Home | History | Annotate | Download | only in vtls

Lines Matching refs:nickname

296  * Determine whether the nickname passed in is a filename that needs to
297 * be loaded as a PEM or a regular NSS nickname.
300 * returns 0 for not a file (NSS nickname)
316 /* Check if the given string is filename or nickname of a certificate. If the
318 * recognized as nickname, return a duplicated string. The returned string
328 /* no such file exists, use the string as nickname */
334 infof(data, "warning: certificate file name \"%s\" handled as nickname; "
430 char *nickname = NULL;
439 nickname = aprintf("PEM Token #1:%s", n);
440 if(nickname) {
441 cert = PK11_FindCertFromNickname(nickname, NULL);
445 free(nickname);
1006 const char *nickname = connssl->client_nickname;
1054 if(SECSuccess != NSS_GetClientAuthData((void *)nickname, sock, caNames,
1058 if(NULL == nickname)
1059 failf(data, "NSS: client certificate not found (nickname not "
1062 failf(data, "NSS: client certificate not found: %s", nickname);
1067 /* get certificate nickname if any */
1068 nickname = (*pRetCert)->nickname;
1069 if(NULL == nickname)
1070 nickname = "[unknown]";
1073 failf(data, "NSS: private key not found for certificate: %s", nickname);
1077 infof(data, "NSS: using client certificate: %s\n", nickname);
1674 char *nickname = dup_nickname(data, STRING_CERT);
1675 if(nickname) {
1689 /* store the nickname for SelectClientCert() called during handshake */
1690 connssl->client_nickname = nickname;
1849 char *nickname = dup_nickname(data, STRING_SSL_ISSUERCERT);
1850 if(nickname) {
1852 ret = check_issuer_cert(connssl->handle, nickname);
1853 free(nickname);