aboutsummaryrefslogtreecommitdiffstats
path: root/src/rspamadm
diff options
context:
space:
mode:
authorVsevolod Stakhov <vsevolod@highsecure.ru>2020-07-30 14:42:10 +0100
committerVsevolod Stakhov <vsevolod@highsecure.ru>2020-07-30 14:42:10 +0100
commite92d01d68c4d119d5df9b8d3533aa737a3496732 (patch)
tree172640ea5bf56913f87cbe02ff3307fafe34e58b /src/rspamadm
parent9216f3f02d1b9a5bce623f3d0b0b45149015ae05 (diff)
downloadrspamd-e92d01d68c4d119d5df9b8d3533aa737a3496732.tar.gz
rspamd-e92d01d68c4d119d5df9b8d3533aa737a3496732.zip
[Minor] Distinguish invalid and missing keypair
Diffstat (limited to 'src/rspamadm')
-rw-r--r--src/rspamadm/signtool.c9
1 files changed, 7 insertions, 2 deletions
diff --git a/src/rspamadm/signtool.c b/src/rspamadm/signtool.c
index d92071bfa..03f6ac60e 100644
--- a/src/rspamadm/signtool.c
+++ b/src/rspamadm/signtool.c
@@ -592,8 +592,13 @@ rspamadm_signtool (gint argc, gchar **argv, const struct rspamadm_command *cmd)
kp = rspamd_keypair_from_ucl (top);
- if (kp == NULL || rspamd_keypair_type (kp) != RSPAMD_KEYPAIR_SIGN) {
- rspamd_fprintf (stderr, "invalid or unsuitable for signing key\n");
+ if (kp == NULL) {
+ rspamd_fprintf (stderr, "invalid signing key\n");
+ exit (EXIT_FAILURE);
+ }
+
+ if (rspamd_keypair_type (kp) != RSPAMD_KEYPAIR_SIGN) {
+ rspamd_fprintf (stderr, "unsuitable for signing key\n");
exit (EXIT_FAILURE);
}