blob: 99067a7bdac7867a851bb78be73901a5a50283c7 [file] [log] [blame]
Saurab Dulal427e0122019-11-28 11:58:02 -06001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -04002/*
Davide Pesaventod90338d2021-01-07 17:50:05 -05003 * Copyright (c) 2014-2021, The University of Memphis,
Saurab Dulal427e0122019-11-28 11:58:02 -06004 * Regents of the University of California,
5 * Arizona Board of Regents.
6 *
7 * This file is part of NLSR (Named-data Link State Routing).
8 * See AUTHORS.md for complete list of NLSR authors and contributors.
9 *
10 * NLSR is free software: you can redistribute it and/or modify it under the terms
11 * of the GNU General Public License as published by the Free Software Foundation,
12 * either version 3 of the License, or (at your option) any later version.
13 *
14 * NLSR is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
15 * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
16 * PURPOSE. See the GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License along with
19 * NLSR, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040020 */
Saurab Dulal427e0122019-11-28 11:58:02 -060021
22#include "certificate-store.hpp"
23#include "conf-parameter.hpp"
24#include "logger.hpp"
25
26#include <ndn-cxx/util/io.hpp>
27
28namespace nlsr {
29namespace security {
30
31INIT_LOGGER(CertificateStore);
32
33CertificateStore::CertificateStore(ndn::Face& face, ConfParameter& confParam, Lsdb& lsdb)
34 : m_face(face)
35 , m_confParam(confParam)
36 , m_lsdb(lsdb)
37 , m_validator(m_confParam.getValidator())
38 , m_afterSegmentValidatedConnection(m_lsdb.afterSegmentValidatedSignal.connect(
39 std::bind(&CertificateStore::afterFetcherSignalEmitted,
40 this, _1)))
41{
42 for (const auto& x: confParam.getIdCerts()) {
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040043 auto idCert = ndn::io::load<ndn::security::Certificate>(x);
Saurab Dulal427e0122019-11-28 11:58:02 -060044 insert(*idCert);
45 }
46
47 registerKeyPrefixes();
48}
49
50void
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040051CertificateStore::insert(const ndn::security::Certificate& certificate)
Saurab Dulal427e0122019-11-28 11:58:02 -060052{
53 m_certificates[certificate.getKeyName()] = certificate;
54 NLSR_LOG_TRACE("Certificate inserted successfully");
55}
56
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040057const ndn::security::Certificate*
Saurab Dulal427e0122019-11-28 11:58:02 -060058CertificateStore::find(const ndn::Name& keyName) const
59{
60 auto it = m_certificates.find(keyName);
61 return it != m_certificates.end() ? &it->second : nullptr;
62}
63
64void
65CertificateStore::clear()
66{
67 m_certificates.clear();
68}
69
70void
71CertificateStore::setInterestFilter(const ndn::Name& prefix, bool loopback)
72{
73 m_face.setInterestFilter(ndn::InterestFilter(prefix).allowLoopback(loopback),
74 std::bind(&CertificateStore::onKeyInterest, this, _1, _2),
75 std::bind(&CertificateStore::onKeyPrefixRegSuccess, this, _1),
76 std::bind(&CertificateStore::registrationFailed, this, _1),
77 m_confParam.getSigningInfo(), ndn::nfd::ROUTE_FLAG_CAPTURE);
78}
79
80void
81CertificateStore::registerKeyPrefixes()
82{
83 std::vector<ndn::Name> prefixes;
84
85 // Router's NLSR certificate
86 ndn::Name nlsrKeyPrefix = m_confParam.getRouterPrefix();
87 nlsrKeyPrefix.append("nlsr");
Ashlesh Gawande7a231c02020-06-12 20:06:44 -070088 nlsrKeyPrefix.append(ndn::security::Certificate::KEY_COMPONENT);
Saurab Dulal427e0122019-11-28 11:58:02 -060089 prefixes.push_back(nlsrKeyPrefix);
90
91 // Router's certificate
92 ndn::Name routerKeyPrefix = m_confParam.getRouterPrefix();
Ashlesh Gawande7a231c02020-06-12 20:06:44 -070093 routerKeyPrefix.append(ndn::security::Certificate::KEY_COMPONENT);
Saurab Dulal427e0122019-11-28 11:58:02 -060094 prefixes.push_back(routerKeyPrefix);
95
96 // Router's operator's certificate
97 ndn::Name operatorKeyPrefix = m_confParam.getNetwork();
98 operatorKeyPrefix.append(m_confParam.getSiteName());
99 operatorKeyPrefix.append(std::string("%C1.Operator"));
100 prefixes.push_back(operatorKeyPrefix);
101
102 // Router's site's certificate
103 ndn::Name siteKeyPrefix = m_confParam.getNetwork();
104 siteKeyPrefix.append(m_confParam.getSiteName());
Ashlesh Gawande7a231c02020-06-12 20:06:44 -0700105 siteKeyPrefix.append(ndn::security::Certificate::KEY_COMPONENT);
Saurab Dulal427e0122019-11-28 11:58:02 -0600106 prefixes.push_back(siteKeyPrefix);
107
108 // Start listening for interest of this router's NLSR certificate,
109 // router's certificate and site's certificate
110 for (const auto& i : prefixes) {
111 setInterestFilter(i);
112 }
113}
114
115void
116CertificateStore::onKeyInterest(const ndn::Name& name, const ndn::Interest& interest)
117{
118 NLSR_LOG_DEBUG("Got interest for certificate. Interest: " << interest.getName());
119
120 const auto* cert = find(interest.getName());
121
122 if (!cert) {
123 NLSR_LOG_TRACE("Certificate is not found for: " << interest);
124 return;
125 }
126 m_face.put(*cert);
127}
128
129void
130CertificateStore::onKeyPrefixRegSuccess(const ndn::Name& name)
131{
Davide Pesaventod90338d2021-01-07 17:50:05 -0500132 NLSR_LOG_DEBUG("KEY prefix: " << name << " registration is successful");
Saurab Dulal427e0122019-11-28 11:58:02 -0600133}
134
135void
136CertificateStore::registrationFailed(const ndn::Name& name)
137{
Davide Pesaventod90338d2021-01-07 17:50:05 -0500138 NLSR_LOG_ERROR("Failed to register prefix " << name);
139 NDN_THROW(std::runtime_error("Prefix registration failed"));
Saurab Dulal427e0122019-11-28 11:58:02 -0600140}
141
142void
143CertificateStore::publishCertFromCache(const ndn::Name& keyName)
144{
145 const auto* cert = m_validator.getUnverifiedCertCache().find(keyName);
146
147 if (cert) {
148 insert(*cert);
149 NLSR_LOG_TRACE(*cert);
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -0400150 ndn::Name certName = ndn::security::extractKeyNameFromCertName(cert->getName());
Saurab Dulal427e0122019-11-28 11:58:02 -0600151 NLSR_LOG_TRACE("Setting interest filter for: " << certName);
152
153 setInterestFilter(certName);
154
Ashlesh Gawande7a231c02020-06-12 20:06:44 -0700155 const ndn::Name& keyLocatorName = cert->getSignatureInfo().getKeyLocator().getName();
156 if (cert->getKeyName() != keyLocatorName) {
157 publishCertFromCache(keyLocatorName);
Saurab Dulal427e0122019-11-28 11:58:02 -0600158 }
159 }
160 else {
161 // Happens for root cert
162 NLSR_LOG_TRACE("Cert for " << keyName << " was not found in the Validator's cache. ");
163 }
164}
165
166void
167CertificateStore::afterFetcherSignalEmitted(const ndn::Data& lsaSegment)
168{
Ashlesh Gawande7a231c02020-06-12 20:06:44 -0700169 const auto keyName = lsaSegment.getSignatureInfo().getKeyLocator().getName();
Saurab Dulal427e0122019-11-28 11:58:02 -0600170 if (!find(keyName)) {
171 NLSR_LOG_TRACE("Publishing certificate for: " << keyName);
172 publishCertFromCache(keyName);
173 }
174 else {
175 NLSR_LOG_TRACE("Certificate is already in the store: " << keyName);
176 }
177}
178
179} // namespace security
180} // namespace nlsr