]> the.earth.li Git - onak.git/blobdiff - cgi/lookup.c
Move CGI sources to their own subdirectory
[onak.git] / cgi / lookup.c
diff --git a/cgi/lookup.c b/cgi/lookup.c
new file mode 100644 (file)
index 0000000..35c039b
--- /dev/null
@@ -0,0 +1,322 @@
+/*
+ * lookup.c - CGI to lookup keys.
+ *
+ * Copyright 2002-2005,2007-2009,2011 Jonathan McDowell <noodles@earth.li>
+ *
+ * This program is free software: you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the Free
+ * Software Foundation; version 2 of the License.
+ *
+ * This program is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+ * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
+ * more details.
+ *
+ * You should have received a copy of the GNU General Public License along with
+ * this program.  If not, see <https://www.gnu.org/licenses/>.
+ */
+
+#include <inttypes.h>
+#include <stdbool.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+
+#include "build-config.h"
+
+#include "armor.h"
+#include "charfuncs.h"
+#include "cleankey.h"
+#include "cleanup.h"
+#include "getcgi.h"
+#include "keydb.h"
+#include "keyid.h"
+#include "keyindex.h"
+#include "log.h"
+#include "mem.h"
+#include "onak-conf.h"
+#include "parsekey.h"
+#include "photoid.h"
+
+#define OP_UNKNOWN 0
+#define OP_GET     1
+#define OP_INDEX   2
+#define OP_VINDEX  3
+#define OP_PHOTO   4
+#define OP_HGET    5
+
+void find_keys(struct onak_dbctx *dbctx,
+               char *search, uint64_t keyid,
+               struct openpgp_fingerprint *fingerprint,
+               bool ishex, bool isfp, bool dispfp, bool skshash,
+               bool exact, bool verbose, bool mrhkp)
+{
+       struct openpgp_publickey *publickey = NULL;
+       int count = 0;
+
+       if (ishex) {
+               count = dbctx->fetch_key_id(dbctx, keyid, &publickey,
+                               false);
+       } else if (isfp) {
+               count = dbctx->fetch_key_fp(dbctx, fingerprint, &publickey,
+                               false);
+       } else {
+               count = dbctx->fetch_key_text(dbctx, search, &publickey);
+       }
+       if (publickey != NULL) {
+               if (mrhkp) {
+                       printf("info:1:%d\n", count);
+                       mrkey_index(publickey);
+               } else {
+                       key_index(dbctx, publickey, verbose, dispfp,
+                               skshash, true);
+               }
+               free_publickey(publickey);
+       } else if (count == 0) {
+               if (mrhkp) {
+                       puts("info:1:0");
+               } else {
+                       puts("Key not found.");
+               }
+       } else {
+               if (mrhkp) {
+                       puts("info:1:0");
+               } else {
+                       printf("Found %d keys, but maximum number to return"
+                               " is %d.\n",
+                               count,
+                               config.maxkeys);
+                       puts("Try again with a more specific search.");
+               }
+       }
+}
+
+static uint8_t hex2bin(char c)
+{
+       if (c >= '0' && c <= '9') {
+               return (c - '0');
+       } else if (c >= 'a' && c <= 'f') {
+               return (c - 'a' + 10);
+       } else if (c >= 'A' && c <= 'F') {
+               return (c - 'A' + 10);
+       }
+
+       return 255;
+}
+
+int main(int argc, char *argv[])
+{
+       char **params = NULL;
+       int op = OP_UNKNOWN;
+       int i, j;
+       int indx = 0;
+       bool dispfp = false;
+       bool skshash = false;
+       bool exact = false;
+       bool ishex = false;
+       bool isfp = false;
+       bool mrhkp = false;
+       uint64_t keyid = 0;
+       struct openpgp_fingerprint fingerprint;
+       char *search = NULL;
+       char *end = NULL;
+       struct openpgp_publickey *publickey = NULL;
+       struct openpgp_packet_list *packets = NULL;
+       struct openpgp_packet_list *list_end = NULL;
+       int result;
+       struct skshash hash;
+       struct onak_dbctx *dbctx;
+
+       params = getcgivars(argc, argv);
+       for (i = 0; params != NULL && params[i] != NULL; i += 2) {
+               if (!strcmp(params[i], "op")) {
+                       if (!strcmp(params[i+1], "get")) {
+                               op = OP_GET;
+                       } else if (!strcmp(params[i+1], "hget")) {
+                               op = OP_HGET;
+                       } else if (!strcmp(params[i+1], "index")) {
+                               op = OP_INDEX;
+                       } else if (!strcmp(params[i+1], "vindex")) {
+                               op = OP_VINDEX;
+                       } else if (!strcmp(params[i+1], "photo")) {
+                               op = OP_PHOTO;
+                       }
+               } else if (!strcmp(params[i], "search")) {
+                       search = params[i+1];
+                       params[i+1] = NULL;
+                       if (search != NULL && strlen(search) == 42 &&
+                                       search[0] == '0' && search[1] == 'x') {
+                               /* v4 fingerprint */
+                               fingerprint.length = 20;
+                               for (j = 0; j < 20; j++) {
+                                       fingerprint.fp[j] = (hex2bin(
+                                                       search[2 + j * 2])
+                                                               << 4) +
+                                               hex2bin(search[3 + j * 2]);
+                               }
+                               isfp = true;
+                       } else if (search != NULL && strlen(search) == 66 &&
+                                       search[0] == '0' && search[1] == 'x') {
+                               /* v5 fingerprint */
+                               fingerprint.length = 32;
+                               for (j = 0; j < 32; j++) {
+                                       fingerprint.fp[j] = (hex2bin(
+                                                       search[2 + j * 2])
+                                                               << 4) +
+                                               hex2bin(search[3 + j * 2]);
+                               }
+                               isfp = true;
+                       } else if (search != NULL) {
+                               keyid = strtoull(search, &end, 16);
+                               if (*search != 0 &&
+                                               end != NULL &&
+                                               *end == 0) {
+                                       ishex = true;
+                               }
+                       }
+               } else if (!strcmp(params[i], "idx")) {
+                       indx = atoi(params[i+1]);
+               } else if (!strcmp(params[i], "fingerprint")) {
+                       if (!strcmp(params[i+1], "on")) {
+                               dispfp = true;
+                       }
+               } else if (!strcmp(params[i], "hash")) {
+                       if (!strcmp(params[i+1], "on")) {
+                               skshash = true;
+                       }
+               } else if (!strcmp(params[i], "exact")) {
+                       if (!strcmp(params[i+1], "on")) {
+                               exact = true;
+                       }
+               } else if (!strcmp(params[i], "options")) {
+                       /*
+                        * TODO: We should be smarter about this; options may
+                        * have several entries. For now mr is the only valid
+                        * one though.
+                        */
+                       if (!strcmp(params[i+1], "mr")) {
+                               mrhkp = true;
+                       }
+               }
+               free(params[i]);
+               params[i] = NULL;
+               if (params[i+1] != NULL) {
+                       free(params[i+1]);
+                       params[i+1] = NULL;
+               }
+       }
+       if (params != NULL) {
+               free(params);
+               params = NULL;
+       }
+
+       if (mrhkp) {
+               puts("Content-Type: text/plain\n");
+       } else if (op == OP_PHOTO) {
+               puts("Content-Type: image/jpeg\n");
+       } else {
+               start_html("Lookup of key");
+       }
+
+       if (op == OP_UNKNOWN) {
+               puts("Error: No operation supplied.");
+       } else if (search == NULL) {
+               puts("Error: No key to search for supplied.");
+       } else {
+               readconfig(NULL);
+               initlogthing("lookup", config.logfile);
+               catchsignals();
+               dbctx = config.dbinit(config.backend, false);
+               switch (op) {
+               case OP_GET:
+               case OP_HGET:
+                       if (op == OP_HGET) {
+                               parse_skshash(search, &hash);
+                               result = dbctx->fetch_key_skshash(dbctx,
+                                       &hash, &publickey);
+                       } else if (ishex) {
+                               result = dbctx->fetch_key_id(dbctx, keyid,
+                                       &publickey, false);
+                       } else if (isfp) {
+                               result = dbctx->fetch_key_fp(dbctx,
+                                       &fingerprint, &publickey, false);
+                       } else {
+                               result = dbctx->fetch_key_text(dbctx,
+                                       search,
+                                       &publickey);
+                       }
+                       if (result) {
+                               logthing(LOGTHING_NOTICE, 
+                                       "Found %d key(s) for search %s",
+                                       result,
+                                       search);
+                               puts("<pre>");
+                               cleankeys(&publickey, config.clean_policies);
+                               flatten_publickey(publickey,
+                                                       &packets,
+                                                       &list_end);
+                               armor_openpgp_stream(stdout_putchar,
+                                               NULL,
+                                               packets);
+                               puts("</pre>");
+                       } else {
+                               logthing(LOGTHING_NOTICE,
+                                       "Failed to find key for search %s",
+                                       search);
+                               puts("Key not found");
+                       }
+                       break;
+               case OP_INDEX:
+                       find_keys(dbctx, search, keyid, &fingerprint,
+                                       ishex, isfp, dispfp, skshash,
+                                       exact, false, mrhkp);
+                       break;
+               case OP_VINDEX:
+                       find_keys(dbctx, search, keyid, &fingerprint,
+                                       ishex, isfp, dispfp, skshash,
+                                       exact, true, mrhkp);
+                       break;
+               case OP_PHOTO:
+                       if (isfp) {
+                               dbctx->fetch_key_fp(dbctx, &fingerprint,
+                                       &publickey, false);
+                       } else {
+                               dbctx->fetch_key_id(dbctx, keyid,
+                                       &publickey, false);
+                       }
+                       if (publickey != NULL) {
+                               unsigned char *photo = NULL;
+                               size_t         length = 0;
+
+                               if (getphoto(publickey, indx, &photo,
+                                               &length) == ONAK_E_OK) {
+                                       fwrite(photo,
+                                                       1,
+                                                       length,
+                                                       stdout);
+                               }
+                               free_publickey(publickey);
+                               publickey = NULL;
+                       }
+                       break;
+               default:
+                       puts("Unknown operation!");
+               }
+               dbctx->cleanupdb(dbctx);
+               cleanuplogthing();
+               cleanupconfig();
+       }
+       if (!mrhkp) {
+               puts("<hr>");
+               puts("Produced by onak " ONAK_VERSION );
+               end_html();
+       }
+
+       if (search != NULL) {
+               free(search);
+               search = NULL;
+       }
+       
+       return (EXIT_SUCCESS);
+}