xref: /openbsd/usr.sbin/rpki-client/print.c (revision ee2a33da)
1*ee2a33daSjob /*	$OpenBSD: print.c,v 1.17 2022/11/02 12:43:02 job Exp $ */
2714f4e3fSclaudio /*
3714f4e3fSclaudio  * Copyright (c) 2021 Claudio Jeker <claudio@openbsd.org>
4714f4e3fSclaudio  * Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
5714f4e3fSclaudio  *
6714f4e3fSclaudio  * Permission to use, copy, modify, and distribute this software for any
7714f4e3fSclaudio  * purpose with or without fee is hereby granted, provided that the above
8714f4e3fSclaudio  * copyright notice and this permission notice appear in all copies.
9714f4e3fSclaudio  *
10714f4e3fSclaudio  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11714f4e3fSclaudio  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12714f4e3fSclaudio  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13714f4e3fSclaudio  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14714f4e3fSclaudio  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15714f4e3fSclaudio  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16714f4e3fSclaudio  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17714f4e3fSclaudio  */
18714f4e3fSclaudio 
19714f4e3fSclaudio #include <sys/types.h>
20714f4e3fSclaudio #include <sys/socket.h>
21714f4e3fSclaudio #include <arpa/inet.h>
22714f4e3fSclaudio 
23714f4e3fSclaudio #include <err.h>
24714f4e3fSclaudio #include <stdio.h>
25714f4e3fSclaudio #include <string.h>
26714f4e3fSclaudio #include <time.h>
27714f4e3fSclaudio 
28e911df76Sjob #include <openssl/evp.h>
29e911df76Sjob 
30714f4e3fSclaudio #include "extern.h"
31714f4e3fSclaudio 
32714f4e3fSclaudio static const char *
33254fd372Sclaudio pretty_key_id(const char *hex)
34714f4e3fSclaudio {
35714f4e3fSclaudio 	static char buf[128];	/* bigger than SHA_DIGEST_LENGTH * 3 */
36714f4e3fSclaudio 	size_t i;
37714f4e3fSclaudio 
38714f4e3fSclaudio 	for (i = 0; i < sizeof(buf) && *hex != '\0'; i++) {
39254fd372Sclaudio 		if (i % 3 == 2)
40714f4e3fSclaudio 			buf[i] = ':';
41714f4e3fSclaudio 		else
42714f4e3fSclaudio 			buf[i] = *hex++;
43714f4e3fSclaudio 	}
44714f4e3fSclaudio 	if (i == sizeof(buf))
45714f4e3fSclaudio 		memcpy(buf + sizeof(buf) - 4, "...", 4);
46254fd372Sclaudio 	else
47254fd372Sclaudio 		buf[i] = '\0';
48714f4e3fSclaudio 	return buf;
49714f4e3fSclaudio }
50714f4e3fSclaudio 
51220c707cSclaudio char *
52220c707cSclaudio time2str(time_t t)
53220c707cSclaudio {
54220c707cSclaudio 	static char buf[64];
55220c707cSclaudio 	struct tm tm;
56220c707cSclaudio 
57220c707cSclaudio 	if (gmtime_r(&t, &tm) == NULL)
58220c707cSclaudio 		return "could not convert time";
59220c707cSclaudio 
60220c707cSclaudio 	strftime(buf, sizeof(buf), "%h %d %T %Y %Z", &tm);
61220c707cSclaudio 	return buf;
62220c707cSclaudio }
63220c707cSclaudio 
64714f4e3fSclaudio void
65714f4e3fSclaudio tal_print(const struct tal *p)
66714f4e3fSclaudio {
67e911df76Sjob 	char			*ski;
68e911df76Sjob 	EVP_PKEY		*pk;
69e911df76Sjob 	RSA			*r;
70e911df76Sjob 	const unsigned char	*der;
71e911df76Sjob 	unsigned char		*rder = NULL;
72e911df76Sjob 	unsigned char		 md[SHA_DIGEST_LENGTH];
73e911df76Sjob 	int			 rder_len;
74714f4e3fSclaudio 	size_t			 i;
75714f4e3fSclaudio 
76e911df76Sjob 	der = p->pkey;
77e911df76Sjob 	pk = d2i_PUBKEY(NULL, &der, p->pkeysz);
78e911df76Sjob 	if (pk == NULL)
79e911df76Sjob 		errx(1, "d2i_PUBKEY failed in %s", __func__);
80e911df76Sjob 
81e911df76Sjob 	r = EVP_PKEY_get0_RSA(pk);
82e911df76Sjob 	if (r == NULL)
83e911df76Sjob 		errx(1, "EVP_PKEY_get0_RSA failed in %s", __func__);
84e911df76Sjob 	if ((rder_len = i2d_RSAPublicKey(r, &rder)) <= 0)
85e911df76Sjob 		errx(1, "i2d_RSAPublicKey failed in %s", __func__);
86e911df76Sjob 
87e911df76Sjob 	if (!EVP_Digest(rder, rder_len, md, NULL, EVP_sha1(), NULL))
88e911df76Sjob 		errx(1, "EVP_Digest failed in %s", __func__);
89e911df76Sjob 
90e911df76Sjob 	ski = hex_encode(md, SHA_DIGEST_LENGTH);
91e911df76Sjob 
92530399e8Sjob 	if (outformats & FORMAT_JSON) {
93530399e8Sjob 		printf("\t\"type\": \"tal\",\n");
943b3f075aSjob 		printf("\t\"name\": \"%s\",\n", p->descr);
953b3f075aSjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(ski));
96530399e8Sjob 		printf("\t\"trust_anchor_locations\": [");
97530399e8Sjob 		for (i = 0; i < p->urisz; i++) {
98530399e8Sjob 			printf("\"%s\"", p->uri[i]);
99530399e8Sjob 			if (i + 1 < p->urisz)
100530399e8Sjob 				printf(", ");
101530399e8Sjob 		}
1023b3f075aSjob 		printf("],\n");
103530399e8Sjob 	} else {
104530399e8Sjob 		printf("Trust anchor name: %s\n", p->descr);
105530399e8Sjob 		printf("Subject key identifier: %s\n", pretty_key_id(ski));
106e911df76Sjob 		printf("Trust anchor locations:\n");
107714f4e3fSclaudio 		for (i = 0; i < p->urisz; i++)
108e911df76Sjob 			printf("%5zu: %s\n", i + 1, p->uri[i]);
109530399e8Sjob 	}
110e911df76Sjob 
111e911df76Sjob 	EVP_PKEY_free(pk);
112e911df76Sjob 	free(rder);
113e911df76Sjob 	free(ski);
114714f4e3fSclaudio }
115714f4e3fSclaudio 
116714f4e3fSclaudio void
117530399e8Sjob x509_print(const X509 *x)
118530399e8Sjob {
119530399e8Sjob 	const ASN1_INTEGER	*xserial;
120530399e8Sjob 	char			*serial = NULL;
121530399e8Sjob 
122530399e8Sjob 	xserial = X509_get0_serialNumber(x);
123530399e8Sjob 	if (xserial == NULL) {
124530399e8Sjob 		warnx("X509_get0_serialNumber failed in %s", __func__);
125530399e8Sjob 		goto out;
126530399e8Sjob 	}
127530399e8Sjob 
128530399e8Sjob 	serial = x509_convert_seqnum(__func__, xserial);
129530399e8Sjob 	if (serial == NULL) {
130530399e8Sjob 		warnx("x509_convert_seqnum failed in %s", __func__);
131530399e8Sjob 		goto out;
132530399e8Sjob 	}
133530399e8Sjob 
134530399e8Sjob 	if (outformats & FORMAT_JSON) {
135530399e8Sjob 		printf("\t\"cert_serial\": \"%s\",\n", serial);
136530399e8Sjob 	} else {
137530399e8Sjob 		printf("Certificate serial: %s\n", serial);
138530399e8Sjob 	}
139530399e8Sjob 
140530399e8Sjob  out:
141530399e8Sjob 	free(serial);
142530399e8Sjob }
143530399e8Sjob 
144530399e8Sjob void
145714f4e3fSclaudio cert_print(const struct cert *p)
146714f4e3fSclaudio {
147530399e8Sjob 	size_t			 i, j;
148714f4e3fSclaudio 	char			 buf1[64], buf2[64];
149714f4e3fSclaudio 	int			 sockt;
150714f4e3fSclaudio 	char			 tbuf[21];
151714f4e3fSclaudio 
152530399e8Sjob 	strftime(tbuf, sizeof(tbuf), "%FT%TZ", gmtime(&p->expires));
153530399e8Sjob 
154530399e8Sjob 	if (outformats & FORMAT_JSON) {
155530399e8Sjob 		if (p->pubkey != NULL)
156530399e8Sjob 			printf("\t\"type\": \"router_key\",\n");
157530399e8Sjob 		else
158530399e8Sjob 			printf("\t\"type\": \"ca_cert\",\n");
159530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
160530399e8Sjob 		if (p->aki != NULL)
161530399e8Sjob 			printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
162530399e8Sjob 		x509_print(p->x509);
163530399e8Sjob 		if (p->aia != NULL)
164530399e8Sjob 			printf("\t\"aia\": \"%s\",\n", p->aia);
165530399e8Sjob 		if (p->mft != NULL)
166530399e8Sjob 			printf("\t\"manifest\": \"%s\",\n", p->mft);
167530399e8Sjob 		if (p->repo != NULL)
168530399e8Sjob 			printf("\t\"carepository\": \"%s\",\n", p->repo);
169530399e8Sjob 		if (p->notify != NULL)
170530399e8Sjob 			printf("\t\"notify_url\": \"%s\",\n", p->notify);
171530399e8Sjob 		if (p->pubkey != NULL)
172530399e8Sjob 			printf("\t\"router_key\": \"%s\",\n", p->pubkey);
173530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
174530399e8Sjob 		printf("\t\"subordinate_resources\": [\n");
175530399e8Sjob 	} else {
176714f4e3fSclaudio 		printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
177714f4e3fSclaudio 		if (p->aki != NULL)
17867642cb5Stb 			printf("Authority key identifier: %s\n",
17967642cb5Stb 			    pretty_key_id(p->aki));
180530399e8Sjob 		x509_print(p->x509);
181714f4e3fSclaudio 		if (p->aia != NULL)
182714f4e3fSclaudio 			printf("Authority info access: %s\n", p->aia);
183714f4e3fSclaudio 		if (p->mft != NULL)
184714f4e3fSclaudio 			printf("Manifest: %s\n", p->mft);
185714f4e3fSclaudio 		if (p->repo != NULL)
186714f4e3fSclaudio 			printf("caRepository: %s\n", p->repo);
187714f4e3fSclaudio 		if (p->notify != NULL)
188714f4e3fSclaudio 			printf("Notify URL: %s\n", p->notify);
189714f4e3fSclaudio 		if (p->pubkey != NULL)
19067642cb5Stb 			printf("BGPsec P-256 ECDSA public key: %s\n",
19167642cb5Stb 			    p->pubkey);
192714f4e3fSclaudio 		printf("Valid until: %s\n", tbuf);
193714f4e3fSclaudio 		printf("Subordinate Resources:\n");
194530399e8Sjob 	}
195714f4e3fSclaudio 
196530399e8Sjob 	for (i = 0; i < p->asz; i++) {
197714f4e3fSclaudio 		switch (p->as[i].type) {
198714f4e3fSclaudio 		case CERT_AS_ID:
199530399e8Sjob 			if (outformats & FORMAT_JSON)
200530399e8Sjob 				printf("\t\t{ \"asid\": %u }", p->as[i].id);
201530399e8Sjob 			else
202530399e8Sjob 				printf("%5zu: AS: %u", i + 1, p->as[i].id);
203714f4e3fSclaudio 			break;
204714f4e3fSclaudio 		case CERT_AS_INHERIT:
205530399e8Sjob 			if (outformats & FORMAT_JSON)
206530399e8Sjob 				printf("\t\t{ \"asid_inherit\": \"true\" }");
207530399e8Sjob 			else
208530399e8Sjob 				printf("%5zu: AS: inherit", i + 1);
209714f4e3fSclaudio 			break;
210714f4e3fSclaudio 		case CERT_AS_RANGE:
211530399e8Sjob 			if (outformats & FORMAT_JSON)
212530399e8Sjob 				printf("\t\t{ \"asrange\": { \"min\": %u, "
213530399e8Sjob 				    "\"max\": %u }}", p->as[i].range.min,
214530399e8Sjob 				    p->as[i].range.max);
215530399e8Sjob 			else
216530399e8Sjob 				printf("%5zu: AS: %u -- %u", i + 1,
217714f4e3fSclaudio 				    p->as[i].range.min, p->as[i].range.max);
218714f4e3fSclaudio 			break;
219714f4e3fSclaudio 		}
220530399e8Sjob 		if (outformats & FORMAT_JSON && i + 1 < p->asz + p->ipsz)
221530399e8Sjob 			printf(",\n");
222530399e8Sjob 		else
223530399e8Sjob 			printf("\n");
224714f4e3fSclaudio 	}
225714f4e3fSclaudio 
226530399e8Sjob 	for (j = 0; j < p->ipsz; j++) {
227530399e8Sjob 		switch (p->ips[j].type) {
228530399e8Sjob 		case CERT_IP_INHERIT:
229530399e8Sjob 			if (outformats & FORMAT_JSON)
230530399e8Sjob 				printf("\t\t{ \"ip_inherit\": \"true\" }");
231530399e8Sjob 			else
232530399e8Sjob 				printf("%5zu: IP: inherit", i + j + 1);
233530399e8Sjob 			break;
234530399e8Sjob 		case CERT_IP_ADDR:
235530399e8Sjob 			ip_addr_print(&p->ips[j].ip,
236530399e8Sjob 			    p->ips[j].afi, buf1, sizeof(buf1));
237530399e8Sjob 			if (outformats & FORMAT_JSON)
238530399e8Sjob 				printf("\t\t{ \"ip_prefix\": \"%s\" }", buf1);
239530399e8Sjob 			else
240530399e8Sjob 				printf("%5zu: IP: %s", i + j + 1, buf1);
241530399e8Sjob 			break;
242530399e8Sjob 		case CERT_IP_RANGE:
243530399e8Sjob 			sockt = (p->ips[j].afi == AFI_IPV4) ?
244530399e8Sjob 			    AF_INET : AF_INET6;
245530399e8Sjob 			inet_ntop(sockt, p->ips[j].min, buf1, sizeof(buf1));
246530399e8Sjob 			inet_ntop(sockt, p->ips[j].max, buf2, sizeof(buf2));
247530399e8Sjob 			if (outformats & FORMAT_JSON)
248530399e8Sjob 				printf("\t\t{ \"ip_range\": { \"min\": \"%s\""
249530399e8Sjob 				    ", \"max\": \"%s\" }}", buf1, buf2);
250530399e8Sjob 			else
251530399e8Sjob 				printf("%5zu: IP: %s -- %s", i + j + 1, buf1,
252530399e8Sjob 				    buf2);
253530399e8Sjob 			break;
254530399e8Sjob 		}
255530399e8Sjob 		if (outformats & FORMAT_JSON && i + j + 1 < p->asz + p->ipsz)
256530399e8Sjob 			printf(",\n");
257530399e8Sjob 		else
258530399e8Sjob 			printf("\n");
259530399e8Sjob 	}
260530399e8Sjob 
261530399e8Sjob 	if (outformats & FORMAT_JSON)
262530399e8Sjob 		printf("\t],\n");
263714f4e3fSclaudio }
264714f4e3fSclaudio 
265714f4e3fSclaudio void
266220c707cSclaudio crl_print(const struct crl *p)
267220c707cSclaudio {
268220c707cSclaudio 	STACK_OF(X509_REVOKED)	*revlist;
269220c707cSclaudio 	X509_REVOKED *rev;
2707cdd491fSclaudio 	ASN1_INTEGER *crlnum;
271220c707cSclaudio 	int i;
2727cdd491fSclaudio 	char *serial;
273220c707cSclaudio 	time_t t;
274220c707cSclaudio 
275530399e8Sjob 	if (outformats & FORMAT_JSON) {
276530399e8Sjob 		printf("\t\"type\": \"crl\",\n");
277530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
278530399e8Sjob 	} else
279220c707cSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
2807cdd491fSclaudio 
2817cdd491fSclaudio 	crlnum = X509_CRL_get_ext_d2i(p->x509_crl, NID_crl_number, NULL, NULL);
2827cdd491fSclaudio 	serial = x509_convert_seqnum(__func__, crlnum);
283530399e8Sjob 	if (serial != NULL) {
284530399e8Sjob 		if (outformats & FORMAT_JSON)
285530399e8Sjob 			printf("\t\"crl_serial\": \"%s\",\n", serial);
286530399e8Sjob 		else
2877cdd491fSclaudio 			printf("CRL Serial Number: %s\n", serial);
288530399e8Sjob 	}
2897cdd491fSclaudio 	free(serial);
2907cdd491fSclaudio 	ASN1_INTEGER_free(crlnum);
2917cdd491fSclaudio 
292530399e8Sjob 	if (outformats & FORMAT_JSON) {
293530399e8Sjob 		printf("\t\"valid_since\": %lld,\n", (long long)p->issued);
294530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
295530399e8Sjob 		printf("\t\"revoked_certs\": [\n");
296530399e8Sjob 	} else {
297220c707cSclaudio 		printf("CRL valid since: %s\n", time2str(p->issued));
298220c707cSclaudio 		printf("CRL valid until: %s\n", time2str(p->expires));
299530399e8Sjob 		printf("Revoked Certificates:\n");
300530399e8Sjob 	}
301220c707cSclaudio 
302220c707cSclaudio 	revlist = X509_CRL_get_REVOKED(p->x509_crl);
303220c707cSclaudio 	for (i = 0; i < sk_X509_REVOKED_num(revlist); i++) {
304220c707cSclaudio 		rev = sk_X509_REVOKED_value(revlist, i);
3057cdd491fSclaudio 		serial = x509_convert_seqnum(__func__,
3067cdd491fSclaudio 		    X509_REVOKED_get0_serialNumber(rev));
307220c707cSclaudio 		x509_get_time(X509_REVOKED_get0_revocationDate(rev), &t);
308530399e8Sjob 		if (serial != NULL) {
309530399e8Sjob 			if (outformats & FORMAT_JSON) {
310530399e8Sjob 				printf("\t\t{ \"serial\": \"%s\"", serial);
311530399e8Sjob 				printf(", \"date\": \"%s\" }", time2str(t));
312530399e8Sjob 				if (i + 1 < sk_X509_REVOKED_num(revlist))
313530399e8Sjob 					printf(",");
314530399e8Sjob 				printf("\n");
315530399e8Sjob 			} else
316530399e8Sjob 				printf("    Serial: %8s   Revocation Date: %s"
317530399e8Sjob 				    "\n", serial, time2str(t));
318530399e8Sjob 		}
3197cdd491fSclaudio 		free(serial);
320220c707cSclaudio 	}
321530399e8Sjob 
322530399e8Sjob 	if (outformats & FORMAT_JSON)
323530399e8Sjob 		printf("\t],\n");
324530399e8Sjob 	else if (i == 0)
325220c707cSclaudio 		printf("No Revoked Certificates\n");
326220c707cSclaudio }
327220c707cSclaudio 
328220c707cSclaudio void
329530399e8Sjob mft_print(const X509 *x, const struct mft *p)
330714f4e3fSclaudio {
331714f4e3fSclaudio 	size_t i;
332714f4e3fSclaudio 	char *hash;
333714f4e3fSclaudio 
334530399e8Sjob 	if (outformats & FORMAT_JSON) {
335530399e8Sjob 		printf("\t\"type\": \"manifest\",\n");
336530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
337530399e8Sjob 		x509_print(x);
338530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
339530399e8Sjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
340530399e8Sjob 		printf("\t\"manifest_number\": \"%s\",\n", p->seqnum);
341530399e8Sjob 		printf("\t\"valid_since\": %lld,\n", (long long)p->valid_since);
342530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->valid_until);
343530399e8Sjob 	} else {
344714f4e3fSclaudio 		printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
345714f4e3fSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
346530399e8Sjob 		x509_print(x);
347714f4e3fSclaudio 		printf("Authority info access: %s\n", p->aia);
348714f4e3fSclaudio 		printf("Manifest Number: %s\n", p->seqnum);
349530399e8Sjob 		printf("Manifest valid since: %s\n", time2str(p->valid_since));
350530399e8Sjob 		printf("Manifest valid until: %s\n", time2str(p->valid_until));
351530399e8Sjob 	}
352530399e8Sjob 
353714f4e3fSclaudio 	for (i = 0; i < p->filesz; i++) {
354530399e8Sjob 		if (i == 0 && outformats & FORMAT_JSON)
355530399e8Sjob 			printf("\t\"filesandhashes\": [\n");
356530399e8Sjob 
357714f4e3fSclaudio 		if (base64_encode(p->files[i].hash, sizeof(p->files[i].hash),
358714f4e3fSclaudio 		    &hash) == -1)
359714f4e3fSclaudio 			errx(1, "base64_encode failure");
360530399e8Sjob 
361530399e8Sjob 		if (outformats & FORMAT_JSON) {
362530399e8Sjob 			printf("\t\t{ \"filename\": \"%s\",", p->files[i].file);
363530399e8Sjob 			printf(" \"hash\": \"%s\" }", hash);
364530399e8Sjob 			if (i + 1 < p->filesz)
365530399e8Sjob 				printf(",");
366530399e8Sjob 			printf("\n");
367530399e8Sjob 		} else {
368714f4e3fSclaudio 			printf("%5zu: %s\n", i + 1, p->files[i].file);
369714f4e3fSclaudio 			printf("\thash %s\n", hash);
370530399e8Sjob 		}
371530399e8Sjob 
372714f4e3fSclaudio 		free(hash);
373714f4e3fSclaudio 	}
374530399e8Sjob 
375530399e8Sjob 	if (outformats & FORMAT_JSON)
376530399e8Sjob 		printf("\t],\n");
377714f4e3fSclaudio }
378714f4e3fSclaudio 
379714f4e3fSclaudio void
380530399e8Sjob roa_print(const X509 *x, const struct roa *p)
381714f4e3fSclaudio {
382714f4e3fSclaudio 	char	 buf[128];
383714f4e3fSclaudio 	size_t	 i;
384714f4e3fSclaudio 
385530399e8Sjob 	if (outformats & FORMAT_JSON) {
386530399e8Sjob 		printf("\t\"type\": \"roa\",\n");
387530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
388530399e8Sjob 		x509_print(x);
389530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
390530399e8Sjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
391530399e8Sjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
392530399e8Sjob 	} else {
393714f4e3fSclaudio 		printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
394530399e8Sjob 		x509_print(x);
395714f4e3fSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
396714f4e3fSclaudio 		printf("Authority info access: %s\n", p->aia);
397220c707cSclaudio 		printf("ROA valid until: %s\n", time2str(p->expires));
398714f4e3fSclaudio 		printf("asID: %u\n", p->asid);
399530399e8Sjob 	}
400530399e8Sjob 
401714f4e3fSclaudio 	for (i = 0; i < p->ipsz; i++) {
402530399e8Sjob 		if (i == 0 && outformats & FORMAT_JSON)
403530399e8Sjob 			printf("\t\"vrps\": [\n");
404530399e8Sjob 
405714f4e3fSclaudio 		ip_addr_print(&p->ips[i].addr,
406714f4e3fSclaudio 		    p->ips[i].afi, buf, sizeof(buf));
407530399e8Sjob 
408530399e8Sjob 		if (outformats & FORMAT_JSON) {
409530399e8Sjob 			printf("\t\t{ \"prefix\": \"%s\",", buf);
410530399e8Sjob 			printf(" \"asid\": %u,", p->asid);
411530399e8Sjob 			printf(" \"maxlen\": %hhu }", p->ips[i].maxlength);
412530399e8Sjob 			if (i + 1 < p->ipsz)
413530399e8Sjob 				printf(",");
414530399e8Sjob 			printf("\n");
415530399e8Sjob 		} else
416530399e8Sjob 			printf("%5zu: %s maxlen: %hhu\n", i + 1, buf,
417530399e8Sjob 			    p->ips[i].maxlength);
418714f4e3fSclaudio 	}
419530399e8Sjob 
420530399e8Sjob 	if (outformats & FORMAT_JSON)
421530399e8Sjob 		printf("\t],\n");
422714f4e3fSclaudio }
423714f4e3fSclaudio 
424714f4e3fSclaudio void
425530399e8Sjob gbr_print(const X509 *x, const struct gbr *p)
426714f4e3fSclaudio {
427530399e8Sjob 	size_t	i;
428530399e8Sjob 
429530399e8Sjob 	if (outformats & FORMAT_JSON) {
430530399e8Sjob 		printf("\t\"type\": \"gbr\",\n");
431530399e8Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
432530399e8Sjob 		x509_print(x);
433530399e8Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
434530399e8Sjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
435530399e8Sjob 		printf("\t\"vcard\": \"");
436530399e8Sjob 		for (i = 0; i < strlen(p->vcard); i++) {
437530399e8Sjob 			if (p->vcard[i] == '"')
438530399e8Sjob 				printf("\\\"");
439530399e8Sjob 			if (p->vcard[i] == '\r')
440530399e8Sjob 				continue;
441530399e8Sjob 			if (p->vcard[i] == '\n')
442530399e8Sjob 				printf("\\r\\n");
443530399e8Sjob 			else
444530399e8Sjob 				putchar(p->vcard[i]);
445530399e8Sjob 		}
446530399e8Sjob 		printf("\",\n");
447530399e8Sjob 	} else {
448714f4e3fSclaudio 		printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
449530399e8Sjob 		x509_print(x);
450714f4e3fSclaudio 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
451714f4e3fSclaudio 		printf("Authority info access: %s\n", p->aia);
452714f4e3fSclaudio 		printf("vcard:\n%s", p->vcard);
453714f4e3fSclaudio 	}
454530399e8Sjob }
45504834fbdSjob 
45604834fbdSjob void
45704834fbdSjob rsc_print(const X509 *x, const struct rsc *p)
45804834fbdSjob {
45904834fbdSjob 	char	 buf1[64], buf2[64], tbuf[21];
46004834fbdSjob 	char	*hash;
46104834fbdSjob 	int	 sockt;
46204834fbdSjob 	size_t	 i, j;
46304834fbdSjob 
46404834fbdSjob 	strftime(tbuf, sizeof(tbuf), "%FT%TZ", gmtime(&p->expires));
46504834fbdSjob 
46604834fbdSjob 	if (outformats & FORMAT_JSON) {
46704834fbdSjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
46804834fbdSjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
46904834fbdSjob 		x509_print(x);
47004834fbdSjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
47104834fbdSjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
47204834fbdSjob 		printf("\t\"signed_with_resources\": [\n");
47304834fbdSjob 	} else {
47404834fbdSjob 		printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
47504834fbdSjob 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
47604834fbdSjob 		x509_print(x);
47704834fbdSjob 		printf("Authority info access: %s\n", p->aia);
47804834fbdSjob 		printf("Valid until: %s\n", tbuf);
47904834fbdSjob 		printf("Signed with resources:\n");
48004834fbdSjob 	}
48104834fbdSjob 
48204834fbdSjob 	for (i = 0; i < p->asz; i++) {
48304834fbdSjob 		switch (p->as[i].type) {
48404834fbdSjob 		case CERT_AS_ID:
48504834fbdSjob 			if (outformats & FORMAT_JSON)
48604834fbdSjob 				printf("\t\t{ \"asid\": %u }", p->as[i].id);
48704834fbdSjob 			else
48804834fbdSjob 				printf("%5zu: AS: %u", i + 1, p->as[i].id);
48904834fbdSjob 			break;
49004834fbdSjob 		case CERT_AS_RANGE:
49104834fbdSjob 			if (outformats & FORMAT_JSON)
49204834fbdSjob 				printf("\t\t{ \"asrange\": { \"min\": %u, "
49304834fbdSjob 				    "\"max\": %u }}", p->as[i].range.min,
49404834fbdSjob 				    p->as[i].range.max);
49504834fbdSjob 			else
49604834fbdSjob 				printf("%5zu: AS: %u -- %u", i + 1,
49704834fbdSjob 				    p->as[i].range.min, p->as[i].range.max);
49804834fbdSjob 			break;
49904834fbdSjob 		case CERT_AS_INHERIT:
50004834fbdSjob 			/* inheritance isn't possible in RSC */
50104834fbdSjob 			break;
50204834fbdSjob 		}
50304834fbdSjob 		if (outformats & FORMAT_JSON && i + 1 < p->asz + p->ipsz)
50404834fbdSjob 			printf(",\n");
50504834fbdSjob 		else
50604834fbdSjob 			printf("\n");
50704834fbdSjob 	}
50804834fbdSjob 
50904834fbdSjob 	for (j = 0; j < p->ipsz; j++) {
51004834fbdSjob 		switch (p->ips[j].type) {
51104834fbdSjob 		case CERT_IP_ADDR:
51204834fbdSjob 			ip_addr_print(&p->ips[j].ip,
51304834fbdSjob 			    p->ips[j].afi, buf1, sizeof(buf1));
51404834fbdSjob 			if (outformats & FORMAT_JSON)
51504834fbdSjob 				printf("\t\t{ \"ip_prefix\": \"%s\" }", buf1);
51604834fbdSjob 			else
51704834fbdSjob 				printf("%5zu: IP: %s", i + j + 1, buf1);
51804834fbdSjob 			break;
51904834fbdSjob 		case CERT_IP_RANGE:
52004834fbdSjob 			sockt = (p->ips[j].afi == AFI_IPV4) ?
52104834fbdSjob 			    AF_INET : AF_INET6;
52204834fbdSjob 			inet_ntop(sockt, p->ips[j].min, buf1, sizeof(buf1));
52304834fbdSjob 			inet_ntop(sockt, p->ips[j].max, buf2, sizeof(buf2));
52404834fbdSjob 			if (outformats & FORMAT_JSON)
52504834fbdSjob 				printf("\t\t{ \"ip_range\": { \"min\": \"%s\""
52604834fbdSjob 				    ", \"max\": \"%s\" }}", buf1, buf2);
52704834fbdSjob 			else
52804834fbdSjob 				printf("%5zu: IP: %s -- %s", i + j + 1, buf1,
52904834fbdSjob 				    buf2);
53004834fbdSjob 			break;
53104834fbdSjob 		case CERT_IP_INHERIT:
53204834fbdSjob 			/* inheritance isn't possible in RSC */
53304834fbdSjob 			break;
53404834fbdSjob 		}
53504834fbdSjob 		if (outformats & FORMAT_JSON && i + j + 1 < p->asz + p->ipsz)
53604834fbdSjob 			printf(",\n");
53704834fbdSjob 		else
53804834fbdSjob 			printf("\n");
53904834fbdSjob 	}
54004834fbdSjob 
54104834fbdSjob 	if (outformats & FORMAT_JSON) {
54204834fbdSjob 		printf("\t],\n");
54304834fbdSjob 		printf("\t\"filenamesandhashes\": [\n");
54404834fbdSjob 	} else
54504834fbdSjob 		printf("Filenames and hashes:\n");
54604834fbdSjob 
54704834fbdSjob 	for (i = 0; i < p->filesz; i++) {
54804834fbdSjob 		if (base64_encode(p->files[i].hash, sizeof(p->files[i].hash),
54904834fbdSjob 		    &hash) == -1)
55004834fbdSjob 			errx(1, "base64_encode failure");
55104834fbdSjob 
55204834fbdSjob 		if (outformats & FORMAT_JSON) {
55304834fbdSjob 			printf("\t\t{ \"filename\": \"%s\",",
55404834fbdSjob 			    p->files[i].filename ? p->files[i].filename : "");
55504834fbdSjob 			printf(" \"hash_digest\": \"%s\" }", hash);
55604834fbdSjob 			if (i + 1 < p->filesz)
55704834fbdSjob 				printf(",");
55804834fbdSjob 			printf("\n");
55904834fbdSjob 		} else {
56004834fbdSjob 			printf("%5zu: %s\n", i + 1, p->files[i].filename
56104834fbdSjob 			    ? p->files[i].filename : "no filename");
56204834fbdSjob 			printf("\thash %s\n", hash);
56304834fbdSjob 		}
56404834fbdSjob 
56504834fbdSjob 		free(hash);
56604834fbdSjob 	}
56704834fbdSjob 
56804834fbdSjob 	if (outformats & FORMAT_JSON)
56904834fbdSjob 		printf("\t],\n");
57004834fbdSjob }
571a29ddfd5Sjob 
572a29ddfd5Sjob void
573a29ddfd5Sjob aspa_print(const X509 *x, const struct aspa *p)
574a29ddfd5Sjob {
575a29ddfd5Sjob 	size_t	i;
576a29ddfd5Sjob 
577a29ddfd5Sjob 	if (outformats & FORMAT_JSON) {
578a29ddfd5Sjob 		printf("\t\"type\": \"aspa\",\n");
579a29ddfd5Sjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
580a29ddfd5Sjob 		x509_print(x);
581a29ddfd5Sjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
582a29ddfd5Sjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
583a29ddfd5Sjob 		printf("\t\"customer_asid\": %u,\n", p->custasid);
584a29ddfd5Sjob 		printf("\t\"provider_set\": [\n");
585a29ddfd5Sjob 		for (i = 0; i < p->providersz; i++) {
586a29ddfd5Sjob 			printf("\t\t{ \"asid\": %u", p->providers[i].as);
587a29ddfd5Sjob 			if (p->providers[i].afi == AFI_IPV4)
588a29ddfd5Sjob 				printf(", \"afi_limit\": \"ipv4\"");
589a29ddfd5Sjob 			if (p->providers[i].afi == AFI_IPV6)
590a29ddfd5Sjob 				printf(", \"afi_limit\": \"ipv6\"");
591a29ddfd5Sjob 			printf(" }");
592a29ddfd5Sjob 			if (i + 1 < p->providersz)
593a29ddfd5Sjob 				printf(",");
594a29ddfd5Sjob 			printf("\n");
595a29ddfd5Sjob 		}
596a29ddfd5Sjob 		printf("\t],\n");
597a29ddfd5Sjob 	} else {
598a29ddfd5Sjob 		printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
599a29ddfd5Sjob 		x509_print(x);
600a29ddfd5Sjob 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
601a29ddfd5Sjob 		printf("Authority info access: %s\n", p->aia);
602a29ddfd5Sjob 		printf("Customer AS: %u\n", p->custasid);
603a29ddfd5Sjob 		printf("Provider Set:\n");
604a29ddfd5Sjob 		for (i = 0; i < p->providersz; i++) {
605a29ddfd5Sjob 			printf("%5zu: AS: %d", i + 1, p->providers[i].as);
606a29ddfd5Sjob 			switch (p->providers[i].afi) {
607a29ddfd5Sjob 			case AFI_IPV4:
608a29ddfd5Sjob 				printf(" (IPv4 only)");
609a29ddfd5Sjob 				break;
610a29ddfd5Sjob 			case AFI_IPV6:
611a29ddfd5Sjob 				printf(" (IPv6 only)");
612a29ddfd5Sjob 				break;
613a29ddfd5Sjob 			default:
614a29ddfd5Sjob 				break;
615a29ddfd5Sjob 			}
616a29ddfd5Sjob 			printf("\n");
617a29ddfd5Sjob 		}
618a29ddfd5Sjob 	}
619a29ddfd5Sjob }
620*ee2a33daSjob 
621*ee2a33daSjob static void
622*ee2a33daSjob takey_print(char *name, const struct takey *t)
623*ee2a33daSjob {
624*ee2a33daSjob 	char	*spki = NULL;
625*ee2a33daSjob 	size_t	 i, j = 0;
626*ee2a33daSjob 
627*ee2a33daSjob 	if (base64_encode(t->pubkey, t->pubkeysz, &spki) != 0)
628*ee2a33daSjob 		errx(1, "base64_encode failed in %s", __func__);
629*ee2a33daSjob 
630*ee2a33daSjob 	if (outformats & FORMAT_JSON) {
631*ee2a33daSjob 		printf("\t\t{\n\t\t\t\"name\": \"%s\",\n", name);
632*ee2a33daSjob 		printf("\t\t\t\"comments\": [");
633*ee2a33daSjob 		for (i = 0; i < t->commentsz; i++) {
634*ee2a33daSjob 			printf("\"%s\"", t->comments[i]);
635*ee2a33daSjob 			if (i + 1 < t->commentsz)
636*ee2a33daSjob 				printf(", ");
637*ee2a33daSjob 		}
638*ee2a33daSjob 		printf("],\n");
639*ee2a33daSjob 		printf("\t\t\t\"uris\": [");
640*ee2a33daSjob 		for (i = 0; i < t->urisz; i++) {
641*ee2a33daSjob 			printf("\"%s\"", t->uris[i]);
642*ee2a33daSjob 			if (i + 1 < t->urisz)
643*ee2a33daSjob 				printf(", ");
644*ee2a33daSjob 		}
645*ee2a33daSjob 		printf("],\n");
646*ee2a33daSjob 		printf("\t\t\t\"spki\": \"%s\"\n\t\t}", spki);
647*ee2a33daSjob 	} else {
648*ee2a33daSjob 		printf("TAL derived from the '%s' Trust Anchor Key:\n\n", name);
649*ee2a33daSjob 
650*ee2a33daSjob 		for (i = 0; i < t->commentsz; i++) {
651*ee2a33daSjob 			printf("\t# %s\n", t->comments[i]);
652*ee2a33daSjob 		}
653*ee2a33daSjob 
654*ee2a33daSjob 		for (i = 0; i < t->urisz; i++) {
655*ee2a33daSjob 			printf("\t%s\n\n\t", t->uris[i]);
656*ee2a33daSjob 		}
657*ee2a33daSjob 
658*ee2a33daSjob 		for (i = 0; i < strlen(spki); i++) {
659*ee2a33daSjob 			printf("%c", spki[i]);
660*ee2a33daSjob 			j++;
661*ee2a33daSjob 			if (j == 64) {
662*ee2a33daSjob 				printf("\n\t");
663*ee2a33daSjob 				j = 0;
664*ee2a33daSjob 			}
665*ee2a33daSjob 		}
666*ee2a33daSjob 
667*ee2a33daSjob 		printf("\n\n");
668*ee2a33daSjob 	}
669*ee2a33daSjob 
670*ee2a33daSjob 	free(spki);
671*ee2a33daSjob }
672*ee2a33daSjob 
673*ee2a33daSjob void
674*ee2a33daSjob tak_print(const X509 *x, const struct tak *p)
675*ee2a33daSjob {
676*ee2a33daSjob 	char	tbuf[21];
677*ee2a33daSjob 
678*ee2a33daSjob 	if (outformats & FORMAT_JSON) {
679*ee2a33daSjob 		printf("\t\"type\": \"tak\",\n");
680*ee2a33daSjob 		printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski));
681*ee2a33daSjob 		x509_print(x);
682*ee2a33daSjob 		printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki));
683*ee2a33daSjob 		printf("\t\"aia\": \"%s\",\n", p->aia);
684*ee2a33daSjob 		printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
685*ee2a33daSjob 		printf("\t\"takeys\": [\n");
686*ee2a33daSjob 	} else {
687*ee2a33daSjob 		strftime(tbuf, sizeof(tbuf), "%FT%TZ", gmtime(&p->expires));
688*ee2a33daSjob 		printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
689*ee2a33daSjob 		x509_print(x);
690*ee2a33daSjob 		printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
691*ee2a33daSjob 		printf("Authority info access: %s\n", p->aia);
692*ee2a33daSjob 		printf("TAK EE certificate valid until: %s\n", tbuf);
693*ee2a33daSjob 	}
694*ee2a33daSjob 
695*ee2a33daSjob 	takey_print("current", p->current);
696*ee2a33daSjob 
697*ee2a33daSjob 	if (p->predecessor != NULL) {
698*ee2a33daSjob 		if (outformats & FORMAT_JSON)
699*ee2a33daSjob 			printf(",\n");
700*ee2a33daSjob 		takey_print("predecessor", p->predecessor);
701*ee2a33daSjob 	}
702*ee2a33daSjob 
703*ee2a33daSjob 	if (p->successor != NULL) {
704*ee2a33daSjob 		if (outformats & FORMAT_JSON)
705*ee2a33daSjob 			printf(",\n");
706*ee2a33daSjob 		takey_print("successor", p->successor);
707*ee2a33daSjob 	}
708*ee2a33daSjob 
709*ee2a33daSjob 	if (outformats & FORMAT_JSON)
710*ee2a33daSjob 		printf("\n\t],\n");
711*ee2a33daSjob }
712