Lines Matching refs:nickname
290 * Determine whether the nickname passed in is a filename that needs to
291 * be loaded as a PEM or a regular NSS nickname.
294 * returns 0 for not a file (NSS nickname)
310 /* Check if the given string is filename or nickname of a certificate. If the
312 * recognized as nickname, return a duplicated string. The returned string
322 /* no such file exists, use the string as nickname */
328 infof(data, "warning: certificate file name \"%s\" handled as nickname; "
424 char *nickname = NULL;
433 nickname = aprintf("PEM Token #1:%s", n);
434 if(nickname) {
435 cert = PK11_FindCertFromNickname(nickname, NULL);
439 free(nickname);
1007 const char *nickname = connssl->client_nickname;
1055 if(SECSuccess != NSS_GetClientAuthData((void *)nickname, sock, caNames,
1059 if(NULL == nickname)
1060 failf(data, "NSS: client certificate not found (nickname not "
1063 failf(data, "NSS: client certificate not found: %s", nickname);
1068 /* get certificate nickname if any */
1069 nickname = (*pRetCert)->nickname;
1070 if(NULL == nickname)
1071 nickname = "[unknown]";
1074 failf(data, "NSS: private key not found for certificate: %s", nickname);
1078 infof(data, "NSS: using client certificate: %s\n", nickname);
1675 char *nickname = dup_nickname(data, STRING_CERT);
1676 if(nickname) {
1690 /* store the nickname for SelectClientCert() called during handshake */
1691 connssl->client_nickname = nickname;
1842 char *nickname = dup_nickname(data, STRING_SSL_ISSUERCERT);
1843 if(nickname) {
1845 ret = check_issuer_cert(connssl->handle, nickname);
1846 free(nickname);