xref: /openbsd/usr.sbin/rpki-client/print.c (revision 6530cf17)
1*6530cf17Sjob /*	$OpenBSD: print.c,v 1.19 2022/11/04 17:39:36 job Exp $ */
2714f4e3fSclaudio /*
3714f4e3fSclaudio  * Copyright (c) 2021 Claudio Jeker <claudio@openbsd.org>
4714f4e3fSclaudio  * Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
5714f4e3fSclaudio  *
6714f4e3fSclaudio  * Permission to use, copy, modify, and distribute this software for any
7714f4e3fSclaudio  * purpose with or without fee is hereby granted, provided that the above
8714f4e3fSclaudio  * copyright notice and this permission notice appear in all copies.
9714f4e3fSclaudio  *
10714f4e3fSclaudio  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11714f4e3fSclaudio  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12714f4e3fSclaudio  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13714f4e3fSclaudio  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14714f4e3fSclaudio  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15714f4e3fSclaudio  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16714f4e3fSclaudio  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17714f4e3fSclaudio  */
18714f4e3fSclaudio 
19714f4e3fSclaudio #include <sys/types.h>
20714f4e3fSclaudio #include <sys/socket.h>
21714f4e3fSclaudio #include <arpa/inet.h>
22714f4e3fSclaudio 
23714f4e3fSclaudio #include <err.h>
24714f4e3fSclaudio #include <stdio.h>
25714f4e3fSclaudio #include <string.h>
26714f4e3fSclaudio #include <time.h>
27714f4e3fSclaudio 
28e911df76Sjob #include <openssl/evp.h>
29e911df76Sjob 
30714f4e3fSclaudio #include "extern.h"
31714f4e3fSclaudio 
32714f4e3fSclaudio static const char *
33254fd372Sclaudio pretty_key_id(const char *hex)
34714f4e3fSclaudio {
35714f4e3fSclaudio 	static char buf[128];	/* bigger than SHA_DIGEST_LENGTH * 3 */
36714f4e3fSclaudio 	size_t i;
37714f4e3fSclaudio 
38714f4e3fSclaudio 	for (i = 0; i < sizeof(buf) && *hex != '\0'; i++) {
39254fd372Sclaudio 		if (i % 3 == 2)
40714f4e3fSclaudio 			buf[i] = ':';
41714f4e3fSclaudio 		else
42714f4e3fSclaudio 			buf[i] = *hex++;
43714f4e3fSclaudio 	}
44714f4e3fSclaudio 	if (i == sizeof(buf))
45714f4e3fSclaudio 		memcpy(buf + sizeof(buf) - 4, "...", 4);
46254fd372Sclaudio 	else
47254fd372Sclaudio 		buf[i] = '\0';
48714f4e3fSclaudio 	return buf;
49714f4e3fSclaudio }
50714f4e3fSclaudio 
51220c707cSclaudio char *
52220c707cSclaudio time2str(time_t t)
53220c707cSclaudio {
54220c707cSclaudio 	static char buf[64];
55220c707cSclaudio 	struct tm tm;
56220c707cSclaudio 
57220c707cSclaudio 	if (gmtime_r(&t, &tm) == NULL)
58220c707cSclaudio 		return "could not convert time";
59220c707cSclaudio 
60220c707cSclaudio 	strftime(buf, sizeof(buf), "%h %d %T %Y %Z", &tm);
61220c707cSclaudio 	return buf;
62220c707cSclaudio }
63220c707cSclaudio 
64714f4e3fSclaudio void
65714f4e3fSclaudio tal_print(const struct tal *p)
66714f4e3fSclaudio {
67e911df76Sjob 	char			*ski;
68e911df76Sjob 	EVP_PKEY		*pk;
69e911df76Sjob 	RSA			*r;
70e911df76Sjob 	const unsigned char	*der;
71e911df76Sjob 	unsigned char		*rder = NULL;
72e911df76Sjob 	unsigned char		 md[SHA_DIGEST_LENGTH];
73e911df76Sjob 	int			 rder_len;
74714f4e3fSclaudio 	size_t			 i;
75714f4e3fSclaudio 
76e911df76Sjob 	der = p->pkey;
77e911df76Sjob 	pk = d2i_PUBKEY(NULL, &der, p->pkeysz);
78e911df76Sjob 	if (pk == NULL)
79e911df76Sjob 		errx(1, "d2i_PUBKEY failed in %s", __func__);
80e911df76Sjob 
81e911df76Sjob 	r = EVP_PKEY_get0_RSA(pk);
82e911df76Sjob 	if (r == NULL)
83e911df76Sjob 		errx(1, "EVP_PKEY_get0_RSA failed in %s", __func__);
84e911df76Sjob 	if ((rder_len = i2d_RSAPublicKey(r, &rder)) <= 0)
85e911df76Sjob 		errx(1, "i2d_RSAPublicKey failed in %s", __func__);
86e911df76Sjob 
87e911df76Sjob 	if (!EVP_Digest(rder, rder_len, md, NULL, EVP_sha1(), NULL))
88e911df76Sjob 		errx(1, "EVP_Digest failed in %s", __func__);
89e911df76Sjob 
90e911df76Sjob 	ski = hex_encode(md, SHA_DIGEST_LENGTH);
91e911df76Sjob 
92530399e8Sjob 	if (outformats & FORMAT_JSON) {
93530399e8Sjob 		printf("\t\"type\": \"tal\",\n");
943b3f075aSjob 		printf("\t\"name\": \"%s\",\n", p->descr);
953b3f075aSjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(ski));
96530399e8Sjob 		printf("\t\"trust_anchor_locations\": [");
97530399e8Sjob 		for (i = 0; i < p->urisz; i++) {
98530399e8Sjob 			printf("\"%s\"", p->uri[i]);
99530399e8Sjob 			if (i + 1 < p->urisz)
100530399e8Sjob 				printf(", ");
101530399e8Sjob 		}
1023b3f075aSjob 		printf("],\n");
103530399e8Sjob 	} else {
104530399e8Sjob 		printf("Trust anchor name:        %s\n", p->descr);
105530399e8Sjob 		printf("Subject key identifier:   %s\n", pretty_key_id(ski));
106e911df76Sjob 		printf("Trust anchor locations:\n");
107714f4e3fSclaudio 		for (i = 0; i < p->urisz; i++)
108e911df76Sjob 			printf("%5zu: %s\n", i + 1, p->uri[i]);
109530399e8Sjob 	}
110e911df76Sjob 
111e911df76Sjob 	EVP_PKEY_free(pk);
112e911df76Sjob 	free(rder);
113e911df76Sjob 	free(ski);
114714f4e3fSclaudio }
115714f4e3fSclaudio 
116714f4e3fSclaudio void
117530399e8Sjob x509_print(const X509 *x)
118530399e8Sjob {
119530399e8Sjob 	const ASN1_INTEGER	*xserial;
120530399e8Sjob 	char			*serial = NULL;
121530399e8Sjob 
122530399e8Sjob 	xserial = X509_get0_serialNumber(x);
123530399e8Sjob 	if (xserial == NULL) {
124530399e8Sjob 		warnx("X509_get0_serialNumber failed in %s", __func__);
125530399e8Sjob 		goto out;
126530399e8Sjob 	}
127530399e8Sjob 
128530399e8Sjob 	serial = x509_convert_seqnum(__func__, xserial);
129530399e8Sjob 	if (serial == NULL) {
130530399e8Sjob 		warnx("x509_convert_seqnum failed in %s", __func__);
131530399e8Sjob 		goto out;
132530399e8Sjob 	}
133530399e8Sjob 
134530399e8Sjob 	if (outformats & FORMAT_JSON) {
135530399e8Sjob 		printf("\t\"cert_serial\": \"%s\",\n", serial);
136530399e8Sjob 	} else {
137530399e8Sjob 		printf("Certificate serial:       %s\n", serial);
138530399e8Sjob 	}
139530399e8Sjob 
140530399e8Sjob  out:
141530399e8Sjob 	free(serial);
142530399e8Sjob }
143530399e8Sjob 
144530399e8Sjob void
145714f4e3fSclaudio cert_print(const struct cert *p)
146714f4e3fSclaudio {
147530399e8Sjob 	size_t			 i, j;
148714f4e3fSclaudio 	char			 buf1[64], buf2[64];
149714f4e3fSclaudio 	int			 sockt;
150714f4e3fSclaudio 	char			 tbuf[21];
151714f4e3fSclaudio 
152530399e8Sjob 	strftime(tbuf, sizeof(tbuf), "%FT%TZ", gmtime(&p->expires));
153530399e8Sjob 
154530399e8Sjob 	if (outformats & FORMAT_JSON) {
155530399e8Sjob 		if (p->pubkey != NULL)
156530399e8Sjob 			printf("\t\"type\": \"router_key\",\n");
157530399e8Sjob 		else
158530399e8Sjob 			printf("\t\"type\": \"ca_cert\",\n");
159530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
160530399e8Sjob 		if (p->aki != NULL)
161530399e8Sjob 			printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
162530399e8Sjob 		x509_print(p->x509);
163530399e8Sjob 		if (p->aia != NULL)
164530399e8Sjob 			printf("\t\"aia\": \"%s\",\n", p->aia);
165530399e8Sjob 		if (p->mft != NULL)
166530399e8Sjob 			printf("\t\"manifest\": \"%s\",\n", p->mft);
167530399e8Sjob 		if (p->repo != NULL)
168530399e8Sjob 			printf("\t\"carepository\": \"%s\",\n", p->repo);
169530399e8Sjob 		if (p->notify != NULL)
170530399e8Sjob 			printf("\t\"notify_url\": \"%s\",\n", p->notify);
171530399e8Sjob 		if (p->pubkey != NULL)
172530399e8Sjob 			printf("\t\"router_key\": \"%s\",\n", p->pubkey);
173530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
174530399e8Sjob 		printf("\t\"subordinate_resources\": [\n");
175530399e8Sjob 	} else {
176714f4e3fSclaudio 		printf("Subject key identifier:   %s\n", pretty_key_id(p->ski));
177714f4e3fSclaudio 		if (p->aki != NULL)
17867642cb5Stb 			printf("Authority key identifier: %s\n",
17967642cb5Stb 			    pretty_key_id(p->aki));
180530399e8Sjob 		x509_print(p->x509);
181714f4e3fSclaudio 		if (p->aia != NULL)
182714f4e3fSclaudio 			printf("Authority info access:    %s\n", p->aia);
183714f4e3fSclaudio 		if (p->mft != NULL)
184714f4e3fSclaudio 			printf("Manifest: %s\n", p->mft);
185714f4e3fSclaudio 		if (p->repo != NULL)
186714f4e3fSclaudio 			printf("caRepository: %s\n", p->repo);
187714f4e3fSclaudio 		if (p->notify != NULL)
188714f4e3fSclaudio 			printf("Notify URL: %s\n", p->notify);
189714f4e3fSclaudio 		if (p->pubkey != NULL)
190*6530cf17Sjob 			printf("BGPsec ECDSA public key:  %s\n",
19167642cb5Stb 			    p->pubkey);
192*6530cf17Sjob 		printf("Router key valid until:   %s\n", tbuf);
193714f4e3fSclaudio 		printf("Subordinate Resources:\n");
194530399e8Sjob 	}
195714f4e3fSclaudio 
196530399e8Sjob 	for (i = 0; i < p->asz; i++) {
197714f4e3fSclaudio 		switch (p->as[i].type) {
198714f4e3fSclaudio 		case CERT_AS_ID:
199530399e8Sjob 			if (outformats & FORMAT_JSON)
200530399e8Sjob 				printf("\t\t{ \"asid\": %u }", p->as[i].id);
201530399e8Sjob 			else
202530399e8Sjob 				printf("%5zu: AS: %u", i + 1, p->as[i].id);
203714f4e3fSclaudio 			break;
204714f4e3fSclaudio 		case CERT_AS_INHERIT:
205530399e8Sjob 			if (outformats & FORMAT_JSON)
206530399e8Sjob 				printf("\t\t{ \"asid_inherit\": \"true\" }");
207530399e8Sjob 			else
208530399e8Sjob 				printf("%5zu: AS: inherit", i + 1);
209714f4e3fSclaudio 			break;
210714f4e3fSclaudio 		case CERT_AS_RANGE:
211530399e8Sjob 			if (outformats & FORMAT_JSON)
212530399e8Sjob 				printf("\t\t{ \"asrange\": { \"min\": %u, "
213530399e8Sjob 				    "\"max\": %u }}", p->as[i].range.min,
214530399e8Sjob 				    p->as[i].range.max);
215530399e8Sjob 			else
216530399e8Sjob 				printf("%5zu: AS: %u -- %u", i + 1,
217714f4e3fSclaudio 				    p->as[i].range.min, p->as[i].range.max);
218714f4e3fSclaudio 			break;
219714f4e3fSclaudio 		}
220530399e8Sjob 		if (outformats & FORMAT_JSON && i + 1 < p->asz + p->ipsz)
221530399e8Sjob 			printf(",\n");
222530399e8Sjob 		else
223530399e8Sjob 			printf("\n");
224714f4e3fSclaudio 	}
225714f4e3fSclaudio 
226530399e8Sjob 	for (j = 0; j < p->ipsz; j++) {
227530399e8Sjob 		switch (p->ips[j].type) {
228530399e8Sjob 		case CERT_IP_INHERIT:
229530399e8Sjob 			if (outformats & FORMAT_JSON)
230530399e8Sjob 				printf("\t\t{ \"ip_inherit\": \"true\" }");
231530399e8Sjob 			else
232530399e8Sjob 				printf("%5zu: IP: inherit", i + j + 1);
233530399e8Sjob 			break;
234530399e8Sjob 		case CERT_IP_ADDR:
235530399e8Sjob 			ip_addr_print(&p->ips[j].ip,
236530399e8Sjob 			    p->ips[j].afi, buf1, sizeof(buf1));
237530399e8Sjob 			if (outformats & FORMAT_JSON)
238530399e8Sjob 				printf("\t\t{ \"ip_prefix\": \"%s\" }", buf1);
239530399e8Sjob 			else
240530399e8Sjob 				printf("%5zu: IP: %s", i + j + 1, buf1);
241530399e8Sjob 			break;
242530399e8Sjob 		case CERT_IP_RANGE:
243530399e8Sjob 			sockt = (p->ips[j].afi == AFI_IPV4) ?
244530399e8Sjob 			    AF_INET : AF_INET6;
245530399e8Sjob 			inet_ntop(sockt, p->ips[j].min, buf1, sizeof(buf1));
246530399e8Sjob 			inet_ntop(sockt, p->ips[j].max, buf2, sizeof(buf2));
247530399e8Sjob 			if (outformats & FORMAT_JSON)
248530399e8Sjob 				printf("\t\t{ \"ip_range\": { \"min\": \"%s\""
249530399e8Sjob 				    ", \"max\": \"%s\" }}", buf1, buf2);
250530399e8Sjob 			else
251530399e8Sjob 				printf("%5zu: IP: %s -- %s", i + j + 1, buf1,
252530399e8Sjob 				    buf2);
253530399e8Sjob 			break;
254530399e8Sjob 		}
255530399e8Sjob 		if (outformats & FORMAT_JSON && i + j + 1 < p->asz + p->ipsz)
256530399e8Sjob 			printf(",\n");
257530399e8Sjob 		else
258530399e8Sjob 			printf("\n");
259530399e8Sjob 	}
260530399e8Sjob 
261530399e8Sjob 	if (outformats & FORMAT_JSON)
262530399e8Sjob 		printf("\t],\n");
263714f4e3fSclaudio }
264714f4e3fSclaudio 
265714f4e3fSclaudio void
266220c707cSclaudio crl_print(const struct crl *p)
267220c707cSclaudio {
268220c707cSclaudio 	STACK_OF(X509_REVOKED)	*revlist;
269220c707cSclaudio 	X509_REVOKED *rev;
2707cdd491fSclaudio 	ASN1_INTEGER *crlnum;
271220c707cSclaudio 	int i;
2727cdd491fSclaudio 	char *serial;
273220c707cSclaudio 	time_t t;
274220c707cSclaudio 
275530399e8Sjob 	if (outformats & FORMAT_JSON) {
276530399e8Sjob 		printf("\t\"type\": \"crl\",\n");
277530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
278530399e8Sjob 	} else
279220c707cSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
2807cdd491fSclaudio 
2817cdd491fSclaudio 	crlnum = X509_CRL_get_ext_d2i(p->x509_crl, NID_crl_number, NULL, NULL);
2827cdd491fSclaudio 	serial = x509_convert_seqnum(__func__, crlnum);
283530399e8Sjob 	if (serial != NULL) {
284530399e8Sjob 		if (outformats & FORMAT_JSON)
285530399e8Sjob 			printf("\t\"crl_serial\": \"%s\",\n", serial);
286530399e8Sjob 		else
2877cdd491fSclaudio 			printf("CRL Serial Number:        %s\n", serial);
288530399e8Sjob 	}
2897cdd491fSclaudio 	free(serial);
2907cdd491fSclaudio 	ASN1_INTEGER_free(crlnum);
2917cdd491fSclaudio 
292530399e8Sjob 	if (outformats & FORMAT_JSON) {
293530399e8Sjob 		printf("\t\"valid_since\": %lld,\n", (long long)p->issued);
294530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
295530399e8Sjob 		printf("\t\"revoked_certs\": [\n");
296530399e8Sjob 	} else {
297220c707cSclaudio 		printf("CRL valid since:          %s\n", time2str(p->issued));
298220c707cSclaudio 		printf("CRL valid until:          %s\n", time2str(p->expires));
299530399e8Sjob 		printf("Revoked Certificates:\n");
300530399e8Sjob 	}
301220c707cSclaudio 
302220c707cSclaudio 	revlist = X509_CRL_get_REVOKED(p->x509_crl);
303220c707cSclaudio 	for (i = 0; i < sk_X509_REVOKED_num(revlist); i++) {
304220c707cSclaudio 		rev = sk_X509_REVOKED_value(revlist, i);
3057cdd491fSclaudio 		serial = x509_convert_seqnum(__func__,
3067cdd491fSclaudio 		    X509_REVOKED_get0_serialNumber(rev));
307220c707cSclaudio 		x509_get_time(X509_REVOKED_get0_revocationDate(rev), &t);
308530399e8Sjob 		if (serial != NULL) {
309530399e8Sjob 			if (outformats & FORMAT_JSON) {
310530399e8Sjob 				printf("\t\t{ \"serial\": \"%s\"", serial);
311530399e8Sjob 				printf(", \"date\": \"%s\" }", time2str(t));
312530399e8Sjob 				if (i + 1 < sk_X509_REVOKED_num(revlist))
313530399e8Sjob 					printf(",");
314530399e8Sjob 				printf("\n");
315530399e8Sjob 			} else
316530399e8Sjob 				printf("    Serial: %8s   Revocation Date: %s"
317530399e8Sjob 				    "\n", serial, time2str(t));
318530399e8Sjob 		}
3197cdd491fSclaudio 		free(serial);
320220c707cSclaudio 	}
321530399e8Sjob 
322530399e8Sjob 	if (outformats & FORMAT_JSON)
323530399e8Sjob 		printf("\t],\n");
324530399e8Sjob 	else if (i == 0)
325220c707cSclaudio 		printf("No Revoked Certificates\n");
326220c707cSclaudio }
327220c707cSclaudio 
328220c707cSclaudio void
329530399e8Sjob mft_print(const X509 *x, const struct mft *p)
330714f4e3fSclaudio {
331714f4e3fSclaudio 	size_t i;
332714f4e3fSclaudio 	char *hash;
333714f4e3fSclaudio 
334530399e8Sjob 	if (outformats & FORMAT_JSON) {
335530399e8Sjob 		printf("\t\"type\": \"manifest\",\n");
336530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
337530399e8Sjob 		x509_print(x);
338530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
339530399e8Sjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
3402cf0e122Sjob 		printf("\t\"sia\": \"%s\",\n", p->sia);
341530399e8Sjob 		printf("\t\"manifest_number\": \"%s\",\n", p->seqnum);
342530399e8Sjob 		printf("\t\"valid_since\": %lld,\n", (long long)p->valid_since);
343530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->valid_until);
344530399e8Sjob 	} else {
345714f4e3fSclaudio 		printf("Subject key identifier:   %s\n", pretty_key_id(p->ski));
346714f4e3fSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
347530399e8Sjob 		x509_print(x);
348714f4e3fSclaudio 		printf("Authority info access:    %s\n", p->aia);
3492cf0e122Sjob 		printf("Subject info access:      %s\n", p->sia);
350714f4e3fSclaudio 		printf("Manifest Number:          %s\n", p->seqnum);
351530399e8Sjob 		printf("Manifest valid since:     %s\n", time2str(p->valid_since));
352530399e8Sjob 		printf("Manifest valid until:     %s\n", time2str(p->valid_until));
353*6530cf17Sjob 		printf("Files and hashes:\n");
354530399e8Sjob 	}
355530399e8Sjob 
356714f4e3fSclaudio 	for (i = 0; i < p->filesz; i++) {
357530399e8Sjob 		if (i == 0 && outformats & FORMAT_JSON)
358530399e8Sjob 			printf("\t\"filesandhashes\": [\n");
359530399e8Sjob 
360714f4e3fSclaudio 		if (base64_encode(p->files[i].hash, sizeof(p->files[i].hash),
361714f4e3fSclaudio 		    &hash) == -1)
362714f4e3fSclaudio 			errx(1, "base64_encode failure");
363530399e8Sjob 
364530399e8Sjob 		if (outformats & FORMAT_JSON) {
365530399e8Sjob 			printf("\t\t{ \"filename\": \"%s\",", p->files[i].file);
366530399e8Sjob 			printf(" \"hash\": \"%s\" }", hash);
367530399e8Sjob 			if (i + 1 < p->filesz)
368530399e8Sjob 				printf(",");
369530399e8Sjob 			printf("\n");
370530399e8Sjob 		} else {
371714f4e3fSclaudio 			printf("%5zu: %s\n", i + 1, p->files[i].file);
372714f4e3fSclaudio 			printf("\thash %s\n", hash);
373530399e8Sjob 		}
374530399e8Sjob 
375714f4e3fSclaudio 		free(hash);
376714f4e3fSclaudio 	}
377530399e8Sjob 
378530399e8Sjob 	if (outformats & FORMAT_JSON)
379530399e8Sjob 		printf("\t],\n");
380714f4e3fSclaudio }
381714f4e3fSclaudio 
382714f4e3fSclaudio void
383530399e8Sjob roa_print(const X509 *x, const struct roa *p)
384714f4e3fSclaudio {
385714f4e3fSclaudio 	char	 buf[128];
386714f4e3fSclaudio 	size_t	 i;
387714f4e3fSclaudio 
388530399e8Sjob 	if (outformats & FORMAT_JSON) {
389530399e8Sjob 		printf("\t\"type\": \"roa\",\n");
390530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
391530399e8Sjob 		x509_print(x);
392530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
393530399e8Sjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
3942cf0e122Sjob 		printf("\t\"sia\": \"%s\",\n", p->sia);
395530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
396530399e8Sjob 	} else {
397714f4e3fSclaudio 		printf("Subject key identifier:   %s\n", pretty_key_id(p->ski));
398530399e8Sjob 		x509_print(x);
399714f4e3fSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
400714f4e3fSclaudio 		printf("Authority info access:    %s\n", p->aia);
4012cf0e122Sjob 		printf("Subject info access:      %s\n", p->sia);
402220c707cSclaudio 		printf("ROA valid until:          %s\n", time2str(p->expires));
403714f4e3fSclaudio 		printf("asID:                     %u\n", p->asid);
4042cf0e122Sjob 		printf("IP address blocks:\n");
405530399e8Sjob 	}
406530399e8Sjob 
407714f4e3fSclaudio 	for (i = 0; i < p->ipsz; i++) {
408530399e8Sjob 		if (i == 0 && outformats & FORMAT_JSON)
409530399e8Sjob 			printf("\t\"vrps\": [\n");
410530399e8Sjob 
411714f4e3fSclaudio 		ip_addr_print(&p->ips[i].addr,
412714f4e3fSclaudio 		    p->ips[i].afi, buf, sizeof(buf));
413530399e8Sjob 
414530399e8Sjob 		if (outformats & FORMAT_JSON) {
415530399e8Sjob 			printf("\t\t{ \"prefix\": \"%s\",", buf);
416530399e8Sjob 			printf(" \"asid\": %u,", p->asid);
417530399e8Sjob 			printf(" \"maxlen\": %hhu }", p->ips[i].maxlength);
418530399e8Sjob 			if (i + 1 < p->ipsz)
419530399e8Sjob 				printf(",");
420530399e8Sjob 			printf("\n");
421530399e8Sjob 		} else
422530399e8Sjob 			printf("%5zu: %s maxlen: %hhu\n", i + 1, buf,
423530399e8Sjob 			    p->ips[i].maxlength);
424714f4e3fSclaudio 	}
425530399e8Sjob 
426530399e8Sjob 	if (outformats & FORMAT_JSON)
427530399e8Sjob 		printf("\t],\n");
428714f4e3fSclaudio }
429714f4e3fSclaudio 
430714f4e3fSclaudio void
431530399e8Sjob gbr_print(const X509 *x, const struct gbr *p)
432714f4e3fSclaudio {
433530399e8Sjob 	size_t	i;
434530399e8Sjob 
435530399e8Sjob 	if (outformats & FORMAT_JSON) {
436530399e8Sjob 		printf("\t\"type\": \"gbr\",\n");
437530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
438530399e8Sjob 		x509_print(x);
439530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
440530399e8Sjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
4412cf0e122Sjob 		printf("\t\"sia\": \"%s\",\n", p->sia);
442530399e8Sjob 		printf("\t\"vcard\": \"");
443530399e8Sjob 		for (i = 0; i < strlen(p->vcard); i++) {
444530399e8Sjob 			if (p->vcard[i] == '"')
445530399e8Sjob 				printf("\\\"");
446530399e8Sjob 			if (p->vcard[i] == '\r')
447530399e8Sjob 				continue;
448530399e8Sjob 			if (p->vcard[i] == '\n')
449530399e8Sjob 				printf("\\r\\n");
450530399e8Sjob 			else
451530399e8Sjob 				putchar(p->vcard[i]);
452530399e8Sjob 		}
453530399e8Sjob 		printf("\",\n");
454530399e8Sjob 	} else {
455714f4e3fSclaudio 		printf("Subject key identifier:   %s\n", pretty_key_id(p->ski));
456530399e8Sjob 		x509_print(x);
457714f4e3fSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
458714f4e3fSclaudio 		printf("Authority info access:    %s\n", p->aia);
4592cf0e122Sjob 		printf("Subject info access:      %s\n", p->sia);
460714f4e3fSclaudio 		printf("vcard:\n%s", p->vcard);
461714f4e3fSclaudio 	}
462530399e8Sjob }
46304834fbdSjob 
46404834fbdSjob void
46504834fbdSjob rsc_print(const X509 *x, const struct rsc *p)
46604834fbdSjob {
46704834fbdSjob 	char	 buf1[64], buf2[64], tbuf[21];
46804834fbdSjob 	char	*hash;
46904834fbdSjob 	int	 sockt;
47004834fbdSjob 	size_t	 i, j;
47104834fbdSjob 
47204834fbdSjob 	strftime(tbuf, sizeof(tbuf), "%FT%TZ", gmtime(&p->expires));
47304834fbdSjob 
47404834fbdSjob 	if (outformats & FORMAT_JSON) {
47504834fbdSjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
47604834fbdSjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
47704834fbdSjob 		x509_print(x);
47804834fbdSjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
47904834fbdSjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
48004834fbdSjob 		printf("\t\"signed_with_resources\": [\n");
48104834fbdSjob 	} else {
48204834fbdSjob 		printf("Subject key identifier:   %s\n", pretty_key_id(p->ski));
48304834fbdSjob 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
48404834fbdSjob 		x509_print(x);
48504834fbdSjob 		printf("Authority info access:    %s\n", p->aia);
48604834fbdSjob 		printf("Valid until:              %s\n", tbuf);
48704834fbdSjob 		printf("Signed with resources:\n");
48804834fbdSjob 	}
48904834fbdSjob 
49004834fbdSjob 	for (i = 0; i < p->asz; i++) {
49104834fbdSjob 		switch (p->as[i].type) {
49204834fbdSjob 		case CERT_AS_ID:
49304834fbdSjob 			if (outformats & FORMAT_JSON)
49404834fbdSjob 				printf("\t\t{ \"asid\": %u }", p->as[i].id);
49504834fbdSjob 			else
49604834fbdSjob 				printf("%5zu: AS: %u", i + 1, p->as[i].id);
49704834fbdSjob 			break;
49804834fbdSjob 		case CERT_AS_RANGE:
49904834fbdSjob 			if (outformats & FORMAT_JSON)
50004834fbdSjob 				printf("\t\t{ \"asrange\": { \"min\": %u, "
50104834fbdSjob 				    "\"max\": %u }}", p->as[i].range.min,
50204834fbdSjob 				    p->as[i].range.max);
50304834fbdSjob 			else
50404834fbdSjob 				printf("%5zu: AS: %u -- %u", i + 1,
50504834fbdSjob 				    p->as[i].range.min, p->as[i].range.max);
50604834fbdSjob 			break;
50704834fbdSjob 		case CERT_AS_INHERIT:
50804834fbdSjob 			/* inheritance isn't possible in RSC */
50904834fbdSjob 			break;
51004834fbdSjob 		}
51104834fbdSjob 		if (outformats & FORMAT_JSON && i + 1 < p->asz + p->ipsz)
51204834fbdSjob 			printf(",\n");
51304834fbdSjob 		else
51404834fbdSjob 			printf("\n");
51504834fbdSjob 	}
51604834fbdSjob 
51704834fbdSjob 	for (j = 0; j < p->ipsz; j++) {
51804834fbdSjob 		switch (p->ips[j].type) {
51904834fbdSjob 		case CERT_IP_ADDR:
52004834fbdSjob 			ip_addr_print(&p->ips[j].ip,
52104834fbdSjob 			    p->ips[j].afi, buf1, sizeof(buf1));
52204834fbdSjob 			if (outformats & FORMAT_JSON)
52304834fbdSjob 				printf("\t\t{ \"ip_prefix\": \"%s\" }", buf1);
52404834fbdSjob 			else
52504834fbdSjob 				printf("%5zu: IP: %s", i + j + 1, buf1);
52604834fbdSjob 			break;
52704834fbdSjob 		case CERT_IP_RANGE:
52804834fbdSjob 			sockt = (p->ips[j].afi == AFI_IPV4) ?
52904834fbdSjob 			    AF_INET : AF_INET6;
53004834fbdSjob 			inet_ntop(sockt, p->ips[j].min, buf1, sizeof(buf1));
53104834fbdSjob 			inet_ntop(sockt, p->ips[j].max, buf2, sizeof(buf2));
53204834fbdSjob 			if (outformats & FORMAT_JSON)
53304834fbdSjob 				printf("\t\t{ \"ip_range\": { \"min\": \"%s\""
53404834fbdSjob 				    ", \"max\": \"%s\" }}", buf1, buf2);
53504834fbdSjob 			else
53604834fbdSjob 				printf("%5zu: IP: %s -- %s", i + j + 1, buf1,
53704834fbdSjob 				    buf2);
53804834fbdSjob 			break;
53904834fbdSjob 		case CERT_IP_INHERIT:
54004834fbdSjob 			/* inheritance isn't possible in RSC */
54104834fbdSjob 			break;
54204834fbdSjob 		}
54304834fbdSjob 		if (outformats & FORMAT_JSON && i + j + 1 < p->asz + p->ipsz)
54404834fbdSjob 			printf(",\n");
54504834fbdSjob 		else
54604834fbdSjob 			printf("\n");
54704834fbdSjob 	}
54804834fbdSjob 
54904834fbdSjob 	if (outformats & FORMAT_JSON) {
55004834fbdSjob 		printf("\t],\n");
55104834fbdSjob 		printf("\t\"filenamesandhashes\": [\n");
55204834fbdSjob 	} else
55304834fbdSjob 		printf("Filenames and hashes:\n");
55404834fbdSjob 
55504834fbdSjob 	for (i = 0; i < p->filesz; i++) {
55604834fbdSjob 		if (base64_encode(p->files[i].hash, sizeof(p->files[i].hash),
55704834fbdSjob 		    &hash) == -1)
55804834fbdSjob 			errx(1, "base64_encode failure");
55904834fbdSjob 
56004834fbdSjob 		if (outformats & FORMAT_JSON) {
56104834fbdSjob 			printf("\t\t{ \"filename\": \"%s\",",
56204834fbdSjob 			    p->files[i].filename ? p->files[i].filename : "");
56304834fbdSjob 			printf(" \"hash_digest\": \"%s\" }", hash);
56404834fbdSjob 			if (i + 1 < p->filesz)
56504834fbdSjob 				printf(",");
56604834fbdSjob 			printf("\n");
56704834fbdSjob 		} else {
56804834fbdSjob 			printf("%5zu: %s\n", i + 1, p->files[i].filename
56904834fbdSjob 			    ? p->files[i].filename : "no filename");
57004834fbdSjob 			printf("\thash %s\n", hash);
57104834fbdSjob 		}
57204834fbdSjob 
57304834fbdSjob 		free(hash);
57404834fbdSjob 	}
57504834fbdSjob 
57604834fbdSjob 	if (outformats & FORMAT_JSON)
57704834fbdSjob 		printf("\t],\n");
57804834fbdSjob }
579a29ddfd5Sjob 
580a29ddfd5Sjob void
581a29ddfd5Sjob aspa_print(const X509 *x, const struct aspa *p)
582a29ddfd5Sjob {
583a29ddfd5Sjob 	size_t	i;
584a29ddfd5Sjob 
585a29ddfd5Sjob 	if (outformats & FORMAT_JSON) {
586a29ddfd5Sjob 		printf("\t\"type\": \"aspa\",\n");
587a29ddfd5Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
588a29ddfd5Sjob 		x509_print(x);
589a29ddfd5Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
590a29ddfd5Sjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
5912cf0e122Sjob 		printf("\t\"sia\": \"%s\",\n", p->sia);
592a29ddfd5Sjob 		printf("\t\"customer_asid\": %u,\n", p->custasid);
593a29ddfd5Sjob 		printf("\t\"provider_set\": [\n");
594a29ddfd5Sjob 		for (i = 0; i < p->providersz; i++) {
595a29ddfd5Sjob 			printf("\t\t{ \"asid\": %u", p->providers[i].as);
596a29ddfd5Sjob 			if (p->providers[i].afi == AFI_IPV4)
597a29ddfd5Sjob 				printf(", \"afi_limit\": \"ipv4\"");
598a29ddfd5Sjob 			if (p->providers[i].afi == AFI_IPV6)
599a29ddfd5Sjob 				printf(", \"afi_limit\": \"ipv6\"");
600a29ddfd5Sjob 			printf(" }");
601a29ddfd5Sjob 			if (i + 1 < p->providersz)
602a29ddfd5Sjob 				printf(",");
603a29ddfd5Sjob 			printf("\n");
604a29ddfd5Sjob 		}
605a29ddfd5Sjob 		printf("\t],\n");
606a29ddfd5Sjob 	} else {
607a29ddfd5Sjob 		printf("Subject key identifier:   %s\n", pretty_key_id(p->ski));
608a29ddfd5Sjob 		x509_print(x);
609a29ddfd5Sjob 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
610a29ddfd5Sjob 		printf("Authority info access:    %s\n", p->aia);
6112cf0e122Sjob 		printf("Subject info access:      %s\n", p->sia);
612a29ddfd5Sjob 		printf("Customer AS:              %u\n", p->custasid);
613a29ddfd5Sjob 		printf("Provider Set:\n");
614a29ddfd5Sjob 		for (i = 0; i < p->providersz; i++) {
615a29ddfd5Sjob 			printf("%5zu: AS: %d", i + 1, p->providers[i].as);
616a29ddfd5Sjob 			switch (p->providers[i].afi) {
617a29ddfd5Sjob 			case AFI_IPV4:
618a29ddfd5Sjob 				printf(" (IPv4 only)");
619a29ddfd5Sjob 				break;
620a29ddfd5Sjob 			case AFI_IPV6:
621a29ddfd5Sjob 				printf(" (IPv6 only)");
622a29ddfd5Sjob 				break;
623a29ddfd5Sjob 			default:
624a29ddfd5Sjob 				break;
625a29ddfd5Sjob 			}
626a29ddfd5Sjob 			printf("\n");
627a29ddfd5Sjob 		}
628a29ddfd5Sjob 	}
629a29ddfd5Sjob }
630ee2a33daSjob 
631ee2a33daSjob static void
632ee2a33daSjob takey_print(char *name, const struct takey *t)
633ee2a33daSjob {
634ee2a33daSjob 	char	*spki = NULL;
635ee2a33daSjob 	size_t	 i, j = 0;
636ee2a33daSjob 
637ee2a33daSjob 	if (base64_encode(t->pubkey, t->pubkeysz, &spki) != 0)
638ee2a33daSjob 		errx(1, "base64_encode failed in %s", __func__);
639ee2a33daSjob 
640ee2a33daSjob 	if (outformats & FORMAT_JSON) {
641ee2a33daSjob 		printf("\t\t{\n\t\t\t\"name\": \"%s\",\n", name);
642ee2a33daSjob 		printf("\t\t\t\"comments\": [");
643ee2a33daSjob 		for (i = 0; i < t->commentsz; i++) {
644ee2a33daSjob 			printf("\"%s\"", t->comments[i]);
645ee2a33daSjob 			if (i + 1 < t->commentsz)
646ee2a33daSjob 				printf(", ");
647ee2a33daSjob 		}
648ee2a33daSjob 		printf("],\n");
649ee2a33daSjob 		printf("\t\t\t\"uris\": [");
650ee2a33daSjob 		for (i = 0; i < t->urisz; i++) {
651ee2a33daSjob 			printf("\"%s\"", t->uris[i]);
652ee2a33daSjob 			if (i + 1 < t->urisz)
653ee2a33daSjob 				printf(", ");
654ee2a33daSjob 		}
655ee2a33daSjob 		printf("],\n");
656ee2a33daSjob 		printf("\t\t\t\"spki\": \"%s\"\n\t\t}", spki);
657ee2a33daSjob 	} else {
658ee2a33daSjob 		printf("TAL derived from the '%s' Trust Anchor Key:\n\n", name);
659ee2a33daSjob 
660ee2a33daSjob 		for (i = 0; i < t->commentsz; i++) {
661ee2a33daSjob 			printf("\t# %s\n", t->comments[i]);
662ee2a33daSjob 		}
663ee2a33daSjob 
664ee2a33daSjob 		for (i = 0; i < t->urisz; i++) {
665ee2a33daSjob 			printf("\t%s\n\n\t", t->uris[i]);
666ee2a33daSjob 		}
667ee2a33daSjob 
668ee2a33daSjob 		for (i = 0; i < strlen(spki); i++) {
669ee2a33daSjob 			printf("%c", spki[i]);
670ee2a33daSjob 			j++;
671ee2a33daSjob 			if (j == 64) {
672ee2a33daSjob 				printf("\n\t");
673ee2a33daSjob 				j = 0;
674ee2a33daSjob 			}
675ee2a33daSjob 		}
676ee2a33daSjob 
677ee2a33daSjob 		printf("\n\n");
678ee2a33daSjob 	}
679ee2a33daSjob 
680ee2a33daSjob 	free(spki);
681ee2a33daSjob }
682ee2a33daSjob 
683ee2a33daSjob void
684ee2a33daSjob tak_print(const X509 *x, const struct tak *p)
685ee2a33daSjob {
686ee2a33daSjob 	char	tbuf[21];
687ee2a33daSjob 
688ee2a33daSjob 	if (outformats & FORMAT_JSON) {
689ee2a33daSjob 		printf("\t\"type\": \"tak\",\n");
690ee2a33daSjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
691ee2a33daSjob 		x509_print(x);
692ee2a33daSjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
693ee2a33daSjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
6942cf0e122Sjob 		printf("\t\"sia\": \"%s\",\n", p->sia);
695ee2a33daSjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
696ee2a33daSjob 		printf("\t\"takeys\": [\n");
697ee2a33daSjob 	} else {
698ee2a33daSjob 		strftime(tbuf, sizeof(tbuf), "%FT%TZ", gmtime(&p->expires));
699ee2a33daSjob 		printf("Subject key identifier:   %s\n", pretty_key_id(p->ski));
700ee2a33daSjob 		x509_print(x);
701ee2a33daSjob 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
702ee2a33daSjob 		printf("Authority info access:    %s\n", p->aia);
7032cf0e122Sjob 		printf("Subject info access:      %s\n", p->sia);
704*6530cf17Sjob 		printf("TAK valid until:          %s\n", tbuf);
705ee2a33daSjob 	}
706ee2a33daSjob 
707ee2a33daSjob 	takey_print("current", p->current);
708ee2a33daSjob 
709ee2a33daSjob 	if (p->predecessor != NULL) {
710ee2a33daSjob 		if (outformats & FORMAT_JSON)
711ee2a33daSjob 			printf(",\n");
712ee2a33daSjob 		takey_print("predecessor", p->predecessor);
713ee2a33daSjob 	}
714ee2a33daSjob 
715ee2a33daSjob 	if (p->successor != NULL) {
716ee2a33daSjob 		if (outformats & FORMAT_JSON)
717ee2a33daSjob 			printf(",\n");
718ee2a33daSjob 		takey_print("successor", p->successor);
719ee2a33daSjob 	}
720ee2a33daSjob 
721ee2a33daSjob 	if (outformats & FORMAT_JSON)
722ee2a33daSjob 		printf("\n\t],\n");
723ee2a33daSjob }
724