• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/

Lines Matching refs:nickname

281  * Determine whether the nickname passed in is a filename that needs to
282 * be loaded as a PEM or a regular NSS nickname.
285 * returns 0 for not a file (NSS nickname)
301 /* Check if the given string is filename or nickname of a certificate. If the
303 * recognized as nickname, return a duplicated string. The returned string
313 /* no such file exists, use the string as nickname */
319 infof(data, "warning: certificate file name \"%s\" handled as nickname; "
407 char *nickname = NULL;
416 nickname = aprintf("PEM Token #1:%s", n);
417 if(nickname) {
418 cert = PK11_FindCertFromNickname(nickname, NULL);
422 free(nickname);
837 const char *nickname = connssl->client_nickname;
885 if(SECSuccess != NSS_GetClientAuthData((void *)nickname, sock, caNames,
889 if(NULL == nickname)
890 failf(data, "NSS: client certificate not found (nickname not "
893 failf(data, "NSS: client certificate not found: %s", nickname);
898 /* get certificate nickname if any */
899 nickname = (*pRetCert)->nickname;
900 if(NULL == nickname)
901 nickname = "[unknown]";
904 failf(data, "NSS: private key not found for certificate: %s", nickname);
908 infof(data, "NSS: using client certificate: %s\n", nickname);
1451 char *nickname = dup_nickname(data, STRING_CERT);
1452 if(nickname) {
1466 /* store the nickname for SelectClientCert() called during handshake */
1467 connssl->client_nickname = nickname;
1569 char *nickname = dup_nickname(data, STRING_SSL_ISSUERCERT);
1570 if(nickname) {
1572 ret = check_issuer_cert(connssl->handle, nickname);
1573 free(nickname);