You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
247 lines
7.7 KiB
C
247 lines
7.7 KiB
C
/*
|
|
* tls_server_example.c
|
|
*
|
|
* How to configure a TLS server
|
|
*/
|
|
|
|
#include "iec61850_server.h"
|
|
#include "hal_thread.h"
|
|
#include <signal.h>
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <math.h>
|
|
|
|
#include "static_model.h"
|
|
|
|
static int running = 0;
|
|
static IedServer iedServer = NULL;
|
|
|
|
void
|
|
sigint_handler(int signalId)
|
|
{
|
|
running = 0;
|
|
}
|
|
|
|
static ControlHandlerResult
|
|
controlHandlerForBinaryOutput(ControlAction action, void* parameter, MmsValue* value, bool test)
|
|
{
|
|
if (test)
|
|
return CONTROL_RESULT_FAILED;
|
|
|
|
if (MmsValue_getType(value) == MMS_BOOLEAN) {
|
|
printf("received binary control command: ");
|
|
|
|
if (MmsValue_getBoolean(value))
|
|
printf("on\n");
|
|
else
|
|
printf("off\n");
|
|
}
|
|
else
|
|
return CONTROL_RESULT_FAILED;
|
|
|
|
uint64_t timeStamp = Hal_getTimeInMs();
|
|
|
|
if (parameter == IEDMODEL_GenericIO_GGIO1_SPCSO1) {
|
|
IedServer_updateUTCTimeAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO1_t, timeStamp);
|
|
IedServer_updateAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO1_stVal, value);
|
|
}
|
|
|
|
if (parameter == IEDMODEL_GenericIO_GGIO1_SPCSO2) {
|
|
IedServer_updateUTCTimeAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO2_t, timeStamp);
|
|
IedServer_updateAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO2_stVal, value);
|
|
}
|
|
|
|
if (parameter == IEDMODEL_GenericIO_GGIO1_SPCSO3) {
|
|
IedServer_updateUTCTimeAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO3_t, timeStamp);
|
|
IedServer_updateAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO3_stVal, value);
|
|
}
|
|
|
|
if (parameter == IEDMODEL_GenericIO_GGIO1_SPCSO4) {
|
|
IedServer_updateUTCTimeAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO4_t, timeStamp);
|
|
IedServer_updateAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO4_stVal, value);
|
|
}
|
|
|
|
return CONTROL_RESULT_OK;
|
|
}
|
|
|
|
|
|
static void
|
|
connectionHandler (IedServer self, ClientConnection connection, bool connected, void* parameter)
|
|
{
|
|
if (connected)
|
|
printf("Connection opened\n");
|
|
else
|
|
printf("Connection closed\n");
|
|
}
|
|
|
|
static void
|
|
printAppTitle(ItuObjectIdentifier* oid)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < oid->arcCount; i++) {
|
|
printf("%i", oid->arc[i]);
|
|
|
|
if (i != (oid->arcCount - 1))
|
|
printf(".");
|
|
}
|
|
}
|
|
|
|
static bool
|
|
clientAuthenticator(void* parameter, AcseAuthenticationParameter authParameter, void** securityToken, IsoApplicationReference* appRef)
|
|
{
|
|
printf("ACSE Authenticator:\n");
|
|
printf(" client ap-title: "); printAppTitle(&(appRef->apTitle)); printf("\n");
|
|
printf(" client ae-qualifier: %i\n", appRef->aeQualifier);
|
|
printf(" auth-mechanism: %i\n", authParameter->mechanism);
|
|
|
|
if (authParameter->mechanism == ACSE_AUTH_TLS) {
|
|
printf(" Has certificate with size: %i\n", authParameter->value.certificate.length);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static void
|
|
securityEventHandler(void* parameter, TLSEventLevel eventLevel, int eventCode, const char* msg, TLSConnection con)
|
|
{
|
|
(void)parameter;
|
|
|
|
char* peerAddr = TLSConnection_getPeerAddress(con, NULL);
|
|
|
|
const char* tlsVersionStr = TLSConfigVersion_toString(TLSConnection_getTLSVersion(con));
|
|
|
|
printf("[SECURITY EVENT - %s] %s (%s)(t: %i, c: %i)\n", tlsVersionStr, msg, peerAddr, eventLevel, eventCode);
|
|
|
|
free(peerAddr);
|
|
}
|
|
|
|
int
|
|
main(int argc, char** argv)
|
|
{
|
|
printf("Using libIEC61850 version %s\n", LibIEC61850_getVersionString());
|
|
|
|
TLSConfiguration tlsConfig = TLSConfiguration_create();
|
|
|
|
TLSConfiguration_setChainValidation(tlsConfig, false);
|
|
TLSConfiguration_setAllowOnlyKnownCertificates(tlsConfig, true);
|
|
|
|
TLSConfiguration_setEventHandler(tlsConfig, securityEventHandler, NULL);
|
|
|
|
if (!TLSConfiguration_setOwnKeyFromFile(tlsConfig, "server_CA1_1.key", NULL)) {
|
|
printf("Failed to load private key!\n");
|
|
return 0;
|
|
}
|
|
|
|
if (!TLSConfiguration_setOwnCertificateFromFile(tlsConfig, "server_CA1_1.pem")) {
|
|
printf("ERROR: Failed to load own certificate!\n");
|
|
return 0;
|
|
}
|
|
|
|
if (!TLSConfiguration_addCACertificateFromFile(tlsConfig, "root_CA1.pem")) {
|
|
printf("ERROR: Failed to load root certificate\n");
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Configure two allowed clients
|
|
*/
|
|
|
|
if (!TLSConfiguration_addAllowedCertificateFromFile(tlsConfig, "client_CA1_1.pem")) {
|
|
printf("ERROR: Failed to load allowed client certificate\n");
|
|
return 0;
|
|
}
|
|
|
|
if (!TLSConfiguration_addAllowedCertificateFromFile(tlsConfig, "client_CA1_2.pem")) {
|
|
printf("ERROR: Failed to load allowed client certificate\n");
|
|
return 0;
|
|
}
|
|
|
|
iedServer = IedServer_createWithTlsSupport(&iedModel, tlsConfig);
|
|
|
|
IedServer_setAuthenticator(iedServer, clientAuthenticator, NULL);
|
|
|
|
/* Install handler for operate command */
|
|
IedServer_setControlHandler(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO1,
|
|
(ControlHandler) controlHandlerForBinaryOutput,
|
|
IEDMODEL_GenericIO_GGIO1_SPCSO1);
|
|
|
|
IedServer_setControlHandler(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO2,
|
|
(ControlHandler) controlHandlerForBinaryOutput,
|
|
IEDMODEL_GenericIO_GGIO1_SPCSO2);
|
|
|
|
IedServer_setControlHandler(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO3,
|
|
(ControlHandler) controlHandlerForBinaryOutput,
|
|
IEDMODEL_GenericIO_GGIO1_SPCSO3);
|
|
|
|
IedServer_setControlHandler(iedServer, IEDMODEL_GenericIO_GGIO1_SPCSO4,
|
|
(ControlHandler) controlHandlerForBinaryOutput,
|
|
IEDMODEL_GenericIO_GGIO1_SPCSO4);
|
|
|
|
IedServer_setConnectionIndicationHandler(iedServer, (IedConnectionIndicationHandler) connectionHandler, NULL);
|
|
|
|
/* MMS server will be instructed to start listening to client connections. */
|
|
IedServer_start(iedServer, -1);
|
|
|
|
if (!IedServer_isRunning(iedServer)) {
|
|
printf("Starting server failed! Exit.\n");
|
|
IedServer_destroy(iedServer);
|
|
exit(-1);
|
|
}
|
|
|
|
running = 1;
|
|
|
|
signal(SIGINT, sigint_handler);
|
|
|
|
float t = 0.f;
|
|
|
|
while (running) {
|
|
uint64_t timestamp = Hal_getTimeInMs();
|
|
|
|
t += 0.1f;
|
|
|
|
float an1 = sinf(t);
|
|
float an2 = sinf(t + 1.f);
|
|
float an3 = sinf(t + 2.f);
|
|
float an4 = sinf(t + 3.f);
|
|
|
|
IedServer_lockDataModel(iedServer);
|
|
|
|
Timestamp iecTimestamp;
|
|
|
|
Timestamp_clearFlags(&iecTimestamp);
|
|
Timestamp_setTimeInMilliseconds(&iecTimestamp, timestamp);
|
|
Timestamp_setLeapSecondKnown(&iecTimestamp, true);
|
|
|
|
/* toggle clock-not-synchronized flag in timestamp */
|
|
if (((int) t % 2) == 0)
|
|
Timestamp_setClockNotSynchronized(&iecTimestamp, true);
|
|
|
|
IedServer_updateTimestampAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_AnIn1_t, &iecTimestamp);
|
|
IedServer_updateFloatAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_AnIn1_mag_f, an1);
|
|
|
|
IedServer_updateTimestampAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_AnIn2_t, &iecTimestamp);
|
|
IedServer_updateFloatAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_AnIn2_mag_f, an2);
|
|
|
|
IedServer_updateTimestampAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_AnIn3_t, &iecTimestamp);
|
|
IedServer_updateFloatAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_AnIn3_mag_f, an3);
|
|
|
|
IedServer_updateTimestampAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_AnIn4_t, &iecTimestamp);
|
|
IedServer_updateFloatAttributeValue(iedServer, IEDMODEL_GenericIO_GGIO1_AnIn4_mag_f, an4);
|
|
|
|
IedServer_unlockDataModel(iedServer);
|
|
|
|
Thread_sleep(100);
|
|
}
|
|
|
|
/* stop MMS server - close TCP server socket and all client sockets */
|
|
IedServer_stop(iedServer);
|
|
|
|
/* Cleanup - free all resources */
|
|
IedServer_destroy(iedServer);
|
|
|
|
TLSConfiguration_destroy(tlsConfig);
|
|
|
|
return 0;
|
|
} /* main() */
|