123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647 |
- /* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/.
- *
- * Copyright 2015-2017 (c) Fraunhofer IOSB (Author: Julius Pfrommer)
- * Copyright 2015-2016 (c) Sten Grüner
- * Copyright 2015-2016 (c) Chris Iatrou
- * Copyright 2015 (c) hfaham
- * Copyright 2015-2017 (c) Florian Palm
- * Copyright 2017-2018 (c) Thomas Stalder, Blue Time Concept SA
- * Copyright 2015 (c) Holger Jeromin
- * Copyright 2015 (c) Oleksiy Vasylyev
- * Copyright 2016 (c) TorbenD
- * Copyright 2017 (c) Stefan Profanter, fortiss GmbH
- * Copyright 2016 (c) Lykurg
- * Copyright 2017 (c) Mark Giraud, Fraunhofer IOSB
- * Copyright 2018 (c) Kalycito Infotech Private Limited
- */
- #include "ua_client_internal.h"
- #include "ua_connection_internal.h"
- #include "ua_types_encoding_binary.h"
- #include "ua_types_generated_encoding_binary.h"
- #include "ua_util.h"
- #include "ua_securitypolicies.h"
- #include "ua_pki_certificate.h"
- #define STATUS_CODE_BAD_POINTER 0x01
- /********************/
- /* Client Lifecycle */
- /********************/
- static void
- UA_Client_init(UA_Client* client, UA_ClientConfig config) {
- memset(client, 0, sizeof(UA_Client));
- /* TODO: Select policy according to the endpoint */
- UA_SecurityPolicy_None(&client->securityPolicy, NULL, UA_BYTESTRING_NULL, config.logger);
- UA_SecureChannel_init(&client->channel);
- client->config = config;
- if(client->config.stateCallback)
- client->config.stateCallback(client, client->state);
- /* Catch error during async connection */
- client->connectStatus = UA_STATUSCODE_GOOD;
- UA_Timer_init(&client->timer);
- UA_WorkQueue_init(&client->workQueue);
- }
- UA_Client *
- UA_Client_new(UA_ClientConfig config) {
- UA_Client *client = (UA_Client*)UA_malloc(sizeof(UA_Client));
- if(!client)
- return NULL;
- UA_Client_init(client, config);
- return client;
- }
- #ifdef UA_ENABLE_ENCRYPTION
- /* Initializes a secure client with the required configuration, certificate
- * privatekey, trustlist and revocation list.
- *
- * @param client client to store configuration
- * @param config new secure configuration for client
- * @param certificate client certificate
- * @param privateKey client's private key
- * @param remoteCertificate server certificate form the endpoints
- * @param trustList list of trustable certificate
- * @param trustListSize count of trustList
- * @param revocationList list of revoked digital certificate
- * @param revocationListSize count of revocationList
- * @param securityPolicyFunction securityPolicy function
- * @return Returns a client configuration for secure channel */
- static UA_StatusCode
- UA_Client_secure_init(UA_Client* client, UA_ClientConfig config,
- const UA_ByteString certificate,
- const UA_ByteString privateKey,
- const UA_ByteString *remoteCertificate,
- const UA_ByteString *trustList, size_t trustListSize,
- const UA_ByteString *revocationList,
- size_t revocationListSize,
- UA_SecurityPolicy_Func securityPolicyFunction) {
- if(client == NULL || remoteCertificate == NULL)
- return STATUS_CODE_BAD_POINTER;
- memset(client, 0, sizeof(UA_Client));
- /* Allocate memory for certificate verification */
- client->securityPolicy.certificateVerification =
- (UA_CertificateVerification *)
- UA_malloc(sizeof(UA_CertificateVerification));
- UA_StatusCode retval =
- UA_CertificateVerification_Trustlist(client->securityPolicy.certificateVerification,
- trustList, trustListSize,
- revocationList, revocationListSize);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_LOG_ERROR(client->channel.securityPolicy->logger, UA_LOGCATEGORY_SECURECHANNEL,
- "Trust list parsing failed with error %s", UA_StatusCode_name(retval));
- return retval;
- }
- /* Initiate client security policy */
- retval = (*securityPolicyFunction)(&client->securityPolicy,
- client->securityPolicy.certificateVerification,
- certificate, privateKey, config.logger);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_LOG_ERROR(client->channel.securityPolicy->logger, UA_LOGCATEGORY_CLIENT,
- "Failed to setup the SecurityPolicy with error %s", UA_StatusCode_name(retval));
- return retval;
- }
- client->config = config;
- if(client->config.stateCallback)
- client->config.stateCallback(client, client->state);
- /* Catch error during async connection */
- client->connectStatus = UA_STATUSCODE_GOOD;
- UA_Timer_init(&client->timer);
- UA_WorkQueue_init(&client->workQueue);
- /* Initialize the SecureChannel */
- UA_SecureChannel_init(&client->channel);
- client->channel.securityMode = UA_MESSAGESECURITYMODE_SIGNANDENCRYPT;
- retval = UA_SecureChannel_setSecurityPolicy(&client->channel, &client->securityPolicy,
- remoteCertificate);
- return retval;
- }
- /* Creates a new secure client.
- *
- * @param config new secure configuration for client
- * @param certificate client certificate
- * @param privateKey client's private key
- * @param remoteCertificate server certificate form the endpoints
- * @param trustList list of trustable certificate
- * @param trustListSize count of trustList
- * @param revocationList list of revoked digital certificate
- * @param revocationListSize count of revocationList
- * @param securityPolicyFunction securityPolicy function
- * @return Returns a client with secure configuration */
- UA_Client *
- UA_Client_secure_new(UA_ClientConfig config, UA_ByteString certificate,
- UA_ByteString privateKey, const UA_ByteString *remoteCertificate,
- const UA_ByteString *trustList, size_t trustListSize,
- const UA_ByteString *revocationList, size_t revocationListSize,
- UA_SecurityPolicy_Func securityPolicyFunction) {
- if(remoteCertificate == NULL)
- return NULL;
- UA_Client *client = (UA_Client *)UA_malloc(sizeof(UA_Client));
- if(!client)
- return NULL;
- UA_StatusCode retval = UA_Client_secure_init(client, config, certificate, privateKey,
- remoteCertificate, trustList, trustListSize,
- revocationList, revocationListSize,
- securityPolicyFunction);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_free(client);
- return NULL;
- }
- return client;
- }
- #endif
- static void
- UA_Client_deleteMembers(UA_Client* client) {
- UA_Client_disconnect(client);
- client->securityPolicy.deleteMembers(&client->securityPolicy);
- /* Commented as UA_SecureChannel_deleteMembers already done
- * in UA_Client_disconnect function */
- //UA_SecureChannel_deleteMembersCleanup(&client->channel);
- if (client->connection.free)
- client->connection.free(&client->connection);
- UA_Connection_deleteMembers(&client->connection);
- if(client->endpointUrl.data)
- UA_String_deleteMembers(&client->endpointUrl);
- UA_UserTokenPolicy_deleteMembers(&client->token);
- UA_NodeId_deleteMembers(&client->authenticationToken);
- if(client->username.data)
- UA_String_deleteMembers(&client->username);
- if(client->password.data)
- UA_String_deleteMembers(&client->password);
- /* Delete the async service calls */
- UA_Client_AsyncService_removeAll(client, UA_STATUSCODE_BADSHUTDOWN);
- /* Delete the subscriptions */
- #ifdef UA_ENABLE_SUBSCRIPTIONS
- UA_Client_Subscriptions_clean(client);
- #endif
- /* Delete the timed work */
- UA_Timer_deleteMembers(&client->timer);
- /* Clean up the work queue */
- UA_WorkQueue_cleanup(&client->workQueue);
- }
- void
- UA_Client_reset(UA_Client* client) {
- UA_Client_deleteMembers(client);
- UA_Client_init(client, client->config);
- }
- void
- UA_Client_delete(UA_Client* client) {
- /* certificate verification is initialized for secure client
- * which is deallocated */
- if(client->channel.securityMode == UA_MESSAGESECURITYMODE_SIGN ||
- client->channel.securityMode == UA_MESSAGESECURITYMODE_SIGNANDENCRYPT) {
- if (client->securityPolicy.certificateVerification->deleteMembers)
- client->securityPolicy.certificateVerification->deleteMembers(client->securityPolicy.certificateVerification);
- UA_free(client->securityPolicy.certificateVerification);
- }
- UA_Client_deleteMembers(client);
- UA_free(client);
- }
- UA_ClientState
- UA_Client_getState(UA_Client *client) {
- return client->state;
- }
- UA_ClientConfig *
- UA_Client_getConfig(UA_Client *client) {
- if(!client)
- return NULL;
- return &client->config;
- }
- /****************/
- /* Raw Services */
- /****************/
- /* For synchronous service calls. Execute async responses with a callback. When
- * the response with the correct requestId turns up, return it via the
- * SyncResponseDescription pointer. */
- typedef struct {
- UA_Client *client;
- UA_Boolean received;
- UA_UInt32 requestId;
- void *response;
- const UA_DataType *responseType;
- } SyncResponseDescription;
- /* For both synchronous and asynchronous service calls */
- static UA_StatusCode
- sendSymmetricServiceRequest(UA_Client *client, const void *request,
- const UA_DataType *requestType, UA_UInt32 *requestId) {
- /* Make sure we have a valid session */
- UA_StatusCode retval = UA_STATUSCODE_GOOD;
- /* FIXME: this is just a dirty workaround. We need to rework some of the sync and async processing
- * FIXME: in the client. Currently a lot of stuff is semi broken and in dire need of cleaning up.*/
- /*UA_StatusCode retval = openSecureChannel(client, true);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;*/
- /* Adjusting the request header. The const attribute is violated, but we
- * only touch the following members: */
- UA_RequestHeader *rr = (UA_RequestHeader*)(uintptr_t)request;
- rr->authenticationToken = client->authenticationToken; /* cleaned up at the end */
- rr->timestamp = UA_DateTime_now();
- rr->requestHandle = ++client->requestHandle;
- /* Send the request */
- UA_UInt32 rqId = ++client->requestId;
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Sending a request of type %i", requestType->typeId.identifier.numeric);
- if (client->channel.nextSecurityToken.tokenId != 0) // Change to the new security token if the secure channel has been renewed.
- UA_SecureChannel_revolveTokens(&client->channel);
- retval = UA_SecureChannel_sendSymmetricMessage(&client->channel, rqId, UA_MESSAGETYPE_MSG,
- rr, requestType);
- UA_NodeId_init(&rr->authenticationToken); /* Do not return the token to the user */
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- *requestId = rqId;
- return UA_STATUSCODE_GOOD;
- }
- static const UA_NodeId
- serviceFaultId = {0, UA_NODEIDTYPE_NUMERIC, {UA_NS0ID_SERVICEFAULT_ENCODING_DEFAULTBINARY}};
- /* Look for the async callback in the linked list, execute and delete it */
- static UA_StatusCode
- processAsyncResponse(UA_Client *client, UA_UInt32 requestId, const UA_NodeId *responseTypeId,
- const UA_ByteString *responseMessage, size_t *offset) {
- /* Find the callback */
- AsyncServiceCall *ac;
- LIST_FOREACH(ac, &client->asyncServiceCalls, pointers) {
- if(ac->requestId == requestId)
- break;
- }
- if(!ac)
- return UA_STATUSCODE_BADREQUESTHEADERINVALID;
- /* Allocate the response */
- UA_STACKARRAY(UA_Byte, responseBuf, ac->responseType->memSize);
- void *response = (void*)(uintptr_t)&responseBuf[0]; /* workaround aliasing rules */
- /* Verify the type of the response */
- const UA_DataType *responseType = ac->responseType;
- const UA_NodeId expectedNodeId = UA_NODEID_NUMERIC(0, ac->responseType->binaryEncodingId);
- UA_StatusCode retval = UA_STATUSCODE_GOOD;
- if(!UA_NodeId_equal(responseTypeId, &expectedNodeId)) {
- UA_init(response, ac->responseType);
- if(UA_NodeId_equal(responseTypeId, &serviceFaultId)) {
- /* Decode as a ServiceFault, i.e. only the response header */
- UA_LOG_INFO(client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Received a ServiceFault response");
- responseType = &UA_TYPES[UA_TYPES_SERVICEFAULT];
- } else {
- /* Close the connection */
- UA_LOG_ERROR(client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Reply contains the wrong service response");
- retval = UA_STATUSCODE_BADCOMMUNICATIONERROR;
- goto process;
- }
- }
- /* Decode the response */
- retval = UA_decodeBinary(responseMessage, offset, response, responseType, NULL);
- process:
- if(retval != UA_STATUSCODE_GOOD) {
- UA_LOG_INFO(client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Could not decode the response with id %u due to %s",
- requestId, UA_StatusCode_name(retval));
- ((UA_ResponseHeader*)response)->serviceResult = retval;
- }
- /* Call the callback */
- if(ac->callback)
- ac->callback(client, ac->userdata, requestId, response);
- UA_deleteMembers(response, ac->responseType);
- /* Remove the callback */
- LIST_REMOVE(ac, pointers);
- UA_free(ac);
- return retval;
- }
- /* Processes the received service response. Either with an async callback or by
- * decoding the message and returning it "upwards" in the
- * SyncResponseDescription. */
- static void
- processServiceResponse(void *application, UA_SecureChannel *channel,
- UA_MessageType messageType, UA_UInt32 requestId,
- const UA_ByteString *message) {
- SyncResponseDescription *rd = (SyncResponseDescription*)application;
- /* Must be OPN or MSG */
- if(messageType != UA_MESSAGETYPE_OPN &&
- messageType != UA_MESSAGETYPE_MSG) {
- UA_LOG_TRACE_CHANNEL(rd->client->config.logger, channel,
- "Invalid message type");
- return;
- }
- /* Forward declaration for the goto */
- UA_NodeId expectedNodeId = UA_NODEID_NULL;
- /* Decode the data type identifier of the response */
- size_t offset = 0;
- UA_NodeId responseId;
- UA_StatusCode retval = UA_NodeId_decodeBinary(message, &offset, &responseId);
- if(retval != UA_STATUSCODE_GOOD)
- goto finish;
- /* Got an asynchronous response. Don't expected a synchronous response
- * (responseType NULL) or the id does not match. */
- if(!rd->responseType || requestId != rd->requestId) {
- retval = processAsyncResponse(rd->client, requestId, &responseId, message, &offset);
- goto finish;
- }
- /* Got the synchronous response */
- rd->received = true;
- /* Check that the response type matches */
- expectedNodeId = UA_NODEID_NUMERIC(0, rd->responseType->binaryEncodingId);
- if(!UA_NodeId_equal(&responseId, &expectedNodeId)) {
- if(UA_NodeId_equal(&responseId, &serviceFaultId)) {
- UA_LOG_INFO(rd->client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Received a ServiceFault response");
- UA_init(rd->response, rd->responseType);
- retval = UA_decodeBinary(message, &offset, rd->response,
- &UA_TYPES[UA_TYPES_SERVICEFAULT], NULL);
- } else {
- /* Close the connection */
- UA_LOG_ERROR(rd->client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Reply contains the wrong service response");
- retval = UA_STATUSCODE_BADCOMMUNICATIONERROR;
- }
- goto finish;
- }
- #ifdef UA_ENABLE_TYPENAMES
- UA_LOG_DEBUG(rd->client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Decode a message of type %s", rd->responseType->typeName);
- #else
- UA_LOG_DEBUG(rd->client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Decode a message of type %u", responseId.identifier.numeric);
- #endif
- /* Decode the response */
- retval = UA_decodeBinary(message, &offset, rd->response, rd->responseType,
- rd->client->config.customDataTypes);
- finish:
- UA_NodeId_deleteMembers(&responseId);
- if(retval != UA_STATUSCODE_GOOD) {
- if(retval == UA_STATUSCODE_BADENCODINGLIMITSEXCEEDED)
- retval = UA_STATUSCODE_BADRESPONSETOOLARGE;
- UA_LOG_INFO(rd->client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Error receiving the response with status code %s",
- UA_StatusCode_name(retval));
- if(rd->response) {
- UA_ResponseHeader *respHeader = (UA_ResponseHeader*)rd->response;
- respHeader->serviceResult = retval;
- }
- }
- }
- /* Forward complete chunks directly to the securechannel */
- static UA_StatusCode
- client_processChunk(void *application, UA_Connection *connection, UA_ByteString *chunk) {
- SyncResponseDescription *rd = (SyncResponseDescription*)application;
- UA_StatusCode retval = UA_SecureChannel_decryptAddChunk(&rd->client->channel, chunk, true);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- return UA_SecureChannel_persistIncompleteMessages(&rd->client->channel);
- }
- /* Receive and process messages until a synchronous message arrives or the
- * timout finishes */
- UA_StatusCode
- receiveServiceResponse(UA_Client *client, void *response, const UA_DataType *responseType,
- UA_DateTime maxDate, UA_UInt32 *synchronousRequestId) {
- /* Prepare the response and the structure we give into processServiceResponse */
- SyncResponseDescription rd = { client, false, 0, response, responseType };
- /* Return upon receiving the synchronized response. All other responses are
- * processed with a callback "in the background". */
- if(synchronousRequestId)
- rd.requestId = *synchronousRequestId;
- UA_StatusCode retval;
- do {
- UA_DateTime now = UA_DateTime_nowMonotonic();
- /* >= avoid timeout to be set to 0 */
- if(now >= maxDate)
- return UA_STATUSCODE_GOODNONCRITICALTIMEOUT;
- /* round always to upper value to avoid timeout to be set to 0
- * if(maxDate - now) < (UA_DATETIME_MSEC/2) */
- UA_UInt32 timeout = (UA_UInt32)(((maxDate - now) + (UA_DATETIME_MSEC - 1)) / UA_DATETIME_MSEC);
- retval = UA_Connection_receiveChunksBlocking(&client->connection, &rd, client_processChunk, timeout);
- UA_SecureChannel_processCompleteMessages(&client->channel, &rd, processServiceResponse);
- if(retval != UA_STATUSCODE_GOOD && retval != UA_STATUSCODE_GOODNONCRITICALTIMEOUT) {
- if(retval == UA_STATUSCODE_BADCONNECTIONCLOSED)
- setClientState(client, UA_CLIENTSTATE_DISCONNECTED);
- UA_Client_disconnect(client);
- break;
- }
- } while(!rd.received);
- return retval;
- }
- void
- __UA_Client_Service(UA_Client *client, const void *request,
- const UA_DataType *requestType, void *response,
- const UA_DataType *responseType) {
- UA_init(response, responseType);
- UA_ResponseHeader *respHeader = (UA_ResponseHeader*)response;
- /* Send the request */
- UA_UInt32 requestId;
- UA_StatusCode retval = sendSymmetricServiceRequest(client, request, requestType, &requestId);
- if(retval != UA_STATUSCODE_GOOD) {
- if(retval == UA_STATUSCODE_BADENCODINGLIMITSEXCEEDED)
- respHeader->serviceResult = UA_STATUSCODE_BADREQUESTTOOLARGE;
- else
- respHeader->serviceResult = retval;
- UA_Client_disconnect(client);
- return;
- }
- /* Retrieve the response */
- UA_DateTime maxDate = UA_DateTime_nowMonotonic() +
- (client->config.timeout * UA_DATETIME_MSEC);
- retval = receiveServiceResponse(client, response, responseType, maxDate, &requestId);
- if(retval == UA_STATUSCODE_GOODNONCRITICALTIMEOUT) {
- /* In synchronous service, if we have don't have a reply we need to close the connection */
- UA_Client_disconnect(client);
- retval = UA_STATUSCODE_BADCONNECTIONCLOSED;
- }
- if(retval != UA_STATUSCODE_GOOD)
- respHeader->serviceResult = retval;
- }
- UA_StatusCode
- receiveServiceResponseAsync(UA_Client *client, void *response,
- const UA_DataType *responseType) {
- SyncResponseDescription rd = { client, false, 0, response, responseType };
- UA_StatusCode retval = UA_Connection_receiveChunksNonBlocking(
- &client->connection, &rd, client_processChunk);
- UA_SecureChannel_processCompleteMessages(&client->channel, &rd, processServiceResponse);
- /*let client run when non critical timeout*/
- if(retval != UA_STATUSCODE_GOOD
- && retval != UA_STATUSCODE_GOODNONCRITICALTIMEOUT) {
- if(retval == UA_STATUSCODE_BADCONNECTIONCLOSED) {
- setClientState(client, UA_CLIENTSTATE_DISCONNECTED);
- }
- UA_Client_disconnect(client);
- }
- return retval;
- }
- UA_StatusCode
- receivePacketAsync(UA_Client *client) {
- UA_StatusCode retval = UA_STATUSCODE_GOOD;
- if (UA_Client_getState(client) == UA_CLIENTSTATE_DISCONNECTED ||
- UA_Client_getState(client) == UA_CLIENTSTATE_WAITING_FOR_ACK) {
- retval = UA_Connection_receiveChunksNonBlocking(&client->connection, client, processACKResponseAsync);
- }
- else if(UA_Client_getState(client) == UA_CLIENTSTATE_CONNECTED) {
- retval = UA_Connection_receiveChunksNonBlocking(&client->connection, client, processOPNResponseAsync);
- }
- if(retval != UA_STATUSCODE_GOOD && retval != UA_STATUSCODE_GOODNONCRITICALTIMEOUT) {
- if(retval == UA_STATUSCODE_BADCONNECTIONCLOSED)
- setClientState(client, UA_CLIENTSTATE_DISCONNECTED);
- UA_Client_disconnect(client);
- }
- return retval;
- }
- void
- UA_Client_AsyncService_cancel(UA_Client *client, AsyncServiceCall *ac,
- UA_StatusCode statusCode) {
- /* Create an empty response with the statuscode */
- UA_STACKARRAY(UA_Byte, responseBuf, ac->responseType->memSize);
- void *resp = (void*)(uintptr_t)&responseBuf[0]; /* workaround aliasing rules */
- UA_init(resp, ac->responseType);
- ((UA_ResponseHeader*)resp)->serviceResult = statusCode;
- if(ac->callback)
- ac->callback(client, ac->userdata, ac->requestId, resp);
- /* Clean up the response. Users might move data into it. For whatever reasons. */
- UA_deleteMembers(resp, ac->responseType);
- }
- void UA_Client_AsyncService_removeAll(UA_Client *client, UA_StatusCode statusCode) {
- AsyncServiceCall *ac, *ac_tmp;
- LIST_FOREACH_SAFE(ac, &client->asyncServiceCalls, pointers, ac_tmp) {
- LIST_REMOVE(ac, pointers);
- UA_Client_AsyncService_cancel(client, ac, statusCode);
- UA_free(ac);
- }
- }
- UA_StatusCode
- __UA_Client_AsyncServiceEx(UA_Client *client, const void *request,
- const UA_DataType *requestType,
- UA_ClientAsyncServiceCallback callback,
- const UA_DataType *responseType,
- void *userdata, UA_UInt32 *requestId,
- UA_UInt32 timeout) {
- /* Prepare the entry for the linked list */
- AsyncServiceCall *ac = (AsyncServiceCall*)UA_malloc(sizeof(AsyncServiceCall));
- if(!ac)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- ac->callback = callback;
- ac->responseType = responseType;
- ac->userdata = userdata;
- ac->timeout = timeout;
- /* Call the service and set the requestId */
- UA_StatusCode retval = sendSymmetricServiceRequest(client, request, requestType, &ac->requestId);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_free(ac);
- return retval;
- }
- ac->start = UA_DateTime_nowMonotonic();
- /* Store the entry for async processing */
- LIST_INSERT_HEAD(&client->asyncServiceCalls, ac, pointers);
- if(requestId)
- *requestId = ac->requestId;
- return UA_STATUSCODE_GOOD;
- }
- UA_StatusCode
- __UA_Client_AsyncService(UA_Client *client, const void *request,
- const UA_DataType *requestType,
- UA_ClientAsyncServiceCallback callback,
- const UA_DataType *responseType,
- void *userdata, UA_UInt32 *requestId) {
- return __UA_Client_AsyncServiceEx(client, request, requestType, callback,
- responseType, userdata, requestId,
- client->config.timeout);
- }
- UA_StatusCode
- UA_Client_sendAsyncRequest(UA_Client *client, const void *request,
- const UA_DataType *requestType,
- UA_ClientAsyncServiceCallback callback,
- const UA_DataType *responseType, void *userdata,
- UA_UInt32 *requestId) {
- if (UA_Client_getState(client) < UA_CLIENTSTATE_SECURECHANNEL) {
- UA_LOG_INFO(client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Cient must be connected to send high-level requests");
- return UA_STATUSCODE_GOOD;
- }
- return __UA_Client_AsyncService(client, request, requestType, callback,
- responseType, userdata, requestId);
- }
- UA_StatusCode
- UA_Client_addRepeatedCallback(UA_Client *client, UA_ClientCallback callback,
- void *data, UA_UInt32 interval,
- UA_UInt64 *callbackId) {
- return UA_Timer_addRepeatedCallback(&client->timer,
- (UA_ApplicationCallback) callback, client, data,
- interval, callbackId);
- }
- UA_StatusCode
- UA_Client_removeRepeatedCallback(UA_Client *client, UA_UInt64 callbackId) {
- return UA_Timer_removeRepeatedCallback(&client->timer, callbackId);
- }
|