123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791 |
- /* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
- * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
- *
- * Copyright 2017 (c) Fraunhofer IOSB (Author: Julius Pfrommer)
- * Copyright 2017 (c) Julian Grothoff
- * Copyright 2017-2018 (c) Mark Giraud, Fraunhofer IOSB
- * Copyright 2017 (c) Stefan Profanter, fortiss GmbH
- * Copyright 2017 (c) Thomas Stalder, Blue Time Concept SA
- * Copyright 2018 (c) Daniel Feist, Precitec GmbH & Co. KG
- * Copyright 2018 (c) Fabian Arndt, Root-Core
- * Copyright 2019 (c) Kalycito Infotech Private Limited
- */
- #include <open62541/client_config_default.h>
- #include <open62541/network_tcp.h>
- #ifdef UA_ENABLE_WEBSOCKET_SERVER
- #include <open62541/network_ws.h>
- #endif
- #include <open62541/plugin/accesscontrol_default.h>
- #include <open62541/plugin/nodestore_default.h>
- #include <open62541/plugin/log_stdout.h>
- #include <open62541/plugin/pki_default.h>
- #include <open62541/plugin/securitypolicy_default.h>
- #include <open62541/server_config_default.h>
- /* Struct initialization works across ANSI C/C99/C++ if it is done when the
- * variable is first declared. Assigning values to existing structs is
- * heterogeneous across the three. */
- static UA_INLINE UA_UInt32Range
- UA_UINT32RANGE(UA_UInt32 min, UA_UInt32 max) {
- UA_UInt32Range range = {min, max};
- return range;
- }
- static UA_INLINE UA_DurationRange
- UA_DURATIONRANGE(UA_Duration min, UA_Duration max) {
- UA_DurationRange range = {min, max};
- return range;
- }
- UA_Server *
- UA_Server_new() {
- UA_ServerConfig config;
- memset(&config, 0, sizeof(UA_ServerConfig));
- /* Set a default logger and NodeStore for the initialization */
- config.logger = UA_Log_Stdout_;
- UA_Nodestore_HashMap(&config.nodestore);
- return UA_Server_newWithConfig(&config);
- }
- /*******************************/
- /* Default Connection Settings */
- /*******************************/
- const UA_ConnectionConfig UA_ConnectionConfig_default = {
- 0, /* .protocolVersion */
- 65535, /* .sendBufferSize, 64k per chunk */
- 65535, /* .recvBufferSize, 64k per chunk */
- 0, /* .maxMessageSize, 0 -> unlimited */
- 0 /* .maxChunkCount, 0 -> unlimited */
- };
- /***************************/
- /* Default Server Settings */
- /***************************/
- #define MANUFACTURER_NAME "open62541"
- #define PRODUCT_NAME "open62541 OPC UA Server"
- #define PRODUCT_URI "http://open62541.org"
- #define APPLICATION_NAME "open62541-based OPC UA Application"
- #define APPLICATION_URI "urn:unconfigured:application"
- #define APPLICATION_URI_SERVER "urn:open62541.server.application"
- #define STRINGIFY(arg) #arg
- #define VERSION(MAJOR, MINOR, PATCH, LABEL) \
- STRINGIFY(MAJOR) "." STRINGIFY(MINOR) "." STRINGIFY(PATCH) LABEL
- static UA_StatusCode
- createEndpoint(UA_ServerConfig *conf, UA_EndpointDescription *endpoint,
- const UA_SecurityPolicy *securityPolicy,
- UA_MessageSecurityMode securityMode) {
- UA_EndpointDescription_init(endpoint);
- endpoint->securityMode = securityMode;
- UA_String_copy(&securityPolicy->policyUri, &endpoint->securityPolicyUri);
- endpoint->transportProfileUri =
- UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
- /* Add security level value for the corresponding message security mode */
- endpoint->securityLevel = (UA_Byte) securityMode;
- /* Enable all login mechanisms from the access control plugin */
- UA_StatusCode retval = UA_Array_copy(conf->accessControl.userTokenPolicies,
- conf->accessControl.userTokenPoliciesSize,
- (void **)&endpoint->userIdentityTokens,
- &UA_TYPES[UA_TYPES_USERTOKENPOLICY]);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- endpoint->userIdentityTokensSize = conf->accessControl.userTokenPoliciesSize;
- UA_String_copy(&securityPolicy->localCertificate, &endpoint->serverCertificate);
- UA_ApplicationDescription_copy(&conf->applicationDescription, &endpoint->server);
- return UA_STATUSCODE_GOOD;
- }
- static const size_t usernamePasswordsSize = 2;
- static UA_UsernamePasswordLogin usernamePasswords[2] = {
- {UA_STRING_STATIC("user1"), UA_STRING_STATIC("password")},
- {UA_STRING_STATIC("user2"), UA_STRING_STATIC("password1")}};
- static UA_StatusCode
- setDefaultConfig(UA_ServerConfig *conf) {
- if (!conf)
- return UA_STATUSCODE_BADINVALIDARGUMENT;
- if(conf->nodestore.context == NULL)
- UA_Nodestore_HashMap(&conf->nodestore);
- /* --> Start setting the default static config <-- */
- conf->nThreads = 1;
- conf->logger = UA_Log_Stdout_;
- conf->shutdownDelay = 0.0;
- /* Server Description */
- UA_BuildInfo_clear(&conf->buildInfo);
- conf->buildInfo.productUri = UA_STRING_ALLOC(PRODUCT_URI);
- conf->buildInfo.manufacturerName = UA_STRING_ALLOC(MANUFACTURER_NAME);
- conf->buildInfo.productName = UA_STRING_ALLOC(PRODUCT_NAME);
- conf->buildInfo.softwareVersion =
- UA_STRING_ALLOC(VERSION(UA_OPEN62541_VER_MAJOR, UA_OPEN62541_VER_MINOR,
- UA_OPEN62541_VER_PATCH, UA_OPEN62541_VER_LABEL));
- #ifdef UA_PACK_DEBIAN
- conf->buildInfo.buildNumber = UA_STRING_ALLOC("deb");
- #else
- conf->buildInfo.buildNumber = UA_STRING_ALLOC(__DATE__ " " __TIME__);
- #endif
- conf->buildInfo.buildDate = UA_DateTime_now();
- UA_ApplicationDescription_clear(&conf->applicationDescription);
- conf->applicationDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI_SERVER);
- conf->applicationDescription.productUri = UA_STRING_ALLOC(PRODUCT_URI);
- conf->applicationDescription.applicationName =
- UA_LOCALIZEDTEXT_ALLOC("en", APPLICATION_NAME);
- conf->applicationDescription.applicationType = UA_APPLICATIONTYPE_SERVER;
- /* conf->applicationDescription.gatewayServerUri = UA_STRING_NULL; */
- /* conf->applicationDescription.discoveryProfileUri = UA_STRING_NULL; */
- /* conf->applicationDescription.discoveryUrlsSize = 0; */
- /* conf->applicationDescription.discoveryUrls = NULL; */
- #ifdef UA_ENABLE_DISCOVERY_MULTICAST
- UA_MdnsDiscoveryConfiguration_clear(&conf->discovery.mdns);
- conf->discovery.mdnsInterfaceIP = UA_STRING_NULL;
- # if !defined(UA_HAS_GETIFADDR)
- conf->discovery.ipAddressList = NULL;
- conf->discovery.ipAddressListSize = 0;
- # endif
- #endif
- /* Custom DataTypes */
- /* conf->customDataTypesSize = 0; */
- /* conf->customDataTypes = NULL; */
- /* Networking */
- /* conf->networkLayersSize = 0; */
- /* conf->networkLayers = NULL; */
- /* conf->customHostname = UA_STRING_NULL; */
- /* Endpoints */
- /* conf->endpoints = {0, NULL}; */
- /* Certificate Verification that accepts every certificate. Can be
- * overwritten when the policy is specialized. */
- UA_CertificateVerification_AcceptAll(&conf->certificateVerification);
- /* * Global Node Lifecycle * */
- /* conf->nodeLifecycle.constructor = NULL; */
- /* conf->nodeLifecycle.destructor = NULL; */
- /* conf->nodeLifecycle.createOptionalChild = NULL; */
- /* conf->nodeLifecycle.generateChildNodeId = NULL; */
- /* Relax constraints for the InformationModel */
- conf->relaxEmptyValueConstraint = true; /* Allow empty values */
- /* Limits for SecureChannels */
- conf->maxSecureChannels = 40;
- conf->maxSecurityTokenLifetime = 10 * 60 * 1000; /* 10 minutes */
- /* Limits for Sessions */
- conf->maxSessions = 100;
- conf->maxSessionTimeout = 60.0 * 60.0 * 1000.0; /* 1h */
- /* Limits for Subscriptions */
- conf->publishingIntervalLimits = UA_DURATIONRANGE(100.0, 3600.0 * 1000.0);
- conf->lifeTimeCountLimits = UA_UINT32RANGE(3, 15000);
- conf->keepAliveCountLimits = UA_UINT32RANGE(1, 100);
- conf->maxNotificationsPerPublish = 1000;
- conf->enableRetransmissionQueue = true;
- conf->maxRetransmissionQueueSize = 0; /* unlimited */
- #ifdef UA_ENABLE_SUBSCRIPTIONS_EVENTS
- conf->maxEventsPerNode = 0; /* unlimited */
- #endif
- /* Limits for MonitoredItems */
- conf->samplingIntervalLimits = UA_DURATIONRANGE(50.0, 24.0 * 3600.0 * 1000.0);
- conf->queueSizeLimits = UA_UINT32RANGE(1, 100);
- #ifdef UA_ENABLE_DISCOVERY
- conf->discovery.cleanupTimeout = 60 * 60;
- #endif
- #ifdef UA_ENABLE_HISTORIZING
- /* conf->accessHistoryDataCapability = UA_FALSE; */
- /* conf->maxReturnDataValues = 0; */
- /* conf->accessHistoryEventsCapability = UA_FALSE; */
- /* conf->maxReturnEventValues = 0; */
- /* conf->insertDataCapability = UA_FALSE; */
- /* conf->insertEventCapability = UA_FALSE; */
- /* conf->insertAnnotationsCapability = UA_FALSE; */
- /* conf->replaceDataCapability = UA_FALSE; */
- /* conf->replaceEventCapability = UA_FALSE; */
- /* conf->updateDataCapability = UA_FALSE; */
- /* conf->updateEventCapability = UA_FALSE; */
- /* conf->deleteRawCapability = UA_FALSE; */
- /* conf->deleteEventCapability = UA_FALSE; */
- /* conf->deleteAtTimeDataCapability = UA_FALSE; */
- #endif
- #if UA_MULTITHREADING >= 100
- conf->maxAsyncOperationQueueSize = 0;
- conf->asyncOperationTimeout = 120000; /* Async Operation Timeout in ms (2 minutes) */
- #endif
- /* --> Finish setting the default static config <-- */
- return UA_STATUSCODE_GOOD;
- }
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_setBasics(UA_ServerConfig* conf) {
- UA_StatusCode res = setDefaultConfig(conf);
- UA_LOG_WARNING(&conf->logger, UA_LOGCATEGORY_USERLAND,
- "AcceptAll Certificate Verification. "
- "Any remote certificate will be accepted.");
- return res;
- }
- static UA_StatusCode
- addDefaultNetworkLayers(UA_ServerConfig *conf, UA_UInt16 portNumber,
- UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
- return UA_ServerConfig_addNetworkLayerTCP(conf, portNumber, sendBufferSize, recvBufferSize);
- }
- #ifdef UA_ENABLE_WEBSOCKET_SERVER
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_addNetworkLayerWS(UA_ServerConfig *conf, UA_UInt16 portNumber,
- UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
- /* Add a network layer */
- UA_ServerNetworkLayer *tmp = (UA_ServerNetworkLayer *)
- UA_realloc(conf->networkLayers,
- sizeof(UA_ServerNetworkLayer) * (1 + conf->networkLayersSize));
- if(!tmp)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- conf->networkLayers = tmp;
- UA_ConnectionConfig config = UA_ConnectionConfig_default;
- if (sendBufferSize > 0)
- config.sendBufferSize = sendBufferSize;
- if (recvBufferSize > 0)
- config.recvBufferSize = recvBufferSize;
- conf->networkLayers[conf->networkLayersSize] =
- UA_ServerNetworkLayerWS(config, portNumber, &conf->logger);
- if (!conf->networkLayers[conf->networkLayersSize].handle)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- conf->networkLayersSize++;
- return UA_STATUSCODE_GOOD;
- }
- #endif
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_addNetworkLayerTCP(UA_ServerConfig *conf, UA_UInt16 portNumber,
- UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
- /* Add a network layer */
- UA_ServerNetworkLayer *tmp = (UA_ServerNetworkLayer *)
- UA_realloc(conf->networkLayers,
- sizeof(UA_ServerNetworkLayer) * (1 + conf->networkLayersSize));
- if(!tmp)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- conf->networkLayers = tmp;
- UA_ConnectionConfig config = UA_ConnectionConfig_default;
- if (sendBufferSize > 0)
- config.sendBufferSize = sendBufferSize;
- if (recvBufferSize > 0)
- config.recvBufferSize = recvBufferSize;
- conf->networkLayers[conf->networkLayersSize] =
- UA_ServerNetworkLayerTCP(config, portNumber, &conf->logger);
- if (!conf->networkLayers[conf->networkLayersSize].handle)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- conf->networkLayersSize++;
- return UA_STATUSCODE_GOOD;
- }
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_addSecurityPolicyNone(UA_ServerConfig *config,
- const UA_ByteString *certificate) {
- /* Allocate the SecurityPolicies */
- UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
- UA_realloc(config->securityPolicies,
- sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
- if(!tmp)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- config->securityPolicies = tmp;
-
- /* Populate the SecurityPolicies */
- UA_ByteString localCertificate = UA_BYTESTRING_NULL;
- if(certificate)
- localCertificate = *certificate;
- UA_StatusCode retval =
- UA_SecurityPolicy_None(&config->securityPolicies[config->securityPoliciesSize],
- NULL, localCertificate, &config->logger);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->securityPoliciesSize++;
- return UA_STATUSCODE_GOOD;
- }
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_addEndpoint(UA_ServerConfig *config, const UA_String securityPolicyUri,
- UA_MessageSecurityMode securityMode) {
- /* Allocate the endpoint */
- UA_EndpointDescription *tmp = (UA_EndpointDescription *)
- UA_realloc(config->endpoints,
- sizeof(UA_EndpointDescription) * (1 + config->endpointsSize));
- if(!tmp) {
- return UA_STATUSCODE_BADOUTOFMEMORY;
- }
- config->endpoints = tmp;
- /* Lookup the security policy */
- const UA_SecurityPolicy *policy = NULL;
- for (size_t i = 0; i < config->securityPoliciesSize; ++i) {
- if (UA_String_equal(&securityPolicyUri, &config->securityPolicies[i].policyUri)) {
- policy = &config->securityPolicies[i];
- break;
- }
- }
- if (!policy)
- return UA_STATUSCODE_BADINVALIDARGUMENT;
- /* Populate the endpoint */
- UA_StatusCode retval =
- createEndpoint(config, &config->endpoints[config->endpointsSize],
- policy, securityMode);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->endpointsSize++;
- return UA_STATUSCODE_GOOD;
- }
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_addAllEndpoints(UA_ServerConfig *config) {
- /* Allocate the endpoints */
- UA_EndpointDescription * tmp = (UA_EndpointDescription *)
- UA_realloc(config->endpoints,
- sizeof(UA_EndpointDescription) *
- (2 * config->securityPoliciesSize + config->endpointsSize));
- if(!tmp) {
- return UA_STATUSCODE_BADOUTOFMEMORY;
- }
- config->endpoints = tmp;
- /* Populate the endpoints */
- for(size_t i = 0; i < config->securityPoliciesSize; ++i) {
- if(UA_String_equal(&UA_SECURITY_POLICY_NONE_URI, &config->securityPolicies[i].policyUri)) {
- UA_StatusCode retval =
- createEndpoint(config, &config->endpoints[config->endpointsSize],
- &config->securityPolicies[i], UA_MESSAGESECURITYMODE_NONE);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->endpointsSize++;
- } else {
- UA_StatusCode retval =
- createEndpoint(config, &config->endpoints[config->endpointsSize],
- &config->securityPolicies[i], UA_MESSAGESECURITYMODE_SIGN);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->endpointsSize++;
- retval = createEndpoint(config, &config->endpoints[config->endpointsSize],
- &config->securityPolicies[i],
- UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->endpointsSize++;
- }
- }
- return UA_STATUSCODE_GOOD;
- }
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_setMinimalCustomBuffer(UA_ServerConfig *config, UA_UInt16 portNumber,
- const UA_ByteString *certificate,
- UA_UInt32 sendBufferSize,
- UA_UInt32 recvBufferSize) {
- if(!config)
- return UA_STATUSCODE_BADINVALIDARGUMENT;
- UA_StatusCode retval = setDefaultConfig(config);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_clean(config);
- return retval;
- }
- retval = addDefaultNetworkLayers(config, portNumber, sendBufferSize, recvBufferSize);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_clean(config);
- return retval;
- }
- /* Allocate the SecurityPolicies */
- retval = UA_ServerConfig_addSecurityPolicyNone(config, certificate);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_clean(config);
- return retval;
- }
- /* Initialize the Access Control plugin */
- retval = UA_AccessControl_default(config, true,
- &config->securityPolicies[config->securityPoliciesSize-1].policyUri,
- usernamePasswordsSize, usernamePasswords);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_clean(config);
- return retval;
- }
- /* Allocate the endpoint */
- retval = UA_ServerConfig_addEndpoint(config, UA_SECURITY_POLICY_NONE_URI,
- UA_MESSAGESECURITYMODE_NONE);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_clean(config);
- return retval;
- }
- UA_LOG_WARNING(&config->logger, UA_LOGCATEGORY_USERLAND,
- "AcceptAll Certificate Verification. "
- "Any remote certificate will be accepted.");
- return UA_STATUSCODE_GOOD;
- }
- #ifdef UA_ENABLE_ENCRYPTION
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_addSecurityPolicyBasic128Rsa15(UA_ServerConfig *config,
- const UA_ByteString *certificate,
- const UA_ByteString *privateKey) {
- /* Allocate the SecurityPolicies */
- UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
- UA_realloc(config->securityPolicies,
- sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
- if(!tmp)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- config->securityPolicies = tmp;
-
- /* Populate the SecurityPolicies */
- UA_ByteString localCertificate = UA_BYTESTRING_NULL;
- UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
- if(certificate)
- localCertificate = *certificate;
- if(privateKey)
- localPrivateKey = *privateKey;
- UA_StatusCode retval =
- UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[config->securityPoliciesSize],
- &config->certificateVerification,
- localCertificate, localPrivateKey, &config->logger);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->securityPoliciesSize++;
- return UA_STATUSCODE_GOOD;
- }
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_addSecurityPolicyBasic256(UA_ServerConfig *config,
- const UA_ByteString *certificate,
- const UA_ByteString *privateKey) {
- /* Allocate the SecurityPolicies */
- UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
- UA_realloc(config->securityPolicies,
- sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
- if(!tmp)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- config->securityPolicies = tmp;
-
- /* Populate the SecurityPolicies */
- UA_ByteString localCertificate = UA_BYTESTRING_NULL;
- UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
- if(certificate)
- localCertificate = *certificate;
- if(privateKey)
- localPrivateKey = *privateKey;
- UA_StatusCode retval =
- UA_SecurityPolicy_Basic256(&config->securityPolicies[config->securityPoliciesSize],
- &config->certificateVerification,
- localCertificate, localPrivateKey, &config->logger);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->securityPoliciesSize++;
- return UA_STATUSCODE_GOOD;
- }
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_addSecurityPolicyBasic256Sha256(UA_ServerConfig *config,
- const UA_ByteString *certificate,
- const UA_ByteString *privateKey) {
- /* Allocate the SecurityPolicies */
- UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
- UA_realloc(config->securityPolicies,
- sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
- if(!tmp)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- config->securityPolicies = tmp;
-
- /* Populate the SecurityPolicies */
- UA_ByteString localCertificate = UA_BYTESTRING_NULL;
- UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
- if(certificate)
- localCertificate = *certificate;
- if(privateKey)
- localPrivateKey = *privateKey;
- UA_StatusCode retval =
- UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[config->securityPoliciesSize],
- &config->certificateVerification,
- localCertificate, localPrivateKey, &config->logger);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->securityPoliciesSize++;
- return UA_STATUSCODE_GOOD;
- }
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_addAllSecurityPolicies(UA_ServerConfig *config,
- const UA_ByteString *certificate,
- const UA_ByteString *privateKey) {
- /* Allocate the SecurityPolicies */
- UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
- UA_realloc(config->securityPolicies,
- sizeof(UA_SecurityPolicy) * (4 + config->securityPoliciesSize));
- if(!tmp)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- config->securityPolicies = tmp;
-
- /* Populate the SecurityPolicies */
- UA_ByteString localCertificate = UA_BYTESTRING_NULL;
- UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
- if(certificate)
- localCertificate = *certificate;
- if(privateKey)
- localPrivateKey = *privateKey;
- UA_StatusCode retval =
- UA_SecurityPolicy_None(&config->securityPolicies[config->securityPoliciesSize],
- NULL, localCertificate, &config->logger);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->securityPoliciesSize++;
- retval = UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[config->securityPoliciesSize],
- &config->certificateVerification,
- localCertificate, localPrivateKey, &config->logger);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->securityPoliciesSize++;
- retval = UA_SecurityPolicy_Basic256(&config->securityPolicies[config->securityPoliciesSize],
- &config->certificateVerification,
- localCertificate, localPrivateKey, &config->logger);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->securityPoliciesSize++;
- retval = UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[config->securityPoliciesSize],
- &config->certificateVerification,
- localCertificate, localPrivateKey, &config->logger);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- config->securityPoliciesSize++;
- return retval;
- }
- UA_EXPORT UA_StatusCode
- UA_ServerConfig_setDefaultWithSecurityPolicies(UA_ServerConfig *conf,
- UA_UInt16 portNumber,
- const UA_ByteString *certificate,
- const UA_ByteString *privateKey,
- const UA_ByteString *trustList,
- size_t trustListSize,
- const UA_ByteString *issuerList,
- size_t issuerListSize,
- const UA_ByteString *revocationList,
- size_t revocationListSize) {
- UA_StatusCode retval = setDefaultConfig(conf);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_clean(conf);
- return retval;
- }
- retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
- trustList, trustListSize,
- issuerList, issuerListSize,
- revocationList, revocationListSize);
- if (retval != UA_STATUSCODE_GOOD)
- return retval;
- retval = addDefaultNetworkLayers(conf, portNumber, 0, 0);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_clean(conf);
- return retval;
- }
- retval = UA_ServerConfig_addAllSecurityPolicies(conf, certificate, privateKey);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_clean(conf);
- return retval;
- }
- retval = UA_AccessControl_default(conf, true,
- &conf->securityPolicies[conf->securityPoliciesSize-1].policyUri,
- usernamePasswordsSize, usernamePasswords);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_clean(conf);
- return retval;
- }
- retval = UA_ServerConfig_addAllEndpoints(conf);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_clean(conf);
- return retval;
- }
- return UA_STATUSCODE_GOOD;
- }
- #endif
- /***************************/
- /* Default Client Settings */
- /***************************/
- UA_Client * UA_Client_new() {
- UA_ClientConfig config;
- memset(&config, 0, sizeof(UA_ClientConfig));
- config.logger.log = UA_Log_Stdout_log;
- config.logger.context = NULL;
- config.logger.clear = UA_Log_Stdout_clear;
- return UA_Client_newWithConfig(&config);
- }
- static UA_INLINE void
- UA_ClientConnectionTCP_poll_callback(UA_Client *client, void *data) {
- UA_ClientConnectionTCP_poll(client, data);
- }
- UA_StatusCode
- UA_ClientConfig_setDefault(UA_ClientConfig *config) {
- config->timeout = 5000;
- config->secureChannelLifeTime = 10 * 60 * 1000; /* 10 minutes */
- config->logger.log = UA_Log_Stdout_log;
- config->logger.context = NULL;
- config->logger.clear = UA_Log_Stdout_clear;
- config->localConnectionConfig = UA_ConnectionConfig_default;
- /* Certificate Verification that accepts every certificate. Can be
- * overwritten when the policy is specialized. */
- UA_CertificateVerification_AcceptAll(&config->certificateVerification);
- UA_LOG_WARNING(&config->logger, UA_LOGCATEGORY_USERLAND,
- "AcceptAll Certificate Verification. "
- "Any remote certificate will be accepted.");
- /* With encryption enabled, the applicationUri needs to match the URI from
- * the certificate */
- config->clientDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI);
- config->clientDescription.applicationType = UA_APPLICATIONTYPE_CLIENT;
- if(config->securityPoliciesSize > 0) {
- UA_LOG_ERROR(&config->logger, UA_LOGCATEGORY_NETWORK,
- "Could not initialize a config that already has SecurityPolicies");
- return UA_STATUSCODE_BADINTERNALERROR;
- }
- config->securityPolicies = (UA_SecurityPolicy*)UA_malloc(sizeof(UA_SecurityPolicy));
- if(!config->securityPolicies)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- UA_StatusCode retval = UA_SecurityPolicy_None(config->securityPolicies, NULL,
- UA_BYTESTRING_NULL, &config->logger);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_free(config->securityPolicies);
- config->securityPolicies = NULL;
- return retval;
- }
- config->securityPoliciesSize = 1;
- config->connectionFunc = UA_ClientConnectionTCP;
- config->initConnectionFunc = UA_ClientConnectionTCP_init; /* for async client */
- config->pollConnectionFunc = UA_ClientConnectionTCP_poll_callback; /* for async connection */
- config->customDataTypes = NULL;
- config->stateCallback = NULL;
- config->connectivityCheckInterval = 0;
- config->requestedSessionTimeout = 1200000; /* requestedSessionTimeout */
- config->inactivityCallback = NULL;
- config->clientContext = NULL;
- #ifdef UA_ENABLE_SUBSCRIPTIONS
- config->outStandingPublishRequests = 10;
- config->subscriptionInactivityCallback = NULL;
- #endif
- return UA_STATUSCODE_GOOD;
- }
- #ifdef UA_ENABLE_ENCRYPTION
- UA_StatusCode
- UA_ClientConfig_setDefaultEncryption(UA_ClientConfig *config,
- UA_ByteString localCertificate, UA_ByteString privateKey,
- const UA_ByteString *trustList, size_t trustListSize,
- const UA_ByteString *revocationList, size_t revocationListSize) {
- UA_StatusCode retval = UA_ClientConfig_setDefault(config);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- retval = UA_CertificateVerification_Trustlist(&config->certificateVerification,
- trustList, trustListSize,
- NULL, 0,
- revocationList, revocationListSize);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- /* Populate SecurityPolicies */
- UA_SecurityPolicy *sp = (UA_SecurityPolicy*)
- UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * 4);
- if(!sp)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- config->securityPolicies = sp;
- retval = UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[1],
- &config->certificateVerification,
- localCertificate, privateKey, &config->logger);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- ++config->securityPoliciesSize;
- retval = UA_SecurityPolicy_Basic256(&config->securityPolicies[2],
- &config->certificateVerification,
- localCertificate, privateKey, &config->logger);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- ++config->securityPoliciesSize;
- retval = UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[3],
- &config->certificateVerification,
- localCertificate, privateKey, &config->logger);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- ++config->securityPoliciesSize;
- return UA_STATUSCODE_GOOD;
- }
- #endif
|