123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660 |
- /* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
- * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
- *
- * Copyright 2017 (c) Fraunhofer IOSB (Author: Julius Pfrommer)
- * Copyright 2017 (c) Julian Grothoff
- * Copyright 2017-2018 (c) Mark Giraud, Fraunhofer IOSB
- * Copyright 2017 (c) Stefan Profanter, fortiss GmbH
- * Copyright 2017 (c) Thomas Stalder, Blue Time Concept SA
- * Copyright 2018 (c) Daniel Feist, Precitec GmbH & Co. KG
- */
- #include "ua_plugin_securitypolicy.h"
- #include "ua_config_default.h"
- #include "ua_client_config.h"
- #include "ua_log_stdout.h"
- #include "ua_network_tcp.h"
- #include "ua_accesscontrol_default.h"
- #include "ua_pki_certificate.h"
- #include "ua_nodestore_default.h"
- #include "ua_securitypolicy_none.h"
- #ifdef UA_ENABLE_ENCRYPTION
- #include "ua_securitypolicy_basic128rsa15.h"
- #include "ua_securitypolicy_basic256sha256.h"
- #endif
- /* Struct initialization works across ANSI C/C99/C++ if it is done when the
- * variable is first declared. Assigning values to existing structs is
- * heterogeneous across the three. */
- static UA_INLINE UA_UInt32Range
- UA_UINT32RANGE(UA_UInt32 min, UA_UInt32 max) {
- UA_UInt32Range range = {min, max};
- return range;
- }
- static UA_INLINE UA_DurationRange
- UA_DURATIONRANGE(UA_Duration min, UA_Duration max) {
- UA_DurationRange range = {min, max};
- return range;
- }
- /*******************************/
- /* Default Connection Settings */
- /*******************************/
- const UA_ConnectionConfig UA_ConnectionConfig_default = {
- 0, /* .protocolVersion */
- 65535, /* .sendBufferSize, 64k per chunk */
- 65535, /* .recvBufferSize, 64k per chunk */
- 0, /* .maxMessageSize, 0 -> unlimited */
- 0 /* .maxChunkCount, 0 -> unlimited */
- };
- /***************************/
- /* Default Server Settings */
- /***************************/
- #define MANUFACTURER_NAME "open62541"
- #define PRODUCT_NAME "open62541 OPC UA Server"
- #define PRODUCT_URI "http://open62541.org"
- #define APPLICATION_NAME "open62541-based OPC UA Application"
- #define APPLICATION_URI "urn:unconfigured:application"
- #define STRINGIFY(arg) #arg
- #define VERSION(MAJOR, MINOR, PATCH, LABEL) \
- STRINGIFY(MAJOR) "." STRINGIFY(MINOR) "." STRINGIFY(PATCH) LABEL
- static UA_StatusCode
- createSecurityPolicyNoneEndpoint(UA_ServerConfig *conf, UA_Endpoint *endpoint,
- const UA_ByteString localCertificate) {
- UA_EndpointDescription_init(&endpoint->endpointDescription);
- UA_SecurityPolicy_None(&endpoint->securityPolicy, NULL, localCertificate, conf->logger);
- endpoint->endpointDescription.securityMode = UA_MESSAGESECURITYMODE_NONE;
- endpoint->endpointDescription.securityPolicyUri =
- UA_STRING_ALLOC("http://opcfoundation.org/UA/SecurityPolicy#None");
- endpoint->endpointDescription.transportProfileUri =
- UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
- /* Enable all login mechanisms from the access control plugin */
- UA_StatusCode retval = UA_Array_copy(conf->accessControl.userTokenPolicies,
- conf->accessControl.userTokenPoliciesSize,
- (void **)&endpoint->endpointDescription.userIdentityTokens,
- &UA_TYPES[UA_TYPES_USERTOKENPOLICY]);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- endpoint->endpointDescription.userIdentityTokensSize =
- conf->accessControl.userTokenPoliciesSize;
- UA_String_copy(&localCertificate, &endpoint->endpointDescription.serverCertificate);
- UA_ApplicationDescription_copy(&conf->applicationDescription,
- &endpoint->endpointDescription.server);
- return UA_STATUSCODE_GOOD;
- }
- void
- UA_ServerConfig_set_customHostname(UA_ServerConfig *config, const UA_String customHostname) {
- if(!config)
- return;
- UA_String_deleteMembers(&config->customHostname);
- UA_String_copy(&customHostname, &config->customHostname);
- }
- #ifdef UA_ENABLE_ENCRYPTION
- static UA_StatusCode
- createSecurityPolicyBasic128Rsa15Endpoint(UA_ServerConfig *const conf,
- UA_Endpoint *endpoint,
- UA_MessageSecurityMode securityMode,
- const UA_ByteString localCertificate,
- const UA_ByteString localPrivateKey) {
- UA_EndpointDescription_init(&endpoint->endpointDescription);
- UA_StatusCode retval =
- UA_SecurityPolicy_Basic128Rsa15(&endpoint->securityPolicy, &conf->certificateVerification,
- localCertificate, localPrivateKey, conf->logger);
- if(retval != UA_STATUSCODE_GOOD) {
- endpoint->securityPolicy.deleteMembers(&endpoint->securityPolicy);
- return retval;
- }
- endpoint->endpointDescription.securityMode = securityMode;
- endpoint->endpointDescription.securityPolicyUri =
- UA_STRING_ALLOC("http://opcfoundation.org/UA/SecurityPolicy#Basic128Rsa15");
- endpoint->endpointDescription.transportProfileUri =
- UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
- /* Enable all login mechanisms from the access control plugin */
- retval = UA_Array_copy(conf->accessControl.userTokenPolicies,
- conf->accessControl.userTokenPoliciesSize,
- (void **)&endpoint->endpointDescription.userIdentityTokens,
- &UA_TYPES[UA_TYPES_USERTOKENPOLICY]);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- endpoint->endpointDescription.userIdentityTokensSize =
- conf->accessControl.userTokenPoliciesSize;
- UA_String_copy(&localCertificate, &endpoint->endpointDescription.serverCertificate);
- UA_ApplicationDescription_copy(&conf->applicationDescription,
- &endpoint->endpointDescription.server);
- return UA_STATUSCODE_GOOD;
- }
- static UA_StatusCode
- createSecurityPolicyBasic256Sha256Endpoint(UA_ServerConfig *const conf,
- UA_Endpoint *endpoint,
- UA_MessageSecurityMode securityMode,
- const UA_ByteString localCertificate,
- const UA_ByteString localPrivateKey) {
- UA_EndpointDescription_init(&endpoint->endpointDescription);
- UA_StatusCode retval =
- UA_SecurityPolicy_Basic256Sha256(&endpoint->securityPolicy, &conf->certificateVerification, localCertificate,
- localPrivateKey, conf->logger);
- if(retval != UA_STATUSCODE_GOOD) {
- endpoint->securityPolicy.deleteMembers(&endpoint->securityPolicy);
- return retval;
- }
- endpoint->endpointDescription.securityMode = securityMode;
- endpoint->endpointDescription.securityPolicyUri =
- UA_STRING_ALLOC("http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256");
- endpoint->endpointDescription.transportProfileUri =
- UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
- /* Enable all login mechanisms from the access control plugin */
- retval = UA_Array_copy(conf->accessControl.userTokenPolicies,
- conf->accessControl.userTokenPoliciesSize,
- (void **)&endpoint->endpointDescription.userIdentityTokens,
- &UA_TYPES[UA_TYPES_USERTOKENPOLICY]);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- endpoint->endpointDescription.userIdentityTokensSize =
- conf->accessControl.userTokenPoliciesSize;
- UA_String_copy(&localCertificate, &endpoint->endpointDescription.serverCertificate);
- UA_ApplicationDescription_copy(&conf->applicationDescription,
- &endpoint->endpointDescription.server);
- return UA_STATUSCODE_GOOD;
- }
- #endif
- const size_t usernamePasswordsSize = 2;
- UA_UsernamePasswordLogin usernamePasswords[2] = {
- {UA_STRING_STATIC("user1"), UA_STRING_STATIC("password")},
- {UA_STRING_STATIC("user2"), UA_STRING_STATIC("password1")}};
- static UA_ServerConfig *
- createDefaultConfig(void) {
- UA_ServerConfig *conf = (UA_ServerConfig *)UA_malloc(sizeof(UA_ServerConfig));
- if(!conf)
- return NULL;
- /* Zero out.. All members have a valid initial value */
- memset(conf, 0, sizeof(UA_ServerConfig));
- /* --> Start setting the default static config <-- */
- conf->nThreads = 1;
- conf->logger = UA_Log_Stdout;
- /* Server Description */
- conf->buildInfo.productUri = UA_STRING_ALLOC(PRODUCT_URI);
- conf->buildInfo.manufacturerName = UA_STRING_ALLOC(MANUFACTURER_NAME);
- conf->buildInfo.productName = UA_STRING_ALLOC(PRODUCT_NAME);
- conf->buildInfo.softwareVersion =
- UA_STRING_ALLOC(VERSION(UA_OPEN62541_VER_MAJOR, UA_OPEN62541_VER_MINOR,
- UA_OPEN62541_VER_PATCH, UA_OPEN62541_VER_LABEL));
- conf->buildInfo.buildNumber = UA_STRING_ALLOC(__DATE__
- " "
- __TIME__);
- conf->buildInfo.buildDate = 0;
- conf->applicationDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI);
- conf->applicationDescription.productUri = UA_STRING_ALLOC(PRODUCT_URI);
- conf->applicationDescription.applicationName =
- UA_LOCALIZEDTEXT_ALLOC("en", APPLICATION_NAME);
- conf->applicationDescription.applicationType = UA_APPLICATIONTYPE_SERVER;
- /* conf->applicationDescription.gatewayServerUri = UA_STRING_NULL; */
- /* conf->applicationDescription.discoveryProfileUri = UA_STRING_NULL; */
- /* conf->applicationDescription.discoveryUrlsSize = 0; */
- /* conf->applicationDescription.discoveryUrls = NULL; */
- #ifdef UA_ENABLE_DISCOVERY
- /* conf->mdnsServerName = UA_STRING_NULL; */
- /* conf->serverCapabilitiesSize = 0; */
- /* conf->serverCapabilities = NULL; */
- #endif
- /* Custom DataTypes */
- /* conf->customDataTypesSize = 0; */
- /* conf->customDataTypes = NULL; */
- /* Networking */
- /* conf->networkLayersSize = 0; */
- /* conf->networkLayers = NULL; */
- /* conf->customHostname = UA_STRING_NULL; */
- /* Endpoints */
- /* conf->endpoints = {0, NULL}; */
- /* Certificate Verification that accepts every certificate. Can be
- * overwritten when the policy is specialized. */
- UA_CertificateVerification_AcceptAll(&conf->certificateVerification);
- /* Global Node Lifecycle */
- conf->nodeLifecycle.constructor = NULL;
- conf->nodeLifecycle.destructor = NULL;
- /* Access Control. Anonymous Login only. */
- conf->accessControl = UA_AccessControl_default(true, usernamePasswordsSize, usernamePasswords);
- /* Limits for SecureChannels */
- conf->maxSecureChannels = 40;
- conf->maxSecurityTokenLifetime = 10 * 60 * 1000; /* 10 minutes */
- /* Limits for Sessions */
- conf->maxSessions = 100;
- conf->maxSessionTimeout = 60.0 * 60.0 * 1000.0; /* 1h */
- /* Limits for Subscriptions */
- conf->publishingIntervalLimits = UA_DURATIONRANGE(100.0, 3600.0 * 1000.0);
- conf->lifeTimeCountLimits = UA_UINT32RANGE(3, 15000);
- conf->keepAliveCountLimits = UA_UINT32RANGE(1, 100);
- conf->maxNotificationsPerPublish = 1000;
- conf->maxRetransmissionQueueSize = 0; /* unlimited */
- #ifdef UA_ENABLE_SUBSCRIPTIONS_EVENTS
- conf->maxEventsPerNode = 0; /* unlimited */
- #endif
- /* Limits for MonitoredItems */
- conf->samplingIntervalLimits = UA_DURATIONRANGE(50.0, 24.0 * 3600.0 * 1000.0);
- conf->queueSizeLimits = UA_UINT32RANGE(1, 100);
- #ifdef UA_ENABLE_DISCOVERY
- conf->discoveryCleanupTimeout = 60 * 60;
- #endif
- /* --> Finish setting the default static config <-- */
- return conf;
- }
- static UA_StatusCode
- addDefaultNetworkLayers(UA_ServerConfig *conf, UA_UInt16 portNumber) {
- /* Add a network layer */
- conf->networkLayers = (UA_ServerNetworkLayer *)
- UA_malloc(sizeof(UA_ServerNetworkLayer));
- if(!conf->networkLayers)
- return UA_STATUSCODE_BADOUTOFMEMORY;
- conf->networkLayers[0] =
- UA_ServerNetworkLayerTCP(UA_ConnectionConfig_default, portNumber, conf->logger);
- conf->networkLayersSize = 1;
- return UA_STATUSCODE_GOOD;
- }
- UA_ServerConfig *
- UA_ServerConfig_new_minimal(UA_UInt16 portNumber,
- const UA_ByteString *certificate) {
- UA_ServerConfig *conf = createDefaultConfig();
- UA_StatusCode retval = UA_Nodestore_default_new(&conf->nodestore);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- if(addDefaultNetworkLayers(conf, portNumber) != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- /* Allocate the endpoint */
- conf->endpointsSize = 1;
- conf->endpoints = (UA_Endpoint *)UA_malloc(sizeof(UA_Endpoint));
- if(!conf->endpoints) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- /* Populate the endpoint */
- UA_ByteString localCertificate = UA_BYTESTRING_NULL;
- if(certificate)
- localCertificate = *certificate;
- retval =
- createSecurityPolicyNoneEndpoint(conf, &conf->endpoints[0], localCertificate);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- return conf;
- }
- #ifdef UA_ENABLE_ENCRYPTION
- UA_ServerConfig *
- UA_ServerConfig_new_basic128rsa15(UA_UInt16 portNumber,
- const UA_ByteString *certificate,
- const UA_ByteString *privateKey,
- const UA_ByteString *trustList,
- size_t trustListSize,
- const UA_ByteString *revocationList,
- size_t revocationListSize) {
- UA_ServerConfig *conf = createDefaultConfig();
- UA_StatusCode retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
- trustList, trustListSize,
- revocationList, revocationListSize);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- retval = UA_Nodestore_default_new(&conf->nodestore);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- if(addDefaultNetworkLayers(conf, portNumber) != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- if(trustListSize == 0)
- UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
- "No CA trust-list provided. Any remote certificate will be accepted.");
- /* Allocate the endpoints */
- conf->endpointsSize = 0;
- conf->endpoints = (UA_Endpoint *)UA_malloc(sizeof(UA_Endpoint) * 3);
- if(!conf->endpoints) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- /* Populate the endpoints */
- ++conf->endpointsSize;
- retval = createSecurityPolicyNoneEndpoint(conf, &conf->endpoints[0], *certificate);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- ++conf->endpointsSize;
- retval = createSecurityPolicyBasic128Rsa15Endpoint(conf, &conf->endpoints[1],
- UA_MESSAGESECURITYMODE_SIGN, *certificate,
- *privateKey);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- ++conf->endpointsSize;
- retval = createSecurityPolicyBasic128Rsa15Endpoint(conf, &conf->endpoints[2],
- UA_MESSAGESECURITYMODE_SIGNANDENCRYPT, *certificate,
- *privateKey);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- return conf;
- }
- UA_ServerConfig *
- UA_ServerConfig_new_basic256sha256(UA_UInt16 portNumber,
- const UA_ByteString *certificate,
- const UA_ByteString *privateKey,
- const UA_ByteString *trustList,
- size_t trustListSize,
- const UA_ByteString *revocationList,
- size_t revocationListSize) {
- UA_ServerConfig *conf = createDefaultConfig();
- UA_StatusCode retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
- trustList, trustListSize,
- revocationList, revocationListSize);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- retval = UA_Nodestore_default_new(&conf->nodestore);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- if(addDefaultNetworkLayers(conf, portNumber) != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- if(trustListSize == 0)
- UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
- "No CA trust-list provided. Any remote certificate will be accepted.");
- /* Allocate the endpoints */
- conf->endpointsSize = 0;
- conf->endpoints = (UA_Endpoint *)UA_malloc(sizeof(UA_Endpoint) * 3);
- if(!conf->endpoints) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- /* Populate the endpoints */
- ++conf->endpointsSize;
- retval = createSecurityPolicyNoneEndpoint(conf, &conf->endpoints[0], *certificate);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- ++conf->endpointsSize;
- retval = createSecurityPolicyBasic256Sha256Endpoint(conf, &conf->endpoints[1],
- UA_MESSAGESECURITYMODE_SIGN, *certificate,
- *privateKey);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- ++conf->endpointsSize;
- retval = createSecurityPolicyBasic256Sha256Endpoint(conf, &conf->endpoints[2],
- UA_MESSAGESECURITYMODE_SIGNANDENCRYPT, *certificate,
- *privateKey);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- return conf;
- }
- UA_ServerConfig *
- UA_ServerConfig_new_allSecurityPolicies(UA_UInt16 portNumber,
- const UA_ByteString *certificate,
- const UA_ByteString *privateKey,
- const UA_ByteString *trustList,
- size_t trustListSize,
- const UA_ByteString *revocationList,
- size_t revocationListSize) {
- UA_ServerConfig *conf = createDefaultConfig();
- UA_StatusCode retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
- trustList, trustListSize,
- revocationList, revocationListSize);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- retval = UA_Nodestore_default_new(&conf->nodestore);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- if(addDefaultNetworkLayers(conf, portNumber) != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- if(trustListSize == 0)
- UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
- "No CA trust-list provided. Any remote certificate will be accepted.");
- /* Allocate the endpoints */
- conf->endpointsSize = 0;
- conf->endpoints = (UA_Endpoint *)UA_malloc(sizeof(UA_Endpoint) * 5);
- if(!conf->endpoints) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- /* Populate the endpoints */
- retval = createSecurityPolicyNoneEndpoint(conf, &conf->endpoints[conf->endpointsSize], *certificate);
- ++conf->endpointsSize;
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- retval = createSecurityPolicyBasic128Rsa15Endpoint(conf, &conf->endpoints[conf->endpointsSize],
- UA_MESSAGESECURITYMODE_SIGN, *certificate,
- *privateKey);
- ++conf->endpointsSize;
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- retval = createSecurityPolicyBasic128Rsa15Endpoint(conf, &conf->endpoints[conf->endpointsSize],
- UA_MESSAGESECURITYMODE_SIGNANDENCRYPT, *certificate,
- *privateKey);
- ++conf->endpointsSize;
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- retval = createSecurityPolicyBasic256Sha256Endpoint(conf, &conf->endpoints[conf->endpointsSize],
- UA_MESSAGESECURITYMODE_SIGN, *certificate,
- *privateKey);
- ++conf->endpointsSize;
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- retval = createSecurityPolicyBasic256Sha256Endpoint(conf, &conf->endpoints[conf->endpointsSize],
- UA_MESSAGESECURITYMODE_SIGNANDENCRYPT, *certificate,
- *privateKey);
- ++conf->endpointsSize;
- if(retval != UA_STATUSCODE_GOOD) {
- UA_ServerConfig_delete(conf);
- return NULL;
- }
- return conf;
- }
- #endif
- void
- UA_ServerConfig_delete(UA_ServerConfig *config) {
- if(!config)
- return;
- /* Server Description */
- UA_BuildInfo_deleteMembers(&config->buildInfo);
- UA_ApplicationDescription_deleteMembers(&config->applicationDescription);
- #ifdef UA_ENABLE_DISCOVERY
- UA_String_deleteMembers(&config->mdnsServerName);
- UA_Array_delete(config->serverCapabilities, config->serverCapabilitiesSize,
- &UA_TYPES[UA_TYPES_STRING]);
- config->serverCapabilities = NULL;
- config->serverCapabilitiesSize = 0;
- #endif
- /* Nodestore */
- if(config->nodestore.deleteNodestore)
- config->nodestore.deleteNodestore(config->nodestore.context);
- /* Custom DataTypes */
- for(size_t i = 0; i < config->customDataTypesSize; ++i)
- UA_free(config->customDataTypes[i].members);
- UA_free(config->customDataTypes);
- config->customDataTypes = NULL;
- config->customDataTypesSize = 0;
- /* Networking */
- for(size_t i = 0; i < config->networkLayersSize; ++i)
- config->networkLayers[i].deleteMembers(&config->networkLayers[i]);
- UA_free(config->networkLayers);
- config->networkLayers = NULL;
- config->networkLayersSize = 0;
- UA_String_deleteMembers(&config->customHostname);
- config->customHostname = UA_STRING_NULL;
- for(size_t i = 0; i < config->endpointsSize; ++i) {
- UA_SecurityPolicy *policy = &config->endpoints[i].securityPolicy;
- policy->deleteMembers(policy);
- UA_EndpointDescription_deleteMembers(&config->endpoints[i].endpointDescription);
- }
- UA_free(config->endpoints);
- config->endpoints = NULL;
- config->endpointsSize = 0;
- /* Certificate Validation */
- config->certificateVerification.deleteMembers(&config->certificateVerification);
- /* Access Control */
- config->accessControl.deleteMembers(&config->accessControl);
- UA_free(config);
- }
- /***************************/
- /* Default Client Settings */
- /***************************/
- const UA_ClientConfig UA_ClientConfig_default = {
- 5000, /* .timeout, 5 seconds */
- 10 * 60 * 1000, /* .secureChannelLifeTime, 10 minutes */
- UA_Log_Stdout, /* .logger */
- { /* .localConnectionConfig */
- 0, /* .protocolVersion */
- 65535, /* .sendBufferSize, 64k per chunk */
- 65535, /* .recvBufferSize, 64k per chunk */
- 0, /* .maxMessageSize, 0 -> unlimited */
- 0 /* .maxChunkCount, 0 -> unlimited */
- },
- UA_ClientConnectionTCP, /* .connectionFunc (for sync connection) */
- UA_ClientConnectionTCP_init, /* .initConnectionFunc (for async client) */
- UA_ClientConnectionTCP_poll, /* .pollConnectionFunc (for async connection) */
- 0, /* .customDataTypesSize */
- NULL, /* .customDataTypes */
- NULL, /* .stateCallback */
- #ifdef UA_ENABLE_SUBSCRIPTIONS
- NULL, /* .subscriptionInactivityCallback */
- #endif
- NULL, /* .inactivityCallback */
- NULL, /* .clientContext */
- #ifdef UA_ENABLE_SUBSCRIPTIONS
- 10, /* .outStandingPublishRequests */
- #endif
- 0 /* .connectivityCheckInterval */
- };
|