/* hkp.c - Horrowitz Keyserver Protocol * Copyright (C) 1999 Free Software Foundation, Inc. * * This file is part of GnuPG. * * GnuPG is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * GnuPG is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA */ #include #include #include #include #include #include #include #include "errors.h" #include "util.h" #include "ttyio.h" #include "i18n.h" #include #include "options.h" #include "filter.h" #include "http.h" #include "main.h" static int urlencode_filter( void *opaque, int control, IOBUF a, byte *buf, size_t *ret_len); /**************** * Try to import the key with KEYID from a keyserver but ask the user * before doing so. * Returns: 0 the key was successfully imported * -1 key not found on server or user does not want to * import the key * or other error codes. */ int hkp_ask_import( u32 *keyid ) { #ifdef HAVE_DOSISH_SYSTEM return -1; #else struct http_context hd; char *request; int rc; if( !opt.keyserver_name ) return -1; log_info("requesting key %08lX from %s ...\n", (ulong)keyid[1], opt.keyserver_name ); request = gcry_xmalloc( strlen( opt.keyserver_name ) + 100 ); /* hkp does not accept the long keyid - we should really write a * nicer one */ sprintf( request, "x-hkp://%s:11371/pks/lookup?op=get&search=0x%08lX", opt.keyserver_name, (ulong)keyid[1] ); rc = http_open_document( &hd, request, 0 ); if( rc ) { log_info("can't get key from keyserver: %s\n", rc == GPGERR_NETWORK? strerror(errno) : gpg_errstr(rc) ); } else { rc = import_keys_stream( hd.fp_read , 0 ); http_close( &hd ); } gcry_free( request ); return rc; #endif } int hkp_import( STRLIST users ) { #ifdef HAVE_DOSISH_SYSTEM return -1; #else if( !opt.keyserver_name ) { log_error("no keyserver known (use option --keyserver)\n"); return -1; } for( ; users; users = users->next ) { u32 kid[2]; int type = classify_user_id( users->d, kid, NULL, NULL, NULL ); if( type != 10 && type != 11 ) { log_info("%s: not a valid key ID\n", users->d ); continue; } hkp_ask_import( kid ); } return 0; #endif } int hkp_export( STRLIST users ) { #ifdef HAVE_DOSISH_SYSTEM return -1; #else int rc; armor_filter_context_t afx; IOBUF temp = iobuf_temp(); struct http_context hd; char *request; unsigned int status; if( !opt.keyserver_name ) { log_error("no keyserver known (use option --keyserver)\n"); return -1; } iobuf_push_filter( temp, urlencode_filter, NULL ); memset( &afx, 0, sizeof afx); afx.what = 1; iobuf_push_filter( temp, armor_filter, &afx ); rc = export_pubkeys_stream( temp, users, 1 ); if( rc == -1 ) { iobuf_close(temp); return 0; } iobuf_flush_temp( temp ); request = gcry_xmalloc( strlen( opt.keyserver_name ) + 100 ); sprintf( request, "x-hkp://%s:11371/pks/add", opt.keyserver_name ); rc = http_open( &hd, HTTP_REQ_POST, request , 0 ); if( rc ) { log_error("can't connect to `%s': %s\n", opt.keyserver_name, rc == GPGERR_NETWORK? strerror(errno) : gpg_errstr(rc) ); iobuf_close(temp); gcry_free( request ); return rc; } sprintf( request, "Content-Length: %u\n", (unsigned)iobuf_get_temp_length(temp) + 9 ); iobuf_writestr( hd.fp_write, request ); gcry_free( request ); http_start_data( &hd ); iobuf_writestr( hd.fp_write, "keytext=" ); iobuf_write( hd.fp_write, iobuf_get_temp_buffer(temp), iobuf_get_temp_length(temp) ); iobuf_put( hd.fp_write, '\n' ); iobuf_flush_temp( temp ); iobuf_close(temp); rc = http_wait_response( &hd, &status ); if( rc ) { log_error("error sending to `%s': %s\n", opt.keyserver_name, gpg_errstr(rc) ); } else { #if 1 if( opt.verbose ) { int c; while( (c=iobuf_get(hd.fp_read)) != EOF ) putchar( c ); } #endif if( (status/100) == 2 ) log_info("success sending to `%s' (status=%u)\n", opt.keyserver_name, status ); else log_error("failed sending to `%s': status=%u\n", opt.keyserver_name, status ); } http_close( &hd ); return rc; #endif } static int urlencode_filter( void *opaque, int control, IOBUF a, byte *buf, size_t *ret_len) { size_t size = *ret_len; int rc=0; if( control == IOBUFCTRL_FLUSH ) { const byte *p; for(p=buf; size; p++, size-- ) { if( isalnum(*p) || *p == '-' ) iobuf_put( a, *p ); else if( *p == ' ' ) iobuf_put( a, '+' ); else { char numbuf[5]; sprintf(numbuf, "%%%02X", *p ); iobuf_writestr(a, numbuf ); } } } else if( control == IOBUFCTRL_DESC ) *(char**)buf = "urlencode_filter"; return rc; }