-/* $OpenBSD: print.c,v 1.18 2022/11/04 09:43:13 job Exp $ */
+/* $OpenBSD: print.c,v 1.19 2022/11/04 17:39:36 job Exp $ */
/*
* Copyright (c) 2021 Claudio Jeker <claudio@openbsd.org>
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
}
printf("],\n");
} else {
- printf("Trust anchor name: %s\n", p->descr);
- printf("Subject key identifier: %s\n", pretty_key_id(ski));
+ printf("Trust anchor name: %s\n", p->descr);
+ printf("Subject key identifier: %s\n", pretty_key_id(ski));
printf("Trust anchor locations:\n");
for (i = 0; i < p->urisz; i++)
printf("%5zu: %s\n", i + 1, p->uri[i]);
if (outformats & FORMAT_JSON) {
printf("\t\"cert_serial\": \"%s\",\n", serial);
} else {
- printf("Certificate serial: %s\n", serial);
+ printf("Certificate serial: %s\n", serial);
}
out:
printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
printf("\t\"subordinate_resources\": [\n");
} else {
- printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
+ printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
if (p->aki != NULL)
printf("Authority key identifier: %s\n",
pretty_key_id(p->aki));
x509_print(p->x509);
if (p->aia != NULL)
- printf("Authority info access: %s\n", p->aia);
+ printf("Authority info access: %s\n", p->aia);
if (p->mft != NULL)
printf("Manifest: %s\n", p->mft);
if (p->repo != NULL)
if (p->notify != NULL)
printf("Notify URL: %s\n", p->notify);
if (p->pubkey != NULL)
- printf("BGPsec P-256 ECDSA public key: %s\n",
+ printf("BGPsec ECDSA public key: %s\n",
p->pubkey);
- printf("Valid until: %s\n", tbuf);
+ printf("Router key valid until: %s\n", tbuf);
printf("Subordinate Resources:\n");
}
if (outformats & FORMAT_JSON)
printf("\t\"crl_serial\": \"%s\",\n", serial);
else
- printf("CRL Serial Number: %s\n", serial);
+ printf("CRL Serial Number: %s\n", serial);
}
free(serial);
ASN1_INTEGER_free(crlnum);
printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
printf("\t\"revoked_certs\": [\n");
} else {
- printf("CRL valid since: %s\n", time2str(p->issued));
- printf("CRL valid until: %s\n", time2str(p->expires));
+ printf("CRL valid since: %s\n", time2str(p->issued));
+ printf("CRL valid until: %s\n", time2str(p->expires));
printf("Revoked Certificates:\n");
}
printf("\t\"valid_since\": %lld,\n", (long long)p->valid_since);
printf("\t\"valid_until\": %lld,\n", (long long)p->valid_until);
} else {
- printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
+ printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
x509_print(x);
- printf("Authority info access: %s\n", p->aia);
- printf("Subject info access: %s\n", p->sia);
- printf("Manifest Number: %s\n", p->seqnum);
- printf("Manifest valid since: %s\n", time2str(p->valid_since));
- printf("Manifest valid until: %s\n", time2str(p->valid_until));
+ printf("Authority info access: %s\n", p->aia);
+ printf("Subject info access: %s\n", p->sia);
+ printf("Manifest Number: %s\n", p->seqnum);
+ printf("Manifest valid since: %s\n", time2str(p->valid_since));
+ printf("Manifest valid until: %s\n", time2str(p->valid_until));
+ printf("Files and hashes:\n");
}
for (i = 0; i < p->filesz; i++) {
printf("\t\"sia\": \"%s\",\n", p->sia);
printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
} else {
- printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
+ printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
x509_print(x);
printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
- printf("Authority info access: %s\n", p->aia);
- printf("Subject info access: %s\n", p->sia);
- printf("ROA valid until: %s\n", time2str(p->expires));
- printf("asID: %u\n", p->asid);
+ printf("Authority info access: %s\n", p->aia);
+ printf("Subject info access: %s\n", p->sia);
+ printf("ROA valid until: %s\n", time2str(p->expires));
+ printf("asID: %u\n", p->asid);
printf("IP address blocks:\n");
}
}
printf("\",\n");
} else {
- printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
+ printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
x509_print(x);
printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
- printf("Authority info access: %s\n", p->aia);
- printf("Subject info access: %s\n", p->sia);
+ printf("Authority info access: %s\n", p->aia);
+ printf("Subject info access: %s\n", p->sia);
printf("vcard:\n%s", p->vcard);
}
}
printf("\t\"valid_until\": %lld,\n", (long long)p->expires);
printf("\t\"signed_with_resources\": [\n");
} else {
- printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
+ printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
x509_print(x);
- printf("Authority info access: %s\n", p->aia);
- printf("Valid until: %s\n", tbuf);
+ printf("Authority info access: %s\n", p->aia);
+ printf("Valid until: %s\n", tbuf);
printf("Signed with resources:\n");
}
}
printf("\t],\n");
} else {
- printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
+ printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
x509_print(x);
printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
- printf("Authority info access: %s\n", p->aia);
- printf("Subject info access: %s\n", p->sia);
- printf("Customer AS: %u\n", p->custasid);
+ printf("Authority info access: %s\n", p->aia);
+ printf("Subject info access: %s\n", p->sia);
+ printf("Customer AS: %u\n", p->custasid);
printf("Provider Set:\n");
for (i = 0; i < p->providersz; i++) {
printf("%5zu: AS: %d", i + 1, p->providers[i].as);
printf("\t\"takeys\": [\n");
} else {
strftime(tbuf, sizeof(tbuf), "%FT%TZ", gmtime(&p->expires));
- printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
+ printf("Subject key identifier: %s\n", pretty_key_id(p->ski));
x509_print(x);
printf("Authority key identifier: %s\n", pretty_key_id(p->aki));
- printf("Authority info access: %s\n", p->aia);
- printf("Subject info access: %s\n", p->sia);
- printf("TAK EE certificate valid until: %s\n", tbuf);
+ printf("Authority info access: %s\n", p->aia);
+ printf("Subject info access: %s\n", p->sia);
+ printf("TAK valid until: %s\n", tbuf);
}
takey_print("current", p->current);