#!/usr/bin/bash

##############################################################################
# This file is part of the CRYPTO BONE
# File     : sendcrosscontact  (client)
# Version  : 1.6 (ALL-IN-ONE)
# License  : BSD
# Date     : 12 May 2023
# Contact  : Please send enquiries and bug-reports to innovation@senderek.ie
#
# Copyright (c) 2015-2023
#	Ralf Senderek, Ireland.  All rights reserved. (https://senderek.ie)
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
# 1. Redistributions of source code must retain the above copyright
#    notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions and the following disclaimer in the
#    documentation and/or other materials provided with the distribution.
# 3. All advertising materials mentioning features or use of this software
#    must display the following acknowledgement:
#	   This product includes software developed by Ralf Senderek.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND  ANY EXPRESS OR 
# IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE  IMPLIED WARRANTIES 
# OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  
# IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; 
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 
# POSSIBILITY OF SUCH DAMAGE.
##############################################################################

# Parameter: 
# $1 is the cross ID ID
# $2 is the cross SERVER
# $3 is the recipient ID ()   
# $4 is the recipient's HOST ()   

#----------------------------------------------------#
# load functions and global variables
. ./test-functions

if [[ -r ../safewebdrop.config ]] ; then
   . ../safewebdrop.config
fi

# let parameters overwrite CROSSID, CROSSSERVER,  RECIPIENT and HOST
if (( $# >= 4 )) ; then
    CROSSID="$1"
    ID="$1"
    CROSSSERVER="$2"
    RECIPIENT="$3"
    HOST="$4"
    if (( $# == 5 )) ; then
         DEBUG="$5"
    fi
fi

if [[ ${DEBUG} = "yes" ]] ; then
    set -vx; exec 2>$0.trc
    /usr/bin/echo "debugging is ON ..."
fi

/usr/bin/echo "***** safewebdrop *****"
/usr/bin/echo "Sending a cross server contact request as ${CROSSID}%${CROSSSERVER} to ${RECIPIENT}%${HOST}"
/usr/bin/echo "The initial secret is taken from the config file!"
/usr/bin/echo "***** ----------- *****"
/usr/bin/echo
/usr/bin/echo "Debug = ${DEBUG}"
/usr/bin/echo -n "continue? "
read REPLY
if [[ "${REPLY}x" != "yesx" ]] ; then
    /usr/bin/echo "exiting, yes continues here"
    /usr/bin/echo "usage: sendcrosscontact CROSSID CROSSSERVER RECIPIENT HOST [[yes|no]] (overwrites config) "
    exit 1
fi    

REQ="../${CROSSID}/contactrequest"
MSG="../${CROSSID}/contactmessage"

# check directory for ${CROSSID}
if [[ ! -d ../${CROSSID} ]] ; then
    /usr/bin/mkdir ../${CROSSID}
fi

KEY="../${CROSSID}/pubkey.pem"

# PHASE 1: send CONTACT request
CHALLENGE=$(/usr/bin/curl https://${HOST}/cgi-bin/safewebdropcrosscontact?${RECIPIENT}\&CONTACT 2>/dev/null)
/usr/bin/echo "SERVER -> I:   CHL=${CHALLENGE}  "
          
# PHASE 2: create a permission request plus pubkey
# user:sender:request:signature:sender-pubkey
/usr/bin/echo -n "${CHALLENGE}:" > ${REQ}
/usr/bin/echo -n "${CROSSID}%${CROSSSERVER}:" >> ${REQ}

# store a hash for CROSSID ([[ RECIPIENT%HOST, CROSSID%CROSSSERVER,  secret ]])
/usr/bin/echo -n "${RECIPIENT}%${HOST}:" > ${MSG}
/usr/bin/echo -n "${CROSSID}%${CROSSSERVER}:" >> ${MSG}
/usr/bin/echo -n "${SEC}" >> ${MSG}
HASHVALUE=$(/usr/bin/cat ${MSG} | /usr/bin/sha256sum | /usr/bin/cut -c-64 )
/usr/bin/echo -n "${HASHVALUE}" >> ${REQ}

# generate a hash of the request 
generate_requesthash
# and send it
REQUEST=$(/usr/bin/cat ${REQ})
KEY="../${CROSSID}/pubkey.pem"
/usr/bin/base64 --wrap=0 ${KEY} > ${KEY}.b64
PUBKEY=$(/usr/bin/cat ${KEY}.b64)

OK=$(/usr/bin/curl https://${HOST}/cgi-bin/safewebdropcrosscontact?${RECIPIENT}\&${REQUEST}\&${SIG}\&${PUBKEY} 2> /dev/null)

/usr/bin/echo "SERVER -> II:  ${CROSSID}%${CROSSSERVER}  ${OK} : ${#OK} bytes received" 

/usr/bin/echo "----end----"
exit 0
