#include <assert.h>
#include <ccan/str/hex/hex.h>
#include <ccan/tal/str/str.h>
#include <common/dev_disconnect.h>
#include <common/status.h>
#include <stdio.h>
#include <wire/peer_wire.h>
#include <wire/wire_io.h>

#undef io_read
#undef io_write

static char *read_buf;
static size_t read_buf_len;

static void do_read(void *buf, size_t len)
{
	assert(len <= read_buf_len);
	memcpy(buf, read_buf, len);
	read_buf += len;
	read_buf_len -= len;
}

#define io_read(conn, p, len, next, arg)			\
	(do_read((p), (len)), (next)((conn), (arg)), NULL)

static char *write_buf;

static void do_write(const void *buf, size_t len)
{
	size_t oldlen = tal_count(write_buf);
	tal_resize(&write_buf, oldlen + len);
	memcpy(write_buf + oldlen, buf, len);
}

#define io_write(conn, p, len, next, arg) \
	(do_write((p), (len)), (next)((conn), (arg)), NULL)

void status_fmt(enum log_level level UNUSED, const char *fmt, ...)
{
	va_list ap;

	va_start(ap, fmt);
	vprintf(fmt, ap);
	printf("\n");
	va_end(ap);
}

void status_peer_io(enum log_level dir UNUSED, const u8 *msg UNUSED)
{
}

#if DEVELOPER
/* AUTOGENERATED MOCKS START */
/* Generated stub for dev_blackhole_fd */
void dev_blackhole_fd(int fd UNNEEDED)
{ fprintf(stderr, "dev_blackhole_fd called!\n"); abort(); }
/* Generated stub for dev_sabotage_fd */
void dev_sabotage_fd(int fd UNNEEDED)
{ fprintf(stderr, "dev_sabotage_fd called!\n"); abort(); }
/* AUTOGENERATED MOCKS END */

enum dev_disconnect dev_disconnect(int pkt_type UNUSED)
{
	return DEV_DISCONNECT_NORMAL;
}
#endif /* DEVELOPER */

/* We test what look like unknown messages. */
#define is_unknown_msg_discardable(x) 0

#include "../../common/cryptomsg.c"

const void *trc;

static struct io_plan *check_msg_write(struct io_conn *conn UNUSED, struct peer *peer UNUSED)
{
	assert(tal_count(write_buf) == 2 + 16 + 5 + 16);
	return NULL;
}

static struct io_plan *check_msg_read(struct io_conn *conn UNUSED, struct peer *peer UNUSED,
				      u8 *msg)
{
	assert(tal_count(msg) == 5);
	assert(memcmp(msg, "hello", 5) == 0);
	return NULL;
}

static struct secret secret_from_hex(const char *hex)
{
	struct secret secret;
	hex += 2;
	if (!hex_decode(hex, strlen(hex), &secret, sizeof(secret)))
		abort();
	return secret;
}

int main(void)
{
	setup_locale();

	struct peer_crypto_state cs_out, cs_in;
	struct secret sk, rk, ck;
	const void *msg;
	size_t i;

	setup_tmpctx();
	msg = tal_dup_arr(tmpctx, char, "hello", 5, 0);

	/* BOLT #8:
	 *
	 * name: transport-initiator successful handshake
	 *...
	 * # ck,temp_k3=0x919219dbb2920afa8db80f9a51787a840bcf111ed8d588caf9ab4be716e42b01,0x981a46c820fb7a241bc8184ba4bb1f01bcdfafb00dde80098cb8c38db9141520
	 * # encryptWithAD(0x981a46c820fb7a241bc8184ba4bb1f01bcdfafb00dde80098cb8c38db9141520, 0x000000000000000000000000, 0x5dcb5ea9b4ccc755e0e3456af3990641276e1d5dc9afd82f974d90a47c918660, <empty>)
	 * # t=0x8dc68b1c466263b47fdf31e560e139ba
	 * output: 0x00b9e3a702e93e3a9948c2ed6e5fd7590a6e1c3a0344cfc9d5b57357049aa22355361aa02e55a8fc28fef5bd6d71ad0c38228dc68b1c466263b47fdf31e560e139ba
	 * # HKDF(0x919219dbb2920afa8db80f9a51787a840bcf111ed8d588caf9ab4be716e42b01,zero)
	 * output: sk,rk=0x969ab31b4d288cedf6218839b27a3e2140827047f2c0f01bf5c04435d43511a9,0xbb9020b8965f4df047e07f955f3c4b88418984aadc5cdb35096b9ea8fa5c3442
	 */
	ck = secret_from_hex("0x919219dbb2920afa8db80f9a51787a840bcf111ed8d588caf9ab4be716e42b01");
	sk = secret_from_hex("0x969ab31b4d288cedf6218839b27a3e2140827047f2c0f01bf5c04435d43511a9");
	rk = secret_from_hex("0xbb9020b8965f4df047e07f955f3c4b88418984aadc5cdb35096b9ea8fa5c3442");

	cs_out.cs.sn = cs_out.cs.rn = cs_in.cs.sn = cs_in.cs.rn = 0;
	cs_out.cs.sk = cs_in.cs.rk = sk;
	cs_out.cs.rk = cs_in.cs.sk = rk;
	cs_out.cs.s_ck = cs_out.cs.r_ck = cs_in.cs.s_ck = cs_in.cs.r_ck = ck;
	init_peer_crypto_state((void *)tmpctx, &cs_in);
	init_peer_crypto_state((void *)tmpctx, &cs_out);

	for (i = 0; i < 1002; i++) {
		write_buf = tal_arr(tmpctx, char, 0);

		peer_write_message(NULL, &cs_out, msg, check_msg_write);
		if ((i % 500) < 2)
			status_trace("output %zu: 0x%s", i,
				     tal_hex(tmpctx, write_buf));

		read_buf = write_buf;
		read_buf_len = tal_count(read_buf);
		write_buf = tal_arr(tmpctx, char, 0);

		peer_read_message(NULL, &cs_in, check_msg_read);
		assert(read_buf_len == 0);
	}
	tal_free(tmpctx);
	return 0;
}