From b998745a4596c05f673ed8acdcaedcb4c5e208ad Mon Sep 17 00:00:00 2001 From: Bernd Edlinger Date: Sun, 1 Apr 2018 00:46:49 +0200 Subject: [PATCH] Improve diagnostics for invalid arguments in asn1parse -strparse Reviewed-by: Rich Salz Reviewed-by: Matthias St. Pierre (Merged from https://github.com/openssl/openssl/pull/5826) --- apps/asn1pars.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/apps/asn1pars.c b/apps/asn1pars.c index 89069439a8..38ffb22d48 100644 --- a/apps/asn1pars.c +++ b/apps/asn1pars.c @@ -39,7 +39,7 @@ const OPTIONS asn1parse_options[] = { {"dump", OPT_DUMP, 0, "unknown data in hex form"}, {"dlimit", OPT_DLIMIT, 'p', "dump the first arg bytes of unknown data in hex form"}, - {"strparse", OPT_STRPARSE, 's', + {"strparse", OPT_STRPARSE, 'p', "offset; a series of these can be used to 'dig'"}, {OPT_MORE_STR, 0, 0, "into multiple ASN1 blob wrappings"}, {"genstr", OPT_GENSTR, 's', "string to generate ASN1 structure from"}, @@ -227,7 +227,7 @@ int asn1parse_main(int argc, char **argv) int typ; j = atoi(sk_OPENSSL_STRING_value(osk, i)); if (j <= 0 || j >= tmplen) { - BIO_printf(bio_err, "'%s' is an invalid number\n", + BIO_printf(bio_err, "'%s' is out of range\n", sk_OPENSSL_STRING_value(osk, i)); continue; } -- GitLab