12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091 |
- /* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
- * See http://creativecommons.org/publicdomain/zero/1.0/ for more information. */
- #include <signal.h>
- #include <stdio.h>
- #include <errno.h>
- #include "open62541.h"
- static UA_ByteString loadFile(const char *const path) {
- UA_ByteString fileContents = UA_STRING_NULL;
- /* Open the file */
- FILE *fp = fopen(path, "rb");
- if(!fp) {
- errno = 0; /* We read errno also from the tcp layer... */
- return fileContents;
- }
- /* Get the file length, allocate the data and read */
- fseek(fp, 0, SEEK_END);
- fileContents.length = (size_t)ftell(fp);
- fileContents.data = (UA_Byte*)UA_malloc(fileContents.length * sizeof(UA_Byte));
- if(fileContents.data) {
- fseek(fp, 0, SEEK_SET);
- size_t read = fread(fileContents.data, sizeof(UA_Byte), fileContents.length, fp);
- if(read != fileContents.length)
- UA_ByteString_deleteMembers(&fileContents);
- } else {
- fileContents.length = 0;
- }
- fclose(fp);
- return fileContents;
- }
- UA_Boolean running = true;
- static void stopHandler(int sig) {
- UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND, "received ctrl-c");
- running = false;
- }
- int main(int argc, char* argv[]) {
- signal(SIGINT, stopHandler);
- signal(SIGTERM, stopHandler);
- if(argc < 3) {
- UA_LOG_FATAL(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
- "Missing arguments. Arguments are "
- "<server-certificate.der> <private-key.der> "
- "[<trustlist1.crl>, ...]");
- return 1;
- }
- /* Load certificate and private key */
- UA_ByteString certificate = loadFile(argv[1]);
- UA_ByteString privateKey = loadFile(argv[2]);
- /* Load the trustlist */
- size_t trustListSize = 0;
- if(argc > 3)
- trustListSize = (size_t)argc-3;
- UA_STACKARRAY(UA_ByteString, trustList, trustListSize);
- for(size_t i = 0; i < trustListSize; i++)
- trustList[i] = loadFile(argv[i+3]);
- /* Loading of a revocation list currentlu unsupported */
- UA_ByteString *revocationList = NULL;
- size_t revocationListSize = 0;
- UA_ServerConfig *config =
- UA_ServerConfig_new_basic128rsa15(4840, &certificate, &privateKey,
- trustList, trustListSize,
- revocationList, revocationListSize);
- UA_ByteString_deleteMembers(&certificate);
- UA_ByteString_deleteMembers(&privateKey);
- for(size_t i = 0; i < trustListSize; i++)
- UA_ByteString_deleteMembers(&trustList[i]);
- if(!config) {
- UA_LOG_FATAL(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
- "Could not create the server config");
- return 1;
- }
- UA_Server *server = UA_Server_new(config);
- UA_StatusCode retval = UA_Server_run(server, &running);
- UA_Server_delete(server);
- UA_ServerConfig_delete(config);
- return (int)retval;
- }
|