]> git.sommitrealweird.co.uk Git - onak.git/blobdiff - gpgwww.c
Fix path bug in sendkeysync.
[onak.git] / gpgwww.c
index bb8a446cd4be840df0be7c8119ae56776478f3cc..44c226ccae6c7a849f7220d1316710ac28482986 100644 (file)
--- a/gpgwww.c
+++ b/gpgwww.c
@@ -6,20 +6,31 @@
  * Copyright 2001-2002 Project Purple.
  */
 
  * Copyright 2001-2002 Project Purple.
  */
 
-// #include <stdint.h>
 #include <inttypes.h>
 #include <stdio.h>
 #include <stdlib.h>
 #include <inttypes.h>
 #include <stdio.h>
 #include <stdlib.h>
+#include <string.h>
 
 
+#include "armor.h"
+#include "charfuncs.h"
+#include "cleanup.h"
+#include "config.h"
 #include "getcgi.h"
 #include "hash.h"
 #include "keydb.h"
 #include "getcgi.h"
 #include "hash.h"
 #include "keydb.h"
+#include "log.h"
+#include "mem.h"
 #include "onak-conf.h"
 #include "onak-conf.h"
+#include "parsekey.h"
 #include "stats.h"
 
 #include "stats.h"
 
-void parsecgistuff(char **cgiparams, uint64_t *from, uint64_t *to)
+#define OP_UNKNOWN 0
+#define OP_GET     1
+
+int parsecgistuff(char **cgiparams, uint64_t *from, uint64_t *to)
 {
        int i = 0;
 {
        int i = 0;
+       int op = OP_UNKNOWN;
 
        if (cgiparams != NULL) {
                i = 0;
 
        if (cgiparams != NULL) {
                i = 0;
@@ -28,24 +39,112 @@ void parsecgistuff(char **cgiparams, uint64_t *from, uint64_t *to)
                                *to = strtoul(cgiparams[i+1], NULL, 16);
                        } else if (!strcmp(cgiparams[i], "from")) {
                                *from = strtoul(cgiparams[i+1], NULL, 16);
                                *to = strtoul(cgiparams[i+1], NULL, 16);
                        } else if (!strcmp(cgiparams[i], "from")) {
                                *from = strtoul(cgiparams[i+1], NULL, 16);
+                       } else if (!strcmp(cgiparams[i], "op")) {
+                               if (!strcmp(cgiparams[i+1], "get")) {
+                                       op = OP_GET;
+                               }
                        }
                        i += 2;
                }
        }
 
                        }
                        i += 2;
                }
        }
 
-       return;
+       return op;
+}
+
+int getkeyspath(uint64_t have, uint64_t want, int count)
+{
+       struct openpgp_publickey *publickey = NULL;
+       struct openpgp_packet_list *packets = NULL;
+       struct openpgp_packet_list *list_end = NULL;
+       struct stats_key *keyinfoa, *keyinfob, *curkey;
+       uint64_t fullhave, fullwant;
+       int rec;
+       int pathlen = 0;
+
+       fullhave = getfullkeyid(have);
+       fullwant = getfullkeyid(want);
+
+       /*
+        * Make sure the keys we have and want are in the cache.
+        */
+       cached_getkeysigs(fullhave);
+       cached_getkeysigs(fullwant);
+
+       if ((keyinfoa = findinhash(fullhave)) == NULL) {
+               return 1;
+       }
+       if ((keyinfob = findinhash(fullwant)) == NULL) {
+               return 1;
+       }
+       
+       while ((!cleanup()) && (pathlen < count)) {
+               /*
+                * Fill the tree info up.
+                */
+               initcolour(true);
+               rec = findpath(keyinfoa, keyinfob);
+               keyinfob->parent = 0;
+               if (keyinfoa->colour == 0) {
+                       pathlen = count;
+               } else {
+                       /*
+                        * Skip the first key, as the remote user will already
+                        * have it
+                        */
+                       curkey = findinhash(keyinfoa->parent);
+                       while (curkey != NULL && curkey->keyid != 0) {
+                               if (curkey->keyid != fullwant && fetch_key(
+                                               curkey->keyid,
+                                                       &publickey, false)) {
+                                       flatten_publickey(publickey,
+                                                       &packets,
+                                                       &list_end);
+                                       free_publickey(publickey);
+                                       publickey = NULL;
+                               }
+                               if (curkey != keyinfoa && curkey != keyinfob) {
+                                       curkey->disabled = true;
+                               }
+                               curkey = findinhash(curkey->parent);
+                       }
+               }
+               pathlen++;
+       }
+
+       /*
+        * Add the destination key to the list of returned keys.
+        */
+       if (fetch_key(fullwant, &publickey, false)) {
+               flatten_publickey(publickey,
+                               &packets,
+                               &list_end);
+               free_publickey(publickey);
+               publickey = NULL;
+       }
+
+       armor_openpgp_stream(stdout_putchar, NULL, packets);
+       free_packet_list(packets);
+       packets = list_end = NULL;
+
+       return 0;
 }
 
 int main(int argc, char *argv[])
 {
 }
 
 int main(int argc, char *argv[])
 {
-       char **cgiparams = NULL;        /* Our CGI parameter block */
-       uint64_t from = 0, to = 0;
+       char     **cgiparams = NULL;    /* Our CGI parameter block */
+       uint64_t   from = 0, to = 0;
+       int        op = OP_UNKNOWN;
 
        cgiparams = getcgivars(argc, argv);
 
 
        cgiparams = getcgivars(argc, argv);
 
-       start_html("Experimental PGP key path finder results");
 
 
-       parsecgistuff(cgiparams, &from, &to);
+       op = parsecgistuff(cgiparams, &from, &to);
+       
+       if (op != OP_GET) {
+               start_html("Experimental PGP key path finder results");
+       } else {
+               puts("Content-Type: text/plain\n");
+       }
 
        if (from == 0 || to == 0) {
                printf("Must pass from & to\n");
 
        if (from == 0 || to == 0) {
                printf("Must pass from & to\n");
@@ -53,17 +152,47 @@ int main(int argc, char *argv[])
                exit(1);
        }
 
                exit(1);
        }
 
-       printf("<P>Looking for path from 0x%llX to 0x%llX</P>\n", from, to);
-       readconfig();
-       initdb();
+       if (op != OP_GET) {
+               printf("<P>Looking for path from 0x%llX to 0x%llX.\n",
+                               from, to);
+               printf("<A HREF=\"gpgwww?from=0x%08llX&to=0x%08llX\">"
+                               "Find reverse path</A>\n",
+                               to,
+                               from);
+               printf("<A HREF=\"gpgwww?from=0x%08llX&to=0x%08llX&op=get\">"
+                               "Get all keys listed</A></P>\n",
+                               from,
+                               to);
+       }
+
+       readconfig(NULL);
+       initlogthing("gpgwww", config.logfile);
+       catchsignals();
+       initdb(true);
        inithash();
        inithash();
-       dofindpath(from, to, true);
+       logthing(LOGTHING_NOTICE, "Looking for path from 0x%llX to 0x%llX.",
+                       from,
+                       to);
+       if (op == OP_GET) {
+               getkeyspath(from, to, 3);
+       } else {
+               dofindpath(from, to, true, 3);
+       }
        destroyhash();
        cleanupdb();
        destroyhash();
        cleanupdb();
+       cleanuplogthing();
+       cleanupconfig();
+
+       if (op != OP_GET) {
+               puts("<HR>");
+               puts("Produced by gpgwww " PACKAGE_VERSION ", part of onak. "
+                       "<A HREF=\"mailto:noodles-onak@earth.li\">"
+                       "Jonathan McDowell</A>");
+               end_html();
+       }
 
 
-       puts("<HR>");
-       puts("Produced by gpgwww " VERSION ", part of onak. <A HREF=\"mailto:noodles-onak@earth.li\">Jonathan McDowell</A>");
-       end_html();
+       cleanupcgi(cgiparams);
+       cgiparams = NULL;
 
        return EXIT_SUCCESS;
 }
 
        return EXIT_SUCCESS;
 }