123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758 |
- #include "ua_util.h"
- #include "ua_client.h"
- #include "ua_client_highlevel.h"
- #include "ua_client_internal.h"
- #include "ua_connection_internal.h"
- #include "ua_types_generated.h"
- #include "ua_nodeids.h"
- #include "ua_types_encoding_binary.h"
- #include "ua_transport_generated.h"
- #include "ua_types_generated_encoding_binary.h"
- #include "ua_transport_generated_encoding_binary.h"
- /*********************/
- /* Create and Delete */
- /*********************/
- static void UA_Client_init(UA_Client* client, UA_ClientConfig config) {
- client->state = UA_CLIENTSTATE_READY;
- UA_Connection_init(&client->connection);
- UA_SecureChannel_init(&client->channel);
- client->channel.connection = &client->connection;
- UA_String_init(&client->endpointUrl);
- client->requestId = 0;
- client->authenticationMethod = UA_CLIENTAUTHENTICATION_NONE;
- UA_String_init(&client->username);
- UA_String_init(&client->password);
- UA_NodeId_init(&client->authenticationToken);
- client->requestHandle = 0;
- client->config = config;
- client->scRenewAt = 0;
- #ifdef UA_ENABLE_SUBSCRIPTIONS
- client->monitoredItemHandles = 0;
- LIST_INIT(&client->pendingNotificationsAcks);
- LIST_INIT(&client->subscriptions);
- #endif
- }
- UA_Client * UA_Client_new(UA_ClientConfig config) {
- UA_Client *client = UA_calloc(1, sizeof(UA_Client));
- if(!client)
- return NULL;
- UA_Client_init(client, config);
- return client;
- }
- static void UA_Client_deleteMembers(UA_Client* client) {
- UA_Client_disconnect(client);
- UA_Connection_deleteMembers(&client->connection);
- UA_SecureChannel_deleteMembersCleanup(&client->channel);
- if(client->endpointUrl.data)
- UA_String_deleteMembers(&client->endpointUrl);
- UA_UserTokenPolicy_deleteMembers(&client->token);
- if(client->username.data)
- UA_String_deleteMembers(&client->username);
- if(client->password.data)
- UA_String_deleteMembers(&client->password);
- #ifdef UA_ENABLE_SUBSCRIPTIONS
- UA_Client_NotificationsAckNumber *n, *tmp;
- LIST_FOREACH_SAFE(n, &client->pendingNotificationsAcks, listEntry, tmp) {
- LIST_REMOVE(n, listEntry);
- free(n);
- }
- UA_Client_Subscription *sub, *tmps;
- LIST_FOREACH_SAFE(sub, &client->subscriptions, listEntry, tmps) {
- LIST_REMOVE(sub, listEntry);
- UA_Client_MonitoredItem *mon, *tmpmon;
- LIST_FOREACH_SAFE(mon, &sub->MonitoredItems, listEntry, tmpmon) {
- UA_Client_Subscriptions_removeMonitoredItem(client, sub->SubscriptionID,
- mon->MonitoredItemId);
- }
- free(sub);
- }
- #endif
- }
- void UA_Client_reset(UA_Client* client){
- UA_Client_deleteMembers(client);
- UA_Client_init(client, client->config);
- }
- void UA_Client_delete(UA_Client* client){
- if(client->state != UA_CLIENTSTATE_READY)
- UA_Client_deleteMembers(client);
- UA_free(client);
- }
- UA_ClientState UA_EXPORT UA_Client_getState(UA_Client *client) {
- if(!client)
- return UA_CLIENTSTATE_ERRORED;
- return client->state;
- }
- /*************************/
- /* Manage the Connection */
- /*************************/
- static UA_StatusCode HelAckHandshake(UA_Client *client) {
- UA_TcpMessageHeader messageHeader;
- messageHeader.messageTypeAndChunkType = UA_CHUNKTYPE_FINAL + UA_MESSAGETYPE_HEL;
- UA_TcpHelloMessage hello;
- UA_String_copy(&client->endpointUrl, &hello.endpointUrl); /* must be less than 4096 bytes */
- UA_Connection *conn = &client->connection;
- hello.maxChunkCount = conn->localConf.maxChunkCount;
- hello.maxMessageSize = conn->localConf.maxMessageSize;
- hello.protocolVersion = conn->localConf.protocolVersion;
- hello.receiveBufferSize = conn->localConf.recvBufferSize;
- hello.sendBufferSize = conn->localConf.sendBufferSize;
- UA_ByteString message;
- UA_StatusCode retval;
- retval = client->connection.getSendBuffer(&client->connection, client->connection.remoteConf.recvBufferSize, &message);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- size_t offset = 8;
- retval |= UA_TcpHelloMessage_encodeBinary(&hello, &message, &offset);
- messageHeader.messageSize = (UA_UInt32)offset;
- offset = 0;
- retval |= UA_TcpMessageHeader_encodeBinary(&messageHeader, &message, &offset);
- UA_TcpHelloMessage_deleteMembers(&hello);
- if(retval != UA_STATUSCODE_GOOD) {
- client->connection.releaseSendBuffer(&client->connection, &message);
- return retval;
- }
- message.length = messageHeader.messageSize;
- retval = client->connection.send(&client->connection, &message);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_LOG_INFO(client->config.logger, UA_LOGCATEGORY_NETWORK, "Sending HEL failed");
- return retval;
- }
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_NETWORK, "Sent HEL message");
- UA_ByteString reply;
- UA_ByteString_init(&reply);
- UA_Boolean realloced = false;
- do {
- retval = client->connection.recv(&client->connection, &reply, client->config.timeout);
- retval |= UA_Connection_completeMessages(&client->connection, &reply, &realloced);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_LOG_INFO(client->config.logger, UA_LOGCATEGORY_NETWORK, "Receiving ACK message failed");
- return retval;
- }
- } while(reply.length == 0);
- offset = 0;
- UA_TcpMessageHeader_decodeBinary(&reply, &offset, &messageHeader);
- UA_TcpAcknowledgeMessage ackMessage;
- retval = UA_TcpAcknowledgeMessage_decodeBinary(&reply, &offset, &ackMessage);
- if(!realloced)
- client->connection.releaseRecvBuffer(&client->connection, &reply);
- else
- UA_ByteString_deleteMembers(&reply);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_LOG_INFO(client->config.logger, UA_LOGCATEGORY_NETWORK, "Decoding ACK message failed");
- return retval;
- }
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_NETWORK, "Received ACK message");
- conn->remoteConf.maxChunkCount = ackMessage.maxChunkCount;
- conn->remoteConf.maxMessageSize = ackMessage.maxMessageSize;
- conn->remoteConf.protocolVersion = ackMessage.protocolVersion;
- conn->remoteConf.recvBufferSize = ackMessage.receiveBufferSize;
- conn->remoteConf.sendBufferSize = ackMessage.sendBufferSize;
- conn->state = UA_CONNECTION_ESTABLISHED;
- return UA_STATUSCODE_GOOD;
- }
- static UA_StatusCode SecureChannelHandshake(UA_Client *client, UA_Boolean renew) {
- /* Check if sc is still valid */
- if(renew && client->scRenewAt - UA_DateTime_now() > 0)
- return UA_STATUSCODE_GOOD;
- UA_Connection *c = &client->connection;
- if(c->state != UA_CONNECTION_ESTABLISHED)
- return UA_STATUSCODE_BADSERVERNOTCONNECTED;
- UA_SecureConversationMessageHeader messageHeader;
- messageHeader.messageHeader.messageTypeAndChunkType = UA_MESSAGETYPE_OPN + UA_CHUNKTYPE_FINAL;
- if(renew)
- messageHeader.secureChannelId = client->channel.securityToken.channelId;
- else
- messageHeader.secureChannelId = 0;
- UA_SequenceHeader seqHeader;
- seqHeader.sequenceNumber = ++client->channel.sequenceNumber;
- seqHeader.requestId = ++client->requestId;
- UA_AsymmetricAlgorithmSecurityHeader asymHeader;
- UA_AsymmetricAlgorithmSecurityHeader_init(&asymHeader);
- asymHeader.securityPolicyUri = UA_STRING_ALLOC("http://opcfoundation.org/UA/SecurityPolicy#None");
- /* id of opensecurechannelrequest */
- UA_NodeId requestType = UA_NODEID_NUMERIC(0, UA_NS0ID_OPENSECURECHANNELREQUEST + UA_ENCODINGOFFSET_BINARY);
- UA_OpenSecureChannelRequest opnSecRq;
- UA_OpenSecureChannelRequest_init(&opnSecRq);
- opnSecRq.requestHeader.timestamp = UA_DateTime_now();
- opnSecRq.requestHeader.authenticationToken = client->authenticationToken;
- opnSecRq.requestedLifetime = client->config.secureChannelLifeTime;
- if(renew) {
- opnSecRq.requestType = UA_SECURITYTOKENREQUESTTYPE_RENEW;
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_SECURECHANNEL, "Requesting to renew the SecureChannel");
- } else {
- opnSecRq.requestType = UA_SECURITYTOKENREQUESTTYPE_ISSUE;
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_SECURECHANNEL, "Requesting to open a SecureChannel");
- }
- UA_ByteString_copy(&client->channel.clientNonce, &opnSecRq.clientNonce);
- opnSecRq.securityMode = UA_MESSAGESECURITYMODE_NONE;
- UA_ByteString message;
- UA_StatusCode retval = c->getSendBuffer(c, c->remoteConf.recvBufferSize, &message);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
- UA_OpenSecureChannelRequest_deleteMembers(&opnSecRq);
- return retval;
- }
- size_t offset = 12;
- retval = UA_AsymmetricAlgorithmSecurityHeader_encodeBinary(&asymHeader, &message, &offset);
- retval |= UA_SequenceHeader_encodeBinary(&seqHeader, &message, &offset);
- retval |= UA_NodeId_encodeBinary(&requestType, &message, &offset);
- retval |= UA_OpenSecureChannelRequest_encodeBinary(&opnSecRq, &message, &offset);
- messageHeader.messageHeader.messageSize = (UA_UInt32)offset;
- offset = 0;
- retval |= UA_SecureConversationMessageHeader_encodeBinary(&messageHeader, &message, &offset);
- UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
- UA_OpenSecureChannelRequest_deleteMembers(&opnSecRq);
- if(retval != UA_STATUSCODE_GOOD) {
- client->connection.releaseSendBuffer(&client->connection, &message);
- return retval;
- }
- message.length = messageHeader.messageHeader.messageSize;
- retval = client->connection.send(&client->connection, &message);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- UA_ByteString reply;
- UA_ByteString_init(&reply);
- UA_Boolean realloced = false;
- do {
- retval = c->recv(c, &reply, client->config.timeout);
- retval |= UA_Connection_completeMessages(c, &reply, &realloced);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_SECURECHANNEL,
- "Receiving OpenSecureChannelResponse failed");
- return retval;
- }
- } while(reply.length == 0);
- offset = 0;
- UA_SecureConversationMessageHeader_decodeBinary(&reply, &offset, &messageHeader);
- UA_AsymmetricAlgorithmSecurityHeader_decodeBinary(&reply, &offset, &asymHeader);
- UA_SequenceHeader_decodeBinary(&reply, &offset, &seqHeader);
- UA_NodeId_decodeBinary(&reply, &offset, &requestType);
- UA_NodeId expectedRequest = UA_NODEID_NUMERIC(0, UA_NS0ID_OPENSECURECHANNELRESPONSE +
- UA_ENCODINGOFFSET_BINARY);
- if(!UA_NodeId_equal(&requestType, &expectedRequest)) {
- UA_ByteString_deleteMembers(&reply);
- UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
- UA_NodeId_deleteMembers(&requestType);
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Reply answers the wrong request. Expected OpenSecureChannelResponse.");
- return UA_STATUSCODE_BADINTERNALERROR;
- }
- UA_OpenSecureChannelResponse response;
- UA_OpenSecureChannelResponse_init(&response);
- retval = UA_OpenSecureChannelResponse_decodeBinary(&reply, &offset, &response);
- if(!realloced)
- c->releaseRecvBuffer(c, &reply);
- else
- UA_ByteString_deleteMembers(&reply);
- if(retval != UA_STATUSCODE_GOOD) {
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_SECURECHANNEL,
- "Decoding OpenSecureChannelResponse failed");
- UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
- UA_OpenSecureChannelResponse_init(&response);
- response.responseHeader.serviceResult = retval;
- return retval;
- }
- retval = response.responseHeader.serviceResult;
- if(retval == UA_STATUSCODE_GOOD) {
- /* Response.securityToken.revisedLifetime is UInt32 we need to cast it
- to DateTime=Int64 we take 75% of lifetime to start renewing as
- described in standard */
- client->scRenewAt = UA_DateTime_now() +
- (UA_DateTime)(response.securityToken.revisedLifetime * (UA_Double)UA_MSEC_TO_DATETIME * 0.75);
- /* Replace the old nonce */
- UA_ChannelSecurityToken_deleteMembers(&client->channel.securityToken);
- UA_ChannelSecurityToken_copy(&response.securityToken, &client->channel.securityToken);
- UA_ByteString_deleteMembers(&client->channel.serverNonce);
- UA_ByteString_copy(&response.serverNonce, &client->channel.serverNonce);
- if(renew)
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_SECURECHANNEL, "SecureChannel renewed");
- else
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_SECURECHANNEL, "SecureChannel opened");
- } else {
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_SECURECHANNEL, "SecureChannel could "
- "not be opened / renewed with statuscode %i", retval);
- }
- UA_OpenSecureChannelResponse_deleteMembers(&response);
- UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
- return retval;
- }
- static UA_StatusCode ActivateSession(UA_Client *client) {
- UA_ActivateSessionRequest request;
- UA_ActivateSessionRequest_init(&request);
- request.requestHeader.requestHandle = ++client->requestHandle;
- request.requestHeader.authenticationToken = client->authenticationToken;
- request.requestHeader.timestamp = UA_DateTime_now();
- request.requestHeader.timeoutHint = 600000;
- //manual ExtensionObject encoding of the identityToken
- if(client->authenticationMethod == UA_CLIENTAUTHENTICATION_NONE) {
- UA_AnonymousIdentityToken* identityToken = UA_malloc(sizeof(UA_AnonymousIdentityToken));
- UA_AnonymousIdentityToken_init(identityToken);
- UA_String_copy(&client->token.policyId, &identityToken->policyId);
- request.userIdentityToken.encoding = UA_EXTENSIONOBJECT_DECODED;
- request.userIdentityToken.content.decoded.type = &UA_TYPES[UA_TYPES_ANONYMOUSIDENTITYTOKEN];
- request.userIdentityToken.content.decoded.data = identityToken;
- } else {
- UA_UserNameIdentityToken* identityToken = UA_malloc(sizeof(UA_UserNameIdentityToken));
- UA_UserNameIdentityToken_init(identityToken);
- UA_String_copy(&client->token.policyId, &identityToken->policyId);
- UA_String_copy(&client->username, &identityToken->userName);
- UA_String_copy(&client->password, &identityToken->password);
- request.userIdentityToken.encoding = UA_EXTENSIONOBJECT_DECODED;
- request.userIdentityToken.content.decoded.type = &UA_TYPES[UA_TYPES_USERNAMEIDENTITYTOKEN];
- request.userIdentityToken.content.decoded.data = identityToken;
- }
- UA_ActivateSessionResponse response;
- __UA_Client_Service(client, &request, &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST],
- &response, &UA_TYPES[UA_TYPES_ACTIVATESESSIONRESPONSE]);
- if(response.responseHeader.serviceResult) {
- UA_LOG_ERROR(client->config.logger, UA_LOGCATEGORY_CLIENT,
- "ActivateSession failed with statuscode %i", response.responseHeader.serviceResult);
- }
- UA_ActivateSessionRequest_deleteMembers(&request);
- UA_ActivateSessionResponse_deleteMembers(&response);
- return response.responseHeader.serviceResult; // not deleted
- }
- /**
- * Gets a list of endpoints
- * Memory is allocated for endpointDescription array
- */
- static UA_StatusCode
- GetEndpoints(UA_Client *client, size_t* endpointDescriptionsSize, UA_EndpointDescription** endpointDescriptions) {
- UA_GetEndpointsRequest request;
- UA_GetEndpointsRequest_init(&request);
- request.requestHeader.authenticationToken = client->authenticationToken;
- request.requestHeader.timestamp = UA_DateTime_now();
- request.requestHeader.timeoutHint = 10000;
- request.endpointUrl = client->endpointUrl; // assume the endpointurl outlives the service call
- UA_GetEndpointsResponse response;
- UA_GetEndpointsResponse_init(&response);
- __UA_Client_Service(client, &request, &UA_TYPES[UA_TYPES_GETENDPOINTSREQUEST],
- &response, &UA_TYPES[UA_TYPES_GETENDPOINTSRESPONSE]);
- if(response.responseHeader.serviceResult != UA_STATUSCODE_GOOD) {
- UA_LOG_ERROR(client->config.logger, UA_LOGCATEGORY_CLIENT,
- "GetEndpointRequest failed with statuscode %i", response.responseHeader.serviceResult);
- UA_GetEndpointsResponse_deleteMembers(&response);
- return response.responseHeader.serviceResult;
- }
- *endpointDescriptionsSize = response.endpointsSize;
- *endpointDescriptions = UA_Array_new(response.endpointsSize, &UA_TYPES[UA_TYPES_ENDPOINTDESCRIPTION]);
- for(size_t i=0;i<response.endpointsSize;i++)
- UA_EndpointDescription_copy(&response.endpoints[i], &(*endpointDescriptions)[i]);
- UA_GetEndpointsResponse_deleteMembers(&response);
- return UA_STATUSCODE_GOOD;
- }
- static UA_StatusCode EndpointsHandshake(UA_Client *client) {
- UA_EndpointDescription* endpointArray = NULL;
- size_t endpointArraySize = 0;
- UA_StatusCode retval = GetEndpoints(client, &endpointArraySize, &endpointArray);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- UA_Boolean endpointFound = false;
- UA_Boolean tokenFound = false;
- UA_String securityNone = UA_STRING("http://opcfoundation.org/UA/SecurityPolicy#None");
- UA_String binaryTransport = UA_STRING("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
- //TODO: compare endpoint information with client->endpointUri
- for(size_t i = 0; i < endpointArraySize; i++) {
- UA_EndpointDescription* endpoint = &endpointArray[i];
- /* look out for binary transport endpoints */
- //NODE: Siemens returns empty ProfileUrl, we will accept it as binary
- if(endpoint->transportProfileUri.length!=0 && !UA_String_equal(&endpoint->transportProfileUri, &binaryTransport))
- continue;
- /* look out for an endpoint without security */
- if(!UA_String_equal(&endpoint->securityPolicyUri, &securityNone))
- continue;
- endpointFound = true;
- /* endpoint with no security found */
- /* look for a user token policy with an anonymous token */
- for(size_t j = 0; j < endpoint->userIdentityTokensSize; ++j) {
- UA_UserTokenPolicy* userToken = &endpoint->userIdentityTokens[j];
- //anonymous authentication
- if(client->authenticationMethod == UA_CLIENTAUTHENTICATION_NONE){
- if(userToken->tokenType != UA_USERTOKENTYPE_ANONYMOUS)
- continue;
- }else{
- //username authentication
- if(userToken->tokenType != UA_USERTOKENTYPE_USERNAME)
- continue;
- }
- tokenFound = true;
- UA_UserTokenPolicy_copy(userToken, &client->token);
- break;
- }
- }
- UA_Array_delete(endpointArray, endpointArraySize, &UA_TYPES[UA_TYPES_ENDPOINTDESCRIPTION]);
- if(!endpointFound) {
- UA_LOG_ERROR(client->config.logger, UA_LOGCATEGORY_CLIENT, "No suitable endpoint found");
- return UA_STATUSCODE_BADINTERNALERROR;
- }
- if(!tokenFound) {
- UA_LOG_ERROR(client->config.logger, UA_LOGCATEGORY_CLIENT, "No anonymous token found");
- return UA_STATUSCODE_BADINTERNALERROR;
- }
- return retval;
- }
- static UA_StatusCode SessionHandshake(UA_Client *client) {
- UA_CreateSessionRequest request;
- UA_CreateSessionRequest_init(&request);
- // todo: is this needed for all requests?
- UA_NodeId_copy(&client->authenticationToken, &request.requestHeader.authenticationToken);
- request.requestHeader.timestamp = UA_DateTime_now();
- request.requestHeader.timeoutHint = 10000;
- UA_ByteString_copy(&client->channel.clientNonce, &request.clientNonce);
- request.requestedSessionTimeout = 1200000;
- request.maxResponseMessageSize = UA_INT32_MAX;
- UA_CreateSessionResponse response;
- UA_CreateSessionResponse_init(&response);
- __UA_Client_Service(client, &request, &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST],
- &response, &UA_TYPES[UA_TYPES_CREATESESSIONRESPONSE]);
- UA_NodeId_copy(&response.authenticationToken, &client->authenticationToken);
- UA_CreateSessionRequest_deleteMembers(&request);
- UA_CreateSessionResponse_deleteMembers(&response);
- return response.responseHeader.serviceResult; // not deleted
- }
- static UA_StatusCode CloseSession(UA_Client *client) {
- UA_CloseSessionRequest request;
- UA_CloseSessionRequest_init(&request);
- request.requestHeader.timestamp = UA_DateTime_now();
- request.requestHeader.timeoutHint = 10000;
- request.deleteSubscriptions = true;
- UA_NodeId_copy(&client->authenticationToken, &request.requestHeader.authenticationToken);
- UA_CloseSessionResponse response;
- __UA_Client_Service(client, &request, &UA_TYPES[UA_TYPES_CLOSESESSIONREQUEST],
- &response, &UA_TYPES[UA_TYPES_CLOSESESSIONRESPONSE]);
- UA_CloseSessionRequest_deleteMembers(&request);
- UA_CloseSessionResponse_deleteMembers(&response);
- return response.responseHeader.serviceResult; // not deleted
- }
- static UA_StatusCode CloseSecureChannel(UA_Client *client) {
- UA_SecureChannel *channel = &client->channel;
- UA_CloseSecureChannelRequest request;
- UA_CloseSecureChannelRequest_init(&request);
- request.requestHeader.requestHandle = ++client->requestHandle;
- request.requestHeader.timestamp = UA_DateTime_now();
- request.requestHeader.timeoutHint = 10000;
- request.requestHeader.authenticationToken = client->authenticationToken;
- UA_SecureConversationMessageHeader msgHeader;
- msgHeader.messageHeader.messageTypeAndChunkType = UA_MESSAGETYPE_CLO + UA_CHUNKTYPE_FINAL;
- msgHeader.secureChannelId = client->channel.securityToken.channelId;
- UA_SymmetricAlgorithmSecurityHeader symHeader;
- symHeader.tokenId = channel->securityToken.tokenId;
- UA_SequenceHeader seqHeader;
- seqHeader.sequenceNumber = ++channel->sequenceNumber;
- seqHeader.requestId = ++client->requestId;
- UA_NodeId typeId = UA_NODEID_NUMERIC(0, UA_NS0ID_CLOSESECURECHANNELREQUEST + UA_ENCODINGOFFSET_BINARY);
- UA_ByteString message;
- UA_Connection *c = &client->connection;
- UA_StatusCode retval = c->getSendBuffer(c, c->remoteConf.recvBufferSize, &message);
- if(retval != UA_STATUSCODE_GOOD)
- return retval;
- size_t offset = 12;
- retval |= UA_SymmetricAlgorithmSecurityHeader_encodeBinary(&symHeader, &message, &offset);
- retval |= UA_SequenceHeader_encodeBinary(&seqHeader, &message, &offset);
- retval |= UA_NodeId_encodeBinary(&typeId, &message, &offset);
- retval |= UA_encodeBinary(&request, &UA_TYPES[UA_TYPES_CLOSESECURECHANNELREQUEST], NULL,
- NULL, &message, &offset);
- msgHeader.messageHeader.messageSize = (UA_UInt32)offset;
- offset = 0;
- retval |= UA_SecureConversationMessageHeader_encodeBinary(&msgHeader, &message, &offset);
- if(retval == UA_STATUSCODE_GOOD) {
- message.length = msgHeader.messageHeader.messageSize;
- retval = client->connection.send(&client->connection, &message);
- } else {
- client->connection.releaseSendBuffer(&client->connection, &message);
- }
- client->connection.close(&client->connection);
- return retval;
- }
- UA_StatusCode
- UA_Client_getEndpoints(UA_Client *client, const char *serverUrl,
- size_t* endpointDescriptionsSize,
- UA_EndpointDescription** endpointDescriptions) {
- if(client->state == UA_CLIENTSTATE_CONNECTED)
- return UA_STATUSCODE_GOOD;
- if(client->state == UA_CLIENTSTATE_ERRORED)
- UA_Client_reset(client);
- UA_StatusCode retval = UA_STATUSCODE_GOOD;
- client->connection = client->config.connectionFunc(UA_ConnectionConfig_standard, serverUrl,
- client->config.logger);
- if(client->connection.state != UA_CONNECTION_OPENING) {
- retval = UA_STATUSCODE_BADCONNECTIONCLOSED;
- goto cleanup;
- }
- client->endpointUrl = UA_STRING_ALLOC(serverUrl);
- if(!client->endpointUrl.data) {
- retval = UA_STATUSCODE_BADOUTOFMEMORY;
- goto cleanup;
- }
- client->connection.localConf = client->config.localConnectionConfig;
- retval = HelAckHandshake(client);
- if(retval == UA_STATUSCODE_GOOD)
- retval = SecureChannelHandshake(client, false);
- if(retval == UA_STATUSCODE_GOOD)
- retval = GetEndpoints(client, endpointDescriptionsSize, endpointDescriptions);
- /* always cleanup */
- cleanup:
- UA_Client_disconnect(client);
- UA_Client_reset(client);
- return retval;
- }
- UA_StatusCode
- UA_Client_connect_username(UA_Client *client, const char *endpointUrl,
- const char *username, const char *password){
- client->authenticationMethod=UA_CLIENTAUTHENTICATION_USERNAME;
- client->username = UA_STRING_ALLOC(username);
- client->password = UA_STRING_ALLOC(password);
- return UA_Client_connect(client, endpointUrl);
- }
- UA_StatusCode
- UA_Client_connect(UA_Client *client, const char *endpointUrl) {
- if(client->state == UA_CLIENTSTATE_CONNECTED)
- return UA_STATUSCODE_GOOD;
- if(client->state == UA_CLIENTSTATE_ERRORED) {
- UA_Client_reset(client);
- }
- UA_StatusCode retval = UA_STATUSCODE_GOOD;
- client->connection = client->config.connectionFunc(UA_ConnectionConfig_standard, endpointUrl, client->config.logger);
- if(client->connection.state != UA_CONNECTION_OPENING) {
- retval = UA_STATUSCODE_BADCONNECTIONCLOSED;
- goto cleanup;
- }
- client->endpointUrl = UA_STRING_ALLOC(endpointUrl);
- if(!client->endpointUrl.data) {
- retval = UA_STATUSCODE_BADOUTOFMEMORY;
- goto cleanup;
- }
- client->connection.localConf = client->config.localConnectionConfig;
- retval = HelAckHandshake(client);
- if(retval == UA_STATUSCODE_GOOD)
- retval = SecureChannelHandshake(client, false);
- if(retval == UA_STATUSCODE_GOOD)
- retval = EndpointsHandshake(client);
- if(retval == UA_STATUSCODE_GOOD)
- retval = SessionHandshake(client);
- if(retval == UA_STATUSCODE_GOOD)
- retval = ActivateSession(client);
- if(retval == UA_STATUSCODE_GOOD) {
- client->connection.state = UA_CONNECTION_ESTABLISHED;
- client->state = UA_CLIENTSTATE_CONNECTED;
- } else {
- goto cleanup;
- }
- return retval;
- cleanup:
- UA_Client_reset(client);
- return retval;
- }
- UA_StatusCode UA_Client_disconnect(UA_Client *client) {
- if(client->state != UA_CLIENTSTATE_CONNECTED)
- return UA_STATUSCODE_BADNOTCONNECTED;
- UA_StatusCode retval = UA_STATUSCODE_GOOD;
- /* Is a session established? */
- if(client->channel.connection->state == UA_CONNECTION_ESTABLISHED &&
- !UA_NodeId_equal(&client->authenticationToken, &UA_NODEID_NULL))
- retval = CloseSession(client);
- /* Is a secure channel established? */
- if(client->channel.connection->state == UA_CONNECTION_ESTABLISHED)
- retval |= CloseSecureChannel(client);
- return retval;
- }
- UA_StatusCode UA_Client_manuallyRenewSecureChannel(UA_Client *client) {
- UA_StatusCode retval = SecureChannelHandshake(client, true);
- if(retval == UA_STATUSCODE_GOOD)
- client->state = UA_CLIENTSTATE_CONNECTED;
- return retval;
- }
- /****************/
- /* Raw Services */
- /****************/
- void __UA_Client_Service(UA_Client *client, const void *r, const UA_DataType *requestType,
- void *response, const UA_DataType *responseType) {
- /* Requests always begin witih a RequestHeader, therefore we can cast. */
- UA_RequestHeader *request = (void*)(uintptr_t)r;
- UA_StatusCode retval = UA_STATUSCODE_GOOD;
- UA_init(response, responseType);
- UA_ResponseHeader *respHeader = (UA_ResponseHeader*)response;
- /* make sure we have a valid session */
- retval = UA_Client_manuallyRenewSecureChannel(client);
- if(retval != UA_STATUSCODE_GOOD) {
- respHeader->serviceResult = retval;
- client->state = UA_CLIENTSTATE_ERRORED;
- return;
- }
- /* handling request parameters */
- UA_NodeId_copy(&client->authenticationToken, &request->authenticationToken);
- request->timestamp = UA_DateTime_now();
- request->requestHandle = ++client->requestHandle;
- /* Send the request */
- UA_UInt32 requestId = ++client->requestId;
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Sending a request of type %i", requestType->typeId.identifier.numeric);
- retval = UA_SecureChannel_sendBinaryMessage(&client->channel, requestId, request, requestType);
- if(retval != UA_STATUSCODE_GOOD) {
- if(retval == UA_STATUSCODE_BADENCODINGLIMITSEXCEEDED)
- respHeader->serviceResult = UA_STATUSCODE_BADREQUESTTOOLARGE;
- else
- respHeader->serviceResult = retval;
- client->state = UA_CLIENTSTATE_ERRORED;
- return;
- }
- /* Retrieve the response */
- // Todo: push this into the generic securechannel implementation for client and server
- UA_ByteString reply;
- UA_ByteString_init(&reply);
- UA_Boolean realloced = false;
- do {
- retval = client->connection.recv(&client->connection, &reply, client->config.timeout);
- retval |= UA_Connection_completeMessages(&client->connection, &reply, &realloced);
- if(retval != UA_STATUSCODE_GOOD) {
- respHeader->serviceResult = retval;
- client->state = UA_CLIENTSTATE_ERRORED;
- return;
- }
- } while(!reply.data);
- size_t offset = 0;
- UA_SecureConversationMessageHeader msgHeader;
- retval |= UA_SecureConversationMessageHeader_decodeBinary(&reply, &offset, &msgHeader);
- UA_SymmetricAlgorithmSecurityHeader symHeader;
- retval |= UA_SymmetricAlgorithmSecurityHeader_decodeBinary(&reply, &offset, &symHeader);
- UA_SequenceHeader seqHeader;
- retval |= UA_SequenceHeader_decodeBinary(&reply, &offset, &seqHeader);
- UA_NodeId responseId;
- retval |= UA_NodeId_decodeBinary(&reply, &offset, &responseId);
- UA_NodeId expectedNodeId = UA_NODEID_NUMERIC(0, responseType->typeId.identifier.numeric +
- UA_ENCODINGOFFSET_BINARY);
- if(retval != UA_STATUSCODE_GOOD)
- goto finish;
- /* Todo: we need to demux responses since a publish responses may come at any time */
- if(!UA_NodeId_equal(&responseId, &expectedNodeId) || seqHeader.requestId != requestId) {
- if(responseId.identifier.numeric != UA_NS0ID_SERVICEFAULT + UA_ENCODINGOFFSET_BINARY) {
- UA_LOG_ERROR(client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Reply answers the wrong request. Expected ns=%i,i=%i. But retrieved ns=%i,i=%i",
- expectedNodeId.namespaceIndex, expectedNodeId.identifier.numeric,
- responseId.namespaceIndex, responseId.identifier.numeric);
- respHeader->serviceResult = UA_STATUSCODE_BADINTERNALERROR;
- } else
- retval = UA_decodeBinary(&reply, &offset, respHeader, &UA_TYPES[UA_TYPES_SERVICEFAULT]);
- goto finish;
- }
-
- retval = UA_decodeBinary(&reply, &offset, response, responseType);
- if(retval == UA_STATUSCODE_BADENCODINGLIMITSEXCEEDED)
- retval = UA_STATUSCODE_BADRESPONSETOOLARGE;
- finish:
- UA_SymmetricAlgorithmSecurityHeader_deleteMembers(&symHeader);
- if(!realloced)
- client->connection.releaseRecvBuffer(&client->connection, &reply);
- else
- UA_ByteString_deleteMembers(&reply);
- if(retval != UA_STATUSCODE_GOOD){
- UA_LOG_INFO(client->config.logger, UA_LOGCATEGORY_CLIENT, "Error receiving the response");
- client->state = UA_CLIENTSTATE_FAULTED;
- respHeader->serviceResult = retval;
- } else {
- client->state = UA_CLIENTSTATE_CONNECTED;
- }
- UA_LOG_DEBUG(client->config.logger, UA_LOGCATEGORY_CLIENT,
- "Received a response of type %i", responseId.identifier.numeric);
- }
|