ua_securechannel.c 3.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106
  1. #include "ua_util.h"
  2. #include "ua_securechannel.h"
  3. #include "ua_session.h"
  4. #include "ua_statuscodes.h"
  5. void UA_SecureChannel_init(UA_SecureChannel *channel) {
  6. UA_MessageSecurityMode_init(&channel->securityMode);
  7. UA_ChannelSecurityToken_init(&channel->securityToken);
  8. UA_AsymmetricAlgorithmSecurityHeader_init(&channel->clientAsymAlgSettings);
  9. UA_AsymmetricAlgorithmSecurityHeader_init(&channel->serverAsymAlgSettings);
  10. UA_ByteString_init(&channel->clientNonce);
  11. UA_ByteString_init(&channel->serverNonce);
  12. channel->requestId = 0;
  13. channel->sequenceNumber = 0;
  14. channel->connection = UA_NULL;
  15. LIST_INIT(&channel->sessions);
  16. }
  17. void UA_SecureChannel_deleteMembersCleanup(UA_SecureChannel *channel) {
  18. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&channel->serverAsymAlgSettings);
  19. UA_ByteString_deleteMembers(&channel->serverNonce);
  20. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&channel->clientAsymAlgSettings);
  21. UA_ByteString_deleteMembers(&channel->clientNonce);
  22. UA_ChannelSecurityToken_deleteMembers(&channel->securityToken);
  23. UA_Connection *c = channel->connection;
  24. if(c) {
  25. UA_Connection_detachSecureChannel(c);
  26. c->close(c);
  27. }
  28. /* just remove the pointers and free the linked list (not the sessions) */
  29. struct SessionEntry *se;
  30. while((se = LIST_FIRST(&channel->sessions))) {
  31. UA_SecureChannel_detachSession(channel, se->session); /* the se is deleted inside */
  32. }
  33. }
  34. //TODO implement real nonce generator - DUMMY function
  35. UA_StatusCode UA_SecureChannel_generateNonce(UA_ByteString *nonce) {
  36. if(!(nonce->data = UA_malloc(1)))
  37. return UA_STATUSCODE_BADOUTOFMEMORY;
  38. nonce->length = 1;
  39. nonce->data[0] = 'a';
  40. return UA_STATUSCODE_GOOD;
  41. }
  42. UA_StatusCode UA_SecureChannel_updateRequestId(UA_SecureChannel *channel, UA_UInt32 requestId) {
  43. //TODO review checking of request id
  44. if(channel->requestId+1 != requestId)
  45. return UA_STATUSCODE_BADINTERNALERROR;
  46. channel->requestId++;
  47. return UA_STATUSCODE_GOOD;
  48. }
  49. UA_StatusCode UA_SecureChannel_updateSequenceNumber(UA_SecureChannel *channel, UA_UInt32 sequenceNumber) {
  50. //TODO review checking of sequence
  51. if(channel->sequenceNumber+1 != sequenceNumber)
  52. return UA_STATUSCODE_BADINTERNALERROR;
  53. channel->sequenceNumber++;
  54. return UA_STATUSCODE_GOOD;
  55. }
  56. void UA_SecureChannel_attachSession(UA_SecureChannel *channel, UA_Session *session) {
  57. struct SessionEntry *se = UA_malloc(sizeof(struct SessionEntry));
  58. if(!se)
  59. return;
  60. se->session = session;
  61. #ifdef UA_MULTITHREADING
  62. if(uatomic_cmpxchg(&session->channel, UA_NULL, channel) != UA_NULL) {
  63. UA_free(se);
  64. return;
  65. }
  66. #else
  67. if(session->channel != UA_NULL) {
  68. UA_free(se);
  69. return;
  70. }
  71. session->channel = channel;
  72. #endif
  73. LIST_INSERT_HEAD(&channel->sessions, se, pointers);
  74. }
  75. void UA_SecureChannel_detachSession(UA_SecureChannel *channel, UA_Session *session) {
  76. if(session)
  77. session->channel = UA_NULL;
  78. struct SessionEntry *se;
  79. LIST_FOREACH(se, &channel->sessions, pointers) {
  80. if(se->session != session)
  81. continue;
  82. LIST_REMOVE(se, pointers);
  83. UA_free(se);
  84. break;
  85. }
  86. }
  87. UA_Session * UA_SecureChannel_getSession(UA_SecureChannel *channel, UA_NodeId *token) {
  88. struct SessionEntry *se;
  89. LIST_FOREACH(se, &channel->sessions, pointers) {
  90. if(UA_NodeId_equal(&se->session->authenticationToken, token))
  91. break;
  92. }
  93. if(se)
  94. return se->session;
  95. else
  96. return UA_NULL;
  97. }