|
|
|
@ -413,8 +413,8 @@ int cms_main(int argc, char **argv)
|
|
|
|
|
break;
|
|
|
|
|
case OPT_SECRETKEY:
|
|
|
|
|
if (secret_key != NULL) {
|
|
|
|
|
/* Cannot be supplied twice */
|
|
|
|
|
BIO_printf(bio_err, "Invalid key %s\n", opt_arg());
|
|
|
|
|
BIO_printf(bio_err, "Invalid key (supplied twice) %s\n",
|
|
|
|
|
opt_arg());
|
|
|
|
|
goto opthelp;
|
|
|
|
|
}
|
|
|
|
|
secret_key = OPENSSL_hexstr2buf(opt_arg(), <mp);
|
|
|
|
@ -426,8 +426,8 @@ int cms_main(int argc, char **argv)
|
|
|
|
|
break;
|
|
|
|
|
case OPT_SECRETKEYID:
|
|
|
|
|
if (secret_keyid != NULL) {
|
|
|
|
|
/* Cannot be supplied twice */
|
|
|
|
|
BIO_printf(bio_err, "Invalid id %s\n", opt_arg());
|
|
|
|
|
BIO_printf(bio_err, "Invalid id (supplied twice) %s\n",
|
|
|
|
|
opt_arg());
|
|
|
|
|
goto opthelp;
|
|
|
|
|
}
|
|
|
|
|
secret_keyid = OPENSSL_hexstr2buf(opt_arg(), <mp);
|
|
|
|
@ -442,8 +442,8 @@ int cms_main(int argc, char **argv)
|
|
|
|
|
break;
|
|
|
|
|
case OPT_ECONTENT_TYPE:
|
|
|
|
|
if (econtent_type != NULL) {
|
|
|
|
|
/* Cannot be supplied twice */
|
|
|
|
|
BIO_printf(bio_err, "Invalid OID %s\n", opt_arg());
|
|
|
|
|
BIO_printf(bio_err, "Invalid OID (supplied twice) %s\n",
|
|
|
|
|
opt_arg());
|
|
|
|
|
goto opthelp;
|
|
|
|
|
}
|
|
|
|
|
econtent_type = OBJ_txt2obj(opt_arg(), 0);
|
|
|
|
|