ua_server_binary.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388
  1. #include "ua_util.h"
  2. #include "ua_server_internal.h"
  3. #include "ua_types_encoding_binary.h"
  4. #include "ua_transport_generated.h"
  5. #include "ua_services.h"
  6. #include "ua_statuscodes.h"
  7. #include "ua_securechannel_manager.h"
  8. #include "ua_session_manager.h"
  9. #include "ua_nodeids.h"
  10. /** Max size of messages that are allocated on the stack */
  11. #define MAX_STACK_MESSAGE 65536
  12. static void processHEL(UA_Connection *connection, const UA_ByteString *msg, size_t *pos) {
  13. UA_TcpHelloMessage helloMessage;
  14. if(UA_TcpHelloMessage_decodeBinary(msg, pos, &helloMessage) != UA_STATUSCODE_GOOD) {
  15. connection->close(connection);
  16. return;
  17. }
  18. connection->remoteConf.maxChunkCount = helloMessage.maxChunkCount;
  19. connection->remoteConf.maxMessageSize = helloMessage.maxMessageSize;
  20. connection->remoteConf.protocolVersion = helloMessage.protocolVersion;
  21. connection->remoteConf.recvBufferSize = helloMessage.receiveBufferSize;
  22. if(connection->localConf.sendBufferSize > helloMessage.receiveBufferSize)
  23. connection->localConf.sendBufferSize = helloMessage.receiveBufferSize;
  24. if(connection->localConf.recvBufferSize > helloMessage.sendBufferSize)
  25. connection->localConf.recvBufferSize = helloMessage.sendBufferSize;
  26. connection->remoteConf.sendBufferSize = helloMessage.sendBufferSize;
  27. connection->state = UA_CONNECTION_ESTABLISHED;
  28. UA_TcpHelloMessage_deleteMembers(&helloMessage);
  29. // build acknowledge response
  30. UA_TcpAcknowledgeMessage ackMessage;
  31. ackMessage.protocolVersion = connection->localConf.protocolVersion;
  32. ackMessage.receiveBufferSize = connection->localConf.recvBufferSize;
  33. ackMessage.sendBufferSize = connection->localConf.sendBufferSize;
  34. ackMessage.maxMessageSize = connection->localConf.maxMessageSize;
  35. ackMessage.maxChunkCount = connection->localConf.maxChunkCount;
  36. UA_TcpMessageHeader ackHeader;
  37. ackHeader.messageTypeAndFinal = UA_MESSAGETYPEANDFINAL_ACKF;
  38. ackHeader.messageSize = UA_TcpMessageHeader_calcSizeBinary(&ackHeader)
  39. + UA_TcpAcknowledgeMessage_calcSizeBinary(&ackMessage);
  40. UA_ByteString ack_msg;
  41. if(connection->getBuffer(connection, &ack_msg, ackHeader.messageSize) != UA_STATUSCODE_GOOD)
  42. return;
  43. size_t tmpPos = 0;
  44. UA_TcpMessageHeader_encodeBinary(&ackHeader, &ack_msg, &tmpPos);
  45. UA_TcpAcknowledgeMessage_encodeBinary(&ackMessage, &ack_msg, &tmpPos);
  46. if(connection->write(connection, &ack_msg, ackHeader.messageSize) != UA_STATUSCODE_GOOD)
  47. connection->releaseBuffer(connection, &ack_msg);
  48. }
  49. static void processOPN(UA_Connection *connection, UA_Server *server, const UA_ByteString *msg,
  50. size_t *pos) {
  51. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  52. connection->close(connection);
  53. return;
  54. }
  55. UA_UInt32 secureChannelId;
  56. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, pos, &secureChannelId);
  57. UA_AsymmetricAlgorithmSecurityHeader asymHeader;
  58. retval |= UA_AsymmetricAlgorithmSecurityHeader_decodeBinary(msg, pos, &asymHeader);
  59. UA_SequenceHeader seqHeader;
  60. retval |= UA_SequenceHeader_decodeBinary(msg, pos, &seqHeader);
  61. UA_NodeId requestType;
  62. retval |= UA_NodeId_decodeBinary(msg, pos, &requestType);
  63. UA_OpenSecureChannelRequest r;
  64. retval |= UA_OpenSecureChannelRequest_decodeBinary(msg, pos, &r);
  65. if(retval != UA_STATUSCODE_GOOD || requestType.identifier.numeric != 446) {
  66. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  67. UA_SequenceHeader_deleteMembers(&seqHeader);
  68. UA_NodeId_deleteMembers(&requestType);
  69. UA_OpenSecureChannelRequest_deleteMembers(&r);
  70. connection->close(connection);
  71. return;
  72. }
  73. UA_OpenSecureChannelResponse p;
  74. UA_OpenSecureChannelResponse_init(&p);
  75. Service_OpenSecureChannel(server, connection, &r, &p);
  76. UA_OpenSecureChannelRequest_deleteMembers(&r);
  77. UA_SecureChannel *channel = connection->channel;
  78. if(!channel) {
  79. connection->close(connection);
  80. UA_OpenSecureChannelResponse_deleteMembers(&p);
  81. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  82. return;
  83. }
  84. /* send the response with an asymmetric security header */
  85. seqHeader.sequenceNumber = channel->sequenceNumber;
  86. UA_SecureConversationMessageHeader respHeader;
  87. respHeader.messageHeader.messageTypeAndFinal = UA_MESSAGETYPEANDFINAL_OPNF;
  88. respHeader.messageHeader.messageSize = 0;
  89. respHeader.secureChannelId = p.securityToken.channelId;
  90. UA_NodeId responseType = UA_NODEID_NUMERIC(0, UA_NS0ID_OPENSECURECHANNELRESPONSE +
  91. UA_ENCODINGOFFSET_BINARY);
  92. respHeader.messageHeader.messageSize =
  93. UA_SecureConversationMessageHeader_calcSizeBinary(&respHeader)
  94. + UA_AsymmetricAlgorithmSecurityHeader_calcSizeBinary(&asymHeader)
  95. + UA_SequenceHeader_calcSizeBinary(&seqHeader)
  96. + UA_NodeId_calcSizeBinary(&responseType)
  97. + UA_OpenSecureChannelResponse_calcSizeBinary(&p);
  98. UA_ByteString resp_msg;
  99. retval = connection->getBuffer(connection, &resp_msg, respHeader.messageHeader.messageSize);
  100. if(retval != UA_STATUSCODE_GOOD) {
  101. UA_OpenSecureChannelResponse_deleteMembers(&p);
  102. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  103. return;
  104. }
  105. size_t tmpPos = 0;
  106. UA_SecureConversationMessageHeader_encodeBinary(&respHeader, &resp_msg, &tmpPos);
  107. UA_AsymmetricAlgorithmSecurityHeader_encodeBinary(&asymHeader, &resp_msg, &tmpPos); // just mirror back
  108. UA_SequenceHeader_encodeBinary(&seqHeader, &resp_msg, &tmpPos); // just mirror back
  109. UA_NodeId_encodeBinary(&responseType, &resp_msg, &tmpPos);
  110. UA_OpenSecureChannelResponse_encodeBinary(&p, &resp_msg, &tmpPos);
  111. UA_OpenSecureChannelResponse_deleteMembers(&p);
  112. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  113. if(connection->write(connection, &resp_msg,
  114. respHeader.messageHeader.messageSize) != UA_STATUSCODE_GOOD)
  115. connection->releaseBuffer(connection, &resp_msg);
  116. }
  117. static void init_response_header(const UA_RequestHeader *p, UA_ResponseHeader *r) {
  118. r->requestHandle = p->requestHandle;
  119. r->stringTableSize = 0;
  120. r->timestamp = UA_DateTime_now();
  121. }
  122. /* The request/response are casted to the header (first element of their struct) */
  123. static void invoke_service(UA_Server *server, UA_SecureChannel *channel,
  124. UA_UInt32 requestId, UA_RequestHeader *request, const UA_DataType *responseType,
  125. void (*service)(UA_Server*, UA_Session*, void*, void*)) {
  126. UA_ResponseHeader *response = UA_alloca(responseType->memSize);
  127. UA_init(response, responseType);
  128. init_response_header(request, response);
  129. /* try to get the session from the securechannel first */
  130. UA_Session *session = UA_SecureChannel_getSession(channel, &request->authenticationToken);
  131. if(!session)
  132. session = UA_SessionManager_getSession(&server->sessionManager, &request->authenticationToken);
  133. if(!session)
  134. response->serviceResult = UA_STATUSCODE_BADSESSIONIDINVALID;
  135. else if(session->activated == UA_FALSE) {
  136. response->serviceResult = UA_STATUSCODE_BADSESSIONNOTACTIVATED;
  137. /* the session is invalidated FIXME: do this delayed*/
  138. UA_SessionManager_removeSession(&server->sessionManager, &request->authenticationToken);
  139. } else if(session->channel != channel) {
  140. response->serviceResult = UA_STATUSCODE_BADSESSIONIDINVALID;
  141. } else {
  142. UA_Session_updateLifetime(session);
  143. service(server, session, request, response);
  144. }
  145. UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  146. UA_deleteMembers(response, responseType);
  147. }
  148. #define INVOKE_SERVICE(REQUEST, RESPONSETYPE) do { \
  149. UA_##REQUEST##Request p; \
  150. if(UA_##REQUEST##Request_decodeBinary(msg, pos, &p)) \
  151. return; \
  152. invoke_service(server, clientChannel, sequenceHeader.requestId, \
  153. &p.requestHeader, &UA_TYPES[RESPONSETYPE], \
  154. (void (*)(UA_Server*, UA_Session*, void*,void*))Service_##REQUEST); \
  155. UA_##REQUEST##Request_deleteMembers(&p); \
  156. } while(0)
  157. static void processMSG(UA_Connection *connection, UA_Server *server, const UA_ByteString *msg, size_t *pos) {
  158. /* Read in the securechannel */
  159. UA_UInt32 secureChannelId;
  160. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, pos, &secureChannelId);
  161. if(retval != UA_STATUSCODE_GOOD)
  162. return;
  163. /* the anonymous channel is used e.g. to allow getEndpoints without a channel */
  164. UA_SecureChannel *clientChannel = connection->channel;
  165. UA_SecureChannel anonymousChannel;
  166. if(!clientChannel) {
  167. UA_SecureChannel_init(&anonymousChannel);
  168. anonymousChannel.connection = connection;
  169. clientChannel = &anonymousChannel;
  170. #ifdef EXTENSION_STATELESS
  171. anonymousChannel.session = &anonymousSession;
  172. #endif
  173. }
  174. /* Read the security header */
  175. UA_UInt32 tokenId;
  176. UA_SequenceHeader sequenceHeader;
  177. retval = UA_UInt32_decodeBinary(msg, pos, &tokenId);
  178. retval |= UA_SequenceHeader_decodeBinary(msg, pos, &sequenceHeader);
  179. if(retval != UA_STATUSCODE_GOOD)
  180. return;
  181. /* Read the request type */
  182. UA_NodeId requestType;
  183. if(UA_NodeId_decodeBinary(msg, pos, &requestType) != UA_STATUSCODE_GOOD)
  184. return;
  185. if(requestType.identifierType != UA_NODEIDTYPE_NUMERIC) {
  186. UA_NodeId_deleteMembers(&requestType);
  187. return;
  188. }
  189. switch(requestType.identifier.numeric - UA_ENCODINGOFFSET_BINARY) {
  190. case UA_NS0ID_GETENDPOINTSREQUEST: {
  191. UA_GetEndpointsRequest p;
  192. UA_GetEndpointsResponse r;
  193. if(UA_GetEndpointsRequest_decodeBinary(msg, pos, &p))
  194. return;
  195. UA_GetEndpointsResponse_init(&r);
  196. init_response_header(&p.requestHeader, &r.responseHeader);
  197. Service_GetEndpoints(server, &p, &r);
  198. UA_GetEndpointsRequest_deleteMembers(&p);
  199. UA_SecureChannel_sendBinaryMessage(clientChannel, sequenceHeader.requestId, &r,
  200. &UA_TYPES[UA_TYPES_GETENDPOINTSRESPONSE]);
  201. UA_GetEndpointsResponse_deleteMembers(&r);
  202. break;
  203. }
  204. case UA_NS0ID_FINDSERVERSREQUEST: {
  205. UA_FindServersRequest p;
  206. UA_FindServersResponse r;
  207. if(UA_FindServersRequest_decodeBinary(msg, pos, &p))
  208. return;
  209. UA_FindServersResponse_init(&r);
  210. init_response_header(&p.requestHeader, &r.responseHeader);
  211. Service_FindServers(server, &p, &r);
  212. UA_FindServersRequest_deleteMembers(&p);
  213. UA_SecureChannel_sendBinaryMessage(clientChannel, sequenceHeader.requestId, &r,
  214. &UA_TYPES[UA_TYPES_FINDSERVERSRESPONSE]);
  215. UA_FindServersResponse_deleteMembers(&r);
  216. break;
  217. }
  218. case UA_NS0ID_CREATESESSIONREQUEST: {
  219. UA_CreateSessionRequest p;
  220. UA_CreateSessionResponse r;
  221. if(UA_CreateSessionRequest_decodeBinary(msg, pos, &p))
  222. return;
  223. UA_CreateSessionResponse_init(&r);
  224. init_response_header(&p.requestHeader, &r.responseHeader);
  225. Service_CreateSession(server, clientChannel, &p, &r);
  226. UA_CreateSessionRequest_deleteMembers(&p);
  227. UA_SecureChannel_sendBinaryMessage(clientChannel, sequenceHeader.requestId, &r,
  228. &UA_TYPES[UA_TYPES_CREATESESSIONRESPONSE]);
  229. UA_CreateSessionResponse_deleteMembers(&r);
  230. break;
  231. }
  232. case UA_NS0ID_ACTIVATESESSIONREQUEST: {
  233. UA_ActivateSessionRequest p;
  234. UA_ActivateSessionResponse r;
  235. if(UA_ActivateSessionRequest_decodeBinary(msg, pos, &p))
  236. return;
  237. UA_ActivateSessionResponse_init(&r);
  238. init_response_header(&p.requestHeader, &r.responseHeader);
  239. Service_ActivateSession(server, clientChannel, &p, &r);
  240. UA_ActivateSessionRequest_deleteMembers(&p);
  241. UA_SecureChannel_sendBinaryMessage(clientChannel, sequenceHeader.requestId, &r,
  242. &UA_TYPES[UA_TYPES_ACTIVATESESSIONRESPONSE]);
  243. UA_ActivateSessionResponse_deleteMembers(&r);
  244. break;
  245. }
  246. case UA_NS0ID_CLOSESESSIONREQUEST:
  247. INVOKE_SERVICE(CloseSession, UA_TYPES_CLOSESESSIONRESPONSE);
  248. break;
  249. case UA_NS0ID_READREQUEST:
  250. INVOKE_SERVICE(Read, UA_TYPES_READRESPONSE);
  251. break;
  252. case UA_NS0ID_WRITEREQUEST:
  253. INVOKE_SERVICE(Write, UA_TYPES_WRITERESPONSE);
  254. break;
  255. case UA_NS0ID_BROWSEREQUEST:
  256. INVOKE_SERVICE(Browse, UA_TYPES_BROWSERESPONSE);
  257. break;
  258. case UA_NS0ID_BROWSENEXTREQUEST:
  259. INVOKE_SERVICE(BrowseNext, UA_TYPES_BROWSENEXTRESPONSE);
  260. break;
  261. case UA_NS0ID_ADDREFERENCESREQUEST:
  262. INVOKE_SERVICE(AddReferences, UA_TYPES_ADDREFERENCESRESPONSE);
  263. break;
  264. case UA_NS0ID_REGISTERNODESREQUEST:
  265. INVOKE_SERVICE(RegisterNodes, UA_TYPES_REGISTERNODESRESPONSE);
  266. break;
  267. case UA_NS0ID_UNREGISTERNODESREQUEST:
  268. INVOKE_SERVICE(UnregisterNodes, UA_TYPES_UNREGISTERNODESRESPONSE);
  269. break;
  270. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST:
  271. INVOKE_SERVICE(TranslateBrowsePathsToNodeIds, UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSRESPONSE);
  272. break;
  273. default: {
  274. if(requestType.namespaceIndex == 0 && requestType.identifier.numeric==787)
  275. UA_LOG_INFO(server->logger, UA_LOGCATEGORY_COMMUNICATION,
  276. "Client requested a subscription that are not supported, the message will be skipped");
  277. else
  278. UA_LOG_INFO(server->logger, UA_LOGCATEGORY_COMMUNICATION, "Unknown request: NodeId(ns=%d, i=%d)",
  279. requestType.namespaceIndex, requestType.identifier.numeric);
  280. UA_RequestHeader p;
  281. UA_ResponseHeader r;
  282. if(UA_RequestHeader_decodeBinary(msg, pos, &p) != UA_STATUSCODE_GOOD)
  283. return;
  284. UA_ResponseHeader_init(&r);
  285. init_response_header(&p, &r);
  286. r.serviceResult = UA_STATUSCODE_BADSERVICEUNSUPPORTED;
  287. #ifdef EXTENSION_STATELESS
  288. if(retval != UA_STATUSCODE_GOOD)
  289. r.serviceResult = retval;
  290. #endif
  291. UA_RequestHeader_deleteMembers(&p);
  292. UA_SecureChannel_sendBinaryMessage(clientChannel, sequenceHeader.requestId,
  293. &r, &UA_TYPES[UA_TYPES_RESPONSEHEADER]);
  294. break;
  295. }
  296. }
  297. }
  298. static void processCLO(UA_Connection *connection, UA_Server *server, const UA_ByteString *msg, size_t *pos) {
  299. UA_UInt32 secureChannelId;
  300. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, pos, &secureChannelId);
  301. if(retval != UA_STATUSCODE_GOOD || !connection->channel ||
  302. connection->channel->securityToken.channelId != secureChannelId)
  303. return;
  304. Service_CloseSecureChannel(server, secureChannelId);
  305. }
  306. void UA_Server_processBinaryMessage(UA_Server *server, UA_Connection *connection, UA_ByteString *msg) {
  307. if(msg->length <= 0)
  308. return;
  309. size_t pos = 0;
  310. UA_TcpMessageHeader tcpMessageHeader;
  311. do {
  312. if(UA_TcpMessageHeader_decodeBinary(msg, &pos, &tcpMessageHeader)) {
  313. UA_LOG_INFO(server->logger, UA_LOGCATEGORY_COMMUNICATION, "Decoding of message header failed");
  314. connection->close(connection);
  315. break;
  316. }
  317. size_t targetpos = pos - 8 + tcpMessageHeader.messageSize;
  318. switch(tcpMessageHeader.messageTypeAndFinal & 0xffffff) {
  319. case UA_MESSAGETYPEANDFINAL_HELF & 0xffffff:
  320. processHEL(connection, msg, &pos);
  321. break;
  322. case UA_MESSAGETYPEANDFINAL_OPNF & 0xffffff:
  323. processOPN(connection, server, msg, &pos);
  324. break;
  325. case UA_MESSAGETYPEANDFINAL_MSGF & 0xffffff:
  326. #ifndef EXTENSION_STATELESS
  327. if(connection->state != UA_CONNECTION_ESTABLISHED)
  328. connection->close(connection);
  329. else
  330. #endif
  331. processMSG(connection, server, msg, &pos);
  332. break;
  333. case UA_MESSAGETYPEANDFINAL_CLOF & 0xffffff:
  334. processCLO(connection, server, msg, &pos);
  335. connection->close(connection);
  336. UA_ByteString_deleteMembers(msg);
  337. return;
  338. }
  339. UA_TcpMessageHeader_deleteMembers(&tcpMessageHeader);
  340. if(pos != targetpos) {
  341. UA_LOG_INFO(server->logger, UA_LOGCATEGORY_COMMUNICATION,
  342. "The message was not entirely processed, skipping to the end");
  343. pos = targetpos;
  344. }
  345. } while(msg->length > (UA_Int32)pos);
  346. UA_ByteString_deleteMembers(msg);
  347. }