mirror of
https://github.com/stargieg/bacnet-stack
synced 2025-10-26 23:35:52 +08:00
213 lines
7.1 KiB
C
213 lines
7.1 KiB
C
/**************************************************************************
|
|
*
|
|
* Copyright (C) 2006 Steve Karg <skarg@users.sourceforge.net>
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
* a copy of this software and associated documentation files (the
|
|
* "Software"), to deal in the Software without restriction, including
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
* the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included
|
|
* in all copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
|
* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
|
* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
|
* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
|
* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
*
|
|
*********************************************************************/
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include "config.h"
|
|
#include "txbuf.h"
|
|
#include "bacdef.h"
|
|
#include "bacdcode.h"
|
|
#include "bacerror.h"
|
|
#include "apdu.h"
|
|
#include "npdu.h"
|
|
#include "abort.h"
|
|
#include "reject.h"
|
|
#include "dcc.h"
|
|
#include "handlers.h"
|
|
#include "device.h"
|
|
|
|
/** @file h_dcc.c Handles Device Communication Control request. */
|
|
|
|
static char My_Password[32] = "filister";
|
|
|
|
/** Sets (non-volatile hold) the password to be used for DCC requests.
|
|
* @param new_password [in] The new DCC password, of up to 31 characters.
|
|
*/
|
|
void handler_dcc_password_set(
|
|
char *new_password)
|
|
{
|
|
size_t i = 0; /* loop counter */
|
|
|
|
if (new_password) {
|
|
for (i = 0; i < (sizeof(My_Password) - 1); i++) {
|
|
My_Password[i] = new_password[i];
|
|
My_Password[i + 1] = 0;
|
|
if (new_password[i] == 0) {
|
|
break;
|
|
}
|
|
}
|
|
} else {
|
|
for (i = 0; i < sizeof(My_Password); i++) {
|
|
My_Password[i] = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
/** Gets (non-volatile hold) the password to be used for DCC requests.
|
|
* @return DCC password
|
|
*/
|
|
char *handler_dcc_password(void)
|
|
{
|
|
return My_Password;
|
|
}
|
|
|
|
/** Handler for a Device Communication Control (DCC) request.
|
|
* @ingroup DMDCC
|
|
* This handler will be invoked by apdu_handler() if it has been enabled
|
|
* by a call to apdu_set_confirmed_handler().
|
|
* This handler builds a response packet, which is
|
|
* - an Abort if
|
|
* - the message is segmented
|
|
* - if decoding fails
|
|
* - if not a known DCC state
|
|
* - an Error if the DCC password is incorrect
|
|
* - else tries to send a simple ACK for the DCC on success,
|
|
* and sets the DCC state requested.
|
|
*
|
|
* @param service_request [in] The contents of the service request.
|
|
* @param service_len [in] The length of the service_request.
|
|
* @param src [in] BACNET_ADDRESS of the source of the message
|
|
* @param service_data [in] The BACNET_CONFIRMED_SERVICE_DATA information
|
|
* decoded from the APDU header of this message.
|
|
*/
|
|
void handler_device_communication_control(
|
|
uint8_t * service_request,
|
|
uint16_t service_len,
|
|
BACNET_ADDRESS * src,
|
|
BACNET_CONFIRMED_SERVICE_DATA * service_data)
|
|
{
|
|
uint16_t timeDuration = 0;
|
|
BACNET_COMMUNICATION_ENABLE_DISABLE state = COMMUNICATION_ENABLE;
|
|
BACNET_CHARACTER_STRING password;
|
|
int len = 0;
|
|
int pdu_len = 0;
|
|
BACNET_NPDU_DATA npdu_data;
|
|
BACNET_ADDRESS my_address;
|
|
|
|
/* encode the NPDU portion of the reply packet */
|
|
datalink_get_my_address(&my_address);
|
|
npdu_encode_npdu_data(&npdu_data, false, MESSAGE_PRIORITY_NORMAL);
|
|
pdu_len =
|
|
npdu_encode_pdu(&Handler_Transmit_Buffer[0], src, &my_address,
|
|
&npdu_data);
|
|
#if PRINT_ENABLED
|
|
fprintf(stderr, "DeviceCommunicationControl!\n");
|
|
#endif
|
|
if (service_data->segmented_message) {
|
|
len =
|
|
abort_encode_apdu(&Handler_Transmit_Buffer[pdu_len],
|
|
service_data->invoke_id, ABORT_REASON_SEGMENTATION_NOT_SUPPORTED,
|
|
true);
|
|
#if PRINT_ENABLED
|
|
fprintf(stderr,
|
|
"DeviceCommunicationControl: "
|
|
"Sending Abort - segmented message.\n");
|
|
#endif
|
|
goto DCC_ABORT;
|
|
}
|
|
/* decode the service request only */
|
|
len =
|
|
dcc_decode_service_request(service_request, service_len, &timeDuration,
|
|
&state, &password);
|
|
#if PRINT_ENABLED
|
|
if (len > 0)
|
|
fprintf(stderr,
|
|
"DeviceCommunicationControl: " "timeout=%u state=%u password=%s\n",
|
|
(unsigned) timeDuration, (unsigned) state,
|
|
characterstring_value(&password));
|
|
#endif
|
|
/* bad decoding or something we didn't understand - send an abort */
|
|
if (len < 0) {
|
|
len =
|
|
abort_encode_apdu(&Handler_Transmit_Buffer[pdu_len],
|
|
service_data->invoke_id, ABORT_REASON_OTHER, true);
|
|
#if PRINT_ENABLED
|
|
fprintf(stderr,
|
|
"DeviceCommunicationControl: "
|
|
"Sending Abort - could not decode.\n");
|
|
#endif
|
|
goto DCC_ABORT;
|
|
}
|
|
if (state >= MAX_BACNET_COMMUNICATION_ENABLE_DISABLE) {
|
|
len =
|
|
reject_encode_apdu(&Handler_Transmit_Buffer[pdu_len],
|
|
service_data->invoke_id, REJECT_REASON_UNDEFINED_ENUMERATION);
|
|
#if PRINT_ENABLED
|
|
fprintf(stderr,
|
|
"DeviceCommunicationControl: "
|
|
"Sending Reject - undefined enumeration\n");
|
|
#endif
|
|
} else {
|
|
#if BAC_ROUTING
|
|
/* Check to see if the current Device supports this service. */
|
|
len =
|
|
Routed_Device_Service_Approval
|
|
(SERVICE_CONFIRMED_DEVICE_COMMUNICATION_CONTROL, (int) state,
|
|
&Handler_Transmit_Buffer[pdu_len], service_data->invoke_id);
|
|
if (len > 0)
|
|
goto DCC_ABORT;
|
|
#endif
|
|
|
|
if (characterstring_ansi_same(&password, My_Password)) {
|
|
len =
|
|
encode_simple_ack(&Handler_Transmit_Buffer[pdu_len],
|
|
service_data->invoke_id,
|
|
SERVICE_CONFIRMED_DEVICE_COMMUNICATION_CONTROL);
|
|
#if PRINT_ENABLED
|
|
fprintf(stderr,
|
|
"DeviceCommunicationControl: " "Sending Simple Ack!\n");
|
|
#endif
|
|
dcc_set_status_duration(state, timeDuration);
|
|
} else {
|
|
len =
|
|
bacerror_encode_apdu(&Handler_Transmit_Buffer[pdu_len],
|
|
service_data->invoke_id,
|
|
SERVICE_CONFIRMED_DEVICE_COMMUNICATION_CONTROL,
|
|
ERROR_CLASS_SECURITY, ERROR_CODE_PASSWORD_FAILURE);
|
|
#if PRINT_ENABLED
|
|
fprintf(stderr,
|
|
"DeviceCommunicationControl: "
|
|
"Sending Error - password failure.\n");
|
|
#endif
|
|
}
|
|
}
|
|
DCC_ABORT:
|
|
pdu_len += len;
|
|
len =
|
|
datalink_send_pdu(src, &npdu_data, &Handler_Transmit_Buffer[0],
|
|
pdu_len);
|
|
if (len <= 0) {
|
|
#if PRINT_ENABLED
|
|
fprintf(stderr,
|
|
"DeviceCommunicationControl: " "Failed to send PDU (%s)!\n",
|
|
strerror(errno));
|
|
#endif
|
|
}
|
|
|
|
return;
|
|
}
|