ua_server_binary.c 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784
  1. #include "ua_util.h"
  2. #include "ua_server_internal.h"
  3. #include "ua_services.h"
  4. #include "ua_securechannel_manager.h"
  5. #include "ua_session_manager.h"
  6. #include "ua_types_generated_encoding_binary.h"
  7. #include "ua_transport_generated.h"
  8. #include "ua_transport_generated_handling.h"
  9. #include "ua_transport_generated_encoding_binary.h"
  10. /********************/
  11. /* Helper Functions */
  12. /********************/
  13. static void init_response_header(const UA_RequestHeader *p, UA_ResponseHeader *r) {
  14. r->requestHandle = p->requestHandle;
  15. r->timestamp = UA_DateTime_now();
  16. }
  17. static void
  18. sendError(UA_SecureChannel *channel, const UA_ByteString *msg,
  19. size_t offset, const UA_DataType *responseType,
  20. UA_UInt32 requestId, UA_StatusCode error) {
  21. UA_RequestHeader requestHeader;
  22. UA_StatusCode retval = UA_RequestHeader_decodeBinary(msg, &offset, &requestHeader);
  23. if(retval != UA_STATUSCODE_GOOD)
  24. return;
  25. void *response = UA_alloca(responseType->memSize);
  26. UA_init(response, responseType);
  27. UA_ResponseHeader *responseHeader = (UA_ResponseHeader*)response;
  28. init_response_header(&requestHeader, responseHeader);
  29. responseHeader->serviceResult = error;
  30. UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  31. UA_RequestHeader_deleteMembers(&requestHeader);
  32. UA_ResponseHeader_deleteMembers(responseHeader);
  33. }
  34. /* Returns a complete decoded request (without securechannel headers + padding)
  35. or UA_BYTESTRING_NULL */
  36. static UA_ByteString
  37. processChunk(UA_SecureChannel *channel, UA_Server *server,
  38. const UA_TcpMessageHeader *messageHeader, UA_UInt32 requestId,
  39. const UA_ByteString *msg, size_t offset, size_t chunksize,
  40. UA_Boolean *deleteRequest) {
  41. UA_ByteString bytes = UA_BYTESTRING_NULL;
  42. switch(messageHeader->messageTypeAndChunkType & 0xff000000) {
  43. case UA_CHUNKTYPE_INTERMEDIATE:
  44. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Chunk message");
  45. UA_SecureChannel_appendChunk(channel, requestId, msg, offset, chunksize);
  46. break;
  47. case UA_CHUNKTYPE_FINAL:
  48. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Final chunk message");
  49. bytes = UA_SecureChannel_finalizeChunk(channel, requestId, msg, offset,
  50. chunksize, deleteRequest);
  51. break;
  52. case UA_CHUNKTYPE_ABORT:
  53. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Chunk aborted");
  54. UA_SecureChannel_removeChunk(channel, requestId);
  55. break;
  56. default:
  57. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Unknown chunk type");
  58. }
  59. return bytes;
  60. }
  61. static void
  62. getServicePointers(UA_UInt32 requestTypeId, const UA_DataType **requestType,
  63. const UA_DataType **responseType, UA_Service *service,
  64. UA_Boolean *requiresSession) {
  65. switch(requestTypeId) {
  66. case UA_NS0ID_GETENDPOINTSREQUEST:
  67. case UA_NS0ID_GETENDPOINTSREQUEST_ENCODING_DEFAULTXML:
  68. case UA_NS0ID_GETENDPOINTSREQUEST_ENCODING_DEFAULTBINARY:
  69. *service = (UA_Service)Service_GetEndpoints;
  70. *requestType = &UA_TYPES[UA_TYPES_GETENDPOINTSREQUEST];
  71. *responseType = &UA_TYPES[UA_TYPES_GETENDPOINTSRESPONSE];
  72. *requiresSession = false;
  73. break;
  74. case UA_NS0ID_FINDSERVERSREQUEST:
  75. case UA_NS0ID_FINDSERVERSREQUEST_ENCODING_DEFAULTXML:
  76. case UA_NS0ID_FINDSERVERSREQUEST_ENCODING_DEFAULTBINARY:
  77. *service = (UA_Service)Service_FindServers;
  78. *requestType = &UA_TYPES[UA_TYPES_FINDSERVERSREQUEST];
  79. *responseType = &UA_TYPES[UA_TYPES_FINDSERVERSRESPONSE];
  80. *requiresSession = false;
  81. break;
  82. case UA_NS0ID_CREATESESSIONREQUEST:
  83. case UA_NS0ID_CREATESESSIONREQUEST_ENCODING_DEFAULTXML:
  84. case UA_NS0ID_CREATESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  85. *service = (UA_Service)Service_CreateSession;
  86. *requestType = &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST];
  87. *responseType = &UA_TYPES[UA_TYPES_CREATESESSIONRESPONSE];
  88. *requiresSession = false;
  89. break;
  90. case UA_NS0ID_ACTIVATESESSIONREQUEST:
  91. case UA_NS0ID_ACTIVATESESSIONREQUEST_ENCODING_DEFAULTXML:
  92. case UA_NS0ID_ACTIVATESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  93. *service = (UA_Service)Service_ActivateSession;
  94. *requestType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST];
  95. *responseType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONRESPONSE];
  96. break;
  97. case UA_NS0ID_CLOSESESSIONREQUEST:
  98. case UA_NS0ID_CLOSESESSIONREQUEST_ENCODING_DEFAULTXML:
  99. case UA_NS0ID_CLOSESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  100. *service = (UA_Service)Service_CloseSession;
  101. *requestType = &UA_TYPES[UA_TYPES_CLOSESESSIONREQUEST];
  102. *responseType = &UA_TYPES[UA_TYPES_CLOSESESSIONRESPONSE];
  103. break;
  104. case UA_NS0ID_READREQUEST:
  105. case UA_NS0ID_READREQUEST_ENCODING_DEFAULTXML:
  106. case UA_NS0ID_READREQUEST_ENCODING_DEFAULTBINARY:
  107. *service = (UA_Service)Service_Read;
  108. *requestType = &UA_TYPES[UA_TYPES_READREQUEST];
  109. *responseType = &UA_TYPES[UA_TYPES_READRESPONSE];
  110. break;
  111. case UA_NS0ID_WRITEREQUEST:
  112. case UA_NS0ID_WRITEREQUEST_ENCODING_DEFAULTXML:
  113. case UA_NS0ID_WRITEREQUEST_ENCODING_DEFAULTBINARY:
  114. *service = (UA_Service)Service_Write;
  115. *requestType = &UA_TYPES[UA_TYPES_WRITEREQUEST];
  116. *responseType = &UA_TYPES[UA_TYPES_WRITERESPONSE];
  117. break;
  118. case UA_NS0ID_BROWSEREQUEST:
  119. case UA_NS0ID_BROWSEREQUEST_ENCODING_DEFAULTXML:
  120. case UA_NS0ID_BROWSEREQUEST_ENCODING_DEFAULTBINARY:
  121. *service = (UA_Service)Service_Browse;
  122. *requestType = &UA_TYPES[UA_TYPES_BROWSEREQUEST];
  123. *responseType = &UA_TYPES[UA_TYPES_BROWSERESPONSE];
  124. break;
  125. case UA_NS0ID_BROWSENEXTREQUEST:
  126. case UA_NS0ID_BROWSENEXTREQUEST_ENCODING_DEFAULTXML:
  127. case UA_NS0ID_BROWSENEXTREQUEST_ENCODING_DEFAULTBINARY:
  128. *service = (UA_Service)Service_BrowseNext;
  129. *requestType = &UA_TYPES[UA_TYPES_BROWSENEXTREQUEST];
  130. *responseType = &UA_TYPES[UA_TYPES_BROWSENEXTRESPONSE];
  131. break;
  132. case UA_NS0ID_REGISTERNODESREQUEST:
  133. case UA_NS0ID_REGISTERNODESREQUEST_ENCODING_DEFAULTXML:
  134. case UA_NS0ID_REGISTERNODESREQUEST_ENCODING_DEFAULTBINARY:
  135. *service = (UA_Service)Service_RegisterNodes;
  136. *requestType = &UA_TYPES[UA_TYPES_REGISTERNODESREQUEST];
  137. *responseType = &UA_TYPES[UA_TYPES_REGISTERNODESRESPONSE];
  138. break;
  139. case UA_NS0ID_UNREGISTERNODESREQUEST:
  140. case UA_NS0ID_UNREGISTERNODESREQUEST_ENCODING_DEFAULTXML:
  141. case UA_NS0ID_UNREGISTERNODESREQUEST_ENCODING_DEFAULTBINARY:
  142. *service = (UA_Service)Service_UnregisterNodes;
  143. *requestType = &UA_TYPES[UA_TYPES_UNREGISTERNODESREQUEST];
  144. *responseType = &UA_TYPES[UA_TYPES_UNREGISTERNODESRESPONSE];
  145. break;
  146. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST:
  147. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST_ENCODING_DEFAULTXML:
  148. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST_ENCODING_DEFAULTBINARY:
  149. *service = (UA_Service)Service_TranslateBrowsePathsToNodeIds;
  150. *requestType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSREQUEST];
  151. *responseType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSRESPONSE];
  152. break;
  153. #ifdef UA_ENABLE_SUBSCRIPTIONS
  154. case UA_NS0ID_CREATESUBSCRIPTIONREQUEST:
  155. case UA_NS0ID_CREATESUBSCRIPTIONREQUEST_ENCODING_DEFAULTXML:
  156. case UA_NS0ID_CREATESUBSCRIPTIONREQUEST_ENCODING_DEFAULTBINARY:
  157. *service = (UA_Service)Service_CreateSubscription;
  158. *requestType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONREQUEST];
  159. *responseType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONRESPONSE];
  160. break;
  161. case UA_NS0ID_PUBLISHREQUEST:
  162. case UA_NS0ID_PUBLISHREQUEST_ENCODING_DEFAULTXML:
  163. case UA_NS0ID_PUBLISHREQUEST_ENCODING_DEFAULTBINARY:
  164. *requestType = &UA_TYPES[UA_TYPES_PUBLISHREQUEST];
  165. *responseType = &UA_TYPES[UA_TYPES_PUBLISHRESPONSE];
  166. break;
  167. case UA_NS0ID_REPUBLISHREQUEST:
  168. case UA_NS0ID_REPUBLISHREQUEST_ENCODING_DEFAULTXML:
  169. case UA_NS0ID_REPUBLISHREQUEST_ENCODING_DEFAULTBINARY:
  170. *service = (UA_Service)Service_Republish;
  171. *requestType = &UA_TYPES[UA_TYPES_REPUBLISHREQUEST];
  172. *responseType = &UA_TYPES[UA_TYPES_REPUBLISHRESPONSE];
  173. break;
  174. case UA_NS0ID_MODIFYSUBSCRIPTIONREQUEST:
  175. case UA_NS0ID_MODIFYSUBSCRIPTIONREQUEST_ENCODING_DEFAULTXML:
  176. case UA_NS0ID_MODIFYSUBSCRIPTIONREQUEST_ENCODING_DEFAULTBINARY:
  177. *service = (UA_Service)Service_ModifySubscription;
  178. *requestType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONREQUEST];
  179. *responseType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONRESPONSE];
  180. break;
  181. case UA_NS0ID_SETPUBLISHINGMODEREQUEST:
  182. case UA_NS0ID_SETPUBLISHINGMODEREQUEST_ENCODING_DEFAULTXML:
  183. case UA_NS0ID_SETPUBLISHINGMODEREQUEST_ENCODING_DEFAULTBINARY:
  184. *service = (UA_Service)Service_SetPublishingMode;
  185. *requestType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODEREQUEST];
  186. *responseType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODERESPONSE];
  187. break;
  188. case UA_NS0ID_DELETESUBSCRIPTIONSREQUEST:
  189. case UA_NS0ID_DELETESUBSCRIPTIONSREQUEST_ENCODING_DEFAULTXML:
  190. case UA_NS0ID_DELETESUBSCRIPTIONSREQUEST_ENCODING_DEFAULTBINARY:
  191. *service = (UA_Service)Service_DeleteSubscriptions;
  192. *requestType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSREQUEST];
  193. *responseType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSRESPONSE];
  194. break;
  195. case UA_NS0ID_CREATEMONITOREDITEMSREQUEST:
  196. case UA_NS0ID_CREATEMONITOREDITEMSREQUEST_ENCODING_DEFAULTXML:
  197. case UA_NS0ID_CREATEMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  198. *service = (UA_Service)Service_CreateMonitoredItems;
  199. *requestType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSREQUEST];
  200. *responseType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSRESPONSE];
  201. break;
  202. case UA_NS0ID_DELETEMONITOREDITEMSREQUEST:
  203. case UA_NS0ID_DELETEMONITOREDITEMSREQUEST_ENCODING_DEFAULTXML:
  204. case UA_NS0ID_DELETEMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  205. *service = (UA_Service)Service_DeleteMonitoredItems;
  206. *requestType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSREQUEST];
  207. *responseType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSRESPONSE];
  208. break;
  209. case UA_NS0ID_MODIFYMONITOREDITEMSREQUEST:
  210. case UA_NS0ID_MODIFYMONITOREDITEMSREQUEST_ENCODING_DEFAULTXML:
  211. case UA_NS0ID_MODIFYMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  212. *service = (UA_Service)Service_ModifyMonitoredItems;
  213. *requestType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSREQUEST];
  214. *responseType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSRESPONSE];
  215. break;
  216. case UA_NS0ID_SETMONITORINGMODEREQUEST:
  217. case UA_NS0ID_SETMONITORINGMODEREQUEST_ENCODING_DEFAULTXML:
  218. case UA_NS0ID_SETMONITORINGMODEREQUEST_ENCODING_DEFAULTBINARY:
  219. *service = (UA_Service)Service_SetMonitoringMode;
  220. *requestType = &UA_TYPES[UA_TYPES_SETMONITORINGMODEREQUEST];
  221. *responseType = &UA_TYPES[UA_TYPES_SETMONITORINGMODERESPONSE];
  222. break;
  223. #endif
  224. #ifdef UA_ENABLE_METHODCALLS
  225. case UA_NS0ID_CALLREQUEST:
  226. case UA_NS0ID_CALLREQUEST_ENCODING_DEFAULTXML:
  227. case UA_NS0ID_CALLREQUEST_ENCODING_DEFAULTBINARY:
  228. *service = (UA_Service)Service_Call;
  229. *requestType = &UA_TYPES[UA_TYPES_CALLREQUEST];
  230. *responseType = &UA_TYPES[UA_TYPES_CALLRESPONSE];
  231. break;
  232. #endif
  233. #ifdef UA_ENABLE_NODEMANAGEMENT
  234. case UA_NS0ID_ADDNODESREQUEST:
  235. case UA_NS0ID_ADDNODESREQUEST_ENCODING_DEFAULTXML:
  236. case UA_NS0ID_ADDNODESREQUEST_ENCODING_DEFAULTBINARY:
  237. *service = (UA_Service)Service_AddNodes;
  238. *requestType = &UA_TYPES[UA_TYPES_ADDNODESREQUEST];
  239. *responseType = &UA_TYPES[UA_TYPES_ADDNODESRESPONSE];
  240. break;
  241. case UA_NS0ID_ADDREFERENCESREQUEST:
  242. case UA_NS0ID_ADDREFERENCESREQUEST_ENCODING_DEFAULTXML:
  243. case UA_NS0ID_ADDREFERENCESREQUEST_ENCODING_DEFAULTBINARY:
  244. *service = (UA_Service)Service_AddReferences;
  245. *requestType = &UA_TYPES[UA_TYPES_ADDREFERENCESREQUEST];
  246. *responseType = &UA_TYPES[UA_TYPES_ADDREFERENCESRESPONSE];
  247. break;
  248. case UA_NS0ID_DELETENODESREQUEST:
  249. case UA_NS0ID_DELETENODESREQUEST_ENCODING_DEFAULTXML:
  250. case UA_NS0ID_DELETENODESREQUEST_ENCODING_DEFAULTBINARY:
  251. *service = (UA_Service)Service_DeleteNodes;
  252. *requestType = &UA_TYPES[UA_TYPES_DELETENODESREQUEST];
  253. *responseType = &UA_TYPES[UA_TYPES_DELETENODESRESPONSE];
  254. break;
  255. case UA_NS0ID_DELETEREFERENCESREQUEST:
  256. case UA_NS0ID_DELETEREFERENCESREQUEST_ENCODING_DEFAULTXML:
  257. case UA_NS0ID_DELETEREFERENCESREQUEST_ENCODING_DEFAULTBINARY:
  258. *service = (UA_Service)Service_DeleteReferences;
  259. *requestType = &UA_TYPES[UA_TYPES_DELETEREFERENCESREQUEST];
  260. *responseType = &UA_TYPES[UA_TYPES_DELETEREFERENCESRESPONSE];
  261. break;
  262. #endif
  263. default:
  264. break;
  265. }
  266. }
  267. /*************************/
  268. /* Process Message Types */
  269. /*************************/
  270. /* HEL -> Open up the connection */
  271. static void processHEL(UA_Connection *connection, const UA_ByteString *msg, size_t *offset) {
  272. UA_TcpHelloMessage helloMessage;
  273. if(UA_TcpHelloMessage_decodeBinary(msg, offset, &helloMessage) != UA_STATUSCODE_GOOD) {
  274. connection->close(connection);
  275. return;
  276. }
  277. /* Parameterize the connection */
  278. connection->remoteConf.maxChunkCount = helloMessage.maxChunkCount; /* zero -> unlimited */
  279. connection->remoteConf.maxMessageSize = helloMessage.maxMessageSize; /* zero -> unlimited */
  280. connection->remoteConf.protocolVersion = helloMessage.protocolVersion;
  281. connection->remoteConf.recvBufferSize = helloMessage.receiveBufferSize;
  282. if(connection->localConf.sendBufferSize > helloMessage.receiveBufferSize)
  283. connection->localConf.sendBufferSize = helloMessage.receiveBufferSize;
  284. connection->remoteConf.sendBufferSize = helloMessage.sendBufferSize;
  285. if(connection->localConf.recvBufferSize > helloMessage.sendBufferSize)
  286. connection->localConf.recvBufferSize = helloMessage.sendBufferSize;
  287. connection->state = UA_CONNECTION_ESTABLISHED;
  288. UA_TcpHelloMessage_deleteMembers(&helloMessage);
  289. /* Build acknowledge response */
  290. UA_TcpAcknowledgeMessage ackMessage;
  291. ackMessage.protocolVersion = connection->localConf.protocolVersion;
  292. ackMessage.receiveBufferSize = connection->localConf.recvBufferSize;
  293. ackMessage.sendBufferSize = connection->localConf.sendBufferSize;
  294. ackMessage.maxMessageSize = connection->localConf.maxMessageSize;
  295. ackMessage.maxChunkCount = connection->localConf.maxChunkCount;
  296. UA_TcpMessageHeader ackHeader;
  297. ackHeader.messageTypeAndChunkType = UA_MESSAGETYPE_ACK + UA_CHUNKTYPE_FINAL;
  298. ackHeader.messageSize = 8 + 20; /* ackHeader + ackMessage */
  299. /* Get the send buffer from the network layer */
  300. UA_ByteString ack_msg;
  301. UA_ByteString_init(&ack_msg);
  302. UA_StatusCode retval =
  303. connection->getSendBuffer(connection, connection->localConf.sendBufferSize, &ack_msg);
  304. if(retval != UA_STATUSCODE_GOOD)
  305. return;
  306. /* Encode and send the response */
  307. size_t tmpPos = 0;
  308. UA_TcpMessageHeader_encodeBinary(&ackHeader, &ack_msg, &tmpPos);
  309. UA_TcpAcknowledgeMessage_encodeBinary(&ackMessage, &ack_msg, &tmpPos);
  310. ack_msg.length = ackHeader.messageSize;
  311. connection->send(connection, &ack_msg);
  312. }
  313. /* OPN -> Open up/renew the securechannel */
  314. static void
  315. processOPN(UA_Connection *connection, UA_Server *server,
  316. const UA_ByteString *msg, size_t *offset) {
  317. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  318. connection->close(connection);
  319. return;
  320. }
  321. UA_UInt32 channelId;
  322. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, offset, &channelId);
  323. /* Opening up a channel with a channelid already set */
  324. if(!connection->channel && channelId != 0)
  325. retval |= UA_STATUSCODE_BADREQUESTTYPEINVALID;
  326. /* Renew a channel with the wrong channelid */
  327. if(connection->channel && channelId != connection->channel->securityToken.channelId)
  328. retval |= UA_STATUSCODE_BADREQUESTTYPEINVALID;
  329. /* Decode the request */
  330. UA_AsymmetricAlgorithmSecurityHeader asymHeader;
  331. UA_SequenceHeader seqHeader;
  332. UA_NodeId requestType;
  333. UA_OpenSecureChannelRequest r;
  334. retval |= UA_AsymmetricAlgorithmSecurityHeader_decodeBinary(msg, offset, &asymHeader);
  335. retval |= UA_SequenceHeader_decodeBinary(msg, offset, &seqHeader);
  336. retval |= UA_NodeId_decodeBinary(msg, offset, &requestType);
  337. retval |= UA_OpenSecureChannelRequest_decodeBinary(msg, offset, &r);
  338. /* Could not decode or wrong service type */
  339. if(retval != UA_STATUSCODE_GOOD || requestType.identifier.numeric != 446) {
  340. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  341. UA_NodeId_deleteMembers(&requestType);
  342. UA_OpenSecureChannelRequest_deleteMembers(&r);
  343. connection->close(connection);
  344. return;
  345. }
  346. /* Call the service */
  347. UA_OpenSecureChannelResponse p;
  348. UA_OpenSecureChannelResponse_init(&p);
  349. Service_OpenSecureChannel(server, connection, &r, &p);
  350. UA_OpenSecureChannelRequest_deleteMembers(&r);
  351. UA_SecureChannel *channel = connection->channel;
  352. /* Opening the channel failed */
  353. if(!channel) {
  354. UA_OpenSecureChannelResponse_deleteMembers(&p);
  355. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  356. connection->close(connection);
  357. return;
  358. }
  359. /* Set the starting sequence number */
  360. channel->receiveSequenceNumber = seqHeader.sequenceNumber;
  361. /* Allocate the return message */
  362. UA_ByteString resp_msg;
  363. UA_ByteString_init(&resp_msg);
  364. retval = connection->getSendBuffer(connection, connection->localConf.sendBufferSize, &resp_msg);
  365. if(retval != UA_STATUSCODE_GOOD) {
  366. UA_OpenSecureChannelResponse_deleteMembers(&p);
  367. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  368. connection->close(connection);
  369. return;
  370. }
  371. /* Encode the message after the secureconversationmessageheader */
  372. size_t tmpPos = 12; /* skip the header */
  373. #ifndef UA_ENABLE_MULTITHREADING
  374. seqHeader.sequenceNumber = ++channel->sendSequenceNumber;
  375. #else
  376. seqHeader.sequenceNumber = uatomic_add_return(&channel->sendSequenceNumber, 1);
  377. #endif
  378. retval |= UA_AsymmetricAlgorithmSecurityHeader_encodeBinary(&asymHeader, &resp_msg, &tmpPos); // just mirror back
  379. retval |= UA_SequenceHeader_encodeBinary(&seqHeader, &resp_msg, &tmpPos);
  380. UA_NodeId responseType = UA_NODEID_NUMERIC(0, UA_TYPES[UA_TYPES_OPENSECURECHANNELRESPONSE].binaryEncodingId);
  381. retval |= UA_NodeId_encodeBinary(&responseType, &resp_msg, &tmpPos);
  382. retval |= UA_OpenSecureChannelResponse_encodeBinary(&p, &resp_msg, &tmpPos);
  383. if(retval != UA_STATUSCODE_GOOD) {
  384. connection->releaseSendBuffer(connection, &resp_msg);
  385. UA_OpenSecureChannelResponse_deleteMembers(&p);
  386. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  387. connection->close(connection);
  388. return;
  389. }
  390. /* Encode the secureconversationmessageheader (cannot fail) and send */
  391. UA_SecureConversationMessageHeader respHeader;
  392. respHeader.messageHeader.messageTypeAndChunkType = UA_MESSAGETYPE_OPN + UA_CHUNKTYPE_FINAL;
  393. respHeader.messageHeader.messageSize = (UA_UInt32)tmpPos;
  394. respHeader.secureChannelId = p.securityToken.channelId;
  395. tmpPos = 0;
  396. UA_SecureConversationMessageHeader_encodeBinary(&respHeader, &resp_msg, &tmpPos);
  397. resp_msg.length = respHeader.messageHeader.messageSize;
  398. connection->send(connection, &resp_msg);
  399. /* Clean up */
  400. UA_OpenSecureChannelResponse_deleteMembers(&p);
  401. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  402. }
  403. static void
  404. processRequest(UA_SecureChannel *channel, UA_Server *server,
  405. UA_UInt32 requestId, const UA_ByteString *msg) {
  406. /* At 0, the nodeid starts... */
  407. size_t ppos = 0;
  408. size_t *offset = &ppos;
  409. /* Decode the nodeid */
  410. UA_NodeId requestTypeId;
  411. UA_StatusCode retval = UA_NodeId_decodeBinary(msg, offset, &requestTypeId);
  412. if(retval != UA_STATUSCODE_GOOD)
  413. return;
  414. /* Store the start-position of the request */
  415. size_t requestPos = *offset;
  416. /* Test if the service type nodeid has the right format */
  417. if(requestTypeId.identifierType != UA_NODEIDTYPE_NUMERIC ||
  418. requestTypeId.namespaceIndex != 0) {
  419. UA_NodeId_deleteMembers(&requestTypeId);
  420. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  421. "Received a non-numeric message type NodeId");
  422. sendError(channel, msg, requestPos, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  423. requestId, UA_STATUSCODE_BADSERVICEUNSUPPORTED);
  424. }
  425. /* Get the service pointers */
  426. UA_Service service = NULL;
  427. const UA_DataType *requestType = NULL;
  428. const UA_DataType *responseType = NULL;
  429. UA_Boolean sessionRequired = true;
  430. getServicePointers(requestTypeId.identifier.numeric, &requestType,
  431. &responseType, &service, &sessionRequired);
  432. if(!requestType) {
  433. if(requestTypeId.identifier.numeric == 787) {
  434. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  435. "Client requested a subscription, " \
  436. "but those are not enabled in the build");
  437. } else {
  438. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Unknown request %i",
  439. requestTypeId.identifier.numeric);
  440. }
  441. sendError(channel, msg, requestPos, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  442. requestId, UA_STATUSCODE_BADSERVICEUNSUPPORTED);
  443. return;
  444. }
  445. UA_assert(responseType);
  446. #ifdef UA_ENABLE_NONSTANDARD_STATELESS
  447. /* Stateless extension: Sessions are optional */
  448. sessionRequired = false;
  449. #endif
  450. /* Decode the request */
  451. void *request = UA_alloca(requestType->memSize);
  452. UA_RequestHeader *requestHeader = (UA_RequestHeader*)request;
  453. retval = UA_decodeBinary(msg, offset, request, requestType);
  454. if(retval != UA_STATUSCODE_GOOD) {
  455. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel, "Could not decode the request");
  456. sendError(channel, msg, requestPos, responseType, requestId, retval);
  457. return;
  458. }
  459. /* Prepare the respone */
  460. void *response = UA_alloca(responseType->memSize);
  461. UA_init(response, responseType);
  462. UA_Session *session = NULL; /* must be initialized before goto send_response */
  463. /* CreateSession doesn't need a session */
  464. if(requestType == &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST]) {
  465. Service_CreateSession(server, channel, request, response);
  466. goto send_response;
  467. }
  468. /* Find the matching session */
  469. session = UA_SecureChannel_getSession(channel, &requestHeader->authenticationToken);
  470. if(!session)
  471. session = UA_SessionManager_getSession(&server->sessionManager,
  472. &requestHeader->authenticationToken);
  473. if(requestType == &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST]) {
  474. if(!session) {
  475. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  476. "Trying to activate a session that is " \
  477. "not known in the server");
  478. sendError(channel, msg, requestPos, responseType,
  479. requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  480. UA_deleteMembers(request, requestType);
  481. return;
  482. }
  483. Service_ActivateSession(server, channel, session, request, response);
  484. goto send_response;
  485. }
  486. /* Set an anonymous, inactive session for services that need no session */
  487. UA_Session anonymousSession;
  488. if(!session) {
  489. if(sessionRequired) {
  490. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  491. "Service request %i without a valid session",
  492. requestType->binaryEncodingId);
  493. sendError(channel, msg, requestPos, responseType,
  494. requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  495. UA_deleteMembers(request, requestType);
  496. return;
  497. }
  498. UA_Session_init(&anonymousSession);
  499. anonymousSession.sessionId = UA_NODEID_GUID(0, UA_GUID_NULL);
  500. anonymousSession.channel = channel;
  501. session = &anonymousSession;
  502. }
  503. /* Trying to use a non-activated session? */
  504. if(sessionRequired && !session->activated) {
  505. UA_LOG_INFO_SESSION(server->config.logger, session,
  506. "Calling service %i on a non-activated session",
  507. requestType->binaryEncodingId);
  508. sendError(channel, msg, requestPos, responseType,
  509. requestId, UA_STATUSCODE_BADSESSIONNOTACTIVATED);
  510. UA_SessionManager_removeSession(&server->sessionManager,
  511. &session->authenticationToken);
  512. UA_deleteMembers(request, requestType);
  513. return;
  514. }
  515. /* The session is bound to another channel */
  516. if(session->channel != channel) {
  517. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  518. "Client tries to use an obsolete securechannel");
  519. sendError(channel, msg, requestPos, responseType,
  520. requestId, UA_STATUSCODE_BADSECURECHANNELIDINVALID);
  521. UA_deleteMembers(request, requestType);
  522. return;
  523. }
  524. /* Update the session lifetime */
  525. UA_Session_updateLifetime(session);
  526. #ifdef UA_ENABLE_SUBSCRIPTIONS
  527. /* The publish request is not answered immediately */
  528. if(requestType == &UA_TYPES[UA_TYPES_PUBLISHREQUEST]) {
  529. Service_Publish(server, session, request, requestId);
  530. UA_deleteMembers(request, requestType);
  531. return;
  532. }
  533. #endif
  534. /* Call the service */
  535. service(server, session, request, response);
  536. send_response:
  537. /* Send the response */
  538. init_response_header(request, response);
  539. retval = UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  540. if(retval != UA_STATUSCODE_GOOD)
  541. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Could not send the message over "
  542. "the SecureChannel with error code 0x%08x", retval);
  543. #ifdef UA_ENABLE_SUBSCRIPTIONS
  544. /* See if we need to return publish requests without a subscription */
  545. if(session && requestType == &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSREQUEST])
  546. UA_Session_answerPublishRequestsWithoutSubscription(session);
  547. #endif
  548. /* Clean up */
  549. UA_deleteMembers(request, requestType);
  550. UA_deleteMembers(response, responseType);
  551. }
  552. /* MSG -> Normal request */
  553. static void
  554. processMSG(UA_Connection *connection, UA_Server *server,
  555. const UA_TcpMessageHeader *messageHeader,
  556. const UA_ByteString *msg, size_t *offset) {
  557. /* Decode the header */
  558. UA_UInt32 channelId = 0;
  559. UA_UInt32 tokenId = 0;
  560. UA_SequenceHeader sequenceHeader;
  561. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, offset, &channelId);
  562. retval |= UA_UInt32_decodeBinary(msg, offset, &tokenId);
  563. retval |= UA_SequenceHeader_decodeBinary(msg, offset, &sequenceHeader);
  564. if(retval != UA_STATUSCODE_GOOD)
  565. return;
  566. /* Get the SecureChannel */
  567. UA_SecureChannel *channel = connection->channel;
  568. UA_SecureChannel anonymousChannel; /* use if no channel specified */
  569. if(!channel) {
  570. UA_SecureChannel_init(&anonymousChannel);
  571. anonymousChannel.connection = connection;
  572. channel = &anonymousChannel;
  573. }
  574. /* Is the channel attached to connection? */
  575. if(channelId != channel->securityToken.channelId) {
  576. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  577. "Connection %i | Received MSG with the channel id %i not bound to the connection",
  578. connection->sockfd, channelId);
  579. Service_CloseSecureChannel(server, channel);
  580. connection->close(connection);
  581. return;
  582. }
  583. /* Does the sequence number match? */
  584. retval = UA_SecureChannel_processSequenceNumber(sequenceHeader.sequenceNumber, channel);
  585. if (retval != UA_STATUSCODE_GOOD){
  586. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  587. "The sequence number was not increased by one. Got %i, expected %i",
  588. sequenceHeader.sequenceNumber, channel->receiveSequenceNumber + 1);
  589. sendError(channel, msg, *offset, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  590. sequenceHeader.requestId, UA_STATUSCODE_BADSECURITYCHECKSFAILED);
  591. Service_CloseSecureChannel(server, channel);
  592. connection->close(connection);
  593. return;
  594. }
  595. /* Does the token match? */
  596. if(tokenId != channel->securityToken.tokenId) {
  597. if(tokenId != channel->nextSecurityToken.tokenId) {
  598. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  599. "Request with a wrong security token. Closing the SecureChannel.");
  600. Service_CloseSecureChannel(server, channel);
  601. connection->close(connection);
  602. return;
  603. }
  604. UA_SecureChannel_revolveTokens(channel);
  605. }
  606. /* Process chunk to get complete request */
  607. UA_Boolean deleteRequest = false;
  608. UA_ByteString request = processChunk(channel, server, messageHeader, sequenceHeader.requestId,
  609. msg, *offset, messageHeader->messageSize - 24, &deleteRequest);
  610. *offset += (messageHeader->messageSize - 24);
  611. if(request.length > 0) {
  612. /* Process the request */
  613. processRequest(channel, server, sequenceHeader.requestId, &request);
  614. if(deleteRequest)
  615. UA_ByteString_deleteMembers(&request);
  616. }
  617. /* Clean up a possible anonymous channel */
  618. if(channel == &anonymousChannel)
  619. UA_SecureChannel_deleteMembersCleanup(channel);
  620. }
  621. /* CLO -> Close the secure channel */
  622. static void
  623. processCLO(UA_Connection *connection, UA_Server *server,
  624. const UA_ByteString *msg, size_t *offset) {
  625. UA_UInt32 channelId;
  626. UA_UInt32 tokenId = 0;
  627. UA_SequenceHeader sequenceHeader;
  628. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, offset, &channelId);
  629. retval |= UA_UInt32_decodeBinary(msg, offset, &tokenId);
  630. retval |= UA_SequenceHeader_decodeBinary(msg, offset, &sequenceHeader);
  631. if(retval != UA_STATUSCODE_GOOD)
  632. return;
  633. UA_SecureChannel *channel = connection->channel;
  634. if(!channel || channel->securityToken.channelId != channelId ||
  635. channel->securityToken.tokenId != tokenId)
  636. return;
  637. if(sequenceHeader.sequenceNumber != channel->receiveSequenceNumber + 1)
  638. return;
  639. Service_CloseSecureChannel(server, connection->channel);
  640. }
  641. /* Process binary message received from Connection dose not modify UA_ByteString
  642. * you have to free it youself. use of connection->getSendBuffer() and
  643. * connection->send() to answer Message */
  644. void
  645. UA_Server_processBinaryMessage(UA_Server *server, UA_Connection *connection,
  646. const UA_ByteString *msg) {
  647. size_t offset= 0;
  648. UA_TcpMessageHeader tcpMessageHeader;
  649. do {
  650. /* Decode the message header */
  651. UA_StatusCode retval = UA_TcpMessageHeader_decodeBinary(msg, &offset, &tcpMessageHeader);
  652. if(retval != UA_STATUSCODE_GOOD) {
  653. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  654. "Decoding of message header failed on Connection %i",
  655. connection->sockfd);
  656. connection->close(connection);
  657. break;
  658. }
  659. if(tcpMessageHeader.messageSize < 16) {
  660. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  661. "The message is suspiciously small on Connection %i",
  662. connection->sockfd);
  663. connection->close(connection);
  664. break;
  665. }
  666. /* Set the expected position after processing the chunk */
  667. size_t targetpos = offset - 8 + tcpMessageHeader.messageSize;
  668. /* Process the message */
  669. switch(tcpMessageHeader.messageTypeAndChunkType & 0x00ffffff) {
  670. case UA_MESSAGETYPE_HEL:
  671. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  672. "Connection %i | Process a HEL", connection->sockfd);
  673. processHEL(connection, msg, &offset);
  674. break;
  675. case UA_MESSAGETYPE_OPN:
  676. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  677. "Connection %i | Process a OPN", connection->sockfd);
  678. processOPN(connection, server, msg, &offset);
  679. break;
  680. case UA_MESSAGETYPE_MSG:
  681. #ifndef UA_ENABLE_NONSTANDARD_STATELESS
  682. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  683. UA_LOG_DEBUG(server->config.logger, UA_LOGCATEGORY_NETWORK,
  684. "Connection %i | Received a MSG, but the connection " \
  685. "is not established", connection->sockfd);
  686. connection->close(connection);
  687. return;
  688. }
  689. #endif
  690. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  691. "Connection %i | Process a MSG", connection->sockfd);
  692. processMSG(connection, server, &tcpMessageHeader, msg, &offset);
  693. break;
  694. case UA_MESSAGETYPE_CLO:
  695. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  696. "Connection %i | Process a CLO", connection->sockfd);
  697. processCLO(connection, server, msg, &offset);
  698. return;
  699. default:
  700. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  701. "Connection %i | Unknown chunk type", connection->sockfd);
  702. }
  703. /* Loop to process the next message in the stream */
  704. if(offset != targetpos) {
  705. UA_LOG_DEBUG(server->config.logger, UA_LOGCATEGORY_NETWORK,
  706. "Connection %i | Message was not entirely processed. " \
  707. "Skip from position %i to position %i; message length is %i",
  708. connection->sockfd, offset, targetpos, msg->length);
  709. offset = targetpos;
  710. }
  711. } while(msg->length > offset);
  712. }