ua_session.c 2.9 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697
  1. #include <time.h>
  2. #include <stdlib.h>
  3. #include "ua_session.h"
  4. #include "util/ua_util.h"
  5. UA_Int32 UA_Session_new(UA_Session **session) {
  6. UA_Int32 retval = UA_SUCCESS;
  7. retval |= UA_alloc((void **)session, sizeof(UA_Session));
  8. if(retval == UA_SUCCESS)
  9. UA_Session_init(*session);
  10. return retval;
  11. }
  12. /* mock up function to generate tokens for authentication */
  13. UA_Int32 UA_Session_generateToken(UA_NodeId *newToken) {
  14. //Random token generation
  15. UA_Int32 retval = UA_SUCCESS;
  16. srand(time(NULL));
  17. UA_Int32 i = 0;
  18. UA_Int32 r = 0;
  19. //retval |= UA_NodeId_new(newToken);
  20. newToken->namespaceIndex = 0; // where else?
  21. newToken->identifierType = UA_NODEIDTYPE_GUID;
  22. newToken->identifier.guid.data1 = rand();
  23. r = rand();
  24. newToken->identifier.guid.data2 = (UA_UInt16)((r>>16) );
  25. r = rand();
  26. /* UA_Int32 r1 = (r>>16); */
  27. /* UA_Int32 r2 = r1 & 0xFFFF; */
  28. /* r2 = r2 * 1; */
  29. newToken->identifier.guid.data3 = (UA_UInt16)((r>>16) );
  30. for(i = 0;i < 8;i++) {
  31. r = rand();
  32. newToken->identifier.guid.data4[i] = (UA_Byte)((r>>28) );
  33. }
  34. return retval;
  35. }
  36. UA_Int32 UA_Session_init(UA_Session *session) {
  37. if(!session)
  38. return UA_ERROR;
  39. UA_ApplicationDescription_init(&session->clientDescription);
  40. UA_NodeId_init(&session->authenticationToken);
  41. UA_NodeId_init(&session->sessionId);
  42. UA_String_init(&session->sessionName);
  43. session->maxRequestMessageSize = 0;
  44. session->maxResponseMessageSize = 0;
  45. session->timeout = 0;
  46. UA_DateTime_init(&session->validTill);
  47. session->channel = UA_NULL;
  48. return UA_SUCCESS;
  49. }
  50. UA_Int32 UA_Session_deleteMembers(UA_Session *session) {
  51. UA_Int32 retval = UA_SUCCESS;
  52. UA_ApplicationDescription_deleteMembers(&session->clientDescription);
  53. retval |= UA_NodeId_deleteMembers(&session->authenticationToken);
  54. retval |= UA_NodeId_deleteMembers(&session->sessionId);
  55. retval |= UA_String_deleteMembers(&session->sessionName);
  56. session->channel = UA_NULL;
  57. return retval;
  58. }
  59. UA_Int32 UA_Session_delete(UA_Session *session) {
  60. UA_Int32 retval = UA_SUCCESS;
  61. UA_Session_deleteMembers(session);
  62. retval |= UA_free(session);
  63. return retval;
  64. }
  65. UA_Boolean UA_Session_compare(UA_Session *session1, UA_Session *session2) {
  66. if(session1 && session2 &&
  67. UA_NodeId_equal(&session1->sessionId, &session2->sessionId) == UA_EQUAL)
  68. return UA_TRUE;
  69. return UA_FALSE;
  70. }
  71. UA_Int32 UA_Session_setExpirationDate(UA_Session *session) {
  72. if(!session)
  73. return UA_ERROR;
  74. session->validTill = UA_DateTime_now() + session->timeout * 100000; //timeout in ms
  75. return UA_SUCCESS;
  76. }
  77. UA_Int32 UA_Session_getPendingLifetime(UA_Session *session, UA_Double *pendingLifetime_ms) {
  78. if(!session)
  79. return UA_ERROR;
  80. *pendingLifetime_ms = (session->validTill - UA_DateTime_now())/10000000; //difference in ms
  81. return UA_SUCCESS;
  82. }