#include <xrpld/conditions/Condition.h>
#include <xrpld/conditions/Fulfillment.h>
#include <xrpld/conditions/detail/PreimageSha256.h>

#include <xrpl/basics/Buffer.h>
#include <xrpl/basics/Slice.h>
#include <xrpl/basics/StringUtilities.h>
#include <xrpl/basics/strHex.h>
#include <xrpl/beast/unit_test.h>

#include <algorithm>
#include <string>
#include <utility>
#include <vector>

namespace ripple {
namespace cryptoconditions {

class PreimageSha256_test : public beast::unit_test::suite
{
    inline Buffer
    hexblob(std::string const& s)
    {
        auto blob = strUnHex(s);
        BEAST_EXPECT(blob);
        return {blob->data(), blob->size()};
    }

    void
    testKnownVectors()
    {
        testcase("Known Vectors");

        std::pair<std::string, std::string> const known[] = {
            {"A0028000",
             "A0258020E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7"
             "852B855810100"},
            {"A0058003616161",
             "A02580209834876DCFB05CB167A5C24953EBA58C4AC89B1ADF57F28F2F9D09AF1"
             "07EE8F0810103"},
        };

        std::error_code ec;

        auto f1 = Fulfillment::deserialize(hexblob(known[0].first), ec);
        BEAST_EXPECT(f1);
        BEAST_EXPECT(!ec);

        auto c1 = Condition::deserialize(hexblob(known[0].second), ec);
        BEAST_EXPECT(c1);
        BEAST_EXPECT(!ec);

        auto f2 = Fulfillment::deserialize(hexblob(known[1].first), ec);
        BEAST_EXPECT(f2);
        BEAST_EXPECT(!ec);

        auto c2 = Condition::deserialize(hexblob(known[1].second), ec);
        BEAST_EXPECT(c2);
        BEAST_EXPECT(!ec);

        // Check equality and inequality
        BEAST_EXPECT(f1->condition() == *c1);
        BEAST_EXPECT(f1->condition() != *c2);
        BEAST_EXPECT(f2->condition() == *c2);
        BEAST_EXPECT(f2->condition() != *c1);
        BEAST_EXPECT(*c1 != *c2);
        BEAST_EXPECT(*c1 == *c1);
        BEAST_EXPECT(f1->condition() == f1->condition());

        // Should validate with the empty string
        BEAST_EXPECT(validate(*f1, *c1));
        BEAST_EXPECT(validate(*f2, *c2));

        // And with any string - the message doesn't matter for PrefixSha256
        BEAST_EXPECT(validate(*f1, *c1, makeSlice(known[0].first)));
        BEAST_EXPECT(validate(*f1, *c1, makeSlice(known[0].second)));
        BEAST_EXPECT(validate(*f2, *c2, makeSlice(known[0].first)));
        BEAST_EXPECT(validate(*f2, *c2, makeSlice(known[0].second)));

        // Shouldn't validate if the fulfillment & condition don't match
        // regardless of the message.
        BEAST_EXPECT(!validate(*f2, *c1));
        BEAST_EXPECT(!validate(*f2, *c1, makeSlice(known[0].first)));
        BEAST_EXPECT(!validate(*f2, *c1, makeSlice(known[0].second)));
        BEAST_EXPECT(!validate(*f1, *c2));
        BEAST_EXPECT(!validate(*f1, *c2, makeSlice(known[0].first)));
        BEAST_EXPECT(!validate(*f1, *c2, makeSlice(known[0].second)));
    }

    void
    testOtherTypes()
    {
        testcase("Other Types");

        std::pair<std::string, std::string> const others[] = {
            // PREFIX + PREIMAGE:
            {"A10B8000810100A204A0028000",

             "A12A8020BB1AC5260C0141B7E54B26EC2330637C5597BF811951AC09E744AD20F"
             "F77E287810204"
             "0082020780"},

            // THRESHOLD:
            {"A208A004A0028000A100",

             "A22A8020B4B84136DF48A71D73F4985C04C6767A778ECB65BA7023B4506823BEE"
             "E7631B9810204"
             "0082020780"},

            // RSA:
            {"A382020880820100E1EF8B24D6F76B09C81ED7752AA262F044F04A874D43809D3"
             "1CEA612F99B0C97"
             "A8B4374153E3EEF3D66616843E0E41C293264B71B6173DB1CF0D6CD558C586577"
             "06FCF097F704C48"
             "3E59CBFDFD5B3EE7BC80D740C5E0F047F3E85FC0D75815776A6F3F23C5DC5E797"
             "139A6882E38336A"
             "4A5FB36137620FF3663DBAE328472801862F72F2F87B202B9C89ADD7CD5B0A076"
             "F7C53E35039F67E"
             "D17EC815E5B4305CC63197068D5E6E579BA6DE5F4E3E57DF5E4E072FF2CE4C66E"
             "B45233973875275"
             "9639F0257BF57DBD5C443FB5158CCE0A3D36ADC7BA01F33A0BB6DBB2BF989D607"
             "112F2344D993E77"
             "E563C1D361DEDF57DA96EF2CFC685F002B638246A5B309B981820100BD42D6569"
             "F6599AED455F96B"
             "C0ED08ED1480BF36CD9E1467F9C6F74461C9E3A749334B2F6404AA5F9F6BAFE76"
             "C347D069250B35D"
             "1C970C793059EE733A8193F30FA78FEC7CAE459E3DDFD7633805D476940D0CB53"
             "D7FB389DCDAEAF6"
             "E8CF48C4B5635430E4F2BCDFE505C2C0FC17B40D93C7EDB7C261EBF43895A705E"
             "024AA0549A660F7"
             "0A32150647522DBE6B63520497CFF8F8D5D74768A27C5B86E580BE3FCDC96F197"
             "6293CBA0D58DFC6"
             "0B518B632A6DC1E950C43E231FE1A379AA6DDCC52C70EDF851C6C0123A964261C"
             "FDB3857CD6CD5AD"
             "C37D8DA2CC924EDAE1D84CF6124587F274C1FA3697DA2901F0269F03B243C03B6"
             "14E0385E1961FAC"
             "5000F9BB",

             "A3258020484950515253545548495051525354554849505152535455484950515"
             "2535455810101"},

            // ED25519:
            {"A4648020D75A980182B10AB7D54BFED3C964073A0EE172F3DAA62325AF021A68F"
             "707511A8140E556"
             "4300C360AC729086E2CC806E828A84877F1EB8E5D974D873E065224901555FB88"
             "21590A33BACC61E"
             "39701CF9B46BD25BF5F0595BBE24655141438E7A100B",

             "A4278020799239ABA8FC4FF7EABFBC4C44E69E8BDFED993324E12ED64792ABE28"
             "9CF1D5F810302"
             "0000"}};

        for (auto x : others)
        {
            std::error_code ec;

            BEAST_EXPECT(!Fulfillment::deserialize(hexblob(x.first), ec));
            BEAST_EXPECT(!Condition::deserialize(hexblob(x.second), ec));
        }
    }

    void
    run() override
    {
        testKnownVectors();
        testOtherTypes();
    }
};

BEAST_DEFINE_TESTSUITE(PreimageSha256, conditions, ripple);

}  // namespace cryptoconditions

}  // namespace ripple
