ua_config_default.c 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775
  1. /* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  2. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  3. *
  4. * Copyright 2017 (c) Fraunhofer IOSB (Author: Julius Pfrommer)
  5. * Copyright 2017 (c) Julian Grothoff
  6. * Copyright 2017-2018 (c) Mark Giraud, Fraunhofer IOSB
  7. * Copyright 2017 (c) Stefan Profanter, fortiss GmbH
  8. * Copyright 2017 (c) Thomas Stalder, Blue Time Concept SA
  9. * Copyright 2018 (c) Daniel Feist, Precitec GmbH & Co. KG
  10. * Copyright 2018 (c) Fabian Arndt, Root-Core
  11. * Copyright 2019 (c) Kalycito Infotech Private Limited
  12. */
  13. #include <open62541/client_config_default.h>
  14. #include <open62541/network_tcp.h>
  15. #ifdef UA_ENABLE_WEBSOCKET_SERVER
  16. #include <open62541/network_ws.h>
  17. #endif
  18. #include <open62541/plugin/accesscontrol_default.h>
  19. #include <open62541/plugin/log_stdout.h>
  20. #include <open62541/plugin/pki_default.h>
  21. #include <open62541/plugin/securitypolicy_default.h>
  22. #include <open62541/server_config_default.h>
  23. /* Struct initialization works across ANSI C/C99/C++ if it is done when the
  24. * variable is first declared. Assigning values to existing structs is
  25. * heterogeneous across the three. */
  26. static UA_INLINE UA_UInt32Range
  27. UA_UINT32RANGE(UA_UInt32 min, UA_UInt32 max) {
  28. UA_UInt32Range range = {min, max};
  29. return range;
  30. }
  31. static UA_INLINE UA_DurationRange
  32. UA_DURATIONRANGE(UA_Duration min, UA_Duration max) {
  33. UA_DurationRange range = {min, max};
  34. return range;
  35. }
  36. UA_Server *
  37. UA_Server_new() {
  38. UA_ServerConfig config;
  39. memset(&config, 0, sizeof(UA_ServerConfig));
  40. config.logger = UA_Log_Stdout_;
  41. return UA_Server_newWithConfig(&config);
  42. }
  43. /*******************************/
  44. /* Default Connection Settings */
  45. /*******************************/
  46. const UA_ConnectionConfig UA_ConnectionConfig_default = {
  47. 0, /* .protocolVersion */
  48. 65535, /* .sendBufferSize, 64k per chunk */
  49. 65535, /* .recvBufferSize, 64k per chunk */
  50. 0, /* .maxMessageSize, 0 -> unlimited */
  51. 0 /* .maxChunkCount, 0 -> unlimited */
  52. };
  53. /***************************/
  54. /* Default Server Settings */
  55. /***************************/
  56. #define MANUFACTURER_NAME "open62541"
  57. #define PRODUCT_NAME "open62541 OPC UA Server"
  58. #define PRODUCT_URI "http://open62541.org"
  59. #define APPLICATION_NAME "open62541-based OPC UA Application"
  60. #define APPLICATION_URI "urn:unconfigured:application"
  61. #define APPLICATION_URI_SERVER "urn:open62541.server.application"
  62. #define STRINGIFY(arg) #arg
  63. #define VERSION(MAJOR, MINOR, PATCH, LABEL) \
  64. STRINGIFY(MAJOR) "." STRINGIFY(MINOR) "." STRINGIFY(PATCH) LABEL
  65. static UA_StatusCode
  66. createEndpoint(UA_ServerConfig *conf, UA_EndpointDescription *endpoint,
  67. const UA_SecurityPolicy *securityPolicy,
  68. UA_MessageSecurityMode securityMode) {
  69. UA_EndpointDescription_init(endpoint);
  70. endpoint->securityMode = securityMode;
  71. UA_String_copy(&securityPolicy->policyUri, &endpoint->securityPolicyUri);
  72. endpoint->transportProfileUri =
  73. UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
  74. /* Add security level value for the corresponding message security mode */
  75. endpoint->securityLevel = (UA_Byte) securityMode;
  76. /* Enable all login mechanisms from the access control plugin */
  77. UA_StatusCode retval = UA_Array_copy(conf->accessControl.userTokenPolicies,
  78. conf->accessControl.userTokenPoliciesSize,
  79. (void **)&endpoint->userIdentityTokens,
  80. &UA_TYPES[UA_TYPES_USERTOKENPOLICY]);
  81. if(retval != UA_STATUSCODE_GOOD)
  82. return retval;
  83. endpoint->userIdentityTokensSize = conf->accessControl.userTokenPoliciesSize;
  84. UA_String_copy(&securityPolicy->localCertificate, &endpoint->serverCertificate);
  85. UA_ApplicationDescription_copy(&conf->applicationDescription, &endpoint->server);
  86. return UA_STATUSCODE_GOOD;
  87. }
  88. static const size_t usernamePasswordsSize = 2;
  89. static UA_UsernamePasswordLogin usernamePasswords[2] = {
  90. {UA_STRING_STATIC("user1"), UA_STRING_STATIC("password")},
  91. {UA_STRING_STATIC("user2"), UA_STRING_STATIC("password1")}};
  92. static UA_StatusCode
  93. setDefaultConfig(UA_ServerConfig *conf) {
  94. if (!conf)
  95. return UA_STATUSCODE_BADINVALIDARGUMENT;
  96. /* Zero out.. All members have a valid initial value */
  97. UA_ServerConfig_clean(conf);
  98. memset(conf, 0, sizeof(UA_ServerConfig));
  99. /* --> Start setting the default static config <-- */
  100. conf->nThreads = 1;
  101. conf->logger = UA_Log_Stdout_;
  102. conf->shutdownDelay = 0.0;
  103. /* Server Description */
  104. conf->buildInfo.productUri = UA_STRING_ALLOC(PRODUCT_URI);
  105. conf->buildInfo.manufacturerName = UA_STRING_ALLOC(MANUFACTURER_NAME);
  106. conf->buildInfo.productName = UA_STRING_ALLOC(PRODUCT_NAME);
  107. conf->buildInfo.softwareVersion =
  108. UA_STRING_ALLOC(VERSION(UA_OPEN62541_VER_MAJOR, UA_OPEN62541_VER_MINOR,
  109. UA_OPEN62541_VER_PATCH, UA_OPEN62541_VER_LABEL));
  110. #ifdef UA_PACK_DEBIAN
  111. conf->buildInfo.buildNumber = UA_STRING_ALLOC("deb");
  112. #else
  113. conf->buildInfo.buildNumber = UA_STRING_ALLOC(__DATE__ " " __TIME__);
  114. #endif
  115. conf->buildInfo.buildDate = UA_DateTime_now();
  116. conf->applicationDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI_SERVER);
  117. conf->applicationDescription.productUri = UA_STRING_ALLOC(PRODUCT_URI);
  118. conf->applicationDescription.applicationName =
  119. UA_LOCALIZEDTEXT_ALLOC("en", APPLICATION_NAME);
  120. conf->applicationDescription.applicationType = UA_APPLICATIONTYPE_SERVER;
  121. /* conf->applicationDescription.gatewayServerUri = UA_STRING_NULL; */
  122. /* conf->applicationDescription.discoveryProfileUri = UA_STRING_NULL; */
  123. /* conf->applicationDescription.discoveryUrlsSize = 0; */
  124. /* conf->applicationDescription.discoveryUrls = NULL; */
  125. #ifdef UA_ENABLE_DISCOVERY_MULTICAST
  126. UA_MdnsDiscoveryConfiguration_init(&conf->discovery.mdns);
  127. conf->discovery.mdnsInterfaceIP = UA_STRING_NULL;
  128. #endif
  129. /* Custom DataTypes */
  130. /* conf->customDataTypesSize = 0; */
  131. /* conf->customDataTypes = NULL; */
  132. /* Networking */
  133. /* conf->networkLayersSize = 0; */
  134. /* conf->networkLayers = NULL; */
  135. /* conf->customHostname = UA_STRING_NULL; */
  136. /* Endpoints */
  137. /* conf->endpoints = {0, NULL}; */
  138. /* Certificate Verification that accepts every certificate. Can be
  139. * overwritten when the policy is specialized. */
  140. UA_CertificateVerification_AcceptAll(&conf->certificateVerification);
  141. /* Global Node Lifecycle */
  142. conf->nodeLifecycle.constructor = NULL;
  143. conf->nodeLifecycle.destructor = NULL;
  144. conf->nodeLifecycle.createOptionalChild = NULL;
  145. conf->nodeLifecycle.generateChildNodeId = NULL;
  146. /* Relax constraints for the InformationModel */
  147. conf->relaxEmptyValueConstraint = true; /* Allow empty values */
  148. /* Limits for SecureChannels */
  149. conf->maxSecureChannels = 40;
  150. conf->maxSecurityTokenLifetime = 10 * 60 * 1000; /* 10 minutes */
  151. /* Limits for Sessions */
  152. conf->maxSessions = 100;
  153. conf->maxSessionTimeout = 60.0 * 60.0 * 1000.0; /* 1h */
  154. /* Limits for Subscriptions */
  155. conf->publishingIntervalLimits = UA_DURATIONRANGE(100.0, 3600.0 * 1000.0);
  156. conf->lifeTimeCountLimits = UA_UINT32RANGE(3, 15000);
  157. conf->keepAliveCountLimits = UA_UINT32RANGE(1, 100);
  158. conf->maxNotificationsPerPublish = 1000;
  159. conf->enableRetransmissionQueue = true;
  160. conf->maxRetransmissionQueueSize = 0; /* unlimited */
  161. #ifdef UA_ENABLE_SUBSCRIPTIONS_EVENTS
  162. conf->maxEventsPerNode = 0; /* unlimited */
  163. #endif
  164. /* Limits for MonitoredItems */
  165. conf->samplingIntervalLimits = UA_DURATIONRANGE(50.0, 24.0 * 3600.0 * 1000.0);
  166. conf->queueSizeLimits = UA_UINT32RANGE(1, 100);
  167. #ifdef UA_ENABLE_DISCOVERY
  168. conf->discovery.cleanupTimeout = 60 * 60;
  169. #endif
  170. #ifdef UA_ENABLE_HISTORIZING
  171. /* conf->accessHistoryDataCapability = UA_FALSE; */
  172. /* conf->maxReturnDataValues = 0; */
  173. /* conf->accessHistoryEventsCapability = UA_FALSE; */
  174. /* conf->maxReturnEventValues = 0; */
  175. /* conf->insertDataCapability = UA_FALSE; */
  176. /* conf->insertEventCapability = UA_FALSE; */
  177. /* conf->insertAnnotationsCapability = UA_FALSE; */
  178. /* conf->replaceDataCapability = UA_FALSE; */
  179. /* conf->replaceEventCapability = UA_FALSE; */
  180. /* conf->updateDataCapability = UA_FALSE; */
  181. /* conf->updateEventCapability = UA_FALSE; */
  182. /* conf->deleteRawCapability = UA_FALSE; */
  183. /* conf->deleteEventCapability = UA_FALSE; */
  184. /* conf->deleteAtTimeDataCapability = UA_FALSE; */
  185. #endif
  186. #if UA_MULTITHREADING >= 100
  187. conf->asyncOperationTimeout = 0;
  188. conf->maxAsyncOperationQueueSize = 0;
  189. conf->asyncCallRequestTimeout = 120000; /* Call request Timeout in ms (2 minutes) */
  190. #endif
  191. /* --> Finish setting the default static config <-- */
  192. return UA_STATUSCODE_GOOD;
  193. }
  194. UA_EXPORT UA_StatusCode
  195. UA_ServerConfig_setBasics(UA_ServerConfig* conf) {
  196. return setDefaultConfig(conf);
  197. }
  198. static UA_StatusCode
  199. addDefaultNetworkLayers(UA_ServerConfig *conf, UA_UInt16 portNumber,
  200. UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
  201. return UA_ServerConfig_addNetworkLayerTCP(conf, portNumber, sendBufferSize, recvBufferSize);
  202. }
  203. #ifdef UA_ENABLE_WEBSOCKET_SERVER
  204. UA_EXPORT UA_StatusCode
  205. UA_ServerConfig_addNetworkLayerWS(UA_ServerConfig *conf, UA_UInt16 portNumber,
  206. UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
  207. /* Add a network layer */
  208. UA_ServerNetworkLayer *tmp = (UA_ServerNetworkLayer *)
  209. UA_realloc(conf->networkLayers, sizeof(UA_ServerNetworkLayer) * (1 + conf->networkLayersSize));
  210. if(!tmp)
  211. return UA_STATUSCODE_BADOUTOFMEMORY;
  212. conf->networkLayers = tmp;
  213. UA_ConnectionConfig config = UA_ConnectionConfig_default;
  214. if (sendBufferSize > 0)
  215. config.sendBufferSize = sendBufferSize;
  216. if (recvBufferSize > 0)
  217. config.recvBufferSize = recvBufferSize;
  218. conf->networkLayers[conf->networkLayersSize] =
  219. UA_ServerNetworkLayerWS(config, portNumber, &conf->logger);
  220. if (!conf->networkLayers[conf->networkLayersSize].handle)
  221. return UA_STATUSCODE_BADOUTOFMEMORY;
  222. conf->networkLayersSize++;
  223. return UA_STATUSCODE_GOOD;
  224. }
  225. #endif
  226. UA_EXPORT UA_StatusCode
  227. UA_ServerConfig_addNetworkLayerTCP(UA_ServerConfig *conf, UA_UInt16 portNumber,
  228. UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
  229. /* Add a network layer */
  230. UA_ServerNetworkLayer *tmp = (UA_ServerNetworkLayer *)
  231. UA_realloc(conf->networkLayers, sizeof(UA_ServerNetworkLayer) * (1 + conf->networkLayersSize));
  232. if(!tmp)
  233. return UA_STATUSCODE_BADOUTOFMEMORY;
  234. conf->networkLayers = tmp;
  235. UA_ConnectionConfig config = UA_ConnectionConfig_default;
  236. if (sendBufferSize > 0)
  237. config.sendBufferSize = sendBufferSize;
  238. if (recvBufferSize > 0)
  239. config.recvBufferSize = recvBufferSize;
  240. conf->networkLayers[conf->networkLayersSize] =
  241. UA_ServerNetworkLayerTCP(config, portNumber, &conf->logger);
  242. if (!conf->networkLayers[conf->networkLayersSize].handle)
  243. return UA_STATUSCODE_BADOUTOFMEMORY;
  244. conf->networkLayersSize++;
  245. return UA_STATUSCODE_GOOD;
  246. }
  247. UA_EXPORT UA_StatusCode
  248. UA_ServerConfig_addSecurityPolicyNone(UA_ServerConfig *config,
  249. const UA_ByteString *certificate) {
  250. UA_StatusCode retval;
  251. /* Allocate the SecurityPolicies */
  252. UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
  253. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
  254. if(!tmp)
  255. return UA_STATUSCODE_BADOUTOFMEMORY;
  256. config->securityPolicies = tmp;
  257. /* Populate the SecurityPolicies */
  258. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  259. if(certificate)
  260. localCertificate = *certificate;
  261. retval = UA_SecurityPolicy_None(&config->securityPolicies[config->securityPoliciesSize], NULL,
  262. localCertificate, &config->logger);
  263. if(retval != UA_STATUSCODE_GOOD)
  264. return retval;
  265. config->securityPoliciesSize++;
  266. return UA_STATUSCODE_GOOD;
  267. }
  268. UA_EXPORT UA_StatusCode
  269. UA_ServerConfig_addEndpoint(UA_ServerConfig *config, const UA_String securityPolicyUri,
  270. UA_MessageSecurityMode securityMode)
  271. {
  272. UA_StatusCode retval;
  273. /* Allocate the endpoint */
  274. UA_EndpointDescription * tmp = (UA_EndpointDescription *)
  275. UA_realloc(config->endpoints, sizeof(UA_EndpointDescription) * (1 + config->endpointsSize));
  276. if(!tmp) {
  277. return UA_STATUSCODE_BADOUTOFMEMORY;
  278. }
  279. config->endpoints = tmp;
  280. /* Lookup the security policy */
  281. const UA_SecurityPolicy *policy = NULL;
  282. for (size_t i = 0; i < config->securityPoliciesSize; ++i) {
  283. if (UA_String_equal(&securityPolicyUri, &config->securityPolicies[i].policyUri)) {
  284. policy = &config->securityPolicies[i];
  285. break;
  286. }
  287. }
  288. if (!policy)
  289. return UA_STATUSCODE_BADINVALIDARGUMENT;
  290. /* Populate the endpoint */
  291. retval = createEndpoint(config, &config->endpoints[config->endpointsSize],
  292. policy, securityMode);
  293. if(retval != UA_STATUSCODE_GOOD)
  294. return retval;
  295. config->endpointsSize++;
  296. return UA_STATUSCODE_GOOD;
  297. }
  298. UA_EXPORT UA_StatusCode
  299. UA_ServerConfig_addAllEndpoints(UA_ServerConfig *config) {
  300. UA_StatusCode retval;
  301. /* Allocate the endpoints */
  302. UA_EndpointDescription * tmp = (UA_EndpointDescription *)
  303. UA_realloc(config->endpoints, sizeof(UA_EndpointDescription) * (2 * config->securityPoliciesSize + config->endpointsSize));
  304. if(!tmp) {
  305. return UA_STATUSCODE_BADOUTOFMEMORY;
  306. }
  307. config->endpoints = tmp;
  308. /* Populate the endpoints */
  309. for (size_t i = 0; i < config->securityPoliciesSize; ++i) {
  310. if (UA_String_equal(&UA_SECURITY_POLICY_NONE_URI, &config->securityPolicies[i].policyUri)) {
  311. retval = createEndpoint(config, &config->endpoints[config->endpointsSize],
  312. &config->securityPolicies[i], UA_MESSAGESECURITYMODE_NONE);
  313. if(retval != UA_STATUSCODE_GOOD)
  314. return retval;
  315. config->endpointsSize++;
  316. } else {
  317. retval = createEndpoint(config, &config->endpoints[config->endpointsSize],
  318. &config->securityPolicies[i], UA_MESSAGESECURITYMODE_SIGN);
  319. if(retval != UA_STATUSCODE_GOOD)
  320. return retval;
  321. config->endpointsSize++;
  322. retval = createEndpoint(config, &config->endpoints[config->endpointsSize],
  323. &config->securityPolicies[i], UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  324. if(retval != UA_STATUSCODE_GOOD)
  325. return retval;
  326. config->endpointsSize++;
  327. }
  328. }
  329. return UA_STATUSCODE_GOOD;
  330. }
  331. UA_EXPORT UA_StatusCode
  332. UA_ServerConfig_setMinimalCustomBuffer(UA_ServerConfig *config, UA_UInt16 portNumber,
  333. const UA_ByteString *certificate,
  334. UA_UInt32 sendBufferSize,
  335. UA_UInt32 recvBufferSize) {
  336. if (!config)
  337. return UA_STATUSCODE_BADINVALIDARGUMENT;
  338. UA_StatusCode retval = setDefaultConfig(config);
  339. if(retval != UA_STATUSCODE_GOOD) {
  340. UA_ServerConfig_clean(config);
  341. return retval;
  342. }
  343. retval = addDefaultNetworkLayers(config, portNumber, sendBufferSize, recvBufferSize);
  344. if(retval != UA_STATUSCODE_GOOD) {
  345. UA_ServerConfig_clean(config);
  346. return retval;
  347. }
  348. /* Allocate the SecurityPolicies */
  349. retval = UA_ServerConfig_addSecurityPolicyNone(config, certificate);
  350. if(retval != UA_STATUSCODE_GOOD) {
  351. UA_ServerConfig_clean(config);
  352. return retval;
  353. }
  354. /* Initialize the Access Control plugin */
  355. retval = UA_AccessControl_default(config, true,
  356. &config->securityPolicies[config->securityPoliciesSize-1].policyUri,
  357. usernamePasswordsSize, usernamePasswords);
  358. if(retval != UA_STATUSCODE_GOOD) {
  359. UA_ServerConfig_clean(config);
  360. return retval;
  361. }
  362. /* Allocate the endpoint */
  363. retval = UA_ServerConfig_addEndpoint(config, UA_SECURITY_POLICY_NONE_URI, UA_MESSAGESECURITYMODE_NONE);
  364. if(retval != UA_STATUSCODE_GOOD) {
  365. UA_ServerConfig_clean(config);
  366. return retval;
  367. }
  368. return UA_STATUSCODE_GOOD;
  369. }
  370. #ifdef UA_ENABLE_ENCRYPTION
  371. UA_EXPORT UA_StatusCode
  372. UA_ServerConfig_addSecurityPolicyBasic128Rsa15(UA_ServerConfig *config,
  373. const UA_ByteString *certificate,
  374. const UA_ByteString *privateKey) {
  375. UA_StatusCode retval;
  376. /* Allocate the SecurityPolicies */
  377. UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
  378. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
  379. if(!tmp)
  380. return UA_STATUSCODE_BADOUTOFMEMORY;
  381. config->securityPolicies = tmp;
  382. /* Populate the SecurityPolicies */
  383. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  384. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  385. if(certificate)
  386. localCertificate = *certificate;
  387. if(privateKey)
  388. localPrivateKey = *privateKey;
  389. retval = UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[config->securityPoliciesSize],
  390. &config->certificateVerification,
  391. localCertificate, localPrivateKey, &config->logger);
  392. if(retval != UA_STATUSCODE_GOOD)
  393. return retval;
  394. config->securityPoliciesSize++;
  395. return UA_STATUSCODE_GOOD;
  396. }
  397. UA_EXPORT UA_StatusCode
  398. UA_ServerConfig_addSecurityPolicyBasic256(UA_ServerConfig *config,
  399. const UA_ByteString *certificate,
  400. const UA_ByteString *privateKey) {
  401. UA_StatusCode retval;
  402. /* Allocate the SecurityPolicies */
  403. UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
  404. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
  405. if(!tmp)
  406. return UA_STATUSCODE_BADOUTOFMEMORY;
  407. config->securityPolicies = tmp;
  408. /* Populate the SecurityPolicies */
  409. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  410. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  411. if(certificate)
  412. localCertificate = *certificate;
  413. if(privateKey)
  414. localPrivateKey = *privateKey;
  415. retval = UA_SecurityPolicy_Basic256(&config->securityPolicies[config->securityPoliciesSize],
  416. &config->certificateVerification,
  417. localCertificate, localPrivateKey, &config->logger);
  418. if(retval != UA_STATUSCODE_GOOD)
  419. return retval;
  420. config->securityPoliciesSize++;
  421. return UA_STATUSCODE_GOOD;
  422. }
  423. UA_EXPORT UA_StatusCode
  424. UA_ServerConfig_addSecurityPolicyBasic256Sha256(UA_ServerConfig *config,
  425. const UA_ByteString *certificate,
  426. const UA_ByteString *privateKey) {
  427. UA_StatusCode retval;
  428. /* Allocate the SecurityPolicies */
  429. UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
  430. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
  431. if(!tmp)
  432. return UA_STATUSCODE_BADOUTOFMEMORY;
  433. config->securityPolicies = tmp;
  434. /* Populate the SecurityPolicies */
  435. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  436. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  437. if(certificate)
  438. localCertificate = *certificate;
  439. if(privateKey)
  440. localPrivateKey = *privateKey;
  441. retval = UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[config->securityPoliciesSize],
  442. &config->certificateVerification,
  443. localCertificate, localPrivateKey, &config->logger);
  444. if(retval != UA_STATUSCODE_GOOD)
  445. return retval;
  446. config->securityPoliciesSize++;
  447. return UA_STATUSCODE_GOOD;
  448. }
  449. UA_EXPORT UA_StatusCode
  450. UA_ServerConfig_addAllSecurityPolicies(UA_ServerConfig *config,
  451. const UA_ByteString *certificate,
  452. const UA_ByteString *privateKey) {
  453. UA_StatusCode retval;
  454. /* Allocate the SecurityPolicies */
  455. UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
  456. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * (4 + config->securityPoliciesSize));
  457. if(!tmp)
  458. return UA_STATUSCODE_BADOUTOFMEMORY;
  459. config->securityPolicies = tmp;
  460. /* Populate the SecurityPolicies */
  461. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  462. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  463. if(certificate)
  464. localCertificate = *certificate;
  465. if(privateKey)
  466. localPrivateKey = *privateKey;
  467. retval = UA_SecurityPolicy_None(&config->securityPolicies[config->securityPoliciesSize], NULL,
  468. localCertificate, &config->logger);
  469. if(retval != UA_STATUSCODE_GOOD)
  470. return retval;
  471. config->securityPoliciesSize++;
  472. retval = UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[config->securityPoliciesSize],
  473. &config->certificateVerification,
  474. localCertificate, localPrivateKey, &config->logger);
  475. if(retval != UA_STATUSCODE_GOOD)
  476. return retval;
  477. config->securityPoliciesSize++;
  478. retval = UA_SecurityPolicy_Basic256(&config->securityPolicies[config->securityPoliciesSize],
  479. &config->certificateVerification,
  480. localCertificate, localPrivateKey, &config->logger);
  481. if(retval != UA_STATUSCODE_GOOD)
  482. return retval;
  483. config->securityPoliciesSize++;
  484. retval = UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[config->securityPoliciesSize],
  485. &config->certificateVerification,
  486. localCertificate, localPrivateKey, &config->logger);
  487. if(retval != UA_STATUSCODE_GOOD)
  488. return retval;
  489. config->securityPoliciesSize++;
  490. return retval;
  491. }
  492. UA_EXPORT UA_StatusCode
  493. UA_ServerConfig_setDefaultWithSecurityPolicies(UA_ServerConfig *conf,
  494. UA_UInt16 portNumber,
  495. const UA_ByteString *certificate,
  496. const UA_ByteString *privateKey,
  497. const UA_ByteString *trustList,
  498. size_t trustListSize,
  499. const UA_ByteString *issuerList,
  500. size_t issuerListSize,
  501. const UA_ByteString *revocationList,
  502. size_t revocationListSize) {
  503. UA_StatusCode retval = setDefaultConfig(conf);
  504. if(retval != UA_STATUSCODE_GOOD) {
  505. UA_ServerConfig_clean(conf);
  506. return retval;
  507. }
  508. retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
  509. trustList, trustListSize,
  510. issuerList, issuerListSize,
  511. revocationList, revocationListSize);
  512. if (retval != UA_STATUSCODE_GOOD)
  513. return retval;
  514. if(trustListSize == 0)
  515. UA_LOG_WARNING(&conf->logger, UA_LOGCATEGORY_USERLAND,
  516. "No CA trust-list provided. "
  517. "Any remote certificate will be accepted.");
  518. retval = addDefaultNetworkLayers(conf, portNumber, 0, 0);
  519. if(retval != UA_STATUSCODE_GOOD) {
  520. UA_ServerConfig_clean(conf);
  521. return retval;
  522. }
  523. retval = UA_ServerConfig_addAllSecurityPolicies(conf, certificate, privateKey);
  524. if(retval != UA_STATUSCODE_GOOD) {
  525. UA_ServerConfig_clean(conf);
  526. return retval;
  527. }
  528. retval = UA_AccessControl_default(conf, true,
  529. &conf->securityPolicies[conf->securityPoliciesSize-1].policyUri,
  530. usernamePasswordsSize, usernamePasswords);
  531. if(retval != UA_STATUSCODE_GOOD) {
  532. UA_ServerConfig_clean(conf);
  533. return retval;
  534. }
  535. retval = UA_ServerConfig_addAllEndpoints(conf);
  536. if(retval != UA_STATUSCODE_GOOD) {
  537. UA_ServerConfig_clean(conf);
  538. return retval;
  539. }
  540. return UA_STATUSCODE_GOOD;
  541. }
  542. #endif
  543. /***************************/
  544. /* Default Client Settings */
  545. /***************************/
  546. UA_Client * UA_Client_new() {
  547. UA_ClientConfig config;
  548. memset(&config, 0, sizeof(UA_ClientConfig));
  549. config.logger.log = UA_Log_Stdout_log;
  550. config.logger.context = NULL;
  551. config.logger.clear = UA_Log_Stdout_clear;
  552. return UA_Client_newWithConfig(&config);
  553. }
  554. static UA_INLINE void
  555. UA_ClientConnectionTCP_poll_callback(UA_Client *client, void *data) {
  556. UA_ClientConnectionTCP_poll(client, data);
  557. }
  558. UA_StatusCode
  559. UA_ClientConfig_setDefault(UA_ClientConfig *config) {
  560. config->timeout = 5000;
  561. config->secureChannelLifeTime = 10 * 60 * 1000; /* 10 minutes */
  562. config->logger.log = UA_Log_Stdout_log;
  563. config->logger.context = NULL;
  564. config->logger.clear = UA_Log_Stdout_clear;
  565. config->localConnectionConfig = UA_ConnectionConfig_default;
  566. /* Certificate Verification that accepts every certificate. Can be
  567. * overwritten when the policy is specialized. */
  568. UA_CertificateVerification_AcceptAll(&config->certificateVerification);
  569. /* With encryption enabled, the applicationUri needs to match the URI from
  570. * the certificate */
  571. config->clientDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI);
  572. config->clientDescription.applicationType = UA_APPLICATIONTYPE_CLIENT;
  573. if(config->securityPoliciesSize > 0) {
  574. UA_LOG_ERROR(&config->logger, UA_LOGCATEGORY_NETWORK,
  575. "Could not initialize a config that already has SecurityPolicies");
  576. return UA_STATUSCODE_BADINTERNALERROR;
  577. }
  578. config->securityPolicies = (UA_SecurityPolicy*)UA_malloc(sizeof(UA_SecurityPolicy));
  579. if(!config->securityPolicies)
  580. return UA_STATUSCODE_BADOUTOFMEMORY;
  581. UA_StatusCode retval = UA_SecurityPolicy_None(config->securityPolicies, NULL,
  582. UA_BYTESTRING_NULL, &config->logger);
  583. if(retval != UA_STATUSCODE_GOOD) {
  584. UA_free(config->securityPolicies);
  585. config->securityPolicies = NULL;
  586. return retval;
  587. }
  588. config->securityPoliciesSize = 1;
  589. config->connectionFunc = UA_ClientConnectionTCP;
  590. config->initConnectionFunc = UA_ClientConnectionTCP_init; /* for async client */
  591. config->pollConnectionFunc = UA_ClientConnectionTCP_poll_callback; /* for async connection */
  592. config->customDataTypes = NULL;
  593. config->stateCallback = NULL;
  594. config->connectivityCheckInterval = 0;
  595. config->requestedSessionTimeout = 1200000; /* requestedSessionTimeout */
  596. config->inactivityCallback = NULL;
  597. config->clientContext = NULL;
  598. #ifdef UA_ENABLE_SUBSCRIPTIONS
  599. config->outStandingPublishRequests = 10;
  600. config->subscriptionInactivityCallback = NULL;
  601. #endif
  602. return UA_STATUSCODE_GOOD;
  603. }
  604. #ifdef UA_ENABLE_ENCRYPTION
  605. UA_StatusCode
  606. UA_ClientConfig_setDefaultEncryption(UA_ClientConfig *config,
  607. UA_ByteString localCertificate, UA_ByteString privateKey,
  608. const UA_ByteString *trustList, size_t trustListSize,
  609. const UA_ByteString *revocationList, size_t revocationListSize) {
  610. UA_StatusCode retval = UA_ClientConfig_setDefault(config);
  611. if(retval != UA_STATUSCODE_GOOD)
  612. return retval;
  613. retval = UA_CertificateVerification_Trustlist(&config->certificateVerification,
  614. trustList, trustListSize,
  615. NULL, 0,
  616. revocationList, revocationListSize);
  617. if(retval != UA_STATUSCODE_GOOD)
  618. return retval;
  619. /* Populate SecurityPolicies */
  620. UA_SecurityPolicy *sp = (UA_SecurityPolicy*)
  621. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * 4);
  622. if(!sp)
  623. return UA_STATUSCODE_BADOUTOFMEMORY;
  624. config->securityPolicies = sp;
  625. retval = UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[1],
  626. &config->certificateVerification,
  627. localCertificate, privateKey, &config->logger);
  628. if(retval != UA_STATUSCODE_GOOD)
  629. return retval;
  630. ++config->securityPoliciesSize;
  631. retval = UA_SecurityPolicy_Basic256(&config->securityPolicies[2],
  632. &config->certificateVerification,
  633. localCertificate, privateKey, &config->logger);
  634. if(retval != UA_STATUSCODE_GOOD)
  635. return retval;
  636. ++config->securityPoliciesSize;
  637. retval = UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[3],
  638. &config->certificateVerification,
  639. localCertificate, privateKey, &config->logger);
  640. if(retval != UA_STATUSCODE_GOOD)
  641. return retval;
  642. ++config->securityPoliciesSize;
  643. return UA_STATUSCODE_GOOD;
  644. }
  645. #endif