/* t-edit-sign.c - Regression test.
 * Copyright (C) 2000 Werner Koch (dd9jn)
 * Copyright (C) 2001, 2002, 2003, 2004, 2021 g10 Code GmbH
 * Software engineering by Ingo Klöcker <dev@ingo-kloecker.de>
 *
 * This file is part of GPGME.
 *
 * GPGME is free software; you can redistribute it and/or modify it
 * under the terms of the GNU Lesser General Public License as
 * published by the Free Software Foundation; either version 2.1 of
 * the License, or (at your option) any later version.
 *
 * GPGME is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this program; if not, see <https://gnu.org/licenses/>.
 * SPDX-License-Identifier: LGPL-2.1-or-later
 */

/* We need to include config.h so that we know whether we are building
   with large file system (LFS) support. */
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <assert.h>
#include <errno.h>
#include <unistd.h>
#include <errno.h>

#include <gpgme.h>

#include "t-support.h"


static const char *test_key = "-----BEGIN PGP PUBLIC KEY BLOCK-----\n"
"\n"
"mDMEY+NyJBYJKwYBBAHaRw8BAQdA4VfyC5sa6T3xVSus55LjyqQetFuE1shtu/71\n"
"pHLxg8W0KFNpZ24gbWUgKGRlbW8ga2V5KSA8c2lnbi1tZUBleGFtcGxlLm5ldD6I\n"
"kwQTFgoAOxYhBPPHuA+qbf/jPmLyYnJg+w/EtKy+BQJj43IkAhsDBQsJCAcCAiIC\n"
"BhUKCQgLAgQWAgMBAh4HAheAAAoJEHJg+w/EtKy+26gBAMhaI/lYA9BK35525kQT\n"
"OhvpQwgThJxQp8AOQk3UMgkGAP0ahV9lFXwv9ZnoeHEhjECsNpAFbj9fxBlzNmMZ\n"
"Z92+AA==\n"
"=Koy1\n"
"-----END PGP PUBLIC KEY BLOCK-----\n";
static const char *test_key_fpr = "F3C7B80FAA6DFFE33E62F2627260FB0FC4B4ACBE";

static void
import_key (const char *keydata)
{
  gpgme_ctx_t ctx;
  gpgme_error_t err;
  gpgme_data_t in;

  err = gpgme_new (&ctx);
  fail_if_err (err);

  err = gpgme_data_new_from_mem (&in, keydata, strlen(keydata), 0);
  fail_if_err (err);

  err = gpgme_op_import (ctx, in);
  fail_if_err (err);

  gpgme_data_release (in);
  gpgme_release (ctx);
}

static void
delete_key (const char *fpr)
{
  gpgme_ctx_t ctx;
  gpgme_error_t err;
  gpgme_key_t key = NULL;

  err = gpgme_new (&ctx);
  fail_if_err (err);

  err = gpgme_get_key (ctx, fpr, &key, 0);
  fail_if_err (err);

  err = gpgme_op_delete_ext (ctx, key, GPGME_DELETE_FORCE);
  fail_if_err (err);

  gpgme_key_unref (key);
  gpgme_release (ctx);
}

static void
flush_data (gpgme_data_t dh)
{
  char buf[100];
  int ret;

  ret = gpgme_data_seek (dh, 0, SEEK_SET);
  if (ret)
    fail_if_err (gpgme_error_from_errno (errno));
  while ((ret = gpgme_data_read (dh, buf, 100)) > 0)
    fwrite (buf, ret, 1, stdout);
  if (ret < 0)
    fail_if_err (gpgme_error_from_errno (errno));
}


gpgme_error_t
interact_fnc (void *opaque, const char *status, const char *args, int fd)
{
  const char *result = NULL;
  gpgme_data_t out = (gpgme_data_t) opaque;

  fputs ("[-- Response --]\n", stdout);
  flush_data (out);

  fprintf (stdout, "[-- Code: %s, %s --]\n", status, args);

  if (fd >= 0)
    {
      if (!strcmp (args, "keyedit.prompt"))
	{
	  static int step = 0;

	  switch (step)
	    {
	    case 0:
	      result = "fpr";
	      break;
	    case 1:
	      /* This fixes the primary user ID so the keylisting
		 tests will have predictable output.  */
	      result = "1";
	      break;
	    case 2:
	      result = "sign";
	      break;

	    default:
	      result = "quit";
	      break;
	    }
	  step++;
	}
      else if (!strcmp (args, "keyedit.save.okay"))
	result = "Y";
      else if (!strcmp (args, "sign_uid.okay"))
	result = "Y";
    }

  if (result)
    gpgme_io_writen (fd, result, strlen (result));
  gpgme_io_writen (fd, "\n", 1);
  return 0;
}


void
sign_key (const char *key_fpr, const char *signer_fpr)
{
  gpgme_ctx_t ctx;
  gpgme_error_t err;
  gpgme_data_t out = NULL;
  gpgme_key_t signing_key = NULL;
  gpgme_key_t key = NULL;
  char *agent_info;

  err = gpgme_new (&ctx);
  fail_if_err (err);

  agent_info = getenv("GPG_AGENT_INFO");
  if (!(agent_info && strchr (agent_info, ':')))
    gpgme_set_passphrase_cb (ctx, passphrase_cb, 0);

  err = gpgme_get_key (ctx, signer_fpr, &signing_key, 1);
  fail_if_err (err);
  err = gpgme_signers_add (ctx, signing_key);
  fail_if_err (err);

  err = gpgme_set_ctx_flag (ctx, "cert-expire", "42d");
  fail_if_err (err);

  err = gpgme_get_key (ctx, key_fpr, &key, 0);
  fail_if_err (err);

  err = gpgme_data_new (&out);
  fail_if_err (err);

  err = gpgme_op_interact (ctx, key, 0, interact_fnc, out, out);
  fail_if_err (err);

  fputs ("[-- Last response --]\n", stdout);
  flush_data (out);

  gpgme_data_release (out);
  gpgme_key_unref (key);
  gpgme_key_unref (signing_key);
  gpgme_release (ctx);
}


void
verify_key_signature (const char *key_fpr, const char *signer_keyid)
{
  gpgme_ctx_t ctx;
  gpgme_error_t err;
  gpgme_key_t signed_key = NULL;
  gpgme_user_id_t signed_uid = NULL;
  gpgme_key_sig_t key_sig = NULL;
  int mode;

  err = gpgme_new (&ctx);
  fail_if_err (err);

  mode  = gpgme_get_keylist_mode (ctx);
  mode |= GPGME_KEYLIST_MODE_SIGS;
  err = gpgme_set_keylist_mode (ctx, mode);
  fail_if_err (err);
  err = gpgme_get_key (ctx, key_fpr, &signed_key, 0);
  fail_if_err (err);

  signed_uid = signed_key->uids;
  if (!signed_uid)
    {
      fprintf (stderr, "Signed key has no user IDs\n");
      exit (1);
    }
  if (!signed_uid->signatures || !signed_uid->signatures->next)
    {
      fprintf (stderr, "Signed user ID has less signatures than expected\n");
      exit (1);
    }
  key_sig = signed_uid->signatures->next;
  if (strcmp (signer_keyid, key_sig->keyid))
    {
      fprintf (stderr, "Unexpected key ID in second user ID sig: %s\n",
                key_sig->keyid);
      exit (1);
    }
  if (key_sig->expires != key_sig->timestamp + 42*86400L)
    {
      fprintf (stderr, "Key signature unexpectedly does not expire in 42 days\n");
      fprintf (stderr, "signature date: %ld, expiration date: %ld\n",
               key_sig->timestamp, key_sig->expires);
      exit (1);
    }

  gpgme_key_unref (signed_key);
  gpgme_release (ctx);
}


int
main (int argc, char **argv)
{
  const char *signer_fpr = "A0FF4590BB6122EDEF6E3C542D727CC768697734"; /* Alpha Test */
  const char *signer_keyid = signer_fpr + strlen(signer_fpr) - 16;

  (void)argc;
  (void)argv;

  init_gpgme (GPGME_PROTOCOL_OpenPGP);

  import_key (test_key);
  sign_key (test_key_fpr, signer_fpr);
  verify_key_signature (test_key_fpr, signer_keyid);
  delete_key (test_key_fpr);

  return 0;
}