X-Git-Url: https://git.openssl.org/?p=openssl.git;a=blobdiff_plain;f=apps%2Fcmp.c;h=05fae77d38baa62c1acdceb1bbdc0da5fefc156a;hp=a229485d6660e9f63484cee9c63def5fa86723ca;hb=11baa470a21b514ab247071e80273ddc0a80c504;hpb=5a2ba207ed94e79db606f80cf2873367e2a843bf diff --git a/apps/cmp.c b/apps/cmp.c index a229485d66..05fae77d38 100644 --- a/apps/cmp.c +++ b/apps/cmp.c @@ -350,7 +350,7 @@ const OPTIONS cmp_options[] = { "Certificates to trust as chain roots when verifying signed CMP responses"}, {OPT_MORE_STR, 0, 0, "unless -srvcert is given"}, {"untrusted", OPT_UNTRUSTED, 's', - "Intermediate certs for chain construction verifying CMP/TLS/enrolled certs"}, + "Intermediate CA certs for chain construction for CMP/TLS/enrolled certs"}, {"srvcert", OPT_SRVCERT, 's', "Server cert to pin and trust directly when verifying signed CMP responses"}, {"recipient", OPT_RECIPIENT, 's', @@ -1637,8 +1637,7 @@ static SSL_CTX *setup_ssl_ctx(OSSL_CMP_CTX *ctx, ENGINE *e) /* * Any further certs and any untrusted certs are used for constructing - * the client cert chain to be provided along with the TLS client cert - * to the TLS server. + * the chain to be provided with the TLS client cert to the TLS server. */ if (!SSL_CTX_set0_chain(ssl_ctx, certs)) { CMP_err("could not set TLS client cert chain"); @@ -1881,9 +1880,12 @@ static int setup_request_ctx(OSSL_CMP_CTX *ctx, ENGINE *e) } } - if (opt_days > 0) - (void)OSSL_CMP_CTX_set_option(ctx, OSSL_CMP_OPT_VALIDITY_DAYS, - opt_days); + if (opt_days > 0 + && !OSSL_CMP_CTX_set_option(ctx, OSSL_CMP_OPT_VALIDITY_DAYS, + opt_days)) { + CMP_err("could to set requested cert validity period"); + goto err; + } if (opt_policies != NULL && opt_policy_oids != NULL) { CMP_err("cannot have policies both via -policies and via -policy_oids"); @@ -2097,6 +2099,8 @@ static int setup_client_ctx(OSSL_CMP_CTX *ctx, ENGINE *e) goto oom; if (opt_proxy != NULL && !OSSL_CMP_CTX_set1_proxy(ctx, opt_proxy)) goto oom; + if (opt_no_proxy != NULL && !OSSL_CMP_CTX_set1_no_proxy(ctx, opt_no_proxy)) + goto oom; (void)BIO_snprintf(server_buf, sizeof(server_buf), "http%s://%s%s%s/%s", opt_tls_used ? "s" : "", opt_server, server_port == 0 ? "" : ":", server_port_s, @@ -2995,7 +2999,7 @@ int cmp_main(int argc, char **argv) if (req != NULL) { if (strcmp(path, "") != 0 && strcmp(path, "pkix/") != 0) { (void)http_server_send_status(cbio, 404, "Not Found"); - CMP_err1("Expecting empty path or 'pkix/' but got '%s'\n", + CMP_err1("Expecting empty path or 'pkix/' but got '%s'", path); OPENSSL_free(path); OSSL_CMP_MSG_free(req);