mirror of
https://github.com/open62541/open62541.git
synced 2025-06-03 04:00:21 +00:00
83 lines
2.8 KiB
C
83 lines
2.8 KiB
C
/* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
|
|
* See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
|
|
*
|
|
* Copyright 2020 (c) Julius Pfrommer, Fraunhofer IOSB
|
|
* Copyright 2024 (c) Fraunhofer IOSB (Author: Noel Graf)
|
|
*/
|
|
|
|
#include <open62541/plugin/certificategroup_default.h>
|
|
|
|
static UA_StatusCode
|
|
verifyCertificateAllowAll(UA_CertificateGroup *certGroup,
|
|
const UA_ByteString *certificate) {
|
|
UA_LOG_WARNING(certGroup->logging, UA_LOGCATEGORY_USERLAND,
|
|
"No certificate store configured. Accepting the certificate.");
|
|
return UA_STATUSCODE_GOOD;
|
|
}
|
|
|
|
static void
|
|
clearVerifyAllowAll(UA_CertificateGroup *certGroup) {
|
|
|
|
}
|
|
|
|
void UA_CertificateGroup_AcceptAll(UA_CertificateGroup *certGroup) {
|
|
/* Clear the structure, as it may have already been initialized. */
|
|
UA_NodeId groupId = certGroup->certificateGroupId;
|
|
if(certGroup->clear)
|
|
certGroup->clear(certGroup);
|
|
UA_NodeId_copy(&groupId, &certGroup->certificateGroupId);
|
|
certGroup->verifyCertificate = verifyCertificateAllowAll;
|
|
certGroup->clear = clearVerifyAllowAll;
|
|
certGroup->getTrustList = NULL;
|
|
certGroup->setTrustList = NULL;
|
|
certGroup->addToTrustList = NULL;
|
|
certGroup->removeFromTrustList = NULL;
|
|
certGroup->getRejectedList = NULL;
|
|
certGroup->getCertificateCrls = NULL;
|
|
}
|
|
|
|
#ifndef UA_ENABLE_ENCRYPTION
|
|
UA_StatusCode
|
|
UA_CertificateUtils_verifyApplicationURI(UA_RuleHandling ruleHandling,
|
|
const UA_ByteString *certificate,
|
|
const UA_String *applicationURI,
|
|
UA_Logger *logger) {
|
|
return UA_STATUSCODE_GOOD;
|
|
}
|
|
|
|
UA_StatusCode
|
|
UA_CertificateUtils_getExpirationDate(UA_ByteString *certificate,
|
|
UA_DateTime *expiryDateTime){
|
|
return UA_STATUSCODE_BADNOTSUPPORTED;
|
|
}
|
|
|
|
UA_StatusCode
|
|
UA_CertificateUtils_getSubjectName(UA_ByteString *certificate,
|
|
UA_String *subjectName){
|
|
return UA_STATUSCODE_BADNOTSUPPORTED;
|
|
}
|
|
|
|
UA_StatusCode
|
|
UA_CertificateUtils_getThumbprint(UA_ByteString *certificate,
|
|
UA_String *thumbprint){
|
|
return UA_STATUSCODE_BADNOTSUPPORTED;
|
|
}
|
|
|
|
UA_StatusCode
|
|
UA_CertificateUtils_comparePublicKeys(const UA_ByteString *certificate1,
|
|
const UA_ByteString *certificate2) {
|
|
return UA_STATUSCODE_BADNOTSUPPORTED;
|
|
}
|
|
|
|
UA_StatusCode
|
|
UA_CertificateUtils_checkKeyPair(const UA_ByteString *certificate,
|
|
const UA_ByteString *privateKey) {
|
|
return UA_STATUSCODE_BADNOTSUPPORTED;
|
|
}
|
|
|
|
UA_StatusCode
|
|
UA_CertificateUtils_checkCA(const UA_ByteString *certificate) {
|
|
return UA_STATUSCODE_BADNOTSUPPORTED;
|
|
}
|
|
#endif
|