* must be initialized before goto send_response */
  408. /* CreateSession doesn't need a session */
  409. if(requestType == &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST]) {
  410. Service_CreateSession(server, channel, request, response);
  411. goto send_response;
  412. }
  413. /* Find the matching session */
  414. session = UA_SecureChannel_getSession(channel, &requestHeader->authenticationToken);
  415. if(!session)
  416. session = UA_SessionManager_getSession(&server->sessionManager,
  417. &requestHeader->authenticationToken);
  418. if(requestType == &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST]) {
  419. if(!session) {
  420. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  421. "Trying to activate a session that is " \
  422. "not known in the server");
  423. sendError(channel, msg, requestPos, responseType,
  424. requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  425. UA_deleteMembers(request, requestType);
  426. return;
  427. }
  428. Service_ActivateSession(server, channel, session, request, response);
  429. goto send_response;
  430. }
  431. /* Set an anonymous, inactive session for services that need no session */
  432. UA_Session anonymousSession;
  433. if(!session) {
  434. if(sessionRequired) {
  435. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  436. "Service request %i without a valid session",
  437. requestTypeId.identifier.numeric - UA_ENCODINGOFFSET_BINARY);
  438. sendError(channel, msg, requestPos, responseType,
  439. requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  440. UA_deleteMembers(request, requestType);
  441. return;
  442. }
  443. UA_Session_init(&anonymousSession);
  444. anonymousSession.sessionId = UA_NODEID_GUID(0, UA_GUID_NULL);
  445. anonymousSession.channel = channel;
  446. session = &anonymousSession;
  447. }
  448. /* Trying to use a non-activated session? */
  449. if(sessionRequired && !session->activated) {
  450. UA_LOG_INFO_SESSION(server->config.logger, session,
  451. "Calling service %i on a non-activated session",
  452. requestTypeId.identifier.numeric - UA_ENCODINGOFFSET_BINARY);
  453. sendError(channel, msg, requestPos, responseType,
  454. requestId, UA_STATUSCODE_BADSESSIONNOTACTIVATED);
  455. UA_SessionManager_removeSession(&server->sessionManager,
  456. &session->authenticationToken);
  457. UA_deleteMembers(request, requestType);
  458. return;
  459. }
  460. /* The session is bound to another channel */
  461. if(session->channel != channel) {
  462. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  463. "Client tries to use an obsolete securechannel");
  464. sendError(channel, msg, requestPos, responseType,
  465. requestId, UA_STATUSCODE_BADSECURECHANNELIDINVALID);
  466. UA_deleteMembers(request, requestType);
  467. return;
  468. }
  469. /* Update the session lifetime */
  470. UA_Session_updateLifetime(session);
  471. #ifdef UA_ENABLE_SUBSCRIPTIONS
  472. /* The publish request is not answered immediately */
  473. if(requestType == &UA_TYPES[UA_TYPES_PUBLISHREQUEST]) {
  474. Service_Publish(server, session, request, requestId);
  475. UA_deleteMembers(request, requestType);
  476. return;
  477. }
  478. #endif
  479. /* Call the service */
  480. service(server, session, request, response);
  481. send_response:
  482. /* Send the response */
  483. init_response_header(request, response);
  484. retval = UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  485. if(retval != UA_STATUSCODE_GOOD)
  486. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Could not send the message over "
  487. "the SecureChannel with error code 0x%08x", retval);
  488. /* See if we need to return publish requests without a subscription */
  489. if(session && requestType == &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSREQUEST])
  490. UA_Session_answerPublishRequestsWithoutSubscription(session);
  491. /* Clean up */
  492. UA_deleteMembers(request, requestType);
  493. UA_deleteMembers(response, responseType);
  494. }
  495. /* MSG -> Normal request */
  496. static void
  497. processMSG(UA_Connection *connection, UA_Server *server,
  498. const UA_TcpMessageHeader *messageHeader,
  499. const UA_ByteString *msg, size_t *offset) {
  500. /* Decode the header */
  501. UA_UInt32 channelId = 0;
  502. UA_UInt32 tokenId = 0;
  503. UA_SequenceHeader sequenceHeader;
  504. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, offset, &channelId);
  505. retval |= UA_UInt32_decodeBinary(msg, offset, &tokenId);
  506. retval |= UA_SequenceHeader_decodeBinary(msg, offset, &sequenceHeader);
  507. if(retval != UA_STATUSCODE_GOOD)
  508. return;
  509. /* Get the SecureChannel */
  510. UA_SecureChannel *channel = connection->channel;
  511. UA_SecureChannel anonymousChannel; /* use if no channel specified */
  512. if(!channel) {
  513. UA_SecureChannel_init(&anonymousChannel);
  514. anonymousChannel.connection = connection;
  515. channel = &anonymousChannel;
  516. }
  517. /* Is the channel attached to connection? */
  518. if(channelId != channel->securityToken.channelId) {
  519. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  520. "Connection %i | Received MSG with the channel id %i not bound to the connection",
  521. connection->sockfd, channelId);
  522. Service_CloseSecureChannel(server, channel);
  523. connection->close(connection);
  524. return;
  525. }
  526. /* Does the sequence number match? */
  527. retval = UA_SecureChannel_processSequenceNumber(sequenceHeader.sequenceNumber, channel);
  528. if (retval != UA_STATUSCODE_GOOD){
  529. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  530. "The sequence number was not increased by one. Got %i, expected %i",
  531. sequenceHeader.sequenceNumber, channel->receiveSequenceNumber + 1);
  532. sendError(channel, msg, *offset, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  533. sequenceHeader.requestId, UA_STATUSCODE_BADSECURITYCHECKSFAILED);
  534. Service_CloseSecureChannel(server, channel);
  535. connection->close(connection);
  536. return;
  537. }
  538. /* Does the token match? */
  539. if(tokenId != channel->securityToken.tokenId) {
  540. if(tokenId != channel->nextSecurityToken.tokenId) {
  541. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  542. "Request with a wrong security token. Closing the SecureChannel.");
  543. Service_CloseSecureChannel(server, channel);
  544. connection->close(connection);
  545. return;
  546. }
  547. UA_SecureChannel_revolveTokens(channel);
  548. }
  549. /* Process chunk to get complete request */
  550. UA_Boolean deleteRequest = false;
  551. UA_ByteString request = processChunk(channel, server, messageHeader, sequenceHeader.requestId,
  552. msg, *offset, messageHeader->messageSize - 24, &deleteRequest);
  553. *offset += (messageHeader->messageSize - 24);
  554. if(request.length > 0) {
  555. /* Process the request */
  556. processRequest(channel, server, sequenceHeader.requestId, &request);
  557. if(deleteRequest)
  558. UA_ByteString_deleteMembers(&request);
  559. }
  560. /* Clean up a possible anonymous channel */
  561. if(channel == &anonymousChannel)
  562. UA_SecureChannel_deleteMembersCleanup(channel);
  563. }
  564. /* CLO -> Close the secure channel */
  565. static void
  566. processCLO(UA_Connection *connection, UA_Server *server,
  567. const UA_ByteString *msg, size_t *offset) {
  568. UA_UInt32 channelId;
  569. UA_UInt32 tokenId = 0;
  570. UA_SequenceHeader sequenceHeader;
  571. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, offset, &channelId);
  572. retval |= UA_UInt32_decodeBinary(msg, offset, &tokenId);
  573. retval |= UA_SequenceHeader_decodeBinary(msg, offset, &sequenceHeader);
  574. if(retval != UA_STATUSCODE_GOOD)
  575. return;
  576. UA_SecureChannel *channel = connection->channel;
  577. if(!channel || channel->securityToken.channelId != channelId ||
  578. channel->securityToken.tokenId != tokenId)
  579. return;
  580. if(sequenceHeader.sequenceNumber != channel->receiveSequenceNumber + 1)
  581. return;
  582. Service_CloseSecureChannel(server, connection->channel);
  583. }
  584. /* Process binary message received from Connection dose not modify UA_ByteString
  585. * you have to free it youself. use of connection->getSendBuffer() and
  586. * connection->send() to answer Message */
  587. void
  588. UA_Server_processBinaryMessage(UA_Server *server, UA_Connection *connection,
  589. const UA_ByteString *msg) {
  590. size_t offset= 0;
  591. UA_TcpMessageHeader tcpMessageHeader;
  592. do {
  593. /* Decode the message header */
  594. UA_StatusCode retval = UA_TcpMessageHeader_decodeBinary(msg, &offset, &tcpMessageHeader);
  595. if(retval != UA_STATUSCODE_GOOD) {
  596. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  597. "Decoding of message header failed on Connection %i",
  598. connection->sockfd);
  599. connection->close(connection);
  600. break;
  601. }
  602. if(tcpMessageHeader.messageSize < 16) {
  603. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  604. "The message is suspiciously small on Connection %i",
  605. connection->sockfd);
  606. connection->close(connection);
  607. break;
  608. }
  609. /* Set the expected position after processing the chunk */
  610. size_t targetpos = offset - 8 + tcpMessageHeader.messageSize;
  611. /* Process the message */
  612. switch(tcpMessageHeader.messageTypeAndChunkType & 0x00ffffff) {
  613. case UA_MESSAGETYPE_HEL:
  614. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  615. "Connection %i | Process a HEL", connection->sockfd);
  616. processHEL(connection, msg, &offset);
  617. break;
  618. case UA_MESSAGETYPE_OPN:
  619. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  620. "Connection %i | Process a OPN", connection->sockfd);
  621. processOPN(connection, server, msg, &offset);
  622. break;
  623. case UA_MESSAGETYPE_MSG:
  624. #ifndef UA_ENABLE_NONSTANDARD_STATELESS
  625. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  626. UA_LOG_DEBUG(server->config.logger, UA_LOGCATEGORY_NETWORK,
  627. "Connection %i | Received a MSG, but the connection " \
  628. "is not established", connection->sockfd);
  629. connection->close(connection);
  630. return;
  631. }
  632. #endif
  633. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  634. "Connection %i | Process a MSG", connection->sockfd);
  635. processMSG(connection, server, &tcpMessageHeader, msg, &offset);
  636. break;
  637. case UA_MESSAGETYPE_CLO:
  638. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  639. "Connection %i | Process a CLO", connection->sockfd);
  640. processCLO(connection, server, msg, &offset);
  641. return;
  642. default:
  643. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  644. "Connection %i | Unknown chunk type", connection->sockfd);
  645. }
  646. /* Loop to process the next message in the stream */
  647. if(offset != targetpos) {
  648. UA_LOG_DEBUG(server->config.logger, UA_LOGCATEGORY_NETWORK,
  649. "Connection %i | Message was not entirely processed. " \
  650. "Skip from position %i to position %i; message length is %i",
  651. connection->sockfd, offset, targetpos, msg->length);
  652. offset = targetpos;
  653. }
  654. } while(msg->length > offset);
  655. }