]> git.sommitrealweird.co.uk Git - onak.git/blob - onak.c
f673bd38b5038dcb26042f6dcb6a92038c7bec39
[onak.git] / onak.c
1 /*
2  * onak.c - An OpenPGP keyserver.
3  *
4  * This is the main swiss army knife binary.
5  *
6  * Jonathan McDowell <noodles@earth.li>
7  * 
8  * Copyright 2002 Project Purple
9  */
10
11 #include <stdio.h>
12 #include <stdlib.h>
13 #include <string.h>
14 #include <unistd.h>
15
16 #include "armor.h"
17 #include "keydb.h"
18 #include "keyid.h"
19 #include "keyindex.h"
20 #include "keystructs.h"
21 #include "mem.h"
22 #include "merge.h"
23 #include "onak-conf.h"
24 #include "parsekey.h"
25
26 int stdin_getchar(void *ctx, size_t count, unsigned char *c)
27 {
28         int ic;
29
30         do {
31                 ic = getchar();
32                 *c = ic;
33                 c++;
34         } while ((ic != EOF) && (--count > 0));
35         return (ic == EOF);
36 }
37
38 int stdout_putchar(void *ctx, size_t count, unsigned char *c)
39 {
40         int i;
41
42         for (i = 0; i < count; i++) {
43                 putchar(c[i]);
44         }
45         return 0;
46 }
47
48 void find_keys(char *search, uint64_t keyid, bool ishex,
49                 bool fingerprint, bool exact, bool verbose)
50 {
51         struct openpgp_publickey *publickey = NULL;
52         int count = 0;
53
54         if (ishex) {
55                 count = fetch_key(keyid, &publickey, false);
56         } else {
57                 count = fetch_key_text(search, &publickey);
58         }
59         if (publickey != NULL) {
60                 key_index(publickey, verbose, fingerprint, false);
61                 free_publickey(publickey);
62         } else if (count == 0) {
63                 puts("Key not found.");
64         } else {
65                 printf("Found %d keys, but maximum number to return is %d.\n",
66                                 count,
67                                 config.maxkeys);
68                 puts("Try again with a more specific search.");
69         }
70 }
71
72 void usage(void) {
73         puts("onak " VERSION " - an OpenPGP keyserver.\n");
74         puts("Usage:\n");
75         puts("\tonak [options] <command> <parameters>\n");
76         puts("\tCommands:\n");
77         puts("\tadd    - read armored OpenPGP keys from stdin and add to the"
78                 " keyserver");
79         puts("\tdelete - delete a given key from the keyserver");
80         puts("\tget    - retrieves the key requested from the keyserver");
81         puts("\tindex  - search for a key and list it");
82         puts("\tvindex - search for a key and list it and its signatures");
83 }
84
85 int main(int argc, char *argv[])
86 {
87         struct openpgp_packet_list      *packets = NULL;
88         struct openpgp_packet_list      *list_end = NULL;
89         struct openpgp_publickey        *keys = NULL;
90         int                              rc = EXIT_SUCCESS;
91         int                              result = 0;
92         char                            *search = NULL;
93         char                            *end = NULL;
94         uint64_t                         keyid = 0;
95         bool                             ishex = false;
96         bool                             verbose = false;
97         bool                             update = false;
98         bool                             binary = false;
99         bool                             fingerprint = false;
100         int                              optchar;
101
102         while ((optchar = getopt(argc, argv, "bfuv")) != -1 ) {
103                 switch (optchar) {
104                 case 'b': 
105                         binary = true;
106                         break;
107                 case 'f': 
108                         fingerprint = true;
109                         break;
110                 case 'u': 
111                         update = true;
112                         break;
113                 case 'v': 
114                         verbose = true;
115                         break;
116                 }
117         }
118
119         readconfig();
120
121         if ((argc - optind) < 1) {
122                 usage();
123         } else if (!strcmp("dump", argv[optind])) {
124                 initdb();
125                 dumpdb("keydump");
126                 cleanupdb();
127         } else if (!strcmp("add", argv[optind])) {
128                 if (binary) {
129                         result = read_openpgp_stream(stdin_getchar, NULL,
130                                  &packets);
131                         if (verbose) {
132                                 fprintf(stderr,
133                                         "read_openpgp_stream: %d\n", result);
134                         }
135                 } else {
136                         dearmor_openpgp_stream(stdin_getchar, NULL, &packets);
137                 }
138                 if (packets != NULL) {
139                         result = parse_keys(packets, &keys);
140                         free_packet_list(packets);
141                         packets = NULL;
142                         if (verbose) {
143                                 fprintf(stderr, "Finished reading %d keys.\n",
144                                         result);
145                         }
146
147                         initdb();
148                         fprintf(stderr, "Got %d new keys.\n",
149                                         update_keys(&keys, verbose));
150                         if (keys != NULL && update) {
151                                 flatten_publickey(keys,
152                                         &packets,
153                                         &list_end);
154                                 armor_openpgp_stream(stdout_putchar,
155                                         NULL,
156                                         packets);
157                                 free_packet_list(packets);
158                                 packets = NULL;
159                         }
160                         cleanupdb();
161                 } else {
162                         rc = 1;
163                         fprintf(stderr, "No keys read.\n");
164                 }
165
166                 if (keys != NULL) {
167                         free_publickey(keys);
168                         keys = NULL;
169                 } else {
170                         rc = 1;
171                         fprintf(stderr, "No changes.\n");
172                 }
173         } else if ((argc - optind) == 2) {
174                 search = argv[optind+1];
175                 if (search != NULL) {
176                         keyid = strtoul(search, &end, 16);
177                         if (*search != 0 &&
178                                         end != NULL &&
179                                         *end == 0) {
180                                 ishex = true;
181                         }
182                 }
183                 initdb();
184                 if (!strcmp("index", argv[optind])) {
185                         find_keys(search, keyid, ishex, fingerprint,
186                                         false, false);
187                 } else if (!strcmp("vindex", argv[optind])) {
188                         find_keys(search, keyid, ishex, fingerprint,
189                                         false, true);
190                 } else if (!strcmp("delete", argv[optind])) {
191                         delete_key(getfullkeyid(keyid), false);
192                 } else if (!strcmp("get", argv[optind])) {
193                         if (fetch_key(keyid, &keys, false)) {
194                                 if (verbose) {
195                                         fprintf(stderr, "Got key.\n");
196                                 }
197                                 flatten_publickey(keys,
198                                                 &packets,
199                                                 &list_end);
200                                 armor_openpgp_stream(stdout_putchar,
201                                                 NULL,
202                                                 packets);
203                                 free_packet_list(packets);
204                                 packets = NULL;
205                         } else {
206                                 puts("Key not found");
207                         }
208                 }
209                 cleanupdb();
210         } else {
211                 usage();
212         }
213
214         cleanupconfig();
215
216         return rc;
217 }