ua_server_binary.c 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732
  1. /* This Source Code Form is subject to the terms of the Mozilla Public
  2. * License, v. 2.0. If a copy of the MPL was not distributed with this
  3. * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
  4. #include "ua_util.h"
  5. #include "ua_server_internal.h"
  6. #include "ua_services.h"
  7. #include "ua_securechannel_manager.h"
  8. #include "ua_session_manager.h"
  9. #include "ua_types_generated_encoding_binary.h"
  10. #include "ua_transport_generated.h"
  11. #include "ua_transport_generated_handling.h"
  12. #include "ua_transport_generated_encoding_binary.h"
  13. /********************/
  14. /* Helper Functions */
  15. /********************/
  16. static void
  17. sendError(UA_SecureChannel *channel, const UA_ByteString *msg,
  18. size_t offset, const UA_DataType *responseType,
  19. UA_UInt32 requestId, UA_StatusCode error) {
  20. UA_RequestHeader requestHeader;
  21. UA_StatusCode retval = UA_RequestHeader_decodeBinary(msg, &offset, &requestHeader);
  22. if(retval != UA_STATUSCODE_GOOD)
  23. return;
  24. void *response = UA_alloca(responseType->memSize);
  25. UA_init(response, responseType);
  26. UA_ResponseHeader *responseHeader = (UA_ResponseHeader*)response;
  27. responseHeader->requestHandle = requestHeader.requestHandle;
  28. responseHeader->timestamp = UA_DateTime_now();
  29. responseHeader->serviceResult = error;
  30. UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  31. UA_RequestHeader_deleteMembers(&requestHeader);
  32. UA_ResponseHeader_deleteMembers(responseHeader);
  33. }
  34. static void
  35. getServicePointers(UA_UInt32 requestTypeId, const UA_DataType **requestType,
  36. const UA_DataType **responseType, UA_Service *service,
  37. UA_Boolean *requiresSession) {
  38. switch(requestTypeId) {
  39. case UA_NS0ID_GETENDPOINTSREQUEST_ENCODING_DEFAULTBINARY:
  40. *service = (UA_Service)Service_GetEndpoints;
  41. *requestType = &UA_TYPES[UA_TYPES_GETENDPOINTSREQUEST];
  42. *responseType = &UA_TYPES[UA_TYPES_GETENDPOINTSRESPONSE];
  43. *requiresSession = false;
  44. break;
  45. case UA_NS0ID_FINDSERVERSREQUEST_ENCODING_DEFAULTBINARY:
  46. *service = (UA_Service)Service_FindServers;
  47. *requestType = &UA_TYPES[UA_TYPES_FINDSERVERSREQUEST];
  48. *responseType = &UA_TYPES[UA_TYPES_FINDSERVERSRESPONSE];
  49. *requiresSession = false;
  50. break;
  51. #ifdef UA_ENABLE_DISCOVERY
  52. # ifdef UA_ENABLE_DISCOVERY_MULTICAST
  53. case UA_NS0ID_FINDSERVERSONNETWORKREQUEST_ENCODING_DEFAULTBINARY:
  54. *service = (UA_Service)Service_FindServersOnNetwork;
  55. *requestType = &UA_TYPES[UA_TYPES_FINDSERVERSONNETWORKREQUEST];
  56. *responseType = &UA_TYPES[UA_TYPES_FINDSERVERSONNETWORKRESPONSE];
  57. *requiresSession = false;
  58. break;
  59. # endif
  60. case UA_NS0ID_REGISTERSERVERREQUEST_ENCODING_DEFAULTBINARY:
  61. *service = (UA_Service)Service_RegisterServer;
  62. *requestType = &UA_TYPES[UA_TYPES_REGISTERSERVERREQUEST];
  63. *responseType = &UA_TYPES[UA_TYPES_REGISTERSERVERRESPONSE];
  64. *requiresSession = false;
  65. break;
  66. case UA_NS0ID_REGISTERSERVER2REQUEST_ENCODING_DEFAULTBINARY:
  67. *service = (UA_Service)Service_RegisterServer2;
  68. *requestType = &UA_TYPES[UA_TYPES_REGISTERSERVER2REQUEST];
  69. *responseType = &UA_TYPES[UA_TYPES_REGISTERSERVER2RESPONSE];
  70. *requiresSession = false;
  71. break;
  72. #endif
  73. case UA_NS0ID_CREATESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  74. *service = (UA_Service)Service_CreateSession;
  75. *requestType = &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST];
  76. *responseType = &UA_TYPES[UA_TYPES_CREATESESSIONRESPONSE];
  77. *requiresSession = false;
  78. break;
  79. case UA_NS0ID_ACTIVATESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  80. *service = (UA_Service)Service_ActivateSession;
  81. *requestType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST];
  82. *responseType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONRESPONSE];
  83. break;
  84. case UA_NS0ID_CLOSESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  85. *service = (UA_Service)Service_CloseSession;
  86. *requestType = &UA_TYPES[UA_TYPES_CLOSESESSIONREQUEST];
  87. *responseType = &UA_TYPES[UA_TYPES_CLOSESESSIONRESPONSE];
  88. break;
  89. case UA_NS0ID_READREQUEST_ENCODING_DEFAULTBINARY:
  90. *service = (UA_Service)Service_Read;
  91. *requestType = &UA_TYPES[UA_TYPES_READREQUEST];
  92. *responseType = &UA_TYPES[UA_TYPES_READRESPONSE];
  93. break;
  94. case UA_NS0ID_WRITEREQUEST_ENCODING_DEFAULTBINARY:
  95. *service = (UA_Service)Service_Write;
  96. *requestType = &UA_TYPES[UA_TYPES_WRITEREQUEST];
  97. *responseType = &UA_TYPES[UA_TYPES_WRITERESPONSE];
  98. break;
  99. case UA_NS0ID_BROWSEREQUEST_ENCODING_DEFAULTBINARY:
  100. *service = (UA_Service)Service_Browse;
  101. *requestType = &UA_TYPES[UA_TYPES_BROWSEREQUEST];
  102. *responseType = &UA_TYPES[UA_TYPES_BROWSERESPONSE];
  103. break;
  104. case UA_NS0ID_BROWSENEXTREQUEST_ENCODING_DEFAULTBINARY:
  105. *service = (UA_Service)Service_BrowseNext;
  106. *requestType = &UA_TYPES[UA_TYPES_BROWSENEXTREQUEST];
  107. *responseType = &UA_TYPES[UA_TYPES_BROWSENEXTRESPONSE];
  108. break;
  109. case UA_NS0ID_REGISTERNODESREQUEST_ENCODING_DEFAULTBINARY:
  110. *service = (UA_Service)Service_RegisterNodes;
  111. *requestType = &UA_TYPES[UA_TYPES_REGISTERNODESREQUEST];
  112. *responseType = &UA_TYPES[UA_TYPES_REGISTERNODESRESPONSE];
  113. break;
  114. case UA_NS0ID_UNREGISTERNODESREQUEST_ENCODING_DEFAULTBINARY:
  115. *service = (UA_Service)Service_UnregisterNodes;
  116. *requestType = &UA_TYPES[UA_TYPES_UNREGISTERNODESREQUEST];
  117. *responseType = &UA_TYPES[UA_TYPES_UNREGISTERNODESRESPONSE];
  118. break;
  119. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST_ENCODING_DEFAULTBINARY:
  120. *service = (UA_Service)Service_TranslateBrowsePathsToNodeIds;
  121. *requestType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSREQUEST];
  122. *responseType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSRESPONSE];
  123. break;
  124. #ifdef UA_ENABLE_SUBSCRIPTIONS
  125. case UA_NS0ID_CREATESUBSCRIPTIONREQUEST_ENCODING_DEFAULTBINARY:
  126. *service = (UA_Service)Service_CreateSubscription;
  127. *requestType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONREQUEST];
  128. *responseType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONRESPONSE];
  129. break;
  130. case UA_NS0ID_PUBLISHREQUEST_ENCODING_DEFAULTBINARY:
  131. *requestType = &UA_TYPES[UA_TYPES_PUBLISHREQUEST];
  132. *responseType = &UA_TYPES[UA_TYPES_PUBLISHRESPONSE];
  133. break;
  134. case UA_NS0ID_REPUBLISHREQUEST_ENCODING_DEFAULTBINARY:
  135. *service = (UA_Service)Service_Republish;
  136. *requestType = &UA_TYPES[UA_TYPES_REPUBLISHREQUEST];
  137. *responseType = &UA_TYPES[UA_TYPES_REPUBLISHRESPONSE];
  138. break;
  139. case UA_NS0ID_MODIFYSUBSCRIPTIONREQUEST_ENCODING_DEFAULTBINARY:
  140. *service = (UA_Service)Service_ModifySubscription;
  141. *requestType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONREQUEST];
  142. *responseType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONRESPONSE];
  143. break;
  144. case UA_NS0ID_SETPUBLISHINGMODEREQUEST_ENCODING_DEFAULTBINARY:
  145. *service = (UA_Service)Service_SetPublishingMode;
  146. *requestType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODEREQUEST];
  147. *responseType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODERESPONSE];
  148. break;
  149. case UA_NS0ID_DELETESUBSCRIPTIONSREQUEST_ENCODING_DEFAULTBINARY:
  150. *service = (UA_Service)Service_DeleteSubscriptions;
  151. *requestType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSREQUEST];
  152. *responseType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSRESPONSE];
  153. break;
  154. case UA_NS0ID_CREATEMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  155. *service = (UA_Service)Service_CreateMonitoredItems;
  156. *requestType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSREQUEST];
  157. *responseType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSRESPONSE];
  158. break;
  159. case UA_NS0ID_DELETEMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  160. *service = (UA_Service)Service_DeleteMonitoredItems;
  161. *requestType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSREQUEST];
  162. *responseType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSRESPONSE];
  163. break;
  164. case UA_NS0ID_MODIFYMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  165. *service = (UA_Service)Service_ModifyMonitoredItems;
  166. *requestType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSREQUEST];
  167. *responseType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSRESPONSE];
  168. break;
  169. case UA_NS0ID_SETMONITORINGMODEREQUEST_ENCODING_DEFAULTBINARY:
  170. *service = (UA_Service)Service_SetMonitoringMode;
  171. *requestType = &UA_TYPES[UA_TYPES_SETMONITORINGMODEREQUEST];
  172. *responseType = &UA_TYPES[UA_TYPES_SETMONITORINGMODERESPONSE];
  173. break;
  174. #endif
  175. #ifdef UA_ENABLE_METHODCALLS
  176. case UA_NS0ID_CALLREQUEST_ENCODING_DEFAULTBINARY:
  177. *service = (UA_Service)Service_Call;
  178. *requestType = &UA_TYPES[UA_TYPES_CALLREQUEST];
  179. *responseType = &UA_TYPES[UA_TYPES_CALLRESPONSE];
  180. break;
  181. #endif
  182. #ifdef UA_ENABLE_NODEMANAGEMENT
  183. case UA_NS0ID_ADDNODESREQUEST_ENCODING_DEFAULTBINARY:
  184. *service = (UA_Service)Service_AddNodes;
  185. *requestType = &UA_TYPES[UA_TYPES_ADDNODESREQUEST];
  186. *responseType = &UA_TYPES[UA_TYPES_ADDNODESRESPONSE];
  187. break;
  188. case UA_NS0ID_ADDREFERENCESREQUEST_ENCODING_DEFAULTBINARY:
  189. *service = (UA_Service)Service_AddReferences;
  190. *requestType = &UA_TYPES[UA_TYPES_ADDREFERENCESREQUEST];
  191. *responseType = &UA_TYPES[UA_TYPES_ADDREFERENCESRESPONSE];
  192. break;
  193. case UA_NS0ID_DELETENODESREQUEST_ENCODING_DEFAULTBINARY:
  194. *service = (UA_Service)Service_DeleteNodes;
  195. *requestType = &UA_TYPES[UA_TYPES_DELETENODESREQUEST];
  196. *responseType = &UA_TYPES[UA_TYPES_DELETENODESRESPONSE];
  197. break;
  198. case UA_NS0ID_DELETEREFERENCESREQUEST_ENCODING_DEFAULTBINARY:
  199. *service = (UA_Service)Service_DeleteReferences;
  200. *requestType = &UA_TYPES[UA_TYPES_DELETEREFERENCESREQUEST];
  201. *responseType = &UA_TYPES[UA_TYPES_DELETEREFERENCESRESPONSE];
  202. break;
  203. #endif
  204. default:
  205. break;
  206. }
  207. }
  208. /*************************/
  209. /* Process Message Types */
  210. /*************************/
  211. /* HEL -> Open up the connection */
  212. static void processHEL(UA_Connection *connection, const UA_ByteString *msg, size_t *offset) {
  213. UA_TcpHelloMessage helloMessage;
  214. if(UA_TcpHelloMessage_decodeBinary(msg, offset, &helloMessage) != UA_STATUSCODE_GOOD) {
  215. connection->close(connection);
  216. return;
  217. }
  218. /* Parameterize the connection */
  219. connection->remoteConf.maxChunkCount = helloMessage.maxChunkCount; /* zero -> unlimited */
  220. connection->remoteConf.maxMessageSize = helloMessage.maxMessageSize; /* zero -> unlimited */
  221. connection->remoteConf.protocolVersion = helloMessage.protocolVersion;
  222. connection->remoteConf.recvBufferSize = helloMessage.receiveBufferSize;
  223. if(connection->localConf.sendBufferSize > helloMessage.receiveBufferSize)
  224. connection->localConf.sendBufferSize = helloMessage.receiveBufferSize;
  225. connection->remoteConf.sendBufferSize = helloMessage.sendBufferSize;
  226. if(connection->localConf.recvBufferSize > helloMessage.sendBufferSize)
  227. connection->localConf.recvBufferSize = helloMessage.sendBufferSize;
  228. connection->state = UA_CONNECTION_ESTABLISHED;
  229. UA_TcpHelloMessage_deleteMembers(&helloMessage);
  230. /* Build acknowledge response */
  231. UA_TcpAcknowledgeMessage ackMessage;
  232. ackMessage.protocolVersion = connection->localConf.protocolVersion;
  233. ackMessage.receiveBufferSize = connection->localConf.recvBufferSize;
  234. ackMessage.sendBufferSize = connection->localConf.sendBufferSize;
  235. ackMessage.maxMessageSize = connection->localConf.maxMessageSize;
  236. ackMessage.maxChunkCount = connection->localConf.maxChunkCount;
  237. UA_TcpMessageHeader ackHeader;
  238. ackHeader.messageTypeAndChunkType = UA_MESSAGETYPE_ACK + UA_CHUNKTYPE_FINAL;
  239. ackHeader.messageSize = 8 + 20; /* ackHeader + ackMessage */
  240. /* Get the send buffer from the network layer */
  241. UA_ByteString ack_msg;
  242. UA_ByteString_init(&ack_msg);
  243. UA_StatusCode retval =
  244. connection->getSendBuffer(connection, connection->localConf.sendBufferSize, &ack_msg);
  245. if(retval != UA_STATUSCODE_GOOD)
  246. return;
  247. /* Encode and send the response */
  248. UA_Byte *bufPos = ack_msg.data;
  249. const UA_Byte *bufEnd = &ack_msg.data[ack_msg.length];
  250. UA_TcpMessageHeader_encodeBinary(&ackHeader, &bufPos, &bufEnd);
  251. UA_TcpAcknowledgeMessage_encodeBinary(&ackMessage, &bufPos, &bufEnd);
  252. ack_msg.length = ackHeader.messageSize;
  253. connection->send(connection, &ack_msg);
  254. }
  255. /* OPN -> Open up/renew the securechannel */
  256. static void
  257. processOPN(UA_Server *server, UA_Connection *connection,
  258. UA_UInt32 channelId, const UA_ByteString *msg) {
  259. UA_StatusCode retval = UA_STATUSCODE_GOOD;
  260. /* Called before HEL */
  261. if(connection->state != UA_CONNECTION_ESTABLISHED)
  262. retval = UA_STATUSCODE_BADCOMMUNICATIONERROR;
  263. /* Opening up a channel with a channelid already set */
  264. if(!connection->channel && channelId != 0)
  265. retval = UA_STATUSCODE_BADCOMMUNICATIONERROR;
  266. /* Renew a channel with the wrong channelid */
  267. if(connection->channel && channelId != connection->channel->securityToken.channelId)
  268. retval = UA_STATUSCODE_BADCOMMUNICATIONERROR;
  269. /* Decode the request */
  270. UA_AsymmetricAlgorithmSecurityHeader asymHeader;
  271. UA_SequenceHeader seqHeader;
  272. UA_NodeId requestType;
  273. UA_OpenSecureChannelRequest r;
  274. size_t offset = 0;
  275. retval |= UA_AsymmetricAlgorithmSecurityHeader_decodeBinary(msg, &offset, &asymHeader);
  276. retval |= UA_SequenceHeader_decodeBinary(msg, &offset, &seqHeader);
  277. retval |= UA_NodeId_decodeBinary(msg, &offset, &requestType);
  278. retval |= UA_OpenSecureChannelRequest_decodeBinary(msg, &offset, &r);
  279. /* Error occured */
  280. if(retval != UA_STATUSCODE_GOOD || requestType.identifier.numeric != 446) {
  281. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  282. UA_NodeId_deleteMembers(&requestType);
  283. UA_OpenSecureChannelRequest_deleteMembers(&r);
  284. connection->close(connection);
  285. return;
  286. }
  287. /* Call the service */
  288. UA_OpenSecureChannelResponse p;
  289. UA_OpenSecureChannelResponse_init(&p);
  290. Service_OpenSecureChannel(server, connection, &r, &p);
  291. UA_OpenSecureChannelRequest_deleteMembers(&r);
  292. /* Opening the channel failed */
  293. UA_SecureChannel *channel = connection->channel;
  294. if(!channel) {
  295. UA_OpenSecureChannelResponse_deleteMembers(&p);
  296. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  297. connection->close(connection);
  298. return;
  299. }
  300. /* Set the starting sequence number */
  301. channel->receiveSequenceNumber = seqHeader.sequenceNumber;
  302. /* Allocate the return message */
  303. UA_ByteString resp_msg;
  304. UA_ByteString_init(&resp_msg);
  305. retval = connection->getSendBuffer(connection, connection->localConf.sendBufferSize, &resp_msg);
  306. if(retval != UA_STATUSCODE_GOOD) {
  307. UA_OpenSecureChannelResponse_deleteMembers(&p);
  308. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  309. connection->close(connection);
  310. return;
  311. }
  312. /* Encode the message after the secureconversationmessageheader */
  313. UA_Byte *bufPos = &resp_msg.data[12]; /* skip the header */
  314. const UA_Byte *bufEnd = &resp_msg.data[resp_msg.length];
  315. seqHeader.sequenceNumber = UA_atomic_add(&channel->sendSequenceNumber, 1);
  316. retval |= UA_AsymmetricAlgorithmSecurityHeader_encodeBinary(&asymHeader, &bufPos, &bufEnd); // just mirror back
  317. retval |= UA_SequenceHeader_encodeBinary(&seqHeader, &bufPos, &bufEnd);
  318. UA_NodeId responseType = UA_NODEID_NUMERIC(0, UA_TYPES[UA_TYPES_OPENSECURECHANNELRESPONSE].binaryEncodingId);
  319. retval |= UA_NodeId_encodeBinary(&responseType, &bufPos, &bufEnd);
  320. retval |= UA_OpenSecureChannelResponse_encodeBinary(&p, &bufPos, &bufEnd);
  321. if(retval != UA_STATUSCODE_GOOD) {
  322. connection->releaseSendBuffer(connection, &resp_msg);
  323. UA_OpenSecureChannelResponse_deleteMembers(&p);
  324. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  325. connection->close(connection);
  326. return;
  327. }
  328. /* Encode the secureconversationmessageheader (cannot fail) and send */
  329. UA_SecureConversationMessageHeader respHeader;
  330. respHeader.messageHeader.messageTypeAndChunkType = UA_MESSAGETYPE_OPN + UA_CHUNKTYPE_FINAL;
  331. respHeader.messageHeader.messageSize = (u32)((uintptr_t)bufPos - (uintptr_t)resp_msg.data);
  332. respHeader.secureChannelId = p.securityToken.channelId;
  333. bufPos = resp_msg.data;
  334. UA_SecureConversationMessageHeader_encodeBinary(&respHeader, &bufPos, &bufEnd);
  335. resp_msg.length = respHeader.messageHeader.messageSize;
  336. connection->send(connection, &resp_msg);
  337. /* Clean up */
  338. UA_OpenSecureChannelResponse_deleteMembers(&p);
  339. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  340. }
  341. static void
  342. processMSG(UA_Server *server, UA_SecureChannel *channel,
  343. UA_UInt32 requestId, const UA_ByteString *msg) {
  344. /* At 0, the nodeid starts... */
  345. size_t ppos = 0;
  346. size_t *offset = &ppos;
  347. /* Decode the nodeid */
  348. UA_NodeId requestTypeId;
  349. UA_StatusCode retval = UA_NodeId_decodeBinary(msg, offset, &requestTypeId);
  350. if(retval != UA_STATUSCODE_GOOD)
  351. return;
  352. if(requestTypeId.identifierType != UA_NODEIDTYPE_NUMERIC)
  353. UA_NodeId_deleteMembers(&requestTypeId); /* leads to badserviceunsupported */
  354. /* Store the start-position of the request */
  355. size_t requestPos = *offset;
  356. /* Get the service pointers */
  357. UA_Service service = NULL;
  358. const UA_DataType *requestType = NULL;
  359. const UA_DataType *responseType = NULL;
  360. UA_Boolean sessionRequired = true;
  361. getServicePointers(requestTypeId.identifier.numeric, &requestType,
  362. &responseType, &service, &sessionRequired);
  363. if(!requestType) {
  364. if(requestTypeId.identifier.numeric == 787) {
  365. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  366. "Client requested a subscription, " \
  367. "but those are not enabled in the build");
  368. } else {
  369. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  370. "Unknown request with type identifier %i",
  371. requestTypeId.identifier.numeric);
  372. }
  373. sendError(channel, msg, requestPos, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  374. requestId, UA_STATUSCODE_BADSERVICEUNSUPPORTED);
  375. return;
  376. }
  377. UA_assert(responseType);
  378. #ifdef UA_ENABLE_NONSTANDARD_STATELESS
  379. /* Stateless extension: Sessions are optional */
  380. sessionRequired = false;
  381. #endif
  382. /* Decode the request */
  383. void *request = UA_alloca(requestType->memSize);
  384. UA_RequestHeader *requestHeader = (UA_RequestHeader*)request;
  385. retval = UA_decodeBinary(msg, offset, request, requestType,
  386. server->config.customDataTypesSize,
  387. server->config.customDataTypes);
  388. if(retval != UA_STATUSCODE_GOOD) {
  389. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  390. "Could not decode the request");
  391. sendError(channel, msg, requestPos, responseType, requestId, retval);
  392. return;
  393. }
  394. /* Prepare the respone */
  395. void *response = UA_alloca(responseType->memSize);
  396. UA_init(response, responseType);
  397. UA_Session *session = NULL; /* must be initialized before goto send_response */
  398. /* CreateSession doesn't need a session */
  399. if(requestType == &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST]) {
  400. Service_CreateSession(server, channel,
  401. (const UA_CreateSessionRequest *)request,
  402. (UA_CreateSessionResponse *)response);
  403. goto send_response;
  404. }
  405. /* Find the matching session */
  406. session = UA_SecureChannel_getSession(channel, &requestHeader->authenticationToken);
  407. if(!session)
  408. session = UA_SessionManager_getSession(&server->sessionManager,
  409. &requestHeader->authenticationToken);
  410. if(requestType == &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST]) {
  411. if(!session) {
  412. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  413. "Trying to activate a session that is " \
  414. "not known in the server");
  415. sendError(channel, msg, requestPos, responseType,
  416. requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  417. UA_deleteMembers(request, requestType);
  418. return;
  419. }
  420. Service_ActivateSession(server, channel, session,
  421. (const UA_ActivateSessionRequest*)request,
  422. (UA_ActivateSessionResponse*)response);
  423. goto send_response;
  424. }
  425. /* Set an anonymous, inactive session for services that need no session */
  426. UA_Session anonymousSession;
  427. if(!session) {
  428. if(sessionRequired) {
  429. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  430. "Service request %i without a valid session",
  431. requestType->binaryEncodingId);
  432. sendError(channel, msg, requestPos, responseType,
  433. requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  434. UA_deleteMembers(request, requestType);
  435. return;
  436. }
  437. UA_Session_init(&anonymousSession);
  438. anonymousSession.sessionId = UA_NODEID_GUID(0, UA_GUID_NULL);
  439. anonymousSession.channel = channel;
  440. session = &anonymousSession;
  441. }
  442. /* Trying to use a non-activated session? */
  443. if(sessionRequired && !session->activated) {
  444. UA_LOG_INFO_SESSION(server->config.logger, session,
  445. "Calling service %i on a non-activated session",
  446. requestType->binaryEncodingId);
  447. sendError(channel, msg, requestPos, responseType,
  448. requestId, UA_STATUSCODE_BADSESSIONNOTACTIVATED);
  449. UA_SessionManager_removeSession(&server->sessionManager,
  450. &session->authenticationToken);
  451. UA_deleteMembers(request, requestType);
  452. return;
  453. }
  454. /* The session is bound to another channel */
  455. if(session->channel != channel) {
  456. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  457. "Client tries to use an obsolete securechannel");
  458. sendError(channel, msg, requestPos, responseType,
  459. requestId, UA_STATUSCODE_BADSECURECHANNELIDINVALID);
  460. UA_deleteMembers(request, requestType);
  461. return;
  462. }
  463. /* Update the session lifetime */
  464. UA_Session_updateLifetime(session);
  465. #ifdef UA_ENABLE_SUBSCRIPTIONS
  466. /* The publish request is not answered immediately */
  467. if(requestType == &UA_TYPES[UA_TYPES_PUBLISHREQUEST]) {
  468. Service_Publish(server, session,
  469. (const UA_PublishRequest*)request, requestId);
  470. UA_deleteMembers(request, requestType);
  471. return;
  472. }
  473. #endif
  474. /* Call the service */
  475. UA_assert(service); /* For all services besides publish, the service pointer is non-NULL*/
  476. service(server, session, request, response);
  477. send_response:
  478. /* Send the response */
  479. ((UA_ResponseHeader*)response)->requestHandle = requestHeader->requestHandle;
  480. ((UA_ResponseHeader*)response)->timestamp = UA_DateTime_now();
  481. retval = UA_SecureChannel_sendBinaryMessage(channel, requestId, response, responseType);
  482. if(retval != UA_STATUSCODE_GOOD)
  483. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  484. "Could not send the message over the SecureChannel "
  485. "with StatusCode %s", UA_StatusCode_name(retval));
  486. /* Clean up */
  487. UA_deleteMembers(request, requestType);
  488. UA_deleteMembers(response, responseType);
  489. }
  490. /* ERR -> Error from the remote connection */
  491. static void processERR(UA_Server *server, UA_Connection *connection, const UA_ByteString *msg, size_t *offset) {
  492. UA_TcpErrorMessage errorMessage;
  493. if (UA_TcpErrorMessage_decodeBinary(msg, offset, &errorMessage) != UA_STATUSCODE_GOOD) {
  494. connection->close(connection);
  495. return;
  496. }
  497. UA_LOG_ERROR(server->config.logger, UA_LOGCATEGORY_NETWORK,
  498. "Client replied with an error message: %s %.*s",
  499. UA_StatusCode_name(errorMessage.error), errorMessage.reason.length, errorMessage.reason.data);
  500. UA_TcpErrorMessage_deleteMembers(&errorMessage);
  501. }
  502. /* Takes decoded messages starting at the nodeid of the content type. Only OPN
  503. * messages start at the asymmetricalgorithmsecurityheader and are not
  504. * decoded. */
  505. static void
  506. UA_Server_processSecureChannelMessage(UA_Server *server, UA_SecureChannel *channel,
  507. UA_MessageType messagetype, UA_UInt32 requestId,
  508. const UA_ByteString *message) {
  509. UA_assert(channel);
  510. UA_assert(channel->connection);
  511. switch(messagetype) {
  512. case UA_MESSAGETYPE_ERR: {
  513. const UA_TcpErrorMessage *msg = (const UA_TcpErrorMessage *) message;
  514. UA_LOG_ERROR_CHANNEL(server->config.logger, channel,
  515. "Client replied with an error message: %s %.*s",
  516. UA_StatusCode_name(msg->error), msg->reason.length, msg->reason.data);
  517. break;
  518. }
  519. case UA_MESSAGETYPE_HEL:
  520. UA_LOG_TRACE_CHANNEL(server->config.logger, channel,
  521. "Cannot process a HEL on an open channel");
  522. break;
  523. case UA_MESSAGETYPE_OPN:
  524. UA_LOG_TRACE_CHANNEL(server->config.logger, channel,
  525. "Process an OPN on an open channel");
  526. processOPN(server, channel->connection, channel->securityToken.channelId, message);
  527. break;
  528. case UA_MESSAGETYPE_MSG:
  529. UA_LOG_TRACE_CHANNEL(server->config.logger, channel,
  530. "Process a MSG", channel->connection->sockfd);
  531. processMSG(server, channel, requestId, message);
  532. break;
  533. case UA_MESSAGETYPE_CLO:
  534. UA_LOG_TRACE_CHANNEL(server->config.logger, channel,
  535. "Process a CLO", channel->connection->sockfd);
  536. Service_CloseSecureChannel(server, channel);
  537. break;
  538. default:
  539. UA_LOG_TRACE_CHANNEL(server->config.logger, channel,
  540. "Unknown message type");
  541. }
  542. }
  543. /* Takes the raw message from the network layer */
  544. static void
  545. processBinaryMessage(UA_Server *server, UA_Connection *connection,
  546. UA_ByteString *message) {
  547. UA_Boolean realloced = UA_FALSE;
  548. UA_StatusCode retval = UA_Connection_completeMessages(connection, message, &realloced);
  549. if(retval != UA_STATUSCODE_GOOD) {
  550. if(!realloced)
  551. connection->releaseRecvBuffer(connection, message);
  552. else
  553. UA_ByteString_deleteMembers(message);
  554. return;
  555. }
  556. UA_SecureChannel *channel = connection->channel;
  557. if(channel) {
  558. /* Assemble chunks in the securechannel and process complete messages */
  559. retval = UA_SecureChannel_processChunks(channel, message,
  560. (UA_ProcessMessageCallback*)UA_Server_processSecureChannelMessage, server);
  561. if(retval != UA_STATUSCODE_GOOD)
  562. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Procesing chunks "
  563. "resulted in error code %s", UA_StatusCode_name(retval));
  564. } else {
  565. /* Process messages without a channel and no chunking */
  566. size_t offset = 0;
  567. UA_TcpMessageHeader tcpMessageHeader;
  568. retval = UA_TcpMessageHeader_decodeBinary(message, &offset, &tcpMessageHeader);
  569. if(retval != UA_STATUSCODE_GOOD) {
  570. connection->close(connection);
  571. return;
  572. }
  573. /* Dispatch according to the message type */
  574. switch(tcpMessageHeader.messageTypeAndChunkType & 0x00ffffff) {
  575. case UA_MESSAGETYPE_ERR:
  576. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  577. "Connection %i | Process ERR message", connection->sockfd);
  578. processERR(server, connection, message, &offset);
  579. break;
  580. case UA_MESSAGETYPE_HEL:
  581. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  582. "Connection %i | Process HEL message", connection->sockfd);
  583. processHEL(connection, message, &offset);
  584. break;
  585. case UA_MESSAGETYPE_OPN: {
  586. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  587. "Connection %i | Process OPN message", connection->sockfd);
  588. UA_UInt32 channelId = 0;
  589. retval = UA_UInt32_decodeBinary(message, &offset, &channelId);
  590. if(retval != UA_STATUSCODE_GOOD)
  591. connection->close(connection);
  592. UA_ByteString offsetMessage;
  593. offsetMessage.data = message->data + 12;
  594. offsetMessage.length = message->length - 12;
  595. processOPN(server, connection, channelId, &offsetMessage);
  596. break; }
  597. case UA_MESSAGETYPE_MSG:
  598. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  599. "Connection %i | Processing a MSG message not possible "
  600. "without a SecureChannel", connection->sockfd);
  601. connection->close(connection);
  602. break;
  603. case UA_MESSAGETYPE_CLO:
  604. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  605. "Connection %i | Processing a CLO message not possible "
  606. "without a SecureChannel", connection->sockfd);
  607. connection->close(connection);
  608. break;
  609. default:
  610. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  611. "Connection %i | Unknown message type", connection->sockfd);
  612. connection->close(connection);
  613. }
  614. }
  615. if(!realloced)
  616. connection->releaseRecvBuffer(connection, message);
  617. else
  618. UA_ByteString_deleteMembers(message);
  619. }
  620. #ifndef UA_ENABLE_MULTITHREADING
  621. void
  622. UA_Server_processBinaryMessage(UA_Server *server, UA_Connection *connection,
  623. UA_ByteString *message) {
  624. processBinaryMessage(server, connection, message);
  625. }
  626. #else
  627. typedef struct {
  628. UA_Connection *connection;
  629. UA_ByteString message;
  630. } ConnectionMessage;
  631. static void
  632. workerProcessBinaryMessage(UA_Server *server, ConnectionMessage *cm) {
  633. processBinaryMessage(server, cm->connection, &cm->message);
  634. UA_free(cm);
  635. }
  636. void
  637. UA_Server_processBinaryMessage(UA_Server *server, UA_Connection *connection,
  638. UA_ByteString *message) {
  639. /* Allocate the memory for the callback data */
  640. ConnectionMessage *cm = UA_malloc(sizeof(ConnectionMessage));
  641. /* If malloc failed, execute immediately */
  642. if(!cm) {
  643. processBinaryMessage(server, connection, message);
  644. return;
  645. }
  646. /* Dispatch to the workers */
  647. cm->connection = connection;
  648. cm->message = *message;
  649. UA_Server_workerCallback(server, (UA_ServerCallback)workerProcessBinaryMessage, cm);
  650. }
  651. #endif
  652. #ifdef UA_ENABLE_MULTITHREADING
  653. static void
  654. deleteConnectionTrampoline(UA_Server *server, void *data) {
  655. UA_Connection *connection = (UA_Connection*)data;
  656. connection->free(connection);
  657. }
  658. #endif
  659. void
  660. UA_Server_removeConnection(UA_Server *server, UA_Connection *connection) {
  661. UA_Connection_detachSecureChannel(connection);
  662. #ifndef UA_ENABLE_MULTITHREADING
  663. connection->free(connection);
  664. #else
  665. UA_Server_delayedCallback(server, deleteConnectionTrampoline, connection);
  666. #endif
  667. }