-# $OpenBSD: Makefile.inc,v 1.6 2021/02/03 10:45:12 claudio Exp $
+# $OpenBSD: Makefile.inc,v 1.7 2021/02/16 08:53:53 job Exp $
.PATH: ${.CURDIR}/../../../../usr.sbin/rpki-client
PROGS += test-ip
PROGS += test-cert
+PROGS += test-gbr
PROGS += test-mft
PROGS += test-roa
-PROGS += test-gbr
PROGS += test-tal
.for p in ${PROGS}
-/* $Id: test-cert.c,v 1.8 2021/02/08 09:28:58 claudio Exp $ */
+/* $Id: test-cert.c,v 1.9 2021/02/16 08:53:53 job Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
printf("Subject key identifier: %s\n", p->ski);
if (p->aki != NULL)
printf("Authority key identifier: %s\n", p->aki);
+ if (p->aia != NULL)
+ printf("Authority info access: %s\n", p->aia);
for (i = 0; i < p->asz; i++)
switch (p->as[i].type) {
-/* $Id: test-gbr.c,v 1.1 2020/12/09 11:30:44 claudio Exp $ */
+/* $Id: test-gbr.c,v 1.2 2021/02/16 08:53:53 job Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
printf("Subject key identifier: %s\n", p->ski);
printf("Authority key identifier: %s\n", p->aki);
+ printf("Authority info access: %s\n", p->aia);
printf("vcard:\n%s", p->vcard);
}
-/* $Id: test-mft.c,v 1.10 2020/11/09 16:13:02 tb Exp $ */
+/* $Id: test-mft.c,v 1.11 2021/02/16 08:53:53 job Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
printf("Subject key identifier: %s\n", p->ski);
printf("Authority key identifier: %s\n", p->aki);
+ printf("Authority info access: %s\n", p->aia);
for (i = 0; i < p->filesz; i++) {
b64_ntop(p->files[i].hash, sizeof(p->files[i].hash),
hash, sizeof(hash));
-/* $Id: test-roa.c,v 1.8 2021/01/29 10:15:42 claudio Exp $ */
+/* $Id: test-roa.c,v 1.9 2021/02/16 08:53:53 job Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
printf("Subject key identifier: %s\n", p->ski);
printf("Authority key identifier: %s\n", p->aki);
+ printf("Authority info access: %s\n", p->aia);
printf("asID: %" PRIu32 "\n", p->asid);
for (i = 0; i < p->ipsz; i++) {
ip_addr_print(&p->ips[i].addr,