ua_server_binary.c 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783
  1. #include "ua_util.h"
  2. #include "ua_server_internal.h"
  3. #include "ua_services.h"
  4. #include "ua_securechannel_manager.h"
  5. #include "ua_session_manager.h"
  6. #include "ua_types_generated_encoding_binary.h"
  7. #include "ua_transport_generated.h"
  8. #include "ua_transport_generated_handling.h"
  9. #include "ua_transport_generated_encoding_binary.h"
  10. /********************/
  11. /* Helper Functions */
  12. /********************/
  13. static void init_response_header(const UA_RequestHeader *p, UA_ResponseHeader *r) {
  14. r->requestHandle = p->requestHandle;
  15. r->timestamp = UA_DateTime_now();
  16. }
  17. static void
  18. sendError(UA_SecureChannel *channel, const UA_ByteString *msg,
  19. size_t offset, const UA_DataType *responseType,
  20. UA_UInt32 requestId, UA_StatusCode error) {
  21. UA_RequestHeader requestHeader;
  22. UA_StatusCode retval = UA_RequestHeader_decodeBinary(msg, &offset, &requestHeader);
  23. if(retval != UA_STATUSCODE_GOOD)
  24. return;
  25. void *response = UA_alloca(responseType->memSize);
  26. UA_init(response, responseType);
  27. UA_ResponseHeader *responseHeader = (UA_ResponseHeader*)response;
  28. init_response_header(&requestHeader, responseHeader);
  29. responseHeader->serviceResult = error;
  30. UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  31. UA_RequestHeader_deleteMembers(&requestHeader);
  32. UA_ResponseHeader_deleteMembers(responseHeader);
  33. }
  34. /* Returns a complete decoded request (without securechannel headers + padding)
  35. or UA_BYTESTRING_NULL */
  36. static UA_ByteString
  37. processChunk(UA_SecureChannel *channel, UA_Server *server,
  38. const UA_TcpMessageHeader *messageHeader, UA_UInt32 requestId,
  39. const UA_ByteString *msg, size_t offset, size_t chunksize,
  40. UA_Boolean *deleteRequest) {
  41. UA_ByteString bytes = UA_BYTESTRING_NULL;
  42. switch(messageHeader->messageTypeAndChunkType & 0xff000000) {
  43. case UA_CHUNKTYPE_INTERMEDIATE:
  44. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Chunk message");
  45. UA_SecureChannel_appendChunk(channel, requestId, msg, offset, chunksize);
  46. break;
  47. case UA_CHUNKTYPE_FINAL:
  48. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Final chunk message");
  49. bytes = UA_SecureChannel_finalizeChunk(channel, requestId, msg, offset,
  50. chunksize, deleteRequest);
  51. break;
  52. case UA_CHUNKTYPE_ABORT:
  53. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Chunk aborted");
  54. UA_SecureChannel_removeChunk(channel, requestId);
  55. break;
  56. default:
  57. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Unknown chunk type");
  58. }
  59. return bytes;
  60. }
  61. static void
  62. getServicePointers(UA_UInt32 requestTypeId, const UA_DataType **requestType,
  63. const UA_DataType **responseType, UA_Service *service,
  64. UA_Boolean *requiresSession) {
  65. switch(requestTypeId) {
  66. case UA_NS0ID_GETENDPOINTSREQUEST:
  67. case UA_NS0ID_GETENDPOINTSREQUEST_ENCODING_DEFAULTXML:
  68. case UA_NS0ID_GETENDPOINTSREQUEST_ENCODING_DEFAULTBINARY:
  69. *service = (UA_Service)Service_GetEndpoints;
  70. *requestType = &UA_TYPES[UA_TYPES_GETENDPOINTSREQUEST];
  71. *responseType = &UA_TYPES[UA_TYPES_GETENDPOINTSRESPONSE];
  72. *requiresSession = false;
  73. break;
  74. case UA_NS0ID_FINDSERVERSREQUEST:
  75. case UA_NS0ID_FINDSERVERSREQUEST_ENCODING_DEFAULTXML:
  76. case UA_NS0ID_FINDSERVERSREQUEST_ENCODING_DEFAULTBINARY:
  77. *service = (UA_Service)Service_FindServers;
  78. *requestType = &UA_TYPES[UA_TYPES_FINDSERVERSREQUEST];
  79. *responseType = &UA_TYPES[UA_TYPES_FINDSERVERSRESPONSE];
  80. *requiresSession = false;
  81. break;
  82. case UA_NS0ID_CREATESESSIONREQUEST:
  83. case UA_NS0ID_CREATESESSIONREQUEST_ENCODING_DEFAULTXML:
  84. case UA_NS0ID_CREATESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  85. *service = (UA_Service)Service_CreateSession;
  86. *requestType = &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST];
  87. *responseType = &UA_TYPES[UA_TYPES_CREATESESSIONRESPONSE];
  88. *requiresSession = false;
  89. break;
  90. case UA_NS0ID_ACTIVATESESSIONREQUEST:
  91. case UA_NS0ID_ACTIVATESESSIONREQUEST_ENCODING_DEFAULTXML:
  92. case UA_NS0ID_ACTIVATESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  93. *service = (UA_Service)Service_ActivateSession;
  94. *requestType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST];
  95. *responseType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONRESPONSE];
  96. break;
  97. case UA_NS0ID_CLOSESESSIONREQUEST:
  98. case UA_NS0ID_CLOSESESSIONREQUEST_ENCODING_DEFAULTXML:
  99. case UA_NS0ID_CLOSESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  100. *service = (UA_Service)Service_CloseSession;
  101. *requestType = &UA_TYPES[UA_TYPES_CLOSESESSIONREQUEST];
  102. *responseType = &UA_TYPES[UA_TYPES_CLOSESESSIONRESPONSE];
  103. break;
  104. case UA_NS0ID_READREQUEST:
  105. case UA_NS0ID_READREQUEST_ENCODING_DEFAULTXML:
  106. case UA_NS0ID_READREQUEST_ENCODING_DEFAULTBINARY:
  107. *service = (UA_Service)Service_Read;
  108. *requestType = &UA_TYPES[UA_TYPES_READREQUEST];
  109. *responseType = &UA_TYPES[UA_TYPES_READRESPONSE];
  110. break;
  111. case UA_NS0ID_WRITEREQUEST:
  112. case UA_NS0ID_WRITEREQUEST_ENCODING_DEFAULTXML:
  113. case UA_NS0ID_WRITEREQUEST_ENCODING_DEFAULTBINARY:
  114. *service = (UA_Service)Service_Write;
  115. *requestType = &UA_TYPES[UA_TYPES_WRITEREQUEST];
  116. *responseType = &UA_TYPES[UA_TYPES_WRITERESPONSE];
  117. break;
  118. case UA_NS0ID_BROWSEREQUEST:
  119. case UA_NS0ID_BROWSEREQUEST_ENCODING_DEFAULTXML:
  120. case UA_NS0ID_BROWSEREQUEST_ENCODING_DEFAULTBINARY:
  121. *service = (UA_Service)Service_Browse;
  122. *requestType = &UA_TYPES[UA_TYPES_BROWSEREQUEST];
  123. *responseType = &UA_TYPES[UA_TYPES_BROWSERESPONSE];
  124. break;
  125. case UA_NS0ID_BROWSENEXTREQUEST:
  126. case UA_NS0ID_BROWSENEXTREQUEST_ENCODING_DEFAULTXML:
  127. case UA_NS0ID_BROWSENEXTREQUEST_ENCODING_DEFAULTBINARY:
  128. *service = (UA_Service)Service_BrowseNext;
  129. *requestType = &UA_TYPES[UA_TYPES_BROWSENEXTREQUEST];
  130. *responseType = &UA_TYPES[UA_TYPES_BROWSENEXTRESPONSE];
  131. break;
  132. case UA_NS0ID_REGISTERNODESREQUEST:
  133. case UA_NS0ID_REGISTERNODESREQUEST_ENCODING_DEFAULTXML:
  134. case UA_NS0ID_REGISTERNODESREQUEST_ENCODING_DEFAULTBINARY:
  135. *service = (UA_Service)Service_RegisterNodes;
  136. *requestType = &UA_TYPES[UA_TYPES_REGISTERNODESREQUEST];
  137. *responseType = &UA_TYPES[UA_TYPES_REGISTERNODESRESPONSE];
  138. break;
  139. case UA_NS0ID_UNREGISTERNODESREQUEST:
  140. case UA_NS0ID_UNREGISTERNODESREQUEST_ENCODING_DEFAULTXML:
  141. case UA_NS0ID_UNREGISTERNODESREQUEST_ENCODING_DEFAULTBINARY:
  142. *service = (UA_Service)Service_UnregisterNodes;
  143. *requestType = &UA_TYPES[UA_TYPES_UNREGISTERNODESREQUEST];
  144. *responseType = &UA_TYPES[UA_TYPES_UNREGISTERNODESRESPONSE];
  145. break;
  146. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST:
  147. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST_ENCODING_DEFAULTXML:
  148. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST_ENCODING_DEFAULTBINARY:
  149. *service = (UA_Service)Service_TranslateBrowsePathsToNodeIds;
  150. *requestType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSREQUEST];
  151. *responseType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSRESPONSE];
  152. break;
  153. #ifdef UA_ENABLE_SUBSCRIPTIONS
  154. case UA_NS0ID_CREATESUBSCRIPTIONREQUEST:
  155. case UA_NS0ID_CREATESUBSCRIPTIONREQUEST_ENCODING_DEFAULTXML:
  156. case UA_NS0ID_CREATESUBSCRIPTIONREQUEST_ENCODING_DEFAULTBINARY:
  157. *service = (UA_Service)Service_CreateSubscription;
  158. *requestType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONREQUEST];
  159. *responseType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONRESPONSE];
  160. break;
  161. case UA_NS0ID_PUBLISHREQUEST:
  162. case UA_NS0ID_PUBLISHREQUEST_ENCODING_DEFAULTXML:
  163. case UA_NS0ID_PUBLISHREQUEST_ENCODING_DEFAULTBINARY:
  164. *requestType = &UA_TYPES[UA_TYPES_PUBLISHREQUEST];
  165. *responseType = &UA_TYPES[UA_TYPES_PUBLISHRESPONSE];
  166. break;
  167. case UA_NS0ID_REPUBLISHREQUEST:
  168. case UA_NS0ID_REPUBLISHREQUEST_ENCODING_DEFAULTXML:
  169. case UA_NS0ID_REPUBLISHREQUEST_ENCODING_DEFAULTBINARY:
  170. *service = (UA_Service)Service_Republish;
  171. *requestType = &UA_TYPES[UA_TYPES_REPUBLISHREQUEST];
  172. *responseType = &UA_TYPES[UA_TYPES_REPUBLISHRESPONSE];
  173. break;
  174. case UA_NS0ID_MODIFYSUBSCRIPTIONREQUEST:
  175. case UA_NS0ID_MODIFYSUBSCRIPTIONREQUEST_ENCODING_DEFAULTXML:
  176. case UA_NS0ID_MODIFYSUBSCRIPTIONREQUEST_ENCODING_DEFAULTBINARY:
  177. *service = (UA_Service)Service_ModifySubscription;
  178. *requestType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONREQUEST];
  179. *responseType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONRESPONSE];
  180. break;
  181. case UA_NS0ID_SETPUBLISHINGMODEREQUEST:
  182. case UA_NS0ID_SETPUBLISHINGMODEREQUEST_ENCODING_DEFAULTXML:
  183. case UA_NS0ID_SETPUBLISHINGMODEREQUEST_ENCODING_DEFAULTBINARY:
  184. *service = (UA_Service)Service_SetPublishingMode;
  185. *requestType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODEREQUEST];
  186. *responseType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODERESPONSE];
  187. break;
  188. case UA_NS0ID_DELETESUBSCRIPTIONSREQUEST:
  189. case UA_NS0ID_DELETESUBSCRIPTIONSREQUEST_ENCODING_DEFAULTXML:
  190. case UA_NS0ID_DELETESUBSCRIPTIONSREQUEST_ENCODING_DEFAULTBINARY:
  191. *service = (UA_Service)Service_DeleteSubscriptions;
  192. *requestType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSREQUEST];
  193. *responseType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSRESPONSE];
  194. break;
  195. case UA_NS0ID_CREATEMONITOREDITEMSREQUEST:
  196. case UA_NS0ID_CREATEMONITOREDITEMSREQUEST_ENCODING_DEFAULTXML:
  197. case UA_NS0ID_CREATEMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  198. *service = (UA_Service)Service_CreateMonitoredItems;
  199. *requestType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSREQUEST];
  200. *responseType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSRESPONSE];
  201. break;
  202. case UA_NS0ID_DELETEMONITOREDITEMSREQUEST:
  203. case UA_NS0ID_DELETEMONITOREDITEMSREQUEST_ENCODING_DEFAULTXML:
  204. case UA_NS0ID_DELETEMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  205. *service = (UA_Service)Service_DeleteMonitoredItems;
  206. *requestType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSREQUEST];
  207. *responseType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSRESPONSE];
  208. break;
  209. case UA_NS0ID_MODIFYMONITOREDITEMSREQUEST:
  210. case UA_NS0ID_MODIFYMONITOREDITEMSREQUEST_ENCODING_DEFAULTXML:
  211. case UA_NS0ID_MODIFYMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  212. *service = (UA_Service)Service_ModifyMonitoredItems;
  213. *requestType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSREQUEST];
  214. *responseType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSRESPONSE];
  215. break;
  216. case UA_NS0ID_SETMONITORINGMODEREQUEST:
  217. case UA_NS0ID_SETMONITORINGMODEREQUEST_ENCODING_DEFAULTXML:
  218. case UA_NS0ID_SETMONITORINGMODEREQUEST_ENCODING_DEFAULTBINARY:
  219. *service = (UA_Service)Service_SetMonitoringMode;
  220. *requestType = &UA_TYPES[UA_TYPES_SETMONITORINGMODEREQUEST];
  221. *responseType = &UA_TYPES[UA_TYPES_SETMONITORINGMODERESPONSE];
  222. break;
  223. #endif
  224. #ifdef UA_ENABLE_METHODCALLS
  225. case UA_NS0ID_CALLREQUEST:
  226. case UA_NS0ID_CALLREQUEST_ENCODING_DEFAULTXML:
  227. case UA_NS0ID_CALLREQUEST_ENCODING_DEFAULTBINARY:
  228. *service = (UA_Service)Service_Call;
  229. *requestType = &UA_TYPES[UA_TYPES_CALLREQUEST];
  230. *responseType = &UA_TYPES[UA_TYPES_CALLRESPONSE];
  231. break;
  232. #endif
  233. #ifdef UA_ENABLE_NODEMANAGEMENT
  234. case UA_NS0ID_ADDNODESREQUEST:
  235. case UA_NS0ID_ADDNODESREQUEST_ENCODING_DEFAULTXML:
  236. case UA_NS0ID_ADDNODESREQUEST_ENCODING_DEFAULTBINARY:
  237. *service = (UA_Service)Service_AddNodes;
  238. *requestType = &UA_TYPES[UA_TYPES_ADDNODESREQUEST];
  239. *responseType = &UA_TYPES[UA_TYPES_ADDNODESRESPONSE];
  240. break;
  241. case UA_NS0ID_ADDREFERENCESREQUEST:
  242. case UA_NS0ID_ADDREFERENCESREQUEST_ENCODING_DEFAULTXML:
  243. case UA_NS0ID_ADDREFERENCESREQUEST_ENCODING_DEFAULTBINARY:
  244. *service = (UA_Service)Service_AddReferences;
  245. *requestType = &UA_TYPES[UA_TYPES_ADDREFERENCESREQUEST];
  246. *responseType = &UA_TYPES[UA_TYPES_ADDREFERENCESRESPONSE];
  247. break;
  248. case UA_NS0ID_DELETENODESREQUEST:
  249. case UA_NS0ID_DELETENODESREQUEST_ENCODING_DEFAULTXML:
  250. case UA_NS0ID_DELETENODESREQUEST_ENCODING_DEFAULTBINARY:
  251. *service = (UA_Service)Service_DeleteNodes;
  252. *requestType = &UA_TYPES[UA_TYPES_DELETENODESREQUEST];
  253. *responseType = &UA_TYPES[UA_TYPES_DELETENODESRESPONSE];
  254. break;
  255. case UA_NS0ID_DELETEREFERENCESREQUEST:
  256. case UA_NS0ID_DELETEREFERENCESREQUEST_ENCODING_DEFAULTXML:
  257. case UA_NS0ID_DELETEREFERENCESREQUEST_ENCODING_DEFAULTBINARY:
  258. *service = (UA_Service)Service_DeleteReferences;
  259. *requestType = &UA_TYPES[UA_TYPES_DELETEREFERENCESREQUEST];
  260. *responseType = &UA_TYPES[UA_TYPES_DELETEREFERENCESRESPONSE];
  261. break;
  262. #endif
  263. default:
  264. break;
  265. }
  266. }
  267. /*************************/
  268. /* Process Message Types */
  269. /*************************/
  270. /* HEL -> Open up the connection */
  271. static void processHEL(UA_Connection *connection, const UA_ByteString *msg, size_t *offset) {
  272. UA_TcpHelloMessage helloMessage;
  273. if(UA_TcpHelloMessage_decodeBinary(msg, offset, &helloMessage) != UA_STATUSCODE_GOOD) {
  274. connection->close(connection);
  275. return;
  276. }
  277. /* Parameterize the connection */
  278. connection->remoteConf.maxChunkCount = helloMessage.maxChunkCount; /* zero -> unlimited */
  279. connection->remoteConf.maxMessageSize = helloMessage.maxMessageSize; /* zero -> unlimited */
  280. connection->remoteConf.protocolVersion = helloMessage.protocolVersion;
  281. connection->remoteConf.recvBufferSize = helloMessage.receiveBufferSize;
  282. if(connection->localConf.sendBufferSize > helloMessage.receiveBufferSize)
  283. connection->localConf.sendBufferSize = helloMessage.receiveBufferSize;
  284. connection->remoteConf.sendBufferSize = helloMessage.sendBufferSize;
  285. if(connection->localConf.recvBufferSize > helloMessage.sendBufferSize)
  286. connection->localConf.recvBufferSize = helloMessage.sendBufferSize;
  287. connection->state = UA_CONNECTION_ESTABLISHED;
  288. UA_TcpHelloMessage_deleteMembers(&helloMessage);
  289. /* Build acknowledge response */
  290. UA_TcpAcknowledgeMessage ackMessage;
  291. ackMessage.protocolVersion = connection->localConf.protocolVersion;
  292. ackMessage.receiveBufferSize = connection->localConf.recvBufferSize;
  293. ackMessage.sendBufferSize = connection->localConf.sendBufferSize;
  294. ackMessage.maxMessageSize = connection->localConf.maxMessageSize;
  295. ackMessage.maxChunkCount = connection->localConf.maxChunkCount;
  296. UA_TcpMessageHeader ackHeader;
  297. ackHeader.messageTypeAndChunkType = UA_MESSAGETYPE_ACK + UA_CHUNKTYPE_FINAL;
  298. ackHeader.messageSize = 8 + 20; /* ackHeader + ackMessage */
  299. /* Get the send buffer from the network layer */
  300. UA_ByteString ack_msg;
  301. UA_ByteString_init(&ack_msg);
  302. UA_StatusCode retval =
  303. connection->getSendBuffer(connection, connection->localConf.sendBufferSize, &ack_msg);
  304. if(retval != UA_STATUSCODE_GOOD)
  305. return;
  306. /* Encode and send the response */
  307. size_t tmpPos = 0;
  308. UA_TcpMessageHeader_encodeBinary(&ackHeader, &ack_msg, &tmpPos);
  309. UA_TcpAcknowledgeMessage_encodeBinary(&ackMessage, &ack_msg, &tmpPos);
  310. ack_msg.length = ackHeader.messageSize;
  311. connection->send(connection, &ack_msg);
  312. }
  313. /* OPN -> Open up/renew the securechannel */
  314. static void
  315. processOPN(UA_Connection *connection, UA_Server *server,
  316. const UA_ByteString *msg, size_t *offset) {
  317. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  318. connection->close(connection);
  319. return;
  320. }
  321. UA_UInt32 channelId;
  322. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, offset, &channelId);
  323. /* Opening up a channel with a channelid already set */
  324. if(!connection->channel && channelId != 0)
  325. retval |= UA_STATUSCODE_BADREQUESTTYPEINVALID;
  326. /* Renew a channel with the wrong channelid */
  327. if(connection->channel && channelId != connection->channel->securityToken.channelId)
  328. retval |= UA_STATUSCODE_BADREQUESTTYPEINVALID;
  329. UA_AsymmetricAlgorithmSecurityHeader asymHeader;
  330. retval |= UA_AsymmetricAlgorithmSecurityHeader_decodeBinary(msg, offset, &asymHeader);
  331. UA_SequenceHeader seqHeader;
  332. retval |= UA_SequenceHeader_decodeBinary(msg, offset, &seqHeader);
  333. UA_NodeId requestType;
  334. retval |= UA_NodeId_decodeBinary(msg, offset, &requestType);
  335. UA_OpenSecureChannelRequest r;
  336. retval |= UA_OpenSecureChannelRequest_decodeBinary(msg, offset, &r);
  337. /* Could not decode or wrong service type */
  338. if(retval != UA_STATUSCODE_GOOD || requestType.identifier.numeric != 446) {
  339. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  340. UA_NodeId_deleteMembers(&requestType);
  341. UA_OpenSecureChannelRequest_deleteMembers(&r);
  342. connection->close(connection);
  343. return;
  344. }
  345. /* Call the service */
  346. UA_OpenSecureChannelResponse p;
  347. UA_OpenSecureChannelResponse_init(&p);
  348. Service_OpenSecureChannel(server, connection, &r, &p);
  349. UA_OpenSecureChannelRequest_deleteMembers(&r);
  350. UA_SecureChannel *channel = connection->channel;
  351. /* Opening the channel failed */
  352. if(!channel) {
  353. UA_OpenSecureChannelResponse_deleteMembers(&p);
  354. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  355. connection->close(connection);
  356. return;
  357. }
  358. /* Set the starting sequence number */
  359. channel->receiveSequenceNumber = seqHeader.sequenceNumber;
  360. /* Allocate the return message */
  361. UA_ByteString resp_msg;
  362. UA_ByteString_init(&resp_msg);
  363. retval = connection->getSendBuffer(connection, connection->localConf.sendBufferSize, &resp_msg);
  364. if(retval != UA_STATUSCODE_GOOD) {
  365. UA_OpenSecureChannelResponse_deleteMembers(&p);
  366. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  367. connection->close(connection);
  368. return;
  369. }
  370. /* Encode the message after the secureconversationmessageheader */
  371. size_t tmpPos = 12; /* skip the header */
  372. #ifndef UA_ENABLE_MULTITHREADING
  373. seqHeader.sequenceNumber = ++channel->sendSequenceNumber;
  374. #else
  375. seqHeader.sequenceNumber = uatomic_add_return(&channel->sendSequenceNumber, 1);
  376. #endif
  377. retval |= UA_AsymmetricAlgorithmSecurityHeader_encodeBinary(&asymHeader, &resp_msg, &tmpPos); // just mirror back
  378. retval |= UA_SequenceHeader_encodeBinary(&seqHeader, &resp_msg, &tmpPos);
  379. UA_NodeId responseType = UA_NODEID_NUMERIC(0, UA_TYPES[UA_TYPES_OPENSECURECHANNELRESPONSE].binaryEncodingId);
  380. retval |= UA_NodeId_encodeBinary(&responseType, &resp_msg, &tmpPos);
  381. retval |= UA_OpenSecureChannelResponse_encodeBinary(&p, &resp_msg, &tmpPos);
  382. if(retval != UA_STATUSCODE_GOOD) {
  383. connection->releaseSendBuffer(connection, &resp_msg);
  384. UA_OpenSecureChannelResponse_deleteMembers(&p);
  385. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  386. connection->close(connection);
  387. return;
  388. }
  389. /* Encode the secureconversationmessageheader (cannot fail) and send */
  390. UA_SecureConversationMessageHeader respHeader;
  391. respHeader.messageHeader.messageTypeAndChunkType = UA_MESSAGETYPE_OPN + UA_CHUNKTYPE_FINAL;
  392. respHeader.messageHeader.messageSize = (UA_UInt32)tmpPos;
  393. respHeader.secureChannelId = p.securityToken.channelId;
  394. tmpPos = 0;
  395. UA_SecureConversationMessageHeader_encodeBinary(&respHeader, &resp_msg, &tmpPos);
  396. resp_msg.length = respHeader.messageHeader.messageSize;
  397. connection->send(connection, &resp_msg);
  398. /* Clean up */
  399. UA_OpenSecureChannelResponse_deleteMembers(&p);
  400. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  401. }
  402. static void
  403. processRequest(UA_SecureChannel *channel, UA_Server *server,
  404. UA_UInt32 requestId, const UA_ByteString *msg) {
  405. /* At 0, the nodeid starts... */
  406. size_t ppos = 0;
  407. size_t *offset = &ppos;
  408. /* Decode the nodeid */
  409. UA_NodeId requestTypeId;
  410. UA_StatusCode retval = UA_NodeId_decodeBinary(msg, offset, &requestTypeId);
  411. if(retval != UA_STATUSCODE_GOOD)
  412. return;
  413. /* Store the start-position of the request */
  414. size_t requestPos = *offset;
  415. /* Test if the service type nodeid has the right format */
  416. if(requestTypeId.identifierType != UA_NODEIDTYPE_NUMERIC ||
  417. requestTypeId.namespaceIndex != 0) {
  418. UA_NodeId_deleteMembers(&requestTypeId);
  419. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  420. "Received a non-numeric message type NodeId");
  421. sendError(channel, msg, requestPos, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  422. requestId, UA_STATUSCODE_BADSERVICEUNSUPPORTED);
  423. }
  424. /* Get the service pointers */
  425. UA_Service service = NULL;
  426. const UA_DataType *requestType = NULL;
  427. const UA_DataType *responseType = NULL;
  428. UA_Boolean sessionRequired = true;
  429. getServicePointers(requestTypeId.identifier.numeric, &requestType,
  430. &responseType, &service, &sessionRequired);
  431. if(!requestType) {
  432. if(requestTypeId.identifier.numeric == 787) {
  433. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  434. "Client requested a subscription, " \
  435. "but those are not enabled in the build");
  436. } else {
  437. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Unknown request %i",
  438. requestTypeId.identifier.numeric);
  439. }
  440. sendError(channel, msg, requestPos, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  441. requestId, UA_STATUSCODE_BADSERVICEUNSUPPORTED);
  442. return;
  443. }
  444. UA_assert(responseType);
  445. #ifdef UA_ENABLE_NONSTANDARD_STATELESS
  446. /* Stateless extension: Sessions are optional */
  447. sessionRequired = false;
  448. #endif
  449. /* Decode the request */
  450. void *request = UA_alloca(requestType->memSize);
  451. UA_RequestHeader *requestHeader = (UA_RequestHeader*)request;
  452. retval = UA_decodeBinary(msg, offset, request, requestType);
  453. if(retval != UA_STATUSCODE_GOOD) {
  454. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel, "Could not decode the request");
  455. sendError(channel, msg, requestPos, responseType, requestId, retval);
  456. return;
  457. }
  458. /* Prepare the respone */
  459. void *response = UA_alloca(responseType->memSize);
  460. UA_init(response, responseType);
  461. UA_Session *session = NULL; /* must be initialized before goto send_response */
  462. /* CreateSession doesn't need a session */
  463. if(requestType == &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST]) {
  464. Service_CreateSession(server, channel, request, response);
  465. goto send_response;
  466. }
  467. /* Find the matching session */
  468. session = UA_SecureChannel_getSession(channel, &requestHeader->authenticationToken);
  469. if(!session)
  470. session = UA_SessionManager_getSession(&server->sessionManager,
  471. &requestHeader->authenticationToken);
  472. if(requestType == &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST]) {
  473. if(!session) {
  474. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  475. "Trying to activate a session that is " \
  476. "not known in the server");
  477. sendError(channel, msg, requestPos, responseType,
  478. requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  479. UA_deleteMembers(request, requestType);
  480. return;
  481. }
  482. Service_ActivateSession(server, channel, session, request, response);
  483. goto send_response;
  484. }
  485. /* Set an anonymous, inactive session for services that need no session */
  486. UA_Session anonymousSession;
  487. if(!session) {
  488. if(sessionRequired) {
  489. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  490. "Service request %i without a valid session",
  491. requestType->binaryEncodingId);
  492. sendError(channel, msg, requestPos, responseType,
  493. requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  494. UA_deleteMembers(request, requestType);
  495. return;
  496. }
  497. UA_Session_init(&anonymousSession);
  498. anonymousSession.sessionId = UA_NODEID_GUID(0, UA_GUID_NULL);
  499. anonymousSession.channel = channel;
  500. session = &anonymousSession;
  501. }
  502. /* Trying to use a non-activated session? */
  503. if(sessionRequired && !session->activated) {
  504. UA_LOG_INFO_SESSION(server->config.logger, session,
  505. "Calling service %i on a non-activated session",
  506. requestType->binaryEncodingId);
  507. sendError(channel, msg, requestPos, responseType,
  508. requestId, UA_STATUSCODE_BADSESSIONNOTACTIVATED);
  509. UA_SessionManager_removeSession(&server->sessionManager,
  510. &session->authenticationToken);
  511. UA_deleteMembers(request, requestType);
  512. return;
  513. }
  514. /* The session is bound to another channel */
  515. if(session->channel != channel) {
  516. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  517. "Client tries to use an obsolete securechannel");
  518. sendError(channel, msg, requestPos, responseType,
  519. requestId, UA_STATUSCODE_BADSECURECHANNELIDINVALID);
  520. UA_deleteMembers(request, requestType);
  521. return;
  522. }
  523. /* Update the session lifetime */
  524. UA_Session_updateLifetime(session);
  525. #ifdef UA_ENABLE_SUBSCRIPTIONS
  526. /* The publish request is not answered immediately */
  527. if(requestType == &UA_TYPES[UA_TYPES_PUBLISHREQUEST]) {
  528. Service_Publish(server, session, request, requestId);
  529. UA_deleteMembers(request, requestType);
  530. return;
  531. }
  532. #endif
  533. /* Call the service */
  534. service(server, session, request, response);
  535. send_response:
  536. /* Send the response */
  537. init_response_header(request, response);
  538. retval = UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  539. if(retval != UA_STATUSCODE_GOOD)
  540. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Could not send the message over "
  541. "the SecureChannel with error code 0x%08x", retval);
  542. /* See if we need to return publish requests without a subscription */
  543. if(session && requestType == &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSREQUEST])
  544. UA_Session_answerPublishRequestsWithoutSubscription(session);
  545. /* Clean up */
  546. UA_deleteMembers(request, requestType);
  547. UA_deleteMembers(response, responseType);
  548. }
  549. /* MSG -> Normal request */
  550. static void
  551. processMSG(UA_Connection *connection, UA_Server *server,
  552. const UA_TcpMessageHeader *messageHeader,
  553. const UA_ByteString *msg, size_t *offset) {
  554. /* Decode the header */
  555. UA_UInt32 channelId = 0;
  556. UA_UInt32 tokenId = 0;
  557. UA_SequenceHeader sequenceHeader;
  558. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, offset, &channelId);
  559. retval |= UA_UInt32_decodeBinary(msg, offset, &tokenId);
  560. retval |= UA_SequenceHeader_decodeBinary(msg, offset, &sequenceHeader);
  561. if(retval != UA_STATUSCODE_GOOD)
  562. return;
  563. /* Get the SecureChannel */
  564. UA_SecureChannel *channel = connection->channel;
  565. UA_SecureChannel anonymousChannel; /* use if no channel specified */
  566. if(!channel) {
  567. UA_SecureChannel_init(&anonymousChannel);
  568. anonymousChannel.connection = connection;
  569. channel = &anonymousChannel;
  570. }
  571. /* Is the channel attached to connection? */
  572. if(channelId != channel->securityToken.channelId) {
  573. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  574. "Connection %i | Received MSG with the channel id %i not bound to the connection",
  575. connection->sockfd, channelId);
  576. Service_CloseSecureChannel(server, channel);
  577. connection->close(connection);
  578. return;
  579. }
  580. /* Does the sequence number match? */
  581. retval = UA_SecureChannel_processSequenceNumber(sequenceHeader.sequenceNumber, channel);
  582. if (retval != UA_STATUSCODE_GOOD){
  583. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  584. "The sequence number was not increased by one. Got %i, expected %i",
  585. sequenceHeader.sequenceNumber, channel->receiveSequenceNumber + 1);
  586. sendError(channel, msg, *offset, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  587. sequenceHeader.requestId, UA_STATUSCODE_BADSECURITYCHECKSFAILED);
  588. Service_CloseSecureChannel(server, channel);
  589. connection->close(connection);
  590. return;
  591. }
  592. /* Does the token match? */
  593. if(tokenId != channel->securityToken.tokenId) {
  594. if(tokenId != channel->nextSecurityToken.tokenId) {
  595. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  596. "Request with a wrong security token. Closing the SecureChannel.");
  597. Service_CloseSecureChannel(server, channel);
  598. connection->close(connection);
  599. return;
  600. }
  601. UA_SecureChannel_revolveTokens(channel);
  602. }
  603. /* Process chunk to get complete request */
  604. UA_Boolean deleteRequest = false;
  605. UA_ByteString request = processChunk(channel, server, messageHeader, sequenceHeader.requestId,
  606. msg, *offset, messageHeader->messageSize - 24, &deleteRequest);
  607. *offset += (messageHeader->messageSize - 24);
  608. if(request.length > 0) {
  609. /* Process the request */
  610. processRequest(channel, server, sequenceHeader.requestId, &request);
  611. if(deleteRequest)
  612. UA_ByteString_deleteMembers(&request);
  613. }
  614. /* Clean up a possible anonymous channel */
  615. if(channel == &anonymousChannel)
  616. UA_SecureChannel_deleteMembersCleanup(channel);
  617. }
  618. /* CLO -> Close the secure channel */
  619. static void
  620. processCLO(UA_Connection *connection, UA_Server *server,
  621. const UA_ByteString *msg, size_t *offset) {
  622. UA_UInt32 channelId;
  623. UA_UInt32 tokenId = 0;
  624. UA_SequenceHeader sequenceHeader;
  625. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, offset, &channelId);
  626. retval |= UA_UInt32_decodeBinary(msg, offset, &tokenId);
  627. retval |= UA_SequenceHeader_decodeBinary(msg, offset, &sequenceHeader);
  628. if(retval != UA_STATUSCODE_GOOD)
  629. return;
  630. UA_SecureChannel *channel = connection->channel;
  631. if(!channel || channel->securityToken.channelId != channelId ||
  632. channel->securityToken.tokenId != tokenId)
  633. return;
  634. if(sequenceHeader.sequenceNumber != channel->receiveSequenceNumber + 1)
  635. return;
  636. Service_CloseSecureChannel(server, connection->channel);
  637. }
  638. /* Process binary message received from Connection dose not modify UA_ByteString
  639. * you have to free it youself. use of connection->getSendBuffer() and
  640. * connection->send() to answer Message */
  641. void
  642. UA_Server_processBinaryMessage(UA_Server *server, UA_Connection *connection,
  643. const UA_ByteString *msg) {
  644. size_t offset= 0;
  645. UA_TcpMessageHeader tcpMessageHeader;
  646. do {
  647. /* Decode the message header */
  648. UA_StatusCode retval = UA_TcpMessageHeader_decodeBinary(msg, &offset, &tcpMessageHeader);
  649. if(retval != UA_STATUSCODE_GOOD) {
  650. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  651. "Decoding of message header failed on Connection %i",
  652. connection->sockfd);
  653. connection->close(connection);
  654. break;
  655. }
  656. if(tcpMessageHeader.messageSize < 16) {
  657. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  658. "The message is suspiciously small on Connection %i",
  659. connection->sockfd);
  660. connection->close(connection);
  661. break;
  662. }
  663. /* Set the expected position after processing the chunk */
  664. size_t targetpos = offset - 8 + tcpMessageHeader.messageSize;
  665. /* Process the message */
  666. switch(tcpMessageHeader.messageTypeAndChunkType & 0x00ffffff) {
  667. case UA_MESSAGETYPE_HEL:
  668. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  669. "Connection %i | Process a HEL", connection->sockfd);
  670. processHEL(connection, msg, &offset);
  671. break;
  672. case UA_MESSAGETYPE_OPN:
  673. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  674. "Connection %i | Process a OPN", connection->sockfd);
  675. processOPN(connection, server, msg, &offset);
  676. break;
  677. case UA_MESSAGETYPE_MSG:
  678. #ifndef UA_ENABLE_NONSTANDARD_STATELESS
  679. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  680. UA_LOG_DEBUG(server->config.logger, UA_LOGCATEGORY_NETWORK,
  681. "Connection %i | Received a MSG, but the connection " \
  682. "is not established", connection->sockfd);
  683. connection->close(connection);
  684. return;
  685. }
  686. #endif
  687. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  688. "Connection %i | Process a MSG", connection->sockfd);
  689. processMSG(connection, server, &tcpMessageHeader, msg, &offset);
  690. break;
  691. case UA_MESSAGETYPE_CLO:
  692. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  693. "Connection %i | Process a CLO", connection->sockfd);
  694. processCLO(connection, server, msg, &offset);
  695. return;
  696. default:
  697. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  698. "Connection %i | Unknown chunk type", connection->sockfd);
  699. }
  700. /* Loop to process the next message in the stream */
  701. if(offset != targetpos) {
  702. UA_LOG_DEBUG(server->config.logger, UA_LOGCATEGORY_NETWORK,
  703. "Connection %i | Message was not entirely processed. " \
  704. "Skip from position %i to position %i; message length is %i",
  705. connection->sockfd, offset, targetpos, msg->length);
  706. offset = targetpos;
  707. }
  708. } while(msg->length > offset);
  709. }