server_basic128rsa15.c 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. /* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  2. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information. */
  3. #include <signal.h>
  4. #include <stdio.h>
  5. #include <errno.h>
  6. #include <open62541.h>
  7. #include "open62541.h"
  8. static UA_ByteString loadFile(const char *const path) {
  9. UA_ByteString fileContents = UA_STRING_NULL;
  10. /* Open the file */
  11. FILE *fp = fopen(path, "rb");
  12. if(!fp) {
  13. errno = 0; /* We read errno also from the tcp layer... */
  14. return fileContents;
  15. }
  16. /* Get the file length, allocate the data and read */
  17. fseek(fp, 0, SEEK_END);
  18. fileContents.length = (size_t)ftell(fp);
  19. fileContents.data = (UA_Byte*)UA_malloc(fileContents.length * sizeof(UA_Byte));
  20. if(fileContents.data) {
  21. fseek(fp, 0, SEEK_SET);
  22. size_t read = fread(fileContents.data, sizeof(UA_Byte), fileContents.length, fp);
  23. if(read != fileContents.length)
  24. UA_ByteString_deleteMembers(&fileContents);
  25. }
  26. fclose(fp);
  27. return fileContents;
  28. }
  29. UA_Boolean running = true;
  30. static void stopHandler(int sig) {
  31. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND, "received ctrl-c");
  32. running = false;
  33. }
  34. int main(int argc, char* argv[]) {
  35. signal(SIGINT, stopHandler);
  36. signal(SIGTERM, stopHandler);
  37. if(argc < 3) {
  38. UA_LOG_FATAL(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  39. "Missing arguments. Arguments are "
  40. "<server-certificate.der> <private-key.der> "
  41. "[<trustlist1.crl>, ...]");
  42. return 1;
  43. }
  44. /* Load certificate and private key */
  45. UA_ByteString certificate = loadFile(argv[1]);
  46. UA_ByteString privateKey = loadFile(argv[2]);
  47. /* Load the trustlist */
  48. UA_ByteString *trustList = NULL;
  49. size_t trustListSize = 0;
  50. if(argc > 3) {
  51. trustListSize = (size_t)argc-3;
  52. trustList = (UA_ByteString*)
  53. UA_alloca(sizeof(UA_ByteString) * trustListSize);
  54. for(size_t i = 0; i < trustListSize; i++)
  55. trustList[i] = loadFile(argv[i+3]);
  56. }
  57. /* Loading of a revocation list currentlu unsupported */
  58. UA_ByteString *revocationList = NULL;
  59. size_t revocationListSize = 0;
  60. UA_ServerConfig *config =
  61. UA_ServerConfig_new_basic128rsa15(4840, &certificate, &privateKey,
  62. trustList, trustListSize,
  63. revocationList, revocationListSize);
  64. UA_ByteString_deleteMembers(&certificate);
  65. UA_ByteString_deleteMembers(&privateKey);
  66. for(size_t i = 0; i < trustListSize; i++)
  67. UA_ByteString_deleteMembers(&trustList[i]);
  68. if(!config) {
  69. UA_LOG_FATAL(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  70. "Could not create the server config");
  71. return 1;
  72. }
  73. UA_Server *server = UA_Server_new(config);
  74. UA_StatusCode retval = UA_Server_run(server, &running);
  75. UA_Server_delete(server);
  76. UA_ServerConfig_delete(config);
  77. return (int)retval;
  78. }