|
|
/* ks-engine-hkp.c - HKP keyserver engine |
|
|
* Copyright (C) 2011, 2012 Free Software Foundation, Inc. |
|
|
* Copyright (C) 2011, 2012, 2014 Werner Koch |
|
|
* |
|
|
* This file is part of GnuPG. |
|
|
* |
|
|
* GnuPG is free software; you can redistribute it and/or modify |
|
|
* it under the terms of the GNU General Public License as published by |
|
|
* the Free Software Foundation; either version 3 of the License, or |
|
|
* (at your option) any later version. |
|
|
* |
|
|
* GnuPG is distributed in the hope that it will be useful, |
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
|
* GNU General Public License for more details. |
|
|
* |
|
|
* You should have received a copy of the GNU General Public License |
|
|
* along with this program; if not, see <https://www.gnu.org/licenses/>. |
|
|
*/ |
|
|
|
|
|
#include <config.h> |
|
|
|
|
|
#include <stdio.h> |
|
|
#include <stdlib.h> |
|
|
#include <string.h> |
|
|
#include <assert.h> |
|
|
#ifdef HAVE_W32_SYSTEM |
|
|
# ifdef HAVE_WINSOCK2_H |
|
|
# include <winsock2.h> |
|
|
# endif |
|
|
# include <windows.h> |
|
|
#else /*!HAVE_W32_SYSTEM*/ |
|
|
# include <sys/types.h> |
|
|
# include <sys/socket.h> |
|
|
# include <netdb.h> |
|
|
#endif /*!HAVE_W32_SYSTEM*/ |
|
|
|
|
|
#include <npth.h> |
|
|
#include "dirmngr.h" |
|
|
#include "misc.h" |
|
|
#include "../common/userids.h" |
|
|
#include "dns-stuff.h" |
|
|
#include "ks-engine.h" |
|
|
|
|
|
/* Substitutes for missing Mingw macro. The EAI_SYSTEM mechanism |
|
|
seems not to be available (probably because there is only one set |
|
|
of error codes anyway). For now we use WSAEINVAL. */ |
|
|
#ifndef EAI_OVERFLOW |
|
|
# define EAI_OVERFLOW EAI_FAIL |
|
|
#endif |
|
|
#ifdef HAVE_W32_SYSTEM |
|
|
# ifndef EAI_SYSTEM |
|
|
# define EAI_SYSTEM WSAEINVAL |
|
|
# endif |
|
|
#endif |
|
|
|
|
|
|
|
|
/* Number of seconds after a host is marked as resurrected. */ |
|
|
#define RESURRECT_INTERVAL (3600+1800) /* 1.5 hours */ |
|
|
|
|
|
/* To match the behaviour of our old gpgkeys helper code we escape |
|
|
more characters than actually needed. */ |
|
|
#define EXTRA_ESCAPE_CHARS "@!\"#$%&'()*+,-./:;<=>?[\\]^_{|}~" |
|
|
|
|
|
/* How many redirections do we allow. */ |
|
|
#define MAX_REDIRECTS 2 |
|
|
|
|
|
/* Number of retries done for a dead host etc. */ |
|
|
#define SEND_REQUEST_RETRIES 3 |
|
|
|
|
|
/* Number of retries done in case of transient errors. */ |
|
|
#define SEND_REQUEST_EXTRA_RETRIES 5 |
|
|
|
|
|
|
|
|
enum ks_protocol { KS_PROTOCOL_HKP, KS_PROTOCOL_HKPS, KS_PROTOCOL_MAX }; |
|
|
|
|
|
/* Objects used to maintain information about hosts. */ |
|
|
struct hostinfo_s; |
|
|
typedef struct hostinfo_s *hostinfo_t; |
|
|
struct hostinfo_s |
|
|
{ |
|
|
time_t lastfail; /* Time we tried to connect and failed. */ |
|
|
time_t lastused; /* Time of last use. */ |
|
|
int *pool; /* An array with indices into HOSTTABLE or NULL |
|
|
if NAME is not a pool name. */ |
|
|
size_t pool_len; /* Length of POOL. */ |
|
|
size_t pool_size; /* Allocated size of POOL. */ |
|
|
#define MAX_POOL_SIZE 128 |
|
|
int poolidx; /* Index into POOL with the used host. -1 if not set. */ |
|
|
unsigned int v4:1; /* Host supports AF_INET. */ |
|
|
unsigned int v6:1; /* Host supports AF_INET6. */ |
|
|
unsigned int onion:1;/* NAME is an onion (Tor HS) address. */ |
|
|
unsigned int dead:1; /* Host is currently unresponsive. */ |
|
|
unsigned int iporname_valid:1; /* The field IPORNAME below is valid */ |
|
|
/* (but may be NULL) */ |
|
|
unsigned int did_a_lookup:1; /* Have we done an A lookup yet? */ |
|
|
unsigned int did_srv_lookup:2; /* One bit per protocol indicating |
|
|
whether we already did a SRV |
|
|
lookup. */ |
|
|
time_t died_at; /* The time the host was marked dead. If this is |
|
|
0 the host has been manually marked dead. */ |
|
|
char *cname; /* Canonical name of the host. Only set if this |
|
|
is a pool or NAME has a numerical IP address. */ |
|
|
char *iporname; /* Numeric IP address or name for printing. */ |
|
|
unsigned short port[KS_PROTOCOL_MAX]; |
|
|
/* The port used by the host for all protocols, 0 |
|
|
if unknown. */ |
|
|
char name[1]; /* The hostname. */ |
|
|
}; |
|
|
|
|
|
|
|
|
/* An array of hostinfo_t for all hosts requested by the caller or |
|
|
resolved from a pool name and its allocated size.*/ |
|
|
static hostinfo_t *hosttable; |
|
|
static int hosttable_size; |
|
|
/* A mutex used to serialize access to the hosttable. */ |
|
|
static npth_mutex_t hosttable_lock; |
|
|
|
|
|
/* The number of host slots we initially allocate for HOSTTABLE. */ |
|
|
#define INITIAL_HOSTTABLE_SIZE 50 |
|
|
|
|
|
|
|
|
/* Create a new hostinfo object, fill in NAME and put it into |
|
|
HOSTTABLE. Return the index into hosttable on success or -1 on |
|
|
error. */ |
|
|
static int |
|
|
create_new_hostinfo (const char *name) |
|
|
{ |
|
|
hostinfo_t hi, *newtable; |
|
|
int newsize; |
|
|
int idx, rc; |
|
|
|
|
|
hi = xtrymalloc (sizeof *hi + strlen (name)); |
|
|
if (!hi) |
|
|
return -1; |
|
|
strcpy (hi->name, name); |
|
|
hi->pool = NULL; |
|
|
hi->pool_len = 0; |
|
|
hi->pool_size = 0; |
|
|
hi->poolidx = -1; |
|
|
hi->lastused = (time_t)(-1); |
|
|
hi->lastfail = (time_t)(-1); |
|
|
hi->v4 = 0; |
|
|
hi->v6 = 0; |
|
|
hi->onion = 0; |
|
|
hi->dead = 0; |
|
|
hi->did_a_lookup = 0; |
|
|
hi->did_srv_lookup = 0; |
|
|
hi->iporname_valid = 0; |
|
|
hi->died_at = 0; |
|
|
hi->cname = NULL; |
|
|
hi->iporname = NULL; |
|
|
hi->port[KS_PROTOCOL_HKP] = 0; |
|
|
hi->port[KS_PROTOCOL_HKPS] = 0; |
|
|
|
|
|
/* Add it to the hosttable. */ |
|
|
for (idx=0; idx < hosttable_size; idx++) |
|
|
if (!hosttable[idx]) |
|
|
{ |
|
|
hosttable[idx] = hi; |
|
|
return idx; |
|
|
} |
|
|
/* Need to extend the hosttable. */ |
|
|
newsize = hosttable_size + INITIAL_HOSTTABLE_SIZE; |
|
|
newtable = xtryrealloc (hosttable, newsize * sizeof *hosttable); |
|
|
if (!newtable) |
|
|
{ |
|
|
xfree (hi); |
|
|
return -1; |
|
|
} |
|
|
hosttable = newtable; |
|
|
idx = hosttable_size; |
|
|
hosttable_size = newsize; |
|
|
rc = idx; |
|
|
hosttable[idx++] = hi; |
|
|
while (idx < hosttable_size) |
|
|
hosttable[idx++] = NULL; |
|
|
|
|
|
return rc; |
|
|
} |
|
|
|
|
|
|
|
|
/* Find the host NAME in our table. Return the index into the |
|
|
hosttable or -1 if not found. */ |
|
|
static int |
|
|
find_hostinfo (const char *name) |
|
|
{ |
|
|
int idx; |
|
|
|
|
|
for (idx=0; idx < hosttable_size; idx++) |
|
|
if (hosttable[idx] && !ascii_strcasecmp (hosttable[idx]->name, name)) |
|
|
return idx; |
|
|
return -1; |
|
|
} |
|
|
|
|
|
|
|
|
static int |
|
|
sort_hostpool (const void *xa, const void *xb) |
|
|
{ |
|
|
int a = *(int *)xa; |
|
|
int b = *(int *)xb; |
|
|
|
|
|
assert (a >= 0 && a < hosttable_size); |
|
|
assert (b >= 0 && b < hosttable_size); |
|
|
assert (hosttable[a]); |
|
|
assert (hosttable[b]); |
|
|
|
|
|
return ascii_strcasecmp (hosttable[a]->name, hosttable[b]->name); |
|
|
} |
|
|
|
|
|
|
|
|
/* Return true if the host with the hosttable index TBLIDX is in HI->pool. */ |
|
|
static int |
|
|
host_in_pool_p (hostinfo_t hi, int tblidx) |
|
|
{ |
|
|
int i, pidx; |
|
|
|
|
|
for (i = 0; i < hi->pool_len && (pidx = hi->pool[i]) != -1; i++) |
|
|
if (pidx == tblidx && hosttable[pidx]) |
|
|
return 1; |
|
|
return 0; |
|
|
} |
|
|
|
|
|
|
|
|
/* Select a random host. Consult HI->pool which indices into the global |
|
|
hosttable. Returns index into HI->pool or -1 if no host could be |
|
|
selected. */ |
|
|
static int |
|
|
select_random_host (hostinfo_t hi) |
|
|
{ |
|
|
int *tbl; |
|
|
size_t tblsize; |
|
|
int pidx, idx; |
|
|
|
|
|
/* CHECKTHIS(); See */ |
|
|
/* https://sources.debian.org/patches/gnupg2/2.2.20-1/dirmngr-idling/dirmngr-hkp-Avoid-potential-race-condition-when-some.patch/ */ |
|
|
|
|
|
/* We create a new table so that we randomly select only from |
|
|
currently alive hosts. */ |
|
|
for (idx = 0, tblsize = 0; |
|
|
idx < hi->pool_len && (pidx = hi->pool[idx]) != -1; |
|
|
idx++) |
|
|
if (hosttable[pidx] && !hosttable[pidx]->dead) |
|
|
tblsize++; |
|
|
if (!tblsize) |
|
|
return -1; /* No hosts. */ |
|
|
|
|
|
tbl = xtrymalloc (tblsize * sizeof *tbl); |
|
|
if (!tbl) |
|
|
return -1; |
|
|
for (idx = 0, tblsize = 0; |
|
|
idx < hi->pool_len && (pidx = hi->pool[idx]) != -1; |
|
|
idx++) |
|
|
if (hosttable[pidx] && !hosttable[pidx]->dead) |
|
|
tbl[tblsize++] = pidx; |
|
|
|
|
|
if (tblsize == 1) /* Save a get_uint_nonce. */ |
|
|
pidx = tbl[0]; |
|
|
else |
|
|
pidx = tbl[get_uint_nonce () % tblsize]; |
|
|
|
|
|
xfree (tbl); |
|
|
return pidx; |
|
|
} |
|
|
|
|
|
|
|
|
/* Figure out if a set of DNS records looks like a pool. */ |
|
|
static int |
|
|
arecords_is_pool (dns_addrinfo_t aibuf) |
|
|
{ |
|
|
dns_addrinfo_t ai; |
|
|
int n_v6, n_v4; |
|
|
|
|
|
n_v6 = n_v4 = 0; |
|
|
for (ai = aibuf; ai; ai = ai->next) |
|
|
{ |
|
|
if (ai->family == AF_INET6) |
|
|
n_v6++; |
|
|
else if (ai->family == AF_INET) |
|
|
n_v4++; |
|
|
} |
|
|
|
|
|
return n_v6 > 1 || n_v4 > 1; |
|
|
} |
|
|
|
|
|
|
|
|
/* Print a warning iff Tor is not running but Tor has been requested. |
|
|
* Also return true if it is not running. */ |
|
|
static int |
|
|
tor_not_running_p (ctrl_t ctrl) |
|
|
{ |
|
|
assuan_fd_t sock; |
|
|
|
|
|
if (!dirmngr_use_tor ()) |
|
|
return 0; |
|
|
|
|
|
sock = assuan_sock_connect_byname (NULL, 0, 0, NULL, ASSUAN_SOCK_TOR); |
|
|
if (sock != ASSUAN_INVALID_FD) |
|
|
{ |
|
|
assuan_sock_close (sock); |
|
|
return 0; |
|
|
} |
|
|
|
|
|
log_info ("(it seems Tor is not running)\n"); |
|
|
dirmngr_status (ctrl, "WARNING", "tor_not_running 0", |
|
|
"Tor is enabled but the local Tor daemon" |
|
|
" seems to be down", NULL); |
|
|
return 1; |
|
|
} |
|
|
|
|
|
|
|
|
/* Add the host AI under the NAME into the HOSTTABLE. If PORT is not |
|
|
zero, it specifies which port to use to talk to the host for |
|
|
PROTOCOL. If NAME specifies a pool (as indicated by IS_POOL), |
|
|
update the given reference table accordingly. */ |
|
|
static void |
|
|
add_host (ctrl_t ctrl, const char *name, int is_pool, |
|
|
const dns_addrinfo_t ai, |
|
|
enum ks_protocol protocol, unsigned short port) |
|
|
{ |
|
|
gpg_error_t tmperr; |
|
|
char *tmphost; |
|
|
int idx, tmpidx; |
|
|
hostinfo_t host; |
|
|
int i; |
|
|
|
|
|
idx = find_hostinfo (name); |
|
|
host = hosttable[idx]; |
|
|
|
|
|
if (is_pool) |
|
|
{ |
|
|
/* For a pool immediately convert the address to a string. */ |
|
|
tmperr = resolve_dns_addr (ctrl, ai->addr, ai->addrlen, |
|
|
(DNS_NUMERICHOST | DNS_WITHBRACKET), &tmphost); |
|
|
} |
|
|
else if (!is_ip_address (name)) |
|
|
{ |
|
|
/* This is a hostname. Use the name as given without going |
|
|
* through resolve_dns_addr. */ |
|
|
tmphost = xtrystrdup (name); |
|
|
if (!tmphost) |
|
|
tmperr = gpg_error_from_syserror (); |
|
|
else |
|
|
tmperr = 0; |
|
|
} |
|
|
else |
|
|
{ |
|
|
/* Do a PTR lookup on AI. If a name was not found the function |
|
|
* returns the numeric address (with brackets). */ |
|
|
tmperr = resolve_dns_addr (ctrl, ai->addr, ai->addrlen, |
|
|
DNS_WITHBRACKET, &tmphost); |
|
|
} |
|
|
|
|
|
if (tmperr) |
|
|
{ |
|
|
log_info ("resolve_dns_addr failed while checking '%s': %s\n", |
|
|
name, gpg_strerror (tmperr)); |
|
|
} |
|
|
else if (host->pool_len + 1 >= MAX_POOL_SIZE) |
|
|
{ |
|
|
log_error ("resolve_dns_addr for '%s': '%s'" |
|
|
" [index table full - ignored]\n", name, tmphost); |
|
|
} |
|
|
else |
|
|
{ |
|
|
if (!is_pool && is_ip_address (name)) |
|
|
/* Update the original entry. */ |
|
|
tmpidx = idx; |
|
|
else |
|
|
tmpidx = find_hostinfo (tmphost); |
|
|
log_info ("resolve_dns_addr for '%s': '%s'%s\n", |
|
|
name, tmphost, |
|
|
tmpidx == -1? "" : " [already known]"); |
|
|
|
|
|
if (tmpidx == -1) /* Create a new entry. */ |
|
|
tmpidx = create_new_hostinfo (tmphost); |
|
|
|
|
|
if (tmpidx == -1) |
|
|
{ |
|
|
log_error ("map_host for '%s' problem: %s - '%s' [ignored]\n", |
|
|
name, strerror (errno), tmphost); |
|
|
} |
|
|
else /* Set or update the entry. */ |
|
|
{ |
|
|
if (port) |
|
|
hosttable[tmpidx]->port[protocol] = port; |
|
|
|
|
|
if (ai->family == AF_INET6) |
|
|
{ |
|
|
hosttable[tmpidx]->v6 = 1; |
|
|
} |
|
|
else if (ai->family == AF_INET) |
|
|
{ |
|
|
hosttable[tmpidx]->v4 = 1; |
|
|
} |
|
|
else |
|
|
BUG (); |
|
|
|
|
|
/* If we updated the main entry, we're done. */ |
|
|
if (idx == tmpidx) |
|
|
goto leave; |
|
|
|
|
|
/* If we updated an existing entry, we're done. */ |
|
|
for (i = 0; i < host->pool_len; i++) |
|
|
if (host->pool[i] == tmpidx) |
|
|
goto leave; |
|
|
|
|
|
/* Otherwise, we need to add it to the pool. Check if there |
|
|
is space. */ |
|
|
if (host->pool_len + 1 > host->pool_size) |
|
|
{ |
|
|
int *new_pool; |
|
|
size_t new_size; |
|
|
|
|
|
if (host->pool_size == 0) |
|
|
new_size = 4; |
|
|
else |
|
|
new_size = host->pool_size * 2; |
|
|
|
|
|
new_pool = xtryrealloc (host->pool, |
|
|
new_size * sizeof *new_pool); |
|
|
|
|
|
if (new_pool == NULL) |
|
|
goto leave; |
|
|
|
|
|
host->pool = new_pool; |
|
|
host->pool_size = new_size; |
|
|
} |
|
|
|
|
|
/* Finally, add it. */ |
|
|
log_assert (host->pool_len < host->pool_size); |
|
|
host->pool[host->pool_len++] = tmpidx; |
|
|
} |
|
|
} |
|
|
leave: |
|
|
xfree (tmphost); |
|
|
} |
|
|
|
|
|
|
|
|
/* Sort the pool of the given hostinfo HI. */ |
|
|
static void |
|
|
hostinfo_sort_pool (hostinfo_t hi) |
|
|
{ |
|
|
qsort (hi->pool, hi->pool_len, sizeof *hi->pool, sort_hostpool); |
|
|
} |
|
|
|
|
|
/* Map the host name NAME to the actual to be used host name. This |
|
|
* allows us to manage round robin DNS names. We use our own strategy |
|
|
* to choose one of the hosts. For example we skip those hosts which |
|
|
* failed for some time and we stick to one host for a time |
|
|
* independent of DNS retry times. If FORCE_RESELECT is true a new |
|
|
* host is always selected. If SRVTAG is NULL no service record |
|
|
* lookup will be done, if it is set that service name is used. The |
|
|
* selected host is stored as a malloced string at R_HOST; on error |
|
|
* NULL is stored. If we know the port used by the selected host from |
|
|
* a service record, a string representation is written to R_PORTSTR, |
|
|
* otherwise it is left untouched. If R_HTTPFLAGS is not NULL it will |
|
|
* receive flags which are to be passed to http_open. If R_HTTPHOST |
|
|
* is not NULL a malloced name of the host is stored there; this might |
|
|
* be different from R_HOST in case it has been selected from a |
|
|
* pool. */ |
|
|
static gpg_error_t |
|
|
map_host (ctrl_t ctrl, const char *name, const char *srvtag, int force_reselect, |
|
|
enum ks_protocol protocol, char **r_host, char *r_portstr, |
|
|
unsigned int *r_httpflags, char **r_httphost) |
|
|
{ |
|
|
gpg_error_t err = 0; |
|
|
hostinfo_t hi; |
|
|
int idx; |
|
|
dns_addrinfo_t aibuf, ai; |
|
|
int is_pool; |
|
|
int new_hosts = 0; |
|
|
char *cname; |
|
|
|
|
|
*r_host = NULL; |
|
|
if (r_httpflags) |
|
|
*r_httpflags = 0; |
|
|
if (r_httphost) |
|
|
*r_httphost = NULL; |
|
|
|
|
|
/* No hostname means localhost. */ |
|
|
if (!name || !*name) |
|
|
{ |
|
|
*r_host = xtrystrdup ("localhost"); |
|
|
if (!*r_host) |
|
|
return gpg_error_from_syserror (); |
|
|
if (r_httphost) |
|
|
{ |
|
|
*r_httphost = xtrystrdup (*r_host); |
|
|
if (!*r_httphost) |
|
|
{ |
|
|
err = gpg_error_from_syserror (); |
|
|
xfree (*r_host); |
|
|
*r_host = NULL; |
|
|
return err; |
|
|
} |
|
|
} |
|
|
return 0; |
|
|
} |
|
|
|
|
|
/* See whether the host is in our table. */ |
|
|
idx = find_hostinfo (name); |
|
|
if (idx == -1) |
|
|
{ |
|
|
idx = create_new_hostinfo (name); |
|
|
if (idx == -1) |
|
|
return gpg_error_from_syserror (); |
|
|
hi = hosttable[idx]; |
|
|
hi->onion = is_onion_address (name); |
|
|
} |
|
|
else |
|
|
hi = hosttable[idx]; |
|
|
|
|
|
is_pool = hi->pool != NULL; |
|
|
|
|
|
if (srvtag && !is_ip_address (name) |
|
|
&& ! hi->onion |
|
|
&& ! (hi->did_srv_lookup & 1 << protocol)) |
|
|
{ |
|
|
struct srventry *srvs; |
|
|
unsigned int srvscount; |
|
|
|
|
|
/* Check for SRV records. */ |
|
|
err = get_dns_srv (ctrl, name, srvtag, NULL, &srvs, &srvscount); |
|
|
if (err) |
|
|
{ |
|
|
if (gpg_err_code (err) == GPG_ERR_ECONNREFUSED) |
|
|
tor_not_running_p (ctrl); |
|
|
return err; |
|
|
} |
|
|
|
|
|
if (srvscount > 0) |
|
|
{ |
|
|
int i; |
|
|
if (! is_pool) |
|
|
is_pool = srvscount > 1; |
|
|
|
|
|
for (i = 0; i < srvscount; i++) |
|
|
{ |
|
|
err = resolve_dns_name (ctrl, srvs[i].target, 0, |
|
|
AF_UNSPEC, SOCK_STREAM, |
|
|
&ai, &cname); |
|
|
if (err) |
|
|
continue; |
|
|
dirmngr_tick (ctrl); |
|
|
add_host (ctrl, name, is_pool, ai, protocol, srvs[i].port); |
|
|
new_hosts = 1; |
|
|
} |
|
|
|
|
|
xfree (srvs); |
|
|
} |
|
|
|
|
|
hi->did_srv_lookup |= 1 << protocol; |
|
|
} |
|
|
|
|
|
if (! hi->did_a_lookup |
|
|
&& ! hi->onion) |
|
|
{ |
|
|
/* Find all A records for this entry and put them into the pool |
|
|
list - if any. */ |
|
|
err = resolve_dns_name (ctrl, name, 0, 0, SOCK_STREAM, &aibuf, &cname); |
|
|
if (err) |
|
|
{ |
|
|
log_error ("resolving '%s' failed: %s\n", name, gpg_strerror (err)); |
|
|
err = 0; |
|
|
} |
|
|
else |
|
|
{ |
|
|
/* First figure out whether this is a pool. For a pool we |
|
|
use a different strategy than for a plain server: We use |
|
|
the canonical name of the pool as the virtual host along |
|
|
with the IP addresses. If it is not a pool, we use the |
|
|
specified name. */ |
|
|
if (! is_pool) |
|
|
is_pool = arecords_is_pool (aibuf); |
|
|
if (is_pool && cname) |
|
|
{ |
|
|
hi->cname = cname; |
|
|
cname = NULL; |
|
|
} |
|
|
|
|
|
for (ai = aibuf; ai; ai = ai->next) |
|
|
{ |
|
|
if (ai->family != AF_INET && ai->family != AF_INET6) |
|
|
continue; |
|
|
if (opt.disable_ipv4 && ai->family == AF_INET) |
|
|
continue; |
|
|
if (opt.disable_ipv6 && ai->family == AF_INET6) |
|
|
continue; |
|
|
dirmngr_tick (ctrl); |
|
|
|
|
|
add_host (ctrl, name, is_pool, ai, 0, 0); |
|
|
new_hosts = 1; |
|
|
} |
|
|
|
|
|
hi->did_a_lookup = 1; |
|
|
} |
|
|
xfree (cname); |
|
|
free_dns_addrinfo (aibuf); |
|
|
} |
|
|
if (new_hosts) |
|
|
hostinfo_sort_pool (hi); |
|
|
|
|
|
if (hi->pool) |
|
|
{ |
|
|
/* Deal with the pool name before selecting a host. */ |
|
|
if (r_httphost) |
|
|
{ |
|
|
*r_httphost = xtrystrdup (hi->name); |
|
|
if (!*r_httphost) |
|
|
return gpg_error_from_syserror (); |
|
|
} |
|
|
|
|
|
/* If the currently selected host is now marked dead, force a |
|
|
re-selection . */ |
|
|
if (force_reselect) |
|
|
hi->poolidx = -1; |
|
|
else if (hi->poolidx >= 0 && hi->poolidx < hosttable_size |
|
|
&& hosttable[hi->poolidx] && hosttable[hi->poolidx]->dead) |
|
|
hi->poolidx = -1; |
|
|
|
|
|
/* Select a host if needed. */ |
|
|
if (hi->poolidx == -1) |
|
|
{ |
|
|
hi->poolidx = select_random_host (hi); |
|
|
if (hi->poolidx == -1) |
|
|
{ |
|
|
log_error ("no alive host found in pool '%s'\n", name); |
|
|
if (r_httphost) |
|
|
{ |
|
|
xfree (*r_httphost); |
|
|
*r_httphost = NULL; |
|
|
} |
|
|
return gpg_error (GPG_ERR_NO_KEYSERVER); |
|
|
} |
|
|
} |
|
|
|
|
|
assert (hi->poolidx >= 0 && hi->poolidx < hosttable_size); |
|
|
hi = hosttable[hi->poolidx]; |
|
|
assert (hi); |
|
|
} |
|
|
else if (r_httphost && is_ip_address (hi->name)) |
|
|
{ |
|
|
/* This is a numerical IP address and not a pool. We want to |
|
|
* find the canonical name so that it can be used in the HTTP |
|
|
* Host header. Fixme: We should store that name in the |
|
|
* hosttable. */ |
|
|
char *host; |
|
|
|
|
|
err = resolve_dns_name (ctrl, hi->name, 0, 0, SOCK_STREAM, &aibuf, NULL); |
|
|
if (!err) |
|
|
{ |
|
|
for (ai = aibuf; ai; ai = ai->next) |
|
|
{ |
|
|
if ((!opt.disable_ipv6 && ai->family == AF_INET6) |
|
|
|| (!opt.disable_ipv4 && ai->family == AF_INET)) |
|
|
{ |
|
|
err = resolve_dns_addr (ctrl, |
|
|
ai->addr, ai->addrlen, 0, &host); |
|
|
if (!err) |
|
|
{ |
|
|
/* Okay, we return the first found name. */ |
|
|
*r_httphost = host; |
|
|
break; |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
free_dns_addrinfo (aibuf); |
|
|
} |
|
|
else if (r_httphost) |
|
|
{ |
|
|
*r_httphost = xtrystrdup (hi->name); |
|
|
if (!*r_httphost) |
|
|
return gpg_error_from_syserror (); |
|
|
} |
|
|
|
|
|
if (hi->dead) |
|
|
{ |
|
|
log_error ("host '%s' marked as dead\n", hi->name); |
|
|
if (r_httphost) |
|
|
{ |
|
|
xfree (*r_httphost); |
|
|
*r_httphost = NULL; |
|
|
} |
|
|
return gpg_error (GPG_ERR_NO_KEYSERVER); |
|
|
} |
|
|
|
|
|
if (r_httpflags) |
|
|
{ |
|
|
/* If the hosttable does not indicate that a certain host |
|
|
supports IPv<N>, we explicit set the corresponding http |
|
|
flags. The reason for this is that a host might be listed in |
|
|
a pool as not v6 only but actually support v6 when later |
|
|
the name is resolved by our http layer. */ |
|
|
if (!hi->v4) |
|
|
*r_httpflags |= HTTP_FLAG_IGNORE_IPv4; |
|
|
if (!hi->v6) |
|
|
*r_httpflags |= HTTP_FLAG_IGNORE_IPv6; |
|
|
|
|
|
/* Note that we do not set the HTTP_FLAG_FORCE_TOR for onion |
|
|
addresses because the http module detects this itself. This |
|
|
also allows us to use an onion address without Tor mode being |
|
|
enabled. */ |
|
|
} |
|
|
|
|
|
*r_host = xtrystrdup (hi->name); |
|
|
if (!*r_host) |
|
|
{ |
|
|
err = gpg_error_from_syserror (); |
|
|
if (r_httphost) |
|
|
{ |
|
|
xfree (*r_httphost); |
|
|
*r_httphost = NULL; |
|
|
} |
|
|
return err; |
|
|
} |
|
|
if (hi->port[protocol]) |
|
|
snprintf (r_portstr, 6 /* five digits and the sentinel */, |
|
|
"%hu", hi->port[protocol]); |
|
|
return 0; |
|
|
} |
|
|
|
|
|
|
|
|
/* Mark the host NAME as dead. NAME may be given as an URL. Returns |
|
|
true if a host was really marked as dead or was already marked dead |
|
|
(e.g. by a concurrent session). */ |
|
|
static int |
|
|
mark_host_dead (const char *name) |
|
|
{ |
|
|
const char *host; |
|
|
char *host_buffer = NULL; |
|
|
parsed_uri_t parsed_uri = NULL; |
|
|
int done = 0; |
|
|
|
|
|
if (name && *name |
|
|
&& !http_parse_uri (&parsed_uri, name, HTTP_PARSE_NO_SCHEME_CHECK)) |
|
|
{ |
|
|
if (parsed_uri->v6lit) |
|
|
{ |
|
|
host_buffer = strconcat ("[", parsed_uri->host, "]", NULL); |
|
|
if (!host_buffer) |
|
|
log_error ("out of core in mark_host_dead"); |
|
|
host = host_buffer; |
|
|
} |
|
|
else |
|
|
host = parsed_uri->host; |
|
|
} |
|
|
else |
|
|
host = name; |
|
|
|
|
|
if (host && *host && strcmp (host, "localhost")) |
|
|
{ |
|
|
hostinfo_t hi; |
|
|
int idx; |
|
|
|
|
|
idx = find_hostinfo (host); |
|
|
if (idx != -1) |
|
|
{ |
|
|
hi = hosttable[idx]; |
|
|
log_info ("marking host '%s' as dead%s\n", |
|
|
hi->name, hi->dead? " (again)":""); |
|
|
hi->dead = 1; |
|
|
hi->died_at = gnupg_get_time (); |
|
|
if (!hi->died_at) |
|
|
hi->died_at = 1; |
|
|
done = 1; |
|
|
} |
|
|
} |
|
|
|
|
|
http_release_parsed_uri (parsed_uri); |
|
|
xfree (host_buffer); |
|
|
return done; |
|
|
} |
|
|
|
|
|
|
|
|
/* Mark a host in the hosttable as dead or - if ALIVE is true - as |
|
|
alive. */ |
|
|
gpg_error_t |
|
|
ks_hkp_mark_host (ctrl_t ctrl, const char *name, int alive) |
|
|
{ |
|
|
gpg_error_t err = 0; |
|
|
hostinfo_t hi, hi2; |
|
|
int idx, idx2, idx3, n; |
|
|
|
|
|
if (!name || !*name || !strcmp (name, "localhost")) |
|
|
return 0; |
|
|
|
|
|
if (npth_mutex_lock (&hosttable_lock)) |
|
|
log_fatal ("failed to acquire mutex\n"); |
|
|
|
|
|
idx = find_hostinfo (name); |
|
|
if (idx == -1) |
|
|
{ |
|
|
err = gpg_error (GPG_ERR_NOT_FOUND); |
|
|
goto leave; |
|
|
} |
|
|
|
|
|
hi = hosttable[idx]; |
|
|
if (alive && hi->dead) |
|
|
{ |
|
|
hi->dead = 0; |
|
|
err = ks_printf_help (ctrl, "marking '%s' as alive", name); |
|
|
} |
|
|
else if (!alive && !hi->dead) |
|
|
{ |
|
|
hi->dead = 1; |
|
|
hi->died_at = 0; /* Manually set dead. */ |
|
|
err = ks_printf_help (ctrl, "marking '%s' as dead", name); |
|
|
} |
|
|
|
|
|
/* If the host is a pool mark all member hosts. */ |
|
|
if (!err && hi->pool) |
|
|
{ |
|
|
for (idx2 = 0; |
|
|
!err && idx2 < hi->pool_len && (n = hi->pool[idx2]) != -1; |
|
|
idx2++) |
|
|
{ |
|
|
assert (n >= 0 && n < hosttable_size); |
|
|
|
|
|
if (!alive) |
|
|
{ |
|
|
/* Do not mark a host from a pool dead if it is also a |
|
|
member in another pool. */ |
|
|
for (idx3=0; idx3 < hosttable_size; idx3++) |
|
|
{ |
|
|
if (hosttable[idx3] |
|
|
&& hosttable[idx3]->pool |
|
|
&& idx3 != idx |
|
|
&& host_in_pool_p (hosttable[idx3], n)) |
|
|
break; |
|
|
} |
|
|
if (idx3 < hosttable_size) |
|
|
continue; /* Host is also a member of another pool. */ |
|
|
} |
|
|
|
|
|
hi2 = hosttable[n]; |
|
|
if (!hi2) |
|
|
; |
|
|
else if (alive && hi2->dead) |
|
|
{ |
|
|
hi2->dead = 0; |
|
|
err = ks_printf_help (ctrl, "marking '%s' as alive", |
|
|
hi2->name); |
|
|
} |
|
|
else if (!alive && !hi2->dead) |
|
|
{ |
|
|
hi2->dead = 1; |
|
|
hi2->died_at = 0; /* Manually set dead. */ |
|
|
err = ks_printf_help (ctrl, "marking '%s' as dead", |
|
|
hi2->name); |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
leave: |
|
|
if (npth_mutex_unlock (&hosttable_lock)) |
|
|
log_fatal ("failed to release mutex\n"); |
|
|
|
|
|
return err; |
|
|
} |
|
|
|
|
|
|
|
|
/* Debug function to print the entire hosttable. */ |
|
|
gpg_error_t |
|
|
ks_hkp_print_hosttable (ctrl_t ctrl) |
|
|
{ |
|
|
gpg_error_t err; |
|
|
int idx, idx2; |
|
|
hostinfo_t hi; |
|
|
membuf_t mb; |
|
|
time_t curtime; |
|
|
char *p, *died; |
|
|
const char *diedstr; |
|
|
|
|
|
err = ks_print_help (ctrl, "hosttable (idx, ipv6, ipv4, dead, name, time):"); |
|
|
if (err) |
|
|
return err; |
|
|
|
|
|
if (npth_mutex_lock (&hosttable_lock)) |
|
|
log_fatal ("failed to acquire mutex\n"); |
|
|
|
|
|
curtime = gnupg_get_time (); |
|
|
for (idx=0; idx < hosttable_size; idx++) |
|
|
if ((hi=hosttable[idx])) |
|
|
{ |
|
|
if (hi->dead && hi->died_at) |
|
|
{ |
|
|
died = elapsed_time_string (hi->died_at, curtime); |
|
|
diedstr = died? died : "error"; |
|
|
} |
|
|
else |
|
|
diedstr = died = NULL; |
|
|
|
|
|
if (!hi->iporname_valid) |
|
|
{ |
|
|
char *canon = NULL; |
|
|
|
|
|
xfree (hi->iporname); |
|
|
hi->iporname = NULL; |
|
|
|
|
|
/* Do a lookup just for the display purpose. */ |
|
|
if (hi->onion || hi->pool) |
|
|
; |
|
|
else if (is_ip_address (hi->name)) |
|
|
{ |
|
|
dns_addrinfo_t aibuf, ai; |
|
|
|
|
|
/* Turn the numerical IP address string into an AI and |
|
|
* then do a DNS PTR lookup. */ |
|
|
if (!resolve_dns_name (ctrl, hi->name, 0, 0, |
|
|
SOCK_STREAM, |
|
|
&aibuf, &canon)) |
|
|
{ |
|
|
if (canon && is_ip_address (canon)) |
|
|
{ |
|
|
xfree (canon); |
|
|
canon = NULL; |
|
|
} |
|
|
for (ai = aibuf; !canon && ai; ai = ai->next) |
|
|
{ |
|
|
resolve_dns_addr (ctrl, ai->addr, ai->addrlen, |
|
|
DNS_WITHBRACKET, &canon); |
|
|
if (canon && is_ip_address (canon)) |
|
|
{ |
|
|
/* We already have the numeric IP - no need to |
|
|
* display it a second time. */ |
|
|
xfree (canon); |
|
|
canon = NULL; |
|
|
} |
|
|
} |
|
|
} |
|
|
free_dns_addrinfo (aibuf); |
|
|
} |
|
|
else |
|
|
{ |
|
|
dns_addrinfo_t aibuf, ai; |
|
|
|
|
|
/* Get the IP address as a string from a name. Note |
|
|
* that resolve_dns_addr allocates CANON on success |
|
|
* and thus terminates the loop. */ |
|
|
if (!resolve_dns_name (ctrl, hi->name, 0, |
|
|
hi->v6? AF_INET6 : AF_INET, |
|
|
SOCK_STREAM, |
|
|
&aibuf, NULL)) |
|
|
{ |
|
|
for (ai = aibuf; !canon && ai; ai = ai->next) |
|
|
{ |
|
|
resolve_dns_addr (ctrl, ai->addr, ai->addrlen, |
|
|
DNS_NUMERICHOST|DNS_WITHBRACKET, |
|
|
&canon); |
|
|
} |
|
|
} |
|
|
free_dns_addrinfo (aibuf); |
|
|
} |
|
|
|
|
|
hi->iporname = canon; |
|
|
hi->iporname_valid = 1; |
|
|
} |
|
|
|
|
|
err = ks_printf_help (ctrl, "%3d %s %s %s %s%s%s%s%s%s%s\n", |
|
|
idx, |
|
|
hi->onion? "O" : hi->v6? "6":" ", |
|
|
hi->v4? "4":" ", |
|
|
hi->dead? "d":" ", |
|
|
hi->name, |
|
|
hi->iporname? " (":"", |
|
|
hi->iporname? hi->iporname : "", |
|
|
hi->iporname? ")":"", |
|
|
diedstr? " (":"", |
|
|
diedstr? diedstr:"", |
|
|
diedstr? ")":"" ); |
|
|
xfree (died); |
|
|
if (err) |
|
|
goto leave; |
|
|
|
|
|
if (hi->cname) |
|
|
err = ks_printf_help (ctrl, " . %s", hi->cname); |
|
|
if (err) |
|
|
goto leave; |
|
|
|
|
|
if (hi->pool) |
|
|
{ |
|
|
init_membuf (&mb, 256); |
|
|
put_membuf_printf (&mb, " . -->"); |
|
|
for (idx2 = 0; idx2 < hi->pool_len && hi->pool[idx2] != -1; idx2++) |
|
|
{ |
|
|
put_membuf_printf (&mb, " %d", hi->pool[idx2]); |
|
|
if (hi->poolidx == hi->pool[idx2]) |
|
|
put_membuf_printf (&mb, "*"); |
|
|
} |
|
|
put_membuf( &mb, "", 1); |
|
|
p = get_membuf (&mb, NULL); |
|
|
if (!p) |
|
|
{ |
|
|
err = gpg_error_from_syserror (); |
|
|
goto leave; |
|
|
} |
|
|
err = ks_print_help (ctrl, p); |
|
|
xfree (p); |
|
|
if (err) |
|
|
goto leave; |
|
|
} |
|
|
} |
|
|
|
|
|
leave: |
|
|
if (npth_mutex_unlock (&hosttable_lock)) |
|
|
log_fatal ("failed to release mutex\n"); |
|
|
return err; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
/* Print a help output for the schemata supported by this module. */ |
|
|
gpg_error_t |
|
|
ks_hkp_help (ctrl_t ctrl, parsed_uri_t uri) |
|
|
{ |
|
|
const char data[] = |
|
|
"Handler for HKP URLs:\n" |
|
|
" hkp://\n" |
|
|
#if HTTP_USE_GNUTLS || HTTP_USE_NTBTLS |
|
|
" hkps://\n" |
|
|
#endif |
|
|
"Supported methods: search, get, put\n"; |
|
|
gpg_error_t err; |
|
|
|
|
|
#if HTTP_USE_GNUTLS || HTTP_USE_NTBTLS |
|
|
const char data2[] = " hkp\n hkps"; |
|
|
#else |
|
|
const char data2[] = " hkp"; |
|
|
#endif |
|
|
|
|
|
if (!uri) |
|
|
err = ks_print_help (ctrl, data2); |
|
|
else if (uri->is_http && (!strcmp (uri->scheme, "hkp") |
|
|
|| !strcmp (uri->scheme, "hkps"))) |
|
|
err = ks_print_help (ctrl, data); |
|
|
else |
|
|
err = 0; |
|
|
|
|
|
return err; |
|
|
} |
|
|
|
|
|
|
|
|
/* Build the remote part of the URL from SCHEME, HOST and an optional |
|
|
* PORT. If NO_SRV is set no SRV record lookup will be done. Returns |
|
|
* an allocated string at R_HOSTPORT or NULL on failure. If |
|
|
* R_HTTPHOST is not NULL it receives a malloced string with the |
|
|
* hostname; this may be different from HOST if HOST is selected from |
|
|
* a pool. */ |
|
|
static gpg_error_t |
|
|
make_host_part (ctrl_t ctrl, |
|
|
const char *scheme, const char *host, unsigned short port, |
|
|
int force_reselect, int no_srv, |
|
|
char **r_hostport, unsigned int *r_httpflags, char **r_httphost) |
|
|
{ |
|
|
gpg_error_t err; |
|
|
const char *srvtag; |
|
|
char portstr[10]; |
|
|
char *hostname; |
|
|
enum ks_protocol protocol; |
|
|
|
|
|
*r_hostport = NULL; |
|
|
|
|
|
if (!strcmp (scheme, "hkps") || !strcmp (scheme,"https")) |
|
|
{ |
|
|
scheme = "https"; |
|
|
srvtag = no_srv? NULL : "pgpkey-https"; |
|
|
protocol = KS_PROTOCOL_HKPS; |
|
|
} |
|
|
else /* HKP or HTTP. */ |
|
|
{ |
|
|
scheme = "http"; |
|
|
srvtag = no_srv? NULL : "pgpkey-http"; |
|
|
protocol = KS_PROTOCOL_HKP; |
|
|
} |
|
|
|
|
|
if (npth_mutex_lock (&hosttable_lock)) |
|
|
log_fatal ("failed to acquire mutex\n"); |
|
|
|
|
|
portstr[0] = 0; |
|
|
err = map_host (ctrl, host, srvtag, force_reselect, protocol, |
|
|
&hostname, portstr, r_httpflags, r_httphost); |
|
|
|
|
|
if (npth_mutex_unlock (&hosttable_lock)) |
|
|
log_fatal ("failed to release mutex\n"); |
|
|
|
|
|
if (err) |
|
|
return err; |
|
|
|
|
|
/* If map_host did not return a port (from a SRV record) but a port |
|
|
* has been specified (implicitly or explicitly) then use that port. |
|
|
* In the case that a port was not specified (which is probably a |
|
|
* bug in https.c) we will set up defaults. */ |
|
|
if (*portstr) |
|
|
; |
|
|
else if (!*portstr && port) |
|
|
snprintf (portstr, sizeof portstr, "%hu", port); |
|
|
else if (!strcmp (scheme,"https")) |
|
|
strcpy (portstr, "443"); |
|
|
else |
|
|
strcpy (portstr, "11371"); |
|
|
|
|
|
if (*hostname != '[' && is_ip_address (hostname) == 6) |
|
|
*r_hostport = strconcat (scheme, "://[", hostname, "]:", portstr, NULL); |
|
|
else |
|
|
*r_hostport = strconcat (scheme, "://", hostname, ":", portstr, NULL); |
|
|
xfree (hostname); |
|
|
if (!*r_hostport) |
|
|
{ |
|
|
if (r_httphost) |
|
|
{ |
|
|
xfree (*r_httphost); |
|
|
*r_httphost = NULL; |
|
|
} |
|
|
return gpg_error_from_syserror (); |
|
|
} |
|
|
return 0; |
|
|
} |
|
|
|
|
|
|
|
|
/* Resolve all known keyserver names and update the hosttable. This |
|
|
is mainly useful for debugging because the resolving is anyway done |
|
|
on demand. */ |
|
|
gpg_error_t |
|
|
ks_hkp_resolve (ctrl_t ctrl, parsed_uri_t uri) |
|
|
{ |
|
|
gpg_error_t err; |
|
|
char *hostport = NULL; |
|
|
|
|
|
/* NB: With an explicitly given port we do not want to consult a |
|
|
* service record because that might be in conflict with the port |
|
|
* from such a service record. */ |
|
|
err = make_host_part (ctrl, uri->scheme, uri->host, uri->port, |
|
|
1, uri->explicit_port, |
|
|
&hostport, NULL, NULL); |
|
|
if (err) |
|
|
{ |
|
|
err = ks_printf_help (ctrl, "%s://%s:%hu: resolve failed: %s", |
|
|
uri->scheme, uri->host, uri->port, |
|
|
gpg_strerror (err)); |
|
|
} |
|
|
else |
|
|
{ |
|
|
err = ks_printf_help (ctrl, "%s", hostport); |
|
|
xfree (hostport); |
|
|
} |
|
|
return err; |
|
|
} |
|
|
|
|
|
|
|
|
/* Housekeeping function called from the housekeeping thread. It is |
|
|
used to mark dead hosts alive so that they may be tried again after |
|
|
some time. */ |
|
|
void |
|
|
ks_hkp_housekeeping (time_t curtime) |
|
|
{ |
|
|
int idx; |
|
|
hostinfo_t hi; |
|
|
|
|
|
if (npth_mutex_lock (&hosttable_lock)) |
|
|
log_fatal ("failed to acquire mutex\n"); |
|
|
|
|
|
for (idx=0; idx < hosttable_size; idx++) |
|
|
{ |
|
|
hi = hosttable[idx]; |
|
|
if (!hi) |
|
|
continue; |
|
|
if (!hi->dead) |
|
|
continue; |
|
|
if (!hi->died_at) |
|
|
continue; /* Do not resurrect manually shot hosts. */ |
|
|
if (hi->died_at + RESURRECT_INTERVAL <= curtime |
|
|
|| hi->died_at > curtime) |
|
|
{ |
|
|
hi->dead = 0; |
|
|
log_info ("resurrected host '%s'", hi->name); |
|
|
} |
|
|
} |
|
|
|
|
|
if (npth_mutex_unlock (&hosttable_lock)) |
|
|
log_fatal ("failed to release mutex\n"); |
|
|
} |
|
|
|
|
|
|
|
|
/* Reload (SIGHUP) action for this module. We mark all host alive |
|
|
* even those which have been manually shot. */ |
|
|
void |
|
|
ks_hkp_reload (void) |
|
|
{ |
|
|
int idx, count; |
|
|
hostinfo_t hi; |
|
|
|
|
|
if (npth_mutex_lock (&hosttable_lock)) |
|
|
log_fatal ("failed to acquire mutex\n"); |
|
|
|
|
|
for (idx=count=0; idx < hosttable_size; idx++) |
|
|
{ |
|
|
hi = hosttable[idx]; |
|
|
if (!hi) |
|
|
continue; |
|
|
hi->iporname_valid = 0; |
|
|
if (!hi->dead) |
|
|
continue; |
|
|
hi->dead = 0; |
|
|
count++; |
|
|
} |
|
|
if (count) |
|
|
log_info ("number of resurrected hosts: %d", count); |
|
|
|
|
|
if (npth_mutex_unlock (&hosttable_lock)) |
|
|
log_fatal ("failed to release mutex\n"); |
|
|
} |
|
|
|
|
|
|
|
|
/* Send an HTTP request. On success returns an estream object at |
|
|
R_FP. HOSTPORTSTR is only used for diagnostics. If HTTPHOST is |
|
|
not NULL it will be used as HTTP "Host" header. If POST_CB is not |
|
|
NULL a post request is used and that callback is called to allow |
|
|
writing the post data. If R_HTTP_STATUS is not NULL, the http |
|
|
status code will be stored there. */ |
|
|
static gpg_error_t |
|
|
send_request (ctrl_t ctrl, const char *request, const char *hostportstr, |
|
|
const char *httphost, unsigned int httpflags, |
|
|
gpg_error_t (*post_cb)(void *, http_t), void *post_cb_value, |
|
|
estream_t *r_fp, unsigned int *r_http_status) |
|
|
{ |
|
|
gpg_error_t err; |
|
|
http_session_t session = NULL; |
|
|
http_t http = NULL; |
|
|
http_redir_info_t redirinfo = { MAX_REDIRECTS }; |
|
|
estream_t fp = NULL; |
|
|
char *request_buffer = NULL; |
|
|
parsed_uri_t uri = NULL; |
|
|
|
|
|
*r_fp = NULL; |
|
|
|
|
|
err = http_parse_uri (&uri, request, 0); |
|
|
if (err) |
|
|
goto leave; |
|
|
redirinfo.ctrl = ctrl; |
|
|
redirinfo.orig_url = request; |
|
|
redirinfo.orig_onion = uri->onion; |
|
|
redirinfo.allow_downgrade = 1; |
|
|
/* FIXME: I am not sure whey we allow a downgrade for hkp requests. |
|
|
* Needs at least an explanation here.. */ |
|
|
|
|
|
once_more: |
|
|
err = http_session_new (&session, httphost, |
|
|
((ctrl->http_no_crl? HTTP_FLAG_NO_CRL : 0) |
|
|
| HTTP_FLAG_TRUST_DEF), |
|
|
gnupg_http_tls_verify_cb, ctrl); |
|
|
if (err) |
|
|
goto leave; |
|
|
http_session_set_log_cb (session, cert_log_cb); |
|
|
http_session_set_timeout (session, ctrl->timeout); |
|
|
|
|
|
err = http_open (ctrl, &http, |
|
|
post_cb? HTTP_REQ_POST : HTTP_REQ_GET, |
|
|
request, |
|
|
httphost, |
|
|
/* fixme: AUTH */ NULL, |
|
|
(httpflags |
|
|
|(opt.honor_http_proxy? HTTP_FLAG_TRY_PROXY:0) |
|
|
|(dirmngr_use_tor ()? HTTP_FLAG_FORCE_TOR:0) |
|
|
|(opt.disable_ipv4? HTTP_FLAG_IGNORE_IPv4 : 0) |
|
|
|(opt.disable_ipv6? HTTP_FLAG_IGNORE_IPv6 : 0)), |
|
|
ctrl->http_proxy, |
|
|
session, |
|
|
NULL, |
|
|
/*FIXME curl->srvtag*/NULL); |
|
|
if (!err) |
|
|
{ |
|
|
fp = http_get_write_ptr (http); |
|
|
/* Avoid caches to get the most recent copy of the key. We set |
|
|
both the Pragma and Cache-Control versions of the header, so |
|
|
we're good with both HTTP 1.0 and 1.1. */ |
|
|
es_fputs ("Pragma: no-cache\r\n" |
|
|
"Cache-Control: no-cache\r\n", fp); |
|
|
if (post_cb) |
|
|
err = post_cb (post_cb_value, http); |
|
|
if (!err) |
|
|
{ |
|
|
http_start_data (http); |
|
|
if (es_ferror (fp)) |
|
|
err = gpg_error_from_syserror (); |
|
|
} |
|
|
} |
|
|
if (err) |
|
|
{ |
|
|
/* Fixme: After a redirection we show the old host name. */ |
|
|
log_error (_("error connecting to '%s': %s\n"), |
|
|
hostportstr, gpg_strerror (err)); |
|
|
goto leave; |
|
|
} |
|
|
|
|
|
/* Wait for the response. */ |
|
|
dirmngr_tick (ctrl); |
|
|
err = http_wait_response (http); |
|
|
if (err) |
|
|
{ |
|
|
log_error (_("error reading HTTP response for '%s': %s\n"), |
|
|
hostportstr, gpg_strerror (err)); |
|
|
goto leave; |
|
|
} |
|
|
|
|
|
if (http_get_tls_info (http, NULL)) |
|
|
{ |
|
|
/* Update the httpflags so that a redirect won't fallback to an |
|
|
unencrypted connection. */ |
|
|
httpflags |= HTTP_FLAG_FORCE_TLS; |
|
|
} |
|
|
|
|
|
if (r_http_status) |
|
|
*r_http_status = http_get_status_code (http); |
|
|
|
|
|
switch (http_get_status_code (http)) |
|
|
{ |
|
|
case 200: |
|
|
err = 0; |
|
|
break; /* Success. */ |
|
|
|
|
|
case 301: |
|
|
case 302: |
|
|
case 307: |
|
|
{ |
|
|
xfree (request_buffer); |
|
|
err = http_prepare_redirect (&redirinfo, http_get_status_code (http), |
|
|
http_get_header (http, "Location"), |
|
|
&request_buffer); |
|
|
if (err) |
|
|
goto leave; |
|
|
|
|
|
request = request_buffer; |
|
|
http_close (http, 0); |
|
|
http = NULL; |
|
|
http_session_release (session); |
|
|
session = NULL; |
|
|
} |
|
|
goto once_more; |
|
|
|
|
|
case 501: |
|
|
err = gpg_error (GPG_ERR_NOT_IMPLEMENTED); |
|
|
goto leave; |
|
|
|
|
|
case 413: /* Payload too large */ |
|
|
err = gpg_error (GPG_ERR_TOO_LARGE); |
|
|
goto leave; |
|
|
|
|
|
default: |
|
|
log_error (_("error accessing '%s': http status %u\n"), |
|
|
request, http_get_status_code (http)); |
|
|
err = gpg_error (GPG_ERR_NO_DATA); |
|
|
goto leave; |
|
|
} |
|
|
|
|
|
/* FIXME: We should register a permanent redirection and whether a |
|
|
host has ever used TLS so that future calls will always use |
|
|
TLS. */ |
|
|
|
|
|
fp = http_get_read_ptr (http); |
|
|
if (!fp) |
|
|
{ |
|
|
err = gpg_error (GPG_ERR_BUG); |
|
|
goto leave; |
|
|
} |
|
|
|
|
|
/* Return the read stream and close the HTTP context. */ |
|
|
*r_fp = fp; |
|
|
http_close (http, 1); |
|
|
http = NULL; |
|
|
|
|
|
leave: |
|
|
http_close (http, 0); |
|
|
http_session_release (session); |
|
|
xfree (request_buffer); |
|
|
http_release_parsed_uri (uri); |
|
|
return err; |
|
|
} |
|
|
|
|
|
|
|
|
/* Helper to evaluate the error code ERR from a send_request() call |
|
|
with REQUEST. The function returns true if the caller shall try |
|
|
again. TRIES_LEFT points to a variable to track the number of |
|
|
retries; this function decrements it and won't return true if it is |
|
|
down to zero. EXTRA_TRIES_LEFT does the same but only for |
|
|
transient http status codes. */ |
|
|
static int |
|
|
handle_send_request_error (ctrl_t ctrl, gpg_error_t err, const char *request, |
|
|
unsigned int http_status, unsigned int *tries_left, |
|
|
unsigned int *extra_tries_left) |
|
|
{ |
|
|
int retry = 0; |
|
|
|
|
|
/* Fixme: Should we disable all hosts of a protocol family if a |
|
|
* request for an address of that family returned ENETDOWN? */ |
|
|
|
|
|
switch (gpg_err_code (err)) |
|
|
{ |
|
|
case GPG_ERR_ECONNREFUSED: |
|
|
if (tor_not_running_p (ctrl)) |
|
|
break; /* A retry does not make sense. */ |
|
|
/* Okay: Tor is up or --use-tor is not used. */ |
|
|
/*FALLTHRU*/ |
|
|
case GPG_ERR_ENETUNREACH: |
|
|
case GPG_ERR_ENETDOWN: |
|
|
case GPG_ERR_UNKNOWN_HOST: |
|
|
case GPG_ERR_NETWORK: |
|
|
case GPG_ERR_EIO: /* Sometimes used by estream cookie functions. */ |
|
|
case GPG_ERR_EADDRNOTAVAIL: /* e.g. when IPv6 is disabled */ |
|
|
case GPG_ERR_EAFNOSUPPORT: /* e.g. when IPv6 is not compiled in */ |
|
|
if (mark_host_dead (request) && *tries_left) |
|
|
retry = 1; |
|
|
break; |
|
|
|
|
|
case GPG_ERR_ETIMEDOUT: |
|
|
if (*tries_left) |
|
|
{ |
|
|
log_info ("selecting a different host due to a timeout\n"); |
|
|
retry = 1; |
|
|
} |
|
|
break; |
|
|
|
|
|
case GPG_ERR_EACCES: |
|
|
if (dirmngr_use_tor ()) |
|
|
{ |
|
|
log_info ("(Tor configuration problem)\n"); |
|
|
dirmngr_status (ctrl, "WARNING", "tor_config_problem 0", |
|
|
"Please check that the \"SocksPort\" flag " |
|
|
"\"IPv6Traffic\" is set in torrc", NULL); |
|
|
} |
|
|
break; |
|
|
|
|
|
case GPG_ERR_NO_DATA: |
|
|
{ |
|
|
switch (http_status) |
|
|
{ |
|
|
case 502: /* Bad Gateway */ |
|
|
log_info ("marking host dead due to a %u (%s)\n", |
|
|
http_status, http_status2string (http_status)); |
|
|
if (mark_host_dead (request) && *tries_left) |
|
|
retry = 1; |
|
|
break; |
|
|
|
|
|
case 503: /* Service Unavailable */ |
|
|
case 504: /* Gateway Timeout */ |
|
|
if (*extra_tries_left) |
|
|
{ |
|
|
log_info ("selecting a different host due to a %u (%s)", |
|
|
http_status, http_status2string (http_status)); |
|
|
retry = 2; |
|
|
} |
|
|
break; |
|
|
} |
|
|
} |
|
|
break; |
|
|
|
|
|
default: |
|
|
break; |
|
|
} |
|
|
|
|
|
if (retry == 2) |
|
|
{ |
|
|
if (*extra_tries_left) |
|
|
--*extra_tries_left; |
|
|
} |
|
|
else |
|
|
{ |
|
|
if (*tries_left) |
|
|
--*tries_left; |
|
|
} |
|
|
|
|
|
return retry; |
|
|
} |
|
|
|
|
|
|
|
|
/* Search the keyserver identified by URI for keys matching PATTERN. |
|
|
On success R_FP has an open stream to read the data. If |
|
|
R_HTTP_STATUS is not NULL, the http status code will be stored |
|
|
there. */ |
|
|
gpg_error_t |
|
|
ks_hkp_search (ctrl_t ctrl, parsed_uri_t uri, const char *pattern, |
|
|
estream_t *r_fp, unsigned int *r_http_status) |
|
|
{ |
|
|
gpg_error_t err; |
|
|
KEYDB_SEARCH_DESC desc; |
|
|
char fprbuf[2+64+1]; |
|
|
char *namebuffer = NULL; |
|
|
char *hostport = NULL; |
|
|
char *request = NULL; |
|
|
estream_t fp = NULL; |
|
|
int reselect; |
|
|
unsigned int httpflags; |
|
|
char *httphost = NULL; |
|
|
unsigned int http_status; |
|
|
unsigned int tries = SEND_REQUEST_RETRIES; |
|
|
unsigned int extra_tries = SEND_REQUEST_EXTRA_RETRIES; |
|
|
|
|
|
*r_fp = NULL; |
|
|
|
|
|
/* Remove search type indicator and adjust PATTERN accordingly. |
|
|
Note that HKP keyservers like the 0x to be present when searching |
|
|
by keyid. We need to re-format the fingerprint and keyids so to |
|
|
remove the gpg specific force-use-of-this-key flag ("!"). */ |
|
|
err = classify_user_id (pattern, &desc, 1); |
|
|
if (err) |
|
|
return err; |
|
|
log_assert (desc.fprlen <= 64); |
|
|
switch (desc.mode) |
|
|
{ |
|
|
case KEYDB_SEARCH_MODE_EXACT: |
|
|
case KEYDB_SEARCH_MODE_SUBSTR: |
|
|
case KEYDB_SEARCH_MODE_MAILSUB: |
|
|
pattern = desc.u.name; |
|
|
break; |
|
|
case KEYDB_SEARCH_MODE_MAIL: |
|
|
namebuffer = xtrystrdup (desc.u.name); |
|
|
if (!namebuffer) |
|
|
{ |
|
|
err = gpg_error_from_syserror (); |
|
|
goto leave; |
|
|
} |
|
|
/* Strip trailing angle bracket. */ |
|
|
if (namebuffer[0] && namebuffer[1] |
|
|
&& namebuffer[strlen (namebuffer)-1] == '>') |
|
|
namebuffer[strlen(namebuffer)-1] = 0; |
|
|
/* Strip optional leading angle bracket. */ |
|
|
if (*namebuffer == '<' && namebuffer[1]) |
|
|
pattern = namebuffer + 1; |
|
|
else |
|
|
pattern = namebuffer; |
|
|
break; |
|
|
case KEYDB_SEARCH_MODE_SHORT_KID: |
|
|
snprintf (fprbuf, sizeof fprbuf, "0x%08lX", (ulong)desc.u.kid[1]); |
|
|
pattern = fprbuf; |
|
|
break; |
|
|
case KEYDB_SEARCH_MODE_LONG_KID: |
|
|
snprintf (fprbuf, sizeof fprbuf, "0x%08lX%08lX", |
|
|
(ulong)desc.u.kid[0], (ulong)desc.u.kid[1]); |
|
|
pattern = fprbuf; |
|
|
break; |
|
|
case KEYDB_SEARCH_MODE_FPR: |
|
|
fprbuf[0] = '0'; |
|
|
fprbuf[1] = 'x'; |
|
|
bin2hex (desc.u.fpr, desc.fprlen, fprbuf+2); |
|
|
pattern = fprbuf; |
|
|
break; |
|
|
default: |
|
|
return gpg_error (GPG_ERR_INV_USER_ID); |
|
|
} |
|
|
|
|
|
/* Build the request string. */ |
|
|
reselect = 0; |
|
|
again: |
|
|
{ |
|
|
char *searchkey; |
|
|
|
|
|
xfree (hostport); hostport = NULL; |
|
|
xfree (httphost); httphost = NULL; |
|
|
err = make_host_part (ctrl, uri->scheme, uri->host, uri->port, |
|
|
reselect, uri->explicit_port, |
|
|
&hostport, &httpflags, &httphost); |
|
|
if (err) |
|
|
goto leave; |
|
|
|
|
|
searchkey = http_escape_string (pattern, EXTRA_ESCAPE_CHARS); |
|
|
if (!searchkey) |
|
|
{ |
|
|
err = gpg_error_from_syserror (); |
|
|
goto leave; |
|
|
} |
|
|
|
|
|
xfree (request); |
|
|
request = strconcat (hostport, |
|
|
"/pks/lookup?op=index&options=mr&fingerprint=on&search=", |
|
|
searchkey, |
|
|
NULL); |
|
|
xfree (searchkey); |
|
|
if (!request) |
|
|
{ |
|
|
err = gpg_error_from_syserror (); |
|
|
goto leave; |
|
|
} |
|
|
} |
|
|
|
|
|
/* Send the request. */ |
|
|
err = send_request (ctrl, request, hostport, httphost, httpflags, |
|
|
NULL, NULL, &fp, &http_status); |
|
|
if (handle_send_request_error (ctrl, err, request, http_status, |
|
|
&tries, &extra_tries)) |
|
|
{ |
|
|
reselect = 1; |
|
|
goto again; |
|
|
} |
|
|
if (r_http_status) |
|
|
*r_http_status = http_status; |
|
|
if (err) |
|
|
{ |
|
|
if (gpg_err_code (err) == GPG_ERR_NO_DATA) |
|
|
dirmngr_status (ctrl, "SOURCE", hostport, NULL); |
|
|
goto leave; |
|
|
} |
|
|
|
|
|
err = dirmngr_status (ctrl, "SOURCE", hostport, NULL); |
|
|
if (err) |
|
|
goto leave; |
|
|
|
|
|
/* Peek at the response. */ |
|
|
{ |
|
|
int c = es_getc (fp); |
|
|
if (c == -1) |
|
|
{ |
|
|
err = es_ferror (fp)?gpg_error_from_syserror ():gpg_error (GPG_ERR_EOF); |
|
|
log_error ("error reading response: %s\n", gpg_strerror (err)); |
|
|
goto leave; |
|
|
} |
|
|
if (c == '<') |
|
|
{ |
|
|
/* The document begins with a '<': Assume a HTML response, |
|
|
which we don't support. */ |
|
|
err = gpg_error (GPG_ERR_UNSUPPORTED_ENCODING); |
|
|
goto leave; |
|
|
} |
|
|
es_ungetc (c, fp); |
|
|
} |
|
|
|
|
|
/* Return the read stream. */ |
|
|
*r_fp = fp; |
|
|
fp = NULL; |
|
|
|
|
|
leave: |
|
|
es_fclose (fp); |
|
|
xfree (request); |
|
|
xfree (hostport); |
|
|
xfree (httphost); |
|
|
xfree (namebuffer); |
|
|
return err; |
|
|
} |
|
|
|
|
|
|
|
|
/* Get the key described key the KEYSPEC string from the keyserver |
|
|
identified by URI. On success R_FP has an open stream to read the |
|
|
data. The data will be provided in a format GnuPG can import |
|
|
(either a binary OpenPGP message or an armored one). */ |
|
|
gpg_error_t |
|
|
ks_hkp_get (ctrl_t ctrl, parsed_uri_t uri, const char *keyspec, estream_t *r_fp) |
|
|
{ |
|
|
gpg_error_t err; |
|
|
KEYDB_SEARCH_DESC desc; |
|
|
char kidbuf[2+64+1]; |
|
|
const char *exactname = NULL; |
|
|
char *namebuffer = NULL; |
|
|
char *searchkey = NULL; |
|
|
char *hostport = NULL; |
|
|
char *request = NULL; |
|
|
estream_t fp = NULL; |
|
|
int reselect; |
|
|
char *httphost = NULL; |
|
|
unsigned int httpflags; |
|
|
unsigned int http_status; |
|
|
unsigned int tries = SEND_REQUEST_RETRIES; |
|
|
unsigned int extra_tries = SEND_REQUEST_EXTRA_RETRIES; |
|
|
|
|
|
*r_fp = NULL; |
|
|
|
|
|
/* Remove search type indicator and adjust PATTERN accordingly. |
|
|
Note that HKP keyservers like the 0x to be present when searching |
|
|
by keyid. We need to re-format the fingerprint and keyids so to |
|
|
remove the gpg specific force-use-of-this-key flag ("!"). */ |
|
|
err = classify_user_id (keyspec, &desc, 1); |
|
|
if (err) |
|
|
return err; |
|
|
log_assert (desc.fprlen <= 64); |
|
|
switch (desc.mode) |
|
|
{ |
|
|
case KEYDB_SEARCH_MODE_SHORT_KID: |
|
|
snprintf (kidbuf, sizeof kidbuf, "0x%08lX", (ulong)desc.u.kid[1]); |
|
|
break; |
|
|
case KEYDB_SEARCH_MODE_LONG_KID: |
|
|
snprintf (kidbuf, sizeof kidbuf, "0x%08lX%08lX", |
|
|
(ulong)desc.u.kid[0], (ulong)desc.u.kid[1]); |
|
|
break; |
|
|
case KEYDB_SEARCH_MODE_FPR: |
|
|
if (desc.fprlen < 20) |
|
|
{ |
|
|
log_error ("HKP keyservers do not support v3 fingerprints\n"); |
|
|
return gpg_error (GPG_ERR_INV_USER_ID); |
|
|
} |
|
|
kidbuf[0] = '0'; |
|
|
kidbuf[1] = 'x'; |
|
|
bin2hex (desc.u.fpr, desc.fprlen, kidbuf+2); |
|
|
break; |
|
|
|
|
|
case KEYDB_SEARCH_MODE_EXACT: |
|
|
exactname = desc.u.name; |
|
|
break; |
|
|
|
|
|
case KEYDB_SEARCH_MODE_MAIL: |
|
|
namebuffer = xtrystrdup (desc.u.name); |
|
|
if (!namebuffer) |
|
|
{ |
|
|
err = gpg_error_from_syserror (); |
|
|
goto leave; |
|
|
} |
|
|
/* Strip trailing angle bracket. */ |
|
|
if (namebuffer[0] && namebuffer[1] |
|
|
&& namebuffer[strlen (namebuffer)-1] == '>') |
|
|
namebuffer[strlen(namebuffer)-1] = 0; |
|
|
/* Strip optional leading angle bracket. */ |
|
|
if (*namebuffer == '<' && namebuffer[1]) |
|
|
exactname = namebuffer + 1; |
|
|
else |
|
|
exactname = namebuffer; |
|
|
break; |
|
|
|
|
|
default: |
|
|
return gpg_error (GPG_ERR_INV_USER_ID); |
|
|
} |
|
|
|
|
|
searchkey = http_escape_string (exactname? exactname : kidbuf, |
|
|
EXTRA_ESCAPE_CHARS); |
|
|
if (!searchkey) |
|
|
{ |
|
|
err = gpg_error_from_syserror (); |
|
|
goto leave; |
|
|
} |
|
|
|
|
|
reselect = 0; |
|
|
again: |
|
|
/* Build the request string. */ |
|
|
xfree (hostport); hostport = NULL; |
|
|
xfree (httphost); httphost = NULL; |
|
|
err = make_host_part (ctrl, uri->scheme, uri->host, uri->port, |
|
|
reselect, uri->explicit_port, |
|
|
&hostport, &httpflags, &httphost); |
|
|
if (err) |
|
|
goto leave; |
|
|
|
|
|
xfree (request); |
|
|
request = strconcat (hostport, |
|
|
"/pks/lookup?op=get&options=mr&search=", |
|
|
searchkey, |
|
|
exactname? "&exact=on":"", |
|
|
NULL); |
|
|
if (!request) |
|
|
{ |
|
|
err = gpg_error_from_syserror (); |
|
|
goto leave; |
|
|
} |
|
|
|
|
|
/* Send the request. */ |
|
|
err = send_request (ctrl, request, hostport, httphost, httpflags, |
|
|
NULL, NULL, &fp, &http_status); |
|
|
if (handle_send_request_error (ctrl, err, request, http_status, |
|
|
&tries, &extra_tries)) |
|
|
{ |
|
|
reselect = 1; |
|
|
goto again; |
|
|
} |
|
|
if (err) |
|
|
{ |
|
|
if (gpg_err_code (err) == GPG_ERR_NO_DATA) |
|
|
dirmngr_status (ctrl, "SOURCE", hostport, NULL); |
|
|
goto leave; |
|
|
} |
|
|
|
|
|
err = dirmngr_status (ctrl, "SOURCE", hostport, NULL); |
|
|
if (err) |
|
|
goto leave; |
|
|
|
|
|
/* Return the read stream and close the HTTP context. */ |
|
|
*r_fp = fp; |
|
|
fp = NULL; |
|
|
|
|
|
leave: |
|
|
es_fclose (fp); |
|
|
xfree (namebuffer); |
|
|
xfree (request); |
|
|
xfree (hostport); |
|
|
xfree (httphost); |
|
|
xfree (searchkey); |
|
|
return err; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Callback parameters for put_post_cb. */ |
|
|
struct put_post_parm_s |
|
|
{ |
|
|
char *datastring; |
|
|
}; |
|
|
|
|
|
|
|
|
/* Helper for ks_hkp_put. */ |
|
|
static gpg_error_t |
|
|
put_post_cb (void *opaque, http_t http) |
|
|
{ |
|
|
struct put_post_parm_s *parm = opaque; |
|
|
gpg_error_t err = 0; |
|
|
estream_t fp; |
|
|
size_t len; |
|
|
|
|
|
fp = http_get_write_ptr (http); |
|
|
len = strlen (parm->datastring); |
|
|
|
|
|
es_fprintf (fp, |
|
|
"Content-Type: application/x-www-form-urlencoded\r\n" |
|
|
"Content-Length: %zu\r\n", len+8 /* 8 is for "keytext" */); |
|
|
http_start_data (http); |
|
|
if (es_fputs ("keytext=", fp) || es_write (fp, parm->datastring, len, NULL)) |
|
|
err = gpg_error_from_syserror (); |
|
|
return err; |
|
|
} |
|
|
|
|
|
|
|
|
/* Send the key in {DATA,DATALEN} to the keyserver identified by URI. */ |
|
|
gpg_error_t |
|
|
ks_hkp_put (ctrl_t ctrl, parsed_uri_t uri, const void *data, size_t datalen) |
|
|
{ |
|
|
gpg_error_t err; |
|
|
char *hostport = NULL; |
|
|
char *request = NULL; |
|
|
estream_t fp = NULL; |
|
|
struct put_post_parm_s parm; |
|
|
char *armored = NULL; |
|
|
int reselect; |
|
|
char *httphost = NULL; |
|
|
unsigned int httpflags; |
|
|
unsigned int http_status; |
|
|
unsigned int tries = SEND_REQUEST_RETRIES; |
|
|
unsigned int extra_tries = SEND_REQUEST_EXTRA_RETRIES; |
|
|
|
|
|
parm.datastring = NULL; |
|
|
|
|
|
err = armor_data (&armored, data, datalen); |
|
|
if (err) |
|
|
goto leave; |
|
|
|
|
|
parm.datastring = http_escape_string (armored, EXTRA_ESCAPE_CHARS); |
|
|
if (!parm.datastring) |
|
|
{ |
|
|
err = gpg_error_from_syserror (); |
|
|
goto leave; |
|
|
} |
|
|
xfree (armored); |
|
|
armored = NULL; |
|
|
|
|
|
/* Build the request string. */ |
|
|
reselect = 0; |
|
|
again: |
|
|
xfree (hostport); hostport = NULL; |
|
|
xfree (httphost); httphost = NULL; |
|
|
err = make_host_part (ctrl, uri->scheme, uri->host, uri->port, |
|
|
reselect, uri->explicit_port, |
|
|
&hostport, &httpflags, &httphost); |
|
|
if (err) |
|
|
goto leave; |
|
|
|
|
|
xfree (request); |
|
|
request = strconcat (hostport, "/pks/add", NULL); |
|
|
if (!request) |
|
|
{ |
|
|
err = gpg_error_from_syserror (); |
|
|
goto leave; |
|
|
} |
|
|
|
|
|
/* Send the request. */ |
|
|
err = send_request (ctrl, request, hostport, httphost, 0, |
|
|
put_post_cb, &parm, &fp, &http_status); |
|
|
if (handle_send_request_error (ctrl, err, request, http_status, |
|
|
&tries, &extra_tries)) |
|
|
{ |
|
|
reselect = 1; |
|
|
goto again; |
|
|
} |
|
|
if (err) |
|
|
goto leave; |
|
|
|
|
|
leave: |
|
|
es_fclose (fp); |
|
|
xfree (parm.datastring); |
|
|
xfree (armored); |
|
|
xfree (request); |
|
|
xfree (hostport); |
|
|
xfree (httphost); |
|
|
return err; |
|
|
} |
|
|
|
|
|
void |
|
|
ks_hkp_init (void) |
|
|
{ |
|
|
int err; |
|
|
|
|
|
err = npth_mutex_init (&hosttable_lock, NULL); |
|
|
if (err) |
|
|
log_fatal ("error initializing mutex: %s\n", strerror (err)); |
|
|
}
|
|
|
|