Coverage Report

Created: 2026-05-16 06:54

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/open62541_15/plugins/ua_config_default.c
Line
Count
Source
1
/* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
2
 * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
3
 *
4
 *    Copyright 2017 (c) Fraunhofer IOSB (Author: Julius Pfrommer)
5
 *    Copyright 2017 (c) Julian Grothoff
6
 *    Copyright 2017-2018 (c) Mark Giraud, Fraunhofer IOSB
7
 *    Copyright 2017 (c) Stefan Profanter, fortiss GmbH
8
 *    Copyright 2017 (c) Thomas Stalder, Blue Time Concept SA
9
 *    Copyright 2018 (c) Daniel Feist, Precitec GmbH & Co. KG
10
 *    Copyright 2018 (c) Fabian Arndt, Root-Core
11
 *    Copyright 2019 (c) Kalycito Infotech Private Limited
12
 *    Copyright 2017-2020 (c) HMS Industrial Networks AB (Author: Jonas Green)
13
 *    Copyright 2020 (c) Wind River Systems, Inc.
14
 *    Copyright 2024 (c) Siemens AG (Authors: Tin Raic, Thomas Zeschg)
15
 *    Copyright 2026 (c) o6 Automation GmbH (Author: Andreas Ebner)
16
 */
17
18
#include <open62541/plugin/accesscontrol_default.h>
19
#include <open62541/plugin/nodestore_default.h>
20
#include <open62541/plugin/log_stdout.h>
21
#include <open62541/plugin/certificategroup_default.h>
22
#include <open62541/plugin/securitypolicy_default.h>
23
#include <open62541/server_config_default.h>
24
#if defined(UA_ENABLE_DISCOVERY) || defined(UA_ENABLE_AMALGAMATION)
25
#include <open62541/client.h>
26
#include <open62541/client_config_default.h>
27
#endif
28
29
#include "../deps/mp_printf.h"
30
31
#if defined(UA_ENABLE_ENCRYPTION_MBEDTLS)
32
#include <mbedtls/version.h>
33
#endif
34
35
#include <stdio.h>
36
#ifdef UA_ARCHITECTURE_WIN32
37
# include <winsock2.h>
38
#else
39
# include <unistd.h>
40
#endif
41
42
/* Struct initialization works across ANSI C/C99/C++ if it is done when the
43
 * variable is first declared. Assigning values to existing structs is
44
 * heterogeneous across the three. */
45
static UA_INLINE UA_UInt32Range
46
24.0k
UA_UINT32RANGE(UA_UInt32 min, UA_UInt32 max) {
47
24.0k
    UA_UInt32Range range = {min, max};
48
24.0k
    return range;
49
24.0k
}
50
51
static UA_INLINE UA_DurationRange
52
16.0k
UA_DURATIONRANGE(UA_Duration min, UA_Duration max) {
53
16.0k
    UA_DurationRange range = {min, max};
54
16.0k
    return range;
55
16.0k
}
56
57
/* Request the private key password from stdin if no callback is defined */
58
#ifdef UA_ENABLE_ENCRYPTION
59
static UA_StatusCode
60
0
readPrivateKeyPassword(UA_ByteString *password) {
61
    /* Read from stdin */
62
0
    char buf[256];
63
0
    fputs("Private key requires a password. Enter and press return: ", stdout);
64
0
    char *s = fgets(buf, 256, stdin);
65
0
    if(!s)
66
0
        return UA_STATUSCODE_BADINTERNALERROR;
67
68
    /* Get rid of any trailing \n */
69
0
    size_t len = strlen(buf);
70
0
    if(len == 0)
71
0
        return UA_STATUSCODE_BADINTERNALERROR;
72
0
    if(buf[len-1] == '\n')
73
0
        buf[len-1] = 0;
74
75
0
    *password = UA_BYTESTRING_ALLOC(buf);
76
0
    return UA_STATUSCODE_GOOD;
77
0
}
78
#endif
79
80
UA_Server *
81
0
UA_Server_new(void) {
82
0
    UA_ServerConfig config;
83
0
    memset(&config, 0, sizeof(UA_ServerConfig));
84
0
    UA_StatusCode res = UA_ServerConfig_setDefault(&config);
85
0
    if(res != UA_STATUSCODE_GOOD)
86
0
        return NULL;
87
0
    return UA_Server_newWithConfig(&config);
88
0
}
89
90
#if defined(UA_ARCHITECTURE_POSIX) || defined(UA_ARCHITECTURE_WIN32) || defined(UA_ARCHITECTURE_ZEPHYR)
91
/* Required for the definition of SIGINT */
92
#include <signal.h>
93
94
struct InterruptContext {
95
    UA_Server *server;
96
    UA_Boolean running;
97
};
98
99
static void
100
0
shutdownServer(UA_Server *server, void *context) {
101
0
    struct InterruptContext *ic = (struct InterruptContext*)context;
102
0
    UA_ServerConfig *config = UA_Server_getConfig(ic->server);
103
0
    UA_LOG_INFO(config->logging, UA_LOGCATEGORY_APPLICATION,
104
0
                "Stopping the server");
105
0
    ic->running = false;
106
0
}
107
108
static void
109
interruptServer(UA_InterruptManager *im, uintptr_t interruptHandle,
110
0
                void *context, const UA_KeyValueMap *parameters) {
111
0
    struct InterruptContext *ic = (struct InterruptContext*)context;
112
0
    UA_ServerConfig *config = UA_Server_getConfig(ic->server);
113
114
0
    if(config->shutdownDelay <= 0.0) {
115
0
        UA_LOG_INFO(config->logging, UA_LOGCATEGORY_APPLICATION,
116
0
                    "Received SIGINT interrupt. Stopping the server.");
117
0
        ic->running = false;
118
0
        return;
119
0
    }
120
121
0
    UA_LOG_INFO(config->logging, UA_LOGCATEGORY_APPLICATION,
122
0
                "Received SIGINT interrupt. Stopping the server in %.2fs.",
123
0
                config->shutdownDelay / 1000.0);
124
125
0
    UA_UInt32 secondsTillShutdown = (UA_UInt32)(config->shutdownDelay / 1000.0);
126
0
    UA_Variant val;
127
0
    UA_Variant_setScalar(&val, &secondsTillShutdown, &UA_TYPES[UA_TYPES_UINT32]);
128
0
    UA_Server_writeValue(ic->server, UA_NS0ID(SERVER_SERVERSTATUS_SECONDSTILLSHUTDOWN), val);
129
0
    UA_Server_addTimedCallback(ic->server, shutdownServer, ic, UA_DateTime_nowMonotonic() +
130
0
                               (UA_DateTime)(config->shutdownDelay * UA_DATETIME_MSEC), NULL);
131
132
    /* Notify the application that the server is stopping */
133
0
    if(config->notifyLifecycleState)
134
0
        config->notifyLifecycleState(ic->server, UA_LIFECYCLESTATE_STOPPING);
135
0
}
136
137
UA_StatusCode
138
0
UA_Server_runUntilInterrupt(UA_Server *server) {
139
0
    if(!server)
140
0
        return UA_STATUSCODE_BADINTERNALERROR;
141
0
    UA_ServerConfig *config = UA_Server_getConfig(server);
142
0
    UA_EventLoop *el = config->eventLoop;
143
0
    if(!el)
144
0
        return UA_STATUSCODE_BADINTERNALERROR;
145
146
    /* Get the interrupt manager */
147
0
    UA_EventSource *es = el->eventSources;
148
0
    while(es) {
149
0
        if(es->eventSourceType == UA_EVENTSOURCETYPE_INTERRUPTMANAGER)
150
0
            break;
151
0
        es = es->next;
152
0
    }
153
0
    if(!es) {
154
0
        UA_LOG_ERROR(config->logging, UA_LOGCATEGORY_APPLICATION,
155
0
                       "No Interrupt EventSource configured");
156
0
        return UA_STATUSCODE_BADINTERNALERROR;
157
0
    }
158
0
    UA_InterruptManager *im = (UA_InterruptManager*)es;
159
160
    /* Register the interrupt */
161
0
    struct InterruptContext ic;
162
0
    ic.server = server;
163
0
    ic.running = true;
164
0
    UA_StatusCode retval =
165
0
        im->registerInterrupt(im, SIGINT, &UA_KEYVALUEMAP_NULL,
166
0
                              interruptServer, &ic);
167
0
    if(retval != UA_STATUSCODE_GOOD) {
168
0
        UA_LOG_ERROR(config->logging, UA_LOGCATEGORY_APPLICATION,
169
0
                     "Could not register the interrupt with status code %s",
170
0
                     UA_StatusCode_name(retval));
171
0
        return retval;
172
0
    }
173
174
    /* Run the server */
175
0
    retval = UA_Server_run_startup(server);
176
0
    if(retval != UA_STATUSCODE_GOOD)
177
0
        goto deregister_interrupt;
178
0
    while(ic.running) {
179
0
        UA_Server_run_iterate(server, true);
180
0
    }
181
182
    /* Shut down the server */
183
0
    retval = UA_Server_run_shutdown(server);
184
185
    /* Deregister the interrupt */
186
0
 deregister_interrupt:
187
0
    im->deregisterInterrupt(im, SIGINT);
188
0
    return retval;
189
0
}
190
191
#endif /* defined(UA_ARCHITECTURE_POSIX) || defined(UA_ARCHITECTURE_WIN32) */
192
193
/*******************************/
194
/* Default Connection Settings */
195
/*******************************/
196
197
const UA_ConnectionConfig UA_ConnectionConfig_default = {
198
    0,       /* .protocolVersion */
199
    1 << 16, /* .sendBufferSize, 64k per chunk */
200
    1 << 16, /* .recvBufferSize, 64k per chunk */
201
    1 << 29, /* .localMaxMessageSize, 512 MB */
202
    1 << 29, /* .remoteMaxMessageSize, 512 MB */
203
    1 << 14, /* .localMaxChunkCount, 16k */
204
    1 << 14  /* .remoteMaxChunkCount, 16k */
205
};
206
207
/***************************/
208
/* Default Server Settings */
209
/***************************/
210
211
#define MANUFACTURER_NAME "open62541"
212
#define PRODUCT_NAME "open62541 OPC UA Server"
213
#define PRODUCT_URI "http://open62541.org"
214
8.00k
#define APPLICATION_NAME "open62541-based OPC UA Application"
215
#define APPLICATION_URI "urn:open62541.unconfigured.application"
216
217
/* Upper bound */
218
#define SECURITY_POLICY_SIZE 12
219
220
#define STRINGIFY(arg) #arg
221
#define VERSION(MAJOR, MINOR, PATCH, LABEL) \
222
    STRINGIFY(MAJOR) "." STRINGIFY(MINOR) "." STRINGIFY(PATCH) LABEL
223
224
static UA_StatusCode
225
addEndpoint(UA_ServerConfig *conf,
226
            const UA_SecurityPolicy *securityPolicy,
227
8.00k
            UA_MessageSecurityMode securityMode) {
228
    /* Test if the endpoint already exists */
229
8.00k
    for(size_t i = 0; i < conf->endpointsSize; i++) {
230
0
        UA_EndpointDescription *ep = &conf->endpoints[i];
231
0
        if(!UA_String_equal(&securityPolicy->policyUri, &ep->securityPolicyUri))
232
0
            continue;
233
0
        if(ep->securityMode != securityMode)
234
0
            continue;
235
0
        return UA_STATUSCODE_GOOD;
236
0
    }
237
238
    /* Reallocate the array size */
239
8.00k
    UA_EndpointDescription *tmp = (UA_EndpointDescription *)
240
8.00k
        UA_realloc(conf->endpoints,
241
8.00k
                   sizeof(UA_EndpointDescription) * (1 + conf->endpointsSize));
242
8.00k
    if(!tmp)
243
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
244
8.00k
    conf->endpoints = tmp;
245
246
    /* The following fields are overwritten internally with up-to-date
247
     * information from the server config:
248
     *
249
     * UserTokenPolicies
250
     * ApplicationDescription (server)
251
     * ServerCertificate
252
     * EndpointURL */
253
8.00k
    UA_EndpointDescription *endpoint = &conf->endpoints[conf->endpointsSize];
254
8.00k
    UA_EndpointDescription_init(endpoint);
255
8.00k
    endpoint->transportProfileUri =
256
8.00k
        UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
257
8.00k
    endpoint->securityMode = securityMode;
258
8.00k
    endpoint->securityLevel = securityPolicy->securityLevel;
259
260
8.00k
    UA_StatusCode retval = UA_String_copy(&securityPolicy->policyUri,
261
8.00k
                                          &endpoint->securityPolicyUri);
262
263
8.00k
    if(retval == UA_STATUSCODE_GOOD) {
264
8.00k
        conf->endpointsSize++;
265
8.00k
    } else {
266
0
        UA_EndpointDescription_clear(endpoint);
267
0
        if(conf->endpointsSize == 0) {
268
0
            UA_free(conf->endpoints);
269
0
            conf->endpoints = NULL;
270
0
        }
271
0
    }
272
273
8.00k
    return retval;
274
8.00k
}
275
276
static UA_StatusCode
277
8.00k
setDefaultConfig(UA_ServerConfig *conf, UA_UInt16 portNumber) {
278
8.00k
    if(!conf)
279
0
        return UA_STATUSCODE_BADINVALIDARGUMENT;
280
281
    /* NodeStore */
282
8.00k
    if(!conf->nodestore)
283
8.00k
        conf->nodestore = UA_Nodestore_ZipTree();
284
285
    /* Logging */
286
8.00k
    if(conf->logging == NULL)
287
8.00k
        conf->logging = UA_Log_Stdout_new(UA_LOGLEVEL_INFO);
288
289
    /* EventLoop */
290
8.00k
    if(conf->eventLoop == NULL) {
291
#if defined(UA_ARCHITECTURE_ZEPHYR)
292
        conf->eventLoop = UA_EventLoop_new_Zephyr(conf->logging);
293
#elif defined(UA_ARCHITECTURE_LWIP)
294
        conf->eventLoop = UA_EventLoop_new_LWIP(conf->logging, NULL);
295
#else
296
8.00k
        conf->eventLoop = UA_EventLoop_new_POSIX(conf->logging);
297
8.00k
#endif
298
8.00k
        if(conf->eventLoop == NULL)
299
0
            return UA_STATUSCODE_BADOUTOFMEMORY;
300
301
8.00k
        conf->externalEventLoop = false;
302
303
        /* Add the TCP connection manager */
304
#if defined(UA_ARCHITECTURE_ZEPHYR)
305
        UA_ConnectionManager *tcpCM =
306
            UA_ConnectionManager_new_Zephyr_TCP(UA_STRING("tcp connection manager"));
307
#elif defined(UA_ARCHITECTURE_LWIP)
308
        UA_ConnectionManager *tcpCM =
309
            UA_ConnectionManager_new_LWIP_TCP(UA_STRING("tcp connection manager"));
310
#else
311
8.00k
        UA_ConnectionManager *tcpCM =
312
8.00k
            UA_ConnectionManager_new_POSIX_TCP(UA_STRING("tcp connection manager"));
313
8.00k
#endif
314
8.00k
        if(tcpCM)
315
8.00k
            conf->eventLoop->registerEventSource(conf->eventLoop, (UA_EventSource *)tcpCM);
316
317
        /* Add the UDP connection manager */
318
#if defined(UA_ARCHITECTURE_LWIP)
319
        UA_ConnectionManager *udpCM =
320
            UA_ConnectionManager_new_LWIP_UDP(UA_STRING("udp connection manager"));
321
        if(udpCM)
322
            conf->eventLoop->registerEventSource(conf->eventLoop, (UA_EventSource *)udpCM);
323
#elif !defined(UA_ARCHITECTURE_ZEPHYR)
324
        UA_ConnectionManager *udpCM =
325
8.00k
            UA_ConnectionManager_new_POSIX_UDP(UA_STRING("udp connection manager"));
326
8.00k
        if(udpCM)
327
8.00k
            conf->eventLoop->registerEventSource(conf->eventLoop, (UA_EventSource *)udpCM);
328
8.00k
#endif
329
330
        /* Add the Ethernet connection manager */
331
8.00k
#if !defined(UA_ARCHITECTURE_ZEPHYR) && !defined(UA_ARCHITECTURE_LWIP) && defined(UA_ARCHITECTURE_POSIX) && (defined(__linux__))
332
8.00k
        UA_ConnectionManager *ethCM =
333
8.00k
            UA_ConnectionManager_new_POSIX_Ethernet(UA_STRING("eth connection manager"));
334
8.00k
        if(ethCM)
335
8.00k
            conf->eventLoop->registerEventSource(conf->eventLoop, (UA_EventSource *)ethCM);
336
8.00k
#endif
337
338
8.00k
#if !defined(UA_ARCHITECTURE_ZEPHYR) && !defined(UA_ARCHITECTURE_LWIP)
339
        /* Add the interrupt manager */
340
8.00k
        UA_InterruptManager *im = UA_InterruptManager_new_POSIX(UA_STRING("interrupt manager"));
341
8.00k
        if(im) {
342
8.00k
            conf->eventLoop->registerEventSource(conf->eventLoop, &im->eventSource);
343
8.00k
        } else {
344
0
            UA_LOG_ERROR(conf->logging, UA_LOGCATEGORY_APPLICATION,
345
0
                         "Cannot create the Interrupt Manager (only relevant if used)");
346
0
        }
347
8.00k
#endif
348
#ifdef UA_ENABLE_MQTT
349
        /* Add the MQTT connection manager */
350
        UA_ConnectionManager *mqttCM =
351
            UA_ConnectionManager_new_MQTT(UA_STRING("mqtt connection manager"));
352
        if(mqttCM)
353
            conf->eventLoop->registerEventSource(conf->eventLoop, (UA_EventSource *)mqttCM);
354
#endif
355
8.00k
    }
356
8.00k
    if(conf->eventLoop != NULL) {
357
8.00k
        if(conf->eventLoop->state != UA_EVENTLOOPSTATE_STARTED) {
358
8.00k
            UA_StatusCode statusCode = conf->eventLoop->start(conf->eventLoop);
359
8.00k
            if(statusCode != UA_STATUSCODE_GOOD) {
360
0
                return statusCode;
361
0
            }
362
8.00k
        }
363
8.00k
    }
364
365
    /* If a second server is started later it can "steal" the port.
366
     * Having port reuse enabled is important for development.
367
     * Otherwise a long TCP TIME_WAIT is required before the port can be used again. */
368
8.00k
    conf->tcpReuseAddr = true;
369
370
    /* --> Start setting the default static config <-- */
371
372
8.00k
    conf->shutdownDelay = 0.0;
373
374
    /* Server Description */
375
8.00k
    UA_BuildInfo_clear(&conf->buildInfo);
376
8.00k
    conf->buildInfo.productUri = UA_STRING_ALLOC(PRODUCT_URI);
377
8.00k
    conf->buildInfo.manufacturerName = UA_STRING_ALLOC(MANUFACTURER_NAME);
378
8.00k
    conf->buildInfo.productName = UA_STRING_ALLOC(PRODUCT_NAME);
379
8.00k
    conf->buildInfo.softwareVersion =
380
8.00k
        UA_STRING_ALLOC(VERSION(UA_OPEN62541_VER_MAJOR, UA_OPEN62541_VER_MINOR,
381
8.00k
                                UA_OPEN62541_VER_PATCH, UA_OPEN62541_VER_LABEL));
382
8.00k
    conf->buildInfo.buildNumber = UA_STRING_ALLOC(__DATE__ " " __TIME__);
383
8.00k
    conf->buildInfo.buildDate = UA_DateTime_now();
384
385
8.00k
    UA_ApplicationDescription_clear(&conf->applicationDescription);
386
8.00k
    conf->applicationDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI);
387
8.00k
    conf->applicationDescription.productUri = UA_STRING_ALLOC(PRODUCT_URI);
388
8.00k
    conf->applicationDescription.applicationName =
389
8.00k
        UA_LOCALIZEDTEXT_ALLOC("en", APPLICATION_NAME);
390
8.00k
    conf->applicationDescription.applicationType = UA_APPLICATIONTYPE_SERVER;
391
    /* conf->applicationDescription.gatewayServerUri = UA_STRING_NULL; */
392
    /* conf->applicationDescription.discoveryProfileUri = UA_STRING_NULL; */
393
    /* conf->applicationDescription.discoveryUrlsSize = 0; */
394
    /* conf->applicationDescription.discoveryUrls = NULL; */
395
396
8.00k
#ifdef UA_ENABLE_DISCOVERY_MULTICAST
397
8.00k
    UA_MdnsDiscoveryConfiguration_clear(&conf->mdnsConfig);
398
8.00k
# ifdef UA_ENABLE_DISCOVERY_MULTICAST_MDNSD
399
8.00k
    conf->mdnsInterfaceIP = UA_STRING_NULL;
400
#  if !defined(UA_HAS_GETIFADDR)
401
    conf->mdnsIpAddressList = NULL;
402
    conf->mdnsIpAddressListSize = 0;
403
#  endif
404
8.00k
# endif
405
8.00k
#endif
406
407
    /* Custom DataTypes */
408
    /* conf->customDataTypesSize = 0; */
409
    /* conf->customDataTypes = NULL; */
410
411
    /* Networking */
412
    /* Set up the local ServerUrls. They are used during startup to initialize
413
     * the server sockets. */
414
8.00k
    UA_String serverUrls[1];
415
8.00k
    size_t serverUrlsSize = 0;
416
8.00k
    char serverUrlBuffer[1][512];
417
418
8.00k
    if(portNumber == 0) {
419
0
        UA_LOG_WARNING(conf->logging, UA_LOGCATEGORY_APPLICATION,
420
0
                       "Dynamic port assignment will be used.");
421
0
    }
422
423
8.00k
    if(conf->serverUrlsSize > 0) {
424
0
        UA_LOG_WARNING(conf->logging, UA_LOGCATEGORY_APPLICATION,
425
0
                       "ServerUrls already set. Overriding.");
426
0
        UA_Array_delete(conf->serverUrls, conf->serverUrlsSize,
427
0
                        &UA_TYPES[UA_TYPES_STRING]);
428
0
        conf->serverUrls = NULL;
429
0
        conf->serverUrlsSize = 0;
430
0
    }
431
432
    /* Listen on all interfaces (also external). This must be the first
433
     * entry if this is desired. Otherwise some interfaces may be blocked
434
     * (already in use) with a hostname that is only locally reachable.*/
435
8.00k
    mp_snprintf(serverUrlBuffer[0], sizeof(serverUrlBuffer[0]),
436
8.00k
                "opc.tcp://:%u", portNumber);
437
8.00k
    serverUrls[serverUrlsSize] = UA_STRING(serverUrlBuffer[0]);
438
8.00k
    serverUrlsSize++;
439
440
    /* Add to the config */
441
8.00k
    UA_StatusCode retval =
442
8.00k
        UA_Array_copy(serverUrls, serverUrlsSize,
443
8.00k
                      (void**)&conf->serverUrls, &UA_TYPES[UA_TYPES_STRING]);
444
8.00k
    if(retval != UA_STATUSCODE_GOOD)
445
0
        return retval;
446
8.00k
    conf->serverUrlsSize = serverUrlsSize;
447
448
    /* Endpoints */
449
    /* conf->endpoints = {0, NULL}; */
450
451
    /* Set Logger for Certificate Verification */
452
8.00k
    if(!conf->secureChannelPKI.logging)
453
8.00k
        conf->secureChannelPKI.logging = conf->logging;
454
8.00k
    if(!conf->sessionPKI.logging)
455
8.00k
        conf->sessionPKI.logging = conf->logging;
456
457
8.00k
#ifdef UA_ENABLE_ENCRYPTION
458
    /* Limits for TrustList */
459
8.00k
    conf->maxTrustListSize = 0;
460
8.00k
    conf->maxRejectedListSize = 0;
461
8.00k
#endif
462
463
    /* Certificate Verification that accepts every certificate. Can be
464
     * overwritten when the policy is specialized. */
465
8.00k
    UA_CertificateGroup_AcceptAll(&conf->secureChannelPKI);
466
8.00k
    UA_CertificateGroup_AcceptAll(&conf->sessionPKI);
467
468
    /* * Global Node Lifecycle * */
469
    /* conf->nodeLifecycle.constructor = NULL; */
470
    /* conf->nodeLifecycle.destructor = NULL; */
471
    /* conf->nodeLifecycle.createOptionalChild = NULL; */
472
    /* conf->nodeLifecycle.generateChildNodeId = NULL; */
473
8.00k
    conf->modellingRulesOnInstances = true;
474
475
    /* Limits for SecureChannels */
476
8.00k
    conf->maxSecureChannels = 100;
477
8.00k
    conf->maxSecurityTokenLifetime = 10 * 60 * 1000; /* 10 minutes */
478
479
    /* Limits for Sessions */
480
8.00k
    conf->maxSessions = 100;
481
8.00k
    conf->maxSessionTimeout = 60.0 * 60.0 * 1000.0; /* 1h */
482
483
8.00k
#ifdef UA_ENABLE_SUBSCRIPTIONS
484
    /* Limits for Subscriptions */
485
8.00k
    conf->publishingIntervalLimits = UA_DURATIONRANGE(100.0, 3600.0 * 1000.0);
486
8.00k
    conf->lifeTimeCountLimits = UA_UINT32RANGE(3, 15000);
487
8.00k
    conf->keepAliveCountLimits = UA_UINT32RANGE(1, 100);
488
8.00k
    conf->maxNotificationsPerPublish = 1000;
489
8.00k
    conf->enableRetransmissionQueue = true;
490
8.00k
    conf->maxRetransmissionQueueSize = 0; /* unlimited */
491
8.00k
# ifdef UA_ENABLE_SUBSCRIPTIONS_EVENTS
492
8.00k
    conf->maxEventsPerNode = 0; /* unlimited */
493
8.00k
# endif
494
495
    /* Limits for MonitoredItems */
496
8.00k
    conf->samplingIntervalLimits = UA_DURATIONRANGE(50.0, 24.0 * 3600.0 * 1000.0);
497
8.00k
    conf->queueSizeLimits = UA_UINT32RANGE(1, 100);
498
8.00k
#endif
499
500
8.00k
#ifdef UA_ENABLE_DISCOVERY
501
8.00k
    conf->discoveryCleanupTimeout = 60 * 60;
502
8.00k
#endif
503
504
8.00k
#ifdef UA_ENABLE_HISTORIZING
505
    /* conf->accessHistoryDataCapability = false; */
506
    /* conf->maxReturnDataValues = 0; */
507
508
    /* conf->accessHistoryEventsCapability = false; */
509
    /* conf->maxReturnEventValues = 0; */
510
511
    /* conf->insertDataCapability = false; */
512
    /* conf->insertEventCapability = false; */
513
    /* conf->insertAnnotationsCapability = false; */
514
515
    /* conf->replaceDataCapability = false; */
516
    /* conf->replaceEventCapability = false; */
517
518
    /* conf->updateDataCapability = false; */
519
    /* conf->updateEventCapability = false; */
520
521
    /* conf->deleteRawCapability = false; */
522
    /* conf->deleteEventCapability = false; */
523
    /* conf->deleteAtTimeDataCapability = false; */
524
8.00k
#endif
525
526
8.00k
#if UA_MULTITHREADING >= 100
527
8.00k
    conf->maxAsyncOperationQueueSize = 0;
528
8.00k
    conf->asyncOperationTimeout = 120000; /* Async Operation Timeout in ms (2 minutes) */
529
8.00k
#endif
530
531
8.00k
#ifdef UA_ENABLE_PUBSUB
532
8.00k
    conf->pubsubEnabled = true;
533
8.00k
    conf->pubSubConfig.enableDeltaFrames = true;
534
8.00k
#ifdef UA_ENABLE_PUBSUB_INFORMATIONMODEL
535
8.00k
    conf->pubSubConfig.enableInformationModelMethods = true;
536
8.00k
#endif
537
8.00k
#endif
538
539
    /* --> Finish setting the default static config <-- */
540
541
8.00k
    return UA_STATUSCODE_GOOD;
542
8.00k
}
543
544
UA_EXPORT UA_StatusCode
545
0
UA_ServerConfig_setBasics(UA_ServerConfig* conf) {
546
0
    return UA_ServerConfig_setBasics_withPort(conf, 4840);
547
0
}
548
549
UA_EXPORT UA_StatusCode
550
0
UA_ServerConfig_setBasics_withPort(UA_ServerConfig* conf, UA_UInt16 portNumber) {
551
0
    return setDefaultConfig(conf, portNumber);
552
0
}
553
554
UA_EXPORT UA_StatusCode
555
UA_ServerConfig_addSecurityPolicyNone(UA_ServerConfig *config,
556
8.00k
                                      const UA_ByteString *certificate) {
557
    /* Allocate the SecurityPolicies */
558
8.00k
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
559
8.00k
        UA_realloc(config->securityPolicies,
560
8.00k
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
561
8.00k
    if(!tmp)
562
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
563
8.00k
    config->securityPolicies = tmp;
564
565
    /* Populate the SecurityPolicies */
566
8.00k
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
567
8.00k
    if(certificate)
568
0
        localCertificate = *certificate;
569
8.00k
    UA_StatusCode retval =
570
8.00k
        UA_SecurityPolicy_None(&config->securityPolicies[config->securityPoliciesSize],
571
8.00k
                               localCertificate, config->logging);
572
8.00k
    if(retval != UA_STATUSCODE_GOOD) {
573
0
        if(config->securityPoliciesSize == 0) {
574
0
            UA_free(config->securityPolicies);
575
0
            config->securityPolicies = NULL;
576
0
        }
577
0
        return retval;
578
0
    }
579
580
8.00k
    config->securityPoliciesSize++;
581
8.00k
    return UA_STATUSCODE_GOOD;
582
8.00k
}
583
584
UA_EXPORT UA_StatusCode
585
UA_ServerConfig_addEndpoint(UA_ServerConfig *config, const UA_String securityPolicyUri,
586
8.00k
                            UA_MessageSecurityMode securityMode) {
587
    /* Lookup the security policy */
588
8.00k
    const UA_SecurityPolicy *policy = NULL;
589
8.00k
    for (size_t i = 0; i < config->securityPoliciesSize; ++i) {
590
8.00k
        if (UA_String_equal(&securityPolicyUri, &config->securityPolicies[i].policyUri)) {
591
8.00k
            policy = &config->securityPolicies[i];
592
8.00k
            break;
593
8.00k
        }
594
8.00k
    }
595
8.00k
    if(!policy)
596
0
        return UA_STATUSCODE_BADINVALIDARGUMENT;
597
598
    /* Populate the endpoint */
599
8.00k
    return addEndpoint(config, policy, securityMode);
600
8.00k
}
601
602
UA_EXPORT UA_StatusCode
603
0
UA_ServerConfig_addAllEndpoints(UA_ServerConfig *config) {
604
    /* Populate the endpoints */
605
0
    for(size_t i = 0; i < config->securityPoliciesSize; ++i) {
606
0
        if(UA_String_equal(&UA_SECURITY_POLICY_NONE_URI, &config->securityPolicies[i].policyUri)) {
607
0
            UA_StatusCode retval =
608
0
                addEndpoint(config, &config->securityPolicies[i], UA_MESSAGESECURITYMODE_NONE);
609
0
            if(retval != UA_STATUSCODE_GOOD)
610
0
                return retval;
611
0
        } else {
612
0
            UA_StatusCode retval =
613
0
                addEndpoint(config, &config->securityPolicies[i], UA_MESSAGESECURITYMODE_SIGN);
614
0
            if(retval != UA_STATUSCODE_GOOD)
615
0
                return retval;
616
0
            retval = addEndpoint(config, &config->securityPolicies[i],
617
0
                                 UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
618
0
            if(retval != UA_STATUSCODE_GOOD)
619
0
                return retval;
620
0
        }
621
0
    }
622
623
0
    return UA_STATUSCODE_GOOD;
624
0
}
625
626
UA_EXPORT UA_StatusCode
627
0
UA_ServerConfig_addAllSecureEndpoints(UA_ServerConfig *config) {
628
629
    /* Delete all predefined endpoints. */
630
0
    if(config->endpointsSize > 0) {
631
0
        for(size_t i = 0; i < config->endpointsSize; ++i)
632
0
            UA_EndpointDescription_clear(&config->endpoints[i]);
633
634
0
        UA_free(config->endpoints);
635
0
        config->endpoints = NULL;
636
0
        config->endpointsSize = 0;
637
0
    }
638
639
    /* Populate the endpoints */
640
0
    for(size_t i = 0; i < config->securityPoliciesSize; ++i) {
641
        /* Skip the None and all deprecated policies */
642
0
        if(config->securityPolicies[i].securityLevel == 0)
643
0
            continue;
644
0
        UA_StatusCode retval =
645
0
            addEndpoint(config, &config->securityPolicies[i], UA_MESSAGESECURITYMODE_SIGN);
646
0
        if(retval != UA_STATUSCODE_GOOD)
647
0
            return retval;
648
0
        retval = addEndpoint(config, &config->securityPolicies[i],
649
0
                             UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
650
0
        if(retval != UA_STATUSCODE_GOOD)
651
0
            return retval;
652
0
    }
653
654
0
    return UA_STATUSCODE_GOOD;
655
0
}
656
657
UA_EXPORT UA_StatusCode
658
UA_ServerConfig_setMinimalCustomBuffer(UA_ServerConfig *config, UA_UInt16 portNumber,
659
                                       const UA_ByteString *certificate,
660
                                       UA_UInt32 sendBufferSize,
661
8.00k
                                       UA_UInt32 recvBufferSize) {
662
8.00k
    if(!config)
663
0
        return UA_STATUSCODE_BADINVALIDARGUMENT;
664
665
8.00k
    UA_StatusCode retval = setDefaultConfig(config, portNumber);
666
8.00k
    if(retval != UA_STATUSCODE_GOOD) {
667
0
        UA_ServerConfig_clear(config);
668
0
        return retval;
669
0
    }
670
671
    /* Set the TCP settings */
672
8.00k
    config->tcpBufSize = recvBufferSize;
673
674
    /* Allocate the SecurityPolicies */
675
8.00k
    retval = UA_ServerConfig_addSecurityPolicyNone(config, certificate);
676
8.00k
    if(retval != UA_STATUSCODE_GOOD) {
677
0
        UA_ServerConfig_clear(config);
678
0
        return retval;
679
0
    }
680
681
    /* Initialize the Access Control plugin */
682
8.00k
    retval = UA_AccessControl_default(config, true, NULL, 0, NULL);
683
8.00k
    if(retval != UA_STATUSCODE_GOOD) {
684
0
        UA_ServerConfig_clear(config);
685
0
        return retval;
686
0
    }
687
688
    /* Allocate the endpoint */
689
8.00k
    retval = UA_ServerConfig_addEndpoint(config, UA_SECURITY_POLICY_NONE_URI,
690
8.00k
                                         UA_MESSAGESECURITYMODE_NONE);
691
8.00k
    if(retval != UA_STATUSCODE_GOOD) {
692
0
        UA_ServerConfig_clear(config);
693
0
        return retval;
694
0
    }
695
696
8.00k
    return UA_STATUSCODE_GOOD;
697
8.00k
}
698
699
#ifdef UA_ENABLE_ENCRYPTION
700
701
UA_EXPORT UA_StatusCode
702
UA_ServerConfig_addSecurityPolicyBasic128Rsa15(UA_ServerConfig *config,
703
                                               const UA_ByteString *certificate,
704
0
                                               const UA_ByteString *privateKey) {
705
    /* Allocate the SecurityPolicies */
706
0
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
707
0
        UA_realloc(config->securityPolicies,
708
0
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
709
0
    if(!tmp)
710
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
711
0
    config->securityPolicies = tmp;
712
713
    /* Populate the SecurityPolicies */
714
0
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
715
0
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
716
0
    if(certificate)
717
0
        localCertificate = *certificate;
718
0
    if(privateKey)
719
0
       localPrivateKey = *privateKey;
720
0
    UA_StatusCode retval =
721
0
        UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[config->securityPoliciesSize],
722
0
                                        localCertificate, localPrivateKey, config->logging);
723
0
    if(retval != UA_STATUSCODE_GOOD) {
724
0
        if(config->securityPoliciesSize == 0) {
725
0
            UA_free(config->securityPolicies);
726
0
            config->securityPolicies = NULL;
727
0
        }
728
0
        return retval;
729
0
    }
730
731
0
    config->securityPoliciesSize++;
732
0
    return UA_STATUSCODE_GOOD;
733
0
}
734
735
UA_EXPORT UA_StatusCode
736
UA_ServerConfig_addSecurityPolicyBasic256(UA_ServerConfig *config,
737
                                          const UA_ByteString *certificate,
738
0
                                          const UA_ByteString *privateKey) {
739
    /* Allocate the SecurityPolicies */
740
0
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
741
0
        UA_realloc(config->securityPolicies,
742
0
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
743
0
    if(!tmp)
744
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
745
0
    config->securityPolicies = tmp;
746
747
    /* Populate the SecurityPolicies */
748
0
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
749
0
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
750
0
    if(certificate)
751
0
        localCertificate = *certificate;
752
0
    if(privateKey)
753
0
       localPrivateKey = *privateKey;
754
0
    UA_StatusCode retval =
755
0
        UA_SecurityPolicy_Basic256(&config->securityPolicies[config->securityPoliciesSize],
756
0
                                   localCertificate, localPrivateKey, config->logging);
757
0
    if(retval != UA_STATUSCODE_GOOD) {
758
0
        if(config->securityPoliciesSize == 0) {
759
0
            UA_free(config->securityPolicies);
760
0
            config->securityPolicies = NULL;
761
0
        }
762
0
        return retval;
763
0
    }
764
765
0
    config->securityPoliciesSize++;
766
0
    return UA_STATUSCODE_GOOD;
767
0
}
768
769
UA_EXPORT UA_StatusCode
770
UA_ServerConfig_addSecurityPolicyBasic256Sha256(UA_ServerConfig *config,
771
                                                const UA_ByteString *certificate,
772
0
                                                const UA_ByteString *privateKey) {
773
    /* Allocate the SecurityPolicies */
774
0
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
775
0
        UA_realloc(config->securityPolicies,
776
0
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
777
0
    if(!tmp)
778
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
779
0
    config->securityPolicies = tmp;
780
781
    /* Populate the SecurityPolicies */
782
0
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
783
0
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
784
0
    if(certificate)
785
0
        localCertificate = *certificate;
786
0
    if(privateKey)
787
0
       localPrivateKey = *privateKey;
788
0
    UA_StatusCode retval =
789
0
        UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[config->securityPoliciesSize],
790
0
                                         localCertificate, localPrivateKey, config->logging);
791
0
    if(retval != UA_STATUSCODE_GOOD) {
792
0
        if(config->securityPoliciesSize == 0) {
793
0
            UA_free(config->securityPolicies);
794
0
            config->securityPolicies = NULL;
795
0
        }
796
0
        return retval;
797
0
    }
798
799
0
    config->securityPoliciesSize++;
800
0
    return UA_STATUSCODE_GOOD;
801
0
}
802
803
UA_EXPORT UA_StatusCode
804
UA_ServerConfig_addSecurityPolicyAes128Sha256RsaOaep(UA_ServerConfig *config,
805
                                                const UA_ByteString *certificate,
806
0
                                                const UA_ByteString *privateKey) {
807
    /* Allocate the SecurityPolicies */
808
0
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
809
0
        UA_realloc(config->securityPolicies,
810
0
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
811
0
    if(!tmp)
812
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
813
0
    config->securityPolicies = tmp;
814
815
    /* Populate the SecurityPolicies */
816
0
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
817
0
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
818
0
    if(certificate)
819
0
        localCertificate = *certificate;
820
0
    if(privateKey)
821
0
       localPrivateKey = *privateKey;
822
0
    UA_StatusCode retval =
823
0
        UA_SecurityPolicy_Aes128Sha256RsaOaep(&config->securityPolicies[config->securityPoliciesSize],
824
0
                                              localCertificate, localPrivateKey, config->logging);
825
0
    if(retval != UA_STATUSCODE_GOOD) {
826
0
        if(config->securityPoliciesSize == 0) {
827
0
            UA_free(config->securityPolicies);
828
0
            config->securityPolicies = NULL;
829
0
        }
830
0
        return retval;
831
0
    }
832
833
0
    config->securityPoliciesSize++;
834
0
    return UA_STATUSCODE_GOOD;
835
0
}
836
837
UA_EXPORT UA_StatusCode
838
UA_ServerConfig_addSecurityPolicyAes256Sha256RsaPss(UA_ServerConfig *config,
839
                                                     const UA_ByteString *certificate,
840
0
                                                     const UA_ByteString *privateKey) {
841
    /* Allocate the SecurityPolicies */
842
0
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
843
0
        UA_realloc(config->securityPolicies,
844
0
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
845
0
    if(!tmp)
846
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
847
0
    config->securityPolicies = tmp;
848
849
    /* Populate the SecurityPolicies */
850
0
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
851
0
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
852
0
    if(certificate)
853
0
        localCertificate = *certificate;
854
0
    if(privateKey)
855
0
        localPrivateKey = *privateKey;
856
0
    UA_StatusCode retval =
857
0
        UA_SecurityPolicy_Aes256Sha256RsaPss(&config->securityPolicies[config->securityPoliciesSize],
858
0
                                              localCertificate, localPrivateKey, config->logging);
859
0
    if(retval != UA_STATUSCODE_GOOD) {
860
0
        if(config->securityPoliciesSize == 0) {
861
0
            UA_free(config->securityPolicies);
862
0
            config->securityPolicies = NULL;
863
0
        }
864
0
        return retval;
865
0
    }
866
867
0
    config->securityPoliciesSize++;
868
0
    return UA_STATUSCODE_GOOD;
869
0
}
870
871
#if defined(UA_ENABLE_ENCRYPTION_OPENSSL) || \
872
    (defined(UA_ENABLE_ENCRYPTION_MBEDTLS) && MBEDTLS_VERSION_NUMBER >= 0x03000000)
873
UA_EXPORT UA_StatusCode
874
UA_ServerConfig_addSecurityPolicyEccNistP256(UA_ServerConfig *config,
875
                                                     const UA_ByteString *certificate,
876
                                                     const UA_ByteString *privateKey) {
877
    /* Allocate the SecurityPolicies */
878
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
879
        UA_realloc(config->securityPolicies,
880
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
881
    if(!tmp)
882
        return UA_STATUSCODE_BADOUTOFMEMORY;
883
    config->securityPolicies = tmp;
884
885
    /* Populate the SecurityPolicies */
886
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
887
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
888
    if(certificate)
889
        localCertificate = *certificate;
890
    if(privateKey)
891
        localPrivateKey = *privateKey;
892
    UA_StatusCode retval =
893
        UA_SecurityPolicy_EccNistP256(&config->securityPolicies[config->securityPoliciesSize],
894
                                              UA_APPLICATIONTYPE_SERVER, localCertificate,
895
                                              localPrivateKey, config->logging);
896
    if(retval != UA_STATUSCODE_GOOD) {
897
        if(config->securityPoliciesSize == 0) {
898
            UA_free(config->securityPolicies);
899
            config->securityPolicies = NULL;
900
        }
901
        return retval;
902
    }
903
904
    config->securityPoliciesSize++;
905
    return UA_STATUSCODE_GOOD;
906
}
907
908
UA_EXPORT UA_StatusCode
909
UA_ServerConfig_addSecurityPolicyEccNistP384(UA_ServerConfig *config,
910
                                             const UA_ByteString *certificate,
911
                                             const UA_ByteString *privateKey) {
912
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
913
        UA_realloc(config->securityPolicies,
914
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
915
    if(!tmp)
916
        return UA_STATUSCODE_BADOUTOFMEMORY;
917
    config->securityPolicies = tmp;
918
919
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
920
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
921
    if(certificate)
922
        localCertificate = *certificate;
923
    if(privateKey)
924
        localPrivateKey = *privateKey;
925
    UA_StatusCode retval =
926
        UA_SecurityPolicy_EccNistP384(&config->securityPolicies[config->securityPoliciesSize],
927
                                      UA_APPLICATIONTYPE_SERVER, localCertificate,
928
                                      localPrivateKey, config->logging);
929
    if(retval != UA_STATUSCODE_GOOD) {
930
        if(config->securityPoliciesSize == 0) {
931
            UA_free(config->securityPolicies);
932
            config->securityPolicies = NULL;
933
        }
934
        return retval;
935
    }
936
937
    config->securityPoliciesSize++;
938
    return UA_STATUSCODE_GOOD;
939
}
940
UA_EXPORT UA_StatusCode
941
UA_ServerConfig_addSecurityPolicyEccBrainpoolP256r1(UA_ServerConfig *config,
942
                                                    const UA_ByteString *certificate,
943
                                                    const UA_ByteString *privateKey) {
944
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
945
        UA_realloc(config->securityPolicies,
946
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
947
    if(!tmp)
948
        return UA_STATUSCODE_BADOUTOFMEMORY;
949
    config->securityPolicies = tmp;
950
951
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
952
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
953
    if(certificate)
954
        localCertificate = *certificate;
955
    if(privateKey)
956
        localPrivateKey = *privateKey;
957
    UA_StatusCode retval =
958
        UA_SecurityPolicy_EccBrainpoolP256r1(&config->securityPolicies[config->securityPoliciesSize],
959
                                             UA_APPLICATIONTYPE_SERVER, localCertificate,
960
                                             localPrivateKey, config->logging);
961
    if(retval != UA_STATUSCODE_GOOD) {
962
        if(config->securityPoliciesSize == 0) {
963
            UA_free(config->securityPolicies);
964
            config->securityPolicies = NULL;
965
        }
966
        return retval;
967
    }
968
969
    config->securityPoliciesSize++;
970
    return UA_STATUSCODE_GOOD;
971
}
972
UA_EXPORT UA_StatusCode
973
UA_ServerConfig_addSecurityPolicyEccBrainpoolP384r1(UA_ServerConfig *config,
974
                                                    const UA_ByteString *certificate,
975
                                                    const UA_ByteString *privateKey) {
976
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
977
        UA_realloc(config->securityPolicies,
978
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
979
    if(!tmp)
980
        return UA_STATUSCODE_BADOUTOFMEMORY;
981
    config->securityPolicies = tmp;
982
983
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
984
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
985
    if(certificate)
986
        localCertificate = *certificate;
987
    if(privateKey)
988
        localPrivateKey = *privateKey;
989
    UA_StatusCode retval =
990
        UA_SecurityPolicy_EccBrainpoolP384r1(&config->securityPolicies[config->securityPoliciesSize],
991
                                             UA_APPLICATIONTYPE_SERVER, localCertificate,
992
                                             localPrivateKey, config->logging);
993
    if(retval != UA_STATUSCODE_GOOD) {
994
        if(config->securityPoliciesSize == 0) {
995
            UA_free(config->securityPolicies);
996
            config->securityPolicies = NULL;
997
        }
998
        return retval;
999
    }
1000
1001
    config->securityPoliciesSize++;
1002
    return UA_STATUSCODE_GOOD;
1003
}
1004
#endif /* UA_ENABLE_ENCRYPTION_OPENSSL || mbedTLS ECC */
1005
1006
#if defined(UA_ENABLE_ENCRYPTION_OPENSSL)
1007
UA_EXPORT UA_StatusCode
1008
UA_ServerConfig_addSecurityPolicyEccCurve25519(UA_ServerConfig *config,
1009
                                               const UA_ByteString *certificate,
1010
                                               const UA_ByteString *privateKey) {
1011
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
1012
        UA_realloc(config->securityPolicies,
1013
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
1014
    if(!tmp)
1015
        return UA_STATUSCODE_BADOUTOFMEMORY;
1016
    config->securityPolicies = tmp;
1017
1018
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
1019
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
1020
    if(certificate)
1021
        localCertificate = *certificate;
1022
    if(privateKey)
1023
        localPrivateKey = *privateKey;
1024
    UA_StatusCode retval =
1025
        UA_SecurityPolicy_EccCurve25519(&config->securityPolicies[config->securityPoliciesSize],
1026
                                        UA_APPLICATIONTYPE_SERVER, localCertificate,
1027
                                        localPrivateKey, config->logging);
1028
    if(retval != UA_STATUSCODE_GOOD) {
1029
        if(config->securityPoliciesSize == 0) {
1030
            UA_free(config->securityPolicies);
1031
            config->securityPolicies = NULL;
1032
        }
1033
        return retval;
1034
    }
1035
1036
    config->securityPoliciesSize++;
1037
    return UA_STATUSCODE_GOOD;
1038
}
1039
UA_EXPORT UA_StatusCode
1040
UA_ServerConfig_addSecurityPolicyEccCurve448(UA_ServerConfig *config,
1041
                                             const UA_ByteString *certificate,
1042
                                             const UA_ByteString *privateKey) {
1043
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
1044
        UA_realloc(config->securityPolicies,
1045
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
1046
    if(!tmp)
1047
        return UA_STATUSCODE_BADOUTOFMEMORY;
1048
    config->securityPolicies = tmp;
1049
1050
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
1051
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
1052
    if(certificate)
1053
        localCertificate = *certificate;
1054
    if(privateKey)
1055
        localPrivateKey = *privateKey;
1056
    UA_StatusCode retval =
1057
        UA_SecurityPolicy_EccCurve448(&config->securityPolicies[config->securityPoliciesSize],
1058
                                      UA_APPLICATIONTYPE_SERVER, localCertificate,
1059
                                      localPrivateKey, config->logging);
1060
    if(retval != UA_STATUSCODE_GOOD) {
1061
        if(config->securityPoliciesSize == 0) {
1062
            UA_free(config->securityPolicies);
1063
            config->securityPolicies = NULL;
1064
        }
1065
        return retval;
1066
    }
1067
1068
    config->securityPoliciesSize++;
1069
    return UA_STATUSCODE_GOOD;
1070
}
1071
#endif
1072
1073
1074
/* This assumes that the sp array has enough space for up to SECURITY_POLICY_SIZE policies.
1075
 * Policies that have been added are not cleaned up after an error.
1076
 * Certificate and/or pricateKey can be NULL and will not be used then.
1077
 * Logs a warning if policies could not be added. */
1078
static void
1079
addAllSecurityPolicies(UA_SecurityPolicy *sp, size_t *length,
1080
                       const UA_ByteString certificate, const UA_ByteString privateKey,
1081
                       UA_Boolean onlySecure, UA_ApplicationType applicationType,
1082
0
                       UA_Logger *logging) {
1083
    /* Basic256Sha256 */
1084
0
    UA_StatusCode retval = UA_SecurityPolicy_Basic256Sha256(sp + *length, certificate, privateKey, logging);
1085
0
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1086
0
    if(retval != UA_STATUSCODE_GOOD) {
1087
0
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1088
0
                       "Could not add SecurityPolicy#Basic256Sha256 with error code %s",
1089
0
                       UA_StatusCode_name(retval));
1090
0
    }
1091
1092
    /* Aes256Sha256RsaPss */
1093
0
    retval = UA_SecurityPolicy_Aes256Sha256RsaPss(sp + *length, certificate, privateKey, logging);
1094
0
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1095
0
    if(retval != UA_STATUSCODE_GOOD) {
1096
0
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1097
0
                       "Could not add SecurityPolicy#Aes256Sha256RsaPss with error code %s",
1098
0
                       UA_StatusCode_name(retval));
1099
0
    }
1100
1101
    /* Aes128Sha256RsaOaep */
1102
0
    retval = UA_SecurityPolicy_Aes128Sha256RsaOaep(sp + *length, certificate, privateKey, logging);
1103
0
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1104
0
    if(retval != UA_STATUSCODE_GOOD) {
1105
0
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1106
0
                       "Could not add SecurityPolicy#Aes128Sha256RsaOaep with error code %s",
1107
0
                       UA_StatusCode_name(retval));
1108
0
    }
1109
1110
#if defined(UA_ENABLE_ENCRYPTION_OPENSSL) || \
1111
    (defined(UA_ENABLE_ENCRYPTION_MBEDTLS) && MBEDTLS_VERSION_NUMBER >= 0x03000000)
1112
    /* EccNistP256 */
1113
    retval = UA_SecurityPolicy_EccNistP256(sp + *length, applicationType,
1114
                                           certificate, privateKey, logging);
1115
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1116
    if(retval != UA_STATUSCODE_GOOD) {
1117
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1118
                       "Could not add SecurityPolicy#EccNistP256 with error code %s",
1119
                       UA_StatusCode_name(retval));
1120
    }
1121
1122
    /* EccNistP384 */
1123
    retval = UA_SecurityPolicy_EccNistP384(sp + *length, applicationType,
1124
                                           certificate, privateKey, logging);
1125
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1126
    if(retval != UA_STATUSCODE_GOOD) {
1127
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1128
                       "Could not add SecurityPolicy#EccNistP384 with error code %s",
1129
                       UA_StatusCode_name(retval));
1130
    }
1131
1132
    /* EccBrainpoolP256r1 */
1133
    retval = UA_SecurityPolicy_EccBrainpoolP256r1(sp + *length, applicationType,
1134
                                                   certificate, privateKey, logging);
1135
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1136
    if(retval != UA_STATUSCODE_GOOD) {
1137
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1138
                       "Could not add SecurityPolicy#EccBrainpoolP256r1 with error code %s",
1139
                       UA_StatusCode_name(retval));
1140
    }
1141
1142
    /* EccBrainpoolP384r1 */
1143
    retval = UA_SecurityPolicy_EccBrainpoolP384r1(sp + *length, applicationType,
1144
                                                   certificate, privateKey, logging);
1145
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1146
    if(retval != UA_STATUSCODE_GOOD) {
1147
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1148
                       "Could not add SecurityPolicy#EccBrainpoolP384r1 with error code %s",
1149
                       UA_StatusCode_name(retval));
1150
    }
1151
#endif /* UA_ENABLE_ENCRYPTION_OPENSSL || mbedTLS ECC */
1152
1153
#if defined(UA_ENABLE_ENCRYPTION_OPENSSL)
1154
    /* EccCurve25519 */
1155
    retval = UA_SecurityPolicy_EccCurve25519(sp + *length, applicationType,
1156
                                             certificate, privateKey, logging);
1157
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1158
    if(retval != UA_STATUSCODE_GOOD) {
1159
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1160
                       "Could not add SecurityPolicy#EccCurve25519 with error code %s",
1161
                       UA_StatusCode_name(retval));
1162
    }
1163
1164
    /* EccCurve448 */
1165
    retval = UA_SecurityPolicy_EccCurve448(sp + *length, applicationType,
1166
                                           certificate, privateKey, logging);
1167
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1168
    if(retval != UA_STATUSCODE_GOOD) {
1169
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1170
                       "Could not add SecurityPolicy#EccCurve448 with error code %s",
1171
                       UA_StatusCode_name(retval));
1172
    }
1173
#endif
1174
1175
    /* Don't add "unsecure" SecurityPolicies */
1176
0
    if(onlySecure)
1177
0
        return;
1178
1179
    /* None */
1180
0
    retval = UA_SecurityPolicy_None(sp + *length, certificate, logging);
1181
0
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1182
0
    if(retval != UA_STATUSCODE_GOOD) {
1183
0
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1184
0
                       "Could not add SecurityPolicy#None with error code %s",
1185
0
                       UA_StatusCode_name(retval));
1186
0
    }
1187
1188
#ifdef UA_INCLUDE_INSECURE_POLICIES
1189
    /* Basic128Rsa15 should no longer be used */
1190
    retval = UA_SecurityPolicy_Basic128Rsa15(sp + *length, certificate, privateKey, logging);
1191
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1192
    if(retval != UA_STATUSCODE_GOOD) {
1193
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1194
                       "Could not add SecurityPolicy#Basic128Rsa15 with error code %s",
1195
                       UA_StatusCode_name(retval));
1196
    }
1197
1198
    /* Basic256 should no longer be used */
1199
    retval = UA_SecurityPolicy_Basic256(sp + *length, certificate, privateKey, logging);
1200
    *length += (retval == UA_STATUSCODE_GOOD) ? 1 : 0;
1201
    if(retval != UA_STATUSCODE_GOOD) {
1202
        UA_LOG_WARNING(logging, UA_LOGCATEGORY_APPLICATION,
1203
                       "Could not add SecurityPolicy#Basic256 with error code %s",
1204
                       UA_StatusCode_name(retval));
1205
    }
1206
#endif
1207
0
}
1208
1209
static UA_StatusCode
1210
addAllServerSecurityPolicies(UA_ServerConfig *config,
1211
                             const UA_ByteString *certificate, const UA_ByteString *privateKey,
1212
0
                             UA_Boolean onlySecure) {
1213
    /* Populate the cert variables */
1214
0
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
1215
0
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
1216
0
    if(certificate)
1217
0
        localCertificate = *certificate;
1218
0
    if(privateKey)
1219
0
       localPrivateKey = *privateKey;
1220
1221
    /* Load the private key and convert to the DER format. Use an empty password
1222
     * on the first try -- maybe the key does not require a password. */
1223
0
    UA_ByteString decryptedPrivateKey = UA_BYTESTRING_NULL;
1224
0
    UA_ByteString keyPassword = UA_BYTESTRING_NULL;
1225
0
    UA_StatusCode keySuccess = UA_STATUSCODE_GOOD;
1226
0
    if(privateKey && privateKey->length > 0)
1227
0
        keySuccess = UA_CertificateUtils_decryptPrivateKey(localPrivateKey, keyPassword,
1228
0
                                                           &decryptedPrivateKey);
1229
1230
    /* Get the password and decrypt. An application might want to loop / retry
1231
     * here to allow users to correct their entry. */
1232
0
    if(keySuccess != UA_STATUSCODE_GOOD) {
1233
0
        if(config->privateKeyPasswordCallback)
1234
0
            keySuccess = config->privateKeyPasswordCallback(config, &keyPassword);
1235
0
        else
1236
0
            keySuccess = readPrivateKeyPassword(&keyPassword);
1237
0
        if(keySuccess != UA_STATUSCODE_GOOD)
1238
0
            return keySuccess;
1239
0
        keySuccess = UA_CertificateUtils_decryptPrivateKey(localPrivateKey, keyPassword,
1240
0
                                                           &decryptedPrivateKey);
1241
0
        UA_ByteString_memZero(&keyPassword);
1242
0
        UA_ByteString_clear(&keyPassword);
1243
0
    }
1244
0
    if(keySuccess != UA_STATUSCODE_GOOD) {
1245
0
        UA_LOG_ERROR(config->logging, UA_LOGCATEGORY_APPLICATION,
1246
0
                     "Could not decrypt the private key with status code %s",
1247
0
                     UA_StatusCode_name(keySuccess));
1248
0
        return keySuccess;
1249
0
    }
1250
1251
    /* Clear up the old SecurityPolicies */
1252
0
    for(size_t i = 0; i < config->securityPoliciesSize; i++) {
1253
0
        config->securityPolicies[i].clear(&config->securityPolicies[i]);
1254
0
    }
1255
1256
    /* Allocate memory for the additional policies */
1257
0
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy*)
1258
0
        UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * SECURITY_POLICY_SIZE);
1259
0
    if(!tmp) {
1260
0
        UA_ByteString_memZero(&decryptedPrivateKey);
1261
0
        UA_ByteString_clear(&decryptedPrivateKey);
1262
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
1263
0
    }
1264
1265
0
    config->securityPolicies = tmp;
1266
0
    config->securityPoliciesSize = 0;
1267
1268
    /* Do the generic addition of certificates */
1269
0
    addAllSecurityPolicies(config->securityPolicies, &config->securityPoliciesSize,
1270
0
                           localCertificate, decryptedPrivateKey, onlySecure,
1271
0
                           UA_APPLICATIONTYPE_SERVER, config->logging);
1272
1273
0
    if(config->securityPoliciesSize == 0) {
1274
0
        UA_free(config->securityPolicies);
1275
0
        config->securityPolicies = NULL;
1276
0
    }
1277
1278
0
    UA_ByteString_memZero(&decryptedPrivateKey);
1279
0
    UA_ByteString_clear(&decryptedPrivateKey);
1280
0
    return UA_STATUSCODE_GOOD;
1281
0
}
1282
1283
UA_StatusCode
1284
UA_ServerConfig_addAllSecurityPolicies(UA_ServerConfig *config,
1285
                                       const UA_ByteString *certificate,
1286
0
                                       const UA_ByteString *privateKey) {
1287
0
    return addAllServerSecurityPolicies(config, certificate, privateKey, false);
1288
0
}
1289
1290
/* Always returns UA_STATUSCODE_GOOD. Logs a warning if policies could not be added. */
1291
UA_StatusCode
1292
UA_ServerConfig_addAllSecureSecurityPolicies(UA_ServerConfig *config,
1293
                                             const UA_ByteString *certificate,
1294
0
                                             const UA_ByteString *privateKey) {
1295
0
    return addAllServerSecurityPolicies(config, certificate, privateKey, true);
1296
0
}
1297
1298
UA_EXPORT UA_StatusCode
1299
UA_ServerConfig_setDefaultWithSecurityPolicies(UA_ServerConfig *conf,
1300
                                               UA_UInt16 portNumber,
1301
                                               const UA_ByteString *certificate,
1302
                                               const UA_ByteString *privateKey,
1303
                                               const UA_ByteString *trustList,
1304
                                               size_t trustListSize,
1305
                                               const UA_ByteString *issuerList,
1306
                                               size_t issuerListSize,
1307
                                               const UA_ByteString *revocationList,
1308
0
                                               size_t revocationListSize) {
1309
0
    UA_StatusCode retval = setDefaultConfig(conf, portNumber);
1310
0
    if(retval != UA_STATUSCODE_GOOD) {
1311
0
        UA_ServerConfig_clear(conf);
1312
0
        return retval;
1313
0
    }
1314
1315
0
    if(trustListSize > 0) {
1316
0
        UA_TrustListDataType list;
1317
0
        UA_TrustListDataType_init(&list);
1318
0
        list.specifiedLists |= UA_TRUSTLISTMASKS_TRUSTEDCERTIFICATES;
1319
0
        retval = UA_Array_copy(trustList, trustListSize,
1320
0
                               (void**)&list.trustedCertificates,
1321
0
                               &UA_TYPES[UA_TYPES_BYTESTRING]);
1322
0
        if(retval != UA_STATUSCODE_GOOD)
1323
0
            return retval;
1324
0
        list.trustedCertificatesSize = trustListSize;
1325
1326
0
        if(issuerListSize > 0) {
1327
0
            list.specifiedLists |= UA_TRUSTLISTMASKS_ISSUERCERTIFICATES;
1328
0
            retval = UA_Array_copy(issuerList, issuerListSize,
1329
0
                                   (void**)&list.issuerCertificates,
1330
0
                                   &UA_TYPES[UA_TYPES_BYTESTRING]);
1331
0
            if(retval != UA_STATUSCODE_GOOD) {
1332
0
                UA_TrustListDataType_clear(&list);
1333
0
                return retval;
1334
0
            }
1335
0
            list.issuerCertificatesSize = issuerListSize;
1336
0
        }
1337
1338
0
        if(revocationListSize > 0) {
1339
0
            list.specifiedLists |= UA_TRUSTLISTMASKS_TRUSTEDCRLS;
1340
0
            retval = UA_Array_copy(revocationList, revocationListSize,
1341
0
                                   (void**)&list.trustedCrls,
1342
0
                                   &UA_TYPES[UA_TYPES_BYTESTRING]);
1343
0
            if(retval != UA_STATUSCODE_GOOD) {
1344
0
                UA_TrustListDataType_clear(&list);
1345
0
                return retval;
1346
0
            }
1347
0
            list.trustedCrlsSize = revocationListSize;
1348
0
        }
1349
1350
        /* Set up the parameters */
1351
0
        UA_KeyValuePair params[2];
1352
0
        size_t paramsSize = 2;
1353
1354
0
        params[0].key = UA_QUALIFIEDNAME(0, "max-trust-listsize");
1355
0
        UA_Variant_setScalar(&params[0].value, &conf->maxTrustListSize,
1356
0
                             &UA_TYPES[UA_TYPES_UINT32]);
1357
0
        params[1].key = UA_QUALIFIEDNAME(0, "max-rejected-listsize");
1358
0
        UA_Variant_setScalar(&params[1].value, &conf->maxRejectedListSize,
1359
0
                             &UA_TYPES[UA_TYPES_UINT32]);
1360
1361
0
        UA_KeyValueMap paramsMap;
1362
0
        paramsMap.map = params;
1363
0
        paramsMap.mapSize = paramsSize;
1364
1365
0
        UA_NodeId defaultApplicationGroup =
1366
0
            UA_NS0ID(SERVERCONFIGURATION_CERTIFICATEGROUPS_DEFAULTAPPLICATIONGROUP);
1367
0
        retval = UA_CertificateGroup_Memorystore(&conf->secureChannelPKI,
1368
0
                                                 &defaultApplicationGroup, &list,
1369
0
                                                 conf->logging, &paramsMap);
1370
0
        if(retval != UA_STATUSCODE_GOOD) {
1371
0
            UA_TrustListDataType_clear(&list);
1372
0
            return retval;
1373
0
        }
1374
1375
0
        UA_NodeId defaultUserTokenGroup =
1376
0
            UA_NS0ID(SERVERCONFIGURATION_CERTIFICATEGROUPS_DEFAULTUSERTOKENGROUP);
1377
0
        retval = UA_CertificateGroup_Memorystore(&conf->sessionPKI,
1378
0
                                                 &defaultUserTokenGroup, &list,
1379
0
                                                 conf->logging, &paramsMap);
1380
0
        UA_TrustListDataType_clear(&list);
1381
0
        if(retval != UA_STATUSCODE_GOOD)
1382
0
            return retval;
1383
0
    } else {
1384
0
        UA_LOG_WARNING(conf->logging, UA_LOGCATEGORY_APPLICATION,
1385
0
                       "Empty trustlist passed. Leaving the previously "
1386
0
                       "configured certificate verification in place");
1387
0
    }
1388
1389
0
    retval = UA_ServerConfig_addAllSecurityPolicies(conf, certificate, privateKey);
1390
1391
    /* Reinitialize AccessControl to take the changed SecurityPolicies into account
1392
     * TODO: This looses username/pw during the reinitialization */
1393
0
    if(retval == UA_STATUSCODE_GOOD)
1394
0
        retval = UA_AccessControl_default(conf, true, NULL, 0, NULL);
1395
1396
0
    if(retval != UA_STATUSCODE_GOOD) {
1397
0
        UA_ServerConfig_clear(conf);
1398
0
        return retval;
1399
0
    }
1400
1401
0
    retval = UA_ServerConfig_addAllEndpoints(conf);
1402
0
    if(retval != UA_STATUSCODE_GOOD) {
1403
0
        UA_ServerConfig_clear(conf);
1404
0
        return retval;
1405
0
    }
1406
1407
0
    return UA_STATUSCODE_GOOD;
1408
0
}
1409
1410
UA_EXPORT UA_StatusCode
1411
UA_ServerConfig_setDefaultWithSecureSecurityPolicies(UA_ServerConfig *conf,
1412
                                               UA_UInt16 portNumber,
1413
                                               const UA_ByteString *certificate,
1414
                                               const UA_ByteString *privateKey,
1415
                                               const UA_ByteString *trustList,
1416
                                               size_t trustListSize,
1417
                                               const UA_ByteString *issuerList,
1418
                                               size_t issuerListSize,
1419
                                               const UA_ByteString *revocationList,
1420
0
                                               size_t revocationListSize) {
1421
0
    UA_StatusCode retval = setDefaultConfig(conf, portNumber);
1422
0
    if(retval != UA_STATUSCODE_GOOD) {
1423
0
        UA_ServerConfig_clear(conf);
1424
0
        return retval;
1425
0
    }
1426
1427
0
    if(trustListSize > 0) {
1428
0
        UA_TrustListDataType list;
1429
0
        UA_TrustListDataType_init(&list);
1430
0
        list.specifiedLists |= UA_TRUSTLISTMASKS_TRUSTEDCERTIFICATES;
1431
0
        retval = UA_Array_copy(trustList, trustListSize,
1432
0
                               (void**)&list.trustedCertificates,
1433
0
                               &UA_TYPES[UA_TYPES_BYTESTRING]);
1434
0
        if(retval != UA_STATUSCODE_GOOD)
1435
0
            return retval;
1436
0
        list.trustedCertificatesSize = trustListSize;
1437
1438
0
        if(issuerListSize > 0) {
1439
0
            list.specifiedLists |= UA_TRUSTLISTMASKS_ISSUERCERTIFICATES;
1440
0
            retval = UA_Array_copy(issuerList, issuerListSize,
1441
0
                                   (void**)&list.issuerCertificates,
1442
0
                                   &UA_TYPES[UA_TYPES_BYTESTRING]);
1443
0
            if(retval != UA_STATUSCODE_GOOD) {
1444
0
                UA_TrustListDataType_clear(&list);
1445
0
                return retval;
1446
0
            }
1447
0
            list.issuerCertificatesSize = issuerListSize;
1448
0
        }
1449
1450
0
        if(revocationListSize > 0) {
1451
0
            list.specifiedLists |= UA_TRUSTLISTMASKS_TRUSTEDCRLS;
1452
0
            retval = UA_Array_copy(revocationList, revocationListSize,
1453
0
                                   (void**)&list.trustedCrls,
1454
0
                                   &UA_TYPES[UA_TYPES_BYTESTRING]);
1455
0
            if(retval != UA_STATUSCODE_GOOD) {
1456
0
                UA_TrustListDataType_clear(&list);
1457
0
                return retval;
1458
0
            }
1459
0
            list.trustedCrlsSize = revocationListSize;
1460
0
        }
1461
1462
        /* Set up the parameters */
1463
0
        UA_KeyValuePair params[2];
1464
0
        size_t paramsSize = 2;
1465
1466
0
        params[0].key = UA_QUALIFIEDNAME(0, "max-trust-listsize");
1467
0
        UA_Variant_setScalar(&params[0].value, &conf->maxTrustListSize, &UA_TYPES[UA_TYPES_UINT32]);
1468
0
        params[1].key = UA_QUALIFIEDNAME(0, "max-rejected-listsize");
1469
0
        UA_Variant_setScalar(&params[1].value, &conf->maxRejectedListSize, &UA_TYPES[UA_TYPES_UINT32]);
1470
1471
0
        UA_KeyValueMap paramsMap;
1472
0
        paramsMap.map = params;
1473
0
        paramsMap.mapSize = paramsSize;
1474
1475
0
        UA_NodeId defaultApplicationGroup =
1476
0
            UA_NS0ID(SERVERCONFIGURATION_CERTIFICATEGROUPS_DEFAULTAPPLICATIONGROUP);
1477
0
        retval = UA_CertificateGroup_Memorystore(&conf->secureChannelPKI, &defaultApplicationGroup,
1478
0
                                                 &list, conf->logging, &paramsMap);
1479
0
        if(retval != UA_STATUSCODE_GOOD) {
1480
0
            UA_TrustListDataType_clear(&list);
1481
0
            return retval;
1482
0
        }
1483
1484
0
        UA_NodeId defaultUserTokenGroup =
1485
0
            UA_NS0ID(SERVERCONFIGURATION_CERTIFICATEGROUPS_DEFAULTUSERTOKENGROUP);
1486
0
        retval = UA_CertificateGroup_Memorystore(&conf->sessionPKI, &defaultUserTokenGroup,
1487
0
                                                 &list, conf->logging, &paramsMap);
1488
0
        if(retval != UA_STATUSCODE_GOOD) {
1489
0
            UA_TrustListDataType_clear(&list);
1490
0
            return retval;
1491
0
        }
1492
0
        UA_TrustListDataType_clear(&list);
1493
0
    } else {
1494
0
        UA_LOG_WARNING(conf->logging, UA_LOGCATEGORY_APPLICATION,
1495
0
                       "Empty trustlist passed. Leaving the previously "
1496
0
                       "configured certificate verification in place");
1497
0
    }
1498
1499
0
    retval = UA_ServerConfig_addAllSecureSecurityPolicies(conf, certificate, privateKey);
1500
1501
0
    if(retval == UA_STATUSCODE_GOOD) {
1502
0
        retval = UA_AccessControl_default(conf, false, NULL, 0, NULL);
1503
0
    }
1504
0
    if(retval != UA_STATUSCODE_GOOD) {
1505
0
        UA_ServerConfig_clear(conf);
1506
0
        return retval;
1507
0
    }
1508
1509
0
    retval = UA_ServerConfig_addAllSecureEndpoints(conf);
1510
0
    if(retval != UA_STATUSCODE_GOOD) {
1511
0
        UA_ServerConfig_clear(conf);
1512
0
        return retval;
1513
0
    }
1514
1515
0
    return UA_STATUSCODE_GOOD;
1516
0
}
1517
1518
#if defined(__linux__) || defined(UA_ARCHITECTURE_WIN32)
1519
1520
UA_StatusCode
1521
UA_ServerConfig_addSecurityPolicy_Filestore(UA_ServerConfig *config,
1522
                                            UA_SecurityPolicy *innerPolicy,
1523
0
                                            const UA_String storePath) {
1524
    /* Allocate the SecurityPolicies */
1525
0
    UA_SecurityPolicy *tmp = (UA_SecurityPolicy *)
1526
0
        UA_realloc(config->securityPolicies,
1527
0
                   sizeof(UA_SecurityPolicy) * (1 + config->securityPoliciesSize));
1528
0
    if(!tmp)
1529
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
1530
0
    config->securityPolicies = tmp;
1531
1532
0
    UA_StatusCode retval =
1533
0
        UA_SecurityPolicy_Filestore(&config->securityPolicies[config->securityPoliciesSize],
1534
0
                                    innerPolicy, storePath);
1535
0
    if(retval != UA_STATUSCODE_GOOD) {
1536
0
        if(config->securityPoliciesSize == 0) {
1537
0
            UA_free(config->securityPolicies);
1538
0
            config->securityPolicies = NULL;
1539
0
        }
1540
0
        return retval;
1541
0
    }
1542
1543
0
    config->securityPoliciesSize++;
1544
0
    return UA_STATUSCODE_GOOD;
1545
0
}
1546
1547
UA_StatusCode
1548
UA_ServerConfig_addSecurityPolicies_Filestore(UA_ServerConfig *config,
1549
                                              const UA_ByteString *certificate,
1550
                                              const UA_ByteString *privateKey,
1551
0
                                              const UA_String storePath) {
1552
0
    UA_StatusCode retval = UA_STATUSCODE_GOOD;
1553
0
    UA_Boolean onlySecure = false;
1554
0
    UA_Boolean onlyNone = false;
1555
1556
    /* Populate the SecurityPolicies */
1557
0
    UA_ByteString localCertificate = UA_BYTESTRING_NULL;
1558
0
    UA_ByteString localPrivateKey  = UA_BYTESTRING_NULL;
1559
1560
0
    if(certificate)
1561
0
        localCertificate = *certificate;
1562
0
    if(privateKey)
1563
0
        localPrivateKey = *privateKey;
1564
1565
0
    if(certificate && privateKey) {
1566
0
        size_t certificateKeyLength = 0;
1567
0
        if(UA_CertificateUtils_getKeySize((UA_ByteString*)(uintptr_t)certificate,
1568
0
                                          &certificateKeyLength) == UA_STATUSCODE_GOOD &&
1569
0
           certificateKeyLength > 2048)
1570
0
            onlySecure = true;
1571
0
    } else {
1572
0
        onlyNone = true;
1573
0
    }
1574
1575
    /* Load the private key and convert to the DER format. Use an empty password
1576
     * on the first try -- maybe the key does not require a password. */
1577
0
    UA_ByteString decryptedPrivateKey = UA_BYTESTRING_NULL;
1578
0
    UA_ByteString keyPassword = UA_BYTESTRING_NULL;
1579
0
    UA_StatusCode keySuccess = UA_STATUSCODE_GOOD;
1580
1581
0
    if(privateKey && privateKey->length > 0)
1582
0
        keySuccess = UA_CertificateUtils_decryptPrivateKey(localPrivateKey, keyPassword,
1583
0
                                              &decryptedPrivateKey);
1584
1585
    /* Get the password and decrypt. An application might want to loop / retry
1586
     * here to allow users to correct their entry. */
1587
0
    if(keySuccess != UA_STATUSCODE_GOOD) {
1588
0
        if(config->privateKeyPasswordCallback)
1589
0
            keySuccess = config->privateKeyPasswordCallback(config, &keyPassword);
1590
0
        else
1591
0
            keySuccess = readPrivateKeyPassword(&keyPassword);
1592
0
        if(keySuccess != UA_STATUSCODE_GOOD)
1593
0
            return keySuccess;
1594
0
        keySuccess = UA_CertificateUtils_decryptPrivateKey(localPrivateKey, keyPassword,
1595
0
                                              &decryptedPrivateKey);
1596
0
        UA_ByteString_memZero(&keyPassword);
1597
0
        UA_ByteString_clear(&keyPassword);
1598
0
    }
1599
0
    if(keySuccess != UA_STATUSCODE_GOOD)
1600
0
        return keySuccess;
1601
1602
0
    if(onlyNone) {
1603
        /* None */
1604
0
        UA_SecurityPolicy *nonePolicy =
1605
0
            (UA_SecurityPolicy*)UA_calloc(1, sizeof(UA_SecurityPolicy));
1606
0
        if(!nonePolicy) {
1607
0
            UA_ByteString_memZero(&decryptedPrivateKey);
1608
0
            UA_ByteString_clear(&decryptedPrivateKey);
1609
0
            return UA_STATUSCODE_BADOUTOFMEMORY;
1610
0
        }
1611
0
        retval = UA_SecurityPolicy_None(nonePolicy, localCertificate, config->logging);
1612
0
        if(retval != UA_STATUSCODE_GOOD) {
1613
0
            UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1614
0
                           "Could not add SecurityPolicy#None with error code %s",
1615
0
                           UA_StatusCode_name(retval));
1616
0
            nonePolicy->clear(nonePolicy);
1617
0
            UA_free(nonePolicy);
1618
0
            nonePolicy = NULL;
1619
0
        } else {
1620
0
            retval = UA_ServerConfig_addSecurityPolicy_Filestore(config, nonePolicy, storePath);
1621
0
            if(retval != UA_STATUSCODE_GOOD) {
1622
0
                UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1623
0
                               "Could not add SecurityPolicy#None with error code %s",
1624
0
                               UA_StatusCode_name(retval));
1625
0
            }
1626
0
        }
1627
0
        UA_ByteString_memZero(&decryptedPrivateKey);
1628
0
        UA_ByteString_clear(&decryptedPrivateKey);
1629
0
        return retval;
1630
0
    }
1631
1632
    /* Basic256Sha256 */
1633
0
    UA_SecurityPolicy *basic256Sha256Policy =
1634
0
        (UA_SecurityPolicy*)UA_calloc(1, sizeof(UA_SecurityPolicy));
1635
0
    if(!basic256Sha256Policy) {
1636
0
        UA_ByteString_memZero(&decryptedPrivateKey);
1637
0
        UA_ByteString_clear(&decryptedPrivateKey);
1638
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
1639
0
    }
1640
0
    retval = UA_SecurityPolicy_Basic256Sha256(basic256Sha256Policy, localCertificate,
1641
0
                                              decryptedPrivateKey, config->logging);
1642
0
    if(retval != UA_STATUSCODE_GOOD) {
1643
0
        UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1644
0
                       "Could not add SecurityPolicy#Basic256Sha256 with error code %s",
1645
0
                       UA_StatusCode_name(retval));
1646
0
        basic256Sha256Policy->clear(basic256Sha256Policy);
1647
0
        UA_free(basic256Sha256Policy);
1648
0
        basic256Sha256Policy = NULL;
1649
0
    } else {
1650
0
        retval = UA_ServerConfig_addSecurityPolicy_Filestore(config, basic256Sha256Policy, storePath);
1651
0
        if(retval != UA_STATUSCODE_GOOD) {
1652
0
            UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1653
0
                           "Could not add SecurityPolicy#Basic256Sha256 with error code %s",
1654
0
                           UA_StatusCode_name(retval));
1655
0
        }
1656
0
    }
1657
1658
    /* Aes256Sha256RsaPss */
1659
0
    UA_SecurityPolicy *aes256Sha256RsaPssPolicy =
1660
0
        (UA_SecurityPolicy*)UA_calloc(1, sizeof(UA_SecurityPolicy));
1661
0
    if(!aes256Sha256RsaPssPolicy) {
1662
0
        UA_ByteString_memZero(&decryptedPrivateKey);
1663
0
        UA_ByteString_clear(&decryptedPrivateKey);
1664
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
1665
0
    }
1666
0
    retval = UA_SecurityPolicy_Aes256Sha256RsaPss(aes256Sha256RsaPssPolicy, localCertificate,
1667
0
                                                  decryptedPrivateKey, config->logging);
1668
0
    if(retval != UA_STATUSCODE_GOOD) {
1669
0
        UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1670
0
                       "Could not add SecurityPolicy#Aes256Sha256RsaPss with error code %s",
1671
0
                       UA_StatusCode_name(retval));
1672
0
        aes256Sha256RsaPssPolicy->clear(aes256Sha256RsaPssPolicy);
1673
0
        UA_free(aes256Sha256RsaPssPolicy);
1674
0
        aes256Sha256RsaPssPolicy = NULL;
1675
0
    } else {
1676
0
        retval = UA_ServerConfig_addSecurityPolicy_Filestore(config, aes256Sha256RsaPssPolicy, storePath);
1677
0
        if(retval != UA_STATUSCODE_GOOD) {
1678
0
            UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1679
0
                           "Could not add SecurityPolicy#Aes256Sha256RsaPss with error code %s",
1680
0
                           UA_StatusCode_name(retval));
1681
0
        }
1682
0
    }
1683
1684
    /* Aes128Sha256RsaOaep */
1685
0
    UA_SecurityPolicy *aes128Sha256RsaOaepPolicy =
1686
0
        (UA_SecurityPolicy*)UA_calloc(1, sizeof(UA_SecurityPolicy));
1687
0
    if(!aes128Sha256RsaOaepPolicy) {
1688
0
        UA_ByteString_memZero(&decryptedPrivateKey);
1689
0
        UA_ByteString_clear(&decryptedPrivateKey);
1690
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
1691
0
    }
1692
0
    retval = UA_SecurityPolicy_Aes128Sha256RsaOaep(aes128Sha256RsaOaepPolicy, localCertificate,
1693
0
                                                   decryptedPrivateKey, config->logging);
1694
0
    if(retval != UA_STATUSCODE_GOOD) {
1695
0
        UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1696
0
                       "Could not add SecurityPolicy#Aes128Sha256RsaOaep with error code %s",
1697
0
                       UA_StatusCode_name(retval));
1698
0
        aes128Sha256RsaOaepPolicy->clear(aes128Sha256RsaOaepPolicy);
1699
0
        UA_free(aes128Sha256RsaOaepPolicy);
1700
0
        aes128Sha256RsaOaepPolicy = NULL;
1701
0
    } else {
1702
0
        retval = UA_ServerConfig_addSecurityPolicy_Filestore(config, aes128Sha256RsaOaepPolicy, storePath);
1703
0
        if(retval != UA_STATUSCODE_GOOD) {
1704
0
            UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1705
0
                           "Could not add SecurityPolicy#Aes128Sha256RsaOaep with error code %s",
1706
0
                           UA_StatusCode_name(retval));
1707
0
        }
1708
0
    }
1709
1710
0
    if(onlySecure) {
1711
0
        UA_ByteString_memZero(&decryptedPrivateKey);
1712
0
        UA_ByteString_clear(&decryptedPrivateKey);
1713
0
        return UA_STATUSCODE_GOOD;
1714
0
    }
1715
1716
    /* None */
1717
0
    UA_SecurityPolicy *nonePolicy =
1718
0
        (UA_SecurityPolicy*)UA_calloc(1, sizeof(UA_SecurityPolicy));
1719
0
    if(!nonePolicy) {
1720
0
        UA_ByteString_memZero(&decryptedPrivateKey);
1721
0
        UA_ByteString_clear(&decryptedPrivateKey);
1722
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
1723
0
    }
1724
0
    retval = UA_SecurityPolicy_None(nonePolicy, localCertificate, config->logging);
1725
0
    if(retval != UA_STATUSCODE_GOOD) {
1726
0
        UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1727
0
                       "Could not add SecurityPolicy#None with error code %s",
1728
0
                       UA_StatusCode_name(retval));
1729
0
        nonePolicy->clear(nonePolicy);
1730
0
        UA_free(nonePolicy);
1731
0
        nonePolicy = NULL;
1732
0
    } else {
1733
0
        retval = UA_ServerConfig_addSecurityPolicy_Filestore(config, nonePolicy, storePath);
1734
0
        if(retval != UA_STATUSCODE_GOOD) {
1735
0
            UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1736
0
                           "Could not add SecurityPolicy#None with error code %s",
1737
0
                           UA_StatusCode_name(retval));
1738
0
        }
1739
0
    }
1740
1741
    /* Basic128Rsa15 */
1742
0
    UA_SecurityPolicy *basic128Rsa15Policy =
1743
0
        (UA_SecurityPolicy*)UA_calloc(1, sizeof(UA_SecurityPolicy));
1744
0
    if(!basic128Rsa15Policy) {
1745
0
        UA_ByteString_memZero(&decryptedPrivateKey);
1746
0
        UA_ByteString_clear(&decryptedPrivateKey);
1747
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
1748
0
    }
1749
0
    retval = UA_SecurityPolicy_Basic128Rsa15(basic128Rsa15Policy, localCertificate,
1750
0
                                             decryptedPrivateKey, config->logging);
1751
0
    if(retval != UA_STATUSCODE_GOOD) {
1752
0
        UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1753
0
                       "Could not add SecurityPolicy#Basic128Rsa15 with error code %s",
1754
0
                       UA_StatusCode_name(retval));
1755
0
        basic128Rsa15Policy->clear(basic128Rsa15Policy);
1756
0
        UA_free(basic128Rsa15Policy);
1757
0
        basic128Rsa15Policy = NULL;
1758
0
    } else {
1759
0
        retval = UA_ServerConfig_addSecurityPolicy_Filestore(config, basic128Rsa15Policy, storePath);
1760
0
        if(retval != UA_STATUSCODE_GOOD) {
1761
0
            UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1762
0
                           "Could not add SecurityPolicy#Basic128Rsa15 with error code %s",
1763
0
                           UA_StatusCode_name(retval));
1764
0
        }
1765
0
    }
1766
1767
    /* Basic256 */
1768
0
    UA_SecurityPolicy *basic256Policy =
1769
0
        (UA_SecurityPolicy*)UA_calloc(1, sizeof(UA_SecurityPolicy));
1770
0
    if(!basic256Policy) {
1771
0
        UA_ByteString_memZero(&decryptedPrivateKey);
1772
0
        UA_ByteString_clear(&decryptedPrivateKey);
1773
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
1774
0
    }
1775
0
    retval = UA_SecurityPolicy_Basic256(basic256Policy, localCertificate,
1776
0
                                        decryptedPrivateKey, config->logging);
1777
0
    if(retval != UA_STATUSCODE_GOOD) {
1778
0
        UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1779
0
                       "Could not add SecurityPolicy#Basic256 with error code %s",
1780
0
                       UA_StatusCode_name(retval));
1781
0
        basic256Policy->clear(basic256Policy);
1782
0
        UA_free(basic256Policy);
1783
0
        basic256Policy = NULL;
1784
0
    } else {
1785
0
        retval = UA_ServerConfig_addSecurityPolicy_Filestore(config, basic256Policy, storePath);
1786
0
        if(retval != UA_STATUSCODE_GOOD) {
1787
0
            UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1788
0
                           "Could not add SecurityPolicy#Basic256 with error code %s",
1789
0
                           UA_StatusCode_name(retval));
1790
0
        }
1791
0
    }
1792
1793
#if defined(UA_ENABLE_ENCRYPTION_OPENSSL) || \
1794
    (defined(UA_ENABLE_ENCRYPTION_MBEDTLS) && MBEDTLS_VERSION_NUMBER >= 0x03000000)
1795
    /* EccNistP256 */
1796
    UA_SecurityPolicy *eccnistp256Policy =
1797
        (UA_SecurityPolicy*)UA_calloc(1, sizeof(UA_SecurityPolicy));
1798
    if(!eccnistp256Policy) {
1799
        UA_ByteString_memZero(&decryptedPrivateKey);
1800
        UA_ByteString_clear(&decryptedPrivateKey);
1801
        return UA_STATUSCODE_BADOUTOFMEMORY;
1802
    }
1803
    retval = UA_SecurityPolicy_EccNistP256(eccnistp256Policy, UA_APPLICATIONTYPE_SERVER,
1804
                                        localCertificate, decryptedPrivateKey,
1805
                                        config->logging);
1806
    if(retval != UA_STATUSCODE_GOOD) {
1807
        UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1808
                       "Could not add SecurityPolicy#ECC_nistP256 with error code %s",
1809
                       UA_StatusCode_name(retval));
1810
        eccnistp256Policy->clear(eccnistp256Policy);
1811
        UA_free(eccnistp256Policy);
1812
        eccnistp256Policy = NULL;
1813
    } else {
1814
        retval = UA_ServerConfig_addSecurityPolicy_Filestore(config, eccnistp256Policy, storePath);
1815
        if(retval != UA_STATUSCODE_GOOD) {
1816
            UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1817
                           "Could not add SecurityPolicy#ECC_nistP256 with error code %s",
1818
                           UA_StatusCode_name(retval));
1819
        }
1820
    }
1821
1822
    /* EccNistP384 */
1823
    UA_SecurityPolicy *eccnistp384Policy =
1824
        (UA_SecurityPolicy*)UA_calloc(1, sizeof(UA_SecurityPolicy));
1825
    if(!eccnistp384Policy) {
1826
        UA_ByteString_memZero(&decryptedPrivateKey);
1827
        UA_ByteString_clear(&decryptedPrivateKey);
1828
        return UA_STATUSCODE_BADOUTOFMEMORY;
1829
    }
1830
    retval = UA_SecurityPolicy_EccNistP384(eccnistp384Policy, UA_APPLICATIONTYPE_SERVER,
1831
                                        localCertificate, decryptedPrivateKey,
1832
                                        config->logging);
1833
    if(retval != UA_STATUSCODE_GOOD) {
1834
        UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1835
                       "Could not add SecurityPolicy#ECC_nistP384 with error code %s",
1836
                       UA_StatusCode_name(retval));
1837
        eccnistp384Policy->clear(eccnistp384Policy);
1838
        UA_free(eccnistp384Policy);
1839
        eccnistp384Policy = NULL;
1840
    } else {
1841
        retval = UA_ServerConfig_addSecurityPolicy_Filestore(config, eccnistp384Policy, storePath);
1842
        if(retval != UA_STATUSCODE_GOOD) {
1843
            UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1844
                           "Could not add SecurityPolicy#ECC_nistP384 with error code %s",
1845
                           UA_StatusCode_name(retval));
1846
        }
1847
    }
1848
1849
    /* EccBrainpoolP256r1 */
1850
    UA_SecurityPolicy *eccbrainpoolp256r1Policy =
1851
        (UA_SecurityPolicy*)UA_calloc(1, sizeof(UA_SecurityPolicy));
1852
    if(!eccbrainpoolp256r1Policy) {
1853
        UA_ByteString_memZero(&decryptedPrivateKey);
1854
        UA_ByteString_clear(&decryptedPrivateKey);
1855
        return UA_STATUSCODE_BADOUTOFMEMORY;
1856
    }
1857
    retval = UA_SecurityPolicy_EccBrainpoolP256r1(eccbrainpoolp256r1Policy, UA_APPLICATIONTYPE_SERVER,
1858
                                        localCertificate, decryptedPrivateKey,
1859
                                        config->logging);
1860
    if(retval != UA_STATUSCODE_GOOD) {
1861
        UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1862
                       "Could not add SecurityPolicy#ECC_brainpoolP256r1 with error code %s",
1863
                       UA_StatusCode_name(retval));
1864
        eccbrainpoolp256r1Policy->clear(eccbrainpoolp256r1Policy);
1865
        UA_free(eccbrainpoolp256r1Policy);
1866
        eccbrainpoolp256r1Policy = NULL;
1867
    } else {
1868
        retval = UA_ServerConfig_addSecurityPolicy_Filestore(config, eccbrainpoolp256r1Policy, storePath);
1869
        if(retval != UA_STATUSCODE_GOOD) {
1870
            UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1871
                           "Could not add SecurityPolicy#ECC_brainpoolP256r1 with error code %s",
1872
                           UA_StatusCode_name(retval));
1873
        }
1874
    }
1875
1876
    /* EccBrainpoolP384r1 */
1877
    UA_SecurityPolicy *eccbrainpoolp384r1Policy =
1878
        (UA_SecurityPolicy*)UA_calloc(1, sizeof(UA_SecurityPolicy));
1879
    if(!eccbrainpoolp384r1Policy) {
1880
        UA_ByteString_memZero(&decryptedPrivateKey);
1881
        UA_ByteString_clear(&decryptedPrivateKey);
1882
        return UA_STATUSCODE_BADOUTOFMEMORY;
1883
    }
1884
    retval = UA_SecurityPolicy_EccBrainpoolP384r1(eccbrainpoolp384r1Policy, UA_APPLICATIONTYPE_SERVER,
1885
                                        localCertificate, decryptedPrivateKey,
1886
                                        config->logging);
1887
    if(retval != UA_STATUSCODE_GOOD) {
1888
        UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1889
                       "Could not add SecurityPolicy#ECC_brainpoolP384r1 with error code %s",
1890
                       UA_StatusCode_name(retval));
1891
        eccbrainpoolp384r1Policy->clear(eccbrainpoolp384r1Policy);
1892
        UA_free(eccbrainpoolp384r1Policy);
1893
        eccbrainpoolp384r1Policy = NULL;
1894
    } else {
1895
        retval = UA_ServerConfig_addSecurityPolicy_Filestore(config, eccbrainpoolp384r1Policy, storePath);
1896
        if(retval != UA_STATUSCODE_GOOD) {
1897
            UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_APPLICATION,
1898
                           "Could not add SecurityPolicy#ECC_brainpoolP384r1 with error code %s",
1899
                           UA_StatusCode_name(retval));
1900
        }
1901
    }
1902
#endif
1903
1904
0
    UA_ByteString_memZero(&decryptedPrivateKey);
1905
0
    UA_ByteString_clear(&decryptedPrivateKey);
1906
0
    return UA_STATUSCODE_GOOD;
1907
0
}
1908
1909
UA_EXPORT UA_StatusCode
1910
UA_ServerConfig_setDefaultWithFilestore(UA_ServerConfig *conf,
1911
                                        UA_UInt16 portNumber,
1912
                                        const UA_ByteString *certificate,
1913
                                        const UA_ByteString *privateKey,
1914
0
                                        const UA_String storePath) {
1915
0
    UA_StatusCode retval = setDefaultConfig(conf, portNumber);
1916
0
    if(retval != UA_STATUSCODE_GOOD) {
1917
0
        return retval;
1918
0
    }
1919
1920
0
    if(!storePath.data) {
1921
0
        UA_LOG_ERROR(conf->logging, UA_LOGCATEGORY_APPLICATION,
1922
0
                     "The path to a PKI folder has not been specified");
1923
0
        return UA_STATUSCODE_BADINVALIDARGUMENT;
1924
0
    }
1925
1926
    /* Set up the parameters */
1927
0
    UA_KeyValuePair params[2];
1928
0
    size_t paramsSize = 2;
1929
1930
0
    params[0].key = UA_QUALIFIEDNAME(0, "max-trust-listsize");
1931
0
    UA_Variant_setScalar(&params[0].value, &conf->maxTrustListSize, &UA_TYPES[UA_TYPES_UINT32]);
1932
0
    params[1].key = UA_QUALIFIEDNAME(0, "max-rejected-listsize");
1933
0
    UA_Variant_setScalar(&params[1].value, &conf->maxRejectedListSize, &UA_TYPES[UA_TYPES_UINT32]);
1934
1935
0
    UA_KeyValueMap paramsMap;
1936
0
    paramsMap.map = params;
1937
0
    paramsMap.mapSize = paramsSize;
1938
1939
0
    UA_NodeId defaultApplicationGroup =
1940
0
            UA_NS0ID(SERVERCONFIGURATION_CERTIFICATEGROUPS_DEFAULTAPPLICATIONGROUP);
1941
0
    retval = UA_CertificateGroup_Filestore(&conf->secureChannelPKI, &defaultApplicationGroup,
1942
0
                                           storePath, conf->logging, &paramsMap);
1943
0
    if(retval != UA_STATUSCODE_GOOD)
1944
0
        return retval;
1945
1946
0
    UA_NodeId defaultUserTokenGroup =
1947
0
            UA_NS0ID(SERVERCONFIGURATION_CERTIFICATEGROUPS_DEFAULTUSERTOKENGROUP);
1948
0
    retval = UA_CertificateGroup_Filestore(&conf->sessionPKI, &defaultUserTokenGroup,
1949
0
                                           storePath, conf->logging, &paramsMap);
1950
0
    if(retval != UA_STATUSCODE_GOOD)
1951
0
        return retval;
1952
1953
0
    retval = UA_ServerConfig_addSecurityPolicies_Filestore(conf, certificate, privateKey, storePath);
1954
1955
0
    if(retval == UA_STATUSCODE_GOOD) {
1956
0
        retval = UA_AccessControl_default(conf, true, NULL, 0, NULL);
1957
0
    }
1958
1959
0
    if(retval == UA_STATUSCODE_GOOD) {
1960
0
        retval = UA_ServerConfig_addAllEndpoints(conf);
1961
0
    }
1962
1963
0
    return retval;
1964
0
}
1965
1966
#endif /* defined(__linux__) || defined(UA_ARCHITECTURE_WIN32) */
1967
1968
#endif /* UA_ENABLE_ENCRYPTION */
1969
1970
#if defined(UA_ENABLE_DISCOVERY) || defined(UA_ENABLE_AMALGAMATION)
1971
1972
/***************************/
1973
/* Default Client Settings */
1974
/***************************/
1975
1976
36
UA_Client * UA_Client_new(void) {
1977
36
    UA_ClientConfig config;
1978
36
    memset(&config, 0, sizeof(UA_ClientConfig));
1979
    /* Set up basic usable config including logger and event loop */
1980
36
    UA_StatusCode res = UA_ClientConfig_setDefault(&config);
1981
36
    if(res != UA_STATUSCODE_GOOD)
1982
0
        return NULL;
1983
36
    return UA_Client_newWithConfig(&config);
1984
36
}
1985
1986
#if defined(UA_ARCHITECTURE_POSIX) || defined(UA_ARCHITECTURE_WIN32) || defined(UA_ARCHITECTURE_ZEPHYR)
1987
1988
struct ClientInterruptContext {
1989
    UA_Client *client;
1990
    UA_Boolean running;
1991
};
1992
1993
static void
1994
interruptClient(UA_InterruptManager *im, uintptr_t interruptHandle,
1995
0
                void *context, const UA_KeyValueMap *parameters) {
1996
0
    struct ClientInterruptContext *ic = (struct ClientInterruptContext*)context;
1997
0
    UA_ClientConfig *config = UA_Client_getConfig(ic->client);
1998
0
    UA_LOG_INFO(config->logging, UA_LOGCATEGORY_APPLICATION, "Stopping the client");
1999
0
    ic->running = false;
2000
0
}
2001
2002
UA_StatusCode
2003
0
UA_Client_runUntilInterrupt(UA_Client *client) {
2004
0
    if(!client)
2005
0
        return UA_STATUSCODE_BADINTERNALERROR;
2006
0
    UA_ClientConfig *config = UA_Client_getConfig(client);
2007
0
    UA_EventLoop *el = config->eventLoop;
2008
0
    if(!el)
2009
0
        return UA_STATUSCODE_BADINTERNALERROR;
2010
2011
    /* Get the interrupt manager */
2012
0
    UA_EventSource *es = el->eventSources;
2013
0
    while(es) {
2014
0
        if(es->eventSourceType == UA_EVENTSOURCETYPE_INTERRUPTMANAGER)
2015
0
            break;
2016
0
        es = es->next;
2017
0
    }
2018
0
    if(!es) {
2019
0
        UA_LOG_ERROR(config->logging, UA_LOGCATEGORY_APPLICATION,
2020
0
                       "No Interrupt EventSource configured");
2021
0
        return UA_STATUSCODE_BADINTERNALERROR;
2022
0
    }
2023
0
    UA_InterruptManager *im = (UA_InterruptManager*)es;
2024
2025
    /* Register the interrupt */
2026
0
    struct ClientInterruptContext ic;
2027
0
    ic.client = client;
2028
0
    ic.running = true;
2029
0
    UA_StatusCode res =
2030
0
        im->registerInterrupt(im, SIGINT, &UA_KEYVALUEMAP_NULL,
2031
0
                              interruptClient, &ic);
2032
0
    if(res != UA_STATUSCODE_GOOD) {
2033
0
        UA_LOG_ERROR(config->logging, UA_LOGCATEGORY_APPLICATION,
2034
0
                     "Could not register the interrupt with status code %s",
2035
0
                     UA_StatusCode_name(res));
2036
0
        return res;
2037
0
    }
2038
2039
    /* Run the client */
2040
0
    while(ic.running) {
2041
0
        res = UA_Client_run_iterate(client, 100);
2042
0
        if(res != UA_STATUSCODE_GOOD)
2043
0
            break;
2044
0
    }
2045
2046
    /* Deregister the interrupt */
2047
0
    im->deregisterInterrupt(im, SIGINT);
2048
0
    return res;
2049
0
}
2050
2051
#endif /* defined(UA_ARCHITECTURE_POSIX) || defined(UA_ARCHITECTURE_WIN32) */
2052
2053
UA_StatusCode
2054
72
UA_ClientConfig_setDefault(UA_ClientConfig *config) {
2055
    /* The following fields are untouched and OK to leave as NULL or 0:
2056
     *  clientContext
2057
     *  userIdentityToken
2058
     *  securityMode
2059
     *  securityPolicyUri
2060
     *  endpoint
2061
     *  userTokenPolicy
2062
     *  customDataTypes
2063
     *  connectivityCheckInterval
2064
     *  stateCallback
2065
     *  inactivityCallback
2066
     *  outStandingPublishRequests
2067
     *  subscriptionInactivityCallback
2068
     *  sessionLocaleIds
2069
     *  sessionLocaleIdsSize */
2070
2071
72
    if(config->timeout == 0)
2072
36
        config->timeout = 5 * 1000; /* 5 seconds */
2073
72
    if(config->secureChannelLifeTime == 0)
2074
36
        config->secureChannelLifeTime = 10 * 60 * 1000; /* 10 minutes */
2075
2076
72
    if(config->logging == NULL)
2077
36
        config->logging = UA_Log_Stdout_new(UA_LOGLEVEL_INFO);
2078
2079
    /* EventLoop */
2080
72
    if(config->eventLoop == NULL) {
2081
#if defined(UA_ARCHITECTURE_ZEPHYR)
2082
        config->eventLoop = UA_EventLoop_new_Zephyr(config->logging);
2083
#elif defined(UA_ARCHITECTURE_LWIP)
2084
        config->eventLoop = UA_EventLoop_new_LWIP(config->logging, NULL);
2085
#else
2086
36
        config->eventLoop = UA_EventLoop_new_POSIX(config->logging);
2087
36
#endif
2088
36
        config->externalEventLoop = false;
2089
2090
        /* Add the TCP connection manager */
2091
#if defined(UA_ARCHITECTURE_ZEPHYR)
2092
        UA_ConnectionManager *tcpCM =
2093
            UA_ConnectionManager_new_Zephyr_TCP(UA_STRING("tcp connection manager"));
2094
#elif defined(UA_ARCHITECTURE_LWIP)
2095
        UA_ConnectionManager *tcpCM =
2096
            UA_ConnectionManager_new_LWIP_TCP(UA_STRING("tcp connection manager"));
2097
#else
2098
36
        UA_ConnectionManager *tcpCM =
2099
36
            UA_ConnectionManager_new_POSIX_TCP(UA_STRING("tcp connection manager"));
2100
36
#endif
2101
36
        config->eventLoop->registerEventSource(config->eventLoop, (UA_EventSource *)tcpCM);
2102
2103
#if defined(UA_ARCHITECTURE_LWIP)
2104
        UA_ConnectionManager *udpCM =
2105
            UA_ConnectionManager_new_LWIP_UDP(UA_STRING("udp connection manager"));
2106
        if(udpCM)
2107
            config->eventLoop->registerEventSource(config->eventLoop, (UA_EventSource *)udpCM);
2108
#elif !defined(UA_ARCHITECTURE_ZEPHYR)
2109
        /* Add the UDP connection manager */
2110
36
        UA_ConnectionManager *udpCM =
2111
36
            UA_ConnectionManager_new_POSIX_UDP(UA_STRING("udp connection manager"));
2112
36
        config->eventLoop->registerEventSource(config->eventLoop, (UA_EventSource *)udpCM);
2113
36
#endif
2114
2115
36
#if !defined(UA_ARCHITECTURE_ZEPHYR) && !defined(UA_ARCHITECTURE_LWIP)
2116
        /* Add the interrupt manager */
2117
36
        UA_InterruptManager *im = UA_InterruptManager_new_POSIX(UA_STRING("interrupt manager"));
2118
36
        if(im) {
2119
36
            config->eventLoop->registerEventSource(config->eventLoop, &im->eventSource);
2120
36
        } else {
2121
0
            UA_LOG_ERROR(config->logging, UA_LOGCATEGORY_APPLICATION,
2122
0
                         "Cannot create the Interrupt Manager (only relevant if used)");
2123
0
        }
2124
36
#endif
2125
36
    }
2126
2127
72
    if(config->localConnectionConfig.recvBufferSize == 0)
2128
36
        config->localConnectionConfig = UA_ConnectionConfig_default;
2129
2130
72
    if(!config->certificateVerification.logging) {
2131
36
        config->certificateVerification.logging = config->logging;
2132
36
    }
2133
2134
72
#ifdef UA_ENABLE_ENCRYPTION
2135
    /* Limits for TrustList */
2136
72
    config->maxTrustListSize = 0;
2137
72
    config->maxRejectedListSize = 0;
2138
72
#endif
2139
2140
72
    if(!config->certificateVerification.verifyCertificate) {
2141
        /* Certificate Verification that accepts every certificate. Can be
2142
         * overwritten when the policy is specialized. */
2143
36
        UA_CertificateGroup_AcceptAll(&config->certificateVerification);
2144
36
    }
2145
2146
    /* With encryption enabled, the applicationUri needs to match the URI from
2147
     * the certificate */
2148
72
    if(!config->clientDescription.applicationUri.data)
2149
36
        config->clientDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI);
2150
72
    if(config->clientDescription.applicationType == 0)
2151
36
        config->clientDescription.applicationType = UA_APPLICATIONTYPE_CLIENT;
2152
2153
72
    if(config->securityPoliciesSize == 0) {
2154
36
        config->securityPolicies = (UA_SecurityPolicy*)UA_malloc(sizeof(UA_SecurityPolicy));
2155
36
        if(!config->securityPolicies)
2156
0
            return UA_STATUSCODE_BADOUTOFMEMORY;
2157
36
        UA_StatusCode retval = UA_SecurityPolicy_None(config->securityPolicies,
2158
36
                                                      UA_BYTESTRING_NULL, config->logging);
2159
36
        if(retval != UA_STATUSCODE_GOOD) {
2160
0
            UA_free(config->securityPolicies);
2161
0
            config->securityPolicies = NULL;
2162
0
            return retval;
2163
0
        }
2164
36
        config->securityPoliciesSize = 1;
2165
36
    }
2166
2167
72
    if(config->requestedSessionTimeout == 0)
2168
36
        config->requestedSessionTimeout = 1200000;
2169
2170
72
#ifdef UA_ENABLE_SUBSCRIPTIONS
2171
72
    if(config->outStandingPublishRequests == 0)
2172
36
        config->outStandingPublishRequests = 10;
2173
72
#endif
2174
2175
72
    return UA_STATUSCODE_GOOD;
2176
72
}
2177
2178
#ifdef UA_ENABLE_ENCRYPTION
2179
2180
static UA_StatusCode
2181
clientConfig_setAuthenticationSecurityPolicies(UA_ClientConfig *config,
2182
                                               UA_ByteString certificateAuth,
2183
0
                                               UA_ByteString privateKeyAuth) {
2184
0
    for(size_t i = 0; i < config->authSecurityPoliciesSize; i++) {
2185
0
        config->authSecurityPolicies[i].clear(&config->authSecurityPolicies[i]);
2186
0
    }
2187
2188
0
    UA_SecurityPolicy *sp = (UA_SecurityPolicy*)
2189
0
        UA_realloc(config->authSecurityPolicies, sizeof(UA_SecurityPolicy) * SECURITY_POLICY_SIZE);
2190
0
    if(!sp)
2191
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
2192
0
    config->authSecurityPolicies = sp;
2193
0
    config->authSecurityPoliciesSize = 0;
2194
2195
0
    addAllSecurityPolicies(sp, &config->authSecurityPoliciesSize,
2196
0
                           certificateAuth, privateKeyAuth, false,
2197
0
                           UA_APPLICATIONTYPE_CLIENT, config->logging);
2198
2199
0
    if(config->authSecurityPoliciesSize == 0) {
2200
0
        UA_free(config->authSecurityPolicies);
2201
0
        config->authSecurityPolicies = NULL;
2202
0
    }
2203
2204
0
    return UA_STATUSCODE_GOOD;
2205
0
}
2206
2207
static UA_StatusCode
2208
clientConfig_setSecurityPolicies(UA_ClientConfig *config,
2209
                                 UA_ByteString certificateAuth,
2210
0
                                 UA_ByteString privateKeyAuth) {
2211
0
    for(size_t i = 0; i < config->securityPoliciesSize; i++) {
2212
0
        config->securityPolicies[i].clear(&config->securityPolicies[i]);
2213
0
    }
2214
2215
0
    UA_SecurityPolicy *sp = (UA_SecurityPolicy*)
2216
0
        UA_realloc(config->securityPolicies,
2217
0
                   sizeof(UA_SecurityPolicy) * SECURITY_POLICY_SIZE);
2218
0
    if(!sp)
2219
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
2220
0
    config->securityPolicies = sp;
2221
0
    config->securityPoliciesSize = 0;
2222
2223
0
    addAllSecurityPolicies(sp, &config->securityPoliciesSize,
2224
0
                           certificateAuth, privateKeyAuth, false,
2225
0
                           UA_APPLICATIONTYPE_CLIENT, config->logging);
2226
2227
0
    if(config->securityPoliciesSize == 0) {
2228
0
        UA_free(config->securityPolicies);
2229
0
        config->securityPolicies = NULL;
2230
0
    }
2231
2232
0
    return UA_STATUSCODE_GOOD;
2233
0
}
2234
2235
UA_StatusCode
2236
UA_ClientConfig_setDefaultEncryption(UA_ClientConfig *config,
2237
                                     UA_ByteString localCertificate, UA_ByteString privateKey,
2238
                                     const UA_ByteString *trustList, size_t trustListSize,
2239
0
                                     const UA_ByteString *revocationList, size_t revocationListSize) {
2240
0
    UA_StatusCode retval = UA_ClientConfig_setDefault(config);
2241
0
    if(retval != UA_STATUSCODE_GOOD)
2242
0
        return retval;
2243
2244
0
    if(trustListSize > 0) {
2245
0
        UA_TrustListDataType list;
2246
0
        UA_TrustListDataType_init(&list);
2247
0
        list.specifiedLists |= UA_TRUSTLISTMASKS_TRUSTEDCERTIFICATES;
2248
0
        retval = UA_Array_copy(trustList, trustListSize,
2249
0
                               (void**)&list.trustedCertificates,
2250
0
                               &UA_TYPES[UA_TYPES_BYTESTRING]);
2251
0
        if(retval != UA_STATUSCODE_GOOD)
2252
0
            return retval;
2253
0
        list.trustedCertificatesSize = trustListSize;
2254
2255
0
        if(revocationListSize > 0) {
2256
0
            list.specifiedLists |= UA_TRUSTLISTMASKS_TRUSTEDCRLS;
2257
0
            retval = UA_Array_copy(revocationList, revocationListSize,
2258
0
                                   (void**)&list.trustedCrls,
2259
0
                                   &UA_TYPES[UA_TYPES_BYTESTRING]);
2260
0
            if(retval != UA_STATUSCODE_GOOD) {
2261
0
                UA_TrustListDataType_clear(&list);
2262
0
                return retval;
2263
0
            }
2264
0
            list.trustedCrlsSize = revocationListSize;
2265
0
        }
2266
2267
        /* Set up the parameters */
2268
0
        UA_KeyValuePair params[2];
2269
0
        size_t paramsSize = 2;
2270
2271
0
        params[0].key = UA_QUALIFIEDNAME(0, "max-trust-listsize");
2272
0
        UA_Variant_setScalar(&params[0].value, &config->maxTrustListSize,
2273
0
                             &UA_TYPES[UA_TYPES_UINT32]);
2274
0
        params[1].key = UA_QUALIFIEDNAME(0, "max-rejected-listsize");
2275
0
        UA_Variant_setScalar(&params[1].value, &config->maxRejectedListSize,
2276
0
                             &UA_TYPES[UA_TYPES_UINT32]);
2277
2278
0
        UA_KeyValueMap paramsMap;
2279
0
        paramsMap.map = params;
2280
0
        paramsMap.mapSize = paramsSize;
2281
2282
0
        if(config->certificateVerification.clear)
2283
0
            config->certificateVerification.clear(&config->certificateVerification);
2284
0
        UA_NodeId defaultApplicationGroup =
2285
0
            UA_NS0ID(SERVERCONFIGURATION_CERTIFICATEGROUPS_DEFAULTAPPLICATIONGROUP);
2286
0
        retval = UA_CertificateGroup_Memorystore(&config->certificateVerification,
2287
0
                                                 &defaultApplicationGroup, &list,
2288
0
                                                 config->logging, &paramsMap);
2289
0
        UA_TrustListDataType_clear(&list);
2290
0
        if(retval != UA_STATUSCODE_GOOD)
2291
0
            return retval;
2292
0
    } else {
2293
0
        UA_LOG_WARNING(config->logging, UA_LOGCATEGORY_SECURITYPOLICY,
2294
0
                       "Empty trustlist passed. Leaving the previously "
2295
0
                       "configured certificate verification in place");
2296
0
    }
2297
2298
    /* Load the private key and convert to the DER format. Use an empty password
2299
     * on the first try -- maybe the key does not require a password. */
2300
0
    UA_ByteString decryptedPrivateKey = UA_BYTESTRING_NULL;
2301
0
    UA_ByteString keyPassword = UA_BYTESTRING_NULL;
2302
0
    UA_StatusCode keySuccess = UA_STATUSCODE_GOOD;
2303
2304
0
    if(privateKey.length > 0)
2305
0
        keySuccess = UA_CertificateUtils_decryptPrivateKey(privateKey, keyPassword,
2306
0
                                                           &decryptedPrivateKey);
2307
2308
    /* Get the password and decrypt. An application might want to loop / retry
2309
     * here to allow users to correct their entry. */
2310
0
    if(keySuccess != UA_STATUSCODE_GOOD) {
2311
0
        if(config->privateKeyPasswordCallback)
2312
0
            keySuccess = config->privateKeyPasswordCallback(config, &keyPassword);
2313
0
        else
2314
0
            keySuccess = readPrivateKeyPassword(&keyPassword);
2315
0
        if(keySuccess != UA_STATUSCODE_GOOD)
2316
0
            return keySuccess;
2317
0
        keySuccess = UA_CertificateUtils_decryptPrivateKey(privateKey, keyPassword, &decryptedPrivateKey);
2318
0
        UA_ByteString_memZero(&keyPassword);
2319
0
        UA_ByteString_clear(&keyPassword);
2320
0
    }
2321
0
    if(keySuccess != UA_STATUSCODE_GOOD)
2322
0
        return keySuccess;
2323
2324
0
    clientConfig_setSecurityPolicies(config, localCertificate, decryptedPrivateKey);
2325
0
    clientConfig_setAuthenticationSecurityPolicies(config, localCertificate, decryptedPrivateKey);
2326
2327
0
    UA_ByteString_memZero(&decryptedPrivateKey);
2328
0
    UA_ByteString_clear(&decryptedPrivateKey);
2329
2330
0
    return UA_STATUSCODE_GOOD;
2331
0
}
2332
#endif
2333
2334
#if defined(UA_ENABLE_ENCRYPTION_OPENSSL) || defined(UA_ENABLE_ENCRYPTION_MBEDTLS)
2335
UA_StatusCode
2336
UA_ClientConfig_setAuthenticationCert(UA_ClientConfig *config,
2337
                                      UA_ByteString certificateAuth,
2338
0
                                      UA_ByteString privateKeyAuth) {
2339
#ifdef UA_ENABLE_ENCRYPTION_LIBRESSL
2340
    UA_LOG_ERROR(config->logging, UA_LOGCATEGORY_APPLICATION,
2341
                 "Certificate authentication with LibreSSL as crypto backend is not supported.");
2342
    return UA_STATUSCODE_BADNOTIMPLEMENTED;
2343
#endif
2344
2345
    /* Create UserIdentityToken */
2346
0
    UA_X509IdentityToken* identityToken = UA_X509IdentityToken_new();
2347
0
    if(!identityToken)
2348
0
        return UA_STATUSCODE_BADOUTOFMEMORY;
2349
    /* Don't set identityToken->policyId. This is taken from the appropriate
2350
     * endpoint at runtime. */
2351
0
    UA_StatusCode retval = UA_ByteString_copy(&certificateAuth, &identityToken->certificateData);
2352
0
    if(retval != UA_STATUSCODE_GOOD)
2353
0
        return retval;
2354
0
    UA_ExtensionObject_clear(&config->userIdentityToken);
2355
0
    config->userIdentityToken.encoding = UA_EXTENSIONOBJECT_DECODED;
2356
0
    config->userIdentityToken.content.decoded.type = &UA_TYPES[UA_TYPES_X509IDENTITYTOKEN];
2357
0
    config->userIdentityToken.content.decoded.data = identityToken;
2358
2359
    /* Populate SecurityPolicies */
2360
0
    return clientConfig_setAuthenticationSecurityPolicies(config, certificateAuth, privateKeyAuth);
2361
0
}
2362
#endif
2363
2364
#endif /* UA_ENABLE_DISCOVERY OR UA_ENABLE_AMALGAMATION*/