<?php
/**
*
* @function zot_new_uid($channel_nick)
* @channel_id = unique nickname of controlling entity
* @returns string
*
*/
function zot_new_uid($channel_nick) {
$rawstr = z_root() . '/' . $channel_nick . '.' . mt_rand();
return(base64url_encode(hash('whirlpool',$rawstr,true),true));
}
/**
*
* Given an array of zot_uid(s), return all distinct hubs
* If primary is true, return only primary hubs
* Result is ordered by url to assist in batching.
* Return only the first primary hub as there should only be one.
*
*/
function zot_get_hubloc($arr,$primary = false) {
$tmp = '';
if(is_array($arr)) {
foreach($arr as $e) {
if(strlen($tmp))
$tmp .= ',';
$tmp .= "'" . dbesc($e) . "'" ;
}
}
if(! strlen($tmp))
return array();
$sql_extra = (($primary) ? " and hubloc_flags & " . intval(HUBLOC_FLAGS_PRIMARY) : "" );
$limit = (($primary) ? " limit 1 " : "");
return q("select * from hubloc where hubloc_hash in ( $tmp ) $sql_extra order by hubloc_url $limit");
}
// Given an item and an identity, sign the data.
function zot_sign(&$item,$identity) {
$item['signed'] = str_replace(array(" ","\t","\n","\r"),array('','','',''),base64url_encode($item['body'],true));
$item['signature'] = base64url_encode(rsa_sign($item['signed'],$identity['prvkey']));
}
// Given an item and an identity, verify the signature.
function zot_verify(&$item,$identity) {
return rsa_verify($item['signed'],base64url_decode($item['signature']),$identity['pubkey']);
}
function zot_notify($channel,$url) {
$x = z_post_url($url, array(
'type' => 'notify',
'guid' => $channel['channel_guid'],
'guid_sig' => base64url_encode($guid,$channel['prvkey']),
'hub' => z_root(),
'hub_sig' => base64url_encode(z_root,$channel['prvkey']),
'callback' => '/post',
'spec' => ZOT_REVISION)
);
return($x);
}
function zot_finger($webbie,$channel) {
logger('zot_finger:' . print_r($channel,true));
if(strpos($webbie,'@') === false) {
$address = $webbie;
$host = get_app()->get_hostname();
}
else {
$address = substr($webbie,0,strpos($webbie,'@'));
$host = substr($webbie,strpos($webbie,'@')+1);
}
$xchan_addr = $address . '@' . $host;
$r = q("select xchan.*, hubloc.* from xchan
left join hubloc on xchan_hash = hubloc_hash
where xchan_addr = '%s' and (hubloc_flags & %d) limit 1",
dbesc($xchan_address),
intval(HUBLOC_FLAGS_PRIMARY)
);
if($r) {
$url = $r[0]['hubloc_url'];
}
else {
$url = 'https://' . $host;
}
$rhs = '/.well-known/zot-guid';
if($channel) {
$postvars = array(
'address' => $address,
'target' => $channel['channel_guid'],
'target_sig' => $channel['channel_guid_sig']
);
$result = z_post_url($url . $rhs,$postvars);
if(! $result['success'])
$result = z_post_url('http://' . $host . $rhs,$postvars);
}
else {
$rhs .= 'address=' . urlencode($address);
$result = z_fetch_url($url . $rhs);
if(! $result['success'])
$result = z_fetch_url('http://' . $host . $rhs);
}
return $result;
}
function zot_gethub($arr) {
if((x($arr,'guid')) && (x($arr,'guid_sig')) && (x($arr,'hub')) && (x($arr,'hub_sig'))) {
$r = q("select * from hubloc
where hubloc_guid = '%s' and hubloc_guid_sig = '%s'
and hubloc_url = '%s' and hubloc_url_sig = '%s'
limit 1",
dbesc($arr['guid']),
dbesc($arr['guid_sig']),
dbesc($arr['hub']),
dbesc($arr['hub_sig'])
);
if($r && count($r))
return $r[0];
}
return null;
}
function zot_register_hub($arr) {
$total = 0;
if((x($arr,'hub')) && (x($arr,'guid'))) {
$x = z_fetch_url($arr['hub'] . '/.well-known/zot-guid/' . $arr['guid']);
if($x['success']) {
$record = json_decode($x['body']);
if($record->hub && count($record->hub)) {
foreach($record->hub as $h) {
// store any hubs we don't know about
if( ! zot_gethub(
array('guid' => $arr['guid'],
'guid_sig' => $arr['guid_sig'],
'hub' => $h->url,
'hub_sig' => $h->url_sig))) {
$r = q("insert into hubloc (hubloc_guid, hubloc_guid_sig, hubloc_flags, hubloc_url,
hubloc_url_sig, hubloc_callback, hubloc_sitekey, hubloc_key)
values ( '%s', '%s', %d, '%s', '%s', '%s', '%s', '%s' )",
dbesc($arr['guid']),
dbesc($arr['guid_sig']),
intval((($h->primary) ? HUBLOC_FLAGS_PRIMARY : 0) | HUBLOC_FLAGS_UNVERIFIED ),
dbesc($h->url),
dbesc($h->url_sig),
dbesc($h->callback),
dbesc($h->sitekey),
dbesc($record->key)
);
if($r)
$total ++;
}
}
}
}
}
return $total;
}
// Takes a json array from zot_finger and imports the xchan and hublocs
// If the xchan already exists, update the name and photo if these have changed.
//
function import_xchan_from_json($j) {
$ret = array('success' => false);
$xchan_hash = base64url_encode(hash('whirlpool',$j->guid . $j->guid_sig, true));
$import_photos = false;
if(! rsa_verify($j->guid,base64url_decode($j->guid_sig),$j->key)) {
logger('import_xchan_from_json: Unable to verify channel signature for ' . $j->address);
$ret['message'] = t('Unable to verify channel signature');
return $ret;
}
$r = q("select * from xchan where xchan_hash = '%s' limit 1",
dbesc($xchan_hash)
);
if($r) {
if($r[0]['xchan_photo_date'] != $j->photo_updated)
$update_photos = true;
if($r[0]['xchan_name_date'] != $j->name_updated) {
$r = q("update xchan set xchan_name = '%s', xchan_name_date = '%s' where xchan_hash = '%s' limit 1",
dbesc($j->name),
dbesc($j->name_updated),
dbesc($xchan_hash)
);
}
}
else {
$import_photos = true;
$x = q("insert into xchan ( xchan_hash, xchan_guid, xchan_guid_sig, xchan_pubkey, xchan_photo_mimetype,
xchan_photo_l, xchan_addr, xchan_url, xchan_name, xchan_network, xchan_photo_date, xchan_name_date)
values ( '%s', '%s', '%s', '%s' , '%s', '%s', '%s', '%s', '%s', '%s', '%s', '%s') ",
dbesc($xchan_hash),
dbesc($j->guid),
dbesc($j->guid_sig),
dbesc($j->key),
dbesc($j->photo_mimetype),
dbesc($j->photo),
dbesc($j->address),
dbesc($j->url),
dbesc($j->name),
dbesc('zot'),
dbesc($j->photo_updated),
dbesc($j->name_updated)
);
}
if($import_photos) {
require_once("Photo.php");
$photos = import_profile_photo($j->photo,0,$xchan_hash);
$r = q("update xchan set xchan_photo_date = '%s', xchan_photo_l = '%s', xchan_photo_m = '%s', xchan_photo_s = '%s', xchan_photo_mimetype = '%s'
where xchan_hash = '%s' limit 1",
dbesc($j->photo_updated),
dbesc($photos[0]),
dbesc($photos[1]),
dbesc($photos[2]),
dbesc($photos[3]),
dbesc($xchan_hash)
);
}
if($j->locations) {
foreach($j->locations as $location) {
if(! rsa_verify($location->url,base64url_decode($location->url_sig),$j->key)) {
logger('import_xchan_from_json: Unable to verify site signature for ' . $location->url);
$ret['message'] .= sprintf( t('Unable to verify site signature for %s'), $location->url) . EOL;
continue;
}
$r = q("select * from hubloc where hubloc_hash = '%s' and hubloc_url = '%s' limit 1",
dbesc($xchan_hash),
dbesc($location->url)
);
if($r) {
if(($r[0]['hubloc_flags'] & HUBLOC_FLAGS_PRIMARY) && (! $location->primary)) {
$r = q("update hubloc set hubloc_flags = (hubloc_flags ^ %d) where hubloc_id = %d limit 1",
intval(HUBLOC_FLAGS_PRIMARY),
intval($r[0]['hubloc_id'])
);
}
continue;
}
$r = q("insert into hubloc ( hubloc_guid, hubloc_guid_sig, hubloc_hash, hubloc_addr, hubloc_flags, hubloc_url, hubloc_url_sig, hubloc_host, hubloc_callback, hubloc_sitekey)
values ( '%s','%s','%s','%s', %d ,'%s','%s','%s','%s','%s')",
dbesc($j->guid),
dbesc($j->guid_sig),
dbesc($xchan_hash),
dbesc($location->address),
intval((intval($location->primary)) ? HUBLOC_FLAGS_PRIMARY : 0),
dbesc($location->url),
dbesc($location->url_sig),
dbesc($location->host),
dbesc($location->callback),
dbesc($location->sitekey)
);
}
}
if(! x($ret,'message')) {
$ret['success'] = true;
}
return $ret;
}