xref: /openbsd/usr.sbin/rpki-client/print.c (revision 67642cb5)
1*67642cb5Stb /*	$OpenBSD: print.c,v 1.10 2022/04/24 18:20:12 tb Exp $ */
2714f4e3fSclaudio /*
3714f4e3fSclaudio  * Copyright (c) 2021 Claudio Jeker <claudio@openbsd.org>
4714f4e3fSclaudio  * Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
5714f4e3fSclaudio  *
6714f4e3fSclaudio  * Permission to use, copy, modify, and distribute this software for any
7714f4e3fSclaudio  * purpose with or without fee is hereby granted, provided that the above
8714f4e3fSclaudio  * copyright notice and this permission notice appear in all copies.
9714f4e3fSclaudio  *
10714f4e3fSclaudio  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11714f4e3fSclaudio  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12714f4e3fSclaudio  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13714f4e3fSclaudio  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14714f4e3fSclaudio  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15714f4e3fSclaudio  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16714f4e3fSclaudio  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17714f4e3fSclaudio  */
18714f4e3fSclaudio 
19714f4e3fSclaudio #include <sys/types.h>
20714f4e3fSclaudio #include <sys/socket.h>
21714f4e3fSclaudio #include <arpa/inet.h>
22714f4e3fSclaudio 
23714f4e3fSclaudio #include <err.h>
24714f4e3fSclaudio #include <stdio.h>
25714f4e3fSclaudio #include <string.h>
26714f4e3fSclaudio #include <time.h>
27714f4e3fSclaudio 
28e911df76Sjob #include <openssl/evp.h>
29e911df76Sjob 
30714f4e3fSclaudio #include "extern.h"
31714f4e3fSclaudio 
32714f4e3fSclaudio static const char *
33254fd372Sclaudio pretty_key_id(const char *hex)
34714f4e3fSclaudio {
35714f4e3fSclaudio 	static char buf[128];	/* bigger than SHA_DIGEST_LENGTH * 3 */
36714f4e3fSclaudio 	size_t i;
37714f4e3fSclaudio 
38714f4e3fSclaudio 	for (i = 0; i < sizeof(buf) && *hex != '\0'; i++) {
39254fd372Sclaudio 		if  (i % 3 == 2)
40714f4e3fSclaudio 			buf[i] = ':';
41714f4e3fSclaudio 		else
42714f4e3fSclaudio 			buf[i] = *hex++;
43714f4e3fSclaudio 	}
44714f4e3fSclaudio 	if (i == sizeof(buf))
45714f4e3fSclaudio 		memcpy(buf + sizeof(buf) - 4, "...", 4);
46254fd372Sclaudio 	else
47254fd372Sclaudio 		buf[i] = '\0';
48714f4e3fSclaudio 	return buf;
49714f4e3fSclaudio }
50714f4e3fSclaudio 
51220c707cSclaudio char *
52220c707cSclaudio time2str(time_t t)
53220c707cSclaudio {
54220c707cSclaudio 	static char buf[64];
55220c707cSclaudio 	struct tm tm;
56220c707cSclaudio 
57220c707cSclaudio 	if (gmtime_r(&t, &tm) == NULL)
58220c707cSclaudio 		return "could not convert time";
59220c707cSclaudio 
60220c707cSclaudio 	strftime(buf, sizeof(buf), "%h %d %T %Y %Z", &tm);
61220c707cSclaudio 	return buf;
62220c707cSclaudio }
63220c707cSclaudio 
64714f4e3fSclaudio void
65714f4e3fSclaudio tal_print(const struct tal *p)
66714f4e3fSclaudio {
67e911df76Sjob 	char			*ski;
68e911df76Sjob 	EVP_PKEY		*pk;
69e911df76Sjob 	RSA			*r;
70e911df76Sjob 	const unsigned char	*der;
71e911df76Sjob 	unsigned char		*rder = NULL;
72e911df76Sjob 	unsigned char		 md[SHA_DIGEST_LENGTH];
73e911df76Sjob 	int			 rder_len;
74714f4e3fSclaudio 	size_t			 i;
75714f4e3fSclaudio 
76e911df76Sjob 
77e911df76Sjob 	der = p->pkey;
78e911df76Sjob 	pk = d2i_PUBKEY(NULL, &der, p->pkeysz);
79e911df76Sjob 	if (pk == NULL)
80e911df76Sjob 		errx(1, "d2i_PUBKEY failed in %s", __func__);
81e911df76Sjob 
82e911df76Sjob 	r = EVP_PKEY_get0_RSA(pk);
83e911df76Sjob 	if (r == NULL)
84e911df76Sjob 		errx(1, "EVP_PKEY_get0_RSA failed in %s", __func__);
85e911df76Sjob 	if ((rder_len = i2d_RSAPublicKey(r, &rder)) <= 0)
86e911df76Sjob 		errx(1, "i2d_RSAPublicKey failed in %s", __func__);
87e911df76Sjob 
88e911df76Sjob 	if (!EVP_Digest(rder, rder_len, md, NULL, EVP_sha1(), NULL))
89e911df76Sjob 		errx(1, "EVP_Digest failed in %s", __func__);
90e911df76Sjob 
91e911df76Sjob 	ski = hex_encode(md, SHA_DIGEST_LENGTH);
92e911df76Sjob 
93530399e8Sjob 	if (outformats & FORMAT_JSON) {
94530399e8Sjob 		printf("\t\"type\": \"tal\",\n");
95530399e8Sjob 		printf("\t\"name\": %s\n", p->descr);
96530399e8Sjob 		printf("\t\"ski\": %s\n", pretty_key_id(ski));
97530399e8Sjob 		printf("\t\"trust_anchor_locations\": [");
98530399e8Sjob 		for (i = 0; i < p->urisz; i++) {
99530399e8Sjob 			printf("\"%s\"", p->uri[i]);
100530399e8Sjob 			if (i + 1 < p->urisz)
101530399e8Sjob 				printf(", ");
102530399e8Sjob 		}
103530399e8Sjob 		printf("]\n");
104530399e8Sjob 	} else {
105530399e8Sjob 		printf("Trust anchor name: %s\n", p->descr);
106530399e8Sjob 		printf("Subject key identifier: %s\n", pretty_key_id(ski));
107e911df76Sjob 		printf("Trust anchor locations:\n");
108714f4e3fSclaudio 		for (i = 0; i < p->urisz; i++)
109e911df76Sjob 			printf("%5zu: %s\n", i + 1, p->uri[i]);
110530399e8Sjob 	}
111e911df76Sjob 
112e911df76Sjob 	EVP_PKEY_free(pk);
113e911df76Sjob 	free(rder);
114e911df76Sjob 	free(ski);
115714f4e3fSclaudio }
116714f4e3fSclaudio 
117714f4e3fSclaudio void
118530399e8Sjob x509_print(const X509 *x)
119530399e8Sjob {
120530399e8Sjob 	const ASN1_INTEGER	*xserial;
121530399e8Sjob 	char			*serial = NULL;
122530399e8Sjob 
123530399e8Sjob 	xserial = X509_get0_serialNumber(x);
124530399e8Sjob 	if (xserial == NULL) {
125530399e8Sjob 		warnx("X509_get0_serialNumber failed in %s", __func__);
126530399e8Sjob 		goto out;
127530399e8Sjob 	}
128530399e8Sjob 
129530399e8Sjob 	serial = x509_convert_seqnum(__func__, xserial);
130530399e8Sjob 	if (serial == NULL) {
131530399e8Sjob 		warnx("x509_convert_seqnum failed in %s", __func__);
132530399e8Sjob 		goto out;
133530399e8Sjob 	}
134530399e8Sjob 
135530399e8Sjob 	if (outformats & FORMAT_JSON) {
136530399e8Sjob 		printf("\t\"cert_serial\": \"%s\",\n", serial);
137530399e8Sjob 	} else {
138530399e8Sjob 		printf("Certificate serial: %s\n", serial);
139530399e8Sjob 	}
140530399e8Sjob 
141530399e8Sjob  out:
142530399e8Sjob 	free(serial);
143530399e8Sjob }
144530399e8Sjob 
145530399e8Sjob void
146714f4e3fSclaudio cert_print(const struct cert *p)
147714f4e3fSclaudio {
148530399e8Sjob 	size_t			 i, j;
149714f4e3fSclaudio 	char			 buf1[64], buf2[64];
150714f4e3fSclaudio 	int			 sockt;
151714f4e3fSclaudio 	char			 tbuf[21];
152714f4e3fSclaudio 
153530399e8Sjob 	strftime(tbuf, sizeof(tbuf), "%FT%TZ", gmtime(&p->expires));
154530399e8Sjob 
155530399e8Sjob 	if (outformats & FORMAT_JSON) {
156530399e8Sjob 		if (p->pubkey != NULL)
157530399e8Sjob 			printf("\t\"type\": \"router_key\",\n");
158530399e8Sjob 		else
159530399e8Sjob 			printf("\t\"type\": \"ca_cert\",\n");
160530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
161530399e8Sjob 		if (p->aki != NULL)
162530399e8Sjob 			printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
163530399e8Sjob 		x509_print(p->x509);
164530399e8Sjob 		if (p->aia != NULL)
165530399e8Sjob 			printf("\t\"aia\": \"%s\",\n", p->aia);
166530399e8Sjob 		if (p->mft != NULL)
167530399e8Sjob 			printf("\t\"manifest\": \"%s\",\n", p->mft);
168530399e8Sjob 		if (p->repo != NULL)
169530399e8Sjob 			printf("\t\"carepository\": \"%s\",\n", p->repo);
170530399e8Sjob 		if (p->notify != NULL)
171530399e8Sjob 			printf("\t\"notify_url\": \"%s\",\n", p->notify);
172530399e8Sjob 		if (p->pubkey != NULL)
173530399e8Sjob 			printf("\t\"router_key\": \"%s\",\n", p->pubkey);
174530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
175530399e8Sjob 		printf("\t\"subordinate_resources\": [\n");
176530399e8Sjob 	} else {
177714f4e3fSclaudio 		printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
178714f4e3fSclaudio 		if (p->aki != NULL)
179*67642cb5Stb 			printf("Authority key identifier: %s\n",
180*67642cb5Stb 			    pretty_key_id(p->aki));
181530399e8Sjob 		x509_print(p->x509);
182714f4e3fSclaudio 		if (p->aia != NULL)
183714f4e3fSclaudio 			printf("Authority info access: %s\n", p->aia);
184714f4e3fSclaudio 		if (p->mft != NULL)
185714f4e3fSclaudio 			printf("Manifest: %s\n", p->mft);
186714f4e3fSclaudio 		if (p->repo != NULL)
187714f4e3fSclaudio 			printf("caRepository: %s\n", p->repo);
188714f4e3fSclaudio 		if (p->notify != NULL)
189714f4e3fSclaudio 			printf("Notify URL: %s\n", p->notify);
190714f4e3fSclaudio 		if (p->pubkey != NULL)
191*67642cb5Stb 			printf("BGPsec P-256 ECDSA public key: %s\n",
192*67642cb5Stb 			    p->pubkey);
193714f4e3fSclaudio 		printf("Valid until: %s\n", tbuf);
194714f4e3fSclaudio 		printf("Subordinate Resources:\n");
195530399e8Sjob 	}
196714f4e3fSclaudio 
197530399e8Sjob 	for (i = 0; i < p->asz; i++) {
198714f4e3fSclaudio 		switch (p->as[i].type) {
199714f4e3fSclaudio 		case CERT_AS_ID:
200530399e8Sjob 			if (outformats & FORMAT_JSON)
201530399e8Sjob 				printf("\t\t{ \"asid\": %u }", p->as[i].id);
202530399e8Sjob 			else
203530399e8Sjob 				printf("%5zu: AS: %u", i + 1, p->as[i].id);
204714f4e3fSclaudio 			break;
205714f4e3fSclaudio 		case CERT_AS_INHERIT:
206530399e8Sjob 			if (outformats & FORMAT_JSON)
207530399e8Sjob 				printf("\t\t{ \"asid_inherit\": \"true\" }");
208530399e8Sjob 			else
209530399e8Sjob 				printf("%5zu: AS: inherit", i + 1);
210714f4e3fSclaudio 			break;
211714f4e3fSclaudio 		case CERT_AS_RANGE:
212530399e8Sjob 			if (outformats & FORMAT_JSON)
213530399e8Sjob 				printf("\t\t{ \"asrange\": { \"min\": %u, "
214530399e8Sjob 				    "\"max\": %u }}", p->as[i].range.min,
215530399e8Sjob 				    p->as[i].range.max);
216530399e8Sjob 			else
217530399e8Sjob 				printf("%5zu: AS: %u -- %u", i + 1,
218714f4e3fSclaudio 				    p->as[i].range.min, p->as[i].range.max);
219714f4e3fSclaudio 			break;
220714f4e3fSclaudio 		}
221530399e8Sjob 		if (outformats & FORMAT_JSON && i + 1 < p->asz + p->ipsz)
222530399e8Sjob 			printf(",\n");
223530399e8Sjob 		else
224530399e8Sjob 			printf("\n");
225714f4e3fSclaudio 	}
226714f4e3fSclaudio 
227530399e8Sjob 	for (j = 0; j < p->ipsz; j++) {
228530399e8Sjob 		switch (p->ips[j].type) {
229530399e8Sjob 		case CERT_IP_INHERIT:
230530399e8Sjob 			if (outformats & FORMAT_JSON)
231530399e8Sjob 				printf("\t\t{ \"ip_inherit\": \"true\" }");
232530399e8Sjob 			else
233530399e8Sjob 				printf("%5zu: IP: inherit", i + j + 1);
234530399e8Sjob 			break;
235530399e8Sjob 		case CERT_IP_ADDR:
236530399e8Sjob 			ip_addr_print(&p->ips[j].ip,
237530399e8Sjob 			    p->ips[j].afi, buf1, sizeof(buf1));
238530399e8Sjob 			if (outformats & FORMAT_JSON)
239530399e8Sjob 				printf("\t\t{ \"ip_prefix\": \"%s\" }", buf1);
240530399e8Sjob 			else
241530399e8Sjob 				printf("%5zu: IP: %s", i + j + 1, buf1);
242530399e8Sjob 			break;
243530399e8Sjob 		case CERT_IP_RANGE:
244530399e8Sjob 			sockt = (p->ips[j].afi == AFI_IPV4) ?
245530399e8Sjob 				AF_INET : AF_INET6;
246530399e8Sjob 			inet_ntop(sockt, p->ips[j].min, buf1, sizeof(buf1));
247530399e8Sjob 			inet_ntop(sockt, p->ips[j].max, buf2, sizeof(buf2));
248530399e8Sjob 			if (outformats & FORMAT_JSON)
249530399e8Sjob 				printf("\t\t{ \"ip_range\": { \"min\": \"%s\""
250530399e8Sjob 				    ", \"max\": \"%s\" }}", buf1, buf2);
251530399e8Sjob 			else
252530399e8Sjob 				printf("%5zu: IP: %s -- %s", i + j + 1, buf1,
253530399e8Sjob 				    buf2);
254530399e8Sjob 			break;
255530399e8Sjob 		}
256530399e8Sjob 		if (outformats & FORMAT_JSON && i + j + 1 < p->asz + p->ipsz)
257530399e8Sjob 			printf(",\n");
258530399e8Sjob 		else
259530399e8Sjob 			printf("\n");
260530399e8Sjob 	}
261530399e8Sjob 
262530399e8Sjob 	if (outformats & FORMAT_JSON)
263530399e8Sjob 		printf("\t],\n");
264714f4e3fSclaudio }
265714f4e3fSclaudio 
266714f4e3fSclaudio void
267220c707cSclaudio crl_print(const struct crl *p)
268220c707cSclaudio {
269220c707cSclaudio 	STACK_OF(X509_REVOKED)	*revlist;
270220c707cSclaudio 	X509_REVOKED *rev;
2717cdd491fSclaudio 	ASN1_INTEGER *crlnum;
272220c707cSclaudio 	int i;
2737cdd491fSclaudio 	char *serial;
274220c707cSclaudio 	time_t t;
275220c707cSclaudio 
276530399e8Sjob 	if (outformats & FORMAT_JSON) {
277530399e8Sjob 		printf("\t\"type\": \"crl\",\n");
278530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
279530399e8Sjob 	} else
280220c707cSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
2817cdd491fSclaudio 
2827cdd491fSclaudio 	crlnum = X509_CRL_get_ext_d2i(p->x509_crl, NID_crl_number, NULL, NULL);
2837cdd491fSclaudio 	serial = x509_convert_seqnum(__func__, crlnum);
284530399e8Sjob 	if (serial != NULL) {
285530399e8Sjob 		if (outformats & FORMAT_JSON)
286530399e8Sjob 			printf("\t\"crl_serial\": \"%s\",\n", serial);
287530399e8Sjob 		else
2887cdd491fSclaudio 			printf("CRL Serial Number: %s\n", serial);
289530399e8Sjob 	}
2907cdd491fSclaudio 	free(serial);
2917cdd491fSclaudio 	ASN1_INTEGER_free(crlnum);
2927cdd491fSclaudio 
293530399e8Sjob 	if (outformats & FORMAT_JSON) {
294530399e8Sjob 		printf("\t\"valid_since\": %lld,\n", (long long)p->issued);
295530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
296530399e8Sjob 		printf("\t\"revoked_certs\": [\n");
297530399e8Sjob 	} else {
298220c707cSclaudio 		printf("CRL valid since: %s\n", time2str(p->issued));
299220c707cSclaudio 		printf("CRL valid until: %s\n", time2str(p->expires));
300530399e8Sjob 		printf("Revoked Certificates:\n");
301530399e8Sjob 	}
302220c707cSclaudio 
303220c707cSclaudio 	revlist = X509_CRL_get_REVOKED(p->x509_crl);
304220c707cSclaudio 	for (i = 0; i < sk_X509_REVOKED_num(revlist); i++) {
305220c707cSclaudio 		rev = sk_X509_REVOKED_value(revlist, i);
3067cdd491fSclaudio 		serial = x509_convert_seqnum(__func__,
3077cdd491fSclaudio 		    X509_REVOKED_get0_serialNumber(rev));
308220c707cSclaudio 		x509_get_time(X509_REVOKED_get0_revocationDate(rev), &t);
309530399e8Sjob 		if (serial != NULL) {
310530399e8Sjob 			if (outformats & FORMAT_JSON) {
311530399e8Sjob 				printf("\t\t{ \"serial\": \"%s\"", serial);
312530399e8Sjob 				printf(", \"date\": \"%s\" }", time2str(t));
313530399e8Sjob 				if (i + 1 < sk_X509_REVOKED_num(revlist))
314530399e8Sjob 					printf(",");
315530399e8Sjob 				printf("\n");
316530399e8Sjob 			} else
317530399e8Sjob 				printf("    Serial: %8s   Revocation Date: %s"
318530399e8Sjob 				    "\n", serial, time2str(t));
319530399e8Sjob 		}
3207cdd491fSclaudio 		free(serial);
321220c707cSclaudio 	}
322530399e8Sjob 
323530399e8Sjob 	if (outformats & FORMAT_JSON)
324530399e8Sjob 		printf("\t],\n");
325530399e8Sjob 	else if (i == 0)
326220c707cSclaudio 		printf("No Revoked Certificates\n");
327220c707cSclaudio }
328220c707cSclaudio 
329220c707cSclaudio void
330530399e8Sjob mft_print(const X509 *x, const struct mft *p)
331714f4e3fSclaudio {
332714f4e3fSclaudio 	size_t i;
333714f4e3fSclaudio 	char *hash;
334714f4e3fSclaudio 
335530399e8Sjob 	if (outformats & FORMAT_JSON) {
336530399e8Sjob 		printf("\t\"type\": \"manifest\",\n");
337530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
338530399e8Sjob 		x509_print(x);
339530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
340530399e8Sjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
341530399e8Sjob 		printf("\t\"manifest_number\": \"%s\",\n", p->seqnum);
342530399e8Sjob 		printf("\t\"valid_since\": %lld,\n", (long long)p->valid_since);
343530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->valid_until);
344530399e8Sjob 	} else {
345714f4e3fSclaudio 		printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
346714f4e3fSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
347530399e8Sjob 		x509_print(x);
348714f4e3fSclaudio 		printf("Authority info access: %s\n", p->aia);
349714f4e3fSclaudio 		printf("Manifest Number: %s\n", p->seqnum);
350530399e8Sjob 		printf("Manifest valid since: %s\n", time2str(p->valid_since));
351530399e8Sjob 		printf("Manifest valid until: %s\n", time2str(p->valid_until));
352530399e8Sjob 	}
353530399e8Sjob 
354714f4e3fSclaudio 	for (i = 0; i < p->filesz; i++) {
355530399e8Sjob 		if (i == 0 && outformats & FORMAT_JSON)
356530399e8Sjob 			printf("\t\"filesandhashes\": [\n");
357530399e8Sjob 
358714f4e3fSclaudio 		if (base64_encode(p->files[i].hash, sizeof(p->files[i].hash),
359714f4e3fSclaudio 		    &hash) == -1)
360714f4e3fSclaudio 			errx(1, "base64_encode failure");
361530399e8Sjob 
362530399e8Sjob 		if (outformats & FORMAT_JSON) {
363530399e8Sjob 			printf("\t\t{ \"filename\": \"%s\",", p->files[i].file);
364530399e8Sjob 			printf(" \"hash\": \"%s\" }", hash);
365530399e8Sjob 			if (i + 1 < p->filesz)
366530399e8Sjob 				printf(",");
367530399e8Sjob 			printf("\n");
368530399e8Sjob 		} else {
369714f4e3fSclaudio 			printf("%5zu: %s\n", i + 1, p->files[i].file);
370714f4e3fSclaudio 			printf("\thash %s\n", hash);
371530399e8Sjob 		}
372530399e8Sjob 
373714f4e3fSclaudio 		free(hash);
374714f4e3fSclaudio 	}
375530399e8Sjob 
376530399e8Sjob 	if (outformats & FORMAT_JSON)
377530399e8Sjob 		printf("\t],\n");
378530399e8Sjob 
379530399e8Sjob 
380714f4e3fSclaudio }
381714f4e3fSclaudio 
382714f4e3fSclaudio void
383530399e8Sjob roa_print(const X509 *x, const struct roa *p)
384714f4e3fSclaudio {
385714f4e3fSclaudio 	char	 buf[128];
386714f4e3fSclaudio 	size_t	 i;
387714f4e3fSclaudio 
388530399e8Sjob 	if (outformats & FORMAT_JSON) {
389530399e8Sjob 		printf("\t\"type\": \"roa\",\n");
390530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
391530399e8Sjob 		x509_print(x);
392530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
393530399e8Sjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
394530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
395530399e8Sjob 	} else {
396714f4e3fSclaudio 		printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
397530399e8Sjob 		x509_print(x);
398714f4e3fSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
399714f4e3fSclaudio 		printf("Authority info access: %s\n", p->aia);
400220c707cSclaudio 		printf("ROA valid until: %s\n", time2str(p->expires));
401714f4e3fSclaudio 		printf("asID: %u\n", p->asid);
402530399e8Sjob 	}
403530399e8Sjob 
404714f4e3fSclaudio 	for (i = 0; i < p->ipsz; i++) {
405530399e8Sjob 		if (i == 0 && outformats & FORMAT_JSON)
406530399e8Sjob 			printf("\t\"vrps\": [\n");
407530399e8Sjob 
408714f4e3fSclaudio 		ip_addr_print(&p->ips[i].addr,
409714f4e3fSclaudio 			p->ips[i].afi, buf, sizeof(buf));
410530399e8Sjob 
411530399e8Sjob 		if (outformats & FORMAT_JSON) {
412530399e8Sjob 			printf("\t\t{ \"prefix\": \"%s\",", buf);
413530399e8Sjob 			printf(" \"asid\": %u,", p->asid);
414530399e8Sjob 			printf(" \"maxlen\": %hhu }", p->ips[i].maxlength);
415530399e8Sjob 			if (i + 1 < p->ipsz)
416530399e8Sjob 				printf(",");
417530399e8Sjob 			printf("\n");
418530399e8Sjob 		} else
419530399e8Sjob 			printf("%5zu: %s maxlen: %hhu\n", i + 1, buf,
420530399e8Sjob 			    p->ips[i].maxlength);
421714f4e3fSclaudio 	}
422530399e8Sjob 
423530399e8Sjob 	if (outformats & FORMAT_JSON)
424530399e8Sjob 		printf("\t],\n");
425714f4e3fSclaudio }
426714f4e3fSclaudio 
427714f4e3fSclaudio void
428530399e8Sjob gbr_print(const X509 *x, const struct gbr *p)
429714f4e3fSclaudio {
430530399e8Sjob 	size_t	i;
431530399e8Sjob 
432530399e8Sjob 	if (outformats & FORMAT_JSON) {
433530399e8Sjob 		printf("\t\"type\": \"gbr\",\n");
434530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
435530399e8Sjob 		x509_print(x);
436530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
437530399e8Sjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
438530399e8Sjob 		printf("\t\"vcard\": \"");
439530399e8Sjob 		for (i = 0; i < strlen(p->vcard); i++) {
440530399e8Sjob 			if (p->vcard[i] == '"')
441530399e8Sjob 				printf("\\\"");
442530399e8Sjob 			if (p->vcard[i] == '\r')
443530399e8Sjob 				continue;
444530399e8Sjob 			if (p->vcard[i] == '\n')
445530399e8Sjob 				printf("\\r\\n");
446530399e8Sjob 			else
447530399e8Sjob 				putchar(p->vcard[i]);
448530399e8Sjob 		}
449530399e8Sjob 		printf("\",\n");
450530399e8Sjob 	} else {
451714f4e3fSclaudio 		printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
452530399e8Sjob 		x509_print(x);
453714f4e3fSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
454714f4e3fSclaudio 		printf("Authority info access: %s\n", p->aia);
455714f4e3fSclaudio 		printf("vcard:\n%s", p->vcard);
456714f4e3fSclaudio 	}
457530399e8Sjob }
458