+++ /dev/null
-/*
- * hashquery.c - CGI to handle SKS style /pks/hashquery requests
- *
- * Copyright 2011 Jonathan McDowell <noodles@earth.li>
- *
- * This program is free software: you can redistribute it and/or modify it
- * under the terms of the GNU General Public License as published by the Free
- * Software Foundation; version 2 of the License.
- *
- * This program is distributed in the hope that it will be useful, but WITHOUT
- * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
- * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
- * more details.
- *
- * You should have received a copy of the GNU General Public License along with
- * this program. If not, see <https://www.gnu.org/licenses/>.
- */
-
-#include <stdbool.h>
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#include <stdint.h>
-#include <unistd.h>
-
-#include "charfuncs.h"
-#include "cleanup.h"
-#include "keydb.h"
-#include "log.h"
-#include "marshal.h"
-#include "mem.h"
-#include "onak-conf.h"
-
-void doerror(char *error)
-{
- printf("Content-Type: text/plain\n\n");
- printf("%s", error);
- cleanuplogthing();
- cleanupconfig();
- exit(EXIT_FAILURE);
-}
-
-int main(int argc, char *argv[])
-{
- char *request_method;
- int count, found, i;
- uint8_t **hashes;
- struct buffer_ctx cgipostbuf;
- struct openpgp_publickey **keys;
- struct onak_dbctx *dbctx;
-
- readconfig(NULL);
- initlogthing("hashquery", config.logfile);
-
- request_method = getenv("REQUEST_METHOD");
- if (request_method == NULL || strcmp(request_method, "POST") != 0) {
- doerror("hashquery must be a HTTP POST request.\n");
- }
-
- if (!(cgipostbuf.size = atoi(getenv("CONTENT_LENGTH")))) {
- doerror("Must provide a content length.\n");
- }
-
- cgipostbuf.offset = 0;
- cgipostbuf.buffer = malloc(cgipostbuf.size);
- if (cgipostbuf.buffer == NULL) {
- doerror("Couldn't allocate memory for query content.\n");
- }
-
- if (!fread(cgipostbuf.buffer, cgipostbuf.size, 1, stdin)) {
- doerror("Couldn't read query.\n");
- }
-
- hashes = (uint8_t **) unmarshal_array(buffer_fetchchar, &cgipostbuf,
- (void * (*)(int (*)(void *, size_t, void *), void *))
- unmarshal_skshash, &count);
-
- free(cgipostbuf.buffer);
- cgipostbuf.buffer = NULL;
- cgipostbuf.size = cgipostbuf.offset = 0;
-
- if (hashes == NULL) {
- doerror("No hashes supplied.\n");
- }
-
- found = 0;
- keys = calloc(sizeof(struct openpgp_publickey *), count);
- if (keys == NULL) {
- doerror("Couldn't allocate memory for reply.\n");
- }
-
- catchsignals();
- dbctx = config.dbinit(config.backend, false);
-
- if (dbctx->fetch_key_skshash == NULL) {
- dbctx->cleanupdb(dbctx);
- doerror("Can't fetch by skshash with this backend.");
- }
-
- for (i = 0; i < count; i++) {
- dbctx->fetch_key_skshash(dbctx,
- (struct skshash *) hashes[i], &keys[found]);
- if (keys[found] != NULL) {
- found++;
- }
- free(hashes[i]);
- hashes[i] = NULL;
- }
- free(hashes);
- hashes = NULL;
-
- dbctx->cleanupdb(dbctx);
-
- puts("Content-Type: pgp/keys\n");
- marshal_array(stdout_putchar, NULL,
- (void (*)(int (*)(void *, size_t, void *),
- void *, const void *))
- marshal_publickey, (void **) keys, found);
- printf("\n");
-
- for (i = 0; i < found; i++) {
- free_publickey(keys[i]);
- }
- free(keys);
-
- cleanuplogthing();
- cleanupconfig();
-}