123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106 |
- #include "ua_util.h"
- #include "ua_securechannel.h"
- #include "ua_session.h"
- #include "ua_statuscodes.h"
- void UA_SecureChannel_init(UA_SecureChannel *channel) {
- UA_MessageSecurityMode_init(&channel->securityMode);
- UA_ChannelSecurityToken_init(&channel->securityToken);
- UA_AsymmetricAlgorithmSecurityHeader_init(&channel->clientAsymAlgSettings);
- UA_AsymmetricAlgorithmSecurityHeader_init(&channel->serverAsymAlgSettings);
- UA_ByteString_init(&channel->clientNonce);
- UA_ByteString_init(&channel->serverNonce);
- channel->requestId = 0;
- channel->sequenceNumber = 0;
- channel->connection = UA_NULL;
- LIST_INIT(&channel->sessions);
- }
- void UA_SecureChannel_deleteMembersCleanup(UA_SecureChannel *channel) {
- UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&channel->serverAsymAlgSettings);
- UA_ByteString_deleteMembers(&channel->serverNonce);
- UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&channel->clientAsymAlgSettings);
- UA_ByteString_deleteMembers(&channel->clientNonce);
- UA_ChannelSecurityToken_deleteMembers(&channel->securityToken);
- UA_Connection *c = channel->connection;
- if(c) {
- UA_Connection_detachSecureChannel(c);
- c->close(c);
- }
- /* just remove the pointers and free the linked list (not the sessions) */
- struct SessionEntry *se;
- while((se = LIST_FIRST(&channel->sessions))) {
- UA_SecureChannel_detachSession(channel, se->session); /* the se is deleted inside */
- }
- }
- //TODO implement real nonce generator - DUMMY function
- UA_StatusCode UA_SecureChannel_generateNonce(UA_ByteString *nonce) {
- if(!(nonce->data = UA_malloc(1)))
- return UA_STATUSCODE_BADOUTOFMEMORY;
- nonce->length = 1;
- nonce->data[0] = 'a';
- return UA_STATUSCODE_GOOD;
- }
- UA_StatusCode UA_SecureChannel_updateRequestId(UA_SecureChannel *channel, UA_UInt32 requestId) {
- //TODO review checking of request id
- if(channel->requestId+1 != requestId)
- return UA_STATUSCODE_BADINTERNALERROR;
- channel->requestId++;
- return UA_STATUSCODE_GOOD;
- }
- UA_StatusCode UA_SecureChannel_updateSequenceNumber(UA_SecureChannel *channel, UA_UInt32 sequenceNumber) {
- //TODO review checking of sequence
- if(channel->sequenceNumber+1 != sequenceNumber)
- return UA_STATUSCODE_BADINTERNALERROR;
- channel->sequenceNumber++;
- return UA_STATUSCODE_GOOD;
- }
- void UA_SecureChannel_attachSession(UA_SecureChannel *channel, UA_Session *session) {
- struct SessionEntry *se = UA_malloc(sizeof(struct SessionEntry));
- if(!se)
- return;
- se->session = session;
- #ifdef UA_MULTITHREADING
- if(uatomic_cmpxchg(&session->channel, UA_NULL, channel) != UA_NULL) {
- UA_free(se);
- return;
- }
- #else
- if(session->channel != UA_NULL) {
- UA_free(se);
- return;
- }
- session->channel = channel;
- #endif
- LIST_INSERT_HEAD(&channel->sessions, se, pointers);
- }
- void UA_SecureChannel_detachSession(UA_SecureChannel *channel, UA_Session *session) {
- if(session)
- session->channel = UA_NULL;
- struct SessionEntry *se;
- LIST_FOREACH(se, &channel->sessions, pointers) {
- if(se->session != session)
- continue;
- LIST_REMOVE(se, pointers);
- UA_free(se);
- break;
- }
- }
- UA_Session * UA_SecureChannel_getSession(UA_SecureChannel *channel, UA_NodeId *token) {
- struct SessionEntry *se;
- LIST_FOREACH(se, &channel->sessions, pointers) {
- if(UA_NodeId_equal(&se->session->authenticationToken, token))
- break;
- }
- if(se)
- return se->session;
- else
- return UA_NULL;
- }
|