ua_stack_channel.c 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416
  1. /*
  2. * ua_stack_channel.c
  3. *
  4. * Created on: 09.05.2014
  5. * Author: root
  6. */
  7. #include "ua_stack_channel.h"
  8. #include <time.h>
  9. #include <stdlib.h>
  10. typedef struct SL_ChannelStruct {
  11. SL_channelState state;
  12. UA_UInt32 channelId;
  13. //TL_Connection* tlConnection;
  14. UA_TL_Connection connection;
  15. UA_UInt32 requestId;
  16. //UA_UInt32 lastRequestId;
  17. UA_UInt32 sequenceNumber;
  18. //UA_UInt32 lastSequenceNumber;
  19. UA_AsymmetricAlgorithmSecurityHeader remoteAsymAlgSettings;
  20. UA_AsymmetricAlgorithmSecurityHeader localAsymAlgSettings;
  21. UA_ChannelSecurityToken securityToken;
  22. UA_MessageSecurityMode securityMode;
  23. UA_ByteString remoteNonce;
  24. UA_ByteString localNonce;
  25. SL_ChannelSecurityTokenProvider tokenProvider;
  26. SL_ChannelIdProvider channelIdProvider;
  27. } SL_ChannelType;
  28. UA_Int32 SL_Channel_setRemoteSecuritySettings(SL_Channel channel,
  29. UA_AsymmetricAlgorithmSecurityHeader *asymSecHeader,
  30. UA_SequenceHeader *sequenceHeader) {
  31. UA_Int32 retval = UA_SUCCESS;
  32. retval |= UA_AsymmetricAlgorithmSecurityHeader_copy(asymSecHeader,
  33. &((SL_ChannelType*) channel)->remoteAsymAlgSettings);
  34. //set starting sequence number from remote partner
  35. ((SL_ChannelType*) channel)->sequenceNumber =
  36. sequenceHeader->sequenceNumber;
  37. //set starting request id from remote partner
  38. ((SL_ChannelType*) channel)->requestId = sequenceHeader->requestId;
  39. return retval;
  40. }
  41. /*
  42. UA_Int32 SL_Channel_initLocalSecuritySettings(SL_Channel channel)
  43. {
  44. UA_Int32 retval = UA_SUCCESS;
  45. ((SL_ChannelType*) channel)->localAsymAlgSettings.receiverCertificateThumbprint.data = UA_NULL;
  46. ((SL_ChannelType*) channel)->localAsymAlgSettings.receiverCertificateThumbprint.length = 0;
  47. retval |= UA_String_copycstring("http://opcfoundation.org/UA/SecurityPolicy#None",(UA_String*)&((SL_ChannelType*) channel)->localAsymAlgSettings.securityPolicyUri);
  48. ((SL_ChannelType*) channel)->localAsymAlgSettings.senderCertificate.data = UA_NULL;
  49. ((SL_ChannelType*) channel)->localAsymAlgSettings.senderCertificate.length = 0;
  50. return retval;
  51. }
  52. */
  53. UA_Int32 SL_Channel_new(SL_Channel **channel) {
  54. UA_Int32 retval = UA_SUCCESS;
  55. retval |= UA_alloc((void** )channel, sizeof(SL_Channel));
  56. SL_ChannelType *thisChannel = UA_NULL;
  57. retval |= UA_alloc((void** )&thisChannel, sizeof(SL_ChannelType));
  58. **channel = (SL_Channel) thisChannel;
  59. return retval;
  60. }
  61. //TODO implement real nonce generator - DUMMY function
  62. UA_Int32 SL_Channel_generateNonce(UA_ByteString *nonce) {
  63. //UA_ByteString_new(&nonce);
  64. UA_alloc((void** )&(nonce->data), 1);
  65. nonce->length = 1;
  66. nonce->data[0] = 'a';
  67. return UA_SUCCESS;
  68. }
  69. UA_Int32 SL_Channel_init(SL_Channel channel, UA_TL_Connection connection,
  70. SL_ChannelIdProvider channelIdProvider,
  71. SL_ChannelSecurityTokenProvider tokenProvider) {
  72. UA_Int32 retval = UA_SUCCESS;
  73. ((SL_ChannelType*) channel)->channelIdProvider = channelIdProvider;
  74. ((SL_ChannelType*) channel)->tokenProvider = tokenProvider;
  75. ((SL_ChannelType*) channel)->connection = connection;
  76. //generate secure channel id
  77. ((SL_ChannelType*) channel)->channelIdProvider(
  78. &((SL_ChannelType*) channel)->channelId);
  79. //generate local nonce
  80. SL_Channel_generateNonce(&channel->localNonce);
  81. //TODO get this from the local configuration file MOCK UP ---start
  82. ((SL_ChannelType*) channel)->localAsymAlgSettings.receiverCertificateThumbprint.data = UA_NULL;
  83. ((SL_ChannelType*) channel)->localAsymAlgSettings.receiverCertificateThumbprint.length = 0;
  84. retval |= UA_String_copycstring("http://opcfoundation.org/UA/SecurityPolicy#None",(UA_String*)&((SL_ChannelType*) channel)->localAsymAlgSettings.securityPolicyUri);
  85. ((SL_ChannelType*) channel)->localAsymAlgSettings.senderCertificate.data = UA_NULL;
  86. ((SL_ChannelType*) channel)->localAsymAlgSettings.senderCertificate.length = 0;
  87. // MOCK UP ---end
  88. ((SL_ChannelType*) channel)->state = UA_SL_CHANNEL_CLOSED;
  89. return retval;
  90. }
  91. UA_Int32 SL_Channel_registerTokenProvider(SL_Channel channel,
  92. SL_ChannelSecurityTokenProvider provider) {
  93. ((SL_ChannelType*) channel)->tokenProvider = provider;
  94. return UA_SUCCESS;
  95. }
  96. UA_Int32 SL_Channel_getRemainingLifetime(SL_Channel channel, UA_Int32 *lifetime) {
  97. if (channel) {
  98. UA_Int64 diffInMS =
  99. (((SL_ChannelType*) channel)->securityToken.createdAt
  100. - UA_DateTime_now()) / 1e7;
  101. if (diffInMS > UA_INT32_MAX) {
  102. *lifetime = UA_INT32_MAX;
  103. } else {
  104. *lifetime = (UA_Int32) diffInMS;
  105. }
  106. return UA_SUCCESS;
  107. } else {
  108. printf(
  109. "SL_Channel_getRemainingLifetime - no valid channel object, null pointer");
  110. return UA_ERROR;
  111. }
  112. }
  113. UA_Int32 SL_Channel_getChannelId(SL_Channel channel, UA_UInt32 *channelId) {
  114. if (channel) {
  115. *channelId = ((SL_ChannelType*) channel)->channelId;
  116. return UA_SUCCESS;
  117. }
  118. return UA_ERROR;
  119. }
  120. UA_Int32 SL_Channel_getTokenId(SL_Channel channel, UA_UInt32 *tokenId) {
  121. if (channel) {
  122. *tokenId = ((SL_ChannelType*) channel)->securityToken.tokenId;
  123. return UA_SUCCESS;
  124. }
  125. return UA_ERROR;
  126. }
  127. UA_Int32 SL_Channel_getLocalAsymAlgSettings(SL_Channel channel,
  128. UA_AsymmetricAlgorithmSecurityHeader **asymAlgSettings) {
  129. UA_Int32 retval = 0;
  130. retval |= UA_alloc((void** )asymAlgSettings,
  131. UA_AsymmetricAlgorithmSecurityHeader_calcSizeBinary(UA_NULL));
  132. retval |=
  133. UA_ByteString_copy(
  134. &(((SL_ChannelType*) channel)->localAsymAlgSettings.receiverCertificateThumbprint),
  135. &(*asymAlgSettings)->receiverCertificateThumbprint);
  136. retval |=
  137. UA_ByteString_copy(
  138. &(((SL_ChannelType*) channel)->localAsymAlgSettings.securityPolicyUri),
  139. &(*asymAlgSettings)->securityPolicyUri);
  140. retval |=
  141. UA_ByteString_copy(
  142. &(((SL_ChannelType*) channel)->localAsymAlgSettings.senderCertificate),
  143. &(*asymAlgSettings)->senderCertificate);
  144. return UA_SUCCESS;
  145. }
  146. UA_Int32 SL_Channel_getConnection(SL_Channel channel,
  147. UA_TL_Connection *connection) {
  148. if (channel) {
  149. *connection = ((SL_ChannelType*) channel)->connection;
  150. return UA_SUCCESS;
  151. }
  152. return UA_ERROR;
  153. }
  154. UA_Int32 SL_Channel_getRequestId(SL_Channel channel, UA_UInt32 *requestId) {
  155. if (channel) {
  156. *requestId = ((SL_ChannelType*) channel)->requestId;
  157. return UA_SUCCESS;
  158. }
  159. return UA_ERROR;
  160. }
  161. UA_Int32 SL_Channel_getSequenceNumber(SL_Channel channel,
  162. UA_UInt32 *sequenceNumber) {
  163. if (channel) {
  164. *sequenceNumber = ((SL_ChannelType*) channel)->sequenceNumber;
  165. return UA_SUCCESS;
  166. }
  167. return UA_ERROR;
  168. }
  169. UA_Int32 SL_Channel_getState(SL_Channel channel, SL_channelState *channelState) {
  170. if (channel) {
  171. *channelState = ((SL_ChannelType*) channel)->state;
  172. return UA_SUCCESS;
  173. }
  174. return UA_ERROR;
  175. }
  176. UA_Int32 SL_Channel_getRevisedLifetime(SL_Channel channel,
  177. UA_UInt32 *revisedLifetime) {
  178. if (channel) {
  179. *revisedLifetime =
  180. ((SL_ChannelType*) channel)->securityToken.revisedLifetime;
  181. return UA_SUCCESS;
  182. }
  183. return UA_ERROR;
  184. }
  185. //setters
  186. UA_Int32 SL_Channel_setId(SL_Channel channel, UA_UInt32 id) {
  187. ((SL_ChannelType*) channel)->channelId = id;
  188. return UA_SUCCESS;
  189. }
  190. //private function
  191. UA_Int32 SL_Channel_setState(SL_Channel channel, SL_channelState channelState) {
  192. ((SL_ChannelType*) channel)->state = channelState;
  193. return UA_SUCCESS;
  194. }
  195. UA_Boolean SL_Channel_compare(SL_Channel channel1, SL_Channel channel2) {
  196. return (((SL_ChannelType*) channel1)->channelId
  197. == ((SL_ChannelType*) channel2)->channelId) ?
  198. UA_TRUE :
  199. UA_FALSE;
  200. }
  201. UA_Int32 SL_Channel_bind(SL_Channel channel, UA_TL_Connection connection) {
  202. if (channel && connection) {
  203. ((SL_ChannelType*) channel)->connection = connection;
  204. return UA_SUCCESS;
  205. }
  206. return UA_ERROR;
  207. }
  208. UA_Int32 SL_Channel_deleteMembers(SL_Channel channel) {
  209. UA_Int32 retval = UA_SUCCESS;
  210. retval |= UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(
  211. &((SL_ChannelType*) channel)->localAsymAlgSettings);
  212. retval |= UA_ByteString_deleteMembers(
  213. &((SL_ChannelType*) channel)->localNonce);
  214. retval |= UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(
  215. &((SL_ChannelType*) channel)->remoteAsymAlgSettings);
  216. retval |= UA_ByteString_deleteMembers(
  217. &((SL_ChannelType*) channel)->remoteNonce);
  218. retval |= UA_ChannelSecurityToken_deleteMembers(
  219. &((SL_ChannelType*) channel)->securityToken);
  220. return retval;
  221. }
  222. UA_Int32 SL_Channel_delete(SL_Channel *channel) {
  223. UA_Int32 retval = UA_SUCCESS;
  224. retval = SL_Channel_deleteMembers(*channel);
  225. retval = UA_free(*channel);
  226. return retval;
  227. }
  228. UA_Int32 SL_Channel_processTokenRequest(SL_Channel channel,
  229. UA_UInt32 requestedLifetime, UA_SecurityTokenRequestType requestType) {
  230. if (((SL_ChannelType*) channel)->tokenProvider) {
  231. return ((SL_ChannelType*) channel)->tokenProvider(channel,
  232. requestedLifetime, requestType,
  233. &((SL_ChannelType*) channel)->securityToken);
  234. }
  235. printf("SL_Channel_processTokenRequest - no Token provider registered");
  236. return UA_ERROR;
  237. }
  238. UA_Int32 SL_Channel_renewToken(SL_Channel channel, UA_UInt32 tokenId,
  239. UA_DateTime revisedLifetime, UA_DateTime createdAt) {
  240. ((SL_ChannelType*) channel)->securityToken.tokenId = tokenId;
  241. ((SL_ChannelType*) channel)->securityToken.createdAt = createdAt;
  242. ((SL_ChannelType*) channel)->securityToken.revisedLifetime =
  243. revisedLifetime;
  244. return UA_SUCCESS;
  245. }
  246. UA_Int32 SL_Channel_checkSequenceNumber(SL_Channel channel,
  247. UA_UInt32 sequenceNumber) {
  248. //TODO review checking of sequence
  249. if (((SL_ChannelType*) channel)->sequenceNumber+1 == sequenceNumber) {
  250. ((SL_ChannelType*) channel)->sequenceNumber++;
  251. return UA_SUCCESS;
  252. }
  253. printf(
  254. "SL_Channel_checkSequenceNumber - ERROR, wrong SequenceNumber expected: %i, received: %i",
  255. ((SL_ChannelType*) channel)->sequenceNumber + 1, sequenceNumber);
  256. return UA_ERROR;
  257. }
  258. UA_Int32 SL_Channel_checkRequestId(SL_Channel channel, UA_UInt32 requestId) {
  259. //TODO review checking of request id
  260. if (((SL_ChannelType*) channel)->requestId+1 == requestId) {
  261. ((SL_ChannelType*) channel)->requestId++;
  262. return UA_SUCCESS;
  263. }
  264. printf(
  265. "SL_Channel_requestId - ERROR, wrong requestId expected: %i, received: %i",
  266. ((SL_ChannelType*) channel)->requestId + 1, requestId);
  267. return UA_ERROR;
  268. }
  269. UA_Int32 SL_Channel_processOpenRequest(SL_Channel channel,
  270. const UA_OpenSecureChannelRequest* request,
  271. UA_OpenSecureChannelResponse* response) {
  272. UA_UInt32 protocolVersion;
  273. SL_ChannelType *thisChannel = (SL_ChannelType*) channel;
  274. UA_Int32 retval = UA_SUCCESS;
  275. UA_TL_Connection_getProtocolVersion(thisChannel->connection,
  276. &protocolVersion);
  277. if (request->clientProtocolVersion != protocolVersion) {
  278. printf("SL_Channel_processOpenRequest - error protocol version \n");
  279. //TODO ERROR_Bad_ProtocolVersionUnsupported
  280. }
  281. switch (request->requestType) {
  282. case UA_SECURITYTOKEN_ISSUE:
  283. if (thisChannel->state == UA_SL_CHANNEL_OPEN) {
  284. printf(
  285. "SL_Channel_processOpenRequest - multiple security token request");
  286. //TODO return ERROR
  287. retval = UA_ERROR;
  288. break;
  289. }
  290. printf(
  291. "SL_Channel_processOpenRequest - creating new token for a new SecureChannel\n");
  292. SL_Channel_processTokenRequest(channel, request->requestedLifetime,
  293. request->requestType);
  294. // SL_createNewToken(connection);
  295. break;
  296. case UA_SECURITYTOKEN_RENEW:
  297. if (thisChannel->state == UA_SL_CHANNEL_CLOSED) {
  298. printf(
  299. "SL_Channel_processOpenRequest - renew token request received, but no secureChannel was established before");
  300. //TODO return ERROR
  301. retval = UA_ERROR;
  302. break;
  303. } else {
  304. //generate new SecurityToken
  305. retval = SL_Channel_processTokenRequest(channel,
  306. request->requestedLifetime, request->requestType);
  307. if (retval != UA_SUCCESS) {
  308. printf(
  309. "SL_Channel_processOpenRequest - cannot create new token for an existing SecureChannel\n");
  310. } else {
  311. printf(
  312. "SL_Channel_processOpenRequest - creating new token for an existing SecureChannel\n");
  313. }
  314. break;
  315. }
  316. }
  317. switch (request->securityMode) {
  318. case UA_SECURITYMODE_INVALID:
  319. thisChannel->remoteNonce.data = UA_NULL;
  320. thisChannel->remoteNonce.length = -1;
  321. printf("SL_Channel_processOpenRequest - client demands no security \n");
  322. break;
  323. case UA_SECURITYMODE_SIGN:
  324. printf("SL_Channel_processOpenRequest - client demands signed \n");
  325. //TODO check if senderCertificate and ReceiverCertificateThumbprint are present
  326. break;
  327. case UA_SECURITYMODE_SIGNANDENCRYPT:
  328. printf(
  329. "SL_Channel_processOpenRequest - client demands signed & encrypted \n");
  330. //TODO check if senderCertificate and ReceiverCertificateThumbprint are present
  331. break;
  332. }
  333. UA_ByteString_copy(&request->clientNonce, &thisChannel->remoteNonce);
  334. thisChannel->state = UA_SL_CHANNEL_OPEN;
  335. if (request->requestHeader.returnDiagnostics != 0) {
  336. printf("SL_openSecureChannel - diagnostics demanded by the client\n");
  337. printf(
  338. "SL_openSecureChannel - retrieving diagnostics not implemented!\n");
  339. //TODO fill with demanded information part 4, 7.8 - Table 123
  340. response->responseHeader.serviceDiagnostics.encodingMask = 0;
  341. } else {
  342. response->responseHeader.serviceDiagnostics.encodingMask = 0;
  343. }
  344. response->serverProtocolVersion = protocolVersion;
  345. UA_ChannelSecurityToken_copy(&((SL_ChannelType*) (channel))->securityToken,
  346. &(response->securityToken));
  347. UA_ByteString_copy(&thisChannel->localNonce, &response->serverNonce);
  348. return retval;
  349. }
  350. UA_Int32 SL_Channel_processCloseRequest(SL_Channel channel,
  351. const UA_CloseSecureChannelRequest* request) {
  352. SL_Channel_setState(channel, UA_SL_CHANNEL_CLOSED);
  353. return UA_SUCCESS;
  354. }