{ "oldwithnew", OPT_OLDWITHNEW, 's',
"File to save OldWithNew cert received in genp of type rootCaKeyUpdate" },
{ "crlcert", OPT_CRLCERT, 's',
- "certificate to request a CRL for in genm of type crlStatusList" },
+ "certificate to take CRL source data from in genm of type crlStatusList" },
{ "oldcrl", OPT_OLDCRL, 's',
- "CRL to request update for in genm of type crlStatusList" },
+ "CRL to obtain an update for in genm of type crlStatusList" },
{ "crlout", OPT_CRLOUT, 's',
"File to save new CRL received in genp of type 'crls'" },
char *file = opt_reqin, *end = file, bak;
OSSL_CMP_MSG *req;
const X509_PUBKEY *pubkey;
- EVP_PKEY *pkey;
- EVP_PKEY *pkey1;
+ EVP_PKEY *pkey, *pkey1;
int res = 0;
/* temporarily separate first file name in opt_reqin */
goto err;
}
pkey1 = EVP_PKEY_dup(pkey);
- if (pkey == NULL || !OSSL_CMP_CTX_set0_newPkey(ctx, 0 /* priv */, pkey1)) {
+ if (pkey1 == NULL || !OSSL_CMP_CTX_set0_newPkey(ctx, 0 /* priv */, pkey1)) {
EVP_PKEY_free(pkey1);
- CMP_err1("Failed to get fallback public key obtained from ir/cr/kur file '%s'", file);
+ CMP_err1("Failed to set fallback public key obtained from ir/cr/kur file '%s'", file);
goto err;
}
res = 1;
goto err;
/* not printing earlier, to minimize confusion in case setup fails before */
- if (opt_reqout_only == NULL)
+ if (opt_reqout_only != NULL)
+ CMP_info("Will not contact any server");
+ else
CMP_info3("Will contact %s%s%s ", server_buf, proxy_buf,
opt_rspin == NULL ? "" : " only if -rspin argument does not give enough filenames");
CMP_warn1("-server %s", msg);
opt_server = NULL;
}
- if (opt_proxy != NULL) {
- CMP_warn1("-proxy %s", msg);
- opt_proxy = NULL;
- }
- if (opt_no_proxy != NULL) {
- CMP_warn1("-no_proxy %s", msg);
- opt_no_proxy = NULL;
- }
- if (opt_tls_used) {
- CMP_warn1("-tls_used %s", msg);
- opt_tls_used = 0;
- }
#endif
if (opt_path != NULL) {
CMP_warn1("-path %s", msg);