ua_server_binary.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470
  1. #include "ua_util.h"
  2. #include "ua_server_internal.h"
  3. #include "ua_services.h"
  4. #include "ua_securechannel_manager.h"
  5. #include "ua_session_manager.h"
  6. #include "ua_types_generated_encoding_binary.h"
  7. #include "ua_transport_generated.h"
  8. #include "ua_transport_generated_encoding_binary.h"
  9. /** Max size of messages that are allocated on the stack */
  10. #define MAX_STACK_MESSAGE 65536
  11. static void processHEL(UA_Connection *connection, const UA_ByteString *msg, size_t *pos) {
  12. UA_TcpHelloMessage helloMessage;
  13. if(UA_TcpHelloMessage_decodeBinary(msg, pos, &helloMessage) != UA_STATUSCODE_GOOD) {
  14. connection->close(connection);
  15. return;
  16. }
  17. connection->remoteConf.maxChunkCount = helloMessage.maxChunkCount;
  18. connection->remoteConf.maxMessageSize = helloMessage.maxMessageSize;
  19. connection->remoteConf.protocolVersion = helloMessage.protocolVersion;
  20. connection->remoteConf.recvBufferSize = helloMessage.receiveBufferSize;
  21. if(connection->localConf.sendBufferSize > helloMessage.receiveBufferSize)
  22. connection->localConf.sendBufferSize = helloMessage.receiveBufferSize;
  23. if(connection->localConf.recvBufferSize > helloMessage.sendBufferSize)
  24. connection->localConf.recvBufferSize = helloMessage.sendBufferSize;
  25. connection->remoteConf.sendBufferSize = helloMessage.sendBufferSize;
  26. connection->state = UA_CONNECTION_ESTABLISHED;
  27. UA_TcpHelloMessage_deleteMembers(&helloMessage);
  28. // build acknowledge response
  29. UA_TcpAcknowledgeMessage ackMessage;
  30. ackMessage.protocolVersion = connection->localConf.protocolVersion;
  31. ackMessage.receiveBufferSize = connection->localConf.recvBufferSize;
  32. ackMessage.sendBufferSize = connection->localConf.sendBufferSize;
  33. ackMessage.maxMessageSize = connection->localConf.maxMessageSize;
  34. ackMessage.maxChunkCount = connection->localConf.maxChunkCount;
  35. UA_TcpMessageHeader ackHeader;
  36. ackHeader.messageTypeAndFinal = UA_MESSAGETYPEANDFINAL_ACKF;
  37. ackHeader.messageSize = 8 + 20; /* ackHeader + ackMessage */
  38. UA_ByteString ack_msg;
  39. if(connection->getSendBuffer(connection, connection->remoteConf.recvBufferSize,
  40. &ack_msg) != UA_STATUSCODE_GOOD)
  41. return;
  42. size_t tmpPos = 0;
  43. UA_TcpMessageHeader_encodeBinary(&ackHeader, &ack_msg, &tmpPos);
  44. UA_TcpAcknowledgeMessage_encodeBinary(&ackMessage, &ack_msg, &tmpPos);
  45. ack_msg.length = ackHeader.messageSize;
  46. connection->send(connection, &ack_msg);
  47. }
  48. static void processOPN(UA_Connection *connection, UA_Server *server, const UA_ByteString *msg, size_t *pos) {
  49. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  50. connection->close(connection);
  51. return;
  52. }
  53. UA_UInt32 secureChannelId;
  54. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, pos, &secureChannelId);
  55. UA_AsymmetricAlgorithmSecurityHeader asymHeader;
  56. retval |= UA_AsymmetricAlgorithmSecurityHeader_decodeBinary(msg, pos, &asymHeader);
  57. UA_SequenceHeader seqHeader;
  58. retval |= UA_SequenceHeader_decodeBinary(msg, pos, &seqHeader);
  59. UA_NodeId requestType;
  60. retval |= UA_NodeId_decodeBinary(msg, pos, &requestType);
  61. UA_OpenSecureChannelRequest r;
  62. retval |= UA_OpenSecureChannelRequest_decodeBinary(msg, pos, &r);
  63. if(retval != UA_STATUSCODE_GOOD || requestType.identifier.numeric != 446) {
  64. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  65. UA_SequenceHeader_deleteMembers(&seqHeader);
  66. UA_NodeId_deleteMembers(&requestType);
  67. UA_OpenSecureChannelRequest_deleteMembers(&r);
  68. connection->close(connection);
  69. return;
  70. }
  71. UA_OpenSecureChannelResponse p;
  72. UA_OpenSecureChannelResponse_init(&p);
  73. Service_OpenSecureChannel(server, connection, &r, &p);
  74. UA_OpenSecureChannelRequest_deleteMembers(&r);
  75. UA_SecureChannel *channel = connection->channel;
  76. if(!channel) {
  77. connection->close(connection);
  78. UA_OpenSecureChannelResponse_deleteMembers(&p);
  79. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  80. return;
  81. }
  82. /* send the response with an asymmetric security header */
  83. #ifndef UA_MULTITHREADING
  84. seqHeader.sequenceNumber = ++channel->sequenceNumber;
  85. #else
  86. seqHeader.sequenceNumber = uatomic_add_return(&channel->sequenceNumber, 1);
  87. #endif
  88. UA_SecureConversationMessageHeader respHeader;
  89. respHeader.messageHeader.messageTypeAndFinal = UA_MESSAGETYPEANDFINAL_OPNF;
  90. respHeader.messageHeader.messageSize = 0;
  91. respHeader.secureChannelId = p.securityToken.channelId;
  92. UA_NodeId responseType = UA_NODEID_NUMERIC(0, UA_NS0ID_OPENSECURECHANNELRESPONSE +
  93. UA_ENCODINGOFFSET_BINARY);
  94. UA_ByteString resp_msg;
  95. retval = connection->getSendBuffer(connection, connection->remoteConf.recvBufferSize, &resp_msg);
  96. if(retval != UA_STATUSCODE_GOOD) {
  97. UA_OpenSecureChannelResponse_deleteMembers(&p);
  98. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  99. return;
  100. }
  101. size_t tmpPos = 12; /* skip the secureconversationmessageheader for now */
  102. retval |= UA_AsymmetricAlgorithmSecurityHeader_encodeBinary(&asymHeader, &resp_msg, &tmpPos); // just mirror back
  103. retval |= UA_SequenceHeader_encodeBinary(&seqHeader, &resp_msg, &tmpPos); // just mirror back
  104. retval |= UA_NodeId_encodeBinary(&responseType, &resp_msg, &tmpPos);
  105. retval |= UA_OpenSecureChannelResponse_encodeBinary(&p, &resp_msg, &tmpPos);
  106. if(retval != UA_STATUSCODE_GOOD) {
  107. connection->releaseSendBuffer(connection, &resp_msg);
  108. connection->close(connection);
  109. } else {
  110. respHeader.messageHeader.messageSize = tmpPos;
  111. tmpPos = 0;
  112. UA_SecureConversationMessageHeader_encodeBinary(&respHeader, &resp_msg, &tmpPos);
  113. resp_msg.length = respHeader.messageHeader.messageSize;
  114. connection->send(connection, &resp_msg);
  115. }
  116. UA_OpenSecureChannelResponse_deleteMembers(&p);
  117. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  118. }
  119. static void init_response_header(const UA_RequestHeader *p, UA_ResponseHeader *r) {
  120. r->requestHandle = p->requestHandle;
  121. r->stringTableSize = 0;
  122. r->timestamp = UA_DateTime_now();
  123. }
  124. /* The request/response are casted to the header (first element of their struct) */
  125. static void invoke_service(UA_Server *server, UA_SecureChannel *channel, UA_UInt32 requestId,
  126. UA_RequestHeader *request, const UA_DataType *responseType,
  127. void (*service)(UA_Server*, UA_Session*, void*, void*)) {
  128. UA_ResponseHeader *response = UA_alloca(responseType->memSize);
  129. UA_init(response, responseType);
  130. init_response_header(request, response);
  131. /* try to get the session from the securechannel first */
  132. UA_Session *session = UA_SecureChannel_getSession(channel, &request->authenticationToken);
  133. #ifdef EXTENSION_STATELESS
  134. if(request->authenticationToken.namespaceIndex == 0
  135. && request->authenticationToken.identifierType == UA_NODEIDTYPE_NUMERIC
  136. && request->authenticationToken.identifier.numeric == 0
  137. && (responseType->typeIndex == UA_TYPES_READRESPONSE
  138. || responseType->typeIndex == UA_TYPES_WRITERESPONSE
  139. || responseType->typeIndex == UA_TYPES_BROWSERESPONSE)) {
  140. session = &anonymousSession;
  141. service(server, session, request, response);
  142. } else {
  143. #endif
  144. if(!session || session->channel != channel) {
  145. response->serviceResult = UA_STATUSCODE_BADSESSIONIDINVALID;
  146. } else if(session->activated == UA_FALSE) {
  147. response->serviceResult = UA_STATUSCODE_BADSESSIONNOTACTIVATED;
  148. /* /\* the session is invalidated FIXME: do this delayed*\/ */
  149. /* UA_SessionManager_removeSession(&server->sessionManager, server, &request->authenticationToken); */
  150. } else {
  151. UA_Session_updateLifetime(session);
  152. service(server, session, request, response);
  153. }
  154. #ifdef EXTENSION_STATELESS
  155. }
  156. #endif
  157. UA_StatusCode retval = UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  158. if(retval != UA_STATUSCODE_GOOD) {
  159. if(retval == UA_STATUSCODE_BADENCODINGLIMITSEXCEEDED)
  160. response->serviceResult = UA_STATUSCODE_BADRESPONSETOOLARGE;
  161. else
  162. response->serviceResult = retval;
  163. UA_SecureChannel_sendBinaryMessage(channel, requestId, response, &UA_TYPES[UA_TYPES_SERVICEFAULT]);
  164. }
  165. UA_deleteMembers(response, responseType);
  166. }
  167. #define INVOKE_SERVICE(REQUEST, RESPONSETYPE) do { \
  168. UA_##REQUEST##Request p; \
  169. if(UA_##REQUEST##Request_decodeBinary(msg, pos, &p)) \
  170. return; \
  171. invoke_service(server, clientChannel, sequenceHeader.requestId, \
  172. &p.requestHeader, &UA_TYPES[RESPONSETYPE], \
  173. (void (*)(UA_Server*, UA_Session*, void*,void*))Service_##REQUEST); \
  174. UA_##REQUEST##Request_deleteMembers(&p); \
  175. } while(0)
  176. static void processMSG(UA_Connection *connection, UA_Server *server, const UA_ByteString *msg, size_t *pos) {
  177. /* Read in the securechannel */
  178. UA_UInt32 secureChannelId;
  179. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, pos, &secureChannelId);
  180. if(retval != UA_STATUSCODE_GOOD)
  181. return;
  182. /* the anonymous channel is used e.g. to allow getEndpoints without a channel */
  183. UA_SecureChannel *clientChannel = connection->channel;
  184. UA_SecureChannel anonymousChannel;
  185. if(!clientChannel) {
  186. UA_SecureChannel_init(&anonymousChannel);
  187. anonymousChannel.connection = connection;
  188. clientChannel = &anonymousChannel;
  189. }
  190. /* Read the security header */
  191. UA_UInt32 tokenId = 0;
  192. UA_SequenceHeader sequenceHeader;
  193. retval = UA_UInt32_decodeBinary(msg, pos, &tokenId);
  194. retval |= UA_SequenceHeader_decodeBinary(msg, pos, &sequenceHeader);
  195. if(retval != UA_STATUSCODE_GOOD)
  196. return;
  197. #ifndef EXTENSION_STATELESS
  198. if(tokenId == 0) // 0 is invalid
  199. return;
  200. #endif
  201. if(clientChannel != &anonymousChannel && tokenId != clientChannel->securityToken.tokenId) {
  202. if(tokenId != clientChannel->nextSecurityToken.tokenId) {
  203. /* close the securechannel but keep the connection open */
  204. UA_LOG_INFO(server->logger, UA_LOGCATEGORY_SECURECHANNEL,
  205. "Request with a wrong security token. Closing the SecureChannel %i.",
  206. clientChannel->securityToken.channelId);
  207. Service_CloseSecureChannel(server, clientChannel->securityToken.channelId);
  208. return;
  209. }
  210. UA_SecureChannel_revolveTokens(clientChannel);
  211. }
  212. /* Read the request type */
  213. UA_NodeId requestType;
  214. if(UA_NodeId_decodeBinary(msg, pos, &requestType) != UA_STATUSCODE_GOOD)
  215. return;
  216. if(requestType.identifierType != UA_NODEIDTYPE_NUMERIC) {
  217. UA_NodeId_deleteMembers(&requestType);
  218. return;
  219. }
  220. switch(requestType.identifier.numeric - UA_ENCODINGOFFSET_BINARY) {
  221. case UA_NS0ID_GETENDPOINTSREQUEST: {
  222. if(clientChannel == &anonymousChannel)
  223. UA_LOG_DEBUG(server->logger, UA_LOGCATEGORY_NETWORK, "Processing GetEndpointsRequest on Connection %i",
  224. connection->sockfd);
  225. else
  226. UA_LOG_DEBUG(server->logger, UA_LOGCATEGORY_SECURECHANNEL, "Processing GetEndpointsRequest on SecureChannel %i",
  227. clientChannel->securityToken.channelId);
  228. UA_GetEndpointsRequest p;
  229. UA_GetEndpointsResponse r;
  230. if(UA_GetEndpointsRequest_decodeBinary(msg, pos, &p))
  231. return;
  232. UA_GetEndpointsResponse_init(&r);
  233. init_response_header(&p.requestHeader, &r.responseHeader);
  234. Service_GetEndpoints(server, &p, &r);
  235. UA_GetEndpointsRequest_deleteMembers(&p);
  236. UA_SecureChannel_sendBinaryMessage(clientChannel, sequenceHeader.requestId, &r,
  237. &UA_TYPES[UA_TYPES_GETENDPOINTSRESPONSE]);
  238. UA_GetEndpointsResponse_deleteMembers(&r);
  239. break;
  240. }
  241. case UA_NS0ID_FINDSERVERSREQUEST: {
  242. if(clientChannel == &anonymousChannel)
  243. UA_LOG_DEBUG(server->logger, UA_LOGCATEGORY_NETWORK, "Processing FindServerRequest on Connection %i",
  244. connection->sockfd);
  245. else
  246. UA_LOG_DEBUG(server->logger, UA_LOGCATEGORY_SECURECHANNEL, "Processing FindServerRequest on SecureChannel %i",
  247. clientChannel->securityToken.channelId);
  248. UA_FindServersRequest p;
  249. UA_FindServersResponse r;
  250. if(UA_FindServersRequest_decodeBinary(msg, pos, &p))
  251. return;
  252. UA_FindServersResponse_init(&r);
  253. init_response_header(&p.requestHeader, &r.responseHeader);
  254. Service_FindServers(server, &p, &r);
  255. UA_FindServersRequest_deleteMembers(&p);
  256. UA_SecureChannel_sendBinaryMessage(clientChannel, sequenceHeader.requestId, &r,
  257. &UA_TYPES[UA_TYPES_FINDSERVERSRESPONSE]);
  258. UA_FindServersResponse_deleteMembers(&r);
  259. break;
  260. }
  261. case UA_NS0ID_CREATESESSIONREQUEST: {
  262. UA_CreateSessionRequest p;
  263. UA_CreateSessionResponse r;
  264. if(UA_CreateSessionRequest_decodeBinary(msg, pos, &p))
  265. return;
  266. UA_CreateSessionResponse_init(&r);
  267. init_response_header(&p.requestHeader, &r.responseHeader);
  268. Service_CreateSession(server, clientChannel, &p, &r);
  269. UA_CreateSessionRequest_deleteMembers(&p);
  270. UA_SecureChannel_sendBinaryMessage(clientChannel, sequenceHeader.requestId, &r,
  271. &UA_TYPES[UA_TYPES_CREATESESSIONRESPONSE]);
  272. UA_CreateSessionResponse_deleteMembers(&r);
  273. break;
  274. }
  275. case UA_NS0ID_ACTIVATESESSIONREQUEST: {
  276. UA_ActivateSessionRequest p;
  277. UA_ActivateSessionResponse r;
  278. if(UA_ActivateSessionRequest_decodeBinary(msg, pos, &p))
  279. return;
  280. UA_ActivateSessionResponse_init(&r);
  281. init_response_header(&p.requestHeader, &r.responseHeader);
  282. Service_ActivateSession(server, clientChannel, &p, &r);
  283. UA_ActivateSessionRequest_deleteMembers(&p);
  284. UA_SecureChannel_sendBinaryMessage(clientChannel, sequenceHeader.requestId, &r,
  285. &UA_TYPES[UA_TYPES_ACTIVATESESSIONRESPONSE]);
  286. UA_ActivateSessionResponse_deleteMembers(&r);
  287. break;
  288. }
  289. case UA_NS0ID_CLOSESESSIONREQUEST:
  290. INVOKE_SERVICE(CloseSession, UA_TYPES_CLOSESESSIONRESPONSE);
  291. break;
  292. case UA_NS0ID_READREQUEST:
  293. INVOKE_SERVICE(Read, UA_TYPES_READRESPONSE);
  294. break;
  295. case UA_NS0ID_WRITEREQUEST:
  296. INVOKE_SERVICE(Write, UA_TYPES_WRITERESPONSE);
  297. break;
  298. case UA_NS0ID_BROWSEREQUEST:
  299. INVOKE_SERVICE(Browse, UA_TYPES_BROWSERESPONSE);
  300. break;
  301. case UA_NS0ID_BROWSENEXTREQUEST:
  302. INVOKE_SERVICE(BrowseNext, UA_TYPES_BROWSENEXTRESPONSE);
  303. break;
  304. case UA_NS0ID_REGISTERNODESREQUEST:
  305. INVOKE_SERVICE(RegisterNodes, UA_TYPES_REGISTERNODESRESPONSE);
  306. break;
  307. case UA_NS0ID_UNREGISTERNODESREQUEST:
  308. INVOKE_SERVICE(UnregisterNodes, UA_TYPES_UNREGISTERNODESRESPONSE);
  309. break;
  310. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST:
  311. INVOKE_SERVICE(TranslateBrowsePathsToNodeIds, UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSRESPONSE);
  312. break;
  313. #ifdef ENABLE_SUBSCRIPTIONS
  314. case UA_NS0ID_CREATESUBSCRIPTIONREQUEST:
  315. INVOKE_SERVICE(CreateSubscription, UA_TYPES_CREATESUBSCRIPTIONRESPONSE);
  316. break;
  317. case UA_NS0ID_PUBLISHREQUEST:
  318. INVOKE_SERVICE(Publish, UA_TYPES_PUBLISHRESPONSE);
  319. break;
  320. case UA_NS0ID_MODIFYSUBSCRIPTIONREQUEST:
  321. INVOKE_SERVICE(ModifySubscription, UA_TYPES_MODIFYSUBSCRIPTIONRESPONSE);
  322. break;
  323. case UA_NS0ID_DELETESUBSCRIPTIONSREQUEST:
  324. INVOKE_SERVICE(DeleteSubscriptions, UA_TYPES_DELETESUBSCRIPTIONSRESPONSE);
  325. break;
  326. case UA_NS0ID_CREATEMONITOREDITEMSREQUEST:
  327. INVOKE_SERVICE(CreateMonitoredItems, UA_TYPES_CREATEMONITOREDITEMSRESPONSE);
  328. break;
  329. case UA_NS0ID_DELETEMONITOREDITEMSREQUEST:
  330. INVOKE_SERVICE(DeleteMonitoredItems, UA_TYPES_DELETEMONITOREDITEMSRESPONSE);
  331. break;
  332. #endif
  333. #ifdef ENABLE_METHODCALLS
  334. case UA_NS0ID_CALLREQUEST:
  335. INVOKE_SERVICE(Call, UA_TYPES_CALLRESPONSE);
  336. break;
  337. #endif
  338. #ifdef ENABLE_NODEMANAGEMENT
  339. case UA_NS0ID_ADDNODESREQUEST:
  340. INVOKE_SERVICE(AddNodes, UA_TYPES_ADDNODESRESPONSE);
  341. break;
  342. case UA_NS0ID_ADDREFERENCESREQUEST:
  343. INVOKE_SERVICE(AddReferences, UA_TYPES_ADDREFERENCESRESPONSE);
  344. break;
  345. case UA_NS0ID_DELETENODESREQUEST:
  346. INVOKE_SERVICE(DeleteNodes, UA_TYPES_DELETENODESRESPONSE);
  347. break;
  348. case UA_NS0ID_DELETEREFERENCESREQUEST:
  349. INVOKE_SERVICE(DeleteReferences, UA_TYPES_DELETEREFERENCESRESPONSE);
  350. break;
  351. #endif
  352. default: {
  353. if(requestType.namespaceIndex == 0 && requestType.identifier.numeric==787)
  354. UA_LOG_INFO(server->logger, UA_LOGCATEGORY_NETWORK,
  355. "Client requested a subscription that are not supported, the message will be skipped");
  356. else
  357. UA_LOG_INFO(server->logger, UA_LOGCATEGORY_NETWORK, "Unknown request: NodeId(ns=%d, i=%d)",
  358. requestType.namespaceIndex, requestType.identifier.numeric);
  359. UA_RequestHeader p;
  360. UA_ServiceFault r;
  361. if(UA_RequestHeader_decodeBinary(msg, pos, &p) != UA_STATUSCODE_GOOD)
  362. return;
  363. UA_ServiceFault_init(&r);
  364. init_response_header(&p, &r.responseHeader);
  365. r.responseHeader.serviceResult = UA_STATUSCODE_BADSERVICEUNSUPPORTED;
  366. UA_SecureChannel_sendBinaryMessage(clientChannel, sequenceHeader.requestId, &r,
  367. &UA_TYPES[UA_TYPES_SERVICEFAULT]);
  368. UA_RequestHeader_deleteMembers(&p);
  369. UA_ServiceFault_deleteMembers(&r);
  370. break;
  371. }
  372. }
  373. }
  374. static void processCLO(UA_Connection *connection, UA_Server *server, const UA_ByteString *msg, size_t *pos) {
  375. UA_UInt32 secureChannelId;
  376. UA_StatusCode retval = UA_UInt32_decodeBinary(msg, pos, &secureChannelId);
  377. if(retval != UA_STATUSCODE_GOOD || !connection->channel ||
  378. connection->channel->securityToken.channelId != secureChannelId)
  379. return;
  380. Service_CloseSecureChannel(server, secureChannelId);
  381. }
  382. /**
  383. * process binary message received from Connection
  384. * dose not modify UA_ByteString you have to free it youself.
  385. * use of connection->getSendBuffer() and connection->sent() to answer Message
  386. */
  387. void UA_Server_processBinaryMessage(UA_Server *server, UA_Connection *connection, const UA_ByteString *msg) {
  388. size_t pos = 0;
  389. UA_TcpMessageHeader tcpMessageHeader;
  390. do {
  391. if(UA_TcpMessageHeader_decodeBinary(msg, &pos, &tcpMessageHeader)) {
  392. UA_LOG_INFO(server->logger, UA_LOGCATEGORY_NETWORK, "Decoding of message header failed");
  393. connection->close(connection);
  394. break;
  395. }
  396. size_t targetpos = pos - 8 + tcpMessageHeader.messageSize;
  397. switch(tcpMessageHeader.messageTypeAndFinal & 0xffffff) {
  398. case UA_MESSAGETYPEANDFINAL_HELF & 0xffffff:
  399. processHEL(connection, msg, &pos);
  400. break;
  401. case UA_MESSAGETYPEANDFINAL_OPNF & 0xffffff:
  402. processOPN(connection, server, msg, &pos);
  403. break;
  404. case UA_MESSAGETYPEANDFINAL_MSGF & 0xffffff:
  405. #ifndef EXTENSION_STATELESS
  406. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  407. connection->close(connection);
  408. return;
  409. }
  410. #endif
  411. processMSG(connection, server, msg, &pos);
  412. break;
  413. case UA_MESSAGETYPEANDFINAL_CLOF & 0xffffff:
  414. processCLO(connection, server, msg, &pos);
  415. connection->close(connection);
  416. return;
  417. default:
  418. UA_LOG_INFO(server->logger, UA_LOGCATEGORY_NETWORK, "Unknown request type on Connection %i", connection->sockfd);
  419. }
  420. UA_TcpMessageHeader_deleteMembers(&tcpMessageHeader);
  421. if(pos != targetpos) {
  422. UA_LOG_INFO(server->logger, UA_LOGCATEGORY_NETWORK,
  423. "Message on Connection %i was not entirely processed. Arrived at position %i, skip after the announced length to position %i",
  424. connection->sockfd, pos, targetpos);
  425. pos = targetpos;
  426. }
  427. } while(msg->length > pos);
  428. }