1*f5999ddfSjob /* $OpenBSD: print.c,v 1.30 2023/03/10 12:02:11 job Exp $ */ 2714f4e3fSclaudio /* 3714f4e3fSclaudio * Copyright (c) 2021 Claudio Jeker <claudio@openbsd.org> 4714f4e3fSclaudio * Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv> 5714f4e3fSclaudio * 6714f4e3fSclaudio * Permission to use, copy, modify, and distribute this software for any 7714f4e3fSclaudio * purpose with or without fee is hereby granted, provided that the above 8714f4e3fSclaudio * copyright notice and this permission notice appear in all copies. 9714f4e3fSclaudio * 10714f4e3fSclaudio * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 11714f4e3fSclaudio * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 12714f4e3fSclaudio * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 13714f4e3fSclaudio * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 14714f4e3fSclaudio * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 15714f4e3fSclaudio * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 16714f4e3fSclaudio * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 17714f4e3fSclaudio */ 18714f4e3fSclaudio 19714f4e3fSclaudio #include <sys/types.h> 20714f4e3fSclaudio #include <sys/socket.h> 21714f4e3fSclaudio #include <arpa/inet.h> 22714f4e3fSclaudio 23714f4e3fSclaudio #include <err.h> 24714f4e3fSclaudio #include <stdio.h> 25714f4e3fSclaudio #include <string.h> 26714f4e3fSclaudio #include <time.h> 27714f4e3fSclaudio 28e911df76Sjob #include <openssl/evp.h> 29e911df76Sjob 30714f4e3fSclaudio #include "extern.h" 31714f4e3fSclaudio 32714f4e3fSclaudio static const char * 33254fd372Sclaudio pretty_key_id(const char *hex) 34714f4e3fSclaudio { 35714f4e3fSclaudio static char buf[128]; /* bigger than SHA_DIGEST_LENGTH * 3 */ 36714f4e3fSclaudio size_t i; 37714f4e3fSclaudio 38714f4e3fSclaudio for (i = 0; i < sizeof(buf) && *hex != '\0'; i++) { 39254fd372Sclaudio if (i % 3 == 2) 40714f4e3fSclaudio buf[i] = ':'; 41714f4e3fSclaudio else 42714f4e3fSclaudio buf[i] = *hex++; 43714f4e3fSclaudio } 44714f4e3fSclaudio if (i == sizeof(buf)) 45714f4e3fSclaudio memcpy(buf + sizeof(buf) - 4, "...", 4); 46254fd372Sclaudio else 47254fd372Sclaudio buf[i] = '\0'; 48714f4e3fSclaudio return buf; 49714f4e3fSclaudio } 50714f4e3fSclaudio 51220c707cSclaudio char * 52220c707cSclaudio time2str(time_t t) 53220c707cSclaudio { 54220c707cSclaudio static char buf[64]; 55220c707cSclaudio struct tm tm; 56220c707cSclaudio 57220c707cSclaudio if (gmtime_r(&t, &tm) == NULL) 58220c707cSclaudio return "could not convert time"; 59220c707cSclaudio 60cc6f004eSjob strftime(buf, sizeof(buf), "%a %d %b %Y %T %z", &tm); 61cc6f004eSjob 62220c707cSclaudio return buf; 63220c707cSclaudio } 64220c707cSclaudio 65714f4e3fSclaudio void 66714f4e3fSclaudio tal_print(const struct tal *p) 67714f4e3fSclaudio { 68e911df76Sjob char *ski; 69e911df76Sjob EVP_PKEY *pk; 70e911df76Sjob RSA *r; 71e911df76Sjob const unsigned char *der; 72e911df76Sjob unsigned char *rder = NULL; 73e911df76Sjob unsigned char md[SHA_DIGEST_LENGTH]; 74e911df76Sjob int rder_len; 75714f4e3fSclaudio size_t i; 76714f4e3fSclaudio 77e911df76Sjob der = p->pkey; 78e911df76Sjob pk = d2i_PUBKEY(NULL, &der, p->pkeysz); 79e911df76Sjob if (pk == NULL) 80e911df76Sjob errx(1, "d2i_PUBKEY failed in %s", __func__); 81e911df76Sjob 82e911df76Sjob r = EVP_PKEY_get0_RSA(pk); 83e911df76Sjob if (r == NULL) 84e911df76Sjob errx(1, "EVP_PKEY_get0_RSA failed in %s", __func__); 85e911df76Sjob if ((rder_len = i2d_RSAPublicKey(r, &rder)) <= 0) 86e911df76Sjob errx(1, "i2d_RSAPublicKey failed in %s", __func__); 87e911df76Sjob 88e911df76Sjob if (!EVP_Digest(rder, rder_len, md, NULL, EVP_sha1(), NULL)) 89e911df76Sjob errx(1, "EVP_Digest failed in %s", __func__); 90e911df76Sjob 91e911df76Sjob ski = hex_encode(md, SHA_DIGEST_LENGTH); 92e911df76Sjob 93530399e8Sjob if (outformats & FORMAT_JSON) { 94530399e8Sjob printf("\t\"type\": \"tal\",\n"); 953b3f075aSjob printf("\t\"name\": \"%s\",\n", p->descr); 963b3f075aSjob printf("\t\"ski\": \"%s\",\n", pretty_key_id(ski)); 97530399e8Sjob printf("\t\"trust_anchor_locations\": ["); 98530399e8Sjob for (i = 0; i < p->urisz; i++) { 99530399e8Sjob printf("\"%s\"", p->uri[i]); 100530399e8Sjob if (i + 1 < p->urisz) 101530399e8Sjob printf(", "); 102530399e8Sjob } 1033b3f075aSjob printf("],\n"); 104530399e8Sjob } else { 105530399e8Sjob printf("Trust anchor name: %s\n", p->descr); 106530399e8Sjob printf("Subject key identifier: %s\n", pretty_key_id(ski)); 1074486d057Sjob printf("Trust anchor locations: "); 1084486d057Sjob for (i = 0; i < p->urisz; i++) { 1094486d057Sjob if (i > 0) 1104486d057Sjob printf("%26s", ""); 1114486d057Sjob printf("%s\n", p->uri[i]); 1124486d057Sjob } 113530399e8Sjob } 114e911df76Sjob 115e911df76Sjob EVP_PKEY_free(pk); 116e911df76Sjob free(rder); 117e911df76Sjob free(ski); 118714f4e3fSclaudio } 119714f4e3fSclaudio 120714f4e3fSclaudio void 121530399e8Sjob x509_print(const X509 *x) 122530399e8Sjob { 123530399e8Sjob const ASN1_INTEGER *xserial; 124e0b87278Sjob const X509_NAME *xissuer; 125e0b87278Sjob char *issuer = NULL; 126530399e8Sjob char *serial = NULL; 127530399e8Sjob 128e0b87278Sjob if ((xissuer = X509_get_issuer_name(x)) == NULL) { 129e0b87278Sjob warnx("X509_get_issuer_name failed"); 130530399e8Sjob goto out; 131530399e8Sjob } 132530399e8Sjob 133e0b87278Sjob if ((issuer = X509_NAME_oneline(xissuer, NULL, 0)) == NULL) { 134e0b87278Sjob warnx("X509_NAME_oneline failed"); 135530399e8Sjob goto out; 136530399e8Sjob } 137530399e8Sjob 138e0b87278Sjob if ((xserial = X509_get0_serialNumber(x)) == NULL) { 139e0b87278Sjob warnx("X509_get0_serialNumber failed"); 140e0b87278Sjob goto out; 141e0b87278Sjob } 142e0b87278Sjob 143e0b87278Sjob if ((serial = x509_convert_seqnum(__func__, xserial)) == NULL) 144e0b87278Sjob goto out; 145e0b87278Sjob 146530399e8Sjob if (outformats & FORMAT_JSON) { 147e0b87278Sjob printf("\t\"cert_issuer\": \"%s\",\n", issuer); 148530399e8Sjob printf("\t\"cert_serial\": \"%s\",\n", serial); 149530399e8Sjob } else { 150e0b87278Sjob printf("Certificate issuer: %s\n", issuer); 151530399e8Sjob printf("Certificate serial: %s\n", serial); 152530399e8Sjob } 153530399e8Sjob 154530399e8Sjob out: 155e0b87278Sjob free(issuer); 156530399e8Sjob free(serial); 157530399e8Sjob } 158530399e8Sjob 159530399e8Sjob void 160714f4e3fSclaudio cert_print(const struct cert *p) 161714f4e3fSclaudio { 162530399e8Sjob size_t i, j; 163714f4e3fSclaudio char buf1[64], buf2[64]; 164714f4e3fSclaudio int sockt; 165530399e8Sjob 166530399e8Sjob if (outformats & FORMAT_JSON) { 167530399e8Sjob if (p->pubkey != NULL) 168530399e8Sjob printf("\t\"type\": \"router_key\",\n"); 169530399e8Sjob else 170530399e8Sjob printf("\t\"type\": \"ca_cert\",\n"); 171530399e8Sjob printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski)); 172530399e8Sjob if (p->aki != NULL) 173530399e8Sjob printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki)); 174530399e8Sjob x509_print(p->x509); 175530399e8Sjob if (p->aia != NULL) 176530399e8Sjob printf("\t\"aia\": \"%s\",\n", p->aia); 177530399e8Sjob if (p->mft != NULL) 178530399e8Sjob printf("\t\"manifest\": \"%s\",\n", p->mft); 179530399e8Sjob if (p->repo != NULL) 180530399e8Sjob printf("\t\"carepository\": \"%s\",\n", p->repo); 181530399e8Sjob if (p->notify != NULL) 182530399e8Sjob printf("\t\"notify_url\": \"%s\",\n", p->notify); 183530399e8Sjob if (p->pubkey != NULL) 184530399e8Sjob printf("\t\"router_key\": \"%s\",\n", p->pubkey); 185*f5999ddfSjob printf("\t\"valid_since\": %lld,\n", (long long)p->notbefore); 186530399e8Sjob printf("\t\"valid_until\": %lld,\n", (long long)p->expires); 187530399e8Sjob printf("\t\"subordinate_resources\": [\n"); 188530399e8Sjob } else { 189714f4e3fSclaudio printf("Subject key identifier: %s\n", pretty_key_id(p->ski)); 190714f4e3fSclaudio if (p->aki != NULL) 19167642cb5Stb printf("Authority key identifier: %s\n", 19267642cb5Stb pretty_key_id(p->aki)); 193530399e8Sjob x509_print(p->x509); 194714f4e3fSclaudio if (p->aia != NULL) 195714f4e3fSclaudio printf("Authority info access: %s\n", p->aia); 196714f4e3fSclaudio if (p->mft != NULL) 197714f4e3fSclaudio printf("Manifest: %s\n", p->mft); 198714f4e3fSclaudio if (p->repo != NULL) 199714f4e3fSclaudio printf("caRepository: %s\n", p->repo); 200714f4e3fSclaudio if (p->notify != NULL) 201714f4e3fSclaudio printf("Notify URL: %s\n", p->notify); 20214d83341Sjob if (p->pubkey != NULL) { 2036530cf17Sjob printf("BGPsec ECDSA public key: %s\n", 20467642cb5Stb p->pubkey); 205*f5999ddfSjob printf("Router key valid since: %s\n", 206*f5999ddfSjob time2str(p->notbefore)); 20728439bbcSjob printf("Router key valid until: %s\n", 20828439bbcSjob time2str(p->expires)); 209*f5999ddfSjob } else { 210*f5999ddfSjob printf("Certificate valid since: %s\n", 211*f5999ddfSjob time2str(p->notbefore)); 21228439bbcSjob printf("Certificate valid until: %s\n", 21328439bbcSjob time2str(p->expires)); 214*f5999ddfSjob } 2154486d057Sjob printf("Subordinate resources: "); 216530399e8Sjob } 217714f4e3fSclaudio 218530399e8Sjob for (i = 0; i < p->asz; i++) { 219714f4e3fSclaudio switch (p->as[i].type) { 220714f4e3fSclaudio case CERT_AS_ID: 221530399e8Sjob if (outformats & FORMAT_JSON) 222530399e8Sjob printf("\t\t{ \"asid\": %u }", p->as[i].id); 2234486d057Sjob else { 2244486d057Sjob if (i > 0) 2254486d057Sjob printf("%26s", ""); 2264486d057Sjob printf("AS: %u", p->as[i].id); 2274486d057Sjob } 228714f4e3fSclaudio break; 229714f4e3fSclaudio case CERT_AS_INHERIT: 230530399e8Sjob if (outformats & FORMAT_JSON) 231530399e8Sjob printf("\t\t{ \"asid_inherit\": \"true\" }"); 2324486d057Sjob else { 2334486d057Sjob if (i > 0) 2344486d057Sjob printf("%26s", ""); 2354486d057Sjob printf("AS: inherit"); 2364486d057Sjob } 237714f4e3fSclaudio break; 238714f4e3fSclaudio case CERT_AS_RANGE: 239530399e8Sjob if (outformats & FORMAT_JSON) 240530399e8Sjob printf("\t\t{ \"asrange\": { \"min\": %u, " 241530399e8Sjob "\"max\": %u }}", p->as[i].range.min, 242530399e8Sjob p->as[i].range.max); 2434486d057Sjob else { 2444486d057Sjob if (i > 0) 2454486d057Sjob printf("%26s", ""); 2464486d057Sjob printf("AS: %u -- %u", p->as[i].range.min, 2474486d057Sjob p->as[i].range.max); 2484486d057Sjob } 249714f4e3fSclaudio break; 250714f4e3fSclaudio } 251530399e8Sjob if (outformats & FORMAT_JSON && i + 1 < p->asz + p->ipsz) 252530399e8Sjob printf(",\n"); 253530399e8Sjob else 254530399e8Sjob printf("\n"); 255714f4e3fSclaudio } 256714f4e3fSclaudio 257530399e8Sjob for (j = 0; j < p->ipsz; j++) { 258530399e8Sjob switch (p->ips[j].type) { 259530399e8Sjob case CERT_IP_INHERIT: 260530399e8Sjob if (outformats & FORMAT_JSON) 261530399e8Sjob printf("\t\t{ \"ip_inherit\": \"true\" }"); 2624486d057Sjob else { 2634486d057Sjob if (i > 0 || j > 0) 2644486d057Sjob printf("%26s", ""); 2654486d057Sjob printf("IP: inherit"); 2664486d057Sjob } 267530399e8Sjob break; 268530399e8Sjob case CERT_IP_ADDR: 269530399e8Sjob ip_addr_print(&p->ips[j].ip, 270530399e8Sjob p->ips[j].afi, buf1, sizeof(buf1)); 271530399e8Sjob if (outformats & FORMAT_JSON) 272530399e8Sjob printf("\t\t{ \"ip_prefix\": \"%s\" }", buf1); 2734486d057Sjob else { 2744486d057Sjob if (i > 0 || j > 0) 2754486d057Sjob printf("%26s", ""); 2764486d057Sjob printf("IP: %s", buf1); 2774486d057Sjob } 278530399e8Sjob break; 279530399e8Sjob case CERT_IP_RANGE: 280530399e8Sjob sockt = (p->ips[j].afi == AFI_IPV4) ? 281530399e8Sjob AF_INET : AF_INET6; 282530399e8Sjob inet_ntop(sockt, p->ips[j].min, buf1, sizeof(buf1)); 283530399e8Sjob inet_ntop(sockt, p->ips[j].max, buf2, sizeof(buf2)); 284530399e8Sjob if (outformats & FORMAT_JSON) 285530399e8Sjob printf("\t\t{ \"ip_range\": { \"min\": \"%s\"" 286530399e8Sjob ", \"max\": \"%s\" }}", buf1, buf2); 2874486d057Sjob else { 2884486d057Sjob if (i > 0 || j > 0) 2894486d057Sjob printf("%26s", ""); 2904486d057Sjob printf("IP: %s -- %s", buf1, buf2); 2914486d057Sjob } 292530399e8Sjob break; 293530399e8Sjob } 294530399e8Sjob if (outformats & FORMAT_JSON && i + j + 1 < p->asz + p->ipsz) 295530399e8Sjob printf(",\n"); 296530399e8Sjob else 297530399e8Sjob printf("\n"); 298530399e8Sjob } 299530399e8Sjob 300530399e8Sjob if (outformats & FORMAT_JSON) 301530399e8Sjob printf("\t],\n"); 302714f4e3fSclaudio } 303714f4e3fSclaudio 304714f4e3fSclaudio void 305220c707cSclaudio crl_print(const struct crl *p) 306220c707cSclaudio { 307220c707cSclaudio STACK_OF(X509_REVOKED) *revlist; 308220c707cSclaudio X509_REVOKED *rev; 3097cdd491fSclaudio ASN1_INTEGER *crlnum; 310e0b87278Sjob X509_NAME *xissuer; 311220c707cSclaudio int i; 312e0b87278Sjob char *issuer, *serial; 313220c707cSclaudio time_t t; 314220c707cSclaudio 315530399e8Sjob if (outformats & FORMAT_JSON) { 316530399e8Sjob printf("\t\"type\": \"crl\",\n"); 317530399e8Sjob printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki)); 318530399e8Sjob } else 319220c707cSclaudio printf("Authority key identifier: %s\n", pretty_key_id(p->aki)); 3207cdd491fSclaudio 321e0b87278Sjob xissuer = X509_CRL_get_issuer(p->x509_crl); 322e0b87278Sjob issuer = X509_NAME_oneline(xissuer, NULL, 0); 3237cdd491fSclaudio crlnum = X509_CRL_get_ext_d2i(p->x509_crl, NID_crl_number, NULL, NULL); 3247cdd491fSclaudio serial = x509_convert_seqnum(__func__, crlnum); 325e0b87278Sjob if (issuer != NULL && serial != NULL) { 326e0b87278Sjob if (outformats & FORMAT_JSON) { 327e0b87278Sjob printf("\t\"crl_issuer\": \"%s\",\n", issuer); 328530399e8Sjob printf("\t\"crl_serial\": \"%s\",\n", serial); 329e0b87278Sjob } else { 330e0b87278Sjob printf("CRL issuer: %s\n", issuer); 331e0b87278Sjob printf("CRL serial number: %s\n", serial); 332530399e8Sjob } 333e0b87278Sjob } 334e0b87278Sjob free(issuer); 3357cdd491fSclaudio free(serial); 3367cdd491fSclaudio ASN1_INTEGER_free(crlnum); 3377cdd491fSclaudio 338530399e8Sjob if (outformats & FORMAT_JSON) { 339530399e8Sjob printf("\t\"valid_since\": %lld,\n", (long long)p->issued); 340530399e8Sjob printf("\t\"valid_until\": %lld,\n", (long long)p->expires); 341530399e8Sjob printf("\t\"revoked_certs\": [\n"); 342530399e8Sjob } else { 343220c707cSclaudio printf("CRL valid since: %s\n", time2str(p->issued)); 344220c707cSclaudio printf("CRL valid until: %s\n", time2str(p->expires)); 345530399e8Sjob printf("Revoked Certificates:\n"); 346530399e8Sjob } 347220c707cSclaudio 348220c707cSclaudio revlist = X509_CRL_get_REVOKED(p->x509_crl); 349220c707cSclaudio for (i = 0; i < sk_X509_REVOKED_num(revlist); i++) { 350220c707cSclaudio rev = sk_X509_REVOKED_value(revlist, i); 3517cdd491fSclaudio serial = x509_convert_seqnum(__func__, 3527cdd491fSclaudio X509_REVOKED_get0_serialNumber(rev)); 353220c707cSclaudio x509_get_time(X509_REVOKED_get0_revocationDate(rev), &t); 354530399e8Sjob if (serial != NULL) { 355530399e8Sjob if (outformats & FORMAT_JSON) { 356530399e8Sjob printf("\t\t{ \"serial\": \"%s\"", serial); 357530399e8Sjob printf(", \"date\": \"%s\" }", time2str(t)); 358530399e8Sjob if (i + 1 < sk_X509_REVOKED_num(revlist)) 359530399e8Sjob printf(","); 360530399e8Sjob printf("\n"); 361530399e8Sjob } else 3624486d057Sjob printf("%25s Serial: %8s Revocation Date: %s" 3634486d057Sjob "\n", "", serial, time2str(t)); 364530399e8Sjob } 3657cdd491fSclaudio free(serial); 366220c707cSclaudio } 367530399e8Sjob 368530399e8Sjob if (outformats & FORMAT_JSON) 369530399e8Sjob printf("\t],\n"); 370530399e8Sjob else if (i == 0) 371220c707cSclaudio printf("No Revoked Certificates\n"); 372220c707cSclaudio } 373220c707cSclaudio 374220c707cSclaudio void 375530399e8Sjob mft_print(const X509 *x, const struct mft *p) 376714f4e3fSclaudio { 377714f4e3fSclaudio size_t i; 378714f4e3fSclaudio char *hash; 379714f4e3fSclaudio 380530399e8Sjob if (outformats & FORMAT_JSON) { 381530399e8Sjob printf("\t\"type\": \"manifest\",\n"); 382530399e8Sjob printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski)); 383530399e8Sjob x509_print(x); 384530399e8Sjob printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki)); 385530399e8Sjob printf("\t\"aia\": \"%s\",\n", p->aia); 3862cf0e122Sjob printf("\t\"sia\": \"%s\",\n", p->sia); 387530399e8Sjob printf("\t\"manifest_number\": \"%s\",\n", p->seqnum); 3881bb1e509Sjob if (p->signtime != 0) 3891bb1e509Sjob printf("\t\"signing_time\": %lld,\n", 3901bb1e509Sjob (long long)p->signtime); 391530399e8Sjob printf("\t\"valid_since\": %lld,\n", (long long)p->valid_since); 392530399e8Sjob printf("\t\"valid_until\": %lld,\n", (long long)p->valid_until); 393530399e8Sjob } else { 394714f4e3fSclaudio printf("Subject key identifier: %s\n", pretty_key_id(p->ski)); 395714f4e3fSclaudio printf("Authority key identifier: %s\n", pretty_key_id(p->aki)); 396530399e8Sjob x509_print(x); 397714f4e3fSclaudio printf("Authority info access: %s\n", p->aia); 3982cf0e122Sjob printf("Subject info access: %s\n", p->sia); 399714f4e3fSclaudio printf("Manifest Number: %s\n", p->seqnum); 4001bb1e509Sjob if (p->signtime != 0) 4011bb1e509Sjob printf("Signing time: %s\n", 4021bb1e509Sjob time2str(p->signtime)); 403530399e8Sjob printf("Manifest valid since: %s\n", time2str(p->valid_since)); 404530399e8Sjob printf("Manifest valid until: %s\n", time2str(p->valid_until)); 4054486d057Sjob printf("Files and hashes: "); 406530399e8Sjob } 407530399e8Sjob 408714f4e3fSclaudio for (i = 0; i < p->filesz; i++) { 409530399e8Sjob if (i == 0 && outformats & FORMAT_JSON) 410530399e8Sjob printf("\t\"filesandhashes\": [\n"); 411530399e8Sjob 412714f4e3fSclaudio if (base64_encode(p->files[i].hash, sizeof(p->files[i].hash), 413714f4e3fSclaudio &hash) == -1) 414714f4e3fSclaudio errx(1, "base64_encode failure"); 415530399e8Sjob 416530399e8Sjob if (outformats & FORMAT_JSON) { 417530399e8Sjob printf("\t\t{ \"filename\": \"%s\",", p->files[i].file); 418530399e8Sjob printf(" \"hash\": \"%s\" }", hash); 419530399e8Sjob if (i + 1 < p->filesz) 420530399e8Sjob printf(","); 421530399e8Sjob printf("\n"); 422530399e8Sjob } else { 4234486d057Sjob if (i > 0) 4244486d057Sjob printf("%26s", ""); 4254486d057Sjob printf("%zu: %s (hash: %s)\n", i + 1, p->files[i].file, 4264486d057Sjob hash); 427530399e8Sjob } 428530399e8Sjob 429714f4e3fSclaudio free(hash); 430714f4e3fSclaudio } 431530399e8Sjob 432530399e8Sjob if (outformats & FORMAT_JSON) 433530399e8Sjob printf("\t],\n"); 434714f4e3fSclaudio } 435714f4e3fSclaudio 436714f4e3fSclaudio void 437530399e8Sjob roa_print(const X509 *x, const struct roa *p) 438714f4e3fSclaudio { 439714f4e3fSclaudio char buf[128]; 440714f4e3fSclaudio size_t i; 441714f4e3fSclaudio 442530399e8Sjob if (outformats & FORMAT_JSON) { 443530399e8Sjob printf("\t\"type\": \"roa\",\n"); 444530399e8Sjob printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski)); 445530399e8Sjob x509_print(x); 446530399e8Sjob printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki)); 447530399e8Sjob printf("\t\"aia\": \"%s\",\n", p->aia); 4482cf0e122Sjob printf("\t\"sia\": \"%s\",\n", p->sia); 4491bb1e509Sjob if (p->signtime != 0) 4501bb1e509Sjob printf("\t\"signing_time\": %lld,\n", 4511bb1e509Sjob (long long)p->signtime); 452*f5999ddfSjob printf("\t\"valid_since\": %lld,\n", (long long)p->notbefore); 453530399e8Sjob printf("\t\"valid_until\": %lld,\n", (long long)p->expires); 454530399e8Sjob } else { 455714f4e3fSclaudio printf("Subject key identifier: %s\n", pretty_key_id(p->ski)); 456530399e8Sjob x509_print(x); 457714f4e3fSclaudio printf("Authority key identifier: %s\n", pretty_key_id(p->aki)); 458714f4e3fSclaudio printf("Authority info access: %s\n", p->aia); 4592cf0e122Sjob printf("Subject info access: %s\n", p->sia); 4601bb1e509Sjob if (p->signtime != 0) 4611bb1e509Sjob printf("Signing time: %s\n", 4621bb1e509Sjob time2str(p->signtime)); 463*f5999ddfSjob printf("ROA valid since: %s\n", 464*f5999ddfSjob time2str(p->notbefore)); 465220c707cSclaudio printf("ROA valid until: %s\n", time2str(p->expires)); 466714f4e3fSclaudio printf("asID: %u\n", p->asid); 4674486d057Sjob printf("IP address blocks: "); 468530399e8Sjob } 469530399e8Sjob 470714f4e3fSclaudio for (i = 0; i < p->ipsz; i++) { 471530399e8Sjob if (i == 0 && outformats & FORMAT_JSON) 472530399e8Sjob printf("\t\"vrps\": [\n"); 473530399e8Sjob 474714f4e3fSclaudio ip_addr_print(&p->ips[i].addr, 475714f4e3fSclaudio p->ips[i].afi, buf, sizeof(buf)); 476530399e8Sjob 477530399e8Sjob if (outformats & FORMAT_JSON) { 478530399e8Sjob printf("\t\t{ \"prefix\": \"%s\",", buf); 479530399e8Sjob printf(" \"asid\": %u,", p->asid); 480530399e8Sjob printf(" \"maxlen\": %hhu }", p->ips[i].maxlength); 481530399e8Sjob if (i + 1 < p->ipsz) 482530399e8Sjob printf(","); 483530399e8Sjob printf("\n"); 4844486d057Sjob } else { 4854486d057Sjob if (i > 0) 4864486d057Sjob printf("%26s", ""); 4874486d057Sjob printf("%s maxlen: %hhu\n", buf, p->ips[i].maxlength); 4884486d057Sjob } 489714f4e3fSclaudio } 490530399e8Sjob 491530399e8Sjob if (outformats & FORMAT_JSON) 492530399e8Sjob printf("\t],\n"); 493714f4e3fSclaudio } 494714f4e3fSclaudio 495714f4e3fSclaudio void 496530399e8Sjob gbr_print(const X509 *x, const struct gbr *p) 497714f4e3fSclaudio { 498530399e8Sjob size_t i; 499530399e8Sjob 500530399e8Sjob if (outformats & FORMAT_JSON) { 501530399e8Sjob printf("\t\"type\": \"gbr\",\n"); 502530399e8Sjob printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski)); 503530399e8Sjob x509_print(x); 504530399e8Sjob printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki)); 505530399e8Sjob printf("\t\"aia\": \"%s\",\n", p->aia); 5062cf0e122Sjob printf("\t\"sia\": \"%s\",\n", p->sia); 5071bb1e509Sjob if (p->signtime != 0) 5081bb1e509Sjob printf("\t\"signing_time\": %lld,\n", 5091bb1e509Sjob (long long)p->signtime); 510*f5999ddfSjob printf("\t\"valid_since\": %lld,\n", (long long)p->notbefore); 511f904f2a2Sjob printf("\t\"valid_until\": %lld,\n", (long long)p->expires); 512530399e8Sjob printf("\t\"vcard\": \""); 513530399e8Sjob for (i = 0; i < strlen(p->vcard); i++) { 514530399e8Sjob if (p->vcard[i] == '"') 515530399e8Sjob printf("\\\""); 516530399e8Sjob if (p->vcard[i] == '\r') 517530399e8Sjob continue; 518530399e8Sjob if (p->vcard[i] == '\n') 519530399e8Sjob printf("\\r\\n"); 520530399e8Sjob else 521530399e8Sjob putchar(p->vcard[i]); 522530399e8Sjob } 523530399e8Sjob printf("\",\n"); 524530399e8Sjob } else { 525714f4e3fSclaudio printf("Subject key identifier: %s\n", pretty_key_id(p->ski)); 526530399e8Sjob x509_print(x); 527714f4e3fSclaudio printf("Authority key identifier: %s\n", pretty_key_id(p->aki)); 528714f4e3fSclaudio printf("Authority info access: %s\n", p->aia); 5292cf0e122Sjob printf("Subject info access: %s\n", p->sia); 5301bb1e509Sjob if (p->signtime != 0) 5311bb1e509Sjob printf("Signing time: %s\n", 5321bb1e509Sjob time2str(p->signtime)); 533*f5999ddfSjob printf("GBR valid since: %s\n", 534*f5999ddfSjob time2str(p->notbefore)); 535f904f2a2Sjob printf("GBR valid until: %s\n", time2str(p->expires)); 536714f4e3fSclaudio printf("vcard:\n%s", p->vcard); 537714f4e3fSclaudio } 538530399e8Sjob } 53904834fbdSjob 54004834fbdSjob void 54104834fbdSjob rsc_print(const X509 *x, const struct rsc *p) 54204834fbdSjob { 54328439bbcSjob char buf1[64], buf2[64]; 54404834fbdSjob char *hash; 54504834fbdSjob int sockt; 54604834fbdSjob size_t i, j; 54704834fbdSjob 54804834fbdSjob if (outformats & FORMAT_JSON) { 54904834fbdSjob printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski)); 55004834fbdSjob printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki)); 55104834fbdSjob x509_print(x); 55204834fbdSjob printf("\t\"aia\": \"%s\",\n", p->aia); 5531bb1e509Sjob if (p->signtime != 0) 5541bb1e509Sjob printf("\t\"signing_time\": %lld,\n", 5551bb1e509Sjob (long long)p->signtime); 556*f5999ddfSjob printf("\t\"valid_since\": %lld,\n", (long long)p->notbefore); 55704834fbdSjob printf("\t\"valid_until\": %lld,\n", (long long)p->expires); 55804834fbdSjob printf("\t\"signed_with_resources\": [\n"); 55904834fbdSjob } else { 56004834fbdSjob printf("Subject key identifier: %s\n", pretty_key_id(p->ski)); 56104834fbdSjob printf("Authority key identifier: %s\n", pretty_key_id(p->aki)); 56204834fbdSjob x509_print(x); 56304834fbdSjob printf("Authority info access: %s\n", p->aia); 5641bb1e509Sjob if (p->signtime != 0) 5651bb1e509Sjob printf("Signing time: %s\n", 5661bb1e509Sjob time2str(p->signtime)); 567*f5999ddfSjob printf("RSC valid since: %s\n", 568*f5999ddfSjob time2str(p->notbefore)); 56928439bbcSjob printf("RSC valid until: %s\n", time2str(p->expires)); 5704486d057Sjob printf("Signed with resources: "); 57104834fbdSjob } 57204834fbdSjob 57304834fbdSjob for (i = 0; i < p->asz; i++) { 57404834fbdSjob switch (p->as[i].type) { 57504834fbdSjob case CERT_AS_ID: 57604834fbdSjob if (outformats & FORMAT_JSON) 57704834fbdSjob printf("\t\t{ \"asid\": %u }", p->as[i].id); 5784486d057Sjob else { 5794486d057Sjob if (i > 0) 5804486d057Sjob printf("%26s", ""); 5814486d057Sjob printf("AS: %u", p->as[i].id); 5824486d057Sjob } 58304834fbdSjob break; 58404834fbdSjob case CERT_AS_RANGE: 58504834fbdSjob if (outformats & FORMAT_JSON) 58604834fbdSjob printf("\t\t{ \"asrange\": { \"min\": %u, " 58704834fbdSjob "\"max\": %u }}", p->as[i].range.min, 58804834fbdSjob p->as[i].range.max); 5894486d057Sjob else { 5904486d057Sjob if (i > 0) 5914486d057Sjob printf("%26s", ""); 5924486d057Sjob printf("AS: %u -- %u", p->as[i].range.min, 5934486d057Sjob p->as[i].range.max); 5944486d057Sjob } 59504834fbdSjob break; 59604834fbdSjob case CERT_AS_INHERIT: 59704834fbdSjob /* inheritance isn't possible in RSC */ 59804834fbdSjob break; 59904834fbdSjob } 60004834fbdSjob if (outformats & FORMAT_JSON && i + 1 < p->asz + p->ipsz) 60104834fbdSjob printf(",\n"); 60204834fbdSjob else 60304834fbdSjob printf("\n"); 60404834fbdSjob } 60504834fbdSjob 60604834fbdSjob for (j = 0; j < p->ipsz; j++) { 60704834fbdSjob switch (p->ips[j].type) { 60804834fbdSjob case CERT_IP_ADDR: 60904834fbdSjob ip_addr_print(&p->ips[j].ip, 61004834fbdSjob p->ips[j].afi, buf1, sizeof(buf1)); 61104834fbdSjob if (outformats & FORMAT_JSON) 61204834fbdSjob printf("\t\t{ \"ip_prefix\": \"%s\" }", buf1); 6134486d057Sjob else { 6144486d057Sjob if (i > 0 || j > 0) 6154486d057Sjob printf("%26s", ""); 6164486d057Sjob printf("IP: %s", buf1); 6174486d057Sjob } 61804834fbdSjob break; 61904834fbdSjob case CERT_IP_RANGE: 62004834fbdSjob sockt = (p->ips[j].afi == AFI_IPV4) ? 62104834fbdSjob AF_INET : AF_INET6; 62204834fbdSjob inet_ntop(sockt, p->ips[j].min, buf1, sizeof(buf1)); 62304834fbdSjob inet_ntop(sockt, p->ips[j].max, buf2, sizeof(buf2)); 62404834fbdSjob if (outformats & FORMAT_JSON) 62504834fbdSjob printf("\t\t{ \"ip_range\": { \"min\": \"%s\"" 62604834fbdSjob ", \"max\": \"%s\" }}", buf1, buf2); 6274486d057Sjob else { 6284486d057Sjob if (i > 0 || j > 0) 6294486d057Sjob printf("%26s", ""); 6304486d057Sjob printf("IP: %s -- %s", buf1, buf2); 6314486d057Sjob } 63204834fbdSjob break; 63304834fbdSjob case CERT_IP_INHERIT: 63404834fbdSjob /* inheritance isn't possible in RSC */ 63504834fbdSjob break; 63604834fbdSjob } 63704834fbdSjob if (outformats & FORMAT_JSON && i + j + 1 < p->asz + p->ipsz) 63804834fbdSjob printf(",\n"); 63904834fbdSjob else 64004834fbdSjob printf("\n"); 64104834fbdSjob } 64204834fbdSjob 64304834fbdSjob if (outformats & FORMAT_JSON) { 64404834fbdSjob printf("\t],\n"); 64504834fbdSjob printf("\t\"filenamesandhashes\": [\n"); 64604834fbdSjob } else 6474486d057Sjob printf("Filenames and hashes: "); 64804834fbdSjob 64904834fbdSjob for (i = 0; i < p->filesz; i++) { 65004834fbdSjob if (base64_encode(p->files[i].hash, sizeof(p->files[i].hash), 65104834fbdSjob &hash) == -1) 65204834fbdSjob errx(1, "base64_encode failure"); 65304834fbdSjob 65404834fbdSjob if (outformats & FORMAT_JSON) { 65504834fbdSjob printf("\t\t{ \"filename\": \"%s\",", 65604834fbdSjob p->files[i].filename ? p->files[i].filename : ""); 65704834fbdSjob printf(" \"hash_digest\": \"%s\" }", hash); 65804834fbdSjob if (i + 1 < p->filesz) 65904834fbdSjob printf(","); 66004834fbdSjob printf("\n"); 66104834fbdSjob } else { 6624486d057Sjob if (i > 0) 6634486d057Sjob printf("%26s", ""); 6644486d057Sjob printf("%zu: %s (hash: %s)\n", i + 1, 6654486d057Sjob p->files[i].filename ? p->files[i].filename 6664486d057Sjob : "no filename", hash); 66704834fbdSjob } 66804834fbdSjob 66904834fbdSjob free(hash); 67004834fbdSjob } 67104834fbdSjob 67204834fbdSjob if (outformats & FORMAT_JSON) 67304834fbdSjob printf("\t],\n"); 67404834fbdSjob } 675a29ddfd5Sjob 676a29ddfd5Sjob void 677a29ddfd5Sjob aspa_print(const X509 *x, const struct aspa *p) 678a29ddfd5Sjob { 679a29ddfd5Sjob size_t i; 680a29ddfd5Sjob 681a29ddfd5Sjob if (outformats & FORMAT_JSON) { 682a29ddfd5Sjob printf("\t\"type\": \"aspa\",\n"); 683a29ddfd5Sjob printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski)); 684a29ddfd5Sjob x509_print(x); 685a29ddfd5Sjob printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki)); 686a29ddfd5Sjob printf("\t\"aia\": \"%s\",\n", p->aia); 6872cf0e122Sjob printf("\t\"sia\": \"%s\",\n", p->sia); 6881bb1e509Sjob if (p->signtime != 0) 6891bb1e509Sjob printf("\t\"signing_time\": %lld,\n", 6901bb1e509Sjob (long long)p->signtime); 691*f5999ddfSjob printf("\t\"valid_since\": %lld,\n", (long long)p->notbefore); 69228439bbcSjob printf("\t\"valid_until\": %lld,\n", (long long)p->expires); 693a29ddfd5Sjob printf("\t\"customer_asid\": %u,\n", p->custasid); 694a29ddfd5Sjob printf("\t\"provider_set\": [\n"); 695a29ddfd5Sjob for (i = 0; i < p->providersz; i++) { 696a29ddfd5Sjob printf("\t\t{ \"asid\": %u", p->providers[i].as); 697a29ddfd5Sjob if (p->providers[i].afi == AFI_IPV4) 698a29ddfd5Sjob printf(", \"afi_limit\": \"ipv4\""); 699a29ddfd5Sjob if (p->providers[i].afi == AFI_IPV6) 700a29ddfd5Sjob printf(", \"afi_limit\": \"ipv6\""); 701a29ddfd5Sjob printf(" }"); 702a29ddfd5Sjob if (i + 1 < p->providersz) 703a29ddfd5Sjob printf(","); 704a29ddfd5Sjob printf("\n"); 705a29ddfd5Sjob } 706a29ddfd5Sjob printf("\t],\n"); 707a29ddfd5Sjob } else { 708a29ddfd5Sjob printf("Subject key identifier: %s\n", pretty_key_id(p->ski)); 709a29ddfd5Sjob x509_print(x); 710a29ddfd5Sjob printf("Authority key identifier: %s\n", pretty_key_id(p->aki)); 711a29ddfd5Sjob printf("Authority info access: %s\n", p->aia); 7122cf0e122Sjob printf("Subject info access: %s\n", p->sia); 7131bb1e509Sjob if (p->signtime != 0) 7141bb1e509Sjob printf("Signing time: %s\n", 7151bb1e509Sjob time2str(p->signtime)); 716*f5999ddfSjob printf("ASPA valid since: %s\n", 717*f5999ddfSjob time2str(p->notbefore)); 71828439bbcSjob printf("ASPA valid until: %s\n", time2str(p->expires)); 719a29ddfd5Sjob printf("Customer AS: %u\n", p->custasid); 7204486d057Sjob printf("Provider Set: "); 721a29ddfd5Sjob for (i = 0; i < p->providersz; i++) { 7224486d057Sjob if (i > 0) 7234486d057Sjob printf("%26s", ""); 7244486d057Sjob printf("AS: %d", p->providers[i].as); 725a29ddfd5Sjob switch (p->providers[i].afi) { 726a29ddfd5Sjob case AFI_IPV4: 727a29ddfd5Sjob printf(" (IPv4 only)"); 728a29ddfd5Sjob break; 729a29ddfd5Sjob case AFI_IPV6: 730a29ddfd5Sjob printf(" (IPv6 only)"); 731a29ddfd5Sjob break; 732a29ddfd5Sjob default: 733a29ddfd5Sjob break; 734a29ddfd5Sjob } 735a29ddfd5Sjob printf("\n"); 736a29ddfd5Sjob } 737a29ddfd5Sjob } 738a29ddfd5Sjob } 739ee2a33daSjob 740ee2a33daSjob static void 741ee2a33daSjob takey_print(char *name, const struct takey *t) 742ee2a33daSjob { 743ee2a33daSjob char *spki = NULL; 744ee2a33daSjob size_t i, j = 0; 745ee2a33daSjob 746ee2a33daSjob if (base64_encode(t->pubkey, t->pubkeysz, &spki) != 0) 747ee2a33daSjob errx(1, "base64_encode failed in %s", __func__); 748ee2a33daSjob 749ee2a33daSjob if (outformats & FORMAT_JSON) { 750ee2a33daSjob printf("\t\t{\n\t\t\t\"name\": \"%s\",\n", name); 751ee2a33daSjob printf("\t\t\t\"comments\": ["); 752ee2a33daSjob for (i = 0; i < t->commentsz; i++) { 753ee2a33daSjob printf("\"%s\"", t->comments[i]); 754ee2a33daSjob if (i + 1 < t->commentsz) 755ee2a33daSjob printf(", "); 756ee2a33daSjob } 757ee2a33daSjob printf("],\n"); 758ee2a33daSjob printf("\t\t\t\"uris\": ["); 759ee2a33daSjob for (i = 0; i < t->urisz; i++) { 760ee2a33daSjob printf("\"%s\"", t->uris[i]); 761ee2a33daSjob if (i + 1 < t->urisz) 762ee2a33daSjob printf(", "); 763ee2a33daSjob } 764ee2a33daSjob printf("],\n"); 765ee2a33daSjob printf("\t\t\t\"spki\": \"%s\"\n\t\t}", spki); 766ee2a33daSjob } else { 767ee2a33daSjob printf("TAL derived from the '%s' Trust Anchor Key:\n\n", name); 768ee2a33daSjob 769ee2a33daSjob for (i = 0; i < t->commentsz; i++) { 770ee2a33daSjob printf("\t# %s\n", t->comments[i]); 771ee2a33daSjob } 772ee2a33daSjob 773ee2a33daSjob for (i = 0; i < t->urisz; i++) { 774ee2a33daSjob printf("\t%s\n\n\t", t->uris[i]); 775ee2a33daSjob } 776ee2a33daSjob 777ee2a33daSjob for (i = 0; i < strlen(spki); i++) { 778ee2a33daSjob printf("%c", spki[i]); 779ee2a33daSjob j++; 780ee2a33daSjob if (j == 64) { 781ee2a33daSjob printf("\n\t"); 782ee2a33daSjob j = 0; 783ee2a33daSjob } 784ee2a33daSjob } 785ee2a33daSjob 786ee2a33daSjob printf("\n\n"); 787ee2a33daSjob } 788ee2a33daSjob 789ee2a33daSjob free(spki); 790ee2a33daSjob } 791ee2a33daSjob 792ee2a33daSjob void 793ee2a33daSjob tak_print(const X509 *x, const struct tak *p) 794ee2a33daSjob { 795ee2a33daSjob if (outformats & FORMAT_JSON) { 796ee2a33daSjob printf("\t\"type\": \"tak\",\n"); 797ee2a33daSjob printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski)); 798ee2a33daSjob x509_print(x); 799ee2a33daSjob printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki)); 800ee2a33daSjob printf("\t\"aia\": \"%s\",\n", p->aia); 8012cf0e122Sjob printf("\t\"sia\": \"%s\",\n", p->sia); 8021bb1e509Sjob if (p->signtime != 0) 8031bb1e509Sjob printf("\t\"signing_time\": %lld,\n", 8041bb1e509Sjob (long long)p->signtime); 805*f5999ddfSjob printf("\t\"valid_since\": %lld,\n", (long long)p->notbefore); 806ee2a33daSjob printf("\t\"valid_until\": %lld,\n", (long long)p->expires); 807ee2a33daSjob printf("\t\"takeys\": [\n"); 808ee2a33daSjob } else { 809ee2a33daSjob printf("Subject key identifier: %s\n", pretty_key_id(p->ski)); 810ee2a33daSjob x509_print(x); 811ee2a33daSjob printf("Authority key identifier: %s\n", pretty_key_id(p->aki)); 812ee2a33daSjob printf("Authority info access: %s\n", p->aia); 8132cf0e122Sjob printf("Subject info access: %s\n", p->sia); 8141bb1e509Sjob if (p->signtime != 0) 8151bb1e509Sjob printf("Signing time: %s\n", 8161bb1e509Sjob time2str(p->signtime)); 817*f5999ddfSjob printf("TAK valid since: %s\n", 818*f5999ddfSjob time2str(p->notbefore)); 81928439bbcSjob printf("TAK valid until: %s\n", time2str(p->expires)); 820ee2a33daSjob } 821ee2a33daSjob 822ee2a33daSjob takey_print("current", p->current); 823ee2a33daSjob 824ee2a33daSjob if (p->predecessor != NULL) { 825ee2a33daSjob if (outformats & FORMAT_JSON) 826ee2a33daSjob printf(",\n"); 827ee2a33daSjob takey_print("predecessor", p->predecessor); 828ee2a33daSjob } 829ee2a33daSjob 830ee2a33daSjob if (p->successor != NULL) { 831ee2a33daSjob if (outformats & FORMAT_JSON) 832ee2a33daSjob printf(",\n"); 833ee2a33daSjob takey_print("successor", p->successor); 834ee2a33daSjob } 835ee2a33daSjob 836ee2a33daSjob if (outformats & FORMAT_JSON) 837ee2a33daSjob printf("\n\t],\n"); 838ee2a33daSjob } 839ef3f6f56Sjob 840ef3f6f56Sjob void 841ef3f6f56Sjob geofeed_print(const X509 *x, const struct geofeed *p) 842ef3f6f56Sjob { 843ef3f6f56Sjob char buf[128]; 844ef3f6f56Sjob size_t i; 845ef3f6f56Sjob 846ef3f6f56Sjob if (outformats & FORMAT_JSON) { 847ef3f6f56Sjob printf("\t\"type\": \"geofeed\",\n"); 848ef3f6f56Sjob printf("\t\"ski\": \"%s\",\n", pretty_key_id(p->ski)); 849ef3f6f56Sjob x509_print(x); 850ef3f6f56Sjob printf("\t\"aki\": \"%s\",\n", pretty_key_id(p->aki)); 851ef3f6f56Sjob printf("\t\"aia\": \"%s\",\n", p->aia); 8521bb1e509Sjob if (p->signtime != 0) 8531bb1e509Sjob printf("\t\"signing_time\": %lld,\n", 8541bb1e509Sjob (long long)p->signtime); 855*f5999ddfSjob printf("\t\"valid_since\": %lld,\n", (long long)p->notbefore); 856ef3f6f56Sjob printf("\t\"valid_until\": %lld,\n", (long long)p->expires); 857ef3f6f56Sjob printf("\t\"records\": [\n"); 858ef3f6f56Sjob } else { 859ef3f6f56Sjob printf("Subject key identifier: %s\n", pretty_key_id(p->ski)); 860ef3f6f56Sjob x509_print(x); 861ef3f6f56Sjob printf("Authority key identifier: %s\n", pretty_key_id(p->aki)); 862ef3f6f56Sjob printf("Authority info access: %s\n", p->aia); 8631bb1e509Sjob if (p->signtime != 0) 8641bb1e509Sjob printf("Signing time: %s\n", 8651bb1e509Sjob time2str(p->signtime)); 866*f5999ddfSjob printf("Geofeed valid since: %s\n", 867*f5999ddfSjob time2str(p->notbefore)); 868ef3f6f56Sjob printf("Geofeed valid until: %s\n", time2str(p->expires)); 869ef3f6f56Sjob printf("Geofeed CSV records:\n"); 870ef3f6f56Sjob } 871ef3f6f56Sjob 872ef3f6f56Sjob for (i = 0; i < p->geoipsz; i++) { 873ef3f6f56Sjob if (p->geoips[i].ip->type != CERT_IP_ADDR) 874ef3f6f56Sjob continue; 875ef3f6f56Sjob 876ef3f6f56Sjob ip_addr_print(&p->geoips[i].ip->ip, p->geoips[i].ip->afi, buf, 877ef3f6f56Sjob sizeof(buf)); 878ef3f6f56Sjob if (outformats & FORMAT_JSON) 879ef3f6f56Sjob printf("\t\t{ \"prefix\": \"%s\", \"location\": \"%s\"" 880ef3f6f56Sjob "}", buf, p->geoips[i].loc); 8814486d057Sjob else { 8824486d057Sjob if (i > 0) 8834486d057Sjob printf("%26s", ""); 8844486d057Sjob printf("IP: %s (%s)", buf, p->geoips[i].loc); 8854486d057Sjob } 886ef3f6f56Sjob 887ef3f6f56Sjob if (outformats & FORMAT_JSON && i + 1 < p->geoipsz) 888ef3f6f56Sjob printf(",\n"); 889ef3f6f56Sjob else 890ef3f6f56Sjob printf("\n"); 891ef3f6f56Sjob } 892ef3f6f56Sjob 893ef3f6f56Sjob if (outformats & FORMAT_JSON) 894ef3f6f56Sjob printf("\t],\n"); 895ef3f6f56Sjob } 896