Home | History | Annotate | Download | only in vtls

Lines Matching full:certificate

334 /* Check if the given string is filename or nickname of a certificate.  If the
351 infof(data, "warning: certificate file name \"%s\" handled as nickname; "
356 /* we'll use the PEM reader to read the certificate from file */
421 /* store reference to a client certificate */
458 /* we have successfully loaded a client certificate */
619 failf(conn->data, "Unable to load certificate %s", filename);
711 infof(conn->data, "skipping SSL peer certificate verification\n");
879 infof(conn->data, "Server certificate:\n");
947 infof(data, "Server certificate:\n");
957 * Check that the Peer certificate's issuer certificate matches the one found
998 /* get peer certificate */
1001 /* extract public key from peer certificate */
1035 * Callback to pick the SSL client certificate.
1070 failf(data, "NSS: client certificate from file not found");
1083 infof(data, "NSS: client certificate from file\n");
1097 failf(data, "NSS: client certificate not found (nickname not "
1100 failf(data, "NSS: client certificate not found: %s", nickname);
1105 /* get certificate nickname if any */
1111 failf(data, "NSS: refusing previously loaded certificate from file: %s",
1117 failf(data, "NSS: private key not found for certificate: %s", nickname);
1121 infof(data, "NSS: using client certificate: %s\n", nickname);
1379 /* before the cleanup, check whether we are using a client certificate */
1445 /* return true if the given error code is related to a client certificate */
1965 infof(data, "SSL certificate issuer check failed\n");
1970 infof(data, "SSL certificate issuer check ok\n");