opcua_transportLayer.c 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. /*
  2. * opcua_transportLayer.c
  3. *
  4. * Created on: Dec 19, 2013
  5. * Author: opcua
  6. */
  7. #include <memory.h> // memset, memcpy
  8. #include "UA_stack.h"
  9. #include "UA_connection.h"
  10. #include "opcua_transportLayer.h"
  11. #include "opcua_secureLayer.h" // SL_process
  12. UA_Int32 TL_Connection_init(UA_TL_connection *c, UA_TL_Description* tld)
  13. {
  14. c->socket = -1;
  15. c->connectionState = connectionState_CLOSED;
  16. c->readerThread = -1;
  17. c->UA_TL_writer = UA_NULL;
  18. memcpy(&(c->localConf),&(tld->localConf),sizeof(TL_buffer));
  19. memset(&(c->remoteConf),0,sizeof(TL_buffer));
  20. UA_String_init(&(c->endpointUrl));
  21. return UA_SUCCESS;
  22. }
  23. UA_Int32 TL_check(UA_TL_connection *connection, UA_ByteString* msg, int checkLocal)
  24. {
  25. UA_Int32 retval = UA_SUCCESS;
  26. UA_Int32 position = 4;
  27. UA_Int32 messageLength;
  28. DBG_VERBOSE_printf("TL_check - entered \n");
  29. UA_Int32_decode(msg->data,&position,&messageLength);
  30. DBG_VERBOSE_printf("TL_check - messageLength = %d \n",messageLength);
  31. if (messageLength == -1 || messageLength != msg->length ||
  32. ( ( checkLocal == UA_TL_CHECK_LOCAL) && messageLength > (UA_Int32) connection->localConf.maxMessageSize) ||
  33. ( ( checkLocal == UA_TL_CHECK_REMOTE) && messageLength > (UA_Int32) connection->remoteConf.maxMessageSize))
  34. {
  35. DBG_ERR_printf("TL_check - length error \n");
  36. retval = UA_ERR_INCONSISTENT;
  37. }
  38. return retval;
  39. }
  40. #define Cmp3Byte(data,pos,a,b,c) (*((Int32*) ((data)+(pos))) & 0xFFFFFF) == (Int32)(((Byte)(a))|((Byte)(b))<<8|((Byte)(c))<<16)
  41. UA_Int32 TL_process(UA_TL_connection *connection, UA_ByteString* msg)
  42. {
  43. UA_Int32 retval = UA_SUCCESS;
  44. UA_Int32 pos = 0;
  45. UA_Int32 tmpPos = 0;
  46. UA_ByteString tmpMessage;
  47. UA_OPCUATcpMessageHeader tcpMessageHeader;
  48. UA_OPCUATcpHelloMessage helloMessage;
  49. UA_OPCUATcpAcknowledgeMessage ackMessage;
  50. UA_OPCUATcpMessageHeader ackHeader;
  51. DBG_VERBOSE_printf("TL_process - entered \n");
  52. retval = UA_OPCUATcpMessageHeader_decode(msg->data, &pos, &tcpMessageHeader);
  53. if (retval == UA_SUCCESS) {
  54. switch(tcpMessageHeader.messageType)
  55. {
  56. case UA_MESSAGETYPE_HEL:
  57. if (connection->connectionState == connectionState_CLOSED)
  58. {
  59. DBG_VERBOSE_printf("TL_process - extracting header information \n");
  60. UA_OPCUATcpHelloMessage_decode(msg->data,&pos,&helloMessage);
  61. /* extract information from received header */
  62. connection->remoteConf.protocolVersion = helloMessage.protocolVersion;
  63. DBG_VERBOSE_printf("TL_process - protocolVersion = %d \n",connection->remoteConf.protocolVersion);
  64. connection->remoteConf.recvBufferSize = helloMessage.receiveBufferSize;
  65. DBG_VERBOSE_printf("TL_process - recvBufferSize = %d \n",connection->remoteConf.recvBufferSize);
  66. connection->remoteConf.sendBufferSize = helloMessage.sendBufferSize;
  67. DBG_VERBOSE_printf("TL_process - sendBufferSize = %d \n",connection->remoteConf.sendBufferSize);
  68. connection->remoteConf.maxMessageSize = helloMessage.maxMessageSize;
  69. DBG_VERBOSE_printf("TL_process - maxMessageSize = %d \n",connection->remoteConf.maxMessageSize);
  70. connection->remoteConf.maxChunkCount = helloMessage.maxChunkCount;
  71. DBG_VERBOSE_printf("TL_process - maxChunkCount = %d \n",connection->remoteConf.maxChunkCount);
  72. UA_String_copy(&(helloMessage.endpointUrl), &(connection->endpointUrl));
  73. // Clean up
  74. UA_OPCUATcpHelloMessage_deleteMembers(&helloMessage);
  75. // build acknowledge response
  76. ackMessage.protocolVersion = connection->localConf.protocolVersion;
  77. ackMessage.receiveBufferSize = connection->localConf.recvBufferSize;
  78. ackMessage.sendBufferSize = connection->localConf.sendBufferSize;
  79. ackMessage.maxMessageSize = connection->localConf.maxMessageSize;
  80. ackMessage.maxChunkCount = connection->localConf.maxChunkCount;
  81. ackHeader.messageType = UA_MESSAGETYPE_ACK;
  82. ackHeader.isFinal = 'F';
  83. ackHeader.messageSize = UA_OPCUATcpAcknowledgeMessage_calcSize(&ackMessage)
  84. + UA_OPCUATcpMessageHeader_calcSize(&ackHeader);
  85. // allocate memory for encoding
  86. UA_alloc((void**)&(tmpMessage.data),ackHeader.messageSize);
  87. tmpMessage.length = ackHeader.messageSize;
  88. //encode header and message
  89. UA_OPCUATcpMessageHeader_encode(&ackHeader,&tmpPos,tmpMessage.data);
  90. UA_OPCUATcpAcknowledgeMessage_encode(&ackMessage,&tmpPos,tmpMessage.data);
  91. DBG_VERBOSE_printf("TL_process - Size messageToSend = %d, pos=%d\n",ackHeader.messageSize, tmpPos);
  92. connection->connectionState = connectionState_OPENING;
  93. TL_send(connection, &tmpMessage);
  94. UA_ByteString_deleteMembers(&tmpMessage);
  95. }
  96. else
  97. {
  98. DBG_ERR_printf("TL_process - wrong connection state \n");
  99. retval = UA_ERROR_MULTIPLY_HEL;
  100. }
  101. break;
  102. default: // dispatch processing to secureLayer
  103. if ((connection->connectionState != connectionState_CLOSED)) {
  104. retval = SL_process(connection, msg, tcpMessageHeader.messageType);
  105. } else {
  106. retval = UA_ERROR;
  107. }
  108. break;
  109. }
  110. }
  111. if (retval != UA_SUCCESS) {
  112. UA_ByteString errorMsg;
  113. UA_ByteString_init(&errorMsg);
  114. TL_send(connection,&errorMsg);
  115. UA_ByteString_deleteMembers(&errorMsg);
  116. }
  117. return retval;
  118. }
  119. /** respond to client request */
  120. UA_Int32 TL_send(UA_TL_connection* connection, UA_ByteString* msg)
  121. {
  122. UA_Int32 retval = UA_SUCCESS;
  123. DBG_VERBOSE_printf("TL_send - entered \n");
  124. if (TL_check(connection,msg,UA_TL_CHECK_REMOTE) == UA_SUCCESS) {
  125. connection->UA_TL_writer(connection,msg);
  126. }
  127. else
  128. {
  129. DBG_ERR_printf("TL_send - ERROR: packet size greater than remote buffer size");
  130. retval = UA_ERROR;
  131. }
  132. return retval;
  133. }