]> git.sommitrealweird.co.uk Git - onak.git/blob - keydb_db4.c
2f6033aa6478ea7af6d7549e7306e46d993f406c
[onak.git] / keydb_db4.c
1 /*
2  * keydb_db4.c - Routines to store and fetch keys in a DB4 database.
3  *
4  * Jonathan McDowell <noodles@earth.li>
5  *
6  * Copyright 2002-2004 Project Purple
7  */
8
9 #include <sys/types.h>
10 #include <sys/uio.h>
11 #include <ctype.h>
12 #include <errno.h>
13 #include <fcntl.h>
14 #include <stdio.h>
15 #include <stdlib.h>
16 #include <string.h>
17 #include <unistd.h>
18
19 #include <db.h>
20
21 #include "charfuncs.h"
22 #include "keyarray.h"
23 #include "keydb.h"
24 #include "keyid.h"
25 #include "decodekey.h"
26 #include "keystructs.h"
27 #include "mem.h"
28 #include "log.h"
29 #include "onak-conf.h"
30 #include "parsekey.h"
31 #include "wordlist.h"
32
33 /**
34  *      dbenv - our database environment.
35  */
36 static DB_ENV *dbenv = NULL;
37
38 /**
39  *      numdb - The number of database files we have.
40  */
41 static int numdbs = 16;
42
43 /**
44  *      dbconn - our connections to the key database files.
45  */
46 static DB **dbconns = NULL;
47
48 /**
49  *      worddb - our connection to the word database.
50  */
51 static DB *worddb = NULL;
52
53 /**
54  *      id32db - our connection to the 32bit ID database.
55  */
56 static DB *id32db = NULL;
57
58 /**
59  *      txn - our current transaction id.
60  */
61 static DB_TXN *txn = NULL;
62
63 DB *keydb(uint64_t keyid)
64 {
65         uint64_t keytrun;
66
67         keytrun = keyid >> 8;
68
69         return(dbconns[keytrun % numdbs]);
70 }
71
72 /**
73  *      starttrans - Start a transaction.
74  *
75  *      Start a transaction. Intended to be used if we're about to perform many
76  *      operations on the database to help speed it all up, or if we want
77  *      something to only succeed if all relevant operations are successful.
78  */
79 static bool db4_starttrans(void)
80 {
81         int ret;
82
83         log_assert(dbenv != NULL);
84         log_assert(txn == NULL);
85
86         ret = dbenv->txn_begin(dbenv,
87                 NULL, /* No parent transaction */
88                 &txn,
89                 0);
90         if (ret != 0) {
91                 logthing(LOGTHING_CRITICAL,
92                                 "Error starting transaction: %s",
93                                 db_strerror(ret));
94                 exit(1);
95         }
96
97         return true;
98 }
99
100 /**
101  *      endtrans - End a transaction.
102  *
103  *      Ends a transaction.
104  */
105 static void db4_endtrans(void)
106 {
107         int ret;
108
109         log_assert(dbenv != NULL);
110         log_assert(txn != NULL);
111
112         ret = txn->commit(txn,
113                 0);
114         if (ret != 0) {
115                 logthing(LOGTHING_CRITICAL,
116                                 "Error ending transaction: %s",
117                                 db_strerror(ret));
118                 exit(1);
119         }
120         txn = NULL;
121
122         return;
123 }
124
125 /**
126  *      initdb - Initialize the key database.
127  *
128  *      This function should be called before any of the other functions in
129  *      this file are called in order to allow the DB to be initialized ready
130  *      for access.
131  */
132 static void db4_initdb(bool readonly)
133 {
134         char       buf[1024];
135         FILE      *numdb = NULL;
136         int        ret = 0;
137         int        i = 0;
138         u_int32_t  flags = 0;
139
140         snprintf(buf, sizeof(buf) - 1, "%s/num_keydb", config.db_dir);
141         numdb = fopen(buf, "r");
142         if (numdb != NULL) {
143                 if (fgets(buf, sizeof(buf), numdb) != NULL) {
144                         numdbs = atoi(buf);
145                 }
146                 fclose(numdb);
147         } else if (!readonly) {
148                 logthing(LOGTHING_ERROR, "Couldn't open num_keydb: %s",
149                                 strerror(errno));
150                 numdb = fopen(buf, "w");
151                 if (numdb != NULL) {
152                         fprintf(numdb, "%d", numdbs);
153                         fclose(numdb);
154                 } else {
155                         logthing(LOGTHING_ERROR,
156                                 "Couldn't write num_keydb: %s",
157                                 strerror(errno));
158                 }
159         }
160
161         dbconns = malloc(sizeof (DB *) * numdbs);
162         if (dbconns == NULL) {
163                 logthing(LOGTHING_CRITICAL,
164                                 "Couldn't allocate memory for dbconns");
165                 ret = 1;
166         }
167
168         if (ret == 0) {
169                 ret = db_env_create(&dbenv, 0);
170                 if (ret != 0) {
171                         logthing(LOGTHING_CRITICAL,
172                                 "db_env_create: %s", db_strerror(ret));
173                 }
174         }
175
176         /*
177          * Enable deadlock detection so that we don't block indefinitely on
178          * anything. What we really want is simple 2 state locks, but I'm not
179          * sure how to make the standard DB functions do that yet.
180          */
181         if (ret == 0) {
182                 ret = dbenv->set_lk_detect(dbenv, DB_LOCK_DEFAULT);
183                 if (ret != 0) {
184                         logthing(LOGTHING_CRITICAL,
185                                 "db_env_create: %s", db_strerror(ret));
186                 }
187         }
188
189         if (ret == 0) {
190                 ret = dbenv->open(dbenv, config.db_dir,
191                                 DB_INIT_LOG | DB_INIT_MPOOL | DB_INIT_LOCK |
192                                 DB_INIT_TXN |
193                                 DB_CREATE,
194                                 0);
195                 if (ret != 0) {
196                         logthing(LOGTHING_CRITICAL,
197                                         "Error opening db environment: %s (%s)",
198                                         config.db_dir,
199                                         db_strerror(ret));
200                         dbenv->close(dbenv, 0);
201                         dbenv = NULL;
202                 }
203         }
204
205         if (ret == 0) {
206                 db4_starttrans();
207
208                 for (i = 0; !ret && i < numdbs; i++) {
209                         ret = db_create(&dbconns[i], dbenv, 0);
210                         if (ret != 0) {
211                                 logthing(LOGTHING_CRITICAL,
212                                         "db_create: %s", db_strerror(ret));
213                         }
214
215                         if (ret == 0) {
216                                 snprintf(buf, 1023, "keydb.%d.db", i);
217                                 flags = DB_CREATE;
218                                 if (readonly) {
219                                         flags = DB_RDONLY;
220                                 }
221                                 ret = dbconns[i]->open(dbconns[i],
222                                                 txn,
223                                                 buf,
224                                                 "keydb",
225                                                 DB_HASH,
226                                                 flags,
227                                                 0664);
228                                 if (ret != 0) {
229                                         logthing(LOGTHING_CRITICAL,
230                                                 "Error opening key database:"
231                                                 " %s (%s)",
232                                                 buf,
233                                                 db_strerror(ret));
234                                 }
235                         }
236                 }
237
238         }
239
240         if (ret == 0) {
241                 ret = db_create(&worddb, dbenv, 0);
242                 if (ret != 0) {
243                         logthing(LOGTHING_CRITICAL, "db_create: %s",
244                                         db_strerror(ret));
245                 }
246         }
247
248         if (ret == 0) {
249                 ret = worddb->set_flags(worddb, DB_DUP);
250         }
251
252         if (ret == 0) {
253                 ret = worddb->open(worddb, txn, "worddb", "worddb", DB_BTREE,
254                                 flags,
255                                 0664);
256                 if (ret != 0) {
257                         logthing(LOGTHING_CRITICAL,
258                                         "Error opening word database: %s (%s)",
259                                         "worddb",
260                                         db_strerror(ret));
261                 }
262         }
263
264         if (ret == 0) {
265                 ret = db_create(&id32db, dbenv, 0);
266                 if (ret != 0) {
267                         logthing(LOGTHING_CRITICAL, "db_create: %s",
268                                         db_strerror(ret));
269                 }
270         }
271
272         if (ret == 0) {
273                 ret = id32db->set_flags(id32db, DB_DUP);
274         }
275
276         if (ret == 0) {
277                 ret = id32db->open(id32db, txn, "id32db", "id32db", DB_HASH,
278                                 flags,
279                                 0664);
280                 if (ret != 0) {
281                         logthing(LOGTHING_CRITICAL,
282                                         "Error opening id32 database: %s (%s)",
283                                         "id32db",
284                                         db_strerror(ret));
285                 }
286         }
287
288         if (txn != NULL) {
289                 endtrans();
290         }
291
292         if (ret != 0) {
293                 cleanupdb();
294                 logthing(LOGTHING_CRITICAL,
295                                 "Error opening database; exiting");
296                 exit(EXIT_FAILURE);
297         }
298         
299         return;
300 }
301
302 /**
303  *      cleanupdb - De-initialize the key database.
304  *
305  *      This function should be called upon program exit to allow the DB to
306  *      cleanup after itself.
307  */
308 static void db4_cleanupdb(void)
309 {
310         int i = 0;
311
312         if (dbenv != NULL) {
313                 dbenv->txn_checkpoint(dbenv, 0, 0, 0);
314                 if (id32db != NULL) {
315                         id32db->close(id32db, 0);
316                         id32db = NULL;
317                 }
318                 if (worddb != NULL) {
319                         worddb->close(worddb, 0);
320                         worddb = NULL;
321                 }
322                 for (i = 0; i < numdbs; i++) {
323                         if (dbconns[i] != NULL) {
324                                 dbconns[i]->close(dbconns[i], 0);
325                                 dbconns[i] = NULL;
326                         }
327                 }
328                 free(dbconns);
329                 dbconns = NULL;
330                 dbenv->close(dbenv, 0);
331                 dbenv = NULL;
332         }
333 }
334
335 /**
336  *      fetch_key - Given a keyid fetch the key from storage.
337  *      @keyid: The keyid to fetch.
338  *      @publickey: A pointer to a structure to return the key in.
339  *      @intrans: If we're already in a transaction.
340  *
341  *      We use the hex representation of the keyid as the filename to fetch the
342  *      key from. The key is stored in the file as a binary OpenPGP stream of
343  *      packets, so we can just use read_openpgp_stream() to read the packets
344  *      in and then parse_keys() to parse the packets into a publickey
345  *      structure.
346  */
347 static int db4_fetch_key(uint64_t keyid, struct openpgp_publickey **publickey,
348                 bool intrans)
349 {
350         struct openpgp_packet_list *packets = NULL;
351         DBT key, data;
352         int ret = 0;
353         int numkeys = 0;
354         struct buffer_ctx fetchbuf;
355
356         if (keyid < 0x100000000LL) {
357                 keyid = getfullkeyid(keyid);
358         }
359
360         memset(&key, 0, sizeof(key));
361         memset(&data, 0, sizeof(data));
362
363         data.size = 0;
364         data.data = NULL;
365
366         key.size = sizeof(keyid);
367         key.data = &keyid;
368
369         if (!intrans) {
370                 db4_starttrans();
371         }
372
373         ret = keydb(keyid)->get(keydb(keyid),
374                         txn,
375                         &key,
376                         &data,
377                         0); /* flags*/
378         
379         if (ret == 0) {
380                 fetchbuf.buffer = data.data;
381                 fetchbuf.offset = 0;
382                 fetchbuf.size = data.size;
383                 read_openpgp_stream(buffer_fetchchar, &fetchbuf,
384                                 &packets, 0);
385                 parse_keys(packets, publickey);
386                 free_packet_list(packets);
387                 packets = NULL;
388                 numkeys++;
389         } else if (ret != DB_NOTFOUND) {
390                 logthing(LOGTHING_ERROR,
391                                 "Problem retrieving key: %s",
392                                 db_strerror(ret));
393         }
394
395         if (!intrans) {
396                 endtrans();
397         }
398
399         return (numkeys);
400 }
401
402 int worddb_cmp(const void *d1, const void *d2)
403 {
404         return memcmp(d1, d2, 12);
405 }
406
407 /**
408  *      fetch_key_text - Trys to find the keys that contain the supplied text.
409  *      @search: The text to search for.
410  *      @publickey: A pointer to a structure to return the key in.
411  *
412  *      This function searches for the supplied text and returns the keys that
413  *      contain it.
414  */
415 static int db4_fetch_key_text(const char *search,
416                 struct openpgp_publickey **publickey)
417 {
418         DBC *cursor = NULL;
419         DBT key, data;
420         int ret;
421         uint64_t keyid;
422         int i;
423         int numkeys;
424         char *searchtext = NULL;
425         struct ll *wordlist = NULL;
426         struct ll *curword = NULL;
427         struct keyarray keylist = { NULL, 0, 0 };
428         struct keyarray newkeylist = { NULL, 0, 0 };
429
430         numkeys = 0;
431         searchtext = strdup(search);
432         wordlist = makewordlist(wordlist, searchtext);
433
434         for (curword = wordlist; curword != NULL; curword = curword->next) {
435                 db4_starttrans();
436
437                 ret = worddb->cursor(worddb,
438                                 txn,
439                                 &cursor,
440                                 0);   /* flags */
441
442                 memset(&key, 0, sizeof(key));
443                 memset(&data, 0, sizeof(data));
444                 key.data = curword->object;
445                 key.size = strlen(curword->object);
446                 data.flags = DB_DBT_MALLOC;
447                 ret = cursor->c_get(cursor,
448                                 &key,
449                                 &data,
450                                 DB_SET);
451                 while (ret == 0 && strncmp(key.data, curword->object,
452                                         key.size) == 0 &&
453                                 ((char *) curword->object)[key.size] == 0) {
454                         keyid = 0;
455                         for (i = 4; i < 12; i++) {
456                                 keyid <<= 8;
457                                 keyid += ((unsigned char *)
458                                                 data.data)[i];
459                         }
460
461                         if (keylist.count == 0 ||
462                                         array_find(&keylist, keyid)) {
463                                 array_add(&newkeylist, keyid);
464                         }
465
466                         free(data.data);
467                         data.data = NULL;
468
469                         ret = cursor->c_get(cursor,
470                                         &key,
471                                         &data,
472                                         DB_NEXT);
473                 }
474                 array_free(&keylist);
475                 keylist = newkeylist;
476                 newkeylist.keys = NULL;
477                 newkeylist.count = newkeylist.size = 0;
478                 if (data.data != NULL) {
479                         free(data.data);
480                         data.data = NULL;
481                 }
482                 ret = cursor->c_close(cursor);
483                 cursor = NULL;
484                 endtrans();
485         }
486         llfree(wordlist, NULL);
487         wordlist = NULL;
488         
489         db4_starttrans();
490         for (i = 0; i < keylist.count; i++) {
491                 numkeys += fetch_key(keylist.keys[i],
492                         publickey,
493                         true);
494         }
495         array_free(&keylist);
496         free(searchtext);
497         searchtext = NULL;
498
499         endtrans();
500         
501         return (numkeys);
502 }
503
504 /**
505  *      store_key - Takes a key and stores it.
506  *      @publickey: A pointer to the public key to store.
507  *      @intrans: If we're already in a transaction.
508  *      @update: If true the key exists and should be updated.
509  *
510  *      Again we just use the hex representation of the keyid as the filename
511  *      to store the key to. We flatten the public key to a list of OpenPGP
512  *      packets and then use write_openpgp_stream() to write the stream out to
513  *      the file. If update is true then we delete the old key first, otherwise
514  *      we trust that it doesn't exist.
515  */
516 static int db4_store_key(struct openpgp_publickey *publickey, bool intrans,
517                 bool update)
518 {
519         struct     openpgp_packet_list *packets = NULL;
520         struct     openpgp_packet_list *list_end = NULL;
521         struct     openpgp_publickey *next = NULL;
522         int        ret = 0;
523         int        i = 0;
524         struct     buffer_ctx storebuf;
525         DBT        key;
526         DBT        data;
527         uint64_t   keyid = 0;
528         uint32_t   shortkeyid = 0;
529         uint64_t  *subkeyids = NULL;
530         char     **uids = NULL;
531         char      *primary = NULL;
532         unsigned char worddb_data[12];
533         struct ll *wordlist = NULL;
534         struct ll *curword  = NULL;
535         bool       deadlock = false;
536
537         keyid = get_keyid(publickey);
538
539         if (!intrans) {
540                 db4_starttrans();
541         }
542
543         /*
544          * Delete the key if we already have it.
545          *
546          * TODO: Can we optimize this perhaps? Possibly when other data is
547          * involved as well? I suspect this is easiest and doesn't make a lot
548          * of difference though - the largest chunk of data is the keydata and
549          * it definitely needs updated.
550          */
551         if (update) {
552                 deadlock = (delete_key(keyid, true) == -1);
553         }
554
555         /*
556          * Convert the key to a flat set of binary data.
557          */
558         if (!deadlock) {
559                 next = publickey->next;
560                 publickey->next = NULL;
561                 flatten_publickey(publickey, &packets, &list_end);
562                 publickey->next = next;
563
564                 storebuf.offset = 0; 
565                 storebuf.size = 8192;
566                 storebuf.buffer = malloc(8192);
567         
568                 write_openpgp_stream(buffer_putchar, &storebuf, packets);
569
570                 /*
571                  * Now we have the key data store it in the DB; the keyid is
572                  * the key.
573                  */
574                 memset(&key, 0, sizeof(key));
575                 memset(&data, 0, sizeof(data));
576                 key.data = &keyid;
577                 key.size = sizeof(keyid);
578                 data.size = storebuf.offset;
579                 data.data = storebuf.buffer;
580
581                 ret = keydb(keyid)->put(keydb(keyid),
582                                 txn,
583                                 &key,
584                                 &data,
585                                 0); /* flags*/
586                 if (ret != 0) {
587                         logthing(LOGTHING_ERROR,
588                                         "Problem storing key: %s",
589                                         db_strerror(ret));
590                         if (ret == DB_LOCK_DEADLOCK) {
591                                 deadlock = true;
592                         }
593                 }
594
595                 free(storebuf.buffer);
596                 storebuf.buffer = NULL;
597                 storebuf.size = 0;
598                 storebuf.offset = 0; 
599         
600                 free_packet_list(packets);
601                 packets = NULL;
602         }
603
604         /*
605          * Walk through our uids storing the words into the db with the keyid.
606          */
607         if (!deadlock) {
608                 uids = keyuids(publickey, &primary);
609         }
610         if (uids != NULL) {
611                 for (i = 0; ret == 0 && uids[i] != NULL; i++) {
612                         wordlist = makewordlist(wordlist, uids[i]);
613                 }
614
615                 for (curword = wordlist; curword != NULL && !deadlock;
616                                 curword = curword->next) {
617                         memset(&key, 0, sizeof(key));
618                         memset(&data, 0, sizeof(data));
619                         key.data = curword->object;
620                         key.size = strlen(key.data);
621                         data.data = worddb_data;
622                         data.size = sizeof(worddb_data);
623
624                         /*
625                          * Our data is the key creation time followed by the
626                          * key id.
627                          */
628                         worddb_data[ 0] = publickey->publickey->data[1];
629                         worddb_data[ 1] = publickey->publickey->data[2];
630                         worddb_data[ 2] = publickey->publickey->data[3];
631                         worddb_data[ 3] = publickey->publickey->data[4];
632                         worddb_data[ 4] = (keyid >> 56) & 0xFF;
633                         worddb_data[ 5] = (keyid >> 48) & 0xFF;
634                         worddb_data[ 6] = (keyid >> 40) & 0xFF;
635                         worddb_data[ 7] = (keyid >> 32) & 0xFF;
636                         worddb_data[ 8] = (keyid >> 24) & 0xFF;
637                         worddb_data[ 9] = (keyid >> 16) & 0xFF;
638                         worddb_data[10] = (keyid >>  8) & 0xFF;
639                         worddb_data[11] = keyid & 0xFF; 
640                         ret = worddb->put(worddb,
641                                 txn,
642                                 &key,
643                                 &data,
644                                 0);
645                         if (ret != 0) {
646                                 logthing(LOGTHING_ERROR,
647                                         "Problem storing word: %s",
648                                         db_strerror(ret));
649                                 if (ret == DB_LOCK_DEADLOCK) {
650                                         deadlock = true;
651                                 }
652                         }
653                 }
654
655                 /*
656                  * Free our UID and word lists.
657                  */
658                 llfree(wordlist, NULL);
659                 for (i = 0; uids[i] != NULL; i++) {
660                         free(uids[i]);
661                         uids[i] = NULL;
662                 }
663                 free(uids);
664                 uids = NULL;
665         }
666
667         /*
668          * Write the truncated 32 bit keyid so we can lookup the full id for
669          * queries.
670          */
671         if (!deadlock) {
672                 shortkeyid = keyid & 0xFFFFFFFF;
673
674                 memset(&key, 0, sizeof(key));
675                 memset(&data, 0, sizeof(data));
676                 key.data = &shortkeyid;
677                 key.size = sizeof(shortkeyid);
678                 data.data = &keyid;
679                 data.size = sizeof(keyid);
680
681                 ret = id32db->put(id32db,
682                         txn,
683                         &key,
684                         &data,
685                         0);
686                 if (ret != 0) {
687                         logthing(LOGTHING_ERROR,
688                                 "Problem storing short keyid: %s",
689                                 db_strerror(ret));
690                         if (ret == DB_LOCK_DEADLOCK) {
691                                 deadlock = true;
692                         }
693                 }
694         }
695
696         if (!deadlock) {
697                 subkeyids = keysubkeys(publickey);
698                 i = 0;
699                 while (subkeyids != NULL && subkeyids[i] != 0) {
700                         shortkeyid = subkeyids[i++] & 0xFFFFFFFF;
701
702                         memset(&key, 0, sizeof(key));
703                         memset(&data, 0, sizeof(data));
704                         key.data = &shortkeyid;
705                         key.size = sizeof(shortkeyid);
706                         data.data = &keyid;
707                         data.size = sizeof(keyid);
708
709                         ret = id32db->put(id32db,
710                                 txn,
711                                 &key,
712                                 &data,
713                                 0);
714                         if (ret != 0) {
715                                 logthing(LOGTHING_ERROR,
716                                         "Problem storing short keyid: %s",
717                                         db_strerror(ret));
718                                 if (ret == DB_LOCK_DEADLOCK) {
719                                         deadlock = true;
720                                 }
721                         }
722                 }
723                 if (subkeyids != NULL) {
724                         free(subkeyids);
725                         subkeyids = NULL;
726                 }
727         }
728
729         if (!intrans) {
730                 endtrans();
731         }
732
733         return deadlock ? -1 : 0 ;
734 }
735
736 /**
737  *      delete_key - Given a keyid delete the key from storage.
738  *      @keyid: The keyid to delete.
739  *      @intrans: If we're already in a transaction.
740  *
741  *      This function deletes a public key from whatever storage mechanism we
742  *      are using. Returns 0 if the key existed.
743  */
744 static int db4_delete_key(uint64_t keyid, bool intrans)
745 {
746         struct openpgp_publickey *publickey = NULL;
747         DBT key, data;
748         DBC *cursor = NULL;
749         uint32_t   shortkeyid = 0;
750         uint64_t  *subkeyids = NULL;
751         int ret = 0;
752         int i;
753         char **uids = NULL;
754         char *primary = NULL;
755         unsigned char worddb_data[12];
756         struct ll *wordlist = NULL;
757         struct ll *curword  = NULL;
758         bool deadlock = false;
759
760         if (!intrans) {
761                 db4_starttrans();
762         }
763
764         fetch_key(keyid, &publickey, true);
765
766         /*
767          * Walk through the uids removing the words from the worddb.
768          */
769         if (publickey != NULL) {
770                 uids = keyuids(publickey, &primary);
771         }
772         if (uids != NULL) {
773                 for (i = 0; ret == 0 && uids[i] != NULL; i++) {
774                         wordlist = makewordlist(wordlist, uids[i]);
775                 }
776                                 
777                 ret = worddb->cursor(worddb,
778                         txn,
779                         &cursor,
780                         0);   /* flags */
781
782                 for (curword = wordlist; curword != NULL && !deadlock;
783                                 curword = curword->next) {
784                         memset(&key, 0, sizeof(key));
785                         memset(&data, 0, sizeof(data));
786                         key.data = curword->object;
787                         key.size = strlen(key.data);
788                         data.data = worddb_data;
789                         data.size = sizeof(worddb_data);
790
791                         /*
792                          * Our data is the key creation time followed by the
793                          * key id.
794                          */
795                         worddb_data[ 0] = publickey->publickey->data[1];
796                         worddb_data[ 1] = publickey->publickey->data[2];
797                         worddb_data[ 2] = publickey->publickey->data[3];
798                         worddb_data[ 3] = publickey->publickey->data[4];
799                         worddb_data[ 4] = (keyid >> 56) & 0xFF;
800                         worddb_data[ 5] = (keyid >> 48) & 0xFF;
801                         worddb_data[ 6] = (keyid >> 40) & 0xFF;
802                         worddb_data[ 7] = (keyid >> 32) & 0xFF;
803                         worddb_data[ 8] = (keyid >> 24) & 0xFF;
804                         worddb_data[ 9] = (keyid >> 16) & 0xFF;
805                         worddb_data[10] = (keyid >>  8) & 0xFF;
806                         worddb_data[11] = keyid & 0xFF; 
807
808                         ret = cursor->c_get(cursor,
809                                 &key,
810                                 &data,
811                                 DB_GET_BOTH);
812
813                         if (ret == 0) {
814                                 ret = cursor->c_del(cursor, 0);
815                                 if (ret != 0) {
816                                         logthing(LOGTHING_ERROR,
817                                                 "Problem deleting word: %s",
818                                                 db_strerror(ret));
819                                 }
820                         }
821
822                         if (ret != 0) {
823                                 logthing(LOGTHING_ERROR,
824                                         "Problem deleting word: %s",
825                                         db_strerror(ret));
826                                 if (ret == DB_LOCK_DEADLOCK) {
827                                         deadlock = true;
828                                 }
829                         }
830                 }
831                 ret = cursor->c_close(cursor);
832                 cursor = NULL;
833
834                 /*
835                  * Free our UID and word lists.
836                  */
837                 llfree(wordlist, NULL);
838                 for (i = 0; uids[i] != NULL; i++) {
839                         free(uids[i]);
840                         uids[i] = NULL;
841                 }
842                 free(uids);
843                 uids = NULL;
844                 free_publickey(publickey);
845                 publickey = NULL;
846         }
847
848         if (!deadlock) {
849                 ret = id32db->cursor(id32db,
850                         txn,
851                         &cursor,
852                         0);   /* flags */
853
854                 shortkeyid = keyid & 0xFFFFFFFF;
855
856                 memset(&key, 0, sizeof(key));
857                 memset(&data, 0, sizeof(data));
858                 key.data = &shortkeyid;
859                 key.size = sizeof(shortkeyid);
860                 data.data = &keyid;
861                 data.size = sizeof(keyid);
862
863                 ret = cursor->c_get(cursor,
864                         &key,
865                         &data,
866                         DB_GET_BOTH);
867
868                 if (ret == 0) {
869                         ret = cursor->c_del(cursor, 0);
870                         if (ret != 0) {
871                                 logthing(LOGTHING_ERROR,
872                                         "Problem deleting short keyid: %s",
873                                         db_strerror(ret));
874                         }
875                 }
876
877                 if (ret != 0) {
878                         logthing(LOGTHING_ERROR,
879                                 "Problem deleting short keyid: %s",
880                                 db_strerror(ret));
881                         if (ret == DB_LOCK_DEADLOCK) {
882                                 deadlock = true;
883                         }
884                 }
885
886                 subkeyids = keysubkeys(publickey);
887                 i = 0;
888                 while (subkeyids != NULL && subkeyids[i] != 0) {
889                         shortkeyid = subkeyids[i++] & 0xFFFFFFFF;
890
891                         memset(&key, 0, sizeof(key));
892                         memset(&data, 0, sizeof(data));
893                         key.data = &shortkeyid;
894                         key.size = sizeof(shortkeyid);
895                         data.data = &keyid;
896                         data.size = sizeof(keyid);
897
898                         ret = cursor->c_get(cursor,
899                                 &key,
900                                 &data,
901                                 DB_GET_BOTH);
902
903                         if (ret == 0) {
904                                 ret = cursor->c_del(cursor, 0);
905                                 if (ret != 0) {
906                                         logthing(LOGTHING_ERROR,
907                                                 "Problem deleting short"
908                                                 " keyid: %s",
909                                                 db_strerror(ret));
910                                 }
911                         }
912
913                         if (ret != 0) {
914                                 logthing(LOGTHING_ERROR,
915                                         "Problem deleting short keyid: %s",
916                                         db_strerror(ret));
917                                 if (ret == DB_LOCK_DEADLOCK) {
918                                         deadlock = true;
919                                 }
920                         }
921                 }
922                 if (subkeyids != NULL) {
923                         free(subkeyids);
924                         subkeyids = NULL;
925                 }
926
927                 ret = cursor->c_close(cursor);
928                 cursor = NULL;
929         }
930
931         if (!deadlock) {
932                 key.data = &keyid;
933                 key.size = sizeof(keyid);
934
935                 keydb(keyid)->del(keydb(keyid),
936                                 txn,
937                                 &key,
938                                 0); /* flags */
939         }
940
941         if (!intrans) {
942                 endtrans();
943         }
944
945         return deadlock ? (-1) : (ret == DB_NOTFOUND);
946 }
947
948 /**
949  *      iterate_keys - call a function once for each key in the db.
950  *      @iterfunc: The function to call.
951  *      @ctx: A context pointer
952  *
953  *      Calls iterfunc once for each key in the database. ctx is passed
954  *      unaltered to iterfunc. This function is intended to aid database dumps
955  *      and statistic calculations.
956  *
957  *      Returns the number of keys we iterated over.
958  */
959 static int db4_iterate_keys(void (*iterfunc)(void *ctx,
960                 struct openpgp_publickey *key), void *ctx)
961 {
962         DBT                         dbkey, data;
963         DBC                        *cursor = NULL;
964         int                         ret = 0;
965         int                         i = 0;
966         int                         numkeys = 0;
967         struct buffer_ctx           fetchbuf;
968         struct openpgp_packet_list *packets = NULL;
969         struct openpgp_publickey   *key = NULL;
970
971         for (i = 0; i < numdbs; i++) {
972                 ret = dbconns[i]->cursor(dbconns[i],
973                         NULL,
974                         &cursor,
975                         0);   /* flags */
976
977                 memset(&dbkey, 0, sizeof(dbkey));
978                 memset(&data, 0, sizeof(data));
979                 ret = cursor->c_get(cursor, &dbkey, &data, DB_NEXT);
980                 while (ret == 0) {
981                         fetchbuf.buffer = data.data;
982                         fetchbuf.offset = 0;
983                         fetchbuf.size = data.size;
984                         read_openpgp_stream(buffer_fetchchar, &fetchbuf,
985                                 &packets, 0);
986                         parse_keys(packets, &key);
987
988                         iterfunc(ctx, key);
989                         
990                         free_publickey(key);
991                         key = NULL;
992                         free_packet_list(packets);
993                         packets = NULL;
994                         
995                         memset(&dbkey, 0, sizeof(dbkey));
996                         memset(&data, 0, sizeof(data));
997                         ret = cursor->c_get(cursor, &dbkey, &data,
998                                         DB_NEXT);
999                         numkeys++;
1000                 }
1001                 if (ret != DB_NOTFOUND) {
1002                         logthing(LOGTHING_ERROR,
1003                                 "Problem reading key: %s",
1004                                 db_strerror(ret));
1005                 }
1006
1007                 ret = cursor->c_close(cursor);
1008                 cursor = NULL;
1009         }
1010         
1011         return numkeys;
1012 }
1013
1014 /**
1015  *      getfullkeyid - Maps a 32bit key id to a 64bit one.
1016  *      @keyid: The 32bit keyid.
1017  *
1018  *      This function maps a 32bit key id to the full 64bit one. It returns the
1019  *      full keyid. If the key isn't found a keyid of 0 is returned.
1020  */
1021 static uint64_t db4_getfullkeyid(uint64_t keyid)
1022 {
1023         DBT       key, data;
1024         DBC      *cursor = NULL;
1025         uint32_t  shortkeyid = 0;
1026         int       ret = 0;
1027
1028         if (keyid < 0x100000000LL) {
1029                 ret = id32db->cursor(id32db,
1030                                 txn,
1031                                 &cursor,
1032                                 0);   /* flags */
1033
1034                 shortkeyid = keyid & 0xFFFFFFFF;
1035
1036                 memset(&key, 0, sizeof(key));
1037                 memset(&data, 0, sizeof(data));
1038                 key.data = &shortkeyid;
1039                 key.size = sizeof(shortkeyid);
1040                 data.flags = DB_DBT_MALLOC;
1041
1042                 ret = cursor->c_get(cursor,
1043                         &key,
1044                         &data,
1045                         DB_SET);
1046
1047                 if (ret == 0) {
1048                         keyid = *(uint64_t *) data.data;
1049
1050                         if (data.data != NULL) {
1051                                 free(data.data);
1052                                 data.data = NULL;
1053                         }
1054                 }
1055
1056                 ret = cursor->c_close(cursor);
1057                 cursor = NULL;
1058         }
1059         
1060         return keyid;
1061 }
1062
1063 /*
1064  * Include the basic keydb routines.
1065  */
1066 #define NEED_GETKEYSIGS 1
1067 #define NEED_KEYID2UID 1
1068 #define NEED_UPDATEKEYS 1
1069 #include "keydb.c"