ua_server_binary.c 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679
  1. #include "ua_util.h"
  2. #include "ua_server_internal.h"
  3. #include "ua_services.h"
  4. #include "ua_securechannel_manager.h"
  5. #include "ua_session_manager.h"
  6. #include "ua_types_generated_encoding_binary.h"
  7. #include "ua_transport_generated.h"
  8. #include "ua_transport_generated_encoding_binary.h"
  9. /********************/
  10. /* Helper Functions */
  11. /********************/
  12. static void init_response_header(const UA_RequestHeader *p, UA_ResponseHeader *r) {
  13. r->requestHandle = p->requestHandle;
  14. r->timestamp = UA_DateTime_now();
  15. }
  16. static void
  17. sendError(UA_SecureChannel *channel, const UA_ByteString *msg, size_t pos, const UA_DataType *responseType,
  18. UA_UInt32 requestId, UA_StatusCode error) {
  19. UA_RequestHeader requestHeader;
  20. UA_StatusCode retval = UA_RequestHeader_decodeBinary(msg, &pos, &requestHeader);
  21. if(retval != UA_STATUSCODE_GOOD)
  22. return;
  23. void *response = UA_alloca(responseType->memSize);
  24. UA_init(response, responseType);
  25. UA_ResponseHeader *responseHeader = (UA_ResponseHeader*)response;
  26. init_response_header(&requestHeader, responseHeader);
  27. responseHeader->serviceResult = error;
  28. UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  29. UA_RequestHeader_deleteMembers(&requestHeader);
  30. UA_ResponseHeader_deleteMembers(responseHeader);
  31. }
  32. /* Returns a complete decoded request (without securechannel headers + padding)
  33. or UA_BYTESTRING_NULL */
  34. static UA_ByteString processChunk(UA_SecureChannel *channel, UA_Server *server,
  35. const UA_TcpMessageHeader *messageHeader, UA_UInt32 requestId,
  36. const UA_ByteString *msg, size_t pos, size_t chunksize,
  37. UA_Boolean *deleteRequest) {
  38. UA_ByteString bytes = UA_BYTESTRING_NULL;
  39. switch(messageHeader->messageTypeAndChunkType & 0xff000000) {
  40. case UA_CHUNKTYPE_INTERMEDIATE:
  41. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Chunk message");
  42. UA_SecureChannel_appendChunk(channel, requestId, msg, pos, chunksize);
  43. break;
  44. case UA_CHUNKTYPE_FINAL:
  45. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Final chunk message");
  46. bytes = UA_SecureChannel_finalizeChunk(channel, requestId, msg, pos, chunksize, deleteRequest);
  47. break;
  48. case UA_CHUNKTYPE_ABORT:
  49. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Chunk aborted");
  50. UA_SecureChannel_removeChunk(channel, requestId);
  51. break;
  52. default:
  53. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Unknown chunk type");
  54. }
  55. return bytes;
  56. }
  57. static void
  58. getServicePointers(UA_UInt32 requestTypeId, const UA_DataType **requestType,
  59. const UA_DataType **responseType, UA_Service *service,
  60. UA_Boolean *requiresSession) {
  61. switch(requestTypeId - UA_ENCODINGOFFSET_BINARY) {
  62. case UA_NS0ID_GETENDPOINTSREQUEST:
  63. *service = (UA_Service)Service_GetEndpoints;
  64. *requestType = &UA_TYPES[UA_TYPES_GETENDPOINTSREQUEST];
  65. *responseType = &UA_TYPES[UA_TYPES_GETENDPOINTSRESPONSE];
  66. *requiresSession = false;
  67. break;
  68. case UA_NS0ID_FINDSERVERSREQUEST:
  69. *service = (UA_Service)Service_FindServers;
  70. *requestType = &UA_TYPES[UA_TYPES_FINDSERVERSREQUEST];
  71. *responseType = &UA_TYPES[UA_TYPES_FINDSERVERSRESPONSE];
  72. *requiresSession = false;
  73. break;
  74. case UA_NS0ID_CREATESESSIONREQUEST:
  75. *service = (UA_Service)Service_CreateSession;
  76. *requestType = &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST];
  77. *responseType = &UA_TYPES[UA_TYPES_CREATESESSIONRESPONSE];
  78. *requiresSession = false;
  79. break;
  80. case UA_NS0ID_ACTIVATESESSIONREQUEST:
  81. *service = (UA_Service)Service_ActivateSession;
  82. *requestType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST];
  83. *responseType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONRESPONSE];
  84. break;
  85. case UA_NS0ID_CLOSESESSIONREQUEST:
  86. *service = (UA_Service)Service_CloseSession;
  87. *requestType = &UA_TYPES[UA_TYPES_CLOSESESSIONREQUEST];
  88. *responseType = &UA_TYPES[UA_TYPES_CLOSESESSIONRESPONSE];
  89. break;
  90. case UA_NS0ID_READREQUEST:
  91. *service = (UA_Service)Service_Read;
  92. *requestType = &UA_TYPES[UA_TYPES_READREQUEST];
  93. *responseType = &UA_TYPES[UA_TYPES_READRESPONSE];
  94. break;
  95. case UA_NS0ID_WRITEREQUEST:
  96. *service = (UA_Service)Service_Write;
  97. *requestType = &UA_TYPES[UA_TYPES_WRITEREQUEST];
  98. *responseType = &UA_TYPES[UA_TYPES_WRITERESPONSE];
  99. break;
  100. case UA_NS0ID_BROWSEREQUEST:
  101. *service = (UA_Service)Service_Browse;
  102. *requestType = &UA_TYPES[UA_TYPES_BROWSEREQUEST];
  103. *responseType = &UA_TYPES[UA_TYPES_BROWSERESPONSE];
  104. break;
  105. case UA_NS0ID_BROWSENEXTREQUEST:
  106. *service = (UA_Service)Service_BrowseNext;
  107. *requestType = &UA_TYPES[UA_TYPES_BROWSENEXTREQUEST];
  108. *responseType = &UA_TYPES[UA_TYPES_BROWSENEXTRESPONSE];
  109. break;
  110. case UA_NS0ID_REGISTERNODESREQUEST:
  111. *service = (UA_Service)Service_RegisterNodes;
  112. *requestType = &UA_TYPES[UA_TYPES_REGISTERNODESREQUEST];
  113. *responseType = &UA_TYPES[UA_TYPES_REGISTERNODESRESPONSE];
  114. break;
  115. case UA_NS0ID_UNREGISTERNODESREQUEST:
  116. *service = (UA_Service)Service_UnregisterNodes;
  117. *requestType = &UA_TYPES[UA_TYPES_UNREGISTERNODESREQUEST];
  118. *responseType = &UA_TYPES[UA_TYPES_UNREGISTERNODESRESPONSE];
  119. break;
  120. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST:
  121. *service = (UA_Service)Service_TranslateBrowsePathsToNodeIds;
  122. *requestType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSREQUEST];
  123. *responseType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSRESPONSE];
  124. break;
  125. #ifdef UA_ENABLE_SUBSCRIPTIONS
  126. case UA_NS0ID_CREATESUBSCRIPTIONREQUEST:
  127. *service = (UA_Service)Service_CreateSubscription;
  128. *requestType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONREQUEST];
  129. *responseType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONRESPONSE];
  130. break;
  131. case UA_NS0ID_PUBLISHREQUEST:
  132. *requestType = &UA_TYPES[UA_TYPES_PUBLISHREQUEST];
  133. *responseType = &UA_TYPES[UA_TYPES_PUBLISHRESPONSE];
  134. break;
  135. case UA_NS0ID_REPUBLISHREQUEST:
  136. *service = (UA_Service)Service_Republish;
  137. *requestType = &UA_TYPES[UA_TYPES_REPUBLISHREQUEST];
  138. *responseType = &UA_TYPES[UA_TYPES_REPUBLISHRESPONSE];
  139. break;
  140. case UA_NS0ID_MODIFYSUBSCRIPTIONREQUEST:
  141. *service = (UA_Service)Service_ModifySubscription;
  142. *requestType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONREQUEST];
  143. *responseType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONRESPONSE];
  144. break;
  145. case UA_NS0ID_SETPUBLISHINGMODEREQUEST:
  146. *service = (UA_Service)Service_SetPublishingMode;
  147. *requestType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODEREQUEST];
  148. *responseType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODERESPONSE];
  149. break;
  150. case UA_NS0ID_DELETESUBSCRIPTIONSREQUEST:
  151. *service = (UA_Service)Service_DeleteSubscriptions;
  152. *requestType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSREQUEST];
  153. *responseType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSRESPONSE];
  154. break;
  155. case UA_NS0ID_CREATEMONITOREDITEMSREQUEST:
  156. *service = (UA_Service)Service_CreateMonitoredItems;
  157. *requestType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSREQUEST];
  158. *responseType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSRESPONSE];
  159. break;
  160. case UA_NS0ID_DELETEMONITOREDITEMSREQUEST:
  161. *service = (UA_Service)Service_DeleteMonitoredItems;
  162. *requestType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSREQUEST];
  163. *responseType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSRESPONSE];
  164. break;
  165. case UA_NS0ID_MODIFYMONITOREDITEMSREQUEST:
  166. *service = (UA_Service)Service_ModifyMonitoredItems;
  167. *requestType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSREQUEST];
  168. *responseType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSRESPONSE];
  169. break;
  170. #endif
  171. #ifdef UA_ENABLE_METHODCALLS
  172. case UA_NS0ID_CALLREQUEST:
  173. *service = (UA_Service)Service_Call;
  174. *requestType = &UA_TYPES[UA_TYPES_CALLREQUEST];
  175. *responseType = &UA_TYPES[UA_TYPES_CALLRESPONSE];
  176. break;
  177. #endif
  178. #ifdef UA_ENABLE_NODEMANAGEMENT
  179. case UA_NS0ID_ADDNODESREQUEST:
  180. *service = (UA_Service)Service_AddNodes;
  181. *requestType = &UA_TYPES[UA_TYPES_ADDNODESREQUEST];
  182. *responseType = &UA_TYPES[UA_TYPES_ADDNODESRESPONSE];
  183. break;
  184. case UA_NS0ID_ADDREFERENCESREQUEST:
  185. *service = (UA_Service)Service_AddReferences;
  186. *requestType = &UA_TYPES[UA_TYPES_ADDREFERENCESREQUEST];
  187. *responseType = &UA_TYPES[UA_TYPES_ADDREFERENCESRESPONSE];
  188. break;
  189. case UA_NS0ID_DELETENODESREQUEST:
  190. *service = (UA_Service)Service_DeleteNodes;
  191. *requestType = &UA_TYPES[UA_TYPES_DELETENODESREQUEST];
  192. *responseType = &UA_TYPES[UA_TYPES_DELETENODESRESPONSE];
  193. break;
  194. case UA_NS0ID_DELETEREFERENCESREQUEST:
  195. *service = (UA_Service)Service_DeleteReferences;
  196. *requestType = &UA_TYPES[UA_TYPES_DELETEREFERENCESREQUEST];
  197. *responseType = &UA_TYPES[UA_TYPES_DELETEREFERENCESRESPONSE];
  198. break;
  199. #endif
  200. default:
  201. break;
  202. }
  203. }
  204. /*************************/
  205. /* Process Message Types */
  206. /*************************/
  207. /* HEL -> Open up the connection */
  208. static void processHEL(UA_Connection *connection, const UA_ByteString *msg, size_t *pos) {
  209. UA_TcpHelloMessage helloMessage;
  210. if(UA_TcpHelloMessage_decodeBinary(msg, pos, &helloMessage) != UA_STATUSCODE_GOOD) {
  211. connection->close(connection);
  212. return;
  213. }
  214. connection->state = UA_CONNECTION_ESTABLISHED;
  215. connection->remoteConf.maxChunkCount = helloMessage.maxChunkCount;
  216. connection->remoteConf.maxMessageSize = helloMessage.maxMessageSize;
  217. connection->remoteConf.protocolVersion = helloMessage.protocolVersion;
  218. connection->remoteConf.recvBufferSize = helloMessage.receiveBufferSize;
  219. if(connection->localConf.sendBufferSize > helloMessage.receiveBufferSize)
  220. connection->localConf.sendBufferSize = helloMessage.receiveBufferSize;
  221. if(connection->localConf.recvBufferSize > helloMessage.sendBufferSize)
  222. connection->localConf.recvBufferSize = helloMessage.sendBufferSize;
  223. connection->remoteConf.sendBufferSize = helloMessage.sendBufferSize;
  224. UA_TcpHelloMessage_deleteMembers(&helloMessage);
  225. /* Build acknowledge response */
  226. UA_TcpAcknowledgeMessage ackMessage;
  227. ackMessage.protocolVersion = connection->localConf.protocolVersion;
  228. ackMessage.receiveBufferSize = connection->localConf.recvBufferSize;
  229. ackMessage.sendBufferSize = connection->localConf.sendBufferSize;
  230. ackMessage.maxMessageSize = connection->localConf.maxMessageSize;
  231. ackMessage.maxChunkCount = connection->localConf.maxChunkCount;
  232. UA_TcpMessageHeader ackHeader;
  233. ackHeader.messageTypeAndChunkType = UA_MESSAGETYPE_ACK + UA_CHUNKTYPE_FINAL;
  234. ackHeader.messageSize = 8 + 20; /* ackHeader + ackMessage */
  235. UA_ByteString ack_msg;
  236. UA_ByteString_init(&ack_msg);
  237. if(connection->getSendBuffer(connection, connection->localConf.sendBufferSize, &ack_msg) != UA_STATUSCODE_GOOD)
  238. return;
  239. size_t tmpPos = 0;
  240. UA_TcpMessageHeader_encodeBinary(&ackHeader, &ack_msg, &tmpPos);
  241. UA_TcpAcknowledgeMessage_encodeBinary(&ackMessage, &ack_msg, &tmpPos);
  242. ack_msg.length = ackHeader.messageSize;
  243. connection->send(connection, &ack_msg);
  244. }
  245. /* OPN -> Open up/renew the securechannel */
  246. static void processOPN(UA_Connection *connection, UA_Server *server, const UA_ByteString *msg, size_t *pos) {
  247. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  248. connection->close(connection);
  249. return;
  250. }
  251. UA_UInt32 channelId;
  252. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, pos, &channelId);
  253. /* Opening up a channel with a channelid already set */
  254. if(!connection->channel && channelId != 0)
  255. retval |= UA_STATUSCODE_BADREQUESTTYPEINVALID;
  256. /* Renew a channel with the wrong channelid */
  257. if(connection->channel && channelId != connection->channel->securityToken.channelId)
  258. retval |= UA_STATUSCODE_BADREQUESTTYPEINVALID;
  259. UA_AsymmetricAlgorithmSecurityHeader asymHeader;
  260. retval |= UA_AsymmetricAlgorithmSecurityHeader_decodeBinary(msg, pos, &asymHeader);
  261. UA_SequenceHeader seqHeader;
  262. retval |= UA_SequenceHeader_decodeBinary(msg, pos, &seqHeader);
  263. UA_NodeId requestType;
  264. retval |= UA_NodeId_decodeBinary(msg, pos, &requestType);
  265. UA_OpenSecureChannelRequest r;
  266. retval |= UA_OpenSecureChannelRequest_decodeBinary(msg, pos, &r);
  267. if(retval != UA_STATUSCODE_GOOD || requestType.identifier.numeric != 446) {
  268. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  269. UA_NodeId_deleteMembers(&requestType);
  270. UA_OpenSecureChannelRequest_deleteMembers(&r);
  271. connection->close(connection);
  272. return;
  273. }
  274. UA_OpenSecureChannelResponse p;
  275. UA_OpenSecureChannelResponse_init(&p);
  276. Service_OpenSecureChannel(server, connection, &r, &p);
  277. UA_OpenSecureChannelRequest_deleteMembers(&r);
  278. UA_SecureChannel *channel = connection->channel;
  279. /* Opening the channel failed */
  280. if(!channel) {
  281. UA_OpenSecureChannelResponse_deleteMembers(&p);
  282. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  283. connection->close(connection);
  284. return;
  285. }
  286. /* Set the starting sequence number */
  287. channel->receiveSequenceNumber = seqHeader.sequenceNumber;
  288. /* Allocate the return message */
  289. UA_ByteString resp_msg;
  290. UA_ByteString_init(&resp_msg);
  291. retval = connection->getSendBuffer(connection, connection->localConf.sendBufferSize, &resp_msg);
  292. if(retval != UA_STATUSCODE_GOOD) {
  293. UA_OpenSecureChannelResponse_deleteMembers(&p);
  294. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  295. connection->close(connection);
  296. return;
  297. }
  298. /* Encode the message after the secureconversationmessageheader */
  299. size_t tmpPos = 12; /* skip the header */
  300. #ifndef UA_ENABLE_MULTITHREADING
  301. seqHeader.sequenceNumber = ++channel->sendSequenceNumber;
  302. #else
  303. seqHeader.sequenceNumber = uatomic_add_return(&channel->sendSequenceNumber, 1);
  304. #endif
  305. retval |= UA_AsymmetricAlgorithmSecurityHeader_encodeBinary(&asymHeader, &resp_msg, &tmpPos); // just mirror back
  306. retval |= UA_SequenceHeader_encodeBinary(&seqHeader, &resp_msg, &tmpPos);
  307. UA_NodeId responseType = UA_NODEID_NUMERIC(0, UA_NS0ID_OPENSECURECHANNELRESPONSE + UA_ENCODINGOFFSET_BINARY);
  308. retval |= UA_NodeId_encodeBinary(&responseType, &resp_msg, &tmpPos);
  309. retval |= UA_OpenSecureChannelResponse_encodeBinary(&p, &resp_msg, &tmpPos);
  310. if(retval != UA_STATUSCODE_GOOD) {
  311. connection->releaseSendBuffer(connection, &resp_msg);
  312. UA_OpenSecureChannelResponse_deleteMembers(&p);
  313. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  314. connection->close(connection);
  315. return;
  316. }
  317. /* Encode the secureconversationmessageheader */
  318. UA_SecureConversationMessageHeader respHeader;
  319. respHeader.messageHeader.messageTypeAndChunkType = UA_MESSAGETYPE_OPN + UA_CHUNKTYPE_FINAL;
  320. respHeader.messageHeader.messageSize = (UA_UInt32)tmpPos;
  321. respHeader.secureChannelId = p.securityToken.channelId;
  322. tmpPos = 0;
  323. UA_SecureConversationMessageHeader_encodeBinary(&respHeader, &resp_msg, &tmpPos);
  324. resp_msg.length = respHeader.messageHeader.messageSize;
  325. connection->send(connection, &resp_msg);
  326. /* Clean up */
  327. UA_OpenSecureChannelResponse_deleteMembers(&p);
  328. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  329. }
  330. static void
  331. processRequest(UA_SecureChannel *channel, UA_Server *server, UA_UInt32 requestId, const UA_ByteString *msg) {
  332. /* At 0, the nodeid starts... */
  333. size_t ppos = 0;
  334. size_t *pos = &ppos;
  335. /* Decode the nodeid */
  336. UA_NodeId requestTypeId;
  337. UA_StatusCode retval = UA_NodeId_decodeBinary(msg, pos, &requestTypeId);
  338. if(retval != UA_STATUSCODE_GOOD)
  339. return;
  340. /* Store the start-position of the request */
  341. size_t requestPos = *pos;
  342. /* Test if the service type nodeid has the right format */
  343. if(requestTypeId.identifierType != UA_NODEIDTYPE_NUMERIC ||
  344. requestTypeId.namespaceIndex != 0) {
  345. UA_NodeId_deleteMembers(&requestTypeId);
  346. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel, "Received a non-numeric message type NodeId");
  347. sendError(channel, msg, requestPos, &UA_TYPES[UA_TYPES_SERVICEFAULT], requestId, UA_STATUSCODE_BADSERVICEUNSUPPORTED);
  348. }
  349. /* Get the service pointers */
  350. UA_Service service = NULL;
  351. const UA_DataType *requestType = NULL;
  352. const UA_DataType *responseType = NULL;
  353. UA_Boolean sessionRequired = true;
  354. getServicePointers(requestTypeId.identifier.numeric, &requestType, &responseType, &service, &sessionRequired);
  355. if(!requestType) {
  356. if(requestTypeId.identifier.numeric == 787) {
  357. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  358. "Client requested a subscription, but those are not enabled in the build");
  359. } else {
  360. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Unknown request %i",
  361. requestTypeId.identifier.numeric - UA_ENCODINGOFFSET_BINARY);
  362. }
  363. sendError(channel, msg, requestPos, &UA_TYPES[UA_TYPES_SERVICEFAULT], requestId, UA_STATUSCODE_BADSERVICEUNSUPPORTED);
  364. return;
  365. }
  366. UA_assert(responseType);
  367. #ifdef UA_ENABLE_NONSTANDARD_STATELESS
  368. /* Stateless extension: Sessions are optional */
  369. sessionRequired = false;
  370. #endif
  371. /* Decode the request */
  372. void *request = UA_alloca(requestType->memSize);
  373. UA_RequestHeader *requestHeader = (UA_RequestHeader*)request;
  374. retval = UA_decodeBinary(msg, pos, request, requestType);
  375. if(retval != UA_STATUSCODE_GOOD) {
  376. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel, "Could not decode the request");
  377. sendError(channel, msg, requestPos, responseType, requestId, retval);
  378. return;
  379. }
  380. /* Prepare the respone */
  381. void *response = UA_alloca(responseType->memSize);
  382. UA_init(response, responseType);
  383. /* CreateSession doesn't need a session */
  384. if(requestType == &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST]) {
  385. Service_CreateSession(server, channel, request, response);
  386. goto send_response;
  387. }
  388. /* Find the matching session */
  389. UA_Session *session = UA_SecureChannel_getSession(channel, &requestHeader->authenticationToken);
  390. if(!session)
  391. session = UA_SessionManager_getSession(&server->sessionManager, &requestHeader->authenticationToken);
  392. if(requestType == &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST]) {
  393. if(!session) {
  394. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel, "Trying to activate a session that is not known in the server");
  395. sendError(channel, msg, requestPos, responseType, requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  396. UA_deleteMembers(request, requestType);
  397. return;
  398. }
  399. Service_ActivateSession(server, channel, session, request, response);
  400. goto send_response;
  401. }
  402. /* Set an anonymous, inactive session for services that need no session */
  403. UA_Session anonymousSession;
  404. if(!session) {
  405. if(sessionRequired) {
  406. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Service request %i without a valid session",
  407. requestTypeId.identifier.numeric - UA_ENCODINGOFFSET_BINARY);
  408. sendError(channel, msg, requestPos, responseType, requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  409. UA_deleteMembers(request, requestType);
  410. return;
  411. }
  412. UA_Session_init(&anonymousSession);
  413. anonymousSession.sessionId = UA_NODEID_NUMERIC(0,0);
  414. anonymousSession.channel = channel;
  415. session = &anonymousSession;
  416. }
  417. /* Trying to use a non-activated session? */
  418. if(!session->activated && sessionRequired) {
  419. UA_LOG_INFO_SESSION(server->config.logger, session, "Calling service %i on a non-activated session",
  420. requestTypeId.identifier.numeric - UA_ENCODINGOFFSET_BINARY);
  421. sendError(channel, msg, requestPos, responseType, requestId, UA_STATUSCODE_BADSESSIONNOTACTIVATED);
  422. UA_SessionManager_removeSession(&server->sessionManager, &session->authenticationToken);
  423. UA_deleteMembers(request, requestType);
  424. return;
  425. }
  426. /* The session is bound to another channel */
  427. if(session->channel != channel) {
  428. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel, "Client tries to use an obsolete securechannel");
  429. sendError(channel, msg, requestPos, responseType, requestId, UA_STATUSCODE_BADSECURECHANNELIDINVALID);
  430. UA_deleteMembers(request, requestType);
  431. return;
  432. }
  433. /* Update the session lifetime */
  434. UA_Session_updateLifetime(session);
  435. #ifdef UA_ENABLE_SUBSCRIPTIONS
  436. /* The publish request is not answered immediately */
  437. if(requestType == &UA_TYPES[UA_TYPES_PUBLISHREQUEST]) {
  438. Service_Publish(server, session, request, requestId);
  439. UA_deleteMembers(request, requestType);
  440. return;
  441. }
  442. #endif
  443. /* Call the service */
  444. service(server, session, request, response);
  445. send_response:
  446. /* Send the response */
  447. init_response_header(request, response);
  448. retval = UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  449. if(retval != UA_STATUSCODE_GOOD) {
  450. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel, "Could not send the message over "
  451. "the SecureChannel with error code 0x%08x", retval);
  452. sendError(channel, msg, requestPos, &UA_TYPES[UA_TYPES_SERVICEFAULT], requestId, retval);
  453. }
  454. /* Clean up */
  455. UA_deleteMembers(request, requestType);
  456. UA_deleteMembers(response, responseType);
  457. }
  458. /* MSG -> Normal request */
  459. static void
  460. processMSG(UA_Connection *connection, UA_Server *server, const UA_TcpMessageHeader *messageHeader,
  461. const UA_ByteString *msg, size_t *pos) {
  462. /* Decode the header */
  463. UA_UInt32 channelId = 0;
  464. UA_UInt32 tokenId = 0;
  465. UA_SequenceHeader sequenceHeader;
  466. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, pos, &channelId);
  467. retval |= UA_UInt32_decodeBinary(msg, pos, &tokenId);
  468. retval |= UA_SequenceHeader_decodeBinary(msg, pos, &sequenceHeader);
  469. if(retval != UA_STATUSCODE_GOOD)
  470. return;
  471. /* Get the SecureChannel */
  472. UA_SecureChannel *channel = connection->channel;
  473. UA_SecureChannel anonymousChannel; /* use if no channel specified */
  474. if(!channel) {
  475. UA_SecureChannel_init(&anonymousChannel);
  476. anonymousChannel.connection = connection;
  477. channel = &anonymousChannel;
  478. }
  479. /* Is the channel attached to connection? */
  480. if(channelId != channel->securityToken.channelId) {
  481. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  482. "Connection %i | Received MSG with the channel id %i not bound to the connection",
  483. connection->sockfd, channelId);
  484. Service_CloseSecureChannel(server, channel);
  485. connection->close(connection);
  486. return;
  487. }
  488. /* Does the sequence number match? */
  489. if(sequenceHeader.sequenceNumber != channel->receiveSequenceNumber + 1) {
  490. if(channel->receiveSequenceNumber + 1 > 4294966271 && sequenceHeader.sequenceNumber < 1024) {
  491. channel->receiveSequenceNumber = sequenceHeader.sequenceNumber - 1; /* Roll over */
  492. } else {
  493. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  494. "The sequence number was not increased by one. Got %i, expected %i",
  495. sequenceHeader.sequenceNumber, channel->receiveSequenceNumber + 1);
  496. sendError(channel, msg, *pos, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  497. sequenceHeader.requestId, UA_STATUSCODE_BADSECURITYCHECKSFAILED);
  498. return;
  499. }
  500. }
  501. channel->receiveSequenceNumber++;
  502. /* Does the token match? */
  503. if(tokenId != channel->securityToken.tokenId) {
  504. if(tokenId != channel->nextSecurityToken.tokenId) {
  505. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  506. "Request with a wrong security token. Closing the SecureChannel.");
  507. Service_CloseSecureChannel(server, channel);
  508. connection->close(connection);
  509. return;
  510. }
  511. UA_SecureChannel_revolveTokens(channel);
  512. }
  513. /* Process chunk to get complete request */
  514. UA_Boolean deleteRequest = false;
  515. UA_ByteString request = processChunk(channel, server, messageHeader, sequenceHeader.requestId,
  516. msg, *pos, messageHeader->messageSize - 24, &deleteRequest);
  517. *pos += (messageHeader->messageSize - 24);
  518. if(request.length > 0) {
  519. /* Process the request */
  520. processRequest(channel, server, sequenceHeader.requestId, &request);
  521. if(deleteRequest)
  522. UA_ByteString_deleteMembers(&request);
  523. }
  524. /* Clean up a possible anonymous channel */
  525. if(channel == &anonymousChannel)
  526. UA_SecureChannel_deleteMembersCleanup(channel);
  527. }
  528. /* CLO -> Close the secure channel */
  529. static void
  530. processCLO(UA_Connection *connection, UA_Server *server, const UA_ByteString *msg, size_t *pos) {
  531. UA_UInt32 channelId;
  532. UA_UInt32 tokenId = 0;
  533. UA_SequenceHeader sequenceHeader;
  534. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, pos, &channelId);
  535. retval |= UA_UInt32_decodeBinary(msg, pos, &tokenId);
  536. retval |= UA_SequenceHeader_decodeBinary(msg, pos, &sequenceHeader);
  537. if(retval != UA_STATUSCODE_GOOD)
  538. return;
  539. UA_SecureChannel *channel = connection->channel;
  540. if(!channel || channel->securityToken.channelId != channelId ||
  541. channel->securityToken.tokenId != tokenId)
  542. return;
  543. if(sequenceHeader.sequenceNumber != channel->receiveSequenceNumber + 1)
  544. return;
  545. Service_CloseSecureChannel(server, connection->channel);
  546. }
  547. /* Process binary message received from Connection dose not modify UA_ByteString
  548. * you have to free it youself. use of connection->getSendBuffer() and
  549. * connection->send() to answer Message */
  550. void UA_Server_processBinaryMessage(UA_Server *server, UA_Connection *connection, const UA_ByteString *msg) {
  551. size_t pos = 0;
  552. UA_TcpMessageHeader tcpMessageHeader;
  553. do {
  554. /* Decode the message header */
  555. UA_StatusCode retval = UA_TcpMessageHeader_decodeBinary(msg, &pos, &tcpMessageHeader);
  556. if(retval != UA_STATUSCODE_GOOD) {
  557. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  558. "Decoding of message header failed on Connection %i", connection->sockfd);
  559. connection->close(connection);
  560. break;
  561. }
  562. if(tcpMessageHeader.messageSize < 16) {
  563. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  564. "The message is suspiciously small on Connection %i", connection->sockfd);
  565. connection->close(connection);
  566. break;
  567. }
  568. /* Set the expected position after processing the chunk */
  569. size_t targetpos = pos - 8 + tcpMessageHeader.messageSize;
  570. /* Process the message */
  571. switch(tcpMessageHeader.messageTypeAndChunkType & 0x00ffffff) {
  572. case UA_MESSAGETYPE_HEL:
  573. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK, "Connection %i | Process a HEL", connection->sockfd);
  574. processHEL(connection, msg, &pos);
  575. break;
  576. case UA_MESSAGETYPE_OPN:
  577. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK, "Connection %i | Process a OPN", connection->sockfd);
  578. processOPN(connection, server, msg, &pos);
  579. break;
  580. case UA_MESSAGETYPE_MSG:
  581. #ifndef UA_ENABLE_NONSTANDARD_STATELESS
  582. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  583. UA_LOG_DEBUG(server->config.logger, UA_LOGCATEGORY_NETWORK,
  584. "Connection %i | Received a MSG, but the connection is not established", connection->sockfd);
  585. connection->close(connection);
  586. return;
  587. }
  588. #endif
  589. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK, "Connection %i | Process a MSG", connection->sockfd);
  590. processMSG(connection, server, &tcpMessageHeader, msg, &pos);
  591. break;
  592. case UA_MESSAGETYPE_CLO:
  593. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK, "Connection %i | Process a CLO", connection->sockfd);
  594. processCLO(connection, server, msg, &pos);
  595. return;
  596. default:
  597. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK, "Connection %i | Unknown request type", connection->sockfd);
  598. }
  599. /* Loop to process the next message in the stream */
  600. if(pos != targetpos) {
  601. UA_LOG_DEBUG(server->config.logger, UA_LOGCATEGORY_NETWORK, "Connection %i | Message was not entirely processed. "
  602. "Skip from position %i to position %i; message length is %i", connection->sockfd, pos, targetpos,
  603. msg->length);
  604. pos = targetpos;
  605. }
  606. } while(msg->length > pos);
  607. }