Add /pks/hashquery
[onak.git] / onak.c
diff --git a/onak.c b/onak.c
index 40e8b0e09277850b8beb4fa6c2465c16726f9efe..4ba3a7abda38e76852f0150e1989a903a89fb7aa 100644 (file)
--- a/onak.c
+++ b/onak.c
@@ -21,7 +21,6 @@
 #include "charfuncs.h"
 #include "cleankey.h"
 #include "cleanup.h"
-#include "config.h"
 #include "keydb.h"
 #include "keyid.h"
 #include "keyindex.h"
 #include "onak-conf.h"
 #include "parsekey.h"
 #include "photoid.h"
+#include "version.h"
 
 void find_keys(char *search, uint64_t keyid, bool ishex,
-               bool fingerprint, bool exact, bool verbose)
+               bool fingerprint, bool skshash, bool exact, bool verbose)
 {
        struct openpgp_publickey *publickey = NULL;
        int count = 0;
@@ -45,7 +45,7 @@ void find_keys(char *search, uint64_t keyid, bool ishex,
                count = config.dbbackend->fetch_key_text(search, &publickey);
        }
        if (publickey != NULL) {
-               key_index(publickey, verbose, fingerprint, false);
+               key_index(publickey, verbose, fingerprint, skshash, false);
                free_publickey(publickey);
        } else if (count == 0) {
                puts("Key not found.");
@@ -93,7 +93,7 @@ void dump_func(void *ctx, struct openpgp_publickey *key)
 }
 
 void usage(void) {
-       puts("onak " PACKAGE_VERSION " - an OpenPGP keyserver.\n");
+       puts("onak " ONAK_VERSION " - an OpenPGP keyserver.\n");
        puts("Usage:\n");
        puts("\tonak [options] <command> <parameters>\n");
        puts("\tCommands:\n");
@@ -128,10 +128,12 @@ int main(int argc, char *argv[])
        bool                             update = false;
        bool                             binary = false;
        bool                             fingerprint = false;
+       bool                             skshash = false;
        int                              optchar;
        struct dump_ctx                  dumpstate;
+       struct skshash                   hash;
 
-       while ((optchar = getopt(argc, argv, "bc:fuv")) != -1 ) {
+       while ((optchar = getopt(argc, argv, "bc:fsuv")) != -1 ) {
                switch (optchar) {
                case 'b': 
                        binary = true;
@@ -142,6 +144,9 @@ int main(int argc, char *argv[])
                case 'f': 
                        fingerprint = true;
                        break;
+               case 's': 
+                       skshash = true;
+                       break;
                case 'u': 
                        update = true;
                        break;
@@ -161,7 +166,7 @@ int main(int argc, char *argv[])
        } else if (!strcmp("dump", argv[optind])) {
                config.dbbackend->initdb(true);
                dumpstate.count = dumpstate.filenum = 0;
-               dumpstate.maxcount = 1000000;
+               dumpstate.maxcount = 100000;
                dumpstate.fd = -1;
                dumpstate.filebase = "keydump.%d.pgp";
                config.dbbackend->iterate_keys(dump_func, &dumpstate);
@@ -282,10 +287,10 @@ int main(int argc, char *argv[])
                }
                config.dbbackend->initdb(false);
                if (!strcmp("index", argv[optind])) {
-                       find_keys(search, keyid, ishex, fingerprint,
+                       find_keys(search, keyid, ishex, fingerprint, skshash,
                                        false, false);
                } else if (!strcmp("vindex", argv[optind])) {
-                       find_keys(search, keyid, ishex, fingerprint,
+                       find_keys(search, keyid, ishex, fingerprint, skshash,
                                        false, true);
                } else if (!strcmp("getphoto", argv[optind])) {
                        if (!ishex) {
@@ -336,6 +341,30 @@ int main(int argc, char *argv[])
                        } else {
                                puts("Key not found");
                        }
+               } else if (!strcmp("hget", argv[optind])) {
+                       if (!parse_skshash(search, &hash)) {
+                               puts("Couldn't parse sks hash.");
+                       } else if (config.dbbackend->fetch_key_skshash(&hash,
+                                       &keys)) {
+                               logthing(LOGTHING_INFO, "Got key.");
+                               flatten_publickey(keys,
+                                               &packets,
+                                               &list_end);
+                               free_publickey(keys);
+                               if (binary) {
+                                       write_openpgp_stream(stdout_putchar,
+                                               NULL,
+                                               packets);
+                               } else {
+                                       armor_openpgp_stream(stdout_putchar,
+                                               NULL,
+                                               packets);
+                               }
+                               free_packet_list(packets);
+                               packets = NULL;
+                       } else {
+                               puts("Key not found");
+                       }
                }
                config.dbbackend->cleanupdb();
        } else {