return 1;
if (!*args[3])
- return cli_err(appctx, "'commit ssl cert expects a filename\n");
+ return cli_err(appctx, "'commit ssl cert' expects a filename\n");
/* The operations on the CKCH architecture are locked so we can
* manipulate ckch_store and ckch_inst */
return 1;
if (!*args[3] || !payload)
- return cli_err(appctx, "'set ssl cert expects a filename and a certificate as a payload\n");
+ return cli_err(appctx, "'set ssl cert' expects a filename and a certificate as a payload\n");
/* The operations on the CKCH architecture are locked so we can
* manipulate ckch_store and ckch_inst */
add_cmd = 1;
if (!*args[3] || !payload)
- return cli_err(appctx, "'set ssl ca-file expects a filename and CAs as a payload\n");
+ return cli_err(appctx, "'set ssl ca-file' expects a filename and CAs as a payload\n");
/* The operations on the CKCH architecture are locked so we can
* manipulate ckch_store and ckch_inst */
return 1;
if (!*args[3])
- return cli_err(appctx, "'commit ssl ca-file expects a filename\n");
+ return cli_err(appctx, "'commit ssl ca-file' expects a filename\n");
/* The operations on the CKCH architecture are locked so we can
* manipulate ckch_store and ckch_inst */
return 1;
if (!*args[3] || !payload)
- return cli_err(appctx, "'set ssl crl-file expects a filename and CRLs as a payload\n");
+ return cli_err(appctx, "'set ssl crl-file' expects a filename and CRLs as a payload\n");
/* The operations on the CKCH architecture are locked so we can
* manipulate ckch_store and ckch_inst */
return 1;
if (!*args[3])
- return cli_err(appctx, "'commit ssl ca-file expects a filename\n");
+ return cli_err(appctx, "'commit ssl ca-file' expects a filename\n");
/* The operations on the CKCH architecture are locked so we can
* manipulate ckch_store and ckch_inst */