ua_config_default.c 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748
  1. /* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  2. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  3. *
  4. * Copyright 2017 (c) Fraunhofer IOSB (Author: Julius Pfrommer)
  5. * Copyright 2017 (c) Julian Grothoff
  6. * Copyright 2017-2018 (c) Mark Giraud, Fraunhofer IOSB
  7. * Copyright 2017 (c) Stefan Profanter, fortiss GmbH
  8. * Copyright 2017 (c) Thomas Stalder, Blue Time Concept SA
  9. * Copyright 2018 (c) Daniel Feist, Precitec GmbH & Co. KG
  10. * Copyright 2018 (c) Fabian Arndt, Root-Core
  11. * Copyright 2019 (c) Kalycito Infotech Private Limited
  12. */
  13. #include <open62541/client_config_default.h>
  14. #include <open62541/network_tcp.h>
  15. #ifdef UA_ENABLE_WEBSOCKET_SERVER
  16. #include <open62541/network_ws.h>
  17. #endif
  18. #include <open62541/plugin/accesscontrol_default.h>
  19. #include <open62541/plugin/log_stdout.h>
  20. #include <open62541/plugin/pki_default.h>
  21. #include <open62541/plugin/securitypolicy_default.h>
  22. #include <open62541/server_config_default.h>
  23. /* Struct initialization works across ANSI C/C99/C++ if it is done when the
  24. * variable is first declared. Assigning values to existing structs is
  25. * heterogeneous across the three. */
  26. static UA_INLINE UA_UInt32Range
  27. UA_UINT32RANGE(UA_UInt32 min, UA_UInt32 max) {
  28. UA_UInt32Range range = {min, max};
  29. return range;
  30. }
  31. static UA_INLINE UA_DurationRange
  32. UA_DURATIONRANGE(UA_Duration min, UA_Duration max) {
  33. UA_DurationRange range = {min, max};
  34. return range;
  35. }
  36. /*******************************/
  37. /* Default Connection Settings */
  38. /*******************************/
  39. const UA_ConnectionConfig UA_ConnectionConfig_default = {
  40. 0, /* .protocolVersion */
  41. 65535, /* .sendBufferSize, 64k per chunk */
  42. 65535, /* .recvBufferSize, 64k per chunk */
  43. 0, /* .maxMessageSize, 0 -> unlimited */
  44. 0 /* .maxChunkCount, 0 -> unlimited */
  45. };
  46. /***************************/
  47. /* Default Server Settings */
  48. /***************************/
  49. #define MANUFACTURER_NAME "open62541"
  50. #define PRODUCT_NAME "open62541 OPC UA Server"
  51. #define PRODUCT_URI "http://open62541.org"
  52. #define APPLICATION_NAME "open62541-based OPC UA Application"
  53. #define APPLICATION_URI "urn:unconfigured:application"
  54. #define APPLICATION_URI_SERVER "urn:open62541.server.application"
  55. #define STRINGIFY(arg) #arg
  56. #define VERSION(MAJOR, MINOR, PATCH, LABEL) \
  57. STRINGIFY(MAJOR) "." STRINGIFY(MINOR) "." STRINGIFY(PATCH) LABEL
  58. static UA_StatusCode
  59. createEndpoint(UA_ServerConfig *conf, UA_EndpointDescription *endpoint,
  60. const UA_SecurityPolicy *securityPolicy,
  61. UA_MessageSecurityMode securityMode) {
  62. UA_EndpointDescription_init(endpoint);
  63. endpoint->securityMode = securityMode;
  64. UA_String_copy(&securityPolicy->policyUri, &endpoint->securityPolicyUri);
  65. endpoint->transportProfileUri =
  66. UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
  67. /* Add security level value for the corresponding message security mode */
  68. endpoint->securityLevel = (UA_Byte) securityMode;
  69. /* Enable all login mechanisms from the access control plugin */
  70. UA_StatusCode retval = UA_Array_copy(conf->accessControl.userTokenPolicies,
  71. conf->accessControl.userTokenPoliciesSize,
  72. (void **)&endpoint->userIdentityTokens,
  73. &UA_TYPES[UA_TYPES_USERTOKENPOLICY]);
  74. if(retval != UA_STATUSCODE_GOOD)
  75. return retval;
  76. endpoint->userIdentityTokensSize = conf->accessControl.userTokenPoliciesSize;
  77. UA_String_copy(&securityPolicy->localCertificate, &endpoint->serverCertificate);
  78. UA_ApplicationDescription_copy(&conf->applicationDescription, &endpoint->server);
  79. return UA_STATUSCODE_GOOD;
  80. }
  81. static const size_t usernamePasswordsSize = 2;
  82. static UA_UsernamePasswordLogin usernamePasswords[2] = {
  83. {UA_STRING_STATIC("user1"), UA_STRING_STATIC("password")},
  84. {UA_STRING_STATIC("user2"), UA_STRING_STATIC("password1")}};
  85. static UA_StatusCode
  86. setDefaultConfig(UA_ServerConfig *conf) {
  87. if (!conf)
  88. return UA_STATUSCODE_BADINVALIDARGUMENT;
  89. /* Zero out.. All members have a valid initial value */
  90. UA_ServerConfig_clean(conf);
  91. memset(conf, 0, sizeof(UA_ServerConfig));
  92. /* --> Start setting the default static config <-- */
  93. conf->nThreads = 1;
  94. conf->logger = UA_Log_Stdout_;
  95. conf->shutdownDelay = 0.0;
  96. /* Server Description */
  97. conf->buildInfo.productUri = UA_STRING_ALLOC(PRODUCT_URI);
  98. conf->buildInfo.manufacturerName = UA_STRING_ALLOC(MANUFACTURER_NAME);
  99. conf->buildInfo.productName = UA_STRING_ALLOC(PRODUCT_NAME);
  100. conf->buildInfo.softwareVersion =
  101. UA_STRING_ALLOC(VERSION(UA_OPEN62541_VER_MAJOR, UA_OPEN62541_VER_MINOR,
  102. UA_OPEN62541_VER_PATCH, UA_OPEN62541_VER_LABEL));
  103. #ifdef UA_PACK_DEBIAN
  104. conf->buildInfo.buildNumber = UA_STRING_ALLOC("deb");
  105. #else
  106. conf->buildInfo.buildNumber = UA_STRING_ALLOC(__DATE__ " " __TIME__);
  107. #endif
  108. conf->buildInfo.buildDate = UA_DateTime_now();
  109. conf->applicationDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI_SERVER);
  110. conf->applicationDescription.productUri = UA_STRING_ALLOC(PRODUCT_URI);
  111. conf->applicationDescription.applicationName =
  112. UA_LOCALIZEDTEXT_ALLOC("en", APPLICATION_NAME);
  113. conf->applicationDescription.applicationType = UA_APPLICATIONTYPE_SERVER;
  114. /* conf->applicationDescription.gatewayServerUri = UA_STRING_NULL; */
  115. /* conf->applicationDescription.discoveryProfileUri = UA_STRING_NULL; */
  116. /* conf->applicationDescription.discoveryUrlsSize = 0; */
  117. /* conf->applicationDescription.discoveryUrls = NULL; */
  118. #ifdef UA_ENABLE_DISCOVERY_MULTICAST
  119. UA_MdnsDiscoveryConfiguration_init(&conf->discovery.mdns);
  120. conf->discovery.mdnsInterfaceIP = UA_STRING_NULL;
  121. #endif
  122. /* Custom DataTypes */
  123. /* conf->customDataTypesSize = 0; */
  124. /* conf->customDataTypes = NULL; */
  125. /* Networking */
  126. /* conf->networkLayersSize = 0; */
  127. /* conf->networkLayers = NULL; */
  128. /* conf->customHostname = UA_STRING_NULL; */
  129. /* Endpoints */
  130. /* conf->endpoints = {0, NULL}; */
  131. /* Certificate Verification that accepts every certificate. Can be
  132. * overwritten when the policy is specialized. */
  133. UA_CertificateVerification_AcceptAll(&conf->certificateVerification);
  134. /* Global Node Lifecycle */
  135. conf->nodeLifecycle.constructor = NULL;
  136. conf->nodeLifecycle.destructor = NULL;
  137. /* Relax constraints for the InformationModel */
  138. conf->relaxEmptyValueConstraint = true; /* Allow empty values */
  139. /* Limits for SecureChannels */
  140. conf->maxSecureChannels = 40;
  141. conf->maxSecurityTokenLifetime = 10 * 60 * 1000; /* 10 minutes */
  142. /* Limits for Sessions */
  143. conf->maxSessions = 100;
  144. conf->maxSessionTimeout = 60.0 * 60.0 * 1000.0; /* 1h */
  145. /* Limits for Subscriptions */
  146. conf->publishingIntervalLimits = UA_DURATIONRANGE(100.0, 3600.0 * 1000.0);
  147. conf->lifeTimeCountLimits = UA_UINT32RANGE(3, 15000);
  148. conf->keepAliveCountLimits = UA_UINT32RANGE(1, 100);
  149. conf->maxNotificationsPerPublish = 1000;
  150. conf->enableRetransmissionQueue = true;
  151. conf->maxRetransmissionQueueSize = 0; /* unlimited */
  152. #ifdef UA_ENABLE_SUBSCRIPTIONS_EVENTS
  153. conf->maxEventsPerNode = 0; /* unlimited */
  154. #endif
  155. /* Limits for MonitoredItems */
  156. conf->samplingIntervalLimits = UA_DURATIONRANGE(50.0, 24.0 * 3600.0 * 1000.0);
  157. conf->queueSizeLimits = UA_UINT32RANGE(1, 100);
  158. #ifdef UA_ENABLE_DISCOVERY
  159. conf->discovery.cleanupTimeout = 60 * 60;
  160. #endif
  161. #ifdef UA_ENABLE_HISTORIZING
  162. /* conf->accessHistoryDataCapability = UA_FALSE; */
  163. /* conf->maxReturnDataValues = 0; */
  164. /* conf->accessHistoryEventsCapability = UA_FALSE; */
  165. /* conf->maxReturnEventValues = 0; */
  166. /* conf->insertDataCapability = UA_FALSE; */
  167. /* conf->insertEventCapability = UA_FALSE; */
  168. /* conf->insertAnnotationsCapability = UA_FALSE; */
  169. /* conf->replaceDataCapability = UA_FALSE; */
  170. /* conf->replaceEventCapability = UA_FALSE; */
  171. /* conf->updateDataCapability = UA_FALSE; */
  172. /* conf->updateEventCapability = UA_FALSE; */
  173. /* conf->deleteRawCapability = UA_FALSE; */
  174. /* conf->deleteEventCapability = UA_FALSE; */
  175. /* conf->deleteAtTimeDataCapability = UA_FALSE; */
  176. #endif
  177. /* --> Finish setting the default static config <-- */
  178. return UA_STATUSCODE_GOOD;
  179. }
  180. UA_EXPORT UA_StatusCode
  181. UA_ServerConfig_setBasics(UA_ServerConfig* conf) {
  182. return setDefaultConfig(conf);
  183. }
  184. static UA_StatusCode
  185. addDefaultNetworkLayers(UA_ServerConfig *conf, UA_UInt16 portNumber,
  186. UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
  187. return UA_ServerConfig_addNetworkLayerTCP(conf, portNumber, sendBufferSize, recvBufferSize);
  188. }
  189. #ifdef UA_ENABLE_WEBSOCKET_SERVER
  190. UA_EXPORT UA_StatusCode
  191. UA_ServerConfig_addNetworkLayerWS(UA_ServerConfig *conf, UA_UInt16 portNumber,
  192. UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
  193. /* Add a network layer */
  194. UA_ServerNetworkLayer *tmp = (UA_ServerNetworkLayer *)
  195. UA_realloc(conf->networkLayers, sizeof(UA_ServerNetworkLayer) * (1 + conf->networkLayersSize));
  196. if(!tmp)
  197. return UA_STATUSCODE_BADOUTOFMEMORY;
  198. conf->networkLayers = tmp;
  199. UA_ConnectionConfig config = UA_ConnectionConfig_default;
  200. if (sendBufferSize > 0)
  201. config.sendBufferSize = sendBufferSize;
  202. if (recvBufferSize > 0)
  203. config.recvBufferSize = recvBufferSize;
  204. conf->networkLayers[conf->networkLayersSize] =
  205. UA_ServerNetworkLayerWS(config, portNumber, &conf->logger);
  206. if (!conf->networkLayers[conf->networkLayersSize].handle)
  207. return UA_STATUSCODE_BADOUTOFMEMORY;
  208. conf->networkLayersSize++;
  209. return UA_STATUSCODE_GOOD;
  210. }
  211. #endif
  212. UA_EXPORT UA_StatusCode
  213. UA_ServerConfig_addNetworkLayerTCP(UA_ServerConfig *conf, UA_UInt16 portNumber,
  214. UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
  215. /* Add a network layer */
  216. UA_ServerNetworkLayer *tmp = (UA_ServerNetworkLayer *)
  217. UA_realloc(conf->networkLayers, sizeof(UA_ServerNetworkLayer) * (1 + conf->networkLayersSize));
  218. if(!tmp)
  219. return UA_STATUSCODE_BADOUTOFMEMORY;
  220. conf->networkLayers = tmp;
  221. UA_ConnectionConfig config = UA_ConnectionConfig_default;
  222. if (sendBufferSize > 0)
  223. config.sendBufferSize = sendBufferSize;
  224. if (recvBufferSize > 0)
  225. config.recvBufferSize = recvBufferSize;
  226. conf->networkLayers[conf->networkLayersSize] =
  227. UA_ServerNetworkLayerTCP(config, portNumber, &conf->logger);
  228. if (!conf->networkLayers[conf->networkLayersSize].handle)
  229. return UA_STATUSCODE_BADOUTOFMEMORY;
  230. conf->networkLayersSize++;
  231. return UA_STATUSCODE_GOOD;
  232. }
  233. UA_EXPORT UA_StatusCode
  234. UA_ServerConfig_addSecurityPolicyNone(UA_ServerConfig *config,
  235. const UA_ByteString *certificate) {
  236. UA_StatusCode retval;
  237. /* Allocate the SecurityPolicies */
  238. UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
  239. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
  240. if(!tmp)
  241. return UA_STATUSCODE_BADOUTOFMEMORY;
  242. config->securityPolicies = tmp;
  243. /* Populate the SecurityPolicies */
  244. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  245. if(certificate)
  246. localCertificate = *certificate;
  247. retval = UA_SecurityPolicy_None(&config->securityPolicies[config->securityPoliciesSize], NULL,
  248. localCertificate, &config->logger);
  249. if(retval != UA_STATUSCODE_GOOD)
  250. return retval;
  251. config->securityPoliciesSize++;
  252. return UA_STATUSCODE_GOOD;
  253. }
  254. UA_EXPORT UA_StatusCode
  255. UA_ServerConfig_addEndpoint(UA_ServerConfig *config, const UA_String securityPolicyUri,
  256. UA_MessageSecurityMode securityMode)
  257. {
  258. UA_StatusCode retval;
  259. /* Allocate the endpoint */
  260. UA_EndpointDescription * tmp = (UA_EndpointDescription *)
  261. UA_realloc(config->endpoints, sizeof(UA_EndpointDescription) * (1 + config->endpointsSize));
  262. if(!tmp) {
  263. return UA_STATUSCODE_BADOUTOFMEMORY;
  264. }
  265. config->endpoints = tmp;
  266. /* Lookup the security policy */
  267. const UA_SecurityPolicy *policy = NULL;
  268. for (size_t i = 0; i < config->securityPoliciesSize; ++i) {
  269. if (UA_String_equal(&securityPolicyUri, &config->securityPolicies[i].policyUri)) {
  270. policy = &config->securityPolicies[i];
  271. break;
  272. }
  273. }
  274. if (!policy)
  275. return UA_STATUSCODE_BADINVALIDARGUMENT;
  276. /* Populate the endpoint */
  277. retval = createEndpoint(config, &config->endpoints[config->endpointsSize],
  278. policy, securityMode);
  279. if(retval != UA_STATUSCODE_GOOD)
  280. return retval;
  281. config->endpointsSize++;
  282. return UA_STATUSCODE_GOOD;
  283. }
  284. UA_EXPORT UA_StatusCode
  285. UA_ServerConfig_addAllEndpoints(UA_ServerConfig *config) {
  286. UA_StatusCode retval;
  287. /* Allocate the endpoints */
  288. UA_EndpointDescription * tmp = (UA_EndpointDescription *)
  289. UA_realloc(config->endpoints, sizeof(UA_EndpointDescription) * (2 * config->securityPoliciesSize + config->endpointsSize));
  290. if(!tmp) {
  291. return UA_STATUSCODE_BADOUTOFMEMORY;
  292. }
  293. config->endpoints = tmp;
  294. /* Populate the endpoints */
  295. for (size_t i = 0; i < config->securityPoliciesSize; ++i) {
  296. if (UA_String_equal(&UA_SECURITY_POLICY_NONE_URI, &config->securityPolicies[i].policyUri)) {
  297. retval = createEndpoint(config, &config->endpoints[config->endpointsSize],
  298. &config->securityPolicies[i], UA_MESSAGESECURITYMODE_NONE);
  299. if(retval != UA_STATUSCODE_GOOD)
  300. return retval;
  301. config->endpointsSize++;
  302. } else {
  303. retval = createEndpoint(config, &config->endpoints[config->endpointsSize],
  304. &config->securityPolicies[i], UA_MESSAGESECURITYMODE_SIGN);
  305. if(retval != UA_STATUSCODE_GOOD)
  306. return retval;
  307. config->endpointsSize++;
  308. retval = createEndpoint(config, &config->endpoints[config->endpointsSize],
  309. &config->securityPolicies[i], UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  310. if(retval != UA_STATUSCODE_GOOD)
  311. return retval;
  312. config->endpointsSize++;
  313. }
  314. }
  315. return UA_STATUSCODE_GOOD;
  316. }
  317. UA_EXPORT UA_StatusCode
  318. UA_ServerConfig_setMinimalCustomBuffer(UA_ServerConfig *config, UA_UInt16 portNumber,
  319. const UA_ByteString *certificate,
  320. UA_UInt32 sendBufferSize,
  321. UA_UInt32 recvBufferSize) {
  322. if (!config)
  323. return UA_STATUSCODE_BADINVALIDARGUMENT;
  324. UA_StatusCode retval = setDefaultConfig(config);
  325. if(retval != UA_STATUSCODE_GOOD) {
  326. UA_ServerConfig_clean(config);
  327. return retval;
  328. }
  329. retval = addDefaultNetworkLayers(config, portNumber, sendBufferSize, recvBufferSize);
  330. if(retval != UA_STATUSCODE_GOOD) {
  331. UA_ServerConfig_clean(config);
  332. return retval;
  333. }
  334. /* Allocate the SecurityPolicies */
  335. retval = UA_ServerConfig_addSecurityPolicyNone(config, certificate);
  336. if(retval != UA_STATUSCODE_GOOD) {
  337. UA_ServerConfig_clean(config);
  338. return retval;
  339. }
  340. /* Initialize the Access Control plugin */
  341. retval = UA_AccessControl_default(config, true,
  342. &config->securityPolicies[config->securityPoliciesSize-1].policyUri,
  343. usernamePasswordsSize, usernamePasswords);
  344. if(retval != UA_STATUSCODE_GOOD) {
  345. UA_ServerConfig_clean(config);
  346. return retval;
  347. }
  348. /* Allocate the endpoint */
  349. retval = UA_ServerConfig_addEndpoint(config, UA_SECURITY_POLICY_NONE_URI, UA_MESSAGESECURITYMODE_NONE);
  350. if(retval != UA_STATUSCODE_GOOD) {
  351. UA_ServerConfig_clean(config);
  352. return retval;
  353. }
  354. return UA_STATUSCODE_GOOD;
  355. }
  356. #ifdef UA_ENABLE_ENCRYPTION
  357. UA_EXPORT UA_StatusCode
  358. UA_ServerConfig_addSecurityPolicyBasic128Rsa15(UA_ServerConfig *config,
  359. const UA_ByteString *certificate,
  360. const UA_ByteString *privateKey) {
  361. UA_StatusCode retval;
  362. /* Allocate the SecurityPolicies */
  363. UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
  364. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
  365. if(!tmp)
  366. return UA_STATUSCODE_BADOUTOFMEMORY;
  367. config->securityPolicies = tmp;
  368. /* Populate the SecurityPolicies */
  369. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  370. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  371. if(certificate)
  372. localCertificate = *certificate;
  373. if(privateKey)
  374. localPrivateKey = *privateKey;
  375. retval = UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[config->securityPoliciesSize],
  376. &config->certificateVerification,
  377. localCertificate, localPrivateKey, &config->logger);
  378. if(retval != UA_STATUSCODE_GOOD)
  379. return retval;
  380. config->securityPoliciesSize++;
  381. return UA_STATUSCODE_GOOD;
  382. }
  383. UA_EXPORT UA_StatusCode
  384. UA_ServerConfig_addSecurityPolicyBasic256(UA_ServerConfig *config,
  385. const UA_ByteString *certificate,
  386. const UA_ByteString *privateKey) {
  387. UA_StatusCode retval;
  388. /* Allocate the SecurityPolicies */
  389. UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
  390. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
  391. if(!tmp)
  392. return UA_STATUSCODE_BADOUTOFMEMORY;
  393. config->securityPolicies = tmp;
  394. /* Populate the SecurityPolicies */
  395. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  396. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  397. if(certificate)
  398. localCertificate = *certificate;
  399. if(privateKey)
  400. localPrivateKey = *privateKey;
  401. retval = UA_SecurityPolicy_Basic256(&config->securityPolicies[config->securityPoliciesSize],
  402. &config->certificateVerification,
  403. localCertificate, localPrivateKey, &config->logger);
  404. if(retval != UA_STATUSCODE_GOOD)
  405. return retval;
  406. config->securityPoliciesSize++;
  407. return UA_STATUSCODE_GOOD;
  408. }
  409. UA_EXPORT UA_StatusCode
  410. UA_ServerConfig_addSecurityPolicyBasic256Sha256(UA_ServerConfig *config,
  411. const UA_ByteString *certificate,
  412. const UA_ByteString *privateKey) {
  413. UA_StatusCode retval;
  414. /* Allocate the SecurityPolicies */
  415. UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
  416. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
  417. if(!tmp)
  418. return UA_STATUSCODE_BADOUTOFMEMORY;
  419. config->securityPolicies = tmp;
  420. /* Populate the SecurityPolicies */
  421. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  422. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  423. if(certificate)
  424. localCertificate = *certificate;
  425. if(privateKey)
  426. localPrivateKey = *privateKey;
  427. retval = UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[config->securityPoliciesSize],
  428. &config->certificateVerification,
  429. localCertificate, localPrivateKey, &config->logger);
  430. if(retval != UA_STATUSCODE_GOOD)
  431. return retval;
  432. config->securityPoliciesSize++;
  433. return UA_STATUSCODE_GOOD;
  434. }
  435. UA_EXPORT UA_StatusCode
  436. UA_ServerConfig_addAllSecurityPolicies(UA_ServerConfig *config,
  437. const UA_ByteString *certificate,
  438. const UA_ByteString *privateKey) {
  439. UA_StatusCode retval;
  440. /* Allocate the SecurityPolicies */
  441. UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
  442. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * (4 + config->securityPoliciesSize));
  443. if(!tmp)
  444. return UA_STATUSCODE_BADOUTOFMEMORY;
  445. config->securityPolicies = tmp;
  446. /* Populate the SecurityPolicies */
  447. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  448. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  449. if(certificate)
  450. localCertificate = *certificate;
  451. if(privateKey)
  452. localPrivateKey = *privateKey;
  453. retval = UA_SecurityPolicy_None(&config->securityPolicies[config->securityPoliciesSize], NULL,
  454. localCertificate, &config->logger);
  455. if(retval != UA_STATUSCODE_GOOD)
  456. return retval;
  457. config->securityPoliciesSize++;
  458. retval = UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[config->securityPoliciesSize],
  459. &config->certificateVerification,
  460. localCertificate, localPrivateKey, &config->logger);
  461. if(retval != UA_STATUSCODE_GOOD)
  462. return retval;
  463. config->securityPoliciesSize++;
  464. retval = UA_SecurityPolicy_Basic256(&config->securityPolicies[config->securityPoliciesSize],
  465. &config->certificateVerification,
  466. localCertificate, localPrivateKey, &config->logger);
  467. if(retval != UA_STATUSCODE_GOOD)
  468. return retval;
  469. config->securityPoliciesSize++;
  470. retval = UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[config->securityPoliciesSize],
  471. &config->certificateVerification,
  472. localCertificate, localPrivateKey, &config->logger);
  473. if(retval != UA_STATUSCODE_GOOD)
  474. return retval;
  475. config->securityPoliciesSize++;
  476. return retval;
  477. }
  478. UA_EXPORT UA_StatusCode
  479. UA_ServerConfig_setDefaultWithSecurityPolicies(UA_ServerConfig *conf,
  480. UA_UInt16 portNumber,
  481. const UA_ByteString *certificate,
  482. const UA_ByteString *privateKey,
  483. const UA_ByteString *trustList,
  484. size_t trustListSize,
  485. const UA_ByteString *issuerList,
  486. size_t issuerListSize,
  487. const UA_ByteString *revocationList,
  488. size_t revocationListSize) {
  489. UA_StatusCode retval = setDefaultConfig(conf);
  490. if(retval != UA_STATUSCODE_GOOD) {
  491. UA_ServerConfig_clean(conf);
  492. return retval;
  493. }
  494. retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
  495. trustList, trustListSize,
  496. issuerList, issuerListSize,
  497. revocationList, revocationListSize);
  498. if (retval != UA_STATUSCODE_GOOD)
  499. return retval;
  500. if(trustListSize == 0)
  501. UA_LOG_WARNING(&conf->logger, UA_LOGCATEGORY_USERLAND,
  502. "No CA trust-list provided. "
  503. "Any remote certificate will be accepted.");
  504. retval = addDefaultNetworkLayers(conf, portNumber, 0, 0);
  505. if(retval != UA_STATUSCODE_GOOD) {
  506. UA_ServerConfig_clean(conf);
  507. return retval;
  508. }
  509. retval = UA_ServerConfig_addAllSecurityPolicies(conf, certificate, privateKey);
  510. if(retval != UA_STATUSCODE_GOOD) {
  511. UA_ServerConfig_clean(conf);
  512. return retval;
  513. }
  514. retval = UA_AccessControl_default(conf, true,
  515. &conf->securityPolicies[conf->securityPoliciesSize-1].policyUri,
  516. usernamePasswordsSize, usernamePasswords);
  517. if(retval != UA_STATUSCODE_GOOD) {
  518. UA_ServerConfig_clean(conf);
  519. return retval;
  520. }
  521. retval = UA_ServerConfig_addAllEndpoints(conf);
  522. if(retval != UA_STATUSCODE_GOOD) {
  523. UA_ServerConfig_clean(conf);
  524. return retval;
  525. }
  526. return UA_STATUSCODE_GOOD;
  527. }
  528. #endif
  529. /***************************/
  530. /* Default Client Settings */
  531. /***************************/
  532. static UA_INLINE void
  533. UA_ClientConnectionTCP_poll_callback(UA_Client *client, void *data) {
  534. UA_ClientConnectionTCP_poll(client, data);
  535. }
  536. UA_StatusCode
  537. UA_ClientConfig_setDefault(UA_ClientConfig *config) {
  538. config->timeout = 5000;
  539. config->secureChannelLifeTime = 10 * 60 * 1000; /* 10 minutes */
  540. config->logger.log = UA_Log_Stdout_log;
  541. config->logger.context = NULL;
  542. config->logger.clear = UA_Log_Stdout_clear;
  543. config->localConnectionConfig = UA_ConnectionConfig_default;
  544. /* Certificate Verification that accepts every certificate. Can be
  545. * overwritten when the policy is specialized. */
  546. UA_CertificateVerification_AcceptAll(&config->certificateVerification);
  547. /* With encryption enabled, the applicationUri needs to match the URI from
  548. * the certificate */
  549. config->clientDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI);
  550. config->clientDescription.applicationType = UA_APPLICATIONTYPE_CLIENT;
  551. if(config->securityPoliciesSize > 0) {
  552. UA_LOG_ERROR(&config->logger, UA_LOGCATEGORY_NETWORK,
  553. "Could not initialize a config that already has SecurityPolicies");
  554. return UA_STATUSCODE_BADINTERNALERROR;
  555. }
  556. config->securityPolicies = (UA_SecurityPolicy*)UA_malloc(sizeof(UA_SecurityPolicy));
  557. if(!config->securityPolicies)
  558. return UA_STATUSCODE_BADOUTOFMEMORY;
  559. UA_StatusCode retval = UA_SecurityPolicy_None(config->securityPolicies, NULL,
  560. UA_BYTESTRING_NULL, &config->logger);
  561. if(retval != UA_STATUSCODE_GOOD) {
  562. UA_free(config->securityPolicies);
  563. config->securityPolicies = NULL;
  564. return retval;
  565. }
  566. config->securityPoliciesSize = 1;
  567. config->connectionFunc = UA_ClientConnectionTCP;
  568. config->initConnectionFunc = UA_ClientConnectionTCP_init; /* for async client */
  569. config->pollConnectionFunc = UA_ClientConnectionTCP_poll_callback; /* for async connection */
  570. config->customDataTypes = NULL;
  571. config->stateCallback = NULL;
  572. config->connectivityCheckInterval = 0;
  573. config->requestedSessionTimeout = 1200000; /* requestedSessionTimeout */
  574. config->inactivityCallback = NULL;
  575. config->clientContext = NULL;
  576. #ifdef UA_ENABLE_SUBSCRIPTIONS
  577. config->outStandingPublishRequests = 10;
  578. config->subscriptionInactivityCallback = NULL;
  579. #endif
  580. return UA_STATUSCODE_GOOD;
  581. }
  582. #ifdef UA_ENABLE_ENCRYPTION
  583. UA_StatusCode
  584. UA_ClientConfig_setDefaultEncryption(UA_ClientConfig *config,
  585. UA_ByteString localCertificate, UA_ByteString privateKey,
  586. const UA_ByteString *trustList, size_t trustListSize,
  587. const UA_ByteString *revocationList, size_t revocationListSize) {
  588. UA_StatusCode retval = UA_ClientConfig_setDefault(config);
  589. if(retval != UA_STATUSCODE_GOOD)
  590. return retval;
  591. retval = UA_CertificateVerification_Trustlist(&config->certificateVerification,
  592. trustList, trustListSize,
  593. NULL, 0,
  594. revocationList, revocationListSize);
  595. if(retval != UA_STATUSCODE_GOOD)
  596. return retval;
  597. /* Populate SecurityPolicies */
  598. UA_SecurityPolicy *sp = (UA_SecurityPolicy*)
  599. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * 4);
  600. if(!sp)
  601. return UA_STATUSCODE_BADOUTOFMEMORY;
  602. config->securityPolicies = sp;
  603. retval = UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[1],
  604. &config->certificateVerification,
  605. localCertificate, privateKey, &config->logger);
  606. if(retval != UA_STATUSCODE_GOOD)
  607. return retval;
  608. ++config->securityPoliciesSize;
  609. retval = UA_SecurityPolicy_Basic256(&config->securityPolicies[2],
  610. &config->certificateVerification,
  611. localCertificate, privateKey, &config->logger);
  612. if(retval != UA_STATUSCODE_GOOD)
  613. return retval;
  614. ++config->securityPoliciesSize;
  615. retval = UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[3],
  616. &config->certificateVerification,
  617. localCertificate, privateKey, &config->logger);
  618. if(retval != UA_STATUSCODE_GOOD)
  619. return retval;
  620. ++config->securityPoliciesSize;
  621. return UA_STATUSCODE_GOOD;
  622. }
  623. #endif